2011-06-03 12:35:42 -06:00
|
|
|
// Copyright 2011 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package net
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
|
|
|
"syscall"
|
|
|
|
"unsafe"
|
|
|
|
)
|
|
|
|
|
|
|
|
// If the ifindex is zero, interfaceTable returns mappings of all
|
2012-03-13 18:29:07 -06:00
|
|
|
// network interfaces. Otherwise it returns a mapping of a specific
|
2011-06-03 12:35:42 -06:00
|
|
|
// interface.
|
2011-11-01 20:05:34 -06:00
|
|
|
func interfaceTable(ifindex int) ([]Interface, error) {
|
2011-12-21 05:39:00 -07:00
|
|
|
tab, err := syscall.NetlinkRIB(syscall.RTM_GETLINK, syscall.AF_UNSPEC)
|
|
|
|
if err != nil {
|
|
|
|
return nil, os.NewSyscallError("netlink rib", err)
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2011-12-21 05:39:00 -07:00
|
|
|
msgs, err := syscall.ParseNetlinkMessage(tab)
|
|
|
|
if err != nil {
|
|
|
|
return nil, os.NewSyscallError("netlink message", err)
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2012-01-31 08:36:45 -07:00
|
|
|
var ift []Interface
|
2013-02-19 16:18:04 -07:00
|
|
|
loop:
|
2011-06-03 12:35:42 -06:00
|
|
|
for _, m := range msgs {
|
|
|
|
switch m.Header.Type {
|
|
|
|
case syscall.NLMSG_DONE:
|
2013-02-19 16:18:04 -07:00
|
|
|
break loop
|
2011-06-03 12:35:42 -06:00
|
|
|
case syscall.RTM_NEWLINK:
|
|
|
|
ifim := (*syscall.IfInfomsg)(unsafe.Pointer(&m.Data[0]))
|
|
|
|
if ifindex == 0 || ifindex == int(ifim.Index) {
|
2011-12-21 05:39:00 -07:00
|
|
|
attrs, err := syscall.ParseNetlinkRouteAttr(&m)
|
|
|
|
if err != nil {
|
|
|
|
return nil, os.NewSyscallError("netlink routeattr", err)
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2013-02-27 22:58:41 -07:00
|
|
|
ift = append(ift, *newLink(ifim, attrs))
|
|
|
|
if ifindex == int(ifim.Index) {
|
|
|
|
break loop
|
|
|
|
}
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ift, nil
|
|
|
|
}
|
|
|
|
|
net: handle IP interface stack correctly on linux
A configuration like the following:
7: tun6rd: <NOARP,UP,LOWER_UP> mtu 1280
link/sit 10.11.12.13 brd 0.0.0.0
inet 1.2.3.4/24 scope global tun6rd
inet6 2014:1001:a0b:c0d::1/32 scope global
inet6 ::10.11.12.13/128 scope global
9: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1496
link/ppp
inet 192.168.101.234 peer 192.168.102.234/32 scope global ppp0
inet 10.20.30.40/24 scope global ppp0
inet6 2014:1002::1/64 scope global
11: tun0@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480
link/ipip 192.168.202.34 peer 192.168.202.69
inet 192.168.10.1/24 scope global tunnel0
inet6 2014:1003::1/64 scope global
will be handled like below.
"tun6rd": flags "up", ifindex 7, mtu 1280
hardware address ""
interface address "1.2.3.4/24"
interface address "2014:1001:a0b:c0d::1/32"
interface address "::a0b:c0d/128"
"ppp0": flags "up|pointtopoint|multicast", ifindex 9, mtu 1496
hardware address ""
interface address "192.168.101.234/32"
interface address "10.20.30.40/24"
interface address "2014:1002::1/64"
"tun0": flags "up|pointtopoint", ifindex 11, mtu 1480
hardware address ""
interface address "192.168.10.1/24"
interface address "2014:1003::1/64"
Fixes #6433.
