123172Smckusick /* 235794Skarels * Copyright (c) 1982, 1986, 1988 Regents of the University of California. 332787Sbostic * All rights reserved. 423172Smckusick * 532787Sbostic * Redistribution and use in source and binary forms are permitted 634854Sbostic * provided that the above copyright notice and this paragraph are 734854Sbostic * duplicated in all such forms and that any documentation, 834854Sbostic * advertising materials, and other materials related to such 934854Sbostic * distribution and use acknowledge that the software was developed 1034854Sbostic * by the University of California, Berkeley. The name of the 1134854Sbostic * University may not be used to endorse or promote products derived 1234854Sbostic * from this software without specific prior written permission. 1334854Sbostic * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR 1434854Sbostic * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED 1534854Sbostic * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 1632787Sbostic * 17*37471Ssklower * @(#)if_ether.c 7.10 (Berkeley) 04/22/89 1823172Smckusick */ 1911570Ssam 2011570Ssam /* 2111570Ssam * Ethernet address resolution protocol. 2232346Skarels * TODO: 2332346Skarels * run at splnet (add ARP protocol intr.) 2432346Skarels * link entries onto hash chains, keep free list 2532346Skarels * add "inuse/lock" bit (or ref. count) along with valid bit 2611570Ssam */ 2711570Ssam 2817057Sbloom #include "param.h" 2917057Sbloom #include "systm.h" 3035794Skarels #include "malloc.h" 3117057Sbloom #include "mbuf.h" 3217057Sbloom #include "socket.h" 3317057Sbloom #include "time.h" 3417057Sbloom #include "kernel.h" 3517057Sbloom #include "errno.h" 3617057Sbloom #include "ioctl.h" 3725890Skarels #include "syslog.h" 3811570Ssam 3911570Ssam #include "../net/if.h" 4017057Sbloom #include "in.h" 4117057Sbloom #include "in_systm.h" 42*37471Ssklower #include "in_var.h" 4317057Sbloom #include "ip.h" 4417057Sbloom #include "if_ether.h" 4511570Ssam 4632346Skarels #ifdef GATEWAY 4732346Skarels #define ARPTAB_BSIZ 16 /* bucket size */ 4832346Skarels #define ARPTAB_NB 37 /* number of buckets */ 4932346Skarels #else 5024803Skarels #define ARPTAB_BSIZ 9 /* bucket size */ 5111570Ssam #define ARPTAB_NB 19 /* number of buckets */ 5232346Skarels #endif 5311570Ssam #define ARPTAB_SIZE (ARPTAB_BSIZ * ARPTAB_NB) 5411570Ssam struct arptab arptab[ARPTAB_SIZE]; 5516221Skarels int arptab_size = ARPTAB_SIZE; /* for arp command */ 5611570Ssam 5725890Skarels /* 5825890Skarels * ARP trailer negotiation. Trailer protocol is not IP specific, 5925890Skarels * but ARP request/response use IP addresses. 6025890Skarels */ 6125890Skarels #define ETHERTYPE_IPTRAILERS ETHERTYPE_TRAIL 6225890Skarels 6311570Ssam #define ARPTAB_HASH(a) \ 6425890Skarels ((u_long)(a) % ARPTAB_NB) 6511570Ssam 6611570Ssam #define ARPTAB_LOOK(at,addr) { \ 6711570Ssam register n; \ 6811570Ssam at = &arptab[ARPTAB_HASH(addr) * ARPTAB_BSIZ]; \ 6911570Ssam for (n = 0 ; n < ARPTAB_BSIZ ; n++,at++) \ 7011570Ssam if (at->at_iaddr.s_addr == addr) \ 7111570Ssam break; \ 7211570Ssam if (n >= ARPTAB_BSIZ) \ 7325890Skarels at = 0; \ 7425890Skarels } 7511570Ssam 7611570Ssam /* timer values */ 7711570Ssam #define ARPT_AGE (60*1) /* aging timer, 1 min. */ 7811570Ssam #define ARPT_KILLC 20 /* kill completed entry in 20 mins. */ 7911570Ssam #define ARPT_KILLI 3 /* kill incomplete entry in 3 minutes */ 8011570Ssam 8111570Ssam extern struct ifnet loif; 8211570Ssam 8314867Ssam /* 8411570Ssam * Timeout routine. Age arp_tab entries once a minute. 