xref: /freebsd/sys/netinet/if_ether.c (revision ea17754c5aa6b4f0ccc8f53b6a72ced5ca223abf)
1c398230bSWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1988, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
6df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
7df8bae1dSRodney W. Grimes  * are met:
8df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
9df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
10df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
12df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
13df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
14df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
15df8bae1dSRodney W. Grimes  *    without specific prior written permission.
16df8bae1dSRodney W. Grimes  *
17df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
28df8bae1dSRodney W. Grimes  *
29df8bae1dSRodney W. Grimes  *	@(#)if_ether.c	8.1 (Berkeley) 6/10/93
30df8bae1dSRodney W. Grimes  */
31df8bae1dSRodney W. Grimes 
32df8bae1dSRodney W. Grimes /*
33df8bae1dSRodney W. Grimes  * Ethernet address resolution protocol.
34df8bae1dSRodney W. Grimes  * TODO:
35df8bae1dSRodney W. Grimes  *	add "inuse/lock" bit (or ref. count) along with valid bit
36df8bae1dSRodney W. Grimes  */
37df8bae1dSRodney W. Grimes 
384b421e2dSMike Silbersack #include <sys/cdefs.h>
394b421e2dSMike Silbersack __FBSDID("$FreeBSD$");
404b421e2dSMike Silbersack 
411d5e9e22SEivind Eklund #include "opt_inet.h"
421d5e9e22SEivind Eklund 
43df8bae1dSRodney W. Grimes #include <sys/param.h>
44df8bae1dSRodney W. Grimes #include <sys/kernel.h>
45cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h>
46ce02431fSDoug Rabson #include <sys/queue.h>
47885f1aa4SPoul-Henning Kamp #include <sys/sysctl.h>
48885f1aa4SPoul-Henning Kamp #include <sys/systm.h>
49885f1aa4SPoul-Henning Kamp #include <sys/mbuf.h>
50885f1aa4SPoul-Henning Kamp #include <sys/malloc.h>
51de34ad3fSJulian Elischer #include <sys/proc.h>
52cc0a3c8cSAndrey V. Elsukov #include <sys/rmlock.h>
534458ac71SBruce Evans #include <sys/socket.h>
54885f1aa4SPoul-Henning Kamp #include <sys/syslog.h>
55df8bae1dSRodney W. Grimes 
56df8bae1dSRodney W. Grimes #include <net/if.h>
5776039bc8SGleb Smirnoff #include <net/if_var.h>
58df8bae1dSRodney W. Grimes #include <net/if_dl.h>
59722012ccSJulian Elischer #include <net/if_types.h>
60748e0b0aSGarrett Wollman #include <net/netisr.h>
61c8f8e9c1SJulian Elischer #include <net/ethernet.h>
625736e6fbSBjoern A. Zeeb #include <net/route.h>
63530c0060SRobert Watson #include <net/vnet.h>
64df8bae1dSRodney W. Grimes 
65df8bae1dSRodney W. Grimes #include <netinet/in.h>
669977be4aSAlexander V. Chernikov #include <netinet/in_fib.h>
67df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
686e6b3f7cSQing Li #include <net/if_llatbl.h>
69df8bae1dSRodney W. Grimes #include <netinet/if_ether.h>
7083e521ecSBjoern A. Zeeb #ifdef INET
719963e8a5SWill Andrews #include <netinet/ip_carp.h>
729963e8a5SWill Andrews #endif
73df8bae1dSRodney W. Grimes 
74aed55708SRobert Watson #include <security/mac/mac_framework.h>
75aed55708SRobert Watson 
7647e8d432SGleb Smirnoff #define SIN(s) ((const struct sockaddr_in *)(s))
77eec33ea0SAlexander V. Chernikov 
78eec33ea0SAlexander V. Chernikov static struct timeval arp_lastlog;
79eec33ea0SAlexander V. Chernikov static int arp_curpps;
80eec33ea0SAlexander V. Chernikov static int arp_maxpps = 1;
81df8bae1dSRodney W. Grimes 
82f8aee88fSAlexander V. Chernikov /* Simple ARP state machine */
83f8aee88fSAlexander V. Chernikov enum arp_llinfo_state {
84f8aee88fSAlexander V. Chernikov 	ARP_LLINFO_INCOMPLETE = 0, /* No LLE data */
85f8aee88fSAlexander V. Chernikov 	ARP_LLINFO_REACHABLE,	/* LLE is valid */
86f8aee88fSAlexander V. Chernikov 	ARP_LLINFO_VERIFY,	/* LLE is valid, need refresh */
87f8aee88fSAlexander V. Chernikov 	ARP_LLINFO_DELETED,	/* LLE is deleted */
88f8aee88fSAlexander V. Chernikov };
89f8aee88fSAlexander V. Chernikov 
90ce02431fSDoug Rabson SYSCTL_DECL(_net_link_ether);
916472ac3dSEd Schouten static SYSCTL_NODE(_net_link_ether, PF_INET, inet, CTLFLAG_RW, 0, "");
926472ac3dSEd Schouten static SYSCTL_NODE(_net_link_ether, PF_ARP, arp, CTLFLAG_RW, 0, "");
93df8bae1dSRodney W. Grimes 
94df8bae1dSRodney W. Grimes /* timer values */
953e288e62SDimitry Andric static VNET_DEFINE(int, arpt_keep) = (20*60);	/* once resolved, good for 20
96eddfbb76SRobert Watson 						 * minutes */
973e288e62SDimitry Andric static VNET_DEFINE(int, arp_maxtries) = 5;
983e288e62SDimitry Andric static VNET_DEFINE(int, arp_proxyall) = 0;
993e288e62SDimitry Andric static VNET_DEFINE(int, arpt_down) = 20;	/* keep incomplete entries for
10093704ac5SQing Li 						 * 20 seconds */
101f8aee88fSAlexander V. Chernikov static VNET_DEFINE(int, arpt_rexmit) = 1;	/* retransmit arp entries, sec*/
1025b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_DEFINE(struct arpstat, arpstat);  /* ARP statistics, see if_arp.h */
1035b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_SYSINIT(arpstat);
1045b7cb97cSAndrey V. Elsukov 
1055b7cb97cSAndrey V. Elsukov #ifdef VIMAGE
1065b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_SYSUNINIT(arpstat);
1075b7cb97cSAndrey V. Elsukov #endif /* VIMAGE */
108e162ea60SGeorge V. Neville-Neil 
1093e288e62SDimitry Andric static VNET_DEFINE(int, arp_maxhold) = 1;
110885f1aa4SPoul-Henning Kamp 
1111e77c105SRobert Watson #define	V_arpt_keep		VNET(arpt_keep)
11293704ac5SQing Li #define	V_arpt_down		VNET(arpt_down)
113f8aee88fSAlexander V. Chernikov #define	V_arpt_rexmit		VNET(arpt_rexmit)
1141e77c105SRobert Watson #define	V_arp_maxtries		VNET(arp_maxtries)
1151e77c105SRobert Watson #define	V_arp_proxyall		VNET(arp_proxyall)
116e162ea60SGeorge V. Neville-Neil #define	V_arp_maxhold		VNET(arp_maxhold)
117885f1aa4SPoul-Henning Kamp 
1186df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, max_age, CTLFLAG_VNET | CTLFLAG_RW,
119eddfbb76SRobert Watson 	&VNET_NAME(arpt_keep), 0,
120eddfbb76SRobert Watson 	"ARP entry lifetime in seconds");
1216df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, maxtries, CTLFLAG_VNET | CTLFLAG_RW,
122eddfbb76SRobert Watson 	&VNET_NAME(arp_maxtries), 0,
1238b615593SMarko Zec 	"ARP resolution attempts before returning error");
1246df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, proxyall, CTLFLAG_VNET | CTLFLAG_RW,
125eddfbb76SRobert Watson 	&VNET_NAME(arp_proxyall), 0,
1268b615593SMarko Zec 	"Enable proxy ARP for all suitable requests");
1276df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, wait, CTLFLAG_VNET | CTLFLAG_RW,
128e162ea60SGeorge V. Neville-Neil 	&VNET_NAME(arpt_down), 0,
129e162ea60SGeorge V. Neville-Neil 	"Incomplete ARP entry lifetime in seconds");
1305b7cb97cSAndrey V. Elsukov SYSCTL_VNET_PCPUSTAT(_net_link_ether_arp, OID_AUTO, stats, struct arpstat,
1315b7cb97cSAndrey V. Elsukov     arpstat, "ARP statistics (struct arpstat, net/if_arp.h)");
1326df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, maxhold, CTLFLAG_VNET | CTLFLAG_RW,
133e162ea60SGeorge V. Neville-Neil 	&VNET_NAME(arp_maxhold), 0,
134e162ea60SGeorge V. Neville-Neil 	"Number of packets to hold per ARP entry");
135eec33ea0SAlexander V. Chernikov SYSCTL_INT(_net_link_ether_inet, OID_AUTO, max_log_per_second,
136eec33ea0SAlexander V. Chernikov 	CTLFLAG_RW, &arp_maxpps, 0,
137eec33ea0SAlexander V. Chernikov 	"Maximum number of remotely triggered ARP messages that can be "
138eec33ea0SAlexander V. Chernikov 	"logged per second");
139eec33ea0SAlexander V. Chernikov 
140eec33ea0SAlexander V. Chernikov #define	ARP_LOG(pri, ...)	do {					\
141eec33ea0SAlexander V. Chernikov 	if (ppsratecheck(&arp_lastlog, &arp_curpps, arp_maxpps))	\
142eec33ea0SAlexander V. Chernikov 		log((pri), "arp: " __VA_ARGS__);			\
143eec33ea0SAlexander V. Chernikov } while (0)
144eec33ea0SAlexander V. Chernikov 
145885f1aa4SPoul-Henning Kamp 
1461cafed39SJonathan Lemon static void	arpintr(struct mbuf *);
1474d77a549SAlfred Perlstein static void	arptimer(void *);
1481d5e9e22SEivind Eklund #ifdef INET
1494d77a549SAlfred Perlstein static void	in_arpinput(struct mbuf *);
1501d5e9e22SEivind Eklund #endif
15128e82295SGarrett Wollman 
152f3bfa7d1SAlexander V. Chernikov static void arp_check_update_lle(struct arphdr *ah, struct in_addr isaddr,
153f3bfa7d1SAlexander V. Chernikov     struct ifnet *ifp, int bridged, struct llentry *la);
154f3bfa7d1SAlexander V. Chernikov static void arp_mark_lle_reachable(struct llentry *la);
155b13c5b5dSAlexander V. Chernikov static void arp_iflladdr(void *arg __unused, struct ifnet *ifp);
156f3bfa7d1SAlexander V. Chernikov 
157b13c5b5dSAlexander V. Chernikov static eventhandler_tag iflladdr_tag;
158f3bfa7d1SAlexander V. Chernikov 
159d4b5cae4SRobert Watson static const struct netisr_handler arp_nh = {
160d4b5cae4SRobert Watson 	.nh_name = "arp",
161d4b5cae4SRobert Watson 	.nh_handler = arpintr,
162d4b5cae4SRobert Watson 	.nh_proto = NETISR_ARP,
163d4b5cae4SRobert Watson 	.nh_policy = NETISR_POLICY_SOURCE,
164d4b5cae4SRobert Watson };
165d4b5cae4SRobert Watson 
1666e6b3f7cSQing Li /*
1676e6b3f7cSQing Li  * Timeout routine.  Age arp_tab entries periodically.
168df8bae1dSRodney W. Grimes  */
169df8bae1dSRodney W. Grimes static void
1701daaa65dSGleb Smirnoff arptimer(void *arg)
171df8bae1dSRodney W. Grimes {
172ea537929SGleb Smirnoff 	struct llentry *lle = (struct llentry *)arg;
1736e6b3f7cSQing Li 	struct ifnet *ifp;
174f8aee88fSAlexander V. Chernikov 	int r_skip_req;
175df8bae1dSRodney W. Grimes 
176ea537929SGleb Smirnoff 	if (lle->la_flags & LLE_STATIC) {
1772575fbb8SRandall Stewart 		return;
1782575fbb8SRandall Stewart 	}
1792575fbb8SRandall Stewart 	LLE_WLOCK(lle);
1800447c136SAlexander V. Chernikov 	if (callout_pending(&lle->lle_timer)) {
1812575fbb8SRandall Stewart 		/*
1822575fbb8SRandall Stewart 		 * Here we are a bit odd here in the treatment of
1832575fbb8SRandall Stewart 		 * active/pending. If the pending bit is set, it got
1842575fbb8SRandall Stewart 		 * rescheduled before I ran. The active
1852575fbb8SRandall Stewart 		 * bit we ignore, since if it was stopped
1862575fbb8SRandall Stewart 		 * in ll_tablefree() and was currently running
1872575fbb8SRandall Stewart 		 * it would have return 0 so the code would
1882575fbb8SRandall Stewart 		 * not have deleted it since the callout could
1892575fbb8SRandall Stewart 		 * not be stopped so we want to go through
1902575fbb8SRandall Stewart 		 * with the delete here now. If the callout
1912575fbb8SRandall Stewart 		 * was restarted, the pending bit will be back on and
1922575fbb8SRandall Stewart 		 * we just want to bail since the callout_reset would
1932575fbb8SRandall Stewart 		 * return 1 and our reference would have been removed
1942575fbb8SRandall Stewart 		 * by arpresolve() below.
