sctp_usrreq.c revision 283705
1/*-
2 * Copyright (c) 2001-2008, by Cisco Systems, Inc. All rights reserved.
3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are met:
8 *
9 * a) Redistributions of source code must retain the above copyright notice,
10 *    this list of conditions and the following disclaimer.
11 *
12 * b) Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in
14 *    the documentation and/or other materials provided with the distribution.
15 *
16 * c) Neither the name of Cisco Systems, Inc. nor the names of its
17 *    contributors may be used to endorse or promote products derived
18 *    from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30 * THE POSSIBILITY OF SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
34__FBSDID("$FreeBSD: stable/10/sys/netinet/sctp_usrreq.c 283705 2015-05-29 11:43:51Z tuexen $");
35
36#include <netinet/sctp_os.h>
37#include <sys/proc.h>
38#include <netinet/sctp_pcb.h>
39#include <netinet/sctp_header.h>
40#include <netinet/sctp_var.h>
41#ifdef INET6
42#include <netinet6/sctp6_var.h>
43#endif
44#include <netinet/sctp_sysctl.h>
45#include <netinet/sctp_output.h>
46#include <netinet/sctp_uio.h>
47#include <netinet/sctp_asconf.h>
48#include <netinet/sctputil.h>
49#include <netinet/sctp_indata.h>
50#include <netinet/sctp_timer.h>
51#include <netinet/sctp_auth.h>
52#include <netinet/sctp_bsd_addr.h>
53#include <netinet/udp.h>
54
55
56
57extern struct sctp_cc_functions sctp_cc_functions[];
58extern struct sctp_ss_functions sctp_ss_functions[];
59
60void
61sctp_init(void)
62{
63	u_long sb_max_adj;
64
65	/* Initialize and modify the sysctled variables */
66	sctp_init_sysctls();
67	if ((nmbclusters / 8) > SCTP_ASOC_MAX_CHUNKS_ON_QUEUE)
68		SCTP_BASE_SYSCTL(sctp_max_chunks_on_queue) = (nmbclusters / 8);
69	/*
70	 * Allow a user to take no more than 1/2 the number of clusters or
71	 * the SB_MAX whichever is smaller for the send window.
72	 */
73	sb_max_adj = (u_long)((u_quad_t) (SB_MAX) * MCLBYTES / (MSIZE + MCLBYTES));
74	SCTP_BASE_SYSCTL(sctp_sendspace) = min(sb_max_adj,
75	    (((uint32_t) nmbclusters / 2) * SCTP_DEFAULT_MAXSEGMENT));
76	/*
77	 * Now for the recv window, should we take the same amount? or
78	 * should I do 1/2 the SB_MAX instead in the SB_MAX min above. For
79	 * now I will just copy.
80	 */
81	SCTP_BASE_SYSCTL(sctp_recvspace) = SCTP_BASE_SYSCTL(sctp_sendspace);
82	SCTP_BASE_VAR(first_time) = 0;
83	SCTP_BASE_VAR(sctp_pcb_initialized) = 0;
84	sctp_pcb_init();
85#if defined(SCTP_PACKET_LOGGING)
86	SCTP_BASE_VAR(packet_log_writers) = 0;
87	SCTP_BASE_VAR(packet_log_end) = 0;
88	bzero(&SCTP_BASE_VAR(packet_log_buffer), SCTP_PACKET_LOG_SIZE);
89#endif
90}
91
92void
93sctp_finish(void)
94{
95	sctp_pcb_finish();
96}
97
98
99
100void
101sctp_pathmtu_adjustment(struct sctp_tcb *stcb, uint16_t nxtsz)
102{
103	struct sctp_tmit_chunk *chk;
104	uint16_t overhead;
105
106	/* Adjust that too */
107	stcb->asoc.smallest_mtu = nxtsz;
108	/* now off to subtract IP_DF flag if needed */
109	overhead = IP_HDR_SIZE;
110	if (sctp_auth_is_required_chunk(SCTP_DATA, stcb->asoc.peer_auth_chunks)) {
111		overhead += sctp_get_auth_chunk_len(stcb->asoc.peer_hmac_id);
112	}
113	TAILQ_FOREACH(chk, &stcb->asoc.send_queue, sctp_next) {
114		if ((chk->send_size + overhead) > nxtsz) {
115			chk->flags |= CHUNK_FLAGS_FRAGMENT_OK;
116		}
117	}
118	TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
119		if ((chk->send_size + overhead) > nxtsz) {
120			/*
121			 * For this guy we also mark for immediate resend
122			 * since we sent to big of chunk
123			 */
124			chk->flags |= CHUNK_FLAGS_FRAGMENT_OK;
125			if (chk->sent < SCTP_DATAGRAM_RESEND) {
126				sctp_flight_size_decrease(chk);
127				sctp_total_flight_decrease(stcb, chk);
128			}
129			if (chk->sent != SCTP_DATAGRAM_RESEND) {
130				sctp_ucount_incr(stcb->asoc.sent_queue_retran_cnt);
131			}
132			chk->sent = SCTP_DATAGRAM_RESEND;
133			chk->rec.data.doing_fast_retransmit = 0;
134			if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_FLIGHT_LOGGING_ENABLE) {
135				sctp_misc_ints(SCTP_FLIGHT_LOG_DOWN_PMTU,
136				    chk->whoTo->flight_size,
137				    chk->book_size,
138				    (uintptr_t) chk->whoTo,
139				    chk->rec.data.TSN_seq);
140			}
141			/* Clear any time so NO RTT is being done */
142			chk->do_rtt = 0;
143		}
144	}
145}
146
147#ifdef INET
148static void
149sctp_notify_mbuf(struct sctp_inpcb *inp,
150    struct sctp_tcb *stcb,
151    struct sctp_nets *net,
152    struct ip *ip,
153    struct sctphdr *sh)
154{
155	struct icmp *icmph;
156	int totsz, tmr_stopped = 0;
157	uint16_t nxtsz;
158
159	/* protection */
160	if ((inp == NULL) || (stcb == NULL) || (net == NULL) ||
161	    (ip == NULL) || (sh == NULL)) {
162		if (stcb != NULL) {
163			SCTP_TCB_UNLOCK(stcb);
164		}
165		return;
166	}
167	/* First job is to verify the vtag matches what I would send */
168	if (ntohl(sh->v_tag) != (stcb->asoc.peer_vtag)) {
169		SCTP_TCB_UNLOCK(stcb);
170		return;
171	}
172	icmph = (struct icmp *)((caddr_t)ip - (sizeof(struct icmp) -
173	    sizeof(struct ip)));
174	if (icmph->icmp_type != ICMP_UNREACH) {
175		/* We only care about unreachable */
176		SCTP_TCB_UNLOCK(stcb);
177		return;
178	}
179	if (icmph->icmp_code != ICMP_UNREACH_NEEDFRAG) {
180		/* not a unreachable message due to frag. */
181		SCTP_TCB_UNLOCK(stcb);
182		return;
183	}
184	totsz = ntohs(ip->ip_len);
185
186	nxtsz = ntohs(icmph->icmp_nextmtu);
187	if (nxtsz == 0) {
188		/*
189		 * old type router that does not tell us what the next size
190		 * mtu is. Rats we will have to guess (in a educated fashion
191		 * of course)
192		 */
193		nxtsz = sctp_get_prev_mtu(totsz);
194	}
195	/* Stop any PMTU timer */
196	if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
197		tmr_stopped = 1;
198		sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
199		    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_1);
200	}
201	/* Adjust destination size limit */
202	if (net->mtu > nxtsz) {
203		net->mtu = nxtsz;
204		if (net->port) {
205			net->mtu -= sizeof(struct udphdr);
206		}
207	}
208	/* now what about the ep? */
209	if (stcb->asoc.smallest_mtu > nxtsz) {
210		sctp_pathmtu_adjustment(stcb, nxtsz);
211	}
212	if (tmr_stopped)
213		sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
214
215	SCTP_TCB_UNLOCK(stcb);
216}
217
218void
219sctp_notify(struct sctp_inpcb *inp,
220    struct ip *ip,
221    struct sctphdr *sh,
222    struct sockaddr *to,
223    struct sctp_tcb *stcb,
224    struct sctp_nets *net)
225{
226#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
227	struct socket *so;
228
229#endif
230	struct icmp *icmph;
231
232	/* protection */
233	if ((inp == NULL) || (stcb == NULL) || (net == NULL) ||
234	    (sh == NULL) || (to == NULL)) {
235		if (stcb)
236			SCTP_TCB_UNLOCK(stcb);
237		return;
238	}
239	/* First job is to verify the vtag matches what I would send */
240	if (ntohl(sh->v_tag) != (stcb->asoc.peer_vtag)) {
241		SCTP_TCB_UNLOCK(stcb);
242		return;
243	}
244	icmph = (struct icmp *)((caddr_t)ip - (sizeof(struct icmp) -
245	    sizeof(struct ip)));
246	if (icmph->icmp_type != ICMP_UNREACH) {
247		/* We only care about unreachable */
248		SCTP_TCB_UNLOCK(stcb);
249		return;
250	}
251	if ((icmph->icmp_code == ICMP_UNREACH_NET) ||
252	    (icmph->icmp_code == ICMP_UNREACH_HOST) ||
253	    (icmph->icmp_code == ICMP_UNREACH_NET_UNKNOWN) ||
254	    (icmph->icmp_code == ICMP_UNREACH_HOST_UNKNOWN) ||
255	    (icmph->icmp_code == ICMP_UNREACH_ISOLATED) ||
256	    (icmph->icmp_code == ICMP_UNREACH_NET_PROHIB) ||
257	    (icmph->icmp_code == ICMP_UNREACH_HOST_PROHIB) ||
258	    (icmph->icmp_code == ICMP_UNREACH_FILTER_PROHIB)) {
259
260		/*
261		 * Hmm reachablity problems we must examine closely. If its
262		 * not reachable, we may have lost a network. Or if there is
263		 * NO protocol at the other end named SCTP. well we consider
264		 * it a OOTB abort.
265		 */
266		if (net->dest_state & SCTP_ADDR_REACHABLE) {
267			/* Ok that destination is NOT reachable */
268			net->dest_state &= ~SCTP_ADDR_REACHABLE;
269			net->dest_state &= ~SCTP_ADDR_PF;
270			sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN,
271			    stcb, 0,
272			    (void *)net, SCTP_SO_NOT_LOCKED);
273		}
274		SCTP_TCB_UNLOCK(stcb);
275	} else if ((icmph->icmp_code == ICMP_UNREACH_PROTOCOL) ||
276	    (icmph->icmp_code == ICMP_UNREACH_PORT)) {
277		/*
278		 * Here the peer is either playing tricks on us, including
279		 * an address that belongs to someone who does not support
280		 * SCTP OR was a userland implementation that shutdown and
281		 * now is dead. In either case treat it like a OOTB abort
282		 * with no TCB
283		 */
284		sctp_abort_notification(stcb, 1, 0, NULL, SCTP_SO_NOT_LOCKED);
285#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
286		so = SCTP_INP_SO(inp);
287		atomic_add_int(&stcb->asoc.refcnt, 1);
288		SCTP_TCB_UNLOCK(stcb);
289		SCTP_SOCKET_LOCK(so, 1);
290		SCTP_TCB_LOCK(stcb);
291		atomic_subtract_int(&stcb->asoc.refcnt, 1);
292#endif
293		(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_2);
294#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
295		SCTP_SOCKET_UNLOCK(so, 1);
296		/* SCTP_TCB_UNLOCK(stcb); MT: I think this is not needed. */
297#endif
298		/* no need to unlock here, since the TCB is gone */
299	} else {
300		SCTP_TCB_UNLOCK(stcb);
301	}
302}
303
304#endif
305
306#ifdef INET
307void
308sctp_ctlinput(cmd, sa, vip)
309	int cmd;
310	struct sockaddr *sa;
311	void *vip;
312{
313	struct ip *ip = vip;
314	struct sctphdr *sh;
315	uint32_t vrf_id;
316
317	/* FIX, for non-bsd is this right? */
318	vrf_id = SCTP_DEFAULT_VRFID;
319	if (sa->sa_family != AF_INET ||
320	    ((struct sockaddr_in *)sa)->sin_addr.s_addr == INADDR_ANY) {
321		return;
322	}
323	if (PRC_IS_REDIRECT(cmd)) {
324		ip = 0;
325	} else if ((unsigned)cmd >= PRC_NCMDS || inetctlerrmap[cmd] == 0) {
326		return;
327	}
328	if (ip) {
329		struct sctp_inpcb *inp = NULL;
330		struct sctp_tcb *stcb = NULL;
331		struct sctp_nets *net = NULL;
332		struct sockaddr_in to, from;
333
334		sh = (struct sctphdr *)((caddr_t)ip + (ip->ip_hl << 2));
335		bzero(&to, sizeof(to));
336		bzero(&from, sizeof(from));
337		from.sin_family = to.sin_family = AF_INET;
338		from.sin_len = to.sin_len = sizeof(to);
339		from.sin_port = sh->src_port;
340		from.sin_addr = ip->ip_src;
341		to.sin_port = sh->dest_port;
342		to.sin_addr = ip->ip_dst;
343
344		/*
345		 * 'to' holds the dest of the packet that failed to be sent.
346		 * 'from' holds our local endpoint address. Thus we reverse
347		 * the to and the from in the lookup.
348		 */
349		stcb = sctp_findassociation_addr_sa((struct sockaddr *)&to,
350		    (struct sockaddr *)&from,
351		    &inp, &net, 1, vrf_id);
352		if (stcb != NULL && inp && (inp->sctp_socket != NULL)) {
353			if (cmd != PRC_MSGSIZE) {
354				sctp_notify(inp, ip, sh,
355				    (struct sockaddr *)&to, stcb,
356				    net);
357			} else {
358				/* handle possible ICMP size messages */
359				sctp_notify_mbuf(inp, stcb, net, ip, sh);
360			}
361		} else {
362			if ((stcb == NULL) && (inp != NULL)) {
363				/* reduce ref-count */
364				SCTP_INP_WLOCK(inp);
365				SCTP_INP_DECR_REF(inp);
366				SCTP_INP_WUNLOCK(inp);
367			}
368			if (stcb) {
369				SCTP_TCB_UNLOCK(stcb);
370			}
371		}
372	}
373	return;
374}
375
376#endif
377
378static int
379sctp_getcred(SYSCTL_HANDLER_ARGS)
380{
381	struct xucred xuc;
382	struct sockaddr_in addrs[2];
383	struct sctp_inpcb *inp;
384	struct sctp_nets *net;
385	struct sctp_tcb *stcb;
386	int error;
387	uint32_t vrf_id;
388
389	/* FIX, for non-bsd is this right? */
390	vrf_id = SCTP_DEFAULT_VRFID;
391
392	error = priv_check(req->td, PRIV_NETINET_GETCRED);
393
394	if (error)
395		return (error);
396
397	error = SYSCTL_IN(req, addrs, sizeof(addrs));
398	if (error)
399		return (error);
400
401	stcb = sctp_findassociation_addr_sa(sintosa(&addrs[1]),
402	    sintosa(&addrs[0]),
403	    &inp, &net, 1, vrf_id);
404	if (stcb == NULL || inp == NULL || inp->sctp_socket == NULL) {
405		if ((inp != NULL) && (stcb == NULL)) {
406			/* reduce ref-count */
407			SCTP_INP_WLOCK(inp);
408			SCTP_INP_DECR_REF(inp);
409			goto cred_can_cont;
410		}
411		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
412		error = ENOENT;
413		goto out;
414	}
415	SCTP_TCB_UNLOCK(stcb);
416	/*
417	 * We use the write lock here, only since in the error leg we need
418	 * it. If we used RLOCK, then we would have to
419	 * wlock/decr/unlock/rlock. Which in theory could create a hole.
420	 * Better to use higher wlock.
421	 */
422	SCTP_INP_WLOCK(inp);
423cred_can_cont:
424	error = cr_canseesocket(req->td->td_ucred, inp->sctp_socket);
425	if (error) {
426		SCTP_INP_WUNLOCK(inp);
427		goto out;
428	}
429	cru2x(inp->sctp_socket->so_cred, &xuc);
430	SCTP_INP_WUNLOCK(inp);
431	error = SYSCTL_OUT(req, &xuc, sizeof(struct xucred));
432out:
433	return (error);
434}
435
436SYSCTL_PROC(_net_inet_sctp, OID_AUTO, getcred, CTLTYPE_OPAQUE | CTLFLAG_RW,
437    0, 0, sctp_getcred, "S,ucred", "Get the ucred of a SCTP connection");
438
439
440#ifdef INET
441static void
442sctp_abort(struct socket *so)
443{
444	struct sctp_inpcb *inp;
445	uint32_t flags;
446
447	inp = (struct sctp_inpcb *)so->so_pcb;
448	if (inp == NULL) {
449		return;
450	}
451sctp_must_try_again:
452	flags = inp->sctp_flags;
453#ifdef SCTP_LOG_CLOSING
454	sctp_log_closing(inp, NULL, 17);
455#endif
456	if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
457	    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
458#ifdef SCTP_LOG_CLOSING
459		sctp_log_closing(inp, NULL, 16);
460#endif
461		sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
462		    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
463		SOCK_LOCK(so);
464		SCTP_SB_CLEAR(so->so_snd);
465		/*
466		 * same for the rcv ones, they are only here for the
467		 * accounting/select.
468		 */
469		SCTP_SB_CLEAR(so->so_rcv);
470
471		/* Now null out the reference, we are completely detached. */
472		so->so_pcb = NULL;
473		SOCK_UNLOCK(so);
474	} else {
475		flags = inp->sctp_flags;
476		if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
477			goto sctp_must_try_again;
478		}
479	}
480	return;
481}
482
483static int
484sctp_attach(struct socket *so, int proto SCTP_UNUSED, struct thread *p SCTP_UNUSED)
485{
486	struct sctp_inpcb *inp;
487	struct inpcb *ip_inp;
488	int error;
489	uint32_t vrf_id = SCTP_DEFAULT_VRFID;
490
491#ifdef IPSEC
492	uint32_t flags;
493
494#endif
495
496	inp = (struct sctp_inpcb *)so->so_pcb;
497	if (inp != 0) {
498		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
499		return (EINVAL);
500	}
501	if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
502		error = SCTP_SORESERVE(so, SCTP_BASE_SYSCTL(sctp_sendspace), SCTP_BASE_SYSCTL(sctp_recvspace));
503		if (error) {
504			return (error);
505		}
506	}
507	error = sctp_inpcb_alloc(so, vrf_id);
508	if (error) {
509		return (error);
510	}
511	inp = (struct sctp_inpcb *)so->so_pcb;
512	SCTP_INP_WLOCK(inp);
513	inp->sctp_flags &= ~SCTP_PCB_FLAGS_BOUND_V6;	/* I'm not v6! */
514	ip_inp = &inp->ip_inp.inp;
515	ip_inp->inp_vflag |= INP_IPV4;
516	ip_inp->inp_ip_ttl = MODULE_GLOBAL(ip_defttl);
517#ifdef IPSEC
518	error = ipsec_init_policy(so, &ip_inp->inp_sp);
519#ifdef SCTP_LOG_CLOSING
520	sctp_log_closing(inp, NULL, 17);
521#endif
522	if (error != 0) {
523try_again:
524		flags = inp->sctp_flags;
525		if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
526		    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
527#ifdef SCTP_LOG_CLOSING
528			sctp_log_closing(inp, NULL, 15);
529#endif
530			SCTP_INP_WUNLOCK(inp);
531			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
532			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
533		} else {
534			flags = inp->sctp_flags;
535			if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
536				goto try_again;
537			} else {
538				SCTP_INP_WUNLOCK(inp);
539			}
540		}
541		return (error);
542	}
543#endif				/* IPSEC */
544	SCTP_INP_WUNLOCK(inp);
545	return (0);
546}
547
548static int
549sctp_bind(struct socket *so, struct sockaddr *addr, struct thread *p)
550{
551	struct sctp_inpcb *inp;
552
553	inp = (struct sctp_inpcb *)so->so_pcb;
554	if (inp == NULL) {
555		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
556		return (EINVAL);
557	}
558	if (addr != NULL) {
559		if ((addr->sa_family != AF_INET) ||
560		    (addr->sa_len != sizeof(struct sockaddr_in))) {
561			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
562			return (EINVAL);
563		}
564	}
565	return (sctp_inpcb_bind(so, addr, NULL, p));
566}
567
568#endif
569void
570sctp_close(struct socket *so)
571{
572	struct sctp_inpcb *inp;
573	uint32_t flags;
574
575	inp = (struct sctp_inpcb *)so->so_pcb;
576	if (inp == NULL)
577		return;
578
579	/*
580	 * Inform all the lower layer assoc that we are done.
581	 */
582sctp_must_try_again:
583	flags = inp->sctp_flags;
584#ifdef SCTP_LOG_CLOSING
585	sctp_log_closing(inp, NULL, 17);
586#endif
587	if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
588	    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
589		if (((so->so_options & SO_LINGER) && (so->so_linger == 0)) ||
590		    (so->so_rcv.sb_cc > 0)) {
591#ifdef SCTP_LOG_CLOSING
592			sctp_log_closing(inp, NULL, 13);
593#endif
594			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
595			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
596		} else {
597#ifdef SCTP_LOG_CLOSING
598			sctp_log_closing(inp, NULL, 14);
599#endif
600			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_GRACEFUL_CLOSE,
601			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
602		}
603		/*
604		 * The socket is now detached, no matter what the state of
605		 * the SCTP association.
606		 */
607		SOCK_LOCK(so);
608		SCTP_SB_CLEAR(so->so_snd);
609		/*
610		 * same for the rcv ones, they are only here for the
611		 * accounting/select.
612		 */
613		SCTP_SB_CLEAR(so->so_rcv);
614
615		/* Now null out the reference, we are completely detached. */
616		so->so_pcb = NULL;
617		SOCK_UNLOCK(so);
618	} else {
619		flags = inp->sctp_flags;
620		if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
621			goto sctp_must_try_again;
622		}
623	}
624	return;
625}
626
627
628int
629sctp_sendm(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
630    struct mbuf *control, struct thread *p);
631
632
633int
634sctp_sendm(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
635    struct mbuf *control, struct thread *p)
636{
637	struct sctp_inpcb *inp;
638	int error;
639
640	inp = (struct sctp_inpcb *)so->so_pcb;
641	if (inp == NULL) {
642		if (control) {
643			sctp_m_freem(control);
644			control = NULL;
645		}
646		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
647		sctp_m_freem(m);
648		return (EINVAL);
649	}
650	/* Got to have an to address if we are NOT a connected socket */
651	if ((addr == NULL) &&
652	    ((inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) ||
653	    (inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE))) {
654		goto connected_type;
655	} else if (addr == NULL) {
656		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EDESTADDRREQ);
657		error = EDESTADDRREQ;
658		sctp_m_freem(m);
659		if (control) {
660			sctp_m_freem(control);
661			control = NULL;
662		}
663		return (error);
664	}
665#ifdef INET6
666	if (addr->sa_family != AF_INET) {
667		/* must be a v4 address! */
668		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EDESTADDRREQ);
669		sctp_m_freem(m);
670		if (control) {
671			sctp_m_freem(control);
672			control = NULL;
673		}
674		error = EDESTADDRREQ;
675		return (error);
676	}
677#endif				/* INET6 */
678connected_type:
679	/* now what about control */
680	if (control) {
681		if (inp->control) {
682			SCTP_PRINTF("huh? control set?\n");
683			sctp_m_freem(inp->control);
684			inp->control = NULL;
685		}
686		inp->control = control;
687	}
688	/* Place the data */
689	if (inp->pkt) {
690		SCTP_BUF_NEXT(inp->pkt_last) = m;
691		inp->pkt_last = m;
692	} else {
693		inp->pkt_last = inp->pkt = m;
694	}
695	if (
696	/* FreeBSD uses a flag passed */
697	    ((flags & PRUS_MORETOCOME) == 0)
698	    ) {
699		/*
700		 * note with the current version this code will only be used
701		 * by OpenBSD-- NetBSD, FreeBSD, and MacOS have methods for
702		 * re-defining sosend to use the sctp_sosend. One can
703		 * optionally switch back to this code (by changing back the
704		 * definitions) but this is not advisable. This code is used
705		 * by FreeBSD when sending a file with sendfile() though.
706		 */
707		int ret;
708
709		ret = sctp_output(inp, inp->pkt, addr, inp->control, p, flags);
710		inp->pkt = NULL;
711		inp->control = NULL;
712		return (ret);
713	} else {
714		return (0);
715	}
716}
717
718int
719sctp_disconnect(struct socket *so)
720{
721	struct sctp_inpcb *inp;
722
723	inp = (struct sctp_inpcb *)so->so_pcb;
724	if (inp == NULL) {
725		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
726		return (ENOTCONN);
727	}
728	SCTP_INP_RLOCK(inp);
729	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
730	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
731		if (LIST_EMPTY(&inp->sctp_asoc_list)) {
732			/* No connection */
733			SCTP_INP_RUNLOCK(inp);
734			return (0);
735		} else {
736			struct sctp_association *asoc;
737			struct sctp_tcb *stcb;
738
739			stcb = LIST_FIRST(&inp->sctp_asoc_list);
740			if (stcb == NULL) {
741				SCTP_INP_RUNLOCK(inp);
742				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
743				return (EINVAL);
744			}
745			SCTP_TCB_LOCK(stcb);
746			asoc = &stcb->asoc;
747			if (stcb->asoc.state & SCTP_STATE_ABOUT_TO_BE_FREED) {
748				/* We are about to be freed, out of here */
749				SCTP_TCB_UNLOCK(stcb);
750				SCTP_INP_RUNLOCK(inp);
751				return (0);
752			}
753			if (((so->so_options & SO_LINGER) &&
754			    (so->so_linger == 0)) ||
755			    (so->so_rcv.sb_cc > 0)) {
756				if (SCTP_GET_STATE(asoc) !=
757				    SCTP_STATE_COOKIE_WAIT) {
758					/* Left with Data unread */
759					struct mbuf *err;
760
761					err = sctp_get_mbuf_for_msg(sizeof(struct sctp_paramhdr), 0, M_NOWAIT, 1, MT_DATA);
762					if (err) {
763						/*
764						 * Fill in the user
765						 * initiated abort
766						 */
767						struct sctp_paramhdr *ph;
768
769						ph = mtod(err, struct sctp_paramhdr *);
770						SCTP_BUF_LEN(err) = sizeof(struct sctp_paramhdr);
771						ph->param_type = htons(SCTP_CAUSE_USER_INITIATED_ABT);
772						ph->param_length = htons(SCTP_BUF_LEN(err));
773					}
774					sctp_send_abort_tcb(stcb, err, SCTP_SO_LOCKED);
775					SCTP_STAT_INCR_COUNTER32(sctps_aborted);
776				}
777				SCTP_INP_RUNLOCK(inp);
778				if ((SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_OPEN) ||
779				    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
780					SCTP_STAT_DECR_GAUGE32(sctps_currestab);
781				}
782				(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_3);
783				/* No unlock tcb assoc is gone */
784				return (0);
785			}
786			if (TAILQ_EMPTY(&asoc->send_queue) &&
787			    TAILQ_EMPTY(&asoc->sent_queue) &&
788			    (asoc->stream_queue_cnt == 0)) {
789				/* there is nothing queued to send, so done */
790				if (asoc->locked_on_sending) {
791					goto abort_anyway;
792				}
793				if ((SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT) &&
794				    (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_ACK_SENT)) {
795					/* only send SHUTDOWN 1st time thru */
796					struct sctp_nets *netp;
797
798					if ((SCTP_GET_STATE(asoc) == SCTP_STATE_OPEN) ||
799					    (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
800						SCTP_STAT_DECR_GAUGE32(sctps_currestab);
801					}
802					SCTP_SET_STATE(asoc, SCTP_STATE_SHUTDOWN_SENT);
803					SCTP_CLEAR_SUBSTATE(asoc, SCTP_STATE_SHUTDOWN_PENDING);
804					sctp_stop_timers_for_shutdown(stcb);
805					if (stcb->asoc.alternate) {
806						netp = stcb->asoc.alternate;
807					} else {
808						netp = stcb->asoc.primary_destination;
809					}
810					sctp_send_shutdown(stcb, netp);
811					sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWN,
812					    stcb->sctp_ep, stcb, netp);
813					sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD,
814					    stcb->sctp_ep, stcb, netp);
815					sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_LOCKED);
816				}
817			} else {
818				/*
819				 * we still got (or just got) data to send,
820				 * so set SHUTDOWN_PENDING
821				 */
822				/*
823				 * XXX sockets draft says that SCTP_EOF
824				 * should be sent with no data. currently,
825				 * we will allow user data to be sent first
826				 * and move to SHUTDOWN-PENDING
827				 */
828				struct sctp_nets *netp;
829
830				if (stcb->asoc.alternate) {
831					netp = stcb->asoc.alternate;
832				} else {
833					netp = stcb->asoc.primary_destination;
834				}
835
836				asoc->state |= SCTP_STATE_SHUTDOWN_PENDING;
837				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD, stcb->sctp_ep, stcb,
838				    netp);
839				if (asoc->locked_on_sending) {
840					/* Locked to send out the data */
841					struct sctp_stream_queue_pending *sp;
842
843					sp = TAILQ_LAST(&asoc->locked_on_sending->outqueue, sctp_streamhead);
844					if (sp == NULL) {
845						SCTP_PRINTF("Error, sp is NULL, locked on sending is non-null strm:%d\n",
846						    asoc->locked_on_sending->stream_no);
847					} else {
848						if ((sp->length == 0) && (sp->msg_is_complete == 0))
849							asoc->state |= SCTP_STATE_PARTIAL_MSG_LEFT;
850					}
851				}
852				if (TAILQ_EMPTY(&asoc->send_queue) &&
853				    TAILQ_EMPTY(&asoc->sent_queue) &&
854				    (asoc->state & SCTP_STATE_PARTIAL_MSG_LEFT)) {
855					struct mbuf *op_err;
856
857			abort_anyway:
858					op_err = sctp_generate_cause(SCTP_CAUSE_USER_INITIATED_ABT, "");
859					stcb->sctp_ep->last_abort_code = SCTP_FROM_SCTP_USRREQ + SCTP_LOC_4;
860					sctp_send_abort_tcb(stcb, op_err, SCTP_SO_LOCKED);
861					SCTP_STAT_INCR_COUNTER32(sctps_aborted);
862					if ((SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_OPEN) ||
863					    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
864						SCTP_STAT_DECR_GAUGE32(sctps_currestab);
865					}
866					SCTP_INP_RUNLOCK(inp);
867					(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_5);
868					return (0);
869				} else {
870					sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_CLOSING, SCTP_SO_LOCKED);
871				}
872			}
873			soisdisconnecting(so);
874			SCTP_TCB_UNLOCK(stcb);
875			SCTP_INP_RUNLOCK(inp);
876			return (0);
877		}
878		/* not reached */
879	} else {
880		/* UDP model does not support this */
881		SCTP_INP_RUNLOCK(inp);
882		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
883		return (EOPNOTSUPP);
884	}
885}
886
887int
888sctp_flush(struct socket *so, int how)
889{
890	/*
891	 * We will just clear out the values and let subsequent close clear
892	 * out the data, if any. Note if the user did a shutdown(SHUT_RD)
893	 * they will not be able to read the data, the socket will block
894	 * that from happening.
