1 /* linux/net/ipv4/arp.c
3 * Copyright (C) 1994 by Florian La Roche
5 * This module implements the Address Resolution Protocol ARP (RFC 826),
6 * which is used to convert IP addresses (or in the future maybe other
7 * high-level addresses) into a low-level hardware address (like an Ethernet
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * as published by the Free Software Foundation; either version
13 * 2 of the License, or (at your option) any later version.
16 * Alan Cox : Removed the Ethernet assumptions in
18 * Alan Cox : Fixed some small errors in the ARP
20 * Alan Cox : Allow >4K in /proc
21 * Alan Cox : Make ARP add its own protocol entry
22 * Ross Martin : Rewrote arp_rcv() and arp_get_info()
23 * Stephen Henson : Add AX25 support to arp_get_info()
24 * Alan Cox : Drop data when a device is downed.
25 * Alan Cox : Use init_timer().
26 * Alan Cox : Double lock fixes.
27 * Martin Seine : Move the arphdr structure
28 * to if_arp.h for compatibility.
29 * with BSD based programs.
30 * Andrew Tridgell : Added ARP netmask code and
31 * re-arranged proxy handling.
32 * Alan Cox : Changed to use notifiers.
33 * Niibe Yutaka : Reply for this device or proxies only.
34 * Alan Cox : Don't proxy across hardware types!
35 * Jonathan Naylor : Added support for NET/ROM.
36 * Mike Shaver : RFC1122 checks.
37 * Jonathan Naylor : Only lookup the hardware address for
38 * the correct hardware type.
39 * Germano Caronni : Assorted subtle races.
40 * Craig Schlenter : Don't modify permanent entry
42 * Russ Nelson : Tidied up a few bits.
43 * Alexey Kuznetsov: Major changes to caching and behaviour,
44 * eg intelligent arp probing and
46 * of host down events.
47 * Alan Cox : Missing unlock in device events.
48 * Eckes : ARP ioctl control errors.
49 * Alexey Kuznetsov: Arp free fix.
50 * Manuel Rodriguez: Gratuitous ARP.
51 * Jonathan Layes : Added arpd support through kerneld
52 * message queue (960314)
53 * Mike Shaver : /proc/sys/net/ipv4/arp_* support
54 * Mike McLagan : Routing by source
55 * Stuart Cheshire : Metricom and grat arp fixes
56 * *** FOR 2.1 clean this up ***
57 * Lawrence V. Stefani: (08/12/96) Added FDDI support.
58 * Alan Cox : Took the AP1000 nasty FDDI hack and
59 * folded into the mainstream FDDI code.
60 * Ack spit, Linus how did you allow that
62 * Jes Sorensen : Make FDDI work again in 2.1.x and
63 * clean up the APFDDI & gen. FDDI bits.
64 * Alexey Kuznetsov: new arp state machine;
65 * now it is in net/core/neighbour.c.
66 * Krzysztof Halasa: Added Frame Relay ARP support.
67 * Arnaldo C. Melo : convert /proc/net/arp to seq_file
68 * Shmulik Hen: Split arp_send to arp_create and
69 * arp_xmit so intermediate drivers like
70 * bonding can change the skb before
71 * sending (e.g. insert 8021q tag).
72 * Harald Welte : convert to make use of jenkins hash
73 * Jesper D. Brouer: Proxy ARP PVLAN RFC 3069 support.
76 #include <linux/module.h>
77 #include <linux/types.h>
78 #include <linux/string.h>
79 #include <linux/kernel.h>
80 #include <linux/capability.h>
81 #include <linux/socket.h>
82 #include <linux/sockios.h>
83 #include <linux/errno.h>
86 #include <linux/inet.h>
87 #include <linux/inetdevice.h>
88 #include <linux/netdevice.h>
89 #include <linux/etherdevice.h>
90 #include <linux/fddidevice.h>
91 #include <linux/if_arp.h>
92 #include <linux/trdevice.h>
93 #include <linux/skbuff.h>
94 #include <linux/proc_fs.h>
95 #include <linux/seq_file.h>
96 #include <linux/stat.h>
97 #include <linux/init.h>
98 #include <linux/net.h>
99 #include <linux/rcupdate.h>
100 #include <linux/jhash.h>
101 #include <linux/slab.h>
103 #include <linux/sysctl.h>
106 #include <net/net_namespace.h>
108 #include <net/icmp.h>
109 #include <net/route.h>
110 #include <net/protocol.h>
112 #include <net/sock.h>
114 #include <net/ax25.h>
115 #include <net/netrom.h>
116 #if defined(CONFIG_ATM_CLIP) || defined(CONFIG_ATM_CLIP_MODULE)
117 #include <net/atmclip.h>
118 struct neigh_table *clip_tbl_hook;
119 EXPORT_SYMBOL(clip_tbl_hook);
122 #include <asm/system.h>
123 #include <asm/uaccess.h>
125 #include <linux/netfilter_arp.h>
128 * Interface to generic neighbour cache.
