2 * ethernet/arp.c: IP v4 ARP node
4 * Copyright (c) 2010 Cisco and/or its affiliates.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
18 #include <vnet/ip/ip.h>
19 #include <vnet/ip/ip_neighbor.h>
20 #include <vnet/ip/ip6.h>
21 #include <vnet/ethernet/ethernet.h>
22 #include <vnet/ethernet/arp.h>
23 #include <vnet/l2/l2_input.h>
24 #include <vppinfra/mhash.h>
25 #include <vnet/fib/ip4_fib.h>
26 #include <vnet/fib/fib_entry_src.h>
27 #include <vnet/adj/adj_nbr.h>
28 #include <vnet/adj/adj_mcast.h>
29 #include <vnet/mpls/mpls.h>
30 #include <vnet/l2/feat_bitmap.h>
32 #include <vlibmemory/api.h>
38 * This file contains code to manage the IPv4 ARP tables (IP Address
39 * to MAC Address lookup).
44 * @brief Per-interface ARP configuration and state
46 typedef struct ethernet_arp_interface_t_
49 * Hash table of ARP entries.
50 * Since this hash table is per-interface, the key is only the IPv4 address.
54 * Is ARP enabled on this interface
58 * Is Proxy ARP enabled on this interface
61 } ethernet_arp_interface_t;
65 ip4_address_t lo_addr;
66 ip4_address_t hi_addr;
68 } ethernet_proxy_arp_t;
76 /* Used for arp event notification only */
77 arp_change_event_cb_t data_callback;
79 } pending_resolution_t;
83 /* Hash tables mapping name to opcode. */
84 uword *opcode_by_name;
86 /* lite beer "glean" adjacency handling */
87 uword *pending_resolutions_by_address;
88 pending_resolution_t *pending_resolutions;
90 /* Mac address change notification */
91 uword *mac_changes_by_address;
92 pending_resolution_t *mac_changes;
94 ethernet_arp_ip4_entry_t *ip4_entry_pool;
96 /* ARP attack mitigation */
98 u32 limit_arp_cache_size;
100 /** Per interface state */
101 ethernet_arp_interface_t *ethernet_arp_by_sw_if_index;
103 /* Proxy arp vector */
104 ethernet_proxy_arp_t *proxy_arps;
106 uword wc_ip4_arp_publisher_node;
107 uword wc_ip4_arp_publisher_et;
109 /* ARP feature arc index */
110 u8 feature_arc_index;
111 } ethernet_arp_main_t;
113 static ethernet_arp_main_t ethernet_arp_main;
120 ip_neighbor_flags_t nbr_flags;
122 #define ETHERNET_ARP_ARGS_REMOVE (1<<0)
123 #define ETHERNET_ARP_ARGS_FLUSH (1<<1)
124 #define ETHERNET_ARP_ARGS_POPULATE (1<<2)
125 #define ETHERNET_ARP_ARGS_WC_PUB (1<<3)
126 } vnet_arp_set_ip4_over_ethernet_rpc_args_t;
128 static const u8 vrrp_prefix[] = { 0x00, 0x00, 0x5E, 0x00, 0x01 };
130 /* Node index for send_garp_na_process */
131 u32 send_garp_na_process_node_index;
134 set_ip4_over_ethernet_rpc_callback (vnet_arp_set_ip4_over_ethernet_rpc_args_t
138 format_ethernet_arp_hardware_type (u8 * s, va_list * va)
140 ethernet_arp_hardware_type_t h = va_arg (*va, ethernet_arp_hardware_type_t);
144 #define _(n,f) case n: t = #f; break;
145 foreach_ethernet_arp_hardware_type;
149 return format (s, "unknown 0x%x", h);
152 return format (s, "%s", t);
156 format_ethernet_arp_opcode (u8 * s, va_list * va)
158 ethernet_arp_opcode_t o = va_arg (*va, ethernet_arp_opcode_t);
162 #define _(f) case ETHERNET_ARP_OPCODE_##f: t = #f; break;
163 foreach_ethernet_arp_opcode;
167 return format (s, "unknown 0x%x", o);
170 return format (s, "%s", t);
174 unformat_ethernet_arp_opcode_host_byte_order (unformat_input_t * input,
177 int *result = va_arg (*args, int *);
178 ethernet_arp_main_t *am = ðernet_arp_main;
181 /* Numeric opcode. */
182 if (unformat (input, "0x%x", &x) || unformat (input, "%d", &x))
191 if (unformat_user (input, unformat_vlib_number_by_name,
192 am->opcode_by_name, &i))
202 unformat_ethernet_arp_opcode_net_byte_order (unformat_input_t * input,
205 int *result = va_arg (*args, int *);
207 (input, unformat_ethernet_arp_opcode_host_byte_order, result))
210 *result = clib_host_to_net_u16 ((u16) * result);
215 format_ethernet_arp_header (u8 * s, va_list * va)
217 ethernet_arp_header_t *a = va_arg (*va, ethernet_arp_header_t *);
218 u32 max_header_bytes = va_arg (*va, u32);
220 u16 l2_type, l3_type;
222 if (max_header_bytes != 0 && sizeof (a[0]) > max_header_bytes)
223 return format (s, "ARP header truncated");
225 l2_type = clib_net_to_host_u16 (a->l2_type);
226 l3_type = clib_net_to_host_u16 (a->l3_type);
228 indent = format_get_indent (s);
230 s = format (s, "%U, type %U/%U, address size %d/%d",
231 format_ethernet_arp_opcode, clib_net_to_host_u16 (a->opcode),
232 format_ethernet_arp_hardware_type, l2_type,
233 format_ethernet_type, l3_type,
234 a->n_l2_address_bytes, a->n_l3_address_bytes);
236 if (l2_type == ETHERNET_ARP_HARDWARE_TYPE_ethernet
237 && l3_type == ETHERNET_TYPE_IP4)
239 s = format (s, "\n%U%U/%U -> %U/%U",
240 format_white_space, indent,
241 format_mac_address_t, &a->ip4_over_ethernet[0].mac,
242 format_ip4_address, &a->ip4_over_ethernet[0].ip4,
243 format_mac_address_t, &a->ip4_over_ethernet[1].mac,
244 format_ip4_address, &a->ip4_over_ethernet[1].ip4);
248 uword n2 = a->n_l2_address_bytes;
249 uword n3 = a->n_l3_address_bytes;
250 s = format (s, "\n%U%U/%U -> %U/%U",
251 format_white_space, indent,
252 format_hex_bytes, a->data + 0 * n2 + 0 * n3, n2,
253 format_hex_bytes, a->data + 1 * n2 + 0 * n3, n3,
254 format_hex_bytes, a->data + 1 * n2 + 1 * n3, n2,
255 format_hex_bytes, a->data + 2 * n2 + 1 * n3, n3);
262 format_ethernet_arp_ip4_entry (u8 * s, va_list * va)
264 vnet_main_t *vnm = va_arg (*va, vnet_main_t *);
265 ethernet_arp_ip4_entry_t *e = va_arg (*va, ethernet_arp_ip4_entry_t *);
266 vnet_sw_interface_t *si;
269 return format (s, "%=12s%=16s%=6s%=20s%=24s", "Time", "IP4",
270 "Flags", "Ethernet", "Interface");
272 si = vnet_get_sw_interface (vnm, e->sw_if_index);
274 return format (s, "%=12U%=16U%=6U%=20U%U",
275 format_vlib_time, vnm->vlib_main, e->time_last_updated,
276 format_ip4_address, &e->ip4_address,
277 format_ip_neighbor_flags, e->flags,
278 format_mac_address_t, &e->mac,
279 format_vnet_sw_interface_name, vnm, si);
285 } ethernet_arp_input_trace_t;
288 format_ethernet_arp_input_trace (u8 * s, va_list * va)
290 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
291 CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
292 ethernet_arp_input_trace_t *t = va_arg (*va, ethernet_arp_input_trace_t *);
295 format_ethernet_arp_header,
296 t->packet_data, sizeof (t->packet_data));
302 format_arp_term_input_trace (u8 * s, va_list * va)
304 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
305 CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
306 ethernet_arp_input_trace_t *t = va_arg (*va, ethernet_arp_input_trace_t *);
308 /* arp-term trace data saved is either arp or ip6/icmp6 packet:
309 - for arp, the 1st 16-bit field is hw type of value of 0x0001.
310 - for ip6, the first nibble has value of 6. */
311 s = format (s, "%U", t->packet_data[0] == 0 ?
312 format_ethernet_arp_header : format_ip6_header,
313 t->packet_data, sizeof (t->packet_data));
319 arp_nbr_probe (ip_adjacency_t * adj)
321 vnet_main_t *vnm = vnet_get_main ();
322 ip4_main_t *im = &ip4_main;
323 ip_interface_address_t *ia;
324 ethernet_arp_header_t *h;
325 vnet_hw_interface_t *hi;
326 vnet_sw_interface_t *si;
332 vm = vlib_get_main ();
334 si = vnet_get_sw_interface (vnm, adj->rewrite_header.sw_if_index);
336 if (!(si->flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP))
342 ip4_interface_address_matching_destination (im,
343 &adj->sub_type.nbr.next_hop.
