2 * ethernet/arp.c: IP v4 ARP node
4 * Copyright (c) 2010 Cisco and/or its affiliates.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
18 #include <vnet/arp/arp.h>
19 #include <vnet/arp/arp_packet.h>
21 #include <vnet/fib/ip4_fib.h>
22 #include <vnet/fib/fib_entry_src.h>
23 #include <vnet/adj/adj_nbr.h>
24 #include <vnet/adj/adj_mcast.h>
25 #include <vnet/pg/pg.h>
27 #include <vnet/ip-neighbor/ip_neighbor.h>
28 #include <vnet/ip-neighbor/ip4_neighbor.h>
29 #include <vnet/ip-neighbor/ip_neighbor_dp.h>
31 #include <vlibmemory/api.h>
37 * This file contains code to manage the IPv4 ARP tables (IP Address
38 * to MAC Address lookup).
42 * @brief Per-interface ARP configuration and state
44 typedef struct ethernet_arp_interface_t_
47 * Is ARP enabled on this interface
50 } ethernet_arp_interface_t;
54 /* Hash tables mapping name to opcode. */
55 uword *opcode_by_name;
57 /** Per interface state */
58 ethernet_arp_interface_t *ethernet_arp_by_sw_if_index;
60 /* ARP feature arc index */
62 } ethernet_arp_main_t;
64 static ethernet_arp_main_t ethernet_arp_main;
66 static const u8 vrrp_prefix[] = { 0x00, 0x00, 0x5E, 0x00, 0x01 };
69 unformat_ethernet_arp_opcode_host_byte_order (unformat_input_t * input,
72 int *result = va_arg (*args, int *);
73 ethernet_arp_main_t *am = ðernet_arp_main;
77 if (unformat (input, "0x%x", &x) || unformat (input, "%d", &x))
86 if (unformat_user (input, unformat_vlib_number_by_name,
87 am->opcode_by_name, &i))
97 unformat_ethernet_arp_opcode_net_byte_order (unformat_input_t * input,
100 int *result = va_arg (*args, int *);
102 (input, unformat_ethernet_arp_opcode_host_byte_order, result))
105 *result = clib_host_to_net_u16 ((u16) * result);
112 } ethernet_arp_input_trace_t;
115 format_ethernet_arp_input_trace (u8 * s, va_list * va)
117 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
118 CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
119 ethernet_arp_input_trace_t *t = va_arg (*va, ethernet_arp_input_trace_t *);
122 format_ethernet_arp_header,
123 t->packet_data, sizeof (t->packet_data));
129 arp_is_enabled (ethernet_arp_main_t * am, u32 sw_if_index)
131 if (vec_len (am->ethernet_arp_by_sw_if_index) <= sw_if_index)
134 return (am->ethernet_arp_by_sw_if_index[sw_if_index].enabled);
138 arp_enable (ethernet_arp_main_t * am, u32 sw_if_index)
140 if (arp_is_enabled (am, sw_if_index))
143 vec_validate (am->ethernet_arp_by_sw_if_index, sw_if_index);
145 am->ethernet_arp_by_sw_if_index[sw_if_index].enabled = 1;
147 vnet_feature_enable_disable ("arp", "arp-reply", sw_if_index, 1, NULL, 0);
148 vnet_feature_enable_disable ("arp", "arp-disabled", sw_if_index, 0, NULL,
153 arp_disable (ethernet_arp_main_t * am, u32 sw_if_index)
155 if (!arp_is_enabled (am, sw_if_index))
158 vnet_feature_enable_disable ("arp", "arp-disabled", sw_if_index, 1, NULL,
160 vnet_feature_enable_disable ("arp", "arp-reply", sw_if_index, 0, NULL, 0);
162 am->ethernet_arp_by_sw_if_index[sw_if_index].enabled = 0;
166 arp_unnumbered (vlib_buffer_t * p0,
167 u32 input_sw_if_index, u32 conn_sw_if_index)
169 vnet_main_t *vnm = vnet_get_main ();
170 vnet_interface_main_t *vim = &vnm->interface_main;
171 vnet_sw_interface_t *si;
173 /* verify that the input interface is unnumbered to the connected.