130 static u32 arp_hash(const void *pkey, const struct net_device *dev);
131 static int arp_constructor(struct neighbour *neigh);
132 static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb);
133 static void arp_error_report(struct neighbour *neigh, struct sk_buff *skb);
134 static void parp_redo(struct sk_buff *skb);
136 static const struct neigh_ops arp_generic_ops = {
138 .solicit = arp_solicit,
139 .error_report = arp_error_report,
140 .output = neigh_resolve_output,
141 .connected_output = neigh_connected_output,
142 .hh_output = dev_queue_xmit,
143 .queue_xmit = dev_queue_xmit,
146 static const struct neigh_ops arp_hh_ops = {
148 .solicit = arp_solicit,
149 .error_report = arp_error_report,
150 .output = neigh_resolve_output,
151 .connected_output = neigh_resolve_output,
152 .hh_output = dev_queue_xmit,
153 .queue_xmit = dev_queue_xmit,
156 static const struct neigh_ops arp_direct_ops = {
158 .output = dev_queue_xmit,
159 .connected_output = dev_queue_xmit,
160 .hh_output = dev_queue_xmit,
161 .queue_xmit = dev_queue_xmit,
164 const struct neigh_ops arp_broken_ops = {
166 .solicit = arp_solicit,
167 .error_report = arp_error_report,
168 .output = neigh_compat_output,
169 .connected_output = neigh_compat_output,
170 .hh_output = dev_queue_xmit,
171 .queue_xmit = dev_queue_xmit,
173 EXPORT_SYMBOL(arp_broken_ops);
175 struct neigh_table arp_tbl = {
177 .entry_size = sizeof(struct neighbour) + 4,
180 .constructor = arp_constructor,
181 .proxy_redo = parp_redo,
185 .base_reachable_time = 30 * HZ,
186 .retrans_time = 1 * HZ,
187 .gc_staletime = 60 * HZ,
188 .reachable_time = 30 * HZ,
189 .delay_probe_time = 5 * HZ,
193 .anycast_delay = 1 * HZ,
194 .proxy_delay = (8 * HZ) / 10,
198 .gc_interval = 30 * HZ,
203 EXPORT_SYMBOL(arp_tbl);
205 int arp_mc_map(__be32 addr, u8 *haddr, struct net_device *dev, int dir)
211 ip_eth_mc_map(addr, haddr);
213 case ARPHRD_IEEE802_TR:
214 ip_tr_mc_map(addr, haddr);
216 case ARPHRD_INFINIBAND:
217 ip_ib_mc_map(addr, dev->broadcast, haddr);
221 memcpy(haddr, dev->broadcast, dev->addr_len);
229 static u32 arp_hash(const void *pkey, const struct net_device *dev)
231 return jhash_2words(*(u32 *)pkey, dev->ifindex, arp_tbl.hash_rnd);
234 static int arp_constructor(struct neighbour *neigh)
236 __be32 addr = *(__be32*)neigh->primary_key;
237 struct net_device *dev = neigh->dev;
238 struct in_device *in_dev;
239 struct neigh_parms *parms;
242 in_dev = __in_dev_get_rcu(dev);
243 if (in_dev == NULL) {
248 neigh->type = inet_addr_type(dev_net(dev), addr);
250 parms = in_dev->arp_parms;
251 __neigh_parms_put(neigh->parms);
252 neigh->parms = neigh_parms_clone(parms);
255 if (!dev->header_ops) {
256 neigh->nud_state = NUD_NOARP;
257 neigh->ops = &arp_direct_ops;
258 neigh->output = neigh->ops->queue_xmit;
260 /* Good devices (checked by reading texts, but only Ethernet is
263 ARPHRD_ETHER: (ethernet, apfddi)
266 ARPHRD_METRICOM: (strip)
270 ARPHRD_IPDDP will also work, if author repairs it.
271 I did not it, because this driver does not work even
276 /* So... these "amateur" devices are hopeless.
277 The only thing, that I can say now:
278 It is very sad that we need to keep ugly obsolete
279 code to make them happy.
281 They should be moved to more reasonable state, now
282 they use rebuild_header INSTEAD OF hard_start_xmit!!!
