xref: /titanic_52/usr/src/uts/common/inet/sctp/sctp_addr.c (revision d0e58000d0a6f9430e65106daa5fa912eb8f4473)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include <sys/types.h>
27 #include <sys/systm.h>
28 #include <sys/stream.h>
29 #include <sys/cmn_err.h>
30 #include <sys/ddi.h>
31 #include <sys/sunddi.h>
32 #include <sys/kmem.h>
33 #include <sys/socket.h>
34 #include <sys/sysmacros.h>
35 #include <sys/list.h>
36 
37 #include <netinet/in.h>
38 #include <netinet/ip6.h>
39 #include <netinet/sctp.h>
40 
41 #include <inet/common.h>
42 #include <inet/ip.h>
43 #include <inet/ip6.h>
44 #include <inet/ip_if.h>
45 #include <inet/ipclassifier.h>
46 #include <inet/sctp_ip.h>
47 #include "sctp_impl.h"
48 #include "sctp_addr.h"
49 
50 static void		sctp_ipif_inactive(sctp_ipif_t *);
51 static sctp_ipif_t	*sctp_lookup_ipif_addr(in6_addr_t *, boolean_t,
52 			    zoneid_t, boolean_t, uint_t, uint_t, boolean_t,
53 			    sctp_stack_t *);
54 static int		sctp_get_all_ipifs(sctp_t *, int);
55 static int		sctp_ipif_hash_insert(sctp_t *, sctp_ipif_t *, int,
56 			    boolean_t, boolean_t);
57 static void		sctp_ipif_hash_remove(sctp_t *, sctp_ipif_t *);
58 static void		sctp_fix_saddr(sctp_t *, in6_addr_t *);
59 static int		sctp_compare_ipif_list(sctp_ipif_hash_t *,
60 			    sctp_ipif_hash_t *);
61 static int		sctp_copy_ipifs(sctp_ipif_hash_t *, sctp_t *, int);
62 
63 #define	SCTP_ADDR4_HASH(addr)	\
64 	(((addr) ^ ((addr) >> 8) ^ ((addr) >> 16) ^ ((addr) >> 24)) &	\
65 	(SCTP_IPIF_HASH - 1))
66 
67 #define	SCTP_ADDR6_HASH(addr)	\
68 	(((addr).s6_addr32[3] ^						\
69 	(((addr).s6_addr32[3] ^ (addr).s6_addr32[2]) >> 12)) &		\
70 	(SCTP_IPIF_HASH - 1))
71 
72 #define	SCTP_IPIF_ADDR_HASH(addr, isv6)					\
73 	((isv6) ? SCTP_ADDR6_HASH((addr)) : 				\
74 	SCTP_ADDR4_HASH((addr)._S6_un._S6_u32[3]))
75 
76 #define	SCTP_IPIF_USABLE(sctp_ipif_state)	\
77 	((sctp_ipif_state) == SCTP_IPIFS_UP ||	\
78 	(sctp_ipif_state) ==  SCTP_IPIFS_DOWN)
79 
80 #define	SCTP_IPIF_DISCARD(sctp_ipif_flags)	\
81 	((sctp_ipif_flags) & (IPIF_PRIVATE | IPIF_DEPRECATED))
82 
83 #define	SCTP_IS_IPIF_LOOPBACK(ipif)		\
84 	((ipif)->sctp_ipif_ill->sctp_ill_flags & PHYI_LOOPBACK)
85 
86 #define	SCTP_IS_IPIF_LINKLOCAL(ipif)		\
87 	((ipif)->sctp_ipif_isv6 && 		\
88 	IN6_IS_ADDR_LINKLOCAL(&(ipif)->sctp_ipif_saddr))
89 
90 #define	SCTP_UNSUPP_AF(ipif, supp_af)	\
91 	((!(ipif)->sctp_ipif_isv6 && !((supp_af) & PARM_SUPP_V4)) ||	\
92 	((ipif)->sctp_ipif_isv6 && !((supp_af) & PARM_SUPP_V6)))
93 
94 #define	SCTP_IPIF_ZONE_MATCH(sctp, ipif) 				\
95 	IPCL_ZONE_MATCH((sctp)->sctp_connp, (ipif)->sctp_ipif_zoneid)
96 
97 #define	SCTP_ILL_HASH_FN(index)		((index) % SCTP_ILL_HASH)
98 #define	SCTP_ILL_TO_PHYINDEX(ill)	((ill)->ill_phyint->phyint_ifindex)
99 
100 /*
101  * SCTP Interface list manipulation functions, locking used.
102  */
103 
104 /*
105  * Delete an SCTP IPIF from the list if the refcount goes to 0 and it is
106  * marked as condemned. Also, check if the ILL needs to go away.
107  */
108 static void
109 sctp_ipif_inactive(sctp_ipif_t *sctp_ipif)
110 {
111 	sctp_ill_t	*sctp_ill;
112 	uint_t		hindex;
113 	uint_t		ill_index;
114 	sctp_stack_t	*sctps = sctp_ipif->sctp_ipif_ill->
115 	    sctp_ill_netstack->netstack_sctp;
116 
117 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
118 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
119 
120 	hindex = SCTP_IPIF_ADDR_HASH(sctp_ipif->sctp_ipif_saddr,
121 	    sctp_ipif->sctp_ipif_isv6);
122 
123 	sctp_ill = sctp_ipif->sctp_ipif_ill;
124 	ASSERT(sctp_ill != NULL);
125 	ill_index = SCTP_ILL_HASH_FN(sctp_ill->sctp_ill_index);
126 	if (sctp_ipif->sctp_ipif_state != SCTP_IPIFS_CONDEMNED ||
127 	    sctp_ipif->sctp_ipif_refcnt != 0) {
128 		rw_exit(&sctps->sctps_g_ipifs_lock);
129 		rw_exit(&sctps->sctps_g_ills_lock);
130 		return;
131 	}
132 	list_remove(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
133 	    sctp_ipif);
134 	sctps->sctps_g_ipifs[hindex].ipif_count--;
135 	sctps->sctps_g_ipifs_count--;
136 	rw_destroy(&sctp_ipif->sctp_ipif_lock);
137 	kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
138 
139 	(void) atomic_add_32_nv(&sctp_ill->sctp_ill_ipifcnt, -1);
140 	if (rw_tryupgrade(&sctps->sctps_g_ills_lock) != 0) {
141 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
142 		if (sctp_ill->sctp_ill_ipifcnt == 0 &&
143 		    sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED) {
144 			list_remove(&sctps->sctps_g_ills[ill_index].
145 			    sctp_ill_list, (void *)sctp_ill);
146 			sctps->sctps_g_ills[ill_index].ill_count--;
147 			sctps->sctps_ills_count--;
148 			kmem_free(sctp_ill->sctp_ill_name,
149 			    sctp_ill->sctp_ill_name_length);
150 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
151 		}
152 	}
153 	rw_exit(&sctps->sctps_g_ipifs_lock);
154 	rw_exit(&sctps->sctps_g_ills_lock);
155 }
156 
157 /*
158  * Lookup an SCTP IPIF given an IP address. Increments sctp_ipif refcnt.
159  * We are either looking for a IPIF with the given address before
160  * inserting it into the global list or looking for an IPIF for an
161  * address given an SCTP. In the former case we always check the zoneid,
162  * but for the latter case, check_zid could be B_FALSE if the connp
163  * for the sctp has conn_all_zones set. When looking for an address we
164  * give preference to one that is up, so even though we may find one that
165  * is not up we keep looking if there is one up, we hold the down addr
166  * in backup_ipif in case we don't find one that is up - i.e. we return
167  * the backup_ipif in that case. Note that if we are looking for. If we
168  * are specifically looking for an up address, then usable will be set
169  * to true.
170  */
171 static sctp_ipif_t *
172 sctp_lookup_ipif_addr(in6_addr_t *addr, boolean_t refhold, zoneid_t zoneid,
173     boolean_t check_zid, uint_t ifindex, uint_t seqid, boolean_t usable,
174     sctp_stack_t *sctps)
175 {
176 	int		j;
177 	sctp_ipif_t	*sctp_ipif;
178 	sctp_ipif_t	*backup_ipif = NULL;
179 	int		hindex;
180 
181 	hindex = SCTP_IPIF_ADDR_HASH(*addr, !IN6_IS_ADDR_V4MAPPED(addr));
182 
183 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
184 	if (sctps->sctps_g_ipifs[hindex].ipif_count == 0) {
185 		rw_exit(&sctps->sctps_g_ipifs_lock);
186 		return (NULL);
187 	}
188 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
189 	for (j = 0; j < sctps->sctps_g_ipifs[hindex].ipif_count; j++) {
190 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
191 		if ((!check_zid ||
192 		    (sctp_ipif->sctp_ipif_zoneid == ALL_ZONES ||
193 		    zoneid == sctp_ipif->sctp_ipif_zoneid)) &&
194 		    (ifindex == 0 || ifindex ==
195 		    sctp_ipif->sctp_ipif_ill->sctp_ill_index) &&
196 		    ((seqid != 0 && seqid == sctp_ipif->sctp_ipif_id) ||
197 		    (IN6_ARE_ADDR_EQUAL(&sctp_ipif->sctp_ipif_saddr,
198 		    addr)))) {
199 			if (!usable || sctp_ipif->sctp_ipif_state ==
200 			    SCTP_IPIFS_UP) {
201 				rw_exit(&sctp_ipif->sctp_ipif_lock);
202 				if (refhold)
203 					SCTP_IPIF_REFHOLD(sctp_ipif);
204 				rw_exit(&sctps->sctps_g_ipifs_lock);
205 				return (sctp_ipif);
206 			} else if (sctp_ipif->sctp_ipif_state ==
207 			    SCTP_IPIFS_DOWN && backup_ipif == NULL) {
208 				backup_ipif = sctp_ipif;
209 			}
210 		}
211 		rw_exit(&sctp_ipif->sctp_ipif_lock);
212 		sctp_ipif = list_next(
213 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list, sctp_ipif);
214 	}
215 	if (backup_ipif != NULL) {
216 		if (refhold)
217 			SCTP_IPIF_REFHOLD(backup_ipif);
218 		rw_exit(&sctps->sctps_g_ipifs_lock);
219 		return (backup_ipif);
220 	}
221 	rw_exit(&sctps->sctps_g_ipifs_lock);
222 	return (NULL);
223 }
224 
225 /*
226  * Populate the list with all the SCTP ipifs for a given ipversion.
227  * Increments sctp_ipif refcnt.
228  * Called with no locks held.
