sctp_common.c revision 8348:4137e18bfaf0
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21
22/*
23 * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
24 * Use is subject to license terms.
25 */
26
27#include <sys/types.h>
28#include <sys/systm.h>
29#include <sys/stream.h>
30#include <sys/strsubr.h>
31#include <sys/ddi.h>
32#include <sys/sunddi.h>
33#include <sys/kmem.h>
34#include <sys/socket.h>
35#include <sys/random.h>
36#include <sys/tsol/tndb.h>
37#include <sys/tsol/tnet.h>
38
39#include <netinet/in.h>
40#include <netinet/ip6.h>
41#include <netinet/sctp.h>
42
43#include <inet/common.h>
44#include <inet/ip.h>
45#include <inet/ip6.h>
46#include <inet/ip_ire.h>
47#include <inet/mib2.h>
48#include <inet/nd.h>
49#include <inet/optcom.h>
50#include <inet/sctp_ip.h>
51#include <inet/ipclassifier.h>
52
53#include "sctp_impl.h"
54#include "sctp_addr.h"
55#include "sctp_asconf.h"
56
57static struct kmem_cache *sctp_kmem_faddr_cache;
58static void sctp_init_faddr(sctp_t *, sctp_faddr_t *, in6_addr_t *, mblk_t *);
59
60/* Set the source address.  Refer to comments in sctp_get_ire(). */
61void
62sctp_set_saddr(sctp_t *sctp, sctp_faddr_t *fp)
63{
64	boolean_t v6 = !fp->isv4;
65	boolean_t addr_set;
66
67	fp->saddr = sctp_get_valid_addr(sctp, v6, &addr_set);
68	/*
69	 * If there is no source address avaialble, mark this peer address
70	 * as unreachable for now.  When the heartbeat timer fires, it will
71	 * call sctp_get_ire() to re-check if there is any source address
72	 * available.
73	 */
74	if (!addr_set)
75		fp->state = SCTP_FADDRS_UNREACH;
76}
77
78/*
79 * Call this function to update the cached IRE of a peer addr fp.
80 */
81void
82sctp_get_ire(sctp_t *sctp, sctp_faddr_t *fp)
83{
84	ire_t		*ire;
85	ipaddr_t	addr4;
86	in6_addr_t	laddr;
87	sctp_saddr_ipif_t *sp;
88	int		hdrlen;
89	ts_label_t	*tsl;
90	sctp_stack_t	*sctps = sctp->sctp_sctps;
91	ip_stack_t	*ipst = sctps->sctps_netstack->netstack_ip;
92
93	/* Remove the previous cache IRE */
94	if ((ire = fp->ire) != NULL) {
95		IRE_REFRELE_NOTR(ire);
96		fp->ire = NULL;
97	}
98
99	/*
100	 * If this addr is not reachable, mark it as unconfirmed for now, the
101	 * state will be changed back to unreachable later in this function
102	 * if it is still the case.
103	 */
104	if (fp->state == SCTP_FADDRS_UNREACH) {
105		fp->state = SCTP_FADDRS_UNCONFIRMED;
106	}
107
108	tsl = crgetlabel(CONN_CRED(sctp->sctp_connp));
109
110	if (fp->isv4) {
111		IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4);
112		ire = ire_cache_lookup(addr4, sctp->sctp_zoneid, tsl, ipst);
113		if (ire != NULL)
114			IN6_IPADDR_TO_V4MAPPED(ire->ire_src_addr, &laddr);
115	} else {
116		ire = ire_cache_lookup_v6(&fp->faddr, sctp->sctp_zoneid, tsl,
117		    ipst);
118		if (ire != NULL)
119			laddr = ire->ire_src_addr_v6;
120	}
121
122	if (ire == NULL) {
123		dprint(3, ("ire2faddr: no ire for %x:%x:%x:%x\n",
124		    SCTP_PRINTADDR(fp->faddr)));
125		/*
126		 * It is tempting to just leave the src addr
127		 * unspecified and let IP figure it out, but we
128		 * *cannot* do this, since IP may choose a src addr
129		 * that is not part of this association... unless
130		 * this sctp has bound to all addrs.  So if the ire
131		 * lookup fails, try to find one in our src addr
132		 * list, unless the sctp has bound to all addrs, in
133		 * which case we change the src addr to unspec.
134		 *
135		 * Note that if this is a v6 endpoint but it does
136		 * not have any v4 address at this point (e.g. may
137		 * have been  deleted), sctp_get_valid_addr() will
138		 * return mapped INADDR_ANY.  In this case, this
139		 * address should be marked not reachable so that
140		 * it won't be used to send data.
141		 */
142		sctp_set_saddr(sctp, fp);
143		if (fp->state == SCTP_FADDRS_UNREACH)
144			return;
145		goto check_current;
146	}
147
148	/* Make sure the laddr is part of this association */
149	if ((sp = sctp_saddr_lookup(sctp, &ire->ire_ipif->ipif_v6lcl_addr,
150	    0)) != NULL && !sp->saddr_ipif_dontsrc) {
151		if (sp->saddr_ipif_unconfirmed == 1)
152			sp->saddr_ipif_unconfirmed = 0;
153		fp->saddr = laddr;
154	} else {
155		dprint(2, ("ire2faddr: src addr is not part of assc\n"));
156
157		/*
158		 * Set the src to the first saddr and hope for the best.
159		 * Note that we will still do the ire caching below.
160		 * Otherwise, whenever we send a packet, we need to do
161		 * the ire lookup again and still may not get the correct
162		 * source address.  Note that this case should very seldomly
163		 * happen.  One scenario this can happen is an app
164		 * explicitly bind() to an address.  But that address is
165		 * not the preferred source address to send to the peer.
166		 */
167		sctp_set_saddr(sctp, fp);
168		if (fp->state == SCTP_FADDRS_UNREACH) {
169			IRE_REFRELE(ire);
170			return;
171		}
172	}
173
174	/*
175	 * Note that ire_cache_lookup_*() returns an ire with the tracing
176	 * bits enabled.  This requires the thread holding the ire also
177	 * do the IRE_REFRELE().  Thus we need to do IRE_REFHOLD_NOTR()
178	 * and then IRE_REFRELE() the ire here to make the tracing bits
179	 * work.
180	 */
181	IRE_REFHOLD_NOTR(ire);
182	IRE_REFRELE(ire);
183
184	/* Cache the IRE */
185	fp->ire = ire;
186	if (fp->ire->ire_type == IRE_LOOPBACK && !sctp->sctp_loopback)
187		sctp->sctp_loopback = 1;
188
189	/*
190	 * Pull out RTO information for this faddr and use it if we don't
191	 * have any yet.
192	 */
193	if (fp->srtt == -1 && ire->ire_uinfo.iulp_rtt != 0) {
194		/* The cached value is in ms. */
195		fp->srtt = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt);
196		fp->rttvar = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt_sd);
197		fp->rto = 3 * fp->srtt;
198
199		/* Bound the RTO by configured min and max values */
200		if (fp->rto < sctp->sctp_rto_min) {
201			fp->rto = sctp->sctp_rto_min;
202		}
203		if (fp->rto > sctp->sctp_rto_max) {
204			fp->rto = sctp->sctp_rto_max;
205		}
206	}
207
208	/*
209	 * Record the MTU for this faddr. If the MTU for this faddr has
210	 * changed, check if the assc MTU will also change.
211	 */
212	if (fp->isv4) {
213		hdrlen = sctp->sctp_hdr_len;
214	} else {
215		hdrlen = sctp->sctp_hdr6_len;
216	}
217	if ((fp->sfa_pmss + hdrlen) != ire->ire_max_frag) {
218		/* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */
219		fp->sfa_pmss = (ire->ire_max_frag - hdrlen) & ~(SCTP_ALIGN - 1);
220		if (fp->cwnd < (fp->sfa_pmss * 2)) {
221			SET_CWND(fp, fp->sfa_pmss,
222			    sctps->sctps_slow_start_initial);
223		}
224	}
225
226check_current:
227	if (fp == sctp->sctp_current)
228		sctp_set_faddr_current(sctp, fp);
229}
230
231void
232sctp_update_ire(sctp_t *sctp)
233{
234	ire_t		*ire;
235	sctp_faddr_t	*fp;
236	sctp_stack_t	*sctps = sctp->sctp_sctps;
237
238	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
239		if ((ire = fp->ire) == NULL)
240			continue;
241		mutex_enter(&ire->ire_lock);
242
243		/*
244		 * If the cached IRE is going away, there is no point to
245		 * update it.
246		 */
247		if (ire->ire_marks & IRE_MARK_CONDEMNED) {
248			mutex_exit(&ire->ire_lock);
249			IRE_REFRELE_NOTR(ire);
250			fp->ire = NULL;
251			continue;
252		}
253
254		/*
255		 * Only record the PMTU for this faddr if we actually have
256		 * done discovery. This prevents initialized default from
257		 * clobbering any real info that IP may have.
258		 */
259		if (fp->pmtu_discovered) {
260			if (fp->isv4) {
261				ire->ire_max_frag = fp->sfa_pmss +
262				    sctp->sctp_hdr_len;
263			} else {
264				ire->ire_max_frag = fp->sfa_pmss +
265				    sctp->sctp_hdr6_len;
266			}
267		}
268
269		if (sctps->sctps_rtt_updates != 0 &&
270		    fp->rtt_updates >= sctps->sctps_rtt_updates) {
271			/*
272			 * If there is no old cached values, initialize them
273			 * conservatively.  Set them to be (1.5 * new value).
