123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272 |
- // Copyright 2011 The Go Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- package net
- import (
- "os"
- "syscall"
- "unsafe"
- )
- // If the ifindex is zero, interfaceTable returns mappings of all
- // network interfaces. Otherwise it returns a mapping of a specific
- // interface.
- func interfaceTable(ifindex int) ([]Interface, error) {
- tab, err := syscall.NetlinkRIB(syscall.RTM_GETLINK, syscall.AF_UNSPEC)
- if err != nil {
- return nil, os.NewSyscallError("netlink rib", err)
- }
- msgs, err := syscall.ParseNetlinkMessage(tab)
- if err != nil {
- return nil, os.NewSyscallError("netlink message", err)
- }
- var ift []Interface
- loop:
- for _, m := range msgs {
- switch m.Header.Type {
- case syscall.NLMSG_DONE:
- break loop
- case syscall.RTM_NEWLINK:
- ifim := (*syscall.IfInfomsg)(unsafe.Pointer(&m.Data[0]))
- if ifindex == 0 || ifindex == int(ifim.Index) {
- attrs, err := syscall.ParseNetlinkRouteAttr(&m)
- if err != nil {
- return nil, os.NewSyscallError("netlink routeattr", err)
- }
- ift = append(ift, *newLink(ifim, attrs))
- if ifindex == int(ifim.Index) {
- break loop
- }
- }
- }
- }
- return ift, nil
- }
- const (
- // See linux/if_arp.h.
- // Note that Linux doesn't support IPv4 over IPv6 tunneling.
- sysARPHardwareIPv4IPv4 = 768 // IPv4 over IPv4 tunneling
- sysARPHardwareIPv6IPv6 = 769 // IPv6 over IPv6 tunneling
- sysARPHardwareIPv6IPv4 = 776 // IPv6 over IPv4 tunneling
- sysARPHardwareGREIPv4 = 778 // any over GRE over IPv4 tunneling
- sysARPHardwareGREIPv6 = 823 // any over GRE over IPv6 tunneling
- )
- func newLink(ifim *syscall.IfInfomsg, attrs []syscall.NetlinkRouteAttr) *Interface {
- ifi := &Interface{Index: int(ifim.Index), Flags: linkFlags(ifim.Flags)}
- for _, a := range attrs {
- switch a.Attr.Type {
- case syscall.IFLA_ADDRESS:
- // We never return any /32 or /128 IP address
- // prefix on any IP tunnel interface as the
- // hardware address.
- switch len(a.Value) {
- case IPv4len:
- switch ifim.Type {
- case sysARPHardwareIPv4IPv4, sysARPHardwareGREIPv4, sysARPHardwareIPv6IPv4:
- continue
- }
- case IPv6len:
- switch ifim.Type {
- case sysARPHardwareIPv6IPv6, sysARPHardwareGREIPv6:
- continue
- }
- }
- var nonzero bool
- for _, b := range a.Value {
- if b != 0 {
- nonzero = true
- break
- }
- }
- if nonzero {
- ifi.HardwareAddr = a.Value[:]
- }
- case syscall.IFLA_IFNAME:
- ifi.Name = string(a.Value[:len(a.Value)-1])
- case syscall.IFLA_MTU:
- ifi.MTU = int(*(*uint32)(unsafe.Pointer(&a.Value[:4][0])))
- }
- }
- return ifi
- }
- func linkFlags(rawFlags uint32) Flags {
- var f Flags
- if rawFlags&syscall.IFF_UP != 0 {
- f |= FlagUp
- }
- if rawFlags&syscall.IFF_BROADCAST != 0 {
- f |= FlagBroadcast
- }
- if rawFlags&syscall.IFF_LOOPBACK != 0 {
- f |= FlagLoopback
- }
- if rawFlags&syscall.IFF_POINTOPOINT != 0 {
- f |= FlagPointToPoint
- }
- if rawFlags&syscall.IFF_MULTICAST != 0 {
- f |= FlagMulticast
- }
- return f
- }
- // If the ifi is nil, interfaceAddrTable returns addresses for all
- // network interfaces. Otherwise it returns addresses for a specific
- // interface.
