1c398230bSWarner Losh /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 14df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 15df8bae1dSRodney W. Grimes * without specific prior written permission. 16df8bae1dSRodney W. Grimes * 17df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27df8bae1dSRodney W. Grimes * SUCH DAMAGE. 28df8bae1dSRodney W. Grimes * 29df8bae1dSRodney W. Grimes * @(#)if_ether.c 8.1 (Berkeley) 6/10/93 30df8bae1dSRodney W. Grimes */ 31df8bae1dSRodney W. Grimes 32df8bae1dSRodney W. Grimes /* 33df8bae1dSRodney W. Grimes * Ethernet address resolution protocol. 34df8bae1dSRodney W. Grimes * TODO: 35df8bae1dSRodney W. Grimes * add "inuse/lock" bit (or ref. count) along with valid bit 36df8bae1dSRodney W. Grimes */ 37df8bae1dSRodney W. Grimes 384b421e2dSMike Silbersack #include <sys/cdefs.h> 394b421e2dSMike Silbersack __FBSDID("$FreeBSD$"); 404b421e2dSMike Silbersack 411d5e9e22SEivind Eklund #include "opt_inet.h" 421d5e9e22SEivind Eklund 43df8bae1dSRodney W. Grimes #include <sys/param.h> 44df8bae1dSRodney W. Grimes #include <sys/kernel.h> 45cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h> 46ce02431fSDoug Rabson #include <sys/queue.h> 47885f1aa4SPoul-Henning Kamp #include <sys/sysctl.h> 48885f1aa4SPoul-Henning Kamp #include <sys/systm.h> 49885f1aa4SPoul-Henning Kamp #include <sys/mbuf.h> 50885f1aa4SPoul-Henning Kamp #include <sys/malloc.h> 51de34ad3fSJulian Elischer #include <sys/proc.h> 52cc0a3c8cSAndrey V. Elsukov #include <sys/rmlock.h> 534458ac71SBruce Evans #include <sys/socket.h> 54885f1aa4SPoul-Henning Kamp #include <sys/syslog.h> 55df8bae1dSRodney W. Grimes 56df8bae1dSRodney W. Grimes #include <net/if.h> 5776039bc8SGleb Smirnoff #include <net/if_var.h> 58df8bae1dSRodney W. Grimes #include <net/if_dl.h> 59722012ccSJulian Elischer #include <net/if_types.h> 60748e0b0aSGarrett Wollman #include <net/netisr.h> 61c8f8e9c1SJulian Elischer #include <net/ethernet.h> 625736e6fbSBjoern A. Zeeb #include <net/route.h> 63530c0060SRobert Watson #include <net/vnet.h> 64df8bae1dSRodney W. Grimes 65df8bae1dSRodney W. Grimes #include <netinet/in.h> 669977be4aSAlexander V. Chernikov #include <netinet/in_fib.h> 67df8bae1dSRodney W. Grimes #include <netinet/in_var.h> 686e6b3f7cSQing Li #include <net/if_llatbl.h> 69df8bae1dSRodney W. Grimes #include <netinet/if_ether.h> 7083e521ecSBjoern A. Zeeb #ifdef INET 719963e8a5SWill Andrews #include <netinet/ip_carp.h> 729963e8a5SWill Andrews #endif 73df8bae1dSRodney W. Grimes 74aed55708SRobert Watson #include <security/mac/mac_framework.h> 75aed55708SRobert Watson 7647e8d432SGleb Smirnoff #define SIN(s) ((const struct sockaddr_in *)(s)) 77eec33ea0SAlexander V. Chernikov 78eec33ea0SAlexander V. Chernikov static struct timeval arp_lastlog; 79eec33ea0SAlexander V. Chernikov static int arp_curpps; 80eec33ea0SAlexander V. Chernikov static int arp_maxpps = 1; 81df8bae1dSRodney W. Grimes 82f8aee88fSAlexander V. Chernikov /* Simple ARP state machine */ 83f8aee88fSAlexander V. Chernikov enum arp_llinfo_state { 84f8aee88fSAlexander V. Chernikov ARP_LLINFO_INCOMPLETE = 0, /* No LLE data */ 85f8aee88fSAlexander V. Chernikov ARP_LLINFO_REACHABLE, /* LLE is valid */ 86f8aee88fSAlexander V. Chernikov ARP_LLINFO_VERIFY, /* LLE is valid, need refresh */ 87f8aee88fSAlexander V. Chernikov ARP_LLINFO_DELETED, /* LLE is deleted */ 88f8aee88fSAlexander V. Chernikov }; 89f8aee88fSAlexander V. Chernikov 90ce02431fSDoug Rabson SYSCTL_DECL(_net_link_ether); 916472ac3dSEd Schouten static SYSCTL_NODE(_net_link_ether, PF_INET, inet, CTLFLAG_RW, 0, ""); 926472ac3dSEd Schouten static SYSCTL_NODE(_net_link_ether, PF_ARP, arp, CTLFLAG_RW, 0, ""); 93df8bae1dSRodney W. Grimes 94df8bae1dSRodney W. Grimes /* timer values */ 953e288e62SDimitry Andric static VNET_DEFINE(int, arpt_keep) = (20*60); /* once resolved, good for 20 96eddfbb76SRobert Watson * minutes */ 973e288e62SDimitry Andric static VNET_DEFINE(int, arp_maxtries) = 5; 983e288e62SDimitry Andric static VNET_DEFINE(int, arp_proxyall) = 0; 993e288e62SDimitry Andric static VNET_DEFINE(int, arpt_down) = 20; /* keep incomplete entries for 10093704ac5SQing Li * 20 seconds */ 101f8aee88fSAlexander V. Chernikov static VNET_DEFINE(int, arpt_rexmit) = 1; /* retransmit arp entries, sec*/ 1025b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_DEFINE(struct arpstat, arpstat); /* ARP statistics, see if_arp.h */ 1035b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_SYSINIT(arpstat); 1045b7cb97cSAndrey V. Elsukov 1055b7cb97cSAndrey V. Elsukov #ifdef VIMAGE 1065b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_SYSUNINIT(arpstat); 1075b7cb97cSAndrey V. Elsukov #endif /* VIMAGE */ 108e162ea60SGeorge V. Neville-Neil 1093e288e62SDimitry Andric static VNET_DEFINE(int, arp_maxhold) = 1; 110*52e53e2dSSteven Hartland static VNET_DEFINE(int, arp_on_link) = 1; 111885f1aa4SPoul-Henning Kamp 1121e77c105SRobert Watson #define V_arpt_keep VNET(arpt_keep) 11393704ac5SQing Li #define V_arpt_down VNET(arpt_down) 114f8aee88fSAlexander V. Chernikov #define V_arpt_rexmit VNET(arpt_rexmit) 1151e77c105SRobert Watson #define V_arp_maxtries VNET(arp_maxtries) 1161e77c105SRobert Watson #define V_arp_proxyall VNET(arp_proxyall) 117e162ea60SGeorge V. Neville-Neil #define V_arp_maxhold VNET(arp_maxhold) 118*52e53e2dSSteven Hartland #define V_arp_on_link VNET(arp_on_link) 119885f1aa4SPoul-Henning Kamp 1206df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, max_age, CTLFLAG_VNET | CTLFLAG_RW, 121eddfbb76SRobert Watson &VNET_NAME(arpt_keep), 0, 122eddfbb76SRobert Watson "ARP entry lifetime in seconds"); 1236df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, maxtries, CTLFLAG_VNET | CTLFLAG_RW, 124eddfbb76SRobert Watson &VNET_NAME(arp_maxtries), 0, 1258b615593SMarko Zec "ARP resolution attempts before returning error"); 1266df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, proxyall, CTLFLAG_VNET | CTLFLAG_RW, 127eddfbb76SRobert Watson &VNET_NAME(arp_proxyall), 0, 1288b615593SMarko Zec "Enable proxy ARP for all suitable requests"); 1296df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, wait, CTLFLAG_VNET | CTLFLAG_RW, 130e162ea60SGeorge V. Neville-Neil &VNET_NAME(arpt_down), 0, 131e162ea60SGeorge V. Neville-Neil "Incomplete ARP entry lifetime in seconds"); 1325b7cb97cSAndrey V. Elsukov SYSCTL_VNET_PCPUSTAT(_net_link_ether_arp, OID_AUTO, stats, struct arpstat, 1335b7cb97cSAndrey V. Elsukov arpstat, "ARP statistics (struct arpstat, net/if_arp.h)"); 1346df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, maxhold, CTLFLAG_VNET | CTLFLAG_RW, 135e162ea60SGeorge V. Neville-Neil &VNET_NAME(arp_maxhold), 0, 136e162ea60SGeorge V. Neville-Neil "Number of packets to hold per ARP entry"); 137eec33ea0SAlexander V. Chernikov SYSCTL_INT(_net_link_ether_inet, OID_AUTO, max_log_per_second, 138eec33ea0SAlexander V. Chernikov CTLFLAG_RW, &arp_maxpps, 0, 139eec33ea0SAlexander V. Chernikov "Maximum number of remotely triggered ARP messages that can be " 140eec33ea0SAlexander V. Chernikov "logged per second"); 141*52e53e2dSSteven Hartland SYSCTL_INT(_net_link_ether_inet, OID_AUTO, arp_on_link, CTLFLAG_VNET | CTLFLAG_RW, 142*52e53e2dSSteven Hartland &VNET_NAME(arp_on_link), 0, 143*52e53e2dSSteven Hartland "Send gratuitous ARP's on interface link up events"); 144eec33ea0SAlexander V. Chernikov 145eec33ea0SAlexander V. Chernikov #define ARP_LOG(pri, ...) do { \ 146eec33ea0SAlexander V. Chernikov if (ppsratecheck(&arp_lastlog, &arp_curpps, arp_maxpps)) \ 147eec33ea0SAlexander V. Chernikov log((pri), "arp: " __VA_ARGS__); \ 148eec33ea0SAlexander V. Chernikov } while (0) 149eec33ea0SAlexander V. Chernikov 150885f1aa4SPoul-Henning Kamp 1514d77a549SAlfred Perlstein static void arp_init(void); 1521cafed39SJonathan Lemon static void arpintr(struct mbuf *); 1534d77a549SAlfred Perlstein static void arptimer(void *); 1541d5e9e22SEivind Eklund #ifdef INET 1554d77a549SAlfred Perlstein static void in_arpinput(struct mbuf *); 1561d5e9e22SEivind Eklund #endif 15728e82295SGarrett Wollman 158f3bfa7d1SAlexander V. Chernikov static void arp_check_update_lle(struct arphdr *ah, struct in_addr isaddr, 159f3bfa7d1SAlexander V. Chernikov struct ifnet *ifp, int bridged, struct llentry *la); 160f3bfa7d1SAlexander V. Chernikov static void arp_mark_lle_reachable(struct llentry *la); 161b13c5b5dSAlexander V. Chernikov static void arp_iflladdr(void *arg __unused, struct ifnet *ifp); 162f3bfa7d1SAlexander V. Chernikov 163b13c5b5dSAlexander V. Chernikov static eventhandler_tag iflladdr_tag; 164*52e53e2dSSteven Hartland static eventhandler_tag ifnet_link_event_tag; 165f3bfa7d1SAlexander V. Chernikov 166d4b5cae4SRobert Watson static const struct netisr_handler arp_nh = { 167d4b5cae4SRobert Watson .nh_name = "arp", 168d4b5cae4SRobert Watson .nh_handler = arpintr, 169d4b5cae4SRobert Watson .nh_proto = NETISR_ARP, 170d4b5cae4SRobert Watson .nh_policy = NETISR_POLICY_SOURCE, 171d4b5cae4SRobert Watson }; 172d4b5cae4SRobert Watson 1736e6b3f7cSQing Li /* 1746e6b3f7cSQing Li * Timeout routine. Age arp_tab entries periodically. 