]>
Commit | Line | Data |
---|---|---|
aba5acdf SH |
1 | /* |
2 | * iprule.c "ip rule". | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or | |
5 | * modify it under the terms of the GNU General Public License | |
6 | * as published by the Free Software Foundation; either version | |
7 | * 2 of the License, or (at your option) any later version. | |
8 | * | |
9 | * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> | |
10 | * | |
aba5acdf SH |
11 | */ |
12 | ||
13 | #include <stdio.h> | |
14 | #include <stdlib.h> | |
15 | #include <unistd.h> | |
16 | #include <syslog.h> | |
17 | #include <fcntl.h> | |
18 | #include <sys/socket.h> | |
19 | #include <netinet/in.h> | |
20 | #include <netinet/ip.h> | |
21 | #include <arpa/inet.h> | |
22 | #include <string.h> | |
3123a0cc | 23 | #include <linux/fib_rules.h> |
2f4e171f | 24 | #include <errno.h> |
aba5acdf SH |
25 | |
26 | #include "rt_names.h" | |
27 | #include "utils.h" | |
34e95647 | 28 | #include "ip_common.h" |
aba5acdf | 29 | |
351efcde SH |
30 | extern struct rtnl_handle rth; |
31 | ||
aba5acdf SH |
32 | static void usage(void) __attribute__((noreturn)); |
33 | ||
34 | static void usage(void) | |
35 | { | |
67eedcd9 PS |
36 | fprintf(stderr, "Usage: ip rule { add | del } SELECTOR ACTION\n"); |
37 | fprintf(stderr, " ip rule { flush | save | restore }\n"); | |
38 | fprintf(stderr, " ip rule [ list ]\n"); | |
be7f286e | 39 | fprintf(stderr, "SELECTOR := [ not ] [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ]\n"); |
85eae222 | 40 | fprintf(stderr, " [ iif STRING ] [ oif STRING ] [ pref NUMBER ]\n"); |
526afe40 | 41 | fprintf(stderr, "ACTION := [ table TABLE_ID ]\n"); |
20f2af78 | 42 | fprintf(stderr, " [ nat ADDRESS ]\n"); |
aba5acdf | 43 | fprintf(stderr, " [ realms [SRCREALM/]DSTREALM ]\n"); |
6b469cae | 44 | fprintf(stderr, " [ goto NUMBER ]\n"); |
b1d0525f ST |
45 | fprintf(stderr, " SUPPRESSOR\n"); |
46 | fprintf(stderr, "SUPPRESSOR := [ suppress_prefixlength NUMBER ]\n"); | |
47 | fprintf(stderr, " [ suppress_ifgroup DEVGROUP ]\n"); | |
aba5acdf SH |
48 | fprintf(stderr, "TABLE_ID := [ local | main | default | NUMBER ]\n"); |
49 | exit(-1); | |
50 | } | |
51 | ||
98bde989 | 52 | int print_rule(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg) |
aba5acdf | 53 | { |
56f5daac | 54 | FILE *fp = (FILE *)arg; |
aba5acdf SH |
55 | struct rtmsg *r = NLMSG_DATA(n); |
56 | int len = n->nlmsg_len; | |
57 | int host_len = -1; | |
34e95647 | 58 | __u32 table; |
56f5daac | 59 | struct rtattr *tb[FRA_MAX+1]; |
aba5acdf SH |
60 | SPRINT_BUF(b1); |
61 | ||
98bde989 | 62 | if (n->nlmsg_type != RTM_NEWRULE && n->nlmsg_type != RTM_DELRULE) |
aba5acdf SH |
63 | return 0; |
64 | ||
65 | len -= NLMSG_LENGTH(sizeof(*r)); | |
66 | if (len < 0) | |
67 | return -1; | |
68 | ||
ad1a12db | 69 | parse_rtattr(tb, FRA_MAX, RTM_RTA(r), len); |
aba5acdf | 70 | |
f3a2ddc1 | 71 | host_len = af_bit_len(r->rtm_family); |
aba5acdf | 72 | |
98bde989 TG |
73 | if (n->nlmsg_type == RTM_DELRULE) |
