2 * ethernet/arp.c: IP v4 ARP node
4 * Copyright (c) 2010 Cisco and/or its affiliates.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
18 #include <vnet/arp/arp.h>
19 #include <vnet/arp/arp_packet.h>
21 #include <vnet/fib/ip4_fib.h>
22 #include <vnet/fib/fib_entry_src.h>
23 #include <vnet/adj/adj_nbr.h>
24 #include <vnet/adj/adj_mcast.h>
25 #include <vnet/pg/pg.h>
27 #include <vnet/ip-neighbor/ip_neighbor.h>
28 #include <vnet/ip-neighbor/ip4_neighbor.h>
29 #include <vnet/ip-neighbor/ip_neighbor_dp.h>
31 #include <vlibmemory/api.h>
37 * This file contains code to manage the IPv4 ARP tables (IP Address
38 * to MAC Address lookup).
42 * @brief Per-interface ARP configuration and state
44 typedef struct ethernet_arp_interface_t_
47 * Is ARP enabled on this interface
50 } ethernet_arp_interface_t;
54 /* Hash tables mapping name to opcode. */
55 uword *opcode_by_name;
57 /** Per interface state */
58 ethernet_arp_interface_t *ethernet_arp_by_sw_if_index;
60 /* ARP feature arc index */
62 } ethernet_arp_main_t;
64 static ethernet_arp_main_t ethernet_arp_main;
66 static const u8 vrrp_prefix[] = { 0x00, 0x00, 0x5E, 0x00, 0x01 };
69 unformat_ethernet_arp_opcode_host_byte_order (unformat_input_t * input,
72 int *result = va_arg (*args, int *);
73 ethernet_arp_main_t *am = ðernet_arp_main;
77 if (unformat (input, "0x%x", &x) || unformat (input, "%d", &x))
86 if (unformat_user (input, unformat_vlib_number_by_name,
87 am->opcode_by_name, &i))
97 unformat_ethernet_arp_opcode_net_byte_order (unformat_input_t * input,
100 int *result = va_arg (*args, int *);
102 (input, unformat_ethernet_arp_opcode_host_byte_order, result))
105 *result = clib_host_to_net_u16 ((u16) * result);
112 } ethernet_arp_input_trace_t;
115 format_ethernet_arp_input_trace (u8 * s, va_list * va)
117 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
118 CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
119 ethernet_arp_input_trace_t *t = va_arg (*va, ethernet_arp_input_trace_t *);
122 format_ethernet_arp_header,
123 t->packet_data, sizeof (t->packet_data));
129 arp_is_enabled (ethernet_arp_main_t * am, u32 sw_if_index)
131 if (vec_len (am->ethernet_arp_by_sw_if_index) <= sw_if_index)
134 return (am->ethernet_arp_by_sw_if_index[sw_if_index].enabled);
138 arp_enable (ethernet_arp_main_t * am, u32 sw_if_index)
140 if (arp_is_enabled (am, sw_if_index))
143 vec_validate (am->ethernet_arp_by_sw_if_index, sw_if_index);
145 am->ethernet_arp_by_sw_if_index[sw_if_index].enabled = 1;
147 vnet_feature_enable_disable ("arp", "arp-reply", sw_if_index, 1, NULL, 0);
148 vnet_feature_enable_disable ("arp", "arp-disabled", sw_if_index, 0, NULL,
153 arp_disable (ethernet_arp_main_t * am, u32 sw_if_index)
155 if (!arp_is_enabled (am, sw_if_index))
158 vnet_feature_enable_disable ("arp", "arp-disabled", sw_if_index, 1, NULL,
160 vnet_feature_enable_disable ("arp", "arp-reply", sw_if_index, 0, NULL, 0);
162 am->ethernet_arp_by_sw_if_index[sw_if_index].enabled = 0;
166 arp_unnumbered (vlib_buffer_t * p0,
167 u32 input_sw_if_index, u32 conn_sw_if_index)
169 vnet_main_t *vnm = vnet_get_main ();
170 vnet_interface_main_t *vim = &vnm->interface_main;
171 vnet_sw_interface_t *si;
173 /* verify that the input interface is unnumbered to the connected.
