xref: /dflybsd-src/sys/netinet6/in6.c (revision 9ebbd47df7abd81e0803cf228d15b3c372ad85db)
1 /*	$FreeBSD: src/sys/netinet6/in6.c,v 1.7.2.9 2002/04/28 05:40:26 suz Exp $	*/
2 /*	$KAME: in6.c,v 1.259 2002/01/21 11:37:50 keiichi Exp $	*/
3 
4 /*
5  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the project nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 /*
34  * Copyright (c) 1982, 1986, 1991, 1993
35  *	The Regents of the University of California.  All rights reserved.
36  *
37  * Redistribution and use in source and binary forms, with or without
38  * modification, are permitted provided that the following conditions
39  * are met:
40  * 1. Redistributions of source code must retain the above copyright
41  *    notice, this list of conditions and the following disclaimer.
42  * 2. Redistributions in binary form must reproduce the above copyright
43  *    notice, this list of conditions and the following disclaimer in the
44  *    documentation and/or other materials provided with the distribution.
45  * 3. Neither the name of the University nor the names of its contributors
46  *    may be used to endorse or promote products derived from this software
47  *    without specific prior written permission.
48  *
49  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
50  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
51  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
52  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
53  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
54  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
55  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
56  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
57  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
58  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
59  * SUCH DAMAGE.
60  *
61  *	@(#)in.c	8.2 (Berkeley) 11/15/93
62  */
63 
64 #include "opt_inet.h"
65 #include "opt_inet6.h"
66 
67 #include <sys/param.h>
68 #include <sys/errno.h>
69 #include <sys/malloc.h>
70 #include <sys/socket.h>
71 #include <sys/socketvar.h>
72 #include <sys/sockio.h>
73 #include <sys/systm.h>
74 #include <sys/proc.h>
75 #include <sys/priv.h>
76 #include <sys/time.h>
77 #include <sys/kernel.h>
78 #include <sys/syslog.h>
79 #include <sys/jail.h>
80 
81 #include <sys/thread2.h>
82 #include <sys/msgport2.h>
83 
84 #include <net/if.h>
85 #include <net/if_types.h>
86 #include <net/route.h>
87 #include <net/if_dl.h>
88 #include <net/netmsg2.h>
89 #include <net/netisr2.h>
90 
91 #include <netinet/in.h>
92 #include <netinet/in_var.h>
93 #include <netinet/if_ether.h>
94 #include <netinet/in_systm.h>
95 #include <netinet/ip.h>
96 #include <netinet/in_pcb.h>
97 
98 #include <netinet/ip6.h>
99 #include <netinet6/ip6_var.h>
100 #include <netinet6/nd6.h>
101 #include <netinet6/mld6_var.h>
102 #include <netinet6/ip6_mroute.h>
103 #include <netinet6/in6_ifattach.h>
104 #include <netinet6/scope6_var.h>
105 #include <netinet6/in6_pcb.h>
106 #include <netinet6/in6_var.h>
107 
108 #include <net/net_osdep.h>
109 
110 /*
111  * Definitions of some costant IP6 addresses.
112  */
113 const struct in6_addr kin6addr_any = IN6ADDR_ANY_INIT;
114 const struct in6_addr kin6addr_loopback = IN6ADDR_LOOPBACK_INIT;
115 const struct in6_addr kin6addr_nodelocal_allnodes =
116 	IN6ADDR_NODELOCAL_ALLNODES_INIT;
117 const struct in6_addr kin6addr_linklocal_allnodes =
118 	IN6ADDR_LINKLOCAL_ALLNODES_INIT;
119 const struct in6_addr kin6addr_linklocal_allrouters =
120 	IN6ADDR_LINKLOCAL_ALLROUTERS_INIT;
121 
122 const struct in6_addr in6mask0 = IN6MASK0;
123 const struct in6_addr in6mask32 = IN6MASK32;
124 const struct in6_addr in6mask64 = IN6MASK64;
125 const struct in6_addr in6mask96 = IN6MASK96;
126 const struct in6_addr in6mask128 = IN6MASK128;
127 
128 const struct sockaddr_in6 sa6_any = {sizeof(sa6_any), AF_INET6,
129 				     0, 0, IN6ADDR_ANY_INIT, 0};
130 
131 static int in6_lifaddr_ioctl (u_long, caddr_t, struct ifnet *,
132 	     struct thread *);
133 static int in6_ifinit (struct ifnet *, struct in6_ifaddr *,
134 			   struct sockaddr_in6 *, int);
135 static void in6_unlink_ifa (struct in6_ifaddr *, struct ifnet *);
136 static void in6_ifloop_request_callback(int, int, struct rt_addrinfo *, struct rtentry *, void *);
137 
138 static void	in6_control_internal_dispatch(netmsg_t);
139 static int	in6_control_internal(u_long, caddr_t, struct ifnet *,
140 		    struct thread *);
141 
142 struct in6_multihead in6_multihead;	/* XXX BSS initialization */
143 
144 int	(*faithprefix_p)(struct in6_addr *);
145 
146 /*
147  * Subroutine for in6_ifaddloop() and in6_ifremloop().
148  * This routine does actual work.
149  */
150 static void
151 in6_ifloop_request(int cmd, struct ifaddr *ifa)
152 {
153 	struct sockaddr_in6 all1_sa;
154         struct rt_addrinfo rtinfo;
155 	int error;
156 
157 	bzero(&all1_sa, sizeof(all1_sa));
158 	all1_sa.sin6_family = AF_INET6;
159 	all1_sa.sin6_len = sizeof(struct sockaddr_in6);
160 	all1_sa.sin6_addr = in6mask128;
161 
162 	/*
163 	 * We specify the address itself as the gateway, and set the
164 	 * RTF_LLINFO flag, so that the corresponding host route would have
165 	 * the flag, and thus applications that assume traditional behavior
166 	 * would be happy.  Note that we assume the caller of the function
167 	 * (probably implicitly) set nd6_rtrequest() to ifa->ifa_rtrequest,
168 	 * which changes the outgoing interface to the loopback interface.
169 	 */
170 	bzero(&rtinfo, sizeof(struct rt_addrinfo));
171 	rtinfo.rti_info[RTAX_DST] = ifa->ifa_addr;
172 	rtinfo.rti_info[RTAX_GATEWAY] = ifa->ifa_addr;
173 	rtinfo.rti_info[RTAX_NETMASK] = (struct sockaddr *)&all1_sa;
174 	rtinfo.rti_flags = RTF_UP|RTF_HOST|RTF_LLINFO;
175 
176 	error = rtrequest1_global(cmd, &rtinfo,
177 	    in6_ifloop_request_callback, ifa, RTREQ_PRIO_NORM);
178 	if (error != 0) {
179 		log(LOG_ERR, "in6_ifloop_request: "
180 		    "%s operation failed for %s (errno=%d)\n",
181 		    cmd == RTM_ADD ? "ADD" : "DELETE",
182 		    ip6_sprintf(&((struct in6_ifaddr *)ifa)->ia_addr.sin6_addr),
183 		    error);
184 	}
185 }
186 
187 static void
188 in6_ifloop_request_callback(int cmd, int error, struct rt_addrinfo *rtinfo,
189 			    struct rtentry *rt, void *arg)
190 {
191 	struct ifaddr *ifa = arg;
192 
193 	if (error)
194 		goto done;
195 
196 	/*
197 	 * Make sure rt_ifa be equal to IFA, the second argument of the
198 	 * function.
199 	 * We need this because when we refer to rt_ifa->ia6_flags in
200 	 * ip6_input, we assume that the rt_ifa points to the address instead
201 	 * of the loopback address.
202 	 */
203 	if (cmd == RTM_ADD && rt && ifa != rt->rt_ifa) {
204 		++rt->rt_refcnt;
205 		IFAFREE(rt->rt_ifa);
206 		IFAREF(ifa);
207 		rt->rt_ifa = ifa;
208 		--rt->rt_refcnt;
209 	}
210 
211 	/*
212 	 * Report the addition/removal of the address to the routing socket.
213 	 * XXX: since we called rtinit for a p2p interface with a destination,
214 	 *      we end up reporting twice in such a case.  Should we rather
215 	 *      omit the second report?
216 	 */
217 	if (rt) {
218 		if (mycpuid == 0)
219 			rt_newaddrmsg(cmd, ifa, error, rt);
220 		if (cmd == RTM_DELETE) {
221 			if (rt->rt_refcnt == 0) {
222 				++rt->rt_refcnt;
223 				rtfree(rt);
224 			}
225 		}
226 	}
227 done:
228 	/* no way to return any new error */
229 	;
230 }
231 
232 /*
233  * Add ownaddr as loopback rtentry.  We previously add the route only if
234  * necessary (ex. on a p2p link).  However, since we now manage addresses
235  * separately from prefixes, we should always add the route.  We can't
236  * rely on the cloning mechanism from the corresponding interface route
237  * any more.
238  */
239 void
240 in6_ifaddloop(struct ifaddr *ifa)
241 {
242 	struct rtentry *rt;
243 
244 	/* If there is no loopback entry, allocate one. */
245 	rt = rtpurelookup(ifa->ifa_addr);
246 	if (rt == NULL || !(rt->rt_flags & RTF_HOST) ||
247 	    !(rt->rt_ifp->if_flags & IFF_LOOPBACK))
248 		in6_ifloop_request(RTM_ADD, ifa);
249 	if (rt != NULL)
250 		rt->rt_refcnt--;
251 }
252 
253 /*
254  * Remove loopback rtentry of ownaddr generated by in6_ifaddloop(),
255  * if it exists.
256  */
257 void
258 in6_ifremloop(struct ifaddr *ifa)
259 {
260 	struct in6_ifaddr *ia;
261 	struct rtentry *rt;
262 	int ia_count = 0;
263 
264 	/*
265 	 * Some of BSD variants do not remove cloned routes
266 	 * from an interface direct route, when removing the direct route
267 	 * (see comments in net/net_osdep.h).  Even for variants that do remove
268 	 * cloned routes, they could fail to remove the cloned routes when
269 	 * we handle multple addresses that share a common prefix.
270 	 * So, we should remove the route corresponding to the deleted address
271 	 * regardless of the result of in6_is_ifloop_auto().
272 	 */
273 
274 	/*
275 	 * Delete the entry only if exact one ifa exists.  More than one ifa
276 	 * can exist if we assign a same single address to multiple
277 	 * (probably p2p) interfaces.
278 	 * XXX: we should avoid such a configuration in IPv6...
279 	 */
280 	for (ia = in6_ifaddr; ia; ia = ia->ia_next) {
281 		if (IN6_ARE_ADDR_EQUAL(IFA_IN6(ifa), &ia->ia_addr.sin6_addr)) {
282 			ia_count++;
283 			if (ia_count > 1)
284 				break;
285 		}
286 	}
287 
288 	if (ia_count == 1) {
289 		/*
290 		 * Before deleting, check if a corresponding loopbacked host
291 		 * route surely exists.  With this check, we can avoid to
292 		 * delete an interface direct route whose destination is same
293 		 * as the address being removed.  This can happen when remofing
294 		 * a subnet-router anycast address on an interface attahced
295 		 * to a shared medium.
296 		 */
297 		rt = rtpurelookup(ifa->ifa_addr);
298 		if (rt != NULL && (rt->rt_flags & RTF_HOST) &&
299 		    (rt->rt_ifp->if_flags & IFF_LOOPBACK)) {
300 			rt->rt_refcnt--;
301 			in6_ifloop_request(RTM_DELETE, ifa);
302 		}
303 	}
304 }
305 
306 int
307 in6_mask2len(const struct in6_addr *mask, const u_char *lim0)
308 {
309 	int x = 0, y;
310 	const u_char *lim = lim0, *p;
311 
312 	if (lim0 == NULL ||
313 	    lim0 - (const u_char *)mask > sizeof(*mask)) {
314 		/* Ignore the scope_id part */
315 		lim = (const u_char *)mask + sizeof(*mask);
316 	}
317 	for (p = (const u_char *)mask; p < lim; x++, p++) {
318 		if (*p != 0xff)
319 			break;
320 	}
321 	y = 0;
322 	if (p < lim) {
323 		for (y = 0; y < 8; y++) {
324 			if ((*p & (0x80 >> y)) == 0)
325 				break;
326 		}
327 	}
328 
329 	/*
330 	 * When the limit pointer is given, do a stricter check on the
331 	 * remaining bits.
