kernel_socket.c 20.4 KB
Newer Older
1 2
/*
Copyright (c) 2007 by Grégoire Henry
3
Copyright (c) 2008, 2009 by Juliusz Chroboczek
dermiste's avatar
dermiste committed
4
Copyright (c) 2010 by Vincent Gross
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
*/

#include <stdlib.h>
#include <stdio.h>
#include <errno.h>
#include <string.h>
#include <unistd.h>
#include <fcntl.h>
#include <time.h>


#include <strings.h>
#include <netinet/in.h>
36
#include <netinet/icmp6.h>
37 38 39 40 41
#include <arpa/inet.h>
#include <sys/ioctl.h>
#include <sys/types.h>
#include <sys/sysctl.h>
#include <sys/socket.h>
42
#include <ifaddrs.h>
43 44
#include <net/if.h>
#include <net/if_dl.h>
45
#include <net/if_media.h>
46 47
#include <net/route.h>

48
#include "babeld.h"
49 50 51 52
#include "neighbour.h"
#include "kernel.h"
#include "util.h"

53 54 55 56

static int get_sdl(struct sockaddr_dl *sdl, char *ifname);


57 58 59
static const unsigned char v4prefix[16] =
    {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0, 0, 0, 0 };

60 61
int export_table = -1, import_table = -1;

62 63 64
int
if_eui64(char *ifname, int ifindex, unsigned char *eui)
{
65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82
    struct sockaddr_dl sdl;
    char *tmp = NULL;
    if (get_sdl(&sdl, ifname) < 0) {
        return -1;
    }
    tmp = sdl.sdl_data + sdl.sdl_nlen;
    if (sdl.sdl_alen == 8) {
        memcpy(eui, tmp, 8);
        eui[0] ^= 2;
    } else if (sdl.sdl_alen == 6) {
        memcpy(eui,   tmp,   3);
        eui[3] = 0xFF;
        eui[4] = 0xFE;
        memcpy(eui+5, tmp+3, 3);
    } else {
        return -1;
    }
    return 0;
83 84
}

85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136
/* fill sdl with the structure corresponding to ifname.
 Warning: make a syscall (and get all interfaces).
 return -1 if an error occurs, 0 otherwise. */
static int
get_sdl(struct sockaddr_dl *sdl, char *ifname)
{
    int mib[6];
    size_t buf_len = 0;
    int offset = 0;
    char *buffer = NULL;
    struct if_msghdr *ifm = NULL;
    struct sockaddr_dl *tmp_sdl = NULL;
    int rc;

    mib[0] = CTL_NET;
    mib[1] = PF_ROUTE;
    mib[2] = 0;
    mib[3] = AF_LINK;
    mib[4] = NET_RT_IFLIST;
    mib[5] = 0;

    rc = sysctl(mib, 6, NULL, &buf_len, NULL, 0);
    if(rc < 0)
        return -1;

    buffer = (char *)malloc(buf_len);

    rc = sysctl(mib, 6, buffer, &buf_len, NULL, 0);
    if(rc < 0)
        goto fail;

    offset = 0;
    while (offset < (int) buf_len) {
        ifm = (struct if_msghdr *) &buffer[offset];
        switch (ifm->ifm_type) {
            case RTM_IFINFO:
                tmp_sdl = (struct sockaddr_dl *) (ifm + 1);
                if (strncmp(ifname, tmp_sdl->sdl_data, tmp_sdl->sdl_nlen) == 0
                    && strlen(ifname) == tmp_sdl->sdl_nlen) {
                    memcpy(sdl, tmp_sdl, sizeof(struct sockaddr_dl));
                    return 0;
                }
            default:
                break;
        }
        offset += ifm->ifm_msglen;
    }

fail:
    free(buffer);
    return -1;
}
137

138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206
/* KAME said : "Following two macros are highly depending on KAME Release" */
#define	IN6_LINKLOCAL_IFINDEX(a)  ((a).s6_addr[2] << 8 | (a).s6_addr[3])
#define SET_IN6_LINKLOCAL_IFINDEX(a, i)         \
    do {                                        \
        (a).s6_addr[2] = ((i) >> 8) & 0xff;     \
        (a).s6_addr[3] = (i) & 0xff;            \
    } while (0)