1952575fbb8SRandall Stewart 		 */
196ea537929SGleb Smirnoff 		LLE_WUNLOCK(lle);
197ea537929SGleb Smirnoff  		return;
198ea537929SGleb Smirnoff  	}
1996e6b3f7cSQing Li 	ifp = lle->lle_tbl->llt_ifp;
20054fc657dSGeorge V. Neville-Neil 	CURVNET_SET(ifp->if_vnet);
20109fe6320SNavdeep Parhar 
202f8aee88fSAlexander V. Chernikov 	switch (lle->ln_state) {
203f8aee88fSAlexander V. Chernikov 	case ARP_LLINFO_REACHABLE:
204f8aee88fSAlexander V. Chernikov 
205f8aee88fSAlexander V. Chernikov 		/*
206f8aee88fSAlexander V. Chernikov 		 * Expiration time is approaching.
207f8aee88fSAlexander V. Chernikov 		 * Let's try to refresh entry if it is still
208f8aee88fSAlexander V. Chernikov 		 * in use.
209f8aee88fSAlexander V. Chernikov 		 *
210f8aee88fSAlexander V. Chernikov 		 * Set r_skip_req to get feedback from
211f8aee88fSAlexander V. Chernikov 		 * fast path. Change state and re-schedule
212f8aee88fSAlexander V. Chernikov 		 * ourselves.
213f8aee88fSAlexander V. Chernikov 		 */
214f8aee88fSAlexander V. Chernikov 		LLE_REQ_LOCK(lle);
215f8aee88fSAlexander V. Chernikov 		lle->r_skip_req = 1;
216f8aee88fSAlexander V. Chernikov 		LLE_REQ_UNLOCK(lle);
217f8aee88fSAlexander V. Chernikov 		lle->ln_state = ARP_LLINFO_VERIFY;
218f8aee88fSAlexander V. Chernikov 		callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit);
219f8aee88fSAlexander V. Chernikov 		LLE_WUNLOCK(lle);
220f8aee88fSAlexander V. Chernikov 		CURVNET_RESTORE();
221f8aee88fSAlexander V. Chernikov 		return;
222f8aee88fSAlexander V. Chernikov 	case ARP_LLINFO_VERIFY:
223f8aee88fSAlexander V. Chernikov 		LLE_REQ_LOCK(lle);
224f8aee88fSAlexander V. Chernikov 		r_skip_req = lle->r_skip_req;
225f8aee88fSAlexander V. Chernikov 		LLE_REQ_UNLOCK(lle);
226f8aee88fSAlexander V. Chernikov 
227f8aee88fSAlexander V. Chernikov 		if (r_skip_req == 0 && lle->la_preempt > 0) {
228f8aee88fSAlexander V. Chernikov 			/* Entry was used, issue refresh request */
229f8aee88fSAlexander V. Chernikov 			struct in_addr dst;
230f8aee88fSAlexander V. Chernikov 			dst = lle->r_l3addr.addr4;
231f8aee88fSAlexander V. Chernikov 			lle->la_preempt--;
232f8aee88fSAlexander V. Chernikov 			callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit);
233f8aee88fSAlexander V. Chernikov 			LLE_WUNLOCK(lle);
234f8aee88fSAlexander V. Chernikov 			arprequest(ifp, NULL, &dst, NULL);
235f8aee88fSAlexander V. Chernikov 			CURVNET_RESTORE();
236f8aee88fSAlexander V. Chernikov 			return;
237f8aee88fSAlexander V. Chernikov 		}
238f8aee88fSAlexander V. Chernikov 		/* Nothing happened. Reschedule if not too late */
239f8aee88fSAlexander V. Chernikov 		if (lle->la_expire > time_uptime) {
240f8aee88fSAlexander V. Chernikov 			callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit);
241f8aee88fSAlexander V. Chernikov 			LLE_WUNLOCK(lle);
242f8aee88fSAlexander V. Chernikov 			CURVNET_RESTORE();
243f8aee88fSAlexander V. Chernikov 			return;
244f8aee88fSAlexander V. Chernikov 		}
245f8aee88fSAlexander V. Chernikov 		break;
246f8aee88fSAlexander V. Chernikov 	case ARP_LLINFO_INCOMPLETE:
247f8aee88fSAlexander V. Chernikov 	case ARP_LLINFO_DELETED:
248f8aee88fSAlexander V. Chernikov 		break;
249f8aee88fSAlexander V. Chernikov 	}
250f8aee88fSAlexander V. Chernikov 
251e364d8c4SNavdeep Parhar 	if ((lle->la_flags & LLE_DELETED) == 0) {
25209fe6320SNavdeep Parhar 		int evt;
25309fe6320SNavdeep Parhar 
25409fe6320SNavdeep Parhar 		if (lle->la_flags & LLE_VALID)
25509fe6320SNavdeep Parhar 			evt = LLENTRY_EXPIRED;
25609fe6320SNavdeep Parhar 		else
25709fe6320SNavdeep Parhar 			evt = LLENTRY_TIMEDOUT;
25809fe6320SNavdeep Parhar 		EVENTHANDLER_INVOKE(lle_event, lle, evt);
25909fe6320SNavdeep Parhar 	}
26009fe6320SNavdeep Parhar 
2610447c136SAlexander V. Chernikov 	callout_stop(&lle->lle_timer);
262ea537929SGleb Smirnoff 
263ea537929SGleb Smirnoff 	/* XXX: LOR avoidance. We still have ref on lle. */
264ea537929SGleb Smirnoff 	LLE_WUNLOCK(lle);
265ea537929SGleb Smirnoff 	IF_AFDATA_LOCK(ifp);
266ea537929SGleb Smirnoff 	LLE_WLOCK(lle);
267ea537929SGleb Smirnoff 
268b1ec2940SGleb Smirnoff 	/* Guard against race with other llentry_free(). */
269b1ec2940SGleb Smirnoff 	if (lle->la_flags & LLE_LINKED) {
270ea537929SGleb Smirnoff 		LLE_REMREF(lle);
271d3cdb716SAlexander V. Chernikov 		lltable_unlink_entry(lle->lle_tbl, lle);
272d3cdb716SAlexander V. Chernikov 	}
273b1ec2940SGleb Smirnoff 	IF_AFDATA_UNLOCK(ifp);
274b1ec2940SGleb Smirnoff 
275d3cdb716SAlexander V. Chernikov 	size_t pkts_dropped = llentry_free(lle);
276d3cdb716SAlexander V. Chernikov 
277d3cdb716SAlexander V. Chernikov 	ARPSTAT_ADD(dropped, pkts_dropped);
27854fc657dSGeorge V. Neville-Neil 	ARPSTAT_INC(timeouts);
279b1ec2940SGleb Smirnoff 
28054fc657dSGeorge V. Neville-Neil 	CURVNET_RESTORE();
281df8bae1dSRodney W. Grimes }
282df8bae1dSRodney W. Grimes 
283df8bae1dSRodney W. Grimes /*
2844fb3a820SAlexander V. Chernikov  * Stores link-layer header for @ifp in format suitable for if_output()
2854fb3a820SAlexander V. Chernikov  * into buffer @buf. Resulting header length is stored in @bufsize.
2864fb3a820SAlexander V. Chernikov  *
2874fb3a820SAlexander V. Chernikov  * Returns 0 on success.
2884fb3a820SAlexander V. Chernikov  */
2894fb3a820SAlexander V. Chernikov static int
2904fb3a820SAlexander V. Chernikov arp_fillheader(struct ifnet *ifp, struct arphdr *ah, int bcast, u_char *buf,
2914fb3a820SAlexander V. Chernikov     size_t *bufsize)
2924fb3a820SAlexander V. Chernikov {
2934fb3a820SAlexander V. Chernikov 	struct if_encap_req ereq;
2944fb3a820SAlexander V. Chernikov 	int error;
2954fb3a820SAlexander V. Chernikov 
2964fb3a820SAlexander V. Chernikov 	bzero(buf, *bufsize);
2974fb3a820SAlexander V. Chernikov 	bzero(&ereq, sizeof(ereq));
2984fb3a820SAlexander V. Chernikov 	ereq.buf = buf;
2994fb3a820SAlexander V. Chernikov 	ereq.bufsize = *bufsize;
3004fb3a820SAlexander V. Chernikov 	ereq.rtype = IFENCAP_LL;
3014fb3a820SAlexander V. Chernikov 	ereq.family = AF_ARP;
3024fb3a820SAlexander V. Chernikov 	ereq.lladdr = ar_tha(ah);
3034fb3a820SAlexander V. Chernikov 	ereq.hdata = (u_char *)ah;
3044fb3a820SAlexander V. Chernikov 	if (bcast)
3054fb3a820SAlexander V. Chernikov 		ereq.flags = IFENCAP_FLAG_BROADCAST;
3064fb3a820SAlexander V. Chernikov 	error = ifp->if_requestencap(ifp, &ereq);
3074fb3a820SAlexander V. Chernikov 	if (error == 0)
3084fb3a820SAlexander V. Chernikov 		*bufsize = ereq.bufsize;
3094fb3a820SAlexander V. Chernikov 
3104fb3a820SAlexander V. Chernikov 	return (error);
3114fb3a820SAlexander V. Chernikov }
3124fb3a820SAlexander V. Chernikov 
3134fb3a820SAlexander V. Chernikov 
3144fb3a820SAlexander V. Chernikov /*
315df8bae1dSRodney W. Grimes  * Broadcast an ARP request. Caller specifies:
316df8bae1dSRodney W. Grimes  *	- arp header source ip address
317df8bae1dSRodney W. Grimes  *	- arp header target ip address
318df8bae1dSRodney W. Grimes  *	- arp header source ethernet address
319df8bae1dSRodney W. Grimes  */
3206e6b3f7cSQing Li void
32147e8d432SGleb Smirnoff arprequest(struct ifnet *ifp, const struct in_addr *sip,
32247e8d432SGleb Smirnoff     const struct in_addr *tip, u_char *enaddr)
323df8bae1dSRodney W. Grimes {
324e952fa39SMatthew N. Dodd 	struct mbuf *m;
325e952fa39SMatthew N. Dodd 	struct arphdr *ah;
326df8bae1dSRodney W. Grimes 	struct sockaddr sa;
327aa24ae3cSGleb Smirnoff 	u_char *carpaddr = NULL;
3284fb3a820SAlexander V. Chernikov 	uint8_t linkhdr[LLE_MAX_LINKHDR];
3294fb3a820SAlexander V. Chernikov 	size_t linkhdrsize;
3304fb3a820SAlexander V. Chernikov 	struct route ro;
3314fb3a820SAlexander V. Chernikov 	int error;
332df8bae1dSRodney W. Grimes 
3336e6b3f7cSQing Li 	if (sip == NULL) {
3346e6b3f7cSQing Li 		/*
3356e6b3f7cSQing Li 		 * The caller did not supply a source address, try to find
3366e6b3f7cSQing Li 		 * a compatible one among those assigned to this interface.
