Home | History | Annotate | Line # | Download | only in netinet
in.c revision 1.117
      1 /*	$NetBSD: in.c,v 1.117 2007/04/15 06:15:58 dyoung Exp $	*/
      2 
      3 /*
      4  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  * 3. Neither the name of the project nor the names of its contributors
     16  *    may be used to endorse or promote products derived from this software
     17  *    without specific prior written permission.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29  * SUCH DAMAGE.
     30  */
     31 
     32 /*-
     33  * Copyright (c) 1998 The NetBSD Foundation, Inc.
     34  * All rights reserved.
     35  *
     36  * This code is derived from software contributed to The NetBSD Foundation
     37  * by Public Access Networks Corporation ("Panix").  It was developed under
     38  * contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
     39  *
     40  * Redistribution and use in source and binary forms, with or without
     41  * modification, are permitted provided that the following conditions
     42  * are met:
     43  * 1. Redistributions of source code must retain the above copyright
     44  *    notice, this list of conditions and the following disclaimer.
     45  * 2. Redistributions in binary form must reproduce the above copyright
     46  *    notice, this list of conditions and the following disclaimer in the
     47  *    documentation and/or other materials provided with the distribution.
     48  * 3. All advertising materials mentioning features or use of this software
     49  *    must display the following acknowledgement:
     50  *	This product includes software developed by the NetBSD
     51  *	Foundation, Inc. and its contributors.
     52  * 4. Neither the name of The NetBSD Foundation nor the names of its
     53  *    contributors may be used to endorse or promote products derived
     54  *    from this software without specific prior written permission.
     55  *
     56  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     57  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     58  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     59  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     60  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     61  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     62  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     63  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     64  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     65  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     66  * POSSIBILITY OF SUCH DAMAGE.
     67  */
     68 
     69 /*
     70  * Copyright (c) 1982, 1986, 1991, 1993
     71  *	The Regents of the University of California.  All rights reserved.
     72  *
     73  * Redistribution and use in source and binary forms, with or without
     74  * modification, are permitted provided that the following conditions
     75  * are met:
     76  * 1. Redistributions of source code must retain the above copyright
     77  *    notice, this list of conditions and the following disclaimer.
     78  * 2. Redistributions in binary form must reproduce the above copyright
     79  *    notice, this list of conditions and the following disclaimer in the
     80  *    documentation and/or other materials provided with the distribution.
     81  * 3. Neither the name of the University nor the names of its contributors
     82  *    may be used to endorse or promote products derived from this software
     83  *    without specific prior written permission.
     84  *
     85  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     86  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     87  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     88  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     89  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     90  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     91  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     92  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     93  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     94  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     95  * SUCH DAMAGE.
     96  *
     97  *	@(#)in.c	8.4 (Berkeley) 1/9/95
     98  */
     99 
    100 #include <sys/cdefs.h>
    101 __KERNEL_RCSID(0, "$NetBSD: in.c,v 1.117 2007/04/15 06:15:58 dyoung Exp $");
    102 
    103 #include "opt_inet.h"
    104 #include "opt_inet_conf.h"
    105 #include "opt_mrouting.h"
    106 #include "opt_pfil_hooks.h"
    107 
    108 #include <sys/param.h>
    109 #include <sys/ioctl.h>
    110 #include <sys/errno.h>
    111 #include <sys/malloc.h>
    112 #include <sys/socket.h>
    113 #include <sys/socketvar.h>
    114 #include <sys/sysctl.h>
    115 #include <sys/systm.h>
    116 #include <sys/proc.h>
    117 #include <sys/syslog.h>
    118 #include <sys/kauth.h>
    119 
    120 #include <net/if.h>
    121 #include <net/route.h>
    122 
    123 #include <net/if_ether.h>
    124 
    125 #include <netinet/in_systm.h>
    126 #include <netinet/in.h>
    127 #include <netinet/in_var.h>
    128 #include <netinet/ip.h>
    129 #include <netinet/ip_var.h>
    130 #include <netinet/in_ifattach.h>
    131 #include <netinet/in_pcb.h>
    132 #include <netinet/if_inarp.h>
    133 #include <netinet/ip_mroute.h>
    134 #include <netinet/igmp_var.h>
    135 
    136 #ifdef IPSELSRC
    137 #include <netinet/in_selsrc.h>
    138 #endif
    139 
    140 #ifdef PFIL_HOOKS
    141 #include <net/pfil.h>
    142 #endif
    143 
    144 #ifdef INET
    145 static u_int in_mask2len(struct in_addr *);
    146 static void in_len2mask(struct in_addr *, u_int);
    147 static int in_lifaddr_ioctl(struct socket *, u_long, void *,
    148 	struct ifnet *, struct lwp *);
    149 
    150 static int in_ifaddrpref_ioctl(struct socket *, u_long, void *,
    151 	struct ifnet *);
    152 static int in_addprefix(struct in_ifaddr *, int);
    153 static int in_scrubprefix(struct in_ifaddr *);
    154 
    155 #ifndef SUBNETSARELOCAL
    156 #define	SUBNETSARELOCAL	1
    157 #endif
    158 
    159 #ifndef HOSTZEROBROADCAST
    160 #define HOSTZEROBROADCAST 1
    161 #endif
    162 
    163 int subnetsarelocal = SUBNETSARELOCAL;
    164 int hostzeroisbroadcast = HOSTZEROBROADCAST;
    165 
    166 /*
    167  * This list is used to keep track of in_multi chains which belong to
    168  * deleted interface addresses.  We use in_ifaddr so that a chain head
    169  * won't be deallocated until all multicast address record are deleted.
    170  */
    171 static TAILQ_HEAD(, in_ifaddr) in_mk = TAILQ_HEAD_INITIALIZER(in_mk);
    172 
    173 /*
    174  * Return 1 if an internet address is for a ``local'' host
    175  * (one to which we have a connection).  If subnetsarelocal
    176  * is true, this includes other subnets of the local net.
    177  * Otherwise, it includes only the directly-connected (sub)nets.