8511570Ssam */ 8611570Ssam arptimer() 8711570Ssam { 8811570Ssam register struct arptab *at; 8911570Ssam register i; 9011570Ssam 9125890Skarels timeout(arptimer, (caddr_t)0, ARPT_AGE * hz); 9225890Skarels at = &arptab[0]; 9325890Skarels for (i = 0; i < ARPTAB_SIZE; i++, at++) { 9425890Skarels if (at->at_flags == 0 || (at->at_flags & ATF_PERM)) 9525890Skarels continue; 9625890Skarels if (++at->at_timer < ((at->at_flags&ATF_COM) ? 9725890Skarels ARPT_KILLC : ARPT_KILLI)) 9825890Skarels continue; 9925890Skarels /* timer has expired, clear entry */ 10025890Skarels arptfree(at); 10111570Ssam } 10211570Ssam } 10311570Ssam 10411570Ssam /* 10511570Ssam * Broadcast an ARP packet, asking who has addr on interface ac. 10611570Ssam */ 10711570Ssam arpwhohas(ac, addr) 10811570Ssam register struct arpcom *ac; 10911570Ssam struct in_addr *addr; 11011570Ssam { 11111570Ssam register struct mbuf *m; 11211570Ssam register struct ether_header *eh; 11311570Ssam register struct ether_arp *ea; 11411570Ssam struct sockaddr sa; 11511570Ssam 11635794Skarels if ((m = m_gethdr(M_DONTWAIT, MT_DATA)) == NULL) 11726380Skarels return; 11835794Skarels m->m_len = sizeof(*ea); 11935794Skarels m->m_pkthdr.len = sizeof(*ea); 12035794Skarels MH_ALIGN(m, sizeof(*ea)); 12111570Ssam ea = mtod(m, struct ether_arp *); 12211570Ssam eh = (struct ether_header *)sa.sa_data; 12312763Ssam bzero((caddr_t)ea, sizeof (*ea)); 12418640Skarels bcopy((caddr_t)etherbroadcastaddr, (caddr_t)eh->ether_dhost, 12518640Skarels sizeof(eh->ether_dhost)); 12618378Skarels eh->ether_type = ETHERTYPE_ARP; /* if_output will swap */ 12711570Ssam ea->arp_hrd = htons(ARPHRD_ETHER); 12818378Skarels ea->arp_pro = htons(ETHERTYPE_IP); 12918640Skarels ea->arp_hln = sizeof(ea->arp_sha); /* hardware address length */ 13018640Skarels ea->arp_pln = sizeof(ea->arp_spa); /* protocol address length */ 13111570Ssam ea->arp_op = htons(ARPOP_REQUEST); 13218640Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)ea->arp_sha, 13318640Skarels sizeof(ea->arp_sha)); 13418640Skarels bcopy((caddr_t)&ac->ac_ipaddr, (caddr_t)ea->arp_spa, 13518640Skarels sizeof(ea->arp_spa)); 13618640Skarels bcopy((caddr_t)addr, (caddr_t)ea->arp_tpa, sizeof(ea->arp_tpa)); 13711570Ssam sa.sa_family = AF_UNSPEC; 13836819Skarels sa.sa_len = sizeof(sa); 13926380Skarels (*ac->ac_if.if_output)(&ac->ac_if, m, &sa); 14011570Ssam } 14111570Ssam 14230300Skarels int useloopback = 1; /* use loopback interface for local traffic */ 14330300Skarels 14411570Ssam /* 14511570Ssam * Resolve an IP address into an ethernet address. If success, 14625890Skarels * desten is filled in. If there is no entry in arptab, 14725890Skarels * set one up and broadcast a request for the IP address. 14825890Skarels * Hold onto this mbuf and resend it once the address 14925890Skarels * is finally resolved. A return value of 1 indicates 15025890Skarels * that desten has been filled in and the packet should be sent 15125890Skarels * normally; a 0 return indicates that the packet has been 15225890Skarels * taken over here, either now or for later transmission. 15311570Ssam * 15411570Ssam * We do some (conservative) locking here at splimp, since 15511570Ssam * arptab is also altered from input interrupt service (ecintr/ilintr 15618378Skarels * calls arpinput when ETHERTYPE_ARP packets come in). 