]>
Commit | Line | Data |
---|---|---|
aba5acdf SH |
1 | /* |
2 | * iproute.c "ip route". | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or | |
5 | * modify it under the terms of the GNU General Public License | |
6 | * as published by the Free Software Foundation; either version | |
7 | * 2 of the License, or (at your option) any later version. | |
8 | * | |
9 | * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> | |
10 | * | |
aba5acdf SH |
11 | */ |
12 | ||
13 | #include <stdio.h> | |
14 | #include <stdlib.h> | |
15 | #include <unistd.h> | |
16 | #include <syslog.h> | |
17 | #include <fcntl.h> | |
18 | #include <string.h> | |
33551240 | 19 | #include <time.h> |
aba5acdf SH |
20 | #include <sys/time.h> |
21 | #include <sys/socket.h> | |
22 | #include <netinet/in.h> | |
23 | #include <netinet/ip.h> | |
24 | #include <arpa/inet.h> | |
25 | #include <linux/in_route.h> | |
f4ff11e3 | 26 | #include <errno.h> |
aba5acdf SH |
27 | |
28 | #include "rt_names.h" | |
29 | #include "utils.h" | |
30 | #include "ip_common.h" | |
31 | ||
32 | #ifndef RTAX_RTTVAR | |
33 | #define RTAX_RTTVAR RTAX_HOPS | |
34 | #endif | |
35 | ||
f4ff11e3 DS |
36 | enum list_action { |
37 | IPROUTE_LIST, | |
38 | IPROUTE_FLUSH, | |
39 | IPROUTE_SAVE, | |
40 | }; | |
f38c7334 SH |
41 | static const char *mx_names[RTAX_MAX+1] = { |
42 | [RTAX_MTU] = "mtu", | |
43 | [RTAX_WINDOW] = "window", | |
44 | [RTAX_RTT] = "rtt", | |
45 | [RTAX_RTTVAR] = "rttvar", | |
46 | [RTAX_SSTHRESH] = "ssthresh", | |
47 | [RTAX_CWND] = "cwnd", | |
48 | [RTAX_ADVMSS] = "advmss", | |
49 | [RTAX_REORDERING]="reordering", | |
50 | [RTAX_HOPLIMIT] = "hoplimit", | |
51 | [RTAX_INITCWND] = "initcwnd", | |
52 | [RTAX_FEATURES] = "features", | |
54e0b2e7 | 53 | [RTAX_RTO_MIN] = "rto_min", |
f5fd8003 | 54 | [RTAX_INITRWND] = "initrwnd", |
b37f2c89 | 55 | [RTAX_QUICKACK] = "quickack", |
f38c7334 | 56 | }; |
aba5acdf SH |
57 | static void usage(void) __attribute__((noreturn)); |
58 | ||
59 | static void usage(void) | |
60 | { | |
61 | fprintf(stderr, "Usage: ip route { list | flush } SELECTOR\n"); | |
f4ff11e3 DS |
62 | fprintf(stderr, " ip route save SELECTOR\n"); |
63 | fprintf(stderr, " ip route restore\n"); | |
93b79863 | 64 | fprintf(stderr, " ip route showdump\n"); |
aba5acdf | 65 | fprintf(stderr, " ip route get ADDRESS [ from ADDRESS iif STRING ]\n"); |
8f480637 | 66 | fprintf(stderr, " [ oif STRING ] [ tos TOS ]\n"); |
b0373bfb | 67 | fprintf(stderr, " [ mark NUMBER ]\n"); |
c0c44bfe | 68 | fprintf(stderr, " ip route { add | del | change | append | replace } ROUTE\n"); |
aba5acdf SH |
69 | fprintf(stderr, "SELECTOR := [ root PREFIX ] [ match PREFIX ] [ exact PREFIX ]\n"); |
70 | fprintf(stderr, " [ table TABLE_ID ] [ proto RTPROTO ]\n"); | |
71 | fprintf(stderr, " [ type TYPE ] [ scope SCOPE ]\n"); | |
72 | fprintf(stderr, "ROUTE := NODE_SPEC [ INFO_SPEC ]\n"); | |
73 | fprintf(stderr, "NODE_SPEC := [ TYPE ] PREFIX [ tos TOS ]\n"); | |
74 | fprintf(stderr, " [ table TABLE_ID ] [ proto RTPROTO ]\n"); | |
75 | fprintf(stderr, " [ scope SCOPE ] [ metric METRIC ]\n"); | |
76 | fprintf(stderr, "INFO_SPEC := NH OPTIONS FLAGS [ nexthop NH ]...\n"); | |
77 | fprintf(stderr, "NH := [ via ADDRESS ] [ dev STRING ] [ weight NUMBER ] NHFLAGS\n"); | |
78 | fprintf(stderr, "OPTIONS := FLAGS [ mtu NUMBER ] [ advmss NUMBER ]\n"); | |
8f480637 | 79 | fprintf(stderr, " [ rtt TIME ] [ rttvar TIME ] [ reordering NUMBER ]\n"); |
a1f1143e | 80 | fprintf(stderr, " [ window NUMBER] [ cwnd NUMBER ] [ initcwnd NUMBER ]\n"); |
576c63ee | 81 | fprintf(stderr, " [ ssthresh NUMBER ] [ realms REALM ] [ src ADDRESS ]\n"); |
f5fd8003 | 82 | fprintf(stderr, " [ rto_min TIME ] [ hoplimit NUMBER ] [ initrwnd NUMBER ]\n"); |
b37f2c89 | 83 | fprintf(stderr, " [ quickack BOOL ]\n"); |
aba5acdf SH |
84 | fprintf(stderr, "TYPE := [ unicast | local | broadcast | multicast | throw |\n"); |
85 | fprintf(stderr, " unreachable | prohibit | blackhole | nat ]\n"); | |
86 | fprintf(stderr, "TABLE_ID := [ local | main | default | all | NUMBER ]\n"); | |
87 | fprintf(stderr, "SCOPE := [ host | link | global | NUMBER ]\n"); | |
aba5acdf SH |
88 | fprintf(stderr, "NHFLAGS := [ onlink | pervasive ]\n"); |
89 | fprintf(stderr, "RTPROTO := [ kernel | boot | static | NUMBER ]\n"); | |
9b2cdc00 | 90 | fprintf(stderr, "TIME := NUMBER[s|ms]\n"); |
b37f2c89 | 91 | fprintf(stderr, "BOOL := [1|0]\n"); |
aba5acdf SH |
92 | exit(-1); |
93 | } | |
94 | ||
95 | ||
96 | static struct | |
97 | { | |
caae16b3 | 98 | unsigned int tb; |
bd4bcdad | 99 | int cloned; |
aba5acdf SH |
100 | int flushed; |
101 | char *flushb; | |
102 | int flushp; | |
103 | int flushe; | |
aba5acdf SH |
104 | int protocol, protocolmask; |
105 | int scope, scopemask; | |
106 | int type, typemask; | |
107 | int tos, tosmask; | |
108 | int iif, iifmask; | |
109 | int oif, oifmask; | |
b0373bfb | 110 | int mark, markmask; |
aba5acdf SH |
111 | int realm, realmmask; |
112 | inet_prefix rprefsrc; | |
113 | inet_prefix rvia; | |
114 | inet_prefix rdst; | |
115 | inet_prefix mdst; | |
116 | inet_prefix rsrc; | |
117 | inet_prefix msrc; | |
118 | } filter; | |
119 | ||
120 | static int flush_update(void) | |
121 | { | |
f31a37f7 | 122 | if (rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) { |
1fb0a998 | 123 | perror("Failed to send flush request"); |
aba5acdf SH |
124 | return -1; |
125 | } | |
126 | filter.flushp = 0; | |
127 | return 0; | |
128 | } | |
129 | ||
d1f28cf1 | 130 | static int filter_nlmsg(struct nlmsghdr *n, struct rtattr **tb, int host_len) |
aba5acdf | 131 | { |
aba5acdf | 132 | struct rtmsg *r = NLMSG_DATA(n); |
aba5acdf SH |
133 | inet_prefix dst; |
134 | inet_prefix src; | |
aba5acdf | 135 | inet_prefix via; |
f4ff11e3 | 136 | inet_prefix prefsrc; |
34e95647 | 137 | __u32 table; |
f4ff11e3 | 138 | static int ip6_multiple_tables; |
aba5acdf | 139 | |
34e95647 PM |
140 | table = rtm_get_table(r, tb); |
141 | ||
142 | if (r->rtm_family == AF_INET6 && table != RT_TABLE_MAIN) | |
e0b29fe7 PM |
143 | ip6_multiple_tables = 1; |
144 | ||
44792827 UW |
145 | if (filter.cloned == !(r->rtm_flags&RTM_F_CLONED)) |
146 | return 0; | |
147 | ||
e0b29fe7 | 148 | if (r->rtm_family == AF_INET6 && !ip6_multiple_tables) { |
aba5acdf | 149 | if (filter.tb) { |
bd4bcdad PM |
150 | if (filter.tb == RT_TABLE_LOCAL) { |
151 | if (r->rtm_type != RTN_LOCAL) | |
aba5acdf | 152 | return 0; |
bd4bcdad PM |
153 | } else if (filter.tb == RT_TABLE_MAIN) { |
154 | if (r->rtm_type == RTN_LOCAL) | |
aba5acdf | 155 | return 0; |
bd4bcdad PM |
156 | } else { |
157 | return 0; | |
aba5acdf SH |
158 | } |
159 | } | |
160 | } else { | |
34e95647 | 161 | if (filter.tb > 0 && filter.tb != table) |
aba5acdf SH |
162 | return 0; |
163 | } | |
164 | if ((filter.protocol^r->rtm_protocol)&filter.protocolmask) | |
165 | return 0; | |
166 | if ((filter.scope^r->rtm_scope)&filter.scopemask) | |
167 | return 0; | |
168 | if ((filter.type^r->rtm_type)&filter.typemask) | |
169 | return 0; | |
170 | if ((filter.tos^r->rtm_tos)&filter.tosmask) | |
171 | return 0; | |
172 | if (filter.rdst.family && | |
173 | (r->rtm_family != filter.rdst.family || filter.rdst.bitlen > r->rtm_dst_len)) | |
174 | return 0; | |
175 | if (filter.mdst.family && | |
176 | (r->rtm_family != filter.mdst.family || | |
177 | (filter.mdst.bitlen >= 0 && filter.mdst.bitlen < r->rtm_dst_len))) | |
178 | return 0; | |
179 | if (filter.rsrc.family && | |
180 | (r->rtm_family != filter.rsrc.family || filter.rsrc.bitlen > r->rtm_src_len)) | |
181 | return 0; | |
182 | if (filter.msrc.family && | |
183 | (r->rtm_family != filter.msrc.family || | |
184 | (filter.msrc.bitlen >= 0 && filter.msrc.bitlen < r->rtm_src_len))) | |
