sctp_usrreq.c revision 283722
1/*-
2 * Copyright (c) 2001-2008, by Cisco Systems, Inc. All rights reserved.
3 * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
4 * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are met:
8 *
9 * a) Redistributions of source code must retain the above copyright notice,
10 *    this list of conditions and the following disclaimer.
11 *
12 * b) Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in
14 *    the documentation and/or other materials provided with the distribution.
15 *
16 * c) Neither the name of Cisco Systems, Inc. nor the names of its
17 *    contributors may be used to endorse or promote products derived
18 *    from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30 * THE POSSIBILITY OF SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
34__FBSDID("$FreeBSD: stable/10/sys/netinet/sctp_usrreq.c 283722 2015-05-29 12:48:14Z tuexen $");
35
36#include <netinet/sctp_os.h>
37#include <sys/proc.h>
38#include <netinet/sctp_pcb.h>
39#include <netinet/sctp_header.h>
40#include <netinet/sctp_var.h>
41#ifdef INET6
42#include <netinet6/sctp6_var.h>
43#endif
44#include <netinet/sctp_sysctl.h>
45#include <netinet/sctp_output.h>
46#include <netinet/sctp_uio.h>
47#include <netinet/sctp_asconf.h>
48#include <netinet/sctputil.h>
49#include <netinet/sctp_indata.h>
50#include <netinet/sctp_timer.h>
51#include <netinet/sctp_auth.h>
52#include <netinet/sctp_bsd_addr.h>
53#include <netinet/udp.h>
54
55
56
57extern struct sctp_cc_functions sctp_cc_functions[];
58extern struct sctp_ss_functions sctp_ss_functions[];
59
60void
61sctp_init(void)
62{
63	u_long sb_max_adj;
64
65	/* Initialize and modify the sysctled variables */
66	sctp_init_sysctls();
67	if ((nmbclusters / 8) > SCTP_ASOC_MAX_CHUNKS_ON_QUEUE)
68		SCTP_BASE_SYSCTL(sctp_max_chunks_on_queue) = (nmbclusters / 8);
69	/*
70	 * Allow a user to take no more than 1/2 the number of clusters or
71	 * the SB_MAX whichever is smaller for the send window.
72	 */
73	sb_max_adj = (u_long)((u_quad_t) (SB_MAX) * MCLBYTES / (MSIZE + MCLBYTES));
74	SCTP_BASE_SYSCTL(sctp_sendspace) = min(sb_max_adj,
75	    (((uint32_t) nmbclusters / 2) * SCTP_DEFAULT_MAXSEGMENT));
76	/*
77	 * Now for the recv window, should we take the same amount? or
78	 * should I do 1/2 the SB_MAX instead in the SB_MAX min above. For
79	 * now I will just copy.
80	 */
81	SCTP_BASE_SYSCTL(sctp_recvspace) = SCTP_BASE_SYSCTL(sctp_sendspace);
82	SCTP_BASE_VAR(first_time) = 0;
83	SCTP_BASE_VAR(sctp_pcb_initialized) = 0;
84	sctp_pcb_init();
85#if defined(SCTP_PACKET_LOGGING)
86	SCTP_BASE_VAR(packet_log_writers) = 0;
87	SCTP_BASE_VAR(packet_log_end) = 0;
88	bzero(&SCTP_BASE_VAR(packet_log_buffer), SCTP_PACKET_LOG_SIZE);
89#endif
90}
91
92void
93sctp_finish(void)
94{
95	sctp_pcb_finish();
96}
97
98
99
100void
101sctp_pathmtu_adjustment(struct sctp_tcb *stcb, uint16_t nxtsz)
102{
103	struct sctp_tmit_chunk *chk;
104	uint16_t overhead;
105
106	/* Adjust that too */
107	stcb->asoc.smallest_mtu = nxtsz;
108	/* now off to subtract IP_DF flag if needed */
109	overhead = IP_HDR_SIZE;
110	if (sctp_auth_is_required_chunk(SCTP_DATA, stcb->asoc.peer_auth_chunks)) {
111		overhead += sctp_get_auth_chunk_len(stcb->asoc.peer_hmac_id);
112	}
113	TAILQ_FOREACH(chk, &stcb->asoc.send_queue, sctp_next) {
114		if ((chk->send_size + overhead) > nxtsz) {
115			chk->flags |= CHUNK_FLAGS_FRAGMENT_OK;
116		}
117	}
118	TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
119		if ((chk->send_size + overhead) > nxtsz) {
120			/*
121			 * For this guy we also mark for immediate resend
122			 * since we sent to big of chunk
123			 */
124			chk->flags |= CHUNK_FLAGS_FRAGMENT_OK;
125			if (chk->sent < SCTP_DATAGRAM_RESEND) {
126				sctp_flight_size_decrease(chk);
127				sctp_total_flight_decrease(stcb, chk);
128			}
129			if (chk->sent != SCTP_DATAGRAM_RESEND) {
130				sctp_ucount_incr(stcb->asoc.sent_queue_retran_cnt);
131			}
132			chk->sent = SCTP_DATAGRAM_RESEND;
133			chk->rec.data.doing_fast_retransmit = 0;
134			if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_FLIGHT_LOGGING_ENABLE) {
135				sctp_misc_ints(SCTP_FLIGHT_LOG_DOWN_PMTU,
136				    chk->whoTo->flight_size,
137				    chk->book_size,
138				    (uintptr_t) chk->whoTo,
139				    chk->rec.data.TSN_seq);
140			}
141			/* Clear any time so NO RTT is being done */
142			chk->do_rtt = 0;
143		}
144	}
145}
146
147#ifdef INET
148static void
149sctp_notify_mbuf(struct sctp_inpcb *inp,
150    struct sctp_tcb *stcb,
151    struct sctp_nets *net,
152    struct ip *ip,
153    struct sctphdr *sh)
154{
155	struct icmp *icmph;
156	int totsz, tmr_stopped = 0;
157	uint16_t nxtsz;
158
159	/* protection */
160	if ((inp == NULL) || (stcb == NULL) || (net == NULL) ||
161	    (ip == NULL) || (sh == NULL)) {
162		if (stcb != NULL) {
163			SCTP_TCB_UNLOCK(stcb);
164		}
165		return;
166	}
167	/* First job is to verify the vtag matches what I would send */
168	if (ntohl(sh->v_tag) != (stcb->asoc.peer_vtag)) {
169		SCTP_TCB_UNLOCK(stcb);
170		return;
171	}
172	icmph = (struct icmp *)((caddr_t)ip - (sizeof(struct icmp) -
173	    sizeof(struct ip)));
174	if (icmph->icmp_type != ICMP_UNREACH) {
175		/* We only care about unreachable */
176		SCTP_TCB_UNLOCK(stcb);
177		return;
178	}
179	if (icmph->icmp_code != ICMP_UNREACH_NEEDFRAG) {
180		/* not a unreachable message due to frag. */
181		SCTP_TCB_UNLOCK(stcb);
182		return;
183	}
184	totsz = ntohs(ip->ip_len);
185
186	nxtsz = ntohs(icmph->icmp_nextmtu);
187	if (nxtsz == 0) {
188		/*
189		 * old type router that does not tell us what the next size
190		 * mtu is. Rats we will have to guess (in a educated fashion
191		 * of course)
192		 */
193		nxtsz = sctp_get_prev_mtu(totsz);
194	}
195	/* Stop any PMTU timer */
196	if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
197		tmr_stopped = 1;
198		sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
199		    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_1);
200	}
201	/* Adjust destination size limit */
202	if (net->mtu > nxtsz) {
203		net->mtu = nxtsz;
204		if (net->port) {
205			net->mtu -= sizeof(struct udphdr);
206		}
207	}
208	/* now what about the ep? */
209	if (stcb->asoc.smallest_mtu > nxtsz) {
210		sctp_pathmtu_adjustment(stcb, nxtsz);
211	}
212	if (tmr_stopped)
213		sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
214
215	SCTP_TCB_UNLOCK(stcb);
216}
217
218void
219sctp_notify(struct sctp_inpcb *inp,
220    struct ip *ip,
221    struct sctphdr *sh,
222    struct sockaddr *to,
223    struct sctp_tcb *stcb,
224    struct sctp_nets *net)
225{
226#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
227	struct socket *so;
228
229#endif
230	struct icmp *icmph;
231
232	/* protection */
233	if ((inp == NULL) || (stcb == NULL) || (net == NULL) ||
234	    (sh == NULL) || (to == NULL)) {
235		if (stcb)
236			SCTP_TCB_UNLOCK(stcb);
237		return;
238	}
239	/* First job is to verify the vtag matches what I would send */
240	if (ntohl(sh->v_tag) != (stcb->asoc.peer_vtag)) {
241		SCTP_TCB_UNLOCK(stcb);
242		return;
243	}
244	icmph = (struct icmp *)((caddr_t)ip - (sizeof(struct icmp) -
245	    sizeof(struct ip)));
246	if (icmph->icmp_type != ICMP_UNREACH) {
247		/* We only care about unreachable */
248		SCTP_TCB_UNLOCK(stcb);
249		return;
250	}
251	if ((icmph->icmp_code == ICMP_UNREACH_NET) ||
252	    (icmph->icmp_code == ICMP_UNREACH_HOST) ||
253	    (icmph->icmp_code == ICMP_UNREACH_NET_UNKNOWN) ||
254	    (icmph->icmp_code == ICMP_UNREACH_HOST_UNKNOWN) ||
255	    (icmph->icmp_code == ICMP_UNREACH_ISOLATED) ||
256	    (icmph->icmp_code == ICMP_UNREACH_NET_PROHIB) ||
257	    (icmph->icmp_code == ICMP_UNREACH_HOST_PROHIB) ||
258	    (icmph->icmp_code == ICMP_UNREACH_FILTER_PROHIB)) {
259
260		/*
261		 * Hmm reachablity problems we must examine closely. If its
262		 * not reachable, we may have lost a network. Or if there is
263		 * NO protocol at the other end named SCTP. well we consider
264		 * it a OOTB abort.
265		 */
266		if (net->dest_state & SCTP_ADDR_REACHABLE) {
267			/* Ok that destination is NOT reachable */
268			net->dest_state &= ~SCTP_ADDR_REACHABLE;
269			net->dest_state &= ~SCTP_ADDR_PF;
270			sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN,
271			    stcb, 0,
272			    (void *)net, SCTP_SO_NOT_LOCKED);
273		}
274		SCTP_TCB_UNLOCK(stcb);
275	} else if ((icmph->icmp_code == ICMP_UNREACH_PROTOCOL) ||
276	    (icmph->icmp_code == ICMP_UNREACH_PORT)) {
277		/*
278		 * Here the peer is either playing tricks on us, including
279		 * an address that belongs to someone who does not support
280		 * SCTP OR was a userland implementation that shutdown and
281		 * now is dead. In either case treat it like a OOTB abort
282		 * with no TCB
283		 */
284		sctp_abort_notification(stcb, 1, 0, NULL, SCTP_SO_NOT_LOCKED);
285#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
286		so = SCTP_INP_SO(inp);
287		atomic_add_int(&stcb->asoc.refcnt, 1);
288		SCTP_TCB_UNLOCK(stcb);
289		SCTP_SOCKET_LOCK(so, 1);
290		SCTP_TCB_LOCK(stcb);
291		atomic_subtract_int(&stcb->asoc.refcnt, 1);
292#endif
293		(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_2);
294#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
295		SCTP_SOCKET_UNLOCK(so, 1);
296		/* SCTP_TCB_UNLOCK(stcb); MT: I think this is not needed. */
297#endif
298		/* no need to unlock here, since the TCB is gone */
299	} else {
300		SCTP_TCB_UNLOCK(stcb);
301	}
302}
303
304#endif
305
306#ifdef INET
307void
308sctp_ctlinput(cmd, sa, vip)
309	int cmd;
310	struct sockaddr *sa;
311	void *vip;
312{
313	struct ip *ip = vip;
314	struct sctphdr *sh;
315	uint32_t vrf_id;
316
317	/* FIX, for non-bsd is this right? */
318	vrf_id = SCTP_DEFAULT_VRFID;
319	if (sa->sa_family != AF_INET ||
320	    ((struct sockaddr_in *)sa)->sin_addr.s_addr == INADDR_ANY) {
321		return;
322	}
323	if (PRC_IS_REDIRECT(cmd)) {
324		ip = 0;
325	} else if ((unsigned)cmd >= PRC_NCMDS || inetctlerrmap[cmd] == 0) {
326		return;
327	}
328	if (ip) {
329		struct sctp_inpcb *inp = NULL;
330		struct sctp_tcb *stcb = NULL;
331		struct sctp_nets *net = NULL;
332		struct sockaddr_in to, from;
333
334		sh = (struct sctphdr *)((caddr_t)ip + (ip->ip_hl << 2));
335		bzero(&to, sizeof(to));
336		bzero(&from, sizeof(from));
337		from.sin_family = to.sin_family = AF_INET;
338		from.sin_len = to.sin_len = sizeof(to);
339		from.sin_port = sh->src_port;
340		from.sin_addr = ip->ip_src;
341		to.sin_port = sh->dest_port;
342		to.sin_addr = ip->ip_dst;
343
344		/*
345		 * 'to' holds the dest of the packet that failed to be sent.
346		 * 'from' holds our local endpoint address. Thus we reverse
347		 * the to and the from in the lookup.
348		 */
349		stcb = sctp_findassociation_addr_sa((struct sockaddr *)&to,
350		    (struct sockaddr *)&from,
351		    &inp, &net, 1, vrf_id);
352		if (stcb != NULL && inp && (inp->sctp_socket != NULL)) {
353			if (cmd != PRC_MSGSIZE) {
354				sctp_notify(inp, ip, sh,
355				    (struct sockaddr *)&to, stcb,
356				    net);
357			} else {
358				/* handle possible ICMP size messages */
359				sctp_notify_mbuf(inp, stcb, net, ip, sh);
360			}
361		} else {
362			if ((stcb == NULL) && (inp != NULL)) {
363				/* reduce ref-count */
364				SCTP_INP_WLOCK(inp);
365				SCTP_INP_DECR_REF(inp);
366				SCTP_INP_WUNLOCK(inp);
367			}
368			if (stcb) {
369				SCTP_TCB_UNLOCK(stcb);
370			}
371		}
372	}
373	return;
374}
375
376#endif
377
378static int
379sctp_getcred(SYSCTL_HANDLER_ARGS)
380{
381	struct xucred xuc;
382	struct sockaddr_in addrs[2];
383	struct sctp_inpcb *inp;
384	struct sctp_nets *net;
385	struct sctp_tcb *stcb;
386	int error;
387	uint32_t vrf_id;
388
389	/* FIX, for non-bsd is this right? */
390	vrf_id = SCTP_DEFAULT_VRFID;
391
392	error = priv_check(req->td, PRIV_NETINET_GETCRED);
393
394	if (error)
395		return (error);
396
397	error = SYSCTL_IN(req, addrs, sizeof(addrs));
398	if (error)
399		return (error);
400
401	stcb = sctp_findassociation_addr_sa(sintosa(&addrs[1]),
402	    sintosa(&addrs[0]),
403	    &inp, &net, 1, vrf_id);
404	if (stcb == NULL || inp == NULL || inp->sctp_socket == NULL) {
405		if ((inp != NULL) && (stcb == NULL)) {
406			/* reduce ref-count */
407			SCTP_INP_WLOCK(inp);
408			SCTP_INP_DECR_REF(inp);
409			goto cred_can_cont;
410		}
411		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
412		error = ENOENT;
413		goto out;
414	}
415	SCTP_TCB_UNLOCK(stcb);
416	/*
417	 * We use the write lock here, only since in the error leg we need
418	 * it. If we used RLOCK, then we would have to
419	 * wlock/decr/unlock/rlock. Which in theory could create a hole.
420	 * Better to use higher wlock.
421	 */
422	SCTP_INP_WLOCK(inp);
423cred_can_cont:
424	error = cr_canseesocket(req->td->td_ucred, inp->sctp_socket);
425	if (error) {
426		SCTP_INP_WUNLOCK(inp);
427		goto out;
428	}
429	cru2x(inp->sctp_socket->so_cred, &xuc);
430	SCTP_INP_WUNLOCK(inp);
431	error = SYSCTL_OUT(req, &xuc, sizeof(struct xucred));
432out:
433	return (error);
434}
435
436SYSCTL_PROC(_net_inet_sctp, OID_AUTO, getcred, CTLTYPE_OPAQUE | CTLFLAG_RW,
437    0, 0, sctp_getcred, "S,ucred", "Get the ucred of a SCTP connection");
438
439
440#ifdef INET
441static void
442sctp_abort(struct socket *so)
443{
444	struct sctp_inpcb *inp;
445	uint32_t flags;
446
447	inp = (struct sctp_inpcb *)so->so_pcb;
448	if (inp == NULL) {
449		return;
450	}
451sctp_must_try_again:
452	flags = inp->sctp_flags;
453#ifdef SCTP_LOG_CLOSING
454	sctp_log_closing(inp, NULL, 17);
455#endif
456	if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
457	    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
458#ifdef SCTP_LOG_CLOSING
459		sctp_log_closing(inp, NULL, 16);
460#endif
461		sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
462		    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
463		SOCK_LOCK(so);
464		SCTP_SB_CLEAR(so->so_snd);
465		/*
466		 * same for the rcv ones, they are only here for the
467		 * accounting/select.
468		 */
469		SCTP_SB_CLEAR(so->so_rcv);
470
471		/* Now null out the reference, we are completely detached. */
472		so->so_pcb = NULL;
473		SOCK_UNLOCK(so);
474	} else {
475		flags = inp->sctp_flags;
476		if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
477			goto sctp_must_try_again;
478		}
479	}
480	return;
481}
482
483static int
484sctp_attach(struct socket *so, int proto SCTP_UNUSED, struct thread *p SCTP_UNUSED)
485{
486	struct sctp_inpcb *inp;
487	struct inpcb *ip_inp;
488	int error;
489	uint32_t vrf_id = SCTP_DEFAULT_VRFID;
490
491#ifdef IPSEC
492	uint32_t flags;
493
494#endif
495
496	inp = (struct sctp_inpcb *)so->so_pcb;
497	if (inp != 0) {
498		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
499		return (EINVAL);
500	}
501	if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
502		error = SCTP_SORESERVE(so, SCTP_BASE_SYSCTL(sctp_sendspace), SCTP_BASE_SYSCTL(sctp_recvspace));
503		if (error) {
504			return (error);
505		}
506	}
507	error = sctp_inpcb_alloc(so, vrf_id);
508	if (error) {
509		return (error);
510	}
511	inp = (struct sctp_inpcb *)so->so_pcb;
512	SCTP_INP_WLOCK(inp);
513	inp->sctp_flags &= ~SCTP_PCB_FLAGS_BOUND_V6;	/* I'm not v6! */
514	ip_inp = &inp->ip_inp.inp;
515	ip_inp->inp_vflag |= INP_IPV4;
516	ip_inp->inp_ip_ttl = MODULE_GLOBAL(ip_defttl);
517#ifdef IPSEC
518	error = ipsec_init_policy(so, &ip_inp->inp_sp);
519#ifdef SCTP_LOG_CLOSING
520	sctp_log_closing(inp, NULL, 17);
521#endif
522	if (error != 0) {
523try_again:
524		flags = inp->sctp_flags;
525		if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
526		    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
527#ifdef SCTP_LOG_CLOSING
528			sctp_log_closing(inp, NULL, 15);
529#endif
530			SCTP_INP_WUNLOCK(inp);
531			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
532			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
533		} else {
534			flags = inp->sctp_flags;
535			if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
536				goto try_again;
537			} else {
538				SCTP_INP_WUNLOCK(inp);
539			}
540		}
541		return (error);
542	}
543#endif				/* IPSEC */
544	SCTP_INP_WUNLOCK(inp);
545	return (0);
546}
547
548static int
549sctp_bind(struct socket *so, struct sockaddr *addr, struct thread *p)
550{
551	struct sctp_inpcb *inp;
552
553	inp = (struct sctp_inpcb *)so->so_pcb;
554	if (inp == NULL) {
555		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
556		return (EINVAL);
557	}
558	if (addr != NULL) {
559		if ((addr->sa_family != AF_INET) ||
560		    (addr->sa_len != sizeof(struct sockaddr_in))) {
561			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
562			return (EINVAL);
563		}
564	}
565	return (sctp_inpcb_bind(so, addr, NULL, p));
566}
567
568#endif
569void
570sctp_close(struct socket *so)
571{
572	struct sctp_inpcb *inp;
573	uint32_t flags;
574
575	inp = (struct sctp_inpcb *)so->so_pcb;
576	if (inp == NULL)
577		return;
578
579	/*
580	 * Inform all the lower layer assoc that we are done.
581	 */
582sctp_must_try_again:
583	flags = inp->sctp_flags;
584#ifdef SCTP_LOG_CLOSING
585	sctp_log_closing(inp, NULL, 17);
586#endif
587	if (((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
588	    (atomic_cmpset_int(&inp->sctp_flags, flags, (flags | SCTP_PCB_FLAGS_SOCKET_GONE | SCTP_PCB_FLAGS_CLOSE_IP)))) {
589		if (((so->so_options & SO_LINGER) && (so->so_linger == 0)) ||
590		    (so->so_rcv.sb_cc > 0)) {
591#ifdef SCTP_LOG_CLOSING
592			sctp_log_closing(inp, NULL, 13);
593#endif
594			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_ABORT,
595			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
596		} else {
597#ifdef SCTP_LOG_CLOSING
598			sctp_log_closing(inp, NULL, 14);
599#endif
600			sctp_inpcb_free(inp, SCTP_FREE_SHOULD_USE_GRACEFUL_CLOSE,
601			    SCTP_CALLED_AFTER_CMPSET_OFCLOSE);
602		}
603		/*
604		 * The socket is now detached, no matter what the state of
605		 * the SCTP association.
606		 */
607		SOCK_LOCK(so);
608		SCTP_SB_CLEAR(so->so_snd);
609		/*
610		 * same for the rcv ones, they are only here for the
611		 * accounting/select.
612		 */
613		SCTP_SB_CLEAR(so->so_rcv);
614
615		/* Now null out the reference, we are completely detached. */
616		so->so_pcb = NULL;
617		SOCK_UNLOCK(so);
618	} else {
619		flags = inp->sctp_flags;
620		if ((flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) {
621			goto sctp_must_try_again;
622		}
623	}
624	return;
625}
626
627
628int
629sctp_sendm(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
630    struct mbuf *control, struct thread *p);
631
632
633int
634sctp_sendm(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
635    struct mbuf *control, struct thread *p)
636{
637	struct sctp_inpcb *inp;
638	int error;
639
640	inp = (struct sctp_inpcb *)so->so_pcb;
641	if (inp == NULL) {
642		if (control) {
643			sctp_m_freem(control);
644			control = NULL;
645		}
646		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
647		sctp_m_freem(m);
648		return (EINVAL);
649	}
650	/* Got to have an to address if we are NOT a connected socket */
651	if ((addr == NULL) &&
652	    ((inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) ||
653	    (inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE))) {
654		goto connected_type;
655	} else if (addr == NULL) {
656		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EDESTADDRREQ);
657		error = EDESTADDRREQ;
658		sctp_m_freem(m);
659		if (control) {
660			sctp_m_freem(control);
661			control = NULL;
662		}
663		return (error);
664	}
665#ifdef INET6
666	if (addr->sa_family != AF_INET) {
667		/* must be a v4 address! */
668		SCTP_LTRACE_ERR_RET_PKT(m, inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EDESTADDRREQ);
669		sctp_m_freem(m);
670		if (control) {
671			sctp_m_freem(control);
672			control = NULL;
673		}
674		error = EDESTADDRREQ;
675		return (error);
676	}
677#endif				/* INET6 */
678connected_type:
679	/* now what about control */
680	if (control) {
681		if (inp->control) {
682			SCTP_PRINTF("huh? control set?\n");
683			sctp_m_freem(inp->control);
684			inp->control = NULL;
685		}
686		inp->control = control;
687	}
688	/* Place the data */
689	if (inp->pkt) {
690		SCTP_BUF_NEXT(inp->pkt_last) = m;
691		inp->pkt_last = m;
692	} else {
693		inp->pkt_last = inp->pkt = m;
694	}
695	if (
696	/* FreeBSD uses a flag passed */
697	    ((flags & PRUS_MORETOCOME) == 0)
698	    ) {
699		/*
700		 * note with the current version this code will only be used
701		 * by OpenBSD-- NetBSD, FreeBSD, and MacOS have methods for
702		 * re-defining sosend to use the sctp_sosend. One can
703		 * optionally switch back to this code (by changing back the
704		 * definitions) but this is not advisable. This code is used
705		 * by FreeBSD when sending a file with sendfile() though.
706		 */
707		int ret;
708
709		ret = sctp_output(inp, inp->pkt, addr, inp->control, p, flags);
710		inp->pkt = NULL;
711		inp->control = NULL;
712		return (ret);
713	} else {
714		return (0);
715	}
716}
717
718int
719sctp_disconnect(struct socket *so)
720{
721	struct sctp_inpcb *inp;
722
723	inp = (struct sctp_inpcb *)so->so_pcb;
724	if (inp == NULL) {
725		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
726		return (ENOTCONN);
727	}
728	SCTP_INP_RLOCK(inp);
729	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
730	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
731		if (LIST_EMPTY(&inp->sctp_asoc_list)) {
732			/* No connection */
733			SCTP_INP_RUNLOCK(inp);
734			return (0);
735		} else {
736			struct sctp_association *asoc;
737			struct sctp_tcb *stcb;
738
739			stcb = LIST_FIRST(&inp->sctp_asoc_list);
740			if (stcb == NULL) {
741				SCTP_INP_RUNLOCK(inp);
742				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
743				return (EINVAL);
744			}
745			SCTP_TCB_LOCK(stcb);
746			asoc = &stcb->asoc;
747			if (stcb->asoc.state & SCTP_STATE_ABOUT_TO_BE_FREED) {
748				/* We are about to be freed, out of here */
749				SCTP_TCB_UNLOCK(stcb);
750				SCTP_INP_RUNLOCK(inp);
751				return (0);
752			}
753			if (((so->so_options & SO_LINGER) &&
754			    (so->so_linger == 0)) ||
755			    (so->so_rcv.sb_cc > 0)) {
756				if (SCTP_GET_STATE(asoc) !=
757				    SCTP_STATE_COOKIE_WAIT) {
758					/* Left with Data unread */
759					struct mbuf *err;
760
761					err = sctp_get_mbuf_for_msg(sizeof(struct sctp_paramhdr), 0, M_NOWAIT, 1, MT_DATA);
762					if (err) {
763						/*
764						 * Fill in the user
765						 * initiated abort
766						 */
767						struct sctp_paramhdr *ph;
768
769						ph = mtod(err, struct sctp_paramhdr *);
770						SCTP_BUF_LEN(err) = sizeof(struct sctp_paramhdr);
771						ph->param_type = htons(SCTP_CAUSE_USER_INITIATED_ABT);
772						ph->param_length = htons(SCTP_BUF_LEN(err));
773					}
774					sctp_send_abort_tcb(stcb, err, SCTP_SO_LOCKED);
775					SCTP_STAT_INCR_COUNTER32(sctps_aborted);
776				}
777				SCTP_INP_RUNLOCK(inp);
778				if ((SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_OPEN) ||
779				    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
780					SCTP_STAT_DECR_GAUGE32(sctps_currestab);
781				}
782				(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_3);
783				/* No unlock tcb assoc is gone */
784				return (0);
785			}
786			if (TAILQ_EMPTY(&asoc->send_queue) &&
787			    TAILQ_EMPTY(&asoc->sent_queue) &&
788			    (asoc->stream_queue_cnt == 0)) {
789				/* there is nothing queued to send, so done */
790				if (asoc->locked_on_sending) {
791					goto abort_anyway;
792				}
793				if ((SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT) &&
794				    (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_ACK_SENT)) {
795					/* only send SHUTDOWN 1st time thru */
796					struct sctp_nets *netp;
797
798					if ((SCTP_GET_STATE(asoc) == SCTP_STATE_OPEN) ||
799					    (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
800						SCTP_STAT_DECR_GAUGE32(sctps_currestab);
801					}
802					SCTP_SET_STATE(asoc, SCTP_STATE_SHUTDOWN_SENT);
803					SCTP_CLEAR_SUBSTATE(asoc, SCTP_STATE_SHUTDOWN_PENDING);
804					sctp_stop_timers_for_shutdown(stcb);
805					if (stcb->asoc.alternate) {
806						netp = stcb->asoc.alternate;
807					} else {
808						netp = stcb->asoc.primary_destination;
809					}
810					sctp_send_shutdown(stcb, netp);
811					sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWN,
812					    stcb->sctp_ep, stcb, netp);
813					sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD,
814					    stcb->sctp_ep, stcb, netp);
815					sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_LOCKED);
816				}
817			} else {
818				/*
819				 * we still got (or just got) data to send,
820				 * so set SHUTDOWN_PENDING
821				 */
822				/*
823				 * XXX sockets draft says that SCTP_EOF
824				 * should be sent with no data. currently,
825				 * we will allow user data to be sent first
826				 * and move to SHUTDOWN-PENDING
827				 */
828				struct sctp_nets *netp;
829
830				if (stcb->asoc.alternate) {
831					netp = stcb->asoc.alternate;
832				} else {
833					netp = stcb->asoc.primary_destination;
834				}
835
836				asoc->state |= SCTP_STATE_SHUTDOWN_PENDING;
837				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD, stcb->sctp_ep, stcb,
838				    netp);
839				if (asoc->locked_on_sending) {
840					/* Locked to send out the data */
841					struct sctp_stream_queue_pending *sp;
842
843					sp = TAILQ_LAST(&asoc->locked_on_sending->outqueue, sctp_streamhead);
844					if (sp == NULL) {
845						SCTP_PRINTF("Error, sp is NULL, locked on sending is non-null strm:%d\n",
846						    asoc->locked_on_sending->stream_no);
847					} else {
848						if ((sp->length == 0) && (sp->msg_is_complete == 0))
849							asoc->state |= SCTP_STATE_PARTIAL_MSG_LEFT;
850					}
851				}
852				if (TAILQ_EMPTY(&asoc->send_queue) &&
853				    TAILQ_EMPTY(&asoc->sent_queue) &&
854				    (asoc->state & SCTP_STATE_PARTIAL_MSG_LEFT)) {
855					struct mbuf *op_err;
856
857			abort_anyway:
858					op_err = sctp_generate_cause(SCTP_CAUSE_USER_INITIATED_ABT, "");
859					stcb->sctp_ep->last_abort_code = SCTP_FROM_SCTP_USRREQ + SCTP_LOC_4;
860					sctp_send_abort_tcb(stcb, op_err, SCTP_SO_LOCKED);
861					SCTP_STAT_INCR_COUNTER32(sctps_aborted);
862					if ((SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_OPEN) ||
863					    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
864						SCTP_STAT_DECR_GAUGE32(sctps_currestab);
865					}
866					SCTP_INP_RUNLOCK(inp);
867					(void)sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_5);
868					return (0);
869				} else {
870					sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_CLOSING, SCTP_SO_LOCKED);
871				}
872			}
873			soisdisconnecting(so);
874			SCTP_TCB_UNLOCK(stcb);
875			SCTP_INP_RUNLOCK(inp);
876			return (0);
877		}
878		/* not reached */
879	} else {
880		/* UDP model does not support this */
881		SCTP_INP_RUNLOCK(inp);
882		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
883		return (EOPNOTSUPP);
884	}
885}
886
887int
888sctp_flush(struct socket *so, int how)
889{
890	/*
891	 * We will just clear out the values and let subsequent close clear
892	 * out the data, if any. Note if the user did a shutdown(SHUT_RD)
893	 * they will not be able to read the data, the socket will block
894	 * that from happening.