    178  */
    179 int
    180 in_localaddr(struct in_addr in)
    181 {
    182 	struct in_ifaddr *ia;
    183 
    184 	if (subnetsarelocal) {
    185 		TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
    186 			if ((in.s_addr & ia->ia_netmask) == ia->ia_net)
    187 				return (1);
    188 	} else {
    189 		TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
    190 			if ((in.s_addr & ia->ia_subnetmask) == ia->ia_subnet)
    191 				return (1);
    192 	}
    193 	return (0);
    194 }
    195 
    196 /*
    197  * Determine whether an IP address is in a reserved set of addresses
    198  * that may not be forwarded, or whether datagrams to that destination
    199  * may be forwarded.
    200  */
    201 int
    202 in_canforward(struct in_addr in)
    203 {
    204 	u_int32_t net;
    205 
    206 	if (IN_EXPERIMENTAL(in.s_addr) || IN_MULTICAST(in.s_addr))
    207 		return (0);
    208 	if (IN_CLASSA(in.s_addr)) {
    209 		net = in.s_addr & IN_CLASSA_NET;
    210 		if (net == 0 || net == htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
    211 			return (0);
    212 	}
    213 	return (1);
    214 }
    215 
    216 /*
    217  * Trim a mask in a sockaddr
    218  */
    219 void
    220 in_socktrim(struct sockaddr_in *ap)
    221 {
    222 	char *cplim = (char *) &ap->sin_addr;
    223 	char *cp = (char *) (&ap->sin_addr + 1);
    224 
    225 	ap->sin_len = 0;
    226 	while (--cp >= cplim)
    227 		if (*cp) {
    228 			(ap)->sin_len = cp - (char *) (ap) + 1;
    229 			break;
    230 		}
    231 }
    232 
    233 /*
    234  *  Routine to take an Internet address and convert into a
    235  *  "dotted quad" representation for printing.
    236  */
    237 const char *
    238 in_fmtaddr(struct in_addr addr)
    239 {
    240 	static char buf[sizeof("123.456.789.123")];
    241 
    242 	addr.s_addr = ntohl(addr.s_addr);
    243 
    244 	snprintf(buf, sizeof(buf), "%d.%d.%d.%d",
    245 		(addr.s_addr >> 24) & 0xFF,
    246 		(addr.s_addr >> 16) & 0xFF,
    247 		(addr.s_addr >>  8) & 0xFF,
    248 		(addr.s_addr >>  0) & 0xFF);
    249 	return buf;
    250 }
    251 
    252 /*
    253  * Maintain the "in_maxmtu" variable, which is the largest
    254  * mtu for non-local interfaces with AF_INET addresses assigned
    255  * to them that are up.
    256  */
    257 unsigned long in_maxmtu;
    258 
    259 void
    260 in_setmaxmtu(void)
    261 {
    262 	struct in_ifaddr *ia;
    263 	struct ifnet *ifp;
    264 	unsigned long maxmtu = 0;
    265 
    266 	TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
    267 		if ((ifp = ia->ia_ifp) == 0)
    268 			continue;
    269 		if ((ifp->if_flags & (IFF_UP|IFF_LOOPBACK)) != IFF_UP)
    270 			continue;
    271 		if (ifp->if_mtu > maxmtu)
    272 			maxmtu = ifp->if_mtu;
    273 	}
    274 	if (maxmtu)
    275 		in_maxmtu = maxmtu;
    276 }
    277 
    278 static u_int
    279 in_mask2len(struct in_addr *mask)
    280 {
    281 	u_int x, y;
    282 	u_char *p;
    283 
    284 	p = (u_char *)mask;
    285 	for (x = 0; x < sizeof(*mask); x++) {
    286 		if (p[x] != 0xff)
    287 			break;
    288 	}
    289 	y = 0;
    290 	if (x < sizeof(*mask)) {
    291 		for (y = 0; y < 8; y++) {
    292 			if ((p[x] & (0x80 >> y)) == 0)
    293 				break;
    294 		}
    295 	}
    296 	return x * 8 + y;
    297 }
    298 
    299 static void
    300 in_len2mask(struct in_addr *mask, u_int len)
    301 {
    302 	u_int i;
    303 	u_char *p;
    304 
    305 	p = (u_char *)mask;
    306 	bzero(mask, sizeof(*mask));
    307 	for (i = 0; i < len / 8; i++)
    308 		p[i] = 0xff;
    309 	if (len % 8)
    310 		p[i] = (0xff00 >> (len % 8)) & 0xff;
    311 }
    312 
    313 /*
    314  * Generic internet control operations (ioctl's).
    315  * Ifp is 0 if not an interface-specific ioctl.
    316  */
    317 /* ARGSUSED */
    318 int
    319 in_control(struct socket *so, u_long cmd, void *data, struct ifnet *ifp,
    320     struct lwp *l)
    321 {
    322 	struct ifreq *ifr = (struct ifreq *)data;
    323 	struct in_ifaddr *ia = 0;
    324 	struct in_aliasreq *ifra = (struct in_aliasreq *)data;
    325 	struct sockaddr_in oldaddr;
    326 	int error, hostIsNew, maskIsNew;
    327 	int newifaddr = 0;
    328 
    329 	switch (cmd) {
    330 	case SIOCALIFADDR:
    331 	case SIOCDLIFADDR:
    332 	case SIOCSIFADDRPREF:
    333 		if (l == NULL)
    334 			return (EPERM);
    335 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
    336 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    337 		    NULL) != 0)
    338 			return (EPERM);
    339 		/*FALLTHROUGH*/
    340 	case SIOCGIFADDRPREF:
    341 	case SIOCGLIFADDR:
    342 		if (ifp == NULL)
    343 			return EINVAL;
    344 		if (cmd == SIOCGIFADDRPREF || cmd == SIOCSIFADDRPREF)
    345 			return in_ifaddrpref_ioctl(so, cmd, data, ifp);
    346 		else
    347 			return in_lifaddr_ioctl(so, cmd, data, ifp, l);
    348 	}
    349 
    350 	/*
    351 	 * Find address for this interface, if it exists.
