]> git.saurik.com Git - apple/xnu.git/blobdiff - bsd/netinet6/nd6.c
xnu-344.tar.gz
[apple/xnu.git] / bsd / netinet6 / nd6.c
index 766b6c6e11356929af47446708c0aa3cf1c41e6c..60d20627631354f961c4531530a9e8b9cfa92014 100644 (file)
@@ -1,4 +1,5 @@
-/*     $KAME: nd6.c,v 1.51.2.1 2000/04/13 11:59:29 jinmei Exp $        */
+/*     $FreeBSD: src/sys/netinet6/nd6.c,v 1.2.2.9 2001/07/11 09:39:04 ume Exp $        */
+/*     $KAME: nd6.c,v 1.144 2001/05/24 07:44:00 itojun Exp $   */
 
 /*
  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
 #include <sys/time.h>
 #include <sys/kernel.h>
 #include <sys/errno.h>
-#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3)
-#include <sys/ioctl.h>
-#endif
 #include <sys/syslog.h>
 #include <sys/protosw.h>
 #include <kern/queue.h>
 
+#define DONT_WARN_OBSOLETE
 #include <net/if.h>
 #include <net/if_dl.h>
 #include <net/if_types.h>
-#if !(defined(__bsdi__) && _BSDI_VERSION >= 199802) && !defined(__APPLE__)
 #include <net/if_atm.h>
-#endif
 #include <net/route.h>
 #include <net/dlil.h>
 
 #include <netinet/in.h>
-#ifndef __NetBSD__
 #include <netinet/if_ether.h>
-#if __FreeBSD__
 #include <netinet/if_fddi.h>
-#endif
-#ifdef __bsdi__
-#include <net/if_fddi.h>
-#endif
-#else /* __NetBSD__ */
-#include <net/if_ether.h>
-#include <netinet/if_inarp.h>
-#include <net/if_fddi.h>
-#endif /* __NetBSD__ */
 #include <netinet6/in6_var.h>
 #include <netinet/ip6.h>
 #include <netinet6/ip6_var.h>
 #include <netinet6/in6_prefix.h>
 #include <netinet/icmp6.h>
 
-#ifndef __bsdi__
 #include "loop.h"
-#endif
-#if defined(__NetBSD__) || defined(__OpenBSD__)
-extern struct ifnet loif[NLOOP];
-#endif
 
 #include <net/net_osdep.h>
 
@@ -104,14 +85,24 @@ int        nd6_delay       = 5;    /* delay first probe time 5 second */
 int    nd6_umaxtries   = 3;    /* maximum unicast query */
 int    nd6_mmaxtries   = 3;    /* maximum multicast query */
 int    nd6_useloopback = 1;    /* use loopback interface for local traffic */
+int    nd6_gctimer     = (60 * 60 * 24); /* 1 day: garbage collection timer */
 
 /* preventing too many loops in ND option parsing */
 int nd6_maxndopt = 10; /* max # of ND options allowed */
 
+int nd6_maxnudhint = 0;        /* max # of subsequent upper layer hints */
+
+#if ND6_DEBUG
+int nd6_debug = 1;
+#else
+int nd6_debug = 0;
+#endif
+
 /* for debugging? */
 static int nd6_inuse, nd6_allocated;
 
 struct llinfo_nd6 llinfo_nd6 = {&llinfo_nd6, &llinfo_nd6};
+static size_t nd_ifinfo_indexlim = 8;
 struct nd_ifinfo *nd_ifinfo = NULL;
 struct nd_drhead nd_defrouter;
 struct nd_prhead nd_prefix = { 0 };
@@ -119,12 +110,9 @@ struct nd_prhead nd_prefix = { 0 };
 int nd6_recalc_reachtm_interval = ND6_RECALC_REACHTM_INTERVAL;
 static struct sockaddr_in6 all1_sa;
 
-static void nd6_slowtimo __P((void *));
 static void nd6_slowtimo_funneled __P((void *));
+static int regen_tmpaddr __P((struct in6_ifaddr *));
 
-#if MIP6
-void (*mip6_expired_defrouter_hook)(struct nd_defrouter *dr) = 0;
-#endif
 
 void
 nd6_init()
@@ -155,31 +143,41 @@ void
 nd6_ifattach(ifp)
        struct ifnet *ifp;
 {
-       static size_t if_indexlim = 8;
 
        /*
         * We have some arrays that should be indexed by if_index.
         * since if_index will grow dynamically, they should grow too.
         */
-       if (nd_ifinfo == NULL || if_index >= if_indexlim) {
+       if (nd_ifinfo == NULL || if_index >= nd_ifinfo_indexlim) {
                size_t n;
                caddr_t q;
 
-               while (if_index >= if_indexlim)
-                       if_indexlim <<= 1;
+               while (if_index >= nd_ifinfo_indexlim)
+                       nd_ifinfo_indexlim <<= 1;
 
                /* grow nd_ifinfo */
-               n = if_indexlim * sizeof(struct nd_ifinfo);
+               n = nd_ifinfo_indexlim * sizeof(struct nd_ifinfo);
                q = (caddr_t)_MALLOC(n, M_IP6NDP, M_WAITOK);
                bzero(q, n);
                if (nd_ifinfo) {
                        bcopy((caddr_t)nd_ifinfo, q, n/2);
-                       _FREE((caddr_t)nd_ifinfo, M_IP6NDP);
+                       FREE((caddr_t)nd_ifinfo, M_IP6NDP);
                }
                nd_ifinfo = (struct nd_ifinfo *)q;
        }
 
 #define ND nd_ifinfo[ifp->if_index]
+
+       /*
+        * Don't initialize if called twice.
+        * XXX: to detect this, we should choose a member that is never set
+        * before initialization of the ND structure itself.  We formaly used
+        * the linkmtu member, which was not suitable because it could be 
+        * initialized via "ifconfig mtu".
+        */
+       if (ND.basereachable)
+               return;
+
        ND.linkmtu = ifindex2ifnet[ifp->if_index]->if_mtu;
        ND.chlim = IPV6_DEFHLIM;
        ND.basereachable = REACHABLE_TIME;
@@ -199,30 +197,37 @@ void
 nd6_setmtu(ifp)
        struct ifnet *ifp;
 {
+#ifndef MIN
+#define MIN(a,b) ((a) < (b) ? (a) : (b))
+#endif
        struct nd_ifinfo *ndi = &nd_ifinfo[ifp->if_index];
        u_long oldmaxmtu = ndi->maxmtu;
        u_long oldlinkmtu = ndi->linkmtu;
 
-       switch(ifp->if_type) {
-        case IFT_ARCNET:       /* XXX MTU handling needs more work */
-                ndi->maxmtu = MIN(60480, ifp->if_mtu);
-                break;
-        case IFT_ETHER:
-                ndi->maxmtu = MIN(ETHERMTU, ifp->if_mtu);
-                break;
-#if defined(__FreeBSD__) || defined(__bsdi__)
-        case IFT_FDDI:
-                ndi->maxmtu = MIN(FDDIIPMTU, ifp->if_mtu);
-                break;
-#endif
-#if !(defined(__bsdi__) && _BSDI_VERSION >= 199802) && !defined (__APPLE__)
-        case IFT_ATM:
-                ndi->maxmtu = MIN(ATMMTU, ifp->if_mtu);
-                break;
+       switch (ifp->if_type) {
+       case IFT_ARCNET:        /* XXX MTU handling needs more work */
+               ndi->maxmtu = MIN(60480, ifp->if_mtu);
+               break;
+       case IFT_ETHER:
+               ndi->maxmtu = MIN(ETHERMTU, ifp->if_mtu);
+               break;
+       case IFT_FDDI:
+               ndi->maxmtu = MIN(FDDIIPMTU, ifp->if_mtu);
+               break;
+       case IFT_ATM:
+               ndi->maxmtu = MIN(ATMMTU, ifp->if_mtu);
+               break;
+       case IFT_IEEE1394:      /* XXX should be IEEE1394MTU(1500) */
+               ndi->maxmtu = MIN(ETHERMTU, ifp->if_mtu);
+               break;
+#if IFT_IEEE80211
+       case IFT_IEEE80211:     /* XXX should be IEEE80211MTU(1500) */
+               ndi->maxmtu = MIN(ETHERMTU, ifp->if_mtu);
+               break;
 #endif
-        default:
-                ndi->maxmtu = ifp->if_mtu;
-                break;
+       default:
+               ndi->maxmtu = ifp->if_mtu;
+               break;
        }
 
        if (oldmaxmtu != ndi->maxmtu) {
@@ -244,8 +249,7 @@ nd6_setmtu(ifp)
                                 */
                                if (in6_maxmtu < ndi->linkmtu)
                                        in6_maxmtu = ndi->linkmtu;
-                       }
-                       else
+                       } else
                                in6_setmaxmtu();
                }
        }
@@ -290,6 +294,12 @@ nd6_option(ndopts)
 
        nd_opt = ndopts->nd_opts_search;
 
