Home | History | Annotate | Line # | Download | only in netinet
in.c revision 1.114
      1 /*	$NetBSD: in.c,v 1.114 2006/11/13 05:13:41 dyoung Exp $	*/
      2 
      3 /*
      4  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  * 3. Neither the name of the project nor the names of its contributors
     16  *    may be used to endorse or promote products derived from this software
     17  *    without specific prior written permission.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29  * SUCH DAMAGE.
     30  */
     31 
     32 /*-
     33  * Copyright (c) 1998 The NetBSD Foundation, Inc.
     34  * All rights reserved.
     35  *
     36  * This code is derived from software contributed to The NetBSD Foundation
     37  * by Public Access Networks Corporation ("Panix").  It was developed under
     38  * contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
     39  *
     40  * Redistribution and use in source and binary forms, with or without
     41  * modification, are permitted provided that the following conditions
     42  * are met:
     43  * 1. Redistributions of source code must retain the above copyright
     44  *    notice, this list of conditions and the following disclaimer.
     45  * 2. Redistributions in binary form must reproduce the above copyright
     46  *    notice, this list of conditions and the following disclaimer in the
     47  *    documentation and/or other materials provided with the distribution.
     48  * 3. All advertising materials mentioning features or use of this software
     49  *    must display the following acknowledgement:
     50  *	This product includes software developed by the NetBSD
     51  *	Foundation, Inc. and its contributors.
     52  * 4. Neither the name of The NetBSD Foundation nor the names of its
     53  *    contributors may be used to endorse or promote products derived
     54  *    from this software without specific prior written permission.
     55  *
     56  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     57  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     58  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     59  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     60  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     61  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     62  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     63  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     64  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     65  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     66  * POSSIBILITY OF SUCH DAMAGE.
     67  */
     68 
     69 /*
     70  * Copyright (c) 1982, 1986, 1991, 1993
     71  *	The Regents of the University of California.  All rights reserved.
     72  *
     73  * Redistribution and use in source and binary forms, with or without
     74  * modification, are permitted provided that the following conditions
     75  * are met:
     76  * 1. Redistributions of source code must retain the above copyright
     77  *    notice, this list of conditions and the following disclaimer.
     78  * 2. Redistributions in binary form must reproduce the above copyright
     79  *    notice, this list of conditions and the following disclaimer in the
     80  *    documentation and/or other materials provided with the distribution.
     81  * 3. Neither the name of the University nor the names of its contributors
     82  *    may be used to endorse or promote products derived from this software
     83  *    without specific prior written permission.
     84  *
     85  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     86  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     87  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     88  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     89  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     90  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     91  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     92  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     93  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     94  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     95  * SUCH DAMAGE.
     96  *
     97  *	@(#)in.c	8.4 (Berkeley) 1/9/95
     98  */
     99 
    100 #include <sys/cdefs.h>
    101 __KERNEL_RCSID(0, "$NetBSD: in.c,v 1.114 2006/11/13 05:13:41 dyoung Exp $");
    102 
    103 #include "opt_inet.h"
    104 #include "opt_inet_conf.h"
    105 #include "opt_mrouting.h"
    106 #include "opt_pfil_hooks.h"
    107 
    108 #include <sys/param.h>
    109 #include <sys/ioctl.h>
    110 #include <sys/errno.h>
    111 #include <sys/malloc.h>
    112 #include <sys/socket.h>
    113 #include <sys/socketvar.h>
    114 #include <sys/sysctl.h>
    115 #include <sys/systm.h>
    116 #include <sys/proc.h>
    117 #include <sys/syslog.h>
    118 #include <sys/kauth.h>
    119 
    120 #include <net/if.h>
    121 #include <net/route.h>
    122 
    123 #include <net/if_ether.h>
    124 
    125 #include <netinet/in_systm.h>
    126 #include <netinet/in.h>
    127 #include <netinet/in_var.h>
    128 #include <netinet/ip.h>
    129 #include <netinet/ip_var.h>
    130 #include <netinet/in_ifattach.h>
    131 #include <netinet/in_pcb.h>
    132 #include <netinet/if_inarp.h>
    133 #include <netinet/ip_mroute.h>
    134 #include <netinet/igmp_var.h>
    135 
    136 #ifdef IPSELSRC
    137 #include <netinet/in_selsrc.h>
    138 #endif
    139 
    140 #ifdef PFIL_HOOKS
    141 #include <net/pfil.h>
    142 #endif
    143 
    144 #ifdef INET
    145 static u_int in_mask2len(struct in_addr *);
    146 static void in_len2mask(struct in_addr *, u_int);
    147 static int in_lifaddr_ioctl(struct socket *, u_long, caddr_t,
    148 	struct ifnet *, struct lwp *);
    149 
    150 static int in_ifaddrpref_ioctl(struct socket *, u_long, caddr_t,
    151 	struct ifnet *);
    152 static int in_addprefix(struct in_ifaddr *, int);
    153 static int in_scrubprefix(struct in_ifaddr *);
    154 
    155 #ifndef SUBNETSARELOCAL
    156 #define	SUBNETSARELOCAL	1
    157 #endif
    158 
    159 #ifndef HOSTZEROBROADCAST
    160 #define HOSTZEROBROADCAST 1
    161 #endif
    162 
    163 int subnetsarelocal = SUBNETSARELOCAL;
    164 int hostzeroisbroadcast = HOSTZEROBROADCAST;
    165 
    166 /*
    167  * This list is used to keep track of in_multi chains which belong to
    168  * deleted interface addresses.  We use in_ifaddr so that a chain head
    169  * won't be deallocated until all multicast address record are deleted.
    170  */
    171 static TAILQ_HEAD(, in_ifaddr) in_mk = TAILQ_HEAD_INITIALIZER(in_mk);
    172 
    173 /*
    174  * Return 1 if an internet address is for a ``local'' host
    175  * (one to which we have a connection).  If subnetsarelocal
    176  * is true, this includes other subnets of the local net.
    177  * Otherwise, it includes only the directly-connected (sub)nets.
