xref: /dragonfly/sys/netinet6/in6.c (revision 7485684f)
1 /*	$FreeBSD: src/sys/netinet6/in6.c,v 1.7.2.9 2002/04/28 05:40:26 suz Exp $	*/
2 /*	$KAME: in6.c,v 1.259 2002/01/21 11:37:50 keiichi Exp $	*/
3 
4 /*
5  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. Neither the name of the project nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 /*
34  * Copyright (c) 1982, 1986, 1991, 1993
35  *	The Regents of the University of California.  All rights reserved.
36  *
37  * Redistribution and use in source and binary forms, with or without
38  * modification, are permitted provided that the following conditions
39  * are met:
40  * 1. Redistributions of source code must retain the above copyright
41  *    notice, this list of conditions and the following disclaimer.
42  * 2. Redistributions in binary form must reproduce the above copyright
43  *    notice, this list of conditions and the following disclaimer in the
44  *    documentation and/or other materials provided with the distribution.
45  * 3. Neither the name of the University nor the names of its contributors
46  *    may be used to endorse or promote products derived from this software
47  *    without specific prior written permission.
48  *
49  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
50  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
51  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
52  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
53  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
54  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
55  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
56  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
57  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
58  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
59  * SUCH DAMAGE.
60  *
61  *	@(#)in.c	8.2 (Berkeley) 11/15/93
62  */
63 
64 #include "opt_inet.h"
65 #include "opt_inet6.h"
66 
67 #include <sys/param.h>
68 #include <sys/errno.h>
69 #include <sys/malloc.h>
70 #include <sys/socket.h>
71 #include <sys/socketvar.h>
72 #include <sys/sockio.h>
73 #include <sys/systm.h>
74 #include <sys/proc.h>
75 #include <sys/caps.h>
76 #include <sys/time.h>
77 #include <sys/kernel.h>
78 #include <sys/syslog.h>
79 #include <sys/jail.h>
80 
81 #include <sys/thread2.h>
82 #include <sys/msgport2.h>
83 
84 #include <net/if.h>
85 #include <net/if_types.h>
86 #include <net/route.h>
87 #include <net/if_dl.h>
88 #include <net/netmsg2.h>
89 #include <net/netisr2.h>
90 
91 #include <netinet/in.h>
92 #include <netinet/in_var.h>
93 #include <netinet/if_ether.h>
94 #include <netinet/in_systm.h>
95 #include <netinet/ip.h>
96 #include <netinet/in_pcb.h>
97 
98 #include <netinet/ip6.h>
99 #include <netinet6/ip6_var.h>
100 #include <netinet6/nd6.h>
101 #include <netinet6/mld6_var.h>
102 #include <netinet6/ip6_mroute.h>
103 #include <netinet6/in6_ifattach.h>
104 #include <netinet6/scope6_var.h>
105 #include <netinet6/in6_pcb.h>
106 #include <netinet6/in6_var.h>
107 
108 #include <net/net_osdep.h>
109 
110 /*
111  * Definitions of some costant IP6 addresses.
112  */
113 const struct in6_addr kin6addr_any = IN6ADDR_ANY_INIT;
114 const struct in6_addr kin6addr_loopback = IN6ADDR_LOOPBACK_INIT;
115 const struct in6_addr kin6addr_nodelocal_allnodes =
116 	IN6ADDR_NODELOCAL_ALLNODES_INIT;
117 const struct in6_addr kin6addr_linklocal_allnodes =
118 	IN6ADDR_LINKLOCAL_ALLNODES_INIT;
119 const struct in6_addr kin6addr_linklocal_allrouters =
120 	IN6ADDR_LINKLOCAL_ALLROUTERS_INIT;
121 
122 const struct in6_addr in6mask0 = IN6MASK0;
123 const struct in6_addr in6mask32 = IN6MASK32;
124 const struct in6_addr in6mask64 = IN6MASK64;
125 const struct in6_addr in6mask96 = IN6MASK96;
126 const struct in6_addr in6mask128 = IN6MASK128;
127 
128 const struct sockaddr_in6 sa6_any = {sizeof(sa6_any), AF_INET6,
129 				     0, 0, IN6ADDR_ANY_INIT, 0};
130 
131 static int in6_lifaddr_ioctl (u_long, caddr_t, struct ifnet *,
132 	     struct thread *);
133 static int in6_ifinit (struct ifnet *, struct in6_ifaddr *,
134 			   struct sockaddr_in6 *, int);
135 static void in6_unlink_ifa (struct in6_ifaddr *, struct ifnet *);
136 static void in6_ifloop_request_callback(int, int, struct rt_addrinfo *, struct rtentry *, void *);
137 
138 static void	in6_control_internal_dispatch(netmsg_t);
139 static int	in6_control_internal(u_long, caddr_t, struct ifnet *,
140 		    struct thread *);
141 
142 struct in6_multihead in6_multihead;	/* XXX BSS initialization */
143 
144 /*
145  * Subroutine for in6_ifaddloop() and in6_ifremloop().
146  * This routine does actual work.
147  */
148 static void
149 in6_ifloop_request(int cmd, struct ifaddr *ifa,
150     void (*callback)(int, int, struct rt_addrinfo *, struct rtentry *, void *))
151 {
152 	struct sockaddr_in6 all1_sa;
153         struct rt_addrinfo rtinfo;
154 	int error;
155 
156 	bzero(&all1_sa, sizeof(all1_sa));
157 	all1_sa.sin6_family = AF_INET6;
158 	all1_sa.sin6_len = sizeof(struct sockaddr_in6);
159 	all1_sa.sin6_addr = in6mask128;
160 
161 	/*
162 	 * We specify the address itself as the gateway, and set the
163 	 * RTF_LLINFO flag, so that the corresponding host route would have
164 	 * the flag, and thus applications that assume traditional behavior
165 	 * would be happy.  Note that we assume the caller of the function
166 	 * (probably implicitly) set nd6_rtrequest() to ifa->ifa_rtrequest,
167 	 * which changes the outgoing interface to the loopback interface.
168 	 */
169 	bzero(&rtinfo, sizeof(struct rt_addrinfo));
170 	rtinfo.rti_info[RTAX_DST] = ifa->ifa_addr;
171 	rtinfo.rti_info[RTAX_GATEWAY] = ifa->ifa_addr;
172 	rtinfo.rti_info[RTAX_NETMASK] = (struct sockaddr *)&all1_sa;
173 	rtinfo.rti_flags = RTF_UP|RTF_HOST|RTF_LLINFO;
174 
175 	error = rtrequest1_global(cmd, &rtinfo, callback, ifa, RTREQ_PRIO_NORM);
176 	if (error != 0) {
177 		log(LOG_ERR, "in6_ifloop_request: "
178 		    "%s operation failed for %s (errno=%d)\n",
179 		    cmd == RTM_ADD ? "ADD" : cmd == RTM_DELETE ? "DELETE" : "GET",
180 		    ip6_sprintf(&((struct in6_ifaddr *)ifa)->ia_addr.sin6_addr),
181 		    error);
182 	}
183 }
184 
185 static void
186 in6_ifloop_request_callback(int cmd, int error, struct rt_addrinfo *rtinfo,
187 			    struct rtentry *rt, void *arg)
188 {
189 	struct ifaddr *ifa = arg;
190 
191 	if (error)
192 		goto done;
193 
194 	/*
195 	 * Make sure rt_ifa be equal to IFA, the second argument of the
196 	 * function.
197 	 * We need this because when we refer to rt_ifa->ia6_flags in
198 	 * ip6_input, we assume that the rt_ifa points to the address instead
199 	 * of the loopback address.
200 	 */
201 	if (cmd == RTM_ADD && rt && ifa != rt->rt_ifa) {
202 		++rt->rt_refcnt;
203 		IFAFREE(rt->rt_ifa);
204 		IFAREF(ifa);
205 		rt->rt_ifa = ifa;
206 		--rt->rt_refcnt;
207 	}
208 
209 	/*
210 	 * Report the addition/removal of the address to the routing socket,
211 	 * unless the address is marked as tentative, where it will be reported
212 	 * once DAD completes.
213 	 * XXX: since we called rtinit for a p2p interface with a destination,
214 	 *      we end up reporting twice in such a case.  Should we rather
215 	 *      omit the second report?
216 	 */
217 	if (rt) {
218 		if (mycpuid == 0) {
219 			struct in6_ifaddr *ia6 = (struct in6_ifaddr *)ifa;
220 
221 			if (cmd != RTM_ADD ||
222 			    !(ia6->ia6_flags & IN6_IFF_TENTATIVE))
223 				rt_newaddrmsg(cmd, ifa, error, rt);
224 		}
225 		if (cmd == RTM_DELETE) {
226 			if (rt->rt_refcnt == 0) {
227 				++rt->rt_refcnt;
228 				rtfree(rt);
229 			}
230 		}
231 	}
232 done:
233 	/* no way to return any new error */
234 	;
235 }
236 
237 static void
238 in6_newaddrmsg_callback(int cmd, int error, struct rt_addrinfo *rtinfo,
239 			struct rtentry *rt, void *arg)
240 {
241 	struct ifaddr *ifa = arg;
242 
243 	if (error == 0 && rt != NULL && mycpuid == 0)
244 		rt_newaddrmsg(RTM_ADD, ifa, error, rt);
245 }
246 
247 void
248 in6_newaddrmsg(struct ifaddr *ifa)
249 {
250 	in6_ifloop_request(RTM_GET, ifa, in6_newaddrmsg_callback);
251 }
252 
253 /*
254  * Add ownaddr as loopback rtentry.  We previously add the route only if
255  * necessary (ex. on a p2p link).  However, since we now manage addresses
256  * separately from prefixes, we should always add the route.  We can't
257  * rely on the cloning mechanism from the corresponding interface route
258  * any more.
259  */
260 void
261 in6_ifaddloop(struct ifaddr *ifa)
262 {
263 	struct rtentry *rt;
264 
265 	/* If there is no loopback entry, allocate one. */
266 	rt = rtpurelookup(ifa->ifa_addr);
267 	if (rt == NULL || !(rt->rt_flags & RTF_HOST) ||
268 	    !(rt->rt_ifp->if_flags & IFF_LOOPBACK))
269 		in6_ifloop_request(RTM_ADD, ifa, in6_ifloop_request_callback);
270 	if (rt != NULL)
271 		rt->rt_refcnt--;
272 }
273 
274 /*
275  * Remove loopback rtentry of ownaddr generated by in6_ifaddloop(),
276  * if it exists.
277  */
278 void
279 in6_ifremloop(struct ifaddr *ifa)
280 {
281 	struct in6_ifaddr *ia;
282 	struct rtentry *rt;
283 	int ia_count = 0;
284 
285 	/*
286 	 * Some of BSD variants do not remove cloned routes
287 	 * from an interface direct route, when removing the direct route
288 	 * (see comments in net/net_osdep.h).  Even for variants that do remove
289 	 * cloned routes, they could fail to remove the cloned routes when
290 	 * we handle multple addresses that share a common prefix.
291 	 * So, we should remove the route corresponding to the deleted address
292 	 * regardless of the result of in6_is_ifloop_auto().
293 	 */
294 
295 	/*
296 	 * Delete the entry only if exact one ifa exists.  More than one ifa
297 	 * can exist if we assign a same single address to multiple
298 	 * (probably p2p) interfaces.
299 	 * XXX: we should avoid such a configuration in IPv6...
300 	 */
301 	for (ia = in6_ifaddr; ia; ia = ia->ia_next) {
302 		if (IN6_ARE_ADDR_EQUAL(IFA_IN6(ifa), &ia->ia_addr.sin6_addr)) {
303 			ia_count++;
304 			if (ia_count > 1)
305 				break;
306 		}
307 	}
308 
309 	if (ia_count == 1) {
310 		/*
311 		 * Before deleting, check if a corresponding loopbacked host
312 		 * route surely exists.  With this check, we can avoid to
313 		 * delete an interface direct route whose destination is same
314 		 * as the address being removed.  This can happen when remofing
315 		 * a subnet-router anycast address on an interface attahced
316 		 * to a shared medium.
317 		 */
318 		rt = rtpurelookup(ifa->ifa_addr);
319 		if (rt != NULL && (rt->rt_flags & RTF_HOST) &&
320 		    (rt->rt_ifp->if_flags & IFF_LOOPBACK)) {
321 			rt->rt_refcnt--;
322 			in6_ifloop_request(RTM_DELETE, ifa,
323 			                   in6_ifloop_request_callback);
324 		}
325 	}
326 }
327 
328 int
329 in6_mask2len(const struct in6_addr *mask, const u_char *lim0)
330 {
331 	int x = 0, y;
332 	const u_char *lim = lim0, *p;
333 
334 	if (lim0 == NULL ||
335 	    lim0 - (const u_char *)mask > sizeof(*mask)) {
336 		/* Ignore the scope_id part */
337 		lim = (const u_char *)mask + sizeof(*mask);
338 	}
339 	for (p = (const u_char *)mask; p < lim; x++, p++) {
340 		if (*p != 0xff)
341 			break;
342 	}
343 	y = 0;
344 	if (p < lim) {
345 		for (y = 0; y < 8; y++) {
346 			if ((*p & (0x80 >> y)) == 0)
347 				break;
348 		}
349 	}
350 
351 	/*
352 	 * When the limit pointer is given, do a stricter check on the
353 	 * remaining bits.