229  */
230 static int
231 sctp_get_all_ipifs(sctp_t *sctp, int sleep)
232 {
233 	sctp_ipif_t		*sctp_ipif;
234 	int			i;
235 	int			j;
236 	int			error = 0;
237 	sctp_stack_t		*sctps = sctp->sctp_sctps;
238 	boolean_t		isv6;
239 
240 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
241 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
242 		if (sctps->sctps_g_ipifs[i].ipif_count == 0)
243 			continue;
244 		sctp_ipif = list_head(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
245 		for (j = 0; j < sctps->sctps_g_ipifs[i].ipif_count; j++) {
246 			rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
247 			isv6 = sctp_ipif->sctp_ipif_isv6;
248 			if (SCTP_IPIF_DISCARD(sctp_ipif->sctp_ipif_flags) ||
249 			    !SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state) ||
250 			    !SCTP_IPIF_ZONE_MATCH(sctp, sctp_ipif) ||
251 			    SCTP_IS_ADDR_UNSPEC(!isv6,
252 			    sctp_ipif->sctp_ipif_saddr) ||
253 			    (sctp->sctp_ipversion == IPV4_VERSION && isv6) ||
254 			    (sctp->sctp_connp->conn_ipv6_v6only && !isv6)) {
255 				rw_exit(&sctp_ipif->sctp_ipif_lock);
256 				sctp_ipif = list_next(
257 				    &sctps->sctps_g_ipifs[i].sctp_ipif_list,
258 				    sctp_ipif);
259 				continue;
260 			}
261 			rw_exit(&sctp_ipif->sctp_ipif_lock);
262 			SCTP_IPIF_REFHOLD(sctp_ipif);
263 			error = sctp_ipif_hash_insert(sctp, sctp_ipif, sleep,
264 			    B_FALSE, B_FALSE);
265 			if (error != 0 && error != EALREADY)
266 				goto free_stuff;
267 			sctp_ipif = list_next(
268 			    &sctps->sctps_g_ipifs[i].sctp_ipif_list,
269 			    sctp_ipif);
270 		}
271 	}
272 	rw_exit(&sctps->sctps_g_ipifs_lock);
273 	return (0);
274 free_stuff:
275 	rw_exit(&sctps->sctps_g_ipifs_lock);
276 	sctp_free_saddrs(sctp);
277 	return (ENOMEM);
278 }
279 
280 /*
281  * Given a list of address, fills in the list of SCTP ipifs if all the addresses
282  * are present in the SCTP interface list, return number of addresses filled
283  * or error. If the caller wants the list of addresses, it sends a pre-allocated
284  * buffer - list. Currently, this list is only used on a clustered node when
285  * the SCTP is in the listen state (from sctp_bind_add()). When called on a
286  * clustered node, the input is always a list of addresses (even if the
287  * original bind() was to INADDR_ANY).
288  * Called with no locks held.
289  */
290 int
291 sctp_valid_addr_list(sctp_t *sctp, const void *addrs, uint32_t addrcnt,
292     uchar_t *list, size_t lsize)
293 {
294 	struct sockaddr_in	*sin4;
295 	struct sockaddr_in6	*sin6;
296 	struct in_addr		*addr4;
297 	in6_addr_t		addr;
298 	int			cnt;
299 	int			err = 0;
300 	int			saddr_cnt = 0;
301 	sctp_ipif_t		*ipif;
302 	boolean_t		bind_to_all = B_FALSE;
303 	boolean_t		check_addrs = B_FALSE;
304 	boolean_t		check_lport = B_FALSE;
305 	uchar_t			*p = list;
306 
307 	/*
308 	 * Need to check for port and address depending on the state.
309 	 * After a socket is bound, we need to make sure that subsequent
310 	 * bindx() has correct port.  After an association is established,
311 	 * we need to check for changing the bound address to invalid
312 	 * addresses.
313 	 */
314 	if (sctp->sctp_state >= SCTPS_BOUND) {
315 		check_lport = B_TRUE;
316 		if (sctp->sctp_state > SCTPS_LISTEN)
317 			check_addrs = B_TRUE;
318 	}
319 
320 	if (sctp->sctp_conn_tfp != NULL)
321 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
322 	if (sctp->sctp_listen_tfp != NULL)
323 		mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
324 	for (cnt = 0; cnt < addrcnt; cnt++) {
325 		boolean_t	lookup_saddr = B_TRUE;
326 		uint_t		ifindex = 0;
327 
328 		switch (sctp->sctp_family) {
329 		case AF_INET:
330 			sin4 = (struct sockaddr_in *)addrs + cnt;
331 			if (sin4->sin_family != AF_INET || (check_lport &&
332 			    sin4->sin_port != sctp->sctp_lport)) {
333 				err = EINVAL;
334 				goto free_ret;
335 			}
336 			addr4 = &sin4->sin_addr;
337 			if (check_addrs &&
338 			    (addr4->s_addr == INADDR_ANY ||
339 			    addr4->s_addr == INADDR_BROADCAST ||
340 			    CLASSD(addr4->s_addr))) {
341 				err = EINVAL;
342 				goto free_ret;
343 			}
344 			IN6_INADDR_TO_V4MAPPED(addr4, &addr);
345 			if (!check_addrs && addr4->s_addr == INADDR_ANY) {
346 				lookup_saddr = B_FALSE;
347 				bind_to_all = B_TRUE;
348 			}
349 
350 			break;
351 		case AF_INET6:
352 			sin6 = (struct sockaddr_in6 *)addrs + cnt;
353 			if (sin6->sin6_family != AF_INET6 || (check_lport &&
354 			    sin6->sin6_port != sctp->sctp_lport)) {
355 				err = EINVAL;
356 				goto free_ret;
357 			}
358 			addr = sin6->sin6_addr;
359 			/* Contains the interface index */
360 			ifindex = sin6->sin6_scope_id;
361 			if (sctp->sctp_connp->conn_ipv6_v6only &&
362 			    IN6_IS_ADDR_V4MAPPED(&addr)) {
363 				err = EAFNOSUPPORT;
364 				goto free_ret;
365 			}
366 			if (check_addrs &&
367 			    (IN6_IS_ADDR_LINKLOCAL(&addr) ||
368 			    IN6_IS_ADDR_MULTICAST(&addr) ||
369 			    IN6_IS_ADDR_UNSPECIFIED(&addr))) {
370 				err = EINVAL;
371 				goto free_ret;
372 			}
373 			if (!check_addrs && IN6_IS_ADDR_UNSPECIFIED(&addr)) {
374 				lookup_saddr = B_FALSE;
375 				bind_to_all = B_TRUE;
376 			}
377 
378 			break;
379 		default:
380 			err = EAFNOSUPPORT;
381 			goto free_ret;
382 		}
383 		if (lookup_saddr) {
384 			ipif = sctp_lookup_ipif_addr(&addr, B_TRUE,
385 			    sctp->sctp_zoneid, !sctp->sctp_connp->conn_allzones,
386 			    ifindex, 0, B_TRUE, sctp->sctp_sctps);
387 			if (ipif == NULL) {
388 				/* Address not in the list */
389 				err = EINVAL;
390 				goto free_ret;
391 			} else if (check_addrs && SCTP_IS_IPIF_LOOPBACK(ipif) &&
392 			    cl_sctp_check_addrs == NULL) {
393 				SCTP_IPIF_REFRELE(ipif);
394 				err = EINVAL;
395 				goto free_ret;
396 			}
397 		}
398 		if (!bind_to_all) {
399 			/*
400 			 * If an address is added after association setup,
401 			 * we need to wait for the peer to send us an ASCONF
402 			 * ACK before we can start using it.
403 			 * saddr_ipif_dontsrc will be reset (to 0) when we
404 			 * get the ASCONF ACK for this address.
405 			 */
406 			err = sctp_ipif_hash_insert(sctp, ipif, KM_SLEEP,
407 			    check_addrs ? B_TRUE : B_FALSE, B_FALSE);
408 			if (err != 0) {
409 				SCTP_IPIF_REFRELE(ipif);
410 				if (check_addrs && err == EALREADY)
411 					err = EADDRINUSE;
412 				goto free_ret;
413 			}
414 			saddr_cnt++;
415 			if (lsize >= sizeof (addr)) {
416 				bcopy(&addr, p, sizeof (addr));
417 				p += sizeof (addr);
418 				lsize -= sizeof (addr);
419 			}
420 		}
421 	}
422 	if (bind_to_all) {
423 		/*
424 		 * Free whatever we might have added before encountering
425 		 * inaddr_any.
426 		 */
427 		if (sctp->sctp_nsaddrs > 0) {
428 			sctp_free_saddrs(sctp);
429 			ASSERT(sctp->sctp_nsaddrs == 0);
430 		}
431 		err = sctp_get_all_ipifs(sctp, KM_SLEEP);
432 		if (err != 0)
433 			return (err);
434 		sctp->sctp_bound_to_all = 1;
435 	}
436 	if (sctp->sctp_listen_tfp != NULL)
437 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
438 	if (sctp->sctp_conn_tfp != NULL)
439 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
440 	return (0);
441 free_ret:
442 	if (saddr_cnt != 0)
443 		sctp_del_saddr_list(sctp, addrs, saddr_cnt, B_TRUE);
444 	if (sctp->sctp_listen_tfp != NULL)
445 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
446 	if (sctp->sctp_conn_tfp != NULL)
447 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
448 	return (err);
449 }
450 
451 static int
452 sctp_ipif_hash_insert(sctp_t *sctp, sctp_ipif_t *ipif, int sleep,
453     boolean_t dontsrc, boolean_t allow_dup)
454 {
455 	int			cnt;
456 	sctp_saddr_ipif_t	*ipif_obj;
457 	int			hindex;
458 
459 	hindex = SCTP_IPIF_ADDR_HASH(ipif->sctp_ipif_saddr,
460 	    ipif->sctp_ipif_isv6);
461 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
462 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
463 		if (IN6_ARE_ADDR_EQUAL(&ipif_obj->saddr_ipifp->sctp_ipif_saddr,
464 		    &ipif->sctp_ipif_saddr)) {
465 			if (ipif->sctp_ipif_id !=
466 			    ipif_obj->saddr_ipifp->sctp_ipif_id &&
467 			    ipif_obj->saddr_ipifp->sctp_ipif_state ==
468 			    SCTP_IPIFS_DOWN && ipif->sctp_ipif_state ==
469 			    SCTP_IPIFS_UP) {
470 				SCTP_IPIF_REFRELE(ipif_obj->saddr_ipifp);
471 				ipif_obj->saddr_ipifp = ipif;
472 				ipif_obj->saddr_ipif_dontsrc = dontsrc ? 1 : 0;
473 				return (0);
474 			} else if (!allow_dup || ipif->sctp_ipif_id ==
475 			    ipif_obj->saddr_ipifp->sctp_ipif_id) {
476 				return (EALREADY);
477 			}
478 		}
479 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
480 		    ipif_obj);
481 	}
482 	ipif_obj = kmem_zalloc(sizeof (sctp_saddr_ipif_t), sleep);
483 	if (ipif_obj == NULL) {
484 		/* Need to do something */
485 		return (ENOMEM);
486 	}
487 	ipif_obj->saddr_ipifp = ipif;
488 	ipif_obj->saddr_ipif_dontsrc = dontsrc ? 1 : 0;
489 	list_insert_tail(&sctp->sctp_saddrs[hindex].sctp_ipif_list, ipif_obj);
490 	sctp->sctp_saddrs[hindex].ipif_count++;
491 	sctp->sctp_nsaddrs++;
492 	return (0);
493 }
494 
495 /*
496  * Given a source address, walk through the peer address list to see
497  * if the source address is being used.  If it is, reset that.
