1c398230bSWarner Losh /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 14df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 15df8bae1dSRodney W. Grimes * without specific prior written permission. 16df8bae1dSRodney W. Grimes * 17df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27df8bae1dSRodney W. Grimes * SUCH DAMAGE. 28df8bae1dSRodney W. Grimes * 29df8bae1dSRodney W. Grimes * @(#)if_ether.c 8.1 (Berkeley) 6/10/93 30df8bae1dSRodney W. Grimes */ 31df8bae1dSRodney W. Grimes 32df8bae1dSRodney W. Grimes /* 33df8bae1dSRodney W. Grimes * Ethernet address resolution protocol. 34df8bae1dSRodney W. Grimes * TODO: 35df8bae1dSRodney W. Grimes * add "inuse/lock" bit (or ref. count) along with valid bit 36df8bae1dSRodney W. Grimes */ 37df8bae1dSRodney W. Grimes 384b421e2dSMike Silbersack #include <sys/cdefs.h> 394b421e2dSMike Silbersack __FBSDID("$FreeBSD$"); 404b421e2dSMike Silbersack 411d5e9e22SEivind Eklund #include "opt_inet.h" 421d5e9e22SEivind Eklund 43df8bae1dSRodney W. Grimes #include <sys/param.h> 44df8bae1dSRodney W. Grimes #include <sys/kernel.h> 45cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h> 46ce02431fSDoug Rabson #include <sys/queue.h> 47885f1aa4SPoul-Henning Kamp #include <sys/sysctl.h> 48885f1aa4SPoul-Henning Kamp #include <sys/systm.h> 49885f1aa4SPoul-Henning Kamp #include <sys/mbuf.h> 50885f1aa4SPoul-Henning Kamp #include <sys/malloc.h> 51de34ad3fSJulian Elischer #include <sys/proc.h> 52cc0a3c8cSAndrey V. Elsukov #include <sys/rmlock.h> 534458ac71SBruce Evans #include <sys/socket.h> 54885f1aa4SPoul-Henning Kamp #include <sys/syslog.h> 55df8bae1dSRodney W. Grimes 56df8bae1dSRodney W. Grimes #include <net/if.h> 5776039bc8SGleb Smirnoff #include <net/if_var.h> 58df8bae1dSRodney W. Grimes #include <net/if_dl.h> 59722012ccSJulian Elischer #include <net/if_types.h> 60748e0b0aSGarrett Wollman #include <net/netisr.h> 61c8f8e9c1SJulian Elischer #include <net/ethernet.h> 625736e6fbSBjoern A. Zeeb #include <net/route.h> 63530c0060SRobert Watson #include <net/vnet.h> 64df8bae1dSRodney W. Grimes 65df8bae1dSRodney W. Grimes #include <netinet/in.h> 66df8bae1dSRodney W. Grimes #include <netinet/in_var.h> 676e6b3f7cSQing Li #include <net/if_llatbl.h> 68df8bae1dSRodney W. Grimes #include <netinet/if_ether.h> 6983e521ecSBjoern A. Zeeb #ifdef INET 709963e8a5SWill Andrews #include <netinet/ip_carp.h> 719963e8a5SWill Andrews #endif 72df8bae1dSRodney W. Grimes 73aed55708SRobert Watson #include <security/mac/mac_framework.h> 74aed55708SRobert Watson 7547e8d432SGleb Smirnoff #define SIN(s) ((const struct sockaddr_in *)(s)) 76eec33ea0SAlexander V. Chernikov 77eec33ea0SAlexander V. Chernikov static struct timeval arp_lastlog; 78eec33ea0SAlexander V. Chernikov static int arp_curpps; 79eec33ea0SAlexander V. Chernikov static int arp_maxpps = 1; 80df8bae1dSRodney W. Grimes 81*f8aee88fSAlexander V. Chernikov /* Simple ARP state machine */ 82*f8aee88fSAlexander V. Chernikov enum arp_llinfo_state { 83*f8aee88fSAlexander V. Chernikov ARP_LLINFO_INCOMPLETE = 0, /* No LLE data */ 84*f8aee88fSAlexander V. Chernikov ARP_LLINFO_REACHABLE, /* LLE is valid */ 85*f8aee88fSAlexander V. Chernikov ARP_LLINFO_VERIFY, /* LLE is valid, need refresh */ 86*f8aee88fSAlexander V. Chernikov ARP_LLINFO_DELETED, /* LLE is deleted */ 87*f8aee88fSAlexander V. Chernikov }; 88*f8aee88fSAlexander V. Chernikov 89ce02431fSDoug Rabson SYSCTL_DECL(_net_link_ether); 906472ac3dSEd Schouten static SYSCTL_NODE(_net_link_ether, PF_INET, inet, CTLFLAG_RW, 0, ""); 916472ac3dSEd Schouten static SYSCTL_NODE(_net_link_ether, PF_ARP, arp, CTLFLAG_RW, 0, ""); 92df8bae1dSRodney W. Grimes 93df8bae1dSRodney W. Grimes /* timer values */ 943e288e62SDimitry Andric static VNET_DEFINE(int, arpt_keep) = (20*60); /* once resolved, good for 20 95eddfbb76SRobert Watson * minutes */ 963e288e62SDimitry Andric static VNET_DEFINE(int, arp_maxtries) = 5; 973e288e62SDimitry Andric static VNET_DEFINE(int, arp_proxyall) = 0; 983e288e62SDimitry Andric static VNET_DEFINE(int, arpt_down) = 20; /* keep incomplete entries for 9993704ac5SQing Li * 20 seconds */ 100*f8aee88fSAlexander V. Chernikov static VNET_DEFINE(int, arpt_rexmit) = 1; /* retransmit arp entries, sec*/ 1015b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_DEFINE(struct arpstat, arpstat); /* ARP statistics, see if_arp.h */ 1025b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_SYSINIT(arpstat); 1035b7cb97cSAndrey V. Elsukov 1045b7cb97cSAndrey V. Elsukov #ifdef VIMAGE 1055b7cb97cSAndrey V. Elsukov VNET_PCPUSTAT_SYSUNINIT(arpstat); 1065b7cb97cSAndrey V. Elsukov #endif /* VIMAGE */ 107e162ea60SGeorge V. Neville-Neil 1083e288e62SDimitry Andric static VNET_DEFINE(int, arp_maxhold) = 1; 109885f1aa4SPoul-Henning Kamp 1101e77c105SRobert Watson #define V_arpt_keep VNET(arpt_keep) 11193704ac5SQing Li #define V_arpt_down VNET(arpt_down) 112*f8aee88fSAlexander V. Chernikov #define V_arpt_rexmit VNET(arpt_rexmit) 1131e77c105SRobert Watson #define V_arp_maxtries VNET(arp_maxtries) 1141e77c105SRobert Watson #define V_arp_proxyall VNET(arp_proxyall) 115e162ea60SGeorge V. Neville-Neil #define V_arp_maxhold VNET(arp_maxhold) 116885f1aa4SPoul-Henning Kamp 1176df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, max_age, CTLFLAG_VNET | CTLFLAG_RW, 118eddfbb76SRobert Watson &VNET_NAME(arpt_keep), 0, 119eddfbb76SRobert Watson "ARP entry lifetime in seconds"); 1206df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, maxtries, CTLFLAG_VNET | CTLFLAG_RW, 121eddfbb76SRobert Watson &VNET_NAME(arp_maxtries), 0, 1228b615593SMarko Zec "ARP resolution attempts before returning error"); 1236df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, proxyall, CTLFLAG_VNET | CTLFLAG_RW, 124eddfbb76SRobert Watson &VNET_NAME(arp_proxyall), 0, 1258b615593SMarko Zec "Enable proxy ARP for all suitable requests"); 1266df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, wait, CTLFLAG_VNET | CTLFLAG_RW, 127e162ea60SGeorge V. Neville-Neil &VNET_NAME(arpt_down), 0, 128e162ea60SGeorge V. Neville-Neil "Incomplete ARP entry lifetime in seconds"); 1295b7cb97cSAndrey V. Elsukov SYSCTL_VNET_PCPUSTAT(_net_link_ether_arp, OID_AUTO, stats, struct arpstat, 1305b7cb97cSAndrey V. Elsukov arpstat, "ARP statistics (struct arpstat, net/if_arp.h)"); 1316df8a710SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, maxhold, CTLFLAG_VNET | CTLFLAG_RW, 132e162ea60SGeorge V. Neville-Neil &VNET_NAME(arp_maxhold), 0, 133e162ea60SGeorge V. Neville-Neil "Number of packets to hold per ARP entry"); 134eec33ea0SAlexander V. Chernikov SYSCTL_INT(_net_link_ether_inet, OID_AUTO, max_log_per_second, 135eec33ea0SAlexander V. Chernikov CTLFLAG_RW, &arp_maxpps, 0, 136eec33ea0SAlexander V. Chernikov "Maximum number of remotely triggered ARP messages that can be " 137eec33ea0SAlexander V. Chernikov "logged per second"); 138eec33ea0SAlexander V. Chernikov 139eec33ea0SAlexander V. Chernikov #define ARP_LOG(pri, ...) do { \ 140eec33ea0SAlexander V. Chernikov if (ppsratecheck(&arp_lastlog, &arp_curpps, arp_maxpps)) \ 141eec33ea0SAlexander V. Chernikov log((pri), "arp: " __VA_ARGS__); \ 142eec33ea0SAlexander V. Chernikov } while (0) 143eec33ea0SAlexander V. Chernikov 144885f1aa4SPoul-Henning Kamp 1454d77a549SAlfred Perlstein static void arp_init(void); 1461cafed39SJonathan Lemon static void arpintr(struct mbuf *); 1474d77a549SAlfred Perlstein static void arptimer(void *); 1481d5e9e22SEivind Eklund #ifdef INET 1494d77a549SAlfred Perlstein static void in_arpinput(struct mbuf *); 1501d5e9e22SEivind Eklund #endif 15128e82295SGarrett Wollman 152f3bfa7d1SAlexander V. Chernikov static void arp_check_update_lle(struct arphdr *ah, struct in_addr isaddr, 153f3bfa7d1SAlexander V. Chernikov struct ifnet *ifp, int bridged, struct llentry *la); 154f3bfa7d1SAlexander V. Chernikov static void arp_mark_lle_reachable(struct llentry *la); 155b13c5b5dSAlexander V. Chernikov static void arp_iflladdr(void *arg __unused, struct ifnet *ifp); 156f3bfa7d1SAlexander V. Chernikov 157b13c5b5dSAlexander V. Chernikov static eventhandler_tag iflladdr_tag; 158f3bfa7d1SAlexander V. Chernikov 159d4b5cae4SRobert Watson static const struct netisr_handler arp_nh = { 160d4b5cae4SRobert Watson .nh_name = "arp", 161d4b5cae4SRobert Watson .nh_handler = arpintr, 162d4b5cae4SRobert Watson .nh_proto = NETISR_ARP, 163d4b5cae4SRobert Watson .nh_policy = NETISR_POLICY_SOURCE, 164d4b5cae4SRobert Watson }; 165d4b5cae4SRobert Watson 1666e6b3f7cSQing Li /* 1676e6b3f7cSQing Li * Timeout routine. Age arp_tab entries periodically. 