k3s/vendor/github.com/vishvananda/netlink/addr_linux.go

415 lines
11 KiB
Go
Raw Normal View History

2019-01-12 04:58:27 +00:00
package netlink
import (
"fmt"
"net"
"strings"
"syscall"
"github.com/vishvananda/netlink/nl"
"github.com/vishvananda/netns"
2019-09-27 21:51:53 +00:00
"golang.org/x/sys/unix"
2019-01-12 04:58:27 +00:00
)
// AddrAdd will add an IP address to a link device.
2020-08-10 17:43:49 +00:00
//
2019-01-12 04:58:27 +00:00
// Equivalent to: `ip addr add $addr dev $link`
2020-08-10 17:43:49 +00:00
//
// If `addr` is an IPv4 address and the broadcast address is not given, it
// will be automatically computed based on the IP mask if /30 or larger.
2019-01-12 04:58:27 +00:00
func AddrAdd(link Link, addr *Addr) error {
return pkgHandle.AddrAdd(link, addr)
}
// AddrAdd will add an IP address to a link device.
2020-08-10 17:43:49 +00:00
//
2019-01-12 04:58:27 +00:00
// Equivalent to: `ip addr add $addr dev $link`
2020-08-10 17:43:49 +00:00
//
// If `addr` is an IPv4 address and the broadcast address is not given, it
// will be automatically computed based on the IP mask if /30 or larger.
2019-01-12 04:58:27 +00:00
func (h *Handle) AddrAdd(link Link, addr *Addr) error {
2019-09-27 21:51:53 +00:00
req := h.newNetlinkRequest(unix.RTM_NEWADDR, unix.NLM_F_CREATE|unix.NLM_F_EXCL|unix.NLM_F_ACK)
2019-01-12 04:58:27 +00:00
return h.addrHandle(link, addr, req)
}
// AddrReplace will replace (or, if not present, add) an IP address on a link device.
2020-08-10 17:43:49 +00:00
//
2019-01-12 04:58:27 +00:00
// Equivalent to: `ip addr replace $addr dev $link`
2020-08-10 17:43:49 +00:00
//
// If `addr` is an IPv4 address and the broadcast address is not given, it
// will be automatically computed based on the IP mask if /30 or larger.
2019-01-12 04:58:27 +00:00
func AddrReplace(link Link, addr *Addr) error {
return pkgHandle.AddrReplace(link, addr)
}
// AddrReplace will replace (or, if not present, add) an IP address on a link device.
2020-08-10 17:43:49 +00:00
//
2019-01-12 04:58:27 +00:00
// Equivalent to: `ip addr replace $addr dev $link`
2020-08-10 17:43:49 +00:00
//
// If `addr` is an IPv4 address and the broadcast address is not given, it
// will be automatically computed based on the IP mask if /30 or larger.
2019-01-12 04:58:27 +00:00
func (h *Handle) AddrReplace(link Link, addr *Addr) error {
2019-09-27 21:51:53 +00:00
req := h.newNetlinkRequest(unix.RTM_NEWADDR, unix.NLM_F_CREATE|unix.NLM_F_REPLACE|unix.NLM_F_ACK)
2019-01-12 04:58:27 +00:00
return h.addrHandle(link, addr, req)
}
// AddrDel will delete an IP address from a link device.
2020-08-10 17:43:49 +00:00
//
2019-01-12 04:58:27 +00:00
// Equivalent to: `ip addr del $addr dev $link`
2020-08-10 17:43:49 +00:00
//
// If `addr` is an IPv4 address and the broadcast address is not given, it
// will be automatically computed based on the IP mask if /30 or larger.
2019-01-12 04:58:27 +00:00
func AddrDel(link Link, addr *Addr) error {
return pkgHandle.AddrDel(link, addr)
}
// AddrDel will delete an IP address from a link device.
// Equivalent to: `ip addr del $addr dev $link`
2020-08-10 17:43:49 +00:00
//
// If `addr` is an IPv4 address and the broadcast address is not given, it
// will be automatically computed based on the IP mask if /30 or larger.