283 Besides that, they are sort of out of date
284 (a lot of redundant clones/copies, useless in 2.1),
285 I wonder why people believe that they work.
291 #if defined(CONFIG_AX25) || defined(CONFIG_AX25_MODULE)
293 #if defined(CONFIG_NETROM) || defined(CONFIG_NETROM_MODULE)
296 neigh->ops = &arp_broken_ops;
297 neigh->output = neigh->ops->output;
302 if (neigh->type == RTN_MULTICAST) {
303 neigh->nud_state = NUD_NOARP;
304 arp_mc_map(addr, neigh->ha, dev, 1);
305 } else if (dev->flags&(IFF_NOARP|IFF_LOOPBACK)) {
306 neigh->nud_state = NUD_NOARP;
307 memcpy(neigh->ha, dev->dev_addr, dev->addr_len);
308 } else if (neigh->type == RTN_BROADCAST || dev->flags&IFF_POINTOPOINT) {
309 neigh->nud_state = NUD_NOARP;
310 memcpy(neigh->ha, dev->broadcast, dev->addr_len);
313 if (dev->header_ops->cache)
314 neigh->ops = &arp_hh_ops;
316 neigh->ops = &arp_generic_ops;
318 if (neigh->nud_state&NUD_VALID)
319 neigh->output = neigh->ops->connected_output;
321 neigh->output = neigh->ops->output;
326 static void arp_error_report(struct neighbour *neigh, struct sk_buff *skb)
328 dst_link_failure(skb);
332 static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb)
336 struct net_device *dev = neigh->dev;
337 __be32 target = *(__be32*)neigh->primary_key;
338 int probes = atomic_read(&neigh->probes);
339 struct in_device *in_dev;
342 in_dev = __in_dev_get_rcu(dev);
347 switch (IN_DEV_ARP_ANNOUNCE(in_dev)) {
349 case 0: /* By default announce any local IP */
350 if (skb && inet_addr_type(dev_net(dev), ip_hdr(skb)->saddr) == RTN_LOCAL)
351 saddr = ip_hdr(skb)->saddr;
353 case 1: /* Restrict announcements of saddr in same subnet */
356 saddr = ip_hdr(skb)->saddr;
357 if (inet_addr_type(dev_net(dev), saddr) == RTN_LOCAL) {
358 /* saddr should be known to target */
359 if (inet_addr_onlink(in_dev, target, saddr))
364 case 2: /* Avoid secondary IPs, get a primary/preferred one */
370 saddr = inet_select_addr(dev, target, RT_SCOPE_LINK);
372 if ((probes -= neigh->parms->ucast_probes) < 0) {
373 if (!(neigh->nud_state&NUD_VALID))
374 printk(KERN_DEBUG "trying to ucast probe in NUD_INVALID\n");
376 read_lock_bh(&neigh->lock);
377 } else if ((probes -= neigh->parms->app_probes) < 0) {
384 arp_send(ARPOP_REQUEST, ETH_P_ARP, target, dev, saddr,
385 dst_ha, dev->dev_addr, NULL);
387 read_unlock_bh(&neigh->lock);
390 static int arp_ignore(struct in_device *in_dev, __be32 sip, __be32 tip)
394 switch (IN_DEV_ARP_IGNORE(in_dev)) {
395 case 0: /* Reply, the tip is already validated */
397 case 1: /* Reply only if tip is configured on the incoming interface */
399 scope = RT_SCOPE_HOST;
402 * Reply only if tip is configured on the incoming interface
403 * and is in same subnet as sip
405 scope = RT_SCOPE_HOST;
407 case 3: /* Do not reply for scope host addresses */
409 scope = RT_SCOPE_LINK;
411 case 4: /* Reserved */
416 case 8: /* Do not reply */
421 return !inet_confirm_addr(in_dev, sip, tip, scope);
424 static int arp_filter(__be32 sip, __be32 tip, struct net_device *dev)
426 struct flowi fl = { .nl_u = { .ip4_u = { .daddr = sip,
430 /*unsigned long now; */
431 struct net *net = dev_net(dev);
433 if (ip_route_output_key(net, &rt, &fl) < 0)
435 if (rt->dst.dev != dev) {
436 NET_INC_STATS_BH(net, LINUX_MIB_ARPFILTER);
443 /* OBSOLETE FUNCTIONS */
446 * Find an arp mapping in the cache. If not found, post a request.
448 * It is very UGLY routine: it DOES NOT use skb->dst->neighbour,
449 * even if it exists. It is supposed that skb->dev was mangled
450 * by a virtual device (eql, shaper). Nobody but broken devices
451 * is allowed to use this function, it is scheduled to be removed. --ANK
454 static int arp_set_predefined(int addr_hint, unsigned char * haddr, __be32 paddr, struct net_device * dev)
458 printk(KERN_DEBUG "ARP: arp called for own IP address\n");
459 memcpy(haddr, dev->dev_addr, dev->addr_len);
462 arp_mc_map(paddr, haddr, dev, 1);
465 memcpy(haddr, dev->broadcast, dev->addr_len);
472 int arp_find(unsigned char *haddr, struct sk_buff *skb)
474 struct net_device *dev = skb->dev;
479 printk(KERN_DEBUG "arp_find is called with dst==NULL\n");
484 paddr = skb_rtable(skb)->rt_gateway;
486 if (arp_set_predefined(inet_addr_type(dev_net(dev), paddr), haddr, paddr, dev))
489 n = __neigh_lookup(&arp_tbl, &paddr, dev, 1);
493 if (n->nud_state&NUD_VALID || neigh_event_send(n, skb) == 0) {
494 read_lock_bh(&n->lock);
495 memcpy(haddr, n->ha, dev->addr_len);
496 read_unlock_bh(&n->lock);
505 EXPORT_SYMBOL(arp_find);
507 /* END OF OBSOLETE FUNCTIONS */
509 int arp_bind_neighbour(struct dst_entry *dst)
511 struct net_device *dev = dst->dev;
512 struct neighbour *n = dst->neighbour;
517 __be32 nexthop = ((struct rtable *)dst)->rt_gateway;
518 if (dev->flags&(IFF_LOOPBACK|IFF_POINTOPOINT))
520 n = __neigh_lookup_errno(
521 #if defined(CONFIG_ATM_CLIP) || defined(CONFIG_ATM_CLIP_MODULE)
522 dev->type == ARPHRD_ATM ? clip_tbl_hook :
524 &arp_tbl, &nexthop, dev);
533 * Check if we can use proxy ARP for this path
535 static inline int arp_fwd_proxy(struct in_device *in_dev,
536 struct net_device *dev, struct rtable *rt)
538 struct in_device *out_dev;
541 if (rt->dst.dev == dev)
544 if (!IN_DEV_PROXY_ARP(in_dev))
547 if ((imi = IN_DEV_MEDIUM_ID(in_dev)) == 0)
552 /* place to check for proxy_arp for routes */
554 out_dev = __in_dev_get_rcu(rt->dst.dev);
556 omi = IN_DEV_MEDIUM_ID(out_dev);
558 return (omi != imi && omi != -1);
562 * Check for RFC3069 proxy arp private VLAN (allow to send back to same dev)
564 * RFC3069 supports proxy arp replies back to the same interface. This
565 * is done to support (ethernet) switch features, like RFC 3069, where
566 * the individual ports are not allowed to communicate with each
567 * other, BUT they are allowed to talk to the upstream router. As
568 * described in RFC 3069, it is possible to allow these hosts to
569 * communicate through the upstream router, by proxy_arp'ing.