498  */
499 static void
500 sctp_fix_saddr(sctp_t *sctp, in6_addr_t *saddr)
501 {
502 	sctp_faddr_t	*fp;
503 
504 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
505 		if (!IN6_ARE_ADDR_EQUAL(&fp->saddr, saddr))
506 			continue;
507 		if (fp->ire != NULL) {
508 			IRE_REFRELE_NOTR(fp->ire);
509 			fp->ire = NULL;
510 		}
511 		V6_SET_ZERO(fp->saddr);
512 	}
513 }
514 
515 static void
516 sctp_ipif_hash_remove(sctp_t *sctp, sctp_ipif_t *ipif)
517 {
518 	int			cnt;
519 	sctp_saddr_ipif_t	*ipif_obj;
520 	int			hindex;
521 
522 	hindex = SCTP_IPIF_ADDR_HASH(ipif->sctp_ipif_saddr,
523 	    ipif->sctp_ipif_isv6);
524 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
525 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
526 		if (IN6_ARE_ADDR_EQUAL(&ipif_obj->saddr_ipifp->sctp_ipif_saddr,
527 		    &ipif->sctp_ipif_saddr)) {
528 			list_remove(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
529 			    ipif_obj);
530 			sctp->sctp_saddrs[hindex].ipif_count--;
531 			sctp->sctp_nsaddrs--;
532 			sctp_fix_saddr(sctp, &ipif->sctp_ipif_saddr);
533 			SCTP_IPIF_REFRELE(ipif_obj->saddr_ipifp);
534 			kmem_free(ipif_obj, sizeof (sctp_saddr_ipif_t));
535 			break;
536 		}
537 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
538 		    ipif_obj);
539 	}
540 }
541 
542 static int
543 sctp_compare_ipif_list(sctp_ipif_hash_t *list1, sctp_ipif_hash_t *list2)
544 {
545 	int			i;
546 	int			j;
547 	sctp_saddr_ipif_t	*obj1;
548 	sctp_saddr_ipif_t	*obj2;
549 	int			overlap = 0;
550 
551 	obj1 = list_head(&list1->sctp_ipif_list);
552 	for (i = 0; i < list1->ipif_count; i++) {
553 		obj2 = list_head(&list2->sctp_ipif_list);
554 		for (j = 0; j < list2->ipif_count; j++) {
555 			if (IN6_ARE_ADDR_EQUAL(
556 			    &obj1->saddr_ipifp->sctp_ipif_saddr,
557 			    &obj2->saddr_ipifp->sctp_ipif_saddr)) {
558 				overlap++;
559 				break;
560 			}
561 			obj2 = list_next(&list2->sctp_ipif_list,
562 			    obj2);
563 		}
564 		obj1 = list_next(&list1->sctp_ipif_list, obj1);
565 	}
566 	return (overlap);
567 }
568 
569 int
570 sctp_compare_saddrs(sctp_t *sctp1, sctp_t *sctp2)
571 {
572 	int		i;
573 	int		overlap = 0;
574 
575 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
576 		overlap += sctp_compare_ipif_list(&sctp1->sctp_saddrs[i],
577 		    &sctp2->sctp_saddrs[i]);
578 	}
579 
580 	if (sctp1->sctp_nsaddrs == sctp2->sctp_nsaddrs &&
581 	    overlap == sctp1->sctp_nsaddrs) {
582 		return (SCTP_ADDR_EQUAL);
583 	}
584 
585 	if (overlap == sctp1->sctp_nsaddrs)
586 		return (SCTP_ADDR_SUBSET);
587 
588 	if (overlap > 0)
589 		return (SCTP_ADDR_OVERLAP);
590 
591 	return (SCTP_ADDR_DISJOINT);
592 }
593 
594 static int
595 sctp_copy_ipifs(sctp_ipif_hash_t *list1, sctp_t *sctp2, int sleep)
596 {
597 	int			i;
598 	sctp_saddr_ipif_t	*obj;
599 	int			error = 0;
600 
601 	obj = list_head(&list1->sctp_ipif_list);
602 	for (i = 0; i < list1->ipif_count; i++) {
603 		SCTP_IPIF_REFHOLD(obj->saddr_ipifp);
604 		error = sctp_ipif_hash_insert(sctp2, obj->saddr_ipifp, sleep,
605 		    B_FALSE, B_FALSE);
606 		ASSERT(error != EALREADY);
607 		if (error != 0)
608 			return (error);
609 		obj = list_next(&list1->sctp_ipif_list, obj);
610 	}
611 	return (error);
612 }
613 
614 int
615 sctp_dup_saddrs(sctp_t *sctp1, sctp_t *sctp2, int sleep)
616 {
617 	int	error = 0;
618 	int	i;
619 
620 	if (sctp1 == NULL || sctp1->sctp_bound_to_all == 1)
621 		return (sctp_get_all_ipifs(sctp2, sleep));
622 
623 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
624 		if (sctp1->sctp_saddrs[i].ipif_count == 0)
625 			continue;
626 		error = sctp_copy_ipifs(&sctp1->sctp_saddrs[i], sctp2, sleep);
627 		if (error != 0) {
628 			sctp_free_saddrs(sctp2);
629 			return (error);
630 		}
631 	}
632 	return (0);
633 }
634 
635 void
636 sctp_free_saddrs(sctp_t *sctp)
637 {
638 	int			i;
639 	int			l;
640 	sctp_saddr_ipif_t	*obj;
641 
642 	if (sctp->sctp_nsaddrs == 0)
643 		return;
644 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
645 		if (sctp->sctp_saddrs[i].ipif_count == 0)
646 			continue;
647 		obj = list_tail(&sctp->sctp_saddrs[i].sctp_ipif_list);
648 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
649 			list_remove(&sctp->sctp_saddrs[i].sctp_ipif_list, obj);
650 			SCTP_IPIF_REFRELE(obj->saddr_ipifp);
651 			sctp->sctp_nsaddrs--;
652 			kmem_free(obj, sizeof (sctp_saddr_ipif_t));
653 			obj = list_tail(&sctp->sctp_saddrs[i].sctp_ipif_list);
654 		}
655 		sctp->sctp_saddrs[i].ipif_count = 0;
656 	}
657 	if (sctp->sctp_bound_to_all == 1)
658 		sctp->sctp_bound_to_all = 0;
659 	ASSERT(sctp->sctp_nsaddrs == 0);
660 }
661 
662 /*
663  * Add/Delete the given ILL from the SCTP ILL list. Called with no locks
664  * held.
665  */
666 void
667 sctp_update_ill(ill_t *ill, int op)
668 {
669 	int		i;
670 	sctp_ill_t	*sctp_ill = NULL;
671 	uint_t		index;
672 	netstack_t	*ns = ill->ill_ipst->ips_netstack;
673 	sctp_stack_t	*sctps = ns->netstack_sctp;
674 
675 	rw_enter(&sctps->sctps_g_ills_lock, RW_WRITER);
676 
677 	index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
678 	sctp_ill = list_head(&sctps->sctps_g_ills[index].sctp_ill_list);
679 	for (i = 0; i < sctps->sctps_g_ills[index].ill_count; i++) {
680 		if ((sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill)) &&
681 		    (sctp_ill->sctp_ill_isv6 == ill->ill_isv6)) {
682 			break;
683 		}
684 		sctp_ill = list_next(&sctps->sctps_g_ills[index].sctp_ill_list,
685 		    sctp_ill);
686 	}
687 
688 	switch (op) {
689 	case SCTP_ILL_INSERT:
690 		if (sctp_ill != NULL) {
691 			/* Unmark it if it is condemned */
692 			if (sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED)
693 				sctp_ill->sctp_ill_state = 0;
694 			rw_exit(&sctps->sctps_g_ills_lock);
695 			return;
696 		}
697 		sctp_ill = kmem_zalloc(sizeof (sctp_ill_t), KM_NOSLEEP);
698 		/* Need to re-try? */
699 		if (sctp_ill == NULL) {
700 			cmn_err(CE_WARN, "sctp_update_ill: error adding "
701 			    "ILL %p to SCTP's ILL list", (void *)ill);
702 			rw_exit(&sctps->sctps_g_ills_lock);
703 			return;
704 		}
705 		sctp_ill->sctp_ill_name = kmem_zalloc(ill->ill_name_length,
706 		    KM_NOSLEEP);
707 		if (sctp_ill->sctp_ill_name == NULL) {
708 			cmn_err(CE_WARN, "sctp_update_ill: error adding "
709 			    "ILL %p to SCTP's ILL list", (void *)ill);
710 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
711 			rw_exit(&sctps->sctps_g_ills_lock);
712 			return;
713 		}
714 		bcopy(ill->ill_name, sctp_ill->sctp_ill_name,
715 		    ill->ill_name_length);
716 		sctp_ill->sctp_ill_name_length = ill->ill_name_length;
717 		sctp_ill->sctp_ill_index = SCTP_ILL_TO_PHYINDEX(ill);
718 		sctp_ill->sctp_ill_flags = ill->ill_phyint->phyint_flags;
719 		sctp_ill->sctp_ill_netstack = ns;	/* No netstack_hold */
720 		sctp_ill->sctp_ill_isv6 = ill->ill_isv6;
721 		list_insert_tail(&sctps->sctps_g_ills[index].sctp_ill_list,
722 		    (void *)sctp_ill);
723 		sctps->sctps_g_ills[index].ill_count++;
724 		sctps->sctps_ills_count++;
725 
726 		break;
727 
728 	case SCTP_ILL_REMOVE:
729 
730 		if (sctp_ill == NULL) {
731 			rw_exit(&sctps->sctps_g_ills_lock);
732 			return;
733 		}
734 		if (sctp_ill->sctp_ill_ipifcnt == 0) {
735 			list_remove(&sctps->sctps_g_ills[index].sctp_ill_list,
736 			    (void *)sctp_ill);
737 			sctps->sctps_g_ills[index].ill_count--;
738 			sctps->sctps_ills_count--;
739 			kmem_free(sctp_ill->sctp_ill_name,
740 			    ill->ill_name_length);
741 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
742 		} else {
743 			sctp_ill->sctp_ill_state = SCTP_ILLS_CONDEMNED;
744 		}
745 
746 		break;
747 	}
748 	rw_exit(&sctps->sctps_g_ills_lock);
749 }
750 
751 /*
752  * The ILL's index is being changed, just remove it from the old list,
753  * change the SCTP ILL's index and re-insert using the new index.