    352 	 */
    353 	if (ifp != NULL)
    354 		IFP_TO_IA(ifp, ia);
    355 
    356 	switch (cmd) {
    357 
    358 	case SIOCAIFADDR:
    359 	case SIOCDIFADDR:
    360 	case SIOCGIFALIAS:
    361 		if (ifra->ifra_addr.sin_family == AF_INET)
    362 			LIST_FOREACH(ia,
    363 			    &IN_IFADDR_HASH(ifra->ifra_addr.sin_addr.s_addr),
    364 			    ia_hash) {
    365 				if (ia->ia_ifp == ifp &&
    366 				    in_hosteq(ia->ia_addr.sin_addr,
    367 				    ifra->ifra_addr.sin_addr))
    368 					break;
    369 			}
    370 		if ((cmd == SIOCDIFADDR || cmd == SIOCGIFALIAS) && ia == NULL)
    371 			return (EADDRNOTAVAIL);
    372 
    373 #if 1 /*def COMPAT_43*/
    374 		if (cmd == SIOCDIFADDR &&
    375 		    ifra->ifra_addr.sin_family == AF_UNSPEC) {
    376 			ifra->ifra_addr.sin_family = AF_INET;
    377 		}
    378 #endif
    379 		/* FALLTHROUGH */
    380 	case SIOCSIFADDR:
    381 	case SIOCSIFDSTADDR:
    382 		if (ifra->ifra_addr.sin_family != AF_INET)
    383 			return (EAFNOSUPPORT);
    384 		/* FALLTHROUGH */
    385 	case SIOCSIFNETMASK:
    386 		if (ifp == NULL)
    387 			panic("in_control");
    388 
    389 		if (cmd == SIOCGIFALIAS)
    390 			break;
    391 
    392 		if (ia == NULL &&
    393 		    (cmd == SIOCSIFNETMASK || cmd == SIOCSIFDSTADDR))
    394 			return (EADDRNOTAVAIL);
    395 
    396 		if (l == NULL)
    397 			return (EPERM);
    398 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
    399 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    400 		    NULL) != 0)
    401 			return (EPERM);
    402 
    403 		if (ia == 0) {
    404 			MALLOC(ia, struct in_ifaddr *, sizeof(*ia),
    405 			       M_IFADDR, M_WAITOK);
    406 			if (ia == 0)
    407 				return (ENOBUFS);
    408 			bzero((void *)ia, sizeof *ia);
    409 			TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_list);
    410 			IFAREF(&ia->ia_ifa);
    411 			TAILQ_INSERT_TAIL(&ifp->if_addrlist, &ia->ia_ifa,
    412 			    ifa_list);
    413 			IFAREF(&ia->ia_ifa);
    414 			ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
    415 			ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
    416 			ia->ia_ifa.ifa_netmask = sintosa(&ia->ia_sockmask);
    417 #ifdef IPSELSRC
    418 			ia->ia_ifa.ifa_getifa = in_getifa;
    419 #else /* IPSELSRC */
    420 			ia->ia_ifa.ifa_getifa = NULL;
    421 #endif /* IPSELSRC */
    422 			ia->ia_sockmask.sin_len = 8;
    423 			if (ifp->if_flags & IFF_BROADCAST) {
    424 				ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
    425 				ia->ia_broadaddr.sin_family = AF_INET;
    426 			}
    427 			ia->ia_ifp = ifp;
    428 			LIST_INIT(&ia->ia_multiaddrs);
    429 			newifaddr = 1;
    430 		}
    431 		break;
    432 
    433 	case SIOCSIFBRDADDR:
    434 		if (l == NULL)
    435 			return (EPERM);
    436 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
    437 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    438 		    NULL) != 0)
    439 			return (EPERM);
    440 		/* FALLTHROUGH */
    441 
    442 	case SIOCGIFADDR:
    443 	case SIOCGIFNETMASK:
    444 	case SIOCGIFDSTADDR:
    445 	case SIOCGIFBRDADDR:
    446 		if (ia == 0)
    447 			return (EADDRNOTAVAIL);
    448 		break;
    449 	}
    450 	error = 0;
    451 	switch (cmd) {
    452 
    453 	case SIOCGIFADDR:
    454 		*satosin(&ifr->ifr_addr) = ia->ia_addr;
    455 		break;
    456 
    457 	case SIOCGIFBRDADDR:
    458 		if ((ifp->if_flags & IFF_BROADCAST) == 0)
    459 			return (EINVAL);
    460 		*satosin(&ifr->ifr_dstaddr) = ia->ia_broadaddr;
    461 		break;
    462 
    463 	case SIOCGIFDSTADDR:
    464 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
    465 			return (EINVAL);
    466 		*satosin(&ifr->ifr_dstaddr) = ia->ia_dstaddr;
    467 		break;
    468 
    469 	case SIOCGIFNETMASK:
    470 		*satosin(&ifr->ifr_addr) = ia->ia_sockmask;
    471 		break;
    472 
    473 	case SIOCSIFDSTADDR:
    474 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
    475 			return (EINVAL);
    476 		oldaddr = ia->ia_dstaddr;
    477 		ia->ia_dstaddr = *satosin(&ifr->ifr_dstaddr);
    478 		if (ifp->if_ioctl != NULL &&
    479 		    (error = (*ifp->if_ioctl)(ifp, SIOCSIFDSTADDR,
    480 		                              (void *)ia)) != 0) {
    481 			ia->ia_dstaddr = oldaddr;
    482 			return error;
    483 		}
    484 		if (ia->ia_flags & IFA_ROUTE) {
    485 			ia->ia_ifa.ifa_dstaddr = sintosa(&oldaddr);
    486 			rtinit(&ia->ia_ifa, RTM_DELETE, RTF_HOST);
    487 			ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
    488 			rtinit(&ia->ia_ifa, RTM_ADD, RTF_HOST|RTF_UP);