354 	 */
355 	if (p < lim) {
356 		if (y != 0 && (*p & (0x00ff >> y)) != 0)
357 			return (-1);
358 		for (p = p + 1; p < lim; p++)
359 			if (*p != 0)
360 				return (-1);
361 	}
362 
363 	return x * 8 + y;
364 }
365 
366 #define ifa2ia6(ifa)	((struct in6_ifaddr *)(ifa))
367 #define ia62ifa(ia6)	(&((ia6)->ia_ifa))
368 
369 void
370 in6_control_dispatch(netmsg_t msg)
371 {
372 	int error;
373 
374 	error = in6_control(msg->control.nm_cmd,
375 			    msg->control.nm_data,
376 			    msg->control.nm_ifp,
377 			    msg->control.nm_td);
378 	lwkt_replymsg(&msg->control.base.lmsg, error);
379 }
380 
381 int
382 in6_control(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
383 {
384 	struct netmsg_pru_control msg;
385 
386 	switch (cmd) {
387 	case SIOCSIFPREFIX_IN6:
388 	case SIOCDIFPREFIX_IN6:
389 	case SIOCAIFPREFIX_IN6:
390 	case SIOCCIFPREFIX_IN6:
391 	case SIOCSGIFPREFIX_IN6:
392 	case SIOCGIFPREFIX_IN6:
393 		log(LOG_NOTICE, "prefix ioctls are now invalidated. "
394 		    "please use ifconfig.\n");
395 		return (EOPNOTSUPP);
396 
397 	case SIOCSIFADDR_IN6:
398 	case SIOCSIFDSTADDR_IN6:
399 	case SIOCSIFNETMASK_IN6:
400 		/*
401 		 * Since IPv6 allows a node to assign multiple addresses
402 		 * on a single interface, SIOCSIFxxx ioctls are not suitable
403 		 * and should be unused.
404 		 */
405 		/* We decided to obsolete this command (20000704) */
406 		return (EINVAL);
407 
408 	case SIOCSIFADDR:
409 	case SIOCSIFDSTADDR:
410 	case SIOCSIFBRDADDR:
411 	case SIOCSIFNETMASK:
412 		/*
413 		 * Do not pass those ioctl to driver handler since they are not
414 		 * properly setup.  Instead just error out.
415 		 */
416 		return (EOPNOTSUPP);
417 
418 	/* mroute */
419 	case SIOCGETSGCNT_IN6:
420 	case SIOCGETMIFCNT_IN6:
421 	/* srcsel policy */
422 	case SIOCAADDRCTL_POLICY:
423 	case SIOCDADDRCTL_POLICY:
424 	/* nd6 */
425 	case SIOCSNDFLUSH_IN6:
426 	case SIOCSPFXFLUSH_IN6:
427 	case SIOCSRTRFLUSH_IN6:
428 	case SIOCSDEFIFACE_IN6:
429 	case SIOCSIFINFO_FLAGS:
430 	case SIOCSIFINFO_IN6:
431 	case OSIOCGIFINFO_IN6:
432 	case SIOCGIFINFO_IN6:
433 	case SIOCGDRLST_IN6:
434 	case SIOCGPRLST_IN6:
435 	case SIOCGNBRINFO_IN6:
436 	case SIOCGDEFIFACE_IN6:
437 	/* scope6 */
438 	case SIOCSSCOPE6:
439 	case SIOCGSCOPE6:
440 	case SIOCGSCOPE6DEF:
441 	/* change address */
442 	case SIOCALIFADDR:
443 	case SIOCDLIFADDR:
444 	case SIOCSIFALIFETIME_IN6:
445 	case SIOCAIFADDR_IN6:
446 	case SIOCDIFADDR_IN6:
447 		/*
448 		 * Dispatch these SIOCs to netisr0.
449 		 */
450 		netmsg_init(&msg.base, NULL, &curthread->td_msgport, 0,
451 		    in6_control_internal_dispatch);
452 		msg.nm_cmd = cmd;
453 		msg.nm_data = data;
454 		msg.nm_ifp = ifp;
455 		msg.nm_td = td;
456 		lwkt_domsg(netisr_cpuport(0), &msg.base.lmsg, 0);
457 		return msg.base.lmsg.ms_error;
458 
459 	default:
460 		return in6_control_internal(cmd, data, ifp, td);
461 	}
462 }
463 
464 static void
465 in6_control_internal_dispatch(netmsg_t msg)
466 {
467 	int error;
468 
469 	error = in6_control_internal(msg->control.nm_cmd, msg->control.nm_data,
470 	    msg->control.nm_ifp, msg->control.nm_td);
471 	lwkt_replymsg(&msg->lmsg, error);
472 }
473 
474 static int
475 in6_control_internal(u_long cmd, caddr_t data, struct ifnet *ifp,
476 		     struct thread *td)
477 {
478 	struct in6_ifreq *ifr = (struct in6_ifreq *)data;
479 	struct in6_ifaddr *ia = NULL;
480 	struct in6_aliasreq *ifra = (struct in6_aliasreq *)data;
481 	struct in6_ifextra *xtra;
482 	boolean_t privileged;
483 	int error;
484 
485 	privileged = FALSE;
486 	if (caps_priv_check_td(td, SYSCAP_RESTRICTEDROOT) == 0)
487 		privileged = TRUE;
488 
489 	switch (cmd) {
490 	case SIOCALIFADDR:
491 	case SIOCDLIFADDR:
492 		if (!privileged)
493 			return (EPERM);
494 		/* FALLTHROUGH */
495 	case SIOCGLIFADDR:
496 		if (ifp == NULL)
497 			return (EOPNOTSUPP);
498 		return in6_lifaddr_ioctl(cmd, data, ifp, td);
499 	}
500 
501 	switch (cmd) {
502 	case SIOCGETSGCNT_IN6:
503 	case SIOCGETMIFCNT_IN6:
504 		return (mrt6_ioctl(cmd, data));
505 	}
506 
507 	switch(cmd) {
508 	case SIOCAADDRCTL_POLICY:
509 	case SIOCDADDRCTL_POLICY:
510 		if (!privileged)
511 			return (EPERM);
512 		return (in6_src_ioctl(cmd, data));
513 	}
514 
515 	if (ifp == NULL)
516 		return (EOPNOTSUPP);
517 
518 	switch (cmd) {
519 	case SIOCSNDFLUSH_IN6:
520 	case SIOCSPFXFLUSH_IN6:
521 	case SIOCSRTRFLUSH_IN6:
522 	case SIOCSDEFIFACE_IN6:
523 	case SIOCSIFINFO_FLAGS:
524 	case SIOCSIFINFO_IN6:
525 		if (!privileged)
526 			return (EPERM);
527 		/* FALLTHROUGH */
528 	case OSIOCGIFINFO_IN6:
529 	case SIOCGIFINFO_IN6:
530 	case SIOCGDRLST_IN6:
531 	case SIOCGPRLST_IN6:
532 	case SIOCGNBRINFO_IN6:
533 	case SIOCGDEFIFACE_IN6:
534 		return (nd6_ioctl(cmd, data, ifp));
535 	}
536 
537 	switch (cmd) {
538 	case SIOCSSCOPE6:
539 		if (!privileged)
540 			return (EPERM);
541 		return (scope6_set(ifp,
542 			(struct scope6_id *)ifr->ifr_ifru.ifru_scope_id));
543 
544 	case SIOCGSCOPE6:
545 		return (scope6_get(ifp,
546 			(struct scope6_id *)ifr->ifr_ifru.ifru_scope_id));
547 
548 	case SIOCGSCOPE6DEF:
549 		return (scope6_get_default((struct scope6_id *)
550 			ifr->ifr_ifru.ifru_scope_id));
551 	}
552 
553 	/*
554 	 * Find address for this interface, if it exists.
555 	 */
556 	if (ifra->ifra_addr.sin6_family == AF_INET6) { /* XXX */
557 		struct sockaddr_in6 *sa6 =
558 		    (struct sockaddr_in6 *)&ifra->ifra_addr;
559 
560 		if (IN6_IS_ADDR_LINKLOCAL(&sa6->sin6_addr)) {
561 			if (sa6->sin6_addr.s6_addr16[1] == 0) {
562 				/* Link ID is not embedded by the user */
563 				sa6->sin6_addr.s6_addr16[1] =
564 				    htons(ifp->if_index);
565 			} else if (sa6->sin6_addr.s6_addr16[1] !=
566 			    htons(ifp->if_index)) {
567 				/* Link ID contradicts */
568 				return (EINVAL);
569 			}
570 			if (sa6->sin6_scope_id) {
571 				if (sa6->sin6_scope_id !=
572 				    (u_int32_t)ifp->if_index)
573 					return (EINVAL);
574 				sa6->sin6_scope_id = 0; /* XXX: good way? */
575 			}
576 		}
577 		ia = in6ifa_ifpwithaddr(ifp, &ifra->ifra_addr.sin6_addr);
578 	}
579 
580 	switch (cmd) {
581 	case SIOCDIFADDR_IN6:
582 		/*
583 		 * For IPv4, we look for existing in_ifaddr here to allow
584 		 * "ifconfig if0 delete" to remove first IPv4 address on the
585 		 * interface.  For IPv6, as the spec allow multiple interface
586 		 * address from the day one, we consider "remove the first one"
587 		 * semantics to be not preferable.
588 		 */
589 		if (ia == NULL)
590 			return (EADDRNOTAVAIL);
591 		/* FALLTHROUGH */
592 	case SIOCAIFADDR_IN6:
593 		/*
594 		 * We always require users to specify a valid IPv6 address for
595 		 * the corresponding operation.
596 		 */
597 		if (ifra->ifra_addr.sin6_family != AF_INET6 ||
598 		    ifra->ifra_addr.sin6_len != sizeof(struct sockaddr_in6))
599 			return (EAFNOSUPPORT);
600 		if (!privileged)
601 			return (EPERM);
602 		break;
603 
604 	case SIOCGIFADDR_IN6:
605 		/* This interface is basically deprecated.  Use SIOCGIFCONF. */
606 		/* FALLTHROUGH */
607 	case SIOCGIFAFLAG_IN6:
608 	case SIOCGIFNETMASK_IN6:
609 	case SIOCGIFDSTADDR_IN6:
610 	case SIOCGIFALIFETIME_IN6:
611 		/* Must think again about its semantics */
612 		if (ia == NULL)
613 			return (EADDRNOTAVAIL);
614 		break;
615 
616 	case SIOCSIFALIFETIME_IN6:
617 	    {
618 		const struct in6_addrlifetime *lt;
619 
620 		if (!privileged)
621 			return (EPERM);
622 		if (ia == NULL)
623 			return (EADDRNOTAVAIL);
624 		/* Sanity for overflow - beware unsigned */
625 		lt = &ifr->ifr_ifru.ifru_lifetime;
626 		if (lt->ia6t_vltime != ND6_INFINITE_LIFETIME &&
627 		    lt->ia6t_vltime + time_uptime < time_uptime)
628 			return EINVAL;
629 		if (lt->ia6t_pltime != ND6_INFINITE_LIFETIME &&
630 		    lt->ia6t_pltime + time_uptime < time_uptime)
631 			return EINVAL;
632 		break;
633 	    }
634 	}
635 
636 	switch (cmd) {
637 	case SIOCGIFADDR_IN6:
638 		ifr->ifr_addr = ia->ia_addr;
639 		break;
640 
641 	case SIOCGIFDSTADDR_IN6:
642 		if (!(ifp->if_flags & IFF_POINTOPOINT))
643 			return (EINVAL);
644 		/*
645 		 * XXX: Should we check if ifa_dstaddr is NULL and return
646 		 * an error?