895	 */
896	struct sctp_inpcb *inp;
897
898	inp = (struct sctp_inpcb *)so->so_pcb;
899	if (inp == NULL) {
900		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
901		return (EINVAL);
902	}
903	SCTP_INP_RLOCK(inp);
904	/* For the 1 to many model this does nothing */
905	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
906		SCTP_INP_RUNLOCK(inp);
907		return (0);
908	}
909	SCTP_INP_RUNLOCK(inp);
910	if ((how == PRU_FLUSH_RD) || (how == PRU_FLUSH_RDWR)) {
911		/*
912		 * First make sure the sb will be happy, we don't use these
913		 * except maybe the count
914		 */
915		SCTP_INP_WLOCK(inp);
916		SCTP_INP_READ_LOCK(inp);
917		inp->sctp_flags |= SCTP_PCB_FLAGS_SOCKET_CANT_READ;
918		SCTP_INP_READ_UNLOCK(inp);
919		SCTP_INP_WUNLOCK(inp);
920		so->so_rcv.sb_cc = 0;
921		so->so_rcv.sb_mbcnt = 0;
922		so->so_rcv.sb_mb = NULL;
923	}
924	if ((how == PRU_FLUSH_WR) || (how == PRU_FLUSH_RDWR)) {
925		/*
926		 * First make sure the sb will be happy, we don't use these
927		 * except maybe the count
928		 */
929		so->so_snd.sb_cc = 0;
930		so->so_snd.sb_mbcnt = 0;
931		so->so_snd.sb_mb = NULL;
932
933	}
934	return (0);
935}
936
937int
938sctp_shutdown(struct socket *so)
939{
940	struct sctp_inpcb *inp;
941
942	inp = (struct sctp_inpcb *)so->so_pcb;
943	if (inp == NULL) {
944		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
945		return (EINVAL);
946	}
947	SCTP_INP_RLOCK(inp);
948	/* For UDP model this is a invalid call */
949	if (!((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
950	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL))) {
951		/* Restore the flags that the soshutdown took away. */
952		SOCKBUF_LOCK(&so->so_rcv);
953		so->so_rcv.sb_state &= ~SBS_CANTRCVMORE;
954		SOCKBUF_UNLOCK(&so->so_rcv);
955		/* This proc will wakeup for read and do nothing (I hope) */
956		SCTP_INP_RUNLOCK(inp);
957		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
958		return (EOPNOTSUPP);
959	}
960	/*
961	 * Ok if we reach here its the TCP model and it is either a SHUT_WR
962	 * or SHUT_RDWR. This means we put the shutdown flag against it.
963	 */
964	{
965		struct sctp_tcb *stcb;
966		struct sctp_association *asoc;
967
968		if ((so->so_state &
969		    (SS_ISCONNECTED | SS_ISCONNECTING | SS_ISDISCONNECTING)) == 0) {
970			SCTP_INP_RUNLOCK(inp);
971			return (ENOTCONN);
972		}
973		socantsendmore(so);
974
975		stcb = LIST_FIRST(&inp->sctp_asoc_list);
976		if (stcb == NULL) {
977			/*
978			 * Ok we hit the case that the shutdown call was
979			 * made after an abort or something. Nothing to do
980			 * now.
981			 */
982			SCTP_INP_RUNLOCK(inp);
983			return (0);
984		}
985		SCTP_TCB_LOCK(stcb);
986		asoc = &stcb->asoc;
987		if (TAILQ_EMPTY(&asoc->send_queue) &&
988		    TAILQ_EMPTY(&asoc->sent_queue) &&
989		    (asoc->stream_queue_cnt == 0)) {
990			if (asoc->locked_on_sending) {
991				goto abort_anyway;
992			}
993			/* there is nothing queued to send, so I'm done... */
994			if (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT) {
995				/* only send SHUTDOWN the first time through */
996				struct sctp_nets *netp;
997
998				if ((SCTP_GET_STATE(asoc) == SCTP_STATE_OPEN) ||
999				    (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
1000					SCTP_STAT_DECR_GAUGE32(sctps_currestab);
1001				}
1002				SCTP_SET_STATE(asoc, SCTP_STATE_SHUTDOWN_SENT);
1003				SCTP_CLEAR_SUBSTATE(asoc, SCTP_STATE_SHUTDOWN_PENDING);
1004				sctp_stop_timers_for_shutdown(stcb);
1005				if (stcb->asoc.alternate) {
1006					netp = stcb->asoc.alternate;
1007				} else {
1008					netp = stcb->asoc.primary_destination;
1009				}
1010				sctp_send_shutdown(stcb, netp);
1011				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWN,
1012				    stcb->sctp_ep, stcb, netp);
1013				sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD,
1014				    stcb->sctp_ep, stcb, netp);
1015				sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_LOCKED);
1016			}
1017		} else {
1018			/*
1019			 * we still got (or just got) data to send, so set
1020			 * SHUTDOWN_PENDING
1021			 */
1022			struct sctp_nets *netp;
1023
1024			if (stcb->asoc.alternate) {
1025				netp = stcb->asoc.alternate;
1026			} else {
1027				netp = stcb->asoc.primary_destination;
1028			}
1029
1030			asoc->state |= SCTP_STATE_SHUTDOWN_PENDING;
1031			sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNGUARD, stcb->sctp_ep, stcb,
1032			    netp);
1033
1034			if (asoc->locked_on_sending) {
1035				/* Locked to send out the data */
1036				struct sctp_stream_queue_pending *sp;
1037
1038				sp = TAILQ_LAST(&asoc->locked_on_sending->outqueue, sctp_streamhead);
1039				if (sp == NULL) {
1040					SCTP_PRINTF("Error, sp is NULL, locked on sending is non-null strm:%d\n",
1041					    asoc->locked_on_sending->stream_no);
1042				} else {
1043					if ((sp->length == 0) && (sp->msg_is_complete == 0)) {
1044						asoc->state |= SCTP_STATE_PARTIAL_MSG_LEFT;
1045					}
1046				}
1047			}
1048			if (TAILQ_EMPTY(&asoc->send_queue) &&
1049			    TAILQ_EMPTY(&asoc->sent_queue) &&
1050			    (asoc->state & SCTP_STATE_PARTIAL_MSG_LEFT)) {
1051				struct mbuf *op_err;
1052
1053		abort_anyway:
1054				op_err = sctp_generate_cause(SCTP_CAUSE_USER_INITIATED_ABT, "");
1055				stcb->sctp_ep->last_abort_code = SCTP_FROM_SCTP_USRREQ + SCTP_LOC_6;
1056				sctp_abort_an_association(stcb->sctp_ep, stcb,
1057				    op_err, SCTP_SO_LOCKED);
1058				goto skip_unlock;
1059			} else {
1060				sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_CLOSING, SCTP_SO_LOCKED);
1061			}
1062		}
1063		SCTP_TCB_UNLOCK(stcb);
1064	}
1065skip_unlock:
1066	SCTP_INP_RUNLOCK(inp);
1067	return (0);
1068}
1069
1070/*
1071 * copies a "user" presentable address and removes embedded scope, etc.
1072 * returns 0 on success, 1 on error
1073 */
1074static uint32_t
1075sctp_fill_user_address(struct sockaddr_storage *ss, struct sockaddr *sa)
1076{
1077#ifdef INET6
1078	struct sockaddr_in6 lsa6;
1079
1080	sa = (struct sockaddr *)sctp_recover_scope((struct sockaddr_in6 *)sa,
1081	    &lsa6);
1082#endif
1083	memcpy(ss, sa, sa->sa_len);
1084	return (0);
1085}
1086
1087
1088
1089/*
1090 * NOTE: assumes addr lock is held
1091 */
1092static size_t
1093sctp_fill_up_addresses_vrf(struct sctp_inpcb *inp,
1094    struct sctp_tcb *stcb,
1095    size_t limit,
1096    struct sockaddr_storage *sas,
1097    uint32_t vrf_id)
1098{
1099	struct sctp_ifn *sctp_ifn;
1100	struct sctp_ifa *sctp_ifa;
1101	size_t actual;
1102	int loopback_scope;
1103
1104#if defined(INET)
1105	int ipv4_local_scope, ipv4_addr_legal;
1106
1107#endif
1108#if defined(INET6)
1109	int local_scope, site_scope, ipv6_addr_legal;
1110
1111#endif
1112	struct sctp_vrf *vrf;
1113
1114	actual = 0;
1115	if (limit <= 0)
1116		return (actual);
1117
1118	if (stcb) {
1119		/* Turn on all the appropriate scope */
1120		loopback_scope = stcb->asoc.scope.loopback_scope;
1121#if defined(INET)
1122		ipv4_local_scope = stcb->asoc.scope.ipv4_local_scope;
1123		ipv4_addr_legal = stcb->asoc.scope.ipv4_addr_legal;
1124#endif
1125#if defined(INET6)
1126		local_scope = stcb->asoc.scope.local_scope;
1127		site_scope = stcb->asoc.scope.site_scope;
1128		ipv6_addr_legal = stcb->asoc.scope.ipv6_addr_legal;
1129#endif
1130	} else {
1131		/* Use generic values for endpoints. */
1132		loopback_scope = 1;
1133#if defined(INET)
1134		ipv4_local_scope = 1;
1135#endif
1136#if defined(INET6)
1137		local_scope = 1;
1138		site_scope = 1;
1139#endif
1140		if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
1141#if defined(INET6)
1142			ipv6_addr_legal = 1;
1143#endif
1144#if defined(INET)
1145			if (SCTP_IPV6_V6ONLY(inp)) {
1146				ipv4_addr_legal = 0;
1147			} else {
1148				ipv4_addr_legal = 1;
1149			}
1150#endif
1151		} else {
1152#if defined(INET6)
1153			ipv6_addr_legal = 0;
1154#endif
1155#if defined(INET)
1156			ipv4_addr_legal = 1;
1157#endif
1158		}
1159	}
1160	vrf = sctp_find_vrf(vrf_id);
1161	if (vrf == NULL) {
1162		return (0);
1163	}
1164	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1165		LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
1166			if ((loopback_scope == 0) &&
1167			    SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
1168				/* Skip loopback if loopback_scope not set */
1169				continue;
1170			}
1171			LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
1172				if (stcb) {
1173					/*
1174					 * For the BOUND-ALL case, the list
1175					 * associated with a TCB is Always
1176					 * considered a reverse list.. i.e.
1177					 * it lists addresses that are NOT
1178					 * part of the association. If this
1179					 * is one of those we must skip it.
1180					 */
1181					if (sctp_is_addr_restricted(stcb,
1182					    sctp_ifa)) {
1183						continue;
1184					}
1185				}
1186				switch (sctp_ifa->address.sa.sa_family) {
1187#ifdef INET
1188				case AF_INET:
1189					if (ipv4_addr_legal) {
1190						struct sockaddr_in *sin;
1191
1192						sin = &sctp_ifa->address.sin;
1193						if (sin->sin_addr.s_addr == 0) {
1194							/*
1195							 * we skip
1196							 * unspecifed
1197							 * addresses
1198							 */
1199							continue;
1200						}
1201						if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
1202						    &sin->sin_addr) != 0) {
1203							continue;
1204						}
1205						if ((ipv4_local_scope == 0) &&
1206						    (IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))) {
1207							continue;
1208						}
1209#ifdef INET6
1210						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
1211							in6_sin_2_v4mapsin6(sin, (struct sockaddr_in6 *)sas);
1212							((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1213							sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(struct sockaddr_in6));
1214							actual += sizeof(struct sockaddr_in6);
1215						} else {
1216#endif
1217							memcpy(sas, sin, sizeof(*sin));
1218							((struct sockaddr_in *)sas)->sin_port = inp->sctp_lport;
1219							sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(*sin));
1220							actual += sizeof(*sin);
1221#ifdef INET6
1222						}
1223#endif
1224						if (actual >= limit) {
1225							return (actual);
1226						}
1227					} else {
1228						continue;
1229					}
1230					break;
1231#endif
1232#ifdef INET6
1233				case AF_INET6:
1234					if (ipv6_addr_legal) {
1235						struct sockaddr_in6 *sin6;
1236
1237						sin6 = &sctp_ifa->address.sin6;
1238						if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
1239							/*
1240							 * we skip
1241							 * unspecifed
1242							 * addresses
1243							 */
1244							continue;
1245						}
1246						if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
1247						    &sin6->sin6_addr) != 0) {
1248							continue;
1249						}
1250						if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
1251							if (local_scope == 0)
1252								continue;
1253							if (sin6->sin6_scope_id == 0) {
1254								if (sa6_recoverscope(sin6) != 0)
1255									/*
1256									 *
1257									 * bad
1258									 *
1259									 * li
1260									 * nk
1261									 *
1262									 * loc
1263									 * al
1264									 *
1265									 * add
1266									 * re
1267									 * ss
1268									 * */
1269									continue;
1270							}
1271						}
1272						if ((site_scope == 0) &&
1273						    (IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))) {
1274							continue;
1275						}
1276						memcpy(sas, sin6, sizeof(*sin6));
1277						((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1278						sas = (struct sockaddr_storage *)((caddr_t)sas + sizeof(*sin6));
1279						actual += sizeof(*sin6);
1280						if (actual >= limit) {
1281							return (actual);
1282						}
1283					} else {
1284						continue;
1285					}
1286					break;
1287#endif
1288				default:
1289					/* TSNH */
1290					break;
1291				}
1292			}
1293		}
1294	} else {
1295		struct sctp_laddr *laddr;
1296
1297		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
1298			if (stcb) {
1299				if (sctp_is_addr_restricted(stcb, laddr->ifa)) {
1300					continue;
1301				}
1302			}
1303			if (sctp_fill_user_address(sas, &laddr->ifa->address.sa))
1304				continue;
1305			switch (laddr->ifa->address.sa.sa_family) {
1306#ifdef INET
1307			case AF_INET:
1308				((struct sockaddr_in *)sas)->sin_port = inp->sctp_lport;
1309				break;
1310#endif
1311#ifdef INET6
1312			case AF_INET6:
1313				((struct sockaddr_in6 *)sas)->sin6_port = inp->sctp_lport;
1314				break;
1315#endif
1316			default:
1317				/* TSNH */
1318				break;
1319			}
1320			sas = (struct sockaddr_storage *)((caddr_t)sas +
1321			    laddr->ifa->address.sa.sa_len);
1322			actual += laddr->ifa->address.sa.sa_len;
1323			if (actual >= limit) {
1324				return (actual);
1325			}
1326		}
1327	}
1328	return (actual);
1329}
1330
1331static size_t
1332sctp_fill_up_addresses(struct sctp_inpcb *inp,
1333    struct sctp_tcb *stcb,
1334    size_t limit,
1335    struct sockaddr_storage *sas)
1336{
1337	size_t size = 0;
1338
1339	SCTP_IPI_ADDR_RLOCK();
1340	/* fill up addresses for the endpoint's default vrf */
1341	size = sctp_fill_up_addresses_vrf(inp, stcb, limit, sas,
1342	    inp->def_vrf_id);
1343	SCTP_IPI_ADDR_RUNLOCK();
1344	return (size);
1345}
1346
1347/*
1348 * NOTE: assumes addr lock is held
1349 */
1350static int
1351sctp_count_max_addresses_vrf(struct sctp_inpcb *inp, uint32_t vrf_id)
1352{
1353	int cnt = 0;
1354	struct sctp_vrf *vrf = NULL;
1355
1356	/*
1357	 * In both sub-set bound an bound_all cases we return the MAXIMUM
1358	 * number of addresses that you COULD get. In reality the sub-set
1359	 * bound may have an exclusion list for a given TCB OR in the
1360	 * bound-all case a TCB may NOT include the loopback or other
1361	 * addresses as well.
1362	 */
1363	vrf = sctp_find_vrf(vrf_id);
1364	if (vrf == NULL) {
1365		return (0);
1366	}
1367	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1368		struct sctp_ifn *sctp_ifn;
1369		struct sctp_ifa *sctp_ifa;
1370
1371		LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
1372			LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
1373				/* Count them if they are the right type */
1374				switch (sctp_ifa->address.sa.sa_family) {
1375#ifdef INET
1376				case AF_INET:
1377#ifdef INET6
1378					if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4))
1379						cnt += sizeof(struct sockaddr_in6);
1380					else
1381						cnt += sizeof(struct sockaddr_in);
1382#else
1383					cnt += sizeof(struct sockaddr_in);
1384#endif
1385					break;
1386#endif
1387#ifdef INET6
1388				case AF_INET6:
1389					cnt += sizeof(struct sockaddr_in6);
1390					break;
1391#endif
1392				default:
1393					break;
1394				}
1395			}
1396		}
1397	} else {
1398		struct sctp_laddr *laddr;
1399
1400		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
1401			switch (laddr->ifa->address.sa.sa_family) {
1402#ifdef INET
1403			case AF_INET:
1404#ifdef INET6
1405				if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4))
1406					cnt += sizeof(struct sockaddr_in6);
1407				else
1408					cnt += sizeof(struct sockaddr_in);
1409#else
1410				cnt += sizeof(struct sockaddr_in);
1411#endif
1412				break;
1413#endif
1414#ifdef INET6
1415			case AF_INET6:
1416				cnt += sizeof(struct sockaddr_in6);
1417				break;
1418#endif
1419			default:
1420				break;
1421			}
1422		}
1423	}
1424	return (cnt);
1425}
1426
1427static int
1428sctp_count_max_addresses(struct sctp_inpcb *inp)
1429{
1430	int cnt = 0;
1431
1432	SCTP_IPI_ADDR_RLOCK();
1433	/* count addresses for the endpoint's default VRF */
1434	cnt = sctp_count_max_addresses_vrf(inp, inp->def_vrf_id);
1435	SCTP_IPI_ADDR_RUNLOCK();
1436	return (cnt);
1437}
1438
1439static int
1440sctp_do_connect_x(struct socket *so, struct sctp_inpcb *inp, void *optval,
1441    size_t optsize, void *p, int delay)
1442{
1443	int error = 0;
1444	int creat_lock_on = 0;
1445	struct sctp_tcb *stcb = NULL;
1446	struct sockaddr *sa;
1447	int num_v6 = 0, num_v4 = 0, *totaddrp, totaddr;
1448	uint32_t vrf_id;
1449	int bad_addresses = 0;
1450	sctp_assoc_t *a_id;
1451
1452	SCTPDBG(SCTP_DEBUG_PCB1, "Connectx called\n");
1453
1454	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
1455	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
1456		/* We are already connected AND the TCP model */
1457		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
1458		return (EADDRINUSE);
1459	}
1460	if ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) &&
1461	    (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE))) {
1462		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1463		return (EINVAL);
1464	}
1465	if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
1466		SCTP_INP_RLOCK(inp);
1467		stcb = LIST_FIRST(&inp->sctp_asoc_list);
1468		SCTP_INP_RUNLOCK(inp);
1469	}
1470	if (stcb) {
1471		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
1472		return (EALREADY);
1473	}
1474	SCTP_INP_INCR_REF(inp);
1475	SCTP_ASOC_CREATE_LOCK(inp);
1476	creat_lock_on = 1;
1477	if ((inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) ||
1478	    (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE)) {
1479		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EFAULT);
1480		error = EFAULT;
1481		goto out_now;
1482	}
1483	totaddrp = (int *)optval;
1484	totaddr = *totaddrp;
1485	sa = (struct sockaddr *)(totaddrp + 1);
1486	stcb = sctp_connectx_helper_find(inp, sa, &totaddr, &num_v4, &num_v6, &error, (optsize - sizeof(int)), &bad_addresses);
1487	if ((stcb != NULL) || bad_addresses) {
1488		/* Already have or am bring up an association */
1489		SCTP_ASOC_CREATE_UNLOCK(inp);
1490		creat_lock_on = 0;
1491		if (stcb)
1492			SCTP_TCB_UNLOCK(stcb);
1493		if (bad_addresses == 0) {
1494			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
1495			error = EALREADY;
1496		}
1497		goto out_now;
1498	}
1499#ifdef INET6
1500	if (((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) &&
1501	    (num_v6 > 0)) {
1502		error = EINVAL;
1503		goto out_now;
1504	}
1505	if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
1506	    (num_v4 > 0)) {
1507		struct in6pcb *inp6;
1508
1509		inp6 = (struct in6pcb *)inp;
1510		if (SCTP_IPV6_V6ONLY(inp6)) {
1511			/*
1512			 * if IPV6_V6ONLY flag, ignore connections destined
1513			 * to a v4 addr or v4-mapped addr
1514			 */
1515			SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1516			error = EINVAL;
1517			goto out_now;
1518		}
1519	}
1520#endif				/* INET6 */
1521	if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) ==
1522	    SCTP_PCB_FLAGS_UNBOUND) {
1523		/* Bind a ephemeral port */
1524		error = sctp_inpcb_bind(so, NULL, NULL, p);
1525		if (error) {
1526			goto out_now;
1527		}
1528	}
1529	/* FIX ME: do we want to pass in a vrf on the connect call? */
1530	vrf_id = inp->def_vrf_id;
1531
1532
1533	/* We are GOOD to go */
1534	stcb = sctp_aloc_assoc(inp, sa, &error, 0, vrf_id,
1535	    (struct thread *)p
1536	    );
1537	if (stcb == NULL) {
1538		/* Gak! no memory */
1539		goto out_now;
1540	}
1541	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
1542		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
1543		/* Set the connected flag so we can queue data */
1544		soisconnecting(so);
1545	}
1546	SCTP_SET_STATE(&stcb->asoc, SCTP_STATE_COOKIE_WAIT);
1547	/* move to second address */
1548	switch (sa->sa_family) {
1549#ifdef INET
1550	case AF_INET:
1551		sa = (struct sockaddr *)((caddr_t)sa + sizeof(struct sockaddr_in));
1552		break;
1553#endif
1554#ifdef INET6
1555	case AF_INET6:
1556		sa = (struct sockaddr *)((caddr_t)sa + sizeof(struct sockaddr_in6));
1557		break;
1558#endif
1559	default:
1560		break;
1561	}
1562
1563	error = 0;
1564	sctp_connectx_helper_add(stcb, sa, (totaddr - 1), &error);
1565	/* Fill in the return id */
1566	if (error) {
1567		(void)sctp_free_assoc(inp, stcb, SCTP_PCBFREE_FORCE, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_6);
1568		goto out_now;
1569	}
1570	a_id = (sctp_assoc_t *) optval;
1571	*a_id = sctp_get_associd(stcb);
1572
1573	/* initialize authentication parameters for the assoc */
1574	sctp_initialize_auth_params(inp, stcb);
1575
1576	if (delay) {
1577		/* doing delayed connection */
1578		stcb->asoc.delayed_connection = 1;
1579		sctp_timer_start(SCTP_TIMER_TYPE_INIT, inp, stcb, stcb->asoc.primary_destination);
1580	} else {
1581		(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
1582		sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
1583	}
1584	SCTP_TCB_UNLOCK(stcb);
1585	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
1586		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
1587		/* Set the connected flag so we can queue data */
1588		soisconnecting(so);
1589	}
1590out_now:
1591	if (creat_lock_on) {
1592		SCTP_ASOC_CREATE_UNLOCK(inp);
1593	}
1594	SCTP_INP_DECR_REF(inp);
1595	return (error);
1596}
1597
1598#define SCTP_FIND_STCB(inp, stcb, assoc_id) { \
1599	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||\
1600	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) { \
1601		SCTP_INP_RLOCK(inp); \
1602		stcb = LIST_FIRST(&inp->sctp_asoc_list); \
1603		if (stcb) { \
1604			SCTP_TCB_LOCK(stcb); \
1605                } \
1606		SCTP_INP_RUNLOCK(inp); \
1607	} else if (assoc_id > SCTP_ALL_ASSOC) { \
1608		stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1); \
1609		if (stcb == NULL) { \
1610		        SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT); \
1611			error = ENOENT; \
1612			break; \
1613		} \
1614	} else { \
1615		stcb = NULL; \
1616        } \
1617  }
1618
1619
1620#define SCTP_CHECK_AND_CAST(destp, srcp, type, size) {\
1621	if (size < sizeof(type)) { \
1622		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL); \
1623		error = EINVAL; \
1624		break; \
1625	} else { \
1626		destp = (type *)srcp; \
1627	} \
1628      }
1629
1630static int
1631sctp_getopt(struct socket *so, int optname, void *optval, size_t *optsize,
1632    void *p)
1633{
1634	struct sctp_inpcb *inp = NULL;
1635	int error, val = 0;
1636	struct sctp_tcb *stcb = NULL;
1637
1638	if (optval == NULL) {
1639		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1640		return (EINVAL);
1641	}
1642	inp = (struct sctp_inpcb *)so->so_pcb;
1643	if (inp == NULL) {
1644		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1645		return EINVAL;
1646	}
1647	error = 0;
1648
1649	switch (optname) {
1650	case SCTP_NODELAY:
1651	case SCTP_AUTOCLOSE:
1652	case SCTP_EXPLICIT_EOR:
1653	case SCTP_AUTO_ASCONF:
1654	case SCTP_DISABLE_FRAGMENTS:
1655	case SCTP_I_WANT_MAPPED_V4_ADDR:
1656	case SCTP_USE_EXT_RCVINFO:
1657		SCTP_INP_RLOCK(inp);
1658		switch (optname) {
1659		case SCTP_DISABLE_FRAGMENTS:
1660			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NO_FRAGMENT);
1661			break;
1662		case SCTP_I_WANT_MAPPED_V4_ADDR:
1663			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4);
1664			break;
1665		case SCTP_AUTO_ASCONF:
1666			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1667				/* only valid for bound all sockets */
1668				val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTO_ASCONF);
1669			} else {
1670				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1671				error = EINVAL;
1672				goto flags_out;
1673			}
1674			break;
1675		case SCTP_EXPLICIT_EOR:
1676			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_EXPLICIT_EOR);
1677			break;
1678		case SCTP_NODELAY:
1679			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NODELAY);
1680			break;
1681		case SCTP_USE_EXT_RCVINFO:
1682			val = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_EXT_RCVINFO);
1683			break;
1684		case SCTP_AUTOCLOSE:
1685			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTOCLOSE))
1686				val = TICKS_TO_SEC(inp->sctp_ep.auto_close_time);
1687			else
1688				val = 0;
1689			break;
1690
1691		default:
1692			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
1693			error = ENOPROTOOPT;
1694		}		/* end switch (sopt->sopt_name) */
1695		if (*optsize < sizeof(val)) {
1696			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1697			error = EINVAL;
1698		}
1699flags_out:
1700		SCTP_INP_RUNLOCK(inp);
1701		if (error == 0) {
1702			/* return the option value */
1703			*(int *)optval = val;
1704			*optsize = sizeof(val);
1705		}
1706		break;
1707	case SCTP_GET_PACKET_LOG:
1708		{
1709#ifdef  SCTP_PACKET_LOGGING
1710			uint8_t *target;
1711			int ret;
1712
1713			SCTP_CHECK_AND_CAST(target, optval, uint8_t, *optsize);
1714			ret = sctp_copy_out_packet_log(target, (int)*optsize);
1715			*optsize = ret;
1716#else
1717			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
1718			error = EOPNOTSUPP;
1719#endif
1720			break;
1721		}
1722	case SCTP_REUSE_PORT:
1723		{
1724			uint32_t *value;
1725
1726			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE)) {
1727				/* Can't do this for a 1-m socket */
1728				error = EINVAL;
1729				break;
1730			}
1731			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1732			*value = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE);
1733			*optsize = sizeof(uint32_t);
1734			break;
1735		}
1736	case SCTP_PARTIAL_DELIVERY_POINT:
1737		{
1738			uint32_t *value;
1739
1740			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1741			*value = inp->partial_delivery_point;
1742			*optsize = sizeof(uint32_t);
1743			break;
1744		}
1745	case SCTP_FRAGMENT_INTERLEAVE:
1746		{
1747			uint32_t *value;
1748
1749			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1750			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE)) {
1751				if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS)) {
1752					*value = SCTP_FRAG_LEVEL_2;
1753				} else {
1754					*value = SCTP_FRAG_LEVEL_1;
1755				}
1756			} else {
1757				*value = SCTP_FRAG_LEVEL_0;
1758			}
1759			*optsize = sizeof(uint32_t);
1760			break;
1761		}
1762	case SCTP_CMT_ON_OFF:
1763		{
1764			struct sctp_assoc_value *av;
1765
1766			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1767			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1768			if (stcb) {
1769				av->assoc_value = stcb->asoc.sctp_cmt_on_off;
1770				SCTP_TCB_UNLOCK(stcb);
1771			} else {
1772				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1773				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1774				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1775					SCTP_INP_RLOCK(inp);
1776					av->assoc_value = inp->sctp_cmt_on_off;
1777					SCTP_INP_RUNLOCK(inp);
1778				} else {
1779					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1780					error = EINVAL;
1781				}
1782			}
1783			if (error == 0) {
1784				*optsize = sizeof(struct sctp_assoc_value);
1785			}
1786			break;
1787		}
1788	case SCTP_PLUGGABLE_CC:
1789		{
1790			struct sctp_assoc_value *av;
1791
1792			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1793			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1794			if (stcb) {
1795				av->assoc_value = stcb->asoc.congestion_control_module;
1796				SCTP_TCB_UNLOCK(stcb);
1797			} else {
1798				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1799				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1800				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1801					SCTP_INP_RLOCK(inp);
1802					av->assoc_value = inp->sctp_ep.sctp_default_cc_module;
1803					SCTP_INP_RUNLOCK(inp);
1804				} else {
1805					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1806					error = EINVAL;
1807				}
1808			}
1809			if (error == 0) {
1810				*optsize = sizeof(struct sctp_assoc_value);
1811			}
1812			break;
1813		}
1814	case SCTP_CC_OPTION:
1815		{
1816			struct sctp_cc_option *cc_opt;
1817
1818			SCTP_CHECK_AND_CAST(cc_opt, optval, struct sctp_cc_option, *optsize);
1819			SCTP_FIND_STCB(inp, stcb, cc_opt->aid_value.assoc_id);
1820			if (stcb == NULL) {
1821				error = EINVAL;