74 | fprintf(fp, "Deleted "); | |
75 | ||
ad1a12db | 76 | if (tb[FRA_PRIORITY]) |
56f5daac | 77 | fprintf(fp, "%u:\t", *(unsigned *)RTA_DATA(tb[FRA_PRIORITY])); |
aba5acdf SH |
78 | else |
79 | fprintf(fp, "0:\t"); | |
80 | ||
3123a0cc TG |
81 | if (r->rtm_flags & FIB_RULE_INVERT) |
82 | fprintf(fp, "not "); | |
83 | ||
ad1a12db | 84 | if (tb[FRA_SRC]) { |
aba5acdf | 85 | if (r->rtm_src_len != host_len) { |
7faf1588 PS |
86 | fprintf(fp, "from %s/%u ", |
87 | rt_addr_n2a_rta(r->rtm_family, tb[FRA_SRC]), | |
88 | r->rtm_src_len); | |
aba5acdf | 89 | } else { |
d49f934c PS |
90 | fprintf(fp, "from %s ", |
91 | format_host_rta(r->rtm_family, tb[FRA_SRC])); | |
aba5acdf SH |
92 | } |
93 | } else if (r->rtm_src_len) { | |
94 | fprintf(fp, "from 0/%d ", r->rtm_src_len); | |
95 | } else { | |
96 | fprintf(fp, "from all "); | |
97 | } | |
98 | ||
ad1a12db | 99 | if (tb[FRA_DST]) { |
aba5acdf | 100 | if (r->rtm_dst_len != host_len) { |
7faf1588 PS |
101 | fprintf(fp, "to %s/%u ", |
102 | rt_addr_n2a_rta(r->rtm_family, tb[FRA_DST]), | |
103 | r->rtm_dst_len); | |
aba5acdf | 104 | } else { |
d49f934c PS |
105 | fprintf(fp, "to %s ", |
106 | format_host_rta(r->rtm_family, tb[FRA_DST])); | |
aba5acdf SH |
107 | } |
108 | } else if (r->rtm_dst_len) { | |
109 | fprintf(fp, "to 0/%d ", r->rtm_dst_len); | |
110 | } | |
111 | ||
112 | if (r->rtm_tos) { | |
113 | SPRINT_BUF(b1); | |
114 | fprintf(fp, "tos %s ", rtnl_dsfield_n2a(r->rtm_tos, b1, sizeof(b1))); | |
115 | } | |
ad1a12db | 116 | |
4806867a | 117 | if (tb[FRA_FWMARK] || tb[FRA_FWMASK]) { |
be7f286e PM |
118 | __u32 mark = 0, mask = 0; |
119 | ||
ad1a12db | 120 | if (tb[FRA_FWMARK]) |
ff24746c | 121 | mark = rta_getattr_u32(tb[FRA_FWMARK]); |
be7f286e | 122 | |
ad1a12db | 123 | if (tb[FRA_FWMASK] && |
ff24746c | 124 | (mask = rta_getattr_u32(tb[FRA_FWMASK])) != 0xFFFFFFFF) |
be7f286e | 125 | fprintf(fp, "fwmark 0x%x/0x%x ", mark, mask); |
81c61790 | 126 | else |
be7f286e | 127 | fprintf(fp, "fwmark 0x%x ", mark); |
aba5acdf SH |
128 | } |
129 | ||
ad1a12db | 130 | if (tb[FRA_IFNAME]) { |
ff24746c | 131 | fprintf(fp, "iif %s ", rta_getattr_str(tb[FRA_IFNAME])); |
85eae222 PM |
132 | if (r->rtm_flags & FIB_RULE_IIF_DETACHED) |
133 | fprintf(fp, "[detached] "); | |
134 | } | |
135 | ||
136 | if (tb[FRA_OIFNAME]) { | |
ff24746c | 137 | fprintf(fp, "oif %s ", rta_getattr_str(tb[FRA_OIFNAME])); |
85eae222 | 138 | if (r->rtm_flags & FIB_RULE_OIF_DETACHED) |
6b469cae | 139 | fprintf(fp, "[detached] "); |
aba5acdf SH |
140 | } |
141 | ||
34e95647 | 142 | table = rtm_get_table(r, tb); |
b1d0525f | 143 | if (table) { |
34e95647 | 144 | fprintf(fp, "lookup %s ", rtnl_rttable_n2a(table, b1, sizeof(b1))); |
aba5acdf | 145 | |
b1d0525f ST |
146 | if (tb[FRA_SUPPRESS_PREFIXLEN]) { |
147 | int pl = rta_getattr_u32(tb[FRA_SUPPRESS_PREFIXLEN]); | |
56f5daac | 148 | |
b1d0525f ST |
149 | if (pl != -1) { |
150 | fprintf(fp, "suppress_prefixlength %d ", pl); | |
151 | } | |
152 | } | |
153 | if (tb[FRA_SUPPRESS_IFGROUP]) { | |