274			 * This code copied from ip_ire_advise().  The cached
275			 * value is in ms.
276			 */
277			if (ire->ire_uinfo.iulp_rtt != 0) {
278				ire->ire_uinfo.iulp_rtt =
279				    (ire->ire_uinfo.iulp_rtt +
280				    TICK_TO_MSEC(fp->srtt)) >> 1;
281			} else {
282				ire->ire_uinfo.iulp_rtt =
283				    TICK_TO_MSEC(fp->srtt + (fp->srtt >> 1));
284			}
285			if (ire->ire_uinfo.iulp_rtt_sd != 0) {
286				ire->ire_uinfo.iulp_rtt_sd =
287				    (ire->ire_uinfo.iulp_rtt_sd +
288				    TICK_TO_MSEC(fp->rttvar)) >> 1;
289			} else {
290				ire->ire_uinfo.iulp_rtt_sd =
291				    TICK_TO_MSEC(fp->rttvar +
292				    (fp->rttvar >> 1));
293			}
294			fp->rtt_updates = 0;
295		}
296		mutex_exit(&ire->ire_lock);
297	}
298}
299
300/*
301 * The sender must set the total length in the IP header.
302 * If sendto == NULL, the current will be used.
303 */
304mblk_t *
305sctp_make_mp(sctp_t *sctp, sctp_faddr_t *sendto, int trailer)
306{
307	mblk_t *mp;
308	size_t ipsctplen;
309	int isv4;
310	sctp_faddr_t *fp;
311	sctp_stack_t *sctps = sctp->sctp_sctps;
312	boolean_t src_changed = B_FALSE;
313
314	ASSERT(sctp->sctp_current != NULL || sendto != NULL);
315	if (sendto == NULL) {
316		fp = sctp->sctp_current;
317	} else {
318		fp = sendto;
319	}
320	isv4 = fp->isv4;
321
322	/* Try to look for another IRE again. */
323	if (fp->ire == NULL) {
324		sctp_get_ire(sctp, fp);
325		/*
326		 * Although we still may not get an IRE, the source address
327		 * may be changed in sctp_get_ire().  Set src_changed to
328		 * true so that the source address is copied again.
329		 */
330		src_changed = B_TRUE;
331	}
332
333	/* There is no suitable source address to use, return. */
334	if (fp->state == SCTP_FADDRS_UNREACH)
335		return (NULL);
336	ASSERT(!IN6_IS_ADDR_V4MAPPED_ANY(&fp->saddr));
337
338	if (isv4) {
339		ipsctplen = sctp->sctp_hdr_len;
340	} else {
341		ipsctplen = sctp->sctp_hdr6_len;
342	}
343
344	mp = allocb_cred(ipsctplen + sctps->sctps_wroff_xtra + trailer,
345	    CONN_CRED(sctp->sctp_connp));
346	if (mp == NULL) {
347		ip1dbg(("sctp_make_mp: error making mp..\n"));
348		return (NULL);
349	}
350	mp->b_rptr += sctps->sctps_wroff_xtra;
351	mp->b_wptr = mp->b_rptr + ipsctplen;
352
353	ASSERT(OK_32PTR(mp->b_wptr));
354
355	if (isv4) {
356		ipha_t *iph = (ipha_t *)mp->b_rptr;
357
358		bcopy(sctp->sctp_iphc, mp->b_rptr, ipsctplen);
359		if (fp != sctp->sctp_current || src_changed) {
360			/* Fix the source and destination addresses. */
361			IN6_V4MAPPED_TO_IPADDR(&fp->faddr, iph->ipha_dst);
362			IN6_V4MAPPED_TO_IPADDR(&fp->saddr, iph->ipha_src);
363		}
364		/* set or clear the don't fragment bit */
365		if (fp->df) {
366			iph->ipha_fragment_offset_and_flags = htons(IPH_DF);
367		} else {
368			iph->ipha_fragment_offset_and_flags = 0;
369		}
370	} else {
371		bcopy(sctp->sctp_iphc6, mp->b_rptr, ipsctplen);
372		if (fp != sctp->sctp_current || src_changed) {
373			/* Fix the source and destination addresses. */
374			((ip6_t *)(mp->b_rptr))->ip6_dst = fp->faddr;
375			((ip6_t *)(mp->b_rptr))->ip6_src = fp->saddr;
376		}
377	}
378	ASSERT(sctp->sctp_connp != NULL);
379
380	/*
381	 * IP will not free this IRE if it is condemned.  SCTP needs to
382	 * free it.
383	 */
384	if ((fp->ire != NULL) && (fp->ire->ire_marks & IRE_MARK_CONDEMNED)) {
385		IRE_REFRELE_NOTR(fp->ire);
386		fp->ire = NULL;
387	}
388	/* Stash the conn and ire ptr info. for IP */
389	SCTP_STASH_IPINFO(mp, fp->ire);
390
391	return (mp);
392}
393
394/*
395 * Notify upper layers about preferred write offset, write size.
396 */
397void
398sctp_set_ulp_prop(sctp_t *sctp)
399{
400	int hdrlen;
401	struct sock_proto_props sopp;
402
403	sctp_stack_t *sctps = sctp->sctp_sctps;
404
405	if (sctp->sctp_current->isv4) {
406		hdrlen = sctp->sctp_hdr_len;
407	} else {
408		hdrlen = sctp->sctp_hdr6_len;
409	}
410	ASSERT(sctp->sctp_ulpd);
411
412	ASSERT(sctp->sctp_current->sfa_pmss == sctp->sctp_mss);
413	bzero(&sopp, sizeof (sopp));
414	sopp.sopp_flags = SOCKOPT_MAXBLK|SOCKOPT_WROFF;
415	sopp.sopp_wroff = sctps->sctps_wroff_xtra + hdrlen +
416	    sizeof (sctp_data_hdr_t);
417	sopp.sopp_maxblk = sctp->sctp_mss - sizeof (sctp_data_hdr_t);
418	sctp->sctp_ulp_prop(sctp->sctp_ulpd, &sopp);
419}
420
421void
422sctp_set_iplen(sctp_t *sctp, mblk_t *mp)
423{
424	uint16_t	sum = 0;
425	ipha_t		*iph;
426	ip6_t		*ip6h;
427	mblk_t		*pmp = mp;
428	boolean_t	isv4;
429
430	isv4 = (IPH_HDR_VERSION(mp->b_rptr) == IPV4_VERSION);
431	for (; pmp; pmp = pmp->b_cont)
432		sum += pmp->b_wptr - pmp->b_rptr;
433
434	if (isv4) {
435		iph = (ipha_t *)mp->b_rptr;
436		iph->ipha_length = htons(sum);
437	} else {
438		ip6h = (ip6_t *)mp->b_rptr;
439		/*
440		 * If an ip6i_t is present, the real IPv6 header
441		 * immediately follows.
442		 */
443		if (ip6h->ip6_nxt == IPPROTO_RAW)
444			ip6h = (ip6_t *)&ip6h[1];
445		ip6h->ip6_plen = htons(sum - ((char *)&sctp->sctp_ip6h[1] -
446		    sctp->sctp_iphc6));
447	}
448}
449
450int
451sctp_compare_faddrsets(sctp_faddr_t *a1, sctp_faddr_t *a2)
452{
453	int na1 = 0;
454	int overlap = 0;
455	int equal = 1;
456	int onematch;
457	sctp_faddr_t *fp1, *fp2;
458
459	for (fp1 = a1; fp1; fp1 = fp1->next) {
460		onematch = 0;
461		for (fp2 = a2; fp2; fp2 = fp2->next) {
462			if (IN6_ARE_ADDR_EQUAL(&fp1->faddr, &fp2->faddr)) {
463				overlap++;
464				onematch = 1;
465				break;
466			}
467			if (!onematch) {
468				equal = 0;
469			}
470		}
471		na1++;
472	}
473
474	if (equal) {
475		return (SCTP_ADDR_EQUAL);
476	}
477	if (overlap == na1) {
478		return (SCTP_ADDR_SUBSET);
479	}
480	if (overlap) {
481		return (SCTP_ADDR_OVERLAP);
482	}
483	return (SCTP_ADDR_DISJOINT);
484}
485
486/*
487 * Returns 0 on success, -1 on memory allocation failure. If sleep
488 * is true, this function should never fail.  The boolean parameter
489 * first decides whether the newly created faddr structure should be
490 * added at the beginning of the list or at the end.
491 *
492 * Note: caller must hold conn fanout lock.
493 */
494int
495sctp_add_faddr(sctp_t *sctp, in6_addr_t *addr, int sleep, boolean_t first)
496{
497	sctp_faddr_t	*faddr;
498	mblk_t		*timer_mp;
499
500	if (is_system_labeled()) {
501		ts_label_t *tsl;
502		tsol_tpc_t *rhtp;
503		int retv;
504
505		tsl = crgetlabel(CONN_CRED(sctp->sctp_connp));
506		ASSERT(tsl != NULL);
507
508		/* find_tpc automatically does the right thing with IPv4 */
509		rhtp = find_tpc(addr, IPV6_VERSION, B_FALSE);
510		if (rhtp == NULL)
511			return (EACCES);
512
513		retv = EACCES;
514		if (tsl->tsl_doi == rhtp->tpc_tp.tp_doi) {
515			switch (rhtp->tpc_tp.host_type) {
516			case UNLABELED:
517				/*
518				 * Can talk to unlabeled hosts if any of the
519				 * following are true:
520				 *   1. zone's label matches the remote host's
521				 *	default label,
522				 *   2. mac_exempt is on and the zone dominates
523				 *	the remote host's label, or
524				 *   3. mac_exempt is on and the socket is from
525				 *	the global zone.