168df8bae1dSRodney W. Grimes */ 169df8bae1dSRodney W. Grimes static void 1701daaa65dSGleb Smirnoff arptimer(void *arg) 171df8bae1dSRodney W. Grimes { 172ea537929SGleb Smirnoff struct llentry *lle = (struct llentry *)arg; 1736e6b3f7cSQing Li struct ifnet *ifp; 174*f8aee88fSAlexander V. Chernikov int r_skip_req; 175df8bae1dSRodney W. Grimes 176ea537929SGleb Smirnoff if (lle->la_flags & LLE_STATIC) { 1772575fbb8SRandall Stewart return; 1782575fbb8SRandall Stewart } 1792575fbb8SRandall Stewart LLE_WLOCK(lle); 1800447c136SAlexander V. Chernikov if (callout_pending(&lle->lle_timer)) { 1812575fbb8SRandall Stewart /* 1822575fbb8SRandall Stewart * Here we are a bit odd here in the treatment of 1832575fbb8SRandall Stewart * active/pending. If the pending bit is set, it got 1842575fbb8SRandall Stewart * rescheduled before I ran. The active 1852575fbb8SRandall Stewart * bit we ignore, since if it was stopped 1862575fbb8SRandall Stewart * in ll_tablefree() and was currently running 1872575fbb8SRandall Stewart * it would have return 0 so the code would 1882575fbb8SRandall Stewart * not have deleted it since the callout could 1892575fbb8SRandall Stewart * not be stopped so we want to go through 1902575fbb8SRandall Stewart * with the delete here now. If the callout 1912575fbb8SRandall Stewart * was restarted, the pending bit will be back on and 1922575fbb8SRandall Stewart * we just want to bail since the callout_reset would 1932575fbb8SRandall Stewart * return 1 and our reference would have been removed 1942575fbb8SRandall Stewart * by arpresolve() below. 1952575fbb8SRandall Stewart */ 196ea537929SGleb Smirnoff LLE_WUNLOCK(lle); 197ea537929SGleb Smirnoff return; 198ea537929SGleb Smirnoff } 1996e6b3f7cSQing Li ifp = lle->lle_tbl->llt_ifp; 20054fc657dSGeorge V. Neville-Neil CURVNET_SET(ifp->if_vnet); 20109fe6320SNavdeep Parhar 202*f8aee88fSAlexander V. Chernikov switch (lle->ln_state) { 203*f8aee88fSAlexander V. Chernikov case ARP_LLINFO_REACHABLE: 204*f8aee88fSAlexander V. Chernikov 205*f8aee88fSAlexander V. Chernikov /* 206*f8aee88fSAlexander V. Chernikov * Expiration time is approaching. 207*f8aee88fSAlexander V. Chernikov * Let's try to refresh entry if it is still 208*f8aee88fSAlexander V. Chernikov * in use. 209*f8aee88fSAlexander V. Chernikov * 210*f8aee88fSAlexander V. Chernikov * Set r_skip_req to get feedback from 211*f8aee88fSAlexander V. Chernikov * fast path. Change state and re-schedule 212*f8aee88fSAlexander V. Chernikov * ourselves. 213*f8aee88fSAlexander V. Chernikov */ 214*f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(lle); 215*f8aee88fSAlexander V. Chernikov lle->r_skip_req = 1; 216*f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(lle); 217*f8aee88fSAlexander V. Chernikov lle->ln_state = ARP_LLINFO_VERIFY; 218*f8aee88fSAlexander V. Chernikov callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit); 219*f8aee88fSAlexander V. Chernikov LLE_WUNLOCK(lle); 220*f8aee88fSAlexander V. Chernikov CURVNET_RESTORE(); 221*f8aee88fSAlexander V. Chernikov return; 222*f8aee88fSAlexander V. Chernikov case ARP_LLINFO_VERIFY: 223*f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(lle); 224*f8aee88fSAlexander V. Chernikov r_skip_req = lle->r_skip_req; 225*f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(lle); 226*f8aee88fSAlexander V. Chernikov 227*f8aee88fSAlexander V. Chernikov if (r_skip_req == 0 && lle->la_preempt > 0) { 228*f8aee88fSAlexander V. Chernikov /* Entry was used, issue refresh request */ 229*f8aee88fSAlexander V. Chernikov struct in_addr dst; 230*f8aee88fSAlexander V. Chernikov dst = lle->r_l3addr.addr4; 231*f8aee88fSAlexander V. Chernikov lle->la_preempt--; 232*f8aee88fSAlexander V. Chernikov callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit); 233*f8aee88fSAlexander V. Chernikov LLE_WUNLOCK(lle); 234*f8aee88fSAlexander V. Chernikov arprequest(ifp, NULL, &dst, NULL); 235*f8aee88fSAlexander V. Chernikov CURVNET_RESTORE(); 236*f8aee88fSAlexander V. Chernikov return; 237*f8aee88fSAlexander V. Chernikov } 238*f8aee88fSAlexander V. Chernikov /* Nothing happened. Reschedule if not too late */ 239*f8aee88fSAlexander V. Chernikov if (lle->la_expire > time_uptime) { 240*f8aee88fSAlexander V. Chernikov callout_schedule(&lle->lle_timer, hz * V_arpt_rexmit); 241*f8aee88fSAlexander V. Chernikov LLE_WUNLOCK(lle); 242*f8aee88fSAlexander V. Chernikov CURVNET_RESTORE(); 243*f8aee88fSAlexander V. Chernikov return; 244*f8aee88fSAlexander V. Chernikov } 245*f8aee88fSAlexander V. Chernikov break; 246*f8aee88fSAlexander V. Chernikov case ARP_LLINFO_INCOMPLETE: 247*f8aee88fSAlexander V. Chernikov case ARP_LLINFO_DELETED: 248*f8aee88fSAlexander V. Chernikov break; 249*f8aee88fSAlexander V. Chernikov } 250*f8aee88fSAlexander V. Chernikov 251e364d8c4SNavdeep Parhar if ((lle->la_flags & LLE_DELETED) == 0) { 25209fe6320SNavdeep Parhar int evt; 25309fe6320SNavdeep Parhar 25409fe6320SNavdeep Parhar if (lle->la_flags & LLE_VALID) 25509fe6320SNavdeep Parhar evt = LLENTRY_EXPIRED; 25609fe6320SNavdeep Parhar else 25709fe6320SNavdeep Parhar evt = LLENTRY_TIMEDOUT; 25809fe6320SNavdeep Parhar EVENTHANDLER_INVOKE(lle_event, lle, evt); 25909fe6320SNavdeep Parhar } 26009fe6320SNavdeep Parhar 2610447c136SAlexander V. Chernikov callout_stop(&lle->lle_timer); 262ea537929SGleb Smirnoff 263ea537929SGleb Smirnoff /* XXX: LOR avoidance. We still have ref on lle. */ 264ea537929SGleb Smirnoff LLE_WUNLOCK(lle); 265ea537929SGleb Smirnoff IF_AFDATA_LOCK(ifp); 266ea537929SGleb Smirnoff LLE_WLOCK(lle); 267ea537929SGleb Smirnoff 268b1ec2940SGleb Smirnoff /* Guard against race with other llentry_free(). */ 269b1ec2940SGleb Smirnoff if (lle->la_flags & LLE_LINKED) { 270ea537929SGleb Smirnoff LLE_REMREF(lle); 271d3cdb716SAlexander V. Chernikov lltable_unlink_entry(lle->lle_tbl, lle); 272d3cdb716SAlexander V. Chernikov } 273b1ec2940SGleb Smirnoff IF_AFDATA_UNLOCK(ifp); 274b1ec2940SGleb Smirnoff 275d3cdb716SAlexander V. Chernikov size_t pkts_dropped = llentry_free(lle); 276d3cdb716SAlexander V. Chernikov 277d3cdb716SAlexander V. Chernikov ARPSTAT_ADD(dropped, pkts_dropped); 27854fc657dSGeorge V. Neville-Neil ARPSTAT_INC(timeouts); 279b1ec2940SGleb Smirnoff 28054fc657dSGeorge V. Neville-Neil CURVNET_RESTORE(); 281df8bae1dSRodney W. Grimes } 282df8bae1dSRodney W. Grimes 283df8bae1dSRodney W. Grimes /* 284df8bae1dSRodney W. Grimes * Broadcast an ARP request. Caller specifies: 285df8bae1dSRodney W. Grimes * - arp header source ip address 286df8bae1dSRodney W. Grimes * - arp header target ip address 287df8bae1dSRodney W. Grimes * - arp header source ethernet address 288df8bae1dSRodney W. Grimes */ 2896e6b3f7cSQing Li void 29047e8d432SGleb Smirnoff arprequest(struct ifnet *ifp, const struct in_addr *sip, 29147e8d432SGleb Smirnoff const struct in_addr *tip, u_char *enaddr) 292df8bae1dSRodney W. Grimes { 293e952fa39SMatthew N. Dodd struct mbuf *m; 294e952fa39SMatthew N. Dodd struct arphdr *ah; 295df8bae1dSRodney W. Grimes struct sockaddr sa; 296aa24ae3cSGleb Smirnoff u_char *carpaddr = NULL; 297df8bae1dSRodney W. Grimes 2986e6b3f7cSQing Li if (sip == NULL) { 2996e6b3f7cSQing Li /* 3006e6b3f7cSQing Li * The caller did not supply a source address, try to find 3016e6b3f7cSQing Li * a compatible one among those assigned to this interface. 3026e6b3f7cSQing Li */ 3036e6b3f7cSQing Li struct ifaddr *ifa; 3046e6b3f7cSQing Li 305aa24ae3cSGleb Smirnoff IF_ADDR_RLOCK(ifp); 3066e6b3f7cSQing Li TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 307aa24ae3cSGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET) 3086e6b3f7cSQing Li continue; 309aa24ae3cSGleb Smirnoff 310aa24ae3cSGleb Smirnoff if (ifa->ifa_carp) { 311aa24ae3cSGleb Smirnoff if ((*carp_iamatch_p)(ifa, &carpaddr) == 0) 312aa24ae3cSGleb Smirnoff continue; 313aa24ae3cSGleb Smirnoff sip = &IA_SIN(ifa)->sin_addr; 314aa24ae3cSGleb Smirnoff } else { 315aa24ae3cSGleb Smirnoff carpaddr = NULL; 316aa24ae3cSGleb Smirnoff sip = &IA_SIN(ifa)->sin_addr; 317aa24ae3cSGleb Smirnoff } 318aa24ae3cSGleb Smirnoff 3196e6b3f7cSQing Li if (0 == ((sip->s_addr ^ tip->s_addr) & 320aa24ae3cSGleb Smirnoff IA_MASKSIN(ifa)->sin_addr.s_addr)) 3216e6b3f7cSQing Li break; /* found it. */ 3226e6b3f7cSQing Li } 323aa24ae3cSGleb Smirnoff IF_ADDR_RUNLOCK(ifp); 3246e6b3f7cSQing Li if (sip == NULL) { 3256e6b3f7cSQing Li printf("%s: cannot find matching address\n", __func__); 3266e6b3f7cSQing Li return; 3276e6b3f7cSQing Li } 3286e6b3f7cSQing Li } 329aa24ae3cSGleb Smirnoff if (enaddr == NULL) 330aa24ae3cSGleb Smirnoff enaddr = carpaddr ? carpaddr : (u_char *)IF_LLADDR(ifp); 3316e6b3f7cSQing Li 332eb1b1807SGleb