353 vlib_packet_template_get_packet (vm, &im->ip4_arp_request_packet_template,
358 hi = vnet_get_sup_hw_interface (vnm, adj->rewrite_header.sw_if_index);
360 mac_address_from_bytes (&h->ip4_over_ethernet[0].mac, hi->hw_address);
362 h->ip4_over_ethernet[0].ip4 = src[0];
363 h->ip4_over_ethernet[1].ip4 = adj->sub_type.nbr.next_hop.ip4;
365 b = vlib_get_buffer (vm, bi);
366 vnet_buffer (b)->sw_if_index[VLIB_RX] =
367 vnet_buffer (b)->sw_if_index[VLIB_TX] = adj->rewrite_header.sw_if_index;
369 /* Add encapsulation string for software interface (e.g. ethernet header). */
370 vnet_rewrite_one_header (adj[0], h, sizeof (ethernet_header_t));
371 vlib_buffer_advance (b, -adj->rewrite_header.data_bytes);
374 vlib_frame_t *f = vlib_get_frame_to_node (vm, hi->output_node_index);
375 u32 *to_next = vlib_frame_vector_args (f);
378 vlib_put_frame_to_node (vm, hi->output_node_index, f);
383 arp_mk_complete (adj_index_t ai, ethernet_arp_ip4_entry_t * e)
385 adj_nbr_update_rewrite
386 (ai, ADJ_NBR_REWRITE_FLAG_COMPLETE,
387 ethernet_build_rewrite (vnet_get_main (),
389 adj_get_link_type (ai), &e->mac));
393 arp_mk_incomplete (adj_index_t ai)
395 ip_adjacency_t *adj = adj_get (ai);
397 adj_nbr_update_rewrite
399 ADJ_NBR_REWRITE_FLAG_INCOMPLETE,
400 ethernet_build_rewrite (vnet_get_main (),
401 adj->rewrite_header.sw_if_index,
403 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST));
406 static ethernet_arp_ip4_entry_t *
407 arp_entry_find (ethernet_arp_interface_t * eai, const ip4_address_t * addr)
409 ethernet_arp_main_t *am = ðernet_arp_main;
410 ethernet_arp_ip4_entry_t *e = NULL;
413 if (NULL != eai->arp_entries)
415 p = hash_get (eai->arp_entries, addr->as_u32);
419 e = pool_elt_at_index (am->ip4_entry_pool, p[0]);
426 arp_mk_complete_walk (adj_index_t ai, void *ctx)
428 ethernet_arp_ip4_entry_t *e = ctx;
430 arp_mk_complete (ai, e);
432 return (ADJ_WALK_RC_CONTINUE);
436 arp_mk_incomplete_walk (adj_index_t ai, void *ctx)
438 arp_mk_incomplete (ai);
440 return (ADJ_WALK_RC_CONTINUE);
444 arp_is_enabled (ethernet_arp_main_t * am, u32 sw_if_index)
446 if (vec_len (am->ethernet_arp_by_sw_if_index) <= sw_if_index)
449 return (am->ethernet_arp_by_sw_if_index[sw_if_index].enabled);
453 arp_enable (ethernet_arp_main_t * am, u32 sw_if_index)
455 if (arp_is_enabled (am, sw_if_index))
458 vec_validate (am->ethernet_arp_by_sw_if_index, sw_if_index);
460 am->ethernet_arp_by_sw_if_index[sw_if_index].enabled = 1;
462 vnet_feature_enable_disable ("arp", "arp-reply", sw_if_index, 1, NULL, 0);
466 vnet_arp_flush_ip4_over_ethernet_internal (vnet_main_t * vnm,
467 vnet_arp_set_ip4_over_ethernet_rpc_args_t
471 arp_disable (ethernet_arp_main_t * am, u32 sw_if_index)
473 ethernet_arp_interface_t *eai;
474 ethernet_arp_ip4_entry_t *e;
475 u32 i, *to_delete = 0;
478 if (!arp_is_enabled (am, sw_if_index))
481 vnet_feature_enable_disable ("arp", "arp-reply", sw_if_index, 0, NULL, 0);
483 eai = &am->ethernet_arp_by_sw_if_index[sw_if_index];
487 hash_foreach_pair (pair, eai->arp_entries,
489 e = pool_elt_at_index(am->ip4_entry_pool,
491 vec_add1 (to_delete, e - am->ip4_entry_pool);
495 for (i = 0; i < vec_len (to_delete); i++)
497 e = pool_elt_at_index (am->ip4_entry_pool, to_delete[i]);
499 vnet_arp_set_ip4_over_ethernet_rpc_args_t delme = {
500 .ip4.as_u32 = e->ip4_address.as_u32,
501 .sw_if_index = e->sw_if_index,
502 .flags = ETHERNET_ARP_ARGS_FLUSH,
504 mac_address_copy (&delme.mac, &e->mac);
506 vnet_arp_flush_ip4_over_ethernet_internal (vnet_get_main (), &delme);
509 vec_free (to_delete);
515 arp_update_adjacency (vnet_main_t * vnm, u32 sw_if_index, u32 ai)
517 ethernet_arp_main_t *am = ðernet_arp_main;
518 ethernet_arp_interface_t *arp_int;
519 ethernet_arp_ip4_entry_t *e;
524 arp_enable (am, sw_if_index);
525 arp_int = &am->ethernet_arp_by_sw_if_index[sw_if_index];
526 e = arp_entry_find (arp_int, &adj->sub_type.nbr.next_hop.ip4);
528 switch (adj->lookup_next_index)
530 case IP_LOOKUP_NEXT_GLEAN:
531 adj_glean_update_rewrite (ai);
533 case IP_LOOKUP_NEXT_ARP:
536 adj_nbr_walk_nh4 (sw_if_index,
537 &e->ip4_address, arp_mk_complete_walk, e);
542 * no matching ARP entry.
543 * construct the rewrite required to for an ARP packet, and stick
544 * that in the adj's pipe to smoke.
546 adj_nbr_update_rewrite
548 ADJ_NBR_REWRITE_FLAG_INCOMPLETE,
549 ethernet_build_rewrite
553 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST));
556 * since the FIB has added this adj for a route, it makes sense it
557 * may want to forward traffic sometime soon. Let's send a
558 * speculative ARP. just one. If we were to do periodically that
559 * wouldn't be bad either, but that's more code than i'm prepared to
560 * write at this time for relatively little reward.
565 case IP_LOOKUP_NEXT_BCAST:
566 adj_nbr_update_rewrite (ai,
567 ADJ_NBR_REWRITE_FLAG_COMPLETE,
568 ethernet_build_rewrite
572 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST));
574 case IP_LOOKUP_NEXT_MCAST:
577 * Construct a partial rewrite from the known ethernet mcast dest MAC
582 rewrite = ethernet_build_rewrite (vnm,
585 ethernet_ip4_mcast_dst_addr ());
586 offset = vec_len (rewrite) - 2;
589 * Complete the remaining fields of the adj's rewrite to direct the
590 * complete of the rewrite at switch time by copying in the IP
591 * dst address's bytes.
592 * Offset is 2 bytes into the MAC destination address.
594 adj_mcast_update_rewrite (ai, rewrite, offset);
598 case IP_LOOKUP_NEXT_DROP:
599 case IP_LOOKUP_NEXT_PUNT:
600 case IP_LOOKUP_NEXT_LOCAL:
601 case IP_LOOKUP_NEXT_REWRITE:
602 case IP_LOOKUP_NEXT_MCAST_MIDCHAIN:
603 case IP_LOOKUP_NEXT_MIDCHAIN:
604 case IP_LOOKUP_NEXT_ICMP_ERROR:
605 case IP_LOOKUP_N_NEXT:
612 arp_adj_fib_add (ethernet_arp_ip4_entry_t * e, u32 fib_index)
616 .fp_proto = FIB_PROTOCOL_IP4,
617 .fp_addr.ip4 = e->ip4_address,
621 fib_table_entry_path_add (fib_index, &pfx, FIB_SOURCE_ADJ,
622 FIB_ENTRY_FLAG_ATTACHED,
623 DPO_PROTO_IP4, &pfx.fp_addr,
624 e->sw_if_index, ~0, 1, NULL,
625 FIB_ROUTE_PATH_FLAG_NONE);
626 fib_table_lock (fib_index, FIB_PROTOCOL_IP4, FIB_SOURCE_ADJ);
630 arp_adj_fib_remove (ethernet_arp_ip4_entry_t * e, u32 fib_index)
632 if (FIB_NODE_INDEX_INVALID != e->fib_entry_index)
636 .fp_proto = FIB_PROTOCOL_IP4,
637 .fp_addr.ip4 = e->ip4_address,
641 fib_index = ip4_fib_table_get_index_for_sw_if_index (e->sw_if_index);
643 fib_table_entry_path_remove (fib_index, &pfx,
647 e->sw_if_index, ~0, 1,
648 FIB_ROUTE_PATH_FLAG_NONE);
649 fib_table_unlock (fib_index, FIB_PROTOCOL_IP4, FIB_SOURCE_ADJ);
653 static ethernet_arp_ip4_entry_t *
654 force_reuse_arp_entry (void)
656 ethernet_arp_ip4_entry_t *e;
657 ethernet_arp_main_t *am = ðernet_arp_main;
659 u32 index = pool_next_index (am->ip4_entry_pool, am->arp_delete_rotor);
660 if (index == ~0) /* Try again from elt 0 */
661 index = pool_next_index (am->ip4_entry_pool, index);
663 /* Find a non-static random entry to free up for reuse */
666 if ((count++ == 100) || (index == ~0))
667 return NULL; /* give up after 100 entries */
668 e = pool_elt_at_index (am->ip4_entry_pool, index);
669 am->arp_delete_rotor = index;
670 index = pool_next_index (am->ip4_entry_pool, index);
672 while (e->flags & IP_NEIGHBOR_FLAG_STATIC);
674 /* Remove ARP entry from its interface and update fib */
676 (am->ethernet_arp_by_sw_if_index[e->sw_if_index].arp_entries,
677 e->ip4_address.as_u32);
679 (e, ip4_fib_table_get_index_for_sw_if_index (e->sw_if_index));
680 adj_nbr_walk_nh4 (e->sw_if_index,
681 &e->ip4_address, arp_mk_incomplete_walk, e);
686 vnet_arp_set_ip4_over_ethernet_internal (vnet_main_t * vnm,
687 vnet_arp_set_ip4_over_ethernet_rpc_args_t
690 ethernet_arp_ip4_entry_t *e = 0;
691 ethernet_arp_main_t *am = ðernet_arp_main;
692 vlib_main_t *vm = vlib_get_main ();
693 int make_new_arp_cache_entry = 1;
695 pending_resolution_t *pr, *mc;
696 ethernet_arp_interface_t *arp_int;
697 u32 sw_if_index = args->sw_if_index;
699 arp_enable (am, sw_if_index);
701 arp_int = &am->ethernet_arp_by_sw_if_index[sw_if_index];
703 if (NULL != arp_int->arp_entries)
705 p = hash_get (arp_int->arp_entries, args->ip4.as_u32);
708 e = pool_elt_at_index (am->ip4_entry_pool, p[0]);
710 /* Refuse to over-write static arp. */
711 if (!(args->nbr_flags & IP_NEIGHBOR_FLAG_STATIC) &&
712 (e->flags & IP_NEIGHBOR_FLAG_STATIC))
714 /* if MAC address match, still check to send event */
715 if (mac_address_equal (&e->mac, &args->mac))
716 goto check_customers;
719 make_new_arp_cache_entry = 0;
723 if (make_new_arp_cache_entry)
725 if (am->limit_arp_cache_size &&
726 pool_elts (am->ip4_entry_pool) >= am->limit_arp_cache_size)
728 e = force_reuse_arp_entry ();
733 pool_get (am->ip4_entry_pool, e);
735 if (NULL == arp_int->arp_entries)
736 arp_int->arp_entries = hash_create (0, sizeof (u32));
738 hash_set (arp_int->arp_entries, args->ip4.as_u32,
739 e - am->ip4_entry_pool);
741 e->sw_if_index = sw_if_index;
742 e->ip4_address = args->ip4;
743 e->fib_entry_index = FIB_NODE_INDEX_INVALID;
744 mac_address_copy (&e->mac, &args->mac);
746 if (!(args->nbr_flags & IP_NEIGHBOR_FLAG_NO_FIB_ENTRY))
749 ip4_fib_table_get_index_for_sw_if_index
754 e->flags |= IP_NEIGHBOR_FLAG_NO_FIB_ENTRY;
760 * prevent a DoS attack from the data-plane that
761 * spams us with no-op updates to the MAC address
763 if (mac_address_equal (&e->mac, &args->mac))
765 e->time_last_updated = vlib_time_now (vm);
766 goto check_customers;
769 /* Update ethernet address. */
770 mac_address_copy (&e->mac, &args->mac);
773 /* Update time stamp and flags. */
774 e->time_last_updated = vlib_time_now (vm);
775 if (args->nbr_flags & IP_NEIGHBOR_FLAG_STATIC)
777 e->flags &= ~IP_NEIGHBOR_FLAG_DYNAMIC;
778 e->flags |= IP_NEIGHBOR_FLAG_STATIC;
782 e->flags &= ~IP_NEIGHBOR_FLAG_STATIC;
783 e->flags |= IP_NEIGHBOR_FLAG_DYNAMIC;
786 adj_nbr_walk_nh4 (sw_if_index, &e->ip4_address, arp_mk_complete_walk, e);
789 /* Customer(s) waiting for this address to be resolved? */
790 p = hash_get (am->pending_resolutions_by_address, args->ip4.as_u32);
796 while (next_index != (u32) ~ 0)
798 pr = pool_elt_at_index (am->pending_resolutions, next_index);
799 vlib_process_signal_event (vm, pr->node_index,
800 pr->type_opaque, pr->data);
801 next_index = pr->next_index;
802 pool_put (am->pending_resolutions, pr);
805 hash_unset (am->pending_resolutions_by_address, args->ip4.as_u32);
808 /* Customer(s) requesting ARP event for this address? */
809 p = hash_get (am->mac_changes_by_address, args->ip4.as_u32);
815 while (next_index != (u32) ~ 0)
818 mc = pool_elt_at_index (am->mac_changes, next_index);
820 /* Call the user's data callback, return 1 to suppress dup events */
821 if (mc->data_callback)
822 rv = (mc->data_callback) (mc->data, &args->mac, sw_if_index, 0);
825 * Signal the resolver process, as long as the user
826 * says they want to be notified
829 vlib_process_signal_event (vm, mc->node_index,
830 mc->type_opaque, mc->data);
831 next_index = mc->next_index;
839 vnet_register_ip4_arp_resolution_event (vnet_main_t * vnm,
842 uword type_opaque, uword data)
844 ethernet_arp_main_t *am = ðernet_arp_main;
845 ip4_address_t *address = address_arg;
847 pending_resolution_t *pr;
849 pool_get (am->pending_resolutions, pr);
852 pr->node_index = node_index;
853 pr->type_opaque = type_opaque;
855 pr->data_callback = 0;
857 p = hash_get (am->pending_resolutions_by_address, address->as_u32);