647 		 */
648 		ifr->ifr_dstaddr = ia->ia_dstaddr;
649 		break;
650 
651 	case SIOCGIFNETMASK_IN6:
652 		ifr->ifr_addr = ia->ia_prefixmask;
653 		break;
654 
655 	case SIOCGIFAFLAG_IN6:
656 		ifr->ifr_ifru.ifru_flags6 = ia->ia6_flags;
657 		break;
658 
659 	case SIOCGIFSTAT_IN6:
660 		if ((xtra = ifp->if_afdata[AF_INET6]) == NULL)
661 			return EINVAL;
662 		bzero(&ifr->ifr_ifru.ifru_stat,
663 		    sizeof(ifr->ifr_ifru.ifru_stat));
664 		ifr->ifr_ifru.ifru_stat = *xtra->in6_ifstat;
665 		break;
666 
667 	case SIOCGIFSTAT_ICMP6:
668 		if ((xtra = ifp->if_afdata[AF_INET6]) == NULL)
669 			return EINVAL;
670 		bzero(&ifr->ifr_ifru.ifru_stat,
671 		    sizeof(ifr->ifr_ifru.ifru_icmp6stat));
672 		ifr->ifr_ifru.ifru_icmp6stat = *xtra->icmp6_ifstat;
673 		break;
674 
675 	case SIOCGIFALIFETIME_IN6:
676 		ifr->ifr_ifru.ifru_lifetime = ia->ia6_lifetime;
677 		break;
678 
679 	case SIOCSIFALIFETIME_IN6:
680 		ia->ia6_lifetime = ifr->ifr_ifru.ifru_lifetime;
681 		if (ia->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) {
682 			ia->ia6_lifetime.ia6t_expire =
683 			    time_uptime + ia->ia6_lifetime.ia6t_vltime;
684 		} else {
685 			ia->ia6_lifetime.ia6t_expire = 0;
686 		}
687 		if (ia->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) {
688 			ia->ia6_lifetime.ia6t_preferred =
689 			    time_uptime + ia->ia6_lifetime.ia6t_pltime;
690 		} else {
691 			ia->ia6_lifetime.ia6t_preferred = 0;
692 		}
693 		break;
694 
695 	case SIOCAIFADDR_IN6:
696 	{
697 		int i, error = 0, iaIsNew;
698 		struct nd_prefix pr0, *pr;
699 
700 		if (ia != NULL)
701 			iaIsNew = 0;
702 		else
703 			iaIsNew = 1;
704 
705 		/*
706 		 * First, make or update the interface address structure,
707 		 * and link it to the list.
708 		 */
709 		if ((error = in6_update_ifa(ifp, ifra, ia)) != 0)
710 			return (error);
711 
712 		/*
713 		 * Then, make the prefix on-link on the interface.
714 		 * XXX: We'd rather create the prefix before the address, but
715 		 * we need at least one address to install the corresponding
716 		 * interface route, so we configure the address first.
717 		 */
718 
719 		/*
720 		 * Convert mask to prefix length (prefixmask has already
721 		 * been validated in in6_update_ifa().
722 		 */
723 		bzero(&pr0, sizeof(pr0));
724 		pr0.ndpr_ifp = ifp;
725 		pr0.ndpr_plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr,
726 		    NULL);
727 		if (pr0.ndpr_plen == 128)
728 			break;	/* no need to install a host route. */
729 		pr0.ndpr_prefix = ifra->ifra_addr;
730 		pr0.ndpr_mask = ifra->ifra_prefixmask.sin6_addr;
731 		/* Apply the mask for safety. */
732 		for (i = 0; i < 4; i++) {
733 			pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &=
734 			    ifra->ifra_prefixmask.sin6_addr.s6_addr32[i];
735 		}
736 		/*
737 		 * XXX: Since we don't have an API to set prefix (not address)
738 		 * lifetimes, we just use the same lifetimes as addresses.
739 		 * The (temporarily) installed lifetimes can be overridden by
740 		 * later advertised RAs (when accept_rtadv is non 0), which is
741 		 * an intended behavior.
742 		 */
743 		pr0.ndpr_raf_onlink = 1; /* should be configurable? */
744 		pr0.ndpr_raf_auto =
745 		    ((ifra->ifra_flags & IN6_IFF_AUTOCONF) != 0);
746 		pr0.ndpr_vltime = ifra->ifra_lifetime.ia6t_vltime;
747 		pr0.ndpr_pltime = ifra->ifra_lifetime.ia6t_pltime;
748 
749 		/* Add the prefix if there's one. */
750 		if ((pr = nd6_prefix_lookup(&pr0)) == NULL) {
751 			/*
752 			 * nd6_prelist_add will install the corresponding
753 			 * interface route.
754 			 */
755 			if ((error = nd6_prelist_add(&pr0, NULL, &pr)) != 0)
756 				return (error);
757 			if (pr == NULL) {
758 				log(LOG_ERR, "nd6_prelist_add succeeded but "
759 				    "no prefix\n");
760 				return (EINVAL); /* XXX panic here? */
761 			}
762 		}
763 
764 		ia = in6ifa_ifpwithaddr(ifp, &ifra->ifra_addr.sin6_addr);
765 		if (ia == NULL) {
766 		    	/* XXX: This should not happen! */
767 			log(LOG_ERR, "in6_control: addition succeeded, but"
768 			    " no ifaddr\n");
769 		} else {
770 			if ((ia->ia6_flags & IN6_IFF_AUTOCONF) &&
771 			    ia->ia6_ndpr == NULL) {
772 				/*
773 				 * New autoconf address
774 				 */
775 				ia->ia6_ndpr = pr;
776 				pr->ndpr_refcnt++;
777 
778 				/*
779 				 * If this is the first autoconf address from
780 				 * the prefix, create a temporary address
781 				 * as well (when specified).
782 				 */
783 				if (ip6_use_tempaddr && pr->ndpr_refcnt == 1) {
784 					int e;
785 
786 					if ((e = in6_tmpifadd(ia, 1)) != 0) {
787 						log(LOG_NOTICE, "in6_control: "
788 						    "failed to create a "
789 						    "temporary address, "
790 						    "errno=%d\n", e);
791 					}
792 				}
793 			}
794 
795 			/*
796 			 * This might affect the status of autoconfigured
797 			 * addresses, that is, this address might make
798 			 * other addresses detached.
799 			 */
800 			pfxlist_onlink_check();
801 		}
802 		if (error == 0 && ia) {
803 			EVENTHANDLER_INVOKE(ifaddr_event, ifp,
804 			    iaIsNew ? IFADDR_EVENT_ADD : IFADDR_EVENT_CHANGE,
805 			    &ia->ia_ifa);
806 		}
807 		break;
808 	}
809 
810 	case SIOCDIFADDR_IN6:
811 	{
812 		int i = 0;
813 		struct nd_prefix pr0, *pr;
814 
815 		/*
816 		 * If the address being deleted is the only one that owns
817 		 * the corresponding prefix, expire the prefix as well.
818 		 * XXX: Theoretically, we don't have to warry about such
819 		 * relationship, since we separate the address management
820 		 * and the prefix management.  We do this, however, to provide
821 		 * as much backward compatibility as possible in terms of
822 		 * the ioctl operation.
823 		 */
824 		bzero(&pr0, sizeof(pr0));
825 		pr0.ndpr_ifp = ifp;
826 		pr0.ndpr_plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr,
827 		    NULL);
828 		if (pr0.ndpr_plen == 128)
829 			goto purgeaddr;
830 		pr0.ndpr_prefix = ia->ia_addr;
831 		pr0.ndpr_mask = ia->ia_prefixmask.sin6_addr;
832 		for (i = 0; i < 4; i++) {
833 			pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &=
834 			    ia->ia_prefixmask.sin6_addr.s6_addr32[i];
835 		}
836 		/*
837 		 * The logic of the following condition is a bit complicated.
838 		 * We expire the prefix when
839 		 * 1. The address obeys autoconfiguration and it is the
840 		 *    only owner of the associated prefix, or
841 		 * 2. The address does not obey autoconf and there is no
842 		 *    other owner of the prefix.
843 		 */
844 		if ((pr = nd6_prefix_lookup(&pr0)) != NULL &&
845 		    (((ia->ia6_flags & IN6_IFF_AUTOCONF) &&
846 		      pr->ndpr_refcnt == 1) ||
847 		     (!(ia->ia6_flags & IN6_IFF_AUTOCONF) &&
848 		      pr->ndpr_refcnt == 0)))
849 			pr->ndpr_expire = 1; /* XXX: just for expiration */
850 
851 purgeaddr:
852 		EVENTHANDLER_INVOKE(ifaddr_event, ifp, IFADDR_EVENT_DELETE,
853 		    &ia->ia_ifa);
854 		in6_purgeaddr(&ia->ia_ifa);
855 		break;
856 	}
857 
858 	default:
859 		if (ifp->if_ioctl == NULL)
860 			return (EOPNOTSUPP);
861 		ifnet_serialize_all(ifp);
862 		error = ifp->if_ioctl(ifp, cmd, data, td->td_proc->p_ucred);
863 		ifnet_deserialize_all(ifp);
864 		return (error);
865 	}
866 
867 	return (0);
868 }
869 
870 /*
871  * Update parameters of an IPv6 interface address.
872  * If necessary, a new entry is created and linked into address chains.
873  * This function is separated from in6_control().
874  * XXX: should this be performed under splnet()?
875  */
876 int
877 in6_update_ifa(struct ifnet *ifp, struct in6_aliasreq *ifra,
878 	       struct in6_ifaddr *ia)
879 {
880 	int error = 0, hostIsNew = 0, was_tentative, plen = -1;
881 	struct in6_ifaddr *oia;
882 	struct sockaddr_in6 dst6;
883 	struct in6_addrlifetime *lt;
884 
885 	/* Validate parameters */
886 	if (ifp == NULL || ifra == NULL) /* this maybe redundant */
887 		return (EINVAL);
888 
889 	/*
890 	 * The destination address for a p2p link must have a family
891 	 * of AF_UNSPEC or AF_INET6.
892 	 */
893 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
894 	    ifra->ifra_dstaddr.sin6_family != AF_INET6 &&
895 	    ifra->ifra_dstaddr.sin6_family != AF_UNSPEC)
896 		return (EAFNOSUPPORT);
897 	/*
898 	 * validate ifra_prefixmask.  don't check sin6_family, netmask
899 	 * does not carry fields other than sin6_len.
900 	 */
901 	if (ifra->ifra_prefixmask.sin6_len > sizeof(struct sockaddr_in6))
902 		return (EINVAL);
903 	/*
904 	 * Because the IPv6 address architecture is classless, we require
905 	 * users to specify a (non 0) prefix length (mask) for a new address.
906 	 * We also require the prefix (when specified) mask is valid, and thus
907 	 * reject a non-consecutive mask.
908 	 */
909 	if (ia == NULL && ifra->ifra_prefixmask.sin6_len == 0)
910 		return (EINVAL);
911 	if (ifra->ifra_prefixmask.sin6_len != 0) {
912 		plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr,
913 				    (u_char *)&ifra->ifra_prefixmask +
914 				    ifra->ifra_prefixmask.sin6_len);
915 		if (plen <= 0)
916 			return (EINVAL);
917 	}
918 	else {
919 		/*
920 		 * In this case, ia must not be NULL.  We just use its prefix
921 		 * length.
922 		 */
923 		plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL);
924 	}
925 	/*
926 	 * If the destination address on a p2p interface is specified,
927 	 * and the address is a scoped one, validate/set the scope
928 	 * zone identifier.
929 	 */
930 	dst6 = ifra->ifra_dstaddr;
931 	if ((ifp->if_flags & (IFF_POINTOPOINT|IFF_LOOPBACK)) &&
932 	    (dst6.sin6_family == AF_INET6)) {
933 		int scopeid;
934 
935 		if ((error = in6_recoverscope(&dst6,
936 					      &ifra->ifra_dstaddr.sin6_addr,
937 					      ifp)) != 0)
938 			return (error);
939 		if (in6_addr2zoneid(ifp, &dst6.sin6_addr, &scopeid))
940 			return (EINVAL);
941 		if (dst6.sin6_scope_id == 0) /* user omit to specify the ID. */
942 			dst6.sin6_scope_id = scopeid;
943 		else if (dst6.sin6_scope_id != scopeid)
944 			return (EINVAL); /* scope ID mismatch. */
945 		if ((error = in6_embedscope(&dst6.sin6_addr, &dst6, NULL, NULL))
946 		    != 0)
947 			return (error);
948 		dst6.sin6_scope_id = 0; /* XXX */
949 	}
950 	/*
951 	 * The destination address can be specified only for a p2p or a
952 	 * loopback interface.  If specified, the corresponding prefix length
953 	 * must be 128.
954 	 */
955 	if (ifra->ifra_dstaddr.sin6_family == AF_INET6) {
956 		if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) == 0) {
957 			/* XXX: noisy message */
958 			log(LOG_INFO, "in6_update_ifa: a destination can be "
959 			    "specified for a p2p or a loopback IF only\n");
960 			return (EINVAL);
961 		}
962 		if (plen != 128) {
963 			/*
964 			 * The following message seems noisy, but we dare to
965 			 * add it for diagnosis.