895	 */
896	struct sctp_inpcb *inp;
897
898	inp = (struct sctp_inpcb *)so->so_pcb;
899	if (inp == NULL) {
900		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
901		return (EINVAL);
902	}
903	SCTP_INP_RLOCK(inp);
904	/* For the 1 to many model this does nothing */
905	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
906		SCTP_INP_RUNLOCK(inp);
907		return (0);
908	}
909	SCTP_INP_RUNLOCK(inp);
910	if ((how == PRU_FLUSH_RD) || (how == PRU_FLUSH_RDWR)) {
911		/*
912		 * First make sure the sb will be happy, we don't use these
913		 * except maybe the count
914		 */
915		SCTP_INP_WLOCK(inp);
916		SCTP_INP_READ_LOCK(inp);
917		inp->sctp_flags |= SCTP_PCB_FLAGS_SOCKET_CANT_READ;
918		SCTP_INP_READ_UNLOCK(inp);
919		SCTP_INP_WUNLOCK(inp);
920		so->so_rcv.sb_cc = 0;
921		so->so_rcv.sb_mbcnt = 0;
922		so->so_rcv.sb_mb = NULL;
923	}
924	if ((how == PRU_FLUSH_WR) || (how == PRU_FLUSH_RDWR)) {
925		/*
926		 * First make sure the sb will be happy, we don't use these
927		 * except maybe the count
928		 */
929		so->so_snd.sb_cc = 0;
930		so->so_snd.sb_mbcnt = 0;
931		so->so_snd.sb_mb = NULL;
932
933	}
934	return (0);
935}
936
937int
938sctp_shutdown(struct socket *so)
939{
940	struct sctp_inpcb *inp;
941
942	inp = (struct sctp_inpcb *)so->so_pcb;
943	if (inp == NULL) {
944		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
945		return (EINVAL);
946	}
947	SCTP_INP_RLOCK(inp);
948	/* For UDP model this is a invalid call */
949	if (!((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
950	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL))) {
951		/* Restore the flags that the soshutdown took away. */
952		SOCKBUF_LOCK(&so->so_rcv);
953		so->so_rcv.sb_state &= ~SBS_CANTRCVMORE;
954		SOCKBUF_UNLOCK(&so->so_rcv);
955		/* This proc will wakeup for read and do nothing (I hope) */
956		SCTP_INP_RUNLOCK(inp);
957		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
958		return (EOPNOTSUPP);
959	}
960	/*
961	 * Ok if we reach here its the TCP model and it is either a SHUT_WR
962	 * or SHUT_RDWR. This means we put the shutdown flag against it.
963	 */
964	{
965		struct sctp_tcb *stcb;
966		struct sctp_association *asoc;
967
968		if ((so->so_state &
969		    (SS_ISCONNECTED | SS_ISCONNECTING | SS_ISDISCONNECTING)) == 0) {
970			SCTP_INP_RUNLOCK(inp);
971			return (ENOTCONN);
972		}
973		socantsendmore(so);
974
975		stcb = LIST_FIRST(&inp->sctp_asoc_list);
976		if (stcb == NULL) {
977			/*
978			 * Ok we hit the case that the shutdown call was
979			 * made after an abort or something. Nothing to do
980			 * now.
981			 */
982			SCTP_INP_RUNLOCK(inp);
983			return (0);
984		}
985		SCTP_TCB_LOCK(stcb);
986		asoc = &stcb->asoc;
987		if (TAILQ_EMPTY(&asoc->send_queue) &&
988		    TAILQ_EMPTY(&asoc->sent_queue) &&
989		    (asoc->stream_queue_cnt == 0)) {
990			if (asoc->locked_on_sending) {
991				goto abort_anyway;
992			}
993			/* there is nothing queued to send, so I'm done... */
994			if (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT) {
995				/* only send SHUTDOWN the first time through */
996				struct sctp_nets *netp;
997
998				if ((SCTP_GET_STATE(asoc) == SCTP_STATE_OPEN) ||
999				    (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
1000					SCTP_STAT_DECR_GAUGE32(sctps_currestab);
1001				}
1002				SCTP_SET_STATE(asoc, SCTP_STATE_SHUTDOWN_SENT);
1003				SCTP_CLEAR_SUBSTATE(asoc, SCTP_STATE_SHUTDOWN_PENDING);
1004				sctp_stop_timers_for_shutdown(stcb);
1005				if (stcb->asoc.alternate) {
1006					netp = stcb->asoc.alternate;
1007				} else {
1008					netp = stcb->asoc.primary_destination;
1009				}
1010				sctp_send_shutdown(stcb, netp);
1011				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWN,
1012				    stcb->sctp_ep, stcb, netp);
1013				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD,
1014				    stcb->sctp_ep, stcb, netp);
1015				sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_LOCKED);
1016			}
1017		} else {
1018			/*
1019			 * we still got (or just got) data to send, so set
1020			 * SHUTDOWN_PENDING
1021			 */
1022			struct sctp_nets *netp;
1023
1024			if (stcb->asoc.alternate) {
1025				netp = stcb->asoc.alternate;
1026			} else {
1027				netp = stcb->asoc.primary_destination;
1028			}
1029
1030			asoc->state |= SCTP_STATE_SHUTDOWN_PENDING;
1031			sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD, stcb->sctp_ep, stcb,
1032			    netp);
1033
1034			if (asoc->locked_on_sending) {
1035				/* Locked to send out the data */
1036				struct sctp_stream_queue_pending *sp;
1037
1038				sp = TAILQ_LAST(&asoc->locked_on_sending->outqueue, sctp_streamhead);
1039				if (sp == NULL) {
1040					SCTP_PRINTF("Error, sp is NULL, locked on sending is non-null strm:%d\n",
1041					    asoc->locked_on_sending->stream_no);
1042				} else {
1043					if ((sp->length == 0) && (sp->msg_is_complete == 0)) {
1044						asoc->state |= SCTP_STATE_PARTIAL_MSG_LEFT;
1045					}
1046				}
1047			}
1048			if (TAILQ_EMPTY(&asoc->send_queue) &&
1049			    TAILQ_EMPTY(&asoc->sent_queue) &&
1050			    (asoc->state & SCTP_STATE_PARTIAL_MSG_LEFT)) {
1051				struct mbuf *op_err;
1052
1053		abort_anyway:
1054				op_err = sctp_generate_cause(SCTP_CAUSE_USER_INITIATED_ABT, "");
1055				stcb->sctp_ep->last_abort_code = SCTP_FROM_SCTP_USRREQ + SCTP_LOC_6;
1056				sctp_abort_an_association(stcb->sctp_ep, stcb,
1057				    op_err, SCTP_SO_LOCKED);
1058				goto skip_unlock;
1059			} else {
1060				sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_CLOSING, SCTP_SO_LOCKED);
1061			}
1062		}
1063		SCTP_TCB_UNLOCK(stcb);
1064	}
1065skip_unlock:
1066	SCTP_INP_RUNLOCK(inp);
1067	return (0);
1068}
1069
1070/*
1071 * copies a "user" presentable address and removes embedded scope, etc.
1072 * returns 0 on success, 1 on error
1073 */
1074static uint32_t
1075sctp_fill_user_address(struct sockaddr_storage *ss, struct sockaddr *sa)
1076{
1077#ifdef INET6
1078	struct sockaddr_in6 lsa6;
1079
1080	sa = (struct sockaddr *)sctp_recover_scope((struct sockaddr_in6 *)sa,
1081	    &lsa6);
1082#endif
1083	memcpy(ss, sa, sa->sa_len);
1084	return (0);
1085}
1086
1087
1088
1089/*
1090 * NOTE: assumes addr lock is held
1091 */
1092static size_t
1093sctp_fill_up_addresses_vrf(struct sctp_inpcb *inp,
1094    struct sctp_tcb *stcb,
1095    size_t limit,
1096    struct sockaddr_storage *sas,
1097    uint32_t vrf_id)
1098{
1099	struct sctp_ifn *sctp_ifn;
1100	struct sctp_ifa *sctp_ifa;
1101	size_t actual;
1102	int loopback_scope;
1103
1104#if defined(INET)
1105	int ipv4_local_scope, ipv4_addr_legal;
1106
1107#endif
1108#if defined(INET6)
1109	int local_scope, site_scope, ipv6_addr_legal;
1110
1111#endif
1112	struct sctp_vrf *vrf;
1113
1114	actual = 0;
1115	if (limit <= 0)
1116		return (actual);
1117
1118	if (stcb) {
1119		/* Turn on all the appropriate scope */
1120		loopback_scope = stcb->asoc.scope.loopback_scope;
1121#if defined(INET)
1122		ipv4_local_scope = stcb->asoc.scope.ipv4_local_scope;
1123		ipv4_addr_legal = stcb->asoc.scope.ipv4_addr_legal;
1124#endif
1125#if defined(INET6)
1126		local_scope = stcb->asoc.scope.local_scope;
1127		site_scope = stcb->asoc.scope.site_scope;
1128		ipv6_addr_legal = stcb->asoc.scope.ipv6_addr_legal;
1129#endif
1130	} else {
1131		/* Use generic values for endpoints. */
1132		loopback_scope = 1;
1133#if defined(INET)
1134		ipv4_local_scope = 1;
1135#endif
1136#if defined(INET6)
1137		local_scope = 1;
1138		site_scope = 1;
1139#endif
1140		if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
1141#if defined(INET6)
1142			ipv6_addr_legal = 1;
1143#endif
1144#if defined(INET)
1145			if (SCTP_IPV6_V6ONLY(inp)) {
1146				ipv4_addr_legal = 0;
1147			} else {
1148				ipv4_addr_legal = 1;
1149			}
1150#endif
1151		} else {
1152#if defined(INET6)
1153			ipv6_addr_legal = 0;
1154#endif
1155#if defined(INET)
1156			ipv4_addr_legal = 1;
1157#endif
1158		}
1159	}
1160	vrf = sctp_find_vrf(vrf_id);
1161	if (vrf == NULL) {
1162		return (0);
1163	}
1164	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1165		LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
1166			if ((loopback_scope == 0) &&
1167			    SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
1168				/* Skip loopback if loopback_scope not set */
1169				continue;
1170			}
1171			LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
1172				if (stcb) {
1173					/*
1174					 * For the BOUND-ALL case, the list
1175					 * associated with a TCB is Always
1176					 * considered a reverse list.. i.e.
1177					 * it lists addresses that are NOT
1178					 * part of the association. If this
1179					 * is one of those we must skip it.
1180					 */
1181					if (sctp_is_addr_restricted(stcb,
1182					    sctp_ifa)) {
1183						continue;
1184					}
1185				}
1186				switch (sctp_ifa->address.sa.sa_family) {
1187#ifdef INET
1188				case AF_INET:
1189					if (ipv4_addr_legal) {
1190						struct sockaddr_in *sin;
1191
1192						sin = &sctp_ifa->address.sin;
1193						if (sin->sin_addr.s_addr == 0) {
1194							/*
1195							 * we skip
1196							 * unspecifed
1197							 * addresses
1198							 */
1199							continue;
1200						}
1201						if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
1202						    &sin->sin_addr) != 0) {
1203							continue;
1204						}
1205						if ((ipv4_local_scope == 0) &&
1206						    (IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))) {
1207							continue;
1208						}
1209#ifdef INET6
1210						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
1211							in6_sin_2_v4mapsin6(sin, (struct sockaddr_in6 *)sas);
1212							((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1213							sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(struct sockaddr_in6));
1214							actual += sizeof(struct sockaddr_in6);
1215						} else {
1216#endif
1217							memcpy(sas, sin, sizeof(*sin));
1218							((struct sockaddr_in *)sas)->sin_port = inp->sctp_lport;
1219							sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(*sin));
1220							actual += sizeof(*sin);
1221#ifdef INET6
1222						}
1223#endif
1224						if (actual >= limit) {
1225							return (actual);
1226						}
1227					} else {
1228						continue;
1229					}
1230					break;
1231#endif
1232#ifdef INET6
1233				case AF_INET6:
1234					if (ipv6_addr_legal) {
1235						struct sockaddr_in6 *sin6;
1236
1237						sin6 = &sctp_ifa->address.sin6;
1238						if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
1239							/*
1240							 * we skip
1241							 * unspecifed
1242							 * addresses
1243							 */
1244							continue;
1245						}
1246						if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
1247						    &sin6->sin6_addr) != 0) {
1248							continue;
1249						}
1250						if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
1251							if (local_scope == 0)
1252								continue;
1253							if (sin6->sin6_scope_id == 0) {
1254								if (sa6_recoverscope(sin6) != 0)
1255									/*
1256									 *
1257									 * bad
1258									 *
1259									 * li
1260									 * nk
1261									 *
1262									 * loc
1263									 * al
1264									 *
1265									 * add
1266									 * re
1267									 * ss
1268									 * */
1269									continue;
1270							}
1271						}
1272						if ((site_scope == 0) &&
1273						    (IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))) {
1274							continue;
1275						}
1276						memcpy(sas, sin6, sizeof(*sin6));
1277						((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1278						sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(*sin6));
1279						actual += sizeof(*sin6);
1280						if (actual >= limit) {
1281							return (actual);
1282						}
1283					} else {
1284						continue;
1285					}
1286					break;
1287#endif
1288				default:
1289					/* TSNH */
1290					break;
1291				}
1292			}
1293		}
1294	} else {
1295		struct sctp_laddr *laddr;
1296
1297		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
1298			if (stcb) {
1299				if (sctp_is_addr_restricted(stcb, laddr->ifa)) {
1300					continue;
1301				}
1302			}
1303			if (sctp_fill_user_address(sas, &laddr->ifa->address.sa))
1304				continue;
1305			switch (laddr->ifa->address.sa.sa_family) {
1306#ifdef INET
1307			case AF_INET:
1308				((struct sockaddr_in *)sas)->sin_port = inp->sctp_lport;
1309				break;
1310#endif
1311#ifdef INET6
1312			case AF_INET6:
1313				((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1314				break;
1315#endif
1316			default:
1317				/* TSNH */
1318				break;
1319			}
1320			sas = (struct sockaddr_storage *)((caddr_t)sas +
1321			    laddr->ifa->address.sa.sa_len);
1322			actual += laddr->ifa->address.sa.sa_len;
1323			if (actual >= limit) {
1324				return (actual);
1325			}
1326		}
1327	}
1328	return (actual);
1329}
1330
1331static size_t
1332sctp_fill_up_addresses(struct sctp_inpcb *inp,
1333    struct sctp_tcb *stcb,
1334    size_t limit,
1335    struct sockaddr_storage *sas)
1336{
1337	size_t size = 0;
1338
1339	SCTP_IPI_ADDR_RLOCK();
1340	/* fill up addresses for the endpoint's default vrf */
1341	size = sctp_fill_up_addresses_vrf(inp, stcb, limit, sas,
1342	    inp->def_vrf_id);
1343	SCTP_IPI_ADDR_RUNLOCK();
1344	return (size);
1345}
1346
1347/*
1348 * NOTE: assumes addr lock is held
1349 */
1350static int
1351sctp_count_max_addresses_vrf(struct sctp_inpcb *inp, uint32_t vrf_id)
1352{
1353	int cnt = 0;
1354	struct sctp_vrf *vrf = NULL;
1355
1356	/*
1357	 * In both sub-set bound an bound_all cases we return the MAXIMUM
1358	 * number of addresses that you COULD get. In reality the sub-set
1359	 * bound may have an exclusion list for a given TCB OR in the
1360	 * bound-all case a TCB may NOT include the loopback or other
1361	 * addresses as well.
1362	 */
1363	vrf = sctp_find_vrf(vrf_id);
1364	if (vrf == NULL) {
1365		return (0);
1366	}
1367	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1368		struct sctp_ifn *sctp_ifn;
1369		struct sctp_ifa *sctp_ifa;
1370
1371		LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
1372			LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
1373				/* Count them if they are the right type */
1374				switch (sctp_ifa->address.sa.sa_family) {
1375#ifdef INET
1376				case AF_INET:
1377#ifdef INET6
1378					if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4))
1379						cnt += sizeof(struct sockaddr_in6);
1380					else
1381						cnt += sizeof(struct sockaddr_in);
1382#else
1383					cnt += sizeof(struct sockaddr_in);
1384#endif
1385					break;
1386#endif
1387#ifdef INET6
1388				case AF_INET6:
1389					cnt += sizeof(struct sockaddr_in6);
1390					break;
1391#endif
1392				default:
1393					break;
1394				}
1395			}
1396		}
1397	} else {
1398		struct sctp_laddr *laddr;
1399
1400		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
1401			switch (laddr->ifa->address.sa.sa_family) {
1402#ifdef INET
1403			case AF_INET:
1404#ifdef INET6
1405				if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4))
1406					cnt += sizeof(struct sockaddr_in6);
1407				else
1408					cnt += sizeof(struct sockaddr_in);
1409#else
1410				cnt += sizeof(struct sockaddr_in);
1411#endif
1412				break;
1413#endif
1414#ifdef INET6
1415			case AF_INET6:
1416				cnt += sizeof(struct sockaddr_in6);
1417				break;
1418#endif
1419			default:
1420				break;
1421			}
1422		}
1423	}
1424	return (cnt);
1425}
1426
1427static int
1428sctp_count_max_addresses(struct sctp_inpcb *inp)
1429{
1430	int cnt = 0;
1431
1432	SCTP_IPI_ADDR_RLOCK();
1433	/* count addresses for the endpoint's default VRF */
1434	cnt = sctp_count_max_addresses_vrf(inp, inp->def_vrf_id);
1435	SCTP_IPI_ADDR_RUNLOCK();
1436	return (cnt);
1437}
1438
1439static int
1440sctp_do_connect_x(struct socket *so, struct sctp_inpcb *inp, void *optval,
1441    size_t optsize, void *p, int delay)
1442{
1443	int error = 0;
1444	int creat_lock_on = 0;
1445	struct sctp_tcb *stcb = NULL;
1446	struct sockaddr *sa;
1447	int num_v6 = 0, num_v4 = 0, *totaddrp, totaddr;
1448	uint32_t vrf_id;
1449	int bad_addresses = 0;
1450	sctp_assoc_t *a_id;
1451
1452	SCTPDBG(SCTP_DEBUG_PCB1, "Connectx called\n");
1453
1454	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
1455	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
1456		/* We are already connected AND the TCP model */
1457		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
1458		return (EADDRINUSE);
1459	}
1460	if ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) &&
1461	    (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE))) {
1462		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1463		return (EINVAL);
1464	}
1465	if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
1466		SCTP_INP_RLOCK(inp);
1467		stcb = LIST_FIRST(&inp->sctp_asoc_list);
1468		SCTP_INP_RUNLOCK(inp);
1469	}
1470	if (stcb) {
1471		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
1472		return (EALREADY);
1473	}
1474	SCTP_INP_INCR_REF(inp);
1475	SCTP_ASOC_CREATE_LOCK(inp);
1476	creat_lock_on = 1;
1477	if ((inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) ||
1478	    (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE)) {
1479		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EFAULT);
1480		error = EFAULT;
1481		goto out_now;
1482	}
1483	totaddrp = (int *)optval;
1484	totaddr = *totaddrp;
1485	sa = (struct sockaddr *)(totaddrp + 1);
1486	stcb = sctp_connectx_helper_find(inp, sa, &totaddr, &num_v4, &num_v6, &error, (optsize - sizeof(int)), &bad_addresses);
1487	if ((stcb != NULL) || bad_addresses) {
1488		/* Already have or am bring up an association */
1489		SCTP_ASOC_CREATE_UNLOCK(inp);
1490		creat_lock_on = 0;
1491		if (stcb)
1492			SCTP_TCB_UNLOCK(stcb);
1493		if (bad_addresses == 0) {
1494			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
1495			error = EALREADY;
1496		}
1497		goto out_now;
1498	}
1499#ifdef INET6
1500	if (((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) &&
1501	    (num_v6 > 0)) {
1502		error = EINVAL;
1503		goto out_now;
1504	}
1505	if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
1506	    (num_v4 > 0)) {
1507		struct in6pcb *inp6;
1508
1509		inp6 = (struct in6pcb *)inp;
1510		if (SCTP_IPV6_V6ONLY(inp6)) {
1511			/*
1512			 * if IPV6_V6ONLY flag, ignore connections destined
1513			 * to a v4 addr or v4-mapped addr
1514			 */
1515			SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1516			error = EINVAL;
1517			goto out_now;
1518		}
1519	}
1520#endif				/* INET6 */
1521	if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) ==
1522	    SCTP_PCB_FLAGS_UNBOUND) {
1523		/* Bind a ephemeral port */
1524		error = sctp_inpcb_bind(so, NULL, NULL, p);
1525		if (error) {
1526			goto out_now;
1527		}
1528	}
1529	/* FIX ME: do we want to pass in a vrf on the connect call? */
1530	vrf_id = inp->def_vrf_id;
1531
1532
1533	/* We are GOOD to go */
1534	stcb = sctp_aloc_assoc(inp, sa, &error, 0, vrf_id,
1535	    (struct thread *)p
1536	    );
1537	if (stcb == NULL) {
1538		/* Gak! no memory */
1539		goto out_now;
1540	}
1541	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
1542		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
1543		/* Set the connected flag so we can queue data */
1544		soisconnecting(so);
1545	}
1546	SCTP_SET_STATE(&stcb->asoc, SCTP_STATE_COOKIE_WAIT);
1547	/* move to second address */
1548	switch (sa->sa_family) {
1549#ifdef INET
1550	case AF_INET:
1551		sa = (struct sockaddr *)((caddr_t)sa + sizeof(struct sockaddr_in));
1552		break;
1553#endif
1554#ifdef INET6
1555	case AF_INET6:
1556		sa = (struct sockaddr *)((caddr_t)sa + sizeof(struct sockaddr_in6));
1557		break;
1558#endif
1559	default:
1560		break;
1561	}
1562
1563	error = 0;
1564	sctp_connectx_helper_add(stcb, sa, (totaddr - 1), &error);
1565	/* Fill in the return id */
1566	if (error) {
1567		(void)sctp_free_assoc(inp, stcb, SCTP_PCBFREE_FORCE, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_6);
1568		goto out_now;
1569	}
1570	a_id = (sctp_assoc_t *) optval;
1571	*a_id = sctp_get_associd(stcb);
1572
1573	/* initialize authentication parameters for the assoc */
1574	sctp_initialize_auth_params(inp, stcb);
1575
1576	if (delay) {
1577		/* doing delayed connection */
1578		stcb->asoc.delayed_connection = 1;
1579		sctp_timer_start(SCTP_TIMER_TYPE_INIT, inp, stcb, stcb->asoc.primary_destination);
1580	} else {
1581		(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
1582		sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
1583	}
1584	SCTP_TCB_UNLOCK(stcb);
1585	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
1586		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
1587		/* Set the connected flag so we can queue data */
1588		soisconnecting(so);
1589	}
1590out_now:
1591	if (creat_lock_on) {
1592		SCTP_ASOC_CREATE_UNLOCK(inp);
1593	}
1594	SCTP_INP_DECR_REF(inp);
1595	return (error);
1596}
1597
1598#define SCTP_FIND_STCB(inp, stcb, assoc_id) { \
1599	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||\
1600	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) { \
1601		SCTP_INP_RLOCK(inp); \
1602		stcb = LIST_FIRST(&inp->sctp_asoc_list); \
1603		if (stcb) { \
1604			SCTP_TCB_LOCK(stcb); \
1605                } \
1606		SCTP_INP_RUNLOCK(inp); \
1607	} else if (assoc_id > SCTP_ALL_ASSOC) { \
1608		stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1); \
1609		if (stcb == NULL) { \
1610		        SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT); \
1611			error = ENOENT; \
1612			break; \
1613		} \
1614	} else { \
1615		stcb = NULL; \
1616        } \
1617  }
1618
1619
1620#define SCTP_CHECK_AND_CAST(destp, srcp, type, size) {\
1621	if (size < sizeof(type)) { \
1622		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL); \
1623		error = EINVAL; \
1624		break; \
1625	} else { \
1626		destp = (type *)srcp; \
1627	} \
1628      }
1629
1630static int
1631sctp_getopt(struct socket *so, int optname, void *optval, size_t *optsize,
1632    void *p)
1633{
1634	struct sctp_inpcb *inp = NULL;
1635	int error, val = 0;
1636	struct sctp_tcb *stcb = NULL;
1637
1638	if (optval == NULL) {
1639		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1640		return (EINVAL);
1641	}
1642	inp = (struct sctp_inpcb *)so->so_pcb;
1643	if (inp == NULL) {
1644		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1645		return EINVAL;
1646	}
1647	error = 0;
1648
1649	switch (optname) {
1650	case SCTP_NODELAY:
1651	case SCTP_AUTOCLOSE:
1652	case SCTP_EXPLICIT_EOR:
1653	case SCTP_AUTO_ASCONF:
1654	case SCTP_DISABLE_FRAGMENTS:
1655	case SCTP_I_WANT_MAPPED_V4_ADDR:
1656	case SCTP_USE_EXT_RCVINFO:
1657		SCTP_INP_RLOCK(inp);
1658		switch (optname) {
1659		case SCTP_DISABLE_FRAGMENTS:
1660			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NO_FRAGMENT);
1661			break;
1662		case SCTP_I_WANT_MAPPED_V4_ADDR:
1663			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4);
1664			break;
1665		case SCTP_AUTO_ASCONF:
1666			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1667				/* only valid for bound all sockets */
1668				val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTO_ASCONF);
1669			} else {
1670				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1671				error = EINVAL;
1672				goto flags_out;
1673			}
1674			break;
1675		case SCTP_EXPLICIT_EOR:
1676			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_EXPLICIT_EOR);
1677			break;
1678		case SCTP_NODELAY:
1679			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NODELAY);
1680			break;
1681		case SCTP_USE_EXT_RCVINFO:
1682			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_EXT_RCVINFO);
1683			break;
1684		case SCTP_AUTOCLOSE:
1685			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTOCLOSE))
1686				val = TICKS_TO_SEC(inp->sctp_ep.auto_close_time);
1687			else
1688				val = 0;
1689			break;
1690
1691		default:
1692			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
1693			error = ENOPROTOOPT;
1694		}		/* end switch (sopt->sopt_name) */
1695		if (*optsize < sizeof(val)) {
1696			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1697			error = EINVAL;
1698		}
1699flags_out:
1700		SCTP_INP_RUNLOCK(inp);
1701		if (error == 0) {
1702			/* return the option value */
1703			*(int *)optval = val;
1704			*optsize = sizeof(val);
1705		}
1706		break;
1707	case SCTP_GET_PACKET_LOG:
1708		{
1709#ifdef  SCTP_PACKET_LOGGING
1710			uint8_t *target;
1711			int ret;
1712
1713			SCTP_CHECK_AND_CAST(target, optval, uint8_t, *optsize);
1714			ret = sctp_copy_out_packet_log(target, (int)*optsize);
1715			*optsize = ret;
1716#else
1717			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
1718			error = EOPNOTSUPP;
1719#endif
1720			break;
1721		}
1722	case SCTP_REUSE_PORT:
1723		{
1724			uint32_t *value;
1725
1726			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE)) {
1727				/* Can't do this for a 1-m socket */
1728				error = EINVAL;
1729				break;
1730			}
1731			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1732			*value = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE);
1733			*optsize = sizeof(uint32_t);
1734			break;
1735		}
1736	case SCTP_PARTIAL_DELIVERY_POINT:
1737		{
1738			uint32_t *value;
1739
1740			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1741			*value = inp->partial_delivery_point;
1742			*optsize = sizeof(uint32_t);
1743			break;
1744		}
1745	case SCTP_FRAGMENT_INTERLEAVE:
1746		{
1747			uint32_t *value;
1748
1749			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1750			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE)) {
1751				if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS)) {
1752					*value = SCTP_FRAG_LEVEL_2;
1753				} else {
1754					*value = SCTP_FRAG_LEVEL_1;
1755				}
1756			} else {
1757				*value = SCTP_FRAG_LEVEL_0;
1758			}
1759			*optsize = sizeof(uint32_t);
1760			break;
1761		}
1762	case SCTP_CMT_ON_OFF:
1763		{
1764			struct sctp_assoc_value *av;
1765
1766			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1767			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1768			if (stcb) {
1769				av->assoc_value = stcb->asoc.sctp_cmt_on_off;
1770				SCTP_TCB_UNLOCK(stcb);
1771			} else {
1772				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1773				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1774				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1775					SCTP_INP_RLOCK(inp);
1776					av->assoc_value = inp->sctp_cmt_on_off;
1777					SCTP_INP_RUNLOCK(inp);
1778				} else {
1779					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1780					error = EINVAL;
1781				}
1782			}
1783			if (error == 0) {
1784				*optsize = sizeof(struct sctp_assoc_value);
1785			}
1786			break;
1787		}
1788	case SCTP_PLUGGABLE_CC:
1789		{
1790			struct sctp_assoc_value *av;
1791
1792			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1793			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1794			if (stcb) {
1795				av->assoc_value = stcb->asoc.congestion_control_module;
1796				SCTP_TCB_UNLOCK(stcb);
1797			} else {
1798				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1799				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1800				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1801					SCTP_INP_RLOCK(inp);
1802					av->assoc_value = inp->sctp_ep.sctp_default_cc_module;
1803					SCTP_INP_RUNLOCK(inp);
1804				} else {
1805					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1806					error = EINVAL;
1807				}
1808			}
1809			if (error == 0) {
1810				*optsize = sizeof(struct sctp_assoc_value);
1811			}
1812			break;
1813		}
1814	case SCTP_CC_OPTION:
1815		{
1816			struct sctp_cc_option *cc_opt;
1817
1818			SCTP_CHECK_AND_CAST(cc_opt, optval, struct sctp_cc_option, *optsize);
1819			SCTP_FIND_STCB(inp, stcb, cc_opt->aid_value.assoc_id);
1820			if (stcb == NULL) {
1821				error = EINVAL;
1822			} else {