175df8bae1dSRodney W. Grimes */ 176df8bae1dSRodney W. Grimes static void 1771daaa65dSGleb Smirnoff arptimer(void *arg) 178df8bae1dSRodney W. Grimes { 179ea537929SGleb Smirnoff struct llentry *lle = (struct llentry *)arg; 1806e6b3f7cSQing Li struct ifnet *ifp; 181f8aee88fSAlexander V. Chernikov int r_skip_req; 182df8bae1dSRodney W. Grimes 183ea537929SGleb Smirnoff if (lle->la_flags & LLE_STATIC) { 1842575fbb8SRandall Stewart return; 1852575fbb8SRandall Stewart } 1862575fbb8SRandall Stewart LLE_WLOCK(lle); 1870447c136SAlexander V. Chernikov if (callout_pending(&lle->lle_timer)) { 1882575fbb8SRandall Stewart /* 1892575fbb8SRandall Stewart * Here we are a bit odd here in the treatment of 1902575fbb8SRandall Stewart * active/pending. If the pending bit is set, it got 1912575fbb8SRandall Stewart * rescheduled before I ran. The active 1922575fbb8SRandall Stewart * bit we ignore, since if it was stopped 1932575fbb8SRandall Stewart * in ll_tablefree() and was currently running 1942575fbb8SRandall Stewart * it would have return 0 so the code would 1952575fbb8SRandall Stewart * not have deleted it since the callout could 1962575fbb8SRandall Stewart * not be stopped so we want to go through 1972575fbb8SRandall Stewart * with the delete here now. If the callout 1982575fbb8SRandall Stewart * was restarted, the pending bit will be back on and 1992575fbb8SRandall Stewart * we just want to bail since the callout_reset would 2002575fbb8SRandall Stewart * return 1 and our reference would have been removed 2012575fbb8SRandall Stewart * by arpresolve() below. 2022575fbb8SRandall Stewart */ 203ea537929SGleb Smirnoff LLE_WUNLOCK(lle); 204ea537929SGleb Smirnoff return; 205ea537929SGleb Smirnoff } 2066e6b3f7cSQing Li ifp = lle->lle_tbl->llt_ifp; 20754fc657dSGeorge V. Neville-Neil CURVNET_SET(ifp->if_vnet); 20809fe6320SNavdeep Parhar 209f8aee88fSAlexander V. Chernikov switch (lle->ln_state) { 210f8aee88fSAlexander V. Chernikov case ARP_LLINFO_REACHABLE: 211f8aee88fSAlexander V. Chernikov 212f8aee88fSAlexander V. Chernikov /* 213f8aee88fSAlexander V. Chernikov * Expiration time is approaching. 214f8aee88fSAlexander V. Chernikov * Let's try to refresh entry if it is still 215f8aee88fSAlexander V. Chernikov * in use. 216f8aee88fSAlexander V. Chernikov * 217f8aee88fSAlexander V. Chernikov * Set r_skip_req to get feedback from 218f8aee88fSAlexander V. Chernikov * fast path. Change state and re-schedule 219f8aee88fSAlexander V. Chernikov * ourselves. 220f8aee88fSAlexander V. Chernikov */ 221f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(lle); 222f8aee88fSAlexander V. Chernikov lle->r_skip_req = 1; 223f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(lle); 224f8aee88fSAlexander V. Chernikov lle->ln_state = ARP_LLINFO_VERIFY; 225f8aee88fSAlexander V. Chernikov callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit); 226f8aee88fSAlexander V. Chernikov LLE_WUNLOCK(lle); 227f8aee88fSAlexander V. Chernikov CURVNET_RESTORE(); 228f8aee88fSAlexander V. Chernikov return; 229f8aee88fSAlexander V. Chernikov case ARP_LLINFO_VERIFY: 230f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(lle); 231f8aee88fSAlexander V. Chernikov r_skip_req = lle->r_skip_req; 232f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(lle); 233f8aee88fSAlexander V. Chernikov 234f8aee88fSAlexander V. Chernikov if (r_skip_req == 0 && lle->la_preempt > 0) { 235f8aee88fSAlexander V. Chernikov /* Entry was used, issue refresh request */ 236f8aee88fSAlexander V. Chernikov struct in_addr dst; 237f8aee88fSAlexander V. Chernikov dst = lle->r_l3addr.addr4; 238f8aee88fSAlexander V. Chernikov lle->la_preempt--; 239f8aee88fSAlexander V. Chernikov callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit); 240f8aee88fSAlexander V. Chernikov LLE_WUNLOCK(lle); 241f8aee88fSAlexander V. Chernikov arprequest(ifp, NULL, &dst, NULL); 242f8aee88fSAlexander V. Chernikov CURVNET_RESTORE(); 243f8aee88fSAlexander V. Chernikov return; 244f8aee88fSAlexander V. Chernikov } 245f8aee88fSAlexander V. Chernikov /* Nothing happened. Reschedule if not too late */ 246f8aee88fSAlexander V. Chernikov if (lle->la_expire > time_uptime) { 247f8aee88fSAlexander V. Chernikov callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit); 248f8aee88fSAlexander V. Chernikov LLE_WUNLOCK(lle); 249f8aee88fSAlexander V. Chernikov CURVNET_RESTORE(); 250f8aee88fSAlexander V. Chernikov return; 251f8aee88fSAlexander V. Chernikov } 252f8aee88fSAlexander V. Chernikov break; 253f8aee88fSAlexander V. Chernikov case ARP_LLINFO_INCOMPLETE: 254f8aee88fSAlexander V. Chernikov case ARP_LLINFO_DELETED: 255f8aee88fSAlexander V. Chernikov break; 256f8aee88fSAlexander V. Chernikov } 257f8aee88fSAlexander V. Chernikov 258e364d8c4SNavdeep Parhar if ((lle->la_flags & LLE_DELETED) == 0) { 25909fe6320SNavdeep Parhar int evt; 26009fe6320SNavdeep Parhar 26109fe6320SNavdeep Parhar if (lle->la_flags & LLE_VALID) 26209fe6320SNavdeep Parhar evt = LLENTRY_EXPIRED; 26309fe6320SNavdeep Parhar else 26409fe6320SNavdeep Parhar evt = LLENTRY_TIMEDOUT; 26509fe6320SNavdeep Parhar EVENTHANDLER_INVOKE(lle_event, lle, evt); 26609fe6320SNavdeep Parhar } 26709fe6320SNavdeep Parhar 2680447c136SAlexander V. Chernikov callout_stop(&lle->lle_timer); 269ea537929SGleb Smirnoff 270ea537929SGleb Smirnoff /* XXX: LOR avoidance. We still have ref on lle. */ 271ea537929SGleb Smirnoff LLE_WUNLOCK(lle); 272ea537929SGleb Smirnoff IF_AFDATA_LOCK(ifp); 273ea537929SGleb Smirnoff LLE_WLOCK(lle); 274ea537929SGleb Smirnoff 275b1ec2940SGleb Smirnoff /* Guard against race with other llentry_free(). */ 276b1ec2940SGleb Smirnoff if (lle->la_flags & LLE_LINKED) { 277ea537929SGleb Smirnoff LLE_REMREF(lle); 278d3cdb716SAlexander V. Chernikov lltable_unlink_entry(lle->lle_tbl, lle); 279d3cdb716SAlexander V. Chernikov } 280b1ec2940SGleb Smirnoff IF_AFDATA_UNLOCK(ifp); 281b1ec2940SGleb Smirnoff 282d3cdb716SAlexander V. Chernikov size_t pkts_dropped = llentry_free(lle); 283d3cdb716SAlexander V. Chernikov 284d3cdb716SAlexander V. Chernikov ARPSTAT_ADD(dropped, pkts_dropped); 28554fc657dSGeorge V. Neville-Neil ARPSTAT_INC(timeouts); 286b1ec2940SGleb Smirnoff 28754fc657dSGeorge V. Neville-Neil CURVNET_RESTORE(); 288df8bae1dSRodney W. Grimes } 289df8bae1dSRodney W. Grimes 290df8bae1dSRodney W. Grimes /* 291df8bae1dSRodney W. Grimes * Broadcast an ARP request. Caller specifies: 292df8bae1dSRodney W. Grimes * - arp header source ip address 293df8bae1dSRodney W. Grimes * - arp header target ip address 294df8bae1dSRodney W. Grimes * - arp header source ethernet address 295df8bae1dSRodney W. Grimes */ 2966e6b3f7cSQing Li void 29747e8d432SGleb Smirnoff arprequest(struct ifnet *ifp, const struct in_addr *sip, 29847e8d432SGleb Smirnoff const struct in_addr *tip, u_char *enaddr) 299df8bae1dSRodney W. Grimes { 300e952fa39SMatthew N. Dodd struct mbuf *m; 301e952fa39SMatthew N. Dodd struct arphdr *ah; 302df8bae1dSRodney W. Grimes struct sockaddr sa; 303aa24ae3cSGleb Smirnoff u_char *carpaddr = NULL; 304df8bae1dSRodney W. Grimes 3056e6b3f7cSQing Li if (sip == NULL) { 3066e6b3f7cSQing Li /* 3076e6b3f7cSQing Li * The caller did not supply a source address, try to find 3086e6b3f7cSQing Li * a compatible one among those assigned to this interface. 3096e6b3f7cSQing Li */ 3106e6b3f7cSQing Li struct ifaddr *ifa; 3116e6b3f7cSQing Li 312aa24ae3cSGleb Smirnoff IF_ADDR_RLOCK(ifp); 3136e6b3f7cSQing Li TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 314aa24ae3cSGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET) 3156e6b3f7cSQing Li continue; 316aa24ae3cSGleb Smirnoff 317aa24ae3cSGleb Smirnoff if (ifa->ifa_carp) { 318aa24ae3cSGleb Smirnoff if ((*carp_iamatch_p)(ifa, &carpaddr) == 0) 319aa24ae3cSGleb Smirnoff continue; 320aa24ae3cSGleb Smirnoff sip = &IA_SIN(ifa)->sin_addr; 321aa24ae3cSGleb Smirnoff } else { 322aa24ae3cSGleb Smirnoff carpaddr = NULL; 323aa24ae3cSGleb Smirnoff sip = &IA_SIN(ifa)->sin_addr; 324aa24ae3cSGleb Smirnoff } 325aa24ae3cSGleb Smirnoff 3266e6b3f7cSQing Li if (0 == ((sip->s_addr ^ tip->s_addr) & 327aa24ae3cSGleb Smirnoff IA_MASKSIN(ifa)->sin_addr.s_addr)) 3286e6b3f7cSQing Li break; /* found it. */ 3296e6b3f7cSQing Li } 330aa24ae3cSGleb Smirnoff IF_ADDR_RUNLOCK(ifp); 3316e6b3f7cSQing Li if (sip == NULL) { 3326e6b3f7cSQing Li printf("%s: cannot find matching address\n", __func__); 3336e6b3f7cSQing Li return; 3346e6b3f7cSQing Li } 3356e6b3f7cSQing Li } 336aa24ae3cSGleb Smirnoff if (enaddr == NULL) 337aa24ae3cSGleb Smirnoff enaddr = carpaddr ? carpaddr : (u_char *)IF_LLADDR(ifp); 3386e6b3f7cSQing Li 339eb1b1807SGleb Smirnoff if ((m = m_gethdr(M_NOWAIT, MT_DATA)) == NULL) 340df8bae1dSRodney W. Grimes return; 34164bf80ceSMatthew N. Dodd m->m_len = sizeof(*ah) + 2 * sizeof(struct in_addr) + 342546451a2SGleb Smirnoff 2 * ifp->if_addrlen; 34364bf80ceSMatthew N. Dodd m->m_pkthdr.len = m->m_len; 344ed6a66caSRobert Watson M_ALIGN(m, m->m_len); 34564bf80ceSMatthew N. Dodd ah = mtod(m, struct arphdr *); 34664bf80ceSMatthew N. Dodd bzero((caddr_t)ah, m->m_len); 34719527d3eSRobert Watson #ifdef MAC 348b9b0dac3SRobert Watson mac_netinet_arp_send(ifp, m); 34919527d3eSRobert Watson #endif 350322dcb8dSMax Khon ah->ar_pro = htons(ETHERTYPE_IP); 351322dcb8dSMax Khon ah->ar_hln = ifp->if_addrlen; /* hardware address length */ 352322dcb8dSMax Khon ah->ar_pln = sizeof(struct in_addr); /* protocol address length */ 353322dcb8dSMax Khon ah->ar_op = htons(ARPOP_REQUEST); 35447e8d432SGleb Smirnoff bcopy(enaddr, ar_sha(ah), ah->ar_hln); 35547e8d432SGleb Smirnoff bcopy(sip, ar_spa(ah), ah->ar_pln); 35647e8d432SGleb Smirnoff bcopy(tip, ar_tpa(ah), ah->ar_pln); 35764bf80ceSMatthew N. Dodd sa.sa_family = AF_ARP; 35864bf80ceSMatthew N. Dodd sa.sa_len = 2; 35964bf80ceSMatthew N. Dodd m->m_flags |= M_BCAST; 36086bd0491SAndre Oppermann m_clrprotoflags(m); /* Avoid confusing lower layers. */ 361279aa3d4SKip Macy (*ifp->if_output)(ifp, m, &sa, NULL); 36254fc657dSGeorge V. Neville-Neil ARPSTAT_INC(txrequests); 363df8bae1dSRodney W. Grimes } 364df8bae1dSRodney W. Grimes 365df8bae1dSRodney W. Grimes /* 366512e30efSAlexander V. Chernikov * Resolve an IP address into an ethernet address - heavy version. 