    178  */
    179 int
    180 in_localaddr(struct in_addr in)
    181 {
    182 	struct in_ifaddr *ia;
    183 
    184 	if (subnetsarelocal) {
    185 		TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
    186 			if ((in.s_addr & ia->ia_netmask) == ia->ia_net)
    187 				return (1);
    188 	} else {
    189 		TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
    190 			if ((in.s_addr & ia->ia_subnetmask) == ia->ia_subnet)
    191 				return (1);
    192 	}
    193 	return (0);
    194 }
    195 
    196 /*
    197  * Determine whether an IP address is in a reserved set of addresses
    198  * that may not be forwarded, or whether datagrams to that destination
    199  * may be forwarded.
    200  */
    201 int
    202 in_canforward(struct in_addr in)
    203 {
    204 	u_int32_t net;
    205 
    206 	if (IN_EXPERIMENTAL(in.s_addr) || IN_MULTICAST(in.s_addr))
    207 		return (0);
    208 	if (IN_CLASSA(in.s_addr)) {
    209 		net = in.s_addr & IN_CLASSA_NET;
    210 		if (net == 0 || net == htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
    211 			return (0);
    212 	}
    213 	return (1);
    214 }
    215 
    216 /*
    217  * Trim a mask in a sockaddr
    218  */
    219 void
    220 in_socktrim(struct sockaddr_in *ap)
    221 {
    222 	char *cplim = (char *) &ap->sin_addr;
    223 	char *cp = (char *) (&ap->sin_addr + 1);
    224 
    225 	ap->sin_len = 0;
    226 	while (--cp >= cplim)
    227 		if (*cp) {
    228 			(ap)->sin_len = cp - (char *) (ap) + 1;
    229 			break;
    230 		}
    231 }
    232 
    233 /*
    234  *  Routine to take an Internet address and convert into a
    235  *  "dotted quad" representation for printing.
    236  */
    237 const char *
    238 in_fmtaddr(struct in_addr addr)
    239 {
    240 	static char buf[sizeof("123.456.789.123")];
    241 
    242 	addr.s_addr = ntohl(addr.s_addr);
    243 
    244 	snprintf(buf, sizeof(buf), "%d.%d.%d.%d",
    245 		(addr.s_addr >> 24) & 0xFF,
    246 		(addr.s_addr >> 16) & 0xFF,
    247 		(addr.s_addr >>  8) & 0xFF,
    248 		(addr.s_addr >>  0) & 0xFF);
    249 	return buf;
    250 }
    251 
    252 /*
    253  * Maintain the "in_maxmtu" variable, which is the largest
    254  * mtu for non-local interfaces with AF_INET addresses assigned
    255  * to them that are up.
    256  */
    257 unsigned long in_maxmtu;
    258 
    259 void
    260 in_setmaxmtu(void)
    261 {
    262 	struct in_ifaddr *ia;
    263 	struct ifnet *ifp;
    264 	unsigned long maxmtu = 0;
    265 
    266 	TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
    267 		if ((ifp = ia->ia_ifp) == 0)
    268 			continue;
    269 		if ((ifp->if_flags & (IFF_UP|IFF_LOOPBACK)) != IFF_UP)
    270 			continue;
    271 		if (ifp->if_mtu > maxmtu)
    272 			maxmtu = ifp->if_mtu;
    273 	}
    274 	if (maxmtu)
    275 		in_maxmtu = maxmtu;
    276 }
    277 
    278 static u_int
    279 in_mask2len(struct in_addr *mask)
    280 {
    281 	u_int x, y;
    282 	u_char *p;
    283 
    284 	p = (u_char *)mask;
    285 	for (x = 0; x < sizeof(*mask); x++) {
    286 		if (p[x] != 0xff)
    287 			break;
    288 	}
    289 	y = 0;
    290 	if (x < sizeof(*mask)) {
    291 		for (y = 0; y < 8; y++) {
    292 			if ((p[x] & (0x80 >> y)) == 0)
    293 				break;
    294 		}
    295 	}
    296 	return x * 8 + y;
    297 }
    298 
    299 static void
    300 in_len2mask(struct in_addr *mask, u_int len)
    301 {
    302 	u_int i;
    303 	u_char *p;
    304 
    305 	p = (u_char *)mask;
    306 	bzero(mask, sizeof(*mask));
    307 	for (i = 0; i < len / 8; i++)
    308 		p[i] = 0xff;
    309 	if (len % 8)
    310 		p[i] = (0xff00 >> (len % 8)) & 0xff;
    311 }
    312 
    313 /*
    314  * Generic internet control operations (ioctl's).
    315  * Ifp is 0 if not an interface-specific ioctl.
    316  */
    317 /* ARGSUSED */
    318 int
    319 in_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
    320     struct lwp *l)
    321 {
    322 	struct ifreq *ifr = (struct ifreq *)data;
    323 	struct in_ifaddr *ia = 0;
    324 	struct in_aliasreq *ifra = (struct in_aliasreq *)data;
    325 	struct sockaddr_in oldaddr;
    326 	int error, hostIsNew, maskIsNew;
    327 	int newifaddr = 0;
    328 
    329 	switch (cmd) {
    330 	case SIOCALIFADDR:
    331 	case SIOCDLIFADDR:
    332 	case SIOCSIFADDRPREF:
    333 		if (l == NULL)
    334 			return (EPERM);
    335 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
    336 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    337 		    NULL) != 0)
    338 			return (EPERM);
    339 		/*FALLTHROUGH*/
    340 	case SIOCGIFADDRPREF:
    341 	case SIOCGLIFADDR:
    342 		if (!ifp)
    343 			return EINVAL;
    344 		if (cmd == SIOCGIFADDRPREF || cmd == SIOCSIFADDRPREF)
    345 			return in_ifaddrpref_ioctl(so, cmd, data, ifp);
    346 		else
    347 			return in_lifaddr_ioctl(so, cmd, data, ifp, l);
    348 	}
    349 
    350 	/*
    351 	 * Find address for this interface, if it exists.
