2000-07-04 16:43:14 +00:00
|
|
|
/* $FreeBSD$ */
|
2003-11-13 16:02:44 +00:00
|
|
|
/* $KAME: ndp.c,v 1.104 2003/06/27 07:48:39 itojun Exp $ */
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2017-11-20 19:49:47 +00:00
|
|
|
/*-
|
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
2000-01-06 12:40:54 +00:00
|
|
|
* Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1984, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Sun Microsystems, Inc.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2017-02-28 23:42:47 +00:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
2000-01-06 12:40:54 +00:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Based on:
|
|
|
|
* "@(#) Copyright (c) 1984, 1993\n\
|
|
|
|
* The Regents of the University of California. All rights reserved.\n";
|
|
|
|
*
|
|
|
|
* "@(#)arp.c 8.2 (Berkeley) 1/2/94";
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* ndp - display, set, delete and flush neighbor cache
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/sysctl.h>
|
2013-08-06 17:10:52 +00:00
|
|
|
#include <sys/time.h>
|
2001-06-11 12:39:29 +00:00
|
|
|
#include <sys/queue.h>
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/if_dl.h>
|
|
|
|
#include <net/if_types.h>
|
|
|
|
#include <net/route.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/if_ether.h>
|
|
|
|
|
|
|
|
#include <netinet/icmp6.h>
|
|
|
|
#include <netinet6/in6_var.h>
|
|
|
|
#include <netinet6/nd6.h>
|
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
2014-05-09 14:24:02 +00:00
|
|
|
#include <ctype.h>
|
2000-01-06 12:40:54 +00:00
|
|
|
#include <netdb.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <nlist.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <paths.h>
|
|
|
|
#include <err.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
2022-07-04 08:05:58 +00:00
|
|
|
#include <libxo/xo.h>
|
2000-01-06 12:40:54 +00:00
|
|
|
#include "gmt2local.h"
|
|
|
|
|
2017-02-14 18:11:16 +00:00
|
|
|
#define NEXTADDR(w, s) \
|
|
|
|
if (rtm->rtm_addrs & (w)) { \
|
|
|
|
bcopy((char *)&s, cp, sizeof(s)); \
|
|
|
|
cp += SA_SIZE(&s); \
|
|
|
|
}
|
This main goals of this project are:
1. separating L2 tables (ARP, NDP) from the L3 routing tables
2. removing as much locking dependencies among these layers as
possible to allow for some parallelism in the search operations
3. simplify the logic in the routing code,
The most notable end result is the obsolescent of the route
cloning (RTF_CLONING) concept, which translated into code reduction
in both IPv4 ARP and IPv6 NDP related modules, and size reduction in
struct rtentry{}. The change in design obsoletes the semantics of
RTF_CLONING, RTF_WASCLONE and RTF_LLINFO routing flags. The userland
applications such as "arp" and "ndp" have been modified to reflect
those changes. The output from "netstat -r" shows only the routing
entries.
Quite a few developers have contributed to this project in the
past: Glebius Smirnoff, Luigi Rizzo, Alessandro Cerri, and
Andre Oppermann. And most recently:
- Kip Macy revised the locking code completely, thus completing
the last piece of the puzzle, Kip has also been conducting
active functional testing
- Sam Leffler has helped me improving/refactoring the code, and
provided valuable reviews
- Julian Elischer setup the perforce tree for me and has helped
me maintaining that branch before the svn conversion
2008-12-15 06:10:57 +00:00
|
|
|
|
2002-07-25 01:48:19 +00:00
|
|
|
static pid_t pid;
|
2000-07-04 16:43:14 +00:00
|
|
|
static int nflag;
|
|
|
|
static int tflag;
|
|
|
|
static int32_t thiszone; /* time difference with gmt */
|
|
|
|
static int s = -1;
|
|
|
|
static int repeat = 0;
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static char host_buf[NI_MAXHOST]; /* getnameinfo() */
|
|
|
|
static char ifix_buf[IFNAMSIZ]; /* if_indextoname() */
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2014-05-09 14:24:02 +00:00
|
|
|
static int file(char *);
|
2015-08-24 05:38:05 +00:00
|
|
|
static void getsocket(void);
|
|
|
|
static int set(int, char **);
|
|
|
|
static void get(char *);
|
|
|
|
static int delete(char *);
|
|
|
|
static void dump(struct sockaddr_in6 *, int);
|
2007-11-07 10:53:41 +00:00
|
|
|
static struct in6_nbrinfo *getnbrinfo(struct in6_addr *, int, int);
|
|
|
|
static char *ether_str(struct sockaddr_dl *);
|
2015-08-24 05:38:05 +00:00
|
|
|
static int ndp_ether_aton(char *, u_char *);
|
|
|
|
static void usage(void);
|
|
|
|
static int rtmsg(int);
|
|
|
|
static void ifinfo(char *, int, char **);
|
|
|
|
static void rtrlist(void);
|
|
|
|
static void plist(void);
|
|
|
|
static void pfx_flush(void);
|
|
|
|
static void rtr_flush(void);
|
|
|
|
static void harmonize_rtr(void);
|
2000-07-04 16:43:14 +00:00
|
|
|
#ifdef SIOCSDEFIFACE_IN6 /* XXX: check SIOCGDEFIFACE_IN6 as well? */
|
2007-11-07 10:53:41 +00:00
|
|
|
static void getdefif(void);
|
|
|
|
static void setdefif(char *);
|
2000-07-04 16:43:14 +00:00
|
|
|
#endif
|
2007-11-07 10:53:41 +00:00
|
|
|
static char *sec2str(time_t);
|
2013-08-06 17:10:52 +00:00
|
|
|
static void ts_print(const struct timeval *);
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
static const char *rtpref_str[] = {
|
2001-06-11 12:39:29 +00:00
|
|
|
"medium", /* 00 */
|
|
|
|
"high", /* 01 */
|
|
|
|
"rsv", /* 10 */
|
|
|
|
"low" /* 11 */
|
|
|
|
};
|
2003-11-13 16:02:44 +00:00
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
#define NDP_XO_VERSION "1"
|
|
|
|
|
2000-01-06 12:40:54 +00:00
|
|
|
int
|
2013-12-10 13:14:54 +00:00
|
|
|
main(int argc, char **argv)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
2015-08-24 05:38:05 +00:00
|
|
|
int ch, mode = 0;
|
|
|
|
char *arg = NULL;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
pid = getpid();
|
|
|
|
thiszone = gmt2local(0);
|
2022-07-04 08:05:58 +00:00
|
|
|
|
|
|
|
argc = xo_parse_args(argc, argv);
|
|
|
|
if (argc < 0)
|
|
|
|
exit(1);
|
|
|
|
xo_set_version(NDP_XO_VERSION);
|
|
|
|
xo_open_container("ndp");
|
|
|
|
|
2003-11-13 16:02:44 +00:00
|
|
|
while ((ch = getopt(argc, argv, "acd:f:Ii:nprstA:HPR")) != -1)
|
2003-10-17 11:46:40 +00:00
|
|
|
switch (ch) {
|
2000-01-06 12:40:54 +00:00
|
|
|
case 'a':
|
|
|
|
case 'c':
|
2003-11-13 16:02:44 +00:00
|
|
|
case 'p':
|
|
|
|
case 'r':
|
|
|
|
case 'H':
|
|
|
|
case 'P':
|
|
|
|
case 'R':
|
|
|
|
case 's':
|
|
|
|
case 'I':
|
|
|
|
if (mode) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
mode = ch;
|
|
|
|
arg = NULL;
|
2000-01-06 12:40:54 +00:00
|
|
|
break;
|
2003-11-13 16:02:44 +00:00
|
|
|
case 'f':
|
2014-05-09 14:24:02 +00:00
|
|
|
exit(file(optarg) ? 1 : 0);
|
2014-07-18 06:48:02 +00:00
|
|
|
case 'd':
|
2014-05-09 14:24:02 +00:00
|
|
|
case 'i':
|
2003-11-13 16:02:44 +00:00
|
|
|
if (mode) {
|
2000-01-06 12:40:54 +00:00
|
|
|
usage();
|
2003-11-13 16:02:44 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
mode = ch;
|
|
|
|
arg = optarg;
|
|
|
|
break;
|
2000-01-06 12:40:54 +00:00
|
|
|
case 'n':
|
|
|
|
nflag = 1;
|
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
tflag = 1;
|
|
|
|
break;
|
|
|
|
case 'A':
|
2003-11-13 16:02:44 +00:00
|
|
|
if (mode) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
mode = 'a';
|
2000-01-06 12:40:54 +00:00
|
|
|
repeat = atoi(optarg);
|
2003-11-13 16:02:44 +00:00
|
|
|
if (repeat < 0) {
|
2000-01-06 12:40:54 +00:00
|
|
|
usage();
|
2003-11-13 16:02:44 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2000-01-06 12:40:54 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
usage();
|
|
|
|
}
|
|
|
|
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
2003-11-13 16:02:44 +00:00
|
|
|
switch (mode) {
|
|
|
|
case 'a':
|
|
|
|
case 'c':
|
|
|
|
if (argc != 0) {
|
2000-01-06 12:40:54 +00:00
|
|
|
usage();
|
2003-11-13 16:02:44 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
dump(0, mode == 'c');
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
if (argc != 0) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_list("neighbor-cache");
|
2003-11-13 16:02:44 +00:00
|
|
|
delete(arg);
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_list("neighbor-cache");
|
2003-11-13 16:02:44 +00:00
|
|
|
break;
|
|
|
|
case 'I':
|
|
|
|
#ifdef SIOCSDEFIFACE_IN6 /* XXX: check SIOCGDEFIFACE_IN6 as well? */
|
|
|
|
if (argc > 1) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
} else if (argc == 1) {
|
|
|
|
if (strcmp(*argv, "delete") == 0 ||
|
|
|
|
if_nametoindex(*argv))
|
|
|
|
setdefif(*argv);
|
|
|
|
else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "invalid interface %s", *argv);
|
2003-11-13 16:02:44 +00:00
|
|
|
}
|
|
|
|
getdefif(); /* always call it to print the result */
|
|
|
|
break;
|
|
|
|
#else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "not supported yet");
|
2003-11-13 16:02:44 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
#endif
|
|
|
|
case 'p':
|
|
|
|
if (argc != 0) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2000-01-06 12:40:54 +00:00
|
|
|
plist();
|
2003-11-13 16:02:44 +00:00
|
|
|
break;
|
|
|
|
case 'i':
|
|
|
|
ifinfo(arg, argc, argv);
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
if (argc != 0) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2000-01-06 12:40:54 +00:00