571 * RFC 3069: "VLAN Aggregation for Efficient IP Address Allocation"
573 * This technology is known by different names:
574 * In RFC 3069 it is called VLAN Aggregation.
575 * Cisco and Allied Telesyn call it Private VLAN.
576 * Hewlett-Packard call it Source-Port filtering or port-isolation.
577 * Ericsson call it MAC-Forced Forwarding (RFC Draft).
580 static inline int arp_fwd_pvlan(struct in_device *in_dev,
581 struct net_device *dev, struct rtable *rt,
582 __be32 sip, __be32 tip)
584 /* Private VLAN is only concerned about the same ethernet segment */
585 if (rt->dst.dev != dev)
588 /* Don't reply on self probes (often done by windowz boxes)*/
592 if (IN_DEV_PROXY_ARP_PVLAN(in_dev))
599 * Interface to link layer: send routine and receive handler.
603 * Create an arp packet. If (dest_hw == NULL), we create a broadcast
606 struct sk_buff *arp_create(int type, int ptype, __be32 dest_ip,
607 struct net_device *dev, __be32 src_ip,
608 const unsigned char *dest_hw,
609 const unsigned char *src_hw,
610 const unsigned char *target_hw)
614 unsigned char *arp_ptr;
620 skb = alloc_skb(arp_hdr_len(dev) + LL_ALLOCATED_SPACE(dev), GFP_ATOMIC);
624 skb_reserve(skb, LL_RESERVED_SPACE(dev));
625 skb_reset_network_header(skb);
626 arp = (struct arphdr *) skb_put(skb, arp_hdr_len(dev));
628 skb->protocol = htons(ETH_P_ARP);
630 src_hw = dev->dev_addr;
632 dest_hw = dev->broadcast;
635 * Fill the device header for the ARP frame
637 if (dev_hard_header(skb, dev, ptype, dest_hw, src_hw, skb->len) < 0)
641 * Fill out the arp protocol part.
643 * The arp hardware type should match the device type, except for FDDI,
644 * which (according to RFC 1390) should always equal 1 (Ethernet).
647 * Exceptions everywhere. AX.25 uses the AX.25 PID value not the
648 * DIX code for the protocol. Make these device structure fields.
652 arp->ar_hrd = htons(dev->type);
653 arp->ar_pro = htons(ETH_P_IP);
656 #if defined(CONFIG_AX25) || defined(CONFIG_AX25_MODULE)
658 arp->ar_hrd = htons(ARPHRD_AX25);
659 arp->ar_pro = htons(AX25_P_IP);
662 #if defined(CONFIG_NETROM) || defined(CONFIG_NETROM_MODULE)
664 arp->ar_hrd = htons(ARPHRD_NETROM);
665 arp->ar_pro = htons(AX25_P_IP);
670 #if defined(CONFIG_FDDI) || defined(CONFIG_FDDI_MODULE)
672 arp->ar_hrd = htons(ARPHRD_ETHER);
673 arp->ar_pro = htons(ETH_P_IP);
676 #if defined(CONFIG_TR) || defined(CONFIG_TR_MODULE)
677 case ARPHRD_IEEE802_TR:
678 arp->ar_hrd = htons(ARPHRD_IEEE802);
679 arp->ar_pro = htons(ETH_P_IP);
684 arp->ar_hln = dev->addr_len;
686 arp->ar_op = htons(type);
688 arp_ptr=(unsigned char *)(arp+1);
690 memcpy(arp_ptr, src_hw, dev->addr_len);
691 arp_ptr += dev->addr_len;
692 memcpy(arp_ptr, &src_ip, 4);
694 if (target_hw != NULL)
695 memcpy(arp_ptr, target_hw, dev->addr_len);
697 memset(arp_ptr, 0, dev->addr_len);
698 arp_ptr += dev->addr_len;
699 memcpy(arp_ptr, &dest_ip, 4);
707 EXPORT_SYMBOL(arp_create);
710 * Send an arp packet.