    352 	 */
    353 	if (ifp)
    354 		IFP_TO_IA(ifp, ia);
    355 
    356 	switch (cmd) {
    357 
    358 	case SIOCAIFADDR:
    359 	case SIOCDIFADDR:
    360 	case SIOCGIFALIAS:
    361 		if (ifra->ifra_addr.sin_family == AF_INET)
    362 			LIST_FOREACH(ia,
    363 			    &IN_IFADDR_HASH(ifra->ifra_addr.sin_addr.s_addr),
    364 			    ia_hash) {
    365 				if (ia->ia_ifp == ifp  &&
    366 				    in_hosteq(ia->ia_addr.sin_addr,
    367 				    ifra->ifra_addr.sin_addr))
    368 					break;
    369 			}
    370 		if ((cmd == SIOCDIFADDR || cmd == SIOCGIFALIAS) && ia == NULL)
    371 			return (EADDRNOTAVAIL);
    372 
    373 #if 1 /*def COMPAT_43*/
    374 		if (cmd == SIOCDIFADDR &&
    375 		    ifra->ifra_addr.sin_family == AF_UNSPEC) {
    376 			ifra->ifra_addr.sin_family = AF_INET;
    377 		}
    378 #endif
    379 		/* FALLTHROUGH */
    380 	case SIOCSIFADDR:
    381 	case SIOCSIFDSTADDR:
    382 		if (ifra->ifra_addr.sin_family != AF_INET)
    383 			return (EAFNOSUPPORT);
    384 		/* FALLTHROUGH */
    385 	case SIOCSIFNETMASK:
    386 		if (ifp == 0)
    387 			panic("in_control");
    388 
    389 		if (cmd == SIOCGIFALIAS)
    390 			break;
    391 
    392 		if (ia == NULL &&
    393 		    (cmd == SIOCSIFNETMASK || cmd == SIOCSIFDSTADDR))
    394 			return (EADDRNOTAVAIL);
    395 
    396 		if (l == NULL)
    397 			return (EPERM);
    398 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
    399 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    400 		    NULL) != 0)
    401 			return (EPERM);
    402 
    403 		if (ia == 0) {
    404 			MALLOC(ia, struct in_ifaddr *, sizeof(*ia),
    405 			       M_IFADDR, M_WAITOK);
    406 			if (ia == 0)
    407 				return (ENOBUFS);
    408 			bzero((caddr_t)ia, sizeof *ia);
    409 			TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_list);
    410 			IFAREF(&ia->ia_ifa);
    411 			TAILQ_INSERT_TAIL(&ifp->if_addrlist, &ia->ia_ifa,
    412 			    ifa_list);
    413 			IFAREF(&ia->ia_ifa);
    414 			ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
    415 			ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
    416 			ia->ia_ifa.ifa_netmask = sintosa(&ia->ia_sockmask);
    417 #ifdef IPSELSRC
    418 			ia->ia_ifa.ifa_getifa = in_getifa;
    419 #else /* IPSELSRC */
    420 			ia->ia_ifa.ifa_getifa = NULL;
    421 #endif /* IPSELSRC */
    422 			ia->ia_sockmask.sin_len = 8;
    423 			if (ifp->if_flags & IFF_BROADCAST) {
    424 				ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
    425 				ia->ia_broadaddr.sin_family = AF_INET;
    426 			}
    427 			ia->ia_ifp = ifp;
    428 			LIST_INIT(&ia->ia_multiaddrs);
    429 			newifaddr = 1;
    430 		}
    431 		break;
    432 
    433 	case SIOCSIFBRDADDR:
    434 		if (l == NULL)
    435 			return (EPERM);
    436 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
    437 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    438 		    NULL) != 0)
    439 			return (EPERM);
    440 		/* FALLTHROUGH */
    441 
    442 	case SIOCGIFADDR:
    443 	case SIOCGIFNETMASK:
    444 	case SIOCGIFDSTADDR:
    445 	case SIOCGIFBRDADDR:
    446 		if (ia == 0)
    447 			return (EADDRNOTAVAIL);
    448 		break;
    449 	}
    450 	error = 0;
    451 	switch (cmd) {
    452 
    453 	case SIOCGIFADDR:
    454 		*satosin(&ifr->ifr_addr) = ia->ia_addr;
    455 		break;
    456 
    457 	case SIOCGIFBRDADDR:
    458 		if ((ifp->if_flags & IFF_BROADCAST) == 0)
    459 			return (EINVAL);
    460 		*satosin(&ifr->ifr_dstaddr) = ia->ia_broadaddr;
    461 		break;
    462 
    463 	case SIOCGIFDSTADDR:
    464 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
    465 			return (EINVAL);
    466 		*satosin(&ifr->ifr_dstaddr) = ia->ia_dstaddr;
    467 		break;
    468 
    469 	case SIOCGIFNETMASK:
    470 		*satosin(&ifr->ifr_addr) = ia->ia_sockmask;
    471 		break;
    472 
    473 	case SIOCSIFDSTADDR:
    474 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
    475 			return (EINVAL);
    476 		oldaddr = ia->ia_dstaddr;
    477 		ia->ia_dstaddr = *satosin(&ifr->ifr_dstaddr);
    478 		if (ifp->if_ioctl && (error = (*ifp->if_ioctl)
    479 					(ifp, SIOCSIFDSTADDR, (caddr_t)ia))) {
    480 			ia->ia_dstaddr = oldaddr;
    481 			return (error);
    482 		}
    483 		if (ia->ia_flags & IFA_ROUTE) {
    484 			ia->ia_ifa.ifa_dstaddr = sintosa(&oldaddr);
    485 			rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST);
    486 			ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
    487 			rtinit(&(ia->ia_ifa), (int)RTM_ADD, RTF_HOST|RTF_UP);