1822			} else {
1823				if (stcb->asoc.cc_functions.sctp_cwnd_socket_option == NULL) {
1824					error = ENOTSUP;
1825				} else {
1826					error = (*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 0, cc_opt);
1827					*optsize = sizeof(struct sctp_cc_option);
1828				}
1829				SCTP_TCB_UNLOCK(stcb);
1830			}
1831			break;
1832		}
1833	case SCTP_PLUGGABLE_SS:
1834		{
1835			struct sctp_assoc_value *av;
1836
1837			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1838			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1839			if (stcb) {
1840				av->assoc_value = stcb->asoc.stream_scheduling_module;
1841				SCTP_TCB_UNLOCK(stcb);
1842			} else {
1843				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1844				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1845				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1846					SCTP_INP_RLOCK(inp);
1847					av->assoc_value = inp->sctp_ep.sctp_default_ss_module;
1848					SCTP_INP_RUNLOCK(inp);
1849				} else {
1850					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1851					error = EINVAL;
1852				}
1853			}
1854			if (error == 0) {
1855				*optsize = sizeof(struct sctp_assoc_value);
1856			}
1857			break;
1858		}
1859	case SCTP_SS_VALUE:
1860		{
1861			struct sctp_stream_value *av;
1862
1863			SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, *optsize);
1864			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1865			if (stcb) {
1866				if ((av->stream_id >= stcb->asoc.streamoutcnt) ||
1867				    (stcb->asoc.ss_functions.sctp_ss_get_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id],
1868				    &av->stream_value) < 0)) {
1869					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1870					error = EINVAL;
1871				} else {
1872					*optsize = sizeof(struct sctp_stream_value);
1873				}
1874				SCTP_TCB_UNLOCK(stcb);
1875			} else {
1876				/*
1877				 * Can't get stream value without
1878				 * association
1879				 */
1880				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1881				error = EINVAL;
1882			}
1883			break;
1884		}
1885	case SCTP_GET_ADDR_LEN:
1886		{
1887			struct sctp_assoc_value *av;
1888
1889			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1890			error = EINVAL;
1891#ifdef INET
1892			if (av->assoc_value == AF_INET) {
1893				av->assoc_value = sizeof(struct sockaddr_in);
1894				error = 0;
1895			}
1896#endif
1897#ifdef INET6
1898			if (av->assoc_value == AF_INET6) {
1899				av->assoc_value = sizeof(struct sockaddr_in6);
1900				error = 0;
1901			}
1902#endif
1903			if (error) {
1904				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1905			} else {
1906				*optsize = sizeof(struct sctp_assoc_value);
1907			}
1908			break;
1909		}
1910	case SCTP_GET_ASSOC_NUMBER:
1911		{
1912			uint32_t *value, cnt;
1913
1914			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
1915			cnt = 0;
1916			SCTP_INP_RLOCK(inp);
1917			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
1918				cnt++;
1919			}
1920			SCTP_INP_RUNLOCK(inp);
1921			*value = cnt;
1922			*optsize = sizeof(uint32_t);
1923			break;
1924		}
1925	case SCTP_GET_ASSOC_ID_LIST:
1926		{
1927			struct sctp_assoc_ids *ids;
1928			unsigned int at, limit;
1929
1930			SCTP_CHECK_AND_CAST(ids, optval, struct sctp_assoc_ids, *optsize);
1931			at = 0;
1932			limit = (*optsize - sizeof(uint32_t)) / sizeof(sctp_assoc_t);
1933			SCTP_INP_RLOCK(inp);
1934			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
1935				if (at < limit) {
1936					ids->gaids_assoc_id[at++] = sctp_get_associd(stcb);
1937				} else {
1938					error = EINVAL;
1939					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1940					break;
1941				}
1942			}
1943			SCTP_INP_RUNLOCK(inp);
1944			if (error == 0) {
1945				ids->gaids_number_of_ids = at;
1946				*optsize = ((at * sizeof(sctp_assoc_t)) + sizeof(uint32_t));
1947			}
1948			break;
1949		}
1950	case SCTP_CONTEXT:
1951		{
1952			struct sctp_assoc_value *av;
1953
1954			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
1955			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
1956
1957			if (stcb) {
1958				av->assoc_value = stcb->asoc.context;
1959				SCTP_TCB_UNLOCK(stcb);
1960			} else {
1961				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
1962				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
1963				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
1964					SCTP_INP_RLOCK(inp);
1965					av->assoc_value = inp->sctp_context;
1966					SCTP_INP_RUNLOCK(inp);
1967				} else {
1968					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
1969					error = EINVAL;
1970				}
1971			}
1972			if (error == 0) {
1973				*optsize = sizeof(struct sctp_assoc_value);
1974			}
1975			break;
1976		}
1977	case SCTP_VRF_ID:
1978		{
1979			uint32_t *default_vrfid;
1980
1981			SCTP_CHECK_AND_CAST(default_vrfid, optval, uint32_t, *optsize);
1982			*default_vrfid = inp->def_vrf_id;
1983			*optsize = sizeof(uint32_t);
1984			break;
1985		}
1986	case SCTP_GET_ASOC_VRF:
1987		{
1988			struct sctp_assoc_value *id;
1989
1990			SCTP_CHECK_AND_CAST(id, optval, struct sctp_assoc_value, *optsize);
1991			SCTP_FIND_STCB(inp, stcb, id->assoc_id);
1992			if (stcb == NULL) {
1993				error = EINVAL;
1994				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
1995			} else {
1996				id->assoc_value = stcb->asoc.vrf_id;
1997				*optsize = sizeof(struct sctp_assoc_value);
1998			}
1999			break;
2000		}
2001	case SCTP_GET_VRF_IDS:
2002		{
2003			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
2004			error = EOPNOTSUPP;
2005			break;
2006		}
2007	case SCTP_GET_NONCE_VALUES:
2008		{
2009			struct sctp_get_nonce_values *gnv;
2010
2011			SCTP_CHECK_AND_CAST(gnv, optval, struct sctp_get_nonce_values, *optsize);
2012			SCTP_FIND_STCB(inp, stcb, gnv->gn_assoc_id);
2013
2014			if (stcb) {
2015				gnv->gn_peers_tag = stcb->asoc.peer_vtag;
2016				gnv->gn_local_tag = stcb->asoc.my_vtag;
2017				SCTP_TCB_UNLOCK(stcb);
2018				*optsize = sizeof(struct sctp_get_nonce_values);
2019			} else {
2020				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2021				error = ENOTCONN;
2022			}
2023			break;
2024		}
2025	case SCTP_DELAYED_SACK:
2026		{
2027			struct sctp_sack_info *sack;
2028
2029			SCTP_CHECK_AND_CAST(sack, optval, struct sctp_sack_info, *optsize);
2030			SCTP_FIND_STCB(inp, stcb, sack->sack_assoc_id);
2031			if (stcb) {
2032				sack->sack_delay = stcb->asoc.delayed_ack;
2033				sack->sack_freq = stcb->asoc.sack_freq;
2034				SCTP_TCB_UNLOCK(stcb);
2035			} else {
2036				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2037				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2038				    (sack->sack_assoc_id == SCTP_FUTURE_ASSOC)) {
2039					SCTP_INP_RLOCK(inp);
2040					sack->sack_delay = TICKS_TO_MSEC(inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_RECV]);
2041					sack->sack_freq = inp->sctp_ep.sctp_sack_freq;
2042					SCTP_INP_RUNLOCK(inp);
2043				} else {
2044					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2045					error = EINVAL;
2046				}
2047			}
2048			if (error == 0) {
2049				*optsize = sizeof(struct sctp_sack_info);
2050			}
2051			break;
2052		}
2053	case SCTP_GET_SNDBUF_USE:
2054		{
2055			struct sctp_sockstat *ss;
2056
2057			SCTP_CHECK_AND_CAST(ss, optval, struct sctp_sockstat, *optsize);
2058			SCTP_FIND_STCB(inp, stcb, ss->ss_assoc_id);
2059
2060			if (stcb) {
2061				ss->ss_total_sndbuf = stcb->asoc.total_output_queue_size;
2062				ss->ss_total_recv_buf = (stcb->asoc.size_on_reasm_queue +
2063				    stcb->asoc.size_on_all_streams);
2064				SCTP_TCB_UNLOCK(stcb);
2065				*optsize = sizeof(struct sctp_sockstat);
2066			} else {
2067				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2068				error = ENOTCONN;
2069			}
2070			break;
2071		}
2072	case SCTP_MAX_BURST:
2073		{
2074			struct sctp_assoc_value *av;
2075
2076			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
2077			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
2078
2079			if (stcb) {
2080				av->assoc_value = stcb->asoc.max_burst;
2081				SCTP_TCB_UNLOCK(stcb);
2082			} else {
2083				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2084				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2085				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
2086					SCTP_INP_RLOCK(inp);
2087					av->assoc_value = inp->sctp_ep.max_burst;
2088					SCTP_INP_RUNLOCK(inp);
2089				} else {
2090					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2091					error = EINVAL;
2092				}
2093			}
2094			if (error == 0) {
2095				*optsize = sizeof(struct sctp_assoc_value);
2096			}
2097			break;
2098		}
2099	case SCTP_MAXSEG:
2100		{
2101			struct sctp_assoc_value *av;
2102			int ovh;
2103
2104			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
2105			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
2106
2107			if (stcb) {
2108				av->assoc_value = sctp_get_frag_point(stcb, &stcb->asoc);
2109				SCTP_TCB_UNLOCK(stcb);
2110			} else {
2111				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2112				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2113				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
2114					SCTP_INP_RLOCK(inp);
2115					if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
2116						ovh = SCTP_MED_OVERHEAD;
2117					} else {
2118						ovh = SCTP_MED_V4_OVERHEAD;
2119					}
2120					if (inp->sctp_frag_point >= SCTP_DEFAULT_MAXSEGMENT)
2121						av->assoc_value = 0;
2122					else
2123						av->assoc_value = inp->sctp_frag_point - ovh;
2124					SCTP_INP_RUNLOCK(inp);
2125				} else {
2126					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2127					error = EINVAL;
2128				}
2129			}
2130			if (error == 0) {
2131				*optsize = sizeof(struct sctp_assoc_value);
2132			}
2133			break;
2134		}
2135	case SCTP_GET_STAT_LOG:
2136		error = sctp_fill_stat_log(optval, optsize);
2137		break;
2138	case SCTP_EVENTS:
2139		{
2140			struct sctp_event_subscribe *events;
2141
2142			SCTP_CHECK_AND_CAST(events, optval, struct sctp_event_subscribe, *optsize);
2143			memset(events, 0, sizeof(struct sctp_event_subscribe));
2144			SCTP_INP_RLOCK(inp);
2145			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT))
2146				events->sctp_data_io_event = 1;
2147
2148			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT))
2149				events->sctp_association_event = 1;
2150
2151			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVPADDREVNT))
2152				events->sctp_address_event = 1;
2153
2154			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT))
2155				events->sctp_send_failure_event = 1;
2156
2157			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVPEERERR))
2158				events->sctp_peer_error_event = 1;
2159
2160			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT))
2161				events->sctp_shutdown_event = 1;
2162
2163			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PDAPIEVNT))
2164				events->sctp_partial_delivery_event = 1;
2165
2166			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT))
2167				events->sctp_adaptation_layer_event = 1;
2168
2169			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTHEVNT))
2170				events->sctp_authentication_event = 1;
2171
2172			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DRYEVNT))
2173				events->sctp_sender_dry_event = 1;
2174
2175			if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT))
2176				events->sctp_stream_reset_event = 1;
2177			SCTP_INP_RUNLOCK(inp);
2178			*optsize = sizeof(struct sctp_event_subscribe);
2179			break;
2180		}
2181	case SCTP_ADAPTATION_LAYER:
2182		{
2183			uint32_t *value;
2184
2185			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2186
2187			SCTP_INP_RLOCK(inp);
2188			*value = inp->sctp_ep.adaptation_layer_indicator;
2189			SCTP_INP_RUNLOCK(inp);
2190			*optsize = sizeof(uint32_t);
2191			break;
2192		}
2193	case SCTP_SET_INITIAL_DBG_SEQ:
2194		{
2195			uint32_t *value;
2196
2197			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2198			SCTP_INP_RLOCK(inp);
2199			*value = inp->sctp_ep.initial_sequence_debug;
2200			SCTP_INP_RUNLOCK(inp);
2201			*optsize = sizeof(uint32_t);
2202			break;
2203		}
2204	case SCTP_GET_LOCAL_ADDR_SIZE:
2205		{
2206			uint32_t *value;
2207
2208			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2209			SCTP_INP_RLOCK(inp);
2210			*value = sctp_count_max_addresses(inp);
2211			SCTP_INP_RUNLOCK(inp);
2212			*optsize = sizeof(uint32_t);
2213			break;
2214		}
2215	case SCTP_GET_REMOTE_ADDR_SIZE:
2216		{
2217			uint32_t *value;
2218			size_t size;
2219			struct sctp_nets *net;
2220
2221			SCTP_CHECK_AND_CAST(value, optval, uint32_t, *optsize);
2222			/* FIXME MT: change to sctp_assoc_value? */
2223			SCTP_FIND_STCB(inp, stcb, (sctp_assoc_t) * value);
2224
2225			if (stcb) {
2226				size = 0;
2227				/* Count the sizes */
2228				TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
2229					switch (net->ro._l_addr.sa.sa_family) {
2230#ifdef INET
2231					case AF_INET:
2232#ifdef INET6
2233						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2234							size += sizeof(struct sockaddr_in6);
2235						} else {
2236							size += sizeof(struct sockaddr_in);
2237						}
2238#else
2239						size += sizeof(struct sockaddr_in);
2240#endif
2241						break;
2242#endif
2243#ifdef INET6
2244					case AF_INET6:
2245						size += sizeof(struct sockaddr_in6);
2246						break;
2247#endif
2248					default:
2249						break;
2250					}
2251				}
2252				SCTP_TCB_UNLOCK(stcb);
2253				*value = (uint32_t) size;
2254				*optsize = sizeof(uint32_t);
2255			} else {
2256				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
2257				error = ENOTCONN;
2258			}
2259			break;
2260		}
2261	case SCTP_GET_PEER_ADDRESSES:
2262		/*
2263		 * Get the address information, an array is passed in to
2264		 * fill up we pack it.
2265		 */
2266		{
2267			size_t cpsz, left;
2268			struct sockaddr_storage *sas;
2269			struct sctp_nets *net;
2270			struct sctp_getaddresses *saddr;
2271
2272			SCTP_CHECK_AND_CAST(saddr, optval, struct sctp_getaddresses, *optsize);
2273			SCTP_FIND_STCB(inp, stcb, saddr->sget_assoc_id);
2274
2275			if (stcb) {
2276				left = (*optsize) - sizeof(struct sctp_getaddresses);
2277				*optsize = sizeof(struct sctp_getaddresses);
2278				sas = (struct sockaddr_storage *)&saddr->addr[0];
2279
2280				TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
2281					switch (net->ro._l_addr.sa.sa_family) {
2282#ifdef INET
2283					case AF_INET:
2284#ifdef INET6
2285						if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2286							cpsz = sizeof(struct sockaddr_in6);
2287						} else {
2288							cpsz = sizeof(struct sockaddr_in);
2289						}
2290#else
2291						cpsz = sizeof(struct sockaddr_in);
2292#endif
2293						break;
2294#endif
2295#ifdef INET6
2296					case AF_INET6:
2297						cpsz = sizeof(struct sockaddr_in6);
2298						break;
2299#endif
2300					default:
2301						cpsz = 0;
2302						break;
2303					}
2304					if (cpsz == 0) {
2305						break;
2306					}
2307					if (left < cpsz) {
2308						/* not enough room. */
2309						break;
2310					}
2311#if defined(INET) && defined(INET6)
2312					if ((sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) &&
2313					    (net->ro._l_addr.sa.sa_family == AF_INET)) {
2314						/* Must map the address */
2315						in6_sin_2_v4mapsin6(&net->ro._l_addr.sin,
2316						    (struct sockaddr_in6 *)sas);
2317					} else {
2318						memcpy(sas, &net->ro._l_addr, cpsz);
2319					}
2320#else
2321					memcpy(sas, &net->ro._l_addr, cpsz);
2322#endif
2323					((struct sockaddr_in *)sas)->sin_port = stcb->rport;
2324
2325					sas = (struct sockaddr_storage *)((caddr_t)sas + cpsz);
2326					left -= cpsz;
2327					*optsize += cpsz;
2328				}
2329				SCTP_TCB_UNLOCK(stcb);
2330			} else {
2331				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
2332				error = ENOENT;
2333			}
2334			break;
2335		}
2336	case SCTP_GET_LOCAL_ADDRESSES:
2337		{
2338			size_t limit, actual;
2339			struct sockaddr_storage *sas;
2340			struct sctp_getaddresses *saddr;
2341
2342			SCTP_CHECK_AND_CAST(saddr, optval, struct sctp_getaddresses, *optsize);
2343			SCTP_FIND_STCB(inp, stcb, saddr->sget_assoc_id);
2344
2345			sas = (struct sockaddr_storage *)&saddr->addr[0];
2346			limit = *optsize - sizeof(sctp_assoc_t);
2347			actual = sctp_fill_up_addresses(inp, stcb, limit, sas);
2348			if (stcb) {
2349				SCTP_TCB_UNLOCK(stcb);
2350			}
2351			*optsize = sizeof(struct sockaddr_storage) + actual;
2352			break;
2353		}
2354	case SCTP_PEER_ADDR_PARAMS:
2355		{
2356			struct sctp_paddrparams *paddrp;
2357			struct sctp_nets *net;
2358			struct sockaddr *addr;
2359
2360#if defined(INET) && defined(INET6)
2361			struct sockaddr_in sin_store;
2362
2363#endif
2364
2365			SCTP_CHECK_AND_CAST(paddrp, optval, struct sctp_paddrparams, *optsize);
2366			SCTP_FIND_STCB(inp, stcb, paddrp->spp_assoc_id);
2367
2368#if defined(INET) && defined(INET6)
2369			if (paddrp->spp_address.ss_family == AF_INET6) {
2370				struct sockaddr_in6 *sin6;
2371
2372				sin6 = (struct sockaddr_in6 *)&paddrp->spp_address;
2373				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
2374					in6_sin6_2_sin(&sin_store, sin6);
2375					addr = (struct sockaddr *)&sin_store;
2376				} else {
2377					addr = (struct sockaddr *)&paddrp->spp_address;
2378				}
2379			} else {
2380				addr = (struct sockaddr *)&paddrp->spp_address;
2381			}
2382#else
2383			addr = (struct sockaddr *)&paddrp->spp_address;
2384#endif
2385			if (stcb != NULL) {
2386				net = sctp_findnet(stcb, addr);
2387			} else {
2388				/*
2389				 * We increment here since
2390				 * sctp_findassociation_ep_addr() wil do a
2391				 * decrement if it finds the stcb as long as
2392				 * the locked tcb (last argument) is NOT a
2393				 * TCB.. aka NULL.
2394				 */
2395				net = NULL;
2396				SCTP_INP_INCR_REF(inp);
2397				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
2398				if (stcb == NULL) {
2399					SCTP_INP_DECR_REF(inp);
2400				}
2401			}
2402			if ((stcb != NULL) && (net == NULL)) {
2403#ifdef INET
2404				if (addr->sa_family == AF_INET) {
2405					struct sockaddr_in *sin;
2406
2407					sin = (struct sockaddr_in *)addr;
2408					if (sin->sin_addr.s_addr != INADDR_ANY) {
2409						error = EINVAL;
2410						SCTP_TCB_UNLOCK(stcb);
2411						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2412						break;
2413					}
2414				} else
2415#endif
2416#ifdef INET6
2417				if (addr->sa_family == AF_INET6) {
2418					struct sockaddr_in6 *sin6;
2419
2420					sin6 = (struct sockaddr_in6 *)addr;
2421					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2422						error = EINVAL;
2423						SCTP_TCB_UNLOCK(stcb);
2424						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2425						break;
2426					}
2427				} else
2428#endif
2429				{
2430					error = EAFNOSUPPORT;
2431					SCTP_TCB_UNLOCK(stcb);
2432					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2433					break;
2434				}
2435			}
2436			if (stcb != NULL) {
2437				/* Applies to the specific association */
2438				paddrp->spp_flags = 0;
2439				if (net != NULL) {
2440					int ovh;
2441
2442					if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
2443						ovh = SCTP_MED_OVERHEAD;
2444					} else {
2445						ovh = SCTP_MED_V4_OVERHEAD;
2446					}
2447
2448					paddrp->spp_hbinterval = net->heart_beat_delay;
2449					paddrp->spp_pathmaxrxt = net->failure_threshold;
2450					paddrp->spp_pathmtu = net->mtu - ovh;
2451					/* get flags for HB */
2452					if (net->dest_state & SCTP_ADDR_NOHB) {
2453						paddrp->spp_flags |= SPP_HB_DISABLE;
2454					} else {
2455						paddrp->spp_flags |= SPP_HB_ENABLE;
2456					}
2457					/* get flags for PMTU */
2458					if (net->dest_state & SCTP_ADDR_NO_PMTUD) {
2459						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2460					} else {
2461						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2462					}
2463					if (net->dscp & 0x01) {
2464						paddrp->spp_dscp = net->dscp & 0xfc;
2465						paddrp->spp_flags |= SPP_DSCP;
2466					}
2467#ifdef INET6
2468					if ((net->ro._l_addr.sa.sa_family == AF_INET6) &&
2469					    (net->flowlabel & 0x80000000)) {
2470						paddrp->spp_ipv6_flowlabel = net->flowlabel & 0x000fffff;
2471						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2472					}
2473#endif
2474				} else {
2475					/*
2476					 * No destination so return default
2477					 * value
2478					 */
2479					paddrp->spp_pathmaxrxt = stcb->asoc.def_net_failure;
2480					paddrp->spp_pathmtu = sctp_get_frag_point(stcb, &stcb->asoc);
2481					if (stcb->asoc.default_dscp & 0x01) {
2482						paddrp->spp_dscp = stcb->asoc.default_dscp & 0xfc;
2483						paddrp->spp_flags |= SPP_DSCP;
2484					}
2485#ifdef INET6
2486					if (stcb->asoc.default_flowlabel & 0x80000000) {
2487						paddrp->spp_ipv6_flowlabel = stcb->asoc.default_flowlabel & 0x000fffff;
2488						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2489					}
2490#endif
2491					/* default settings should be these */
2492					if (sctp_stcb_is_feature_on(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT)) {
2493						paddrp->spp_flags |= SPP_HB_DISABLE;
2494					} else {
2495						paddrp->spp_flags |= SPP_HB_ENABLE;
2496					}
2497					if (sctp_stcb_is_feature_on(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD)) {
2498						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2499					} else {
2500						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2501					}
2502					paddrp->spp_hbinterval = stcb->asoc.heart_beat_delay;
2503				}
2504				paddrp->spp_assoc_id = sctp_get_associd(stcb);
2505				SCTP_TCB_UNLOCK(stcb);
2506			} else {
2507				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2508				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2509				    (paddrp->spp_assoc_id == SCTP_FUTURE_ASSOC)) {
2510					/* Use endpoint defaults */
2511					SCTP_INP_RLOCK(inp);
2512					paddrp->spp_pathmaxrxt = inp->sctp_ep.def_net_failure;
2513					paddrp->spp_hbinterval = TICKS_TO_MSEC(inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT]);
2514					paddrp->spp_assoc_id = SCTP_FUTURE_ASSOC;
2515					/* get inp's default */
2516					if (inp->sctp_ep.default_dscp & 0x01) {
2517						paddrp->spp_dscp = inp->sctp_ep.default_dscp & 0xfc;
2518						paddrp->spp_flags |= SPP_DSCP;
2519					}
2520#ifdef INET6
2521					if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
2522					    (inp->sctp_ep.default_flowlabel & 0x80000000)) {
2523						paddrp->spp_ipv6_flowlabel = inp->sctp_ep.default_flowlabel & 0x000fffff;
2524						paddrp->spp_flags |= SPP_IPV6_FLOWLABEL;
2525					}
2526#endif
2527					/* can't return this */
2528					paddrp->spp_pathmtu = 0;
2529
2530					if (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT)) {
2531						paddrp->spp_flags |= SPP_HB_ENABLE;
2532					} else {
2533						paddrp->spp_flags |= SPP_HB_DISABLE;
2534					}
2535					if (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD)) {
2536						paddrp->spp_flags |= SPP_PMTUD_ENABLE;
2537					} else {
2538						paddrp->spp_flags |= SPP_PMTUD_DISABLE;
2539					}
2540					SCTP_INP_RUNLOCK(inp);
2541				} else {
2542					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2543					error = EINVAL;
2544				}
2545			}
2546			if (error == 0) {
2547				*optsize = sizeof(struct sctp_paddrparams);
2548			}
2549			break;
2550		}
2551	case SCTP_GET_PEER_ADDR_INFO:
2552		{
2553			struct sctp_paddrinfo *paddri;
2554			struct sctp_nets *net;
2555			struct sockaddr *addr;
2556
2557#if defined(INET) && defined(INET6)
2558			struct sockaddr_in sin_store;
2559
2560#endif
2561
2562			SCTP_CHECK_AND_CAST(paddri, optval, struct sctp_paddrinfo, *optsize);
2563			SCTP_FIND_STCB(inp, stcb, paddri->spinfo_assoc_id);
2564
2565#if defined(INET) && defined(INET6)
2566			if (paddri->spinfo_address.ss_family == AF_INET6) {
2567				struct sockaddr_in6 *sin6;
2568
2569				sin6 = (struct sockaddr_in6 *)&paddri->spinfo_address;
2570				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
2571					in6_sin6_2_sin(&sin_store, sin6);
2572					addr = (struct sockaddr *)&sin_store;
2573				} else {
2574					addr = (struct sockaddr *)&paddri->spinfo_address;
2575				}
2576			} else {
2577				addr = (struct sockaddr *)&paddri->spinfo_address;
2578			}
2579#else
2580			addr = (struct sockaddr *)&paddri->spinfo_address;
2581#endif
2582			if (stcb != NULL) {
2583				net = sctp_findnet(stcb, addr);
2584			} else {
2585				/*
2586				 * We increment here since
2587				 * sctp_findassociation_ep_addr() wil do a
2588				 * decrement if it finds the stcb as long as
2589				 * the locked tcb (last argument) is NOT a
2590				 * TCB.. aka NULL.
2591				 */
2592				net = NULL;
2593				SCTP_INP_INCR_REF(inp);
2594				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
2595				if (stcb == NULL) {
2596					SCTP_INP_DECR_REF(inp);
2597				}
2598			}
2599
2600			if ((stcb != NULL) && (net != NULL)) {
2601				if (net->dest_state & SCTP_ADDR_UNCONFIRMED) {
2602					/* It's unconfirmed */
2603					paddri->spinfo_state = SCTP_UNCONFIRMED;
2604				} else if (net->dest_state & SCTP_ADDR_REACHABLE) {
2605					/* It's active */
2606					paddri->spinfo_state = SCTP_ACTIVE;
2607				} else {
2608					/* It's inactive */
2609					paddri->spinfo_state = SCTP_INACTIVE;
2610				}
2611				paddri->spinfo_cwnd = net->cwnd;
2612				paddri->spinfo_srtt = net->lastsa >> SCTP_RTT_SHIFT;
2613				paddri->spinfo_rto = net->RTO;
2614				paddri->spinfo_assoc_id = sctp_get_associd(stcb);
2615				paddri->spinfo_mtu = net->mtu;
2616				SCTP_TCB_UNLOCK(stcb);
2617				*optsize = sizeof(struct sctp_paddrinfo);
2618			} else {
2619				if (stcb != NULL) {
2620					SCTP_TCB_UNLOCK(stcb);
2621				}
2622				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
2623				error = ENOENT;
2624			}
2625			break;
2626		}
2627	case SCTP_PCB_STATUS:
2628		{
2629			struct sctp_pcbinfo *spcb;
2630
2631			SCTP_CHECK_AND_CAST(spcb, optval, struct sctp_pcbinfo, *optsize);
2632			sctp_fill_pcbinfo(spcb);
2633			*optsize = sizeof(struct sctp_pcbinfo);
2634			break;
2635		}
2636	case SCTP_STATUS:
2637		{
2638			struct sctp_nets *net;
2639			struct sctp_status *sstat;
2640
2641			SCTP_CHECK_AND_CAST(sstat, optval, struct sctp_status, *optsize);
2642			SCTP_FIND_STCB(inp, stcb, sstat->sstat_assoc_id);
2643
2644			if (stcb == NULL) {
2645				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2646				error = EINVAL;
2647				break;
2648			}
2649			/*
2650			 * I think passing the state is fine since
2651			 * sctp_constants.h will be available to the user
2652			 * land.
2653			 */
2654			sstat->sstat_state = stcb->asoc.state;
2655			sstat->sstat_assoc_id = sctp_get_associd(stcb);
2656			sstat->sstat_rwnd = stcb->asoc.peers_rwnd;
2657			sstat->sstat_unackdata = stcb->asoc.sent_queue_cnt;
2658			/*
2659			 * We can't include chunks that have been passed to
2660			 * the socket layer. Only things in queue.
2661			 */
2662			sstat->sstat_penddata = (stcb->asoc.cnt_on_reasm_queue +
2663			    stcb->asoc.cnt_on_all_streams);
2664
2665
2666			sstat->sstat_instrms = stcb->asoc.streamincnt;
2667			sstat->sstat_outstrms = stcb->asoc.streamoutcnt;
2668			sstat->sstat_fragmentation_point = sctp_get_frag_point(stcb, &stcb->asoc);
2669			memcpy(&sstat->sstat_primary.spinfo_address,
2670			    &stcb->asoc.primary_destination->ro._l_addr,
2671			    ((struct sockaddr *)(&stcb->asoc.primary_destination->ro._l_addr))->sa_len);
2672			net = stcb->asoc.primary_destination;
2673			((struct sockaddr_in *)&sstat->sstat_primary.spinfo_address)->sin_port = stcb->rport;
2674			/*
2675			 * Again the user can get info from sctp_constants.h
2676			 * for what the state of the network is.