332 	 */
333 	if (p < lim) {
334 		if (y != 0 && (*p & (0x00ff >> y)) != 0)
335 			return (-1);
336 		for (p = p + 1; p < lim; p++)
337 			if (*p != 0)
338 				return (-1);
339 	}
340 
341 	return x * 8 + y;
342 }
343 
344 #define ifa2ia6(ifa)	((struct in6_ifaddr *)(ifa))
345 #define ia62ifa(ia6)	(&((ia6)->ia_ifa))
346 
347 void
348 in6_control_dispatch(netmsg_t msg)
349 {
350 	int error;
351 
352 	error = in6_control(msg->control.nm_cmd,
353 			    msg->control.nm_data,
354 			    msg->control.nm_ifp,
355 			    msg->control.nm_td);
356 	lwkt_replymsg(&msg->control.base.lmsg, error);
357 }
358 
359 int
360 in6_control(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
361 {
362 	struct netmsg_pru_control msg;
363 
364 	switch (cmd) {
365 	case SIOCSIFPREFIX_IN6:
366 	case SIOCDIFPREFIX_IN6:
367 	case SIOCAIFPREFIX_IN6:
368 	case SIOCCIFPREFIX_IN6:
369 	case SIOCSGIFPREFIX_IN6:
370 	case SIOCGIFPREFIX_IN6:
371 		log(LOG_NOTICE, "prefix ioctls are now invalidated. "
372 		    "please use ifconfig.\n");
373 		return (EOPNOTSUPP);
374 
375 	case SIOCSIFADDR_IN6:
376 	case SIOCSIFDSTADDR_IN6:
377 	case SIOCSIFNETMASK_IN6:
378 		/*
379 		 * Since IPv6 allows a node to assign multiple addresses
380 		 * on a single interface, SIOCSIFxxx ioctls are not suitable
381 		 * and should be unused.
382 		 */
383 		/* We decided to obsolete this command (20000704) */
384 		return (EINVAL);
385 
386 	case SIOCSIFADDR:
387 	case SIOCSIFDSTADDR:
388 	case SIOCSIFBRDADDR:
389 	case SIOCSIFNETMASK:
390 		/*
391 		 * Do not pass those ioctl to driver handler since they are not
392 		 * properly setup.  Instead just error out.
393 		 */
394 		return (EOPNOTSUPP);
395 
396 	/* mroute */
397 	case SIOCGETSGCNT_IN6:
398 	case SIOCGETMIFCNT_IN6:
399 	/* srcsel policy */
400 	case SIOCAADDRCTL_POLICY:
401 	case SIOCDADDRCTL_POLICY:
402 	/* nd6 */
403 	case SIOCSNDFLUSH_IN6:
404 	case SIOCSPFXFLUSH_IN6:
405 	case SIOCSRTRFLUSH_IN6:
406 	case SIOCSDEFIFACE_IN6:
407 	case SIOCSIFINFO_FLAGS:
408 	case OSIOCGIFINFO_IN6:
409 	case SIOCGIFINFO_IN6:
410 	case SIOCGDRLST_IN6:
411 	case SIOCGPRLST_IN6:
412 	case SIOCGNBRINFO_IN6:
413 	case SIOCGDEFIFACE_IN6:
414 	/* scope6 */
415 	case SIOCSSCOPE6:
416 	case SIOCGSCOPE6:
417 	case SIOCGSCOPE6DEF:
418 	/* change address */
419 	case SIOCALIFADDR:
420 	case SIOCDLIFADDR:
421 	case SIOCSIFALIFETIME_IN6:
422 	case SIOCAIFADDR_IN6:
423 	case SIOCDIFADDR_IN6:
424 		/*
425 		 * Dispatch these SIOCs to netisr0.
426 		 */
427 		netmsg_init(&msg.base, NULL, &curthread->td_msgport, 0,
428 		    in6_control_internal_dispatch);
429 		msg.nm_cmd = cmd;
430 		msg.nm_data = data;
431 		msg.nm_ifp = ifp;
432 		msg.nm_td = td;
433 		lwkt_domsg(netisr_cpuport(0), &msg.base.lmsg, 0);
434 		return msg.base.lmsg.ms_error;
435 
436 	default:
437 		return in6_control_internal(cmd, data, ifp, td);
438 	}
439 }
440 
441 static void
442 in6_control_internal_dispatch(netmsg_t msg)
443 {
444 	int error;
445 
446 	error = in6_control_internal(msg->control.nm_cmd, msg->control.nm_data,
447 	    msg->control.nm_ifp, msg->control.nm_td);
448 	lwkt_replymsg(&msg->lmsg, error);
449 }
450 
451 static int
452 in6_control_internal(u_long cmd, caddr_t data, struct ifnet *ifp,
453     struct thread *td)
454 {
455 	struct in6_ifreq *ifr = (struct in6_ifreq *)data;
456 	struct in6_ifaddr *ia = NULL;
457 	struct in6_aliasreq *ifra = (struct in6_aliasreq *)data;
458 	struct in6_ifextra *xtra;
459 	boolean_t privileged;
460 	int error;
461 
462 	privileged = FALSE;
463 	if (priv_check(td, PRIV_ROOT) == 0)
464 		privileged = TRUE;
465 
466 	switch (cmd) {
467 	case SIOCALIFADDR:
468 	case SIOCDLIFADDR:
469 		if (!privileged)
470 			return (EPERM);
471 		/* FALLTHROUGH */
472 	case SIOCGLIFADDR:
473 		if (ifp == NULL)
474 			return (EOPNOTSUPP);
475 		return in6_lifaddr_ioctl(cmd, data, ifp, td);
476 	}
477 
478 	switch (cmd) {
479 	case SIOCGETSGCNT_IN6:
480 	case SIOCGETMIFCNT_IN6:
481 		return (mrt6_ioctl(cmd, data));
482 	}
483 
484 	switch(cmd) {
485 	case SIOCAADDRCTL_POLICY:
486 	case SIOCDADDRCTL_POLICY:
487 		if (!privileged)
488 			return (EPERM);
489 		return (in6_src_ioctl(cmd, data));
490 	}
491 
492 	if (ifp == NULL)
493 		return (EOPNOTSUPP);
494 
495 	switch (cmd) {
496 	case SIOCSNDFLUSH_IN6:
497 	case SIOCSPFXFLUSH_IN6:
498 	case SIOCSRTRFLUSH_IN6:
499 	case SIOCSDEFIFACE_IN6:
500 	case SIOCSIFINFO_FLAGS:
501 		if (!privileged)
502 			return (EPERM);
503 		/* FALLTHROUGH */
504 	case OSIOCGIFINFO_IN6:
505 	case SIOCGIFINFO_IN6:
506 	case SIOCGDRLST_IN6:
507 	case SIOCGPRLST_IN6:
508 	case SIOCGNBRINFO_IN6:
509 	case SIOCGDEFIFACE_IN6:
510 		return (nd6_ioctl(cmd, data, ifp));
511 	}
512 
513 	switch (cmd) {
514 	case SIOCSSCOPE6:
515 		if (!privileged)
516 			return (EPERM);
517 		return (scope6_set(ifp,
518 			(struct scope6_id *)ifr->ifr_ifru.ifru_scope_id));
519 
520 	case SIOCGSCOPE6:
521 		return (scope6_get(ifp,
522 			(struct scope6_id *)ifr->ifr_ifru.ifru_scope_id));
523 
524 	case SIOCGSCOPE6DEF:
525 		return (scope6_get_default((struct scope6_id *)
526 			ifr->ifr_ifru.ifru_scope_id));
527 	}
528 
529 	/*
530 	 * Find address for this interface, if it exists.
531 	 */
532 	if (ifra->ifra_addr.sin6_family == AF_INET6) { /* XXX */
533 		struct sockaddr_in6 *sa6 =
534 		    (struct sockaddr_in6 *)&ifra->ifra_addr;
535 
536 		if (IN6_IS_ADDR_LINKLOCAL(&sa6->sin6_addr)) {
537 			if (sa6->sin6_addr.s6_addr16[1] == 0) {
538 				/* Link ID is not embedded by the user */
539 				sa6->sin6_addr.s6_addr16[1] =
540 				    htons(ifp->if_index);
541 			} else if (sa6->sin6_addr.s6_addr16[1] !=
542 			    htons(ifp->if_index)) {
543 				/* Link ID contradicts */
544 				return (EINVAL);
545 			}
546 			if (sa6->sin6_scope_id) {
547 				if (sa6->sin6_scope_id !=
548 				    (u_int32_t)ifp->if_index)
549 					return (EINVAL);
550 				sa6->sin6_scope_id = 0; /* XXX: good way? */
551 			}
552 		}
553 		ia = in6ifa_ifpwithaddr(ifp, &ifra->ifra_addr.sin6_addr);
554 	}
555 
556 	switch (cmd) {
557 	case SIOCDIFADDR_IN6:
558 		/*
559 		 * For IPv4, we look for existing in_ifaddr here to allow
560 		 * "ifconfig if0 delete" to remove first IPv4 address on the
561 		 * interface.  For IPv6, as the spec allow multiple interface
562 		 * address from the day one, we consider "remove the first one"
563 		 * semantics to be not preferable.
564 		 */
565 		if (ia == NULL)
566 			return (EADDRNOTAVAIL);
567 		/* FALLTHROUGH */
568 	case SIOCAIFADDR_IN6:
569 		/*
570 		 * We always require users to specify a valid IPv6 address for
571 		 * the corresponding operation.
572 		 */
573 		if (ifra->ifra_addr.sin6_family != AF_INET6 ||
574 		    ifra->ifra_addr.sin6_len != sizeof(struct sockaddr_in6))
575 			return (EAFNOSUPPORT);
576 		if (!privileged)
577 			return (EPERM);
578 		break;
579 
580 	case SIOCGIFADDR_IN6:
581 		/* This interface is basically deprecated.  Use SIOCGIFCONF. */
582 		/* FALLTHROUGH */
583 	case SIOCGIFAFLAG_IN6:
584 	case SIOCGIFNETMASK_IN6:
585 	case SIOCGIFDSTADDR_IN6:
586 	case SIOCGIFALIFETIME_IN6:
587 		/* Must think again about its semantics */
588 		if (ia == NULL)
589 			return (EADDRNOTAVAIL);
590 		break;
591 
592 	case SIOCSIFALIFETIME_IN6:
593 	    {
594 		const struct in6_addrlifetime *lt;
595 
596 		if (!privileged)
597 			return (EPERM);
598 		if (ia == NULL)
599 			return (EADDRNOTAVAIL);
600 		/* Sanity for overflow - beware unsigned */
601 		lt = &ifr->ifr_ifru.ifru_lifetime;
602 		if (lt->ia6t_vltime != ND6_INFINITE_LIFETIME &&
603 		    lt->ia6t_vltime + time_uptime < time_uptime)
604 			return EINVAL;
605 		if (lt->ia6t_pltime != ND6_INFINITE_LIFETIME &&
606 		    lt->ia6t_pltime + time_uptime < time_uptime)
607 			return EINVAL;
608 		break;
609 	    }
610 	}
611 
612 	switch (cmd) {
613 	case SIOCGIFADDR_IN6:
614 		ifr->ifr_addr = ia->ia_addr;
615 		break;
616 
617 	case SIOCGIFDSTADDR_IN6:
618 		if (!(ifp->if_flags & IFF_POINTOPOINT))
619 			return (EINVAL);
620 		/*
621 		 * XXX: Should we check if ifa_dstaddr is NULL and return
622 		 * an error?
623 		 */
624 		ifr->ifr_dstaddr = ia->ia_dstaddr;
625 		break;
626 
627 	case SIOCGIFNETMASK_IN6:
628 		ifr->ifr_addr = ia->ia_prefixmask;
629 		break;
630 
631 	case SIOCGIFAFLAG_IN6:
632 		ifr->ifr_ifru.ifru_flags6 = ia->ia6_flags;
633 		break;
634 
635 	case SIOCGIFSTAT_IN6:
636 		if ((xtra = ifp->if_afdata[AF_INET6]) == NULL)
637 			return EINVAL;
638 		bzero(&ifr->ifr_ifru.ifru_stat,
639 		    sizeof(ifr->ifr_ifru.ifru_stat));
640 		ifr->ifr_ifru.ifru_stat = *xtra->in6_ifstat;
641 		break;
642 
643 	case SIOCGIFSTAT_ICMP6:
644 		if ((xtra = ifp->if_afdata[AF_INET6]) == NULL)
645 			return EINVAL;
646 		bzero(&ifr->ifr_ifru.ifru_stat,
647 		    sizeof(ifr->ifr_ifru.ifru_icmp6stat));
648 		ifr->ifr_ifru.ifru_icmp6stat = *xtra->icmp6_ifstat;
649 		break;
650 
651 	case SIOCGIFALIFETIME_IN6:
652 		ifr->ifr_ifru.ifru_lifetime = ia->ia6_lifetime;
653 		break;
654 
655 	case SIOCSIFALIFETIME_IN6:
656 		ia->ia6_lifetime = ifr->ifr_ifru.ifru_lifetime;
657 		if (ia->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) {
658 			ia->ia6_lifetime.ia6t_expire =
659 			    time_uptime + ia->ia6_lifetime.ia6t_vltime;
660 		} else {
661 			ia->ia6_lifetime.ia6t_expire = 0;
662 		}
663 		if (ia->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) {
664 			ia->ia6_lifetime.ia6t_preferred =
665 			    time_uptime + ia->ia6_lifetime.ia6t_pltime;
666 		} else {
667 			ia->ia6_lifetime.ia6t_preferred = 0;
668 		}
669 		break;
670 
671 	case SIOCAIFADDR_IN6:
672 	{
673 		int i, error = 0, iaIsNew;
674 		struct nd_prefix pr0, *pr;
675 
676 		if (ia != NULL)
677 			iaIsNew = 0;
678 		else
679 			iaIsNew = 1;
680 
681 		/*
682 		 * First, make or update the interface address structure,
683 		 * and link it to the list.