    488 		}
    489 		break;
    490 
    491 	case SIOCSIFBRDADDR:
    492 		if ((ifp->if_flags & IFF_BROADCAST) == 0)
    493 			return (EINVAL);
    494 		ia->ia_broadaddr = *satosin(&ifr->ifr_broadaddr);
    495 		break;
    496 
    497 	case SIOCSIFADDR:
    498 		error = in_ifinit(ifp, ia, satosin(&ifr->ifr_addr), 1);
    499 #ifdef PFIL_HOOKS
    500 		if (!error)
    501 			(void)pfil_run_hooks(&if_pfil,
    502 			    (struct mbuf **)SIOCSIFADDR, ifp, PFIL_IFADDR);
    503 #endif
    504 		break;
    505 
    506 	case SIOCSIFNETMASK:
    507 		in_ifscrub(ifp, ia);
    508 		ia->ia_sockmask = *satosin(&ifr->ifr_addr);
    509 		ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
    510 		error = in_ifinit(ifp, ia, NULL, 0);
    511 		break;
    512 
    513 	case SIOCAIFADDR:
    514 		maskIsNew = 0;
    515 		hostIsNew = 1;
    516 		if (ia->ia_addr.sin_family == AF_INET) {
    517 			if (ifra->ifra_addr.sin_len == 0) {
    518 				ifra->ifra_addr = ia->ia_addr;
    519 				hostIsNew = 0;
    520 			} else if (in_hosteq(ia->ia_addr.sin_addr, ifra->ifra_addr.sin_addr))
    521 				hostIsNew = 0;
    522 		}
    523 		if (ifra->ifra_mask.sin_len) {
    524 			in_ifscrub(ifp, ia);
    525 			ia->ia_sockmask = ifra->ifra_mask;
    526 			ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
    527 			maskIsNew = 1;
    528 		}
    529 		if ((ifp->if_flags & IFF_POINTOPOINT) &&
    530 		    (ifra->ifra_dstaddr.sin_family == AF_INET)) {
    531 			in_ifscrub(ifp, ia);
    532 			ia->ia_dstaddr = ifra->ifra_dstaddr;
    533 			maskIsNew  = 1; /* We lie; but the effect's the same */
    534 		}
    535 		if (ifra->ifra_addr.sin_family == AF_INET &&
    536 		    (hostIsNew || maskIsNew)) {
    537 			error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0);
    538 		}
    539 		if ((ifp->if_flags & IFF_BROADCAST) &&
    540 		    (ifra->ifra_broadaddr.sin_family == AF_INET))
    541 			ia->ia_broadaddr = ifra->ifra_broadaddr;
    542 #ifdef PFIL_HOOKS
    543 		if (!error)
    544 			(void)pfil_run_hooks(&if_pfil,
    545 			    (struct mbuf **)SIOCAIFADDR, ifp, PFIL_IFADDR);
    546 #endif
    547 		break;
    548 
    549 	case SIOCGIFALIAS:
    550 		ifra->ifra_mask = ia->ia_sockmask;
    551 		if ((ifp->if_flags & IFF_POINTOPOINT) &&
    552 		    (ia->ia_dstaddr.sin_family == AF_INET))
    553 			ifra->ifra_dstaddr = ia->ia_dstaddr;
    554 		else if ((ifp->if_flags & IFF_BROADCAST) &&
    555 		    (ia->ia_broadaddr.sin_family == AF_INET))
    556 			ifra->ifra_broadaddr = ia->ia_broadaddr;
    557 		else
    558 			bzero(&ifra->ifra_broadaddr,
    559 			      sizeof(ifra->ifra_broadaddr));
    560 		break;
    561 
    562 	case SIOCDIFADDR:
    563 		in_purgeaddr(&ia->ia_ifa, ifp);
    564 #ifdef PFIL_HOOKS
    565 		(void)pfil_run_hooks(&if_pfil, (struct mbuf **)SIOCDIFADDR,
    566 		    ifp, PFIL_IFADDR);
    567 #endif
    568 		break;
    569 
    570 #ifdef MROUTING
    571 	case SIOCGETVIFCNT:
    572 	case SIOCGETSGCNT:
    573 		error = mrt_ioctl(so, cmd, data);
    574 		break;
    575 #endif /* MROUTING */
    576 
    577 	default:
    578 		if (ifp == 0 || ifp->if_ioctl == 0)
    579 			return (EOPNOTSUPP);
    580 		error = (*ifp->if_ioctl)(ifp, cmd, data);
    581 		in_setmaxmtu();
    582 		break;
    583 	}
    584 
    585 	if (error && newifaddr) {
    586 		KASSERT(ia != NULL);
    587 		in_purgeaddr(&ia->ia_ifa, ifp);
    588 	}
    589 
    590 	return error;
    591 }
    592 
    593 void
    594 in_purgeaddr(struct ifaddr *ifa, struct ifnet *ifp)
    595 {
    596 	struct in_ifaddr *ia = (void *) ifa;
    597 
    598 	in_ifscrub(ifp, ia);
    599 	LIST_REMOVE(ia, ia_hash);
    600 	TAILQ_REMOVE(&ifp->if_addrlist, &ia->ia_ifa, ifa_list);
    601 	IFAFREE(&ia->ia_ifa);
    602 	TAILQ_REMOVE(&in_ifaddrhead, ia, ia_list);
    603 	if (ia->ia_allhosts != NULL)
    604 		in_delmulti(ia->ia_allhosts);
    605 	IFAFREE(&ia->ia_ifa);
    606 	in_setmaxmtu();
    607 }
    608 
    609 void
    610 in_purgeif(struct ifnet *ifp)		/* MUST be called at splsoftnet() */
    611 {
    612 	struct ifaddr *ifa, *nifa;
    613 
    614 	for (ifa = TAILQ_FIRST(&ifp->if_addrlist); ifa != NULL; ifa = nifa) {
    615 		nifa = TAILQ_NEXT(ifa, ifa_list);
    616 		if (ifa->ifa_addr->sa_family != AF_INET)
    617 			continue;
    618 		in_purgeaddr(ifa, ifp);
    619 	}
    620 
    621 	igmp_purgeif(ifp);		/* manipulates pools */
    622 #ifdef MROUTING
    623 	ip_mrouter_detach(ifp);
    624 #endif
    625 }
    626 
    627 /*
    628  * SIOC[GAD]LIFADDR.