174 * the connected interface is the interface on which the subnet is
176 si = &vim->sw_interfaces[input_sw_if_index];
178 if (!(si->flags & VNET_SW_INTERFACE_FLAG_UNNUMBERED &&
179 (si->unnumbered_sw_if_index == conn_sw_if_index)))
181 /* the input interface is not unnumbered to the interface on which
182 * the sub-net is configured that covers the ARP request.
183 * So this is not the case for unnumbered.. */
191 arp_learn (u32 sw_if_index,
192 const ethernet_arp_ip4_over_ethernet_address_t * addr)
195 ip_neighbor_learn_t l = {
201 .sw_if_index = sw_if_index,
205 ip_neighbor_learn_dp (&l);
207 return (ARP_ERROR_L3_SRC_ADDRESS_LEARNED);
210 typedef enum arp_input_next_t_
213 ARP_INPUT_NEXT_DISABLED,
218 arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
220 u32 n_left_from, next_index, *from, *to_next, n_left_to_next;
221 ethernet_arp_main_t *am = ðernet_arp_main;
223 from = vlib_frame_vector_args (frame);
224 n_left_from = frame->n_vectors;
225 next_index = node->cached_next_index;
227 if (node->flags & VLIB_NODE_FLAG_TRACE)
228 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
230 sizeof (ethernet_arp_input_trace_t));
232 while (n_left_from > 0)
234 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
236 while (n_left_from > 0 && n_left_to_next > 0)
238 const ethernet_arp_header_t *arp0;
239 arp_input_next_t next0;
243 pi0 = to_next[0] = from[0];
249 p0 = vlib_get_buffer (vm, pi0);
250 arp0 = vlib_buffer_get_current (p0);
252 error0 = ARP_ERROR_REPLIES_SENT;
253 next0 = ARP_INPUT_NEXT_DROP;
255 error0 = (arp0->l2_type != clib_net_to_host_u16 (
256 ETHERNET_ARP_HARDWARE_TYPE_ethernet) ?
257 ARP_ERROR_L2_TYPE_NOT_ETHERNET :
259 error0 = (arp0->l3_type != clib_net_to_host_u16 (ETHERNET_TYPE_IP4) ?
260 ARP_ERROR_L3_TYPE_NOT_IP4 :
262 error0 = (0 == arp0->ip4_over_ethernet[0].ip4.as_u32 ?
263 ARP_ERROR_L3_DST_ADDRESS_UNSET :
266 if (ARP_ERROR_REPLIES_SENT == error0)
268 next0 = ARP_INPUT_NEXT_DISABLED;
269 vnet_feature_arc_start (am->feature_arc_index,
270 vnet_buffer (p0)->sw_if_index[VLIB_RX],
274 p0->error = node->errors[error0];
276 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
277 n_left_to_next, pi0, next0);
280 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
283 return frame->n_vectors;
286 typedef enum arp_disabled_next_t_
288 ARP_DISABLED_NEXT_DROP,
290 } arp_disabled_next_t;
293 arp_disabled (vlib_main_t * vm,
294 vlib_node_runtime_t * node, vlib_frame_t * frame)
296 u32 n_left_from, next_index, *from, *to_next, n_left_to_next;
298 from = vlib_frame_vector_args (frame);
299 n_left_from = frame->n_vectors;
300 next_index = node->cached_next_index;
302 if (node->flags & VLIB_NODE_FLAG_TRACE)
303 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
305 sizeof (ethernet_arp_input_trace_t));
307 while (n_left_from > 0)
309 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
311 while (n_left_from > 0 && n_left_to_next > 0)
313 arp_disabled_next_t next0 = ARP_DISABLED_NEXT_DROP;
317 next0 = ARP_DISABLED_NEXT_DROP;
318 error0 = ARP_ERROR_DISABLED;
320 pi0 = to_next[0] = from[0];
326 p0 = vlib_get_buffer (vm, pi0);
327 p0->error = node->errors[error0];
329 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
330 n_left_to_next, pi0, next0);
333 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
