xref: /illumos-gate/usr/src/uts/common/inet/ip/ip_arp.c (revision 56f33205c9ed776c3c909e07d52e94610a675740)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #include <inet/ip_arp.h>
28 #include <inet/ip_ndp.h>
29 #include <net/if_arp.h>
30 #include <netinet/if_ether.h>
31 #include <sys/strsubr.h>
32 #include <inet/ip6.h>
33 #include <inet/ip.h>
34 #include <inet/ip_ire.h>
35 #include <inet/ip_if.h>
36 #include <sys/dlpi.h>
37 #include <sys/sunddi.h>
38 #include <sys/strsun.h>
39 #include <sys/sdt.h>
40 #include <inet/mi.h>
41 #include <inet/arp.h>
42 #include <inet/ipdrop.h>
43 #include <sys/sockio.h>
44 #include <inet/ip_impl.h>
45 #include <sys/policy.h>
46 
47 #define	ARL_LL_ADDR_OFFSET(arl)	(((arl)->arl_sap_length) < 0 ? \
48 	(sizeof (dl_unitdata_req_t)) : \
49 	((sizeof (dl_unitdata_req_t)) + (ABS((arl)->arl_sap_length))))
50 
51 /*
52  * MAC-specific intelligence.  Shouldn't be needed, but the DL_INFO_ACK
53  * doesn't quite do it for us.
54  */
55 typedef struct arp_m_s {
56 	t_uscalar_t	arp_mac_type;
57 	uint32_t	arp_mac_arp_hw_type;
58 	t_scalar_t	arp_mac_sap_length;
59 	uint32_t	arp_mac_hw_addr_length;
60 } arp_m_t;
61 
62 static int arp_close(queue_t *, int);
63 static void arp_rput(queue_t *, mblk_t *);
64 static void arp_wput(queue_t *, mblk_t *);
65 static arp_m_t	*arp_m_lookup(t_uscalar_t mac_type);
66 static void arp_notify(ipaddr_t, mblk_t *, uint32_t, ip_recv_attr_t *,
67 	ncec_t *);
68 static int arp_output(ill_t *, uint32_t, const uchar_t *, const uchar_t *,
69 	const uchar_t *, const uchar_t *, uchar_t *);
70 static int  arp_modclose(arl_t *);
71 static void  arp_mod_close_tail(arl_t *);
72 static mblk_t *arl_unbind(arl_t *);
73 static void arp_process_packet(ill_t *, mblk_t *);
74 static void arp_excl(ipsq_t *, queue_t *, mblk_t *, void *);
75 static void arp_drop_packet(const char *str, mblk_t *, ill_t *);
76 static int arp_open(queue_t *, dev_t *, int, int, cred_t *);
77 static int ip_sioctl_ifunitsel_arp(queue_t *, int *);
78 static int ip_sioctl_slifname_arp(queue_t *, void *);
79 static void arp_dlpi_send(arl_t *, mblk_t *);
80 static void arl_defaults_common(arl_t *, mblk_t *);
81 static int arp_modopen(queue_t *, dev_t *, int, int, cred_t *);
82 static void arp_ifname_notify(arl_t *);
83 static void arp_rput_dlpi_writer(ipsq_t *, queue_t *, mblk_t *, void *);
84 static arl_t *ill_to_arl(ill_t *);
85 
86 #define	DL_PRIM(mp)	(((union DL_primitives *)(mp)->b_rptr)->dl_primitive)
87 #define	IS_DLPI_DATA(mp)						\
88 	((DB_TYPE(mp) == M_PROTO) &&					\
89 	MBLKL(mp) >= sizeof (dl_unitdata_ind_t) &&			\
90 	(DL_PRIM(mp) == DL_UNITDATA_IND))
91 
92 #define	AR_NOTFOUND	1	/* No matching ace found in cache */
93 #define	AR_MERGED	2	/* Matching ace updated (RFC 826 Merge_flag) */
94 #define	AR_LOOPBACK	3	/* Our own arp packet was received */
95 #define	AR_BOGON	4	/* Another host has our IP addr. */
96 #define	AR_FAILED	5	/* Duplicate Address Detection has failed */
97 #define	AR_CHANGED	6	/* Address has changed; tell IP (and merged) */
98 
99 boolean_t arp_no_defense;
100 
101 struct module_info arp_mod_info = {
102 	IP_MOD_ID, "arp", 1, INFPSZ, 65536, 1024
103 };
104 static struct qinit rinit_arp = {
105 	(pfi_t)arp_rput, NULL, arp_open, arp_close, NULL, &arp_mod_info
106 };
107 static struct qinit winit_arp = {
108 	(pfi_t)arp_wput, NULL, arp_open, arp_close, NULL,
109 	&arp_mod_info
110 };
111 struct streamtab arpinfo = {
112 	&rinit_arp, &winit_arp
113 };
114 #define	ARH_FIXED_LEN	8
115 #define	AR_LL_HDR_SLACK	32
116 
117 /*
118  * pfhooks for ARP.
119  */
120 #define	ARP_HOOK_IN(_hook, _event, _ilp, _hdr, _fm, _m, ipst)		\
121 									\
122 	if ((_hook).he_interested) {                       		\
123 		hook_pkt_event_t info;                          	\
124 									\
125 		info.hpe_protocol = ipst->ips_arp_net_data;		\
126 		info.hpe_ifp = _ilp;                       		\
127 		info.hpe_ofp = 0;                       		\
128 		info.hpe_hdr = _hdr;                            	\
129 		info.hpe_mp = &(_fm);                           	\
130 		info.hpe_mb = _m;                               	\
131 		if (hook_run(ipst->ips_arp_net_data->netd_hooks,	\
132 		    _event, (hook_data_t)&info) != 0) {			\
133 			if (_fm != NULL) {                      	\
134 				freemsg(_fm);                   	\
135 				_fm = NULL;                     	\
136 			}                                       	\
137 			_hdr = NULL;                            	\
138 			_m = NULL;                              	\
139 		} else {                                        	\
140 			_hdr = info.hpe_hdr;                    	\
141 			_m = info.hpe_mb;                       	\
142 		}                                               	\
143 	}
144 
145 #define	ARP_HOOK_OUT(_hook, _event, _olp, _hdr, _fm, _m, ipst)		\
146 									\
147 	if ((_hook).he_interested) {                       		\
148 		hook_pkt_event_t info;                          	\
149 									\
150 		info.hpe_protocol = ipst->ips_arp_net_data;		\
151 		info.hpe_ifp = 0;                       		\
152 		info.hpe_ofp = _olp;                       		\
153 		info.hpe_hdr = _hdr;                            	\
154 		info.hpe_mp = &(_fm);                           	\
155 		info.hpe_mb = _m;                               	\
156 		if (hook_run(ipst->ips_arp_net_data->netd_hooks,	\
157 		    _event, (hook_data_t)&info) != 0) {			\
158 			if (_fm != NULL) {                      	\
159 				freemsg(_fm);                   	\
160 				_fm = NULL;                     	\
161 			}                                       	\
162 			_hdr = NULL;                            	\
163 			_m = NULL;                              	\
164 		} else {                                        	\
165 			_hdr = info.hpe_hdr;                    	\
166 			_m = info.hpe_mb;                       	\
167 		}                                               	\
168 	}
169 
170 static arp_m_t	arp_m_tbl[] = {
171 	{ DL_CSMACD,	ARPHRD_ETHER,	-2,	6},	/* 802.3 */
172 	{ DL_TPB,	ARPHRD_IEEE802,	-2,	6},	/* 802.4 */
173 	{ DL_TPR,	ARPHRD_IEEE802,	-2,	6},	/* 802.5 */
174 	{ DL_METRO,	ARPHRD_IEEE802,	-2,	6},	/* 802.6 */
175 	{ DL_ETHER,	ARPHRD_ETHER,	-2,	6},	/* Ethernet */
176 	{ DL_FDDI,	ARPHRD_ETHER,	-2,	6},	/* FDDI */
177 	{ DL_IB,	ARPHRD_IB,	-2,	20},	/* Infiniband */
178 	{ DL_OTHER,	ARPHRD_ETHER,	-2,	6}	/* unknown */
179 };
180 
181 static void
182 arl_refhold_locked(arl_t *arl)
183 {
184 	ASSERT(MUTEX_HELD(&arl->arl_lock));
185 	arl->arl_refcnt++;
186 	ASSERT(arl->arl_refcnt != 0);
187 }
188 
189 static void
190 arl_refrele(arl_t *arl)
191 {
192 	mutex_enter(&arl->arl_lock);
193 	ASSERT(arl->arl_refcnt != 0);
194 	arl->arl_refcnt--;
195 	if (arl->arl_refcnt > 1) {
196 		mutex_exit(&arl->arl_lock);
197 		return;
198 	}
199 
200 	/* ill_close or arp_unbind_complete may be waiting */
201 	cv_broadcast(&arl->arl_cv);
202 	mutex_exit(&arl->arl_lock);
203 }
204 
205 /*
206  * wake up any pending ip ioctls.
207  */
208 static void
209 arp_cmd_done(ill_t *ill, int err, t_uscalar_t lastprim)
210 {
211 	if (lastprim == DL_UNBIND_REQ && ill->ill_replumbing)
212 		arp_replumb_done(ill, 0);
213 	else
214 		arp_bringup_done(ill, err);
215 }
216 
217 static int
218 ip_nce_resolve_all(ill_t *ill, uchar_t *src_haddr, uint32_t hlen,
219     const in_addr_t *src_paddr, ncec_t **sncec, int op)
220 {
221 	int retv;
222 	ncec_t *ncec;
223 	boolean_t ll_changed;
224 	uchar_t *lladdr = NULL;
225 	int new_state;
226 
227 	ASSERT(ill != NULL);
228 
229 	ncec = ncec_lookup_illgrp_v4(ill, src_paddr);
230 	*sncec = ncec;
231 
232 	if (ncec == NULL) {
233 		retv = AR_NOTFOUND;
234 		goto done;
235 	}
236 
237 	mutex_enter(&ncec->ncec_lock);
238 	/*
239 	 * IP addr and hardware address match what we already
240 	 * have, then this is a broadcast packet emitted by one of our
241 	 * interfaces, reflected by the switch and received on another
242 	 * interface.  We return AR_LOOPBACK.
243 	 */
244 	lladdr = ncec->ncec_lladdr;
245 	if (NCE_MYADDR(ncec) && hlen == ncec->ncec_ill->ill_phys_addr_length &&
246 	    bcmp(lladdr, src_haddr, hlen) == 0) {
247 		mutex_exit(&ncec->ncec_lock);
248 		retv = AR_LOOPBACK;
249 		goto done;
250 	}
251 	/*
252 	 * If the entry is unverified, then we've just verified that
253 	 * someone else already owns this address, because this is a
254 	 * message with the same protocol address but different
255 	 * hardware address.
256 	 */
257 	if (ncec->ncec_flags & NCE_F_UNVERIFIED) {
258 		mutex_exit(&ncec->ncec_lock);
259 		ncec_delete(ncec);
260 		ncec_refrele(ncec);
261 		*sncec = NULL;
262 		retv = AR_FAILED;
263 		goto done;
264 	}
265 
266 	/*
267 	 * If the IP address matches ours and we're authoritative for
268 	 * this entry, then some other node is using our IP addr, so
269 	 * return AR_BOGON.  Also reset the transmit count to zero so
270 	 * that, if we're currently in initial announcement mode, we
271 	 * switch back to the lazier defense mode.  Knowing that
272 	 * there's at least one duplicate out there, we ought not
273 	 * blindly announce.
274 	 *
275 	 * NCE_F_AUTHORITY is set in one of two ways:
276 	 * 1. /sbin/arp told us so, via the "permanent" flag.
277 	 * 2. This is one of my addresses.
278 	 */
279 	if (ncec->ncec_flags & NCE_F_AUTHORITY) {
280 		ncec->ncec_unsolicit_count = 0;
281 		mutex_exit(&ncec->ncec_lock);
282 		retv = AR_BOGON;
283 		goto done;
284 	}
285 
286 	/*
287 	 * No address conflict was detected, and we are getting
288 	 * ready to update the ncec's hwaddr. The nce MUST NOT be on an
289 	 * under interface, because all dynamic nce's are created on the
290 	 * native interface (in the non-IPMP case) or on the IPMP
291 	 * meta-interface (in the IPMP case)
292 	 */
293 	ASSERT(!IS_UNDER_IPMP(ncec->ncec_ill));
294 
295 	/*
296 	 * update ncec with src_haddr, hlen.
297 	 *
298 	 * We are trying to resolve this ncec_addr/src_paddr and we
299 	 * got a REQUEST/RESPONSE from the ncec_addr/src_paddr.
300 	 * So the new_state is at least "STALE". If, in addition,
301 	 * this a solicited, unicast ARP_RESPONSE, we can transition
302 	 * to REACHABLE.
