2015-12-17 05:38:33 +03:00
|
|
|
|
/* $NetBSD: if_arp.c,v 1.198 2015/12/17 02:38:33 ozaki-r Exp $ */
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
1998-10-01 01:52:24 +04:00
|
|
|
|
/*-
|
2008-04-24 15:38:36 +04:00
|
|
|
|
* Copyright (c) 1998, 2000, 2008 The NetBSD Foundation, Inc.
|
1998-10-01 01:52:24 +04:00
|
|
|
|
* All rights reserved.
|
|
|
|
|
*
|
|
|
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
|
|
|
* by Public Access Networks Corporation ("Panix"). It was developed under
|
|
|
|
|
* contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
|
|
|
|
|
*
|
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
|
* are met:
|
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
|
*
|
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
*/
|
|
|
|
|
|
1998-12-19 05:46:12 +03:00
|
|
|
|
/*
|
|
|
|
|
* Copyright (c) 1982, 1986, 1988, 1993
|
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
|
*
|
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
|
* are met:
|
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1998-12-19 05:46:12 +03:00
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
|
* without specific prior written permission.
|
|
|
|
|
*
|
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
|
*
|
|
|
|
|
* @(#)if_ether.c 8.2 (Berkeley) 9/26/94
|
|
|
|
|
*/
|
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
|
/*
|
|
|
|
|
* Ethernet address resolution protocol.
|
|
|
|
|
* TODO:
|
|
|
|
|
* add "inuse/lock" bit (or ref. count) along with valid bit
|
|
|
|
|
*/
|
|
|
|
|
|
2001-11-13 03:32:34 +03:00
|
|
|
|
#include <sys/cdefs.h>
|
2015-12-17 05:38:33 +03:00
|
|
|
|
__KERNEL_RCSID(0, "$NetBSD: if_arp.c,v 1.198 2015/12/17 02:38:33 ozaki-r Exp $");
|
2001-11-13 03:32:34 +03:00
|
|
|
|
|
2015-08-25 01:21:26 +03:00
|
|
|
|
#ifdef _KERNEL_OPT
|
1998-07-05 02:18:13 +04:00
|
|
|
|
#include "opt_ddb.h"
|
1998-07-05 04:51:04 +04:00
|
|
|
|
#include "opt_inet.h"
|
2015-08-25 01:21:26 +03:00
|
|
|
|
#endif
|
1998-07-05 02:18:13 +04:00
|
|
|
|
|
1994-06-21 07:54:27 +04:00
|
|
|
|
#ifdef INET
|
|
|
|
|
|
2001-08-18 01:47:57 +04:00
|
|
|
|
#include "bridge.h"
|
|
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
|
#include <sys/param.h>
|
|
|
|
|
#include <sys/systm.h>
|
2000-03-23 10:01:25 +03:00
|
|
|
|
#include <sys/callout.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
|
#include <sys/socket.h>
|
|
|
|
|
#include <sys/time.h>
|
2006-06-08 02:33:33 +04:00
|
|
|
|
#include <sys/timetc.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
|
#include <sys/errno.h>
|
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
|
#include <sys/syslog.h>
|
1996-02-14 02:40:59 +03:00
|
|
|
|
#include <sys/proc.h>
|
1999-08-05 08:04:28 +04:00
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
|
#include <sys/domain.h>
|
2004-04-28 18:09:36 +04:00
|
|
|
|
#include <sys/sysctl.h>
|
2008-04-24 15:38:36 +04:00
|
|
|
|
#include <sys/socketvar.h>
|
|
|
|
|
#include <sys/percpu.h>
|
2015-05-02 17:41:32 +03:00
|
|
|
|
#include <sys/cprng.h>
|
2015-08-31 11:05:20 +03:00
|
|
|
|
#include <sys/kmem.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
1997-03-15 21:09:08 +03:00
|
|
|
|
#include <net/ethertypes.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
|
#include <net/if.h>
|
1994-05-13 10:02:48 +04:00
|
|
|
|
#include <net/if_dl.h>
|
1999-03-23 01:30:42 +03:00
|
|
|
|
#include <net/if_token.h>
|
|
|
|
|
#include <net/if_types.h>
|
2006-05-18 13:05:49 +04:00
|
|
|
|
#include <net/if_ether.h>
|
2015-08-31 11:05:20 +03:00
|
|
|
|
#include <net/if_llatbl.h>
|
2015-05-02 17:41:32 +03:00
|
|
|
|
#include <net/net_osdep.h>
|
1994-05-13 10:02:48 +04:00
|
|
|
|
#include <net/route.h>
|
2008-04-23 09:26:50 +04:00
|
|
|
|
#include <net/net_stats.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
|
#include <netinet/ip.h>
|
1997-03-15 21:09:08 +03:00
|
|
|
|
#include <netinet/if_inarp.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
2007-11-14 04:11:14 +03:00
|
|
|
|
#include "arcnet.h"
|
|
|
|
|
#if NARCNET > 0
|
1999-09-25 21:49:27 +04:00
|
|
|
|
#include <net/if_arc.h>
|
|
|
|
|
#endif
|
1999-08-21 07:46:35 +04:00
|
|
|
|
#include "fddi.h"
|
|
|
|
|
#if NFDDI > 0
|
|
|
|
|
#include <net/if_fddi.h>
|
|
|
|
|
#endif
|
1999-03-23 01:30:42 +03:00
|
|
|
|
#include "token.h"
|
2006-05-18 13:05:49 +04:00
|
|
|
|
#include "carp.h"
|
|
|
|
|
#if NCARP > 0
|
|
|
|
|
#include <netinet/ip_carp.h>
|
|
|
|
|
#endif
|
1997-08-04 10:18:49 +04:00
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
#define SIN(s) ((struct sockaddr_in *)s)
|
|
|
|
|
#define SRP(s) ((struct sockaddr_inarp *)s)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* ARP trailer negotiation. Trailer protocol is not IP specific,
|
|
|
|
|
* but ARP request/response use IP addresses.
|
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
#define ETHERTYPE_IPTRAILERS ETHERTYPE_TRAIL
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
|
|
/* timer values */
|
2015-07-15 11:49:15 +03:00
|
|
|
|
static int arpt_keep = (20*60); /* once resolved, good for 20 more minutes */
|
|
|
|
|
static int arpt_down = 20; /* once declared down, don't send for 20 secs */
|
2015-08-31 11:05:20 +03:00
|
|
|
|
static int arp_maxhold = 1; /* number of packets to hold per ARP entry */
|
1994-05-13 10:02:48 +04:00
|
|
|
|
#define rt_expire rt_rmx.rmx_expire
|
2004-04-28 18:09:36 +04:00
|
|
|
|
#define rt_pksent rt_rmx.rmx_pksent
|
1994-05-13 10:02:48 +04:00
|
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
|
int ip_dad_count = PROBE_NUM;
|
|
|
|
|
#ifdef ARP_DEBUG
|
|
|
|
|
static int arp_debug = 1;
|
|
|
|
|
#else
|
|
|
|
|
static int arp_debug = 0;
|
|
|
|
|
#endif
|
|
|
|
|
#define arplog(x) do { if (arp_debug) log x; } while (/*CONSTCOND*/ 0)
|
|
|
|
|
|
2015-05-21 12:26:18 +03:00
|
|
|
|
static void arp_init(void);
|
|
|
|
|
|
2007-08-27 05:13:09 +04:00
|
|
|
|
static struct sockaddr *arp_setgate(struct rtentry *, struct sockaddr *,
|
|
|
|
|
const struct sockaddr *);
|
2015-09-09 04:24:01 +03:00
|
|
|
|
static void arptfree(struct rtentry *);
|
2005-02-03 00:41:01 +03:00
|
|
|
|
static void arptimer(void *);
|
2015-12-11 04:15:00 +03:00
|
|
|
|
static void arp_settimer(struct llentry *, int);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
static struct llentry *arplookup(struct ifnet *, struct mbuf *,
|
|
|
|
|
const struct in_addr *, int, int, int, struct rtentry *);
|
2005-02-03 00:41:01 +03:00
|
|
|
|
static void in_arpinput(struct mbuf *);
|
2015-05-21 12:26:18 +03:00
|
|
|
|
static void in_revarpinput(struct mbuf *);
|
|
|
|
|
static void revarprequest(struct ifnet *);
|
|
|
|
|
|
2011-05-03 20:00:29 +04:00
|
|
|
|
static void arp_drainstub(void);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
|
static void arp_dad_timer(struct ifaddr *);
|
2015-05-16 15:12:46 +03:00
|
|
|
|
static void arp_dad_start(struct ifaddr *);
|
|
|
|
|
static void arp_dad_stop(struct ifaddr *);
|
2015-05-02 17:41:32 +03:00
|
|
|
|
static void arp_dad_duplicated(struct ifaddr *);
|
|
|
|
|
|
2015-12-17 05:38:33 +03:00
|
|
|
|
static void arp_init_llentry(struct ifnet *, struct llentry *);
|
|
|
|
|
#if NTOKEN > 0
|
|
|
|
|
static void arp_free_llentry_tokenring(struct llentry *);
|
|
|
|
|
#endif
|
|
|
|
|
|
2006-08-30 19:45:54 +04:00
|
|
|
|
struct ifqueue arpintrq = {
|
|
|
|
|
.ifq_head = NULL,
|
|
|
|
|
.ifq_tail = NULL,
|
|
|
|
|
.ifq_len = 0,
|
|
|
|
|
.ifq_maxlen = 50,
|
|
|
|
|
.ifq_drops = 0,
|
|
|
|
|
};
|
2015-07-15 11:49:15 +03:00
|
|
|
|
static int arp_inuse, arp_allocated;
|
|
|
|
|
static int arp_maxtries = 5;
|
|
|
|
|
static int useloopback = 1; /* use loopback interface for local traffic */
|
1994-04-18 10:18:05 +04:00
|
|
|
|
|
2008-04-15 19:17:54 +04:00
|
|
|
|
static percpu_t *arpstat_percpu;
|
|
|
|
|
|
2008-04-23 09:26:50 +04:00
|
|
|
|
#define ARP_STAT_GETREF() _NET_STAT_GETREF(arpstat_percpu)
|
|
|
|
|
#define ARP_STAT_PUTREF() _NET_STAT_PUTREF(arpstat_percpu)
|
2008-04-15 19:17:54 +04:00
|
|
|
|
|
2008-04-23 09:26:50 +04:00
|
|
|
|
#define ARP_STATINC(x) _NET_STATINC(arpstat_percpu, x)
|
|
|
|
|
#define ARP_STATADD(x, v) _NET_STATADD(arpstat_percpu, x, v)
|
2008-04-15 19:17:54 +04:00
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
/* revarp state */
|
2015-07-15 11:49:15 +03:00
|
|
|
|
static struct in_addr myip, srv_ip;
|
|
|
|
|
static int myip_initialized = 0;
|
|
|
|
|
static int revarp_in_progress = 0;
|
|
|
|
|
static struct ifnet *myip_ifp = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
1996-02-14 02:40:59 +03:00
|
|
|
|
#ifdef DDB
|
2005-02-03 00:41:01 +03:00
|
|
|
|
static void db_print_sa(const struct sockaddr *);
|
|
|
|
|
static void db_print_ifa(struct ifaddr *);
|
2015-11-06 11:55:49 +03:00
|
|
|
|
static void db_print_llinfo(struct llentry *);
|
2007-06-13 02:55:44 +04:00
|
|
|
|
static int db_show_rtentry(struct rtentry *, void *);
|
1996-02-14 02:40:59 +03:00
|
|
|
|
#endif
|
|
|
|
|
|
2011-05-03 20:00:29 +04:00
|
|
|
|
static int arp_drainwanted;
|
|
|
|
|
|
2011-08-27 13:05:54 +04:00
|
|
|
|
static int log_movements = 1;
|
|
|
|
|
static int log_permanent_modify = 1;
|
|
|
|
|
static int log_wrong_iface = 1;
|
2014-11-13 19:11:18 +03:00
|
|
|
|
static int log_unknown_network = 1;
|
2011-08-27 13:05:54 +04:00
|
|
|
|
|
1997-03-15 21:09:08 +03:00
|
|
|
|
/*
|
|
|
|
|
* this should be elsewhere.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
static char *
|
2005-02-03 00:41:01 +03:00
|
|
|
|
lla_snprintf(u_int8_t *, int);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
|
|
|
|
|
static char *
|
2005-02-03 00:41:01 +03:00
|
|
|
|
lla_snprintf(u_int8_t *adrp, int len)
|
1997-03-15 21:09:08 +03:00
|
|
|
|
{
|
2001-06-11 10:19:50 +04:00
|
|
|
|
#define NUMBUFS 3
|
|
|
|
|
static char buf[NUMBUFS][16*3];
|
|
|
|
|
static int bnum = 0;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
|
1997-03-15 21:09:08 +03:00
|
|
|
|
int i;
|
|
|
|
|
char *p;
|
|
|
|
|
|
2001-06-11 10:19:50 +04:00
|
|
|
|
p = buf[bnum];
|
1997-03-15 21:09:08 +03:00
|
|
|
|
|
|
|
|
|
*p++ = hexdigits[(*adrp)>>4];
|
|
|
|
|
*p++ = hexdigits[(*adrp++)&0xf];
|
|
|
|
|
|
|
|
|
|
for (i=1; i<len && i<16; i++) {
|
|
|
|
|
*p++ = ':';
|
|
|
|
|
*p++ = hexdigits[(*adrp)>>4];
|
|
|
|
|
*p++ = hexdigits[(*adrp++)&0xf];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
*p = 0;
|
2001-06-11 10:19:50 +04:00
|
|
|
|
p = buf[bnum];
|
|
|
|
|
bnum = (bnum + 1) % NUMBUFS;
|
|
|
|
|
return p;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
}
|
|
|
|
|
|
2005-01-23 21:41:56 +03:00
|
|
|
|
DOMAIN_DEFINE(arpdomain); /* forward declare and add to link set */
|
|
|
|
|
|
2011-05-03 20:00:29 +04:00
|
|
|
|
static void
|
|
|
|
|
arp_fasttimo(void)
|
|
|
|
|
{
|
|
|
|
|
if (arp_drainwanted) {
|
|
|
|
|
arp_drain();
|
|
|
|
|
arp_drainwanted = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2004-04-22 05:01:40 +04:00
|
|
|
|
const struct protosw arpsw[] = {
|
2007-12-07 22:46:18 +03:00
|
|
|
|
{ .pr_type = 0,
|
|
|
|
|
.pr_domain = &arpdomain,
|
|
|
|
|
.pr_protocol = 0,
|
|
|
|
|
.pr_flags = 0,
|
|
|
|
|
.pr_input = 0,
|
|
|
|
|
.pr_output = 0,
|
|
|
|
|
.pr_ctlinput = 0,
|
|
|
|
|
.pr_ctloutput = 0,
|
2014-05-18 18:46:15 +04:00
|
|
|
|
.pr_usrreqs = 0,
|
2008-04-15 19:17:54 +04:00
|
|
|
|
.pr_init = arp_init,
|
2011-05-03 20:00:29 +04:00
|
|
|
|
.pr_fasttimo = arp_fasttimo,
|
2007-12-07 22:46:18 +03:00
|
|
|
|
.pr_slowtimo = 0,
|
2011-05-03 20:00:29 +04:00
|
|
|
|
.pr_drain = arp_drainstub,
|
1999-08-05 08:04:28 +04:00
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
2006-08-30 19:45:54 +04:00
|
|
|
|
struct domain arpdomain = {
|
|
|
|
|
.dom_family = PF_ARP,
|
|
|
|
|
.dom_name = "arp",
|
|
|
|
|
.dom_protosw = arpsw,
|
2008-05-13 21:51:26 +04:00
|
|
|
|
.dom_protoswNPROTOSW = &arpsw[__arraycount(arpsw)],
|
1999-08-05 08:04:28 +04:00
|
|
|
|
};
|
|
|
|
|
|
2009-09-16 19:23:04 +04:00
|
|
|
|
static void sysctl_net_inet_arp_setup(struct sysctllog **);
|
|
|
|
|
|
2008-04-15 19:17:54 +04:00
|
|
|
|
void
|
|
|
|
|
arp_init(void)
|
|
|
|
|
{
|
|
|
|
|
|
2009-09-16 19:23:04 +04:00
|
|
|
|
sysctl_net_inet_arp_setup(NULL);
|
2008-04-15 19:17:54 +04:00
|
|
|
|
arpstat_percpu = percpu_alloc(sizeof(uint64_t) * ARP_NSTATS);
|
|
|
|
|
}
|
|
|
|
|
|
2011-05-03 20:00:29 +04:00
|
|
|
|
static void
|
|
|
|
|
arp_drainstub(void)
|
|
|
|
|
{
|
|
|
|
|
arp_drainwanted = 1;
|
|
|
|
|
}
|
|
|
|
|
|
1999-08-05 08:04:28 +04:00
|
|
|
|
/*
|
|
|
|
|
* ARP protocol drain routine. Called when memory is in short supply.
|
2008-05-02 17:40:32 +04:00
|
|
|
|
* Called at splvm(); don't acquire softnet_lock as can be called from
|
|
|
|
|
* hardware interrupt handlers.
|
1999-08-05 08:04:28 +04:00
|
|
|
|
*/
|
|
|
|
|
void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
arp_drain(void)
|
1999-08-05 08:04:28 +04:00
|
|
|
|
{
|
2008-04-24 15:38:36 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
lltable_drain(AF_INET);
|
1999-08-05 08:04:28 +04:00
|
|
|
|
}
|
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
static void
|
2006-11-16 04:32:37 +03:00
|
|
|
|
arptimer(void *arg)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
2015-08-31 11:05:20 +03:00
|
|
|
|
struct llentry *lle = arg;
|
|
|
|
|
struct ifnet *ifp;
|
2015-10-14 14:17:57 +03:00
|
|
|
|
struct rtentry *rt;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if (lle == NULL)
|
2015-10-20 10:35:15 +03:00
|
|
|
|
return;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
|
|
|
|
|
if (lle->la_flags & LLE_STATIC)
|
2015-10-20 10:35:15 +03:00
|
|
|
|
return;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
|
|
|
|
|
LLE_WLOCK(lle);
|
|
|
|
|
if (callout_pending(&lle->la_timer)) {
|
|
|
|
|
/*
|
|
|
|
|
* Here we are a bit odd here in the treatment of
|
|
|
|
|
* active/pending. If the pending bit is set, it got
|
|
|
|
|
* rescheduled before I ran. The active
|
|
|
|
|
* bit we ignore, since if it was stopped
|
|
|
|
|
* in ll_tablefree() and was currently running
|
|
|
|
|
* it would have return 0 so the code would
|
|
|
|
|
* not have deleted it since the callout could
|
|
|
|
|
* not be stopped so we want to go through
|
|
|
|
|
* with the delete here now. If the callout
|
|
|
|
|
* was restarted, the pending bit will be back on and
|
|
|
|
|
* we just want to bail since the callout_reset would
|
|
|
|
|
* return 1 and our reference would have been removed
|
|
|
|
|
* by arpresolve() below.