336 return frame->n_vectors;
339 enum arp_dst_fib_type
347 * we're looking for FIB sources that indicate the destination
348 * is attached. There may be interposed DPO prior to the one
351 static enum arp_dst_fib_type
352 arp_dst_fib_check (const fib_node_index_t fei, fib_entry_flag_t * flags)
354 const fib_entry_t *entry = fib_entry_get (fei);
355 const fib_entry_src_t *entry_src;
358 FOR_EACH_SRC_ADDED(entry, entry_src, src,
360 *flags = fib_entry_get_flags_for_source (fei, src);
361 if (fib_entry_is_sourced (fei, FIB_SOURCE_ADJ))
362 return ARP_DST_FIB_ADJ;
363 else if (FIB_ENTRY_FLAG_CONNECTED & *flags)
364 return ARP_DST_FIB_CONN;
368 return ARP_DST_FIB_NONE;
372 arp_reply (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
374 vnet_main_t *vnm = vnet_get_main ();
375 u32 n_left_from, next_index, *from, *to_next;
376 u32 n_replies_sent = 0;
378 from = vlib_frame_vector_args (frame);
379 n_left_from = frame->n_vectors;
380 next_index = node->cached_next_index;
382 if (node->flags & VLIB_NODE_FLAG_TRACE)
383 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
385 sizeof (ethernet_arp_input_trace_t));
387 while (n_left_from > 0)
391 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
393 while (n_left_from > 0 && n_left_to_next > 0)
396 ethernet_arp_header_t *arp0;
397 ethernet_header_t *eth_rx;
398 const ip4_address_t *if_addr0;
399 u32 pi0, error0, next0, sw_if_index0, conn_sw_if_index0, fib_index0;
400 u8 dst_is_local0, is_vrrp_reply0;
401 fib_node_index_t dst_fei, src_fei;
402 const fib_prefix_t *pfx0;
403 fib_entry_flag_t src_flags, dst_flags;
412 p0 = vlib_get_buffer (vm, pi0);
413 arp0 = vlib_buffer_get_current (p0);
414 /* Fill in ethernet header. */
415 eth_rx = ethernet_buffer_get_header (p0);
417 next0 = ARP_REPLY_NEXT_DROP;
418 error0 = ARP_ERROR_REPLIES_SENT;
419 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
421 /* Check that IP address is local and matches incoming interface. */
422 fib_index0 = ip4_fib_table_get_index_for_sw_if_index (sw_if_index0);
423 if (~0 == fib_index0)
425 error0 = ARP_ERROR_INTERFACE_NO_TABLE;
432 * we're looking for FIB entries that indicate the source
433 * is attached. There may be more specific non-attached
434 * routes that match the source, but these do not influence
435 * whether we respond to an ARP request, i.e. they do not
436 * influence whether we are the correct way for the sender
437 * to reach us, they only affect how we reach the sender.
439 fib_entry_t *src_fib_entry;
440 const fib_prefix_t *pfx;
441 fib_entry_src_t *src;
451 src_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
453 ip4_over_ethernet[0].ip4,
455 src_fib_entry = fib_entry_get (src_fei);
458 * It's possible that the source that provides the
459 * flags we need, or the flags we must not have,
460 * is not the best source, so check then all.
463 FOR_EACH_SRC_ADDED(src_fib_entry, src, source,
465 src_flags = fib_entry_get_flags_for_source (src_fei, source);
467 /* Reject requests/replies with our local interface
469 if (FIB_ENTRY_FLAG_LOCAL & src_flags)
471 error0 = ARP_ERROR_L3_SRC_ADDRESS_IS_LOCAL;
473 * When VPP has an interface whose address is also
474 * applied to a TAP interface on the host, then VPP's
475 * TAP interface will be unnumbered to the 'real'
476 * interface and do proxy ARP from the host.