2019-01-12 04:58:27 +00:00
func (h *Handle) AddrDel(link Link, addr *Addr) error {
2019-09-27 21:51:53 +00:00
req := h.newNetlinkRequest(unix.RTM_DELADDR, unix.NLM_F_ACK)
2019-01-12 04:58:27 +00:00
return h.addrHandle(link, addr, req)
}
func (h *Handle) addrHandle(link Link, addr *Addr, req *nl.NetlinkRequest) error {
base := link.Attrs()
if addr.Label != "" && !strings.HasPrefix(addr.Label, base.Name) {
return fmt.Errorf("label must begin with interface name")
}
h.ensureIndex(base)
family := nl.GetIPFamily(addr.IP)
msg := nl.NewIfAddrmsg(family)
msg.Index = uint32(base.Index)
msg.Scope = uint8(addr.Scope)
2020-08-10 17:43:49 +00:00
mask := addr.Mask
if addr.Peer != nil {
mask = addr.Peer.Mask
}
prefixlen, masklen := mask.Size()
2019-01-12 04:58:27 +00:00
msg.Prefixlen = uint8(prefixlen)
req.AddData(msg)
var localAddrData []byte
if family == FAMILY_V4 {
localAddrData = addr.IP.To4()
} else {
localAddrData = addr.IP.To16()
}
2019-09-27 21:51:53 +00:00
localData := nl.NewRtAttr(unix.IFA_LOCAL, localAddrData)
2019-01-12 04:58:27 +00:00
req.AddData(localData)
var peerAddrData []byte
if addr.Peer != nil {
if family == FAMILY_V4 {
peerAddrData = addr.Peer.IP.To4()
} else {
peerAddrData = addr.Peer.IP.To16()
}
} else {
peerAddrData = localAddrData
}
2019-09-27 21:51:53 +00:00
addressData := nl.NewRtAttr(unix.IFA_ADDRESS, peerAddrData)
2019-01-12 04:58:27 +00:00
req.AddData(addressData)
if addr.Flags != 0 {
if addr.Flags <= 0xff {
msg.IfAddrmsg.Flags = uint8(addr.Flags)
} else {
b := make([]byte, 4)
native.PutUint32(b, uint32(addr.Flags))
flagsData := nl.NewRtAttr(unix.IFA_FLAGS, b)
2019-01-12 04:58:27 +00:00
req.AddData(flagsData)
}
}
2019-09-27 21:51:53 +00:00
if family == FAMILY_V4 {
2020-08-10 17:43:49 +00:00
// Automatically set the broadcast address if it is unset and the
// subnet is large enough to sensibly have one (/30 or larger).
// See: RFC 3021
if addr.Broadcast == nil && prefixlen < 31 {
2019-09-27 21:51:53 +00:00
calcBroadcast := make(net.IP, masklen/8)
for i := range localAddrData {
2020-08-10 17:43:49 +00:00
calcBroadcast[i] = localAddrData[i] | ^mask[i]
2019-09-27 21:51:53 +00:00
}
addr.Broadcast = calcBroadcast
}
2020-08-10 17:43:49 +00:00
if addr.Broadcast != nil {
req.AddData(nl.NewRtAttr(unix.IFA_BROADCAST, addr.Broadcast))
}
2019-09-27 21:51:53 +00:00
if addr.Label != "" {
labelData := nl.NewRtAttr(unix.IFA_LABEL, nl.ZeroTerminated(addr.Label))
req.AddData(labelData)
2019-01-12 04:58:27 +00:00
}
}
2019-09-27 21:51:53 +00:00
// 0 is the default value for these attributes. However, 0 means "expired", while the least-surprising default
// value should be "forever". To compensate for that, only add the attributes if at least one of the values is
// non-zero, which means the caller has explicitly set them
if addr.ValidLft > 0 || addr.PreferedLft > 0 {
cachedata := nl.IfaCacheInfo{unix.IfaCacheinfo{
Valid: uint32(addr.ValidLft),
Prefered: uint32(addr.PreferedLft),
}}
2019-09-27 21:51:53 +00:00
req.AddData(nl.NewRtAttr(unix.IFA_CACHEINFO, cachedata.Serialize()))
2019-01-12 04:58:27 +00:00
}
2019-09-27 21:51:53 +00:00
_, err := req.Execute(unix.NETLINK_ROUTE, 0)
2019-01-12 04:58:27 +00:00
return err
}
// AddrList gets a list of IP addresses in the system.
// Equivalent to: `ip addr show`.
// The list can be filtered by link and ip family.
func AddrList(link Link, family int) ([]Addr, error) {
return pkgHandle.AddrList(link, family)
}
// AddrList gets a list of IP addresses in the system.
// Equivalent to: `ip addr show`.