712 void arp_xmit(struct sk_buff *skb)
714 /* Send it off, maybe filter it using firewalling first. */
715 NF_HOOK(NFPROTO_ARP, NF_ARP_OUT, skb, NULL, skb->dev, dev_queue_xmit);
717 EXPORT_SYMBOL(arp_xmit);
720 * Create and send an arp packet.
722 void arp_send(int type, int ptype, __be32 dest_ip,
723 struct net_device *dev, __be32 src_ip,
724 const unsigned char *dest_hw, const unsigned char *src_hw,
725 const unsigned char *target_hw)
730 * No arp on this interface.
733 if (dev->flags&IFF_NOARP)
736 skb = arp_create(type, ptype, dest_ip, dev, src_ip,
737 dest_hw, src_hw, target_hw);
744 EXPORT_SYMBOL(arp_send);
747 * Process an arp request.
750 static int arp_process(struct sk_buff *skb)
752 struct net_device *dev = skb->dev;
753 struct in_device *in_dev = __in_dev_get_rcu(dev);
755 unsigned char *arp_ptr;
759 u16 dev_type = dev->type;
762 struct net *net = dev_net(dev);
764 /* arp_rcv below verifies the ARP header and verifies the device
775 if (arp->ar_pro != htons(ETH_P_IP) ||
776 htons(dev_type) != arp->ar_hrd)
780 case ARPHRD_IEEE802_TR:
784 * ETHERNET, Token Ring and Fibre Channel (which are IEEE 802
785 * devices, according to RFC 2625) devices will accept ARP
786 * hardware types of either 1 (Ethernet) or 6 (IEEE 802.2).
787 * This is the case also of FDDI, where the RFC 1390 says that
788 * FDDI devices should accept ARP hardware of (1) Ethernet,
789 * however, to be more robust, we'll accept both 1 (Ethernet)
792 if ((arp->ar_hrd != htons(ARPHRD_ETHER) &&
793 arp->ar_hrd != htons(ARPHRD_IEEE802)) ||
794 arp->ar_pro != htons(ETH_P_IP))
798 if (arp->ar_pro != htons(AX25_P_IP) ||
799 arp->ar_hrd != htons(ARPHRD_AX25))
803 if (arp->ar_pro != htons(AX25_P_IP) ||
804 arp->ar_hrd != htons(ARPHRD_NETROM))
809 /* Understand only these message types */
811 if (arp->ar_op != htons(ARPOP_REPLY) &&
812 arp->ar_op != htons(ARPOP_REQUEST))
818 arp_ptr= (unsigned char *)(arp+1);
820 arp_ptr += dev->addr_len;
821 memcpy(&sip, arp_ptr, 4);
823 arp_ptr += dev->addr_len;
824 memcpy(&tip, arp_ptr, 4);
826 * Check for bad requests for 127.x.x.x and requests for multicast
827 * addresses. If this is one such, delete it.
829 if (ipv4_is_loopback(tip) || ipv4_is_multicast(tip))
833 * Special case: We must set Frame Relay source Q.922 address
835 if (dev_type == ARPHRD_DLCI)
836 sha = dev->broadcast;
839 * Process entry. The idea here is we want to send a reply if it is a
840 * request for us or if it is a request for someone else that we hold
841 * a proxy for. We want to add an entry to our cache if it is a reply
842 * to us or if it is a request for our address.
843 * (The assumption for this last is that if someone is requesting our
844 * address, they are probably intending to talk to us, so it saves time
845 * if we cache their address. Their address is also probably not in
846 * our cache, since ours is not in their cache.)
848 * Putting this another way, we only care about replies if they are to
849 * us, in which case we add them to the cache. For requests, we care
850 * about those for us and those for our proxies. We reply to both,
851 * and in the case of requests for us we add the requester to the arp
855 /* Special case: IPv4 duplicate address detection packet (RFC2131) */
857 if (arp->ar_op == htons(ARPOP_REQUEST) &&
858 inet_addr_type(net, tip) == RTN_LOCAL &&
859 !arp_ignore(in_dev, sip, tip))
860 arp_send(ARPOP_REPLY, ETH_P_ARP, sip, dev, tip, sha,
865 if (arp->ar_op == htons(ARPOP_REQUEST) &&
866 ip_route_input_noref(skb, tip, sip, 0, dev) == 0) {
868 rt = skb_rtable(skb);
869 addr_type = rt->rt_type;
871 if (addr_type == RTN_LOCAL) {
875 dont_send |= arp_ignore(in_dev,sip,tip);
876 if (!dont_send && IN_DEV_ARPFILTER(in_dev))
877 dont_send |= arp_filter(sip,tip,dev);
879 n = neigh_event_ns(&arp_tbl, sha, &sip, dev);
881 arp_send(ARPOP_REPLY,ETH_P_ARP,sip,dev,tip,sha,dev->dev_addr,sha);
886 } else if (IN_DEV_FORWARD(in_dev)) {
887 if (addr_type == RTN_UNICAST &&
888 (arp_fwd_proxy(in_dev, dev, rt) ||
889 arp_fwd_pvlan(in_dev, dev, rt, sip, tip) ||
890 pneigh_lookup(&arp_tbl, net, &tip, dev, 0)))
892 n = neigh_event_ns(&arp_tbl, sha, &sip, dev);
896 if (NEIGH_CB(skb)->flags & LOCALLY_ENQUEUED ||
897 skb->pkt_type == PACKET_HOST ||
898 in_dev->arp_parms->proxy_delay == 0) {
899 arp_send(ARPOP_REPLY,ETH_P_ARP,sip,dev,tip,sha,dev->dev_addr,sha);
901 pneigh_enqueue(&arp_tbl, in_dev->arp_parms, skb);
909 /* Update our ARP tables */
911 n = __neigh_lookup(&arp_tbl, &sip, dev, 0);
913 if (IPV4_DEVCONF_ALL(dev_net(dev), ARP_ACCEPT)) {
914 /* Unsolicited ARP is not accepted by default.