Smirnoff if ((m = m_gethdr(M_NOWAIT, MT_DATA)) == NULL) 333df8bae1dSRodney W. Grimes return; 33464bf80ceSMatthew N. Dodd m->m_len = sizeof(*ah) + 2 * sizeof(struct in_addr) + 335546451a2SGleb Smirnoff 2 * ifp->if_addrlen; 33664bf80ceSMatthew N. Dodd m->m_pkthdr.len = m->m_len; 337ed6a66caSRobert Watson M_ALIGN(m, m->m_len); 33864bf80ceSMatthew N. Dodd ah = mtod(m, struct arphdr *); 33964bf80ceSMatthew N. Dodd bzero((caddr_t)ah, m->m_len); 34019527d3eSRobert Watson #ifdef MAC 341b9b0dac3SRobert Watson mac_netinet_arp_send(ifp, m); 34219527d3eSRobert Watson #endif 343322dcb8dSMax Khon ah->ar_pro = htons(ETHERTYPE_IP); 344322dcb8dSMax Khon ah->ar_hln = ifp->if_addrlen; /* hardware address length */ 345322dcb8dSMax Khon ah->ar_pln = sizeof(struct in_addr); /* protocol address length */ 346322dcb8dSMax Khon ah->ar_op = htons(ARPOP_REQUEST); 34747e8d432SGleb Smirnoff bcopy(enaddr, ar_sha(ah), ah->ar_hln); 34847e8d432SGleb Smirnoff bcopy(sip, ar_spa(ah), ah->ar_pln); 34947e8d432SGleb Smirnoff bcopy(tip, ar_tpa(ah), ah->ar_pln); 35064bf80ceSMatthew N. Dodd sa.sa_family = AF_ARP; 35164bf80ceSMatthew N. Dodd sa.sa_len = 2; 35264bf80ceSMatthew N. Dodd m->m_flags |= M_BCAST; 35386bd0491SAndre Oppermann m_clrprotoflags(m); /* Avoid confusing lower layers. */ 354279aa3d4SKip Macy (*ifp->if_output)(ifp, m, &sa, NULL); 35554fc657dSGeorge V. Neville-Neil ARPSTAT_INC(txrequests); 356df8bae1dSRodney W. Grimes } 357df8bae1dSRodney W. Grimes 358df8bae1dSRodney W. Grimes /* 359512e30efSAlexander V. Chernikov * Resolve an IP address into an ethernet address - heavy version. 360512e30efSAlexander V. Chernikov * Used internally by arpresolve(). 361512e30efSAlexander V. Chernikov * We have already checked than we can't use existing lle without 362512e30efSAlexander V. Chernikov * modification so we have to acquire LLE_EXCLUSIVE lle lock. 363cd46a114SLuigi Rizzo * 36474860d4fSAlexander V. Chernikov * On success, desten and flags are filled in and the function returns 0; 365cd46a114SLuigi Rizzo * If the packet must be held pending resolution, we return EWOULDBLOCK 366cd46a114SLuigi Rizzo * On other errors, we return the corresponding error code. 367b6ae6984SJulian Elischer * Note that m_freem() handles NULL. 368df8bae1dSRodney W. Grimes */ 369512e30efSAlexander V. Chernikov static int 370512e30efSAlexander V. Chernikov arpresolve_full(struct ifnet *ifp, int is_gw, int create, struct mbuf *m, 37174860d4fSAlexander V. Chernikov const struct sockaddr *dst, u_char *desten, uint32_t *pflags) 372df8bae1dSRodney W. Grimes { 3735a255516SAlexander V. Chernikov struct llentry *la = NULL, *la_tmp; 374e162ea60SGeorge V. Neville-Neil struct mbuf *curr = NULL; 375e162ea60SGeorge V. Neville-Neil struct mbuf *next = NULL; 376512e30efSAlexander V. Chernikov int error, renew; 377df8bae1dSRodney W. Grimes 37874860d4fSAlexander V. Chernikov if (pflags != NULL) 37974860d4fSAlexander V. Chernikov *pflags = 0; 38074860d4fSAlexander V. Chernikov 381512e30efSAlexander V. Chernikov if (create == 0) { 38200a46b31SKip Macy IF_AFDATA_RLOCK(ifp); 383512e30efSAlexander V. Chernikov la = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 38400a46b31SKip Macy IF_AFDATA_RUNLOCK(ifp); 385512e30efSAlexander V. Chernikov } 386512e30efSAlexander V. Chernikov if (la == NULL && (ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) == 0) { 3875a255516SAlexander V. Chernikov la = lltable_alloc_entry(LLTABLE(ifp), 0, dst); 3881ed7bf1eSGleb Smirnoff if (la == NULL) { 3891ed7bf1eSGleb Smirnoff log(LOG_DEBUG, 390743c072aSAlan Somers "arpresolve: can't allocate llinfo for %s on %s\n", 3915a255516SAlexander V. Chernikov inet_ntoa(SIN(dst)->sin_addr), if_name(ifp)); 3925a255516SAlexander V. Chernikov m_freem(m); 3935a255516SAlexander V. Chernikov return (EINVAL); 3945a255516SAlexander V. Chernikov } 3955a255516SAlexander V. Chernikov 3965a255516SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 3975a255516SAlexander V. Chernikov LLE_WLOCK(la); 3985a255516SAlexander V. Chernikov la_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 3995a255516SAlexander V. Chernikov /* Prefer ANY existing lle over newly-created one */ 4005a255516SAlexander V. Chernikov if (la_tmp == NULL) 4015a255516SAlexander V. Chernikov lltable_link_entry(LLTABLE(ifp), la); 4025a255516SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 4035a255516SAlexander V. Chernikov if (la_tmp != NULL) { 4045a255516SAlexander V. Chernikov lltable_free_entry(LLTABLE(ifp), la); 4055a255516SAlexander V. Chernikov la = la_tmp; 4065a255516SAlexander V. Chernikov } 4075a255516SAlexander V. Chernikov } 4085a255516SAlexander V. Chernikov if (la == NULL) { 4091ed7bf1eSGleb Smirnoff m_freem(m); 4106e6b3f7cSQing Li return (EINVAL); 4111ed7bf1eSGleb Smirnoff } 412a20e2538SGleb Smirnoff 4136e6b3f7cSQing Li if ((la->la_flags & LLE_VALID) && 414a98c06f1SGleb Smirnoff ((la->la_flags & LLE_STATIC) || la->la_expire > time_uptime)) { 4156e6b3f7cSQing Li bcopy(&la->ll_addr, desten, ifp->if_addrlen); 416*f8aee88fSAlexander V. Chernikov 417*f8aee88fSAlexander V. Chernikov /* Check if we have feedback request from arptimer() */ 418*f8aee88fSAlexander V. Chernikov if (la->r_skip_req != 0) { 419*f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(la); 420*f8aee88fSAlexander V. Chernikov la->r_skip_req = 0; /* Notify that entry was used */ 421*f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(la); 422f0f3379eSOrion Hodson } 42374860d4fSAlexander V. Chernikov if (pflags != NULL) 424*f8aee88fSAlexander V. Chernikov *pflags = la->la_flags & (LLE_VALID|LLE_IFADDR); 425f0516b3cSErmal Luçi LLE_WUNLOCK(la); 426f0516b3cSErmal Luçi return (0); 427df8bae1dSRodney W. Grimes } 4286e6b3f7cSQing Li 429a98c06f1SGleb Smirnoff renew = (la->la_asked == 0 || la->la_expire != time_uptime); 43008aadfbbSJonathan Lemon /* 431df8bae1dSRodney W. Grimes * There is an arptab entry, but no ethernet address 432e162ea60SGeorge V. Neville-Neil * response yet. Add the mbuf to the list, dropping 433e162ea60SGeorge V. Neville-Neil * the oldest packet if we have exceeded the system 434e162ea60SGeorge V. Neville-Neil * setting. 435df8bae1dSRodney W. Grimes */ 4366e6b3f7cSQing Li if (m != NULL) { 437e162ea60SGeorge V. Neville-Neil if (la->la_numheld >= V_arp_maxhold) { 43854fc657dSGeorge V. Neville-Neil if (la->la_hold != NULL) { 439e162ea60SGeorge V. Neville-Neil next = la->la_hold->m_nextpkt; 440df8bae1dSRodney W. Grimes m_freem(la->la_hold); 441e162ea60SGeorge V. Neville-Neil la->la_hold = next; 442e162ea60SGeorge V. Neville-Neil la->la_numheld--; 44354fc657dSGeorge V. Neville-Neil ARPSTAT_INC(dropped); 44454fc657dSGeorge V. Neville-Neil } 445e162ea60SGeorge V. Neville-Neil } 446e162ea60SGeorge V. Neville-Neil if (la->la_hold != NULL) { 447e162ea60SGeorge V. Neville-Neil curr = la->la_hold; 448e162ea60SGeorge V. Neville-Neil while (curr->m_nextpkt != NULL) 449e162ea60SGeorge V. Neville-Neil curr = curr->m_nextpkt; 450e162ea60SGeorge V. Neville-Neil curr->m_nextpkt = m; 451e162ea60SGeorge V. Neville-Neil } else 452df8bae1dSRodney W. Grimes la->la_hold = m; 453e162ea60SGeorge V. Neville-Neil la->la_numheld++; 4546e6b3f7cSQing Li } 455e1ff74c5SGleb Smirnoff /* 456e1ff74c5SGleb Smirnoff * Return EWOULDBLOCK if we have tried less than arp_maxtries. It 457e1ff74c5SGleb Smirnoff * will be masked by ether_output(). Return EHOSTDOWN/EHOSTUNREACH 458e1ff74c5SGleb Smirnoff * if we have already sent arp_maxtries ARP requests. Retransmit the 459e1ff74c5SGleb Smirnoff * ARP request, but not faster than one request per second. 460e1ff74c5SGleb Smirnoff */ 461603724d3SBjoern A. Zeeb if (la->la_asked < V_arp_maxtries) 462e1ff74c5SGleb Smirnoff error = EWOULDBLOCK; /* First request. */ 463e1ff74c5SGleb Smirnoff else 46474860d4fSAlexander V. Chernikov error = is_gw != 0 ? EHOSTUNREACH : EHOSTDOWN; 465e1ff74c5SGleb Smirnoff 4666e6b3f7cSQing Li if (renew) { 467becba438SBjoern A. Zeeb int canceled; 468becba438SBjoern A. Zeeb 4696e6b3f7cSQing Li LLE_ADDREF(la); 470a98c06f1SGleb Smirnoff la->la_expire = time_uptime; 4710447c136SAlexander V. Chernikov canceled = callout_reset(&la->lle_timer, hz * V_arpt_down, 472becba438SBjoern A. Zeeb arptimer, la); 473becba438SBjoern A. Zeeb if (canceled) 474becba438SBjoern A. Zeeb LLE_REMREF(la); 47595ebcabeSMaxim Konovalov la->la_asked++; 4766e6b3f7cSQing Li LLE_WUNLOCK(la); 477aa24ae3cSGleb Smirnoff arprequest(ifp, NULL, &SIN(dst)->sin_addr, NULL); 4786e6b3f7cSQing Li return (error); 4796e6b3f7cSQing Li } 480512e30efSAlexander V. Chernikov 4816e6b3f7cSQing Li LLE_WUNLOCK(la); 482e1ff74c5SGleb Smirnoff return (error); 483df8bae1dSRodney W. Grimes } 484df8bae1dSRodney W. Grimes 485df8bae1dSRodney W. Grimes /* 486512e30efSAlexander V. Chernikov * Resolve an IP address into an ethernet address. 