966 			 */
967 			log(LOG_INFO, "in6_update_ifa: prefixlen must be 128 "
968 			    "when dstaddr is specified\n");
969 			return (EINVAL);
970 		}
971 	}
972 	/* lifetime consistency check */
973 	lt = &ifra->ifra_lifetime;
974 	if (lt->ia6t_vltime != ND6_INFINITE_LIFETIME
975 	    && lt->ia6t_vltime + time_uptime < time_uptime) {
976 		return EINVAL;
977 	}
978 	if (lt->ia6t_vltime == 0) {
979 		/*
980 		 * the following log might be noisy, but this is a typical
981 		 * configuration mistake or a tool's bug.
982 		 */
983 		log(LOG_INFO,
984 		    "in6_update_ifa: valid lifetime is 0 for %s\n",
985 		    ip6_sprintf(&ifra->ifra_addr.sin6_addr));
986 	}
987 	if (lt->ia6t_pltime != ND6_INFINITE_LIFETIME
988 	    && lt->ia6t_pltime + time_uptime < time_uptime) {
989 		return EINVAL;
990 	}
991 
992 	/*
993 	 * If this is a new address, allocate a new ifaddr and link it
994 	 * into chains.
995 	 */
996 	if (ia == NULL) {
997 		hostIsNew = 1;
998 		ia = ifa_create(sizeof(*ia));
999 
1000 		/* Initialize the address and masks */
1001 		ia->ia_ifa.ifa_addr = (struct sockaddr *)&ia->ia_addr;
1002 		ia->ia_addr.sin6_family = AF_INET6;
1003 		ia->ia_addr.sin6_len = sizeof(ia->ia_addr);
1004 		if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) != 0) {
1005 			/*
1006 			 * XXX: some functions expect that ifa_dstaddr is not
1007 			 * NULL for p2p interfaces.
1008 			 */
1009 			ia->ia_ifa.ifa_dstaddr
1010 				= (struct sockaddr *)&ia->ia_dstaddr;
1011 		} else {
1012 			ia->ia_ifa.ifa_dstaddr = NULL;
1013 		}
1014 		ia->ia_ifa.ifa_netmask
1015 			= (struct sockaddr *)&ia->ia_prefixmask;
1016 
1017 		ia->ia_ifp = ifp;
1018 		if ((oia = in6_ifaddr) != NULL) {
1019 			for ( ; oia->ia_next; oia = oia->ia_next)
1020 				continue;
1021 			oia->ia_next = ia;
1022 		} else
1023 			in6_ifaddr = ia;
1024 
1025 		ifa_iflink(&ia->ia_ifa, ifp, 1);
1026 	}
1027 
1028 	/* set prefix mask */
1029 	if (ifra->ifra_prefixmask.sin6_len) {
1030 		/*
1031 		 * We prohibit changing the prefix length of an existing
1032 		 * address, because
1033 		 * + such an operation should be rare in IPv6, and
1034 		 * + the operation would confuse prefix management.
1035 		 */
1036 		if (ia->ia_prefixmask.sin6_len &&
1037 		    in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL) != plen) {
1038 			log(LOG_INFO, "in6_update_ifa: the prefix length of an"
1039 			    " existing (%s) address should not be changed\n",
1040 			    ip6_sprintf(&ia->ia_addr.sin6_addr));
1041 			error = EINVAL;
1042 			goto unlink;
1043 		}
1044 		ia->ia_prefixmask = ifra->ifra_prefixmask;
1045 	}
1046 
1047 	/*
1048 	 * If a new destination address is specified, scrub the old one and
1049 	 * install the new destination.  Note that the interface must be
1050 	 * p2p or loopback (see the check above.)
1051 	 */
1052 	if (dst6.sin6_family == AF_INET6 &&
1053 	    !IN6_ARE_ADDR_EQUAL(&dst6.sin6_addr,
1054 				&ia->ia_dstaddr.sin6_addr)) {
1055 		int e;
1056 
1057 		if ((ia->ia_flags & IFA_ROUTE) &&
1058 		    (e = rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST))
1059 		    != 0) {
1060 			log(LOG_ERR, "in6_update_ifa: failed to remove "
1061 			    "a route to the old destination: %s\n",
1062 			    ip6_sprintf(&ia->ia_addr.sin6_addr));
1063 			/* proceed anyway... */
1064 		}
1065 		else
1066 			ia->ia_flags &= ~IFA_ROUTE;
1067 		ia->ia_dstaddr = dst6;
1068 	}
1069 
1070 	was_tentative = ia->ia6_flags & (IN6_IFF_TENTATIVE|IN6_IFF_DUPLICATED);
1071 	ia->ia6_flags = ifra->ifra_flags;
1072 	ia->ia6_flags &= ~IN6_IFF_DUPLICATED;	/*safety*/
1073 	ia->ia6_flags &= ~IN6_IFF_NODAD;	/* Mobile IPv6 */
1074 	if ((hostIsNew || was_tentative) &&
1075 	    in6if_do_dad(ifp) &&
1076 	    !(ifra->ifra_flags & IN6_IFF_NODAD))
1077 		ia->ia6_flags |= IN6_IFF_TENTATIVE;
1078 
1079 	ia->ia6_lifetime = ifra->ifra_lifetime;
1080 	/* for sanity */
1081 	if (ia->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) {
1082 		ia->ia6_lifetime.ia6t_expire =
1083 			time_uptime + ia->ia6_lifetime.ia6t_vltime;
1084 	} else
1085 		ia->ia6_lifetime.ia6t_expire = 0;
1086 	if (ia->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) {
1087 		ia->ia6_lifetime.ia6t_preferred =
1088 			time_uptime + ia->ia6_lifetime.ia6t_pltime;
1089 	} else
1090 		ia->ia6_lifetime.ia6t_preferred = 0;
1091 
1092 	/* reset the interface and routing table appropriately. */
1093 	if ((error = in6_ifinit(ifp, ia, &ifra->ifra_addr, hostIsNew)) != 0)
1094 		goto unlink;
1095 
1096 	/*
1097 	 * Beyond this point, we should call in6_purgeaddr upon an error,
1098 	 * not just go to unlink.
1099 	 */
1100 
1101 	if (ifp->if_flags & IFF_MULTICAST) {
1102 		struct sockaddr_in6 mltaddr, mltmask;
1103 		struct in6_multi *in6m;
1104 
1105 		if (hostIsNew) {
1106 			/*
1107 			 * join solicited multicast addr for new host id
1108 			 */
1109 			struct in6_addr llsol;
1110 			bzero(&llsol, sizeof(struct in6_addr));
1111 			llsol.s6_addr16[0] = htons(0xff02);
1112 			llsol.s6_addr16[1] = htons(ifp->if_index);
1113 			llsol.s6_addr32[1] = 0;
1114 			llsol.s6_addr32[2] = htonl(1);
1115 			llsol.s6_addr32[3] =
1116 				ifra->ifra_addr.sin6_addr.s6_addr32[3];
1117 			llsol.s6_addr8[12] = 0xff;
1118 			in6_addmulti(&llsol, ifp, &error);
1119 			if (error != 0) {
1120 				log(LOG_WARNING,
1121 				    "in6_update_ifa: addmulti failed for "
1122 				    "%s on %s (errno=%d)\n",
1123 				    ip6_sprintf(&llsol), if_name(ifp),
1124 				    error);
1125 				in6_purgeaddr((struct ifaddr *)ia);
1126 				return (error);
1127 			}
1128 		}
1129 
1130 		bzero(&mltmask, sizeof(mltmask));
1131 		mltmask.sin6_len = sizeof(struct sockaddr_in6);
1132 		mltmask.sin6_family = AF_INET6;
1133 		mltmask.sin6_addr = in6mask32;
1134 
1135 		/*
1136 		 * join link-local all-nodes address
1137 		 */
1138 		bzero(&mltaddr, sizeof(mltaddr));
1139 		mltaddr.sin6_len = sizeof(struct sockaddr_in6);
1140 		mltaddr.sin6_family = AF_INET6;
1141 		mltaddr.sin6_addr = kin6addr_linklocal_allnodes;
1142 		mltaddr.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
1143 
1144 		in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp);
1145 		if (in6m == NULL) {
1146 			rtrequest_global(RTM_ADD,
1147 				  (struct sockaddr *)&mltaddr,
1148 				  (struct sockaddr *)&ia->ia_addr,
1149 				  (struct sockaddr *)&mltmask,
1150 				  RTF_UP|RTF_CLONING);  /* xxx */
1151 			in6_addmulti(&mltaddr.sin6_addr, ifp, &error);
1152 			if (error != 0) {
1153 				log(LOG_WARNING,
1154 				    "in6_update_ifa: addmulti failed for "
1155 				    "%s on %s (errno=%d)\n",
1156 				    ip6_sprintf(&mltaddr.sin6_addr),
1157 				    if_name(ifp), error);
1158 			}
1159 		}
1160 
1161 		/*
1162 		 * join node information group address
1163 		 */
1164 		if (in6_nigroup(ifp, hostname, strlen(hostname),
1165 				&mltaddr.sin6_addr) == 0) {
1166 			in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp);
1167 			if (in6m == NULL && ia != NULL) {
1168 				in6_addmulti(&mltaddr.sin6_addr, ifp, &error);
1169 				if (error != 0) {
1170 					log(LOG_WARNING, "in6_update_ifa: "
1171 					    "addmulti failed for "
1172 					    "%s on %s (errno=%d)\n",
1173 					    ip6_sprintf(&mltaddr.sin6_addr),
1174 					    if_name(ifp), error);
1175 				}
1176 			}
1177 		}
1178 
1179 		/*
1180 		 * join node-local all-nodes address, on loopback.
1181 		 * XXX: since "node-local" is obsoleted by interface-local,
1182 		 *      we have to join the group on every interface with
1183 		 *      some interface-boundary restriction.
1184 		 */
1185 		if (ifp->if_flags & IFF_LOOPBACK) {
1186 			struct in6_ifaddr *ia_loop;
1187 
1188 			struct in6_addr loop6 = kin6addr_loopback;
1189 			ia_loop = in6ifa_ifpwithaddr(ifp, &loop6);
1190 
1191 			mltaddr.sin6_addr = kin6addr_nodelocal_allnodes;
1192 
1193 			in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp);
1194 			if (in6m == NULL && ia_loop != NULL) {
1195 				rtrequest_global(RTM_ADD,
1196 					  (struct sockaddr *)&mltaddr,
1197 					  (struct sockaddr *)&ia_loop->ia_addr,
1198 					  (struct sockaddr *)&mltmask,
1199 					  RTF_UP);
1200 				in6_addmulti(&mltaddr.sin6_addr, ifp, &error);
1201 				if (error != 0) {
1202 					log(LOG_WARNING, "in6_update_ifa: "
1203 					    "addmulti failed for %s on %s "
1204 					    "(errno=%d)\n",
1205 					    ip6_sprintf(&mltaddr.sin6_addr),
1206 					    if_name(ifp), error);
1207 				}
1208 			}
1209 		}
1210 	}
1211 
1212 	/*
1213 	 * Perform DAD, if needed.
1214 	 * XXX It may be of use, if we can administratively
1215 	 * disable DAD.
1216 	 */
1217 	if (in6if_do_dad(ifp) &&
1218 	    !(ifra->ifra_flags & IN6_IFF_NODAD) &&
1219 	    ia->ia6_flags & IN6_IFF_TENTATIVE)
1220 		nd6_dad_start((struct ifaddr *)ia, NULL);
1221 
1222 	return (error);
1223 
1224 unlink:
1225 	/*
1226 	 * XXX: if a change of an existing address failed, keep the entry
1227 	 * anyway.
1228 	 */
1229 	if (hostIsNew)
1230 		in6_unlink_ifa(ia, ifp);
1231 	return (error);
1232 }
1233 
1234 void
1235 in6_purgeaddr(struct ifaddr *ifa)
1236 {
1237 	struct ifnet *ifp = ifa->ifa_ifp;
1238 	struct in6_ifaddr *ia = (struct in6_ifaddr *) ifa;
1239 
1240 	/* stop DAD processing */
1241 	nd6_dad_stop(ifa);
1242 
1243 	/*
1244 	 * delete route to the destination of the address being purged.
1245 	 * The interface must be p2p or loopback in this case.