477 * The curious aspect of this setup is that ARP requests
478 * from the host will come from the VPP's own address.
479 * So don't drop immediately here, instead go see if this
480 * is a proxy ARP case.
484 /* A Source must also be local to subnet of matching
485 * interface address. */
486 if ((FIB_ENTRY_FLAG_ATTACHED & src_flags) ||
487 (FIB_ENTRY_FLAG_CONNECTED & src_flags))
494 * The packet was sent from an address that is not
495 * connected nor attached i.e. it is not from an
496 * address that is covered by a link's sub-net,
497 * nor is it a already learned host resp.
503 * shorter mask lookup for the next iteration.
505 pfx = fib_entry_get_prefix (src_fei);
506 mask = pfx->fp_len - 1;
509 * continue until we hit the default route or we find
510 * the attached we are looking for. The most likely
511 * outcome is we find the attached with the first source
512 * on the first lookup.
516 !fib_entry_is_sourced (src_fei, FIB_SOURCE_DEFAULT_ROUTE));
521 * the matching route is a not attached, i.e. it was
522 * added as a result of routing, rather than interface/ARP
523 * configuration. If the matching route is not a host route
526 error0 = ARP_ERROR_L3_SRC_ADDRESS_NOT_LOCAL;
531 dst_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
532 &arp0->ip4_over_ethernet[1].ip4,
534 conn_sw_if_index0 = fib_entry_get_any_resolving_interface (dst_fei);
536 switch (arp_dst_fib_check (dst_fei, &dst_flags))
538 case ARP_DST_FIB_ADJ:
540 * We matched an adj-fib on ths source subnet (a /32 previously
541 * added as a result of ARP). If this request is a gratuitous
542 * ARP, then learn from it.
543 * The check for matching an adj-fib, is to prevent hosts
544 * from spamming us with gratuitous ARPS that might otherwise
547 if (conn_sw_if_index0 != sw_if_index0)
548 error0 = ARP_ERROR_L3_DST_ADDRESS_NOT_LOCAL;
549 else if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
550 arp0->ip4_over_ethernet[1].ip4.as_u32)
552 vlib_increment_simple_counter (
553 &ip_neighbor_counters[AF_IP4]
554 .ipnc[VLIB_RX][IP_NEIGHBOR_CTR_GRAT],
555 vm->thread_index, sw_if_index0, 1);
557 arp_learn (sw_if_index0, &arp0->ip4_over_ethernet[0]);
560 case ARP_DST_FIB_CONN:
561 /* destination is connected, continue to process */
563 case ARP_DST_FIB_NONE:
564 /* destination is not connected, stop here */
565 error0 = ARP_ERROR_L3_DST_ADDRESS_NOT_LOCAL;
569 dst_is_local0 = (FIB_ENTRY_FLAG_LOCAL & dst_flags);
570 pfx0 = fib_entry_get_prefix (dst_fei);
571 if_addr0 = &pfx0->fp_addr.ip4;
575 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
578 (arp0->ip4_over_ethernet[0].mac.bytes, vrrp_prefix,
579 sizeof (vrrp_prefix))));
581 /* Trash ARP packets whose ARP-level source addresses do not
582 match their L2-frame-level source addresses, unless it's
583 a reply from a VRRP virtual router */
584 if (!ethernet_mac_address_equal
585 (eth_rx->src_address,
586 arp0->ip4_over_ethernet[0].mac.bytes) && !is_vrrp_reply0)
588 error0 = ARP_ERROR_L2_ADDRESS_MISMATCH;
592 vlib_increment_simple_counter (
593 &ip_neighbor_counters[AF_IP4]
594 .ipnc[VLIB_RX][arp0->opcode == clib_host_to_net_u16 (
595 ETHERNET_ARP_OPCODE_reply) ?
596 IP_NEIGHBOR_CTR_REPLY :
597 IP_NEIGHBOR_CTR_REQUEST],
598 vm->thread_index, sw_if_index0, 1);
600 /* Learn or update sender's mapping only for replies to addresses
601 * that are local to the subnet */
603 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
607 arp_learn (sw_if_index0, &arp0->ip4_over_ethernet[0]);
609 /* a reply for a non-local destination could be a GARP.
