]>
Commit | Line | Data |
---|---|---|
aba5acdf SH |
1 | /* |
2 | * iprule.c "ip rule". | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or | |
5 | * modify it under the terms of the GNU General Public License | |
6 | * as published by the Free Software Foundation; either version | |
7 | * 2 of the License, or (at your option) any later version. | |
8 | * | |
9 | * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> | |
10 | * | |
aba5acdf SH |
11 | */ |
12 | ||
13 | #include <stdio.h> | |
14 | #include <stdlib.h> | |
15 | #include <unistd.h> | |
16 | #include <syslog.h> | |
17 | #include <fcntl.h> | |
18 | #include <sys/socket.h> | |
19 | #include <netinet/in.h> | |
20 | #include <netinet/ip.h> | |
21 | #include <arpa/inet.h> | |
22 | #include <string.h> | |
ca89c521 | 23 | #include <linux/if.h> |
3123a0cc | 24 | #include <linux/fib_rules.h> |
2f4e171f | 25 | #include <errno.h> |
aba5acdf SH |
26 | |
27 | #include "rt_names.h" | |
28 | #include "utils.h" | |
34e95647 | 29 | #include "ip_common.h" |
aba5acdf | 30 | |
cb294a1d HL |
31 | enum list_action { |
32 | IPRULE_LIST, | |
33 | IPRULE_FLUSH, | |
34 | IPRULE_SAVE, | |
35 | }; | |
36 | ||
351efcde SH |
37 | extern struct rtnl_handle rth; |
38 | ||
aba5acdf SH |
39 | static void usage(void) __attribute__((noreturn)); |
40 | ||
41 | static void usage(void) | |
42 | { | |
e147161b SH |
43 | fprintf(stderr, |
44 | "Usage: ip rule { add | del } SELECTOR ACTION\n" | |
45 | " ip rule { flush | save | restore }\n" | |
46 | " ip rule [ list [ SELECTOR ]]\n" | |
47 | "SELECTOR := [ not ] [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ]\n" | |
48 | " [ iif STRING ] [ oif STRING ] [ pref NUMBER ] [ l3mdev ]\n" | |
82252cdc | 49 | " [ uidrange NUMBER-NUMBER ]\n" |
e147161b SH |
50 | "ACTION := [ table TABLE_ID ]\n" |
51 | " [ nat ADDRESS ]\n" | |
52 | " [ realms [SRCREALM/]DSTREALM ]\n" | |
53 | " [ goto NUMBER ]\n" | |
54 | " SUPPRESSOR\n" | |
55 | "SUPPRESSOR := [ suppress_prefixlength NUMBER ]\n" | |
56 | " [ suppress_ifgroup DEVGROUP ]\n" | |
57 | "TABLE_ID := [ local | main | default | NUMBER ]\n"); | |
aba5acdf SH |
58 | exit(-1); |
59 | } | |
60 | ||
ca89c521 HL |
61 | static struct |
62 | { | |
63 | int not; | |
64 | int l3mdev; | |
82252cdc | 65 | int iifmask, oifmask, uidrange; |
ca89c521 HL |
66 | unsigned int tb; |
67 | unsigned int tos, tosmask; | |
68 | unsigned int pref, prefmask; | |
69 | unsigned int fwmark, fwmask; | |
70 | char iif[IFNAMSIZ]; | |
71 | char oif[IFNAMSIZ]; | |
82252cdc | 72 | struct fib_rule_uid_range range; |
ca89c521 HL |
73 | inet_prefix src; |
74 | inet_prefix dst; | |
75 | } filter; | |
76 | ||
77 | static bool filter_nlmsg(struct nlmsghdr *n, struct rtattr **tb, int host_len) | |
78 | { | |
79 | struct rtmsg *r = NLMSG_DATA(n); | |
80 | inet_prefix src = { .family = r->rtm_family }; | |
81 | inet_prefix dst = { .family = r->rtm_family }; | |
82 | __u32 table; | |
83 | ||
84 | if (preferred_family != AF_UNSPEC && r->rtm_family != preferred_family) | |
85 | return false; | |
86 | ||
87 | if (filter.prefmask && | |
88 | filter.pref ^ (tb[FRA_PRIORITY] ? rta_getattr_u32(tb[FRA_PRIORITY]) : 0)) | |
89 | return false; | |
90 | if (filter.not && !(r->rtm_flags & FIB_RULE_INVERT)) | |
91 | return false; | |
92 | ||
93 | if (filter.src.family) { | |
94 | if (tb[FRA_SRC]) { | |
95 | memcpy(&src.data, RTA_DATA(tb[FRA_SRC]), | |
96 | (r->rtm_src_len + 7) / 8); | |
97 | } | |
98 | if (filter.src.family != r->rtm_family || | |
99 | filter.src.bitlen > r->rtm_src_len || | |
100 | inet_addr_match(&src, &filter.src, filter.src.bitlen)) | |
101 | return false; | |
102 | } | |