3376e6b3f7cSQing Li 		 */
3386e6b3f7cSQing Li 		struct ifaddr *ifa;
3396e6b3f7cSQing Li 
340aa24ae3cSGleb Smirnoff 		IF_ADDR_RLOCK(ifp);
3416e6b3f7cSQing Li 		TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
342aa24ae3cSGleb Smirnoff 			if (ifa->ifa_addr->sa_family != AF_INET)
3436e6b3f7cSQing Li 				continue;
344aa24ae3cSGleb Smirnoff 
345aa24ae3cSGleb Smirnoff 			if (ifa->ifa_carp) {
346aa24ae3cSGleb Smirnoff 				if ((*carp_iamatch_p)(ifa, &carpaddr) == 0)
347aa24ae3cSGleb Smirnoff 					continue;
348aa24ae3cSGleb Smirnoff 				sip = &IA_SIN(ifa)->sin_addr;
349aa24ae3cSGleb Smirnoff 			} else {
350aa24ae3cSGleb Smirnoff 				carpaddr = NULL;
351aa24ae3cSGleb Smirnoff 				sip = &IA_SIN(ifa)->sin_addr;
352aa24ae3cSGleb Smirnoff 			}
353aa24ae3cSGleb Smirnoff 
3546e6b3f7cSQing Li 			if (0 == ((sip->s_addr ^ tip->s_addr) &
355aa24ae3cSGleb Smirnoff 			    IA_MASKSIN(ifa)->sin_addr.s_addr))
3566e6b3f7cSQing Li 				break;  /* found it. */
3576e6b3f7cSQing Li 		}
358aa24ae3cSGleb Smirnoff 		IF_ADDR_RUNLOCK(ifp);
3596e6b3f7cSQing Li 		if (sip == NULL) {
3606e6b3f7cSQing Li 			printf("%s: cannot find matching address\n", __func__);
3616e6b3f7cSQing Li 			return;
3626e6b3f7cSQing Li 		}
3636e6b3f7cSQing Li 	}
364aa24ae3cSGleb Smirnoff 	if (enaddr == NULL)
365aa24ae3cSGleb Smirnoff 		enaddr = carpaddr ? carpaddr : (u_char *)IF_LLADDR(ifp);
3666e6b3f7cSQing Li 
367eb1b1807SGleb Smirnoff 	if ((m = m_gethdr(M_NOWAIT, MT_DATA)) == NULL)
368df8bae1dSRodney W. Grimes 		return;
36964bf80ceSMatthew N. Dodd 	m->m_len = sizeof(*ah) + 2 * sizeof(struct in_addr) +
370546451a2SGleb Smirnoff 		2 * ifp->if_addrlen;
37164bf80ceSMatthew N. Dodd 	m->m_pkthdr.len = m->m_len;
372ed6a66caSRobert Watson 	M_ALIGN(m, m->m_len);
37364bf80ceSMatthew N. Dodd 	ah = mtod(m, struct arphdr *);
37464bf80ceSMatthew N. Dodd 	bzero((caddr_t)ah, m->m_len);
37519527d3eSRobert Watson #ifdef MAC
376b9b0dac3SRobert Watson 	mac_netinet_arp_send(ifp, m);
37719527d3eSRobert Watson #endif
378322dcb8dSMax Khon 	ah->ar_pro = htons(ETHERTYPE_IP);
379322dcb8dSMax Khon 	ah->ar_hln = ifp->if_addrlen;		/* hardware address length */
380322dcb8dSMax Khon 	ah->ar_pln = sizeof(struct in_addr);	/* protocol address length */
381322dcb8dSMax Khon 	ah->ar_op = htons(ARPOP_REQUEST);
38247e8d432SGleb Smirnoff 	bcopy(enaddr, ar_sha(ah), ah->ar_hln);
38347e8d432SGleb Smirnoff 	bcopy(sip, ar_spa(ah), ah->ar_pln);
38447e8d432SGleb Smirnoff 	bcopy(tip, ar_tpa(ah), ah->ar_pln);
38564bf80ceSMatthew N. Dodd 	sa.sa_family = AF_ARP;
38664bf80ceSMatthew N. Dodd 	sa.sa_len = 2;
3874fb3a820SAlexander V. Chernikov 
3884fb3a820SAlexander V. Chernikov 	/* Calculate link header for sending frame */
3894fb3a820SAlexander V. Chernikov 	bzero(&ro, sizeof(ro));
3904fb3a820SAlexander V. Chernikov 	linkhdrsize = sizeof(linkhdr);
3914fb3a820SAlexander V. Chernikov 	error = arp_fillheader(ifp, ah, 1, linkhdr, &linkhdrsize);
3924fb3a820SAlexander V. Chernikov 	if (error != 0 && error != EAFNOSUPPORT) {
3934fb3a820SAlexander V. Chernikov 		ARP_LOG(LOG_ERR, "Failed to calculate ARP header on %s: %d\n",
3944fb3a820SAlexander V. Chernikov 		    if_name(ifp), error);
3954fb3a820SAlexander V. Chernikov 		return;
3964fb3a820SAlexander V. Chernikov 	}
3974fb3a820SAlexander V. Chernikov 
3984fb3a820SAlexander V. Chernikov 	ro.ro_prepend = linkhdr;
3994fb3a820SAlexander V. Chernikov 	ro.ro_plen = linkhdrsize;
4004fb3a820SAlexander V. Chernikov 	ro.ro_flags = 0;
4014fb3a820SAlexander V. Chernikov 
40264bf80ceSMatthew N. Dodd 	m->m_flags |= M_BCAST;
40386bd0491SAndre Oppermann 	m_clrprotoflags(m);	/* Avoid confusing lower layers. */
4044fb3a820SAlexander V. Chernikov 	(*ifp->if_output)(ifp, m, &sa, &ro);
40554fc657dSGeorge V. Neville-Neil 	ARPSTAT_INC(txrequests);
406df8bae1dSRodney W. Grimes }
407df8bae1dSRodney W. Grimes 
4084fb3a820SAlexander V. Chernikov 
409df8bae1dSRodney W. Grimes /*
410512e30efSAlexander V. Chernikov  * Resolve an IP address into an ethernet address - heavy version.
411512e30efSAlexander V. Chernikov  * Used internally by arpresolve().
412512e30efSAlexander V. Chernikov  * We have already checked than  we can't use existing lle without
413512e30efSAlexander V. Chernikov  * modification so we have to acquire LLE_EXCLUSIVE lle lock.
414cd46a114SLuigi Rizzo  *
41574860d4fSAlexander V. Chernikov  * On success, desten and flags are filled in and the function returns 0;
416cd46a114SLuigi Rizzo  * If the packet must be held pending resolution, we return EWOULDBLOCK
417cd46a114SLuigi Rizzo  * On other errors, we return the corresponding error code.
418b6ae6984SJulian Elischer  * Note that m_freem() handles NULL.
419df8bae1dSRodney W. Grimes  */
420512e30efSAlexander V. Chernikov static int
4214fb3a820SAlexander V. Chernikov arpresolve_full(struct ifnet *ifp, int is_gw, int flags, struct mbuf *m,
4226d768226SGeorge V. Neville-Neil 	const struct sockaddr *dst, u_char *desten, uint32_t *pflags,
4236d768226SGeorge V. Neville-Neil 	struct llentry **plle)
424df8bae1dSRodney W. Grimes {
4255a255516SAlexander V. Chernikov 	struct llentry *la = NULL, *la_tmp;
426e162ea60SGeorge V. Neville-Neil 	struct mbuf *curr = NULL;
427e162ea60SGeorge V. Neville-Neil 	struct mbuf *next = NULL;
428512e30efSAlexander V. Chernikov 	int error, renew;
4294fb3a820SAlexander V. Chernikov 	char *lladdr;
4304fb3a820SAlexander V. Chernikov 	int ll_len;
431df8bae1dSRodney W. Grimes 
43274860d4fSAlexander V. Chernikov 	if (pflags != NULL)
43374860d4fSAlexander V. Chernikov 		*pflags = 0;
4346d768226SGeorge V. Neville-Neil 	if (plle != NULL)
4356d768226SGeorge V. Neville-Neil 		*plle = NULL;
43674860d4fSAlexander V. Chernikov 
4374fb3a820SAlexander V. Chernikov 	if ((flags & LLE_CREATE) == 0) {
43800a46b31SKip Macy 		IF_AFDATA_RLOCK(ifp);
439512e30efSAlexander V. Chernikov 		la = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst);
44000a46b31SKip Macy 		IF_AFDATA_RUNLOCK(ifp);
441512e30efSAlexander V. Chernikov 	}
442512e30efSAlexander V. Chernikov 	if (la == NULL && (ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) == 0) {
4435a255516SAlexander V. Chernikov 		la = lltable_alloc_entry(LLTABLE(ifp), 0, dst);
4441ed7bf1eSGleb Smirnoff 		if (la == NULL) {
4451ed7bf1eSGleb Smirnoff 			log(LOG_DEBUG,
446743c072aSAlan Somers 			    "arpresolve: can't allocate llinfo for %s on %s\n",
4475a255516SAlexander V. Chernikov 			    inet_ntoa(SIN(dst)->sin_addr), if_name(ifp));
4485a255516SAlexander V. Chernikov 			m_freem(m);
4495a255516SAlexander V. Chernikov 			return (EINVAL);
4505a255516SAlexander V. Chernikov 		}
4515a255516SAlexander V. Chernikov 
4525a255516SAlexander V. Chernikov 		IF_AFDATA_WLOCK(ifp);
4535a255516SAlexander V. Chernikov 		LLE_WLOCK(la);
4545a255516SAlexander V. Chernikov 		la_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst);
4555a255516SAlexander V. Chernikov 		/* Prefer ANY existing lle over newly-created one */
4565a255516SAlexander V. Chernikov 		if (la_tmp == NULL)
4575a255516SAlexander V. Chernikov 			lltable_link_entry(LLTABLE(ifp), la);
4585a255516SAlexander V. Chernikov 		IF_AFDATA_WUNLOCK(ifp);
4595a255516SAlexander V. Chernikov 		if (la_tmp != NULL) {
4605a255516SAlexander V. Chernikov 			lltable_free_entry(LLTABLE(ifp), la);
4615a255516SAlexander V. Chernikov 			la = la_tmp;
4625a255516SAlexander V. Chernikov 		}
4635a255516SAlexander V. Chernikov 	}
4645a255516SAlexander V. Chernikov 	if (la == NULL) {
4651ed7bf1eSGleb Smirnoff 		m_freem(m);
4666e6b3f7cSQing Li 		return (EINVAL);
4671ed7bf1eSGleb Smirnoff 	}
468a20e2538SGleb Smirnoff 
4696e6b3f7cSQing Li 	if ((la->la_flags & LLE_VALID) &&
470a98c06f1SGleb Smirnoff 	    ((la->la_flags & LLE_STATIC) || la->la_expire > time_uptime)) {
4714fb3a820SAlexander V. Chernikov 		if (flags & LLE_ADDRONLY) {
4724fb3a820SAlexander V. Chernikov 			lladdr = la->ll_addr;
4734fb3a820SAlexander V. Chernikov 			ll_len = ifp->if_addrlen;
4744fb3a820SAlexander V. Chernikov 		} else {
4754fb3a820SAlexander V. Chernikov 			lladdr = la->r_linkdata;
4764fb3a820SAlexander V. Chernikov 			ll_len = la->r_hdrlen;
4774fb3a820SAlexander V. Chernikov 		}
4784fb3a820SAlexander V. Chernikov 		bcopy(lladdr, desten, ll_len);
479f8aee88fSAlexander V. Chernikov 
480f8aee88fSAlexander V. Chernikov 		/* Check if we have feedback request from arptimer() */
481f8aee88fSAlexander V. Chernikov 		if (la->r_skip_req != 0) {
482f8aee88fSAlexander V. Chernikov 			LLE_REQ_LOCK(la);
483f8aee88fSAlexander V. Chernikov 			la->r_skip_req = 0; /* Notify that entry was used */
484f8aee88fSAlexander V. Chernikov 			LLE_REQ_UNLOCK(la);
485f0f3379eSOrion Hodson 		}
48674860d4fSAlexander V. Chernikov 		if (pflags != NULL)
487f8aee88fSAlexander V. Chernikov 			*pflags = la->la_flags & (LLE_VALID|LLE_IFADDR);
4886d768226SGeorge V. Neville-Neil 		if (plle) {
4896d768226SGeorge V. Neville-Neil 			LLE_ADDREF(la);
4906d768226SGeorge V. Neville-Neil 			*plle = la;
4916d768226SGeorge V. Neville-Neil 		}
492f0516b3cSErmal Luçi 		LLE_WUNLOCK(la);
493f0516b3cSErmal Luçi 		return (0);
494df8bae1dSRodney W. Grimes 	}
4956e6b3f7cSQing Li 
496a98c06f1SGleb Smirnoff 	renew = (la->la_asked == 0 || la->la_expire != time_uptime);
49708aadfbbSJonathan Lemon 	/*
498df8bae1dSRodney W. Grimes 	 * There is an arptab entry, but no ethernet address
499e162ea60SGeorge V. Neville-Neil 	 * response yet.  Add the mbuf to the list, dropping
500e162ea60SGeorge V. Neville-Neil 	 * the oldest packet if we have exceeded the system
501e162ea60SGeorge V. Neville-Neil 	 * setting.
502df8bae1dSRodney W. Grimes 	 */
5036e6b3f7cSQing Li 	if (m != NULL) {
504e162ea60SGeorge V. Neville-Neil 		if (la->la_numheld >= V_arp_maxhold) {
50554fc657dSGeorge V. Neville-Neil 			if (la->la_hold != NULL) {
506e162ea60SGeorge V. Neville-Neil 				next = la->la_hold->m_nextpkt;
507df8bae1dSRodney W. Grimes 				m_freem(la->la_hold);
508e162ea60SGeorge V. Neville-Neil 				la->la_hold = next;
509e162ea60SGeorge V. Neville-Neil 				la->la_numheld--;
51054fc657dSGeorge V. Neville-Neil 				ARPSTAT_INC(dropped);
51154fc657dSGeorge V. Neville-Neil 			}
512e162ea60SGeorge V. Neville-Neil 		}
513e162ea60SGeorge V. Neville-Neil 		if (la->la_hold != NULL) {
514e162ea60SGeorge V. Neville-Neil 			curr = la->la_hold;
515e162ea60SGeorge V. Neville-Neil 			while (curr->m_nextpkt != NULL)
516e162ea60SGeorge V. Neville-Neil 				curr = curr->m_nextpkt;
517e162ea60SGeorge V. Neville-Neil 			curr->m_nextpkt = m;
518e162ea60SGeorge V. Neville-Neil 		} else
519df8bae1dSRodney W. Grimes 			la->la_hold = m;
520e162ea60SGeorge V. Neville-Neil 		la->la_numheld++;
5216e6b3f7cSQing Li 	}
522e1ff74c5SGleb Smirnoff 	/*
523e1ff74c5SGleb Smirnoff 	 * Return EWOULDBLOCK if we have tried less than arp_maxtries. It
524e1ff74c5SGleb Smirnoff 	 * will be masked by ether_output(). Return EHOSTDOWN/EHOSTUNREACH
525e1ff74c5SGleb Smirnoff 	 * if we have already sent arp_maxtries ARP requests. Retransmit the
526e1ff74c5SGleb Smirnoff 	 * ARP request, but not faster than one request per second.