2677			 */
2678			if (net->dest_state & SCTP_ADDR_UNCONFIRMED) {
2679				/* It's unconfirmed */
2680				sstat->sstat_primary.spinfo_state = SCTP_UNCONFIRMED;
2681			} else if (net->dest_state & SCTP_ADDR_REACHABLE) {
2682				/* It's active */
2683				sstat->sstat_primary.spinfo_state = SCTP_ACTIVE;
2684			} else {
2685				/* It's inactive */
2686				sstat->sstat_primary.spinfo_state = SCTP_INACTIVE;
2687			}
2688			sstat->sstat_primary.spinfo_cwnd = net->cwnd;
2689			sstat->sstat_primary.spinfo_srtt = net->lastsa >> SCTP_RTT_SHIFT;
2690			sstat->sstat_primary.spinfo_rto = net->RTO;
2691			sstat->sstat_primary.spinfo_mtu = net->mtu;
2692			sstat->sstat_primary.spinfo_assoc_id = sctp_get_associd(stcb);
2693			SCTP_TCB_UNLOCK(stcb);
2694			*optsize = sizeof(struct sctp_status);
2695			break;
2696		}
2697	case SCTP_RTOINFO:
2698		{
2699			struct sctp_rtoinfo *srto;
2700
2701			SCTP_CHECK_AND_CAST(srto, optval, struct sctp_rtoinfo, *optsize);
2702			SCTP_FIND_STCB(inp, stcb, srto->srto_assoc_id);
2703
2704			if (stcb) {
2705				srto->srto_initial = stcb->asoc.initial_rto;
2706				srto->srto_max = stcb->asoc.maxrto;
2707				srto->srto_min = stcb->asoc.minrto;
2708				SCTP_TCB_UNLOCK(stcb);
2709			} else {
2710				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2711				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2712				    (srto->srto_assoc_id == SCTP_FUTURE_ASSOC)) {
2713					SCTP_INP_RLOCK(inp);
2714					srto->srto_initial = inp->sctp_ep.initial_rto;
2715					srto->srto_max = inp->sctp_ep.sctp_maxrto;
2716					srto->srto_min = inp->sctp_ep.sctp_minrto;
2717					SCTP_INP_RUNLOCK(inp);
2718				} else {
2719					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2720					error = EINVAL;
2721				}
2722			}
2723			if (error == 0) {
2724				*optsize = sizeof(struct sctp_rtoinfo);
2725			}
2726			break;
2727		}
2728	case SCTP_TIMEOUTS:
2729		{
2730			struct sctp_timeouts *stimo;
2731
2732			SCTP_CHECK_AND_CAST(stimo, optval, struct sctp_timeouts, *optsize);
2733			SCTP_FIND_STCB(inp, stcb, stimo->stimo_assoc_id);
2734
2735			if (stcb) {
2736				stimo->stimo_init = stcb->asoc.timoinit;
2737				stimo->stimo_data = stcb->asoc.timodata;
2738				stimo->stimo_sack = stcb->asoc.timosack;
2739				stimo->stimo_shutdown = stcb->asoc.timoshutdown;
2740				stimo->stimo_heartbeat = stcb->asoc.timoheartbeat;
2741				stimo->stimo_cookie = stcb->asoc.timocookie;
2742				stimo->stimo_shutdownack = stcb->asoc.timoshutdownack;
2743				SCTP_TCB_UNLOCK(stcb);
2744				*optsize = sizeof(struct sctp_timeouts);
2745			} else {
2746				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2747				error = EINVAL;
2748			}
2749			break;
2750		}
2751	case SCTP_ASSOCINFO:
2752		{
2753			struct sctp_assocparams *sasoc;
2754
2755			SCTP_CHECK_AND_CAST(sasoc, optval, struct sctp_assocparams, *optsize);
2756			SCTP_FIND_STCB(inp, stcb, sasoc->sasoc_assoc_id);
2757
2758			if (stcb) {
2759				sasoc->sasoc_cookie_life = TICKS_TO_MSEC(stcb->asoc.cookie_life);
2760				sasoc->sasoc_asocmaxrxt = stcb->asoc.max_send_times;
2761				sasoc->sasoc_number_peer_destinations = stcb->asoc.numnets;
2762				sasoc->sasoc_peer_rwnd = stcb->asoc.peers_rwnd;
2763				sasoc->sasoc_local_rwnd = stcb->asoc.my_rwnd;
2764				SCTP_TCB_UNLOCK(stcb);
2765			} else {
2766				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2767				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2768				    (sasoc->sasoc_assoc_id == SCTP_FUTURE_ASSOC)) {
2769					SCTP_INP_RLOCK(inp);
2770					sasoc->sasoc_cookie_life = TICKS_TO_MSEC(inp->sctp_ep.def_cookie_life);
2771					sasoc->sasoc_asocmaxrxt = inp->sctp_ep.max_send_times;
2772					sasoc->sasoc_number_peer_destinations = 0;
2773					sasoc->sasoc_peer_rwnd = 0;
2774					sasoc->sasoc_local_rwnd = sbspace(&inp->sctp_socket->so_rcv);
2775					SCTP_INP_RUNLOCK(inp);
2776				} else {
2777					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2778					error = EINVAL;
2779				}
2780			}
2781			if (error == 0) {
2782				*optsize = sizeof(struct sctp_assocparams);
2783			}
2784			break;
2785		}
2786	case SCTP_DEFAULT_SEND_PARAM:
2787		{
2788			struct sctp_sndrcvinfo *s_info;
2789
2790			SCTP_CHECK_AND_CAST(s_info, optval, struct sctp_sndrcvinfo, *optsize);
2791			SCTP_FIND_STCB(inp, stcb, s_info->sinfo_assoc_id);
2792
2793			if (stcb) {
2794				memcpy(s_info, &stcb->asoc.def_send, sizeof(stcb->asoc.def_send));
2795				SCTP_TCB_UNLOCK(stcb);
2796			} else {
2797				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2798				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2799				    (s_info->sinfo_assoc_id == SCTP_FUTURE_ASSOC)) {
2800					SCTP_INP_RLOCK(inp);
2801					memcpy(s_info, &inp->def_send, sizeof(inp->def_send));
2802					SCTP_INP_RUNLOCK(inp);
2803				} else {
2804					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2805					error = EINVAL;
2806				}
2807			}
2808			if (error == 0) {
2809				*optsize = sizeof(struct sctp_sndrcvinfo);
2810			}
2811			break;
2812		}
2813	case SCTP_INITMSG:
2814		{
2815			struct sctp_initmsg *sinit;
2816
2817			SCTP_CHECK_AND_CAST(sinit, optval, struct sctp_initmsg, *optsize);
2818			SCTP_INP_RLOCK(inp);
2819			sinit->sinit_num_ostreams = inp->sctp_ep.pre_open_stream_count;
2820			sinit->sinit_max_instreams = inp->sctp_ep.max_open_streams_intome;
2821			sinit->sinit_max_attempts = inp->sctp_ep.max_init_times;
2822			sinit->sinit_max_init_timeo = inp->sctp_ep.initial_init_rto_max;
2823			SCTP_INP_RUNLOCK(inp);
2824			*optsize = sizeof(struct sctp_initmsg);
2825			break;
2826		}
2827	case SCTP_PRIMARY_ADDR:
2828		/* we allow a "get" operation on this */
2829		{
2830			struct sctp_setprim *ssp;
2831
2832			SCTP_CHECK_AND_CAST(ssp, optval, struct sctp_setprim, *optsize);
2833			SCTP_FIND_STCB(inp, stcb, ssp->ssp_assoc_id);
2834
2835			if (stcb) {
2836				union sctp_sockstore *addr;
2837
2838				addr = &stcb->asoc.primary_destination->ro._l_addr;
2839				switch (addr->sa.sa_family) {
2840#ifdef INET
2841				case AF_INET:
2842#ifdef INET6
2843					if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_NEEDS_MAPPED_V4)) {
2844						in6_sin_2_v4mapsin6(&addr->sin,
2845						    (struct sockaddr_in6 *)&ssp->ssp_addr);
2846					} else {
2847						memcpy(&ssp->ssp_addr, &addr->sin, sizeof(struct sockaddr_in));
2848					}
2849#else
2850					memcpy(&ssp->ssp_addr, &addr->sin, sizeof(struct sockaddr_in));
2851#endif
2852					break;
2853#endif
2854#ifdef INET6
2855				case AF_INET6:
2856					memcpy(&ssp->ssp_addr, &addr->sin6, sizeof(struct sockaddr_in6));
2857					break;
2858#endif
2859				default:
2860					break;
2861				}
2862				SCTP_TCB_UNLOCK(stcb);
2863				*optsize = sizeof(struct sctp_setprim);
2864			} else {
2865				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2866				error = EINVAL;
2867			}
2868			break;
2869		}
2870	case SCTP_HMAC_IDENT:
2871		{
2872			struct sctp_hmacalgo *shmac;
2873			sctp_hmaclist_t *hmaclist;
2874			uint32_t size;
2875			int i;
2876
2877			SCTP_CHECK_AND_CAST(shmac, optval, struct sctp_hmacalgo, *optsize);
2878
2879			SCTP_INP_RLOCK(inp);
2880			hmaclist = inp->sctp_ep.local_hmacs;
2881			if (hmaclist == NULL) {
2882				/* no HMACs to return */
2883				*optsize = sizeof(*shmac);
2884				SCTP_INP_RUNLOCK(inp);
2885				break;
2886			}
2887			/* is there room for all of the hmac ids? */
2888			size = sizeof(*shmac) + (hmaclist->num_algo *
2889			    sizeof(shmac->shmac_idents[0]));
2890			if ((size_t)(*optsize) < size) {
2891				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2892				error = EINVAL;
2893				SCTP_INP_RUNLOCK(inp);
2894				break;
2895			}
2896			/* copy in the list */
2897			shmac->shmac_number_of_idents = hmaclist->num_algo;
2898			for (i = 0; i < hmaclist->num_algo; i++) {
2899				shmac->shmac_idents[i] = hmaclist->hmac[i];
2900			}
2901			SCTP_INP_RUNLOCK(inp);
2902			*optsize = size;
2903			break;
2904		}
2905	case SCTP_AUTH_ACTIVE_KEY:
2906		{
2907			struct sctp_authkeyid *scact;
2908
2909			SCTP_CHECK_AND_CAST(scact, optval, struct sctp_authkeyid, *optsize);
2910			SCTP_FIND_STCB(inp, stcb, scact->scact_assoc_id);
2911
2912			if (stcb) {
2913				/* get the active key on the assoc */
2914				scact->scact_keynumber = stcb->asoc.authinfo.active_keyid;
2915				SCTP_TCB_UNLOCK(stcb);
2916			} else {
2917				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2918				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2919				    (scact->scact_assoc_id == SCTP_FUTURE_ASSOC)) {
2920					/* get the endpoint active key */
2921					SCTP_INP_RLOCK(inp);
2922					scact->scact_keynumber = inp->sctp_ep.default_keyid;
2923					SCTP_INP_RUNLOCK(inp);
2924				} else {
2925					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2926					error = EINVAL;
2927				}
2928			}
2929			if (error == 0) {
2930				*optsize = sizeof(struct sctp_authkeyid);
2931			}
2932			break;
2933		}
2934	case SCTP_LOCAL_AUTH_CHUNKS:
2935		{
2936			struct sctp_authchunks *sac;
2937			sctp_auth_chklist_t *chklist = NULL;
2938			size_t size = 0;
2939
2940			SCTP_CHECK_AND_CAST(sac, optval, struct sctp_authchunks, *optsize);
2941			SCTP_FIND_STCB(inp, stcb, sac->gauth_assoc_id);
2942
2943			if (stcb) {
2944				/* get off the assoc */
2945				chklist = stcb->asoc.local_auth_chunks;
2946				/* is there enough space? */
2947				size = sctp_auth_get_chklist_size(chklist);
2948				if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2949					error = EINVAL;
2950					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2951				} else {
2952					/* copy in the chunks */
2953					(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
2954					sac->gauth_number_of_chunks = (uint32_t) size;
2955					*optsize = sizeof(struct sctp_authchunks) + size;
2956				}
2957				SCTP_TCB_UNLOCK(stcb);
2958			} else {
2959				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
2960				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
2961				    (sac->gauth_assoc_id == SCTP_FUTURE_ASSOC)) {
2962					/* get off the endpoint */
2963					SCTP_INP_RLOCK(inp);
2964					chklist = inp->sctp_ep.local_auth_chunks;
2965					/* is there enough space? */
2966					size = sctp_auth_get_chklist_size(chklist);
2967					if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2968						error = EINVAL;
2969						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
2970					} else {
2971						/* copy in the chunks */
2972						(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
2973						sac->gauth_number_of_chunks = (uint32_t) size;
2974						*optsize = sizeof(struct sctp_authchunks) + size;
2975					}
2976					SCTP_INP_RUNLOCK(inp);
2977				} else {
2978					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
2979					error = EINVAL;
2980				}
2981			}
2982			break;
2983		}
2984	case SCTP_PEER_AUTH_CHUNKS:
2985		{
2986			struct sctp_authchunks *sac;
2987			sctp_auth_chklist_t *chklist = NULL;
2988			size_t size = 0;
2989
2990			SCTP_CHECK_AND_CAST(sac, optval, struct sctp_authchunks, *optsize);
2991			SCTP_FIND_STCB(inp, stcb, sac->gauth_assoc_id);
2992
2993			if (stcb) {
2994				/* get off the assoc */
2995				chklist = stcb->asoc.peer_auth_chunks;
2996				/* is there enough space? */
2997				size = sctp_auth_get_chklist_size(chklist);
2998				if (*optsize < (sizeof(struct sctp_authchunks) + size)) {
2999					error = EINVAL;
3000					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3001				} else {
3002					/* copy in the chunks */
3003					(void)sctp_serialize_auth_chunks(chklist, sac->gauth_chunks);
3004					sac->gauth_number_of_chunks = (uint32_t) size;
3005					*optsize = sizeof(struct sctp_authchunks) + size;
3006				}
3007				SCTP_TCB_UNLOCK(stcb);
3008			} else {
3009				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
3010				error = ENOENT;
3011			}
3012			break;
3013		}
3014	case SCTP_EVENT:
3015		{
3016			struct sctp_event *event;
3017			uint32_t event_type;
3018
3019			SCTP_CHECK_AND_CAST(event, optval, struct sctp_event, *optsize);
3020			SCTP_FIND_STCB(inp, stcb, event->se_assoc_id);
3021
3022			switch (event->se_type) {
3023			case SCTP_ASSOC_CHANGE:
3024				event_type = SCTP_PCB_FLAGS_RECVASSOCEVNT;
3025				break;
3026			case SCTP_PEER_ADDR_CHANGE:
3027				event_type = SCTP_PCB_FLAGS_RECVPADDREVNT;
3028				break;
3029			case SCTP_REMOTE_ERROR:
3030				event_type = SCTP_PCB_FLAGS_RECVPEERERR;
3031				break;
3032			case SCTP_SEND_FAILED:
3033				event_type = SCTP_PCB_FLAGS_RECVSENDFAILEVNT;
3034				break;
3035			case SCTP_SHUTDOWN_EVENT:
3036				event_type = SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT;
3037				break;
3038			case SCTP_ADAPTATION_INDICATION:
3039				event_type = SCTP_PCB_FLAGS_ADAPTATIONEVNT;
3040				break;
3041			case SCTP_PARTIAL_DELIVERY_EVENT:
3042				event_type = SCTP_PCB_FLAGS_PDAPIEVNT;
3043				break;
3044			case SCTP_AUTHENTICATION_EVENT:
3045				event_type = SCTP_PCB_FLAGS_AUTHEVNT;
3046				break;
3047			case SCTP_STREAM_RESET_EVENT:
3048				event_type = SCTP_PCB_FLAGS_STREAM_RESETEVNT;
3049				break;
3050			case SCTP_SENDER_DRY_EVENT:
3051				event_type = SCTP_PCB_FLAGS_DRYEVNT;
3052				break;
3053			case SCTP_NOTIFICATIONS_STOPPED_EVENT:
3054				event_type = 0;
3055				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
3056				error = ENOTSUP;
3057				break;
3058			case SCTP_ASSOC_RESET_EVENT:
3059				event_type = SCTP_PCB_FLAGS_ASSOC_RESETEVNT;
3060				break;
3061			case SCTP_STREAM_CHANGE_EVENT:
3062				event_type = SCTP_PCB_FLAGS_STREAM_CHANGEEVNT;
3063				break;
3064			case SCTP_SEND_FAILED_EVENT:
3065				event_type = SCTP_PCB_FLAGS_RECVNSENDFAILEVNT;
3066				break;
3067			default:
3068				event_type = 0;
3069				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3070				error = EINVAL;
3071				break;
3072			}
3073			if (event_type > 0) {
3074				if (stcb) {
3075					event->se_on = sctp_stcb_is_feature_on(inp, stcb, event_type);
3076					SCTP_TCB_UNLOCK(stcb);
3077				} else {
3078					if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3079					    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3080					    (event->se_assoc_id == SCTP_FUTURE_ASSOC)) {
3081						SCTP_INP_RLOCK(inp);
3082						event->se_on = sctp_is_feature_on(inp, event_type);
3083						SCTP_INP_RUNLOCK(inp);
3084					} else {
3085						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3086						error = EINVAL;
3087					}
3088				}
3089			}
3090			if (error == 0) {
3091				*optsize = sizeof(struct sctp_event);
3092			}
3093			break;
3094		}
3095	case SCTP_RECVRCVINFO:
3096		{
3097			int onoff;
3098
3099			if (*optsize < sizeof(int)) {
3100				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3101				error = EINVAL;
3102			} else {
3103				SCTP_INP_RLOCK(inp);
3104				onoff = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
3105				SCTP_INP_RUNLOCK(inp);
3106			}
3107			if (error == 0) {
3108				/* return the option value */
3109				*(int *)optval = onoff;
3110				*optsize = sizeof(int);
3111			}
3112			break;
3113		}
3114	case SCTP_RECVNXTINFO:
3115		{
3116			int onoff;
3117
3118			if (*optsize < sizeof(int)) {
3119				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3120				error = EINVAL;
3121			} else {
3122				SCTP_INP_RLOCK(inp);
3123				onoff = sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
3124				SCTP_INP_RUNLOCK(inp);
3125			}
3126			if (error == 0) {
3127				/* return the option value */
3128				*(int *)optval = onoff;
3129				*optsize = sizeof(int);
3130			}
3131			break;
3132		}
3133	case SCTP_DEFAULT_SNDINFO:
3134		{
3135			struct sctp_sndinfo *info;
3136
3137			SCTP_CHECK_AND_CAST(info, optval, struct sctp_sndinfo, *optsize);
3138			SCTP_FIND_STCB(inp, stcb, info->snd_assoc_id);
3139
3140			if (stcb) {
3141				info->snd_sid = stcb->asoc.def_send.sinfo_stream;
3142				info->snd_flags = stcb->asoc.def_send.sinfo_flags;
3143				info->snd_flags &= 0xfff0;
3144				info->snd_ppid = stcb->asoc.def_send.sinfo_ppid;
3145				info->snd_context = stcb->asoc.def_send.sinfo_context;
3146				SCTP_TCB_UNLOCK(stcb);
3147			} else {
3148				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3149				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3150				    (info->snd_assoc_id == SCTP_FUTURE_ASSOC)) {
3151					SCTP_INP_RLOCK(inp);
3152					info->snd_sid = inp->def_send.sinfo_stream;
3153					info->snd_flags = inp->def_send.sinfo_flags;
3154					info->snd_flags &= 0xfff0;
3155					info->snd_ppid = inp->def_send.sinfo_ppid;
3156					info->snd_context = inp->def_send.sinfo_context;
3157					SCTP_INP_RUNLOCK(inp);
3158				} else {
3159					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3160					error = EINVAL;
3161				}
3162			}
3163			if (error == 0) {
3164				*optsize = sizeof(struct sctp_sndinfo);
3165			}
3166			break;
3167		}
3168	case SCTP_DEFAULT_PRINFO:
3169		{
3170			struct sctp_default_prinfo *info;
3171
3172			SCTP_CHECK_AND_CAST(info, optval, struct sctp_default_prinfo, *optsize);
3173			SCTP_FIND_STCB(inp, stcb, info->pr_assoc_id);
3174
3175			if (stcb) {
3176				info->pr_policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
3177				info->pr_value = stcb->asoc.def_send.sinfo_timetolive;
3178				SCTP_TCB_UNLOCK(stcb);
3179			} else {
3180				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3181				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3182				    (info->pr_assoc_id == SCTP_FUTURE_ASSOC)) {
3183					SCTP_INP_RLOCK(inp);
3184					info->pr_policy = PR_SCTP_POLICY(inp->def_send.sinfo_flags);
3185					info->pr_value = inp->def_send.sinfo_timetolive;
3186					SCTP_INP_RUNLOCK(inp);
3187				} else {
3188					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3189					error = EINVAL;
3190				}
3191			}
3192			if (error == 0) {
3193				*optsize = sizeof(struct sctp_default_prinfo);
3194			}
3195			break;
3196		}
3197	case SCTP_PEER_ADDR_THLDS:
3198		{
3199			struct sctp_paddrthlds *thlds;
3200			struct sctp_nets *net;
3201			struct sockaddr *addr;
3202
3203#if defined(INET) && defined(INET6)
3204			struct sockaddr_in sin_store;
3205
3206#endif
3207
3208			SCTP_CHECK_AND_CAST(thlds, optval, struct sctp_paddrthlds, *optsize);
3209			SCTP_FIND_STCB(inp, stcb, thlds->spt_assoc_id);
3210
3211#if defined(INET) && defined(INET6)
3212			if (thlds->spt_address.ss_family == AF_INET6) {
3213				struct sockaddr_in6 *sin6;
3214
3215				sin6 = (struct sockaddr_in6 *)&thlds->spt_address;
3216				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
3217					in6_sin6_2_sin(&sin_store, sin6);
3218					addr = (struct sockaddr *)&sin_store;
3219				} else {
3220					addr = (struct sockaddr *)&thlds->spt_address;
3221				}
3222			} else {
3223				addr = (struct sockaddr *)&thlds->spt_address;
3224			}
3225#else
3226			addr = (struct sockaddr *)&thlds->spt_address;
3227#endif
3228			if (stcb != NULL) {
3229				net = sctp_findnet(stcb, addr);
3230			} else {
3231				/*
3232				 * We increment here since
3233				 * sctp_findassociation_ep_addr() wil do a
3234				 * decrement if it finds the stcb as long as
3235				 * the locked tcb (last argument) is NOT a
3236				 * TCB.. aka NULL.
3237				 */
3238				net = NULL;
3239				SCTP_INP_INCR_REF(inp);
3240				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
3241				if (stcb == NULL) {
3242					SCTP_INP_DECR_REF(inp);
3243				}
3244			}
3245			if ((stcb != NULL) && (net == NULL)) {
3246#ifdef INET
3247				if (addr->sa_family == AF_INET) {
3248					struct sockaddr_in *sin;
3249
3250					sin = (struct sockaddr_in *)addr;
3251					if (sin->sin_addr.s_addr != INADDR_ANY) {
3252						error = EINVAL;
3253						SCTP_TCB_UNLOCK(stcb);
3254						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3255						break;
3256					}
3257				} else
3258#endif
3259#ifdef INET6
3260				if (addr->sa_family == AF_INET6) {
3261					struct sockaddr_in6 *sin6;
3262
3263					sin6 = (struct sockaddr_in6 *)addr;
3264					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
3265						error = EINVAL;
3266						SCTP_TCB_UNLOCK(stcb);
3267						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3268						break;
3269					}
3270				} else
3271#endif
3272				{
3273					error = EAFNOSUPPORT;
3274					SCTP_TCB_UNLOCK(stcb);
3275					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3276					break;
3277				}
3278			}
3279			if (stcb != NULL) {
3280				if (net != NULL) {
3281					thlds->spt_pathmaxrxt = net->failure_threshold;
3282					thlds->spt_pathpfthld = net->pf_threshold;
3283				} else {
3284					thlds->spt_pathmaxrxt = stcb->asoc.def_net_failure;
3285					thlds->spt_pathpfthld = stcb->asoc.def_net_pf_threshold;
3286				}
3287				thlds->spt_assoc_id = sctp_get_associd(stcb);
3288				SCTP_TCB_UNLOCK(stcb);
3289			} else {
3290				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3291				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3292				    (thlds->spt_assoc_id == SCTP_FUTURE_ASSOC)) {
3293					/* Use endpoint defaults */
3294					SCTP_INP_RLOCK(inp);
3295					thlds->spt_pathmaxrxt = inp->sctp_ep.def_net_failure;
3296					thlds->spt_pathpfthld = inp->sctp_ep.def_net_pf_threshold;
3297					SCTP_INP_RUNLOCK(inp);
3298				} else {
3299					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3300					error = EINVAL;
3301				}
3302			}
3303			if (error == 0) {
3304				*optsize = sizeof(struct sctp_paddrthlds);
3305			}
3306			break;
3307		}
3308	case SCTP_REMOTE_UDP_ENCAPS_PORT:
3309		{
3310			struct sctp_udpencaps *encaps;
3311			struct sctp_nets *net;
3312			struct sockaddr *addr;
3313
3314#if defined(INET) && defined(INET6)
3315			struct sockaddr_in sin_store;
3316
3317#endif
3318
3319			SCTP_CHECK_AND_CAST(encaps, optval, struct sctp_udpencaps, *optsize);
3320			SCTP_FIND_STCB(inp, stcb, encaps->sue_assoc_id);
3321
3322#if defined(INET) && defined(INET6)
3323			if (encaps->sue_address.ss_family == AF_INET6) {
3324				struct sockaddr_in6 *sin6;
3325
3326				sin6 = (struct sockaddr_in6 *)&encaps->sue_address;
3327				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
3328					in6_sin6_2_sin(&sin_store, sin6);
3329					addr = (struct sockaddr *)&sin_store;
3330				} else {
3331					addr = (struct sockaddr *)&encaps->sue_address;
3332				}
3333			} else {
3334				addr = (struct sockaddr *)&encaps->sue_address;
3335			}
3336#else
3337			addr = (struct sockaddr *)&encaps->sue_address;
3338#endif
3339			if (stcb) {
3340				net = sctp_findnet(stcb, addr);
3341			} else {
3342				/*
3343				 * We increment here since
3344				 * sctp_findassociation_ep_addr() wil do a
3345				 * decrement if it finds the stcb as long as
3346				 * the locked tcb (last argument) is NOT a
3347				 * TCB.. aka NULL.
3348				 */
3349				net = NULL;
3350				SCTP_INP_INCR_REF(inp);
3351				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
3352				if (stcb == NULL) {
3353					SCTP_INP_DECR_REF(inp);
3354				}
3355			}
3356			if ((stcb != NULL) && (net == NULL)) {
3357#ifdef INET
3358				if (addr->sa_family == AF_INET) {
3359					struct sockaddr_in *sin;
3360
3361					sin = (struct sockaddr_in *)addr;
3362					if (sin->sin_addr.s_addr != INADDR_ANY) {
3363						error = EINVAL;
3364						SCTP_TCB_UNLOCK(stcb);
3365						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3366						break;
3367					}
3368				} else
3369#endif
3370#ifdef INET6
3371				if (addr->sa_family == AF_INET6) {
3372					struct sockaddr_in6 *sin6;
3373
3374					sin6 = (struct sockaddr_in6 *)addr;
3375					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
3376						error = EINVAL;
3377						SCTP_TCB_UNLOCK(stcb);
3378						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3379						break;
3380					}
3381				} else
3382#endif
3383				{
3384					error = EAFNOSUPPORT;
3385					SCTP_TCB_UNLOCK(stcb);
3386					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
3387					break;
3388				}
3389			}
3390			if (stcb != NULL) {
3391				if (net) {
3392					encaps->sue_port = net->port;
3393				} else {
3394					encaps->sue_port = stcb->asoc.port;
3395				}
3396				SCTP_TCB_UNLOCK(stcb);
3397			} else {
3398				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3399				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3400				    (encaps->sue_assoc_id == SCTP_FUTURE_ASSOC)) {
3401					SCTP_INP_RLOCK(inp);
3402					encaps->sue_port = inp->sctp_ep.port;
3403					SCTP_INP_RUNLOCK(inp);
3404				} else {
3405					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3406					error = EINVAL;
3407				}
3408			}
3409			if (error == 0) {
3410				*optsize = sizeof(struct sctp_udpencaps);
3411			}
3412			break;
3413		}
3414	case SCTP_ECN_SUPPORTED:
3415		{
3416			struct sctp_assoc_value *av;
3417
3418			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3419			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3420
3421			if (stcb) {
3422				av->assoc_value = stcb->asoc.ecn_supported;
3423				SCTP_TCB_UNLOCK(stcb);
3424			} else {
3425				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3426				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3427				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3428					SCTP_INP_RLOCK(inp);
3429					av->assoc_value = inp->ecn_supported;
3430					SCTP_INP_RUNLOCK(inp);
3431				} else {
3432					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3433					error = EINVAL;
3434				}
3435			}
3436			if (error == 0) {
3437				*optsize = sizeof(struct sctp_assoc_value);
3438			}
3439			break;
3440		}
3441	case SCTP_PR_SUPPORTED:
3442		{
3443			struct sctp_assoc_value *av;
3444
3445			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3446			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3447
3448			if (stcb) {
3449				av->assoc_value = stcb->asoc.prsctp_supported;
3450				SCTP_TCB_UNLOCK(stcb);
3451			} else {
3452				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3453				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3454				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3455					SCTP_INP_RLOCK(inp);
3456					av->assoc_value = inp->prsctp_supported;
3457					SCTP_INP_RUNLOCK(inp);
3458				} else {
3459					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3460					error = EINVAL;
3461				}
3462			}
3463			if (error == 0) {
3464				*optsize = sizeof(struct sctp_assoc_value);
3465			}
3466			break;
3467		}
3468	case SCTP_AUTH_SUPPORTED:
3469		{
3470			struct sctp_assoc_value *av;
3471
3472			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3473			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3474
3475			if (stcb) {
3476				av->assoc_value = stcb->asoc.auth_supported;
3477				SCTP_TCB_UNLOCK(stcb);
3478			} else {
3479				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3480				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3481				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3482					SCTP_INP_RLOCK(inp);
3483					av->assoc_value = inp->auth_supported;
3484					SCTP_INP_RUNLOCK(inp);
3485				} else {
3486					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3487					error = EINVAL;
3488				}
3489			}
3490			if (error == 0) {
3491				*optsize = sizeof(struct sctp_assoc_value);
3492			}
3493			break;
3494		}
3495	case SCTP_ASCONF_SUPPORTED:
3496		{
3497			struct sctp_assoc_value *av;
3498
3499			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3500			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3501
3502			if (stcb) {
3503				av->assoc_value = stcb->asoc.asconf_supported;
3504				SCTP_TCB_UNLOCK(stcb);
3505			} else {
3506				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3507				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3508				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3509					SCTP_INP_RLOCK(inp);
3510					av->assoc_value = inp->asconf_supported;
3511					SCTP_INP_RUNLOCK(inp);
3512				} else {
3513					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3514					error = EINVAL;
3515				}
3516			}
3517			if (error == 0) {
3518				*optsize = sizeof(struct sctp_assoc_value);
3519			}
3520			break;
3521		}
3522	case SCTP_RECONFIG_SUPPORTED:
3523		{
3524			struct sctp_assoc_value *av;
3525
3526			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3527			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3528
3529			if (stcb) {
3530				av->assoc_value = stcb->asoc.reconfig_supported;
3531				SCTP_TCB_UNLOCK(stcb);
3532			} else {
3533				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3534				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3535				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3536					SCTP_INP_RLOCK(inp);
3537					av->assoc_value = inp->reconfig_supported;
3538					SCTP_INP_RUNLOCK(inp);
3539				} else {
3540					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3541					error = EINVAL;
3542				}
3543			}
3544			if (error == 0) {
3545				*optsize = sizeof(struct sctp_assoc_value);
3546			}
3547			break;
3548		}
3549	case SCTP_NRSACK_SUPPORTED:
3550		{
3551			struct sctp_assoc_value *av;
3552
3553			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3554			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3555
3556			if (stcb) {
3557				av->assoc_value = stcb->asoc.nrsack_supported;
3558				SCTP_TCB_UNLOCK(stcb);
3559			} else {
3560				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3561				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3562				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3563					SCTP_INP_RLOCK(inp);
3564					av->assoc_value = inp->nrsack_supported;
3565					SCTP_INP_RUNLOCK(inp);
3566				} else {
3567					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3568					error = EINVAL;
3569				}
3570			}
3571			if (error == 0) {
3572				*optsize = sizeof(struct sctp_assoc_value);
3573			}
3574			break;
3575		}
3576	case SCTP_PKTDROP_SUPPORTED:
3577		{
3578			struct sctp_assoc_value *av;
3579
3580			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3581			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3582
3583			if (stcb) {
3584				av->assoc_value = stcb->asoc.pktdrop_supported;
3585				SCTP_TCB_UNLOCK(stcb);
3586			} else {
3587				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3588				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3589				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3590					SCTP_INP_RLOCK(inp);
3591					av->assoc_value = inp->pktdrop_supported;
3592					SCTP_INP_RUNLOCK(inp);
3593				} else {
3594					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3595					error = EINVAL;
3596				}
3597			}
3598			if (error == 0) {
3599				*optsize = sizeof(struct sctp_assoc_value);
3600			}
3601			break;
3602		}
3603	case SCTP_ENABLE_STREAM_RESET:
3604		{
3605			struct sctp_assoc_value *av;
3606
3607			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, *optsize);
3608			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3609
3610			if (stcb) {
3611				av->assoc_value = (uint32_t) stcb->asoc.local_strreset_support;
3612				SCTP_TCB_UNLOCK(stcb);
3613			} else {
3614				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3615				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3616				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
3617					SCTP_INP_RLOCK(inp);
3618					av->assoc_value = (uint32_t) inp->local_strreset_support;
3619					SCTP_INP_RUNLOCK(inp);
3620				} else {
3621					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3622					error = EINVAL;
3623				}
3624			}
3625			if (error == 0) {
3626				*optsize = sizeof(struct sctp_assoc_value);
3627			}
3628			break;
3629		}
3630	case SCTP_PR_STREAM_STATUS:
3631		{
3632			struct sctp_prstatus *sprstat;
3633			uint16_t sid;
3634			uint16_t policy;
3635
3636			SCTP_CHECK_AND_CAST(sprstat, optval, struct sctp_prstatus, *optsize);
3637			SCTP_FIND_STCB(inp, stcb, sprstat->sprstat_assoc_id);
3638
3639			sid = sprstat->sprstat_sid;
3640			policy = sprstat->sprstat_policy;
3641#if defined(SCTP_DETAILED_STR_STATS)
3642			if ((stcb != NULL) &&
3643			    (sid < stcb->asoc.streamoutcnt) &&
3644			    (policy != SCTP_PR_SCTP_NONE) &&
3645			    ((policy <= SCTP_PR_SCTP_MAX) ||
3646			    (policy == SCTP_PR_SCTP_ALL))) {
3647				if (policy == SCTP_PR_SCTP_ALL) {
3648					sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[0];
3649					sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[0];
3650				} else {
3651					sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[policy];
3652					sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[policy];
3653				}
3654#else
3655			if ((stcb != NULL) &&
3656			    (sid < stcb->asoc.streamoutcnt) &&
3657			    (policy == SCTP_PR_SCTP_ALL)) {
3658				sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[0];
3659				sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[0];
3660#endif
3661				SCTP_TCB_UNLOCK(stcb);
3662				*optsize = sizeof(struct sctp_prstatus);
3663			} else {
3664				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3665				error = EINVAL;
3666			}
3667			break;
3668		}
3669	case SCTP_PR_ASSOC_STATUS:
3670		{
3671			struct sctp_prstatus *sprstat;
3672			uint16_t policy;
3673
3674			SCTP_CHECK_AND_CAST(sprstat, optval, struct sctp_prstatus, *optsize);
3675			SCTP_FIND_STCB(inp, stcb, sprstat->sprstat_assoc_id);
3676
3677			policy = sprstat->sprstat_policy;
3678			if ((stcb != NULL) &&
3679			    (policy != SCTP_PR_SCTP_NONE) &&
3680			    ((policy <= SCTP_PR_SCTP_MAX) ||
3681			    (policy == SCTP_PR_SCTP_ALL))) {
3682				if (policy == SCTP_PR_SCTP_ALL) {
3683					sprstat->sprstat_abandoned_unsent = stcb->asoc.abandoned_unsent[0];
3684					sprstat->sprstat_abandoned_sent = stcb->asoc.abandoned_sent[0];
3685				} else {
3686					sprstat->sprstat_abandoned_unsent = stcb->asoc.abandoned_unsent[policy];
3687					sprstat->sprstat_abandoned_sent = stcb->asoc.abandoned_sent[policy];
3688				}
3689				SCTP_TCB_UNLOCK(stcb);
3690				*optsize = sizeof(struct sctp_prstatus);
3691			} else {
3692				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3693				error = EINVAL;
3694			}
3695			break;
3696		}
3697	default:
3698		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
3699		error = ENOPROTOOPT;
3700		break;
3701	}			/* end switch (sopt->sopt_name) */
3702	if (error) {
3703		*optsize = 0;
3704	}
3705	return (error);
3706}
3707
3708static int
3709sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
3710    void *p)
3711{
3712	int error, set_opt;
3713	uint32_t *mopt;
3714	struct sctp_tcb *stcb = NULL;
3715	struct sctp_inpcb *inp = NULL;
3716	uint32_t vrf_id;
3717
3718	if (optval == NULL) {
3719		SCTP_PRINTF("optval is NULL\n");
3720		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3721		return (EINVAL);
3722	}
3723	inp = (struct sctp_inpcb *)so->so_pcb;
3724	if (inp == NULL) {
3725		SCTP_PRINTF("inp is NULL?\n");
3726		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3727		return (EINVAL);
3728	}
3729	vrf_id = inp->def_vrf_id;
3730
3731	error = 0;
3732	switch (optname) {
3733	case SCTP_NODELAY:
3734	case SCTP_AUTOCLOSE:
3735	case SCTP_AUTO_ASCONF:
3736	case SCTP_EXPLICIT_EOR:
3737	case SCTP_DISABLE_FRAGMENTS:
3738	case SCTP_USE_EXT_RCVINFO:
3739	case SCTP_I_WANT_MAPPED_V4_ADDR:
3740		/* copy in the option value */
3741		SCTP_CHECK_AND_CAST(mopt, optval, uint32_t, optsize);
3742		set_opt = 0;
3743		if (error)
3744			break;
3745		switch (optname) {
3746		case SCTP_DISABLE_FRAGMENTS:
3747			set_opt = SCTP_PCB_FLAGS_NO_FRAGMENT;
3748			break;
3749		case SCTP_AUTO_ASCONF:
3750			/*
3751			 * NOTE: we don't really support this flag
3752			 */
3753			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3754				/* only valid for bound all sockets */
3755				if ((SCTP_BASE_SYSCTL(sctp_auto_asconf) == 0) &&
3756				    (*mopt != 0)) {
3757					/* forbidden by admin */
3758					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EPERM);
3759					return (EPERM);
3760				}
3761				set_opt = SCTP_PCB_FLAGS_AUTO_ASCONF;
3762			} else {
3763				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3764				return (EINVAL);
3765			}
3766			break;
3767		case SCTP_EXPLICIT_EOR:
3768			set_opt = SCTP_PCB_FLAGS_EXPLICIT_EOR;
3769			break;
3770		case SCTP_USE_EXT_RCVINFO:
3771			set_opt = SCTP_PCB_FLAGS_EXT_RCVINFO;
3772			break;
3773		case SCTP_I_WANT_MAPPED_V4_ADDR:
3774			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
3775				set_opt = SCTP_PCB_FLAGS_NEEDS_MAPPED_V4;
3776			} else {
3777				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3778				return (EINVAL);
3779			}
3780			break;
3781		case SCTP_NODELAY:
3782			set_opt = SCTP_PCB_FLAGS_NODELAY;
3783			break;
3784		case SCTP_AUTOCLOSE:
3785			if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3786			    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
3787				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3788				return (EINVAL);
3789			}
3790			set_opt = SCTP_PCB_FLAGS_AUTOCLOSE;
3791			/*
3792			 * The value is in ticks. Note this does not effect
3793			 * old associations, only new ones.
