123172Smckusick /* 2*35794Skarels * Copyright (c) 1982, 1986, 1988 Regents of the University of California. 332787Sbostic * All rights reserved. 423172Smckusick * 532787Sbostic * Redistribution and use in source and binary forms are permitted 634854Sbostic * provided that the above copyright notice and this paragraph are 734854Sbostic * duplicated in all such forms and that any documentation, 834854Sbostic * advertising materials, and other materials related to such 934854Sbostic * distribution and use acknowledge that the software was developed 1034854Sbostic * by the University of California, Berkeley. The name of the 1134854Sbostic * University may not be used to endorse or promote products derived 1234854Sbostic * from this software without specific prior written permission. 1334854Sbostic * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR 1434854Sbostic * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED 1534854Sbostic * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 1632787Sbostic * 17*35794Skarels * @(#)if_ether.c 7.8 (Berkeley) 10/12/88 1823172Smckusick */ 1911570Ssam 2011570Ssam /* 2111570Ssam * Ethernet address resolution protocol. 2232346Skarels * TODO: 2332346Skarels * run at splnet (add ARP protocol intr.) 2432346Skarels * link entries onto hash chains, keep free list 2532346Skarels * add "inuse/lock" bit (or ref. count) along with valid bit 2611570Ssam */ 2711570Ssam 2817057Sbloom #include "param.h" 2917057Sbloom #include "systm.h" 30*35794Skarels #include "malloc.h" 3117057Sbloom #include "mbuf.h" 3217057Sbloom #include "socket.h" 3317057Sbloom #include "time.h" 3417057Sbloom #include "kernel.h" 3517057Sbloom #include "errno.h" 3617057Sbloom #include "ioctl.h" 3725890Skarels #include "syslog.h" 3811570Ssam 3911570Ssam #include "../net/if.h" 4017057Sbloom #include "in.h" 4117057Sbloom #include "in_systm.h" 4217057Sbloom #include "ip.h" 4317057Sbloom #include "if_ether.h" 4411570Ssam 4532346Skarels #ifdef GATEWAY 4632346Skarels #define ARPTAB_BSIZ 16 /* bucket size */ 4732346Skarels #define ARPTAB_NB 37 /* number of buckets */ 4832346Skarels #else 4924803Skarels #define ARPTAB_BSIZ 9 /* bucket size */ 5011570Ssam #define ARPTAB_NB 19 /* number of buckets */ 5132346Skarels #endif 5211570Ssam #define ARPTAB_SIZE (ARPTAB_BSIZ * ARPTAB_NB) 5311570Ssam struct arptab arptab[ARPTAB_SIZE]; 5416221Skarels int arptab_size = ARPTAB_SIZE; /* for arp command */ 5511570Ssam 5625890Skarels /* 5725890Skarels * ARP trailer negotiation. Trailer protocol is not IP specific, 5825890Skarels * but ARP request/response use IP addresses. 5925890Skarels */ 6025890Skarels #define ETHERTYPE_IPTRAILERS ETHERTYPE_TRAIL 6125890Skarels 6211570Ssam #define ARPTAB_HASH(a) \ 6325890Skarels ((u_long)(a) % ARPTAB_NB) 6411570Ssam 6511570Ssam #define ARPTAB_LOOK(at,addr) { \ 6611570Ssam register n; \ 6711570Ssam at = &arptab[ARPTAB_HASH(addr) * ARPTAB_BSIZ]; \ 6811570Ssam for (n = 0 ; n < ARPTAB_BSIZ ; n++,at++) \ 6911570Ssam if (at->at_iaddr.s_addr == addr) \ 7011570Ssam break; \ 7111570Ssam if (n >= ARPTAB_BSIZ) \ 7225890Skarels at = 0; \ 7325890Skarels } 7411570Ssam 7511570Ssam /* timer values */ 7611570Ssam #define ARPT_AGE (60*1) /* aging timer, 1 min. */ 7711570Ssam #define ARPT_KILLC 20 /* kill completed entry in 20 mins. */ 7811570Ssam #define ARPT_KILLI 3 /* kill incomplete entry in 3 minutes */ 7911570Ssam 8011570Ssam extern struct ifnet loif; 8111570Ssam 8214867Ssam /* 8311570Ssam * Timeout routine. Age arp_tab entries once a minute. 