]>
Commit | Line | Data |
---|---|---|
aba5acdf SH |
1 | /* |
2 | * iprule.c "ip rule". | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or | |
5 | * modify it under the terms of the GNU General Public License | |
6 | * as published by the Free Software Foundation; either version | |
7 | * 2 of the License, or (at your option) any later version. | |
8 | * | |
9 | * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> | |
10 | * | |
aba5acdf SH |
11 | */ |
12 | ||
13 | #include <stdio.h> | |
14 | #include <stdlib.h> | |
15 | #include <unistd.h> | |
aba5acdf SH |
16 | #include <fcntl.h> |
17 | #include <sys/socket.h> | |
18 | #include <netinet/in.h> | |
19 | #include <netinet/ip.h> | |
20 | #include <arpa/inet.h> | |
21 | #include <string.h> | |
ca89c521 | 22 | #include <linux/if.h> |
3123a0cc | 23 | #include <linux/fib_rules.h> |
2f4e171f | 24 | #include <errno.h> |
aba5acdf SH |
25 | |
26 | #include "rt_names.h" | |
27 | #include "utils.h" | |
34e95647 | 28 | #include "ip_common.h" |
0dd4ccc5 | 29 | #include "json_print.h" |
aba5acdf | 30 | |
cb294a1d HL |
31 | enum list_action { |
32 | IPRULE_LIST, | |
33 | IPRULE_FLUSH, | |
34 | IPRULE_SAVE, | |
35 | }; | |
36 | ||
351efcde SH |
37 | extern struct rtnl_handle rth; |
38 | ||
aba5acdf SH |
39 | static void usage(void) __attribute__((noreturn)); |
40 | ||
41 | static void usage(void) | |
42 | { | |
e147161b SH |
43 | fprintf(stderr, |
44 | "Usage: ip rule { add | del } SELECTOR ACTION\n" | |
45 | " ip rule { flush | save | restore }\n" | |
46 | " ip rule [ list [ SELECTOR ]]\n" | |
47 | "SELECTOR := [ not ] [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ]\n" | |
48 | " [ iif STRING ] [ oif STRING ] [ pref NUMBER ] [ l3mdev ]\n" | |
82252cdc | 49 | " [ uidrange NUMBER-NUMBER ]\n" |
f686f764 RP |
50 | " [ ipproto PROTOCOL ]\n" |
51 | " [ sport [ NUMBER | NUMBER-NUMBER ]\n" | |
52 | " [ dport [ NUMBER | NUMBER-NUMBER ] ]\n" | |
e147161b | 53 | "ACTION := [ table TABLE_ID ]\n" |
7c083da7 | 54 | " [ protocol PROTO ]\n" |
e147161b SH |
55 | " [ nat ADDRESS ]\n" |
56 | " [ realms [SRCREALM/]DSTREALM ]\n" | |
57 | " [ goto NUMBER ]\n" | |
58 | " SUPPRESSOR\n" | |
59 | "SUPPRESSOR := [ suppress_prefixlength NUMBER ]\n" | |
60 | " [ suppress_ifgroup DEVGROUP ]\n" | |
61 | "TABLE_ID := [ local | main | default | NUMBER ]\n"); | |
aba5acdf SH |
62 | exit(-1); |
63 | } | |
64 | ||
ca89c521 HL |
65 | static struct |
66 | { | |
67 | int not; | |
68 | int l3mdev; | |
82252cdc | 69 | int iifmask, oifmask, uidrange; |
ca89c521 HL |
70 | unsigned int tb; |
71 | unsigned int tos, tosmask; | |
72 | unsigned int pref, prefmask; | |
73 | unsigned int fwmark, fwmask; | |
74 | char iif[IFNAMSIZ]; | |
75 | char oif[IFNAMSIZ]; | |
82252cdc | 76 | struct fib_rule_uid_range range; |
ca89c521 HL |
77 | inet_prefix src; |
78 | inet_prefix dst; | |
7c083da7 DS |
79 | int protocol; |
80 | int protocolmask; | |
ca89c521 HL |
81 | } filter; |
82 | ||
5baaf07c DS |
83 | static inline int frh_get_table(struct fib_rule_hdr *frh, struct rtattr **tb) |
84 | { | |
85 | __u32 table = frh->table; | |
86 | if (tb[RTA_TABLE]) | |
87 | table = rta_getattr_u32(tb[RTA_TABLE]); | |
88 | return table; | |
89 | } | |
90 | ||
ca89c521 HL |
91 | static bool filter_nlmsg(struct nlmsghdr *n, struct rtattr **tb, int host_len) |
92 | { | |
5baaf07c | 93 | struct fib_rule_hdr *frh = NLMSG_DATA(n); |
ca89c521 HL |
94 | __u32 table; |
95 | ||
5baaf07c | 96 | if (preferred_family != AF_UNSPEC && frh->family != preferred_family) |
ca89c521 HL |
97 | return false; |
98 | ||
99 | if (filter.prefmask && | |
100 | filter.pref ^ (tb[FRA_PRIORITY] ? rta_getattr_u32(tb[FRA_PRIORITY]) : 0)) | |
101 | return false; | |
5baaf07c | 102 | if (filter.not && !(frh->flags & FIB_RULE_INVERT)) |
ca89c521 HL |
103 | return false; |
104 | ||
105 | if (filter.src.family) { | |
746035b4 SP |
106 | inet_prefix *f_src = &filter.src; |
107 | ||
5baaf07c DS |
108 | if (f_src->family != frh->family || |
109 | f_src->bitlen > frh->src_len) | |
746035b4 SP |
110 | return false; |
111 | ||
112 | if (inet_addr_match_rta(f_src, tb[FRA_SRC])) | |
ca89c521 HL |
113 | return false; |
114 | } | |
115 | ||
116 | if (filter.dst.family) { | |
746035b4 SP |
117 | inet_prefix *f_dst = &filter.dst; |
118 | ||
5baaf07c DS |
119 | if (f_dst->family != frh->family || |
120 | f_dst->bitlen > frh->dst_len) | |
746035b4 SP |
121 | return false; |
122 | ||