303 	 */
304 	new_state = ND_STALE;
305 	ip1dbg(("got info for ncec %p from addr %x\n",
306 	    (void *)ncec, *src_paddr));
307 	retv = AR_MERGED;
308 	if (ncec->ncec_state == ND_INCOMPLETE ||
309 	    ncec->ncec_state == ND_INITIAL) {
310 		ll_changed = B_TRUE;
311 	} else {
312 		ll_changed = nce_cmp_ll_addr(ncec, src_haddr, hlen);
313 		if (!ll_changed)
314 			new_state = ND_UNCHANGED;
315 		else
316 			retv = AR_CHANGED;
317 	}
318 	/*
319 	 * We don't have the equivalent of the IPv6 'S' flag indicating
320 	 * a solicited response, so we assume that if we are in
321 	 * INCOMPLETE, or got back an unchanged lladdr in PROBE state,
322 	 * and this is an ARP_RESPONSE, it must be a
323 	 * solicited response allowing us to transtion to REACHABLE.
324 	 */
325 	if (op == ARP_RESPONSE) {
326 		switch (ncec->ncec_state) {
327 		case ND_PROBE:
328 			new_state = (ll_changed ? ND_STALE : ND_REACHABLE);
329 			break;
330 		case ND_INCOMPLETE:
331 			new_state = ND_REACHABLE;
332 			break;
333 		}
334 	}
335 	/*
336 	 * Call nce_update() to refresh fastpath information on any
337 	 * dependent nce_t entries.
338 	 */
339 	nce_update(ncec, new_state, (ll_changed ? src_haddr : NULL));
340 	mutex_exit(&ncec->ncec_lock);
341 	nce_resolv_ok(ncec);
342 done:
343 	return (retv);
344 }
345 
346 /* Find an entry for a particular MAC type in the arp_m_tbl. */
347 static arp_m_t	*
348 arp_m_lookup(t_uscalar_t mac_type)
349 {
350 	arp_m_t	*arm;
351 
352 	for (arm = arp_m_tbl; arm < A_END(arp_m_tbl); arm++) {
353 		if (arm->arp_mac_type == mac_type)
354 			return (arm);
355 	}
356 	return (NULL);
357 }
358 
359 static uint32_t
360 arp_hw_type(t_uscalar_t mactype)
361 {
362 	arp_m_t *arm;
363 
364 	if ((arm = arp_m_lookup(mactype)) == NULL)
365 		arm = arp_m_lookup(DL_OTHER);
366 	return (arm->arp_mac_arp_hw_type);
367 }
368 
369 /*
370  * Called when an DLPI control message has been acked; send down the next
371  * queued message (if any).
372  * The DLPI messages of interest being bind, attach and unbind since
373  * these are the only ones sent by ARP via arp_dlpi_send.
374  */
375 static void
376 arp_dlpi_done(arl_t *arl, ill_t *ill)
377 {
378 	mblk_t *mp;
379 	int err;
380 	t_uscalar_t prim;
381 
382 	mutex_enter(&arl->arl_lock);
383 	prim = arl->arl_dlpi_pending;
384 
385 	if ((mp = arl->arl_dlpi_deferred) == NULL) {
386 		arl->arl_dlpi_pending = DL_PRIM_INVAL;
387 		if (arl->arl_state_flags & ARL_LL_DOWN)
388 			err = ENETDOWN;
389 		else
390 			err = 0;
391 		mutex_exit(&arl->arl_lock);
392 
393 		mutex_enter(&ill->ill_lock);
394 		ill->ill_arl_dlpi_pending = 0;
395 		mutex_exit(&ill->ill_lock);
396 		arp_cmd_done(ill, err, prim);
397 		return;
398 	}
399 
400 	arl->arl_dlpi_deferred = mp->b_next;
401 	mp->b_next = NULL;
402 
403 	ASSERT(DB_TYPE(mp) == M_PROTO || DB_TYPE(mp) == M_PCPROTO);
404 
405 	arl->arl_dlpi_pending = DL_PRIM(mp);
406 	mutex_exit(&arl->arl_lock);
407 
408 	mutex_enter(&ill->ill_lock);
409 	ill->ill_arl_dlpi_pending = 1;
410 	mutex_exit(&ill->ill_lock);
411 
412 	putnext(arl->arl_wq, mp);
413 }
414 
415 /*
416  * This routine is called during module initialization when the DL_INFO_ACK
417  * comes back from the device.	We set up defaults for all the device dependent
418  * doo-dads we are going to need.  This will leave us ready to roll if we are
419  * attempting auto-configuration.  Alternatively, these defaults can be
420  * overridden by initialization procedures possessing higher intelligence.
421  *
422  * Caller will free the mp.
423  */
424 static void
425 arp_ll_set_defaults(arl_t *arl, mblk_t *mp)
426 {
427 	arp_m_t		*arm;
428 	dl_info_ack_t	*dlia = (dl_info_ack_t *)mp->b_rptr;
429 
430 	if ((arm = arp_m_lookup(dlia->dl_mac_type)) == NULL)
431 		arm = arp_m_lookup(DL_OTHER);
432 	ASSERT(arm != NULL);
433 
434 	/*
435 	 * We initialize based on parameters in the (currently) not too
436 	 * exhaustive arp_m_tbl.
437 	 */
438 	if (dlia->dl_version == DL_VERSION_2) {
439 		arl->arl_sap_length = dlia->dl_sap_length;
440 		arl->arl_phys_addr_length = dlia->dl_brdcst_addr_length;
441 		if (dlia->dl_provider_style == DL_STYLE2)
442 			arl->arl_needs_attach = 1;
443 	} else {
444 		arl->arl_sap_length = arm->arp_mac_sap_length;
445 		arl->arl_phys_addr_length = arm->arp_mac_hw_addr_length;
446 	}
447 	/*
448 	 * Note: the arp_hw_type in the arp header may be derived from
449 	 * the ill_mac_type and arp_m_lookup().
450 	 */
451 	arl->arl_sap = ETHERTYPE_ARP;
452 	arl_defaults_common(arl, mp);
453 }
454 
455 static void
456 arp_wput(queue_t *q, mblk_t *mp)
457 {
458 	int err = EINVAL;
459 	struct iocblk *ioc;
460 	mblk_t *mp1;
461 
462 	switch (DB_TYPE(mp)) {
463 	case M_IOCTL:
464 		ASSERT(q->q_next != NULL);
465 		ioc = (struct iocblk *)mp->b_rptr;
466 		if (ioc->ioc_cmd != SIOCSLIFNAME &&
467 		    ioc->ioc_cmd != IF_UNITSEL) {
468 			DTRACE_PROBE4(arl__dlpi, char *, "arp_wput",
469 			    char *, "<some ioctl>", char *, "-",
470 			    arl_t *, (arl_t *)q->q_ptr);
471 			putnext(q, mp);
472 			return;
473 		}
474 		if ((mp1 = mp->b_cont) == 0)
475 			err = EINVAL;
476 		else if (ioc->ioc_cmd == SIOCSLIFNAME)
477 			err = ip_sioctl_slifname_arp(q, mp1->b_rptr);
478 		else if (ioc->ioc_cmd == IF_UNITSEL)
479 			err = ip_sioctl_ifunitsel_arp(q, (int *)mp1->b_rptr);
480 		if (err == 0)
481 			miocack(q, mp, 0, 0);
482 		else
483 			miocnak(q, mp, 0, err);
484 		return;
485 	default:
486 		DTRACE_PROBE4(arl__dlpi, char *, "arp_wput default",
487 		    char *, "default mblk", char *, "-",
488 		    arl_t *, (arl_t *)q->q_ptr);
489 		putnext(q, mp);
490 		return;
491 	}
492 }
493 
494 /*
495  * similar to ill_dlpi_pending(): verify that the received DLPI response
496  * matches the one that is pending for the arl.
497  */
498 static boolean_t
499 arl_dlpi_pending(arl_t *arl, t_uscalar_t prim)
500 {
501 	t_uscalar_t pending;
502 
503 	mutex_enter(&arl->arl_lock);
504 	if (arl->arl_dlpi_pending == prim) {
505 		mutex_exit(&arl->arl_lock);
506 		return (B_TRUE);
507 	}
508 
509 	if (arl->arl_state_flags & ARL_CONDEMNED) {
510 		mutex_exit(&arl->arl_lock);
511 		return (B_FALSE);
512 	}
513 	pending = arl->arl_dlpi_pending;
514 	mutex_exit(&arl->arl_lock);
515 
516 	if (pending == DL_PRIM_INVAL) {
517 		ip0dbg(("arl_dlpi_pending unsolicited ack for %s on %s",
518 		    dl_primstr(prim), arl->arl_name));
519 	} else {
520 		ip0dbg(("arl_dlpi_pending ack for %s on %s expect %s",
521 		    dl_primstr(prim), arl->arl_name, dl_primstr(pending)));
522 	}
523 	return (B_FALSE);
524 }
525 
526 /* DLPI messages, other than DL_UNITDATA_IND are handled here. */
527 static void
528 arp_rput_dlpi(queue_t *q, mblk_t *mp)
529 {
530 	arl_t		*arl = (arl_t *)q->q_ptr;
531 	union DL_primitives *dlp;
532 	t_uscalar_t	prim;
533 	t_uscalar_t	reqprim = DL_PRIM_INVAL;
534 	ill_t		*ill;
535 
536 	if ((mp->b_wptr - mp->b_rptr) < sizeof (dlp->dl_primitive)) {
537 		putnext(q, mp);
538 		return;
539 	}
540 	dlp = (union DL_primitives *)mp->b_rptr;
541 	prim = dlp->dl_primitive;
542 
543 	/*
544 	 * If we received an ACK but didn't send a request for it, then it
545 	 * can't be part of any pending operation; discard up-front.
546 	 */
547 	switch (prim) {
548 	case DL_ERROR_ACK:
549 		/*
550 		 * ce is confused about how DLPI works, so we have to interpret
551 		 * an "error" on DL_NOTIFY_ACK (which we never could have sent)
552 		 * as really meaning an error on DL_NOTIFY_REQ.
553 		 *
554 		 * Note that supporting DL_NOTIFY_REQ is optional, so printing
555 		 * out an error message on the console isn't warranted except
556 		 * for debug.
557 		 */
558 		if (dlp->error_ack.dl_error_primitive == DL_NOTIFY_ACK ||
559 		    dlp->error_ack.dl_error_primitive == DL_NOTIFY_REQ) {
560 			reqprim = DL_NOTIFY_REQ;
561 		} else {
562 			reqprim = dlp->error_ack.dl_error_primitive;
563 		}
564 		break;
565 	case DL_INFO_ACK:
566 		reqprim = DL_INFO_REQ;
567 		break;
568 	case DL_OK_ACK:
569 		reqprim = dlp->ok_ack.dl_correct_primitive;
570 		break;
571 	case DL_BIND_ACK:
572 		reqprim = DL_BIND_REQ;
573 		break;
574 	default:
575 		DTRACE_PROBE2(rput_dl_badprim, arl_t *, arl,
576 		    union DL_primitives *, dlp);
577 		putnext(q, mp);
578 		return;
579 	}
580 	if (reqprim == DL_PRIM_INVAL || !arl_dlpi_pending(arl, reqprim)) {
581 		freemsg(mp);
582 		return;
583 	}
584 	DTRACE_PROBE4(arl__dlpi, char *, "arp_rput_dlpi received",
585 	    char *, dl_primstr(prim), char *, dl_primstr(reqprim),
586 	    arl_t *, arl);
587 
588 	ASSERT(prim != DL_NOTIFY_IND);
589 
590 	ill = arl_to_ill(arl);
591 
592 	switch (reqprim) {
593 	case DL_INFO_REQ:
594 		/*
595 		 * ill has not been set up yet for this case. This is the
596 		 * DL_INFO_ACK for the first DL_INFO_REQ sent from
597 		 * arp_modopen(). There should be no other arl_dlpi_deferred
598 		 * messages pending. We initialize the arl here.
599 		 */
600 		ASSERT(!arl->arl_dlpi_style_set);
601 		ASSERT(arl->arl_dlpi_pending == DL_INFO_REQ);
602 		ASSERT(arl->arl_dlpi_deferred == NULL);
603 		arl->arl_dlpi_pending = DL_PRIM_INVAL;
604 		arp_ll_set_defaults(arl, mp);
605 		freemsg(mp);
606 		return;
607 	case DL_UNBIND_REQ:
608 		mutex_enter(&arl->arl_lock);
609 		arl->arl_state_flags &= ~ARL_DL_UNBIND_IN_PROGRESS;
610 		/*
611 		 * This is not an error, so we don't set ARL_LL_DOWN
612 		 */
613 		arl->arl_state_flags &= ~ARL_LL_UP;
614 		arl->arl_state_flags |= ARL_LL_UNBOUND;
615 		if (arl->arl_state_flags & ARL_CONDEMNED) {
616 			/*
617 			 * if this is part of the unplumb the arl may
618 			 * vaporize any moment after we cv_signal the
619 			 * arl_cv so we reset arl_dlpi_pending here.
620 			 * All other cases (including replumb) will
621 			 * have the arl_dlpi_pending reset in
622 			 * arp_dlpi_done.