103 | ||
104 | if (filter.dst.family) { | |
105 | if (tb[FRA_DST]) { | |
106 | memcpy(&dst.data, RTA_DATA(tb[FRA_DST]), | |
107 | (r->rtm_dst_len + 7) / 8); | |
108 | } | |
109 | if (filter.dst.family != r->rtm_family || | |
110 | filter.dst.bitlen > r->rtm_dst_len || | |
111 | inet_addr_match(&dst, &filter.dst, filter.dst.bitlen)) | |
112 | return false; | |
113 | } | |
114 | ||
115 | if (filter.tosmask && filter.tos ^ r->rtm_tos) | |
116 | return false; | |
117 | ||
118 | if (filter.fwmark) { | |
119 | __u32 mark = 0; | |
e147161b | 120 | |
ca89c521 HL |
121 | if (tb[FRA_FWMARK]) |
122 | mark = rta_getattr_u32(tb[FRA_FWMARK]); | |
123 | if (filter.fwmark ^ mark) | |
124 | return false; | |
125 | } | |
126 | if (filter.fwmask) { | |
127 | __u32 mask = 0; | |
e147161b | 128 | |
ca89c521 HL |
129 | if (tb[FRA_FWMASK]) |
130 | mask = rta_getattr_u32(tb[FRA_FWMASK]); | |
131 | if (filter.fwmask ^ mask) | |
132 | return false; | |
133 | } | |
134 | ||
135 | if (filter.iifmask) { | |
136 | if (tb[FRA_IFNAME]) { | |
137 | if (strcmp(filter.iif, rta_getattr_str(tb[FRA_IFNAME])) != 0) | |
138 | return false; | |
139 | } else { | |
140 | return false; | |
141 | } | |
142 | } | |
143 | ||
144 | if (filter.oifmask) { | |
145 | if (tb[FRA_OIFNAME]) { | |
146 | if (strcmp(filter.oif, rta_getattr_str(tb[FRA_OIFNAME])) != 0) | |
147 | return false; | |
148 | } else { | |
149 | return false; | |
150 | } | |
151 | } | |
152 | ||
153 | if (filter.l3mdev && !(tb[FRA_L3MDEV] && rta_getattr_u8(tb[FRA_L3MDEV]))) | |
154 | return false; | |
155 | ||
82252cdc LC |
156 | if (filter.uidrange) { |
157 | struct fib_rule_uid_range *r = RTA_DATA(tb[FRA_UID_RANGE]); | |
158 | ||
159 | if (!tb[FRA_UID_RANGE] || | |
160 | r->start != filter.range.start || | |
161 | r->end != filter.range.end) | |
162 | return false; | |
163 | } | |
164 | ||
ca89c521 HL |
165 | table = rtm_get_table(r, tb); |
166 | if (filter.tb > 0 && filter.tb ^ table) | |
167 | return false; | |
168 | ||
169 | return true; | |
170 | } | |
171 | ||
98bde989 | 172 | int print_rule(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg) |
aba5acdf | 173 | { |
56f5daac | 174 | FILE *fp = (FILE *)arg; |
aba5acdf SH |
175 | struct rtmsg *r = NLMSG_DATA(n); |
176 | int len = n->nlmsg_len; | |
177 | int host_len = -1; | |
34e95647 | 178 | __u32 table; |
56f5daac | 179 | struct rtattr *tb[FRA_MAX+1]; |
d831cc7c | 180 | |
aba5acdf SH |
181 | SPRINT_BUF(b1); |
182 | ||
98bde989 | 183 | if (n->nlmsg_type != RTM_NEWRULE && n->nlmsg_type != RTM_DELRULE) |
aba5acdf SH |
184 | return 0; |
185 | ||
186 | len -= NLMSG_LENGTH(sizeof(*r)); | |
187 | if (len < 0) | |
188 | return -1; | |
189 | ||
ad1a12db | 190 | parse_rtattr(tb, FRA_MAX, RTM_RTA(r), len); |
aba5acdf | 191 | |
f3a2ddc1 | 192 | host_len = af_bit_len(r->rtm_family); |
aba5acdf | 193 | |
e147161b | 194 | if (!filter_nlmsg(n, tb, host_len)) |
ca89c521 HL |
195 | return 0; |
196 | ||
98bde989 TG |
197 | if (n->nlmsg_type == RTM_DELRULE) |
198 | fprintf(fp, "Deleted "); | |
199 | ||
ad1a12db | 200 | if (tb[FRA_PRIORITY]) |
d831cc7c SH |
201 | fprintf(fp, "%u:\t", |
202 | rta_getattr_u32(tb[FRA_PRIORITY])); | |
aba5acdf SH |
203 | else |
204 | fprintf(fp, "0:\t"); | |
205 | ||
3123a0cc TG |
206 | if (r->rtm_flags & FIB_RULE_INVERT) |
207 | fprintf(fp, "not "); | |
208 | ||
ad1a12db | 209 | if (tb[FRA_SRC]) { |
aba5acdf | 210 | if (r->rtm_src_len != host_len) { |
7faf1588 | 211 | fprintf(fp, "from %s/%u ", |
d831cc7c SH |
212 | rt_addr_n2a_rta(r->rtm_family, tb[FRA_SRC]), |
213 | r->rtm_src_len); | |
aba5acdf | 214 | } else { |
d49f934c | 215 | fprintf(fp, "from %s ", |
