2 * ethernet/arp.c: IP v4 ARP node
4 * Copyright (c) 2010 Cisco and/or its affiliates.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
18 #include <vnet/ip/ip.h>
19 #include <vnet/ip/ip_neighbor.h>
20 #include <vnet/ip/ip6.h>
21 #include <vnet/ethernet/ethernet.h>
22 #include <vnet/ethernet/arp.h>
23 #include <vnet/l2/l2_input.h>
24 #include <vppinfra/mhash.h>
25 #include <vnet/fib/ip4_fib.h>
26 #include <vnet/fib/fib_entry_src.h>
27 #include <vnet/adj/adj_nbr.h>
28 #include <vnet/adj/adj_mcast.h>
29 #include <vnet/mpls/mpls.h>
30 #include <vnet/l2/feat_bitmap.h>
36 * This file contains code to manage the IPv4 ARP tables (IP Address
37 * to MAC Address lookup).
41 void vl_api_rpc_call_main_thread (void *fp, u8 * data, u32 data_length);
44 * @brief Per-interface ARP configuration and state
46 typedef struct ethernet_arp_interface_t_
49 * Hash table of ARP entries.
50 * Since this hash table is per-interface, the key is only the IPv4 address.
53 } ethernet_arp_interface_t;
57 ip4_address_t lo_addr;
58 ip4_address_t hi_addr;
60 } ethernet_proxy_arp_t;
68 /* Used for arp event notification only */
69 arp_change_event_cb_t data_callback;
71 } pending_resolution_t;
75 /* Hash tables mapping name to opcode. */
76 uword *opcode_by_name;
78 /* lite beer "glean" adjacency handling */
79 uword *pending_resolutions_by_address;
80 pending_resolution_t *pending_resolutions;
82 /* Mac address change notification */
83 uword *mac_changes_by_address;
84 pending_resolution_t *mac_changes;
86 ethernet_arp_ip4_entry_t *ip4_entry_pool;
88 /* ARP attack mitigation */
90 u32 limit_arp_cache_size;
92 /** Per interface state */
93 ethernet_arp_interface_t *ethernet_arp_by_sw_if_index;
95 /* Proxy arp vector */
96 ethernet_proxy_arp_t *proxy_arps;
98 uword wc_ip4_arp_publisher_node;
99 uword wc_ip4_arp_publisher_et;
100 } ethernet_arp_main_t;
102 static ethernet_arp_main_t ethernet_arp_main;
109 ip_neighbor_flags_t nbr_flags;
111 #define ETHERNET_ARP_ARGS_REMOVE (1<<0)
112 #define ETHERNET_ARP_ARGS_FLUSH (1<<1)
113 #define ETHERNET_ARP_ARGS_POPULATE (1<<2)
114 #define ETHERNET_ARP_ARGS_WC_PUB (1<<3)
115 } vnet_arp_set_ip4_over_ethernet_rpc_args_t;
117 static const u8 vrrp_prefix[] = { 0x00, 0x00, 0x5E, 0x00, 0x01 };
119 /* Node index for send_garp_na_process */
120 u32 send_garp_na_process_node_index;
123 set_ip4_over_ethernet_rpc_callback (vnet_arp_set_ip4_over_ethernet_rpc_args_t
127 format_ethernet_arp_hardware_type (u8 * s, va_list * va)
129 ethernet_arp_hardware_type_t h = va_arg (*va, ethernet_arp_hardware_type_t);
133 #define _(n,f) case n: t = #f; break;
134 foreach_ethernet_arp_hardware_type;
138 return format (s, "unknown 0x%x", h);
141 return format (s, "%s", t);
145 format_ethernet_arp_opcode (u8 * s, va_list * va)
147 ethernet_arp_opcode_t o = va_arg (*va, ethernet_arp_opcode_t);
151 #define _(f) case ETHERNET_ARP_OPCODE_##f: t = #f; break;
152 foreach_ethernet_arp_opcode;
156 return format (s, "unknown 0x%x", o);
159 return format (s, "%s", t);
163 unformat_ethernet_arp_opcode_host_byte_order (unformat_input_t * input,
166 int *result = va_arg (*args, int *);
167 ethernet_arp_main_t *am = ðernet_arp_main;
170 /* Numeric opcode. */
171 if (unformat (input, "0x%x", &x) || unformat (input, "%d", &x))
180 if (unformat_user (input, unformat_vlib_number_by_name,
181 am->opcode_by_name, &i))
191 unformat_ethernet_arp_opcode_net_byte_order (unformat_input_t * input,
194 int *result = va_arg (*args, int *);
196 (input, unformat_ethernet_arp_opcode_host_byte_order, result))
199 *result = clib_host_to_net_u16 ((u16) * result);
204 format_ethernet_arp_header (u8 * s, va_list * va)
206 ethernet_arp_header_t *a = va_arg (*va, ethernet_arp_header_t *);
207 u32 max_header_bytes = va_arg (*va, u32);
209 u16 l2_type, l3_type;
211 if (max_header_bytes != 0 && sizeof (a[0]) > max_header_bytes)
212 return format (s, "ARP header truncated");
214 l2_type = clib_net_to_host_u16 (a->l2_type);
215 l3_type = clib_net_to_host_u16 (a->l3_type);
217 indent = format_get_indent (s);
219 s = format (s, "%U, type %U/%U, address size %d/%d",
220 format_ethernet_arp_opcode, clib_net_to_host_u16 (a->opcode),
221 format_ethernet_arp_hardware_type, l2_type,
222 format_ethernet_type, l3_type,
223 a->n_l2_address_bytes, a->n_l3_address_bytes);
225 if (l2_type == ETHERNET_ARP_HARDWARE_TYPE_ethernet
226 && l3_type == ETHERNET_TYPE_IP4)
228 s = format (s, "\n%U%U/%U -> %U/%U",
229 format_white_space, indent,
230 format_mac_address_t, &a->ip4_over_ethernet[0].mac,
231 format_ip4_address, &a->ip4_over_ethernet[0].ip4,
232 format_mac_address_t, &a->ip4_over_ethernet[1].mac,
233 format_ip4_address, &a->ip4_over_ethernet[1].ip4);
237 uword n2 = a->n_l2_address_bytes;
238 uword n3 = a->n_l3_address_bytes;
239 s = format (s, "\n%U%U/%U -> %U/%U",
240 format_white_space, indent,
241 format_hex_bytes, a->data + 0 * n2 + 0 * n3, n2,
242 format_hex_bytes, a->data + 1 * n2 + 0 * n3, n3,
243 format_hex_bytes, a->data + 1 * n2 + 1 * n3, n2,
244 format_hex_bytes, a->data + 2 * n2 + 1 * n3, n3);
251 format_ethernet_arp_ip4_entry (u8 * s, va_list * va)
253 vnet_main_t *vnm = va_arg (*va, vnet_main_t *);
254 ethernet_arp_ip4_entry_t *e = va_arg (*va, ethernet_arp_ip4_entry_t *);
255 vnet_sw_interface_t *si;
259 return format (s, "%=12s%=16s%=6s%=20s%=24s", "Time", "IP4",
260 "Flags", "Ethernet", "Interface");
262 si = vnet_get_sw_interface (vnm, e->sw_if_index);
264 if (e->flags & IP_NEIGHBOR_FLAG_STATIC)
265 flags = format (flags, "S");
267 if (e->flags & IP_NEIGHBOR_FLAG_DYNAMIC)
268 flags = format (flags, "D");
270 if (e->flags & IP_NEIGHBOR_FLAG_NO_FIB_ENTRY)
271 flags = format (flags, "N");
273 s = format (s, "%=12U%=16U%=6s%=20U%U",
274 format_vlib_time, vnm->vlib_main, e->time_last_updated,
275 format_ip4_address, &e->ip4_address,
276 flags ? (char *) flags : "",
277 format_mac_address_t, &e->mac,
278 format_vnet_sw_interface_name, vnm, si);
287 } ethernet_arp_input_trace_t;
290 format_ethernet_arp_input_trace (u8 * s, va_list * va)
292 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
293 CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
294 ethernet_arp_input_trace_t *t = va_arg (*va, ethernet_arp_input_trace_t *);
297 format_ethernet_arp_header,
298 t->packet_data, sizeof (t->packet_data));
304 format_arp_term_input_trace (u8 * s, va_list * va)
306 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
307 CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
308 ethernet_arp_input_trace_t *t = va_arg (*va, ethernet_arp_input_trace_t *);
310 /* arp-term trace data saved is either arp or ip6/icmp6 packet:
311 - for arp, the 1st 16-bit field is hw type of value of 0x0001.
312 - for ip6, the first nibble has value of 6. */
313 s = format (s, "%U", t->packet_data[0] == 0 ?
314 format_ethernet_arp_header : format_ip6_header,
315 t->packet_data, sizeof (t->packet_data));
321 arp_nbr_probe (ip_adjacency_t * adj)
323 vnet_main_t *vnm = vnet_get_main ();
324 ip4_main_t *im = &ip4_main;
325 ip_interface_address_t *ia;
326 ethernet_arp_header_t *h;
327 vnet_hw_interface_t *hi;
328 vnet_sw_interface_t *si;
334 vm = vlib_get_main ();
336 si = vnet_get_sw_interface (vnm, adj->rewrite_header.sw_if_index);
338 if (!(si->flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP))
344 ip4_interface_address_matching_destination (im,
345 &adj->sub_type.nbr.next_hop.