487512e30efSAlexander V. Chernikov * On input: 488512e30efSAlexander V. Chernikov * ifp is the interface we use 489512e30efSAlexander V. Chernikov * is_gw != 0 if @dst represents gateway to some destination 490512e30efSAlexander V. Chernikov * m is the mbuf. May be NULL if we don't have a packet. 491512e30efSAlexander V. Chernikov * dst is the next hop, 492512e30efSAlexander V. Chernikov * desten is the storage to put LL address. 493*f8aee88fSAlexander V. Chernikov * flags returns subset of lle flags: LLE_VALID | LLE_IFADDR 494512e30efSAlexander V. Chernikov * 495512e30efSAlexander V. Chernikov * On success, desten and flags are filled in and the function returns 0; 496512e30efSAlexander V. Chernikov * If the packet must be held pending resolution, we return EWOULDBLOCK 497512e30efSAlexander V. Chernikov * On other errors, we return the corresponding error code. 498512e30efSAlexander V. Chernikov * Note that m_freem() handles NULL. 499512e30efSAlexander V. Chernikov */ 500512e30efSAlexander V. Chernikov int 501512e30efSAlexander V. Chernikov arpresolve(struct ifnet *ifp, int is_gw, struct mbuf *m, 502512e30efSAlexander V. Chernikov const struct sockaddr *dst, u_char *desten, uint32_t *pflags) 503512e30efSAlexander V. Chernikov { 504512e30efSAlexander V. Chernikov struct llentry *la = 0; 505512e30efSAlexander V. Chernikov 506512e30efSAlexander V. Chernikov if (pflags != NULL) 507512e30efSAlexander V. Chernikov *pflags = 0; 508512e30efSAlexander V. Chernikov 509512e30efSAlexander V. Chernikov if (m != NULL) { 510512e30efSAlexander V. Chernikov if (m->m_flags & M_BCAST) { 511512e30efSAlexander V. Chernikov /* broadcast */ 512512e30efSAlexander V. Chernikov (void)memcpy(desten, 513512e30efSAlexander V. Chernikov ifp->if_broadcastaddr, ifp->if_addrlen); 514512e30efSAlexander V. Chernikov return (0); 515512e30efSAlexander V. Chernikov } 516512e30efSAlexander V. Chernikov if (m->m_flags & M_MCAST) { 517512e30efSAlexander V. Chernikov /* multicast */ 518512e30efSAlexander V. Chernikov ETHER_MAP_IP_MULTICAST(&SIN(dst)->sin_addr, desten); 519512e30efSAlexander V. Chernikov return (0); 520512e30efSAlexander V. Chernikov } 521512e30efSAlexander V. Chernikov } 522512e30efSAlexander V. Chernikov 523512e30efSAlexander V. Chernikov IF_AFDATA_RLOCK(ifp); 524*f8aee88fSAlexander V. Chernikov la = lla_lookup(LLTABLE(ifp), LLE_UNLOCKED, dst); 525*f8aee88fSAlexander V. Chernikov if (la != NULL && (la->r_flags & RLLE_VALID) != 0) { 526*f8aee88fSAlexander V. Chernikov /* Entry found, let's copy lle info */ 527512e30efSAlexander V. Chernikov bcopy(&la->ll_addr, desten, ifp->if_addrlen); 528512e30efSAlexander V. Chernikov if (pflags != NULL) 529*f8aee88fSAlexander V. Chernikov *pflags = LLE_VALID | (la->r_flags & RLLE_IFADDR); 530*f8aee88fSAlexander V. Chernikov /* Check if we have feedback request from arptimer() */ 531*f8aee88fSAlexander V. Chernikov if (la->r_skip_req != 0) { 532*f8aee88fSAlexander V. Chernikov LLE_REQ_LOCK(la); 533*f8aee88fSAlexander V. Chernikov la->r_skip_req = 0; /* Notify that entry was used */ 534*f8aee88fSAlexander V. Chernikov LLE_REQ_UNLOCK(la); 535*f8aee88fSAlexander V. Chernikov } 536*f8aee88fSAlexander V. Chernikov IF_AFDATA_RUNLOCK(ifp); 537512e30efSAlexander V. Chernikov return (0); 538512e30efSAlexander V. Chernikov } 539*f8aee88fSAlexander V. Chernikov IF_AFDATA_RUNLOCK(ifp); 540512e30efSAlexander V. Chernikov 541*f8aee88fSAlexander V. Chernikov return (arpresolve_full(ifp, is_gw, 1, m, dst, desten, pflags)); 542512e30efSAlexander V. Chernikov } 543512e30efSAlexander V. Chernikov 544512e30efSAlexander V. Chernikov /* 545df8bae1dSRodney W. Grimes * Common length and type checks are done here, 546df8bae1dSRodney W. Grimes * then the protocol-specific routine is called. 547df8bae1dSRodney W. Grimes */ 548885f1aa4SPoul-Henning Kamp static void 5491cafed39SJonathan Lemon arpintr(struct mbuf *m) 550df8bae1dSRodney W. Grimes { 5511cafed39SJonathan Lemon struct arphdr *ar; 552eec33ea0SAlexander V. Chernikov struct ifnet *ifp; 553deb6bda6SAlexander V. Chernikov char *layer; 554deb6bda6SAlexander V. Chernikov int hlen; 555df8bae1dSRodney W. Grimes 556eec33ea0SAlexander V. Chernikov ifp = m->m_pkthdr.rcvif; 557eec33ea0SAlexander V. Chernikov 55876ec7b2fSRobert Watson if (m->m_len < sizeof(struct arphdr) && 55984365e2bSMatthew Dillon ((m = m_pullup(m, sizeof(struct arphdr))) == NULL)) { 560eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, "packet with short header received on %s\n", 561eec33ea0SAlexander V. Chernikov if_name(ifp)); 5621cafed39SJonathan Lemon return; 56376ec7b2fSRobert Watson } 56476ec7b2fSRobert Watson ar = mtod(m, struct arphdr *); 56576ec7b2fSRobert Watson 566deb6bda6SAlexander V. Chernikov /* Check if length is sufficient */ 56789bc0426SGleb Smirnoff if (m->m_len < arphdr_len(ar)) { 56889bc0426SGleb Smirnoff m = m_pullup(m, arphdr_len(ar)); 56989bc0426SGleb Smirnoff if (m == NULL) { 570eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, "short packet received on %s\n", 571eec33ea0SAlexander V. Chernikov if_name(ifp)); 572deb6bda6SAlexander V. Chernikov return; 573deb6bda6SAlexander V. Chernikov } 574deb6bda6SAlexander V. Chernikov ar = mtod(m, struct arphdr *); 57589bc0426SGleb Smirnoff } 576deb6bda6SAlexander V. Chernikov 577deb6bda6SAlexander V. Chernikov hlen = 0; 578deb6bda6SAlexander V. Chernikov layer = ""; 579deb6bda6SAlexander V. Chernikov switch (ntohs(ar->ar_hrd)) { 580deb6bda6SAlexander V. Chernikov case ARPHRD_ETHER: 581deb6bda6SAlexander V. Chernikov hlen = ETHER_ADDR_LEN; /* RFC 826 */ 582deb6bda6SAlexander V. Chernikov layer = "ethernet"; 583deb6bda6SAlexander V. Chernikov break; 584deb6bda6SAlexander V. Chernikov case ARPHRD_IEEE802: 585deb6bda6SAlexander V. Chernikov hlen = 6; /* RFC 1390, FDDI_ADDR_LEN */ 586deb6bda6SAlexander V. Chernikov layer = "fddi"; 587deb6bda6SAlexander V. Chernikov break; 588deb6bda6SAlexander V. Chernikov case ARPHRD_ARCNET: 589deb6bda6SAlexander V. Chernikov hlen = 1; /* RFC 1201, ARC_ADDR_LEN */ 590deb6bda6SAlexander V. Chernikov layer = "arcnet"; 591deb6bda6SAlexander V. Chernikov break; 592deb6bda6SAlexander V. Chernikov case ARPHRD_INFINIBAND: 593deb6bda6SAlexander V. Chernikov hlen = 20; /* RFC 4391, INFINIBAND_ALEN */ 594deb6bda6SAlexander V. Chernikov layer = "infiniband"; 595deb6bda6SAlexander V. Chernikov break; 596deb6bda6SAlexander V. Chernikov case ARPHRD_IEEE1394: 597deb6bda6SAlexander V. Chernikov hlen = 0; /* SHALL be 16 */ /* RFC 2734 */ 598deb6bda6SAlexander V. Chernikov layer = "firewire"; 599deb6bda6SAlexander V. Chernikov 600deb6bda6SAlexander V. Chernikov /* 601deb6bda6SAlexander V. Chernikov * Restrict too long harware addresses. 602deb6bda6SAlexander V. Chernikov * Currently we are capable of handling 20-byte 603deb6bda6SAlexander V. Chernikov * addresses ( sizeof(lle->ll_addr) ) 604deb6bda6SAlexander V. Chernikov */ 605deb6bda6SAlexander V. Chernikov if (ar->ar_hln >= 20) 606deb6bda6SAlexander V. Chernikov hlen = 16; 607deb6bda6SAlexander V. Chernikov break; 608deb6bda6SAlexander V. Chernikov default: 609eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, 610eec33ea0SAlexander V. Chernikov "packet with unknown harware format 0x%02d received on %s\n", 611eec33ea0SAlexander V. Chernikov ntohs(ar->ar_hrd), if_name(ifp)); 61276ec7b2fSRobert Watson m_freem(m); 6131cafed39SJonathan Lemon return; 61476ec7b2fSRobert Watson } 61576ec7b2fSRobert Watson 616deb6bda6SAlexander V. Chernikov if (hlen != 0 && hlen != ar->ar_hln) { 617eec33ea0SAlexander V. Chernikov ARP_LOG(LOG_NOTICE, 618eec33ea0SAlexander V. Chernikov "packet with invalid %s address length %d received on %s\n", 619eec33ea0SAlexander V. Chernikov layer, ar->ar_hln, if_name(ifp)); 62076ec7b2fSRobert Watson m_freem(m); 6211cafed39SJonathan Lemon return; 62276ec7b2fSRobert Watson } 623df8bae1dSRodney W. Grimes 62454fc657dSGeorge V. Neville-Neil ARPSTAT_INC(received); 625df8bae1dSRodney W. Grimes switch (ntohs(ar->ar_pro)) { 6261d5e9e22SEivind Eklund #ifdef INET 627df8bae1dSRodney W. Grimes case ETHERTYPE_IP: 628df8bae1dSRodney W. Grimes in_arpinput(m); 6291cafed39SJonathan Lemon return; 6301d5e9e22SEivind Eklund #endif 631df8bae1dSRodney W. Grimes } 632df8bae1dSRodney W. Grimes m_freem(m); 633df8bae1dSRodney W. Grimes } 634df8bae1dSRodney W. Grimes 6351d5e9e22SEivind Eklund #ifdef INET 636df8bae1dSRodney W. Grimes /* 637df8bae1dSRodney W. Grimes * ARP for Internet protocols on 10 Mb/s Ethernet. 