d831cc7c | 216 | format_host_rta(r->rtm_family, tb[FRA_SRC])); |
aba5acdf SH |
217 | } |
218 | } else if (r->rtm_src_len) { | |
219 | fprintf(fp, "from 0/%d ", r->rtm_src_len); | |
220 | } else { | |
221 | fprintf(fp, "from all "); | |
222 | } | |
223 | ||
ad1a12db | 224 | if (tb[FRA_DST]) { |
aba5acdf | 225 | if (r->rtm_dst_len != host_len) { |
7faf1588 | 226 | fprintf(fp, "to %s/%u ", |
d831cc7c SH |
227 | rt_addr_n2a_rta(r->rtm_family, tb[FRA_DST]), |
228 | r->rtm_dst_len); | |
aba5acdf | 229 | } else { |
d49f934c | 230 | fprintf(fp, "to %s ", |
d831cc7c | 231 | format_host_rta(r->rtm_family, tb[FRA_DST])); |
aba5acdf SH |
232 | } |
233 | } else if (r->rtm_dst_len) { | |
234 | fprintf(fp, "to 0/%d ", r->rtm_dst_len); | |
235 | } | |
236 | ||
237 | if (r->rtm_tos) { | |
238 | SPRINT_BUF(b1); | |
d831cc7c SH |
239 | fprintf(fp, "tos %s ", |
240 | rtnl_dsfield_n2a(r->rtm_tos, b1, sizeof(b1))); | |
aba5acdf | 241 | } |
ad1a12db | 242 | |
4806867a | 243 | if (tb[FRA_FWMARK] || tb[FRA_FWMASK]) { |
be7f286e PM |
244 | __u32 mark = 0, mask = 0; |
245 | ||
ad1a12db | 246 | if (tb[FRA_FWMARK]) |
ff24746c | 247 | mark = rta_getattr_u32(tb[FRA_FWMARK]); |
be7f286e | 248 | |
ad1a12db | 249 | if (tb[FRA_FWMASK] && |
ff24746c | 250 | (mask = rta_getattr_u32(tb[FRA_FWMASK])) != 0xFFFFFFFF) |
be7f286e | 251 | fprintf(fp, "fwmark 0x%x/0x%x ", mark, mask); |
81c61790 | 252 | else |
be7f286e | 253 | fprintf(fp, "fwmark 0x%x ", mark); |
aba5acdf SH |
254 | } |
255 | ||
ad1a12db | 256 | if (tb[FRA_IFNAME]) { |
ff24746c | 257 | fprintf(fp, "iif %s ", rta_getattr_str(tb[FRA_IFNAME])); |
85eae222 PM |
258 | if (r->rtm_flags & FIB_RULE_IIF_DETACHED) |
259 | fprintf(fp, "[detached] "); | |
260 | } | |
261 | ||
262 | if (tb[FRA_OIFNAME]) { | |
ff24746c | 263 | fprintf(fp, "oif %s ", rta_getattr_str(tb[FRA_OIFNAME])); |
85eae222 | 264 | if (r->rtm_flags & FIB_RULE_OIF_DETACHED) |
6b469cae | 265 | fprintf(fp, "[detached] "); |
aba5acdf SH |
266 | } |
267 | ||
8c92e122 DA |
268 | if (tb[FRA_L3MDEV]) { |
269 | if (rta_getattr_u8(tb[FRA_L3MDEV])) | |
270 | fprintf(fp, "lookup [l3mdev-table] "); | |
271 | } | |
272 | ||
82252cdc LC |
273 | if (tb[FRA_UID_RANGE]) { |
274 | struct fib_rule_uid_range *r = RTA_DATA(tb[FRA_UID_RANGE]); | |
275 | ||
276 | fprintf(fp, "uidrange %u-%u ", r->start, r->end); | |
277 | } | |
278 | ||
34e95647 | 279 | table = rtm_get_table(r, tb); |
b1d0525f | 280 | if (table) { |
d831cc7c SH |
281 | fprintf(fp, "lookup %s ", |
282 | rtnl_rttable_n2a(table, b1, sizeof(b1))); | |
aba5acdf | 283 | |
b1d0525f ST |
284 | if (tb[FRA_SUPPRESS_PREFIXLEN]) { |
285 | int pl = rta_getattr_u32(tb[FRA_SUPPRESS_PREFIXLEN]); | |
56f5daac | 286 | |
d831cc7c | 287 | if (pl != -1) |
b1d0525f | 288 | fprintf(fp, "suppress_prefixlength %d ", pl); |
b1d0525f ST |
289 | } |
290 | if (tb[FRA_SUPPRESS_IFGROUP]) { | |
291 | int group = rta_getattr_u32(tb[FRA_SUPPRESS_IFGROUP]); | |
56f5daac | 292 | |
b1d0525f ST |
293 | if (group != -1) { |
294 | SPRINT_BUF(b1); | |
d831cc7c SH |
295 | fprintf(fp, "suppress_ifgroup %s ", |
296 | rtnl_group_n2a(group, b1, sizeof(b1))); | |
b1d0525f ST |
297 | } |
298 | } | |
299 | } | |
300 | ||
ad1a12db | 301 | if (tb[FRA_FLOW]) { |
ff24746c | 302 | __u32 to = rta_getattr_u32(tb[FRA_FLOW]); |
aba5acdf | 303 | __u32 from = to>>16; |
56f5daac | 304 | |
aba5acdf SH |
305 | to &= 0xFFFF; |
306 | if (from) { | |
307 | fprintf(fp, "realms %s/", | |
308 | rtnl_rtrealm_n2a(from, b1, sizeof(b1))); | |
309 | } | |
310 | fprintf(fp, "%s ", | |
311 | rtnl_rtrealm_n2a(to, b1, sizeof(b1))); | |
312 | } | |
313 | ||
314 | if (r->rtm_type == RTN_NAT) { | |