185 | return 0; | |
186 | if (filter.rvia.family && r->rtm_family != filter.rvia.family) | |
187 | return 0; | |
188 | if (filter.rprefsrc.family && r->rtm_family != filter.rprefsrc.family) | |
189 | return 0; | |
190 | ||
aba5acdf SH |
191 | memset(&dst, 0, sizeof(dst)); |
192 | dst.family = r->rtm_family; | |
193 | if (tb[RTA_DST]) | |
194 | memcpy(&dst.data, RTA_DATA(tb[RTA_DST]), (r->rtm_dst_len+7)/8); | |
195 | if (filter.rsrc.family || filter.msrc.family) { | |
196 | memset(&src, 0, sizeof(src)); | |
197 | src.family = r->rtm_family; | |
198 | if (tb[RTA_SRC]) | |
199 | memcpy(&src.data, RTA_DATA(tb[RTA_SRC]), (r->rtm_src_len+7)/8); | |
200 | } | |
201 | if (filter.rvia.bitlen>0) { | |
202 | memset(&via, 0, sizeof(via)); | |
203 | via.family = r->rtm_family; | |
204 | if (tb[RTA_GATEWAY]) | |
7849fb55 | 205 | memcpy(&via.data, RTA_DATA(tb[RTA_GATEWAY]), host_len/8); |
aba5acdf SH |
206 | } |
207 | if (filter.rprefsrc.bitlen>0) { | |
208 | memset(&prefsrc, 0, sizeof(prefsrc)); | |
209 | prefsrc.family = r->rtm_family; | |
210 | if (tb[RTA_PREFSRC]) | |
7849fb55 | 211 | memcpy(&prefsrc.data, RTA_DATA(tb[RTA_PREFSRC]), host_len/8); |
aba5acdf SH |
212 | } |
213 | ||
214 | if (filter.rdst.family && inet_addr_match(&dst, &filter.rdst, filter.rdst.bitlen)) | |
215 | return 0; | |
216 | if (filter.mdst.family && filter.mdst.bitlen >= 0 && | |
217 | inet_addr_match(&dst, &filter.mdst, r->rtm_dst_len)) | |
218 | return 0; | |
219 | ||
220 | if (filter.rsrc.family && inet_addr_match(&src, &filter.rsrc, filter.rsrc.bitlen)) | |
221 | return 0; | |
222 | if (filter.msrc.family && filter.msrc.bitlen >= 0 && | |
223 | inet_addr_match(&src, &filter.msrc, r->rtm_src_len)) | |
224 | return 0; | |
225 | ||
226 | if (filter.rvia.family && inet_addr_match(&via, &filter.rvia, filter.rvia.bitlen)) | |
227 | return 0; | |
228 | if (filter.rprefsrc.family && inet_addr_match(&prefsrc, &filter.rprefsrc, filter.rprefsrc.bitlen)) | |
229 | return 0; | |
230 | if (filter.realmmask) { | |
231 | __u32 realms = 0; | |
232 | if (tb[RTA_FLOW]) | |
ff24746c | 233 | realms = rta_getattr_u32(tb[RTA_FLOW]); |
aba5acdf SH |
234 | if ((realms^filter.realm)&filter.realmmask) |
235 | return 0; | |
236 | } | |
237 | if (filter.iifmask) { | |
238 | int iif = 0; | |
239 | if (tb[RTA_IIF]) | |
240 | iif = *(int*)RTA_DATA(tb[RTA_IIF]); | |
241 | if ((iif^filter.iif)&filter.iifmask) | |
242 | return 0; | |
243 | } | |
244 | if (filter.oifmask) { | |
245 | int oif = 0; | |
246 | if (tb[RTA_OIF]) | |
247 | oif = *(int*)RTA_DATA(tb[RTA_OIF]); | |
248 | if ((oif^filter.oif)&filter.oifmask) | |
249 | return 0; | |
250 | } | |
b0373bfb ED |
251 | if (filter.markmask) { |
252 | int mark = 0; | |
253 | if (tb[RTA_MARK]) | |
254 | mark = *(int *)RTA_DATA(tb[RTA_MARK]); | |
255 | if ((mark ^ filter.mark) & filter.markmask) | |
256 | return 0; | |
257 | } | |
ae665a52 | 258 | if (filter.flushb && |
aba5acdf SH |
259 | r->rtm_family == AF_INET6 && |
260 | r->rtm_dst_len == 0 && | |
261 | r->rtm_type == RTN_UNREACHABLE && | |
262 | tb[RTA_PRIORITY] && | |
263 | *(int*)RTA_DATA(tb[RTA_PRIORITY]) == -1) | |
264 | return 0; | |
265 | ||
f4ff11e3 DS |
266 | return 1; |
267 | } | |
268 | ||
d1f28cf1 | 269 | static int calc_host_len(const struct rtmsg *r) |
f4ff11e3 DS |
270 | { |
271 | if (r->rtm_family == AF_INET6) | |
272 | return 128; | |
273 | else if (r->rtm_family == AF_INET) | |
274 | return 32; | |
275 | else if (r->rtm_family == AF_DECnet) | |
276 | return 16; | |
277 | else if (r->rtm_family == AF_IPX) | |
278 | return 80; | |
279 | else | |
280 | return -1; | |
281 | } | |
282 | ||
283 | int print_route(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg) | |
284 | { | |
285 | FILE *fp = (FILE*)arg; | |
286 | struct rtmsg *r = NLMSG_DATA(n); | |
287 | int len = n->nlmsg_len; | |
288 | struct rtattr * tb[RTA_MAX+1]; | |
289 | char abuf[256]; | |
290 | int host_len = -1; | |
291 | __u32 table; | |
292 | SPRINT_BUF(b1); | |
293 | static int hz; | |
294 | ||
295 | if (n->nlmsg_type != RTM_NEWROUTE && n->nlmsg_type != RTM_DELROUTE) { | |
296 | fprintf(stderr, "Not a route: %08x %08x %08x\n", | |
297 | n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags); | |
298 | return 0; | |
299 | } | |
300 | if (filter.flushb && n->nlmsg_type != RTM_NEWROUTE) | |
301 | return 0; | |
302 | len -= NLMSG_LENGTH(sizeof(*r)); | |
303 | if (len < 0) { | |
304 | fprintf(stderr, "BUG: wrong nlmsg len %d\n", len); | |
305 | return -1; | |
306 | } | |
307 | ||
308 | host_len = calc_host_len(r); | |
309 | ||
310 | parse_rtattr(tb, RTA_MAX, RTM_RTA(r), len); | |
311 | table = rtm_get_table(r, tb); | |
312 | ||
313 | if (!filter_nlmsg(n, tb, host_len)) | |
314 | return 0; | |
315 | ||
aba5acdf SH |
316 | if (filter.flushb) { |
317 | struct nlmsghdr *fn; | |
318 | if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) { | |
319 | if (flush_update()) | |
320 | return -1; | |
321 | } | |
322 | fn = (struct nlmsghdr*)(filter.flushb + NLMSG_ALIGN(filter.flushp)); | |
323 | memcpy(fn, n, n->nlmsg_len); | |
324 | fn->nlmsg_type = RTM_DELROUTE; | |
325 | fn->nlmsg_flags = NLM_F_REQUEST; | |
351efcde | 326 | fn->nlmsg_seq = ++rth.seq; |
aba5acdf SH |
327 | filter.flushp = (((char*)fn) + n->nlmsg_len) - filter.flushb; |
328 | filter.flushed++; | |
329 | if (show_stats < 2) | |
330 | return 0; | |
331 | } | |
332 | ||
333 | if (n->nlmsg_type == RTM_DELROUTE) | |
334 | fprintf(fp, "Deleted "); | |
577e5a53 | 335 | if ((r->rtm_type != RTN_UNICAST || show_details > 0) && !filter.type) |
aba5acdf SH |
336 | fprintf(fp, "%s ", rtnl_rtntype_n2a(r->rtm_type, b1, sizeof(b1))); |
337 | ||
338 | if (tb[RTA_DST]) { | |
339 | if (r->rtm_dst_len != host_len) { | |
340 | fprintf(fp, "%s/%u ", rt_addr_n2a(r->rtm_family, | |
aba5acdf SH |
341 | RTA_DATA(tb[RTA_DST]), |
342 | abuf, sizeof(abuf)), | |
343 | r->rtm_dst_len | |
344 | ); | |
345 | } else { | |
346 | fprintf(fp, "%s ", format_host(r->rtm_family, | |
347 | RTA_PAYLOAD(tb[RTA_DST]), | |
348 | RTA_DATA(tb[RTA_DST]), | |
349 | abuf, sizeof(abuf)) | |
350 | ); | |
351 | } | |
352 | } else if (r->rtm_dst_len) { | |
353 | fprintf(fp, "0/%d ", r->rtm_dst_len); | |
354 | } else { | |
355 | fprintf(fp, "default "); | |
356 | } | |
357 | if (tb[RTA_SRC]) { | |
358 | if (r->rtm_src_len != host_len) { | |
359 | fprintf(fp, "from %s/%u ", rt_addr_n2a(r->rtm_family, | |
aba5acdf SH |
360 | RTA_DATA(tb[RTA_SRC]), |
361 | abuf, sizeof(abuf)), | |
362 | r->rtm_src_len | |
363 | ); | |
364 | } else { | |
365 | fprintf(fp, "from %s ", format_host(r->rtm_family, | |
366 | RTA_PAYLOAD(tb[RTA_SRC]), | |
367 | RTA_DATA(tb[RTA_SRC]), | |
368 | abuf, sizeof(abuf)) | |
369 | ); | |
370 | } | |
371 | } else if (r->rtm_src_len) { | |
372 | fprintf(fp, "from 0/%u ", r->rtm_src_len); | |
373 | } | |
374 | if (r->rtm_tos && filter.tosmask != -1) { | |
375 | SPRINT_BUF(b1); | |
376 | fprintf(fp, "tos %s ", rtnl_dsfield_n2a(r->rtm_tos, b1, sizeof(b1))); | |
377 | } | |
02d2ae55 | 378 | |
aba5acdf | 379 | if (tb[RTA_GATEWAY] && filter.rvia.bitlen != host_len) { |
ae665a52 | 380 | fprintf(fp, "via %s ", |
aba5acdf SH |
381 | format_host(r->rtm_family, |
382 | RTA_PAYLOAD(tb[RTA_GATEWAY]), | |
383 | RTA_DATA(tb[RTA_GATEWAY]), | |
384 | abuf, sizeof(abuf))); | |
385 | } | |
386 | if (tb[RTA_OIF] && filter.oifmask != -1) | |
387 | fprintf(fp, "dev %s ", ll_index_to_name(*(int*)RTA_DATA(tb[RTA_OIF]))); | |
388 | ||
389 | if (!(r->rtm_flags&RTM_F_CLONED)) { | |
577e5a53 | 390 | if ((table != RT_TABLE_MAIN || show_details > 0) && !filter.tb) |
34e95647 | 391 | fprintf(fp, " table %s ", rtnl_rttable_n2a(table, b1, sizeof(b1))); |