367512e30efSAlexander V. Chernikov * Used internally by arpresolve(). 368512e30efSAlexander V. Chernikov * We have already checked than we can't use existing lle without 369512e30efSAlexander V. Chernikov * modification so we have to acquire LLE_EXCLUSIVE lle lock. 370cd46a114SLuigi Rizzo * 37174860d4fSAlexander V. Chernikov * On success, desten and flags are filled in and the function returns 0; 372cd46a114SLuigi Rizzo * If the packet must be held pending resolution, we return EWOULDBLOCK 373cd46a114SLuigi Rizzo * On other errors, we return the corresponding error code. 374b6ae6984SJulian Elischer * Note that m_freem() handles NULL. 375df8bae1dSRodney W. Grimes */ 376512e30efSAlexander V. Chernikov static int 377512e30efSAlexander V. Chernikov arpresolve_full(struct ifnet *ifp, int is_gw, int create, struct mbuf *m, 37874860d4fSAlexander V. Chernikov const struct sockaddr *dst, u_char *desten, uint32_t *pflags) 379df8bae1dSRodney W. Grimes { 3805a255516SAlexander V. Chernikov struct llentry *la = NULL, *la_tmp; 381e162ea60SGeorge V. Neville-Neil struct mbuf *curr = NULL; 382e162ea60SGeorge V. Neville-Neil struct mbuf *next = NULL; 383512e30efSAlexander V. Chernikov int error, renew; 384df8bae1dSRodney W. Grimes 38574860d4fSAlexander V. Chernikov if (pflags != NULL) 38674860d4fSAlexander V. Chernikov *pflags = 0; 38774860d4fSAlexander V. Chernikov 388512e30efSAlexander V. Chernikov if (create == 0) { 38900a46b31SKip Macy IF_AFDATA_RLOCK(ifp); 390512e30efSAlexander V. Chernikov la = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 39100a46b31SKip Macy IF_AFDATA_RUNLOCK(ifp); 392512e30efSAlexander V. Chernikov } 393512e30efSAlexander V. Chernikov if (la == NULL && (ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) == 0) { 3945a255516SAlexander V. Chernikov la = lltable_alloc_entry(LLTABLE(ifp), 0, dst); 3951ed7bf1eSGleb Smirnoff if (la == NULL) { 3961ed7bf1eSGleb Smirnoff log(LOG_DEBUG, 397743c072aSAlan Somers "arpresolve: can't allocate llinfo for %s on %s\n", 3985a255516SAlexander V. Chernikov inet_ntoa(SIN(dst)->sin_addr), if_name(ifp)); 3995a255516SAlexander V. Chernikov m_freem(m); 4005a255516SAlexander V. Chernikov return (EINVAL); 4015a255516SAlexander V. Chernikov } 4025a255516SAlexander V. Chernikov 4035a255516SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 4045a255516SAlexander V. Chernikov LLE_WLOCK(la); 4055a255516SAlexander V. Chernikov la_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 4065a255516SAlexander V. Chernikov /* Prefer ANY existing lle over newly-created one */ 4075a255516SAlexander V. Chernikov if (la_tmp == NULL) 4085a255516SAlexander V. Chernikov lltable_link_entry(LLTABLE(ifp), la); 4095a255516SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 4105a255516SAlexander V. Chernikov if (la_tmp != NULL) { 4115a255516SAlexander V. Chernikov lltable_free_entry(LLTABLE(ifp), la); 4125a255516SAlexander V. Chernikov la = la_tmp; 4135a255516SAlexander V. Chernikov } 4145a255516SAlexander V. Chernikov } 4155a255516SAlexander V. Chernikov if (la == NULL) { 4161ed7bf1eSGleb Smirnoff m_freem(m); 4176e6b3f7cSQing Li return (EINVAL); 4181ed7bf1eSGleb Smirnoff } 419a20e2538SGleb Smirnoff 4206e6b3f7cSQing Li if ((la->la_flags & LLE_VALID) && 421a98c06f1SGleb Smirnoff ((la->la_flags & LLE_STATIC) || la->la_expire > time_uptime)) { 4226e6b3f7cSQing Li bcopy(&la->ll_addr, desten, ifp->if_addrlen); 423f8aee88fSAlexander V. Chernikov 424f8aee88fSAlexander V. Chernikov /* Check if we have feedback request from arptimer() */ 425f8aee88fSAlexander V. Chernikov if (la->r_skip_req != 0) { 426f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(la); 427f8aee88fSAlexander V. Chernikov la->r_skip_req = 0; /* Notify that entry was used */ 428f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(la); 429f0f3379eSOrion Hodson } 43074860d4fSAlexander V. Chernikov if (pflags != NULL) 431f8aee88fSAlexander V. Chernikov *pflags = la->la_flags & (LLE_VALID|LLE_IFADDR); 432f0516b3cSErmal Luçi LLE_WUNLOCK(la); 433f0516b3cSErmal Luçi return (0); 434df8bae1dSRodney W. Grimes } 4356e6b3f7cSQing Li 436a98c06f1SGleb Smirnoff renew = (la->la_asked == 0 || la->la_expire != time_uptime); 43708aadfbbSJonathan Lemon /* 438df8bae1dSRodney W. Grimes * There is an arptab entry, but no ethernet address 439e162ea60SGeorge V. Neville-Neil * response yet. Add the mbuf to the list, dropping 440e162ea60SGeorge V. Neville-Neil * the oldest packet if we have exceeded the system 441e162ea60SGeorge V. Neville-Neil * setting. 442df8bae1dSRodney W. Grimes */ 4436e6b3f7cSQing Li if (m != NULL) { 444e162ea60SGeorge V. Neville-Neil if (la->la_numheld >= V_arp_maxhold) { 44554fc657dSGeorge V. Neville-Neil if (la->la_hold != NULL) { 446e162ea60SGeorge V. Neville-Neil next = la->la_hold->m_nextpkt; 447df8bae1dSRodney W. Grimes m_freem(la->la_hold); 448e162ea60SGeorge V. Neville-Neil la->la_hold = next; 449e162ea60SGeorge V. Neville-Neil la->la_numheld--; 45054fc657dSGeorge V. Neville-Neil ARPSTAT_INC(dropped); 45154fc657dSGeorge V. Neville-Neil } 452e162ea60SGeorge V. Neville-Neil } 453e162ea60SGeorge V. Neville-Neil if (la->la_hold != NULL) { 454e162ea60SGeorge V. Neville-Neil curr = la->la_hold; 455e162ea60SGeorge V. Neville-Neil while (curr->m_nextpkt != NULL) 456e162ea60SGeorge V. Neville-Neil curr = curr->m_nextpkt; 457e162ea60SGeorge V. Neville-Neil curr->m_nextpkt = m; 458e162ea60SGeorge V. Neville-Neil } else 459df8bae1dSRodney W. Grimes la->la_hold = m; 460e162ea60SGeorge V. Neville-Neil la->la_numheld++; 4616e6b3f7cSQing Li } 462e1ff74c5SGleb Smirnoff /* 463e1ff74c5SGleb Smirnoff * Return EWOULDBLOCK if we have tried less than arp_maxtries. It 464e1ff74c5SGleb Smirnoff * will be masked by ether_output(). Return EHOSTDOWN/EHOSTUNREACH 465e1ff74c5SGleb Smirnoff * if we have already sent arp_maxtries ARP requests. Retransmit the 466e1ff74c5SGleb Smirnoff * ARP request, but not faster than one request per second. 467e1ff74c5SGleb Smirnoff */ 468603724d3SBjoern A. Zeeb if (la->la_asked < V_arp_maxtries) 469e1ff74c5SGleb Smirnoff error = EWOULDBLOCK; /* First request. */ 470e1ff74c5SGleb Smirnoff else 47174860d4fSAlexander V. Chernikov error = is_gw != 0 ? EHOSTUNREACH : EHOSTDOWN; 472e1ff74c5SGleb Smirnoff 4736e6b3f7cSQing Li if (renew) { 474becba438SBjoern A. Zeeb int canceled; 475becba438SBjoern A. Zeeb 4766e6b3f7cSQing Li LLE_ADDREF(la); 477a98c06f1SGleb Smirnoff la->la_expire = time_uptime; 4780447c136SAlexander V. Chernikov canceled = callout_reset(&la->lle_timer, hz * V_arpt_down, 479becba438SBjoern A. Zeeb arptimer, la); 480becba438SBjoern A. Zeeb if (canceled) 481becba438SBjoern A. Zeeb LLE_REMREF(la); 48295ebcabeSMaxim Konovalov la->la_asked++; 4836e6b3f7cSQing Li LLE_WUNLOCK(la); 484aa24ae3cSGleb Smirnoff arprequest(ifp, NULL, &SIN(dst)->sin_addr, NULL); 4856e6b3f7cSQing Li return (error); 4866e6b3f7cSQing Li } 487512e30efSAlexander V. Chernikov 4886e6b3f7cSQing Li LLE_WUNLOCK(la); 489e1ff74c5SGleb Smirnoff return (error); 490df8bae1dSRodney W. Grimes } 491df8bae1dSRodney W. Grimes 492df8bae1dSRodney W. Grimes /* 493512e30efSAlexander V. Chernikov * Resolve an IP address into an ethernet address. 494512e30efSAlexander V. Chernikov * On input: 495512e30efSAlexander V. Chernikov * ifp is the interface we use 496512e30efSAlexander V. Chernikov * is_gw != 0 if @dst represents gateway to some destination 497512e30efSAlexander V. Chernikov * m is the mbuf. May be NULL if we don't have a packet. 498512e30efSAlexander V. Chernikov * dst is the next hop, 499512e30efSAlexander V. Chernikov * desten is the storage to put LL address. 