315 | if (tb[RTA_GATEWAY]) { | |
ae665a52 | 316 | fprintf(fp, "map-to %s ", |
d831cc7c SH |
317 | format_host_rta(r->rtm_family, |
318 | tb[RTA_GATEWAY])); | |
aba5acdf SH |
319 | } else |
320 | fprintf(fp, "masquerade"); | |
6b469cae TG |
321 | } else if (r->rtm_type == FR_ACT_GOTO) { |
322 | fprintf(fp, "goto "); | |
323 | if (tb[FRA_GOTO]) | |
ff24746c | 324 | fprintf(fp, "%u", rta_getattr_u32(tb[FRA_GOTO])); |
6b469cae TG |
325 | else |
326 | fprintf(fp, "none"); | |
327 | if (r->rtm_flags & FIB_RULE_UNRESOLVED) | |
328 | fprintf(fp, " [unresolved]"); | |
329 | } else if (r->rtm_type == FR_ACT_NOP) | |
330 | fprintf(fp, "nop"); | |
331 | else if (r->rtm_type != RTN_UNICAST) | |
d831cc7c SH |
332 | fprintf(fp, "%s", |
333 | rtnl_rtntype_n2a(r->rtm_type, | |
334 | b1, sizeof(b1))); | |
aba5acdf SH |
335 | |
336 | fprintf(fp, "\n"); | |
337 | fflush(fp); | |
338 | return 0; | |
339 | } | |
340 | ||
2f4e171f KT |
341 | static __u32 rule_dump_magic = 0x71706986; |
342 | ||
343 | static int save_rule_prep(void) | |
344 | { | |
345 | int ret; | |
346 | ||
347 | if (isatty(STDOUT_FILENO)) { | |
348 | fprintf(stderr, "Not sending a binary stream to stdout\n"); | |
349 | return -1; | |
350 | } | |
351 | ||
352 | ret = write(STDOUT_FILENO, &rule_dump_magic, sizeof(rule_dump_magic)); | |
353 | if (ret != sizeof(rule_dump_magic)) { | |
354 | fprintf(stderr, "Can't write magic to dump file\n"); | |
355 | return -1; | |
356 | } | |
357 | ||
358 | return 0; | |
359 | } | |
360 | ||
d831cc7c SH |
361 | static int save_rule(const struct sockaddr_nl *who, |
362 | struct nlmsghdr *n, void *arg) | |
aba5acdf | 363 | { |
2f4e171f KT |
364 | int ret; |
365 | ||
366 | ret = write(STDOUT_FILENO, n, n->nlmsg_len); | |
367 | if ((ret > 0) && (ret != n->nlmsg_len)) { | |
368 | fprintf(stderr, "Short write while saving nlmsg\n"); | |
369 | ret = -EIO; | |
370 | } | |
371 | ||
372 | return ret == n->nlmsg_len ? 0 : ret; | |
373 | } | |
374 | ||
cb294a1d HL |
375 | static int flush_rule(const struct sockaddr_nl *who, struct nlmsghdr *n, |
376 | void *arg) | |
377 | { | |
378 | struct rtnl_handle rth2; | |
379 | struct rtmsg *r = NLMSG_DATA(n); | |
380 | int len = n->nlmsg_len; | |
381 | struct rtattr *tb[FRA_MAX+1]; | |
382 | ||
383 | len -= NLMSG_LENGTH(sizeof(*r)); | |
384 | if (len < 0) | |
385 | return -1; | |
386 | ||
387 | parse_rtattr(tb, FRA_MAX, RTM_RTA(r), len); | |
388 | ||
389 | if (tb[FRA_PRIORITY]) { | |
390 | n->nlmsg_type = RTM_DELRULE; | |
391 | n->nlmsg_flags = NLM_F_REQUEST; | |
392 | ||
393 | if (rtnl_open(&rth2, 0) < 0) | |
394 | return -1; | |
395 | ||
396 | if (rtnl_talk(&rth2, n, NULL, 0) < 0) | |
397 | return -2; | |
398 | ||
399 | rtnl_close(&rth2); | |
400 | } | |
401 | ||
402 | return 0; | |
403 | } | |
404 | ||
405 | static int iprule_list_flush_or_save(int argc, char **argv, int action) | |
2f4e171f | 406 | { |
cb294a1d | 407 | rtnl_filter_t filter_fn; |
aba5acdf SH |
408 | int af = preferred_family; |
409 | ||
410 | if (af == AF_UNSPEC) | |
411 | af = AF_INET; | |
412 | ||
ca89c521 HL |
413 | if (action != IPRULE_LIST && argc > 0) { |
414 | fprintf(stderr, "\"ip rule %s\" does not take any arguments.\n", | |
415 | action == IPRULE_SAVE ? "save" : "flush"); | |
aba5acdf SH |
416 | return -1; |
417 | } | |
418 | ||
cb294a1d HL |
419 | switch (action) { |
420 | case IPRULE_SAVE: | |
2f4e171f KT |
421 | if (save_rule_prep()) |
422 | return -1; | |
cb294a1d HL |
423 | filter_fn = save_rule; |
424 | break; | |
425 | case IPRULE_FLUSH: | |
426 | filter_fn = flush_rule; | |
427 | break; | |
428 | default: | |
429 | filter_fn = print_rule; | |
2f4e171f KT |
430 | } |