754  */
755 void
756 sctp_ill_reindex(ill_t *ill, uint_t orig_ill_index)
757 {
758 	sctp_ill_t	*sctp_ill = NULL;
759 	sctp_ill_t	*nxt_sill;
760 	uint_t		indx;
761 	uint_t		nindx;
762 	boolean_t	once = B_FALSE;
763 	netstack_t	*ns = ill->ill_ipst->ips_netstack;
764 	sctp_stack_t	*sctps = ns->netstack_sctp;
765 
766 	rw_enter(&sctps->sctps_g_ills_lock, RW_WRITER);
767 
768 	indx = SCTP_ILL_HASH_FN(orig_ill_index);
769 	nindx = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
770 	sctp_ill = list_head(&sctps->sctps_g_ills[indx].sctp_ill_list);
771 	while (sctp_ill != NULL) {
772 		nxt_sill = list_next(&sctps->sctps_g_ills[indx].sctp_ill_list,
773 		    sctp_ill);
774 		if (sctp_ill->sctp_ill_index == orig_ill_index) {
775 			sctp_ill->sctp_ill_index = SCTP_ILL_TO_PHYINDEX(ill);
776 			/*
777 			 * if the new index hashes to the same value, all's
778 			 * done.
779 			 */
780 			if (nindx != indx) {
781 				list_remove(
782 				    &sctps->sctps_g_ills[indx].sctp_ill_list,
783 				    (void *)sctp_ill);
784 				sctps->sctps_g_ills[indx].ill_count--;
785 				list_insert_tail(
786 				    &sctps->sctps_g_ills[nindx].sctp_ill_list,
787 				    (void *)sctp_ill);
788 				sctps->sctps_g_ills[nindx].ill_count++;
789 			}
790 			if (once)
791 				break;
792 			/* We might have one for v4 and for v6 */
793 			once = B_TRUE;
794 		}
795 		sctp_ill = nxt_sill;
796 	}
797 	rw_exit(&sctps->sctps_g_ills_lock);
798 }
799 
800 /* move ipif from f_ill to t_ill */
801 void
802 sctp_move_ipif(ipif_t *ipif, ill_t *f_ill, ill_t *t_ill)
803 {
804 	sctp_ill_t	*fsctp_ill = NULL;
805 	sctp_ill_t	*tsctp_ill = NULL;
806 	sctp_ipif_t	*sctp_ipif;
807 	uint_t		hindex;
808 	int		i;
809 	netstack_t	*ns = ipif->ipif_ill->ill_ipst->ips_netstack;
810 	sctp_stack_t	*sctps = ns->netstack_sctp;
811 
812 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
813 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
814 
815 	hindex = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(f_ill));
816 	fsctp_ill = list_head(&sctps->sctps_g_ills[hindex].sctp_ill_list);
817 	for (i = 0; i < sctps->sctps_g_ills[hindex].ill_count; i++) {
818 		if (fsctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(f_ill) &&
819 		    fsctp_ill->sctp_ill_isv6 == f_ill->ill_isv6) {
820 			break;
821 		}
822 		fsctp_ill = list_next(
823 		    &sctps->sctps_g_ills[hindex].sctp_ill_list, fsctp_ill);
824 	}
825 
826 	hindex = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(t_ill));
827 	tsctp_ill = list_head(&sctps->sctps_g_ills[hindex].sctp_ill_list);
828 	for (i = 0; i < sctps->sctps_g_ills[hindex].ill_count; i++) {
829 		if (tsctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(t_ill) &&
830 		    tsctp_ill->sctp_ill_isv6 == t_ill->ill_isv6) {
831 			break;
832 		}
833 		tsctp_ill = list_next(
834 		    &sctps->sctps_g_ills[hindex].sctp_ill_list, tsctp_ill);
835 	}
836 
837 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr,
838 	    ipif->ipif_ill->ill_isv6);
839 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
840 	for (i = 0; i < sctps->sctps_g_ipifs[hindex].ipif_count; i++) {
841 		if (sctp_ipif->sctp_ipif_id == ipif->ipif_seqid)
842 			break;
843 		sctp_ipif = list_next(
844 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list, sctp_ipif);
845 	}
846 	/* Should be an ASSERT? */
847 	if (fsctp_ill == NULL || tsctp_ill == NULL || sctp_ipif == NULL) {
848 		ip1dbg(("sctp_move_ipif: error moving ipif %p from %p to %p\n",
849 		    (void *)ipif, (void *)f_ill, (void *)t_ill));
850 		rw_exit(&sctps->sctps_g_ipifs_lock);
851 		rw_exit(&sctps->sctps_g_ills_lock);
852 		return;
853 	}
854 	rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
855 	ASSERT(sctp_ipif->sctp_ipif_ill == fsctp_ill);
856 	sctp_ipif->sctp_ipif_ill = tsctp_ill;
857 	rw_exit(&sctp_ipif->sctp_ipif_lock);
858 	(void) atomic_add_32_nv(&fsctp_ill->sctp_ill_ipifcnt, -1);
859 	atomic_add_32(&tsctp_ill->sctp_ill_ipifcnt, 1);
860 	rw_exit(&sctps->sctps_g_ipifs_lock);
861 	rw_exit(&sctps->sctps_g_ills_lock);
862 }
863 
864 /*
865  * Walk the list of SCTPs and find each that has oipif in it's saddr list, and
866  * if so replace it with nipif.
867  */
868 void
869 sctp_update_saddrs(sctp_ipif_t *oipif, sctp_ipif_t *nipif, int idx,
870     sctp_stack_t *sctps)
871 {
872 	sctp_t			*sctp;
873 	sctp_t			*sctp_prev = NULL;
874 	sctp_saddr_ipif_t	*sobj;
875 	int			count;
876 
877 	sctp = sctps->sctps_gsctp;
878 	mutex_enter(&sctps->sctps_g_lock);
879 	while (sctp != NULL && oipif->sctp_ipif_refcnt > 0) {
880 		mutex_enter(&sctp->sctp_reflock);
881 		if (sctp->sctp_condemned ||
882 		    sctp->sctp_saddrs[idx].ipif_count <= 0) {
883 			mutex_exit(&sctp->sctp_reflock);
884 			sctp = list_next(&sctps->sctps_g_list, sctp);
885 			continue;
886 		}
887 		sctp->sctp_refcnt++;
888 		mutex_exit(&sctp->sctp_reflock);
889 		mutex_exit(&sctps->sctps_g_lock);
890 		if (sctp_prev != NULL)
891 			SCTP_REFRELE(sctp_prev);
892 
893 		RUN_SCTP(sctp);
894 		sobj = list_head(&sctp->sctp_saddrs[idx].sctp_ipif_list);
895 		for (count = 0; count <
896 		    sctp->sctp_saddrs[idx].ipif_count; count++) {
897 			if (sobj->saddr_ipifp == oipif) {
898 				SCTP_IPIF_REFHOLD(nipif);
899 				sobj->saddr_ipifp = nipif;
900 				ASSERT(oipif->sctp_ipif_refcnt > 0);
901 				/* We have the writer lock */
902 				oipif->sctp_ipif_refcnt--;
903 				/*
904 				 * Can't have more than one referring
905 				 * to the same sctp_ipif.
906 				 */
907 				break;
908 			}
909 			sobj = list_next(&sctp->sctp_saddrs[idx].sctp_ipif_list,
910 			    sobj);
911 		}
912 		WAKE_SCTP(sctp);
913 		sctp_prev = sctp;
914 		mutex_enter(&sctps->sctps_g_lock);
915 		sctp = list_next(&sctps->sctps_g_list, sctp);
916 	}
917 	mutex_exit(&sctps->sctps_g_lock);
918 	if (sctp_prev != NULL)
919 		SCTP_REFRELE(sctp_prev);
920 }
921 
922 /*
923  * Given an ipif, walk the hash list in the global ipif table and for
924  * any other SCTP ipif with the same address and non-zero reference, walk
925  * the SCTP list and update the saddr list, if required, to point to the
926  * new SCTP ipif. If it is a loopback interface, then there could be
927  * multiple interfaces with 127.0.0.1 if there are zones configured, so
928  * check the zoneid in addition to the address.
929  */
930 void
931 sctp_chk_and_updt_saddr(int hindex, sctp_ipif_t *ipif, sctp_stack_t *sctps)
932 {
933 	int		cnt;
934 	sctp_ipif_t	*sipif;
935 
936 	ASSERT(sctps->sctps_g_ipifs[hindex].ipif_count > 0);
937 	ASSERT(ipif->sctp_ipif_state == SCTP_IPIFS_UP);
938 
939 	sipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
940 	for (cnt = 0; cnt < sctps->sctps_g_ipifs[hindex].ipif_count; cnt++) {
941 		rw_enter(&sipif->sctp_ipif_lock, RW_WRITER);
942 		if (sipif->sctp_ipif_id != ipif->sctp_ipif_id &&
943 		    IN6_ARE_ADDR_EQUAL(&sipif->sctp_ipif_saddr,
944 		    &ipif->sctp_ipif_saddr) && sipif->sctp_ipif_refcnt > 0 &&
945 		    (!SCTP_IS_IPIF_LOOPBACK(ipif) || ipif->sctp_ipif_zoneid ==
946 		    sipif->sctp_ipif_zoneid)) {
947 			/*
948 			 * There can only be one address up at any time
949 			 * and we are here because ipif has been brought
950 			 * up.
951 			 */
952 			ASSERT(sipif->sctp_ipif_state != SCTP_IPIFS_UP);
953 			/*
954 			 * Someone has a reference to this we need to update to
955 			 * point to the new sipif.
956 			 */
957 			sctp_update_saddrs(sipif, ipif, hindex, sctps);
958 		}
959 		rw_exit(&sipif->sctp_ipif_lock);
960 		sipif = list_next(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
961 		    sipif);
962 	}
963 }
964 
965 /*
966  * Insert a new SCTP ipif using 'ipif'. v6addr is the address that existed
967  * prior to the current address in 'ipif'. Only when an existing address
968  * is changed on an IPIF, will v6addr be specified. If the IPIF already
969  * exists in the global SCTP ipif table, then we either removed it, if
970  * it doesn't have any existing reference, or mark it condemned otherwise.
971  * If an address is being brought up (IPIF_UP), then we need to scan
972  * the SCTP list to check if there is any SCTP that points to the *same*
973  * address on a different SCTP ipif and update in that case.
974  */
975 void
976 sctp_update_ipif_addr(ipif_t *ipif, in6_addr_t v6addr)
977 {
978 	ill_t		*ill = ipif->ipif_ill;
979 	int		i;
980 	sctp_ill_t	*sctp_ill;
981 	sctp_ill_t	*osctp_ill;
982 	sctp_ipif_t	*sctp_ipif = NULL;
983 	sctp_ipif_t	*osctp_ipif = NULL;
984 	uint_t		ill_index;
985 	int		hindex;
986 	sctp_stack_t	*sctps;
987 
988 	sctps = ipif->ipif_ill->ill_ipst->ips_netstack->netstack_sctp;
989 
990 	/* Index for new address */
991 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr, ill->ill_isv6);
992 
993 	/*
994 	 * The address on this IPIF is changing, we need to look for
995 	 * this old address and mark it condemned, before creating
996 	 * one for the new address.