Update #4839
LGTM=iant
R=iant
CC=golang-codereviews
https://golang.org/cl/57700043
2014-02-14 09:07:51 -07:00
|
|
|
const (
|
|
|
|
// See linux/if_arp.h.
|
|
|
|
// Note that Linux doesn't support IPv4 over IPv6 tunneling.
|
|
|
|
sysARPHardwareIPv4IPv4 = 768 // IPv4 over IPv4 tunneling
|
|
|
|
sysARPHardwareIPv6IPv6 = 769 // IPv6 over IPv6 tunneling
|
|
|
|
sysARPHardwareIPv6IPv4 = 776 // IPv6 over IPv4 tunneling
|
|
|
|
sysARPHardwareGREIPv4 = 778 // any over GRE over IPv4 tunneling
|
|
|
|
sysARPHardwareGREIPv6 = 823 // any over GRE over IPv6 tunneling
|
|
|
|
)
|
|
|
|
|
2013-02-27 22:58:41 -07:00
|
|
|
func newLink(ifim *syscall.IfInfomsg, attrs []syscall.NetlinkRouteAttr) *Interface {
|
|
|
|
ifi := &Interface{Index: int(ifim.Index), Flags: linkFlags(ifim.Flags)}
|
2011-06-03 12:35:42 -06:00
|
|
|
for _, a := range attrs {
|
|
|
|
switch a.Attr.Type {
|
|
|
|
case syscall.IFLA_ADDRESS:
|
net: handle IP interface stack correctly on linux
A configuration like the following:
7: tun6rd: <NOARP,UP,LOWER_UP> mtu 1280
link/sit 10.11.12.13 brd 0.0.0.0
inet 1.2.3.4/24 scope global tun6rd
inet6 2014:1001:a0b:c0d::1/32 scope global
inet6 ::10.11.12.13/128 scope global
9: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1496
link/ppp
inet 192.168.101.234 peer 192.168.102.234/32 scope global ppp0
inet 10.20.30.40/24 scope global ppp0
inet6 2014:1002::1/64 scope global
11: tun0@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480
link/ipip 192.168.202.34 peer 192.168.202.69
inet 192.168.10.1/24 scope global tunnel0
inet6 2014:1003::1/64 scope global
will be handled like below.
"tun6rd": flags "up", ifindex 7, mtu 1280
hardware address ""
interface address "1.2.3.4/24"
interface address "2014:1001:a0b:c0d::1/32"
interface address "::a0b:c0d/128"
"ppp0": flags "up|pointtopoint|multicast", ifindex 9, mtu 1496
hardware address ""
interface address "192.168.101.234/32"
interface address "10.20.30.40/24"
interface address "2014:1002::1/64"
"tun0": flags "up|pointtopoint", ifindex 11, mtu 1480
hardware address ""
interface address "192.168.10.1/24"
interface address "2014:1003::1/64"
Fixes #6433.
Update #4839
LGTM=iant
R=iant
CC=golang-codereviews
https://golang.org/cl/57700043
2014-02-14 09:07:51 -07:00
|
|
|
// We never return any /32 or /128 IP address
|
|
|
|
// prefix on any IP tunnel interface as the
|
|
|
|
// hardware address.
|
|
|
|
switch len(a.Value) {
|
|
|
|
case IPv4len:
|
|
|
|
switch ifim.Type {
|
|
|
|
case sysARPHardwareIPv4IPv4, sysARPHardwareGREIPv4, sysARPHardwareIPv6IPv4:
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
case IPv6len:
|
|
|
|
switch ifim.Type {
|
|
|
|
case sysARPHardwareIPv6IPv6, sysARPHardwareGREIPv6:
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2011-06-03 12:35:42 -06:00
|
|
|
var nonzero bool
|
|
|
|
for _, b := range a.Value {
|
|
|
|
if b != 0 {
|
|
|
|
nonzero = true
|
net: handle IP interface stack correctly on linux
A configuration like the following:
7: tun6rd: <NOARP,UP,LOWER_UP> mtu 1280
link/sit 10.11.12.13 brd 0.0.0.0
inet 1.2.3.4/24 scope global tun6rd
inet6 2014:1001:a0b:c0d::1/32 scope global
inet6 ::10.11.12.13/128 scope global
9: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1496
link/ppp
inet 192.168.101.234 peer 192.168.102.234/32 scope global ppp0
inet 10.20.30.40/24 scope global ppp0
inet6 2014:1002::1/64 scope global
11: tun0@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480
link/ipip 192.168.202.34 peer 192.168.202.69
inet 192.168.10.1/24 scope global tunnel0
inet6 2014:1003::1/64 scope global
will be handled like below.