527e1ff74c5SGleb Smirnoff 	 */
528603724d3SBjoern A. Zeeb 	if (la->la_asked < V_arp_maxtries)
529e1ff74c5SGleb Smirnoff 		error = EWOULDBLOCK;	/* First request. */
530e1ff74c5SGleb Smirnoff 	else
53174860d4fSAlexander V. Chernikov 		error = is_gw != 0 ? EHOSTUNREACH : EHOSTDOWN;
532e1ff74c5SGleb Smirnoff 
5336e6b3f7cSQing Li 	if (renew) {
534becba438SBjoern A. Zeeb 		int canceled;
535becba438SBjoern A. Zeeb 
5366e6b3f7cSQing Li 		LLE_ADDREF(la);
537a98c06f1SGleb Smirnoff 		la->la_expire = time_uptime;
5380447c136SAlexander V. Chernikov 		canceled = callout_reset(&la->lle_timer, hz * V_arpt_down,
539becba438SBjoern A. Zeeb 		    arptimer, la);
540becba438SBjoern A. Zeeb 		if (canceled)
541becba438SBjoern A. Zeeb 			LLE_REMREF(la);
54295ebcabeSMaxim Konovalov 		la->la_asked++;
5436e6b3f7cSQing Li 		LLE_WUNLOCK(la);
544aa24ae3cSGleb Smirnoff 		arprequest(ifp, NULL, &SIN(dst)->sin_addr, NULL);
5456e6b3f7cSQing Li 		return (error);
5466e6b3f7cSQing Li 	}
547512e30efSAlexander V. Chernikov 
5486e6b3f7cSQing Li 	LLE_WUNLOCK(la);
549e1ff74c5SGleb Smirnoff 	return (error);
550df8bae1dSRodney W. Grimes }
551df8bae1dSRodney W. Grimes 
552df8bae1dSRodney W. Grimes /*
553512e30efSAlexander V. Chernikov  * Resolve an IP address into an ethernet address.
5544fb3a820SAlexander V. Chernikov  */
5554fb3a820SAlexander V. Chernikov int
5564fb3a820SAlexander V. Chernikov arpresolve_addr(struct ifnet *ifp, int flags, const struct sockaddr *dst,
5576d768226SGeorge V. Neville-Neil     char *desten, uint32_t *pflags, struct llentry **plle)
5584fb3a820SAlexander V. Chernikov {
5594fb3a820SAlexander V. Chernikov 	int error;
5604fb3a820SAlexander V. Chernikov 
5614fb3a820SAlexander V. Chernikov 	flags |= LLE_ADDRONLY;
5626d768226SGeorge V. Neville-Neil 	error = arpresolve_full(ifp, 0, flags, NULL, dst, desten, pflags, plle);
5634fb3a820SAlexander V. Chernikov 	return (error);
5644fb3a820SAlexander V. Chernikov }
5654fb3a820SAlexander V. Chernikov 
5664fb3a820SAlexander V. Chernikov 
5674fb3a820SAlexander V. Chernikov /*
5684fb3a820SAlexander V. Chernikov  * Lookups link header based on an IP address.
569512e30efSAlexander V. Chernikov  * On input:
570512e30efSAlexander V. Chernikov  *    ifp is the interface we use
571512e30efSAlexander V. Chernikov  *    is_gw != 0 if @dst represents gateway to some destination
572512e30efSAlexander V. Chernikov  *    m is the mbuf. May be NULL if we don't have a packet.
573512e30efSAlexander V. Chernikov  *    dst is the next hop,
5744fb3a820SAlexander V. Chernikov  *    desten is the storage to put LL header.
575f8aee88fSAlexander V. Chernikov  *    flags returns subset of lle flags: LLE_VALID | LLE_IFADDR
576512e30efSAlexander V. Chernikov  *
5774fb3a820SAlexander V. Chernikov  * On success, full/partial link header and flags are filled in and
5784fb3a820SAlexander V. Chernikov  * the function returns 0.
579512e30efSAlexander V. Chernikov  * If the packet must be held pending resolution, we return EWOULDBLOCK
580512e30efSAlexander V. Chernikov  * On other errors, we return the corresponding error code.
581512e30efSAlexander V. Chernikov  * Note that m_freem() handles NULL.
582512e30efSAlexander V. Chernikov  */
583512e30efSAlexander V. Chernikov int
584512e30efSAlexander V. Chernikov arpresolve(struct ifnet *ifp, int is_gw, struct mbuf *m,
5856d768226SGeorge V. Neville-Neil 	const struct sockaddr *dst, u_char *desten, uint32_t *pflags,
5866d768226SGeorge V. Neville-Neil 	struct llentry **plle)
587512e30efSAlexander V. Chernikov {
58899d628d5SPedro F. Giffuni 	struct llentry *la = NULL;
589512e30efSAlexander V. Chernikov 
590512e30efSAlexander V. Chernikov 	if (pflags != NULL)
591512e30efSAlexander V. Chernikov 		*pflags = 0;
5926d768226SGeorge V. Neville-Neil 	if (plle != NULL)
5936d768226SGeorge V. Neville-Neil 		*plle = NULL;
594512e30efSAlexander V. Chernikov 
595512e30efSAlexander V. Chernikov 	if (m != NULL) {
596512e30efSAlexander V. Chernikov 		if (m->m_flags & M_BCAST) {
597512e30efSAlexander V. Chernikov 			/* broadcast */
598512e30efSAlexander V. Chernikov 			(void)memcpy(desten,
599512e30efSAlexander V. Chernikov 			    ifp->if_broadcastaddr, ifp->if_addrlen);
600512e30efSAlexander V. Chernikov 			return (0);
601512e30efSAlexander V. Chernikov 		}
602512e30efSAlexander V. Chernikov 		if (m->m_flags & M_MCAST) {
603512e30efSAlexander V. Chernikov 			/* multicast */
604512e30efSAlexander V. Chernikov 			ETHER_MAP_IP_MULTICAST(&SIN(dst)->sin_addr, desten);
605512e30efSAlexander V. Chernikov 			return (0);
606512e30efSAlexander V. Chernikov 		}
607512e30efSAlexander V. Chernikov 	}
608512e30efSAlexander V. Chernikov 
609512e30efSAlexander V. Chernikov 	IF_AFDATA_RLOCK(ifp);
610*ea17754cSMike Karels 	la = lla_lookup(LLTABLE(ifp), plle ? LLE_EXCLUSIVE : LLE_UNLOCKED, dst);
611f8aee88fSAlexander V. Chernikov 	if (la != NULL && (la->r_flags & RLLE_VALID) != 0) {
612f8aee88fSAlexander V. Chernikov 		/* Entry found, let's copy lle info */
6134fb3a820SAlexander V. Chernikov 		bcopy(la->r_linkdata, desten, la->r_hdrlen);
614512e30efSAlexander V. Chernikov 		if (pflags != NULL)
615f8aee88fSAlexander V. Chernikov 			*pflags = LLE_VALID | (la->r_flags & RLLE_IFADDR);
616f8aee88fSAlexander V. Chernikov 		/* Check if we have feedback request from arptimer() */
617f8aee88fSAlexander V. Chernikov 		if (la->r_skip_req != 0) {
618f8aee88fSAlexander V. Chernikov 			LLE_REQ_LOCK(la);
619f8aee88fSAlexander V. Chernikov 			la->r_skip_req = 0; /* Notify that entry was used */
620f8aee88fSAlexander V. Chernikov 			LLE_REQ_UNLOCK(la);
621f8aee88fSAlexander V. Chernikov 		}
622*ea17754cSMike Karels 		if (plle) {
623*ea17754cSMike Karels 			LLE_ADDREF(la);
624*ea17754cSMike Karels 			*plle = la;
625*ea17754cSMike Karels 			LLE_WUNLOCK(la);
626*ea17754cSMike Karels 		}
627f8aee88fSAlexander V. Chernikov 		IF_AFDATA_RUNLOCK(ifp);
628512e30efSAlexander V. Chernikov 		return (0);
629512e30efSAlexander V. Chernikov 	}
630*ea17754cSMike Karels 	if (plle && la)
631*ea17754cSMike Karels 		LLE_WUNLOCK(la);
632f8aee88fSAlexander V. Chernikov 	IF_AFDATA_RUNLOCK(ifp);
633512e30efSAlexander V. Chernikov 
6344fb3a820SAlexander V. Chernikov 	return (arpresolve_full(ifp, is_gw, la == NULL ? LLE_CREATE : 0, m, dst,
6356d768226SGeorge V. Neville-Neil 	    desten, pflags, plle));
636512e30efSAlexander V. Chernikov }
637512e30efSAlexander V. Chernikov 
638512e30efSAlexander V. Chernikov /*
639df8bae1dSRodney W. Grimes  * Common length and type checks are done here,
640df8bae1dSRodney W. Grimes  * then the protocol-specific routine is called.
641df8bae1dSRodney W. Grimes  */
642885f1aa4SPoul-Henning Kamp static void
6431cafed39SJonathan Lemon arpintr(struct mbuf *m)
644df8bae1dSRodney W. Grimes {
6451cafed39SJonathan Lemon 	struct arphdr *ar;
646eec33ea0SAlexander V. Chernikov 	struct ifnet *ifp;
647deb6bda6SAlexander V. Chernikov 	char *layer;
648deb6bda6SAlexander V. Chernikov 	int hlen;
649df8bae1dSRodney W. Grimes 
650eec33ea0SAlexander V. Chernikov 	ifp = m->m_pkthdr.rcvif;
651eec33ea0SAlexander V. Chernikov 
65276ec7b2fSRobert Watson 	if (m->m_len < sizeof(struct arphdr) &&
65384365e2bSMatthew Dillon 	    ((m = m_pullup(m, sizeof(struct arphdr))) == NULL)) {
654eec33ea0SAlexander V. Chernikov 		ARP_LOG(LOG_NOTICE, "packet with short header received on %s\n",
655eec33ea0SAlexander V. Chernikov 		    if_name(ifp));
6561cafed39SJonathan Lemon 		return;
65776ec7b2fSRobert Watson 	}
65876ec7b2fSRobert Watson 	ar = mtod(m, struct arphdr *);
65976ec7b2fSRobert Watson 
660deb6bda6SAlexander V. Chernikov 	/* Check if length is sufficient */
66189bc0426SGleb Smirnoff 	if (m->m_len <  arphdr_len(ar)) {
66289bc0426SGleb Smirnoff 		m = m_pullup(m, arphdr_len(ar));
66389bc0426SGleb Smirnoff 		if (m == NULL) {
664eec33ea0SAlexander V. Chernikov 			ARP_LOG(LOG_NOTICE, "short packet received on %s\n",
665eec33ea0SAlexander V. Chernikov 			    if_name(ifp));
666deb6bda6SAlexander V. Chernikov 			return;
667deb6bda6SAlexander V. Chernikov 		}
668deb6bda6SAlexander V. Chernikov 		ar = mtod(m, struct arphdr *);
66989bc0426SGleb Smirnoff 	}
670deb6bda6SAlexander V. Chernikov 
671deb6bda6SAlexander V. Chernikov 	hlen = 0;
672deb6bda6SAlexander V. Chernikov 	layer = "";
673deb6bda6SAlexander V. Chernikov 	switch (ntohs(ar->ar_hrd)) {
674deb6bda6SAlexander V. Chernikov 	case ARPHRD_ETHER:
675deb6bda6SAlexander V. Chernikov 		hlen = ETHER_ADDR_LEN; /* RFC 826 */
676deb6bda6SAlexander V. Chernikov 		layer = "ethernet";
677deb6bda6SAlexander V. Chernikov 		break;
678deb6bda6SAlexander V. Chernikov 	case ARPHRD_IEEE802:
679deb6bda6SAlexander V. Chernikov 		hlen = 6; /* RFC 1390, FDDI_ADDR_LEN */
680deb6bda6SAlexander V. Chernikov 		layer = "fddi";
681deb6bda6SAlexander V. Chernikov 		break;
682deb6bda6SAlexander V. Chernikov 	case ARPHRD_ARCNET:
683deb6bda6SAlexander V. Chernikov 		hlen = 1; /* RFC 1201, ARC_ADDR_LEN */
684deb6bda6SAlexander V. Chernikov 		layer = "arcnet";
685deb6bda6SAlexander V. Chernikov 		break;
686deb6bda6SAlexander V. Chernikov 	case ARPHRD_INFINIBAND:
687deb6bda6SAlexander V. Chernikov 		hlen = 20;	/* RFC 4391, INFINIBAND_ALEN */
688deb6bda6SAlexander V. Chernikov 		layer = "infiniband";
689deb6bda6SAlexander V. Chernikov 		break;
690deb6bda6SAlexander V. Chernikov 	case ARPHRD_IEEE1394:
691deb6bda6SAlexander V. Chernikov 		hlen = 0; /* SHALL be 16 */ /* RFC 2734 */
692deb6bda6SAlexander V. Chernikov 		layer = "firewire";
693deb6bda6SAlexander V. Chernikov 
694deb6bda6SAlexander V. Chernikov 		/*
695ddb13598SKevin Lo 		 * Restrict too long hardware addresses.