1823				if (stcb->asoc.cc_functions.sctp_cwnd_socket_option == NULL) {
1824					error = ENOTSUP;
1825				} else {
1826					error = (*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 0, cc_opt);
1827					*optsize = sizeof(struct sctp_cc_option);
1828				}
1829				SCTP_TCB_UNLOCK(stcb);
1830			}
1831			break;
1832		}
1833	case SCTP_PLUGGABLE_SS:
1834		{
1835			struct sctp_assoc_value *av;
1836
1837			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1838			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1839			if (stcb) {
1840				av->assoc_value = stcb->asoc.stream_scheduling_module;
1841				SCTP_TCB_UNLOCK(stcb);
1842			} else {
1843				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1844				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1845				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1846					SCTP_INP_RLOCK(inp);
1847					av->assoc_value = inp->sctp_ep.sctp_default_ss_module;
1848					SCTP_INP_RUNLOCK(inp);
1849				} else {
1850					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1851					error = EINVAL;
1852				}
1853			}
1854			if (error == 0) {
1855				*optsize = sizeof(struct sctp_assoc_value);
1856			}
1857			break;
1858		}
1859	case SCTP_SS_VALUE:
1860		{
1861			struct sctp_stream_value *av;
1862
1863			SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, *optsize);
1864			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1865			if (stcb) {
1866				if ((av->stream_id >= stcb->asoc.streamoutcnt) ||
1867				    (stcb->asoc.ss_functions.sctp_ss_get_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id],
1868				    &av->stream_value) < 0)) {
1869					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1870					error = EINVAL;
1871				} else {
1872					*optsize = sizeof(struct sctp_stream_value);
1873				}
1874				SCTP_TCB_UNLOCK(stcb);
1875			} else {
1876				/*
1877				 * Can't get stream value without
1878				 * association
1879				 */
1880				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1881				error = EINVAL;
1882			}
1883			break;
1884		}
1885	case SCTP_GET_ADDR_LEN:
1886		{
1887			struct sctp_assoc_value *av;
1888
1889			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1890			error = EINVAL;
1891#ifdef INET
1892			if (av->assoc_value == AF_INET) {
1893				av->assoc_value = sizeof(struct sockaddr_in);
1894				error = 0;
1895			}
1896#endif
1897#ifdef INET6
1898			if (av->assoc_value == AF_INET6) {
1899				av->assoc_value = sizeof(struct sockaddr_in6);
1900				error = 0;
1901			}
1902#endif
1903			if (error) {
1904				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1905			} else {
1906				*optsize = sizeof(struct sctp_assoc_value);
1907			}
1908			break;
1909		}
1910	case SCTP_GET_ASSOC_NUMBER:
1911		{
1912			uint32_t *value, cnt;
1913
1914			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1915			cnt = 0;
1916			SCTP_INP_RLOCK(inp);
1917			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
1918				cnt++;
1919			}
1920			SCTP_INP_RUNLOCK(inp);
1921			*value = cnt;
1922			*optsize = sizeof(uint32_t);
1923			break;
1924		}
1925	case SCTP_GET_ASSOC_ID_LIST:
1926		{
1927			struct sctp_assoc_ids *ids;
1928			unsigned int at, limit;
1929
1930			SCTP_CHECK_AND_CAST(ids, optval, struct sctp_assoc_ids, *optsize);
1931			at = 0;
1932			limit = (*optsize - sizeof(uint32_t)) / sizeof(sctp_assoc_t);
1933			SCTP_INP_RLOCK(inp);
1934			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
1935				if (at < limit) {
1936					ids->gaids_assoc_id[at++] = sctp_get_associd(stcb);
1937				} else {
1938					error = EINVAL;
1939					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1940					break;
1941				}
1942			}
1943			SCTP_INP_RUNLOCK(inp);
1944			if (error == 0) {
1945				ids->gaids_number_of_ids = at;
1946				*optsize = ((at * sizeof(sctp_assoc_t)) + sizeof(uint32_t));
1947			}
1948			break;
1949		}
1950	case SCTP_CONTEXT:
1951		{
1952			struct sctp_assoc_value *av;
1953
1954			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1955			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1956
1957			if (stcb) {
1958				av->assoc_value = stcb->asoc.context;
1959				SCTP_TCB_UNLOCK(stcb);
1960			} else {
1961				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1962				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1963				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1964					SCTP_INP_RLOCK(inp);
1965					av->assoc_value = inp->sctp_context;
1966					SCTP_INP_RUNLOCK(inp);
1967				} else {
1968					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1969					error = EINVAL;
1970				}
1971			}
1972			if (error == 0) {
1973				*optsize = sizeof(struct sctp_assoc_value);
1974			}
1975			break;
1976		}
1977	case SCTP_VRF_ID:
1978		{
1979			uint32_t *default_vrfid;
1980
1981			SCTP_CHECK_AND_CAST(default_vrfid, optval, uint32_t, *optsize);
1982			*default_vrfid = inp->def_vrf_id;
1983			*optsize = sizeof(uint32_t);
1984			break;
1985		}
1986	case SCTP_GET_ASOC_VRF:
1987		{
1988			struct sctp_assoc_value *id;
1989
1990			SCTP_CHECK_AND_CAST(id, optval, struct sctp_assoc_value, *optsize);
1991			SCTP_FIND_STCB(inp, stcb, id->assoc_id);
1992			if (stcb == NULL) {
1993				error = EINVAL;
1994				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1995			} else {
1996				id->assoc_value = stcb->asoc.vrf_id;
1997				*optsize = sizeof(struct sctp_assoc_value);
1998			}
1999			break;
2000		}
2001	case SCTP_GET_VRF_IDS:
2002		{
2003			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
2004			error = EOPNOTSUPP;
2005			break;
2006		}
2007	case SCTP_GET_NONCE_VALUES:
2008		{
2009			struct sctp_get_nonce_values *gnv;
2010
2011			SCTP_CHECK_AND_CAST(gnv, optval, struct sctp_get_nonce_values, *optsize);
2012			SCTP_FIND_STCB(inp, stcb, gnv->gn_assoc_id);
2013
2014			if (stcb) {
2015				gnv->gn_peers_tag = stcb->asoc.peer_vtag;
2016				gnv->gn_local_tag = stcb->asoc.my_vtag;
2017				SCTP_TCB_UNLOCK(stcb);
2018				*optsize = sizeof(struct sctp_get_nonce_values);
2019			} else {
2020				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2021				error = ENOTCONN;
2022			}
2023			break;
2024		}
2025	case SCTP_DELAYED_SACK:
2026		{
2027			struct sctp_sack_info *sack;
2028
2029			SCTP_CHECK_AND_CAST(sack, optval, struct sctp_sack_info, *optsize);
2030			SCTP_FIND_STCB(inp, stcb, sack->sack_assoc_id);
2031			if (stcb) {
2032				sack->sack_delay = stcb->asoc.delayed_ack;
2033				sack->sack_freq = stcb->asoc.sack_freq;
2034				SCTP_TCB_UNLOCK(stcb);
2035			} else {
2036				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2037				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2038				    (sack->sack_assoc_id == SCTP_FUTURE_ASSOC)) {
2039					SCTP_INP_RLOCK(inp);
2040					sack->sack_delay = TICKS_TO_MSEC(inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_RECV]);
2041					sack->sack_freq = inp->sctp_ep.sctp_sack_freq;
2042					SCTP_INP_RUNLOCK(inp);
2043				} else {
2044					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2045					error = EINVAL;
2046				}
2047			}
2048			if (error == 0) {
2049				*optsize = sizeof(struct sctp_sack_info);
2050			}
2051			break;
2052		}
2053	case SCTP_GET_SNDBUF_USE:
2054		{
2055			struct sctp_sockstat *ss;
2056
2057			SCTP_CHECK_AND_CAST(ss, optval, struct sctp_sockstat, *optsize);
2058			SCTP_FIND_STCB(inp, stcb, ss->ss_assoc_id);
2059
2060			if (stcb) {
2061				ss->ss_total_sndbuf = stcb->asoc.total_output_queue_size;
2062				ss->ss_total_recv_buf = (stcb->asoc.size_on_reasm_queue +
2063				    stcb->asoc.size_on_all_streams);
2064				SCTP_TCB_UNLOCK(stcb);
2065				*optsize = sizeof(struct sctp_sockstat);
2066			} else {
2067				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2068				error = ENOTCONN;
2069			}
2070			break;
2071		}
2072	case SCTP_MAX_BURST:
2073		{
2074			struct sctp_assoc_value *av;
2075
2076			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
2077			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
2078
2079			if (stcb) {
2080				av->assoc_value = stcb->asoc.max_burst;
2081				SCTP_TCB_UNLOCK(stcb);
2082			} else {
2083				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2084				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2085				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
2086					SCTP_INP_RLOCK(inp);
2087					av->assoc_value = inp->sctp_ep.max_burst;
2088					SCTP_INP_RUNLOCK(inp);
2089				} else {
2090					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2091					error = EINVAL;
2092				}
2093			}
2094			if (error == 0) {
2095				*optsize = sizeof(struct sctp_assoc_value);
2096			}
2097			break;
2098		}
2099	case SCTP_MAXSEG:
2100		{
2101			struct sctp_assoc_value *av;
2102			int ovh;
2103
2104			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
2105			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
2106
2107			if (stcb) {
2108				av->assoc_value = sctp_get_frag_point(stcb, &stcb->asoc);
2109				SCTP_TCB_UNLOCK(stcb);
2110			} else {
2111				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2112				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2113				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
2114					SCTP_INP_RLOCK(inp);
2115					if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
2116						ovh = SCTP_MED_OVERHEAD;
2117					} else {
2118						ovh = SCTP_MED_V4_OVERHEAD;
2119					}
2120					if (inp->sctp_frag_point >= SCTP_DEFAULT_MAXSEGMENT)
2121						av->assoc_value = 0;
2122					else
2123						av->assoc_value = inp->sctp_frag_point - ovh;
2124					SCTP_INP_RUNLOCK(inp);
2125				} else {
2126					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2127					error = EINVAL;
2128				}
2129			}
2130			if (error == 0) {
2131				*optsize = sizeof(struct sctp_assoc_value);
2132			}
2133			break;
2134		}
2135	case SCTP_GET_STAT_LOG:
2136		error = sctp_fill_stat_log(optval, optsize);
2137		break;
2138	case SCTP_EVENTS:
2139		{
2140			struct sctp_event_subscribe *events;
2141
2142			SCTP_CHECK_AND_CAST(events, optval, struct sctp_event_subscribe, *optsize);
2143			memset(events, 0, sizeof(struct sctp_event_subscribe));
2144			SCTP_INP_RLOCK(inp);
2145			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT))
2146				events->sctp_data_io_event = 1;
2147
2148			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT))
2149				events->sctp_association_event = 1;
2150
2151			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVPADDREVNT))
2152				events->sctp_address_event = 1;
2153
2154			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT))
2155				events->sctp_send_failure_event = 1;
2156
2157			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVPEERERR))
2158				events->sctp_peer_error_event = 1;
2159
2160			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT))
2161				events->sctp_shutdown_event = 1;
2162
2163			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PDAPIEVNT))
2164				events->sctp_partial_delivery_event = 1;
2165
2166			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT))
2167				events->sctp_adaptation_layer_event = 1;
2168
2169			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTHEVNT))
2170				events->sctp_authentication_event = 1;
2171
2172			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DRYEVNT))
2173				events->sctp_sender_dry_event = 1;
2174
2175			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT))
2176				events->sctp_stream_reset_event = 1;
2177			SCTP_INP_RUNLOCK(inp);
2178			*optsize = sizeof(struct sctp_event_subscribe);
2179			break;
2180		}
2181	case SCTP_ADAPTATION_LAYER:
2182		{
2183			uint32_t *value;
2184
2185			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2186
2187			SCTP_INP_RLOCK(inp);
2188			*value = inp->sctp_ep.adaptation_layer_indicator;
2189			SCTP_INP_RUNLOCK(inp);
2190			*optsize = sizeof(uint32_t);
2191			break;
2192		}
2193	case SCTP_SET_INITIAL_DBG_SEQ:
2194		{
2195			uint32_t *value;
2196
2197			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2198			SCTP_INP_RLOCK(inp);
2199			*value = inp->sctp_ep.initial_sequence_debug;
2200			SCTP_INP_RUNLOCK(inp);
2201			*optsize = sizeof(uint32_t);
2202			break;
2203		}
2204	case SCTP_GET_LOCAL_ADDR_SIZE:
2205		{
2206			uint32_t *value;
2207
2208			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2209			SCTP_INP_RLOCK(inp);
2210			*value = sctp_count_max_addresses(inp);
2211			SCTP_INP_RUNLOCK(inp);
2212			*optsize = sizeof(uint32_t);
2213			break;
2214		}
2215	case SCTP_GET_REMOTE_ADDR_SIZE:
2216		{
2217			uint32_t *value;
2218			size_t size;
2219			struct sctp_nets *net;
2220
2221			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2222			/* FIXME MT: change to sctp_assoc_value? */
2223			SCTP_FIND_STCB(inp, stcb, (sctp_assoc_t) * value);
2224
2225			if (stcb) {
2226				size = 0;
2227				/* Count the sizes */
2228				TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
2229					switch (net->ro._l_addr.sa.sa_family) {
2230#ifdef INET
2231					case AF_INET:
2232#ifdef INET6
2233						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2234							size += sizeof(struct sockaddr_in6);
2235						} else {
2236							size += sizeof(struct sockaddr_in);
2237						}
2238#else
2239						size += sizeof(struct sockaddr_in);
2240#endif
2241						break;
2242#endif
2243#ifdef INET6
2244					case AF_INET6:
2245						size += sizeof(struct sockaddr_in6);
2246						break;
2247#endif
2248					default:
2249						break;
2250					}
2251				}
2252				SCTP_TCB_UNLOCK(stcb);
2253				*value = (uint32_t) size;
2254				*optsize = sizeof(uint32_t);
2255			} else {
2256				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2257				error = ENOTCONN;
2258			}
2259			break;
2260		}
2261	case SCTP_GET_PEER_ADDRESSES:
2262		/*
2263		 * Get the address information, an array is passed in to
2264		 * fill up we pack it.
2265		 */
2266		{
2267			size_t cpsz, left;
2268			struct sockaddr_storage *sas;
2269			struct sctp_nets *net;
2270			struct sctp_getaddresses *saddr;
2271
2272			SCTP_CHECK_AND_CAST(saddr, optval, struct sctp_getaddresses, *optsize);
2273			SCTP_FIND_STCB(inp, stcb, saddr->sget_assoc_id);
2274
2275			if (stcb) {
2276				left = (*optsize) - sizeof(struct sctp_getaddresses);
2277				*optsize = sizeof(struct sctp_getaddresses);
2278				sas = (struct sockaddr_storage *)&saddr->addr[0];
2279
2280				TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
2281					switch (net->ro._l_addr.sa.sa_family) {
2282#ifdef INET
2283					case AF_INET:
2284#ifdef INET6
2285						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2286							cpsz = sizeof(struct sockaddr_in6);
2287						} else {
2288							cpsz = sizeof(struct sockaddr_in);
2289						}
2290#else
2291						cpsz = sizeof(struct sockaddr_in);
2292#endif
2293						break;
2294#endif
2295#ifdef INET6
2296					case AF_INET6:
2297						cpsz = sizeof(struct sockaddr_in6);
2298						break;
2299#endif
2300					default:
2301						cpsz = 0;
2302						break;
2303					}
2304					if (cpsz == 0) {
2305						break;
2306					}
2307					if (left < cpsz) {
2308						/* not enough room. */
2309						break;
2310					}
2311#if defined(INET) && defined(INET6)
2312					if ((sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) &&
2313					    (net->ro._l_addr.sa.sa_family == AF_INET)) {
2314						/* Must map the address */
2315						in6_sin_2_v4mapsin6(&net->ro._l_addr.sin,
2316						    (struct sockaddr_in6 *)sas);
2317					} else {
2318						memcpy(sas, &net->ro._l_addr, cpsz);
2319					}
2320#else
2321					memcpy(sas, &net->ro._l_addr, cpsz);
2322#endif
2323					((struct sockaddr_in *)sas)->sin_port = stcb->rport;
2324
2325					sas = (struct sockaddr_storage *)((caddr_t)sas + cpsz);
2326					left -= cpsz;
2327					*optsize += cpsz;
2328				}
2329				SCTP_TCB_UNLOCK(stcb);
2330			} else {
2331				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
2332				error = ENOENT;
2333			}
2334			break;
2335		}
2336	case SCTP_GET_LOCAL_ADDRESSES:
2337		{
2338			size_t limit, actual;
2339			struct sockaddr_storage *sas;
2340			struct sctp_getaddresses *saddr;
2341
2342			SCTP_CHECK_AND_CAST(saddr, optval, struct sctp_getaddresses, *optsize);
2343			SCTP_FIND_STCB(inp, stcb, saddr->sget_assoc_id);
2344
2345			sas = (struct sockaddr_storage *)&saddr->addr[0];
2346			limit = *optsize - sizeof(sctp_assoc_t);
2347			actual = sctp_fill_up_addresses(inp, stcb, limit, sas);
2348			if (stcb) {
2349				SCTP_TCB_UNLOCK(stcb);
2350			}
2351			*optsize = sizeof(struct sockaddr_storage) + actual;
2352			break;
2353		}
2354	case SCTP_PEER_ADDR_PARAMS:
2355		{
2356			struct sctp_paddrparams *paddrp;
2357			struct sctp_nets *net;
2358			struct sockaddr *addr;
2359
2360#if defined(INET) && defined(INET6)
2361			struct sockaddr_in sin_store;
2362
2363#endif
2364
2365			SCTP_CHECK_AND_CAST(paddrp, optval, struct sctp_paddrparams, *optsize);
2366			SCTP_FIND_STCB(inp, stcb, paddrp->spp_assoc_id);
2367
2368#if defined(INET) && defined(INET6)
2369			if (paddrp->spp_address.ss_family == AF_INET6) {
2370				struct sockaddr_in6 *sin6;
2371
2372				sin6 = (struct sockaddr_in6 *)&paddrp->spp_address;
2373				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
2374					in6_sin6_2_sin(&sin_store, sin6);
2375					addr = (struct sockaddr *)&sin_store;
2376				} else {
2377					addr = (struct sockaddr *)&paddrp->spp_address;
2378				}
2379			} else {
2380				addr = (struct sockaddr *)&paddrp->spp_address;
2381			}
2382#else
2383			addr = (struct sockaddr *)&paddrp->spp_address;
2384#endif
2385			if (stcb != NULL) {
2386				net = sctp_findnet(stcb, addr);
2387			} else {
2388				/*
2389				 * We increment here since
2390				 * sctp_findassociation_ep_addr() wil do a
2391				 * decrement if it finds the stcb as long as
2392				 * the locked tcb (last argument) is NOT a
2393				 * TCB.. aka NULL.
2394				 */
2395				net = NULL;
2396				SCTP_INP_INCR_REF(inp);
2397				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
2398				if (stcb == NULL) {
2399					SCTP_INP_DECR_REF(inp);
2400				}
2401			}
2402			if ((stcb != NULL) && (net == NULL)) {
2403#ifdef INET
2404				if (addr->sa_family == AF_INET) {
2405					struct sockaddr_in *sin;
2406
2407					sin = (struct sockaddr_in *)addr;
2408					if (sin->sin_addr.s_addr != INADDR_ANY) {
2409						error = EINVAL;
2410						SCTP_TCB_UNLOCK(stcb);
2411						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2412						break;
2413					}
2414				} else
2415#endif
2416#ifdef INET6
2417				if (addr->sa_family == AF_INET6) {
2418					struct sockaddr_in6 *sin6;
2419
2420					sin6 = (struct sockaddr_in6 *)addr;
2421					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2422						error = EINVAL;
2423						SCTP_TCB_UNLOCK(stcb);
2424						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2425						break;
2426					}
2427				} else
2428#endif
2429				{
2430					error = EAFNOSUPPORT;
2431					SCTP_TCB_UNLOCK(stcb);
2432					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2433					break;
2434				}
2435			}
2436			if (stcb != NULL) {
2437				/* Applies to the specific association */
2438				paddrp->spp_flags = 0;
2439				if (net != NULL) {
2440					int ovh;
2441
2442					if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
2443						ovh = SCTP_MED_OVERHEAD;
2444					} else {
2445						ovh = SCTP_MED_V4_OVERHEAD;
2446					}
2447
2448					paddrp->spp_hbinterval = net->heart_beat_delay;
2449					paddrp->spp_pathmaxrxt = net->failure_threshold;
2450					paddrp->spp_pathmtu = net->mtu - ovh;
2451					/* get flags for HB */
2452					if (net->dest_state & SCTP_ADDR_NOHB) {
2453						paddrp->spp_flags |= SPP_HB_DISABLE;
2454					} else {
2455						paddrp->spp_flags |= SPP_HB_ENABLE;
2456					}
2457					/* get flags for PMTU */
2458					if (net->dest_state & SCTP_ADDR_NO_PMTUD) {
2459						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2460					} else {
2461						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2462					}
2463					if (net->dscp & 0x01) {
2464						paddrp->spp_dscp = net->dscp & 0xfc;
2465						paddrp->spp_flags |= SPP_DSCP;
2466					}
2467#ifdef INET6
2468					if ((net->ro._l_addr.sa.sa_family == AF_INET6) &&
2469					    (net->flowlabel & 0x80000000)) {
2470						paddrp->spp_ipv6_flowlabel = net->flowlabel & 0x000fffff;
2471						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2472					}
2473#endif
2474				} else {
2475					/*
2476					 * No destination so return default
2477					 * value
2478					 */
2479					paddrp->spp_pathmaxrxt = stcb->asoc.def_net_failure;
2480					paddrp->spp_pathmtu = sctp_get_frag_point(stcb, &stcb->asoc);
2481					if (stcb->asoc.default_dscp & 0x01) {
2482						paddrp->spp_dscp = stcb->asoc.default_dscp & 0xfc;
2483						paddrp->spp_flags |= SPP_DSCP;
2484					}
2485#ifdef INET6
2486					if (stcb->asoc.default_flowlabel & 0x80000000) {
2487						paddrp->spp_ipv6_flowlabel = stcb->asoc.default_flowlabel & 0x000fffff;
2488						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2489					}
2490#endif
2491					/* default settings should be these */
2492					if (sctp_stcb_is_feature_on(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT)) {
2493						paddrp->spp_flags |= SPP_HB_DISABLE;
2494					} else {
2495						paddrp->spp_flags |= SPP_HB_ENABLE;
2496					}
2497					if (sctp_stcb_is_feature_on(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD)) {
2498						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2499					} else {
2500						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2501					}
2502					paddrp->spp_hbinterval = stcb->asoc.heart_beat_delay;
2503				}
2504				paddrp->spp_assoc_id = sctp_get_associd(stcb);
2505				SCTP_TCB_UNLOCK(stcb);
2506			} else {
2507				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2508				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2509				    (paddrp->spp_assoc_id == SCTP_FUTURE_ASSOC)) {
2510					/* Use endpoint defaults */
2511					SCTP_INP_RLOCK(inp);
2512					paddrp->spp_pathmaxrxt = inp->sctp_ep.def_net_failure;
2513					paddrp->spp_hbinterval = TICKS_TO_MSEC(inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT]);
2514					paddrp->spp_assoc_id = SCTP_FUTURE_ASSOC;
2515					/* get inp's default */
2516					if (inp->sctp_ep.default_dscp & 0x01) {
2517						paddrp->spp_dscp = inp->sctp_ep.default_dscp & 0xfc;
2518						paddrp->spp_flags |= SPP_DSCP;
2519					}
2520#ifdef INET6
2521					if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
2522					    (inp->sctp_ep.default_flowlabel & 0x80000000)) {
2523						paddrp->spp_ipv6_flowlabel = inp->sctp_ep.default_flowlabel & 0x000fffff;
2524						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2525					}
2526#endif
2527					/* can't return this */
2528					paddrp->spp_pathmtu = 0;
2529
2530					if (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT)) {
2531						paddrp->spp_flags |= SPP_HB_ENABLE;
2532					} else {
2533						paddrp->spp_flags |= SPP_HB_DISABLE;
2534					}
2535					if (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD)) {
2536						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2537					} else {
2538						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2539					}
2540					SCTP_INP_RUNLOCK(inp);
2541				} else {
2542					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2543					error = EINVAL;
2544				}
2545			}
2546			if (error == 0) {
2547				*optsize = sizeof(struct sctp_paddrparams);
2548			}
2549			break;
2550		}
2551	case SCTP_GET_PEER_ADDR_INFO:
2552		{
2553			struct sctp_paddrinfo *paddri;
2554			struct sctp_nets *net;
2555			struct sockaddr *addr;
2556
2557#if defined(INET) && defined(INET6)
2558			struct sockaddr_in sin_store;
2559
2560#endif
2561
2562			SCTP_CHECK_AND_CAST(paddri, optval, struct sctp_paddrinfo, *optsize);
2563			SCTP_FIND_STCB(inp, stcb, paddri->spinfo_assoc_id);
2564
2565#if defined(INET) && defined(INET6)
2566			if (paddri->spinfo_address.ss_family == AF_INET6) {
2567				struct sockaddr_in6 *sin6;
2568
2569				sin6 = (struct sockaddr_in6 *)&paddri->spinfo_address;
2570				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
2571					in6_sin6_2_sin(&sin_store, sin6);
2572					addr = (struct sockaddr *)&sin_store;
2573				} else {
2574					addr = (struct sockaddr *)&paddri->spinfo_address;
2575				}
2576			} else {
2577				addr = (struct sockaddr *)&paddri->spinfo_address;
2578			}
2579#else
2580			addr = (struct sockaddr *)&paddri->spinfo_address;
2581#endif
2582			if (stcb != NULL) {
2583				net = sctp_findnet(stcb, addr);
2584			} else {
2585				/*
2586				 * We increment here since
2587				 * sctp_findassociation_ep_addr() wil do a
2588				 * decrement if it finds the stcb as long as
2589				 * the locked tcb (last argument) is NOT a
2590				 * TCB.. aka NULL.
2591				 */
2592				net = NULL;
2593				SCTP_INP_INCR_REF(inp);
2594				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
2595				if (stcb == NULL) {
2596					SCTP_INP_DECR_REF(inp);
2597				}
2598			}
2599
2600			if ((stcb != NULL) && (net != NULL)) {
2601				if (net->dest_state & SCTP_ADDR_UNCONFIRMED) {
2602					/* It's unconfirmed */
2603					paddri->spinfo_state = SCTP_UNCONFIRMED;
2604				} else if (net->dest_state & SCTP_ADDR_REACHABLE) {
2605					/* It's active */
2606					paddri->spinfo_state = SCTP_ACTIVE;
2607				} else {
2608					/* It's inactive */
2609					paddri->spinfo_state = SCTP_INACTIVE;
2610				}
2611				paddri->spinfo_cwnd = net->cwnd;
2612				paddri->spinfo_srtt = net->lastsa >> SCTP_RTT_SHIFT;
2613				paddri->spinfo_rto = net->RTO;
2614				paddri->spinfo_assoc_id = sctp_get_associd(stcb);
2615				paddri->spinfo_mtu = net->mtu;
2616				SCTP_TCB_UNLOCK(stcb);
2617				*optsize = sizeof(struct sctp_paddrinfo);
2618			} else {
2619				if (stcb != NULL) {
2620					SCTP_TCB_UNLOCK(stcb);
2621				}
2622				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
2623				error = ENOENT;
2624			}
2625			break;
2626		}
2627	case SCTP_PCB_STATUS:
2628		{
2629			struct sctp_pcbinfo *spcb;
2630
2631			SCTP_CHECK_AND_CAST(spcb, optval, struct sctp_pcbinfo, *optsize);
2632			sctp_fill_pcbinfo(spcb);
2633			*optsize = sizeof(struct sctp_pcbinfo);
2634			break;
2635		}
2636	case SCTP_STATUS:
2637		{
2638			struct sctp_nets *net;
2639			struct sctp_status *sstat;
2640
2641			SCTP_CHECK_AND_CAST(sstat, optval, struct sctp_status, *optsize);
2642			SCTP_FIND_STCB(inp, stcb, sstat->sstat_assoc_id);
2643
2644			if (stcb == NULL) {
2645				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2646				error = EINVAL;
2647				break;
2648			}
2649			/*
2650			 * I think passing the state is fine since
2651			 * sctp_constants.h will be available to the user
2652			 * land.
2653			 */
2654			sstat->sstat_state = stcb->asoc.state;
2655			sstat->sstat_assoc_id = sctp_get_associd(stcb);
2656			sstat->sstat_rwnd = stcb->asoc.peers_rwnd;
2657			sstat->sstat_unackdata = stcb->asoc.sent_queue_cnt;
2658			/*
2659			 * We can't include chunks that have been passed to
2660			 * the socket layer. Only things in queue.
2661			 */
2662			sstat->sstat_penddata = (stcb->asoc.cnt_on_reasm_queue +
2663			    stcb->asoc.cnt_on_all_streams);
2664
2665
2666			sstat->sstat_instrms = stcb->asoc.streamincnt;
2667			sstat->sstat_outstrms = stcb->asoc.streamoutcnt;
2668			sstat->sstat_fragmentation_point = sctp_get_frag_point(stcb, &stcb->asoc);
2669			memcpy(&sstat->sstat_primary.spinfo_address,
2670			    &stcb->asoc.primary_destination->ro._l_addr,
2671			    ((struct sockaddr *)(&stcb->asoc.primary_destination->ro._l_addr))->sa_len);
2672			net = stcb->asoc.primary_destination;
2673			((struct sockaddr_in *)&sstat->sstat_primary.spinfo_address)->sin_port = stcb->rport;
2674			/*
2675			 * Again the user can get info from sctp_constants.h
2676			 * for what the state of the network is.