123 | if (inet_addr_match_rta(f_dst, tb[FRA_DST])) | |
ca89c521 HL |
124 | return false; |
125 | } | |
126 | ||
5baaf07c | 127 | if (filter.tosmask && filter.tos ^ frh->tos) |
ca89c521 HL |
128 | return false; |
129 | ||
130 | if (filter.fwmark) { | |
131 | __u32 mark = 0; | |
e147161b | 132 | |
ca89c521 HL |
133 | if (tb[FRA_FWMARK]) |
134 | mark = rta_getattr_u32(tb[FRA_FWMARK]); | |
135 | if (filter.fwmark ^ mark) | |
136 | return false; | |
137 | } | |
138 | if (filter.fwmask) { | |
139 | __u32 mask = 0; | |
e147161b | 140 | |
ca89c521 HL |
141 | if (tb[FRA_FWMASK]) |
142 | mask = rta_getattr_u32(tb[FRA_FWMASK]); | |
143 | if (filter.fwmask ^ mask) | |
144 | return false; | |
145 | } | |
146 | ||
147 | if (filter.iifmask) { | |
148 | if (tb[FRA_IFNAME]) { | |
149 | if (strcmp(filter.iif, rta_getattr_str(tb[FRA_IFNAME])) != 0) | |
150 | return false; | |
151 | } else { | |
152 | return false; | |
153 | } | |
154 | } | |
155 | ||
156 | if (filter.oifmask) { | |
157 | if (tb[FRA_OIFNAME]) { | |
158 | if (strcmp(filter.oif, rta_getattr_str(tb[FRA_OIFNAME])) != 0) | |
159 | return false; | |
160 | } else { | |
161 | return false; | |
162 | } | |
163 | } | |
164 | ||
165 | if (filter.l3mdev && !(tb[FRA_L3MDEV] && rta_getattr_u8(tb[FRA_L3MDEV]))) | |
166 | return false; | |
167 | ||
82252cdc LC |
168 | if (filter.uidrange) { |
169 | struct fib_rule_uid_range *r = RTA_DATA(tb[FRA_UID_RANGE]); | |
170 | ||
171 | if (!tb[FRA_UID_RANGE] || | |
172 | r->start != filter.range.start || | |
173 | r->end != filter.range.end) | |
174 | return false; | |
175 | } | |
176 | ||
5baaf07c | 177 | table = frh_get_table(frh, tb); |
ca89c521 HL |
178 | if (filter.tb > 0 && filter.tb ^ table) |
179 | return false; | |
180 | ||
181 | return true; | |
182 | } | |
183 | ||
cd554f2c | 184 | int print_rule(struct nlmsghdr *n, void *arg) |
aba5acdf | 185 | { |
0dd4ccc5 | 186 | FILE *fp = arg; |
5baaf07c | 187 | struct fib_rule_hdr *frh = NLMSG_DATA(n); |
aba5acdf SH |
188 | int len = n->nlmsg_len; |
189 | int host_len = -1; | |
0dd4ccc5 | 190 | __u32 table, prio = 0; |
56f5daac | 191 | struct rtattr *tb[FRA_MAX+1]; |
aba5acdf SH |
192 | SPRINT_BUF(b1); |
193 | ||
98bde989 | 194 | if (n->nlmsg_type != RTM_NEWRULE && n->nlmsg_type != RTM_DELRULE) |
aba5acdf SH |
195 | return 0; |
196 | ||
5baaf07c | 197 | len -= NLMSG_LENGTH(sizeof(*frh)); |
aba5acdf SH |
198 | if (len < 0) |
199 | return -1; | |
200 | ||
5baaf07c | 201 | parse_rtattr(tb, FRA_MAX, RTM_RTA(frh), len); |
aba5acdf | 202 | |
5baaf07c | 203 | host_len = af_bit_len(frh->family); |
aba5acdf | 204 | |
e147161b | 205 | if (!filter_nlmsg(n, tb, host_len)) |
ca89c521 HL |
206 | return 0; |
207 | ||
0dd4ccc5 | 208 | open_json_object(NULL); |
98bde989 | 209 | if (n->nlmsg_type == RTM_DELRULE) |
0dd4ccc5 | 210 | print_bool(PRINT_ANY, "deleted", "Deleted ", true); |
98bde989 | 211 | |
ad1a12db | 212 | if (tb[FRA_PRIORITY]) |
0dd4ccc5 SH |
213 | prio = rta_getattr_u32(tb[FRA_PRIORITY]); |
214 | ||
215 | print_uint(PRINT_ANY, "priority", "%u:\t", prio); | |
aba5acdf | 216 | |
5baaf07c | 217 | if (frh->flags & FIB_RULE_INVERT) |
0dd4ccc5 | 218 | print_null(PRINT_ANY, "not", "not ", NULL); |
3123a0cc | 219 | |
ad1a12db | 220 | if (tb[FRA_SRC]) { |
0dd4ccc5 SH |
221 | const char *src = rt_addr_n2a_rta(frh->family, tb[FRA_SRC]); |
222 | ||
223 | print_string(PRINT_FP, NULL, "from ", NULL); | |
224 | print_color_string(PRINT_ANY, ifa_family_color(frh->family), | |
225 | "src", "%s", src); | |
226 | if (frh->src_len != host_len) | |
227 | print_uint(PRINT_ANY, "srclen", "/%u ", frh->src_len); | |
228 | else | |
229 | print_string(PRINT_FP, NULL, " ", NULL); | |
5baaf07c | 230 | } else if (frh->src_len) { |
0dd4ccc5 SH |
231 | print_string(PRINT_ANY, "src", "from %s", "0"); |
232 | print_uint(PRINT_ANY, "srclen", "/%u ", frh->src_len); | |
aba5acdf | 233 | } else { |
0dd4ccc5 | 234 | print_string(PRINT_ANY, "src", "from %s ", "all"); |
aba5acdf SH |
235 | } |
236 | ||
ad1a12db | 237 | if (tb[FRA_DST]) { |
0dd4ccc5 SH |
238 | const char *dst = rt_addr_n2a_rta(frh->family, tb[FRA_DST]); |
239 | ||
240 | print_string(PRINT_FP, NULL, "to ", NULL); | |
241 | print_color_string(PRINT_ANY, ifa_family_color(frh->family), | |
1a75322c | 242 | "dst", "%s", dst); |
0dd4ccc5 SH |
243 | if (frh->dst_len != host_len) |
244 | print_uint(PRINT_ANY, "dstlen", "/%u ", frh->dst_len); | |
245 | else | |
246 | print_string(PRINT_FP, NULL, " ", NULL); | |