431 | ||
ca89c521 HL |
432 | memset(&filter, 0, sizeof(filter)); |
433 | ||
434 | while (argc > 0) { | |
435 | if (matches(*argv, "preference") == 0 || | |
436 | matches(*argv, "order") == 0 || | |
437 | matches(*argv, "priority") == 0) { | |
438 | __u32 pref; | |
e147161b | 439 | |
ca89c521 HL |
440 | NEXT_ARG(); |
441 | if (get_u32(&pref, *argv, 0)) | |
442 | invarg("preference value is invalid\n", *argv); | |
443 | filter.pref = pref; | |
444 | filter.prefmask = 1; | |
445 | } else if (strcmp(*argv, "not") == 0) { | |
446 | filter.not = 1; | |
447 | } else if (strcmp(*argv, "tos") == 0) { | |
448 | __u32 tos; | |
e147161b | 449 | |
ca89c521 HL |
450 | NEXT_ARG(); |
451 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
452 | invarg("TOS value is invalid\n", *argv); | |
453 | filter.tos = tos; | |
454 | filter.tosmask = 1; | |
455 | } else if (strcmp(*argv, "fwmark") == 0) { | |
456 | char *slash; | |
457 | __u32 fwmark, fwmask; | |
e147161b | 458 | |
ca89c521 HL |
459 | NEXT_ARG(); |
460 | slash = strchr(*argv, '/'); | |
461 | if (slash != NULL) | |
462 | *slash = '\0'; | |
463 | if (get_u32(&fwmark, *argv, 0)) | |
464 | invarg("fwmark value is invalid\n", *argv); | |
465 | filter.fwmark = fwmark; | |
466 | if (slash) { | |
467 | if (get_u32(&fwmask, slash+1, 0)) | |
468 | invarg("fwmask value is invalid\n", | |
469 | slash+1); | |
470 | filter.fwmask = fwmask; | |
471 | } | |
472 | } else if (strcmp(*argv, "dev") == 0 || | |
473 | strcmp(*argv, "iif") == 0) { | |
474 | NEXT_ARG(); | |
625df645 PS |
475 | if (get_ifname(filter.iif, *argv)) |
476 | invarg("\"iif\"/\"dev\" not a valid ifname", *argv); | |
ca89c521 HL |
477 | filter.iifmask = 1; |
478 | } else if (strcmp(*argv, "oif") == 0) { | |
479 | NEXT_ARG(); | |
625df645 PS |
480 | if (get_ifname(filter.oif, *argv)) |
481 | invarg("\"oif\" not a valid ifname", *argv); | |
ca89c521 HL |
482 | filter.oifmask = 1; |
483 | } else if (strcmp(*argv, "l3mdev") == 0) { | |
484 | filter.l3mdev = 1; | |
82252cdc LC |
485 | } else if (strcmp(*argv, "uidrange") == 0) { |
486 | NEXT_ARG(); | |
487 | filter.uidrange = 1; | |
488 | if (sscanf(*argv, "%u-%u", | |
489 | &filter.range.start, | |
490 | &filter.range.end) != 2) | |
491 | invarg("invalid UID range\n", *argv); | |
492 | ||
ca89c521 | 493 | } else if (matches(*argv, "lookup") == 0 || |
e147161b | 494 | matches(*argv, "table") == 0) { |
ca89c521 | 495 | __u32 tid; |
e147161b | 496 | |
ca89c521 HL |
497 | NEXT_ARG(); |
498 | if (rtnl_rttable_a2n(&tid, *argv)) | |
499 | invarg("table id value is invalid\n", *argv); | |
500 | filter.tb = tid; | |
501 | } else if (matches(*argv, "from") == 0 || | |
502 | matches(*argv, "src") == 0) { | |
503 | NEXT_ARG(); | |
504 | get_prefix(&filter.src, *argv, af); | |
505 | } else { | |
506 | if (matches(*argv, "dst") == 0 || | |
507 | matches(*argv, "to") == 0) { | |
508 | NEXT_ARG(); | |
509 | } | |
510 | get_prefix(&filter.dst, *argv, af); | |
511 | } | |
512 | argc--; argv++; | |
513 | } | |
514 | ||
aba5acdf SH |
515 | if (rtnl_wilddump_request(&rth, af, RTM_GETRULE) < 0) { |
516 | perror("Cannot send dump request"); | |
517 | return 1; | |
518 | } | |
519 | ||
cb294a1d | 520 | if (rtnl_dump_filter(&rth, filter_fn, stdout) < 0) { |
aba5acdf SH |
521 | fprintf(stderr, "Dump terminated\n"); |
522 | return 1; | |
523 | } | |
524 | ||
525 | return 0; | |
526 | } | |
527 | ||
2f4e171f KT |
528 | static int rule_dump_check_magic(void) |
529 | { | |
530 | int ret; | |
531 | __u32 magic = 0; | |
532 | ||
533 | if (isatty(STDIN_FILENO)) { | |
534 | fprintf(stderr, "Can't restore rule dump from a terminal\n"); | |