// The list can be filtered by link and ip family.
func (h *Handle) AddrList(link Link, family int) ([]Addr, error) {
2019-09-27 21:51:53 +00:00
req := h.newNetlinkRequest(unix.RTM_GETADDR, unix.NLM_F_DUMP)
2019-01-12 04:58:27 +00:00
msg := nl.NewIfInfomsg(family)
req.AddData(msg)
2019-09-27 21:51:53 +00:00
msgs, err := req.Execute(unix.NETLINK_ROUTE, unix.RTM_NEWADDR)
2019-01-12 04:58:27 +00:00
if err != nil {
return nil, err
}
indexFilter := 0
if link != nil {
base := link.Attrs()
h.ensureIndex(base)
indexFilter = base.Index
}
var res []Addr
for _, m := range msgs {
addr, msgFamily, err := parseAddr(m)
2019-01-12 04:58:27 +00:00
if err != nil {
return res, err
}
if link != nil && addr.LinkIndex != indexFilter {
2019-01-12 04:58:27 +00:00
// Ignore messages from other interfaces
continue
}
if family != FAMILY_ALL && msgFamily != family {
continue
}
res = append(res, addr)
}
return res, nil
}
func parseAddr(m []byte) (addr Addr, family int, err error) {
2019-01-12 04:58:27 +00:00
msg := nl.DeserializeIfAddrmsg(m)
family = -1
addr.LinkIndex = -1
2019-01-12 04:58:27 +00:00
attrs, err1 := nl.ParseRouteAttr(m[msg.Len():])
if err1 != nil {
err = err1
return
}
family = int(msg.Family)
addr.LinkIndex = int(msg.Index)
2019-01-12 04:58:27 +00:00
var local, dst *net.IPNet
for _, attr := range attrs {
switch attr.Attr.Type {
2019-09-27 21:51:53 +00:00
case unix.IFA_ADDRESS:
2019-01-12 04:58:27 +00:00
dst = &net.IPNet{
IP: attr.Value,
Mask: net.CIDRMask(int(msg.Prefixlen), 8*len(attr.Value)),
}
2019-09-27 21:51:53 +00:00
case unix.IFA_LOCAL:
2020-08-10 17:43:49 +00:00
// iproute2 manual:
// If a peer address is specified, the local address
// cannot have a prefix length. The network prefix is
// associated with the peer rather than with the local
// address.
n := 8 * len(attr.Value)
2019-01-12 04:58:27 +00:00
local = &net.IPNet{
IP: attr.Value,
2020-08-10 17:43:49 +00:00
Mask: net.CIDRMask(n, n),
2019-01-12 04:58:27 +00:00
}
2019-09-27 21:51:53 +00:00
case unix.IFA_BROADCAST:
2019-01-12 04:58:27 +00:00
addr.Broadcast = attr.Value
2019-09-27 21:51:53 +00:00
case unix.IFA_LABEL:
2019-01-12 04:58:27 +00:00
addr.Label = string(attr.Value[:len(attr.Value)-1])
case unix.IFA_FLAGS:
2019-01-12 04:58:27 +00:00
addr.Flags = int(native.Uint32(attr.Value[0:4]))
case unix.IFA_CACHEINFO:
2019-01-12 04:58:27 +00:00
ci := nl.DeserializeIfaCacheInfo(attr.Value)
addr.PreferedLft = int(ci.Prefered)
addr.ValidLft = int(ci.Valid)
2019-01-12 04:58:27 +00:00
}
}
2020-08-10 17:43:49 +00:00
// libnl addr.c comment:
// IPv6 sends the local address as IFA_ADDRESS with no
// IFA_LOCAL, IPv4 sends both IFA_LOCAL and IFA_ADDRESS
// with IFA_ADDRESS being the peer address if they differ
//
// But obviously, as there are IPv6 PtP addresses, too,
// IFA_LOCAL should also be handled for IPv6.
2019-01-12 04:58:27 +00:00
if local != nil {
2020-08-10 17:43:49 +00:00
if family == FAMILY_V4 && local.IP.Equal(dst.IP) {
addr.IPNet = dst
} else {
addr.IPNet = local
addr.Peer = dst
}
2019-01-12 04:58:27 +00:00
} else {
addr.IPNet = dst
}
2020-08-10 17:43:49 +00:00
2019-01-12 04:58:27 +00:00
addr.Scope = int(msg.Scope)
return
}
type AddrUpdate struct {
LinkAddress net.IPNet
LinkIndex int
Flags int
Scope int
PreferedLft int
ValidLft int
NewAddr bool // true=added false=deleted
}
// AddrSubscribe takes a chan down which notifications will be sent
// when addresses change. Close the 'done' chan to stop subscription.
func AddrSubscribe(ch chan<- AddrUpdate, done <-chan struct{}) error {
2020-08-10 17:43:49 +00:00
return addrSubscribeAt(netns.None(), netns.None(), ch, done, nil, false, 0)
2019-01-12 04:58:27 +00:00
}
// AddrSubscribeAt works like AddrSubscribe plus it allows the caller
// to choose the network namespace in which to subscribe (ns).