860 /* Insert new resolution at the head of the list */
861 pr->next_index = p[0];
862 hash_unset (am->pending_resolutions_by_address, address->as_u32);
865 hash_set (am->pending_resolutions_by_address, address->as_u32,
866 pr - am->pending_resolutions);
870 vnet_add_del_ip4_arp_change_event (vnet_main_t * vnm,
871 arp_change_event_cb_t data_callback,
875 uword type_opaque, uword data, int is_add)
877 ethernet_arp_main_t *am = ðernet_arp_main;
878 ip4_address_t *address = address_arg;
880 /* Try to find an existing entry */
881 u32 *first = (u32 *) hash_get (am->mac_changes_by_address, address->as_u32);
883 pending_resolution_t *mc;
884 while (p && *p != ~0)
886 mc = pool_elt_at_index (am->mac_changes, *p);
887 if (mc->node_index == node_index && mc->type_opaque == type_opaque
893 int found = p && *p != ~0;
897 return VNET_API_ERROR_ENTRY_ALREADY_EXISTS;
899 pool_get (am->mac_changes, mc);
901 *mc = (pending_resolution_t)
904 .node_index = node_index,
905 .type_opaque = type_opaque,
907 .data_callback = data_callback,
912 /* Insert new resolution at the end of the list */
913 u32 new_idx = mc - am->mac_changes;
917 hash_set (am->mac_changes_by_address, address->as_u32, new_idx);
922 return VNET_API_ERROR_NO_SUCH_ENTRY;
924 /* Clients may need to clean up pool entries, too */
926 /* no new mac addrs */
927 (data_callback) (mc->data, NULL, ~0, NULL);
929 /* Remove the entry from the list and delete the entry */
931 pool_put (am->mac_changes, mc);
933 /* Remove from hash if we deleted the last entry */
934 if (*p == ~0 && p == first)
935 hash_unset (am->mac_changes_by_address, address->as_u32);
940 /* Either we drop the packet or we send a reply to the sender. */
944 ARP_REPLY_NEXT_REPLY_TX,
948 #define foreach_ethernet_arp_error \
949 _ (replies_sent, "ARP replies sent") \
950 _ (l2_type_not_ethernet, "L2 type not ethernet") \
951 _ (l3_type_not_ip4, "L3 type not IP4") \
952 _ (l3_src_address_not_local, "IP4 source address not local to subnet") \
953 _ (l3_dst_address_not_local, "IP4 destination address not local to subnet") \
954 _ (l3_dst_address_unset, "IP4 destination address is unset") \
955 _ (l3_src_address_is_local, "IP4 source address matches local interface") \
956 _ (l3_src_address_learned, "ARP request IP4 source address learned") \
957 _ (replies_received, "ARP replies received") \
958 _ (opcode_not_request, "ARP opcode not request") \
959 _ (proxy_arp_replies_sent, "Proxy ARP replies sent") \
960 _ (l2_address_mismatch, "ARP hw addr does not match L2 frame src addr") \
961 _ (gratuitous_arp, "ARP probe or announcement dropped") \
962 _ (interface_no_table, "Interface is not mapped to an IP table") \
963 _ (interface_not_ip_enabled, "Interface is not IP enabled") \
964 _ (unnumbered_mismatch, "RX interface is unnumbered to different subnet") \
968 #define _(sym,string) ETHERNET_ARP_ERROR_##sym,
969 foreach_ethernet_arp_error
971 ETHERNET_ARP_N_ERROR,
972 } ethernet_arp_reply_error_t;
975 arp_unnumbered (vlib_buffer_t * p0,
976 u32 input_sw_if_index, u32 conn_sw_if_index)
978 vnet_main_t *vnm = vnet_get_main ();
979 vnet_interface_main_t *vim = &vnm->interface_main;
980 vnet_sw_interface_t *si;
982 /* verify that the input interface is unnumbered to the connected.
983 * the connected interface is the interface on which the subnet is
985 si = &vim->sw_interfaces[input_sw_if_index];
987 if (!(si->flags & VNET_SW_INTERFACE_FLAG_UNNUMBERED &&
988 (si->unnumbered_sw_if_index == conn_sw_if_index)))
990 /* the input interface is not unnumbered to the interface on which
991 * the sub-net is configured that covers the ARP request.
992 * So this is not the case for unnumbered.. */
1000 arp_learn (vnet_main_t * vnm,
1001 ethernet_arp_main_t * am, u32 sw_if_index,
1002 const ethernet_arp_ip4_over_ethernet_address_t * addr)
1004 vnet_arp_set_ip4_over_ethernet (vnm, sw_if_index, addr, 0);
1005 return (ETHERNET_ARP_ERROR_l3_src_address_learned);
1008 typedef enum arp_input_next_t_
1010 ARP_INPUT_NEXT_DROP,
1011 ARP_INPUT_NEXT_DISABLED,
1016 arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
1018 u32 n_left_from, next_index, *from, *to_next, n_left_to_next;
1019 ethernet_arp_main_t *am = ðernet_arp_main;
1021 from = vlib_frame_vector_args (frame);
1022 n_left_from = frame->n_vectors;
1023 next_index = node->cached_next_index;
1025 if (node->flags & VLIB_NODE_FLAG_TRACE)
1026 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
1028 sizeof (ethernet_arp_input_trace_t));
1030 while (n_left_from > 0)
1032 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1034 while (n_left_from > 0 && n_left_to_next > 0)
1036 const ethernet_arp_header_t *arp0;
1037 arp_input_next_t next0;
1041 pi0 = to_next[0] = from[0];
1045 n_left_to_next -= 1;
1047 p0 = vlib_get_buffer (vm, pi0);
1048 arp0 = vlib_buffer_get_current (p0);
1050 error0 = ETHERNET_ARP_ERROR_replies_sent;
1051 next0 = ARP_INPUT_NEXT_DROP;
1055 clib_net_to_host_u16 (ETHERNET_ARP_HARDWARE_TYPE_ethernet) ?
1056 ETHERNET_ARP_ERROR_l2_type_not_ethernet : error0);
1059 clib_net_to_host_u16 (ETHERNET_TYPE_IP4) ?
1060 ETHERNET_ARP_ERROR_l3_type_not_ip4 : error0);
1062 (0 == arp0->ip4_over_ethernet[0].ip4.as_u32 ?
1063 ETHERNET_ARP_ERROR_l3_dst_address_unset : error0);
1065 if (ETHERNET_ARP_ERROR_replies_sent == error0)
1067 next0 = ARP_INPUT_NEXT_DISABLED;
1068 vnet_feature_arc_start (am->feature_arc_index,
1069 vnet_buffer (p0)->sw_if_index[VLIB_RX],
1073 p0->error = node->errors[error0];
1075 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1076 n_left_to_next, pi0, next0);
1079 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1082 return frame->n_vectors;
1085 typedef enum arp_disabled_next_t_
1087 ARP_DISABLED_NEXT_DROP,
1088 ARP_DISABLED_N_NEXT,
1089 } arp_disabled_next_t;
1091 #define foreach_arp_disabled_error \
1092 _ (DISABLED, "ARP Disabled on this interface") \
1096 #define _(sym,string) ARP_DISABLED_ERROR_##sym,
1097 foreach_arp_disabled_error
1099 ARP_DISABLED_N_ERROR,
1100 } arp_disabled_error_t;
1102 static char *arp_disabled_error_strings[] = {
1103 #define _(sym,string) string,
1104 foreach_arp_disabled_error
1109 arp_disabled (vlib_main_t * vm,
1110 vlib_node_runtime_t * node, vlib_frame_t * frame)
1112 u32 n_left_from, next_index, *from, *to_next, n_left_to_next;
1114 from = vlib_frame_vector_args (frame);
1115 n_left_from = frame->n_vectors;
1116 next_index = node->cached_next_index;
1118 if (node->flags & VLIB_NODE_FLAG_TRACE)
1119 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
1121 sizeof (ethernet_arp_input_trace_t));
1123 while (n_left_from > 0)
1125 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1127 while (n_left_from > 0 && n_left_to_next > 0)
1129 arp_disabled_next_t next0 = ARP_DISABLED_NEXT_DROP;
1133 next0 = ARP_DISABLED_NEXT_DROP;
1134 error0 = ARP_DISABLED_ERROR_DISABLED;
1136 pi0 = to_next[0] = from[0];
1140 n_left_to_next -= 1;
1142 p0 = vlib_get_buffer (vm, pi0);
1143 p0->error = node->errors[error0];
1145 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1146 n_left_to_next, pi0, next0);
1149 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1152 return frame->n_vectors;
1155 static_always_inline u32
1156 arp_mk_reply (vnet_main_t * vnm,
1159 const ip4_address_t * if_addr0,
1160 ethernet_arp_header_t * arp0, ethernet_header_t * eth_rx)
1162 vnet_hw_interface_t *hw_if0;
1163 u8 *rewrite0, rewrite0_len;
1164 ethernet_header_t *eth_tx;
1168 An adjacency to the sender is not always present,
1169 so we use the interface to build us a rewrite string
1170 which will contain all the necessary tags. */
1171 rewrite0 = ethernet_build_rewrite (vnm, sw_if_index0,
1172 VNET_LINK_ARP, eth_rx->src_address);
1173 rewrite0_len = vec_len (rewrite0);
1175 /* Figure out how much to rewind current data from adjacency. */
1176 vlib_buffer_advance (p0, -rewrite0_len);
1177 eth_tx = vlib_buffer_get_current (p0);
1179 vnet_buffer (p0)->sw_if_index[VLIB_TX] = sw_if_index0;
1180 hw_if0 = vnet_get_sup_hw_interface (vnm, sw_if_index0);
1182 /* Send reply back through input interface */
1183 vnet_buffer (p0)->sw_if_index[VLIB_TX] = sw_if_index0;
1184 next0 = ARP_REPLY_NEXT_REPLY_TX;
1186 arp0->opcode = clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply);
1188 arp0->ip4_over_ethernet[1] = arp0->ip4_over_ethernet[0];
1190 mac_address_from_bytes (&arp0->ip4_over_ethernet[0].mac,
1191 hw_if0->hw_address);
1192 clib_mem_unaligned (&arp0->ip4_over_ethernet[0].ip4.data_u32, u32) =
1195 /* Hardware must be ethernet-like. */
1196 ASSERT (vec_len (hw_if0->hw_address) == 6);
1198 /* the rx nd tx ethernet headers wil overlap in the case
1199 * when we received a tagged VLAN=0 packet, but we are sending
1201 clib_memcpy_fast (eth_tx, rewrite0, vec_len (rewrite0));
1202 vec_free (rewrite0);
1207 enum arp_dst_fib_type
1215 * we're looking for FIB sources that indicate the destination
1216 * is attached. There may be interposed DPO prior to the one
1217 * we are looking for
1219 static enum arp_dst_fib_type
1220 arp_dst_fib_check (const fib_node_index_t fei, fib_entry_flag_t * flags)
1222 const fib_entry_t *entry = fib_entry_get (fei);
1223 const fib_entry_src_t *entry_src;
1226 FOR_EACH_SRC_ADDED(entry, entry_src, src,
1228 *flags = fib_entry_get_flags_for_source (fei, src);
1229 if (fib_entry_is_sourced (fei, FIB_SOURCE_ADJ))
1230 return ARP_DST_FIB_ADJ;
1231 else if (FIB_ENTRY_FLAG_CONNECTED & *flags)
1232 return ARP_DST_FIB_CONN;
1236 return ARP_DST_FIB_NONE;
1240 arp_reply (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
1242 ethernet_arp_main_t *am = ðernet_arp_main;
1243 vnet_main_t *vnm = vnet_get_main ();
1244 u32 n_left_from, next_index, *from, *to_next;
1245 u32 n_replies_sent = 0;
1247 from = vlib_frame_vector_args (frame);
1248 n_left_from = frame->n_vectors;
1249 next_index = node->cached_next_index;
1251 if (node->flags & VLIB_NODE_FLAG_TRACE)
1252 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
1254 sizeof (ethernet_arp_input_trace_t));
1256 while (n_left_from > 0)
1260 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1262 while (n_left_from > 0 && n_left_to_next > 0)
1265 ethernet_arp_header_t *arp0;
1266 ethernet_header_t *eth_rx;
1267 const ip4_address_t *if_addr0;
1268 u32 pi0, error0, next0, sw_if_index0, conn_sw_if_index0, fib_index0;
1269 u8 dst_is_local0, is_vrrp_reply0;
1270 fib_node_index_t dst_fei, src_fei;
1271 const fib_prefix_t *pfx0;
1272 fib_entry_flag_t src_flags, dst_flags;
1279 n_left_to_next -= 1;
1281 p0 = vlib_get_buffer (vm, pi0);
1282 arp0 = vlib_buffer_get_current (p0);
1283 /* Fill in ethernet header. */
1284 eth_rx = ethernet_buffer_get_header (p0);
1286 next0 = ARP_REPLY_NEXT_DROP;
1287 error0 = ETHERNET_ARP_ERROR_replies_sent;
1288 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
1290 /* Check that IP address is local and matches incoming interface. */
1291 fib_index0 = ip4_fib_table_get_index_for_sw_if_index (sw_if_index0);
1292 if (~0 == fib_index0)
1294 error0 = ETHERNET_ARP_ERROR_interface_no_table;
1301 * we're looking for FIB entries that indicate the source
1302 * is attached. There may be more specific non-attached
1303 * routes that match the source, but these do not influence
1304 * whether we respond to an ARP request, i.e. they do not
1305 * influence whether we are the correct way for the sender
1306 * to reach us, they only affect how we reach the sender.