|
|
|
rtrlist();
|
2003-11-13 16:02:44 +00:00
|
|
|
break;
|
|
|
|
case 's':
|
2000-01-06 12:40:54 +00:00
|
|
|
if (argc < 2 || argc > 4)
|
|
|
|
usage();
|
|
|
|
exit(set(argc, argv) ? 1 : 0);
|
2003-11-13 16:02:44 +00:00
|
|
|
case 'H':
|
|
|
|
if (argc != 0) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2000-01-06 12:40:54 +00:00
|
|
|
harmonize_rtr();
|
2003-11-13 16:02:44 +00:00
|
|
|
break;
|
|
|
|
case 'P':
|
|
|
|
if (argc != 0) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2000-01-06 12:40:54 +00:00
|
|
|
pfx_flush();
|
2003-11-13 16:02:44 +00:00
|
|
|
break;
|
|
|
|
case 'R':
|
|
|
|
if (argc != 0) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2000-01-06 12:40:54 +00:00
|
|
|
rtr_flush();
|
2003-11-13 16:02:44 +00:00
|
|
|
break;
|
|
|
|
case 0:
|
|
|
|
if (argc != 1) {
|
|
|
|
usage();
|
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
get(argv[0]);
|
|
|
|
break;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_container("ndp");
|
|
|
|
xo_finish();
|
2000-01-06 12:40:54 +00:00
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Process a file to set standard ndp entries
|
|
|
|
*/
|
2014-05-09 14:24:02 +00:00
|
|
|
static int
|
2013-12-10 13:14:54 +00:00
|
|
|
file(char *name)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
FILE *fp;
|
|
|
|
int i, retval;
|
2014-05-09 14:24:02 +00:00
|
|
|
char line[100], arg[5][50], *args[5], *p;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2014-05-09 14:24:02 +00:00
|
|
|
if ((fp = fopen(name, "r")) == NULL)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "cannot open %s", name);
|
2000-01-06 12:40:54 +00:00
|
|
|
args[0] = &arg[0][0];
|
|
|
|
args[1] = &arg[1][0];
|
|
|
|
args[2] = &arg[2][0];
|
|
|
|
args[3] = &arg[3][0];
|
|
|
|
args[4] = &arg[4][0];
|
|
|
|
retval = 0;
|
2007-03-06 09:32:41 +00:00
|
|
|
while (fgets(line, sizeof(line), fp) != NULL) {
|
2014-05-09 14:24:02 +00:00
|
|
|
if ((p = strchr(line, '#')) != NULL)
|
|
|
|
*p = '\0';
|
|
|
|
for (p = line; isblank(*p); p++);
|
|
|
|
if (*p == '\n' || *p == '\0')
|
|
|
|
continue;
|
2003-11-13 16:02:44 +00:00
|
|
|
i = sscanf(line, "%49s %49s %49s %49s %49s",
|
|
|
|
arg[0], arg[1], arg[2], arg[3], arg[4]);
|
2000-01-06 12:40:54 +00:00
|
|
|
if (i < 2) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("bad line: %s", line);
|
2000-01-06 12:40:54 +00:00
|
|
|
retval = 1;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (set(i, args))
|
|
|
|
retval = 1;
|
|
|
|
}
|
|
|
|
fclose(fp);
|
|
|
|
return (retval);
|
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2000-01-06 12:40:54 +00:00
|
|
|
getsocket()
|
|
|
|
{
|
|
|
|
if (s < 0) {
|
|
|
|
s = socket(PF_ROUTE, SOCK_RAW, 0);
|
|
|
|
if (s < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2003-10-17 11:46:40 +00:00
|
|
|
/* NOTREACHED */
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static struct sockaddr_in6 so_mask = {
|
|
|
|
.sin6_len = sizeof(so_mask),
|
|
|
|
.sin6_family = AF_INET6
|
|
|
|
};
|
|
|
|
static struct sockaddr_in6 blank_sin = {
|
|
|
|
.sin6_len = sizeof(blank_sin),
|
|
|
|
.sin6_family = AF_INET6
|
|
|
|
};
|
|
|
|
static struct sockaddr_in6 sin_m;
|
|
|
|
static struct sockaddr_dl blank_sdl = {
|
|
|
|
.sdl_len = sizeof(blank_sdl),
|
|
|
|
.sdl_family = AF_LINK
|
|
|
|
};
|
|
|
|
static struct sockaddr_dl sdl_m;
|
|
|
|
static time_t expire_time;
|
|
|
|
static int flags, found_entry;
|
|
|
|
static struct {
|
2000-01-06 12:40:54 +00:00
|
|
|
struct rt_msghdr m_rtm;
|
|
|
|
char m_space[512];
|
2015-08-24 05:38:05 +00:00
|
|
|
} m_rtmsg;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Set an individual neighbor cache entry
|
|
|
|
*/
|
2015-08-24 05:38:05 +00:00
|
|
|
static int
|
2013-12-10 13:14:54 +00:00
|
|
|
set(int argc, char **argv)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
register struct sockaddr_in6 *sin = &sin_m;
|
|
|
|
register struct sockaddr_dl *sdl;
|
|
|
|
register struct rt_msghdr *rtm = &(m_rtmsg.m_rtm);
|
|
|
|
struct addrinfo hints, *res;
|
|
|
|
int gai_error;
|
|
|
|
u_char *ea;
|
|
|
|
char *host = argv[0], *eaddr = argv[1];
|
|
|
|
|
|
|
|
getsocket();
|
|
|
|
argc -= 2;
|
|
|
|
argv += 2;
|
|
|
|
sdl_m = blank_sdl;
|
|
|
|
sin_m = blank_sin;
|
|
|
|
|
|
|
|
bzero(&hints, sizeof(hints));
|
|
|
|
hints.ai_family = AF_INET6;
|
|
|
|
gai_error = getaddrinfo(host, NULL, &hints, &res);
|
|
|
|
if (gai_error) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("%s: %s", host, gai_strerror(gai_error));
|
2000-01-06 12:40:54 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
sin->sin6_addr = ((struct sockaddr_in6 *)res->ai_addr)->sin6_addr;
|
2012-12-05 19:45:24 +00:00
|
|
|
sin->sin6_scope_id =
|
|
|
|
((struct sockaddr_in6 *)res->ai_addr)->sin6_scope_id;
|
2000-01-06 12:40:54 +00:00
|
|
|
ea = (u_char *)LLADDR(&sdl_m);
|
|
|
|
if (ndp_ether_aton(eaddr, ea) == 0)
|
|
|
|
sdl_m.sdl_alen = 6;
|
|
|
|
flags = expire_time = 0;
|
|
|
|
while (argc-- > 0) {
|
|
|
|
if (strncmp(argv[0], "temp", 4) == 0) {
|
2013-08-06 17:10:52 +00:00
|
|
|
struct timeval now;
|
2003-10-17 11:46:40 +00:00
|
|
|
|
2013-08-06 17:10:52 +00:00
|
|
|
gettimeofday(&now, 0);
|
2013-08-05 20:13:02 +00:00
|
|
|
expire_time = now.tv_sec + 20 * 60;
|
2000-07-04 16:43:14 +00:00
|
|
|
} else if (strncmp(argv[0], "proxy", 5) == 0)
|
|
|
|
flags |= RTF_ANNOUNCE;
|
2000-01-06 12:40:54 +00:00
|
|
|
argv++;
|
|
|
|
}
|
|
|
|
if (rtmsg(RTM_GET) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "RTM_GET(%s) failed", host);
|
2003-10-17 11:46:40 +00:00
|
|
|
/* NOTREACHED */
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
sin = (struct sockaddr_in6 *)(rtm + 1);
|
2013-12-10 13:34:28 +00:00
|
|
|
sdl = (struct sockaddr_dl *)(ALIGN(sin->sin6_len) + (char *)sin);
|
2000-01-06 12:40:54 +00:00
|
|
|
if (IN6_ARE_ADDR_EQUAL(&sin->sin6_addr, &sin_m.sin6_addr)) {
|
|
|
|
if (sdl->sdl_family == AF_LINK &&
|
2003-11-13 16:02:44 +00:00
|
|
|
!(rtm->rtm_flags & RTF_GATEWAY)) {
|
|
|
|
switch (sdl->sdl_type) {
|
|
|
|
case IFT_ETHER: case IFT_FDDI: case IFT_ISO88023:
|
|
|
|
case IFT_ISO88024: case IFT_ISO88025:
|
2010-08-06 15:09:21 +00:00
|
|
|
case IFT_L2VLAN: case IFT_BRIDGE:
|
2003-11-13 16:02:44 +00:00
|
|
|
goto overwrite;
|
|
|
|
}
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("cannot configure a new entry");
|
2000-07-04 16:43:14 +00:00
|
|
|
return 1;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2000-01-06 12:40:54 +00:00
|
|
|
overwrite:
|
|
|
|
if (sdl->sdl_family != AF_LINK) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("cannot intuit interface index and type for %s", host);
|
2000-01-06 12:40:54 +00:00
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
sdl_m.sdl_type = sdl->sdl_type;
|
|
|
|
sdl_m.sdl_index = sdl->sdl_index;
|
|
|
|
return (rtmsg(RTM_ADD));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Display an individual neighbor cache entry
|
|
|
|
*/
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2013-12-10 13:14:54 +00:00
|
|
|
get(char *host)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
struct sockaddr_in6 *sin = &sin_m;
|
|
|
|
struct addrinfo hints, *res;
|
|
|
|
int gai_error;
|
|
|
|
|
|
|
|
sin_m = blank_sin;
|
|
|
|
bzero(&hints, sizeof(hints));
|
|
|
|
hints.ai_family = AF_INET6;
|
|
|
|
gai_error = getaddrinfo(host, NULL, &hints, &res);
|
|
|
|
if (gai_error) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("%s: %s", host, gai_strerror(gai_error));
|
2000-01-06 12:40:54 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
sin->sin6_addr = ((struct sockaddr_in6 *)res->ai_addr)->sin6_addr;
|
2013-12-10 14:17:07 +00:00
|
|
|
sin->sin6_scope_id =
|
|
|
|
((struct sockaddr_in6 *)res->ai_addr)->sin6_scope_id;
|
|
|
|
dump(sin, 0);
|
2000-01-06 12:40:54 +00:00
|
|
|
if (found_entry == 0) {
|
|
|
|
getnameinfo((struct sockaddr *)sin, sin->sin6_len, host_buf,
|
2003-10-17 11:46:40 +00:00
|
|
|
sizeof(host_buf), NULL ,0,
|
|
|
|
(nflag ? NI_NUMERICHOST : 0));
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "%s (%s) -- no entry", host, host_buf);
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Delete a neighbor cache entry
|
|
|
|
*/
|
2015-08-24 05:38:05 +00:00
|
|
|
static int
|
2013-12-10 13:14:54 +00:00
|
|
|
delete(char *host)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
struct sockaddr_in6 *sin = &sin_m;
|
|
|
|
register struct rt_msghdr *rtm = &m_rtmsg.m_rtm;
|
This main goals of this project are:
1. separating L2 tables (ARP, NDP) from the L3 routing tables
2. removing as much locking dependencies among these layers as
possible to allow for some parallelism in the search operations
3. simplify the logic in the routing code,
The most notable end result is the obsolescent of the route
cloning (RTF_CLONING) concept, which translated into code reduction
in both IPv4 ARP and IPv6 NDP related modules, and size reduction in
struct rtentry{}. The change in design obsoletes the semantics of
RTF_CLONING, RTF_WASCLONE and RTF_LLINFO routing flags. The userland
applications such as "arp" and "ndp" have been modified to reflect
those changes. The output from "netstat -r" shows only the routing
entries.