+       /* make sure nd_opt_len is inside the buffer */
+       if ((caddr_t)&nd_opt->nd_opt_len >= (caddr_t)ndopts->nd_opts_last) {
+               bzero(ndopts, sizeof(*ndopts));
+               return NULL;
+       }
+
        olen = nd_opt->nd_opt_len << 3;
        if (olen == 0) {
                /*
@@ -301,7 +311,12 @@ nd6_option(ndopts)
        }
 
        ndopts->nd_opts_search = (struct nd_opt_hdr *)((caddr_t)nd_opt + olen);
-       if (!(ndopts->nd_opts_search < ndopts->nd_opts_last)) {
+       if (ndopts->nd_opts_search > ndopts->nd_opts_last) {
+               /* option overruns the end of buffer, invalid */
+               bzero(ndopts, sizeof(*ndopts));
+               return NULL;
+       } else if (ndopts->nd_opts_search == ndopts->nd_opts_last) {
+               /* reached the end of options chain */
                ndopts->nd_opts_done = 1;
                ndopts->nd_opts_search = NULL;
        }
@@ -334,6 +349,7 @@ nd6_options(ndopts)
                         * Message validation requires that all included
                         * options have a length that is greater than zero.
                         */
+                       icmp6stat.icp6s_nd_badopt++;
                        bzero(ndopts, sizeof(*ndopts));
                        return -1;
                }
@@ -346,10 +362,10 @@ nd6_options(ndopts)
                case ND_OPT_TARGET_LINKADDR:
                case ND_OPT_MTU:
                case ND_OPT_REDIRECTED_HEADER:
-               case ND_OPT_ADV_INTERVAL:
                        if (ndopts->nd_opt_array[nd_opt->nd_opt_type]) {
-                               printf("duplicated ND6 option found "
-                                       "(type=%d)\n", nd_opt->nd_opt_type);
+                               nd6log((LOG_INFO,
+                                   "duplicated ND6 option found (type=%d)\n",
+                                   nd_opt->nd_opt_type));
                                /* XXX bark? */
                        } else {
                                ndopts->nd_opt_array[nd_opt->nd_opt_type]
@@ -364,23 +380,21 @@ nd6_options(ndopts)
                        ndopts->nd_opts_pi_end =
                                (struct nd_opt_prefix_info *)nd_opt;
                        break;
-               case ND_OPT_HA_INFORMATION:
-                       break;
                default:
                        /*
                         * Unknown options must be silently ignored,
                         * to accomodate future extension to the protocol.
                         */
-                       log(LOG_DEBUG,
+                       nd6log((LOG_DEBUG,
                            "nd6_options: unsupported option %d - "
-                           "option ignored\n", nd_opt->nd_opt_type);
+                           "option ignored\n", nd_opt->nd_opt_type));
                }
 
 skip1:
                i++;
                if (i > nd6_maxndopt) {
                        icmp6stat.icp6s_nd_toomanyopt++;
-                       printf("too many loop in nd opt\n");
+                       nd6log((LOG_INFO, "too many loop in nd opt\n"));
                        break;
                }
 
@@ -412,25 +426,21 @@ nd6_timer(ignored_arg)
        void    *ignored_arg;
 {
        int s;
-       register struct llinfo_nd6 *ln;
-       register struct nd_defrouter *dr;
-       register struct nd_prefix *pr;
-#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3) && !defined (__APPLE__)
-       long time_second = time.tv_sec;
-#endif
+       struct llinfo_nd6 *ln;
+       struct nd_defrouter *dr;
+       struct nd_prefix *pr;
+       struct ifnet *ifp;
+       struct in6_ifaddr *ia6, *nia6;
+       struct in6_addrlifetime *lt6;
        
-#if __NetBSD__
-       s = splsoftnet();
-#else
        s = splnet();
-#endif
+
        timeout(nd6_timer_funneled, (caddr_t)0, nd6_prune * hz);
 
        ln = llinfo_nd6.ln_next;
        /* XXX BSD/OS separates this code -- itojun */
        while (ln && ln != &llinfo_nd6) {
                struct rtentry *rt;
-               struct ifnet *ifp;
                struct sockaddr_in6 *dst;
                struct llinfo_nd6 *next = ln->ln_next;
                /* XXX: used for the DELAY case only: */
@@ -486,17 +496,22 @@ nd6_timer(ignored_arg)
                                                    ICMP6_DST_UNREACH_ADDR, 0);
                                        ln->ln_hold = NULL;
                                }
-                               nd6_free(rt);
+                               next = nd6_free(rt);
                        }
                        break;
                case ND6_LLINFO_REACHABLE:
-                       if (ln->ln_expire)
+                       if (ln->ln_expire) {
                                ln->ln_state = ND6_LLINFO_STALE;
+                               ln->ln_expire = time_second + nd6_gctimer;
+                       }
                        break;
-               /*
-                * ND6_LLINFO_STALE state requires nothing for timer
-                * routine.
-                */
+
+               case ND6_LLINFO_STALE:
+                       /* Garbage Collection(RFC 2461 5.3) */
+                       if (ln->ln_expire)
+                               next = nd6_free(rt);
+                       break;
+
                case ND6_LLINFO_DELAY:
                        if (ndi && (ndi->flags & ND6_IFF_PERFORMNUD) != 0) {
                                /* We need NUD */
@@ -507,9 +522,10 @@ nd6_timer(ignored_arg)
                                nd6_ns_output(ifp, &dst->sin6_addr,
                                              &dst->sin6_addr,
                                              ln, 0);
-                       }
-                       else
+                       } else {
                                ln->ln_state = ND6_LLINFO_STALE; /* XXX */
+                               ln->ln_expire = time_second + nd6_gctimer;
+                       }
                        break;
                case ND6_LLINFO_PROBE:
                        if (ln->ln_asked < nd6_umaxtries) {
@@ -519,17 +535,14 @@ nd6_timer(ignored_arg)
                                nd6_ns_output(ifp, &dst->sin6_addr,
                                               &dst->sin6_addr, ln, 0);
                        } else {
-                               nd6_free(rt);
+                               next = nd6_free(rt);
                        }
                        break;
-               case ND6_LLINFO_WAITDELETE:
-                       nd6_free(rt);
-                       break;
                }
                ln = next;
        }
        
-       /* expire */
+       /* expire default router list */
        dr = TAILQ_FIRST(&nd_defrouter);
        while (dr) {
                if (dr->expire && dr->expire < time_second) {
@@ -538,35 +551,85 @@ nd6_timer(ignored_arg)
                        defrtrlist_del(dr);
                        dr = t;
                } else {
-#if MIP6
-                       if (mip6_expired_defrouter_hook)
-                               (*mip6_expired_defrouter_hook)(dr);
-#endif /* MIP6 */
                        dr = TAILQ_NEXT(dr, dr_entry);
                }
        }
-       pr = nd_prefix.lh_first;
-       while (pr) {
-               struct in6_ifaddr *ia6;
-               struct in6_addrlifetime *lt6;
 
-               if (IN6_IS_ADDR_UNSPECIFIED(&pr->ndpr_addr))
-                       ia6 = NULL;
-               else
-                       ia6 = in6ifa_ifpwithaddr(pr->ndpr_ifp, &pr->ndpr_addr);
-
-               if (ia6) {
-                       /* check address lifetime */
-                       lt6 = &ia6->ia6_lifetime;
-                       if (lt6->ia6t_preferred && lt6->ia6t_preferred < time_second)
-                               ia6->ia6_flags |= IN6_IFF_DEPRECATED;
-                       if (lt6->ia6t_expire && lt6->ia6t_expire < time_second) {
-                               if (!IN6_IS_ADDR_UNSPECIFIED(&pr->ndpr_addr))
-                                       in6_ifdel(pr->ndpr_ifp, &pr->ndpr_addr);
-                               /* xxx ND_OPT_PI_FLAG_ONLINK processing */
+       /*
+        * expire interface addresses.
+        * in the past the loop was inside prefix expiry processing.
+        * However, from a stricter speci-confrmance standpoint, we should
+        * rather separate address lifetimes and prefix lifetimes.
+        */
+  addrloop:
+       for (ia6 = in6_ifaddr; ia6; ia6 = nia6) {
+               nia6 = ia6->ia_next;
+               /* check address lifetime */
+               lt6 = &ia6->ia6_lifetime;
+               if (IFA6_IS_INVALID(ia6)) {
+                       int regen = 0;
+
+                       /*
+                        * If the expiring address is temporary, try
+                        * regenerating a new one.  This would be useful when
+                        * we suspended a laptop PC, then turned on after a
+                        * period that could invalidate all temporary
+                        * addresses.  Although we may have to restart the
+                        * loop (see below), it must be after purging the
+                        * address.  Otherwise, we'd see an infinite loop of
+                        * regeneration. 
+                        */
+                       if (ip6_use_tempaddr &&
+                           (ia6->ia6_flags & IN6_IFF_TEMPORARY) != 0) {
+                               if (regen_tmpaddr(ia6) == 0)
+                                       regen = 1;
+                       }
+
+                       in6_purgeaddr(&ia6->ia_ifa);
+
+                       if (regen)
+                               goto addrloop; /* XXX: see below */
+               } else if (IFA6_IS_DEPRECATED(ia6)) {
+                       int oldflags = ia6->ia6_flags;
+
+                       ia6->ia6_flags |= IN6_IFF_DEPRECATED;
+
+                       /*
+                        * If a temporary address has just become deprecated,
+                        * regenerate a new one if possible.
+                        */
+                       if (ip6_use_tempaddr &&
+                           (ia6->ia6_flags & IN6_IFF_TEMPORARY) != 0 &&
+                           (oldflags & IN6_IFF_DEPRECATED) == 0) {
+
+                               if (regen_tmpaddr(ia6) == 0) {
+                                       /*
+                                        * A new temporary address is
+                                        * generated.
+                                        * XXX: this means the address chain
+                                        * has changed while we are still in
+                                        * the loop.  Although the change
+                                        * would not cause disaster (because
+                                        * it's not an addition, but a
+                                        * deletion,) we'd rather restart the
+                                        * loop just for safety.  Or does this 
+                                        * significantly reduce performance??
+                                        */
+                                       goto addrloop;
+                               }
                        }
+               } else if (IFA6_IS_DEPRECATED(ia6)) {
+                       /*
+                        * A new RA might have made a deprecated address
+                        * preferred.
+                        */
+                       ia6->ia6_flags &= ~IN6_IFF_DEPRECATED;
                }
+       }
 
