sctp_usrreq.c revision 283716
1/*-
2 * Copyright (c) 2001-2008, by Cisco Systems, Inc. All rights reserved.
3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are met:
8 *
9 * a) Redistributions of source code must retain the above copyright notice,
10 *    this list of conditions and the following disclaimer.
11 *
12 * b) Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in
14 *    the documentation and/or other materials provided with the distribution.
15 *
16 * c) Neither the name of Cisco Systems, Inc. nor the names of its
17 *    contributors may be used to endorse or promote products derived
18 *    from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30 * THE POSSIBILITY OF SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
34__FBSDID("$FreeBSD: stable/10/sys/netinet/sctp_usrreq.c 283716 2015-05-29 12:25:11Z tuexen $");
35
36#include <netinet/sctp_os.h>
37#include <sys/proc.h>
38#include <netinet/sctp_pcb.h>
39#include <netinet/sctp_header.h>
40#include <netinet/sctp_var.h>
41#ifdef INET6
42#include <netinet6/sctp6_var.h>
43#endif
44#include <netinet/sctp_sysctl.h>
45#include <netinet/sctp_output.h>
46#include <netinet/sctp_uio.h>
47#include <netinet/sctp_asconf.h>
48#include <netinet/sctputil.h>
49#include <netinet/sctp_indata.h>
50#include <netinet/sctp_timer.h>
51#include <netinet/sctp_auth.h>
52#include <netinet/sctp_bsd_addr.h>
53#include <netinet/udp.h>
54
55
56
57extern struct sctp_cc_functions sctp_cc_functions[];
58extern struct sctp_ss_functions sctp_ss_functions[];
59
60void
61sctp_init(void)
62{
63	u_long sb_max_adj;
64
65	/* Initialize and modify the sysctled variables */
66	sctp_init_sysctls();
67	if ((nmbclusters / 8) > SCTP_ASOC_MAX_CHUNKS_ON_QUEUE)
68		SCTP_BASE_SYSCTL(sctp_max_chunks_on_queue) = (nmbclusters / 8);
69	/*
70	 * Allow a user to take no more than 1/2 the number of clusters or
71	 * the SB_MAX whichever is smaller for the send window.
72	 */
73	sb_max_adj = (u_long)((u_quad_t) (SB_MAX) * MCLBYTES / (MSIZE + MCLBYTES));
74	SCTP_BASE_SYSCTL(sctp_sendspace) = min(sb_max_adj,
75	    (((uint32_t) nmbclusters / 2) * SCTP_DEFAULT_MAXSEGMENT));
76	/*
77	 * Now for the recv window, should we take the same amount? or
78	 * should I do 1/2 the SB_MAX instead in the SB_MAX min above. For
79	 * now I will just copy.
80	 */
81	SCTP_BASE_SYSCTL(sctp_recvspace) = SCTP_BASE_SYSCTL(sctp_sendspace);
82	SCTP_BASE_VAR(first_time) = 0;
83	SCTP_BASE_VAR(sctp_pcb_initialized) = 0;
84	sctp_pcb_init();
85#if defined(SCTP_PACKET_LOGGING)
86	SCTP_BASE_VAR(packet_log_writers) = 0;
87	SCTP_BASE_VAR(packet_log_end) = 0;
88	bzero(&SCTP_BASE_VAR(packet_log_buffer), SCTP_PACKET_LOG_SIZE);
89#endif
90}
91
92void
93sctp_finish(void)
94{
95	sctp_pcb_finish();
96}
97
98
99
100void
101sctp_pathmtu_adjustment(struct sctp_tcb *stcb, uint16_t nxtsz)
102{
103	struct sctp_tmit_chunk *chk;
104	uint16_t overhead;
105
106	/* Adjust that too */
107	stcb->asoc.smallest_mtu = nxtsz;
108	/* now off to subtract IP_DF flag if needed */
109	overhead = IP_HDR_SIZE;
110	if (sctp_auth_is_required_chunk(SCTP_DATA, stcb->asoc.peer_auth_chunks)) {
111		overhead += sctp_get_auth_chunk_len(stcb->asoc.peer_hmac_id);
112	}
113	TAILQ_FOREACH(chk, &stcb->asoc.send_queue, sctp_next) {
114		if ((chk->send_size + overhead) > nxtsz) {
115			chk->flags |= CHUNK_FLAGS_FRAGMENT_OK;
116		}
117	}
118	TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
119		if ((chk->send_size + overhead) > nxtsz) {
120			/*
121			 * For this guy we also mark for immediate resend
122			 * since we sent to big of chunk
123			 */
124			chk->flags |= CHUNK_FLAGS_FRAGMENT_OK;
125			if (chk->sent < SCTP_DATAGRAM_RESEND) {
126				sctp_flight_size_decrease(chk);
127				sctp_total_flight_decrease(stcb, chk);
128			}
129			if (chk->sent != SCTP_DATAGRAM_RESEND) {
130				sctp_ucount_incr(stcb->asoc.sent_queue_retran_cnt);
131			}
132			chk->sent = SCTP_DATAGRAM_RESEND;
133			chk->rec.data.doing_fast_retransmit = 0;
134			if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_FLIGHT_LOGGING_ENABLE) {
135				sctp_misc_ints(SCTP_FLIGHT_LOG_DOWN_PMTU,
136				    chk->whoTo->flight_size,
137				    chk->book_size,
138				    (uintptr_t) chk->whoTo,
139				    chk->rec.data.TSN_seq);
140			}
141			/* Clear any time so NO RTT is being done */
142			chk->do_rtt = 0;
143		}
144	}
145}
146
147#ifdef INET
148static void
149sctp_notify_mbuf(struct sctp_inpcb *inp,
150    struct sctp_tcb *stcb,
151    struct sctp_nets *net,
152    struct ip *ip,
153    struct sctphdr *sh)
154{
155	struct icmp *icmph;
156	int totsz, tmr_stopped = 0;
157	uint16_t nxtsz;
158
159	/* protection */
160	if ((inp == NULL) || (stcb == NULL) || (net == NULL) ||
161	    (ip == NULL) || (sh == NULL)) {
162		if (stcb != NULL) {
163			SCTP_TCB_UNLOCK(stcb);
164		}
165		return;
166	}
167	/* First job is to verify the vtag matches what I would send */
168	if (ntohl(sh->v_tag) != (stcb->asoc.peer_vtag)) {
169		SCTP_TCB_UNLOCK(stcb);
170		return;
171	}
172	icmph = (struct icmp *)((caddr_t)ip - (sizeof(struct icmp) -
173	    sizeof(struct ip)));
174	if (icmph->icmp_type != ICMP_UNREACH) {
175		/* We only care about unreachable */
176		SCTP_TCB_UNLOCK(stcb);
177		return;
178	}
179	if (icmph->icmp_code != ICMP_UNREACH_NEEDFRAG) {
180		/* not a unreachable message due to frag. */
181		SCTP_TCB_UNLOCK(stcb);
182		return;
183	}
184	totsz = ntohs(ip->ip_len);
185
186	nxtsz = ntohs(icmph->icmp_nextmtu);
187	if (nxtsz == 0) {
188		/*
189		 * old type router that does not tell us what the next size
190		 * mtu is. Rats we will have to guess (in a educated fashion
191		 * of course)
192		 */
193		nxtsz = sctp_get_prev_mtu(totsz);
194	}
195	/* Stop any PMTU timer */
196	if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
197		tmr_stopped = 1;
198		sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
199		    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_1);
200	}
201	/* Adjust destination size limit */
202	if (net->mtu > nxtsz) {
203		net->mtu = nxtsz;
204		if (net->port) {
205			net->mtu -= sizeof(struct udphdr);
206		}
207	}
208	/* now what about the ep? */
209	if (stcb->asoc.smallest_mtu > nxtsz) {
210		sctp_pathmtu_adjustment(stcb, nxtsz);
211	}
212	if (tmr_stopped)
213		sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
214
215	SCTP_TCB_UNLOCK(stcb);
216}
217
218void
219sctp_notify(struct sctp_inpcb *inp,
220    struct ip *ip,
221    struct sctphdr *sh,
222    struct sockaddr *to,
223    struct sctp_tcb *stcb,
224    struct sctp_nets *net)
225{
226#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
227	struct socket *so;
228
229#endif
230	struct icmp *icmph;
231
232	/* protection */
233	if ((inp == NULL) || (stcb == NULL) || (net == NULL) ||
234	    (sh == NULL) || (to == NULL)) {
235		if (stcb)
236			SCTP_TCB_UNLOCK(stcb);
237		return;
238	}
239	/* First job is to verify the vtag matches what I would send */
240	if (ntohl(sh->v_tag) != (stcb->asoc.peer_vtag)) {
241		SCTP_TCB_UNLOCK(stcb);
242		return;
243	}
244	icmph = (struct icmp *)((caddr_t)ip - (sizeof(struct icmp) -
245	    sizeof(struct ip)));
246	if (icmph->icmp_type != ICMP_UNREACH) {
247		/* We only care about unreachable */
248		SCTP_TCB_UNLOCK(stcb);
249		return;
250	}
251	if ((icmph->icmp_code == ICMP_UNREACH_NET) ||
252	    (icmph->icmp_code == ICMP_UNREACH_HOST) ||
253	    (icmph->icmp_code == ICMP_UNREACH_NET_UNKNOWN) ||
254	    (icmph->icmp_code == ICMP_UNREACH_HOST_UNKNOWN) ||
255	    (icmph->icmp_code == ICMP_UNREACH_ISOLATED) ||
256	    (icmph->icmp_code == ICMP_UNREACH_NET_PROHIB) ||
257	    (icmph->icmp_code == ICMP_UNREACH_HOST_PROHIB) ||
258	    (icmph->icmp_code == ICMP_UNREACH_FILTER_PROHIB)) {
259
260		/*
261		 * Hmm reachablity problems we must examine closely. If its
262		 * not reachable, we may have lost a network. Or if there is
263		 * NO protocol at the other end named SCTP. well we consider
264		 * it a OOTB abort.
265		 */
266		if (net->dest_state & SCTP_ADDR_REACHABLE) {
267			/* Ok that destination is NOT reachable */
268			net->dest_state &= ~SCTP_ADDR_REACHABLE;
269			net->dest_state &= ~SCTP_ADDR_PF;
270			sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN,
271			    stcb, 0,
272			    (void *)net, SCTP_SO_NOT_LOCKED);
273		}
274		SCTP_TCB_UNLOCK(stcb);
275	} else if ((icmph->icmp_code == ICMP_UNREACH_PROTOCOL) ||
276	    (icmph->icmp_code == ICMP_UNREACH_PORT)) {
277		/*
278		 * Here the peer is either playing tricks on us, including
279		 * an address that belongs to someone who does not support
280		 * SCTP OR was a userland implementation that shutdown and
281		 * now is dead. In either case treat it like a OOTB abort
282		 * with no TCB
283		 */
284		sctp_abort_notification(stcb, 1, 0, NULL, SCTP_SO_NOT_LOCKED);
285#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
286		so = SCTP_INP_SO(inp);
287		atomic_add_int(&stcb->asoc.refcnt, 1);
288		SCTP_TCB_UNLOCK(stcb);
289		SCTP_SOCKET_LOCK(so, 1);
290		SCTP_TCB_LOCK(stcb);
291		atomic_subtract_int(&stcb->asoc.refcnt, 1);
292#endif
293		(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_2);
294#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
295		SCTP_SOCKET_UNLOCK(so, 1);
296		/* SCTP_TCB_UNLOCK(stcb); MT: I think this is not needed. */
297#endif
298		/* no need to unlock here, since the TCB is gone */
299	} else {
300		SCTP_TCB_UNLOCK(stcb);
301	}
302}
303
304#endif
305
306#ifdef INET
307void
308sctp_ctlinput(cmd, sa, vip)
309	int cmd;
310	struct sockaddr *sa;
311	void *vip;
312{
313	struct ip *ip = vip;
314	struct sctphdr *sh;
315	uint32_t vrf_id;
316
317	/* FIX, for non-bsd is this right? */
318	vrf_id = SCTP_DEFAULT_VRFID;
319	if (sa->sa_family != AF_INET ||
320	    ((struct sockaddr_in *)sa)->sin_addr.s_addr == INADDR_ANY) {
321		return;
322	}
323	if (PRC_IS_REDIRECT(cmd)) {
324		ip = 0;
325	} else if ((unsigned)cmd >= PRC_NCMDS || inetctlerrmap[cmd] == 0) {
326		return;
327	}
328	if (ip) {
329		struct sctp_inpcb *inp = NULL;
330		struct sctp_tcb *stcb = NULL;
331		struct sctp_nets *net = NULL;
332		struct sockaddr_in to, from;
333
334		sh = (struct sctphdr *)((caddr_t)ip + (ip->ip_hl << 2));
335		bzero(&to, sizeof(to));
336		bzero(&from, sizeof(from));
337		from.sin_family = to.sin_family = AF_INET;
338		from.sin_len = to.sin_len = sizeof(to);
339		from.sin_port = sh->src_port;
340		from.sin_addr = ip->ip_src;
341		to.sin_port = sh->dest_port;
342		to.sin_addr = ip->ip_dst;
343
344		/*
345		 * 'to' holds the dest of the packet that failed to be sent.
346		 * 'from' holds our local endpoint address. Thus we reverse
347		 * the to and the from in the lookup.
348		 */
349		stcb = sctp_findassociation_addr_sa((struct sockaddr *)&to,
350		    (struct sockaddr *)&from,
351		    &inp, &net, 1, vrf_id);
352		if (stcb != NULL && inp && (inp->sctp_socket != NULL)) {
353			if (cmd != PRC_MSGSIZE) {
354				sctp_notify(inp, ip, sh,
355				    (struct sockaddr *)&to, stcb,
356				    net);
357			} else {
358				/* handle possible ICMP size messages */
359				sctp_notify_mbuf(inp, stcb, net, ip, sh);
360			}
361		} else {
362			if ((stcb == NULL) && (inp != NULL)) {
363				/* reduce ref-count */
364				SCTP_INP_WLOCK(inp);
365				SCTP_INP_DECR_REF(inp);
366				SCTP_INP_WUNLOCK(inp);
367			}
368			if (stcb) {
369				SCTP_TCB_UNLOCK(stcb);
370			}
371		}
372	}
373	return;
374}
375
376#endif
377
378static int
379sctp_getcred(SYSCTL_HANDLER_ARGS)
380{
381	struct xucred xuc;
382	struct sockaddr_in addrs[2];
383	struct sctp_inpcb *inp;
384	struct sctp_nets *net;
385	struct sctp_tcb *stcb;
386	int error;
387	uint32_t vrf_id;
388
389	/* FIX, for non-bsd is this right? */
390	vrf_id = SCTP_DEFAULT_VRFID;
391
392	error = priv_check(req->td, PRIV_NETINET_GETCRED);
393
394	if (error)
395		return (error);
396
397	error = SYSCTL_IN(req, addrs, sizeof(addrs));
398	if (error)
399		return (error);
400
401	stcb = sctp_findassociation_addr_sa(sintosa(&addrs[1]),
402	    sintosa(&addrs[0]),
403	    &inp, &net, 1, vrf_id);
404	if (stcb == NULL || inp == NULL || inp->sctp_socket == NULL) {
405		if ((inp != NULL) && (stcb == NULL)) {
406			/* reduce ref-count */
407			SCTP_INP_WLOCK(inp);
408			SCTP_INP_DECR_REF(inp);
409			goto cred_can_cont;
410		}
411		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
412		error = ENOENT;
413		goto out;
414	}
415	SCTP_TCB_UNLOCK(stcb);
416	/*
417	 * We use the write lock here, only since in the error leg we need
418	 * it. If we used RLOCK, then we would have to
419	 * wlock/decr/unlock/rlock. Which in theory could create a hole.
420	 * Better to use higher wlock.
421	 */
422	SCTP_INP_WLOCK(inp);
423cred_can_cont:
424	error = cr_canseesocket(req->td->td_ucred, inp->sctp_socket);
425	if (error) {
426		SCTP_INP_WUNLOCK(inp);
427		goto out;
428	}
429	cru2x(inp->sctp_socket->so_cred, &xuc);
430	SCTP_INP_WUNLOCK(inp);
431	error = SYSCTL_OUT(req, &xuc, sizeof(struct xucred));
432out:
433	return (error);
434}
435
436SYSCTL_PROC(_net_inet_sctp, OID_AUTO, getcred, CTLTYPE_OPAQUE | CTLFLAG_RW,
437    0, 0, sctp_getcred, "S,ucred", "Get the ucred of a SCTP connection");
438
439
440#ifdef INET
441static void
442sctp_abort(struct socket *so)
443{
444	struct sctp_inpcb *inp;
445	uint32_t flags;
446
447	inp = (struct sctp_inpcb *)so->so_pcb;
448	if (inp == NULL) {
449		return;
450	}
451sctp_must_try_again:
452	flags = inp->sctp_flags;
453#ifdef SCTP_LOG_CLOSING
454	sctp_log_closing(inp, NULL, 17);
455#endif
456	if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
457	    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
458#ifdef SCTP_LOG_CLOSING
459		sctp_log_closing(inp, NULL, 16);
460#endif
461		sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
462		    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
463		SOCK_LOCK(so);
464		SCTP_SB_CLEAR(so->so_snd);
465		/*
466		 * same for the rcv ones, they are only here for the
467		 * accounting/select.
468		 */
469		SCTP_SB_CLEAR(so->so_rcv);
470
471		/* Now null out the reference, we are completely detached. */
472		so->so_pcb = NULL;
473		SOCK_UNLOCK(so);
474	} else {
475		flags = inp->sctp_flags;
476		if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
477			goto sctp_must_try_again;
478		}
479	}
480	return;
481}
482
483static int
484sctp_attach(struct socket *so, int proto SCTP_UNUSED, struct thread *p SCTP_UNUSED)
485{
486	struct sctp_inpcb *inp;
487	struct inpcb *ip_inp;
488	int error;
489	uint32_t vrf_id = SCTP_DEFAULT_VRFID;
490
491#ifdef IPSEC
492	uint32_t flags;
493
494#endif
495
496	inp = (struct sctp_inpcb *)so->so_pcb;
497	if (inp != 0) {
498		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
499		return (EINVAL);
500	}
501	if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
502		error = SCTP_SORESERVE(so, SCTP_BASE_SYSCTL(sctp_sendspace), SCTP_BASE_SYSCTL(sctp_recvspace));
503		if (error) {
504			return (error);
505		}
506	}
507	error = sctp_inpcb_alloc(so, vrf_id);
508	if (error) {
509		return (error);
510	}
511	inp = (struct sctp_inpcb *)so->so_pcb;
512	SCTP_INP_WLOCK(inp);
513	inp->sctp_flags &= ~SCTP_PCB_FLAGS_BOUND_V6;	/* I'm not v6! */
514	ip_inp = &inp->ip_inp.inp;
515	ip_inp->inp_vflag |= INP_IPV4;
516	ip_inp->inp_ip_ttl = MODULE_GLOBAL(ip_defttl);
517#ifdef IPSEC
518	error = ipsec_init_policy(so, &ip_inp->inp_sp);
519#ifdef SCTP_LOG_CLOSING
520	sctp_log_closing(inp, NULL, 17);
521#endif
522	if (error != 0) {
523try_again:
524		flags = inp->sctp_flags;
525		if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
526		    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
527#ifdef SCTP_LOG_CLOSING
528			sctp_log_closing(inp, NULL, 15);
529#endif
530			SCTP_INP_WUNLOCK(inp);
531			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
532			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
533		} else {
534			flags = inp->sctp_flags;
535			if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
536				goto try_again;
537			} else {
538				SCTP_INP_WUNLOCK(inp);
539			}
540		}
541		return (error);
542	}
543#endif				/* IPSEC */
544	SCTP_INP_WUNLOCK(inp);
545	return (0);
546}
547
548static int
549sctp_bind(struct socket *so, struct sockaddr *addr, struct thread *p)
550{
551	struct sctp_inpcb *inp;
552
553	inp = (struct sctp_inpcb *)so->so_pcb;
554	if (inp == NULL) {
555		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
556		return (EINVAL);
557	}
558	if (addr != NULL) {
559		if ((addr->sa_family != AF_INET) ||
560		    (addr->sa_len != sizeof(struct sockaddr_in))) {
561			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
562			return (EINVAL);
563		}
564	}
565	return (sctp_inpcb_bind(so, addr, NULL, p));
566}
567
568#endif
569void
570sctp_close(struct socket *so)
571{
572	struct sctp_inpcb *inp;
573	uint32_t flags;
574
575	inp = (struct sctp_inpcb *)so->so_pcb;
576	if (inp == NULL)
577		return;
578
579	/*
580	 * Inform all the lower layer assoc that we are done.
581	 */
582sctp_must_try_again:
583	flags = inp->sctp_flags;
584#ifdef SCTP_LOG_CLOSING
585	sctp_log_closing(inp, NULL, 17);
586#endif
587	if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
588	    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
589		if (((so->so_options & SO_LINGER) && (so->so_linger == 0)) ||
590		    (so->so_rcv.sb_cc > 0)) {
591#ifdef SCTP_LOG_CLOSING
592			sctp_log_closing(inp, NULL, 13);
593#endif
594			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
595			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
596		} else {
597#ifdef SCTP_LOG_CLOSING
598			sctp_log_closing(inp, NULL, 14);
599#endif
600			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_GRACEFUL_CLOSE,
601			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
602		}
603		/*
604		 * The socket is now detached, no matter what the state of
605		 * the SCTP association.
606		 */
607		SOCK_LOCK(so);
608		SCTP_SB_CLEAR(so->so_snd);
609		/*
610		 * same for the rcv ones, they are only here for the
611		 * accounting/select.
612		 */
613		SCTP_SB_CLEAR(so->so_rcv);
614
615		/* Now null out the reference, we are completely detached. */
616		so->so_pcb = NULL;
617		SOCK_UNLOCK(so);
618	} else {
619		flags = inp->sctp_flags;
620		if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
621			goto sctp_must_try_again;
622		}
623	}
624	return;
625}
626
627
628int
629sctp_sendm(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
630    struct mbuf *control, struct thread *p);
631
632
633int
634sctp_sendm(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
635    struct mbuf *control, struct thread *p)
636{
637	struct sctp_inpcb *inp;
638	int error;
639
640	inp = (struct sctp_inpcb *)so->so_pcb;
641	if (inp == NULL) {
642		if (control) {
643			sctp_m_freem(control);
644			control = NULL;
645		}
646		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
647		sctp_m_freem(m);
648		return (EINVAL);
649	}
650	/* Got to have an to address if we are NOT a connected socket */
651	if ((addr == NULL) &&
652	    ((inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) ||
653	    (inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE))) {
654		goto connected_type;
655	} else if (addr == NULL) {
656		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EDESTADDRREQ);
657		error = EDESTADDRREQ;
658		sctp_m_freem(m);
659		if (control) {
660			sctp_m_freem(control);
661			control = NULL;
662		}
663		return (error);
664	}
665#ifdef INET6
666	if (addr->sa_family != AF_INET) {
667		/* must be a v4 address! */
668		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EDESTADDRREQ);
669		sctp_m_freem(m);
670		if (control) {
671			sctp_m_freem(control);
672			control = NULL;
673		}
674		error = EDESTADDRREQ;
675		return (error);
676	}
677#endif				/* INET6 */
678connected_type:
679	/* now what about control */
680	if (control) {
681		if (inp->control) {
682			SCTP_PRINTF("huh? control set?\n");
683			sctp_m_freem(inp->control);
684			inp->control = NULL;
685		}
686		inp->control = control;
687	}
688	/* Place the data */
689	if (inp->pkt) {
690		SCTP_BUF_NEXT(inp->pkt_last) = m;
691		inp->pkt_last = m;
692	} else {
693		inp->pkt_last = inp->pkt = m;
694	}
695	if (
696	/* FreeBSD uses a flag passed */
697	    ((flags & PRUS_MORETOCOME) == 0)
698	    ) {
699		/*
700		 * note with the current version this code will only be used
701		 * by OpenBSD-- NetBSD, FreeBSD, and MacOS have methods for
702		 * re-defining sosend to use the sctp_sosend. One can
703		 * optionally switch back to this code (by changing back the
704		 * definitions) but this is not advisable. This code is used
705		 * by FreeBSD when sending a file with sendfile() though.
706		 */
707		int ret;
708
709		ret = sctp_output(inp, inp->pkt, addr, inp->control, p, flags);
710		inp->pkt = NULL;
711		inp->control = NULL;
712		return (ret);
713	} else {
714		return (0);
715	}
716}
717
718int
719sctp_disconnect(struct socket *so)
720{
721	struct sctp_inpcb *inp;
722
723	inp = (struct sctp_inpcb *)so->so_pcb;
724	if (inp == NULL) {
725		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
726		return (ENOTCONN);
727	}
728	SCTP_INP_RLOCK(inp);
729	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
730	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
731		if (LIST_EMPTY(&inp->sctp_asoc_list)) {
732			/* No connection */
733			SCTP_INP_RUNLOCK(inp);
734			return (0);
735		} else {
736			struct sctp_association *asoc;
737			struct sctp_tcb *stcb;
738
739			stcb = LIST_FIRST(&inp->sctp_asoc_list);
740			if (stcb == NULL) {
741				SCTP_INP_RUNLOCK(inp);
742				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
743				return (EINVAL);
744			}
745			SCTP_TCB_LOCK(stcb);
746			asoc = &stcb->asoc;
747			if (stcb->asoc.state & SCTP_STATE_ABOUT_TO_BE_FREED) {
748				/* We are about to be freed, out of here */
749				SCTP_TCB_UNLOCK(stcb);
750				SCTP_INP_RUNLOCK(inp);
751				return (0);
752			}
753			if (((so->so_options & SO_LINGER) &&
754			    (so->so_linger == 0)) ||
755			    (so->so_rcv.sb_cc > 0)) {
756				if (SCTP_GET_STATE(asoc) !=
757				    SCTP_STATE_COOKIE_WAIT) {
758					/* Left with Data unread */
759					struct mbuf *err;
760
761					err = sctp_get_mbuf_for_msg(sizeof(struct sctp_paramhdr), 0, M_NOWAIT, 1, MT_DATA);
762					if (err) {
763						/*
764						 * Fill in the user
765						 * initiated abort
766						 */
767						struct sctp_paramhdr *ph;
768
769						ph = mtod(err, struct sctp_paramhdr *);
770						SCTP_BUF_LEN(err) = sizeof(struct sctp_paramhdr);
771						ph->param_type = htons(SCTP_CAUSE_USER_INITIATED_ABT);
772						ph->param_length = htons(SCTP_BUF_LEN(err));
773					}
774					sctp_send_abort_tcb(stcb, err, SCTP_SO_LOCKED);
775					SCTP_STAT_INCR_COUNTER32(sctps_aborted);
776				}
777				SCTP_INP_RUNLOCK(inp);
778				if ((SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_OPEN) ||
779				    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
780					SCTP_STAT_DECR_GAUGE32(sctps_currestab);
781				}
782				(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_3);
783				/* No unlock tcb assoc is gone */
784				return (0);
785			}
786			if (TAILQ_EMPTY(&asoc->send_queue) &&
787			    TAILQ_EMPTY(&asoc->sent_queue) &&
788			    (asoc->stream_queue_cnt == 0)) {
789				/* there is nothing queued to send, so done */
790				if (asoc->locked_on_sending) {
791					goto abort_anyway;
792				}
793				if ((SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT) &&
794				    (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_ACK_SENT)) {
795					/* only send SHUTDOWN 1st time thru */
796					struct sctp_nets *netp;
797
798					if ((SCTP_GET_STATE(asoc) == SCTP_STATE_OPEN) ||
799					    (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
800						SCTP_STAT_DECR_GAUGE32(sctps_currestab);
801					}
802					SCTP_SET_STATE(asoc, SCTP_STATE_SHUTDOWN_SENT);
803					SCTP_CLEAR_SUBSTATE(asoc, SCTP_STATE_SHUTDOWN_PENDING);
804					sctp_stop_timers_for_shutdown(stcb);
805					if (stcb->asoc.alternate) {
806						netp = stcb->asoc.alternate;
807					} else {
808						netp = stcb->asoc.primary_destination;
809					}
810					sctp_send_shutdown(stcb, netp);
811					sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWN,
812					    stcb->sctp_ep, stcb, netp);
813					sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD,
814					    stcb->sctp_ep, stcb, netp);
815					sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_LOCKED);
816				}
817			} else {
818				/*
819				 * we still got (or just got) data to send,
820				 * so set SHUTDOWN_PENDING
821				 */
822				/*
823				 * XXX sockets draft says that SCTP_EOF
824				 * should be sent with no data. currently,
825				 * we will allow user data to be sent first
826				 * and move to SHUTDOWN-PENDING
827				 */
828				struct sctp_nets *netp;
829
830				if (stcb->asoc.alternate) {
831					netp = stcb->asoc.alternate;
832				} else {
833					netp = stcb->asoc.primary_destination;
834				}
835
836				asoc->state |= SCTP_STATE_SHUTDOWN_PENDING;
837				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD, stcb->sctp_ep, stcb,
838				    netp);
839				if (asoc->locked_on_sending) {
840					/* Locked to send out the data */
841					struct sctp_stream_queue_pending *sp;
842
843					sp = TAILQ_LAST(&asoc->locked_on_sending->outqueue, sctp_streamhead);
844					if (sp == NULL) {
845						SCTP_PRINTF("Error, sp is NULL, locked on sending is non-null strm:%d\n",
846						    asoc->locked_on_sending->stream_no);
847					} else {
848						if ((sp->length == 0) && (sp->msg_is_complete == 0))
849							asoc->state |= SCTP_STATE_PARTIAL_MSG_LEFT;
850					}
851				}
852				if (TAILQ_EMPTY(&asoc->send_queue) &&
853				    TAILQ_EMPTY(&asoc->sent_queue) &&
854				    (asoc->state & SCTP_STATE_PARTIAL_MSG_LEFT)) {
855					struct mbuf *op_err;
856
857			abort_anyway:
858					op_err = sctp_generate_cause(SCTP_CAUSE_USER_INITIATED_ABT, "");
859					stcb->sctp_ep->last_abort_code = SCTP_FROM_SCTP_USRREQ + SCTP_LOC_4;
860					sctp_send_abort_tcb(stcb, op_err, SCTP_SO_LOCKED);
861					SCTP_STAT_INCR_COUNTER32(sctps_aborted);
862					if ((SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_OPEN) ||
863					    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
864						SCTP_STAT_DECR_GAUGE32(sctps_currestab);
865					}
866					SCTP_INP_RUNLOCK(inp);
867					(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_5);
868					return (0);
869				} else {
870					sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_CLOSING, SCTP_SO_LOCKED);
871				}
872			}
873			soisdisconnecting(so);
874			SCTP_TCB_UNLOCK(stcb);
875			SCTP_INP_RUNLOCK(inp);
876			return (0);
877		}
878		/* not reached */
879	} else {
880		/* UDP model does not support this */
881		SCTP_INP_RUNLOCK(inp);
882		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
883		return (EOPNOTSUPP);
884	}
885}
886
887int
888sctp_flush(struct socket *so, int how)
889{
890	/*
891	 * We will just clear out the values and let subsequent close clear
892	 * out the data, if any. Note if the user did a shutdown(SHUT_RD)
893	 * they will not be able to read the data, the socket will block
894	 * that from happening.