|
|
|
|
|
*/
|
|
|
|
|
LLE_WUNLOCK(lle);
|
2015-10-20 10:35:15 +03:00
|
|
|
|
return;
|
1999-08-05 08:04:28 +04:00
|
|
|
|
}
|
2015-08-31 11:05:20 +03:00
|
|
|
|
ifp = lle->lle_tbl->llt_ifp;
|
2015-10-14 14:17:57 +03:00
|
|
|
|
rt = lle->la_rt;
|
|
|
|
|
lle->la_rt = NULL;
|
1999-08-05 08:04:28 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
callout_stop(&lle->la_timer);
|
1995-05-15 05:30:44 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
/* XXX: LOR avoidance. We still have ref on lle. */
|
|
|
|
|
LLE_WUNLOCK(lle);
|
|
|
|
|
|
2015-10-14 14:17:57 +03:00
|
|
|
|
if (rt != NULL) {
|
2015-09-09 04:24:01 +03:00
|
|
|
|
/* We have to call arptfree w/o IF_AFDATA_LOCK */
|
2015-10-14 14:17:57 +03:00
|
|
|
|
arptfree(rt);
|
2015-09-09 04:24:01 +03:00
|
|
|
|
}
|
2015-08-31 11:05:20 +03:00
|
|
|
|
|
|
|
|
|
IF_AFDATA_LOCK(ifp);
|
|
|
|
|
LLE_WLOCK(lle);
|
|
|
|
|
|
|
|
|
|
/* Guard against race with other llentry_free(). */
|
|
|
|
|
if (lle->la_flags & LLE_LINKED) {
|
|
|
|
|
size_t pkts_dropped;
|
|
|
|
|
|
|
|
|
|
LLE_REMREF(lle);
|
|
|
|
|
pkts_dropped = llentry_free(lle);
|
|
|
|
|
ARP_STATADD(ARP_STAT_DFRDROPPED, pkts_dropped);
|
|
|
|
|
} else {
|
|
|
|
|
LLE_FREE_LOCKED(lle);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
}
|
1999-08-05 08:04:28 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
IF_AFDATA_UNLOCK(ifp);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
}
|
|
|
|
|
|
2015-12-11 04:15:00 +03:00
|
|
|
|
static void
|
|
|
|
|
arp_settimer(struct llentry *la, int sec)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
LLE_WLOCK_ASSERT(la);
|
|
|
|
|
LLE_ADDREF(la);
|
|
|
|
|
callout_reset(&la->la_timer, hz * sec, arptimer, la);
|
|
|
|
|
}
|
|
|
|
|
|
2007-08-27 05:13:09 +04:00
|
|
|
|
/*
|
|
|
|
|
* We set the gateway for RTF_CLONING routes to a "prototype"
|
|
|
|
|
* link-layer sockaddr whose interface type (if_type) and interface
|
|
|
|
|
* index (if_index) fields are prepared.
|
|
|
|
|
*/
|
|
|
|
|
static struct sockaddr *
|
|
|
|
|
arp_setgate(struct rtentry *rt, struct sockaddr *gate,
|
|
|
|
|
const struct sockaddr *netmask)
|
|
|
|
|
{
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
const struct ifnet *ifp = rt->rt_ifp;
|
|
|
|
|
uint8_t namelen = strlen(ifp->if_xname);
|
|
|
|
|
uint8_t addrlen = ifp->if_addrlen;
|
|
|
|
|
|
2007-08-27 05:13:09 +04:00
|
|
|
|
/*
|
|
|
|
|
* XXX: If this is a manually added route to interface
|
|
|
|
|
* such as older version of routed or gated might provide,
|
|
|
|
|
* restore cloning bit.
|
|
|
|
|
*/
|
|
|
|
|
if ((rt->rt_flags & RTF_HOST) == 0 && netmask != NULL &&
|
|
|
|
|
satocsin(netmask)->sin_addr.s_addr != 0xffffffff)
|
|
|
|
|
rt->rt_flags |= RTF_CLONING;
|
2015-02-26 12:54:46 +03:00
|
|
|
|
if (rt->rt_flags & RTF_CLONING ||
|
|
|
|
|
((rt->rt_flags & (RTF_LLINFO | RTF_LOCAL)) && !rt->rt_llinfo))
|
|
|
|
|
{
|
2007-09-02 23:42:21 +04:00
|
|
|
|
union {
|
|
|
|
|
struct sockaddr sa;
|
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
|
struct sockaddr_dl sdl;
|
|
|
|
|
} u;
|
2007-08-27 05:13:09 +04:00
|
|
|
|
/*
|
|
|
|
|
* Case 1: This route should come from a route to iface.
|
|
|
|
|
*/
|
2007-09-02 23:42:21 +04:00
|
|
|
|
sockaddr_dl_init(&u.sdl, sizeof(u.ss),
|
|
|
|
|
ifp->if_index, ifp->if_type, NULL, namelen, NULL, addrlen);
|
|
|
|
|
rt_setgate(rt, &u.sa);
|
2007-08-27 05:13:09 +04:00
|
|
|
|
gate = rt->rt_gateway;
|
|
|
|
|
}
|
|
|
|
|
return gate;
|
|
|
|
|
}
|
|
|
|
|
|
2015-12-17 05:38:33 +03:00
|
|
|
|
static void
|
|
|
|
|
arp_init_llentry(struct ifnet *ifp, struct llentry *lle)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
switch (ifp->if_type) {
|
|
|
|
|
#if NTOKEN > 0
|
|
|
|
|
case IFT_ISO88025:
|
|
|
|
|
lle->la_opaque = kmem_intr_alloc(sizeof(struct token_rif),
|
|
|
|
|
KM_NOSLEEP);
|
|
|
|
|
lle->lle_ll_free = arp_free_llentry_tokenring;
|
|
|
|
|
break;
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#if NTOKEN > 0
|
|
|
|
|
static void
|
|
|
|
|
arp_free_llentry_tokenring(struct llentry *lle)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
kmem_intr_free(lle->la_opaque, sizeof(struct token_rif));
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
/*
|
|
|
|
|
* Parallel to llc_rtrequest.
|
|
|
|
|
*/
|
|
|
|
|
void
|
2008-10-24 21:07:33 +04:00
|
|
|
|
arp_rtrequest(int req, struct rtentry *rt, const struct rt_addrinfo *info)
|
1994-05-13 10:02:48 +04:00
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
|
struct sockaddr *gate = rt->rt_gateway;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
struct llentry *la = NULL;
|
2001-07-04 06:29:58 +04:00
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
|
struct ifaddr *ifa;
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
struct ifnet *ifp = rt->rt_ifp;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
int flags = 0;
|
2002-06-09 09:09:26 +04:00
|
|
|
|
|
*** Summary ***
When a link-layer address changes (e.g., ifconfig ex0 link
02:de:ad:be:ef:02 active), send a gratuitous ARP and/or a Neighbor
Advertisement to update the network-/link-layer address bindings
on our LAN peers.
Refuse a change of ethernet address to the address 00:00:00:00:00:00
or to any multicast/broadcast address. (Thanks matt@.)
Reorder ifnet ioctl operations so that driver ioctls may inherit
the functions of their "class"---ether_ioctl(), fddi_ioctl(), et
cetera---and the class ioctls may inherit from the generic ioctl,
ifioctl_common(), but both driver- and class-ioctls may override
the generic behavior. Make network drivers share more code.
Distinguish a "factory" link-layer address from others for the
purposes of both protecting that address from deletion and computing
EUI64.
Return consistent, appropriate error codes from network drivers.
Improve readability. KNF.
*** Details ***
In if_attach(), always initialize the interface ioctl routine,
ifnet->if_ioctl, if the driver has not already initialized it.
Delete if_ioctl == NULL tests everywhere else, because it cannot
happen.
In the ioctl routines of network interfaces, inherit common ioctl
behaviors by calling either ifioctl_common() or whichever ioctl
routine is appropriate for the class of interface---e.g., ether_ioctl()
for ethernets.
Stop (ab)using SIOCSIFADDR and start to use SIOCINITIFADDR. In
the user->kernel interface, SIOCSIFADDR's argument was an ifreq,
but on the protocol->ifnet interface, SIOCSIFADDR's argument was
an ifaddr. That was confusing, and it would work against me as I
make it possible for a network interface to overload most ioctls.
On the protocol->ifnet interface, replace SIOCSIFADDR with
SIOCINITIFADDR. In ifioctl(), return EPERM if userland tries to
invoke SIOCINITIFADDR.
In ifioctl(), give the interface the first shot at handling most
interface ioctls, and give the protocol the second shot, instead
of the other way around. Finally, let compatibility code (COMPAT_OSOCK)
take a shot.
Pull device initialization out of switch statements under
SIOCINITIFADDR. For example, pull ..._init() out of any switch
statement that looks like this:
switch (...->sa_family) {
case ...:
..._init();
...
break;
...
default:
..._init();
...
break;
}
Rewrite many if-else clauses that handle all permutations of IFF_UP
and IFF_RUNNING to use a switch statement,
switch (x & (IFF_UP|IFF_RUNNING)) {
case 0:
...
break;
case IFF_RUNNING:
...
break;
case IFF_UP:
...
break;
case IFF_UP|IFF_RUNNING:
...
break;
}
unifdef lots of code containing #ifdef FreeBSD, #ifdef NetBSD, and
#ifdef SIOCSIFMTU, especially in fwip(4) and in ndis(4).
In ipw(4), remove an if_set_sadl() call that is out of place.
In nfe(4), reuse the jumbo MTU logic in ether_ioctl().
Let ethernets register a callback for setting h/w state such as
promiscuous mode and the multicast filter in accord with a change
in the if_flags: ether_set_ifflags_cb() registers a callback that
returns ENETRESET if the caller should reset the ethernet by calling
if_init(), 0 on success, != 0 on failure. Pull common code from
ex(4), gem(4), nfe(4), sip(4), tlp(4), vge(4) into ether_ioctl(),
and register if_flags callbacks for those drivers.
Return ENOTTY instead of EINVAL for inappropriate ioctls. In
zyd(4), use ENXIO instead of ENOTTY to indicate that the device is
not any longer attached.
Add to if_set_sadl() a boolean 'factory' argument that indicates
whether a link-layer address was assigned by the factory or some
other source. In a comment, recommend using the factory address
for generating an EUI64, and update in6_get_hw_ifid() to prefer a
factory address to any other link-layer address.
Add a routing message, RTM_LLINFO_UPD, that tells protocols to
update the binding of network-layer addresses to link-layer addresses.
Implement this message in IPv4 and IPv6 by sending a gratuitous
ARP or a neighbor advertisement, respectively. Generate RTM_LLINFO_UPD
messages on a change of an interface's link-layer address.
In ether_ioctl(), do not let SIOCALIFADDR set a link-layer address
that is broadcast/multicast or equal to 00:00:00:00:00:00.
Make ether_ioctl() call ifioctl_common() to handle ioctls that it
does not understand.
In gif(4), initialize if_softc and use it, instead of assuming that
the gif_softc and ifp overlap.
Let ifioctl_common() handle SIOCGIFADDR.
Sprinkle rtcache_invariants(), which checks on DIAGNOSTIC kernels
that certain invariants on a struct route are satisfied.
In agr(4), rewrite agr_ioctl_filter() to be a bit more explicit
about the ioctls that we do not allow on an agr(4) member interface.
bzero -> memset. Delete unnecessary casts to void *. Use
sockaddr_in_init() and sockaddr_in6_init(). Compare pointers with
NULL instead of "testing truth". Replace some instances of (type
*)0 with NULL. Change some K&R prototypes to ANSI C, and join
lines.
2008-11-07 03:20:01 +03:00
|
|
|
|
if (req == RTM_LLINFO_UPD) {
|
|
|
|
|
struct in_addr *in;
|
|
|
|
|
|
|
|
|
|
if ((ifa = info->rti_ifa) == NULL)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
in = &ifatoia(ifa)->ia_addr.sin_addr;
|
|
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
|
if (ifatoia(ifa)->ia4_flags &
|
|
|
|
|
(IN_IFF_NOTREADY | IN_IFF_DETACHED))
|
|
|
|
|
{
|
|
|
|
|
arplog((LOG_DEBUG, "arp_request: %s not ready\n",
|
|
|
|
|
in_fmtaddr(*in)));
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
*** Summary ***
When a link-layer address changes (e.g., ifconfig ex0 link
02:de:ad:be:ef:02 active), send a gratuitous ARP and/or a Neighbor
Advertisement to update the network-/link-layer address bindings
on our LAN peers.
Refuse a change of ethernet address to the address 00:00:00:00:00:00
or to any multicast/broadcast address. (Thanks matt@.)
Reorder ifnet ioctl operations so that driver ioctls may inherit
the functions of their "class"---ether_ioctl(), fddi_ioctl(), et
cetera---and the class ioctls may inherit from the generic ioctl,
ifioctl_common(), but both driver- and class-ioctls may override
the generic behavior. Make network drivers share more code.
Distinguish a "factory" link-layer address from others for the
purposes of both protecting that address from deletion and computing
EUI64.
Return consistent, appropriate error codes from network drivers.
Improve readability. KNF.
*** Details ***
In if_attach(), always initialize the interface ioctl routine,
ifnet->if_ioctl, if the driver has not already initialized it.
Delete if_ioctl == NULL tests everywhere else, because it cannot
happen.
In the ioctl routines of network interfaces, inherit common ioctl
behaviors by calling either ifioctl_common() or whichever ioctl
routine is appropriate for the class of interface---e.g., ether_ioctl()
for ethernets.
Stop (ab)using SIOCSIFADDR and start to use SIOCINITIFADDR. In
the user->kernel interface, SIOCSIFADDR's argument was an ifreq,
but on the protocol->ifnet interface, SIOCSIFADDR's argument was
an ifaddr. That was confusing, and it would work against me as I
make it possible for a network interface to overload most ioctls.
On the protocol->ifnet interface, replace SIOCSIFADDR with
SIOCINITIFADDR. In ifioctl(), return EPERM if userland tries to
invoke SIOCINITIFADDR.
In ifioctl(), give the interface the first shot at handling most
interface ioctls, and give the protocol the second shot, instead
of the other way around. Finally, let compatibility code (COMPAT_OSOCK)
take a shot.
Pull device initialization out of switch statements under
SIOCINITIFADDR. For example, pull ..._init() out of any switch
statement that looks like this:
switch (...->sa_family) {
case ...:
..._init();
...
break;
...
default:
..._init();
...
break;
}
Rewrite many if-else clauses that handle all permutations of IFF_UP
and IFF_RUNNING to use a switch statement,
switch (x & (IFF_UP|IFF_RUNNING)) {
case 0:
...
break;
case IFF_RUNNING:
...
break;
case IFF_UP:
...
break;
case IFF_UP|IFF_RUNNING:
...
break;
}
unifdef lots of code containing #ifdef FreeBSD, #ifdef NetBSD, and
#ifdef SIOCSIFMTU, especially in fwip(4) and in ndis(4).
In ipw(4), remove an if_set_sadl() call that is out of place.
In nfe(4), reuse the jumbo MTU logic in ether_ioctl().
Let ethernets register a callback for setting h/w state such as
promiscuous mode and the multicast filter in accord with a change
in the if_flags: ether_set_ifflags_cb() registers a callback that
returns ENETRESET if the caller should reset the ethernet by calling
if_init(), 0 on success, != 0 on failure. Pull common code from
ex(4), gem(4), nfe(4), sip(4), tlp(4), vge(4) into ether_ioctl(),
and register if_flags callbacks for those drivers.
Return ENOTTY instead of EINVAL for inappropriate ioctls. In
zyd(4), use ENXIO instead of ENOTTY to indicate that the device is
not any longer attached.
Add to if_set_sadl() a boolean 'factory' argument that indicates
whether a link-layer address was assigned by the factory or some
other source. In a comment, recommend using the factory address
for generating an EUI64, and update in6_get_hw_ifid() to prefer a
factory address to any other link-layer address.
Add a routing message, RTM_LLINFO_UPD, that tells protocols to
update the binding of network-layer addresses to link-layer addresses.
Implement this message in IPv4 and IPv6 by sending a gratuitous
ARP or a neighbor advertisement, respectively. Generate RTM_LLINFO_UPD
messages on a change of an interface's link-layer address.
In ether_ioctl(), do not let SIOCALIFADDR set a link-layer address
that is broadcast/multicast or equal to 00:00:00:00:00:00.
Make ether_ioctl() call ifioctl_common() to handle ioctls that it
does not understand.
In gif(4), initialize if_softc and use it, instead of assuming that
the gif_softc and ifp overlap.
Let ifioctl_common() handle SIOCGIFADDR.
Sprinkle rtcache_invariants(), which checks on DIAGNOSTIC kernels
that certain invariants on a struct route are satisfied.
In agr(4), rewrite agr_ioctl_filter() to be a bit more explicit
about the ioctls that we do not allow on an agr(4) member interface.
bzero -> memset. Delete unnecessary casts to void *. Use
sockaddr_in_init() and sockaddr_in6_init(). Compare pointers with
NULL instead of "testing truth". Replace some instances of (type
*)0 with NULL. Change some K&R prototypes to ANSI C, and join
lines.
2008-11-07 03:20:01 +03:00
|
|
|
|
arprequest(ifa->ifa_ifp, in, in,
|
|
|
|
|
CLLADDR(ifa->ifa_ifp->if_sadl));
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-09 09:09:26 +04:00
|
|
|
|
if ((rt->rt_flags & RTF_GATEWAY) != 0) {
|
|
|
|
|
if (req != RTM_ADD)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* linklayers with particular link MTU limitation.
|
|
|
|
|
*/
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
switch(ifp->if_type) {
|
2002-06-09 09:09:26 +04:00
|
|
|
|
#if NFDDI > 0
|
|
|
|
|
case IFT_FDDI:
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
if (ifp->if_mtu > FDDIIPMTU)
|
2002-06-09 09:09:26 +04:00
|
|
|
|
rt->rt_rmx.rmx_mtu = FDDIIPMTU;
|
|
|
|
|
break;
|
|
|
|
|
#endif
|
2015-05-22 10:44:46 +03:00
|
|
|
|
#if NARCNET > 0
|
2002-06-09 09:09:26 +04:00
|
|
|
|
case IFT_ARCNET:
|
|
|
|
|
{
|
|
|
|
|
int arcipifmtu;
|
|
|
|
|
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
if (ifp->if_flags & IFF_LINK0)
|
2002-06-09 09:09:26 +04:00
|
|
|
|
arcipifmtu = arc_ipmtu;
|
|
|
|
|
else
|
|
|
|
|
arcipifmtu = ARCMTU;
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
if (ifp->if_mtu > arcipifmtu)
|
2002-06-09 09:09:26 +04:00
|
|
|
|
rt->rt_rmx.rmx_mtu = arcipifmtu;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
|
return;
|
2002-06-09 09:09:26 +04:00
|
|
|
|
}
|
1999-08-05 08:04:28 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
IF_AFDATA_RLOCK(ifp);
|
|
|
|
|
la = lla_lookup(LLTABLE(ifp), flags, rt_getkey(rt));
|
|
|
|
|
IF_AFDATA_RUNLOCK(ifp);
|
1999-08-05 08:04:28 +04:00
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
switch (req) {
|
2007-08-27 05:13:09 +04:00
|
|
|
|
case RTM_SETGATE:
|
|
|
|
|
gate = arp_setgate(rt, gate, info->rti_info[RTAX_NETMASK]);
|
|
|
|
|
break;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
case RTM_ADD:
|
2007-08-27 05:13:09 +04:00
|
|
|
|
gate = arp_setgate(rt, gate, info->rti_info[RTAX_NETMASK]);
|
2015-02-26 12:54:46 +03:00
|
|
|
|
if (rt->rt_flags & RTF_CLONING ||
|
|
|
|
|
((rt->rt_flags & (RTF_LLINFO | RTF_LOCAL)) && !la))
|
|
|
|
|
{
|
1994-06-03 06:54:26 +04:00
|
|
|
|
/*
|
1994-06-04 07:15:09 +04:00
|
|
|
|
* Give this route an expiration time, even though
|
|
|
|
|
* it's a "permanent" route, so that routes cloned
|
|
|
|
|
* from it do not need their expiration time set.