5baaf07c | 247 | } else if (frh->dst_len) { |
0dd4ccc5 SH |
248 | print_string(PRINT_ANY, "dst", "to %s", "0"); |
249 | print_uint(PRINT_ANY, "dstlen", "/%u ", frh->dst_len); | |
aba5acdf SH |
250 | } |
251 | ||
5baaf07c | 252 | if (frh->tos) { |
0dd4ccc5 SH |
253 | print_string(PRINT_ANY, "tos", |
254 | "tos %s ", | |
255 | rtnl_dsfield_n2a(frh->tos, b1, sizeof(b1))); | |
aba5acdf | 256 | } |
ad1a12db | 257 | |
4806867a | 258 | if (tb[FRA_FWMARK] || tb[FRA_FWMASK]) { |
be7f286e PM |
259 | __u32 mark = 0, mask = 0; |
260 | ||
ad1a12db | 261 | if (tb[FRA_FWMARK]) |
ff24746c | 262 | mark = rta_getattr_u32(tb[FRA_FWMARK]); |
be7f286e | 263 | |
ad1a12db | 264 | if (tb[FRA_FWMASK] && |
0dd4ccc5 SH |
265 | (mask = rta_getattr_u32(tb[FRA_FWMASK])) != 0xFFFFFFFF) { |
266 | print_0xhex(PRINT_ANY, "fwmark", "fwmark 0x%x", mark); | |
267 | print_0xhex(PRINT_ANY, "fwmask", "/0x%x ", mask); | |
268 | } else { | |
269 | print_0xhex(PRINT_ANY, "fwmark", "fwmark 0x%x ", mark); | |
270 | } | |
aba5acdf SH |
271 | } |
272 | ||
ad1a12db | 273 | if (tb[FRA_IFNAME]) { |
0dd4ccc5 SH |
274 | if (!is_json_context()) |
275 | fprintf(fp, "iif "); | |
276 | print_color_string(PRINT_ANY, COLOR_IFNAME, | |
277 | "iif", "%s ", | |
278 | rta_getattr_str(tb[FRA_IFNAME])); | |
279 | ||
5baaf07c | 280 | if (frh->flags & FIB_RULE_IIF_DETACHED) |
0dd4ccc5 SH |
281 | print_null(PRINT_ANY, "iif_detached", "[detached] ", |
282 | NULL); | |
85eae222 PM |
283 | } |
284 | ||
285 | if (tb[FRA_OIFNAME]) { | |
0dd4ccc5 SH |
286 | if (!is_json_context()) |
287 | fprintf(fp, "oif "); | |
288 | ||
289 | print_color_string(PRINT_ANY, COLOR_IFNAME, "oif", "%s ", | |
290 | rta_getattr_str(tb[FRA_OIFNAME])); | |
291 | ||
5baaf07c | 292 | if (frh->flags & FIB_RULE_OIF_DETACHED) |
0dd4ccc5 SH |
293 | print_null(PRINT_ANY, "oif_detached", "[detached] ", |
294 | NULL); | |
aba5acdf SH |
295 | } |
296 | ||
8c92e122 | 297 | if (tb[FRA_L3MDEV]) { |
0dd4ccc5 SH |
298 | __u8 mdev = rta_getattr_u8(tb[FRA_L3MDEV]); |
299 | ||
300 | if (mdev) | |
301 | print_null(PRINT_ANY, "l3mdev", | |
302 | "lookup [l3mdev-table] ", NULL); | |
8c92e122 DA |
303 | } |
304 | ||
82252cdc LC |
305 | if (tb[FRA_UID_RANGE]) { |
306 | struct fib_rule_uid_range *r = RTA_DATA(tb[FRA_UID_RANGE]); | |
307 | ||
0dd4ccc5 SH |
308 | print_uint(PRINT_ANY, "uid_start", "uidrange %u", r->start); |
309 | print_uint(PRINT_ANY, "uid_end", "-%u ", r->end); | |
82252cdc LC |
310 | } |
311 | ||
f686f764 RP |
312 | if (tb[FRA_IP_PROTO]) { |
313 | SPRINT_BUF(pbuf); | |
314 | print_string(PRINT_ANY, "ipproto", "ipproto %s ", | |
315 | inet_proto_n2a(rta_getattr_u8(tb[FRA_IP_PROTO]), | |
316 | pbuf, sizeof(pbuf))); | |
317 | } | |
318 | ||
319 | if (tb[FRA_SPORT_RANGE]) { | |
320 | struct fib_rule_port_range *r = RTA_DATA(tb[FRA_SPORT_RANGE]); | |
321 | ||
322 | if (r->start == r->end) { | |
323 | print_uint(PRINT_ANY, "sport", "sport %u ", r->start); | |
324 | } else { | |
325 | print_uint(PRINT_ANY, "sport_start", "sport %u", | |
326 | r->start); | |
327 | print_uint(PRINT_ANY, "sport_end", "-%u ", r->end); | |
328 | } | |
329 | } | |
330 | ||
331 | if (tb[FRA_DPORT_RANGE]) { | |
332 | struct fib_rule_port_range *r = RTA_DATA(tb[FRA_DPORT_RANGE]); | |
333 | ||
334 | if (r->start == r->end) { | |
335 | print_uint(PRINT_ANY, "dport", "dport %u ", r->start); | |
336 | } else { | |
337 | print_uint(PRINT_ANY, "dport_start", "dport %u", | |
338 | r->start); | |
339 | print_uint(PRINT_ANY, "dport_end", "-%u ", r->end); | |
340 | } | |
341 | } | |
342 | ||
5baaf07c | 343 | table = frh_get_table(frh, tb); |
b1d0525f | 344 | if (table) { |
0dd4ccc5 SH |
345 | print_string(PRINT_ANY, "table", |
346 | "lookup %s ", | |
347 | rtnl_rttable_n2a(table, b1, sizeof(b1))); | |
aba5acdf | 348 | |
b1d0525f ST |
349 | if (tb[FRA_SUPPRESS_PREFIXLEN]) { |
350 | int pl = rta_getattr_u32(tb[FRA_SUPPRESS_PREFIXLEN]); | |
56f5daac | 351 | |
d831cc7c | 352 | if (pl != -1) |
0dd4ccc5 SH |
353 | print_int(PRINT_ANY, "suppress_prefixlen", |
354 | "suppress_prefixlength %d ", pl); | |
b1d0525f | 355 | } |
0dd4ccc5 | 356 | |
b1d0525f ST |
357 | if (tb[FRA_SUPPRESS_IFGROUP]) { |
358 | int group = rta_getattr_u32(tb[FRA_SUPPRESS_IFGROUP]); | |
56f5daac | 359 | |
b1d0525f | 360 | if (group != -1) { |
0dd4ccc5 SH |
361 | const char *grname |
362 | = rtnl_group_n2a(group, b1, sizeof(b1)); | |
363 | ||
364 | print_string(PRINT_ANY, "suppress_ifgroup", | |