    629  *	SIOCGLIFADDR: get first address. (???)
    630  *	SIOCGLIFADDR with IFLR_PREFIX:
    631  *		get first address that matches the specified prefix.
    632  *	SIOCALIFADDR: add the specified address.
    633  *	SIOCALIFADDR with IFLR_PREFIX:
    634  *		EINVAL since we can't deduce hostid part of the address.
    635  *	SIOCDLIFADDR: delete the specified address.
    636  *	SIOCDLIFADDR with IFLR_PREFIX:
    637  *		delete the first address that matches the specified prefix.
    638  * return values:
    639  *	EINVAL on invalid parameters
    640  *	EADDRNOTAVAIL on prefix match failed/specified address not found
    641  *	other values may be returned from in_ioctl()
    642  */
    643 static int
    644 in_lifaddr_ioctl(struct socket *so, u_long cmd, caddr_t data,
    645     struct ifnet *ifp, struct lwp *l)
    646 {
    647 	struct if_laddrreq *iflr = (struct if_laddrreq *)data;
    648 	struct ifaddr *ifa;
    649 	struct sockaddr *sa;
    650 
    651 	/* sanity checks */
    652 	if (!data || !ifp) {
    653 		panic("invalid argument to in_lifaddr_ioctl");
    654 		/*NOTRECHED*/
    655 	}
    656 
    657 	switch (cmd) {
    658 	case SIOCGLIFADDR:
    659 		/* address must be specified on GET with IFLR_PREFIX */
    660 		if ((iflr->flags & IFLR_PREFIX) == 0)
    661 			break;
    662 		/*FALLTHROUGH*/
    663 	case SIOCALIFADDR:
    664 	case SIOCDLIFADDR:
    665 		/* address must be specified on ADD and DELETE */
    666 		sa = (struct sockaddr *)&iflr->addr;
    667 		if (sa->sa_family != AF_INET)
    668 			return EINVAL;
    669 		if (sa->sa_len != sizeof(struct sockaddr_in))
    670 			return EINVAL;
    671 		/* XXX need improvement */
    672 		sa = (struct sockaddr *)&iflr->dstaddr;
    673 		if (sa->sa_family
    674 		 && sa->sa_family != AF_INET)
    675 			return EINVAL;
    676 		if (sa->sa_len && sa->sa_len != sizeof(struct sockaddr_in))
    677 			return EINVAL;
    678 		break;
    679 	default: /*shouldn't happen*/
    680 #if 0
    681 		panic("invalid cmd to in_lifaddr_ioctl");
    682 		/*NOTREACHED*/
    683 #else
    684 		return EOPNOTSUPP;
    685 #endif
    686 	}
    687 	if (sizeof(struct in_addr) * 8 < iflr->prefixlen)
    688 		return EINVAL;
    689 
    690 	switch (cmd) {
    691 	case SIOCALIFADDR:
    692 	    {
    693 		struct in_aliasreq ifra;
    694 
    695 		if (iflr->flags & IFLR_PREFIX)
    696 			return EINVAL;
    697 
    698 		/* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR). */
    699 		bzero(&ifra, sizeof(ifra));
    700 		bcopy(iflr->iflr_name, ifra.ifra_name,
    701 			sizeof(ifra.ifra_name));
    702 
    703 		bcopy(&iflr->addr, &ifra.ifra_addr,
    704 			((struct sockaddr *)&iflr->addr)->sa_len);
    705 
    706 		if (((struct sockaddr *)&iflr->dstaddr)->sa_family) {	/*XXX*/
    707 			bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr,
    708 				((struct sockaddr *)&iflr->dstaddr)->sa_len);
    709 		}
    710 
    711 		ifra.ifra_mask.sin_family = AF_INET;
    712 		ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
    713 		in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
    714 
    715 		return in_control(so, SIOCAIFADDR, (caddr_t)&ifra, ifp, l);
    716 	    }
    717 	case SIOCGLIFADDR:
    718 	case SIOCDLIFADDR:
    719 	    {
    720 		struct in_ifaddr *ia;
    721 		struct in_addr mask, candidate, match;
    722 		struct sockaddr_in *sin;
    723 		int cmp;
    724 
    725 		bzero(&mask, sizeof(mask));
    726 		bzero(&match, sizeof(match));	/* XXX gcc */
    727 		if (iflr->flags & IFLR_PREFIX) {
    728 			/* lookup a prefix rather than address. */
    729 			in_len2mask(&mask, iflr->prefixlen);
    730 
    731 			sin = (struct sockaddr_in *)&iflr->addr;
    732 			match.s_addr = sin->sin_addr.s_addr;
    733 			match.s_addr &= mask.s_addr;
    734 
    735 			/* if you set extra bits, that's wrong */
    736 			if (match.s_addr != sin->sin_addr.s_addr)
    737 				return EINVAL;
    738 
    739 			cmp = 1;
    740 		} else {
    741 			if (cmd == SIOCGLIFADDR) {
    742 				/* on getting an address, take the 1st match */
    743 				cmp = 0;	/*XXX*/
    744 			} else {
    745 				/* on deleting an address, do exact match */
    746 				in_len2mask(&mask, 32);
    747 				sin = (struct sockaddr_in *)&iflr->addr;
    748 				match.s_addr = sin->sin_addr.s_addr;
    749 
    750 				cmp = 1;
    751 			}
    752 		}
    753 
    754 		IFADDR_FOREACH(ifa, ifp) {
    755 			if (ifa->ifa_addr->sa_family != AF_INET)
    756 				continue;
    757 			if (!cmp)
    758 				break;
    759 			candidate.s_addr = ((struct sockaddr_in *)&ifa->ifa_addr)->sin_addr.s_addr;
    760 			candidate.s_addr &= mask.s_addr;
    761 			if (candidate.s_addr == match.s_addr)
    762 				break;
    763 		}
    764 		if (!ifa)
    765 			return EADDRNOTAVAIL;
    766 		ia = (struct in_ifaddr *)ifa;
    767 
    768 		if (cmd == SIOCGLIFADDR) {
    769 			/* fill in the if_laddrreq structure */