"tun6rd": flags "up", ifindex 7, mtu 1280
hardware address ""
interface address "1.2.3.4/24"
interface address "2014:1001:a0b:c0d::1/32"
interface address "::a0b:c0d/128"
"ppp0": flags "up|pointtopoint|multicast", ifindex 9, mtu 1496
hardware address ""
interface address "192.168.101.234/32"
interface address "10.20.30.40/24"
interface address "2014:1002::1/64"
"tun0": flags "up|pointtopoint", ifindex 11, mtu 1480
hardware address ""
interface address "192.168.10.1/24"
interface address "2014:1003::1/64"
Fixes #6433.
Update #4839
LGTM=iant
R=iant
CC=golang-codereviews
https://golang.org/cl/57700043
2014-02-14 09:07:51 -07:00
|
|
|
break
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if nonzero {
|
|
|
|
ifi.HardwareAddr = a.Value[:]
|
|
|
|
}
|
|
|
|
case syscall.IFLA_IFNAME:
|
2011-06-14 11:32:52 -06:00
|
|
|
ifi.Name = string(a.Value[:len(a.Value)-1])
|
2011-06-03 12:35:42 -06:00
|
|
|
case syscall.IFLA_MTU:
|
2012-04-04 18:41:36 -06:00
|
|
|
ifi.MTU = int(*(*uint32)(unsafe.Pointer(&a.Value[:4][0])))
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return ifi
|
|
|
|
}
|
|
|
|
|
2011-06-14 11:32:52 -06:00
|
|
|
func linkFlags(rawFlags uint32) Flags {
|
|
|
|
var f Flags
|
|
|
|
if rawFlags&syscall.IFF_UP != 0 {
|
|
|
|
f |= FlagUp
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_BROADCAST != 0 {
|
|
|
|
f |= FlagBroadcast
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_LOOPBACK != 0 {
|
|
|
|
f |= FlagLoopback
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_POINTOPOINT != 0 {
|
|
|
|
f |= FlagPointToPoint
|
|
|
|
}
|
|
|
|
if rawFlags&syscall.IFF_MULTICAST != 0 {
|
|
|
|
f |= FlagMulticast
|
|
|
|
}
|
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
2013-02-27 22:58:41 -07:00
|
|
|
// If the ifi is nil, interfaceAddrTable returns addresses for all
|
|
|
|
// network interfaces. Otherwise it returns addresses for a specific
|
|
|
|
// interface.