2677			 */
2678			if (net->dest_state & SCTP_ADDR_UNCONFIRMED) {
2679				/* It's unconfirmed */
2680				sstat->sstat_primary.spinfo_state = SCTP_UNCONFIRMED;
2681			} else if (net->dest_state & SCTP_ADDR_REACHABLE) {
2682				/* It's active */
2683				sstat->sstat_primary.spinfo_state = SCTP_ACTIVE;
2684			} else {
2685				/* It's inactive */
2686				sstat->sstat_primary.spinfo_state = SCTP_INACTIVE;
2687			}
2688			sstat->sstat_primary.spinfo_cwnd = net->cwnd;
2689			sstat->sstat_primary.spinfo_srtt = net->lastsa >> SCTP_RTT_SHIFT;
2690			sstat->sstat_primary.spinfo_rto = net->RTO;
2691			sstat->sstat_primary.spinfo_mtu = net->mtu;
2692			sstat->sstat_primary.spinfo_assoc_id = sctp_get_associd(stcb);
2693			SCTP_TCB_UNLOCK(stcb);
2694			*optsize = sizeof(struct sctp_status);
2695			break;
2696		}
2697	case SCTP_RTOINFO:
2698		{
2699			struct sctp_rtoinfo *srto;
2700
2701			SCTP_CHECK_AND_CAST(srto, optval, struct sctp_rtoinfo, *optsize);
2702			SCTP_FIND_STCB(inp, stcb, srto->srto_assoc_id);
2703
2704			if (stcb) {
2705				srto->srto_initial = stcb->asoc.initial_rto;
2706				srto->srto_max = stcb->asoc.maxrto;
2707				srto->srto_min = stcb->asoc.minrto;
2708				SCTP_TCB_UNLOCK(stcb);
2709			} else {
2710				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2711				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2712				    (srto->srto_assoc_id == SCTP_FUTURE_ASSOC)) {
2713					SCTP_INP_RLOCK(inp);
2714					srto->srto_initial = inp->sctp_ep.initial_rto;
2715					srto->srto_max = inp->sctp_ep.sctp_maxrto;
2716					srto->srto_min = inp->sctp_ep.sctp_minrto;
2717					SCTP_INP_RUNLOCK(inp);
2718				} else {
2719					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2720					error = EINVAL;
2721				}
2722			}
2723			if (error == 0) {
2724				*optsize = sizeof(struct sctp_rtoinfo);
2725			}
2726			break;
2727		}
2728	case SCTP_TIMEOUTS:
2729		{
2730			struct sctp_timeouts *stimo;
2731
2732			SCTP_CHECK_AND_CAST(stimo, optval, struct sctp_timeouts, *optsize);
2733			SCTP_FIND_STCB(inp, stcb, stimo->stimo_assoc_id);
2734
2735			if (stcb) {
2736				stimo->stimo_init = stcb->asoc.timoinit;
2737				stimo->stimo_data = stcb->asoc.timodata;
2738				stimo->stimo_sack = stcb->asoc.timosack;
2739				stimo->stimo_shutdown = stcb->asoc.timoshutdown;
2740				stimo->stimo_heartbeat = stcb->asoc.timoheartbeat;
2741				stimo->stimo_cookie = stcb->asoc.timocookie;
2742				stimo->stimo_shutdownack = stcb->asoc.timoshutdownack;
2743				SCTP_TCB_UNLOCK(stcb);
2744				*optsize = sizeof(struct sctp_timeouts);
2745			} else {
2746				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2747				error = EINVAL;
2748			}
2749			break;
2750		}
2751	case SCTP_ASSOCINFO:
2752		{
2753			struct sctp_assocparams *sasoc;
2754
2755			SCTP_CHECK_AND_CAST(sasoc, optval, struct sctp_assocparams, *optsize);
2756			SCTP_FIND_STCB(inp, stcb, sasoc->sasoc_assoc_id);
2757
2758			if (stcb) {
2759				sasoc->sasoc_cookie_life = TICKS_TO_MSEC(stcb->asoc.cookie_life);
2760				sasoc->sasoc_asocmaxrxt = stcb->asoc.max_send_times;
2761				sasoc->sasoc_number_peer_destinations = stcb->asoc.numnets;
2762				sasoc->sasoc_peer_rwnd = stcb->asoc.peers_rwnd;
2763				sasoc->sasoc_local_rwnd = stcb->asoc.my_rwnd;
2764				SCTP_TCB_UNLOCK(stcb);
2765			} else {
2766				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2767				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2768				    (sasoc->sasoc_assoc_id == SCTP_FUTURE_ASSOC)) {
2769					SCTP_INP_RLOCK(inp);
2770					sasoc->sasoc_cookie_life = TICKS_TO_MSEC(inp->sctp_ep.def_cookie_life);
2771					sasoc->sasoc_asocmaxrxt = inp->sctp_ep.max_send_times;
2772					sasoc->sasoc_number_peer_destinations = 0;
2773					sasoc->sasoc_peer_rwnd = 0;
2774					sasoc->sasoc_local_rwnd = sbspace(&inp->sctp_socket->so_rcv);
2775					SCTP_INP_RUNLOCK(inp);
2776				} else {
2777					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2778					error = EINVAL;
2779				}
2780			}
2781			if (error == 0) {
2782				*optsize = sizeof(struct sctp_assocparams);
2783			}
2784			break;
2785		}
2786	case SCTP_DEFAULT_SEND_PARAM:
2787		{
2788			struct sctp_sndrcvinfo *s_info;
2789
2790			SCTP_CHECK_AND_CAST(s_info, optval, struct sctp_sndrcvinfo, *optsize);
2791			SCTP_FIND_STCB(inp, stcb, s_info->sinfo_assoc_id);
2792
2793			if (stcb) {
2794				memcpy(s_info, &stcb->asoc.def_send, sizeof(stcb->asoc.def_send));
2795				SCTP_TCB_UNLOCK(stcb);
2796			} else {
2797				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2798				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2799				    (s_info->sinfo_assoc_id == SCTP_FUTURE_ASSOC)) {
2800					SCTP_INP_RLOCK(inp);
2801					memcpy(s_info, &inp->def_send, sizeof(inp->def_send));
2802					SCTP_INP_RUNLOCK(inp);
2803				} else {
2804					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2805					error = EINVAL;
2806				}
2807			}
2808			if (error == 0) {
2809				*optsize = sizeof(struct sctp_sndrcvinfo);
2810			}
2811			break;
2812		}
2813	case SCTP_INITMSG:
2814		{
2815			struct sctp_initmsg *sinit;
2816
2817			SCTP_CHECK_AND_CAST(sinit, optval, struct sctp_initmsg, *optsize);
2818			SCTP_INP_RLOCK(inp);
2819			sinit->sinit_num_ostreams = inp->sctp_ep.pre_open_stream_count;
2820			sinit->sinit_max_instreams = inp->sctp_ep.max_open_streams_intome;
2821			sinit->sinit_max_attempts = inp->sctp_ep.max_init_times;
2822			sinit->sinit_max_init_timeo = inp->sctp_ep.initial_init_rto_max;
2823			SCTP_INP_RUNLOCK(inp);
2824			*optsize = sizeof(struct sctp_initmsg);
2825			break;
2826		}
2827	case SCTP_PRIMARY_ADDR:
2828		/* we allow a "get" operation on this */
2829		{
2830			struct sctp_setprim *ssp;
2831
2832			SCTP_CHECK_AND_CAST(ssp, optval, struct sctp_setprim, *optsize);
2833			SCTP_FIND_STCB(inp, stcb, ssp->ssp_assoc_id);
2834
2835			if (stcb) {
2836				union sctp_sockstore *addr;
2837
2838				addr = &stcb->asoc.primary_destination->ro._l_addr;
2839				switch (addr->sa.sa_family) {
2840#ifdef INET
2841				case AF_INET:
2842#ifdef INET6
2843					if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2844						in6_sin_2_v4mapsin6(&addr->sin,
2845						    (struct sockaddr_in6 *)&ssp->ssp_addr);
2846					} else {
2847						memcpy(&ssp->ssp_addr, &addr->sin, sizeof(struct sockaddr_in));
2848					}
2849#else
2850					memcpy(&ssp->ssp_addr, &addr->sin, sizeof(struct sockaddr_in));
2851#endif
2852					break;
2853#endif
2854#ifdef INET6
2855				case AF_INET6:
2856					memcpy(&ssp->ssp_addr, &addr->sin6, sizeof(struct sockaddr_in6));
2857					break;
2858#endif
2859				default:
2860					break;
2861				}
2862				SCTP_TCB_UNLOCK(stcb);
2863				*optsize = sizeof(struct sctp_setprim);
2864			} else {
2865				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2866				error = EINVAL;
2867			}
2868			break;
2869		}
2870	case SCTP_HMAC_IDENT:
2871		{
2872			struct sctp_hmacalgo *shmac;
2873			sctp_hmaclist_t *hmaclist;
2874			uint32_t size;
2875			int i;
2876
2877			SCTP_CHECK_AND_CAST(shmac, optval, struct sctp_hmacalgo, *optsize);
2878
2879			SCTP_INP_RLOCK(inp);
2880			hmaclist = inp->sctp_ep.local_hmacs;
2881			if (hmaclist == NULL) {
2882				/* no HMACs to return */
2883				*optsize = sizeof(*shmac);
2884				SCTP_INP_RUNLOCK(inp);
2885				break;
2886			}
2887			/* is there room for all of the hmac ids? */
2888			size = sizeof(*shmac) + (hmaclist->num_algo *
2889			    sizeof(shmac->shmac_idents[0]));
2890			if ((size_t)(*optsize) < size) {
2891				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2892				error = EINVAL;
2893				SCTP_INP_RUNLOCK(inp);
2894				break;
2895			}
2896			/* copy in the list */
2897			shmac->shmac_number_of_idents = hmaclist->num_algo;
2898			for (i = 0; i < hmaclist->num_algo; i++) {
2899				shmac->shmac_idents[i] = hmaclist->hmac[i];
2900			}
2901			SCTP_INP_RUNLOCK(inp);
2902			*optsize = size;
2903			break;
2904		}
2905	case SCTP_AUTH_ACTIVE_KEY:
2906		{
2907			struct sctp_authkeyid *scact;
2908
2909			SCTP_CHECK_AND_CAST(scact, optval, struct sctp_authkeyid, *optsize);
2910			SCTP_FIND_STCB(inp, stcb, scact->scact_assoc_id);
2911
2912			if (stcb) {
2913				/* get the active key on the assoc */
2914				scact->scact_keynumber = stcb->asoc.authinfo.active_keyid;
2915				SCTP_TCB_UNLOCK(stcb);
2916			} else {
2917				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2918				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2919				    (scact->scact_assoc_id == SCTP_FUTURE_ASSOC)) {
2920					/* get the endpoint active key */
2921					SCTP_INP_RLOCK(inp);
2922					scact->scact_keynumber = inp->sctp_ep.default_keyid;
2923					SCTP_INP_RUNLOCK(inp);
2924				} else {
2925					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2926					error = EINVAL;
2927				}
2928			}
2929			if (error == 0) {
2930				*optsize = sizeof(struct sctp_authkeyid);
2931			}
2932			break;
2933		}
2934	case SCTP_LOCAL_AUTH_CHUNKS:
2935		{
2936			struct sctp_authchunks *sac;
2937			sctp_auth_chklist_t *chklist = NULL;
2938			size_t size = 0;
2939
2940			SCTP_CHECK_AND_CAST(sac, optval, struct sctp_authchunks, *optsize);
2941			SCTP_FIND_STCB(inp, stcb, sac->gauth_assoc_id);
2942
2943			if (stcb) {
2944				/* get off the assoc */
2945				chklist = stcb->asoc.local_auth_chunks;
2946				/* is there enough space? */
2947				size = sctp_auth_get_chklist_size(chklist);
2948				if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2949					error = EINVAL;
2950					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2951				} else {
2952					/* copy in the chunks */
2953					(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
2954					sac->gauth_number_of_chunks = (uint32_t) size;
2955					*optsize = sizeof(struct sctp_authchunks) + size;
2956				}
2957				SCTP_TCB_UNLOCK(stcb);
2958			} else {
2959				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2960				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2961				    (sac->gauth_assoc_id == SCTP_FUTURE_ASSOC)) {
2962					/* get off the endpoint */
2963					SCTP_INP_RLOCK(inp);
2964					chklist = inp->sctp_ep.local_auth_chunks;
2965					/* is there enough space? */
2966					size = sctp_auth_get_chklist_size(chklist);
2967					if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2968						error = EINVAL;
2969						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2970					} else {
2971						/* copy in the chunks */
2972						(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
2973						sac->gauth_number_of_chunks = (uint32_t) size;
2974						*optsize = sizeof(struct sctp_authchunks) + size;
2975					}
2976					SCTP_INP_RUNLOCK(inp);
2977				} else {
2978					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2979					error = EINVAL;
2980				}
2981			}
2982			break;
2983		}
2984	case SCTP_PEER_AUTH_CHUNKS:
2985		{
2986			struct sctp_authchunks *sac;
2987			sctp_auth_chklist_t *chklist = NULL;
2988			size_t size = 0;
2989
2990			SCTP_CHECK_AND_CAST(sac, optval, struct sctp_authchunks, *optsize);
2991			SCTP_FIND_STCB(inp, stcb, sac->gauth_assoc_id);
2992
2993			if (stcb) {
2994				/* get off the assoc */
2995				chklist = stcb->asoc.peer_auth_chunks;
2996				/* is there enough space? */
2997				size = sctp_auth_get_chklist_size(chklist);
2998				if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2999					error = EINVAL;
3000					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3001				} else {
3002					/* copy in the chunks */
3003					(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
3004					sac->gauth_number_of_chunks = (uint32_t) size;
3005					*optsize = sizeof(struct sctp_authchunks) + size;
3006				}
3007				SCTP_TCB_UNLOCK(stcb);
3008			} else {
3009				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
3010				error = ENOENT;
3011			}
3012			break;
3013		}
3014	case SCTP_EVENT:
3015		{
3016			struct sctp_event *event;
3017			uint32_t event_type;
3018
3019			SCTP_CHECK_AND_CAST(event, optval, struct sctp_event, *optsize);
3020			SCTP_FIND_STCB(inp, stcb, event->se_assoc_id);
3021
3022			switch (event->se_type) {
3023			case SCTP_ASSOC_CHANGE:
3024				event_type = SCTP_PCB_FLAGS_RECVASSOCEVNT;
3025				break;
3026			case SCTP_PEER_ADDR_CHANGE:
3027				event_type = SCTP_PCB_FLAGS_RECVPADDREVNT;
3028				break;
3029			case SCTP_REMOTE_ERROR:
3030				event_type = SCTP_PCB_FLAGS_RECVPEERERR;
3031				break;
3032			case SCTP_SEND_FAILED:
3033				event_type = SCTP_PCB_FLAGS_RECVSENDFAILEVNT;
3034				break;
3035			case SCTP_SHUTDOWN_EVENT:
3036				event_type = SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT;
3037				break;
3038			case SCTP_ADAPTATION_INDICATION:
3039				event_type = SCTP_PCB_FLAGS_ADAPTATIONEVNT;
3040				break;
3041			case SCTP_PARTIAL_DELIVERY_EVENT:
3042				event_type = SCTP_PCB_FLAGS_PDAPIEVNT;
3043				break;
3044			case SCTP_AUTHENTICATION_EVENT:
3045				event_type = SCTP_PCB_FLAGS_AUTHEVNT;
3046				break;
3047			case SCTP_STREAM_RESET_EVENT:
3048				event_type = SCTP_PCB_FLAGS_STREAM_RESETEVNT;
3049				break;
3050			case SCTP_SENDER_DRY_EVENT:
3051				event_type = SCTP_PCB_FLAGS_DRYEVNT;
3052				break;
3053			case SCTP_NOTIFICATIONS_STOPPED_EVENT:
3054				event_type = 0;
3055				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
3056				error = ENOTSUP;
3057				break;
3058			case SCTP_ASSOC_RESET_EVENT:
3059				event_type = SCTP_PCB_FLAGS_ASSOC_RESETEVNT;
3060				break;
3061			case SCTP_STREAM_CHANGE_EVENT:
3062				event_type = SCTP_PCB_FLAGS_STREAM_CHANGEEVNT;
3063				break;
3064			case SCTP_SEND_FAILED_EVENT:
3065				event_type = SCTP_PCB_FLAGS_RECVNSENDFAILEVNT;
3066				break;
3067			default:
3068				event_type = 0;
3069				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3070				error = EINVAL;
3071				break;
3072			}
3073			if (event_type > 0) {
3074				if (stcb) {
3075					event->se_on = sctp_stcb_is_feature_on(inp, stcb, event_type);
3076					SCTP_TCB_UNLOCK(stcb);
3077				} else {
3078					if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3079					    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3080					    (event->se_assoc_id == SCTP_FUTURE_ASSOC)) {
3081						SCTP_INP_RLOCK(inp);
3082						event->se_on = sctp_is_feature_on(inp, event_type);
3083						SCTP_INP_RUNLOCK(inp);
3084					} else {
3085						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3086						error = EINVAL;
3087					}
3088				}
3089			}
3090			if (error == 0) {
3091				*optsize = sizeof(struct sctp_event);
3092			}
3093			break;
3094		}
3095	case SCTP_RECVRCVINFO:
3096		{
3097			int onoff;
3098
3099			if (*optsize < sizeof(int)) {
3100				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3101				error = EINVAL;
3102			} else {
3103				SCTP_INP_RLOCK(inp);
3104				onoff = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
3105				SCTP_INP_RUNLOCK(inp);
3106			}
3107			if (error == 0) {
3108				/* return the option value */
3109				*(int *)optval = onoff;
3110				*optsize = sizeof(int);
3111			}
3112			break;
3113		}
3114	case SCTP_RECVNXTINFO:
3115		{
3116			int onoff;
3117
3118			if (*optsize < sizeof(int)) {
3119				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3120				error = EINVAL;
3121			} else {
3122				SCTP_INP_RLOCK(inp);
3123				onoff = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
3124				SCTP_INP_RUNLOCK(inp);
3125			}
3126			if (error == 0) {
3127				/* return the option value */
3128				*(int *)optval = onoff;
3129				*optsize = sizeof(int);
3130			}
3131			break;
3132		}
3133	case SCTP_DEFAULT_SNDINFO:
3134		{
3135			struct sctp_sndinfo *info;
3136
3137			SCTP_CHECK_AND_CAST(info, optval, struct sctp_sndinfo, *optsize);
3138			SCTP_FIND_STCB(inp, stcb, info->snd_assoc_id);
3139
3140			if (stcb) {
3141				info->snd_sid = stcb->asoc.def_send.sinfo_stream;
3142				info->snd_flags = stcb->asoc.def_send.sinfo_flags;
3143				info->snd_flags &= 0xfff0;
3144				info->snd_ppid = stcb->asoc.def_send.sinfo_ppid;
3145				info->snd_context = stcb->asoc.def_send.sinfo_context;
3146				SCTP_TCB_UNLOCK(stcb);
3147			} else {
3148				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3149				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3150				    (info->snd_assoc_id == SCTP_FUTURE_ASSOC)) {
3151					SCTP_INP_RLOCK(inp);
3152					info->snd_sid = inp->def_send.sinfo_stream;
3153					info->snd_flags = inp->def_send.sinfo_flags;
3154					info->snd_flags &= 0xfff0;
3155					info->snd_ppid = inp->def_send.sinfo_ppid;
3156					info->snd_context = inp->def_send.sinfo_context;
3157					SCTP_INP_RUNLOCK(inp);
3158				} else {
3159					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3160					error = EINVAL;
3161				}
3162			}
3163			if (error == 0) {
3164				*optsize = sizeof(struct sctp_sndinfo);
3165			}
3166			break;
3167		}
3168	case SCTP_DEFAULT_PRINFO:
3169		{
3170			struct sctp_default_prinfo *info;
3171
3172			SCTP_CHECK_AND_CAST(info, optval, struct sctp_default_prinfo, *optsize);
3173			SCTP_FIND_STCB(inp, stcb, info->pr_assoc_id);
3174
3175			if (stcb) {
3176				info->pr_policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
3177				info->pr_value = stcb->asoc.def_send.sinfo_timetolive;
3178				SCTP_TCB_UNLOCK(stcb);
3179			} else {
3180				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3181				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3182				    (info->pr_assoc_id == SCTP_FUTURE_ASSOC)) {
3183					SCTP_INP_RLOCK(inp);
3184					info->pr_policy = PR_SCTP_POLICY(inp->def_send.sinfo_flags);
3185					info->pr_value = inp->def_send.sinfo_timetolive;
3186					SCTP_INP_RUNLOCK(inp);
3187				} else {
3188					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3189					error = EINVAL;
3190				}
3191			}
3192			if (error == 0) {
3193				*optsize = sizeof(struct sctp_default_prinfo);
3194			}
3195			break;
3196		}
3197	case SCTP_PEER_ADDR_THLDS:
3198		{
3199			struct sctp_paddrthlds *thlds;
3200			struct sctp_nets *net;
3201			struct sockaddr *addr;
3202
3203#if defined(INET) && defined(INET6)
3204			struct sockaddr_in sin_store;
3205
3206#endif
3207
3208			SCTP_CHECK_AND_CAST(thlds, optval, struct sctp_paddrthlds, *optsize);
3209			SCTP_FIND_STCB(inp, stcb, thlds->spt_assoc_id);
3210
3211#if defined(INET) && defined(INET6)
3212			if (thlds->spt_address.ss_family == AF_INET6) {
3213				struct sockaddr_in6 *sin6;
3214
3215				sin6 = (struct sockaddr_in6 *)&thlds->spt_address;
3216				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
3217					in6_sin6_2_sin(&sin_store, sin6);
3218					addr = (struct sockaddr *)&sin_store;
3219				} else {
3220					addr = (struct sockaddr *)&thlds->spt_address;
3221				}
3222			} else {
3223				addr = (struct sockaddr *)&thlds->spt_address;
3224			}
3225#else
3226			addr = (struct sockaddr *)&thlds->spt_address;
3227#endif
3228			if (stcb != NULL) {
3229				net = sctp_findnet(stcb, addr);
3230			} else {
3231				/*
3232				 * We increment here since
3233				 * sctp_findassociation_ep_addr() wil do a
3234				 * decrement if it finds the stcb as long as
3235				 * the locked tcb (last argument) is NOT a
3236				 * TCB.. aka NULL.
3237				 */
3238				net = NULL;
3239				SCTP_INP_INCR_REF(inp);
3240				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
3241				if (stcb == NULL) {
3242					SCTP_INP_DECR_REF(inp);
3243				}
3244			}
3245			if ((stcb != NULL) && (net == NULL)) {
3246#ifdef INET
3247				if (addr->sa_family == AF_INET) {
3248					struct sockaddr_in *sin;
3249
3250					sin = (struct sockaddr_in *)addr;
3251					if (sin->sin_addr.s_addr != INADDR_ANY) {
3252						error = EINVAL;
3253						SCTP_TCB_UNLOCK(stcb);
3254						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3255						break;
3256					}
3257				} else
3258#endif
3259#ifdef INET6
3260				if (addr->sa_family == AF_INET6) {
3261					struct sockaddr_in6 *sin6;
3262
3263					sin6 = (struct sockaddr_in6 *)addr;
3264					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
3265						error = EINVAL;
3266						SCTP_TCB_UNLOCK(stcb);
3267						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3268						break;
3269					}
3270				} else
3271#endif
3272				{
3273					error = EAFNOSUPPORT;
3274					SCTP_TCB_UNLOCK(stcb);
3275					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3276					break;
3277				}
3278			}
3279			if (stcb != NULL) {
3280				if (net != NULL) {
3281					thlds->spt_pathmaxrxt = net->failure_threshold;
3282					thlds->spt_pathpfthld = net->pf_threshold;
3283				} else {
3284					thlds->spt_pathmaxrxt = stcb->asoc.def_net_failure;
3285					thlds->spt_pathpfthld = stcb->asoc.def_net_pf_threshold;
3286				}
3287				thlds->spt_assoc_id = sctp_get_associd(stcb);
3288				SCTP_TCB_UNLOCK(stcb);
3289			} else {
3290				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3291				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3292				    (thlds->spt_assoc_id == SCTP_FUTURE_ASSOC)) {
3293					/* Use endpoint defaults */
3294					SCTP_INP_RLOCK(inp);
3295					thlds->spt_pathmaxrxt = inp->sctp_ep.def_net_failure;
3296					thlds->spt_pathpfthld = inp->sctp_ep.def_net_pf_threshold;
3297					SCTP_INP_RUNLOCK(inp);
3298				} else {
3299					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3300					error = EINVAL;
3301				}
3302			}
3303			if (error == 0) {
3304				*optsize = sizeof(struct sctp_paddrthlds);
3305			}
3306			break;
3307		}
3308	case SCTP_REMOTE_UDP_ENCAPS_PORT:
3309		{
3310			struct sctp_udpencaps *encaps;
3311			struct sctp_nets *net;
3312			struct sockaddr *addr;
3313
3314#if defined(INET) && defined(INET6)
3315			struct sockaddr_in sin_store;
3316
3317#endif
3318
3319			SCTP_CHECK_AND_CAST(encaps, optval, struct sctp_udpencaps, *optsize);
3320			SCTP_FIND_STCB(inp, stcb, encaps->sue_assoc_id);
3321
3322#if defined(INET) && defined(INET6)
3323			if (encaps->sue_address.ss_family == AF_INET6) {
3324				struct sockaddr_in6 *sin6;
3325
3326				sin6 = (struct sockaddr_in6 *)&encaps->sue_address;
3327				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
3328					in6_sin6_2_sin(&sin_store, sin6);
3329					addr = (struct sockaddr *)&sin_store;
3330				} else {
3331					addr = (struct sockaddr *)&encaps->sue_address;
3332				}
3333			} else {
3334				addr = (struct sockaddr *)&encaps->sue_address;
3335			}
3336#else
3337			addr = (struct sockaddr *)&encaps->sue_address;
3338#endif
3339			if (stcb) {
3340				net = sctp_findnet(stcb, addr);
3341			} else {
3342				/*
3343				 * We increment here since
3344				 * sctp_findassociation_ep_addr() wil do a
3345				 * decrement if it finds the stcb as long as
3346				 * the locked tcb (last argument) is NOT a
3347				 * TCB.. aka NULL.
3348				 */
3349				net = NULL;
3350				SCTP_INP_INCR_REF(inp);
3351				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
3352				if (stcb == NULL) {
3353					SCTP_INP_DECR_REF(inp);
3354				}
3355			}
3356			if ((stcb != NULL) && (net == NULL)) {
3357#ifdef INET
3358				if (addr->sa_family == AF_INET) {
3359					struct sockaddr_in *sin;
3360
3361					sin = (struct sockaddr_in *)addr;
3362					if (sin->sin_addr.s_addr != INADDR_ANY) {
3363						error = EINVAL;
3364						SCTP_TCB_UNLOCK(stcb);
3365						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3366						break;
3367					}
3368				} else
3369#endif
3370#ifdef INET6
3371				if (addr->sa_family == AF_INET6) {
3372					struct sockaddr_in6 *sin6;
3373
3374					sin6 = (struct sockaddr_in6 *)addr;
3375					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
3376						error = EINVAL;
3377						SCTP_TCB_UNLOCK(stcb);
3378						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3379						break;
3380					}
3381				} else
3382#endif
3383				{
3384					error = EAFNOSUPPORT;
3385					SCTP_TCB_UNLOCK(stcb);
3386					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3387					break;
3388				}
3389			}
3390			if (stcb != NULL) {
3391				if (net) {
3392					encaps->sue_port = net->port;
3393				} else {
3394					encaps->sue_port = stcb->asoc.port;
3395				}
3396				SCTP_TCB_UNLOCK(stcb);
3397			} else {
3398				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3399				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3400				    (encaps->sue_assoc_id == SCTP_FUTURE_ASSOC)) {
3401					SCTP_INP_RLOCK(inp);
3402					encaps->sue_port = inp->sctp_ep.port;
3403					SCTP_INP_RUNLOCK(inp);
3404				} else {
3405					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3406					error = EINVAL;
3407				}
3408			}
3409			if (error == 0) {
3410				*optsize = sizeof(struct sctp_udpencaps);
3411			}
3412			break;
3413		}
3414	case SCTP_ECN_SUPPORTED:
3415		{
3416			struct sctp_assoc_value *av;
3417
3418			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3419			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3420
3421			if (stcb) {
3422				av->assoc_value = stcb->asoc.ecn_supported;
3423				SCTP_TCB_UNLOCK(stcb);
3424			} else {
3425				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3426				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3427				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3428					SCTP_INP_RLOCK(inp);
3429					av->assoc_value = inp->ecn_supported;
3430					SCTP_INP_RUNLOCK(inp);
3431				} else {
3432					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3433					error = EINVAL;
3434				}
3435			}
3436			if (error == 0) {
3437				*optsize = sizeof(struct sctp_assoc_value);
3438			}
3439			break;
3440		}
3441	case SCTP_PR_SUPPORTED:
3442		{
3443			struct sctp_assoc_value *av;
3444
3445			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3446			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3447
3448			if (stcb) {
3449				av->assoc_value = stcb->asoc.prsctp_supported;
3450				SCTP_TCB_UNLOCK(stcb);
3451			} else {
3452				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3453				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3454				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3455					SCTP_INP_RLOCK(inp);
3456					av->assoc_value = inp->prsctp_supported;
3457					SCTP_INP_RUNLOCK(inp);
3458				} else {
3459					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3460					error = EINVAL;
3461				}
3462			}
3463			if (error == 0) {
3464				*optsize = sizeof(struct sctp_assoc_value);
3465			}
3466			break;
3467		}
3468	case SCTP_AUTH_SUPPORTED:
3469		{
3470			struct sctp_assoc_value *av;
3471
3472			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3473			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3474
3475			if (stcb) {
3476				av->assoc_value = stcb->asoc.auth_supported;
3477				SCTP_TCB_UNLOCK(stcb);
3478			} else {
3479				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3480				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3481				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3482					SCTP_INP_RLOCK(inp);
3483					av->assoc_value = inp->auth_supported;
3484					SCTP_INP_RUNLOCK(inp);
3485				} else {
3486					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3487					error = EINVAL;
3488				}
3489			}
3490			if (error == 0) {
3491				*optsize = sizeof(struct sctp_assoc_value);
3492			}
3493			break;
3494		}
3495	case SCTP_ASCONF_SUPPORTED:
3496		{
3497			struct sctp_assoc_value *av;
3498
3499			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3500			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3501
3502			if (stcb) {
3503				av->assoc_value = stcb->asoc.asconf_supported;
3504				SCTP_TCB_UNLOCK(stcb);
3505			} else {
3506				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3507				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3508				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3509					SCTP_INP_RLOCK(inp);
3510					av->assoc_value = inp->asconf_supported;
3511					SCTP_INP_RUNLOCK(inp);
3512				} else {
3513					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3514					error = EINVAL;
3515				}
3516			}
3517			if (error == 0) {
3518				*optsize = sizeof(struct sctp_assoc_value);
3519			}
3520			break;
3521		}
3522	case SCTP_RECONFIG_SUPPORTED:
3523		{
3524			struct sctp_assoc_value *av;
3525
3526			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3527			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3528
3529			if (stcb) {
3530				av->assoc_value = stcb->asoc.reconfig_supported;
3531				SCTP_TCB_UNLOCK(stcb);
3532			} else {
3533				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3534				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3535				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3536					SCTP_INP_RLOCK(inp);
3537					av->assoc_value = inp->reconfig_supported;
3538					SCTP_INP_RUNLOCK(inp);
3539				} else {
3540					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3541					error = EINVAL;
3542				}
3543			}
3544			if (error == 0) {
3545				*optsize = sizeof(struct sctp_assoc_value);
3546			}
3547			break;
3548		}
3549	case SCTP_NRSACK_SUPPORTED:
3550		{
3551			struct sctp_assoc_value *av;
3552
3553			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3554			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3555
3556			if (stcb) {
3557				av->assoc_value = stcb->asoc.nrsack_supported;
3558				SCTP_TCB_UNLOCK(stcb);
3559			} else {
3560				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3561				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3562				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3563					SCTP_INP_RLOCK(inp);
3564					av->assoc_value = inp->nrsack_supported;
3565					SCTP_INP_RUNLOCK(inp);
3566				} else {
3567					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3568					error = EINVAL;
3569				}
3570			}
3571			if (error == 0) {
3572				*optsize = sizeof(struct sctp_assoc_value);
3573			}
3574			break;
3575		}
3576	case SCTP_PKTDROP_SUPPORTED:
3577		{
3578			struct sctp_assoc_value *av;
3579
3580			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3581			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3582
3583			if (stcb) {
3584				av->assoc_value = stcb->asoc.pktdrop_supported;
3585				SCTP_TCB_UNLOCK(stcb);
3586			} else {
3587				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3588				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3589				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3590					SCTP_INP_RLOCK(inp);
3591					av->assoc_value = inp->pktdrop_supported;
3592					SCTP_INP_RUNLOCK(inp);
3593				} else {
3594					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3595					error = EINVAL;
3596				}
3597			}
3598			if (error == 0) {
3599				*optsize = sizeof(struct sctp_assoc_value);
3600			}
3601			break;
3602		}
3603	case SCTP_ENABLE_STREAM_RESET:
3604		{
3605			struct sctp_assoc_value *av;
3606
3607			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3608			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3609
3610			if (stcb) {
3611				av->assoc_value = (uint32_t) stcb->asoc.local_strreset_support;
3612				SCTP_TCB_UNLOCK(stcb);
3613			} else {
3614				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3615				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3616				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3617					SCTP_INP_RLOCK(inp);
3618					av->assoc_value = (uint32_t) inp->local_strreset_support;
3619					SCTP_INP_RUNLOCK(inp);
3620				} else {
3621					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3622					error = EINVAL;
3623				}
3624			}
3625			if (error == 0) {
3626				*optsize = sizeof(struct sctp_assoc_value);
3627			}
3628			break;
3629		}
3630	case SCTP_PR_STREAM_STATUS:
3631		{
3632			struct sctp_prstatus *sprstat;
3633			uint16_t sid;
3634			uint16_t policy;
3635
3636			SCTP_CHECK_AND_CAST(sprstat, optval, struct sctp_prstatus, *optsize);
3637			SCTP_FIND_STCB(inp, stcb, sprstat->sprstat_assoc_id);
3638
3639			sid = sprstat->sprstat_sid;
3640			policy = sprstat->sprstat_policy;
3641#if defined(SCTP_DETAILED_STR_STATS)
3642			if ((stcb != NULL) &&
3643			    (policy != SCTP_PR_SCTP_NONE) &&
3644			    (sid < stcb->asoc.streamoutcnt) &&
3645			    ((policy == SCTP_PR_SCTP_ALL) ||
3646			    (PR_SCTP_VALID_POLICY(policy)))) {
3647				if (policy == SCTP_PR_SCTP_ALL) {
3648					sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[0];
3649					sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[0];
3650				} else {
3651					sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[policy];
3652					sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[policy];
3653				}
3654#else
3655			if ((stcb != NULL) &&
3656			    (policy == SCTP_PR_SCTP_ALL) &&
3657			    (sid < stcb->asoc.streamoutcnt)) {
3658				sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[0];
3659				sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[0];
3660#endif
3661				SCTP_TCB_UNLOCK(stcb);
3662				*optsize = sizeof(struct sctp_prstatus);
3663			} else {
3664				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3665				error = EINVAL;
3666			}
3667			break;
3668		}
3669	case SCTP_PR_ASSOC_STATUS:
3670		{
3671			struct sctp_prstatus *sprstat;
3672			uint16_t policy;
3673
3674			SCTP_CHECK_AND_CAST(sprstat, optval, struct sctp_prstatus, *optsize);
3675			SCTP_FIND_STCB(inp, stcb, sprstat->sprstat_assoc_id);
3676
3677			policy = sprstat->sprstat_policy;
3678			if ((stcb != NULL) &&
3679			    (policy != SCTP_PR_SCTP_NONE) &&
3680			    ((policy == SCTP_PR_SCTP_ALL) ||
3681			    (PR_SCTP_VALID_POLICY(policy)))) {
3682				if (policy == SCTP_PR_SCTP_ALL) {
3683					sprstat->sprstat_abandoned_unsent = stcb->asoc.abandoned_unsent[0];
3684					sprstat->sprstat_abandoned_sent = stcb->asoc.abandoned_sent[0];
3685				} else {
3686					sprstat->sprstat_abandoned_unsent = stcb->asoc.abandoned_unsent[policy];
3687					sprstat->sprstat_abandoned_sent = stcb->asoc.abandoned_sent[policy];
3688				}
3689				SCTP_TCB_UNLOCK(stcb);
3690				*optsize = sizeof(struct sctp_prstatus);
3691			} else {
3692				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3693				error = EINVAL;
3694			}
3695			break;
3696		}
3697	default:
3698		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
3699		error = ENOPROTOOPT;
3700		break;
3701	}			/* end switch (sopt->sopt_name) */
3702	if (error) {
3703		*optsize = 0;
3704	}
3705	return (error);
3706}
3707
3708static int
3709sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
3710    void *p)
3711{
3712	int error, set_opt;
3713	uint32_t *mopt;
3714	struct sctp_tcb *stcb = NULL;
3715	struct sctp_inpcb *inp = NULL;
3716	uint32_t vrf_id;
3717
3718	if (optval == NULL) {
3719		SCTP_PRINTF("optval is NULL\n");
3720		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3721		return (EINVAL);
3722	}
3723	inp = (struct sctp_inpcb *)so->so_pcb;
3724	if (inp == NULL) {
3725		SCTP_PRINTF("inp is NULL?\n");
3726		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3727		return (EINVAL);
3728	}
3729	vrf_id = inp->def_vrf_id;
3730
3731	error = 0;
3732	switch (optname) {
3733	case SCTP_NODELAY:
3734	case SCTP_AUTOCLOSE:
3735	case SCTP_AUTO_ASCONF:
3736	case SCTP_EXPLICIT_EOR:
3737	case SCTP_DISABLE_FRAGMENTS:
3738	case SCTP_USE_EXT_RCVINFO:
3739	case SCTP_I_WANT_MAPPED_V4_ADDR:
3740		/* copy in the option value */
3741		SCTP_CHECK_AND_CAST(mopt, optval, uint32_t, optsize);
3742		set_opt = 0;
3743		if (error)
3744			break;
3745		switch (optname) {
3746		case SCTP_DISABLE_FRAGMENTS:
3747			set_opt = SCTP_PCB_FLAGS_NO_FRAGMENT;
3748			break;
3749		case SCTP_AUTO_ASCONF:
3750			/*
3751			 * NOTE: we don't really support this flag
3752			 */
3753			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3754				/* only valid for bound all sockets */
3755				if ((SCTP_BASE_SYSCTL(sctp_auto_asconf) == 0) &&
3756				    (*mopt != 0)) {
3757					/* forbidden by admin */
3758					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EPERM);
3759					return (EPERM);
3760				}
3761				set_opt = SCTP_PCB_FLAGS_AUTO_ASCONF;
3762			} else {
3763				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3764				return (EINVAL);
3765			}
3766			break;
3767		case SCTP_EXPLICIT_EOR:
3768			set_opt = SCTP_PCB_FLAGS_EXPLICIT_EOR;
3769			break;
3770		case SCTP_USE_EXT_RCVINFO:
3771			set_opt = SCTP_PCB_FLAGS_EXT_RCVINFO;
3772			break;
3773		case SCTP_I_WANT_MAPPED_V4_ADDR:
3774			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
3775				set_opt = SCTP_PCB_FLAGS_NEEDS_MAPPED_V4;
3776			} else {
3777				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3778				return (EINVAL);
3779			}
3780			break;
3781		case SCTP_NODELAY:
3782			set_opt = SCTP_PCB_FLAGS_NODELAY;
3783			break;
3784		case SCTP_AUTOCLOSE:
3785			if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3786			    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
3787				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3788				return (EINVAL);
3789			}
3790			set_opt = SCTP_PCB_FLAGS_AUTOCLOSE;
3791			/*
3792			 * The value is in ticks. Note this does not effect
3793			 * old associations, only new ones.