696deb6bda6SAlexander V. Chernikov 		 * Currently we are capable of handling 20-byte
697deb6bda6SAlexander V. Chernikov 		 * addresses ( sizeof(lle->ll_addr) )
698deb6bda6SAlexander V. Chernikov 		 */
699deb6bda6SAlexander V. Chernikov 		if (ar->ar_hln >= 20)
700deb6bda6SAlexander V. Chernikov 			hlen = 16;
701deb6bda6SAlexander V. Chernikov 		break;
702deb6bda6SAlexander V. Chernikov 	default:
703eec33ea0SAlexander V. Chernikov 		ARP_LOG(LOG_NOTICE,
704ddb13598SKevin Lo 		    "packet with unknown hardware format 0x%02d received on "
705ddb13598SKevin Lo 		    "%s\n", ntohs(ar->ar_hrd), if_name(ifp));
70676ec7b2fSRobert Watson 		m_freem(m);
7071cafed39SJonathan Lemon 		return;
70876ec7b2fSRobert Watson 	}
70976ec7b2fSRobert Watson 
710deb6bda6SAlexander V. Chernikov 	if (hlen != 0 && hlen != ar->ar_hln) {
711eec33ea0SAlexander V. Chernikov 		ARP_LOG(LOG_NOTICE,
712eec33ea0SAlexander V. Chernikov 		    "packet with invalid %s address length %d received on %s\n",
713eec33ea0SAlexander V. Chernikov 		    layer, ar->ar_hln, if_name(ifp));
71476ec7b2fSRobert Watson 		m_freem(m);
7151cafed39SJonathan Lemon 		return;
71676ec7b2fSRobert Watson 	}
717df8bae1dSRodney W. Grimes 
71854fc657dSGeorge V. Neville-Neil 	ARPSTAT_INC(received);
719df8bae1dSRodney W. Grimes 	switch (ntohs(ar->ar_pro)) {
7201d5e9e22SEivind Eklund #ifdef INET
721df8bae1dSRodney W. Grimes 	case ETHERTYPE_IP:
722df8bae1dSRodney W. Grimes 		in_arpinput(m);
7231cafed39SJonathan Lemon 		return;
7241d5e9e22SEivind Eklund #endif
725df8bae1dSRodney W. Grimes 	}
726df8bae1dSRodney W. Grimes 	m_freem(m);
727df8bae1dSRodney W. Grimes }
728df8bae1dSRodney W. Grimes 
7291d5e9e22SEivind Eklund #ifdef INET
730df8bae1dSRodney W. Grimes /*
731df8bae1dSRodney W. Grimes  * ARP for Internet protocols on 10 Mb/s Ethernet.
732df8bae1dSRodney W. Grimes  * Algorithm is that given in RFC 826.
733df8bae1dSRodney W. Grimes  * In addition, a sanity check is performed on the sender
734df8bae1dSRodney W. Grimes  * protocol address, to catch impersonators.
735df8bae1dSRodney W. Grimes  * We no longer handle negotiations for use of trailer protocol:
736df8bae1dSRodney W. Grimes  * Formerly, ARP replied for protocol type ETHERTYPE_TRAIL sent
737df8bae1dSRodney W. Grimes  * along with IP replies if we wanted trailers sent to us,
738df8bae1dSRodney W. Grimes  * and also sent them in response to IP replies.
739df8bae1dSRodney W. Grimes  * This allowed either end to announce the desire to receive
740df8bae1dSRodney W. Grimes  * trailer packets.
741df8bae1dSRodney W. Grimes  * We no longer reply to requests for ETHERTYPE_TRAIL protocol either,
742df8bae1dSRodney W. Grimes  * but formerly didn't normally send requests.
743df8bae1dSRodney W. Grimes  */
7443269187dSAlfred Perlstein static int log_arp_wrong_iface = 1;
745e3d123d6SAlfred Perlstein static int log_arp_movements = 1;
74639393906SGleb Smirnoff static int log_arp_permanent_modify = 1;
747478df1d5SGleb Smirnoff static int allow_multicast = 0;
7483269187dSAlfred Perlstein 
7493269187dSAlfred Perlstein SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_wrong_iface, CTLFLAG_RW,
7503269187dSAlfred Perlstein 	&log_arp_wrong_iface, 0,
7513269187dSAlfred Perlstein 	"log arp packets arriving on the wrong interface");
752e3d123d6SAlfred Perlstein SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_movements, CTLFLAG_RW,
753e3d123d6SAlfred Perlstein 	&log_arp_movements, 0,
75475ce3221SAlfred Perlstein 	"log arp replies from MACs different than the one in the cache");
75539393906SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_permanent_modify, CTLFLAG_RW,
75639393906SGleb Smirnoff 	&log_arp_permanent_modify, 0,
75739393906SGleb Smirnoff 	"log arp replies from MACs different than the one in the permanent arp entry");
758478df1d5SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, allow_multicast, CTLFLAG_RW,
759478df1d5SGleb Smirnoff 	&allow_multicast, 0, "accept multicast addresses");
7603269187dSAlfred Perlstein 
761df8bae1dSRodney W. Grimes static void
762f2565d68SRobert Watson in_arpinput(struct mbuf *m)
763df8bae1dSRodney W. Grimes {
764cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
765e952fa39SMatthew N. Dodd 	struct arphdr *ah;
766e952fa39SMatthew N. Dodd 	struct ifnet *ifp = m->m_pkthdr.rcvif;
7675a255516SAlexander V. Chernikov 	struct llentry *la = NULL, *la_tmp;
768ca925d9cSJonathan Lemon 	struct ifaddr *ifa;
769ca925d9cSJonathan Lemon 	struct in_ifaddr *ia;
770df8bae1dSRodney W. Grimes 	struct sockaddr sa;
771df8bae1dSRodney W. Grimes 	struct in_addr isaddr, itaddr, myaddr;
772a9771948SGleb Smirnoff 	u_int8_t *enaddr = NULL;
773f3bfa7d1SAlexander V. Chernikov 	int op;
77480b11ee4SPhilip Paeps 	int bridged = 0, is_bridge = 0;
775f3bfa7d1SAlexander V. Chernikov 	int carped;
7768e7e854cSKip Macy 	struct sockaddr_in sin;
7775a255516SAlexander V. Chernikov 	struct sockaddr *dst;
7789977be4aSAlexander V. Chernikov 	struct nhop4_basic nh4;
7794fb3a820SAlexander V. Chernikov 	uint8_t linkhdr[LLE_MAX_LINKHDR];
7804fb3a820SAlexander V. Chernikov 	struct route ro;
7814fb3a820SAlexander V. Chernikov 	size_t linkhdrsize;
7824fb3a820SAlexander V. Chernikov 	int lladdr_off;
7834fb3a820SAlexander V. Chernikov 	int error;
7849977be4aSAlexander V. Chernikov 
7858e7e854cSKip Macy 	sin.sin_len = sizeof(struct sockaddr_in);
7868e7e854cSKip Macy 	sin.sin_family = AF_INET;
78729910a5aSKip Macy 	sin.sin_addr.s_addr = 0;
788df8bae1dSRodney W. Grimes 
78974948aa6SAndrew Thompson 	if (ifp->if_bridge)
7908f867517SAndrew Thompson 		bridged = 1;
79180b11ee4SPhilip Paeps 	if (ifp->if_type == IFT_BRIDGE)
79280b11ee4SPhilip Paeps 		is_bridge = 1;
7938f867517SAndrew Thompson 
794eec33ea0SAlexander V. Chernikov 	/*
795eec33ea0SAlexander V. Chernikov 	 * We already have checked that mbuf contains enough contiguous data
796eec33ea0SAlexander V. Chernikov 	 * to hold entire arp message according to the arp header.
797eec33ea0SAlexander V. Chernikov 	 */
798322dcb8dSMax Khon 	ah = mtod(m, struct arphdr *);
799eec33ea0SAlexander V. Chernikov 
80009d3f895SGeorge V. Neville-Neil 	/*
80109d3f895SGeorge V. Neville-Neil 	 * ARP is only for IPv4 so we can reject packets with
80209d3f895SGeorge V. Neville-Neil 	 * a protocol length not equal to an IPv4 address.
80309d3f895SGeorge V. Neville-Neil 	 */
80409d3f895SGeorge V. Neville-Neil 	if (ah->ar_pln != sizeof(struct in_addr)) {
8055d81d095SGleb Smirnoff 		ARP_LOG(LOG_NOTICE, "requested protocol length != %zu\n",
80609d3f895SGeorge V. Neville-Neil 		    sizeof(struct in_addr));
807414676baSGleb Smirnoff 		goto drop;
80809d3f895SGeorge V. Neville-Neil 	}
80909d3f895SGeorge V. Neville-Neil 
810478df1d5SGleb Smirnoff 	if (allow_multicast == 0 && ETHER_IS_MULTICAST(ar_sha(ah))) {
8115d81d095SGleb Smirnoff 		ARP_LOG(LOG_NOTICE, "%*D is multicast\n",
812c9168718SGleb Smirnoff 		    ifp->if_addrlen, (u_char *)ar_sha(ah), ":");
813414676baSGleb Smirnoff 		goto drop;
81409d3f895SGeorge V. Neville-Neil 	}
81509d3f895SGeorge V. Neville-Neil 
816322dcb8dSMax Khon 	op = ntohs(ah->ar_op);
817322dcb8dSMax Khon 	(void)memcpy(&isaddr, ar_spa(ah), sizeof (isaddr));
818322dcb8dSMax Khon 	(void)memcpy(&itaddr, ar_tpa(ah), sizeof (itaddr));
81932439868SGleb Smirnoff 
82054fc657dSGeorge V. Neville-Neil 	if (op == ARPOP_REPLY)
82154fc657dSGeorge V. Neville-Neil 		ARPSTAT_INC(rxreplies);
82254fc657dSGeorge V. Neville-Neil 
823ca925d9cSJonathan Lemon 	/*
824ca925d9cSJonathan Lemon 	 * For a bridge, we want to check the address irrespective
825ca925d9cSJonathan Lemon 	 * of the receive interface. (This will change slightly
826ca925d9cSJonathan Lemon 	 * when we have clusters of interfaces).
827ca925d9cSJonathan Lemon 	 */
828cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
8292ef4a436SGleb Smirnoff 	LIST_FOREACH(ia, INADDR_HASH(itaddr.s_addr), ia_hash) {
83096561547SAndrew Thompson 		if (((bridged && ia->ia_ifp->if_bridge == ifp->if_bridge) ||
8316e6b3f7cSQing Li 		    ia->ia_ifp == ifp) &&
83208b68b0eSGleb Smirnoff 		    itaddr.s_addr == ia->ia_addr.sin_addr.s_addr &&
83308b68b0eSGleb Smirnoff 		    (ia->ia_ifa.ifa_carp == NULL ||
83408b68b0eSGleb Smirnoff 		    (*carp_iamatch_p)(&ia->ia_ifa, &enaddr))) {
83509d54778SRobert Watson 			ifa_ref(&ia->ia_ifa);
836cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
8372ef4a436SGleb Smirnoff 			goto match;
8382ef4a436SGleb Smirnoff 		}
8392ef4a436SGleb Smirnoff 	}
840ca925d9cSJonathan Lemon 	LIST_FOREACH(ia, INADDR_HASH(isaddr.s_addr), ia_hash)
84196561547SAndrew Thompson 		if (((bridged && ia->ia_ifp->if_bridge == ifp->if_bridge) ||
8426e6b3f7cSQing Li 		    ia->ia_ifp == ifp) &&
84309d54778SRobert Watson 		    isaddr.s_addr == ia->ia_addr.sin_addr.s_addr) {
84409d54778SRobert Watson 			ifa_ref(&ia->ia_ifa);
845cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
846ca925d9cSJonathan Lemon 			goto match;
84709d54778SRobert Watson 		}
84880b11ee4SPhilip Paeps 
84980b11ee4SPhilip Paeps #define BDG_MEMBER_MATCHES_ARP(addr, ifp, ia)				\
85080b11ee4SPhilip Paeps   (ia->ia_ifp->if_bridge == ifp->if_softc &&				\
85180b11ee4SPhilip Paeps   !bcmp(IF_LLADDR(ia->ia_ifp), IF_LLADDR(ifp), ifp->if_addrlen) &&	\
85280b11ee4SPhilip Paeps   addr == ia->ia_addr.sin_addr.s_addr)
85380b11ee4SPhilip Paeps 	/*
85480b11ee4SPhilip Paeps 	 * Check the case when bridge shares its MAC address with
85580b11ee4SPhilip Paeps 	 * some of its children, so packets are claimed by bridge
85680b11ee4SPhilip Paeps 	 * itself (bridge_input() does it first), but they are really
85780b11ee4SPhilip Paeps 	 * meant to be destined to the bridge member.
85880b11ee4SPhilip Paeps 	 */
85980b11ee4SPhilip Paeps 	if (is_bridge) {
86080b11ee4SPhilip Paeps 		LIST_FOREACH(ia, INADDR_HASH(itaddr.s_addr), ia_hash) {
86180b11ee4SPhilip Paeps 			if (BDG_MEMBER_MATCHES_ARP(itaddr.s_addr, ifp, ia)) {
86209d54778SRobert Watson 				ifa_ref(&ia->ia_ifa);
86380b11ee4SPhilip Paeps 				ifp = ia->ia_ifp;
864cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
86580b11ee4SPhilip Paeps 				goto match;
86680b11ee4SPhilip Paeps 			}
86780b11ee4SPhilip Paeps 		}
86880b11ee4SPhilip Paeps 	}
86980b11ee4SPhilip Paeps #undef BDG_MEMBER_MATCHES_ARP
870cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
87180b11ee4SPhilip Paeps 
872ca925d9cSJonathan Lemon 	/*
873d8b84d9eSJonathan Lemon 	 * No match, use the first inet address on the receive interface
874ca925d9cSJonathan Lemon 	 * as a dummy address for the rest of the function.