|
1994-06-03 06:54:26 +04:00
|
|
|
|
*/
|
2015-08-07 11:11:33 +03:00
|
|
|
|
KASSERT(time_uptime != 0);
|
|
|
|
|
rt->rt_expire = time_uptime;
|
2002-06-09 09:09:26 +04:00
|
|
|
|
/*
|
|
|
|
|
* linklayers with particular link MTU limitation.
|
|
|
|
|
*/
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
switch (ifp->if_type) {
|
1999-08-21 07:46:35 +04:00
|
|
|
|
#if NFDDI > 0
|
2002-06-09 09:09:26 +04:00
|
|
|
|
case IFT_FDDI:
|
|
|
|
|
if ((rt->rt_rmx.rmx_locks & RTV_MTU) == 0 &&
|
|
|
|
|
(rt->rt_rmx.rmx_mtu > FDDIIPMTU ||
|
|
|
|
|
(rt->rt_rmx.rmx_mtu == 0 &&
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
ifp->if_mtu > FDDIIPMTU)))
|
2002-06-09 09:09:26 +04:00
|
|
|
|
rt->rt_rmx.rmx_mtu = FDDIIPMTU;
|
|
|
|
|
break;
|
1999-09-25 21:49:27 +04:00
|
|
|
|
#endif
|
2015-05-22 10:44:46 +03:00
|
|
|
|
#if NARCNET > 0
|
2002-06-09 09:09:26 +04:00
|
|
|
|
case IFT_ARCNET:
|
|
|
|
|
{
|
1999-09-25 21:49:27 +04:00
|
|
|
|
int arcipifmtu;
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
if (ifp->if_flags & IFF_LINK0)
|
1999-09-25 21:49:27 +04:00
|
|
|
|
arcipifmtu = arc_ipmtu;
|
|
|
|
|
else
|
|
|
|
|
arcipifmtu = ARCMTU;
|
|
|
|
|
|
2002-06-09 09:09:26 +04:00
|
|
|
|
if ((rt->rt_rmx.rmx_locks & RTV_MTU) == 0 &&
|
|
|
|
|
(rt->rt_rmx.rmx_mtu > arcipifmtu ||
|
|
|
|
|
(rt->rt_rmx.rmx_mtu == 0 &&
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
ifp->if_mtu > arcipifmtu)))
|
1999-09-25 21:49:27 +04:00
|
|
|
|
rt->rt_rmx.rmx_mtu = arcipifmtu;
|
2002-06-09 09:09:26 +04:00
|
|
|
|
break;
|
|
|
|
|
}
|
1999-08-21 07:46:35 +04:00
|
|
|
|
#endif
|
2002-06-09 09:09:26 +04:00
|
|
|
|
}
|
2015-02-26 12:54:46 +03:00
|
|
|
|
if (rt->rt_flags & RTF_CLONING)
|
|
|
|
|
break;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
}
|
|
|
|
|
/* Announce a new entry if requested. */
|
2009-01-11 05:45:45 +03:00
|
|
|
|
if (rt->rt_flags & RTF_ANNOUNCE) {
|
2015-05-02 17:41:32 +03:00
|
|
|
|
INADDR_TO_IA(satocsin(rt_getkey(rt))->sin_addr, ia);
|
|
|
|
|
while (ia && ia->ia_ifp != ifp)
|
|
|
|
|
NEXT_IA_WITH_SAME_ADDR(ia);
|
|
|
|
|
if (ia == NULL ||
|
|
|
|
|
ia->ia4_flags & (IN_IFF_NOTREADY | IN_IFF_DETACHED))
|
|
|
|
|
;
|
|
|
|
|
else
|
|
|
|
|
arprequest(ifp,
|
|
|
|
|
&satocsin(rt_getkey(rt))->sin_addr,
|
|
|
|
|
&satocsin(rt_getkey(rt))->sin_addr,
|
|
|
|
|
CLLADDR(satocsdl(gate)));
|
2009-01-11 05:45:45 +03:00
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
|
/*FALLTHROUGH*/
|
|
|
|
|
case RTM_RESOLVE:
|
|
|
|
|
if (gate->sa_family != AF_LINK ||
|
2009-08-13 02:16:15 +04:00
|
|
|
|
gate->sa_len < sockaddr_dl_measure(0, ifp->if_addrlen)) {
|
1997-04-07 05:48:30 +04:00
|
|
|
|
log(LOG_DEBUG, "arp_rtrequest: bad gateway value\n");
|
1994-05-13 10:02:48 +04:00
|
|
|
|
break;
|
|
|
|
|
}
|
2015-03-23 21:33:17 +03:00
|
|
|
|
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
satosdl(gate)->sdl_type = ifp->if_type;
|
|
|
|
|
satosdl(gate)->sdl_index = ifp->if_index;
|
2008-05-13 21:51:26 +04:00
|
|
|
|
if (la != NULL)
|
1994-05-13 10:02:48 +04:00
|
|
|
|
break; /* This happens on a route change */
|
2015-03-23 21:33:17 +03:00
|
|
|
|
|
|
|
|
|
/* If the route is for a broadcast address mark it as such.
|
|
|
|
|
* This way we can avoid an expensive call to in_broadcast()
|
|
|
|
|
* in ip_output() most of the time (because the route passed
|
|
|
|
|
* to ip_output() is almost always a host route). */
|
|
|
|
|
if (rt->rt_flags & RTF_HOST &&
|
|
|
|
|
!(rt->rt_flags & RTF_BROADCAST) &&
|
|
|
|
|
in_broadcast(satocsin(rt_getkey(rt))->sin_addr, rt->rt_ifp))
|
|
|
|
|
rt->rt_flags |= RTF_BROADCAST;
|
|
|
|
|
/* There is little point in resolving the broadcast address */
|
|
|
|
|
if (rt->rt_flags & RTF_BROADCAST)
|
|
|
|
|
break;
|
|
|
|
|
|
Take steps to hide the radix_node implementation of the forwarding table
from the forwarding table's users:
Introduce rt_walktree() for walking the routing table and
applying a function to each rtentry. Replace most
rn_walktree() calls with it.
Use rt_getkey()/rt_setkey() to get/set a route's destination.
Keep a pointer to the sockaddr key in the rtentry, so that
rtentry users do not have to grovel in the radix_node for
the key.
Add a RTM_GET method to rtrequest. Use that instead of
radix_node lookups in, e.g., carp(4).
Add sys/net/link_proto.c, which supplies sockaddr routines for
link-layer socket addresses (sockaddr_dl).
Cosmetic:
Constify. KNF. Stop open-coding LIST_FOREACH, TAILQ_FOREACH,
et cetera. Use NULL instead of 0 for null pointers. Use
__arraycount(). Reduce gratuitous parenthesization.
Stop using variadic arguments for rip6_output(), it is
unnecessary.
Remove the unnecessary rtentry member rt_genmask and the
code to maintain it, since nothing actually used it.
Make rt_maskedcopy() easier to read by using meaningful variable
names.
Extract a subroutine intern_netmask() for looking up a netmask in
the masks table.
Start converting backslash-ridden IPv6 macros in
sys/netinet6/in6_var.h into inline subroutines that one
can read without special eyeglasses.
One functional change: when the kernel serves an RTM_GET, RTM_LOCK,
or RTM_CHANGE request, it applies the netmask (if supplied) to a
destination before searching for it in the forwarding table.
I have changed sys/netinet/ip_carp.c, carp_setroute(), to remove
the unlawful radix_node knowledge.
Apart from the changes to carp(4), netiso, ATM, and strip(4), I
have run the changes on three nodes in my wireless routing testbed,
which involves IPv4 + IPv6 dynamic routing acrobatics, and it's
working beautifully so far.
2007-07-20 00:48:52 +04:00
|
|
|
|
INADDR_TO_IA(satocsin(rt_getkey(rt))->sin_addr, ia);
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
while (ia && ia->ia_ifp != ifp)
|
2001-07-04 06:29:58 +04:00
|
|
|
|
NEXT_IA_WITH_SAME_ADDR(ia);
|
|
|
|
|
if (ia) {
|
1995-05-15 05:30:44 +04:00
|
|
|
|
/*
|
|
|
|
|
* This test used to be
|
2004-12-04 19:10:25 +03:00
|
|
|
|
* if (lo0ifp->if_flags & IFF_UP)
|
1995-05-15 05:30:44 +04:00
|
|
|
|
* It allowed local traffic to be forced through
|
|
|
|
|
* the hardware by configuring the loopback down.
|
|
|
|
|
* However, it causes problems during network
|
|
|
|
|
* configuration for boards that can't receive
|
|
|
|
|
* packets they send. It is now necessary to clear
|
|
|
|
|
* "useloopback" and remove the route to force
|
|
|
|
|
* traffic out to the hardware.
|
2001-07-04 06:29:58 +04:00
|
|
|
|
*
|
|
|
|
|
* In 4.4BSD, the above "if" statement checked
|
Take steps to hide the radix_node implementation of the forwarding table
from the forwarding table's users:
Introduce rt_walktree() for walking the routing table and
applying a function to each rtentry. Replace most
rn_walktree() calls with it.
Use rt_getkey()/rt_setkey() to get/set a route's destination.
Keep a pointer to the sockaddr key in the rtentry, so that
rtentry users do not have to grovel in the radix_node for
the key.
Add a RTM_GET method to rtrequest. Use that instead of
radix_node lookups in, e.g., carp(4).
Add sys/net/link_proto.c, which supplies sockaddr routines for
link-layer socket addresses (sockaddr_dl).
Cosmetic:
Constify. KNF. Stop open-coding LIST_FOREACH, TAILQ_FOREACH,
et cetera. Use NULL instead of 0 for null pointers. Use
__arraycount(). Reduce gratuitous parenthesization.
Stop using variadic arguments for rip6_output(), it is
unnecessary.
Remove the unnecessary rtentry member rt_genmask and the
code to maintain it, since nothing actually used it.
Make rt_maskedcopy() easier to read by using meaningful variable
names.
Extract a subroutine intern_netmask() for looking up a netmask in
the masks table.
Start converting backslash-ridden IPv6 macros in
sys/netinet6/in6_var.h into inline subroutines that one
can read without special eyeglasses.
One functional change: when the kernel serves an RTM_GET, RTM_LOCK,
or RTM_CHANGE request, it applies the netmask (if supplied) to a
destination before searching for it in the forwarding table.
I have changed sys/netinet/ip_carp.c, carp_setroute(), to remove
the unlawful radix_node knowledge.
Apart from the changes to carp(4), netiso, ATM, and strip(4), I
have run the changes on three nodes in my wireless routing testbed,
which involves IPv4 + IPv6 dynamic routing acrobatics, and it's
working beautifully so far.
2007-07-20 00:48:52 +04:00
|
|
|
|
* rt->rt_ifa against rt_getkey(rt). It was changed
|
2002-06-09 20:33:36 +04:00
|
|
|
|
* to the current form so that we can provide a
|
2001-07-04 06:29:58 +04:00
|
|
|
|
* better support for multiple IPv4 addresses on a
|
|
|
|
|
* interface.
|
1995-05-15 05:30:44 +04:00
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
rt->rt_expire = 0;
|
2009-08-13 02:16:15 +04:00
|
|
|
|
if (sockaddr_dl_init(satosdl(gate), gate->sa_len,
|
|
|
|
|
ifp->if_index, ifp->if_type, NULL, 0,
|
|
|
|
|
CLLADDR(ifp->if_sadl), ifp->if_addrlen) == NULL) {
|
|
|
|
|
panic("%s(%s): sockaddr_dl_init cannot fail",
|
|
|
|
|
__func__, ifp->if_xname);
|
|
|
|
|
}
|
2015-09-11 13:33:32 +03:00
|
|
|
|
if (useloopback) {
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
ifp = rt->rt_ifp = lo0ifp;
|
2015-09-11 13:33:32 +03:00
|
|
|
|
rt->rt_rmx.rmx_mtu = 0;
|
|
|
|
|
}
|
|
|
|
|
rt->rt_flags |= RTF_LOCAL;
|
2001-07-04 06:29:58 +04:00
|
|
|
|
/*
|
|
|
|
|
* make sure to set rt->rt_ifa to the interface
|
|
|
|
|
* address we are using, otherwise we will have trouble
|
|
|
|
|
* with source address selection.
|
|
|
|
|
*/
|
|
|
|
|
ifa = &ia->ia_ifa;
|
2006-11-13 08:13:38 +03:00
|
|
|
|
if (ifa != rt->rt_ifa)
|
|
|
|
|
rt_replace_ifa(rt, ifa);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
}
|
2015-10-07 03:33:27 +03:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Case 2: This route may come from cloning, or a manual route
|
|
|
|
|
* add with a LL address.
|
|
|
|
|
*/
|
|
|
|
|
flags = LLE_EXCLUSIVE;
|
2015-11-06 11:38:43 +03:00
|
|
|
|
if ((rt->rt_flags & RTF_CLONING) != 0)
|
2015-10-07 03:33:27 +03:00
|
|
|
|
flags |= LLE_IFADDR;
|
|
|
|
|
|
|
|
|
|
IF_AFDATA_WLOCK(ifp);
|
|
|
|
|
la = lla_create(LLTABLE(ifp), flags, rt_getkey(rt));
|
|
|
|
|
IF_AFDATA_WUNLOCK(ifp);
|
|
|
|
|
|
|
|
|
|
if (la == NULL) {
|
|
|
|
|
log(LOG_DEBUG, "%s: lla_create failed\n",
|
|
|
|
|
__func__);
|
|
|
|
|
rt->rt_llinfo = NULL;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
rt->rt_llinfo = la;
|
2015-10-20 10:46:59 +03:00
|
|
|
|
LLE_ADDREF(la);
|
2015-10-07 03:33:27 +03:00
|
|
|
|
la->la_rt = rt;
|
|
|
|
|
rt->rt_refcnt++;
|
|
|
|
|
rt->rt_flags |= RTF_LLINFO;
|
|
|
|
|
arp_inuse++, arp_allocated++;
|
2015-12-17 05:38:33 +03:00
|
|
|
|
arp_init_llentry(ifp, la);
|
2015-10-07 03:33:27 +03:00
|
|
|
|
|
|
|
|
|
LLE_WUNLOCK(la);
|
|
|
|
|
la = NULL;
|
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case RTM_DELETE:
|
2008-05-13 21:51:26 +04:00
|
|
|
|
if (la == NULL)
|
1994-05-13 10:02:48 +04:00
|
|
|
|
break;
|
|
|
|
|
arp_inuse--;
|
2008-05-13 21:51:26 +04:00
|
|
|
|
rt->rt_llinfo = NULL;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
rt->rt_flags &= ~RTF_LLINFO;
|
1999-08-05 08:04:28 +04:00
|
|
|
|
|
2015-10-20 10:46:59 +03:00
|
|
|
|
/* Have to do before IF_AFDATA_WLOCK to avoid deadlock */
|
|
|
|
|
callout_halt(&la->la_timer, &la->lle_lock);
|
|
|
|
|
/* XXX: LOR avoidance. We still have ref on lle. */
|
2015-08-31 11:05:20 +03:00
|
|
|
|
LLE_RUNLOCK(la);
|
|
|
|
|
|
|
|
|
|
flags |= LLE_EXCLUSIVE;
|
|
|
|
|
IF_AFDATA_WLOCK(ifp);
|
2015-10-20 10:46:59 +03:00
|
|
|
|
LLE_WLOCK(la);
|
2002-06-09 20:33:36 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if (la->la_rt != NULL) {
|
|
|
|
|
/*
|
|
|
|
|
* Don't rtfree (may actually free objects) here.
|
|
|
|
|
* Leave it to rtrequest1.
|
|
|
|
|
*/
|
|
|
|
|
la->la_rt->rt_refcnt--;
|
|
|
|
|
la->la_rt = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2015-10-20 10:46:59 +03:00
|
|
|
|
/* Guard against race with other llentry_free(). */
|
|
|
|
|
if (la->la_flags & LLE_LINKED) {
|
|
|
|
|
size_t pkts_dropped;
|
|
|
|
|
|
|
|
|
|
LLE_REMREF(la);
|
|
|
|
|
pkts_dropped = llentry_free(la);
|
|
|
|
|
ARP_STATADD(ARP_STAT_DFRDROPPED, pkts_dropped);
|
|
|
|
|
} else {
|
|
|
|
|
LLE_FREE_LOCKED(la);
|
|
|
|
|
}
|
2015-08-31 11:05:20 +03:00
|
|
|
|
la = NULL;
|
2015-10-20 10:46:59 +03:00
|
|
|
|
|
|
|
|
|
IF_AFDATA_WUNLOCK(ifp);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
}
|
1999-08-05 08:04:28 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if (la != NULL) {
|
|
|
|
|
if (flags & LLE_EXCLUSIVE)
|
|
|
|
|
LLE_WUNLOCK(la);
|
|
|
|
|
else
|
|
|
|
|
LLE_RUNLOCK(la);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
/*
|
|
|
|
|
* Broadcast an ARP request. Caller specifies:
|
|
|
|
|
* - arp header source ip address
|
|
|
|
|
* - arp header target ip address
|
|
|
|
|
* - arp header source ethernet address
|
|
|
|
|
*/
|
2006-05-18 13:05:49 +04:00
|
|
|
|
void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
arprequest(struct ifnet *ifp,
|
KNF: de-__P, bzero -> memset, bcmp -> memcmp. Remove extraneous
parentheses in return statements.
Cosmetic: don't open-code TAILQ_FOREACH().
Cosmetic: change types of variables to avoid oodles of casts: in
in6_src.c, avoid casts by changing several route_in6 pointers
to struct route pointers. Remove unnecessary casts to caddr_t
elsewhere.
Pave the way for eliminating address family-specific route caches:
soon, struct route will not embed a sockaddr, but it will hold
a reference to an external sockaddr, instead. We will set the
destination sockaddr using rtcache_setdst(). (I created a stub
for it, but it isn't used anywhere, yet.) rtcache_free() will
free the sockaddr. I have extracted from rtcache_free() a helper
subroutine, rtcache_clear(). rtcache_clear() will "forget" a
cached route, but it will not forget the destination by releasing
the sockaddr. I use rtcache_clear() instead of rtcache_free()
in rtcache_update(), because rtcache_update() is not supposed
to forget the destination.
Constify:
1 Introduce const accessor for route->ro_dst, rtcache_getdst().
2 Constify the 'dst' argument to ifnet->if_output(). This
led me to constify a lot of code called by output routines.
3 Constify the sockaddr argument to protosw->pr_ctlinput. This
led me to constify a lot of code called by ctlinput routines.
4 Introduce const macros for converting from a generic sockaddr
to family-specific sockaddrs, e.g., sockaddr_in: satocsin6,
satocsin, et cetera.