Quite a few developers have contributed to this project in the
past: Glebius Smirnoff, Luigi Rizzo, Alessandro Cerri, and
Andre Oppermann. And most recently:
- Kip Macy revised the locking code completely, thus completing
the last piece of the puzzle, Kip has also been conducting
active functional testing
- Sam Leffler has helped me improving/refactoring the code, and
provided valuable reviews
- Julian Elischer setup the perforce tree for me and has helped
me maintaining that branch before the svn conversion
2008-12-15 06:10:57 +00:00
|
|
|
register char *cp = m_rtmsg.m_space;
|
2000-01-06 12:40:54 +00:00
|
|
|
struct sockaddr_dl *sdl;
|
|
|
|
struct addrinfo hints, *res;
|
|
|
|
int gai_error;
|
|
|
|
|
|
|
|
getsocket();
|
|
|
|
sin_m = blank_sin;
|
|
|
|
|
|
|
|
bzero(&hints, sizeof(hints));
|
|
|
|
hints.ai_family = AF_INET6;
|
|
|
|
gai_error = getaddrinfo(host, NULL, &hints, &res);
|
|
|
|
if (gai_error) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("%s: %s", host, gai_strerror(gai_error));
|
2000-01-06 12:40:54 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
sin->sin6_addr = ((struct sockaddr_in6 *)res->ai_addr)->sin6_addr;
|
2012-12-05 19:45:24 +00:00
|
|
|
sin->sin6_scope_id =
|
|
|
|
((struct sockaddr_in6 *)res->ai_addr)->sin6_scope_id;
|
2000-01-06 12:40:54 +00:00
|
|
|
if (rtmsg(RTM_GET) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "RTM_GET(%s) failed", host);
|
2003-10-17 11:46:40 +00:00
|
|
|
/* NOTREACHED */
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
sin = (struct sockaddr_in6 *)(rtm + 1);
|
2013-12-10 13:34:28 +00:00
|
|
|
sdl = (struct sockaddr_dl *)(ALIGN(sin->sin6_len) + (char *)sin);
|
2000-01-06 12:40:54 +00:00
|
|
|
if (IN6_ARE_ADDR_EQUAL(&sin->sin6_addr, &sin_m.sin6_addr)) {
|
|
|
|
if (sdl->sdl_family == AF_LINK &&
|
2000-07-04 16:43:14 +00:00
|
|
|
!(rtm->rtm_flags & RTF_GATEWAY)) {
|
2001-06-11 12:39:29 +00:00
|
|
|
goto delete;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("delete: cannot delete non-NDP entry");
|
2000-07-04 16:43:14 +00:00
|
|
|
return 1;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2000-01-06 12:40:54 +00:00
|
|
|
delete:
|
|
|
|
if (sdl->sdl_family != AF_LINK) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("cannot locate %s", host);
|
2000-01-06 12:40:54 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2017-02-14 18:11:16 +00:00
|
|
|
/*
|
|
|
|
* need to reinit the field because it has rt_key
|
|
|
|
* but we want the actual address
|
|
|
|
*/
|
This main goals of this project are:
1. separating L2 tables (ARP, NDP) from the L3 routing tables
2. removing as much locking dependencies among these layers as
possible to allow for some parallelism in the search operations
3. simplify the logic in the routing code,
The most notable end result is the obsolescent of the route
cloning (RTF_CLONING) concept, which translated into code reduction
in both IPv4 ARP and IPv6 NDP related modules, and size reduction in
struct rtentry{}. The change in design obsoletes the semantics of
RTF_CLONING, RTF_WASCLONE and RTF_LLINFO routing flags. The userland
applications such as "arp" and "ndp" have been modified to reflect
those changes. The output from "netstat -r" shows only the routing
entries.
Quite a few developers have contributed to this project in the
past: Glebius Smirnoff, Luigi Rizzo, Alessandro Cerri, and
Andre Oppermann. And most recently:
- Kip Macy revised the locking code completely, thus completing
the last piece of the puzzle, Kip has also been conducting
active functional testing
- Sam Leffler has helped me improving/refactoring the code, and
provided valuable reviews
- Julian Elischer setup the perforce tree for me and has helped
me maintaining that branch before the svn conversion
2008-12-15 06:10:57 +00:00
|
|
|
NEXTADDR(RTA_DST, sin_m);
|
2008-12-26 19:45:24 +00:00
|
|
|
rtm->rtm_flags |= RTF_LLDATA;
|
2000-01-06 12:40:54 +00:00
|
|
|
if (rtmsg(RTM_DELETE) == 0) {
|
2012-12-05 19:45:24 +00:00
|
|
|
getnameinfo((struct sockaddr *)sin,
|
|
|
|
sin->sin6_len, host_buf,
|
2003-10-17 11:46:40 +00:00
|
|
|
sizeof(host_buf), NULL, 0,
|
|
|
|
(nflag ? NI_NUMERICHOST : 0));
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_instance("neighbor-cache");
|
|
|
|
|
|
|
|
char *ifname = if_indextoname(sdl->sdl_index, ifix_buf);
|
|
|
|
if (ifname == NULL) {
|
|
|
|
strlcpy(ifix_buf, "?", sizeof(ifix_buf));
|
|
|
|
ifname = ifix_buf;
|
|
|
|
}
|
|
|
|
char abuf[INET6_ADDRSTRLEN];
|
|
|
|
inet_ntop(AF_INET6, &sin->sin6_addr, abuf, sizeof(abuf));
|
|
|
|
|
|
|
|
xo_emit("{:hostname/%s}{d:/ (%s) deleted\n}", host, host_buf);
|
|
|
|
xo_emit("{e:address/%s}{e:interface/%s}", abuf, ifname);
|
|
|
|
xo_close_instance("neighbor-cache");
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-11-13 16:02:44 +00:00
|
|
|
#define W_ADDR 36
|
2001-06-11 12:39:29 +00:00
|
|
|
#define W_LL 17
|
|
|
|
#define W_IF 6
|
|
|
|
|
2000-01-06 12:40:54 +00:00
|
|
|
/*
|
|
|
|
* Dump the entire neighbor cache
|
|
|
|
*/
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2013-12-10 14:17:07 +00:00
|
|
|
dump(struct sockaddr_in6 *addr, int cflag)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
int mib[6];
|
|
|
|
size_t needed;
|
2000-07-04 16:43:14 +00:00
|
|
|
char *lim, *buf, *next;
|
2000-01-06 12:40:54 +00:00
|
|
|
struct rt_msghdr *rtm;
|
|
|
|
struct sockaddr_in6 *sin;
|
|
|
|
struct sockaddr_dl *sdl;
|
2013-08-06 17:10:52 +00:00
|
|
|
struct timeval now;
|
2018-08-23 10:38:59 +00:00
|
|
|
time_t expire;
|
2000-01-06 12:40:54 +00:00
|
|
|
int addrwidth;
|
2001-06-11 12:39:29 +00:00
|
|
|
int llwidth;
|
|
|
|
int ifwidth;
|
2000-07-04 16:43:14 +00:00
|
|
|
char flgbuf[8];
|
2001-06-11 12:39:29 +00:00
|
|
|
char *ifname;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
/* Print header */
|
2022-07-04 08:05:58 +00:00
|
|
|
if (!tflag && !cflag) {
|
|
|
|
char xobuf[200];
|
|
|
|
snprintf(xobuf, sizeof(xobuf),
|
|
|
|
"{T:/%%-%d.%ds} {T:/%%-%d.%ds} {T:/%%%d.%ds} {T:/%%-9.9s} {T:%%1s} {T:%%5s}\n",
|
|
|
|
W_ADDR, W_ADDR, W_LL, W_LL, W_IF, W_IF);
|
|
|
|
xo_emit(xobuf, "Neighbor", "Linklayer Address", "Netif", "Expire", "S", "Flags");
|
|
|
|
}
|
|
|
|
xo_open_list("neighbor-cache");
|
2000-01-06 12:40:54 +00:00
|
|
|
again:;
|
|
|
|
mib[0] = CTL_NET;
|
|
|
|
mib[1] = PF_ROUTE;
|
|
|
|
mib[2] = 0;
|
|
|
|
mib[3] = AF_INET6;
|
|
|
|
mib[4] = NET_RT_FLAGS;
|
This main goals of this project are:
1. separating L2 tables (ARP, NDP) from the L3 routing tables
2. removing as much locking dependencies among these layers as
possible to allow for some parallelism in the search operations
3. simplify the logic in the routing code,
The most notable end result is the obsolescent of the route
cloning (RTF_CLONING) concept, which translated into code reduction
in both IPv4 ARP and IPv6 NDP related modules, and size reduction in
struct rtentry{}. The change in design obsoletes the semantics of
RTF_CLONING, RTF_WASCLONE and RTF_LLINFO routing flags. The userland
applications such as "arp" and "ndp" have been modified to reflect
those changes. The output from "netstat -r" shows only the routing
entries.
Quite a few developers have contributed to this project in the
past: Glebius Smirnoff, Luigi Rizzo, Alessandro Cerri, and
Andre Oppermann. And most recently:
- Kip Macy revised the locking code completely, thus completing
the last piece of the puzzle, Kip has also been conducting
active functional testing
- Sam Leffler has helped me improving/refactoring the code, and
provided valuable reviews
- Julian Elischer setup the perforce tree for me and has helped
me maintaining that branch before the svn conversion
2008-12-15 06:10:57 +00:00
|
|
|
#ifdef RTF_LLINFO
|
2000-01-06 12:40:54 +00:00
|
|
|
mib[5] = RTF_LLINFO;
|
This main goals of this project are:
1. separating L2 tables (ARP, NDP) from the L3 routing tables
2. removing as much locking dependencies among these layers as
possible to allow for some parallelism in the search operations
3. simplify the logic in the routing code,
The most notable end result is the obsolescent of the route
cloning (RTF_CLONING) concept, which translated into code reduction
in both IPv4 ARP and IPv6 NDP related modules, and size reduction in
struct rtentry{}. The change in design obsoletes the semantics of
RTF_CLONING, RTF_WASCLONE and RTF_LLINFO routing flags. The userland
applications such as "arp" and "ndp" have been modified to reflect
those changes. The output from "netstat -r" shows only the routing
entries.