    770 			bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin_len);
    771 
    772 			if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
    773 				bcopy(&ia->ia_dstaddr, &iflr->dstaddr,
    774 					ia->ia_dstaddr.sin_len);
    775 			} else
    776 				bzero(&iflr->dstaddr, sizeof(iflr->dstaddr));
    777 
    778 			iflr->prefixlen =
    779 				in_mask2len(&ia->ia_sockmask.sin_addr);
    780 
    781 			iflr->flags = 0;	/*XXX*/
    782 
    783 			return 0;
    784 		} else {
    785 			struct in_aliasreq ifra;
    786 
    787 			/* fill in_aliasreq and do ioctl(SIOCDIFADDR) */
    788 			bzero(&ifra, sizeof(ifra));
    789 			bcopy(iflr->iflr_name, ifra.ifra_name,
    790 				sizeof(ifra.ifra_name));
    791 
    792 			bcopy(&ia->ia_addr, &ifra.ifra_addr,
    793 				ia->ia_addr.sin_len);
    794 			if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
    795 				bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr,
    796 					ia->ia_dstaddr.sin_len);
    797 			}
    798 			bcopy(&ia->ia_sockmask, &ifra.ifra_dstaddr,
    799 				ia->ia_sockmask.sin_len);
    800 
    801 			return in_control(so, SIOCDIFADDR, (caddr_t)&ifra,
    802 				ifp, l);
    803 		}
    804 	    }
    805 	}
    806 
    807 	return EOPNOTSUPP;	/*just for safety*/
    808 }
    809 
    810 static int
    811 in_ifaddrpref_ioctl(struct socket *so __unused, u_long cmd, caddr_t data,
    812     struct ifnet *ifp)
    813 {
    814 	struct if_addrprefreq *ifap = (struct if_addrprefreq *)data;
    815 	struct ifaddr *ifa;
    816 	struct sockaddr *sa;
    817 	struct in_ifaddr *ia = NULL; /* appease gcc -Wuninitialized */
    818 	struct in_addr match;
    819 	struct sockaddr_in *sin;
    820 
    821 	/* sanity checks */
    822 	if (data == NULL || ifp == NULL) {
    823 		panic("invalid argument to %s", __func__);
    824 		/*NOTREACHED*/
    825 	}
    826 
    827 	/* address must be specified on ADD and DELETE */
    828 	sa = (struct sockaddr *)&ifap->ifap_addr;
    829 	if (sa->sa_family != AF_INET)
    830 		return EINVAL;
    831 	if (sa->sa_len != sizeof(struct sockaddr_in))
    832 		return EINVAL;
    833 
    834 	switch (cmd) {
    835 	case SIOCSIFADDRPREF:
    836 	case SIOCGIFADDRPREF:
    837 		break;
    838 	default:
    839 		return EOPNOTSUPP;
    840 	}
    841 
    842 	sin = (struct sockaddr_in *)&ifap->ifap_addr;
    843 	match.s_addr = sin->sin_addr.s_addr;
    844 
    845 	IFADDR_FOREACH(ifa, ifp) {
    846 		ia = (struct in_ifaddr *)ifa;
    847 		if (ia->ia_addr.sin_family != AF_INET)
    848 			continue;
    849 		if (ia->ia_addr.sin_addr.s_addr == match.s_addr)
    850 			break;
    851 	}
    852 	if (ifa == NULL)
    853 		return EADDRNOTAVAIL;
    854 
    855 	switch (cmd) {
    856 	case SIOCSIFADDRPREF:
    857 		ifa->ifa_preference = ifap->ifap_preference;
    858 		return 0;
    859 	case SIOCGIFADDRPREF:
    860 		/* fill in the if_laddrreq structure */
    861 		(void)memcpy(&ifap->ifap_addr, &ia->ia_addr,
    862 		    ia->ia_addr.sin_len);
    863 		ifap->ifap_preference = ifa->ifa_preference;
    864 		return 0;
    865 	default:
    866 		return EOPNOTSUPP;
    867 	}
    868 }
    869 
    870 /*
    871  * Delete any existing route for an interface.
    872  */
    873 void
    874 in_ifscrub(struct ifnet *ifp __unused, struct in_ifaddr *ia)
    875 {
    876 
    877 	in_scrubprefix(ia);
    878 }
    879 
    880 /*
    881  * Initialize an interface's internet address
    882  * and routing table entry.
    883  */
    884 int
    885 in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia,
    886     struct sockaddr_in *sin, int scrub)
    887 {
    888 	u_int32_t i;
    889 	struct sockaddr_in oldaddr;
    890 	int s = splnet(), flags = RTF_UP, error;
    891 
    892 	if (!sin)
    893 		sin = &ia->ia_addr;
    894 
    895 	/*
    896 	 * Set up new addresses.
    897 	 */
    898 	oldaddr = ia->ia_addr;
    899 	if (ia->ia_addr.sin_family == AF_INET)
    900 		LIST_REMOVE(ia, ia_hash);
    901 	ia->ia_addr = *sin;
    902 	LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
    903 
    904 	/*
    905 	 * Give the interface a chance to initialize
    906 	 * if this is its first address,
    907 	 * and to validate the address if necessary.
    908 	 */
    909 	if (ifp->if_ioctl &&
    910 	    (error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia)))
    911 		goto bad;
    912 	splx(s);
    913 	if (scrub) {
    914 		ia->ia_ifa.ifa_addr = sintosa(&oldaddr);
    915 		in_ifscrub(ifp, ia);
    916 		ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
    917 	}
    918 
    919 	i = ia->ia_addr.sin_addr.s_addr;
    920 	if (IN_CLASSA(i))
    921 		ia->ia_netmask = IN_CLASSA_NET;
    922 	else if (IN_CLASSB(i))
    923 		ia->ia_netmask = IN_CLASSB_NET;
    924 	else
    925 		ia->ia_netmask = IN_CLASSC_NET;
    926 	/*
    927 	 * The subnet mask usually includes at least the standard network part,
    928 	 * but may may be smaller in the case of supernetting.