154 | int group = rta_getattr_u32(tb[FRA_SUPPRESS_IFGROUP]); | |
56f5daac | 155 | |
b1d0525f ST |
156 | if (group != -1) { |
157 | SPRINT_BUF(b1); | |
158 | fprintf(fp, "suppress_ifgroup %s ", rtnl_group_n2a(group, b1, sizeof(b1))); | |
159 | } | |
160 | } | |
161 | } | |
162 | ||
ad1a12db | 163 | if (tb[FRA_FLOW]) { |
ff24746c | 164 | __u32 to = rta_getattr_u32(tb[FRA_FLOW]); |
aba5acdf | 165 | __u32 from = to>>16; |
56f5daac | 166 | |
aba5acdf SH |
167 | to &= 0xFFFF; |
168 | if (from) { | |
169 | fprintf(fp, "realms %s/", | |
170 | rtnl_rtrealm_n2a(from, b1, sizeof(b1))); | |
171 | } | |
172 | fprintf(fp, "%s ", | |
173 | rtnl_rtrealm_n2a(to, b1, sizeof(b1))); | |
174 | } | |
175 | ||
176 | if (r->rtm_type == RTN_NAT) { | |
177 | if (tb[RTA_GATEWAY]) { | |
ae665a52 | 178 | fprintf(fp, "map-to %s ", |
d49f934c PS |
179 | format_host_rta(r->rtm_family, |
180 | tb[RTA_GATEWAY])); | |
aba5acdf SH |
181 | } else |
182 | fprintf(fp, "masquerade"); | |
6b469cae TG |
183 | } else if (r->rtm_type == FR_ACT_GOTO) { |
184 | fprintf(fp, "goto "); | |
185 | if (tb[FRA_GOTO]) | |
ff24746c | 186 | fprintf(fp, "%u", rta_getattr_u32(tb[FRA_GOTO])); |
6b469cae TG |
187 | else |
188 | fprintf(fp, "none"); | |
189 | if (r->rtm_flags & FIB_RULE_UNRESOLVED) | |
190 | fprintf(fp, " [unresolved]"); | |
191 | } else if (r->rtm_type == FR_ACT_NOP) | |
192 | fprintf(fp, "nop"); | |
193 | else if (r->rtm_type != RTN_UNICAST) | |
aba5acdf SH |
194 | fprintf(fp, "%s", rtnl_rtntype_n2a(r->rtm_type, b1, sizeof(b1))); |
195 | ||
196 | fprintf(fp, "\n"); | |
197 | fflush(fp); | |
198 | return 0; | |
199 | } | |
200 | ||
2f4e171f KT |
201 | static __u32 rule_dump_magic = 0x71706986; |
202 | ||
203 | static int save_rule_prep(void) | |
204 | { | |
205 | int ret; | |
206 | ||
207 | if (isatty(STDOUT_FILENO)) { | |
208 | fprintf(stderr, "Not sending a binary stream to stdout\n"); | |
209 | return -1; | |
210 | } | |
211 | ||
212 | ret = write(STDOUT_FILENO, &rule_dump_magic, sizeof(rule_dump_magic)); | |
213 | if (ret != sizeof(rule_dump_magic)) { | |
214 | fprintf(stderr, "Can't write magic to dump file\n"); | |
215 | return -1; | |
216 | } | |
217 | ||
218 | return 0; | |
219 | } | |
220 | ||
221 | static int save_rule(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg) | |
aba5acdf | 222 | { |
2f4e171f KT |
223 | int ret; |
224 | ||
225 | ret = write(STDOUT_FILENO, n, n->nlmsg_len); | |
226 | if ((ret > 0) && (ret != n->nlmsg_len)) { | |
227 | fprintf(stderr, "Short write while saving nlmsg\n"); | |
228 | ret = -EIO; | |
229 | } | |
230 | ||
231 | return ret == n->nlmsg_len ? 0 : ret; | |
232 | } | |
233 | ||
234 | static int iprule_list_or_save(int argc, char **argv, int save) | |
235 | { | |
236 | rtnl_filter_t filter = print_rule; | |
aba5acdf SH |
237 | int af = preferred_family; |
238 | ||
239 | if (af == AF_UNSPEC) | |
240 | af = AF_INET; | |
241 | ||
242 | if (argc > 0) { | |
2f4e171f KT |
243 | fprintf(stderr, "\"ip rule %s\" does not take any arguments.\n", |