610 * GARPs for hosts we know were handled above, so this one
612 error0 = ARP_ERROR_L3_DST_ADDRESS_NOT_LOCAL;
616 else if (arp0->opcode ==
617 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request) &&
618 (dst_is_local0 == 0))
623 /* Honor unnumbered interface, if any */
624 if (sw_if_index0 != conn_sw_if_index0 ||
625 sw_if_index0 != fib_entry_get_resolving_interface (src_fei))
628 * The interface the ARP is sent to or was received on is not the
629 * interface on which the covering prefix is configured.
630 * Maybe this is a case for unnumbered.
632 if (!arp_unnumbered (p0, sw_if_index0, conn_sw_if_index0))
634 error0 = ARP_ERROR_UNNUMBERED_MISMATCH;
638 if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
639 arp0->ip4_over_ethernet[1].ip4.as_u32)
641 error0 = ARP_ERROR_GRATUITOUS_ARP;
645 next0 = arp_mk_reply (vnm, p0, sw_if_index0,
646 if_addr0, arp0, eth_rx);
648 /* We are going to reply to this request, so, in the absence of
649 errors, learn the sender */
651 error0 = arp_learn (sw_if_index0, &arp0->ip4_over_ethernet[1]);
653 vlib_increment_simple_counter (
654 &ip_neighbor_counters[AF_IP4].ipnc[VLIB_TX][IP_NEIGHBOR_CTR_REPLY],
655 vm->thread_index, sw_if_index0, 1);
660 vnet_feature_next (&next0, p0);
664 p0->error = node->errors[error0];
667 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
668 n_left_to_next, pi0, next0);
671 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
674 vlib_error_count (vm, node->node_index, ARP_ERROR_REPLIES_SENT,
677 return frame->n_vectors;
683 VLIB_REGISTER_NODE (arp_input_node, static) =
685 .function = arp_input,
687 .vector_size = sizeof (u32),
688 .n_errors = ARP_N_ERROR,
689 .error_counters = arp_error_counters,
690 .n_next_nodes = ARP_INPUT_N_NEXT,
692 [ARP_INPUT_NEXT_DROP] = "error-drop",
693 [ARP_INPUT_NEXT_DISABLED] = "arp-disabled",
695 .format_buffer = format_ethernet_arp_header,
696 .format_trace = format_ethernet_arp_input_trace,
699 VLIB_REGISTER_NODE (arp_disabled_node, static) =
701 .function = arp_disabled,
702 .name = "arp-disabled",
703 .vector_size = sizeof (u32),
704 .n_errors = ARP_N_ERROR,
705 .error_counters = arp_error_counters,
706 .n_next_nodes = ARP_DISABLED_N_NEXT,
708 [ARP_INPUT_NEXT_DROP] = "error-drop",
710 .format_buffer = format_ethernet_arp_header,
711 .format_trace = format_ethernet_arp_input_trace,
714 VLIB_REGISTER_NODE (arp_reply_node, static) =
716 .function = arp_reply,
718 .vector_size = sizeof (u32),
719 .n_errors = ARP_N_ERROR,
720 .error_counters = arp_error_counters,
721 .n_next_nodes = ARP_REPLY_N_NEXT,
723 [ARP_REPLY_NEXT_DROP] = "error-drop",
724 [ARP_REPLY_NEXT_REPLY_TX] = "interface-output",
726 .format_buffer = format_ethernet_arp_header,
727 .format_trace = format_ethernet_arp_input_trace,
730 /* Built-in ARP rx feature path definition */