623 			 */
624 			arl->arl_dlpi_pending = DL_PRIM_INVAL;
625 		}
626 		cv_signal(&arl->arl_cv);
627 		mutex_exit(&arl->arl_lock);
628 		break;
629 	}
630 	if (ill != NULL) {
631 		/*
632 		 * ill ref obtained by arl_to_ill()  will be released
633 		 * by qwriter_ip()
634 		 */
635 		qwriter_ip(ill, ill->ill_wq, mp, arp_rput_dlpi_writer,
636 		    CUR_OP, B_TRUE);
637 		return;
638 	}
639 	freemsg(mp);
640 }
641 
642 /*
643  * Handling of DLPI messages that require exclusive access to the ipsq.
644  */
645 /* ARGSUSED */
646 static void
647 arp_rput_dlpi_writer(ipsq_t *ipsq, queue_t *q, mblk_t *mp, void *dummy_arg)
648 {
649 	union DL_primitives *dlp = (union DL_primitives *)mp->b_rptr;
650 	ill_t		*ill = (ill_t *)q->q_ptr;
651 	arl_t		*arl = ill_to_arl(ill);
652 
653 	if (arl == NULL) {
654 		/*
655 		 * happens as a result arp_modclose triggering unbind.
656 		 * arp_rput_dlpi will cv_signal the arl_cv and the modclose
657 		 * will complete, but when it does ipsq_exit, the waiting
658 		 * qwriter_ip gets into the ipsq but will find the arl null.
659 		 * There should be no deferred messages in this case, so
660 		 * just complete and exit.
661 		 */
662 		arp_cmd_done(ill, 0, DL_UNBIND_REQ);
663 		freemsg(mp);
664 		return;
665 	}
666 	switch (dlp->dl_primitive) {
667 	case DL_ERROR_ACK:
668 		switch (dlp->error_ack.dl_error_primitive) {
669 		case DL_UNBIND_REQ:
670 			mutex_enter(&arl->arl_lock);
671 			arl->arl_state_flags &= ~ARL_DL_UNBIND_IN_PROGRESS;
672 			arl->arl_state_flags &= ~ARL_LL_UP;
673 			arl->arl_state_flags |= ARL_LL_UNBOUND;
674 			arl->arl_state_flags |= ARL_LL_DOWN;
675 			cv_signal(&arl->arl_cv);
676 			mutex_exit(&arl->arl_lock);
677 			break;
678 		case DL_BIND_REQ:
679 			mutex_enter(&arl->arl_lock);
680 			arl->arl_state_flags &= ~ARL_LL_UP;
681 			arl->arl_state_flags |= ARL_LL_DOWN;
682 			arl->arl_state_flags |= ARL_LL_UNBOUND;
683 			cv_signal(&arl->arl_cv);
684 			mutex_exit(&arl->arl_lock);
685 			break;
686 		case DL_ATTACH_REQ:
687 			break;
688 		default:
689 			/* If it's anything else, we didn't send it. */
690 			arl_refrele(arl);
691 			putnext(q, mp);
692 			return;
693 		}
694 		break;
695 	case DL_OK_ACK:
696 		DTRACE_PROBE4(arl__dlpi, char *, "arp_rput_dlpi_writer ok",
697 		    char *, dl_primstr(dlp->ok_ack.dl_correct_primitive),
698 		    char *, dl_primstr(dlp->ok_ack.dl_correct_primitive),
699 		    arl_t *, arl);
700 		mutex_enter(&arl->arl_lock);
701 		switch (dlp->ok_ack.dl_correct_primitive) {
702 		case DL_UNBIND_REQ:
703 		case DL_ATTACH_REQ:
704 			break;
705 		default:
706 			ip0dbg(("Dropping unrecognized DL_OK_ACK for %s",
707 			    dl_primstr(dlp->ok_ack.dl_correct_primitive)));
708 			mutex_exit(&arl->arl_lock);
709 			arl_refrele(arl);
710 			freemsg(mp);
711 			return;
712 		}
713 		mutex_exit(&arl->arl_lock);
714 		break;
715 	case DL_BIND_ACK:
716 		DTRACE_PROBE2(rput_dl_bind, arl_t *, arl,
717 		    dl_bind_ack_t *, &dlp->bind_ack);
718 
719 		mutex_enter(&arl->arl_lock);
720 		ASSERT(arl->arl_state_flags & ARL_LL_BIND_PENDING);
721 		arl->arl_state_flags &=
722 		    ~(ARL_LL_BIND_PENDING|ARL_LL_DOWN|ARL_LL_UNBOUND);
723 		arl->arl_state_flags |= ARL_LL_UP;
724 		mutex_exit(&arl->arl_lock);
725 		break;
726 	case DL_UDERROR_IND:
727 		DTRACE_PROBE2(rput_dl_uderror, arl_t *, arl,
728 		    dl_uderror_ind_t *, &dlp->uderror_ind);
729 		arl_refrele(arl);
730 		putnext(q, mp);
731 		return;
732 	default:
733 		DTRACE_PROBE2(rput_dl_badprim, arl_t *, arl,
734 		    union DL_primitives *, dlp);
735 		arl_refrele(arl);
736 		putnext(q, mp);
737 		return;
738 	}
739 	arp_dlpi_done(arl, ill);
740 	arl_refrele(arl);
741 	freemsg(mp);
742 }
743 
744 void
745 arp_rput(queue_t *q, mblk_t *mp)
746 {
747 	arl_t		*arl = q->q_ptr;
748 	boolean_t	need_refrele = B_FALSE;
749 
750 	mutex_enter(&arl->arl_lock);
751 	if (((arl->arl_state_flags &
752 	    (ARL_CONDEMNED | ARL_LL_REPLUMBING)) != 0)) {
753 		/*
754 		 * Only allow high priority DLPI messages during unplumb or
755 		 * replumb, and we don't take an arl_refcnt for that case.
756 		 */
757 		if (DB_TYPE(mp) != M_PCPROTO) {
758 			mutex_exit(&arl->arl_lock);
759 			freemsg(mp);
760 			return;
761 		}
762 	} else {
763 		arl_refhold_locked(arl);
764 		need_refrele = B_TRUE;
765 	}
766 	mutex_exit(&arl->arl_lock);
767 
768 	switch (DB_TYPE(mp)) {
769 	case M_PCPROTO:
770 	case M_PROTO: {
771 		ill_t *ill;
772 
773 		/*
774 		 * could be one of
775 		 * (i)   real message from the wire, (DLPI_DATA)
776 		 * (ii)  DLPI message
777 		 * Take a ref on the ill associated with this arl to
778 		 * prevent the ill from being unplumbed until this thread
779 		 * is done.
780 		 */
781 		if (IS_DLPI_DATA(mp)) {
782 			ill = arl_to_ill(arl);
783 			if (ill == NULL) {
784 				arp_drop_packet("No ill", mp, ill);
785 				break;
786 			}
787 			arp_process_packet(ill, mp);
788 			ill_refrele(ill);
789 			break;
790 		}
791 		/* Miscellaneous DLPI messages get shuffled off. */
792 		arp_rput_dlpi(q, mp);
793 		break;
794 	}
795 	case M_ERROR:
796 	case M_HANGUP:
797 		if (mp->b_rptr < mp->b_wptr)
798 			arl->arl_error = (int)(*mp->b_rptr & 0xFF);
799 		if (arl->arl_error == 0)
800 			arl->arl_error = ENXIO;
801 		freemsg(mp);
802 		break;
803 	default:
804 		ip1dbg(("arp_rput other db type %x\n", DB_TYPE(mp)));
805 		putnext(q, mp);
806 		break;
807 	}
808 	if (need_refrele)
809 		arl_refrele(arl);
810 }
811 
812 static void
813 arp_process_packet(ill_t *ill, mblk_t *mp)
814 {
815 	mblk_t 		*mp1;
816 	arh_t		*arh;
817 	in_addr_t	src_paddr, dst_paddr;
818 	uint32_t	hlen, plen;
819 	boolean_t	is_probe;
820 	int		op;
821 	ncec_t		*dst_ncec, *src_ncec = NULL;
822 	uchar_t		*src_haddr, *arhp, *dst_haddr, *dp, *sp;
823 	int		err;
824 	ip_stack_t	*ipst;
825 	boolean_t	need_ill_refrele = B_FALSE;
826 	nce_t		*nce;
827 	uchar_t		*src_lladdr;
828 	dl_unitdata_ind_t *dlui;
829 	ip_recv_attr_t	iras;
830 
831 	ASSERT(ill != NULL);
832 	if (ill->ill_flags & ILLF_NOARP) {
833 		arp_drop_packet("Interface does not support ARP", mp, ill);
834 		return;
835 	}
836 	ipst = ill->ill_ipst;
837 	/*
838 	 * What we should have at this point is a DL_UNITDATA_IND message
839 	 * followed by an ARP packet.  We do some initial checks and then
840 	 * get to work.
841 	 */
842 	dlui = (dl_unitdata_ind_t *)mp->b_rptr;
843 	if (dlui->dl_group_address == 1) {
844 		/*
845 		 * multicast or broadcast  packet. Only accept on the ipmp
846 		 * nominated interface for multicasts ('cast_ill').
847 		 * If we have no cast_ill we are liberal and accept everything.
848 		 */
849 		if (IS_UNDER_IPMP(ill)) {
850 			/* For an under ill_grp can change under lock */
851 			rw_enter(&ipst->ips_ill_g_lock, RW_READER);
852 			if (!ill->ill_nom_cast && ill->ill_grp != NULL &&
853 			    ill->ill_grp->ig_cast_ill != NULL) {
854 				rw_exit(&ipst->ips_ill_g_lock);
855 				arp_drop_packet("Interface is not nominated "
856 				    "for multicast sends and receives",
857 				    mp, ill);
858 				return;
859 			}
860 			rw_exit(&ipst->ips_ill_g_lock);
861 		}
862 	}
863 	mp1 = mp->b_cont;
864 	if (mp1 == NULL) {
865 		arp_drop_packet("Missing ARP packet", mp, ill);
866 		return;
867 	}
868 	if (mp1->b_cont != NULL) {
869 		/* No fooling around with funny messages. */
870 		if (!pullupmsg(mp1, -1)) {
871 			arp_drop_packet("Funny message: pullup failed",
872 			    mp, ill);
873 			return;
874 		}
875 	}
876 	arh = (arh_t *)mp1->b_rptr;
877 	hlen = arh->arh_hlen;
878 	plen = arh->arh_plen;
879 	if (MBLKL(mp1) < ARH_FIXED_LEN + 2 * hlen + 2 * plen) {
880 		arp_drop_packet("mblk len too small", mp, ill);
881 		return;
882 	}
883 	/*
884 	 * hlen 0 is used for RFC 1868 UnARP.
885 	 *
886 	 * Note that the rest of the code checks that hlen is what we expect
887 	 * for this hardware address type, so might as well discard packets
888 	 * here that don't match.
889 	 */
890 	if ((hlen > 0 && hlen != ill->ill_phys_addr_length) || plen == 0) {
891 		DTRACE_PROBE2(rput_bogus, ill_t *, ill, mblk_t *, mp1);
892 		arp_drop_packet("Bogus hlen or plen", mp, ill);
893 		return;
894 	}
895 	/*
896 	 * Historically, Solaris has been lenient about hardware type numbers.
897 	 * We should check here, but don't.
898 	 */
899 	DTRACE_PROBE3(arp__physical__in__start, ill_t *, ill, arh_t *, arh,
900 	    mblk_t *, mp);
901 	/*
902 	 * If ill is in an ipmp group, it will be the under ill. If we want
903 	 * to report the packet as coming up the IPMP interface, we should
904 	 * convert it to the ipmp ill.
905 	 */
906 	ARP_HOOK_IN(ipst->ips_arp_physical_in_event, ipst->ips_arp_physical_in,
907 	    ill->ill_phyint->phyint_ifindex, arh, mp, mp1, ipst);
908 	DTRACE_PROBE1(arp__physical__in__end, mblk_t *, mp);
909 	if (mp == NULL)
910 		return;
911 	arhp = (uchar_t *)arh + ARH_FIXED_LEN;
912 	src_haddr = arhp;			/* ar$sha */
913 	arhp += hlen;
914 	bcopy(arhp, &src_paddr, IP_ADDR_LEN);	/* ar$spa */
915 	sp = arhp;
916 	arhp += IP_ADDR_LEN;
917 	dst_haddr = arhp;			/* ar$dha */
918 	arhp += hlen;
919 	bcopy(arhp, &dst_paddr, IP_ADDR_LEN);	/* ar$tpa */
920 	dp = arhp;
921 	op = BE16_TO_U16(arh->arh_operation);
922 
923 	DTRACE_PROBE2(ip__arp__input, (in_addr_t), src_paddr,
924 	    (in_addr_t), dst_paddr);
925 
926 	/* Determine if this is just a probe */
927 	is_probe = (src_paddr == INADDR_ANY);
928 
929 	/*
930 	 * ira_ill is the only field used down the arp_notify path.
931 	 */
932 	bzero(&iras, sizeof (iras));
933 	iras.ira_ill = iras.ira_rill = ill;
934 	/*
935 	 * RFC 826: first check if the <protocol, sender protocol address> is
936 	 * in the cache, if there is a sender protocol address.  Note that this
937 	 * step also handles resolutions based on source.