Quite a few developers have contributed to this project in the
past: Glebius Smirnoff, Luigi Rizzo, Alessandro Cerri, and
Andre Oppermann. And most recently:
- Kip Macy revised the locking code completely, thus completing
the last piece of the puzzle, Kip has also been conducting
active functional testing
- Sam Leffler has helped me improving/refactoring the code, and
provided valuable reviews
- Julian Elischer setup the perforce tree for me and has helped
me maintaining that branch before the svn conversion
2008-12-15 06:10:57 +00:00
|
|
|
#else
|
|
|
|
mib[5] = 0;
|
|
|
|
#endif
|
2000-01-06 12:40:54 +00:00
|
|
|
if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "sysctl(PF_ROUTE estimate)");
|
2000-01-06 12:40:54 +00:00
|
|
|
if (needed > 0) {
|
|
|
|
if ((buf = malloc(needed)) == NULL)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "malloc");
|
2000-01-06 12:40:54 +00:00
|
|
|
if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "sysctl(PF_ROUTE, NET_RT_FLAGS)");
|
2000-01-06 12:40:54 +00:00
|
|
|
lim = buf + needed;
|
|
|
|
} else
|
|
|
|
buf = lim = NULL;
|
|
|
|
|
|
|
|
for (next = buf; next && next < lim; next += rtm->rtm_msglen) {
|
|
|
|
int isrouter = 0, prbs = 0;
|
|
|
|
|
|
|
|
rtm = (struct rt_msghdr *)next;
|
|
|
|
sin = (struct sockaddr_in6 *)(rtm + 1);
|
2017-02-14 18:11:16 +00:00
|
|
|
sdl = (struct sockaddr_dl *)((char *)sin +
|
|
|
|
ALIGN(sin->sin6_len));
|
2001-06-11 12:39:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Some OSes can produce a route that has the LINK flag but
|
|
|
|
* has a non-AF_LINK gateway (e.g. fe80::xx%lo0 on FreeBSD
|
|
|
|
* and BSD/OS, where xx is not the interface identifier on
|
|
|
|
* lo0). Such routes entry would annoy getnbrinfo() below,
|
|
|
|
* so we skip them.
|
|
|
|
* XXX: such routes should have the GATEWAY flag, not the
|
2003-10-17 11:46:40 +00:00
|
|
|
* LINK flag. However, there is rotten routing software
|
2001-06-11 12:39:29 +00:00
|
|
|
* that advertises all routes that have the GATEWAY flag.
|
|
|
|
* Thus, KAME kernel intentionally does not set the LINK flag.
|
|
|
|
* What is to be fixed is not ndp, but such routing software
|
|
|
|
* (and the kernel workaround)...
|
|
|
|
*/
|
|
|
|
if (sdl->sdl_family != AF_LINK)
|
|
|
|
continue;
|
|
|
|
|
2003-11-13 16:02:44 +00:00
|
|
|
if (!(rtm->rtm_flags & RTF_HOST))
|
|
|
|
continue;
|
|
|
|
|
2000-01-06 12:40:54 +00:00
|
|
|
if (addr) {
|
2013-12-10 14:17:07 +00:00
|
|
|
if (IN6_ARE_ADDR_EQUAL(&addr->sin6_addr,
|
|
|
|
&sin->sin6_addr) == 0 ||
|
|
|
|
addr->sin6_scope_id != sin->sin6_scope_id)
|
2000-01-06 12:40:54 +00:00
|
|
|
continue;
|
|
|
|
found_entry = 1;
|
|
|
|
} else if (IN6_IS_ADDR_MULTICAST(&sin->sin6_addr))
|
|
|
|
continue;
|
|
|
|
if (IN6_IS_ADDR_LINKLOCAL(&sin->sin6_addr) ||
|
|
|
|
IN6_IS_ADDR_MC_LINKLOCAL(&sin->sin6_addr)) {
|
|
|
|
/* XXX: should scope id be filled in the kernel? */
|
|
|
|
if (sin->sin6_scope_id == 0)
|
|
|
|
sin->sin6_scope_id = sdl->sdl_index;
|
|
|
|
}
|
|
|
|
getnameinfo((struct sockaddr *)sin, sin->sin6_len, host_buf,
|
2003-10-17 11:46:40 +00:00
|
|
|
sizeof(host_buf), NULL, 0, (nflag ? NI_NUMERICHOST : 0));
|
2003-11-13 16:02:44 +00:00
|
|
|
if (cflag) {
|
2001-08-09 19:40:35 +00:00
|
|
|
#ifdef RTF_WASCLONED
|
|
|
|
if (rtm->rtm_flags & RTF_WASCLONED)
|
|
|
|
delete(host_buf);
|
2003-11-13 16:02:44 +00:00
|
|
|
#elif defined(RTF_CLONED)
|
|
|
|
if (rtm->rtm_flags & RTF_CLONED)
|
|
|
|
delete(host_buf);
|
2001-08-09 19:40:35 +00:00
|
|
|
#else
|
2015-09-27 04:54:29 +00:00
|
|
|
if (rtm->rtm_flags & RTF_PINNED)
|
|
|
|
continue;
|
2000-10-09 09:28:49 +00:00
|
|
|
delete(host_buf);
|
2001-08-09 19:40:35 +00:00
|
|
|
#endif
|
2000-10-09 09:28:49 +00:00
|
|
|
continue;
|
|
|
|
}
|
2013-08-06 17:10:52 +00:00
|
|
|
gettimeofday(&now, 0);
|
2000-01-06 12:40:54 +00:00
|
|
|
if (tflag)
|
2013-08-05 20:13:02 +00:00
|
|
|
ts_print(&now);
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2001-06-11 12:39:29 +00:00
|
|
|
addrwidth = strlen(host_buf);
|
|
|
|
if (addrwidth < W_ADDR)
|
|
|
|
addrwidth = W_ADDR;
|
|
|
|
llwidth = strlen(ether_str(sdl));
|
|
|
|
if (W_ADDR + W_LL - addrwidth > llwidth)
|
|
|
|
llwidth = W_ADDR + W_LL - addrwidth;
|
|
|
|
ifname = if_indextoname(sdl->sdl_index, ifix_buf);
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ifname == NULL) {
|
|
|
|
strlcpy(ifix_buf, "?", sizeof(ifix_buf));
|
|
|
|
ifname = ifix_buf;
|
|
|
|
}
|
2001-06-11 12:39:29 +00:00
|
|
|
ifwidth = strlen(ifname);
|
|
|
|
if (W_ADDR + W_LL + W_IF - addrwidth - llwidth > ifwidth)
|
|
|
|
ifwidth = W_ADDR + W_LL + W_IF - addrwidth - llwidth;
|
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_instance("neighbor-cache");
|
|
|
|
/* Compose format string for libxo, as it doesn't support *.* */
|
|
|
|
char xobuf[200];
|
|
|
|
snprintf(xobuf, sizeof(xobuf),
|
|
|
|
"{:address/%%-%d.%ds/%%s} {:mac-address/%%-%d.%ds/%%s} {:interface/%%%d.%ds/%%s}",
|
|
|
|
addrwidth, addrwidth, llwidth, llwidth, ifwidth, ifwidth);
|
|
|
|
xo_emit(xobuf, host_buf, ether_str(sdl), ifname);
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2015-10-21 05:37:09 +00:00
|
|
|
/* Print neighbor discovery specific information */
|
2015-12-16 10:14:16 +00:00
|
|
|
expire = rtm->rtm_rmx.rmx_expire;
|
2022-07-04 08:05:58 +00:00
|
|
|
int expire_in = expire - now.tv_sec;
|
2015-12-16 10:14:16 +00:00
|
|
|
if (expire > now.tv_sec)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{d:/ %-9.9s}{e:expires_sec/%d}", sec2str(expire_in), expire_in);
|
2015-12-16 10:14:16 +00:00
|
|
|
else if (expire == 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{d:/ %-9.9s}{en:permanent/true}", "permanent");
|
2015-12-16 10:14:16 +00:00
|
|
|
else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{d:/ %-9.9s}{e:expires_sec/%d}", "expired", expire_in);
|
2015-12-16 10:14:16 +00:00
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
char *lle_state = "";
|
2015-12-16 10:14:16 +00:00
|
|
|
switch (rtm->rtm_rmx.rmx_state) {
|
|
|
|
case ND6_LLINFO_NOSTATE:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "N";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2001-06-11 12:39:29 +00:00
|
|
|
#ifdef ND6_LLINFO_WAITDELETE
|
2015-12-16 10:14:16 +00:00
|
|
|
case ND6_LLINFO_WAITDELETE:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "W";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2001-06-11 12:39:29 +00:00
|
|
|
#endif
|
2015-12-16 10:14:16 +00:00
|
|
|
case ND6_LLINFO_INCOMPLETE:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "I";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2015-12-16 10:14:16 +00:00
|
|
|
case ND6_LLINFO_REACHABLE:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "R";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2015-12-16 10:14:16 +00:00
|
|
|
case ND6_LLINFO_STALE:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "S";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2015-12-16 10:14:16 +00:00
|
|
|
case ND6_LLINFO_DELAY:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "D";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2015-12-16 10:14:16 +00:00
|
|
|
case ND6_LLINFO_PROBE:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "P";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2015-12-16 10:14:16 +00:00
|
|
|
default:
|
2022-07-04 08:05:58 +00:00
|
|
|
lle_state = "?";
|
2015-12-19 09:18:01 +00:00
|
|
|
break;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(" {:neighbor-state/%s}", lle_state);
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2015-12-16 10:14:16 +00:00
|
|
|
isrouter = rtm->rtm_flags & RTF_GATEWAY;
|
|
|
|
prbs = rtm->rtm_rmx.rmx_pksent;
|
|
|
|
|
2000-07-04 16:43:14 +00:00
|
|
|
/*
|
|
|
|
* other flags. R: router, P: proxy, W: ??