3794			 */
3795			inp->sctp_ep.auto_close_time = SEC_TO_TICKS(*mopt);
3796			break;
3797		}
3798		SCTP_INP_WLOCK(inp);
3799		if (*mopt != 0) {
3800			sctp_feature_on(inp, set_opt);
3801		} else {
3802			sctp_feature_off(inp, set_opt);
3803		}
3804		SCTP_INP_WUNLOCK(inp);
3805		break;
3806	case SCTP_REUSE_PORT:
3807		{
3808			SCTP_CHECK_AND_CAST(mopt, optval, uint32_t, optsize);
3809			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) == 0) {
3810				/* Can't set it after we are bound */
3811				error = EINVAL;
3812				break;
3813			}
3814			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE)) {
3815				/* Can't do this for a 1-m socket */
3816				error = EINVAL;
3817				break;
3818			}
3819			if (optval)
3820				sctp_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE);
3821			else
3822				sctp_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE);
3823			break;
3824		}
3825	case SCTP_PARTIAL_DELIVERY_POINT:
3826		{
3827			uint32_t *value;
3828
3829			SCTP_CHECK_AND_CAST(value, optval, uint32_t, optsize);
3830			if (*value > SCTP_SB_LIMIT_RCV(so)) {
3831				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3832				error = EINVAL;
3833				break;
3834			}
3835			inp->partial_delivery_point = *value;
3836			break;
3837		}
3838	case SCTP_FRAGMENT_INTERLEAVE:
3839		/* not yet until we re-write sctp_recvmsg() */
3840		{
3841			uint32_t *level;
3842
3843			SCTP_CHECK_AND_CAST(level, optval, uint32_t, optsize);
3844			if (*level == SCTP_FRAG_LEVEL_2) {
3845				sctp_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3846				sctp_feature_on(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3847			} else if (*level == SCTP_FRAG_LEVEL_1) {
3848				sctp_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3849				sctp_feature_off(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3850			} else if (*level == SCTP_FRAG_LEVEL_0) {
3851				sctp_feature_off(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3852				sctp_feature_off(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3853
3854			} else {
3855				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3856				error = EINVAL;
3857			}
3858			break;
3859		}
3860	case SCTP_CMT_ON_OFF:
3861		if (SCTP_BASE_SYSCTL(sctp_cmt_on_off)) {
3862			struct sctp_assoc_value *av;
3863
3864			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3865			if (av->assoc_value > SCTP_CMT_MAX) {
3866				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3867				error = EINVAL;
3868				break;
3869			}
3870			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3871			if (stcb) {
3872				stcb->asoc.sctp_cmt_on_off = av->assoc_value;
3873				SCTP_TCB_UNLOCK(stcb);
3874			} else {
3875				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3876				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3877				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
3878				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3879					SCTP_INP_WLOCK(inp);
3880					inp->sctp_cmt_on_off = av->assoc_value;
3881					SCTP_INP_WUNLOCK(inp);
3882				}
3883				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
3884				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3885					SCTP_INP_RLOCK(inp);
3886					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3887						SCTP_TCB_LOCK(stcb);
3888						stcb->asoc.sctp_cmt_on_off = av->assoc_value;
3889						SCTP_TCB_UNLOCK(stcb);
3890					}
3891					SCTP_INP_RUNLOCK(inp);
3892				}
3893			}
3894		} else {
3895			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
3896			error = ENOPROTOOPT;
3897		}
3898		break;
3899	case SCTP_PLUGGABLE_CC:
3900		{
3901			struct sctp_assoc_value *av;
3902			struct sctp_nets *net;
3903
3904			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3905			if ((av->assoc_value != SCTP_CC_RFC2581) &&
3906			    (av->assoc_value != SCTP_CC_HSTCP) &&
3907			    (av->assoc_value != SCTP_CC_HTCP) &&
3908			    (av->assoc_value != SCTP_CC_RTCC)) {
3909				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3910				error = EINVAL;
3911				break;
3912			}
3913			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3914			if (stcb) {
3915				stcb->asoc.cc_functions = sctp_cc_functions[av->assoc_value];
3916				stcb->asoc.congestion_control_module = av->assoc_value;
3917				if (stcb->asoc.cc_functions.sctp_set_initial_cc_param != NULL) {
3918					TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
3919						stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
3920					}
3921				}
3922				SCTP_TCB_UNLOCK(stcb);
3923			} else {
3924				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3925				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3926				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
3927				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3928					SCTP_INP_WLOCK(inp);
3929					inp->sctp_ep.sctp_default_cc_module = av->assoc_value;
3930					SCTP_INP_WUNLOCK(inp);
3931				}
3932				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
3933				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3934					SCTP_INP_RLOCK(inp);
3935					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3936						SCTP_TCB_LOCK(stcb);
3937						stcb->asoc.cc_functions = sctp_cc_functions[av->assoc_value];
3938						stcb->asoc.congestion_control_module = av->assoc_value;
3939						if (stcb->asoc.cc_functions.sctp_set_initial_cc_param != NULL) {
3940							TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
3941								stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
3942							}
3943						}
3944						SCTP_TCB_UNLOCK(stcb);
3945					}
3946					SCTP_INP_RUNLOCK(inp);
3947				}
3948			}
3949			break;
3950		}
3951	case SCTP_CC_OPTION:
3952		{
3953			struct sctp_cc_option *cc_opt;
3954
3955			SCTP_CHECK_AND_CAST(cc_opt, optval, struct sctp_cc_option, optsize);
3956			SCTP_FIND_STCB(inp, stcb, cc_opt->aid_value.assoc_id);
3957			if (stcb == NULL) {
3958				if (cc_opt->aid_value.assoc_id == SCTP_CURRENT_ASSOC) {
3959					SCTP_INP_RLOCK(inp);
3960					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3961						SCTP_TCB_LOCK(stcb);
3962						if (stcb->asoc.cc_functions.sctp_cwnd_socket_option) {
3963							(*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 1, cc_opt);
3964						}
3965						SCTP_TCB_UNLOCK(stcb);
3966					}
3967					SCTP_INP_RUNLOCK(inp);
3968				} else {
3969					error = EINVAL;
3970				}
3971			} else {
3972				if (stcb->asoc.cc_functions.sctp_cwnd_socket_option == NULL) {
3973					error = ENOTSUP;
3974				} else {
3975					error = (*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 1,
3976					    cc_opt);
3977				}
3978				SCTP_TCB_UNLOCK(stcb);
3979			}
3980			break;
3981		}
3982	case SCTP_PLUGGABLE_SS:
3983		{
3984			struct sctp_assoc_value *av;
3985
3986			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3987			if ((av->assoc_value != SCTP_SS_DEFAULT) &&
3988			    (av->assoc_value != SCTP_SS_ROUND_ROBIN) &&
3989			    (av->assoc_value != SCTP_SS_ROUND_ROBIN_PACKET) &&
3990			    (av->assoc_value != SCTP_SS_PRIORITY) &&
3991			    (av->assoc_value != SCTP_SS_FAIR_BANDWITH) &&
3992			    (av->assoc_value != SCTP_SS_FIRST_COME)) {
3993				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3994				error = EINVAL;
3995				break;
3996			}
3997			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3998			if (stcb) {
3999				stcb->asoc.ss_functions.sctp_ss_clear(stcb, &stcb->asoc, 1, 1);
4000				stcb->asoc.ss_functions = sctp_ss_functions[av->assoc_value];
4001				stcb->asoc.stream_scheduling_module = av->assoc_value;
4002				stcb->asoc.ss_functions.sctp_ss_init(stcb, &stcb->asoc, 1);
4003				SCTP_TCB_UNLOCK(stcb);
4004			} else {
4005				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4006				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4007				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4008				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4009					SCTP_INP_WLOCK(inp);
4010					inp->sctp_ep.sctp_default_ss_module = av->assoc_value;
4011					SCTP_INP_WUNLOCK(inp);
4012				}
4013				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4014				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4015					SCTP_INP_RLOCK(inp);
4016					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4017						SCTP_TCB_LOCK(stcb);
4018						stcb->asoc.ss_functions.sctp_ss_clear(stcb, &stcb->asoc, 1, 1);
4019						stcb->asoc.ss_functions = sctp_ss_functions[av->assoc_value];
4020						stcb->asoc.stream_scheduling_module = av->assoc_value;
4021						stcb->asoc.ss_functions.sctp_ss_init(stcb, &stcb->asoc, 1);
4022						SCTP_TCB_UNLOCK(stcb);
4023					}
4024					SCTP_INP_RUNLOCK(inp);
4025				}
4026			}
4027			break;
4028		}
4029	case SCTP_SS_VALUE:
4030		{
4031			struct sctp_stream_value *av;
4032
4033			SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, optsize);
4034			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4035			if (stcb) {
4036				if ((av->stream_id >= stcb->asoc.streamoutcnt) ||
4037				    (stcb->asoc.ss_functions.sctp_ss_set_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id],
4038				    av->stream_value) < 0)) {
4039					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4040					error = EINVAL;
4041				}
4042				SCTP_TCB_UNLOCK(stcb);
4043			} else {
4044				if (av->assoc_id == SCTP_CURRENT_ASSOC) {
4045					SCTP_INP_RLOCK(inp);
4046					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4047						SCTP_TCB_LOCK(stcb);
4048						if (av->stream_id < stcb->asoc.streamoutcnt) {
4049							stcb->asoc.ss_functions.sctp_ss_set_value(stcb,
4050							    &stcb->asoc,
4051							    &stcb->asoc.strmout[av->stream_id],
4052							    av->stream_value);
4053						}
4054						SCTP_TCB_UNLOCK(stcb);
4055					}
4056					SCTP_INP_RUNLOCK(inp);
4057
4058				} else {
4059					/*
4060					 * Can't set stream value without
4061					 * association
4062					 */
4063					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4064					error = EINVAL;
4065				}
4066			}
4067			break;
4068		}
4069	case SCTP_CLR_STAT_LOG:
4070		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4071		error = EOPNOTSUPP;
4072		break;
4073	case SCTP_CONTEXT:
4074		{
4075			struct sctp_assoc_value *av;
4076
4077			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4078			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4079
4080			if (stcb) {
4081				stcb->asoc.context = av->assoc_value;
4082				SCTP_TCB_UNLOCK(stcb);
4083			} else {
4084				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4085				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4086				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4087				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4088					SCTP_INP_WLOCK(inp);
4089					inp->sctp_context = av->assoc_value;
4090					SCTP_INP_WUNLOCK(inp);
4091				}
4092				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4093				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4094					SCTP_INP_RLOCK(inp);
4095					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4096						SCTP_TCB_LOCK(stcb);
4097						stcb->asoc.context = av->assoc_value;
4098						SCTP_TCB_UNLOCK(stcb);
4099					}
4100					SCTP_INP_RUNLOCK(inp);
4101				}
4102			}
4103			break;
4104		}
4105	case SCTP_VRF_ID:
4106		{
4107			uint32_t *default_vrfid;
4108
4109			SCTP_CHECK_AND_CAST(default_vrfid, optval, uint32_t, optsize);
4110			if (*default_vrfid > SCTP_MAX_VRF_ID) {
4111				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4112				error = EINVAL;
4113				break;
4114			}
4115			inp->def_vrf_id = *default_vrfid;
4116			break;
4117		}
4118	case SCTP_DEL_VRF_ID:
4119		{
4120			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4121			error = EOPNOTSUPP;
4122			break;
4123		}
4124	case SCTP_ADD_VRF_ID:
4125		{
4126			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4127			error = EOPNOTSUPP;
4128			break;
4129		}
4130	case SCTP_DELAYED_SACK:
4131		{
4132			struct sctp_sack_info *sack;
4133
4134			SCTP_CHECK_AND_CAST(sack, optval, struct sctp_sack_info, optsize);
4135			SCTP_FIND_STCB(inp, stcb, sack->sack_assoc_id);
4136			if (sack->sack_delay) {
4137				if (sack->sack_delay > SCTP_MAX_SACK_DELAY)
4138					sack->sack_delay = SCTP_MAX_SACK_DELAY;
4139				if (MSEC_TO_TICKS(sack->sack_delay) < 1) {
4140					sack->sack_delay = TICKS_TO_MSEC(1);
4141				}
4142			}
4143			if (stcb) {
4144				if (sack->sack_delay) {
4145					stcb->asoc.delayed_ack = sack->sack_delay;
4146				}
4147				if (sack->sack_freq) {
4148					stcb->asoc.sack_freq = sack->sack_freq;
4149				}
4150				SCTP_TCB_UNLOCK(stcb);
4151			} else {
4152				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4153				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4154				    (sack->sack_assoc_id == SCTP_FUTURE_ASSOC) ||
4155				    (sack->sack_assoc_id == SCTP_ALL_ASSOC)) {
4156					SCTP_INP_WLOCK(inp);
4157					if (sack->sack_delay) {
4158						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_RECV] = MSEC_TO_TICKS(sack->sack_delay);
4159					}
4160					if (sack->sack_freq) {
4161						inp->sctp_ep.sctp_sack_freq = sack->sack_freq;
4162					}
4163					SCTP_INP_WUNLOCK(inp);
4164				}
4165				if ((sack->sack_assoc_id == SCTP_CURRENT_ASSOC) ||
4166				    (sack->sack_assoc_id == SCTP_ALL_ASSOC)) {
4167					SCTP_INP_RLOCK(inp);
4168					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4169						SCTP_TCB_LOCK(stcb);
4170						if (sack->sack_delay) {
4171							stcb->asoc.delayed_ack = sack->sack_delay;
4172						}
4173						if (sack->sack_freq) {
4174							stcb->asoc.sack_freq = sack->sack_freq;
4175						}
4176						SCTP_TCB_UNLOCK(stcb);
4177					}
4178					SCTP_INP_RUNLOCK(inp);
4179				}
4180			}
4181			break;
4182		}
4183	case SCTP_AUTH_CHUNK:
4184		{
4185			struct sctp_authchunk *sauth;
4186
4187			SCTP_CHECK_AND_CAST(sauth, optval, struct sctp_authchunk, optsize);
4188
4189			SCTP_INP_WLOCK(inp);
4190			if (sctp_auth_add_chunk(sauth->sauth_chunk, inp->sctp_ep.local_auth_chunks)) {
4191				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4192				error = EINVAL;
4193			}
4194			SCTP_INP_WUNLOCK(inp);
4195			break;
4196		}
4197	case SCTP_AUTH_KEY:
4198		{
4199			struct sctp_authkey *sca;
4200			struct sctp_keyhead *shared_keys;
4201			sctp_sharedkey_t *shared_key;
4202			sctp_key_t *key = NULL;
4203			size_t size;
4204
4205			SCTP_CHECK_AND_CAST(sca, optval, struct sctp_authkey, optsize);
4206			if (sca->sca_keylength == 0) {
4207				size = optsize - sizeof(struct sctp_authkey);
4208			} else {
4209				if (sca->sca_keylength + sizeof(struct sctp_authkey) <= optsize) {
4210					size = sca->sca_keylength;
4211				} else {
4212					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4213					error = EINVAL;
4214					break;
4215				}
4216			}
4217			SCTP_FIND_STCB(inp, stcb, sca->sca_assoc_id);
4218
4219			if (stcb) {
4220				shared_keys = &stcb->asoc.shared_keys;
4221				/* clear the cached keys for this key id */
4222				sctp_clear_cachedkeys(stcb, sca->sca_keynumber);
4223				/*
4224				 * create the new shared key and
4225				 * insert/replace it
4226				 */
4227				if (size > 0) {
4228					key = sctp_set_key(sca->sca_key, (uint32_t) size);
4229					if (key == NULL) {
4230						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4231						error = ENOMEM;
4232						SCTP_TCB_UNLOCK(stcb);
4233						break;
4234					}
4235				}
4236				shared_key = sctp_alloc_sharedkey();
4237				if (shared_key == NULL) {
4238					sctp_free_key(key);
4239					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4240					error = ENOMEM;
4241					SCTP_TCB_UNLOCK(stcb);
4242					break;
4243				}
4244				shared_key->key = key;
4245				shared_key->keyid = sca->sca_keynumber;
4246				error = sctp_insert_sharedkey(shared_keys, shared_key);
4247				SCTP_TCB_UNLOCK(stcb);
4248			} else {
4249				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4250				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4251				    (sca->sca_assoc_id == SCTP_FUTURE_ASSOC) ||
4252				    (sca->sca_assoc_id == SCTP_ALL_ASSOC)) {
4253					SCTP_INP_WLOCK(inp);
4254					shared_keys = &inp->sctp_ep.shared_keys;
4255					/*
4256					 * clear the cached keys on all
4257					 * assocs for this key id
4258					 */
4259					sctp_clear_cachedkeys_ep(inp, sca->sca_keynumber);
4260					/*
4261					 * create the new shared key and
4262					 * insert/replace it
4263					 */
4264					if (size > 0) {
4265						key = sctp_set_key(sca->sca_key, (uint32_t) size);
4266						if (key == NULL) {
4267							SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4268							error = ENOMEM;
4269							SCTP_INP_WUNLOCK(inp);
4270							break;
4271						}
4272					}
4273					shared_key = sctp_alloc_sharedkey();
4274					if (shared_key == NULL) {
4275						sctp_free_key(key);
4276						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4277						error = ENOMEM;
4278						SCTP_INP_WUNLOCK(inp);
4279						break;
4280					}
4281					shared_key->key = key;
4282					shared_key->keyid = sca->sca_keynumber;
4283					error = sctp_insert_sharedkey(shared_keys, shared_key);
4284					SCTP_INP_WUNLOCK(inp);
4285				}
4286				if ((sca->sca_assoc_id == SCTP_CURRENT_ASSOC) ||
4287				    (sca->sca_assoc_id == SCTP_ALL_ASSOC)) {
4288					SCTP_INP_RLOCK(inp);
4289					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4290						SCTP_TCB_LOCK(stcb);
4291						shared_keys = &stcb->asoc.shared_keys;
4292						/*
4293						 * clear the cached keys for
4294						 * this key id
4295						 */
4296						sctp_clear_cachedkeys(stcb, sca->sca_keynumber);
4297						/*
4298						 * create the new shared key
4299						 * and insert/replace it
4300						 */
4301						if (size > 0) {
4302							key = sctp_set_key(sca->sca_key, (uint32_t) size);
4303							if (key == NULL) {
4304								SCTP_TCB_UNLOCK(stcb);
4305								continue;
4306							}
4307						}
4308						shared_key = sctp_alloc_sharedkey();
4309						if (shared_key == NULL) {
4310							sctp_free_key(key);
4311							SCTP_TCB_UNLOCK(stcb);
4312							continue;
4313						}
4314						shared_key->key = key;
4315						shared_key->keyid = sca->sca_keynumber;
4316						error = sctp_insert_sharedkey(shared_keys, shared_key);
4317						SCTP_TCB_UNLOCK(stcb);
4318					}
4319					SCTP_INP_RUNLOCK(inp);
4320				}
4321			}
4322			break;
4323		}
4324	case SCTP_HMAC_IDENT:
4325		{
4326			struct sctp_hmacalgo *shmac;
4327			sctp_hmaclist_t *hmaclist;
4328			uint16_t hmacid;
4329			uint32_t i;
4330
4331			SCTP_CHECK_AND_CAST(shmac, optval, struct sctp_hmacalgo, optsize);
4332			if ((optsize < sizeof(struct sctp_hmacalgo) + shmac->shmac_number_of_idents * sizeof(uint16_t)) ||
4333			    (shmac->shmac_number_of_idents > 0xffff)) {
4334				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4335				error = EINVAL;
4336				break;
4337			}
4338			hmaclist = sctp_alloc_hmaclist((uint16_t) shmac->shmac_number_of_idents);
4339			if (hmaclist == NULL) {
4340				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4341				error = ENOMEM;
4342				break;
4343			}
4344			for (i = 0; i < shmac->shmac_number_of_idents; i++) {
4345				hmacid = shmac->shmac_idents[i];
4346				if (sctp_auth_add_hmacid(hmaclist, hmacid)) {
4347					 /* invalid HMACs were found */ ;
4348					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4349					error = EINVAL;
4350					sctp_free_hmaclist(hmaclist);
4351					goto sctp_set_hmac_done;
4352				}
4353			}
4354			for (i = 0; i < hmaclist->num_algo; i++) {
4355				if (hmaclist->hmac[i] == SCTP_AUTH_HMAC_ID_SHA1) {
4356					/* already in list */
4357					break;
4358				}
4359			}
4360			if (i == hmaclist->num_algo) {
4361				/* not found in list */
4362				sctp_free_hmaclist(hmaclist);
4363				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4364				error = EINVAL;
4365				break;
4366			}
4367			/* set it on the endpoint */
4368			SCTP_INP_WLOCK(inp);
4369			if (inp->sctp_ep.local_hmacs)
4370				sctp_free_hmaclist(inp->sctp_ep.local_hmacs);
4371			inp->sctp_ep.local_hmacs = hmaclist;
4372			SCTP_INP_WUNLOCK(inp);
4373	sctp_set_hmac_done:
4374			break;
4375		}
4376	case SCTP_AUTH_ACTIVE_KEY:
4377		{
4378			struct sctp_authkeyid *scact;
4379
4380			SCTP_CHECK_AND_CAST(scact, optval, struct sctp_authkeyid, optsize);
4381			SCTP_FIND_STCB(inp, stcb, scact->scact_assoc_id);
4382
4383			/* set the active key on the right place */
4384			if (stcb) {
4385				/* set the active key on the assoc */
4386				if (sctp_auth_setactivekey(stcb,
4387				    scact->scact_keynumber)) {
4388					SCTP_LTRACE_ERR_RET(inp, NULL, NULL,
4389					    SCTP_FROM_SCTP_USRREQ,
4390					    EINVAL);
4391					error = EINVAL;
4392				}
4393				SCTP_TCB_UNLOCK(stcb);
4394			} else {
4395				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4396				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4397				    (scact->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4398				    (scact->scact_assoc_id == SCTP_ALL_ASSOC)) {
4399					SCTP_INP_WLOCK(inp);
4400					if (sctp_auth_setactivekey_ep(inp, scact->scact_keynumber)) {
4401						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4402						error = EINVAL;
4403					}
4404					SCTP_INP_WUNLOCK(inp);
4405				}
4406				if ((scact->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4407				    (scact->scact_assoc_id == SCTP_ALL_ASSOC)) {
4408					SCTP_INP_RLOCK(inp);
4409					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4410						SCTP_TCB_LOCK(stcb);
4411						sctp_auth_setactivekey(stcb, scact->scact_keynumber);
4412						SCTP_TCB_UNLOCK(stcb);
4413					}
4414					SCTP_INP_RUNLOCK(inp);
4415				}
4416			}
4417			break;
4418		}
4419	case SCTP_AUTH_DELETE_KEY:
4420		{
4421			struct sctp_authkeyid *scdel;
4422
4423			SCTP_CHECK_AND_CAST(scdel, optval, struct sctp_authkeyid, optsize);
4424			SCTP_FIND_STCB(inp, stcb, scdel->scact_assoc_id);
4425
4426			/* delete the key from the right place */
4427			if (stcb) {
4428				if (sctp_delete_sharedkey(stcb, scdel->scact_keynumber)) {
4429					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4430					error = EINVAL;
4431				}
4432				SCTP_TCB_UNLOCK(stcb);
4433			} else {
4434				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4435				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4436				    (scdel->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4437				    (scdel->scact_assoc_id == SCTP_ALL_ASSOC)) {
4438					SCTP_INP_WLOCK(inp);
4439					if (sctp_delete_sharedkey_ep(inp, scdel->scact_keynumber)) {
4440						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4441						error = EINVAL;
4442					}
4443					SCTP_INP_WUNLOCK(inp);
4444				}
4445				if ((scdel->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4446				    (scdel->scact_assoc_id == SCTP_ALL_ASSOC)) {
4447					SCTP_INP_RLOCK(inp);
4448					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4449						SCTP_TCB_LOCK(stcb);
4450						sctp_delete_sharedkey(stcb, scdel->scact_keynumber);
4451						SCTP_TCB_UNLOCK(stcb);
4452					}
4453					SCTP_INP_RUNLOCK(inp);
4454				}
4455			}
4456			break;
4457		}
4458	case SCTP_AUTH_DEACTIVATE_KEY:
4459		{
4460			struct sctp_authkeyid *keyid;
4461
4462			SCTP_CHECK_AND_CAST(keyid, optval, struct sctp_authkeyid, optsize);
4463			SCTP_FIND_STCB(inp, stcb, keyid->scact_assoc_id);
4464
4465			/* deactivate the key from the right place */
4466			if (stcb) {
4467				if (sctp_deact_sharedkey(stcb, keyid->scact_keynumber)) {
4468					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4469					error = EINVAL;
4470				}
4471				SCTP_TCB_UNLOCK(stcb);
4472			} else {
4473				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4474				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4475				    (keyid->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4476				    (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) {
4477					SCTP_INP_WLOCK(inp);
4478					if (sctp_deact_sharedkey_ep(inp, keyid->scact_keynumber)) {
4479						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4480						error = EINVAL;
4481					}
4482					SCTP_INP_WUNLOCK(inp);
4483				}
4484				if ((keyid->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4485				    (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) {
4486					SCTP_INP_RLOCK(inp);
4487					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4488						SCTP_TCB_LOCK(stcb);
4489						sctp_deact_sharedkey(stcb, keyid->scact_keynumber);
4490						SCTP_TCB_UNLOCK(stcb);
4491					}
4492					SCTP_INP_RUNLOCK(inp);
4493				}
4494			}
4495			break;
4496		}
4497	case SCTP_ENABLE_STREAM_RESET:
4498		{
4499			struct sctp_assoc_value *av;
4500
4501			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4502			if (av->assoc_value & (~SCTP_ENABLE_VALUE_MASK)) {
4503				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4504				error = EINVAL;
4505				break;
4506			}
4507			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4508			if (stcb) {
4509				stcb->asoc.local_strreset_support = (uint8_t) av->assoc_value;
4510				SCTP_TCB_UNLOCK(stcb);
4511			} else {
4512				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4513				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4514				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4515				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4516					SCTP_INP_WLOCK(inp);
4517					inp->local_strreset_support = (uint8_t) av->assoc_value;
4518					SCTP_INP_WUNLOCK(inp);
4519				}
4520				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4521				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4522					SCTP_INP_RLOCK(inp);
4523					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4524						SCTP_TCB_LOCK(stcb);
4525						stcb->asoc.local_strreset_support = (uint8_t) av->assoc_value;
4526						SCTP_TCB_UNLOCK(stcb);
4527					}
4528					SCTP_INP_RUNLOCK(inp);
4529				}
4530			}
4531			break;
4532		}
4533	case SCTP_RESET_STREAMS:
4534		{
4535			struct sctp_reset_streams *strrst;
4536			int i, send_out = 0;
4537			int send_in = 0;
4538
4539			SCTP_CHECK_AND_CAST(strrst, optval, struct sctp_reset_streams, optsize);
4540			SCTP_FIND_STCB(inp, stcb, strrst->srs_assoc_id);
4541			if (stcb == NULL) {
4542				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4543				error = ENOENT;
4544				break;
4545			}
4546			if (stcb->asoc.reconfig_supported == 0) {
4547				/*
4548				 * Peer does not support the chunk type.