684 		 */
685 		if ((error = in6_update_ifa(ifp, ifra, ia)) != 0)
686 			return (error);
687 
688 		/*
689 		 * Then, make the prefix on-link on the interface.
690 		 * XXX: We'd rather create the prefix before the address, but
691 		 * we need at least one address to install the corresponding
692 		 * interface route, so we configure the address first.
693 		 */
694 
695 		/*
696 		 * Convert mask to prefix length (prefixmask has already
697 		 * been validated in in6_update_ifa().
698 		 */
699 		bzero(&pr0, sizeof(pr0));
700 		pr0.ndpr_ifp = ifp;
701 		pr0.ndpr_plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr,
702 		    NULL);
703 		if (pr0.ndpr_plen == 128)
704 			break;	/* no need to install a host route. */
705 		pr0.ndpr_prefix = ifra->ifra_addr;
706 		pr0.ndpr_mask = ifra->ifra_prefixmask.sin6_addr;
707 		/* Apply the mask for safety. */
708 		for (i = 0; i < 4; i++) {
709 			pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &=
710 			    ifra->ifra_prefixmask.sin6_addr.s6_addr32[i];
711 		}
712 		/*
713 		 * XXX: Since we don't have an API to set prefix (not address)
714 		 * lifetimes, we just use the same lifetimes as addresses.
715 		 * The (temporarily) installed lifetimes can be overridden by
716 		 * later advertised RAs (when accept_rtadv is non 0), which is
717 		 * an intended behavior.
718 		 */
719 		pr0.ndpr_raf_onlink = 1; /* should be configurable? */
720 		pr0.ndpr_raf_auto =
721 		    ((ifra->ifra_flags & IN6_IFF_AUTOCONF) != 0);
722 		pr0.ndpr_vltime = ifra->ifra_lifetime.ia6t_vltime;
723 		pr0.ndpr_pltime = ifra->ifra_lifetime.ia6t_pltime;
724 
725 		/* Add the prefix if there's one. */
726 		if ((pr = nd6_prefix_lookup(&pr0)) == NULL) {
727 			/*
728 			 * nd6_prelist_add will install the corresponding
729 			 * interface route.
730 			 */
731 			if ((error = nd6_prelist_add(&pr0, NULL, &pr)) != 0)
732 				return (error);
733 			if (pr == NULL) {
734 				log(LOG_ERR, "nd6_prelist_add succeeded but "
735 				    "no prefix\n");
736 				return (EINVAL); /* XXX panic here? */
737 			}
738 		}
739 
740 		ia = in6ifa_ifpwithaddr(ifp, &ifra->ifra_addr.sin6_addr);
741 		if (ia == NULL) {
742 		    	/* XXX: This should not happen! */
743 			log(LOG_ERR, "in6_control: addition succeeded, but"
744 			    " no ifaddr\n");
745 		} else {
746 			if ((ia->ia6_flags & IN6_IFF_AUTOCONF) &&
747 			    ia->ia6_ndpr == NULL) {
748 				/*
749 				 * New autoconf address
750 				 */
751 				ia->ia6_ndpr = pr;
752 				pr->ndpr_refcnt++;
753 
754 				/*
755 				 * If this is the first autoconf address from
756 				 * the prefix, create a temporary address
757 				 * as well (when specified).
758 				 */
759 				if (ip6_use_tempaddr && pr->ndpr_refcnt == 1) {
760 					int e;
761 
762 					if ((e = in6_tmpifadd(ia, 1)) != 0) {
763 						log(LOG_NOTICE, "in6_control: "
764 						    "failed to create a "
765 						    "temporary address, "
766 						    "errno=%d\n", e);
767 					}
768 				}
769 			}
770 
771 			/*
772 			 * This might affect the status of autoconfigured
773 			 * addresses, that is, this address might make
774 			 * other addresses detached.
775 			 */
776 			pfxlist_onlink_check();
777 		}
778 		if (error == 0 && ia) {
779 			EVENTHANDLER_INVOKE(ifaddr_event, ifp,
780 			    iaIsNew ? IFADDR_EVENT_ADD : IFADDR_EVENT_CHANGE,
781 			    &ia->ia_ifa);
782 		}
783 		break;
784 	}
785 
786 	case SIOCDIFADDR_IN6:
787 	{
788 		int i = 0;
789 		struct nd_prefix pr0, *pr;
790 
791 		/*
792 		 * If the address being deleted is the only one that owns
793 		 * the corresponding prefix, expire the prefix as well.
794 		 * XXX: Theoretically, we don't have to warry about such
795 		 * relationship, since we separate the address management
796 		 * and the prefix management.  We do this, however, to provide
797 		 * as much backward compatibility as possible in terms of
798 		 * the ioctl operation.
799 		 */
800 		bzero(&pr0, sizeof(pr0));
801 		pr0.ndpr_ifp = ifp;
802 		pr0.ndpr_plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr,
803 		    NULL);
804 		if (pr0.ndpr_plen == 128)
805 			goto purgeaddr;
806 		pr0.ndpr_prefix = ia->ia_addr;
807 		pr0.ndpr_mask = ia->ia_prefixmask.sin6_addr;
808 		for (i = 0; i < 4; i++) {
809 			pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &=
810 			    ia->ia_prefixmask.sin6_addr.s6_addr32[i];
811 		}
812 		/*
813 		 * The logic of the following condition is a bit complicated.
814 		 * We expire the prefix when
815 		 * 1. The address obeys autoconfiguration and it is the
816 		 *    only owner of the associated prefix, or
817 		 * 2. The address does not obey autoconf and there is no
818 		 *    other owner of the prefix.
819 		 */
820 		if ((pr = nd6_prefix_lookup(&pr0)) != NULL &&
821 		    (((ia->ia6_flags & IN6_IFF_AUTOCONF) &&
822 		      pr->ndpr_refcnt == 1) ||
823 		     (!(ia->ia6_flags & IN6_IFF_AUTOCONF) &&
824 		      pr->ndpr_refcnt == 0)))
825 			pr->ndpr_expire = 1; /* XXX: just for expiration */
826 
827 purgeaddr:
828 		EVENTHANDLER_INVOKE(ifaddr_event, ifp, IFADDR_EVENT_DELETE,
829 		    &ia->ia_ifa);
830 		in6_purgeaddr(&ia->ia_ifa);
831 		break;
832 	}
833 
834 	default:
835 		if (ifp->if_ioctl == NULL)
836 			return (EOPNOTSUPP);
837 		ifnet_serialize_all(ifp);
838 		error = ifp->if_ioctl(ifp, cmd, data, td->td_proc->p_ucred);
839 		ifnet_deserialize_all(ifp);
840 		return (error);
841 	}
842 
843 	return (0);
844 }
845 
846 /*
847  * Update parameters of an IPv6 interface address.
848  * If necessary, a new entry is created and linked into address chains.
849  * This function is separated from in6_control().
850  * XXX: should this be performed under splnet()?
851  */
852 int
853 in6_update_ifa(struct ifnet *ifp, struct in6_aliasreq *ifra,
854 	       struct in6_ifaddr *ia)
855 {
856 	int error = 0, hostIsNew = 0, plen = -1;
857 	struct in6_ifaddr *oia;
858 	struct sockaddr_in6 dst6;
859 	struct in6_addrlifetime *lt;
860 
861 	/* Validate parameters */
862 	if (ifp == NULL || ifra == NULL) /* this maybe redundant */
863 		return (EINVAL);
864 
865 	/*
866 	 * The destination address for a p2p link must have a family
867 	 * of AF_UNSPEC or AF_INET6.
868 	 */
869 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
870 	    ifra->ifra_dstaddr.sin6_family != AF_INET6 &&
871 	    ifra->ifra_dstaddr.sin6_family != AF_UNSPEC)
872 		return (EAFNOSUPPORT);
873 	/*
874 	 * validate ifra_prefixmask.  don't check sin6_family, netmask
875 	 * does not carry fields other than sin6_len.
876 	 */
877 	if (ifra->ifra_prefixmask.sin6_len > sizeof(struct sockaddr_in6))
878 		return (EINVAL);
879 	/*
880 	 * Because the IPv6 address architecture is classless, we require
881 	 * users to specify a (non 0) prefix length (mask) for a new address.
882 	 * We also require the prefix (when specified) mask is valid, and thus
883 	 * reject a non-consecutive mask.
884 	 */
885 	if (ia == NULL && ifra->ifra_prefixmask.sin6_len == 0)
886 		return (EINVAL);
887 	if (ifra->ifra_prefixmask.sin6_len != 0) {
888 		plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr,
889 				    (u_char *)&ifra->ifra_prefixmask +
890 				    ifra->ifra_prefixmask.sin6_len);
891 		if (plen <= 0)
892 			return (EINVAL);
893 	}
894 	else {
895 		/*
896 		 * In this case, ia must not be NULL.  We just use its prefix
897 		 * length.
898 		 */
899 		plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL);
900 	}
901 	/*
902 	 * If the destination address on a p2p interface is specified,
903 	 * and the address is a scoped one, validate/set the scope
904 	 * zone identifier.
905 	 */
906 	dst6 = ifra->ifra_dstaddr;
907 	if ((ifp->if_flags & (IFF_POINTOPOINT|IFF_LOOPBACK)) &&
908 	    (dst6.sin6_family == AF_INET6)) {
909 		int scopeid;
910 
911 		if ((error = in6_recoverscope(&dst6,
912 					      &ifra->ifra_dstaddr.sin6_addr,
913 					      ifp)) != 0)
914 			return (error);
915 		scopeid = in6_addr2scopeid(ifp, &dst6.sin6_addr);
916 		if (dst6.sin6_scope_id == 0) /* user omit to specify the ID. */
917 			dst6.sin6_scope_id = scopeid;
918 		else if (dst6.sin6_scope_id != scopeid)
919 			return (EINVAL); /* scope ID mismatch. */
920 		if ((error = in6_embedscope(&dst6.sin6_addr, &dst6, NULL, NULL))
921 		    != 0)
922 			return (error);
923 		dst6.sin6_scope_id = 0; /* XXX */
924 	}
925 	/*
926 	 * The destination address can be specified only for a p2p or a
927 	 * loopback interface.  If specified, the corresponding prefix length
928 	 * must be 128.
929 	 */
930 	if (ifra->ifra_dstaddr.sin6_family == AF_INET6) {
931 		if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) == 0) {
932 			/* XXX: noisy message */
933 			log(LOG_INFO, "in6_update_ifa: a destination can be "
934 			    "specified for a p2p or a loopback IF only\n");
935 			return (EINVAL);
936 		}
937 		if (plen != 128) {
938 			/*
939 			 * The following message seems noisy, but we dare to
940 			 * add it for diagnosis.
941 			 */
942 			log(LOG_INFO, "in6_update_ifa: prefixlen must be 128 "
943 			    "when dstaddr is specified\n");
944 			return (EINVAL);
945 		}
946 	}
947 	/* lifetime consistency check */
948 	lt = &ifra->ifra_lifetime;
949 	if (lt->ia6t_vltime != ND6_INFINITE_LIFETIME
950 	    && lt->ia6t_vltime + time_uptime < time_uptime) {
951 		return EINVAL;
952 	}
953 	if (lt->ia6t_vltime == 0) {
954 		/*
955 		 * the following log might be noisy, but this is a typical
956 		 * configuration mistake or a tool's bug.
957 		 */
958 		log(LOG_INFO,
959 		    "in6_update_ifa: valid lifetime is 0 for %s\n",
960 		    ip6_sprintf(&ifra->ifra_addr.sin6_addr));
961 	}
962 	if (lt->ia6t_pltime != ND6_INFINITE_LIFETIME
963 	    && lt->ia6t_pltime + time_uptime < time_uptime) {
964 		return EINVAL;
965 	}
966 
967 	/*
968 	 * If this is a new address, allocate a new ifaddr and link it
969 	 * into chains.