577e5a53 | 392 | if ((r->rtm_protocol != RTPROT_BOOT || show_details > 0) && filter.protocolmask != -1) |
aba5acdf | 393 | fprintf(fp, " proto %s ", rtnl_rtprot_n2a(r->rtm_protocol, b1, sizeof(b1))); |
577e5a53 | 394 | if ((r->rtm_scope != RT_SCOPE_UNIVERSE || show_details > 0) && filter.scopemask != -1) |
aba5acdf SH |
395 | fprintf(fp, " scope %s ", rtnl_rtscope_n2a(r->rtm_scope, b1, sizeof(b1))); |
396 | } | |
397 | if (tb[RTA_PREFSRC] && filter.rprefsrc.bitlen != host_len) { | |
398 | /* Do not use format_host(). It is our local addr | |
399 | and symbolic name will not be useful. | |
400 | */ | |
ae665a52 | 401 | fprintf(fp, " src %s ", |
aba5acdf | 402 | rt_addr_n2a(r->rtm_family, |
aba5acdf SH |
403 | RTA_DATA(tb[RTA_PREFSRC]), |
404 | abuf, sizeof(abuf))); | |
405 | } | |
406 | if (tb[RTA_PRIORITY]) | |
ff24746c | 407 | fprintf(fp, " metric %u ", rta_getattr_u32(tb[RTA_PRIORITY])); |
aba5acdf SH |
408 | if (r->rtm_flags & RTNH_F_DEAD) |
409 | fprintf(fp, "dead "); | |
410 | if (r->rtm_flags & RTNH_F_ONLINK) | |
411 | fprintf(fp, "onlink "); | |
412 | if (r->rtm_flags & RTNH_F_PERVASIVE) | |
413 | fprintf(fp, "pervasive "); | |
aba5acdf SH |
414 | if (r->rtm_flags & RTM_F_NOTIFY) |
415 | fprintf(fp, "notify "); | |
b0373bfb ED |
416 | if (tb[RTA_MARK]) { |
417 | unsigned int mark = *(unsigned int*)RTA_DATA(tb[RTA_MARK]); | |
418 | if (mark) { | |
419 | if (mark >= 16) | |
420 | fprintf(fp, " mark 0x%x", mark); | |
421 | else | |
422 | fprintf(fp, " mark %u", mark); | |
423 | } | |
424 | } | |
aba5acdf SH |
425 | |
426 | if (tb[RTA_FLOW] && filter.realmmask != ~0U) { | |
ff24746c | 427 | __u32 to = rta_getattr_u32(tb[RTA_FLOW]); |
aba5acdf SH |
428 | __u32 from = to>>16; |
429 | to &= 0xFFFF; | |
430 | fprintf(fp, "realm%s ", from ? "s" : ""); | |
431 | if (from) { | |
432 | fprintf(fp, "%s/", | |
433 | rtnl_rtrealm_n2a(from, b1, sizeof(b1))); | |
434 | } | |
435 | fprintf(fp, "%s ", | |
436 | rtnl_rtrealm_n2a(to, b1, sizeof(b1))); | |
437 | } | |
438 | if ((r->rtm_flags&RTM_F_CLONED) && r->rtm_family == AF_INET) { | |
439 | __u32 flags = r->rtm_flags&~0xFFFF; | |
440 | int first = 1; | |
441 | ||
442 | fprintf(fp, "%s cache ", _SL_); | |
443 | ||
444 | #define PRTFL(fl,flname) if (flags&RTCF_##fl) { \ | |
445 | flags &= ~RTCF_##fl; \ | |
446 | fprintf(fp, "%s" flname "%s", first ? "<" : "", flags ? "," : "> "); \ | |
447 | first = 0; } | |
448 | PRTFL(LOCAL, "local"); | |
449 | PRTFL(REJECT, "reject"); | |
450 | PRTFL(MULTICAST, "mc"); | |
451 | PRTFL(BROADCAST, "brd"); | |
452 | PRTFL(DNAT, "dst-nat"); | |
453 | PRTFL(SNAT, "src-nat"); | |
454 | PRTFL(MASQ, "masq"); | |
455 | PRTFL(DIRECTDST, "dst-direct"); | |
456 | PRTFL(DIRECTSRC, "src-direct"); | |
457 | PRTFL(REDIRECTED, "redirected"); | |
458 | PRTFL(DOREDIRECT, "redirect"); | |
459 | PRTFL(FAST, "fastroute"); | |
460 | PRTFL(NOTIFY, "notify"); | |
461 | PRTFL(TPROXY, "proxy"); | |
63a0f20a | 462 | |
aba5acdf SH |
463 | if (flags) |
464 | fprintf(fp, "%s%x> ", first ? "<" : "", flags); | |
465 | if (tb[RTA_CACHEINFO]) { | |
466 | struct rta_cacheinfo *ci = RTA_DATA(tb[RTA_CACHEINFO]); | |
aba5acdf | 467 | if (!hz) |
5e8bc631 | 468 | hz = get_user_hz(); |
aba5acdf SH |
469 | if (ci->rta_expires != 0) |
470 | fprintf(fp, " expires %dsec", ci->rta_expires/hz); | |
471 | if (ci->rta_error != 0) | |
472 | fprintf(fp, " error %d", ci->rta_error); | |
473 | if (show_stats) { | |
474 | if (ci->rta_clntref) | |
475 | fprintf(fp, " users %d", ci->rta_clntref); | |
476 | if (ci->rta_used != 0) | |
477 | fprintf(fp, " used %d", ci->rta_used); | |
478 | if (ci->rta_lastuse != 0) | |
479 | fprintf(fp, " age %dsec", ci->rta_lastuse/hz); | |
480 | } | |
aba5acdf SH |
481 | if (ci->rta_id) |
482 | fprintf(fp, " ipid 0x%04x", ci->rta_id); | |
483 | if (ci->rta_ts || ci->rta_tsage) | |
d5b7420a SH |
484 | fprintf(fp, " ts 0x%x tsage %dsec", |
485 | ci->rta_ts, ci->rta_tsage); | |
aba5acdf SH |
486 | } |
487 | } else if (r->rtm_family == AF_INET6) { | |
488 | struct rta_cacheinfo *ci = NULL; | |
489 | if (tb[RTA_CACHEINFO]) | |
490 | ci = RTA_DATA(tb[RTA_CACHEINFO]); | |
491 | if ((r->rtm_flags & RTM_F_CLONED) || (ci && ci->rta_expires)) { | |
aba5acdf | 492 | if (!hz) |
5e8bc631 | 493 | hz = get_user_hz(); |
aba5acdf SH |
494 | if (r->rtm_flags & RTM_F_CLONED) |
495 | fprintf(fp, "%s cache ", _SL_); | |
496 | if (ci->rta_expires) | |
497 | fprintf(fp, " expires %dsec", ci->rta_expires/hz); | |
498 | if (ci->rta_error != 0) | |
499 | fprintf(fp, " error %d", ci->rta_error); | |
500 | if (show_stats) { | |
501 | if (ci->rta_clntref) | |
502 | fprintf(fp, " users %d", ci->rta_clntref); | |
503 | if (ci->rta_used != 0) | |
504 | fprintf(fp, " used %d", ci->rta_used); | |
505 | if (ci->rta_lastuse != 0) | |
506 | fprintf(fp, " age %dsec", ci->rta_lastuse/hz); | |
507 | } | |
508 | } else if (ci) { | |
509 | if (ci->rta_error != 0) | |
510 | fprintf(fp, " error %d", ci->rta_error); | |
511 | } | |
512 | } | |
513 | if (tb[RTA_METRICS]) { | |
514 | int i; | |
515 | unsigned mxlock = 0; | |
516 | struct rtattr *mxrta[RTAX_MAX+1]; | |
517 | ||
aba5acdf SH |
518 | parse_rtattr(mxrta, RTAX_MAX, RTA_DATA(tb[RTA_METRICS]), |
519 | RTA_PAYLOAD(tb[RTA_METRICS])); | |
520 | if (mxrta[RTAX_LOCK]) | |
521 | mxlock = *(unsigned*)RTA_DATA(mxrta[RTAX_LOCK]); | |
522 | ||
f38c7334 | 523 | for (i=2; i<= RTAX_MAX; i++) { |
ced61d7d SH |
524 | unsigned val; |
525 | ||
aba5acdf SH |
526 | if (mxrta[i] == NULL) |
527 | continue; | |
6a79240b SH |
528 | |
529 | if (i < sizeof(mx_names)/sizeof(char*) && mx_names[i]) | |
530 | fprintf(fp, " %s", mx_names[i]); | |
aba5acdf | 531 | else |
5e8bc631 | 532 | fprintf(fp, " metric %d", i); |
aba5acdf SH |
533 | if (mxlock & (1<<i)) |
534 | fprintf(fp, " lock"); | |
535 | ||
ced61d7d SH |
536 | val = *(unsigned*)RTA_DATA(mxrta[i]); |
537 | switch (i) { | |
538 | case RTAX_HOPLIMIT: | |
62011a0b | 539 | if ((int)val == -1) |
ced61d7d SH |
540 | val = 0; |
541 | /* fall through */ | |
542 | default: | |
543 | fprintf(fp, " %u", val); | |
544 | break; | |
aba5acdf | 545 | |
ced61d7d SH |
546 | case RTAX_RTT: |
547 | case RTAX_RTTVAR: | |
548 | case RTAX_RTO_MIN: | |
aba5acdf SH |
549 | if (i == RTAX_RTT) |
550 | val /= 8; | |
54e0b2e7 | 551 | else if (i == RTAX_RTTVAR) |
aba5acdf | 552 | val /= 4; |
ced61d7d | 553 | |
9b2cdc00 GR |
554 | if (val >= 1000) |
555 | fprintf(fp, " %gs", val/1e3); | |
aba5acdf | 556 | else |
9b2cdc00 | 557 | fprintf(fp, " %ums", val); |
aba5acdf SH |
558 | } |
559 | } | |
560 | } | |
561 | if (tb[RTA_IIF] && filter.iifmask != -1) { | |
562 | fprintf(fp, " iif %s", ll_index_to_name(*(int*)RTA_DATA(tb[RTA_IIF]))); | |
563 | } | |
564 | if (tb[RTA_MULTIPATH]) { | |
565 | struct rtnexthop *nh = RTA_DATA(tb[RTA_MULTIPATH]); | |
566 | int first = 0; | |
567 | ||
568 | len = RTA_PAYLOAD(tb[RTA_MULTIPATH]); | |
569 | ||
570 | for (;;) { | |
571 | if (len < sizeof(*nh)) | |
572 | break; | |
573 | if (nh->rtnh_len > len) | |
574 | break; | |
575 | if (r->rtm_flags&RTM_F_CLONED && r->rtm_type == RTN_MULTICAST) { | |
576 | if (first) | |
577 | fprintf(fp, " Oifs:"); | |
578 | else | |
579 | fprintf(fp, " "); | |
580 | } else | |
581 | fprintf(fp, "%s\tnexthop", _SL_); | |
582 | if (nh->rtnh_len > sizeof(*nh)) { | |
aba5acdf SH |
583 | parse_rtattr(tb, RTA_MAX, RTNH_DATA(nh), nh->rtnh_len - sizeof(*nh)); |
584 | if (tb[RTA_GATEWAY]) { | |
ae665a52 | 585 | fprintf(fp, " via %s ", |
aba5acdf SH |
586 | format_host(r->rtm_family, |
587 | RTA_PAYLOAD(tb[RTA_GATEWAY]), | |
588 | RTA_DATA(tb[RTA_GATEWAY]), | |
589 | abuf, sizeof(abuf))); | |
590 | } | |
f4f6d640 | 591 | if (tb[RTA_FLOW]) { |
ff24746c | 592 | __u32 to = rta_getattr_u32(tb[RTA_FLOW]); |