4549				 */
4550				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4551				error = EOPNOTSUPP;
4552				SCTP_TCB_UNLOCK(stcb);
4553				break;
4554			}
4555			if (sizeof(struct sctp_reset_streams) +
4556			    strrst->srs_number_streams * sizeof(uint16_t) > optsize) {
4557				error = EINVAL;
4558				SCTP_TCB_UNLOCK(stcb);
4559				break;
4560			}
4561			if (stcb->asoc.stream_reset_outstanding) {
4562				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4563				error = EALREADY;
4564				SCTP_TCB_UNLOCK(stcb);
4565				break;
4566			}
4567			if (strrst->srs_flags & SCTP_STREAM_RESET_INCOMING) {
4568				send_in = 1;
4569			}
4570			if (strrst->srs_flags & SCTP_STREAM_RESET_OUTGOING) {
4571				send_out = 1;
4572			}
4573			if ((send_in == 0) && (send_out == 0)) {
4574				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4575				error = EINVAL;
4576				SCTP_TCB_UNLOCK(stcb);
4577				break;
4578			}
4579			for (i = 0; i < strrst->srs_number_streams; i++) {
4580				if ((send_in) &&
4581				    (strrst->srs_stream_list[i] > stcb->asoc.streamincnt)) {
4582					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4583					error = EINVAL;
4584					break;
4585				}
4586				if ((send_out) &&
4587				    (strrst->srs_stream_list[i] > stcb->asoc.streamoutcnt)) {
4588					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4589					error = EINVAL;
4590					break;
4591				}
4592			}
4593			if (error) {
4594				SCTP_TCB_UNLOCK(stcb);
4595				break;
4596			}
4597			error = sctp_send_str_reset_req(stcb, strrst->srs_number_streams,
4598			    strrst->srs_stream_list,
4599			    send_out, send_in, 0, 0, 0, 0, 0);
4600
4601			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4602			SCTP_TCB_UNLOCK(stcb);
4603			break;
4604		}
4605	case SCTP_ADD_STREAMS:
4606		{
4607			struct sctp_add_streams *stradd;
4608			uint8_t addstream = 0;
4609			uint16_t add_o_strmcnt = 0;
4610			uint16_t add_i_strmcnt = 0;
4611
4612			SCTP_CHECK_AND_CAST(stradd, optval, struct sctp_add_streams, optsize);
4613			SCTP_FIND_STCB(inp, stcb, stradd->sas_assoc_id);
4614			if (stcb == NULL) {
4615				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4616				error = ENOENT;
4617				break;
4618			}
4619			if (stcb->asoc.reconfig_supported == 0) {
4620				/*
4621				 * Peer does not support the chunk type.
4622				 */
4623				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4624				error = EOPNOTSUPP;
4625				SCTP_TCB_UNLOCK(stcb);
4626				break;
4627			}
4628			if (stcb->asoc.stream_reset_outstanding) {
4629				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4630				error = EALREADY;
4631				SCTP_TCB_UNLOCK(stcb);
4632				break;
4633			}
4634			if ((stradd->sas_outstrms == 0) &&
4635			    (stradd->sas_instrms == 0)) {
4636				error = EINVAL;
4637				goto skip_stuff;
4638			}
4639			if (stradd->sas_outstrms) {
4640				addstream = 1;
4641				/* We allocate here */
4642				add_o_strmcnt = stradd->sas_outstrms;
4643				if ((((int)add_o_strmcnt) + ((int)stcb->asoc.streamoutcnt)) > 0x0000ffff) {
4644					/* You can't have more than 64k */
4645					error = EINVAL;
4646					goto skip_stuff;
4647				}
4648			}
4649			if (stradd->sas_instrms) {
4650				int cnt;
4651
4652				addstream |= 2;
4653				/*
4654				 * We allocate inside
4655				 * sctp_send_str_reset_req()
4656				 */
4657				add_i_strmcnt = stradd->sas_instrms;
4658				cnt = add_i_strmcnt;
4659				cnt += stcb->asoc.streamincnt;
4660				if (cnt > 0x0000ffff) {
4661					/* You can't have more than 64k */
4662					error = EINVAL;
4663					goto skip_stuff;
4664				}
4665				if (cnt > (int)stcb->asoc.max_inbound_streams) {
4666					/* More than you are allowed */
4667					error = EINVAL;
4668					goto skip_stuff;
4669				}
4670			}
4671			error = sctp_send_str_reset_req(stcb, 0, NULL, 0, 0, 0, addstream, add_o_strmcnt, add_i_strmcnt, 0);
4672			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4673	skip_stuff:
4674			SCTP_TCB_UNLOCK(stcb);
4675			break;
4676		}
4677	case SCTP_RESET_ASSOC:
4678		{
4679			uint32_t *value;
4680
4681			SCTP_CHECK_AND_CAST(value, optval, uint32_t, optsize);
4682			SCTP_FIND_STCB(inp, stcb, (sctp_assoc_t) * value);
4683			if (stcb == NULL) {
4684				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4685				error = ENOENT;
4686				break;
4687			}
4688			if (stcb->asoc.reconfig_supported == 0) {
4689				/*
4690				 * Peer does not support the chunk type.
4691				 */
4692				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4693				error = EOPNOTSUPP;
4694				SCTP_TCB_UNLOCK(stcb);
4695				break;
4696			}
4697			if (stcb->asoc.stream_reset_outstanding) {
4698				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4699				error = EALREADY;
4700				SCTP_TCB_UNLOCK(stcb);
4701				break;
4702			}
4703			error = sctp_send_str_reset_req(stcb, 0, NULL, 0, 0, 1, 0, 0, 0, 0);
4704			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4705			SCTP_TCB_UNLOCK(stcb);
4706			break;
4707		}
4708	case SCTP_CONNECT_X:
4709		if (optsize < (sizeof(int) + sizeof(struct sockaddr_in))) {
4710			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4711			error = EINVAL;
4712			break;
4713		}
4714		error = sctp_do_connect_x(so, inp, optval, optsize, p, 0);
4715		break;
4716	case SCTP_CONNECT_X_DELAYED:
4717		if (optsize < (sizeof(int) + sizeof(struct sockaddr_in))) {
4718			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4719			error = EINVAL;
4720			break;
4721		}
4722		error = sctp_do_connect_x(so, inp, optval, optsize, p, 1);
4723		break;
4724	case SCTP_CONNECT_X_COMPLETE:
4725		{
4726			struct sockaddr *sa;
4727			struct sctp_nets *net;
4728
4729			/* FIXME MT: check correct? */
4730			SCTP_CHECK_AND_CAST(sa, optval, struct sockaddr, optsize);
4731
4732			/* find tcb */
4733			if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
4734				SCTP_INP_RLOCK(inp);
4735				stcb = LIST_FIRST(&inp->sctp_asoc_list);
4736				if (stcb) {
4737					SCTP_TCB_LOCK(stcb);
4738					net = sctp_findnet(stcb, sa);
4739				}
4740				SCTP_INP_RUNLOCK(inp);
4741			} else {
4742				/*
4743				 * We increment here since
4744				 * sctp_findassociation_ep_addr() wil do a
4745				 * decrement if it finds the stcb as long as
4746				 * the locked tcb (last argument) is NOT a
4747				 * TCB.. aka NULL.
4748				 */
4749				SCTP_INP_INCR_REF(inp);
4750				stcb = sctp_findassociation_ep_addr(&inp, sa, &net, NULL, NULL);
4751				if (stcb == NULL) {
4752					SCTP_INP_DECR_REF(inp);
4753				}
4754			}
4755
4756			if (stcb == NULL) {
4757				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4758				error = ENOENT;
4759				break;
4760			}
4761			if (stcb->asoc.delayed_connection == 1) {
4762				stcb->asoc.delayed_connection = 0;
4763				(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
4764				sctp_timer_stop(SCTP_TIMER_TYPE_INIT, inp, stcb,
4765				    stcb->asoc.primary_destination,
4766				    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_9);
4767				sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
4768			} else {
4769				/*
4770				 * already expired or did not use delayed
4771				 * connectx
4772				 */
4773				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4774				error = EALREADY;
4775			}
4776			SCTP_TCB_UNLOCK(stcb);
4777			break;
4778		}
4779	case SCTP_MAX_BURST:
4780		{
4781			struct sctp_assoc_value *av;
4782
4783			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4784			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4785
4786			if (stcb) {
4787				stcb->asoc.max_burst = av->assoc_value;
4788				SCTP_TCB_UNLOCK(stcb);
4789			} else {
4790				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4791				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4792				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4793				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4794					SCTP_INP_WLOCK(inp);
4795					inp->sctp_ep.max_burst = av->assoc_value;
4796					SCTP_INP_WUNLOCK(inp);
4797				}
4798				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4799				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4800					SCTP_INP_RLOCK(inp);
4801					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4802						SCTP_TCB_LOCK(stcb);
4803						stcb->asoc.max_burst = av->assoc_value;
4804						SCTP_TCB_UNLOCK(stcb);
4805					}
4806					SCTP_INP_RUNLOCK(inp);
4807				}
4808			}
4809			break;
4810		}
4811	case SCTP_MAXSEG:
4812		{
4813			struct sctp_assoc_value *av;
4814			int ovh;
4815
4816			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4817			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4818
4819			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
4820				ovh = SCTP_MED_OVERHEAD;
4821			} else {
4822				ovh = SCTP_MED_V4_OVERHEAD;
4823			}
4824			if (stcb) {
4825				if (av->assoc_value) {
4826					stcb->asoc.sctp_frag_point = (av->assoc_value + ovh);
4827				} else {
4828					stcb->asoc.sctp_frag_point = SCTP_DEFAULT_MAXSEGMENT;
4829				}
4830				SCTP_TCB_UNLOCK(stcb);
4831			} else {
4832				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4833				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4834				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
4835					SCTP_INP_WLOCK(inp);
4836					/*
4837					 * FIXME MT: I think this is not in
4838					 * tune with the API ID
4839					 */
4840					if (av->assoc_value) {
4841						inp->sctp_frag_point = (av->assoc_value + ovh);
4842					} else {
4843						inp->sctp_frag_point = SCTP_DEFAULT_MAXSEGMENT;
4844					}
4845					SCTP_INP_WUNLOCK(inp);
4846				} else {
4847					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4848					error = EINVAL;
4849				}
4850			}
4851			break;
4852		}
4853	case SCTP_EVENTS:
4854		{
4855			struct sctp_event_subscribe *events;
4856
4857			SCTP_CHECK_AND_CAST(events, optval, struct sctp_event_subscribe, optsize);
4858
4859			SCTP_INP_WLOCK(inp);
4860			if (events->sctp_data_io_event) {
4861				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT);
4862			} else {
4863				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT);
4864			}
4865
4866			if (events->sctp_association_event) {
4867				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4868			} else {
4869				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4870			}
4871
4872			if (events->sctp_address_event) {
4873				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVPADDREVNT);
4874			} else {
4875				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVPADDREVNT);
4876			}
4877
4878			if (events->sctp_send_failure_event) {
4879				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4880			} else {
4881				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4882			}
4883
4884			if (events->sctp_peer_error_event) {
4885				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVPEERERR);
4886			} else {
4887				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVPEERERR);
4888			}
4889
4890			if (events->sctp_shutdown_event) {
4891				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4892			} else {
4893				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4894			}
4895
4896			if (events->sctp_partial_delivery_event) {
4897				sctp_feature_on(inp, SCTP_PCB_FLAGS_PDAPIEVNT);
4898			} else {
4899				sctp_feature_off(inp, SCTP_PCB_FLAGS_PDAPIEVNT);
4900			}
4901
4902			if (events->sctp_adaptation_layer_event) {
4903				sctp_feature_on(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4904			} else {
4905				sctp_feature_off(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4906			}
4907
4908			if (events->sctp_authentication_event) {
4909				sctp_feature_on(inp, SCTP_PCB_FLAGS_AUTHEVNT);
4910			} else {
4911				sctp_feature_off(inp, SCTP_PCB_FLAGS_AUTHEVNT);
4912			}
4913
4914			if (events->sctp_sender_dry_event) {
4915				sctp_feature_on(inp, SCTP_PCB_FLAGS_DRYEVNT);
4916			} else {
4917				sctp_feature_off(inp, SCTP_PCB_FLAGS_DRYEVNT);
4918			}
4919
4920			if (events->sctp_stream_reset_event) {
4921				sctp_feature_on(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4922			} else {
4923				sctp_feature_off(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4924			}
4925			SCTP_INP_WUNLOCK(inp);
4926
4927			SCTP_INP_RLOCK(inp);
4928			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4929				SCTP_TCB_LOCK(stcb);
4930				if (events->sctp_association_event) {
4931					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4932				} else {
4933					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4934				}
4935				if (events->sctp_address_event) {
4936					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVPADDREVNT);
4937				} else {
4938					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVPADDREVNT);
4939				}
4940				if (events->sctp_send_failure_event) {
4941					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4942				} else {
4943					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4944				}
4945				if (events->sctp_peer_error_event) {
4946					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVPEERERR);
4947				} else {
4948					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVPEERERR);
4949				}
4950				if (events->sctp_shutdown_event) {
4951					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4952				} else {
4953					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4954				}
4955				if (events->sctp_partial_delivery_event) {
4956					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_PDAPIEVNT);
4957				} else {
4958					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_PDAPIEVNT);
4959				}
4960				if (events->sctp_adaptation_layer_event) {
4961					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4962				} else {
4963					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4964				}
4965				if (events->sctp_authentication_event) {
4966					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_AUTHEVNT);
4967				} else {
4968					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_AUTHEVNT);
4969				}
4970				if (events->sctp_sender_dry_event) {
4971					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DRYEVNT);
4972				} else {
4973					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DRYEVNT);
4974				}
4975				if (events->sctp_stream_reset_event) {
4976					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4977				} else {
4978					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4979				}
4980				SCTP_TCB_UNLOCK(stcb);
4981			}
4982			/*
4983			 * Send up the sender dry event only for 1-to-1
4984			 * style sockets.
4985			 */
4986			if (events->sctp_sender_dry_event) {
4987				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4988				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
4989					stcb = LIST_FIRST(&inp->sctp_asoc_list);
4990					if (stcb) {
4991						SCTP_TCB_LOCK(stcb);
4992						if (TAILQ_EMPTY(&stcb->asoc.send_queue) &&
4993						    TAILQ_EMPTY(&stcb->asoc.sent_queue) &&
4994						    (stcb->asoc.stream_queue_cnt == 0)) {
4995							sctp_ulp_notify(SCTP_NOTIFY_SENDER_DRY, stcb, 0, NULL, SCTP_SO_LOCKED);
4996						}
4997						SCTP_TCB_UNLOCK(stcb);
4998					}
4999				}
5000			}
5001			SCTP_INP_RUNLOCK(inp);
5002			break;
5003		}
5004	case SCTP_ADAPTATION_LAYER:
5005		{
5006			struct sctp_setadaptation *adap_bits;
5007
5008			SCTP_CHECK_AND_CAST(adap_bits, optval, struct sctp_setadaptation, optsize);
5009			SCTP_INP_WLOCK(inp);
5010			inp->sctp_ep.adaptation_layer_indicator = adap_bits->ssb_adaptation_ind;
5011			inp->sctp_ep.adaptation_layer_indicator_provided = 1;
5012			SCTP_INP_WUNLOCK(inp);
5013			break;
5014		}
5015#ifdef SCTP_DEBUG
5016	case SCTP_SET_INITIAL_DBG_SEQ:
5017		{
5018			uint32_t *vvv;
5019
5020			SCTP_CHECK_AND_CAST(vvv, optval, uint32_t, optsize);
5021			SCTP_INP_WLOCK(inp);
5022			inp->sctp_ep.initial_sequence_debug = *vvv;
5023			SCTP_INP_WUNLOCK(inp);
5024			break;
5025		}
5026#endif
5027	case SCTP_DEFAULT_SEND_PARAM:
5028		{
5029			struct sctp_sndrcvinfo *s_info;
5030
5031			SCTP_CHECK_AND_CAST(s_info, optval, struct sctp_sndrcvinfo, optsize);
5032			SCTP_FIND_STCB(inp, stcb, s_info->sinfo_assoc_id);
5033
5034			if (stcb) {
5035				if (s_info->sinfo_stream < stcb->asoc.streamoutcnt) {
5036					memcpy(&stcb->asoc.def_send, s_info, min(optsize, sizeof(stcb->asoc.def_send)));
5037				} else {
5038					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5039					error = EINVAL;
5040				}
5041				SCTP_TCB_UNLOCK(stcb);
5042			} else {
5043				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5044				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5045				    (s_info->sinfo_assoc_id == SCTP_FUTURE_ASSOC) ||
5046				    (s_info->sinfo_assoc_id == SCTP_ALL_ASSOC)) {
5047					SCTP_INP_WLOCK(inp);
5048					memcpy(&inp->def_send, s_info, min(optsize, sizeof(inp->def_send)));
5049					SCTP_INP_WUNLOCK(inp);
5050				}
5051				if ((s_info->sinfo_assoc_id == SCTP_CURRENT_ASSOC) ||
5052				    (s_info->sinfo_assoc_id == SCTP_ALL_ASSOC)) {
5053					SCTP_INP_RLOCK(inp);
5054					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
5055						SCTP_TCB_LOCK(stcb);
5056						if (s_info->sinfo_stream < stcb->asoc.streamoutcnt) {
5057							memcpy(&stcb->asoc.def_send, s_info, min(optsize, sizeof(stcb->asoc.def_send)));
5058						}
5059						SCTP_TCB_UNLOCK(stcb);
5060					}
5061					SCTP_INP_RUNLOCK(inp);
5062				}
5063			}
5064			break;
5065		}
5066	case SCTP_PEER_ADDR_PARAMS:
5067		{
5068			struct sctp_paddrparams *paddrp;
5069			struct sctp_nets *net;
5070			struct sockaddr *addr;
5071
5072#if defined(INET) && defined(INET6)
5073			struct sockaddr_in sin_store;
5074
5075#endif
5076
5077			SCTP_CHECK_AND_CAST(paddrp, optval, struct sctp_paddrparams, optsize);
5078			SCTP_FIND_STCB(inp, stcb, paddrp->spp_assoc_id);
5079
5080#if defined(INET) && defined(INET6)
5081			if (paddrp->spp_address.ss_family == AF_INET6) {
5082				struct sockaddr_in6 *sin6;
5083
5084				sin6 = (struct sockaddr_in6 *)&paddrp->spp_address;
5085				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5086					in6_sin6_2_sin(&sin_store, sin6);
5087					addr = (struct sockaddr *)&sin_store;
5088				} else {
5089					addr = (struct sockaddr *)&paddrp->spp_address;
5090				}
5091			} else {
5092				addr = (struct sockaddr *)&paddrp->spp_address;
5093			}
5094#else
5095			addr = (struct sockaddr *)&paddrp->spp_address;
5096#endif
5097			if (stcb != NULL) {
5098				net = sctp_findnet(stcb, addr);
5099			} else {
5100				/*
5101				 * We increment here since
5102				 * sctp_findassociation_ep_addr() wil do a
5103				 * decrement if it finds the stcb as long as
5104				 * the locked tcb (last argument) is NOT a
5105				 * TCB.. aka NULL.
5106				 */
5107				net = NULL;
5108				SCTP_INP_INCR_REF(inp);
5109				stcb = sctp_findassociation_ep_addr(&inp, addr,
5110				    &net, NULL, NULL);
5111				if (stcb == NULL) {
5112					SCTP_INP_DECR_REF(inp);
5113				}
5114			}
5115			if ((stcb != NULL) && (net == NULL)) {
5116#ifdef INET
5117				if (addr->sa_family == AF_INET) {
5118
5119					struct sockaddr_in *sin;
5120
5121					sin = (struct sockaddr_in *)addr;
5122					if (sin->sin_addr.s_addr != INADDR_ANY) {
5123						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5124						SCTP_TCB_UNLOCK(stcb);
5125						error = EINVAL;
5126						break;
5127					}
5128				} else
5129#endif
5130#ifdef INET6
5131				if (addr->sa_family == AF_INET6) {
5132					struct sockaddr_in6 *sin6;
5133
5134					sin6 = (struct sockaddr_in6 *)addr;
5135					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
5136						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5137						SCTP_TCB_UNLOCK(stcb);
5138						error = EINVAL;
5139						break;
5140					}
5141				} else
5142#endif
5143				{
5144					error = EAFNOSUPPORT;
5145					SCTP_TCB_UNLOCK(stcb);
5146					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
5147					break;
5148				}
5149			}
5150			/* sanity checks */
5151			if ((paddrp->spp_flags & SPP_HB_ENABLE) && (paddrp->spp_flags & SPP_HB_DISABLE)) {
5152				if (stcb)
5153					SCTP_TCB_UNLOCK(stcb);
5154				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5155				return (EINVAL);
5156			}
5157			if ((paddrp->spp_flags & SPP_PMTUD_ENABLE) && (paddrp->spp_flags & SPP_PMTUD_DISABLE)) {
5158				if (stcb)
5159					SCTP_TCB_UNLOCK(stcb);
5160				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5161				return (EINVAL);
5162			}
5163			if (stcb != NULL) {
5164				/************************TCB SPECIFIC SET ******************/
5165				/*
5166				 * do we change the timer for HB, we run
5167				 * only one?
5168				 */
5169				int ovh = 0;
5170
5171				if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
5172					ovh = SCTP_MED_OVERHEAD;
5173				} else {
5174					ovh = SCTP_MED_V4_OVERHEAD;
5175				}
5176
5177				/* network sets ? */
5178				if (net != NULL) {
5179					/************************NET SPECIFIC SET ******************/
5180					if (paddrp->spp_flags & SPP_HB_DISABLE) {
5181						if (!(net->dest_state & SCTP_ADDR_UNCONFIRMED) &&
5182						    !(net->dest_state & SCTP_ADDR_NOHB)) {
5183							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5184							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5185						}
5186						net->dest_state |= SCTP_ADDR_NOHB;
5187					}
5188					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5189						if (paddrp->spp_hbinterval) {
5190							net->heart_beat_delay = paddrp->spp_hbinterval;
5191						} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5192							net->heart_beat_delay = 0;
5193						}
5194						sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5195						    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5196						sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5197						net->dest_state &= ~SCTP_ADDR_NOHB;
5198					}
5199					if (paddrp->spp_flags & SPP_HB_DEMAND) {
5200						/* on demand HB */
5201						sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5202						sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_SOCKOPT, SCTP_SO_LOCKED);
5203						sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5204					}
5205					if ((paddrp->spp_flags & SPP_PMTUD_DISABLE) && (paddrp->spp_pathmtu >= SCTP_SMALLEST_PMTU)) {
5206						if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5207							sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
5208							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5209						}
5210						net->dest_state |= SCTP_ADDR_NO_PMTUD;
5211						net->mtu = paddrp->spp_pathmtu + ovh;
5212						if (net->mtu < stcb->asoc.smallest_mtu) {
5213							sctp_pathmtu_adjustment(stcb, net->mtu);
5214						}
5215					}
5216					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5217						if (!SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5218							sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
5219						}
5220						net->dest_state &= ~SCTP_ADDR_NO_PMTUD;
5221					}
5222					if (paddrp->spp_pathmaxrxt) {
5223						if (net->dest_state & SCTP_ADDR_PF) {
5224							if (net->error_count > paddrp->spp_pathmaxrxt) {
5225								net->dest_state &= ~SCTP_ADDR_PF;
5226							}
5227						} else {
5228							if ((net->error_count <= paddrp->spp_pathmaxrxt) &&
5229							    (net->error_count > net->pf_threshold)) {
5230								net->dest_state |= SCTP_ADDR_PF;
5231								sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5232								sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
5233								sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
5234							}
5235						}
5236						if (net->dest_state & SCTP_ADDR_REACHABLE) {
5237							if (net->error_count > paddrp->spp_pathmaxrxt) {
5238								net->dest_state &= ~SCTP_ADDR_REACHABLE;
5239								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
5240							}
5241						} else {
5242							if (net->error_count <= paddrp->spp_pathmaxrxt) {
5243								net->dest_state |= SCTP_ADDR_REACHABLE;
5244								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
5245							}
5246						}
5247						net->failure_threshold = paddrp->spp_pathmaxrxt;
5248					}
5249					if (paddrp->spp_flags & SPP_DSCP) {
5250						net->dscp = paddrp->spp_dscp & 0xfc;
5251						net->dscp |= 0x01;
5252					}
5253#ifdef INET6
5254					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5255						if (net->ro._l_addr.sa.sa_family == AF_INET6) {
5256							net->flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5257							net->flowlabel |= 0x80000000;
5258						}
5259					}
5260#endif
5261				} else {
5262					/************************ASSOC ONLY -- NO NET SPECIFIC SET ******************/
5263					if (paddrp->spp_pathmaxrxt != 0) {
5264						stcb->asoc.def_net_failure = paddrp->spp_pathmaxrxt;
5265						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5266							if (net->dest_state & SCTP_ADDR_PF) {
5267								if (net->error_count > paddrp->spp_pathmaxrxt) {
5268									net->dest_state &= ~SCTP_ADDR_PF;
5269								}
5270							} else {
5271								if ((net->error_count <= paddrp->spp_pathmaxrxt) &&
5272								    (net->error_count > net->pf_threshold)) {
5273									net->dest_state |= SCTP_ADDR_PF;
5274									sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5275									sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
5276									sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
5277								}
5278							}
5279							if (net->dest_state & SCTP_ADDR_REACHABLE) {
5280								if (net->error_count > paddrp->spp_pathmaxrxt) {
5281									net->dest_state &= ~SCTP_ADDR_REACHABLE;
5282									sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
5283								}
5284							} else {
5285								if (net->error_count <= paddrp->spp_pathmaxrxt) {
5286									net->dest_state |= SCTP_ADDR_REACHABLE;
5287									sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
5288								}
5289							}
5290							net->failure_threshold = paddrp->spp_pathmaxrxt;
5291						}
5292					}
5293					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5294						if (paddrp->spp_hbinterval != 0) {
5295							stcb->asoc.heart_beat_delay = paddrp->spp_hbinterval;
5296						} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5297							stcb->asoc.heart_beat_delay = 0;
5298						}
5299						/* Turn back on the timer */
5300						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5301							if (paddrp->spp_hbinterval != 0) {
5302								net->heart_beat_delay = paddrp->spp_hbinterval;
5303							} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5304								net->heart_beat_delay = 0;
5305							}
5306							if (net->dest_state & SCTP_ADDR_NOHB) {
5307								net->dest_state &= ~SCTP_ADDR_NOHB;
5308							}
5309							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5310							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5311							sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5312						}
5313						sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5314					}
5315					if (paddrp->spp_flags & SPP_HB_DISABLE) {
5316						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5317							if (!(net->dest_state & SCTP_ADDR_NOHB)) {
5318								net->dest_state |= SCTP_ADDR_NOHB;
5319								if (!(net->dest_state & SCTP_ADDR_UNCONFIRMED)) {
5320									sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5321								}
5322							}
5323						}
5324						sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5325					}
5326					if ((paddrp->spp_flags & SPP_PMTUD_DISABLE) && (paddrp->spp_pathmtu >= SCTP_SMALLEST_PMTU)) {
5327						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5328							if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5329								sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
5330								    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5331							}
5332							net->dest_state |= SCTP_ADDR_NO_PMTUD;
5333							net->mtu = paddrp->spp_pathmtu + ovh;
5334							if (net->mtu < stcb->asoc.smallest_mtu) {
5335								sctp_pathmtu_adjustment(stcb, net->mtu);
5336							}
5337						}
5338						sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5339					}
5340					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5341						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5342							if (!SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5343								sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
5344							}
5345							net->dest_state &= ~SCTP_ADDR_NO_PMTUD;
5346						}
5347						sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5348					}
5349					if (paddrp->spp_flags & SPP_DSCP) {
5350						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5351							net->dscp = paddrp->spp_dscp & 0xfc;
5352							net->dscp |= 0x01;
5353						}
5354						stcb->asoc.default_dscp = paddrp->spp_dscp & 0xfc;
5355						stcb->asoc.default_dscp |= 0x01;
5356					}
5357#ifdef INET6
5358					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5359						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5360							if (net->ro._l_addr.sa.sa_family == AF_INET6) {
5361								net->flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5362								net->flowlabel |= 0x80000000;
5363							}
5364						}
5365						stcb->asoc.default_flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5366						stcb->asoc.default_flowlabel |= 0x80000000;
5367					}
5368#endif
5369				}
5370				SCTP_TCB_UNLOCK(stcb);
5371			} else {
5372				/************************NO TCB, SET TO default stuff ******************/
5373				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5374				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5375				    (paddrp->spp_assoc_id == SCTP_FUTURE_ASSOC)) {
5376					SCTP_INP_WLOCK(inp);
5377					/*
5378					 * For the TOS/FLOWLABEL stuff you
5379					 * set it with the options on the
5380					 * socket
5381					 */
5382					if (paddrp->spp_pathmaxrxt != 0) {
5383						inp->sctp_ep.def_net_failure = paddrp->spp_pathmaxrxt;
5384					}
5385					if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO)
5386						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
5387					else if (paddrp->spp_hbinterval != 0) {
5388						if (paddrp->spp_hbinterval > SCTP_MAX_HB_INTERVAL)
5389							paddrp->spp_hbinterval = SCTP_MAX_HB_INTERVAL;
5390						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = MSEC_TO_TICKS(paddrp->spp_hbinterval);
5391					}
5392					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5393						if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5394							inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
5395						} else if (paddrp->spp_hbinterval) {
5396							inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = MSEC_TO_TICKS(paddrp->spp_hbinterval);
5397						}
5398						sctp_feature_off(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5399					} else if (paddrp->spp_flags & SPP_HB_DISABLE) {
5400						sctp_feature_on(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5401					}
5402					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5403						sctp_feature_off(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5404					} else if (paddrp->spp_flags & SPP_PMTUD_DISABLE) {
5405						sctp_feature_on(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5406					}
5407					if (paddrp->spp_flags & SPP_DSCP) {
5408						inp->sctp_ep.default_dscp = paddrp->spp_dscp & 0xfc;
5409						inp->sctp_ep.default_dscp |= 0x01;
5410					}
5411#ifdef INET6
5412					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5413						if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
5414							inp->sctp_ep.default_flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5415							inp->sctp_ep.default_flowlabel |= 0x80000000;
5416						}
5417					}
5418#endif
5419					SCTP_INP_WUNLOCK(inp);
5420				} else {
5421					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5422					error = EINVAL;
5423				}
5424			}
5425			break;
5426		}
5427	case SCTP_RTOINFO:
5428		{
5429			struct sctp_rtoinfo *srto;
5430			uint32_t new_init, new_min, new_max;
5431
5432			SCTP_CHECK_AND_CAST(srto, optval, struct sctp_rtoinfo, optsize);
5433			SCTP_FIND_STCB(inp, stcb, srto->srto_assoc_id);
5434
5435			if (stcb) {
5436				if (srto->srto_initial)
5437					new_init = srto->srto_initial;
5438				else
5439					new_init = stcb->asoc.initial_rto;
5440				if (srto->srto_max)
5441					new_max = srto->srto_max;
5442				else
5443					new_max = stcb->asoc.maxrto;
5444				if (srto->srto_min)
5445					new_min = srto->srto_min;
5446				else
5447					new_min = stcb->asoc.minrto;
5448				if ((new_min <= new_init) && (new_init <= new_max)) {
5449					stcb->asoc.initial_rto = new_init;
5450					stcb->asoc.maxrto = new_max;
5451					stcb->asoc.minrto = new_min;
5452				} else {
5453					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5454					error = EINVAL;
5455				}
5456				SCTP_TCB_UNLOCK(stcb);
5457			} else {
5458				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5459				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5460				    (srto->srto_assoc_id == SCTP_FUTURE_ASSOC)) {
5461					SCTP_INP_WLOCK(inp);
5462					if (srto->srto_initial)
5463						new_init = srto->srto_initial;
5464					else
5465						new_init = inp->sctp_ep.initial_rto;
5466					if (srto->srto_max)
5467						new_max = srto->srto_max;
5468					else
5469						new_max = inp->sctp_ep.sctp_maxrto;
5470					if (srto->srto_min)
5471						new_min = srto->srto_min;
5472					else
5473						new_min = inp->sctp_ep.sctp_minrto;
5474					if ((new_min <= new_init) && (new_init <= new_max)) {
5475						inp->sctp_ep.initial_rto = new_init;
5476						inp->sctp_ep.sctp_maxrto = new_max;
5477						inp->sctp_ep.sctp_minrto = new_min;
5478					} else {
5479						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5480						error = EINVAL;
5481					}
5482					SCTP_INP_WUNLOCK(inp);
5483				} else {
5484					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5485					error = EINVAL;
5486				}
5487			}
5488			break;
5489		}
5490	case SCTP_ASSOCINFO:
5491		{
5492			struct sctp_assocparams *sasoc;
5493
5494			SCTP_CHECK_AND_CAST(sasoc, optval, struct sctp_assocparams, optsize);
5495			SCTP_FIND_STCB(inp, stcb, sasoc->sasoc_assoc_id);
5496			if (sasoc->sasoc_cookie_life) {
5497				/* boundary check the cookie life */
5498				if (sasoc->sasoc_cookie_life < 1000)
5499					sasoc->sasoc_cookie_life = 1000;
5500				if (sasoc->sasoc_cookie_life > SCTP_MAX_COOKIE_LIFE) {
5501					sasoc->sasoc_cookie_life = SCTP_MAX_COOKIE_LIFE;
5502				}
5503			}
5504			if (stcb) {
5505				if (sasoc->sasoc_asocmaxrxt)
5506					stcb->asoc.max_send_times = sasoc->sasoc_asocmaxrxt;
5507				if (sasoc->sasoc_cookie_life) {
5508					stcb->asoc.cookie_life = MSEC_TO_TICKS(sasoc->sasoc_cookie_life);
5509				}
5510				SCTP_TCB_UNLOCK(stcb);
5511			} else {
5512				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5513				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5514				    (sasoc->sasoc_assoc_id == SCTP_FUTURE_ASSOC)) {
5515					SCTP_INP_WLOCK(inp);
5516					if (sasoc->sasoc_asocmaxrxt)
5517						inp->sctp_ep.max_send_times = sasoc->sasoc_asocmaxrxt;
5518					if (sasoc->sasoc_cookie_life) {
5519						inp->sctp_ep.def_cookie_life = MSEC_TO_TICKS(sasoc->sasoc_cookie_life);
5520					}
5521					SCTP_INP_WUNLOCK(inp);
5522				} else {
5523					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5524					error = EINVAL;
5525				}
5526			}
5527			break;
5528		}
5529	case SCTP_INITMSG:
5530		{
5531			struct sctp_initmsg *sinit;
5532
5533			SCTP_CHECK_AND_CAST(sinit, optval, struct sctp_initmsg, optsize);
5534			SCTP_INP_WLOCK(inp);
5535			if (sinit->sinit_num_ostreams)
5536				inp->sctp_ep.pre_open_stream_count = sinit->sinit_num_ostreams;
5537
5538			if (sinit->sinit_max_instreams)
5539				inp->sctp_ep.max_open_streams_intome = sinit->sinit_max_instreams;
5540
5541			if (sinit->sinit_max_attempts)
5542				inp->sctp_ep.max_init_times = sinit->sinit_max_attempts;
5543
5544			if (sinit->sinit_max_init_timeo)
5545				inp->sctp_ep.initial_init_rto_max = sinit->sinit_max_init_timeo;
5546			SCTP_INP_WUNLOCK(inp);
5547			break;
5548		}
5549	case SCTP_PRIMARY_ADDR:
5550		{
5551			struct sctp_setprim *spa;
5552			struct sctp_nets *net;
5553			struct sockaddr *addr;
5554
5555#if defined(INET) && defined(INET6)
5556			struct sockaddr_in sin_store;
5557
5558#endif
5559
5560			SCTP_CHECK_AND_CAST(spa, optval, struct sctp_setprim, optsize);
5561			SCTP_FIND_STCB(inp, stcb, spa->ssp_assoc_id);
5562
5563#if defined(INET) && defined(INET6)
5564			if (spa->ssp_addr.ss_family == AF_INET6) {
5565				struct sockaddr_in6 *sin6;
5566
5567				sin6 = (struct sockaddr_in6 *)&spa->ssp_addr;
5568				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5569					in6_sin6_2_sin(&sin_store, sin6);
5570					addr = (struct sockaddr *)&sin_store;
5571				} else {
5572					addr = (struct sockaddr *)&spa->ssp_addr;
5573				}
5574			} else {
5575				addr = (struct sockaddr *)&spa->ssp_addr;
5576			}
5577#else
5578			addr = (struct sockaddr *)&spa->ssp_addr;
5579#endif
5580			if (stcb != NULL) {
5581				net = sctp_findnet(stcb, addr);
5582			} else {
5583				/*
5584				 * We increment here since
5585				 * sctp_findassociation_ep_addr() wil do a
5586				 * decrement if it finds the stcb as long as
5587				 * the locked tcb (last argument) is NOT a
5588				 * TCB.. aka NULL.