526				 */
527				if (blequal(&rhtp->tpc_tp.tp_def_label,
528				    &tsl->tsl_label) ||
529				    (sctp->sctp_mac_exempt &&
530				    (sctp->sctp_zoneid == GLOBAL_ZONEID ||
531				    bldominates(&tsl->tsl_label,
532				    &rhtp->tpc_tp.tp_def_label))))
533					retv = 0;
534				break;
535			case SUN_CIPSO:
536				if (_blinrange(&tsl->tsl_label,
537				    &rhtp->tpc_tp.tp_sl_range_cipso) ||
538				    blinlset(&tsl->tsl_label,
539				    rhtp->tpc_tp.tp_sl_set_cipso))
540					retv = 0;
541				break;
542			}
543		}
544		TPC_RELE(rhtp);
545		if (retv != 0)
546			return (retv);
547	}
548
549	if ((faddr = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep)) == NULL)
550		return (ENOMEM);
551	timer_mp = sctp_timer_alloc((sctp), sctp_rexmit_timer, sleep);
552	if (timer_mp == NULL) {
553		kmem_cache_free(sctp_kmem_faddr_cache, faddr);
554		return (ENOMEM);
555	}
556	((sctpt_t *)(timer_mp->b_rptr))->sctpt_faddr = faddr;
557
558	sctp_init_faddr(sctp, faddr, addr, timer_mp);
559
560	/* Check for subnet broadcast. */
561	if (faddr->ire != NULL && faddr->ire->ire_type & IRE_BROADCAST) {
562		IRE_REFRELE_NOTR(faddr->ire);
563		sctp_timer_free(timer_mp);
564		faddr->timer_mp = NULL;
565		kmem_cache_free(sctp_kmem_faddr_cache, faddr);
566		return (EADDRNOTAVAIL);
567	}
568	ASSERT(faddr->next == NULL);
569
570	if (sctp->sctp_faddrs == NULL) {
571		ASSERT(sctp->sctp_lastfaddr == NULL);
572		/* only element on list; first and last are same */
573		sctp->sctp_faddrs = sctp->sctp_lastfaddr = faddr;
574	} else if (first) {
575		ASSERT(sctp->sctp_lastfaddr != NULL);
576		faddr->next = sctp->sctp_faddrs;
577		sctp->sctp_faddrs = faddr;
578	} else {
579		sctp->sctp_lastfaddr->next = faddr;
580		sctp->sctp_lastfaddr = faddr;
581	}
582	sctp->sctp_nfaddrs++;
583
584	return (0);
585}
586
587sctp_faddr_t *
588sctp_lookup_faddr(sctp_t *sctp, in6_addr_t *addr)
589{
590	sctp_faddr_t *fp;
591
592	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
593		if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr))
594			break;
595	}
596
597	return (fp);
598}
599
600sctp_faddr_t *
601sctp_lookup_faddr_nosctp(sctp_faddr_t *fp, in6_addr_t *addr)
602{
603	for (; fp; fp = fp->next) {
604		if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr)) {
605			break;
606		}
607	}
608
609	return (fp);
610}
611
612/*
613 * To change the currently used peer address to the specified one.
614 */
615void
616sctp_set_faddr_current(sctp_t *sctp, sctp_faddr_t *fp)
617{
618	/* Now setup the composite header. */
619	if (fp->isv4) {
620		IN6_V4MAPPED_TO_IPADDR(&fp->faddr,
621		    sctp->sctp_ipha->ipha_dst);
622		IN6_V4MAPPED_TO_IPADDR(&fp->saddr, sctp->sctp_ipha->ipha_src);
623		/* update don't fragment bit */
624		if (fp->df) {
625			sctp->sctp_ipha->ipha_fragment_offset_and_flags =
626			    htons(IPH_DF);
627		} else {
628			sctp->sctp_ipha->ipha_fragment_offset_and_flags = 0;
629		}
630	} else {
631		sctp->sctp_ip6h->ip6_dst = fp->faddr;
632		sctp->sctp_ip6h->ip6_src = fp->saddr;
633	}
634
635	sctp->sctp_current = fp;
636	sctp->sctp_mss = fp->sfa_pmss;
637
638	/* Update the uppper layer for the change. */
639	if (!SCTP_IS_DETACHED(sctp))
640		sctp_set_ulp_prop(sctp);
641}
642
643void
644sctp_redo_faddr_srcs(sctp_t *sctp)
645{
646	sctp_faddr_t *fp;
647
648	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
649		sctp_get_ire(sctp, fp);
650	}
651}
652
653void
654sctp_faddr_alive(sctp_t *sctp, sctp_faddr_t *fp)
655{
656	int64_t now = lbolt64;
657
658	fp->strikes = 0;
659	sctp->sctp_strikes = 0;
660	fp->lastactive = now;
661	fp->hb_expiry = now + SET_HB_INTVL(fp);
662	fp->hb_pending = B_FALSE;
663	if (fp->state != SCTP_FADDRS_ALIVE) {
664		fp->state = SCTP_FADDRS_ALIVE;
665		sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_AVAILABLE, 0);
666		/* Should have a full IRE now */
667		sctp_get_ire(sctp, fp);
668
669		/*
670		 * If this is the primary, switch back to it now.  And
671		 * we probably want to reset the source addr used to reach
672		 * it.
673		 */
674		if (fp == sctp->sctp_primary) {
675			ASSERT(fp->state != SCTP_FADDRS_UNREACH);
676			sctp_set_faddr_current(sctp, fp);
677			return;
678		}
679	}
680}
681
682int
683sctp_is_a_faddr_clean(sctp_t *sctp)
684{
685	sctp_faddr_t *fp;
686
687	for (fp = sctp->sctp_faddrs; fp; fp = fp->next) {
688		if (fp->state == SCTP_FADDRS_ALIVE && fp->strikes == 0) {
689			return (1);
690		}
691	}
692
693	return (0);
694}
695
696/*
697 * Returns 0 if there is at leave one other active faddr, -1 if there
698 * are none. If there are none left, faddr_dead() will start killing the
699 * association.
700 * If the downed faddr was the current faddr, a new current faddr
701 * will be chosen.
702 */
703int
704sctp_faddr_dead(sctp_t *sctp, sctp_faddr_t *fp, int newstate)
705{
706	sctp_faddr_t *ofp;
707	sctp_stack_t *sctps = sctp->sctp_sctps;
708
709	if (fp->state == SCTP_FADDRS_ALIVE) {
710		sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_UNREACHABLE, 0);
711	}
712	fp->state = newstate;
713
714	dprint(1, ("sctp_faddr_dead: %x:%x:%x:%x down (state=%d)\n",
715	    SCTP_PRINTADDR(fp->faddr), newstate));
716
717	if (fp == sctp->sctp_current) {
718		/* Current faddr down; need to switch it */
719		sctp->sctp_current = NULL;
720	}
721
722	/* Find next alive faddr */
723	ofp = fp;
724	for (fp = fp->next; fp != NULL; fp = fp->next) {
725		if (fp->state == SCTP_FADDRS_ALIVE) {
726			break;
727		}
728	}
729
730	if (fp == NULL) {
731		/* Continue from beginning of list */
732		for (fp = sctp->sctp_faddrs; fp != ofp; fp = fp->next) {
733			if (fp->state == SCTP_FADDRS_ALIVE) {
734				break;
735			}
736		}
737	}
738
739	/*
740	 * Find a new fp, so if the current faddr is dead, use the new fp
741	 * as the current one.
742	 */
743	if (fp != ofp) {
744		if (sctp->sctp_current == NULL) {
745			dprint(1, ("sctp_faddr_dead: failover->%x:%x:%x:%x\n",
746			    SCTP_PRINTADDR(fp->faddr)));
747			/*
748			 * Note that we don't need to reset the source addr
749			 * of the new fp.
750			 */
751			sctp_set_faddr_current(sctp, fp);
752		}
753		return (0);
754	}
755
756
757	/* All faddrs are down; kill the association */
758	dprint(1, ("sctp_faddr_dead: all faddrs down, killing assoc\n"));
759	BUMP_MIB(&sctps->sctps_mib, sctpAborted);
760	sctp_assoc_event(sctp, sctp->sctp_state < SCTPS_ESTABLISHED ?
761	    SCTP_CANT_STR_ASSOC : SCTP_COMM_LOST, 0, NULL);
762	sctp_clean_death(sctp, sctp->sctp_client_errno ?
763	    sctp->sctp_client_errno : ETIMEDOUT);
764
765	return (-1);
766}
767
768sctp_faddr_t *
769sctp_rotate_faddr(sctp_t *sctp, sctp_faddr_t *ofp)
770{
771	sctp_faddr_t *nfp = NULL;
772
773	if (ofp == NULL) {
774		ofp = sctp->sctp_current;
775	}
776
777	/* Find the next live one */
778	for (nfp = ofp->next; nfp != NULL; nfp = nfp->next) {
779		if (nfp->state == SCTP_FADDRS_ALIVE) {
780			break;
781		}
782	}
783
784	if (nfp == NULL) {
785		/* Continue from beginning of list */
786		for (nfp = sctp->sctp_faddrs; nfp != ofp; nfp = nfp->next) {
787			if (nfp->state == SCTP_FADDRS_ALIVE) {
788				break;
789			}
790		}
791	}
792
793	/*
794	 * nfp could only be NULL if all faddrs are down, and when
795	 * this happens, faddr_dead() should have killed the
796	 * association. Hence this assertion...