8411570Ssam */ 8511570Ssam arptimer() 8611570Ssam { 8711570Ssam register struct arptab *at; 8811570Ssam register i; 8911570Ssam 9025890Skarels timeout(arptimer, (caddr_t)0, ARPT_AGE * hz); 9125890Skarels at = &arptab[0]; 9225890Skarels for (i = 0; i < ARPTAB_SIZE; i++, at++) { 9325890Skarels if (at->at_flags == 0 || (at->at_flags & ATF_PERM)) 9425890Skarels continue; 9525890Skarels if (++at->at_timer < ((at->at_flags&ATF_COM) ? 9625890Skarels ARPT_KILLC : ARPT_KILLI)) 9725890Skarels continue; 9825890Skarels /* timer has expired, clear entry */ 9925890Skarels arptfree(at); 10011570Ssam } 10111570Ssam } 10211570Ssam 10311570Ssam /* 10411570Ssam * Broadcast an ARP packet, asking who has addr on interface ac. 10511570Ssam */ 10611570Ssam arpwhohas(ac, addr) 10711570Ssam register struct arpcom *ac; 10811570Ssam struct in_addr *addr; 10911570Ssam { 11011570Ssam register struct mbuf *m; 11111570Ssam register struct ether_header *eh; 11211570Ssam register struct ether_arp *ea; 11311570Ssam struct sockaddr sa; 11411570Ssam 115*35794Skarels if ((m = m_gethdr(M_DONTWAIT, MT_DATA)) == NULL) 11626380Skarels return; 117*35794Skarels m->m_len = sizeof(*ea); 118*35794Skarels m->m_pkthdr.len = sizeof(*ea); 119*35794Skarels MH_ALIGN(m, sizeof(*ea)); 12011570Ssam ea = mtod(m, struct ether_arp *); 12111570Ssam eh = (struct ether_header *)sa.sa_data; 12212763Ssam bzero((caddr_t)ea, sizeof (*ea)); 12318640Skarels bcopy((caddr_t)etherbroadcastaddr, (caddr_t)eh->ether_dhost, 12418640Skarels sizeof(eh->ether_dhost)); 12518378Skarels eh->ether_type = ETHERTYPE_ARP; /* if_output will swap */ 12611570Ssam ea->arp_hrd = htons(ARPHRD_ETHER); 12718378Skarels ea->arp_pro = htons(ETHERTYPE_IP); 12818640Skarels ea->arp_hln = sizeof(ea->arp_sha); /* hardware address length */ 12918640Skarels ea->arp_pln = sizeof(ea->arp_spa); /* protocol address length */ 13011570Ssam ea->arp_op = htons(ARPOP_REQUEST); 13118640Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)ea->arp_sha, 13218640Skarels sizeof(ea->arp_sha)); 13318640Skarels bcopy((caddr_t)&ac->ac_ipaddr, (caddr_t)ea->arp_spa, 13418640Skarels sizeof(ea->arp_spa)); 13518640Skarels bcopy((caddr_t)addr, (caddr_t)ea->arp_tpa, sizeof(ea->arp_tpa)); 13611570Ssam sa.sa_family = AF_UNSPEC; 13726380Skarels (*ac->ac_if.if_output)(&ac->ac_if, m, &sa); 13811570Ssam } 13911570Ssam 14030300Skarels int useloopback = 1; /* use loopback interface for local traffic */ 14130300Skarels 14211570Ssam /* 14311570Ssam * Resolve an IP address into an ethernet address. If success, 14425890Skarels * desten is filled in. If there is no entry in arptab, 14525890Skarels * set one up and broadcast a request for the IP address. 14625890Skarels * Hold onto this mbuf and resend it once the address 14725890Skarels * is finally resolved. A return value of 1 indicates 14825890Skarels * that desten has been filled in and the packet should be sent 14925890Skarels * normally; a 0 return indicates that the packet has been 15025890Skarels * taken over here, either now or for later transmission. 