500f8aee88fSAlexander V. Chernikov * flags returns subset of lle flags: LLE_VALID | LLE_IFADDR 501512e30efSAlexander V. Chernikov * 502512e30efSAlexander V. Chernikov * On success, desten and flags are filled in and the function returns 0; 503512e30efSAlexander V. Chernikov * If the packet must be held pending resolution, we return EWOULDBLOCK 504512e30efSAlexander V. Chernikov * On other errors, we return the corresponding error code. 505512e30efSAlexander V. Chernikov * Note that m_freem() handles NULL. 506512e30efSAlexander V. Chernikov */ 507512e30efSAlexander V. Chernikov int 508512e30efSAlexander V. Chernikov arpresolve(struct ifnet *ifp, int is_gw, struct mbuf *m, 509512e30efSAlexander V. Chernikov const struct sockaddr *dst, u_char *desten, uint32_t *pflags) 510512e30efSAlexander V. Chernikov { 511512e30efSAlexander V. Chernikov struct llentry *la = 0; 512512e30efSAlexander V. Chernikov 513512e30efSAlexander V. Chernikov if (pflags != NULL) 514512e30efSAlexander V. Chernikov *pflags = 0; 515512e30efSAlexander V. Chernikov 516512e30efSAlexander V. Chernikov if (m != NULL) { 517512e30efSAlexander V. Chernikov if (m->m_flags & M_BCAST) { 518512e30efSAlexander V. Chernikov /* broadcast */ 519512e30efSAlexander V. Chernikov (void)memcpy(desten, 520512e30efSAlexander V. Chernikov ifp->if_broadcastaddr, ifp->if_addrlen); 521512e30efSAlexander V. Chernikov return (0); 522512e30efSAlexander V. Chernikov } 523512e30efSAlexander V. Chernikov if (m->m_flags & M_MCAST) { 524512e30efSAlexander V. Chernikov /* multicast */ 525512e30efSAlexander V. Chernikov ETHER_MAP_IP_MULTICAST(&SIN(dst)->sin_addr, desten); 526512e30efSAlexander V. Chernikov return (0); 527512e30efSAlexander V. Chernikov } 528512e30efSAlexander V. Chernikov } 529512e30efSAlexander V. Chernikov 530512e30efSAlexander V. Chernikov IF_AFDATA_RLOCK(ifp); 531f8aee88fSAlexander V. Chernikov la = lla_lookup(LLTABLE(ifp), LLE_UNLOCKED, dst); 532f8aee88fSAlexander V. Chernikov if (la != NULL && (la->r_flags & RLLE_VALID) != 0) { 533f8aee88fSAlexander V. Chernikov /* Entry found, let's copy lle info */ 534512e30efSAlexander V. Chernikov bcopy(&la->ll_addr, desten, ifp->if_addrlen); 535512e30efSAlexander V. Chernikov if (pflags != NULL) 536f8aee88fSAlexander V. Chernikov *pflags = LLE_VALID | (la->r_flags & RLLE_IFADDR); 537f8aee88fSAlexander V. Chernikov /* Check if we have feedback request from arptimer() */ 538f8aee88fSAlexander V. Chernikov if (la->r_skip_req != 0) { 539f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(la); 540f8aee88fSAlexander V. Chernikov la->r_skip_req = 0; /* Notify that entry was used */ 541f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(la); 542f8aee88fSAlexander V. Chernikov } 543f8aee88fSAlexander V. Chernikov IF_AFDATA_RUNLOCK(ifp); 544512e30efSAlexander V. Chernikov return (0); 545512e30efSAlexander V. Chernikov } 546f8aee88fSAlexander V. Chernikov IF_AFDATA_RUNLOCK(ifp); 547512e30efSAlexander V. Chernikov 548f8aee88fSAlexander V. Chernikov return (arpresolve_full(ifp, is_gw, 1, m, dst, desten, pflags)); 549512e30efSAlexander V. Chernikov } 550512e30efSAlexander V. Chernikov 551512e30efSAlexander V. Chernikov /* 552df8bae1dSRodney W. Grimes * Common length and type checks are done here, 553df8bae1dSRodney W. Grimes * then the protocol-specific routine is called. 554df8bae1dSRodney W. Grimes */ 555885f1aa4SPoul-Henning Kamp static void 5561cafed39SJonathan Lemon arpintr(struct mbuf *m) 557df8bae1dSRodney W. Grimes { 5581cafed39SJonathan Lemon struct arphdr *ar; 559eec33ea0SAlexander V. Chernikov struct ifnet *ifp; 560deb6bda6SAlexander V. Chernikov char *layer; 561deb6bda6SAlexander V. Chernikov int hlen; 562df8bae1dSRodney W. Grimes 563eec33ea0SAlexander V. Chernikov ifp = m->m_pkthdr.rcvif; 564eec33ea0SAlexander V. Chernikov 56576ec7b2fSRobert Watson if (m->m_len < sizeof(struct arphdr) && 56684365e2bSMatthew Dillon ((m = m_pullup(m, sizeof(struct arphdr))) == NULL)) { 567eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, "packet with short header received on %s\n", 568eec33ea0SAlexander V. Chernikov if_name(ifp)); 5691cafed39SJonathan Lemon return; 57076ec7b2fSRobert Watson } 57176ec7b2fSRobert Watson ar = mtod(m, struct arphdr *); 57276ec7b2fSRobert Watson 573deb6bda6SAlexander V. Chernikov /* Check if length is sufficient */ 57489bc0426SGleb Smirnoff if (m->m_len < arphdr_len(ar)) { 57589bc0426SGleb Smirnoff m = m_pullup(m, arphdr_len(ar)); 57689bc0426SGleb Smirnoff if (m == NULL) { 577eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, "short packet received on %s\n", 578eec33ea0SAlexander V. Chernikov if_name(ifp)); 579deb6bda6SAlexander V. Chernikov return; 580deb6bda6SAlexander V. Chernikov } 581deb6bda6SAlexander V. Chernikov ar = mtod(m, struct arphdr *); 58289bc0426SGleb Smirnoff } 583deb6bda6SAlexander V. Chernikov 584deb6bda6SAlexander V. Chernikov hlen = 0; 585deb6bda6SAlexander V. Chernikov layer = ""; 586deb6bda6SAlexander V. Chernikov switch (ntohs(ar->ar_hrd)) { 587deb6bda6SAlexander V. Chernikov case ARPHRD_ETHER: 588deb6bda6SAlexander V. Chernikov hlen = ETHER_ADDR_LEN; /* RFC 826 */ 589deb6bda6SAlexander V. Chernikov layer = "ethernet"; 590deb6bda6SAlexander V. Chernikov break; 591deb6bda6SAlexander V. Chernikov case ARPHRD_IEEE802: 592deb6bda6SAlexander V. Chernikov hlen = 6; /* RFC 1390, FDDI_ADDR_LEN */ 593deb6bda6SAlexander V. Chernikov layer = "fddi"; 594deb6bda6SAlexander V. Chernikov break; 595deb6bda6SAlexander V. Chernikov case ARPHRD_ARCNET: 596deb6bda6SAlexander V. Chernikov hlen = 1; /* RFC 1201, ARC_ADDR_LEN */ 597deb6bda6SAlexander V. Chernikov layer = "arcnet"; 598deb6bda6SAlexander V. Chernikov break; 599deb6bda6SAlexander V. Chernikov case ARPHRD_INFINIBAND: 600deb6bda6SAlexander V. Chernikov hlen = 20; /* RFC 4391, INFINIBAND_ALEN */ 601deb6bda6SAlexander V. Chernikov layer = "infiniband"; 602deb6bda6SAlexander V. Chernikov break; 603deb6bda6SAlexander V. Chernikov case ARPHRD_IEEE1394: 604deb6bda6SAlexander V. Chernikov hlen = 0; /* SHALL be 16 */ /* RFC 2734 */ 605deb6bda6SAlexander V. Chernikov layer = "firewire"; 606deb6bda6SAlexander V. Chernikov 607deb6bda6SAlexander V. Chernikov /* 608deb6bda6SAlexander V. Chernikov * Restrict too long harware addresses. 609deb6bda6SAlexander V. Chernikov * Currently we are capable of handling 20-byte 610deb6bda6SAlexander V. Chernikov * addresses ( sizeof(lle->ll_addr) ) 611deb6bda6SAlexander V. Chernikov */ 612deb6bda6SAlexander V. Chernikov if (ar->ar_hln >= 20) 613deb6bda6SAlexander V. Chernikov hlen = 16; 614deb6bda6SAlexander V. Chernikov break; 615deb6bda6SAlexander V. Chernikov default: 616eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, 617eec33ea0SAlexander V. Chernikov "packet with unknown harware format 0x%02d received on %s\n", 618eec33ea0SAlexander V. Chernikov ntohs(ar->ar_hrd), if_name(ifp)); 61976ec7b2fSRobert Watson m_freem(m); 6201cafed39SJonathan Lemon return; 62176ec7b2fSRobert Watson } 62276ec7b2fSRobert Watson 623deb6bda6SAlexander V. Chernikov if (hlen != 0 && hlen != ar->ar_hln) { 624eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, 625eec33ea0SAlexander V. Chernikov "packet with invalid %s address length %d received on %s\n", 626eec33ea0SAlexander V. Chernikov layer, ar->ar_hln, if_name(ifp)); 62776ec7b2fSRobert Watson m_freem(m); 6281cafed39SJonathan Lemon return; 62976ec7b2fSRobert Watson } 630df8bae1dSRodney W. Grimes 63154fc657dSGeorge V. Neville-Neil ARPSTAT_INC(received); 632df8bae1dSRodney W. Grimes switch (ntohs(ar->ar_pro)) { 6331d5e9e22SEivind Eklund #ifdef INET 634df8bae1dSRodney W. Grimes case ETHERTYPE_IP: 635df8bae1dSRodney W. Grimes in_arpinput(m); 6361cafed39SJonathan Lemon return; 6371d5e9e22SEivind Eklund #endif 638df8bae1dSRodney W. Grimes } 639df8bae1dSRodney W. Grimes m_freem(m); 640df8bae1dSRodney W. Grimes } 641df8bae1dSRodney W. Grimes 6421d5e9e22SEivind Eklund #ifdef INET 643df8bae1dSRodney W. Grimes /* 644df8bae1dSRodney W. Grimes * ARP for Internet protocols on 10 Mb/s Ethernet. 645df8bae1dSRodney W. Grimes * Algorithm is that given in RFC 826. 646df8bae1dSRodney W. Grimes * In addition, a sanity check is performed on the sender 647df8bae1dSRodney W. Grimes * protocol address, to catch impersonators. 648df8bae1dSRodney W. Grimes * We no longer handle negotiations for use of trailer protocol: 649df8bae1dSRodney W. Grimes * Formerly, ARP replied for protocol type ETHERTYPE_TRAIL sent 650df8bae1dSRodney W. Grimes * along with IP replies if we wanted trailers sent to us, 651df8bae1dSRodney W. Grimes * and also sent them in response to IP replies. 652df8bae1dSRodney W. Grimes * This allowed either end to announce the desire to receive 653df8bae1dSRodney W. Grimes * trailer packets. 654df8bae1dSRodney W. Grimes * We no longer reply to requests for ETHERTYPE_TRAIL protocol either, 655df8bae1dSRodney W. Grimes * but formerly didn't normally send requests. 