638df8bae1dSRodney W. Grimes * Algorithm is that given in RFC 826. 639df8bae1dSRodney W. Grimes * In addition, a sanity check is performed on the sender 640df8bae1dSRodney W. Grimes * protocol address, to catch impersonators. 641df8bae1dSRodney W. Grimes * We no longer handle negotiations for use of trailer protocol: 642df8bae1dSRodney W. Grimes * Formerly, ARP replied for protocol type ETHERTYPE_TRAIL sent 643df8bae1dSRodney W. Grimes * along with IP replies if we wanted trailers sent to us, 644df8bae1dSRodney W. Grimes * and also sent them in response to IP replies. 645df8bae1dSRodney W. Grimes * This allowed either end to announce the desire to receive 646df8bae1dSRodney W. Grimes * trailer packets. 647df8bae1dSRodney W. Grimes * We no longer reply to requests for ETHERTYPE_TRAIL protocol either, 648df8bae1dSRodney W. Grimes * but formerly didn't normally send requests. 649df8bae1dSRodney W. Grimes */ 6503269187dSAlfred Perlstein static int log_arp_wrong_iface = 1; 651e3d123d6SAlfred Perlstein static int log_arp_movements = 1; 65239393906SGleb Smirnoff static int log_arp_permanent_modify = 1; 653478df1d5SGleb Smirnoff static int allow_multicast = 0; 6543269187dSAlfred Perlstein 6553269187dSAlfred Perlstein SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_wrong_iface, CTLFLAG_RW, 6563269187dSAlfred Perlstein &log_arp_wrong_iface, 0, 6573269187dSAlfred Perlstein "log arp packets arriving on the wrong interface"); 658e3d123d6SAlfred Perlstein SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_movements, CTLFLAG_RW, 659e3d123d6SAlfred Perlstein &log_arp_movements, 0, 66075ce3221SAlfred Perlstein "log arp replies from MACs different than the one in the cache"); 66139393906SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, log_arp_permanent_modify, CTLFLAG_RW, 66239393906SGleb Smirnoff &log_arp_permanent_modify, 0, 66339393906SGleb Smirnoff "log arp replies from MACs different than the one in the permanent arp entry"); 664478df1d5SGleb Smirnoff SYSCTL_INT(_net_link_ether_inet, OID_AUTO, allow_multicast, CTLFLAG_RW, 665478df1d5SGleb Smirnoff &allow_multicast, 0, "accept multicast addresses"); 6663269187dSAlfred Perlstein 667df8bae1dSRodney W. Grimes static void 668f2565d68SRobert Watson in_arpinput(struct mbuf *m) 669df8bae1dSRodney W. Grimes { 670cc0a3c8cSAndrey V. Elsukov struct rm_priotracker in_ifa_tracker; 671e952fa39SMatthew N. Dodd struct arphdr *ah; 672e952fa39SMatthew N. Dodd struct ifnet *ifp = m->m_pkthdr.rcvif; 6735a255516SAlexander V. Chernikov struct llentry *la = NULL, *la_tmp; 674e952fa39SMatthew N. Dodd struct rtentry *rt; 675ca925d9cSJonathan Lemon struct ifaddr *ifa; 676ca925d9cSJonathan Lemon struct in_ifaddr *ia; 677df8bae1dSRodney W. Grimes struct sockaddr sa; 678df8bae1dSRodney W. Grimes struct in_addr isaddr, itaddr, myaddr; 679a9771948SGleb Smirnoff u_int8_t *enaddr = NULL; 680f3bfa7d1SAlexander V. Chernikov int op; 68180b11ee4SPhilip Paeps int bridged = 0, is_bridge = 0; 682f3bfa7d1SAlexander V. Chernikov int carped; 6838e7e854cSKip Macy struct sockaddr_in sin; 6845a255516SAlexander V. Chernikov struct sockaddr *dst; 6858e7e854cSKip Macy sin.sin_len = sizeof(struct sockaddr_in); 6868e7e854cSKip Macy sin.sin_family = AF_INET; 68729910a5aSKip Macy sin.sin_addr.s_addr = 0; 688df8bae1dSRodney W. Grimes 68974948aa6SAndrew Thompson if (ifp->if_bridge) 6908f867517SAndrew Thompson bridged = 1; 69180b11ee4SPhilip Paeps if (ifp->if_type == IFT_BRIDGE) 69280b11ee4SPhilip Paeps is_bridge = 1; 6938f867517SAndrew Thompson 694eec33ea0SAlexander V. Chernikov /* 695eec33ea0SAlexander V. Chernikov * We already have checked that mbuf contains enough contiguous data 696eec33ea0SAlexander V. Chernikov * to hold entire arp message according to the arp header. 697eec33ea0SAlexander V. Chernikov */ 698322dcb8dSMax Khon ah = mtod(m, struct arphdr *); 699eec33ea0SAlexander V. Chernikov 70009d3f895SGeorge V. Neville-Neil /* 70109d3f895SGeorge V. Neville-Neil * ARP is only for IPv4 so we can reject packets with 70209d3f895SGeorge V. Neville-Neil * a protocol length not equal to an IPv4 address. 70309d3f895SGeorge V. Neville-Neil */ 70409d3f895SGeorge V. Neville-Neil if (ah->ar_pln != sizeof(struct in_addr)) { 7055d81d095SGleb Smirnoff ARP_LOG(LOG_NOTICE, "requested protocol length != %zu\n", 70609d3f895SGeorge V. Neville-Neil sizeof(struct in_addr)); 707414676baSGleb Smirnoff goto drop; 70809d3f895SGeorge V. Neville-Neil } 70909d3f895SGeorge V. Neville-Neil 710478df1d5SGleb Smirnoff if (allow_multicast == 0 && ETHER_IS_MULTICAST(ar_sha(ah))) { 7115d81d095SGleb Smirnoff ARP_LOG(LOG_NOTICE, "%*D is multicast\n", 712c9168718SGleb Smirnoff ifp->if_addrlen, (u_char *)ar_sha(ah), ":"); 713414676baSGleb Smirnoff goto drop; 71409d3f895SGeorge V. Neville-Neil } 71509d3f895SGeorge V. Neville-Neil 716322dcb8dSMax Khon op = ntohs(ah->ar_op); 717322dcb8dSMax Khon (void)memcpy(&isaddr, ar_spa(ah), sizeof (isaddr)); 718322dcb8dSMax Khon (void)memcpy(&itaddr, ar_tpa(ah), sizeof (itaddr)); 71932439868SGleb Smirnoff 72054fc657dSGeorge V. Neville-Neil if (op == ARPOP_REPLY) 72154fc657dSGeorge V. Neville-Neil ARPSTAT_INC(rxreplies); 72254fc657dSGeorge V. Neville-Neil 723ca925d9cSJonathan Lemon /* 724ca925d9cSJonathan Lemon * For a bridge, we want to check the address irrespective 725ca925d9cSJonathan Lemon * of the receive interface. (This will change slightly 726ca925d9cSJonathan Lemon * when we have clusters of interfaces). 727ca925d9cSJonathan Lemon */ 728cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RLOCK(&in_ifa_tracker); 7292ef4a436SGleb Smirnoff LIST_FOREACH(ia, INADDR_HASH(itaddr.s_addr), ia_hash) { 73096561547SAndrew Thompson if (((bridged && ia->ia_ifp->if_bridge == ifp->if_bridge) || 7316e6b3f7cSQing Li ia->ia_ifp == ifp) && 73208b68b0eSGleb Smirnoff itaddr.s_addr == ia->ia_addr.sin_addr.s_addr && 73308b68b0eSGleb Smirnoff (ia->ia_ifa.ifa_carp == NULL || 73408b68b0eSGleb Smirnoff (*carp_iamatch_p)(&ia->ia_ifa, &enaddr))) { 73509d54778SRobert Watson ifa_ref(&ia->ia_ifa); 736cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 7372ef4a436SGleb Smirnoff goto match; 7382ef4a436SGleb Smirnoff } 7392ef4a436SGleb Smirnoff } 740ca925d9cSJonathan Lemon LIST_FOREACH(ia, INADDR_HASH(isaddr.s_addr), ia_hash) 74196561547SAndrew Thompson if (((bridged && ia->ia_ifp->if_bridge == ifp->if_bridge) || 7426e6b3f7cSQing Li ia->ia_ifp == ifp) && 74309d54778SRobert Watson isaddr.s_addr == ia->ia_addr.sin_addr.s_addr) { 74409d54778SRobert Watson ifa_ref(&ia->ia_ifa); 745cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 746ca925d9cSJonathan Lemon goto match; 74709d54778SRobert Watson } 74880b11ee4SPhilip Paeps 74980b11ee4SPhilip Paeps #define BDG_MEMBER_MATCHES_ARP(addr, ifp, ia) \ 75080b11ee4SPhilip Paeps (ia->ia_ifp->if_bridge == ifp->if_softc && \ 75180b11ee4SPhilip Paeps !bcmp(IF_LLADDR(ia->ia_ifp), IF_LLADDR(ifp), ifp->if_addrlen) && \ 75280b11ee4SPhilip Paeps addr == ia->ia_addr.sin_addr.s_addr) 75380b11ee4SPhilip Paeps /* 75480b11ee4SPhilip Paeps * Check the case when bridge shares its MAC address with 75580b11ee4SPhilip Paeps * some of its children, so packets are claimed by bridge 75680b11ee4SPhilip Paeps * itself (bridge_input() does it first), but they are really 75780b11ee4SPhilip Paeps * meant to be destined to the bridge member. 75880b11ee4SPhilip Paeps */ 75980b11ee4SPhilip Paeps if (is_bridge) { 76080b11ee4SPhilip Paeps LIST_FOREACH(ia, INADDR_HASH(itaddr.s_addr), ia_hash) { 76180b11ee4SPhilip Paeps if (BDG_MEMBER_MATCHES_ARP(itaddr.s_addr, ifp, ia)) { 76209d54778SRobert Watson ifa_ref(&ia->ia_ifa); 76380b11ee4SPhilip Paeps ifp = ia->ia_ifp; 764cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 76580b11ee4SPhilip Paeps goto match; 76680b11ee4SPhilip Paeps } 76780b11ee4SPhilip Paeps } 76880b11ee4SPhilip Paeps } 76980b11ee4SPhilip Paeps #undef BDG_MEMBER_MATCHES_ARP 770cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 77180b11ee4SPhilip Paeps 772ca925d9cSJonathan Lemon /* 773d8b84d9eSJonathan Lemon * No match, use the first inet address on the receive interface 774ca925d9cSJonathan Lemon * as a dummy address for the rest of the function. 