174 * the connected interface is the interface on which the subnet is
176 si = &vim->sw_interfaces[input_sw_if_index];
178 if (!(si->flags & VNET_SW_INTERFACE_FLAG_UNNUMBERED &&
179 (si->unnumbered_sw_if_index == conn_sw_if_index)))
181 /* the input interface is not unnumbered to the interface on which
182 * the sub-net is configured that covers the ARP request.
183 * So this is not the case for unnumbered.. */
191 arp_learn (u32 sw_if_index,
192 const ethernet_arp_ip4_over_ethernet_address_t * addr)
195 ip_neighbor_learn_t l = {
201 .sw_if_index = sw_if_index,
205 ip_neighbor_learn_dp (&l);
207 return (ETHERNET_ARP_ERROR_l3_src_address_learned);
210 typedef enum arp_input_next_t_
213 ARP_INPUT_NEXT_DISABLED,
218 arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
220 u32 n_left_from, next_index, *from, *to_next, n_left_to_next;
221 ethernet_arp_main_t *am = ðernet_arp_main;
223 from = vlib_frame_vector_args (frame);
224 n_left_from = frame->n_vectors;
225 next_index = node->cached_next_index;
227 if (node->flags & VLIB_NODE_FLAG_TRACE)
228 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
230 sizeof (ethernet_arp_input_trace_t));
232 while (n_left_from > 0)
234 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
236 while (n_left_from > 0 && n_left_to_next > 0)
238 const ethernet_arp_header_t *arp0;
239 arp_input_next_t next0;
243 pi0 = to_next[0] = from[0];
249 p0 = vlib_get_buffer (vm, pi0);
250 arp0 = vlib_buffer_get_current (p0);
252 error0 = ETHERNET_ARP_ERROR_replies_sent;
253 next0 = ARP_INPUT_NEXT_DROP;
257 clib_net_to_host_u16 (ETHERNET_ARP_HARDWARE_TYPE_ethernet) ?
258 ETHERNET_ARP_ERROR_l2_type_not_ethernet : error0);
261 clib_net_to_host_u16 (ETHERNET_TYPE_IP4) ?
262 ETHERNET_ARP_ERROR_l3_type_not_ip4 : error0);
264 (0 == arp0->ip4_over_ethernet[0].ip4.as_u32 ?
265 ETHERNET_ARP_ERROR_l3_dst_address_unset : error0);
267 if (ETHERNET_ARP_ERROR_replies_sent == error0)
269 next0 = ARP_INPUT_NEXT_DISABLED;
270 vnet_feature_arc_start (am->feature_arc_index,
271 vnet_buffer (p0)->sw_if_index[VLIB_RX],
275 p0->error = node->errors[error0];
277 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
278 n_left_to_next, pi0, next0);
281 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
284 return frame->n_vectors;
287 typedef enum arp_disabled_next_t_
289 ARP_DISABLED_NEXT_DROP,
291 } arp_disabled_next_t;
293 #define foreach_arp_disabled_error \
294 _ (DISABLED, "ARP Disabled on this interface") \
298 #define _(sym,string) ARP_DISABLED_ERROR_##sym,
299 foreach_arp_disabled_error
301 ARP_DISABLED_N_ERROR,
302 } arp_disabled_error_t;
304 static char *arp_disabled_error_strings[] = {
305 #define _(sym,string) string,
306 foreach_arp_disabled_error
311 arp_disabled (vlib_main_t * vm,
312 vlib_node_runtime_t * node, vlib_frame_t * frame)
314 u32 n_left_from, next_index, *from, *to_next, n_left_to_next;
316 from = vlib_frame_vector_args (frame);
317 n_left_from = frame->n_vectors;
318 next_index = node->cached_next_index;
320 if (node->flags & VLIB_NODE_FLAG_TRACE)
321 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
323 sizeof (ethernet_arp_input_trace_t));
325 while (n_left_from > 0)
327 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
329 while (n_left_from > 0 && n_left_to_next > 0)
331 arp_disabled_next_t next0 = ARP_DISABLED_NEXT_DROP;
335 next0 = ARP_DISABLED_NEXT_DROP;
336 error0 = ARP_DISABLED_ERROR_DISABLED;
338 pi0 = to_next[0] = from[0];
344 p0 = vlib_get_buffer (vm, pi0);
345 p0->error = node->errors[error0];
347 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
348 n_left_to_next, pi0, next0);
351 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
354 return frame->n_vectors;
357 enum arp_dst_fib_type
365 * we're looking for FIB sources that indicate the destination
366 * is attached. There may be interposed DPO prior to the one