15111570Ssam * 15211570Ssam * We do some (conservative) locking here at splimp, since 15311570Ssam * arptab is also altered from input interrupt service (ecintr/ilintr 15418378Skarels * calls arpinput when ETHERTYPE_ARP packets come in). 15511570Ssam */ 15625890Skarels arpresolve(ac, m, destip, desten, usetrailers) 15711570Ssam register struct arpcom *ac; 15811570Ssam struct mbuf *m; 15911570Ssam register struct in_addr *destip; 16018640Skarels register u_char *desten; 16125890Skarels int *usetrailers; 16211570Ssam { 16311570Ssam register struct arptab *at; 16411570Ssam struct sockaddr_in sin; 16532346Skarels u_long lna; 16632346Skarels int s; 16711570Ssam 16825890Skarels *usetrailers = 0; 169*35794Skarels if (m->m_flags & M_BCAST) { /* broadcast */ 17018640Skarels bcopy((caddr_t)etherbroadcastaddr, (caddr_t)desten, 17118640Skarels sizeof(etherbroadcastaddr)); 17211570Ssam return (1); 17311570Ssam } 17418378Skarels lna = in_lnaof(*destip); 17526223Skarels /* if for us, use software loopback driver if up */ 17626223Skarels if (destip->s_addr == ac->ac_ipaddr.s_addr) { 17732346Skarels /* 17832346Skarels * This test used to be 17932346Skarels * if (loif.if_flags & IFF_UP) 18032346Skarels * It allowed local traffic to be forced 18132346Skarels * through the hardware by configuring the loopback down. 18232346Skarels * However, it causes problems during network configuration 18332346Skarels * for boards that can't receive packets they send. 18432346Skarels * It is now necessary to clear "useloopback" 18532346Skarels * to force traffic out to the hardware. 18632346Skarels */ 18730300Skarels if (useloopback) { 18826223Skarels sin.sin_family = AF_INET; 18926223Skarels sin.sin_addr = *destip; 19026223Skarels (void) looutput(&loif, m, (struct sockaddr *)&sin); 19126223Skarels /* 19226223Skarels * The packet has already been sent and freed. 19326223Skarels */ 19426223Skarels return (0); 19526223Skarels } else { 19626223Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)desten, 19726223Skarels sizeof(ac->ac_enaddr)); 19826223Skarels return (1); 19926223Skarels } 20011570Ssam } 20111570Ssam s = splimp(); 20211570Ssam ARPTAB_LOOK(at, destip->s_addr); 20311570Ssam if (at == 0) { /* not found */ 20432346Skarels if (ac->ac_if.if_flags & IFF_NOARP) { 20518640Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)desten, 3); 20618640Skarels desten[3] = (lna >> 16) & 0x7f; 20718640Skarels desten[4] = (lna >> 8) & 0xff; 20818640Skarels desten[5] = lna & 0xff; 20916221Skarels splx(s); 21016221Skarels return (1); 21116221Skarels } else { 21216221Skarels at = arptnew(destip); 21332346Skarels if (at == 0) 21432346Skarels panic("arpresolve: no free entry"); 21516221Skarels at->at_hold = m; 21616221Skarels arpwhohas(ac, destip); 21716221Skarels splx(s); 21816221Skarels return (0); 21916221Skarels } 22011570Ssam } 22111570Ssam at->at_timer = 0; /* restart the timer */ 22211570Ssam if (at->at_flags & ATF_COM) { /* entry IS complete */ 22318640Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)desten, 22418640Skarels sizeof(at->at_enaddr)); 