938 	 */
939 	/* Note: after here we need to freeb(mp) and freemsg(mp1) separately */
940 	mp->b_cont = NULL;
941 	if (is_probe) {
942 		err = AR_NOTFOUND;
943 	} else {
944 		if (plen != 4) {
945 			arp_drop_packet("bad protocol len", mp, ill);
946 			return;
947 		}
948 		err = ip_nce_resolve_all(ill, src_haddr, hlen, &src_paddr,
949 		    &src_ncec, op);
950 		switch (err) {
951 		case AR_BOGON:
952 			ASSERT(src_ncec != NULL);
953 			arp_notify(src_paddr, mp1, AR_CN_BOGON,
954 			    &iras, src_ncec);
955 			break;
956 		case AR_FAILED:
957 			arp_notify(src_paddr, mp1, AR_CN_FAILED, &iras,
958 			    src_ncec);
959 			break;
960 		case AR_LOOPBACK:
961 			DTRACE_PROBE2(rput_loopback, ill_t *, ill, arh_t *,
962 			    arh);
963 			freemsg(mp1);
964 			break;
965 		default:
966 			goto update;
967 		}
968 		freemsg(mp);
969 		if (src_ncec != NULL)
970 			ncec_refrele(src_ncec);
971 		return;
972 	}
973 update:
974 	/*
975 	 * Now look up the destination address.  By RFC 826, we ignore the
976 	 * packet at this step if the target isn't one of our addresses (i.e.,
977 	 * one we have been asked to PUBLISH).  This is true even if the
978 	 * target is something we're trying to resolve and the packet
979 	 * is a response.
980 	 */
981 	dst_ncec = ncec_lookup_illgrp_v4(ill, &dst_paddr);
982 	if (dst_ncec == NULL || !NCE_PUBLISH(dst_ncec)) {
983 		/*
984 		 * Let the client know if the source mapping has changed, even
985 		 * if the destination provides no useful information for the
986 		 * client.
987 		 */
988 		if (err == AR_CHANGED) {
989 			arp_notify(src_paddr, mp1, AR_CN_ANNOUNCE, &iras,
990 			    NULL);
991 			freemsg(mp);
992 		} else {
993 			freemsg(mp);
994 			arp_drop_packet("Target is not interesting", mp1, ill);
995 		}
996 		if (dst_ncec != NULL)
997 			ncec_refrele(dst_ncec);
998 		if (src_ncec != NULL)
999 			ncec_refrele(src_ncec);
1000 		return;
1001 	}
1002 
1003 	if (dst_ncec->ncec_flags & NCE_F_UNVERIFIED) {
1004 		/*
1005 		 * Check for a reflection.  Some misbehaving bridges will
1006 		 * reflect our own transmitted packets back to us.
1007 		 */
1008 		ASSERT(NCE_PUBLISH(dst_ncec));
1009 		if (hlen != dst_ncec->ncec_ill->ill_phys_addr_length) {
1010 			ncec_refrele(dst_ncec);
1011 			if (src_ncec != NULL)
1012 				ncec_refrele(src_ncec);
1013 			freemsg(mp);
1014 			arp_drop_packet("bad arh_len", mp1, ill);
1015 			return;
1016 		}
1017 		if (!nce_cmp_ll_addr(dst_ncec, src_haddr, hlen)) {
1018 			DTRACE_PROBE3(rput_probe_reflected, ill_t *, ill,
1019 			    arh_t *, arh, ncec_t *, dst_ncec);
1020 			ncec_refrele(dst_ncec);
1021 			if (src_ncec != NULL)
1022 				ncec_refrele(src_ncec);
1023 			freemsg(mp);
1024 			arp_drop_packet("Reflected probe", mp1, ill);
1025 			return;
1026 		}
1027 		/*
1028 		 * Responses targeting our HW address that are not responses to
1029 		 * our DAD probe must be ignored as they are related to requests
1030 		 * sent before DAD was restarted.
1031 		 */
1032 		if (op == ARP_RESPONSE &&
1033 		    (nce_cmp_ll_addr(dst_ncec, dst_haddr, hlen) == 0)) {
1034 			ncec_refrele(dst_ncec);
1035 			if (src_ncec != NULL)
1036 				ncec_refrele(src_ncec);
1037 			freemsg(mp);
1038 			arp_drop_packet(
1039 			    "Response to request that was sent before DAD",
1040 			    mp1, ill);
1041 			return;
1042 		}
1043 		/*
1044 		 * Responses targeted to HW addresses which are not ours but
1045 		 * sent to our unverified proto address are also conflicts.
1046 		 * These may be reported by a proxy rather than the interface
1047 		 * with the conflicting address, dst_paddr is in conflict
1048 		 * rather than src_paddr. To ensure IP can locate the correct
1049 		 * ipif to take down, it is necessary to copy dst_paddr to
1050 		 * the src_paddr field before sending it to IP. The same is
1051 		 * required for probes, where src_paddr will be INADDR_ANY.
1052 		 */
1053 		if (is_probe || op == ARP_RESPONSE) {
1054 			bcopy(dp, sp, plen);
1055 			arp_notify(src_paddr, mp1, AR_CN_FAILED, &iras,
1056 			    NULL);
1057 			ncec_delete(dst_ncec);
1058 		} else if (err == AR_CHANGED) {
1059 			arp_notify(src_paddr, mp1, AR_CN_ANNOUNCE, &iras,
1060 			    NULL);
1061 		} else {
1062 			DTRACE_PROBE3(rput_request_unverified,
1063 			    ill_t *, ill, arh_t *, arh, ncec_t *, dst_ncec);
1064 			arp_drop_packet("Unverified request", mp1, ill);
1065 		}
1066 		freemsg(mp);
1067 		ncec_refrele(dst_ncec);
1068 		if (src_ncec != NULL)
1069 			ncec_refrele(src_ncec);
1070 		return;
1071 	}
1072 	/*
1073 	 * If it's a request, then we reply to this, and if we think the
1074 	 * sender's unknown, then we create an entry to avoid unnecessary ARPs.
1075 	 * The design assumption is that someone ARPing us is likely to send us
1076 	 * a packet soon, and that we'll want to reply to it.
1077 	 */
1078 	if (op == ARP_REQUEST) {
1079 		const uchar_t *nce_hwaddr;
1080 		struct in_addr nce_paddr;
1081 		clock_t now;
1082 		ill_t *under_ill = ill;
1083 		boolean_t send_unicast = B_TRUE;
1084 
1085 		ASSERT(NCE_PUBLISH(dst_ncec));
1086 
1087 		if ((dst_ncec->ncec_flags & (NCE_F_BCAST|NCE_F_MCAST)) != 0) {
1088 			/*
1089 			 * Ignore senders who are deliberately or accidentally
1090 			 * confused.
1091 			 */
1092 			goto bail;
1093 		}
1094 
1095 		if (!is_probe && err == AR_NOTFOUND) {
1096 			ASSERT(src_ncec == NULL);
1097 
1098 			if (IS_UNDER_IPMP(under_ill)) {
1099 				/*
1100 				 * create the ncec for the sender on ipmp_ill.
1101 				 * We pass in the ipmp_ill itself to avoid
1102 				 * creating an nce_t on the under_ill.
1103 				 */
1104 				ill = ipmp_ill_hold_ipmp_ill(under_ill);
1105 				if (ill == NULL)
1106 					ill = under_ill;
1107 				else
1108 					need_ill_refrele = B_TRUE;
1109 			}
1110 
1111 			err = nce_lookup_then_add_v4(ill, src_haddr, hlen,
1112 			    &src_paddr, 0, ND_STALE, &nce);
1113 
1114 			switch (err) {
1115 			case 0:
1116 			case EEXIST:
1117 				ip1dbg(("added ncec %p in state %d ill %s\n",
1118 				    (void *)src_ncec, src_ncec->ncec_state,
1119 				    ill->ill_name));
1120 				src_ncec = nce->nce_common;
1121 				break;
1122 			default:
1123 				/*
1124 				 * Either no memory, or the outgoing interface
1125 				 * is in the process of down/unplumb. In the
1126 				 * latter case, we will fail the send anyway,
1127 				 * and in the former case, we should try to send
1128 				 * the ARP response.
1129 				 */
1130 				src_lladdr = src_haddr;
1131 				goto send_response;
1132 			}
1133 			ncec_refhold(src_ncec);
1134 			nce_refrele(nce);
1135 			/* set up cleanup interval on ncec */
1136 		}
1137 
1138 		/*
1139 		 * This implements periodic address defense based on a modified
1140 		 * version of the RFC 3927 requirements.  Instead of sending a
1141 		 * broadcasted reply every time, as demanded by the RFC, we
1142 		 * send at most one broadcast reply per arp_broadcast_interval.
1143 		 */
1144 		now = ddi_get_lbolt();
1145 		if ((now - dst_ncec->ncec_last_time_defended) >
1146 		    MSEC_TO_TICK(ipst->ips_ipv4_dad_announce_interval)) {
1147 			dst_ncec->ncec_last_time_defended = now;
1148 			/*
1149 			 * If this is one of the long-suffering entries,
1150 			 * pull it out now.  It no longer needs separate
1151 			 * defense, because we're now doing that with this
1152 			 * broadcasted reply.
1153 			 */
1154 			dst_ncec->ncec_flags &= ~NCE_F_DELAYED;
1155 			send_unicast = B_FALSE;
1156 		}
1157 		if (src_ncec != NULL && send_unicast) {
1158 			src_lladdr = src_ncec->ncec_lladdr;
1159 		} else {
1160 			src_lladdr = under_ill->ill_bcast_mp->b_rptr +
1161 			    NCE_LL_ADDR_OFFSET(under_ill);
1162 		}
1163 send_response:
1164 		nce_hwaddr = dst_ncec->ncec_lladdr;
1165 		IN6_V4MAPPED_TO_INADDR(&dst_ncec->ncec_addr, &nce_paddr);
1166 
1167 		(void) arp_output(under_ill, ARP_RESPONSE,
1168 		    nce_hwaddr, (uchar_t *)&nce_paddr, src_haddr,
1169 		    (uchar_t *)&src_paddr, src_lladdr);
1170 	}
1171 bail:
1172 	if (dst_ncec != NULL) {
1173 		ncec_refrele(dst_ncec);
1174 	}
1175 	if (src_ncec != NULL) {
1176 		ncec_refrele(src_ncec);
1177 	}
1178 	if (err == AR_CHANGED) {
1179 		mp->b_cont = NULL;
1180 		arp_notify(src_paddr, mp1, AR_CN_ANNOUNCE, &iras, NULL);
1181 		mp1 = NULL;
1182 	}
1183 	if (need_ill_refrele)
1184 		ill_refrele(ill);
1185 done:
1186 	freemsg(mp);
1187 	freemsg(mp1);
1188 }
1189 
1190 /*
1191  * Basic initialization of the arl_t and the arl_common structure shared with
1192  * the ill_t that is done after SLIFNAME/IF_UNITSEL.
1193  */
1194 static int
1195 arl_ill_init(arl_t *arl, char *ill_name)
1196 {
1197 	ill_t *ill;
1198 	arl_ill_common_t *ai;
1199 
1200 	ill = ill_lookup_on_name(ill_name, B_FALSE, B_FALSE, B_FALSE,
1201 	    arl->arl_ipst);
1202 
1203 	if (ill == NULL)
1204 		return (ENXIO);
1205 
1206 	/*
1207 	 * By the time we set up the arl, we expect the ETHERTYPE_IP
1208 	 * stream to be fully bound and attached. So we copy/verify
1209 	 * relevant information as possible from/against the ill.
1210 	 *
1211 	 * The following should have been set up in arp_ll_set_defaults()
1212 	 * after the first DL_INFO_ACK was received.
1213 	 */
1214 	ASSERT(arl->arl_phys_addr_length == ill->ill_phys_addr_length);
1215 	ASSERT(arl->arl_sap == ETHERTYPE_ARP);
1216 	ASSERT(arl->arl_mactype == ill->ill_mactype);
1217 	ASSERT(arl->arl_sap_length == ill->ill_sap_length);
1218 
1219 	ai =  kmem_zalloc(sizeof (*ai), KM_SLEEP);
1220 	mutex_enter(&ill->ill_lock);
1221 	/* First ensure that the ill is not CONDEMNED.  */
1222 	if (ill->ill_state_flags & ILL_CONDEMNED) {
1223 		mutex_exit(&ill->ill_lock);
1224 		ill_refrele(ill);
1225 		kmem_free(ai, sizeof (*ai));
1226 		return (ENXIO);
1227 	}
1228 	if (ill->ill_common != NULL || arl->arl_common != NULL) {
1229 		mutex_exit(&ill->ill_lock);
1230 		ip0dbg(("%s: PPA already exists", ill->ill_name));
1231 		ill_refrele(ill);
1232 		kmem_free(ai, sizeof (*ai));
1233 		return (EEXIST);
1234 	}
1235 	mutex_init(&ai->ai_lock, NULL, MUTEX_DEFAULT, NULL);
1236 	ai->ai_arl = arl;
1237 	ai->ai_ill = ill;
1238 	ill->ill_common = ai;
1239 	arl->arl_common = ai;
1240 	mutex_exit(&ill->ill_lock);
1241 	(void) strlcpy(arl->arl_name, ill->ill_name, LIFNAMSIZ);
1242 	arl->arl_name_length = ill->ill_name_length;
1243 	ill_refrele(ill);
1244 	arp_ifname_notify(arl);
1245 	return (0);
1246 }
1247 
1248 /* Allocate and do common initializations for DLPI messages. */
1249 static mblk_t *
1250 ip_ar_dlpi_comm(t_uscalar_t prim, size_t size)
1251 {
1252 	mblk_t  *mp;
1253 
1254 	if ((mp = allocb(size, BPRI_HI)) == NULL)
1255 		return (NULL);
1256 
1257 	/*
1258 	 * DLPIv2 says that DL_INFO_REQ and DL_TOKEN_REQ (the latter
1259 	 * of which we don't seem to use) are sent with M_PCPROTO, and
1260 	 * that other DLPI are M_PROTO.