|
|
|
|
*/
|
|
|
|
if ((rtm->rtm_addrs & RTA_NETMASK) == 0) {
|
|
|
|
snprintf(flgbuf, sizeof(flgbuf), "%s%s",
|
2003-10-17 11:46:40 +00:00
|
|
|
isrouter ? "R" : "",
|
|
|
|
(rtm->rtm_flags & RTF_ANNOUNCE) ? "p" : "");
|
2000-07-04 16:43:14 +00:00
|
|
|
} else {
|
2017-02-14 18:11:16 +00:00
|
|
|
#if 0 /* W and P are mystery even for us */
|
2000-07-04 16:43:14 +00:00
|
|
|
sin = (struct sockaddr_in6 *)
|
2003-10-17 11:46:40 +00:00
|
|
|
(sdl->sdl_len + (char *)sdl);
|
2000-07-04 16:43:14 +00:00
|
|
|
snprintf(flgbuf, sizeof(flgbuf), "%s%s%s%s",
|
2003-10-17 11:46:40 +00:00
|
|
|
isrouter ? "R" : "",
|
|
|
|
!IN6_IS_ADDR_UNSPECIFIED(&sin->sin6_addr) ? "P" : "",
|
|
|
|
(sin->sin6_len != sizeof(struct sockaddr_in6)) ? "W" : "",
|
|
|
|
(rtm->rtm_flags & RTF_ANNOUNCE) ? "p" : "");
|
2003-11-13 16:02:44 +00:00
|
|
|
#else
|
|
|
|
snprintf(flgbuf, sizeof(flgbuf), "%s%s",
|
|
|
|
isrouter ? "R" : "",
|
|
|
|
(rtm->rtm_flags & RTF_ANNOUNCE) ? "p" : "");
|
|
|
|
#endif
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(" {:nd-flags/%s}", flgbuf);
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
if (prbs)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{d:/ %d}", prbs);
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("\n");
|
|
|
|
xo_close_instance("neighbor-cache");
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2001-06-11 12:39:29 +00:00
|
|
|
if (buf != NULL)
|
|
|
|
free(buf);
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
if (repeat) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("\n");
|
|
|
|
xo_flush();
|
2000-01-06 12:40:54 +00:00
|
|
|
sleep(repeat);
|
|
|
|
goto again;
|
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
|
|
|
|
xo_close_list("neighbor-cache");
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct in6_nbrinfo *
|
2013-12-10 13:14:54 +00:00
|
|
|
getnbrinfo(struct in6_addr *addr, int ifindex, int warning)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
static struct in6_nbrinfo nbi;
|
2018-08-23 10:38:59 +00:00
|
|
|
int sock;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
bzero(&nbi, sizeof(nbi));
|
|
|
|
if_indextoname(ifindex, nbi.ifname);
|
|
|
|
nbi.addr = *addr;
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCGNBRINFO_IN6, (caddr_t)&nbi) < 0) {
|
2000-07-04 16:43:14 +00:00
|
|
|
if (warning)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warn("ioctl(SIOCGNBRINFO_IN6)");
|
2018-08-23 10:38:59 +00:00
|
|
|
close(sock);
|
2000-01-06 12:40:54 +00:00
|
|
|
return(NULL);
|
|
|
|
}
|
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
close(sock);
|
2000-01-06 12:40:54 +00:00
|
|
|
return(&nbi);
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *
|
2011-01-08 01:57:23 +00:00
|
|
|
ether_str(struct sockaddr_dl *sdl)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
2003-10-17 11:46:40 +00:00
|
|
|
static char hbuf[NI_MAXHOST];
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2011-03-21 09:40:01 +00:00
|
|
|
if (sdl->sdl_alen == ETHER_ADDR_LEN) {
|
2011-01-08 01:57:23 +00:00
|
|
|
strlcpy(hbuf, ether_ntoa((struct ether_addr *)LLADDR(sdl)),
|
|
|
|
sizeof(hbuf));
|
2011-03-21 09:40:01 +00:00
|
|
|
} else if (sdl->sdl_alen) {
|
|
|
|
int n = sdl->sdl_nlen > 0 ? sdl->sdl_nlen + 1 : 0;
|
|
|
|
snprintf(hbuf, sizeof(hbuf), "%s", link_ntoa(sdl) + n);
|
|
|
|
} else
|
2003-10-17 11:46:40 +00:00
|
|
|
snprintf(hbuf, sizeof(hbuf), "(incomplete)");
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2003-10-17 11:46:40 +00:00
|
|
|
return(hbuf);
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static int
|
2013-12-10 13:14:54 +00:00
|
|
|
ndp_ether_aton(char *a, u_char *n)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
int i, o[6];
|
|
|
|
|
|
|
|
i = sscanf(a, "%x:%x:%x:%x:%x:%x", &o[0], &o[1], &o[2],
|
2003-10-17 11:46:40 +00:00
|
|
|
&o[3], &o[4], &o[5]);
|
2000-01-06 12:40:54 +00:00
|
|
|
if (i != 6) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warnx("invalid Ethernet address '%s'", a);
|
2000-01-06 12:40:54 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2003-10-17 11:46:40 +00:00
|
|
|
for (i = 0; i < 6; i++)
|
2000-01-06 12:40:54 +00:00
|
|
|
n[i] = o[i];
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2000-01-06 12:40:54 +00:00
|
|
|
usage()
|
|
|
|
{
|
2003-11-13 16:02:44 +00:00
|
|
|
printf("usage: ndp [-nt] hostname\n");
|
|
|
|
printf(" ndp [-nt] -a | -c | -p | -r | -H | -P | -R\n");
|
2001-06-11 12:39:29 +00:00
|
|
|
printf(" ndp [-nt] -A wait\n");
|
2003-11-13 16:02:44 +00:00
|
|
|
printf(" ndp [-nt] -d hostname\n");
|
|
|
|
printf(" ndp [-nt] -f filename\n");
|
|
|
|
printf(" ndp [-nt] -i interface [flags...]\n");
|
2000-07-04 16:43:14 +00:00
|
|
|
#ifdef SIOCSDEFIFACE_IN6
|
2003-11-13 16:02:44 +00:00
|
|
|
printf(" ndp [-nt] -I [interface|delete]\n");
|
2000-07-04 16:43:14 +00:00
|
|
|
#endif
|
2003-11-13 16:02:44 +00:00
|
|
|
printf(" ndp [-nt] -s nodename etheraddr [temp] [proxy]\n");
|
2000-01-06 12:40:54 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static int
|
2013-12-10 13:14:54 +00:00
|
|
|
rtmsg(int cmd)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
static int seq;
|
|
|
|
int rlen;
|
|
|
|
register struct rt_msghdr *rtm = &m_rtmsg.m_rtm;
|
|
|
|
register char *cp = m_rtmsg.m_space;
|
|
|
|
register int l;
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
if (cmd == RTM_DELETE)
|
|
|
|
goto doit;
|
|
|
|
bzero((char *)&m_rtmsg, sizeof(m_rtmsg));
|
|
|
|
rtm->rtm_flags = flags;
|
|
|
|
rtm->rtm_version = RTM_VERSION;
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
default:
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "internal wrong cmd");
|
2000-01-06 12:40:54 +00:00
|
|
|
case RTM_ADD:
|
|
|
|
rtm->rtm_addrs |= RTA_GATEWAY;
|
2003-11-13 16:02:44 +00:00
|
|
|
if (expire_time) {
|
|
|
|
rtm->rtm_rmx.rmx_expire = expire_time;
|
|
|
|
rtm->rtm_inits = RTV_EXPIRE;
|
|
|
|
}
|
2008-12-26 19:45:24 +00:00
|
|
|
rtm->rtm_flags |= (RTF_HOST | RTF_STATIC | RTF_LLDATA);
|
2000-01-06 12:40:54 +00:00
|
|
|
/* FALLTHROUGH */
|
|
|
|
case RTM_GET:
|
|
|
|
rtm->rtm_addrs |= RTA_DST;
|
|
|
|
}
|
|
|
|
|
|
|
|
NEXTADDR(RTA_DST, sin_m);
|
|
|
|
NEXTADDR(RTA_GATEWAY, sdl_m);
|
|
|
|
|
|
|
|
rtm->rtm_msglen = cp - (char *)&m_rtmsg;
|
|
|
|
doit:
|
|
|
|
l = rtm->rtm_msglen;
|
|
|
|
rtm->rtm_seq = ++seq;
|
|
|
|
rtm->rtm_type = cmd;
|
|
|
|
if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
|
|
|
|
if (errno != ESRCH || cmd != RTM_DELETE) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "writing to routing socket");
|
2003-10-17 11:46:40 +00:00
|
|
|
/* NOTREACHED */
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
do {
|
|
|
|
l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
|
2017-04-16 19:17:10 +00:00
|
|
|
} while (l > 0 && (rtm->rtm_type != cmd || rtm->rtm_seq != seq ||
|
|
|
|
rtm->rtm_pid != pid));
|
2000-01-06 12:40:54 +00:00
|
|
|
if (l < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_warn("read from routing socket");
|
2000-01-06 12:40:54 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2013-12-10 13:14:54 +00:00
|
|
|
ifinfo(char *ifname, int argc, char **argv)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
struct in6_ndireq nd;
|
2018-08-23 10:38:59 +00:00
|
|
|
int i, sock;
|
2000-07-04 16:43:14 +00:00
|
|
|
u_int32_t newflags;
|
2001-06-11 12:39:29 +00:00
|
|
|
#ifdef IPV6CTL_USETEMPADDR
|
|
|
|
u_int8_t nullbuf[8];
|
|
|
|
#endif
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2003-10-17 11:46:40 +00:00
|
|
|
/* NOTREACHED */
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
bzero(&nd, sizeof(nd));
|
2003-10-17 11:46:40 +00:00
|
|
|
strlcpy(nd.ifname, ifname, sizeof(nd.ifname));
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCGIFINFO_IN6)");
|
2003-10-17 11:46:40 +00:00
|
|
|
/* NOTREACHED */
|
2003-11-13 16:02:44 +00:00
|
|
|
}
|
2017-02-14 18:11:16 +00:00
|
|
|
#define ND nd.ndi
|
2000-07-04 16:43:14 +00:00
|
|
|
newflags = ND.flags;
|
2003-11-13 16:02:44 +00:00
|
|
|
for (i = 0; i < argc; i++) {
|
2000-07-04 16:43:14 +00:00
|
|
|
int clear = 0;
|
|
|
|
char *cp = argv[i];
|
|
|
|
|
|
|
|
if (*cp == '-') {
|
|
|
|
clear = 1;
|
|
|
|
cp++;
|
|
|
|
}
|
|
|
|
|
2017-02-14 18:11:16 +00:00
|
|
|
#define SETFLAG(s, f) do { \
|
|
|
|
if (strcmp(cp, (s)) == 0) { \
|
|
|
|
if (clear) \
|
|
|
|
newflags &= ~(f); \
|
|
|
|
else \
|
|
|
|
newflags |= (f); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
2005-10-19 15:05:42 +00:00
|
|
|
/*
|
|
|
|
* XXX: this macro is not 100% correct, in that it matches "nud" against
|
|
|
|
* "nudbogus". But we just let it go since this is minor.