#define ROUNDUP(a)                                                      \
    ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))


static int old_forwarding = -1;
static int old_accept_redirects = -1;

static int ifindex_lo = -1;
static int seq;

int
mask2len(const struct in6_addr *addr)
{
    int i = 0, j;
    const u_char *p = (const u_char *)addr;

    for(j = 0; j < 16; j++, p++) {
        if(*p != 0xff)
            break;
        i += 8;
    }
    if(j < 16) {
        switch(*p) {
#define	MASKLEN(m, l)	case m: do { i += l; break; } while (0)
            MASKLEN(0xfe, 7); break;
            MASKLEN(0xfc, 6); break;
            MASKLEN(0xf8, 5); break;
            MASKLEN(0xf0, 4); break;
            MASKLEN(0xe0, 3); break;
            MASKLEN(0xc0, 2); break;
            MASKLEN(0x80, 1); break;
#undef	MASKLEN
        }
    }
    return i;
}

void
plen2mask(int n, struct in6_addr *dest)
{
    unsigned char *p;
    int i;

    static const int pl2m[9] = {
        0x00, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe, 0xff
    };

    memset(dest, 0, sizeof(struct in6_addr));
    p = (u_char *)dest;
    for (i = 0; i < 16; i++, p++, n -= 8) {
        if (n >= 8) {
            *p = 0xff;
            continue;
        }
        *p = pl2m[n];
        break;
    }
    return;
}

int
207
kernel_setup(int setup)
208
{
dermiste's avatar
dermiste committed
209
    int rc = 0;
210 211 212 213 214 215 216 217 218 219 220 221 222 223
    int forwarding = 1;
    int accept_redirects = 0;
    int mib[4];
    size_t datasize;

    mib[0] = CTL_NET;
    mib[1] = AF_INET6;
    seq = time(NULL);

    mib[2] = IPPROTO_IPV6;
    mib[3] = IPV6CTL_FORWARDING;
    datasize = sizeof(old_forwarding);
    if (setup)
        rc = sysctl(mib, 4, &old_forwarding, &datasize,
dermiste's avatar
dermiste committed
224 225
                    &forwarding, datasize);
    else if (old_forwarding >= 0)
226
        rc = sysctl(mib, 4, NULL, NULL,
dermiste's avatar
dermiste committed
227
                    &old_forwarding, datasize);
228
    if (rc == -1) {
dermiste's avatar
dermiste committed
229
        perror("Couldn't tweak forwarding knob.");
230 231 232
        return -1;
    }

dermiste's avatar
dermiste committed
233
    rc = 0;
234 235 236 237 238
    mib[2] = IPPROTO_ICMPV6;
    mib[3] = ICMPV6CTL_REDIRACCEPT;
    datasize = sizeof(old_accept_redirects);
    if (setup)
        rc = sysctl(mib, 4, &old_accept_redirects, &datasize,
dermiste's avatar
dermiste committed
239 240
                    &accept_redirects, datasize);
    else if (old_accept_redirects >= 0)
241
        rc = sysctl(mib, 4, NULL, NULL,
dermiste's avatar
dermiste committed
242
                    &old_accept_redirects, datasize);
243
    if (rc == -1) {
dermiste's avatar
dermiste committed
244
        perror("Couldn't tweak accept_redirects knob.");
245
        return -1;
246
    }
247
    return 1;
248 249 250 251 252 253 254 255 256
}

int
kernel_setup_socket(int setup)
{
    int rc;
    int zero = 0;
    if(setup) {
        if(kernel_socket < 0) {
257
            kernel_socket = socket(PF_ROUTE, SOCK_RAW, AF_UNSPEC);
258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287
            if(kernel_socket < 0)
                return -1;
        }
        rc = setsockopt(kernel_socket, SOL_SOCKET, SO_USELOOPBACK, 
                        &zero, sizeof(zero));
        if(rc < 0) 
            goto error;
        return 1;
    } else {
        close(kernel_socket);
        kernel_socket = -1;
        return 1;
    }

 error: {
        int savederrno = errno;
        perror("setsockopt(kernel_socket)");
        close(kernel_socket);
        errno = savederrno;
        kernel_socket = -1;
        return -1;
    }
}

int
kernel_setup_interface(int setup, const char *ifname, int ifindex)
{
    return 1;
}