    489 		}
    490 		break;
    491 
    492 	case SIOCSIFBRDADDR:
    493 		if ((ifp->if_flags & IFF_BROADCAST) == 0)
    494 			return EINVAL;
    495 		ia->ia_broadaddr = *satosin(&ifr->ifr_broadaddr);
    496 		break;
    497 
    498 	case SIOCSIFADDR:
    499 		error = in_ifinit(ifp, ia, satosin(&ifr->ifr_addr), 1);
    500 #ifdef PFIL_HOOKS
    501 		if (error == 0)
    502 			(void)pfil_run_hooks(&if_pfil,
    503 			    (struct mbuf **)SIOCSIFADDR, ifp, PFIL_IFADDR);
    504 #endif
    505 		break;
    506 
    507 	case SIOCSIFNETMASK:
    508 		in_ifscrub(ifp, ia);
    509 		ia->ia_sockmask = *satosin(&ifr->ifr_addr);
    510 		ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
    511 		error = in_ifinit(ifp, ia, NULL, 0);
    512 		break;
    513 
    514 	case SIOCAIFADDR:
    515 		maskIsNew = 0;
    516 		hostIsNew = 1;
    517 		if (ia->ia_addr.sin_family != AF_INET)
    518 			;
    519 		else if (ifra->ifra_addr.sin_len == 0) {
    520 			ifra->ifra_addr = ia->ia_addr;
    521 			hostIsNew = 0;
    522 		} else if (in_hosteq(ia->ia_addr.sin_addr,
    523 		           ifra->ifra_addr.sin_addr))
    524 			hostIsNew = 0;
    525 		if (ifra->ifra_mask.sin_len) {
    526 			in_ifscrub(ifp, ia);
    527 			ia->ia_sockmask = ifra->ifra_mask;
    528 			ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
    529 			maskIsNew = 1;
    530 		}
    531 		if ((ifp->if_flags & IFF_POINTOPOINT) &&
    532 		    (ifra->ifra_dstaddr.sin_family == AF_INET)) {
    533 			in_ifscrub(ifp, ia);
    534 			ia->ia_dstaddr = ifra->ifra_dstaddr;
    535 			maskIsNew  = 1; /* We lie; but the effect's the same */
    536 		}
    537 		if (ifra->ifra_addr.sin_family == AF_INET &&
    538 		    (hostIsNew || maskIsNew)) {
    539 			error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0);
    540 		}
    541 		if ((ifp->if_flags & IFF_BROADCAST) &&
    542 		    (ifra->ifra_broadaddr.sin_family == AF_INET))
    543 			ia->ia_broadaddr = ifra->ifra_broadaddr;
    544 #ifdef PFIL_HOOKS
    545 		if (error == 0)
    546 			(void)pfil_run_hooks(&if_pfil,
    547 			    (struct mbuf **)SIOCAIFADDR, ifp, PFIL_IFADDR);
    548 #endif
    549 		break;
    550 
    551 	case SIOCGIFALIAS:
    552 		ifra->ifra_mask = ia->ia_sockmask;
    553 		if ((ifp->if_flags & IFF_POINTOPOINT) &&
    554 		    (ia->ia_dstaddr.sin_family == AF_INET))
    555 			ifra->ifra_dstaddr = ia->ia_dstaddr;
    556 		else if ((ifp->if_flags & IFF_BROADCAST) &&
    557 		    (ia->ia_broadaddr.sin_family == AF_INET))
    558 			ifra->ifra_broadaddr = ia->ia_broadaddr;
    559 		else
    560 			memset(&ifra->ifra_broadaddr, 0,
    561 			      sizeof(ifra->ifra_broadaddr));
    562 		break;
    563 
    564 	case SIOCDIFADDR:
    565 		in_purgeaddr(&ia->ia_ifa, ifp);
    566 #ifdef PFIL_HOOKS
    567 		(void)pfil_run_hooks(&if_pfil, (struct mbuf **)SIOCDIFADDR,
    568 		    ifp, PFIL_IFADDR);
    569 #endif
    570 		break;
    571 
    572 #ifdef MROUTING
    573 	case SIOCGETVIFCNT:
    574 	case SIOCGETSGCNT:
    575 		error = mrt_ioctl(so, cmd, data);
    576 		break;
    577 #endif /* MROUTING */
    578 
    579 	default:
    580 		if (ifp == NULL || ifp->if_ioctl == NULL)
    581 			return EOPNOTSUPP;
    582 		error = (*ifp->if_ioctl)(ifp, cmd, data);
    583 		in_setmaxmtu();
    584 		break;
    585 	}
    586 
    587 	if (error != 0 && newifaddr) {
    588 		KASSERT(ia != NULL);
    589 		in_purgeaddr(&ia->ia_ifa, ifp);
    590 	}
    591 
    592 	return error;
    593 }
    594 
    595 void
    596 in_purgeaddr(struct ifaddr *ifa, struct ifnet *ifp)
    597 {
    598 	struct in_ifaddr *ia = (void *) ifa;
    599 
    600 	in_ifscrub(ifp, ia);
    601 	LIST_REMOVE(ia, ia_hash);
    602 	TAILQ_REMOVE(&ifp->if_addrlist, &ia->ia_ifa, ifa_list);
    603 	IFAFREE(&ia->ia_ifa);
    604 	TAILQ_REMOVE(&in_ifaddrhead, ia, ia_list);
    605 	if (ia->ia_allhosts != NULL)
    606 		in_delmulti(ia->ia_allhosts);
    607 	IFAFREE(&ia->ia_ifa);
    608 	in_setmaxmtu();
    609 }
    610 
    611 void
    612 in_purgeif(struct ifnet *ifp)		/* MUST be called at splsoftnet() */
    613 {
    614 	struct ifaddr *ifa, *nifa;
    615 
    616 	for (ifa = TAILQ_FIRST(&ifp->if_addrlist); ifa != NULL; ifa = nifa) {
    617 		nifa = TAILQ_NEXT(ifa, ifa_list);
    618 		if (ifa->ifa_addr->sa_family != AF_INET)
    619 			continue;
    620 		in_purgeaddr(ifa, ifp);
    621 	}
    622 
    623 	igmp_purgeif(ifp);		/* manipulates pools */
    624 #ifdef MROUTING
    625 	ip_mrouter_detach(ifp);
    626 #endif
    627 }
    628 
    629 /*
    630  * SIOC[GAD]LIFADDR.