1308 fib_entry_t *src_fib_entry;
1309 const fib_prefix_t *pfx;
1310 fib_entry_src_t *src;
1311 fib_source_t source;
1320 src_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
1322 ip4_over_ethernet[0].ip4,
1324 src_fib_entry = fib_entry_get (src_fei);
1327 * It's possible that the source that provides the
1328 * flags we need, or the flags we must not have,
1329 * is not the best source, so check then all.
1332 FOR_EACH_SRC_ADDED(src_fib_entry, src, source,
1334 src_flags = fib_entry_get_flags_for_source (src_fei, source);
1336 /* Reject requests/replies with our local interface
1338 if (FIB_ENTRY_FLAG_LOCAL & src_flags)
1340 error0 = ETHERNET_ARP_ERROR_l3_src_address_is_local;
1342 * When VPP has an interface whose address is also
1343 * applied to a TAP interface on the host, then VPP's
1344 * TAP interface will be unnumbered to the 'real'
1345 * interface and do proxy ARP from the host.
1346 * The curious aspect of this setup is that ARP requests
1347 * from the host will come from the VPP's own address.
1348 * So don't drop immediately here, instead go see if this
1349 * is a proxy ARP case.
1353 /* A Source must also be local to subnet of matching
1354 * interface address. */
1355 if ((FIB_ENTRY_FLAG_ATTACHED & src_flags) ||
1356 (FIB_ENTRY_FLAG_CONNECTED & src_flags))
1363 * The packet was sent from an address that is not
1364 * connected nor attached i.e. it is not from an
1365 * address that is covered by a link's sub-net,
1366 * nor is it a already learned host resp.
1372 * shorter mask lookup for the next iteration.
1374 pfx = fib_entry_get_prefix (src_fei);
1375 mask = pfx->fp_len - 1;
1378 * continue until we hit the default route or we find
1379 * the attached we are looking for. The most likely
1380 * outcome is we find the attached with the first source
1381 * on the first lookup.
1385 !fib_entry_is_sourced (src_fei, FIB_SOURCE_DEFAULT_ROUTE));
1390 * the matching route is a not attached, i.e. it was
1391 * added as a result of routing, rather than interface/ARP
1392 * configuration. If the matching route is not a host route
1395 error0 = ETHERNET_ARP_ERROR_l3_src_address_not_local;
1400 dst_fei = ip4_fib_table_lookup (ip4_fib_get (fib_index0),
1401 &arp0->ip4_over_ethernet[1].ip4,
1403 switch (arp_dst_fib_check (dst_fei, &dst_flags))
1405 case ARP_DST_FIB_ADJ:
1407 * We matched an adj-fib on ths source subnet (a /32 previously
1408 * added as a result of ARP). If this request is a gratuitous
1409 * ARP, then learn from it.
1410 * The check for matching an adj-fib, is to prevent hosts
1411 * from spamming us with gratuitous ARPS that might otherwise
1412 * blow our ARP cache
1414 if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
1415 arp0->ip4_over_ethernet[1].ip4.as_u32)
1416 error0 = arp_learn (vnm, am, sw_if_index0,
1417 &arp0->ip4_over_ethernet[0]);
1419 case ARP_DST_FIB_CONN:
1420 /* destination is connected, continue to process */
1422 case ARP_DST_FIB_NONE:
1423 /* destination is not connected, stop here */
1424 error0 = ETHERNET_ARP_ERROR_l3_dst_address_not_local;
1428 dst_is_local0 = (FIB_ENTRY_FLAG_LOCAL & dst_flags);
1429 pfx0 = fib_entry_get_prefix (dst_fei);
1430 if_addr0 = &pfx0->fp_addr.ip4;
1434 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
1437 (arp0->ip4_over_ethernet[0].mac.bytes, vrrp_prefix,
1438 sizeof (vrrp_prefix))));
1440 /* Trash ARP packets whose ARP-level source addresses do not
1441 match their L2-frame-level source addresses, unless it's
1442 a reply from a VRRP virtual router */
1443 if (!ethernet_mac_address_equal
1444 (eth_rx->src_address,
1445 arp0->ip4_over_ethernet[0].mac.bytes) && !is_vrrp_reply0)
1447 error0 = ETHERNET_ARP_ERROR_l2_address_mismatch;
1451 /* Learn or update sender's mapping only for replies to addresses
1452 * that are local to the subnet */
1454 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
1457 error0 = arp_learn (vnm, am, sw_if_index0,
1458 &arp0->ip4_over_ethernet[0]);
1460 /* a reply for a non-local destination could be a GARP.
1461 * GARPs for hosts we know were handled above, so this one
1463 error0 = ETHERNET_ARP_ERROR_l3_dst_address_not_local;
1467 else if (arp0->opcode ==
1468 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request) &&
1469 (dst_is_local0 == 0))
1474 /* Honor unnumbered interface, if any */
1475 conn_sw_if_index0 = fib_entry_get_resolving_interface (dst_fei);
1476 if (sw_if_index0 != conn_sw_if_index0 ||
1477 sw_if_index0 != fib_entry_get_resolving_interface (src_fei))
1480 * The interface the ARP is sent to or was received on is not the
1481 * interface on which the covering prefix is configured.
1482 * Maybe this is a case for unnumbered.
1484 if (!arp_unnumbered (p0, sw_if_index0, conn_sw_if_index0))
1486 error0 = ETHERNET_ARP_ERROR_unnumbered_mismatch;
1490 if (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
1491 arp0->ip4_over_ethernet[1].ip4.as_u32)
1493 error0 = ETHERNET_ARP_ERROR_gratuitous_arp;
1497 next0 = arp_mk_reply (vnm, p0, sw_if_index0,
1498 if_addr0, arp0, eth_rx);
1500 /* We are going to reply to this request, so, in the absence of
1501 errors, learn the sender */
1503 error0 = arp_learn (vnm, am, sw_if_index0,
1504 &arp0->ip4_over_ethernet[1]);
1506 n_replies_sent += 1;
1510 vnet_feature_next (&next0, p0);
1514 p0->error = node->errors[error0];
1517 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1518 n_left_to_next, pi0, next0);
1521 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1524 vlib_error_count (vm, node->node_index,
1525 ETHERNET_ARP_ERROR_replies_sent, n_replies_sent);
1527 return frame->n_vectors;
1531 arp_proxy (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
1533 ethernet_arp_main_t *am = ðernet_arp_main;
1534 vnet_main_t *vnm = vnet_get_main ();
1535 u32 n_left_from, next_index, *from, *to_next;
1536 u32 n_arp_replies_sent = 0;
1538 from = vlib_frame_vector_args (frame);
1539 n_left_from = frame->n_vectors;
1540 next_index = node->cached_next_index;
1542 if (node->flags & VLIB_NODE_FLAG_TRACE)
1543 vlib_trace_frame_buffers_only (vm, node, from, frame->n_vectors,
1545 sizeof (ethernet_arp_input_trace_t));
1547 while (n_left_from > 0)
1551 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1553 while (n_left_from > 0 && n_left_to_next > 0)
1556 ethernet_arp_header_t *arp0;
1557 ethernet_header_t *eth_rx;
1558 ip4_address_t proxy_src;
1559 u32 pi0, error0, next0, sw_if_index0, fib_index0;
1561 ethernet_proxy_arp_t *pa;
1568 n_left_to_next -= 1;
1570 p0 = vlib_get_buffer (vm, pi0);
1571 arp0 = vlib_buffer_get_current (p0);
1572 /* Fill in ethernet header. */
1573 eth_rx = ethernet_buffer_get_header (p0);
1575 is_request0 = arp0->opcode
1576 == clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request);
1578 error0 = ETHERNET_ARP_ERROR_replies_sent;
1579 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
1580 next0 = ARP_REPLY_NEXT_DROP;
1582 fib_index0 = ip4_fib_table_get_index_for_sw_if_index (sw_if_index0);
1583 if (~0 == fib_index0)
1585 error0 = ETHERNET_ARP_ERROR_interface_no_table;
1588 if (0 == error0 && is_request0)
1590 u32 this_addr = clib_net_to_host_u32
1591 (arp0->ip4_over_ethernet[1].ip4.as_u32);
1593 vec_foreach (pa, am->proxy_arps)
1595 u32 lo_addr = clib_net_to_host_u32 (pa->lo_addr.as_u32);
1596 u32 hi_addr = clib_net_to_host_u32 (pa->hi_addr.as_u32);
1598 /* an ARP request hit in the proxy-arp table? */
1599 if ((this_addr >= lo_addr && this_addr <= hi_addr) &&
1600 (fib_index0 == pa->fib_index))
1603 arp0->ip4_over_ethernet[1].ip4.data_u32;
1606 * change the interface address to the proxied
1608 n_arp_replies_sent++;
1611 arp_mk_reply (vnm, p0, sw_if_index0, &proxy_src, arp0,
1618 p0->error = node->errors[error0];
1621 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1622 n_left_to_next, pi0, next0);
1625 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1628 vlib_error_count (vm, node->node_index,
1629 ETHERNET_ARP_ERROR_replies_sent, n_arp_replies_sent);
1631 return frame->n_vectors;
1634 static char *ethernet_arp_error_strings[] = {
1635 #define _(sym,string) string,
1636 foreach_ethernet_arp_error
1642 VLIB_REGISTER_NODE (arp_input_node, static) =
1644 .function = arp_input,
1645 .name = "arp-input",
1646 .vector_size = sizeof (u32),
1647 .n_errors = ETHERNET_ARP_N_ERROR,
1648 .error_strings = ethernet_arp_error_strings,
1649 .n_next_nodes = ARP_INPUT_N_NEXT,
1651 [ARP_INPUT_NEXT_DROP] = "error-drop",
1652 [ARP_INPUT_NEXT_DISABLED] = "arp-disabled",
1654 .format_buffer = format_ethernet_arp_header,