797	 */
798	ASSERT(nfp != NULL);
799	return (nfp);
800}
801
802void
803sctp_unlink_faddr(sctp_t *sctp, sctp_faddr_t *fp)
804{
805	sctp_faddr_t *fpp;
806
807	if (!sctp->sctp_faddrs) {
808		return;
809	}
810
811	if (fp->timer_mp != NULL) {
812		sctp_timer_free(fp->timer_mp);
813		fp->timer_mp = NULL;
814		fp->timer_running = 0;
815	}
816	if (fp->rc_timer_mp != NULL) {
817		sctp_timer_free(fp->rc_timer_mp);
818		fp->rc_timer_mp = NULL;
819		fp->rc_timer_running = 0;
820	}
821	if (fp->ire != NULL) {
822		IRE_REFRELE_NOTR(fp->ire);
823		fp->ire = NULL;
824	}
825
826	if (fp == sctp->sctp_faddrs) {
827		goto gotit;
828	}
829
830	for (fpp = sctp->sctp_faddrs; fpp->next != fp; fpp = fpp->next)
831		;
832
833gotit:
834	ASSERT(sctp->sctp_conn_tfp != NULL);
835	mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
836	if (fp == sctp->sctp_faddrs) {
837		sctp->sctp_faddrs = fp->next;
838	} else {
839		fpp->next = fp->next;
840	}
841	mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
842	/* XXX faddr2ire? */
843	kmem_cache_free(sctp_kmem_faddr_cache, fp);
844	sctp->sctp_nfaddrs--;
845}
846
847void
848sctp_zap_faddrs(sctp_t *sctp, int caller_holds_lock)
849{
850	sctp_faddr_t *fp, *fpn;
851
852	if (sctp->sctp_faddrs == NULL) {
853		ASSERT(sctp->sctp_lastfaddr == NULL);
854		return;
855	}
856
857	ASSERT(sctp->sctp_lastfaddr != NULL);
858	sctp->sctp_lastfaddr = NULL;
859	sctp->sctp_current = NULL;
860	sctp->sctp_primary = NULL;
861
862	sctp_free_faddr_timers(sctp);
863
864	if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) {
865		/* in conn fanout; need to hold lock */
866		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
867	}
868
869	for (fp = sctp->sctp_faddrs; fp; fp = fpn) {
870		fpn = fp->next;
871		if (fp->ire != NULL)
872			IRE_REFRELE_NOTR(fp->ire);
873		kmem_cache_free(sctp_kmem_faddr_cache, fp);
874		sctp->sctp_nfaddrs--;
875	}
876
877	sctp->sctp_faddrs = NULL;
878	ASSERT(sctp->sctp_nfaddrs == 0);
879	if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) {
880		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
881	}
882
883}
884
885void
886sctp_zap_addrs(sctp_t *sctp)
887{
888	sctp_zap_faddrs(sctp, 0);
889	sctp_free_saddrs(sctp);
890}
891
892/*
893 * Initialize the IPv4 header. Loses any record of any IP options.
894 */
895int
896sctp_header_init_ipv4(sctp_t *sctp, int sleep)
897{
898	sctp_hdr_t	*sctph;
899	sctp_stack_t	*sctps = sctp->sctp_sctps;
900
901	/*
902	 * This is a simple initialization. If there's
903	 * already a template, it should never be too small,
904	 * so reuse it.  Otherwise, allocate space for the new one.
905	 */
906	if (sctp->sctp_iphc != NULL) {
907		ASSERT(sctp->sctp_iphc_len >= SCTP_MAX_COMBINED_HEADER_LENGTH);
908		bzero(sctp->sctp_iphc, sctp->sctp_iphc_len);
909	} else {
910		sctp->sctp_iphc_len = SCTP_MAX_COMBINED_HEADER_LENGTH;
911		sctp->sctp_iphc = kmem_zalloc(sctp->sctp_iphc_len, sleep);
912		if (sctp->sctp_iphc == NULL) {
913			sctp->sctp_iphc_len = 0;
914			return (ENOMEM);
915		}
916	}
917
918	sctp->sctp_ipha = (ipha_t *)sctp->sctp_iphc;
919
920	sctp->sctp_hdr_len = sizeof (ipha_t) + sizeof (sctp_hdr_t);
921	sctp->sctp_ip_hdr_len = sizeof (ipha_t);
922	sctp->sctp_ipha->ipha_length = htons(sizeof (ipha_t) +
923	    sizeof (sctp_hdr_t));
924	sctp->sctp_ipha->ipha_version_and_hdr_length =
925	    (IP_VERSION << 4) | IP_SIMPLE_HDR_LENGTH_IN_WORDS;
926
927	/*
928	 * These two fields should be zero, and are already set above.
929	 *
930	 * sctp->sctp_ipha->ipha_ident,
931	 * sctp->sctp_ipha->ipha_fragment_offset_and_flags.
932	 */
933
934	sctp->sctp_ipha->ipha_ttl = sctps->sctps_ipv4_ttl;
935	sctp->sctp_ipha->ipha_protocol = IPPROTO_SCTP;
936
937	sctph = (sctp_hdr_t *)(sctp->sctp_iphc + sizeof (ipha_t));
938	sctp->sctp_sctph = sctph;
939
940	return (0);
941}
942
943/*
944 * Update sctp_sticky_hdrs based on sctp_sticky_ipp.
945 * The headers include ip6i_t (if needed), ip6_t, any sticky extension
946 * headers, and the maximum size sctp header (to avoid reallocation
947 * on the fly for additional sctp options).
948 * Returns failure if can't allocate memory.
949 */
950int
951sctp_build_hdrs(sctp_t *sctp)
952{
953	char		*hdrs;
954	uint_t		hdrs_len;
955	ip6i_t		*ip6i;
956	char		buf[SCTP_MAX_HDR_LENGTH];
957	ip6_pkt_t	*ipp = &sctp->sctp_sticky_ipp;
958	in6_addr_t	src;
959	in6_addr_t	dst;
960	sctp_stack_t	*sctps = sctp->sctp_sctps;
961
962	/*
963	 * save the existing sctp header and source/dest IP addresses
964	 */
965	bcopy(sctp->sctp_sctph6, buf, sizeof (sctp_hdr_t));
966	src = sctp->sctp_ip6h->ip6_src;
967	dst = sctp->sctp_ip6h->ip6_dst;
968	hdrs_len = ip_total_hdrs_len_v6(ipp) + SCTP_MAX_HDR_LENGTH;
969	ASSERT(hdrs_len != 0);
970	if (hdrs_len > sctp->sctp_iphc6_len) {
971		/* Need to reallocate */
972		hdrs = kmem_zalloc(hdrs_len, KM_NOSLEEP);
973		if (hdrs == NULL)
974			return (ENOMEM);
975
976		if (sctp->sctp_iphc6_len != 0)
977			kmem_free(sctp->sctp_iphc6, sctp->sctp_iphc6_len);
978		sctp->sctp_iphc6 = hdrs;
979		sctp->sctp_iphc6_len = hdrs_len;
980	}
981	ip_build_hdrs_v6((uchar_t *)sctp->sctp_iphc6,
982	    hdrs_len - SCTP_MAX_HDR_LENGTH, ipp, IPPROTO_SCTP);
983
984	/* Set header fields not in ipp */
985	if (ipp->ipp_fields & IPPF_HAS_IP6I) {
986		ip6i = (ip6i_t *)sctp->sctp_iphc6;
987		sctp->sctp_ip6h = (ip6_t *)&ip6i[1];
988	} else {
989		sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6;
990	}
991	/*
992	 * sctp->sctp_ip_hdr_len will include ip6i_t if there is one.
993	 */
994	sctp->sctp_ip_hdr6_len = hdrs_len - SCTP_MAX_HDR_LENGTH;
995	sctp->sctp_sctph6 = (sctp_hdr_t *)(sctp->sctp_iphc6 +
996	    sctp->sctp_ip_hdr6_len);
997	sctp->sctp_hdr6_len = sctp->sctp_ip_hdr6_len + sizeof (sctp_hdr_t);
998
999	bcopy(buf, sctp->sctp_sctph6, sizeof (sctp_hdr_t));
1000
1001	sctp->sctp_ip6h->ip6_src = src;
1002	sctp->sctp_ip6h->ip6_dst = dst;
1003	/*
1004	 * If the hoplimit was not set by ip_build_hdrs_v6(), we need to
1005	 * set it to the default value for SCTP.
1006	 */
1007	if (!(ipp->ipp_fields & IPPF_UNICAST_HOPS))
1008		sctp->sctp_ip6h->ip6_hops = sctps->sctps_ipv6_hoplimit;
1009	/*
1010	 * If we're setting extension headers after a connection
1011	 * has been established, and if we have a routing header
1012	 * among the extension headers, call ip_massage_options_v6 to
1013	 * manipulate the routing header/ip6_dst set the checksum
1014	 * difference in the sctp header template.