2007-02-18 01:34:07 +03:00
|
|
|
|
const struct in_addr *sip, const struct in_addr *tip,
|
|
|
|
|
const u_int8_t *enaddr)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
|
struct mbuf *m;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
struct arphdr *ah;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
struct sockaddr sa;
|
2008-04-15 19:17:54 +04:00
|
|
|
|
uint64_t *arps;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
KASSERT(sip != NULL);
|
|
|
|
|
KASSERT(tip != NULL);
|
|
|
|
|
KASSERT(enaddr != NULL);
|
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
|
if ((m = m_gethdr(M_DONTWAIT, MT_DATA)) == NULL)
|
|
|
|
|
return;
|
2003-02-26 09:31:08 +03:00
|
|
|
|
MCLAIM(m, &arpdomain.dom_mowner);
|
2002-06-24 12:06:20 +04:00
|
|
|
|
switch (ifp->if_type) {
|
|
|
|
|
case IFT_IEEE1394:
|
|
|
|
|
m->m_len = sizeof(*ah) + 2 * sizeof(struct in_addr) +
|
2002-06-25 06:53:27 +04:00
|
|
|
|
ifp->if_addrlen;
|
2002-06-24 12:06:20 +04:00
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
m->m_len = sizeof(*ah) + 2 * sizeof(struct in_addr) +
|
2002-06-25 06:53:27 +04:00
|
|
|
|
2 * ifp->if_addrlen;
|
2002-06-24 12:06:20 +04:00
|
|
|
|
break;
|
|
|
|
|
}
|
1997-03-15 21:09:08 +03:00
|
|
|
|
m->m_pkthdr.len = m->m_len;
|
|
|
|
|
MH_ALIGN(m, m->m_len);
|
|
|
|
|
ah = mtod(m, struct arphdr *);
|
2008-05-13 22:24:01 +04:00
|
|
|
|
memset(ah, 0, m->m_len);
|
2002-06-24 12:06:20 +04:00
|
|
|
|
switch (ifp->if_type) {
|
2002-06-24 12:42:33 +04:00
|
|
|
|
case IFT_IEEE1394: /* RFC2734 */
|
2002-06-25 08:04:53 +04:00
|
|
|
|
/* fill it now for ar_tpa computation */
|
2002-06-24 12:06:20 +04:00
|
|
|
|
ah->ar_hrd = htons(ARPHRD_IEEE1394);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
2002-06-25 08:04:53 +04:00
|
|
|
|
/* ifp->if_output will fill ar_hrd */
|
2002-06-24 12:06:20 +04:00
|
|
|
|
break;
|
|
|
|
|
}
|
1997-03-15 21:09:08 +03:00
|
|
|
|
ah->ar_pro = htons(ETHERTYPE_IP);
|
2002-06-25 06:53:27 +04:00
|
|
|
|
ah->ar_hln = ifp->if_addrlen; /* hardware address length */
|
1997-03-15 21:09:08 +03:00
|
|
|
|
ah->ar_pln = sizeof(struct in_addr); /* protocol address length */
|
|
|
|
|
ah->ar_op = htons(ARPOP_REQUEST);
|
2007-02-17 08:31:15 +03:00
|
|
|
|
memcpy(ar_sha(ah), enaddr, ah->ar_hln);
|
|
|
|
|
memcpy(ar_spa(ah), sip, ah->ar_pln);
|
|
|
|
|
memcpy(ar_tpa(ah), tip, ah->ar_pln);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
sa.sa_family = AF_ARP;
|
|
|
|
|
sa.sa_len = 2;
|
|
|
|
|
m->m_flags |= M_BCAST;
|
2008-04-15 19:17:54 +04:00
|
|
|
|
arps = ARP_STAT_GETREF();
|
|
|
|
|
arps[ARP_STAT_SNDTOTAL]++;
|
|
|
|
|
arps[ARP_STAT_SENDREQUEST]++;
|
|
|
|
|
ARP_STAT_PUTREF();
|
2007-02-17 08:31:15 +03:00
|
|
|
|
(*ifp->if_output)(ifp, m, &sa, NULL);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
1994-01-09 00:21:28 +03:00
|
|
|
|
* Resolve an IP address into an ethernet address. If success,
|
1993-03-21 12:45:37 +03:00
|
|
|
|
* desten is filled in. If there is no entry in arptab,
|
|
|
|
|
* set one up and broadcast a request for the IP address.
|
|
|
|
|
* Hold onto this mbuf and resend it once the address
|
2015-10-13 15:33:07 +03:00
|
|
|
|
* is finally resolved. A return value of 0 indicates
|
1993-03-21 12:45:37 +03:00
|
|
|
|
* that desten has been filled in and the packet should be sent
|
2015-10-13 15:33:07 +03:00
|
|
|
|
* normally; a return value of EWOULDBLOCK indicates that the packet has been
|
|
|
|
|
* held pending resolution.
|
|
|
|
|
* Any other value indicates an error.
|
1993-03-21 12:45:37 +03:00
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
int
|
2005-02-03 00:41:01 +03:00
|
|
|
|
arpresolve(struct ifnet *ifp, struct rtentry *rt, struct mbuf *m,
|
KNF: de-__P, bzero -> memset, bcmp -> memcmp. Remove extraneous
parentheses in return statements.
Cosmetic: don't open-code TAILQ_FOREACH().
Cosmetic: change types of variables to avoid oodles of casts: in
in6_src.c, avoid casts by changing several route_in6 pointers
to struct route pointers. Remove unnecessary casts to caddr_t
elsewhere.
Pave the way for eliminating address family-specific route caches:
soon, struct route will not embed a sockaddr, but it will hold
a reference to an external sockaddr, instead. We will set the
destination sockaddr using rtcache_setdst(). (I created a stub
for it, but it isn't used anywhere, yet.) rtcache_free() will
free the sockaddr. I have extracted from rtcache_free() a helper
subroutine, rtcache_clear(). rtcache_clear() will "forget" a
cached route, but it will not forget the destination by releasing
the sockaddr. I use rtcache_clear() instead of rtcache_free()
in rtcache_update(), because rtcache_update() is not supposed
to forget the destination.
Constify:
1 Introduce const accessor for route->ro_dst, rtcache_getdst().
2 Constify the 'dst' argument to ifnet->if_output(). This
led me to constify a lot of code called by output routines.
3 Constify the sockaddr argument to protosw->pr_ctlinput. This
led me to constify a lot of code called by ctlinput routines.
4 Introduce const macros for converting from a generic sockaddr
to family-specific sockaddrs, e.g., sockaddr_in: satocsin6,
satocsin, et cetera.
2007-02-18 01:34:07 +03:00
|
|
|
|
const struct sockaddr *dst, u_char *desten)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
2015-08-31 11:05:20 +03:00
|
|
|
|
struct llentry *la;
|
2007-08-27 05:13:09 +04:00
|
|
|
|
const struct sockaddr_dl *sdl;
|
2015-10-13 12:33:35 +03:00
|
|
|
|
const char *create_lookup;
|
|
|
|
|
bool renew;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
int error;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
|
2015-09-07 04:18:27 +03:00
|
|
|
|
KASSERT(m != NULL);
|
|
|
|
|
|
2015-10-13 12:33:35 +03:00
|
|
|
|
la = arplookup(ifp, m, &satocsin(dst)->sin_addr, 0, 0, 0, rt);
|
|
|
|
|
if (la == NULL || la->la_rt == NULL)
|
|
|
|
|
goto notfound;
|
2007-08-27 05:13:09 +04:00
|
|
|
|
|
2015-10-13 12:33:35 +03:00
|
|
|
|
rt = la->la_rt;
|
2007-08-27 05:13:09 +04:00
|
|
|
|
sdl = satocsdl(rt->rt_gateway);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
/*
|
|
|
|
|
* Check the address family and length is valid, the address
|
|
|
|
|
* is resolved; otherwise, try to resolve.
|
|
|
|
|
*/
|
2015-08-07 11:11:33 +03:00
|
|
|
|
if ((rt->rt_expire == 0 || rt->rt_expire > time_uptime) &&
|
1994-05-13 10:02:48 +04:00
|
|
|
|
sdl->sdl_family == AF_LINK && sdl->sdl_alen != 0) {
|
2008-05-13 22:24:01 +04:00
|
|
|
|
memcpy(desten, CLLADDR(sdl),
|
2002-06-25 06:53:27 +04:00
|
|
|
|
min(sdl->sdl_alen, ifp->if_addrlen));
|
2015-08-07 11:11:33 +03:00
|
|
|
|
rt->rt_pksent = time_uptime; /* Time for last pkt sent */
|
2015-08-31 11:05:20 +03:00
|
|
|
|
LLE_RUNLOCK(la);
|
2015-10-13 15:33:07 +03:00
|
|
|
|
return 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
2002-06-09 20:33:36 +04:00
|
|
|
|
|
1994-06-03 06:54:26 +04:00
|
|
|
|
/*
|
|
|
|
|
* Re-send the ARP request when appropriate.
|
|
|
|
|
*/
|
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
|
if (rt->rt_expire == 0) {
|
1994-06-04 07:15:09 +04:00
|
|
|
|
/* This should never happen. (Should it? -gwr) */
|
1996-10-13 06:03:00 +04:00
|
|
|
|
printf("arpresolve: unresolved and rt_expire == 0\n");
|
1994-06-03 06:54:26 +04:00
|
|
|
|
/* Set expiration time to now (expired). */
|
2015-08-07 11:11:33 +03:00
|
|
|
|
rt->rt_expire = time_uptime;
|
1994-06-03 06:54:26 +04:00
|
|
|
|
}
|
|
|
|
|
#endif
|
2015-08-31 11:05:20 +03:00
|
|
|
|
|
2015-10-13 12:33:35 +03:00
|
|
|
|
notfound:
|
2015-10-08 11:17:37 +03:00
|
|
|
|
#ifdef IFF_STATICARP /* FreeBSD */
|
|
|
|
|
#define _IFF_NOARP (IFF_NOARP | IFF_STATICARP)
|
2015-08-31 11:05:20 +03:00
|
|
|
|
#else
|
2015-10-08 11:17:37 +03:00
|
|
|
|
#define _IFF_NOARP IFF_NOARP
|
2015-08-31 11:05:20 +03:00
|
|
|
|
#endif
|
2015-10-13 14:13:37 +03:00
|
|
|
|
if (ifp->if_flags & _IFF_NOARP) {
|
|
|
|
|
if (la != NULL)
|
|
|
|
|
LLE_RUNLOCK(la);
|
2015-10-14 14:22:55 +03:00
|
|
|
|
error = ENOTSUP;
|
|
|
|
|
goto bad;
|
2015-10-13 14:13:37 +03:00
|
|
|
|
}
|
2015-10-13 12:33:35 +03:00
|
|
|
|
#undef _IFF_NOARP
|
2015-10-13 14:13:37 +03:00
|
|
|
|
if (la == NULL) {
|
2015-10-13 12:33:35 +03:00
|
|
|
|
create_lookup = "create";
|
2015-08-31 11:05:20 +03:00
|
|
|
|
IF_AFDATA_WLOCK(ifp);
|
2015-10-13 12:33:35 +03:00
|
|
|
|
la = lla_create(LLTABLE(ifp), LLE_EXCLUSIVE, dst);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
IF_AFDATA_WUNLOCK(ifp);
|
2015-10-13 12:33:35 +03:00
|
|
|
|
if (la == NULL)
|
|
|
|
|
ARP_STATINC(ARP_STAT_ALLOCFAIL);
|
|
|
|
|
} else if (LLE_TRY_UPGRADE(la) == 0) {
|
|
|
|
|
create_lookup = "lookup";
|
|
|
|
|
LLE_RUNLOCK(la);
|
|
|
|
|
IF_AFDATA_RLOCK(ifp);
|
|
|
|
|
la = lla_lookup(LLTABLE(ifp), LLE_EXCLUSIVE, dst);
|
|
|
|
|
IF_AFDATA_RUNLOCK(ifp);
|
2015-09-07 04:17:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
2015-10-14 14:22:55 +03:00
|
|
|
|
error = EINVAL;
|
2015-09-07 04:17:37 +03:00
|
|
|
|
if (la == NULL) {
|
2015-10-13 12:33:35 +03:00
|
|
|
|
log(LOG_DEBUG,
|
|
|
|
|
"%s: failed to %s llentry for %s on %s\n",
|
|
|
|
|
__func__, create_lookup, inet_ntoa(satocsin(dst)->sin_addr),
|
|
|
|
|
ifp->if_xname);
|
2015-10-14 14:22:55 +03:00
|
|
|
|
goto bad;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
}
|
|
|
|
|
|
2015-10-13 12:33:35 +03:00
|
|
|
|
/* Just in case */
|
|
|
|
|
if (la->la_rt == NULL) {
|
2015-10-13 15:33:07 +03:00
|
|
|
|
LLE_WUNLOCK(la);
|
2015-10-13 12:33:35 +03:00
|
|
|
|
log(LOG_DEBUG,
|
|
|
|
|
"%s: valid llentry has no rtentry for %s on %s\n",
|
|
|
|
|
__func__, inet_ntoa(satocsin(dst)->sin_addr),
|
|
|
|
|
ifp->if_xname);
|
2015-10-14 14:22:55 +03:00
|
|
|
|
goto bad;
|
2015-10-13 12:33:35 +03:00
|
|
|
|
}
|
|
|
|
|
rt = la->la_rt;
|
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if ((la->la_flags & LLE_VALID) &&
|
2015-10-13 12:33:35 +03:00
|
|
|
|
((la->la_flags & LLE_STATIC) || la->la_expire > time_uptime))
|
|
|
|
|
{
|
|
|
|
|
sdl = satocsdl(rt->rt_gateway);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
memcpy(desten, CLLADDR(sdl),
|
|
|
|
|
min(sdl->sdl_alen, ifp->if_addrlen));
|
2015-10-13 12:33:35 +03:00
|
|
|
|
renew = false;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
/*
|
|
|
|
|
* If entry has an expiry time and it is approaching,
|
|
|
|
|
* see if we need to send an ARP request within this
|
|
|
|
|
* arpt_down interval.
|
|
|
|
|
*/
|
|
|
|
|
if (!(la->la_flags & LLE_STATIC) &&
|
2015-10-13 12:33:35 +03:00
|
|
|
|
time_uptime + la->la_preempt > la->la_expire)
|
|
|
|
|
{
|
|
|
|
|
renew = true;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
la->la_preempt--;
|
|
|
|
|
}
|
|
|
|
|
|
2015-10-13 12:33:35 +03:00
|
|
|
|
LLE_WUNLOCK(la);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
|
2015-10-13 12:33:35 +03:00
|
|
|
|
if (renew) {
|
2015-08-31 11:05:20 +03:00
|
|
|
|
const u_int8_t *enaddr =
|
2006-05-18 13:05:49 +04:00
|
|
|
|
#if NCARP > 0
|
2015-08-31 11:05:20 +03:00
|
|
|
|
(rt->rt_ifp->if_type == IFT_CARP) ?
|
|
|
|
|
CLLADDR(rt->rt_ifp->if_sadl):
|
2006-05-18 13:05:49 +04:00
|
|
|
|
#endif
|
2015-08-31 11:05:20 +03:00
|
|
|
|
CLLADDR(ifp->if_sadl);
|
2015-10-13 12:33:35 +03:00
|
|
|
|
arprequest(ifp,
|
|
|
|
|
&satocsin(rt->rt_ifa->ifa_addr)->sin_addr,
|
2015-08-31 11:05:20 +03:00
|
|
|
|
&satocsin(dst)->sin_addr, enaddr);
|
|
|
|
|
}
|
|
|
|
|
|
2015-10-13 15:33:07 +03:00
|
|
|
|
return 0;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (la->la_flags & LLE_STATIC) { /* should not happen! */
|
2015-10-14 14:22:55 +03:00
|
|
|
|
LLE_RUNLOCK(la);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
log(LOG_DEBUG, "arpresolve: ouch, empty static llinfo for %s\n",
|
|
|
|
|
inet_ntoa(satocsin(dst)->sin_addr));
|
|
|
|
|
error = EINVAL;
|
2015-10-14 14:22:55 +03:00
|
|
|
|
goto bad;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
renew = (la->la_asked == 0 || la->la_expire != time_uptime);
|
2015-09-07 04:18:27 +03:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
/*
|
|
|
|
|
* There is an arptab entry, but no ethernet address
|
|
|
|
|
* response yet. Add the mbuf to the list, dropping
|
|
|
|
|
* the oldest packet if we have exceeded the system
|
|
|
|
|
* setting.
|
|
|
|
|
*/
|
2015-09-07 04:18:27 +03:00
|
|
|
|
LLE_WLOCK_ASSERT(la);
|
|
|
|
|
if (la->la_numheld >= arp_maxhold) {
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if (la->la_hold != NULL) {
|
2015-09-07 04:18:27 +03:00
|
|
|
|
struct mbuf *next = la->la_hold->m_nextpkt;
|
|
|
|
|
m_freem(la->la_hold);
|
|
|
|
|
la->la_hold = next;
|
|
|
|
|
la->la_numheld--;
|
|
|
|
|
ARP_STATINC(ARP_STAT_DFRDROPPED);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
|
}
|
2015-09-07 04:18:27 +03:00
|
|
|
|
if (la->la_hold != NULL) {
|
|
|
|
|
struct mbuf *curr = la->la_hold;
|
|
|
|
|
while (curr->m_nextpkt != NULL)
|
|
|
|
|
curr = curr->m_nextpkt;
|
|
|
|
|
curr->m_nextpkt = m;
|
|
|
|
|
} else
|
|
|
|
|
la->la_hold = m;
|
|
|
|
|
la->la_numheld++;
|
2015-10-13 12:33:35 +03:00
|
|
|
|
if (!renew)
|
2015-09-07 04:18:27 +03:00
|
|
|
|
LLE_DOWNGRADE(la);
|
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
/*
|
|
|
|
|
* Return EWOULDBLOCK if we have tried less than arp_maxtries. It
|
|
|
|
|
* will be masked by ether_output(). Return EHOSTDOWN/EHOSTUNREACH
|
|
|
|
|
* if we have already sent arp_maxtries ARP requests. Retransmit the
|
|
|
|
|
* ARP request, but not faster than one request per second.
|
|
|
|
|
*/
|
|
|
|
|
if (la->la_asked < arp_maxtries)
|
|
|
|
|
error = EWOULDBLOCK; /* First request. */
|
|
|
|
|
else
|
|
|
|
|
error = (rt->rt_flags & RTF_GATEWAY) ?
|
|
|
|
|
EHOSTUNREACH : EHOSTDOWN;
|
|
|
|
|
|
|
|
|
|
if (renew) {
|
|
|
|
|
const u_int8_t *enaddr =
|
|
|
|
|
#if NCARP > 0
|
|
|
|
|
(rt->rt_ifp->if_type == IFT_CARP) ?
|
|
|
|
|
CLLADDR(rt->rt_ifp->if_sadl):
|
|
|
|
|
#endif
|
|
|
|
|
CLLADDR(ifp->if_sadl);
|
|
|
|
|
la->la_expire = time_uptime;
|
2015-12-11 04:15:00 +03:00
|
|
|
|
arp_settimer(la, arpt_down);
|
2015-08-31 11:05:20 +03:00
|
|
|
|
la->la_asked++;
|
2015-10-13 12:33:35 +03:00
|
|
|
|
LLE_WUNLOCK(la);
|
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
arprequest(ifp, &satocsin(rt->rt_ifa->ifa_addr)->sin_addr,
|
|
|
|
|
&satocsin(dst)->sin_addr, enaddr);
|
2015-10-13 15:33:07 +03:00
|
|
|
|
return error;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
}
|
2015-10-14 14:22:55 +03:00
|
|
|
|
|
2015-10-13 12:33:35 +03:00
|
|
|
|
LLE_RUNLOCK(la);
|
2015-10-14 14:22:55 +03:00
|
|
|
|
return error;
|
2015-10-13 12:33:35 +03:00
|
|
|
|
|
2015-10-14 14:22:55 +03:00
|
|
|
|
bad:
|
|
|
|
|
m_freem(m);
|
|
|
|
|
if (rt != NULL && (rt->rt_flags & RTF_CLONED) != 0) {
|
|
|
|
|
rtrequest(RTM_DELETE, rt_getkey(rt),
|
|
|
|
|
rt->rt_gateway, rt_mask(rt), rt->rt_flags, NULL);
|
|
|
|
|
}
|
2015-10-13 15:33:07 +03:00
|
|
|
|
return error;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
|
* Common length and type checks are done here,
|
1993-03-21 12:45:37 +03:00
|
|
|
|
* then the protocol-specific routine is called.