365 | "suppress_ifgroup %s ", grname); | |
b1d0525f ST |
366 | } |
367 | } | |
368 | } | |
369 | ||
ad1a12db | 370 | if (tb[FRA_FLOW]) { |
ff24746c | 371 | __u32 to = rta_getattr_u32(tb[FRA_FLOW]); |
aba5acdf | 372 | __u32 from = to>>16; |
56f5daac | 373 | |
aba5acdf | 374 | to &= 0xFFFF; |
0dd4ccc5 SH |
375 | if (from) |
376 | print_string(PRINT_ANY, | |
377 | "flow_from", "realms %s/", | |
378 | rtnl_rtrealm_n2a(from, b1, sizeof(b1))); | |
379 | ||
380 | print_string(PRINT_ANY, "flow_to", "%s ", | |
381 | rtnl_rtrealm_n2a(to, b1, sizeof(b1))); | |
aba5acdf SH |
382 | } |
383 | ||
5baaf07c | 384 | if (frh->action == RTN_NAT) { |
aba5acdf | 385 | if (tb[RTA_GATEWAY]) { |
0dd4ccc5 SH |
386 | const char *gateway; |
387 | ||
388 | gateway = format_host_rta(frh->family, tb[RTA_GATEWAY]); | |
389 | ||
390 | print_string(PRINT_ANY, "nat_gateway", | |
391 | "map-to %s ", gateway); | |
392 | } else { | |
393 | print_null(PRINT_ANY, "masquerade", "masquerade", NULL); | |
394 | } | |
5baaf07c | 395 | } else if (frh->action == FR_ACT_GOTO) { |
6b469cae | 396 | if (tb[FRA_GOTO]) |
0dd4ccc5 SH |
397 | print_uint(PRINT_ANY, "goto", "goto %u", |
398 | rta_getattr_u32(tb[FRA_GOTO])); | |
6b469cae | 399 | else |
0dd4ccc5 SH |
400 | print_string(PRINT_ANY, "goto", "goto %s", "none"); |
401 | ||
5baaf07c | 402 | if (frh->flags & FIB_RULE_UNRESOLVED) |
0dd4ccc5 SH |
403 | print_null(PRINT_ANY, "unresolved", "unresolved", NULL); |
404 | } else if (frh->action == FR_ACT_NOP) { | |
405 | print_null(PRINT_ANY, "nop", "nop", NULL); | |
406 | } else if (frh->action != FR_ACT_TO_TBL) { | |
407 | print_string(PRINT_ANY, "to_tbl", "%s", | |
408 | rtnl_rtntype_n2a(frh->action, b1, sizeof(b1))); | |
409 | } | |
aba5acdf | 410 | |
7c083da7 DS |
411 | if (tb[FRA_PROTOCOL]) { |
412 | __u8 protocol = rta_getattr_u8(tb[FRA_PROTOCOL]); | |
413 | ||
0dd4ccc5 SH |
414 | if ((protocol && protocol != RTPROT_KERNEL) || show_details > 0) { |
415 | print_string(PRINT_ANY, "protocol", " proto %s ", | |
416 | rtnl_rtprot_n2a(protocol, b1, sizeof(b1))); | |
7c083da7 DS |
417 | } |
418 | } | |
0dd4ccc5 SH |
419 | print_string(PRINT_FP, NULL, "\n", ""); |
420 | close_json_object(); | |
aba5acdf SH |
421 | fflush(fp); |
422 | return 0; | |
423 | } | |
424 | ||
2f4e171f KT |
425 | static __u32 rule_dump_magic = 0x71706986; |
426 | ||
427 | static int save_rule_prep(void) | |
428 | { | |
429 | int ret; | |
430 | ||
431 | if (isatty(STDOUT_FILENO)) { | |
432 | fprintf(stderr, "Not sending a binary stream to stdout\n"); | |
433 | return -1; | |
434 | } | |
435 | ||
436 | ret = write(STDOUT_FILENO, &rule_dump_magic, sizeof(rule_dump_magic)); | |
437 | if (ret != sizeof(rule_dump_magic)) { | |
438 | fprintf(stderr, "Can't write magic to dump file\n"); | |
439 | return -1; | |
440 | } | |
441 | ||
442 | return 0; | |
443 | } | |
444 | ||
cd554f2c | 445 | static int save_rule(struct nlmsghdr *n, void *arg) |
aba5acdf | 446 | { |
2f4e171f KT |
447 | int ret; |
448 | ||
449 | ret = write(STDOUT_FILENO, n, n->nlmsg_len); | |
450 | if ((ret > 0) && (ret != n->nlmsg_len)) { | |
451 | fprintf(stderr, "Short write while saving nlmsg\n"); | |
452 | ret = -EIO; | |
453 | } | |
454 | ||
455 | return ret == n->nlmsg_len ? 0 : ret; | |
456 | } | |
457 | ||
cd554f2c | 458 | static int flush_rule(struct nlmsghdr *n, void *arg) |
cb294a1d HL |
459 | { |
460 | struct rtnl_handle rth2; | |
5baaf07c | 461 | struct fib_rule_hdr *frh = NLMSG_DATA(n); |
cb294a1d HL |
462 | int len = n->nlmsg_len; |
463 | struct rtattr *tb[FRA_MAX+1]; | |
b65b4c08 | 464 | int host_len = -1; |
cb294a1d | 465 | |
5baaf07c | 466 | len -= NLMSG_LENGTH(sizeof(*frh)); |
cb294a1d HL |
467 | if (len < 0) |
468 | return -1; | |
469 | ||
5baaf07c | 470 | parse_rtattr(tb, FRA_MAX, RTM_RTA(frh), len); |
cb294a1d | 471 | |
b65b4c08 DA |
472 | host_len = af_bit_len(frh->family); |
473 | if (!filter_nlmsg(n, tb, host_len)) | |
474 | return 0; | |
475 | ||
7c083da7 DS |
476 | if (tb[FRA_PROTOCOL]) { |
477 | __u8 protocol = rta_getattr_u8(tb[FRA_PROTOCOL]); | |
478 | ||
479 | if ((filter.protocol ^ protocol) & filter.protocolmask) | |
480 | return 0; | |
481 | } | |
482 | ||
cb294a1d HL |
483 | if (tb[FRA_PRIORITY]) { |
484 | n->nlmsg_type = RTM_DELRULE; | |
485 | n->nlmsg_flags = NLM_F_REQUEST; | |
486 | ||
487 | if (rtnl_open(&rth2, 0) < 0) | |
488 | return -1; | |
489 | ||
86bf43c7 | 490 | if (rtnl_talk(&rth2, n, NULL) < 0) |