f4f6d640 PM |
593 | __u32 from = to>>16; |
594 | to &= 0xFFFF; | |
595 | fprintf(fp, " realm%s ", from ? "s" : ""); | |
596 | if (from) { | |
597 | fprintf(fp, "%s/", | |
598 | rtnl_rtrealm_n2a(from, b1, sizeof(b1))); | |
599 | } | |
600 | fprintf(fp, "%s", | |
601 | rtnl_rtrealm_n2a(to, b1, sizeof(b1))); | |
602 | } | |
aba5acdf SH |
603 | } |
604 | if (r->rtm_flags&RTM_F_CLONED && r->rtm_type == RTN_MULTICAST) { | |
605 | fprintf(fp, " %s", ll_index_to_name(nh->rtnh_ifindex)); | |
606 | if (nh->rtnh_hops != 1) | |
607 | fprintf(fp, "(ttl>%d)", nh->rtnh_hops); | |
608 | } else { | |
609 | fprintf(fp, " dev %s", ll_index_to_name(nh->rtnh_ifindex)); | |
610 | fprintf(fp, " weight %d", nh->rtnh_hops+1); | |
611 | } | |
612 | if (nh->rtnh_flags & RTNH_F_DEAD) | |
613 | fprintf(fp, " dead"); | |
614 | if (nh->rtnh_flags & RTNH_F_ONLINK) | |
615 | fprintf(fp, " onlink"); | |
616 | if (nh->rtnh_flags & RTNH_F_PERVASIVE) | |
617 | fprintf(fp, " pervasive"); | |
618 | len -= NLMSG_ALIGN(nh->rtnh_len); | |
619 | nh = RTNH_NEXT(nh); | |
620 | } | |
621 | } | |
622 | fprintf(fp, "\n"); | |
623 | fflush(fp); | |
624 | return 0; | |
625 | } | |
626 | ||
627 | ||
d1f28cf1 SH |
628 | static int parse_one_nh(struct rtmsg *r, struct rtattr *rta, |
629 | struct rtnexthop *rtnh, | |
630 | int *argcp, char ***argvp) | |
aba5acdf SH |
631 | { |
632 | int argc = *argcp; | |
633 | char **argv = *argvp; | |
634 | ||
635 | while (++argv, --argc > 0) { | |
636 | if (strcmp(*argv, "via") == 0) { | |
4d6c3796 | 637 | inet_prefix addr; |
aba5acdf | 638 | NEXT_ARG(); |
4d6c3796 VB |
639 | get_addr(&addr, *argv, r->rtm_family); |
640 | if (r->rtm_family == AF_UNSPEC) | |
641 | r->rtm_family = addr.family; | |
642 | rta_addattr_l(rta, 4096, RTA_GATEWAY, &addr.data, addr.bytelen); | |
643 | rtnh->rtnh_len += sizeof(struct rtattr) + addr.bytelen; | |
aba5acdf SH |
644 | } else if (strcmp(*argv, "dev") == 0) { |
645 | NEXT_ARG(); | |
646 | if ((rtnh->rtnh_ifindex = ll_name_to_index(*argv)) == 0) { | |
647 | fprintf(stderr, "Cannot find device \"%s\"\n", *argv); | |
648 | exit(1); | |
649 | } | |
650 | } else if (strcmp(*argv, "weight") == 0) { | |
651 | unsigned w; | |
652 | NEXT_ARG(); | |
653 | if (get_unsigned(&w, *argv, 0) || w == 0 || w > 256) | |
654 | invarg("\"weight\" is invalid\n", *argv); | |
655 | rtnh->rtnh_hops = w - 1; | |
656 | } else if (strcmp(*argv, "onlink") == 0) { | |
657 | rtnh->rtnh_flags |= RTNH_F_ONLINK; | |
f4f6d640 PM |
658 | } else if (matches(*argv, "realms") == 0) { |
659 | __u32 realm; | |
660 | NEXT_ARG(); | |
661 | if (get_rt_realms(&realm, *argv)) | |
662 | invarg("\"realm\" value is invalid\n", *argv); | |
663 | rta_addattr32(rta, 4096, RTA_FLOW, realm); | |
664 | rtnh->rtnh_len += sizeof(struct rtattr) + 4; | |
aba5acdf SH |
665 | } else |
666 | break; | |
667 | } | |
668 | *argcp = argc; | |
669 | *argvp = argv; | |
670 | return 0; | |
671 | } | |
672 | ||
d1f28cf1 SH |
673 | static int parse_nexthops(struct nlmsghdr *n, struct rtmsg *r, |
674 | int argc, char **argv) | |
aba5acdf SH |
675 | { |
676 | char buf[1024]; | |
677 | struct rtattr *rta = (void*)buf; | |
678 | struct rtnexthop *rtnh; | |
679 | ||
680 | rta->rta_type = RTA_MULTIPATH; | |
681 | rta->rta_len = RTA_LENGTH(0); | |
682 | rtnh = RTA_DATA(rta); | |
683 | ||
684 | while (argc > 0) { | |
685 | if (strcmp(*argv, "nexthop") != 0) { | |
686 | fprintf(stderr, "Error: \"nexthop\" or end of line is expected instead of \"%s\"\n", *argv); | |
687 | exit(-1); | |
688 | } | |
689 | if (argc <= 1) { | |
690 | fprintf(stderr, "Error: unexpected end of line after \"nexthop\"\n"); | |
691 | exit(-1); | |
692 | } | |
693 | memset(rtnh, 0, sizeof(*rtnh)); | |
694 | rtnh->rtnh_len = sizeof(*rtnh); | |
695 | rta->rta_len += rtnh->rtnh_len; | |
4d6c3796 | 696 | parse_one_nh(r, rta, rtnh, &argc, &argv); |
aba5acdf SH |
697 | rtnh = RTNH_NEXT(rtnh); |
698 | } | |
699 | ||
700 | if (rta->rta_len > RTA_LENGTH(0)) | |
701 | addattr_l(n, 1024, RTA_MULTIPATH, RTA_DATA(rta), RTA_PAYLOAD(rta)); | |
702 | return 0; | |
703 | } | |
704 | ||
d1f28cf1 | 705 | static int iproute_modify(int cmd, unsigned flags, int argc, char **argv) |
aba5acdf | 706 | { |
aba5acdf | 707 | struct { |
4806867a SH |
708 | struct nlmsghdr n; |
709 | struct rtmsg r; | |
710 | char buf[1024]; | |
aba5acdf SH |
711 | } req; |
712 | char mxbuf[256]; | |
713 | struct rtattr * mxrta = (void*)mxbuf; | |
714 | unsigned mxlock = 0; | |
715 | char *d = NULL; | |
716 | int gw_ok = 0; | |
717 | int dst_ok = 0; | |
718 | int nhs_ok = 0; | |
719 | int scope_ok = 0; | |
720 | int table_ok = 0; | |
54e0b2e7 | 721 | int raw = 0; |
aba5acdf SH |
722 | |
723 | memset(&req, 0, sizeof(req)); | |
724 | ||
725 | req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg)); | |
726 | req.n.nlmsg_flags = NLM_F_REQUEST|flags; | |
727 | req.n.nlmsg_type = cmd; | |
728 | req.r.rtm_family = preferred_family; | |
729 | req.r.rtm_table = RT_TABLE_MAIN; | |
730 | req.r.rtm_scope = RT_SCOPE_NOWHERE; | |
731 | ||
732 | if (cmd != RTM_DELROUTE) { | |
733 | req.r.rtm_protocol = RTPROT_BOOT; | |
734 | req.r.rtm_scope = RT_SCOPE_UNIVERSE; | |
735 | req.r.rtm_type = RTN_UNICAST; | |
736 | } | |
737 | ||
738 | mxrta->rta_type = RTA_METRICS; | |
739 | mxrta->rta_len = RTA_LENGTH(0); | |
740 | ||
741 | while (argc > 0) { | |
742 | if (strcmp(*argv, "src") == 0) { | |
743 | inet_prefix addr; | |
744 | NEXT_ARG(); | |
745 | get_addr(&addr, *argv, req.r.rtm_family); | |
746 | if (req.r.rtm_family == AF_UNSPEC) | |
747 | req.r.rtm_family = addr.family; | |
748 | addattr_l(&req.n, sizeof(req), RTA_PREFSRC, &addr.data, addr.bytelen); | |
749 | } else if (strcmp(*argv, "via") == 0) { | |
750 | inet_prefix addr; | |
751 | gw_ok = 1; | |
752 | NEXT_ARG(); | |
753 | get_addr(&addr, *argv, req.r.rtm_family); | |
754 | if (req.r.rtm_family == AF_UNSPEC) | |
755 | req.r.rtm_family = addr.family; | |
756 | addattr_l(&req.n, sizeof(req), RTA_GATEWAY, &addr.data, addr.bytelen); | |
757 | } else if (strcmp(*argv, "from") == 0) { | |
758 | inet_prefix addr; | |
759 | NEXT_ARG(); | |
760 | get_prefix(&addr, *argv, req.r.rtm_family); | |
761 | if (req.r.rtm_family == AF_UNSPEC) | |
762 | req.r.rtm_family = addr.family; | |
763 | if (addr.bytelen) | |
764 | addattr_l(&req.n, sizeof(req), RTA_SRC, &addr.data, addr.bytelen); | |
765 | req.r.rtm_src_len = addr.bitlen; | |
766 | } else if (strcmp(*argv, "tos") == 0 || | |
767 | matches(*argv, "dsfield") == 0) { | |
768 | __u32 tos; | |
769 | NEXT_ARG(); | |
770 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
771 | invarg("\"tos\" value is invalid\n", *argv); | |
772 | req.r.rtm_tos = tos; | |
773 | } else if (matches(*argv, "metric") == 0 || | |
774 | matches(*argv, "priority") == 0 || | |
775 | matches(*argv, "preference") == 0) { | |
776 | __u32 metric; | |
777 | NEXT_ARG(); | |
778 | if (get_u32(&metric, *argv, 0)) | |
779 | invarg("\"metric\" value is invalid\n", *argv); | |
780 | addattr32(&req.n, sizeof(req), RTA_PRIORITY, metric); | |
781 | } else if (strcmp(*argv, "scope") == 0) { | |
f332d169 | 782 | __u32 scope = 0; |
aba5acdf SH |
783 | NEXT_ARG(); |
784 | if (rtnl_rtscope_a2n(&scope, *argv)) | |
785 | invarg("invalid \"scope\" value\n", *argv); | |
786 | req.r.rtm_scope = scope; | |
787 | scope_ok = 1; | |
788 | } else if (strcmp(*argv, "mtu") == 0) { | |
789 | unsigned mtu; | |
790 | NEXT_ARG(); | |
791 | if (strcmp(*argv, "lock") == 0) { | |
792 | mxlock |= (1<<RTAX_MTU); | |
793 | NEXT_ARG(); | |
794 | } | |
795 | if (get_unsigned(&mtu, *argv, 0)) | |
796 | invarg("\"mtu\" value is invalid\n", *argv); | |
797 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_MTU, mtu); | |