369 static enum arp_dst_fib_type
370 arp_dst_fib_check (const fib_node_index_t fei, fib_entry_flag_t * flags)
372 const fib_entry_t *entry = fib_entry_get (fei);
373 const fib_entry_src_t *entry_src;
376 FOR_EACH_SRC_ADDED(entry, entry_src, src,
378 *flags = fib_entry_get_flags_for_source (fei, src);
379 if (fib_entry_is_sourced (fei, FIB_SOURCE_ADJ))
380 return ARP_DST_FIB_ADJ;
381 else if (FIB_ENTRY_FLAG_CONNECTED & *flags)
382 return ARP_DST_FIB_CONN;
386 return ARP_DST_FIB_NONE;
390 arp_reply (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
392 vnet_main_t *vnm = vnet_get_main ();
393 u32 n_left_from, next_index, *from, *to_next;
394 u32 n_replies_sent = 0;
396 from = vlib_frame_vector_args (frame);
397 n_left_from = frame->n_vectors;
398 next_index = node->cached_next_index;
400 if (node->flags & VLIB_NODE_FLAG_TRACE)
401 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
403 sizeof (ethernet_arp_input_trace_t));
405 while (n_left_from > 0)
409 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
411 while (n_left_from > 0 && n_left_to_next > 0)
414 ethernet_arp_header_t *arp0;
415 ethernet_header_t *eth_rx;
416 const ip4_address_t *if_addr0;
417 u32 pi0, error0, next0, sw_if_index0, conn_sw_if_index0, fib_index0;
418 u8 dst_is_local0, is_vrrp_reply0;
419 fib_node_index_t dst_fei, src_fei;
420 const fib_prefix_t *pfx0;
421 fib_entry_flag_t src_flags, dst_flags;
430 p0 = vlib_get_buffer (vm, pi0);
431 arp0 = vlib_buffer_get_current (p0);
432 /* Fill in ethernet header. */
433 eth_rx = ethernet_buffer_get_header (p0);
435 next0 = ARP_REPLY_NEXT_DROP;
436 error0 = ETHERNET_ARP_ERROR_replies_sent;
437 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
439 /* Check that IP address is local and matches incoming interface. */
440 fib_index0 = ip4_fib_table_get_index_for_sw_if_index (sw_if_index0);
441 if (~0 == fib_index0)
443 error0 = ETHERNET_ARP_ERROR_interface_no_table;
450 * we're looking for FIB entries that indicate the source
451 * is attached. There may be more specific non-attached
452 * routes that match the source, but these do not influence
453 * whether we respond to an ARP request, i.e. they do not
454 * influence whether we are the correct way for the sender
455 * to reach us, they only affect how we reach the sender.
457 fib_entry_t *src_fib_entry;
458 const fib_prefix_t *pfx;
459 fib_entry_src_t *src;
469 src_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
471 ip4_over_ethernet[0].ip4,
473 src_fib_entry = fib_entry_get (src_fei);
476 * It's possible that the source that provides the
477 * flags we need, or the flags we must not have,
478 * is not the best source, so check then all.
481 FOR_EACH_SRC_ADDED(src_fib_entry, src, source,
483 src_flags = fib_entry_get_flags_for_source (src_fei, source);
485 /* Reject requests/replies with our local interface
487 if (FIB_ENTRY_FLAG_LOCAL & src_flags)
489 error0 = ETHERNET_ARP_ERROR_l3_src_address_is_local;
491 * When VPP has an interface whose address is also
492 * applied to a TAP interface on the host, then VPP's
493 * TAP interface will be unnumbered to the 'real'
494 * interface and do proxy ARP from the host.
495 * The curious aspect of this setup is that ARP requests
496 * from the host will come from the VPP's own address.
497 * So don't drop immediately here, instead go see if this
498 * is a proxy ARP case.
502 /* A Source must also be local to subnet of matching
503 * interface address. */
504 if ((FIB_ENTRY_FLAG_ATTACHED & src_flags) ||
505 (FIB_ENTRY_FLAG_CONNECTED & src_flags))
512 * The packet was sent from an address that is not
513 * connected nor attached i.e. it is not from an
514 * address that is covered by a link's sub-net,
515 * nor is it a already learned host resp.
521 * shorter mask lookup for the next iteration.