355 vlib_packet_template_get_packet (vm, &im->ip4_arp_request_packet_template,
360 hi = vnet_get_sup_hw_interface (vnm, adj->rewrite_header.sw_if_index);
362 mac_address_from_bytes (&h->ip4_over_ethernet[0].mac, hi->hw_address);
364 h->ip4_over_ethernet[0].ip4 = src[0];
365 h->ip4_over_ethernet[1].ip4 = adj->sub_type.nbr.next_hop.ip4;
367 b = vlib_get_buffer (vm, bi);
368 vnet_buffer (b)->sw_if_index[VLIB_RX] =
369 vnet_buffer (b)->sw_if_index[VLIB_TX] = adj->rewrite_header.sw_if_index;
371 /* Add encapsulation string for software interface (e.g. ethernet header). */
372 vnet_rewrite_one_header (adj[0], h, sizeof (ethernet_header_t));
373 vlib_buffer_advance (b, -adj->rewrite_header.data_bytes);
376 vlib_frame_t *f = vlib_get_frame_to_node (vm, hi->output_node_index);
377 u32 *to_next = vlib_frame_vector_args (f);
380 vlib_put_frame_to_node (vm, hi->output_node_index, f);
385 arp_mk_complete (adj_index_t ai, ethernet_arp_ip4_entry_t * e)
387 adj_nbr_update_rewrite
388 (ai, ADJ_NBR_REWRITE_FLAG_COMPLETE,
389 ethernet_build_rewrite (vnet_get_main (),
391 adj_get_link_type (ai), &e->mac));
395 arp_mk_incomplete (adj_index_t ai)
397 ip_adjacency_t *adj = adj_get (ai);
399 adj_nbr_update_rewrite
401 ADJ_NBR_REWRITE_FLAG_INCOMPLETE,
402 ethernet_build_rewrite (vnet_get_main (),
403 adj->rewrite_header.sw_if_index,
405 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST));
408 static ethernet_arp_ip4_entry_t *
409 arp_entry_find (ethernet_arp_interface_t * eai, const ip4_address_t * addr)
411 ethernet_arp_main_t *am = ðernet_arp_main;
412 ethernet_arp_ip4_entry_t *e = NULL;
415 if (NULL != eai->arp_entries)
417 p = hash_get (eai->arp_entries, addr->as_u32);
421 e = pool_elt_at_index (am->ip4_entry_pool, p[0]);
428 arp_mk_complete_walk (adj_index_t ai, void *ctx)
430 ethernet_arp_ip4_entry_t *e = ctx;
432 arp_mk_complete (ai, e);
434 return (ADJ_WALK_RC_CONTINUE);
438 arp_mk_incomplete_walk (adj_index_t ai, void *ctx)
440 arp_mk_incomplete (ai);
442 return (ADJ_WALK_RC_CONTINUE);
446 arp_update_adjacency (vnet_main_t * vnm, u32 sw_if_index, u32 ai)
448 ethernet_arp_main_t *am = ðernet_arp_main;
449 ethernet_arp_interface_t *arp_int;
450 ethernet_arp_ip4_entry_t *e;
455 vec_validate (am->ethernet_arp_by_sw_if_index, sw_if_index);
456 arp_int = &am->ethernet_arp_by_sw_if_index[sw_if_index];
457 e = arp_entry_find (arp_int, &adj->sub_type.nbr.next_hop.ip4);
459 switch (adj->lookup_next_index)
461 case IP_LOOKUP_NEXT_GLEAN:
462 adj_glean_update_rewrite (ai);
464 case IP_LOOKUP_NEXT_ARP:
467 adj_nbr_walk_nh4 (sw_if_index,
468 &e->ip4_address, arp_mk_complete_walk, e);
473 * no matching ARP entry.
474 * construct the rewrite required to for an ARP packet, and stick
475 * that in the adj's pipe to smoke.
477 adj_nbr_update_rewrite
479 ADJ_NBR_REWRITE_FLAG_INCOMPLETE,
480 ethernet_build_rewrite
484 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST));
487 * since the FIB has added this adj for a route, it makes sense it
488 * may want to forward traffic sometime soon. Let's send a
489 * speculative ARP. just one. If we were to do periodically that
490 * wouldn't be bad either, but that's more code than i'm prepared to
491 * write at this time for relatively little reward.
496 case IP_LOOKUP_NEXT_BCAST:
497 adj_nbr_update_rewrite (ai,
498 ADJ_NBR_REWRITE_FLAG_COMPLETE,
499 ethernet_build_rewrite
503 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST));
505 case IP_LOOKUP_NEXT_MCAST:
508 * Construct a partial rewrite from the known ethernet mcast dest MAC
513 rewrite = ethernet_build_rewrite (vnm,
516 ethernet_ip4_mcast_dst_addr ());
517 offset = vec_len (rewrite) - 2;
520 * Complete the remaining fields of the adj's rewrite to direct the
521 * complete of the rewrite at switch time by copying in the IP
522 * dst address's bytes.
523 * Ofset is 2 bytes into the MAC desintation address.
525 adj_mcast_update_rewrite (ai, rewrite, offset);
529 case IP_LOOKUP_NEXT_DROP:
530 case IP_LOOKUP_NEXT_PUNT:
531 case IP_LOOKUP_NEXT_LOCAL:
532 case IP_LOOKUP_NEXT_REWRITE:
533 case IP_LOOKUP_NEXT_MCAST_MIDCHAIN:
534 case IP_LOOKUP_NEXT_MIDCHAIN:
535 case IP_LOOKUP_NEXT_ICMP_ERROR:
536 case IP_LOOKUP_N_NEXT:
543 arp_adj_fib_add (ethernet_arp_ip4_entry_t * e, u32 fib_index)
547 .fp_proto = FIB_PROTOCOL_IP4,
548 .fp_addr.ip4 = e->ip4_address,
552 fib_table_entry_path_add (fib_index, &pfx, FIB_SOURCE_ADJ,
553 FIB_ENTRY_FLAG_ATTACHED,
554 DPO_PROTO_IP4, &pfx.fp_addr,
555 e->sw_if_index, ~0, 1, NULL,
556 FIB_ROUTE_PATH_FLAG_NONE);
557 fib_table_lock (fib_index, FIB_PROTOCOL_IP4, FIB_SOURCE_ADJ);
561 arp_adj_fib_remove (ethernet_arp_ip4_entry_t * e, u32 fib_index)
563 if (FIB_NODE_INDEX_INVALID != e->fib_entry_index)
567 .fp_proto = FIB_PROTOCOL_IP4,
568 .fp_addr.ip4 = e->ip4_address,
572 fib_index = ip4_fib_table_get_index_for_sw_if_index (e->sw_if_index);
574 fib_table_entry_path_remove (fib_index, &pfx,
578 e->sw_if_index, ~0, 1,
579 FIB_ROUTE_PATH_FLAG_NONE);
580 fib_table_unlock (fib_index, FIB_PROTOCOL_IP4, FIB_SOURCE_ADJ);
584 static ethernet_arp_ip4_entry_t *
585 force_reuse_arp_entry (void)
587 ethernet_arp_ip4_entry_t *e;
588 ethernet_arp_main_t *am = ðernet_arp_main;
590 u32 index = pool_next_index (am->ip4_entry_pool, am->arp_delete_rotor);
591 if (index == ~0) /* Try again from elt 0 */
592 index = pool_next_index (am->ip4_entry_pool, index);
594 /* Find a non-static random entry to free up for reuse */
597 if ((count++ == 100) || (index == ~0))
598 return NULL; /* give up after 100 entries */
599 e = pool_elt_at_index (am->ip4_entry_pool, index);
600 am->arp_delete_rotor = index;
601 index = pool_next_index (am->ip4_entry_pool, index);
603 while (e->flags & IP_NEIGHBOR_FLAG_STATIC);
605 /* Remove ARP entry from its interface and update fib */
607 (am->ethernet_arp_by_sw_if_index[e->sw_if_index].arp_entries,
608 e->ip4_address.as_u32);
610 (e, ip4_fib_table_get_index_for_sw_if_index (e->sw_if_index));
611 adj_nbr_walk_nh4 (e->sw_if_index,
612 &e->ip4_address, arp_mk_incomplete_walk, e);
617 vnet_arp_set_ip4_over_ethernet_internal (vnet_main_t * vnm,
618 vnet_arp_set_ip4_over_ethernet_rpc_args_t
621 ethernet_arp_ip4_entry_t *e = 0;
622 ethernet_arp_main_t *am = ðernet_arp_main;
623 vlib_main_t *vm = vlib_get_main ();
624 int make_new_arp_cache_entry = 1;
626 pending_resolution_t *pr, *mc;
627 ethernet_arp_interface_t *arp_int;
628 u32 sw_if_index = args->sw_if_index;
630 vec_validate (am->ethernet_arp_by_sw_if_index, sw_if_index);
632 arp_int = &am->ethernet_arp_by_sw_if_index[sw_if_index];
634 if (NULL != arp_int->arp_entries)
636 p = hash_get (arp_int->arp_entries, args->ip4.as_u32);
639 e = pool_elt_at_index (am->ip4_entry_pool, p[0]);
641 /* Refuse to over-write static arp. */
642 if (!(args->nbr_flags & IP_NEIGHBOR_FLAG_STATIC) &&
643 (e->flags & IP_NEIGHBOR_FLAG_STATIC))
645 /* if MAC address match, still check to send event */
646 if (mac_address_equal (&e->mac, &args->mac))
647 goto check_customers;
650 make_new_arp_cache_entry = 0;
654 if (make_new_arp_cache_entry)
656 if (am->limit_arp_cache_size &&
657 pool_elts (am->ip4_entry_pool) >= am->limit_arp_cache_size)
659 e = force_reuse_arp_entry ();
664 pool_get (am->ip4_entry_pool, e);
666 if (NULL == arp_int->arp_entries)
667 arp_int->arp_entries = hash_create (0, sizeof (u32));
669 hash_set (arp_int->arp_entries, args->ip4.as_u32,
670 e - am->ip4_entry_pool);
672 e->sw_if_index = sw_if_index;
673 e->ip4_address = args->ip4;
674 e->fib_entry_index = FIB_NODE_INDEX_INVALID;
675 mac_address_copy (&e->mac, &args->mac);
677 if (!(args->nbr_flags & IP_NEIGHBOR_FLAG_NO_FIB_ENTRY))
680 ip4_fib_table_get_index_for_sw_if_index
685 e->flags |= IP_NEIGHBOR_FLAG_NO_FIB_ENTRY;
691 * prevent a DoS attack from the data-plane that
692 * spams us with no-op updates to the MAC address
694 if (mac_address_equal (&e->mac, &args->mac))
696 e->time_last_updated = vlib_time_now (vm);
697 goto check_customers;
700 /* Update ethernet address. */
701 mac_address_copy (&e->mac, &args->mac);
704 /* Update time stamp and flags. */
705 e->time_last_updated = vlib_time_now (vm);
706 if (args->nbr_flags & IP_NEIGHBOR_FLAG_STATIC)
708 e->flags &= ~IP_NEIGHBOR_FLAG_DYNAMIC;
709 e->flags |= IP_NEIGHBOR_FLAG_STATIC;
713 e->flags &= ~IP_NEIGHBOR_FLAG_STATIC;
714 e->flags |= IP_NEIGHBOR_FLAG_DYNAMIC;
717 adj_nbr_walk_nh4 (sw_if_index, &e->ip4_address, arp_mk_complete_walk, e);