997 	 */
998 	osctp_ipif = sctp_lookup_ipif_addr(&v6addr, B_FALSE,
999 	    ipif->ipif_zoneid, B_TRUE, SCTP_ILL_TO_PHYINDEX(ill),
1000 	    ipif->ipif_seqid, B_FALSE, sctps);
1001 
1002 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
1003 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
1004 
1005 	ill_index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
1006 	sctp_ill = list_head(&sctps->sctps_g_ills[ill_index].sctp_ill_list);
1007 	for (i = 0; i < sctps->sctps_g_ills[ill_index].ill_count; i++) {
1008 		if (sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill) &&
1009 		    sctp_ill->sctp_ill_isv6 == ill->ill_isv6) {
1010 			break;
1011 		}
1012 		sctp_ill = list_next(
1013 		    &sctps->sctps_g_ills[ill_index].sctp_ill_list, sctp_ill);
1014 	}
1015 
1016 	if (sctp_ill == NULL) {
1017 		ip1dbg(("sctp_update_ipif_addr: ill not found ..\n"));
1018 		rw_exit(&sctps->sctps_g_ipifs_lock);
1019 		rw_exit(&sctps->sctps_g_ills_lock);
1020 		return;
1021 	}
1022 
1023 	if (osctp_ipif != NULL) {
1024 
1025 		/* The address is the same? */
1026 		if (IN6_ARE_ADDR_EQUAL(&ipif->ipif_v6lcl_addr, &v6addr)) {
1027 			boolean_t	chk_n_updt = B_FALSE;
1028 
1029 			rw_downgrade(&sctps->sctps_g_ipifs_lock);
1030 			rw_enter(&osctp_ipif->sctp_ipif_lock, RW_WRITER);
1031 			if (ipif->ipif_flags & IPIF_UP &&
1032 			    osctp_ipif->sctp_ipif_state != SCTP_IPIFS_UP) {
1033 				osctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1034 				chk_n_updt = B_TRUE;
1035 			} else {
1036 				osctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1037 			}
1038 			osctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1039 			rw_exit(&osctp_ipif->sctp_ipif_lock);
1040 			if (chk_n_updt) {
1041 				sctp_chk_and_updt_saddr(hindex, osctp_ipif,
1042 				    sctps);
1043 			}
1044 			rw_exit(&sctps->sctps_g_ipifs_lock);
1045 			rw_exit(&sctps->sctps_g_ills_lock);
1046 			return;
1047 		}
1048 		/*
1049 		 * We are effectively removing this address from the ILL.
1050 		 */
1051 		if (osctp_ipif->sctp_ipif_refcnt != 0) {
1052 			osctp_ipif->sctp_ipif_state = SCTP_IPIFS_CONDEMNED;
1053 		} else {
1054 			list_t		*ipif_list;
1055 			int		ohindex;
1056 
1057 			osctp_ill = osctp_ipif->sctp_ipif_ill;
1058 			/* hash index for the old one */
1059 			ohindex = SCTP_IPIF_ADDR_HASH(
1060 			    osctp_ipif->sctp_ipif_saddr,
1061 			    osctp_ipif->sctp_ipif_isv6);
1062 
1063 			ipif_list =
1064 			    &sctps->sctps_g_ipifs[ohindex].sctp_ipif_list;
1065 
1066 			list_remove(ipif_list, (void *)osctp_ipif);
1067 			sctps->sctps_g_ipifs[ohindex].ipif_count--;
1068 			sctps->sctps_g_ipifs_count--;
1069 			rw_destroy(&osctp_ipif->sctp_ipif_lock);
1070 			kmem_free(osctp_ipif, sizeof (sctp_ipif_t));
1071 			(void) atomic_add_32_nv(&osctp_ill->sctp_ill_ipifcnt,
1072 			    -1);
1073 		}
1074 	}
1075 
1076 	sctp_ipif = kmem_zalloc(sizeof (sctp_ipif_t), KM_NOSLEEP);
1077 	/* Try again? */
1078 	if (sctp_ipif == NULL) {
1079 		cmn_err(CE_WARN, "sctp_update_ipif_addr: error adding "
1080 		    "IPIF %p to SCTP's IPIF list", (void *)ipif);
1081 		rw_exit(&sctps->sctps_g_ipifs_lock);
1082 		rw_exit(&sctps->sctps_g_ills_lock);
1083 		return;
1084 	}
1085 	sctps->sctps_g_ipifs_count++;
1086 	rw_init(&sctp_ipif->sctp_ipif_lock, NULL, RW_DEFAULT, NULL);
1087 	sctp_ipif->sctp_ipif_saddr = ipif->ipif_v6lcl_addr;
1088 	sctp_ipif->sctp_ipif_ill = sctp_ill;
1089 	sctp_ipif->sctp_ipif_isv6 = ill->ill_isv6;
1090 	sctp_ipif->sctp_ipif_zoneid = ipif->ipif_zoneid;
1091 	sctp_ipif->sctp_ipif_id = ipif->ipif_seqid;
1092 	if (ipif->ipif_flags & IPIF_UP)
1093 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1094 	else
1095 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1096 	sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1097 	/*
1098 	 * We add it to the head so that it is quicker to find good/recent
1099 	 * additions.
1100 	 */
1101 	list_insert_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
1102 	    (void *)sctp_ipif);
1103 	sctps->sctps_g_ipifs[hindex].ipif_count++;
1104 	atomic_add_32(&sctp_ill->sctp_ill_ipifcnt, 1);
1105 	if (sctp_ipif->sctp_ipif_state == SCTP_IPIFS_UP)
1106 		sctp_chk_and_updt_saddr(hindex, sctp_ipif, sctps);
1107 	rw_exit(&sctps->sctps_g_ipifs_lock);
1108 	rw_exit(&sctps->sctps_g_ills_lock);
1109 }
1110 
1111 /* Insert, Remove,  Mark up or Mark down the ipif */
1112 void
1113 sctp_update_ipif(ipif_t *ipif, int op)
1114 {
1115 	ill_t		*ill = ipif->ipif_ill;
1116 	int		i;
1117 	sctp_ill_t	*sctp_ill;
1118 	sctp_ipif_t	*sctp_ipif;
1119 	uint_t		ill_index;
1120 	uint_t		hindex;
1121 	netstack_t	*ns = ipif->ipif_ill->ill_ipst->ips_netstack;
1122 	sctp_stack_t	*sctps = ns->netstack_sctp;
1123 
1124 	ip2dbg(("sctp_update_ipif: %s %d\n", ill->ill_name, ipif->ipif_seqid));
1125 
1126 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
1127 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
1128 
1129 	ill_index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
1130 	sctp_ill = list_head(&sctps->sctps_g_ills[ill_index].sctp_ill_list);
1131 	for (i = 0; i < sctps->sctps_g_ills[ill_index].ill_count; i++) {
1132 		if (sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill) &&
1133 		    sctp_ill->sctp_ill_isv6 == ill->ill_isv6) {
1134 			break;
1135 		}
1136 		sctp_ill = list_next(
1137 		    &sctps->sctps_g_ills[ill_index].sctp_ill_list, sctp_ill);
1138 	}
1139 	if (sctp_ill == NULL) {
1140 		rw_exit(&sctps->sctps_g_ipifs_lock);
1141 		rw_exit(&sctps->sctps_g_ills_lock);
1142 		return;
1143 	}
1144 
1145 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr,
1146 	    ipif->ipif_ill->ill_isv6);
1147 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
1148 	for (i = 0; i < sctps->sctps_g_ipifs[hindex].ipif_count; i++) {
1149 		if (sctp_ipif->sctp_ipif_id == ipif->ipif_seqid) {
1150 			ASSERT(IN6_ARE_ADDR_EQUAL(&sctp_ipif->sctp_ipif_saddr,
1151 			    &ipif->ipif_v6lcl_addr));
1152 			break;
1153 		}
1154 		sctp_ipif = list_next(
1155 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
1156 		    sctp_ipif);
1157 	}
1158 	if (sctp_ipif == NULL) {
1159 		ip1dbg(("sctp_update_ipif: null sctp_ipif for %d\n", op));
1160 		rw_exit(&sctps->sctps_g_ipifs_lock);
1161 		rw_exit(&sctps->sctps_g_ills_lock);
1162 		return;
1163 	}
1164 	ASSERT(sctp_ill == sctp_ipif->sctp_ipif_ill);
1165 	switch (op) {
1166 	case SCTP_IPIF_REMOVE:
1167 	{
1168 		list_t		*ipif_list;
1169 		list_t		*ill_list;
1170 
1171 		ill_list = &sctps->sctps_g_ills[ill_index].sctp_ill_list;
1172 		ipif_list = &sctps->sctps_g_ipifs[hindex].sctp_ipif_list;
1173 		if (sctp_ipif->sctp_ipif_refcnt != 0) {
1174 			sctp_ipif->sctp_ipif_state = SCTP_IPIFS_CONDEMNED;
1175 			rw_exit(&sctps->sctps_g_ipifs_lock);
1176 			rw_exit(&sctps->sctps_g_ills_lock);
1177 			return;
1178 		}
1179 		list_remove(ipif_list, (void *)sctp_ipif);
1180 		sctps->sctps_g_ipifs[hindex].ipif_count--;
1181 		sctps->sctps_g_ipifs_count--;
1182 		rw_destroy(&sctp_ipif->sctp_ipif_lock);
1183 		kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
1184 		(void) atomic_add_32_nv(&sctp_ill->sctp_ill_ipifcnt, -1);
1185 		if (rw_tryupgrade(&sctps->sctps_g_ills_lock) != 0) {
1186 			rw_downgrade(&sctps->sctps_g_ipifs_lock);
1187 			if (sctp_ill->sctp_ill_ipifcnt == 0 &&
1188 			    sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED) {
1189 				list_remove(ill_list, (void *)sctp_ill);
1190 				sctps->sctps_ills_count--;
1191 				sctps->sctps_g_ills[ill_index].ill_count--;
1192 				kmem_free(sctp_ill->sctp_ill_name,
1193 				    sctp_ill->sctp_ill_name_length);
1194 				kmem_free(sctp_ill, sizeof (sctp_ill_t));
1195 			}
1196 		}
1197 		break;
1198 	}
1199 
1200 	case SCTP_IPIF_UP:
1201 
1202 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1203 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1204 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1205 		sctp_ipif->sctp_ipif_mtu = ipif->ipif_mtu;
1206 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1207 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1208 		sctp_chk_and_updt_saddr(hindex, sctp_ipif,
1209 		    ipif->ipif_ill->ill_ipst->ips_netstack->netstack_sctp);
1210 
1211 		break;
1212 
1213 	case SCTP_IPIF_UPDATE:
1214 
1215 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1216 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1217 		sctp_ipif->sctp_ipif_mtu = ipif->ipif_mtu;
1218 		sctp_ipif->sctp_ipif_zoneid = ipif->ipif_zoneid;
1219 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1220 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1221 
1222 		break;
1223 
1224 	case SCTP_IPIF_DOWN:
1225 
1226 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1227 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1228 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1229 		sctp_ipif->sctp_ipif_mtu = ipif->ipif_mtu;
1230 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1231 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1232 
1233 		break;
1234 	}
1235 	rw_exit(&sctps->sctps_g_ipifs_lock);
1236 	rw_exit(&sctps->sctps_g_ills_lock);
1237 }
1238 
1239 /*
1240  * SCTP source address list manipulaton, locking not used (except for
1241  * sctp locking by the caller.