731 VNET_FEATURE_ARC_INIT (arp_feat, static) =
734 .start_nodes = VNET_FEATURES ("arp-input"),
735 .last_in_arc = "error-drop",
736 .arc_index_ptr = ðernet_arp_main.feature_arc_index,
739 VNET_FEATURE_INIT (arp_reply_feat_node, static) =
742 .node_name = "arp-reply",
743 .runs_before = VNET_FEATURES ("arp-disabled"),
746 VNET_FEATURE_INIT (arp_proxy_feat_node, static) =
749 .node_name = "arp-proxy",
750 .runs_after = VNET_FEATURES ("arp-reply"),
751 .runs_before = VNET_FEATURES ("arp-disabled"),
754 VNET_FEATURE_INIT (arp_disabled_feat_node, static) =
757 .node_name = "arp-disabled",
758 .runs_before = VNET_FEATURES ("error-drop"),
761 VNET_FEATURE_INIT (arp_drop_feat_node, static) =
764 .node_name = "error-drop",
765 .runs_before = 0, /* last feature */
772 pg_edit_t l2_type, l3_type;
773 pg_edit_t n_l2_address_bytes, n_l3_address_bytes;
779 } ip4_over_ethernet[2];
780 } pg_ethernet_arp_header_t;
783 pg_ethernet_arp_header_init (pg_ethernet_arp_header_t * p)
785 /* Initialize fields that are not bit fields in the IP header. */
786 #define _(f) pg_edit_init (&p->f, ethernet_arp_header_t, f);
789 _(n_l2_address_bytes);
790 _(n_l3_address_bytes);
792 _(ip4_over_ethernet[0].mac);
793 _(ip4_over_ethernet[0].ip4);
794 _(ip4_over_ethernet[1].mac);
795 _(ip4_over_ethernet[1].ip4);
800 unformat_pg_arp_header (unformat_input_t * input, va_list * args)
802 pg_stream_t *s = va_arg (*args, pg_stream_t *);
803 pg_ethernet_arp_header_t *p;
806 p = pg_create_edit_group (s, sizeof (p[0]), sizeof (ethernet_arp_header_t),
808 pg_ethernet_arp_header_init (p);
811 pg_edit_set_fixed (&p->l2_type, ETHERNET_ARP_HARDWARE_TYPE_ethernet);
812 pg_edit_set_fixed (&p->l3_type, ETHERNET_TYPE_IP4);
813 pg_edit_set_fixed (&p->n_l2_address_bytes, 6);
814 pg_edit_set_fixed (&p->n_l3_address_bytes, 4);
816 if (!unformat (input, "%U: %U/%U -> %U/%U",
818 unformat_ethernet_arp_opcode_net_byte_order, &p->opcode,
820 unformat_mac_address_t, &p->ip4_over_ethernet[0].mac,
822 unformat_ip4_address, &p->ip4_over_ethernet[0].ip4,
824 unformat_mac_address_t, &p->ip4_over_ethernet[1].mac,
826 unformat_ip4_address, &p->ip4_over_ethernet[1].ip4))
828 /* Free up any edits we may have added. */
829 pg_free_edit_group (s);
836 * callback when an interface address is added or deleted
839 arp_enable_disable_interface (ip4_main_t * im,
840 uword opaque, u32 sw_if_index, u32 is_enable)
842 ethernet_arp_main_t *am = ðernet_arp_main;
845 arp_enable (am, sw_if_index);
847 arp_disable (am, sw_if_index);
851 * Remove any arp entries associated with the specified interface
853 static clib_error_t *
854 vnet_arp_add_del_sw_interface (vnet_main_t * vnm, u32 sw_if_index, u32 is_add)
856 ethernet_arp_main_t *am = ðernet_arp_main;
858 arp_disable (am, sw_if_index);