720 /* Customer(s) waiting for this address to be resolved? */
721 p = hash_get (am->pending_resolutions_by_address, args->ip4.as_u32);
727 while (next_index != (u32) ~ 0)
729 pr = pool_elt_at_index (am->pending_resolutions, next_index);
730 vlib_process_signal_event (vm, pr->node_index,
731 pr->type_opaque, pr->data);
732 next_index = pr->next_index;
733 pool_put (am->pending_resolutions, pr);
736 hash_unset (am->pending_resolutions_by_address, args->ip4.as_u32);
739 /* Customer(s) requesting ARP event for this address? */
740 p = hash_get (am->mac_changes_by_address, args->ip4.as_u32);
746 while (next_index != (u32) ~ 0)
749 mc = pool_elt_at_index (am->mac_changes, next_index);
751 /* Call the user's data callback, return 1 to suppress dup events */
752 if (mc->data_callback)
753 rv = (mc->data_callback) (mc->data, &args->mac, sw_if_index, 0);
756 * Signal the resolver process, as long as the user
757 * says they want to be notified
760 vlib_process_signal_event (vm, mc->node_index,
761 mc->type_opaque, mc->data);
762 next_index = mc->next_index;
770 vnet_register_ip4_arp_resolution_event (vnet_main_t * vnm,
773 uword type_opaque, uword data)
775 ethernet_arp_main_t *am = ðernet_arp_main;
776 ip4_address_t *address = address_arg;
778 pending_resolution_t *pr;
780 pool_get (am->pending_resolutions, pr);
783 pr->node_index = node_index;
784 pr->type_opaque = type_opaque;
786 pr->data_callback = 0;
788 p = hash_get (am->pending_resolutions_by_address, address->as_u32);
791 /* Insert new resolution at the head of the list */
792 pr->next_index = p[0];
793 hash_unset (am->pending_resolutions_by_address, address->as_u32);
796 hash_set (am->pending_resolutions_by_address, address->as_u32,
797 pr - am->pending_resolutions);
801 vnet_add_del_ip4_arp_change_event (vnet_main_t * vnm,
802 arp_change_event_cb_t data_callback,
806 uword type_opaque, uword data, int is_add)
808 ethernet_arp_main_t *am = ðernet_arp_main;
809 ip4_address_t *address = address_arg;
811 /* Try to find an existing entry */
812 u32 *first = (u32 *) hash_get (am->mac_changes_by_address, address->as_u32);
814 pending_resolution_t *mc;
815 while (p && *p != ~0)
817 mc = pool_elt_at_index (am->mac_changes, *p);
818 if (mc->node_index == node_index && mc->type_opaque == type_opaque
824 int found = p && *p != ~0;
828 return VNET_API_ERROR_ENTRY_ALREADY_EXISTS;
830 pool_get (am->mac_changes, mc);
832 *mc = (pending_resolution_t)
835 .node_index = node_index,
836 .type_opaque = type_opaque,
838 .data_callback = data_callback,
843 /* Insert new resolution at the end of the list */
844 u32 new_idx = mc - am->mac_changes;
848 hash_set (am->mac_changes_by_address, address->as_u32, new_idx);
853 return VNET_API_ERROR_NO_SUCH_ENTRY;
855 /* Clients may need to clean up pool entries, too */
857 /* no new mac addrs */
858 (data_callback) (mc->data, NULL, ~0, NULL);
860 /* Remove the entry from the list and delete the entry */
862 pool_put (am->mac_changes, mc);
864 /* Remove from hash if we deleted the last entry */
865 if (*p == ~0 && p == first)
866 hash_unset (am->mac_changes_by_address, address->as_u32);
871 /* Either we drop the packet or we send a reply to the sender. */
875 ARP_INPUT_NEXT_REPLY_TX,
879 #define foreach_ethernet_arp_error \
880 _ (replies_sent, "ARP replies sent") \
881 _ (l2_type_not_ethernet, "L2 type not ethernet") \
882 _ (l3_type_not_ip4, "L3 type not IP4") \
883 _ (l3_src_address_not_local, "IP4 source address not local to subnet") \
884 _ (l3_dst_address_not_local, "IP4 destination address not local to subnet") \
885 _ (l3_dst_address_unset, "IP4 destination address is unset") \
886 _ (l3_src_address_is_local, "IP4 source address matches local interface") \
887 _ (l3_src_address_learned, "ARP request IP4 source address learned") \
888 _ (replies_received, "ARP replies received") \
889 _ (opcode_not_request, "ARP opcode not request") \
890 _ (proxy_arp_replies_sent, "Proxy ARP replies sent") \
891 _ (l2_address_mismatch, "ARP hw addr does not match L2 frame src addr") \
892 _ (gratuitous_arp, "ARP probe or announcement dropped") \
893 _ (interface_no_table, "Interface is not mapped to an IP table") \
894 _ (interface_not_ip_enabled, "Interface is not IP enabled") \
895 _ (unnumbered_mismatch, "RX interface is unnumbered to different subnet") \
899 #define _(sym,string) ETHERNET_ARP_ERROR_##sym,
900 foreach_ethernet_arp_error
902 ETHERNET_ARP_N_ERROR,
903 } ethernet_arp_input_error_t;
906 arp_unnumbered (vlib_buffer_t * p0,
907 u32 input_sw_if_index, u32 conn_sw_if_index)
909 vnet_main_t *vnm = vnet_get_main ();
910 vnet_interface_main_t *vim = &vnm->interface_main;
911 vnet_sw_interface_t *si;
913 /* verify that the input interface is unnumbered to the connected.
914 * the connected interface is the interface on which the subnet is
916 si = &vim->sw_interfaces[input_sw_if_index];
918 if (!(si->flags & VNET_SW_INTERFACE_FLAG_UNNUMBERED &&
919 (si->unnumbered_sw_if_index == conn_sw_if_index)))
921 /* the input interface is not unnumbered to the interface on which
922 * the sub-net is configured that covers the ARP request.
923 * So this is not the case for unnumbered.. */
931 arp_learn (vnet_main_t * vnm,
932 ethernet_arp_main_t * am, u32 sw_if_index,
933 const ethernet_arp_ip4_over_ethernet_address_t * addr)
935 vnet_arp_set_ip4_over_ethernet (vnm, sw_if_index, addr, 0);
936 return (ETHERNET_ARP_ERROR_l3_src_address_learned);
940 arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
942 ethernet_arp_main_t *am = ðernet_arp_main;
943 vnet_main_t *vnm = vnet_get_main ();
944 ip4_main_t *im4 = &ip4_main;
945 u32 n_left_from, next_index, *from, *to_next;
946 u32 n_replies_sent = 0, n_proxy_arp_replies_sent = 0;
948 from = vlib_frame_vector_args (frame);
949 n_left_from = frame->n_vectors;
950 next_index = node->cached_next_index;
952 if (node->flags & VLIB_NODE_FLAG_TRACE)
953 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
955 sizeof (ethernet_arp_input_trace_t));
957 while (n_left_from > 0)
961 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
963 while (n_left_from > 0 && n_left_to_next > 0)
966 vnet_hw_interface_t *hw_if0;
967 ethernet_arp_header_t *arp0;
968 ethernet_header_t *eth_rx, *eth_tx;
969 const ip4_address_t *if_addr0;
970 ip4_address_t proxy_src;
971 u32 pi0, error0, next0, sw_if_index0, conn_sw_if_index0, fib_index0;
972 u8 is_request0, dst_is_local0, is_unnum0, is_vrrp_reply0;
973 ethernet_proxy_arp_t *pa;
974 fib_node_index_t dst_fei, src_fei;
975 const fib_prefix_t *pfx0;
976 fib_entry_flag_t src_flags, dst_flags;
977 u8 *rewrite0, rewrite0_len;
987 p0 = vlib_get_buffer (vm, pi0);
988 arp0 = vlib_buffer_get_current (p0);
989 /* Fill in ethernet header. */
990 eth_rx = ethernet_buffer_get_header (p0);
992 is_request0 = arp0->opcode
993 == clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request);
995 error0 = ETHERNET_ARP_ERROR_replies_sent;
999 clib_net_to_host_u16 (ETHERNET_ARP_HARDWARE_TYPE_ethernet) ?
1000 ETHERNET_ARP_ERROR_l2_type_not_ethernet : error0);
1003 clib_net_to_host_u16 (ETHERNET_TYPE_IP4) ?
1004 ETHERNET_ARP_ERROR_l3_type_not_ip4 : error0);
1006 (0 == arp0->ip4_over_ethernet[0].ip4.as_u32 ?
1007 ETHERNET_ARP_ERROR_l3_dst_address_unset : error0);
1009 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
1011 /* not playing the ARP game if the interface is not IPv4 enabled */
1013 (im4->ip_enabled_by_sw_if_index[sw_if_index0] == 0 ?
1014 ETHERNET_ARP_ERROR_interface_not_ip_enabled : error0);
1019 /* Check that IP address is local and matches incoming interface. */
1020 fib_index0 = ip4_fib_table_get_index_for_sw_if_index (sw_if_index0);
1021 if (~0 == fib_index0)
1023 error0 = ETHERNET_ARP_ERROR_interface_no_table;
1027 dst_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
1028 &arp0->ip4_over_ethernet[1].ip4,
1030 dst_flags = fib_entry_get_flags (dst_fei);
1032 conn_sw_if_index0 = fib_entry_get_resolving_interface (dst_fei);
1034 /* Honor unnumbered interface, if any */
1035 is_unnum0 = sw_if_index0 != conn_sw_if_index0;
1039 * we're looking for FIB entries that indicate the source
1040 * is attached. There may be more specific non-attached
1041 * routes that match the source, but these do not influence
1042 * whether we respond to an ARP request, i.e. they do not
1043 * influence whether we are the correct way for the sender
1044 * to reach us, they only affect how we reach the sender.