1015	 * (This happens in sctp_connect_ipv6 if the routing header
1016	 * is set prior to the connect.)
1017	 */
1018
1019	if ((sctp->sctp_state >= SCTPS_COOKIE_WAIT) &&
1020	    (sctp->sctp_sticky_ipp.ipp_fields & IPPF_RTHDR)) {
1021		ip6_rthdr_t *rth;
1022
1023		rth = ip_find_rthdr_v6(sctp->sctp_ip6h,
1024		    (uint8_t *)sctp->sctp_sctph6);
1025		if (rth != NULL) {
1026			(void) ip_massage_options_v6(sctp->sctp_ip6h, rth,
1027			    sctps->sctps_netstack);
1028		}
1029	}
1030	return (0);
1031}
1032
1033/*
1034 * Initialize the IPv6 header. Loses any record of any IPv6 extension headers.
1035 */
1036int
1037sctp_header_init_ipv6(sctp_t *sctp, int sleep)
1038{
1039	sctp_hdr_t	*sctph;
1040	sctp_stack_t	*sctps = sctp->sctp_sctps;
1041
1042	/*
1043	 * This is a simple initialization. If there's
1044	 * already a template, it should never be too small,
1045	 * so reuse it. Otherwise, allocate space for the new one.
1046	 * Ensure that there is enough space to "downgrade" the sctp_t
1047	 * to an IPv4 sctp_t. This requires having space for a full load
1048	 * of IPv4 options
1049	 */
1050	if (sctp->sctp_iphc6 != NULL) {
1051		ASSERT(sctp->sctp_iphc6_len >=
1052		    SCTP_MAX_COMBINED_HEADER_LENGTH);
1053		bzero(sctp->sctp_iphc6, sctp->sctp_iphc6_len);
1054	} else {
1055		sctp->sctp_iphc6_len = SCTP_MAX_COMBINED_HEADER_LENGTH;
1056		sctp->sctp_iphc6 = kmem_zalloc(sctp->sctp_iphc_len, sleep);
1057		if (sctp->sctp_iphc6 == NULL) {
1058			sctp->sctp_iphc6_len = 0;
1059			return (ENOMEM);
1060		}
1061	}
1062	sctp->sctp_hdr6_len = IPV6_HDR_LEN + sizeof (sctp_hdr_t);
1063	sctp->sctp_ip_hdr6_len = IPV6_HDR_LEN;
1064	sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6;
1065
1066	/* Initialize the header template */
1067
1068	sctp->sctp_ip6h->ip6_vcf = IPV6_DEFAULT_VERS_AND_FLOW;
1069	sctp->sctp_ip6h->ip6_plen = ntohs(sizeof (sctp_hdr_t));
1070	sctp->sctp_ip6h->ip6_nxt = IPPROTO_SCTP;
1071	sctp->sctp_ip6h->ip6_hops = sctps->sctps_ipv6_hoplimit;
1072
1073	sctph = (sctp_hdr_t *)(sctp->sctp_iphc6 + IPV6_HDR_LEN);
1074	sctp->sctp_sctph6 = sctph;
1075
1076	return (0);
1077}
1078
1079static int
1080sctp_v4_label(sctp_t *sctp)
1081{
1082	uchar_t optbuf[IP_MAX_OPT_LENGTH];
1083	const cred_t *cr = CONN_CRED(sctp->sctp_connp);
1084	int added;
1085
1086	if (tsol_compute_label(cr, sctp->sctp_ipha->ipha_dst, optbuf,
1087	    sctp->sctp_mac_exempt,
1088	    sctp->sctp_sctps->sctps_netstack->netstack_ip) != 0)
1089		return (EACCES);
1090
1091	added = tsol_remove_secopt(sctp->sctp_ipha, sctp->sctp_hdr_len);
1092	if (added == -1)
1093		return (EACCES);
1094	sctp->sctp_hdr_len += added;
1095	sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph + added);
1096	sctp->sctp_ip_hdr_len += added;
1097	if ((sctp->sctp_v4label_len = optbuf[IPOPT_OLEN]) != 0) {
1098		sctp->sctp_v4label_len = (sctp->sctp_v4label_len + 3) & ~3;
1099		added = tsol_prepend_option(optbuf, sctp->sctp_ipha,
1100		    sctp->sctp_hdr_len);
1101		if (added == -1)
1102			return (EACCES);
1103		sctp->sctp_hdr_len += added;
1104		sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph +
1105		    added);
1106		sctp->sctp_ip_hdr_len += added;
1107	}
1108	return (0);
1109}
1110
1111static int
1112sctp_v6_label(sctp_t *sctp)
1113{
1114	uchar_t optbuf[TSOL_MAX_IPV6_OPTION];
1115	const cred_t *cr = CONN_CRED(sctp->sctp_connp);
1116
1117	if (tsol_compute_label_v6(cr, &sctp->sctp_ip6h->ip6_dst, optbuf,
1118	    sctp->sctp_mac_exempt,
1119	    sctp->sctp_sctps->sctps_netstack->netstack_ip) != 0)
1120		return (EACCES);
1121	if (tsol_update_sticky(&sctp->sctp_sticky_ipp, &sctp->sctp_v6label_len,
1122	    optbuf) != 0)
1123		return (EACCES);
1124	if (sctp_build_hdrs(sctp) != 0)
1125		return (EACCES);
1126	return (0);
1127}
1128
1129/*
1130 * XXX implement more sophisticated logic
1131 */
1132int
1133sctp_set_hdraddrs(sctp_t *sctp)
1134{
1135	sctp_faddr_t *fp;
1136	int gotv4 = 0;
1137	int gotv6 = 0;
1138
1139	ASSERT(sctp->sctp_faddrs != NULL);
1140	ASSERT(sctp->sctp_nsaddrs > 0);
1141
1142	/* Set up using the primary first */
1143	if (IN6_IS_ADDR_V4MAPPED(&sctp->sctp_primary->faddr)) {
1144		IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->faddr,
1145		    sctp->sctp_ipha->ipha_dst);
1146		/* saddr may be unspec; make_mp() will handle this */
1147		IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->saddr,
1148		    sctp->sctp_ipha->ipha_src);
1149		if (!is_system_labeled() || sctp_v4_label(sctp) == 0) {
1150			gotv4 = 1;
1151			if (sctp->sctp_ipversion == IPV4_VERSION) {
1152				goto copyports;
1153			}
1154		}
1155	} else {
1156		sctp->sctp_ip6h->ip6_dst = sctp->sctp_primary->faddr;
1157		/* saddr may be unspec; make_mp() will handle this */
1158		sctp->sctp_ip6h->ip6_src = sctp->sctp_primary->saddr;
1159		if (!is_system_labeled() || sctp_v6_label(sctp) == 0)
1160			gotv6 = 1;
1161	}
1162
1163	for (fp = sctp->sctp_faddrs; fp; fp = fp->next) {
1164		if (!gotv4 && IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1165			IN6_V4MAPPED_TO_IPADDR(&fp->faddr,
1166			    sctp->sctp_ipha->ipha_dst);
1167			/* copy in the faddr_t's saddr */
1168			IN6_V4MAPPED_TO_IPADDR(&fp->saddr,
1169			    sctp->sctp_ipha->ipha_src);
1170			if (!is_system_labeled() || sctp_v4_label(sctp) == 0) {
1171				gotv4 = 1;
1172				if (sctp->sctp_ipversion == IPV4_VERSION ||
1173				    gotv6) {
1174					break;
1175				}
1176			}
1177		} else if (!gotv6 && !IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1178			sctp->sctp_ip6h->ip6_dst = fp->faddr;
1179			/* copy in the faddr_t's saddr */
1180			sctp->sctp_ip6h->ip6_src = fp->saddr;
1181			if (!is_system_labeled() || sctp_v6_label(sctp) == 0) {
1182				gotv6 = 1;
1183				if (gotv4)
1184					break;
1185			}
1186		}
1187	}
1188
1189copyports:
1190	if (!gotv4 && !gotv6)
1191		return (EACCES);
1192
1193	/* copy in the ports for good measure */
1194	sctp->sctp_sctph->sh_sport = sctp->sctp_lport;
1195	sctp->sctp_sctph->sh_dport = sctp->sctp_fport;
1196
1197	sctp->sctp_sctph6->sh_sport = sctp->sctp_lport;
1198	sctp->sctp_sctph6->sh_dport = sctp->sctp_fport;
1199	return (0);
1200}
1201
1202void
1203sctp_add_unrec_parm(sctp_parm_hdr_t *uph, mblk_t **errmp)
1204{
1205	mblk_t *mp;
1206	sctp_parm_hdr_t *ph;
1207	size_t len;
1208	int pad;
1209	sctp_chunk_hdr_t *ecp;
1210
1211	len = sizeof (*ph) + ntohs(uph->sph_len);
1212	if ((pad = len % SCTP_ALIGN) != 0) {
1213		pad = SCTP_ALIGN - pad;
1214		len += pad;
1215	}
1216	mp = allocb(len, BPRI_MED);
1217	if (mp == NULL) {
1218		return;
1219	}
1220
1221	ph = (sctp_parm_hdr_t *)(mp->b_rptr);
1222	ph->sph_type = htons(PARM_UNRECOGNIZED);
1223	ph->sph_len = htons(len - pad);
1224
1225	/* copy in the unrecognized parameter */
1226	bcopy(uph, ph + 1, ntohs(uph->sph_len));
1227
1228	if (pad != 0)
1229		bzero((mp->b_rptr + len - pad), pad);
1230
1231	mp->b_wptr = mp->b_rptr + len;
1232	if (*errmp != NULL) {
1233		/*
1234		 * Update total length of the ERROR chunk, then link this
1235		 * cause block to the possible chain of cause blocks
1236		 * attached to the ERROR chunk.