+       /* expire prefix list */
+       pr = nd_prefix.lh_first;
+       while (pr) {
                /*
                 * check prefix lifetime.
                 * since pltime is just for autoconf, pltime processing for
@@ -576,15 +639,17 @@ nd6_timer(ignored_arg)
                 * can use the old prefix information to validate the
                 * next prefix information to come.  See prelist_update()
                 * for actual validation.
+                *
+                * I don't think such an offset is necessary.
+                * (jinmei@kame.net, 20010130).
                 */
-               if (pr->ndpr_expire
-                && pr->ndpr_expire + NDPR_KEEP_EXPIRED < time_second) {
+               if (pr->ndpr_expire && pr->ndpr_expire < time_second) {
                        struct nd_prefix *t;
                        t = pr->ndpr_next;
 
                        /*
                         * address expiration and prefix expiration are
-                        * separate.  NEVER perform in6_ifdel here.
+                        * separate.  NEVER perform in6_purgeaddr here.
                         */
 
                        prelist_remove(pr);
@@ -595,6 +660,70 @@ nd6_timer(ignored_arg)
        splx(s);
 }
 
+static int
+regen_tmpaddr(ia6)
+       struct in6_ifaddr *ia6; /* deprecated/invalidated temporary address */
+{
+       struct ifaddr *ifa;
+       struct ifnet *ifp;
+       struct in6_ifaddr *public_ifa6 = NULL;
+
+       ifp = ia6->ia_ifa.ifa_ifp;
+       for (ifa = ifp->if_addrlist.tqh_first; ifa;
+            ifa = ifa->ifa_list.tqe_next)
+       {
+               struct in6_ifaddr *it6;
+
+               if (ifa->ifa_addr->sa_family != AF_INET6)
+                       continue;
+
+               it6 = (struct in6_ifaddr *)ifa;
+
+               /* ignore no autoconf addresses. */
+               if ((it6->ia6_flags & IN6_IFF_AUTOCONF) == 0)
+                       continue;
+
+               /* ignore autoconf addresses with different prefixes. */
+               if (it6->ia6_ndpr == NULL || it6->ia6_ndpr != ia6->ia6_ndpr)
+                       continue;
+
+               /*
+                * Now we are looking at an autoconf address with the same
+                * prefix as ours.  If the address is temporary and is still
+                * preferred, do not create another one.  It would be rare, but
+                * could happen, for example, when we resume a laptop PC after
+                * a long period.
+                */
+               if ((it6->ia6_flags & IN6_IFF_TEMPORARY) != 0 &&
+                   !IFA6_IS_DEPRECATED(it6)) {
+                       public_ifa6 = NULL;
+                       break;
+               }
+
+               /*
+                * This is a public autoconf address that has the same prefix
+                * as ours.  If it is preferred, keep it.  We can't break the
+                * loop here, because there may be a still-preferred temporary
+                * address with the prefix.
+                */
+               if (!IFA6_IS_DEPRECATED(it6))
+                   public_ifa6 = it6;
+       }
+
+       if (public_ifa6 != NULL) {
+               int e;
+
+               if ((e = in6_tmpifadd(public_ifa6, 0)) != 0) {
+                       log(LOG_NOTICE, "regen_tmpaddr: failed to create a new"
+                           " tmp addr,errno=%d\n", e);
+                       return(-1);
+               }
+               return(0);
+       }
+
+       return(-1);
+}
+
 /*
  * Nuke neighbor cache/prefix/default router management table, right before
  * ifp goes away.
@@ -627,8 +756,14 @@ nd6_purge(ifp)
        for (pr = nd_prefix.lh_first; pr; pr = npr) {
                npr = pr->ndpr_next;
                if (pr->ndpr_ifp == ifp) {
-                       if (!IN6_IS_ADDR_UNSPECIFIED(&pr->ndpr_addr))
-                               in6_ifdel(pr->ndpr_ifp, &pr->ndpr_addr);
+                       /*
+                        * Previously, pr->ndpr_addr is removed as well,
+                        * but I strongly believe we don't have to do it.
+                        * nd6_purge() is only called from in6_ifdetach(),
+                        * which removes all the associated interface addresses
+                        * by itself.
+                        * (jinmei@kame.net 20010129)
+                        */
                        prelist_remove(pr);
                }
        }
@@ -637,10 +772,12 @@ nd6_purge(ifp)
        if (nd6_defifindex == ifp->if_index)
                nd6_setdefaultiface(0);
 
-       /* refresh default router list */
-       bzero(&drany, sizeof(drany));
-       defrouter_delreq(&drany, 0);
-       defrouter_select();
+       if (!ip6_forwarding && ip6_accept_rtadv) { /* XXX: too restrictive? */
+               /* refresh default router list */
+               bzero(&drany, sizeof(drany));
+               defrouter_delreq(&drany, 0);
+               defrouter_select();
+       }
 
        /*
         * Nuke neighbor cache entries for the ifp.
@@ -659,30 +796,7 @@ nd6_purge(ifp)
                    rt->rt_gateway->sa_family == AF_LINK) {
                        sdl = (struct sockaddr_dl *)rt->rt_gateway;
                        if (sdl->sdl_index == ifp->if_index)
-                               nd6_free(rt);
-               }
-               ln = nln;
-       }
-
-       /*
-        * Neighbor cache entry for interface route will be retained
-        * with ND6_LLINFO_WAITDELETE state, by nd6_free().  Nuke it.
-        */
-       ln = llinfo_nd6.ln_next;
-       while (ln && ln != &llinfo_nd6) {
-               struct rtentry *rt;
-               struct sockaddr_dl *sdl;
-
-               nln = ln->ln_next;
-               rt = ln->ln_rt;
-               if (rt && rt->rt_gateway &&
-                   rt->rt_gateway->sa_family == AF_LINK) {
-                       sdl = (struct sockaddr_dl *)rt->rt_gateway;
-                       if (sdl->sdl_index == ifp->if_index) {
-                               rtrequest(RTM_DELETE, rt_key(rt),
-                                   (struct sockaddr *)0, rt_mask(rt), 0,
-                                   (struct rtentry **)0);
-                       }
+                               nln = nd6_free(rt);
                }
                ln = nln;
        }
@@ -701,11 +815,10 @@ nd6_lookup(addr6, create, ifp)
        sin6.sin6_len = sizeof(struct sockaddr_in6);
        sin6.sin6_family = AF_INET6;
        sin6.sin6_addr = *addr6;
-       rt = rtalloc1((struct sockaddr *)&sin6, create
-#if __FreeBSD__ || defined (__APPLE__)
-                     , 0UL
-#endif /*__FreeBSD__*/
-                     );
+#if SCOPEDROUTING
+       sin6.sin6_scope_id = in6_addr2scopeid(ifp, addr6);
+#endif
+       rt = rtalloc1((struct sockaddr *)&sin6, create, 0UL);
        if (rt && (rt->rt_flags & RTF_LLINFO) == 0) {
                /*
                 * This is the case for the default route.
@@ -714,7 +827,7 @@ nd6_lookup(addr6, create, ifp)
                 * interface route.
                 */
                if (create) {
-                       RTFREE(rt);
+                       rtfree(rt);
                        rt = 0;
                }
        }
@@ -758,11 +871,10 @@ nd6_lookup(addr6, create, ifp)
                                        (struct llinfo_nd6 *)rt->rt_llinfo;
                                ln->ln_state = ND6_LLINFO_NOSTATE;
                        }
-               }
-               else
+               } else
                        return(NULL);
        }
-       rt->rt_refcnt--;
+       rtunref(rt);
        /*
         * Validation for the entry.
         * XXX: we can't use rt->rt_ifp to check for the interface, since
@@ -789,36 +901,38 @@ nd6_lookup(addr6, create, ifp)
  */
 int
 nd6_is_addr_neighbor(addr, ifp)
-       struct in6_addr *addr;
+       struct sockaddr_in6 *addr;
        struct ifnet *ifp;
 {
-       register struct ifaddr *ifa;
+       struct ifaddr *ifa;
        int i;
 
 #define IFADDR6(a) ((((struct in6_ifaddr *)(a))->ia_addr).sin6_addr)
 #define IFMASK6(a) ((((struct in6_ifaddr *)(a))->ia_prefixmask).sin6_addr)
 
-       /* A link-local address is always a neighbor. */
-       if (IN6_IS_ADDR_LINKLOCAL(addr))
+       /*
+        * A link-local address is always a neighbor.
+        * XXX: we should use the sin6_scope_id field rather than the embedded
+        * interface index.
+        */
+       if (IN6_IS_ADDR_LINKLOCAL(&addr->sin6_addr) &&
+           ntohs(*(u_int16_t *)&addr->sin6_addr.s6_addr[2]) == ifp->if_index)
                return(1);
 