535 | return -1; | |
536 | } | |
537 | ||
538 | ret = fread(&magic, sizeof(magic), 1, stdin); | |
539 | if (magic != rule_dump_magic) { | |
d831cc7c SH |
540 | fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", |
541 | ret, magic); | |
2f4e171f KT |
542 | return -1; |
543 | } | |
544 | ||
545 | return 0; | |
546 | } | |
547 | ||
548 | static int restore_handler(const struct sockaddr_nl *nl, | |
549 | struct rtnl_ctrl_data *ctrl, | |
550 | struct nlmsghdr *n, void *arg) | |
551 | { | |
552 | int ret; | |
553 | ||
554 | n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK; | |
555 | ||
556 | ll_init_map(&rth); | |
557 | ||
558 | ret = rtnl_talk(&rth, n, n, sizeof(*n)); | |
559 | if ((ret < 0) && (errno == EEXIST)) | |
560 | ret = 0; | |
561 | ||
562 | return ret; | |
563 | } | |
564 | ||
565 | ||
566 | static int iprule_restore(void) | |
567 | { | |
568 | if (rule_dump_check_magic()) | |
569 | exit(-1); | |
570 | ||
571 | exit(rtnl_from_file(stdin, &restore_handler, NULL)); | |
572 | } | |
aba5acdf | 573 | |
50772dc5 | 574 | static int iprule_modify(int cmd, int argc, char **argv) |
aba5acdf | 575 | { |
8c92e122 | 576 | int l3mdev_rule = 0; |
aba5acdf | 577 | int table_ok = 0; |
8c92e122 | 578 | __u32 tid = 0; |
aba5acdf | 579 | struct { |
4806867a SH |
580 | struct nlmsghdr n; |
581 | struct rtmsg r; | |
56f5daac | 582 | char buf[1024]; |
d17b136f PS |
583 | } req = { |
584 | .n.nlmsg_type = cmd, | |
585 | .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg)), | |
586 | .n.nlmsg_flags = NLM_F_REQUEST, | |
587 | .r.rtm_family = preferred_family, | |
588 | .r.rtm_protocol = RTPROT_BOOT, | |
589 | .r.rtm_scope = RT_SCOPE_UNIVERSE, | |
590 | .r.rtm_type = RTN_UNSPEC, | |
591 | }; | |
aba5acdf SH |
592 | |
593 | if (cmd == RTM_NEWRULE) { | |
594 | req.n.nlmsg_flags |= NLM_F_CREATE|NLM_F_EXCL; | |
595 | req.r.rtm_type = RTN_UNICAST; | |
596 | } | |
597 | ||
67a990b8 AJM |
598 | if (cmd == RTM_DELRULE && argc == 0) { |
599 | fprintf(stderr, "\"ip rule del\" requires arguments.\n"); | |
600 | return -1; | |
601 | } | |
602 | ||
aba5acdf | 603 | while (argc > 0) { |
3123a0cc TG |
604 | if (strcmp(*argv, "not") == 0) { |
605 | req.r.rtm_flags |= FIB_RULE_INVERT; | |
606 | } else if (strcmp(*argv, "from") == 0) { | |
aba5acdf | 607 | inet_prefix dst; |
56f5daac | 608 | |
aba5acdf SH |
609 | NEXT_ARG(); |
610 | get_prefix(&dst, *argv, req.r.rtm_family); | |
611 | req.r.rtm_src_len = dst.bitlen; | |
d831cc7c SH |
612 | addattr_l(&req.n, sizeof(req), FRA_SRC, |
613 | &dst.data, dst.bytelen); | |
aba5acdf SH |
614 | } else if (strcmp(*argv, "to") == 0) { |
615 | inet_prefix dst; | |
56f5daac | 616 | |
aba5acdf SH |
617 | NEXT_ARG(); |
618 | get_prefix(&dst, *argv, req.r.rtm_family); | |
619 | req.r.rtm_dst_len = dst.bitlen; | |
d831cc7c SH |
620 | addattr_l(&req.n, sizeof(req), FRA_DST, |
621 | &dst.data, dst.bytelen); | |
aba5acdf SH |
622 | } else if (matches(*argv, "preference") == 0 || |
623 | matches(*argv, "order") == 0 || | |
624 | matches(*argv, "priority") == 0) { | |
625 | __u32 pref; | |
56f5daac | 626 | |
aba5acdf SH |
627 | NEXT_ARG(); |
628 | if (get_u32(&pref, *argv, 0)) | |
629 | invarg("preference value is invalid\n", *argv); | |
ad1a12db | 630 | addattr32(&req.n, sizeof(req), FRA_PRIORITY, pref); |
dec01609 AH |
631 | } else if (strcmp(*argv, "tos") == 0 || |
632 | matches(*argv, "dsfield") == 0) { | |
aba5acdf | 633 | __u32 tos; |
56f5daac | 634 | |
aba5acdf SH |
635 | NEXT_ARG(); |
636 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
637 | invarg("TOS value is invalid\n", *argv); | |
638 | req.r.rtm_tos = tos; | |