244 | save ? "save" : "show"); | |
aba5acdf SH |
245 | return -1; |
246 | } | |
247 | ||
2f4e171f KT |
248 | if (save) { |
249 | if (save_rule_prep()) | |
250 | return -1; | |
251 | filter = save_rule; | |
252 | } | |
253 | ||
aba5acdf SH |
254 | if (rtnl_wilddump_request(&rth, af, RTM_GETRULE) < 0) { |
255 | perror("Cannot send dump request"); | |
256 | return 1; | |
257 | } | |
258 | ||
2f4e171f | 259 | if (rtnl_dump_filter(&rth, filter, stdout) < 0) { |
aba5acdf SH |
260 | fprintf(stderr, "Dump terminated\n"); |
261 | return 1; | |
262 | } | |
263 | ||
264 | return 0; | |
265 | } | |
266 | ||
2f4e171f KT |
267 | static int rule_dump_check_magic(void) |
268 | { | |
269 | int ret; | |
270 | __u32 magic = 0; | |
271 | ||
272 | if (isatty(STDIN_FILENO)) { | |
273 | fprintf(stderr, "Can't restore rule dump from a terminal\n"); | |
274 | return -1; | |
275 | } | |
276 | ||
277 | ret = fread(&magic, sizeof(magic), 1, stdin); | |
278 | if (magic != rule_dump_magic) { | |
279 | fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic); | |
280 | return -1; | |
281 | } | |
282 | ||
283 | return 0; | |
284 | } | |
285 | ||
286 | static int restore_handler(const struct sockaddr_nl *nl, | |
287 | struct rtnl_ctrl_data *ctrl, | |
288 | struct nlmsghdr *n, void *arg) | |
289 | { | |
290 | int ret; | |
291 | ||
292 | n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK; | |
293 | ||
294 | ll_init_map(&rth); | |
295 | ||
296 | ret = rtnl_talk(&rth, n, n, sizeof(*n)); | |
297 | if ((ret < 0) && (errno == EEXIST)) | |
298 | ret = 0; | |
299 | ||
300 | return ret; | |
301 | } | |
302 | ||
303 | ||
304 | static int iprule_restore(void) | |
305 | { | |
306 | if (rule_dump_check_magic()) | |
307 | exit(-1); | |
308 | ||
309 | exit(rtnl_from_file(stdin, &restore_handler, NULL)); | |
310 | } | |
aba5acdf | 311 | |
50772dc5 | 312 | static int iprule_modify(int cmd, int argc, char **argv) |
aba5acdf SH |
313 | { |
314 | int table_ok = 0; | |
aba5acdf | 315 | struct { |
4806867a SH |
316 | struct nlmsghdr n; |
317 | struct rtmsg r; | |
56f5daac | 318 | char buf[1024]; |
aba5acdf SH |
319 | } req; |
320 | ||
321 | memset(&req, 0, sizeof(req)); | |
322 | ||
323 | req.n.nlmsg_type = cmd; | |
324 | req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg)); | |
325 | req.n.nlmsg_flags = NLM_F_REQUEST; | |
326 | req.r.rtm_family = preferred_family; | |
327 | req.r.rtm_protocol = RTPROT_BOOT; | |
328 | req.r.rtm_scope = RT_SCOPE_UNIVERSE; | |
329 | req.r.rtm_table = 0; | |
330 | req.r.rtm_type = RTN_UNSPEC; | |
3123a0cc | 331 | req.r.rtm_flags = 0; |
aba5acdf SH |
332 | |
333 | if (cmd == RTM_NEWRULE) { | |
334 | req.n.nlmsg_flags |= NLM_F_CREATE|NLM_F_EXCL; | |
335 | req.r.rtm_type = RTN_UNICAST; | |
336 | } | |
337 | ||
338 | while (argc > 0) { | |
3123a0cc TG |
339 | if (strcmp(*argv, "not") == 0) { |
340 | req.r.rtm_flags |= FIB_RULE_INVERT; | |
341 | } else if (strcmp(*argv, "from") == 0) { | |
aba5acdf | 342 | inet_prefix dst; |