        /*
         * If the address matches one of our addresses,
         * it should be a neighbor.
         */
-#if defined(__bsdi__) || (defined(__FreeBSD__) && __FreeBSD__ < 3)
-       for (ifa = ifp->if_addrlist; ifa; ifa = ifa->ifa_next)
-#else
        for (ifa = ifp->if_addrlist.tqh_first;
             ifa;
             ifa = ifa->ifa_list.tqe_next)
-#endif
        {
                if (ifa->ifa_addr->sa_family != AF_INET6)
                        next: continue;
 
                for (i = 0; i < 4; i++) {
-                       if ((IFADDR6(ifa).s6_addr32[i] ^ addr->s6_addr32[i]) &
+                       if ((IFADDR6(ifa).s6_addr32[i] ^
+                            addr->sin6_addr.s6_addr32[i]) &
                            IFMASK6(ifa).s6_addr32[i])
                                goto next;
                }
@@ -829,7 +943,7 @@ nd6_is_addr_neighbor(addr, ifp)
         * Even if the address matches none of our addresses, it might be
         * in the neighbor cache.
         */
-       if (nd6_lookup(addr, 0, ifp))
+       if (nd6_lookup(&addr->sin6_addr, 0, ifp))
                return(1);
 
        return(0);
@@ -840,30 +954,25 @@ nd6_is_addr_neighbor(addr, ifp)
 /*
  * Free an nd6 llinfo entry.
  */
-void
+struct llinfo_nd6 *
 nd6_free(rt)
        struct rtentry *rt;
 {
-       struct llinfo_nd6 *ln = (struct llinfo_nd6 *)rt->rt_llinfo;
-       struct sockaddr_dl *sdl;
+       struct llinfo_nd6 *ln = (struct llinfo_nd6 *)rt->rt_llinfo, *next;
        struct in6_addr in6 = ((struct sockaddr_in6 *)rt_key(rt))->sin6_addr;
        struct nd_defrouter *dr;
 
        /*
-        * Clear all destination cache entries for the neighbor.
-        * XXX: is it better to restrict this to hosts?
+        * we used to have pfctlinput(PRC_HOSTDEAD) here. 
+        * even though it is not harmful, it was not really necessary.
         */
-       pfctlinput(PRC_HOSTDEAD, rt_key(rt));
 
        if (!ip6_forwarding && ip6_accept_rtadv) { /* XXX: too restrictive? */
                int s;
-#ifdef __NetBSD__
-               s = splsoftnet();
-#else
                s = splnet();
-#endif
                dr = defrouter_lookup(&((struct sockaddr_in6 *)rt_key(rt))->sin6_addr,
                                      rt->rt_ifp);
+
                if (ln->ln_router || dr) {
                        /*
                         * rt6_flush must be called whether or not the neighbor
@@ -889,6 +998,14 @@ nd6_free(rt)
                         */
                        ln->ln_state = ND6_LLINFO_INCOMPLETE;
 
+                       /*
+                        * Since defrouter_select() does not affect the
+                        * on-link determination and MIP6 needs the check
+                        * before the default router selection, we perform
+                        * the check now.
+                        */
+                       pfxlist_onlink_check();
+
                        if (dr == TAILQ_FIRST(&nd_defrouter)) {
                                /*
                                 * It is used as the current default router,
@@ -902,22 +1019,27 @@ nd6_free(rt)
 
                                defrouter_select();
                        }
-                       pfxlist_onlink_check();
                }
                splx(s);
        }
 
-       if (rt->rt_refcnt > 0 && (sdl = SDL(rt->rt_gateway)) &&
-           sdl->sdl_family == AF_LINK) {
-               sdl->sdl_alen = 0;
-               ln->ln_state = ND6_LLINFO_WAITDELETE;
-               ln->ln_asked = 0;
-               rt->rt_flags &= ~RTF_REJECT;
-               return;
-       }
+       /*
+        * Before deleting the entry, remember the next entry as the
+        * return value.  We need this because pfxlist_onlink_check() above
+        * might have freed other entries (particularly the old next entry) as
+        * a side effect (XXX). 
+        */
+       next = ln->ln_next;
 
+       /*
+        * Detach the route from the routing tree and the list of neighbor
+        * caches, and disable the route entry not to be used in already
+        * cached routes.
+        */
        rtrequest(RTM_DELETE, rt_key(rt), (struct sockaddr *)0,
                  rt_mask(rt), 0, (struct rtentry **)0);
+
+       return(next);
 }
 
 /*
@@ -926,14 +1048,12 @@ nd6_free(rt)
  * XXX cost-effective metods?
  */
 void
-nd6_nud_hint(rt, dst6)
+nd6_nud_hint(rt, dst6, force)
        struct rtentry *rt;
        struct in6_addr *dst6;
+       int force;
 {
        struct llinfo_nd6 *ln;
-#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3) && !defined (__APPLE__)
-       long time_second = time.tv_sec;
-#endif
 
        /*
         * If the caller specified "rt", use that.  Otherwise, resolve the
@@ -946,11 +1066,10 @@ nd6_nud_hint(rt, dst6)
                        return;
        }
 
-       if ((rt->rt_flags & RTF_GATEWAY)
-        || (rt->rt_flags & RTF_LLINFO) == 0
-        || !rt->rt_llinfo
-        || !rt->rt_gateway
-        || rt->rt_gateway->sa_family != AF_LINK) {
+       if ((rt->rt_flags & RTF_GATEWAY) != 0 ||
+           (rt->rt_flags & RTF_LLINFO) == 0 ||
+           !rt->rt_llinfo || !rt->rt_gateway ||
+           rt->rt_gateway->sa_family != AF_LINK) {
                /* This is not a host route. */
                return;
        }
@@ -959,135 +1078,48 @@ nd6_nud_hint(rt, dst6)
        if (ln->ln_state < ND6_LLINFO_REACHABLE)
                return;
 
-       ln->ln_state = ND6_LLINFO_REACHABLE;
-       if (ln->ln_expire && nd_ifinfo)
-               ln->ln_expire = time_second +
-                       (rt->rt_ifp ? nd_ifinfo[rt->rt_ifp->if_index].reachable : 0) ;
-}
-
-#if OLDIP6OUTPUT
-/*
- * Resolve an IP6 address into an ethernet address. If success,
- * desten is filled in. If there is no entry in ndptab,
- * set one up and multicast a solicitation for the IP6 address.
- * Hold onto this mbuf and resend it once the address
- * is finally resolved. A return value of 1 indicates
- * that desten has been filled in and the packet should be sent
- * normally; a 0 return indicates that the packet has been
- * taken over here, either now or for later transmission.
- */
-int
-nd6_resolve(ifp, rt, m, dst, desten)
-       struct ifnet *ifp;
-       struct rtentry *rt;
-       struct mbuf *m;
-       struct sockaddr *dst;
-       u_char *desten;
-{
-       struct llinfo_nd6 *ln = (struct llinfo_nd6 *)NULL;
-       struct sockaddr_dl *sdl;
-#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3) && !defined (__APPLE__)
-       long time_second = time.tv_sec;
-#endif
-
-       if (m->m_flags & M_MCAST) {
-               switch (ifp->if_type) {
-               case IFT_ETHER:
-               case IFT_FDDI:                  
-                       ETHER_MAP_IPV6_MULTICAST(&SIN6(dst)->sin6_addr,
-                                                desten);
-                       return(1);
-                       break;
-               case IFT_ARCNET:
-                       *desten = 0;
-                       return(1);
-                       break;
-               default:
-                       return(0);
-               }
-       }
-       if (rt && (rt->rt_flags & RTF_LLINFO) != 0)
-               ln = (struct llinfo_nd6 *)rt->rt_llinfo;
-       else {
-               if ((rt = nd6_lookup(&(SIN6(dst)->sin6_addr), 1, ifp)) != NULL)
-                       ln = (struct llinfo_nd6 *)rt->rt_llinfo;
-       }
-       if (!ln || !rt) {
-               log(LOG_DEBUG, "nd6_resolve: can't allocate llinfo for %s\n",
-                       ip6_sprintf(&(SIN6(dst)->sin6_addr)));
-               m_freem(m);
-               return(0);
-       }
-       sdl = SDL(rt->rt_gateway);
        /*
-        * Ckeck the address family and length is valid, the address
-        * is resolved; otherwise, try to resolve.
+        * if we get upper-layer reachability confirmation many times,
+        * it is possible we have false information.
         */
-       if (ln->ln_state >= ND6_LLINFO_REACHABLE
-          && sdl->sdl_family == AF_LINK
-          && sdl->sdl_alen != 0) {
-               bcopy(LLADDR(sdl), desten, sdl->sdl_alen);
-               if (ln->ln_state == ND6_LLINFO_STALE) {
-                       ln->ln_asked = 0;
-                       ln->ln_state = ND6_LLINFO_DELAY;
-                       ln->ln_expire = time_second + nd6_delay;
-               }
-               return(1);
-       }
-       /*
-        * There is an ndp entry, but no ethernet address
-        * response yet. Replace the held mbuf with this
-        * latest one.
-        *
-        * XXX Does the code conform to rate-limiting rule?
-        * (RFC 2461 7.2.2)
-        */
-       if (ln->ln_state == ND6_LLINFO_WAITDELETE ||
-           ln->ln_state == ND6_LLINFO_NOSTATE)
-               ln->ln_state = ND6_LLINFO_INCOMPLETE;
-       if (ln->ln_hold)
-               m_freem(ln->ln_hold);
-       ln->ln_hold = m;
-       if (ln->ln_expire) {
-               rt->rt_flags &= ~RTF_REJECT;
-               if (ln->ln_asked < nd6_mmaxtries &&
-                   ln->ln_expire < time_second) {
-                       ln->ln_asked++;
-                       ln->ln_expire = time_second +
-                               nd_ifinfo[ifp->if_index].retrans / 1000;
-                       nd6_ns_output(ifp, NULL, &(SIN6(dst)->sin6_addr),
-                               ln, 0);
-               }
+       if (!force) {
+               ln->ln_byhint++;
+               if (ln->ln_byhint > nd6_maxnudhint)
+                       return;
        }
-       return(0);
+
+       ln->ln_state = ND6_LLINFO_REACHABLE;
+       if (ln->ln_expire)
+               ln->ln_expire = time_second +
+                       nd_ifinfo[rt->rt_ifp->if_index].reachable;
 }
-#endif /* OLDIP6OUTPUT */
 
 void
-#if defined(__bsdi__) && _BSDI_VERSION >= 199802
-nd6_rtrequest(req, rt, info)
-       int     req;
-       struct rtentry *rt;
-       struct rt_addrinfo *info; /* xxx unused */
-#else
 nd6_rtrequest(req, rt, sa)
        int     req;
        struct rtentry *rt;
        struct sockaddr *sa; /* xxx unused */
-#endif
 {
        struct sockaddr *gate = rt->rt_gateway;
        struct llinfo_nd6 *ln = (struct llinfo_nd6 *)rt->rt_llinfo;
        static struct sockaddr_dl null_sdl = {sizeof(null_sdl), AF_LINK};
        struct ifnet *ifp = rt->rt_ifp;
        struct ifaddr *ifa;
-#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3) && !defined (__APPLE__)
-       long time_second = time.tv_sec;
-#endif
 
        if (rt->rt_flags & RTF_GATEWAY)
                return;
 