    929 	 * If it is set, we believe it.
    930 	 */
    931 	if (ia->ia_subnetmask == 0) {
    932 		ia->ia_subnetmask = ia->ia_netmask;
    933 		ia->ia_sockmask.sin_addr.s_addr = ia->ia_subnetmask;
    934 	} else
    935 		ia->ia_netmask &= ia->ia_subnetmask;
    936 
    937 	ia->ia_net = i & ia->ia_netmask;
    938 	ia->ia_subnet = i & ia->ia_subnetmask;
    939 	in_socktrim(&ia->ia_sockmask);
    940 	/* re-calculate the "in_maxmtu" value */
    941 	in_setmaxmtu();
    942 	/*
    943 	 * Add route for the network.
    944 	 */
    945 	ia->ia_ifa.ifa_metric = ifp->if_metric;
    946 	if (ifp->if_flags & IFF_BROADCAST) {
    947 		ia->ia_broadaddr.sin_addr.s_addr =
    948 			ia->ia_subnet | ~ia->ia_subnetmask;
    949 		ia->ia_netbroadcast.s_addr =
    950 			ia->ia_net | ~ia->ia_netmask;
    951 	} else if (ifp->if_flags & IFF_LOOPBACK) {
    952 		ia->ia_dstaddr = ia->ia_addr;
    953 		flags |= RTF_HOST;
    954 	} else if (ifp->if_flags & IFF_POINTOPOINT) {
    955 		if (ia->ia_dstaddr.sin_family != AF_INET)
    956 			return (0);
    957 		flags |= RTF_HOST;
    958 	}
    959 	error = in_addprefix(ia, flags);
    960 	/*
    961 	 * If the interface supports multicast, join the "all hosts"
    962 	 * multicast group on that interface.
    963 	 */
    964 	if ((ifp->if_flags & IFF_MULTICAST) != 0 && ia->ia_allhosts == NULL) {
    965 		struct in_addr addr;
    966 
    967 		addr.s_addr = INADDR_ALLHOSTS_GROUP;
    968 		ia->ia_allhosts = in_addmulti(&addr, ifp);
    969 	}
    970 	return (error);
    971 bad:
    972 	splx(s);
    973 	LIST_REMOVE(ia, ia_hash);
    974 	ia->ia_addr = oldaddr;
    975 	if (ia->ia_addr.sin_family == AF_INET)
    976 		LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr),
    977 		    ia, ia_hash);
    978 	return (error);
    979 }
    980 
    981 #define rtinitflags(x) \
    982 	((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
    983 	    ? RTF_HOST : 0)
    984 
    985 /*
    986  * add a route to prefix ("connected route" in cisco terminology).
    987  * does nothing if there's some interface address with the same prefix already.
    988  */
    989 static int
    990 in_addprefix(struct in_ifaddr *target, int flags)
    991 {
    992 	struct in_ifaddr *ia;
    993 	struct in_addr prefix, mask, p;
    994 	int error;
    995 
    996 	if ((flags & RTF_HOST) != 0)
    997 		prefix = target->ia_dstaddr.sin_addr;
    998 	else {
    999 		prefix = target->ia_addr.sin_addr;
   1000 		mask = target->ia_sockmask.sin_addr;
   1001 		prefix.s_addr &= mask.s_addr;
   1002 	}
   1003 
   1004 	TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
   1005 		if (rtinitflags(ia))
   1006 			p = ia->ia_dstaddr.sin_addr;
   1007 		else {
   1008 			p = ia->ia_addr.sin_addr;
   1009 			p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
   1010 		}
   1011 
   1012 		if (prefix.s_addr != p.s_addr)
   1013 			continue;
   1014 
   1015 		/*
   1016 		 * if we got a matching prefix route inserted by other
   1017 		 * interface address, we don't need to bother
   1018 		 *
   1019 		 * XXX RADIX_MPATH implications here? -dyoung
   1020 		 */
   1021 		if (ia->ia_flags & IFA_ROUTE)
   1022 			return 0;
   1023 	}
   1024 
   1025 	/*
   1026 	 * noone seem to have prefix route.  insert it.
   1027 	 */
   1028 	error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
   1029 	if (!error)
   1030 		target->ia_flags |= IFA_ROUTE;
   1031 	return error;
   1032 }
   1033 
   1034 /*
   1035  * remove a route to prefix ("connected route" in cisco terminology).
   1036  * re-installs the route by using another interface address, if there's one
   1037  * with the same prefix (otherwise we lose the route mistakenly).
   1038  */
   1039 static int
   1040 in_scrubprefix(struct in_ifaddr *target)
   1041 {
   1042 	struct in_ifaddr *ia;
   1043 	struct in_addr prefix, mask, p;
   1044 	int error;
   1045 
   1046 	if ((target->ia_flags & IFA_ROUTE) == 0)
   1047 		return 0;
   1048 
   1049 	if (rtinitflags(target))
   1050 		prefix = target->ia_dstaddr.sin_addr;
   1051 	else {
   1052 		prefix = target->ia_addr.sin_addr;
   1053 		mask = target->ia_sockmask.sin_addr;
   1054 		prefix.s_addr &= mask.s_addr;
   1055 	}
   1056 
   1057 	TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
   1058 		if (rtinitflags(ia))
   1059 			p = ia->ia_dstaddr.sin_addr;
   1060 		else {
   1061 			p = ia->ia_addr.sin_addr;
   1062 			p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
   1063 		}
   1064 
   1065 		if (prefix.s_addr != p.s_addr)
   1066 			continue;
   1067 
   1068 		/*
   1069 		 * if we got a matching prefix route, move IFA_ROUTE to him
   1070 		 */
   1071 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
   1072 			rtinit(&(target->ia_ifa), (int)RTM_DELETE,
   1073 			    rtinitflags(target));
   1074 			target->ia_flags &= ~IFA_ROUTE;
   1075 
   1076 			error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
   1077 			    rtinitflags(ia) | RTF_UP);
   1078 			if (error == 0)
   1079 				ia->ia_flags |= IFA_ROUTE;
   1080 			return error;
   1081 		}
   1082 	}
   1083 
   1084 	/*
   1085 	 * noone seem to have prefix route.  remove it.