1655 .format_trace = format_ethernet_arp_input_trace,
1658 VLIB_REGISTER_NODE (arp_disabled_node, static) =
1660 .function = arp_disabled,
1661 .name = "arp-disabled",
1662 .vector_size = sizeof (u32),
1663 .n_errors = ARP_DISABLED_N_ERROR,
1664 .error_strings = arp_disabled_error_strings,
1665 .n_next_nodes = ARP_DISABLED_N_NEXT,
1667 [ARP_INPUT_NEXT_DROP] = "error-drop",
1669 .format_buffer = format_ethernet_arp_header,
1670 .format_trace = format_ethernet_arp_input_trace,
1673 VLIB_REGISTER_NODE (arp_reply_node, static) =
1675 .function = arp_reply,
1676 .name = "arp-reply",
1677 .vector_size = sizeof (u32),
1678 .n_errors = ETHERNET_ARP_N_ERROR,
1679 .error_strings = ethernet_arp_error_strings,
1680 .n_next_nodes = ARP_REPLY_N_NEXT,
1682 [ARP_REPLY_NEXT_DROP] = "error-drop",
1683 [ARP_REPLY_NEXT_REPLY_TX] = "interface-output",
1685 .format_buffer = format_ethernet_arp_header,
1686 .format_trace = format_ethernet_arp_input_trace,
1689 VLIB_REGISTER_NODE (arp_proxy_node, static) =
1691 .function = arp_proxy,
1692 .name = "arp-proxy",
1693 .vector_size = sizeof (u32),
1694 .n_errors = ETHERNET_ARP_N_ERROR,
1695 .error_strings = ethernet_arp_error_strings,
1696 .n_next_nodes = ARP_REPLY_N_NEXT,
1698 [ARP_REPLY_NEXT_DROP] = "error-drop",
1699 [ARP_REPLY_NEXT_REPLY_TX] = "interface-output",
1701 .format_buffer = format_ethernet_arp_header,
1702 .format_trace = format_ethernet_arp_input_trace,
1705 /* Built-in ARP rx feature path definition */
1706 VNET_FEATURE_ARC_INIT (arp_feat, static) =
1709 .start_nodes = VNET_FEATURES ("arp-input"),
1710 .last_in_arc = "arp-disabled",
1711 .arc_index_ptr = ðernet_arp_main.feature_arc_index,
1714 VNET_FEATURE_INIT (arp_reply_feat_node, static) =
1717 .node_name = "arp-reply",
1718 .runs_before = VNET_FEATURES ("arp-disabled"),
1721 VNET_FEATURE_INIT (arp_proxy_feat_node, static) =
1724 .node_name = "arp-proxy",
1725 .runs_after = VNET_FEATURES ("arp-reply"),
1726 .runs_before = VNET_FEATURES ("arp-disabled"),
1729 VNET_FEATURE_INIT (arp_drop_feat_node, static) =
1732 .node_name = "arp-disabled",
1733 .runs_before = 0, /* last feature */
1739 ip4_arp_entry_sort (void *a1, void *a2)
1741 ethernet_arp_ip4_entry_t *e1 = a1;
1742 ethernet_arp_ip4_entry_t *e2 = a2;
1745 vnet_main_t *vnm = vnet_get_main ();
1747 cmp = vnet_sw_interface_compare (vnm, e1->sw_if_index, e2->sw_if_index);
1749 cmp = ip4_address_compare (&e1->ip4_address, &e2->ip4_address);
1753 ethernet_arp_ip4_entry_t *
1754 ip4_neighbors_pool (void)
1756 ethernet_arp_main_t *am = ðernet_arp_main;
1757 return am->ip4_entry_pool;
1760 ethernet_arp_ip4_entry_t *
1761 ip4_neighbor_entries (u32 sw_if_index)
1763 ethernet_arp_main_t *am = ðernet_arp_main;
1764 ethernet_arp_ip4_entry_t *n, *ns = 0;
1767 pool_foreach (n, am->ip4_entry_pool, ({
1768 if (sw_if_index != ~0 && n->sw_if_index != sw_if_index)
1770 vec_add1 (ns, n[0]);
1775 vec_sort_with_function (ns, ip4_arp_entry_sort);
1779 static clib_error_t *
1780 show_ip4_arp (vlib_main_t * vm,
1781 unformat_input_t * input, vlib_cli_command_t * cmd)
1783 vnet_main_t *vnm = vnet_get_main ();
1784 ethernet_arp_main_t *am = ðernet_arp_main;
1785 ethernet_arp_ip4_entry_t *e, *es;
1786 ethernet_proxy_arp_t *pa;
1787 clib_error_t *error = 0;
1790 /* Filter entries by interface if given. */
1792 (void) unformat_user (input, unformat_vnet_sw_interface, vnm, &sw_if_index);
1794 es = ip4_neighbor_entries (sw_if_index);
1797 vlib_cli_output (vm, "%U", format_ethernet_arp_ip4_entry, vnm, 0);
1800 vlib_cli_output (vm, "%U", format_ethernet_arp_ip4_entry, vnm, e);
1805 if (vec_len (am->proxy_arps))
1807 vlib_cli_output (vm, "Proxy arps enabled for:");
1808 vec_foreach (pa, am->proxy_arps)
1810 vlib_cli_output (vm, "Fib_index %d %U - %U ",
1812 format_ip4_address, &pa->lo_addr,
1813 format_ip4_address, &pa->hi_addr);
1821 * Display all the IPv4 ARP entries.
1824 * Example of how to display the IPv4 ARP table:
1825 * @cliexstart{show ip arp}
1826 * Time FIB IP4 Flags Ethernet Interface
1827 * 346.3028 0 6.1.1.3 de:ad:be:ef:ba:be GigabitEthernet2/0/0
1828 * 3077.4271 0 6.1.1.4 S de:ad:be:ef:ff:ff GigabitEthernet2/0/0
1829 * 2998.6409 1 6.2.2.3 de:ad:be:ef:00:01 GigabitEthernet2/0/0
1830 * Proxy arps enabled for:
1831 * Fib_index 0 6.0.0.1 - 6.0.0.11
1835 VLIB_CLI_COMMAND (show_ip4_arp_command, static) = {
1836 .path = "show ip arp",
1837 .function = show_ip4_arp,
1838 .short_help = "show ip arp",
1844 pg_edit_t l2_type, l3_type;
1845 pg_edit_t n_l2_address_bytes, n_l3_address_bytes;
1851 } ip4_over_ethernet[2];
1852 } pg_ethernet_arp_header_t;
1855 pg_ethernet_arp_header_init (pg_ethernet_arp_header_t * p)
1857 /* Initialize fields that are not bit fields in the IP header. */
1858 #define _(f) pg_edit_init (&p->f, ethernet_arp_header_t, f);
1861 _(n_l2_address_bytes);
1862 _(n_l3_address_bytes);
1864 _(ip4_over_ethernet[0].mac);
1865 _(ip4_over_ethernet[0].ip4);
1866 _(ip4_over_ethernet[1].mac);
1867 _(ip4_over_ethernet[1].ip4);
1872 unformat_pg_arp_header (unformat_input_t * input, va_list * args)
1874 pg_stream_t *s = va_arg (*args, pg_stream_t *);
1875 pg_ethernet_arp_header_t *p;
1878 p = pg_create_edit_group (s, sizeof (p[0]), sizeof (ethernet_arp_header_t),
1880 pg_ethernet_arp_header_init (p);
1883 pg_edit_set_fixed (&p->l2_type, ETHERNET_ARP_HARDWARE_TYPE_ethernet);
1884 pg_edit_set_fixed (&p->l3_type, ETHERNET_TYPE_IP4);
1885 pg_edit_set_fixed (&p->n_l2_address_bytes, 6);
1886 pg_edit_set_fixed (&p->n_l3_address_bytes, 4);
1888 if (!unformat (input, "%U: %U/%U -> %U/%U",
1890 unformat_ethernet_arp_opcode_net_byte_order, &p->opcode,
1892 unformat_mac_address_t, &p->ip4_over_ethernet[0].mac,
1894 unformat_ip4_address, &p->ip4_over_ethernet[0].ip4,
1896 unformat_mac_address_t, &p->ip4_over_ethernet[1].mac,
1898 unformat_ip4_address, &p->ip4_over_ethernet[1].ip4))
1900 /* Free up any edits we may have added. */
1901 pg_free_edit_group (s);
1908 ip4_set_arp_limit (u32 arp_limit)
1910 ethernet_arp_main_t *am = ðernet_arp_main;
1912 am->limit_arp_cache_size = arp_limit;
1917 * @brief Control Plane hook to remove an ARP entry
1920 vnet_arp_unset_ip4_over_ethernet (vnet_main_t * vnm,
1923 ethernet_arp_ip4_over_ethernet_address_t *
1926 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
1927 .sw_if_index = sw_if_index,
1928 .flags = ETHERNET_ARP_ARGS_REMOVE,
1933 vl_api_rpc_call_main_thread (set_ip4_over_ethernet_rpc_callback,
1934 (u8 *) & args, sizeof (args));
1939 * @brief publish wildcard arp event
1940 * @param sw_if_index The interface on which the ARP entries are acted
1943 vnet_arp_wc_publish (u32 sw_if_index,
1944 const ethernet_arp_ip4_over_ethernet_address_t * a)
1946 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
1947 .flags = ETHERNET_ARP_ARGS_WC_PUB,
1948 .sw_if_index = sw_if_index,
1953 vl_api_rpc_call_main_thread (set_ip4_over_ethernet_rpc_callback,
1954 (u8 *) & args, sizeof (args));
1959 vnet_arp_wc_publish_internal (vnet_main_t * vnm,
1960 vnet_arp_set_ip4_over_ethernet_rpc_args_t *
1963 vlib_main_t *vm = vlib_get_main ();
1964 ethernet_arp_main_t *am = ðernet_arp_main;
1965 uword ni = am->wc_ip4_arp_publisher_node;
1966 uword et = am->wc_ip4_arp_publisher_et;
1968 if (ni == (uword) ~ 0)
1970 wc_arp_report_t *r =
1971 vlib_process_signal_event_data (vm, ni, et, 1, sizeof *r);
1972 r->ip.as_u32 = args->ip4.as_u32;
1973 r->sw_if_index = args->sw_if_index;
1974 mac_address_copy (&r->mac, &args->mac);
1978 wc_arp_set_publisher_node (uword node_index, uword event_type)
1980 ethernet_arp_main_t *am = ðernet_arp_main;
1981 am->wc_ip4_arp_publisher_node = node_index;
1982 am->wc_ip4_arp_publisher_et = event_type;
1986 arp_entry_free (ethernet_arp_interface_t * eai, ethernet_arp_ip4_entry_t * e);
1989 vnet_arp_flush_ip4_over_ethernet_internal (vnet_main_t * vnm,
1990 vnet_arp_set_ip4_over_ethernet_rpc_args_t
1993 ethernet_arp_main_t *am = ðernet_arp_main;
1994 ethernet_arp_ip4_entry_t *e;
1995 ethernet_arp_interface_t *eai;
1997 if (vec_len (am->ethernet_arp_by_sw_if_index) <= args->sw_if_index)
2000 eai = &am->ethernet_arp_by_sw_if_index[args->sw_if_index];
2002 e = arp_entry_find (eai, &args->ip4);
2006 adj_nbr_walk_nh4 (e->sw_if_index,
2007 &e->ip4_address, arp_mk_incomplete_walk, e);
2010 * The difference between flush and unset, is that an unset
2011 * means delete for static and dynamic entries. A flush
2012 * means delete only for dynamic. Flushing is what the DP
2013 * does in response to interface events. unset is only done
2014 * by the control plane.