915 It is possible, that this option should be enabled for some
916 devices (strip is candidate)
919 (arp->ar_op == htons(ARPOP_REPLY) ||
920 (arp->ar_op == htons(ARPOP_REQUEST) && tip == sip)) &&
921 inet_addr_type(net, sip) == RTN_UNICAST)
922 n = __neigh_lookup(&arp_tbl, &sip, dev, 1);
926 int state = NUD_REACHABLE;
929 /* If several different ARP replies follows back-to-back,
930 use the FIRST one. It is possible, if several proxy
931 agents are active. Taking the first reply prevents
932 arp trashing and chooses the fastest router.
934 override = time_after(jiffies, n->updated + n->parms->locktime);
936 /* Broadcast replies and request packets
937 do not assert neighbour reachability.
939 if (arp->ar_op != htons(ARPOP_REPLY) ||
940 skb->pkt_type != PACKET_HOST)
942 neigh_update(n, sha, state, override ? NEIGH_UPDATE_F_OVERRIDE : 0);
951 static void parp_redo(struct sk_buff *skb)
958 * Receive an arp request from the device layer.
961 static int arp_rcv(struct sk_buff *skb, struct net_device *dev,
962 struct packet_type *pt, struct net_device *orig_dev)
966 /* ARP header, plus 2 device addresses, plus 2 IP addresses. */
967 if (!pskb_may_pull(skb, arp_hdr_len(dev)))
971 if (arp->ar_hln != dev->addr_len ||
972 dev->flags & IFF_NOARP ||
973 skb->pkt_type == PACKET_OTHERHOST ||
974 skb->pkt_type == PACKET_LOOPBACK ||
978 if ((skb = skb_share_check(skb, GFP_ATOMIC)) == NULL)
981 memset(NEIGH_CB(skb), 0, sizeof(struct neighbour_cb));
983 return NF_HOOK(NFPROTO_ARP, NF_ARP_IN, skb, dev, NULL, arp_process);
992 * User level interface (ioctl)
996 * Set (create) an ARP cache entry.
999 static int arp_req_set_proxy(struct net *net, struct net_device *dev, int on)
1002 IPV4_DEVCONF_ALL(net, PROXY_ARP) = on;
1005 if (__in_dev_get_rtnl(dev)) {
1006 IN_DEV_CONF_SET(__in_dev_get_rtnl(dev), PROXY_ARP, on);
1012 static int arp_req_set_public(struct net *net, struct arpreq *r,
1013 struct net_device *dev)
1015 __be32 ip = ((struct sockaddr_in *)&r->arp_pa)->sin_addr.s_addr;
1016 __be32 mask = ((struct sockaddr_in *)&r->arp_netmask)->sin_addr.s_addr;
1018 if (mask && mask != htonl(0xFFFFFFFF))
1020 if (!dev && (r->arp_flags & ATF_COM)) {
1021 dev = dev_getbyhwaddr(net, r->arp_ha.sa_family,
1027 if (pneigh_lookup(&arp_tbl, net, &ip, dev, 1) == NULL)
1032 return arp_req_set_proxy(net, dev, 1);
1035 static int arp_req_set(struct net *net, struct arpreq *r,
1036 struct net_device * dev)
1039 struct neighbour *neigh;
1042 if (r->arp_flags & ATF_PUBL)
1043 return arp_req_set_public(net, r, dev);
1045 ip = ((struct sockaddr_in *)&r->arp_pa)->sin_addr.s_addr;
1046 if (r->arp_flags & ATF_PERM)
1047 r->arp_flags |= ATF_COM;
1049 struct flowi fl = { .nl_u = { .ip4_u = { .daddr = ip,
1050 .tos = RTO_ONLINK } } };
1052 if ((err = ip_route_output_key(net, &rt, &fl)) != 0)
1059 switch (dev->type) {
1060 #if defined(CONFIG_FDDI) || defined(CONFIG_FDDI_MODULE)
1063 * According to RFC 1390, FDDI devices should accept ARP
1064 * hardware types of 1 (Ethernet). However, to be more
1065 * robust, we'll accept hardware types of either 1 (Ethernet)
1066 * or 6 (IEEE 802.2).
1068 if (r->arp_ha.sa_family != ARPHRD_FDDI &&
1069 r->arp_ha.sa_family != ARPHRD_ETHER &&
1070 r->arp_ha.sa_family != ARPHRD_IEEE802)
1075 if (r->arp_ha.sa_family != dev->type)
1080 neigh = __neigh_lookup_errno(&arp_tbl, &ip, dev);
1081 err = PTR_ERR(neigh);
1082 if (!IS_ERR(neigh)) {
1083 unsigned state = NUD_STALE;
1084 if (r->arp_flags & ATF_PERM)
1085 state = NUD_PERMANENT;
1086 err = neigh_update(neigh, (r->arp_flags&ATF_COM) ?