288 289 290
int
kernel_interface_operational(const char *ifname, int ifindex)
{
291
    struct ifreq req;
Juliusz Chroboczek's avatar
Juliusz Chroboczek committed
292
    int s, rc;
293 294
    int flags = link_detect ? (IFF_UP | IFF_RUNNING) : IFF_UP;

Juliusz Chroboczek's avatar
Juliusz Chroboczek committed
295 296 297 298
    s = socket(PF_INET, SOCK_DGRAM, 0);
    if(s < 0)
        return -1;

299 300 301
    memset(&req, 0, sizeof(req));
    memset(&req, 0, sizeof(req));
    strncpy(req.ifr_name, ifname, sizeof(req.ifr_name));
Juliusz Chroboczek's avatar
Juliusz Chroboczek committed
302 303
    rc = ioctl(s, SIOCGIFFLAGS, &req);
    close(s);
304 305 306
    if(rc < 0)
        return -1;
    return ((req.ifr_flags & flags) == flags);
307 308
}

309
int
310
kernel_interface_ipv4(const char *ifname, int ifindex, unsigned char *addr_r)
311 312 313 314 315 316 317 318 319 320 321 322
{
    struct ifreq req;
    int s, rc;

    s = socket(PF_INET, SOCK_DGRAM, 0);
    if(s < 0)
        return -1;

    memset(&req, 0, sizeof(req));
    strncpy(req.ifr_name, ifname, sizeof(req.ifr_name));
    req.ifr_addr.sa_family = AF_INET;
    rc = ioctl(s, SIOCGIFADDR, &req);
Juliusz Chroboczek's avatar
Juliusz Chroboczek committed
323
    close(s);
324 325 326 327 328 329 330 331
    if(rc < 0) {
        return -1;
    }

    memcpy(addr_r, &((struct sockaddr_in*)&req.ifr_addr)->sin_addr, 4);
    return 1;
}

332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355
int
kernel_interface_mtu(const char *ifname, int ifindex)
{
    struct ifreq req;
    int s, rc;

    s = socket(PF_INET, SOCK_DGRAM, 0);
    if(s < 0)
        return -1;

    memset(&req, 0, sizeof(req));
    strncpy(req.ifr_name, ifname, sizeof(req.ifr_name));
    rc = ioctl(s, SIOCGIFMTU, &req);
    if(rc < 0) {
        close(s);
        return -1;
    }

    return req.ifr_mtu;
}

int
kernel_interface_wireless(const char *ifname, int ifindex)
{
356 357 358 359 360 361 362 363 364
    struct ifmediareq ifmr;
    int s, rc;

    s = socket(PF_INET6, SOCK_DGRAM, 0);
    memset(&ifmr, 0, sizeof(ifmr));
    strncpy(ifmr.ifm_name, ifname, sizeof(ifmr.ifm_name));
    rc = ioctl(s, SIOCGIFMEDIA, (caddr_t)&ifmr);
    close(s);
    if (rc < 0)
dermiste's avatar
dermiste committed
365
        return rc;
366
    if ((ifmr.ifm_active & IFM_NMASK) == IFM_IEEE80211)
dermiste's avatar
dermiste committed
367
        return 1;
368
    else
dermiste's avatar
dermiste committed
369
        return 0;
370 371
}

372 373 374 375 376 377 378
int
kernel_interface_channel(const char *ifname, int ifindex)
{
    errno = ENOSYS;
    return -1;
}

379 380 381 382 383 384 385 386 387
int
kernel_route(int operation, const unsigned char *dest, unsigned short plen,
             const unsigned char *gate, int ifindex, unsigned int metric,
             const unsigned char *newgate, int newifindex,
             unsigned int newmetric)
{
    unsigned char msg[512];
    struct rt_msghdr *rtm;
    struct sockaddr_in6 *sin6;
dermiste's avatar
dermiste committed
388
    struct sockaddr_in *sin;
389
    int rc, len, ipv4;
390