639 | } else if (strcmp(*argv, "fwmark") == 0) { | |
be7f286e PM |
640 | char *slash; |
641 | __u32 fwmark, fwmask; | |
56f5daac | 642 | |
aba5acdf | 643 | NEXT_ARG(); |
d831cc7c SH |
644 | |
645 | slash = strchr(*argv, '/'); | |
646 | if (slash != NULL) | |
be7f286e | 647 | *slash = '\0'; |
4fb466f9 | 648 | if (get_u32(&fwmark, *argv, 0)) |
aba5acdf | 649 | invarg("fwmark value is invalid\n", *argv); |
ad1a12db | 650 | addattr32(&req.n, sizeof(req), FRA_FWMARK, fwmark); |
be7f286e PM |
651 | if (slash) { |
652 | if (get_u32(&fwmask, slash+1, 0)) | |
d831cc7c SH |
653 | invarg("fwmask value is invalid\n", |
654 | slash+1); | |
655 | addattr32(&req.n, sizeof(req), | |
656 | FRA_FWMASK, fwmask); | |
be7f286e | 657 | } |
aba5acdf SH |
658 | } else if (matches(*argv, "realms") == 0) { |
659 | __u32 realm; | |
56f5daac | 660 | |
aba5acdf | 661 | NEXT_ARG(); |
d583e88e | 662 | if (get_rt_realms_or_raw(&realm, *argv)) |
aba5acdf | 663 | invarg("invalid realms\n", *argv); |
ad1a12db | 664 | addattr32(&req.n, sizeof(req), FRA_FLOW, realm); |
aba5acdf SH |
665 | } else if (matches(*argv, "table") == 0 || |
666 | strcmp(*argv, "lookup") == 0) { | |
aba5acdf SH |
667 | NEXT_ARG(); |
668 | if (rtnl_rttable_a2n(&tid, *argv)) | |
669 | invarg("invalid table ID\n", *argv); | |
34e95647 PM |
670 | if (tid < 256) |
671 | req.r.rtm_table = tid; | |
672 | else { | |
673 | req.r.rtm_table = RT_TABLE_UNSPEC; | |
ad1a12db | 674 | addattr32(&req.n, sizeof(req), FRA_TABLE, tid); |
34e95647 | 675 | } |
aba5acdf | 676 | table_ok = 1; |
b1d0525f ST |
677 | } else if (matches(*argv, "suppress_prefixlength") == 0 || |
678 | strcmp(*argv, "sup_pl") == 0) { | |
679 | int pl; | |
56f5daac | 680 | |
b1d0525f ST |
681 | NEXT_ARG(); |
682 | if (get_s32(&pl, *argv, 0) || pl < 0) | |
d831cc7c SH |
683 | invarg("suppress_prefixlength value is invalid\n", |
684 | *argv); | |
685 | addattr32(&req.n, sizeof(req), | |
686 | FRA_SUPPRESS_PREFIXLEN, pl); | |
b1d0525f ST |
687 | } else if (matches(*argv, "suppress_ifgroup") == 0 || |
688 | strcmp(*argv, "sup_group") == 0) { | |
689 | NEXT_ARG(); | |
690 | int group; | |
56f5daac | 691 | |
b1d0525f | 692 | if (rtnl_group_a2n(&group, *argv)) |
d831cc7c SH |
693 | invarg("Invalid \"suppress_ifgroup\" value\n", |
694 | *argv); | |
695 | addattr32(&req.n, sizeof(req), | |
696 | FRA_SUPPRESS_IFGROUP, group); | |
aba5acdf SH |
697 | } else if (strcmp(*argv, "dev") == 0 || |
698 | strcmp(*argv, "iif") == 0) { | |
699 | NEXT_ARG(); | |
625df645 PS |
700 | if (check_ifname(*argv)) |
701 | invarg("\"iif\"/\"dev\" not a valid ifname", *argv); | |
d831cc7c SH |
702 | addattr_l(&req.n, sizeof(req), FRA_IFNAME, |
703 | *argv, strlen(*argv)+1); | |
85eae222 PM |
704 | } else if (strcmp(*argv, "oif") == 0) { |
705 | NEXT_ARG(); | |
625df645 PS |
706 | if (check_ifname(*argv)) |
707 | invarg("\"oif\" not a valid ifname", *argv); | |
d831cc7c SH |
708 | addattr_l(&req.n, sizeof(req), FRA_OIFNAME, |
709 | *argv, strlen(*argv)+1); | |
8c92e122 DA |
710 | } else if (strcmp(*argv, "l3mdev") == 0) { |
711 | addattr8(&req.n, sizeof(req), FRA_L3MDEV, 1); | |
712 | table_ok = 1; | |
713 | l3mdev_rule = 1; | |
82252cdc LC |
714 | } else if (strcmp(*argv, "uidrange") == 0) { |
715 | struct fib_rule_uid_range r; | |
716 | ||
717 | NEXT_ARG(); | |
718 | if (sscanf(*argv, "%u-%u", &r.start, &r.end) != 2) | |
719 | invarg("invalid UID range\n", *argv); | |
720 | addattr_l(&req.n, sizeof(req), FRA_UID_RANGE, &r, | |
721 | sizeof(r)); | |
aba5acdf SH |
722 | } else if (strcmp(*argv, "nat") == 0 || |
723 | matches(*argv, "map-to") == 0) { | |
724 | NEXT_ARG(); | |
526afe40 | 725 | fprintf(stderr, "Warning: route NAT is deprecated\n"); |