15711570Ssam */ 15825890Skarels arpresolve(ac, m, destip, desten, usetrailers) 15911570Ssam register struct arpcom *ac; 16011570Ssam struct mbuf *m; 16111570Ssam register struct in_addr *destip; 16218640Skarels register u_char *desten; 16325890Skarels int *usetrailers; 16411570Ssam { 16511570Ssam register struct arptab *at; 16611570Ssam struct sockaddr_in sin; 167*37471Ssklower register struct in_ifaddr *ia; 16832346Skarels u_long lna; 16932346Skarels int s; 17011570Ssam 17125890Skarels *usetrailers = 0; 17235794Skarels if (m->m_flags & M_BCAST) { /* broadcast */ 17318640Skarels bcopy((caddr_t)etherbroadcastaddr, (caddr_t)desten, 17418640Skarels sizeof(etherbroadcastaddr)); 17511570Ssam return (1); 17611570Ssam } 17718378Skarels lna = in_lnaof(*destip); 17826223Skarels /* if for us, use software loopback driver if up */ 179*37471Ssklower for (ia = in_ifaddr; ia; ia = ia->ia_next) 180*37471Ssklower if ((ia->ia_ifp == &ac->ac_if) && 181*37471Ssklower (destip->s_addr == ia->ia_addr.sin_addr.s_addr)) { 18232346Skarels /* 18332346Skarels * This test used to be 18432346Skarels * if (loif.if_flags & IFF_UP) 18532346Skarels * It allowed local traffic to be forced 18632346Skarels * through the hardware by configuring the loopback down. 18732346Skarels * However, it causes problems during network configuration 18832346Skarels * for boards that can't receive packets they send. 18932346Skarels * It is now necessary to clear "useloopback" 19032346Skarels * to force traffic out to the hardware. 19132346Skarels */ 19230300Skarels if (useloopback) { 19326223Skarels sin.sin_family = AF_INET; 19426223Skarels sin.sin_addr = *destip; 19526223Skarels (void) looutput(&loif, m, (struct sockaddr *)&sin); 19626223Skarels /* 19726223Skarels * The packet has already been sent and freed. 19826223Skarels */ 19926223Skarels return (0); 20026223Skarels } else { 20126223Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)desten, 20226223Skarels sizeof(ac->ac_enaddr)); 20326223Skarels return (1); 20426223Skarels } 20511570Ssam } 20611570Ssam s = splimp(); 20711570Ssam ARPTAB_LOOK(at, destip->s_addr); 20811570Ssam if (at == 0) { /* not found */ 20932346Skarels if (ac->ac_if.if_flags & IFF_NOARP) { 21018640Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)desten, 3); 21118640Skarels desten[3] = (lna >> 16) & 0x7f; 21218640Skarels desten[4] = (lna >> 8) & 0xff; 21318640Skarels desten[5] = lna & 0xff; 21416221Skarels splx(s); 21516221Skarels return (1); 21616221Skarels } else { 21716221Skarels at = arptnew(destip); 21832346Skarels if (at == 0) 21932346Skarels panic("arpresolve: no free entry"); 22016221Skarels at->at_hold = m; 22116221Skarels arpwhohas(ac, destip); 22216221Skarels splx(s); 22316221Skarels return (0); 22416221Skarels } 22511570Ssam } 22611570Ssam at->at_timer = 0; /* restart the timer */ 22711570Ssam if (at->at_flags & ATF_COM) { /* entry IS complete */ 22818640Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)desten, 22918640Skarels sizeof(at->at_enaddr)); 23025890Skarels if (at->at_flags & ATF_USETRAILERS) 23125890Skarels *usetrailers = 1; 23211570Ssam splx(s); 23311570Ssam return (1); 23411570Ssam } 23511570Ssam /* 23611570Ssam * There is an arptab entry, but no ethernet address 23711570Ssam * response yet. Replace the held mbuf with this 23811570Ssam * latest one. 23911570Ssam */ 24011570Ssam if (at->at_hold) 24111570Ssam m_freem(at->at_hold); 24211570Ssam at->at_hold = m; 24311570Ssam arpwhohas(ac, destip); /* ask again */ 24411570Ssam splx(s); 24511570Ssam return (0); 24611570Ssam } 24711570Ssam 24811570Ssam /* 24918378Skarels * Called from 10 Mb/s Ethernet interrupt handlers 25018378Skarels * when ether packet type ETHERTYPE_ARP 25125890Skarels * is received. Common length and type checks are done here, 25225890Skarels * then the protocol-specific routine is called. 