22525890Skarels if (at->at_flags & ATF_USETRAILERS) 22625890Skarels *usetrailers = 1; 22711570Ssam splx(s); 22811570Ssam return (1); 22911570Ssam } 23011570Ssam /* 23111570Ssam * There is an arptab entry, but no ethernet address 23211570Ssam * response yet. Replace the held mbuf with this 23311570Ssam * latest one. 23411570Ssam */ 23511570Ssam if (at->at_hold) 23611570Ssam m_freem(at->at_hold); 23711570Ssam at->at_hold = m; 23811570Ssam arpwhohas(ac, destip); /* ask again */ 23911570Ssam splx(s); 24011570Ssam return (0); 24111570Ssam } 24211570Ssam 24311570Ssam /* 24418378Skarels * Called from 10 Mb/s Ethernet interrupt handlers 24518378Skarels * when ether packet type ETHERTYPE_ARP 24625890Skarels * is received. Common length and type checks are done here, 24725890Skarels * then the protocol-specific routine is called. 24825890Skarels */ 24925890Skarels arpinput(ac, m) 25025890Skarels struct arpcom *ac; 25125890Skarels struct mbuf *m; 25225890Skarels { 25325890Skarels register struct arphdr *ar; 25425890Skarels 25525890Skarels if (ac->ac_if.if_flags & IFF_NOARP) 25625890Skarels goto out; 25725890Skarels if (m->m_len < sizeof(struct arphdr)) 25825890Skarels goto out; 25925890Skarels ar = mtod(m, struct arphdr *); 26025890Skarels if (ntohs(ar->ar_hrd) != ARPHRD_ETHER) 26125890Skarels goto out; 26225890Skarels if (m->m_len < sizeof(struct arphdr) + 2 * ar->ar_hln + 2 * ar->ar_pln) 26325890Skarels goto out; 26425890Skarels 26525890Skarels switch (ntohs(ar->ar_pro)) { 26625890Skarels 26725890Skarels case ETHERTYPE_IP: 26825890Skarels case ETHERTYPE_IPTRAILERS: 26925890Skarels in_arpinput(ac, m); 27025890Skarels return; 27125890Skarels 27225890Skarels default: 27325890Skarels break; 27425890Skarels } 27525890Skarels out: 27625890Skarels m_freem(m); 27725890Skarels } 27825890Skarels 27925890Skarels /* 28025890Skarels * ARP for Internet protocols on 10 Mb/s Ethernet. 28125890Skarels * Algorithm is that given in RFC 826. 28211570Ssam * In addition, a sanity check is performed on the sender 28311570Ssam * protocol address, to catch impersonators. 28425890Skarels * We also handle negotiations for use of trailer protocol: 28525890Skarels * ARP replies for protocol type ETHERTYPE_TRAIL are sent 28625890Skarels * along with IP replies if we want trailers sent to us, 28725890Skarels * and also send them in response to IP replies. 28825890Skarels * This allows either end to announce the desire to receive 28925890Skarels * trailer packets. 29025890Skarels * We reply to requests for ETHERTYPE_TRAIL protocol as well, 29125890Skarels * but don't normally send requests. 29211570Ssam */ 29325890Skarels in_arpinput(ac, m) 29411570Ssam register struct arpcom *ac; 29511570Ssam struct mbuf *m; 29611570Ssam { 29711570Ssam register struct ether_arp *ea; 29811570Ssam struct ether_header *eh; 29924803Skarels register struct arptab *at; /* same as "merge" flag */ 30025890Skarels struct mbuf *mcopy = 0; 30111570Ssam struct sockaddr_in sin; 30211570Ssam struct sockaddr sa; 30325890Skarels struct in_addr isaddr, itaddr, myaddr; 30432346Skarels int proto, op, s, completed = 0; 30511570Ssam 30618378Skarels myaddr = ac->ac_ipaddr; 30711570Ssam ea = mtod(m, struct ether_arp *); 