1237		 */
1238		ecp = (sctp_chunk_hdr_t *)((*errmp)->b_rptr);
1239		ecp->sch_len = htons(ntohs(ecp->sch_len) + len);
1240		linkb(*errmp, mp);
1241	} else {
1242		*errmp = mp;
1243	}
1244}
1245
1246/*
1247 * o Bounds checking
1248 * o Updates remaining
1249 * o Checks alignment
1250 */
1251sctp_parm_hdr_t *
1252sctp_next_parm(sctp_parm_hdr_t *current, ssize_t *remaining)
1253{
1254	int pad;
1255	uint16_t len;
1256
1257	len = ntohs(current->sph_len);
1258	*remaining -= len;
1259	if (*remaining < sizeof (*current) || len < sizeof (*current)) {
1260		return (NULL);
1261	}
1262	if ((pad = len & (SCTP_ALIGN - 1)) != 0) {
1263		pad = SCTP_ALIGN - pad;
1264		*remaining -= pad;
1265	}
1266	/*LINTED pointer cast may result in improper alignment*/
1267	current = (sctp_parm_hdr_t *)((char *)current + len + pad);
1268	return (current);
1269}
1270
1271/*
1272 * Sets the address parameters given in the INIT chunk into sctp's
1273 * faddrs; if psctp is non-NULL, copies psctp's saddrs. If there are
1274 * no address parameters in the INIT chunk, a single faddr is created
1275 * from the ip hdr at the beginning of pkt.
1276 * If there already are existing addresses hanging from sctp, merge
1277 * them in, if the old info contains addresses which are not present
1278 * in this new info, get rid of them, and clean the pointers if there's
1279 * messages which have this as their target address.
1280 *
1281 * We also re-adjust the source address list here since the list may
1282 * contain more than what is actually part of the association. If
1283 * we get here from sctp_send_cookie_echo(), we are on the active
1284 * side and psctp will be NULL and ich will be the INIT-ACK chunk.
1285 * If we get here from sctp_accept_comm(), ich will be the INIT chunk
1286 * and psctp will the listening endpoint.
1287 *
1288 * INIT processing: When processing the INIT we inherit the src address
1289 * list from the listener. For a loopback or linklocal association, we
1290 * delete the list and just take the address from the IP header (since
1291 * that's how we created the INIT-ACK). Additionally, for loopback we
1292 * ignore the address params in the INIT. For determining which address
1293 * types were sent in the INIT-ACK we follow the same logic as in
1294 * creating the INIT-ACK. We delete addresses of the type that are not
1295 * supported by the peer.
1296 *
1297 * INIT-ACK processing: When processing the INIT-ACK since we had not
1298 * included addr params for loopback or linklocal addresses when creating
1299 * the INIT, we just use the address from the IP header. Further, for
1300 * loopback we ignore the addr param list. We mark addresses of the
1301 * type not supported by the peer as unconfirmed.
1302 *
1303 * In case of INIT processing we look for supported address types in the
1304 * supported address param, if present. In both cases the address type in
1305 * the IP header is supported as well as types for addresses in the param
1306 * list, if any.
1307 *
1308 * Once we have the supported address types sctp_check_saddr() runs through
1309 * the source address list and deletes or marks as unconfirmed address of
1310 * types not supported by the peer.
1311 *
1312 * Returns 0 on success, sys errno on failure
1313 */
1314int
1315sctp_get_addrparams(sctp_t *sctp, sctp_t *psctp, mblk_t *pkt,
1316    sctp_chunk_hdr_t *ich, uint_t *sctp_options)
1317{
1318	sctp_init_chunk_t	*init;
1319	ipha_t			*iph;
1320	ip6_t			*ip6h;
1321	in6_addr_t		hdrsaddr[1];
1322	in6_addr_t		hdrdaddr[1];
1323	sctp_parm_hdr_t		*ph;
1324	ssize_t			remaining;
1325	int			isv4;
1326	int			err;
1327	sctp_faddr_t		*fp;
1328	int			supp_af = 0;
1329	boolean_t		check_saddr = B_TRUE;
1330	in6_addr_t		curaddr;
1331	sctp_stack_t		*sctps = sctp->sctp_sctps;
1332
1333	if (sctp_options != NULL)
1334		*sctp_options = 0;
1335
1336	/* extract the address from the IP header */
1337	isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION);
1338	if (isv4) {
1339		iph = (ipha_t *)pkt->b_rptr;
1340		IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdrsaddr);
1341		IN6_IPADDR_TO_V4MAPPED(iph->ipha_dst, hdrdaddr);
1342		supp_af |= PARM_SUPP_V4;
1343	} else {
1344		ip6h = (ip6_t *)pkt->b_rptr;
1345		hdrsaddr[0] = ip6h->ip6_src;
1346		hdrdaddr[0] = ip6h->ip6_dst;
1347		supp_af |= PARM_SUPP_V6;
1348	}
1349
1350	/*
1351	 * Unfortunately, we can't delay this because adding an faddr
1352	 * looks for the presence of the source address (from the ire
1353	 * for the faddr) in the source address list. We could have
1354	 * delayed this if, say, this was a loopback/linklocal connection.
1355	 * Now, we just end up nuking this list and taking the addr from
1356	 * the IP header for loopback/linklocal.
1357	 */
1358	if (psctp != NULL && psctp->sctp_nsaddrs > 0) {
1359		ASSERT(sctp->sctp_nsaddrs == 0);
1360
1361		err = sctp_dup_saddrs(psctp, sctp, KM_NOSLEEP);
1362		if (err != 0)
1363			return (err);
1364	}
1365	/*
1366	 * We will add the faddr before parsing the address list as this
1367	 * might be a loopback connection and we would not have to
1368	 * go through the list.
1369	 *
1370	 * Make sure the header's addr is in the list
1371	 */
1372	fp = sctp_lookup_faddr(sctp, hdrsaddr);
1373	if (fp == NULL) {
1374		/* not included; add it now */
1375		err = sctp_add_faddr(sctp, hdrsaddr, KM_NOSLEEP, B_TRUE);
1376		if (err != 0)
1377			return (err);
1378
1379		/* sctp_faddrs will be the hdr addr */
1380		fp = sctp->sctp_faddrs;
1381	}
1382	/* make the header addr the primary */
1383
1384	if (cl_sctp_assoc_change != NULL && psctp == NULL)
1385		curaddr = sctp->sctp_current->faddr;
1386
1387	sctp->sctp_primary = fp;
1388	sctp->sctp_current = fp;
1389	sctp->sctp_mss = fp->sfa_pmss;
1390
1391	/* For loopback connections & linklocal get address from the header */
1392	if (sctp->sctp_loopback || sctp->sctp_linklocal) {
1393		if (sctp->sctp_nsaddrs != 0)
1394			sctp_free_saddrs(sctp);
1395		if ((err = sctp_saddr_add_addr(sctp, hdrdaddr, 0)) != 0)
1396			return (err);
1397		/* For loopback ignore address list */
1398		if (sctp->sctp_loopback)
1399			return (0);
1400		check_saddr = B_FALSE;
1401	}
1402
1403	/* Walk the params in the INIT [ACK], pulling out addr params */
1404	remaining = ntohs(ich->sch_len) - sizeof (*ich) -
1405	    sizeof (sctp_init_chunk_t);
1406	if (remaining < sizeof (*ph)) {
1407		if (check_saddr) {
1408			sctp_check_saddr(sctp, supp_af, psctp == NULL ?
1409			    B_FALSE : B_TRUE, hdrdaddr);
1410		}
1411		ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL);
1412		return (0);
1413	}
1414
1415	init = (sctp_init_chunk_t *)(ich + 1);
1416	ph = (sctp_parm_hdr_t *)(init + 1);
1417
1418	/* params will have already been byteordered when validating */
1419	while (ph != NULL) {
1420		if (ph->sph_type == htons(PARM_SUPP_ADDRS)) {
1421			int		plen;
1422			uint16_t	*p;
1423			uint16_t	addrtype;
1424
1425			ASSERT(psctp != NULL);
1426			plen = ntohs(ph->sph_len);
1427			p = (uint16_t *)(ph + 1);
1428			while (plen > 0) {
1429				addrtype = ntohs(*p);
1430				switch (addrtype) {
1431					case PARM_ADDR6:
1432						supp_af |= PARM_SUPP_V6;
1433						break;
1434					case PARM_ADDR4:
1435						supp_af |= PARM_SUPP_V4;
1436						break;
1437					default:
1438						break;
1439				}
1440				p++;
1441				plen -= sizeof (*p);
1442			}
1443		} else if (ph->sph_type == htons(PARM_ADDR4)) {
1444			if (remaining >= PARM_ADDR4_LEN) {
1445				in6_addr_t addr;
1446				ipaddr_t ta;
1447
1448				supp_af |= PARM_SUPP_V4;
1449				/*
1450				 * Screen out broad/multicasts & loopback.