3794			 */
3795			inp->sctp_ep.auto_close_time = SEC_TO_TICKS(*mopt);
3796			break;
3797		}
3798		SCTP_INP_WLOCK(inp);
3799		if (*mopt != 0) {
3800			sctp_feature_on(inp, set_opt);
3801		} else {
3802			sctp_feature_off(inp, set_opt);
3803		}
3804		SCTP_INP_WUNLOCK(inp);
3805		break;
3806	case SCTP_REUSE_PORT:
3807		{
3808			SCTP_CHECK_AND_CAST(mopt, optval, uint32_t, optsize);
3809			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) == 0) {
3810				/* Can't set it after we are bound */
3811				error = EINVAL;
3812				break;
3813			}
3814			if ((inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE)) {
3815				/* Can't do this for a 1-m socket */
3816				error = EINVAL;
3817				break;
3818			}
3819			if (optval)
3820				sctp_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE);
3821			else
3822				sctp_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE);
3823			break;
3824		}
3825	case SCTP_PARTIAL_DELIVERY_POINT:
3826		{
3827			uint32_t *value;
3828
3829			SCTP_CHECK_AND_CAST(value, optval, uint32_t, optsize);
3830			if (*value > SCTP_SB_LIMIT_RCV(so)) {
3831				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3832				error = EINVAL;
3833				break;
3834			}
3835			inp->partial_delivery_point = *value;
3836			break;
3837		}
3838	case SCTP_FRAGMENT_INTERLEAVE:
3839		/* not yet until we re-write sctp_recvmsg() */
3840		{
3841			uint32_t *level;
3842
3843			SCTP_CHECK_AND_CAST(level, optval, uint32_t, optsize);
3844			if (*level == SCTP_FRAG_LEVEL_2) {
3845				sctp_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3846				sctp_feature_on(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3847			} else if (*level == SCTP_FRAG_LEVEL_1) {
3848				sctp_feature_on(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3849				sctp_feature_off(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3850			} else if (*level == SCTP_FRAG_LEVEL_0) {
3851				sctp_feature_off(inp, SCTP_PCB_FLAGS_FRAG_INTERLEAVE);
3852				sctp_feature_off(inp, SCTP_PCB_FLAGS_INTERLEAVE_STRMS);
3853
3854			} else {
3855				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3856				error = EINVAL;
3857			}
3858			break;
3859		}
3860	case SCTP_CMT_ON_OFF:
3861		if (SCTP_BASE_SYSCTL(sctp_cmt_on_off)) {
3862			struct sctp_assoc_value *av;
3863
3864			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3865			if (av->assoc_value > SCTP_CMT_MAX) {
3866				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3867				error = EINVAL;
3868				break;
3869			}
3870			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3871			if (stcb) {
3872				stcb->asoc.sctp_cmt_on_off = av->assoc_value;
3873				SCTP_TCB_UNLOCK(stcb);
3874			} else {
3875				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3876				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3877				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
3878				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3879					SCTP_INP_WLOCK(inp);
3880					inp->sctp_cmt_on_off = av->assoc_value;
3881					SCTP_INP_WUNLOCK(inp);
3882				}
3883				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
3884				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3885					SCTP_INP_RLOCK(inp);
3886					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3887						SCTP_TCB_LOCK(stcb);
3888						stcb->asoc.sctp_cmt_on_off = av->assoc_value;
3889						SCTP_TCB_UNLOCK(stcb);
3890					}
3891					SCTP_INP_RUNLOCK(inp);
3892				}
3893			}
3894		} else {
3895			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
3896			error = ENOPROTOOPT;
3897		}
3898		break;
3899	case SCTP_PLUGGABLE_CC:
3900		{
3901			struct sctp_assoc_value *av;
3902			struct sctp_nets *net;
3903
3904			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3905			if ((av->assoc_value != SCTP_CC_RFC2581) &&
3906			    (av->assoc_value != SCTP_CC_HSTCP) &&
3907			    (av->assoc_value != SCTP_CC_HTCP) &&
3908			    (av->assoc_value != SCTP_CC_RTCC)) {
3909				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3910				error = EINVAL;
3911				break;
3912			}
3913			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3914			if (stcb) {
3915				stcb->asoc.cc_functions = sctp_cc_functions[av->assoc_value];
3916				stcb->asoc.congestion_control_module = av->assoc_value;
3917				if (stcb->asoc.cc_functions.sctp_set_initial_cc_param != NULL) {
3918					TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
3919						stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
3920					}
3921				}
3922				SCTP_TCB_UNLOCK(stcb);
3923			} else {
3924				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
3925				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
3926				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
3927				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3928					SCTP_INP_WLOCK(inp);
3929					inp->sctp_ep.sctp_default_cc_module = av->assoc_value;
3930					SCTP_INP_WUNLOCK(inp);
3931				}
3932				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
3933				    (av->assoc_id == SCTP_ALL_ASSOC)) {
3934					SCTP_INP_RLOCK(inp);
3935					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3936						SCTP_TCB_LOCK(stcb);
3937						stcb->asoc.cc_functions = sctp_cc_functions[av->assoc_value];
3938						stcb->asoc.congestion_control_module = av->assoc_value;
3939						if (stcb->asoc.cc_functions.sctp_set_initial_cc_param != NULL) {
3940							TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
3941								stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
3942							}
3943						}
3944						SCTP_TCB_UNLOCK(stcb);
3945					}
3946					SCTP_INP_RUNLOCK(inp);
3947				}
3948			}
3949			break;
3950		}
3951	case SCTP_CC_OPTION:
3952		{
3953			struct sctp_cc_option *cc_opt;
3954
3955			SCTP_CHECK_AND_CAST(cc_opt, optval, struct sctp_cc_option, optsize);
3956			SCTP_FIND_STCB(inp, stcb, cc_opt->aid_value.assoc_id);
3957			if (stcb == NULL) {
3958				if (cc_opt->aid_value.assoc_id == SCTP_CURRENT_ASSOC) {
3959					SCTP_INP_RLOCK(inp);
3960					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
3961						SCTP_TCB_LOCK(stcb);
3962						if (stcb->asoc.cc_functions.sctp_cwnd_socket_option) {
3963							(*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 1, cc_opt);
3964						}
3965						SCTP_TCB_UNLOCK(stcb);
3966					}
3967					SCTP_INP_RUNLOCK(inp);
3968				} else {
3969					error = EINVAL;
3970				}
3971			} else {
3972				if (stcb->asoc.cc_functions.sctp_cwnd_socket_option == NULL) {
3973					error = ENOTSUP;
3974				} else {
3975					error = (*stcb->asoc.cc_functions.sctp_cwnd_socket_option) (stcb, 1,
3976					    cc_opt);
3977				}
3978				SCTP_TCB_UNLOCK(stcb);
3979			}
3980			break;
3981		}
3982	case SCTP_PLUGGABLE_SS:
3983		{
3984			struct sctp_assoc_value *av;
3985
3986			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
3987			if ((av->assoc_value != SCTP_SS_DEFAULT) &&
3988			    (av->assoc_value != SCTP_SS_ROUND_ROBIN) &&
3989			    (av->assoc_value != SCTP_SS_ROUND_ROBIN_PACKET) &&
3990			    (av->assoc_value != SCTP_SS_PRIORITY) &&
3991			    (av->assoc_value != SCTP_SS_FAIR_BANDWITH) &&
3992			    (av->assoc_value != SCTP_SS_FIRST_COME)) {
3993				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
3994				error = EINVAL;
3995				break;
3996			}
3997			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
3998			if (stcb) {
3999				stcb->asoc.ss_functions.sctp_ss_clear(stcb, &stcb->asoc, 1, 1);
4000				stcb->asoc.ss_functions = sctp_ss_functions[av->assoc_value];
4001				stcb->asoc.stream_scheduling_module = av->assoc_value;
4002				stcb->asoc.ss_functions.sctp_ss_init(stcb, &stcb->asoc, 1);
4003				SCTP_TCB_UNLOCK(stcb);
4004			} else {
4005				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4006				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4007				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4008				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4009					SCTP_INP_WLOCK(inp);
4010					inp->sctp_ep.sctp_default_ss_module = av->assoc_value;
4011					SCTP_INP_WUNLOCK(inp);
4012				}
4013				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4014				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4015					SCTP_INP_RLOCK(inp);
4016					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4017						SCTP_TCB_LOCK(stcb);
4018						stcb->asoc.ss_functions.sctp_ss_clear(stcb, &stcb->asoc, 1, 1);
4019						stcb->asoc.ss_functions = sctp_ss_functions[av->assoc_value];
4020						stcb->asoc.stream_scheduling_module = av->assoc_value;
4021						stcb->asoc.ss_functions.sctp_ss_init(stcb, &stcb->asoc, 1);
4022						SCTP_TCB_UNLOCK(stcb);
4023					}
4024					SCTP_INP_RUNLOCK(inp);
4025				}
4026			}
4027			break;
4028		}
4029	case SCTP_SS_VALUE:
4030		{
4031			struct sctp_stream_value *av;
4032
4033			SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, optsize);
4034			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4035			if (stcb) {
4036				if ((av->stream_id >= stcb->asoc.streamoutcnt) ||
4037				    (stcb->asoc.ss_functions.sctp_ss_set_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id],
4038				    av->stream_value) < 0)) {
4039					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4040					error = EINVAL;
4041				}
4042				SCTP_TCB_UNLOCK(stcb);
4043			} else {
4044				if (av->assoc_id == SCTP_CURRENT_ASSOC) {
4045					SCTP_INP_RLOCK(inp);
4046					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4047						SCTP_TCB_LOCK(stcb);
4048						if (av->stream_id < stcb->asoc.streamoutcnt) {
4049							stcb->asoc.ss_functions.sctp_ss_set_value(stcb,
4050							    &stcb->asoc,
4051							    &stcb->asoc.strmout[av->stream_id],
4052							    av->stream_value);
4053						}
4054						SCTP_TCB_UNLOCK(stcb);
4055					}
4056					SCTP_INP_RUNLOCK(inp);
4057				} else {
4058					/*
4059					 * Can't set stream value without
4060					 * association
4061					 */
4062					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4063					error = EINVAL;
4064				}
4065			}
4066			break;
4067		}
4068	case SCTP_CLR_STAT_LOG:
4069		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4070		error = EOPNOTSUPP;
4071		break;
4072	case SCTP_CONTEXT:
4073		{
4074			struct sctp_assoc_value *av;
4075
4076			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4077			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4078
4079			if (stcb) {
4080				stcb->asoc.context = av->assoc_value;
4081				SCTP_TCB_UNLOCK(stcb);
4082			} else {
4083				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4084				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4085				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4086				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4087					SCTP_INP_WLOCK(inp);
4088					inp->sctp_context = av->assoc_value;
4089					SCTP_INP_WUNLOCK(inp);
4090				}
4091				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4092				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4093					SCTP_INP_RLOCK(inp);
4094					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4095						SCTP_TCB_LOCK(stcb);
4096						stcb->asoc.context = av->assoc_value;
4097						SCTP_TCB_UNLOCK(stcb);
4098					}
4099					SCTP_INP_RUNLOCK(inp);
4100				}
4101			}
4102			break;
4103		}
4104	case SCTP_VRF_ID:
4105		{
4106			uint32_t *default_vrfid;
4107
4108			SCTP_CHECK_AND_CAST(default_vrfid, optval, uint32_t, optsize);
4109			if (*default_vrfid > SCTP_MAX_VRF_ID) {
4110				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4111				error = EINVAL;
4112				break;
4113			}
4114			inp->def_vrf_id = *default_vrfid;
4115			break;
4116		}
4117	case SCTP_DEL_VRF_ID:
4118		{
4119			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4120			error = EOPNOTSUPP;
4121			break;
4122		}
4123	case SCTP_ADD_VRF_ID:
4124		{
4125			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4126			error = EOPNOTSUPP;
4127			break;
4128		}
4129	case SCTP_DELAYED_SACK:
4130		{
4131			struct sctp_sack_info *sack;
4132
4133			SCTP_CHECK_AND_CAST(sack, optval, struct sctp_sack_info, optsize);
4134			SCTP_FIND_STCB(inp, stcb, sack->sack_assoc_id);
4135			if (sack->sack_delay) {
4136				if (sack->sack_delay > SCTP_MAX_SACK_DELAY)
4137					sack->sack_delay = SCTP_MAX_SACK_DELAY;
4138				if (MSEC_TO_TICKS(sack->sack_delay) < 1) {
4139					sack->sack_delay = TICKS_TO_MSEC(1);
4140				}
4141			}
4142			if (stcb) {
4143				if (sack->sack_delay) {
4144					stcb->asoc.delayed_ack = sack->sack_delay;
4145				}
4146				if (sack->sack_freq) {
4147					stcb->asoc.sack_freq = sack->sack_freq;
4148				}
4149				SCTP_TCB_UNLOCK(stcb);
4150			} else {
4151				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4152				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4153				    (sack->sack_assoc_id == SCTP_FUTURE_ASSOC) ||
4154				    (sack->sack_assoc_id == SCTP_ALL_ASSOC)) {
4155					SCTP_INP_WLOCK(inp);
4156					if (sack->sack_delay) {
4157						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_RECV] = MSEC_TO_TICKS(sack->sack_delay);
4158					}
4159					if (sack->sack_freq) {
4160						inp->sctp_ep.sctp_sack_freq = sack->sack_freq;
4161					}
4162					SCTP_INP_WUNLOCK(inp);
4163				}
4164				if ((sack->sack_assoc_id == SCTP_CURRENT_ASSOC) ||
4165				    (sack->sack_assoc_id == SCTP_ALL_ASSOC)) {
4166					SCTP_INP_RLOCK(inp);
4167					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4168						SCTP_TCB_LOCK(stcb);
4169						if (sack->sack_delay) {
4170							stcb->asoc.delayed_ack = sack->sack_delay;
4171						}
4172						if (sack->sack_freq) {
4173							stcb->asoc.sack_freq = sack->sack_freq;
4174						}
4175						SCTP_TCB_UNLOCK(stcb);
4176					}
4177					SCTP_INP_RUNLOCK(inp);
4178				}
4179			}
4180			break;
4181		}
4182	case SCTP_AUTH_CHUNK:
4183		{
4184			struct sctp_authchunk *sauth;
4185
4186			SCTP_CHECK_AND_CAST(sauth, optval, struct sctp_authchunk, optsize);
4187
4188			SCTP_INP_WLOCK(inp);
4189			if (sctp_auth_add_chunk(sauth->sauth_chunk, inp->sctp_ep.local_auth_chunks)) {
4190				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4191				error = EINVAL;
4192			}
4193			SCTP_INP_WUNLOCK(inp);
4194			break;
4195		}
4196	case SCTP_AUTH_KEY:
4197		{
4198			struct sctp_authkey *sca;
4199			struct sctp_keyhead *shared_keys;
4200			sctp_sharedkey_t *shared_key;
4201			sctp_key_t *key = NULL;
4202			size_t size;
4203
4204			SCTP_CHECK_AND_CAST(sca, optval, struct sctp_authkey, optsize);
4205			if (sca->sca_keylength == 0) {
4206				size = optsize - sizeof(struct sctp_authkey);
4207			} else {
4208				if (sca->sca_keylength + sizeof(struct sctp_authkey) <= optsize) {
4209					size = sca->sca_keylength;
4210				} else {
4211					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4212					error = EINVAL;
4213					break;
4214				}
4215			}
4216			SCTP_FIND_STCB(inp, stcb, sca->sca_assoc_id);
4217
4218			if (stcb) {
4219				shared_keys = &stcb->asoc.shared_keys;
4220				/* clear the cached keys for this key id */
4221				sctp_clear_cachedkeys(stcb, sca->sca_keynumber);
4222				/*
4223				 * create the new shared key and
4224				 * insert/replace it
4225				 */
4226				if (size > 0) {
4227					key = sctp_set_key(sca->sca_key, (uint32_t) size);
4228					if (key == NULL) {
4229						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4230						error = ENOMEM;
4231						SCTP_TCB_UNLOCK(stcb);
4232						break;
4233					}
4234				}
4235				shared_key = sctp_alloc_sharedkey();
4236				if (shared_key == NULL) {
4237					sctp_free_key(key);
4238					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4239					error = ENOMEM;
4240					SCTP_TCB_UNLOCK(stcb);
4241					break;
4242				}
4243				shared_key->key = key;
4244				shared_key->keyid = sca->sca_keynumber;
4245				error = sctp_insert_sharedkey(shared_keys, shared_key);
4246				SCTP_TCB_UNLOCK(stcb);
4247			} else {
4248				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4249				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4250				    (sca->sca_assoc_id == SCTP_FUTURE_ASSOC) ||
4251				    (sca->sca_assoc_id == SCTP_ALL_ASSOC)) {
4252					SCTP_INP_WLOCK(inp);
4253					shared_keys = &inp->sctp_ep.shared_keys;
4254					/*
4255					 * clear the cached keys on all
4256					 * assocs for this key id
4257					 */
4258					sctp_clear_cachedkeys_ep(inp, sca->sca_keynumber);
4259					/*
4260					 * create the new shared key and
4261					 * insert/replace it
4262					 */
4263					if (size > 0) {
4264						key = sctp_set_key(sca->sca_key, (uint32_t) size);
4265						if (key == NULL) {
4266							SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4267							error = ENOMEM;
4268							SCTP_INP_WUNLOCK(inp);
4269							break;
4270						}
4271					}
4272					shared_key = sctp_alloc_sharedkey();
4273					if (shared_key == NULL) {
4274						sctp_free_key(key);
4275						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4276						error = ENOMEM;
4277						SCTP_INP_WUNLOCK(inp);
4278						break;
4279					}
4280					shared_key->key = key;
4281					shared_key->keyid = sca->sca_keynumber;
4282					error = sctp_insert_sharedkey(shared_keys, shared_key);
4283					SCTP_INP_WUNLOCK(inp);
4284				}
4285				if ((sca->sca_assoc_id == SCTP_CURRENT_ASSOC) ||
4286				    (sca->sca_assoc_id == SCTP_ALL_ASSOC)) {
4287					SCTP_INP_RLOCK(inp);
4288					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4289						SCTP_TCB_LOCK(stcb);
4290						shared_keys = &stcb->asoc.shared_keys;
4291						/*
4292						 * clear the cached keys for
4293						 * this key id
4294						 */
4295						sctp_clear_cachedkeys(stcb, sca->sca_keynumber);
4296						/*
4297						 * create the new shared key
4298						 * and insert/replace it
4299						 */
4300						if (size > 0) {
4301							key = sctp_set_key(sca->sca_key, (uint32_t) size);
4302							if (key == NULL) {
4303								SCTP_TCB_UNLOCK(stcb);
4304								continue;
4305							}
4306						}
4307						shared_key = sctp_alloc_sharedkey();
4308						if (shared_key == NULL) {
4309							sctp_free_key(key);
4310							SCTP_TCB_UNLOCK(stcb);
4311							continue;
4312						}
4313						shared_key->key = key;
4314						shared_key->keyid = sca->sca_keynumber;
4315						error = sctp_insert_sharedkey(shared_keys, shared_key);
4316						SCTP_TCB_UNLOCK(stcb);
4317					}
4318					SCTP_INP_RUNLOCK(inp);
4319				}
4320			}
4321			break;
4322		}
4323	case SCTP_HMAC_IDENT:
4324		{
4325			struct sctp_hmacalgo *shmac;
4326			sctp_hmaclist_t *hmaclist;
4327			uint16_t hmacid;
4328			uint32_t i;
4329
4330			SCTP_CHECK_AND_CAST(shmac, optval, struct sctp_hmacalgo, optsize);
4331			if ((optsize < sizeof(struct sctp_hmacalgo) + shmac->shmac_number_of_idents * sizeof(uint16_t)) ||
4332			    (shmac->shmac_number_of_idents > 0xffff)) {
4333				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4334				error = EINVAL;
4335				break;
4336			}
4337			hmaclist = sctp_alloc_hmaclist((uint16_t) shmac->shmac_number_of_idents);
4338			if (hmaclist == NULL) {
4339				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
4340				error = ENOMEM;
4341				break;
4342			}
4343			for (i = 0; i < shmac->shmac_number_of_idents; i++) {
4344				hmacid = shmac->shmac_idents[i];
4345				if (sctp_auth_add_hmacid(hmaclist, hmacid)) {
4346					 /* invalid HMACs were found */ ;
4347					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4348					error = EINVAL;
4349					sctp_free_hmaclist(hmaclist);
4350					goto sctp_set_hmac_done;
4351				}
4352			}
4353			for (i = 0; i < hmaclist->num_algo; i++) {
4354				if (hmaclist->hmac[i] == SCTP_AUTH_HMAC_ID_SHA1) {
4355					/* already in list */
4356					break;
4357				}
4358			}
4359			if (i == hmaclist->num_algo) {
4360				/* not found in list */
4361				sctp_free_hmaclist(hmaclist);
4362				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4363				error = EINVAL;
4364				break;
4365			}
4366			/* set it on the endpoint */
4367			SCTP_INP_WLOCK(inp);
4368			if (inp->sctp_ep.local_hmacs)
4369				sctp_free_hmaclist(inp->sctp_ep.local_hmacs);
4370			inp->sctp_ep.local_hmacs = hmaclist;
4371			SCTP_INP_WUNLOCK(inp);
4372	sctp_set_hmac_done:
4373			break;
4374		}
4375	case SCTP_AUTH_ACTIVE_KEY:
4376		{
4377			struct sctp_authkeyid *scact;
4378
4379			SCTP_CHECK_AND_CAST(scact, optval, struct sctp_authkeyid, optsize);
4380			SCTP_FIND_STCB(inp, stcb, scact->scact_assoc_id);
4381
4382			/* set the active key on the right place */
4383			if (stcb) {
4384				/* set the active key on the assoc */
4385				if (sctp_auth_setactivekey(stcb,
4386				    scact->scact_keynumber)) {
4387					SCTP_LTRACE_ERR_RET(inp, NULL, NULL,
4388					    SCTP_FROM_SCTP_USRREQ,
4389					    EINVAL);
4390					error = EINVAL;
4391				}
4392				SCTP_TCB_UNLOCK(stcb);
4393			} else {
4394				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4395				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4396				    (scact->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4397				    (scact->scact_assoc_id == SCTP_ALL_ASSOC)) {
4398					SCTP_INP_WLOCK(inp);
4399					if (sctp_auth_setactivekey_ep(inp, scact->scact_keynumber)) {
4400						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4401						error = EINVAL;
4402					}
4403					SCTP_INP_WUNLOCK(inp);
4404				}
4405				if ((scact->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4406				    (scact->scact_assoc_id == SCTP_ALL_ASSOC)) {
4407					SCTP_INP_RLOCK(inp);
4408					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4409						SCTP_TCB_LOCK(stcb);
4410						sctp_auth_setactivekey(stcb, scact->scact_keynumber);
4411						SCTP_TCB_UNLOCK(stcb);
4412					}
4413					SCTP_INP_RUNLOCK(inp);
4414				}
4415			}
4416			break;
4417		}
4418	case SCTP_AUTH_DELETE_KEY:
4419		{
4420			struct sctp_authkeyid *scdel;
4421
4422			SCTP_CHECK_AND_CAST(scdel, optval, struct sctp_authkeyid, optsize);
4423			SCTP_FIND_STCB(inp, stcb, scdel->scact_assoc_id);
4424
4425			/* delete the key from the right place */
4426			if (stcb) {
4427				if (sctp_delete_sharedkey(stcb, scdel->scact_keynumber)) {
4428					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4429					error = EINVAL;
4430				}
4431				SCTP_TCB_UNLOCK(stcb);
4432			} else {
4433				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4434				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4435				    (scdel->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4436				    (scdel->scact_assoc_id == SCTP_ALL_ASSOC)) {
4437					SCTP_INP_WLOCK(inp);
4438					if (sctp_delete_sharedkey_ep(inp, scdel->scact_keynumber)) {
4439						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4440						error = EINVAL;
4441					}
4442					SCTP_INP_WUNLOCK(inp);
4443				}
4444				if ((scdel->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4445				    (scdel->scact_assoc_id == SCTP_ALL_ASSOC)) {
4446					SCTP_INP_RLOCK(inp);
4447					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4448						SCTP_TCB_LOCK(stcb);
4449						sctp_delete_sharedkey(stcb, scdel->scact_keynumber);
4450						SCTP_TCB_UNLOCK(stcb);
4451					}
4452					SCTP_INP_RUNLOCK(inp);
4453				}
4454			}
4455			break;
4456		}
4457	case SCTP_AUTH_DEACTIVATE_KEY:
4458		{
4459			struct sctp_authkeyid *keyid;
4460
4461			SCTP_CHECK_AND_CAST(keyid, optval, struct sctp_authkeyid, optsize);
4462			SCTP_FIND_STCB(inp, stcb, keyid->scact_assoc_id);
4463
4464			/* deactivate the key from the right place */
4465			if (stcb) {
4466				if (sctp_deact_sharedkey(stcb, keyid->scact_keynumber)) {
4467					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4468					error = EINVAL;
4469				}
4470				SCTP_TCB_UNLOCK(stcb);
4471			} else {
4472				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4473				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4474				    (keyid->scact_assoc_id == SCTP_FUTURE_ASSOC) ||
4475				    (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) {
4476					SCTP_INP_WLOCK(inp);
4477					if (sctp_deact_sharedkey_ep(inp, keyid->scact_keynumber)) {
4478						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4479						error = EINVAL;
4480					}
4481					SCTP_INP_WUNLOCK(inp);
4482				}
4483				if ((keyid->scact_assoc_id == SCTP_CURRENT_ASSOC) ||
4484				    (keyid->scact_assoc_id == SCTP_ALL_ASSOC)) {
4485					SCTP_INP_RLOCK(inp);
4486					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4487						SCTP_TCB_LOCK(stcb);
4488						sctp_deact_sharedkey(stcb, keyid->scact_keynumber);
4489						SCTP_TCB_UNLOCK(stcb);
4490					}
4491					SCTP_INP_RUNLOCK(inp);
4492				}
4493			}
4494			break;
4495		}
4496	case SCTP_ENABLE_STREAM_RESET:
4497		{
4498			struct sctp_assoc_value *av;
4499
4500			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4501			if (av->assoc_value & (~SCTP_ENABLE_VALUE_MASK)) {
4502				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4503				error = EINVAL;
4504				break;
4505			}
4506			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4507			if (stcb) {
4508				stcb->asoc.local_strreset_support = (uint8_t) av->assoc_value;
4509				SCTP_TCB_UNLOCK(stcb);
4510			} else {
4511				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4512				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4513				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4514				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4515					SCTP_INP_WLOCK(inp);
4516					inp->local_strreset_support = (uint8_t) av->assoc_value;
4517					SCTP_INP_WUNLOCK(inp);
4518				}
4519				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4520				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4521					SCTP_INP_RLOCK(inp);
4522					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4523						SCTP_TCB_LOCK(stcb);
4524						stcb->asoc.local_strreset_support = (uint8_t) av->assoc_value;
4525						SCTP_TCB_UNLOCK(stcb);
4526					}
4527					SCTP_INP_RUNLOCK(inp);
4528				}
4529			}
4530			break;
4531		}
4532	case SCTP_RESET_STREAMS:
4533		{
4534			struct sctp_reset_streams *strrst;
4535			int i, send_out = 0;
4536			int send_in = 0;
4537
4538			SCTP_CHECK_AND_CAST(strrst, optval, struct sctp_reset_streams, optsize);
4539			SCTP_FIND_STCB(inp, stcb, strrst->srs_assoc_id);
4540			if (stcb == NULL) {
4541				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4542				error = ENOENT;
4543				break;
4544			}
4545			if (stcb->asoc.reconfig_supported == 0) {
4546				/*
4547				 * Peer does not support the chunk type.