|
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
arpintr(void)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
|
struct mbuf *m;
|
|
|
|
|
struct arphdr *ar;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
int s;
|
2002-06-24 12:06:20 +04:00
|
|
|
|
int arplen;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
|
mutex_enter(softnet_lock);
|
|
|
|
|
KERNEL_LOCK(1, NULL);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
while (arpintrq.ifq_head) {
|
2001-04-14 03:29:55 +04:00
|
|
|
|
s = splnet();
|
1994-05-13 10:02:48 +04:00
|
|
|
|
IF_DEQUEUE(&arpintrq, m);
|
|
|
|
|
splx(s);
|
2015-05-21 12:27:10 +03:00
|
|
|
|
if (m == NULL || (m->m_flags & M_PKTHDR) == 0)
|
1994-05-13 10:02:48 +04:00
|
|
|
|
panic("arpintr");
|
1997-03-23 04:22:35 +03:00
|
|
|
|
|
2003-02-26 09:31:08 +03:00
|
|
|
|
MCLAIM(m, &arpdomain.dom_mowner);
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVTOTAL);
|
2000-08-16 00:24:57 +04:00
|
|
|
|
|
2002-06-24 14:52:15 +04:00
|
|
|
|
/*
|
|
|
|
|
* First, make sure we have at least struct arphdr.
|
|
|
|
|
*/
|
|
|
|
|
if (m->m_len < sizeof(struct arphdr) ||
|
|
|
|
|
(ar = mtod(m, struct arphdr *)) == NULL)
|
|
|
|
|
goto badlen;
|
|
|
|
|
|
2002-06-24 12:06:20 +04:00
|
|
|
|
switch (m->m_pkthdr.rcvif->if_type) {
|
|
|
|
|
case IFT_IEEE1394:
|
|
|
|
|
arplen = sizeof(struct arphdr) +
|
|
|
|
|
ar->ar_hln + 2 * ar->ar_pln;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
arplen = sizeof(struct arphdr) +
|
|
|
|
|
2 * ar->ar_hln + 2 * ar->ar_pln;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-24 14:52:15 +04:00
|
|
|
|
if (/* XXX ntohs(ar->ar_hrd) == ARPHRD_ETHER && */
|
2002-06-24 12:06:20 +04:00
|
|
|
|
m->m_len >= arplen)
|
1994-05-13 10:02:48 +04:00
|
|
|
|
switch (ntohs(ar->ar_pro)) {
|
|
|
|
|
case ETHERTYPE_IP:
|
|
|
|
|
case ETHERTYPE_IPTRAILERS:
|
|
|
|
|
in_arpinput(m);
|
|
|
|
|
continue;
|
2000-08-16 00:24:57 +04:00
|
|
|
|
default:
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVBADPROTO);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
}
|
2002-06-24 14:52:15 +04:00
|
|
|
|
else {
|
|
|
|
|
badlen:
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVBADLEN);
|
2002-06-24 14:52:15 +04:00
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
|
m_freem(m);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
|
KERNEL_UNLOCK_ONE(NULL);
|
|
|
|
|
mutex_exit(softnet_lock);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* ARP for Internet protocols on 10 Mb/s Ethernet.
|
|
|
|
|
* Algorithm is that given in RFC 826.
|
|
|
|
|
* In addition, a sanity check is performed on the sender
|
|
|
|
|
* protocol address, to catch impersonators.
|
1994-05-13 10:02:48 +04:00
|
|
|
|
* We no longer handle negotiations for use of trailer protocol:
|
|
|
|
|
* Formerly, ARP replied for protocol type ETHERTYPE_TRAIL sent
|
|
|
|
|
* along with IP replies if we wanted trailers sent to us,
|
|
|
|
|
* and also sent them in response to IP replies.
|
|
|
|
|
* This allowed either end to announce the desire to receive
|
1993-03-21 12:45:37 +03:00
|
|
|
|
* trailer packets.
|
1994-05-13 10:02:48 +04:00
|
|
|
|
* We no longer reply to requests for ETHERTYPE_TRAIL protocol either,
|
|
|
|
|
* but formerly didn't normally send requests.
|
1993-03-21 12:45:37 +03:00
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
static void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
in_arpinput(struct mbuf *m)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
1997-03-15 21:09:08 +03:00
|
|
|
|
struct arphdr *ah;
|
2000-03-30 16:51:13 +04:00
|
|
|
|
struct ifnet *ifp = m->m_pkthdr.rcvif;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
struct llentry *la = NULL;
|
|
|
|
|
struct rtentry *rt = NULL;
|
1998-02-13 21:21:38 +03:00
|
|
|
|
struct in_ifaddr *ia;
|
2001-08-18 01:47:57 +04:00
|
|
|
|
#if NBRIDGE > 0
|
|
|
|
|
struct in_ifaddr *bridge_ia = NULL;
|
2006-05-18 13:05:49 +04:00
|
|
|
|
#endif
|
|
|
|
|
#if NCARP > 0
|
|
|
|
|
u_int32_t count = 0, index = 0;
|
2001-08-18 01:47:57 +04:00
|
|
|
|
#endif
|
2015-08-31 11:05:20 +03:00
|
|
|
|
struct sockaddr_dl *sdl = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
struct sockaddr sa;
|
|
|
|
|
struct in_addr isaddr, itaddr, myaddr;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
int op;
|
2007-03-04 08:59:00 +03:00
|
|
|
|
void *tha;
|
2008-04-15 19:17:54 +04:00
|
|
|
|
uint64_t *arps;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
|
2006-05-26 01:33:12 +04:00
|
|
|
|
if (__predict_false(m_makewritable(&m, 0, m->m_pkthdr.len, M_DONTWAIT)))
|
|
|
|
|
goto out;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
ah = mtod(m, struct arphdr *);
|
|
|
|
|
op = ntohs(ah->ar_op);
|
1997-08-29 20:02:41 +04:00
|
|
|
|
|
2002-06-25 08:16:31 +04:00
|
|
|
|
/*
|
|
|
|
|
* Fix up ah->ar_hrd if necessary, before using ar_tha() or
|
|
|
|
|
* ar_tpa().
|
|
|
|
|
*/
|
|
|
|
|
switch (ifp->if_type) {
|
2002-06-24 12:06:20 +04:00
|
|
|
|
case IFT_IEEE1394:
|
|
|
|
|
if (ntohs(ah->ar_hrd) == ARPHRD_IEEE1394)
|
|
|
|
|
;
|
|
|
|
|
else {
|
|
|
|
|
/* XXX this is to make sure we compute ar_tha right */
|
|
|
|
|
/* XXX check ar_hrd more strictly? */
|
|
|
|
|
ah->ar_hrd = htons(ARPHRD_IEEE1394);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
/* XXX check ar_hrd? */
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2007-03-04 08:59:00 +03:00
|
|
|
|
memcpy(&isaddr, ar_spa(ah), sizeof (isaddr));
|
|
|
|
|
memcpy(&itaddr, ar_tpa(ah), sizeof (itaddr));
|
2002-06-25 08:16:31 +04:00
|
|
|
|
|
2000-08-16 00:24:57 +04:00
|
|
|
|
if (m->m_flags & (M_BCAST|M_MCAST))
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVMCAST);
|
2000-08-16 00:24:57 +04:00
|
|
|
|
|
1997-08-29 20:02:41 +04:00
|
|
|
|
|
1998-02-13 21:21:38 +03:00
|
|
|
|
/*
|
|
|
|
|
* Search for a matching interface address
|
|
|
|
|
* or any address on the interface to use
|
|
|
|
|
* as a dummy address in the rest of this function
|
|
|
|
|
*/
|
2006-05-18 13:05:49 +04:00
|
|
|
|
|
1998-02-13 21:21:38 +03:00
|
|
|
|
INADDR_TO_IA(itaddr, ia);
|
2001-08-18 01:47:57 +04:00
|
|
|
|
while (ia != NULL) {
|
2006-05-18 13:05:49 +04:00
|
|
|
|
#if NCARP > 0
|
|
|
|
|
if (ia->ia_ifp->if_type == IFT_CARP &&
|
|
|
|
|
((ia->ia_ifp->if_flags & (IFF_UP|IFF_RUNNING)) ==
|
|
|
|
|
(IFF_UP|IFF_RUNNING))) {
|
|
|
|
|
index++;
|
|
|
|
|
if (ia->ia_ifp == m->m_pkthdr.rcvif &&
|
|
|
|
|
carp_iamatch(ia, ar_sha(ah),
|
|
|
|
|
&count, index)) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
} else
|
|
|
|
|
#endif
|
|
|
|
|
if (ia->ia_ifp == m->m_pkthdr.rcvif)
|
|
|
|
|
break;
|
2001-08-18 01:47:57 +04:00
|
|
|
|
#if NBRIDGE > 0
|
|
|
|
|
/*
|
|
|
|
|
* If the interface we received the packet on
|
|
|
|
|
* is part of a bridge, check to see if we need
|
|
|
|
|
* to "bridge" the packet to ourselves at this
|
|
|
|
|
* layer. Note we still prefer a perfect match,
|
|
|
|
|
* but allow this weaker match if necessary.
|
|
|
|
|
*/
|
|
|
|
|
if (m->m_pkthdr.rcvif->if_bridge != NULL &&
|
|
|
|
|
m->m_pkthdr.rcvif->if_bridge == ia->ia_ifp->if_bridge)
|
|
|
|
|
bridge_ia = ia;
|
|
|
|
|
#endif /* NBRIDGE > 0 */
|
|
|
|
|
|
1998-07-02 18:00:39 +04:00
|
|
|
|
NEXT_IA_WITH_SAME_ADDR(ia);
|
2001-08-18 01:47:57 +04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#if NBRIDGE > 0
|
2001-08-20 07:13:45 +04:00
|
|
|
|
if (ia == NULL && bridge_ia != NULL) {
|
2001-08-18 01:47:57 +04:00
|
|
|
|
ia = bridge_ia;
|
2001-08-20 07:13:45 +04:00
|
|
|
|
ifp = bridge_ia->ia_ifp;
|
|
|
|
|
}
|
2001-08-18 01:47:57 +04:00
|
|
|
|
#endif
|
1998-07-02 18:00:39 +04:00
|
|
|
|
|
1998-02-13 21:21:38 +03:00
|
|
|
|
if (ia == NULL) {
|
|
|
|
|
INADDR_TO_IA(isaddr, ia);
|
1998-07-02 18:00:39 +04:00
|
|
|
|
while ((ia != NULL) && ia->ia_ifp != m->m_pkthdr.rcvif)
|
|
|
|
|
NEXT_IA_WITH_SAME_ADDR(ia);
|
|
|
|
|
|
|
|
|
|
if (ia == NULL) {
|
1998-07-02 15:39:56 +04:00
|
|
|
|
IFP_TO_IA(ifp, ia);
|
2000-08-16 00:24:57 +04:00
|
|
|
|
if (ia == NULL) {
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVNOINT);
|
1998-07-02 18:00:39 +04:00
|
|
|
|
goto out;
|
2000-08-16 00:24:57 +04:00
|
|
|
|
}
|
1998-07-02 18:00:39 +04:00
|
|
|
|
}
|
1998-02-13 21:21:38 +03:00
|
|
|
|
}
|
1998-07-02 15:39:56 +04:00
|
|
|
|
|
1998-02-13 21:21:38 +03:00
|
|
|
|
myaddr = ia->ia_addr.sin_addr;
|
1997-03-23 04:22:35 +03:00
|
|
|
|
|
2001-08-20 07:13:45 +04:00
|
|
|
|
/* XXX checks for bridge case? */
|
2007-08-27 05:13:09 +04:00
|
|
|
|
if (!memcmp(ar_sha(ah), CLLADDR(ifp->if_sadl), ifp->if_addrlen)) {
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVLOCALSHA);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
goto out; /* it's from me, ignore it. */
|
2000-08-16 00:24:57 +04:00
|
|
|
|
}
|
1997-10-02 23:41:56 +04:00
|
|
|
|
|
2001-08-20 07:13:45 +04:00
|
|
|
|
/* XXX checks for bridge case? */
|
2005-05-30 01:39:21 +04:00
|
|
|
|
if (!memcmp(ar_sha(ah), ifp->if_broadcastaddr, ifp->if_addrlen)) {
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVBCASTSHA);
|
1997-10-02 23:41:56 +04:00
|
|
|
|
log(LOG_ERR,
|
1998-05-29 19:34:24 +04:00
|
|
|
|
"%s: arp: link address is broadcast for IP address %s!\n",
|
|
|
|
|
ifp->if_xname, in_fmtaddr(isaddr));
|
1997-10-02 23:41:56 +04:00
|
|
|
|
goto out;
|
|
|
|
|
}
|
|
|
|
|
|
2009-11-03 03:57:42 +03:00
|
|
|
|
/*
|
|
|
|
|
* If the source IP address is zero, this is an RFC 5227 ARP probe
|
|
|
|
|
*/
|
2015-05-02 17:41:32 +03:00
|
|
|
|
if (in_nullhost(isaddr))
|
2009-11-03 03:57:42 +03:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVZEROSPA);
|
2015-05-02 17:41:32 +03:00
|
|
|
|
else if (in_hosteq(isaddr, myaddr))
|
|
|
|
|
ARP_STATINC(ARP_STAT_RCVLOCALSPA);
|
|
|
|
|
|
|
|
|
|
if (in_nullhost(itaddr))
|
|
|
|
|
ARP_STATINC(ARP_STAT_RCVZEROTPA);
|
|
|
|
|
|
|
|
|
|
/* DAD check, RFC 5227 2.1.1, Probe Details */
|
|
|
|
|
if (in_hosteq(isaddr, myaddr) ||
|
|
|
|
|
(in_nullhost(isaddr) && in_hosteq(itaddr, myaddr)))
|
|
|
|
|
{
|
|
|
|
|
/* If our address is tentative, mark it as duplicated */
|
|
|
|
|
if (ia->ia4_flags & IN_IFF_TENTATIVE)
|
|
|
|
|
arp_dad_duplicated((struct ifaddr *)ia);
|
|
|
|
|
/* If our address is unuseable, don't reply */
|
|
|
|
|
if (ia->ia4_flags & (IN_IFF_NOTREADY | IN_IFF_DETACHED))
|
|
|
|
|
goto out;
|
2009-11-03 03:57:42 +03:00
|
|
|
|
}
|
|
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
|
/*
|
|
|
|
|
* If the target IP address is zero, ignore the packet.
|
|
|
|
|
* This prevents the code below from tring to answer
|
|
|
|
|
* when we are using IP address zero (booting).
|
|
|
|
|
*/
|
|
|
|
|
if (in_nullhost(itaddr))
|
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
|
|
if (in_nullhost(isaddr))
|
|
|
|
|
goto reply;
|
|
|
|
|
|
1997-03-15 21:09:08 +03:00
|
|
|
|
if (in_hosteq(isaddr, myaddr)) {
|
1993-03-21 12:45:37 +03:00
|
|
|
|
log(LOG_ERR,
|
1998-05-29 19:34:24 +04:00
|
|
|
|
"duplicate IP address %s sent from link address %s\n",
|
|
|
|
|
in_fmtaddr(isaddr), lla_snprintf(ar_sha(ah), ah->ar_hln));
|
1993-03-21 12:45:37 +03:00
|
|
|
|
itaddr = myaddr;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
goto reply;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
2015-08-31 11:05:20 +03:00
|
|
|
|
|
|
|
|
|
la = arplookup(ifp, m, &isaddr, in_hosteq(itaddr, myaddr), 0, 1, NULL);
|
|
|
|
|
if (la != NULL) {
|
|
|
|
|
rt = la->la_rt;
|
|
|
|
|
if (rt != NULL)
|
|
|
|
|
sdl = satosdl(rt->rt_gateway);
|
|
|
|
|
}
|
2015-11-30 09:45:38 +03:00
|
|
|
|
if (sdl == NULL)
|
|
|
|
|
goto reply;
|
|
|
|
|
|
|
|
|
|
if (sdl->sdl_alen && memcmp(ar_sha(ah), CLLADDR(sdl), sdl->sdl_alen)) {
|
|
|
|
|
if (rt->rt_flags & RTF_STATIC) {
|
|
|
|
|
ARP_STATINC(ARP_STAT_RCVOVERPERM);
|
|
|
|
|
if (!log_permanent_modify)
|
1999-05-05 00:50:35 +04:00
|
|
|
|
goto out;
|
2015-11-30 09:45:38 +03:00
|
|
|
|
log(LOG_INFO,
|
|
|
|
|
"%s tried to overwrite permanent arp info"
|
|
|
|
|
" for %s\n",
|
|
|
|
|
lla_snprintf(ar_sha(ah), ah->ar_hln),
|
|
|
|
|
in_fmtaddr(isaddr));
|
|
|
|
|
goto out;
|
|
|
|
|
} else if (rt->rt_ifp != ifp) {
|
|
|
|
|
ARP_STATINC(ARP_STAT_RCVOVERINT);
|
|
|
|
|
if (!log_wrong_iface)
|
|
|
|
|
goto out;
|
|
|
|
|
log(LOG_INFO,
|
|
|
|
|
"%s on %s tried to overwrite "
|
|
|
|
|
"arp info for %s on %s\n",
|
|
|
|
|
lla_snprintf(ar_sha(ah), ah->ar_hln),
|
|
|
|
|
ifp->if_xname, in_fmtaddr(isaddr),
|
|
|
|
|
rt->rt_ifp->if_xname);
|
|
|
|
|
goto out;
|
|
|
|
|
} else {
|
|
|
|
|
ARP_STATINC(ARP_STAT_RCVOVER);
|
|
|
|
|
if (log_movements)
|
|
|
|
|
log(LOG_INFO, "arp info overwritten "
|
|
|
|
|
"for %s by %s\n",
|
|
|
|
|
in_fmtaddr(isaddr),
|
|
|
|
|
lla_snprintf(ar_sha(ah),
|
|
|
|
|
ah->ar_hln));
|
1997-03-15 21:09:08 +03:00
|
|
|
|
}
|
2015-11-30 09:45:38 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* sanity check for the address length.