1451				 * If the endpoint only accepts v6 address,
1452				 * go to the next one.
1453				 *
1454				 * Subnet broadcast check is done in
1455				 * sctp_add_faddr().  If the address is
1456				 * a broadcast address, it won't be added.
1457				 */
1458				bcopy(ph + 1, &ta, sizeof (ta));
1459				if (ta == 0 ||
1460				    ta == INADDR_BROADCAST ||
1461				    ta == htonl(INADDR_LOOPBACK) ||
1462				    CLASSD(ta) ||
1463				    sctp->sctp_connp->conn_ipv6_v6only) {
1464					goto next;
1465				}
1466				IN6_INADDR_TO_V4MAPPED((struct in_addr *)
1467				    (ph + 1), &addr);
1468
1469				/* Check for duplicate. */
1470				if (sctp_lookup_faddr(sctp, &addr) != NULL)
1471					goto next;
1472
1473				/* OK, add it to the faddr set */
1474				err = sctp_add_faddr(sctp, &addr, KM_NOSLEEP,
1475				    B_FALSE);
1476				/* Something is wrong...  Try the next one. */
1477				if (err != 0)
1478					goto next;
1479			}
1480		} else if (ph->sph_type == htons(PARM_ADDR6) &&
1481		    sctp->sctp_family == AF_INET6) {
1482			/* An v4 socket should not take v6 addresses. */
1483			if (remaining >= PARM_ADDR6_LEN) {
1484				in6_addr_t *addr6;
1485
1486				supp_af |= PARM_SUPP_V6;
1487				addr6 = (in6_addr_t *)(ph + 1);
1488				/*
1489				 * Screen out link locals, mcast, loopback
1490				 * and bogus v6 address.
1491				 */
1492				if (IN6_IS_ADDR_LINKLOCAL(addr6) ||
1493				    IN6_IS_ADDR_MULTICAST(addr6) ||
1494				    IN6_IS_ADDR_LOOPBACK(addr6) ||
1495				    IN6_IS_ADDR_V4MAPPED(addr6)) {
1496					goto next;
1497				}
1498				/* Check for duplicate. */
1499				if (sctp_lookup_faddr(sctp, addr6) != NULL)
1500					goto next;
1501
1502				err = sctp_add_faddr(sctp,
1503				    (in6_addr_t *)(ph + 1), KM_NOSLEEP,
1504				    B_FALSE);
1505				/* Something is wrong...  Try the next one. */
1506				if (err != 0)
1507					goto next;
1508			}
1509		} else if (ph->sph_type == htons(PARM_FORWARD_TSN)) {
1510			if (sctp_options != NULL)
1511				*sctp_options |= SCTP_PRSCTP_OPTION;
1512		} /* else; skip */
1513
1514next:
1515		ph = sctp_next_parm(ph, &remaining);
1516	}
1517	if (check_saddr) {
1518		sctp_check_saddr(sctp, supp_af, psctp == NULL ? B_FALSE :
1519		    B_TRUE, hdrdaddr);
1520	}
1521	ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL);
1522	/*
1523	 * We have the right address list now, update clustering's
1524	 * knowledge because when we sent the INIT we had just added
1525	 * the address the INIT was sent to.
1526	 */
1527	if (psctp == NULL && cl_sctp_assoc_change != NULL) {
1528		uchar_t	*alist;
1529		size_t	asize;
1530		uchar_t	*dlist;
1531		size_t	dsize;
1532
1533		asize = sizeof (in6_addr_t) * sctp->sctp_nfaddrs;
1534		alist = kmem_alloc(asize, KM_NOSLEEP);
1535		if (alist == NULL) {
1536			SCTP_KSTAT(sctps, sctp_cl_assoc_change);
1537			return (ENOMEM);
1538		}
1539		/*
1540		 * Just include the address the INIT was sent to in the
1541		 * delete list and send the entire faddr list. We could
1542		 * do it differently (i.e include all the addresses in the
1543		 * add list even if it contains the original address OR
1544		 * remove the original address from the add list etc.), but
1545		 * this seems reasonable enough.
1546		 */
1547		dsize = sizeof (in6_addr_t);
1548		dlist = kmem_alloc(dsize, KM_NOSLEEP);
1549		if (dlist == NULL) {
1550			kmem_free(alist, asize);
1551			SCTP_KSTAT(sctps, sctp_cl_assoc_change);
1552			return (ENOMEM);
1553		}
1554		bcopy(&curaddr, dlist, sizeof (curaddr));
1555		sctp_get_faddr_list(sctp, alist, asize);
1556		(*cl_sctp_assoc_change)(sctp->sctp_family, alist, asize,
1557		    sctp->sctp_nfaddrs, dlist, dsize, 1, SCTP_CL_PADDR,
1558		    (cl_sctp_handle_t)sctp);
1559		/* alist and dlist will be freed by the clustering module */
1560	}
1561	return (0);
1562}
1563
1564/*
1565 * Returns 0 if the check failed and the restart should be refused,
1566 * 1 if the check succeeded.
1567 */
1568int
1569sctp_secure_restart_check(mblk_t *pkt, sctp_chunk_hdr_t *ich, uint32_t ports,
1570    int sleep, sctp_stack_t *sctps)
1571{
1572	sctp_faddr_t *fp, *fphead = NULL;
1573	sctp_parm_hdr_t *ph;
1574	ssize_t remaining;
1575	int isv4;
1576	ipha_t *iph;
1577	ip6_t *ip6h;
1578	in6_addr_t hdraddr[1];
1579	int retval = 0;
1580	sctp_tf_t *tf;
1581	sctp_t *sctp;
1582	int compres;
1583	sctp_init_chunk_t *init;
1584	int nadded = 0;
1585
1586	/* extract the address from the IP header */
1587	isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION);
1588	if (isv4) {
1589		iph = (ipha_t *)pkt->b_rptr;
1590		IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdraddr);
1591	} else {
1592		ip6h = (ip6_t *)pkt->b_rptr;
1593		hdraddr[0] = ip6h->ip6_src;
1594	}
1595
1596	/* Walk the params in the INIT [ACK], pulling out addr params */
1597	remaining = ntohs(ich->sch_len) - sizeof (*ich) -
1598	    sizeof (sctp_init_chunk_t);
1599	if (remaining < sizeof (*ph)) {
1600		/* no parameters; restart OK */
1601		return (1);
1602	}
1603	init = (sctp_init_chunk_t *)(ich + 1);
1604	ph = (sctp_parm_hdr_t *)(init + 1);
1605
1606	while (ph != NULL) {
1607		sctp_faddr_t *fpa = NULL;
1608
1609		/* params will have already been byteordered when validating */
1610		if (ph->sph_type == htons(PARM_ADDR4)) {
1611			if (remaining >= PARM_ADDR4_LEN) {
1612				in6_addr_t addr;
1613				IN6_INADDR_TO_V4MAPPED((struct in_addr *)
1614				    (ph + 1), &addr);
1615				fpa = kmem_cache_alloc(sctp_kmem_faddr_cache,
1616				    sleep);
1617				if (fpa == NULL) {
1618					goto done;
1619				}
1620				bzero(fpa, sizeof (*fpa));
1621				fpa->faddr = addr;
1622				fpa->next = NULL;
1623			}
1624		} else if (ph->sph_type == htons(PARM_ADDR6)) {
1625			if (remaining >= PARM_ADDR6_LEN) {
1626				fpa = kmem_cache_alloc(sctp_kmem_faddr_cache,
1627				    sleep);
1628				if (fpa == NULL) {
1629					goto done;
1630				}
1631				bzero(fpa, sizeof (*fpa));
1632				bcopy(ph + 1, &fpa->faddr,
1633				    sizeof (fpa->faddr));
1634				fpa->next = NULL;
1635			}
1636		}
1637		/* link in the new addr, if it was an addr param */
1638		if (fpa != NULL) {
1639			if (fphead == NULL) {
1640				fphead = fpa;
1641			} else {
1642				fpa->next = fphead;
1643				fphead = fpa;
1644			}
1645		}
1646
1647		ph = sctp_next_parm(ph, &remaining);
1648	}
1649
1650	if (fphead == NULL) {
1651		/* no addr parameters; restart OK */
1652		return (1);
1653	}
1654
1655	/*
1656	 * got at least one; make sure the header's addr is
1657	 * in the list
1658	 */
1659	fp = sctp_lookup_faddr_nosctp(fphead, hdraddr);
1660	if (fp == NULL) {
1661		/* not included; add it now */
1662		fp = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep);
1663		if (fp == NULL) {
1664			goto done;
1665		}
1666		bzero(fp, sizeof (*fp));
1667		fp->faddr = *hdraddr;
1668		fp->next = fphead;
1669		fphead = fp;
1670	}
1671
1672	/*
1673	 * Now, we can finally do the check: For each sctp instance
1674	 * on the hash line for ports, compare its faddr set against
1675	 * the new one. If the new one is a strict subset of any
1676	 * existing sctp's faddrs, the restart is OK. However, if there
1677	 * is an overlap, this could be an attack, so return failure.
1678	 * If all sctp's faddrs are disjoint, this is a legitimate new
1679	 * association.