56f5daac | 343 | |
aba5acdf SH |
344 | NEXT_ARG(); |
345 | get_prefix(&dst, *argv, req.r.rtm_family); | |
346 | req.r.rtm_src_len = dst.bitlen; | |
ad1a12db | 347 | addattr_l(&req.n, sizeof(req), FRA_SRC, &dst.data, dst.bytelen); |
aba5acdf SH |
348 | } else if (strcmp(*argv, "to") == 0) { |
349 | inet_prefix dst; | |
56f5daac | 350 | |
aba5acdf SH |
351 | NEXT_ARG(); |
352 | get_prefix(&dst, *argv, req.r.rtm_family); | |
353 | req.r.rtm_dst_len = dst.bitlen; | |
ad1a12db | 354 | addattr_l(&req.n, sizeof(req), FRA_DST, &dst.data, dst.bytelen); |
aba5acdf SH |
355 | } else if (matches(*argv, "preference") == 0 || |
356 | matches(*argv, "order") == 0 || | |
357 | matches(*argv, "priority") == 0) { | |
358 | __u32 pref; | |
56f5daac | 359 | |
aba5acdf SH |
360 | NEXT_ARG(); |
361 | if (get_u32(&pref, *argv, 0)) | |
362 | invarg("preference value is invalid\n", *argv); | |
ad1a12db | 363 | addattr32(&req.n, sizeof(req), FRA_PRIORITY, pref); |
dec01609 AH |
364 | } else if (strcmp(*argv, "tos") == 0 || |
365 | matches(*argv, "dsfield") == 0) { | |
aba5acdf | 366 | __u32 tos; |
56f5daac | 367 | |
aba5acdf SH |
368 | NEXT_ARG(); |
369 | if (rtnl_dsfield_a2n(&tos, *argv)) | |
370 | invarg("TOS value is invalid\n", *argv); | |
371 | req.r.rtm_tos = tos; | |
372 | } else if (strcmp(*argv, "fwmark") == 0) { | |
be7f286e PM |
373 | char *slash; |
374 | __u32 fwmark, fwmask; | |
56f5daac | 375 | |
aba5acdf | 376 | NEXT_ARG(); |
be7f286e PM |
377 | if ((slash = strchr(*argv, '/')) != NULL) |
378 | *slash = '\0'; | |
4fb466f9 | 379 | if (get_u32(&fwmark, *argv, 0)) |
aba5acdf | 380 | invarg("fwmark value is invalid\n", *argv); |
ad1a12db | 381 | addattr32(&req.n, sizeof(req), FRA_FWMARK, fwmark); |
be7f286e PM |
382 | if (slash) { |
383 | if (get_u32(&fwmask, slash+1, 0)) | |
384 | invarg("fwmask value is invalid\n", slash+1); | |
ad1a12db | 385 | addattr32(&req.n, sizeof(req), FRA_FWMASK, fwmask); |
be7f286e | 386 | } |
aba5acdf SH |
387 | } else if (matches(*argv, "realms") == 0) { |
388 | __u32 realm; | |
56f5daac | 389 | |
aba5acdf | 390 | NEXT_ARG(); |
d583e88e | 391 | if (get_rt_realms_or_raw(&realm, *argv)) |
aba5acdf | 392 | invarg("invalid realms\n", *argv); |
ad1a12db | 393 | addattr32(&req.n, sizeof(req), FRA_FLOW, realm); |
aba5acdf SH |
394 | } else if (matches(*argv, "table") == 0 || |
395 | strcmp(*argv, "lookup") == 0) { | |
f332d169 | 396 | __u32 tid; |
56f5daac | 397 | |
aba5acdf SH |
398 | NEXT_ARG(); |
399 | if (rtnl_rttable_a2n(&tid, *argv)) | |
400 | invarg("invalid table ID\n", *argv); | |
34e95647 PM |
401 | if (tid < 256) |
402 | req.r.rtm_table = tid; | |
403 | else { | |
404 | req.r.rtm_table = RT_TABLE_UNSPEC; | |
ad1a12db | 405 | addattr32(&req.n, sizeof(req), FRA_TABLE, tid); |
34e95647 | 406 | } |
aba5acdf | 407 | table_ok = 1; |
b1d0525f ST |
408 | } else if (matches(*argv, "suppress_prefixlength") == 0 || |
409 | strcmp(*argv, "sup_pl") == 0) { | |
410 | int pl; | |
56f5daac | 411 | |
b1d0525f ST |