656df8bae1dSRodney W. Grimes */ 6573269187dSAlfred Perlstein static int log_arp_wrong_iface = 1; 658e3d123d6SAlfred Perlstein static int log_arp_movements = 1; 65939393906SGleb Smirnoff static int log_arp_permanent_modify = 1; 660478df1d5SGleb Smirnoff static int allow_multicast = 0; 6613269187dSAlfred Perlstein 6623269187dSAlfred Perlstein SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_wrong_iface, CTLFLAG_RW, 6633269187dSAlfred Perlstein &log_arp_wrong_iface, 0, 6643269187dSAlfred Perlstein "log arp packets arriving on the wrong interface"); 665e3d123d6SAlfred Perlstein SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_movements, CTLFLAG_RW, 666e3d123d6SAlfred Perlstein &log_arp_movements, 0, 66775ce3221SAlfred Perlstein "log arp replies from MACs different than the one in the cache"); 66839393906SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_permanent_modify, CTLFLAG_RW, 66939393906SGleb Smirnoff &log_arp_permanent_modify, 0, 67039393906SGleb Smirnoff "log arp replies from MACs different than the one in the permanent arp entry"); 671478df1d5SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, allow_multicast, CTLFLAG_RW, 672478df1d5SGleb Smirnoff &allow_multicast, 0, "accept multicast addresses"); 6733269187dSAlfred Perlstein 674df8bae1dSRodney W. Grimes static void 675f2565d68SRobert Watson in_arpinput(struct mbuf *m) 676df8bae1dSRodney W. Grimes { 677cc0a3c8cSAndrey V. Elsukov struct rm_priotracker in_ifa_tracker; 678e952fa39SMatthew N. Dodd struct arphdr *ah; 679e952fa39SMatthew N. Dodd struct ifnet *ifp = m->m_pkthdr.rcvif; 6805a255516SAlexander V. Chernikov struct llentry *la = NULL, *la_tmp; 681ca925d9cSJonathan Lemon struct ifaddr *ifa; 682ca925d9cSJonathan Lemon struct in_ifaddr *ia; 683df8bae1dSRodney W. Grimes struct sockaddr sa; 684df8bae1dSRodney W. Grimes struct in_addr isaddr, itaddr, myaddr; 685a9771948SGleb Smirnoff u_int8_t *enaddr = NULL; 686f3bfa7d1SAlexander V. Chernikov int op; 68780b11ee4SPhilip Paeps int bridged = 0, is_bridge = 0; 688f3bfa7d1SAlexander V. Chernikov int carped; 6898e7e854cSKip Macy struct sockaddr_in sin; 6905a255516SAlexander V. Chernikov struct sockaddr *dst; 6919977be4aSAlexander V. Chernikov struct nhop4_basic nh4; 6929977be4aSAlexander V. Chernikov 6938e7e854cSKip Macy sin.sin_len = sizeof(struct sockaddr_in); 6948e7e854cSKip Macy sin.sin_family = AF_INET; 69529910a5aSKip Macy sin.sin_addr.s_addr = 0; 696df8bae1dSRodney W. Grimes 69774948aa6SAndrew Thompson if (ifp->if_bridge) 6988f867517SAndrew Thompson bridged = 1; 69980b11ee4SPhilip Paeps if (ifp->if_type == IFT_BRIDGE) 70080b11ee4SPhilip Paeps is_bridge = 1; 7018f867517SAndrew Thompson 702eec33ea0SAlexander V. Chernikov /* 703eec33ea0SAlexander V. Chernikov * We already have checked that mbuf contains enough contiguous data 704eec33ea0SAlexander V. Chernikov * to hold entire arp message according to the arp header. 705eec33ea0SAlexander V. Chernikov */ 706322dcb8dSMax Khon ah = mtod(m, struct arphdr *); 707eec33ea0SAlexander V. Chernikov 70809d3f895SGeorge V. Neville-Neil /* 70909d3f895SGeorge V. Neville-Neil * ARP is only for IPv4 so we can reject packets with 71009d3f895SGeorge V. Neville-Neil * a protocol length not equal to an IPv4 address. 71109d3f895SGeorge V. Neville-Neil */ 71209d3f895SGeorge V. Neville-Neil if (ah->ar_pln != sizeof(struct in_addr)) { 7135d81d095SGleb Smirnoff ARP_LOG(LOG_NOTICE, "requested protocol length != %zu\n", 71409d3f895SGeorge V. Neville-Neil sizeof(struct in_addr)); 715414676baSGleb Smirnoff goto drop; 71609d3f895SGeorge V. Neville-Neil } 71709d3f895SGeorge V. Neville-Neil 718478df1d5SGleb Smirnoff if (allow_multicast == 0 && ETHER_IS_MULTICAST(ar_sha(ah))) { 7195d81d095SGleb Smirnoff ARP_LOG(LOG_NOTICE, "%*D is multicast\n", 720c9168718SGleb Smirnoff ifp->if_addrlen, (u_char *)ar_sha(ah), ":"); 721414676baSGleb Smirnoff goto drop; 72209d3f895SGeorge V. Neville-Neil } 72309d3f895SGeorge V. Neville-Neil 724322dcb8dSMax Khon op = ntohs(ah->ar_op); 725322dcb8dSMax Khon (void)memcpy(&isaddr, ar_spa(ah), sizeof (isaddr)); 726322dcb8dSMax Khon (void)memcpy(&itaddr, ar_tpa(ah), sizeof (itaddr)); 72732439868SGleb Smirnoff 72854fc657dSGeorge V. Neville-Neil if (op == ARPOP_REPLY) 72954fc657dSGeorge V. Neville-Neil ARPSTAT_INC(rxreplies); 73054fc657dSGeorge V. Neville-Neil 731ca925d9cSJonathan Lemon /* 732ca925d9cSJonathan Lemon * For a bridge, we want to check the address irrespective 733ca925d9cSJonathan Lemon * of the receive interface. (This will change slightly 734ca925d9cSJonathan Lemon * when we have clusters of interfaces). 735ca925d9cSJonathan Lemon */ 736cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RLOCK(&in_ifa_tracker); 7372ef4a436SGleb Smirnoff LIST_FOREACH(ia, INADDR_HASH(itaddr.s_addr), ia_hash) { 73896561547SAndrew Thompson if (((bridged && ia->ia_ifp->if_bridge == ifp->if_bridge) || 7396e6b3f7cSQing Li ia->ia_ifp == ifp) && 74008b68b0eSGleb Smirnoff itaddr.s_addr == ia->ia_addr.sin_addr.s_addr && 74108b68b0eSGleb Smirnoff (ia->ia_ifa.ifa_carp == NULL || 74208b68b0eSGleb Smirnoff (*carp_iamatch_p)(&ia->ia_ifa, &enaddr))) { 74309d54778SRobert Watson ifa_ref(&ia->ia_ifa); 744cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 7452ef4a436SGleb Smirnoff goto match; 7462ef4a436SGleb Smirnoff } 7472ef4a436SGleb Smirnoff } 748ca925d9cSJonathan Lemon LIST_FOREACH(ia, INADDR_HASH(isaddr.s_addr), ia_hash) 74996561547SAndrew Thompson if (((bridged && ia->ia_ifp->if_bridge == ifp->if_bridge) || 7506e6b3f7cSQing Li ia->ia_ifp == ifp) && 75109d54778SRobert Watson isaddr.s_addr == ia->ia_addr.sin_addr.s_addr) { 75209d54778SRobert Watson ifa_ref(&ia->ia_ifa); 753cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 754ca925d9cSJonathan Lemon goto match; 75509d54778SRobert Watson } 75680b11ee4SPhilip Paeps 75780b11ee4SPhilip Paeps #define BDG_MEMBER_MATCHES_ARP(addr, ifp, ia) \ 75880b11ee4SPhilip Paeps (ia->ia_ifp->if_bridge == ifp->if_softc && \ 75980b11ee4SPhilip Paeps !bcmp(IF_LLADDR(ia->ia_ifp), IF_LLADDR(ifp), ifp->if_addrlen) && \ 76080b11ee4SPhilip Paeps addr == ia->ia_addr.sin_addr.s_addr) 76180b11ee4SPhilip Paeps /* 76280b11ee4SPhilip Paeps * Check the case when bridge shares its MAC address with 76380b11ee4SPhilip Paeps * some of its children, so packets are claimed by bridge 76480b11ee4SPhilip Paeps * itself (bridge_input() does it first), but they are really 76580b11ee4SPhilip Paeps * meant to be destined to the bridge member. 76680b11ee4SPhilip Paeps */ 76780b11ee4SPhilip Paeps if (is_bridge) { 76880b11ee4SPhilip Paeps LIST_FOREACH(ia, INADDR_HASH(itaddr.s_addr), ia_hash) { 76980b11ee4SPhilip Paeps if (BDG_MEMBER_MATCHES_ARP(itaddr.s_addr, ifp, ia)) { 77009d54778SRobert Watson ifa_ref(&ia->ia_ifa); 77180b11ee4SPhilip Paeps ifp = ia->ia_ifp; 772cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 77380b11ee4SPhilip Paeps goto match; 77480b11ee4SPhilip Paeps } 77580b11ee4SPhilip Paeps } 77680b11ee4SPhilip Paeps } 77780b11ee4SPhilip Paeps #undef BDG_MEMBER_MATCHES_ARP 778cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 77980b11ee4SPhilip Paeps 780ca925d9cSJonathan Lemon /* 781d8b84d9eSJonathan Lemon * No match, use the first inet address on the receive interface 782ca925d9cSJonathan Lemon * as a dummy address for the rest of the function. 783ca925d9cSJonathan Lemon */ 784137f91e8SJohn Baldwin IF_ADDR_RLOCK(ifp); 785d8b84d9eSJonathan Lemon TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) 7869de96e89SGleb Smirnoff if (ifa->ifa_addr->sa_family == AF_INET && 7879de96e89SGleb Smirnoff (ifa->ifa_carp == NULL || 7889de96e89SGleb Smirnoff (*carp_iamatch_p)(ifa, &enaddr))) { 789ec691a10SJonathan Lemon ia = ifatoia(ifa); 79009d54778SRobert Watson ifa_ref(ifa); 791137f91e8SJohn Baldwin IF_ADDR_RUNLOCK(ifp); 792ec691a10SJonathan Lemon goto match; 793ec691a10SJonathan Lemon } 794137f91e8SJohn Baldwin IF_ADDR_RUNLOCK(ifp); 79509d54778SRobert Watson 796ec691a10SJonathan Lemon /* 797ec691a10SJonathan Lemon * If bridging, fall back to using any inet address. 798ec691a10SJonathan Lemon */ 799cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RLOCK(&in_ifa_tracker); 8002d9cfabaSRobert Watson if (!bridged || (ia = TAILQ_FIRST(&V_in_ifaddrhead)) == NULL) { 801cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 802b2a8ac7cSLuigi Rizzo goto drop; 8032d9cfabaSRobert Watson } 80409d54778SRobert Watson ifa_ref(&ia->ia_ifa); 805cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 806ca925d9cSJonathan Lemon match: 807a9771948SGleb Smirnoff if (!enaddr) 808a9771948SGleb Smirnoff enaddr = (u_int8_t *)IF_LLADDR(ifp); 80908b68b0eSGleb Smirnoff carped = (ia->ia_ifa.ifa_carp != NULL); 810ca925d9cSJonathan Lemon myaddr = ia->ia_addr.sin_addr; 81109d54778SRobert Watson ifa_free(&ia->ia_ifa); 812a9771948SGleb Smirnoff if (!bcmp(ar_sha(ah), enaddr, ifp->if_addrlen)) 813b2a8ac7cSLuigi Rizzo goto drop; /* it's from me, ignore it. */ 814322dcb8dSMax Khon if (!bcmp(ar_sha(ah), ifp->if_broadcastaddr, ifp->if_addrlen)) { 8155d81d095SGleb Smirnoff ARP_LOG(LOG_NOTICE, "link address is broadcast for IP address " 8165d81d095SGleb Smirnoff "%s!