895	 */
896	struct sctp_inpcb *inp;
897
898	inp = (struct sctp_inpcb *)so->so_pcb;
899	if (inp == NULL) {
900		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
901		return (EINVAL);
902	}
903	SCTP_INP_RLOCK(inp);
904	/* For the 1 to many model this does nothing */
905	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
906		SCTP_INP_RUNLOCK(inp);
907		return (0);
908	}
909	SCTP_INP_RUNLOCK(inp);
910	if ((how == PRU_FLUSH_RD) || (how == PRU_FLUSH_RDWR)) {
911		/*
912		 * First make sure the sb will be happy, we don't use these
913		 * except maybe the count
914		 */
915		SCTP_INP_WLOCK(inp);
916		SCTP_INP_READ_LOCK(inp);
917		inp->sctp_flags |= SCTP_PCB_FLAGS_SOCKET_CANT_READ;
918		SCTP_INP_READ_UNLOCK(inp);
919		SCTP_INP_WUNLOCK(inp);
920		so->so_rcv.sb_cc = 0;
921		so->so_rcv.sb_mbcnt = 0;
922		so->so_rcv.sb_mb = NULL;
923	}
924	if ((how == PRU_FLUSH_WR) || (how == PRU_FLUSH_RDWR)) {
925		/*
926		 * First make sure the sb will be happy, we don't use these
927		 * except maybe the count
928		 */
929		so->so_snd.sb_cc = 0;
930		so->so_snd.sb_mbcnt = 0;
931		so->so_snd.sb_mb = NULL;
932
933	}
934	return (0);
935}
936
937int
938sctp_shutdown(struct socket *so)
939{
940	struct sctp_inpcb *inp;
941
942	inp = (struct sctp_inpcb *)so->so_pcb;
943	if (inp == NULL) {
944		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
945		return (EINVAL);
946	}
947	SCTP_INP_RLOCK(inp);
948	/* For UDP model this is a invalid call */
949	if (!((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
950	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL))) {
951		/* Restore the flags that the soshutdown took away. */
952		SOCKBUF_LOCK(&so->so_rcv);
953		so->so_rcv.sb_state &= ~SBS_CANTRCVMORE;
954		SOCKBUF_UNLOCK(&so->so_rcv);
955		/* This proc will wakeup for read and do nothing (I hope) */
956		SCTP_INP_RUNLOCK(inp);
957		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
958		return (EOPNOTSUPP);
959	}
960	/*
961	 * Ok if we reach here its the TCP model and it is either a SHUT_WR
962	 * or SHUT_RDWR. This means we put the shutdown flag against it.
963	 */
964	{
965		struct sctp_tcb *stcb;
966		struct sctp_association *asoc;
967
968		if ((so->so_state &
969		    (SS_ISCONNECTED | SS_ISCONNECTING | SS_ISDISCONNECTING)) == 0) {
970			SCTP_INP_RUNLOCK(inp);
971			return (ENOTCONN);
972		}
973		socantsendmore(so);
974
975		stcb = LIST_FIRST(&inp->sctp_asoc_list);
976		if (stcb == NULL) {
977			/*
978			 * Ok we hit the case that the shutdown call was
979			 * made after an abort or something. Nothing to do
980			 * now.
981			 */
982			SCTP_INP_RUNLOCK(inp);
983			return (0);
984		}
985		SCTP_TCB_LOCK(stcb);
986		asoc = &stcb->asoc;
987		if (TAILQ_EMPTY(&asoc->send_queue) &&
988		    TAILQ_EMPTY(&asoc->sent_queue) &&
989		    (asoc->stream_queue_cnt == 0)) {
990			if (asoc->locked_on_sending) {
991				goto abort_anyway;
992			}
993			/* there is nothing queued to send, so I'm done... */
994			if (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT) {
995				/* only send SHUTDOWN the first time through */
996				struct sctp_nets *netp;
997
998				if ((SCTP_GET_STATE(asoc) == SCTP_STATE_OPEN) ||
999				    (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
1000					SCTP_STAT_DECR_GAUGE32(sctps_currestab);
1001				}
1002				SCTP_SET_STATE(asoc, SCTP_STATE_SHUTDOWN_SENT);
1003				SCTP_CLEAR_SUBSTATE(asoc, SCTP_STATE_SHUTDOWN_PENDING);
1004				sctp_stop_timers_for_shutdown(stcb);
1005				if (stcb->asoc.alternate) {
1006					netp = stcb->asoc.alternate;
1007				} else {
1008					netp = stcb->asoc.primary_destination;
1009				}
1010				sctp_send_shutdown(stcb, netp);
1011				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWN,
1012				    stcb->sctp_ep, stcb, netp);
1013				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD,
1014				    stcb->sctp_ep, stcb, netp);
1015				sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_LOCKED);
1016			}
1017		} else {
1018			/*
1019			 * we still got (or just got) data to send, so set
1020			 * SHUTDOWN_PENDING
1021			 */
1022			struct sctp_nets *netp;
1023
1024			if (stcb->asoc.alternate) {
1025				netp = stcb->asoc.alternate;
1026			} else {
1027				netp = stcb->asoc.primary_destination;
1028			}
1029
1030			asoc->state |= SCTP_STATE_SHUTDOWN_PENDING;
1031			sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD, stcb->sctp_ep, stcb,
1032			    netp);
1033
1034			if (asoc->locked_on_sending) {
1035				/* Locked to send out the data */
1036				struct sctp_stream_queue_pending *sp;
1037
1038				sp = TAILQ_LAST(&asoc->locked_on_sending->outqueue, sctp_streamhead);
1039				if (sp == NULL) {
1040					SCTP_PRINTF("Error, sp is NULL, locked on sending is non-null strm:%d\n",
1041					    asoc->locked_on_sending->stream_no);
1042				} else {
1043					if ((sp->length == 0) && (sp->msg_is_complete == 0)) {
1044						asoc->state |= SCTP_STATE_PARTIAL_MSG_LEFT;
1045					}
1046				}
1047			}
1048			if (TAILQ_EMPTY(&asoc->send_queue) &&
1049			    TAILQ_EMPTY(&asoc->sent_queue) &&
1050			    (asoc->state & SCTP_STATE_PARTIAL_MSG_LEFT)) {
1051				struct mbuf *op_err;
1052
1053		abort_anyway:
1054				op_err = sctp_generate_cause(SCTP_CAUSE_USER_INITIATED_ABT, "");
1055				stcb->sctp_ep->last_abort_code = SCTP_FROM_SCTP_USRREQ + SCTP_LOC_6;
1056				sctp_abort_an_association(stcb->sctp_ep, stcb,
1057				    op_err, SCTP_SO_LOCKED);
1058				goto skip_unlock;
1059			} else {
1060				sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_CLOSING, SCTP_SO_LOCKED);
1061			}
1062		}
1063		SCTP_TCB_UNLOCK(stcb);
1064	}
1065skip_unlock:
1066	SCTP_INP_RUNLOCK(inp);
1067	return (0);
1068}
1069
1070/*
1071 * copies a "user" presentable address and removes embedded scope, etc.
1072 * returns 0 on success, 1 on error
1073 */
1074static uint32_t
1075sctp_fill_user_address(struct sockaddr_storage *ss, struct sockaddr *sa)
1076{
1077#ifdef INET6
1078	struct sockaddr_in6 lsa6;
1079
1080	sa = (struct sockaddr *)sctp_recover_scope((struct sockaddr_in6 *)sa,
1081	    &lsa6);
1082#endif
1083	memcpy(ss, sa, sa->sa_len);
1084	return (0);
1085}
1086
1087
1088
1089/*
1090 * NOTE: assumes addr lock is held
1091 */
1092static size_t
1093sctp_fill_up_addresses_vrf(struct sctp_inpcb *inp,
1094    struct sctp_tcb *stcb,
1095    size_t limit,
1096    struct sockaddr_storage *sas,
1097    uint32_t vrf_id)
1098{
1099	struct sctp_ifn *sctp_ifn;
1100	struct sctp_ifa *sctp_ifa;
1101	size_t actual;
1102	int loopback_scope;
1103
1104#if defined(INET)
1105	int ipv4_local_scope, ipv4_addr_legal;
1106
1107#endif
1108#if defined(INET6)
1109	int local_scope, site_scope, ipv6_addr_legal;
1110
1111#endif
1112	struct sctp_vrf *vrf;
1113
1114	actual = 0;
1115	if (limit <= 0)
1116		return (actual);
1117
1118	if (stcb) {
1119		/* Turn on all the appropriate scope */
1120		loopback_scope = stcb->asoc.scope.loopback_scope;
1121#if defined(INET)
1122		ipv4_local_scope = stcb->asoc.scope.ipv4_local_scope;
1123		ipv4_addr_legal = stcb->asoc.scope.ipv4_addr_legal;
1124#endif
1125#if defined(INET6)
1126		local_scope = stcb->asoc.scope.local_scope;
1127		site_scope = stcb->asoc.scope.site_scope;
1128		ipv6_addr_legal = stcb->asoc.scope.ipv6_addr_legal;
1129#endif
1130	} else {
1131		/* Use generic values for endpoints. */
1132		loopback_scope = 1;
1133#if defined(INET)
1134		ipv4_local_scope = 1;
1135#endif
1136#if defined(INET6)
1137		local_scope = 1;
1138		site_scope = 1;
1139#endif
1140		if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
1141#if defined(INET6)
1142			ipv6_addr_legal = 1;
1143#endif
1144#if defined(INET)
1145			if (SCTP_IPV6_V6ONLY(inp)) {
1146				ipv4_addr_legal = 0;
1147			} else {
1148				ipv4_addr_legal = 1;
1149			}
1150#endif
1151		} else {
1152#if defined(INET6)
1153			ipv6_addr_legal = 0;
1154#endif
1155#if defined(INET)
1156			ipv4_addr_legal = 1;
1157#endif
1158		}
1159	}
1160	vrf = sctp_find_vrf(vrf_id);
1161	if (vrf == NULL) {
1162		return (0);
1163	}
1164	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1165		LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
1166			if ((loopback_scope == 0) &&
1167			    SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
1168				/* Skip loopback if loopback_scope not set */
1169				continue;
1170			}
1171			LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
1172				if (stcb) {
1173					/*
1174					 * For the BOUND-ALL case, the list
1175					 * associated with a TCB is Always
1176					 * considered a reverse list.. i.e.
1177					 * it lists addresses that are NOT
1178					 * part of the association. If this
1179					 * is one of those we must skip it.
1180					 */
1181					if (sctp_is_addr_restricted(stcb,
1182					    sctp_ifa)) {
1183						continue;
1184					}
1185				}
1186				switch (sctp_ifa->address.sa.sa_family) {
1187#ifdef INET
1188				case AF_INET:
1189					if (ipv4_addr_legal) {
1190						struct sockaddr_in *sin;
1191
1192						sin = &sctp_ifa->address.sin;
1193						if (sin->sin_addr.s_addr == 0) {
1194							/*
1195							 * we skip
1196							 * unspecifed
1197							 * addresses
1198							 */
1199							continue;
1200						}
1201						if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
1202						    &sin->sin_addr) != 0) {
1203							continue;
1204						}
1205						if ((ipv4_local_scope == 0) &&
1206						    (IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))) {
1207							continue;
1208						}
1209#ifdef INET6
1210						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
1211							in6_sin_2_v4mapsin6(sin, (struct sockaddr_in6 *)sas);
1212							((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1213							sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(struct sockaddr_in6));
1214							actual += sizeof(struct sockaddr_in6);
1215						} else {
1216#endif
1217							memcpy(sas, sin, sizeof(*sin));
1218							((struct sockaddr_in *)sas)->sin_port = inp->sctp_lport;
1219							sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(*sin));
1220							actual += sizeof(*sin);
1221#ifdef INET6
1222						}
1223#endif
1224						if (actual >= limit) {
1225							return (actual);
1226						}
1227					} else {
1228						continue;
1229					}
1230					break;
1231#endif
1232#ifdef INET6
1233				case AF_INET6:
1234					if (ipv6_addr_legal) {
1235						struct sockaddr_in6 *sin6;
1236
1237						sin6 = &sctp_ifa->address.sin6;
1238						if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
1239							/*
1240							 * we skip
1241							 * unspecifed
1242							 * addresses
1243							 */
1244							continue;
1245						}
1246						if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
1247						    &sin6->sin6_addr) != 0) {
1248							continue;
1249						}
1250						if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
1251							if (local_scope == 0)
1252								continue;
1253							if (sin6->sin6_scope_id == 0) {
1254								if (sa6_recoverscope(sin6) != 0)
1255									/*
1256									 *
1257									 * bad
1258									 *
1259									 * li
1260									 * nk
1261									 *
1262									 * loc
1263									 * al
1264									 *
1265									 * add
1266									 * re
1267									 * ss
1268									 * */
1269									continue;
1270							}
1271						}
1272						if ((site_scope == 0) &&
1273						    (IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))) {
1274							continue;
1275						}
1276						memcpy(sas, sin6, sizeof(*sin6));
1277						((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1278						sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(*sin6));
1279						actual += sizeof(*sin6);
1280						if (actual >= limit) {
1281							return (actual);
1282						}
1283					} else {
1284						continue;
1285					}
1286					break;
1287#endif
1288				default:
1289					/* TSNH */
1290					break;
1291				}
1292			}
1293		}
1294	} else {
1295		struct sctp_laddr *laddr;
1296
1297		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
1298			if (stcb) {
1299				if (sctp_is_addr_restricted(stcb, laddr->ifa)) {
1300					continue;
1301				}
1302			}
1303			if (sctp_fill_user_address(sas, &laddr->ifa->address.sa))
1304				continue;
1305			switch (laddr->ifa->address.sa.sa_family) {
1306#ifdef INET
1307			case AF_INET:
1308				((struct sockaddr_in *)sas)->sin_port = inp->sctp_lport;
1309				break;
1310#endif
1311#ifdef INET6
1312			case AF_INET6:
1313				((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1314				break;
1315#endif
1316			default:
1317				/* TSNH */
1318				break;
1319			}
1320			sas = (struct sockaddr_storage *)((caddr_t)sas +
1321			    laddr->ifa->address.sa.sa_len);
1322			actual += laddr->ifa->address.sa.sa_len;
1323			if (actual >= limit) {
1324				return (actual);
1325			}
1326		}
1327	}
1328	return (actual);
1329}
1330
1331static size_t
1332sctp_fill_up_addresses(struct sctp_inpcb *inp,
1333    struct sctp_tcb *stcb,
1334    size_t limit,
1335    struct sockaddr_storage *sas)
1336{
1337	size_t size = 0;
1338
1339	SCTP_IPI_ADDR_RLOCK();
1340	/* fill up addresses for the endpoint's default vrf */
1341	size = sctp_fill_up_addresses_vrf(inp, stcb, limit, sas,
1342	    inp->def_vrf_id);
1343	SCTP_IPI_ADDR_RUNLOCK();
1344	return (size);
1345}
1346
1347/*
1348 * NOTE: assumes addr lock is held
1349 */
1350static int
1351sctp_count_max_addresses_vrf(struct sctp_inpcb *inp, uint32_t vrf_id)
1352{
1353	int cnt = 0;
1354	struct sctp_vrf *vrf = NULL;
1355
1356	/*
1357	 * In both sub-set bound an bound_all cases we return the MAXIMUM
1358	 * number of addresses that you COULD get. In reality the sub-set
1359	 * bound may have an exclusion list for a given TCB OR in the
1360	 * bound-all case a TCB may NOT include the loopback or other
1361	 * addresses as well.
1362	 */
1363	vrf = sctp_find_vrf(vrf_id);
1364	if (vrf == NULL) {
1365		return (0);
1366	}
1367	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1368		struct sctp_ifn *sctp_ifn;
1369		struct sctp_ifa *sctp_ifa;
1370
1371		LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
1372			LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
1373				/* Count them if they are the right type */
1374				switch (sctp_ifa->address.sa.sa_family) {
1375#ifdef INET
1376				case AF_INET:
1377#ifdef INET6
1378					if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4))
1379						cnt += sizeof(struct sockaddr_in6);
1380					else
1381						cnt += sizeof(struct sockaddr_in);
1382#else
1383					cnt += sizeof(struct sockaddr_in);
1384#endif
1385					break;
1386#endif
1387#ifdef INET6
1388				case AF_INET6:
1389					cnt += sizeof(struct sockaddr_in6);
1390					break;
1391#endif
1392				default:
1393					break;
1394				}
1395			}
1396		}
1397	} else {
1398		struct sctp_laddr *laddr;
1399
1400		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
1401			switch (laddr->ifa->address.sa.sa_family) {
1402#ifdef INET
1403			case AF_INET:
1404#ifdef INET6
1405				if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4))
1406					cnt += sizeof(struct sockaddr_in6);
1407				else
1408					cnt += sizeof(struct sockaddr_in);
1409#else
1410				cnt += sizeof(struct sockaddr_in);
1411#endif
1412				break;
1413#endif
1414#ifdef INET6
1415			case AF_INET6:
1416				cnt += sizeof(struct sockaddr_in6);
1417				break;
1418#endif
1419			default:
1420				break;
1421			}
1422		}
1423	}
1424	return (cnt);
1425}
1426
1427static int
1428sctp_count_max_addresses(struct sctp_inpcb *inp)
1429{
1430	int cnt = 0;
1431
1432	SCTP_IPI_ADDR_RLOCK();
1433	/* count addresses for the endpoint's default VRF */
1434	cnt = sctp_count_max_addresses_vrf(inp, inp->def_vrf_id);
1435	SCTP_IPI_ADDR_RUNLOCK();
1436	return (cnt);
1437}
1438
1439static int
1440sctp_do_connect_x(struct socket *so, struct sctp_inpcb *inp, void *optval,
1441    size_t optsize, void *p, int delay)
1442{
1443	int error = 0;
1444	int creat_lock_on = 0;
1445	struct sctp_tcb *stcb = NULL;
1446	struct sockaddr *sa;
1447	int num_v6 = 0, num_v4 = 0, *totaddrp, totaddr;
1448	uint32_t vrf_id;
1449	int bad_addresses = 0;
1450	sctp_assoc_t *a_id;
1451
1452	SCTPDBG(SCTP_DEBUG_PCB1, "Connectx called\n");
1453
1454	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
1455	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
1456		/* We are already connected AND the TCP model */
1457		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
1458		return (EADDRINUSE);
1459	}
1460	if ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) &&
1461	    (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE))) {
1462		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1463		return (EINVAL);
1464	}
1465	if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
1466		SCTP_INP_RLOCK(inp);
1467		stcb = LIST_FIRST(&inp->sctp_asoc_list);
1468		SCTP_INP_RUNLOCK(inp);
1469	}
1470	if (stcb) {
1471		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
1472		return (EALREADY);
1473	}
1474	SCTP_INP_INCR_REF(inp);
1475	SCTP_ASOC_CREATE_LOCK(inp);
1476	creat_lock_on = 1;
1477	if ((inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) ||
1478	    (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE)) {
1479		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EFAULT);
1480		error = EFAULT;
1481		goto out_now;
1482	}
1483	totaddrp = (int *)optval;
1484	totaddr = *totaddrp;
1485	sa = (struct sockaddr *)(totaddrp + 1);
1486	stcb = sctp_connectx_helper_find(inp, sa, &totaddr, &num_v4, &num_v6, &error, (optsize - sizeof(int)), &bad_addresses);
1487	if ((stcb != NULL) || bad_addresses) {
1488		/* Already have or am bring up an association */
1489		SCTP_ASOC_CREATE_UNLOCK(inp);
1490		creat_lock_on = 0;
1491		if (stcb)
1492			SCTP_TCB_UNLOCK(stcb);
1493		if (bad_addresses == 0) {
1494			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
1495			error = EALREADY;
1496		}
1497		goto out_now;
1498	}
1499#ifdef INET6
1500	if (((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) &&
1501	    (num_v6 > 0)) {
1502		error = EINVAL;
1503		goto out_now;
1504	}
1505	if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
1506	    (num_v4 > 0)) {
1507		struct in6pcb *inp6;
1508
1509		inp6 = (struct in6pcb *)inp;
1510		if (SCTP_IPV6_V6ONLY(inp6)) {
1511			/*
1512			 * if IPV6_V6ONLY flag, ignore connections destined
1513			 * to a v4 addr or v4-mapped addr
1514			 */
1515			SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1516			error = EINVAL;
1517			goto out_now;
1518		}
1519	}
1520#endif				/* INET6 */
1521	if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) ==
1522	    SCTP_PCB_FLAGS_UNBOUND) {
1523		/* Bind a ephemeral port */
1524		error = sctp_inpcb_bind(so, NULL, NULL, p);
1525		if (error) {
1526			goto out_now;
1527		}
1528	}
1529	/* FIX ME: do we want to pass in a vrf on the connect call? */
1530	vrf_id = inp->def_vrf_id;
1531
1532
1533	/* We are GOOD to go */
1534	stcb = sctp_aloc_assoc(inp, sa, &error, 0, vrf_id,
1535	    (struct thread *)p
1536	    );
1537	if (stcb == NULL) {
1538		/* Gak! no memory */
1539		goto out_now;
1540	}
1541	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
1542		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
1543		/* Set the connected flag so we can queue data */
1544		soisconnecting(so);
1545	}
1546	SCTP_SET_STATE(&stcb->asoc, SCTP_STATE_COOKIE_WAIT);
1547	/* move to second address */
1548	switch (sa->sa_family) {
1549#ifdef INET
1550	case AF_INET:
1551		sa = (struct sockaddr *)((caddr_t)sa + sizeof(struct sockaddr_in));
1552		break;
1553#endif
1554#ifdef INET6
1555	case AF_INET6:
1556		sa = (struct sockaddr *)((caddr_t)sa + sizeof(struct sockaddr_in6));
1557		break;
1558#endif
1559	default:
1560		break;
1561	}
1562
1563	error = 0;
1564	sctp_connectx_helper_add(stcb, sa, (totaddr - 1), &error);
1565	/* Fill in the return id */
1566	if (error) {
1567		(void)sctp_free_assoc(inp, stcb, SCTP_PCBFREE_FORCE, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_6);
1568		goto out_now;
1569	}
1570	a_id = (sctp_assoc_t *) optval;
1571	*a_id = sctp_get_associd(stcb);
1572
1573	/* initialize authentication parameters for the assoc */
1574	sctp_initialize_auth_params(inp, stcb);
1575
1576	if (delay) {
1577		/* doing delayed connection */
1578		stcb->asoc.delayed_connection = 1;
1579		sctp_timer_start(SCTP_TIMER_TYPE_INIT, inp, stcb, stcb->asoc.primary_destination);
1580	} else {
1581		(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
1582		sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
1583	}
1584	SCTP_TCB_UNLOCK(stcb);
1585	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
1586		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
1587		/* Set the connected flag so we can queue data */
1588		soisconnecting(so);
1589	}
1590out_now:
1591	if (creat_lock_on) {
1592		SCTP_ASOC_CREATE_UNLOCK(inp);
1593	}
1594	SCTP_INP_DECR_REF(inp);
1595	return (error);
1596}
1597
1598#define SCTP_FIND_STCB(inp, stcb, assoc_id) { \
1599	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||\
1600	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) { \
1601		SCTP_INP_RLOCK(inp); \
1602		stcb = LIST_FIRST(&inp->sctp_asoc_list); \
1603		if (stcb) { \
1604			SCTP_TCB_LOCK(stcb); \
1605                } \
1606		SCTP_INP_RUNLOCK(inp); \
1607	} else if (assoc_id > SCTP_ALL_ASSOC) { \
1608		stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1); \
1609		if (stcb == NULL) { \
1610		        SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT); \
1611			error = ENOENT; \
1612			break; \
1613		} \
1614	} else { \
1615		stcb = NULL; \
1616        } \
1617  }
1618
1619
1620#define SCTP_CHECK_AND_CAST(destp, srcp, type, size) {\
1621	if (size < sizeof(type)) { \
1622		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL); \
1623		error = EINVAL; \
1624		break; \
1625	} else { \
1626		destp = (type *)srcp; \
1627	} \
1628      }
1629
1630static int
1631sctp_getopt(struct socket *so, int optname, void *optval, size_t *optsize,
1632    void *p)
1633{
1634	struct sctp_inpcb *inp = NULL;
1635	int error, val = 0;
1636	struct sctp_tcb *stcb = NULL;
1637
1638	if (optval == NULL) {
1639		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1640		return (EINVAL);
1641	}
1642	inp = (struct sctp_inpcb *)so->so_pcb;
1643	if (inp == NULL) {
1644		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1645		return EINVAL;
1646	}
1647	error = 0;
1648
1649	switch (optname) {
1650	case SCTP_NODELAY:
1651	case SCTP_AUTOCLOSE:
1652	case SCTP_EXPLICIT_EOR:
1653	case SCTP_AUTO_ASCONF:
1654	case SCTP_DISABLE_FRAGMENTS:
1655	case SCTP_I_WANT_MAPPED_V4_ADDR:
1656	case SCTP_USE_EXT_RCVINFO:
1657		SCTP_INP_RLOCK(inp);
1658		switch (optname) {
1659		case SCTP_DISABLE_FRAGMENTS:
1660			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NO_FRAGMENT);
1661			break;
1662		case SCTP_I_WANT_MAPPED_V4_ADDR:
1663			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4);
1664			break;
1665		case SCTP_AUTO_ASCONF:
1666			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1667				/* only valid for bound all sockets */
1668				val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTO_ASCONF);
1669			} else {
1670				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1671				error = EINVAL;
1672				goto flags_out;
1673			}
1674			break;
1675		case SCTP_EXPLICIT_EOR:
1676			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_EXPLICIT_EOR);
1677			break;
1678		case SCTP_NODELAY:
1679			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NODELAY);
1680			break;
1681		case SCTP_USE_EXT_RCVINFO:
1682			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_EXT_RCVINFO);
1683			break;
1684		case SCTP_AUTOCLOSE:
1685			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTOCLOSE))
1686				val = TICKS_TO_SEC(inp->sctp_ep.auto_close_time);
1687			else
1688				val = 0;
1689			break;
1690
1691		default:
1692			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
1693			error = ENOPROTOOPT;
1694		}		/* end switch (sopt->sopt_name) */
1695		if (*optsize < sizeof(val)) {
1696			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1697			error = EINVAL;
1698		}
1699flags_out:
1700		SCTP_INP_RUNLOCK(inp);
1701		if (error == 0) {
1702			/* return the option value */
1703			*(int *)optval = val;
1704			*optsize = sizeof(val);
1705		}
1706		break;
1707	case SCTP_GET_PACKET_LOG:
1708		{
1709#ifdef  SCTP_PACKET_LOGGING
1710			uint8_t *target;
1711			int ret;
1712
1713			SCTP_CHECK_AND_CAST(target, optval, uint8_t, *optsize);
1714			ret = sctp_copy_out_packet_log(target, (int)*optsize);
1715			*optsize = ret;
1716#else
1717			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
1718			error = EOPNOTSUPP;
1719#endif
1720			break;
1721		}
1722	case SCTP_REUSE_PORT:
1723		{
1724			uint32_t *value;
1725
1726			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE)) {
1727				/* Can't do this for a 1-m socket */
1728				error = EINVAL;
1729				break;
1730			}
1731			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1732			*value = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE);
1733			*optsize = sizeof(uint32_t);
1734			break;
1735		}
1736	case SCTP_PARTIAL_DELIVERY_POINT:
1737		{
1738			uint32_t *value;
1739
1740			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1741			*value = inp->partial_delivery_point;
1742			*optsize = sizeof(uint32_t);
1743			break;
1744		}
1745	case SCTP_FRAGMENT_INTERLEAVE:
1746		{
1747			uint32_t *value;
1748
1749			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1750			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE)) {
1751				if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS)) {
1752					*value = SCTP_FRAG_LEVEL_2;
1753				} else {
1754					*value = SCTP_FRAG_LEVEL_1;
1755				}
1756			} else {
1757				*value = SCTP_FRAG_LEVEL_0;
1758			}
1759			*optsize = sizeof(uint32_t);
1760			break;
1761		}
1762	case SCTP_CMT_ON_OFF:
1763		{
1764			struct sctp_assoc_value *av;
1765
1766			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1767			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1768			if (stcb) {
1769				av->assoc_value = stcb->asoc.sctp_cmt_on_off;
1770				SCTP_TCB_UNLOCK(stcb);
1771			} else {
1772				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1773				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1774				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1775					SCTP_INP_RLOCK(inp);
1776					av->assoc_value = inp->sctp_cmt_on_off;
1777					SCTP_INP_RUNLOCK(inp);
1778				} else {
1779					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1780					error = EINVAL;
1781				}
1782			}
1783			if (error == 0) {
1784				*optsize = sizeof(struct sctp_assoc_value);
1785			}
1786			break;
1787		}
1788	case SCTP_PLUGGABLE_CC:
1789		{
1790			struct sctp_assoc_value *av;
1791
1792			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1793			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1794			if (stcb) {
1795				av->assoc_value = stcb->asoc.congestion_control_module;
1796				SCTP_TCB_UNLOCK(stcb);
1797			} else {
1798				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1799				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1800				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1801					SCTP_INP_RLOCK(inp);
1802					av->assoc_value = inp->sctp_ep.sctp_default_cc_module;
1803					SCTP_INP_RUNLOCK(inp);
1804				} else {
1805					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1806					error = EINVAL;
1807				}
1808			}
1809			if (error == 0) {
1810				*optsize = sizeof(struct sctp_assoc_value);
1811			}
1812			break;
1813		}
1814	case SCTP_CC_OPTION:
1815		{
1816			struct sctp_cc_option *cc_opt;
1817
1818			SCTP_CHECK_AND_CAST(cc_opt, optval, struct sctp_cc_option, *optsize);
1819			SCTP_FIND_STCB(inp, stcb, cc_opt->aid_value.assoc_id);
1820			if (stcb == NULL) {
1821				error = EINVAL;
1822			} else {