2016 if (e->flags & IP_NEIGHBOR_FLAG_STATIC)
2018 e->flags &= ~IP_NEIGHBOR_FLAG_DYNAMIC;
2020 else if (e->flags & IP_NEIGHBOR_FLAG_DYNAMIC)
2022 arp_entry_free (eai, e);
2029 * arp_add_del_interface_address
2031 * callback when an interface address is added or deleted
2034 arp_enable_disable_interface (ip4_main_t * im,
2035 uword opaque, u32 sw_if_index, u32 is_enable)
2037 ethernet_arp_main_t *am = ðernet_arp_main;
2040 arp_enable (am, sw_if_index);
2042 arp_disable (am, sw_if_index);
2046 * arp_add_del_interface_address
2048 * callback when an interface address is added or deleted
2051 arp_add_del_interface_address (ip4_main_t * im,
2054 ip4_address_t * address,
2056 u32 if_address_index, u32 is_del)
2059 * Flush the ARP cache of all entries covered by the address
2060 * that is being removed.
2062 ethernet_arp_main_t *am = ðernet_arp_main;
2063 ethernet_arp_ip4_entry_t *e;
2065 if (vec_len (am->ethernet_arp_by_sw_if_index) <= sw_if_index)
2070 ethernet_arp_interface_t *eai;
2071 u32 i, *to_delete = 0;
2074 eai = &am->ethernet_arp_by_sw_if_index[sw_if_index];
2077 hash_foreach_pair (pair, eai->arp_entries,
2079 e = pool_elt_at_index(am->ip4_entry_pool,
2081 if (ip4_destination_matches_route (im, &e->ip4_address,
2082 address, address_length))
2084 vec_add1 (to_delete, e - am->ip4_entry_pool);
2089 for (i = 0; i < vec_len (to_delete); i++)
2091 e = pool_elt_at_index (am->ip4_entry_pool, to_delete[i]);
2093 vnet_arp_set_ip4_over_ethernet_rpc_args_t delme = {
2094 .ip4.as_u32 = e->ip4_address.as_u32,
2095 .sw_if_index = e->sw_if_index,
2096 .flags = ETHERNET_ARP_ARGS_FLUSH,
2098 mac_address_copy (&delme.mac, &e->mac);
2100 vnet_arp_flush_ip4_over_ethernet_internal (vnet_get_main (),
2104 vec_free (to_delete);
2109 arp_table_bind (ip4_main_t * im,
2111 u32 sw_if_index, u32 new_fib_index, u32 old_fib_index)
2113 ethernet_arp_main_t *am = ðernet_arp_main;
2114 ethernet_arp_interface_t *eai;
2115 ethernet_arp_ip4_entry_t *e;
2119 * the IP table that the interface is bound to has changed.
2120 * reinstall all the adj fibs.
2123 if (vec_len (am->ethernet_arp_by_sw_if_index) <= sw_if_index)
2126 eai = &am->ethernet_arp_by_sw_if_index[sw_if_index];
2129 hash_foreach_pair (pair, eai->arp_entries,
2131 e = pool_elt_at_index(am->ip4_entry_pool,
2134 * remove the adj-fib from the old table and add to the new
2136 arp_adj_fib_remove(e, old_fib_index);
2137 arp_adj_fib_add(e, new_fib_index);
2143 static clib_error_t *
2144 ethernet_arp_init (vlib_main_t * vm)
2146 ethernet_arp_main_t *am = ðernet_arp_main;
2147 ip4_main_t *im = &ip4_main;
2150 ethernet_register_input_type (vm, ETHERNET_TYPE_ARP, arp_input_node.index);
2152 pn = pg_get_node (arp_input_node.index);
2153 pn->unformat_edit = unformat_pg_arp_header;
2155 am->opcode_by_name = hash_create_string (0, sizeof (uword));
2156 #define _(o) hash_set_mem (am->opcode_by_name, #o, ETHERNET_ARP_OPCODE_##o);
2157 foreach_ethernet_arp_opcode;
2160 /* $$$ configurable */
2161 am->limit_arp_cache_size = 50000;
2163 am->pending_resolutions_by_address = hash_create (0, sizeof (uword));
2164 am->mac_changes_by_address = hash_create (0, sizeof (uword));
2165 am->wc_ip4_arp_publisher_node = (uword) ~ 0;
2167 /* don't trace ARP error packets */
2169 vlib_node_runtime_t *rt =
2170 vlib_node_get_runtime (vm, arp_input_node.index);
2173 vnet_pcap_drop_trace_filter_add_del \
2174 (rt->errors[ETHERNET_ARP_ERROR_##a], \
2176 foreach_ethernet_arp_error
2180 ip4_add_del_interface_address_callback_t cb;
2181 cb.function = arp_add_del_interface_address;
2182 cb.function_opaque = 0;
2183 vec_add1 (im->add_del_interface_address_callbacks, cb);
2185 ip4_enable_disable_interface_callback_t cbe;
2186 cbe.function = arp_enable_disable_interface;
2187 cbe.function_opaque = 0;
2188 vec_add1 (im->enable_disable_interface_callbacks, cbe);
2190 ip4_table_bind_callback_t cbt;
2191 cbt.function = arp_table_bind;
2192 cbt.function_opaque = 0;
2193 vec_add1 (im->table_bind_callbacks, cbt);
2198 VLIB_INIT_FUNCTION (ethernet_arp_init) =
2200 .runs_after = VLIB_INITS("ethernet_init"),
2205 arp_entry_free (ethernet_arp_interface_t * eai, ethernet_arp_ip4_entry_t * e)
2207 ethernet_arp_main_t *am = ðernet_arp_main;
2210 (e, ip4_fib_table_get_index_for_sw_if_index (e->sw_if_index));
2211 hash_unset (eai->arp_entries, e->ip4_address.as_u32);
2212 pool_put (am->ip4_entry_pool, e);
2216 vnet_arp_unset_ip4_over_ethernet_internal (vnet_main_t * vnm,
2217 vnet_arp_set_ip4_over_ethernet_rpc_args_t
2220 ethernet_arp_main_t *am = ðernet_arp_main;
2221 ethernet_arp_ip4_entry_t *e;
2222 ethernet_arp_interface_t *eai;
2224 if (vec_len (am->ethernet_arp_by_sw_if_index) <= args->sw_if_index)
2227 eai = &am->ethernet_arp_by_sw_if_index[args->sw_if_index];
2229 e = arp_entry_find (eai, &args->ip4);
2233 adj_nbr_walk_nh4 (e->sw_if_index,
2234 &e->ip4_address, arp_mk_incomplete_walk, e);
2235 arp_entry_free (eai, e);
2243 vnet_arp_populate_ip4_over_ethernet_internal (vnet_main_t * vnm,
2244 vnet_arp_set_ip4_over_ethernet_rpc_args_t
2247 ethernet_arp_main_t *am = ðernet_arp_main;
2248 ethernet_arp_ip4_entry_t *e;
2249 ethernet_arp_interface_t *eai;
2251 arp_enable (am, args->sw_if_index);
2252 eai = &am->ethernet_arp_by_sw_if_index[args->sw_if_index];
2254 e = arp_entry_find (eai, &args->ip4);
2258 adj_nbr_walk_nh4 (e->sw_if_index,
2259 &e->ip4_address, arp_mk_complete_walk, e);
2265 set_ip4_over_ethernet_rpc_callback (vnet_arp_set_ip4_over_ethernet_rpc_args_t
2268 vnet_main_t *vm = vnet_get_main ();
2269 ASSERT (vlib_get_thread_index () == 0);
2271 if (a->flags & ETHERNET_ARP_ARGS_REMOVE)
2272 vnet_arp_unset_ip4_over_ethernet_internal (vm, a);
2273 else if (a->flags & ETHERNET_ARP_ARGS_FLUSH)
2274 vnet_arp_flush_ip4_over_ethernet_internal (vm, a);
2275 else if (a->flags & ETHERNET_ARP_ARGS_POPULATE)
2276 vnet_arp_populate_ip4_over_ethernet_internal (vm, a);
2277 else if (a->flags & ETHERNET_ARP_ARGS_WC_PUB)
2278 vnet_arp_wc_publish_internal (vm, a);
2280 vnet_arp_set_ip4_over_ethernet_internal (vm, a);
2284 * @brief Invoked when the interface's admin state changes
2286 static clib_error_t *
2287 ethernet_arp_sw_interface_up_down (vnet_main_t * vnm,
2288 u32 sw_if_index, u32 flags)
2290 ethernet_arp_main_t *am = ðernet_arp_main;
2291 ethernet_arp_ip4_entry_t *e;
2292 u32 i, *to_update = 0;
2295 pool_foreach (e, am->ip4_entry_pool,
2297 if (e->sw_if_index == sw_if_index)
2298 vec_add1 (to_update,
2299 e - am->ip4_entry_pool);
2303 for (i = 0; i < vec_len (to_update); i++)
2305 e = pool_elt_at_index (am->ip4_entry_pool, to_update[i]);
2307 vnet_arp_set_ip4_over_ethernet_rpc_args_t update_me = {
2308 .ip4.as_u32 = e->ip4_address.as_u32,
2309 .sw_if_index = e->sw_if_index,
2311 mac_address_copy (&update_me.mac, &e->mac);
2313 if (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP)
2315 update_me.flags = ETHERNET_ARP_ARGS_POPULATE;
2316 vnet_arp_populate_ip4_over_ethernet_internal (vnm, &update_me);
2320 update_me.flags = ETHERNET_ARP_ARGS_FLUSH;
2321 vnet_arp_flush_ip4_over_ethernet_internal (vnm, &update_me);
2324 vec_free (to_update);
2329 VNET_SW_INTERFACE_ADMIN_UP_DOWN_FUNCTION (ethernet_arp_sw_interface_up_down);
2332 increment_ip4_and_mac_address (ethernet_arp_ip4_over_ethernet_address_t * a)
2337 for (i = 3; i >= 0; i--)
2339 old = a->ip4.as_u8[i];
2340 a->ip4.as_u8[i] += 1;
2341 if (old < a->ip4.as_u8[i])
2345 for (i = 5; i >= 0; i--)
2347 old = a->mac.bytes[i];
2348 a->mac.bytes[i] += 1;
2349 if (old < a->mac.bytes[i])
2355 vnet_arp_set_ip4_over_ethernet (vnet_main_t * vnm,
2357 const ethernet_arp_ip4_over_ethernet_address_t
2358 * a, ip_neighbor_flags_t flags)
2360 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
2361 .sw_if_index = sw_if_index,
2364 .ip4.as_u32 = a->ip4.as_u32,
2368 vl_api_rpc_call_main_thread (set_ip4_over_ethernet_rpc_callback,
2369 (u8 *) & args, sizeof (args));
2374 proxy_arp_walk (proxy_arp_walk_t cb, void *data)
2376 ethernet_arp_main_t *am = ðernet_arp_main;
2377 ethernet_proxy_arp_t *pa;
2379 vec_foreach (pa, am->proxy_arps)
2381 if (!cb (&pa->lo_addr, &pa->hi_addr, pa->fib_index, data))
2387 vnet_proxy_arp_enable_disable (vnet_main_t * vnm, u32 sw_if_index, u8 enable)
2389 ethernet_arp_main_t *am = ðernet_arp_main;
2390 ethernet_arp_interface_t *eai;
2392 vec_validate (am->ethernet_arp_by_sw_if_index, sw_if_index);
2394 eai = &am->ethernet_arp_by_sw_if_index[sw_if_index];
2398 if (!eai->proxy_enabled)
2400 vnet_feature_enable_disable ("arp", "arp-proxy",
2401 sw_if_index, 1, NULL, 0);
2403 eai->proxy_enabled = 1;
2407 if (eai->proxy_enabled)
2409 vnet_feature_enable_disable ("arp", "arp-proxy",
2410 sw_if_index, 0, NULL, 0);
2412 eai->proxy_enabled = 0;
2419 vnet_proxy_arp_add_del (ip4_address_t * lo_addr,
2420 ip4_address_t * hi_addr, u32 fib_index, int is_del)
2422 ethernet_arp_main_t *am = ðernet_arp_main;
2423 ethernet_proxy_arp_t *pa;