\n", inet_ntoa(isaddr)); 817b2a8ac7cSLuigi Rizzo goto drop; 818df8bae1dSRodney W. Grimes } 819f3bfa7d1SAlexander V. Chernikov 820f3bfa7d1SAlexander V. Chernikov if (ifp->if_addrlen != ah->ar_hln) { 821f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_WARNING, "from %*D: addr len: new %d, " 822f3bfa7d1SAlexander V. Chernikov "i/f %d (ignored)\n", ifp->if_addrlen, 823f3bfa7d1SAlexander V. Chernikov (u_char *) ar_sha(ah), ":", ah->ar_hln, 824f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen); 825f3bfa7d1SAlexander V. Chernikov goto drop; 826f3bfa7d1SAlexander V. Chernikov } 827f3bfa7d1SAlexander V. Chernikov 82800fcf9d1SRobert Watson /* 82900fcf9d1SRobert Watson * Warn if another host is using the same IP address, but only if the 83000fcf9d1SRobert Watson * IP address isn't 0.0.0.0, which is used for DHCP only, in which 83100fcf9d1SRobert Watson * case we suppress the warning to avoid false positive complaints of 83200fcf9d1SRobert Watson * potential misconfiguration. 83300fcf9d1SRobert Watson */ 83408b68b0eSGleb Smirnoff if (!bridged && !carped && isaddr.s_addr == myaddr.s_addr && 83508b68b0eSGleb Smirnoff myaddr.s_addr != 0) { 8365d81d095SGleb Smirnoff ARP_LOG(LOG_ERR, "%*D is using my IP address %s on %s!\n", 837322dcb8dSMax Khon ifp->if_addrlen, (u_char *)ar_sha(ah), ":", 8383affb6fbSYaroslav Tykhiy inet_ntoa(isaddr), ifp->if_xname); 839df8bae1dSRodney W. Grimes itaddr = myaddr; 84054fc657dSGeorge V. Neville-Neil ARPSTAT_INC(dupips); 841df8bae1dSRodney W. Grimes goto reply; 842df8bae1dSRodney W. Grimes } 843deb62e28SRuslan Ermilov if (ifp->if_flags & IFF_STATICARP) 844deb62e28SRuslan Ermilov goto reply; 8458b07e49aSJulian Elischer 8466e6b3f7cSQing Li bzero(&sin, sizeof(sin)); 8476e6b3f7cSQing Li sin.sin_len = sizeof(struct sockaddr_in); 8486e6b3f7cSQing Li sin.sin_family = AF_INET; 8496e6b3f7cSQing Li sin.sin_addr = isaddr; 8505a255516SAlexander V. Chernikov dst = (struct sockaddr *)&sin; 851f3bfa7d1SAlexander V. Chernikov IF_AFDATA_RLOCK(ifp); 8525a255516SAlexander V. Chernikov la = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 853f3bfa7d1SAlexander V. Chernikov IF_AFDATA_RUNLOCK(ifp); 854f3bfa7d1SAlexander V. Chernikov if (la != NULL) 855f3bfa7d1SAlexander V. Chernikov arp_check_update_lle(ah, isaddr, ifp, bridged, la); 856f3bfa7d1SAlexander V. Chernikov else if (itaddr.s_addr == myaddr.s_addr) { 857e162ea60SGeorge V. Neville-Neil /* 858f3bfa7d1SAlexander V. Chernikov * Reply to our address, but no lle exists yet. 859f3bfa7d1SAlexander V. Chernikov * do we really have to create an entry? 860e162ea60SGeorge V. Neville-Neil */ 8615a255516SAlexander V. Chernikov la = lltable_alloc_entry(LLTABLE(ifp), 0, dst); 8625a255516SAlexander V. Chernikov if (la == NULL) 8635a255516SAlexander V. Chernikov goto drop; 864ddd208f7SAlexander V. Chernikov lltable_set_entry_addr(ifp, la, ar_sha(ah)); 8655a255516SAlexander V. Chernikov 8665a255516SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 8675a255516SAlexander V. Chernikov LLE_WLOCK(la); 8685a255516SAlexander V. Chernikov la_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 8695a255516SAlexander V. Chernikov 8705a255516SAlexander V. Chernikov /* 8715a255516SAlexander V. Chernikov * Check if lle still does not exists. 8725a255516SAlexander V. Chernikov * If it does, that means that we either 8735a255516SAlexander V. Chernikov * 1) have configured it explicitly, via 8745a255516SAlexander V. Chernikov * 1a) 'arp -s' static entry or 8755a255516SAlexander V. Chernikov * 1b) interface address static record 8765a255516SAlexander V. Chernikov * or 8775a255516SAlexander V. Chernikov * 2) it was the result of sending first packet to-host 8785a255516SAlexander V. Chernikov * or 8795a255516SAlexander V. Chernikov * 3) it was another arp reply packet we handled in 8805a255516SAlexander V. Chernikov * different thread. 8815a255516SAlexander V. Chernikov * 8825a255516SAlexander V. Chernikov * In all cases except 3) we definitely need to prefer 8835a255516SAlexander V. Chernikov * existing lle. For the sake of simplicity, prefer any 8845a255516SAlexander V. Chernikov * existing lle over newly-create one. 8855a255516SAlexander V. Chernikov */ 8865a255516SAlexander V. Chernikov if (la_tmp == NULL) 8875a255516SAlexander V. Chernikov lltable_link_entry(LLTABLE(ifp), la); 888f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 8895a255516SAlexander V. Chernikov 8905a255516SAlexander V. Chernikov if (la_tmp == NULL) { 891f3bfa7d1SAlexander V. Chernikov arp_mark_lle_reachable(la); 892e162ea60SGeorge V. Neville-Neil LLE_WUNLOCK(la); 8935a255516SAlexander V. Chernikov } else { 8945a255516SAlexander V. Chernikov /* Free newly-create entry and handle packet */ 8955a255516SAlexander V. Chernikov lltable_free_entry(LLTABLE(ifp), la); 8965a255516SAlexander V. Chernikov la = la_tmp; 8975a255516SAlexander V. Chernikov la_tmp = NULL; 8985a255516SAlexander V. Chernikov arp_check_update_lle(ah, isaddr, ifp, bridged, la); 8995a255516SAlexander V. Chernikov /* arp_check_update_lle() returns @la unlocked */ 900f4048639SBjoern A. Zeeb } 9015a255516SAlexander V. Chernikov la = NULL; 902a4141c63SAlexander V. Chernikov } 9036e6b3f7cSQing Li reply: 904b2a8ac7cSLuigi Rizzo if (op != ARPOP_REQUEST) 905b2a8ac7cSLuigi Rizzo goto drop; 90654fc657dSGeorge V. Neville-Neil ARPSTAT_INC(rxrequests); 9076e6b3f7cSQing Li 908df8bae1dSRodney W. Grimes if (itaddr.s_addr == myaddr.s_addr) { 9098b07e49aSJulian Elischer /* Shortcut.. the receiving interface is the target. */ 910322dcb8dSMax Khon (void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln); 911a9771948SGleb Smirnoff (void)memcpy(ar_sha(ah), enaddr, ah->ar_hln); 912df8bae1dSRodney W. Grimes } else { 913897d75c9SQing Li struct llentry *lle = NULL; 914897d75c9SQing Li 915cd29a779SQing Li sin.sin_addr = itaddr; 916ea0c3776SAndrey V. Elsukov IF_AFDATA_RLOCK(ifp); 917cd29a779SQing Li lle = lla_lookup(LLTABLE(ifp), 0, (struct sockaddr *)&sin); 918ea0c3776SAndrey V. Elsukov IF_AFDATA_RUNLOCK(ifp); 919cd29a779SQing Li 920cd29a779SQing Li if ((lle != NULL) && (lle->la_flags & LLE_PUB)) { 921cd29a779SQing Li (void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln); 922cd29a779SQing Li (void)memcpy(ar_sha(ah), &lle->ll_addr, ah->ar_hln); 923cd29a779SQing Li LLE_RUNLOCK(lle); 924cd29a779SQing Li } else { 925cd29a779SQing Li 926cd29a779SQing Li if (lle != NULL) 927cd29a779SQing Li LLE_RUNLOCK(lle); 928cd29a779SQing Li 929603724d3SBjoern A. Zeeb if (!V_arp_proxyall) 930b2a8ac7cSLuigi Rizzo goto drop; 93128e82295SGarrett Wollman 9328b07e49aSJulian Elischer /* XXX MRT use table 0 for arp reply */ 9339977be4aSAlexander V. Chernikov if (fib4_lookup_nh_basic(0, itaddr, 0, 0, &nh4) != 0) 934b2a8ac7cSLuigi Rizzo goto drop; 935897d75c9SQing Li 93628e82295SGarrett Wollman /* 93728e82295SGarrett Wollman * Don't send proxies for nodes on the same interface 93828e82295SGarrett Wollman * as this one came out of, or we'll get into a fight 93928e82295SGarrett Wollman * over who claims what Ether address. 94028e82295SGarrett Wollman */ 9419977be4aSAlexander V. Chernikov if (nh4.nh_ifp == ifp) 942b2a8ac7cSLuigi Rizzo goto drop; 943cc728227SDavid Malone 944897d75c9SQing Li (void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln); 945cd29a779SQing Li (void)memcpy(ar_sha(ah), enaddr, ah->ar_hln); 946897d75c9SQing Li 947cc728227SDavid Malone /* 948cc728227SDavid Malone * Also check that the node which sent the ARP packet 9496bccea7cSRebecca Cran * is on the interface we expect it to be on. This 950cc728227SDavid Malone * avoids ARP chaos if an interface is connected to the 951cc728227SDavid Malone * wrong network. 