|
|
|
|
*/
|
2017-02-14 18:11:16 +00:00
|
|
|
#define SETVALUE(f, v) do { \
|
|
|
|
char *valptr; \
|
|
|
|
unsigned long newval; \
|
|
|
|
v = 0; /* unspecified */ \
|
|
|
|
if (strncmp(cp, f, strlen(f)) == 0) { \
|
|
|
|
valptr = strchr(cp, '='); \
|
|
|
|
if (valptr == NULL) \
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "syntax error in %s field", (f)); \
|
2017-02-14 18:11:16 +00:00
|
|
|
errno = 0; \
|
|
|
|
newval = strtoul(++valptr, NULL, 0); \
|
|
|
|
if (errno) \
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "syntax error in %s's value", (f)); \
|
2017-02-14 18:11:16 +00:00
|
|
|
v = newval; \
|
|
|
|
} \
|
|
|
|
} while (0)
|
2005-10-19 15:05:42 +00:00
|
|
|
|
2005-10-19 16:20:18 +00:00
|
|
|
SETFLAG("disabled", ND6_IFF_IFDISABLED);
|
2000-07-04 16:43:14 +00:00
|
|
|
SETFLAG("nud", ND6_IFF_PERFORMNUD);
|
2003-08-05 14:57:11 +00:00
|
|
|
#ifdef ND6_IFF_ACCEPT_RTADV
|
|
|
|
SETFLAG("accept_rtadv", ND6_IFF_ACCEPT_RTADV);
|
|
|
|
#endif
|
2009-09-12 22:08:20 +00:00
|
|
|
#ifdef ND6_IFF_AUTO_LINKLOCAL
|
|
|
|
SETFLAG("auto_linklocal", ND6_IFF_AUTO_LINKLOCAL);
|
2013-01-09 18:18:08 +00:00
|
|
|
#endif
|
|
|
|
#ifdef ND6_IFF_NO_PREFER_IFACE
|
|
|
|
SETFLAG("no_prefer_iface", ND6_IFF_NO_PREFER_IFACE);
|
2003-11-13 16:02:44 +00:00
|
|
|
#endif
|
2005-10-19 15:05:42 +00:00
|
|
|
SETVALUE("basereachable", ND.basereachable);
|
|
|
|
SETVALUE("retrans", ND.retrans);
|
|
|
|
SETVALUE("curhlim", ND.chlim);
|
2000-07-04 16:43:14 +00:00
|
|
|
|
|
|
|
ND.flags = newflags;
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCSIFINFO_IN6, (caddr_t)&nd) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCSIFINFO_IN6)");
|
2003-10-17 11:46:40 +00:00
|
|
|
/* NOTREACHED */
|
2000-07-04 16:43:14 +00:00
|
|
|
}
|
|
|
|
#undef SETFLAG
|
2005-10-19 15:05:42 +00:00
|
|
|
#undef SETVALUE
|
2000-07-04 16:43:14 +00:00
|
|
|
}
|
|
|
|
|
2003-10-17 16:17:47 +00:00
|
|
|
if (!ND.initialized) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "%s: not initialized yet", ifname);
|
2003-10-17 16:17:47 +00:00
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCGIFINFO_IN6)");
|
2005-10-19 15:05:42 +00:00
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_container("ifinfo");
|
|
|
|
|
|
|
|
xo_emit("{e:interface/%s}", ifname);
|
|
|
|
xo_emit("linkmtu={:linkmtu/%d}", ND.linkmtu);
|
|
|
|
xo_emit(", maxmtu={:maxmtu/%d}", ND.maxmtu);
|
|
|
|
xo_emit(", curhlim={:curhlim/%d}", ND.chlim);
|
|
|
|
xo_emit("{d:/, basereachable=%ds%dms}{e:basereachable_ms/%u}",
|
|
|
|
ND.basereachable / 1000, ND.basereachable % 1000, ND.basereachable);
|
|
|
|
xo_emit("{d:/, reachable=%ds}{e:reachable_ms/%u}", ND.reachable, ND.reachable * 1000);
|
|
|
|
xo_emit("{d:/, retrans=%ds%dms}{e:retrans_ms/%u}", ND.retrans / 1000, ND.retrans % 1000,
|
|
|
|
ND.retrans);
|
2001-06-11 12:39:29 +00:00
|
|
|
#ifdef IPV6CTL_USETEMPADDR
|
|
|
|
memset(nullbuf, 0, sizeof(nullbuf));
|
|
|
|
if (memcmp(nullbuf, ND.randomid, sizeof(nullbuf)) != 0) {
|
|
|
|
int j;
|
|
|
|
u_int8_t *rbuf;
|
|
|
|
|
|
|
|
for (i = 0; i < 3; i++) {
|
2022-07-04 08:05:58 +00:00
|
|
|
const char *txt, *field;
|
2003-10-17 11:46:40 +00:00
|
|
|
switch (i) {
|
2001-06-11 12:39:29 +00:00
|
|
|
case 0:
|
2022-07-04 08:05:58 +00:00
|
|
|
txt = "\nRandom seed(0): ";
|
|
|
|
field = "seed_0";
|
2001-06-11 12:39:29 +00:00
|
|
|
rbuf = ND.randomseed0;
|
|
|
|
break;
|
|
|
|
case 1:
|
2022-07-04 08:05:58 +00:00
|
|
|
txt = "\nRandom seed(1): ";
|
|
|
|
field = "seed_1";
|
2001-06-11 12:39:29 +00:00
|
|
|
rbuf = ND.randomseed1;
|
|
|
|
break;
|
|
|
|
case 2:
|
2022-07-04 08:05:58 +00:00
|
|
|
txt = "\nRandom ID: ";
|
|
|
|
field = "random_id";
|
2001-06-11 12:39:29 +00:00
|
|
|
rbuf = ND.randomid;
|
|
|
|
break;
|
2005-10-19 15:52:00 +00:00
|
|
|
default:
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_errx(1, "impossible case for tempaddr display");
|
2001-06-11 12:39:29 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
char abuf[20], xobuf[200];
|
2001-06-11 12:39:29 +00:00
|
|
|
for (j = 0; j < 8; j++)
|
2022-07-04 08:05:58 +00:00
|
|
|
snprintf(&abuf[j * 2], sizeof(abuf), "%02X", rbuf[j]);
|
|
|
|
snprintf(xobuf, sizeof(xobuf), "%s{:%s/%%s}", txt, field);
|
|
|
|
xo_emit(xobuf, abuf);
|
2001-06-11 12:39:29 +00:00
|
|
|
}
|
|
|
|
}
|
2017-02-14 18:11:16 +00:00
|
|
|
#endif /* IPV6CTL_USETEMPADDR */
|
2000-07-04 16:43:14 +00:00
|
|
|
if (ND.flags) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("\nFlags: {e:flags/%u}", ND.flags);
|
|
|
|
xo_open_list("flags_pretty");
|
2005-10-19 16:20:18 +00:00
|
|
|
#ifdef ND6_IFF_IFDISABLED
|
|
|
|
if ((ND.flags & ND6_IFF_IFDISABLED))
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{l:%s} ", "disabled");
|
2005-10-19 16:20:18 +00:00
|
|
|
#endif
|
2003-08-05 14:57:11 +00:00
|
|
|
if ((ND.flags & ND6_IFF_PERFORMNUD))
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{l:%s} ", "nud");
|
2003-08-05 14:57:11 +00:00
|
|
|
#ifdef ND6_IFF_ACCEPT_RTADV
|
|
|
|
if ((ND.flags & ND6_IFF_ACCEPT_RTADV))
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{l:%s} ", "accept_rtadv");
|
2003-08-05 14:57:11 +00:00
|
|
|
#endif
|
2009-09-12 22:08:20 +00:00
|
|
|
#ifdef ND6_IFF_AUTO_LINKLOCAL
|
|
|
|
if ((ND.flags & ND6_IFF_AUTO_LINKLOCAL))
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{l:%s} ", "auto_linklocal");
|
2013-01-09 18:18:08 +00:00
|
|
|
#endif
|
|
|
|
#ifdef ND6_IFF_NO_PREFER_IFACE
|
|
|
|
if ((ND.flags & ND6_IFF_NO_PREFER_IFACE))
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{l:%s} ", "no_prefer_iface");
|
2003-11-13 16:02:44 +00:00
|
|
|
#endif
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_list("flags");
|
2003-11-13 16:02:44 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("\n");
|
2000-01-06 12:40:54 +00:00
|
|
|
#undef ND
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_container("ifinfo");
|
2003-10-17 11:46:40 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
close(sock);
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
2001-06-11 12:39:29 +00:00
|
|
|
#ifndef ND_RA_FLAG_RTPREF_MASK /* XXX: just for compilation on *BSD release */
|
|
|
|
#define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */
|
|
|
|
#endif
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2000-01-06 12:40:54 +00:00
|
|
|
rtrlist()
|
|
|
|
{
|
2001-06-11 12:39:29 +00:00
|
|
|
int mib[] = { CTL_NET, PF_INET6, IPPROTO_ICMPV6, ICMPV6CTL_ND6_DRLIST };
|
|
|
|
char *buf;
|
|
|
|
struct in6_defrouter *p, *ep;
|
|
|
|
size_t l;
|
2013-08-06 17:10:52 +00:00
|
|
|
struct timeval now;
|
2001-06-11 12:39:29 +00:00
|
|
|
|
|
|
|
if (sysctl(mib, sizeof(mib) / sizeof(mib[0]), NULL, &l, NULL, 0) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "sysctl(ICMPV6CTL_ND6_DRLIST)");
|
2001-06-11 12:39:29 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
2005-10-19 15:52:00 +00:00
|
|
|
if (l == 0)
|
|
|
|
return;
|
2001-06-11 12:39:29 +00:00
|
|
|
buf = malloc(l);
|
|
|
|
if (!buf) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "malloc");
|
2001-06-11 12:39:29 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
if (sysctl(mib, sizeof(mib) / sizeof(mib[0]), buf, &l, NULL, 0) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "sysctl(ICMPV6CTL_ND6_DRLIST)");
|
2001-06-11 12:39:29 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_list("router-list");
|
|
|
|
|
2001-06-11 12:39:29 +00:00
|
|
|
ep = (struct in6_defrouter *)(buf + l);
|
|
|
|
for (p = (struct in6_defrouter *)buf; p < ep; p++) {
|
|
|
|
int rtpref;
|
2022-07-04 08:05:58 +00:00
|
|
|
char abuf[INET6_ADDRSTRLEN], *paddr;
|
2001-06-11 12:39:29 +00:00
|
|
|
|
|
|
|
if (getnameinfo((struct sockaddr *)&p->rtaddr,
|
|
|
|
p->rtaddr.sin6_len, host_buf, sizeof(host_buf), NULL, 0,
|
2003-10-17 11:46:40 +00:00
|
|
|
(nflag ? NI_NUMERICHOST : 0)) != 0)
|
2001-06-11 12:39:29 +00:00
|
|
|
strlcpy(host_buf, "?", sizeof(host_buf));
|
2022-07-04 08:05:58 +00:00
|
|
|
if (nflag)
|
|
|
|
paddr = host_buf;
|
|
|
|
else {
|
|
|
|
inet_ntop(AF_INET6, &p->rtaddr.sin6_addr, abuf, sizeof(abuf));
|
|
|
|
paddr = abuf;
|
|
|
|
}
|
2003-10-17 11:46:40 +00:00
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_instance("router-list");
|
|
|
|
xo_emit("{:hostname/%s}{e:address/%s} if={:interface/%s}",
|
|
|
|
host_buf, paddr,
|
2003-10-17 11:46:40 +00:00
|
|
|
if_indextoname(p->if_index, ifix_buf));
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_list("flags_pretty");
|
|
|
|
char rflags[6] = {}, *pflags = rflags;
|
|
|
|
if (p->flags & ND_RA_FLAG_MANAGED) {
|
|
|
|
*pflags++ = 'M';
|
|
|
|
xo_emit("{el:%s}", "managed");
|
|
|
|
}
|
|
|
|
if (p->flags & ND_RA_FLAG_OTHER) {
|
|
|
|
*pflags++ = 'O';
|
|
|
|
xo_emit("{el:%s}", "other");
|
|
|
|
}
|
Initial implementation of draft-ietf-6man-ipv6only-flag.