1680	 */
1681	tf = &(sctps->sctps_conn_fanout[SCTP_CONN_HASH(sctps, ports)]);
1682	mutex_enter(&tf->tf_lock);
1683
1684	for (sctp = tf->tf_sctp; sctp; sctp = sctp->sctp_conn_hash_next) {
1685		if (ports != sctp->sctp_ports) {
1686			continue;
1687		}
1688		compres = sctp_compare_faddrsets(fphead, sctp->sctp_faddrs);
1689		if (compres <= SCTP_ADDR_SUBSET) {
1690			retval = 1;
1691			mutex_exit(&tf->tf_lock);
1692			goto done;
1693		}
1694		if (compres == SCTP_ADDR_OVERLAP) {
1695			dprint(1,
1696			    ("new assoc from %x:%x:%x:%x overlaps with %p\n",
1697			    SCTP_PRINTADDR(*hdraddr), (void *)sctp));
1698			/*
1699			 * While we still hold the lock, we need to
1700			 * figure out which addresses have been
1701			 * added so we can include them in the abort
1702			 * we will send back. Since these faddrs will
1703			 * never be used, we overload the rto field
1704			 * here, setting it to 0 if the address was
1705			 * not added, 1 if it was added.
1706			 */
1707			for (fp = fphead; fp; fp = fp->next) {
1708				if (sctp_lookup_faddr(sctp, &fp->faddr)) {
1709					fp->rto = 0;
1710				} else {
1711					fp->rto = 1;
1712					nadded++;
1713				}
1714			}
1715			mutex_exit(&tf->tf_lock);
1716			goto done;
1717		}
1718	}
1719	mutex_exit(&tf->tf_lock);
1720
1721	/* All faddrs are disjoint; legit new association */
1722	retval = 1;
1723
1724done:
1725	/* If are attempted adds, send back an abort listing the addrs */
1726	if (nadded > 0) {
1727		void *dtail;
1728		size_t dlen;
1729
1730		dtail = kmem_alloc(PARM_ADDR6_LEN * nadded, KM_NOSLEEP);
1731		if (dtail == NULL) {
1732			goto cleanup;
1733		}
1734
1735		ph = dtail;
1736		dlen = 0;
1737		for (fp = fphead; fp; fp = fp->next) {
1738			if (fp->rto == 0) {
1739				continue;
1740			}
1741			if (IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1742				ipaddr_t addr4;
1743
1744				ph->sph_type = htons(PARM_ADDR4);
1745				ph->sph_len = htons(PARM_ADDR4_LEN);
1746				IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4);
1747				ph++;
1748				bcopy(&addr4, ph, sizeof (addr4));
1749				ph = (sctp_parm_hdr_t *)
1750				    ((char *)ph + sizeof (addr4));
1751				dlen += PARM_ADDR4_LEN;
1752			} else {
1753				ph->sph_type = htons(PARM_ADDR6);
1754				ph->sph_len = htons(PARM_ADDR6_LEN);
1755				ph++;
1756				bcopy(&fp->faddr, ph, sizeof (fp->faddr));
1757				ph = (sctp_parm_hdr_t *)
1758				    ((char *)ph + sizeof (fp->faddr));
1759				dlen += PARM_ADDR6_LEN;
1760			}
1761		}
1762
1763		/* Send off the abort */
1764		sctp_send_abort(sctp, sctp_init2vtag(ich),
1765		    SCTP_ERR_RESTART_NEW_ADDRS, dtail, dlen, pkt, 0, B_TRUE);
1766
1767		kmem_free(dtail, PARM_ADDR6_LEN * nadded);
1768	}
1769
1770cleanup:
1771	/* Clean up */
1772	if (fphead) {
1773		sctp_faddr_t *fpn;
1774		for (fp = fphead; fp; fp = fpn) {
1775			fpn = fp->next;
1776			kmem_cache_free(sctp_kmem_faddr_cache, fp);
1777		}
1778	}
1779
1780	return (retval);
1781}
1782
1783/*
1784 * Reset any state related to transmitted chunks.
1785 */
1786void
1787sctp_congest_reset(sctp_t *sctp)
1788{
1789	sctp_faddr_t	*fp;
1790	sctp_stack_t	*sctps = sctp->sctp_sctps;
1791	mblk_t		*mp;
1792
1793	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
1794		fp->ssthresh = sctps->sctps_initial_mtu;
1795		SET_CWND(fp, fp->sfa_pmss, sctps->sctps_slow_start_initial);
1796		fp->suna = 0;
1797		fp->pba = 0;
1798	}
1799	/*
1800	 * Clean up the transmit list as well since we have reset accounting
1801	 * on all the fps. Send event upstream, if required.
1802	 */
1803	while ((mp = sctp->sctp_xmit_head) != NULL) {
1804		sctp->sctp_xmit_head = mp->b_next;
1805		mp->b_next = NULL;
1806		if (sctp->sctp_xmit_head != NULL)
1807			sctp->sctp_xmit_head->b_prev = NULL;
1808		sctp_sendfail_event(sctp, mp, 0, B_TRUE);
1809	}
1810	sctp->sctp_xmit_head = NULL;
1811	sctp->sctp_xmit_tail = NULL;
1812	sctp->sctp_xmit_unacked = NULL;
1813
1814	sctp->sctp_unacked = 0;
1815	/*
1816	 * Any control message as well. We will clean-up this list as well.
1817	 * This contains any pending ASCONF request that we have queued/sent.
1818	 * If we do get an ACK we will just drop it. However, given that
1819	 * we are restarting chances are we aren't going to get any.
1820	 */
1821	if (sctp->sctp_cxmit_list != NULL)
1822		sctp_asconf_free_cxmit(sctp, NULL);
1823	sctp->sctp_cxmit_list = NULL;
1824	sctp->sctp_cchunk_pend = 0;
1825
1826	sctp->sctp_rexmitting = B_FALSE;
1827	sctp->sctp_rxt_nxttsn = 0;
1828	sctp->sctp_rxt_maxtsn = 0;
1829
1830	sctp->sctp_zero_win_probe = B_FALSE;
1831}
1832
1833static void
1834sctp_init_faddr(sctp_t *sctp, sctp_faddr_t *fp, in6_addr_t *addr,
1835    mblk_t *timer_mp)
1836{
1837	sctp_stack_t	*sctps = sctp->sctp_sctps;
1838
1839	bcopy(addr, &fp->faddr, sizeof (*addr));
1840	if (IN6_IS_ADDR_V4MAPPED(addr)) {
1841		fp->isv4 = 1;
1842		/* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */
1843		fp->sfa_pmss =
1844		    (sctps->sctps_initial_mtu - sctp->sctp_hdr_len) &
1845		    ~(SCTP_ALIGN - 1);
1846	} else {
1847		fp->isv4 = 0;
1848		fp->sfa_pmss =
1849		    (sctps->sctps_initial_mtu - sctp->sctp_hdr6_len) &
1850		    ~(SCTP_ALIGN - 1);
1851	}
1852	fp->cwnd = sctps->sctps_slow_start_initial * fp->sfa_pmss;
1853	fp->rto = MIN(sctp->sctp_rto_initial, sctp->sctp_init_rto_max);
1854	fp->srtt = -1;
1855	fp->rtt_updates = 0;
1856	fp->strikes = 0;
1857	fp->max_retr = sctp->sctp_pp_max_rxt;
1858	/* Mark it as not confirmed. */
1859	fp->state = SCTP_FADDRS_UNCONFIRMED;
1860	fp->hb_interval = sctp->sctp_hb_interval;
1861	fp->ssthresh = sctps->sctps_initial_ssthresh;
1862	fp->suna = 0;
1863	fp->pba = 0;
1864	fp->acked = 0;
1865	fp->lastactive = lbolt64;
1866	fp->timer_mp = timer_mp;
1867	fp->hb_pending = B_FALSE;
1868	fp->hb_enabled = B_TRUE;
1869	fp->df = 1;
1870	fp->pmtu_discovered = 0;
1871	fp->next = NULL;
1872	fp->ire = NULL;
1873	fp->T3expire = 0;
1874	(void) random_get_pseudo_bytes((uint8_t *)&fp->hb_secret,
1875	    sizeof (fp->hb_secret));
1876	fp->hb_expiry = lbolt64;
1877	fp->rxt_unacked = 0;
1878
1879	sctp_get_ire(sctp, fp);
1880}
1881
1882/*ARGSUSED*/
1883static int
1884faddr_constructor(void *buf, void *arg, int flags)
1885{
1886	sctp_faddr_t *fp = buf;
1887
1888	fp->timer_mp = NULL;
1889	fp->timer_running = 0;
1890
1891	fp->rc_timer_mp = NULL;
1892	fp->rc_timer_running = 0;
1893
1894	return (0);
1895}
1896
1897/*ARGSUSED*/
1898static void
1899faddr_destructor(void *buf, void *arg)
1900{
1901	sctp_faddr_t *fp = buf;
1902
1903	ASSERT(fp->timer_mp == NULL);
1904	ASSERT(fp->timer_running == 0);
1905
1906	ASSERT(fp->rc_timer_mp == NULL);
1907	ASSERT(fp->rc_timer_running == 0);
1908}
1909
1910void
1911sctp_faddr_init(void)
1912{
1913	sctp_kmem_faddr_cache = kmem_cache_create("sctp_faddr_cache",
1914	    sizeof (sctp_faddr_t), 0, faddr_constructor, faddr_destructor,
1915	    NULL, NULL, NULL, 0);
1916}
1917
1918void
1919sctp_faddr_fini(void)
1920{
1921	kmem_cache_destroy(sctp_kmem_faddr_cache);
1922}
1923