1242  */
1243 
1244 /* Remove a specific saddr from the list */
1245 void
1246 sctp_del_saddr(sctp_t *sctp, sctp_saddr_ipif_t *sp)
1247 {
1248 	if (sctp->sctp_conn_tfp != NULL)
1249 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
1250 
1251 	if (sctp->sctp_listen_tfp != NULL)
1252 		mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
1253 
1254 	sctp_ipif_hash_remove(sctp, sp->saddr_ipifp);
1255 
1256 	if (sctp->sctp_bound_to_all == 1)
1257 		sctp->sctp_bound_to_all = 0;
1258 
1259 	if (sctp->sctp_conn_tfp != NULL)
1260 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
1261 
1262 	if (sctp->sctp_listen_tfp != NULL)
1263 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
1264 }
1265 
1266 /*
1267  * Delete source address from the existing list. No error checking done here
1268  * Called with no locks held.
1269  */
1270 void
1271 sctp_del_saddr_list(sctp_t *sctp, const void *addrs, int addcnt,
1272     boolean_t fanout_locked)
1273 {
1274 	struct sockaddr_in	*sin4;
1275 	struct sockaddr_in6	*sin6;
1276 	int			cnt;
1277 	in6_addr_t		addr;
1278 	sctp_ipif_t		*sctp_ipif;
1279 	int			ifindex = 0;
1280 
1281 	ASSERT(sctp->sctp_nsaddrs >= addcnt);
1282 
1283 	if (!fanout_locked) {
1284 		if (sctp->sctp_conn_tfp != NULL)
1285 			mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
1286 		if (sctp->sctp_listen_tfp != NULL)
1287 			mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
1288 	}
1289 
1290 	for (cnt = 0; cnt < addcnt; cnt++) {
1291 		switch (sctp->sctp_family) {
1292 		case AF_INET:
1293 			sin4 = (struct sockaddr_in *)addrs + cnt;
1294 			IN6_INADDR_TO_V4MAPPED(&sin4->sin_addr, &addr);
1295 			break;
1296 
1297 		case AF_INET6:
1298 			sin6 = (struct sockaddr_in6 *)addrs + cnt;
1299 			addr = sin6->sin6_addr;
1300 			ifindex = sin6->sin6_scope_id;
1301 			break;
1302 		}
1303 		sctp_ipif = sctp_lookup_ipif_addr(&addr, B_FALSE,
1304 		    sctp->sctp_zoneid, !sctp->sctp_connp->conn_allzones,
1305 		    ifindex, 0, B_TRUE, sctp->sctp_sctps);
1306 		ASSERT(sctp_ipif != NULL);
1307 		sctp_ipif_hash_remove(sctp, sctp_ipif);
1308 	}
1309 	if (sctp->sctp_bound_to_all == 1)
1310 		sctp->sctp_bound_to_all = 0;
1311 
1312 	if (!fanout_locked) {
1313 		if (sctp->sctp_conn_tfp != NULL)
1314 			mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
1315 		if (sctp->sctp_listen_tfp != NULL)
1316 			mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
1317 	}
1318 }
1319 
1320 /*
1321  * Given an address get the corresponding entry from the list
1322  * Called with no locks held.
1323  */
1324 sctp_saddr_ipif_t *
1325 sctp_saddr_lookup(sctp_t *sctp, in6_addr_t *addr, uint_t ifindex)
1326 {
1327 	int			cnt;
1328 	sctp_saddr_ipif_t	*ipif_obj;
1329 	int			hindex;
1330 	sctp_ipif_t		*sctp_ipif;
1331 
1332 	hindex = SCTP_IPIF_ADDR_HASH(*addr, !IN6_IS_ADDR_V4MAPPED(addr));
1333 	if (sctp->sctp_saddrs[hindex].ipif_count == 0)
1334 		return (NULL);
1335 
1336 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
1337 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
1338 		sctp_ipif = ipif_obj->saddr_ipifp;
1339 		/*
1340 		 * Zone check shouldn't be needed.
1341 		 */
1342 		if (IN6_ARE_ADDR_EQUAL(addr, &sctp_ipif->sctp_ipif_saddr) &&
1343 		    (ifindex == 0 ||
1344 		    ifindex == sctp_ipif->sctp_ipif_ill->sctp_ill_index) &&
1345 		    SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state)) {
1346 			return (ipif_obj);
1347 		}
1348 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
1349 		    ipif_obj);
1350 	}
1351 	return (NULL);
1352 }
1353 
1354 /* Given an address, add it to the source address list */
1355 int
1356 sctp_saddr_add_addr(sctp_t *sctp, in6_addr_t *addr, uint_t ifindex)
1357 {
1358 	sctp_ipif_t		*sctp_ipif;
1359 
1360 	sctp_ipif = sctp_lookup_ipif_addr(addr, B_TRUE, sctp->sctp_zoneid,
1361 	    !sctp->sctp_connp->conn_allzones, ifindex, 0, B_TRUE,
1362 	    sctp->sctp_sctps);
1363 	if (sctp_ipif == NULL)
1364 		return (EINVAL);
1365 
1366 	if (sctp_ipif_hash_insert(sctp, sctp_ipif, KM_NOSLEEP, B_FALSE,
1367 	    B_FALSE) != 0) {
1368 		SCTP_IPIF_REFRELE(sctp_ipif);
1369 		return (EINVAL);
1370 	}
1371 	return (0);
1372 }
1373 
1374 /*
1375  * Remove or mark as dontsrc addresses that are currently not part of the
1376  * association. One would delete addresses when processing an INIT and
1377  * mark as dontsrc when processing an INIT-ACK.
1378  */
1379 void
1380 sctp_check_saddr(sctp_t *sctp, int supp_af, boolean_t delete,
1381     in6_addr_t *no_del_addr)
1382 {
1383 	int			i;
1384 	int			l;
1385 	sctp_saddr_ipif_t	*obj;
1386 	int			scanned = 0;
1387 	int			naddr;
1388 	int			nsaddr;
1389 
1390 	ASSERT(!sctp->sctp_loopback && !sctp->sctp_linklocal && supp_af != 0);
1391 
1392 	/*
1393 	 * Irregardless of the supported address in the INIT, v4
1394 	 * must be supported.
1395 	 */
1396 	if (sctp->sctp_family == AF_INET)
1397 		supp_af = PARM_SUPP_V4;
1398 
1399 	nsaddr = sctp->sctp_nsaddrs;
1400 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1401 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1402 			continue;
1403 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1404 		naddr = sctp->sctp_saddrs[i].ipif_count;
1405 		for (l = 0; l < naddr; l++) {
1406 			sctp_ipif_t	*ipif;
1407 
1408 			ipif = obj->saddr_ipifp;
1409 			scanned++;
1410 
1411 			if (IN6_ARE_ADDR_EQUAL(&ipif->sctp_ipif_saddr,
1412 			    no_del_addr)) {
1413 				goto next_obj;
1414 			}
1415 
1416 			/*
1417 			 * Delete/mark dontsrc loopback/linklocal addresses and
1418 			 * unsupported address.
1419 			 * On a clustered node, we trust the clustering module
1420 			 * to do the right thing w.r.t loopback addresses, so
1421 			 * we ignore loopback addresses in this check.
1422 			 */
1423 			if ((SCTP_IS_IPIF_LOOPBACK(ipif) &&
1424 			    cl_sctp_check_addrs == NULL) ||
1425 			    SCTP_IS_IPIF_LINKLOCAL(ipif) ||
1426 			    SCTP_UNSUPP_AF(ipif, supp_af)) {
1427 				if (!delete) {
1428 					obj->saddr_ipif_unconfirmed = 1;
1429 					goto next_obj;
1430 				}
1431 				if (sctp->sctp_bound_to_all == 1)
1432 					sctp->sctp_bound_to_all = 0;
1433 				if (scanned < nsaddr) {
1434 					obj = list_next(&sctp->sctp_saddrs[i].
1435 					    sctp_ipif_list, obj);
1436 					sctp_ipif_hash_remove(sctp, ipif);
1437 					continue;
1438 				}
1439 				sctp_ipif_hash_remove(sctp, ipif);
1440 			}
1441 	next_obj:
1442 			if (scanned >= nsaddr)
1443 				return;
1444 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1445 			    obj);
1446 		}
1447 	}
1448 }
1449 
1450 
1451 /* Get the first valid address from the list. Called with no locks held */
1452 in6_addr_t
1453 sctp_get_valid_addr(sctp_t *sctp, boolean_t isv6, boolean_t *addr_set)
1454 {
1455 	int			i;
1456 	int			l;
1457 	sctp_saddr_ipif_t	*obj;
1458 	int			scanned = 0;
1459 	in6_addr_t		addr;
1460 
1461 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1462 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1463 			continue;
1464 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1465 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
1466 			sctp_ipif_t	*ipif;
1467 
1468 			ipif = obj->saddr_ipifp;
1469 			if (!SCTP_DONT_SRC(obj) &&
1470 			    ipif->sctp_ipif_isv6 == isv6 &&
1471 			    ipif->sctp_ipif_state == SCTP_IPIFS_UP) {
1472 				*addr_set = B_TRUE;
1473 				return (ipif->sctp_ipif_saddr);
1474 			}
1475 			scanned++;
1476 			if (scanned >= sctp->sctp_nsaddrs)
1477 				goto got_none;
1478 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1479 			    obj);
1480 		}
1481 	}
1482 got_none:
1483 	/* Need to double check this */
1484 	if (isv6 == B_TRUE)
1485 		addr =  ipv6_all_zeros;
1486 	else
1487 		IN6_IPADDR_TO_V4MAPPED(0, &addr);
1488 	*addr_set = B_FALSE;
1489 	return (addr);
1490 }
1491 
1492 /*
1493  * Return the list of local addresses of an association.  The parameter
1494  * myaddrs is supposed to be either (struct sockaddr_in *) or (struct
1495  * sockaddr_in6 *) depending on the address family.
1496  */
1497 int
1498 sctp_getmyaddrs(void *conn, void *myaddrs, int *addrcnt)
1499 {
1500 	int			i;
1501 	int			l;
1502 	sctp_saddr_ipif_t	*obj;
1503 	sctp_t			*sctp = (sctp_t *)conn;
1504 	int			family = sctp->sctp_family;
1505 	int			max = *addrcnt;
1506 	size_t			added = 0;
1507 	struct sockaddr_in6	*sin6;
1508 	struct sockaddr_in	*sin4;
1509 	int			scanned = 0;
1510 	boolean_t		skip_lback = B_FALSE;
1511 
1512 	if (sctp->sctp_nsaddrs == 0)
1513 		return (EINVAL);
1514 
1515 	/*
1516 	 * Skip loopback addresses for non-loopback assoc., ignore
1517 	 * this on a clustered node.