952cc728227SDavid Malone */ 953cc728227SDavid Malone 9548b07e49aSJulian Elischer /* XXX MRT use table 0 for arp checks */ 9559977be4aSAlexander V. Chernikov if (fib4_lookup_nh_basic(0, isaddr, 0, 0, &nh4) != 0) 956b2a8ac7cSLuigi Rizzo goto drop; 9579977be4aSAlexander V. Chernikov if (nh4.nh_ifp != ifp) { 9585d81d095SGleb Smirnoff ARP_LOG(LOG_INFO, "proxy: ignoring request" 9599977be4aSAlexander V. Chernikov " from %s via %s\n", 9609977be4aSAlexander V. Chernikov inet_ntoa(isaddr), ifp->if_xname); 961b2a8ac7cSLuigi Rizzo goto drop; 962cc728227SDavid Malone } 963cc728227SDavid Malone 964ac234f93SGarrett Wollman #ifdef DEBUG_PROXY 965ea50c13eSGleb Smirnoff printf("arp: proxying for %s\n", inet_ntoa(itaddr)); 966ac234f93SGarrett Wollman #endif 967df8bae1dSRodney W. Grimes } 968cd29a779SQing Li } 969df8bae1dSRodney W. Grimes 970d0558157SBruce M Simpson if (itaddr.s_addr == myaddr.s_addr && 971d0558157SBruce M Simpson IN_LINKLOCAL(ntohl(itaddr.s_addr))) { 972d0558157SBruce M Simpson /* RFC 3927 link-local IPv4; always reply by broadcast. */ 973d0558157SBruce M Simpson #ifdef DEBUG_LINKLOCAL 974d0558157SBruce M Simpson printf("arp: sending reply for link-local addr %s\n", 975d0558157SBruce M Simpson inet_ntoa(itaddr)); 976d0558157SBruce M Simpson #endif 977d0558157SBruce M Simpson m->m_flags |= M_BCAST; 978d0558157SBruce M Simpson m->m_flags &= ~M_MCAST; 979d0558157SBruce M Simpson } else { 980d0558157SBruce M Simpson /* default behaviour; never reply by broadcast. */ 981d0558157SBruce M Simpson m->m_flags &= ~(M_BCAST|M_MCAST); 982d0558157SBruce M Simpson } 983322dcb8dSMax Khon (void)memcpy(ar_tpa(ah), ar_spa(ah), ah->ar_pln); 984322dcb8dSMax Khon (void)memcpy(ar_spa(ah), &itaddr, ah->ar_pln); 985322dcb8dSMax Khon ah->ar_op = htons(ARPOP_REPLY); 986322dcb8dSMax Khon ah->ar_pro = htons(ETHERTYPE_IP); /* let's be sure! */ 98764bf80ceSMatthew N. Dodd m->m_len = sizeof(*ah) + (2 * ah->ar_pln) + (2 * ah->ar_hln); 98864bf80ceSMatthew N. Dodd m->m_pkthdr.len = m->m_len; 9892303570fSAndrey V. Elsukov m->m_pkthdr.rcvif = NULL; 99064bf80ceSMatthew N. Dodd sa.sa_family = AF_ARP; 99164bf80ceSMatthew N. Dodd sa.sa_len = 2; 99286bd0491SAndre Oppermann m_clrprotoflags(m); /* Avoid confusing lower layers. */ 993279aa3d4SKip Macy (*ifp->if_output)(ifp, m, &sa, NULL); 99454fc657dSGeorge V. Neville-Neil ARPSTAT_INC(txreplies); 995df8bae1dSRodney W. Grimes return; 996b2a8ac7cSLuigi Rizzo 997b2a8ac7cSLuigi Rizzo drop: 998b2a8ac7cSLuigi Rizzo m_freem(m); 999df8bae1dSRodney W. Grimes } 10001d5e9e22SEivind Eklund #endif 1001df8bae1dSRodney W. Grimes 1002f3bfa7d1SAlexander V. Chernikov /* 1003f3bfa7d1SAlexander V. Chernikov * Checks received arp data against existing @la. 1004f3bfa7d1SAlexander V. Chernikov * Updates lle state/performs notification if necessary. 1005f3bfa7d1SAlexander V. Chernikov */ 1006f3bfa7d1SAlexander V. Chernikov static void 1007f3bfa7d1SAlexander V. Chernikov arp_check_update_lle(struct arphdr *ah, struct in_addr isaddr, struct ifnet *ifp, 1008f3bfa7d1SAlexander V. Chernikov int bridged, struct llentry *la) 1009f3bfa7d1SAlexander V. Chernikov { 1010f3bfa7d1SAlexander V. Chernikov struct sockaddr sa; 1011f3bfa7d1SAlexander V. Chernikov struct mbuf *m_hold, *m_hold_next; 1012f3bfa7d1SAlexander V. Chernikov 1013f3bfa7d1SAlexander V. Chernikov LLE_WLOCK_ASSERT(la); 1014f3bfa7d1SAlexander V. Chernikov 1015f3bfa7d1SAlexander V. Chernikov /* the following is not an error when doing bridging */ 1016f3bfa7d1SAlexander V. Chernikov if (!bridged && la->lle_tbl->llt_ifp != ifp) { 1017f3bfa7d1SAlexander V. Chernikov if (log_arp_wrong_iface) 1018f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_WARNING, "%s is on %s " 1019f3bfa7d1SAlexander V. Chernikov "but got reply from %*D on %s\n", 1020f3bfa7d1SAlexander V. Chernikov inet_ntoa(isaddr), 1021f3bfa7d1SAlexander V. Chernikov la->lle_tbl->llt_ifp->if_xname, 1022f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, (u_char *)ar_sha(ah), ":", 1023f3bfa7d1SAlexander V. Chernikov ifp->if_xname); 1024f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1025f3bfa7d1SAlexander V. Chernikov return; 1026f3bfa7d1SAlexander V. Chernikov } 1027f3bfa7d1SAlexander V. Chernikov if ((la->la_flags & LLE_VALID) && 1028f3bfa7d1SAlexander V. Chernikov bcmp(ar_sha(ah), &la->ll_addr, ifp->if_addrlen)) { 1029f3bfa7d1SAlexander V. Chernikov if (la->la_flags & LLE_STATIC) { 1030f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1031f3bfa7d1SAlexander V. Chernikov if (log_arp_permanent_modify) 1032f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_ERR, 1033f3bfa7d1SAlexander V. Chernikov "%*D attempts to modify " 1034f3bfa7d1SAlexander V. Chernikov "permanent entry for %s on %s\n", 1035f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, 1036f3bfa7d1SAlexander V. Chernikov (u_char *)ar_sha(ah), ":", 1037f3bfa7d1SAlexander V. Chernikov inet_ntoa(isaddr), ifp->if_xname); 1038f3bfa7d1SAlexander V. Chernikov return; 1039f3bfa7d1SAlexander V. Chernikov } 1040f3bfa7d1SAlexander V. Chernikov if (log_arp_movements) { 1041f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_INFO, "%s moved from %*D " 1042f3bfa7d1SAlexander V. Chernikov "to %*D on %s\n", 1043f3bfa7d1SAlexander V. Chernikov inet_ntoa(isaddr), 1044f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, 1045f3bfa7d1SAlexander V. Chernikov (u_char *)&la->ll_addr, ":", 1046f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, (u_char *)ar_sha(ah), ":", 1047f3bfa7d1SAlexander V. Chernikov ifp->if_xname); 1048f3bfa7d1SAlexander V. Chernikov } 1049f3bfa7d1SAlexander V. Chernikov } 1050f3bfa7d1SAlexander V. Chernikov 1051f3bfa7d1SAlexander V. Chernikov /* Check if something has changed */ 1052f3bfa7d1SAlexander V. Chernikov if (memcmp(&la->ll_addr, ar_sha(ah), ifp->if_addrlen) != 0 || 1053f3bfa7d1SAlexander V. Chernikov (la->la_flags & LLE_VALID) == 0) { 1054f3bfa7d1SAlexander V. Chernikov /* Perform real LLE update */ 1055f3bfa7d1SAlexander V. Chernikov /* use afdata WLOCK to update fields */ 1056f3bfa7d1SAlexander V. Chernikov LLE_ADDREF(la); 1057f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1058f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 1059f3bfa7d1SAlexander V. Chernikov LLE_WLOCK(la); 1060f3bfa7d1SAlexander V. Chernikov 1061f3bfa7d1SAlexander V. Chernikov /* 1062f3bfa7d1SAlexander V. Chernikov * Since we droppped LLE lock, other thread might have deleted 1063f3bfa7d1SAlexander V. Chernikov * this lle. Check and return 1064f3bfa7d1SAlexander V. Chernikov */ 1065f3bfa7d1SAlexander V. Chernikov if ((la->la_flags & LLE_DELETED) != 0) { 1066f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 1067f3bfa7d1SAlexander V. Chernikov LLE_FREE_LOCKED(la); 1068f3bfa7d1SAlexander V. Chernikov return; 1069f3bfa7d1SAlexander V. Chernikov } 1070f3bfa7d1SAlexander V. Chernikov 1071f3bfa7d1SAlexander V. Chernikov /* Update data */ 1072ddd208f7SAlexander V. Chernikov lltable_set_entry_addr(ifp, la, ar_sha(ah)); 1073f3bfa7d1SAlexander V. Chernikov 1074f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 1075f3bfa7d1SAlexander V. Chernikov LLE_REMREF(la); 1076f8aee88fSAlexander V. Chernikov 1077f8aee88fSAlexander V. Chernikov /* Clear fast path feedback request if set */ 1078f8aee88fSAlexander V. Chernikov la->r_skip_req = 0; 1079f3bfa7d1SAlexander V. Chernikov } 1080f3bfa7d1SAlexander V. Chernikov 1081f3bfa7d1SAlexander V. Chernikov arp_mark_lle_reachable(la); 1082f3bfa7d1SAlexander V. Chernikov 1083f3bfa7d1SAlexander V. Chernikov /* 1084f3bfa7d1SAlexander V. Chernikov * The packets are all freed within the call to the output 1085f3bfa7d1SAlexander V. Chernikov * routine. 1086f3bfa7d1SAlexander V. Chernikov * 1087f3bfa7d1SAlexander V. Chernikov * NB: The lock MUST be released before the call to the 1088f3bfa7d1SAlexander V. Chernikov * output routine. 1089f3bfa7d1SAlexander V. Chernikov */ 1090f3bfa7d1SAlexander V. Chernikov if (la->la_hold != NULL) { 1091f3bfa7d1SAlexander V. Chernikov m_hold = la->la_hold; 1092f3bfa7d1SAlexander V. Chernikov la->la_hold = NULL; 1093f3bfa7d1SAlexander V. Chernikov la->la_numheld = 0; 1094f3bfa7d1SAlexander V. Chernikov lltable_fill_sa_entry(la, &sa); 1095f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1096f3bfa7d1SAlexander V. Chernikov for (; m_hold != NULL; m_hold = m_hold_next) { 1097f3bfa7d1SAlexander V. Chernikov m_hold_next = m_hold->m_nextpkt; 1098f3bfa7d1SAlexander V. Chernikov m_hold->m_nextpkt = NULL; 1099f3bfa7d1SAlexander V. Chernikov /* Avoid confusing lower layers. */ 1100f3bfa7d1SAlexander V. Chernikov m_clrprotoflags(m_hold); 1101f3bfa7d1SAlexander V. Chernikov (*ifp->if_output)(ifp, m_hold, &sa, NULL); 1102f3bfa7d1SAlexander V. Chernikov } 1103f3bfa7d1SAlexander V. Chernikov } else 1104f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1105f3bfa7d1SAlexander V. Chernikov } 1106f3bfa7d1SAlexander V. Chernikov 1107f3bfa7d1SAlexander V. Chernikov static void 1108f3bfa7d1SAlexander V. Chernikov arp_mark_lle_reachable(struct llentry *la) 1109f3bfa7d1SAlexander V. Chernikov { 1110f8aee88fSAlexander V. Chernikov int canceled, wtime; 1111f3bfa7d1SAlexander V. Chernikov 1112f3bfa7d1SAlexander V. Chernikov LLE_WLOCK_ASSERT(la); 1113f3bfa7d1SAlexander V. Chernikov 1114f8aee88fSAlexander V. Chernikov la->ln_state = ARP_LLINFO_REACHABLE; 1115f3bfa7d1SAlexander V. Chernikov EVENTHANDLER_INVOKE(lle_event, la, LLENTRY_RESOLVED); 1116f3bfa7d1SAlexander V. Chernikov 1117f3bfa7d1SAlexander V. Chernikov if (!(la->la_flags & LLE_STATIC)) { 1118f3bfa7d1SAlexander V. Chernikov LLE_ADDREF(la); 1119f3bfa7d1SAlexander V. Chernikov la->la_expire = time_uptime + V_arpt_keep; 1120f8aee88fSAlexander V. Chernikov wtime = V_arpt_keep - V_arp_maxtries * V_arpt_rexmit; 1121f8aee88fSAlexander V. Chernikov if (wtime < 0) 1122f8aee88fSAlexander V. Chernikov wtime = V_arpt_keep; 1123f3bfa7d1SAlexander V. Chernikov canceled = callout_reset(&la->lle_timer, 1124f8aee88fSAlexander V. Chernikov hz * wtime, arptimer, la); 1125f3bfa7d1SAlexander V. Chernikov if (canceled) 1126f3bfa7d1SAlexander V. Chernikov LLE_REMREF(la); 1127f3bfa7d1SAlexander V. Chernikov } 1128f3bfa7d1SAlexander V. Chernikov la->la_asked = 0; 1129f3bfa7d1SAlexander V. Chernikov la->la_preempt = V_arp_maxtries; 1130f3bfa7d1SAlexander V. Chernikov } 1131f3bfa7d1SAlexander V. Chernikov 11321c302b58SAlexander V. Chernikov /* 11331c302b58SAlexander V. Chernikov * Add pernament link-layer record for given interface address. 