    631  *	SIOCGLIFADDR: get first address. (???)
    632  *	SIOCGLIFADDR with IFLR_PREFIX:
    633  *		get first address that matches the specified prefix.
    634  *	SIOCALIFADDR: add the specified address.
    635  *	SIOCALIFADDR with IFLR_PREFIX:
    636  *		EINVAL since we can't deduce hostid part of the address.
    637  *	SIOCDLIFADDR: delete the specified address.
    638  *	SIOCDLIFADDR with IFLR_PREFIX:
    639  *		delete the first address that matches the specified prefix.
    640  * return values:
    641  *	EINVAL on invalid parameters
    642  *	EADDRNOTAVAIL on prefix match failed/specified address not found
    643  *	other values may be returned from in_ioctl()
    644  */
    645 static int
    646 in_lifaddr_ioctl(struct socket *so, u_long cmd, void *data,
    647     struct ifnet *ifp, struct lwp *l)
    648 {
    649 	struct if_laddrreq *iflr = (struct if_laddrreq *)data;
    650 	struct ifaddr *ifa;
    651 	struct sockaddr *sa;
    652 
    653 	/* sanity checks */
    654 	if (!data || !ifp) {
    655 		panic("invalid argument to in_lifaddr_ioctl");
    656 		/*NOTRECHED*/
    657 	}
    658 
    659 	switch (cmd) {
    660 	case SIOCGLIFADDR:
    661 		/* address must be specified on GET with IFLR_PREFIX */
    662 		if ((iflr->flags & IFLR_PREFIX) == 0)
    663 			break;
    664 		/*FALLTHROUGH*/
    665 	case SIOCALIFADDR:
    666 	case SIOCDLIFADDR:
    667 		/* address must be specified on ADD and DELETE */
    668 		sa = (struct sockaddr *)&iflr->addr;
    669 		if (sa->sa_family != AF_INET)
    670 			return EINVAL;
    671 		if (sa->sa_len != sizeof(struct sockaddr_in))
    672 			return EINVAL;
    673 		/* XXX need improvement */
    674 		sa = (struct sockaddr *)&iflr->dstaddr;
    675 		if (sa->sa_family
    676 		 && sa->sa_family != AF_INET)
    677 			return EINVAL;
    678 		if (sa->sa_len && sa->sa_len != sizeof(struct sockaddr_in))
    679 			return EINVAL;
    680 		break;
    681 	default: /*shouldn't happen*/
    682 #if 0
    683 		panic("invalid cmd to in_lifaddr_ioctl");
    684 		/*NOTREACHED*/
    685 #else
    686 		return EOPNOTSUPP;
    687 #endif
    688 	}
    689 	if (sizeof(struct in_addr) * 8 < iflr->prefixlen)
    690 		return EINVAL;
    691 
    692 	switch (cmd) {
    693 	case SIOCALIFADDR:
    694 	    {
    695 		struct in_aliasreq ifra;
    696 
    697 		if (iflr->flags & IFLR_PREFIX)
    698 			return EINVAL;
    699 
    700 		/* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR). */
    701 		bzero(&ifra, sizeof(ifra));
    702 		bcopy(iflr->iflr_name, ifra.ifra_name,
    703 			sizeof(ifra.ifra_name));
    704 
    705 		bcopy(&iflr->addr, &ifra.ifra_addr,
    706 			((struct sockaddr *)&iflr->addr)->sa_len);
    707 
    708 		if (((struct sockaddr *)&iflr->dstaddr)->sa_family) {	/*XXX*/
    709 			bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr,
    710 				((struct sockaddr *)&iflr->dstaddr)->sa_len);
    711 		}
    712 
    713 		ifra.ifra_mask.sin_family = AF_INET;
    714 		ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
    715 		in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
    716 
    717 		return in_control(so, SIOCAIFADDR, (void *)&ifra, ifp, l);
    718 	    }
    719 	case SIOCGLIFADDR:
    720 	case SIOCDLIFADDR:
    721 	    {
    722 		struct in_ifaddr *ia;
    723 		struct in_addr mask, candidate, match;
    724 		struct sockaddr_in *sin;
    725 		int cmp;
    726 
    727 		bzero(&mask, sizeof(mask));
    728 		bzero(&match, sizeof(match));	/* XXX gcc */
    729 		if (iflr->flags & IFLR_PREFIX) {
    730 			/* lookup a prefix rather than address. */
    731 			in_len2mask(&mask, iflr->prefixlen);
    732 
    733 			sin = (struct sockaddr_in *)&iflr->addr;
    734 			match.s_addr = sin->sin_addr.s_addr;
    735 			match.s_addr &= mask.s_addr;
    736 
    737 			/* if you set extra bits, that's wrong */
    738 			if (match.s_addr != sin->sin_addr.s_addr)
    739 				return EINVAL;
    740 
    741 			cmp = 1;
    742 		} else {
    743 			if (cmd == SIOCGLIFADDR) {
    744 				/* on getting an address, take the 1st match */
    745 				cmp = 0;	/*XXX*/
    746 			} else {
    747 				/* on deleting an address, do exact match */
    748 				in_len2mask(&mask, 32);
    749 				sin = (struct sockaddr_in *)&iflr->addr;
    750 				match.s_addr = sin->sin_addr.s_addr;
    751 
    752 				cmp = 1;
    753 			}
    754 		}
    755 
    756 		IFADDR_FOREACH(ifa, ifp) {
    757 			if (ifa->ifa_addr->sa_family != AF_INET)
    758 				continue;
    759 			if (!cmp)
    760 				break;
    761 			candidate.s_addr = ((struct sockaddr_in *)&ifa->ifa_addr)->sin_addr.s_addr;
    762 			candidate.s_addr &= mask.s_addr;
    763 			if (candidate.s_addr == match.s_addr)
    764 				break;
    765 		}
    766 		if (!ifa)
    767 			return EADDRNOTAVAIL;
    768 		ia = (struct in_ifaddr *)ifa;
    769 
    770 		if (cmd == SIOCGLIFADDR) {
    771 			/* fill in the if_laddrreq structure */