1518 	 */
1519 	if (sctp->sctp_state >= SCTPS_ESTABLISHED && !sctp->sctp_loopback &&
1520 	    (cl_sctp_check_addrs == NULL)) {
1521 		skip_lback = B_TRUE;
1522 	}
1523 
1524 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1525 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1526 			continue;
1527 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1528 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
1529 			sctp_ipif_t	*ipif = obj->saddr_ipifp;
1530 			in6_addr_t	addr = ipif->sctp_ipif_saddr;
1531 
1532 			scanned++;
1533 			if ((ipif->sctp_ipif_state == SCTP_IPIFS_CONDEMNED) ||
1534 			    SCTP_DONT_SRC(obj) ||
1535 			    (SCTP_IS_IPIF_LOOPBACK(ipif) && skip_lback)) {
1536 				if (scanned >= sctp->sctp_nsaddrs)
1537 					goto done;
1538 				obj = list_next(&sctp->sctp_saddrs[i].
1539 				    sctp_ipif_list, obj);
1540 				continue;
1541 			}
1542 			switch (family) {
1543 			case AF_INET:
1544 				sin4 = (struct sockaddr_in *)myaddrs + added;
1545 				sin4->sin_family = AF_INET;
1546 				sin4->sin_port = sctp->sctp_lport;
1547 				IN6_V4MAPPED_TO_INADDR(&addr, &sin4->sin_addr);
1548 				break;
1549 
1550 			case AF_INET6:
1551 				sin6 = (struct sockaddr_in6 *)myaddrs + added;
1552 				sin6->sin6_family = AF_INET6;
1553 				sin6->sin6_port = sctp->sctp_lport;
1554 				sin6->sin6_addr = addr;
1555 				break;
1556 			}
1557 			added++;
1558 			if (added >= max || scanned >= sctp->sctp_nsaddrs)
1559 				goto done;
1560 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1561 			    obj);
1562 		}
1563 	}
1564 done:
1565 	*addrcnt = added;
1566 	return (0);
1567 }
1568 
1569 /*
1570  * Given the supported address family, walk through the source address list
1571  * and return the total length of the available addresses. If 'p' is not
1572  * null, construct the parameter list for the addresses in 'p'.
1573  * 'modify' will only be set when we want the source address list to
1574  * be modified. The source address list will be modified only when
1575  * generating an INIT chunk. For generating an INIT-ACK 'modify' will
1576  * be false since the 'sctp' will be that of the listener.
1577  */
1578 size_t
1579 sctp_saddr_info(sctp_t *sctp, int supp_af, uchar_t *p, boolean_t modify)
1580 {
1581 	int			i;
1582 	int			l;
1583 	sctp_saddr_ipif_t	*obj;
1584 	size_t			paramlen = 0;
1585 	sctp_parm_hdr_t		*hdr;
1586 	int			scanned = 0;
1587 	int			naddr;
1588 	int			nsaddr;
1589 	boolean_t		del_ll = B_FALSE;
1590 	boolean_t		del_lb = B_FALSE;
1591 
1592 
1593 	/*
1594 	 * On a clustered node don't bother changing anything
1595 	 * on the loopback interface.
1596 	 */
1597 	if (modify && !sctp->sctp_loopback && (cl_sctp_check_addrs == NULL))
1598 		del_lb = B_TRUE;
1599 
1600 	if (modify && !sctp->sctp_linklocal)
1601 		del_ll = B_TRUE;
1602 
1603 	nsaddr = sctp->sctp_nsaddrs;
1604 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1605 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1606 			continue;
1607 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1608 		naddr = sctp->sctp_saddrs[i].ipif_count;
1609 		for (l = 0; l < naddr; l++) {
1610 			in6_addr_t	addr;
1611 			sctp_ipif_t	*ipif;
1612 			boolean_t	ipif_lb;
1613 			boolean_t	ipif_ll;
1614 			boolean_t	unsupp_af;
1615 
1616 			ipif = obj->saddr_ipifp;
1617 			scanned++;
1618 
1619 			ipif_lb = SCTP_IS_IPIF_LOOPBACK(ipif);
1620 			ipif_ll = SCTP_IS_IPIF_LINKLOCAL(ipif);
1621 			unsupp_af = SCTP_UNSUPP_AF(ipif, supp_af);
1622 			/*
1623 			 * We need to either delete or skip loopback/linklocal
1624 			 * or unsupported addresses, if required.
1625 			 */
1626 			if ((ipif_ll && del_ll) || (ipif_lb && del_lb) ||
1627 			    (unsupp_af && modify)) {
1628 				if (sctp->sctp_bound_to_all == 1)
1629 					sctp->sctp_bound_to_all = 0;
1630 				if (scanned < nsaddr) {
1631 					obj = list_next(&sctp->sctp_saddrs[i].
1632 					    sctp_ipif_list, obj);
1633 					sctp_ipif_hash_remove(sctp, ipif);
1634 					continue;
1635 				}
1636 				sctp_ipif_hash_remove(sctp, ipif);
1637 				goto next_addr;
1638 			} else if (ipif_ll || unsupp_af ||
1639 			    (ipif_lb && (cl_sctp_check_addrs == NULL))) {
1640 				goto next_addr;
1641 			}
1642 
1643 			if (!SCTP_IPIF_USABLE(ipif->sctp_ipif_state))
1644 				goto next_addr;
1645 			if (p != NULL)
1646 				hdr = (sctp_parm_hdr_t *)(p + paramlen);
1647 			addr = ipif->sctp_ipif_saddr;
1648 			if (!ipif->sctp_ipif_isv6) {
1649 				struct in_addr	*v4;
1650 
1651 				if (p != NULL) {
1652 					hdr->sph_type = htons(PARM_ADDR4);
1653 					hdr->sph_len = htons(PARM_ADDR4_LEN);
1654 					v4 = (struct in_addr *)(hdr + 1);
1655 					IN6_V4MAPPED_TO_INADDR(&addr, v4);
1656 				}
1657 				paramlen += PARM_ADDR4_LEN;
1658 			} else {
1659 				if (p != NULL) {
1660 					hdr->sph_type = htons(PARM_ADDR6);
1661 					hdr->sph_len = htons(PARM_ADDR6_LEN);
1662 					bcopy(&addr, hdr + 1, sizeof (addr));
1663 				}
1664 				paramlen += PARM_ADDR6_LEN;
1665 			}
1666 next_addr:
1667 			if (scanned >= nsaddr)
1668 				return (paramlen);
1669 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1670 			    obj);
1671 		}
1672 	}
1673 	return (paramlen);
1674 }
1675 
1676 /*
1677  * This is used on a clustered node to obtain a list of addresses, the list
1678  * consists of sockaddr_in structs for v4 and sockaddr_in6 for v6. The list
1679  * is then passed onto the clustering module which sends back the correct
1680  * list based on the port info. Regardless of the input, i.e INADDR_ANY
1681  * or specific address(es), we create the list since it could be modified by
1682  * the clustering module. When given a list of addresses, we simply
1683  * create the list of sockaddr_in or sockaddr_in6 structs using those
1684  * addresses. If there is an INADDR_ANY in the input list, or if the
1685  * input is INADDR_ANY, we create a list of sockaddr_in or sockaddr_in6
1686  * structs consisting all the addresses in the global interface list
1687  * except those that are hosted on the loopback interface. We create
1688  * a list of sockaddr_in[6] structs just so that it can be directly input
1689  * to sctp_valid_addr_list() once the clustering module has processed it.
1690  */
1691 int
1692 sctp_get_addrlist(sctp_t *sctp, const void *addrs, uint32_t *addrcnt,
1693     uchar_t **addrlist, int *uspec, size_t *size)
1694 {
1695 	int			cnt;
1696 	int			icnt;
1697 	sctp_ipif_t		*sctp_ipif;
1698 	struct sockaddr_in	*s4;
1699 	struct sockaddr_in6	*s6;
1700 	uchar_t			*p;
1701 	int			err = 0;
1702 	sctp_stack_t		*sctps = sctp->sctp_sctps;
1703 
1704 	*addrlist = NULL;
1705 	*size = 0;
1706 
1707 	/*
1708 	 * Create a list of sockaddr_in[6] structs using the input list.
1709 	 */
1710 	if (sctp->sctp_family == AF_INET) {
1711 		*size = sizeof (struct sockaddr_in) * *addrcnt;
1712 		*addrlist = kmem_zalloc(*size,  KM_SLEEP);
1713 		p = *addrlist;
1714 		for (cnt = 0; cnt < *addrcnt; cnt++) {
1715 			s4 = (struct sockaddr_in *)addrs + cnt;
1716 			/*
1717 			 * We need to create a list of all the available
1718 			 * addresses if there is an INADDR_ANY. However,
1719 			 * if we are beyond LISTEN, then this is invalid
1720 			 * (see sctp_valid_addr_list(). So, we just fail
1721 			 * it here rather than wait till it fails in
1722 			 * sctp_valid_addr_list().
1723 			 */
1724 			if (s4->sin_addr.s_addr == INADDR_ANY) {
1725 				kmem_free(*addrlist, *size);
1726 				*addrlist = NULL;
1727 				*size = 0;
1728 				if (sctp->sctp_state > SCTPS_LISTEN) {
1729 					*addrcnt = 0;
1730 					return (EINVAL);
1731 				}
1732 				if (uspec != NULL)
1733 					*uspec = 1;
1734 				goto get_all_addrs;
1735 			} else {
1736 				bcopy(s4, p, sizeof (*s4));
1737 				p += sizeof (*s4);
1738 			}
1739 		}
1740 	} else {
1741 		*size = sizeof (struct sockaddr_in6) * *addrcnt;
1742 		*addrlist = kmem_zalloc(*size, KM_SLEEP);
1743 		p = *addrlist;
1744 		for (cnt = 0; cnt < *addrcnt; cnt++) {
1745 			s6 = (struct sockaddr_in6 *)addrs + cnt;
1746 			/*
1747 			 * Comments for INADDR_ANY, above, apply here too.
1748 			 */
1749 			if (IN6_IS_ADDR_UNSPECIFIED(&s6->sin6_addr)) {
1750 				kmem_free(*addrlist, *size);
1751 				*size = 0;
1752 				*addrlist = NULL;
1753 				if (sctp->sctp_state > SCTPS_LISTEN) {
1754 					*addrcnt = 0;
1755 					return (EINVAL);
1756 				}
1757 				if (uspec != NULL)
1758 					*uspec = 1;
1759 				goto get_all_addrs;
1760 			} else {
1761 				bcopy(addrs, p, sizeof (*s6));
1762 				p += sizeof (*s6);
1763 			}
1764 		}
1765 	}
1766 	return (err);
1767 get_all_addrs:
1768 
1769 	/*
1770 	 * Allocate max possible size. We allocate the max. size here because
1771 	 * the clustering module could end up adding addresses to the list.