970 	 */
971 	if (ia == NULL) {
972 		hostIsNew = 1;
973 		ia = ifa_create(sizeof(*ia));
974 
975 		/* Initialize the address and masks */
976 		ia->ia_ifa.ifa_addr = (struct sockaddr *)&ia->ia_addr;
977 		ia->ia_addr.sin6_family = AF_INET6;
978 		ia->ia_addr.sin6_len = sizeof(ia->ia_addr);
979 		if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) != 0) {
980 			/*
981 			 * XXX: some functions expect that ifa_dstaddr is not
982 			 * NULL for p2p interfaces.
983 			 */
984 			ia->ia_ifa.ifa_dstaddr
985 				= (struct sockaddr *)&ia->ia_dstaddr;
986 		} else {
987 			ia->ia_ifa.ifa_dstaddr = NULL;
988 		}
989 		ia->ia_ifa.ifa_netmask
990 			= (struct sockaddr *)&ia->ia_prefixmask;
991 
992 		ia->ia_ifp = ifp;
993 		if ((oia = in6_ifaddr) != NULL) {
994 			for ( ; oia->ia_next; oia = oia->ia_next)
995 				continue;
996 			oia->ia_next = ia;
997 		} else
998 			in6_ifaddr = ia;
999 
1000 		ifa_iflink(&ia->ia_ifa, ifp, 1);
1001 	}
1002 
1003 	/* set prefix mask */
1004 	if (ifra->ifra_prefixmask.sin6_len) {
1005 		/*
1006 		 * We prohibit changing the prefix length of an existing
1007 		 * address, because
1008 		 * + such an operation should be rare in IPv6, and
1009 		 * + the operation would confuse prefix management.
1010 		 */
1011 		if (ia->ia_prefixmask.sin6_len &&
1012 		    in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL) != plen) {
1013 			log(LOG_INFO, "in6_update_ifa: the prefix length of an"
1014 			    " existing (%s) address should not be changed\n",
1015 			    ip6_sprintf(&ia->ia_addr.sin6_addr));
1016 			error = EINVAL;
1017 			goto unlink;
1018 		}
1019 		ia->ia_prefixmask = ifra->ifra_prefixmask;
1020 	}
1021 
1022 	/*
1023 	 * If a new destination address is specified, scrub the old one and
1024 	 * install the new destination.  Note that the interface must be
1025 	 * p2p or loopback (see the check above.)
1026 	 */
1027 	if (dst6.sin6_family == AF_INET6 &&
1028 	    !IN6_ARE_ADDR_EQUAL(&dst6.sin6_addr,
1029 				&ia->ia_dstaddr.sin6_addr)) {
1030 		int e;
1031 
1032 		if ((ia->ia_flags & IFA_ROUTE) &&
1033 		    (e = rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST))
1034 		    != 0) {
1035 			log(LOG_ERR, "in6_update_ifa: failed to remove "
1036 			    "a route to the old destination: %s\n",
1037 			    ip6_sprintf(&ia->ia_addr.sin6_addr));
1038 			/* proceed anyway... */
1039 		}
1040 		else
1041 			ia->ia_flags &= ~IFA_ROUTE;
1042 		ia->ia_dstaddr = dst6;
1043 	}
1044 
1045 	/* reset the interface and routing table appropriately. */
1046 	if ((error = in6_ifinit(ifp, ia, &ifra->ifra_addr, hostIsNew)) != 0)
1047 		goto unlink;
1048 
1049 	/*
1050 	 * Beyond this point, we should call in6_purgeaddr upon an error,
1051 	 * not just go to unlink.
1052 	 */
1053 
1054 	if (ifp->if_flags & IFF_MULTICAST) {
1055 		struct sockaddr_in6 mltaddr, mltmask;
1056 		struct in6_multi *in6m;
1057 
1058 		if (hostIsNew) {
1059 			/*
1060 			 * join solicited multicast addr for new host id
1061 			 */
1062 			struct in6_addr llsol;
1063 			bzero(&llsol, sizeof(struct in6_addr));
1064 			llsol.s6_addr16[0] = htons(0xff02);
1065 			llsol.s6_addr16[1] = htons(ifp->if_index);
1066 			llsol.s6_addr32[1] = 0;
1067 			llsol.s6_addr32[2] = htonl(1);
1068 			llsol.s6_addr32[3] =
1069 				ifra->ifra_addr.sin6_addr.s6_addr32[3];
1070 			llsol.s6_addr8[12] = 0xff;
1071 			in6_addmulti(&llsol, ifp, &error);
1072 			if (error != 0) {
1073 				log(LOG_WARNING,
1074 				    "in6_update_ifa: addmulti failed for "
1075 				    "%s on %s (errno=%d)\n",
1076 				    ip6_sprintf(&llsol), if_name(ifp),
1077 				    error);
1078 				in6_purgeaddr((struct ifaddr *)ia);
1079 				return (error);
1080 			}
1081 		}
1082 
1083 		bzero(&mltmask, sizeof(mltmask));
1084 		mltmask.sin6_len = sizeof(struct sockaddr_in6);
1085 		mltmask.sin6_family = AF_INET6;
1086 		mltmask.sin6_addr = in6mask32;
1087 
1088 		/*
1089 		 * join link-local all-nodes address
1090 		 */
1091 		bzero(&mltaddr, sizeof(mltaddr));
1092 		mltaddr.sin6_len = sizeof(struct sockaddr_in6);
1093 		mltaddr.sin6_family = AF_INET6;
1094 		mltaddr.sin6_addr = kin6addr_linklocal_allnodes;
1095 		mltaddr.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
1096 
1097 		in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp);
1098 		if (in6m == NULL) {
1099 			rtrequest_global(RTM_ADD,
1100 				  (struct sockaddr *)&mltaddr,
1101 				  (struct sockaddr *)&ia->ia_addr,
1102 				  (struct sockaddr *)&mltmask,
1103 				  RTF_UP|RTF_CLONING);  /* xxx */
1104 			in6_addmulti(&mltaddr.sin6_addr, ifp, &error);
1105 			if (error != 0) {
1106 				log(LOG_WARNING,
1107 				    "in6_update_ifa: addmulti failed for "
1108 				    "%s on %s (errno=%d)\n",
1109 				    ip6_sprintf(&mltaddr.sin6_addr),
1110 				    if_name(ifp), error);
1111 			}
1112 		}
1113 
1114 		/*
1115 		 * join node information group address
1116 		 */
1117 #define hostnamelen	strlen(hostname)
1118 		if (in6_nigroup(ifp, hostname, hostnamelen, &mltaddr.sin6_addr)
1119 		    == 0) {
1120 			in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp);
1121 			if (in6m == NULL && ia != NULL) {
1122 				in6_addmulti(&mltaddr.sin6_addr, ifp, &error);
1123 				if (error != 0) {
1124 					log(LOG_WARNING, "in6_update_ifa: "
1125 					    "addmulti failed for "
1126 					    "%s on %s (errno=%d)\n",
1127 					    ip6_sprintf(&mltaddr.sin6_addr),
1128 					    if_name(ifp), error);
1129 				}
1130 			}
1131 		}
1132 #undef hostnamelen
1133 
1134 		/*
1135 		 * join node-local all-nodes address, on loopback.
1136 		 * XXX: since "node-local" is obsoleted by interface-local,
1137 		 *      we have to join the group on every interface with
1138 		 *      some interface-boundary restriction.
1139 		 */
1140 		if (ifp->if_flags & IFF_LOOPBACK) {
1141 			struct in6_ifaddr *ia_loop;
1142 
1143 			struct in6_addr loop6 = kin6addr_loopback;
1144 			ia_loop = in6ifa_ifpwithaddr(ifp, &loop6);
1145 
1146 			mltaddr.sin6_addr = kin6addr_nodelocal_allnodes;
1147 
1148 			in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp);
1149 			if (in6m == NULL && ia_loop != NULL) {
1150 				rtrequest_global(RTM_ADD,
1151 					  (struct sockaddr *)&mltaddr,
1152 					  (struct sockaddr *)&ia_loop->ia_addr,
1153 					  (struct sockaddr *)&mltmask,
1154 					  RTF_UP);
1155 				in6_addmulti(&mltaddr.sin6_addr, ifp, &error);
1156 				if (error != 0) {
1157 					log(LOG_WARNING, "in6_update_ifa: "
1158 					    "addmulti failed for %s on %s "
1159 					    "(errno=%d)\n",
1160 					    ip6_sprintf(&mltaddr.sin6_addr),
1161 					    if_name(ifp), error);
1162 				}
1163 			}
1164 		}
1165 	}
1166 
1167 	ia->ia6_flags = ifra->ifra_flags;
1168 	ia->ia6_flags &= ~IN6_IFF_DUPLICATED;	/*safety*/
1169 	ia->ia6_flags &= ~IN6_IFF_NODAD;	/* Mobile IPv6 */
1170 
1171 	ia->ia6_lifetime = ifra->ifra_lifetime;
1172 	/* for sanity */
1173 	if (ia->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) {
1174 		ia->ia6_lifetime.ia6t_expire =
1175 			time_uptime + ia->ia6_lifetime.ia6t_vltime;
1176 	} else
1177 		ia->ia6_lifetime.ia6t_expire = 0;
1178 	if (ia->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) {
1179 		ia->ia6_lifetime.ia6t_preferred =
1180 			time_uptime + ia->ia6_lifetime.ia6t_pltime;
1181 	} else
1182 		ia->ia6_lifetime.ia6t_preferred = 0;
1183 
1184 	/*
1185 	 * Perform DAD, if needed.
1186 	 * XXX It may be of use, if we can administratively
1187 	 * disable DAD.
1188 	 */
1189 	if (in6if_do_dad(ifp) && !(ifra->ifra_flags & IN6_IFF_NODAD)) {
1190 		ia->ia6_flags |= IN6_IFF_TENTATIVE;
1191 		nd6_dad_start((struct ifaddr *)ia, NULL);
1192 	}
1193 
1194 	return (error);
1195 
1196 unlink:
1197 	/*
1198 	 * XXX: if a change of an existing address failed, keep the entry
1199 	 * anyway.
1200 	 */
1201 	if (hostIsNew)
1202 		in6_unlink_ifa(ia, ifp);
1203 	return (error);
1204 }
1205 
1206 void
1207 in6_purgeaddr(struct ifaddr *ifa)
1208 {
1209 	struct ifnet *ifp = ifa->ifa_ifp;
1210 	struct in6_ifaddr *ia = (struct in6_ifaddr *) ifa;
1211 
1212 	/* stop DAD processing */
1213 	nd6_dad_stop(ifa);
1214 
1215 	/*
1216 	 * delete route to the destination of the address being purged.
1217 	 * The interface must be p2p or loopback in this case.
1218 	 */
1219 	if ((ia->ia_flags & IFA_ROUTE) && ia->ia_dstaddr.sin6_len != 0) {
1220 		int e;
1221 
1222 		if ((e = rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST))
1223 		    != 0) {
1224 			log(LOG_ERR, "in6_purgeaddr: failed to remove "
1225 			    "a route to the p2p destination: %s on %s, "
1226 			    "errno=%d\n",
1227 			    ip6_sprintf(&ia->ia_addr.sin6_addr), if_name(ifp),
1228 			    e);
1229 			/* proceed anyway... */
1230 		}
1231 		else
1232 			ia->ia_flags &= ~IFA_ROUTE;
1233 	}
1234 
1235 	/* Remove ownaddr's loopback rtentry, if it exists. */
1236 	in6_ifremloop(&(ia->ia_ifa));
1237 
1238 	if (ifp->if_flags & IFF_MULTICAST) {
1239 		/*
1240 		 * delete solicited multicast addr for deleting host id
1241 		 */
1242 		struct in6_multi *in6m;
1243 		struct in6_addr llsol;
1244 		bzero(&llsol, sizeof(struct in6_addr));
1245 		llsol.s6_addr16[0] = htons(0xff02);
1246 		llsol.s6_addr16[1] = htons(ifp->if_index);
1247 		llsol.s6_addr32[1] = 0;
1248 		llsol.s6_addr32[2] = htonl(1);
1249 		llsol.s6_addr32[3] =
1250 			ia->ia_addr.sin6_addr.s6_addr32[3];
1251 		llsol.s6_addr8[12] = 0xff;
1252 
1253 		in6m = IN6_LOOKUP_MULTI(&llsol, ifp);
1254 		if (in6m)
1255 			in6_delmulti(in6m);
1256 	}
1257 
1258 	in6_unlink_ifa(ia, ifp);
1259 }
1260 
1261 static void
1262 in6_unlink_ifa(struct in6_ifaddr *ia, struct ifnet *ifp)
1263 {
1264 	struct in6_ifaddr *oia;
1265 
1266 	crit_enter();
1267 
1268 	ifa_ifunlink(&ia->ia_ifa, ifp);
1269 
1270 	oia = ia;
1271 	if (oia == (ia = in6_ifaddr))
1272 		in6_ifaddr = ia->ia_next;
1273 	else {
1274 		while (ia->ia_next && (ia->ia_next != oia))
1275 			ia = ia->ia_next;
1276 		if (ia->ia_next)
1277 			ia->ia_next = oia->ia_next;
1278 		else {
1279 			/* search failed */
1280 			kprintf("Couldn't unlink in6_ifaddr from in6_ifaddr\n");
1281 		}
1282 	}
1283 
1284 	/*
1285 	 * When an autoconfigured address is being removed, release the
1286 	 * reference to the base prefix.  Also, since the release might
1287 	 * affect the status of other (detached) addresses, call
1288 	 * pfxlist_onlink_check().