- func interfaceAddrTable(ifi *Interface) ([]Addr, error) {
- tab, err := syscall.NetlinkRIB(syscall.RTM_GETADDR, syscall.AF_UNSPEC)
- if err != nil {
- return nil, os.NewSyscallError("netlink rib", err)
- }
- msgs, err := syscall.ParseNetlinkMessage(tab)
- if err != nil {
- return nil, os.NewSyscallError("netlink message", err)
- }
- var ift []Interface
- if ifi == nil {
- var err error
- ift, err = interfaceTable(0)
- if err != nil {
- return nil, err
- }
- }
- ifat, err := addrTable(ift, ifi, msgs)
- if err != nil {
- return nil, err
- }
- return ifat, nil
- }
- func addrTable(ift []Interface, ifi *Interface, msgs []syscall.NetlinkMessage) ([]Addr, error) {
- var ifat []Addr
- loop:
- for _, m := range msgs {
- switch m.Header.Type {
- case syscall.NLMSG_DONE:
- break loop
- case syscall.RTM_NEWADDR:
- ifam := (*syscall.IfAddrmsg)(unsafe.Pointer(&m.Data[0]))
- if len(ift) != 0 || ifi.Index == int(ifam.Index) {
- if len(ift) != 0 {
- var err error
- ifi, err = interfaceByIndex(ift, int(ifam.Index))
- if err != nil {
- return nil, err
- }
- }
- attrs, err := syscall.ParseNetlinkRouteAttr(&m)
- if err != nil {
- return nil, os.NewSyscallError("netlink routeattr", err)
- }
- ifa := newAddr(ifi, ifam, attrs)
- if ifa != nil {
- ifat = append(ifat, ifa)
- }
- }
- }
- }
- return ifat, nil
- }
- func newAddr(ifi *Interface, ifam *syscall.IfAddrmsg, attrs []syscall.NetlinkRouteAttr) Addr {
- var ipPointToPoint bool
- // Seems like we need to make sure whether the IP interface
- // stack consists of IP point-to-point numbered or unnumbered
- // addressing over point-to-point link encapsulation.
- if ifi.Flags&FlagPointToPoint != 0 {
- for _, a := range attrs {
- if a.Attr.Type == syscall.IFA_LOCAL {
- ipPointToPoint = true
- break
- }
- }
- }
- for _, a := range attrs {
- if ipPointToPoint && a.Attr.Type == syscall.IFA_ADDRESS || !ipPointToPoint && a.Attr.Type == syscall.IFA_LOCAL {
- continue
- }
- switch ifam.Family {
- case syscall.AF_INET:
- return &IPNet{IP: IPv4(a.Value[0], a.Value[1], a.Value[2], a.Value[3]), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv4len)}
- case syscall.AF_INET6:
- ifa := &IPNet{IP: make(IP, IPv6len), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv6len)}
- copy(ifa.IP, a.Value[:])
- return ifa
- }
- }
- return nil
- }
- // interfaceMulticastAddrTable returns addresses for a specific
- // interface.
- func interfaceMulticastAddrTable(ifi *Interface) ([]Addr, error) {
- ifmat4 := parseProcNetIGMP("/proc/net/igmp", ifi)
- ifmat6 := parseProcNetIGMP6("/proc/net/igmp6", ifi)
- return append(ifmat4, ifmat6...), nil
- }
- func parseProcNetIGMP(path string, ifi *Interface) []Addr {
- fd, err := open(path)
- if err != nil {
- return nil
- }
- defer fd.close()
- var (
- ifmat []Addr
- name string
- )
- fd.readLine() // skip first line
- b := make([]byte, IPv4len)
- for l, ok := fd.readLine(); ok; l, ok = fd.readLine() {
- f := splitAtBytes(l, " :\r\t\n")
- if len(f) < 4 {
- continue
- }
- switch {
- case l[0] != ' ' && l[0] != '\t': // new interface line
- name = f[1]
- case len(f[0]) == 8:
- if ifi == nil || name == ifi.Name {
- // The Linux kernel puts the IP
- // address in /proc/net/igmp in native
- // endianness.
- for i := 0; i+1 < len(f[0]); i += 2 {
- b[i/2], _ = xtoi2(f[0][i:i+2], 0)
- }
- i := *(*uint32)(unsafe.Pointer(&b[:4][0]))
- ifma := IPAddr{IP: IPv4(byte(i>>24), byte(i>>16), byte(i>>8), byte(i))}
- ifmat = append(ifmat, ifma.toAddr())
- }
- }
- }
- return ifmat
- }
- func parseProcNetIGMP6(path string, ifi *Interface) []Addr {
- fd, err := open(path)
- if err != nil {
- return nil
- }
- defer fd.close()
- var ifmat []Addr
- b := make([]byte, IPv6len)
- for l, ok := fd.readLine(); ok; l, ok = fd.readLine() {
- f := splitAtBytes(l, " \r\t\n")
- if len(f) < 6 {
- continue
- }
- if ifi == nil || f[1] == ifi.Name {
- for i := 0; i+1 < len(f[2]); i += 2 {
- b[i/2], _ = xtoi2(f[2][i:i+2], 0)
- }
- ifma := IPAddr{IP: IP{b[0], b[1], b[2], b[3], b[4], b[5], b[6], b[7], b[8], b[9], b[10], b[11], b[12], b[13], b[14], b[15]}}
- ifmat = append(ifmat, ifma.toAddr())
- }
- }
- return ifmat
- }
|