1046 fib_entry_t *src_fib_entry;
1047 const fib_prefix_t *pfx;
1048 fib_entry_src_t *src;
1049 fib_source_t source;
1058 src_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
1060 ip4_over_ethernet[0].ip4,
1062 src_fib_entry = fib_entry_get (src_fei);
1065 * It's possible that the source that provides the
1066 * flags we need, or the flags we must not have,
1067 * is not the best source, so check then all.
1070 FOR_EACH_SRC_ADDED(src_fib_entry, src, source,
1072 src_flags = fib_entry_get_flags_for_source (src_fei, source);
1074 /* Reject requests/replies with our local interface
1076 if (FIB_ENTRY_FLAG_LOCAL & src_flags)
1078 error0 = ETHERNET_ARP_ERROR_l3_src_address_is_local;
1080 * When VPP has an interface whose address is also
1081 * applied to a TAP interface on the host, then VPP's
1082 * TAP interface will be unnumbered to the 'real'
1083 * interface and do proxy ARP from the host.
1084 * The curious aspect of this setup is that ARP requests
1085 * from the host will come from the VPP's own address.
1086 * So don't drop immediately here, instead go see if this
1087 * is a proxy ARP case.
1091 /* A Source must also be local to subnet of matching
1092 * interface address. */
1093 if ((FIB_ENTRY_FLAG_ATTACHED & src_flags) ||
1094 (FIB_ENTRY_FLAG_CONNECTED & src_flags))
1101 * The packet was sent from an address that is not
1102 * connected nor attached i.e. it is not from an
1103 * address that is covered by a link's sub-net,
1104 * nor is it a already learned host resp.
1110 * shorter mask lookup for the next iteration.
1112 pfx = fib_entry_get_prefix (src_fei);
1113 mask = pfx->fp_len - 1;
1116 * continue until we hit the default route or we find
1117 * the attached we are looking for. The most likely
1118 * outcome is we find the attached with the first source
1119 * on the first lookup.
1123 !fib_entry_is_sourced (src_fei, FIB_SOURCE_DEFAULT_ROUTE));
1128 * the matching route is a not attached, i.e. it was
1129 * added as a result of routing, rather than interface/ARP
1130 * configuration. If the matching route is not a host route
1133 error0 = ETHERNET_ARP_ERROR_l3_src_address_not_local;
1138 if (fib_entry_is_sourced (dst_fei, FIB_SOURCE_ADJ))
1141 * We matched an adj-fib on ths source subnet (a /32 previously
1142 * added as a result of ARP). If this request is a gratuitous
1143 * ARP, then learn from it.
1144 * The check for matching an adj-fib, is to prevent hosts
1145 * from spamming us with gratuitous ARPS that might otherwise
1146 * blow our ARP cache
1148 if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
1149 arp0->ip4_over_ethernet[1].ip4.as_u32)
1150 error0 = arp_learn (vnm, am, sw_if_index0,
1151 &arp0->ip4_over_ethernet[0]);
1154 else if (!(FIB_ENTRY_FLAG_CONNECTED & dst_flags))
1156 error0 = ETHERNET_ARP_ERROR_l3_dst_address_not_local;
1160 if (sw_if_index0 != fib_entry_get_resolving_interface (src_fei))
1163 * The interface the ARP was received on is not the interface
1164 * on which the covering prefix is configured. Maybe this is a
1165 * case for unnumbered.
1170 dst_is_local0 = (FIB_ENTRY_FLAG_LOCAL & dst_flags);
1171 pfx0 = fib_entry_get_prefix (dst_fei);
1172 if_addr0 = &pfx0->fp_addr.ip4;
1176 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
1179 (arp0->ip4_over_ethernet[0].mac.bytes, vrrp_prefix,
1180 sizeof (vrrp_prefix))));
1182 /* Trash ARP packets whose ARP-level source addresses do not
1183 match their L2-frame-level source addresses, unless it's
1184 a reply from a VRRP virtual router */
1185 if (!ethernet_mac_address_equal
1186 (eth_rx->src_address,
1187 arp0->ip4_over_ethernet[0].mac.bytes) && !is_vrrp_reply0)
1189 error0 = ETHERNET_ARP_ERROR_l2_address_mismatch;
1193 /* Learn or update sender's mapping only for replies to addresses
1194 * that are local to the subnet */
1196 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
1199 error0 = arp_learn (vnm, am, sw_if_index0,
1200 &arp0->ip4_over_ethernet[0]);
1202 /* a reply for a non-local destination could be a GARP.
1203 * GARPs for hosts we know were handled above, so this one
1205 error0 = ETHERNET_ARP_ERROR_l3_dst_address_not_local;
1209 else if (arp0->opcode ==
1210 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request) &&
1211 (dst_is_local0 == 0))
1218 An adjacency to the sender is not always present,
1219 so we use the interface to build us a rewrite string
1220 which will contain all the necessary tags. */
1221 rewrite0 = ethernet_build_rewrite (vnm, sw_if_index0,
1223 eth_rx->src_address);
1224 rewrite0_len = vec_len (rewrite0);
1226 /* Figure out how much to rewind current data from adjacency. */
1227 vlib_buffer_advance (p0, -rewrite0_len);
1228 eth_tx = vlib_buffer_get_current (p0);
1230 vnet_buffer (p0)->sw_if_index[VLIB_TX] = sw_if_index0;
1231 hw_if0 = vnet_get_sup_hw_interface (vnm, sw_if_index0);
1233 /* Send reply back through input interface */
1234 vnet_buffer (p0)->sw_if_index[VLIB_TX] = sw_if_index0;
1235 next0 = ARP_INPUT_NEXT_REPLY_TX;
1237 arp0->opcode = clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply);
1239 arp0->ip4_over_ethernet[1] = arp0->ip4_over_ethernet[0];
1241 mac_address_from_bytes (&arp0->ip4_over_ethernet[0].mac,
1242 hw_if0->hw_address);
1243 clib_mem_unaligned (&arp0->ip4_over_ethernet[0].ip4.data_u32, u32) =
1246 /* Hardware must be ethernet-like. */
1247 ASSERT (vec_len (hw_if0->hw_address) == 6);
1249 /* the rx nd tx ethernet headers wil overlap in the case
1250 * when we received a tagged VLAN=0 packet, but we are sending
1252 clib_memcpy_fast (eth_tx, rewrite0, vec_len (rewrite0));
1253 vec_free (rewrite0);
1259 if (!arp_unnumbered (p0, sw_if_index0, conn_sw_if_index0))
1261 error0 = ETHERNET_ARP_ERROR_unnumbered_mismatch;
1267 /* We are going to reply to this request, so, in the absence of
1268 errors, learn the sender */
1270 error0 = arp_learn (vnm, am, sw_if_index0,
1271 &arp0->ip4_over_ethernet[1]);
1273 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1274 n_left_to_next, pi0, next0);
1276 n_replies_sent += 1;
1280 if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
1281 arp0->ip4_over_ethernet[1].ip4.as_u32)
1283 error0 = ETHERNET_ARP_ERROR_gratuitous_arp;
1286 /* See if proxy arp is configured for the address */
1289 vnet_sw_interface_t *si;
1290 u32 this_addr = clib_net_to_host_u32
1291 (arp0->ip4_over_ethernet[1].ip4.as_u32);
1294 si = vnet_get_sw_interface (vnm, sw_if_index0);
1296 if (!(si->flags & VNET_SW_INTERFACE_FLAG_PROXY_ARP))
1299 fib_index0 = vec_elt (im4->fib_index_by_sw_if_index,
1302 vec_foreach (pa, am->proxy_arps)
1304 u32 lo_addr = clib_net_to_host_u32 (pa->lo_addr.as_u32);
1305 u32 hi_addr = clib_net_to_host_u32 (pa->hi_addr.as_u32);
1307 /* an ARP request hit in the proxy-arp table? */
1308 if ((this_addr >= lo_addr && this_addr <= hi_addr) &&
1309 (fib_index0 == pa->fib_index))
1312 arp0->ip4_over_ethernet[1].ip4.data_u32;
1315 * change the interface address to the proxied
1317 if_addr0 = &proxy_src;
1319 n_proxy_arp_replies_sent++;
1327 next0 = ARP_INPUT_NEXT_DROP;
1328 p0->error = node->errors[error0];
1330 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1331 n_left_to_next, pi0, next0);
1334 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1337 vlib_error_count (vm, node->node_index,
1338 ETHERNET_ARP_ERROR_replies_sent,
1339 n_replies_sent - n_proxy_arp_replies_sent);
1341 vlib_error_count (vm, node->node_index,
1342 ETHERNET_ARP_ERROR_proxy_arp_replies_sent,
1343 n_proxy_arp_replies_sent);
1344 return frame->n_vectors;
1347 static char *ethernet_arp_error_strings[] = {
1348 #define _(sym,string) string,
1349 foreach_ethernet_arp_error
1354 VLIB_REGISTER_NODE (arp_input_node, static) =
1356 .function = arp_input,
1357 .name = "arp-input",
1358 .vector_size = sizeof (u32),
1359 .n_errors = ETHERNET_ARP_N_ERROR,
1360 .error_strings = ethernet_arp_error_strings,
1361 .n_next_nodes = ARP_INPUT_N_NEXT,
1363 [ARP_INPUT_NEXT_DROP] = "error-drop",
1364 [ARP_INPUT_NEXT_REPLY_TX] = "interface-output",
1366 .format_buffer = format_ethernet_arp_header,
1367 .format_trace = format_ethernet_arp_input_trace,
1372 ip4_arp_entry_sort (void *a1, void *a2)
1374 ethernet_arp_ip4_entry_t *e1 = a1;
1375 ethernet_arp_ip4_entry_t *e2 = a2;
1378 vnet_main_t *vnm = vnet_get_main ();
1380 cmp = vnet_sw_interface_compare (vnm, e1->sw_if_index, e2->sw_if_index);
1382 cmp = ip4_address_compare (&e1->ip4_address, &e2->ip4_address);
1386 ethernet_arp_ip4_entry_t *
1387 ip4_neighbors_pool (void)
1389 ethernet_arp_main_t *am = ðernet_arp_main;
1390 return am->ip4_entry_pool;
1393 ethernet_arp_ip4_entry_t *
1394 ip4_neighbor_entries (u32 sw_if_index)
1396 ethernet_arp_main_t *am = ðernet_arp_main;
1397 ethernet_arp_ip4_entry_t *n, *ns = 0;
1400 pool_foreach (n, am->ip4_entry_pool, ({
1401 if (sw_if_index != ~0 && n->sw_if_index != sw_if_index)
1403 vec_add1 (ns, n[0]);
1408 vec_sort_with_function (ns, ip4_arp_entry_sort);
1412 static clib_error_t *
1413 show_ip4_arp (vlib_main_t * vm,
1414 unformat_input_t * input, vlib_cli_command_t * cmd)
1416 vnet_main_t *vnm = vnet_get_main ();
1417 ethernet_arp_main_t *am = ðernet_arp_main;
1418 ethernet_arp_ip4_entry_t *e, *es;
1419 ethernet_proxy_arp_t *pa;
1420 clib_error_t *error = 0;
1423 /* Filter entries by interface if given. */
1425 (void) unformat_user (input, unformat_vnet_sw_interface, vnm, &sw_if_index);
1427 es = ip4_neighbor_entries (sw_if_index);
1430 vlib_cli_output (vm, "%U", format_ethernet_arp_ip4_entry, vnm, 0);
1433 vlib_cli_output (vm, "%U", format_ethernet_arp_ip4_entry, vnm, e);
1438 if (vec_len (am->proxy_arps))
1440 vlib_cli_output (vm, "Proxy arps enabled for:");
1441 vec_foreach (pa, am->proxy_arps)
1443 vlib_cli_output (vm, "Fib_index %d %U - %U ",
1445 format_ip4_address, &pa->lo_addr,
1446 format_ip4_address, &pa->hi_addr);
1454 * Display all the IPv4 ARP entries.