1246 	 */
1247 	if ((ia->ia_flags & IFA_ROUTE) && ia->ia_dstaddr.sin6_len != 0) {
1248 		int e;
1249 
1250 		if ((e = rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST))
1251 		    != 0) {
1252 			log(LOG_ERR, "in6_purgeaddr: failed to remove "
1253 			    "a route to the p2p destination: %s on %s, "
1254 			    "errno=%d\n",
1255 			    ip6_sprintf(&ia->ia_addr.sin6_addr), if_name(ifp),
1256 			    e);
1257 			/* proceed anyway... */
1258 		}
1259 		else
1260 			ia->ia_flags &= ~IFA_ROUTE;
1261 	}
1262 
1263 	/* Remove ownaddr's loopback rtentry, if it exists. */
1264 	in6_ifremloop(&(ia->ia_ifa));
1265 
1266 	if (ifp->if_flags & IFF_MULTICAST) {
1267 		/*
1268 		 * delete solicited multicast addr for deleting host id
1269 		 */
1270 		struct in6_multi *in6m;
1271 		struct in6_addr llsol;
1272 		bzero(&llsol, sizeof(struct in6_addr));
1273 		llsol.s6_addr16[0] = htons(0xff02);
1274 		llsol.s6_addr16[1] = htons(ifp->if_index);
1275 		llsol.s6_addr32[1] = 0;
1276 		llsol.s6_addr32[2] = htonl(1);
1277 		llsol.s6_addr32[3] =
1278 			ia->ia_addr.sin6_addr.s6_addr32[3];
1279 		llsol.s6_addr8[12] = 0xff;
1280 
1281 		in6m = IN6_LOOKUP_MULTI(&llsol, ifp);
1282 		if (in6m)
1283 			in6_delmulti(in6m);
1284 	}
1285 
1286 	in6_unlink_ifa(ia, ifp);
1287 }
1288 
1289 static void
1290 in6_unlink_ifa(struct in6_ifaddr *ia, struct ifnet *ifp)
1291 {
1292 	struct in6_ifaddr *oia;
1293 
1294 	crit_enter();
1295 
1296 	ifa_ifunlink(&ia->ia_ifa, ifp);
1297 
1298 	oia = ia;
1299 	if (oia == (ia = in6_ifaddr))
1300 		in6_ifaddr = ia->ia_next;
1301 	else {
1302 		while (ia->ia_next && (ia->ia_next != oia))
1303 			ia = ia->ia_next;
1304 		if (ia->ia_next)
1305 			ia->ia_next = oia->ia_next;
1306 		else {
1307 			/* search failed */
1308 			kprintf("Couldn't unlink in6_ifaddr from in6_ifaddr\n");
1309 		}
1310 	}
1311 
1312 	/*
1313 	 * When an autoconfigured address is being removed, release the
1314 	 * reference to the base prefix.  Also, since the release might
1315 	 * affect the status of other (detached) addresses, call
1316 	 * pfxlist_onlink_check().
1317 	 */
1318 	if (oia->ia6_flags & IN6_IFF_AUTOCONF) {
1319 		if (oia->ia6_ndpr == NULL) {
1320 			log(LOG_NOTICE, "in6_unlink_ifa: autoconf'ed address "
1321 			    "%p has no prefix\n", oia);
1322 		} else {
1323 			oia->ia6_ndpr->ndpr_refcnt--;
1324 			oia->ia6_flags &= ~IN6_IFF_AUTOCONF;
1325 			oia->ia6_ndpr = NULL;
1326 		}
1327 
1328 		pfxlist_onlink_check();
1329 	}
1330 
1331 	/*
1332 	 * release another refcnt for the link from in6_ifaddr.
1333 	 * Note that we should decrement the refcnt at least once for all *BSD.
1334 	 */
1335 	ifa_destroy(&oia->ia_ifa);
1336 
1337 	crit_exit();
1338 }
1339 
1340 void
1341 in6_purgeif(struct ifnet *ifp)
1342 {
1343 	struct ifaddr_container *ifac, *next;
1344 
1345 	TAILQ_FOREACH_MUTABLE(ifac, &ifp->if_addrheads[mycpuid],
1346 			      ifa_link, next) {
1347 		if (ifac->ifa->ifa_addr->sa_family != AF_INET6)
1348 			continue;
1349 		in6_purgeaddr(ifac->ifa);
1350 	}
1351 
1352 	in6_ifdetach(ifp);
1353 }
1354 
1355 /*
1356  * SIOC[GAD]LIFADDR.
1357  *	SIOCGLIFADDR: get first address. (?)
1358  *	SIOCGLIFADDR with IFLR_PREFIX:
1359  *		get first address that matches the specified prefix.
1360  *	SIOCALIFADDR: add the specified address.
1361  *	SIOCALIFADDR with IFLR_PREFIX:
1362  *		add the specified prefix, filling hostid part from
1363  *		the first link-local address.  prefixlen must be <= 64.
1364  *	SIOCDLIFADDR: delete the specified address.
1365  *	SIOCDLIFADDR with IFLR_PREFIX:
1366  *		delete the first address that matches the specified prefix.
1367  * return values:
1368  *	EINVAL on invalid parameters
1369  *	EADDRNOTAVAIL on prefix match failed/specified address not found
1370  *	other values may be returned from in6_ioctl()
1371  *
1372  * NOTE: SIOCALIFADDR(with IFLR_PREFIX set) allows prefixlen less than 64.
1373  * this is to accomodate address naming scheme other than RFC2374,
1374  * in the future.
1375  * RFC2373 defines interface id to be 64bit, but it allows non-RFC2374
1376  * address encoding scheme. (see figure on page 8)
1377  */
1378 static int
1379 in6_lifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp,
1380     struct thread *td)
1381 {
1382 	struct if_laddrreq *iflr = (struct if_laddrreq *)data;
1383 	struct sockaddr *sa;
1384 
1385 	/* sanity checks */
1386 	if (!data || !ifp) {
1387 		panic("invalid argument to in6_lifaddr_ioctl");
1388 		/*NOTRECHED*/
1389 	}
1390 
1391 	switch (cmd) {
1392 	case SIOCGLIFADDR:
1393 		/* address must be specified on GET with IFLR_PREFIX */
1394 		if (!(iflr->flags & IFLR_PREFIX))
1395 			break;
1396 		/* FALLTHROUGH */
1397 	case SIOCALIFADDR:
1398 	case SIOCDLIFADDR:
1399 		/* address must be specified on ADD and DELETE */
1400 		sa = (struct sockaddr *)&iflr->addr;
1401 		if (sa->sa_family != AF_INET6)
1402 			return EINVAL;
1403 		if (sa->sa_len != sizeof(struct sockaddr_in6))
1404 			return EINVAL;
1405 		/* XXX need improvement */
1406 		sa = (struct sockaddr *)&iflr->dstaddr;
1407 		if (sa->sa_family && sa->sa_family != AF_INET6)
1408 			return EINVAL;
1409 		if (sa->sa_len && sa->sa_len != sizeof(struct sockaddr_in6))
1410 			return EINVAL;
1411 		break;
1412 	default: /* shouldn't happen */
1413 #if 0
1414 		panic("invalid cmd to in6_lifaddr_ioctl");
1415 		/* NOTREACHED */
1416 #else
1417 		return EOPNOTSUPP;
1418 #endif
1419 	}
1420 	if (sizeof(struct in6_addr) * 8 < iflr->prefixlen)
1421 		return EINVAL;
1422 
1423 	switch (cmd) {
1424 	case SIOCALIFADDR:
1425 	    {
1426 		struct in6_aliasreq ifra;
1427 		struct in6_addr *hostid = NULL;
1428 		int prefixlen;
1429 
1430 		if (iflr->flags & IFLR_PREFIX) {
1431 			struct ifaddr *ifa;
1432 			struct sockaddr_in6 *sin6;
1433 
1434 			/*
1435 			 * hostid is to fill in the hostid part of the
1436 			 * address.  hostid points to the first link-local
1437 			 * address attached to the interface.
1438 			 */
1439 			ifa = (struct ifaddr *)in6ifa_ifpforlinklocal(ifp, 0);
1440 			if (!ifa)
1441 				return EADDRNOTAVAIL;
1442 			hostid = IFA_IN6(ifa);
1443 
1444 		 	/* prefixlen must be <= 64. */
1445 			if (64 < iflr->prefixlen)
1446 				return EINVAL;
1447 			prefixlen = iflr->prefixlen;
1448 
1449 			/* hostid part must be zero. */
1450 			sin6 = (struct sockaddr_in6 *)&iflr->addr;
1451 			if (sin6->sin6_addr.s6_addr32[2] != 0
1452 			 || sin6->sin6_addr.s6_addr32[3] != 0) {
1453 				return EINVAL;
1454 			}
1455 		} else
1456 			prefixlen = iflr->prefixlen;
1457 
1458 		/* copy args to in6_aliasreq, perform ioctl(SIOCAIFADDR_IN6). */
1459 		bzero(&ifra, sizeof(ifra));
1460 		bcopy(iflr->iflr_name, ifra.ifra_name,
1461 			sizeof(ifra.ifra_name));
1462 
1463 		bcopy(&iflr->addr, &ifra.ifra_addr,
1464 			((struct sockaddr *)&iflr->addr)->sa_len);
1465 		if (hostid) {
1466 			/* fill in hostid part */
1467 			ifra.ifra_addr.sin6_addr.s6_addr32[2] =
1468 				hostid->s6_addr32[2];
1469 			ifra.ifra_addr.sin6_addr.s6_addr32[3] =
1470 				hostid->s6_addr32[3];
1471 		}
1472 
1473 		if (((struct sockaddr *)&iflr->dstaddr)->sa_family) {	/*XXX*/
1474 			bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr,
1475 				((struct sockaddr *)&iflr->dstaddr)->sa_len);
1476 			if (hostid) {
1477 				ifra.ifra_dstaddr.sin6_addr.s6_addr32[2] =
1478 					hostid->s6_addr32[2];
1479 				ifra.ifra_dstaddr.sin6_addr.s6_addr32[3] =
1480 					hostid->s6_addr32[3];
1481 			}
1482 		}
1483 
1484 		ifra.ifra_prefixmask.sin6_len = sizeof(struct sockaddr_in6);
1485 		in6_prefixlen2mask(&ifra.ifra_prefixmask.sin6_addr, prefixlen);
1486 
1487 		ifra.ifra_flags = iflr->flags & ~IFLR_PREFIX;
1488 		return in6_control_internal(SIOCAIFADDR_IN6, (caddr_t)&ifra,
1489 		    ifp, td);
1490 	    }
1491 	case SIOCGLIFADDR:
1492 	case SIOCDLIFADDR:
1493 	    {
1494 		struct ifaddr_container *ifac;
1495 		struct in6_ifaddr *ia;
1496 		struct in6_addr mask, candidate, match;
1497 		struct sockaddr_in6 *sin6;
1498 		int cmp;
1499 
1500 		bzero(&mask, sizeof(mask));
1501 		if (iflr->flags & IFLR_PREFIX) {
1502 			/* lookup a prefix rather than address. */
1503 			in6_prefixlen2mask(&mask, iflr->prefixlen);
1504 
1505 			sin6 = (struct sockaddr_in6 *)&iflr->addr;
1506 			bcopy(&sin6->sin6_addr, &match, sizeof(match));
1507 			match.s6_addr32[0] &= mask.s6_addr32[0];
1508 			match.s6_addr32[1] &= mask.s6_addr32[1];
1509 			match.s6_addr32[2] &= mask.s6_addr32[2];
1510 			match.s6_addr32[3] &= mask.s6_addr32[3];
1511 
1512 			/* if you set extra bits, that's wrong */
1513 			if (bcmp(&match, &sin6->sin6_addr, sizeof(match)))
1514 				return EINVAL;
1515 
1516 			cmp = 1;
1517 		} else {
1518 			if (cmd == SIOCGLIFADDR) {
1519 				/* on getting an address, take the 1st match */
1520 				cmp = 0;	/* XXX */
1521 			} else {
1522 				/* on deleting an address, do exact match */
1523 				in6_prefixlen2mask(&mask, 128);
1524 				sin6 = (struct sockaddr_in6 *)&iflr->addr;
1525 				bcopy(&sin6->sin6_addr, &match, sizeof(match));
1526 
1527 				cmp = 1;
1528 			}
1529 		}
1530 
1531 		TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1532 			struct ifaddr *ifa = ifac->ifa;
1533 
1534 			if (ifa->ifa_addr->sa_family != AF_INET6)
1535 				continue;
1536 			if (!cmp)
1537 				break;
1538 
1539 			bcopy(IFA_IN6(ifa), &candidate, sizeof(candidate));
1540 			/*
1541 			 * XXX: this is adhoc, but is necessary to allow
1542 			 * a user to specify fe80::/64 (not /10) for a
1543 			 * link-local address.