775ca925d9cSJonathan Lemon */ 776137f91e8SJohn Baldwin IF_ADDR_RLOCK(ifp); 777d8b84d9eSJonathan Lemon TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) 7789de96e89SGleb Smirnoff if (ifa->ifa_addr->sa_family == AF_INET && 7799de96e89SGleb Smirnoff (ifa->ifa_carp == NULL || 7809de96e89SGleb Smirnoff (*carp_iamatch_p)(ifa, &enaddr))) { 781ec691a10SJonathan Lemon ia = ifatoia(ifa); 78209d54778SRobert Watson ifa_ref(ifa); 783137f91e8SJohn Baldwin IF_ADDR_RUNLOCK(ifp); 784ec691a10SJonathan Lemon goto match; 785ec691a10SJonathan Lemon } 786137f91e8SJohn Baldwin IF_ADDR_RUNLOCK(ifp); 78709d54778SRobert Watson 788ec691a10SJonathan Lemon /* 789ec691a10SJonathan Lemon * If bridging, fall back to using any inet address. 790ec691a10SJonathan Lemon */ 791cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RLOCK(&in_ifa_tracker); 7922d9cfabaSRobert Watson if (!bridged || (ia = TAILQ_FIRST(&V_in_ifaddrhead)) == NULL) { 793cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 794b2a8ac7cSLuigi Rizzo goto drop; 7952d9cfabaSRobert Watson } 79609d54778SRobert Watson ifa_ref(&ia->ia_ifa); 797cc0a3c8cSAndrey V. Elsukov IN_IFADDR_RUNLOCK(&in_ifa_tracker); 798ca925d9cSJonathan Lemon match: 799a9771948SGleb Smirnoff if (!enaddr) 800a9771948SGleb Smirnoff enaddr = (u_int8_t *)IF_LLADDR(ifp); 80108b68b0eSGleb Smirnoff carped = (ia->ia_ifa.ifa_carp != NULL); 802ca925d9cSJonathan Lemon myaddr = ia->ia_addr.sin_addr; 80309d54778SRobert Watson ifa_free(&ia->ia_ifa); 804a9771948SGleb Smirnoff if (!bcmp(ar_sha(ah), enaddr, ifp->if_addrlen)) 805b2a8ac7cSLuigi Rizzo goto drop; /* it's from me, ignore it. */ 806322dcb8dSMax Khon if (!bcmp(ar_sha(ah), ifp->if_broadcastaddr, ifp->if_addrlen)) { 8075d81d095SGleb Smirnoff ARP_LOG(LOG_NOTICE, "link address is broadcast for IP address " 8085d81d095SGleb Smirnoff "%s!\n", inet_ntoa(isaddr)); 809b2a8ac7cSLuigi Rizzo goto drop; 810df8bae1dSRodney W. Grimes } 811f3bfa7d1SAlexander V. Chernikov 812f3bfa7d1SAlexander V. Chernikov if (ifp->if_addrlen != ah->ar_hln) { 813f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_WARNING, "from %*D: addr len: new %d, " 814f3bfa7d1SAlexander V. Chernikov "i/f %d (ignored)\n", ifp->if_addrlen, 815f3bfa7d1SAlexander V. Chernikov (u_char *) ar_sha(ah), ":", ah->ar_hln, 816f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen); 817f3bfa7d1SAlexander V. Chernikov goto drop; 818f3bfa7d1SAlexander V. Chernikov } 819f3bfa7d1SAlexander V. Chernikov 82000fcf9d1SRobert Watson /* 82100fcf9d1SRobert Watson * Warn if another host is using the same IP address, but only if the 82200fcf9d1SRobert Watson * IP address isn't 0.0.0.0, which is used for DHCP only, in which 82300fcf9d1SRobert Watson * case we suppress the warning to avoid false positive complaints of 82400fcf9d1SRobert Watson * potential misconfiguration. 82500fcf9d1SRobert Watson */ 82608b68b0eSGleb Smirnoff if (!bridged && !carped && isaddr.s_addr == myaddr.s_addr && 82708b68b0eSGleb Smirnoff myaddr.s_addr != 0) { 8285d81d095SGleb Smirnoff ARP_LOG(LOG_ERR, "%*D is using my IP address %s on %s!\n", 829322dcb8dSMax Khon ifp->if_addrlen, (u_char *)ar_sha(ah), ":", 8303affb6fbSYaroslav Tykhiy inet_ntoa(isaddr), ifp->if_xname); 831df8bae1dSRodney W. Grimes itaddr = myaddr; 83254fc657dSGeorge V. Neville-Neil ARPSTAT_INC(dupips); 833df8bae1dSRodney W. Grimes goto reply; 834df8bae1dSRodney W. Grimes } 835deb62e28SRuslan Ermilov if (ifp->if_flags & IFF_STATICARP) 836deb62e28SRuslan Ermilov goto reply; 8378b07e49aSJulian Elischer 8386e6b3f7cSQing Li bzero(&sin, sizeof(sin)); 8396e6b3f7cSQing Li sin.sin_len = sizeof(struct sockaddr_in); 8406e6b3f7cSQing Li sin.sin_family = AF_INET; 8416e6b3f7cSQing Li sin.sin_addr = isaddr; 8425a255516SAlexander V. Chernikov dst = (struct sockaddr *)&sin; 843f3bfa7d1SAlexander V. Chernikov IF_AFDATA_RLOCK(ifp); 8445a255516SAlexander V. Chernikov la = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 845f3bfa7d1SAlexander V. Chernikov IF_AFDATA_RUNLOCK(ifp); 846f3bfa7d1SAlexander V. Chernikov if (la != NULL) 847f3bfa7d1SAlexander V. Chernikov arp_check_update_lle(ah, isaddr, ifp, bridged, la); 848f3bfa7d1SAlexander V. Chernikov else if (itaddr.s_addr == myaddr.s_addr) { 849e162ea60SGeorge V. Neville-Neil /* 850f3bfa7d1SAlexander V. Chernikov * Reply to our address, but no lle exists yet. 851f3bfa7d1SAlexander V. Chernikov * do we really have to create an entry? 852e162ea60SGeorge V. Neville-Neil */ 8535a255516SAlexander V. Chernikov la = lltable_alloc_entry(LLTABLE(ifp), 0, dst); 8545a255516SAlexander V. Chernikov if (la == NULL) 8555a255516SAlexander V. Chernikov goto drop; 856ddd208f7SAlexander V. Chernikov lltable_set_entry_addr(ifp, la, ar_sha(ah)); 8575a255516SAlexander V. Chernikov 8585a255516SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 8595a255516SAlexander V. Chernikov LLE_WLOCK(la); 8605a255516SAlexander V. Chernikov la_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 8615a255516SAlexander V. Chernikov 8625a255516SAlexander V. Chernikov /* 8635a255516SAlexander V. Chernikov * Check if lle still does not exists. 8645a255516SAlexander V. Chernikov * If it does, that means that we either 8655a255516SAlexander V. Chernikov * 1) have configured it explicitly, via 8665a255516SAlexander V. Chernikov * 1a) 'arp -s' static entry or 8675a255516SAlexander V. Chernikov * 1b) interface address static record 8685a255516SAlexander V. Chernikov * or 8695a255516SAlexander V. Chernikov * 2) it was the result of sending first packet to-host 8705a255516SAlexander V. Chernikov * or 8715a255516SAlexander V. Chernikov * 3) it was another arp reply packet we handled in 8725a255516SAlexander V. Chernikov * different thread. 8735a255516SAlexander V. Chernikov * 8745a255516SAlexander V. Chernikov * In all cases except 3) we definitely need to prefer 8755a255516SAlexander V. Chernikov * existing lle. For the sake of simplicity, prefer any 8765a255516SAlexander V. Chernikov * existing lle over newly-create one. 8775a255516SAlexander V. Chernikov */ 8785a255516SAlexander V. Chernikov if (la_tmp == NULL) 8795a255516SAlexander V. Chernikov lltable_link_entry(LLTABLE(ifp), la); 880f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 8815a255516SAlexander V. Chernikov 8825a255516SAlexander V. Chernikov if (la_tmp == NULL) { 883f3bfa7d1SAlexander V. Chernikov arp_mark_lle_reachable(la); 884e162ea60SGeorge V. Neville-Neil LLE_WUNLOCK(la); 8855a255516SAlexander V. Chernikov } else { 8865a255516SAlexander V. Chernikov /* Free newly-create entry and handle packet */ 8875a255516SAlexander V. Chernikov lltable_free_entry(LLTABLE(ifp), la); 8885a255516SAlexander V. Chernikov la = la_tmp; 8895a255516SAlexander V. Chernikov la_tmp = NULL; 8905a255516SAlexander V. Chernikov arp_check_update_lle(ah, isaddr, ifp, bridged, la); 8915a255516SAlexander V. Chernikov /* arp_check_update_lle() returns @la unlocked */ 892f4048639SBjoern A. Zeeb } 8935a255516SAlexander V. Chernikov la = NULL; 894a4141c63SAlexander V. Chernikov } 8956e6b3f7cSQing Li reply: 896b2a8ac7cSLuigi Rizzo if (op != ARPOP_REQUEST) 897b2a8ac7cSLuigi Rizzo goto drop; 89854fc657dSGeorge V. Neville-Neil ARPSTAT_INC(rxrequests); 8996e6b3f7cSQing Li 900df8bae1dSRodney W. Grimes if (itaddr.s_addr == myaddr.s_addr) { 9018b07e49aSJulian Elischer /* Shortcut.. the receiving interface is the target. */ 902322dcb8dSMax Khon (void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln); 903a9771948SGleb Smirnoff (void)memcpy(ar_sha(ah), enaddr, ah->ar_hln); 904df8bae1dSRodney W. Grimes } else { 905897d75c9SQing Li struct llentry *lle = NULL; 906897d75c9SQing Li 907cd29a779SQing Li sin.sin_addr = itaddr; 908ea0c3776SAndrey V. Elsukov IF_AFDATA_RLOCK(ifp); 909cd29a779SQing Li lle = lla_lookup(LLTABLE(ifp), 0, (struct sockaddr *)&sin); 910ea0c3776SAndrey V. Elsukov IF_AFDATA_RUNLOCK(ifp); 911cd29a779SQing Li 912cd29a779SQing Li if ((lle != NULL) && (lle->la_flags & LLE_PUB)) { 913cd29a779SQing Li (void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln); 914cd29a779SQing Li (void)memcpy(ar_sha(ah), &lle->ll_addr, ah->ar_hln); 915cd29a779SQing Li LLE_RUNLOCK(lle); 916cd29a779SQing Li } else { 917cd29a779SQing Li 918cd29a779SQing Li if (lle != NULL) 919cd29a779SQing Li LLE_RUNLOCK(lle); 920cd29a779SQing Li 921603724d3SBjoern A. Zeeb if (!V_arp_proxyall) 922b2a8ac7cSLuigi Rizzo goto drop; 92328e82295SGarrett Wollman 92428e82295SGarrett Wollman sin.sin_addr = itaddr; 9258b07e49aSJulian Elischer /* XXX MRT use table 0 for arp reply */ 9268b07e49aSJulian Elischer rt = in_rtalloc1((struct sockaddr *)&sin, 0, 0UL, 0); 927b2a8ac7cSLuigi Rizzo if (!rt) 928b2a8ac7cSLuigi Rizzo goto drop; 929897d75c9SQing Li 93028e82295SGarrett Wollman /* 93128e82295SGarrett Wollman * Don't send proxies for nodes on the same interface 93228e82295SGarrett Wollman * as this one came out of, or we'll get into a fight 93328e82295SGarrett Wollman * over who claims what Ether address. 