This change defines the RA "6" (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.
If all routers agree that it is an IPv6-only link, ether_output_frame(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.
The change also updates ndp to show the "6" flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.
Further changes to tcpdump (contrib code) are availble and will
be upstreamed.
Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the "6" flag set but not understood).
We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set. Also we might want to start
IPv6 before IPv4 in the future.
All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.
Dear 6man, you have running code.
Discussed with: Bob Hinden, Brian E Carpenter
2018-10-30 20:08:48 +00:00
|
|
|
#ifdef DRAFT_IETF_6MAN_IPV6ONLY_FLAG
|
2022-07-04 08:05:58 +00:00
|
|
|
if (p->flags & ND_RA_FLAG_IPV6_ONLY) {
|
|
|
|
*pflags++ = 'S';
|
|
|
|
xo_emit("{el:%s}", "ipv6only");
|
|
|
|
}
|
Initial implementation of draft-ietf-6man-ipv6only-flag.
This change defines the RA "6" (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.
If all routers agree that it is an IPv6-only link, ether_output_frame(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.
The change also updates ndp to show the "6" flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.
Further changes to tcpdump (contrib code) are availble and will
be upstreamed.
Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the "6" flag set but not understood).
We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set. Also we might want to start
IPv6 before IPv4 in the future.
All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.
Dear 6man, you have running code.
Discussed with: Bob Hinden, Brian E Carpenter
2018-10-30 20:08:48 +00:00
|
|
|
#endif
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_list("flags_pretty");
|
|
|
|
xo_emit(", flags={:flags/%s}", rflags);
|
|
|
|
|
2001-06-11 12:39:29 +00:00
|
|
|
rtpref = ((p->flags & ND_RA_FLAG_RTPREF_MASK) >> 3) & 0xff;
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(", pref={:preference/%s}", rtpref_str[rtpref]);
|
2003-10-17 11:46:40 +00:00
|
|
|
|
2013-08-06 17:10:52 +00:00
|
|
|
gettimeofday(&now, 0);
|
2001-06-11 12:39:29 +00:00
|
|
|
if (p->expire == 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(", expire=Never\n{en:permanent/true}");
|
2001-06-11 12:39:29 +00:00
|
|
|
else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{d:/, expire=%s\n}{e:expires_sec/%ld}",
|
|
|
|
sec2str(p->expire - now.tv_sec),
|
|
|
|
(long)p->expire - now.tv_sec);
|
|
|
|
xo_close_instance("router-list");
|
2001-06-11 12:39:29 +00:00
|
|
|
}
|
|
|
|
free(buf);
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_list("router-list");
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2000-01-06 12:40:54 +00:00
|
|
|
plist()
|
|
|
|
{
|
2001-06-11 12:39:29 +00:00
|
|
|
int mib[] = { CTL_NET, PF_INET6, IPPROTO_ICMPV6, ICMPV6CTL_ND6_PRLIST };
|
|
|
|
char *buf;
|
|
|
|
struct in6_prefix *p, *ep, *n;
|
|
|
|
struct sockaddr_in6 *advrtr;
|
|
|
|
size_t l;
|
2013-08-06 17:10:52 +00:00
|
|
|
struct timeval now;
|
2001-06-11 12:39:29 +00:00
|
|
|
const int niflags = NI_NUMERICHOST;
|
|
|
|
int ninflags = nflag ? NI_NUMERICHOST : 0;
|
|
|
|
char namebuf[NI_MAXHOST];
|
|
|
|
|
|
|
|
if (sysctl(mib, sizeof(mib) / sizeof(mib[0]), NULL, &l, NULL, 0) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "sysctl(ICMPV6CTL_ND6_PRLIST)");
|
2001-06-11 12:39:29 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
buf = malloc(l);
|
|
|
|
if (!buf) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "malloc");
|
2001-06-11 12:39:29 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
if (sysctl(mib, sizeof(mib) / sizeof(mib[0]), buf, &l, NULL, 0) < 0) {
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "sysctl(ICMPV6CTL_ND6_PRLIST)");
|
2001-06-11 12:39:29 +00:00
|
|
|
/*NOTREACHED*/
|
|
|
|
}
|
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_list("prefix-list");
|
|
|
|
|
2001-06-11 12:39:29 +00:00
|
|
|
ep = (struct in6_prefix *)(buf + l);
|
|
|
|
for (p = (struct in6_prefix *)buf; p < ep; p = n) {
|
|
|
|
advrtr = (struct sockaddr_in6 *)(p + 1);
|
|
|
|
n = (struct in6_prefix *)&advrtr[p->advrtrs];
|
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_instance("prefix-list");
|
2001-06-11 12:39:29 +00:00
|
|
|
if (getnameinfo((struct sockaddr *)&p->prefix,
|
|
|
|
p->prefix.sin6_len, namebuf, sizeof(namebuf),
|
|
|
|
NULL, 0, niflags) != 0)
|
|
|
|
strlcpy(namebuf, "?", sizeof(namebuf));
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{:prefix/%s%s%d} if={:interface/%s}\n", namebuf, "/",
|
|
|
|
p->prefixlen, if_indextoname(p->if_index, ifix_buf));
|
2001-06-11 12:39:29 +00:00
|
|
|
|
2013-08-06 17:10:52 +00:00
|
|
|
gettimeofday(&now, 0);
|
2001-06-11 12:39:29 +00:00
|
|
|
/*
|
|
|
|
* meaning of fields, especially flags, is very different
|
|
|
|
* by origin. notify the difference to the users.
|
|
|
|
*/
|
2022-07-04 08:05:58 +00:00
|
|
|
char flags[10] = {}, *pflags = flags;
|
|
|
|
xo_open_list("flags_pretty");
|
|
|
|
if (p->raflags.onlink) {
|
|
|
|
*pflags++ = 'L';
|
|
|
|
xo_emit("{el:%s}", "ra_onlink");
|
|
|
|
}
|
|
|
|
if (p->raflags.autonomous) {
|
|
|
|
*pflags++ = 'A';
|
|
|
|
xo_emit("{el:%s}", "ra_autonomous");
|
|
|
|
}
|
|
|
|
if (p->flags & NDPRF_ONLINK) {
|
|
|
|
*pflags++ = 'O';
|
|
|
|
xo_emit("{el:%s}", "is_onlink");
|
|
|
|
}
|
|
|
|
if (p->flags & NDPRF_DETACHED) {
|
|
|
|
*pflags++ = 'D';
|
|
|
|
xo_emit("{el:%s}", "is_detached");
|
|
|
|
}
|
2001-06-11 12:39:29 +00:00
|
|
|
#ifdef NDPRF_HOME
|
2022-07-04 08:05:58 +00:00
|
|
|
if (p->flags & NDPRF_HOME) {
|
|
|
|
*pflags++ = 'H';
|
|
|
|
xo_emit("{el:%s}", "is_home");
|
|
|
|
}
|
2001-06-11 12:39:29 +00:00
|
|
|
#endif
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_list("flags_pretty");
|
|
|
|
xo_emit("flags={:flags/%s}", flags);
|
|
|
|
int expire_in = p->expire - now.tv_sec;
|
|
|
|
|
2001-06-11 12:39:29 +00:00
|
|
|
if (p->vltime == ND6_INFINITE_LIFETIME)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(" vltime=infinity{e:valid-lifetime/%lu}",
|
|
|
|
(unsigned long)p->vltime);
|
2001-06-11 12:39:29 +00:00
|
|
|
else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(" vltime={:valid-lifetime/%lu}",
|
|
|
|
(unsigned long)p->vltime);
|
2001-06-11 12:39:29 +00:00
|
|
|
if (p->pltime == ND6_INFINITE_LIFETIME)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(", pltime=infinity{e:preferred-lifetime/%lu}",
|
|
|
|
(unsigned long)p->pltime);
|
2001-06-11 12:39:29 +00:00
|
|
|
else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(", pltime={:preferred-lifetime/%lu}",
|
|
|
|
(unsigned long)p->pltime);
|
2001-06-11 12:39:29 +00:00
|
|
|
if (p->expire == 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(", expire=Never{en:permanent/true}");
|
2013-08-05 20:13:02 +00:00
|
|
|
else if (p->expire >= now.tv_sec)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(", expire=%s{e:expires_sec/%d}",
|
|
|
|
sec2str(expire_in), expire_in);
|
2001-06-11 12:39:29 +00:00
|
|
|
else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(", expired{e:expires_sec/%d}", expire_in);
|
|
|
|
xo_emit(", ref={:refcount/%d}", p->refcnt);
|
|
|
|
xo_emit("\n");
|
2001-06-11 12:39:29 +00:00
|
|
|
/*
|
|
|
|
* "advertising router" list is meaningful only if the prefix
|
|
|
|
* information is from RA.