2424 u32 found_at_index = ~0;
2426 vec_foreach (pa, am->proxy_arps)
2428 if (pa->lo_addr.as_u32 == lo_addr->as_u32 &&
2429 pa->hi_addr.as_u32 == hi_addr->as_u32 && pa->fib_index == fib_index)
2431 found_at_index = pa - am->proxy_arps;
2436 if (found_at_index != ~0)
2438 /* Delete, otherwise it's already in the table */
2440 vec_delete (am->proxy_arps, 1, found_at_index);
2443 /* delete, no such entry */
2445 return VNET_API_ERROR_NO_SUCH_ENTRY;
2447 /* add, not in table */
2448 vec_add2 (am->proxy_arps, pa, 1);
2449 pa->lo_addr.as_u32 = lo_addr->as_u32;
2450 pa->hi_addr.as_u32 = hi_addr->as_u32;
2451 pa->fib_index = fib_index;
2456 proxy_arp_intfc_walk (proxy_arp_intf_walk_t cb, void *data)
2458 ethernet_arp_main_t *am = ðernet_arp_main;
2459 ethernet_arp_interface_t *eai;
2461 vec_foreach (eai, am->ethernet_arp_by_sw_if_index)
2463 if (eai->proxy_enabled)
2464 cb (eai - am->ethernet_arp_by_sw_if_index, data);
2469 * Remove any proxy arp entries associated with the
2473 vnet_proxy_arp_fib_reset (u32 fib_id)
2475 ethernet_arp_main_t *am = ðernet_arp_main;
2476 ethernet_proxy_arp_t *pa;
2477 u32 *entries_to_delete = 0;
2481 fib_index = fib_table_find (FIB_PROTOCOL_IP4, fib_id);
2482 if (~0 == fib_index)
2483 return VNET_API_ERROR_NO_SUCH_ENTRY;
2485 vec_foreach (pa, am->proxy_arps)
2487 if (pa->fib_index == fib_index)
2489 vec_add1 (entries_to_delete, pa - am->proxy_arps);
2493 for (i = 0; i < vec_len (entries_to_delete); i++)
2495 vec_delete (am->proxy_arps, 1, entries_to_delete[i]);
2498 vec_free (entries_to_delete);
2503 static clib_error_t *
2504 ip_arp_add_del_command_fn (vlib_main_t * vm,
2505 unformat_input_t * input, vlib_cli_command_t * cmd)
2507 vnet_main_t *vnm = vnet_get_main ();
2509 ethernet_arp_ip4_over_ethernet_address_t lo_addr, hi_addr, addr;
2516 ip_neighbor_flags_t flags;
2518 flags = IP_NEIGHBOR_FLAG_NONE;
2520 while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
2522 /* set ip arp TenGigE1/1/0/1 1.2.3.4 aa:bb:... or aabb.ccdd... */
2523 if (unformat (input, "%U %U %U",
2524 unformat_vnet_sw_interface, vnm, &sw_if_index,
2525 unformat_ip4_address, &addr.ip4,
2526 unformat_mac_address_t, &addr.mac))
2529 else if (unformat (input, "delete") || unformat (input, "del"))
2532 else if (unformat (input, "static"))
2533 flags |= IP_NEIGHBOR_FLAG_STATIC;
2535 else if (unformat (input, "no-fib-entry"))
2536 flags |= IP_NEIGHBOR_FLAG_NO_FIB_ENTRY;
2538 else if (unformat (input, "count %d", &count))
2541 else if (unformat (input, "fib-id %d", &fib_id))
2543 fib_index = fib_table_find (FIB_PROTOCOL_IP4, fib_id);
2545 if (~0 == fib_index)
2546 return clib_error_return (0, "fib ID %d doesn't exist\n", fib_id);
2549 else if (unformat (input, "proxy %U - %U",
2550 unformat_ip4_address, &lo_addr.ip4,
2551 unformat_ip4_address, &hi_addr.ip4))
2559 (void) vnet_proxy_arp_add_del (&lo_addr.ip4, &hi_addr.ip4,
2568 for (i = 0; i < count; i++)
2572 uword event_type, *event_data = 0;
2574 /* Park the debug CLI until the arp entry is installed */
2575 vnet_register_ip4_arp_resolution_event
2576 (vnm, &addr.ip4, vlib_current_process (vm),
2577 1 /* type */ , 0 /* data */ );
2579 vnet_arp_set_ip4_over_ethernet (vnm, sw_if_index, &addr, flags);
2581 vlib_process_wait_for_event (vm);
2582 event_type = vlib_process_get_events (vm, &event_data);
2583 vec_reset_length (event_data);
2584 if (event_type != 1)
2585 clib_warning ("event type %d unexpected", event_type);
2588 vnet_arp_unset_ip4_over_ethernet (vnm, sw_if_index, &addr);
2590 increment_ip4_and_mac_address (&addr);
2595 return clib_error_return (0, "unknown input `%U'",
2596 format_unformat_error, input);
2604 * Add or delete IPv4 ARP cache entries.
2606 * @note 'set ip arp' options (e.g. delete, static, 'fib-id <id>',
2607 * 'count <number>', 'interface ip4_addr mac_addr') can be added in
2608 * any order and combination.
2612 * Add or delete IPv4 ARP cache entries as follows. MAC Address can be in
2613 * either aa:bb:cc:dd:ee:ff format or aabb.ccdd.eeff format.
2614 * @cliexcmd{set ip arp GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2615 * @cliexcmd{set ip arp delete GigabitEthernet2/0/0 6.0.0.3 de:ad:be:ef:ba:be}
2617 * To add or delete an IPv4 ARP cache entry to or from a specific fib
2619 * @cliexcmd{set ip arp fib-id 1 GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2620 * @cliexcmd{set ip arp fib-id 1 delete GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2622 * Add or delete IPv4 static ARP cache entries as follows:
2623 * @cliexcmd{set ip arp static GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2624 * @cliexcmd{set ip arp static delete GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2626 * For testing / debugging purposes, the 'set ip arp' command can add or
2627 * delete multiple entries. Supply the 'count N' parameter:
2628 * @cliexcmd{set ip arp count 10 GigabitEthernet2/0/0 6.0.0.3 dead.beef.babe}
2631 VLIB_CLI_COMMAND (ip_arp_add_del_command, static) = {
2632 .path = "set ip arp",
2634 "set ip arp [del] <intfc> <ip-address> <mac-address> [static] [no-fib-entry] [count <count>] [fib-id <fib-id>] [proxy <lo-addr> - <hi-addr>]",
2635 .function = ip_arp_add_del_command_fn,
2639 static clib_error_t *
2640 set_int_proxy_arp_command_fn (vlib_main_t * vm,
2642 input, vlib_cli_command_t * cmd)
2644 vnet_main_t *vnm = vnet_get_main ();
2650 while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
2652 if (unformat (input, "%U", unformat_vnet_sw_interface,
2655 else if (unformat (input, "enable") || unformat (input, "on"))
2657 else if (unformat (input, "disable") || unformat (input, "off"))
2663 if (~0 == sw_if_index)
2664 return clib_error_return (0, "unknown input '%U'",
2665 format_unformat_error, input);
2667 vnet_proxy_arp_enable_disable (vnm, sw_if_index, enable);
2674 * Enable proxy-arp on an interface. The vpp stack will answer ARP
2675 * requests for the indicated address range. Multiple proxy-arp
2676 * ranges may be provisioned.
2678 * @note Proxy ARP as a technology is infamous for blackholing traffic.
2679 * Also, the underlying implementation has not been performance-tuned.
2680 * Avoid creating an unnecessarily large set of ranges.
2683 * To enable proxy arp on a range of addresses, use:
2684 * @cliexcmd{set ip arp proxy 6.0.0.1 - 6.0.0.11}
2685 * Append 'del' to delete a range of proxy ARP addresses:
2686 * @cliexcmd{set ip arp proxy 6.0.0.1 - 6.0.0.11 del}
2687 * You must then specifically enable proxy arp on individual interfaces:
2688 * @cliexcmd{set interface proxy-arp GigabitEthernet0/8/0 enable}
2689 * To disable proxy arp on an individual interface:
2690 * @cliexcmd{set interface proxy-arp GigabitEthernet0/8/0 disable}
2692 VLIB_CLI_COMMAND (set_int_proxy_enable_command, static) = {
2693 .path = "set interface proxy-arp",
2695 "set interface proxy-arp <intfc> [enable|disable]",
2696 .function = set_int_proxy_arp_command_fn,
2702 * ARP/ND Termination in a L2 Bridge Domain based on IP4/IP6 to MAC
2703 * hash tables mac_by_ip4 and mac_by_ip6 for each BD.
2707 ARP_TERM_NEXT_L2_OUTPUT,
2712 u32 arp_term_next_node_index[32];
2715 arp_term_l2bd (vlib_main_t * vm,
2716 vlib_node_runtime_t * node, vlib_frame_t * frame)
2718 l2input_main_t *l2im = &l2input_main;
2719 u32 n_left_from, next_index, *from, *to_next;
2720 u32 n_replies_sent = 0;
2721 u16 last_bd_index = ~0;
2722 l2_bridge_domain_t *last_bd_config = 0;
2723 l2_input_config_t *cfg0;
2725 from = vlib_frame_vector_args (frame);
2726 n_left_from = frame->n_vectors;
2727 next_index = node->cached_next_index;
2729 while (n_left_from > 0)
2733 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
2735 while (n_left_from > 0 && n_left_to_next > 0)
2738 ethernet_header_t *eth0;
2739 ethernet_arp_header_t *arp0;
2742 u32 pi0, error0, next0, sw_if_index0;
2753 n_left_to_next -= 1;
2755 p0 = vlib_get_buffer (vm, pi0);
2756 // Terminate only local (SHG == 0) ARP
2757 if (vnet_buffer (p0)->l2.shg != 0)
2758 goto next_l2_feature;
2760 eth0 = vlib_buffer_get_current (p0);
2761 l3h0 = (u8 *) eth0 + vnet_buffer (p0)->l2.l2_len;
2762 ethertype0 = clib_net_to_host_u16 (*(u16 *) (l3h0 - 2));
2763 arp0 = (ethernet_arp_header_t *) l3h0;
2765 if (ethertype0 != ETHERNET_TYPE_ARP)
2768 if ((arp0->opcode !=
2769 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request)) &&
2771 clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply)))
2774 /* Must be ARP request/reply packet here */
2775 if (PREDICT_FALSE ((node->flags & VLIB_NODE_FLAG_TRACE) &&
2776 (p0->flags & VLIB_BUFFER_IS_TRACED)))
2778 u8 *t0 = vlib_add_trace (vm, node, p0,
2779 sizeof (ethernet_arp_input_trace_t));
2780 clib_memcpy_fast (t0, l3h0,
2781 sizeof (ethernet_arp_input_trace_t));
2787 clib_net_to_host_u16 (ETHERNET_ARP_HARDWARE_TYPE_ethernet)
2788 ? ETHERNET_ARP_ERROR_l2_type_not_ethernet : error0);
2791 clib_net_to_host_u16 (ETHERNET_TYPE_IP4) ?