|
|
|
|
func interfaceAddrTable(ifi *Interface) ([]Addr, error) {
|
2011-12-21 05:39:00 -07:00
|
|
|
tab, err := syscall.NetlinkRIB(syscall.RTM_GETADDR, syscall.AF_UNSPEC)
|
|
|
|
if err != nil {
|
|
|
|
return nil, os.NewSyscallError("netlink rib", err)
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2011-12-21 05:39:00 -07:00
|
|
|
msgs, err := syscall.ParseNetlinkMessage(tab)
|
|
|
|
if err != nil {
|
|
|
|
return nil, os.NewSyscallError("netlink message", err)
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2013-02-27 22:58:41 -07:00
|
|
|
var ift []Interface
|
|
|
|
if ifi == nil {
|
|
|
|
var err error
|
|
|
|
ift, err = interfaceTable(0)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ifat, err := addrTable(ift, ifi, msgs)
|
2011-12-21 05:39:00 -07:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2011-09-23 08:37:42 -06:00
|
|
|
return ifat, nil
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
|
|
|
|
2013-02-27 22:58:41 -07:00
|
|
|
func addrTable(ift []Interface, ifi *Interface, msgs []syscall.NetlinkMessage) ([]Addr, error) {
|
2011-06-03 12:35:42 -06:00
|
|
|
var ifat []Addr
|
2013-02-19 16:18:04 -07:00
|
|
|
loop:
|
2011-06-03 12:35:42 -06:00
|
|
|
for _, m := range msgs {
|
|
|
|
switch m.Header.Type {
|
|
|
|
case syscall.NLMSG_DONE:
|
2013-02-19 16:18:04 -07:00
|
|
|
break loop
|
2011-06-03 12:35:42 -06:00
|
|
|
case syscall.RTM_NEWADDR:
|
|
|
|
ifam := (*syscall.IfAddrmsg)(unsafe.Pointer(&m.Data[0]))
|
2013-02-27 22:58:41 -07:00
|
|
|
if len(ift) != 0 || ifi.Index == int(ifam.Index) {
|
|
|
|
if len(ift) != 0 {
|
|
|
|
var err error
|
|
|
|
ifi, err = interfaceByIndex(ift, int(ifam.Index))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2011-12-21 05:39:00 -07:00
|
|
|
attrs, err := syscall.ParseNetlinkRouteAttr(&m)
|
|
|
|
if err != nil {
|
|
|
|
return nil, os.NewSyscallError("netlink routeattr", err)
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2013-02-27 22:58:41 -07:00
|
|
|
ifa := newAddr(ifi, ifam, attrs)
|
|
|
|
if ifa != nil {
|
|
|
|
ifat = append(ifat, ifa)
|
|
|
|
}
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ifat, nil
|
|
|
|
}
|
|
|
|
|
2013-02-27 22:58:41 -07:00
|
|
|
func newAddr(ifi *Interface, ifam *syscall.IfAddrmsg, attrs []syscall.NetlinkRouteAttr) Addr {
|
net: handle IP interface stack correctly on linux
A configuration like the following:
7: tun6rd: <NOARP,UP,LOWER_UP> mtu 1280
link/sit 10.11.12.13 brd 0.0.0.0
inet 1.2.3.4/24 scope global tun6rd
inet6 2014:1001:a0b:c0d::1/32 scope global
inet6 ::10.11.12.13/128 scope global
9: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1496
link/ppp
inet 192.168.101.234 peer 192.168.102.234/32 scope global ppp0
inet 10.20.30.40/24 scope global ppp0
inet6 2014:1002::1/64 scope global
11: tun0@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480
link/ipip 192.168.202.34 peer 192.168.202.69
inet 192.168.10.1/24 scope global tunnel0
inet6 2014:1003::1/64 scope global
will be handled like below.
"tun6rd": flags "up", ifindex 7, mtu 1280
hardware address ""
interface address "1.2.3.4/24"
interface address "2014:1001:a0b:c0d::1/32"
interface address "::a0b:c0d/128"
"ppp0": flags "up|pointtopoint|multicast", ifindex 9, mtu 1496
hardware address ""
interface address "192.168.101.234/32"
interface address "10.20.30.40/24"
interface address "2014:1002::1/64"
"tun0": flags "up|pointtopoint", ifindex 11, mtu 1480
hardware address ""
interface address "192.168.10.1/24"
interface address "2014:1003::1/64"
Fixes #6433.