523 pfx = fib_entry_get_prefix (src_fei);
524 mask = pfx->fp_len - 1;
527 * continue until we hit the default route or we find
528 * the attached we are looking for. The most likely
529 * outcome is we find the attached with the first source
530 * on the first lookup.
534 !fib_entry_is_sourced (src_fei, FIB_SOURCE_DEFAULT_ROUTE));
539 * the matching route is a not attached, i.e. it was
540 * added as a result of routing, rather than interface/ARP
541 * configuration. If the matching route is not a host route
544 error0 = ETHERNET_ARP_ERROR_l3_src_address_not_local;
549 dst_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
550 &arp0->ip4_over_ethernet[1].ip4,
552 conn_sw_if_index0 = fib_entry_get_any_resolving_interface (dst_fei);
554 switch (arp_dst_fib_check (dst_fei, &dst_flags))
556 case ARP_DST_FIB_ADJ:
558 * We matched an adj-fib on ths source subnet (a /32 previously
559 * added as a result of ARP). If this request is a gratuitous
560 * ARP, then learn from it.
561 * The check for matching an adj-fib, is to prevent hosts
562 * from spamming us with gratuitous ARPS that might otherwise
565 if (conn_sw_if_index0 != sw_if_index0)
566 error0 = ETHERNET_ARP_ERROR_l3_dst_address_not_local;
567 else if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
568 arp0->ip4_over_ethernet[1].ip4.as_u32)
570 vlib_increment_simple_counter (
571 &ip_neighbor_counters[AF_IP4]
572 .ipnc[VLIB_RX][IP_NEIGHBOR_CTR_GRAT],
573 vm->thread_index, sw_if_index0, 1);
575 arp_learn (sw_if_index0, &arp0->ip4_over_ethernet[0]);
578 case ARP_DST_FIB_CONN:
579 /* destination is connected, continue to process */
581 case ARP_DST_FIB_NONE:
582 /* destination is not connected, stop here */
583 error0 = ETHERNET_ARP_ERROR_l3_dst_address_not_local;
587 dst_is_local0 = (FIB_ENTRY_FLAG_LOCAL & dst_flags);
588 pfx0 = fib_entry_get_prefix (dst_fei);
589 if_addr0 = &pfx0->fp_addr.ip4;
593 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
596 (arp0->ip4_over_ethernet[0].mac.bytes, vrrp_prefix,
597 sizeof (vrrp_prefix))));
599 /* Trash ARP packets whose ARP-level source addresses do not
600 match their L2-frame-level source addresses, unless it's
601 a reply from a VRRP virtual router */
602 if (!ethernet_mac_address_equal
603 (eth_rx->src_address,
604 arp0->ip4_over_ethernet[0].mac.bytes) && !is_vrrp_reply0)
606 error0 = ETHERNET_ARP_ERROR_l2_address_mismatch;
610 vlib_increment_simple_counter (
611 &ip_neighbor_counters[AF_IP4]
612 .ipnc[VLIB_RX][arp0->opcode == clib_host_to_net_u16 (
613 ETHERNET_ARP_OPCODE_reply) ?
614 IP_NEIGHBOR_CTR_REPLY :
615 IP_NEIGHBOR_CTR_REQUEST],
616 vm->thread_index, sw_if_index0, 1);
618 /* Learn or update sender's mapping only for replies to addresses
619 * that are local to the subnet */
621 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
625 arp_learn (sw_if_index0, &arp0->ip4_over_ethernet[0]);
627 /* a reply for a non-local destination could be a GARP.
628 * GARPs for hosts we know were handled above, so this one
630 error0 = ETHERNET_ARP_ERROR_l3_dst_address_not_local;
634 else if (arp0->opcode ==
635 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request) &&
636 (dst_is_local0 == 0))
641 /* Honor unnumbered interface, if any */
642 if (sw_if_index0 != conn_sw_if_index0 ||
643 sw_if_index0 != fib_entry_get_resolving_interface (src_fei))
646 * The interface the ARP is sent to or was received on is not the
647 * interface on which the covering prefix is configured.
648 * Maybe this is a case for unnumbered.