1087 r->arp_ha.sa_data : NULL, state,
1088 NEIGH_UPDATE_F_OVERRIDE|
1089 NEIGH_UPDATE_F_ADMIN);
1090 neigh_release(neigh);
1095 static unsigned arp_state_to_flags(struct neighbour *neigh)
1098 if (neigh->nud_state&NUD_PERMANENT)
1099 flags = ATF_PERM|ATF_COM;
1100 else if (neigh->nud_state&NUD_VALID)
1106 * Get an ARP cache entry.
1109 static int arp_req_get(struct arpreq *r, struct net_device *dev)
1111 __be32 ip = ((struct sockaddr_in *) &r->arp_pa)->sin_addr.s_addr;
1112 struct neighbour *neigh;
1115 neigh = neigh_lookup(&arp_tbl, &ip, dev);
1117 read_lock_bh(&neigh->lock);
1118 memcpy(r->arp_ha.sa_data, neigh->ha, dev->addr_len);
1119 r->arp_flags = arp_state_to_flags(neigh);
1120 read_unlock_bh(&neigh->lock);
1121 r->arp_ha.sa_family = dev->type;
1122 strlcpy(r->arp_dev, dev->name, sizeof(r->arp_dev));
1123 neigh_release(neigh);
1129 static int arp_req_delete_public(struct net *net, struct arpreq *r,
1130 struct net_device *dev)
1132 __be32 ip = ((struct sockaddr_in *) &r->arp_pa)->sin_addr.s_addr;
1133 __be32 mask = ((struct sockaddr_in *)&r->arp_netmask)->sin_addr.s_addr;
1135 if (mask == htonl(0xFFFFFFFF))
1136 return pneigh_delete(&arp_tbl, net, &ip, dev);
1141 return arp_req_set_proxy(net, dev, 0);
1144 static int arp_req_delete(struct net *net, struct arpreq *r,
1145 struct net_device * dev)
1149 struct neighbour *neigh;
1151 if (r->arp_flags & ATF_PUBL)
1152 return arp_req_delete_public(net, r, dev);
1154 ip = ((struct sockaddr_in *)&r->arp_pa)->sin_addr.s_addr;
1156 struct flowi fl = { .nl_u = { .ip4_u = { .daddr = ip,
1157 .tos = RTO_ONLINK } } };
1159 if ((err = ip_route_output_key(net, &rt, &fl)) != 0)
1167 neigh = neigh_lookup(&arp_tbl, &ip, dev);
1169 if (neigh->nud_state&~NUD_NOARP)
1170 err = neigh_update(neigh, NULL, NUD_FAILED,
1171 NEIGH_UPDATE_F_OVERRIDE|
1172 NEIGH_UPDATE_F_ADMIN);
1173 neigh_release(neigh);
1179 * Handle an ARP layer I/O control request.
1182 int arp_ioctl(struct net *net, unsigned int cmd, void __user *arg)
1186 struct net_device *dev = NULL;
1191 if (!capable(CAP_NET_ADMIN))
1194 err = copy_from_user(&r, arg, sizeof(struct arpreq));
1202 if (r.arp_pa.sa_family != AF_INET)
1203 return -EPFNOSUPPORT;
1205 if (!(r.arp_flags & ATF_PUBL) &&
1206 (r.arp_flags & (ATF_NETMASK|ATF_DONTPUB)))
1208 if (!(r.arp_flags & ATF_NETMASK))
1209 ((struct sockaddr_in *)&r.arp_netmask)->sin_addr.s_addr =
1210 htonl(0xFFFFFFFFUL);
1214 if ((dev = __dev_get_by_name(net, r.arp_dev)) == NULL)
1217 /* Mmmm... It is wrong... ARPHRD_NETROM==0 */
1218 if (!r.arp_ha.sa_family)
1219 r.arp_ha.sa_family = dev->type;
1221 if ((r.arp_flags & ATF_COM) && r.arp_ha.sa_family != dev->type)
1223 } else if (cmd == SIOCGARP) {
1230 err = arp_req_delete(net, &r, dev);
1233 err = arp_req_set(net, &r, dev);
1236 err = arp_req_get(&r, dev);
1237 if (!err && copy_to_user(arg, &r, sizeof(r)))
1246 static int arp_netdev_event(struct notifier_block *this, unsigned long event, void *ptr)
1248 struct net_device *dev = ptr;
1251 case NETDEV_CHANGEADDR:
1252 neigh_changeaddr(&arp_tbl, dev);
1253 rt_cache_flush(dev_net(dev), 0);
1262 static struct notifier_block arp_netdev_notifier = {
1263 .notifier_call = arp_netdev_event,
1266 /* Note, that it is not on notifier chain.
1267 It is necessary, that this routine was called after route cache will be
1270 void arp_ifdown(struct net_device *dev)
1272 neigh_ifdown(&arp_tbl, dev);
1277 * Called once on startup.