4548				 */
4549				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4550				error = EOPNOTSUPP;
4551				SCTP_TCB_UNLOCK(stcb);
4552				break;
4553			}
4554			if (sizeof(struct sctp_reset_streams) +
4555			    strrst->srs_number_streams * sizeof(uint16_t) > optsize) {
4556				error = EINVAL;
4557				SCTP_TCB_UNLOCK(stcb);
4558				break;
4559			}
4560			if (stcb->asoc.stream_reset_outstanding) {
4561				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4562				error = EALREADY;
4563				SCTP_TCB_UNLOCK(stcb);
4564				break;
4565			}
4566			if (strrst->srs_flags & SCTP_STREAM_RESET_INCOMING) {
4567				send_in = 1;
4568			}
4569			if (strrst->srs_flags & SCTP_STREAM_RESET_OUTGOING) {
4570				send_out = 1;
4571			}
4572			if ((send_in == 0) && (send_out == 0)) {
4573				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4574				error = EINVAL;
4575				SCTP_TCB_UNLOCK(stcb);
4576				break;
4577			}
4578			for (i = 0; i < strrst->srs_number_streams; i++) {
4579				if ((send_in) &&
4580				    (strrst->srs_stream_list[i] > stcb->asoc.streamincnt)) {
4581					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4582					error = EINVAL;
4583					break;
4584				}
4585				if ((send_out) &&
4586				    (strrst->srs_stream_list[i] > stcb->asoc.streamoutcnt)) {
4587					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4588					error = EINVAL;
4589					break;
4590				}
4591			}
4592			if (error) {
4593				SCTP_TCB_UNLOCK(stcb);
4594				break;
4595			}
4596			error = sctp_send_str_reset_req(stcb, strrst->srs_number_streams,
4597			    strrst->srs_stream_list,
4598			    send_out, send_in, 0, 0, 0, 0, 0);
4599
4600			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4601			SCTP_TCB_UNLOCK(stcb);
4602			break;
4603		}
4604	case SCTP_ADD_STREAMS:
4605		{
4606			struct sctp_add_streams *stradd;
4607			uint8_t addstream = 0;
4608			uint16_t add_o_strmcnt = 0;
4609			uint16_t add_i_strmcnt = 0;
4610
4611			SCTP_CHECK_AND_CAST(stradd, optval, struct sctp_add_streams, optsize);
4612			SCTP_FIND_STCB(inp, stcb, stradd->sas_assoc_id);
4613			if (stcb == NULL) {
4614				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4615				error = ENOENT;
4616				break;
4617			}
4618			if (stcb->asoc.reconfig_supported == 0) {
4619				/*
4620				 * Peer does not support the chunk type.
4621				 */
4622				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4623				error = EOPNOTSUPP;
4624				SCTP_TCB_UNLOCK(stcb);
4625				break;
4626			}
4627			if (stcb->asoc.stream_reset_outstanding) {
4628				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4629				error = EALREADY;
4630				SCTP_TCB_UNLOCK(stcb);
4631				break;
4632			}
4633			if ((stradd->sas_outstrms == 0) &&
4634			    (stradd->sas_instrms == 0)) {
4635				error = EINVAL;
4636				goto skip_stuff;
4637			}
4638			if (stradd->sas_outstrms) {
4639				addstream = 1;
4640				/* We allocate here */
4641				add_o_strmcnt = stradd->sas_outstrms;
4642				if ((((int)add_o_strmcnt) + ((int)stcb->asoc.streamoutcnt)) > 0x0000ffff) {
4643					/* You can't have more than 64k */
4644					error = EINVAL;
4645					goto skip_stuff;
4646				}
4647			}
4648			if (stradd->sas_instrms) {
4649				int cnt;
4650
4651				addstream |= 2;
4652				/*
4653				 * We allocate inside
4654				 * sctp_send_str_reset_req()
4655				 */
4656				add_i_strmcnt = stradd->sas_instrms;
4657				cnt = add_i_strmcnt;
4658				cnt += stcb->asoc.streamincnt;
4659				if (cnt > 0x0000ffff) {
4660					/* You can't have more than 64k */
4661					error = EINVAL;
4662					goto skip_stuff;
4663				}
4664				if (cnt > (int)stcb->asoc.max_inbound_streams) {
4665					/* More than you are allowed */
4666					error = EINVAL;
4667					goto skip_stuff;
4668				}
4669			}
4670			error = sctp_send_str_reset_req(stcb, 0, NULL, 0, 0, 0, addstream, add_o_strmcnt, add_i_strmcnt, 0);
4671			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4672	skip_stuff:
4673			SCTP_TCB_UNLOCK(stcb);
4674			break;
4675		}
4676	case SCTP_RESET_ASSOC:
4677		{
4678			uint32_t *value;
4679
4680			SCTP_CHECK_AND_CAST(value, optval, uint32_t, optsize);
4681			SCTP_FIND_STCB(inp, stcb, (sctp_assoc_t) * value);
4682			if (stcb == NULL) {
4683				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4684				error = ENOENT;
4685				break;
4686			}
4687			if (stcb->asoc.reconfig_supported == 0) {
4688				/*
4689				 * Peer does not support the chunk type.
4690				 */
4691				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
4692				error = EOPNOTSUPP;
4693				SCTP_TCB_UNLOCK(stcb);
4694				break;
4695			}
4696			if (stcb->asoc.stream_reset_outstanding) {
4697				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4698				error = EALREADY;
4699				SCTP_TCB_UNLOCK(stcb);
4700				break;
4701			}
4702			error = sctp_send_str_reset_req(stcb, 0, NULL, 0, 0, 1, 0, 0, 0, 0);
4703			sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_STRRST_REQ, SCTP_SO_LOCKED);
4704			SCTP_TCB_UNLOCK(stcb);
4705			break;
4706		}
4707	case SCTP_CONNECT_X:
4708		if (optsize < (sizeof(int) + sizeof(struct sockaddr_in))) {
4709			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4710			error = EINVAL;
4711			break;
4712		}
4713		error = sctp_do_connect_x(so, inp, optval, optsize, p, 0);
4714		break;
4715	case SCTP_CONNECT_X_DELAYED:
4716		if (optsize < (sizeof(int) + sizeof(struct sockaddr_in))) {
4717			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4718			error = EINVAL;
4719			break;
4720		}
4721		error = sctp_do_connect_x(so, inp, optval, optsize, p, 1);
4722		break;
4723	case SCTP_CONNECT_X_COMPLETE:
4724		{
4725			struct sockaddr *sa;
4726
4727			/* FIXME MT: check correct? */
4728			SCTP_CHECK_AND_CAST(sa, optval, struct sockaddr, optsize);
4729
4730			/* find tcb */
4731			if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
4732				SCTP_INP_RLOCK(inp);
4733				stcb = LIST_FIRST(&inp->sctp_asoc_list);
4734				if (stcb) {
4735					SCTP_TCB_LOCK(stcb);
4736				}
4737				SCTP_INP_RUNLOCK(inp);
4738			} else {
4739				/*
4740				 * We increment here since
4741				 * sctp_findassociation_ep_addr() wil do a
4742				 * decrement if it finds the stcb as long as
4743				 * the locked tcb (last argument) is NOT a
4744				 * TCB.. aka NULL.
4745				 */
4746				SCTP_INP_INCR_REF(inp);
4747				stcb = sctp_findassociation_ep_addr(&inp, sa, NULL, NULL, NULL);
4748				if (stcb == NULL) {
4749					SCTP_INP_DECR_REF(inp);
4750				}
4751			}
4752
4753			if (stcb == NULL) {
4754				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
4755				error = ENOENT;
4756				break;
4757			}
4758			if (stcb->asoc.delayed_connection == 1) {
4759				stcb->asoc.delayed_connection = 0;
4760				(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
4761				sctp_timer_stop(SCTP_TIMER_TYPE_INIT, inp, stcb,
4762				    stcb->asoc.primary_destination,
4763				    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_9);
4764				sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
4765			} else {
4766				/*
4767				 * already expired or did not use delayed
4768				 * connectx
4769				 */
4770				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
4771				error = EALREADY;
4772			}
4773			SCTP_TCB_UNLOCK(stcb);
4774			break;
4775		}
4776	case SCTP_MAX_BURST:
4777		{
4778			struct sctp_assoc_value *av;
4779
4780			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4781			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4782
4783			if (stcb) {
4784				stcb->asoc.max_burst = av->assoc_value;
4785				SCTP_TCB_UNLOCK(stcb);
4786			} else {
4787				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4788				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4789				    (av->assoc_id == SCTP_FUTURE_ASSOC) ||
4790				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4791					SCTP_INP_WLOCK(inp);
4792					inp->sctp_ep.max_burst = av->assoc_value;
4793					SCTP_INP_WUNLOCK(inp);
4794				}
4795				if ((av->assoc_id == SCTP_CURRENT_ASSOC) ||
4796				    (av->assoc_id == SCTP_ALL_ASSOC)) {
4797					SCTP_INP_RLOCK(inp);
4798					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4799						SCTP_TCB_LOCK(stcb);
4800						stcb->asoc.max_burst = av->assoc_value;
4801						SCTP_TCB_UNLOCK(stcb);
4802					}
4803					SCTP_INP_RUNLOCK(inp);
4804				}
4805			}
4806			break;
4807		}
4808	case SCTP_MAXSEG:
4809		{
4810			struct sctp_assoc_value *av;
4811			int ovh;
4812
4813			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
4814			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
4815
4816			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
4817				ovh = SCTP_MED_OVERHEAD;
4818			} else {
4819				ovh = SCTP_MED_V4_OVERHEAD;
4820			}
4821			if (stcb) {
4822				if (av->assoc_value) {
4823					stcb->asoc.sctp_frag_point = (av->assoc_value + ovh);
4824				} else {
4825					stcb->asoc.sctp_frag_point = SCTP_DEFAULT_MAXSEGMENT;
4826				}
4827				SCTP_TCB_UNLOCK(stcb);
4828			} else {
4829				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4830				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
4831				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
4832					SCTP_INP_WLOCK(inp);
4833					/*
4834					 * FIXME MT: I think this is not in
4835					 * tune with the API ID
4836					 */
4837					if (av->assoc_value) {
4838						inp->sctp_frag_point = (av->assoc_value + ovh);
4839					} else {
4840						inp->sctp_frag_point = SCTP_DEFAULT_MAXSEGMENT;
4841					}
4842					SCTP_INP_WUNLOCK(inp);
4843				} else {
4844					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
4845					error = EINVAL;
4846				}
4847			}
4848			break;
4849		}
4850	case SCTP_EVENTS:
4851		{
4852			struct sctp_event_subscribe *events;
4853
4854			SCTP_CHECK_AND_CAST(events, optval, struct sctp_event_subscribe, optsize);
4855
4856			SCTP_INP_WLOCK(inp);
4857			if (events->sctp_data_io_event) {
4858				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT);
4859			} else {
4860				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVDATAIOEVNT);
4861			}
4862
4863			if (events->sctp_association_event) {
4864				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4865			} else {
4866				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4867			}
4868
4869			if (events->sctp_address_event) {
4870				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVPADDREVNT);
4871			} else {
4872				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVPADDREVNT);
4873			}
4874
4875			if (events->sctp_send_failure_event) {
4876				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4877			} else {
4878				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4879			}
4880
4881			if (events->sctp_peer_error_event) {
4882				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVPEERERR);
4883			} else {
4884				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVPEERERR);
4885			}
4886
4887			if (events->sctp_shutdown_event) {
4888				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4889			} else {
4890				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4891			}
4892
4893			if (events->sctp_partial_delivery_event) {
4894				sctp_feature_on(inp, SCTP_PCB_FLAGS_PDAPIEVNT);
4895			} else {
4896				sctp_feature_off(inp, SCTP_PCB_FLAGS_PDAPIEVNT);
4897			}
4898
4899			if (events->sctp_adaptation_layer_event) {
4900				sctp_feature_on(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4901			} else {
4902				sctp_feature_off(inp, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4903			}
4904
4905			if (events->sctp_authentication_event) {
4906				sctp_feature_on(inp, SCTP_PCB_FLAGS_AUTHEVNT);
4907			} else {
4908				sctp_feature_off(inp, SCTP_PCB_FLAGS_AUTHEVNT);
4909			}
4910
4911			if (events->sctp_sender_dry_event) {
4912				sctp_feature_on(inp, SCTP_PCB_FLAGS_DRYEVNT);
4913			} else {
4914				sctp_feature_off(inp, SCTP_PCB_FLAGS_DRYEVNT);
4915			}
4916
4917			if (events->sctp_stream_reset_event) {
4918				sctp_feature_on(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4919			} else {
4920				sctp_feature_off(inp, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4921			}
4922			SCTP_INP_WUNLOCK(inp);
4923
4924			SCTP_INP_RLOCK(inp);
4925			LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
4926				SCTP_TCB_LOCK(stcb);
4927				if (events->sctp_association_event) {
4928					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4929				} else {
4930					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVASSOCEVNT);
4931				}
4932				if (events->sctp_address_event) {
4933					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVPADDREVNT);
4934				} else {
4935					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVPADDREVNT);
4936				}
4937				if (events->sctp_send_failure_event) {
4938					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4939				} else {
4940					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVSENDFAILEVNT);
4941				}
4942				if (events->sctp_peer_error_event) {
4943					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVPEERERR);
4944				} else {
4945					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVPEERERR);
4946				}
4947				if (events->sctp_shutdown_event) {
4948					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4949				} else {
4950					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT);
4951				}
4952				if (events->sctp_partial_delivery_event) {
4953					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_PDAPIEVNT);
4954				} else {
4955					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_PDAPIEVNT);
4956				}
4957				if (events->sctp_adaptation_layer_event) {
4958					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4959				} else {
4960					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_ADAPTATIONEVNT);
4961				}
4962				if (events->sctp_authentication_event) {
4963					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_AUTHEVNT);
4964				} else {
4965					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_AUTHEVNT);
4966				}
4967				if (events->sctp_sender_dry_event) {
4968					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DRYEVNT);
4969				} else {
4970					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DRYEVNT);
4971				}
4972				if (events->sctp_stream_reset_event) {
4973					sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4974				} else {
4975					sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_STREAM_RESETEVNT);
4976				}
4977				SCTP_TCB_UNLOCK(stcb);
4978			}
4979			/*
4980			 * Send up the sender dry event only for 1-to-1
4981			 * style sockets.
4982			 */
4983			if (events->sctp_sender_dry_event) {
4984				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
4985				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
4986					stcb = LIST_FIRST(&inp->sctp_asoc_list);
4987					if (stcb) {
4988						SCTP_TCB_LOCK(stcb);
4989						if (TAILQ_EMPTY(&stcb->asoc.send_queue) &&
4990						    TAILQ_EMPTY(&stcb->asoc.sent_queue) &&
4991						    (stcb->asoc.stream_queue_cnt == 0)) {
4992							sctp_ulp_notify(SCTP_NOTIFY_SENDER_DRY, stcb, 0, NULL, SCTP_SO_LOCKED);
4993						}
4994						SCTP_TCB_UNLOCK(stcb);
4995					}
4996				}
4997			}
4998			SCTP_INP_RUNLOCK(inp);
4999			break;
5000		}
5001	case SCTP_ADAPTATION_LAYER:
5002		{
5003			struct sctp_setadaptation *adap_bits;
5004
5005			SCTP_CHECK_AND_CAST(adap_bits, optval, struct sctp_setadaptation, optsize);
5006			SCTP_INP_WLOCK(inp);
5007			inp->sctp_ep.adaptation_layer_indicator = adap_bits->ssb_adaptation_ind;
5008			inp->sctp_ep.adaptation_layer_indicator_provided = 1;
5009			SCTP_INP_WUNLOCK(inp);
5010			break;
5011		}
5012#ifdef SCTP_DEBUG
5013	case SCTP_SET_INITIAL_DBG_SEQ:
5014		{
5015			uint32_t *vvv;
5016
5017			SCTP_CHECK_AND_CAST(vvv, optval, uint32_t, optsize);
5018			SCTP_INP_WLOCK(inp);
5019			inp->sctp_ep.initial_sequence_debug = *vvv;
5020			SCTP_INP_WUNLOCK(inp);
5021			break;
5022		}
5023#endif
5024	case SCTP_DEFAULT_SEND_PARAM:
5025		{
5026			struct sctp_sndrcvinfo *s_info;
5027
5028			SCTP_CHECK_AND_CAST(s_info, optval, struct sctp_sndrcvinfo, optsize);
5029			SCTP_FIND_STCB(inp, stcb, s_info->sinfo_assoc_id);
5030
5031			if (stcb) {
5032				if (s_info->sinfo_stream < stcb->asoc.streamoutcnt) {
5033					memcpy(&stcb->asoc.def_send, s_info, min(optsize, sizeof(stcb->asoc.def_send)));
5034				} else {
5035					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5036					error = EINVAL;
5037				}
5038				SCTP_TCB_UNLOCK(stcb);
5039			} else {
5040				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5041				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5042				    (s_info->sinfo_assoc_id == SCTP_FUTURE_ASSOC) ||
5043				    (s_info->sinfo_assoc_id == SCTP_ALL_ASSOC)) {
5044					SCTP_INP_WLOCK(inp);
5045					memcpy(&inp->def_send, s_info, min(optsize, sizeof(inp->def_send)));
5046					SCTP_INP_WUNLOCK(inp);
5047				}
5048				if ((s_info->sinfo_assoc_id == SCTP_CURRENT_ASSOC) ||
5049				    (s_info->sinfo_assoc_id == SCTP_ALL_ASSOC)) {
5050					SCTP_INP_RLOCK(inp);
5051					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
5052						SCTP_TCB_LOCK(stcb);
5053						if (s_info->sinfo_stream < stcb->asoc.streamoutcnt) {
5054							memcpy(&stcb->asoc.def_send, s_info, min(optsize, sizeof(stcb->asoc.def_send)));
5055						}
5056						SCTP_TCB_UNLOCK(stcb);
5057					}
5058					SCTP_INP_RUNLOCK(inp);
5059				}
5060			}
5061			break;
5062		}
5063	case SCTP_PEER_ADDR_PARAMS:
5064		{
5065			struct sctp_paddrparams *paddrp;
5066			struct sctp_nets *net;
5067			struct sockaddr *addr;
5068
5069#if defined(INET) && defined(INET6)
5070			struct sockaddr_in sin_store;
5071
5072#endif
5073
5074			SCTP_CHECK_AND_CAST(paddrp, optval, struct sctp_paddrparams, optsize);
5075			SCTP_FIND_STCB(inp, stcb, paddrp->spp_assoc_id);
5076
5077#if defined(INET) && defined(INET6)
5078			if (paddrp->spp_address.ss_family == AF_INET6) {
5079				struct sockaddr_in6 *sin6;
5080
5081				sin6 = (struct sockaddr_in6 *)&paddrp->spp_address;
5082				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5083					in6_sin6_2_sin(&sin_store, sin6);
5084					addr = (struct sockaddr *)&sin_store;
5085				} else {
5086					addr = (struct sockaddr *)&paddrp->spp_address;
5087				}
5088			} else {
5089				addr = (struct sockaddr *)&paddrp->spp_address;
5090			}
5091#else
5092			addr = (struct sockaddr *)&paddrp->spp_address;
5093#endif
5094			if (stcb != NULL) {
5095				net = sctp_findnet(stcb, addr);
5096			} else {
5097				/*
5098				 * We increment here since
5099				 * sctp_findassociation_ep_addr() wil do a
5100				 * decrement if it finds the stcb as long as
5101				 * the locked tcb (last argument) is NOT a
5102				 * TCB.. aka NULL.
5103				 */
5104				net = NULL;
5105				SCTP_INP_INCR_REF(inp);
5106				stcb = sctp_findassociation_ep_addr(&inp, addr,
5107				    &net, NULL, NULL);
5108				if (stcb == NULL) {
5109					SCTP_INP_DECR_REF(inp);
5110				}
5111			}
5112			if ((stcb != NULL) && (net == NULL)) {
5113#ifdef INET
5114				if (addr->sa_family == AF_INET) {
5115
5116					struct sockaddr_in *sin;
5117
5118					sin = (struct sockaddr_in *)addr;
5119					if (sin->sin_addr.s_addr != INADDR_ANY) {
5120						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5121						SCTP_TCB_UNLOCK(stcb);
5122						error = EINVAL;
5123						break;
5124					}
5125				} else
5126#endif
5127#ifdef INET6
5128				if (addr->sa_family == AF_INET6) {
5129					struct sockaddr_in6 *sin6;
5130
5131					sin6 = (struct sockaddr_in6 *)addr;
5132					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
5133						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5134						SCTP_TCB_UNLOCK(stcb);
5135						error = EINVAL;
5136						break;
5137					}
5138				} else
5139#endif
5140				{
5141					error = EAFNOSUPPORT;
5142					SCTP_TCB_UNLOCK(stcb);
5143					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
5144					break;
5145				}
5146			}
5147			/* sanity checks */
5148			if ((paddrp->spp_flags & SPP_HB_ENABLE) && (paddrp->spp_flags & SPP_HB_DISABLE)) {
5149				if (stcb)
5150					SCTP_TCB_UNLOCK(stcb);
5151				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5152				return (EINVAL);
5153			}
5154			if ((paddrp->spp_flags & SPP_PMTUD_ENABLE) && (paddrp->spp_flags & SPP_PMTUD_DISABLE)) {
5155				if (stcb)
5156					SCTP_TCB_UNLOCK(stcb);
5157				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5158				return (EINVAL);
5159			}
5160			if (stcb != NULL) {
5161				/************************TCB SPECIFIC SET ******************/
5162				/*
5163				 * do we change the timer for HB, we run
5164				 * only one?
5165				 */
5166				int ovh = 0;
5167
5168				if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
5169					ovh = SCTP_MED_OVERHEAD;
5170				} else {
5171					ovh = SCTP_MED_V4_OVERHEAD;
5172				}
5173
5174				/* network sets ? */
5175				if (net != NULL) {
5176					/************************NET SPECIFIC SET ******************/
5177					if (paddrp->spp_flags & SPP_HB_DISABLE) {
5178						if (!(net->dest_state & SCTP_ADDR_UNCONFIRMED) &&
5179						    !(net->dest_state & SCTP_ADDR_NOHB)) {
5180							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5181							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5182						}
5183						net->dest_state |= SCTP_ADDR_NOHB;
5184					}
5185					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5186						if (paddrp->spp_hbinterval) {
5187							net->heart_beat_delay = paddrp->spp_hbinterval;
5188						} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5189							net->heart_beat_delay = 0;
5190						}
5191						sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5192						    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5193						sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5194						net->dest_state &= ~SCTP_ADDR_NOHB;
5195					}
5196					if (paddrp->spp_flags & SPP_HB_DEMAND) {
5197						/* on demand HB */
5198						sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5199						sctp_chunk_output(inp, stcb, SCTP_OUTPUT_FROM_SOCKOPT, SCTP_SO_LOCKED);
5200						sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5201					}
5202					if ((paddrp->spp_flags & SPP_PMTUD_DISABLE) && (paddrp->spp_pathmtu >= SCTP_SMALLEST_PMTU)) {
5203						if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5204							sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
5205							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5206						}
5207						net->dest_state |= SCTP_ADDR_NO_PMTUD;
5208						net->mtu = paddrp->spp_pathmtu + ovh;
5209						if (net->mtu < stcb->asoc.smallest_mtu) {
5210							sctp_pathmtu_adjustment(stcb, net->mtu);
5211						}
5212					}
5213					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5214						if (!SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5215							sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
5216						}
5217						net->dest_state &= ~SCTP_ADDR_NO_PMTUD;
5218					}
5219					if (paddrp->spp_pathmaxrxt) {
5220						if (net->dest_state & SCTP_ADDR_PF) {
5221							if (net->error_count > paddrp->spp_pathmaxrxt) {
5222								net->dest_state &= ~SCTP_ADDR_PF;
5223							}
5224						} else {
5225							if ((net->error_count <= paddrp->spp_pathmaxrxt) &&
5226							    (net->error_count > net->pf_threshold)) {
5227								net->dest_state |= SCTP_ADDR_PF;
5228								sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5229								sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
5230								sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
5231							}
5232						}
5233						if (net->dest_state & SCTP_ADDR_REACHABLE) {
5234							if (net->error_count > paddrp->spp_pathmaxrxt) {
5235								net->dest_state &= ~SCTP_ADDR_REACHABLE;
5236								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
5237							}
5238						} else {
5239							if (net->error_count <= paddrp->spp_pathmaxrxt) {
5240								net->dest_state |= SCTP_ADDR_REACHABLE;
5241								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
5242							}
5243						}
5244						net->failure_threshold = paddrp->spp_pathmaxrxt;
5245					}
5246					if (paddrp->spp_flags & SPP_DSCP) {
5247						net->dscp = paddrp->spp_dscp & 0xfc;
5248						net->dscp |= 0x01;
5249					}
5250#ifdef INET6
5251					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5252						if (net->ro._l_addr.sa.sa_family == AF_INET6) {
5253							net->flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5254							net->flowlabel |= 0x80000000;
5255						}
5256					}
5257#endif
5258				} else {
5259					/************************ASSOC ONLY -- NO NET SPECIFIC SET ******************/
5260					if (paddrp->spp_pathmaxrxt != 0) {
5261						stcb->asoc.def_net_failure = paddrp->spp_pathmaxrxt;
5262						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5263							if (net->dest_state & SCTP_ADDR_PF) {
5264								if (net->error_count > paddrp->spp_pathmaxrxt) {
5265									net->dest_state &= ~SCTP_ADDR_PF;
5266								}
5267							} else {
5268								if ((net->error_count <= paddrp->spp_pathmaxrxt) &&
5269								    (net->error_count > net->pf_threshold)) {
5270									net->dest_state |= SCTP_ADDR_PF;
5271									sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
5272									sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
5273									sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
5274								}
5275							}
5276							if (net->dest_state & SCTP_ADDR_REACHABLE) {
5277								if (net->error_count > paddrp->spp_pathmaxrxt) {
5278									net->dest_state &= ~SCTP_ADDR_REACHABLE;
5279									sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
5280								}
5281							} else {
5282								if (net->error_count <= paddrp->spp_pathmaxrxt) {
5283									net->dest_state |= SCTP_ADDR_REACHABLE;
5284									sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
5285								}
5286							}
5287							net->failure_threshold = paddrp->spp_pathmaxrxt;
5288						}
5289					}
5290					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5291						if (paddrp->spp_hbinterval != 0) {
5292							stcb->asoc.heart_beat_delay = paddrp->spp_hbinterval;
5293						} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5294							stcb->asoc.heart_beat_delay = 0;
5295						}
5296						/* Turn back on the timer */
5297						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5298							if (paddrp->spp_hbinterval != 0) {
5299								net->heart_beat_delay = paddrp->spp_hbinterval;
5300							} else if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5301								net->heart_beat_delay = 0;
5302							}
5303							if (net->dest_state & SCTP_ADDR_NOHB) {
5304								net->dest_state &= ~SCTP_ADDR_NOHB;
5305							}
5306							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net,
5307							    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5308							sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
5309						}
5310						sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5311					}
5312					if (paddrp->spp_flags & SPP_HB_DISABLE) {
5313						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5314							if (!(net->dest_state & SCTP_ADDR_NOHB)) {
5315								net->dest_state |= SCTP_ADDR_NOHB;
5316								if (!(net->dest_state & SCTP_ADDR_UNCONFIRMED)) {
5317									sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5318								}
5319							}
5320						}
5321						sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5322					}
5323					if ((paddrp->spp_flags & SPP_PMTUD_DISABLE) && (paddrp->spp_pathmtu >= SCTP_SMALLEST_PMTU)) {
5324						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5325							if (SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5326								sctp_timer_stop(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net,
5327								    SCTP_FROM_SCTP_USRREQ + SCTP_LOC_10);
5328							}
5329							net->dest_state |= SCTP_ADDR_NO_PMTUD;
5330							net->mtu = paddrp->spp_pathmtu + ovh;
5331							if (net->mtu < stcb->asoc.smallest_mtu) {
5332								sctp_pathmtu_adjustment(stcb, net->mtu);
5333							}
5334						}
5335						sctp_stcb_feature_on(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5336					}
5337					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5338						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5339							if (!SCTP_OS_TIMER_PENDING(&net->pmtu_timer.timer)) {
5340								sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, inp, stcb, net);
5341							}
5342							net->dest_state &= ~SCTP_ADDR_NO_PMTUD;
5343						}
5344						sctp_stcb_feature_off(inp, stcb, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5345					}
5346					if (paddrp->spp_flags & SPP_DSCP) {
5347						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5348							net->dscp = paddrp->spp_dscp & 0xfc;
5349							net->dscp |= 0x01;
5350						}
5351						stcb->asoc.default_dscp = paddrp->spp_dscp & 0xfc;
5352						stcb->asoc.default_dscp |= 0x01;
5353					}
5354#ifdef INET6
5355					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5356						TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
5357							if (net->ro._l_addr.sa.sa_family == AF_INET6) {
5358								net->flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5359								net->flowlabel |= 0x80000000;
5360							}
5361						}
5362						stcb->asoc.default_flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5363						stcb->asoc.default_flowlabel |= 0x80000000;
5364					}
5365#endif
5366				}
5367				SCTP_TCB_UNLOCK(stcb);
5368			} else {
5369				/************************NO TCB, SET TO default stuff ******************/
5370				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5371				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5372				    (paddrp->spp_assoc_id == SCTP_FUTURE_ASSOC)) {
5373					SCTP_INP_WLOCK(inp);
5374					/*
5375					 * For the TOS/FLOWLABEL stuff you
5376					 * set it with the options on the
5377					 * socket
5378					 */
5379					if (paddrp->spp_pathmaxrxt != 0) {
5380						inp->sctp_ep.def_net_failure = paddrp->spp_pathmaxrxt;
5381					}
5382					if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO)
5383						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
5384					else if (paddrp->spp_hbinterval != 0) {
5385						if (paddrp->spp_hbinterval > SCTP_MAX_HB_INTERVAL)
5386							paddrp->spp_hbinterval = SCTP_MAX_HB_INTERVAL;
5387						inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = MSEC_TO_TICKS(paddrp->spp_hbinterval);
5388					}
5389					if (paddrp->spp_flags & SPP_HB_ENABLE) {
5390						if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
5391							inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
5392						} else if (paddrp->spp_hbinterval) {
5393							inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = MSEC_TO_TICKS(paddrp->spp_hbinterval);
5394						}
5395						sctp_feature_off(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5396					} else if (paddrp->spp_flags & SPP_HB_DISABLE) {
5397						sctp_feature_on(inp, SCTP_PCB_FLAGS_DONOT_HEARTBEAT);
5398					}
5399					if (paddrp->spp_flags & SPP_PMTUD_ENABLE) {
5400						sctp_feature_off(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5401					} else if (paddrp->spp_flags & SPP_PMTUD_DISABLE) {
5402						sctp_feature_on(inp, SCTP_PCB_FLAGS_DO_NOT_PMTUD);
5403					}
5404					if (paddrp->spp_flags & SPP_DSCP) {
5405						inp->sctp_ep.default_dscp = paddrp->spp_dscp & 0xfc;
5406						inp->sctp_ep.default_dscp |= 0x01;
5407					}
5408#ifdef INET6
5409					if (paddrp->spp_flags & SPP_IPV6_FLOWLABEL) {
5410						if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
5411							inp->sctp_ep.default_flowlabel = paddrp->spp_ipv6_flowlabel & 0x000fffff;
5412							inp->sctp_ep.default_flowlabel |= 0x80000000;
5413						}
5414					}
5415#endif
5416					SCTP_INP_WUNLOCK(inp);
5417				} else {
5418					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5419					error = EINVAL;
5420				}
5421			}
5422			break;
5423		}
5424	case SCTP_RTOINFO:
5425		{
5426			struct sctp_rtoinfo *srto;
5427			uint32_t new_init, new_min, new_max;
5428
5429			SCTP_CHECK_AND_CAST(srto, optval, struct sctp_rtoinfo, optsize);
5430			SCTP_FIND_STCB(inp, stcb, srto->srto_assoc_id);
5431
5432			if (stcb) {
5433				if (srto->srto_initial)
5434					new_init = srto->srto_initial;
5435				else
5436					new_init = stcb->asoc.initial_rto;
5437				if (srto->srto_max)
5438					new_max = srto->srto_max;
5439				else
5440					new_max = stcb->asoc.maxrto;
5441				if (srto->srto_min)
5442					new_min = srto->srto_min;
5443				else
5444					new_min = stcb->asoc.minrto;
5445				if ((new_min <= new_init) && (new_init <= new_max)) {
5446					stcb->asoc.initial_rto = new_init;
5447					stcb->asoc.maxrto = new_max;
5448					stcb->asoc.minrto = new_min;
5449				} else {
5450					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5451					error = EINVAL;
5452				}
5453				SCTP_TCB_UNLOCK(stcb);
5454			} else {
5455				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5456				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5457				    (srto->srto_assoc_id == SCTP_FUTURE_ASSOC)) {
5458					SCTP_INP_WLOCK(inp);
5459					if (srto->srto_initial)
5460						new_init = srto->srto_initial;
5461					else
5462						new_init = inp->sctp_ep.initial_rto;
5463					if (srto->srto_max)
5464						new_max = srto->srto_max;
5465					else
5466						new_max = inp->sctp_ep.sctp_maxrto;
5467					if (srto->srto_min)
5468						new_min = srto->srto_min;
5469					else
5470						new_min = inp->sctp_ep.sctp_minrto;
5471					if ((new_min <= new_init) && (new_init <= new_max)) {
5472						inp->sctp_ep.initial_rto = new_init;
5473						inp->sctp_ep.sctp_maxrto = new_max;
5474						inp->sctp_ep.sctp_minrto = new_min;
5475					} else {
5476						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5477						error = EINVAL;
5478					}
5479					SCTP_INP_WUNLOCK(inp);
5480				} else {
5481					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5482					error = EINVAL;
5483				}
5484			}
5485			break;
5486		}
5487	case SCTP_ASSOCINFO:
5488		{
5489			struct sctp_assocparams *sasoc;
5490
5491			SCTP_CHECK_AND_CAST(sasoc, optval, struct sctp_assocparams, optsize);
5492			SCTP_FIND_STCB(inp, stcb, sasoc->sasoc_assoc_id);
5493			if (sasoc->sasoc_cookie_life) {
5494				/* boundary check the cookie life */
5495				if (sasoc->sasoc_cookie_life < 1000)
5496					sasoc->sasoc_cookie_life = 1000;
5497				if (sasoc->sasoc_cookie_life > SCTP_MAX_COOKIE_LIFE) {
5498					sasoc->sasoc_cookie_life = SCTP_MAX_COOKIE_LIFE;
5499				}
5500			}
5501			if (stcb) {
5502				if (sasoc->sasoc_asocmaxrxt)
5503					stcb->asoc.max_send_times = sasoc->sasoc_asocmaxrxt;
5504				if (sasoc->sasoc_cookie_life) {
5505					stcb->asoc.cookie_life = MSEC_TO_TICKS(sasoc->sasoc_cookie_life);
5506				}
5507				SCTP_TCB_UNLOCK(stcb);
5508			} else {
5509				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5510				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5511				    (sasoc->sasoc_assoc_id == SCTP_FUTURE_ASSOC)) {
5512					SCTP_INP_WLOCK(inp);
5513					if (sasoc->sasoc_asocmaxrxt)
5514						inp->sctp_ep.max_send_times = sasoc->sasoc_asocmaxrxt;
5515					if (sasoc->sasoc_cookie_life) {
5516						inp->sctp_ep.def_cookie_life = MSEC_TO_TICKS(sasoc->sasoc_cookie_life);
5517					}
5518					SCTP_INP_WUNLOCK(inp);
5519				} else {
5520					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5521					error = EINVAL;
5522				}
5523			}
5524			break;
5525		}
5526	case SCTP_INITMSG:
5527		{
5528			struct sctp_initmsg *sinit;
5529
5530			SCTP_CHECK_AND_CAST(sinit, optval, struct sctp_initmsg, optsize);
5531			SCTP_INP_WLOCK(inp);
5532			if (sinit->sinit_num_ostreams)
5533				inp->sctp_ep.pre_open_stream_count = sinit->sinit_num_ostreams;
5534
5535			if (sinit->sinit_max_instreams)
5536				inp->sctp_ep.max_open_streams_intome = sinit->sinit_max_instreams;
5537
5538			if (sinit->sinit_max_attempts)
5539				inp->sctp_ep.max_init_times = sinit->sinit_max_attempts;
5540
5541			if (sinit->sinit_max_init_timeo)
5542				inp->sctp_ep.initial_init_rto_max = sinit->sinit_max_init_timeo;
5543			SCTP_INP_WUNLOCK(inp);
5544			break;
5545		}
5546	case SCTP_PRIMARY_ADDR:
5547		{
5548			struct sctp_setprim *spa;
5549			struct sctp_nets *net;
5550			struct sockaddr *addr;
5551
5552#if defined(INET) && defined(INET6)
5553			struct sockaddr_in sin_store;
5554
5555#endif
5556
5557			SCTP_CHECK_AND_CAST(spa, optval, struct sctp_setprim, optsize);
5558			SCTP_FIND_STCB(inp, stcb, spa->ssp_assoc_id);
5559
5560#if defined(INET) && defined(INET6)
5561			if (spa->ssp_addr.ss_family == AF_INET6) {
5562				struct sockaddr_in6 *sin6;
5563
5564				sin6 = (struct sockaddr_in6 *)&spa->ssp_addr;
5565				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5566					in6_sin6_2_sin(&sin_store, sin6);
5567					addr = (struct sockaddr *)&sin_store;
5568				} else {
5569					addr = (struct sockaddr *)&spa->ssp_addr;
5570				}
5571			} else {
5572				addr = (struct sockaddr *)&spa->ssp_addr;
5573			}
5574#else
5575			addr = (struct sockaddr *)&spa->ssp_addr;
5576#endif
5577			if (stcb != NULL) {
5578				net = sctp_findnet(stcb, addr);
5579			} else {
5580				/*
5581				 * We increment here since
5582				 * sctp_findassociation_ep_addr() wil do a
5583				 * decrement if it finds the stcb as long as
5584				 * the locked tcb (last argument) is NOT a
5585				 * TCB.. aka NULL.