1457 * Example of how to display the IPv4 ARP table:
1458 * @cliexstart{show ip arp}
1459 * Time FIB IP4 Flags Ethernet Interface
1460 * 346.3028 0 6.1.1.3 de:ad:be:ef:ba:be GigabitEthernet2/0/0
1461 * 3077.4271 0 6.1.1.4 S de:ad:be:ef:ff:ff GigabitEthernet2/0/0
1462 * 2998.6409 1 6.2.2.3 de:ad:be:ef:00:01 GigabitEthernet2/0/0
1463 * Proxy arps enabled for:
1464 * Fib_index 0 6.0.0.1 - 6.0.0.11
1468 VLIB_CLI_COMMAND (show_ip4_arp_command, static) = {
1469 .path = "show ip arp",
1470 .function = show_ip4_arp,
1471 .short_help = "show ip arp",
1477 pg_edit_t l2_type, l3_type;
1478 pg_edit_t n_l2_address_bytes, n_l3_address_bytes;
1484 } ip4_over_ethernet[2];
1485 } pg_ethernet_arp_header_t;
1488 pg_ethernet_arp_header_init (pg_ethernet_arp_header_t * p)
1490 /* Initialize fields that are not bit fields in the IP header. */
1491 #define _(f) pg_edit_init (&p->f, ethernet_arp_header_t, f);
1494 _(n_l2_address_bytes);
1495 _(n_l3_address_bytes);
1497 _(ip4_over_ethernet[0].mac);
1498 _(ip4_over_ethernet[0].ip4);
1499 _(ip4_over_ethernet[1].mac);
1500 _(ip4_over_ethernet[1].ip4);
1505 unformat_pg_arp_header (unformat_input_t * input, va_list * args)
1507 pg_stream_t *s = va_arg (*args, pg_stream_t *);
1508 pg_ethernet_arp_header_t *p;
1511 p = pg_create_edit_group (s, sizeof (p[0]), sizeof (ethernet_arp_header_t),
1513 pg_ethernet_arp_header_init (p);
1516 pg_edit_set_fixed (&p->l2_type, ETHERNET_ARP_HARDWARE_TYPE_ethernet);
1517 pg_edit_set_fixed (&p->l3_type, ETHERNET_TYPE_IP4);
1518 pg_edit_set_fixed (&p->n_l2_address_bytes, 6);
1519 pg_edit_set_fixed (&p->n_l3_address_bytes, 4);
1521 if (!unformat (input, "%U: %U/%U -> %U/%U",
1523 unformat_ethernet_arp_opcode_net_byte_order, &p->opcode,
1525 unformat_mac_address_t, &p->ip4_over_ethernet[0].mac,
1527 unformat_ip4_address, &p->ip4_over_ethernet[0].ip4,
1529 unformat_mac_address_t, &p->ip4_over_ethernet[1].mac,
1531 unformat_ip4_address, &p->ip4_over_ethernet[1].ip4))
1533 /* Free up any edits we may have added. */
1534 pg_free_edit_group (s);
1541 ip4_set_arp_limit (u32 arp_limit)
1543 ethernet_arp_main_t *am = ðernet_arp_main;
1545 am->limit_arp_cache_size = arp_limit;
1550 * @brief Control Plane hook to remove an ARP entry
1553 vnet_arp_unset_ip4_over_ethernet (vnet_main_t * vnm,
1556 ethernet_arp_ip4_over_ethernet_address_t *
1559 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
1560 .sw_if_index = sw_if_index,
1561 .flags = ETHERNET_ARP_ARGS_REMOVE,
1566 vl_api_rpc_call_main_thread (set_ip4_over_ethernet_rpc_callback,
1567 (u8 *) & args, sizeof (args));
1572 * @brief publish wildcard arp event
1573 * @param sw_if_index The interface on which the ARP entires are acted
1576 vnet_arp_wc_publish (u32 sw_if_index,
1577 const ethernet_arp_ip4_over_ethernet_address_t * a)
1579 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
1580 .flags = ETHERNET_ARP_ARGS_WC_PUB,
1581 .sw_if_index = sw_if_index,
1586 vl_api_rpc_call_main_thread (set_ip4_over_ethernet_rpc_callback,
1587 (u8 *) & args, sizeof (args));
1592 vnet_arp_wc_publish_internal (vnet_main_t * vnm,
1593 vnet_arp_set_ip4_over_ethernet_rpc_args_t *
1596 vlib_main_t *vm = vlib_get_main ();
1597 ethernet_arp_main_t *am = ðernet_arp_main;
1598 uword ni = am->wc_ip4_arp_publisher_node;
1599 uword et = am->wc_ip4_arp_publisher_et;
1601 if (ni == (uword) ~ 0)
1603 wc_arp_report_t *r =
1604 vlib_process_signal_event_data (vm, ni, et, 1, sizeof *r);
1605 r->ip.as_u32 = args->ip4.as_u32;
1606 r->sw_if_index = args->sw_if_index;
1607 mac_address_copy (&r->mac, &args->mac);
1611 wc_arp_set_publisher_node (uword node_index, uword event_type)
1613 ethernet_arp_main_t *am = ðernet_arp_main;
1614 am->wc_ip4_arp_publisher_node = node_index;
1615 am->wc_ip4_arp_publisher_et = event_type;
1619 arp_entry_free (ethernet_arp_interface_t * eai, ethernet_arp_ip4_entry_t * e);
1622 vnet_arp_flush_ip4_over_ethernet_internal (vnet_main_t * vnm,
1623 vnet_arp_set_ip4_over_ethernet_rpc_args_t
1626 ethernet_arp_main_t *am = ðernet_arp_main;
1627 ethernet_arp_ip4_entry_t *e;
1628 ethernet_arp_interface_t *eai;
1630 if (vec_len (am->ethernet_arp_by_sw_if_index) <= args->sw_if_index)
1633 eai = &am->ethernet_arp_by_sw_if_index[args->sw_if_index];
1635 e = arp_entry_find (eai, &args->ip4);
1639 adj_nbr_walk_nh4 (e->sw_if_index,
1640 &e->ip4_address, arp_mk_incomplete_walk, e);
1643 * The difference between flush and unset, is that an unset
1644 * means delete for static and dynamic entries. A flush
1645 * means delete only for dynamic. Flushing is what the DP
1646 * does in response to interface events. unset is only done
1647 * by the control plane.
1649 if (e->flags & IP_NEIGHBOR_FLAG_STATIC)
1651 e->flags &= ~IP_NEIGHBOR_FLAG_DYNAMIC;
1653 else if (e->flags & IP_NEIGHBOR_FLAG_DYNAMIC)
1655 arp_entry_free (eai, e);
1662 * arp_add_del_interface_address
1664 * callback when an interface address is added or deleted
1667 arp_add_del_interface_address (ip4_main_t * im,
1670 ip4_address_t * address,
1672 u32 if_address_index, u32 is_del)
1675 * Flush the ARP cache of all entries covered by the address
1676 * that is being removed.
1678 ethernet_arp_main_t *am = ðernet_arp_main;
1679 ethernet_arp_ip4_entry_t *e;
1681 if (vec_len (am->ethernet_arp_by_sw_if_index) <= sw_if_index)
1686 ethernet_arp_interface_t *eai;
1687 u32 i, *to_delete = 0;
1690 eai = &am->ethernet_arp_by_sw_if_index[sw_if_index];
1693 hash_foreach_pair (pair, eai->arp_entries,
1695 e = pool_elt_at_index(am->ip4_entry_pool,
1697 if (ip4_destination_matches_route (im, &e->ip4_address,
1698 address, address_length))
1700 vec_add1 (to_delete, e - am->ip4_entry_pool);
1705 for (i = 0; i < vec_len (to_delete); i++)
1707 e = pool_elt_at_index (am->ip4_entry_pool, to_delete[i]);
1709 vnet_arp_set_ip4_over_ethernet_rpc_args_t delme = {
1710 .ip4.as_u32 = e->ip4_address.as_u32,
1711 .sw_if_index = e->sw_if_index,
1712 .flags = ETHERNET_ARP_ARGS_FLUSH,
1714 mac_address_copy (&delme.mac, &e->mac);
1716 vnet_arp_flush_ip4_over_ethernet_internal (vnet_get_main (),
1720 vec_free (to_delete);
1725 arp_table_bind (ip4_main_t * im,
1727 u32 sw_if_index, u32 new_fib_index, u32 old_fib_index)
1729 ethernet_arp_main_t *am = ðernet_arp_main;
1730 ethernet_arp_interface_t *eai;
1731 ethernet_arp_ip4_entry_t *e;
1735 * the IP table that the interface is bound to has changed.