875ca925d9cSJonathan Lemon 	 */
876137f91e8SJohn Baldwin 	IF_ADDR_RLOCK(ifp);
877d8b84d9eSJonathan Lemon 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
8789de96e89SGleb Smirnoff 		if (ifa->ifa_addr->sa_family == AF_INET &&
8799de96e89SGleb Smirnoff 		    (ifa->ifa_carp == NULL ||
8809de96e89SGleb Smirnoff 		    (*carp_iamatch_p)(ifa, &enaddr))) {
881ec691a10SJonathan Lemon 			ia = ifatoia(ifa);
88209d54778SRobert Watson 			ifa_ref(ifa);
883137f91e8SJohn Baldwin 			IF_ADDR_RUNLOCK(ifp);
884ec691a10SJonathan Lemon 			goto match;
885ec691a10SJonathan Lemon 		}
886137f91e8SJohn Baldwin 	IF_ADDR_RUNLOCK(ifp);
88709d54778SRobert Watson 
888ec691a10SJonathan Lemon 	/*
889ec691a10SJonathan Lemon 	 * If bridging, fall back to using any inet address.
890ec691a10SJonathan Lemon 	 */
891cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
8922d9cfabaSRobert Watson 	if (!bridged || (ia = TAILQ_FIRST(&V_in_ifaddrhead)) == NULL) {
893cc0a3c8cSAndrey V. Elsukov 		IN_IFADDR_RUNLOCK(&in_ifa_tracker);
894b2a8ac7cSLuigi Rizzo 		goto drop;
8952d9cfabaSRobert Watson 	}
89609d54778SRobert Watson 	ifa_ref(&ia->ia_ifa);
897cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
898ca925d9cSJonathan Lemon match:
899a9771948SGleb Smirnoff 	if (!enaddr)
900a9771948SGleb Smirnoff 		enaddr = (u_int8_t *)IF_LLADDR(ifp);
90108b68b0eSGleb Smirnoff 	carped = (ia->ia_ifa.ifa_carp != NULL);
902ca925d9cSJonathan Lemon 	myaddr = ia->ia_addr.sin_addr;
90309d54778SRobert Watson 	ifa_free(&ia->ia_ifa);
904a9771948SGleb Smirnoff 	if (!bcmp(ar_sha(ah), enaddr, ifp->if_addrlen))
905b2a8ac7cSLuigi Rizzo 		goto drop;	/* it's from me, ignore it. */
906322dcb8dSMax Khon 	if (!bcmp(ar_sha(ah), ifp->if_broadcastaddr, ifp->if_addrlen)) {
9075d81d095SGleb Smirnoff 		ARP_LOG(LOG_NOTICE, "link address is broadcast for IP address "
9085d81d095SGleb Smirnoff 		    "%s!\n", inet_ntoa(isaddr));
909b2a8ac7cSLuigi Rizzo 		goto drop;
910df8bae1dSRodney W. Grimes 	}
911f3bfa7d1SAlexander V. Chernikov 
912f3bfa7d1SAlexander V. Chernikov 	if (ifp->if_addrlen != ah->ar_hln) {
913f3bfa7d1SAlexander V. Chernikov 		ARP_LOG(LOG_WARNING, "from %*D: addr len: new %d, "
914f3bfa7d1SAlexander V. Chernikov 		    "i/f %d (ignored)\n", ifp->if_addrlen,
915f3bfa7d1SAlexander V. Chernikov 		    (u_char *) ar_sha(ah), ":", ah->ar_hln,
916f3bfa7d1SAlexander V. Chernikov 		    ifp->if_addrlen);
917f3bfa7d1SAlexander V. Chernikov 		goto drop;
918f3bfa7d1SAlexander V. Chernikov 	}
919f3bfa7d1SAlexander V. Chernikov 
92000fcf9d1SRobert Watson 	/*
92100fcf9d1SRobert Watson 	 * Warn if another host is using the same IP address, but only if the
92200fcf9d1SRobert Watson 	 * IP address isn't 0.0.0.0, which is used for DHCP only, in which
92300fcf9d1SRobert Watson 	 * case we suppress the warning to avoid false positive complaints of
92400fcf9d1SRobert Watson 	 * potential misconfiguration.
92500fcf9d1SRobert Watson 	 */
92608b68b0eSGleb Smirnoff 	if (!bridged && !carped && isaddr.s_addr == myaddr.s_addr &&
92708b68b0eSGleb Smirnoff 	    myaddr.s_addr != 0) {
9285d81d095SGleb Smirnoff 		ARP_LOG(LOG_ERR, "%*D is using my IP address %s on %s!\n",
929322dcb8dSMax Khon 		   ifp->if_addrlen, (u_char *)ar_sha(ah), ":",
9303affb6fbSYaroslav Tykhiy 		   inet_ntoa(isaddr), ifp->if_xname);
931df8bae1dSRodney W. Grimes 		itaddr = myaddr;
93254fc657dSGeorge V. Neville-Neil 		ARPSTAT_INC(dupips);
933df8bae1dSRodney W. Grimes 		goto reply;
934df8bae1dSRodney W. Grimes 	}
935deb62e28SRuslan Ermilov 	if (ifp->if_flags & IFF_STATICARP)
936deb62e28SRuslan Ermilov 		goto reply;
9378b07e49aSJulian Elischer 
9386e6b3f7cSQing Li 	bzero(&sin, sizeof(sin));
9396e6b3f7cSQing Li 	sin.sin_len = sizeof(struct sockaddr_in);
9406e6b3f7cSQing Li 	sin.sin_family = AF_INET;
9416e6b3f7cSQing Li 	sin.sin_addr = isaddr;
9425a255516SAlexander V. Chernikov 	dst = (struct sockaddr *)&sin;
943f3bfa7d1SAlexander V. Chernikov 	IF_AFDATA_RLOCK(ifp);
9445a255516SAlexander V. Chernikov 	la = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst);
945f3bfa7d1SAlexander V. Chernikov 	IF_AFDATA_RUNLOCK(ifp);
946f3bfa7d1SAlexander V. Chernikov 	if (la != NULL)
947f3bfa7d1SAlexander V. Chernikov 		arp_check_update_lle(ah, isaddr, ifp, bridged, la);
948f3bfa7d1SAlexander V. Chernikov 	else if (itaddr.s_addr == myaddr.s_addr) {
949e162ea60SGeorge V. Neville-Neil 		/*
950942e4b4bSAlexander V. Chernikov 		 * Request/reply to our address, but no lle exists yet.
9514fb3a820SAlexander V. Chernikov 		 * Calculate full link prepend to use in lle.
952e162ea60SGeorge V. Neville-Neil 		 */
9534fb3a820SAlexander V. Chernikov 		linkhdrsize = sizeof(linkhdr);
9544fb3a820SAlexander V. Chernikov 		if (lltable_calc_llheader(ifp, AF_INET, ar_sha(ah), linkhdr,
9554fb3a820SAlexander V. Chernikov 		    &linkhdrsize, &lladdr_off) != 0)
9564fb3a820SAlexander V. Chernikov 			goto reply;
9574fb3a820SAlexander V. Chernikov 
9584fb3a820SAlexander V. Chernikov 		/* Allocate new entry */
9595a255516SAlexander V. Chernikov 		la = lltable_alloc_entry(LLTABLE(ifp), 0, dst);
960942e4b4bSAlexander V. Chernikov 		if (la == NULL) {
961942e4b4bSAlexander V. Chernikov 
962942e4b4bSAlexander V. Chernikov 			/*
963942e4b4bSAlexander V. Chernikov 			 * lle creation may fail if source address belongs
964942e4b4bSAlexander V. Chernikov 			 * to non-directly connected subnet. However, we
965942e4b4bSAlexander V. Chernikov 			 * will try to answer the request instead of dropping
966942e4b4bSAlexander V. Chernikov 			 * frame.
967942e4b4bSAlexander V. Chernikov 			 */
968942e4b4bSAlexander V. Chernikov 			goto reply;
969942e4b4bSAlexander V. Chernikov 		}
9704fb3a820SAlexander V. Chernikov 		lltable_set_entry_addr(ifp, la, linkhdr, linkhdrsize,
9714fb3a820SAlexander V. Chernikov 		    lladdr_off);
9725a255516SAlexander V. Chernikov 
9735a255516SAlexander V. Chernikov 		IF_AFDATA_WLOCK(ifp);
9745a255516SAlexander V. Chernikov 		LLE_WLOCK(la);
9755a255516SAlexander V. Chernikov 		la_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst);
9765a255516SAlexander V. Chernikov 
9775a255516SAlexander V. Chernikov 		/*
9785a255516SAlexander V. Chernikov 		 * Check if lle still does not exists.
9795a255516SAlexander V. Chernikov 		 * If it does, that means that we either
9805a255516SAlexander V. Chernikov 		 * 1) have configured it explicitly, via
9815a255516SAlexander V. Chernikov 		 * 1a) 'arp -s' static entry or
9825a255516SAlexander V. Chernikov 		 * 1b) interface address static record
9835a255516SAlexander V. Chernikov 		 * or
9845a255516SAlexander V. Chernikov 		 * 2) it was the result of sending first packet to-host
9855a255516SAlexander V. Chernikov 		 * or
9865a255516SAlexander V. Chernikov 		 * 3) it was another arp reply packet we handled in
9875a255516SAlexander V. Chernikov 		 * different thread.
9885a255516SAlexander V. Chernikov 		 *
9895a255516SAlexander V. Chernikov 		 * In all cases except 3) we definitely need to prefer
9905a255516SAlexander V. Chernikov 		 * existing lle. For the sake of simplicity, prefer any
9915a255516SAlexander V. Chernikov 		 * existing lle over newly-create one.
9925a255516SAlexander V. Chernikov 		 */
9935a255516SAlexander V. Chernikov 		if (la_tmp == NULL)
9945a255516SAlexander V. Chernikov 			lltable_link_entry(LLTABLE(ifp), la);
995f3bfa7d1SAlexander V. Chernikov 		IF_AFDATA_WUNLOCK(ifp);
9965a255516SAlexander V. Chernikov 
9975a255516SAlexander V. Chernikov 		if (la_tmp == NULL) {
998f3bfa7d1SAlexander V. Chernikov 			arp_mark_lle_reachable(la);
999e162ea60SGeorge V. Neville-Neil 			LLE_WUNLOCK(la);
10005a255516SAlexander V. Chernikov 		} else {
10015a255516SAlexander V. Chernikov 			/* Free newly-create entry and handle packet */
10025a255516SAlexander V. Chernikov 			lltable_free_entry(LLTABLE(ifp), la);
10035a255516SAlexander V. Chernikov 			la = la_tmp;
10045a255516SAlexander V. Chernikov 			la_tmp = NULL;
10055a255516SAlexander V. Chernikov 			arp_check_update_lle(ah, isaddr, ifp, bridged, la);
10065a255516SAlexander V. Chernikov 			/* arp_check_update_lle() returns @la unlocked */
1007f4048639SBjoern A. Zeeb 		}
10085a255516SAlexander V. Chernikov 		la = NULL;
1009a4141c63SAlexander V. Chernikov 	}
10106e6b3f7cSQing Li reply:
1011b2a8ac7cSLuigi Rizzo 	if (op != ARPOP_REQUEST)
1012b2a8ac7cSLuigi Rizzo 		goto drop;
101354fc657dSGeorge V. Neville-Neil 	ARPSTAT_INC(rxrequests);
10146e6b3f7cSQing Li 
1015df8bae1dSRodney W. Grimes 	if (itaddr.s_addr == myaddr.s_addr) {
10168b07e49aSJulian Elischer 		/* Shortcut.. the receiving interface is the target. */
1017322dcb8dSMax Khon 		(void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln);
1018a9771948SGleb Smirnoff 		(void)memcpy(ar_sha(ah), enaddr, ah->ar_hln);
1019df8bae1dSRodney W. Grimes 	} else {
1020897d75c9SQing Li 		struct llentry *lle = NULL;
1021897d75c9SQing Li 
1022cd29a779SQing Li 		sin.sin_addr = itaddr;
1023ea0c3776SAndrey V. Elsukov 		IF_AFDATA_RLOCK(ifp);
1024cd29a779SQing Li 		lle = lla_lookup(LLTABLE(ifp), 0, (struct sockaddr *)&sin);
1025ea0c3776SAndrey V. Elsukov 		IF_AFDATA_RUNLOCK(ifp);
1026cd29a779SQing Li 
1027cd29a779SQing Li 		if ((lle != NULL) && (lle->la_flags & LLE_PUB)) {
1028cd29a779SQing Li 			(void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln);
10294fb3a820SAlexander V. Chernikov 			(void)memcpy(ar_sha(ah), lle->ll_addr, ah->ar_hln);
1030cd29a779SQing Li 			LLE_RUNLOCK(lle);
1031cd29a779SQing Li 		} else {
1032cd29a779SQing Li 
1033cd29a779SQing Li 			if (lle != NULL)
1034cd29a779SQing Li 				LLE_RUNLOCK(lle);
1035cd29a779SQing Li 
1036603724d3SBjoern A. Zeeb 			if (!V_arp_proxyall)
1037b2a8ac7cSLuigi Rizzo 				goto drop;
103828e82295SGarrett Wollman 
10398b07e49aSJulian Elischer 			/* XXX MRT use table 0 for arp reply  */
10409977be4aSAlexander V. Chernikov 			if (fib4_lookup_nh_basic(0, itaddr, 0, 0, &nh4) != 0)
1041b2a8ac7cSLuigi Rizzo 				goto drop;
1042897d75c9SQing Li 
104328e82295SGarrett Wollman 			/*
104428e82295SGarrett Wollman 			 * Don't send proxies for nodes on the same interface
104528e82295SGarrett Wollman 			 * as this one came out of, or we'll get into a fight
104628e82295SGarrett Wollman 			 * over who claims what Ether address.