1823				if (stcb->asoc.cc_functions.sctp_cwnd_socket_option == NULL) {
1824					error = ENOTSUP;
1825				} else {
1826					error = (*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 0, cc_opt);
1827					*optsize = sizeof(struct sctp_cc_option);
1828				}
1829				SCTP_TCB_UNLOCK(stcb);
1830			}
1831			break;
1832		}
1833	case SCTP_PLUGGABLE_SS:
1834		{
1835			struct sctp_assoc_value *av;
1836
1837			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1838			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1839			if (stcb) {
1840				av->assoc_value = stcb->asoc.stream_scheduling_module;
1841				SCTP_TCB_UNLOCK(stcb);
1842			} else {
1843				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1844				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1845				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1846					SCTP_INP_RLOCK(inp);
1847					av->assoc_value = inp->sctp_ep.sctp_default_ss_module;
1848					SCTP_INP_RUNLOCK(inp);
1849				} else {
1850					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1851					error = EINVAL;
1852				}
1853			}
1854			if (error == 0) {
1855				*optsize = sizeof(struct sctp_assoc_value);
1856			}
1857			break;
1858		}
1859	case SCTP_SS_VALUE:
1860		{
1861			struct sctp_stream_value *av;
1862
1863			SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, *optsize);
1864			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1865			if (stcb) {
1866				if ((av->stream_id >= stcb->asoc.streamoutcnt) ||
1867				    (stcb->asoc.ss_functions.sctp_ss_get_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id],
1868				    &av->stream_value) < 0)) {
1869					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1870					error = EINVAL;
1871				} else {
1872					*optsize = sizeof(struct sctp_stream_value);
1873				}
1874				SCTP_TCB_UNLOCK(stcb);
1875			} else {
1876				/*
1877				 * Can't get stream value without
1878				 * association
1879				 */
1880				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1881				error = EINVAL;
1882			}
1883			break;
1884		}
1885	case SCTP_GET_ADDR_LEN:
1886		{
1887			struct sctp_assoc_value *av;
1888
1889			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1890			error = EINVAL;
1891#ifdef INET
1892			if (av->assoc_value == AF_INET) {
1893				av->assoc_value = sizeof(struct sockaddr_in);
1894				error = 0;
1895			}
1896#endif
1897#ifdef INET6
1898			if (av->assoc_value == AF_INET6) {
1899				av->assoc_value = sizeof(struct sockaddr_in6);
1900				error = 0;
1901			}
1902#endif
1903			if (error) {
1904				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1905			} else {
1906				*optsize = sizeof(struct sctp_assoc_value);
1907			}
1908			break;
1909		}
1910	case SCTP_GET_ASSOC_NUMBER:
1911		{
1912			uint32_t *value, cnt;
1913
1914			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1915			cnt = 0;
1916			SCTP_INP_RLOCK(inp);
1917			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
1918				cnt++;
1919			}
1920			SCTP_INP_RUNLOCK(inp);
1921			*value = cnt;
1922			*optsize = sizeof(uint32_t);
1923			break;
1924		}
1925	case SCTP_GET_ASSOC_ID_LIST:
1926		{
1927			struct sctp_assoc_ids *ids;
1928			unsigned int at, limit;
1929
1930			SCTP_CHECK_AND_CAST(ids, optval, struct sctp_assoc_ids, *optsize);
1931			at = 0;
1932			limit = (*optsize - sizeof(uint32_t)) / sizeof(sctp_assoc_t);
1933			SCTP_INP_RLOCK(inp);
1934			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
1935				if (at < limit) {
1936					ids->gaids_assoc_id[at++] = sctp_get_associd(stcb);
1937				} else {
1938					error = EINVAL;
1939					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1940					break;
1941				}
1942			}
1943			SCTP_INP_RUNLOCK(inp);
1944			if (error == 0) {
1945				ids->gaids_number_of_ids = at;
1946				*optsize = ((at * sizeof(sctp_assoc_t)) + sizeof(uint32_t));
1947			}
1948			break;
1949		}
1950	case SCTP_CONTEXT:
1951		{
1952			struct sctp_assoc_value *av;
1953
1954			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1955			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1956
1957			if (stcb) {
1958				av->assoc_value = stcb->asoc.context;
1959				SCTP_TCB_UNLOCK(stcb);
1960			} else {
1961				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1962				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1963				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1964					SCTP_INP_RLOCK(inp);
1965					av->assoc_value = inp->sctp_context;
1966					SCTP_INP_RUNLOCK(inp);
1967				} else {
1968					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1969					error = EINVAL;
1970				}
1971			}
1972			if (error == 0) {
1973				*optsize = sizeof(struct sctp_assoc_value);
1974			}
1975			break;
1976		}
1977	case SCTP_VRF_ID:
1978		{
1979			uint32_t *default_vrfid;
1980
1981			SCTP_CHECK_AND_CAST(default_vrfid, optval, uint32_t, *optsize);
1982			*default_vrfid = inp->def_vrf_id;
1983			*optsize = sizeof(uint32_t);
1984			break;
1985		}
1986	case SCTP_GET_ASOC_VRF:
1987		{
1988			struct sctp_assoc_value *id;
1989
1990			SCTP_CHECK_AND_CAST(id, optval, struct sctp_assoc_value, *optsize);
1991			SCTP_FIND_STCB(inp, stcb, id->assoc_id);
1992			if (stcb == NULL) {
1993				error = EINVAL;
1994				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1995			} else {
1996				id->assoc_value = stcb->asoc.vrf_id;
1997				*optsize = sizeof(struct sctp_assoc_value);
1998			}
1999			break;
2000		}
2001	case SCTP_GET_VRF_IDS:
2002		{
2003			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
2004			error = EOPNOTSUPP;
2005			break;
2006		}
2007	case SCTP_GET_NONCE_VALUES:
2008		{
2009			struct sctp_get_nonce_values *gnv;
2010
2011			SCTP_CHECK_AND_CAST(gnv, optval, struct sctp_get_nonce_values, *optsize);
2012			SCTP_FIND_STCB(inp, stcb, gnv->gn_assoc_id);
2013
2014			if (stcb) {
2015				gnv->gn_peers_tag = stcb->asoc.peer_vtag;
2016				gnv->gn_local_tag = stcb->asoc.my_vtag;
2017				SCTP_TCB_UNLOCK(stcb);
2018				*optsize = sizeof(struct sctp_get_nonce_values);
2019			} else {
2020				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2021				error = ENOTCONN;
2022			}
2023			break;
2024		}
2025	case SCTP_DELAYED_SACK:
2026		{
2027			struct sctp_sack_info *sack;
2028
2029			SCTP_CHECK_AND_CAST(sack, optval, struct sctp_sack_info, *optsize);
2030			SCTP_FIND_STCB(inp, stcb, sack->sack_assoc_id);
2031			if (stcb) {
2032				sack->sack_delay = stcb->asoc.delayed_ack;
2033				sack->sack_freq = stcb->asoc.sack_freq;
2034				SCTP_TCB_UNLOCK(stcb);
2035			} else {
2036				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2037				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2038				    (sack->sack_assoc_id == SCTP_FUTURE_ASSOC)) {
2039					SCTP_INP_RLOCK(inp);
2040					sack->sack_delay = TICKS_TO_MSEC(inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_RECV]);
2041					sack->sack_freq = inp->sctp_ep.sctp_sack_freq;
2042					SCTP_INP_RUNLOCK(inp);
2043				} else {
2044					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2045					error = EINVAL;
2046				}
2047			}
2048			if (error == 0) {
2049				*optsize = sizeof(struct sctp_sack_info);
2050			}
2051			break;
2052		}
2053	case SCTP_GET_SNDBUF_USE:
2054		{
2055			struct sctp_sockstat *ss;
2056
2057			SCTP_CHECK_AND_CAST(ss, optval, struct sctp_sockstat, *optsize);
2058			SCTP_FIND_STCB(inp, stcb, ss->ss_assoc_id);
2059
2060			if (stcb) {
2061				ss->ss_total_sndbuf = stcb->asoc.total_output_queue_size;
2062				ss->ss_total_recv_buf = (stcb->asoc.size_on_reasm_queue +
2063				    stcb->asoc.size_on_all_streams);
2064				SCTP_TCB_UNLOCK(stcb);
2065				*optsize = sizeof(struct sctp_sockstat);
2066			} else {
2067				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2068				error = ENOTCONN;
2069			}
2070			break;
2071		}
2072	case SCTP_MAX_BURST:
2073		{
2074			struct sctp_assoc_value *av;
2075
2076			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
2077			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
2078
2079			if (stcb) {
2080				av->assoc_value = stcb->asoc.max_burst;
2081				SCTP_TCB_UNLOCK(stcb);
2082			} else {
2083				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2084				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2085				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
2086					SCTP_INP_RLOCK(inp);
2087					av->assoc_value = inp->sctp_ep.max_burst;
2088					SCTP_INP_RUNLOCK(inp);
2089				} else {
2090					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2091					error = EINVAL;
2092				}
2093			}
2094			if (error == 0) {
2095				*optsize = sizeof(struct sctp_assoc_value);
2096			}
2097			break;
2098		}
2099	case SCTP_MAXSEG:
2100		{
2101			struct sctp_assoc_value *av;
2102			int ovh;
2103
2104			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
2105			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
2106
2107			if (stcb) {
2108				av->assoc_value = sctp_get_frag_point(stcb, &stcb->asoc);
2109				SCTP_TCB_UNLOCK(stcb);
2110			} else {
2111				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2112				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2113				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
2114					SCTP_INP_RLOCK(inp);
2115					if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
2116						ovh = SCTP_MED_OVERHEAD;
2117					} else {
2118						ovh = SCTP_MED_V4_OVERHEAD;
2119					}
2120					if (inp->sctp_frag_point >= SCTP_DEFAULT_MAXSEGMENT)
2121						av->assoc_value = 0;
2122					else
2123						av->assoc_value = inp->sctp_frag_point - ovh;
2124					SCTP_INP_RUNLOCK(inp);
2125				} else {
2126					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2127					error = EINVAL;
2128				}
2129			}
2130			if (error == 0) {
2131				*optsize = sizeof(struct sctp_assoc_value);
2132			}
2133			break;
2134		}
2135	case SCTP_GET_STAT_LOG:
2136		error = sctp_fill_stat_log(optval, optsize);
2137		break;
2138	case SCTP_EVENTS:
2139		{
2140			struct sctp_event_subscribe *events;
2141
2142			SCTP_CHECK_AND_CAST(events, optval, struct sctp_event_subscribe, *optsize);
2143			memset(events, 0, sizeof(struct sctp_event_subscribe));
2144			SCTP_INP_RLOCK(inp);
2145			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT))
2146				events->sctp_data_io_event = 1;
2147
2148			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT))
2149				events->sctp_association_event = 1;
2150
2151			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVPADDREVNT))
2152				events->sctp_address_event = 1;
2153
2154			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT))
2155				events->sctp_send_failure_event = 1;
2156
2157			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVPEERERR))
2158				events->sctp_peer_error_event = 1;
2159
2160			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT))
2161				events->sctp_shutdown_event = 1;
2162
2163			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PDAPIEVNT))
2164				events->sctp_partial_delivery_event = 1;
2165
2166			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT))
2167				events->sctp_adaptation_layer_event = 1;
2168
2169			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTHEVNT))
2170				events->sctp_authentication_event = 1;
2171
2172			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DRYEVNT))
2173				events->sctp_sender_dry_event = 1;
2174
2175			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT))
2176				events->sctp_stream_reset_event = 1;
2177			SCTP_INP_RUNLOCK(inp);
2178			*optsize = sizeof(struct sctp_event_subscribe);
2179			break;
2180		}
2181	case SCTP_ADAPTATION_LAYER:
2182		{
2183			uint32_t *value;
2184
2185			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2186
2187			SCTP_INP_RLOCK(inp);
2188			*value = inp->sctp_ep.adaptation_layer_indicator;
2189			SCTP_INP_RUNLOCK(inp);
2190			*optsize = sizeof(uint32_t);
2191			break;
2192		}
2193	case SCTP_SET_INITIAL_DBG_SEQ:
2194		{
2195			uint32_t *value;
2196
2197			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2198			SCTP_INP_RLOCK(inp);
2199			*value = inp->sctp_ep.initial_sequence_debug;
2200			SCTP_INP_RUNLOCK(inp);
2201			*optsize = sizeof(uint32_t);
2202			break;
2203		}
2204	case SCTP_GET_LOCAL_ADDR_SIZE:
2205		{
2206			uint32_t *value;
2207
2208			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2209			SCTP_INP_RLOCK(inp);
2210			*value = sctp_count_max_addresses(inp);
2211			SCTP_INP_RUNLOCK(inp);
2212			*optsize = sizeof(uint32_t);
2213			break;
2214		}
2215	case SCTP_GET_REMOTE_ADDR_SIZE:
2216		{
2217			uint32_t *value;
2218			size_t size;
2219			struct sctp_nets *net;
2220
2221			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2222			/* FIXME MT: change to sctp_assoc_value? */
2223			SCTP_FIND_STCB(inp, stcb, (sctp_assoc_t) * value);
2224
2225			if (stcb) {
2226				size = 0;
2227				/* Count the sizes */
2228				TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
2229					switch (net->ro._l_addr.sa.sa_family) {
2230#ifdef INET
2231					case AF_INET:
2232#ifdef INET6
2233						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2234							size += sizeof(struct sockaddr_in6);
2235						} else {
2236							size += sizeof(struct sockaddr_in);
2237						}
2238#else
2239						size += sizeof(struct sockaddr_in);
2240#endif
2241						break;
2242#endif
2243#ifdef INET6
2244					case AF_INET6:
2245						size += sizeof(struct sockaddr_in6);
2246						break;
2247#endif
2248					default:
2249						break;
2250					}
2251				}
2252				SCTP_TCB_UNLOCK(stcb);
2253				*value = (uint32_t) size;
2254				*optsize = sizeof(uint32_t);
2255			} else {
2256				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2257				error = ENOTCONN;
2258			}
2259			break;
2260		}
2261	case SCTP_GET_PEER_ADDRESSES:
2262		/*
2263		 * Get the address information, an array is passed in to
2264		 * fill up we pack it.
2265		 */
2266		{
2267			size_t cpsz, left;
2268			struct sockaddr_storage *sas;
2269			struct sctp_nets *net;
2270			struct sctp_getaddresses *saddr;
2271
2272			SCTP_CHECK_AND_CAST(saddr, optval, struct sctp_getaddresses, *optsize);
2273			SCTP_FIND_STCB(inp, stcb, saddr->sget_assoc_id);
2274
2275			if (stcb) {
2276				left = (*optsize) - sizeof(struct sctp_getaddresses);
2277				*optsize = sizeof(struct sctp_getaddresses);
2278				sas = (struct sockaddr_storage *)&saddr->addr[0];
2279
2280				TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
2281					switch (net->ro._l_addr.sa.sa_family) {
2282#ifdef INET
2283					case AF_INET:
2284#ifdef INET6
2285						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2286							cpsz = sizeof(struct sockaddr_in6);
2287						} else {
2288							cpsz = sizeof(struct sockaddr_in);
2289						}
2290#else
2291						cpsz = sizeof(struct sockaddr_in);
2292#endif
2293						break;
2294#endif
2295#ifdef INET6
2296					case AF_INET6:
2297						cpsz = sizeof(struct sockaddr_in6);
2298						break;
2299#endif
2300					default:
2301						cpsz = 0;
2302						break;
2303					}
2304					if (cpsz == 0) {
2305						break;
2306					}
2307					if (left < cpsz) {
2308						/* not enough room. */
2309						break;
2310					}
2311#if defined(INET) && defined(INET6)
2312					if ((sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) &&
2313					    (net->ro._l_addr.sa.sa_family == AF_INET)) {
2314						/* Must map the address */
2315						in6_sin_2_v4mapsin6(&net->ro._l_addr.sin,
2316						    (struct sockaddr_in6 *)sas);
2317					} else {
2318						memcpy(sas, &net->ro._l_addr, cpsz);
2319					}
2320#else
2321					memcpy(sas, &net->ro._l_addr, cpsz);
2322#endif
2323					((struct sockaddr_in *)sas)->sin_port = stcb->rport;
2324
2325					sas = (struct sockaddr_storage *)((caddr_t)sas + cpsz);
2326					left -= cpsz;
2327					*optsize += cpsz;
2328				}
2329				SCTP_TCB_UNLOCK(stcb);
2330			} else {
2331				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
2332				error = ENOENT;
2333			}
2334			break;
2335		}
2336	case SCTP_GET_LOCAL_ADDRESSES:
2337		{
2338			size_t limit, actual;
2339			struct sockaddr_storage *sas;
2340			struct sctp_getaddresses *saddr;
2341
2342			SCTP_CHECK_AND_CAST(saddr, optval, struct sctp_getaddresses, *optsize);
2343			SCTP_FIND_STCB(inp, stcb, saddr->sget_assoc_id);
2344
2345			sas = (struct sockaddr_storage *)&saddr->addr[0];
2346			limit = *optsize - sizeof(sctp_assoc_t);
2347			actual = sctp_fill_up_addresses(inp, stcb, limit, sas);
2348			if (stcb) {
2349				SCTP_TCB_UNLOCK(stcb);
2350			}
2351			*optsize = sizeof(struct sockaddr_storage) + actual;
2352			break;
2353		}
2354	case SCTP_PEER_ADDR_PARAMS:
2355		{
2356			struct sctp_paddrparams *paddrp;
2357			struct sctp_nets *net;
2358			struct sockaddr *addr;
2359
2360#if defined(INET) && defined(INET6)
2361			struct sockaddr_in sin_store;
2362
2363#endif
2364
2365			SCTP_CHECK_AND_CAST(paddrp, optval, struct sctp_paddrparams, *optsize);
2366			SCTP_FIND_STCB(inp, stcb, paddrp->spp_assoc_id);
2367
2368#if defined(INET) && defined(INET6)
2369			if (paddrp->spp_address.ss_family == AF_INET6) {
2370				struct sockaddr_in6 *sin6;
2371
2372				sin6 = (struct sockaddr_in6 *)&paddrp->spp_address;
2373				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
2374					in6_sin6_2_sin(&sin_store, sin6);
2375					addr = (struct sockaddr *)&sin_store;
2376				} else {
2377					addr = (struct sockaddr *)&paddrp->spp_address;
2378				}
2379			} else {
2380				addr = (struct sockaddr *)&paddrp->spp_address;
2381			}
2382#else
2383			addr = (struct sockaddr *)&paddrp->spp_address;
2384#endif
2385			if (stcb != NULL) {
2386				net = sctp_findnet(stcb, addr);
2387			} else {
2388				/*
2389				 * We increment here since
2390				 * sctp_findassociation_ep_addr() wil do a
2391				 * decrement if it finds the stcb as long as
2392				 * the locked tcb (last argument) is NOT a
2393				 * TCB.. aka NULL.
2394				 */
2395				net = NULL;
2396				SCTP_INP_INCR_REF(inp);
2397				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
2398				if (stcb == NULL) {
2399					SCTP_INP_DECR_REF(inp);
2400				}
2401			}
2402			if ((stcb != NULL) && (net == NULL)) {
2403#ifdef INET
2404				if (addr->sa_family == AF_INET) {
2405					struct sockaddr_in *sin;
2406
2407					sin = (struct sockaddr_in *)addr;
2408					if (sin->sin_addr.s_addr != INADDR_ANY) {
2409						error = EINVAL;
2410						SCTP_TCB_UNLOCK(stcb);
2411						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2412						break;
2413					}
2414				} else
2415#endif
2416#ifdef INET6
2417				if (addr->sa_family == AF_INET6) {
2418					struct sockaddr_in6 *sin6;
2419
2420					sin6 = (struct sockaddr_in6 *)addr;
2421					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2422						error = EINVAL;
2423						SCTP_TCB_UNLOCK(stcb);
2424						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2425						break;
2426					}
2427				} else
2428#endif
2429				{
2430					error = EAFNOSUPPORT;
2431					SCTP_TCB_UNLOCK(stcb);
2432					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2433					break;
2434				}
2435			}
2436			if (stcb != NULL) {
2437				/* Applies to the specific association */
2438				paddrp->spp_flags = 0;
2439				if (net != NULL) {
2440					int ovh;
2441
2442					if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
2443						ovh = SCTP_MED_OVERHEAD;
2444					} else {
2445						ovh = SCTP_MED_V4_OVERHEAD;
2446					}
2447
2448					paddrp->spp_hbinterval = net->heart_beat_delay;
2449					paddrp->spp_pathmaxrxt = net->failure_threshold;
2450					paddrp->spp_pathmtu = net->mtu - ovh;
2451					/* get flags for HB */
2452					if (net->dest_state & SCTP_ADDR_NOHB) {
2453						paddrp->spp_flags |= SPP_HB_DISABLE;
2454					} else {
2455						paddrp->spp_flags |= SPP_HB_ENABLE;
2456					}
2457					/* get flags for PMTU */
2458					if (net->dest_state & SCTP_ADDR_NO_PMTUD) {
2459						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2460					} else {
2461						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2462					}
2463					if (net->dscp & 0x01) {
2464						paddrp->spp_dscp = net->dscp & 0xfc;
2465						paddrp->spp_flags |= SPP_DSCP;
2466					}
2467#ifdef INET6
2468					if ((net->ro._l_addr.sa.sa_family == AF_INET6) &&
2469					    (net->flowlabel & 0x80000000)) {
2470						paddrp->spp_ipv6_flowlabel = net->flowlabel & 0x000fffff;
2471						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2472					}
2473#endif
2474				} else {
2475					/*
2476					 * No destination so return default
2477					 * value
2478					 */
2479					paddrp->spp_pathmaxrxt = stcb->asoc.def_net_failure;
2480					paddrp->spp_pathmtu = sctp_get_frag_point(stcb, &stcb->asoc);
2481					if (stcb->asoc.default_dscp & 0x01) {
2482						paddrp->spp_dscp = stcb->asoc.default_dscp & 0xfc;
2483						paddrp->spp_flags |= SPP_DSCP;
2484					}
2485#ifdef INET6
2486					if (stcb->asoc.default_flowlabel & 0x80000000) {
2487						paddrp->spp_ipv6_flowlabel = stcb->asoc.default_flowlabel & 0x000fffff;
2488						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2489					}
2490#endif
2491					/* default settings should be these */
2492					if (sctp_stcb_is_feature_on(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT)) {
2493						paddrp->spp_flags |= SPP_HB_DISABLE;
2494					} else {
2495						paddrp->spp_flags |= SPP_HB_ENABLE;
2496					}
2497					if (sctp_stcb_is_feature_on(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD)) {
2498						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2499					} else {
2500						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2501					}
2502					paddrp->spp_hbinterval = stcb->asoc.heart_beat_delay;
2503				}
2504				paddrp->spp_assoc_id = sctp_get_associd(stcb);
2505				SCTP_TCB_UNLOCK(stcb);
2506			} else {
2507				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2508				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2509				    (paddrp->spp_assoc_id == SCTP_FUTURE_ASSOC)) {
2510					/* Use endpoint defaults */
2511					SCTP_INP_RLOCK(inp);
2512					paddrp->spp_pathmaxrxt = inp->sctp_ep.def_net_failure;
2513					paddrp->spp_hbinterval = TICKS_TO_MSEC(inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT]);
2514					paddrp->spp_assoc_id = SCTP_FUTURE_ASSOC;
2515					/* get inp's default */
2516					if (inp->sctp_ep.default_dscp & 0x01) {
2517						paddrp->spp_dscp = inp->sctp_ep.default_dscp & 0xfc;
2518						paddrp->spp_flags |= SPP_DSCP;
2519					}
2520#ifdef INET6
2521					if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
2522					    (inp->sctp_ep.default_flowlabel & 0x80000000)) {
2523						paddrp->spp_ipv6_flowlabel = inp->sctp_ep.default_flowlabel & 0x000fffff;
2524						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2525					}
2526#endif
2527					/* can't return this */
2528					paddrp->spp_pathmtu = 0;
2529
2530					if (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT)) {
2531						paddrp->spp_flags |= SPP_HB_ENABLE;
2532					} else {
2533						paddrp->spp_flags |= SPP_HB_DISABLE;
2534					}
2535					if (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD)) {
2536						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2537					} else {
2538						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2539					}
2540					SCTP_INP_RUNLOCK(inp);
2541				} else {
2542					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2543					error = EINVAL;
2544				}
2545			}
2546			if (error == 0) {
2547				*optsize = sizeof(struct sctp_paddrparams);
2548			}
2549			break;
2550		}
2551	case SCTP_GET_PEER_ADDR_INFO:
2552		{
2553			struct sctp_paddrinfo *paddri;
2554			struct sctp_nets *net;
2555			struct sockaddr *addr;
2556
2557#if defined(INET) && defined(INET6)
2558			struct sockaddr_in sin_store;
2559
2560#endif
2561
2562			SCTP_CHECK_AND_CAST(paddri, optval, struct sctp_paddrinfo, *optsize);
2563			SCTP_FIND_STCB(inp, stcb, paddri->spinfo_assoc_id);
2564
2565#if defined(INET) && defined(INET6)
2566			if (paddri->spinfo_address.ss_family == AF_INET6) {
2567				struct sockaddr_in6 *sin6;
2568
2569				sin6 = (struct sockaddr_in6 *)&paddri->spinfo_address;
2570				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
2571					in6_sin6_2_sin(&sin_store, sin6);
2572					addr = (struct sockaddr *)&sin_store;
2573				} else {
2574					addr = (struct sockaddr *)&paddri->spinfo_address;
2575				}
2576			} else {
2577				addr = (struct sockaddr *)&paddri->spinfo_address;
2578			}
2579#else
2580			addr = (struct sockaddr *)&paddri->spinfo_address;
2581#endif
2582			if (stcb != NULL) {
2583				net = sctp_findnet(stcb, addr);
2584			} else {
2585				/*
2586				 * We increment here since
2587				 * sctp_findassociation_ep_addr() wil do a
2588				 * decrement if it finds the stcb as long as
2589				 * the locked tcb (last argument) is NOT a
2590				 * TCB.. aka NULL.
2591				 */
2592				net = NULL;
2593				SCTP_INP_INCR_REF(inp);
2594				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
2595				if (stcb == NULL) {
2596					SCTP_INP_DECR_REF(inp);
2597				}
2598			}
2599
2600			if ((stcb != NULL) && (net != NULL)) {
2601				if (net->dest_state & SCTP_ADDR_UNCONFIRMED) {
2602					/* It's unconfirmed */
2603					paddri->spinfo_state = SCTP_UNCONFIRMED;
2604				} else if (net->dest_state & SCTP_ADDR_REACHABLE) {
2605					/* It's active */
2606					paddri->spinfo_state = SCTP_ACTIVE;
2607				} else {
2608					/* It's inactive */
2609					paddri->spinfo_state = SCTP_INACTIVE;
2610				}
2611				paddri->spinfo_cwnd = net->cwnd;
2612				paddri->spinfo_srtt = net->lastsa >> SCTP_RTT_SHIFT;
2613				paddri->spinfo_rto = net->RTO;
2614				paddri->spinfo_assoc_id = sctp_get_associd(stcb);
2615				paddri->spinfo_mtu = net->mtu;
2616				SCTP_TCB_UNLOCK(stcb);
2617				*optsize = sizeof(struct sctp_paddrinfo);
2618			} else {
2619				if (stcb != NULL) {
2620					SCTP_TCB_UNLOCK(stcb);
2621				}
2622				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
2623				error = ENOENT;
2624			}
2625			break;
2626		}
2627	case SCTP_PCB_STATUS:
2628		{
2629			struct sctp_pcbinfo *spcb;
2630
2631			SCTP_CHECK_AND_CAST(spcb, optval, struct sctp_pcbinfo, *optsize);
2632			sctp_fill_pcbinfo(spcb);
2633			*optsize = sizeof(struct sctp_pcbinfo);
2634			break;
2635		}
2636	case SCTP_STATUS:
2637		{
2638			struct sctp_nets *net;
2639			struct sctp_status *sstat;
2640
2641			SCTP_CHECK_AND_CAST(sstat, optval, struct sctp_status, *optsize);
2642			SCTP_FIND_STCB(inp, stcb, sstat->sstat_assoc_id);
2643
2644			if (stcb == NULL) {
2645				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2646				error = EINVAL;
2647				break;
2648			}
2649			/*
2650			 * I think passing the state is fine since
2651			 * sctp_constants.h will be available to the user
2652			 * land.
2653			 */
2654			sstat->sstat_state = stcb->asoc.state;
2655			sstat->sstat_assoc_id = sctp_get_associd(stcb);
2656			sstat->sstat_rwnd = stcb->asoc.peers_rwnd;
2657			sstat->sstat_unackdata = stcb->asoc.sent_queue_cnt;
2658			/*
2659			 * We can't include chunks that have been passed to
2660			 * the socket layer. Only things in queue.
2661			 */
2662			sstat->sstat_penddata = (stcb->asoc.cnt_on_reasm_queue +
2663			    stcb->asoc.cnt_on_all_streams);
2664
2665
2666			sstat->sstat_instrms = stcb->asoc.streamincnt;
2667			sstat->sstat_outstrms = stcb->asoc.streamoutcnt;
2668			sstat->sstat_fragmentation_point = sctp_get_frag_point(stcb, &stcb->asoc);
2669			memcpy(&sstat->sstat_primary.spinfo_address,
2670			    &stcb->asoc.primary_destination->ro._l_addr,
2671			    ((struct sockaddr *)(&stcb->asoc.primary_destination->ro._l_addr))->sa_len);
2672			net = stcb->asoc.primary_destination;
2673			((struct sockaddr_in *)&sstat->sstat_primary.spinfo_address)->sin_port = stcb->rport;
2674			/*
2675			 * Again the user can get info from sctp_constants.h
2676			 * for what the state of the network is.