1736 * reinstall all the adj fibs.
1739 if (vec_len (am->ethernet_arp_by_sw_if_index) <= sw_if_index)
1742 eai = &am->ethernet_arp_by_sw_if_index[sw_if_index];
1745 hash_foreach_pair (pair, eai->arp_entries,
1747 e = pool_elt_at_index(am->ip4_entry_pool,
1750 * remove the adj-fib from the old table and add to the new
1752 arp_adj_fib_remove(e, old_fib_index);
1753 arp_adj_fib_add(e, new_fib_index);
1759 static clib_error_t *
1760 ethernet_arp_init (vlib_main_t * vm)
1762 ethernet_arp_main_t *am = ðernet_arp_main;
1763 ip4_main_t *im = &ip4_main;
1764 clib_error_t *error;
1767 if ((error = vlib_call_init_function (vm, ethernet_init)))
1770 ethernet_register_input_type (vm, ETHERNET_TYPE_ARP, arp_input_node.index);
1772 pn = pg_get_node (arp_input_node.index);
1773 pn->unformat_edit = unformat_pg_arp_header;
1775 am->opcode_by_name = hash_create_string (0, sizeof (uword));
1776 #define _(o) hash_set_mem (am->opcode_by_name, #o, ETHERNET_ARP_OPCODE_##o);
1777 foreach_ethernet_arp_opcode;
1780 /* $$$ configurable */
1781 am->limit_arp_cache_size = 50000;
1783 am->pending_resolutions_by_address = hash_create (0, sizeof (uword));
1784 am->mac_changes_by_address = hash_create (0, sizeof (uword));
1785 am->wc_ip4_arp_publisher_node = (uword) ~ 0;
1787 /* don't trace ARP error packets */
1789 vlib_node_runtime_t *rt =
1790 vlib_node_get_runtime (vm, arp_input_node.index);
1793 vnet_pcap_drop_trace_filter_add_del \
1794 (rt->errors[ETHERNET_ARP_ERROR_##a], \
1796 foreach_ethernet_arp_error
1800 ip4_add_del_interface_address_callback_t cb;
1801 cb.function = arp_add_del_interface_address;
1802 cb.function_opaque = 0;
1803 vec_add1 (im->add_del_interface_address_callbacks, cb);
1805 ip4_table_bind_callback_t cbt;
1806 cbt.function = arp_table_bind;
1807 cbt.function_opaque = 0;
1808 vec_add1 (im->table_bind_callbacks, cbt);
1813 VLIB_INIT_FUNCTION (ethernet_arp_init);
1816 arp_entry_free (ethernet_arp_interface_t * eai, ethernet_arp_ip4_entry_t * e)
1818 ethernet_arp_main_t *am = ðernet_arp_main;
1821 (e, ip4_fib_table_get_index_for_sw_if_index (e->sw_if_index));
1822 hash_unset (eai->arp_entries, e->ip4_address.as_u32);
1823 pool_put (am->ip4_entry_pool, e);
1827 vnet_arp_unset_ip4_over_ethernet_internal (vnet_main_t * vnm,
1828 vnet_arp_set_ip4_over_ethernet_rpc_args_t
1831 ethernet_arp_main_t *am = ðernet_arp_main;
1832 ethernet_arp_ip4_entry_t *e;
1833 ethernet_arp_interface_t *eai;
1835 if (vec_len (am->ethernet_arp_by_sw_if_index) <= args->sw_if_index)
1838 eai = &am->ethernet_arp_by_sw_if_index[args->sw_if_index];
1840 e = arp_entry_find (eai, &args->ip4);
1844 adj_nbr_walk_nh4 (e->sw_if_index,
1845 &e->ip4_address, arp_mk_incomplete_walk, e);
1846 arp_entry_free (eai, e);
1854 vnet_arp_populate_ip4_over_ethernet_internal (vnet_main_t * vnm,
1855 vnet_arp_set_ip4_over_ethernet_rpc_args_t
1858 ethernet_arp_main_t *am = ðernet_arp_main;
1859 ethernet_arp_ip4_entry_t *e;
1860 ethernet_arp_interface_t *eai;
1862 vec_validate (am->ethernet_arp_by_sw_if_index, args->sw_if_index);
1863 eai = &am->ethernet_arp_by_sw_if_index[args->sw_if_index];
1865 e = arp_entry_find (eai, &args->ip4);
1869 adj_nbr_walk_nh4 (e->sw_if_index,
1870 &e->ip4_address, arp_mk_complete_walk, e);
1876 set_ip4_over_ethernet_rpc_callback (vnet_arp_set_ip4_over_ethernet_rpc_args_t
1879 vnet_main_t *vm = vnet_get_main ();
1880 ASSERT (vlib_get_thread_index () == 0);
1882 if (a->flags & ETHERNET_ARP_ARGS_REMOVE)
1883 vnet_arp_unset_ip4_over_ethernet_internal (vm, a);
1884 else if (a->flags & ETHERNET_ARP_ARGS_FLUSH)
1885 vnet_arp_flush_ip4_over_ethernet_internal (vm, a);
1886 else if (a->flags & ETHERNET_ARP_ARGS_POPULATE)
1887 vnet_arp_populate_ip4_over_ethernet_internal (vm, a);
1888 else if (a->flags & ETHERNET_ARP_ARGS_WC_PUB)
1889 vnet_arp_wc_publish_internal (vm, a);
1891 vnet_arp_set_ip4_over_ethernet_internal (vm, a);
1895 * @brief Invoked when the interface's admin state changes
1897 static clib_error_t *
1898 ethernet_arp_sw_interface_up_down (vnet_main_t * vnm,
1899 u32 sw_if_index, u32 flags)
1901 ethernet_arp_main_t *am = ðernet_arp_main;
1902 ethernet_arp_ip4_entry_t *e;
1903 u32 i, *to_update = 0;
1906 pool_foreach (e, am->ip4_entry_pool,
1908 if (e->sw_if_index == sw_if_index)
1909 vec_add1 (to_update,
1910 e - am->ip4_entry_pool);
1914 for (i = 0; i < vec_len (to_update); i++)
1916 e = pool_elt_at_index (am->ip4_entry_pool, to_update[i]);
1918 vnet_arp_set_ip4_over_ethernet_rpc_args_t update_me = {
1919 .ip4.as_u32 = e->ip4_address.as_u32,
1920 .sw_if_index = e->sw_if_index,
1922 mac_address_copy (&update_me.mac, &e->mac);
1924 if (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP)
1926 update_me.flags = ETHERNET_ARP_ARGS_POPULATE;
1927 vnet_arp_populate_ip4_over_ethernet_internal (vnm, &update_me);
1931 update_me.flags = ETHERNET_ARP_ARGS_FLUSH;
1932 vnet_arp_flush_ip4_over_ethernet_internal (vnm, &update_me);
1935 vec_free (to_update);
1940 VNET_SW_INTERFACE_ADMIN_UP_DOWN_FUNCTION (ethernet_arp_sw_interface_up_down);
1943 increment_ip4_and_mac_address (ethernet_arp_ip4_over_ethernet_address_t * a)
1948 for (i = 3; i >= 0; i--)
1950 old = a->ip4.as_u8[i];
1951 a->ip4.as_u8[i] += 1;
1952 if (old < a->ip4.as_u8[i])
1956 for (i = 5; i >= 0; i--)
1958 old = a->mac.bytes[i];
1959 a->mac.bytes[i] += 1;
1960 if (old < a->mac.bytes[i])
1966 vnet_arp_set_ip4_over_ethernet (vnet_main_t * vnm,
1968 const ethernet_arp_ip4_over_ethernet_address_t
1969 * a, ip_neighbor_flags_t flags)
1971 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
1972 .sw_if_index = sw_if_index,
1975 .ip4.as_u32 = a->ip4.as_u32,
1979 vl_api_rpc_call_main_thread (set_ip4_over_ethernet_rpc_callback,
1980 (u8 *) & args, sizeof (args));
1985 proxy_arp_walk (proxy_arp_walk_t cb, void *data)
1987 ethernet_arp_main_t *am = ðernet_arp_main;
1988 ethernet_proxy_arp_t *pa;
1990 vec_foreach (pa, am->proxy_arps)
1992 if (!cb (&pa->lo_addr, &pa->hi_addr, pa->fib_index, data))
1998 vnet_proxy_arp_add_del (ip4_address_t * lo_addr,
1999 ip4_address_t * hi_addr, u32 fib_index, int is_del)
2001 ethernet_arp_main_t *am = ðernet_arp_main;
2002 ethernet_proxy_arp_t *pa;
2003 u32 found_at_index = ~0;
2005 vec_foreach (pa, am->proxy_arps)
2007 if (pa->lo_addr.as_u32 == lo_addr->as_u32 &&
2008 pa->hi_addr.as_u32 == hi_addr->as_u32 && pa->fib_index == fib_index)
2010 found_at_index = pa - am->proxy_arps;
2015 if (found_at_index != ~0)
2017 /* Delete, otherwise it's already in the table */
2019 vec_delete (am->proxy_arps, 1, found_at_index);
2022 /* delete, no such entry */
2024 return VNET_API_ERROR_NO_SUCH_ENTRY;
2026 /* add, not in table */
2027 vec_add2 (am->proxy_arps, pa, 1);
2028 pa->lo_addr.as_u32 = lo_addr->as_u32;
2029 pa->hi_addr.as_u32 = hi_addr->as_u32;
2030 pa->fib_index = fib_index;
2035 * Remove any proxy arp entries asdociated with the
2039 vnet_proxy_arp_fib_reset (u32 fib_id)
2041 ethernet_arp_main_t *am = ðernet_arp_main;
2042 ethernet_proxy_arp_t *pa;
2043 u32 *entries_to_delete = 0;
2047 fib_index = fib_table_find (FIB_PROTOCOL_IP4, fib_id);
2048 if (~0 == fib_index)
2049 return VNET_API_ERROR_NO_SUCH_ENTRY;
2051 vec_foreach (pa, am->proxy_arps)
2053 if (pa->fib_index == fib_index)
2055 vec_add1 (entries_to_delete, pa - am->proxy_arps);
2059 for (i = 0; i < vec_len (entries_to_delete); i++)
2061 vec_delete (am->proxy_arps, 1, entries_to_delete[i]);
2064 vec_free (entries_to_delete);
