]> git.proxmox.com Git - mirror_iproute2.git/blame - lib/libnetlink.c
libnetlink: Add helper to add a group via setsockopt
[mirror_iproute2.git] / lib / libnetlink.c
CommitLineData
aba5acdf
SH
1/*
2 * libnetlink.c RTnetlink service routines.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 */
12
13#include <stdio.h>
14#include <stdlib.h>
463d9efa 15#include <stdbool.h>
aba5acdf 16#include <unistd.h>
aba5acdf
SH
17#include <fcntl.h>
18#include <net/if_arp.h>
19#include <sys/socket.h>
20#include <netinet/in.h>
21#include <string.h>
22#include <errno.h>
23#include <time.h>
24#include <sys/uio.h>
b05d9a3d 25#include <linux/fib_rules.h>
39360023 26#include <linux/if_addrlabel.h>
9dbe6df4 27#include <linux/if_bridge.h>
aba5acdf
SH
28
29#include "libnetlink.h"
30
92e03242
DA
31#define __aligned(x) __attribute__((aligned(x)))
32
449b824a
ND
33#ifndef SOL_NETLINK
34#define SOL_NETLINK 270
35#endif
36
c079e121
SH
37#ifndef MIN
38#define MIN(a, b) ((a) < (b) ? (a) : (b))
39#endif
40
7f03191f
PM
41int rcvbuf = 1024 * 1024;
42
b6432e68
SH
43#ifdef HAVE_LIBMNL
44#include <libmnl/libmnl.h>
45
46static const enum mnl_attr_data_type extack_policy[NLMSGERR_ATTR_MAX + 1] = {
47 [NLMSGERR_ATTR_MSG] = MNL_TYPE_NUL_STRING,
48 [NLMSGERR_ATTR_OFFS] = MNL_TYPE_U32,
49};
50
51static int err_attr_cb(const struct nlattr *attr, void *data)
52{
53 const struct nlattr **tb = data;
54 uint16_t type;
55
e5fa0e6f
DA
56 if (mnl_attr_type_valid(attr, NLMSGERR_ATTR_MAX) < 0) {
57 fprintf(stderr, "Invalid extack attribute\n");
b6432e68 58 return MNL_CB_ERROR;
e5fa0e6f 59 }
b6432e68
SH
60
61 type = mnl_attr_get_type(attr);
e5fa0e6f
DA
62 if (mnl_attr_validate(attr, extack_policy[type]) < 0) {
63 fprintf(stderr, "extack attribute %d failed validation\n",
64 type);
b6432e68 65 return MNL_CB_ERROR;
e5fa0e6f 66 }
b6432e68
SH
67
68 tb[type] = attr;
69 return MNL_CB_OK;
70}
71
2750252d
DA
72static void print_ext_ack_msg(bool is_err, const char *msg)
73{
74 fprintf(stderr, "%s: %s", is_err ? "Error" : "Warning", msg);
75 if (msg[strlen(msg) - 1] != '.')
76 fprintf(stderr, ".");
77 fprintf(stderr, "\n");
78}
79
b6432e68 80/* dump netlink extended ack error message */
049c5853 81int nl_dump_ext_ack(const struct nlmsghdr *nlh, nl_ext_ack_fn_t errfn)
b6432e68 82{
e5fa0e6f 83 struct nlattr *tb[NLMSGERR_ATTR_MAX + 1] = {};
b6432e68
SH
84 const struct nlmsgerr *err = mnl_nlmsg_get_payload(nlh);
85 const struct nlmsghdr *err_nlh = NULL;
86 unsigned int hlen = sizeof(*err);
844c37b4 87 const char *msg = NULL;
b6432e68
SH
88 uint32_t off = 0;
89
b6432e68
SH
90 /* no TLVs, nothing to do here */
91 if (!(nlh->nlmsg_flags & NLM_F_ACK_TLVS))
92 return 0;
93
94 /* if NLM_F_CAPPED is set then the inner err msg was capped */
95 if (!(nlh->nlmsg_flags & NLM_F_CAPPED))
96 hlen += mnl_nlmsg_get_payload_len(&err->msg);
97
e5fa0e6f
DA
98 if (mnl_attr_parse(nlh, hlen, err_attr_cb, tb) != MNL_CB_OK)
99 return 0;
b6432e68
SH
100
101 if (tb[NLMSGERR_ATTR_MSG])
844c37b4 102 msg = mnl_attr_get_str(tb[NLMSGERR_ATTR_MSG]);
b6432e68
SH
103
104 if (tb[NLMSGERR_ATTR_OFFS]) {
105 off = mnl_attr_get_u32(tb[NLMSGERR_ATTR_OFFS]);
106
107 if (off > nlh->nlmsg_len) {
108 fprintf(stderr,
109 "Invalid offset for NLMSGERR_ATTR_OFFS\n");
110 off = 0;