412 | NEXT_ARG(); |
413 | if (get_s32(&pl, *argv, 0) || pl < 0) | |
414 | invarg("suppress_prefixlength value is invalid\n", *argv); | |
415 | addattr32(&req.n, sizeof(req), FRA_SUPPRESS_PREFIXLEN, pl); | |
416 | } else if (matches(*argv, "suppress_ifgroup") == 0 || | |
417 | strcmp(*argv, "sup_group") == 0) { | |
418 | NEXT_ARG(); | |
419 | int group; | |
56f5daac | 420 | |
b1d0525f ST |
421 | if (rtnl_group_a2n(&group, *argv)) |
422 | invarg("Invalid \"suppress_ifgroup\" value\n", *argv); | |
423 | addattr32(&req.n, sizeof(req), FRA_SUPPRESS_IFGROUP, group); | |
aba5acdf SH |
424 | } else if (strcmp(*argv, "dev") == 0 || |
425 | strcmp(*argv, "iif") == 0) { | |
426 | NEXT_ARG(); | |
ad1a12db | 427 | addattr_l(&req.n, sizeof(req), FRA_IFNAME, *argv, strlen(*argv)+1); |
85eae222 PM |
428 | } else if (strcmp(*argv, "oif") == 0) { |
429 | NEXT_ARG(); | |
430 | addattr_l(&req.n, sizeof(req), FRA_OIFNAME, *argv, strlen(*argv)+1); | |
aba5acdf SH |
431 | } else if (strcmp(*argv, "nat") == 0 || |
432 | matches(*argv, "map-to") == 0) { | |
433 | NEXT_ARG(); | |
526afe40 | 434 | fprintf(stderr, "Warning: route NAT is deprecated\n"); |
aba5acdf SH |
435 | addattr32(&req.n, sizeof(req), RTA_GATEWAY, get_addr32(*argv)); |
436 | req.r.rtm_type = RTN_NAT; | |
437 | } else { | |
438 | int type; | |
439 | ||
440 | if (strcmp(*argv, "type") == 0) { | |
441 | NEXT_ARG(); | |
442 | } | |
443 | if (matches(*argv, "help") == 0) | |
444 | usage(); | |
6b469cae TG |
445 | else if (matches(*argv, "goto") == 0) { |
446 | __u32 target; | |
56f5daac | 447 | |
6b469cae TG |
448 | type = FR_ACT_GOTO; |
449 | NEXT_ARG(); | |
450 | if (get_u32(&target, *argv, 0)) | |
451 | invarg("invalid target\n", *argv); | |
452 | addattr32(&req.n, sizeof(req), FRA_GOTO, target); | |
453 | } else if (matches(*argv, "nop") == 0) | |
454 | type = FR_ACT_NOP; | |
455 | else if (rtnl_rtntype_a2n(&type, *argv)) | |
aba5acdf SH |
456 | invarg("Failed to parse rule type", *argv); |
457 | req.r.rtm_type = type; | |
6b469cae | 458 | table_ok = 1; |
aba5acdf SH |
459 | } |
460 | argc--; | |
461 | argv++; | |
462 | } | |
463 | ||
464 | if (req.r.rtm_family == AF_UNSPEC) | |
465 | req.r.rtm_family = AF_INET; | |
466 | ||
467 | if (!table_ok && cmd == RTM_NEWRULE) | |
468 | req.r.rtm_table = RT_TABLE_MAIN; | |
469 | ||
c079e121 | 470 | if (rtnl_talk(&rth, &req.n, NULL, 0) < 0) |
076ae708 | 471 | return -2; |
aba5acdf SH |
472 | |
473 | return 0; | |
474 | } | |
475 | ||
50772dc5 SH |
476 | |
477 | static int flush_rule(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg) | |
478 | { | |
b77caeba | 479 | struct rtnl_handle rth2; |
50772dc5 SH |
480 | struct rtmsg *r = NLMSG_DATA(n); |
481 | int len = n->nlmsg_len; | |
56f5daac | 482 | struct rtattr *tb[FRA_MAX+1]; |
50772dc5 SH |
483 | |
484 | len -= NLMSG_LENGTH(sizeof(*r)); | |
485 | if (len < 0) | |
486 | return -1; | |
487 | ||
ad1a12db | 488 | parse_rtattr(tb, FRA_MAX, RTM_RTA(r), len); |
50772dc5 | 489 | |