1289 	 */
1290 	if (oia->ia6_flags & IN6_IFF_AUTOCONF) {
1291 		if (oia->ia6_ndpr == NULL) {
1292 			log(LOG_NOTICE, "in6_unlink_ifa: autoconf'ed address "
1293 			    "%p has no prefix\n", oia);
1294 		} else {
1295 			oia->ia6_ndpr->ndpr_refcnt--;
1296 			oia->ia6_flags &= ~IN6_IFF_AUTOCONF;
1297 			oia->ia6_ndpr = NULL;
1298 		}
1299 
1300 		pfxlist_onlink_check();
1301 	}
1302 
1303 	/*
1304 	 * release another refcnt for the link from in6_ifaddr.
1305 	 * Note that we should decrement the refcnt at least once for all *BSD.
1306 	 */
1307 	ifa_destroy(&oia->ia_ifa);
1308 
1309 	crit_exit();
1310 }
1311 
1312 void
1313 in6_purgeif(struct ifnet *ifp)
1314 {
1315 	struct ifaddr_container *ifac, *next;
1316 
1317 	TAILQ_FOREACH_MUTABLE(ifac, &ifp->if_addrheads[mycpuid],
1318 			      ifa_link, next) {
1319 		if (ifac->ifa->ifa_addr->sa_family != AF_INET6)
1320 			continue;
1321 		in6_purgeaddr(ifac->ifa);
1322 	}
1323 
1324 	in6_ifdetach(ifp);
1325 }
1326 
1327 /*
1328  * SIOC[GAD]LIFADDR.
1329  *	SIOCGLIFADDR: get first address. (?)
1330  *	SIOCGLIFADDR with IFLR_PREFIX:
1331  *		get first address that matches the specified prefix.
1332  *	SIOCALIFADDR: add the specified address.
1333  *	SIOCALIFADDR with IFLR_PREFIX:
1334  *		add the specified prefix, filling hostid part from
1335  *		the first link-local address.  prefixlen must be <= 64.
1336  *	SIOCDLIFADDR: delete the specified address.
1337  *	SIOCDLIFADDR with IFLR_PREFIX:
1338  *		delete the first address that matches the specified prefix.
1339  * return values:
1340  *	EINVAL on invalid parameters
1341  *	EADDRNOTAVAIL on prefix match failed/specified address not found
1342  *	other values may be returned from in6_ioctl()
1343  *
1344  * NOTE: SIOCALIFADDR(with IFLR_PREFIX set) allows prefixlen less than 64.
1345  * this is to accomodate address naming scheme other than RFC2374,
1346  * in the future.
1347  * RFC2373 defines interface id to be 64bit, but it allows non-RFC2374
1348  * address encoding scheme. (see figure on page 8)
1349  */
1350 static int
1351 in6_lifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp,
1352     struct thread *td)
1353 {
1354 	struct if_laddrreq *iflr = (struct if_laddrreq *)data;
1355 	struct sockaddr *sa;
1356 
1357 	/* sanity checks */
1358 	if (!data || !ifp) {
1359 		panic("invalid argument to in6_lifaddr_ioctl");
1360 		/*NOTRECHED*/
1361 	}
1362 
1363 	switch (cmd) {
1364 	case SIOCGLIFADDR:
1365 		/* address must be specified on GET with IFLR_PREFIX */
1366 		if (!(iflr->flags & IFLR_PREFIX))
1367 			break;
1368 		/* FALLTHROUGH */
1369 	case SIOCALIFADDR:
1370 	case SIOCDLIFADDR:
1371 		/* address must be specified on ADD and DELETE */
1372 		sa = (struct sockaddr *)&iflr->addr;
1373 		if (sa->sa_family != AF_INET6)
1374 			return EINVAL;
1375 		if (sa->sa_len != sizeof(struct sockaddr_in6))
1376 			return EINVAL;
1377 		/* XXX need improvement */
1378 		sa = (struct sockaddr *)&iflr->dstaddr;
1379 		if (sa->sa_family && sa->sa_family != AF_INET6)
1380 			return EINVAL;
1381 		if (sa->sa_len && sa->sa_len != sizeof(struct sockaddr_in6))
1382 			return EINVAL;
1383 		break;
1384 	default: /* shouldn't happen */
1385 #if 0
1386 		panic("invalid cmd to in6_lifaddr_ioctl");
1387 		/* NOTREACHED */
1388 #else
1389 		return EOPNOTSUPP;
1390 #endif
1391 	}
1392 	if (sizeof(struct in6_addr) * 8 < iflr->prefixlen)
1393 		return EINVAL;
1394 
1395 	switch (cmd) {
1396 	case SIOCALIFADDR:
1397 	    {
1398 		struct in6_aliasreq ifra;
1399 		struct in6_addr *hostid = NULL;
1400 		int prefixlen;
1401 
1402 		if (iflr->flags & IFLR_PREFIX) {
1403 			struct ifaddr *ifa;
1404 			struct sockaddr_in6 *sin6;
1405 
1406 			/*
1407 			 * hostid is to fill in the hostid part of the
1408 			 * address.  hostid points to the first link-local
1409 			 * address attached to the interface.
1410 			 */
1411 			ifa = (struct ifaddr *)in6ifa_ifpforlinklocal(ifp, 0);
1412 			if (!ifa)
1413 				return EADDRNOTAVAIL;
1414 			hostid = IFA_IN6(ifa);
1415 
1416 		 	/* prefixlen must be <= 64. */
1417 			if (64 < iflr->prefixlen)
1418 				return EINVAL;
1419 			prefixlen = iflr->prefixlen;
1420 
1421 			/* hostid part must be zero. */
1422 			sin6 = (struct sockaddr_in6 *)&iflr->addr;
1423 			if (sin6->sin6_addr.s6_addr32[2] != 0
1424 			 || sin6->sin6_addr.s6_addr32[3] != 0) {
1425 				return EINVAL;
1426 			}
1427 		} else
1428 			prefixlen = iflr->prefixlen;
1429 
1430 		/* copy args to in6_aliasreq, perform ioctl(SIOCAIFADDR_IN6). */
1431 		bzero(&ifra, sizeof(ifra));
1432 		bcopy(iflr->iflr_name, ifra.ifra_name,
1433 			sizeof(ifra.ifra_name));
1434 
1435 		bcopy(&iflr->addr, &ifra.ifra_addr,
1436 			((struct sockaddr *)&iflr->addr)->sa_len);
1437 		if (hostid) {
1438 			/* fill in hostid part */
1439 			ifra.ifra_addr.sin6_addr.s6_addr32[2] =
1440 				hostid->s6_addr32[2];
1441 			ifra.ifra_addr.sin6_addr.s6_addr32[3] =
1442 				hostid->s6_addr32[3];
1443 		}
1444 
1445 		if (((struct sockaddr *)&iflr->dstaddr)->sa_family) {	/*XXX*/
1446 			bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr,
1447 				((struct sockaddr *)&iflr->dstaddr)->sa_len);
1448 			if (hostid) {
1449 				ifra.ifra_dstaddr.sin6_addr.s6_addr32[2] =
1450 					hostid->s6_addr32[2];
1451 				ifra.ifra_dstaddr.sin6_addr.s6_addr32[3] =
1452 					hostid->s6_addr32[3];
1453 			}
1454 		}
1455 
1456 		ifra.ifra_prefixmask.sin6_len = sizeof(struct sockaddr_in6);
1457 		in6_prefixlen2mask(&ifra.ifra_prefixmask.sin6_addr, prefixlen);
1458 
1459 		ifra.ifra_flags = iflr->flags & ~IFLR_PREFIX;
1460 		return in6_control_internal(SIOCAIFADDR_IN6, (caddr_t)&ifra,
1461 		    ifp, td);
1462 	    }
1463 	case SIOCGLIFADDR:
1464 	case SIOCDLIFADDR:
1465 	    {
1466 		struct ifaddr_container *ifac;
1467 		struct in6_ifaddr *ia;
1468 		struct in6_addr mask, candidate, match;
1469 		struct sockaddr_in6 *sin6;
1470 		int cmp;
1471 
1472 		bzero(&mask, sizeof(mask));
1473 		if (iflr->flags & IFLR_PREFIX) {
1474 			/* lookup a prefix rather than address. */
1475 			in6_prefixlen2mask(&mask, iflr->prefixlen);
1476 
1477 			sin6 = (struct sockaddr_in6 *)&iflr->addr;
1478 			bcopy(&sin6->sin6_addr, &match, sizeof(match));
1479 			match.s6_addr32[0] &= mask.s6_addr32[0];
1480 			match.s6_addr32[1] &= mask.s6_addr32[1];
1481 			match.s6_addr32[2] &= mask.s6_addr32[2];
1482 			match.s6_addr32[3] &= mask.s6_addr32[3];
1483 
1484 			/* if you set extra bits, that's wrong */
1485 			if (bcmp(&match, &sin6->sin6_addr, sizeof(match)))
1486 				return EINVAL;
1487 
1488 			cmp = 1;
1489 		} else {
1490 			if (cmd == SIOCGLIFADDR) {
1491 				/* on getting an address, take the 1st match */
1492 				cmp = 0;	/* XXX */
1493 			} else {
1494 				/* on deleting an address, do exact match */
1495 				in6_prefixlen2mask(&mask, 128);
1496 				sin6 = (struct sockaddr_in6 *)&iflr->addr;
1497 				bcopy(&sin6->sin6_addr, &match, sizeof(match));
1498 
1499 				cmp = 1;
1500 			}
1501 		}
1502 
1503 		TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1504 			struct ifaddr *ifa = ifac->ifa;
1505 
1506 			if (ifa->ifa_addr->sa_family != AF_INET6)
1507 				continue;
1508 			if (!cmp)
1509 				break;
1510 
1511 			bcopy(IFA_IN6(ifa), &candidate, sizeof(candidate));
1512 			/*
1513 			 * XXX: this is adhoc, but is necessary to allow
1514 			 * a user to specify fe80::/64 (not /10) for a
1515 			 * link-local address.