104728e82295SGarrett Wollman 			 */
10489977be4aSAlexander V. Chernikov 			if (nh4.nh_ifp == ifp)
1049b2a8ac7cSLuigi Rizzo 				goto drop;
1050cc728227SDavid Malone 
1051897d75c9SQing Li 			(void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln);
1052cd29a779SQing Li 			(void)memcpy(ar_sha(ah), enaddr, ah->ar_hln);
1053897d75c9SQing Li 
1054cc728227SDavid Malone 			/*
1055cc728227SDavid Malone 			 * Also check that the node which sent the ARP packet
10566bccea7cSRebecca Cran 			 * is on the interface we expect it to be on. This
1057cc728227SDavid Malone 			 * avoids ARP chaos if an interface is connected to the
1058cc728227SDavid Malone 			 * wrong network.
1059cc728227SDavid Malone 			 */
1060cc728227SDavid Malone 
10618b07e49aSJulian Elischer 			/* XXX MRT use table 0 for arp checks */
10629977be4aSAlexander V. Chernikov 			if (fib4_lookup_nh_basic(0, isaddr, 0, 0, &nh4) != 0)
1063b2a8ac7cSLuigi Rizzo 				goto drop;
10649977be4aSAlexander V. Chernikov 			if (nh4.nh_ifp != ifp) {
10655d81d095SGleb Smirnoff 				ARP_LOG(LOG_INFO, "proxy: ignoring request"
10669977be4aSAlexander V. Chernikov 				    " from %s via %s\n",
10679977be4aSAlexander V. Chernikov 				    inet_ntoa(isaddr), ifp->if_xname);
1068b2a8ac7cSLuigi Rizzo 				goto drop;
1069cc728227SDavid Malone 			}
1070cc728227SDavid Malone 
1071ac234f93SGarrett Wollman #ifdef DEBUG_PROXY
1072ea50c13eSGleb Smirnoff 			printf("arp: proxying for %s\n", inet_ntoa(itaddr));
1073ac234f93SGarrett Wollman #endif
1074df8bae1dSRodney W. Grimes 		}
1075cd29a779SQing Li 	}
1076df8bae1dSRodney W. Grimes 
1077d0558157SBruce M Simpson 	if (itaddr.s_addr == myaddr.s_addr &&
1078d0558157SBruce M Simpson 	    IN_LINKLOCAL(ntohl(itaddr.s_addr))) {
1079d0558157SBruce M Simpson 		/* RFC 3927 link-local IPv4; always reply by broadcast. */
1080d0558157SBruce M Simpson #ifdef DEBUG_LINKLOCAL
1081d0558157SBruce M Simpson 		printf("arp: sending reply for link-local addr %s\n",
1082d0558157SBruce M Simpson 		    inet_ntoa(itaddr));
1083d0558157SBruce M Simpson #endif
1084d0558157SBruce M Simpson 		m->m_flags |= M_BCAST;
1085d0558157SBruce M Simpson 		m->m_flags &= ~M_MCAST;
1086d0558157SBruce M Simpson 	} else {
1087d0558157SBruce M Simpson 		/* default behaviour; never reply by broadcast. */
1088d0558157SBruce M Simpson 		m->m_flags &= ~(M_BCAST|M_MCAST);
1089d0558157SBruce M Simpson 	}
1090322dcb8dSMax Khon 	(void)memcpy(ar_tpa(ah), ar_spa(ah), ah->ar_pln);
1091322dcb8dSMax Khon 	(void)memcpy(ar_spa(ah), &itaddr, ah->ar_pln);
1092322dcb8dSMax Khon 	ah->ar_op = htons(ARPOP_REPLY);
1093322dcb8dSMax Khon 	ah->ar_pro = htons(ETHERTYPE_IP); /* let's be sure! */
109464bf80ceSMatthew N. Dodd 	m->m_len = sizeof(*ah) + (2 * ah->ar_pln) + (2 * ah->ar_hln);
109564bf80ceSMatthew N. Dodd 	m->m_pkthdr.len = m->m_len;
10962303570fSAndrey V. Elsukov 	m->m_pkthdr.rcvif = NULL;
109764bf80ceSMatthew N. Dodd 	sa.sa_family = AF_ARP;
109864bf80ceSMatthew N. Dodd 	sa.sa_len = 2;
10994fb3a820SAlexander V. Chernikov 
11004fb3a820SAlexander V. Chernikov 	/* Calculate link header for sending frame */
11014fb3a820SAlexander V. Chernikov 	bzero(&ro, sizeof(ro));
11024fb3a820SAlexander V. Chernikov 	linkhdrsize = sizeof(linkhdr);
11034fb3a820SAlexander V. Chernikov 	error = arp_fillheader(ifp, ah, 0, linkhdr, &linkhdrsize);
11044fb3a820SAlexander V. Chernikov 
11054fb3a820SAlexander V. Chernikov 	/*
11064fb3a820SAlexander V. Chernikov 	 * arp_fillheader() may fail due to lack of support inside encap request
11074fb3a820SAlexander V. Chernikov 	 * routing. This is not necessary an error, AF_ARP can/should be handled
11084fb3a820SAlexander V. Chernikov 	 * by if_output().
11094fb3a820SAlexander V. Chernikov 	 */
11104fb3a820SAlexander V. Chernikov 	if (error != 0 && error != EAFNOSUPPORT) {
11114fb3a820SAlexander V. Chernikov 		ARP_LOG(LOG_ERR, "Failed to calculate ARP header on %s: %d\n",
11124fb3a820SAlexander V. Chernikov 		    if_name(ifp), error);
11134fb3a820SAlexander V. Chernikov 		return;
11144fb3a820SAlexander V. Chernikov 	}
11154fb3a820SAlexander V. Chernikov 
11164fb3a820SAlexander V. Chernikov 	ro.ro_prepend = linkhdr;
11174fb3a820SAlexander V. Chernikov 	ro.ro_plen = linkhdrsize;
11184fb3a820SAlexander V. Chernikov 	ro.ro_flags = 0;
11194fb3a820SAlexander V. Chernikov 
112086bd0491SAndre Oppermann 	m_clrprotoflags(m);	/* Avoid confusing lower layers. */
11214fb3a820SAlexander V. Chernikov 	(*ifp->if_output)(ifp, m, &sa, &ro);
112254fc657dSGeorge V. Neville-Neil 	ARPSTAT_INC(txreplies);
1123df8bae1dSRodney W. Grimes 	return;
1124b2a8ac7cSLuigi Rizzo 
1125b2a8ac7cSLuigi Rizzo drop:
1126b2a8ac7cSLuigi Rizzo 	m_freem(m);
1127df8bae1dSRodney W. Grimes }
11281d5e9e22SEivind Eklund #endif
1129df8bae1dSRodney W. Grimes 
1130f3bfa7d1SAlexander V. Chernikov /*
1131f3bfa7d1SAlexander V. Chernikov  * Checks received arp data against existing @la.
1132f3bfa7d1SAlexander V. Chernikov  * Updates lle state/performs notification if necessary.
1133f3bfa7d1SAlexander V. Chernikov  */
1134f3bfa7d1SAlexander V. Chernikov static void
1135f3bfa7d1SAlexander V. Chernikov arp_check_update_lle(struct arphdr *ah, struct in_addr isaddr, struct ifnet *ifp,
1136f3bfa7d1SAlexander V. Chernikov     int bridged, struct llentry *la)
1137f3bfa7d1SAlexander V. Chernikov {
1138f3bfa7d1SAlexander V. Chernikov 	struct sockaddr sa;
1139f3bfa7d1SAlexander V. Chernikov 	struct mbuf *m_hold, *m_hold_next;
11404fb3a820SAlexander V. Chernikov 	uint8_t linkhdr[LLE_MAX_LINKHDR];
11414fb3a820SAlexander V. Chernikov 	size_t linkhdrsize;
11424fb3a820SAlexander V. Chernikov 	int lladdr_off;
1143f3bfa7d1SAlexander V. Chernikov 
1144f3bfa7d1SAlexander V. Chernikov 	LLE_WLOCK_ASSERT(la);
1145f3bfa7d1SAlexander V. Chernikov 
1146f3bfa7d1SAlexander V. Chernikov 	/* the following is not an error when doing bridging */
1147f3bfa7d1SAlexander V. Chernikov 	if (!bridged && la->lle_tbl->llt_ifp != ifp) {
1148f3bfa7d1SAlexander V. Chernikov 		if (log_arp_wrong_iface)
1149f3bfa7d1SAlexander V. Chernikov 			ARP_LOG(LOG_WARNING, "%s is on %s "
1150f3bfa7d1SAlexander V. Chernikov 			    "but got reply from %*D on %s\n",
1151f3bfa7d1SAlexander V. Chernikov 			    inet_ntoa(isaddr),
1152f3bfa7d1SAlexander V. Chernikov 			    la->lle_tbl->llt_ifp->if_xname,
1153f3bfa7d1SAlexander V. Chernikov 			    ifp->if_addrlen, (u_char *)ar_sha(ah), ":",
1154f3bfa7d1SAlexander V. Chernikov 			    ifp->if_xname);
1155f3bfa7d1SAlexander V. Chernikov 		LLE_WUNLOCK(la);
1156f3bfa7d1SAlexander V. Chernikov 		return;
1157f3bfa7d1SAlexander V. Chernikov 	}
1158f3bfa7d1SAlexander V. Chernikov 	if ((la->la_flags & LLE_VALID) &&
11594fb3a820SAlexander V. Chernikov 	    bcmp(ar_sha(ah), la->ll_addr, ifp->if_addrlen)) {
1160f3bfa7d1SAlexander V. Chernikov 		if (la->la_flags & LLE_STATIC) {
1161f3bfa7d1SAlexander V. Chernikov 			LLE_WUNLOCK(la);
1162f3bfa7d1SAlexander V. Chernikov 			if (log_arp_permanent_modify)
1163f3bfa7d1SAlexander V. Chernikov 				ARP_LOG(LOG_ERR,
1164f3bfa7d1SAlexander V. Chernikov 				    "%*D attempts to modify "
1165f3bfa7d1SAlexander V. Chernikov 				    "permanent entry for %s on %s\n",
1166f3bfa7d1SAlexander V. Chernikov 				    ifp->if_addrlen,
1167f3bfa7d1SAlexander V. Chernikov 				    (u_char *)ar_sha(ah), ":",
1168f3bfa7d1SAlexander V. Chernikov 				    inet_ntoa(isaddr), ifp->if_xname);
1169f3bfa7d1SAlexander V. Chernikov 			return;
1170f3bfa7d1SAlexander V. Chernikov 		}
1171f3bfa7d1SAlexander V. Chernikov 		if (log_arp_movements) {
1172f3bfa7d1SAlexander V. Chernikov 			ARP_LOG(LOG_INFO, "%s moved from %*D "
1173f3bfa7d1SAlexander V. Chernikov 			    "to %*D on %s\n",
1174f3bfa7d1SAlexander V. Chernikov 			    inet_ntoa(isaddr),
1175f3bfa7d1SAlexander V. Chernikov 			    ifp->if_addrlen,
1176f3bfa7d1SAlexander V. Chernikov 			    (u_char *)&la->ll_addr, ":",
1177f3bfa7d1SAlexander V. Chernikov 			    ifp->if_addrlen, (u_char *)ar_sha(ah), ":",
1178f3bfa7d1SAlexander V. Chernikov 			    ifp->if_xname);
1179f3bfa7d1SAlexander V. Chernikov 		}
1180f3bfa7d1SAlexander V. Chernikov 	}
1181f3bfa7d1SAlexander V. Chernikov 
11824fb3a820SAlexander V. Chernikov 	/* Calculate full link prepend to use in lle */
11834fb3a820SAlexander V. Chernikov 	linkhdrsize = sizeof(linkhdr);
11844fb3a820SAlexander V. Chernikov 	if (lltable_calc_llheader(ifp, AF_INET, ar_sha(ah), linkhdr,
11854fb3a820SAlexander V. Chernikov 	    &linkhdrsize, &lladdr_off) != 0)
1186f3bfa7d1SAlexander V. Chernikov 		return;
1187f3bfa7d1SAlexander V. Chernikov 
11884fb3a820SAlexander V. Chernikov 	/* Check if something has changed */
11894fb3a820SAlexander V. Chernikov 	if (memcmp(la->r_linkdata, linkhdr, linkhdrsize) != 0 ||
11904fb3a820SAlexander V. Chernikov 	    (la->la_flags & LLE_VALID) == 0) {
11914fb3a820SAlexander V. Chernikov 		/* Try to perform LLE update */
11924fb3a820SAlexander V. Chernikov 		if (lltable_try_set_entry_addr(ifp, la, linkhdr, linkhdrsize,
11934fb3a820SAlexander V. Chernikov 		    lladdr_off) == 0)
11944fb3a820SAlexander V. Chernikov 			return;
1195f8aee88fSAlexander V. Chernikov 
1196f8aee88fSAlexander V. Chernikov 		/* Clear fast path feedback request if set */
1197f8aee88fSAlexander V. Chernikov 		la->r_skip_req = 0;
1198f3bfa7d1SAlexander V. Chernikov 	}
1199f3bfa7d1SAlexander V. Chernikov 
1200f3bfa7d1SAlexander V. Chernikov 	arp_mark_lle_reachable(la);
1201f3bfa7d1SAlexander V. Chernikov 
1202f3bfa7d1SAlexander V. Chernikov 	/*
1203f3bfa7d1SAlexander V. Chernikov 	 * The packets are all freed within the call to the output
1204f3bfa7d1SAlexander V. Chernikov 	 * routine.