93428e82295SGarrett Wollman */ 935897d75c9SQing Li if (!rt->rt_ifp || rt->rt_ifp == ifp) { 9364e57bc33SChristian S.J. Peron RTFREE_LOCKED(rt); 937b2a8ac7cSLuigi Rizzo goto drop; 93828e82295SGarrett Wollman } 9394e57bc33SChristian S.J. Peron RTFREE_LOCKED(rt); 940cc728227SDavid Malone 941897d75c9SQing Li (void)memcpy(ar_tha(ah), ar_sha(ah), ah->ar_hln); 942cd29a779SQing Li (void)memcpy(ar_sha(ah), enaddr, ah->ar_hln); 943897d75c9SQing Li 944cc728227SDavid Malone /* 945cc728227SDavid Malone * Also check that the node which sent the ARP packet 9466bccea7cSRebecca Cran * is on the interface we expect it to be on. This 947cc728227SDavid Malone * avoids ARP chaos if an interface is connected to the 948cc728227SDavid Malone * wrong network. 949cc728227SDavid Malone */ 950cc728227SDavid Malone sin.sin_addr = isaddr; 951cc728227SDavid Malone 9528b07e49aSJulian Elischer /* XXX MRT use table 0 for arp checks */ 9538b07e49aSJulian Elischer rt = in_rtalloc1((struct sockaddr *)&sin, 0, 0UL, 0); 954b2a8ac7cSLuigi Rizzo if (!rt) 955b2a8ac7cSLuigi Rizzo goto drop; 956322dcb8dSMax Khon if (rt->rt_ifp != ifp) { 9575d81d095SGleb Smirnoff ARP_LOG(LOG_INFO, "proxy: ignoring request" 9589bf40edeSBrooks Davis " from %s via %s, expecting %s\n", 9599bf40edeSBrooks Davis inet_ntoa(isaddr), ifp->if_xname, 9609bf40edeSBrooks Davis rt->rt_ifp->if_xname); 9614e57bc33SChristian S.J. Peron RTFREE_LOCKED(rt); 962b2a8ac7cSLuigi Rizzo goto drop; 963cc728227SDavid Malone } 9644e57bc33SChristian S.J. Peron RTFREE_LOCKED(rt); 965cc728227SDavid Malone 966ac234f93SGarrett Wollman #ifdef DEBUG_PROXY 967ea50c13eSGleb Smirnoff printf("arp: proxying for %s\n", inet_ntoa(itaddr)); 968ac234f93SGarrett Wollman #endif 969df8bae1dSRodney W. Grimes } 970cd29a779SQing Li } 971df8bae1dSRodney W. Grimes 972d0558157SBruce M Simpson if (itaddr.s_addr == myaddr.s_addr && 973d0558157SBruce M Simpson IN_LINKLOCAL(ntohl(itaddr.s_addr))) { 974d0558157SBruce M Simpson /* RFC 3927 link-local IPv4; always reply by broadcast. */ 975d0558157SBruce M Simpson #ifdef DEBUG_LINKLOCAL 976d0558157SBruce M Simpson printf("arp: sending reply for link-local addr %s\n", 977d0558157SBruce M Simpson inet_ntoa(itaddr)); 978d0558157SBruce M Simpson #endif 979d0558157SBruce M Simpson m->m_flags |= M_BCAST; 980d0558157SBruce M Simpson m->m_flags &= ~M_MCAST; 981d0558157SBruce M Simpson } else { 982d0558157SBruce M Simpson /* default behaviour; never reply by broadcast. */ 983d0558157SBruce M Simpson m->m_flags &= ~(M_BCAST|M_MCAST); 984d0558157SBruce M Simpson } 985322dcb8dSMax Khon (void)memcpy(ar_tpa(ah), ar_spa(ah), ah->ar_pln); 986322dcb8dSMax Khon (void)memcpy(ar_spa(ah), &itaddr, ah->ar_pln); 987322dcb8dSMax Khon ah->ar_op = htons(ARPOP_REPLY); 988322dcb8dSMax Khon ah->ar_pro = htons(ETHERTYPE_IP); /* let's be sure! */ 98964bf80ceSMatthew N. Dodd m->m_len = sizeof(*ah) + (2 * ah->ar_pln) + (2 * ah->ar_hln); 99064bf80ceSMatthew N. Dodd m->m_pkthdr.len = m->m_len; 9912303570fSAndrey V. Elsukov m->m_pkthdr.rcvif = NULL; 99264bf80ceSMatthew N. Dodd sa.sa_family = AF_ARP; 99364bf80ceSMatthew N. Dodd sa.sa_len = 2; 99486bd0491SAndre Oppermann m_clrprotoflags(m); /* Avoid confusing lower layers. */ 995279aa3d4SKip Macy (*ifp->if_output)(ifp, m, &sa, NULL); 99654fc657dSGeorge V. Neville-Neil ARPSTAT_INC(txreplies); 997df8bae1dSRodney W. Grimes return; 998b2a8ac7cSLuigi Rizzo 999b2a8ac7cSLuigi Rizzo drop: 1000b2a8ac7cSLuigi Rizzo m_freem(m); 1001df8bae1dSRodney W. Grimes } 10021d5e9e22SEivind Eklund #endif 1003df8bae1dSRodney W. Grimes 1004f3bfa7d1SAlexander V. Chernikov /* 1005f3bfa7d1SAlexander V. Chernikov * Checks received arp data against existing @la. 1006f3bfa7d1SAlexander V. Chernikov * Updates lle state/performs notification if necessary. 1007f3bfa7d1SAlexander V. Chernikov */ 1008f3bfa7d1SAlexander V. Chernikov static void 1009f3bfa7d1SAlexander V. Chernikov arp_check_update_lle(struct arphdr *ah, struct in_addr isaddr, struct ifnet *ifp, 1010f3bfa7d1SAlexander V. Chernikov int bridged, struct llentry *la) 1011f3bfa7d1SAlexander V. Chernikov { 1012f3bfa7d1SAlexander V. Chernikov struct sockaddr sa; 1013f3bfa7d1SAlexander V. Chernikov struct mbuf *m_hold, *m_hold_next; 1014f3bfa7d1SAlexander V. Chernikov 1015f3bfa7d1SAlexander V. Chernikov LLE_WLOCK_ASSERT(la); 1016f3bfa7d1SAlexander V. Chernikov 1017f3bfa7d1SAlexander V. Chernikov /* the following is not an error when doing bridging */ 1018f3bfa7d1SAlexander V. Chernikov if (!bridged && la->lle_tbl->llt_ifp != ifp) { 1019f3bfa7d1SAlexander V. Chernikov if (log_arp_wrong_iface) 1020f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_WARNING, "%s is on %s " 1021f3bfa7d1SAlexander V. Chernikov "but got reply from %*D on %s\n", 1022f3bfa7d1SAlexander V. Chernikov inet_ntoa(isaddr), 1023f3bfa7d1SAlexander V. Chernikov la->lle_tbl->llt_ifp->if_xname, 1024f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, (u_char *)ar_sha(ah), ":", 1025f3bfa7d1SAlexander V. Chernikov ifp->if_xname); 1026f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1027f3bfa7d1SAlexander V. Chernikov return; 1028f3bfa7d1SAlexander V. Chernikov } 1029f3bfa7d1SAlexander V. Chernikov if ((la->la_flags & LLE_VALID) && 1030f3bfa7d1SAlexander V. Chernikov bcmp(ar_sha(ah), &la->ll_addr, ifp->if_addrlen)) { 1031f3bfa7d1SAlexander V. Chernikov if (la->la_flags & LLE_STATIC) { 1032f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1033f3bfa7d1SAlexander V. Chernikov if (log_arp_permanent_modify) 1034f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_ERR, 1035f3bfa7d1SAlexander V. Chernikov "%*D attempts to modify " 1036f3bfa7d1SAlexander V. Chernikov "permanent entry for %s on %s\n", 1037f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, 1038f3bfa7d1SAlexander V. Chernikov (u_char *)ar_sha(ah), ":", 1039f3bfa7d1SAlexander V. Chernikov inet_ntoa(isaddr), ifp->if_xname); 1040f3bfa7d1SAlexander V. Chernikov return; 1041f3bfa7d1SAlexander V. Chernikov } 1042f3bfa7d1SAlexander V. Chernikov if (log_arp_movements) { 1043f3bfa7d1SAlexander V. Chernikov ARP_LOG(LOG_INFO, "%s moved from %*D " 1044f3bfa7d1SAlexander V. Chernikov "to %*D on %s\n", 1045f3bfa7d1SAlexander V. Chernikov inet_ntoa(isaddr), 1046f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, 1047f3bfa7d1SAlexander V. Chernikov (u_char *)&la->ll_addr, ":", 1048f3bfa7d1SAlexander V. Chernikov ifp->if_addrlen, (u_char *)ar_sha(ah), ":", 1049f3bfa7d1SAlexander V. Chernikov ifp->if_xname); 1050f3bfa7d1SAlexander V. Chernikov } 1051f3bfa7d1SAlexander V. Chernikov } 1052f3bfa7d1SAlexander V. Chernikov 1053f3bfa7d1SAlexander V. Chernikov /* Check if something has changed */ 1054f3bfa7d1SAlexander V. Chernikov if (memcmp(&la->ll_addr, ar_sha(ah), ifp->if_addrlen) != 0 || 1055f3bfa7d1SAlexander V. Chernikov (la->la_flags & LLE_VALID) == 0) { 1056f3bfa7d1SAlexander V. Chernikov /* Perform real LLE update */ 1057f3bfa7d1SAlexander V. Chernikov /* use afdata WLOCK to update fields */ 1058f3bfa7d1SAlexander V. Chernikov LLE_ADDREF(la); 1059f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1060f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 1061f3bfa7d1SAlexander V. Chernikov LLE_WLOCK(la); 1062f3bfa7d1SAlexander V. Chernikov 1063f3bfa7d1SAlexander V. Chernikov /* 1064f3bfa7d1SAlexander V. Chernikov * Since we droppped LLE lock, other thread might have deleted 1065f3bfa7d1SAlexander V. Chernikov * this lle. Check and return 1066f3bfa7d1SAlexander V. Chernikov */ 1067f3bfa7d1SAlexander V. Chernikov if ((la->la_flags & LLE_DELETED) != 0) { 1068f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 1069f3bfa7d1SAlexander V. Chernikov LLE_FREE_LOCKED(la); 1070f3bfa7d1SAlexander V. Chernikov return; 1071f3bfa7d1SAlexander V. Chernikov } 1072f3bfa7d1SAlexander V. Chernikov 1073f3bfa7d1SAlexander V. Chernikov /* Update data */ 1074ddd208f7SAlexander V. Chernikov lltable_set_entry_addr(ifp, la, ar_sha(ah)); 1075f3bfa7d1SAlexander V. Chernikov 1076f3bfa7d1SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 1077f3bfa7d1SAlexander V. Chernikov LLE_REMREF(la); 1078*f8aee88fSAlexander V. Chernikov 1079*f8aee88fSAlexander V. Chernikov /* Clear fast path feedback request if set */ 1080*f8aee88fSAlexander V. Chernikov la->r_skip_req = 0; 1081f3bfa7d1SAlexander V. Chernikov } 1082f3bfa7d1SAlexander V. Chernikov 1083f3bfa7d1SAlexander V. Chernikov arp_mark_lle_reachable(la); 1084f3bfa7d1SAlexander V. Chernikov 1085f3bfa7d1SAlexander V. Chernikov /* 1086f3bfa7d1SAlexander V. Chernikov * The packets are all freed within the call to the output 1087f3bfa7d1SAlexander V. Chernikov * routine. 