2677			 */
2678			if (net->dest_state & SCTP_ADDR_UNCONFIRMED) {
2679				/* It's unconfirmed */
2680				sstat->sstat_primary.spinfo_state = SCTP_UNCONFIRMED;
2681			} else if (net->dest_state & SCTP_ADDR_REACHABLE) {
2682				/* It's active */
2683				sstat->sstat_primary.spinfo_state = SCTP_ACTIVE;
2684			} else {
2685				/* It's inactive */
2686				sstat->sstat_primary.spinfo_state = SCTP_INACTIVE;
2687			}
2688			sstat->sstat_primary.spinfo_cwnd = net->cwnd;
2689			sstat->sstat_primary.spinfo_srtt = net->lastsa >> SCTP_RTT_SHIFT;
2690			sstat->sstat_primary.spinfo_rto = net->RTO;
2691			sstat->sstat_primary.spinfo_mtu = net->mtu;
2692			sstat->sstat_primary.spinfo_assoc_id = sctp_get_associd(stcb);
2693			SCTP_TCB_UNLOCK(stcb);
2694			*optsize = sizeof(struct sctp_status);
2695			break;
2696		}
2697	case SCTP_RTOINFO:
2698		{
2699			struct sctp_rtoinfo *srto;
2700
2701			SCTP_CHECK_AND_CAST(srto, optval, struct sctp_rtoinfo, *optsize);
2702			SCTP_FIND_STCB(inp, stcb, srto->srto_assoc_id);
2703
2704			if (stcb) {
2705				srto->srto_initial = stcb->asoc.initial_rto;
2706				srto->srto_max = stcb->asoc.maxrto;
2707				srto->srto_min = stcb->asoc.minrto;
2708				SCTP_TCB_UNLOCK(stcb);
2709			} else {
2710				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2711				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2712				    (srto->srto_assoc_id == SCTP_FUTURE_ASSOC)) {
2713					SCTP_INP_RLOCK(inp);
2714					srto->srto_initial = inp->sctp_ep.initial_rto;
2715					srto->srto_max = inp->sctp_ep.sctp_maxrto;
2716					srto->srto_min = inp->sctp_ep.sctp_minrto;
2717					SCTP_INP_RUNLOCK(inp);
2718				} else {
2719					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2720					error = EINVAL;
2721				}
2722			}
2723			if (error == 0) {
2724				*optsize = sizeof(struct sctp_rtoinfo);
2725			}
2726			break;
2727		}
2728	case SCTP_TIMEOUTS:
2729		{
2730			struct sctp_timeouts *stimo;
2731
2732			SCTP_CHECK_AND_CAST(stimo, optval, struct sctp_timeouts, *optsize);
2733			SCTP_FIND_STCB(inp, stcb, stimo->stimo_assoc_id);
2734
2735			if (stcb) {
2736				stimo->stimo_init = stcb->asoc.timoinit;
2737				stimo->stimo_data = stcb->asoc.timodata;
2738				stimo->stimo_sack = stcb->asoc.timosack;
2739				stimo->stimo_shutdown = stcb->asoc.timoshutdown;
2740				stimo->stimo_heartbeat = stcb->asoc.timoheartbeat;
2741				stimo->stimo_cookie = stcb->asoc.timocookie;
2742				stimo->stimo_shutdownack = stcb->asoc.timoshutdownack;
2743				SCTP_TCB_UNLOCK(stcb);
2744				*optsize = sizeof(struct sctp_timeouts);
2745			} else {
2746				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2747				error = EINVAL;
2748			}
2749			break;
2750		}
2751	case SCTP_ASSOCINFO:
2752		{
2753			struct sctp_assocparams *sasoc;
2754
2755			SCTP_CHECK_AND_CAST(sasoc, optval, struct sctp_assocparams, *optsize);
2756			SCTP_FIND_STCB(inp, stcb, sasoc->sasoc_assoc_id);
2757
2758			if (stcb) {
2759				sasoc->sasoc_cookie_life = TICKS_TO_MSEC(stcb->asoc.cookie_life);
2760				sasoc->sasoc_asocmaxrxt = stcb->asoc.max_send_times;
2761				sasoc->sasoc_number_peer_destinations = stcb->asoc.numnets;
2762				sasoc->sasoc_peer_rwnd = stcb->asoc.peers_rwnd;
2763				sasoc->sasoc_local_rwnd = stcb->asoc.my_rwnd;
2764				SCTP_TCB_UNLOCK(stcb);
2765			} else {
2766				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2767				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2768				    (sasoc->sasoc_assoc_id == SCTP_FUTURE_ASSOC)) {
2769					SCTP_INP_RLOCK(inp);
2770					sasoc->sasoc_cookie_life = TICKS_TO_MSEC(inp->sctp_ep.def_cookie_life);
2771					sasoc->sasoc_asocmaxrxt = inp->sctp_ep.max_send_times;
2772					sasoc->sasoc_number_peer_destinations = 0;
2773					sasoc->sasoc_peer_rwnd = 0;
2774					sasoc->sasoc_local_rwnd = sbspace(&inp->sctp_socket->so_rcv);
2775					SCTP_INP_RUNLOCK(inp);
2776				} else {
2777					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2778					error = EINVAL;
2779				}
2780			}
2781			if (error == 0) {
2782				*optsize = sizeof(struct sctp_assocparams);
2783			}
2784			break;
2785		}
2786	case SCTP_DEFAULT_SEND_PARAM:
2787		{
2788			struct sctp_sndrcvinfo *s_info;
2789
2790			SCTP_CHECK_AND_CAST(s_info, optval, struct sctp_sndrcvinfo, *optsize);
2791			SCTP_FIND_STCB(inp, stcb, s_info->sinfo_assoc_id);
2792
2793			if (stcb) {
2794				memcpy(s_info, &stcb->asoc.def_send, sizeof(stcb->asoc.def_send));
2795				SCTP_TCB_UNLOCK(stcb);
2796			} else {
2797				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2798				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2799				    (s_info->sinfo_assoc_id == SCTP_FUTURE_ASSOC)) {
2800					SCTP_INP_RLOCK(inp);
2801					memcpy(s_info, &inp->def_send, sizeof(inp->def_send));
2802					SCTP_INP_RUNLOCK(inp);
2803				} else {
2804					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2805					error = EINVAL;
2806				}
2807			}
2808			if (error == 0) {
2809				*optsize = sizeof(struct sctp_sndrcvinfo);
2810			}
2811			break;
2812		}
2813	case SCTP_INITMSG:
2814		{
2815			struct sctp_initmsg *sinit;
2816
2817			SCTP_CHECK_AND_CAST(sinit, optval, struct sctp_initmsg, *optsize);
2818			SCTP_INP_RLOCK(inp);
2819			sinit->sinit_num_ostreams = inp->sctp_ep.pre_open_stream_count;
2820			sinit->sinit_max_instreams = inp->sctp_ep.max_open_streams_intome;
2821			sinit->sinit_max_attempts = inp->sctp_ep.max_init_times;
2822			sinit->sinit_max_init_timeo = inp->sctp_ep.initial_init_rto_max;
2823			SCTP_INP_RUNLOCK(inp);
2824			*optsize = sizeof(struct sctp_initmsg);
2825			break;
2826		}
2827	case SCTP_PRIMARY_ADDR:
2828		/* we allow a "get" operation on this */
2829		{
2830			struct sctp_setprim *ssp;
2831
2832			SCTP_CHECK_AND_CAST(ssp, optval, struct sctp_setprim, *optsize);
2833			SCTP_FIND_STCB(inp, stcb, ssp->ssp_assoc_id);
2834
2835			if (stcb) {
2836				union sctp_sockstore *addr;
2837
2838				addr = &stcb->asoc.primary_destination->ro._l_addr;
2839				switch (addr->sa.sa_family) {
2840#ifdef INET
2841				case AF_INET:
2842#ifdef INET6
2843					if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2844						in6_sin_2_v4mapsin6(&addr->sin,
2845						    (struct sockaddr_in6 *)&ssp->ssp_addr);
2846					} else {
2847						memcpy(&ssp->ssp_addr, &addr->sin, sizeof(struct sockaddr_in));
2848					}
2849#else
2850					memcpy(&ssp->ssp_addr, &addr->sin, sizeof(struct sockaddr_in));
2851#endif
2852					break;
2853#endif
2854#ifdef INET6
2855				case AF_INET6:
2856					memcpy(&ssp->ssp_addr, &addr->sin6, sizeof(struct sockaddr_in6));
2857					break;
2858#endif
2859				default:
2860					break;
2861				}
2862				SCTP_TCB_UNLOCK(stcb);
2863				*optsize = sizeof(struct sctp_setprim);
2864			} else {
2865				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2866				error = EINVAL;
2867			}
2868			break;
2869		}
2870	case SCTP_HMAC_IDENT:
2871		{
2872			struct sctp_hmacalgo *shmac;
2873			sctp_hmaclist_t *hmaclist;
2874			uint32_t size;
2875			int i;
2876
2877			SCTP_CHECK_AND_CAST(shmac, optval, struct sctp_hmacalgo, *optsize);
2878
2879			SCTP_INP_RLOCK(inp);
2880			hmaclist = inp->sctp_ep.local_hmacs;
2881			if (hmaclist == NULL) {
2882				/* no HMACs to return */
2883				*optsize = sizeof(*shmac);
2884				SCTP_INP_RUNLOCK(inp);
2885				break;
2886			}
2887			/* is there room for all of the hmac ids? */
2888			size = sizeof(*shmac) + (hmaclist->num_algo *
2889			    sizeof(shmac->shmac_idents[0]));
2890			if ((size_t)(*optsize) < size) {
2891				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2892				error = EINVAL;
2893				SCTP_INP_RUNLOCK(inp);
2894				break;
2895			}
2896			/* copy in the list */
2897			shmac->shmac_number_of_idents = hmaclist->num_algo;
2898			for (i = 0; i < hmaclist->num_algo; i++) {
2899				shmac->shmac_idents[i] = hmaclist->hmac[i];
2900			}
2901			SCTP_INP_RUNLOCK(inp);
2902			*optsize = size;
2903			break;
2904		}
2905	case SCTP_AUTH_ACTIVE_KEY:
2906		{
2907			struct sctp_authkeyid *scact;
2908
2909			SCTP_CHECK_AND_CAST(scact, optval, struct sctp_authkeyid, *optsize);
2910			SCTP_FIND_STCB(inp, stcb, scact->scact_assoc_id);
2911
2912			if (stcb) {
2913				/* get the active key on the assoc */
2914				scact->scact_keynumber = stcb->asoc.authinfo.active_keyid;
2915				SCTP_TCB_UNLOCK(stcb);
2916			} else {
2917				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2918				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2919				    (scact->scact_assoc_id == SCTP_FUTURE_ASSOC)) {
2920					/* get the endpoint active key */
2921					SCTP_INP_RLOCK(inp);
2922					scact->scact_keynumber = inp->sctp_ep.default_keyid;
2923					SCTP_INP_RUNLOCK(inp);
2924				} else {
2925					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2926					error = EINVAL;
2927				}
2928			}
2929			if (error == 0) {
2930				*optsize = sizeof(struct sctp_authkeyid);
2931			}
2932			break;
2933		}
2934	case SCTP_LOCAL_AUTH_CHUNKS:
2935		{
2936			struct sctp_authchunks *sac;
2937			sctp_auth_chklist_t *chklist = NULL;
2938			size_t size = 0;
2939
2940			SCTP_CHECK_AND_CAST(sac, optval, struct sctp_authchunks, *optsize);
2941			SCTP_FIND_STCB(inp, stcb, sac->gauth_assoc_id);
2942
2943			if (stcb) {
2944				/* get off the assoc */
2945				chklist = stcb->asoc.local_auth_chunks;
2946				/* is there enough space? */
2947				size = sctp_auth_get_chklist_size(chklist);
2948				if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2949					error = EINVAL;
2950					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2951				} else {
2952					/* copy in the chunks */
2953					(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
2954					sac->gauth_number_of_chunks = (uint32_t) size;
2955					*optsize = sizeof(struct sctp_authchunks) + size;
2956				}
2957				SCTP_TCB_UNLOCK(stcb);
2958			} else {
2959				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2960				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2961				    (sac->gauth_assoc_id == SCTP_FUTURE_ASSOC)) {
2962					/* get off the endpoint */
2963					SCTP_INP_RLOCK(inp);
2964					chklist = inp->sctp_ep.local_auth_chunks;
2965					/* is there enough space? */
2966					size = sctp_auth_get_chklist_size(chklist);
2967					if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2968						error = EINVAL;
2969						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2970					} else {
2971						/* copy in the chunks */
2972						(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
2973						sac->gauth_number_of_chunks = (uint32_t) size;
2974						*optsize = sizeof(struct sctp_authchunks) + size;
2975					}
2976					SCTP_INP_RUNLOCK(inp);
2977				} else {
2978					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2979					error = EINVAL;
2980				}
2981			}
2982			break;
2983		}
2984	case SCTP_PEER_AUTH_CHUNKS:
2985		{
2986			struct sctp_authchunks *sac;
2987			sctp_auth_chklist_t *chklist = NULL;
2988			size_t size = 0;
2989
2990			SCTP_CHECK_AND_CAST(sac, optval, struct sctp_authchunks, *optsize);
2991			SCTP_FIND_STCB(inp, stcb, sac->gauth_assoc_id);
2992
2993			if (stcb) {
2994				/* get off the assoc */
2995				chklist = stcb->asoc.peer_auth_chunks;
2996				/* is there enough space? */
2997				size = sctp_auth_get_chklist_size(chklist);
2998				if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2999					error = EINVAL;
3000					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3001				} else {
3002					/* copy in the chunks */
3003					(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
3004					sac->gauth_number_of_chunks = (uint32_t) size;
3005					*optsize = sizeof(struct sctp_authchunks) + size;
3006				}
3007				SCTP_TCB_UNLOCK(stcb);
3008			} else {
3009				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
3010				error = ENOENT;
3011			}
3012			break;
3013		}
3014	case SCTP_EVENT:
3015		{
3016			struct sctp_event *event;
3017			uint32_t event_type;
3018
3019			SCTP_CHECK_AND_CAST(event, optval, struct sctp_event, *optsize);
3020			SCTP_FIND_STCB(inp, stcb, event->se_assoc_id);
3021
3022			switch (event->se_type) {
3023			case SCTP_ASSOC_CHANGE:
3024				event_type = SCTP_PCB_FLAGS_RECVASSOCEVNT;
3025				break;
3026			case SCTP_PEER_ADDR_CHANGE:
3027				event_type = SCTP_PCB_FLAGS_RECVPADDREVNT;
3028				break;
3029			case SCTP_REMOTE_ERROR:
3030				event_type = SCTP_PCB_FLAGS_RECVPEERERR;
3031				break;
3032			case SCTP_SEND_FAILED:
3033				event_type = SCTP_PCB_FLAGS_RECVSENDFAILEVNT;
3034				break;
3035			case SCTP_SHUTDOWN_EVENT:
3036				event_type = SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT;
3037				break;
3038			case SCTP_ADAPTATION_INDICATION:
3039				event_type = SCTP_PCB_FLAGS_ADAPTATIONEVNT;
3040				break;
3041			case SCTP_PARTIAL_DELIVERY_EVENT:
3042				event_type = SCTP_PCB_FLAGS_PDAPIEVNT;
3043				break;
3044			case SCTP_AUTHENTICATION_EVENT:
3045				event_type = SCTP_PCB_FLAGS_AUTHEVNT;
3046				break;
3047			case SCTP_STREAM_RESET_EVENT:
3048				event_type = SCTP_PCB_FLAGS_STREAM_RESETEVNT;
3049				break;
3050			case SCTP_SENDER_DRY_EVENT:
3051				event_type = SCTP_PCB_FLAGS_DRYEVNT;
3052				break;
3053			case SCTP_NOTIFICATIONS_STOPPED_EVENT:
3054				event_type = 0;
3055				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
3056				error = ENOTSUP;
3057				break;
3058			case SCTP_ASSOC_RESET_EVENT:
3059				event_type = SCTP_PCB_FLAGS_ASSOC_RESETEVNT;
3060				break;
3061			case SCTP_STREAM_CHANGE_EVENT:
3062				event_type = SCTP_PCB_FLAGS_STREAM_CHANGEEVNT;
3063				break;
3064			case SCTP_SEND_FAILED_EVENT:
3065				event_type = SCTP_PCB_FLAGS_RECVNSENDFAILEVNT;
3066				break;
3067			default:
3068				event_type = 0;
3069				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3070				error = EINVAL;
3071				break;
3072			}
3073			if (event_type > 0) {
3074				if (stcb) {
3075					event->se_on = sctp_stcb_is_feature_on(inp, stcb, event_type);
3076					SCTP_TCB_UNLOCK(stcb);
3077				} else {
3078					if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3079					    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3080					    (event->se_assoc_id == SCTP_FUTURE_ASSOC)) {
3081						SCTP_INP_RLOCK(inp);
3082						event->se_on = sctp_is_feature_on(inp, event_type);
3083						SCTP_INP_RUNLOCK(inp);
3084					} else {
3085						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3086						error = EINVAL;
3087					}
3088				}
3089			}
3090			if (error == 0) {
3091				*optsize = sizeof(struct sctp_event);
3092			}
3093			break;
3094		}
3095	case SCTP_RECVRCVINFO:
3096		{
3097			int onoff;
3098
3099			if (*optsize < sizeof(int)) {
3100				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3101				error = EINVAL;
3102			} else {
3103				SCTP_INP_RLOCK(inp);
3104				onoff = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
3105				SCTP_INP_RUNLOCK(inp);
3106			}
3107			if (error == 0) {
3108				/* return the option value */
3109				*(int *)optval = onoff;
3110				*optsize = sizeof(int);
3111			}
3112			break;
3113		}
3114	case SCTP_RECVNXTINFO:
3115		{
3116			int onoff;
3117
3118			if (*optsize < sizeof(int)) {
3119				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3120				error = EINVAL;
3121			} else {
3122				SCTP_INP_RLOCK(inp);
3123				onoff = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
3124				SCTP_INP_RUNLOCK(inp);
3125			}
3126			if (error == 0) {
3127				/* return the option value */
3128				*(int *)optval = onoff;
3129				*optsize = sizeof(int);
3130			}
3131			break;
3132		}
3133	case SCTP_DEFAULT_SNDINFO:
3134		{
3135			struct sctp_sndinfo *info;
3136
3137			SCTP_CHECK_AND_CAST(info, optval, struct sctp_sndinfo, *optsize);
3138			SCTP_FIND_STCB(inp, stcb, info->snd_assoc_id);
3139
3140			if (stcb) {
3141				info->snd_sid = stcb->asoc.def_send.sinfo_stream;
3142				info->snd_flags = stcb->asoc.def_send.sinfo_flags;
3143				info->snd_flags &= 0xfff0;
3144				info->snd_ppid = stcb->asoc.def_send.sinfo_ppid;
3145				info->snd_context = stcb->asoc.def_send.sinfo_context;
3146				SCTP_TCB_UNLOCK(stcb);
3147			} else {
3148				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3149				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3150				    (info->snd_assoc_id == SCTP_FUTURE_ASSOC)) {
3151					SCTP_INP_RLOCK(inp);
3152					info->snd_sid = inp->def_send.sinfo_stream;
3153					info->snd_flags = inp->def_send.sinfo_flags;
3154					info->snd_flags &= 0xfff0;
3155					info->snd_ppid = inp->def_send.sinfo_ppid;
3156					info->snd_context = inp->def_send.sinfo_context;
3157					SCTP_INP_RUNLOCK(inp);
3158				} else {
3159					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3160					error = EINVAL;
3161				}
3162			}
3163			if (error == 0) {
3164				*optsize = sizeof(struct sctp_sndinfo);
3165			}
3166			break;
3167		}
3168	case SCTP_DEFAULT_PRINFO:
3169		{
3170			struct sctp_default_prinfo *info;
3171
3172			SCTP_CHECK_AND_CAST(info, optval, struct sctp_default_prinfo, *optsize);
3173			SCTP_FIND_STCB(inp, stcb, info->pr_assoc_id);
3174
3175			if (stcb) {
3176				info->pr_policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
3177				info->pr_value = stcb->asoc.def_send.sinfo_timetolive;
3178				SCTP_TCB_UNLOCK(stcb);
3179			} else {
3180				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3181				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3182				    (info->pr_assoc_id == SCTP_FUTURE_ASSOC)) {
3183					SCTP_INP_RLOCK(inp);
3184					info->pr_policy = PR_SCTP_POLICY(inp->def_send.sinfo_flags);
3185					info->pr_value = inp->def_send.sinfo_timetolive;
3186					SCTP_INP_RUNLOCK(inp);
3187				} else {
3188					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3189					error = EINVAL;
3190				}
3191			}
3192			if (error == 0) {
3193				*optsize = sizeof(struct sctp_default_prinfo);
3194			}
3195			break;
3196		}
3197	case SCTP_PEER_ADDR_THLDS:
3198		{
3199			struct sctp_paddrthlds *thlds;
3200			struct sctp_nets *net;
3201			struct sockaddr *addr;
3202
3203#if defined(INET) && defined(INET6)
3204			struct sockaddr_in sin_store;
3205
3206#endif
3207
3208			SCTP_CHECK_AND_CAST(thlds, optval, struct sctp_paddrthlds, *optsize);
3209			SCTP_FIND_STCB(inp, stcb, thlds->spt_assoc_id);
3210
3211#if defined(INET) && defined(INET6)
3212			if (thlds->spt_address.ss_family == AF_INET6) {
3213				struct sockaddr_in6 *sin6;
3214
3215				sin6 = (struct sockaddr_in6 *)&thlds->spt_address;
3216				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
3217					in6_sin6_2_sin(&sin_store, sin6);
3218					addr = (struct sockaddr *)&sin_store;
3219				} else {
3220					addr = (struct sockaddr *)&thlds->spt_address;
3221				}
3222			} else {
3223				addr = (struct sockaddr *)&thlds->spt_address;
3224			}
3225#else
3226			addr = (struct sockaddr *)&thlds->spt_address;
3227#endif
3228			if (stcb != NULL) {
3229				net = sctp_findnet(stcb, addr);
3230			} else {
3231				/*
3232				 * We increment here since
3233				 * sctp_findassociation_ep_addr() wil do a
3234				 * decrement if it finds the stcb as long as
3235				 * the locked tcb (last argument) is NOT a
3236				 * TCB.. aka NULL.
3237				 */
3238				net = NULL;
3239				SCTP_INP_INCR_REF(inp);
3240				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
3241				if (stcb == NULL) {
3242					SCTP_INP_DECR_REF(inp);
3243				}
3244			}
3245			if ((stcb != NULL) && (net == NULL)) {
3246#ifdef INET
3247				if (addr->sa_family == AF_INET) {
3248					struct sockaddr_in *sin;
3249
3250					sin = (struct sockaddr_in *)addr;
3251					if (sin->sin_addr.s_addr != INADDR_ANY) {
3252						error = EINVAL;
3253						SCTP_TCB_UNLOCK(stcb);
3254						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3255						break;
3256					}
3257				} else
3258#endif
3259#ifdef INET6
3260				if (addr->sa_family == AF_INET6) {
3261					struct sockaddr_in6 *sin6;
3262
3263					sin6 = (struct sockaddr_in6 *)addr;
3264					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
3265						error = EINVAL;
3266						SCTP_TCB_UNLOCK(stcb);
3267						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3268						break;
3269					}
3270				} else
3271#endif
3272				{
3273					error = EAFNOSUPPORT;
3274					SCTP_TCB_UNLOCK(stcb);
3275					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3276					break;
3277				}
3278			}
3279			if (stcb != NULL) {
3280				if (net != NULL) {
3281					thlds->spt_pathmaxrxt = net->failure_threshold;
3282					thlds->spt_pathpfthld = net->pf_threshold;
3283				} else {
3284					thlds->spt_pathmaxrxt = stcb->asoc.def_net_failure;
3285					thlds->spt_pathpfthld = stcb->asoc.def_net_pf_threshold;
3286				}
3287				thlds->spt_assoc_id = sctp_get_associd(stcb);
3288				SCTP_TCB_UNLOCK(stcb);
3289			} else {
3290				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3291				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3292				    (thlds->spt_assoc_id == SCTP_FUTURE_ASSOC)) {
3293					/* Use endpoint defaults */
3294					SCTP_INP_RLOCK(inp);
3295					thlds->spt_pathmaxrxt = inp->sctp_ep.def_net_failure;
3296					thlds->spt_pathpfthld = inp->sctp_ep.def_net_pf_threshold;
3297					SCTP_INP_RUNLOCK(inp);
3298				} else {
3299					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3300					error = EINVAL;
3301				}
3302			}
3303			if (error == 0) {
3304				*optsize = sizeof(struct sctp_paddrthlds);
3305			}
3306			break;
3307		}
3308	case SCTP_REMOTE_UDP_ENCAPS_PORT:
3309		{
3310			struct sctp_udpencaps *encaps;
3311			struct sctp_nets *net;
3312			struct sockaddr *addr;
3313
3314#if defined(INET) && defined(INET6)
3315			struct sockaddr_in sin_store;
3316
3317#endif
3318
3319			SCTP_CHECK_AND_CAST(encaps, optval, struct sctp_udpencaps, *optsize);
3320			SCTP_FIND_STCB(inp, stcb, encaps->sue_assoc_id);
3321
3322#if defined(INET) && defined(INET6)
3323			if (encaps->sue_address.ss_family == AF_INET6) {
3324				struct sockaddr_in6 *sin6;
3325
3326				sin6 = (struct sockaddr_in6 *)&encaps->sue_address;
3327				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
3328					in6_sin6_2_sin(&sin_store, sin6);
3329					addr = (struct sockaddr *)&sin_store;
3330				} else {
3331					addr = (struct sockaddr *)&encaps->sue_address;
3332				}
3333			} else {
3334				addr = (struct sockaddr *)&encaps->sue_address;
3335			}
3336#else
3337			addr = (struct sockaddr *)&encaps->sue_address;
3338#endif
3339			if (stcb) {
3340				net = sctp_findnet(stcb, addr);
3341			} else {
3342				/*
3343				 * We increment here since
3344				 * sctp_findassociation_ep_addr() wil do a
3345				 * decrement if it finds the stcb as long as
3346				 * the locked tcb (last argument) is NOT a
3347				 * TCB.. aka NULL.
3348				 */
3349				net = NULL;
3350				SCTP_INP_INCR_REF(inp);
3351				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
3352				if (stcb == NULL) {
3353					SCTP_INP_DECR_REF(inp);
3354				}
3355			}
3356			if ((stcb != NULL) && (net == NULL)) {
3357#ifdef INET
3358				if (addr->sa_family == AF_INET) {
3359					struct sockaddr_in *sin;
3360
3361					sin = (struct sockaddr_in *)addr;
3362					if (sin->sin_addr.s_addr != INADDR_ANY) {
3363						error = EINVAL;
3364						SCTP_TCB_UNLOCK(stcb);
3365						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3366						break;
3367					}
3368				} else
3369#endif
3370#ifdef INET6
3371				if (addr->sa_family == AF_INET6) {
3372					struct sockaddr_in6 *sin6;
3373
3374					sin6 = (struct sockaddr_in6 *)addr;
3375					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
3376						error = EINVAL;
3377						SCTP_TCB_UNLOCK(stcb);
3378						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3379						break;
3380					}
3381				} else
3382#endif
3383				{
3384					error = EAFNOSUPPORT;
3385					SCTP_TCB_UNLOCK(stcb);
3386					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3387					break;
3388				}
3389			}
3390			if (stcb != NULL) {
3391				if (net) {
3392					encaps->sue_port = net->port;
3393				} else {
3394					encaps->sue_port = stcb->asoc.port;
3395				}
3396				SCTP_TCB_UNLOCK(stcb);
3397			} else {
3398				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3399				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3400				    (encaps->sue_assoc_id == SCTP_FUTURE_ASSOC)) {
3401					SCTP_INP_RLOCK(inp);
3402					encaps->sue_port = inp->sctp_ep.port;
3403					SCTP_INP_RUNLOCK(inp);
3404				} else {
3405					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3406					error = EINVAL;
3407				}
3408			}
3409			if (error == 0) {
3410				*optsize = sizeof(struct sctp_udpencaps);
3411			}
3412			break;
3413		}
3414	case SCTP_ECN_SUPPORTED:
3415		{
3416			struct sctp_assoc_value *av;
3417
3418			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3419			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3420
3421			if (stcb) {
3422				av->assoc_value = stcb->asoc.ecn_supported;
3423				SCTP_TCB_UNLOCK(stcb);
3424			} else {
3425				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3426				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3427				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3428					SCTP_INP_RLOCK(inp);
3429					av->assoc_value = inp->ecn_supported;
3430					SCTP_INP_RUNLOCK(inp);
3431				} else {
3432					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3433					error = EINVAL;
3434				}
3435			}
3436			if (error == 0) {
3437				*optsize = sizeof(struct sctp_assoc_value);
3438			}
3439			break;
3440		}
3441	case SCTP_PR_SUPPORTED:
3442		{
3443			struct sctp_assoc_value *av;
3444
3445			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3446			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3447
3448			if (stcb) {
3449				av->assoc_value = stcb->asoc.prsctp_supported;
3450				SCTP_TCB_UNLOCK(stcb);
3451			} else {
3452				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3453				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3454				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3455					SCTP_INP_RLOCK(inp);
3456					av->assoc_value = inp->prsctp_supported;
3457					SCTP_INP_RUNLOCK(inp);
3458				} else {
3459					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3460					error = EINVAL;
3461				}
3462			}
3463			if (error == 0) {
3464				*optsize = sizeof(struct sctp_assoc_value);
3465			}
3466			break;
3467		}
3468	case SCTP_AUTH_SUPPORTED:
3469		{
3470			struct sctp_assoc_value *av;
3471
3472			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3473			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3474
3475			if (stcb) {
3476				av->assoc_value = stcb->asoc.auth_supported;
3477				SCTP_TCB_UNLOCK(stcb);
3478			} else {
3479				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3480				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3481				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3482					SCTP_INP_RLOCK(inp);
3483					av->assoc_value = inp->auth_supported;
3484					SCTP_INP_RUNLOCK(inp);
3485				} else {
3486					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3487					error = EINVAL;
3488				}
3489			}
3490			if (error == 0) {
3491				*optsize = sizeof(struct sctp_assoc_value);
3492			}
3493			break;
3494		}
3495	case SCTP_ASCONF_SUPPORTED:
3496		{
3497			struct sctp_assoc_value *av;
3498
3499			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3500			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3501
3502			if (stcb) {
3503				av->assoc_value = stcb->asoc.asconf_supported;
3504				SCTP_TCB_UNLOCK(stcb);
3505			} else {
3506				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3507				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3508				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3509					SCTP_INP_RLOCK(inp);
3510					av->assoc_value = inp->asconf_supported;
3511					SCTP_INP_RUNLOCK(inp);
3512				} else {
3513					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3514					error = EINVAL;
3515				}
3516			}
3517			if (error == 0) {
3518				*optsize = sizeof(struct sctp_assoc_value);
3519			}
3520			break;
3521		}
3522	case SCTP_RECONFIG_SUPPORTED:
3523		{
3524			struct sctp_assoc_value *av;
3525
3526			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3527			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3528
3529			if (stcb) {
3530				av->assoc_value = stcb->asoc.reconfig_supported;
3531				SCTP_TCB_UNLOCK(stcb);
3532			} else {
3533				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3534				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3535				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3536					SCTP_INP_RLOCK(inp);
3537					av->assoc_value = inp->reconfig_supported;
3538					SCTP_INP_RUNLOCK(inp);
3539				} else {
3540					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3541					error = EINVAL;
3542				}
3543			}
3544			if (error == 0) {
3545				*optsize = sizeof(struct sctp_assoc_value);
3546			}
3547			break;
3548		}
3549	case SCTP_NRSACK_SUPPORTED:
3550		{
3551			struct sctp_assoc_value *av;
3552
3553			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3554			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3555
3556			if (stcb) {
3557				av->assoc_value = stcb->asoc.nrsack_supported;
3558				SCTP_TCB_UNLOCK(stcb);
3559			} else {
3560				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3561				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3562				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3563					SCTP_INP_RLOCK(inp);
3564					av->assoc_value = inp->nrsack_supported;
3565					SCTP_INP_RUNLOCK(inp);
3566				} else {
3567					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3568					error = EINVAL;
3569				}
3570			}
3571			if (error == 0) {
3572				*optsize = sizeof(struct sctp_assoc_value);
3573			}
3574			break;
3575		}
3576	case SCTP_PKTDROP_SUPPORTED:
3577		{
3578			struct sctp_assoc_value *av;
3579
3580			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3581			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3582
3583			if (stcb) {
3584				av->assoc_value = stcb->asoc.pktdrop_supported;
3585				SCTP_TCB_UNLOCK(stcb);
3586			} else {
3587				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3588				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3589				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3590					SCTP_INP_RLOCK(inp);
3591					av->assoc_value = inp->pktdrop_supported;
3592					SCTP_INP_RUNLOCK(inp);
3593				} else {
3594					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3595					error = EINVAL;
3596				}
3597			}
3598			if (error == 0) {
3599				*optsize = sizeof(struct sctp_assoc_value);
3600			}
3601			break;
3602		}
3603	case SCTP_ENABLE_STREAM_RESET:
3604		{
3605			struct sctp_assoc_value *av;
3606
3607			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3608			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3609
3610			if (stcb) {
3611				av->assoc_value = (uint32_t) stcb->asoc.local_strreset_support;
3612				SCTP_TCB_UNLOCK(stcb);
3613			} else {
3614				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3615				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3616				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3617					SCTP_INP_RLOCK(inp);
3618					av->assoc_value = (uint32_t) inp->local_strreset_support;
3619					SCTP_INP_RUNLOCK(inp);
3620				} else {
3621					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3622					error = EINVAL;
3623				}
3624			}
3625			if (error == 0) {
3626				*optsize = sizeof(struct sctp_assoc_value);
3627			}
3628			break;
3629		}
3630	case SCTP_PR_STREAM_STATUS:
3631		{
3632			struct sctp_prstatus *sprstat;
3633			uint16_t sid;
3634			uint16_t policy;
3635
3636			SCTP_CHECK_AND_CAST(sprstat, optval, struct sctp_prstatus, *optsize);
3637			SCTP_FIND_STCB(inp, stcb, sprstat->sprstat_assoc_id);
3638
3639			sid = sprstat->sprstat_sid;
3640			policy = sprstat->sprstat_policy;
3641#if defined(SCTP_DETAILED_STR_STATS)
3642			if ((stcb != NULL) &&
3643			    (sid < stcb->asoc.streamoutcnt) &&
3644			    (policy != SCTP_PR_SCTP_NONE) &&
3645			    ((policy <= SCTP_PR_SCTP_MAX) ||
3646			    (policy == SCTP_PR_SCTP_ALL))) {
3647				if (policy == SCTP_PR_SCTP_ALL) {
3648					sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[0];
3649					sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[0];
3650				} else {
3651					sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[policy];
3652					sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[policy];
3653				}
3654#else
3655			if ((stcb != NULL) &&
3656			    (sid < stcb->asoc.streamoutcnt) &&
3657			    (policy == SCTP_PR_SCTP_ALL)) {
3658				sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[0];
3659				sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[0];
3660#endif
3661				SCTP_TCB_UNLOCK(stcb);
3662				*optsize = sizeof(struct sctp_prstatus);
3663			} else {
3664				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3665				error = EINVAL;
3666			}
3667			break;
3668		}
3669	case SCTP_PR_ASSOC_STATUS:
3670		{
3671			struct sctp_prstatus *sprstat;
3672			uint16_t policy;
3673
3674			SCTP_CHECK_AND_CAST(sprstat, optval, struct sctp_prstatus, *optsize);
3675			SCTP_FIND_STCB(inp, stcb, sprstat->sprstat_assoc_id);
3676
3677			policy = sprstat->sprstat_policy;
3678			if ((stcb != NULL) &&
3679			    (policy != SCTP_PR_SCTP_NONE) &&
3680			    ((policy <= SCTP_PR_SCTP_MAX) ||
3681			    (policy == SCTP_PR_SCTP_ALL))) {
3682				if (policy == SCTP_PR_SCTP_ALL) {
3683					sprstat->sprstat_abandoned_unsent = stcb->asoc.abandoned_unsent[0];
3684					sprstat->sprstat_abandoned_sent = stcb->asoc.abandoned_sent[0];
3685				} else {
3686					sprstat->sprstat_abandoned_unsent = stcb->asoc.abandoned_unsent[policy];
3687					sprstat->sprstat_abandoned_sent = stcb->asoc.abandoned_sent[policy];
3688				}
3689				SCTP_TCB_UNLOCK(stcb);
3690				*optsize = sizeof(struct sctp_prstatus);
3691			} else {
3692				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3693				error = EINVAL;
3694			}
3695			break;
3696		}
3697	default:
3698		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
3699		error = ENOPROTOOPT;
3700		break;
3701	}			/* end switch (sopt->sopt_name) */
3702	if (error) {
3703		*optsize = 0;
3704	}
3705	return (error);
3706}
3707
3708static int
3709sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
3710    void *p)
3711{
3712	int error, set_opt;
3713	uint32_t *mopt;
3714	struct sctp_tcb *stcb = NULL;
3715	struct sctp_inpcb *inp = NULL;
3716	uint32_t vrf_id;
3717
3718	if (optval == NULL) {
3719		SCTP_PRINTF("optval is NULL\n");
3720		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3721		return (EINVAL);
3722	}
3723	inp = (struct sctp_inpcb *)so->so_pcb;
3724	if (inp == NULL) {
3725		SCTP_PRINTF("inp is NULL?\n");
3726		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3727		return (EINVAL);
3728	}
3729	vrf_id = inp->def_vrf_id;
3730
3731	error = 0;
3732	switch (optname) {
3733	case SCTP_NODELAY:
3734	case SCTP_AUTOCLOSE:
3735	case SCTP_AUTO_ASCONF:
3736	case SCTP_EXPLICIT_EOR:
3737	case SCTP_DISABLE_FRAGMENTS:
3738	case SCTP_USE_EXT_RCVINFO:
3739	case SCTP_I_WANT_MAPPED_V4_ADDR:
3740		/* copy in the option value */
3741		SCTP_CHECK_AND_CAST(mopt, optval, uint32_t, optsize);
3742		set_opt = 0;
3743		if (error)
3744			break;
3745		switch (optname) {
3746		case SCTP_DISABLE_FRAGMENTS:
3747			set_opt = SCTP_PCB_FLAGS_NO_FRAGMENT;
3748			break;
3749		case SCTP_AUTO_ASCONF:
3750			/*
3751			 * NOTE: we don't really support this flag
3752			 */
3753			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3754				/* only valid for bound all sockets */
3755				if ((SCTP_BASE_SYSCTL(sctp_auto_asconf) == 0) &&
3756				    (*mopt != 0)) {
3757					/* forbidden by admin */
3758					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EPERM);
3759					return (EPERM);
3760				}
3761				set_opt = SCTP_PCB_FLAGS_AUTO_ASCONF;
3762			} else {
3763				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3764				return (EINVAL);
3765			}
3766			break;
3767		case SCTP_EXPLICIT_EOR:
3768			set_opt = SCTP_PCB_FLAGS_EXPLICIT_EOR;
3769			break;
3770		case SCTP_USE_EXT_RCVINFO:
3771			set_opt = SCTP_PCB_FLAGS_EXT_RCVINFO;
3772			break;
3773		case SCTP_I_WANT_MAPPED_V4_ADDR:
3774			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
3775				set_opt = SCTP_PCB_FLAGS_NEEDS_MAPPED_V4;
3776			} else {
3777				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3778				return (EINVAL);
3779			}
3780			break;
3781		case SCTP_NODELAY:
3782			set_opt = SCTP_PCB_FLAGS_NODELAY;
3783			break;
3784		case SCTP_AUTOCLOSE:
3785			if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3786			    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
3787				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3788				return (EINVAL);
3789			}
3790			set_opt = SCTP_PCB_FLAGS_AUTOCLOSE;
3791			/*
3792			 * The value is in ticks. Note this does not effect
3793			 * old associations, only new ones.