391 392
    char local6[1][1][16] = IN6ADDR_LOOPBACK_INIT;
    char local4[1][1][16] =
dermiste's avatar
dermiste committed
393 394
        {{{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
            0x00, 0x00, 0x00, 0x00, 0x7f, 0x00, 0x00, 0x01 }}};
395

396 397 398 399 400 401
    /* Check that the protocol family is consistent. */
    if(plen >= 96 && v4mapped(dest)) {
        if(!v4mapped(gate)) {
            errno = EINVAL;
            return -1;
        }
402
        ipv4 = 1;
403 404 405 406 407
    } else {
        if(v4mapped(gate)) {
            errno = EINVAL;
            return -1;
        }
408
        ipv4 = 0;
409 410
    }

411 412 413 414
    if(operation == ROUTE_MODIFY && newmetric == metric && 
       memcmp(newgate, gate, 16) == 0 && newifindex == ifindex)
      return 0;

415 416 417 418 419 420
    if(operation == ROUTE_MODIFY) {
        metric = newmetric;
        gate = newgate;
        ifindex = newifindex;
    }

421
    kdebugf("kernel_route: %s %s/%d metric %d dev %d nexthop %s\n",
dermiste's avatar
dermiste committed
422 423 424 425
            operation == ROUTE_ADD ? "add" :
            operation == ROUTE_FLUSH ? "flush" : "change",
            format_address(dest), plen, metric, ifindex,
            format_address(gate));
426 427

    if(kernel_socket < 0) kernel_setup_socket(1);
dermiste's avatar
dermiste committed
428

429 430 431 432 433
    memset(&msg, 0, sizeof(msg));
    rtm = (struct rt_msghdr *)msg;
    rtm->rtm_version = RTM_VERSION;
    switch(operation) {
    case ROUTE_FLUSH:
dermiste's avatar
dermiste committed
434
        rtm->rtm_type = RTM_DELETE; break;
435
    case ROUTE_ADD:
dermiste's avatar
dermiste committed
436
        rtm->rtm_type = RTM_ADD; break;
437
    case ROUTE_MODIFY: 
dermiste's avatar
dermiste committed
438
        rtm->rtm_type = RTM_CHANGE; break;
439
    default: 
dermiste's avatar
dermiste committed
440
        return -1;
441 442 443 444
    };
    rtm->rtm_index = ifindex;
    rtm->rtm_flags = RTF_UP | RTF_PROTO2;
    if(plen == 128) rtm->rtm_flags |= RTF_HOST;
dermiste's avatar
dermiste committed
445 446 447 448 449 450
    /*     if(memcmp(nexthop->id, dest, 16) == 0) { */
    /*         rtm -> rtm_flags |= RTF_LLINFO; */
    /*         rtm -> rtm_flags |= RTF_CLONING; */
    /*     } else { */
    rtm->rtm_flags |= RTF_GATEWAY;
    /*     } */
451 452 453 454 455 456 457 458 459 460
    if(metric == KERNEL_INFINITY) {
        rtm->rtm_flags |= RTF_BLACKHOLE;
        if(ifindex_lo < 0) {
            ifindex_lo = if_nametoindex("lo0");
            if(ifindex_lo <= 0)
                return -1;
        }
        rtm->rtm_index = ifindex_lo;      
    }
    rtm->rtm_seq = ++seq;
461 462 463 464
    rtm->rtm_addrs = RTA_DST | RTA_GATEWAY;
    if(!(operation == ROUTE_MODIFY && plen == 128)) {
        rtm->rtm_addrs |= RTA_NETMASK;
    }
465

466
#define push_sockaddr_in(ptr, offset) \
dermiste's avatar
dermiste committed
467 468 469
    do { (ptr) = (struct sockaddr_in *)((char *)(ptr) + (offset)); \
         (ptr)->sin_len = sizeof(struct sockaddr_in); \
         (ptr)->sin_family = AF_INET; } while (0)
470 471

#define get_sin_addr(dst,src) \
dermiste's avatar
dermiste committed
472
    do { memcpy((dst), (src) + 12, 4); } while (0)
473 474