25325890Skarels */ 25425890Skarels arpinput(ac, m) 25525890Skarels struct arpcom *ac; 25625890Skarels struct mbuf *m; 25725890Skarels { 25825890Skarels register struct arphdr *ar; 25925890Skarels 26025890Skarels if (ac->ac_if.if_flags & IFF_NOARP) 26125890Skarels goto out; 26225890Skarels if (m->m_len < sizeof(struct arphdr)) 26325890Skarels goto out; 26425890Skarels ar = mtod(m, struct arphdr *); 26525890Skarels if (ntohs(ar->ar_hrd) != ARPHRD_ETHER) 26625890Skarels goto out; 26725890Skarels if (m->m_len < sizeof(struct arphdr) + 2 * ar->ar_hln + 2 * ar->ar_pln) 26825890Skarels goto out; 26925890Skarels 27025890Skarels switch (ntohs(ar->ar_pro)) { 27125890Skarels 27225890Skarels case ETHERTYPE_IP: 27325890Skarels case ETHERTYPE_IPTRAILERS: 27425890Skarels in_arpinput(ac, m); 27525890Skarels return; 27625890Skarels 27725890Skarels default: 27825890Skarels break; 27925890Skarels } 28025890Skarels out: 28125890Skarels m_freem(m); 28225890Skarels } 28325890Skarels 28425890Skarels /* 28525890Skarels * ARP for Internet protocols on 10 Mb/s Ethernet. 28625890Skarels * Algorithm is that given in RFC 826. 28711570Ssam * In addition, a sanity check is performed on the sender 28811570Ssam * protocol address, to catch impersonators. 28925890Skarels * We also handle negotiations for use of trailer protocol: 29025890Skarels * ARP replies for protocol type ETHERTYPE_TRAIL are sent 29125890Skarels * along with IP replies if we want trailers sent to us, 29225890Skarels * and also send them in response to IP replies. 29325890Skarels * This allows either end to announce the desire to receive 29425890Skarels * trailer packets. 29525890Skarels * We reply to requests for ETHERTYPE_TRAIL protocol as well, 29625890Skarels * but don't normally send requests. 29711570Ssam */ 29825890Skarels in_arpinput(ac, m) 29911570Ssam register struct arpcom *ac; 30011570Ssam struct mbuf *m; 30111570Ssam { 30211570Ssam register struct ether_arp *ea; 30311570Ssam struct ether_header *eh; 30424803Skarels register struct arptab *at; /* same as "merge" flag */ 305*37471Ssklower register struct in_ifaddr *ia; 306*37471Ssklower struct in_ifaddr *maybe_ia = 0; 30725890Skarels struct mbuf *mcopy = 0; 30811570Ssam struct sockaddr_in sin; 30911570Ssam struct sockaddr sa; 31025890Skarels struct in_addr isaddr, itaddr, myaddr; 31132346Skarels int proto, op, s, completed = 0; 31211570Ssam 31311570Ssam ea = mtod(m, struct ether_arp *); 31425890Skarels proto = ntohs(ea->arp_pro); 31525890Skarels op = ntohs(ea->arp_op); 31632346Skarels bcopy((caddr_t)ea->arp_spa, (caddr_t)&isaddr, sizeof (isaddr)); 31732346Skarels bcopy((caddr_t)ea->arp_tpa, (caddr_t)&itaddr, sizeof (itaddr)); 318*37471Ssklower for (ia = in_ifaddr; ia; ia = ia->ia_next) 319*37471Ssklower if (ia->ia_ifp == &ac->ac_if) { 320*37471Ssklower maybe_ia = ia; 321*37471Ssklower if ((itaddr.s_addr == ia->ia_addr.sin_addr.s_addr) || 322*37471Ssklower (isaddr.s_addr == ia->ia_addr.sin_addr.s_addr)) 323*37471Ssklower break; 324*37471Ssklower } 325*37471Ssklower if (maybe_ia == 0) 326*37471Ssklower goto out; 327*37471Ssklower myaddr = ia ? ia->ia_addr.sin_addr : maybe_ia->ia_addr.sin_addr; 32818640Skarels if (!bcmp((caddr_t)ea->arp_sha, (caddr_t)ac->ac_enaddr, 32935794Skarels sizeof (ea->arp_sha))) 33011570Ssam goto out; /* it's from me, ignore it. */ 33125890Skarels if (!bcmp((caddr_t)ea->arp_sha, (caddr_t)etherbroadcastaddr, 33225890Skarels sizeof (ea->arp_sha))) { 33325890Skarels log(LOG_ERR, 33425890Skarels "arp: ether address is broadcast for IP address %x!