1205f3bfa7d1SAlexander V. Chernikov 	 *
1206f3bfa7d1SAlexander V. Chernikov 	 * NB: The lock MUST be released before the call to the
1207f3bfa7d1SAlexander V. Chernikov 	 * output routine.
1208f3bfa7d1SAlexander V. Chernikov 	 */
1209f3bfa7d1SAlexander V. Chernikov 	if (la->la_hold != NULL) {
1210f3bfa7d1SAlexander V. Chernikov 		m_hold = la->la_hold;
1211f3bfa7d1SAlexander V. Chernikov 		la->la_hold = NULL;
1212f3bfa7d1SAlexander V. Chernikov 		la->la_numheld = 0;
1213f3bfa7d1SAlexander V. Chernikov 		lltable_fill_sa_entry(la, &sa);
1214f3bfa7d1SAlexander V. Chernikov 		LLE_WUNLOCK(la);
1215f3bfa7d1SAlexander V. Chernikov 		for (; m_hold != NULL; m_hold = m_hold_next) {
1216f3bfa7d1SAlexander V. Chernikov 			m_hold_next = m_hold->m_nextpkt;
1217f3bfa7d1SAlexander V. Chernikov 			m_hold->m_nextpkt = NULL;
1218f3bfa7d1SAlexander V. Chernikov 			/* Avoid confusing lower layers. */
1219f3bfa7d1SAlexander V. Chernikov 			m_clrprotoflags(m_hold);
1220f3bfa7d1SAlexander V. Chernikov 			(*ifp->if_output)(ifp, m_hold, &sa, NULL);
1221f3bfa7d1SAlexander V. Chernikov 		}
1222f3bfa7d1SAlexander V. Chernikov 	} else
1223f3bfa7d1SAlexander V. Chernikov 		LLE_WUNLOCK(la);
1224f3bfa7d1SAlexander V. Chernikov }
1225f3bfa7d1SAlexander V. Chernikov 
1226f3bfa7d1SAlexander V. Chernikov static void
1227f3bfa7d1SAlexander V. Chernikov arp_mark_lle_reachable(struct llentry *la)
1228f3bfa7d1SAlexander V. Chernikov {
1229f8aee88fSAlexander V. Chernikov 	int canceled, wtime;
1230f3bfa7d1SAlexander V. Chernikov 
1231f3bfa7d1SAlexander V. Chernikov 	LLE_WLOCK_ASSERT(la);
1232f3bfa7d1SAlexander V. Chernikov 
1233f8aee88fSAlexander V. Chernikov 	la->ln_state = ARP_LLINFO_REACHABLE;
1234f3bfa7d1SAlexander V. Chernikov 	EVENTHANDLER_INVOKE(lle_event, la, LLENTRY_RESOLVED);
1235f3bfa7d1SAlexander V. Chernikov 
1236f3bfa7d1SAlexander V. Chernikov 	if (!(la->la_flags & LLE_STATIC)) {
1237f3bfa7d1SAlexander V. Chernikov 		LLE_ADDREF(la);
1238f3bfa7d1SAlexander V. Chernikov 		la->la_expire = time_uptime + V_arpt_keep;
1239f8aee88fSAlexander V. Chernikov 		wtime = V_arpt_keep - V_arp_maxtries * V_arpt_rexmit;
1240f8aee88fSAlexander V. Chernikov 		if (wtime < 0)
1241f8aee88fSAlexander V. Chernikov 			wtime = V_arpt_keep;
1242f3bfa7d1SAlexander V. Chernikov 		canceled = callout_reset(&la->lle_timer,
1243f8aee88fSAlexander V. Chernikov 		    hz * wtime, arptimer, la);
1244f3bfa7d1SAlexander V. Chernikov 		if (canceled)
1245f3bfa7d1SAlexander V. Chernikov 			LLE_REMREF(la);
1246f3bfa7d1SAlexander V. Chernikov 	}
1247f3bfa7d1SAlexander V. Chernikov 	la->la_asked = 0;
1248f3bfa7d1SAlexander V. Chernikov 	la->la_preempt = V_arp_maxtries;
1249f3bfa7d1SAlexander V. Chernikov }
1250f3bfa7d1SAlexander V. Chernikov 
12511c302b58SAlexander V. Chernikov /*
12521c302b58SAlexander V. Chernikov  * Add pernament link-layer record for given interface address.
12531c302b58SAlexander V. Chernikov  */
12541c302b58SAlexander V. Chernikov static __noinline void
12551c302b58SAlexander V. Chernikov arp_add_ifa_lle(struct ifnet *ifp, const struct sockaddr *dst)
1256dd2e4102SGarrett Wollman {
12575a255516SAlexander V. Chernikov 	struct llentry *lle, *lle_tmp;
12585a255516SAlexander V. Chernikov 
12596e6b3f7cSQing Li 	/*
12605a255516SAlexander V. Chernikov 	 * Interface address LLE record is considered static
12615a255516SAlexander V. Chernikov 	 * because kernel code relies on LLE_STATIC flag to check
12625a255516SAlexander V. Chernikov 	 * if these entries can be rewriten by arp updates.
12636e6b3f7cSQing Li 	 */
12645a255516SAlexander V. Chernikov 	lle = lltable_alloc_entry(LLTABLE(ifp), LLE_IFADDR | LLE_STATIC, dst);
12655a255516SAlexander V. Chernikov 	if (lle == NULL) {
12666e6b3f7cSQing Li 		log(LOG_INFO, "arp_ifinit: cannot create arp "
12676e6b3f7cSQing Li 		    "entry for interface address\n");
12685a255516SAlexander V. Chernikov 		return;
1269ce9122fdSQing Li 	}
12705a255516SAlexander V. Chernikov 
12715a255516SAlexander V. Chernikov 	IF_AFDATA_WLOCK(ifp);
12725a255516SAlexander V. Chernikov 	LLE_WLOCK(lle);
12735a255516SAlexander V. Chernikov 	/* Unlink any entry if exists */
12745a255516SAlexander V. Chernikov 	lle_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst);
12755a255516SAlexander V. Chernikov 	if (lle_tmp != NULL)
12765a255516SAlexander V. Chernikov 		lltable_unlink_entry(LLTABLE(ifp), lle_tmp);
12775a255516SAlexander V. Chernikov 
12785a255516SAlexander V. Chernikov 	lltable_link_entry(LLTABLE(ifp), lle);
12795a255516SAlexander V. Chernikov 	IF_AFDATA_WUNLOCK(ifp);
12805a255516SAlexander V. Chernikov 
12815a255516SAlexander V. Chernikov 	if (lle_tmp != NULL)
12825a255516SAlexander V. Chernikov 		EVENTHANDLER_INVOKE(lle_event, lle_tmp, LLENTRY_EXPIRED);
12835a255516SAlexander V. Chernikov 
12845a255516SAlexander V. Chernikov 	EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_RESOLVED);
12855a255516SAlexander V. Chernikov 	LLE_WUNLOCK(lle);
12865a255516SAlexander V. Chernikov 	if (lle_tmp != NULL)
12875a255516SAlexander V. Chernikov 		lltable_free_entry(LLTABLE(ifp), lle_tmp);
1288dd2e4102SGarrett Wollman }
1289df5e1987SJonathan Lemon 
1290a9771948SGleb Smirnoff void
12911c302b58SAlexander V. Chernikov arp_ifinit(struct ifnet *ifp, struct ifaddr *ifa)
1292a9771948SGleb Smirnoff {
12931c302b58SAlexander V. Chernikov 	const struct sockaddr_in *dst_in;
12941c302b58SAlexander V. Chernikov 	const struct sockaddr *dst;
12951c302b58SAlexander V. Chernikov 
12961c302b58SAlexander V. Chernikov 	if (ifa->ifa_carp != NULL)
12971c302b58SAlexander V. Chernikov 		return;
12981c302b58SAlexander V. Chernikov 
12991c302b58SAlexander V. Chernikov 	dst = ifa->ifa_addr;
13001c302b58SAlexander V. Chernikov 	dst_in = (const struct sockaddr_in *)dst;
13011c302b58SAlexander V. Chernikov 
13021c302b58SAlexander V. Chernikov 	if (ntohl(dst_in->sin_addr.s_addr) == INADDR_ANY)
13031c302b58SAlexander V. Chernikov 		return;
1304d6e82913SSteven Hartland 	arp_announce_ifaddr(ifp, dst_in->sin_addr, IF_LLADDR(ifp));
13051c302b58SAlexander V. Chernikov 
13061c302b58SAlexander V. Chernikov 	arp_add_ifa_lle(ifp, dst);
13071c302b58SAlexander V. Chernikov }
13081c302b58SAlexander V. Chernikov 
1309d6e82913SSteven Hartland void
1310d6e82913SSteven Hartland arp_announce_ifaddr(struct ifnet *ifp, struct in_addr addr, u_char *enaddr)
13111c302b58SAlexander V. Chernikov {
13121c302b58SAlexander V. Chernikov 
1313d6e82913SSteven Hartland 	if (ntohl(addr.s_addr) != INADDR_ANY)
1314d6e82913SSteven Hartland 		arprequest(ifp, &addr, &addr, enaddr);
1315a9771948SGleb Smirnoff }
1316a9771948SGleb Smirnoff 
1317b13c5b5dSAlexander V. Chernikov /*
1318d6e82913SSteven Hartland  * Sends gratuitous ARPs for each ifaddr to notify other
1319d6e82913SSteven Hartland  * nodes about the address change.
1320b13c5b5dSAlexander V. Chernikov  */
1321d6e82913SSteven Hartland static __noinline void
1322d6e82913SSteven Hartland arp_handle_ifllchange(struct ifnet *ifp)
1323b13c5b5dSAlexander V. Chernikov {
1324b13c5b5dSAlexander V. Chernikov 	struct ifaddr *ifa;
1325b13c5b5dSAlexander V. Chernikov 
132652e53e2dSSteven Hartland 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1327d6e82913SSteven Hartland 		if (ifa->ifa_addr->sa_family == AF_INET)
1328d6e82913SSteven Hartland 			arp_ifinit(ifp, ifa);
132952e53e2dSSteven Hartland 	}
1330b13c5b5dSAlexander V. Chernikov }
1331b13c5b5dSAlexander V. Chernikov 
1332b13c5b5dSAlexander V. Chernikov /*
1333d6e82913SSteven Hartland  * A handler for interface link layer address change event.
1334b13c5b5dSAlexander V. Chernikov  */
13354fb3a820SAlexander V. Chernikov static void
1336b13c5b5dSAlexander V. Chernikov arp_iflladdr(void *arg __unused, struct ifnet *ifp)
1337b13c5b5dSAlexander V. Chernikov {
1338b13c5b5dSAlexander V. Chernikov 
13394fb3a820SAlexander V. Chernikov 	lltable_update_ifaddr(LLTABLE(ifp));
13404fb3a820SAlexander V. Chernikov 
1341d6e82913SSteven Hartland 	if ((ifp->if_flags & IFF_UP) != 0)
1342d6e82913SSteven Hartland 		arp_handle_ifllchange(ifp);
1343b13c5b5dSAlexander V. Chernikov }
1344b13c5b5dSAlexander V. Chernikov 
13451ed81b73SMarko Zec static void
1346484149deSBjoern A. Zeeb vnet_arp_init(void)
13471ed81b73SMarko Zec {
13481ed81b73SMarko Zec 
1349484149deSBjoern A. Zeeb 	if (IS_DEFAULT_VNET(curvnet)) {
1350d4b5cae4SRobert Watson 		netisr_register(&arp_nh);
1351b13c5b5dSAlexander V. Chernikov 		iflladdr_tag = EVENTHANDLER_REGISTER(iflladdr_event,
1352b13c5b5dSAlexander V. Chernikov 		    arp_iflladdr, NULL, EVENTHANDLER_PRI_ANY);
1353df5e1987SJonathan Lemon 	}
1354484149deSBjoern A. Zeeb #ifdef VIMAGE
1355484149deSBjoern A. Zeeb 	else
1356484149deSBjoern A. Zeeb 		netisr_register_vnet(&arp_nh);
1357484149deSBjoern A. Zeeb #endif
1358484149deSBjoern A. Zeeb }
1359484149deSBjoern A. Zeeb VNET_SYSINIT(vnet_arp_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_SECOND,
1360484149deSBjoern A. Zeeb     vnet_arp_init, 0);
1361484149deSBjoern A. Zeeb 
1362484149deSBjoern A. Zeeb #ifdef VIMAGE
1363484149deSBjoern A. Zeeb /*
1364484149deSBjoern A. Zeeb  * We have to unregister ARP along with IP otherwise we risk doing INADDR_HASH
1365484149deSBjoern A. Zeeb  * lookups after destroying the hash.  Ideally this would go on SI_ORDER_3.5.
1366484149deSBjoern A. Zeeb  */
1367484149deSBjoern A. Zeeb static void
1368484149deSBjoern A. Zeeb vnet_arp_destroy(__unused void *arg)
1369484149deSBjoern A. Zeeb {
1370484149deSBjoern A. Zeeb 
1371484149deSBjoern A. Zeeb 	netisr_unregister_vnet(&arp_nh);
1372484149deSBjoern A. Zeeb }
1373484149deSBjoern A. Zeeb VNET_SYSUNINIT(vnet_arp_uninit, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD,
1374484149deSBjoern A. Zeeb     vnet_arp_destroy, NULL);
1375484149deSBjoern A. Zeeb #endif
1376