5589				 */
5590				net = NULL;
5591				SCTP_INP_INCR_REF(inp);
5592				stcb = sctp_findassociation_ep_addr(&inp, addr,
5593				    &net, NULL, NULL);
5594				if (stcb == NULL) {
5595					SCTP_INP_DECR_REF(inp);
5596				}
5597			}
5598
5599			if ((stcb != NULL) && (net != NULL)) {
5600				if ((net != stcb->asoc.primary_destination) &&
5601				    (!(net->dest_state & SCTP_ADDR_UNCONFIRMED))) {
5602					/* Ok we need to set it */
5603					if (sctp_set_primary_addr(stcb, (struct sockaddr *)NULL, net) == 0) {
5604						if ((stcb->asoc.alternate) &&
5605						    (!(net->dest_state & SCTP_ADDR_PF)) &&
5606						    (net->dest_state & SCTP_ADDR_REACHABLE)) {
5607							sctp_free_remote_addr(stcb->asoc.alternate);
5608							stcb->asoc.alternate = NULL;
5609						}
5610					}
5611				}
5612			} else {
5613				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5614				error = EINVAL;
5615			}
5616			if (stcb != NULL) {
5617				SCTP_TCB_UNLOCK(stcb);
5618			}
5619			break;
5620		}
5621	case SCTP_SET_DYNAMIC_PRIMARY:
5622		{
5623			union sctp_sockstore *ss;
5624
5625			error = priv_check(curthread,
5626			    PRIV_NETINET_RESERVEDPORT);
5627			if (error)
5628				break;
5629
5630			SCTP_CHECK_AND_CAST(ss, optval, union sctp_sockstore, optsize);
5631			/* SUPER USER CHECK? */
5632			error = sctp_dynamic_set_primary(&ss->sa, vrf_id);
5633			break;
5634		}
5635	case SCTP_SET_PEER_PRIMARY_ADDR:
5636		{
5637			struct sctp_setpeerprim *sspp;
5638			struct sockaddr *addr;
5639
5640#if defined(INET) && defined(INET6)
5641			struct sockaddr_in sin_store;
5642
5643#endif
5644
5645			SCTP_CHECK_AND_CAST(sspp, optval, struct sctp_setpeerprim, optsize);
5646			SCTP_FIND_STCB(inp, stcb, sspp->sspp_assoc_id);
5647			if (stcb != NULL) {
5648				struct sctp_ifa *ifa;
5649
5650#if defined(INET) && defined(INET6)
5651				if (sspp->sspp_addr.ss_family == AF_INET6) {
5652					struct sockaddr_in6 *sin6;
5653
5654					sin6 = (struct sockaddr_in6 *)&sspp->sspp_addr;
5655					if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5656						in6_sin6_2_sin(&sin_store, sin6);
5657						addr = (struct sockaddr *)&sin_store;
5658					} else {
5659						addr = (struct sockaddr *)&sspp->sspp_addr;
5660					}
5661				} else {
5662					addr = (struct sockaddr *)&sspp->sspp_addr;
5663				}
5664#else
5665				addr = (struct sockaddr *)&sspp->sspp_addr;
5666#endif
5667				ifa = sctp_find_ifa_by_addr(addr, stcb->asoc.vrf_id, SCTP_ADDR_NOT_LOCKED);
5668				if (ifa == NULL) {
5669					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5670					error = EINVAL;
5671					goto out_of_it;
5672				}
5673				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
5674					/*
5675					 * Must validate the ifa found is in
5676					 * our ep
5677					 */
5678					struct sctp_laddr *laddr;
5679					int found = 0;
5680
5681					LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
5682						if (laddr->ifa == NULL) {
5683							SCTPDBG(SCTP_DEBUG_OUTPUT1, "%s: NULL ifa\n",
5684							    __FUNCTION__);
5685							continue;
5686						}
5687						if (laddr->ifa == ifa) {
5688							found = 1;
5689							break;
5690						}
5691					}
5692					if (!found) {
5693						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5694						error = EINVAL;
5695						goto out_of_it;
5696					}
5697				} else {
5698					switch (addr->sa_family) {
5699#ifdef INET
5700					case AF_INET:
5701						{
5702							struct sockaddr_in *sin;
5703
5704							sin = (struct sockaddr_in *)addr;
5705							if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
5706							    &sin->sin_addr) != 0) {
5707								SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5708								error = EINVAL;
5709								goto out_of_it;
5710							}
5711							break;
5712						}
5713#endif
5714#ifdef INET6
5715					case AF_INET6:
5716						{
5717							struct sockaddr_in6 *sin6;
5718
5719							sin6 = (struct sockaddr_in6 *)addr;
5720							if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
5721							    &sin6->sin6_addr) != 0) {
5722								SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5723								error = EINVAL;
5724								goto out_of_it;
5725							}
5726							break;
5727						}
5728#endif
5729					default:
5730						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5731						error = EINVAL;
5732						goto out_of_it;
5733					}
5734				}
5735				if (sctp_set_primary_ip_address_sa(stcb, addr) != 0) {
5736					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5737					error = EINVAL;
5738				}
5739		out_of_it:
5740				SCTP_TCB_UNLOCK(stcb);
5741			} else {
5742				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5743				error = EINVAL;
5744			}
5745			break;
5746		}
5747	case SCTP_BINDX_ADD_ADDR:
5748		{
5749			struct sctp_getaddresses *addrs;
5750			struct thread *td;
5751
5752			td = (struct thread *)p;
5753			SCTP_CHECK_AND_CAST(addrs, optval, struct sctp_getaddresses,
5754			    optsize);
5755#ifdef INET
5756			if (addrs->addr->sa_family == AF_INET) {
5757				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in)) {
5758					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5759					error = EINVAL;
5760					break;
5761				}
5762				if (td != NULL && (error = prison_local_ip4(td->td_ucred, &(((struct sockaddr_in *)(addrs->addr))->sin_addr)))) {
5763					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5764					break;
5765				}
5766			} else
5767#endif
5768#ifdef INET6
5769			if (addrs->addr->sa_family == AF_INET6) {
5770				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in6)) {
5771					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5772					error = EINVAL;
5773					break;
5774				}
5775				if (td != NULL && (error = prison_local_ip6(td->td_ucred, &(((struct sockaddr_in6 *)(addrs->addr))->sin6_addr),
5776				    (SCTP_IPV6_V6ONLY(inp) != 0))) != 0) {
5777					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5778					break;
5779				}
5780			} else
5781#endif
5782			{
5783				error = EAFNOSUPPORT;
5784				break;
5785			}
5786			sctp_bindx_add_address(so, inp, addrs->addr,
5787			    addrs->sget_assoc_id, vrf_id,
5788			    &error, p);
5789			break;
5790		}
5791	case SCTP_BINDX_REM_ADDR:
5792		{
5793			struct sctp_getaddresses *addrs;
5794			struct thread *td;
5795
5796			td = (struct thread *)p;
5797
5798			SCTP_CHECK_AND_CAST(addrs, optval, struct sctp_getaddresses, optsize);
5799#ifdef INET
5800			if (addrs->addr->sa_family == AF_INET) {
5801				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in)) {
5802					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5803					error = EINVAL;
5804					break;
5805				}
5806				if (td != NULL && (error = prison_local_ip4(td->td_ucred, &(((struct sockaddr_in *)(addrs->addr))->sin_addr)))) {
5807					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5808					break;
5809				}
5810			} else
5811#endif
5812#ifdef INET6
5813			if (addrs->addr->sa_family == AF_INET6) {
5814				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in6)) {
5815					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5816					error = EINVAL;
5817					break;
5818				}
5819				if (td != NULL &&
5820				    (error = prison_local_ip6(td->td_ucred,
5821				    &(((struct sockaddr_in6 *)(addrs->addr))->sin6_addr),
5822				    (SCTP_IPV6_V6ONLY(inp) != 0))) != 0) {
5823					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5824					break;
5825				}
5826			} else
5827#endif
5828			{
5829				error = EAFNOSUPPORT;
5830				break;
5831			}
5832			sctp_bindx_delete_address(inp, addrs->addr,
5833			    addrs->sget_assoc_id, vrf_id,
5834			    &error);
5835			break;
5836		}
5837	case SCTP_EVENT:
5838		{
5839			struct sctp_event *event;
5840			uint32_t event_type;
5841
5842			SCTP_CHECK_AND_CAST(event, optval, struct sctp_event, optsize);
5843			SCTP_FIND_STCB(inp, stcb, event->se_assoc_id);
5844			switch (event->se_type) {
5845			case SCTP_ASSOC_CHANGE:
5846				event_type = SCTP_PCB_FLAGS_RECVASSOCEVNT;
5847				break;
5848			case SCTP_PEER_ADDR_CHANGE:
5849				event_type = SCTP_PCB_FLAGS_RECVPADDREVNT;
5850				break;
5851			case SCTP_REMOTE_ERROR:
5852				event_type = SCTP_PCB_FLAGS_RECVPEERERR;
5853				break;
5854			case SCTP_SEND_FAILED:
5855				event_type = SCTP_PCB_FLAGS_RECVSENDFAILEVNT;
5856				break;
5857			case SCTP_SHUTDOWN_EVENT:
5858				event_type = SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT;
5859				break;
5860			case SCTP_ADAPTATION_INDICATION:
5861				event_type = SCTP_PCB_FLAGS_ADAPTATIONEVNT;
5862				break;
5863			case SCTP_PARTIAL_DELIVERY_EVENT:
5864				event_type = SCTP_PCB_FLAGS_PDAPIEVNT;
5865				break;
5866			case SCTP_AUTHENTICATION_EVENT:
5867				event_type = SCTP_PCB_FLAGS_AUTHEVNT;
5868				break;
5869			case SCTP_STREAM_RESET_EVENT:
5870				event_type = SCTP_PCB_FLAGS_STREAM_RESETEVNT;
5871				break;
5872			case SCTP_SENDER_DRY_EVENT:
5873				event_type = SCTP_PCB_FLAGS_DRYEVNT;
5874				break;
5875			case SCTP_NOTIFICATIONS_STOPPED_EVENT:
5876				event_type = 0;
5877				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
5878				error = ENOTSUP;
5879				break;
5880			case SCTP_ASSOC_RESET_EVENT:
5881				event_type = SCTP_PCB_FLAGS_ASSOC_RESETEVNT;
5882				break;
5883			case SCTP_STREAM_CHANGE_EVENT:
5884				event_type = SCTP_PCB_FLAGS_STREAM_CHANGEEVNT;
5885				break;
5886			case SCTP_SEND_FAILED_EVENT:
5887				event_type = SCTP_PCB_FLAGS_RECVNSENDFAILEVNT;
5888				break;
5889			default:
5890				event_type = 0;
5891				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5892				error = EINVAL;
5893				break;
5894			}
5895			if (event_type > 0) {
5896				if (stcb) {
5897					if (event->se_on) {
5898						sctp_stcb_feature_on(inp, stcb, event_type);
5899						if (event_type == SCTP_PCB_FLAGS_DRYEVNT) {
5900							if (TAILQ_EMPTY(&stcb->asoc.send_queue) &&
5901							    TAILQ_EMPTY(&stcb->asoc.sent_queue) &&
5902							    (stcb->asoc.stream_queue_cnt == 0)) {
5903								sctp_ulp_notify(SCTP_NOTIFY_SENDER_DRY, stcb, 0, NULL, SCTP_SO_LOCKED);
5904							}
5905						}
5906					} else {
5907						sctp_stcb_feature_off(inp, stcb, event_type);
5908					}
5909					SCTP_TCB_UNLOCK(stcb);
5910				} else {
5911					/*
5912					 * We don't want to send up a storm
5913					 * of events, so return an error for
5914					 * sender dry events
5915					 */
5916					if ((event_type == SCTP_PCB_FLAGS_DRYEVNT) &&
5917					    ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) == 0) &&
5918					    ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) == 0) &&
5919					    ((event->se_assoc_id == SCTP_ALL_ASSOC) ||
5920					    (event->se_assoc_id == SCTP_CURRENT_ASSOC))) {
5921						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
5922						error = ENOTSUP;
5923						break;
5924					}
5925					if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5926					    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5927					    (event->se_assoc_id == SCTP_FUTURE_ASSOC) ||
5928					    (event->se_assoc_id == SCTP_ALL_ASSOC)) {
5929						SCTP_INP_WLOCK(inp);
5930						if (event->se_on) {
5931							sctp_feature_on(inp, event_type);
5932						} else {
5933							sctp_feature_off(inp, event_type);
5934						}
5935						SCTP_INP_WUNLOCK(inp);
5936					}
5937					if ((event->se_assoc_id == SCTP_CURRENT_ASSOC) ||
5938					    (event->se_assoc_id == SCTP_ALL_ASSOC)) {
5939						SCTP_INP_RLOCK(inp);
5940						LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
5941							SCTP_TCB_LOCK(stcb);
5942							if (event->se_on) {
5943								sctp_stcb_feature_on(inp, stcb, event_type);
5944							} else {
5945								sctp_stcb_feature_off(inp, stcb, event_type);
5946							}
5947							SCTP_TCB_UNLOCK(stcb);
5948						}
5949						SCTP_INP_RUNLOCK(inp);
5950					}
5951				}
5952			}
5953			break;
5954		}
5955	case SCTP_RECVRCVINFO:
5956		{
5957			int *onoff;
5958
5959			SCTP_CHECK_AND_CAST(onoff, optval, int, optsize);
5960			SCTP_INP_WLOCK(inp);
5961			if (*onoff != 0) {
5962				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
5963			} else {
5964				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
5965			}
5966			SCTP_INP_WUNLOCK(inp);
5967			break;
5968		}
5969	case SCTP_RECVNXTINFO:
5970		{
5971			int *onoff;
5972
5973			SCTP_CHECK_AND_CAST(onoff, optval, int, optsize);
5974			SCTP_INP_WLOCK(inp);
5975			if (*onoff != 0) {
5976				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
5977			} else {
5978				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
5979			}
5980			SCTP_INP_WUNLOCK(inp);
5981			break;
5982		}
5983	case SCTP_DEFAULT_SNDINFO:
5984		{
5985			struct sctp_sndinfo *info;
5986			uint16_t policy;
5987
5988			SCTP_CHECK_AND_CAST(info, optval, struct sctp_sndinfo, optsize);
5989			SCTP_FIND_STCB(inp, stcb, info->snd_assoc_id);
5990
5991			if (stcb) {
5992				if (info->snd_sid < stcb->asoc.streamoutcnt) {
5993					stcb->asoc.def_send.sinfo_stream = info->snd_sid;
5994					policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
5995					stcb->asoc.def_send.sinfo_flags = info->snd_flags;
5996					stcb->asoc.def_send.sinfo_flags |= policy;
5997					stcb->asoc.def_send.sinfo_ppid = info->snd_ppid;
5998					stcb->asoc.def_send.sinfo_context = info->snd_context;
5999				} else {
6000					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6001					error = EINVAL;
6002				}
6003				SCTP_TCB_UNLOCK(stcb);
6004			} else {
6005				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6006				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6007				    (info->snd_assoc_id == SCTP_FUTURE_ASSOC) ||
6008				    (info->snd_assoc_id == SCTP_ALL_ASSOC)) {
6009					SCTP_INP_WLOCK(inp);
6010					inp->def_send.sinfo_stream = info->snd_sid;
6011					policy = PR_SCTP_POLICY(inp->def_send.sinfo_flags);
6012					inp->def_send.sinfo_flags = info->snd_flags;
6013					inp->def_send.sinfo_flags |= policy;
6014					inp->def_send.sinfo_ppid = info->snd_ppid;
6015					inp->def_send.sinfo_context = info->snd_context;
6016					SCTP_INP_WUNLOCK(inp);
6017				}
6018				if ((info->snd_assoc_id == SCTP_CURRENT_ASSOC) ||
6019				    (info->snd_assoc_id == SCTP_ALL_ASSOC)) {
6020					SCTP_INP_RLOCK(inp);
6021					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
6022						SCTP_TCB_LOCK(stcb);
6023						if (info->snd_sid < stcb->asoc.streamoutcnt) {
6024							stcb->asoc.def_send.sinfo_stream = info->snd_sid;
6025							policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
6026							stcb->asoc.def_send.sinfo_flags = info->snd_flags;
6027							stcb->asoc.def_send.sinfo_flags |= policy;
6028							stcb->asoc.def_send.sinfo_ppid = info->snd_ppid;
6029							stcb->asoc.def_send.sinfo_context = info->snd_context;
6030						}
6031						SCTP_TCB_UNLOCK(stcb);
6032					}
6033					SCTP_INP_RUNLOCK(inp);
6034				}
6035			}
6036			break;
6037		}
6038	case SCTP_DEFAULT_PRINFO:
6039		{
6040			struct sctp_default_prinfo *info;
6041
6042			SCTP_CHECK_AND_CAST(info, optval, struct sctp_default_prinfo, optsize);
6043			SCTP_FIND_STCB(inp, stcb, info->pr_assoc_id);
6044
6045			if (PR_SCTP_INVALID_POLICY(info->pr_policy)) {
6046				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6047				error = EINVAL;
6048				break;
6049			}
6050			if (stcb) {
6051				stcb->asoc.def_send.sinfo_flags &= 0xfff0;
6052				stcb->asoc.def_send.sinfo_flags |= info->pr_policy;
6053				stcb->asoc.def_send.sinfo_timetolive = info->pr_value;
6054				SCTP_TCB_UNLOCK(stcb);
6055			} else {
6056				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6057				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6058				    (info->pr_assoc_id == SCTP_FUTURE_ASSOC) ||
6059				    (info->pr_assoc_id == SCTP_ALL_ASSOC)) {
6060					SCTP_INP_WLOCK(inp);
6061					inp->def_send.sinfo_flags &= 0xfff0;
6062					inp->def_send.sinfo_flags |= info->pr_policy;
6063					inp->def_send.sinfo_timetolive = info->pr_value;
6064					SCTP_INP_WUNLOCK(inp);
6065				}
6066				if ((info->pr_assoc_id == SCTP_CURRENT_ASSOC) ||
6067				    (info->pr_assoc_id == SCTP_ALL_ASSOC)) {
6068					SCTP_INP_RLOCK(inp);
6069					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
6070						SCTP_TCB_LOCK(stcb);
6071						stcb->asoc.def_send.sinfo_flags &= 0xfff0;
6072						stcb->asoc.def_send.sinfo_flags |= info->pr_policy;
6073						stcb->asoc.def_send.sinfo_timetolive = info->pr_value;
6074						SCTP_TCB_UNLOCK(stcb);
6075					}
6076					SCTP_INP_RUNLOCK(inp);
6077				}
6078			}
6079			break;
6080		}
6081	case SCTP_PEER_ADDR_THLDS:
6082		/* Applies to the specific association */
6083		{
6084			struct sctp_paddrthlds *thlds;
6085			struct sctp_nets *net;
6086			struct sockaddr *addr;
6087
6088#if defined(INET) && defined(INET6)
6089			struct sockaddr_in sin_store;
6090
6091#endif
6092
6093			SCTP_CHECK_AND_CAST(thlds, optval, struct sctp_paddrthlds, optsize);
6094			SCTP_FIND_STCB(inp, stcb, thlds->spt_assoc_id);
6095
6096#if defined(INET) && defined(INET6)
6097			if (thlds->spt_address.ss_family == AF_INET6) {
6098				struct sockaddr_in6 *sin6;
6099
6100				sin6 = (struct sockaddr_in6 *)&thlds->spt_address;
6101				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
6102					in6_sin6_2_sin(&sin_store, sin6);
6103					addr = (struct sockaddr *)&sin_store;
6104				} else {
6105					addr = (struct sockaddr *)&thlds->spt_address;
6106				}
6107			} else {
6108				addr = (struct sockaddr *)&thlds->spt_address;
6109			}
6110#else
6111			addr = (struct sockaddr *)&thlds->spt_address;
6112#endif
6113			if (stcb != NULL) {
6114				net = sctp_findnet(stcb, addr);
6115			} else {
6116				/*
6117				 * We increment here since
6118				 * sctp_findassociation_ep_addr() wil do a
6119				 * decrement if it finds the stcb as long as
6120				 * the locked tcb (last argument) is NOT a
6121				 * TCB.. aka NULL.
6122				 */
6123				net = NULL;
6124				SCTP_INP_INCR_REF(inp);
6125				stcb = sctp_findassociation_ep_addr(&inp, addr,
6126				    &net, NULL, NULL);
6127				if (stcb == NULL) {
6128					SCTP_INP_DECR_REF(inp);
6129				}
6130			}
6131			if ((stcb != NULL) && (net == NULL)) {
6132#ifdef INET
6133				if (addr->sa_family == AF_INET) {
6134
6135					struct sockaddr_in *sin;
6136
6137					sin = (struct sockaddr_in *)addr;
6138					if (sin->sin_addr.s_addr != INADDR_ANY) {
6139						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6140						SCTP_TCB_UNLOCK(stcb);
6141						error = EINVAL;
6142						break;
6143					}
6144				} else
6145#endif
6146#ifdef INET6
6147				if (addr->sa_family == AF_INET6) {
6148					struct sockaddr_in6 *sin6;
6149
6150					sin6 = (struct sockaddr_in6 *)addr;
6151					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
6152						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6153						SCTP_TCB_UNLOCK(stcb);
6154						error = EINVAL;
6155						break;
6156					}
6157				} else
6158#endif
6159				{
6160					error = EAFNOSUPPORT;
6161					SCTP_TCB_UNLOCK(stcb);
6162					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6163					break;
6164				}
6165			}
6166			if (stcb != NULL) {
6167				if (net != NULL) {
6168					if (net->dest_state & SCTP_ADDR_PF) {
6169						if ((net->failure_threshold > thlds->spt_pathmaxrxt) ||
6170						    (net->failure_threshold <= thlds->spt_pathpfthld)) {
6171							net->dest_state &= ~SCTP_ADDR_PF;
6172						}
6173					} else {
6174						if ((net->failure_threshold > thlds->spt_pathpfthld) &&
6175						    (net->failure_threshold <= thlds->spt_pathmaxrxt)) {
6176							net->dest_state |= SCTP_ADDR_PF;
6177							sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
6178							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
6179							sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
6180						}
6181					}
6182					if (net->dest_state & SCTP_ADDR_REACHABLE) {
6183						if (net->failure_threshold > thlds->spt_pathmaxrxt) {
6184							net->dest_state &= ~SCTP_ADDR_REACHABLE;
6185							sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
6186						}
6187					} else {
6188						if (net->failure_threshold <= thlds->spt_pathmaxrxt) {
6189							net->dest_state |= SCTP_ADDR_REACHABLE;
6190							sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
6191						}
6192					}
6193					net->failure_threshold = thlds->spt_pathmaxrxt;
6194					net->pf_threshold = thlds->spt_pathpfthld;
6195				} else {
6196					TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
6197						if (net->dest_state & SCTP_ADDR_PF) {
6198							if ((net->failure_threshold > thlds->spt_pathmaxrxt) ||
6199							    (net->failure_threshold <= thlds->spt_pathpfthld)) {
6200								net->dest_state &= ~SCTP_ADDR_PF;
6201							}
6202						} else {
6203							if ((net->failure_threshold > thlds->spt_pathpfthld) &&
6204							    (net->failure_threshold <= thlds->spt_pathmaxrxt)) {
6205								net->dest_state |= SCTP_ADDR_PF;
6206								sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
6207								sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
6208								sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
6209							}
6210						}
6211						if (net->dest_state & SCTP_ADDR_REACHABLE) {
6212							if (net->failure_threshold > thlds->spt_pathmaxrxt) {
6213								net->dest_state &= ~SCTP_ADDR_REACHABLE;
6214								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
6215							}
6216						} else {
6217							if (net->failure_threshold <= thlds->spt_pathmaxrxt) {
6218								net->dest_state |= SCTP_ADDR_REACHABLE;
6219								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
6220							}
6221						}
6222						net->failure_threshold = thlds->spt_pathmaxrxt;
6223						net->pf_threshold = thlds->spt_pathpfthld;
6224					}
6225					stcb->asoc.def_net_failure = thlds->spt_pathmaxrxt;
6226					stcb->asoc.def_net_pf_threshold = thlds->spt_pathpfthld;
6227				}
6228			} else {
6229				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6230				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6231				    (thlds->spt_assoc_id == SCTP_FUTURE_ASSOC)) {
6232					SCTP_INP_WLOCK(inp);
6233					inp->sctp_ep.def_net_failure = thlds->spt_pathmaxrxt;
6234					inp->sctp_ep.def_net_pf_threshold = thlds->spt_pathpfthld;
6235					SCTP_INP_WUNLOCK(inp);
6236				} else {
6237					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6238					error = EINVAL;
6239				}
6240			}
6241			break;
6242		}
6243	case SCTP_REMOTE_UDP_ENCAPS_PORT:
6244		{
6245			struct sctp_udpencaps *encaps;
6246			struct sctp_nets *net;
6247			struct sockaddr *addr;
6248
6249#if defined(INET) && defined(INET6)
6250			struct sockaddr_in sin_store;
6251
6252#endif
6253
6254			SCTP_CHECK_AND_CAST(encaps, optval, struct sctp_udpencaps, optsize);
6255			SCTP_FIND_STCB(inp, stcb, encaps->sue_assoc_id);
6256
6257#if defined(INET) && defined(INET6)
6258			if (encaps->sue_address.ss_family == AF_INET6) {
6259				struct sockaddr_in6 *sin6;
6260
6261				sin6 = (struct sockaddr_in6 *)&encaps->sue_address;
6262				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
6263					in6_sin6_2_sin(&sin_store, sin6);
6264					addr = (struct sockaddr *)&sin_store;
6265				} else {
6266					addr = (struct sockaddr *)&encaps->sue_address;
6267				}
6268			} else {
6269				addr = (struct sockaddr *)&encaps->sue_address;
6270			}
6271#else
6272			addr = (struct sockaddr *)&encaps->sue_address;
6273#endif
6274			if (stcb != NULL) {
6275				net = sctp_findnet(stcb, addr);
6276			} else {
6277				/*
6278				 * We increment here since
6279				 * sctp_findassociation_ep_addr() wil do a
6280				 * decrement if it finds the stcb as long as
6281				 * the locked tcb (last argument) is NOT a
6282				 * TCB.. aka NULL.