\n", 33525890Skarels ntohl(isaddr.s_addr)); 33625890Skarels goto out; 33725890Skarels } 33811570Ssam if (isaddr.s_addr == myaddr.s_addr) { 33936819Skarels log(LOG_ERR, 34036819Skarels "duplicate IP address %x!! sent from ethernet address: %s\n", 34136819Skarels ntohl(isaddr.s_addr), ether_sprintf(ea->arp_sha)); 34216221Skarels itaddr = myaddr; 34325890Skarels if (op == ARPOP_REQUEST) 34411570Ssam goto reply; 34511570Ssam goto out; 34611570Ssam } 34730300Skarels s = splimp(); 34811570Ssam ARPTAB_LOOK(at, isaddr.s_addr); 34926147Skarels if (at) { 35018640Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)at->at_enaddr, 35118640Skarels sizeof(ea->arp_sha)); 35232346Skarels if ((at->at_flags & ATF_COM) == 0) 35332346Skarels completed = 1; 35411570Ssam at->at_flags |= ATF_COM; 35511570Ssam if (at->at_hold) { 35611570Ssam sin.sin_family = AF_INET; 35711570Ssam sin.sin_addr = isaddr; 35811570Ssam (*ac->ac_if.if_output)(&ac->ac_if, 35918759Skarels at->at_hold, (struct sockaddr *)&sin); 36018759Skarels at->at_hold = 0; 36111570Ssam } 36218759Skarels } 36318759Skarels if (at == 0 && itaddr.s_addr == myaddr.s_addr) { 36416221Skarels /* ensure we have a table entry */ 36532346Skarels if (at = arptnew(&isaddr)) { 36632346Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)at->at_enaddr, 36732346Skarels sizeof(ea->arp_sha)); 36832346Skarels completed = 1; 36932346Skarels at->at_flags |= ATF_COM; 37032346Skarels } 37111570Ssam } 37230300Skarels splx(s); 37311570Ssam reply: 37425890Skarels switch (proto) { 37525890Skarels 37625890Skarels case ETHERTYPE_IPTRAILERS: 37725890Skarels /* partner says trailers are OK */ 37825890Skarels if (at) 37925890Skarels at->at_flags |= ATF_USETRAILERS; 38025890Skarels /* 38125890Skarels * Reply to request iff we want trailers. 38225890Skarels */ 38325890Skarels if (op != ARPOP_REQUEST || ac->ac_if.if_flags & IFF_NOTRAILERS) 38425890Skarels goto out; 38525890Skarels break; 38625890Skarels 38725890Skarels case ETHERTYPE_IP: 38825890Skarels /* 38932346Skarels * Reply if this is an IP request, 39032346Skarels * or if we want to send a trailer response. 39132346Skarels * Send the latter only to the IP response 39232346Skarels * that completes the current ARP entry. 39325890Skarels */ 39432346Skarels if (op != ARPOP_REQUEST && 39532346Skarels (completed == 0 || ac->ac_if.if_flags & IFF_NOTRAILERS)) 39625890Skarels goto out; 39725890Skarels } 39825890Skarels if (itaddr.s_addr == myaddr.s_addr) { 39925890Skarels /* I am the target */ 40025890Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)ea->arp_tha, 40125890Skarels sizeof(ea->arp_sha)); 40225890Skarels bcopy((caddr_t)ac->ac_enaddr, (caddr_t)ea->arp_sha, 40325890Skarels sizeof(ea->arp_sha)); 40425890Skarels } else { 40525890Skarels ARPTAB_LOOK(at, itaddr.s_addr); 40625890Skarels if (at == NULL || (at->at_flags & ATF_PUBL) == 0) 40725890Skarels goto out; 40825890Skarels