2792 ETHERNET_ARP_ERROR_l3_type_not_ip4 : error0);
2794 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
2799 /* Trash ARP packets whose ARP-level source addresses do not
2800 match, or if requester address is mcast */
2802 (!ethernet_mac_address_equal (eth0->src_address,
2803 arp0->ip4_over_ethernet[0].
2805 || ethernet_address_cast (arp0->ip4_over_ethernet[0].mac.bytes))
2807 /* VRRP virtual MAC may be different to SMAC in ARP reply */
2808 if (!ethernet_mac_address_equal
2809 (arp0->ip4_over_ethernet[0].mac.bytes, vrrp_prefix))
2811 error0 = ETHERNET_ARP_ERROR_l2_address_mismatch;
2816 (ip4_address_is_multicast (&arp0->ip4_over_ethernet[0].ip4)))
2818 error0 = ETHERNET_ARP_ERROR_l3_src_address_not_local;
2822 /* Check if anyone want ARP request events for L2 BDs */
2824 ethernet_arp_main_t *am = ðernet_arp_main;
2825 if (am->wc_ip4_arp_publisher_node != (uword) ~ 0)
2826 vnet_arp_wc_publish (sw_if_index0, &arp0->ip4_over_ethernet[0]);
2829 /* lookup BD mac_by_ip4 hash table for MAC entry */
2830 ip0 = arp0->ip4_over_ethernet[1].ip4.as_u32;
2831 bd_index0 = vnet_buffer (p0)->l2.bd_index;
2832 if (PREDICT_FALSE ((bd_index0 != last_bd_index)
2833 || (last_bd_index == (u16) ~ 0)))
2835 last_bd_index = bd_index0;
2836 last_bd_config = vec_elt_at_index (l2im->bd_configs, bd_index0);
2838 macp0 = (u8 *) hash_get (last_bd_config->mac_by_ip4, ip0);
2840 if (PREDICT_FALSE (!macp0))
2841 goto next_l2_feature; /* MAC not found */
2842 if (PREDICT_FALSE (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
2843 arp0->ip4_over_ethernet[1].ip4.as_u32))
2844 goto next_l2_feature; /* GARP */
2846 /* MAC found, send ARP reply -
2847 Convert ARP request packet to ARP reply */
2848 arp0->opcode = clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply);
2849 arp0->ip4_over_ethernet[1] = arp0->ip4_over_ethernet[0];
2850 arp0->ip4_over_ethernet[0].ip4.as_u32 = ip0;
2851 mac_address_from_bytes (&arp0->ip4_over_ethernet[0].mac, macp0);
2852 clib_memcpy_fast (eth0->dst_address, eth0->src_address, 6);
2853 clib_memcpy_fast (eth0->src_address, macp0, 6);
2854 n_replies_sent += 1;
2857 /* For BVI, need to use l2-fwd node to send ARP reply as
2858 l2-output node cannot output packet to BVI properly */
2859 cfg0 = vec_elt_at_index (l2im->configs, sw_if_index0);
2860 if (PREDICT_FALSE (cfg0->bvi))
2862 vnet_buffer (p0)->l2.feature_bitmap |= L2INPUT_FEAT_FWD;
2863 vnet_buffer (p0)->sw_if_index[VLIB_RX] = 0;
2864 goto next_l2_feature;
2867 /* Send ARP/ND reply back out input interface through l2-output */
2868 vnet_buffer (p0)->sw_if_index[VLIB_TX] = sw_if_index0;
2869 next0 = ARP_TERM_NEXT_L2_OUTPUT;
2870 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
2871 to_next, n_left_to_next, pi0,
2876 /* IP6 ND event notification or solicitation handling to generate
2877 local response instead of flooding */
2878 iph0 = (ip6_header_t *) l3h0;
2879 if (PREDICT_FALSE (ethertype0 == ETHERNET_TYPE_IP6 &&
2880 iph0->protocol == IP_PROTOCOL_ICMP6 &&
2881 !ip6_address_is_unspecified
2882 (&iph0->src_address)))
2884 sw_if_index0 = vnet_buffer (p0)->sw_if_index[VLIB_RX];
2885 if (vnet_ip6_nd_term
2886 (vm, node, p0, eth0, iph0, sw_if_index0,
2887 vnet_buffer (p0)->l2.bd_index))
2888 goto output_response;
2893 next0 = vnet_l2_feature_next (p0, arp_term_next_node_index,
2894 L2INPUT_FEAT_ARP_TERM);
2895 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
2896 to_next, n_left_to_next,
2902 if (0 == arp0->ip4_over_ethernet[0].ip4.as_u32 ||
2903 (arp0->ip4_over_ethernet[0].ip4.as_u32 ==
2904 arp0->ip4_over_ethernet[1].ip4.as_u32))
2906 error0 = ETHERNET_ARP_ERROR_gratuitous_arp;
2908 next0 = ARP_TERM_NEXT_DROP;
2909 p0->error = node->errors[error0];
2911 vlib_validate_buffer_enqueue_x1 (vm, node, next_index,
2912 to_next, n_left_to_next, pi0,
2916 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
2919 vlib_error_count (vm, node->node_index,
2920 ETHERNET_ARP_ERROR_replies_sent, n_replies_sent);
2921 return frame->n_vectors;
2925 VLIB_REGISTER_NODE (arp_term_l2bd_node, static) = {
2926 .function = arp_term_l2bd,
2927 .name = "arp-term-l2bd",
2928 .vector_size = sizeof (u32),
2929 .n_errors = ETHERNET_ARP_N_ERROR,
2930 .error_strings = ethernet_arp_error_strings,
2931 .n_next_nodes = ARP_TERM_N_NEXT,
2933 [ARP_TERM_NEXT_L2_OUTPUT] = "l2-output",
2934 [ARP_TERM_NEXT_DROP] = "error-drop",
2936 .format_buffer = format_ethernet_arp_header,
2937 .format_trace = format_arp_term_input_trace,
2942 arp_term_init (vlib_main_t * vm)
2944 // Initialize the feature next-node indexes
2945 feat_bitmap_init_next_nodes (vm,
2946 arp_term_l2bd_node.index,
2948 l2input_get_feat_names (),
2949 arp_term_next_node_index);
2953 VLIB_INIT_FUNCTION (arp_term_init);
2956 change_arp_mac (u32 sw_if_index, ethernet_arp_ip4_entry_t * e)
2958 if (e->sw_if_index == sw_if_index)
2960 adj_nbr_walk_nh4 (e->sw_if_index,
2961 &e->ip4_address, arp_mk_complete_walk, e);
2966 ethernet_arp_change_mac (u32 sw_if_index)
2968 ethernet_arp_main_t *am = ðernet_arp_main;
2969 ethernet_arp_ip4_entry_t *e;
2973 pool_foreach (e, am->ip4_entry_pool,
2975 change_arp_mac (sw_if_index, e);
2979 ai = adj_glean_get (FIB_PROTOCOL_IP4, sw_if_index);
2981 if (ADJ_INDEX_INVALID != ai)
2982 adj_glean_update_rewrite (ai);
2986 send_ip4_garp (vlib_main_t * vm, u32 sw_if_index)
2988 ip4_main_t *i4m = &ip4_main;
2989 ip4_address_t *ip4_addr = ip4_interface_first_address (i4m, sw_if_index, 0);
2991 send_ip4_garp_w_addr (vm, ip4_addr, sw_if_index);
2995 send_ip4_garp_w_addr (vlib_main_t * vm,
2996 const ip4_address_t * ip4_addr, u32 sw_if_index)
2998 ip4_main_t *i4m = &ip4_main;
2999 vnet_main_t *vnm = vnet_get_main ();
3000 u8 *rewrite, rewrite_len;
3001 vnet_hw_interface_t *hi = vnet_get_sup_hw_interface (vnm, sw_if_index);
3005 clib_warning ("Sending GARP for IP4 address %U on sw_if_idex %d",
3006 format_ip4_address, ip4_addr, sw_if_index);
3008 /* Form GARP packet for output - Gratuitous ARP is an ARP request packet
3009 where the interface IP/MAC pair is used for both source and request
3010 MAC/IP pairs in the request */
3012 ethernet_arp_header_t *h = vlib_packet_template_get_packet
3013 (vm, &i4m->ip4_arp_request_packet_template, &bi);
3018 mac_address_from_bytes (&h->ip4_over_ethernet[0].mac, hi->hw_address);
3019 mac_address_from_bytes (&h->ip4_over_ethernet[1].mac, hi->hw_address);
3020 h->ip4_over_ethernet[0].ip4 = ip4_addr[0];
3021 h->ip4_over_ethernet[1].ip4 = ip4_addr[0];
3023 /* Setup MAC header with ARP Etype and broadcast DMAC */
3024 vlib_buffer_t *b = vlib_get_buffer (vm, bi);
3026 ethernet_build_rewrite (vnm, sw_if_index, VNET_LINK_ARP,
3027 VNET_REWRITE_FOR_SW_INTERFACE_ADDRESS_BROADCAST);
3028 rewrite_len = vec_len (rewrite);
3029 vlib_buffer_advance (b, -rewrite_len);
3030 ethernet_header_t *e = vlib_buffer_get_current (b);
3031 clib_memcpy_fast (e->dst_address, rewrite, rewrite_len);
3034 /* Send GARP packet out the specified interface */
3035 vnet_buffer (b)->sw_if_index[VLIB_RX] =
3036 vnet_buffer (b)->sw_if_index[VLIB_TX] = sw_if_index;
3037 vlib_frame_t *f = vlib_get_frame_to_node (vm, hi->output_node_index);
3038 u32 *to_next = vlib_frame_vector_args (f);
3041 vlib_put_frame_to_node (vm, hi->output_node_index, f);
3046 * Remove any arp entries associated with the specified interface
3048 static clib_error_t *
3049 vnet_arp_delete_sw_interface (vnet_main_t * vnm, u32 sw_if_index, u32 is_add)
3051 if (!is_add && sw_if_index != ~0)
3053 ethernet_arp_main_t *am = ðernet_arp_main;
3054 ethernet_arp_ip4_entry_t *e;
3056 pool_foreach (e, am->ip4_entry_pool, ({
3057 if (e->sw_if_index != sw_if_index)
3059 vnet_arp_set_ip4_over_ethernet_rpc_args_t args = {
3060 .sw_if_index = sw_if_index,
3061 .ip4 = e->ip4_address,
3063 vnet_arp_unset_ip4_over_ethernet_internal (vnm, &args);
3071 VNET_SW_INTERFACE_ADD_DEL_FUNCTION (vnet_arp_delete_sw_interface);
3074 * fd.io coding-style-patch-verification: ON
3077 * eval: (c-set-style "gnu")