5586				 */
5587				net = NULL;
5588				SCTP_INP_INCR_REF(inp);
5589				stcb = sctp_findassociation_ep_addr(&inp, addr,
5590				    &net, NULL, NULL);
5591				if (stcb == NULL) {
5592					SCTP_INP_DECR_REF(inp);
5593				}
5594			}
5595
5596			if ((stcb != NULL) && (net != NULL)) {
5597				if ((net != stcb->asoc.primary_destination) &&
5598				    (!(net->dest_state & SCTP_ADDR_UNCONFIRMED))) {
5599					/* Ok we need to set it */
5600					if (sctp_set_primary_addr(stcb, (struct sockaddr *)NULL, net) == 0) {
5601						if ((stcb->asoc.alternate) &&
5602						    (!(net->dest_state & SCTP_ADDR_PF)) &&
5603						    (net->dest_state & SCTP_ADDR_REACHABLE)) {
5604							sctp_free_remote_addr(stcb->asoc.alternate);
5605							stcb->asoc.alternate = NULL;
5606						}
5607					}
5608				}
5609			} else {
5610				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5611				error = EINVAL;
5612			}
5613			if (stcb != NULL) {
5614				SCTP_TCB_UNLOCK(stcb);
5615			}
5616			break;
5617		}
5618	case SCTP_SET_DYNAMIC_PRIMARY:
5619		{
5620			union sctp_sockstore *ss;
5621
5622			error = priv_check(curthread,
5623			    PRIV_NETINET_RESERVEDPORT);
5624			if (error)
5625				break;
5626
5627			SCTP_CHECK_AND_CAST(ss, optval, union sctp_sockstore, optsize);
5628			/* SUPER USER CHECK? */
5629			error = sctp_dynamic_set_primary(&ss->sa, vrf_id);
5630			break;
5631		}
5632	case SCTP_SET_PEER_PRIMARY_ADDR:
5633		{
5634			struct sctp_setpeerprim *sspp;
5635			struct sockaddr *addr;
5636
5637#if defined(INET) && defined(INET6)
5638			struct sockaddr_in sin_store;
5639
5640#endif
5641
5642			SCTP_CHECK_AND_CAST(sspp, optval, struct sctp_setpeerprim, optsize);
5643			SCTP_FIND_STCB(inp, stcb, sspp->sspp_assoc_id);
5644			if (stcb != NULL) {
5645				struct sctp_ifa *ifa;
5646
5647#if defined(INET) && defined(INET6)
5648				if (sspp->sspp_addr.ss_family == AF_INET6) {
5649					struct sockaddr_in6 *sin6;
5650
5651					sin6 = (struct sockaddr_in6 *)&sspp->sspp_addr;
5652					if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
5653						in6_sin6_2_sin(&sin_store, sin6);
5654						addr = (struct sockaddr *)&sin_store;
5655					} else {
5656						addr = (struct sockaddr *)&sspp->sspp_addr;
5657					}
5658				} else {
5659					addr = (struct sockaddr *)&sspp->sspp_addr;
5660				}
5661#else
5662				addr = (struct sockaddr *)&sspp->sspp_addr;
5663#endif
5664				ifa = sctp_find_ifa_by_addr(addr, stcb->asoc.vrf_id, SCTP_ADDR_NOT_LOCKED);
5665				if (ifa == NULL) {
5666					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5667					error = EINVAL;
5668					goto out_of_it;
5669				}
5670				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
5671					/*
5672					 * Must validate the ifa found is in
5673					 * our ep
5674					 */
5675					struct sctp_laddr *laddr;
5676					int found = 0;
5677
5678					LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
5679						if (laddr->ifa == NULL) {
5680							SCTPDBG(SCTP_DEBUG_OUTPUT1, "%s: NULL ifa\n",
5681							    __FUNCTION__);
5682							continue;
5683						}
5684						if (laddr->ifa == ifa) {
5685							found = 1;
5686							break;
5687						}
5688					}
5689					if (!found) {
5690						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5691						error = EINVAL;
5692						goto out_of_it;
5693					}
5694				} else {
5695					switch (addr->sa_family) {
5696#ifdef INET
5697					case AF_INET:
5698						{
5699							struct sockaddr_in *sin;
5700
5701							sin = (struct sockaddr_in *)addr;
5702							if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
5703							    &sin->sin_addr) != 0) {
5704								SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5705								error = EINVAL;
5706								goto out_of_it;
5707							}
5708							break;
5709						}
5710#endif
5711#ifdef INET6
5712					case AF_INET6:
5713						{
5714							struct sockaddr_in6 *sin6;
5715
5716							sin6 = (struct sockaddr_in6 *)addr;
5717							if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
5718							    &sin6->sin6_addr) != 0) {
5719								SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5720								error = EINVAL;
5721								goto out_of_it;
5722							}
5723							break;
5724						}
5725#endif
5726					default:
5727						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5728						error = EINVAL;
5729						goto out_of_it;
5730					}
5731				}
5732				if (sctp_set_primary_ip_address_sa(stcb, addr) != 0) {
5733					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5734					error = EINVAL;
5735				}
5736		out_of_it:
5737				SCTP_TCB_UNLOCK(stcb);
5738			} else {
5739				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5740				error = EINVAL;
5741			}
5742			break;
5743		}
5744	case SCTP_BINDX_ADD_ADDR:
5745		{
5746			struct sctp_getaddresses *addrs;
5747			struct thread *td;
5748
5749			td = (struct thread *)p;
5750			SCTP_CHECK_AND_CAST(addrs, optval, struct sctp_getaddresses,
5751			    optsize);
5752#ifdef INET
5753			if (addrs->addr->sa_family == AF_INET) {
5754				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in)) {
5755					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5756					error = EINVAL;
5757					break;
5758				}
5759				if (td != NULL && (error = prison_local_ip4(td->td_ucred, &(((struct sockaddr_in *)(addrs->addr))->sin_addr)))) {
5760					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5761					break;
5762				}
5763			} else
5764#endif
5765#ifdef INET6
5766			if (addrs->addr->sa_family == AF_INET6) {
5767				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in6)) {
5768					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5769					error = EINVAL;
5770					break;
5771				}
5772				if (td != NULL && (error = prison_local_ip6(td->td_ucred, &(((struct sockaddr_in6 *)(addrs->addr))->sin6_addr),
5773				    (SCTP_IPV6_V6ONLY(inp) != 0))) != 0) {
5774					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5775					break;
5776				}
5777			} else
5778#endif
5779			{
5780				error = EAFNOSUPPORT;
5781				break;
5782			}
5783			sctp_bindx_add_address(so, inp, addrs->addr,
5784			    addrs->sget_assoc_id, vrf_id,
5785			    &error, p);
5786			break;
5787		}
5788	case SCTP_BINDX_REM_ADDR:
5789		{
5790			struct sctp_getaddresses *addrs;
5791			struct thread *td;
5792
5793			td = (struct thread *)p;
5794
5795			SCTP_CHECK_AND_CAST(addrs, optval, struct sctp_getaddresses, optsize);
5796#ifdef INET
5797			if (addrs->addr->sa_family == AF_INET) {
5798				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in)) {
5799					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5800					error = EINVAL;
5801					break;
5802				}
5803				if (td != NULL && (error = prison_local_ip4(td->td_ucred, &(((struct sockaddr_in *)(addrs->addr))->sin_addr)))) {
5804					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5805					break;
5806				}
5807			} else
5808#endif
5809#ifdef INET6
5810			if (addrs->addr->sa_family == AF_INET6) {
5811				if (optsize < sizeof(struct sctp_getaddresses) - sizeof(struct sockaddr) + sizeof(struct sockaddr_in6)) {
5812					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5813					error = EINVAL;
5814					break;
5815				}
5816				if (td != NULL &&
5817				    (error = prison_local_ip6(td->td_ucred,
5818				    &(((struct sockaddr_in6 *)(addrs->addr))->sin6_addr),
5819				    (SCTP_IPV6_V6ONLY(inp) != 0))) != 0) {
5820					SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, error);
5821					break;
5822				}
5823			} else
5824#endif
5825			{
5826				error = EAFNOSUPPORT;
5827				break;
5828			}
5829			sctp_bindx_delete_address(inp, addrs->addr,
5830			    addrs->sget_assoc_id, vrf_id,
5831			    &error);
5832			break;
5833		}
5834	case SCTP_EVENT:
5835		{
5836			struct sctp_event *event;
5837			uint32_t event_type;
5838
5839			SCTP_CHECK_AND_CAST(event, optval, struct sctp_event, optsize);
5840			SCTP_FIND_STCB(inp, stcb, event->se_assoc_id);
5841			switch (event->se_type) {
5842			case SCTP_ASSOC_CHANGE:
5843				event_type = SCTP_PCB_FLAGS_RECVASSOCEVNT;
5844				break;
5845			case SCTP_PEER_ADDR_CHANGE:
5846				event_type = SCTP_PCB_FLAGS_RECVPADDREVNT;
5847				break;
5848			case SCTP_REMOTE_ERROR:
5849				event_type = SCTP_PCB_FLAGS_RECVPEERERR;
5850				break;
5851			case SCTP_SEND_FAILED:
5852				event_type = SCTP_PCB_FLAGS_RECVSENDFAILEVNT;
5853				break;
5854			case SCTP_SHUTDOWN_EVENT:
5855				event_type = SCTP_PCB_FLAGS_RECVSHUTDOWNEVNT;
5856				break;
5857			case SCTP_ADAPTATION_INDICATION:
5858				event_type = SCTP_PCB_FLAGS_ADAPTATIONEVNT;
5859				break;
5860			case SCTP_PARTIAL_DELIVERY_EVENT:
5861				event_type = SCTP_PCB_FLAGS_PDAPIEVNT;
5862				break;
5863			case SCTP_AUTHENTICATION_EVENT:
5864				event_type = SCTP_PCB_FLAGS_AUTHEVNT;
5865				break;
5866			case SCTP_STREAM_RESET_EVENT:
5867				event_type = SCTP_PCB_FLAGS_STREAM_RESETEVNT;
5868				break;
5869			case SCTP_SENDER_DRY_EVENT:
5870				event_type = SCTP_PCB_FLAGS_DRYEVNT;
5871				break;
5872			case SCTP_NOTIFICATIONS_STOPPED_EVENT:
5873				event_type = 0;
5874				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
5875				error = ENOTSUP;
5876				break;
5877			case SCTP_ASSOC_RESET_EVENT:
5878				event_type = SCTP_PCB_FLAGS_ASSOC_RESETEVNT;
5879				break;
5880			case SCTP_STREAM_CHANGE_EVENT:
5881				event_type = SCTP_PCB_FLAGS_STREAM_CHANGEEVNT;
5882				break;
5883			case SCTP_SEND_FAILED_EVENT:
5884				event_type = SCTP_PCB_FLAGS_RECVNSENDFAILEVNT;
5885				break;
5886			default:
5887				event_type = 0;
5888				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5889				error = EINVAL;
5890				break;
5891			}
5892			if (event_type > 0) {
5893				if (stcb) {
5894					if (event->se_on) {
5895						sctp_stcb_feature_on(inp, stcb, event_type);
5896						if (event_type == SCTP_PCB_FLAGS_DRYEVNT) {
5897							if (TAILQ_EMPTY(&stcb->asoc.send_queue) &&
5898							    TAILQ_EMPTY(&stcb->asoc.sent_queue) &&
5899							    (stcb->asoc.stream_queue_cnt == 0)) {
5900								sctp_ulp_notify(SCTP_NOTIFY_SENDER_DRY, stcb, 0, NULL, SCTP_SO_LOCKED);
5901							}
5902						}
5903					} else {
5904						sctp_stcb_feature_off(inp, stcb, event_type);
5905					}
5906					SCTP_TCB_UNLOCK(stcb);
5907				} else {
5908					/*
5909					 * We don't want to send up a storm
5910					 * of events, so return an error for
5911					 * sender dry events
5912					 */
5913					if ((event_type == SCTP_PCB_FLAGS_DRYEVNT) &&
5914					    ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) == 0) &&
5915					    ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) == 0) &&
5916					    ((event->se_assoc_id == SCTP_ALL_ASSOC) ||
5917					    (event->se_assoc_id == SCTP_CURRENT_ASSOC))) {
5918						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTSUP);
5919						error = ENOTSUP;
5920						break;
5921					}
5922					if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
5923					    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
5924					    (event->se_assoc_id == SCTP_FUTURE_ASSOC) ||
5925					    (event->se_assoc_id == SCTP_ALL_ASSOC)) {
5926						SCTP_INP_WLOCK(inp);
5927						if (event->se_on) {
5928							sctp_feature_on(inp, event_type);
5929						} else {
5930							sctp_feature_off(inp, event_type);
5931						}
5932						SCTP_INP_WUNLOCK(inp);
5933					}
5934					if ((event->se_assoc_id == SCTP_CURRENT_ASSOC) ||
5935					    (event->se_assoc_id == SCTP_ALL_ASSOC)) {
5936						SCTP_INP_RLOCK(inp);
5937						LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
5938							SCTP_TCB_LOCK(stcb);
5939							if (event->se_on) {
5940								sctp_stcb_feature_on(inp, stcb, event_type);
5941							} else {
5942								sctp_stcb_feature_off(inp, stcb, event_type);
5943							}
5944							SCTP_TCB_UNLOCK(stcb);
5945						}
5946						SCTP_INP_RUNLOCK(inp);
5947					}
5948				}
5949			}
5950			break;
5951		}
5952	case SCTP_RECVRCVINFO:
5953		{
5954			int *onoff;
5955
5956			SCTP_CHECK_AND_CAST(onoff, optval, int, optsize);
5957			SCTP_INP_WLOCK(inp);
5958			if (*onoff != 0) {
5959				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
5960			} else {
5961				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVRCVINFO);
5962			}
5963			SCTP_INP_WUNLOCK(inp);
5964			break;
5965		}
5966	case SCTP_RECVNXTINFO:
5967		{
5968			int *onoff;
5969
5970			SCTP_CHECK_AND_CAST(onoff, optval, int, optsize);
5971			SCTP_INP_WLOCK(inp);
5972			if (*onoff != 0) {
5973				sctp_feature_on(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
5974			} else {
5975				sctp_feature_off(inp, SCTP_PCB_FLAGS_RECVNXTINFO);
5976			}
5977			SCTP_INP_WUNLOCK(inp);
5978			break;
5979		}
5980	case SCTP_DEFAULT_SNDINFO:
5981		{
5982			struct sctp_sndinfo *info;
5983			uint16_t policy;
5984
5985			SCTP_CHECK_AND_CAST(info, optval, struct sctp_sndinfo, optsize);
5986			SCTP_FIND_STCB(inp, stcb, info->snd_assoc_id);
5987
5988			if (stcb) {
5989				if (info->snd_sid < stcb->asoc.streamoutcnt) {
5990					stcb->asoc.def_send.sinfo_stream = info->snd_sid;
5991					policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
5992					stcb->asoc.def_send.sinfo_flags = info->snd_flags;
5993					stcb->asoc.def_send.sinfo_flags |= policy;
5994					stcb->asoc.def_send.sinfo_ppid = info->snd_ppid;
5995					stcb->asoc.def_send.sinfo_context = info->snd_context;
5996				} else {
5997					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
5998					error = EINVAL;
5999				}
6000				SCTP_TCB_UNLOCK(stcb);
6001			} else {
6002				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6003				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6004				    (info->snd_assoc_id == SCTP_FUTURE_ASSOC) ||
6005				    (info->snd_assoc_id == SCTP_ALL_ASSOC)) {
6006					SCTP_INP_WLOCK(inp);
6007					inp->def_send.sinfo_stream = info->snd_sid;
6008					policy = PR_SCTP_POLICY(inp->def_send.sinfo_flags);
6009					inp->def_send.sinfo_flags = info->snd_flags;
6010					inp->def_send.sinfo_flags |= policy;
6011					inp->def_send.sinfo_ppid = info->snd_ppid;
6012					inp->def_send.sinfo_context = info->snd_context;
6013					SCTP_INP_WUNLOCK(inp);
6014				}
6015				if ((info->snd_assoc_id == SCTP_CURRENT_ASSOC) ||
6016				    (info->snd_assoc_id == SCTP_ALL_ASSOC)) {
6017					SCTP_INP_RLOCK(inp);
6018					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
6019						SCTP_TCB_LOCK(stcb);
6020						if (info->snd_sid < stcb->asoc.streamoutcnt) {
6021							stcb->asoc.def_send.sinfo_stream = info->snd_sid;
6022							policy = PR_SCTP_POLICY(stcb->asoc.def_send.sinfo_flags);
6023							stcb->asoc.def_send.sinfo_flags = info->snd_flags;
6024							stcb->asoc.def_send.sinfo_flags |= policy;
6025							stcb->asoc.def_send.sinfo_ppid = info->snd_ppid;
6026							stcb->asoc.def_send.sinfo_context = info->snd_context;
6027						}
6028						SCTP_TCB_UNLOCK(stcb);
6029					}
6030					SCTP_INP_RUNLOCK(inp);
6031				}
6032			}
6033			break;
6034		}
6035	case SCTP_DEFAULT_PRINFO:
6036		{
6037			struct sctp_default_prinfo *info;
6038
6039			SCTP_CHECK_AND_CAST(info, optval, struct sctp_default_prinfo, optsize);
6040			SCTP_FIND_STCB(inp, stcb, info->pr_assoc_id);
6041
6042			if (info->pr_policy > SCTP_PR_SCTP_MAX) {
6043				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6044				error = EINVAL;
6045				break;
6046			}
6047			if (stcb) {
6048				stcb->asoc.def_send.sinfo_flags &= 0xfff0;
6049				stcb->asoc.def_send.sinfo_flags |= info->pr_policy;
6050				stcb->asoc.def_send.sinfo_timetolive = info->pr_value;
6051				SCTP_TCB_UNLOCK(stcb);
6052			} else {
6053				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6054				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6055				    (info->pr_assoc_id == SCTP_FUTURE_ASSOC) ||
6056				    (info->pr_assoc_id == SCTP_ALL_ASSOC)) {
6057					SCTP_INP_WLOCK(inp);
6058					inp->def_send.sinfo_flags &= 0xfff0;
6059					inp->def_send.sinfo_flags |= info->pr_policy;
6060					inp->def_send.sinfo_timetolive = info->pr_value;
6061					SCTP_INP_WUNLOCK(inp);
6062				}
6063				if ((info->pr_assoc_id == SCTP_CURRENT_ASSOC) ||
6064				    (info->pr_assoc_id == SCTP_ALL_ASSOC)) {
6065					SCTP_INP_RLOCK(inp);
6066					LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) {
6067						SCTP_TCB_LOCK(stcb);
6068						stcb->asoc.def_send.sinfo_flags &= 0xfff0;
6069						stcb->asoc.def_send.sinfo_flags |= info->pr_policy;
6070						stcb->asoc.def_send.sinfo_timetolive = info->pr_value;
6071						SCTP_TCB_UNLOCK(stcb);
6072					}
6073					SCTP_INP_RUNLOCK(inp);
6074				}
6075			}
6076			break;
6077		}
6078	case SCTP_PEER_ADDR_THLDS:
6079		/* Applies to the specific association */
6080		{
6081			struct sctp_paddrthlds *thlds;
6082			struct sctp_nets *net;
6083			struct sockaddr *addr;
6084
6085#if defined(INET) && defined(INET6)
6086			struct sockaddr_in sin_store;
6087
6088#endif
6089
6090			SCTP_CHECK_AND_CAST(thlds, optval, struct sctp_paddrthlds, optsize);
6091			SCTP_FIND_STCB(inp, stcb, thlds->spt_assoc_id);
6092
6093#if defined(INET) && defined(INET6)
6094			if (thlds->spt_address.ss_family == AF_INET6) {
6095				struct sockaddr_in6 *sin6;
6096
6097				sin6 = (struct sockaddr_in6 *)&thlds->spt_address;
6098				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
6099					in6_sin6_2_sin(&sin_store, sin6);
6100					addr = (struct sockaddr *)&sin_store;
6101				} else {
6102					addr = (struct sockaddr *)&thlds->spt_address;
6103				}
6104			} else {
6105				addr = (struct sockaddr *)&thlds->spt_address;
6106			}
6107#else
6108			addr = (struct sockaddr *)&thlds->spt_address;
6109#endif
6110			if (stcb != NULL) {
6111				net = sctp_findnet(stcb, addr);
6112			} else {
6113				/*
6114				 * We increment here since
6115				 * sctp_findassociation_ep_addr() wil do a
6116				 * decrement if it finds the stcb as long as
6117				 * the locked tcb (last argument) is NOT a
6118				 * TCB.. aka NULL.
6119				 */
6120				net = NULL;
6121				SCTP_INP_INCR_REF(inp);
6122				stcb = sctp_findassociation_ep_addr(&inp, addr,
6123				    &net, NULL, NULL);
6124				if (stcb == NULL) {
6125					SCTP_INP_DECR_REF(inp);
6126				}
6127			}
6128			if ((stcb != NULL) && (net == NULL)) {
6129#ifdef INET
6130				if (addr->sa_family == AF_INET) {
6131
6132					struct sockaddr_in *sin;
6133
6134					sin = (struct sockaddr_in *)addr;
6135					if (sin->sin_addr.s_addr != INADDR_ANY) {
6136						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6137						SCTP_TCB_UNLOCK(stcb);
6138						error = EINVAL;
6139						break;
6140					}
6141				} else
6142#endif
6143#ifdef INET6
6144				if (addr->sa_family == AF_INET6) {
6145					struct sockaddr_in6 *sin6;
6146
6147					sin6 = (struct sockaddr_in6 *)addr;
6148					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
6149						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6150						SCTP_TCB_UNLOCK(stcb);
6151						error = EINVAL;
6152						break;
6153					}
6154				} else
6155#endif
6156				{
6157					error = EAFNOSUPPORT;
6158					SCTP_TCB_UNLOCK(stcb);
6159					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6160					break;
6161				}
6162			}
6163			if (stcb != NULL) {
6164				if (net != NULL) {
6165					if (net->dest_state & SCTP_ADDR_PF) {
6166						if ((net->failure_threshold > thlds->spt_pathmaxrxt) ||
6167						    (net->failure_threshold <= thlds->spt_pathpfthld)) {
6168							net->dest_state &= ~SCTP_ADDR_PF;
6169						}
6170					} else {
6171						if ((net->failure_threshold > thlds->spt_pathpfthld) &&
6172						    (net->failure_threshold <= thlds->spt_pathmaxrxt)) {
6173							net->dest_state |= SCTP_ADDR_PF;
6174							sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
6175							sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
6176							sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
6177						}
6178					}
6179					if (net->dest_state & SCTP_ADDR_REACHABLE) {
6180						if (net->failure_threshold > thlds->spt_pathmaxrxt) {
6181							net->dest_state &= ~SCTP_ADDR_REACHABLE;
6182							sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
6183						}
6184					} else {
6185						if (net->failure_threshold <= thlds->spt_pathmaxrxt) {
6186							net->dest_state |= SCTP_ADDR_REACHABLE;
6187							sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
6188						}
6189					}
6190					net->failure_threshold = thlds->spt_pathmaxrxt;
6191					net->pf_threshold = thlds->spt_pathpfthld;
6192				} else {
6193					TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
6194						if (net->dest_state & SCTP_ADDR_PF) {
6195							if ((net->failure_threshold > thlds->spt_pathmaxrxt) ||
6196							    (net->failure_threshold <= thlds->spt_pathpfthld)) {
6197								net->dest_state &= ~SCTP_ADDR_PF;
6198							}
6199						} else {
6200							if ((net->failure_threshold > thlds->spt_pathpfthld) &&
6201							    (net->failure_threshold <= thlds->spt_pathmaxrxt)) {
6202								net->dest_state |= SCTP_ADDR_PF;
6203								sctp_send_hb(stcb, net, SCTP_SO_LOCKED);
6204								sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net, SCTP_FROM_SCTP_TIMER + SCTP_LOC_3);
6205								sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep, stcb, net);
6206							}
6207						}
6208						if (net->dest_state & SCTP_ADDR_REACHABLE) {
6209							if (net->failure_threshold > thlds->spt_pathmaxrxt) {
6210								net->dest_state &= ~SCTP_ADDR_REACHABLE;
6211								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_DOWN, stcb, 0, net, SCTP_SO_LOCKED);
6212							}
6213						} else {
6214							if (net->failure_threshold <= thlds->spt_pathmaxrxt) {
6215								net->dest_state |= SCTP_ADDR_REACHABLE;
6216								sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb, 0, net, SCTP_SO_LOCKED);
6217							}
6218						}
6219						net->failure_threshold = thlds->spt_pathmaxrxt;
6220						net->pf_threshold = thlds->spt_pathpfthld;
6221					}
6222					stcb->asoc.def_net_failure = thlds->spt_pathmaxrxt;
6223					stcb->asoc.def_net_pf_threshold = thlds->spt_pathpfthld;
6224				}
6225			} else {
6226				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6227				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6228				    (thlds->spt_assoc_id == SCTP_FUTURE_ASSOC)) {
6229					SCTP_INP_WLOCK(inp);
6230					inp->sctp_ep.def_net_failure = thlds->spt_pathmaxrxt;
6231					inp->sctp_ep.def_net_pf_threshold = thlds->spt_pathpfthld;
6232					SCTP_INP_WUNLOCK(inp);
6233				} else {
6234					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6235					error = EINVAL;
6236				}
6237			}
6238			break;
6239		}
6240	case SCTP_REMOTE_UDP_ENCAPS_PORT:
6241		{
6242			struct sctp_udpencaps *encaps;
6243			struct sctp_nets *net;
6244			struct sockaddr *addr;
6245
6246#if defined(INET) && defined(INET6)
6247			struct sockaddr_in sin_store;
6248
6249#endif
6250
6251			SCTP_CHECK_AND_CAST(encaps, optval, struct sctp_udpencaps, optsize);
6252			SCTP_FIND_STCB(inp, stcb, encaps->sue_assoc_id);
6253
6254#if defined(INET) && defined(INET6)
6255			if (encaps->sue_address.ss_family == AF_INET6) {
6256				struct sockaddr_in6 *sin6;
6257
6258				sin6 = (struct sockaddr_in6 *)&encaps->sue_address;
6259				if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
6260					in6_sin6_2_sin(&sin_store, sin6);
6261					addr = (struct sockaddr *)&sin_store;
6262				} else {
6263					addr = (struct sockaddr *)&encaps->sue_address;
6264				}
6265			} else {
6266				addr = (struct sockaddr *)&encaps->sue_address;
6267			}
6268#else
6269			addr = (struct sockaddr *)&encaps->sue_address;
6270#endif
6271			if (stcb != NULL) {
6272				net = sctp_findnet(stcb, addr);
6273			} else {
6274				/*
6275				 * We increment here since
6276				 * sctp_findassociation_ep_addr() wil do a
6277				 * decrement if it finds the stcb as long as
6278				 * the locked tcb (last argument) is NOT a
6279				 * TCB.. aka NULL.