2069 static clib_error_t *
2070 ip_arp_add_del_command_fn (vlib_main_t * vm,
2071 unformat_input_t * input, vlib_cli_command_t * cmd)
2073 vnet_main_t *vnm = vnet_get_main ();
2075 ethernet_arp_ip4_over_ethernet_address_t lo_addr, hi_addr, addr;
2082 ip_neighbor_flags_t flags;
2084 flags = IP_NEIGHBOR_FLAG_NONE;
2086 while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
2088 /* set ip arp TenGigE1/1/0/1 1.2.3.4 aa:bb:... or aabb.ccdd... */
2089 if (unformat (input, "%U %U %U",
2090 unformat_vnet_sw_interface, vnm, &sw_if_index,
2091 unformat_ip4_address, &addr.ip4,
2092 unformat_mac_address_t, &addr.mac))
2095 else if (unformat (input, "delete") || unformat (input, "del"))
2098 else if (unformat (input, "static"))
2099 flags |= IP_NEIGHBOR_FLAG_STATIC;
2101 else if (unformat (input, "no-fib-entry"))
2102 flags |= IP_NEIGHBOR_FLAG_NO_FIB_ENTRY;
2104 else if (unformat (input, "count %d", &count))
2107 else if (unformat (input, "fib-id %d", &fib_id))
2109 fib_index = fib_table_find (FIB_PROTOCOL_IP4, fib_id);
2111 if (~0 == fib_index)
2112 return clib_error_return (0, "fib ID %d doesn't exist\n", fib_id);
2115 else if (unformat (input, "proxy %U - %U",
2116 unformat_ip4_address, &lo_addr.ip4,
2117 unformat_ip4_address, &hi_addr.ip4))
2125 (void) vnet_proxy_arp_add_del (&lo_addr.ip4, &hi_addr.ip4,
2134 for (i = 0; i < count; i++)
2138 uword event_type, *event_data = 0;
2140 /* Park the debug CLI until the arp entry is installed */
2141 vnet_register_ip4_arp_resolution_event
2142 (vnm, &addr.ip4, vlib_current_process (vm),
2143 1 /* type */ , 0 /* data */ );
2145 vnet_arp_set_ip4_over_ethernet (vnm, sw_if_index, &addr, flags);
2147 vlib_process_wait_for_event (vm);
2148 event_type = vlib_process_get_events (vm, &event_data);
2149 vec_reset_length (event_data);
2150 if (event_type != 1)
2151 clib_warning ("event type %d unexpected", event_type);
2154 vnet_arp_unset_ip4_over_ethernet (vnm, sw_if_index, &addr);
2156 increment_ip4_and_mac_address (&addr);
2161 return clib_error_return (0, "unknown input `%U'",
2162 format_unformat_error, input);
2170 * Add or delete IPv4 ARP cache entries.
2172 * @note 'set ip arp' options (e.g. delete, static, 'fib-id <id>',
2173 * 'count <number>', 'interface ip4_addr mac_addr') can be added in
2174 * any order and combination.
2178 * Add or delete IPv4 ARP cache entries as follows. MAC Address can be in
2179 * either aa:bb:cc:dd:ee:ff format or aabb.ccdd.eeff format.
2180 * @cliexcmd{set ip arp GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2181 * @cliexcmd{set ip arp delete GigabitEthernet2/0/0 6.0.0.3 de:ad:be:ef:ba:be}
2183 * To add or delete an IPv4 ARP cache entry to or from a specific fib
2185 * @cliexcmd{set ip arp fib-id 1 GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2186 * @cliexcmd{set ip arp fib-id 1 delete GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2188 * Add or delete IPv4 static ARP cache entries as follows:
2189 * @cliexcmd{set ip arp static GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2190 * @cliexcmd{set ip arp static delete GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2192 * For testing / debugging purposes, the 'set ip arp' command can add or
2193 * delete multiple entries. Supply the 'count N' parameter:
2194 * @cliexcmd{set ip arp count 10 GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2197 VLIB_CLI_COMMAND (ip_arp_add_del_command, static) = {
2198 .path = "set ip arp",
2200 "set ip arp [del] <intfc> <ip-address> <mac-address> [static] [no-fib-entry] [count <count>] [fib-id <fib-id>] [proxy <lo-addr> - <hi-addr>]",
2201 .function = ip_arp_add_del_command_fn,
2205 static clib_error_t *
2206 set_int_proxy_arp_command_fn (vlib_main_t * vm,
2208 input, vlib_cli_command_t * cmd)
2210 vnet_main_t *vnm = vnet_get_main ();
2212 vnet_sw_interface_t *si;
2216 while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
2218 if (unformat (input, "%U", unformat_vnet_sw_interface,
2221 else if (unformat (input, "enable") || unformat (input, "on"))
2223 else if (unformat (input, "disable") || unformat (input, "off"))
2230 return clib_error_return (0, "unknown input '%U'",
2231 format_unformat_error, input);
2233 si = vnet_get_sw_interface (vnm, sw_if_index);
2236 si->flags |= VNET_SW_INTERFACE_FLAG_PROXY_ARP;
2238 si->flags &= ~VNET_SW_INTERFACE_FLAG_PROXY_ARP;
2245 * Enable proxy-arp on an interface. The vpp stack will answer ARP
2246 * requests for the indicated address range. Multiple proxy-arp
2247 * ranges may be provisioned.
2249 * @note Proxy ARP as a technology is infamous for blackholing traffic.
2250 * Also, the underlying implementation has not been performance-tuned.
2251 * Avoid creating an unnecessarily large set of ranges.
2254 * To enable proxy arp on a range of addresses, use:
2255 * @cliexcmd{set ip arp proxy 6.0.0.1 - 6.0.0.11}
2256 * Append 'del' to delete a range of proxy ARP addresses:
2257 * @cliexcmd{set ip arp proxy 6.0.0.1 - 6.0.0.11 del}
2258 * You must then specifically enable proxy arp on individual interfaces:
2259 * @cliexcmd{set interface proxy-arp GigabitEthernet0/8/0 enable}
2260 * To disable proxy arp on an individual interface:
2261 * @cliexcmd{set interface proxy-arp GigabitEthernet0/8/0 disable}
2263 VLIB_CLI_COMMAND (set_int_proxy_enable_command, static) = {
2264 .path = "set interface proxy-arp",
2266 "set interface proxy-arp <intfc> [enable|disable]",
2267 .function = set_int_proxy_arp_command_fn,
2273 * ARP/ND Termination in a L2 Bridge Domain based on IP4/IP6 to MAC
2274 * hash tables mac_by_ip4 and mac_by_ip6 for each BD.
2278 ARP_TERM_NEXT_L2_OUTPUT,
2283 u32 arp_term_next_node_index[32];
2286 arp_term_l2bd (vlib_main_t * vm,
2287 vlib_node_runtime_t * node, vlib_frame_t * frame)
2289 l2input_main_t *l2im = &l2input_main;
2290 u32 n_left_from, next_index, *from, *to_next;
2291 u32 n_replies_sent = 0;
2292 u16 last_bd_index = ~0;
2293 l2_bridge_domain_t *last_bd_config = 0;
2294 l2_input_config_t *cfg0;
2296 from = vlib_frame_vector_args (frame);
2297 n_left_from = frame->n_vectors;
2298 next_index = node->cached_next_index;
2300 while (n_left_from > 0)
2304 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
2306 while (n_left_from > 0 && n_left_to_next > 0)
2309 ethernet_header_t *eth0;
2310 ethernet_arp_header_t *arp0;
2313 u32 pi0, error0, next0, sw_if_index0;
2324 n_left_to_next -= 1;
2326 p0 = vlib_get_buffer (vm, pi0);
2327 // Terminate only local (SHG == 0) ARP
2328 if (vnet_buffer (p0)->l2.shg != 0)
2329 goto next_l2_feature;
2331 eth0 = vlib_buffer_get_current (p0);
2332 l3h0 = (u8 *) eth0 + vnet_buffer (p0)->l2.l2_len;
2333 ethertype0 = clib_net_to_host_u16 (*(u16 *) (l3h0 - 2));
2334 arp0 = (ethernet_arp_header_t *) l3h0;
2336 if (ethertype0 != ETHERNET_TYPE_ARP)
2339 if ((arp0->opcode !=
2340 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request)) &&
2342 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply)))
2345 /* Must be ARP request/reply packet here */
2346 if (PREDICT_FALSE ((node->flags & VLIB_NODE_FLAG_TRACE) &&
2347 (p0->flags & VLIB_BUFFER_IS_TRACED)))
2349 u8 *t0 = vlib_add_trace (vm, node, p0,
2350 sizeof (ethernet_arp_input_trace_t));
2351 clib_memcpy_fast (t0, l3h0,
2352 sizeof (ethernet_arp_input_trace_t));
2358 clib_net_to_host_u16 (ETHERNET_ARP_HARDWARE_TYPE_ethernet)
2359 ? ETHERNET_ARP_ERROR_l2_type_not_ethernet : error0);
2362 clib_net_to_host_u16 (ETHERNET_TYPE_IP4) ?