    772 			bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin_len);
    773 
    774 			if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
    775 				bcopy(&ia->ia_dstaddr, &iflr->dstaddr,
    776 					ia->ia_dstaddr.sin_len);
    777 			} else
    778 				bzero(&iflr->dstaddr, sizeof(iflr->dstaddr));
    779 
    780 			iflr->prefixlen =
    781 				in_mask2len(&ia->ia_sockmask.sin_addr);
    782 
    783 			iflr->flags = 0;	/*XXX*/
    784 
    785 			return 0;
    786 		} else {
    787 			struct in_aliasreq ifra;
    788 
    789 			/* fill in_aliasreq and do ioctl(SIOCDIFADDR) */
    790 			bzero(&ifra, sizeof(ifra));
    791 			bcopy(iflr->iflr_name, ifra.ifra_name,
    792 				sizeof(ifra.ifra_name));
    793 
    794 			bcopy(&ia->ia_addr, &ifra.ifra_addr,
    795 				ia->ia_addr.sin_len);
    796 			if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
    797 				bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr,
    798 					ia->ia_dstaddr.sin_len);
    799 			}
    800 			bcopy(&ia->ia_sockmask, &ifra.ifra_dstaddr,
    801 				ia->ia_sockmask.sin_len);
    802 
    803 			return in_control(so, SIOCDIFADDR, (void *)&ifra,
    804 				ifp, l);
    805 		}
    806 	    }
    807 	}
    808 
    809 	return EOPNOTSUPP;	/*just for safety*/
    810 }
    811 
    812 static int
    813 in_ifaddrpref_ioctl(struct socket *so, u_long cmd, void *data,
    814     struct ifnet *ifp)
    815 {
    816 	struct if_addrprefreq *ifap = (struct if_addrprefreq *)data;
    817 	struct ifaddr *ifa;
    818 	struct sockaddr *sa;
    819 	struct in_ifaddr *ia = NULL; /* appease gcc -Wuninitialized */
    820 	struct in_addr match;
    821 	struct sockaddr_in *sin;
    822 
    823 	/* sanity checks */
    824 	if (data == NULL || ifp == NULL) {
    825 		panic("invalid argument to %s", __func__);
    826 		/*NOTREACHED*/
    827 	}
    828 
    829 	/* address must be specified on ADD and DELETE */
    830 	sa = (struct sockaddr *)&ifap->ifap_addr;
    831 	if (sa->sa_family != AF_INET)
    832 		return EINVAL;
    833 	if (sa->sa_len != sizeof(struct sockaddr_in))
    834 		return EINVAL;
    835 
    836 	switch (cmd) {
    837 	case SIOCSIFADDRPREF:
    838 	case SIOCGIFADDRPREF:
    839 		break;
    840 	default:
    841 		return EOPNOTSUPP;
    842 	}
    843 
    844 	sin = (struct sockaddr_in *)&ifap->ifap_addr;
    845 	match.s_addr = sin->sin_addr.s_addr;
    846 
    847 	IFADDR_FOREACH(ifa, ifp) {
    848 		ia = (struct in_ifaddr *)ifa;
    849 		if (ia->ia_addr.sin_family != AF_INET)
    850 			continue;
    851 		if (ia->ia_addr.sin_addr.s_addr == match.s_addr)
    852 			break;
    853 	}
    854 	if (ifa == NULL)
    855 		return EADDRNOTAVAIL;
    856 
    857 	switch (cmd) {
    858 	case SIOCSIFADDRPREF:
    859 		ifa->ifa_preference = ifap->ifap_preference;
    860 		return 0;
    861 	case SIOCGIFADDRPREF:
    862 		/* fill in the if_laddrreq structure */
    863 		(void)memcpy(&ifap->ifap_addr, &ia->ia_addr,
    864 		    ia->ia_addr.sin_len);
    865 		ifap->ifap_preference = ifa->ifa_preference;
    866 		return 0;
    867 	default:
    868 		return EOPNOTSUPP;
    869 	}
    870 }
    871 
    872 /*
    873  * Delete any existing route for an interface.
    874  */
    875 void
    876 in_ifscrub(struct ifnet *ifp, struct in_ifaddr *ia)
    877 {
    878 
    879 	in_scrubprefix(ia);
    880 }
    881 
    882 /*
    883  * Initialize an interface's internet address
    884  * and routing table entry.
    885  */
    886 int
    887 in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia,
    888     struct sockaddr_in *sin, int scrub)
    889 {
    890 	u_int32_t i;
    891 	struct sockaddr_in oldaddr;
    892 	int s = splnet(), flags = RTF_UP, error;
    893 
    894 	if (!sin)
    895 		sin = &ia->ia_addr;
    896 
    897 	/*
    898 	 * Set up new addresses.
    899 	 */
    900 	oldaddr = ia->ia_addr;
    901 	if (ia->ia_addr.sin_family == AF_INET)
    902 		LIST_REMOVE(ia, ia_hash);
    903 	ia->ia_addr = *sin;
    904 	LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
    905 
    906 	/*
    907 	 * Give the interface a chance to initialize
    908 	 * if this is its first address,
    909 	 * and to validate the address if necessary.
    910 	 */
    911 	if (ifp->if_ioctl &&
    912 	    (error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (void *)ia)))
    913 		goto bad;
    914 	splx(s);
    915 	if (scrub) {
    916 		ia->ia_ifa.ifa_addr = sintosa(&oldaddr);
    917 		in_ifscrub(ifp, ia);
    918 		ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
    919 	}
    920 
    921 	i = ia->ia_addr.sin_addr.s_addr;
    922 	if (IN_CLASSA(i))
    923 		ia->ia_netmask = IN_CLASSA_NET;
    924 	else if (IN_CLASSB(i))
    925 		ia->ia_netmask = IN_CLASSB_NET;
    926 	else
    927 		ia->ia_netmask = IN_CLASSC_NET;
    928 	/*
    929 	 * The subnet mask usually includes at least the standard network part,
    930 	 * but may may be smaller in the case of supernetting.