1544 			 */
1545 			if (IN6_IS_ADDR_LINKLOCAL(&candidate))
1546 				candidate.s6_addr16[1] = 0;
1547 			candidate.s6_addr32[0] &= mask.s6_addr32[0];
1548 			candidate.s6_addr32[1] &= mask.s6_addr32[1];
1549 			candidate.s6_addr32[2] &= mask.s6_addr32[2];
1550 			candidate.s6_addr32[3] &= mask.s6_addr32[3];
1551 			if (IN6_ARE_ADDR_EQUAL(&candidate, &match))
1552 				break;
1553 		}
1554 		if (ifac == NULL)
1555 			return EADDRNOTAVAIL;
1556 		ia = ifa2ia6(ifac->ifa);
1557 
1558 		if (cmd == SIOCGLIFADDR) {
1559 			struct sockaddr_in6 *s6;
1560 
1561 			/* fill in the if_laddrreq structure */
1562 			bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin6_len);
1563 			s6 = (struct sockaddr_in6 *)&iflr->addr;
1564 			if (IN6_IS_ADDR_LINKLOCAL(&s6->sin6_addr)) {
1565 				s6->sin6_addr.s6_addr16[1] = 0;
1566 				if (in6_addr2zoneid(ifp, &s6->sin6_addr,
1567 				    &s6->sin6_scope_id))
1568 					return (EINVAL);/* XXX */
1569 			}
1570 			if (ifp->if_flags & IFF_POINTOPOINT) {
1571 				bcopy(&ia->ia_dstaddr, &iflr->dstaddr,
1572 					ia->ia_dstaddr.sin6_len);
1573 				s6 = (struct sockaddr_in6 *)&iflr->dstaddr;
1574 				if (IN6_IS_ADDR_LINKLOCAL(&s6->sin6_addr)) {
1575 					s6->sin6_addr.s6_addr16[1] = 0;
1576 					if (in6_addr2zoneid(ifp,
1577 					    &s6->sin6_addr, &s6->sin6_scope_id))
1578 						return (EINVAL); /* EINVAL */
1579 				}
1580 			} else
1581 				bzero(&iflr->dstaddr, sizeof(iflr->dstaddr));
1582 
1583 			iflr->prefixlen =
1584 				in6_mask2len(&ia->ia_prefixmask.sin6_addr,
1585 					     NULL);
1586 
1587 			iflr->flags = ia->ia6_flags;	/* XXX */
1588 
1589 			return 0;
1590 		} else {
1591 			struct in6_aliasreq ifra;
1592 
1593 			/* fill in6_aliasreq and do ioctl(SIOCDIFADDR_IN6) */
1594 			bzero(&ifra, sizeof(ifra));
1595 			bcopy(iflr->iflr_name, ifra.ifra_name,
1596 			      sizeof(ifra.ifra_name));
1597 
1598 			bcopy(&ia->ia_addr, &ifra.ifra_addr,
1599 			      ia->ia_addr.sin6_len);
1600 			if (ifp->if_flags & IFF_POINTOPOINT)
1601 				bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr,
1602 				      ia->ia_dstaddr.sin6_len);
1603 			else
1604 				bzero(&ifra.ifra_dstaddr,
1605 				      sizeof(ifra.ifra_dstaddr));
1606 			bcopy(&ia->ia_prefixmask, &ifra.ifra_dstaddr,
1607 			      ia->ia_prefixmask.sin6_len);
1608 
1609 			ifra.ifra_flags = ia->ia6_flags;
1610 			return in6_control_internal(SIOCDIFADDR_IN6,
1611 			    (caddr_t)&ifra, ifp, td);
1612 		}
1613 	    }
1614 	}
1615 
1616 	return EOPNOTSUPP;	/* just for safety */
1617 }
1618 
1619 /*
1620  * Initialize an interface's internet6 address
1621  * and routing table entry.
1622  */
1623 static int
1624 in6_ifinit(struct ifnet *ifp, struct in6_ifaddr *ia, struct sockaddr_in6 *sin6,
1625 	   int newhost)
1626 {
1627 	int error = 0, plen;
1628 
1629 	ia->ia_addr = *sin6;
1630 
1631 	if (ifp->if_ioctl != NULL) {
1632 		ifnet_serialize_all(ifp);
1633 		error = ifp->if_ioctl(ifp, SIOCSIFADDR, (caddr_t)ia, NULL);
1634 		ifnet_deserialize_all(ifp);
1635 		if (error)
1636 			return (error);
1637 	}
1638 
1639 	ia->ia_ifa.ifa_metric = ifp->if_metric;
1640 
1641 	/* we could do in(6)_socktrim here, but just omit it at this moment. */
1642 
1643 	/*
1644 	 * Special case:
1645 	 * If the destination address is specified for a point-to-point
1646 	 * interface, install a route to the destination as an interface
1647 	 * direct route.
1648 	 */
1649 	plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL); /* XXX */
1650 	if (plen == 128 && ia->ia_dstaddr.sin6_family == AF_INET6) {
1651 		if ((error = rtinit(&(ia->ia_ifa), (int)RTM_ADD,
1652 				    RTF_UP | RTF_HOST)) != 0)
1653 			return (error);
1654 		ia->ia_flags |= IFA_ROUTE;
1655 	}
1656 	if (plen < 128) {
1657 		/*
1658 		 * The RTF_CLONING flag is necessary for in6_is_ifloop_auto().
1659 		 */
1660 		ia->ia_ifa.ifa_flags |= RTF_CLONING;
1661 	}
1662 
1663 	/* Add ownaddr as loopback rtentry, if necessary (ex. on p2p link). */
1664 	if (newhost) {
1665 		/* set the rtrequest function to create llinfo */
1666 		ia->ia_ifa.ifa_rtrequest = nd6_rtrequest;
1667 		in6_ifaddloop(&(ia->ia_ifa));
1668 	}
1669 
1670 	return (error);
1671 }
1672 
1673 struct in6_multi_mship *
1674 in6_joingroup(struct ifnet *ifp, struct in6_addr *addr, int *errorp)
1675 {
1676        struct in6_multi_mship *imm;
1677 
1678        imm = kmalloc(sizeof(*imm), M_IPMADDR, M_NOWAIT);
1679        if (!imm) {
1680                *errorp = ENOBUFS;
1681                return NULL;
1682        }
1683        imm->i6mm_maddr = in6_addmulti(addr, ifp, errorp);
1684        if (!imm->i6mm_maddr) {
1685                /* *errorp is alrady set */
1686                kfree(imm, M_IPMADDR);
1687                return NULL;
1688        }
1689        return imm;
1690 }
1691 
1692 int
1693 in6_leavegroup(struct in6_multi_mship *imm)
1694 {
1695 
1696        if (imm->i6mm_maddr)
1697                in6_delmulti(imm->i6mm_maddr);
1698        kfree(imm,  M_IPMADDR);
1699        return 0;
1700 }
1701 
1702 /*
1703  * Add an address to the list of IP6 multicast addresses for a
1704  * given interface.
1705  */
1706 struct	in6_multi *
1707 in6_addmulti(struct in6_addr *maddr6, struct ifnet *ifp, int *errorp)
1708 {
1709 	struct	in6_multi *in6m;
1710 	struct sockaddr_in6 sin6;
1711 	struct ifmultiaddr *ifma;
1712 
1713 	*errorp = 0;
1714 
1715 	crit_enter();
1716 
1717 	/*
1718 	 * Call generic routine to add membership or increment
1719 	 * refcount.  It wants addresses in the form of a sockaddr,
1720 	 * so we build one here (being careful to zero the unused bytes).
1721 	 */
1722 	bzero(&sin6, sizeof sin6);
1723 	sin6.sin6_family = AF_INET6;
1724 	sin6.sin6_len = sizeof sin6;
1725 	sin6.sin6_addr = *maddr6;
1726 	*errorp = if_addmulti(ifp, (struct sockaddr *)&sin6, &ifma);
1727 	if (*errorp) {
1728 		crit_exit();
1729 		return 0;
1730 	}
1731 
1732 	/*
1733 	 * If ifma->ifma_protospec is null, then if_addmulti() created
1734 	 * a new record.  Otherwise, we are done.
1735 	 */
1736 	if (ifma->ifma_protospec != NULL) {
1737 		crit_exit();
1738 		return ifma->ifma_protospec;
1739 	}
1740 
1741 	in6m = kmalloc(sizeof(*in6m), M_IPMADDR, M_INTWAIT | M_ZERO);
1742 	in6m->in6m_addr = *maddr6;
1743 	in6m->in6m_ifp = ifp;
1744 	in6m->in6m_ifma = ifma;
1745 	ifma->ifma_protospec = in6m;
1746 	LIST_INSERT_HEAD(&in6_multihead, in6m, in6m_entry);
1747 
1748 	/*
1749 	 * Let MLD6 know that we have joined a new IP6 multicast
1750 	 * group.
1751 	 */
1752 	mld6_start_listening(in6m);
1753 	crit_exit();
1754 	return (in6m);
1755 }
1756 
1757 /*
1758  * Delete a multicast address record.
1759  */
1760 void
1761 in6_delmulti(struct in6_multi *in6m)
1762 {
1763 	struct ifmultiaddr *ifma = in6m->in6m_ifma;
1764 
1765 	crit_enter();
1766 
1767 	if (ifma->ifma_refcount == 1) {
1768 		/*
1769 		 * No remaining claims to this record; let MLD6 know
1770 		 * that we are leaving the multicast group.
1771 		 */
1772 		mld6_stop_listening(in6m);
1773 		ifma->ifma_protospec = NULL;
1774 		LIST_REMOVE(in6m, in6m_entry);
1775 		kfree(in6m, M_IPMADDR);
1776 	}
1777 	/* XXX - should be separate API for when we have an ifma? */
1778 	if_delmulti(ifma->ifma_ifp, ifma->ifma_addr);
1779 	crit_exit();
1780 }
1781 
1782 /*
1783  * Find an IPv6 interface link-local address specific to an interface.
1784  */
1785 struct in6_ifaddr *
1786 in6ifa_ifpforlinklocal(struct ifnet *ifp, int ignoreflags)
1787 {
1788 	const struct ifaddr_container *ifac;
1789 
1790 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1791 		struct ifaddr *ifa = ifac->ifa;
1792 
1793 		if (ifa->ifa_addr == NULL)
1794 			continue;	/* just for safety */
1795 		if (ifa->ifa_addr->sa_family != AF_INET6)
1796 			continue;
1797 		if (IN6_IS_ADDR_LINKLOCAL(IFA_IN6(ifa))) {
1798 			if ((((struct in6_ifaddr *)ifa)->ia6_flags &
1799 			     ignoreflags) != 0)
1800 				continue;
1801 			return (struct in6_ifaddr *)ifa;
1802 		}
1803 	}
1804 	return NULL;
1805 }
1806 
1807 
1808 /*
1809  * find the internet address corresponding to a given interface and address.
1810  */
1811 struct in6_ifaddr *
1812 in6ifa_ifpwithaddr(struct ifnet *ifp, struct in6_addr *addr)
1813 {
1814 	const struct ifaddr_container *ifac;
1815 
1816 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1817 		struct ifaddr *ifa = ifac->ifa;
1818 
1819 		if (ifa->ifa_addr == NULL)
1820 			continue;	/* just for safety */
1821 		if (ifa->ifa_addr->sa_family != AF_INET6)
1822 			continue;
1823 		if (IN6_ARE_ADDR_EQUAL(addr, IFA_IN6(ifa)))
1824 			return (struct in6_ifaddr *)ifa;
1825 	}
1826 	return NULL;
1827 }
1828 
1829 /*
1830  * Find a link-local scoped address on ifp and return it if any.
1831  */
1832 struct in6_ifaddr *
1833 in6ifa_llaonifp(struct ifnet *ifp)
1834 {
1835 	const struct ifaddr_container *ifac;
1836 
1837 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1838 		const struct sockaddr_in6 *sin6;
1839 		struct ifaddr *ifa = ifac->ifa;
1840 
1841 		if (ifa->ifa_addr->sa_family != AF_INET6)
1842 			continue;
1843 		sin6 = (const struct sockaddr_in6 *)ifa->ifa_addr;
1844 		if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr) ||
1845 		    /* XXX why are mcast addresses ifp address list? */
1846 		    IN6_IS_ADDR_MC_INTFACELOCAL(&sin6->sin6_addr) ||
1847 		    IN6_IS_ADDR_MC_NODELOCAL(&sin6->sin6_addr))
1848 			return (struct in6_ifaddr *)ifa;
1849 	}
1850 	return NULL;
1851 }
1852 
1853 /*
1854  * find the internet address on a given interface corresponding to a neighbor's
1855  * address.
1856  */
1857 struct in6_ifaddr *
1858 in6ifa_ifplocaladdr(const struct ifnet *ifp, const struct in6_addr *addr)
1859 {
1860 	struct ifaddr *ifa;
1861 	struct in6_ifaddr *ia;
1862 	struct ifaddr_container *ifac;
1863 
1864 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
1865 		ifa = ifac->ifa;
1866 
1867 		if (ifa->ifa_addr == NULL)
1868 			continue;	/* just for safety */
1869 		if (ifa->ifa_addr->sa_family != AF_INET6)
1870 			continue;
1871 		ia = (struct in6_ifaddr *)ifa;
1872 		if (IN6_ARE_MASKED_ADDR_EQUAL(addr,
1873 				&ia->ia_addr.sin6_addr,
1874 				&ia->ia_prefixmask.sin6_addr))
1875 			return ia;
1876 	}
1877 
1878 	return NULL;
1879 }
1880 
1881 /*
1882  * Convert IP6 address to printable (loggable) representation.