|
|
|
|
|
* XXX this does not work for protocols with variable address
|
|
|
|
|
* length. -is
|
|
|
|
|
*/
|
|
|
|
|
if (sdl->sdl_alen && sdl->sdl_alen != ah->ar_hln) {
|
|
|
|
|
ARP_STATINC(ARP_STAT_RCVLENCHG);
|
|
|
|
|
log(LOG_WARNING,
|
|
|
|
|
"arp from %s: new addr len %d, was %d\n",
|
|
|
|
|
in_fmtaddr(isaddr), ah->ar_hln, sdl->sdl_alen);
|
|
|
|
|
}
|
|
|
|
|
if (ifp->if_addrlen != ah->ar_hln) {
|
|
|
|
|
ARP_STATINC(ARP_STAT_RCVBADLEN);
|
|
|
|
|
log(LOG_WARNING,
|
|
|
|
|
"arp from %s: addr len: new %d, i/f %d (ignored)\n",
|
|
|
|
|
in_fmtaddr(isaddr), ah->ar_hln,
|
|
|
|
|
ifp->if_addrlen);
|
|
|
|
|
goto reply;
|
|
|
|
|
}
|
|
|
|
|
|
1999-03-23 01:30:42 +03:00
|
|
|
|
#if NTOKEN > 0
|
2015-11-30 09:45:38 +03:00
|
|
|
|
/*
|
|
|
|
|
* XXX uses m_data and assumes the complete answer including
|
|
|
|
|
* XXX token-ring headers is in the same buf
|
|
|
|
|
*/
|
|
|
|
|
if (ifp->if_type == IFT_ISO88025) {
|
|
|
|
|
struct token_header *trh;
|
|
|
|
|
|
|
|
|
|
trh = (struct token_header *)M_TRHSTART(m);
|
|
|
|
|
if (trh->token_shost[0] & TOKEN_RI_PRESENT) {
|
|
|
|
|
struct token_rif *rif;
|
|
|
|
|
size_t riflen;
|
|
|
|
|
|
|
|
|
|
rif = TOKEN_RIF(trh);
|
|
|
|
|
riflen = (ntohs(rif->tr_rcf) &
|
|
|
|
|
TOKEN_RCF_LEN_MASK) >> 8;
|
|
|
|
|
|
|
|
|
|
if (riflen > 2 &&
|
|
|
|
|
riflen < sizeof(struct token_rif) &&
|
|
|
|
|
(riflen & 1) == 0) {
|
|
|
|
|
rif->tr_rcf ^= htons(TOKEN_RCF_DIRECTION);
|
|
|
|
|
rif->tr_rcf &= htons(~TOKEN_RCF_BROADCAST_MASK);
|
2015-12-16 08:44:59 +03:00
|
|
|
|
memcpy(TOKEN_RIF_LLE(la), rif, riflen);
|
1999-03-23 01:30:42 +03:00
|
|
|
|
}
|
|
|
|
|
}
|
2015-11-30 09:45:38 +03:00
|
|
|
|
}
|
1999-03-23 01:30:42 +03:00
|
|
|
|
#endif /* NTOKEN > 0 */
|
2015-11-30 09:45:38 +03:00
|
|
|
|
(void)sockaddr_dl_setaddr(sdl, sdl->sdl_len, ar_sha(ah), ah->ar_hln);
|
|
|
|
|
if (rt->rt_expire) {
|
|
|
|
|
rt->rt_expire = time_uptime + arpt_keep;
|
1999-08-05 08:04:28 +04:00
|
|
|
|
|
2015-11-30 09:45:38 +03:00
|
|
|
|
KASSERT((la->la_flags & LLE_STATIC) == 0);
|
2015-12-11 04:15:00 +03:00
|
|
|
|
arp_settimer(la, arpt_keep);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
2015-11-30 09:45:38 +03:00
|
|
|
|
rt->rt_flags &= ~RTF_REJECT;
|
|
|
|
|
la->la_asked = 0;
|
|
|
|
|
|
|
|
|
|
if (la->la_hold != NULL) {
|
|
|
|
|
int n = la->la_numheld;
|
|
|
|
|
struct mbuf *m_hold, *m_hold_next;
|
|
|
|
|
|
|
|
|
|
m_hold = la->la_hold;
|
|
|
|
|
la->la_hold = NULL;
|
|
|
|
|
la->la_numheld = 0;
|
|
|
|
|
/*
|
|
|
|
|
* We have to unlock here because if_output would call
|
|
|
|
|
* arpresolve
|
|
|
|
|
*/
|
|
|
|
|
LLE_WUNLOCK(la);
|
|
|
|
|
ARP_STATADD(ARP_STAT_DFRSENT, n);
|
|
|
|
|
for (; m_hold != NULL; m_hold = m_hold_next) {
|
|
|
|
|
m_hold_next = m_hold->m_nextpkt;
|
|
|
|
|
m_hold->m_nextpkt = NULL;
|
|
|
|
|
(*ifp->if_output)(ifp, m_hold, rt_getkey(rt), rt);
|
|
|
|
|
}
|
|
|
|
|
} else
|
|
|
|
|
LLE_WUNLOCK(la);
|
|
|
|
|
la = NULL;
|
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
|
reply:
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if (la != NULL) {
|
|
|
|
|
LLE_WUNLOCK(la);
|
|
|
|
|
la = NULL;
|
|
|
|
|
}
|
1994-05-13 10:02:48 +04:00
|
|
|
|
if (op != ARPOP_REQUEST) {
|
2000-08-16 00:24:57 +04:00
|
|
|
|
if (op == ARPOP_REPLY)
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVREPLY);
|
2015-08-12 10:13:14 +03:00
|
|
|
|
goto out;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_RCVREQUEST);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
if (in_hosteq(itaddr, myaddr)) {
|
2015-05-02 17:41:32 +03:00
|
|
|
|
/* If our address is unuseable, don't reply */
|
|
|
|
|
if (ia->ia4_flags & (IN_IFF_NOTREADY | IN_IFF_DETACHED))
|
|
|
|
|
goto out;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
/* I am the target */
|
2006-05-12 05:20:33 +04:00
|
|
|
|
tha = ar_tha(ah);
|
|
|
|
|
if (tha)
|
2007-03-04 08:59:00 +03:00
|
|
|
|
memcpy(tha, ar_sha(ah), ah->ar_hln);
|
2007-08-27 05:13:09 +04:00
|
|
|
|
memcpy(ar_sha(ah), CLLADDR(ifp->if_sadl), ah->ar_hln);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
} else {
|
2015-08-31 11:05:20 +03:00
|
|
|
|
la = arplookup(ifp, m, &itaddr, 0, SIN_PROXY, 0, NULL);
|
2008-05-13 21:51:26 +04:00
|
|
|
|
if (la == NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
goto out;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
rt = la->la_rt;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
LLE_RUNLOCK(la);
|
|
|
|
|
la = NULL;
|
2006-05-18 13:05:49 +04:00
|
|
|
|
if (rt->rt_ifp->if_type == IFT_CARP &&
|
|
|
|
|
m->m_pkthdr.rcvif->if_type != IFT_CARP)
|
|
|
|
|
goto out;
|
2006-05-12 05:20:33 +04:00
|
|
|
|
tha = ar_tha(ah);
|
|
|
|
|
if (tha)
|
2007-03-04 08:59:00 +03:00
|
|
|
|
memcpy(tha, ar_sha(ah), ah->ar_hln);
|
2007-08-27 05:13:09 +04:00
|
|
|
|
sdl = satosdl(rt->rt_gateway);
|
|
|
|
|
memcpy(ar_sha(ah), CLLADDR(sdl), ah->ar_hln);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
2007-03-04 08:59:00 +03:00
|
|
|
|
memcpy(ar_tpa(ah), ar_spa(ah), ah->ar_pln);
|
|
|
|
|
memcpy(ar_spa(ah), &itaddr, ah->ar_pln);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
ah->ar_op = htons(ARPOP_REPLY);
|
|
|
|
|
ah->ar_pro = htons(ETHERTYPE_IP); /* let's be sure! */
|
2002-06-25 01:25:34 +04:00
|
|
|
|
switch (ifp->if_type) {
|
|
|
|
|
case IFT_IEEE1394:
|
|
|
|
|
/*
|
|
|
|
|
* ieee1394 arp reply is broadcast
|
|
|
|
|
*/
|
|
|
|
|
m->m_flags &= ~M_MCAST;
|
|
|
|
|
m->m_flags |= M_BCAST;
|
|
|
|
|
m->m_len = sizeof(*ah) + (2 * ah->ar_pln) + ah->ar_hln;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
m->m_flags &= ~(M_BCAST|M_MCAST); /* never reply by broadcast */
|
|
|
|
|
m->m_len = sizeof(*ah) + (2 * ah->ar_pln) + (2 * ah->ar_hln);
|
|
|
|
|
break;
|
|
|
|
|
}
|
1999-06-18 22:20:50 +04:00
|
|
|
|
m->m_pkthdr.len = m->m_len;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
sa.sa_family = AF_ARP;
|
|
|
|
|
sa.sa_len = 2;
|
2008-04-15 19:17:54 +04:00
|
|
|
|
arps = ARP_STAT_GETREF();
|
|
|
|
|
arps[ARP_STAT_SNDTOTAL]++;
|
|
|
|
|
arps[ARP_STAT_SNDREPLY]++;
|
|
|
|
|
ARP_STAT_PUTREF();
|
2012-01-01 00:41:58 +04:00
|
|
|
|
(*ifp->if_output)(ifp, m, &sa, NULL);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
return;
|
2015-08-31 11:05:20 +03:00
|
|
|
|
|
2015-08-12 10:13:14 +03:00
|
|
|
|
out:
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if (la != NULL)
|
|
|
|
|
LLE_WUNLOCK(la);
|
2015-08-12 10:13:14 +03:00
|
|
|
|
m_freem(m);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
|
* Free an arp entry.
|
1993-03-21 12:45:37 +03:00
|
|
|
|
*/
|
2015-09-09 04:24:01 +03:00
|
|
|
|
static void arptfree(struct rtentry *rt)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
|
|
|
|
|
2015-11-19 06:03:04 +03:00
|
|
|
|
/* We still need to hold the locks */
|
|
|
|
|
mutex_enter(softnet_lock);
|
|
|
|
|
KERNEL_LOCK(1, NULL);
|
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
rtrequest(RTM_DELETE, rt_getkey(rt), NULL, rt_mask(rt), 0, NULL);
|
2015-09-09 04:24:01 +03:00
|
|
|
|
rtfree(rt);
|
2015-11-19 06:03:04 +03:00
|
|
|
|
|
|
|
|
|
KERNEL_UNLOCK_ONE(NULL);
|
|
|
|
|
mutex_exit(softnet_lock);
|
2007-08-27 05:13:09 +04:00
|
|
|
|
}
|
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
|
* Lookup or enter a new address in arptab.
|
1993-03-21 12:45:37 +03:00
|
|
|
|
*/
|
2015-08-31 11:05:20 +03:00
|
|
|
|
static struct llentry *
|
|
|
|
|
arplookup(struct ifnet *ifp, struct mbuf *m, const struct in_addr *addr,
|
|
|
|
|
int create, int proxy, int wlock, struct rtentry *rt0)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
2001-06-11 10:19:50 +04:00
|
|
|
|
struct arphdr *ah;
|
2000-03-30 16:51:13 +04:00
|
|
|
|
struct rtentry *rt;
|
2008-05-12 00:16:12 +04:00
|
|
|
|
struct sockaddr_inarp sin;
|
|
|
|
|
const char *why = NULL;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
|
2001-06-11 10:19:50 +04:00
|
|
|
|
ah = mtod(m, struct arphdr *);
|
2007-08-27 05:13:09 +04:00
|
|
|
|
if (rt0 == NULL) {
|
2008-05-12 00:16:12 +04:00
|
|
|
|
memset(&sin, 0, sizeof(sin));
|
2007-08-27 05:13:09 +04:00
|
|
|
|
sin.sin_len = sizeof(sin);
|
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
|
sin.sin_addr = *addr;
|
|
|
|
|
sin.sin_other = proxy ? SIN_PROXY : 0;
|
|
|
|
|
rt = rtalloc1(sintosa(&sin), create);
|
|
|
|
|
if (rt == NULL)
|
2008-05-13 21:51:26 +04:00
|
|
|
|
return NULL;
|
2007-08-27 05:13:09 +04:00
|
|
|
|
rt->rt_refcnt--;
|
|
|
|
|
} else
|
|
|
|
|
rt = rt0;
|
|
|
|
|
|
|
|
|
|
#define IS_LLINFO(__rt) \
|
|
|
|
|
(((__rt)->rt_flags & (RTF_GATEWAY | RTF_LLINFO)) == RTF_LLINFO && \
|
|
|
|
|
(__rt)->rt_gateway->sa_family == AF_LINK)
|
|
|
|
|
|
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if (IS_LLINFO(rt)) {
|
|
|
|
|
struct llentry *la;
|
|
|
|
|
int flags = wlock ? LLE_EXCLUSIVE : 0;
|
|
|
|
|
|
2015-10-05 11:17:31 +03:00
|
|
|
|
IF_AFDATA_RLOCK(ifp);
|
|
|
|
|
la = lla_lookup(LLTABLE(ifp), flags, rt_getkey(rt));
|
|
|
|
|
IF_AFDATA_RUNLOCK(ifp);
|
|
|
|
|
|
|
|
|
|
if (la == NULL && create) {
|
2015-08-31 11:05:20 +03:00
|
|
|
|
IF_AFDATA_WLOCK(ifp);
|
|
|
|
|
la = lla_create(LLTABLE(ifp), flags, rt_getkey(rt));
|
|
|
|
|
IF_AFDATA_WUNLOCK(ifp);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return la;
|
|
|
|
|
}
|
1998-10-01 15:04:24 +04:00
|
|
|
|
|
2003-09-24 10:52:47 +04:00
|
|
|
|
if (create) {
|
2014-11-13 19:11:18 +03:00
|
|
|
|
if (rt->rt_flags & RTF_GATEWAY) {
|
|
|
|
|
if (log_unknown_network)
|
|
|
|
|
why = "host is not on local network";
|
|
|
|
|
} else if ((rt->rt_flags & RTF_LLINFO) == 0) {
|
2008-04-15 19:17:54 +04:00
|
|
|
|
ARP_STATINC(ARP_STAT_ALLOCFAIL);
|
2004-09-30 01:26:52 +04:00
|
|
|
|
why = "could not allocate llinfo";
|
2005-02-27 01:45:09 +03:00
|
|
|
|
} else
|
2004-09-30 01:26:52 +04:00
|
|
|
|
why = "gateway route is not ours";
|
2014-11-13 19:11:18 +03:00
|
|
|
|
if (why) {
|
|
|
|
|
log(LOG_DEBUG, "arplookup: unable to enter address"
|
|
|
|
|
" for %s@%s on %s (%s)\n", in_fmtaddr(*addr),
|
|
|
|
|
lla_snprintf(ar_sha(ah), ah->ar_hln),
|
|
|
|
|
(ifp) ? ifp->if_xname : "null", why);
|
|
|
|
|
}
|
2015-08-31 11:05:20 +03:00
|
|
|
|
if ((rt->rt_flags & RTF_CLONED) != 0) {
|
Take steps to hide the radix_node implementation of the forwarding table
from the forwarding table's users:
Introduce rt_walktree() for walking the routing table and
applying a function to each rtentry. Replace most
rn_walktree() calls with it.
Use rt_getkey()/rt_setkey() to get/set a route's destination.
Keep a pointer to the sockaddr key in the rtentry, so that
rtentry users do not have to grovel in the radix_node for
the key.
Add a RTM_GET method to rtrequest. Use that instead of
radix_node lookups in, e.g., carp(4).
Add sys/net/link_proto.c, which supplies sockaddr routines for
link-layer socket addresses (sockaddr_dl).
Cosmetic:
Constify. KNF. Stop open-coding LIST_FOREACH, TAILQ_FOREACH,
et cetera. Use NULL instead of 0 for null pointers. Use
__arraycount(). Reduce gratuitous parenthesization.
Stop using variadic arguments for rip6_output(), it is
unnecessary.
Remove the unnecessary rtentry member rt_genmask and the
code to maintain it, since nothing actually used it.
Make rt_maskedcopy() easier to read by using meaningful variable
names.
Extract a subroutine intern_netmask() for looking up a netmask in
the masks table.
Start converting backslash-ridden IPv6 macros in
sys/netinet6/in6_var.h into inline subroutines that one
can read without special eyeglasses.
One functional change: when the kernel serves an RTM_GET, RTM_LOCK,
or RTM_CHANGE request, it applies the netmask (if supplied) to a
destination before searching for it in the forwarding table.
I have changed sys/netinet/ip_carp.c, carp_setroute(), to remove
the unlawful radix_node knowledge.
Apart from the changes to carp(4), netiso, ATM, and strip(4), I
have run the changes on three nodes in my wireless routing testbed,
which involves IPv4 + IPv6 dynamic routing acrobatics, and it's
working beautifully so far.
2007-07-20 00:48:52 +04:00
|
|
|
|
rtrequest(RTM_DELETE, rt_getkey(rt),
|
2008-05-13 21:51:26 +04:00
|
|
|
|
rt->rt_gateway, rt_mask(rt), rt->rt_flags, NULL);
|
2003-09-24 10:52:47 +04:00
|
|
|
|
}
|
|
|
|
|
}
|
2008-05-13 21:51:26 +04:00
|
|
|
|
return NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
|
int
|
2007-03-04 08:59:00 +03:00
|
|
|
|
arpioctl(u_long cmd, void *data)
|
1993-03-21 12:45:37 +03:00
|
|
|
|
{
|
1995-04-08 02:26:04 +04:00
|
|
|
|
|
2008-05-13 21:51:26 +04:00
|
|
|
|
return EOPNOTSUPP;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
}
|
1994-04-18 10:18:05 +04:00
|
|
|
|
|
1995-04-08 02:26:04 +04:00
|
|
|
|
void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
arp_ifinit(struct ifnet *ifp, struct ifaddr *ifa)
|
1995-04-08 02:26:04 +04:00
|
|
|
|
{
|
1997-08-29 20:02:41 +04:00
|
|
|
|
struct in_addr *ip;
|
2015-05-02 17:41:32 +03:00
|
|
|
|
struct in_ifaddr *ia = (struct in_ifaddr *)ifa;
|
1997-08-29 20:02:41 +04:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Warn the user if another station has this IP address,
|
|
|
|
|
* but only if the interface IP address is not zero.
|
|
|
|
|
*/
|
|
|
|
|
ip = &IA_SIN(ifa)->sin_addr;
|
2015-05-02 17:41:32 +03:00
|
|
|
|
if (!in_nullhost(*ip) &&
|
|
|
|
|
(ia->ia4_flags & (IN_IFF_NOTREADY | IN_IFF_DETACHED)) == 0)
|
Use malloc(9) for sockaddrs instead of pool(9), and remove dom_sa_pool
and dom_sa_len members from struct domain. Pools of fixed-size
objects are too rigid for sockaddr_dls, whose size can vary over
a wide range.
Return sockaddr_dl to its "historical" size. Now that I'm using
malloc(9) instead of pool(9) to allocate sockaddr_dl, I can create
a sockaddr_dl of any size in the kernel, so expanding sockaddr_dl
is useless.
Avoid using sizeof(struct sockaddr_dl) in the kernel.
Introduce sockaddr_dl_alloc() for allocating & initializing an
arbitrary sockaddr_dl on the heap.
Add an argument, the sockaddr length, to sockaddr_alloc(),
sockaddr_copy(), and sockaddr_dl_setaddr().
Constify: LLADDR() -> CLLADDR().
Where the kernel overwrites LLADDR(), use sockaddr_dl_setaddr(),
instead. Used properly, sockaddr_dl_setaddr() will not overrun
the end of the sockaddr.