71e58151 GBY |
798 | } else if (strcmp(*argv, "hoplimit") == 0) { |
799 | unsigned hoplimit; | |
800 | NEXT_ARG(); | |
801 | if (strcmp(*argv, "lock") == 0) { | |
802 | mxlock |= (1<<RTAX_HOPLIMIT); | |
803 | NEXT_ARG(); | |
804 | } | |
805 | if (get_unsigned(&hoplimit, *argv, 0)) | |
806 | invarg("\"hoplimit\" value is invalid\n", *argv); | |
807 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_HOPLIMIT, hoplimit); | |
aba5acdf SH |
808 | } else if (strcmp(*argv, "advmss") == 0) { |
809 | unsigned mss; | |
810 | NEXT_ARG(); | |
811 | if (strcmp(*argv, "lock") == 0) { | |
812 | mxlock |= (1<<RTAX_ADVMSS); | |
813 | NEXT_ARG(); | |
814 | } | |
815 | if (get_unsigned(&mss, *argv, 0)) | |
816 | invarg("\"mss\" value is invalid\n", *argv); | |
817 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_ADVMSS, mss); | |
aba5acdf SH |
818 | } else if (matches(*argv, "reordering") == 0) { |
819 | unsigned reord; | |
820 | NEXT_ARG(); | |
821 | if (strcmp(*argv, "lock") == 0) { | |
822 | mxlock |= (1<<RTAX_REORDERING); | |
823 | NEXT_ARG(); | |
824 | } | |
825 | if (get_unsigned(&reord, *argv, 0)) | |
826 | invarg("\"reordering\" value is invalid\n", *argv); | |
827 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_REORDERING, reord); | |
aba5acdf SH |
828 | } else if (strcmp(*argv, "rtt") == 0) { |
829 | unsigned rtt; | |
830 | NEXT_ARG(); | |
831 | if (strcmp(*argv, "lock") == 0) { | |
832 | mxlock |= (1<<RTAX_RTT); | |
833 | NEXT_ARG(); | |
834 | } | |
81d03dc3 | 835 | if (get_time_rtt(&rtt, *argv, &raw)) |
aba5acdf | 836 | invarg("\"rtt\" value is invalid\n", *argv); |
0612519e | 837 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_RTT, |
54e0b2e7 RJ |
838 | (raw) ? rtt : rtt * 8); |
839 | } else if (strcmp(*argv, "rto_min") == 0) { | |
840 | unsigned rto_min; | |
841 | NEXT_ARG(); | |
842 | mxlock |= (1<<RTAX_RTO_MIN); | |
81d03dc3 | 843 | if (get_time_rtt(&rto_min, *argv, &raw)) |
54e0b2e7 RJ |
844 | invarg("\"rto_min\" value is invalid\n", |
845 | *argv); | |
846 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_RTO_MIN, | |
847 | rto_min); | |
aba5acdf SH |
848 | } else if (matches(*argv, "window") == 0) { |
849 | unsigned win; | |
850 | NEXT_ARG(); | |
851 | if (strcmp(*argv, "lock") == 0) { | |
852 | mxlock |= (1<<RTAX_WINDOW); | |
853 | NEXT_ARG(); | |
854 | } | |
855 | if (get_unsigned(&win, *argv, 0)) | |
856 | invarg("\"window\" value is invalid\n", *argv); | |
857 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_WINDOW, win); | |
858 | } else if (matches(*argv, "cwnd") == 0) { | |
859 | unsigned win; | |
860 | NEXT_ARG(); | |
861 | if (strcmp(*argv, "lock") == 0) { | |
862 | mxlock |= (1<<RTAX_CWND); | |
863 | NEXT_ARG(); | |
864 | } | |
865 | if (get_unsigned(&win, *argv, 0)) | |
866 | invarg("\"cwnd\" value is invalid\n", *argv); | |
867 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_CWND, win); | |
a1f1143e VW |
868 | } else if (matches(*argv, "initcwnd") == 0) { |
869 | unsigned win; | |
870 | NEXT_ARG(); | |
871 | if (strcmp(*argv, "lock") == 0) { | |
872 | mxlock |= (1<<RTAX_INITCWND); | |
873 | NEXT_ARG(); | |
874 | } | |
875 | if (get_unsigned(&win, *argv, 0)) | |
876 | invarg("\"initcwnd\" value is invalid\n", *argv); | |
877 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_INITCWND, win); | |
f5fd8003 | 878 | } else if (matches(*argv, "initrwnd") == 0) { |
879 | unsigned win; | |
880 | NEXT_ARG(); | |
881 | if (strcmp(*argv, "lock") == 0) { | |
882 | mxlock |= (1<<RTAX_INITRWND); | |
883 | NEXT_ARG(); | |
884 | } | |
885 | if (get_unsigned(&win, *argv, 0)) | |
886 | invarg("\"initrwnd\" value is invalid\n", *argv); | |
887 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_INITRWND, win); | |
b37f2c89 CW |
888 | } else if (matches(*argv, "quickack") == 0) { |
889 | unsigned quickack; | |
890 | NEXT_ARG(); | |
891 | if (get_unsigned(&quickack, *argv, 0)) | |
892 | invarg("\"quickack\" value is invalid\n", *argv); | |
893 | if (quickack != 1 && quickack != 0) | |
894 | invarg("\"quickack\" value should be 0 or 1\n", *argv); | |
895 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_QUICKACK, quickack); | |
aba5acdf SH |
896 | } else if (matches(*argv, "rttvar") == 0) { |
897 | unsigned win; | |
898 | NEXT_ARG(); | |
899 | if (strcmp(*argv, "lock") == 0) { | |
900 | mxlock |= (1<<RTAX_RTTVAR); | |
901 | NEXT_ARG(); | |
902 | } | |
81d03dc3 | 903 | if (get_time_rtt(&win, *argv, &raw)) |
aba5acdf | 904 | invarg("\"rttvar\" value is invalid\n", *argv); |
54e0b2e7 RJ |
905 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_RTTVAR, |
906 | (raw) ? win : win * 4); | |
aba5acdf SH |
907 | } else if (matches(*argv, "ssthresh") == 0) { |
908 | unsigned win; | |
909 | NEXT_ARG(); | |
910 | if (strcmp(*argv, "lock") == 0) { | |
911 | mxlock |= (1<<RTAX_SSTHRESH); | |
912 | NEXT_ARG(); | |
913 | } | |
914 | if (get_unsigned(&win, *argv, 0)) | |
915 | invarg("\"ssthresh\" value is invalid\n", *argv); | |
916 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_SSTHRESH, win); | |
917 | } else if (matches(*argv, "realms") == 0) { | |
918 | __u32 realm; | |
919 | NEXT_ARG(); | |
920 | if (get_rt_realms(&realm, *argv)) | |
921 | invarg("\"realm\" value is invalid\n", *argv); | |
922 | addattr32(&req.n, sizeof(req), RTA_FLOW, realm); | |
923 | } else if (strcmp(*argv, "onlink") == 0) { | |
924 | req.r.rtm_flags |= RTNH_F_ONLINK; | |
aba5acdf SH |
925 | } else if (strcmp(*argv, "nexthop") == 0) { |
926 | nhs_ok = 1; | |
927 | break; | |
928 | } else if (matches(*argv, "protocol") == 0) { | |
f332d169 | 929 | __u32 prot; |
aba5acdf SH |
930 | NEXT_ARG(); |
931 | if (rtnl_rtprot_a2n(&prot, *argv)) | |
932 | invarg("\"protocol\" value is invalid\n", *argv); | |
933 | req.r.rtm_protocol = prot; | |
aba5acdf | 934 | } else if (matches(*argv, "table") == 0) { |
f332d169 | 935 | __u32 tid; |
aba5acdf SH |
936 | NEXT_ARG(); |
937 | if (rtnl_rttable_a2n(&tid, *argv)) | |
938 | invarg("\"table\" value is invalid\n", *argv); | |
34e95647 PM |
939 | if (tid < 256) |
940 | req.r.rtm_table = tid; | |
941 | else { | |
942 | req.r.rtm_table = RT_TABLE_UNSPEC; | |
943 | addattr32(&req.n, sizeof(req), RTA_TABLE, tid); | |
944 | } | |
aba5acdf SH |
945 | table_ok = 1; |
946 | } else if (strcmp(*argv, "dev") == 0 || | |
947 | strcmp(*argv, "oif") == 0) { | |
948 | NEXT_ARG(); | |
949 | d = *argv; | |
950 | } else { | |
951 | int type; | |
952 | inet_prefix dst; | |
953 | ||
954 | if (strcmp(*argv, "to") == 0) { | |
955 | NEXT_ARG(); | |
956 | } | |
957 | if ((**argv < '0' || **argv > '9') && | |
958 | rtnl_rtntype_a2n(&type, *argv) == 0) { | |
959 | NEXT_ARG(); | |
960 | req.r.rtm_type = type; | |
aba5acdf SH |
961 | } |
962 | ||
963 | if (matches(*argv, "help") == 0) | |
964 | usage(); | |
965 | if (dst_ok) | |
966 | duparg2("to", *argv); | |
967 | get_prefix(&dst, *argv, req.r.rtm_family); | |
968 | if (req.r.rtm_family == AF_UNSPEC) | |
969 | req.r.rtm_family = dst.family; | |
970 | req.r.rtm_dst_len = dst.bitlen; | |
971 | dst_ok = 1; | |
972 | if (dst.bytelen) | |
973 | addattr_l(&req.n, sizeof(req), RTA_DST, &dst.data, dst.bytelen); | |
974 | } | |
975 | argc--; argv++; | |
976 | } | |
977 | ||
aba5acdf SH |
978 | if (d || nhs_ok) { |
979 | int idx; | |
980 | ||
aba5acdf SH |
981 | if (d) { |
982 | if ((idx = ll_name_to_index(d)) == 0) { | |
983 | fprintf(stderr, "Cannot find device \"%s\"\n", d); | |
984 | return -1; | |
985 | } | |
986 | addattr32(&req.n, sizeof(req), RTA_OIF, idx); | |
987 | } | |
988 | } | |
989 | ||
990 | if (mxrta->rta_len > RTA_LENGTH(0)) { | |
991 | if (mxlock) | |
992 | rta_addattr32(mxrta, sizeof(mxbuf), RTAX_LOCK, mxlock); | |