|
|
|
|
*/
|
|
|
|
if (p->advrtrs) {
|
|
|
|
int j;
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
|
2003-11-13 16:02:44 +00:00
|
|
|
sin6 = advrtr;
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(" advertised by\n");
|
|
|
|
xo_open_list("advertising-routers");
|
2001-06-11 12:39:29 +00:00
|
|
|
for (j = 0; j < p->advrtrs; j++) {
|
|
|
|
struct in6_nbrinfo *nbi;
|
|
|
|
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_open_instance("advertising-routers");
|
2001-06-11 12:39:29 +00:00
|
|
|
if (getnameinfo((struct sockaddr *)sin6,
|
|
|
|
sin6->sin6_len, namebuf, sizeof(namebuf),
|
|
|
|
NULL, 0, ninflags) != 0)
|
|
|
|
strlcpy(namebuf, "?", sizeof(namebuf));
|
2022-07-04 08:05:58 +00:00
|
|
|
char abuf[INET6_ADDRSTRLEN];
|
|
|
|
inet_ntop(AF_INET6, &sin6->sin6_addr, abuf,
|
|
|
|
sizeof(abuf));
|
|
|
|
|
|
|
|
xo_emit(" {:hostname/%s}{e:address/%s}",
|
|
|
|
namebuf, abuf);
|
2001-06-11 12:39:29 +00:00
|
|
|
|
2003-10-17 11:46:40 +00:00
|
|
|
nbi = getnbrinfo(&sin6->sin6_addr,
|
|
|
|
p->if_index, 0);
|
2022-07-04 08:05:58 +00:00
|
|
|
const char *state = "";
|
2001-06-11 12:39:29 +00:00
|
|
|
if (nbi) {
|
2003-10-17 11:46:40 +00:00
|
|
|
switch (nbi->state) {
|
2001-06-11 12:39:29 +00:00
|
|
|
case ND6_LLINFO_REACHABLE:
|
|
|
|
case ND6_LLINFO_STALE:
|
|
|
|
case ND6_LLINFO_DELAY:
|
|
|
|
case ND6_LLINFO_PROBE:
|
2022-07-04 08:05:58 +00:00
|
|
|
state = "reachable";
|
2001-06-11 12:39:29 +00:00
|
|
|
break;
|
|
|
|
default:
|
2022-07-04 08:05:58 +00:00
|
|
|
state = "unreachable";
|
2001-06-11 12:39:29 +00:00
|
|
|
}
|
|
|
|
} else
|
2022-07-04 08:05:58 +00:00
|
|
|
state = "no neighbor state";
|
|
|
|
xo_emit(" ({:state/%s})\n", state);
|
2001-06-11 12:39:29 +00:00
|
|
|
sin6++;
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_instance("advertising-routers");
|
2001-06-11 12:39:29 +00:00
|
|
|
}
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_close_list("advertising-routers");
|
2001-06-11 12:39:29 +00:00
|
|
|
} else
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit(" No advertising router\n");
|
|
|
|
xo_close_instance("prefix-list");
|
2001-06-11 12:39:29 +00:00
|
|
|
}
|
|
|
|
free(buf);
|
2022-07-04 08:05:58 +00:00
|
|
|
|
|
|
|
xo_close_list("prefix-list");
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2000-01-06 12:40:54 +00:00
|
|
|
pfx_flush()
|
|
|
|
{
|
|
|
|
char dummyif[IFNAMSIZ+8];
|
2018-08-23 10:38:59 +00:00
|
|
|
int sock;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2003-10-17 11:46:40 +00:00
|
|
|
strlcpy(dummyif, "lo0", sizeof(dummyif)); /* dummy */
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCSPFXFLUSH_IN6, (caddr_t)&dummyif) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCSPFXFLUSH_IN6)");
|
2018-08-23 10:38:59 +00:00
|
|
|
|
|
|
|
close(sock);
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2000-01-06 12:40:54 +00:00
|
|
|
rtr_flush()
|
|
|
|
{
|
|
|
|
char dummyif[IFNAMSIZ+8];
|
2018-08-23 10:38:59 +00:00
|
|
|
int sock;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2003-10-17 11:46:40 +00:00
|
|
|
strlcpy(dummyif, "lo0", sizeof(dummyif)); /* dummy */
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCSRTRFLUSH_IN6, (caddr_t)&dummyif) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCSRTRFLUSH_IN6)");
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
close(sock);
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
|
2015-08-24 05:38:05 +00:00
|
|
|
static void
|
2000-01-06 12:40:54 +00:00
|
|
|
harmonize_rtr()
|
|
|
|
{
|
|
|
|
char dummyif[IFNAMSIZ+8];
|
2018-08-23 10:38:59 +00:00
|
|
|
int sock;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2003-10-17 11:46:40 +00:00
|
|
|
strlcpy(dummyif, "lo0", sizeof(dummyif)); /* dummy */
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCSNDFLUSH_IN6, (caddr_t)&dummyif) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCSNDFLUSH_IN6)");
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
close(sock);
|
2000-07-04 16:43:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef SIOCSDEFIFACE_IN6 /* XXX: check SIOCGDEFIFACE_IN6 as well? */
|
|
|
|
static void
|
2013-12-10 13:14:54 +00:00
|
|
|
setdefif(char *ifname)
|
2000-07-04 16:43:14 +00:00
|
|
|
{
|
|
|
|
struct in6_ndifreq ndifreq;
|
|
|
|
unsigned int ifindex;
|
2018-08-23 10:38:59 +00:00
|
|
|
int sock;
|
2000-07-04 16:43:14 +00:00
|
|
|
|
|
|
|
if (strcasecmp(ifname, "delete") == 0)
|
|
|
|
ifindex = 0;
|
|
|
|
else {
|
|
|
|
if ((ifindex = if_nametoindex(ifname)) == 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "failed to resolve i/f index for %s", ifname);
|
2000-07-04 16:43:14 +00:00
|
|
|
}
|
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2003-10-17 11:46:40 +00:00
|
|
|
strlcpy(ndifreq.ifname, "lo0", sizeof(ndifreq.ifname)); /* dummy */
|
2000-07-04 16:43:14 +00:00
|
|
|
ndifreq.ifindex = ifindex;
|
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCSDEFIFACE_IN6, (caddr_t)&ndifreq) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCSDEFIFACE_IN6)");
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
close(sock);
|
2000-07-04 16:43:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
getdefif()
|
|
|
|
{
|
|
|
|
struct in6_ndifreq ndifreq;
|
|
|
|
char ifname[IFNAMSIZ+8];
|
2018-08-23 10:38:59 +00:00
|
|
|
int sock;
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "socket");
|
2000-07-04 16:43:14 +00:00
|
|
|
|
|
|
|
memset(&ndifreq, 0, sizeof(ndifreq));
|
2003-10-17 11:46:40 +00:00
|
|
|
strlcpy(ndifreq.ifname, "lo0", sizeof(ndifreq.ifname)); /* dummy */
|
2000-07-04 16:43:14 +00:00
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
if (ioctl(sock, SIOCGDEFIFACE_IN6, (caddr_t)&ndifreq) < 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "ioctl(SIOCGDEFIFACE_IN6)");
|
2000-07-04 16:43:14 +00:00
|
|
|
|
|
|
|
if (ndifreq.ifindex == 0)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("No default interface.\n");
|
2000-07-04 16:43:14 +00:00
|
|
|
else {
|
|
|
|
if ((if_indextoname(ndifreq.ifindex, ifname)) == NULL)
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_err(1, "failed to resolve ifname for index %lu",
|
2000-07-04 16:43:14 +00:00
|
|
|
ndifreq.ifindex);
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("ND default interface = {:default-interface/%s}\n", ifname);
|
2000-07-04 16:43:14 +00:00
|
|
|
}
|
|
|
|
|
2018-08-23 10:38:59 +00:00
|
|
|
close(sock);
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2017-02-14 18:11:16 +00:00
|
|
|
#endif /* SIOCSDEFIFACE_IN6 */
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
static char *
|
2013-12-10 13:14:54 +00:00
|
|
|
sec2str(time_t total)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
|
|
|
static char result[256];
|
|
|
|
int days, hours, mins, secs;
|
|
|
|
int first = 1;
|
|
|
|
char *p = result;
|
2003-10-17 11:46:40 +00:00
|
|
|
char *ep = &result[sizeof(result)];
|
|
|
|
int n;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
days = total / 3600 / 24;
|
|
|
|
hours = (total / 3600) % 24;
|
|
|
|
mins = (total / 60) % 60;
|
|
|
|
secs = total % 60;
|
|
|
|
|
|
|
|
if (days) {
|
|
|
|
first = 0;
|
2003-10-17 11:46:40 +00:00
|
|
|
n = snprintf(p, ep - p, "%dd", days);
|
|
|
|
if (n < 0 || n >= ep - p)
|
|
|
|
return "?";
|
|
|
|
p += n;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
if (!first || hours) {
|
|
|
|
first = 0;
|
2003-10-17 11:46:40 +00:00
|
|
|
n = snprintf(p, ep - p, "%dh", hours);
|
|
|
|
if (n < 0 || n >= ep - p)
|
|
|
|
return "?";
|
|
|
|
p += n;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
|
|
|
if (!first || mins) {
|
|
|
|
first = 0;
|
2003-10-17 11:46:40 +00:00
|
|
|
n = snprintf(p, ep - p, "%dm", mins);
|
|
|
|
if (n < 0 || n >= ep - p)
|
|
|
|
return "?";
|
|
|
|
p += n;
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
2003-10-17 11:46:40 +00:00
|
|
|
snprintf(p, ep - p, "%ds", secs);
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
return(result);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Print the timestamp
|
|
|
|
* from tcpdump/util.c
|
|
|
|
*/
|
|
|
|
static void
|
2013-12-10 13:14:54 +00:00
|
|
|
ts_print(const struct timeval *tvp)
|
2000-01-06 12:40:54 +00:00
|
|
|
{
|
2018-08-23 10:38:59 +00:00
|
|
|
int sec;
|
2000-01-06 12:40:54 +00:00
|
|
|
|
|
|
|
/* Default */
|
2018-08-23 10:38:59 +00:00
|
|
|
sec = (tvp->tv_sec + thiszone) % 86400;
|
2022-07-04 08:05:58 +00:00
|
|
|
xo_emit("{:tv_sec/%lld}{:tv_usec/%lld}%02d:%02d:%02d.%06u ",
|
|
|
|
tvp->tv_sec, tvp->tv_usec,
|
2018-08-23 10:38:59 +00:00
|
|
|
sec / 3600, (sec % 3600) / 60, sec % 60, (u_int32_t)tvp->tv_usec);
|
2000-01-06 12:40:54 +00:00
|
|
|
}
|
This main goals of this project are:
1. separating L2 tables (ARP, NDP) from the L3 routing tables
2. removing as much locking dependencies among these layers as
possible to allow for some parallelism in the search operations
3. simplify the logic in the routing code,
The most notable end result is the obsolescent of the route
cloning (RTF_CLONING) concept, which translated into code reduction
in both IPv4 ARP and IPv6 NDP related modules, and size reduction in
struct rtentry{}. The change in design obsoletes the semantics of
RTF_CLONING, RTF_WASCLONE and RTF_LLINFO routing flags. The userland
applications such as "arp" and "ndp" have been modified to reflect
those changes. The output from "netstat -r" shows only the routing
entries.
Quite a few developers have contributed to this project in the
past: Glebius Smirnoff, Luigi Rizzo, Alessandro Cerri, and
Andre Oppermann. And most recently:
- Kip Macy revised the locking code completely, thus completing
the last piece of the puzzle, Kip has also been conducting
active functional testing
- Sam Leffler has helped me improving/refactoring the code, and
provided valuable reviews
- Julian Elischer setup the perforce tree for me and has helped
me maintaining that branch before the svn conversion
2008-12-15 06:10:57 +00:00
|
|
|
|
|
|
|
#undef NEXTADDR
|