#define push_sockaddr_in6(ptr, offset) \
dermiste's avatar
dermiste committed
475 476 477
    do { (ptr) = (struct sockaddr_in6 *)((char *)(ptr) + (offset)); \
         (ptr)->sin6_len = sizeof(struct sockaddr_in6); \
         (ptr)->sin6_family = AF_INET6; } while (0)
478 479

#define get_sin6_addr(dst,src) \
dermiste's avatar
dermiste committed
480
    do { memcpy((dst), (src), 16); } while (0)
481

dermiste's avatar
dermiste committed
482 483
    /* KAME ipv6 stack does not support IPv4 mapped IPv6, so we have to
     * duplicate the codepath */
484
    if(ipv4) {
dermiste's avatar
dermiste committed
485 486 487 488 489 490
        sin = (struct sockaddr_in *)msg;
        /* destination */
        push_sockaddr_in(sin, sizeof(*rtm));
        get_sin_addr(&(sin->sin_addr), dest);
        /* gateway */
        push_sockaddr_in(sin, ROUNDUP(sin->sin_len));
491
        if (metric == KERNEL_INFINITY)
dermiste's avatar
dermiste committed
492
            get_sin_addr(&(sin->sin_addr),**local4);
493
        else
dermiste's avatar
dermiste committed
494 495
            get_sin_addr(&(sin->sin_addr),gate);
        /* netmask */
496
        if((rtm->rtm_addrs | RTA_NETMASK) != 0) {
dermiste's avatar
dermiste committed
497 498
            struct in6_addr tmp_sin6_addr;
            push_sockaddr_in(sin, ROUNDUP(sin->sin_len));
499
            plen2mask(plen, &tmp_sin6_addr);
dermiste's avatar
dermiste committed
500
            get_sin_addr(&(sin->sin_addr), (char *)&tmp_sin6_addr);
501
        }
dermiste's avatar
dermiste committed
502
        len = (char *)sin + ROUNDUP(sin->sin_len) - (char *)msg;
503
    } else {
dermiste's avatar
dermiste committed
504 505 506
        sin6 = (struct sockaddr_in6 *)msg;
        /* destination */
        push_sockaddr_in6(sin6, sizeof(*rtm));
507
        get_sin6_addr(&(sin6->sin6_addr), dest);
dermiste's avatar
dermiste committed
508 509
        /* gateway */
        push_sockaddr_in6(sin6, ROUNDUP(sin6->sin6_len));
510 511 512 513 514 515
        if (metric == KERNEL_INFINITY)
            get_sin6_addr(&(sin6->sin6_addr),**local6);
        else
            get_sin6_addr(&(sin6->sin6_addr),gate);
        if(IN6_IS_ADDR_LINKLOCAL (&sin6->sin6_addr))
            SET_IN6_LINKLOCAL_IFINDEX (sin6->sin6_addr, ifindex);
dermiste's avatar
dermiste committed
516
        /* netmask */
517
        if((rtm->rtm_addrs | RTA_NETMASK) != 0) {
dermiste's avatar
dermiste committed
518
            push_sockaddr_in6(sin6, ROUNDUP(sin6->sin6_len));
519 520 521
            plen2mask(plen, &sin6->sin6_addr);
        }
        len = (char *)sin6 + ROUNDUP(sin6->sin6_len) - (char *)msg;
522
    }
523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564
    rtm->rtm_msglen = len;

    rc = write(kernel_socket, msg, rtm->rtm_msglen);
    if (rc < rtm->rtm_msglen)
        return -1;

    return 1;
}

static void
print_kernel_route(int add, struct kernel_route *route)
{
    char ifname[IFNAMSIZ];
    char addr_prefix[INET6_ADDRSTRLEN];
    char addr_gw[INET6_ADDRSTRLEN];
    
    if(!inet_ntop(AF_INET6, route->prefix,
                  addr_prefix, sizeof(addr_prefix)) ||
       !inet_ntop(AF_INET6,route->gw, addr_gw, sizeof(addr_gw)) ||
       !if_indextoname(route->ifindex, ifname)) {
        fprintf(stderr,"Couldn't format kernel route for printing.");
        // return;
    }