cb294a1d HL |
491 | return -2; |
492 | ||
493 | rtnl_close(&rth2); | |
494 | } | |
495 | ||
496 | return 0; | |
497 | } | |
498 | ||
499 | static int iprule_list_flush_or_save(int argc, char **argv, int action) | |
2f4e171f | 500 | { |
cb294a1d | 501 | rtnl_filter_t filter_fn; |
aba5acdf SH |
502 | int af = preferred_family; |
503 | ||
504 | if (af == AF_UNSPEC) | |
505 | af = AF_INET; | |
506 | ||
7c083da7 DS |
507 | if (action == IPRULE_SAVE && argc > 0) { |
508 | fprintf(stderr, "\"ip rule save\" does not take any arguments.\n"); | |
aba5acdf SH |
509 | return -1; |
510 | } | |
511 | ||
cb294a1d HL |
512 | switch (action) { |
513 | case IPRULE_SAVE: | |
2f4e171f KT |
514 | if (save_rule_prep()) |
515 | return -1; | |
cb294a1d HL |
516 | filter_fn = save_rule; |
517 | break; | |
518 | case IPRULE_FLUSH: | |
519 | filter_fn = flush_rule; | |
520 | break; | |
521 | default: | |
522 | filter_fn = print_rule; | |
2f4e171f KT |
523 | } |
524 | ||
ca89c521 HL |
525 | memset(&filter, 0, sizeof(filter)); |
526 | ||
527 | while (argc > 0) { | |
528 | if (matches(*argv, "preference") == 0 || | |
529 | matches(*argv, "order") == 0 || | |
530 | matches(*argv, "priority") == 0) { | |
531 | __u32 pref; | |
e147161b | 532 | |
ca89c521 HL |
533 | NEXT_ARG(); |
534 | if (get_u32(&pref, *argv, 0)) | |
535 | invarg("preference value is invalid\n", *argv); | |
536 | filter.pref = pref; | |
537 | filter.prefmask = 1; | |
538 | } else if (strcmp(*argv, "not") == 0) { | |
539 | filter.not = 1; | |
540 | } else if (strcmp(*argv, "tos") == 0) { | |
541 | __u32 tos; | |
e147161b | 542 | |
ca89c521 HL |
543 | NEXT_ARG(); |
544 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
545 | invarg("TOS value is invalid\n", *argv); | |
546 | filter.tos = tos; | |
547 | filter.tosmask = 1; | |
548 | } else if (strcmp(*argv, "fwmark") == 0) { | |
549 | char *slash; | |
550 | __u32 fwmark, fwmask; | |
e147161b | 551 | |
ca89c521 HL |
552 | NEXT_ARG(); |
553 | slash = strchr(*argv, '/'); | |
554 | if (slash != NULL) | |
555 | *slash = '\0'; | |
556 | if (get_u32(&fwmark, *argv, 0)) | |
557 | invarg("fwmark value is invalid\n", *argv); | |
558 | filter.fwmark = fwmark; | |
559 | if (slash) { | |
560 | if (get_u32(&fwmask, slash+1, 0)) | |
561 | invarg("fwmask value is invalid\n", | |
562 | slash+1); | |
563 | filter.fwmask = fwmask; | |
564 | } | |
565 | } else if (strcmp(*argv, "dev") == 0 || | |
566 | strcmp(*argv, "iif") == 0) { | |
567 | NEXT_ARG(); | |
625df645 PS |
568 | if (get_ifname(filter.iif, *argv)) |
569 | invarg("\"iif\"/\"dev\" not a valid ifname", *argv); | |
ca89c521 HL |
570 | filter.iifmask = 1; |
571 | } else if (strcmp(*argv, "oif") == 0) { | |
572 | NEXT_ARG(); | |
625df645 PS |
573 | if (get_ifname(filter.oif, *argv)) |
574 | invarg("\"oif\" not a valid ifname", *argv); | |
ca89c521 HL |
575 | filter.oifmask = 1; |
576 | } else if (strcmp(*argv, "l3mdev") == 0) { | |
577 | filter.l3mdev = 1; | |
82252cdc LC |
578 | } else if (strcmp(*argv, "uidrange") == 0) { |
579 | NEXT_ARG(); | |
580 | filter.uidrange = 1; | |
581 | if (sscanf(*argv, "%u-%u", | |
582 | &filter.range.start, | |
583 | &filter.range.end) != 2) | |
584 | invarg("invalid UID range\n", *argv); | |
585 | ||
ca89c521 | 586 | } else if (matches(*argv, "lookup") == 0 || |
e147161b | 587 | matches(*argv, "table") == 0) { |
ca89c521 | 588 | __u32 tid; |
e147161b | 589 | |
ca89c521 HL |
590 | NEXT_ARG(); |
591 | if (rtnl_rttable_a2n(&tid, *argv)) | |
592 | invarg("table id value is invalid\n", *argv); | |
593 | filter.tb = tid; | |
594 | } else if (matches(*argv, "from") == 0 || | |
595 | matches(*argv, "src") == 0) { | |
596 | NEXT_ARG(); | |
746035b4 SP |
597 | if (get_prefix(&filter.src, *argv, af)) |
598 | invarg("from value is invalid\n", *argv); | |
7c083da7 DS |
599 | } else if (matches(*argv, "protocol") == 0) { |
600 | __u32 prot; | |
601 | NEXT_ARG(); | |
602 | filter.protocolmask = -1; | |
603 | if (rtnl_rtprot_a2n(&prot, *argv)) { | |
604 | if (strcmp(*argv, "all") != 0) | |
605 | invarg("invalid \"protocol\"\n", *argv); | |
606 | prot = 0; | |
607 | filter.protocolmask = 0; | |
608 | } | |
609 | filter.protocol = prot; | |
610 | } else{ | |
ca89c521 HL |
611 | if (matches(*argv, "dst") == 0 || |
612 | matches(*argv, "to") == 0) { | |
613 | NEXT_ARG(); | |
614 | } | |
746035b4 SP |
615 | if (get_prefix(&filter.dst, *argv, af)) |