1883  */
1884 static char digits[] = "0123456789abcdef";
1885 static int ip6round = 0;
1886 char *
1887 ip6_sprintf(const struct in6_addr *addr)
1888 {
1889 	static char ip6buf[8][48];
1890 	int i;
1891 	char *cp;
1892 	const u_short *a = (const u_short *)addr;
1893 	const u_char *d;
1894 	int dcolon = 0;
1895 
1896 	ip6round = (ip6round + 1) & 7;
1897 	cp = ip6buf[ip6round];
1898 
1899 	for (i = 0; i < 8; i++) {
1900 		if (dcolon == 1) {
1901 			if (*a == 0) {
1902 				if (i == 7)
1903 					*cp++ = ':';
1904 				a++;
1905 				continue;
1906 			} else
1907 				dcolon = 2;
1908 		}
1909 		if (*a == 0) {
1910 			if (dcolon == 0 && *(a + 1) == 0) {
1911 				if (i == 0)
1912 					*cp++ = ':';
1913 				*cp++ = ':';
1914 				dcolon = 1;
1915 			} else {
1916 				*cp++ = '0';
1917 				*cp++ = ':';
1918 			}
1919 			a++;
1920 			continue;
1921 		}
1922 		d = (const u_char *)a;
1923 		*cp++ = digits[*d >> 4];
1924 		*cp++ = digits[*d++ & 0xf];
1925 		*cp++ = digits[*d >> 4];
1926 		*cp++ = digits[*d & 0xf];
1927 		*cp++ = ':';
1928 		a++;
1929 	}
1930 	*--cp = 0;
1931 	return (ip6buf[ip6round]);
1932 }
1933 
1934 int
1935 in6_localaddr(struct in6_addr *in6)
1936 {
1937 	struct in6_ifaddr *ia;
1938 
1939 	if (IN6_IS_ADDR_LOOPBACK(in6) || IN6_IS_ADDR_LINKLOCAL(in6))
1940 		return 1;
1941 
1942 	for (ia = in6_ifaddr; ia; ia = ia->ia_next)
1943 		if (IN6_ARE_MASKED_ADDR_EQUAL(in6, &ia->ia_addr.sin6_addr,
1944 					      &ia->ia_prefixmask.sin6_addr))
1945 			return 1;
1946 
1947 	return (0);
1948 }
1949 
1950 int
1951 in6_is_addr_deprecated(struct sockaddr_in6 *sa6)
1952 {
1953 	struct in6_ifaddr *ia;
1954 
1955 	for (ia = in6_ifaddr; ia; ia = ia->ia_next) {
1956 		if (IN6_ARE_ADDR_EQUAL(&ia->ia_addr.sin6_addr,
1957 				       &sa6->sin6_addr) &&
1958 		    (ia->ia6_flags & IN6_IFF_DEPRECATED))
1959 			return (1); /* true */
1960 
1961 		/* XXX: do we still have to go thru the rest of the list? */
1962 	}
1963 
1964 	return (0);		/* false */
1965 }
1966 
1967 /*
1968  * return length of part which dst and src are equal
1969  * hard coding...
1970  */
1971 int
1972 in6_matchlen(struct in6_addr *src, struct in6_addr *dst)
1973 {
1974 	int match = 0;
1975 	u_char *s = (u_char *)src, *d = (u_char *)dst;
1976 	u_char *lim = s + 16, r;
1977 
1978 	while (s < lim)
1979 		if ((r = (*d++ ^ *s++)) != 0) {
1980 			while (r < 128) {
1981 				match++;
1982 				r <<= 1;
1983 			}
1984 			break;
1985 		} else
1986 			match += 8;
1987 	return match;
1988 }
1989 
1990 /* XXX: to be scope conscious */
1991 int
1992 in6_are_prefix_equal(struct in6_addr *p1, struct in6_addr *p2, int len)
1993 {
1994 	int bytelen, bitlen;
1995 
1996 	/* sanity check */
1997 	if (0 > len || len > 128) {
1998 		log(LOG_ERR, "in6_are_prefix_equal: invalid prefix length(%d)\n",
1999 		    len);
2000 		return (0);
2001 	}
2002 
2003 	bytelen = len / 8;
2004 	bitlen = len % 8;
2005 
2006 	if (bcmp(&p1->s6_addr, &p2->s6_addr, bytelen))
2007 		return (0);
2008 	if (p1->s6_addr[bytelen] >> (8 - bitlen) !=
2009 	    p2->s6_addr[bytelen] >> (8 - bitlen))
2010 		return (0);
2011 
2012 	return (1);
2013 }
2014 
2015 void
2016 in6_prefixlen2mask(struct in6_addr *maskp, int len)
2017 {
2018 	u_char maskarray[8] = {0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe, 0xff};
2019 	int bytelen, bitlen, i;
2020 
2021 	/* sanity check */
2022 	if (0 > len || len > 128) {
2023 		log(LOG_ERR, "in6_prefixlen2mask: invalid prefix length(%d)\n",
2024 		    len);
2025 		return;
2026 	}
2027 
2028 	bzero(maskp, sizeof(*maskp));
2029 	bytelen = len / 8;
2030 	bitlen = len % 8;
2031 	for (i = 0; i < bytelen; i++)
2032 		maskp->s6_addr[i] = 0xff;
2033 	if (bitlen)
2034 		maskp->s6_addr[bytelen] = maskarray[bitlen - 1];
2035 }
2036 
2037 /*
2038  * return the best address out of the same scope
2039  */
2040 struct in6_ifaddr *
2041 in6_ifawithscope(struct ifnet *oifp, struct in6_addr *dst, struct ucred *cred)
2042 {
2043 	int dst_scope =	in6_addrscope(dst), src_scope, best_scope = 0;
2044 	int blen = -1;
2045 	struct in6_ifaddr *ifa_best = NULL;
2046 	u_int32_t dstzone, odstzone;
2047 	int jailed = 0;
2048 	const struct ifnet_array *arr;
2049 	int i;
2050 
2051 	if(cred && cred->cr_prison)
2052 		jailed = 1;
2053 
2054 	if (oifp == NULL)
2055 		return (NULL);
2056 
2057 	if (in6_addr2zoneid(oifp, dst, &odstzone))
2058 		return (NULL);
2059 
2060 	/*
2061 	 * We search for all addresses on all interfaces from the beginning.
2062 	 * Comparing an interface with the outgoing interface will be done
2063 	 * only at the final stage of tiebreaking.
2064 	 */
2065 	arr = ifnet_array_get();
2066 	for (i = 0; i < arr->ifnet_count; ++i) {
2067 		struct ifnet *ifp = arr->ifnet_arr[i];
2068 		struct ifaddr_container *ifac;
2069 
2070 		/*
2071 		 * We can never take an address that breaks the scope zone
2072 		 * of the destination.
2073 		 */
2074 		if (ifp->if_afdata[AF_INET6] == NULL)
2075 			continue;
2076 		if (in6_addr2zoneid(ifp, dst, &dstzone) || dstzone != odstzone)
2077 			continue;
2078 
2079 		TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2080 			int tlen = -1, dscopecmp, bscopecmp, matchcmp;
2081 			struct ifaddr *ifa = ifac->ifa;
2082 
2083 			if (ifa->ifa_addr->sa_family != AF_INET6)
2084 				continue;
2085 
2086 			src_scope = in6_addrscope(IFA_IN6(ifa));
2087 
2088 			/*
2089 			 * Don't use an address before completing DAD
2090 			 * nor a duplicated address.
2091 			 */
2092 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2093 			    IN6_IFF_NOTREADY)
2094 				continue;
2095 
2096 			/* XXX: is there any case to allow anycasts? */
2097 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2098 			    IN6_IFF_ANYCAST)
2099 				continue;
2100 
2101 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2102 			    IN6_IFF_DETACHED)
2103 				continue;
2104 
2105 			/* Skip adresses not valid for current jail */
2106 			if (jailed &&
2107 			    !(jailed_ip(cred->cr_prison, (struct sockaddr *)(ifa->ifa_addr)) != 0))
2108 				continue;
2109 
2110 			/*
2111 			 * If this is the first address we find,
2112 			 * keep it anyway.
2113 			 */
2114 			if (ifa_best == NULL)
2115 				goto replace;
2116 
2117 			/*
2118 			 * ifa_best is never NULL beyond this line except
2119 			 * within the block labeled "replace".
2120 			 */
2121 
2122 			/*
2123 			 * If ifa_best has a smaller scope than dst and
2124 			 * the current address has a larger one than
2125 			 * (or equal to) dst, always replace ifa_best.
2126 			 * Also, if the current address has a smaller scope
2127 			 * than dst, ignore it unless ifa_best also has a
2128 			 * smaller scope.
2129 			 * Consequently, after the two if-clause below,
2130 			 * the followings must be satisfied:
2131 			 * (scope(src) < scope(dst) &&
2132 			 *  scope(best) < scope(dst))
2133 			 *  OR
2134 			 * (scope(best) >= scope(dst) &&
2135 			 *  scope(src) >= scope(dst))
2136 			 */
2137 			if (IN6_ARE_SCOPE_CMP(best_scope, dst_scope) < 0 &&
2138 			    IN6_ARE_SCOPE_CMP(src_scope, dst_scope) >= 0)
2139 				goto replace; /* (A) */
2140 			if (IN6_ARE_SCOPE_CMP(src_scope, dst_scope) < 0 &&
2141 			    IN6_ARE_SCOPE_CMP(best_scope, dst_scope) >= 0)
2142 				continue; /* (B) */
2143 
2144 			/*
2145 			 * A deprecated address SHOULD NOT be used in new
2146 			 * communications if an alternate (non-deprecated)
2147 			 * address is available and has sufficient scope.
2148 			 * RFC 2462, Section 5.5.4.
2149 			 */
2150 			if (((struct in6_ifaddr *)ifa)->ia6_flags &
2151 			    IN6_IFF_DEPRECATED) {
2152 				/*
2153 				 * Ignore any deprecated addresses if
2154 				 * specified by configuration.
2155 				 */
2156 				if (!ip6_use_deprecated)
2157 					continue;
2158 
2159 				/*
2160 				 * If we have already found a non-deprecated
2161 				 * candidate, just ignore deprecated addresses.
2162 				 */
2163 				if (!(ifa_best->ia6_flags & IN6_IFF_DEPRECATED))
2164 					continue;
2165 			}
2166 
2167 			/*
2168 			 * A non-deprecated address is always preferred
2169 			 * to a deprecated one regardless of scopes and
2170 			 * address matching (Note invariants ensured by the
2171 			 * conditions (A) and (B) above.)
2172 			 */
2173 			if ((ifa_best->ia6_flags & IN6_IFF_DEPRECATED) &&
2174 			    !(((struct in6_ifaddr *)ifa)->ia6_flags &
2175 			     IN6_IFF_DEPRECATED))
2176 				goto replace;
2177 
2178 			/*
2179 			 * When we use temporary addresses described in
2180 			 * RFC 3041, we prefer temporary addresses to
2181 			 * public autoconf addresses.  Again, note the
2182 			 * invariants from (A) and (B).  Also note that we
2183 			 * don't have any preference between static addresses
2184 			 * and autoconf addresses (despite of whether or not
2185 			 * the latter is temporary or public.)
2186 			 */
2187 			if (ip6_use_tempaddr) {
2188 				struct in6_ifaddr *ifat;
2189 
2190 				ifat = (struct in6_ifaddr *)ifa;
2191 				if ((ifa_best->ia6_flags &
2192 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2193 				     == IN6_IFF_AUTOCONF &&
2194 				    (ifat->ia6_flags &
2195 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2196 				     == (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY)) {
2197 					goto replace;
2198 				}
2199 				if ((ifa_best->ia6_flags &
2200 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2201 				    == (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY) &&
2202 				    (ifat->ia6_flags &
2203 				     (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY))
2204 				     == IN6_IFF_AUTOCONF) {
2205 					continue;
2206 				}
2207 			}
2208 
2209 			/*
2210 			 * At this point, we have two cases:
2211 			 * 1. we are looking at a non-deprecated address,
2212 			 *    and ifa_best is also non-deprecated.
2213 			 * 2. we are looking at a deprecated address,
2214 			 *    and ifa_best is also deprecated.
2215 			 * Also, we do not have to consider a case where
2216 			 * the scope of if_best is larger(smaller) than dst and
2217 			 * the scope of the current address is smaller(larger)
2218 			 * than dst. Such a case has already been covered.
2219 			 * Tiebreaking is done according to the following
2220 			 * items:
2221 			 * - the scope comparison between the address and
2222 			 *   dst (dscopecmp)
2223 			 * - the scope comparison between the address and
2224 			 *   ifa_best (bscopecmp)
2225 			 * - if the address match dst longer than ifa_best
2226 			 *   (matchcmp)
2227 			 * - if the address is on the outgoing I/F (outI/F)
2228 			 *
2229 			 * Roughly speaking, the selection policy is
2230 			 * - the most important item is scope. The same scope
2231 			 *   is best. Then search for a larger scope.