30825890Skarels proto = ntohs(ea->arp_pro); 30925890Skarels op = ntohs(ea->arp_op); 31032346Skarels bcopy((caddr_t)ea->arp_spa, (caddr_t)&isaddr, sizeof (isaddr)); 31132346Skarels bcopy((caddr_t)ea->arp_tpa, (caddr_t)&itaddr, sizeof (itaddr)); 31218640Skarels if (!bcmp((caddr_t)ea->arp_sha, (caddr_t)ac->ac_enaddr, 313*35794Skarels sizeof (ea->arp_sha))) 31411570Ssam goto out; /* it's from me, ignore it. */ 31525890Skarels if (!bcmp((caddr_t)ea->arp_sha, (caddr_t)etherbroadcastaddr, 31625890Skarels sizeof (ea->arp_sha))) { 31725890Skarels log(LOG_ERR, 31825890Skarels "arp: ether address is broadcast for IP address %x!\n", 31925890Skarels ntohl(isaddr.s_addr)); 32025890Skarels goto out; 32125890Skarels } 32211570Ssam if (isaddr.s_addr == myaddr.s_addr) { 32325890Skarels log(LOG_ERR, "%s: %s\n", 32425890Skarels "duplicate IP address!! sent from ethernet address", 32525890Skarels ether_sprintf(ea->arp_sha)); 32616221Skarels itaddr = myaddr; 32725890Skarels if (op == ARPOP_REQUEST) 32811570Ssam goto reply; 32911570Ssam goto out; 33011570Ssam } 33130300Skarels s = splimp(); 33211570Ssam ARPTAB_LOOK(at, isaddr.s_addr); 33326147Skarels if (at) { 33418640Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)at->at_enaddr, 33518640Skarels sizeof(ea->arp_sha)); 33632346Skarels if ((at->at_flags & ATF_COM) == 0) 33732346Skarels completed = 1; 33811570Ssam at->at_flags |= ATF_COM; 33911570Ssam if (at->at_hold) { 34011570Ssam sin.sin_family = AF_INET; 34111570Ssam sin.sin_addr = isaddr; 34211570Ssam (*ac->ac_if.if_output)(&ac->ac_if, 34318759Skarels at->at_hold, (struct sockaddr *)&sin); 34418759Skarels at->at_hold = 0; 34511570Ssam } 34618759Skarels } 34718759Skarels if (at == 0 && itaddr.s_addr == myaddr.s_addr) { 34816221Skarels /* ensure we have a table entry */ 34932346Skarels if (at = arptnew(&isaddr)) { 35032346Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)at->at_enaddr, 35132346Skarels sizeof(ea->arp_sha)); 35232346Skarels completed = 1; 35332346Skarels at->at_flags |= ATF_COM; 35432346Skarels } 35511570Ssam } 35630300Skarels splx(s); 35711570Ssam reply: 35825890Skarels switch (proto) { 35925890Skarels 36025890Skarels case ETHERTYPE_IPTRAILERS: 36125890Skarels /* partner says trailers are OK */ 36225890Skarels if (at) 36325890Skarels at->at_flags |= ATF_USETRAILERS; 36425890Skarels /* 36525890Skarels * Reply to request iff we want trailers. 36625890Skarels */ 36725890Skarels if (op != ARPOP_REQUEST || ac->ac_if.if_flags & IFF_NOTRAILERS) 36825890Skarels goto out; 36925890Skarels break; 37025890Skarels 37125890Skarels case ETHERTYPE_IP: 37225890Skarels /* 37332346Skarels * Reply if this is an IP request, 37432346Skarels * or if we want to send a trailer response. 37532346Skarels * Send the latter only to the IP response 37632346Skarels * that completes the current ARP entry. 