3794			 */
3795			inp->sctp_ep.auto_close_time = SEC_TO_TICKS(*mopt);
3796			break;
3797		}
3798		SCTP_INP_WLOCK(inp);
3799		if (*mopt != 0) {
3800			sctp_feature_on(inp, set_opt);
3801		} else {
3802			sctp_feature_off(inp, set_opt);
3803		}
3804		SCTP_INP_WUNLOCK(inp);
3805		break;
3806	case SCTP_REUSE_PORT:
3807		{
3808			SCTP_CHECK_AND_CAST(mopt, optval, uint32_t, optsize);
3809			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) == 0) {
3810				/* Can't set it after we are bound */
3811				error = EINVAL;
3812				break;
3813			}
3814			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE)) {
3815				/* Can't do this for a 1-m socket */
3816				error = EINVAL;
3817				break;
3818			}
3819			if (optval)
3820				sctp_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE);
3821			else
3822				sctp_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE);
3823			break;
3824		}
3825	case SCTP_PARTIAL_DELIVERY_POINT:
3826		{
3827			uint32_t *value;
3828
3829			SCTP_CHECK_AND_CAST(value, optval, uint32_t, optsize);
3830			if (*value > SCTP_SB_LIMIT_RCV(so)) {
3831				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3832				error = EINVAL;
3833				break;
3834			}
3835			inp->partial_delivery_point = *value;
3836			break;
3837		}
3838	case SCTP_FRAGMENT_INTERLEAVE:
3839		/* not yet until we re-write sctp_recvmsg() */
3840		{
3841			uint32_t *level;
3842
3843			SCTP_CHECK_AND_CAST(level, optval, uint32_t, optsize);
3844			if (*level == SCTP_FRAG_LEVEL_2) {
3845				sctp_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3846				sctp_feature_on(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3847			} else if (*level == SCTP_FRAG_LEVEL_1) {
3848				sctp_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3849				sctp_feature_off(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3850			} else if (*level == SCTP_FRAG_LEVEL_0) {
3851				sctp_feature_off(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3852				sctp_feature_off(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3853
3854			} else {
3855				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3856				error = EINVAL;
3857			}
3858			break;
3859		}
3860	case SCTP_CMT_ON_OFF:
3861		if (SCTP_BASE_SYSCTL(sctp_cmt_on_off)) {
3862			struct sctp_assoc_value *av;
3863
3864			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3865			if (av->assoc_value > SCTP_CMT_MAX) {
3866				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3867				error = EINVAL;
3868				break;
3869			}
3870			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3871			if (stcb) {
3872				stcb->asoc.sctp_cmt_on_off = av->assoc_value;
3873				SCTP_TCB_UNLOCK(stcb);
3874			} else {
3875				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3876				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3877				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
3878				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3879					SCTP_INP_WLOCK(inp);
3880					inp->sctp_cmt_on_off = av->assoc_value;
3881					SCTP_INP_WUNLOCK(inp);
3882				}
3883				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
3884				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3885					SCTP_INP_RLOCK(inp);
3886					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3887						SCTP_TCB_LOCK(stcb);
3888						stcb->asoc.sctp_cmt_on_off = av->assoc_value;
3889						SCTP_TCB_UNLOCK(stcb);
3890					}
3891					SCTP_INP_RUNLOCK(inp);
3892				}
3893			}
3894		} else {
3895			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
3896			error = ENOPROTOOPT;
3897		}
3898		break;
3899	case SCTP_PLUGGABLE_CC:
3900		{
3901			struct sctp_assoc_value *av;
3902			struct sctp_nets *net;
3903
3904			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3905			if ((av->assoc_value != SCTP_CC_RFC2581) &&
3906			    (av->assoc_value != SCTP_CC_HSTCP) &&
3907			    (av->assoc_value != SCTP_CC_HTCP) &&
3908			    (av->assoc_value != SCTP_CC_RTCC)) {
3909				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3910				error = EINVAL;
3911				break;
3912			}
3913			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3914			if (stcb) {
3915				stcb->asoc.cc_functions = sctp_cc_functions[av->assoc_value];
3916				stcb->asoc.congestion_control_module = av->assoc_value;
3917				if (stcb->asoc.cc_functions.sctp_set_initial_cc_param != NULL) {
3918					TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
3919						stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
3920					}
3921				}
3922				SCTP_TCB_UNLOCK(stcb);
3923			} else {
3924				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3925				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3926				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
3927				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3928					SCTP_INP_WLOCK(inp);
3929					inp->sctp_ep.sctp_default_cc_module = av->assoc_value;
3930					SCTP_INP_WUNLOCK(inp);
3931				}
3932				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
3933				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3934					SCTP_INP_RLOCK(inp);
3935					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3936						SCTP_TCB_LOCK(stcb);
3937						stcb->asoc.cc_functions = sctp_cc_functions[av->assoc_value];
3938						stcb->asoc.congestion_control_module = av->assoc_value;
3939						if (stcb->asoc.cc_functions.sctp_set_initial_cc_param != NULL) {
3940							TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
3941								stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
3942							}
3943						}
3944						SCTP_TCB_UNLOCK(stcb);
3945					}
3946					SCTP_INP_RUNLOCK(inp);
3947				}
3948			}
3949			break;
3950		}
3951	case SCTP_CC_OPTION:
3952		{
3953			struct sctp_cc_option *cc_opt;
3954
3955			SCTP_CHECK_AND_CAST(cc_opt, optval, struct sctp_cc_option, optsize);
3956			SCTP_FIND_STCB(inp, stcb, cc_opt->aid_value.assoc_id);
3957			if (stcb == NULL) {
3958				if (cc_opt->aid_value.assoc_id == SCTP_CURRENT_ASSOC) {
3959					SCTP_INP_RLOCK(inp);
3960					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3961						SCTP_TCB_LOCK(stcb);
3962						if (stcb->asoc.cc_functions.sctp_cwnd_socket_option) {
3963							(*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 1, cc_opt);
3964						}
3965						SCTP_TCB_UNLOCK(stcb);
3966					}
3967					SCTP_INP_RUNLOCK(inp);
3968				} else {
3969					error = EINVAL;
3970				}
3971			} else {
3972				if (stcb->asoc.cc_functions.sctp_cwnd_socket_option == NULL) {
3973					error = ENOTSUP;
3974				} else {
3975					error = (*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 1,
3976					    cc_opt);
3977				}
3978				SCTP_TCB_UNLOCK(stcb);
3979			}
3980			break;
3981		}
3982	case SCTP_PLUGGABLE_SS:
3983		{
3984			struct sctp_assoc_value *av;
3985
3986			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3987			if ((av->assoc_value != SCTP_SS_DEFAULT) &&
3988			    (av->assoc_value != SCTP_SS_ROUND_ROBIN) &&
3989			    (av->assoc_value != SCTP_SS_ROUND_ROBIN_PACKET) &&
3990			    (av->assoc_value != SCTP_SS_PRIORITY) &&
3991			    (av->assoc_value != SCTP_SS_FAIR_BANDWITH) &&
3992			    (av->assoc_value != SCTP_SS_FIRST_COME)) {
3993				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3994				error = EINVAL;
3995				break;
3996			}
3997			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3998			if (stcb) {
3999				stcb->asoc.ss_functions.sctp_ss_clear(stcb, &stcb->asoc, 1, 1);
4000				stcb->asoc.ss_functions = sctp_ss_functions[av->assoc_value];
4001				stcb->asoc.stream_scheduling_module = av->assoc_value;
4002				stcb->asoc.ss_functions.sctp_ss_init(stcb, &stcb->asoc, 1);
4003				SCTP_TCB_UNLOCK(stcb);
4004			} else {
4005				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4006				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4007				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4008				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4009					SCTP_INP_WLOCK(inp);
4010					inp->sctp_ep.sctp_default_ss_module = av->assoc_value;
4011					SCTP_INP_WUNLOCK(inp);
4012				}
4013				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4014				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4015					SCTP_INP_RLOCK(inp);
4016					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4017						SCTP_TCB_LOCK(stcb);
4018						stcb->asoc.ss_functions.sctp_ss_clear(stcb, &stcb->asoc, 1, 1);
4019						stcb->asoc.ss_functions = sctp_ss_functions[av->assoc_value];
4020						stcb->asoc.stream_scheduling_module = av->assoc_value;
4021						stcb->asoc.ss_functions.sctp_ss_init(stcb, &stcb->asoc, 1);
4022						SCTP_TCB_UNLOCK(stcb);
4023					}
4024					SCTP_INP_RUNLOCK(inp);
4025				}
4026			}
4027			break;
4028		}
4029	case SCTP_SS_VALUE:
4030		{
4031			struct sctp_stream_value *av;
4032
4033			SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, optsize);
4034			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4035			if (stcb) {
4036				if ((av->stream_id >= stcb->asoc.streamoutcnt) ||
4037				    (stcb->asoc.ss_functions.sctp_ss_set_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id],
4038				    av->stream_value) < 0)) {
4039					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4040					error = EINVAL;
4041				}
4042				SCTP_TCB_UNLOCK(stcb);
4043			} else {
4044				if (av->assoc_id == SCTP_CURRENT_ASSOC) {
4045					SCTP_INP_RLOCK(inp);
4046					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4047						SCTP_TCB_LOCK(stcb);
4048						if (av->stream_id < stcb->asoc.streamoutcnt) {
4049							stcb->asoc.ss_functions.sctp_ss_set_value(stcb,
4050							    &stcb->asoc,
4051							    &stcb->asoc.strmout[av->stream_id],
4052							    av->stream_value);
4053						}
4054						SCTP_TCB_UNLOCK(stcb);
4055					}
4056					SCTP_INP_RUNLOCK(inp);
4057
4058				} else {
4059					/*
4060					 * Can't set stream value without
4061					 * association
4062					 */
4063					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4064					error = EINVAL;
4065				}
4066			}
4067			break;
4068		}
4069	case SCTP_CLR_STAT_LOG:
4070		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4071		error = EOPNOTSUPP;
4072		break;
4073	case SCTP_CONTEXT:
4074		{
4075			struct sctp_assoc_value *av;
4076
4077			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4078			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4079
4080			if (stcb) {
4081				stcb->asoc.context = av->assoc_value;
4082				SCTP_TCB_UNLOCK(stcb);
4083			} else {
4084				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4085				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4086				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4087				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4088					SCTP_INP_WLOCK(inp);
4089					inp->sctp_context = av->assoc_value;
4090					SCTP_INP_WUNLOCK(inp);
4091				}
4092				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4093				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4094					SCTP_INP_RLOCK(inp);
4095					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4096						SCTP_TCB_LOCK(stcb);
4097						stcb->asoc.context = av->assoc_value;
4098						SCTP_TCB_UNLOCK(stcb);
4099					}
4100					SCTP_INP_RUNLOCK(inp);
4101				}
4102			}
4103			break;
4104		}
4105	case SCTP_VRF_ID:
4106		{
4107			uint32_t *default_vrfid;
4108
4109			SCTP_CHECK_AND_CAST(default_vrfid, optval, uint32_t, optsize);
4110			if (*default_vrfid > SCTP_MAX_VRF_ID) {
4111				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4112				error = EINVAL;
4113				break;
4114			}
4115			inp->def_vrf_id = *default_vrfid;
4116			break;
4117		}
4118	case SCTP_DEL_VRF_ID:
4119		{
4120			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4121			error = EOPNOTSUPP;
4122			break;
4123		}
4124	case SCTP_ADD_VRF_ID:
4125		{
4126			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4127			error = EOPNOTSUPP;
4128			break;
4129		}
4130	case SCTP_DELAYED_SACK:
4131		{
4132			struct sctp_sack_info *sack;
4133
4134			SCTP_CHECK_AND_CAST(sack, optval, struct sctp_sack_info, optsize);
4135			SCTP_FIND_STCB(inp, stcb, sack->sack_assoc_id);
4136			if (sack->sack_delay) {
4137				if (sack->sack_delay > SCTP_MAX_SACK_DELAY)
4138					sack->sack_delay = SCTP_MAX_SACK_DELAY;
4139				if (MSEC_TO_TICKS(sack->sack_delay) < 1) {
4140					sack->sack_delay = TICKS_TO_MSEC(1);
4141				}
4142			}
4143			if (stcb) {
4144				if (sack->sack_delay) {
4145					stcb->asoc.delayed_ack = sack->sack_delay;
4146				}
4147				if (sack->sack_freq) {
4148					stcb->asoc.sack_freq = sack->sack_freq;
4149				}
4150				SCTP_TCB_UNLOCK(stcb);
4151			} else {
4152				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4153				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4154				    (sack->sack_assoc_id == SCTP_FUTURE_ASSOC) ||
4155				    (sack->sack_assoc_id == SCTP_ALL_ASSOC)) {
4156					SCTP_INP_WLOCK(inp);
4157					if (sack->sack_delay) {
4158						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_RECV] = MSEC_TO_TICKS(sack->sack_delay);
4159					}
4160					if (sack->sack_freq) {
4161						inp->sctp_ep.sctp_sack_freq = sack->sack_freq;
4162					}
4163					SCTP_INP_WUNLOCK(inp);
4164				}
4165				if ((sack->sack_assoc_id == SCTP_CURRENT_ASSOC) ||
4166				    (sack->sack_assoc_id == SCTP_ALL_ASSOC)) {
4167					SCTP_INP_RLOCK(inp);
4168					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4169						SCTP_TCB_LOCK(stcb);
4170						if (sack->sack_delay) {
4171							stcb->asoc.delayed_ack = sack->sack_delay;
4172						}
4173						if (sack->sack_freq) {
4174							stcb->asoc.sack_freq = sack->sack_freq;
4175						}
4176						SCTP_TCB_UNLOCK(stcb);
4177					}
4178					SCTP_INP_RUNLOCK(inp);
4179				}
4180			}
4181			break;
4182		}
4183	case SCTP_AUTH_CHUNK:
4184		{
4185			struct sctp_authchunk *sauth;
4186
4187			SCTP_CHECK_AND_CAST(sauth, optval, struct sctp_authchunk, optsize);
4188
4189			SCTP_INP_WLOCK(inp);
4190			if (sctp_auth_add_chunk(sauth->sauth_chunk, inp->sctp_ep.local_auth_chunks)) {
4191				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4192				error = EINVAL;
4193			}
4194			SCTP_INP_WUNLOCK(inp);
4195			break;
4196		}
4197	case SCTP_AUTH_KEY:
4198		{
4199			struct sctp_authkey *sca;
4200			struct sctp_keyhead *shared_keys;
4201			sctp_sharedkey_t *shared_key;
4202			sctp_key_t *key = NULL;
4203			size_t size;
4204
4205			SCTP_CHECK_AND_CAST(sca, optval, struct sctp_authkey, optsize);
4206			if (sca->sca_keylength == 0) {
4207				size = optsize - sizeof(struct sctp_authkey);
4208			} else {
4209				if (sca->sca_keylength + sizeof(struct sctp_authkey) <= optsize) {
4210					size = sca->sca_keylength;
4211				} else {
4212					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4213					error = EINVAL;
4214					break;
4215				}
4216			}
4217			SCTP_FIND_STCB(inp, stcb, sca->sca_assoc_id);
4218
4219			if (stcb) {
4220				shared_keys = &stcb->asoc.shared_keys;
4221				/* clear the cached keys for this key id */
4222				sctp_clear_cachedkeys(stcb, sca->sca_keynumber);
4223				/*
4224				 * create the new shared key and
4225				 * insert/replace it
4226				 */
4227				if (size > 0) {
4228					key = sctp_set_key(sca->sca_key, (uint32_t) size);
4229					if (key == NULL) {
4230						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4231						error = ENOMEM;
4232						SCTP_TCB_UNLOCK(stcb);
4233						break;
4234					}
4235				}
4236				shared_key = sctp_alloc_sharedkey();
4237				if (shared_key == NULL) {
4238					sctp_free_key(key);
4239					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4240					error = ENOMEM;
4241					SCTP_TCB_UNLOCK(stcb);
4242					break;
4243				}
4244				shared_key->key = key;
4245				shared_key->keyid = sca->sca_keynumber;
4246				error = sctp_insert_sharedkey(shared_keys, shared_key);
4247				SCTP_TCB_UNLOCK(stcb);
4248			} else {
4249				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4250				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4251				    (sca->sca_assoc_id == SCTP_FUTURE_ASSOC) ||
4252				    (sca->sca_assoc_id == SCTP_ALL_ASSOC)) {
4253					SCTP_INP_WLOCK(inp);
4254					shared_keys = &inp->sctp_ep.shared_keys;
4255					/*
4256					 * clear the cached keys on all
4257					 * assocs for this key id
4258					 */
4259					sctp_clear_cachedkeys_ep(inp, sca->sca_keynumber);
4260					/*
4261					 * create the new shared key and
4262					 * insert/replace it
4263					 */
4264					if (size > 0) {
4265						key = sctp_set_key(sca->sca_key, (uint32_t) size);
4266						if (key == NULL) {
4267							SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4268							error = ENOMEM;
4269							SCTP_INP_WUNLOCK(inp);
4270							break;
4271						}
4272					}
4273					shared_key = sctp_alloc_sharedkey();
4274					if (shared_key == NULL) {
4275						sctp_free_key(key);
4276						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4277						error = ENOMEM;
4278						SCTP_INP_WUNLOCK(inp);
4279						break;
4280					}
4281					shared_key->key = key;
4282					shared_key->keyid = sca->sca_keynumber;
4283					error = sctp_insert_sharedkey(shared_keys, shared_key);
4284					SCTP_INP_WUNLOCK(inp);
4285				}
4286				if ((sca->sca_assoc_id == SCTP_CURRENT_ASSOC) ||
4287				    (sca->sca_assoc_id == SCTP_ALL_ASSOC)) {
4288					SCTP_INP_RLOCK(inp);
4289					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4290						SCTP_TCB_LOCK(stcb);
4291						shared_keys = &stcb->asoc.shared_keys;
4292						/*
4293						 * clear the cached keys for
4294						 * this key id
4295						 */
4296						sctp_clear_cachedkeys(stcb, sca->sca_keynumber);
4297						/*
4298						 * create the new shared key
4299						 * and insert/replace it
4300						 */
4301						if (size > 0) {
4302							key = sctp_set_key(sca->sca_key, (uint32_t) size);
4303							if (key == NULL) {
4304								SCTP_TCB_UNLOCK(stcb);
4305								continue;
4306							}
4307						}
4308						shared_key = sctp_alloc_sharedkey();
4309						if (shared_key == NULL) {
4310							sctp_free_key(key);
4311							SCTP_TCB_UNLOCK(stcb);
4312							continue;
4313						}
4314						shared_key->key = key;
4315						shared_key->keyid = sca->sca_keynumber;
4316						error = sctp_insert_sharedkey(shared_keys, shared_key);
4317						SCTP_TCB_UNLOCK(stcb);
4318					}
4319					SCTP_INP_RUNLOCK(inp);
4320				}
4321			}
4322			break;
4323		}
4324	case SCTP_HMAC_IDENT:
4325		{
4326			struct sctp_hmacalgo *shmac;
4327			sctp_hmaclist_t *hmaclist;
4328			uint16_t hmacid;
4329			uint32_t i;
4330
4331			SCTP_CHECK_AND_CAST(shmac, optval, struct sctp_hmacalgo, optsize);
4332			if ((optsize < sizeof(struct sctp_hmacalgo) + shmac->shmac_number_of_idents * sizeof(uint16_t)) ||
4333			    (shmac->shmac_number_of_idents > 0xffff)) {
4334				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4335				error = EINVAL;
4336				break;
4337			}
4338			hmaclist = sctp_alloc_hmaclist((uint16_t) shmac->shmac_number_of_idents);
4339			if (hmaclist == NULL) {
4340				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4341				error = ENOMEM;
4342				break;
4343			}
4344			for (i = 0; i < shmac->shmac_number_of_idents; i++) {
4345				hmacid = shmac->shmac_idents[i];
4346				if (sctp_auth_add_hmacid(hmaclist, hmacid)) {
4347					 /* invalid HMACs were found */ ;
4348					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4349					error = EINVAL;
4350					sctp_free_hmaclist(hmaclist);
4351					goto sctp_set_hmac_done;
4352				}
4353			}
4354			for (i = 0; i < hmaclist->num_algo; i++) {
4355				if (hmaclist->hmac[i] == SCTP_AUTH_HMAC_ID_SHA1) {
4356					/* already in list */
4357					break;
4358				}
4359			}
4360			if (i == hmaclist->num_algo) {
4361				/* not found in list */
4362				sctp_free_hmaclist(hmaclist);
4363				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4364				error = EINVAL;
4365				break;
4366			}
4367			/* set it on the endpoint */
4368			SCTP_INP_WLOCK(inp);
4369			if (inp->sctp_ep.local_hmacs)
4370				sctp_free_hmaclist(inp->sctp_ep.local_hmacs);
4371			inp->sctp_ep.local_hmacs = hmaclist;
4372			SCTP_INP_WUNLOCK(inp);
4373	sctp_set_hmac_done:
4374			break;
4375		}
4376	case SCTP_AUTH_ACTIVE_KEY:
4377		{
4378			struct sctp_authkeyid *scact;
4379
4380			SCTP_CHECK_AND_CAST(scact, optval, struct sctp_authkeyid, optsize);
4381			SCTP_FIND_STCB(inp, stcb, scact->scact_assoc_id);
4382
4383			/* set the active key on the right place */
4384			if (stcb) {
4385				/* set the active key on the assoc */
4386				if (sctp_auth_setactivekey(stcb,
4387				    scact->scact_keynumber)) {
4388					SCTP_LTRACE_ERR_RET(inp, NULL, NULL,
4389					    SCTP_FROM_SCTP_USRREQ,
4390					    EINVAL);
4391					error = EINVAL;
4392				}
4393				SCTP_TCB_UNLOCK(stcb);
4394			} else {
4395				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4396				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4397				    (scact->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4398				    (scact->scact_assoc_id == SCTP_ALL_ASSOC)) {
4399					SCTP_INP_WLOCK(inp);
4400					if (sctp_auth_setactivekey_ep(inp, scact->scact_keynumber)) {
4401						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4402						error = EINVAL;
4403					}
4404					SCTP_INP_WUNLOCK(inp);
4405				}
4406				if ((scact->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4407				    (scact->scact_assoc_id == SCTP_ALL_ASSOC)) {
4408					SCTP_INP_RLOCK(inp);
4409					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4410						SCTP_TCB_LOCK(stcb);
4411						sctp_auth_setactivekey(stcb, scact->scact_keynumber);
4412						SCTP_TCB_UNLOCK(stcb);
4413					}
4414					SCTP_INP_RUNLOCK(inp);
4415				}
4416			}
4417			break;
4418		}
4419	case SCTP_AUTH_DELETE_KEY:
4420		{
4421			struct sctp_authkeyid *scdel;
4422
4423			SCTP_CHECK_AND_CAST(scdel, optval, struct sctp_authkeyid, optsize);
4424			SCTP_FIND_STCB(inp, stcb, scdel->scact_assoc_id);
4425
4426			/* delete the key from the right place */
4427			if (stcb) {
4428				if (sctp_delete_sharedkey(stcb, scdel->scact_keynumber)) {
4429					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4430					error = EINVAL;
4431				}
4432				SCTP_TCB_UNLOCK(stcb);
4433			} else {
4434				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4435				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4436				    (scdel->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4437				    (scdel->scact_assoc_id == SCTP_ALL_ASSOC)) {
4438					SCTP_INP_WLOCK(inp);
4439					if (sctp_delete_sharedkey_ep(inp, scdel->scact_keynumber)) {
4440						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4441						error = EINVAL;
4442					}
4443					SCTP_INP_WUNLOCK(inp);
4444				}
4445				if ((scdel->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4446				    (scdel->scact_assoc_id == SCTP_ALL_ASSOC)) {
4447					SCTP_INP_RLOCK(inp);
4448					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4449						SCTP_TCB_LOCK(stcb);
4450						sctp_delete_sharedkey(stcb, scdel->scact_keynumber);
4451						SCTP_TCB_UNLOCK(stcb);
4452					}
4453					SCTP_INP_RUNLOCK(inp);
4454				}
4455			}
4456			break;
4457		}
4458	case SCTP_AUTH_DEACTIVATE_KEY:
4459		{
4460			struct sctp_authkeyid *keyid;
4461
4462			SCTP_CHECK_AND_CAST(keyid, optval, struct sctp_authkeyid, optsize);
4463			SCTP_FIND_STCB(inp, stcb, keyid->scact_assoc_id);
4464
4465			/* deactivate the key from the right place */
4466			if (stcb) {
4467				if (sctp_deact_sharedkey(stcb, keyid->scact_keynumber)) {
4468					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4469					error = EINVAL;
4470				}
4471				SCTP_TCB_UNLOCK(stcb);
4472			} else {
4473				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4474				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4475				    (keyid->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4476				    (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) {
4477					SCTP_INP_WLOCK(inp);
4478					if (sctp_deact_sharedkey_ep(inp, keyid->scact_keynumber)) {
4479						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4480						error = EINVAL;
4481					}
4482					SCTP_INP_WUNLOCK(inp);
4483				}
4484				if ((keyid->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4485				    (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) {
4486					SCTP_INP_RLOCK(inp);
4487					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4488						SCTP_TCB_LOCK(stcb);
4489						sctp_deact_sharedkey(stcb, keyid->scact_keynumber);
4490						SCTP_TCB_UNLOCK(stcb);
4491					}
4492					SCTP_INP_RUNLOCK(inp);
4493				}
4494			}
4495			break;
4496		}
4497	case SCTP_ENABLE_STREAM_RESET:
4498		{
4499			struct sctp_assoc_value *av;
4500
4501			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4502			if (av->assoc_value & (~SCTP_ENABLE_VALUE_MASK)) {
4503				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4504				error = EINVAL;
4505				break;
4506			}
4507			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4508			if (stcb) {
4509				stcb->asoc.local_strreset_support = (uint8_t) av->assoc_value;
4510				SCTP_TCB_UNLOCK(stcb);
4511			} else {
4512				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4513				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4514				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4515				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4516					SCTP_INP_WLOCK(inp);
4517					inp->local_strreset_support = (uint8_t) av->assoc_value;
4518					SCTP_INP_WUNLOCK(inp);
4519				}
4520				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4521				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4522					SCTP_INP_RLOCK(inp);
4523					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4524						SCTP_TCB_LOCK(stcb);
4525						stcb->asoc.local_strreset_support = (uint8_t) av->assoc_value;
4526						SCTP_TCB_UNLOCK(stcb);
4527					}
4528					SCTP_INP_RUNLOCK(inp);
4529				}
4530			}
4531			break;
4532		}
4533	case SCTP_RESET_STREAMS:
4534		{
4535			struct sctp_reset_streams *strrst;
4536			int i, send_out = 0;
4537			int send_in = 0;
4538
4539			SCTP_CHECK_AND_CAST(strrst, optval, struct sctp_reset_streams, optsize);
4540			SCTP_FIND_STCB(inp, stcb, strrst->srs_assoc_id);
4541			if (stcb == NULL) {
4542				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4543				error = ENOENT;
4544				break;
4545			}
4546			if (stcb->asoc.reconfig_supported == 0) {
4547				/*
4548				 * Peer does not support the chunk type.