ad1a12db | 490 | if (tb[FRA_PRIORITY]) { |
50772dc5 SH |
491 | n->nlmsg_type = RTM_DELRULE; |
492 | n->nlmsg_flags = NLM_F_REQUEST; | |
493 | ||
b77caeba SH |
494 | if (rtnl_open(&rth2, 0) < 0) |
495 | return -1; | |
496 | ||
c079e121 | 497 | if (rtnl_talk(&rth2, n, NULL, 0) < 0) |
50772dc5 | 498 | return -2; |
b77caeba SH |
499 | |
500 | rtnl_close(&rth2); | |
50772dc5 SH |
501 | } |
502 | ||
503 | return 0; | |
504 | } | |
505 | ||
506 | static int iprule_flush(int argc, char **argv) | |
507 | { | |
50772dc5 SH |
508 | int af = preferred_family; |
509 | ||
510 | if (af == AF_UNSPEC) | |
511 | af = AF_INET; | |
512 | ||
513 | if (argc > 0) { | |
66081849 | 514 | fprintf(stderr, "\"ip rule flush\" does not allow arguments\n"); |
50772dc5 SH |
515 | return -1; |
516 | } | |
517 | ||
50772dc5 SH |
518 | if (rtnl_wilddump_request(&rth, af, RTM_GETRULE) < 0) { |
519 | perror("Cannot send dump request"); | |
520 | return 1; | |
521 | } | |
522 | ||
cd70f3f5 | 523 | if (rtnl_dump_filter(&rth, flush_rule, NULL) < 0) { |
50772dc5 SH |
524 | fprintf(stderr, "Flush terminated\n"); |
525 | return 1; | |
526 | } | |
527 | ||
528 | return 0; | |
529 | } | |
530 | ||
aba5acdf SH |
531 | int do_iprule(int argc, char **argv) |
532 | { | |
533 | if (argc < 1) { | |
2f4e171f | 534 | return iprule_list_or_save(0, NULL, 0); |
aba5acdf SH |
535 | } else if (matches(argv[0], "list") == 0 || |
536 | matches(argv[0], "lst") == 0 || | |
537 | matches(argv[0], "show") == 0) { | |
2f4e171f KT |
538 | return iprule_list_or_save(argc-1, argv+1, 0); |
539 | } else if (matches(argv[0], "save") == 0) { | |
540 | return iprule_list_or_save(argc-1, argv+1, 1); | |
541 | } else if (matches(argv[0], "restore") == 0) { | |
542 | return iprule_restore(); | |
aba5acdf SH |
543 | } else if (matches(argv[0], "add") == 0) { |
544 | return iprule_modify(RTM_NEWRULE, argc-1, argv+1); | |
545 | } else if (matches(argv[0], "delete") == 0) { | |
546 | return iprule_modify(RTM_DELRULE, argc-1, argv+1); | |
50772dc5 SH |
547 | } else if (matches(argv[0], "flush") == 0) { |
548 | return iprule_flush(argc-1, argv+1); | |
aba5acdf SH |
549 | } else if (matches(argv[0], "help") == 0) |
550 | usage(); | |
551 | ||
552 | fprintf(stderr, "Command \"%s\" is unknown, try \"ip rule help\".\n", *argv); | |
553 | exit(-1); | |
554 | } | |
555 | ||
b6c8e808 PM |
556 | int do_multirule(int argc, char **argv) |
557 | { | |
558 | switch (preferred_family) { | |
559 | case AF_UNSPEC: | |
560 | case AF_INET: | |
561 | preferred_family = RTNL_FAMILY_IPMR; | |
562 | break; | |
563 | case AF_INET6: | |
564 | preferred_family = RTNL_FAMILY_IP6MR; | |
565 | break; | |
0d1c9b57 BG |
566 | case RTNL_FAMILY_IPMR: |
567 | case RTNL_FAMILY_IP6MR: | |
568 | break; | |
b6c8e808 | 569 | default: |
0d1c9b57 BG |
570 | fprintf(stderr, "Multicast rules are only supported for IPv4/IPv6, was: %i\n", |
571 | preferred_family); | |
b6c8e808 PM |
572 | exit(-1); |
573 | } | |
574 | ||
575 | return do_iprule(argc, argv); | |
576 | } |