37725890Skarels */ 37832346Skarels if (op != ARPOP_REQUEST && 37932346Skarels (completed == 0 || ac->ac_if.if_flags & IFF_NOTRAILERS)) 38025890Skarels goto out; 38125890Skarels } 38225890Skarels if (itaddr.s_addr == myaddr.s_addr) { 38325890Skarels /* I am the target */ 38425890Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)ea->arp_tha, 38525890Skarels sizeof(ea->arp_sha)); 38625890Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)ea->arp_sha, 38725890Skarels sizeof(ea->arp_sha)); 38825890Skarels } else { 38925890Skarels ARPTAB_LOOK(at, itaddr.s_addr); 39025890Skarels if (at == NULL || (at->at_flags & ATF_PUBL) == 0) 39125890Skarels goto out; 39225890Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)ea->arp_tha, 39325890Skarels sizeof(ea->arp_sha)); 39425890Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)ea->arp_sha, 39525890Skarels sizeof(ea->arp_sha)); 39625890Skarels } 39725890Skarels 39818640Skarels bcopy((caddr_t)ea->arp_spa, (caddr_t)ea->arp_tpa, 39918640Skarels sizeof(ea->arp_spa)); 40018640Skarels bcopy((caddr_t)&itaddr, (caddr_t)ea->arp_spa, 40118640Skarels sizeof(ea->arp_spa)); 40225890Skarels ea->arp_op = htons(ARPOP_REPLY); 40325890Skarels /* 40425890Skarels * If incoming packet was an IP reply, 40525890Skarels * we are sending a reply for type IPTRAILERS. 40625890Skarels * If we are sending a reply for type IP 40725890Skarels * and we want to receive trailers, 40825890Skarels * send a trailer reply as well. 40925890Skarels */ 41025890Skarels if (op == ARPOP_REPLY) 41125890Skarels ea->arp_pro = htons(ETHERTYPE_IPTRAILERS); 41225890Skarels else if (proto == ETHERTYPE_IP && 41325890Skarels (ac->ac_if.if_flags & IFF_NOTRAILERS) == 0) 41426453Skarels mcopy = m_copy(m, 0, (int)M_COPYALL); 41511570Ssam eh = (struct ether_header *)sa.sa_data; 41618640Skarels bcopy((caddr_t)ea->arp_tha, (caddr_t)eh->ether_dhost, 41718640Skarels sizeof(eh->ether_dhost)); 41818378Skarels eh->ether_type = ETHERTYPE_ARP; 41911570Ssam sa.sa_family = AF_UNSPEC; 42011570Ssam (*ac->ac_if.if_output)(&ac->ac_if, m, &sa); 42125890Skarels if (mcopy) { 42225890Skarels ea = mtod(mcopy, struct ether_arp *); 42325890Skarels ea->arp_pro = htons(ETHERTYPE_IPTRAILERS); 42425890Skarels (*ac->ac_if.if_output)(&ac->ac_if, mcopy, &sa); 42525890Skarels } 42611570Ssam return; 42711570Ssam out: 42811570Ssam m_freem(m); 42911570Ssam return; 43011570Ssam } 43111570Ssam 43211570Ssam /* 43311570Ssam * Free an arptab entry. 43411570Ssam */ 43511570Ssam arptfree(at) 43611570Ssam register struct arptab *at; 43711570Ssam { 43811570Ssam int s = splimp(); 43911570Ssam 44011570Ssam if (at->at_hold) 44111570Ssam m_freem(at->at_hold); 44211570Ssam at->at_hold = 0; 44311570Ssam at->at_timer = at->at_flags = 0; 44411570Ssam at->at_iaddr.s_addr = 0; 44511570Ssam splx(s); 44611570Ssam } 44711570Ssam 44811570Ssam /* 44911570Ssam * Enter a new address in arptab, pushing out the oldest entry 45011570Ssam * from the bucket if there is no room. 45116221Skarels * This always succeeds since no bucket can be completely filled 45216221Skarels * with permanent entries (except from arpioctl when testing whether 45318640Skarels * another permanent entry will fit). 45432346Skarels * MUST BE CALLED AT SPLIMP. 