    931 	 * If it is set, we believe it.
    932 	 */
    933 	if (ia->ia_subnetmask == 0) {
    934 		ia->ia_subnetmask = ia->ia_netmask;
    935 		ia->ia_sockmask.sin_addr.s_addr = ia->ia_subnetmask;
    936 	} else
    937 		ia->ia_netmask &= ia->ia_subnetmask;
    938 
    939 	ia->ia_net = i & ia->ia_netmask;
    940 	ia->ia_subnet = i & ia->ia_subnetmask;
    941 	in_socktrim(&ia->ia_sockmask);
    942 	/* re-calculate the "in_maxmtu" value */
    943 	in_setmaxmtu();
    944 	/*
    945 	 * Add route for the network.
    946 	 */
    947 	ia->ia_ifa.ifa_metric = ifp->if_metric;
    948 	if (ifp->if_flags & IFF_BROADCAST) {
    949 		ia->ia_broadaddr.sin_addr.s_addr =
    950 			ia->ia_subnet | ~ia->ia_subnetmask;
    951 		ia->ia_netbroadcast.s_addr =
    952 			ia->ia_net | ~ia->ia_netmask;
    953 	} else if (ifp->if_flags & IFF_LOOPBACK) {
    954 		ia->ia_dstaddr = ia->ia_addr;
    955 		flags |= RTF_HOST;
    956 	} else if (ifp->if_flags & IFF_POINTOPOINT) {
    957 		if (ia->ia_dstaddr.sin_family != AF_INET)
    958 			return (0);
    959 		flags |= RTF_HOST;
    960 	}
    961 	error = in_addprefix(ia, flags);
    962 	/*
    963 	 * If the interface supports multicast, join the "all hosts"
    964 	 * multicast group on that interface.
    965 	 */
    966 	if ((ifp->if_flags & IFF_MULTICAST) != 0 && ia->ia_allhosts == NULL) {
    967 		struct in_addr addr;
    968 
    969 		addr.s_addr = INADDR_ALLHOSTS_GROUP;
    970 		ia->ia_allhosts = in_addmulti(&addr, ifp);
    971 	}
    972 	return (error);
    973 bad:
    974 	splx(s);
    975 	LIST_REMOVE(ia, ia_hash);
    976 	ia->ia_addr = oldaddr;
    977 	if (ia->ia_addr.sin_family == AF_INET)
    978 		LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr),
    979 		    ia, ia_hash);
    980 	return (error);
    981 }
    982 
    983 #define rtinitflags(x) \
    984 	((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
    985 	    ? RTF_HOST : 0)
    986 
    987 /*
    988  * add a route to prefix ("connected route" in cisco terminology).
    989  * does nothing if there's some interface address with the same prefix already.
    990  */
    991 static int
    992 in_addprefix(struct in_ifaddr *target, int flags)
    993 {
    994 	struct in_ifaddr *ia;
    995 	struct in_addr prefix, mask, p;
    996 	int error;
    997 
    998 	if ((flags & RTF_HOST) != 0)
    999 		prefix = target->ia_dstaddr.sin_addr;
   1000 	else {
   1001 		prefix = target->ia_addr.sin_addr;
   1002 		mask = target->ia_sockmask.sin_addr;
   1003 		prefix.s_addr &= mask.s_addr;
   1004 	}
   1005 
   1006 	TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
   1007 		if (rtinitflags(ia))
   1008 			p = ia->ia_dstaddr.sin_addr;
   1009 		else {
   1010 			p = ia->ia_addr.sin_addr;
   1011 			p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
   1012 		}
   1013 
   1014 		if (prefix.s_addr != p.s_addr)
   1015 			continue;
   1016 
   1017 		/*
   1018 		 * if we got a matching prefix route inserted by other
   1019 		 * interface address, we don't need to bother
   1020 		 *
   1021 		 * XXX RADIX_MPATH implications here? -dyoung
   1022 		 */
   1023 		if (ia->ia_flags & IFA_ROUTE)
   1024 			return 0;
   1025 	}
   1026 
   1027 	/*
   1028 	 * noone seem to have prefix route.  insert it.
   1029 	 */
   1030 	error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
   1031 	if (!error)
   1032 		target->ia_flags |= IFA_ROUTE;
   1033 	return error;
   1034 }
   1035 
   1036 /*
   1037  * remove a route to prefix ("connected route" in cisco terminology).
   1038  * re-installs the route by using another interface address, if there's one
   1039  * with the same prefix (otherwise we lose the route mistakenly).
   1040  */
   1041 static int
   1042 in_scrubprefix(struct in_ifaddr *target)
   1043 {
   1044 	struct in_ifaddr *ia;
   1045 	struct in_addr prefix, mask, p;
   1046 	int error;
   1047 
   1048 	if ((target->ia_flags & IFA_ROUTE) == 0)
   1049 		return 0;
   1050 
   1051 	if (rtinitflags(target))
   1052 		prefix = target->ia_dstaddr.sin_addr;
   1053 	else {
   1054 		prefix = target->ia_addr.sin_addr;
   1055 		mask = target->ia_sockmask.sin_addr;
   1056 		prefix.s_addr &= mask.s_addr;
   1057 	}
   1058 
   1059 	TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
   1060 		if (rtinitflags(ia))
   1061 			p = ia->ia_dstaddr.sin_addr;
   1062 		else {
   1063 			p = ia->ia_addr.sin_addr;
   1064 			p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
   1065 		}
   1066 
   1067 		if (prefix.s_addr != p.s_addr)
   1068 			continue;
   1069 
   1070 		/*
   1071 		 * if we got a matching prefix route, move IFA_ROUTE to him
   1072 		 */
   1073 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
   1074 			rtinit(&(target->ia_ifa), (int)RTM_DELETE,
   1075 			    rtinitflags(target));
   1076 			target->ia_flags &= ~IFA_ROUTE;
   1077 
   1078 			error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
   1079 			    rtinitflags(ia) | RTF_UP);
   1080 			if (error == 0)
   1081 				ia->ia_flags |= IFA_ROUTE;
   1082 			return error;
   1083 		}
   1084 	}
   1085 
   1086 	/*
   1087 	 * noone seem to have prefix route.  remove it.