func AddrSubscribeAt(ns netns.NsHandle, ch chan<- AddrUpdate, done <-chan struct{}) error {
2020-08-10 17:43:49 +00:00
return addrSubscribeAt(ns, netns.None(), ch, done, nil, false, 0)
2019-01-12 04:58:27 +00:00
}
// AddrSubscribeOptions contains a set of options to use with
// AddrSubscribeWithOptions.
type AddrSubscribeOptions struct {
2020-08-10 17:43:49 +00:00
Namespace *netns.NsHandle
ErrorCallback func(error)
ListExisting bool
ReceiveBufferSize int
2019-01-12 04:58:27 +00:00
}
// AddrSubscribeWithOptions work like AddrSubscribe but enable to
// provide additional options to modify the behavior. Currently, the
// namespace can be provided as well as an error callback.
func AddrSubscribeWithOptions(ch chan<- AddrUpdate, done <-chan struct{}, options AddrSubscribeOptions) error {
if options.Namespace == nil {
none := netns.None()
options.Namespace = &none
}
2020-08-10 17:43:49 +00:00
return addrSubscribeAt(*options.Namespace, netns.None(), ch, done, options.ErrorCallback, options.ListExisting, options.ReceiveBufferSize)
2019-01-12 04:58:27 +00:00
}
2020-08-10 17:43:49 +00:00
func addrSubscribeAt(newNs, curNs netns.NsHandle, ch chan<- AddrUpdate, done <-chan struct{}, cberr func(error), listExisting bool, rcvbuf int) error {
2019-09-27 21:51:53 +00:00
s, err := nl.SubscribeAt(newNs, curNs, unix.NETLINK_ROUTE, unix.RTNLGRP_IPV4_IFADDR, unix.RTNLGRP_IPV6_IFADDR)
2019-01-12 04:58:27 +00:00
if err != nil {
return err
}
if done != nil {
go func() {
<-done
s.Close()
}()
}
2020-08-10 17:43:49 +00:00
if rcvbuf != 0 {
err = pkgHandle.SetSocketReceiveBufferSize(rcvbuf, false)
if err != nil {
return err
}
}
2019-09-27 21:51:53 +00:00
if listExisting {
req := pkgHandle.newNetlinkRequest(unix.RTM_GETADDR,
unix.NLM_F_DUMP)
infmsg := nl.NewIfInfomsg(unix.AF_UNSPEC)
req.AddData(infmsg)
if err := s.Send(req); err != nil {
return err
}
}
2019-01-12 04:58:27 +00:00
go func() {
defer close(ch)
for {
2020-08-10 17:43:49 +00:00
msgs, from, err := s.Receive()
2019-01-12 04:58:27 +00:00
if err != nil {
if cberr != nil {
cberr(err)
}
return
}
2020-08-10 17:43:49 +00:00
if from.Pid != nl.PidKernel {
if cberr != nil {
cberr(fmt.Errorf("Wrong sender portid %d, expected %d", from.Pid, nl.PidKernel))
}
continue
}
2019-01-12 04:58:27 +00:00
for _, m := range msgs {
2019-09-27 21:51:53 +00:00
if m.Header.Type == unix.NLMSG_DONE {
continue
}
if m.Header.Type == unix.NLMSG_ERROR {
native := nl.NativeEndian()
error := int32(native.Uint32(m.Data[0:4]))
if error == 0 {
continue
}
if cberr != nil {
2020-08-10 17:43:49 +00:00
cberr(fmt.Errorf("error message: %v",
syscall.Errno(-error)))
2019-09-27 21:51:53 +00:00
}
2020-08-10 17:43:49 +00:00
continue
2019-09-27 21:51:53 +00:00
}
2019-01-12 04:58:27 +00:00
msgType := m.Header.Type
2019-09-27 21:51:53 +00:00
if msgType != unix.RTM_NEWADDR && msgType != unix.RTM_DELADDR {
2019-01-12 04:58:27 +00:00
if cberr != nil {
cberr(fmt.Errorf("bad message type: %d", msgType))
}
2020-08-10 17:43:49 +00:00
continue
2019-01-12 04:58:27 +00:00
}
addr, _, err := parseAddr(m.Data)
2019-01-12 04:58:27 +00:00
if err != nil {
if cberr != nil {
cberr(fmt.Errorf("could not parse address: %v", err))
}
2020-08-10 17:43:49 +00:00
continue
2019-01-12 04:58:27 +00:00
}
ch <- AddrUpdate{LinkAddress: *addr.IPNet,
LinkIndex: addr.LinkIndex,
2019-09-27 21:51:53 +00:00
NewAddr: msgType == unix.RTM_NEWADDR,
2019-01-12 04:58:27 +00:00
Flags: addr.Flags,
Scope: addr.Scope,
PreferedLft: addr.PreferedLft,
ValidLft: addr.ValidLft}
}
}
}()
return nil
}