993 | addattr_l(&req.n, sizeof(req), RTA_METRICS, RTA_DATA(mxrta), RTA_PAYLOAD(mxrta)); | |
994 | } | |
995 | ||
996 | if (nhs_ok) | |
997 | parse_nexthops(&req.n, &req.r, argc, argv); | |
998 | ||
999 | if (!table_ok) { | |
1000 | if (req.r.rtm_type == RTN_LOCAL || | |
1001 | req.r.rtm_type == RTN_BROADCAST || | |
1002 | req.r.rtm_type == RTN_NAT || | |
1003 | req.r.rtm_type == RTN_ANYCAST) | |
1004 | req.r.rtm_table = RT_TABLE_LOCAL; | |
1005 | } | |
1006 | if (!scope_ok) { | |
1007 | if (req.r.rtm_type == RTN_LOCAL || | |
1008 | req.r.rtm_type == RTN_NAT) | |
1009 | req.r.rtm_scope = RT_SCOPE_HOST; | |
1010 | else if (req.r.rtm_type == RTN_BROADCAST || | |
1011 | req.r.rtm_type == RTN_MULTICAST || | |
1012 | req.r.rtm_type == RTN_ANYCAST) | |
1013 | req.r.rtm_scope = RT_SCOPE_LINK; | |
1014 | else if (req.r.rtm_type == RTN_UNICAST || | |
1015 | req.r.rtm_type == RTN_UNSPEC) { | |
1016 | if (cmd == RTM_DELROUTE) | |
1017 | req.r.rtm_scope = RT_SCOPE_NOWHERE; | |
1018 | else if (!gw_ok && !nhs_ok) | |
1019 | req.r.rtm_scope = RT_SCOPE_LINK; | |
1020 | } | |
1021 | } | |
1022 | ||
1023 | if (req.r.rtm_family == AF_UNSPEC) | |
1024 | req.r.rtm_family = AF_INET; | |
1025 | ||
cd70f3f5 | 1026 | if (rtnl_talk(&rth, &req.n, 0, 0, NULL) < 0) |
aba5acdf SH |
1027 | exit(2); |
1028 | ||
1029 | return 0; | |
1030 | } | |
1031 | ||
1032 | static int rtnl_rtcache_request(struct rtnl_handle *rth, int family) | |
1033 | { | |
1034 | struct { | |
1035 | struct nlmsghdr nlh; | |
1036 | struct rtmsg rtm; | |
1037 | } req; | |
1038 | struct sockaddr_nl nladdr; | |
1039 | ||
1040 | memset(&nladdr, 0, sizeof(nladdr)); | |
1041 | memset(&req, 0, sizeof(req)); | |
1042 | nladdr.nl_family = AF_NETLINK; | |
1043 | ||
1044 | req.nlh.nlmsg_len = sizeof(req); | |
1045 | req.nlh.nlmsg_type = RTM_GETROUTE; | |
1046 | req.nlh.nlmsg_flags = NLM_F_ROOT|NLM_F_REQUEST; | |
1047 | req.nlh.nlmsg_pid = 0; | |
1048 | req.nlh.nlmsg_seq = rth->dump = ++rth->seq; | |
1049 | req.rtm.rtm_family = family; | |
1050 | req.rtm.rtm_flags |= RTM_F_CLONED; | |
1051 | ||
1052 | return sendto(rth->fd, (void*)&req, sizeof(req), 0, (struct sockaddr*)&nladdr, sizeof(nladdr)); | |
1053 | } | |
1054 | ||
1055 | static int iproute_flush_cache(void) | |
1056 | { | |
1057 | #define ROUTE_FLUSH_PATH "/proc/sys/net/ipv4/route/flush" | |
1058 | ||
1059 | int len; | |
1060 | int flush_fd = open (ROUTE_FLUSH_PATH, O_WRONLY); | |
1061 | char *buffer = "-1"; | |
1062 | ||
1063 | if (flush_fd < 0) { | |
1064 | fprintf (stderr, "Cannot open \"%s\"\n", ROUTE_FLUSH_PATH); | |
1065 | return -1; | |
1066 | } | |
1067 | ||
1068 | len = strlen (buffer); | |
ae665a52 | 1069 | |
aba5acdf SH |
1070 | if ((write (flush_fd, (void *)buffer, len)) < len) { |
1071 | fprintf (stderr, "Cannot flush routing cache\n"); | |
25352af7 | 1072 | close(flush_fd); |
aba5acdf SH |
1073 | return -1; |
1074 | } | |
1075 | close(flush_fd); | |
1076 | return 0; | |
1077 | } | |
1078 | ||
76c61b34 PE |
1079 | static __u32 route_dump_magic = 0x45311224; |
1080 | ||
d1f28cf1 SH |
1081 | static int save_route(const struct sockaddr_nl *who, struct nlmsghdr *n, |
1082 | void *arg) | |
f4ff11e3 DS |
1083 | { |
1084 | int ret; | |
1085 | int len = n->nlmsg_len; | |
1086 | struct rtmsg *r = NLMSG_DATA(n); | |
1087 | struct rtattr *tb[RTA_MAX+1]; | |
1088 | int host_len = -1; | |
1089 | ||
f4ff11e3 DS |
1090 | host_len = calc_host_len(r); |
1091 | len -= NLMSG_LENGTH(sizeof(*r)); | |
1092 | parse_rtattr(tb, RTA_MAX, RTM_RTA(r), len); | |
1093 | ||
1094 | if (!filter_nlmsg(n, tb, host_len)) | |
1095 | return 0; | |
1096 | ||
1097 | ret = write(STDOUT_FILENO, n, n->nlmsg_len); | |
1098 | if ((ret > 0) && (ret != n->nlmsg_len)) { | |
1099 | fprintf(stderr, "Short write while saving nlmsg\n"); | |
1100 | ret = -EIO; | |
1101 | } | |
1102 | ||
1103 | return ret == n->nlmsg_len ? 0 : ret; | |
1104 | } | |
aba5acdf | 1105 | |
76c61b34 PE |
1106 | static int save_route_prep(void) |
1107 | { | |
1108 | int ret; | |
1109 | ||
1110 | if (isatty(STDOUT_FILENO)) { | |
14645ec2 | 1111 | fprintf(stderr, "Not sending a binary stream to stdout\n"); |
76c61b34 PE |
1112 | return -1; |
1113 | } | |
1114 | ||
1115 | ret = write(STDOUT_FILENO, &route_dump_magic, sizeof(route_dump_magic)); | |
1116 | if (ret != sizeof(route_dump_magic)) { | |
1117 | fprintf(stderr, "Can't write magic to dump file\n"); | |
1118 | return -1; | |
1119 | } | |
1120 | ||
1121 | return 0; | |
1122 | } | |
1123 | ||
f4ff11e3 | 1124 | static int iproute_list_flush_or_save(int argc, char **argv, int action) |
aba5acdf SH |
1125 | { |
1126 | int do_ipv6 = preferred_family; | |
aba5acdf SH |
1127 | char *id = NULL; |
1128 | char *od = NULL; | |
b0373bfb | 1129 | unsigned int mark = 0; |
f4ff11e3 DS |
1130 | rtnl_filter_t filter_fn; |
1131 | ||
76c61b34 PE |
1132 | if (action == IPROUTE_SAVE) { |
1133 | if (save_route_prep()) | |
1134 | return -1; | |
1135 | ||
f4ff11e3 | 1136 | filter_fn = save_route; |
76c61b34 | 1137 | } else |
f4ff11e3 | 1138 | filter_fn = print_route; |
aba5acdf SH |
1139 | |
1140 | iproute_reset_filter(); | |
1141 | filter.tb = RT_TABLE_MAIN; | |
1142 | ||
f4ff11e3 | 1143 | if ((action == IPROUTE_FLUSH) && argc <= 0) { |
aba5acdf SH |
1144 | fprintf(stderr, "\"ip route flush\" requires arguments.\n"); |
1145 | return -1; | |
1146 | } | |
1147 | ||
1148 | while (argc > 0) { | |
1149 | if (matches(*argv, "table") == 0) { | |
f332d169 | 1150 | __u32 tid; |
aba5acdf SH |
1151 | NEXT_ARG(); |
1152 | if (rtnl_rttable_a2n(&tid, *argv)) { | |
1153 | if (strcmp(*argv, "all") == 0) { | |
bd4bcdad | 1154 | filter.tb = 0; |
aba5acdf | 1155 | } else if (strcmp(*argv, "cache") == 0) { |
bd4bcdad | 1156 | filter.cloned = 1; |
aba5acdf SH |
1157 | } else if (strcmp(*argv, "help") == 0) { |
1158 | usage(); | |
1159 | } else { | |
1160 | invarg("table id value is invalid\n", *argv); | |
1161 | } | |
bd4bcdad PM |
1162 | } else |
1163 | filter.tb = tid; | |
aba5acdf SH |
1164 | } else if (matches(*argv, "cached") == 0 || |
1165 | matches(*argv, "cloned") == 0) { | |
bd4bcdad | 1166 | filter.cloned = 1; |
aba5acdf SH |
1167 | } else if (strcmp(*argv, "tos") == 0 || |
1168 | matches(*argv, "dsfield") == 0) { | |
1169 | __u32 tos; | |
1170 | NEXT_ARG(); | |
1171 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
1172 | invarg("TOS value is invalid\n", *argv); | |
1173 | filter.tos = tos; | |
1174 | filter.tosmask = -1; | |
1175 | } else if (matches(*argv, "protocol") == 0) { | |
f332d169 | 1176 | __u32 prot = 0; |
aba5acdf SH |
1177 | NEXT_ARG(); |
1178 | filter.protocolmask = -1; | |
1179 | if (rtnl_rtprot_a2n(&prot, *argv)) { | |
1180 | if (strcmp(*argv, "all") != 0) | |
1181 | invarg("invalid \"protocol\"\n", *argv); | |
1182 | prot = 0; | |
1183 | filter.protocolmask = 0; | |
1184 | } | |
1185 | filter.protocol = prot; | |
1186 | } else if (matches(*argv, "scope") == 0) { | |
f332d169 | 1187 | __u32 scope = 0; |
aba5acdf SH |
1188 | NEXT_ARG(); |
1189 | filter.scopemask = -1; | |
1190 | if (rtnl_rtscope_a2n(&scope, *argv)) { | |
1191 | if (strcmp(*argv, "all") != 0) | |
1192 | invarg("invalid \"scope\"\n", *argv); | |
1193 | scope = RT_SCOPE_NOWHERE; | |
1194 | filter.scopemask = 0; | |
1195 | } | |
1196 | filter.scope = scope; | |
1197 | } else if (matches(*argv, "type") == 0) { | |
1198 | int type; | |
1199 | NEXT_ARG(); | |
1200 | filter.typemask = -1; | |
1201 | if (rtnl_rtntype_a2n(&type, *argv)) | |
1202 | invarg("node type value is invalid\n", *argv); | |
1203 | filter.type = type; | |
1204 | } else if (strcmp(*argv, "dev") == 0 || | |
1205 | strcmp(*argv, "oif") == 0) { | |
1206 | NEXT_ARG(); | |
1207 | od = *argv; | |