+       if (nd6_need_cache(ifp) == 0 && (rt->rt_flags & RTF_HOST) == 0) {
+               /*
+                * This is probably an interface direct route for a link
+                * which does not need neighbor caches (e.g. fe80::%lo0/64).
+                * We do not need special treatment below for such a route.
+                * Moreover, the RTF_LLINFO flag which would be set below
+                * would annoy the ndp(8) command.
+                */
+               return;
+       }
+
        switch (req) {
        case RTM_ADD:
                /*
@@ -1113,7 +1145,7 @@ nd6_rtrequest(req, rt, sa)
                                ln->ln_expire = time_second;
 #if 1
                        if (ln && ln->ln_expire == 0) {
-                               /* cludge for desktops */
+                               /* kludge for desktops */
 #if 0
                                printf("nd6_request: time.tv_sec is zero; "
                                       "treat it as 1\n");
@@ -1134,10 +1166,10 @@ nd6_rtrequest(req, rt, sa)
                 *   (7.2.6 paragraph 4), however, it also says that we
                 *   SHOULD provide a mechanism to prevent multicast NA storm.
                 *   we don't have anything like it right now.
-                *   note that the mechanism need a mutual agreement
+                *   note that the mechanism needs a mutual agreement
                 *   between proxies, which means that we need to implement
-                *   a new protocol, or new kludge.
-                * - from RFC2461 6.2.4, host MUST NOT send unsolicited NA.
+                *   a new protocol, or new kludge.
+                * - from RFC2461 6.2.4, host MUST NOT send an unsolicited NA.
                 *   we need to check ip6forwarding before sending it.
                 *   (or should we allow proxy ND configuration only for
                 *   routers?  there's no mention about proxy ND from hosts)
@@ -1153,7 +1185,7 @@ nd6_rtrequest(req, rt, sa)
 #endif
                /* FALLTHROUGH */
        case RTM_RESOLVE:
-               if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
+               if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) == 0) {
                        /*
                         * Address resolution isn't necessary for a point to
                         * point link, so we can skip this test for a p2p link.
@@ -1161,7 +1193,8 @@ nd6_rtrequest(req, rt, sa)
                        if (gate->sa_family != AF_LINK ||
                            gate->sa_len < sizeof(null_sdl)) {
                                log(LOG_DEBUG,
-                                   "nd6_rtrequest: bad gateway value\n");
+                                   "nd6_rtrequest: bad gateway value: %s\n",
+                                   if_name(ifp));
                                break;
                        }
                        SDL(gate)->sdl_type = ifp->if_type;
@@ -1191,6 +1224,7 @@ nd6_rtrequest(req, rt, sa)
                         * which is specified by ndp command.
                         */
                        ln->ln_state = ND6_LLINFO_REACHABLE;
+                       ln->ln_byhint = 0;
                } else {
                        /*
                         * When req == RTM_RESOLVE, rt is created and
@@ -1215,22 +1249,13 @@ nd6_rtrequest(req, rt, sa)
                        caddr_t macp = nd6_ifptomac(ifp);
                        ln->ln_expire = 0;
                        ln->ln_state = ND6_LLINFO_REACHABLE;
+                       ln->ln_byhint = 0;
                        if (macp) {
                                Bcopy(macp, LLADDR(SDL(gate)), ifp->if_addrlen);
                                SDL(gate)->sdl_alen = ifp->if_addrlen;
                        }
                        if (nd6_useloopback) {
-#ifdef __bsdi__
-#if _BSDI_VERSION >= 199802
-                               extern struct ifnet *loifp;
-                               rt->rt_ifp = loifp;     /*XXX*/
-#else
-                               extern struct ifnet loif;
-                               rt->rt_ifp = &loif;     /*XXX*/
-#endif
-#else /* non-bsdi */
                                rt->rt_ifp = &loif[0];  /*XXX*/
-#endif
                                /*
                                 * Make sure rt_ifa be equal to the ifaddr
                                 * corresponding to the address.
@@ -1240,14 +1265,13 @@ nd6_rtrequest(req, rt, sa)
                                 * of the loopback address.
                                 */
                                if (ifa != rt->rt_ifa) {
-                                       rt->rt_ifa->ifa_refcnt--;
-                                       ifa->ifa_refcnt++;
-                                       rt->rt_ifa = ifa;
+                                       rtsetifa(rt, ifa);
                                }
                        }
                } else if (rt->rt_flags & RTF_ANNOUNCE) {
                        ln->ln_expire = 0;
                        ln->ln_state = ND6_LLINFO_REACHABLE;
+                       ln->ln_byhint = 0;
 
                        /* join solicited node multicast for proxy ND */
                        if (ifp->if_flags & IFF_MULTICAST) {
@@ -1261,10 +1285,11 @@ nd6_rtrequest(req, rt, sa)
                                llsol.s6_addr32[2] = htonl(1);
                                llsol.s6_addr8[12] = 0xff;
 
-                               (void)in6_addmulti(&llsol, ifp, &error);
-                               if (error)
-                                       printf(
-"nd6_rtrequest: could not join solicited node multicast (errno=%d)\n", error);
+                               if (!in6_addmulti(&llsol, ifp, &error)) {
+                                       nd6log((LOG_ERR, "%s: failed to join "
+                                           "%s (errno=%d)\n", if_name(ifp),
+                                           ip6_sprintf(&llsol), error));
+                               }
                        }
                }
                break;
@@ -1301,82 +1326,6 @@ nd6_rtrequest(req, rt, sa)
        }
 }
 
-void
-#if defined(__bsdi__) && _BSDI_VERSION >= 199802
-nd6_p2p_rtrequest(req, rt, info)
-       int     req;
-       struct rtentry *rt;
-       struct rt_addrinfo *info; /* xxx unused */
-#else
-nd6_p2p_rtrequest(req, rt, sa)
-       int     req;
-       struct rtentry *rt;
-       struct sockaddr *sa; /* xxx unused */
-#endif
-{
-       struct sockaddr *gate = rt->rt_gateway;
-       static struct sockaddr_dl null_sdl = {sizeof(null_sdl), AF_LINK};
-       struct ifnet *ifp = rt->rt_ifp;
-       struct ifaddr *ifa;
-
-       if (rt->rt_flags & RTF_GATEWAY)
-               return;
-
-       switch (req) {
-       case RTM_ADD:
-               /*
-                * There is no backward compatibility :)
-                *
-                * if ((rt->rt_flags & RTF_HOST) == 0 &&
-                *     SIN(rt_mask(rt))->sin_addr.s_addr != 0xffffffff)
-                *         rt->rt_flags |= RTF_CLONING;
-                */
-               if (rt->rt_flags & RTF_CLONING) {
-                       /*
-                        * Case 1: This route should come from
-                        * a route to interface.
-                        */
-                       rt_setgate(rt, rt_key(rt),
-                                  (struct sockaddr *)&null_sdl);
-                       gate = rt->rt_gateway;
-                       SDL(gate)->sdl_type = ifp->if_type;
-                       SDL(gate)->sdl_index = ifp->if_index;
-                       break;
-               }
-               /* Announce a new entry if requested. */
-               if (rt->rt_flags & RTF_ANNOUNCE)
-                       nd6_na_output(ifp,
-                                     &SIN6(rt_key(rt))->sin6_addr,
-                                     &SIN6(rt_key(rt))->sin6_addr,
-                                     ip6_forwarding ? ND_NA_FLAG_ROUTER : 0,
-                                     1, NULL);
-               /* FALLTHROUGH */
-       case RTM_RESOLVE:
-               /*
-                * check if rt_key(rt) is one of my address assigned
-                * to the interface.
-                */
-               ifa = (struct ifaddr *)in6ifa_ifpwithaddr(rt->rt_ifp,
-                                         &SIN6(rt_key(rt))->sin6_addr);
-               if (ifa) {
-                       if (nd6_useloopback) {
-#ifdef __bsdi__
-#if _BSDI_VERSION >= 199802
-                               extern struct ifnet *loifp;
-                               rt->rt_ifp = loifp;     /*XXX*/
-#else
-                               extern struct ifnet loif;
-                               rt->rt_ifp = &loif;     /*XXX*/
-#endif
-#else
-                               rt->rt_ifp = &loif[0];  /*XXX*/
-#endif /*__bsdi__*/
-                       }
-               }
-               break;
-       }
-}
-
 int
 nd6_ioctl(cmd, data, ifp)
        u_long cmd;
@@ -1396,20 +1345,18 @@ nd6_ioctl(cmd, data, ifp)
 
        switch (cmd) {
        case SIOCGDRLST_IN6:
+               /*
+                * obsolete API, use sysctl under net.inet6.icmp6
+                */
                bzero(drl, sizeof(*drl));
-#ifdef __NetBSD__
-               s = splsoftnet();
-#else
                s = splnet();
-#endif
                dr = TAILQ_FIRST(&nd_defrouter);
                while (dr && i < DRLSTSIZ) {
                        drl->defrouter[i].rtaddr = dr->rtaddr;
                        if (IN6_IS_ADDR_LINKLOCAL(&drl->defrouter[i].rtaddr)) {
                                /* XXX: need to this hack for KAME stack */
                                drl->defrouter[i].rtaddr.s6_addr16[1] = 0;
-                       }
-                       else
+                       } else
                                log(LOG_ERR,
                                    "default router list contains a "
                                    "non-linklocal address(%s)\n",
@@ -1425,23 +1372,23 @@ nd6_ioctl(cmd, data, ifp)
                splx(s);
                break;
        case SIOCGPRLST_IN6:
+               /*
+                * obsolete API, use sysctl under net.inet6.icmp6
+                */
                /*
                 * XXX meaning of fields, especialy "raflags", is very
                 * differnet between RA prefix list and RR/static prefix list.
                 * how about separating ioctls into two?
                 */
                bzero(prl, sizeof(*prl));
-#ifdef __NetBSD__
-               s = splsoftnet();
-#else
                s = splnet();
-#endif
                pr = nd_prefix.lh_first;
                while (pr && i < PRLSTSIZ) {
                        struct nd_pfxrouter *pfr;
                        int j;
 