bcopy((caddr_t)ea->arp_sha, (caddr_t)ea->arp_tha, 40925890Skarels sizeof(ea->arp_sha)); 41025890Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)ea->arp_sha, 41125890Skarels sizeof(ea->arp_sha)); 41225890Skarels } 41325890Skarels 41418640Skarels bcopy((caddr_t)ea->arp_spa, (caddr_t)ea->arp_tpa, 41518640Skarels sizeof(ea->arp_spa)); 41618640Skarels bcopy((caddr_t)&itaddr, (caddr_t)ea->arp_spa, 41718640Skarels sizeof(ea->arp_spa)); 41825890Skarels ea->arp_op = htons(ARPOP_REPLY); 41925890Skarels /* 42025890Skarels * If incoming packet was an IP reply, 42125890Skarels * we are sending a reply for type IPTRAILERS. 42225890Skarels * If we are sending a reply for type IP 42325890Skarels * and we want to receive trailers, 42425890Skarels * send a trailer reply as well. 42525890Skarels */ 42625890Skarels if (op == ARPOP_REPLY) 42725890Skarels ea->arp_pro = htons(ETHERTYPE_IPTRAILERS); 42825890Skarels else if (proto == ETHERTYPE_IP && 42925890Skarels (ac->ac_if.if_flags & IFF_NOTRAILERS) == 0) 43026453Skarels mcopy = m_copy(m, 0, (int)M_COPYALL); 43111570Ssam eh = (struct ether_header *)sa.sa_data; 43218640Skarels bcopy((caddr_t)ea->arp_tha, (caddr_t)eh->ether_dhost, 43318640Skarels sizeof(eh->ether_dhost)); 43418378Skarels eh->ether_type = ETHERTYPE_ARP; 43511570Ssam sa.sa_family = AF_UNSPEC; 43636819Skarels sa.sa_len = sizeof(sa); 43711570Ssam (*ac->ac_if.if_output)(&ac->ac_if, m, &sa); 43825890Skarels if (mcopy) { 43925890Skarels ea = mtod(mcopy, struct ether_arp *); 44025890Skarels ea->arp_pro = htons(ETHERTYPE_IPTRAILERS); 44125890Skarels (*ac->ac_if.if_output)(&ac->ac_if, mcopy, &sa); 44225890Skarels } 44311570Ssam return; 44411570Ssam out: 44511570Ssam m_freem(m); 44611570Ssam return; 44711570Ssam } 44811570Ssam 44911570Ssam /* 45011570Ssam * Free an arptab entry. 45111570Ssam */ 45211570Ssam arptfree(at) 45311570Ssam register struct arptab *at; 45411570Ssam { 45511570Ssam int s = splimp(); 45611570Ssam 45711570Ssam if (at->at_hold) 45811570Ssam m_freem(at->at_hold); 45911570Ssam at->at_hold = 0; 46011570Ssam at->at_timer = at->at_flags = 0; 46111570Ssam at->at_iaddr.s_addr = 0; 46211570Ssam splx(s); 46311570Ssam } 46411570Ssam 46511570Ssam /* 46611570Ssam * Enter a new address in arptab, pushing out the oldest entry 46711570Ssam * from the bucket if there is no room. 46816221Skarels * This always succeeds since no bucket can be completely filled 46916221Skarels * with permanent entries (except from arpioctl when testing whether 47018640Skarels * another permanent entry will fit). 47132346Skarels * MUST BE CALLED AT SPLIMP. 47211570Ssam */ 47311570Ssam struct arptab * 47411570Ssam arptnew(addr) 47511570Ssam struct in_addr *addr; 47611570Ssam { 47711570Ssam register n; 47824803Skarels int oldest = -1; 47916221Skarels register struct arptab *at, *ato = NULL; 48016221Skarels static int first = 1; 48111570Ssam 48216221Skarels if (first) { 48316221Skarels first = 0; 48416221Skarels timeout(arptimer, (caddr_t)0, hz); 48516221Skarels } 48616221Skarels at = &arptab[ARPTAB_HASH(addr->s_addr) * ARPTAB_BSIZ]; 48718640Skarels for (n = 0; n < ARPTAB_BSIZ; n++,at++) { 48811570Ssam if (at->at_flags == 0) 48911570Ssam goto out; /* found an empty entry */ 49016221Skarels if (at->at_flags & ATF_PERM) 49116221Skarels continue; 49232346Skarels if ((int) at->at_timer > oldest) { 49311570Ssam oldest = at->at_timer; 49411570Ssam ato = at; 49511570Ssam } 49611570Ssam } 49716221Skarels if (ato == NULL) 