1261 	 */
1262 	DB_TYPE(mp) = (prim == DL_INFO_REQ) ? M_PCPROTO : M_PROTO;
1263 
1264 	mp->b_wptr = mp->b_rptr + size;
1265 	bzero(mp->b_rptr, size);
1266 	DL_PRIM(mp) = prim;
1267 	return (mp);
1268 }
1269 
1270 
1271 int
1272 ip_sioctl_ifunitsel_arp(queue_t *q, int *ppa)
1273 {
1274 	arl_t *arl;
1275 	char *cp, ill_name[LIFNAMSIZ];
1276 
1277 	if (q->q_next == NULL)
1278 		return (EINVAL);
1279 
1280 	do {
1281 		q = q->q_next;
1282 	} while (q->q_next != NULL);
1283 	cp = q->q_qinfo->qi_minfo->mi_idname;
1284 
1285 	arl = (arl_t *)q->q_ptr;
1286 	(void) snprintf(ill_name, sizeof (ill_name), "%s%d", cp, *ppa);
1287 	arl->arl_ppa = *ppa;
1288 	return (arl_ill_init(arl, ill_name));
1289 }
1290 
1291 int
1292 ip_sioctl_slifname_arp(queue_t *q, void *lifreq)
1293 {
1294 	arl_t *arl;
1295 	struct lifreq *lifr = lifreq;
1296 
1297 	/* ioctl not valid when IP opened as a device */
1298 	if (q->q_next == NULL)
1299 		return (EINVAL);
1300 
1301 	arl = (arl_t *)q->q_ptr;
1302 	arl->arl_ppa = lifr->lifr_ppa;
1303 	return (arl_ill_init(arl, lifr->lifr_name));
1304 }
1305 
1306 arl_t *
1307 ill_to_arl(ill_t *ill)
1308 {
1309 	arl_ill_common_t *ai = ill->ill_common;
1310 	arl_t *arl = NULL;
1311 
1312 	if (ai == NULL)
1313 		return (NULL);
1314 	/*
1315 	 * Find the arl_t that corresponds to this ill_t from the shared
1316 	 * ill_common structure. We can safely access the ai here as it
1317 	 * will only be freed in arp_modclose() after we have become
1318 	 * single-threaded.
1319 	 */
1320 	mutex_enter(&ai->ai_lock);
1321 	if ((arl = ai->ai_arl) != NULL) {
1322 		mutex_enter(&arl->arl_lock);
1323 		if (!(arl->arl_state_flags & ARL_CONDEMNED)) {
1324 			arl_refhold_locked(arl);
1325 			mutex_exit(&arl->arl_lock);
1326 		} else {
1327 			mutex_exit(&arl->arl_lock);
1328 			arl = NULL;
1329 		}
1330 	}
1331 	mutex_exit(&ai->ai_lock);
1332 	return (arl);
1333 }
1334 
1335 ill_t *
1336 arl_to_ill(arl_t *arl)
1337 {
1338 	arl_ill_common_t *ai = arl->arl_common;
1339 	ill_t *ill = NULL;
1340 
1341 	if (ai == NULL) {
1342 		/*
1343 		 * happens when the arp stream is just being opened, and
1344 		 * arl_ill_init has not been executed yet.
1345 		 */
1346 		return (NULL);
1347 	}
1348 	/*
1349 	 * Find the ill_t that corresponds to this arl_t from the shared
1350 	 * arl_common structure. We can safely access the ai here as it
1351 	 * will only be freed in arp_modclose() after we have become
1352 	 * single-threaded.
1353 	 */
1354 	mutex_enter(&ai->ai_lock);
1355 	if ((ill = ai->ai_ill) != NULL) {
1356 		mutex_enter(&ill->ill_lock);
1357 		if (!ILL_IS_CONDEMNED(ill)) {
1358 			ill_refhold_locked(ill);
1359 			mutex_exit(&ill->ill_lock);
1360 		} else {
1361 			mutex_exit(&ill->ill_lock);
1362 			ill = NULL;
1363 		}
1364 	}
1365 	mutex_exit(&ai->ai_lock);
1366 	return (ill);
1367 }
1368 
1369 int
1370 arp_ll_up(ill_t *ill)
1371 {
1372 	mblk_t	*attach_mp = NULL;
1373 	mblk_t	*bind_mp = NULL;
1374 	mblk_t	*unbind_mp = NULL;
1375 	arl_t 	*arl;
1376 
1377 	ASSERT(IAM_WRITER_ILL(ill));
1378 	arl = ill_to_arl(ill);
1379 
1380 	DTRACE_PROBE2(ill__downup, char *, "arp_ll_up", ill_t *, ill);
1381 	if (arl == NULL)
1382 		return (ENXIO);
1383 	DTRACE_PROBE2(arl__downup, char *, "arp_ll_up", arl_t *, arl);
1384 	if ((arl->arl_state_flags & ARL_LL_UP) != 0) {
1385 		arl_refrele(arl);
1386 		return (0);
1387 	}
1388 	if (arl->arl_needs_attach) { /* DL_STYLE2 */
1389 		attach_mp =
1390 		    ip_ar_dlpi_comm(DL_ATTACH_REQ, sizeof (dl_attach_req_t));
1391 		if (attach_mp == NULL)
1392 			goto bad;
1393 		((dl_attach_req_t *)attach_mp->b_rptr)->dl_ppa = arl->arl_ppa;
1394 	}
1395 
1396 	/* Allocate and initialize a bind message. */
1397 	bind_mp = ip_ar_dlpi_comm(DL_BIND_REQ, sizeof (dl_bind_req_t));
1398 	if (bind_mp == NULL)
1399 		goto bad;
1400 	((dl_bind_req_t *)bind_mp->b_rptr)->dl_sap = ETHERTYPE_ARP;
1401 	((dl_bind_req_t *)bind_mp->b_rptr)->dl_service_mode = DL_CLDLS;
1402 
1403 	unbind_mp = ip_ar_dlpi_comm(DL_UNBIND_REQ, sizeof (dl_unbind_req_t));
1404 	if (unbind_mp == NULL)
1405 		goto bad;
1406 	if (arl->arl_needs_attach) {
1407 		arp_dlpi_send(arl, attach_mp);
1408 	}
1409 	arl->arl_unbind_mp = unbind_mp;
1410 
1411 	arl->arl_state_flags |= ARL_LL_BIND_PENDING;
1412 	arp_dlpi_send(arl, bind_mp);
1413 	arl_refrele(arl);
1414 	return (EINPROGRESS);
1415 
1416 bad:
1417 	freemsg(attach_mp);
1418 	freemsg(bind_mp);
1419 	freemsg(unbind_mp);
1420 	arl_refrele(arl);
1421 	return (ENOMEM);
1422 }
1423 
1424 /*
1425  * consumes/frees mp
1426  */
1427 static void
1428 arp_notify(in_addr_t src, mblk_t *mp, uint32_t arcn_code,
1429     ip_recv_attr_t *ira, ncec_t *ncec)
1430 {
1431 	char		hbuf[MAC_STR_LEN];
1432 	char		sbuf[INET_ADDRSTRLEN];
1433 	ill_t		*ill = ira->ira_ill;
1434 	ip_stack_t	*ipst = ill->ill_ipst;
1435 	arh_t		*arh = (arh_t *)mp->b_rptr;
1436 
1437 	switch (arcn_code) {
1438 	case AR_CN_BOGON:
1439 		/*
1440 		 * Someone is sending ARP packets with a source protocol
1441 		 * address that we have published and for which we believe our
1442 		 * entry is authoritative and verified to be unique on
1443 		 * the network.
1444 		 *
1445 		 * arp_process_packet() sends AR_CN_FAILED for the case when
1446 		 * a DAD probe is received and the hardware address of a
1447 		 * non-authoritative entry has changed. Thus, AR_CN_BOGON
1448 		 * indicates a real conflict, and we have to do resolution.
1449 		 *
1450 		 * We back away quickly from the address if it's from DHCP or
1451 		 * otherwise temporary and hasn't been used recently (or at
1452 		 * all).  We'd like to include "deprecated" addresses here as
1453 		 * well (as there's no real reason to defend something we're
1454 		 * discarding), but IPMP "reuses" this flag to mean something
1455 		 * other than the standard meaning.
1456 		 */
1457 		if (ip_nce_conflict(mp, ira, ncec)) {
1458 			(void) mac_colon_addr((uint8_t *)(arh + 1),
1459 			    arh->arh_hlen, hbuf, sizeof (hbuf));
1460 			(void) ip_dot_addr(src, sbuf);
1461 			cmn_err(CE_WARN,
1462 			    "proxy ARP problem?  Node '%s' is using %s on %s",
1463 			    hbuf, sbuf, ill->ill_name);
1464 			if (!arp_no_defense)
1465 				(void) arp_announce(ncec);
1466 			/*
1467 			 * ncec_last_time_defended has been adjusted in
1468 			 * ip_nce_conflict.
1469 			 */
1470 		} else {
1471 			ncec_delete(ncec);
1472 		}
1473 		freemsg(mp);
1474 		break;
1475 	case AR_CN_ANNOUNCE: {
1476 		nce_hw_map_t hwm;
1477 		/*
1478 		 * ARP gives us a copy of any packet where it thinks
1479 		 * the address has changed, so that we can update our
1480 		 * caches.  We're responsible for caching known answers
1481 		 * in the current design.  We check whether the
1482 		 * hardware address really has changed in all of our
1483 		 * entries that have cached this mapping, and if so, we
1484 		 * blow them away.  This way we will immediately pick
1485 		 * up the rare case of a host changing hardware
1486 		 * address.
1487 		 */
1488 		if (src == 0) {
1489 			freemsg(mp);
1490 			break;
1491 		}
1492 		hwm.hwm_addr = src;
1493 		hwm.hwm_hwlen = arh->arh_hlen;
1494 		hwm.hwm_hwaddr = (uchar_t *)(arh + 1);
1495 		hwm.hwm_flags = 0;
1496 		ncec_walk_common(ipst->ips_ndp4, NULL,
1497 		    (pfi_t)nce_update_hw_changed, &hwm, B_TRUE);
1498 		freemsg(mp);
1499 		break;
1500 	}
1501 	case AR_CN_FAILED:
1502 		if (arp_no_defense) {
1503 			(void) mac_colon_addr((uint8_t *)(arh + 1),
1504 			    arh->arh_hlen, hbuf, sizeof (hbuf));
1505 			(void) ip_dot_addr(src, sbuf);
1506 
1507 			cmn_err(CE_WARN,
1508 			    "node %s is using our IP address %s on %s",
1509 			    hbuf, sbuf, ill->ill_name);
1510 			freemsg(mp);
1511 			break;
1512 		}
1513 		/*
1514 		 * mp will be freed by arp_excl.
1515 		 */
1516 		ill_refhold(ill);
1517 		qwriter_ip(ill, ill->ill_rq, mp, arp_excl, NEW_OP, B_FALSE);
1518 		return;
1519 	default:
1520 		ASSERT(0);
1521 		freemsg(mp);
1522 		break;
1523 	}
1524 }
1525 
1526 /*
1527  * arp_output is called to transmit an ARP Request or Response. The mapping
1528  * to RFC 826 variables is:
1529  *   haddr1 == ar$sha
1530  *   paddr1 == ar$spa
1531  *   haddr2 == ar$tha
1532  *   paddr2 == ar$tpa
1533  * The ARP frame is sent to the ether_dst in dst_lladdr.