1516 			 */
1517 			if (IN6_IS_ADDR_LINKLOCAL(&candidate))
1518 				candidate.s6_addr16[1] = 0;
1519 			candidate.s6_addr32[0] &= mask.s6_addr32[0];
1520 			candidate.s6_addr32[1] &= mask.s6_addr32[1];
1521 			candidate.s6_addr32[2] &= mask.s6_addr32[2];
1522 			candidate.s6_addr32[3] &= mask.s6_addr32[3];
1523 			if (IN6_ARE_ADDR_EQUAL(&candidate, &match))
1524 				break;
1525 		}
1526 		if (ifac == NULL)
1527 			return EADDRNOTAVAIL;
1528 		ia = ifa2ia6(ifac->ifa);
1529 
1530 		if (cmd == SIOCGLIFADDR) {
1531 			struct sockaddr_in6 *s6;
1532 
1533 			/* fill in the if_laddrreq structure */
1534 			bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin6_len);
1535 			s6 = (struct sockaddr_in6 *)&iflr->addr;
1536 			if (IN6_IS_ADDR_LINKLOCAL(&s6->sin6_addr)) {
1537 				s6->sin6_addr.s6_addr16[1] = 0;
1538 				s6->sin6_scope_id =
1539 					in6_addr2scopeid(ifp, &s6->sin6_addr);
1540 			}
1541 			if (ifp->if_flags & IFF_POINTOPOINT) {
1542 				bcopy(&ia->ia_dstaddr, &iflr->dstaddr,
1543 					ia->ia_dstaddr.sin6_len);
1544 				s6 = (struct sockaddr_in6 *)&iflr->dstaddr;
1545 				if (IN6_IS_ADDR_LINKLOCAL(&s6->sin6_addr)) {
1546 					s6->sin6_addr.s6_addr16[1] = 0;
1547 					s6->sin6_scope_id =
1548 						in6_addr2scopeid(ifp,
1549 								 &s6->sin6_addr);
1550 				}
1551 			} else
1552 				bzero(&iflr->dstaddr, sizeof(iflr->dstaddr));
1553 
1554 			iflr->prefixlen =
1555 				in6_mask2len(&ia->ia_prefixmask.sin6_addr,
1556 					     NULL);
1557 
1558 			iflr->flags = ia->ia6_flags;	/* XXX */
1559 
1560 			return 0;
1561 		} else {
1562 			struct in6_aliasreq ifra;
1563 
1564 			/* fill in6_aliasreq and do ioctl(SIOCDIFADDR_IN6) */
1565 			bzero(&ifra, sizeof(ifra));
1566 			bcopy(iflr->iflr_name, ifra.ifra_name,
1567 			      sizeof(ifra.ifra_name));
1568 
1569 			bcopy(&ia->ia_addr, &ifra.ifra_addr,
1570 			      ia->ia_addr.sin6_len);
1571 			if (ifp->if_flags & IFF_POINTOPOINT)
1572 				bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr,
1573 				      ia->ia_dstaddr.sin6_len);
1574 			else
1575 				bzero(&ifra.ifra_dstaddr,
1576 				      sizeof(ifra.ifra_dstaddr));
1577 			bcopy(&ia->ia_prefixmask, &ifra.ifra_dstaddr,
1578 			      ia->ia_prefixmask.sin6_len);
1579 
1580 			ifra.ifra_flags = ia->ia6_flags;
1581 			return in6_control_internal(SIOCDIFADDR_IN6,
1582 			    (caddr_t)&ifra, ifp, td);
1583 		}
1584 	    }
1585 	}
1586 
1587 	return EOPNOTSUPP;	/* just for safety */
1588 }
1589 
1590 /*
1591  * Initialize an interface's intetnet6 address
1592  * and routing table entry.
1593  */
1594 static int
1595 in6_ifinit(struct ifnet *ifp, struct in6_ifaddr *ia, struct sockaddr_in6 *sin6,
1596 	   int newhost)
1597 {
1598 	int error = 0, plen;
1599 
1600 	ia->ia_addr = *sin6;
1601 
1602 	if (ifp->if_ioctl != NULL) {
1603 		ifnet_serialize_all(ifp);
1604 		error = ifp->if_ioctl(ifp, SIOCSIFADDR, (caddr_t)ia, NULL);
1605 		ifnet_deserialize_all(ifp);
1606 		if (error)
1607 			return (error);
1608 	}
1609 
1610 	ia->ia_ifa.ifa_metric = ifp->if_metric;
1611 
1612 	/* we could do in(6)_socktrim here, but just omit it at this moment. */
1613 
1614 	/*
1615 	 * Special case:
1616 	 * If the destination address is specified for a point-to-point
1617 	 * interface, install a route to the destination as an interface
1618 	 * direct route.
1619 	 */
1620 	plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL); /* XXX */
1621 	if (plen == 128 && ia->ia_dstaddr.sin6_family == AF_INET6) {
1622 		if ((error = rtinit(&(ia->ia_ifa), (int)RTM_ADD,
1623 				    RTF_UP | RTF_HOST)) != 0)
1624 			return (error);
1625 		ia->ia_flags |= IFA_ROUTE;
1626 	}
1627 	if (plen < 128) {
1628 		/*
1629 		 * The RTF_CLONING flag is necessary for in6_is_ifloop_auto().
1630 		 */
1631 		ia->ia_ifa.ifa_flags |= RTF_CLONING;
1632 	}
1633 
1634 	/* Add ownaddr as loopback rtentry, if necessary (ex. on p2p link). */
1635 	if (newhost) {
1636 		/* set the rtrequest function to create llinfo */
1637 		ia->ia_ifa.ifa_rtrequest = nd6_rtrequest;
1638 		in6_ifaddloop(&(ia->ia_ifa));
1639 	}
1640 
1641 	return (error);
1642 }
1643 
1644 struct in6_multi_mship *
1645 in6_joingroup(struct ifnet *ifp, struct in6_addr *addr, int *errorp)
1646 {
1647        struct in6_multi_mship *imm;
1648 
1649        imm = kmalloc(sizeof(*imm), M_IPMADDR, M_NOWAIT);
1650        if (!imm) {
1651                *errorp = ENOBUFS;
1652                return NULL;
1653        }
1654        imm->i6mm_maddr = in6_addmulti(addr, ifp, errorp);
1655        if (!imm->i6mm_maddr) {
1656                /* *errorp is alrady set */
1657                kfree(imm, M_IPMADDR);
1658                return NULL;
1659        }
1660        return imm;
1661 }
1662 
1663 int
1664 in6_leavegroup(struct in6_multi_mship *imm)
1665 {
1666 
1667        if (imm->i6mm_maddr)
1668                in6_delmulti(imm->i6mm_maddr);
1669        kfree(imm,  M_IPMADDR);
1670        return 0;
1671 }
1672 
1673 /*
1674  * Add an address to the list of IP6 multicast addresses for a
1675  * given interface.
1676  */
1677 struct	in6_multi *
1678 in6_addmulti(struct in6_addr *maddr6, struct ifnet *ifp, int *errorp)
1679 {
1680 	struct	in6_multi *in6m;
1681 	struct sockaddr_in6 sin6;
1682 	struct ifmultiaddr *ifma;
1683 
1684 	*errorp = 0;
1685 
1686 	crit_enter();
1687 
1688 	/*
1689 	 * Call generic routine to add membership or increment
1690 	 * refcount.  It wants addresses in the form of a sockaddr,
1691 	 * so we build one here (being careful to zero the unused bytes).
1692 	 */
1693 	bzero(&sin6, sizeof sin6);
1694 	sin6.sin6_family = AF_INET6;
1695 	sin6.sin6_len = sizeof sin6;
1696 	sin6.sin6_addr = *maddr6;
1697 	*errorp = if_addmulti(ifp, (struct sockaddr *)&sin6, &ifma);
1698 	if (*errorp) {
1699 		crit_exit();
1700 		return 0;
1701 	}
1702 
1703 	/*
1704 	 * If ifma->ifma_protospec is null, then if_addmulti() created
1705 	 * a new record.  Otherwise, we are done.
1706 	 */
1707 	if (ifma->ifma_protospec != NULL) {
1708 		crit_exit();
1709 		return ifma->ifma_protospec;
1710 	}
1711 
1712 	in6m = kmalloc(sizeof(*in6m), M_IPMADDR, M_INTWAIT | M_ZERO);
1713 	in6m->in6m_addr = *maddr6;
1714 	in6m->in6m_ifp = ifp;
1715 	in6m->in6m_ifma = ifma;
1716 	ifma->ifma_protospec = in6m;
1717 	LIST_INSERT_HEAD(&in6_multihead, in6m, in6m_entry);
1718 
1719 	/*
1720 	 * Let MLD6 know that we have joined a new IP6 multicast
1721 	 * group.
1722 	 */
1723 	mld6_start_listening(in6m);
1724 	crit_exit();
1725 	return (in6m);
1726 }
1727 
1728 /*
1729  * Delete a multicast address record.
1730  */
1731 void
1732 in6_delmulti(struct in6_multi *in6m)
1733 {
1734 	struct ifmultiaddr *ifma = in6m->in6m_ifma;
1735 
1736 	crit_enter();
1737 
1738 	if (ifma->ifma_refcount == 1) {
1739 		/*
1740 		 * No remaining claims to this record; let MLD6 know
1741 		 * that we are leaving the multicast group.
1742 		 */
1743 		mld6_stop_listening(in6m);
1744 		ifma->ifma_protospec = NULL;
1745 		LIST_REMOVE(in6m, in6m_entry);
1746 		kfree(in6m, M_IPMADDR);
1747 	}
1748 	/* XXX - should be separate API for when we have an ifma? */
1749 	if_delmulti(ifma->ifma_ifp, ifma->ifma_addr);
1750 	crit_exit();
1751 }
1752 
1753 /*
1754  * Find an IPv6 interface link-local address specific to an interface.
1755  */
1756 struct in6_ifaddr *
1757 in6ifa_ifpforlinklocal(struct ifnet *ifp, int ignoreflags)
1758 {
1759 	const struct ifaddr_container *ifac;
1760 
1761 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1762 		struct ifaddr *ifa = ifac->ifa;
1763 
1764 		if (ifa->ifa_addr == NULL)
1765 			continue;	/* just for safety */
1766 		if (ifa->ifa_addr->sa_family != AF_INET6)
1767 			continue;
1768 		if (IN6_IS_ADDR_LINKLOCAL(IFA_IN6(ifa))) {
1769 			if ((((struct in6_ifaddr *)ifa)->ia6_flags &
1770 			     ignoreflags) != 0)
1771 				continue;
1772 			return (struct in6_ifaddr *)ifa;
1773 		}
1774 	}
1775 	return NULL;
1776 }
1777 
1778 
1779 /*
1780  * find the internet address corresponding to a given interface and address.
1781  */
1782 struct in6_ifaddr *
1783 in6ifa_ifpwithaddr(struct ifnet *ifp, struct in6_addr *addr)
1784 {
1785 	const struct ifaddr_container *ifac;
1786 
1787 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1788 		struct ifaddr *ifa = ifac->ifa;
1789 
1790 		if (ifa->ifa_addr == NULL)
1791 			continue;	/* just for safety */
1792 		if (ifa->ifa_addr->sa_family != AF_INET6)
1793 			continue;
1794 		if (IN6_ARE_ADDR_EQUAL(addr, IFA_IN6(ifa)))
1795 			return (struct in6_ifaddr *)ifa;
1796 	}
1797 	return NULL;
1798 }
1799 
1800 /*
1801  * Find a link-local scoped address on ifp and return it if any.
1802  */
1803 struct in6_ifaddr *
1804 in6ifa_llaonifp(struct ifnet *ifp)
1805 {
1806 	const struct ifaddr_container *ifac;
1807 
1808 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1809 		const struct sockaddr_in6 *sin6;
1810 		struct ifaddr *ifa = ifac->ifa;
1811 
1812 		if (ifa->ifa_addr->sa_family != AF_INET6)
1813 			continue;
1814 		sin6 = (const struct sockaddr_in6 *)ifa->ifa_addr;
1815 		if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr) ||
1816 		    /* XXX why are mcast addresses ifp address list? */
1817 		    IN6_IS_ADDR_MC_INTFACELOCAL(&sin6->sin6_addr) ||
1818 		    IN6_IS_ADDR_MC_NODELOCAL(&sin6->sin6_addr))
1819 			return (struct in6_ifaddr *)ifa;
1820 	}
1821 	return NULL;
1822 }
1823 
1824 /*
1825  * find the internet address on a given interface corresponding to a neighbor's
1826  * address.
1827  */
1828 struct in6_ifaddr *
1829 in6ifa_ifplocaladdr(const struct ifnet *ifp, const struct in6_addr *addr)
1830 {
1831 	struct ifaddr *ifa;
1832 	struct in6_ifaddr *ia;
1833 	struct ifaddr_container *ifac;
1834 
1835 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1836 		ifa = ifac->ifa;
1837 
1838 		if (ifa->ifa_addr == NULL)
1839 			continue;	/* just for safety */
1840 		if (ifa->ifa_addr->sa_family != AF_INET6)
1841 			continue;
1842 		ia = (struct in6_ifaddr *)ifa;
1843 		if (IN6_ARE_MASKED_ADDR_EQUAL(addr,
1844 				&ia->ia_addr.sin6_addr,
1845 				&ia->ia_prefixmask.sin6_addr))
1846 			return ia;
1847 	}
1848 
1849 	return NULL;
1850 }
1851 
1852 /*
1853  * Convert IP6 address to printable (loggable) representation.