616 | invarg("to value is invalid\n", *argv); | |
ca89c521 HL |
617 | } |
618 | argc--; argv++; | |
619 | } | |
620 | ||
b05d9a3d | 621 | if (rtnl_ruledump_req(&rth, af) < 0) { |
aba5acdf SH |
622 | perror("Cannot send dump request"); |
623 | return 1; | |
624 | } | |
625 | ||
0dd4ccc5 | 626 | new_json_obj(json); |
cb294a1d | 627 | if (rtnl_dump_filter(&rth, filter_fn, stdout) < 0) { |
aba5acdf SH |
628 | fprintf(stderr, "Dump terminated\n"); |
629 | return 1; | |
630 | } | |
0dd4ccc5 | 631 | delete_json_obj(); |
aba5acdf SH |
632 | |
633 | return 0; | |
634 | } | |
635 | ||
2f4e171f KT |
636 | static int rule_dump_check_magic(void) |
637 | { | |
638 | int ret; | |
639 | __u32 magic = 0; | |
640 | ||
641 | if (isatty(STDIN_FILENO)) { | |
642 | fprintf(stderr, "Can't restore rule dump from a terminal\n"); | |
643 | return -1; | |
644 | } | |
645 | ||
646 | ret = fread(&magic, sizeof(magic), 1, stdin); | |
647 | if (magic != rule_dump_magic) { | |
d831cc7c SH |
648 | fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", |
649 | ret, magic); | |
2f4e171f KT |
650 | return -1; |
651 | } | |
652 | ||
653 | return 0; | |
654 | } | |
655 | ||
cd554f2c | 656 | static int restore_handler(struct rtnl_ctrl_data *ctrl, |
2f4e171f KT |
657 | struct nlmsghdr *n, void *arg) |
658 | { | |
659 | int ret; | |
660 | ||
661 | n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK; | |
662 | ||
663 | ll_init_map(&rth); | |
664 | ||
86bf43c7 | 665 | ret = rtnl_talk(&rth, n, NULL); |
2f4e171f KT |
666 | if ((ret < 0) && (errno == EEXIST)) |
667 | ret = 0; | |
668 | ||
669 | return ret; | |
670 | } | |
671 | ||
672 | ||
673 | static int iprule_restore(void) | |
674 | { | |
675 | if (rule_dump_check_magic()) | |
676 | exit(-1); | |
677 | ||
678 | exit(rtnl_from_file(stdin, &restore_handler, NULL)); | |
679 | } | |
aba5acdf | 680 | |
50772dc5 | 681 | static int iprule_modify(int cmd, int argc, char **argv) |
aba5acdf | 682 | { |
8c92e122 | 683 | int l3mdev_rule = 0; |
aba5acdf | 684 | int table_ok = 0; |
8c92e122 | 685 | __u32 tid = 0; |
aba5acdf | 686 | struct { |
4806867a | 687 | struct nlmsghdr n; |
5baaf07c | 688 | struct fib_rule_hdr frh; |
56f5daac | 689 | char buf[1024]; |
d17b136f PS |
690 | } req = { |
691 | .n.nlmsg_type = cmd, | |
5baaf07c | 692 | .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct fib_rule_hdr)), |
d17b136f | 693 | .n.nlmsg_flags = NLM_F_REQUEST, |
5baaf07c DS |
694 | .frh.family = preferred_family, |
695 | .frh.action = FR_ACT_UNSPEC, | |
d17b136f | 696 | }; |
aba5acdf SH |
697 | |
698 | if (cmd == RTM_NEWRULE) { | |
699 | req.n.nlmsg_flags |= NLM_F_CREATE|NLM_F_EXCL; | |
5baaf07c | 700 | req.frh.action = FR_ACT_TO_TBL; |
aba5acdf SH |
701 | } |
702 | ||
67a990b8 AJM |
703 | if (cmd == RTM_DELRULE && argc == 0) { |
704 | fprintf(stderr, "\"ip rule del\" requires arguments.\n"); | |
705 | return -1; | |
706 | } | |
707 | ||
aba5acdf | 708 | while (argc > 0) { |
3123a0cc | 709 | if (strcmp(*argv, "not") == 0) { |
5baaf07c | 710 | req.frh.flags |= FIB_RULE_INVERT; |
3123a0cc | 711 | } else if (strcmp(*argv, "from") == 0) { |
aba5acdf | 712 | inet_prefix dst; |
56f5daac | 713 | |
aba5acdf | 714 | NEXT_ARG(); |
5baaf07c DS |
715 | get_prefix(&dst, *argv, req.frh.family); |
716 | req.frh.src_len = dst.bitlen; | |
d831cc7c SH |
717 | addattr_l(&req.n, sizeof(req), FRA_SRC, |
718 | &dst.data, dst.bytelen); | |
aba5acdf SH |
719 | } else if (strcmp(*argv, "to") == 0) { |
720 | inet_prefix dst; | |
56f5daac | 721 | |
aba5acdf | 722 | NEXT_ARG(); |
5baaf07c DS |
723 | get_prefix(&dst, *argv, req.frh.family); |
724 | req.frh.dst_len = dst.bitlen; | |
d831cc7c SH |
725 | addattr_l(&req.n, sizeof(req), FRA_DST, |
726 | &dst.data, dst.bytelen); | |
aba5acdf SH |
727 | } else if (matches(*argv, "preference") == 0 || |
728 | matches(*argv, "order") == 0 || | |
729 | matches(*argv, "priority") == 0) { | |
730 | __u32 pref; | |
56f5daac | 731 | |
aba5acdf SH |
732 | NEXT_ARG(); |
733 | if (get_u32(&pref, *argv, 0)) | |
734 | invarg("preference value is invalid\n", *argv); | |
ad1a12db | 735 | addattr32(&req.n, sizeof(req), FRA_PRIORITY, pref); |
dec01609 AH |
736 | } else if (strcmp(*argv, "tos") == 0 || |
737 | matches(*argv, "dsfield") == 0) { | |
aba5acdf | 738 | __u32 tos; |
56f5daac | 739 | |
aba5acdf SH |
740 | NEXT_ARG(); |
741 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
742 | invarg("TOS value is invalid\n", *argv); | |