-                       prl->prefix[i].prefix = pr->ndpr_prefix.sin6_addr;
+                       (void)in6_embedscope(&prl->prefix[i].prefix,
+                           &pr->ndpr_prefix, NULL, NULL);
                        prl->prefix[i].raflags = pr->ndpr_raf;
                        prl->prefix[i].prefixlen = pr->ndpr_plen;
                        prl->prefix[i].vltime = pr->ndpr_vltime;
@@ -1451,15 +1398,14 @@ nd6_ioctl(cmd, data, ifp)
 
                        pfr = pr->ndpr_advrtrs.lh_first;
                        j = 0;
-                       while(pfr) {
+                       while (pfr) {
                                if (j < DRLSTSIZ) {
 #define RTRADDR prl->prefix[i].advrtr[j]
                                        RTRADDR = pfr->router->rtaddr;
                                        if (IN6_IS_ADDR_LINKLOCAL(&RTRADDR)) {
                                                /* XXX: hack for KAME */
                                                RTRADDR.s6_addr16[1] = 0;
-                                       }
-                                       else
+                                       } else
                                                log(LOG_ERR,
                                                    "a router(%s) advertises "
                                                    "a prefix with "
@@ -1483,7 +1429,8 @@ nd6_ioctl(cmd, data, ifp)
                     rpp = LIST_NEXT(rpp, rp_entry)) {
                        if (i >= PRLSTSIZ)
                                break;
-                       prl->prefix[i].prefix = rpp->rp_prefix.sin6_addr;
+                       (void)in6_embedscope(&prl->prefix[i].prefix,
+                           &pr->ndpr_prefix, NULL, NULL);
                        prl->prefix[i].raflags = rpp->rp_raf;
                        prl->prefix[i].prefixlen = rpp->rp_plen;
                        prl->prefix[i].vltime = rpp->rp_vltime;
@@ -1497,12 +1444,36 @@ nd6_ioctl(cmd, data, ifp)
              }
                splx(s);
 
+               break;
+       case OSIOCGIFINFO_IN6:
+               if (!nd_ifinfo || i >= nd_ifinfo_indexlim) {
+                       error = EINVAL;
+                       break;
+               }
+               ndi->ndi.linkmtu = nd_ifinfo[ifp->if_index].linkmtu;
+               ndi->ndi.maxmtu = nd_ifinfo[ifp->if_index].maxmtu;
+               ndi->ndi.basereachable =
+                   nd_ifinfo[ifp->if_index].basereachable;
+               ndi->ndi.reachable = nd_ifinfo[ifp->if_index].reachable;
+               ndi->ndi.retrans = nd_ifinfo[ifp->if_index].retrans;
+               ndi->ndi.flags = nd_ifinfo[ifp->if_index].flags;
+               ndi->ndi.recalctm = nd_ifinfo[ifp->if_index].recalctm;
+               ndi->ndi.chlim = nd_ifinfo[ifp->if_index].chlim;
+               ndi->ndi.receivedra = nd_ifinfo[ifp->if_index].receivedra;
                break;
        case SIOCGIFINFO_IN6:
+               if (!nd_ifinfo || i >= nd_ifinfo_indexlim) {
+                       error = EINVAL;
+                       break;
+               }
                ndi->ndi = nd_ifinfo[ifp->if_index];
                break;
        case SIOCSIFINFO_FLAGS:
                /* XXX: almost all other fields of ndi->ndi is unused */
+               if (!nd_ifinfo || i >= nd_ifinfo_indexlim) {
+                       error = EINVAL;
+                       break;
+               }
                nd_ifinfo[ifp->if_index].flags = ndi->ndi.flags;
                break;
        case SIOCSNDFLUSH_IN6:  /* XXX: the ioctl name is confusing... */
@@ -1521,15 +1492,26 @@ nd6_ioctl(cmd, data, ifp)
                /* flush all the prefix advertised by routers */
                struct nd_prefix *pr, *next;
 
-#ifdef __NetBSD__
-               s = splsoftnet();
-#else
                s = splnet();
-#endif
                for (pr = nd_prefix.lh_first; pr; pr = next) {
+                       struct in6_ifaddr *ia, *ia_next;
+
                        next = pr->ndpr_next;
-                       if (!IN6_IS_ADDR_UNSPECIFIED(&pr->ndpr_addr))
-                               in6_ifdel(pr->ndpr_ifp, &pr->ndpr_addr);
+
+                       if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
+                               continue; /* XXX */
+
+                       /* do we really have to remove addresses as well? */
+                       for (ia = in6_ifaddr; ia; ia = ia_next) {
+                               /* ia might be removed. keep the next ptr. */
+                               ia_next = ia->ia_next;
+
+                               if ((ia->ia6_flags & IN6_IFF_AUTOCONF) == 0)
+                                       continue;
+
+                               if (ia->ia6_ndpr == pr)
+                                       in6_purgeaddr(&ia->ia_ifa);
+                       }
                        prelist_remove(pr);
                }
                splx(s);
@@ -1540,11 +1522,7 @@ nd6_ioctl(cmd, data, ifp)
                /* flush all the default routers */
                struct nd_defrouter *dr, *next;
 
-#ifdef __NetBSD__
-               s = splsoftnet();
-#else
                s = splnet();
-#endif
                if ((dr = TAILQ_FIRST(&nd_defrouter)) != NULL) {
                        /*
                         * The first entry of the list may be stored in
@@ -1576,11 +1554,7 @@ nd6_ioctl(cmd, data, ifp)
                                *idp = htons(ifp->if_index);
                }
 
-#ifdef __NetBSD__
-               s = splsoftnet();
-#else
                s = splnet();
-#endif
                if ((rt = nd6_lookup(&nb_addr, 0, ifp)) == NULL) {
                        error = EINVAL;
                        splx(s);
@@ -1626,9 +1600,6 @@ nd6_cache_lladdr(ifp, from, lladdr, lladdrlen, type, code)
        int olladdr;
        int llchange;
        int newstate = 0;
-#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3) && !defined (__APPLE__)
-       long time_second = time.tv_sec;
-#endif
 
        if (!ifp)
                panic("ifp == NULL in nd6_cache_lladdr");
@@ -1659,14 +1630,18 @@ nd6_cache_lladdr(ifp, from, lladdr, lladdrlen, type, code)
 
                rt = nd6_lookup(from, 1, ifp);
                is_newentry = 1;
-       } else
+       } else {
+               /* do nothing if static ndp is set */
+               if (rt->rt_flags & RTF_STATIC)
+                       return NULL;
                is_newentry = 0;
+       }
 
        if (!rt)
                return NULL;
        if ((rt->rt_flags & (RTF_GATEWAY | RTF_LLINFO)) != RTF_LLINFO) {
 fail:
-               nd6_free(rt);
+               (void)nd6_free(rt);
                return NULL;
        }
        ln = (struct llinfo_nd6 *)rt->rt_llinfo;
@@ -1729,17 +1704,23 @@ fail:
                ln->ln_state = newstate;
 
                if (ln->ln_state == ND6_LLINFO_STALE) {
-                       rt->rt_flags &= ~RTF_REJECT;
+                       /*
+                        * XXX: since nd6_output() below will cause
+                        * state tansition to DELAY and reset the timer,
+                        * we must set the timer now, although it is actually
+                        * meaningless.
+                        */
+                       ln->ln_expire = time_second + nd6_gctimer;
+
                        if (ln->ln_hold) {
-#if OLDIP6OUTPUT
-                               (*ifp->if_output)(ifp, ln->ln_hold,
-                                                 rt_key(rt), rt);
-#else
-                               nd6_output(ifp, ln->ln_hold,
+                               /*
+                                * we assume ifp is not a p2p here, so just
+                                * set the 2nd argument as the 1st one.
+                                */
+                               nd6_output(ifp, ifp, ln->ln_hold,
                                           (struct sockaddr_in6 *)rt_key(rt),
                                           rt);
-#endif
-                               ln->ln_hold = 0;
+                               ln->ln_hold = NULL;
                        }
                } else if (ln->ln_state == ND6_LLINFO_INCOMPLETE) {
                        /* probe right away */
@@ -1789,7 +1770,6 @@ fail:
                 * If the icmp is a redirect to a better router, always set the
                 * is_router flag. Otherwise, if the entry is newly created,
                 * clear the flag. [RFC 2461, sec 8.3]
-                *
                 */
                if (code == ND_REDIRECT_ROUTER)
                        ln->ln_router = 1;
@@ -1813,39 +1793,41 @@ fail:
                break;
        }
 