   1088 	 */
   1089 	rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
   1090 	target->ia_flags &= ~IFA_ROUTE;
   1091 	return 0;
   1092 }
   1093 
   1094 #undef rtinitflags
   1095 
   1096 /*
   1097  * Return 1 if the address might be a local broadcast address.
   1098  */
   1099 int
   1100 in_broadcast(struct in_addr in, struct ifnet *ifp)
   1101 {
   1102 	struct ifaddr *ifa;
   1103 
   1104 	if (in.s_addr == INADDR_BROADCAST ||
   1105 	    in_nullhost(in))
   1106 		return 1;
   1107 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
   1108 		return 0;
   1109 	/*
   1110 	 * Look through the list of addresses for a match
   1111 	 * with a broadcast address.
   1112 	 */
   1113 #define ia (ifatoia(ifa))
   1114 	IFADDR_FOREACH(ifa, ifp)
   1115 		if (ifa->ifa_addr->sa_family == AF_INET &&
   1116 		    !in_hosteq(in, ia->ia_addr.sin_addr) &&
   1117 		    (in_hosteq(in, ia->ia_broadaddr.sin_addr) ||
   1118 		     in_hosteq(in, ia->ia_netbroadcast) ||
   1119 		     (hostzeroisbroadcast &&
   1120 		      /*
   1121 		       * Check for old-style (host 0) broadcast.
   1122 		       */
   1123 		      (in.s_addr == ia->ia_subnet ||
   1124 		       in.s_addr == ia->ia_net))))
   1125 			return 1;
   1126 	return (0);
   1127 #undef ia
   1128 }
   1129 
   1130 /*
   1131  * Add an address to the list of IP multicast addresses for a given interface.
   1132  */
   1133 struct in_multi *
   1134 in_addmulti(struct in_addr *ap, struct ifnet *ifp)
   1135 {
   1136 	struct in_multi *inm;
   1137 	struct ifreq ifr;
   1138 	int s = splsoftnet();
   1139 
   1140 	/*
   1141 	 * See if address already in list.
   1142 	 */
   1143 	IN_LOOKUP_MULTI(*ap, ifp, inm);
   1144 	if (inm != NULL) {
   1145 		/*
   1146 		 * Found it; just increment the reference count.
   1147 		 */
   1148 		++inm->inm_refcount;
   1149 	} else {
   1150 		/*
   1151 		 * New address; allocate a new multicast record
   1152 		 * and link it into the interface's multicast list.
   1153 		 */
   1154 		inm = pool_get(&inmulti_pool, PR_NOWAIT);
   1155 		if (inm == NULL) {
   1156 			splx(s);
   1157 			return (NULL);
   1158 		}
   1159 		inm->inm_addr = *ap;
   1160 		inm->inm_ifp = ifp;
   1161 		inm->inm_refcount = 1;
   1162 		LIST_INSERT_HEAD(
   1163 		    &IN_MULTI_HASH(inm->inm_addr.s_addr, ifp),
   1164 		    inm, inm_list);
   1165 		/*
   1166 		 * Ask the network driver to update its multicast reception
   1167 		 * filter appropriately for the new address.
   1168 		 */
   1169 		satosin(&ifr.ifr_addr)->sin_len = sizeof(struct sockaddr_in);
   1170 		satosin(&ifr.ifr_addr)->sin_family = AF_INET;
   1171 		satosin(&ifr.ifr_addr)->sin_addr = *ap;
   1172 		if ((ifp->if_ioctl == NULL) ||
   1173 		    (*ifp->if_ioctl)(ifp, SIOCADDMULTI,(void *)&ifr) != 0) {
   1174 			LIST_REMOVE(inm, inm_list);
   1175 			pool_put(&inmulti_pool, inm);
   1176 			splx(s);
   1177 			return (NULL);
   1178 		}
   1179 		/*
   1180 		 * Let IGMP know that we have joined a new IP multicast group.
   1181 		 */
   1182 		if (igmp_joingroup(inm) != 0) {
   1183 			LIST_REMOVE(inm, inm_list);
   1184 			pool_put(&inmulti_pool, inm);
   1185 			splx(s);
   1186 			return (NULL);
   1187 		}
   1188 		in_multientries++;
   1189 	}
   1190 	splx(s);
   1191 	return (inm);
   1192 }
   1193 
   1194 /*
   1195  * Delete a multicast address record.
   1196  */
   1197 void
   1198 in_delmulti(struct in_multi *inm)
   1199 {
   1200 	struct ifreq ifr;
   1201 	int s = splsoftnet();
   1202 
   1203 	if (--inm->inm_refcount == 0) {
   1204 		/*
   1205 		 * No remaining claims to this record; let IGMP know that
   1206 		 * we are leaving the multicast group.
   1207 		 */
   1208 		igmp_leavegroup(inm);
   1209 		/*
   1210 		 * Unlink from list.
   1211 		 */
   1212 		LIST_REMOVE(inm, inm_list);
   1213 		in_multientries--;
   1214 		/*
   1215 		 * Notify the network driver to update its multicast reception
   1216 		 * filter.
   1217 		 */
   1218 		satosin(&ifr.ifr_addr)->sin_family = AF_INET;
   1219 		satosin(&ifr.ifr_addr)->sin_addr = inm->inm_addr;
   1220 		(*inm->inm_ifp->if_ioctl)(inm->inm_ifp, SIOCDELMULTI,
   1221 							     (void *)&ifr);
   1222 		pool_put(&inmulti_pool, inm);
   1223 	}
   1224 	splx(s);
   1225 }
   1226 #endif /* INET */
   1227