4549				 */
4550				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4551				error = EOPNOTSUPP;
4552				SCTP_TCB_UNLOCK(stcb);
4553				break;
4554			}
4555			if (sizeof(struct sctp_reset_streams) +
4556			    strrst->srs_number_streams * sizeof(uint16_t) > optsize) {
4557				error = EINVAL;
4558				SCTP_TCB_UNLOCK(stcb);
4559				break;
4560			}
4561			if (stcb->asoc.stream_reset_outstanding) {
4562				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4563				error = EALREADY;
4564				SCTP_TCB_UNLOCK(stcb);
4565				break;
4566			}
4567			if (strrst->srs_flags & SCTP_STREAM_RESET_INCOMING) {
4568				send_in = 1;
4569			}
4570			if (strrst->srs_flags & SCTP_STREAM_RESET_OUTGOING) {
4571				send_out = 1;
4572			}
4573			if ((send_in == 0) && (send_out == 0)) {
4574				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4575				error = EINVAL;
4576				SCTP_TCB_UNLOCK(stcb);
4577				break;
4578			}
4579			for (i = 0; i < strrst->srs_number_streams; i++) {
4580				if ((send_in) &&
4581				    (strrst->srs_stream_list[i] > stcb->asoc.streamincnt)) {
4582					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4583					error = EINVAL;
4584					break;
4585				}
4586				if ((send_out) &&
4587				    (strrst->srs_stream_list[i] > stcb->asoc.streamoutcnt)) {
4588					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4589					error = EINVAL;
4590					break;
4591				}
4592			}
4593			if (error) {
4594				SCTP_TCB_UNLOCK(stcb);
4595				break;
4596			}
4597			error = sctp_send_str_reset_req(stcb, strrst->srs_number_streams,
4598			    strrst->srs_stream_list,
4599			    send_out, send_in, 0, 0, 0, 0, 0);
4600
4601			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4602			SCTP_TCB_UNLOCK(stcb);
4603			break;
4604		}
4605	case SCTP_ADD_STREAMS:
4606		{
4607			struct sctp_add_streams *stradd;
4608			uint8_t addstream = 0;
4609			uint16_t add_o_strmcnt = 0;
4610			uint16_t add_i_strmcnt = 0;
4611
4612			SCTP_CHECK_AND_CAST(stradd, optval, struct sctp_add_streams, optsize);
4613			SCTP_FIND_STCB(inp, stcb, stradd->sas_assoc_id);
4614			if (stcb == NULL) {
4615				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4616				error = ENOENT;
4617				break;
4618			}
4619			if (stcb->asoc.reconfig_supported == 0) {
4620				/*
4621				 * Peer does not support the chunk type.
4622				 */
4623				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4624				error = EOPNOTSUPP;
4625				SCTP_TCB_UNLOCK(stcb);
4626				break;
4627			}
4628			if (stcb->asoc.stream_reset_outstanding) {
4629				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4630				error = EALREADY;
4631				SCTP_TCB_UNLOCK(stcb);
4632				break;
4633			}
4634			if ((stradd->sas_outstrms == 0) &&
4635			    (stradd->sas_instrms == 0)) {
4636				error = EINVAL;
4637				goto skip_stuff;
4638			}
4639			if (stradd->sas_outstrms) {
4640				addstream = 1;
4641				/* We allocate here */
4642				add_o_strmcnt = stradd->sas_outstrms;
4643				if ((((int)add_o_strmcnt) + ((int)stcb->asoc.streamoutcnt)) > 0x0000ffff) {
4644					/* You can't have more than 64k */
4645					error = EINVAL;
4646					goto skip_stuff;
4647				}
4648			}
4649			if (stradd->sas_instrms) {
4650				int cnt;
4651
4652				addstream |= 2;
4653				/*
4654				 * We allocate inside
4655				 * sctp_send_str_reset_req()
4656				 */
4657				add_i_strmcnt = stradd->sas_instrms;
4658				cnt = add_i_strmcnt;
4659				cnt += stcb->asoc.streamincnt;
4660				if (cnt > 0x0000ffff) {
4661					/* You can't have more than 64k */
4662					error = EINVAL;
4663					goto skip_stuff;
4664				}
4665				if (cnt > (int)stcb->asoc.max_inbound_streams) {
4666					/* More than you are allowed */
4667					error = EINVAL;
4668					goto skip_stuff;
4669				}
4670			}
4671			error = sctp_send_str_reset_req(stcb, 0, NULL, 0, 0, 0, addstream, add_o_strmcnt, add_i_strmcnt, 0);
4672			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4673	skip_stuff:
4674			SCTP_TCB_UNLOCK(stcb);
4675			break;
4676		}
4677	case SCTP_RESET_ASSOC:
4678		{
4679			uint32_t *value;
4680
4681			SCTP_CHECK_AND_CAST(value, optval, uint32_t, optsize);
4682			SCTP_FIND_STCB(inp, stcb, (sctp_assoc_t) * value);
4683			if (stcb == NULL) {
4684				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4685				error = ENOENT;
4686				break;
4687			}
4688			if (stcb->asoc.reconfig_supported == 0) {
4689				/*
4690				 * Peer does not support the chunk type.
4691				 */
4692				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4693				error = EOPNOTSUPP;
4694				SCTP_TCB_UNLOCK(stcb);
4695				break;
4696			}
4697			if (stcb->asoc.stream_reset_outstanding) {
4698				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4699				error = EALREADY;
4700				SCTP_TCB_UNLOCK(stcb);
4701				break;
4702			}
4703			error = sctp_send_str_reset_req(stcb, 0, NULL, 0, 0, 1, 0, 0, 0, 0);
4704			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4705			SCTP_TCB_UNLOCK(stcb);
4706			break;
4707		}
4708	case SCTP_CONNECT_X:
4709		if (optsize < (sizeof(int) + sizeof(struct sockaddr_in))) {
4710			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4711			error = EINVAL;
4712			break;
4713		}
4714		error = sctp_do_connect_x(so, inp, optval, optsize, p, 0);
4715		break;
4716	case SCTP_CONNECT_X_DELAYED:
4717		if (optsize < (sizeof(int) + sizeof(struct sockaddr_in))) {
4718			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4719			error = EINVAL;
4720			break;
4721		}
4722		error = sctp_do_connect_x(so, inp, optval, optsize, p, 1);
4723		break;
4724	case SCTP_CONNECT_X_COMPLETE:
4725		{
4726			struct sockaddr *sa;
4727
4728			/* FIXME MT: check correct? */
4729			SCTP_CHECK_AND_CAST(sa, optval, struct sockaddr, optsize);
4730
4731			/* find tcb */
4732			if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
4733				SCTP_INP_RLOCK(inp);
4734				stcb = LIST_FIRST(&inp->sctp_asoc_list);
4735				if (stcb) {
4736					SCTP_TCB_LOCK(stcb);
4737				}
4738				SCTP_INP_RUNLOCK(inp);
4739			} else {
4740				/*
4741				 * We increment here since
4742				 * sctp_findassociation_ep_addr() wil do a
4743				 * decrement if it finds the stcb as long as
4744				 * the locked tcb (last argument) is NOT a
4745				 * TCB.. aka NULL.
4746				 */
4747				SCTP_INP_INCR_REF(inp);
4748				stcb = sctp_findassociation_ep_addr(&inp, sa, NULL, NULL, NULL);
4749				if (stcb == NULL) {
4750					SCTP_INP_DECR_REF(inp);
4751				}
4752			}
4753
4754			if (stcb == NULL) {
4755				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4756				error = ENOENT;
4757				break;
4758			}
4759			if (stcb->asoc.delayed_connection == 1) {
4760				stcb->asoc.delayed_connection = 0;
4761				(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
4762				sctp_timer_stop(SCTP_TIMER_TYPE_INIT, inp, stcb,
4763				    stcb->asoc.primary_destination,
4764				    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_9);
4765				sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
4766			} else {
4767				/*
4768				 * already expired or did not use delayed
4769				 * connectx
4770				 */
4771				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4772				error = EALREADY;
4773			}
4774			SCTP_TCB_UNLOCK(stcb);
4775			break;
4776		}
4777	case SCTP_MAX_BURST:
4778		{
4779			struct sctp_assoc_value *av;
4780
4781			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4782			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4783
4784			if (stcb) {
4785				stcb->asoc.max_burst = av->assoc_value;
4786				SCTP_TCB_UNLOCK(stcb);
4787			} else {
4788				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4789				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4790				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4791				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4792					SCTP_INP_WLOCK(inp);
4793					inp->sctp_ep.max_burst = av->assoc_value;
4794					SCTP_INP_WUNLOCK(inp);
4795				}
4796				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4797				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4798					SCTP_INP_RLOCK(inp);
4799					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4800						SCTP_TCB_LOCK(stcb);
4801						stcb->asoc.max_burst = av->assoc_value;
4802						SCTP_TCB_UNLOCK(stcb);
4803					}
4804					SCTP_INP_RUNLOCK(inp);
4805				}
4806			}
4807			break;
4808		}
4809	case SCTP_MAXSEG:
4810		{
4811			struct sctp_assoc_value *av;
4812			int ovh;
4813
4814			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4815			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4816
4817			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
4818				ovh = SCTP_MED_OVERHEAD;
4819			} else {
4820				ovh = SCTP_MED_V4_OVERHEAD;
4821			}
4822			if (stcb) {
4823				if (av->assoc_value) {
4824					stcb->asoc.sctp_frag_point = (av->assoc_value + ovh);
4825				} else {
4826					stcb->asoc.sctp_frag_point = SCTP_DEFAULT_MAXSEGMENT;
4827				}
4828				SCTP_TCB_UNLOCK(stcb);
4829			} else {
4830				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4831				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4832				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
4833					SCTP_INP_WLOCK(inp);
4834					/*
4835					 * FIXME MT: I think this is not in
4836					 * tune with the API ID
4837					 */
4838					if (av->assoc_value) {
4839						inp->sctp_frag_point = (av->assoc_value + ovh);
4840					} else {
4841						inp->sctp_frag_point = SCTP_DEFAULT_MAXSEGMENT;
4842					}
4843					SCTP_INP_WUNLOCK(inp);
4844				} else {
4845					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4846					error = EINVAL;
4847				}
4848			}
4849			break;
4850		}
4851	case SCTP_EVENTS:
4852		{
4853			struct sctp_event_subscribe *events;
4854
4855			SCTP_CHECK_AND_CAST(events, optval, struct sctp_event_subscribe, optsize);
4856
4857			SCTP_INP_WLOCK(inp);
4858			if (events->sctp_data_io_event) {
4859				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT);
4860			} else {
4861				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT);
4862			}
4863
4864			if (events->sctp_association_event) {
4865				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4866			} else {
4867				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4868			}
4869
4870			if (events->sctp_address_event) {
4871				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVPADDREVNT);
4872			} else {
4873				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVPADDREVNT);
4874			}
4875
4876			if (events->sctp_send_failure_event) {
4877				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4878			} else {
4879				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4880			}
4881
4882			if (events->sctp_peer_error_event) {
4883				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVPEERERR);
4884			} else {
4885				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVPEERERR);
4886			}
4887
4888			if (events->sctp_shutdown_event) {
4889				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4890			} else {
4891				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4892			}
4893
4894			if (events->sctp_partial_delivery_event) {
4895				sctp_feature_on(inp, SCTP_PCB_FLAGS_PDAPIEVNT);
4896			} else {
4897				sctp_feature_off(inp, SCTP_PCB_FLAGS_PDAPIEVNT);
4898			}
4899
4900			if (events->sctp_adaptation_layer_event) {
4901				sctp_feature_on(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4902			} else {
4903				sctp_feature_off(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4904			}
4905
4906			if (events->sctp_authentication_event) {
4907				sctp_feature_on(inp, SCTP_PCB_FLAGS_AUTHEVNT);
4908			} else {
4909				sctp_feature_off(inp, SCTP_PCB_FLAGS_AUTHEVNT);
4910			}
4911
4912			if (events->sctp_sender_dry_event) {
4913				sctp_feature_on(inp, SCTP_PCB_FLAGS_DRYEVNT);
4914			} else {
4915				sctp_feature_off(inp, SCTP_PCB_FLAGS_DRYEVNT);
4916			}
4917
4918			if (events->sctp_stream_reset_event) {
4919				sctp_feature_on(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4920			} else {
4921				sctp_feature_off(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4922			}
4923			SCTP_INP_WUNLOCK(inp);
4924
4925			SCTP_INP_RLOCK(inp);
4926			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4927				SCTP_TCB_LOCK(stcb);
4928				if (events->sctp_association_event) {
4929					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4930				} else {
4931					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4932				}
4933				if (events->sctp_address_event) {
4934					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVPADDREVNT);
4935				} else {
4936					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVPADDREVNT);
4937				}
4938				if (events->sctp_send_failure_event) {
4939					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4940				} else {
4941					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4942				}
4943				if (events->sctp_peer_error_event) {
4944					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVPEERERR);
4945				} else {
4946					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVPEERERR);
4947				}
4948				if (events->sctp_shutdown_event) {
4949					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4950				} else {
4951					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4952				}
4953				if (events->sctp_partial_delivery_event) {
4954					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_PDAPIEVNT);
4955				} else {
4956					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_PDAPIEVNT);
4957				}
4958				if (events->sctp_adaptation_layer_event) {
4959					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4960				} else {
4961					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4962				}
4963				if (events->sctp_authentication_event) {
4964					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_AUTHEVNT);
4965				} else {
4966					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_AUTHEVNT);
4967				}
4968				if (events->sctp_sender_dry_event) {
4969					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DRYEVNT);
4970				} else {
4971					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DRYEVNT);
4972				}
4973				if (events->sctp_stream_reset_event) {
4974					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4975				} else {
4976					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4977				}
4978				SCTP_TCB_UNLOCK(stcb);
4979			}
4980			/*
4981			 * Send up the sender dry event only for 1-to-1
4982			 * style sockets.
4983			 */
4984			if (events->sctp_sender_dry_event) {
4985				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4986				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
4987					stcb = LIST_FIRST(&inp->sctp_asoc_list);
4988					if (stcb) {
4989						SCTP_TCB_LOCK(stcb);
4990						if (TAILQ_EMPTY(&stcb->asoc.send_queue) &&
4991						    TAILQ_EMPTY(&stcb->asoc.sent_queue) &&
4992						    (stcb->asoc.stream_queue_cnt == 0)) {
4993							sctp_ulp_notify(SCTP_NOTIFY_SENDER_DRY, stcb, 0, NULL, SCTP_SO_LOCKED);
4994						}
4995						SCTP_TCB_UNLOCK(stcb);
4996					}
4997				}
4998			}
4999			SCTP_INP_RUNLOCK(inp);
5000			break;
5001		}
5002	case SCTP_ADAPTATION_LAYER:
5003		{
5004			struct sctp_setadaptation *adap_bits;
5005
5006			SCTP_CHECK_AND_CAST(adap_bits, optval, struct sctp_setadaptation, optsize);
5007			SCTP_INP_WLOCK(inp);
5008			inp->sctp_ep.adaptation_layer_indicator = adap_bits->ssb_adaptation_ind;
5009			inp->sctp_ep.adaptation_layer_indicator_provided = 1;
5010			SCTP_INP_WUNLOCK(inp);
5011			break;
5012		}
5013#ifdef SCTP_DEBUG
5014	case SCTP_SET_INITIAL_DBG_SEQ:
5015		{
5016			uint32_t *vvv;
5017
5018			SCTP_CHECK_AND_CAST(vvv, optval, uint32_t, optsize);
5019			SCTP_INP_WLOCK(inp);
5020			inp->sctp_ep.initial_sequence_debug = *vvv;
5021			SCTP_INP_WUNLOCK(inp);
5022			break;
5023		}
5024#endif
5025	case SCTP_DEFAULT_SEND_PARAM:
5026		{
5027			struct sctp_sndrcvinfo *s_info;
5028
5029			SCTP_CHECK_AND_CAST(s_info, optval, struct sctp_sndrcvinfo, optsize);
5030			SCTP_FIND_STCB(inp, stcb, s_info->sinfo_assoc_id);
5031
5032			if (stcb) {
5033				if (s_info->sinfo_stream < stcb->asoc.streamoutcnt) {
5034					memcpy(&stcb->asoc.def_send, s_info, min(optsize, sizeof(stcb->asoc.def_send)));
5035				} else {
5036					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5037					error = EINVAL;
5038				}
5039				SCTP_TCB_UNLOCK(stcb);
5040			} else {
5041				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5042				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5043				    (s_info->sinfo_assoc_id == SCTP_FUTURE_ASSOC) ||
5044				    (s_info->sinfo_assoc_id == SCTP_ALL_ASSOC)) {
5045					SCTP_INP_WLOCK(inp);
5046					memcpy(&inp->def_send, s_info, min(optsize, sizeof(inp->def_send)));
5047					SCTP_INP_WUNLOCK(inp);
5048				}
5049				if ((s_info->sinfo_assoc_id == SCTP_CURRENT_ASSOC) ||
5050				    (s_info->sinfo_assoc_id == SCTP_ALL_ASSOC)) {
5051					SCTP_INP_RLOCK(inp);
5052					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
5053						SCTP_TCB_LOCK(stcb);
5054						if (s_info->sinfo_stream < stcb->asoc.streamoutcnt) {
5055							memcpy(&stcb->asoc.def_send, s_info, min(optsize, sizeof(stcb->asoc.def_send)));
5056						}
5057						SCTP_TCB_UNLOCK(stcb);
5058					}
5059					SCTP_INP_RUNLOCK(inp);
5060				}
5061			}
5062			break;
5063		}
5064	case SCTP_PEER_ADDR_PARAMS:
5065		{
5066			struct sctp_paddrparams *paddrp;
5067			struct sctp_nets *net;
5068			struct sockaddr *addr;
5069
5070#if defined(INET) && defined(INET6)
5071			struct sockaddr_in sin_store;
5072
5073#endif
5074
5075			SCTP_CHECK_AND_CAST(paddrp, optval, struct sctp_paddrparams, optsize);
5076			SCTP_FIND_STCB(inp, stcb, paddrp->spp_assoc_id);
5077
5078#if defined(INET) && defined(INET6)
5079			if (paddrp->spp_address.ss_family == AF_INET6) {
5080				struct sockaddr_in6 *sin6;
5081
5082				sin6 = (struct sockaddr_in6 *)&paddrp->spp_address;
5083				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5084					in6_sin6_2_sin(&sin_store, sin6);
5085					addr = (struct sockaddr *)&sin_store;
5086				} else {
5087					addr = (struct sockaddr *)&paddrp->spp_address;
5088				}
5089			} else {
5090				addr = (struct sockaddr *)&paddrp->spp_address;
5091			}
5092#else
5093			addr = (struct sockaddr *)&paddrp->spp_address;
5094#endif
5095			if (stcb != NULL) {
5096				net = sctp_findnet(stcb, addr);
5097			} else {
5098				/*
5099				 * We increment here since
5100				 * sctp_findassociation_ep_addr() wil do a
5101				 * decrement if it finds the stcb as long as
5102				 * the locked tcb (last argument) is NOT a
5103				 * TCB.. aka NULL.
5104				 */
5105				net = NULL;
5106				SCTP_INP_INCR_REF(inp);
5107				stcb = sctp_findassociation_ep_addr(&inp, addr,
5108				    &net, NULL, NULL);
5109				if (stcb == NULL) {
5110					SCTP_INP_DECR_REF(inp);
5111				}
5112			}
5113			if ((stcb != NULL) && (net == NULL)) {
5114#ifdef INET
5115				if (addr->sa_family == AF_INET) {
5116
5117					struct sockaddr_in *sin;
5118
5119					sin = (struct sockaddr_in *)addr;
5120					if (sin->sin_addr.s_addr != INADDR_ANY) {
5121						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5122						SCTP_TCB_UNLOCK(stcb);
5123						error = EINVAL;
5124						break;
5125					}
5126				} else
5127#endif
5128#ifdef INET6
5129				if (addr->sa_family == AF_INET6) {
5130					struct sockaddr_in6 *sin6;
5131
5132					sin6 = (struct sockaddr_in6 *)addr;
5133					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
5134						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5135						SCTP_TCB_UNLOCK(stcb);
5136						error = EINVAL;
5137						break;
5138					}
5139				} else
5140#endif
5141				{
5142					error = EAFNOSUPPORT;
5143					SCTP_TCB_UNLOCK(stcb);
5144					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
5145					break;
5146				}
5147			}
5148			/* sanity checks */
5149			if ((paddrp->spp_flags & SPP_HB_ENABLE) && (paddrp->spp_flags & SPP_HB_DISABLE)) {
5150				if (stcb)
5151					SCTP_TCB_UNLOCK(stcb);
5152				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5153				return (EINVAL);
5154			}
5155			if ((paddrp->spp_flags & SPP_PMTUD_ENABLE) && (paddrp->spp_flags & SPP_PMTUD_DISABLE)) {
5156				if (stcb)
5157					SCTP_TCB_UNLOCK(stcb);
5158				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5159				return (EINVAL);
5160			}
5161			if (stcb != NULL) {
5162				/************************TCB SPECIFIC SET ******************/
5163				/*
5164				 * do we change the timer for HB, we run
5165				 * only one?
5166				 */
5167				int ovh = 0;
5168
5169				if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
5170					ovh = SCTP_MED_OVERHEAD;
5171				} else {
5172					ovh = SCTP_MED_V4_OVERHEAD;
5173				}
5174
5175				/* network sets ? */
5176				if (net != NULL) {
5177					/************************NET SPECIFIC SET ******************/
5178					if (paddrp->spp_flags & SPP_HB_DISABLE) {
5179						if (!(net->dest_state & SCTP_ADDR_UNCONFIRMED) &&
5180						    !(net->dest_state & SCTP_ADDR_NOHB)) {
5181							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5182							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5183						}
5184						net->dest_state |= SCTP_ADDR_NOHB;
5185					}
5186					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5187						if (paddrp->spp_hbinterval) {
5188							net->heart_beat_delay = paddrp->spp_hbinterval;
5189						} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5190							net->heart_beat_delay = 0;
5191						}
5192						sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5193						    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5194						sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5195						net->dest_state &= ~SCTP_ADDR_NOHB;
5196					}
5197					if (paddrp->spp_flags & SPP_HB_DEMAND) {
5198						/* on demand HB */
5199						sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5200						sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_SOCKOPT, SCTP_SO_LOCKED);
5201						sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5202					}
5203					if ((paddrp->spp_flags & SPP_PMTUD_DISABLE) && (paddrp->spp_pathmtu >= SCTP_SMALLEST_PMTU)) {
5204						if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5205							sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
5206							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5207						}
5208						net->dest_state |= SCTP_ADDR_NO_PMTUD;
5209						net->mtu = paddrp->spp_pathmtu + ovh;
5210						if (net->mtu < stcb->asoc.smallest_mtu) {
5211							sctp_pathmtu_adjustment(stcb, net->mtu);
5212						}
5213					}
5214					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5215						if (!SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5216							sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
5217						}
5218						net->dest_state &= ~SCTP_ADDR_NO_PMTUD;
5219					}
5220					if (paddrp->spp_pathmaxrxt) {
5221						if (net->dest_state & SCTP_ADDR_PF) {
5222							if (net->error_count > paddrp->spp_pathmaxrxt) {
5223								net->dest_state &= ~SCTP_ADDR_PF;
5224							}
5225						} else {
5226							if ((net->error_count <= paddrp->spp_pathmaxrxt) &&
5227							    (net->error_count > net->pf_threshold)) {
5228								net->dest_state |= SCTP_ADDR_PF;
5229								sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5230								sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
5231								sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
5232							}
5233						}
5234						if (net->dest_state & SCTP_ADDR_REACHABLE) {
5235							if (net->error_count > paddrp->spp_pathmaxrxt) {
5236								net->dest_state &= ~SCTP_ADDR_REACHABLE;
5237								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
5238							}
5239						} else {
5240							if (net->error_count <= paddrp->spp_pathmaxrxt) {
5241								net->dest_state |= SCTP_ADDR_REACHABLE;
5242								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
5243							}
5244						}
5245						net->failure_threshold = paddrp->spp_pathmaxrxt;
5246					}
5247					if (paddrp->spp_flags & SPP_DSCP) {
5248						net->dscp = paddrp->spp_dscp & 0xfc;
5249						net->dscp |= 0x01;
5250					}
5251#ifdef INET6
5252					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5253						if (net->ro._l_addr.sa.sa_family == AF_INET6) {
5254							net->flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5255							net->flowlabel |= 0x80000000;
5256						}
5257					}
5258#endif
5259				} else {
5260					/************************ASSOC ONLY -- NO NET SPECIFIC SET ******************/
5261					if (paddrp->spp_pathmaxrxt != 0) {
5262						stcb->asoc.def_net_failure = paddrp->spp_pathmaxrxt;
5263						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5264							if (net->dest_state & SCTP_ADDR_PF) {
5265								if (net->error_count > paddrp->spp_pathmaxrxt) {
5266									net->dest_state &= ~SCTP_ADDR_PF;
5267								}
5268							} else {
5269								if ((net->error_count <= paddrp->spp_pathmaxrxt) &&
5270								    (net->error_count > net->pf_threshold)) {
5271									net->dest_state |= SCTP_ADDR_PF;
5272									sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5273									sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
5274									sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
5275								}
5276							}
5277							if (net->dest_state & SCTP_ADDR_REACHABLE) {
5278								if (net->error_count > paddrp->spp_pathmaxrxt) {
5279									net->dest_state &= ~SCTP_ADDR_REACHABLE;
5280									sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
5281								}
5282							} else {
5283								if (net->error_count <= paddrp->spp_pathmaxrxt) {
5284									net->dest_state |= SCTP_ADDR_REACHABLE;
5285									sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
5286								}
5287							}
5288							net->failure_threshold = paddrp->spp_pathmaxrxt;
5289						}
5290					}
5291					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5292						if (paddrp->spp_hbinterval != 0) {
5293							stcb->asoc.heart_beat_delay = paddrp->spp_hbinterval;
5294						} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5295							stcb->asoc.heart_beat_delay = 0;
5296						}
5297						/* Turn back on the timer */
5298						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5299							if (paddrp->spp_hbinterval != 0) {
5300								net->heart_beat_delay = paddrp->spp_hbinterval;
5301							} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5302								net->heart_beat_delay = 0;
5303							}
5304							if (net->dest_state & SCTP_ADDR_NOHB) {
5305								net->dest_state &= ~SCTP_ADDR_NOHB;
5306							}
5307							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5308							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5309							sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5310						}
5311						sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5312					}
5313					if (paddrp->spp_flags & SPP_HB_DISABLE) {
5314						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5315							if (!(net->dest_state & SCTP_ADDR_NOHB)) {
5316								net->dest_state |= SCTP_ADDR_NOHB;
5317								if (!(net->dest_state & SCTP_ADDR_UNCONFIRMED)) {
5318									sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5319								}
5320							}
5321						}
5322						sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5323					}
5324					if ((paddrp->spp_flags & SPP_PMTUD_DISABLE) && (paddrp->spp_pathmtu >= SCTP_SMALLEST_PMTU)) {
5325						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5326							if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5327								sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
5328								    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5329							}
5330							net->dest_state |= SCTP_ADDR_NO_PMTUD;
5331							net->mtu = paddrp->spp_pathmtu + ovh;
5332							if (net->mtu < stcb->asoc.smallest_mtu) {
5333								sctp_pathmtu_adjustment(stcb, net->mtu);
5334							}
5335						}
5336						sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5337					}
5338					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5339						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5340							if (!SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5341								sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
5342							}
5343							net->dest_state &= ~SCTP_ADDR_NO_PMTUD;
5344						}
5345						sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5346					}
5347					if (paddrp->spp_flags & SPP_DSCP) {
5348						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5349							net->dscp = paddrp->spp_dscp & 0xfc;
5350							net->dscp |= 0x01;
5351						}
5352						stcb->asoc.default_dscp = paddrp->spp_dscp & 0xfc;
5353						stcb->asoc.default_dscp |= 0x01;
5354					}
5355#ifdef INET6
5356					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5357						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5358							if (net->ro._l_addr.sa.sa_family == AF_INET6) {
5359								net->flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5360								net->flowlabel |= 0x80000000;
5361							}
5362						}
5363						stcb->asoc.default_flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5364						stcb->asoc.default_flowlabel |= 0x80000000;
5365					}
5366#endif
5367				}
5368				SCTP_TCB_UNLOCK(stcb);
5369			} else {
5370				/************************NO TCB, SET TO default stuff ******************/
5371				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5372				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5373				    (paddrp->spp_assoc_id == SCTP_FUTURE_ASSOC)) {
5374					SCTP_INP_WLOCK(inp);
5375					/*
5376					 * For the TOS/FLOWLABEL stuff you
5377					 * set it with the options on the
5378					 * socket
5379					 */
5380					if (paddrp->spp_pathmaxrxt != 0) {
5381						inp->sctp_ep.def_net_failure = paddrp->spp_pathmaxrxt;
5382					}
5383					if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO)
5384						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
5385					else if (paddrp->spp_hbinterval != 0) {
5386						if (paddrp->spp_hbinterval > SCTP_MAX_HB_INTERVAL)
5387							paddrp->spp_hbinterval = SCTP_MAX_HB_INTERVAL;
5388						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = MSEC_TO_TICKS(paddrp->spp_hbinterval);
5389					}
5390					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5391						if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5392							inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
5393						} else if (paddrp->spp_hbinterval) {
5394							inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = MSEC_TO_TICKS(paddrp->spp_hbinterval);
5395						}
5396						sctp_feature_off(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5397					} else if (paddrp->spp_flags & SPP_HB_DISABLE) {
5398						sctp_feature_on(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5399					}
5400					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5401						sctp_feature_off(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5402					} else if (paddrp->spp_flags & SPP_PMTUD_DISABLE) {
5403						sctp_feature_on(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5404					}
5405					if (paddrp->spp_flags & SPP_DSCP) {
5406						inp->sctp_ep.default_dscp = paddrp->spp_dscp & 0xfc;
5407						inp->sctp_ep.default_dscp |= 0x01;
5408					}
5409#ifdef INET6
5410					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5411						if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
5412							inp->sctp_ep.default_flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5413							inp->sctp_ep.default_flowlabel |= 0x80000000;
5414						}
5415					}
5416#endif
5417					SCTP_INP_WUNLOCK(inp);
5418				} else {
5419					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5420					error = EINVAL;
5421				}
5422			}
5423			break;
5424		}
5425	case SCTP_RTOINFO:
5426		{
5427			struct sctp_rtoinfo *srto;
5428			uint32_t new_init, new_min, new_max;
5429
5430			SCTP_CHECK_AND_CAST(srto, optval, struct sctp_rtoinfo, optsize);
5431			SCTP_FIND_STCB(inp, stcb, srto->srto_assoc_id);
5432
5433			if (stcb) {
5434				if (srto->srto_initial)
5435					new_init = srto->srto_initial;
5436				else
5437					new_init = stcb->asoc.initial_rto;
5438				if (srto->srto_max)
5439					new_max = srto->srto_max;
5440				else
5441					new_max = stcb->asoc.maxrto;
5442				if (srto->srto_min)
5443					new_min = srto->srto_min;
5444				else
5445					new_min = stcb->asoc.minrto;
5446				if ((new_min <= new_init) && (new_init <= new_max)) {
5447					stcb->asoc.initial_rto = new_init;
5448					stcb->asoc.maxrto = new_max;
5449					stcb->asoc.minrto = new_min;
5450				} else {
5451					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5452					error = EINVAL;
5453				}
5454				SCTP_TCB_UNLOCK(stcb);
5455			} else {
5456				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5457				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5458				    (srto->srto_assoc_id == SCTP_FUTURE_ASSOC)) {
5459					SCTP_INP_WLOCK(inp);
5460					if (srto->srto_initial)
5461						new_init = srto->srto_initial;
5462					else
5463						new_init = inp->sctp_ep.initial_rto;
5464					if (srto->srto_max)
5465						new_max = srto->srto_max;
5466					else
5467						new_max = inp->sctp_ep.sctp_maxrto;
5468					if (srto->srto_min)
5469						new_min = srto->srto_min;
5470					else
5471						new_min = inp->sctp_ep.sctp_minrto;
5472					if ((new_min <= new_init) && (new_init <= new_max)) {
5473						inp->sctp_ep.initial_rto = new_init;
5474						inp->sctp_ep.sctp_maxrto = new_max;
5475						inp->sctp_ep.sctp_minrto = new_min;
5476					} else {
5477						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5478						error = EINVAL;
5479					}
5480					SCTP_INP_WUNLOCK(inp);
5481				} else {
5482					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5483					error = EINVAL;
5484				}
5485			}
5486			break;
5487		}
5488	case SCTP_ASSOCINFO:
5489		{
5490			struct sctp_assocparams *sasoc;
5491
5492			SCTP_CHECK_AND_CAST(sasoc, optval, struct sctp_assocparams, optsize);
5493			SCTP_FIND_STCB(inp, stcb, sasoc->sasoc_assoc_id);
5494			if (sasoc->sasoc_cookie_life) {
5495				/* boundary check the cookie life */
5496				if (sasoc->sasoc_cookie_life < 1000)
5497					sasoc->sasoc_cookie_life = 1000;
5498				if (sasoc->sasoc_cookie_life > SCTP_MAX_COOKIE_LIFE) {
5499					sasoc->sasoc_cookie_life = SCTP_MAX_COOKIE_LIFE;
5500				}
5501			}
5502			if (stcb) {
5503				if (sasoc->sasoc_asocmaxrxt)
5504					stcb->asoc.max_send_times = sasoc->sasoc_asocmaxrxt;
5505				if (sasoc->sasoc_cookie_life) {
5506					stcb->asoc.cookie_life = MSEC_TO_TICKS(sasoc->sasoc_cookie_life);
5507				}
5508				SCTP_TCB_UNLOCK(stcb);
5509			} else {
5510				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5511				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5512				    (sasoc->sasoc_assoc_id == SCTP_FUTURE_ASSOC)) {
5513					SCTP_INP_WLOCK(inp);
5514					if (sasoc->sasoc_asocmaxrxt)
5515						inp->sctp_ep.max_send_times = sasoc->sasoc_asocmaxrxt;
5516					if (sasoc->sasoc_cookie_life) {
5517						inp->sctp_ep.def_cookie_life = MSEC_TO_TICKS(sasoc->sasoc_cookie_life);
5518					}
5519					SCTP_INP_WUNLOCK(inp);
5520				} else {
5521					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5522					error = EINVAL;
5523				}
5524			}
5525			break;
5526		}
5527	case SCTP_INITMSG:
5528		{
5529			struct sctp_initmsg *sinit;
5530
5531			SCTP_CHECK_AND_CAST(sinit, optval, struct sctp_initmsg, optsize);
5532			SCTP_INP_WLOCK(inp);
5533			if (sinit->sinit_num_ostreams)
5534				inp->sctp_ep.pre_open_stream_count = sinit->sinit_num_ostreams;
5535
5536			if (sinit->sinit_max_instreams)
5537				inp->sctp_ep.max_open_streams_intome = sinit->sinit_max_instreams;
5538
5539			if (sinit->sinit_max_attempts)
5540				inp->sctp_ep.max_init_times = sinit->sinit_max_attempts;
5541
5542			if (sinit->sinit_max_init_timeo)
5543				inp->sctp_ep.initial_init_rto_max = sinit->sinit_max_init_timeo;
5544			SCTP_INP_WUNLOCK(inp);
5545			break;
5546		}
5547	case SCTP_PRIMARY_ADDR:
5548		{
5549			struct sctp_setprim *spa;
5550			struct sctp_nets *net;
5551			struct sockaddr *addr;
5552
5553#if defined(INET) && defined(INET6)
5554			struct sockaddr_in sin_store;
5555
5556#endif
5557
5558			SCTP_CHECK_AND_CAST(spa, optval, struct sctp_setprim, optsize);
5559			SCTP_FIND_STCB(inp, stcb, spa->ssp_assoc_id);
5560
5561#if defined(INET) && defined(INET6)
5562			if (spa->ssp_addr.ss_family == AF_INET6) {
5563				struct sockaddr_in6 *sin6;
5564
5565				sin6 = (struct sockaddr_in6 *)&spa->ssp_addr;
5566				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5567					in6_sin6_2_sin(&sin_store, sin6);
5568					addr = (struct sockaddr *)&sin_store;
5569				} else {
5570					addr = (struct sockaddr *)&spa->ssp_addr;
5571				}
5572			} else {
5573				addr = (struct sockaddr *)&spa->ssp_addr;
5574			}
5575#else
5576			addr = (struct sockaddr *)&spa->ssp_addr;
5577#endif
5578			if (stcb != NULL) {
5579				net = sctp_findnet(stcb, addr);
5580			} else {
5581				/*
5582				 * We increment here since
5583				 * sctp_findassociation_ep_addr() wil do a
5584				 * decrement if it finds the stcb as long as
5585				 * the locked tcb (last argument) is NOT a
5586				 * TCB.. aka NULL.