1534  */
1535 static int
1536 arp_output(ill_t *ill, uint32_t operation,
1537     const uchar_t *haddr1, const uchar_t *paddr1, const uchar_t *haddr2,
1538     const uchar_t *paddr2, uchar_t *dst_lladdr)
1539 {
1540 	arh_t	*arh;
1541 	uint8_t	*cp;
1542 	uint_t	hlen;
1543 	uint32_t plen = IPV4_ADDR_LEN; /* ar$pln from RFC 826 */
1544 	uint32_t proto = IP_ARP_PROTO_TYPE;
1545 	mblk_t *mp;
1546 	arl_t *arl;
1547 
1548 	ASSERT(dst_lladdr != NULL);
1549 	hlen = ill->ill_phys_addr_length; /* ar$hln from RFC 826 */
1550 	mp = ill_dlur_gen(dst_lladdr, hlen, ETHERTYPE_ARP, ill->ill_sap_length);
1551 
1552 	if (mp == NULL)
1553 		return (ENOMEM);
1554 
1555 	/* IFF_NOARP flag is set or link down: do not send arp messages */
1556 	if ((ill->ill_flags & ILLF_NOARP) || !ill->ill_dl_up) {
1557 		freemsg(mp);
1558 		return (ENXIO);
1559 	}
1560 
1561 	mp->b_cont = allocb(AR_LL_HDR_SLACK + ARH_FIXED_LEN + (hlen * 4) +
1562 	    plen + plen, BPRI_MED);
1563 	if (mp->b_cont == NULL) {
1564 		freeb(mp);
1565 		return (ENOMEM);
1566 	}
1567 
1568 	/* Fill in the ARP header. */
1569 	cp = mp->b_cont->b_rptr + (AR_LL_HDR_SLACK + hlen + hlen);
1570 	mp->b_cont->b_rptr = cp;
1571 	arh = (arh_t *)cp;
1572 	U16_TO_BE16(arp_hw_type(ill->ill_mactype), arh->arh_hardware);
1573 	U16_TO_BE16(proto, arh->arh_proto);
1574 	arh->arh_hlen = (uint8_t)hlen;
1575 	arh->arh_plen = (uint8_t)plen;
1576 	U16_TO_BE16(operation, arh->arh_operation);
1577 	cp += ARH_FIXED_LEN;
1578 	bcopy(haddr1, cp, hlen);
1579 	cp += hlen;
1580 	if (paddr1 == NULL)
1581 		bzero(cp, plen);
1582 	else
1583 		bcopy(paddr1, cp, plen);
1584 	cp += plen;
1585 	if (haddr2 == NULL)
1586 		bzero(cp, hlen);
1587 	else
1588 		bcopy(haddr2, cp, hlen);
1589 	cp += hlen;
1590 	bcopy(paddr2, cp, plen);
1591 	cp += plen;
1592 	mp->b_cont->b_wptr = cp;
1593 
1594 	DTRACE_PROBE3(arp__physical__out__start,
1595 	    ill_t *, ill, arh_t *, arh, mblk_t *, mp);
1596 	ARP_HOOK_OUT(ill->ill_ipst->ips_arp_physical_out_event,
1597 	    ill->ill_ipst->ips_arp_physical_out,
1598 	    ill->ill_phyint->phyint_ifindex, arh, mp, mp->b_cont,
1599 	    ill->ill_ipst);
1600 	DTRACE_PROBE1(arp__physical__out__end, mblk_t *, mp);
1601 	if (mp == NULL)
1602 		return (0);
1603 
1604 	/* Ship it out. */
1605 	arl = ill_to_arl(ill);
1606 	if (arl == NULL) {
1607 		freemsg(mp);
1608 		return (0);
1609 	}
1610 	if (canputnext(arl->arl_wq))
1611 		putnext(arl->arl_wq, mp);
1612 	else
1613 		freemsg(mp);
1614 	arl_refrele(arl);
1615 	return (0);
1616 }
1617 
1618 /*
1619  * Process resolve requests.
1620  * If we are not yet reachable then we check and decrease ncec_rcnt; otherwise
1621  * we leave it alone (the caller will check and manage ncec_pcnt in those
1622  * cases.)
1623  */
1624 int
1625 arp_request(ncec_t *ncec, in_addr_t sender, ill_t *ill)
1626 {
1627 	int err;
1628 	const uchar_t *target_hwaddr;
1629 	struct in_addr nce_paddr;
1630 	uchar_t *dst_lladdr;
1631 	boolean_t use_rcnt = !NCE_ISREACHABLE(ncec);
1632 
1633 	ASSERT(MUTEX_HELD(&ncec->ncec_lock));
1634 	ASSERT(!IS_IPMP(ill));
1635 
1636 	if (use_rcnt && ncec->ncec_rcnt == 0) {
1637 		/* not allowed any more retransmits. */
1638 		return (0);
1639 	}
1640 
1641 	if ((ill->ill_flags & ILLF_NOARP) != 0)
1642 		return (0);
1643 
1644 	IN6_V4MAPPED_TO_INADDR(&ncec->ncec_addr, &nce_paddr);
1645 
1646 	target_hwaddr =
1647 	    ill->ill_bcast_mp->b_rptr + NCE_LL_ADDR_OFFSET(ill);
1648 
1649 	if (NCE_ISREACHABLE(ncec)) {
1650 		dst_lladdr =  ncec->ncec_lladdr;
1651 	} else {
1652 		dst_lladdr =  ill->ill_bcast_mp->b_rptr +
1653 		    NCE_LL_ADDR_OFFSET(ill);
1654 	}
1655 
1656 	mutex_exit(&ncec->ncec_lock);
1657 	err = arp_output(ill, ARP_REQUEST,
1658 	    ill->ill_phys_addr, (uchar_t *)&sender, target_hwaddr,
1659 	    (uchar_t *)&nce_paddr, dst_lladdr);
1660 	mutex_enter(&ncec->ncec_lock);
1661 
1662 	if (err != 0) {
1663 		/*
1664 		 * Some transient error such as ENOMEM or a down link was
1665 		 * encountered. If the link has been taken down permanently,
1666 		 * the ncec will eventually be cleaned up (ipif_down_tail()
1667 		 * will call ipif_nce_down() and flush the ncec), to terminate
1668 		 * recurring attempts to send ARP requests. In all other cases,
1669 		 * allow the caller another chance at success next time.
1670 		 */
1671 		return (ncec->ncec_ill->ill_reachable_retrans_time);
1672 	}
1673 
1674 	if (use_rcnt)
1675 		ncec->ncec_rcnt--;
1676 
1677 	return (ncec->ncec_ill->ill_reachable_retrans_time);
1678 }
1679 
1680 /* return B_TRUE if dropped */
1681 boolean_t
1682 arp_announce(ncec_t *ncec)
1683 {
1684 	ill_t *ill;
1685 	int err;
1686 	uchar_t *sphys_addr, *bcast_addr;
1687 	struct in_addr ncec_addr;
1688 	boolean_t need_refrele = B_FALSE;
1689 
1690 	ASSERT((ncec->ncec_flags & NCE_F_BCAST) == 0);
1691 	ASSERT((ncec->ncec_flags & NCE_F_MCAST) == 0);
1692 
1693 	if (IS_IPMP(ncec->ncec_ill)) {
1694 		/* sent on the cast_ill */
1695 		ill = ipmp_ill_get_xmit_ill(ncec->ncec_ill, B_FALSE);
1696 		if (ill == NULL)
1697 			return (B_TRUE);
1698 		need_refrele = B_TRUE;
1699 	} else {
1700 		ill = ncec->ncec_ill;
1701 	}
1702 
1703 	/*
1704 	 * broadcast an announce to ill_bcast address.
1705 	 */
1706 	IN6_V4MAPPED_TO_INADDR(&ncec->ncec_addr, &ncec_addr);
1707 
1708 	sphys_addr = ncec->ncec_lladdr;
1709 	bcast_addr = ill->ill_bcast_mp->b_rptr + NCE_LL_ADDR_OFFSET(ill);
1710 
1711 	err = arp_output(ill, ARP_REQUEST,
1712 	    sphys_addr, (uchar_t *)&ncec_addr, bcast_addr,
1713 	    (uchar_t *)&ncec_addr, bcast_addr);
1714 
1715 	if (need_refrele)
1716 		ill_refrele(ill);
1717 	return (err != 0);
1718 }
1719 
1720 /* return B_TRUE if dropped */
1721 boolean_t
1722 arp_probe(ncec_t *ncec)
1723 {
1724 	ill_t *ill;
1725 	int err;
1726 	struct in_addr ncec_addr;
1727 	uchar_t *sphys_addr, *dst_lladdr;
1728 
1729 	if (IS_IPMP(ncec->ncec_ill)) {
1730 		ill = ipmp_ill_get_xmit_ill(ncec->ncec_ill, B_FALSE);
1731 		if (ill == NULL)
1732 			return (B_TRUE);
1733 	} else {
1734 		ill = ncec->ncec_ill;
1735 	}
1736 
1737 	IN6_V4MAPPED_TO_INADDR(&ncec->ncec_addr, &ncec_addr);
1738 
1739 	sphys_addr = ncec->ncec_lladdr;
1740 	dst_lladdr = ill->ill_bcast_mp->b_rptr + NCE_LL_ADDR_OFFSET(ill);
1741 	err = arp_output(ill, ARP_REQUEST,
1742 	    sphys_addr, NULL, NULL, (uchar_t *)&ncec_addr, dst_lladdr);
1743 
1744 	if (IS_IPMP(ncec->ncec_ill))
1745 		ill_refrele(ill);
1746 	return (err != 0);
1747 }
1748 
1749 static mblk_t *
1750 arl_unbind(arl_t *arl)
1751 {
1752 	mblk_t *mp;
1753 
1754 	if ((mp = arl->arl_unbind_mp) != NULL) {
1755 		arl->arl_unbind_mp = NULL;
1756 		arl->arl_state_flags |= ARL_DL_UNBIND_IN_PROGRESS;
1757 	}
1758 	return (mp);
1759 }
1760 
1761 int
1762 arp_ll_down(ill_t *ill)
1763 {
1764 	arl_t 	*arl;
1765 	mblk_t *unbind_mp;
1766 	int err = 0;
1767 	boolean_t replumb = (ill->ill_replumbing == 1);
1768 
1769 	DTRACE_PROBE2(ill__downup, char *, "arp_ll_down", ill_t *, ill);
1770 	if ((arl = ill_to_arl(ill)) == NULL)
1771 		return (ENXIO);
1772 	DTRACE_PROBE2(arl__downup, char *, "arp_ll_down", arl_t *, arl);
1773 	mutex_enter(&arl->arl_lock);
1774 	unbind_mp = arl_unbind(arl);
1775 	if (unbind_mp != NULL) {
1776 		ASSERT(arl->arl_state_flags & ARL_DL_UNBIND_IN_PROGRESS);
1777 		DTRACE_PROBE2(arp__unbinding, mblk_t *, unbind_mp,
1778 		    arl_t *, arl);
1779 		err = EINPROGRESS;
1780 		if (replumb)
1781 			arl->arl_state_flags |= ARL_LL_REPLUMBING;
1782 	}
1783 	mutex_exit(&arl->arl_lock);
1784 	if (unbind_mp != NULL)
1785 		arp_dlpi_send(arl, unbind_mp);
1786 	arl_refrele(arl);
1787 	return (err);
1788 }
1789 
1790 /* ARGSUSED */
1791 int
1792 arp_close(queue_t *q, int flags)
1793 {
1794 	if (WR(q)->q_next != NULL) {
1795 		/* This is a module close */
1796 		return (arp_modclose(q->q_ptr));
1797 	}
1798 	qprocsoff(q);
1799 	q->q_ptr = WR(q)->q_ptr = NULL;
1800 	return (0);
1801 }
1802 
1803 static int
1804 arp_modclose(arl_t *arl)
1805 {
1806 	arl_ill_common_t *ai = arl->arl_common;
1807 	ill_t		*ill;
1808 	queue_t		*q = arl->arl_rq;
1809 	mblk_t		*mp, *nextmp;
1810 	ipsq_t		*ipsq = NULL;
1811 
1812 	ill = arl_to_ill(arl);
1813 	if (ill != NULL) {
1814 		if (!ill_waiter_inc(ill)) {
1815 			ill_refrele(ill);
1816 		} else {
1817 			ill_refrele(ill);
1818 			if (ipsq_enter(ill, B_FALSE, NEW_OP))
1819 				ipsq = ill->ill_phyint->phyint_ipsq;
1820 			ill_waiter_dcr(ill);
1821 		}
1822 		if (ipsq == NULL) {
1823 			/*
1824 			 * could not enter the ipsq because ill is already
1825 			 * marked CONDEMNED.
1826 			 */
1827 			ill = NULL;
1828 		}
1829 	}
1830 	if (ai != NULL && ipsq == NULL) {
1831 		/*
1832 		 * Either we did not get an ill because it was marked CONDEMNED
1833 		 * or we could not enter the ipsq because it was unplumbing.
1834 		 * In both cases, wait for the ill to complete ip_modclose().
1835 		 *
1836 		 * If the arp_modclose happened even before SLIFNAME, the ai
1837 		 * itself would be NULL, in which case we can complete the close
1838 		 * without waiting.
1839 		 */
1840 		mutex_enter(&ai->ai_lock);
1841 		while (ai->ai_ill != NULL)
1842 			cv_wait(&ai->ai_ill_unplumb_done, &ai->ai_lock);
1843 		mutex_exit(&ai->ai_lock);
1844 	}
1845 	ASSERT(ill == NULL || IAM_WRITER_ILL(ill));
1846 
1847 	mutex_enter(&arl->arl_lock);
1848 	/*
1849 	 * If the ill had completed unplumbing before arp_modclose(), there
1850 	 * would be no ill (and therefore, no ipsq) to serialize arp_modclose()
1851 	 * so that we need to explicitly check for ARL_CONDEMNED and back off
1852 	 * if it is set.