Update #4839
LGTM=iant
R=iant
CC=golang-codereviews
https://golang.org/cl/57700043
2014-02-14 09:07:51 -07:00
|
|
|
var ipPointToPoint bool
|
|
|
|
// Seems like we need to make sure whether the IP interface
|
|
|
|
// stack consists of IP point-to-point numbered or unnumbered
|
|
|
|
// addressing over point-to-point link encapsulation.
|
|
|
|
if ifi.Flags&FlagPointToPoint != 0 {
|
|
|
|
for _, a := range attrs {
|
|
|
|
if a.Attr.Type == syscall.IFA_LOCAL {
|
|
|
|
ipPointToPoint = true
|
|
|
|
break
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
net: handle IP interface stack correctly on linux
A configuration like the following:
7: tun6rd: <NOARP,UP,LOWER_UP> mtu 1280
link/sit 10.11.12.13 brd 0.0.0.0
inet 1.2.3.4/24 scope global tun6rd
inet6 2014:1001:a0b:c0d::1/32 scope global
inet6 ::10.11.12.13/128 scope global
9: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1496
link/ppp
inet 192.168.101.234 peer 192.168.102.234/32 scope global ppp0
inet 10.20.30.40/24 scope global ppp0
inet6 2014:1002::1/64 scope global
11: tun0@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480
link/ipip 192.168.202.34 peer 192.168.202.69
inet 192.168.10.1/24 scope global tunnel0
inet6 2014:1003::1/64 scope global
will be handled like below.
"tun6rd": flags "up", ifindex 7, mtu 1280
hardware address ""
interface address "1.2.3.4/24"
interface address "2014:1001:a0b:c0d::1/32"
interface address "::a0b:c0d/128"
"ppp0": flags "up|pointtopoint|multicast", ifindex 9, mtu 1496
hardware address ""
interface address "192.168.101.234/32"
interface address "10.20.30.40/24"
interface address "2014:1002::1/64"
"tun0": flags "up|pointtopoint", ifindex 11, mtu 1480
hardware address ""
interface address "192.168.10.1/24"
interface address "2014:1003::1/64"
Fixes #6433.
Update #4839
LGTM=iant
R=iant
CC=golang-codereviews
https://golang.org/cl/57700043
2014-02-14 09:07:51 -07:00
|
|
|
for _, a := range attrs {
|
|
|
|
if ipPointToPoint && a.Attr.Type == syscall.IFA_ADDRESS || !ipPointToPoint && a.Attr.Type == syscall.IFA_LOCAL {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
switch ifam.Family {
|
|
|
|
case syscall.AF_INET:
|
|
|
|
return &IPNet{IP: IPv4(a.Value[0], a.Value[1], a.Value[2], a.Value[3]), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv4len)}
|
|
|
|
case syscall.AF_INET6:
|
|
|
|
ifa := &IPNet{IP: make(IP, IPv6len), Mask: CIDRMask(int(ifam.Prefixlen), 8*IPv6len)}
|
|
|
|
copy(ifa.IP, a.Value[:])
|
|
|
|
return ifa
|
|
|
|
}
|
|
|
|
}
|
2013-02-27 22:58:41 -07:00
|
|
|
return nil
|
2011-06-03 12:35:42 -06:00
|
|
|
}
|
2011-08-03 22:22:52 -06:00
|
|
|
|
2013-02-27 22:58:41 -07:00
|
|
|
// interfaceMulticastAddrTable returns addresses for a specific
|
|
|
|
// interface.