+       /*
+        * When the link-layer address of a router changes, select the
+        * best router again.  In particular, when the neighbor entry is newly
+        * created, it might affect the selection policy.
+        * Question: can we restrict the first condition to the "is_newentry"
+        * case?
+        * XXX: when we hear an RA from a new router with the link-layer
+        * address option, defrouter_select() is called twice, since
+        * defrtrlist_update called the function as well.  However, I believe
+        * we can compromise the overhead, since it only happens the first
+        * time.
+        * XXX: although defrouter_select() should not have a bad effect
+        * for those are not autoconfigured hosts, we explicitly avoid such
+        * cases for safety.
+        */
+       if (do_update && ln->ln_router && !ip6_forwarding && ip6_accept_rtadv)
+               defrouter_select();
+
        return rt;
 }
 
-static void
-nd6_slowtimo_funneled(ignored_arg)
-       void    *ignored_arg;
-{
-#ifdef __APPLE__
-        boolean_t   funnel_state;
-       funnel_state = thread_funnel_set(network_flock, TRUE);
-#endif
-       nd6_slowtimo(ignored_arg);
-#ifdef __APPLE__
-        (void) thread_funnel_set(network_flock, FALSE);
-#endif
-}
 
 static void
 nd6_slowtimo(ignored_arg)
     void *ignored_arg;
 {
-       int s;
-       register int i;
-       register struct nd_ifinfo *nd6if;
+       int s = splnet();
+       int i;
+       struct nd_ifinfo *nd6if;
 
-#ifdef __NetBSD__
-       s = splsoftnet();
-#else
        s = splnet();
-#endif
-
        timeout(nd6_slowtimo_funneled, (caddr_t)0, ND6_SLOWTIMER_INTERVAL * hz);
        for (i = 1; i < if_index + 1; i++) {
+               if (!nd_ifinfo || i >= nd_ifinfo_indexlim)
+                       continue;
                nd6if = &nd_ifinfo[i];
                if (nd6if->basereachable && /* already initialized */
                    (nd6if->recalctm -= ND6_SLOWTIMER_INTERVAL) <= 0) {
@@ -1860,47 +1842,41 @@ nd6_slowtimo(ignored_arg)
                }
        }
        splx(s);
+}
 
+static void
+nd6_slowtimo_funneled(ignored_arg)
+       void    *ignored_arg;
+{
+#ifdef __APPLE__
+        boolean_t   funnel_state;
+       funnel_state = thread_funnel_set(network_flock, TRUE);
+#endif
+       nd6_slowtimo(ignored_arg);
+#ifdef __APPLE__
+        (void) thread_funnel_set(network_flock, FALSE);
+#endif
 }
 
 #define senderr(e) { error = (e); goto bad;}
 int
-nd6_output(ifp, m0, dst, rt0)
-       register struct ifnet *ifp;
+nd6_output(ifp, origifp, m0, dst, rt0)
+       struct ifnet *ifp;
+       struct ifnet *origifp;
        struct mbuf *m0;
        struct sockaddr_in6 *dst;
        struct rtentry *rt0;
 {
-       register struct mbuf *m = m0;
-       register struct rtentry *rt = rt0;
+       struct mbuf *m = m0;
+       struct rtentry *rt = rt0;
+       struct sockaddr_in6 *gw6 = NULL;
        struct llinfo_nd6 *ln = NULL;
        int error = 0;
-#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3) && !defined (__APPLE__)
-       long time_second = time.tv_sec;
-#endif
 
        if (IN6_IS_ADDR_MULTICAST(&dst->sin6_addr))
                goto sendpkt;
 
-       /*
-        * XXX: we currently do not make neighbor cache on any interface
-        * other than ARCnet, Ethernet, FDDI and GIF.
-        *
-        * draft-ietf-ngtrans-mech-04.txt says:
-        * - unidirectional tunnels needs no ND
-        */
-       switch (ifp->if_type) {
-       case IFT_ARCNET:
-       case IFT_ETHER:
-       case IFT_FDDI:
-       case IFT_GIF:           /* XXX need more cases? */
-               break;
-       default:
-               goto sendpkt;
-       }
-
-       if ((ifp->if_flags & IFF_POINTOPOINT) != 0 &&
-           (nd_ifinfo[ifp->if_index].flags & ND6_IFF_PERFORMNUD) == 0)
+       if (nd6_need_cache(ifp) == 0)
                goto sendpkt;
 
        /*
@@ -1908,45 +1884,53 @@ nd6_output(ifp, m0, dst, rt0)
         */
        if (rt) {
                if ((rt->rt_flags & RTF_UP) == 0) {
-#if __FreeBSD__ || defined (__APPLE__)
                        if ((rt0 = rt = rtalloc1((struct sockaddr *)dst, 1, 0UL)) !=
                                NULL)
-#else
-                       if ((rt0 = rt = rtalloc1((struct sockaddr *)dst, 1)) !=
-                               NULL)
-#endif
                        {
-                               rt->rt_refcnt--;
-                               if (rt->rt_ifp != ifp)
-                                       return nd6_output(ifp, m0, dst, rt); /* XXX: loop care? */
+                               rtunref(rt);
+                               if (rt->rt_ifp != ifp) {
+                                       /* XXX: loop care? */
+                                       return nd6_output(ifp, origifp, m0,
+                                                         dst, rt);
+                               }
                        } else
                                senderr(EHOSTUNREACH);
                }
+
                if (rt->rt_flags & RTF_GATEWAY) {
+                       gw6 = (struct sockaddr_in6 *)rt->rt_gateway;
+
+                       /*
+                        * We skip link-layer address resolution and NUD
+                        * if the gateway is not a neighbor from ND point
+                        * of view, regardless the value of the
+                        * nd_ifinfo.flags.
+                        * The second condition is a bit tricky: we skip
+                        * if the gateway is our own address, which is
+                        * sometimes used to install a route to a p2p link.
+                        */
+                       if (!nd6_is_addr_neighbor(gw6, ifp) ||
+                           in6ifa_ifpwithaddr(ifp, &gw6->sin6_addr)) {
+                               /*
+                                * We allow this kind of tricky route only
+                                * when the outgoing interface is p2p.
+                                * XXX: we may need a more generic rule here.
+                                */
+                               if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
+                                       senderr(EHOSTUNREACH);
+
+                               goto sendpkt;
+                       }
+
                        if (rt->rt_gwroute == 0)
                                goto lookup;
                        if (((rt = rt->rt_gwroute)->rt_flags & RTF_UP) == 0) {
                                rtfree(rt); rt = rt0;
-#if __FreeBSD__ || defined (__APPLE__)
                        lookup: rt->rt_gwroute = rtalloc1(rt->rt_gateway, 1, 0UL);
-#else
-                       lookup: rt->rt_gwroute = rtalloc1(rt->rt_gateway, 1);
-#endif
                                if ((rt = rt->rt_gwroute) == 0)
                                        senderr(EHOSTUNREACH);
-#ifdef __bsdi__
-                               /* the "G" test below also prevents rt == rt0 */
-                               if ((rt->rt_flags & RTF_GATEWAY) ||
-                                   (rt->rt_ifp != ifp)) {
-                                       rt->rt_refcnt--;
-                                       rt0->rt_gwroute = 0;
-                                       senderr(EHOSTUNREACH);
-                               }
-#endif
                        }
                }
-               if (rt->rt_flags & RTF_REJECT)
-                       senderr(rt == rt0 ? EHOSTDOWN : EHOSTUNREACH);
        }
 
        /*
@@ -1960,20 +1944,34 @@ nd6_output(ifp, m0, dst, rt0)
        if (rt && (rt->rt_flags & RTF_LLINFO) != 0)
                ln = (struct llinfo_nd6 *)rt->rt_llinfo;
        else {
-               if ((rt = nd6_lookup(&dst->sin6_addr, 1, ifp)) != NULL)
+               /*
+                * Since nd6_is_addr_neighbor() internally calls nd6_lookup(),
+                * the condition below is not very efficient. But we believe
+                * it is tolerable, because this should be a rare case.
+                */
+               if (nd6_is_addr_neighbor(dst, ifp) &&
+                   (rt = nd6_lookup(&dst->sin6_addr, 1, ifp)) != NULL)
                        ln = (struct llinfo_nd6 *)rt->rt_llinfo;
        }
        if (!ln || !rt) {
-               log(LOG_DEBUG, "nd6_output: can't allocate llinfo for %s "
-                   "(ln=%p, rt=%p)\n",
-                   ip6_sprintf(&dst->sin6_addr), ln, rt);
-               senderr(EIO);   /* XXX: good error? */
+               if ((ifp->if_flags & IFF_POINTOPOINT) == 0 &&
+                   !(nd_ifinfo[ifp->if_index].flags & ND6_IFF_PERFORMNUD)) {
+                       log(LOG_DEBUG,
+                           "nd6_output: can't allocate llinfo for %s "
+                           "(ln=%p, rt=%p)\n",
+                           ip6_sprintf(&dst->sin6_addr), ln, rt);
+                       senderr(EIO);   /* XXX: good error? */
+               }
+
+               goto sendpkt;   /* send anyway */
        }
 
        /* We don't have to do link-layer address resolution on a p2p link. */
        if ((ifp->if_flags & IFF_POINTOPOINT) != 0 &&
-           ln->ln_state < ND6_LLINFO_REACHABLE)
+           ln->ln_state < ND6_LLINFO_REACHABLE) {
                ln->ln_state = ND6_LLINFO_STALE;
+               ln->ln_expire = time_second + nd6_gctimer;
+       }
 