6280				 */
6281				net = NULL;
6282				SCTP_INP_INCR_REF(inp);
6283				stcb = sctp_findassociation_ep_addr(&inp, addr, &net, NULL, NULL);
6284				if (stcb == NULL) {
6285					SCTP_INP_DECR_REF(inp);
6286				}
6287			}
6288			if ((stcb != NULL) && (net == NULL)) {
6289#ifdef INET
6290				if (addr->sa_family == AF_INET) {
6291
6292					struct sockaddr_in *sin;
6293
6294					sin = (struct sockaddr_in *)addr;
6295					if (sin->sin_addr.s_addr != INADDR_ANY) {
6296						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6297						SCTP_TCB_UNLOCK(stcb);
6298						error = EINVAL;
6299						break;
6300					}
6301				} else
6302#endif
6303#ifdef INET6
6304				if (addr->sa_family == AF_INET6) {
6305					struct sockaddr_in6 *sin6;
6306
6307					sin6 = (struct sockaddr_in6 *)addr;
6308					if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
6309						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6310						SCTP_TCB_UNLOCK(stcb);
6311						error = EINVAL;
6312						break;
6313					}
6314				} else
6315#endif
6316				{
6317					error = EAFNOSUPPORT;
6318					SCTP_TCB_UNLOCK(stcb);
6319					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6320					break;
6321				}
6322			}
6323			if (stcb != NULL) {
6324				if (net != NULL) {
6325					net->port = encaps->sue_port;
6326				} else {
6327					stcb->asoc.port = encaps->sue_port;
6328				}
6329				SCTP_TCB_UNLOCK(stcb);
6330			} else {
6331				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6332				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6333				    (encaps->sue_assoc_id == SCTP_FUTURE_ASSOC)) {
6334					SCTP_INP_WLOCK(inp);
6335					inp->sctp_ep.port = encaps->sue_port;
6336					SCTP_INP_WUNLOCK(inp);
6337				} else {
6338					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6339					error = EINVAL;
6340				}
6341			}
6342			break;
6343		}
6344	case SCTP_ECN_SUPPORTED:
6345		{
6346			struct sctp_assoc_value *av;
6347
6348			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6349			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6350
6351			if (stcb) {
6352				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6353				error = EINVAL;
6354				SCTP_TCB_UNLOCK(stcb);
6355			} else {
6356				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6357				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6358				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6359					SCTP_INP_WLOCK(inp);
6360					if (av->assoc_value == 0) {
6361						inp->ecn_supported = 0;
6362					} else {
6363						inp->ecn_supported = 1;
6364					}
6365					SCTP_INP_WUNLOCK(inp);
6366				} else {
6367					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6368					error = EINVAL;
6369				}
6370			}
6371			break;
6372		}
6373	case SCTP_PR_SUPPORTED:
6374		{
6375			struct sctp_assoc_value *av;
6376
6377			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6378			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6379
6380			if (stcb) {
6381				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6382				error = EINVAL;
6383				SCTP_TCB_UNLOCK(stcb);
6384			} else {
6385				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6386				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6387				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6388					SCTP_INP_WLOCK(inp);
6389					if (av->assoc_value == 0) {
6390						inp->prsctp_supported = 0;
6391					} else {
6392						inp->prsctp_supported = 1;
6393					}
6394					SCTP_INP_WUNLOCK(inp);
6395				} else {
6396					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6397					error = EINVAL;
6398				}
6399			}
6400			break;
6401		}
6402	case SCTP_AUTH_SUPPORTED:
6403		{
6404			struct sctp_assoc_value *av;
6405
6406			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6407			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6408
6409			if (stcb) {
6410				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6411				error = EINVAL;
6412				SCTP_TCB_UNLOCK(stcb);
6413			} else {
6414				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6415				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6416				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6417					if ((av->assoc_value == 0) &&
6418					    (inp->asconf_supported == 1)) {
6419						/*
6420						 * AUTH is required for
6421						 * ASCONF
6422						 */
6423						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6424						error = EINVAL;
6425					} else {
6426						SCTP_INP_WLOCK(inp);
6427						if (av->assoc_value == 0) {
6428							inp->auth_supported = 0;
6429						} else {
6430							inp->auth_supported = 1;
6431						}
6432						SCTP_INP_WUNLOCK(inp);
6433					}
6434				} else {
6435					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6436					error = EINVAL;
6437				}
6438			}
6439			break;
6440		}
6441	case SCTP_ASCONF_SUPPORTED:
6442		{
6443			struct sctp_assoc_value *av;
6444
6445			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6446			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6447
6448			if (stcb) {
6449				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6450				error = EINVAL;
6451				SCTP_TCB_UNLOCK(stcb);
6452			} else {
6453				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6454				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6455				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6456					if ((av->assoc_value != 0) &&
6457					    (inp->auth_supported == 0)) {
6458						/*
6459						 * AUTH is required for
6460						 * ASCONF
6461						 */
6462						SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6463						error = EINVAL;
6464					} else {
6465						SCTP_INP_WLOCK(inp);
6466						if (av->assoc_value == 0) {
6467							inp->asconf_supported = 0;
6468							sctp_auth_delete_chunk(SCTP_ASCONF,
6469							    inp->sctp_ep.local_auth_chunks);
6470							sctp_auth_delete_chunk(SCTP_ASCONF_ACK,
6471							    inp->sctp_ep.local_auth_chunks);
6472						} else {
6473							inp->asconf_supported = 1;
6474							sctp_auth_add_chunk(SCTP_ASCONF,
6475							    inp->sctp_ep.local_auth_chunks);
6476							sctp_auth_add_chunk(SCTP_ASCONF_ACK,
6477							    inp->sctp_ep.local_auth_chunks);
6478						}
6479						SCTP_INP_WUNLOCK(inp);
6480					}
6481				} else {
6482					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6483					error = EINVAL;
6484				}
6485			}
6486			break;
6487		}
6488	case SCTP_RECONFIG_SUPPORTED:
6489		{
6490			struct sctp_assoc_value *av;
6491
6492			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6493			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6494
6495			if (stcb) {
6496				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6497				error = EINVAL;
6498				SCTP_TCB_UNLOCK(stcb);
6499			} else {
6500				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6501				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6502				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6503					SCTP_INP_WLOCK(inp);
6504					if (av->assoc_value == 0) {
6505						inp->reconfig_supported = 0;
6506					} else {
6507						inp->reconfig_supported = 1;
6508					}
6509					SCTP_INP_WUNLOCK(inp);
6510				} else {
6511					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6512					error = EINVAL;
6513				}
6514			}
6515			break;
6516		}
6517	case SCTP_NRSACK_SUPPORTED:
6518		{
6519			struct sctp_assoc_value *av;
6520
6521			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6522			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6523
6524			if (stcb) {
6525				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6526				error = EINVAL;
6527				SCTP_TCB_UNLOCK(stcb);
6528			} else {
6529				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6530				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6531				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6532					SCTP_INP_WLOCK(inp);
6533					if (av->assoc_value == 0) {
6534						inp->nrsack_supported = 0;
6535					} else {
6536						inp->nrsack_supported = 1;
6537					}
6538					SCTP_INP_WUNLOCK(inp);
6539				} else {
6540					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6541					error = EINVAL;
6542				}
6543			}
6544			break;
6545		}
6546	case SCTP_PKTDROP_SUPPORTED:
6547		{
6548			struct sctp_assoc_value *av;
6549
6550			SCTP_CHECK_AND_CAST(av, optval, struct sctp_assoc_value, optsize);
6551			SCTP_FIND_STCB(inp, stcb, av->assoc_id);
6552
6553			if (stcb) {
6554				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6555				error = EINVAL;
6556				SCTP_TCB_UNLOCK(stcb);
6557			} else {
6558				if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
6559				    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) ||
6560				    (av->assoc_id == SCTP_FUTURE_ASSOC)) {
6561					SCTP_INP_WLOCK(inp);
6562					if (av->assoc_value == 0) {
6563						inp->pktdrop_supported = 0;
6564					} else {
6565						inp->pktdrop_supported = 1;
6566					}
6567					SCTP_INP_WUNLOCK(inp);
6568				} else {
6569					SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6570					error = EINVAL;
6571				}
6572			}
6573			break;
6574		}
6575	default:
6576		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOPROTOOPT);
6577		error = ENOPROTOOPT;
6578		break;
6579	}			/* end switch (opt) */
6580	return (error);
6581}
6582
6583int
6584sctp_ctloutput(struct socket *so, struct sockopt *sopt)
6585{
6586	void *optval = NULL;
6587	size_t optsize = 0;
6588	void *p;
6589	int error = 0;
6590
6591	if (sopt->sopt_level != IPPROTO_SCTP) {
6592		/* wrong proto level... send back up to IP */
6593#ifdef INET6
6594		if (INP_CHECK_SOCKAF(so, AF_INET6))
6595			error = ip6_ctloutput(so, sopt);
6596#endif				/* INET6 */
6597#if defined(INET) && defined(INET6)
6598		else
6599#endif
6600#ifdef INET
6601			error = ip_ctloutput(so, sopt);
6602#endif
6603		return (error);
6604	}
6605	optsize = sopt->sopt_valsize;
6606	if (optsize) {
6607		SCTP_MALLOC(optval, void *, optsize, SCTP_M_SOCKOPT);
6608		if (optval == NULL) {
6609			SCTP_LTRACE_ERR_RET(so->so_pcb, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOBUFS);
6610			return (ENOBUFS);
6611		}
6612		error = sooptcopyin(sopt, optval, optsize, optsize);
6613		if (error) {
6614			SCTP_FREE(optval, SCTP_M_SOCKOPT);
6615			goto out;
6616		}
6617	}
6618	p = (void *)sopt->sopt_td;
6619	if (sopt->sopt_dir == SOPT_SET) {
6620		error = sctp_setopt(so, sopt->sopt_name, optval, optsize, p);
6621	} else if (sopt->sopt_dir == SOPT_GET) {
6622		error = sctp_getopt(so, sopt->sopt_name, optval, &optsize, p);
6623	} else {
6624		SCTP_LTRACE_ERR_RET(so->so_pcb, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6625		error = EINVAL;
6626	}
6627	if ((error == 0) && (optval != NULL)) {
6628		error = sooptcopyout(sopt, optval, optsize);
6629		SCTP_FREE(optval, SCTP_M_SOCKOPT);
6630	} else if (optval != NULL) {
6631		SCTP_FREE(optval, SCTP_M_SOCKOPT);
6632	}
6633out:
6634	return (error);
6635}
6636
6637#ifdef INET
6638static int
6639sctp_connect(struct socket *so, struct sockaddr *addr, struct thread *p)
6640{
6641	int error = 0;
6642	int create_lock_on = 0;
6643	uint32_t vrf_id;
6644	struct sctp_inpcb *inp;
6645	struct sctp_tcb *stcb = NULL;
6646
6647	inp = (struct sctp_inpcb *)so->so_pcb;
6648	if (inp == NULL) {
6649		/* I made the same as TCP since we are not setup? */
6650		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6651		return (ECONNRESET);
6652	}
6653	if (addr == NULL) {
6654		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6655		return EINVAL;
6656	}
6657	switch (addr->sa_family) {
6658#ifdef INET6
6659	case AF_INET6:
6660		{
6661			struct sockaddr_in6 *sin6p;
6662
6663			if (addr->sa_len != sizeof(struct sockaddr_in6)) {
6664				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6665				return (EINVAL);
6666			}
6667			sin6p = (struct sockaddr_in6 *)addr;
6668			if (p != NULL && (error = prison_remote_ip6(p->td_ucred, &sin6p->sin6_addr)) != 0) {
6669				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6670				return (error);
6671			}
6672			break;
6673		}
6674#endif
6675#ifdef INET
6676	case AF_INET:
6677		{
6678			struct sockaddr_in *sinp;
6679
6680			if (addr->sa_len != sizeof(struct sockaddr_in)) {
6681				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6682				return (EINVAL);
6683			}
6684			sinp = (struct sockaddr_in *)addr;
6685			if (p != NULL && (error = prison_remote_ip4(p->td_ucred, &sinp->sin_addr)) != 0) {
6686				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, error);
6687				return (error);
6688			}
6689			break;
6690		}
6691#endif
6692	default:
6693		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EAFNOSUPPORT);
6694		return (EAFNOSUPPORT);
6695	}
6696	SCTP_INP_INCR_REF(inp);
6697	SCTP_ASOC_CREATE_LOCK(inp);
6698	create_lock_on = 1;
6699
6700
6701	if ((inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) ||
6702	    (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE)) {
6703		/* Should I really unlock ? */
6704		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EFAULT);
6705		error = EFAULT;
6706		goto out_now;
6707	}
6708#ifdef INET6
6709	if (((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) &&
6710	    (addr->sa_family == AF_INET6)) {
6711		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6712		error = EINVAL;
6713		goto out_now;
6714	}
6715#endif
6716	if ((inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) ==
6717	    SCTP_PCB_FLAGS_UNBOUND) {
6718		/* Bind a ephemeral port */
6719		error = sctp_inpcb_bind(so, NULL, NULL, p);
6720		if (error) {
6721			goto out_now;
6722		}
6723	}
6724	/* Now do we connect? */
6725	if ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) &&
6726	    (sctp_is_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE))) {
6727		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6728		error = EINVAL;
6729		goto out_now;
6730	}
6731	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
6732	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
6733		/* We are already connected AND the TCP model */
6734		SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
6735		error = EADDRINUSE;
6736		goto out_now;
6737	}
6738	if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
6739		SCTP_INP_RLOCK(inp);
6740		stcb = LIST_FIRST(&inp->sctp_asoc_list);
6741		SCTP_INP_RUNLOCK(inp);
6742	} else {
6743		/*
6744		 * We increment here since sctp_findassociation_ep_addr()
6745		 * will do a decrement if it finds the stcb as long as the
6746		 * locked tcb (last argument) is NOT a TCB.. aka NULL.
6747		 */
6748		SCTP_INP_INCR_REF(inp);
6749		stcb = sctp_findassociation_ep_addr(&inp, addr, NULL, NULL, NULL);
6750		if (stcb == NULL) {
6751			SCTP_INP_DECR_REF(inp);
6752		} else {
6753			SCTP_TCB_UNLOCK(stcb);
6754		}
6755	}
6756	if (stcb != NULL) {
6757		/* Already have or am bring up an association */
6758		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EALREADY);
6759		error = EALREADY;
6760		goto out_now;
6761	}
6762	vrf_id = inp->def_vrf_id;
6763	/* We are GOOD to go */
6764	stcb = sctp_aloc_assoc(inp, addr, &error, 0, vrf_id, p);
6765	if (stcb == NULL) {
6766		/* Gak! no memory */
6767		goto out_now;
6768	}
6769	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
6770		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
6771		/* Set the connected flag so we can queue data */
6772		soisconnecting(so);
6773	}
6774	SCTP_SET_STATE(&stcb->asoc, SCTP_STATE_COOKIE_WAIT);
6775	(void)SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
6776
6777	/* initialize authentication parameters for the assoc */
6778	sctp_initialize_auth_params(inp, stcb);
6779
6780	sctp_send_initiate(inp, stcb, SCTP_SO_LOCKED);
6781	SCTP_TCB_UNLOCK(stcb);
6782out_now:
6783	if (create_lock_on) {
6784		SCTP_ASOC_CREATE_UNLOCK(inp);
6785	}
6786	SCTP_INP_DECR_REF(inp);
6787	return (error);
6788}
6789
6790#endif
6791
6792int
6793sctp_listen(struct socket *so, int backlog, struct thread *p)
6794{
6795	/*
6796	 * Note this module depends on the protocol processing being called
6797	 * AFTER any socket level flags and backlog are applied to the
6798	 * socket. The traditional way that the socket flags are applied is
6799	 * AFTER protocol processing. We have made a change to the
6800	 * sys/kern/uipc_socket.c module to reverse this but this MUST be in
6801	 * place if the socket API for SCTP is to work properly.
6802	 */
6803
6804	int error = 0;
6805	struct sctp_inpcb *inp;
6806
6807	inp = (struct sctp_inpcb *)so->so_pcb;
6808	if (inp == NULL) {
6809		/* I made the same as TCP since we are not setup? */
6810		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6811		return (ECONNRESET);
6812	}
6813	if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE)) {
6814		/* See if we have a listener */
6815		struct sctp_inpcb *tinp;
6816		union sctp_sockstore store;
6817
6818		if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
6819			/* not bound all */
6820			struct sctp_laddr *laddr;
6821
6822			LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
6823				memcpy(&store, &laddr->ifa->address, sizeof(store));
6824				switch (store.sa.sa_family) {
6825#ifdef INET
6826				case AF_INET:
6827					store.sin.sin_port = inp->sctp_lport;
6828					break;
6829#endif
6830#ifdef INET6
6831				case AF_INET6:
6832					store.sin6.sin6_port = inp->sctp_lport;
6833					break;
6834#endif
6835				default:
6836					break;
6837				}
6838				tinp = sctp_pcb_findep(&store.sa, 0, 0, inp->def_vrf_id);
6839				if (tinp && (tinp != inp) &&
6840				    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) == 0) &&
6841				    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
6842				    (tinp->sctp_socket->so_qlimit)) {
6843					/*
6844					 * we have a listener already and
6845					 * its not this inp.
6846					 */
6847					SCTP_INP_DECR_REF(tinp);
6848					return (EADDRINUSE);
6849				} else if (tinp) {
6850					SCTP_INP_DECR_REF(tinp);
6851				}
6852			}
6853		} else {
6854			/* Setup a local addr bound all */
6855			memset(&store, 0, sizeof(store));
6856#ifdef INET6
6857			if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
6858				store.sa.sa_family = AF_INET6;
6859				store.sa.sa_len = sizeof(struct sockaddr_in6);
6860			}
6861#endif
6862#ifdef INET
6863			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
6864				store.sa.sa_family = AF_INET;
6865				store.sa.sa_len = sizeof(struct sockaddr_in);
6866			}
6867#endif
6868			switch (store.sa.sa_family) {
6869#ifdef INET
6870			case AF_INET:
6871				store.sin.sin_port = inp->sctp_lport;
6872				break;
6873#endif
6874#ifdef INET6
6875			case AF_INET6:
6876				store.sin6.sin6_port = inp->sctp_lport;
6877				break;
6878#endif
6879			default:
6880				break;
6881			}
6882			tinp = sctp_pcb_findep(&store.sa, 0, 0, inp->def_vrf_id);
6883			if (tinp && (tinp != inp) &&
6884			    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_ALLGONE) == 0) &&
6885			    ((tinp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) == 0) &&
6886			    (tinp->sctp_socket->so_qlimit)) {
6887				/*
6888				 * we have a listener already and its not
6889				 * this inp.
6890				 */
6891				SCTP_INP_DECR_REF(tinp);
6892				return (EADDRINUSE);
6893			} else if (tinp) {
6894				SCTP_INP_DECR_REF(inp);
6895			}
6896		}
6897	}
6898	SCTP_INP_RLOCK(inp);
6899#ifdef SCTP_LOCK_LOGGING
6900	if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_LOCK_LOGGING_ENABLE) {
6901		sctp_log_lock(inp, (struct sctp_tcb *)NULL, SCTP_LOG_LOCK_SOCK);
6902	}
6903#endif
6904	SOCK_LOCK(so);
6905	error = solisten_proto_check(so);
6906	if (error) {
6907		SOCK_UNLOCK(so);
6908		SCTP_INP_RUNLOCK(inp);
6909		return (error);
6910	}
6911	if ((sctp_is_feature_on(inp, SCTP_PCB_FLAGS_PORTREUSE)) &&
6912	    (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
6913		/*
6914		 * The unlucky case - We are in the tcp pool with this guy.
6915		 * - Someone else is in the main inp slot. - We must move
6916		 * this guy (the listener) to the main slot - We must then
6917		 * move the guy that was listener to the TCP Pool.
6918		 */
6919		if (sctp_swap_inpcb_for_listen(inp)) {
6920			goto in_use;
6921		}
6922	}
6923	if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
6924	    (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
6925		/* We are already connected AND the TCP model */
6926in_use:
6927		SCTP_INP_RUNLOCK(inp);
6928		SOCK_UNLOCK(so);
6929		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
6930		return (EADDRINUSE);
6931	}
6932	SCTP_INP_RUNLOCK(inp);
6933	if (inp->sctp_flags & SCTP_PCB_FLAGS_UNBOUND) {
6934		/* We must do a bind. */
6935		SOCK_UNLOCK(so);
6936		if ((error = sctp_inpcb_bind(so, NULL, NULL, p))) {
6937			/* bind error, probably perm */
6938			return (error);
6939		}
6940		SOCK_LOCK(so);
6941	}
6942	/* It appears for 7.0 and on, we must always call this. */
6943	solisten_proto(so, backlog);
6944	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
6945		/* remove the ACCEPTCONN flag for one-to-many sockets */
6946		so->so_options &= ~SO_ACCEPTCONN;
6947	}
6948	if (backlog == 0) {
6949		/* turning off listen */
6950		so->so_options &= ~SO_ACCEPTCONN;
6951	}
6952	SOCK_UNLOCK(so);
6953	return (error);
6954}
6955
6956static int sctp_defered_wakeup_cnt = 0;
6957
6958int
6959sctp_accept(struct socket *so, struct sockaddr **addr)
6960{
6961	struct sctp_tcb *stcb;
6962	struct sctp_inpcb *inp;
6963	union sctp_sockstore store;
6964
6965#ifdef INET6
6966	int error;
6967
6968#endif
6969	inp = (struct sctp_inpcb *)so->so_pcb;
6970
6971	if (inp == NULL) {
6972		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6973		return (ECONNRESET);
6974	}
6975	SCTP_INP_RLOCK(inp);
6976	if (inp->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE) {
6977		SCTP_INP_RUNLOCK(inp);
6978		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EOPNOTSUPP);
6979		return (EOPNOTSUPP);
6980	}
6981	if (so->so_state & SS_ISDISCONNECTED) {
6982		SCTP_INP_RUNLOCK(inp);
6983		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ECONNABORTED);
6984		return (ECONNABORTED);
6985	}
6986	stcb = LIST_FIRST(&inp->sctp_asoc_list);
6987	if (stcb == NULL) {
6988		SCTP_INP_RUNLOCK(inp);
6989		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
6990		return (ECONNRESET);
6991	}
6992	SCTP_TCB_LOCK(stcb);
6993	SCTP_INP_RUNLOCK(inp);
6994	store = stcb->asoc.primary_destination->ro._l_addr;
6995	stcb->asoc.state &= ~SCTP_STATE_IN_ACCEPT_QUEUE;
6996	SCTP_TCB_UNLOCK(stcb);
6997	switch (store.sa.sa_family) {
6998#ifdef INET
6999	case AF_INET:
7000		{
7001			struct sockaddr_in *sin;
7002
7003			SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7004			if (sin == NULL)
7005				return (ENOMEM);
7006			sin->sin_family = AF_INET;
7007			sin->sin_len = sizeof(*sin);
7008			sin->sin_port = store.sin.sin_port;
7009			sin->sin_addr = store.sin.sin_addr;
7010			*addr = (struct sockaddr *)sin;
7011			break;
7012		}
7013#endif
7014#ifdef INET6
7015	case AF_INET6:
7016		{
7017			struct sockaddr_in6 *sin6;
7018
7019			SCTP_MALLOC_SONAME(sin6, struct sockaddr_in6 *, sizeof *sin6);
7020			if (sin6 == NULL)
7021				return (ENOMEM);
7022			sin6->sin6_family = AF_INET6;
7023			sin6->sin6_len = sizeof(*sin6);
7024			sin6->sin6_port = store.sin6.sin6_port;
7025			sin6->sin6_addr = store.sin6.sin6_addr;
7026			if ((error = sa6_recoverscope(sin6)) != 0) {
7027				SCTP_FREE_SONAME(sin6);
7028				return (error);
7029			}
7030			*addr = (struct sockaddr *)sin6;
7031			break;
7032		}
7033#endif
7034	default:
7035		/* TSNH */
7036		break;
7037	}
7038	/* Wake any delayed sleep action */
7039	if (inp->sctp_flags & SCTP_PCB_FLAGS_DONT_WAKE) {
7040		SCTP_INP_WLOCK(inp);
7041		inp->sctp_flags &= ~SCTP_PCB_FLAGS_DONT_WAKE;
7042		if (inp->sctp_flags & SCTP_PCB_FLAGS_WAKEOUTPUT) {
7043			inp->sctp_flags &= ~SCTP_PCB_FLAGS_WAKEOUTPUT;
7044			SCTP_INP_WUNLOCK(inp);
7045			SOCKBUF_LOCK(&inp->sctp_socket->so_snd);
7046			if (sowriteable(inp->sctp_socket)) {
7047				sowwakeup_locked(inp->sctp_socket);
7048			} else {
7049				SOCKBUF_UNLOCK(&inp->sctp_socket->so_snd);
7050			}
7051			SCTP_INP_WLOCK(inp);
7052		}
7053		if (inp->sctp_flags & SCTP_PCB_FLAGS_WAKEINPUT) {
7054			inp->sctp_flags &= ~SCTP_PCB_FLAGS_WAKEINPUT;
7055			SCTP_INP_WUNLOCK(inp);
7056			SOCKBUF_LOCK(&inp->sctp_socket->so_rcv);
7057			if (soreadable(inp->sctp_socket)) {
7058				sctp_defered_wakeup_cnt++;
7059				sorwakeup_locked(inp->sctp_socket);
7060			} else {
7061				SOCKBUF_UNLOCK(&inp->sctp_socket->so_rcv);
7062			}
7063			SCTP_INP_WLOCK(inp);
7064		}
7065		SCTP_INP_WUNLOCK(inp);
7066	}
7067	if (stcb->asoc.state & SCTP_STATE_ABOUT_TO_BE_FREED) {
7068		SCTP_TCB_LOCK(stcb);
7069		sctp_free_assoc(inp, stcb, SCTP_NORMAL_PROC, SCTP_FROM_SCTP_USRREQ + SCTP_LOC_7);
7070	}
7071	return (0);
7072}
7073
7074#ifdef INET
7075int
7076sctp_ingetaddr(struct socket *so, struct sockaddr **addr)
7077{
7078	struct sockaddr_in *sin;
7079	uint32_t vrf_id;
7080	struct sctp_inpcb *inp;
7081	struct sctp_ifa *sctp_ifa;
7082
7083	/*
7084	 * Do the malloc first in case it blocks.
7085	 */
7086	SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7087	if (sin == NULL)
7088		return (ENOMEM);
7089	sin->sin_family = AF_INET;
7090	sin->sin_len = sizeof(*sin);
7091	inp = (struct sctp_inpcb *)so->so_pcb;
7092	if (!inp) {
7093		SCTP_FREE_SONAME(sin);
7094		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
7095		return (ECONNRESET);
7096	}
7097	SCTP_INP_RLOCK(inp);
7098	sin->sin_port = inp->sctp_lport;
7099	if (inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
7100		if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
7101			struct sctp_tcb *stcb;
7102			struct sockaddr_in *sin_a;
7103			struct sctp_nets *net;
7104			int fnd;
7105
7106			stcb = LIST_FIRST(&inp->sctp_asoc_list);
7107			if (stcb == NULL) {
7108				goto notConn;
7109			}
7110			fnd = 0;
7111			sin_a = NULL;
7112			SCTP_TCB_LOCK(stcb);
7113			TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
7114				sin_a = (struct sockaddr_in *)&net->ro._l_addr;
7115				if (sin_a == NULL)
7116					/* this will make coverity happy */
7117					continue;
7118
7119				if (sin_a->sin_family == AF_INET) {
7120					fnd = 1;
7121					break;
7122				}
7123			}
7124			if ((!fnd) || (sin_a == NULL)) {
7125				/* punt */
7126				SCTP_TCB_UNLOCK(stcb);
7127				goto notConn;
7128			}
7129			vrf_id = inp->def_vrf_id;
7130			sctp_ifa = sctp_source_address_selection(inp,
7131			    stcb,
7132			    (sctp_route_t *) & net->ro,
7133			    net, 0, vrf_id);
7134			if (sctp_ifa) {
7135				sin->sin_addr = sctp_ifa->address.sin.sin_addr;
7136				sctp_free_ifa(sctp_ifa);
7137			}
7138			SCTP_TCB_UNLOCK(stcb);
7139		} else {
7140			/* For the bound all case you get back 0 */
7141	notConn:
7142			sin->sin_addr.s_addr = 0;
7143		}
7144
7145	} else {
7146		/* Take the first IPv4 address in the list */
7147		struct sctp_laddr *laddr;
7148		int fnd = 0;
7149
7150		LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
7151			if (laddr->ifa->address.sa.sa_family == AF_INET) {
7152				struct sockaddr_in *sin_a;
7153
7154				sin_a = &laddr->ifa->address.sin;
7155				sin->sin_addr = sin_a->sin_addr;
7156				fnd = 1;
7157				break;
7158			}
7159		}
7160		if (!fnd) {
7161			SCTP_FREE_SONAME(sin);
7162			SCTP_INP_RUNLOCK(inp);
7163			SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
7164			return (ENOENT);
7165		}
7166	}
7167	SCTP_INP_RUNLOCK(inp);
7168	(*addr) = (struct sockaddr *)sin;
7169	return (0);
7170}
7171
7172int
7173sctp_peeraddr(struct socket *so, struct sockaddr **addr)
7174{
7175	struct sockaddr_in *sin;
7176	int fnd;
7177	struct sockaddr_in *sin_a;
7178	struct sctp_inpcb *inp;
7179	struct sctp_tcb *stcb;
7180	struct sctp_nets *net;
7181
7182	/* Do the malloc first in case it blocks. */
7183	SCTP_MALLOC_SONAME(sin, struct sockaddr_in *, sizeof *sin);
7184	if (sin == NULL)
7185		return (ENOMEM);
7186	sin->sin_family = AF_INET;
7187	sin->sin_len = sizeof(*sin);
7188
7189	inp = (struct sctp_inpcb *)so->so_pcb;
7190	if ((inp == NULL) ||
7191	    ((inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) == 0)) {
7192		/* UDP type and listeners will drop out here */
7193		SCTP_FREE_SONAME(sin);
7194		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOTCONN);
7195		return (ENOTCONN);
7196	}
7197	SCTP_INP_RLOCK(inp);
7198	stcb = LIST_FIRST(&inp->sctp_asoc_list);
7199	if (stcb) {
7200		SCTP_TCB_LOCK(stcb);
7201	}
7202	SCTP_INP_RUNLOCK(inp);
7203	if (stcb == NULL) {
7204		SCTP_FREE_SONAME(sin);
7205		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
7206		return (ECONNRESET);
7207	}
7208	fnd = 0;
7209	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
7210		sin_a = (struct sockaddr_in *)&net->ro._l_addr;
7211		if (sin_a->sin_family == AF_INET) {
7212			fnd = 1;
7213			sin->sin_port = stcb->rport;
7214			sin->sin_addr = sin_a->sin_addr;
7215			break;
7216		}
7217	}
7218	SCTP_TCB_UNLOCK(stcb);
7219	if (!fnd) {
7220		/* No IPv4 address */
7221		SCTP_FREE_SONAME(sin);
7222		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
7223		return (ENOENT);
7224	}
7225	(*addr) = (struct sockaddr *)sin;
7226	return (0);
7227}
7228
7229struct pr_usrreqs sctp_usrreqs = {
7230	.pru_abort = sctp_abort,
7231	.pru_accept = sctp_accept,
7232	.pru_attach = sctp_attach,
7233	.pru_bind = sctp_bind,
7234	.pru_connect = sctp_connect,
7235	.pru_control = in_control,
7236	.pru_close = sctp_close,
7237	.pru_detach = sctp_close,
7238	.pru_sopoll = sopoll_generic,
7239	.pru_flush = sctp_flush,
7240	.pru_disconnect = sctp_disconnect,
7241	.pru_listen = sctp_listen,
7242	.pru_peeraddr = sctp_peeraddr,
7243	.pru_send = sctp_sendm,
7244	.pru_shutdown = sctp_shutdown,
7245	.pru_sockaddr = sctp_ingetaddr,
7246	.pru_sosend = sctp_sosend,
7247	.pru_soreceive = sctp_soreceive
7248};
7249
7250#endif
7251