|
|
|
|
func interfaceMulticastAddrTable(ifi *Interface) ([]Addr, error) {
|
2012-02-22 14:26:31 -07:00
|
|
|
ifmat4 := parseProcNetIGMP("/proc/net/igmp", ifi)
|
|
|
|
ifmat6 := parseProcNetIGMP6("/proc/net/igmp6", ifi)
|
2011-08-03 22:22:52 -06:00
|
|
|
return append(ifmat4, ifmat6...), nil
|
|
|
|
}
|
|
|
|
|
2012-02-22 14:26:31 -07:00
|
|
|
func parseProcNetIGMP(path string, ifi *Interface) []Addr {
|
|
|
|
fd, err := open(path)
|
2011-08-03 22:22:52 -06:00
|
|
|
if err != nil {
|
2011-08-04 17:20:13 -06:00
|
|
|
return nil
|
2011-08-03 22:22:52 -06:00
|
|
|
}
|
|
|
|
defer fd.close()
|
2012-01-31 08:36:45 -07:00
|
|
|
var (
|
|
|
|
ifmat []Addr
|
|
|
|
name string
|
|
|
|
)
|
2011-08-03 22:22:52 -06:00
|
|
|
fd.readLine() // skip first line
|
|
|
|
b := make([]byte, IPv4len)
|
|
|
|
for l, ok := fd.readLine(); ok; l, ok = fd.readLine() {
|
2012-02-22 14:26:31 -07:00
|
|
|
f := splitAtBytes(l, " :\r\t\n")
|
|
|
|
if len(f) < 4 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
switch {
|
|
|
|
case l[0] != ' ' && l[0] != '\t': // new interface line
|
|
|
|
name = f[1]
|
|
|
|
case len(f[0]) == 8:
|
2011-08-03 22:22:52 -06:00
|
|
|
if ifi == nil || name == ifi.Name {
|
2012-04-04 18:41:36 -06:00
|
|
|
// The Linux kernel puts the IP
|
|
|
|
// address in /proc/net/igmp in native
|
|
|
|
// endianness.
|
2012-03-05 14:36:05 -07:00
|
|
|
for i := 0; i+1 < len(f[0]); i += 2 {
|
|
|
|
b[i/2], _ = xtoi2(f[0][i:i+2], 0)
|
|
|
|
}
|
2012-04-04 18:41:36 -06:00
|
|
|
i := *(*uint32)(unsafe.Pointer(&b[:4][0]))
|
2015-04-01 16:17:09 -06:00
|
|
|
ifma := &IPAddr{IP: IPv4(byte(i>>24), byte(i>>16), byte(i>>8), byte(i))}
|
|
|
|
ifmat = append(ifmat, ifma)
|
2011-08-03 22:22:52 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-08-04 17:20:13 -06:00
|
|
|
return ifmat
|
2011-08-03 22:22:52 -06:00
|
|
|
}
|
|
|
|
|
2012-02-22 14:26:31 -07:00
|
|
|
func parseProcNetIGMP6(path string, ifi *Interface) []Addr {
|
|
|
|
fd, err := open(path)
|
2011-08-03 22:22:52 -06:00
|
|
|
if err != nil {
|
2011-08-04 17:20:13 -06:00
|
|
|
return nil
|
2011-08-03 22:22:52 -06:00
|
|
|
}
|
|
|
|
defer fd.close()
|
2012-01-31 08:36:45 -07:00
|
|
|
var ifmat []Addr
|
2011-08-03 22:22:52 -06:00
|
|
|
b := make([]byte, IPv6len)
|
|
|
|
for l, ok := fd.readLine(); ok; l, ok = fd.readLine() {
|
2012-02-22 14:26:31 -07:00
|
|
|
f := splitAtBytes(l, " \r\t\n")
|
|
|
|
if len(f) < 6 {
|
|
|
|
continue
|
|
|
|
}
|
2011-08-03 22:22:52 -06:00
|
|
|
if ifi == nil || f[1] == ifi.Name {
|
2012-03-05 14:36:05 -07:00
|
|
|
for i := 0; i+1 < len(f[2]); i += 2 {
|
|
|
|
b[i/2], _ = xtoi2(f[2][i:i+2], 0)
|
|
|
|
}
|
2015-04-01 16:17:09 -06:00
|
|
|
ifma := &IPAddr{IP: IP{b[0], b[1], b[2], b[3], b[4], b[5], b[6], b[7], b[8], b[9], b[10], b[11], b[12], b[13], b[14], b[15]}}
|
|
|
|
ifmat = append(ifmat, ifma)
|
2011-08-03 22:22:52 -06:00
|
|
|
}
|
|
|
|
}
|
2011-08-04 17:20:13 -06:00
|
|
|
return ifmat
|
2011-08-03 22:22:52 -06:00
|
|
|
}
|