5baaf07c | 743 | req.frh.tos = tos; |
aba5acdf | 744 | } else if (strcmp(*argv, "fwmark") == 0) { |
be7f286e PM |
745 | char *slash; |
746 | __u32 fwmark, fwmask; | |
56f5daac | 747 | |
aba5acdf | 748 | NEXT_ARG(); |
d831cc7c SH |
749 | |
750 | slash = strchr(*argv, '/'); | |
751 | if (slash != NULL) | |
be7f286e | 752 | *slash = '\0'; |
4fb466f9 | 753 | if (get_u32(&fwmark, *argv, 0)) |
aba5acdf | 754 | invarg("fwmark value is invalid\n", *argv); |
ad1a12db | 755 | addattr32(&req.n, sizeof(req), FRA_FWMARK, fwmark); |
be7f286e PM |
756 | if (slash) { |
757 | if (get_u32(&fwmask, slash+1, 0)) | |
d831cc7c SH |
758 | invarg("fwmask value is invalid\n", |
759 | slash+1); | |
760 | addattr32(&req.n, sizeof(req), | |
761 | FRA_FWMASK, fwmask); | |
be7f286e | 762 | } |
aba5acdf SH |
763 | } else if (matches(*argv, "realms") == 0) { |
764 | __u32 realm; | |
56f5daac | 765 | |
aba5acdf | 766 | NEXT_ARG(); |
d583e88e | 767 | if (get_rt_realms_or_raw(&realm, *argv)) |
aba5acdf | 768 | invarg("invalid realms\n", *argv); |
ad1a12db | 769 | addattr32(&req.n, sizeof(req), FRA_FLOW, realm); |
33f1e250 DS |
770 | } else if (matches(*argv, "protocol") == 0) { |
771 | __u32 proto; | |
772 | ||
773 | NEXT_ARG(); | |
774 | if (rtnl_rtprot_a2n(&proto, *argv)) | |
775 | invarg("\"protocol\" value is invalid\n", *argv); | |
776 | addattr8(&req.n, sizeof(req), FRA_PROTOCOL, proto); | |
aba5acdf SH |
777 | } else if (matches(*argv, "table") == 0 || |
778 | strcmp(*argv, "lookup") == 0) { | |
aba5acdf SH |
779 | NEXT_ARG(); |
780 | if (rtnl_rttable_a2n(&tid, *argv)) | |
781 | invarg("invalid table ID\n", *argv); | |
34e95647 | 782 | if (tid < 256) |
5baaf07c | 783 | req.frh.table = tid; |
34e95647 | 784 | else { |
5baaf07c | 785 | req.frh.table = RT_TABLE_UNSPEC; |
ad1a12db | 786 | addattr32(&req.n, sizeof(req), FRA_TABLE, tid); |
34e95647 | 787 | } |
aba5acdf | 788 | table_ok = 1; |
b1d0525f ST |
789 | } else if (matches(*argv, "suppress_prefixlength") == 0 || |
790 | strcmp(*argv, "sup_pl") == 0) { | |
791 | int pl; | |
56f5daac | 792 | |
b1d0525f ST |
793 | NEXT_ARG(); |
794 | if (get_s32(&pl, *argv, 0) || pl < 0) | |
d831cc7c SH |
795 | invarg("suppress_prefixlength value is invalid\n", |
796 | *argv); | |
797 | addattr32(&req.n, sizeof(req), | |
798 | FRA_SUPPRESS_PREFIXLEN, pl); | |
b1d0525f ST |
799 | } else if (matches(*argv, "suppress_ifgroup") == 0 || |
800 | strcmp(*argv, "sup_group") == 0) { | |
801 | NEXT_ARG(); | |
802 | int group; | |
56f5daac | 803 | |
b1d0525f | 804 | if (rtnl_group_a2n(&group, *argv)) |
d831cc7c SH |
805 | invarg("Invalid \"suppress_ifgroup\" value\n", |
806 | *argv); | |
807 | addattr32(&req.n, sizeof(req), | |
808 | FRA_SUPPRESS_IFGROUP, group); | |
aba5acdf SH |
809 | } else if (strcmp(*argv, "dev") == 0 || |
810 | strcmp(*argv, "iif") == 0) { | |
811 | NEXT_ARG(); | |
625df645 PS |
812 | if (check_ifname(*argv)) |
813 | invarg("\"iif\"/\"dev\" not a valid ifname", *argv); | |
d831cc7c SH |
814 | addattr_l(&req.n, sizeof(req), FRA_IFNAME, |
815 | *argv, strlen(*argv)+1); | |
85eae222 PM |
816 | } else if (strcmp(*argv, "oif") == 0) { |
817 | NEXT_ARG(); | |
625df645 PS |
818 | if (check_ifname(*argv)) |
819 | invarg("\"oif\" not a valid ifname", *argv); | |
d831cc7c SH |
820 | addattr_l(&req.n, sizeof(req), FRA_OIFNAME, |
821 | *argv, strlen(*argv)+1); | |
8c92e122 DA |
822 | } else if (strcmp(*argv, "l3mdev") == 0) { |
823 | addattr8(&req.n, sizeof(req), FRA_L3MDEV, 1); | |
824 | table_ok = 1; | |
825 | l3mdev_rule = 1; | |
82252cdc LC |
826 | } else if (strcmp(*argv, "uidrange") == 0) { |
827 | struct fib_rule_uid_range r; | |
828 | ||
829 | NEXT_ARG(); | |
830 | if (sscanf(*argv, "%u-%u", &r.start, &r.end) != 2) | |
831 | invarg("invalid UID range\n", *argv); | |
832 | addattr_l(&req.n, sizeof(req), FRA_UID_RANGE, &r, | |
833 | sizeof(r)); | |
aba5acdf SH |
834 | } else if (strcmp(*argv, "nat") == 0 || |
835 | matches(*argv, "map-to") == 0) { | |
836 | NEXT_ARG(); | |
526afe40 | 837 | fprintf(stderr, "Warning: route NAT is deprecated\n"); |
d831cc7c SH |
838 | addattr32(&req.n, sizeof(req), RTA_GATEWAY, |
839 | get_addr32(*argv)); | |
5baaf07c | 840 | req.frh.action = RTN_NAT; |
f686f764 RP |
841 | } else if (strcmp(*argv, "ipproto") == 0) { |
842 | int ipproto; | |
843 | ||
844 | NEXT_ARG(); | |
845 | ipproto = inet_proto_a2n(*argv); | |
846 | if (ipproto < 0) | |
847 | invarg("Invalid \"ipproto\" value\n", | |