1772 	 * We allocate upfront so that the clustering module need to bother
1773 	 * re-sizing the list.
1774 	 */
1775 	if (sctp->sctp_family == AF_INET) {
1776 		*size = sizeof (struct sockaddr_in) *
1777 		    sctps->sctps_g_ipifs_count;
1778 	} else {
1779 		*size = sizeof (struct sockaddr_in6) *
1780 		    sctps->sctps_g_ipifs_count;
1781 	}
1782 	*addrlist = kmem_zalloc(*size, KM_SLEEP);
1783 	*addrcnt = 0;
1784 	p = *addrlist;
1785 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
1786 
1787 	/*
1788 	 * Walk through the global interface list and add all addresses,
1789 	 * except those that are hosted on loopback interfaces.
1790 	 */
1791 	for (cnt = 0; cnt <  SCTP_IPIF_HASH; cnt++) {
1792 		if (sctps->sctps_g_ipifs[cnt].ipif_count == 0)
1793 			continue;
1794 		sctp_ipif = list_head(
1795 		    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list);
1796 		for (icnt = 0;
1797 		    icnt < sctps->sctps_g_ipifs[cnt].ipif_count;
1798 		    icnt++) {
1799 			in6_addr_t	addr;
1800 
1801 			rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
1802 			addr = sctp_ipif->sctp_ipif_saddr;
1803 			if (SCTP_IPIF_DISCARD(sctp_ipif->sctp_ipif_flags) ||
1804 			    !SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state) ||
1805 			    SCTP_IS_IPIF_LOOPBACK(sctp_ipif) ||
1806 			    SCTP_IS_IPIF_LINKLOCAL(sctp_ipif) ||
1807 			    !SCTP_IPIF_ZONE_MATCH(sctp, sctp_ipif) ||
1808 			    (sctp->sctp_ipversion == IPV4_VERSION &&
1809 			    sctp_ipif->sctp_ipif_isv6) ||
1810 			    (sctp->sctp_connp->conn_ipv6_v6only &&
1811 			    !sctp_ipif->sctp_ipif_isv6)) {
1812 				rw_exit(&sctp_ipif->sctp_ipif_lock);
1813 				sctp_ipif = list_next(
1814 				    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list,
1815 				    sctp_ipif);
1816 				continue;
1817 			}
1818 			rw_exit(&sctp_ipif->sctp_ipif_lock);
1819 			if (sctp->sctp_family == AF_INET) {
1820 				s4 = (struct sockaddr_in *)p;
1821 				IN6_V4MAPPED_TO_INADDR(&addr, &s4->sin_addr);
1822 				s4->sin_family = AF_INET;
1823 				p += sizeof (*s4);
1824 			} else {
1825 				s6 = (struct sockaddr_in6 *)p;
1826 				s6->sin6_addr = addr;
1827 				s6->sin6_family = AF_INET6;
1828 				s6->sin6_scope_id =
1829 				    sctp_ipif->sctp_ipif_ill->sctp_ill_index;
1830 				p += sizeof (*s6);
1831 			}
1832 			(*addrcnt)++;
1833 			sctp_ipif = list_next(
1834 			    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list,
1835 			    sctp_ipif);
1836 		}
1837 	}
1838 	rw_exit(&sctps->sctps_g_ipifs_lock);
1839 	return (err);
1840 }
1841 
1842 /*
1843  * Get a list of addresses from the source address list. The  caller is
1844  * responsible for allocating sufficient buffer for this.
1845  */
1846 void
1847 sctp_get_saddr_list(sctp_t *sctp, uchar_t *p, size_t psize)
1848 {
1849 	int			cnt;
1850 	int			icnt;
1851 	sctp_saddr_ipif_t	*obj;
1852 	int			naddr;
1853 	int			scanned = 0;
1854 
1855 	for (cnt = 0; cnt < SCTP_IPIF_HASH; cnt++) {
1856 		if (sctp->sctp_saddrs[cnt].ipif_count == 0)
1857 			continue;
1858 		obj = list_head(&sctp->sctp_saddrs[cnt].sctp_ipif_list);
1859 		naddr = sctp->sctp_saddrs[cnt].ipif_count;
1860 		for (icnt = 0; icnt < naddr; icnt++) {
1861 			sctp_ipif_t	*ipif;
1862 
1863 			if (psize < sizeof (ipif->sctp_ipif_saddr))
1864 				return;
1865 
1866 			scanned++;
1867 			ipif = obj->saddr_ipifp;
1868 			bcopy(&ipif->sctp_ipif_saddr, p,
1869 			    sizeof (ipif->sctp_ipif_saddr));
1870 			p += sizeof (ipif->sctp_ipif_saddr);
1871 			psize -= sizeof (ipif->sctp_ipif_saddr);
1872 			if (scanned >= sctp->sctp_nsaddrs)
1873 				return;
1874 			obj = list_next(
1875 			    &sctp->sctp_saddrs[icnt].sctp_ipif_list,
1876 			    obj);
1877 		}
1878 	}
1879 }
1880 
1881 /*
1882  * Get a list of addresses from the remote address list. The  caller is
1883  * responsible for allocating sufficient buffer for this.
1884  */
1885 void
1886 sctp_get_faddr_list(sctp_t *sctp, uchar_t *p, size_t psize)
1887 {
1888 	sctp_faddr_t	*fp;
1889 
1890 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
1891 		if (psize < sizeof (fp->faddr))
1892 			return;
1893 		bcopy(&fp->faddr, p, sizeof (fp->faddr));
1894 		p += sizeof (fp->faddr);
1895 		psize -= sizeof (fp->faddr);
1896 	}
1897 }
1898 
1899 static void
1900 sctp_free_ills(sctp_stack_t *sctps)
1901 {
1902 	int			i;
1903 	int			l;
1904 	sctp_ill_t	*sctp_ill;
1905 
1906 	if (sctps->sctps_ills_count == 0)
1907 		return;
1908 
1909 	for (i = 0; i < SCTP_ILL_HASH; i++) {
1910 		sctp_ill = list_tail(&sctps->sctps_g_ills[i].sctp_ill_list);
1911 		for (l = 0; l < sctps->sctps_g_ills[i].ill_count; l++) {
1912 			ASSERT(sctp_ill->sctp_ill_ipifcnt == 0);
1913 			list_remove(&sctps->sctps_g_ills[i].sctp_ill_list,
1914 			    sctp_ill);
1915 			sctps->sctps_ills_count--;
1916 			kmem_free(sctp_ill->sctp_ill_name,
1917 			    sctp_ill->sctp_ill_name_length);
1918 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
1919 			sctp_ill =
1920 			    list_tail(&sctps->sctps_g_ills[i].sctp_ill_list);
1921 		}
1922 		sctps->sctps_g_ills[i].ill_count = 0;
1923 	}
1924 	ASSERT(sctps->sctps_ills_count == 0);
1925 }
1926 
1927 static void
1928 sctp_free_ipifs(sctp_stack_t *sctps)
1929 {
1930 	int			i;
1931 	int			l;
1932 	sctp_ipif_t	*sctp_ipif;
1933 	sctp_ill_t	*sctp_ill;
1934 
1935 	if (sctps->sctps_g_ipifs_count == 0)
1936 		return;
1937 
1938 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1939 		sctp_ipif = list_tail(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
1940 		for (l = 0; l < sctps->sctps_g_ipifs[i].ipif_count; l++) {
1941 			sctp_ill = sctp_ipif->sctp_ipif_ill;
1942 
1943 			list_remove(&sctps->sctps_g_ipifs[i].sctp_ipif_list,
1944 			    sctp_ipif);
1945 			sctps->sctps_g_ipifs_count--;
1946 			(void) atomic_add_32_nv(&sctp_ill->sctp_ill_ipifcnt,
1947 			    -1);
1948 			kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
1949 			sctp_ipif =
1950 			    list_tail(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
1951 		}
1952 		sctps->sctps_g_ipifs[i].ipif_count = 0;
1953 	}
1954 	ASSERT(sctps->sctps_g_ipifs_count == 0);
1955 }
1956 
1957 
1958 /* Initialize the SCTP ILL list and lock */
1959 void
1960 sctp_saddr_init(sctp_stack_t *sctps)
1961 {
1962 	int	i;
1963 
1964 	sctps->sctps_g_ills = kmem_zalloc(sizeof (sctp_ill_hash_t) *
1965 	    SCTP_ILL_HASH, KM_SLEEP);
1966 	sctps->sctps_g_ipifs = kmem_zalloc(sizeof (sctp_ipif_hash_t) *
1967 	    SCTP_IPIF_HASH, KM_SLEEP);
1968 
1969 	rw_init(&sctps->sctps_g_ills_lock, NULL, RW_DEFAULT, NULL);
1970 	rw_init(&sctps->sctps_g_ipifs_lock, NULL, RW_DEFAULT, NULL);
1971 
1972 	for (i = 0; i < SCTP_ILL_HASH; i++) {
1973 		sctps->sctps_g_ills[i].ill_count = 0;
1974 		list_create(&sctps->sctps_g_ills[i].sctp_ill_list,
1975 		    sizeof (sctp_ill_t),
1976 		    offsetof(sctp_ill_t, sctp_ills));
1977 	}
1978 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1979 		sctps->sctps_g_ipifs[i].ipif_count = 0;
1980 		list_create(&sctps->sctps_g_ipifs[i].sctp_ipif_list,
1981 		    sizeof (sctp_ipif_t), offsetof(sctp_ipif_t, sctp_ipifs));
1982 	}
1983 }
1984 
1985 void
1986 sctp_saddr_fini(sctp_stack_t *sctps)
1987 {
1988 	int	i;
1989 
1990 	sctp_free_ipifs(sctps);
1991 	sctp_free_ills(sctps);
1992 
1993 	for (i = 0; i < SCTP_ILL_HASH; i++)
1994 		list_destroy(&sctps->sctps_g_ills[i].sctp_ill_list);
1995 	for (i = 0; i < SCTP_IPIF_HASH; i++)
1996 		list_destroy(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
1997 
1998 	ASSERT(sctps->sctps_ills_count == 0 && sctps->sctps_g_ipifs_count == 0);
1999 	kmem_free(sctps->sctps_g_ills, sizeof (sctp_ill_hash_t) *
2000 	    SCTP_ILL_HASH);
2001 	sctps->sctps_g_ills = NULL;
2002 	kmem_free(sctps->sctps_g_ipifs, sizeof (sctp_ipif_hash_t) *
2003 	    SCTP_IPIF_HASH);
2004 	sctps->sctps_g_ipifs = NULL;
2005 	rw_destroy(&sctps->sctps_g_ills_lock);
2006 	rw_destroy(&sctps->sctps_g_ipifs_lock);
2007 }
2008