5587				 */
5588				net = NULL;
5589				SCTP_INP_INCR_REF(inp);
5590				stcb = sctp_findassociation_ep_addr(&inp, addr,
5591				    &net, NULL, NULL);
5592				if (stcb == NULL) {
5593					SCTP_INP_DECR_REF(inp);
5594				}
5595			}
5596
5597			if ((stcb != NULL) && (net != NULL)) {
5598				if ((net != stcb->asoc.primary_destination) &&
5599				    (!(net->dest_state & SCTP_ADDR_UNCONFIRMED))) {
5600					/* Ok we need to set it */
5601					if (sctp_set_primary_addr(stcb, (struct sockaddr *)NULL, net) == 0) {
5602						if ((stcb->asoc.alternate) &&
5603						    (!(net->dest_state & SCTP_ADDR_PF)) &&
5604						    (net->dest_state & SCTP_ADDR_REACHABLE)) {
5605							sctp_free_remote_addr(stcb->asoc.alternate);
5606							stcb->asoc.alternate = NULL;
5607						}
5608					}
5609				}
5610			} else {
5611				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5612				error = EINVAL;
5613			}
5614			if (stcb != NULL) {
5615				SCTP_TCB_UNLOCK(stcb);
5616			}
5617			break;
5618		}
5619	case SCTP_SET_DYNAMIC_PRIMARY:
5620		{
5621			union sctp_sockstore *ss;
5622
5623			error = priv_check(curthread,
5624			    PRIV_NETINET_RESERVEDPORT);
5625			if (error)
5626				break;
5627
5628			SCTP_CHECK_AND_CAST(ss, optval, union sctp_sockstore, optsize);
5629			/* SUPER USER CHECK? */
5630			error = sctp_dynamic_set_primary(&ss->sa, vrf_id);
5631			break;
5632		}
5633	case SCTP_SET_PEER_PRIMARY_ADDR:
5634		{
5635			struct sctp_setpeerprim *sspp;
5636			struct sockaddr *addr;
5637
5638#if defined(INET) && defined(INET6)
5639			struct sockaddr_in sin_store;
5640
5641#endif
5642
5643			SCTP_CHECK_AND_CAST(sspp, optval, struct sctp_setpeerprim, optsize);
5644			SCTP_FIND_STCB(inp, stcb, sspp->sspp_assoc_id);
5645			if (stcb != NULL) {
5646				struct sctp_ifa *ifa;
5647
5648#if defined(INET) && defined(INET6)
5649				if (sspp->sspp_addr.ss_family == AF_INET6) {
5650					struct sockaddr_in6 *sin6;
5651
5652					sin6 = (struct sockaddr_in6 *)&sspp->sspp_addr;
5653					if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5654						in6_sin6_2_sin(&sin_store, sin6);
5655						addr = (struct sockaddr *)&sin_store;
5656					} else {
5657						addr = (struct sockaddr *)&sspp->sspp_addr;
5658					}
5659				} else {
5660					addr = (struct sockaddr *)&sspp->sspp_addr;
5661				}
5662#else
5663				addr = (struct sockaddr *)&sspp->sspp_addr;
5664#endif
5665				ifa = sctp_find_ifa_by_addr(addr, stcb->asoc.vrf_id, SCTP_ADDR_NOT_LOCKED);
5666				if (ifa == NULL) {
5667					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5668					error = EINVAL;
5669					goto out_of_it;
5670				}
5671				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
5672					/*
5673					 * Must validate the ifa found is in
5674					 * our ep
5675					 */
5676					struct sctp_laddr *laddr;
5677					int found = 0;
5678
5679					LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
5680						if (laddr->ifa == NULL) {
5681							SCTPDBG(SCTP_DEBUG_OUTPUT1, "%s: NULL ifa\n",
5682							    __FUNCTION__);
5683							continue;
5684						}
5685						if (laddr->ifa == ifa) {
5686							found = 1;
5687							break;
5688						}
5689					}
5690					if (!found) {
5691						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5692						error = EINVAL;
5693						goto out_of_it;
5694					}
5695				} else {
5696					switch (addr->sa_family) {
5697#ifdef INET
5698					case AF_INET:
5699						{
5700							struct sockaddr_in *sin;
5701
5702							sin = (struct sockaddr_in *)addr;
5703							if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
5704							    &sin->sin_addr) != 0) {
5705								SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5706								error = EINVAL;
5707								goto out_of_it;
5708							}
5709							break;
5710						}
5711#endif
5712#ifdef INET6
5713					case AF_INET6:
5714						{
5715							struct sockaddr_in6 *sin6;
5716
5717							sin6 = (struct sockaddr_in6 *)addr;
5718							if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
5719							    &sin6->sin6_addr) != 0) {
5720								SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5721								error = EINVAL;
5722								goto out_of_it;
5723							}
5724							break;
5725						}
5726#endif
5727					default:
5728						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5729						error = EINVAL;
5730						goto out_of_it;
5731					}
5732				}
5733				if (sctp_set_primary_ip_address_sa(stcb, addr) != 0) {
5734					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5735					error = EINVAL;
5736				}
5737		out_of_it:
5738				SCTP_TCB_UNLOCK(stcb);
5739			} else {
5740				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5741				error = EINVAL;
5742			}
5743			break;
5744		}
5745	case SCTP_BINDX_ADD_ADDR:
5746		{
5747			struct sctp_getaddresses *addrs;
5748			struct thread *td;
5749
5750			td = (struct thread *)p;
5751			SCTP_CHECK_AND_CAST(addrs, optval, struct sctp_getaddresses,
5752			    optsize);
5753#ifdef INET
5754			if (addrs->addr->sa_family == AF_INET) {
5755				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in)) {
5756					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5757					error = EINVAL;
5758					break;
5759				}
5760				if (td != NULL && (error = prison_local_ip4(td->td_ucred, &(((struct sockaddr_in *)(addrs->addr))->sin_addr)))) {
5761					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5762					break;
5763				}
5764			} else
5765#endif
5766#ifdef INET6
5767			if (addrs->addr->sa_family == AF_INET6) {
5768				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in6)) {
5769					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5770					error = EINVAL;
5771					break;
5772				}
5773				if (td != NULL && (error = prison_local_ip6(td->td_ucred, &(((struct sockaddr_in6 *)(addrs->addr))->sin6_addr),
5774				    (SCTP_IPV6_V6ONLY(inp) != 0))) != 0) {
5775					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5776					break;
5777				}
5778			} else
5779#endif
5780			{
5781				error = EAFNOSUPPORT;
5782				break;
5783			}
5784			sctp_bindx_add_address(so, inp, addrs->addr,
5785			    addrs->sget_assoc_id, vrf_id,
5786			    &error, p);
5787			break;
5788		}
5789	case SCTP_BINDX_REM_ADDR:
5790		{
5791			struct sctp_getaddresses *addrs;
5792			struct thread *td;
5793
5794			td = (struct thread *)p;
5795
5796			SCTP_CHECK_AND_CAST(addrs, optval, struct sctp_getaddresses, optsize);
5797#ifdef INET
5798			if (addrs->addr->sa_family == AF_INET) {
5799				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in)) {
5800					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5801					error = EINVAL;
5802					break;
5803				}
5804				if (td != NULL && (error = prison_local_ip4(td->td_ucred, &(((struct sockaddr_in *)(addrs->addr))->sin_addr)))) {
5805					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5806					break;
5807				}
5808			} else
5809#endif
5810#ifdef INET6
5811			if (addrs->addr->sa_family == AF_INET6) {
5812				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in6)) {
5813					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5814					error = EINVAL;
5815					break;
5816				}
5817				if (td != NULL &&
5818				    (error = prison_local_ip6(td->td_ucred,
5819				    &(((struct sockaddr_in6 *)(addrs->addr))->sin6_addr),
5820				    (SCTP_IPV6_V6ONLY(inp) != 0))) != 0) {
5821					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5822					break;
5823				}
5824			} else
5825#endif
5826			{
5827				error = EAFNOSUPPORT;
5828				break;
5829			}
5830			sctp_bindx_delete_address(inp, addrs->addr,
5831			    addrs->sget_assoc_id, vrf_id,
5832			    &error);
5833			break;
5834		}
5835	case SCTP_EVENT:
5836		{
5837			struct sctp_event *event;
5838			uint32_t event_type;
5839
5840			SCTP_CHECK_AND_CAST(event, optval, struct sctp_event, optsize);
5841			SCTP_FIND_STCB(inp, stcb, event->se_assoc_id);
5842			switch (event->se_type) {
5843			case SCTP_ASSOC_CHANGE:
5844				event_type = SCTP_PCB_FLAGS_RECVASSOCEVNT;
5845				break;
5846			case SCTP_PEER_ADDR_CHANGE:
5847				event_type = SCTP_PCB_FLAGS_RECVPADDREVNT;
5848				break;
5849			case SCTP_REMOTE_ERROR:
5850				event_type = SCTP_PCB_FLAGS_RECVPEERERR;
5851				break;
5852			case SCTP_SEND_FAILED:
5853				event_type = SCTP_PCB_FLAGS_RECVSENDFAILEVNT;
5854				break;
5855			case SCTP_SHUTDOWN_EVENT:
5856				event_type = SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT;
5857				break;
5858			case SCTP_ADAPTATION_INDICATION:
5859				event_type = SCTP_PCB_FLAGS_ADAPTATIONEVNT;
5860				break;
5861			case SCTP_PARTIAL_DELIVERY_EVENT:
5862				event_type = SCTP_PCB_FLAGS_PDAPIEVNT;
5863				break;
5864			case SCTP_AUTHENTICATION_EVENT:
5865				event_type = SCTP_PCB_FLAGS_AUTHEVNT;
5866				break;
5867			case SCTP_STREAM_RESET_EVENT:
5868				event_type = SCTP_PCB_FLAGS_STREAM_RESETEVNT;
5869				break;
5870			case SCTP_SENDER_DRY_EVENT:
5871				event_type = SCTP_PCB_FLAGS_DRYEVNT;
5872				break;
5873			case SCTP_NOTIFICATIONS_STOPPED_EVENT:
5874				event_type = 0;
5875				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
5876				error = ENOTSUP;
5877				break;
5878			case SCTP_ASSOC_RESET_EVENT:
5879				event_type = SCTP_PCB_FLAGS_ASSOC_RESETEVNT;
5880				break;
5881			case SCTP_STREAM_CHANGE_EVENT:
5882				event_type = SCTP_PCB_FLAGS_STREAM_CHANGEEVNT;
5883				break;
5884			case SCTP_SEND_FAILED_EVENT:
5885				event_type = SCTP_PCB_FLAGS_RECVNSENDFAILEVNT;
5886				break;
5887			default:
5888				event_type = 0;
5889				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5890				error = EINVAL;
5891				break;
5892			}
5893			if (event_type > 0) {
5894				if (stcb) {
5895					if (event->se_on) {
5896						sctp_stcb_feature_on(inp, stcb, event_type);
5897						if (event_type == SCTP_PCB_FLAGS_DRYEVNT) {
5898							if (TAILQ_EMPTY(&stcb->asoc.send_queue) &&
5899							    TAILQ_EMPTY(&stcb->asoc.sent_queue) &&
5900							    (stcb->asoc.stream_queue_cnt == 0)) {
5901								sctp_ulp_notify(SCTP_NOTIFY_SENDER_DRY, stcb, 0, NULL, SCTP_SO_LOCKED);
5902							}
5903						}
5904					} else {
5905						sctp_stcb_feature_off(inp, stcb, event_type);
5906					}
5907					SCTP_TCB_UNLOCK(stcb);
5908				} else {
5909					/*
5910					 * We don't want to send up a storm
5911					 * of events, so return an error for
5912					 * sender dry events
5913					 */
5914					if ((event_type == SCTP_PCB_FLAGS_DRYEVNT) &&
5915					    ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) == 0) &&
5916					    ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) == 0) &&
5917					    ((event->se_assoc_id == SCTP_ALL_ASSOC) ||
5918					    (event->se_assoc_id == SCTP_CURRENT_ASSOC))) {
5919						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
5920						error = ENOTSUP;
5921						break;
5922					}
5923					if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5924					    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5925					    (event->se_assoc_id == SCTP_FUTURE_ASSOC) ||
5926					    (event->se_assoc_id == SCTP_ALL_ASSOC)) {
5927						SCTP_INP_WLOCK(inp);
5928						if (event->se_on) {
5929							sctp_feature_on(inp, event_type);
5930						} else {
5931							sctp_feature_off(inp, event_type);
5932						}
5933						SCTP_INP_WUNLOCK(inp);
5934					}
5935					if ((event->se_assoc_id == SCTP_CURRENT_ASSOC) ||
5936					    (event->se_assoc_id == SCTP_ALL_ASSOC)) {
5937						SCTP_INP_RLOCK(inp);
5938						LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
5939							SCTP_TCB_LOCK(stcb);
5940							if (event->se_on) {
5941								sctp_stcb_feature_on(inp, stcb, event_type);
5942							} else {
5943								sctp_stcb_feature_off(inp, stcb, event_type);
5944							}
5945							SCTP_TCB_UNLOCK(stcb);
5946						}
5947						SCTP_INP_RUNLOCK(inp);
5948					}
5949				}
5950			}
5951			break;
5952		}
5953	case SCTP_RECVRCVINFO:
5954		{
5955			int *onoff;
5956
5957			SCTP_CHECK_AND_CAST(onoff, optval, int, optsize);
5958			SCTP_INP_WLOCK(inp);
5959			if (*onoff != 0) {
5960				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
5961			} else {
5962				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
5963			}
5964			SCTP_INP_WUNLOCK(inp);
5965			break;
5966		}
5967	case SCTP_RECVNXTINFO:
5968		{
5969			int *onoff;
5970
5971			SCTP_CHECK_AND_CAST(onoff, optval, int, optsize);
5972			SCTP_INP_WLOCK(inp);
5973			if (*onoff != 0) {
5974				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
5975			} else {
5976				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
5977			}
5978			SCTP_INP_WUNLOCK(inp);
5979			break;
5980		}
5981	case SCTP_DEFAULT_SNDINFO:
5982		{
5983			struct sctp_sndinfo *info;
5984			uint16_t policy;
5985
5986			SCTP_CHECK_AND_CAST(info, optval, struct sctp_sndinfo, optsize);
5987			SCTP_FIND_STCB(inp, stcb, info->snd_assoc_id);
5988
5989			if (stcb) {
5990				if (info->snd_sid < stcb->asoc.streamoutcnt) {
5991					stcb->asoc.def_send.sinfo_stream = info->snd_sid;
5992					policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
5993					stcb->asoc.def_send.sinfo_flags = info->snd_flags;
5994					stcb->asoc.def_send.sinfo_flags |= policy;
5995					stcb->asoc.def_send.sinfo_ppid = info->snd_ppid;
5996					stcb->asoc.def_send.sinfo_context = info->snd_context;
5997				} else {
5998					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5999					error = EINVAL;
6000				}
6001				SCTP_TCB_UNLOCK(stcb);
6002			} else {
6003				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6004				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6005				    (info->snd_assoc_id == SCTP_FUTURE_ASSOC) ||
6006				    (info->snd_assoc_id == SCTP_ALL_ASSOC)) {
6007					SCTP_INP_WLOCK(inp);
6008					inp->def_send.sinfo_stream = info->snd_sid;
6009					policy = PR_SCTP_POLICY(inp->def_send.sinfo_flags);
6010					inp->def_send.sinfo_flags = info->snd_flags;
6011					inp->def_send.sinfo_flags |= policy;
6012					inp->def_send.sinfo_ppid = info->snd_ppid;
6013					inp->def_send.sinfo_context = info->snd_context;
6014					SCTP_INP_WUNLOCK(inp);
6015				}
6016				if ((info->snd_assoc_id == SCTP_CURRENT_ASSOC) ||
6017				    (info->snd_assoc_id == SCTP_ALL_ASSOC)) {
6018					SCTP_INP_RLOCK(inp);
6019					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
6020						SCTP_TCB_LOCK(stcb);
6021						if (info->snd_sid < stcb->asoc.streamoutcnt) {
6022							stcb->asoc.def_send.sinfo_stream = info->snd_sid;
6023							policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
6024							stcb->asoc.def_send.sinfo_flags = info->snd_flags;
6025							stcb->asoc.def_send.sinfo_flags |= policy;
6026							stcb->asoc.def_send.sinfo_ppid = info->snd_ppid;
6027							stcb->asoc.def_send.sinfo_context = info->snd_context;
6028						}
6029						SCTP_TCB_UNLOCK(stcb);
6030					}
6031					SCTP_INP_RUNLOCK(inp);
6032				}
6033			}
6034			break;
6035		}
6036	case SCTP_DEFAULT_PRINFO:
6037		{
6038			struct sctp_default_prinfo *info;
6039
6040			SCTP_CHECK_AND_CAST(info, optval, struct sctp_default_prinfo, optsize);
6041			SCTP_FIND_STCB(inp, stcb, info->pr_assoc_id);
6042
6043			if (info->pr_policy > SCTP_PR_SCTP_MAX) {
6044				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6045				error = EINVAL;
6046				break;
6047			}
6048			if (stcb) {
6049				stcb->asoc.def_send.sinfo_flags &= 0xfff0;
6050				stcb->asoc.def_send.sinfo_flags |= info->pr_policy;
6051				stcb->asoc.def_send.sinfo_timetolive = info->pr_value;
6052				SCTP_TCB_UNLOCK(stcb);
6053			} else {
6054				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6055				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6056				    (info->pr_assoc_id == SCTP_FUTURE_ASSOC) ||
6057				    (info->pr_assoc_id == SCTP_ALL_ASSOC)) {
6058					SCTP_INP_WLOCK(inp);
6059					inp->def_send.sinfo_flags &= 0xfff0;
6060					inp->def_send.sinfo_flags |= info->pr_policy;
6061					inp->def_send.sinfo_timetolive = info->pr_value;
6062					SCTP_INP_WUNLOCK(inp);
6063				}
6064				if ((info->pr_assoc_id == SCTP_CURRENT_ASSOC) ||
6065				    (info->pr_assoc_id == SCTP_ALL_ASSOC)) {
6066					SCTP_INP_RLOCK(inp);
6067					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
6068						SCTP_TCB_LOCK(stcb);
6069						stcb->asoc.def_send.sinfo_flags &= 0xfff0;
6070						stcb->asoc.def_send.sinfo_flags |= info->pr_policy;
6071						stcb->asoc.def_send.sinfo_timetolive = info->pr_value;
6072						SCTP_TCB_UNLOCK(stcb);
6073					}
6074					SCTP_INP_RUNLOCK(inp);
6075				}
6076			}
6077			break;
6078		}
6079	case SCTP_PEER_ADDR_THLDS:
6080		/* Applies to the specific association */
6081		{
6082			struct sctp_paddrthlds *thlds;
6083			struct sctp_nets *net;
6084			struct sockaddr *addr;
6085
6086#if defined(INET) && defined(INET6)
6087			struct sockaddr_in sin_store;
6088
6089#endif
6090
6091			SCTP_CHECK_AND_CAST(thlds, optval, struct sctp_paddrthlds, optsize);
6092			SCTP_FIND_STCB(inp, stcb, thlds->spt_assoc_id);
6093
6094#if defined(INET) && defined(INET6)
6095			if (thlds->spt_address.ss_family == AF_INET6) {
6096				struct sockaddr_in6 *sin6;
6097
6098				sin6 = (struct sockaddr_in6 *)&thlds->spt_address;
6099				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
6100					in6_sin6_2_sin(&sin_store, sin6);
6101					addr = (struct sockaddr *)&sin_store;
6102				} else {
6103					addr = (struct sockaddr *)&thlds->spt_address;
6104				}
6105			} else {
6106				addr = (struct sockaddr *)&thlds->spt_address;
6107			}
6108#else
6109			addr = (struct sockaddr *)&thlds->spt_address;
6110#endif
6111			if (stcb != NULL) {
6112				net = sctp_findnet(stcb, addr);
6113			} else {
6114				/*
6115				 * We increment here since
6116				 * sctp_findassociation_ep_addr() wil do a
6117				 * decrement if it finds the stcb as long as
6118				 * the locked tcb (last argument) is NOT a
6119				 * TCB.. aka NULL.
6120				 */
6121				net = NULL;
6122				SCTP_INP_INCR_REF(inp);
6123				stcb = sctp_findassociation_ep_addr(&inp, addr,
6124				    &net, NULL, NULL);
6125				if (stcb == NULL) {
6126					SCTP_INP_DECR_REF(inp);
6127				}
6128			}
6129			if ((stcb != NULL) && (net == NULL)) {
6130#ifdef INET
6131				if (addr->sa_family == AF_INET) {
6132
6133					struct sockaddr_in *sin;
6134
6135					sin = (struct sockaddr_in *)addr;
6136					if (sin->sin_addr.s_addr != INADDR_ANY) {
6137						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6138						SCTP_TCB_UNLOCK(stcb);
6139						error = EINVAL;
6140						break;
6141					}
6142				} else
6143#endif
6144#ifdef INET6
6145				if (addr->sa_family == AF_INET6) {
6146					struct sockaddr_in6 *sin6;
6147
6148					sin6 = (struct sockaddr_in6 *)addr;
6149					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
6150						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6151						SCTP_TCB_UNLOCK(stcb);
6152						error = EINVAL;
6153						break;
6154					}
6155				} else
6156#endif
6157				{
6158					error = EAFNOSUPPORT;
6159					SCTP_TCB_UNLOCK(stcb);
6160					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6161					break;
6162				}
6163			}
6164			if (stcb != NULL) {
6165				if (net != NULL) {
6166					if (net->dest_state & SCTP_ADDR_PF) {
6167						if ((net->failure_threshold > thlds->spt_pathmaxrxt) ||
6168						    (net->failure_threshold <= thlds->spt_pathpfthld)) {
6169							net->dest_state &= ~SCTP_ADDR_PF;
6170						}
6171					} else {
6172						if ((net->failure_threshold > thlds->spt_pathpfthld) &&
6173						    (net->failure_threshold <= thlds->spt_pathmaxrxt)) {
6174							net->dest_state |= SCTP_ADDR_PF;
6175							sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
6176							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
6177							sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
6178						}
6179					}
6180					if (net->dest_state & SCTP_ADDR_REACHABLE) {
6181						if (net->failure_threshold > thlds->spt_pathmaxrxt) {
6182							net->dest_state &= ~SCTP_ADDR_REACHABLE;
6183							sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
6184						}
6185					} else {
6186						if (net->failure_threshold <= thlds->spt_pathmaxrxt) {
6187							net->dest_state |= SCTP_ADDR_REACHABLE;
6188							sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
6189						}
6190					}
6191					net->failure_threshold = thlds->spt_pathmaxrxt;
6192					net->pf_threshold = thlds->spt_pathpfthld;
6193				} else {
6194					TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
6195						if (net->dest_state & SCTP_ADDR_PF) {
6196							if ((net->failure_threshold > thlds->spt_pathmaxrxt) ||
6197							    (net->failure_threshold <= thlds->spt_pathpfthld)) {
6198								net->dest_state &= ~SCTP_ADDR_PF;
6199							}
6200						} else {
6201							if ((net->failure_threshold > thlds->spt_pathpfthld) &&
6202							    (net->failure_threshold <= thlds->spt_pathmaxrxt)) {
6203								net->dest_state |= SCTP_ADDR_PF;
6204								sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
6205								sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
6206								sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
6207							}
6208						}
6209						if (net->dest_state & SCTP_ADDR_REACHABLE) {
6210							if (net->failure_threshold > thlds->spt_pathmaxrxt) {
6211								net->dest_state &= ~SCTP_ADDR_REACHABLE;
6212								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
6213							}
6214						} else {
6215							if (net->failure_threshold <= thlds->spt_pathmaxrxt) {
6216								net->dest_state |= SCTP_ADDR_REACHABLE;
6217								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
6218							}
6219						}
6220						net->failure_threshold = thlds->spt_pathmaxrxt;
6221						net->pf_threshold = thlds->spt_pathpfthld;
6222					}
6223					stcb->asoc.def_net_failure = thlds->spt_pathmaxrxt;
6224					stcb->asoc.def_net_pf_threshold = thlds->spt_pathpfthld;
6225				}
6226			} else {
6227				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6228				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6229				    (thlds->spt_assoc_id == SCTP_FUTURE_ASSOC)) {
6230					SCTP_INP_WLOCK(inp);
6231					inp->sctp_ep.def_net_failure = thlds->spt_pathmaxrxt;
6232					inp->sctp_ep.def_net_pf_threshold = thlds->spt_pathpfthld;
6233					SCTP_INP_WUNLOCK(inp);
6234				} else {
6235					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6236					error = EINVAL;
6237				}
6238			}
6239			break;
6240		}
6241	case SCTP_REMOTE_UDP_ENCAPS_PORT:
6242		{
6243			struct sctp_udpencaps *encaps;
6244			struct sctp_nets *net;
6245			struct sockaddr *addr;
6246
6247#if defined(INET) && defined(INET6)
6248			struct sockaddr_in sin_store;
6249
6250#endif
6251
6252			SCTP_CHECK_AND_CAST(encaps, optval, struct sctp_udpencaps, optsize);
6253			SCTP_FIND_STCB(inp, stcb, encaps->sue_assoc_id);
6254
6255#if defined(INET) && defined(INET6)
6256			if (encaps->sue_address.ss_family == AF_INET6) {
6257				struct sockaddr_in6 *sin6;
6258
6259				sin6 = (struct sockaddr_in6 *)&encaps->sue_address;
6260				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
6261					in6_sin6_2_sin(&sin_store, sin6);
6262					addr = (struct sockaddr *)&sin_store;
6263				} else {
6264					addr = (struct sockaddr *)&encaps->sue_address;
6265				}
6266			} else {
6267				addr = (struct sockaddr *)&encaps->sue_address;
6268			}
6269#else
6270			addr = (struct sockaddr *)&encaps->sue_address;
6271#endif
6272			if (stcb != NULL) {
6273				net = sctp_findnet(stcb, addr);
6274			} else {
6275				/*
6276				 * We increment here since
6277				 * sctp_findassociation_ep_addr() wil do a
6278				 * decrement if it finds the stcb as long as
6279				 * the locked tcb (last argument) is NOT a
6280				 * TCB.. aka NULL.