2232 			 *   Smaller scopes are the last resort.
2233 			 * - A deprecated address is chosen only when we have
2234 			 *   no address that has an enough scope, but is
2235 			 *   prefered to any addresses of smaller scopes
2236 			 *   (this must be already done above.)
2237 			 * - addresses on the outgoing I/F are preferred to
2238 			 *   ones on other interfaces if none of above
2239 			 *   tiebreaks.  In the table below, the column "bI"
2240 			 *   means if the best_ifa is on the outgoing
2241 			 *   interface, and the column "sI" means if the ifa
2242 			 *   is on the outgoing interface.
2243 			 * - If there is no other reasons to choose one,
2244 			 *   longest address match against dst is considered.
2245 			 *
2246 			 * The precise decision table is as follows:
2247 			 * dscopecmp bscopecmp    match  bI oI | replace?
2248 			 *       N/A     equal      N/A   Y  N |   No (1)
2249 			 *       N/A     equal      N/A   N  Y |  Yes (2)
2250 			 *       N/A     equal   larger    N/A |  Yes (3)
2251 			 *       N/A     equal  !larger    N/A |   No (4)
2252 			 *    larger    larger      N/A    N/A |   No (5)
2253 			 *    larger   smaller      N/A    N/A |  Yes (6)
2254 			 *   smaller    larger      N/A    N/A |  Yes (7)
2255 			 *   smaller   smaller      N/A    N/A |   No (8)
2256 			 *     equal   smaller      N/A    N/A |  Yes (9)
2257 			 *     equal    larger       (already done at A above)
2258 			 */
2259 			dscopecmp = IN6_ARE_SCOPE_CMP(src_scope, dst_scope);
2260 			bscopecmp = IN6_ARE_SCOPE_CMP(src_scope, best_scope);
2261 
2262 			if (bscopecmp == 0) {
2263 				struct ifnet *bifp = ifa_best->ia_ifp;
2264 
2265 				if (bifp == oifp && ifp != oifp) /* (1) */
2266 					continue;
2267 				if (bifp != oifp && ifp == oifp) /* (2) */
2268 					goto replace;
2269 
2270 				/*
2271 				 * Both bifp and ifp are on the outgoing
2272 				 * interface, or both two are on a different
2273 				 * interface from the outgoing I/F.
2274 				 * now we need address matching against dst
2275 				 * for tiebreaking.
2276 				 */
2277 				tlen = in6_matchlen(IFA_IN6(ifa), dst);
2278 				matchcmp = tlen - blen;
2279 				if (matchcmp > 0) /* (3) */
2280 					goto replace;
2281 				continue; /* (4) */
2282 			}
2283 			if (dscopecmp > 0) {
2284 				if (bscopecmp > 0) /* (5) */
2285 					continue;
2286 				goto replace; /* (6) */
2287 			}
2288 			if (dscopecmp < 0) {
2289 				if (bscopecmp > 0) /* (7) */
2290 					goto replace;
2291 				continue; /* (8) */
2292 			}
2293 
2294 			/* now dscopecmp must be 0 */
2295 			if (bscopecmp < 0)
2296 				goto replace; /* (9) */
2297 
2298 replace:
2299 			ifa_best = (struct in6_ifaddr *)ifa;
2300 			blen = tlen >= 0 ? tlen :
2301 				in6_matchlen(IFA_IN6(ifa), dst);
2302 			best_scope = in6_addrscope(&ifa_best->ia_addr.sin6_addr);
2303 		}
2304 	}
2305 
2306 	/* count statistics for future improvements */
2307 	if (ifa_best == NULL)
2308 		ip6stat.ip6s_sources_none++;
2309 	else {
2310 		if (oifp == ifa_best->ia_ifp)
2311 			ip6stat.ip6s_sources_sameif[best_scope]++;
2312 		else
2313 			ip6stat.ip6s_sources_otherif[best_scope]++;
2314 
2315 		if (best_scope == dst_scope)
2316 			ip6stat.ip6s_sources_samescope[best_scope]++;
2317 		else
2318 			ip6stat.ip6s_sources_otherscope[best_scope]++;
2319 
2320 		if (ifa_best->ia6_flags & IN6_IFF_DEPRECATED)
2321 			ip6stat.ip6s_sources_deprecated[best_scope]++;
2322 	}
2323 
2324 	return (ifa_best);
2325 }
2326 
2327 /*
2328  * return the best address out of the same scope. if no address was
2329  * found, return the first valid address from designated IF.
2330  */
2331 struct in6_ifaddr *
2332 in6_ifawithifp(struct ifnet *ifp, struct in6_addr *dst)
2333 {
2334 	int dst_scope =	in6_addrscope(dst), blen = -1, tlen;
2335 	struct ifaddr_container *ifac;
2336 	struct in6_ifaddr *besta = NULL;
2337 	struct in6_ifaddr *dep[2];	/* last-resort: deprecated */
2338 
2339 	dep[0] = dep[1] = NULL;
2340 
2341 	/*
2342 	 * We first look for addresses in the same scope.
2343 	 * If there is one, return it.
2344 	 * If two or more, return one which matches the dst longest.
2345 	 * If none, return one of global addresses assigned other ifs.
2346 	 */
2347 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2348 		struct ifaddr *ifa = ifac->ifa;
2349 
2350 		if (ifa->ifa_addr->sa_family != AF_INET6)
2351 			continue;
2352 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_ANYCAST)
2353 			continue; /* XXX: is there any case to allow anycast? */
2354 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY)
2355 			continue; /* don't use this interface */
2356 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DETACHED)
2357 			continue;
2358 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DEPRECATED) {
2359 			if (ip6_use_deprecated)
2360 				dep[0] = (struct in6_ifaddr *)ifa;
2361 			continue;
2362 		}
2363 
2364 		if (dst_scope == in6_addrscope(IFA_IN6(ifa))) {
2365 			/*
2366 			 * call in6_matchlen() as few as possible
2367 			 */
2368 			if (besta) {
2369 				if (blen == -1)
2370 					blen = in6_matchlen(&besta->ia_addr.sin6_addr, dst);
2371 				tlen = in6_matchlen(IFA_IN6(ifa), dst);
2372 				if (tlen > blen) {
2373 					blen = tlen;
2374 					besta = (struct in6_ifaddr *)ifa;
2375 				}
2376 			} else
2377 				besta = (struct in6_ifaddr *)ifa;
2378 		}
2379 	}
2380 	if (besta)
2381 		return (besta);
2382 
2383 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2384 		struct ifaddr *ifa = ifac->ifa;
2385 
2386 		if (ifa->ifa_addr->sa_family != AF_INET6)
2387 			continue;
2388 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_ANYCAST)
2389 			continue; /* XXX: is there any case to allow anycast? */
2390 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY)
2391 			continue; /* don't use this interface */
2392 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DETACHED)
2393 			continue;
2394 		if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DEPRECATED) {
2395 			if (ip6_use_deprecated)
2396 				dep[1] = (struct in6_ifaddr *)ifa;
2397 			continue;
2398 		}
2399 
2400 		return (struct in6_ifaddr *)ifa;
2401 	}
2402 
2403 	/* use the last-resort values, that are, deprecated addresses */
2404 	if (dep[0])
2405 		return dep[0];
2406 	if (dep[1])
2407 		return dep[1];
2408 
2409 	return NULL;
2410 }
2411 
2412 /*
2413  * perform DAD when interface becomes IFF_UP.
2414  */
2415 static void
2416 in6_if_up_dispatch(netmsg_t nmsg)
2417 {
2418 	struct ifnet *ifp = nmsg->lmsg.u.ms_resultp;
2419 	struct ifaddr_container *ifac;
2420 	struct in6_ifaddr *ia;
2421 	int dad_delay;		/* delay ticks before DAD output */
2422 
2423 	ASSERT_NETISR0;
2424 
2425 	in6_ifattach(ifp, NULL); /* will handle special cases */
2426 
2427 	dad_delay = 0;
2428 	TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) {
2429 		struct ifaddr *ifa = ifac->ifa;
2430 
2431 		if (ifa->ifa_addr->sa_family != AF_INET6)
2432 			continue;
2433 		ia = (struct in6_ifaddr *)ifa;
2434 		if (ia->ia6_flags & IN6_IFF_TENTATIVE)
2435 			nd6_dad_start(ifa, &dad_delay);
2436 	}
2437 
2438 	netisr_replymsg(&nmsg->base, 0);
2439 }
2440 
2441 void
2442 in6_if_up(struct ifnet *ifp)
2443 {
2444 	struct netmsg_base nmsg;
2445 
2446 	netmsg_init(&nmsg, NULL, &curthread->td_msgport, 0, in6_if_up_dispatch);
2447 	nmsg.lmsg.u.ms_resultp = ifp;
2448 	netisr_domsg(&nmsg, 0);
2449 }
2450 
2451 void
2452 in6_if_down(struct ifnet *ifp)
2453 {
2454 	rt_purgecloned(ifp, AF_INET6);
2455 }
2456 
2457 int
2458 in6if_do_dad(struct ifnet *ifp)
2459 {
2460 	if (ifp->if_flags & IFF_LOOPBACK)
2461 		return (0);
2462 	if (!(ifp->if_flags & IFF_MULTICAST))
2463 		return (0);
2464 
2465 	/*
2466 	 * Our DAD routine requires the interface up and running.
2467 	 * However, some interfaces can be up before the RUNNING
2468 	 * status.  Additionally, users may try to assign addresses
2469 	 * before the interface becomes up (or running).
2470 	 * We simply skip DAD in such a case as a workaround.
2471 	 * XXX: we should rather mark "tentative" on such addresses,
2472 	 * and do DAD after the interface becomes ready.
2473 	 */
2474 	if ((ifp->if_flags & (IFF_UP|IFF_RUNNING)) != (IFF_UP|IFF_RUNNING))
2475 		return (0);
2476 
2477 	if (ND_IFINFO(ifp)->flags & ND6_IFF_NO_DAD)
2478 		return (0);
2479 
2480 	return (1);
2481 }
2482 
2483 /*
2484  * Calculate max IPv6 MTU through all the interfaces and store it
2485  * to in6_maxmtu.
2486  */
2487 void
2488 in6_setmaxmtu(void)
2489 {
2490 	unsigned long maxmtu = 0;
2491 	const struct ifnet_array *arr;
2492 	int i;
2493 
2494 	ASSERT_NETISR0;
2495 
2496 	arr = ifnet_array_get();
2497 	for (i = 0; i < arr->ifnet_count; ++i) {
2498 		struct ifnet *ifp = arr->ifnet_arr[i];
2499 
2500 		/* this function can be called during ifnet initialization */
2501 		if (ifp->if_afdata[AF_INET6] == NULL)
2502 			continue;
2503 		if ((ifp->if_flags & IFF_LOOPBACK) == 0 &&
2504 		    IN6_LINKMTU(ifp) > maxmtu)
2505 			maxmtu = IN6_LINKMTU(ifp);
2506 	}
2507 	if (maxmtu)	/* update only when maxmtu is positive */
2508 		in6_maxmtu = maxmtu;
2509 }
2510 
2511 void *
2512 in6_domifattach(struct ifnet *ifp)
2513 {
2514 	struct in6_ifextra *ext;
2515 
2516 	ext = (struct in6_ifextra *)kmalloc(sizeof(*ext), M_IFADDR, M_WAITOK);
2517 	bzero(ext, sizeof(*ext));
2518 
2519 	ext->in6_ifstat = (struct in6_ifstat *)kmalloc(sizeof(struct in6_ifstat),
2520 		M_IFADDR, M_WAITOK);
2521 	bzero(ext->in6_ifstat, sizeof(*ext->in6_ifstat));
2522 
2523 	ext->icmp6_ifstat =
2524 		(struct icmp6_ifstat *)kmalloc(sizeof(struct icmp6_ifstat),
2525 			M_IFADDR, M_WAITOK);
2526 	bzero(ext->icmp6_ifstat, sizeof(*ext->icmp6_ifstat));
2527 
2528 	ext->nd_ifinfo = nd6_ifattach(ifp);
2529 	ext->scope6_id = scope6_ifattach(ifp);
2530 	return ext;
2531 }
2532 
2533 void
2534 in6_domifdetach(struct ifnet *ifp, void *aux)
2535 {
2536 	struct in6_ifextra *ext = (struct in6_ifextra *)aux;
2537 	scope6_ifdetach(ext->scope6_id);
2538 	nd6_ifdetach(ext->nd_ifinfo);
2539 	kfree(ext->in6_ifstat, M_IFADDR);
2540 	kfree(ext->icmp6_ifstat, M_IFADDR);
2541 	kfree(ext, M_IFADDR);
2542 }
2543