650 if (!arp_unnumbered (p0, sw_if_index0, conn_sw_if_index0))
652 error0 = ETHERNET_ARP_ERROR_unnumbered_mismatch;
656 if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
657 arp0->ip4_over_ethernet[1].ip4.as_u32)
659 error0 = ETHERNET_ARP_ERROR_gratuitous_arp;
663 next0 = arp_mk_reply (vnm, p0, sw_if_index0,
664 if_addr0, arp0, eth_rx);
666 /* We are going to reply to this request, so, in the absence of
667 errors, learn the sender */
669 error0 = arp_learn (sw_if_index0, &arp0->ip4_over_ethernet[1]);
671 vlib_increment_simple_counter (
672 &ip_neighbor_counters[AF_IP4].ipnc[VLIB_TX][IP_NEIGHBOR_CTR_REPLY],
673 vm->thread_index, sw_if_index0, 1);
678 vnet_feature_next (&next0, p0);
682 p0->error = node->errors[error0];
685 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
686 n_left_to_next, pi0, next0);
689 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
692 vlib_error_count (vm, node->node_index,
693 ETHERNET_ARP_ERROR_replies_sent, n_replies_sent);
695 return frame->n_vectors;
699 static char *ethernet_arp_error_strings[] = {
700 #define _(sym,string) string,
701 foreach_ethernet_arp_error
707 VLIB_REGISTER_NODE (arp_input_node, static) =
709 .function = arp_input,
711 .vector_size = sizeof (u32),
712 .n_errors = ETHERNET_ARP_N_ERROR,
713 .error_strings = ethernet_arp_error_strings,
714 .n_next_nodes = ARP_INPUT_N_NEXT,
716 [ARP_INPUT_NEXT_DROP] = "error-drop",
717 [ARP_INPUT_NEXT_DISABLED] = "arp-disabled",
719 .format_buffer = format_ethernet_arp_header,
720 .format_trace = format_ethernet_arp_input_trace,
723 VLIB_REGISTER_NODE (arp_disabled_node, static) =
725 .function = arp_disabled,
726 .name = "arp-disabled",
727 .vector_size = sizeof (u32),
728 .n_errors = ARP_DISABLED_N_ERROR,
729 .error_strings = arp_disabled_error_strings,
730 .n_next_nodes = ARP_DISABLED_N_NEXT,
732 [ARP_INPUT_NEXT_DROP] = "error-drop",
734 .format_buffer = format_ethernet_arp_header,
735 .format_trace = format_ethernet_arp_input_trace,
738 VLIB_REGISTER_NODE (arp_reply_node, static) =
740 .function = arp_reply,
742 .vector_size = sizeof (u32),
743 .n_errors = ETHERNET_ARP_N_ERROR,
744 .error_strings = ethernet_arp_error_strings,
745 .n_next_nodes = ARP_REPLY_N_NEXT,
747 [ARP_REPLY_NEXT_DROP] = "error-drop",
748 [ARP_REPLY_NEXT_REPLY_TX] = "interface-output",
750 .format_buffer = format_ethernet_arp_header,
751 .format_trace = format_ethernet_arp_input_trace,
754 /* Built-in ARP rx feature path definition */
755 VNET_FEATURE_ARC_INIT (arp_feat, static) =
758 .start_nodes = VNET_FEATURES ("arp-input"),
759 .last_in_arc = "error-drop",
760 .arc_index_ptr = ðernet_arp_main.feature_arc_index,
763 VNET_FEATURE_INIT (arp_reply_feat_node, static) =
766 .node_name = "arp-reply",
767 .runs_before = VNET_FEATURES ("arp-disabled"),
770 VNET_FEATURE_INIT (arp_proxy_feat_node, static) =
773 .node_name = "arp-proxy",
774 .runs_after = VNET_FEATURES ("arp-reply"),
775 .runs_before = VNET_FEATURES ("arp-disabled"),
778 VNET_FEATURE_INIT (arp_disabled_feat_node, static) =
781 .node_name = "arp-disabled",
782 .runs_before = VNET_FEATURES ("error-drop"),
785 VNET_FEATURE_INIT (arp_drop_feat_node, static) =
788 .node_name = "error-drop",
789 .runs_before = 0, /* last feature */
796 pg_edit_t l2_type, l3_type;
797 pg_edit_t n_l2_address_bytes, n_l3_address_bytes;