2363 ETHERNET_ARP_ERROR_l3_type_not_ip4 : error0);
2365 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
2370 /* Trash ARP packets whose ARP-level source addresses do not
2371 match, or if requester address is mcast */
2373 (!ethernet_mac_address_equal (eth0->src_address,
2374 arp0->ip4_over_ethernet[0].
2376 || ethernet_address_cast (arp0->ip4_over_ethernet[0].mac.bytes))
2378 /* VRRP virtual MAC may be different to SMAC in ARP reply */
2379 if (!ethernet_mac_address_equal
2380 (arp0->ip4_over_ethernet[0].mac.bytes, vrrp_prefix))
2382 error0 = ETHERNET_ARP_ERROR_l2_address_mismatch;
2387 (ip4_address_is_multicast (&arp0->ip4_over_ethernet[0].ip4)))
2389 error0 = ETHERNET_ARP_ERROR_l3_src_address_not_local;
2393 /* Check if anyone want ARP request events for L2 BDs */
2395 ethernet_arp_main_t *am = ðernet_arp_main;
2396 if (am->wc_ip4_arp_publisher_node != (uword) ~ 0)
2397 vnet_arp_wc_publish (sw_if_index0, &arp0->ip4_over_ethernet[0]);
2400 /* lookup BD mac_by_ip4 hash table for MAC entry */
2401 ip0 = arp0->ip4_over_ethernet[1].ip4.as_u32;
2402 bd_index0 = vnet_buffer (p0)->l2.bd_index;
2403 if (PREDICT_FALSE ((bd_index0 != last_bd_index)
2404 || (last_bd_index == (u16) ~ 0)))
2406 last_bd_index = bd_index0;
2407 last_bd_config = vec_elt_at_index (l2im->bd_configs, bd_index0);
2409 macp0 = (u8 *) hash_get (last_bd_config->mac_by_ip4, ip0);
2411 if (PREDICT_FALSE (!macp0))
2412 goto next_l2_feature; /* MAC not found */
2414 /* MAC found, send ARP reply -
2415 Convert ARP request packet to ARP reply */
2416 arp0->opcode = clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply);
2417 arp0->ip4_over_ethernet[1] = arp0->ip4_over_ethernet[0];
2418 arp0->ip4_over_ethernet[0].ip4.as_u32 = ip0;
2419 mac_address_from_bytes (&arp0->ip4_over_ethernet[0].mac, macp0);
2420 clib_memcpy_fast (eth0->dst_address, eth0->src_address, 6);
2421 clib_memcpy_fast (eth0->src_address, macp0, 6);
2422 n_replies_sent += 1;
2425 /* For BVI, need to use l2-fwd node to send ARP reply as
2426 l2-output node cannot output packet to BVI properly */
2427 cfg0 = vec_elt_at_index (l2im->configs, sw_if_index0);
2428 if (PREDICT_FALSE (cfg0->bvi))
2430 vnet_buffer (p0)->l2.feature_bitmap |= L2INPUT_FEAT_FWD;
2431 vnet_buffer (p0)->sw_if_index[VLIB_RX] = 0;
2432 goto next_l2_feature;
2435 /* Send ARP/ND reply back out input interface through l2-output */
2436 vnet_buffer (p0)->sw_if_index[VLIB_TX] = sw_if_index0;
2437 next0 = ARP_TERM_NEXT_L2_OUTPUT;
2438 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
2439 to_next, n_left_to_next, pi0,
2444 /* IP6 ND event notification or solicitation handling to generate
2445 local response instead of flooding */
2446 iph0 = (ip6_header_t *) l3h0;
2447 if (PREDICT_FALSE (ethertype0 == ETHERNET_TYPE_IP6 &&
2448 iph0->protocol == IP_PROTOCOL_ICMP6 &&
2449 !ip6_address_is_unspecified
2450 (&iph0->src_address)))
2452 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
2453 if (vnet_ip6_nd_term
2454 (vm, node, p0, eth0, iph0, sw_if_index0,
2455 vnet_buffer (p0)->l2.bd_index))
2456 goto output_response;
2461 next0 = vnet_l2_feature_next (p0, arp_term_next_node_index,
2462 L2INPUT_FEAT_ARP_TERM);
2463 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
2464 to_next, n_left_to_next,
2470 if (0 == arp0->ip4_over_ethernet[0].ip4.as_u32 ||
2471 (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
2472 arp0->ip4_over_ethernet[1].ip4.as_u32))
2474 error0 = ETHERNET_ARP_ERROR_gratuitous_arp;
2476 next0 = ARP_TERM_NEXT_DROP;
2477 p0->error = node->errors[error0];
2479 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
2480 to_next, n_left_to_next, pi0,
2484 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
2487 vlib_error_count (vm, node->node_index,
2488 ETHERNET_ARP_ERROR_replies_sent, n_replies_sent);
2489 return frame->n_vectors;
2493 VLIB_REGISTER_NODE (arp_term_l2bd_node, static) = {
2494 .function = arp_term_l2bd,
2495 .name = "arp-term-l2bd",
2496 .vector_size = sizeof (u32),
2497 .n_errors = ETHERNET_ARP_N_ERROR,
2498 .error_strings = ethernet_arp_error_strings,
2499 .n_next_nodes = ARP_TERM_N_NEXT,
2501 [ARP_TERM_NEXT_L2_OUTPUT] = "l2-output",
2502 [ARP_TERM_NEXT_DROP] = "error-drop",
2504 .format_buffer = format_ethernet_arp_header,
2505 .format_trace = format_arp_term_input_trace,
2510 arp_term_init (vlib_main_t * vm)
2512 // Initialize the feature next-node indexes
2513 feat_bitmap_init_next_nodes (vm,
2514 arp_term_l2bd_node.index,
2516 l2input_get_feat_names (),
2517 arp_term_next_node_index);
2521 VLIB_INIT_FUNCTION (arp_term_init);
2524 change_arp_mac (u32 sw_if_index, ethernet_arp_ip4_entry_t * e)
2526 if (e->sw_if_index == sw_if_index)
2528 adj_nbr_walk_nh4 (e->sw_if_index,
2529 &e->ip4_address, arp_mk_complete_walk, e);
2534 ethernet_arp_change_mac (u32 sw_if_index)
2536 ethernet_arp_main_t *am = ðernet_arp_main;
2537 ethernet_arp_ip4_entry_t *e;
2541 pool_foreach (e, am->ip4_entry_pool,
2543 change_arp_mac (sw_if_index, e);
2547 ai = adj_glean_get (FIB_PROTOCOL_IP4, sw_if_index);
2549 if (ADJ_INDEX_INVALID != ai)
2550 adj_glean_update_rewrite (ai);
2554 send_ip4_garp (vlib_main_t * vm, u32 sw_if_index)
2556 ip4_main_t *i4m = &ip4_main;
2557 ip4_address_t *ip4_addr = ip4_interface_first_address (i4m, sw_if_index, 0);
2559 send_ip4_garp_w_addr (vm, ip4_addr, sw_if_index);
2563 send_ip4_garp_w_addr (vlib_main_t * vm,
2564 const ip4_address_t * ip4_addr, u32 sw_if_index)
2566 ip4_main_t *i4m = &ip4_main;
2567 vnet_main_t *vnm = vnet_get_main ();
2568 u8 *rewrite, rewrite_len;
2569 vnet_hw_interface_t *hi = vnet_get_sup_hw_interface (vnm, sw_if_index);
2573 clib_warning ("Sending GARP for IP4 address %U on sw_if_idex %d",
2574 format_ip4_address, ip4_addr, sw_if_index);
2576 /* Form GARP packet for output - Gratuitous ARP is an ARP request packet
2577 where the interface IP/MAC pair is used for both source and request
2578 MAC/IP pairs in the request */
2580 ethernet_arp_header_t *h = vlib_packet_template_get_packet
2581 (vm, &i4m->ip4_arp_request_packet_template, &bi);
2586 mac_address_from_bytes (&h->ip4_over_ethernet[0].mac, hi->hw_address);
2587 mac_address_from_bytes (&h->ip4_over_ethernet[1].mac, hi->hw_address);
2588 h->ip4_over_ethernet[0].ip4 = ip4_addr[0];
2589 h->ip4_over_ethernet[1].ip4 = ip4_addr[0];
2591 /* Setup MAC header with ARP Etype and broadcast DMAC */
2592 vlib_buffer_t *b = vlib_get_buffer (vm, bi);
2594 ethernet_build_rewrite (vnm, sw_if_index, VNET_LINK_ARP,
2595 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST);
2596 rewrite_len = vec_len (rewrite);
2597 vlib_buffer_advance (b, -rewrite_len);
2598 ethernet_header_t *e = vlib_buffer_get_current (b);
2599 clib_memcpy_fast (e->dst_address, rewrite, rewrite_len);
2602 /* Send GARP packet out the specified interface */
2603 vnet_buffer (b)->sw_if_index[VLIB_RX] =
2604 vnet_buffer (b)->sw_if_index[VLIB_TX] = sw_if_index;
2605 vlib_frame_t *f = vlib_get_frame_to_node (vm, hi->output_node_index);
2606 u32 *to_next = vlib_frame_vector_args (f);
2609 vlib_put_frame_to_node (vm, hi->output_node_index, f);
2614 * Remove any arp entries asociated with the specificed interface
2617 vnet_arp_delete_sw_interface (vnet_main_t * vnm, u32 sw_if_index, u32 is_add)
2619 if (!is_add && sw_if_index != ~0)
2621 ethernet_arp_main_t *am = ðernet_arp_main;
2622 ethernet_arp_ip4_entry_t *e;
2624 pool_foreach (e, am->ip4_entry_pool, ({
2625 if (e->sw_if_index != sw_if_index)
2627 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
2628 .sw_if_index = sw_if_index,
2629 .ip4 = e->ip4_address,
2631 vnet_arp_unset_ip4_over_ethernet_internal (vnm, &args);
2637 VNET_SW_INTERFACE_ADD_DEL_FUNCTION (vnet_arp_delete_sw_interface);
2640 * fd.io coding-style-patch-verification: ON
2643 * eval: (c-set-style "gnu")