1088f3bfa7d1SAlexander V. Chernikov * 1089f3bfa7d1SAlexander V. Chernikov * NB: The lock MUST be released before the call to the 1090f3bfa7d1SAlexander V. Chernikov * output routine. 1091f3bfa7d1SAlexander V. Chernikov */ 1092f3bfa7d1SAlexander V. Chernikov if (la->la_hold != NULL) { 1093f3bfa7d1SAlexander V. Chernikov m_hold = la->la_hold; 1094f3bfa7d1SAlexander V. Chernikov la->la_hold = NULL; 1095f3bfa7d1SAlexander V. Chernikov la->la_numheld = 0; 1096f3bfa7d1SAlexander V. Chernikov lltable_fill_sa_entry(la, &sa); 1097f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1098f3bfa7d1SAlexander V. Chernikov for (; m_hold != NULL; m_hold = m_hold_next) { 1099f3bfa7d1SAlexander V. Chernikov m_hold_next = m_hold->m_nextpkt; 1100f3bfa7d1SAlexander V. Chernikov m_hold->m_nextpkt = NULL; 1101f3bfa7d1SAlexander V. Chernikov /* Avoid confusing lower layers. */ 1102f3bfa7d1SAlexander V. Chernikov m_clrprotoflags(m_hold); 1103f3bfa7d1SAlexander V. Chernikov (*ifp->if_output)(ifp, m_hold, &sa, NULL); 1104f3bfa7d1SAlexander V. Chernikov } 1105f3bfa7d1SAlexander V. Chernikov } else 1106f3bfa7d1SAlexander V. Chernikov LLE_WUNLOCK(la); 1107f3bfa7d1SAlexander V. Chernikov } 1108f3bfa7d1SAlexander V. Chernikov 1109f3bfa7d1SAlexander V. Chernikov static void 1110f3bfa7d1SAlexander V. Chernikov arp_mark_lle_reachable(struct llentry *la) 1111f3bfa7d1SAlexander V. Chernikov { 1112*f8aee88fSAlexander V. Chernikov int canceled, wtime; 1113f3bfa7d1SAlexander V. Chernikov 1114f3bfa7d1SAlexander V. Chernikov LLE_WLOCK_ASSERT(la); 1115f3bfa7d1SAlexander V. Chernikov 1116*f8aee88fSAlexander V. Chernikov la->ln_state = ARP_LLINFO_REACHABLE; 1117f3bfa7d1SAlexander V. Chernikov EVENTHANDLER_INVOKE(lle_event, la, LLENTRY_RESOLVED); 1118f3bfa7d1SAlexander V. Chernikov 1119f3bfa7d1SAlexander V. Chernikov if (!(la->la_flags & LLE_STATIC)) { 1120f3bfa7d1SAlexander V. Chernikov LLE_ADDREF(la); 1121f3bfa7d1SAlexander V. Chernikov la->la_expire = time_uptime + V_arpt_keep; 1122*f8aee88fSAlexander V. Chernikov wtime = V_arpt_keep - V_arp_maxtries * V_arpt_rexmit; 1123*f8aee88fSAlexander V. Chernikov if (wtime < 0) 1124*f8aee88fSAlexander V. Chernikov wtime = V_arpt_keep; 1125f3bfa7d1SAlexander V. Chernikov canceled = callout_reset(&la->lle_timer, 1126*f8aee88fSAlexander V. Chernikov hz * wtime, arptimer, la); 1127f3bfa7d1SAlexander V. Chernikov if (canceled) 1128f3bfa7d1SAlexander V. Chernikov LLE_REMREF(la); 1129f3bfa7d1SAlexander V. Chernikov } 1130f3bfa7d1SAlexander V. Chernikov la->la_asked = 0; 1131f3bfa7d1SAlexander V. Chernikov la->la_preempt = V_arp_maxtries; 1132f3bfa7d1SAlexander V. Chernikov } 1133f3bfa7d1SAlexander V. Chernikov 11341c302b58SAlexander V. Chernikov /* 11351c302b58SAlexander V. Chernikov * Add pernament link-layer record for given interface address. 11361c302b58SAlexander V. Chernikov */ 11371c302b58SAlexander V. Chernikov static __noinline void 11381c302b58SAlexander V. Chernikov arp_add_ifa_lle(struct ifnet *ifp, const struct sockaddr *dst) 1139dd2e4102SGarrett Wollman { 11405a255516SAlexander V. Chernikov struct llentry *lle, *lle_tmp; 11415a255516SAlexander V. Chernikov 11426e6b3f7cSQing Li /* 11435a255516SAlexander V. Chernikov * Interface address LLE record is considered static 11445a255516SAlexander V. Chernikov * because kernel code relies on LLE_STATIC flag to check 11455a255516SAlexander V. Chernikov * if these entries can be rewriten by arp updates. 11466e6b3f7cSQing Li */ 11475a255516SAlexander V. Chernikov lle = lltable_alloc_entry(LLTABLE(ifp), LLE_IFADDR | LLE_STATIC, dst); 11485a255516SAlexander V. Chernikov if (lle == NULL) { 11496e6b3f7cSQing Li log(LOG_INFO, "arp_ifinit: cannot create arp " 11506e6b3f7cSQing Li "entry for interface address\n"); 11515a255516SAlexander V. Chernikov return; 1152ce9122fdSQing Li } 11535a255516SAlexander V. Chernikov 11545a255516SAlexander V. Chernikov IF_AFDATA_WLOCK(ifp); 11555a255516SAlexander V. Chernikov LLE_WLOCK(lle); 11565a255516SAlexander V. Chernikov /* Unlink any entry if exists */ 11575a255516SAlexander V. Chernikov lle_tmp = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst); 11585a255516SAlexander V. Chernikov if (lle_tmp != NULL) 11595a255516SAlexander V. Chernikov lltable_unlink_entry(LLTABLE(ifp), lle_tmp); 11605a255516SAlexander V. Chernikov 11615a255516SAlexander V. Chernikov lltable_link_entry(LLTABLE(ifp), lle); 11625a255516SAlexander V. Chernikov IF_AFDATA_WUNLOCK(ifp); 11635a255516SAlexander V. Chernikov 11645a255516SAlexander V. Chernikov if (lle_tmp != NULL) 11655a255516SAlexander V. Chernikov EVENTHANDLER_INVOKE(lle_event, lle_tmp, LLENTRY_EXPIRED); 11665a255516SAlexander V. Chernikov 11675a255516SAlexander V. Chernikov EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_RESOLVED); 11685a255516SAlexander V. Chernikov LLE_WUNLOCK(lle); 11695a255516SAlexander V. Chernikov if (lle_tmp != NULL) 11705a255516SAlexander V. Chernikov lltable_free_entry(LLTABLE(ifp), lle_tmp); 1171dd2e4102SGarrett Wollman } 1172df5e1987SJonathan Lemon 1173a9771948SGleb Smirnoff void 11741c302b58SAlexander V. Chernikov arp_ifinit(struct ifnet *ifp, struct ifaddr *ifa) 1175a9771948SGleb Smirnoff { 11761c302b58SAlexander V. Chernikov const struct sockaddr_in *dst_in; 11771c302b58SAlexander V. Chernikov const struct sockaddr *dst; 11781c302b58SAlexander V. Chernikov 11791c302b58SAlexander V. Chernikov if (ifa->ifa_carp != NULL) 11801c302b58SAlexander V. Chernikov return; 11811c302b58SAlexander V. Chernikov 11821c302b58SAlexander V. Chernikov dst = ifa->ifa_addr; 11831c302b58SAlexander V. Chernikov dst_in = (const struct sockaddr_in *)dst; 11841c302b58SAlexander V. Chernikov 11851c302b58SAlexander V. Chernikov if (ntohl(dst_in->sin_addr.s_addr) == INADDR_ANY) 11861c302b58SAlexander V. Chernikov return; 11871c302b58SAlexander V. Chernikov arp_announce_ifaddr(ifp, dst_in->sin_addr, IF_LLADDR(ifp)); 11881c302b58SAlexander V. Chernikov 11891c302b58SAlexander V. Chernikov arp_add_ifa_lle(ifp, dst); 11901c302b58SAlexander V. Chernikov } 11911c302b58SAlexander V. Chernikov 11921c302b58SAlexander V. Chernikov void 11931c302b58SAlexander V. Chernikov arp_announce_ifaddr(struct ifnet *ifp, struct in_addr addr, u_char *enaddr) 11941c302b58SAlexander V. Chernikov { 11951c302b58SAlexander V. Chernikov 11961c302b58SAlexander V. Chernikov if (ntohl(addr.s_addr) != INADDR_ANY) 11971c302b58SAlexander V. Chernikov arprequest(ifp, &addr, &addr, enaddr); 1198a9771948SGleb Smirnoff } 1199a9771948SGleb Smirnoff 1200b13c5b5dSAlexander V. Chernikov /* 1201b13c5b5dSAlexander V. Chernikov * Sends gratuitous ARPs for each ifaddr to notify other 1202b13c5b5dSAlexander V. Chernikov * nodes about the address change. 1203b13c5b5dSAlexander V. Chernikov */ 1204b13c5b5dSAlexander V. Chernikov static __noinline void 1205b13c5b5dSAlexander V. Chernikov arp_handle_ifllchange(struct ifnet *ifp) 1206b13c5b5dSAlexander V. Chernikov { 1207b13c5b5dSAlexander V. Chernikov struct ifaddr *ifa; 1208b13c5b5dSAlexander V. Chernikov 1209b13c5b5dSAlexander V. Chernikov TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 1210b13c5b5dSAlexander V. Chernikov if (ifa->ifa_addr->sa_family == AF_INET) 1211b13c5b5dSAlexander V. Chernikov arp_ifinit(ifp, ifa); 1212b13c5b5dSAlexander V. Chernikov } 1213b13c5b5dSAlexander V. Chernikov } 1214b13c5b5dSAlexander V. Chernikov 1215b13c5b5dSAlexander V. Chernikov /* 1216b13c5b5dSAlexander V. Chernikov * A handler for interface link layer address change event. 1217b13c5b5dSAlexander V. Chernikov */ 1218b13c5b5dSAlexander V. Chernikov static __noinline void 1219b13c5b5dSAlexander V. Chernikov arp_iflladdr(void *arg __unused, struct ifnet *ifp) 1220b13c5b5dSAlexander V. Chernikov { 1221b13c5b5dSAlexander V. Chernikov 1222b13c5b5dSAlexander V. Chernikov if ((ifp->if_flags & IFF_UP) != 0) 1223b13c5b5dSAlexander V. Chernikov arp_handle_ifllchange(ifp); 1224b13c5b5dSAlexander V. Chernikov } 1225b13c5b5dSAlexander V. Chernikov 12261ed81b73SMarko Zec static void 12271ed81b73SMarko Zec arp_init(void) 12281ed81b73SMarko Zec { 12291ed81b73SMarko Zec 1230d4b5cae4SRobert Watson netisr_register(&arp_nh); 1231b13c5b5dSAlexander V. Chernikov if (IS_DEFAULT_VNET(curvnet)) 1232b13c5b5dSAlexander V. Chernikov iflladdr_tag = EVENTHANDLER_REGISTER(iflladdr_event, 1233b13c5b5dSAlexander V. Chernikov arp_iflladdr, NULL, EVENTHANDLER_PRI_ANY); 1234df5e1987SJonathan Lemon } 1235df5e1987SJonathan Lemon SYSINIT(arp, SI_SUB_PROTO_DOMAIN, SI_ORDER_ANY, arp_init, 0); 1236