6283				 */
6284				net = NULL;
6285				SCTP_INP_INCR_REF(inp);
6286				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
6287				if (stcb == NULL) {
6288					SCTP_INP_DECR_REF(inp);
6289				}
6290			}
6291			if ((stcb != NULL) && (net == NULL)) {
6292#ifdef INET
6293				if (addr->sa_family == AF_INET) {
6294
6295					struct sockaddr_in *sin;
6296
6297					sin = (struct sockaddr_in *)addr;
6298					if (sin->sin_addr.s_addr != INADDR_ANY) {
6299						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6300						SCTP_TCB_UNLOCK(stcb);
6301						error = EINVAL;
6302						break;
6303					}
6304				} else
6305#endif
6306#ifdef INET6
6307				if (addr->sa_family == AF_INET6) {
6308					struct sockaddr_in6 *sin6;
6309
6310					sin6 = (struct sockaddr_in6 *)addr;
6311					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
6312						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6313						SCTP_TCB_UNLOCK(stcb);
6314						error = EINVAL;
6315						break;
6316					}
6317				} else
6318#endif
6319				{
6320					error = EAFNOSUPPORT;
6321					SCTP_TCB_UNLOCK(stcb);
6322					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6323					break;
6324				}
6325			}
6326			if (stcb != NULL) {
6327				if (net != NULL) {
6328					net->port = encaps->sue_port;
6329				} else {
6330					stcb->asoc.port = encaps->sue_port;
6331				}
6332				SCTP_TCB_UNLOCK(stcb);
6333			} else {
6334				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6335				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6336				    (encaps->sue_assoc_id == SCTP_FUTURE_ASSOC)) {
6337					SCTP_INP_WLOCK(inp);
6338					inp->sctp_ep.port = encaps->sue_port;
6339					SCTP_INP_WUNLOCK(inp);
6340				} else {
6341					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6342					error = EINVAL;
6343				}
6344			}
6345			break;
6346		}
6347	case SCTP_ECN_SUPPORTED:
6348		{
6349			struct sctp_assoc_value *av;
6350
6351			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6352			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6353
6354			if (stcb) {
6355				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6356				error = EINVAL;
6357				SCTP_TCB_UNLOCK(stcb);
6358			} else {
6359				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6360				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6361				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6362					SCTP_INP_WLOCK(inp);
6363					if (av->assoc_value == 0) {
6364						inp->ecn_supported = 0;
6365					} else {
6366						inp->ecn_supported = 1;
6367					}
6368					SCTP_INP_WUNLOCK(inp);
6369				} else {
6370					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6371					error = EINVAL;
6372				}
6373			}
6374			break;
6375		}
6376	case SCTP_PR_SUPPORTED:
6377		{
6378			struct sctp_assoc_value *av;
6379
6380			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6381			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6382
6383			if (stcb) {
6384				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6385				error = EINVAL;
6386				SCTP_TCB_UNLOCK(stcb);
6387			} else {
6388				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6389				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6390				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6391					SCTP_INP_WLOCK(inp);
6392					if (av->assoc_value == 0) {
6393						inp->prsctp_supported = 0;
6394					} else {
6395						inp->prsctp_supported = 1;
6396					}
6397					SCTP_INP_WUNLOCK(inp);
6398				} else {
6399					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6400					error = EINVAL;
6401				}
6402			}
6403			break;
6404		}
6405	case SCTP_AUTH_SUPPORTED:
6406		{
6407			struct sctp_assoc_value *av;
6408
6409			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6410			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6411
6412			if (stcb) {
6413				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6414				error = EINVAL;
6415				SCTP_TCB_UNLOCK(stcb);
6416			} else {
6417				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6418				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6419				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6420					if ((av->assoc_value == 0) &&
6421					    (inp->asconf_supported == 1)) {
6422						/*
6423						 * AUTH is required for
6424						 * ASCONF
6425						 */
6426						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6427						error = EINVAL;
6428					} else {
6429						SCTP_INP_WLOCK(inp);
6430						if (av->assoc_value == 0) {
6431							inp->auth_supported = 0;
6432						} else {
6433							inp->auth_supported = 1;
6434						}
6435						SCTP_INP_WUNLOCK(inp);
6436					}
6437				} else {
6438					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6439					error = EINVAL;
6440				}
6441			}
6442			break;
6443		}
6444	case SCTP_ASCONF_SUPPORTED:
6445		{
6446			struct sctp_assoc_value *av;
6447
6448			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6449			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6450
6451			if (stcb) {
6452				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6453				error = EINVAL;
6454				SCTP_TCB_UNLOCK(stcb);
6455			} else {
6456				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6457				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6458				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6459					if ((av->assoc_value != 0) &&
6460					    (inp->auth_supported == 0)) {
6461						/*
6462						 * AUTH is required for
6463						 * ASCONF
6464						 */
6465						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6466						error = EINVAL;
6467					} else {
6468						SCTP_INP_WLOCK(inp);
6469						if (av->assoc_value == 0) {
6470							inp->asconf_supported = 0;
6471							sctp_auth_delete_chunk(SCTP_ASCONF,
6472							    inp->sctp_ep.local_auth_chunks);
6473							sctp_auth_delete_chunk(SCTP_ASCONF_ACK,
6474							    inp->sctp_ep.local_auth_chunks);
6475						} else {
6476							inp->asconf_supported = 1;
6477							sctp_auth_add_chunk(SCTP_ASCONF,
6478							    inp->sctp_ep.local_auth_chunks);
6479							sctp_auth_add_chunk(SCTP_ASCONF_ACK,
6480							    inp->sctp_ep.local_auth_chunks);
6481						}
6482						SCTP_INP_WUNLOCK(inp);
6483					}
6484				} else {
6485					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6486					error = EINVAL;
6487				}
6488			}
6489			break;
6490		}
6491	case SCTP_RECONFIG_SUPPORTED:
6492		{
6493			struct sctp_assoc_value *av;
6494
6495			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6496			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6497
6498			if (stcb) {
6499				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6500				error = EINVAL;
6501				SCTP_TCB_UNLOCK(stcb);
6502			} else {
6503				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6504				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6505				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6506					SCTP_INP_WLOCK(inp);
6507					if (av->assoc_value == 0) {
6508						inp->reconfig_supported = 0;
6509					} else {
6510						inp->reconfig_supported = 1;
6511					}
6512					SCTP_INP_WUNLOCK(inp);
6513				} else {
6514					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6515					error = EINVAL;
6516				}
6517			}
6518			break;
6519		}
6520	case SCTP_NRSACK_SUPPORTED:
6521		{
6522			struct sctp_assoc_value *av;
6523
6524			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6525			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6526
6527			if (stcb) {
6528				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6529				error = EINVAL;
6530				SCTP_TCB_UNLOCK(stcb);
6531			} else {
6532				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6533				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6534				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6535					SCTP_INP_WLOCK(inp);
6536					if (av->assoc_value == 0) {
6537						inp->nrsack_supported = 0;
6538					} else {
6539						inp->nrsack_supported = 1;
6540					}
6541					SCTP_INP_WUNLOCK(inp);
6542				} else {
6543					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6544					error = EINVAL;
6545				}
6546			}
6547			break;
6548		}
6549	case SCTP_PKTDROP_SUPPORTED:
6550		{
6551			struct sctp_assoc_value *av;
6552
6553			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6554			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6555
6556			if (stcb) {
6557				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6558				error = EINVAL;
6559				SCTP_TCB_UNLOCK(stcb);
6560			} else {
6561				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6562				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6563				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6564					SCTP_INP_WLOCK(inp);
6565					if (av->assoc_value == 0) {
6566						inp->pktdrop_supported = 0;
6567					} else {
6568						inp->pktdrop_supported = 1;
6569					}
6570					SCTP_INP_WUNLOCK(inp);
6571				} else {
6572					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6573					error = EINVAL;
6574				}
6575			}
6576			break;
6577		}
6578	default:
6579		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
6580		error = ENOPROTOOPT;
6581		break;
6582	}			/* end switch (opt) */
6583	return (error);
6584}
6585
6586int
6587sctp_ctloutput(struct socket *so, struct sockopt *sopt)
6588{
6589	void *optval = NULL;
6590	size_t optsize = 0;
6591	void *p;
6592	int error = 0;
6593
6594	if (sopt->sopt_level != IPPROTO_SCTP) {
6595		/* wrong proto level... send back up to IP */
6596#ifdef INET6
6597		if (INP_CHECK_SOCKAF(so, AF_INET6))
6598			error = ip6_ctloutput(so, sopt);
6599#endif				/* INET6 */
6600#if defined(INET) && defined(INET6)
6601		else
6602#endif
6603#ifdef INET
6604			error = ip_ctloutput(so, sopt);
6605#endif
6606		return (error);
6607	}
6608	optsize = sopt->sopt_valsize;
6609	if (optsize) {
6610		SCTP_MALLOC(optval, void *, optsize, SCTP_M_SOCKOPT);
6611		if (optval == NULL) {
6612			SCTP_LTRACE_ERR_RET(so->so_pcb, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOBUFS);
6613			return (ENOBUFS);
6614		}
6615		error = sooptcopyin(sopt, optval, optsize, optsize);
6616		if (error) {
6617			SCTP_FREE(optval, SCTP_M_SOCKOPT);
6618			goto out;
6619		}
6620	}
6621	p = (void *)sopt->sopt_td;
6622	if (sopt->sopt_dir == SOPT_SET) {
6623		error = sctp_setopt(so, sopt->sopt_name, optval, optsize, p);
6624	} else if (sopt->sopt_dir == SOPT_GET) {
6625		error = sctp_getopt(so, sopt->sopt_name, optval, &optsize, p);
6626	} else {
6627		SCTP_LTRACE_ERR_RET(so->so_pcb, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6628		error = EINVAL;
6629	}
6630	if ((error == 0) && (optval != NULL)) {
6631		error = sooptcopyout(sopt, optval, optsize);
6632		SCTP_FREE(optval, SCTP_M_SOCKOPT);
6633	} else if (optval != NULL) {
6634		SCTP_FREE(optval, SCTP_M_SOCKOPT);
6635	}
6636out:
6637	return (error);
6638}
6639
6640#ifdef INET
6641static int
6642sctp_connect(struct socket *so, struct sockaddr *addr, struct thread *p)
6643{
6644	int error = 0;
6645	int create_lock_on = 0;
6646	uint32_t vrf_id;
6647	struct sctp_inpcb *inp;
6648	struct sctp_tcb *stcb = NULL;
6649
6650	inp = (struct sctp_inpcb *)so->so_pcb;
6651	if (inp == NULL) {
6652		/* I made the same as TCP since we are not setup? */
6653		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6654		return (ECONNRESET);
6655	}
6656	if (addr == NULL) {
6657		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6658		return EINVAL;
6659	}
6660	switch (addr->sa_family) {
6661#ifdef INET6
6662	case AF_INET6:
6663		{
6664			struct sockaddr_in6 *sin6p;
6665
6666			if (addr->sa_len != sizeof(struct sockaddr_in6)) {
6667				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6668				return (EINVAL);
6669			}
6670			sin6p = (struct sockaddr_in6 *)addr;
6671			if (p != NULL && (error = prison_remote_ip6(p->td_ucred, &sin6p->sin6_addr)) != 0) {
6672				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6673				return (error);
6674			}
6675			break;
6676		}
6677#endif
6678#ifdef INET
6679	case AF_INET:
6680		{
6681			struct sockaddr_in *sinp;
6682
6683			if (addr->sa_len != sizeof(struct sockaddr_in)) {
6684				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6685				return (EINVAL);
6686			}
6687			sinp = (struct sockaddr_in *)addr;
6688			if (p != NULL && (error = prison_remote_ip4(p->td_ucred, &sinp->sin_addr)) != 0) {
6689				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6690				return (error);
6691			}
6692			break;
6693		}
6694#endif
6695	default:
6696		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EAFNOSUPPORT);
6697		return (EAFNOSUPPORT);
6698	}
6699	SCTP_INP_INCR_REF(inp);
6700	SCTP_ASOC_CREATE_LOCK(inp);
6701	create_lock_on = 1;
6702
6703
6704	if ((inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) ||
6705	    (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE)) {
6706		/* Should I really unlock ? */
6707		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EFAULT);
6708		error = EFAULT;
6709		goto out_now;
6710	}
6711#ifdef INET6
6712	if (((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) &&
6713	    (addr->sa_family == AF_INET6)) {
6714		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6715		error = EINVAL;
6716		goto out_now;
6717	}
6718#endif
6719	if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) ==
6720	    SCTP_PCB_FLAGS_UNBOUND) {
6721		/* Bind a ephemeral port */
6722		error = sctp_inpcb_bind(so, NULL, NULL, p);
6723		if (error) {
6724			goto out_now;
6725		}
6726	}
6727	/* Now do we connect? */
6728	if ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) &&
6729	    (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE))) {
6730		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6731		error = EINVAL;
6732		goto out_now;
6733	}
6734	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
6735	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
6736		/* We are already connected AND the TCP model */
6737		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
6738		error = EADDRINUSE;
6739		goto out_now;
6740	}
6741	if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
6742		SCTP_INP_RLOCK(inp);
6743		stcb = LIST_FIRST(&inp->sctp_asoc_list);
6744		SCTP_INP_RUNLOCK(inp);
6745	} else {
6746		/*
6747		 * We increment here since sctp_findassociation_ep_addr()
6748		 * will do a decrement if it finds the stcb as long as the
6749		 * locked tcb (last argument) is NOT a TCB.. aka NULL.
6750		 */
6751		SCTP_INP_INCR_REF(inp);
6752		stcb = sctp_findassociation_ep_addr(&inp, addr, NULL, NULL, NULL);
6753		if (stcb == NULL) {
6754			SCTP_INP_DECR_REF(inp);
6755		} else {
6756			SCTP_TCB_UNLOCK(stcb);
6757		}
6758	}
6759	if (stcb != NULL) {
6760		/* Already have or am bring up an association */
6761		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
6762		error = EALREADY;
6763		goto out_now;
6764	}
6765	vrf_id = inp->def_vrf_id;
6766	/* We are GOOD to go */
6767	stcb = sctp_aloc_assoc(inp, addr, &error, 0, vrf_id, p);
6768	if (stcb == NULL) {
6769		/* Gak! no memory */
6770		goto out_now;
6771	}
6772	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
6773		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
6774		/* Set the connected flag so we can queue data */
6775		soisconnecting(so);
6776	}
6777	SCTP_SET_STATE(&stcb->asoc, SCTP_STATE_COOKIE_WAIT);
6778	(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
6779
6780	/* initialize authentication parameters for the assoc */
6781	sctp_initialize_auth_params(inp, stcb);
6782
6783	sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
6784	SCTP_TCB_UNLOCK(stcb);
6785out_now:
6786	if (create_lock_on) {
6787		SCTP_ASOC_CREATE_UNLOCK(inp);
6788	}
6789	SCTP_INP_DECR_REF(inp);
6790	return (error);
6791}
6792
6793#endif
6794
6795int
6796sctp_listen(struct socket *so, int backlog, struct thread *p)
6797{
6798	/*
6799	 * Note this module depends on the protocol processing being called
6800	 * AFTER any socket level flags and backlog are applied to the
6801	 * socket. The traditional way that the socket flags are applied is
6802	 * AFTER protocol processing. We have made a change to the
6803	 * sys/kern/uipc_socket.c module to reverse this but this MUST be in
6804	 * place if the socket API for SCTP is to work properly.
6805	 */
6806
6807	int error = 0;
6808	struct sctp_inpcb *inp;
6809
6810	inp = (struct sctp_inpcb *)so->so_pcb;
6811	if (inp == NULL) {
6812		/* I made the same as TCP since we are not setup? */
6813		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6814		return (ECONNRESET);
6815	}
6816	if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE)) {
6817		/* See if we have a listener */
6818		struct sctp_inpcb *tinp;
6819		union sctp_sockstore store;
6820
6821		if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
6822			/* not bound all */
6823			struct sctp_laddr *laddr;
6824
6825			LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
6826				memcpy(&store, &laddr->ifa->address, sizeof(store));
6827				switch (store.sa.sa_family) {
6828#ifdef INET
6829				case AF_INET:
6830					store.sin.sin_port = inp->sctp_lport;
6831					break;
6832#endif
6833#ifdef INET6
6834				case AF_INET6:
6835					store.sin6.sin6_port = inp->sctp_lport;
6836					break;
6837#endif
6838				default:
6839					break;
6840				}
6841				tinp = sctp_pcb_findep(&store.sa, 0, 0, inp->def_vrf_id);
6842				if (tinp && (tinp != inp) &&
6843				    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) == 0) &&
6844				    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
6845				    (tinp->sctp_socket->so_qlimit)) {
6846					/*
6847					 * we have a listener already and
6848					 * its not this inp.
6849					 */
6850					SCTP_INP_DECR_REF(tinp);
6851					return (EADDRINUSE);
6852				} else if (tinp) {
6853					SCTP_INP_DECR_REF(tinp);
6854				}
6855			}
6856		} else {
6857			/* Setup a local addr bound all */
6858			memset(&store, 0, sizeof(store));
6859#ifdef INET6
6860			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
6861				store.sa.sa_family = AF_INET6;
6862				store.sa.sa_len = sizeof(struct sockaddr_in6);
6863			}
6864#endif
6865#ifdef INET
6866			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
6867				store.sa.sa_family = AF_INET;
6868				store.sa.sa_len = sizeof(struct sockaddr_in);
6869			}
6870#endif
6871			switch (store.sa.sa_family) {
6872#ifdef INET
6873			case AF_INET:
6874				store.sin.sin_port = inp->sctp_lport;
6875				break;
6876#endif
6877#ifdef INET6
6878			case AF_INET6:
6879				store.sin6.sin6_port = inp->sctp_lport;
6880				break;
6881#endif
6882			default:
6883				break;
6884			}
6885			tinp = sctp_pcb_findep(&store.sa, 0, 0, inp->def_vrf_id);
6886			if (tinp && (tinp != inp) &&
6887			    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) == 0) &&
6888			    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
6889			    (tinp->sctp_socket->so_qlimit)) {
6890				/*
6891				 * we have a listener already and its not
6892				 * this inp.
6893				 */
6894				SCTP_INP_DECR_REF(tinp);
6895				return (EADDRINUSE);
6896			} else if (tinp) {
6897				SCTP_INP_DECR_REF(inp);
6898			}
6899		}
6900	}
6901	SCTP_INP_RLOCK(inp);
6902#ifdef SCTP_LOCK_LOGGING
6903	if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_LOCK_LOGGING_ENABLE) {
6904		sctp_log_lock(inp, (struct sctp_tcb *)NULL, SCTP_LOG_LOCK_SOCK);
6905	}
6906#endif
6907	SOCK_LOCK(so);
6908	error = solisten_proto_check(so);
6909	if (error) {
6910		SOCK_UNLOCK(so);
6911		SCTP_INP_RUNLOCK(inp);
6912		return (error);
6913	}
6914	if ((sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE)) &&
6915	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
6916		/*
6917		 * The unlucky case - We are in the tcp pool with this guy.
6918		 * - Someone else is in the main inp slot. - We must move
6919		 * this guy (the listener) to the main slot - We must then
6920		 * move the guy that was listener to the TCP Pool.
6921		 */
6922		if (sctp_swap_inpcb_for_listen(inp)) {
6923			goto in_use;
6924		}
6925	}
6926	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
6927	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
6928		/* We are already connected AND the TCP model */
6929in_use:
6930		SCTP_INP_RUNLOCK(inp);
6931		SOCK_UNLOCK(so);
6932		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
6933		return (EADDRINUSE);
6934	}
6935	SCTP_INP_RUNLOCK(inp);
6936	if (inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) {
6937		/* We must do a bind. */
6938		SOCK_UNLOCK(so);
6939		if ((error = sctp_inpcb_bind(so, NULL, NULL, p))) {
6940			/* bind error, probably perm */
6941			return (error);
6942		}
6943		SOCK_LOCK(so);
6944	}
6945	/* It appears for 7.0 and on, we must always call this. */
6946	solisten_proto(so, backlog);
6947	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
6948		/* remove the ACCEPTCONN flag for one-to-many sockets */
6949		so->so_options &= ~SO_ACCEPTCONN;
6950	}
6951	if (backlog == 0) {
6952		/* turning off listen */
6953		so->so_options &= ~SO_ACCEPTCONN;
6954	}
6955	SOCK_UNLOCK(so);
6956	return (error);
6957}
6958
6959static int sctp_defered_wakeup_cnt = 0;
6960
6961int
6962sctp_accept(struct socket *so, struct sockaddr **addr)
6963{
6964	struct sctp_tcb *stcb;
6965	struct sctp_inpcb *inp;
6966	union sctp_sockstore store;
6967
6968#ifdef INET6
6969	int error;
6970
6971#endif
6972	inp = (struct sctp_inpcb *)so->so_pcb;
6973
6974	if (inp == NULL) {
6975		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6976		return (ECONNRESET);
6977	}
6978	SCTP_INP_RLOCK(inp);
6979	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
6980		SCTP_INP_RUNLOCK(inp);
6981		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
6982		return (EOPNOTSUPP);
6983	}
6984	if (so->so_state & SS_ISDISCONNECTED) {
6985		SCTP_INP_RUNLOCK(inp);
6986		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ECONNABORTED);
6987		return (ECONNABORTED);
6988	}
6989	stcb = LIST_FIRST(&inp->sctp_asoc_list);
6990	if (stcb == NULL) {
6991		SCTP_INP_RUNLOCK(inp);
6992		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6993		return (ECONNRESET);
6994	}
6995	SCTP_TCB_LOCK(stcb);
6996	SCTP_INP_RUNLOCK(inp);
6997	store = stcb->asoc.primary_destination->ro._l_addr;
6998	stcb->asoc.state &= ~SCTP_STATE_IN_ACCEPT_QUEUE;
6999	SCTP_TCB_UNLOCK(stcb);
7000	switch (store.sa.sa_family) {
7001#ifdef INET
7002	case AF_INET:
7003		{
7004			struct sockaddr_in *sin;
7005
7006			SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7007			if (sin == NULL)
7008				return (ENOMEM);
7009			sin->sin_family = AF_INET;
7010			sin->sin_len = sizeof(*sin);
7011			sin->sin_port = store.sin.sin_port;
7012			sin->sin_addr = store.sin.sin_addr;
7013			*addr = (struct sockaddr *)sin;
7014			break;
7015		}
7016#endif
7017#ifdef INET6
7018	case AF_INET6:
7019		{
7020			struct sockaddr_in6 *sin6;
7021
7022			SCTP_MALLOC_SONAME(sin6, struct sockaddr_in6 *, sizeof *sin6);
7023			if (sin6 == NULL)
7024				return (ENOMEM);
7025			sin6->sin6_family = AF_INET6;
7026			sin6->sin6_len = sizeof(*sin6);
7027			sin6->sin6_port = store.sin6.sin6_port;
7028			sin6->sin6_addr = store.sin6.sin6_addr;
7029			if ((error = sa6_recoverscope(sin6)) != 0) {
7030				SCTP_FREE_SONAME(sin6);
7031				return (error);
7032			}
7033			*addr = (struct sockaddr *)sin6;
7034			break;
7035		}
7036#endif
7037	default:
7038		/* TSNH */
7039		break;
7040	}
7041	/* Wake any delayed sleep action */
7042	if (inp->sctp_flags & SCTP_PCB_FLAGS_DONT_WAKE) {
7043		SCTP_INP_WLOCK(inp);
7044		inp->sctp_flags &= ~SCTP_PCB_FLAGS_DONT_WAKE;
7045		if (inp->sctp_flags & SCTP_PCB_FLAGS_WAKEOUTPUT) {
7046			inp->sctp_flags &= ~SCTP_PCB_FLAGS_WAKEOUTPUT;
7047			SCTP_INP_WUNLOCK(inp);
7048			SOCKBUF_LOCK(&inp->sctp_socket->so_snd);
7049			if (sowriteable(inp->sctp_socket)) {
7050				sowwakeup_locked(inp->sctp_socket);
7051			} else {
7052				SOCKBUF_UNLOCK(&inp->sctp_socket->so_snd);
7053			}
7054			SCTP_INP_WLOCK(inp);
7055		}
7056		if (inp->sctp_flags & SCTP_PCB_FLAGS_WAKEINPUT) {
7057			inp->sctp_flags &= ~SCTP_PCB_FLAGS_WAKEINPUT;
7058			SCTP_INP_WUNLOCK(inp);
7059			SOCKBUF_LOCK(&inp->sctp_socket->so_rcv);
7060			if (soreadable(inp->sctp_socket)) {
7061				sctp_defered_wakeup_cnt++;
7062				sorwakeup_locked(inp->sctp_socket);
7063			} else {
7064				SOCKBUF_UNLOCK(&inp->sctp_socket->so_rcv);
7065			}
7066			SCTP_INP_WLOCK(inp);
7067		}
7068		SCTP_INP_WUNLOCK(inp);
7069	}
7070	if (stcb->asoc.state & SCTP_STATE_ABOUT_TO_BE_FREED) {
7071		SCTP_TCB_LOCK(stcb);
7072		sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_7);
7073	}
7074	return (0);
7075}
7076
7077#ifdef INET
7078int
7079sctp_ingetaddr(struct socket *so, struct sockaddr **addr)
7080{
7081	struct sockaddr_in *sin;
7082	uint32_t vrf_id;
7083	struct sctp_inpcb *inp;
7084	struct sctp_ifa *sctp_ifa;
7085
7086	/*
7087	 * Do the malloc first in case it blocks.
7088	 */
7089	SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7090	if (sin == NULL)
7091		return (ENOMEM);
7092	sin->sin_family = AF_INET;
7093	sin->sin_len = sizeof(*sin);
7094	inp = (struct sctp_inpcb *)so->so_pcb;
7095	if (!inp) {
7096		SCTP_FREE_SONAME(sin);
7097		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
7098		return (ECONNRESET);
7099	}
7100	SCTP_INP_RLOCK(inp);
7101	sin->sin_port = inp->sctp_lport;
7102	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
7103		if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
7104			struct sctp_tcb *stcb;
7105			struct sockaddr_in *sin_a;
7106			struct sctp_nets *net;
7107			int fnd;
7108
7109			stcb = LIST_FIRST(&inp->sctp_asoc_list);
7110			if (stcb == NULL) {
7111				goto notConn;
7112			}
7113			fnd = 0;
7114			sin_a = NULL;
7115			SCTP_TCB_LOCK(stcb);
7116			TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
7117				sin_a = (struct sockaddr_in *)&net->ro._l_addr;
7118				if (sin_a == NULL)
7119					/* this will make coverity happy */
7120					continue;
7121
7122				if (sin_a->sin_family == AF_INET) {
7123					fnd = 1;
7124					break;
7125				}
7126			}
7127			if ((!fnd) || (sin_a == NULL)) {
7128				/* punt */
7129				SCTP_TCB_UNLOCK(stcb);
7130				goto notConn;
7131			}
7132			vrf_id = inp->def_vrf_id;
7133			sctp_ifa = sctp_source_address_selection(inp,
7134			    stcb,
7135			    (sctp_route_t *) & net->ro,
7136			    net, 0, vrf_id);
7137			if (sctp_ifa) {
7138				sin->sin_addr = sctp_ifa->address.sin.sin_addr;
7139				sctp_free_ifa(sctp_ifa);
7140			}
7141			SCTP_TCB_UNLOCK(stcb);
7142		} else {
7143			/* For the bound all case you get back 0 */
7144	notConn:
7145			sin->sin_addr.s_addr = 0;
7146		}
7147
7148	} else {
7149		/* Take the first IPv4 address in the list */
7150		struct sctp_laddr *laddr;
7151		int fnd = 0;
7152
7153		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
7154			if (laddr->ifa->address.sa.sa_family == AF_INET) {
7155				struct sockaddr_in *sin_a;
7156
7157				sin_a = &laddr->ifa->address.sin;
7158				sin->sin_addr = sin_a->sin_addr;
7159				fnd = 1;
7160				break;
7161			}
7162		}
7163		if (!fnd) {
7164			SCTP_FREE_SONAME(sin);
7165			SCTP_INP_RUNLOCK(inp);
7166			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
7167			return (ENOENT);
7168		}
7169	}
7170	SCTP_INP_RUNLOCK(inp);
7171	(*addr) = (struct sockaddr *)sin;
7172	return (0);
7173}
7174
7175int
7176sctp_peeraddr(struct socket *so, struct sockaddr **addr)
7177{
7178	struct sockaddr_in *sin;
7179	int fnd;
7180	struct sockaddr_in *sin_a;
7181	struct sctp_inpcb *inp;
7182	struct sctp_tcb *stcb;
7183	struct sctp_nets *net;
7184
7185	/* Do the malloc first in case it blocks. */
7186	SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7187	if (sin == NULL)
7188		return (ENOMEM);
7189	sin->sin_family = AF_INET;
7190	sin->sin_len = sizeof(*sin);
7191
7192	inp = (struct sctp_inpcb *)so->so_pcb;
7193	if ((inp == NULL) ||
7194	    ((inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) == 0)) {
7195		/* UDP type and listeners will drop out here */
7196		SCTP_FREE_SONAME(sin);
7197		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
7198		return (ENOTCONN);
7199	}
7200	SCTP_INP_RLOCK(inp);
7201	stcb = LIST_FIRST(&inp->sctp_asoc_list);
7202	if (stcb) {
7203		SCTP_TCB_LOCK(stcb);
7204	}
7205	SCTP_INP_RUNLOCK(inp);
7206	if (stcb == NULL) {
7207		SCTP_FREE_SONAME(sin);
7208		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
7209		return (ECONNRESET);
7210	}
7211	fnd = 0;
7212	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
7213		sin_a = (struct sockaddr_in *)&net->ro._l_addr;
7214		if (sin_a->sin_family == AF_INET) {
7215			fnd = 1;
7216			sin->sin_port = stcb->rport;
7217			sin->sin_addr = sin_a->sin_addr;
7218			break;
7219		}
7220	}
7221	SCTP_TCB_UNLOCK(stcb);
7222	if (!fnd) {
7223		/* No IPv4 address */
7224		SCTP_FREE_SONAME(sin);
7225		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
7226		return (ENOENT);
7227	}
7228	(*addr) = (struct sockaddr *)sin;
7229	return (0);
7230}
7231
7232struct pr_usrreqs sctp_usrreqs = {
7233	.pru_abort = sctp_abort,
7234	.pru_accept = sctp_accept,
7235	.pru_attach = sctp_attach,
7236	.pru_bind = sctp_bind,
7237	.pru_connect = sctp_connect,
7238	.pru_control = in_control,
7239	.pru_close = sctp_close,
7240	.pru_detach = sctp_close,
7241	.pru_sopoll = sopoll_generic,
7242	.pru_flush = sctp_flush,
7243	.pru_disconnect = sctp_disconnect,
7244	.pru_listen = sctp_listen,
7245	.pru_peeraddr = sctp_peeraddr,
7246	.pru_send = sctp_sendm,
7247	.pru_shutdown = sctp_shutdown,
7248	.pru_sockaddr = sctp_ingetaddr,
7249	.pru_sosend = sctp_sosend,
7250	.pru_soreceive = sctp_soreceive
7251};
7252
7253#endif
7254