d831cc7c SH |
726 | addattr32(&req.n, sizeof(req), RTA_GATEWAY, |
727 | get_addr32(*argv)); | |
aba5acdf SH |
728 | req.r.rtm_type = RTN_NAT; |
729 | } else { | |
730 | int type; | |
731 | ||
d831cc7c | 732 | if (strcmp(*argv, "type") == 0) |
aba5acdf | 733 | NEXT_ARG(); |
d831cc7c | 734 | |
aba5acdf SH |
735 | if (matches(*argv, "help") == 0) |
736 | usage(); | |
6b469cae TG |
737 | else if (matches(*argv, "goto") == 0) { |
738 | __u32 target; | |
56f5daac | 739 | |
6b469cae TG |
740 | type = FR_ACT_GOTO; |
741 | NEXT_ARG(); | |
742 | if (get_u32(&target, *argv, 0)) | |
743 | invarg("invalid target\n", *argv); | |
d831cc7c SH |
744 | addattr32(&req.n, sizeof(req), |
745 | FRA_GOTO, target); | |
6b469cae TG |
746 | } else if (matches(*argv, "nop") == 0) |
747 | type = FR_ACT_NOP; | |
748 | else if (rtnl_rtntype_a2n(&type, *argv)) | |
aba5acdf SH |
749 | invarg("Failed to parse rule type", *argv); |
750 | req.r.rtm_type = type; | |
6b469cae | 751 | table_ok = 1; |
aba5acdf SH |
752 | } |
753 | argc--; | |
754 | argv++; | |
755 | } | |
756 | ||
8c92e122 DA |
757 | if (l3mdev_rule && tid != 0) { |
758 | fprintf(stderr, | |
759 | "table can not be specified for l3mdev rules\n"); | |
760 | return -EINVAL; | |
761 | } | |
762 | ||
aba5acdf SH |
763 | if (req.r.rtm_family == AF_UNSPEC) |
764 | req.r.rtm_family = AF_INET; | |
765 | ||
766 | if (!table_ok && cmd == RTM_NEWRULE) | |
767 | req.r.rtm_table = RT_TABLE_MAIN; | |
768 | ||
c079e121 | 769 | if (rtnl_talk(&rth, &req.n, NULL, 0) < 0) |
076ae708 | 770 | return -2; |
aba5acdf SH |
771 | |
772 | return 0; | |
773 | } | |
774 | ||
775 | int do_iprule(int argc, char **argv) | |
776 | { | |
777 | if (argc < 1) { | |
cb294a1d | 778 | return iprule_list_flush_or_save(0, NULL, IPRULE_LIST); |
aba5acdf SH |
779 | } else if (matches(argv[0], "list") == 0 || |
780 | matches(argv[0], "lst") == 0 || | |
781 | matches(argv[0], "show") == 0) { | |
cb294a1d | 782 | return iprule_list_flush_or_save(argc-1, argv+1, IPRULE_LIST); |
2f4e171f | 783 | } else if (matches(argv[0], "save") == 0) { |
cb294a1d | 784 | return iprule_list_flush_or_save(argc-1, argv+1, IPRULE_SAVE); |
2f4e171f KT |
785 | } else if (matches(argv[0], "restore") == 0) { |
786 | return iprule_restore(); | |
aba5acdf SH |
787 | } else if (matches(argv[0], "add") == 0) { |
788 | return iprule_modify(RTM_NEWRULE, argc-1, argv+1); | |
789 | } else if (matches(argv[0], "delete") == 0) { | |
790 | return iprule_modify(RTM_DELRULE, argc-1, argv+1); | |
50772dc5 | 791 | } else if (matches(argv[0], "flush") == 0) { |
cb294a1d | 792 | return iprule_list_flush_or_save(argc-1, argv+1, IPRULE_FLUSH); |
aba5acdf SH |
793 | } else if (matches(argv[0], "help") == 0) |
794 | usage(); | |
795 | ||
d831cc7c SH |
796 | fprintf(stderr, |
797 | "Command \"%s\" is unknown, try \"ip rule help\".\n", *argv); | |
aba5acdf SH |
798 | exit(-1); |
799 | } | |
800 | ||
b6c8e808 PM |
801 | int do_multirule(int argc, char **argv) |
802 | { | |
803 | switch (preferred_family) { | |
804 | case AF_UNSPEC: | |
805 | case AF_INET: | |
806 | preferred_family = RTNL_FAMILY_IPMR; | |
807 | break; | |
808 | case AF_INET6: | |
809 | preferred_family = RTNL_FAMILY_IP6MR; | |
810 | break; | |
0d1c9b57 BG |
811 | case RTNL_FAMILY_IPMR: |
812 | case RTNL_FAMILY_IP6MR: | |
813 | break; | |
b6c8e808 | 814 | default: |
d831cc7c SH |
815 | fprintf(stderr, |
816 | "Multicast rules are only supported for IPv4/IPv6, was: %i\n", | |
0d1c9b57 | 817 | preferred_family); |
b6c8e808 PM |
818 | exit(-1); |
819 | } | |
820 | ||
821 | return do_iprule(argc, argv); | |
822 | } |