11341c302b58SAlexander V. Chernikov */ 11351c302b58SAlexander V. Chernikov static __noinline void 11361c302b58SAlexander V. Chernikov arp_add_ifa_lle(struct ifnet *ifp, const struct sockaddr *dst) 1137dd2e4102SGarrett Wollman { 11385a255516SAlexander V. Chernikov struct llentry *lle, *lle_tmp; 11395a255516SAlexander V. Chernikov 11406e6b3f7cSQing Li /* 11415a255516SAlexander V. Chernikov * Interface address LLE record is considered static 11425a255516SAlexander V. Chernikov * because kernel code relies on LLE_STATIC flag to check 11435a255516SAlexander V. Chernikov * if these entries can be rewriten by arp updates. 11446e6b3f7cSQing Li */ 11455a255516SAlexander V. Chernikov lle = lltable_alloc_entry(LLTABLE(ifp), LLE_IFADDR | LLE_STATIC, dst); 11465a255516SAlexander V. Chernikov if (lle == NULL) { 11476e6b3f7cSQing Li log(LOG_INFO, "arp_ifinit: cannot create arp " 11486e6b3f7cSQing Li "entry for interface address\n"); 11495a255516SAlexander V. Chernikov return; 1150ce9122fdSQing Li } 11515a255516SAlexander V. Chernikov 11525a255516SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 11535a255516SAlexander V. Chernikov LLE_WLOCK(lle); 11545a255516SAlexander V. Chernikov /* Unlink any entry if exists */ 11555a255516SAlexander V. Chernikov lle_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 11565a255516SAlexander V. Chernikov if (lle_tmp != NULL) 11575a255516SAlexander V. Chernikov lltable_unlink_entry(LLTABLE(ifp), lle_tmp); 11585a255516SAlexander V. Chernikov 11595a255516SAlexander V. Chernikov lltable_link_entry(LLTABLE(ifp), lle); 11605a255516SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 11615a255516SAlexander V. Chernikov 11625a255516SAlexander V. Chernikov if (lle_tmp != NULL) 11635a255516SAlexander V. Chernikov EVENTHANDLER_INVOKE(lle_event, lle_tmp, LLENTRY_EXPIRED); 11645a255516SAlexander V. Chernikov 11655a255516SAlexander V. Chernikov EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_RESOLVED); 11665a255516SAlexander V. Chernikov LLE_WUNLOCK(lle); 11675a255516SAlexander V. Chernikov if (lle_tmp != NULL) 11685a255516SAlexander V. Chernikov lltable_free_entry(LLTABLE(ifp), lle_tmp); 1169dd2e4102SGarrett Wollman } 1170df5e1987SJonathan Lemon 1171a9771948SGleb Smirnoff void 11721c302b58SAlexander V. Chernikov arp_ifinit(struct ifnet *ifp, struct ifaddr *ifa) 1173a9771948SGleb Smirnoff { 11741c302b58SAlexander V. Chernikov const struct sockaddr_in *dst_in; 11751c302b58SAlexander V. Chernikov const struct sockaddr *dst; 11761c302b58SAlexander V. Chernikov 11771c302b58SAlexander V. Chernikov if (ifa->ifa_carp != NULL) 11781c302b58SAlexander V. Chernikov return; 11791c302b58SAlexander V. Chernikov 11801c302b58SAlexander V. Chernikov dst = ifa->ifa_addr; 11811c302b58SAlexander V. Chernikov dst_in = (const struct sockaddr_in *)dst; 11821c302b58SAlexander V. Chernikov 11831c302b58SAlexander V. Chernikov if (ntohl(dst_in->sin_addr.s_addr) == INADDR_ANY) 11841c302b58SAlexander V. Chernikov return; 1185*52e53e2dSSteven Hartland arp_announce_addr(ifp, &dst_in->sin_addr, IF_LLADDR(ifp)); 11861c302b58SAlexander V. Chernikov 11871c302b58SAlexander V. Chernikov arp_add_ifa_lle(ifp, dst); 11881c302b58SAlexander V. Chernikov } 11891c302b58SAlexander V. Chernikov 1190*52e53e2dSSteven Hartland void __noinline 1191*52e53e2dSSteven Hartland arp_announce_addr(struct ifnet *ifp, const struct in_addr *addr, u_char *enaddr) 11921c302b58SAlexander V. Chernikov { 11931c302b58SAlexander V. Chernikov 1194*52e53e2dSSteven Hartland if (ntohl(addr->s_addr) != INADDR_ANY) 1195*52e53e2dSSteven Hartland arprequest(ifp, addr, addr, enaddr); 1196a9771948SGleb Smirnoff } 1197a9771948SGleb Smirnoff 1198b13c5b5dSAlexander V. Chernikov /* 1199*52e53e2dSSteven Hartland * Send gratuitous ARPs for all interfaces addresses to notify other nodes of 1200*52e53e2dSSteven Hartland * changes. 1201*52e53e2dSSteven Hartland * 1202*52e53e2dSSteven Hartland * This is a noop if the interface isn't up or has been flagged for no ARP. 1203b13c5b5dSAlexander V. Chernikov */ 1204*52e53e2dSSteven Hartland void __noinline 1205*52e53e2dSSteven Hartland arp_announce(struct ifnet *ifp) 1206b13c5b5dSAlexander V. Chernikov { 1207*52e53e2dSSteven Hartland int i, cnt, entries; 1208*52e53e2dSSteven Hartland u_char *lladdr; 1209b13c5b5dSAlexander V. Chernikov struct ifaddr *ifa; 1210*52e53e2dSSteven Hartland struct in_addr *addr, *head; 1211b13c5b5dSAlexander V. Chernikov 1212*52e53e2dSSteven Hartland if (!(ifp->if_flags & IFF_UP) || (ifp->if_flags & IFF_NOARP)) 1213*52e53e2dSSteven Hartland return; 1214*52e53e2dSSteven Hartland 1215*52e53e2dSSteven Hartland entries = 8; 1216*52e53e2dSSteven Hartland cnt = 0; 1217*52e53e2dSSteven Hartland head = malloc(sizeof(*addr) * entries, M_TEMP, M_NOWAIT); 1218*52e53e2dSSteven Hartland if (head == NULL) { 1219*52e53e2dSSteven Hartland log(LOG_INFO, "arp_announce: malloc %d entries failed\n", 1220*52e53e2dSSteven Hartland entries); 1221*52e53e2dSSteven Hartland return; 1222b13c5b5dSAlexander V. Chernikov } 1223*52e53e2dSSteven Hartland 1224*52e53e2dSSteven Hartland /* Take a copy then process to avoid locking issues. */ 1225*52e53e2dSSteven Hartland IF_ADDR_RLOCK(ifp); 1226*52e53e2dSSteven Hartland TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 1227*52e53e2dSSteven Hartland if (ifa->ifa_addr->sa_family != AF_INET) 1228*52e53e2dSSteven Hartland continue; 1229*52e53e2dSSteven Hartland 1230*52e53e2dSSteven Hartland if (cnt == entries) { 1231*52e53e2dSSteven Hartland addr = (struct in_addr *)realloc(head, sizeof(*addr) * 1232*52e53e2dSSteven Hartland (entries + 8), M_TEMP, M_NOWAIT); 1233*52e53e2dSSteven Hartland if (addr == NULL) { 1234*52e53e2dSSteven Hartland log(LOG_INFO, "arp_announce: realloc to %d " 1235*52e53e2dSSteven Hartland "entries failed\n", entries + 8); 1236*52e53e2dSSteven Hartland /* Process what we have. */ 1237*52e53e2dSSteven Hartland break; 1238*52e53e2dSSteven Hartland } 1239*52e53e2dSSteven Hartland entries += 8; 1240*52e53e2dSSteven Hartland head = addr; 1241*52e53e2dSSteven Hartland } 1242*52e53e2dSSteven Hartland 1243*52e53e2dSSteven Hartland addr = head + cnt; 1244*52e53e2dSSteven Hartland bcopy(IFA_IN(ifa), addr, sizeof(*addr)); 1245*52e53e2dSSteven Hartland cnt++; 1246*52e53e2dSSteven Hartland } 1247*52e53e2dSSteven Hartland IF_ADDR_RUNLOCK(ifp); 1248*52e53e2dSSteven Hartland 1249*52e53e2dSSteven Hartland lladdr = IF_LLADDR(ifp); 1250*52e53e2dSSteven Hartland for (i = 0; i < cnt; i++) { 1251*52e53e2dSSteven Hartland arp_announce_addr(ifp, head + i, lladdr); 1252*52e53e2dSSteven Hartland } 1253*52e53e2dSSteven Hartland free(head, M_TEMP); 1254b13c5b5dSAlexander V. Chernikov } 1255b13c5b5dSAlexander V. Chernikov 1256b13c5b5dSAlexander V. Chernikov /* 1257*52e53e2dSSteven Hartland * A handler for interface linkstate change events. 1258*52e53e2dSSteven Hartland */ 1259*52e53e2dSSteven Hartland static void 1260*52e53e2dSSteven Hartland arp_ifnet_link_event(void *arg __unused, struct ifnet *ifp, int linkstate) 1261*52e53e2dSSteven Hartland { 1262*52e53e2dSSteven Hartland 1263*52e53e2dSSteven Hartland if (linkstate == LINK_STATE_UP && V_arp_on_link) 1264*52e53e2dSSteven Hartland arp_announce(ifp); 1265*52e53e2dSSteven Hartland } 1266*52e53e2dSSteven Hartland 1267*52e53e2dSSteven Hartland /* 1268*52e53e2dSSteven Hartland * A handler for interface link layer address change events. 1269b13c5b5dSAlexander V. Chernikov */ 1270b13c5b5dSAlexander V. Chernikov static __noinline void 1271b13c5b5dSAlexander V. Chernikov arp_iflladdr(void *arg __unused, struct ifnet *ifp) 1272b13c5b5dSAlexander V. Chernikov { 1273b13c5b5dSAlexander V. Chernikov 1274*52e53e2dSSteven Hartland arp_announce(ifp); 1275b13c5b5dSAlexander V. Chernikov } 1276b13c5b5dSAlexander V. Chernikov 12771ed81b73SMarko Zec static void 12781ed81b73SMarko Zec arp_init(void) 12791ed81b73SMarko Zec { 12801ed81b73SMarko Zec 1281d4b5cae4SRobert Watson netisr_register(&arp_nh); 1282*52e53e2dSSteven Hartland 1283*52e53e2dSSteven Hartland if (IS_DEFAULT_VNET(curvnet)) { 1284b13c5b5dSAlexander V. Chernikov iflladdr_tag = EVENTHANDLER_REGISTER(iflladdr_event, 1285b13c5b5dSAlexander V. Chernikov arp_iflladdr, NULL, EVENTHANDLER_PRI_ANY); 1286*52e53e2dSSteven Hartland ifnet_link_event_tag = EVENTHANDLER_REGISTER(ifnet_link_event, 1287*52e53e2dSSteven Hartland arp_ifnet_link_event, 0, EVENTHANDLER_PRI_ANY); 1288*52e53e2dSSteven Hartland } 1289df5e1987SJonathan Lemon } 1290df5e1987SJonathan Lemon SYSINIT(arp, SI_SUB_PROTO_DOMAIN, SI_ORDER_ANY, arp_init, 0); 1291