1853 	 */
1854 	if ((arl->arl_state_flags & ARL_CONDEMNED) != 0) {
1855 		mutex_exit(&arl->arl_lock);
1856 		ASSERT(ipsq == NULL);
1857 		return (0);
1858 	}
1859 	arl->arl_state_flags |= ARL_CONDEMNED;
1860 
1861 	/*
1862 	 * send out all pending dlpi messages, don't wait for the ack (which
1863 	 * will be ignored in arp_rput when CONDEMNED is set)
1864 	 *
1865 	 * We have to check for pending DL_UNBIND_REQ because, in the case
1866 	 * that ip_modclose() executed before arp_modclose(), the call to
1867 	 * ill_delete_tail->ipif_arp_down() would have triggered a
1868 	 * DL_UNBIND_REQ. When arp_modclose() executes ipsq_enter() will fail
1869 	 * (since ip_modclose() is in the ipsq) but the DL_UNBIND_ACK may not
1870 	 * have been processed yet. In this scenario, we cannot reset
1871 	 * arl_dlpi_pending, because the setting/clearing of arl_state_flags
1872 	 * related to unbind, and the associated cv_waits must be allowed to
1873 	 * continue.
1874 	 */
1875 	if (arl->arl_dlpi_pending != DL_UNBIND_REQ)
1876 		arl->arl_dlpi_pending = DL_PRIM_INVAL;
1877 	mp = arl->arl_dlpi_deferred;
1878 	arl->arl_dlpi_deferred = NULL;
1879 	mutex_exit(&arl->arl_lock);
1880 
1881 	for (; mp != NULL; mp = nextmp) {
1882 		nextmp = mp->b_next;
1883 		mp->b_next = NULL;
1884 		putnext(arl->arl_wq, mp);
1885 	}
1886 
1887 	/* Wait for data paths to quiesce */
1888 	mutex_enter(&arl->arl_lock);
1889 	while (arl->arl_refcnt != 0)
1890 		cv_wait(&arl->arl_cv, &arl->arl_lock);
1891 
1892 	/*
1893 	 * unbind, so that nothing else can come up from driver.
1894 	 */
1895 	mp = arl_unbind(arl);
1896 	mutex_exit(&arl->arl_lock);
1897 	if (mp != NULL)
1898 		arp_dlpi_send(arl, mp);
1899 	mutex_enter(&arl->arl_lock);
1900 
1901 	/* wait for unbind ack  */
1902 	while (arl->arl_state_flags & ARL_DL_UNBIND_IN_PROGRESS)
1903 		cv_wait(&arl->arl_cv, &arl->arl_lock);
1904 	mutex_exit(&arl->arl_lock);
1905 
1906 	qprocsoff(q);
1907 
1908 	if (ill != NULL) {
1909 		mutex_enter(&ill->ill_lock);
1910 		ill->ill_arl_dlpi_pending = 0;
1911 		mutex_exit(&ill->ill_lock);
1912 	}
1913 
1914 	if (ai != NULL) {
1915 		mutex_enter(&ai->ai_lock);
1916 		ai->ai_arl = NULL;
1917 		if (ai->ai_ill == NULL) {
1918 			mutex_destroy(&ai->ai_lock);
1919 			kmem_free(ai, sizeof (*ai));
1920 		} else {
1921 			mutex_exit(&ai->ai_lock);
1922 		}
1923 	}
1924 
1925 	/* free up the rest */
1926 	arp_mod_close_tail(arl);
1927 
1928 	q->q_ptr = WR(q)->q_ptr = NULL;
1929 
1930 	if (ipsq != NULL)
1931 		ipsq_exit(ipsq);
1932 
1933 	return (0);
1934 }
1935 
1936 static void
1937 arp_mod_close_tail(arl_t *arl)
1938 {
1939 	ip_stack_t	*ipst = arl->arl_ipst;
1940 	mblk_t		**mpp;
1941 
1942 	netstack_hold(ipst->ips_netstack);
1943 
1944 	mutex_enter(&ipst->ips_ip_mi_lock);
1945 	mi_close_unlink(&ipst->ips_arp_g_head, (IDP)arl);
1946 	mutex_exit(&ipst->ips_ip_mi_lock);
1947 
1948 	/*
1949 	 * credp could be null if the open didn't succeed and ip_modopen
1950 	 * itself calls ip_close.
1951 	 */
1952 	if (arl->arl_credp != NULL)
1953 		crfree(arl->arl_credp);
1954 
1955 	/* Free all retained control messages. */
1956 	mpp = &arl->arl_first_mp_to_free;
1957 	do {
1958 		while (mpp[0]) {
1959 			mblk_t  *mp;
1960 			mblk_t  *mp1;
1961 
1962 			mp = mpp[0];
1963 			mpp[0] = mp->b_next;
1964 			for (mp1 = mp; mp1 != NULL; mp1 = mp1->b_cont) {
1965 				mp1->b_next = NULL;
1966 				mp1->b_prev = NULL;
1967 			}
1968 			freemsg(mp);
1969 		}
1970 	} while (mpp++ != &arl->arl_last_mp_to_free);
1971 
1972 	netstack_rele(ipst->ips_netstack);
1973 	mi_free(arl->arl_name);
1974 	mi_close_free((IDP)arl);
1975 }
1976 
1977 /*
1978  * DAD failed. Tear down ipifs with the specified srce address. Note that
1979  * tearing down the ipif also meas deleting the ncec through ipif_down,
1980  * so it is not possible to use nce_timer for recovery. Instead we start
1981  * a timer on the ipif. Caller has to free the mp.
1982  */
1983 void
1984 arp_failure(mblk_t *mp, ip_recv_attr_t *ira)
1985 {
1986 	ill_t *ill = ira->ira_ill;
1987 
1988 	if ((mp = copymsg(mp)) != NULL) {
1989 		ill_refhold(ill);
1990 		qwriter_ip(ill, ill->ill_rq, mp, arp_excl, NEW_OP, B_FALSE);
1991 	}
1992 }
1993 
1994 /*
1995  * This is for exclusive changes due to ARP.  Tear down an interface due
1996  * to AR_CN_FAILED and AR_CN_BOGON.
1997  */
1998 /* ARGSUSED */
1999 static void
2000 arp_excl(ipsq_t *ipsq, queue_t *rq, mblk_t *mp, void *dummy_arg)
2001 {
2002 	ill_t	*ill = rq->q_ptr;
2003 	arh_t *arh;
2004 	ipaddr_t src;
2005 	ipif_t	*ipif;
2006 	ip_stack_t *ipst = ill->ill_ipst;
2007 	uchar_t	*haddr;
2008 	uint_t	haddrlen;
2009 
2010 	/* first try src = ar$spa */
2011 	arh = (arh_t *)mp->b_rptr;
2012 	bcopy((char *)&arh[1] + arh->arh_hlen, &src, IP_ADDR_LEN);
2013 
2014 	haddrlen = arh->arh_hlen;
2015 	haddr = (uint8_t *)(arh + 1);
2016 
2017 	if (haddrlen == ill->ill_phys_addr_length) {
2018 		/*
2019 		 * Ignore conflicts generated by misbehaving switches that
2020 		 * just reflect our own messages back to us.  For IPMP, we may
2021 		 * see reflections across any ill in the illgrp.
2022 		 */
2023 		/* For an under ill_grp can change under lock */
2024 		rw_enter(&ipst->ips_ill_g_lock, RW_READER);
2025 		if (bcmp(haddr, ill->ill_phys_addr, haddrlen) == 0 ||
2026 		    IS_UNDER_IPMP(ill) && ill->ill_grp != NULL &&
2027 		    ipmp_illgrp_find_ill(ill->ill_grp, haddr,
2028 		    haddrlen) != NULL) {
2029 			rw_exit(&ipst->ips_ill_g_lock);
2030 			goto ignore_conflict;
2031 		}
2032 		rw_exit(&ipst->ips_ill_g_lock);
2033 	}
2034 
2035 	/*
2036 	 * Look up the appropriate ipif.
2037 	 */
2038 	ipif = ipif_lookup_addr(src, ill, ALL_ZONES, ipst);
2039 	if (ipif == NULL)
2040 		goto ignore_conflict;
2041 
2042 	/* Reload the ill to match the ipif */
2043 	ill = ipif->ipif_ill;
2044 
2045 	/* If it's already duplicate or ineligible, then don't do anything. */
2046 	if (ipif->ipif_flags & (IPIF_POINTOPOINT|IPIF_DUPLICATE)) {
2047 		ipif_refrele(ipif);
2048 		goto ignore_conflict;
2049 	}
2050 
2051 	/*
2052 	 * If we failed on a recovery probe, then restart the timer to
2053 	 * try again later.
2054 	 */
2055 	if (!ipif->ipif_was_dup) {
2056 		char hbuf[MAC_STR_LEN];
2057 		char sbuf[INET_ADDRSTRLEN];
2058 		char ibuf[LIFNAMSIZ];
2059 
2060 		(void) mac_colon_addr(haddr, haddrlen, hbuf, sizeof (hbuf));
2061 		(void) ip_dot_addr(src, sbuf);
2062 		ipif_get_name(ipif, ibuf, sizeof (ibuf));
2063 
2064 		cmn_err(CE_WARN, "%s has duplicate address %s (in use by %s);"
2065 		    " disabled", ibuf, sbuf, hbuf);
2066 	}
2067 	mutex_enter(&ill->ill_lock);
2068 	ASSERT(!(ipif->ipif_flags & IPIF_DUPLICATE));
2069 	ipif->ipif_flags |= IPIF_DUPLICATE;
2070 	ill->ill_ipif_dup_count++;
2071 	mutex_exit(&ill->ill_lock);
2072 	(void) ipif_down(ipif, NULL, NULL);
2073 	(void) ipif_down_tail(ipif);
2074 	mutex_enter(&ill->ill_lock);
2075 	if (!(ipif->ipif_flags & (IPIF_DHCPRUNNING|IPIF_TEMPORARY)) &&
2076 	    ill->ill_net_type == IRE_IF_RESOLVER &&
2077 	    !(ipif->ipif_state_flags & IPIF_CONDEMNED) &&
2078 	    ipst->ips_ip_dup_recovery > 0) {
2079 		ASSERT(ipif->ipif_recovery_id == 0);
2080 		ipif->ipif_recovery_id = timeout(ipif_dup_recovery,
2081 		    ipif, MSEC_TO_TICK(ipst->ips_ip_dup_recovery));
2082 	}
2083 	mutex_exit(&ill->ill_lock);
2084 	ipif_refrele(ipif);
2085 
2086 ignore_conflict:
2087 	freemsg(mp);
2088 }
2089 
2090 /*
2091  * This is a place for a dtrace hook.
2092  * Note that mp can be either the DL_UNITDATA_IND with a b_cont payload,
2093  * or just the ARP packet payload as an M_DATA.
2094  */
2095 /* ARGSUSED */
2096 static void
2097 arp_drop_packet(const char *str, mblk_t *mp, ill_t *ill)
2098 {
2099 	freemsg(mp);
2100 }
2101 
2102 static boolean_t
2103 arp_over_driver(queue_t *q)
2104 {
2105 	queue_t *qnext = STREAM(q)->sd_wrq->q_next;
2106 
2107 	/*
2108 	 * check if first module below stream head is IP or UDP.
2109 	 */
2110 	ASSERT(qnext != NULL);
2111 	if (strcmp(Q2NAME(qnext), "ip") != 0 &&
2112 	    strcmp(Q2NAME(qnext), "udp") != 0) {
2113 		/*
2114 		 * module below is not ip or udp, so arp has been pushed
2115 		 * on the driver.
2116 		 */
2117 		return (B_TRUE);
2118 	}
2119 	return (B_FALSE);
2120 }
2121 
2122 static int
2123 arp_open(queue_t *q, dev_t *devp, int flag, int sflag, cred_t *credp)
2124 {
2125 	int err;
2126 
2127 	ASSERT(sflag & MODOPEN);
2128 	if (!arp_over_driver(q)) {
2129 		q->q_qinfo = dummymodinfo.st_rdinit;
2130 		WR(q)->q_qinfo = dummymodinfo.st_wrinit;
2131 		return ((*dummymodinfo.st_rdinit->qi_qopen)(q, devp, flag,
2132 		    sflag, credp));
2133 	}
2134 	err = arp_modopen(q, devp, flag, sflag, credp);
2135 	return (err);
2136 }
2137 
2138 /*
2139  * In most cases we must be a writer on the IP stream before coming to
2140  * arp_dlpi_send(), to serialize DLPI sends to the driver. The exceptions
2141  * when we are not a writer are very early duing initialization (in
2142  * arl_init, before the arl has done a SLIFNAME, so that we don't yet know
2143  * the associated ill) or during arp_mod_close, when we could not enter the
2144  * ipsq because the ill has already unplumbed.