2007-08-30 06:17:34 +04:00
|
|
|
|
arprequest(ifp, ip, ip, CLLADDR(ifp->if_sadl));
|
1995-04-08 02:26:04 +04:00
|
|
|
|
|
|
|
|
|
ifa->ifa_rtrequest = arp_rtrequest;
|
|
|
|
|
ifa->ifa_flags |= RTF_CLONING;
|
2015-05-16 15:12:46 +03:00
|
|
|
|
|
|
|
|
|
/* ARP will handle DAD for this address. */
|
|
|
|
|
if (ia->ia4_flags & IN_IFF_TRYTENTATIVE) {
|
|
|
|
|
ia->ia4_flags |= IN_IFF_TENTATIVE;
|
|
|
|
|
ia->ia_dad_start = arp_dad_start;
|
|
|
|
|
ia->ia_dad_stop = arp_dad_stop;
|
|
|
|
|
}
|
1995-04-08 02:26:04 +04:00
|
|
|
|
}
|
|
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
|
TAILQ_HEAD(dadq_head, dadq);
|
|
|
|
|
struct dadq {
|
|
|
|
|
TAILQ_ENTRY(dadq) dad_list;
|
|
|
|
|
struct ifaddr *dad_ifa;
|
|
|
|
|
int dad_count; /* max ARP to send */
|
|
|
|
|
int dad_arp_tcount; /* # of trials to send ARP */
|
|
|
|
|
int dad_arp_ocount; /* ARP sent so far */
|
|
|
|
|
int dad_arp_announce; /* max ARP announcements */
|
|
|
|
|
int dad_arp_acount; /* # of announcements */
|
|
|
|
|
struct callout dad_timer_ch;
|
|
|
|
|
};
|
|
|
|
|
MALLOC_JUSTDEFINE(M_IPARP, "ARP DAD", "ARP DAD Structure");
|
|
|
|
|
|
|
|
|
|
static struct dadq_head dadq;
|
|
|
|
|
static int dad_init = 0;
|
|
|
|
|
static int dad_maxtry = 15; /* max # of *tries* to transmit DAD packet */
|
|
|
|
|
|
|
|
|
|
static struct dadq *
|
|
|
|
|
arp_dad_find(struct ifaddr *ifa)
|
|
|
|
|
{
|
|
|
|
|
struct dadq *dp;
|
|
|
|
|
|
|
|
|
|
TAILQ_FOREACH(dp, &dadq, dad_list) {
|
|
|
|
|
if (dp->dad_ifa == ifa)
|
|
|
|
|
return dp;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
arp_dad_starttimer(struct dadq *dp, int ticks)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
callout_reset(&dp->dad_timer_ch, ticks,
|
|
|
|
|
(void (*)(void *))arp_dad_timer, (void *)dp->dad_ifa);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
arp_dad_stoptimer(struct dadq *dp)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
callout_stop(&dp->dad_timer_ch);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
arp_dad_output(struct dadq *dp, struct ifaddr *ifa)
|
|
|
|
|
{
|
|
|
|
|
struct in_ifaddr *ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
struct ifnet *ifp = ifa->ifa_ifp;
|
|
|
|
|
struct in_addr sip;
|
|
|
|
|
|
|
|
|
|
dp->dad_arp_tcount++;
|
|
|
|
|
if ((ifp->if_flags & IFF_UP) == 0)
|
|
|
|
|
return;
|
|
|
|
|
if ((ifp->if_flags & IFF_RUNNING) == 0)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
dp->dad_arp_tcount = 0;
|
|
|
|
|
dp->dad_arp_ocount++;
|
|
|
|
|
|
|
|
|
|
memset(&sip, 0, sizeof(sip));
|
|
|
|
|
arprequest(ifa->ifa_ifp, &sip, &ia->ia_addr.sin_addr,
|
|
|
|
|
CLLADDR(ifa->ifa_ifp->if_sadl));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Start Duplicate Address Detection (DAD) for specified interface address.
|
|
|
|
|
*/
|
2015-05-16 15:12:46 +03:00
|
|
|
|
static void
|
2015-05-02 17:41:32 +03:00
|
|
|
|
arp_dad_start(struct ifaddr *ifa)
|
|
|
|
|
{
|
|
|
|
|
struct in_ifaddr *ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
struct dadq *dp;
|
|
|
|
|
|
|
|
|
|
if (!dad_init) {
|
|
|
|
|
TAILQ_INIT(&dadq);
|
|
|
|
|
dad_init++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* If we don't need DAD, don't do it.
|
|
|
|
|
* - DAD is disabled (ip_dad_count == 0)
|
|
|
|
|
*/
|
|
|
|
|
if (!(ia->ia4_flags & IN_IFF_TENTATIVE)) {
|
|
|
|
|
log(LOG_DEBUG,
|
|
|
|
|
"arp_dad_start: called with non-tentative address "
|
|
|
|
|
"%s(%s)\n",
|
|
|
|
|
in_fmtaddr(ia->ia_addr.sin_addr),
|
|
|
|
|
ifa->ifa_ifp ? if_name(ifa->ifa_ifp) : "???");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
if (!ip_dad_count) {
|
|
|
|
|
struct in_addr *ip = &IA_SIN(ifa)->sin_addr;
|
|
|
|
|
|
|
|
|
|
ia->ia4_flags &= ~IN_IFF_TENTATIVE;
|
|
|
|
|
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
|
|
|
|
|
arprequest(ifa->ifa_ifp, ip, ip,
|
|
|
|
|
CLLADDR(ifa->ifa_ifp->if_sadl));
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
if (ifa->ifa_ifp == NULL)
|
|
|
|
|
panic("arp_dad_start: ifa->ifa_ifp == NULL");
|
|
|
|
|
if (!(ifa->ifa_ifp->if_flags & IFF_UP))
|
|
|
|
|
return;
|
|
|
|
|
if (arp_dad_find(ifa) != NULL) {
|
|
|
|
|
/* DAD already in progress */
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dp = malloc(sizeof(*dp), M_IPARP, M_NOWAIT);
|
|
|
|
|
if (dp == NULL) {
|
|
|
|
|
log(LOG_ERR, "arp_dad_start: memory allocation failed for "
|
|
|
|
|
"%s(%s)\n",
|
|
|
|
|
in_fmtaddr(ia->ia_addr.sin_addr),
|
|
|
|
|
ifa->ifa_ifp ? if_name(ifa->ifa_ifp) : "???");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
memset(dp, 0, sizeof(*dp));
|
|
|
|
|
callout_init(&dp->dad_timer_ch, CALLOUT_MPSAFE);
|
|
|
|
|
TAILQ_INSERT_TAIL(&dadq, (struct dadq *)dp, dad_list);
|
|
|
|
|
|
|
|
|
|
arplog((LOG_DEBUG, "%s: starting DAD for %s\n", if_name(ifa->ifa_ifp),
|
|
|
|
|
in_fmtaddr(ia->ia_addr.sin_addr)));
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Send ARP packet for DAD, ip_dad_count times.
|
|
|
|
|
* Note that we must delay the first transmission.
|
|
|
|
|
*/
|
|
|
|
|
dp->dad_ifa = ifa;
|
|
|
|
|
ifaref(ifa); /* just for safety */
|
|
|
|
|
dp->dad_count = ip_dad_count;
|
|
|
|
|
dp->dad_arp_announce = 0; /* Will be set when starting to announce */
|
|
|
|
|
dp->dad_arp_acount = dp->dad_arp_ocount = dp->dad_arp_tcount = 0;
|
|
|
|
|
|
|
|
|
|
arp_dad_starttimer(dp, cprng_fast32() % (PROBE_WAIT * hz));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* terminate DAD unconditionally. used for address removals.
|
|
|
|
|
*/
|
2015-05-16 15:12:46 +03:00
|
|
|
|
static void
|
2015-05-02 17:41:32 +03:00
|
|
|
|
arp_dad_stop(struct ifaddr *ifa)
|
|
|
|
|
{
|
|
|
|
|
struct dadq *dp;
|
|
|
|
|
|
|
|
|
|
if (!dad_init)
|
|
|
|
|
return;
|
|
|
|
|
dp = arp_dad_find(ifa);
|
|
|
|
|
if (dp == NULL) {
|
|
|
|
|
/* DAD wasn't started yet */
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
arp_dad_stoptimer(dp);
|
|
|
|
|
|
|
|
|
|
TAILQ_REMOVE(&dadq, dp, dad_list);
|
|
|
|
|
free(dp, M_IPARP);
|
|
|
|
|
dp = NULL;
|
|
|
|
|
ifafree(ifa);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
arp_dad_timer(struct ifaddr *ifa)
|
|
|
|
|
{
|
|
|
|
|
struct in_ifaddr *ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
struct dadq *dp;
|
|
|
|
|
struct in_addr *ip;
|
|
|
|
|
|
|
|
|
|
mutex_enter(softnet_lock);
|
|
|
|
|
KERNEL_LOCK(1, NULL);
|
|
|
|
|
|
|
|
|
|
/* Sanity check */
|
|
|
|
|
if (ia == NULL) {
|
|
|
|
|
log(LOG_ERR, "arp_dad_timer: called with null parameter\n");
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
dp = arp_dad_find(ifa);
|
|
|
|
|
if (dp == NULL) {
|
|
|
|
|
log(LOG_ERR, "arp_dad_timer: DAD structure not found\n");
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
if (ia->ia4_flags & IN_IFF_DUPLICATED) {
|
|
|
|
|
log(LOG_ERR, "nd4_dad_timer: called with duplicate address "
|
|
|
|
|
"%s(%s)\n",
|
|
|
|
|
in_fmtaddr(ia->ia_addr.sin_addr),
|
|
|
|
|
ifa->ifa_ifp ? if_name(ifa->ifa_ifp) : "???");
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
if ((ia->ia4_flags & IN_IFF_TENTATIVE) == 0 && dp->dad_arp_acount == 0){
|
|
|
|
|
log(LOG_ERR, "arp_dad_timer: called with non-tentative address "
|
|
|
|
|
"%s(%s)\n",
|
|
|
|
|
in_fmtaddr(ia->ia_addr.sin_addr),
|
|
|
|
|
ifa->ifa_ifp ? if_name(ifa->ifa_ifp) : "???");
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* timeouted with IFF_{RUNNING,UP} check */
|
|
|
|
|
if (dp->dad_arp_tcount > dad_maxtry) {
|
|
|
|
|
arplog((LOG_INFO, "%s: could not run DAD, driver problem?\n",
|
|
|
|
|
if_name(ifa->ifa_ifp)));
|
|
|
|
|
|
|
|
|
|
TAILQ_REMOVE(&dadq, dp, dad_list);
|
|
|
|
|
free(dp, M_IPARP);
|
|
|
|
|
dp = NULL;
|
|
|
|
|
ifafree(ifa);
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Need more checks? */
|
|
|
|
|
if (dp->dad_arp_ocount < dp->dad_count) {
|
2015-05-03 13:44:04 +03:00
|
|
|
|
int adelay;
|
2015-05-02 17:41:32 +03:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* We have more ARP to go. Send ARP packet for DAD.
|
|
|
|
|
*/
|
|
|
|
|
arp_dad_output(dp, ifa);
|
|
|
|
|
if (dp->dad_arp_ocount < dp->dad_count)
|
2015-05-03 13:44:04 +03:00
|
|
|
|
adelay = (PROBE_MIN * hz) +
|
2015-05-02 17:41:32 +03:00
|
|
|
|
(cprng_fast32() %
|
|
|
|
|
((PROBE_MAX * hz) - (PROBE_MIN * hz)));
|
|
|
|
|
else
|
2015-05-03 13:44:04 +03:00
|
|
|
|
adelay = ANNOUNCE_WAIT * hz;
|
|
|
|
|
arp_dad_starttimer(dp, adelay);
|
2015-05-02 17:41:32 +03:00
|
|
|
|
goto done;
|
|
|
|
|
} else if (dp->dad_arp_acount == 0) {
|
|
|
|
|
/*
|
|
|
|
|
* We are done with DAD.
|
|
|
|
|
* No duplicate address found.
|
|
|
|
|
*/
|
|
|
|
|
ia->ia4_flags &= ~IN_IFF_TENTATIVE;
|
|
|
|
|
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
|
|
|
|
|
arplog((LOG_DEBUG,
|
|
|
|
|
"%s: DAD complete for %s - no duplicates found\n",
|
|
|
|
|
if_name(ifa->ifa_ifp),
|
|
|
|
|
in_fmtaddr(ia->ia_addr.sin_addr)));
|
|
|
|
|
dp->dad_arp_announce = ANNOUNCE_NUM;
|
|
|
|
|
goto announce;
|
|
|
|
|
} else if (dp->dad_arp_acount < dp->dad_arp_announce) {
|
|
|
|
|
announce:
|
|
|
|
|
/*
|
|
|
|
|
* Announce the address.
|
|
|
|
|
*/
|
|
|
|
|
ip = &IA_SIN(ifa)->sin_addr;
|
|
|
|
|
arprequest(ifa->ifa_ifp, ip, ip,
|
|
|
|
|
CLLADDR(ifa->ifa_ifp->if_sadl));
|
|
|
|
|
dp->dad_arp_acount++;
|
|
|
|
|
if (dp->dad_arp_acount < dp->dad_arp_announce) {
|
|
|
|
|
arp_dad_starttimer(dp, ANNOUNCE_INTERVAL * hz);
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
arplog((LOG_DEBUG,
|
|
|
|
|
"%s: ARP announcement complete for %s\n",
|
|
|
|
|
if_name(ifa->ifa_ifp),
|
|
|
|
|
in_fmtaddr(ia->ia_addr.sin_addr)));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TAILQ_REMOVE(&dadq, dp, dad_list);
|
|
|
|
|
free(dp, M_IPARP);
|
|
|
|
|
dp = NULL;
|
|
|
|
|
ifafree(ifa);
|
|
|
|
|
|
|
|
|
|
done:
|
|
|
|
|
KERNEL_UNLOCK_ONE(NULL);
|
|
|
|
|
mutex_exit(softnet_lock);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
arp_dad_duplicated(struct ifaddr *ifa)
|
|
|
|
|
{
|
|
|
|
|
struct in_ifaddr *ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
struct ifnet *ifp;
|
|
|
|
|
struct dadq *dp;
|
|
|
|
|
|
|
|
|
|
dp = arp_dad_find(ifa);
|
|
|
|
|
if (dp == NULL) {
|
|
|
|
|
log(LOG_ERR, "arp_dad_duplicated: DAD structure not found\n");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ifp = ifa->ifa_ifp;
|
|
|
|
|
log(LOG_ERR, "%s: DAD detected duplicate IPv4 address %s: "
|
|
|
|
|
"ARP out=%d\n",
|
|
|
|
|
if_name(ifp), in_fmtaddr(ia->ia_addr.sin_addr),
|
|
|
|
|
dp->dad_arp_ocount);
|
|
|
|
|
|
|
|
|
|
ia->ia4_flags &= ~IN_IFF_TENTATIVE;
|
|
|
|
|
ia->ia4_flags |= IN_IFF_DUPLICATED;
|
|
|
|
|
|
|
|
|
|
/* We are done with DAD, with duplicated address found. (failure) */
|
|
|
|
|
arp_dad_stoptimer(dp);
|
|
|
|
|
|
|
|
|
|
/* Inform the routing socket that DAD has completed */
|
|
|
|
|
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
|
|
|
|
|
|
|
|
|
|
TAILQ_REMOVE(&dadq, dp, dad_list);
|
|
|
|
|
free(dp, M_IPARP);
|
|
|
|
|
dp = NULL;
|
|
|
|
|
ifafree(ifa);
|
|
|
|
|
}
|
|
|
|
|
|
1994-04-18 10:18:05 +04:00
|
|
|
|
/*
|
|
|
|
|
* Called from 10 Mb/s Ethernet interrupt handlers
|
|
|
|
|
* when ether packet type ETHERTYPE_REVARP
|
|
|
|
|
* is received. Common length and type checks are done here,
|
|
|
|
|
* then the protocol-specific routine is called.
|
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
revarpinput(struct mbuf *m)
|
1994-04-18 10:18:05 +04:00
|
|
|
|
{
|
|
|
|
|
struct arphdr *ar;
|
|
|
|
|
|
|
|
|
|
if (m->m_len < sizeof(struct arphdr))
|
|
|
|
|
goto out;
|
|
|
|
|
ar = mtod(m, struct arphdr *);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
#if 0 /* XXX I don't think we need this... and it will prevent other LL */
|
1994-04-18 10:18:05 +04:00
|
|
|
|
if (ntohs(ar->ar_hrd) != ARPHRD_ETHER)
|
|
|
|
|
goto out;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
#endif
|
1994-05-13 10:02:48 +04:00
|
|
|
|
if (m->m_len < sizeof(struct arphdr) + 2 * (ar->ar_hln + ar->ar_pln))
|
1994-04-18 10:18:05 +04:00
|
|
|
|
goto out;
|
|
|
|
|
switch (ntohs(ar->ar_pro)) {
|
|
|
|
|
case ETHERTYPE_IP:
|
|
|
|
|
case ETHERTYPE_IPTRAILERS:
|
1994-05-13 10:02:48 +04:00
|
|
|
|
in_revarpinput(m);
|
1994-04-18 10:18:05 +04:00
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
out:
|
|
|
|
|
m_freem(m);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* RARP for Internet protocols on 10 Mb/s Ethernet.
|
|
|
|
|
* Algorithm is that given in RFC 903.
|
|
|
|
|
* We are only using for bootstrap purposes to get an ip address for one of
|
|
|
|
|
* our interfaces. Thus we support no user-interface.
|
|
|
|
|
*
|
|
|
|
|
* Since the contents of the RARP reply are specific to the interface that
|
|
|
|
|
* sent the request, this code must ensure that they are properly associated.
|
|
|
|
|
*
|
|
|
|
|
* Note: also supports ARP via RARP packets, per the RFC.
|
|
|
|
|
*/
|
1996-02-14 02:40:59 +03:00
|
|
|
|
void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
in_revarpinput(struct mbuf *m)
|
1994-04-18 10:18:05 +04:00
|
|
|
|
{
|
1994-05-13 10:02:48 +04:00
|
|
|
|
struct ifnet *ifp;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
struct arphdr *ah;
|
2007-03-04 08:59:00 +03:00
|
|
|
|
void *tha;
|
1996-02-14 02:40:59 +03:00
|
|
|
|
int op;
|
1994-04-18 10:18:05 +04:00
|
|
|
|
|
1997-03-15 21:09:08 +03:00
|
|
|
|
ah = mtod(m, struct arphdr *);
|
|
|
|
|
op = ntohs(ah->ar_op);
|
2002-06-24 12:06:20 +04:00
|
|
|
|
|
|
|
|
|
switch (m->m_pkthdr.rcvif->if_type) {
|
|
|
|
|
case IFT_IEEE1394:
|
|
|
|
|
/* ARP without target hardware address is not supported */
|
|
|
|
|
goto out;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
1994-04-18 10:18:05 +04:00
|
|
|
|
switch (op) {
|
|
|
|
|
case ARPOP_REQUEST:
|
|
|
|
|
case ARPOP_REPLY: /* per RFC */
|
1994-05-13 10:02:48 +04:00
|
|
|
|
in_arpinput(m);
|
1994-04-18 10:18:05 +04:00
|
|
|
|
return;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
case ARPOP_REVREPLY:
|
1994-04-18 10:18:05 +04:00
|
|
|
|
break;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
case ARPOP_REVREQUEST: /* handled by rarpd(8) */
|
1994-04-18 10:18:05 +04:00
|
|
|
|
default:
|
|
|
|
|
goto out;
|
|
|
|
|
}
|
|
|
|
|
if (!revarp_in_progress)
|
|
|
|
|
goto out;
|
1994-05-13 10:02:48 +04:00
|
|
|
|
ifp = m->m_pkthdr.rcvif;
|
|
|
|
|
if (ifp != myip_ifp) /* !same interface */
|
1994-04-18 10:18:05 +04:00
|
|
|
|
goto out;
|
1994-06-03 06:54:26 +04:00
|
|
|
|
if (myip_initialized)
|
|
|
|
|
goto wake;
|
2006-05-12 05:20:33 +04:00
|
|
|
|
tha = ar_tha(ah);
|
2009-11-20 05:14:56 +03:00
|
|
|
|
if (tha == NULL)
|
|
|
|
|
goto out;
|
2008-05-13 22:24:01 +04:00
|
|
|
|
if (memcmp(tha, CLLADDR(ifp->if_sadl), ifp->if_sadl->sdl_alen))
|
1994-04-18 10:18:05 +04:00
|
|
|
|
goto out;
|
2007-03-04 08:59:00 +03:00
|
|
|
|
memcpy(&srv_ip, ar_spa(ah), sizeof(srv_ip));
|
|
|
|
|
memcpy(&myip, ar_tpa(ah), sizeof(myip));
|
1994-04-18 10:18:05 +04:00
|
|
|
|
myip_initialized = 1;
|
1994-06-03 06:54:26 +04:00
|
|
|
|
wake: /* Do wakeup every time in case it was missed. */
|
2007-03-04 08:59:00 +03:00
|
|
|
|
wakeup((void *)&myip);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
|
|
|
|
|
out:
|
1994-04-18 10:18:05 +04:00
|
|
|
|
m_freem(m);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Send a RARP request for the ip address of the specified interface.