803 } ip4_over_ethernet[2];
804 } pg_ethernet_arp_header_t;
807 pg_ethernet_arp_header_init (pg_ethernet_arp_header_t * p)
809 /* Initialize fields that are not bit fields in the IP header. */
810 #define _(f) pg_edit_init (&p->f, ethernet_arp_header_t, f);
813 _(n_l2_address_bytes);
814 _(n_l3_address_bytes);
816 _(ip4_over_ethernet[0].mac);
817 _(ip4_over_ethernet[0].ip4);
818 _(ip4_over_ethernet[1].mac);
819 _(ip4_over_ethernet[1].ip4);
824 unformat_pg_arp_header (unformat_input_t * input, va_list * args)
826 pg_stream_t *s = va_arg (*args, pg_stream_t *);
827 pg_ethernet_arp_header_t *p;
830 p = pg_create_edit_group (s, sizeof (p[0]), sizeof (ethernet_arp_header_t),
832 pg_ethernet_arp_header_init (p);
835 pg_edit_set_fixed (&p->l2_type, ETHERNET_ARP_HARDWARE_TYPE_ethernet);
836 pg_edit_set_fixed (&p->l3_type, ETHERNET_TYPE_IP4);
837 pg_edit_set_fixed (&p->n_l2_address_bytes, 6);
838 pg_edit_set_fixed (&p->n_l3_address_bytes, 4);
840 if (!unformat (input, "%U: %U/%U -> %U/%U",
842 unformat_ethernet_arp_opcode_net_byte_order, &p->opcode,
844 unformat_mac_address_t, &p->ip4_over_ethernet[0].mac,
846 unformat_ip4_address, &p->ip4_over_ethernet[0].ip4,
848 unformat_mac_address_t, &p->ip4_over_ethernet[1].mac,
850 unformat_ip4_address, &p->ip4_over_ethernet[1].ip4))
852 /* Free up any edits we may have added. */
853 pg_free_edit_group (s);
860 * callback when an interface address is added or deleted
863 arp_enable_disable_interface (ip4_main_t * im,
864 uword opaque, u32 sw_if_index, u32 is_enable)
866 ethernet_arp_main_t *am = ðernet_arp_main;
869 arp_enable (am, sw_if_index);
871 arp_disable (am, sw_if_index);
875 * Remove any arp entries associated with the specified interface
877 static clib_error_t *
878 vnet_arp_add_del_sw_interface (vnet_main_t * vnm, u32 sw_if_index, u32 is_add)
880 ethernet_arp_main_t *am = ðernet_arp_main;
882 arp_disable (am, sw_if_index);
886 VNET_SW_INTERFACE_ADD_DEL_FUNCTION (vnet_arp_add_del_sw_interface);
888 const static ip_neighbor_vft_t arp_vft = {
889 .inv_proxy4_add = arp_proxy_add,
890 .inv_proxy4_del = arp_proxy_del,
891 .inv_proxy4_enable = arp_proxy_enable,
892 .inv_proxy4_disable = arp_proxy_disable,
895 static clib_error_t *
896 ethernet_arp_init (vlib_main_t * vm)
898 ethernet_arp_main_t *am = ðernet_arp_main;
899 ip4_main_t *im = &ip4_main;
902 ethernet_register_input_type (vm, ETHERNET_TYPE_ARP, arp_input_node.index);
904 pn = pg_get_node (arp_input_node.index);
905 pn->unformat_edit = unformat_pg_arp_header;
907 am->opcode_by_name = hash_create_string (0, sizeof (uword));
908 #define _(o) hash_set_mem (am->opcode_by_name, #o, ETHERNET_ARP_OPCODE_##o);
909 foreach_ethernet_arp_opcode;
912 /* don't trace ARP error packets */
914 vlib_node_runtime_t *rt =
915 vlib_node_get_runtime (vm, arp_input_node.index);
918 vnet_pcap_drop_trace_filter_add_del \
919 (rt->errors[ETHERNET_ARP_ERROR_##a], \
921 foreach_ethernet_arp_error
926 ip4_enable_disable_interface_callback_t cb = {
927 .function = arp_enable_disable_interface,
929 vec_add1 (im->enable_disable_interface_callbacks, cb);
932 ip_neighbor_register (AF_IP4, &arp_vft);
938 VLIB_INIT_FUNCTION (ethernet_arp_init) =
940 .runs_after = VLIB_INITS("ethernet_init",
946 * fd.io coding-style-patch-verification: ON
949 * eval: (c-set-style "gnu")