862 VNET_SW_INTERFACE_ADD_DEL_FUNCTION (vnet_arp_add_del_sw_interface);
864 const static ip_neighbor_vft_t arp_vft = {
865 .inv_proxy4_add = arp_proxy_add,
866 .inv_proxy4_del = arp_proxy_del,
867 .inv_proxy4_enable = arp_proxy_enable,
868 .inv_proxy4_disable = arp_proxy_disable,
871 static clib_error_t *
872 ethernet_arp_init (vlib_main_t * vm)
874 ethernet_arp_main_t *am = ðernet_arp_main;
875 ip4_main_t *im = &ip4_main;
878 ethernet_register_input_type (vm, ETHERNET_TYPE_ARP, arp_input_node.index);
880 pn = pg_get_node (arp_input_node.index);
881 pn->unformat_edit = unformat_pg_arp_header;
883 am->opcode_by_name = hash_create_string (0, sizeof (uword));
884 #define _(o) hash_set_mem (am->opcode_by_name, #o, ETHERNET_ARP_OPCODE_##o);
885 foreach_ethernet_arp_opcode;
888 /* don't trace ARP error packets */
890 vlib_node_runtime_t *rt =
891 vlib_node_get_runtime (vm, arp_input_node.index);
893 vnet_pcap_drop_trace_filter_add_del (rt->errors[ARP_ERROR_REPLIES_SENT],
895 vnet_pcap_drop_trace_filter_add_del (rt->errors[ARP_ERROR_DISABLED], 1);
896 vnet_pcap_drop_trace_filter_add_del (
897 rt->errors[ARP_ERROR_L2_TYPE_NOT_ETHERNET], 1);
898 vnet_pcap_drop_trace_filter_add_del (rt->errors[ARP_ERROR_L3_TYPE_NOT_IP4],
900 vnet_pcap_drop_trace_filter_add_del (
901 rt->errors[ARP_ERROR_L3_SRC_ADDRESS_NOT_LOCAL], 1);
902 vnet_pcap_drop_trace_filter_add_del (
903 rt->errors[ARP_ERROR_L3_DST_ADDRESS_NOT_LOCAL], 1);
904 vnet_pcap_drop_trace_filter_add_del (
905 rt->errors[ARP_ERROR_L3_DST_ADDRESS_UNSET], 1);
906 vnet_pcap_drop_trace_filter_add_del (
907 rt->errors[ARP_ERROR_L3_SRC_ADDRESS_IS_LOCAL], 1);
908 vnet_pcap_drop_trace_filter_add_del (
909 rt->errors[ARP_ERROR_L3_SRC_ADDRESS_LEARNED], 1);
910 vnet_pcap_drop_trace_filter_add_del (
911 rt->errors[ARP_ERROR_REPLIES_RECEIVED], 1);
912 vnet_pcap_drop_trace_filter_add_del (
913 rt->errors[ARP_ERROR_OPCODE_NOT_REQUEST], 1);
914 vnet_pcap_drop_trace_filter_add_del (
915 rt->errors[ARP_ERROR_PROXY_ARP_REPLIES_SENT], 1);
916 vnet_pcap_drop_trace_filter_add_del (
917 rt->errors[ARP_ERROR_L2_ADDRESS_MISMATCH], 1);
918 vnet_pcap_drop_trace_filter_add_del (rt->errors[ARP_ERROR_GRATUITOUS_ARP],
920 vnet_pcap_drop_trace_filter_add_del (
921 rt->errors[ARP_ERROR_INTERFACE_NO_TABLE], 1);
922 vnet_pcap_drop_trace_filter_add_del (
923 rt->errors[ARP_ERROR_INTERFACE_NOT_IP_ENABLED], 1);
924 vnet_pcap_drop_trace_filter_add_del (
925 rt->errors[ARP_ERROR_UNNUMBERED_MISMATCH], 1);
929 ip4_enable_disable_interface_callback_t cb = {
930 .function = arp_enable_disable_interface,
932 vec_add1 (im->enable_disable_interface_callbacks, cb);
935 ip_neighbor_register (AF_IP4, &arp_vft);
941 VLIB_INIT_FUNCTION (ethernet_arp_init) =
943 .runs_after = VLIB_INITS("ethernet_init",
949 * fd.io coding-style-patch-verification: ON
952 * eval: (c-set-style "gnu")