6281				 */
6282				net = NULL;
6283				SCTP_INP_INCR_REF(inp);
6284				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
6285				if (stcb == NULL) {
6286					SCTP_INP_DECR_REF(inp);
6287				}
6288			}
6289			if ((stcb != NULL) && (net == NULL)) {
6290#ifdef INET
6291				if (addr->sa_family == AF_INET) {
6292
6293					struct sockaddr_in *sin;
6294
6295					sin = (struct sockaddr_in *)addr;
6296					if (sin->sin_addr.s_addr != INADDR_ANY) {
6297						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6298						SCTP_TCB_UNLOCK(stcb);
6299						error = EINVAL;
6300						break;
6301					}
6302				} else
6303#endif
6304#ifdef INET6
6305				if (addr->sa_family == AF_INET6) {
6306					struct sockaddr_in6 *sin6;
6307
6308					sin6 = (struct sockaddr_in6 *)addr;
6309					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
6310						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6311						SCTP_TCB_UNLOCK(stcb);
6312						error = EINVAL;
6313						break;
6314					}
6315				} else
6316#endif
6317				{
6318					error = EAFNOSUPPORT;
6319					SCTP_TCB_UNLOCK(stcb);
6320					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6321					break;
6322				}
6323			}
6324			if (stcb != NULL) {
6325				if (net != NULL) {
6326					net->port = encaps->sue_port;
6327				} else {
6328					stcb->asoc.port = encaps->sue_port;
6329				}
6330				SCTP_TCB_UNLOCK(stcb);
6331			} else {
6332				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6333				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6334				    (encaps->sue_assoc_id == SCTP_FUTURE_ASSOC)) {
6335					SCTP_INP_WLOCK(inp);
6336					inp->sctp_ep.port = encaps->sue_port;
6337					SCTP_INP_WUNLOCK(inp);
6338				} else {
6339					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6340					error = EINVAL;
6341				}
6342			}
6343			break;
6344		}
6345	case SCTP_ECN_SUPPORTED:
6346		{
6347			struct sctp_assoc_value *av;
6348
6349			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6350			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6351
6352			if (stcb) {
6353				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6354				error = EINVAL;
6355				SCTP_TCB_UNLOCK(stcb);
6356			} else {
6357				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6358				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6359				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6360					SCTP_INP_WLOCK(inp);
6361					if (av->assoc_value == 0) {
6362						inp->ecn_supported = 0;
6363					} else {
6364						inp->ecn_supported = 1;
6365					}
6366					SCTP_INP_WUNLOCK(inp);
6367				} else {
6368					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6369					error = EINVAL;
6370				}
6371			}
6372			break;
6373		}
6374	case SCTP_PR_SUPPORTED:
6375		{
6376			struct sctp_assoc_value *av;
6377
6378			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6379			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6380
6381			if (stcb) {
6382				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6383				error = EINVAL;
6384				SCTP_TCB_UNLOCK(stcb);
6385			} else {
6386				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6387				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6388				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6389					SCTP_INP_WLOCK(inp);
6390					if (av->assoc_value == 0) {
6391						inp->prsctp_supported = 0;
6392					} else {
6393						inp->prsctp_supported = 1;
6394					}
6395					SCTP_INP_WUNLOCK(inp);
6396				} else {
6397					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6398					error = EINVAL;
6399				}
6400			}
6401			break;
6402		}
6403	case SCTP_AUTH_SUPPORTED:
6404		{
6405			struct sctp_assoc_value *av;
6406
6407			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6408			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6409
6410			if (stcb) {
6411				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6412				error = EINVAL;
6413				SCTP_TCB_UNLOCK(stcb);
6414			} else {
6415				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6416				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6417				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6418					if ((av->assoc_value == 0) &&
6419					    (inp->asconf_supported == 1)) {
6420						/*
6421						 * AUTH is required for
6422						 * ASCONF
6423						 */
6424						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6425						error = EINVAL;
6426					} else {
6427						SCTP_INP_WLOCK(inp);
6428						if (av->assoc_value == 0) {
6429							inp->auth_supported = 0;
6430						} else {
6431							inp->auth_supported = 1;
6432						}
6433						SCTP_INP_WUNLOCK(inp);
6434					}
6435				} else {
6436					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6437					error = EINVAL;
6438				}
6439			}
6440			break;
6441		}
6442	case SCTP_ASCONF_SUPPORTED:
6443		{
6444			struct sctp_assoc_value *av;
6445
6446			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6447			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6448
6449			if (stcb) {
6450				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6451				error = EINVAL;
6452				SCTP_TCB_UNLOCK(stcb);
6453			} else {
6454				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6455				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6456				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6457					if ((av->assoc_value != 0) &&
6458					    (inp->auth_supported == 0)) {
6459						/*
6460						 * AUTH is required for
6461						 * ASCONF
6462						 */
6463						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6464						error = EINVAL;
6465					} else {
6466						SCTP_INP_WLOCK(inp);
6467						if (av->assoc_value == 0) {
6468							inp->asconf_supported = 0;
6469							sctp_auth_delete_chunk(SCTP_ASCONF,
6470							    inp->sctp_ep.local_auth_chunks);
6471							sctp_auth_delete_chunk(SCTP_ASCONF_ACK,
6472							    inp->sctp_ep.local_auth_chunks);
6473						} else {
6474							inp->asconf_supported = 1;
6475							sctp_auth_add_chunk(SCTP_ASCONF,
6476							    inp->sctp_ep.local_auth_chunks);
6477							sctp_auth_add_chunk(SCTP_ASCONF_ACK,
6478							    inp->sctp_ep.local_auth_chunks);
6479						}
6480						SCTP_INP_WUNLOCK(inp);
6481					}
6482				} else {
6483					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6484					error = EINVAL;
6485				}
6486			}
6487			break;
6488		}
6489	case SCTP_RECONFIG_SUPPORTED:
6490		{
6491			struct sctp_assoc_value *av;
6492
6493			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6494			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6495
6496			if (stcb) {
6497				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6498				error = EINVAL;
6499				SCTP_TCB_UNLOCK(stcb);
6500			} else {
6501				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6502				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6503				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6504					SCTP_INP_WLOCK(inp);
6505					if (av->assoc_value == 0) {
6506						inp->reconfig_supported = 0;
6507					} else {
6508						inp->reconfig_supported = 1;
6509					}
6510					SCTP_INP_WUNLOCK(inp);
6511				} else {
6512					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6513					error = EINVAL;
6514				}
6515			}
6516			break;
6517		}
6518	case SCTP_NRSACK_SUPPORTED:
6519		{
6520			struct sctp_assoc_value *av;
6521
6522			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6523			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6524
6525			if (stcb) {
6526				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6527				error = EINVAL;
6528				SCTP_TCB_UNLOCK(stcb);
6529			} else {
6530				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6531				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6532				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6533					SCTP_INP_WLOCK(inp);
6534					if (av->assoc_value == 0) {
6535						inp->nrsack_supported = 0;
6536					} else {
6537						inp->nrsack_supported = 1;
6538					}
6539					SCTP_INP_WUNLOCK(inp);
6540				} else {
6541					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6542					error = EINVAL;
6543				}
6544			}
6545			break;
6546		}
6547	case SCTP_PKTDROP_SUPPORTED:
6548		{
6549			struct sctp_assoc_value *av;
6550
6551			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6552			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6553
6554			if (stcb) {
6555				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6556				error = EINVAL;
6557				SCTP_TCB_UNLOCK(stcb);
6558			} else {
6559				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6560				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6561				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6562					SCTP_INP_WLOCK(inp);
6563					if (av->assoc_value == 0) {
6564						inp->pktdrop_supported = 0;
6565					} else {
6566						inp->pktdrop_supported = 1;
6567					}
6568					SCTP_INP_WUNLOCK(inp);
6569				} else {
6570					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6571					error = EINVAL;
6572				}
6573			}
6574			break;
6575		}
6576	default:
6577		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
6578		error = ENOPROTOOPT;
6579		break;
6580	}			/* end switch (opt) */
6581	return (error);
6582}
6583
6584int
6585sctp_ctloutput(struct socket *so, struct sockopt *sopt)
6586{
6587	void *optval = NULL;
6588	size_t optsize = 0;
6589	void *p;
6590	int error = 0;
6591
6592	if (sopt->sopt_level != IPPROTO_SCTP) {
6593		/* wrong proto level... send back up to IP */
6594#ifdef INET6
6595		if (INP_CHECK_SOCKAF(so, AF_INET6))
6596			error = ip6_ctloutput(so, sopt);
6597#endif				/* INET6 */
6598#if defined(INET) && defined(INET6)
6599		else
6600#endif
6601#ifdef INET
6602			error = ip_ctloutput(so, sopt);
6603#endif
6604		return (error);
6605	}
6606	optsize = sopt->sopt_valsize;
6607	if (optsize) {
6608		SCTP_MALLOC(optval, void *, optsize, SCTP_M_SOCKOPT);
6609		if (optval == NULL) {
6610			SCTP_LTRACE_ERR_RET(so->so_pcb, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOBUFS);
6611			return (ENOBUFS);
6612		}
6613		error = sooptcopyin(sopt, optval, optsize, optsize);
6614		if (error) {
6615			SCTP_FREE(optval, SCTP_M_SOCKOPT);
6616			goto out;
6617		}
6618	}
6619	p = (void *)sopt->sopt_td;
6620	if (sopt->sopt_dir == SOPT_SET) {
6621		error = sctp_setopt(so, sopt->sopt_name, optval, optsize, p);
6622	} else if (sopt->sopt_dir == SOPT_GET) {
6623		error = sctp_getopt(so, sopt->sopt_name, optval, &optsize, p);
6624	} else {
6625		SCTP_LTRACE_ERR_RET(so->so_pcb, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6626		error = EINVAL;
6627	}
6628	if ((error == 0) && (optval != NULL)) {
6629		error = sooptcopyout(sopt, optval, optsize);
6630		SCTP_FREE(optval, SCTP_M_SOCKOPT);
6631	} else if (optval != NULL) {
6632		SCTP_FREE(optval, SCTP_M_SOCKOPT);
6633	}
6634out:
6635	return (error);
6636}
6637
6638#ifdef INET
6639static int
6640sctp_connect(struct socket *so, struct sockaddr *addr, struct thread *p)
6641{
6642	int error = 0;
6643	int create_lock_on = 0;
6644	uint32_t vrf_id;
6645	struct sctp_inpcb *inp;
6646	struct sctp_tcb *stcb = NULL;
6647
6648	inp = (struct sctp_inpcb *)so->so_pcb;
6649	if (inp == NULL) {
6650		/* I made the same as TCP since we are not setup? */
6651		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6652		return (ECONNRESET);
6653	}
6654	if (addr == NULL) {
6655		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6656		return EINVAL;
6657	}
6658	switch (addr->sa_family) {
6659#ifdef INET6
6660	case AF_INET6:
6661		{
6662			struct sockaddr_in6 *sin6p;
6663
6664			if (addr->sa_len != sizeof(struct sockaddr_in6)) {
6665				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6666				return (EINVAL);
6667			}
6668			sin6p = (struct sockaddr_in6 *)addr;
6669			if (p != NULL && (error = prison_remote_ip6(p->td_ucred, &sin6p->sin6_addr)) != 0) {
6670				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6671				return (error);
6672			}
6673			break;
6674		}
6675#endif
6676#ifdef INET
6677	case AF_INET:
6678		{
6679			struct sockaddr_in *sinp;
6680
6681			if (addr->sa_len != sizeof(struct sockaddr_in)) {
6682				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6683				return (EINVAL);
6684			}
6685			sinp = (struct sockaddr_in *)addr;
6686			if (p != NULL && (error = prison_remote_ip4(p->td_ucred, &sinp->sin_addr)) != 0) {
6687				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6688				return (error);
6689			}
6690			break;
6691		}
6692#endif
6693	default:
6694		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EAFNOSUPPORT);
6695		return (EAFNOSUPPORT);
6696	}
6697	SCTP_INP_INCR_REF(inp);
6698	SCTP_ASOC_CREATE_LOCK(inp);
6699	create_lock_on = 1;
6700
6701
6702	if ((inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) ||
6703	    (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE)) {
6704		/* Should I really unlock ? */
6705		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EFAULT);
6706		error = EFAULT;
6707		goto out_now;
6708	}
6709#ifdef INET6
6710	if (((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) &&
6711	    (addr->sa_family == AF_INET6)) {
6712		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6713		error = EINVAL;
6714		goto out_now;
6715	}
6716#endif
6717	if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) ==
6718	    SCTP_PCB_FLAGS_UNBOUND) {
6719		/* Bind a ephemeral port */
6720		error = sctp_inpcb_bind(so, NULL, NULL, p);
6721		if (error) {
6722			goto out_now;
6723		}
6724	}
6725	/* Now do we connect? */
6726	if ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) &&
6727	    (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE))) {
6728		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6729		error = EINVAL;
6730		goto out_now;
6731	}
6732	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
6733	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
6734		/* We are already connected AND the TCP model */
6735		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
6736		error = EADDRINUSE;
6737		goto out_now;
6738	}
6739	if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
6740		SCTP_INP_RLOCK(inp);
6741		stcb = LIST_FIRST(&inp->sctp_asoc_list);
6742		SCTP_INP_RUNLOCK(inp);
6743	} else {
6744		/*
6745		 * We increment here since sctp_findassociation_ep_addr()
6746		 * will do a decrement if it finds the stcb as long as the
6747		 * locked tcb (last argument) is NOT a TCB.. aka NULL.
6748		 */
6749		SCTP_INP_INCR_REF(inp);
6750		stcb = sctp_findassociation_ep_addr(&inp, addr, NULL, NULL, NULL);
6751		if (stcb == NULL) {
6752			SCTP_INP_DECR_REF(inp);
6753		} else {
6754			SCTP_TCB_UNLOCK(stcb);
6755		}
6756	}
6757	if (stcb != NULL) {
6758		/* Already have or am bring up an association */
6759		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
6760		error = EALREADY;
6761		goto out_now;
6762	}
6763	vrf_id = inp->def_vrf_id;
6764	/* We are GOOD to go */
6765	stcb = sctp_aloc_assoc(inp, addr, &error, 0, vrf_id, p);
6766	if (stcb == NULL) {
6767		/* Gak! no memory */
6768		goto out_now;
6769	}
6770	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
6771		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
6772		/* Set the connected flag so we can queue data */
6773		soisconnecting(so);
6774	}
6775	SCTP_SET_STATE(&stcb->asoc, SCTP_STATE_COOKIE_WAIT);
6776	(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
6777
6778	/* initialize authentication parameters for the assoc */
6779	sctp_initialize_auth_params(inp, stcb);
6780
6781	sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
6782	SCTP_TCB_UNLOCK(stcb);
6783out_now:
6784	if (create_lock_on) {
6785		SCTP_ASOC_CREATE_UNLOCK(inp);
6786	}
6787	SCTP_INP_DECR_REF(inp);
6788	return (error);
6789}
6790
6791#endif
6792
6793int
6794sctp_listen(struct socket *so, int backlog, struct thread *p)
6795{
6796	/*
6797	 * Note this module depends on the protocol processing being called
6798	 * AFTER any socket level flags and backlog are applied to the
6799	 * socket. The traditional way that the socket flags are applied is
6800	 * AFTER protocol processing. We have made a change to the
6801	 * sys/kern/uipc_socket.c module to reverse this but this MUST be in
6802	 * place if the socket API for SCTP is to work properly.
6803	 */
6804
6805	int error = 0;
6806	struct sctp_inpcb *inp;
6807
6808	inp = (struct sctp_inpcb *)so->so_pcb;
6809	if (inp == NULL) {
6810		/* I made the same as TCP since we are not setup? */
6811		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6812		return (ECONNRESET);
6813	}
6814	if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE)) {
6815		/* See if we have a listener */
6816		struct sctp_inpcb *tinp;
6817		union sctp_sockstore store;
6818
6819		if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
6820			/* not bound all */
6821			struct sctp_laddr *laddr;
6822
6823			LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
6824				memcpy(&store, &laddr->ifa->address, sizeof(store));
6825				switch (store.sa.sa_family) {
6826#ifdef INET
6827				case AF_INET:
6828					store.sin.sin_port = inp->sctp_lport;
6829					break;
6830#endif
6831#ifdef INET6
6832				case AF_INET6:
6833					store.sin6.sin6_port = inp->sctp_lport;
6834					break;
6835#endif
6836				default:
6837					break;
6838				}
6839				tinp = sctp_pcb_findep(&store.sa, 0, 0, inp->def_vrf_id);
6840				if (tinp && (tinp != inp) &&
6841				    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) == 0) &&
6842				    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
6843				    (tinp->sctp_socket->so_qlimit)) {
6844					/*
6845					 * we have a listener already and
6846					 * its not this inp.
6847					 */
6848					SCTP_INP_DECR_REF(tinp);
6849					return (EADDRINUSE);
6850				} else if (tinp) {
6851					SCTP_INP_DECR_REF(tinp);
6852				}
6853			}
6854		} else {
6855			/* Setup a local addr bound all */
6856			memset(&store, 0, sizeof(store));
6857#ifdef INET6
6858			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
6859				store.sa.sa_family = AF_INET6;
6860				store.sa.sa_len = sizeof(struct sockaddr_in6);
6861			}
6862#endif
6863#ifdef INET
6864			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
6865				store.sa.sa_family = AF_INET;
6866				store.sa.sa_len = sizeof(struct sockaddr_in);
6867			}
6868#endif
6869			switch (store.sa.sa_family) {
6870#ifdef INET
6871			case AF_INET:
6872				store.sin.sin_port = inp->sctp_lport;
6873				break;
6874#endif
6875#ifdef INET6
6876			case AF_INET6:
6877				store.sin6.sin6_port = inp->sctp_lport;
6878				break;
6879#endif
6880			default:
6881				break;
6882			}
6883			tinp = sctp_pcb_findep(&store.sa, 0, 0, inp->def_vrf_id);
6884			if (tinp && (tinp != inp) &&
6885			    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) == 0) &&
6886			    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
6887			    (tinp->sctp_socket->so_qlimit)) {
6888				/*
6889				 * we have a listener already and its not
6890				 * this inp.
6891				 */
6892				SCTP_INP_DECR_REF(tinp);
6893				return (EADDRINUSE);
6894			} else if (tinp) {
6895				SCTP_INP_DECR_REF(inp);
6896			}
6897		}
6898	}
6899	SCTP_INP_RLOCK(inp);
6900#ifdef SCTP_LOCK_LOGGING
6901	if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_LOCK_LOGGING_ENABLE) {
6902		sctp_log_lock(inp, (struct sctp_tcb *)NULL, SCTP_LOG_LOCK_SOCK);
6903	}
6904#endif
6905	SOCK_LOCK(so);
6906	error = solisten_proto_check(so);
6907	if (error) {
6908		SOCK_UNLOCK(so);
6909		SCTP_INP_RUNLOCK(inp);
6910		return (error);
6911	}
6912	if ((sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE)) &&
6913	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
6914		/*
6915		 * The unlucky case - We are in the tcp pool with this guy.
6916		 * - Someone else is in the main inp slot. - We must move
6917		 * this guy (the listener) to the main slot - We must then
6918		 * move the guy that was listener to the TCP Pool.
6919		 */
6920		if (sctp_swap_inpcb_for_listen(inp)) {
6921			goto in_use;
6922		}
6923	}
6924	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
6925	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
6926		/* We are already connected AND the TCP model */
6927in_use:
6928		SCTP_INP_RUNLOCK(inp);
6929		SOCK_UNLOCK(so);
6930		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
6931		return (EADDRINUSE);
6932	}
6933	SCTP_INP_RUNLOCK(inp);
6934	if (inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) {
6935		/* We must do a bind. */
6936		SOCK_UNLOCK(so);
6937		if ((error = sctp_inpcb_bind(so, NULL, NULL, p))) {
6938			/* bind error, probably perm */
6939			return (error);
6940		}
6941		SOCK_LOCK(so);
6942	}
6943	/* It appears for 7.0 and on, we must always call this. */
6944	solisten_proto(so, backlog);
6945	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
6946		/* remove the ACCEPTCONN flag for one-to-many sockets */
6947		so->so_options &= ~SO_ACCEPTCONN;
6948	}
6949	if (backlog == 0) {
6950		/* turning off listen */
6951		so->so_options &= ~SO_ACCEPTCONN;
6952	}
6953	SOCK_UNLOCK(so);
6954	return (error);
6955}
6956
6957static int sctp_defered_wakeup_cnt = 0;
6958
6959int
6960sctp_accept(struct socket *so, struct sockaddr **addr)
6961{
6962	struct sctp_tcb *stcb;
6963	struct sctp_inpcb *inp;
6964	union sctp_sockstore store;
6965
6966#ifdef INET6
6967	int error;
6968
6969#endif
6970	inp = (struct sctp_inpcb *)so->so_pcb;
6971
6972	if (inp == NULL) {
6973		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6974		return (ECONNRESET);
6975	}
6976	SCTP_INP_RLOCK(inp);
6977	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
6978		SCTP_INP_RUNLOCK(inp);
6979		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
6980		return (EOPNOTSUPP);
6981	}
6982	if (so->so_state & SS_ISDISCONNECTED) {
6983		SCTP_INP_RUNLOCK(inp);
6984		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ECONNABORTED);
6985		return (ECONNABORTED);
6986	}
6987	stcb = LIST_FIRST(&inp->sctp_asoc_list);
6988	if (stcb == NULL) {
6989		SCTP_INP_RUNLOCK(inp);
6990		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6991		return (ECONNRESET);
6992	}
6993	SCTP_TCB_LOCK(stcb);
6994	SCTP_INP_RUNLOCK(inp);
6995	store = stcb->asoc.primary_destination->ro._l_addr;
6996	stcb->asoc.state &= ~SCTP_STATE_IN_ACCEPT_QUEUE;
6997	SCTP_TCB_UNLOCK(stcb);
6998	switch (store.sa.sa_family) {
6999#ifdef INET
7000	case AF_INET:
7001		{
7002			struct sockaddr_in *sin;
7003
7004			SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7005			if (sin == NULL)
7006				return (ENOMEM);
7007			sin->sin_family = AF_INET;
7008			sin->sin_len = sizeof(*sin);
7009			sin->sin_port = store.sin.sin_port;
7010			sin->sin_addr = store.sin.sin_addr;
7011			*addr = (struct sockaddr *)sin;
7012			break;
7013		}
7014#endif
7015#ifdef INET6
7016	case AF_INET6:
7017		{
7018			struct sockaddr_in6 *sin6;
7019
7020			SCTP_MALLOC_SONAME(sin6, struct sockaddr_in6 *, sizeof *sin6);
7021			if (sin6 == NULL)
7022				return (ENOMEM);
7023			sin6->sin6_family = AF_INET6;
7024			sin6->sin6_len = sizeof(*sin6);
7025			sin6->sin6_port = store.sin6.sin6_port;
7026			sin6->sin6_addr = store.sin6.sin6_addr;
7027			if ((error = sa6_recoverscope(sin6)) != 0) {
7028				SCTP_FREE_SONAME(sin6);
7029				return (error);
7030			}
7031			*addr = (struct sockaddr *)sin6;
7032			break;
7033		}
7034#endif
7035	default:
7036		/* TSNH */
7037		break;
7038	}
7039	/* Wake any delayed sleep action */
7040	if (inp->sctp_flags & SCTP_PCB_FLAGS_DONT_WAKE) {
7041		SCTP_INP_WLOCK(inp);
7042		inp->sctp_flags &= ~SCTP_PCB_FLAGS_DONT_WAKE;
7043		if (inp->sctp_flags & SCTP_PCB_FLAGS_WAKEOUTPUT) {
7044			inp->sctp_flags &= ~SCTP_PCB_FLAGS_WAKEOUTPUT;
7045			SCTP_INP_WUNLOCK(inp);
7046			SOCKBUF_LOCK(&inp->sctp_socket->so_snd);
7047			if (sowriteable(inp->sctp_socket)) {
7048				sowwakeup_locked(inp->sctp_socket);
7049			} else {
7050				SOCKBUF_UNLOCK(&inp->sctp_socket->so_snd);
7051			}
7052			SCTP_INP_WLOCK(inp);
7053		}
7054		if (inp->sctp_flags & SCTP_PCB_FLAGS_WAKEINPUT) {
7055			inp->sctp_flags &= ~SCTP_PCB_FLAGS_WAKEINPUT;
7056			SCTP_INP_WUNLOCK(inp);
7057			SOCKBUF_LOCK(&inp->sctp_socket->so_rcv);
7058			if (soreadable(inp->sctp_socket)) {
7059				sctp_defered_wakeup_cnt++;
7060				sorwakeup_locked(inp->sctp_socket);
7061			} else {
7062				SOCKBUF_UNLOCK(&inp->sctp_socket->so_rcv);
7063			}
7064			SCTP_INP_WLOCK(inp);
7065		}
7066		SCTP_INP_WUNLOCK(inp);
7067	}
7068	if (stcb->asoc.state & SCTP_STATE_ABOUT_TO_BE_FREED) {
7069		SCTP_TCB_LOCK(stcb);
7070		sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_7);
7071	}
7072	return (0);
7073}
7074
7075#ifdef INET
7076int
7077sctp_ingetaddr(struct socket *so, struct sockaddr **addr)
7078{
7079	struct sockaddr_in *sin;
7080	uint32_t vrf_id;
7081	struct sctp_inpcb *inp;
7082	struct sctp_ifa *sctp_ifa;
7083
7084	/*
7085	 * Do the malloc first in case it blocks.
7086	 */
7087	SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7088	if (sin == NULL)
7089		return (ENOMEM);
7090	sin->sin_family = AF_INET;
7091	sin->sin_len = sizeof(*sin);
7092	inp = (struct sctp_inpcb *)so->so_pcb;
7093	if (!inp) {
7094		SCTP_FREE_SONAME(sin);
7095		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
7096		return (ECONNRESET);
7097	}
7098	SCTP_INP_RLOCK(inp);
7099	sin->sin_port = inp->sctp_lport;
7100	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
7101		if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
7102			struct sctp_tcb *stcb;
7103			struct sockaddr_in *sin_a;
7104			struct sctp_nets *net;
7105			int fnd;
7106
7107			stcb = LIST_FIRST(&inp->sctp_asoc_list);
7108			if (stcb == NULL) {
7109				goto notConn;
7110			}
7111			fnd = 0;
7112			sin_a = NULL;
7113			SCTP_TCB_LOCK(stcb);
7114			TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
7115				sin_a = (struct sockaddr_in *)&net->ro._l_addr;
7116				if (sin_a == NULL)
7117					/* this will make coverity happy */
7118					continue;
7119
7120				if (sin_a->sin_family == AF_INET) {
7121					fnd = 1;
7122					break;
7123				}
7124			}
7125			if ((!fnd) || (sin_a == NULL)) {
7126				/* punt */
7127				SCTP_TCB_UNLOCK(stcb);
7128				goto notConn;
7129			}
7130			vrf_id = inp->def_vrf_id;
7131			sctp_ifa = sctp_source_address_selection(inp,
7132			    stcb,
7133			    (sctp_route_t *) & net->ro,
7134			    net, 0, vrf_id);
7135			if (sctp_ifa) {
7136				sin->sin_addr = sctp_ifa->address.sin.sin_addr;
7137				sctp_free_ifa(sctp_ifa);
7138			}
7139			SCTP_TCB_UNLOCK(stcb);
7140		} else {
7141			/* For the bound all case you get back 0 */
7142	notConn:
7143			sin->sin_addr.s_addr = 0;
7144		}
7145
7146	} else {
7147		/* Take the first IPv4 address in the list */
7148		struct sctp_laddr *laddr;
7149		int fnd = 0;
7150
7151		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
7152			if (laddr->ifa->address.sa.sa_family == AF_INET) {
7153				struct sockaddr_in *sin_a;
7154
7155				sin_a = &laddr->ifa->address.sin;
7156				sin->sin_addr = sin_a->sin_addr;
7157				fnd = 1;
7158				break;
7159			}
7160		}
7161		if (!fnd) {
7162			SCTP_FREE_SONAME(sin);
7163			SCTP_INP_RUNLOCK(inp);
7164			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
7165			return (ENOENT);
7166		}
7167	}
7168	SCTP_INP_RUNLOCK(inp);
7169	(*addr) = (struct sockaddr *)sin;
7170	return (0);
7171}
7172
7173int
7174sctp_peeraddr(struct socket *so, struct sockaddr **addr)
7175{
7176	struct sockaddr_in *sin;
7177	int fnd;
7178	struct sockaddr_in *sin_a;
7179	struct sctp_inpcb *inp;
7180	struct sctp_tcb *stcb;
7181	struct sctp_nets *net;
7182
7183	/* Do the malloc first in case it blocks. */
7184	SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7185	if (sin == NULL)
7186		return (ENOMEM);
7187	sin->sin_family = AF_INET;
7188	sin->sin_len = sizeof(*sin);
7189
7190	inp = (struct sctp_inpcb *)so->so_pcb;
7191	if ((inp == NULL) ||
7192	    ((inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) == 0)) {
7193		/* UDP type and listeners will drop out here */
7194		SCTP_FREE_SONAME(sin);
7195		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
7196		return (ENOTCONN);
7197	}
7198	SCTP_INP_RLOCK(inp);
7199	stcb = LIST_FIRST(&inp->sctp_asoc_list);
7200	if (stcb) {
7201		SCTP_TCB_LOCK(stcb);
7202	}
7203	SCTP_INP_RUNLOCK(inp);
7204	if (stcb == NULL) {
7205		SCTP_FREE_SONAME(sin);
7206		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
7207		return (ECONNRESET);
7208	}
7209	fnd = 0;
7210	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
7211		sin_a = (struct sockaddr_in *)&net->ro._l_addr;
7212		if (sin_a->sin_family == AF_INET) {
7213			fnd = 1;
7214			sin->sin_port = stcb->rport;
7215			sin->sin_addr = sin_a->sin_addr;
7216			break;
7217		}
7218	}
7219	SCTP_TCB_UNLOCK(stcb);
7220	if (!fnd) {
7221		/* No IPv4 address */
7222		SCTP_FREE_SONAME(sin);
7223		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
7224		return (ENOENT);
7225	}
7226	(*addr) = (struct sockaddr *)sin;
7227	return (0);
7228}
7229
7230struct pr_usrreqs sctp_usrreqs = {
7231	.pru_abort = sctp_abort,
7232	.pru_accept = sctp_accept,
7233	.pru_attach = sctp_attach,
7234	.pru_bind = sctp_bind,
7235	.pru_connect = sctp_connect,
7236	.pru_control = in_control,
7237	.pru_close = sctp_close,
7238	.pru_detach = sctp_close,
7239	.pru_sopoll = sopoll_generic,
7240	.pru_flush = sctp_flush,
7241	.pru_disconnect = sctp_disconnect,
7242	.pru_listen = sctp_listen,
7243	.pru_peeraddr = sctp_peeraddr,
7244	.pru_send = sctp_sendm,
7245	.pru_shutdown = sctp_shutdown,
7246	.pru_sockaddr = sctp_ingetaddr,
7247	.pru_sosend = sctp_sosend,
7248	.pru_soreceive = sctp_soreceive
7249};
7250
7251#endif
7252