1280 static struct packet_type arp_packet_type __read_mostly = {
1281 .type = cpu_to_be16(ETH_P_ARP),
1285 static int arp_proc_init(void);
1287 void __init arp_init(void)
1289 neigh_table_init(&arp_tbl);
1291 dev_add_pack(&arp_packet_type);
1293 #ifdef CONFIG_SYSCTL
1294 neigh_sysctl_register(NULL, &arp_tbl.parms, "ipv4", NULL);
1296 register_netdevice_notifier(&arp_netdev_notifier);
1299 #ifdef CONFIG_PROC_FS
1300 #if defined(CONFIG_AX25) || defined(CONFIG_AX25_MODULE)
1302 /* ------------------------------------------------------------------------ */
1304 * ax25 -> ASCII conversion
1306 static char *ax2asc2(ax25_address *a, char *buf)
1311 for (n = 0, s = buf; n < 6; n++) {
1312 c = (a->ax25_call[n] >> 1) & 0x7F;
1314 if (c != ' ') *s++ = c;
1319 if ((n = ((a->ax25_call[6] >> 1) & 0x0F)) > 9) {
1327 if (*buf == '\0' || *buf == '-')
1333 #endif /* CONFIG_AX25 */
1335 #define HBUFFERLEN 30
1337 static void arp_format_neigh_entry(struct seq_file *seq,
1338 struct neighbour *n)
1340 char hbuffer[HBUFFERLEN];
1343 struct net_device *dev = n->dev;
1344 int hatype = dev->type;
1346 read_lock(&n->lock);
1347 /* Convert hardware address to XX:XX:XX:XX ... form. */
1348 #if defined(CONFIG_AX25) || defined(CONFIG_AX25_MODULE)
1349 if (hatype == ARPHRD_AX25 || hatype == ARPHRD_NETROM)
1350 ax2asc2((ax25_address *)n->ha, hbuffer);
1353 for (k = 0, j = 0; k < HBUFFERLEN - 3 && j < dev->addr_len; j++) {
1354 hbuffer[k++] = hex_asc_hi(n->ha[j]);
1355 hbuffer[k++] = hex_asc_lo(n->ha[j]);
1361 #if defined(CONFIG_AX25) || defined(CONFIG_AX25_MODULE)
1364 sprintf(tbuf, "%pI4", n->primary_key);
1365 seq_printf(seq, "%-16s 0x%-10x0x%-10x%s * %s\n",
1366 tbuf, hatype, arp_state_to_flags(n), hbuffer, dev->name);
1367 read_unlock(&n->lock);
1370 static void arp_format_pneigh_entry(struct seq_file *seq,
1371 struct pneigh_entry *n)
1373 struct net_device *dev = n->dev;
1374 int hatype = dev ? dev->type : 0;
1377 sprintf(tbuf, "%pI4", n->key);
1378 seq_printf(seq, "%-16s 0x%-10x0x%-10x%s * %s\n",
1379 tbuf, hatype, ATF_PUBL | ATF_PERM, "00:00:00:00:00:00",
1380 dev ? dev->name : "*");
1383 static int arp_seq_show(struct seq_file *seq, void *v)
1385 if (v == SEQ_START_TOKEN) {
1386 seq_puts(seq, "IP address HW type Flags "
1387 "HW address Mask Device\n");
1389 struct neigh_seq_state *state = seq->private;
1391 if (state->flags & NEIGH_SEQ_IS_PNEIGH)
1392 arp_format_pneigh_entry(seq, v);
1394 arp_format_neigh_entry(seq, v);
1400 static void *arp_seq_start(struct seq_file *seq, loff_t *pos)
1402 /* Don't want to confuse "arp -a" w/ magic entries,
1403 * so we tell the generic iterator to skip NUD_NOARP.
1405 return neigh_seq_start(seq, pos, &arp_tbl, NEIGH_SEQ_SKIP_NOARP);
1408 /* ------------------------------------------------------------------------ */
1410 static const struct seq_operations arp_seq_ops = {
1411 .start = arp_seq_start,
1412 .next = neigh_seq_next,
1413 .stop = neigh_seq_stop,
1414 .show = arp_seq_show,
1417 static int arp_seq_open(struct inode *inode, struct file *file)
1419 return seq_open_net(inode, file, &arp_seq_ops,
1420 sizeof(struct neigh_seq_state));
1423 static const struct file_operations arp_seq_fops = {
1424 .owner = THIS_MODULE,
1425 .open = arp_seq_open,
1427 .llseek = seq_lseek,
1428 .release = seq_release_net,
1432 static int __net_init arp_net_init(struct net *net)
1434 if (!proc_net_fops_create(net, "arp", S_IRUGO, &arp_seq_fops))
1439 static void __net_exit arp_net_exit(struct net *net)
1441 proc_net_remove(net, "arp");
1444 static struct pernet_operations arp_net_ops = {
1445 .init = arp_net_init,
1446 .exit = arp_net_exit,
1449 static int __init arp_proc_init(void)
1451 return register_pernet_subsys(&arp_net_ops);
1454 #else /* CONFIG_PROC_FS */
1456 static int __init arp_proc_init(void)
1461 #endif /* CONFIG_PROC_FS */