49818640Skarels return (NULL); 49911570Ssam at = ato; 50011570Ssam arptfree(at); 50111570Ssam out: 50211570Ssam at->at_iaddr = *addr; 50311570Ssam at->at_flags = ATF_INUSE; 50411570Ssam return (at); 50511570Ssam } 50616221Skarels 50716221Skarels arpioctl(cmd, data) 50816221Skarels int cmd; 50916221Skarels caddr_t data; 51016221Skarels { 51116221Skarels register struct arpreq *ar = (struct arpreq *)data; 51216221Skarels register struct arptab *at; 51316221Skarels register struct sockaddr_in *sin; 51416221Skarels int s; 51516221Skarels 51636819Skarels sin = (struct sockaddr_in *)&ar->arp_ha; 51736819Skarels #if defined(COMPAT_43) && BYTE_ORDER != BIG_ENDIAN 51836819Skarels if (sin->sin_family == 0 && sin->sin_len < 16) 51936819Skarels sin->sin_family = sin->sin_len; 52036819Skarels #endif 52136819Skarels sin->sin_len = sizeof(ar->arp_ha); 52236819Skarels sin = (struct sockaddr_in *)&ar->arp_pa; 52336819Skarels #if defined(COMPAT_43) && BYTE_ORDER != BIG_ENDIAN 52436819Skarels if (sin->sin_family == 0 && sin->sin_len < 16) 52536819Skarels sin->sin_family = sin->sin_len; 52636819Skarels #endif 52736819Skarels sin->sin_len = sizeof(ar->arp_pa); 52816221Skarels if (ar->arp_pa.sa_family != AF_INET || 52916221Skarels ar->arp_ha.sa_family != AF_UNSPEC) 53016221Skarels return (EAFNOSUPPORT); 53116221Skarels s = splimp(); 53216221Skarels ARPTAB_LOOK(at, sin->sin_addr.s_addr); 53316221Skarels if (at == NULL) { /* not found */ 53416221Skarels if (cmd != SIOCSARP) { 53516221Skarels splx(s); 53616221Skarels return (ENXIO); 53716221Skarels } 53818378Skarels if (ifa_ifwithnet(&ar->arp_pa) == NULL) { 53916221Skarels splx(s); 54016221Skarels return (ENETUNREACH); 54116221Skarels } 54216221Skarels } 54316221Skarels switch (cmd) { 54416221Skarels 54516221Skarels case SIOCSARP: /* set entry */ 54616221Skarels if (at == NULL) { 54716221Skarels at = arptnew(&sin->sin_addr); 54832346Skarels if (at == NULL) { 54932346Skarels splx(s); 55032346Skarels return (EADDRNOTAVAIL); 55132346Skarels } 55216221Skarels if (ar->arp_flags & ATF_PERM) { 55316221Skarels /* never make all entries in a bucket permanent */ 55416221Skarels register struct arptab *tat; 55516221Skarels 55616221Skarels /* try to re-allocate */ 55716221Skarels tat = arptnew(&sin->sin_addr); 55816221Skarels if (tat == NULL) { 55916221Skarels arptfree(at); 56016221Skarels splx(s); 56116221Skarels return (EADDRNOTAVAIL); 56216221Skarels } 56316221Skarels arptfree(tat); 56416221Skarels } 56516221Skarels } 56618640Skarels bcopy((caddr_t)ar->arp_ha.sa_data, (caddr_t)at->at_enaddr, 56718640Skarels sizeof(at->at_enaddr)); 56816221Skarels at->at_flags = ATF_COM | ATF_INUSE | 56932566Sbostic (ar->arp_flags & (ATF_PERM|ATF_PUBL|ATF_USETRAILERS)); 57016221Skarels at->at_timer = 0; 57116221Skarels break; 57216221Skarels 57316221Skarels case SIOCDARP: /* delete entry */ 57416221Skarels arptfree(at); 57516221Skarels break; 57616221Skarels 57716221Skarels case SIOCGARP: /* get entry */ 57836819Skarels case OSIOCGARP: 57918640Skarels bcopy((caddr_t)at->at_enaddr, (caddr_t)ar->arp_ha.sa_data, 58018640Skarels sizeof(at->at_enaddr)); 58136819Skarels #ifdef COMPAT_43 58236819Skarels if (cmd == OSIOCGARP) 58336819Skarels *(u_short *)&ar->arp_ha = ar->arp_ha.sa_family; 58436819Skarels #endif 58516221Skarels ar->arp_flags = at->at_flags; 58616221Skarels break; 58716221Skarels } 58816221Skarels splx(s); 58916221Skarels return (0); 59016221Skarels } 591