1854  */
1855 static char digits[] = "0123456789abcdef";
1856 static int ip6round = 0;
1857 char *
1858 ip6_sprintf(const struct in6_addr *addr)
1859 {
1860 	static char ip6buf[8][48];
1861 	int i;
1862 	char *cp;
1863 	const u_short *a = (const u_short *)addr;
1864 	const u_char *d;
1865 	int dcolon = 0;
1866 
1867 	ip6round = (ip6round + 1) & 7;
1868 	cp = ip6buf[ip6round];
1869 
1870 	for (i = 0; i < 8; i++) {
1871 		if (dcolon == 1) {
1872 			if (*a == 0) {
1873 				if (i == 7)
1874 					*cp++ = ':';
1875 				a++;
1876 				continue;
1877 			} else
1878 				dcolon = 2;
1879 		}
1880 		if (*a == 0) {
1881 			if (dcolon == 0 && *(a + 1) == 0) {
1882 				if (i == 0)
1883 					*cp++ = ':';
1884 				*cp++ = ':';
1885 				dcolon = 1;
1886 			} else {
1887 				*cp++ = '0';
1888 				*cp++ = ':';
1889 			}
1890 			a++;
1891 			continue;
1892 		}
1893 		d = (const u_char *)a;
1894 		*cp++ = digits[*d >> 4];
1895 		*cp++ = digits[*d++ & 0xf];
1896 		*cp++ = digits[*d >> 4];
1897 		*cp++ = digits[*d & 0xf];
1898 		*cp++ = ':';
1899 		a++;
1900 	}
1901 	*--cp = 0;
1902 	return (ip6buf[ip6round]);
1903 }
1904 
1905 int
1906 in6_localaddr(struct in6_addr *in6)
1907 {
1908 	struct in6_ifaddr *ia;
1909 
1910 	if (IN6_IS_ADDR_LOOPBACK(in6) || IN6_IS_ADDR_LINKLOCAL(in6))
1911 		return 1;
1912 
1913 	for (ia = in6_ifaddr; ia; ia = ia->ia_next)
1914 		if (IN6_ARE_MASKED_ADDR_EQUAL(in6, &ia->ia_addr.sin6_addr,
1915 					      &ia->ia_prefixmask.sin6_addr))
1916 			return 1;
1917 
1918 	return (0);
1919 }
1920 
1921 int
1922 in6_is_addr_deprecated(struct sockaddr_in6 *sa6)
1923 {
1924 	struct in6_ifaddr *ia;
1925 
1926 	for (ia = in6_ifaddr; ia; ia = ia->ia_next) {
1927 		if (IN6_ARE_ADDR_EQUAL(&ia->ia_addr.sin6_addr,
1928 				       &sa6->sin6_addr) &&
1929 		    (ia->ia6_flags & IN6_IFF_DEPRECATED))
1930 			return (1); /* true */
1931 
1932 		/* XXX: do we still have to go thru the rest of the list? */
1933 	}
1934 
1935 	return (0);		/* false */
1936 }
1937 
1938 /*
1939  * return length of part which dst and src are equal
1940  * hard coding...
1941  */
1942 int
1943 in6_matchlen(struct in6_addr *src, struct in6_addr *dst)
1944 {
1945 	int match = 0;
1946 	u_char *s = (u_char *)src, *d = (u_char *)dst;
1947 	u_char *lim = s + 16, r;
1948 
1949 	while (s < lim)
1950 		if ((r = (*d++ ^ *s++)) != 0) {
1951 			while (r < 128) {
1952 				match++;
1953 				r <<= 1;
1954 			}
1955 			break;
1956 		} else
1957 			match += 8;
1958 	return match;
1959 }
1960 
1961 /* XXX: to be scope conscious */
1962 int
1963 in6_are_prefix_equal(struct in6_addr *p1, struct in6_addr *p2, int len)
1964 {
1965 	int bytelen, bitlen;
1966 
1967 	/* sanity check */
1968 	if (0 > len || len > 128) {
1969 		log(LOG_ERR, "in6_are_prefix_equal: invalid prefix length(%d)\n",
1970 		    len);
1971 		return (0);
1972 	}
1973 
1974 	bytelen = len / 8;
1975 	bitlen = len % 8;
1976 
1977 	if (bcmp(&p1->s6_addr, &p2->s6_addr, bytelen))
1978 		return (0);
1979 	if (p1->s6_addr[bytelen] >> (8 - bitlen) !=
1980 	    p2->s6_addr[bytelen] >> (8 - bitlen))
1981 		return (0);
1982 
1983 	return (1);
1984 }
1985 
1986 void
1987 in6_prefixlen2mask(struct in6_addr *maskp, int len)
1988 {
1989 	u_char maskarray[8] = {0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe, 0xff};
1990 	int bytelen, bitlen, i;
1991 
1992 	/* sanity check */
1993 	if (0 > len || len > 128) {
1994 		log(LOG_ERR, "in6_prefixlen2mask: invalid prefix length(%d)\n",
1995 		    len);
1996 		return;
1997 	}
1998 
1999 	bzero(maskp, sizeof(*maskp));
2000 	bytelen = len / 8;
2001 	bitlen = len % 8;
2002 	for (i = 0; i < bytelen; i++)
2003 		maskp->s6_addr[i] = 0xff;
2004 	if (bitlen)
2005 		maskp->s6_addr[bytelen] = maskarray[bitlen - 1];
2006 }
2007 
2008 /*
2009  * return the best address out of the same scope
2010  */
2011 struct in6_ifaddr *
2012 in6_ifawithscope(struct ifnet *oifp, struct in6_addr *dst, struct ucred *cred)
2013 {
2014 	int dst_scope =	in6_addrscope(dst), src_scope, best_scope = 0;
2015 	int blen = -1;
2016 	struct in6_ifaddr *ifa_best = NULL;
2017 	int jailed = 0;
2018 	const struct ifnet_array *arr;
2019 	int i;
2020 
2021 	if(cred && cred->cr_prison)
2022 		jailed = 1;
2023 
2024 	if (oifp == NULL) {
2025 #if 0
2026 		kprintf("in6_ifawithscope: output interface is not specified\n");
2027 #endif
2028 		return (NULL);
2029 	}
2030 
2031 	/*
2032 	 * We search for all addresses on all interfaces from the beginning.
2033 	 * Comparing an interface with the outgoing interface will be done
2034 	 * only at the final stage of tiebreaking.
2035 	 */
2036 	arr = ifnet_array_get();
2037 	for (i = 0; i < arr->ifnet_count; ++i) {
2038 		struct ifnet *ifp = arr->ifnet_arr[i];
2039 		struct ifaddr_container *ifac;
2040 
2041 		/*
2042 		 * We can never take an address that breaks the scope zone
2043 		 * of the destination.
2044 		 */
2045 		if (ifp->if_afdata[AF_INET6] == NULL)
2046 			continue;
2047 		if (in6_addr2scopeid(ifp, dst) != in6_addr2scopeid(oifp, dst))
2048 			continue;
2049 
2050 		TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2051 			int tlen = -1, dscopecmp, bscopecmp, matchcmp;
2052 			struct ifaddr *ifa = ifac->ifa;
2053 
2054 			if (ifa->ifa_addr->sa_family != AF_INET6)
2055 				continue;
2056 
2057 			src_scope = in6_addrscope(IFA_IN6(ifa));
2058 
2059 			/*
2060 			 * Don't use an address before completing DAD
2061 			 * nor a duplicated address.
2062 			 */
2063 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2064 			    IN6_IFF_NOTREADY)
2065 				continue;
2066 
2067 			/* XXX: is there any case to allow anycasts? */
2068 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2069 			    IN6_IFF_ANYCAST)
2070 				continue;
2071 
2072 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2073 			    IN6_IFF_DETACHED)
2074 				continue;
2075 
2076 			/* Skip adresses not valid for current jail */
2077 			if (jailed &&
2078 			    !(jailed_ip(cred->cr_prison, (struct sockaddr *)(ifa->ifa_addr)) != 0))
2079 				continue;
2080 
2081 			/*
2082 			 * If this is the first address we find,
2083 			 * keep it anyway.
2084 			 */
2085 			if (ifa_best == NULL)
2086 				goto replace;
2087 
2088 			/*
2089 			 * ifa_best is never NULL beyond this line except
2090 			 * within the block labeled "replace".
2091 			 */
2092 
2093 			/*
2094 			 * If ifa_best has a smaller scope than dst and
2095 			 * the current address has a larger one than
2096 			 * (or equal to) dst, always replace ifa_best.
2097 			 * Also, if the current address has a smaller scope
2098 			 * than dst, ignore it unless ifa_best also has a
2099 			 * smaller scope.
2100 			 * Consequently, after the two if-clause below,
2101 			 * the followings must be satisfied:
2102 			 * (scope(src) < scope(dst) &&
2103 			 *  scope(best) < scope(dst))
2104 			 *  OR
2105 			 * (scope(best) >= scope(dst) &&
2106 			 *  scope(src) >= scope(dst))
2107 			 */
2108 			if (IN6_ARE_SCOPE_CMP(best_scope, dst_scope) < 0 &&
2109 			    IN6_ARE_SCOPE_CMP(src_scope, dst_scope) >= 0)
2110 				goto replace; /* (A) */
2111 			if (IN6_ARE_SCOPE_CMP(src_scope, dst_scope) < 0 &&
2112 			    IN6_ARE_SCOPE_CMP(best_scope, dst_scope) >= 0)
2113 				continue; /* (B) */
2114 
2115 			/*
2116 			 * A deprecated address SHOULD NOT be used in new
2117 			 * communications if an alternate (non-deprecated)
2118 			 * address is available and has sufficient scope.
2119 			 * RFC 2462, Section 5.5.4.
2120 			 */
2121 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2122 			    IN6_IFF_DEPRECATED) {
2123 				/*
2124 				 * Ignore any deprecated addresses if
2125 				 * specified by configuration.
2126 				 */
2127 				if (!ip6_use_deprecated)
2128 					continue;
2129 
2130 				/*
2131 				 * If we have already found a non-deprecated
2132 				 * candidate, just ignore deprecated addresses.
2133 				 */
2134 				if (!(ifa_best->ia6_flags & IN6_IFF_DEPRECATED))
2135 					continue;
2136 			}
2137 
2138 			/*
2139 			 * A non-deprecated address is always preferred
2140 			 * to a deprecated one regardless of scopes and
2141 			 * address matching (Note invariants ensured by the
2142 			 * conditions (A) and (B) above.)
2143 			 */
2144 			if ((ifa_best->ia6_flags & IN6_IFF_DEPRECATED) &&
2145 			    !(((struct in6_ifaddr *)ifa)->ia6_flags &
2146 			     IN6_IFF_DEPRECATED))
2147 				goto replace;
2148 
2149 			/*
2150 			 * When we use temporary addresses described in
2151 			 * RFC 3041, we prefer temporary addresses to
2152 			 * public autoconf addresses.  Again, note the
2153 			 * invariants from (A) and (B).  Also note that we
2154 			 * don't have any preference between static addresses
2155 			 * and autoconf addresses (despite of whether or not
2156 			 * the latter is temporary or public.)
2157 			 */
2158 			if (ip6_use_tempaddr) {
2159 				struct in6_ifaddr *ifat;
2160 
2161 				ifat = (struct in6_ifaddr *)ifa;
2162 				if ((ifa_best->ia6_flags &
2163 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2164 				     == IN6_IFF_AUTOCONF &&
2165 				    (ifat->ia6_flags &
2166 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2167 				     == (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY)) {
2168 					goto replace;
2169 				}
2170 				if ((ifa_best->ia6_flags &
2171 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2172 				    == (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY) &&
2173 				    (ifat->ia6_flags &
2174 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2175 				     == IN6_IFF_AUTOCONF) {
2176 					continue;
2177 				}
2178 			}
2179 
2180 			/*
2181 			 * At this point, we have two cases:
2182 			 * 1. we are looking at a non-deprecated address,
2183 			 *    and ifa_best is also non-deprecated.
2184 			 * 2. we are looking at a deprecated address,
2185 			 *    and ifa_best is also deprecated.
2186 			 * Also, we do not have to consider a case where
2187 			 * the scope of if_best is larger(smaller) than dst and
2188 			 * the scope of the current address is smaller(larger)
2189 			 * than dst. Such a case has already been covered.
2190 			 * Tiebreaking is done according to the following
2191 			 * items:
2192 			 * - the scope comparison between the address and
2193 			 *   dst (dscopecmp)
2194 			 * - the scope comparison between the address and
2195 			 *   ifa_best (bscopecmp)
2196 			 * - if the address match dst longer than ifa_best
2197 			 *   (matchcmp)
2198 			 * - if the address is on the outgoing I/F (outI/F)
2199 			 *
2200 			 * Roughly speaking, the selection policy is
2201 			 * - the most important item is scope. The same scope
2202 			 *   is best. Then search for a larger scope.
2203 			 *   Smaller scopes are the last resort.
2204 			 * - A deprecated address is chosen only when we have
2205 			 *   no address that has an enough scope, but is
2206 			 *   prefered to any addresses of smaller scopes
2207 			 *   (this must be already done above.)
2208 			 * - addresses on the outgoing I/F are preferred to
2209 			 *   ones on other interfaces if none of above
2210 			 *   tiebreaks.  In the table below, the column "bI"
2211 			 *   means if the best_ifa is on the outgoing
2212 			 *   interface, and the column "sI" means if the ifa
2213 			 *   is on the outgoing interface.