848 | *argv); | |
849 | addattr8(&req.n, sizeof(req), FRA_IP_PROTO, ipproto); | |
850 | } else if (strcmp(*argv, "sport") == 0) { | |
851 | struct fib_rule_port_range r; | |
852 | int ret = 0; | |
853 | ||
854 | NEXT_ARG(); | |
855 | ret = sscanf(*argv, "%hu-%hu", &r.start, &r.end); | |
856 | if (ret == 1) | |
857 | r.end = r.start; | |
858 | else if (ret != 2) | |
859 | invarg("invalid port range\n", *argv); | |
860 | addattr_l(&req.n, sizeof(req), FRA_SPORT_RANGE, &r, | |
861 | sizeof(r)); | |
862 | } else if (strcmp(*argv, "dport") == 0) { | |
863 | struct fib_rule_port_range r; | |
864 | int ret = 0; | |
865 | ||
866 | NEXT_ARG(); | |
867 | ret = sscanf(*argv, "%hu-%hu", &r.start, &r.end); | |
868 | if (ret == 1) | |
869 | r.end = r.start; | |
870 | else if (ret != 2) | |
871 | invarg("invalid dport range\n", *argv); | |
872 | addattr_l(&req.n, sizeof(req), FRA_DPORT_RANGE, &r, | |
873 | sizeof(r)); | |
aba5acdf SH |
874 | } else { |
875 | int type; | |
876 | ||
d831cc7c | 877 | if (strcmp(*argv, "type") == 0) |
aba5acdf | 878 | NEXT_ARG(); |
d831cc7c | 879 | |
aba5acdf SH |
880 | if (matches(*argv, "help") == 0) |
881 | usage(); | |
6b469cae TG |
882 | else if (matches(*argv, "goto") == 0) { |
883 | __u32 target; | |
56f5daac | 884 | |
6b469cae TG |
885 | type = FR_ACT_GOTO; |
886 | NEXT_ARG(); | |
887 | if (get_u32(&target, *argv, 0)) | |
888 | invarg("invalid target\n", *argv); | |
d831cc7c SH |
889 | addattr32(&req.n, sizeof(req), |
890 | FRA_GOTO, target); | |
6b469cae TG |
891 | } else if (matches(*argv, "nop") == 0) |
892 | type = FR_ACT_NOP; | |
893 | else if (rtnl_rtntype_a2n(&type, *argv)) | |
aba5acdf | 894 | invarg("Failed to parse rule type", *argv); |
5baaf07c | 895 | req.frh.action = type; |
6b469cae | 896 | table_ok = 1; |
aba5acdf SH |
897 | } |
898 | argc--; | |
899 | argv++; | |
900 | } | |
901 | ||
8c92e122 DA |
902 | if (l3mdev_rule && tid != 0) { |
903 | fprintf(stderr, | |
904 | "table can not be specified for l3mdev rules\n"); | |
905 | return -EINVAL; | |
906 | } | |
907 | ||
5baaf07c DS |
908 | if (req.frh.family == AF_UNSPEC) |
909 | req.frh.family = AF_INET; | |
aba5acdf SH |
910 | |
911 | if (!table_ok && cmd == RTM_NEWRULE) | |
5baaf07c | 912 | req.frh.table = RT_TABLE_MAIN; |
aba5acdf | 913 | |
86bf43c7 | 914 | if (rtnl_talk(&rth, &req.n, NULL) < 0) |
076ae708 | 915 | return -2; |
aba5acdf SH |
916 | |
917 | return 0; | |
918 | } | |
919 | ||
920 | int do_iprule(int argc, char **argv) | |
921 | { | |
922 | if (argc < 1) { | |
cb294a1d | 923 | return iprule_list_flush_or_save(0, NULL, IPRULE_LIST); |
aba5acdf SH |
924 | } else if (matches(argv[0], "list") == 0 || |
925 | matches(argv[0], "lst") == 0 || | |
926 | matches(argv[0], "show") == 0) { | |
cb294a1d | 927 | return iprule_list_flush_or_save(argc-1, argv+1, IPRULE_LIST); |
2f4e171f | 928 | } else if (matches(argv[0], "save") == 0) { |
cb294a1d | 929 | return iprule_list_flush_or_save(argc-1, argv+1, IPRULE_SAVE); |
2f4e171f KT |
930 | } else if (matches(argv[0], "restore") == 0) { |
931 | return iprule_restore(); | |
aba5acdf SH |
932 | } else if (matches(argv[0], "add") == 0) { |
933 | return iprule_modify(RTM_NEWRULE, argc-1, argv+1); | |
934 | } else if (matches(argv[0], "delete") == 0) { | |
935 | return iprule_modify(RTM_DELRULE, argc-1, argv+1); | |
50772dc5 | 936 | } else if (matches(argv[0], "flush") == 0) { |
cb294a1d | 937 | return iprule_list_flush_or_save(argc-1, argv+1, IPRULE_FLUSH); |
aba5acdf SH |
938 | } else if (matches(argv[0], "help") == 0) |
939 | usage(); | |
940 | ||
d831cc7c SH |
941 | fprintf(stderr, |
942 | "Command \"%s\" is unknown, try \"ip rule help\".\n", *argv); | |
aba5acdf SH |
943 | exit(-1); |
944 | } | |
945 | ||
b6c8e808 PM |
946 | int do_multirule(int argc, char **argv) |
947 | { | |
948 | switch (preferred_family) { | |
949 | case AF_UNSPEC: | |
950 | case AF_INET: | |
951 | preferred_family = RTNL_FAMILY_IPMR; | |
952 | break; | |
953 | case AF_INET6: | |
954 | preferred_family = RTNL_FAMILY_IP6MR; | |
955 | break; | |
0d1c9b57 BG |
956 | case RTNL_FAMILY_IPMR: |
957 | case RTNL_FAMILY_IP6MR: | |
958 | break; | |
b6c8e808 | 959 | default: |
d831cc7c SH |
960 | fprintf(stderr, |
961 | "Multicast rules are only supported for IPv4/IPv6, was: %i\n", | |
0d1c9b57 | 962 | preferred_family); |
b6c8e808 PM |
963 | exit(-1); |
964 | } | |
965 | ||
966 | return do_iprule(argc, argv); | |
967 | } |