    fprintf(stderr,
            "%s kernel route: dest: %s/%d gw: %s metric: %d if: %s(%d) \n",
            add == RTM_ADD ? "Add" :
            add == RTM_DELETE ? "Delete" : "Change",
            addr_prefix, route->plen, addr_gw, route->metric, ifname, 
            route->ifindex
            );
}

static int
parse_kernel_route(const struct rt_msghdr *rtm, struct kernel_route *route)
{

    void *rta = (void*)rtm + sizeof(struct rt_msghdr);
    struct sockaddr_in6 *sin6;
    char addr[INET6_ADDRSTRLEN];

    memset(route, 0, sizeof(*route));
565
    route->metric = 0;
566 567
    route->ifindex = rtm->rtm_index;

568
    if(!(rtm->rtm_addrs & RTA_DST))
569 570 571 572 573 574 575 576 577 578
        return -1;
    sin6 = (struct sockaddr_in6 *)rta;
    if(IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr) 
       || IN6_IS_ADDR_MC_LINKLOCAL(&sin6->sin6_addr))
        return -1;
    if((rtm->rtm_flags & RTF_PROTO2) != 0)
        return -1;
    memcpy(&route->prefix, &sin6->sin6_addr, 16);
    rta += ROUNDUP(sizeof(struct sockaddr_in6));
   
579
    if(!(rtm->rtm_addrs & RTA_GATEWAY))
580 581 582 583 584 585 586 587 588 589
        return -1;

    sin6 = (struct sockaddr_in6 *)rta;
    if(IN6_IS_ADDR_LINKLOCAL (&sin6->sin6_addr)) {
        route->ifindex = IN6_LINKLOCAL_IFINDEX(sin6->sin6_addr);
        SET_IN6_LINKLOCAL_IFINDEX(sin6->sin6_addr, 0);
    }
    memcpy(&route->gw, &sin6->sin6_addr, 16);
    rta += ROUNDUP(sizeof(struct sockaddr_in6));

590
    if(!(rtm->rtm_addrs & RTA_NETMASK)) {
591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614
        route->plen = 0;
    } else {
        sin6 = (struct sockaddr_in6 *)rta;        
        route->plen = mask2len(&sin6->sin6_addr);
        inet_ntop(AF_INET6, &sin6->sin6_addr, addr, sizeof(addr));
        rta += ROUNDUP(sizeof(struct sockaddr_in6));
    }
    if (rtm->rtm_flags & RTF_HOST)
        route->plen = 128;

    if(ifindex_lo < 0) {
        ifindex_lo = if_nametoindex("lo0");
        if(ifindex_lo <= 0)
            return -1;
    }

    if(route->ifindex == ifindex_lo)
        return -1;

    return 0;

}

int
615
kernel_routes(struct kernel_route *routes, int maxroutes)
616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652
{
    int mib[6];
    char *buf, *p;
    size_t len;
    struct rt_msghdr *rtm;
    int rc, i;
    
    mib[0] = CTL_NET;
    mib[1] = PF_ROUTE;
    mib[2] = 0;
    mib[3] = AF_INET6;	  /* Address family */
    mib[4] = NET_RT_DUMP; /* Dump the kernel routing table */
    mib[5] = 0;		  /* No flags */

    rc = sysctl(mib, 6, NULL, &len, NULL, 0);
    if (rc < 0) {
        perror("kernel_routes(len)");
        return -1;
    }

    buf = malloc(len);
    if(!buf) {
        perror("kernel_routes(malloc)");
        return -1;
    }

    rc = sysctl(mib, 6, buf, &len, NULL, 0);
    if (rc < 0) {
        perror("kernel_routes(dump)");
        goto fail;
    }

    i = 0;
    p = buf;
    while(p < buf + len && i < maxroutes) {
        rtm = (struct rt_msghdr*)p;
        rc = parse_kernel_route(rtm, &routes[i]);
653
        if(rc)
654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689
            goto cont;

        if(debug > 2)
            print_kernel_route(1,&routes[i]);

        i++;

    cont:
        p += rtm->rtm_msglen;
    }

    free(buf);
    return i;

 fail:
    free(buf);
    return -1;