2214 			 * - If there is no other reasons to choose one,
2215 			 *   longest address match against dst is considered.
2216 			 *
2217 			 * The precise decision table is as follows:
2218 			 * dscopecmp bscopecmp    match  bI oI | replace?
2219 			 *       N/A     equal      N/A   Y  N |   No (1)
2220 			 *       N/A     equal      N/A   N  Y |  Yes (2)
2221 			 *       N/A     equal   larger    N/A |  Yes (3)
2222 			 *       N/A     equal  !larger    N/A |   No (4)
2223 			 *    larger    larger      N/A    N/A |   No (5)
2224 			 *    larger   smaller      N/A    N/A |  Yes (6)
2225 			 *   smaller    larger      N/A    N/A |  Yes (7)
2226 			 *   smaller   smaller      N/A    N/A |   No (8)
2227 			 *     equal   smaller      N/A    N/A |  Yes (9)
2228 			 *     equal    larger       (already done at A above)
2229 			 */
2230 			dscopecmp = IN6_ARE_SCOPE_CMP(src_scope, dst_scope);
2231 			bscopecmp = IN6_ARE_SCOPE_CMP(src_scope, best_scope);
2232 
2233 			if (bscopecmp == 0) {
2234 				struct ifnet *bifp = ifa_best->ia_ifp;
2235 
2236 				if (bifp == oifp && ifp != oifp) /* (1) */
2237 					continue;
2238 				if (bifp != oifp && ifp == oifp) /* (2) */
2239 					goto replace;
2240 
2241 				/*
2242 				 * Both bifp and ifp are on the outgoing
2243 				 * interface, or both two are on a different
2244 				 * interface from the outgoing I/F.
2245 				 * now we need address matching against dst
2246 				 * for tiebreaking.
2247 				 */
2248 				tlen = in6_matchlen(IFA_IN6(ifa), dst);
2249 				matchcmp = tlen - blen;
2250 				if (matchcmp > 0) /* (3) */
2251 					goto replace;
2252 				continue; /* (4) */
2253 			}
2254 			if (dscopecmp > 0) {
2255 				if (bscopecmp > 0) /* (5) */
2256 					continue;
2257 				goto replace; /* (6) */
2258 			}
2259 			if (dscopecmp < 0) {
2260 				if (bscopecmp > 0) /* (7) */
2261 					goto replace;
2262 				continue; /* (8) */
2263 			}
2264 
2265 			/* now dscopecmp must be 0 */
2266 			if (bscopecmp < 0)
2267 				goto replace; /* (9) */
2268 
2269 replace:
2270 			ifa_best = (struct in6_ifaddr *)ifa;
2271 			blen = tlen >= 0 ? tlen :
2272 				in6_matchlen(IFA_IN6(ifa), dst);
2273 			best_scope = in6_addrscope(&ifa_best->ia_addr.sin6_addr);
2274 		}
2275 	}
2276 
2277 	/* count statistics for future improvements */
2278 	if (ifa_best == NULL)
2279 		ip6stat.ip6s_sources_none++;
2280 	else {
2281 		if (oifp == ifa_best->ia_ifp)
2282 			ip6stat.ip6s_sources_sameif[best_scope]++;
2283 		else
2284 			ip6stat.ip6s_sources_otherif[best_scope]++;
2285 
2286 		if (best_scope == dst_scope)
2287 			ip6stat.ip6s_sources_samescope[best_scope]++;
2288 		else
2289 			ip6stat.ip6s_sources_otherscope[best_scope]++;
2290 
2291 		if (ifa_best->ia6_flags & IN6_IFF_DEPRECATED)
2292 			ip6stat.ip6s_sources_deprecated[best_scope]++;
2293 	}
2294 
2295 	return (ifa_best);
2296 }
2297 
2298 /*
2299  * return the best address out of the same scope. if no address was
2300  * found, return the first valid address from designated IF.
2301  */
2302 struct in6_ifaddr *
2303 in6_ifawithifp(struct ifnet *ifp, struct in6_addr *dst)
2304 {
2305 	int dst_scope =	in6_addrscope(dst), blen = -1, tlen;
2306 	struct ifaddr_container *ifac;
2307 	struct in6_ifaddr *besta = NULL;
2308 	struct in6_ifaddr *dep[2];	/* last-resort: deprecated */
2309 
2310 	dep[0] = dep[1] = NULL;
2311 
2312 	/*
2313 	 * We first look for addresses in the same scope.
2314 	 * If there is one, return it.
2315 	 * If two or more, return one which matches the dst longest.
2316 	 * If none, return one of global addresses assigned other ifs.
2317 	 */
2318 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2319 		struct ifaddr *ifa = ifac->ifa;
2320 
2321 		if (ifa->ifa_addr->sa_family != AF_INET6)
2322 			continue;
2323 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_ANYCAST)
2324 			continue; /* XXX: is there any case to allow anycast? */
2325 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY)
2326 			continue; /* don't use this interface */
2327 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DETACHED)
2328 			continue;
2329 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DEPRECATED) {
2330 			if (ip6_use_deprecated)
2331 				dep[0] = (struct in6_ifaddr *)ifa;
2332 			continue;
2333 		}
2334 
2335 		if (dst_scope == in6_addrscope(IFA_IN6(ifa))) {
2336 			/*
2337 			 * call in6_matchlen() as few as possible
2338 			 */
2339 			if (besta) {
2340 				if (blen == -1)
2341 					blen = in6_matchlen(&besta->ia_addr.sin6_addr, dst);
2342 				tlen = in6_matchlen(IFA_IN6(ifa), dst);
2343 				if (tlen > blen) {
2344 					blen = tlen;
2345 					besta = (struct in6_ifaddr *)ifa;
2346 				}
2347 			} else
2348 				besta = (struct in6_ifaddr *)ifa;
2349 		}
2350 	}
2351 	if (besta)
2352 		return (besta);
2353 
2354 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2355 		struct ifaddr *ifa = ifac->ifa;
2356 
2357 		if (ifa->ifa_addr->sa_family != AF_INET6)
2358 			continue;
2359 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_ANYCAST)
2360 			continue; /* XXX: is there any case to allow anycast? */
2361 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY)
2362 			continue; /* don't use this interface */
2363 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DETACHED)
2364 			continue;
2365 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DEPRECATED) {
2366 			if (ip6_use_deprecated)
2367 				dep[1] = (struct in6_ifaddr *)ifa;
2368 			continue;
2369 		}
2370 
2371 		return (struct in6_ifaddr *)ifa;
2372 	}
2373 
2374 	/* use the last-resort values, that are, deprecated addresses */
2375 	if (dep[0])
2376 		return dep[0];
2377 	if (dep[1])
2378 		return dep[1];
2379 
2380 	return NULL;
2381 }
2382 
2383 /*
2384  * perform DAD when interface becomes IFF_UP.
2385  */
2386 static void
2387 in6_if_up_dispatch(netmsg_t nmsg)
2388 {
2389 	struct lwkt_msg *lmsg = &nmsg->lmsg;
2390 	struct ifnet *ifp = lmsg->u.ms_resultp;
2391 	struct ifaddr_container *ifac;
2392 	struct in6_ifaddr *ia;
2393 	int dad_delay;		/* delay ticks before DAD output */
2394 
2395 	ASSERT_IN_NETISR(0);
2396 
2397 	/*
2398 	 * special cases, like 6to4, are handled in in6_ifattach
2399 	 */
2400 	in6_ifattach(ifp, NULL);
2401 
2402 	dad_delay = 0;
2403 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2404 		struct ifaddr *ifa = ifac->ifa;
2405 
2406 		if (ifa->ifa_addr->sa_family != AF_INET6)
2407 			continue;
2408 		ia = (struct in6_ifaddr *)ifa;
2409 		if (ia->ia6_flags & IN6_IFF_TENTATIVE)
2410 			nd6_dad_start(ifa, &dad_delay);
2411 	}
2412 
2413 	lwkt_replymsg(lmsg, 0);
2414 }
2415 
2416 void
2417 in6_if_up(struct ifnet *ifp)
2418 {
2419 	struct netmsg_base nmsg;
2420 	struct lwkt_msg *lmsg = &nmsg.lmsg;
2421 
2422 	ASSERT_CANDOMSG_NETISR0(curthread);
2423 
2424 	netmsg_init(&nmsg, NULL, &curthread->td_msgport, 0, in6_if_up_dispatch);
2425 	lmsg->u.ms_resultp = ifp;
2426 	lwkt_domsg(netisr_cpuport(0), lmsg, 0);
2427 }
2428 
2429 int
2430 in6if_do_dad(struct ifnet *ifp)
2431 {
2432 	if (ifp->if_flags & IFF_LOOPBACK)
2433 		return (0);
2434 
2435 	switch (ifp->if_type) {
2436 #ifdef IFT_DUMMY
2437 	case IFT_DUMMY:
2438 #endif
2439 	case IFT_FAITH:
2440 		/*
2441 		 * These interfaces do not have the IFF_LOOPBACK flag,
2442 		 * but loop packets back.  We do not have to do DAD on such
2443 		 * interfaces.  We should even omit it, because loop-backed
2444 		 * NS would confuse the DAD procedure.
2445 		 */
2446 		return (0);
2447 	default:
2448 		/*
2449 		 * Our DAD routine requires the interface up and running.
2450 		 * However, some interfaces can be up before the RUNNING
2451 		 * status.  Additionaly, users may try to assign addresses
2452 		 * before the interface becomes up (or running).
2453 		 * We simply skip DAD in such a case as a work around.
2454 		 * XXX: we should rather mark "tentative" on such addresses,
2455 		 * and do DAD after the interface becomes ready.
2456 		 */
2457 		if ((ifp->if_flags & (IFF_UP|IFF_RUNNING)) !=
2458 		    (IFF_UP|IFF_RUNNING))
2459 			return (0);
2460 
2461 		return (1);
2462 	}
2463 }
2464 
2465 /*
2466  * Calculate max IPv6 MTU through all the interfaces and store it
2467  * to in6_maxmtu.
2468  */
2469 void
2470 in6_setmaxmtu(void)
2471 {
2472 	unsigned long maxmtu = 0;
2473 	const struct ifnet_array *arr;
2474 	int i;
2475 
2476 	ASSERT_IN_NETISR(0);
2477 
2478 	arr = ifnet_array_get();
2479 	for (i = 0; i < arr->ifnet_count; ++i) {
2480 		struct ifnet *ifp = arr->ifnet_arr[i];
2481 
2482 		/* this function can be called during ifnet initialization */
2483 		if (ifp->if_afdata[AF_INET6] == NULL)
2484 			continue;
2485 		if ((ifp->if_flags & IFF_LOOPBACK) == 0 &&
2486 		    IN6_LINKMTU(ifp) > maxmtu)
2487 			maxmtu = IN6_LINKMTU(ifp);
2488 	}
2489 	if (maxmtu)	/* update only when maxmtu is positive */
2490 		in6_maxmtu = maxmtu;
2491 }
2492 
2493 void *
2494 in6_domifattach(struct ifnet *ifp)
2495 {
2496 	struct in6_ifextra *ext;
2497 
2498 	ext = (struct in6_ifextra *)kmalloc(sizeof(*ext), M_IFADDR, M_WAITOK);
2499 	bzero(ext, sizeof(*ext));
2500 
2501 	ext->in6_ifstat = (struct in6_ifstat *)kmalloc(sizeof(struct in6_ifstat),
2502 		M_IFADDR, M_WAITOK);
2503 	bzero(ext->in6_ifstat, sizeof(*ext->in6_ifstat));
2504 
2505 	ext->icmp6_ifstat =
2506 		(struct icmp6_ifstat *)kmalloc(sizeof(struct icmp6_ifstat),
2507 			M_IFADDR, M_WAITOK);
2508 	bzero(ext->icmp6_ifstat, sizeof(*ext->icmp6_ifstat));
2509 
2510 	ext->nd_ifinfo = nd6_ifattach(ifp);
2511 	ext->scope6_id = scope6_ifattach(ifp);
2512 	return ext;
2513 }
2514 
2515 void
2516 in6_domifdetach(struct ifnet *ifp, void *aux)
2517 {
2518 	struct in6_ifextra *ext = (struct in6_ifextra *)aux;
2519 	scope6_ifdetach(ext->scope6_id);
2520 	nd6_ifdetach(ext->nd_ifinfo);
2521 	kfree(ext->in6_ifstat, M_IFADDR);
2522 	kfree(ext->icmp6_ifstat, M_IFADDR);
2523 	kfree(ext, M_IFADDR);
2524 }
2525