2145  */
2146 static void
2147 arp_dlpi_send(arl_t *arl, mblk_t *mp)
2148 {
2149 	mblk_t **mpp;
2150 	t_uscalar_t prim;
2151 	arl_ill_common_t *ai;
2152 
2153 	ASSERT(DB_TYPE(mp) == M_PROTO || DB_TYPE(mp) == M_PCPROTO);
2154 
2155 #ifdef DEBUG
2156 	ai = arl->arl_common;
2157 	if (ai != NULL) {
2158 		mutex_enter(&ai->ai_lock);
2159 		if (ai->ai_ill != NULL)
2160 			ASSERT(IAM_WRITER_ILL(ai->ai_ill));
2161 		mutex_exit(&ai->ai_lock);
2162 	}
2163 #endif /* DEBUG */
2164 
2165 	mutex_enter(&arl->arl_lock);
2166 	if (arl->arl_dlpi_pending != DL_PRIM_INVAL) {
2167 		/* Must queue message. Tail insertion */
2168 		mpp = &arl->arl_dlpi_deferred;
2169 		while (*mpp != NULL)
2170 			mpp = &((*mpp)->b_next);
2171 
2172 		*mpp = mp;
2173 		mutex_exit(&arl->arl_lock);
2174 		return;
2175 	}
2176 	mutex_exit(&arl->arl_lock);
2177 	if ((prim = ((union DL_primitives *)mp->b_rptr)->dl_primitive)
2178 	    == DL_BIND_REQ) {
2179 		ASSERT((arl->arl_state_flags & ARL_DL_UNBIND_IN_PROGRESS) == 0);
2180 	}
2181 	/*
2182 	 * No need to take the arl_lock to examine ARL_CONDEMNED at this point
2183 	 * because the only thread that can see ARL_CONDEMNED here is the
2184 	 * closing arp_modclose() thread which sets the flag after becoming a
2185 	 * writer on the ipsq. Threads from IP must have finished and
2186 	 * cannot be active now.
2187 	 */
2188 	if (!(arl->arl_state_flags & ARL_CONDEMNED) ||
2189 	    (prim == DL_UNBIND_REQ)) {
2190 		if (prim != DL_NOTIFY_CONF) {
2191 			ill_t *ill = arl_to_ill(arl);
2192 
2193 			arl->arl_dlpi_pending = prim;
2194 			if (ill != NULL) {
2195 				mutex_enter(&ill->ill_lock);
2196 				ill->ill_arl_dlpi_pending = 1;
2197 				mutex_exit(&ill->ill_lock);
2198 				ill_refrele(ill);
2199 			}
2200 		}
2201 	}
2202 	DTRACE_PROBE4(arl__dlpi, char *, "arp_dlpi_send",
2203 	    char *, dl_primstr(prim), char *, "-",  arl_t *, arl);
2204 	putnext(arl->arl_wq, mp);
2205 }
2206 
2207 static void
2208 arl_defaults_common(arl_t *arl, mblk_t *mp)
2209 {
2210 	dl_info_ack_t	*dlia = (dl_info_ack_t *)mp->b_rptr;
2211 	/*
2212 	 * Till the ill is fully up  the ill is not globally visible.
2213 	 * So no need for a lock.
2214 	 */
2215 	arl->arl_mactype = dlia->dl_mac_type;
2216 	arl->arl_sap_length = dlia->dl_sap_length;
2217 
2218 	if (!arl->arl_dlpi_style_set) {
2219 		if (dlia->dl_provider_style == DL_STYLE2)
2220 			arl->arl_needs_attach = 1;
2221 		mutex_enter(&arl->arl_lock);
2222 		ASSERT(arl->arl_dlpi_style_set == 0);
2223 		arl->arl_dlpi_style_set = 1;
2224 		arl->arl_state_flags &= ~ARL_LL_SUBNET_PENDING;
2225 		cv_broadcast(&arl->arl_cv);
2226 		mutex_exit(&arl->arl_lock);
2227 	}
2228 }
2229 
2230 int
2231 arl_init(queue_t *q, arl_t *arl)
2232 {
2233 	mblk_t *info_mp;
2234 	dl_info_req_t   *dlir;
2235 
2236 	/* subset of ill_init */
2237 	mutex_init(&arl->arl_lock, NULL, MUTEX_DEFAULT, 0);
2238 
2239 	arl->arl_rq = q;
2240 	arl->arl_wq = WR(q);
2241 
2242 	info_mp = allocb(MAX(sizeof (dl_info_req_t), sizeof (dl_info_ack_t)),
2243 	    BPRI_HI);
2244 	if (info_mp == NULL)
2245 		return (ENOMEM);
2246 	/*
2247 	 * allocate sufficient space to contain device name.
2248 	 */
2249 	arl->arl_name = (char *)(mi_zalloc(2 * LIFNAMSIZ));
2250 	arl->arl_ppa = UINT_MAX;
2251 	arl->arl_state_flags |= (ARL_LL_SUBNET_PENDING | ARL_LL_UNBOUND);
2252 
2253 	/* Send down the Info Request to the driver. */
2254 	info_mp->b_datap->db_type = M_PCPROTO;
2255 	dlir = (dl_info_req_t *)info_mp->b_rptr;
2256 	info_mp->b_wptr = (uchar_t *)&dlir[1];
2257 	dlir->dl_primitive = DL_INFO_REQ;
2258 	arl->arl_dlpi_pending = DL_PRIM_INVAL;
2259 	qprocson(q);
2260 
2261 	arp_dlpi_send(arl, info_mp);
2262 	return (0);
2263 }
2264 
2265 int
2266 arl_wait_for_info_ack(arl_t *arl)
2267 {
2268 	int err;
2269 
2270 	mutex_enter(&arl->arl_lock);
2271 	while (arl->arl_state_flags & ARL_LL_SUBNET_PENDING) {
2272 		/*
2273 		 * Return value of 0 indicates a pending signal.
2274 		 */
2275 		err = cv_wait_sig(&arl->arl_cv, &arl->arl_lock);
2276 		if (err == 0) {
2277 			mutex_exit(&arl->arl_lock);
2278 			return (EINTR);
2279 		}
2280 	}
2281 	mutex_exit(&arl->arl_lock);
2282 	/*
2283 	 * ip_rput_other could have set an error  in ill_error on
2284 	 * receipt of M_ERROR.
2285 	 */
2286 	return (arl->arl_error);
2287 }
2288 
2289 void
2290 arl_set_muxid(ill_t *ill, int muxid)
2291 {
2292 	arl_t *arl;
2293 
2294 	arl = ill_to_arl(ill);
2295 	if (arl != NULL) {
2296 		arl->arl_muxid = muxid;
2297 		arl_refrele(arl);
2298 	}
2299 }
2300 
2301 int
2302 arl_get_muxid(ill_t *ill)
2303 {
2304 	arl_t *arl;
2305 	int muxid = 0;
2306 
2307 	arl = ill_to_arl(ill);
2308 	if (arl != NULL) {
2309 		muxid = arl->arl_muxid;
2310 		arl_refrele(arl);
2311 	}
2312 	return (muxid);
2313 }
2314 
2315 static int
2316 arp_modopen(queue_t *q, dev_t *devp, int flag, int sflag, cred_t *credp)
2317 {
2318 	int	err;
2319 	zoneid_t zoneid;
2320 	netstack_t *ns;
2321 	ip_stack_t *ipst;
2322 	arl_t	*arl = NULL;
2323 
2324 	/*
2325 	 * Prevent unprivileged processes from pushing IP so that
2326 	 * they can't send raw IP.
2327 	 */
2328 	if (secpolicy_net_rawaccess(credp) != 0)
2329 		return (EPERM);
2330 
2331 	ns = netstack_find_by_cred(credp);
2332 	ASSERT(ns != NULL);
2333 	ipst = ns->netstack_ip;
2334 	ASSERT(ipst != NULL);
2335 
2336 	/*
2337 	 * For exclusive stacks we set the zoneid to zero
2338 	 * to make IP operate as if in the global zone.
2339 	 */
2340 	if (ipst->ips_netstack->netstack_stackid != GLOBAL_NETSTACKID)
2341 		zoneid = GLOBAL_ZONEID;
2342 	else
2343 		zoneid = crgetzoneid(credp);
2344 
2345 	arl = (arl_t *)mi_open_alloc_sleep(sizeof (arl_t));
2346 	q->q_ptr = WR(q)->q_ptr = arl;
2347 	arl->arl_ipst = ipst;
2348 	arl->arl_zoneid = zoneid;
2349 	err = arl_init(q, arl);
2350 
2351 	if (err != 0) {
2352 		mi_free(arl->arl_name);
2353 		mi_free(arl);
2354 		netstack_rele(ipst->ips_netstack);
2355 		q->q_ptr = NULL;
2356 		WR(q)->q_ptr = NULL;
2357 		return (err);
2358 	}
2359 
2360 	/*
2361 	 * Wait for the DL_INFO_ACK if a DL_INFO_REQ was sent.
2362 	 */
2363 	err = arl_wait_for_info_ack(arl);
2364 	if (err == 0)
2365 		arl->arl_credp = credp;
2366 	else
2367 		goto fail;
2368 
2369 	crhold(credp);
2370 
2371 	mutex_enter(&ipst->ips_ip_mi_lock);
2372 	err = mi_open_link(&ipst->ips_arp_g_head, (IDP)q->q_ptr, devp, flag,
2373 	    sflag, credp);
2374 	mutex_exit(&ipst->ips_ip_mi_lock);
2375 fail:
2376 	if (err) {
2377 		(void) arp_close(q, 0);
2378 		return (err);
2379 	}
2380 	return (0);
2381 }
2382 
2383 /*
2384  * Notify any downstream modules (esp softmac and hitbox) of the name
2385  * of this interface using an M_CTL.
2386  */
2387 static void
2388 arp_ifname_notify(arl_t *arl)
2389 {
2390 	mblk_t *mp1, *mp2;
2391 	struct iocblk *iocp;
2392 	struct lifreq *lifr;
2393 
2394 	if ((mp1 = mkiocb(SIOCSLIFNAME)) == NULL)
2395 		return;
2396 	if ((mp2 = allocb(sizeof (struct lifreq), BPRI_HI)) == NULL) {
2397 		freemsg(mp1);
2398 		return;
2399 	}
2400 
2401 	lifr = (struct lifreq *)mp2->b_rptr;
2402 	mp2->b_wptr += sizeof (struct lifreq);
2403 	bzero(lifr, sizeof (struct lifreq));
2404 
2405 	(void) strncpy(lifr->lifr_name, arl->arl_name, LIFNAMSIZ);
2406 	lifr->lifr_ppa = arl->arl_ppa;
2407 	lifr->lifr_flags = ILLF_IPV4;
2408 
2409 	/* Use M_CTL to avoid confusing anyone else who might be listening. */
2410 	DB_TYPE(mp1) = M_CTL;
2411 	mp1->b_cont = mp2;
2412 	iocp = (struct iocblk *)mp1->b_rptr;
2413 	iocp->ioc_count = msgsize(mp1->b_cont);
2414 	DTRACE_PROBE4(arl__dlpi, char *, "arp_ifname_notify",
2415 	    char *, "SIOCSLIFNAME", char *, "-",  arl_t *, arl);
2416 	putnext(arl->arl_wq, mp1);
2417 }
2418 
2419 void
2420 arp_send_replumb_conf(ill_t *ill)
2421 {
2422 	mblk_t *mp;
2423 	arl_t *arl = ill_to_arl(ill);
2424 
2425 	if (arl == NULL)
2426 		return;
2427 	/*
2428 	 * arl_got_replumb and arl_got_unbind to be cleared after we complete
2429 	 * arp_cmd_done.
2430 	 */
2431 	mp = mexchange(NULL, NULL, sizeof (dl_notify_conf_t), M_PROTO,
2432 	    DL_NOTIFY_CONF);
2433 	((dl_notify_conf_t *)(mp->b_rptr))->dl_notification =
2434 	    DL_NOTE_REPLUMB_DONE;
2435 	arp_dlpi_send(arl, mp);
2436 	mutex_enter(&arl->arl_lock);
2437 	arl->arl_state_flags &= ~ARL_LL_REPLUMBING;
2438 	mutex_exit(&arl->arl_lock);
2439 	arl_refrele(arl);
2440 }
2441 
2442 /*
2443  * The unplumb code paths call arp_unbind_complete() to make sure that it is
2444  * safe to tear down the ill. We wait for DL_UNBIND_ACK to complete, and also
2445  * for the arl_refcnt to fall to one so that, when we return from
2446  * arp_unbind_complete(), we know for certain that there are no threads in
2447  * arp_rput() that might access the arl_ill.
2448  */
2449 void
2450 arp_unbind_complete(ill_t *ill)
2451 {
2452 	arl_t *arl = ill_to_arl(ill);
2453 
2454 	if (arl == NULL)
2455 		return;
2456 	mutex_enter(&arl->arl_lock);
2457 	/*
2458 	 * wait for unbind ack and arl_refcnt to drop to 1. Note that the
2459 	 * quiescent arl_refcnt for this function is 1 (and not 0) because
2460 	 * ill_to_arl() will itself return after taking a ref on the arl_t.
2461 	 */
2462 	while (arl->arl_state_flags & ARL_DL_UNBIND_IN_PROGRESS)
2463 		cv_wait(&arl->arl_cv, &arl->arl_lock);
2464 	while (arl->arl_refcnt != 1)
2465 		cv_wait(&arl->arl_cv, &arl->arl_lock);
2466 	mutex_exit(&arl->arl_lock);
2467 	arl_refrele(arl);
2468 }
2469