}

static int
socket_read(int sock) 
{
    int rc;
    struct {
        struct rt_msghdr rtm;
        struct sockaddr_storage addr[RTAX_MAX];
    } buf;

    rc = read(sock, &buf, sizeof(buf));
    if(rc <= 0) {
        perror("kernel_callback(read)");
        return 0;
    }

    if(buf.rtm.rtm_msglen != rc) {
690
        kdebugf("kernel_callback(length)\n");
691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714
        return -1;
    }

    if(buf.rtm.rtm_type == RTM_ADD ||
       buf.rtm.rtm_type == RTM_DELETE || 
       buf.rtm.rtm_type == RTM_CHANGE) {
        struct kernel_route route;

        if(buf.rtm.rtm_errno)
            return 0;

        rc = parse_kernel_route(&buf.rtm, &route);
        if(rc < 0)
            return 0;
        if(debug > 2)
            print_kernel_route(1,&route);
        return 1;

    }

    return 0;

}

Juliusz Chroboczek's avatar
Juliusz Chroboczek committed
715
int
716
kernel_addresses(char *ifname, int ifindex, int ll,
717
                 struct kernel_route *routes, int maxroutes)
Juliusz Chroboczek's avatar
Juliusz Chroboczek committed
718
{
719 720 721 722 723 724 725 726 727 728 729
    struct ifaddrs *ifa, *ifap;
    int rc, i;

    rc = getifaddrs(&ifa);
    if(rc < 0)
        return -1;

    ifap = ifa;
    i = 0;

    while(ifap && i < maxroutes) {
730
        if((ifname != NULL && strcmp(ifap->ifa_name, ifname) != 0))
731 732 733 734 735 736
            goto next;
        if(ifap->ifa_addr->sa_family == AF_INET6) {
            struct sockaddr_in6 *sin6 = (struct sockaddr_in6*)ifap->ifa_addr;
            if(!!ll != !!IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))
                goto next;
            memcpy(routes[i].prefix, &sin6->sin6_addr, 16);
dermiste's avatar
dermiste committed
737 738 739 740
            if(ll)
                /* This a perfect example of counter-productive optimisation :
                   KAME encodes interface index onto bytes 2 and 3, so we have to
                   reset those bytes to 0 before passing them to babeld. */
dermiste's avatar
dermiste committed
741
                memset(routes[i].prefix + 2, 0, 2);
742 743 744 745 746
            routes[i].plen = 128;
            routes[i].metric = 0;
            routes[i].ifindex = ifindex;
            routes[i].proto = RTPROT_BABEL_LOCAL;
            memset(routes[i].gw, 0, 16);
747
            i++;
748 749 750 751 752 753 754 755 756 757 758
        } else if(ifap->ifa_addr->sa_family == AF_INET) {
            struct sockaddr_in *sin = (struct sockaddr_in*)ifap->ifa_addr;
            if(ll)
                goto next;
            memcpy(routes[i].prefix, v4prefix, 12);
            memcpy(routes[i].prefix + 12, &sin->sin_addr, 4);
            routes[i].plen = 128;
            routes[i].metric = 0;
            routes[i].ifindex = ifindex;
            routes[i].proto = RTPROT_BABEL_LOCAL;
            memset(routes[i].gw, 0, 16);
759
            i++;
760
        }
dermiste's avatar
dermiste committed
761
 next:
762 763 764 765 766
        ifap = ifap->ifa_next;
    }

    freeifaddrs(ifa);
    return i;
Juliusz Chroboczek's avatar
Juliusz Chroboczek committed
767 768
}

769
int
770
kernel_callback(int (*fn)(int, void*), void *closure)
771 772 773 774 775
{
    int rc;

    if(kernel_socket < 0) kernel_setup_socket(1);

776
    kdebugf("Reading kernel table modification.");
777 778
    rc = socket_read(kernel_socket);
    if(rc)
779
        return fn(~0, closure);
780 781 782 783 784 785 786 787 788

    return 0;

}

/* Local Variables:      */
/* c-basic-offset: 4     */
/* indent-tabs-mode: nil */
/* End:                  */