1208 | } else if (strcmp(*argv, "iif") == 0) { | |
1209 | NEXT_ARG(); | |
1210 | id = *argv; | |
b0373bfb ED |
1211 | } else if (strcmp(*argv, "mark") == 0) { |
1212 | NEXT_ARG(); | |
1213 | get_unsigned(&mark, *argv, 0); | |
1214 | filter.markmask = -1; | |
aba5acdf SH |
1215 | } else if (strcmp(*argv, "via") == 0) { |
1216 | NEXT_ARG(); | |
1217 | get_prefix(&filter.rvia, *argv, do_ipv6); | |
1218 | } else if (strcmp(*argv, "src") == 0) { | |
1219 | NEXT_ARG(); | |
1220 | get_prefix(&filter.rprefsrc, *argv, do_ipv6); | |
1221 | } else if (matches(*argv, "realms") == 0) { | |
1222 | __u32 realm; | |
1223 | NEXT_ARG(); | |
1224 | if (get_rt_realms(&realm, *argv)) | |
1225 | invarg("invalid realms\n", *argv); | |
1226 | filter.realm = realm; | |
1227 | filter.realmmask = ~0U; | |
1228 | if ((filter.realm&0xFFFF) == 0 && | |
1229 | (*argv)[strlen(*argv) - 1] == '/') | |
1230 | filter.realmmask &= ~0xFFFF; | |
1231 | if ((filter.realm&0xFFFF0000U) == 0 && | |
1232 | (strchr(*argv, '/') == NULL || | |
1233 | (*argv)[0] == '/')) | |
1234 | filter.realmmask &= ~0xFFFF0000U; | |
1235 | } else if (matches(*argv, "from") == 0) { | |
1236 | NEXT_ARG(); | |
1237 | if (matches(*argv, "root") == 0) { | |
1238 | NEXT_ARG(); | |
1239 | get_prefix(&filter.rsrc, *argv, do_ipv6); | |
1240 | } else if (matches(*argv, "match") == 0) { | |
1241 | NEXT_ARG(); | |
1242 | get_prefix(&filter.msrc, *argv, do_ipv6); | |
1243 | } else { | |
1244 | if (matches(*argv, "exact") == 0) { | |
1245 | NEXT_ARG(); | |
1246 | } | |
1247 | get_prefix(&filter.msrc, *argv, do_ipv6); | |
1248 | filter.rsrc = filter.msrc; | |
1249 | } | |
1250 | } else { | |
1251 | if (matches(*argv, "to") == 0) { | |
1252 | NEXT_ARG(); | |
1253 | } | |
1254 | if (matches(*argv, "root") == 0) { | |
1255 | NEXT_ARG(); | |
1256 | get_prefix(&filter.rdst, *argv, do_ipv6); | |
1257 | } else if (matches(*argv, "match") == 0) { | |
1258 | NEXT_ARG(); | |
1259 | get_prefix(&filter.mdst, *argv, do_ipv6); | |
1260 | } else { | |
1261 | if (matches(*argv, "exact") == 0) { | |
1262 | NEXT_ARG(); | |
1263 | } | |
1264 | get_prefix(&filter.mdst, *argv, do_ipv6); | |
1265 | filter.rdst = filter.mdst; | |
1266 | } | |
1267 | } | |
1268 | argc--; argv++; | |
1269 | } | |
1270 | ||
1271 | if (do_ipv6 == AF_UNSPEC && filter.tb) | |
1272 | do_ipv6 = AF_INET; | |
1273 | ||
aba5acdf SH |
1274 | if (id || od) { |
1275 | int idx; | |
1276 | ||
1277 | if (id) { | |
1278 | if ((idx = ll_name_to_index(id)) == 0) { | |
1279 | fprintf(stderr, "Cannot find device \"%s\"\n", id); | |
1280 | return -1; | |
1281 | } | |
1282 | filter.iif = idx; | |
1283 | filter.iifmask = -1; | |
1284 | } | |
1285 | if (od) { | |
1286 | if ((idx = ll_name_to_index(od)) == 0) { | |
1287 | fprintf(stderr, "Cannot find device \"%s\"\n", od); | |
1288 | return -1; | |
1289 | } | |
1290 | filter.oif = idx; | |
1291 | filter.oifmask = -1; | |
1292 | } | |
1293 | } | |
b0373bfb | 1294 | filter.mark = mark; |
aba5acdf | 1295 | |
f4ff11e3 | 1296 | if (action == IPROUTE_FLUSH) { |
aba5acdf SH |
1297 | int round = 0; |
1298 | char flushb[4096-512]; | |
33551240 | 1299 | time_t start = time(0); |
aba5acdf | 1300 | |
bd4bcdad | 1301 | if (filter.cloned) { |
aba5acdf SH |
1302 | if (do_ipv6 != AF_INET6) { |
1303 | iproute_flush_cache(); | |
1304 | if (show_stats) | |
1305 | printf("*** IPv4 routing cache is flushed.\n"); | |
1306 | } | |
1307 | if (do_ipv6 == AF_INET) | |
1308 | return 0; | |
1309 | } | |
1310 | ||
1311 | filter.flushb = flushb; | |
1312 | filter.flushp = 0; | |
1313 | filter.flushe = sizeof(flushb); | |
aba5acdf SH |
1314 | |
1315 | for (;;) { | |
1316 | if (rtnl_wilddump_request(&rth, do_ipv6, RTM_GETROUTE) < 0) { | |
1317 | perror("Cannot send dump request"); | |
1318 | exit(1); | |
1319 | } | |
1320 | filter.flushed = 0; | |
cd70f3f5 | 1321 | if (rtnl_dump_filter(&rth, filter_fn, stdout) < 0) { |
aba5acdf SH |
1322 | fprintf(stderr, "Flush terminated\n"); |
1323 | exit(1); | |
1324 | } | |
1325 | if (filter.flushed == 0) { | |
f0b34d2d AH |
1326 | if (show_stats) { |
1327 | if (round == 0 && (!filter.cloned || do_ipv6 == AF_INET6)) | |
1328 | printf("Nothing to flush.\n"); | |
1329 | else | |
1330 | printf("*** Flush is complete after %d round%s ***\n", round, round>1?"s":""); | |
1331 | } | |
aba5acdf SH |
1332 | fflush(stdout); |
1333 | return 0; | |
1334 | } | |
1335 | round++; | |
1336 | if (flush_update() < 0) | |
1337 | exit(1); | |
33551240 SH |
1338 | |
1339 | if (time(0) - start > 30) { | |
1340 | printf("\n*** Flush not completed after %ld seconds, %d entries remain ***\n", | |
5d8a7529 | 1341 | (long)(time(0) - start), filter.flushed); |
33551240 SH |
1342 | exit(1); |
1343 | } | |
1344 | ||
aba5acdf SH |
1345 | if (show_stats) { |
1346 | printf("\n*** Round %d, deleting %d entries ***\n", round, filter.flushed); | |
1347 | fflush(stdout); | |
1348 | } | |
1349 | } | |
1350 | } | |
1351 | ||
bd4bcdad | 1352 | if (!filter.cloned) { |
aba5acdf SH |
1353 | if (rtnl_wilddump_request(&rth, do_ipv6, RTM_GETROUTE) < 0) { |
1354 | perror("Cannot send dump request"); | |
1355 | exit(1); | |
1356 | } | |
1357 | } else { | |
1358 | if (rtnl_rtcache_request(&rth, do_ipv6) < 0) { | |
1359 | perror("Cannot send dump request"); | |
1360 | exit(1); | |
1361 | } | |
1362 | } | |
1363 | ||
cd70f3f5 | 1364 | if (rtnl_dump_filter(&rth, filter_fn, stdout) < 0) { |
aba5acdf SH |
1365 | fprintf(stderr, "Dump terminated\n"); |
1366 | exit(1); | |
1367 | } | |
1368 | ||
1369 | exit(0); | |
1370 | } | |
1371 | ||
1372 | ||
d1f28cf1 | 1373 | static int iproute_get(int argc, char **argv) |
aba5acdf | 1374 | { |
aba5acdf | 1375 | struct { |
4806867a SH |
1376 | struct nlmsghdr n; |
1377 | struct rtmsg r; | |
1378 | char buf[1024]; | |
aba5acdf SH |
1379 | } req; |
1380 | char *idev = NULL; | |
1381 | char *odev = NULL; | |
1382 | int connected = 0; | |
1383 | int from_ok = 0; | |
b0373bfb | 1384 | unsigned int mark = 0; |
aba5acdf SH |
1385 | |
1386 | memset(&req, 0, sizeof(req)); | |
1387 | ||
1388 | iproute_reset_filter(); | |
c73f3e02 | 1389 | filter.cloned = 2; |
aba5acdf SH |
1390 | |
1391 | req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg)); | |
1392 | req.n.nlmsg_flags = NLM_F_REQUEST; | |
1393 | req.n.nlmsg_type = RTM_GETROUTE; | |
1394 | req.r.rtm_family = preferred_family; | |
1395 | req.r.rtm_table = 0; | |
1396 | req.r.rtm_protocol = 0; | |
1397 | req.r.rtm_scope = 0; | |
1398 | req.r.rtm_type = 0; | |
1399 | req.r.rtm_src_len = 0; | |
1400 | req.r.rtm_dst_len = 0; | |
1401 | req.r.rtm_tos = 0; | |
ae665a52 | 1402 | |
aba5acdf SH |
1403 | while (argc > 0) { |
1404 | if (strcmp(*argv, "tos") == 0 || | |
1405 | matches(*argv, "dsfield") == 0) { | |
1406 | __u32 tos; | |
1407 | NEXT_ARG(); | |
1408 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
1409 | invarg("TOS value is invalid\n", *argv); | |
1410 | req.r.rtm_tos = tos; | |
1411 | } else if (matches(*argv, "from") == 0) { | |
1412 | inet_prefix addr; | |
1413 | NEXT_ARG(); | |
1414 | if (matches(*argv, "help") == 0) | |
1415 | usage(); | |
1416 | from_ok = 1; | |
1417 | get_prefix(&addr, *argv, req.r.rtm_family); | |
1418 | if (req.r.rtm_family == AF_UNSPEC) | |
1419 | req.r.rtm_family = addr.family; | |
1420 | if (addr.bytelen) | |
1421 | addattr_l(&req.n, sizeof(req), RTA_SRC, &addr.data, addr.bytelen); | |
1422 | req.r.rtm_src_len = addr.bitlen; | |
1423 | } else if (matches(*argv, "iif") == 0) { | |
1424 | NEXT_ARG(); | |
1425 | idev = *argv; | |
b0373bfb ED |
1426 | } else if (matches(*argv, "mark") == 0) { |
1427 | NEXT_ARG(); | |
1428 | get_unsigned(&mark, *argv, 0); | |
aba5acdf SH |
1429 | } else if (matches(*argv, "oif") == 0 || |