45511570Ssam */ 45611570Ssam struct arptab * 45711570Ssam arptnew(addr) 45811570Ssam struct in_addr *addr; 45911570Ssam { 46011570Ssam register n; 46124803Skarels int oldest = -1; 46216221Skarels register struct arptab *at, *ato = NULL; 46316221Skarels static int first = 1; 46411570Ssam 46516221Skarels if (first) { 46616221Skarels first = 0; 46716221Skarels timeout(arptimer, (caddr_t)0, hz); 46816221Skarels } 46916221Skarels at = &arptab[ARPTAB_HASH(addr->s_addr) * ARPTAB_BSIZ]; 47018640Skarels for (n = 0; n < ARPTAB_BSIZ; n++,at++) { 47111570Ssam if (at->at_flags == 0) 47211570Ssam goto out; /* found an empty entry */ 47316221Skarels if (at->at_flags & ATF_PERM) 47416221Skarels continue; 47532346Skarels if ((int) at->at_timer > oldest) { 47611570Ssam oldest = at->at_timer; 47711570Ssam ato = at; 47811570Ssam } 47911570Ssam } 48016221Skarels if (ato == NULL) 48118640Skarels return (NULL); 48211570Ssam at = ato; 48311570Ssam arptfree(at); 48411570Ssam out: 48511570Ssam at->at_iaddr = *addr; 48611570Ssam at->at_flags = ATF_INUSE; 48711570Ssam return (at); 48811570Ssam } 48916221Skarels 49016221Skarels arpioctl(cmd, data) 49116221Skarels int cmd; 49216221Skarels caddr_t data; 49316221Skarels { 49416221Skarels register struct arpreq *ar = (struct arpreq *)data; 49516221Skarels register struct arptab *at; 49616221Skarels register struct sockaddr_in *sin; 49716221Skarels int s; 49816221Skarels 49916221Skarels if (ar->arp_pa.sa_family != AF_INET || 50016221Skarels ar->arp_ha.sa_family != AF_UNSPEC) 50116221Skarels return (EAFNOSUPPORT); 50216221Skarels sin = (struct sockaddr_in *)&ar->arp_pa; 50316221Skarels s = splimp(); 50416221Skarels ARPTAB_LOOK(at, sin->sin_addr.s_addr); 50516221Skarels if (at == NULL) { /* not found */ 50616221Skarels if (cmd != SIOCSARP) { 50716221Skarels splx(s); 50816221Skarels return (ENXIO); 50916221Skarels } 51018378Skarels if (ifa_ifwithnet(&ar->arp_pa) == NULL) { 51116221Skarels splx(s); 51216221Skarels return (ENETUNREACH); 51316221Skarels } 51416221Skarels } 51516221Skarels switch (cmd) { 51616221Skarels 51716221Skarels case SIOCSARP: /* set entry */ 51816221Skarels if (at == NULL) { 51916221Skarels at = arptnew(&sin->sin_addr); 52032346Skarels if (at == NULL) { 52132346Skarels splx(s); 52232346Skarels return (EADDRNOTAVAIL); 52332346Skarels } 52416221Skarels if (ar->arp_flags & ATF_PERM) { 52516221Skarels /* never make all entries in a bucket permanent */ 52616221Skarels register struct arptab *tat; 52716221Skarels 52816221Skarels /* try to re-allocate */ 52916221Skarels tat = arptnew(&sin->sin_addr); 53016221Skarels if (tat == NULL) { 53116221Skarels arptfree(at); 53216221Skarels splx(s); 53316221Skarels return (EADDRNOTAVAIL); 53416221Skarels } 53516221Skarels arptfree(tat); 53616221Skarels } 53716221Skarels } 53818640Skarels bcopy((caddr_t)ar->arp_ha.sa_data, (caddr_t)at->at_enaddr, 53918640Skarels sizeof(at->at_enaddr)); 54016221Skarels at->at_flags = ATF_COM | ATF_INUSE | 54132566Sbostic (ar->arp_flags & (ATF_PERM|ATF_PUBL|ATF_USETRAILERS)); 54216221Skarels at->at_timer = 0; 54316221Skarels break; 54416221Skarels 54516221Skarels case SIOCDARP: /* delete entry */ 54616221Skarels arptfree(at); 54716221Skarels break; 54816221Skarels 54916221Skarels case SIOCGARP: /* get entry */ 55018640Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)ar->arp_ha.sa_data, 55118640Skarels sizeof(at->at_enaddr)); 55216221Skarels ar->arp_flags = at->at_flags; 55316221Skarels break; 55416221Skarels } 55516221Skarels splx(s); 55616221Skarels return (0); 55716221Skarels } 558