|
|
|
|
|
* The request should be RFC 903-compliant.
|
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
revarprequest(struct ifnet *ifp)
|
1994-04-18 10:18:05 +04:00
|
|
|
|
{
|
|
|
|
|
struct sockaddr sa;
|
|
|
|
|
struct mbuf *m;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
struct arphdr *ah;
|
2007-03-04 08:59:00 +03:00
|
|
|
|
void *tha;
|
1994-04-18 10:18:05 +04:00
|
|
|
|
|
|
|
|
|
if ((m = m_gethdr(M_DONTWAIT, MT_DATA)) == NULL)
|
|
|
|
|
return;
|
2003-02-26 09:31:08 +03:00
|
|
|
|
MCLAIM(m, &arpdomain.dom_mowner);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
m->m_len = sizeof(*ah) + 2*sizeof(struct in_addr) +
|
2002-06-25 06:53:27 +04:00
|
|
|
|
2*ifp->if_addrlen;
|
1997-03-15 21:09:08 +03:00
|
|
|
|
m->m_pkthdr.len = m->m_len;
|
|
|
|
|
MH_ALIGN(m, m->m_len);
|
|
|
|
|
ah = mtod(m, struct arphdr *);
|
2008-05-13 22:24:01 +04:00
|
|
|
|
memset(ah, 0, m->m_len);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
ah->ar_pro = htons(ETHERTYPE_IP);
|
2002-06-25 06:53:27 +04:00
|
|
|
|
ah->ar_hln = ifp->if_addrlen; /* hardware address length */
|
1997-03-15 21:09:08 +03:00
|
|
|
|
ah->ar_pln = sizeof(struct in_addr); /* protocol address length */
|
|
|
|
|
ah->ar_op = htons(ARPOP_REVREQUEST);
|
|
|
|
|
|
2007-08-27 05:13:09 +04:00
|
|
|
|
memcpy(ar_sha(ah), CLLADDR(ifp->if_sadl), ah->ar_hln);
|
2006-05-12 05:20:33 +04:00
|
|
|
|
tha = ar_tha(ah);
|
2014-04-12 16:24:50 +04:00
|
|
|
|
if (tha == NULL) {
|
|
|
|
|
m_free(m);
|
2009-11-20 05:14:56 +03:00
|
|
|
|
return;
|
2014-04-12 16:24:50 +04:00
|
|
|
|
}
|
2008-05-13 22:24:01 +04:00
|
|
|
|
memcpy(tha, CLLADDR(ifp->if_sadl), ah->ar_hln);
|
1997-03-15 21:09:08 +03:00
|
|
|
|
|
|
|
|
|
sa.sa_family = AF_ARP;
|
|
|
|
|
sa.sa_len = 2;
|
|
|
|
|
m->m_flags |= M_BCAST;
|
|
|
|
|
|
2014-06-03 05:24:32 +04:00
|
|
|
|
KERNEL_LOCK(1, NULL);
|
|
|
|
|
(*ifp->if_output)(ifp, m, &sa, NULL);
|
|
|
|
|
KERNEL_UNLOCK_ONE(NULL);
|
1994-04-18 10:18:05 +04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
1994-06-03 06:54:26 +04:00
|
|
|
|
* RARP for the ip address of the specified interface, but also
|
|
|
|
|
* save the ip address of the server that sent the answer.
|
|
|
|
|
* Timeout if no response is received.
|
1994-04-18 10:18:05 +04:00
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
|
int
|
2005-02-03 00:41:01 +03:00
|
|
|
|
revarpwhoarewe(struct ifnet *ifp, struct in_addr *serv_in,
|
|
|
|
|
struct in_addr *clnt_in)
|
1994-04-18 10:18:05 +04:00
|
|
|
|
{
|
|
|
|
|
int result, count = 20;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
|
1999-02-21 18:17:14 +03:00
|
|
|
|
myip_initialized = 0;
|
|
|
|
|
myip_ifp = ifp;
|
|
|
|
|
|
|
|
|
|
revarp_in_progress = 1;
|
|
|
|
|
while (count--) {
|
|
|
|
|
revarprequest(ifp);
|
2007-03-04 08:59:00 +03:00
|
|
|
|
result = tsleep((void *)&myip, PSOCK, "revarp", hz/2);
|
1999-02-21 18:17:14 +03:00
|
|
|
|
if (result != EWOULDBLOCK)
|
|
|
|
|
break;
|
1994-04-18 10:18:05 +04:00
|
|
|
|
}
|
1999-02-21 18:17:14 +03:00
|
|
|
|
revarp_in_progress = 0;
|
|
|
|
|
|
1994-04-18 10:18:05 +04:00
|
|
|
|
if (!myip_initialized)
|
|
|
|
|
return ENETUNREACH;
|
2002-06-09 20:33:36 +04:00
|
|
|
|
|
2008-05-13 22:24:01 +04:00
|
|
|
|
memcpy(serv_in, &srv_ip, sizeof(*serv_in));
|
|
|
|
|
memcpy(clnt_in, &myip, sizeof(*clnt_in));
|
1994-04-18 10:18:05 +04:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
1994-06-03 06:54:26 +04:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1995-04-17 09:32:52 +04:00
|
|
|
|
#ifdef DDB
|
1996-02-14 02:40:59 +03:00
|
|
|
|
|
|
|
|
|
#include <machine/db_machdep.h>
|
|
|
|
|
#include <ddb/db_interface.h>
|
|
|
|
|
#include <ddb/db_output.h>
|
2005-02-03 00:41:01 +03:00
|
|
|
|
|
1994-06-03 06:54:26 +04:00
|
|
|
|
static void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
db_print_sa(const struct sockaddr *sa)
|
1994-06-03 06:54:26 +04:00
|
|
|
|
{
|
|
|
|
|
int len;
|
2005-05-30 01:39:21 +04:00
|
|
|
|
const u_char *p;
|
1994-06-03 06:54:26 +04:00
|
|
|
|
|
2008-05-13 21:51:26 +04:00
|
|
|
|
if (sa == NULL) {
|
1994-06-03 06:54:26 +04:00
|
|
|
|
db_printf("[NULL]");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2005-05-30 01:39:21 +04:00
|
|
|
|
p = (const u_char *)sa;
|
1994-06-03 06:54:26 +04:00
|
|
|
|
len = sa->sa_len;
|
|
|
|
|
db_printf("[");
|
|
|
|
|
while (len > 0) {
|
|
|
|
|
db_printf("%d", *p);
|
|
|
|
|
p++; len--;
|
|
|
|
|
if (len) db_printf(",");
|
|
|
|
|
}
|
|
|
|
|
db_printf("]\n");
|
|
|
|
|
}
|
2005-02-03 00:41:01 +03:00
|
|
|
|
|
1994-06-03 06:54:26 +04:00
|
|
|
|
static void
|
2005-02-03 00:41:01 +03:00
|
|
|
|
db_print_ifa(struct ifaddr *ifa)
|
1994-06-03 06:54:26 +04:00
|
|
|
|
{
|
2008-05-13 21:51:26 +04:00
|
|
|
|
if (ifa == NULL)
|
1994-06-03 06:54:26 +04:00
|
|
|
|
return;
|
|
|
|
|
db_printf(" ifa_addr=");
|
|
|
|
|
db_print_sa(ifa->ifa_addr);
|
|
|
|
|
db_printf(" ifa_dsta=");
|
|
|
|
|
db_print_sa(ifa->ifa_dstaddr);
|
|
|
|
|
db_printf(" ifa_mask=");
|
|
|
|
|
db_print_sa(ifa->ifa_netmask);
|
|
|
|
|
db_printf(" flags=0x%x,refcnt=%d,metric=%d\n",
|
|
|
|
|
ifa->ifa_flags,
|
|
|
|
|
ifa->ifa_refcnt,
|
|
|
|
|
ifa->ifa_metric);
|
|
|
|
|
}
|
2005-02-03 00:41:01 +03:00
|
|
|
|
|
1994-06-03 06:54:26 +04:00
|
|
|
|
static void
|
2015-11-06 11:55:49 +03:00
|
|
|
|
db_print_llinfo(struct llentry *la)
|
1994-06-03 06:54:26 +04:00
|
|
|
|
{
|
2015-11-06 11:55:49 +03:00
|
|
|
|
if (la == NULL)
|
1994-06-03 06:54:26 +04:00
|
|
|
|
return;
|
2015-11-06 11:55:49 +03:00
|
|
|
|
db_printf(" la_rt=%p la_hold=%p, la_asked=%d\n",
|
1994-06-03 06:54:26 +04:00
|
|
|
|
la->la_rt, la->la_hold, la->la_asked);
|
2015-11-06 11:55:49 +03:00
|
|
|
|
db_printf(" la_flags=0x%x\n", la->la_flags);
|
1994-06-03 06:54:26 +04:00
|
|
|
|
}
|
2005-02-03 00:41:01 +03:00
|
|
|
|
|
1994-06-03 06:54:26 +04:00
|
|
|
|
/*
|
2007-06-09 07:07:21 +04:00
|
|
|
|
* Function to pass to rt_walktree().
|
1994-06-03 06:54:26 +04:00
|
|
|
|
* Return non-zero error to abort walk.
|
|
|
|
|
*/
|
|
|
|
|
static int
|
2007-06-13 02:55:44 +04:00
|
|
|
|
db_show_rtentry(struct rtentry *rt, void *w)
|
1994-06-03 06:54:26 +04:00
|
|
|
|
{
|
1996-03-31 00:53:19 +03:00
|
|
|
|
db_printf("rtentry=%p", rt);
|
1994-06-03 06:54:26 +04:00
|
|
|
|
|
2011-02-01 04:39:19 +03:00
|
|
|
|
db_printf(" flags=0x%x refcnt=%d use=%"PRId64" expire=%"PRId64"\n",
|
1994-06-03 06:54:26 +04:00
|
|
|
|
rt->rt_flags, rt->rt_refcnt,
|
2011-02-01 04:39:19 +03:00
|
|
|
|
rt->rt_use, (uint64_t)rt->rt_expire);
|
1994-06-03 06:54:26 +04:00
|
|
|
|
|
Take steps to hide the radix_node implementation of the forwarding table
from the forwarding table's users:
Introduce rt_walktree() for walking the routing table and
applying a function to each rtentry. Replace most
rn_walktree() calls with it.
Use rt_getkey()/rt_setkey() to get/set a route's destination.
Keep a pointer to the sockaddr key in the rtentry, so that
rtentry users do not have to grovel in the radix_node for
the key.
Add a RTM_GET method to rtrequest. Use that instead of
radix_node lookups in, e.g., carp(4).
Add sys/net/link_proto.c, which supplies sockaddr routines for
link-layer socket addresses (sockaddr_dl).
Cosmetic:
Constify. KNF. Stop open-coding LIST_FOREACH, TAILQ_FOREACH,
et cetera. Use NULL instead of 0 for null pointers. Use
__arraycount(). Reduce gratuitous parenthesization.
Stop using variadic arguments for rip6_output(), it is
unnecessary.
Remove the unnecessary rtentry member rt_genmask and the
code to maintain it, since nothing actually used it.
Make rt_maskedcopy() easier to read by using meaningful variable
names.
Extract a subroutine intern_netmask() for looking up a netmask in
the masks table.
Start converting backslash-ridden IPv6 macros in
sys/netinet6/in6_var.h into inline subroutines that one
can read without special eyeglasses.
One functional change: when the kernel serves an RTM_GET, RTM_LOCK,
or RTM_CHANGE request, it applies the netmask (if supplied) to a
destination before searching for it in the forwarding table.
I have changed sys/netinet/ip_carp.c, carp_setroute(), to remove
the unlawful radix_node knowledge.
Apart from the changes to carp(4), netiso, ATM, and strip(4), I
have run the changes on three nodes in my wireless routing testbed,
which involves IPv4 + IPv6 dynamic routing acrobatics, and it's
working beautifully so far.
2007-07-20 00:48:52 +04:00
|
|
|
|
db_printf(" key="); db_print_sa(rt_getkey(rt));
|
1994-06-03 06:54:26 +04:00
|
|
|
|
db_printf(" mask="); db_print_sa(rt_mask(rt));
|
|
|
|
|
db_printf(" gw="); db_print_sa(rt->rt_gateway);
|
|
|
|
|
|
1996-03-31 00:53:19 +03:00
|
|
|
|
db_printf(" ifp=%p ", rt->rt_ifp);
|
1994-06-03 06:54:26 +04:00
|
|
|
|
if (rt->rt_ifp)
|
1996-05-07 06:40:22 +04:00
|
|
|
|
db_printf("(%s)", rt->rt_ifp->if_xname);
|
1994-06-03 06:54:26 +04:00
|
|
|
|
else
|
|
|
|
|
db_printf("(NULL)");
|
|
|
|
|
|
1996-03-31 00:53:19 +03:00
|
|
|
|
db_printf(" ifa=%p\n", rt->rt_ifa);
|
1994-06-03 06:54:26 +04:00
|
|
|
|
db_print_ifa(rt->rt_ifa);
|
|
|
|
|
|
1996-03-31 00:53:19 +03:00
|
|
|
|
db_printf(" gwroute=%p llinfo=%p\n",
|
1994-06-03 06:54:26 +04:00
|
|
|
|
rt->rt_gwroute, rt->rt_llinfo);
|
|
|
|
|
db_print_llinfo(rt->rt_llinfo);
|
|
|
|
|
|
2008-05-13 21:51:26 +04:00
|
|
|
|
return 0;
|
1994-06-03 06:54:26 +04:00
|
|
|
|
}
|
2005-02-03 00:41:01 +03:00
|
|
|
|
|
1994-06-03 06:54:26 +04:00
|
|
|
|
/*
|
|
|
|
|
* Function to print all the route trees.
|
2000-05-20 07:08:41 +04:00
|
|
|
|
* Use this from ddb: "show arptab"
|
1994-06-03 06:54:26 +04:00
|
|
|
|
*/
|
2000-05-20 07:08:41 +04:00
|
|
|
|
void
|
2007-02-22 07:38:02 +03:00
|
|
|
|
db_show_arptab(db_expr_t addr, bool have_addr,
|
2006-11-16 04:32:37 +03:00
|
|
|
|
db_expr_t count, const char *modif)
|
1994-06-03 06:54:26 +04:00
|
|
|
|
{
|
2007-06-13 02:55:44 +04:00
|
|
|
|
rt_walktree(AF_INET, db_show_rtentry, NULL);
|
1994-06-03 06:54:26 +04:00
|
|
|
|
}
|
|
|
|
|
#endif
|
2004-04-28 18:09:36 +04:00
|
|
|
|
|
2015-08-31 11:05:20 +03:00
|
|
|
|
void
|
|
|
|
|
arp_stat_add(int type, uint64_t count)
|
|
|
|
|
{
|
|
|
|
|
ARP_STATADD(type, count);
|
|
|
|
|
}
|
|
|
|
|
|
2008-04-15 19:17:54 +04:00
|
|
|
|
static int
|
|
|
|
|
sysctl_net_inet_arp_stats(SYSCTLFN_ARGS)
|
|
|
|
|
{
|
|
|
|
|
|
2008-05-13 21:51:26 +04:00
|
|
|
|
return NETSTAT_SYSCTL(arpstat_percpu, ARP_NSTATS);
|
2008-04-15 19:17:54 +04:00
|
|
|
|
}
|
|
|
|
|
|
2009-09-16 19:23:04 +04:00
|
|
|
|
static void
|
|
|
|
|
sysctl_net_inet_arp_setup(struct sysctllog **clog)
|
2004-04-28 18:09:36 +04:00
|
|
|
|
{
|
2005-06-20 06:49:18 +04:00
|
|
|
|
const struct sysctlnode *node;
|
2004-04-28 18:09:36 +04:00
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT,
|
|
|
|
|
CTLTYPE_NODE, "inet", NULL,
|
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
|
CTL_NET, PF_INET, CTL_EOL);
|
|
|
|
|
sysctl_createv(clog, 0, NULL, &node,
|
|
|
|
|
CTLFLAG_PERMANENT,
|
2004-05-25 08:33:59 +04:00
|
|
|
|
CTLTYPE_NODE, "arp",
|
|
|
|
|
SYSCTL_DESCR("Address Resolution Protocol"),
|
2004-04-28 18:09:36 +04:00
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
|
CTL_NET, PF_INET, CTL_CREATE, CTL_EOL);
|
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
2004-05-25 08:33:59 +04:00
|
|
|
|
CTLTYPE_INT, "keep",
|
2011-08-27 13:05:54 +04:00
|
|
|
|
SYSCTL_DESCR("Valid ARP entry lifetime in seconds"),
|
2004-04-28 18:09:36 +04:00
|
|
|
|
NULL, 0, &arpt_keep, 0,
|
|
|
|
|
CTL_NET,PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
2004-05-25 08:33:59 +04:00
|
|
|
|
CTLTYPE_INT, "down",
|
2011-08-27 13:05:54 +04:00
|
|
|
|
SYSCTL_DESCR("Failed ARP entry lifetime in seconds"),
|
2004-04-28 18:09:36 +04:00
|
|
|
|
NULL, 0, &arpt_down, 0,
|
|
|
|
|
CTL_NET,PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
|
|
|
|
|
2008-04-15 19:17:54 +04:00
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT,
|
|
|
|
|
CTLTYPE_STRUCT, "stats",
|
|
|
|
|
SYSCTL_DESCR("ARP statistics"),
|
|
|
|
|
sysctl_net_inet_arp_stats, 0, NULL, 0,
|
|
|
|
|
CTL_NET,PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
2011-08-27 13:05:54 +04:00
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
|
|
|
|
CTLTYPE_INT, "log_movements",
|
|
|
|
|
SYSCTL_DESCR("log ARP replies from MACs different than"
|
|
|
|
|
" the one in the cache"),
|
|
|
|
|
NULL, 0, &log_movements, 0,
|
|
|
|
|
CTL_NET,PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
|
|
|
|
CTLTYPE_INT, "log_permanent_modify",
|
|
|
|
|
SYSCTL_DESCR("log ARP replies from MACs different than"
|
|
|
|
|
" the one in the permanent arp entry"),
|
|
|
|
|
NULL, 0, &log_permanent_modify, 0,
|
|
|
|
|
CTL_NET,PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
|
|
|
|
CTLTYPE_INT, "log_wrong_iface",
|
|
|
|
|
SYSCTL_DESCR("log ARP packets arriving on the wrong"
|
|
|
|
|
" interface"),
|
|
|
|
|
NULL, 0, &log_wrong_iface, 0,
|
|
|
|
|
CTL_NET,PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
2014-11-13 19:11:18 +03:00
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
|
|
|
|
CTLTYPE_INT, "log_unknown_network",
|
|
|
|
|
SYSCTL_DESCR("log ARP packets from non-local network"),
|
|
|
|
|
NULL, 0, &log_unknown_network, 0,
|
|
|
|
|
CTL_NET,PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
2015-05-02 17:41:32 +03:00
|
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
|
|
|
|
CTLTYPE_INT, "debug",
|
|
|
|
|
SYSCTL_DESCR("Enable ARP DAD debug output"),
|
|
|
|
|
NULL, 0, &arp_debug, 0,
|
|
|
|
|
CTL_NET, PF_INET, node->sysctl_num, CTL_CREATE, CTL_EOL);
|
2004-04-28 18:09:36 +04:00
|
|
|
|
}
|
|
|
|
|
|
1994-06-21 07:54:27 +04:00
|
|
|
|
#endif /* INET */
|