1430 | strcmp(*argv, "dev") == 0) { | |
1431 | NEXT_ARG(); | |
1432 | odev = *argv; | |
1433 | } else if (matches(*argv, "notify") == 0) { | |
1434 | req.r.rtm_flags |= RTM_F_NOTIFY; | |
1435 | } else if (matches(*argv, "connected") == 0) { | |
1436 | connected = 1; | |
1437 | } else { | |
1438 | inet_prefix addr; | |
1439 | if (strcmp(*argv, "to") == 0) { | |
1440 | NEXT_ARG(); | |
1441 | } | |
1442 | if (matches(*argv, "help") == 0) | |
1443 | usage(); | |
1444 | get_prefix(&addr, *argv, req.r.rtm_family); | |
1445 | if (req.r.rtm_family == AF_UNSPEC) | |
1446 | req.r.rtm_family = addr.family; | |
1447 | if (addr.bytelen) | |
1448 | addattr_l(&req.n, sizeof(req), RTA_DST, &addr.data, addr.bytelen); | |
1449 | req.r.rtm_dst_len = addr.bitlen; | |
1450 | } | |
1451 | argc--; argv++; | |
1452 | } | |
1453 | ||
1454 | if (req.r.rtm_dst_len == 0) { | |
14645ec2 | 1455 | fprintf(stderr, "need at least a destination address\n"); |
aba5acdf SH |
1456 | exit(1); |
1457 | } | |
1458 | ||
aba5acdf SH |
1459 | if (idev || odev) { |
1460 | int idx; | |
1461 | ||
1462 | if (idev) { | |
1463 | if ((idx = ll_name_to_index(idev)) == 0) { | |
1464 | fprintf(stderr, "Cannot find device \"%s\"\n", idev); | |
1465 | return -1; | |
1466 | } | |
1467 | addattr32(&req.n, sizeof(req), RTA_IIF, idx); | |
1468 | } | |
1469 | if (odev) { | |
1470 | if ((idx = ll_name_to_index(odev)) == 0) { | |
1471 | fprintf(stderr, "Cannot find device \"%s\"\n", odev); | |
1472 | return -1; | |
1473 | } | |
1474 | addattr32(&req.n, sizeof(req), RTA_OIF, idx); | |
1475 | } | |
1476 | } | |
b0373bfb ED |
1477 | if (mark) |
1478 | addattr32(&req.n, sizeof(req), RTA_MARK, mark); | |
aba5acdf SH |
1479 | |
1480 | if (req.r.rtm_family == AF_UNSPEC) | |
1481 | req.r.rtm_family = AF_INET; | |
1482 | ||
cd70f3f5 | 1483 | if (rtnl_talk(&rth, &req.n, 0, 0, &req.n) < 0) |
aba5acdf SH |
1484 | exit(2); |
1485 | ||
1486 | if (connected && !from_ok) { | |
1487 | struct rtmsg *r = NLMSG_DATA(&req.n); | |
1488 | int len = req.n.nlmsg_len; | |
1489 | struct rtattr * tb[RTA_MAX+1]; | |
1490 | ||
1491 | if (print_route(NULL, &req.n, (void*)stdout) < 0) { | |
1492 | fprintf(stderr, "An error :-)\n"); | |
1493 | exit(1); | |
1494 | } | |
1495 | ||
1496 | if (req.n.nlmsg_type != RTM_NEWROUTE) { | |
1497 | fprintf(stderr, "Not a route?\n"); | |
1498 | return -1; | |
1499 | } | |
1500 | len -= NLMSG_LENGTH(sizeof(*r)); | |
1501 | if (len < 0) { | |
1502 | fprintf(stderr, "Wrong len %d\n", len); | |
1503 | return -1; | |
1504 | } | |
1505 | ||
aba5acdf SH |
1506 | parse_rtattr(tb, RTA_MAX, RTM_RTA(r), len); |
1507 | ||
1508 | if (tb[RTA_PREFSRC]) { | |
1509 | tb[RTA_PREFSRC]->rta_type = RTA_SRC; | |
1510 | r->rtm_src_len = 8*RTA_PAYLOAD(tb[RTA_PREFSRC]); | |
1511 | } else if (!tb[RTA_SRC]) { | |
1512 | fprintf(stderr, "Failed to connect the route\n"); | |
1513 | return -1; | |
1514 | } | |
1515 | if (!odev && tb[RTA_OIF]) | |
1516 | tb[RTA_OIF]->rta_type = 0; | |
1517 | if (tb[RTA_GATEWAY]) | |
1518 | tb[RTA_GATEWAY]->rta_type = 0; | |
1519 | if (!idev && tb[RTA_IIF]) | |
1520 | tb[RTA_IIF]->rta_type = 0; | |
1521 | req.n.nlmsg_flags = NLM_F_REQUEST; | |
1522 | req.n.nlmsg_type = RTM_GETROUTE; | |
1523 | ||
cd70f3f5 | 1524 | if (rtnl_talk(&rth, &req.n, 0, 0, &req.n) < 0) |
aba5acdf SH |
1525 | exit(2); |
1526 | } | |
1527 | ||
1528 | if (print_route(NULL, &req.n, (void*)stdout) < 0) { | |
1529 | fprintf(stderr, "An error :-)\n"); | |
1530 | exit(1); | |
1531 | } | |
1532 | ||
1533 | exit(0); | |
1534 | } | |
1535 | ||
d1f28cf1 SH |
1536 | static int restore_handler(const struct sockaddr_nl *nl, struct nlmsghdr *n, |
1537 | void *arg) | |
f4ff11e3 DS |
1538 | { |
1539 | int ret; | |
1540 | ||
1541 | n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK; | |
1542 | ||
1543 | ll_init_map(&rth); | |
1544 | ||
cd70f3f5 | 1545 | ret = rtnl_talk(&rth, n, 0, 0, n); |
f4ff11e3 DS |
1546 | if ((ret < 0) && (errno == EEXIST)) |
1547 | ret = 0; | |
1548 | ||
1549 | return ret; | |
1550 | } | |
1551 | ||
76c61b34 PE |
1552 | static int route_dump_check_magic(void) |
1553 | { | |
1554 | int ret; | |
1555 | __u32 magic = 0; | |
1556 | ||
1557 | if (isatty(STDIN_FILENO)) { | |
1558 | fprintf(stderr, "Can't restore route dump from a terminal\n"); | |
1559 | return -1; | |
1560 | } | |
1561 | ||
1562 | ret = fread(&magic, sizeof(magic), 1, stdin); | |
1563 | if (magic != route_dump_magic) { | |
1564 | fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic); | |
1565 | return -1; | |
1566 | } | |
1567 | ||
1568 | return 0; | |
1569 | } | |
1570 | ||
d1f28cf1 | 1571 | static int iproute_restore(void) |
f4ff11e3 | 1572 | { |
76c61b34 PE |
1573 | if (route_dump_check_magic()) |
1574 | exit(-1); | |
1575 | ||
f4ff11e3 DS |
1576 | exit(rtnl_from_file(stdin, &restore_handler, NULL)); |
1577 | } | |
1578 | ||
93b79863 PE |
1579 | static int show_handler(const struct sockaddr_nl *nl, struct nlmsghdr *n, void *arg) |
1580 | { | |
1581 | print_route(nl, n, stdout); | |
1582 | return 0; | |
1583 | } | |
1584 | ||
1585 | static int iproute_showdump(void) | |
1586 | { | |
1587 | if (route_dump_check_magic()) | |
1588 | exit(-1); | |
1589 | ||
1590 | exit(rtnl_from_file(stdin, &show_handler, NULL)); | |
1591 | } | |
1592 | ||
d1f28cf1 | 1593 | void iproute_reset_filter(void) |
aba5acdf SH |
1594 | { |
1595 | memset(&filter, 0, sizeof(filter)); | |
1596 | filter.mdst.bitlen = -1; | |
1597 | filter.msrc.bitlen = -1; | |
1598 | } | |
1599 | ||
1600 | int do_iproute(int argc, char **argv) | |
1601 | { | |
1602 | if (argc < 1) | |
f4ff11e3 | 1603 | return iproute_list_flush_or_save(0, NULL, IPROUTE_LIST); |
ae665a52 | 1604 | |
aba5acdf SH |
1605 | if (matches(*argv, "add") == 0) |
1606 | return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE|NLM_F_EXCL, | |
1607 | argc-1, argv+1); | |
1608 | if (matches(*argv, "change") == 0 || strcmp(*argv, "chg") == 0) | |
1609 | return iproute_modify(RTM_NEWROUTE, NLM_F_REPLACE, | |
1610 | argc-1, argv+1); | |
1611 | if (matches(*argv, "replace") == 0) | |
1612 | return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE|NLM_F_REPLACE, | |
1613 | argc-1, argv+1); | |
1614 | if (matches(*argv, "prepend") == 0) | |
1615 | return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE, | |
1616 | argc-1, argv+1); | |
1617 | if (matches(*argv, "append") == 0) | |
1618 | return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE|NLM_F_APPEND, | |
1619 | argc-1, argv+1); | |
1620 | if (matches(*argv, "test") == 0) | |
1621 | return iproute_modify(RTM_NEWROUTE, NLM_F_EXCL, | |
1622 | argc-1, argv+1); | |
1623 | if (matches(*argv, "delete") == 0) | |
1624 | return iproute_modify(RTM_DELROUTE, 0, | |
1625 | argc-1, argv+1); | |
1626 | if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0 | |
1627 | || matches(*argv, "lst") == 0) | |
f4ff11e3 | 1628 | return iproute_list_flush_or_save(argc-1, argv+1, IPROUTE_LIST); |
aba5acdf SH |
1629 | if (matches(*argv, "get") == 0) |
1630 | return iproute_get(argc-1, argv+1); | |
1631 | if (matches(*argv, "flush") == 0) | |
f4ff11e3 DS |
1632 | return iproute_list_flush_or_save(argc-1, argv+1, IPROUTE_FLUSH); |
1633 | if (matches(*argv, "save") == 0) | |
1634 | return iproute_list_flush_or_save(argc-1, argv+1, IPROUTE_SAVE); | |
1635 | if (matches(*argv, "restore") == 0) | |
1636 | return iproute_restore(); | |
93b79863 PE |
1637 | if (matches(*argv, "showdump") == 0) |
1638 | return iproute_showdump(); | |
aba5acdf SH |
1639 | if (matches(*argv, "help") == 0) |
1640 | usage(); | |
1641 | fprintf(stderr, "Command \"%s\" is unknown, try \"ip route help\".\n", *argv); | |
1642 | exit(-1); | |
1643 | } | |
1644 |