        /*
         * The first time we send a packet to a neighbor whose entry is
@@ -2004,14 +2002,12 @@ nd6_output(ifp, m0, dst, rt0)
         * XXX Does the code conform to rate-limiting rule?
         * (RFC 2461 7.2.2)
         */
-       if (ln->ln_state == ND6_LLINFO_WAITDELETE ||
-           ln->ln_state == ND6_LLINFO_NOSTATE)
+       if (ln->ln_state == ND6_LLINFO_NOSTATE)
                ln->ln_state = ND6_LLINFO_INCOMPLETE;
        if (ln->ln_hold)
                m_freem(ln->ln_hold);
        ln->ln_hold = m;
        if (ln->ln_expire) {
-               rt->rt_flags &= ~RTF_REJECT;
                if (ln->ln_asked < nd6_mmaxtries &&
                    ln->ln_expire < time_second) {
                        ln->ln_asked++;
@@ -2024,8 +2020,23 @@ nd6_output(ifp, m0, dst, rt0)
        
   sendpkt:
 #ifdef __APPLE__
-       return (dlil_output(ifptodlt(ifp, PF_INET6), m, rt, (struct sockaddr *)dst, 0));
+
+       /* Make sure the HW checksum flags are cleaned before sending the packet */
+
+       m->m_pkthdr.rcvif = (struct ifnet *)0;
+       m->m_pkthdr.csum_data = 0;
+       m->m_pkthdr.csum_flags = 0;
+
+       if ((ifp->if_flags & IFF_LOOPBACK) != 0) {
+               return (dlil_output(ifptodlt(origifp, PF_INET6), m, (caddr_t)rt, (struct sockaddr *)dst,0));    
+       }
+
+       return (dlil_output(ifptodlt(ifp, PF_INET6), m, (caddr_t)rt, (struct sockaddr *)dst, 0));
 #else
+       if ((ifp->if_flags & IFF_LOOPBACK) != 0) {
+               return((*ifp->if_output)(origifp, m, (struct sockaddr *)dst,
+                                        rt));
+       }
        return((*ifp->if_output)(ifp, m, (struct sockaddr *)dst, rt));
 #endif
        
@@ -2036,6 +2047,35 @@ nd6_output(ifp, m0, dst, rt0)
 }      
 #undef senderr
 
+int
+nd6_need_cache(ifp)
+       struct ifnet *ifp;
+{
+       /*
+        * XXX: we currently do not make neighbor cache on any interface
+        * other than ARCnet, Ethernet, FDDI and GIF.
+        *
+        * RFC2893 says:
+        * - unidirectional tunnels needs no ND
+        */
+       switch (ifp->if_type) {
+       case IFT_ARCNET:
+       case IFT_ETHER:
+       case IFT_FDDI:
+       case IFT_IEEE1394:
+#if IFT_L2VLAN
+       case IFT_L2VLAN:
+#endif
+#if IFT_IEEE80211
+       case IFT_IEEE80211:
+#endif
+       case IFT_GIF:           /* XXX need more cases? */
+               return(1);
+       default:
+               return(0);
+       }
+}
+
 int
 nd6_storelladdr(ifp, rt, m, dst, desten)
        struct ifnet *ifp;
@@ -2044,36 +2084,178 @@ nd6_storelladdr(ifp, rt, m, dst, desten)
        struct sockaddr *dst;
        u_char *desten;
 {
+       int i;
        struct sockaddr_dl *sdl;
 
        if (m->m_flags & M_MCAST) {
                switch (ifp->if_type) {
                case IFT_ETHER:
-               case IFT_FDDI:                  
+               case IFT_FDDI:
+#if IFT_L2VLAN
+       case IFT_L2VLAN:
+#endif
+#if IFT_IEEE80211
+               case IFT_IEEE80211:
+#endif
                        ETHER_MAP_IPV6_MULTICAST(&SIN6(dst)->sin6_addr,
                                                 desten);
                        return(1);
-                       break;
+               case IFT_IEEE1394:
+                       for (i = 0; i < ifp->if_addrlen; i++)
+                               desten[i] = ~0;
+                       return(1);
                case IFT_ARCNET:
                        *desten = 0;
                        return(1);
                default:
+                       m_freem(m);
                        return(0);
                }
        }
 
-       if (rt == NULL ||
-           rt->rt_gateway->sa_family != AF_LINK) {
+       if (rt == NULL) {
+               /* this could happen, if we could not allocate memory */
+               m_freem(m);
+               return(0);
+       }
+       if (rt->rt_gateway->sa_family != AF_LINK) {
                printf("nd6_storelladdr: something odd happens\n");
+               m_freem(m);
                return(0);
        }
        sdl = SDL(rt->rt_gateway);
        if (sdl->sdl_alen == 0) {
                /* this should be impossible, but we bark here for debugging */
                printf("nd6_storelladdr: sdl_alen == 0\n");
+               m_freem(m);
                return(0);
        }
 
        bcopy(LLADDR(sdl), desten, sdl->sdl_alen);
        return(1);
 }
+#ifndef __APPLE__
+static int nd6_sysctl_drlist SYSCTL_HANDLER_ARGS;
+static int nd6_sysctl_prlist SYSCTL_HANDLER_ARGS;
+SYSCTL_DECL(_net_inet6_icmp6);
+SYSCTL_NODE(_net_inet6_icmp6, ICMPV6CTL_ND6_DRLIST, nd6_drlist,
+       CTLFLAG_RD, nd6_sysctl_drlist, "");
+SYSCTL_NODE(_net_inet6_icmp6, ICMPV6CTL_ND6_PRLIST, nd6_prlist,
+       CTLFLAG_RD, nd6_sysctl_prlist, "");
+
+static int
+nd6_sysctl_drlist SYSCTL_HANDLER_ARGS 
+{
+       int error;
+       char buf[1024];
+       struct in6_defrouter *d, *de;
+       struct nd_defrouter *dr;
+
+       if (req->newptr)
+               return EPERM;
+       error = 0;
+
+       for (dr = TAILQ_FIRST(&nd_defrouter);
+            dr;
+            dr = TAILQ_NEXT(dr, dr_entry)) {
+               d = (struct in6_defrouter *)buf;
+               de = (struct in6_defrouter *)(buf + sizeof(buf));
+
+               if (d + 1 <= de) {
+                       bzero(d, sizeof(*d));
+                       d->rtaddr.sin6_family = AF_INET6;
+                       d->rtaddr.sin6_len = sizeof(d->rtaddr);
+                       if (in6_recoverscope(&d->rtaddr, &dr->rtaddr,
+                           dr->ifp) != 0)
+                               log(LOG_ERR,
+                                   "scope error in "
+                                   "default router list (%s)\n",
+                                   ip6_sprintf(&dr->rtaddr));
+                       d->flags = dr->flags;
+                       d->rtlifetime = dr->rtlifetime;
+                       d->expire = dr->expire;
+                       d->if_index = dr->ifp->if_index;
+               } else
+                       panic("buffer too short");
+
+               error = SYSCTL_OUT(req, buf, sizeof(*d));
+               if (error)
+                       break;
+       }
+       return error;
+}
+
+static int
+nd6_sysctl_prlist SYSCTL_HANDLER_ARGS 
+{
+       int error;
+       char buf[1024];
+       struct in6_prefix *p, *pe;
+       struct nd_prefix *pr;
+
+       if (req->newptr)
+               return EPERM;
+       error = 0;
+
+       for (pr = nd_prefix.lh_first; pr; pr = pr->ndpr_next) {
+               u_short advrtrs;
+               size_t advance;
+               struct sockaddr_in6 *sin6, *s6;
+               struct nd_pfxrouter *pfr;
+
+               p = (struct in6_prefix *)buf;
+               pe = (struct in6_prefix *)(buf + sizeof(buf));
+
+               if (p + 1 <= pe) {
+                       bzero(p, sizeof(*p));
+                       sin6 = (struct sockaddr_in6 *)(p + 1);
+
+                       p->prefix = pr->ndpr_prefix;
+                       if (in6_recoverscope(&p->prefix,
+                           &p->prefix.sin6_addr, pr->ndpr_ifp) != 0)
+                               log(LOG_ERR,
+                                   "scope error in prefix list (%s)\n",
+                                   ip6_sprintf(&p->prefix.sin6_addr));
+                       p->raflags = pr->ndpr_raf;
+                       p->prefixlen = pr->ndpr_plen;
+                       p->vltime = pr->ndpr_vltime;
+                       p->pltime = pr->ndpr_pltime;
+                       p->if_index = pr->ndpr_ifp->if_index;
+                       p->expire = pr->ndpr_expire;
+                       p->refcnt = pr->ndpr_refcnt;
+                       p->flags = pr->ndpr_stateflags;
+                       p->origin = PR_ORIG_RA;
+                       advrtrs = 0;
+                       for (pfr = pr->ndpr_advrtrs.lh_first;
+                            pfr;
+                            pfr = pfr->pfr_next) {
+                               if ((void *)&sin6[advrtrs + 1] >
+                                   (void *)pe) {
+                                       advrtrs++;
+                                       continue;
+                               }
+                               s6 = &sin6[advrtrs];
+                               bzero(s6, sizeof(*s6));
+                               s6->sin6_family = AF_INET6;
+                               s6->sin6_len = sizeof(*sin6);
+                               if (in6_recoverscope(s6,
+                                   &pfr->router->rtaddr,
+                                   pfr->router->ifp) != 0)
+                                       log(LOG_ERR,
+                                           "scope error in "
+                                           "prefix list (%s)\n",
+                                           ip6_sprintf(&pfr->router->rtaddr));
+                               advrtrs++;
+                       }
+                       p->advrtrs = advrtrs;
+               } else 
+                       panic("buffer too short");
+
+               advance = sizeof(*p) + sizeof(*sin6) * advrtrs;
+               error = SYSCTL_OUT(req, buf, advance);
+               if (error)
+                       break;
+       }
+       return error;
+}
+#endif