   1086 	 */
   1087 	rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
   1088 	target->ia_flags &= ~IFA_ROUTE;
   1089 	return 0;
   1090 }
   1091 
   1092 #undef rtinitflags
   1093 
   1094 /*
   1095  * Return 1 if the address might be a local broadcast address.
   1096  */
   1097 int
   1098 in_broadcast(struct in_addr in, struct ifnet *ifp)
   1099 {
   1100 	struct ifaddr *ifa;
   1101 
   1102 	if (in.s_addr == INADDR_BROADCAST ||
   1103 	    in_nullhost(in))
   1104 		return 1;
   1105 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
   1106 		return 0;
   1107 	/*
   1108 	 * Look through the list of addresses for a match
   1109 	 * with a broadcast address.
   1110 	 */
   1111 #define ia (ifatoia(ifa))
   1112 	IFADDR_FOREACH(ifa, ifp)
   1113 		if (ifa->ifa_addr->sa_family == AF_INET &&
   1114 		    !in_hosteq(in, ia->ia_addr.sin_addr) &&
   1115 		    (in_hosteq(in, ia->ia_broadaddr.sin_addr) ||
   1116 		     in_hosteq(in, ia->ia_netbroadcast) ||
   1117 		     (hostzeroisbroadcast &&
   1118 		      /*
   1119 		       * Check for old-style (host 0) broadcast.
   1120 		       */
   1121 		      (in.s_addr == ia->ia_subnet ||
   1122 		       in.s_addr == ia->ia_net))))
   1123 			return 1;
   1124 	return (0);
   1125 #undef ia
   1126 }
   1127 
   1128 /*
   1129  * Add an address to the list of IP multicast addresses for a given interface.
   1130  */
   1131 struct in_multi *
   1132 in_addmulti(struct in_addr *ap, struct ifnet *ifp)
   1133 {
   1134 	struct in_multi *inm;
   1135 	struct ifreq ifr;
   1136 	int s = splsoftnet();
   1137 
   1138 	/*
   1139 	 * See if address already in list.
   1140 	 */
   1141 	IN_LOOKUP_MULTI(*ap, ifp, inm);
   1142 	if (inm != NULL) {
   1143 		/*
   1144 		 * Found it; just increment the reference count.
   1145 		 */
   1146 		++inm->inm_refcount;
   1147 	} else {
   1148 		/*
   1149 		 * New address; allocate a new multicast record
   1150 		 * and link it into the interface's multicast list.
   1151 		 */
   1152 		inm = pool_get(&inmulti_pool, PR_NOWAIT);
   1153 		if (inm == NULL) {
   1154 			splx(s);
   1155 			return (NULL);
   1156 		}
   1157 		inm->inm_addr = *ap;
   1158 		inm->inm_ifp = ifp;
   1159 		inm->inm_refcount = 1;
   1160 		LIST_INSERT_HEAD(
   1161 		    &IN_MULTI_HASH(inm->inm_addr.s_addr, ifp),
   1162 		    inm, inm_list);
   1163 		/*
   1164 		 * Ask the network driver to update its multicast reception
   1165 		 * filter appropriately for the new address.
   1166 		 */
   1167 		satosin(&ifr.ifr_addr)->sin_len = sizeof(struct sockaddr_in);
   1168 		satosin(&ifr.ifr_addr)->sin_family = AF_INET;
   1169 		satosin(&ifr.ifr_addr)->sin_addr = *ap;
   1170 		if ((ifp->if_ioctl == NULL) ||
   1171 		    (*ifp->if_ioctl)(ifp, SIOCADDMULTI,(caddr_t)&ifr) != 0) {
   1172 			LIST_REMOVE(inm, inm_list);
   1173 			pool_put(&inmulti_pool, inm);
   1174 			splx(s);
   1175 			return (NULL);
   1176 		}
   1177 		/*
   1178 		 * Let IGMP know that we have joined a new IP multicast group.
   1179 		 */
   1180 		if (igmp_joingroup(inm) != 0) {
   1181 			LIST_REMOVE(inm, inm_list);
   1182 			pool_put(&inmulti_pool, inm);
   1183 			splx(s);
   1184 			return (NULL);
   1185 		}
   1186 		in_multientries++;
   1187 	}
   1188 	splx(s);
   1189 	return (inm);
   1190 }
   1191 
   1192 /*
   1193  * Delete a multicast address record.
   1194  */
   1195 void
   1196 in_delmulti(struct in_multi *inm)
   1197 {
   1198 	struct ifreq ifr;
   1199 	int s = splsoftnet();
   1200 
   1201 	if (--inm->inm_refcount == 0) {
   1202 		/*
   1203 		 * No remaining claims to this record; let IGMP know that
   1204 		 * we are leaving the multicast group.
   1205 		 */
   1206 		igmp_leavegroup(inm);
   1207 		/*
   1208 		 * Unlink from list.
   1209 		 */
   1210 		LIST_REMOVE(inm, inm_list);
   1211 		in_multientries--;
   1212 		/*
   1213 		 * Notify the network driver to update its multicast reception
   1214 		 * filter.
   1215 		 */
   1216 		satosin(&ifr.ifr_addr)->sin_family = AF_INET;
   1217 		satosin(&ifr.ifr_addr)->sin_addr = inm->inm_addr;
   1218 		(*inm->inm_ifp->if_ioctl)(inm->inm_ifp, SIOCDELMULTI,
   1219 							     (caddr_t)&ifr);
   1220 		pool_put(&inmulti_pool, inm);
   1221 	}
   1222 	splx(s);
   1223 }
   1224 #endif /* INET */
   1225