111 } else if (!(nlh->nlmsg_flags & NLM_F_CAPPED))
112 err_nlh = &err->msg;
113 }
114
fb6cb307 115 if (errfn)
844c37b4 116 return errfn(msg, off, err_nlh);
fb6cb307 117
844c37b4
DA
118 if (msg && *msg != '\0') {
119 bool is_err = !!err->error;
120
2750252d
DA
121 print_ext_ack_msg(is_err, msg);
122 return is_err ? 1 : 0;
123 }
fb6cb307 124
2750252d
DA
125 return 0;
126}
127
128static int nl_dump_ext_ack_done(const struct nlmsghdr *nlh, int error)
129{
130 struct nlattr *tb[NLMSGERR_ATTR_MAX + 1] = {};
131 unsigned int hlen = sizeof(int);
132 const char *msg = NULL;
133
134 if (mnl_attr_parse(nlh, hlen, err_attr_cb, tb) != MNL_CB_OK)
135 return 0;
136
137 if (tb[NLMSGERR_ATTR_MSG])
138 msg = mnl_attr_get_str(tb[NLMSGERR_ATTR_MSG]);
139
140 if (msg && *msg != '\0') {
141 bool is_err = !!error;
142
143 print_ext_ack_msg(is_err, msg);
844c37b4 144 return is_err ? 1 : 0;
fb6cb307
DA
145 }
146
147 return 0;
b6432e68
SH
148}
149#else
7d23fa55
SH
150#warning "libmnl required for error support"
151
b6432e68 152/* No extended error ack without libmnl */
049c5853 153int nl_dump_ext_ack(const struct nlmsghdr *nlh, nl_ext_ack_fn_t errfn)
b6432e68
SH
154{
155 return 0;
156}
2750252d
DA
157
158static int nl_dump_ext_ack_done(const struct nlmsghdr *nlh, int error)
159{
160 return 0;
161}
b6432e68
SH
162#endif
163
aea41afc
DA
164/* Older kernels may not support strict dump and filtering */
165void rtnl_set_strict_dump(struct rtnl_handle *rth)
166{
167 int one = 1;
168
285033bf
DA
169 if (setsockopt(rth->fd, SOL_NETLINK, NETLINK_GET_STRICT_CHK,
170 &one, sizeof(one)) < 0)
171 return;
172
173 rth->flags |= RTNL_HANDLE_F_STRICT_CHK;
aea41afc
DA
174}
175
9860becf
DA
176int rtnl_add_nl_group(struct rtnl_handle *rth, unsigned int group)
177{
178 return setsockopt(rth->fd, SOL_NETLINK, NETLINK_ADD_MEMBERSHIP,
179 &group, sizeof(group));
180}
181
aba5acdf
SH
182void rtnl_close(struct rtnl_handle *rth)
183{
3bfa73ff
SH
184 if (rth->fd >= 0) {
185 close(rth->fd);
186 rth->fd = -1;
187 }
aba5acdf
SH
188}
189
2c500a4d 190int rtnl_open_byproto(struct rtnl_handle *rth, unsigned int subscriptions,
8ed63ab1 191 int protocol)
aba5acdf 192{
f332d169 193 socklen_t addr_len;
007d3a3e 194 int sndbuf = 32768;
b6432e68 195 int one = 1;
aba5acdf 196
b16621ca 197 memset(rth, 0, sizeof(*rth));
aba5acdf 198
8a4025f6 199 rth->proto = protocol;
bcb9d403 200 rth->fd = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, protocol);
aba5acdf
SH
201 if (rth->fd < 0) {
202 perror("Cannot open netlink socket");
203 return -1;
204 }
205
2c500a4d
SH
206 if (setsockopt(rth->fd, SOL_SOCKET, SO_SNDBUF,
207 &sndbuf, sizeof(sndbuf)) < 0) {
007d3a3e
SH
208 perror("SO_SNDBUF");
209 return -1;
210 }
211
2c500a4d
SH
212 if (setsockopt(rth->fd, SOL_SOCKET, SO_RCVBUF,
213 &rcvbuf, sizeof(rcvbuf)) < 0) {
007d3a3e
SH
214 perror("SO_RCVBUF");
215 return -1;
216 }
217
b6432e68
SH
218 /* Older kernels may no support extended ACK reporting */
219 setsockopt(rth->fd, SOL_NETLINK, NETLINK_EXT_ACK,
220 &one, sizeof(one));
221
aba5acdf
SH
222 memset(&rth->local, 0, sizeof(rth->local));
223 rth->local.nl_family = AF_NETLINK;
224 rth->local.nl_groups = subscriptions;
225
2c500a4d
SH
226 if (bind(rth->fd, (struct sockaddr *)&rth->local,
227 sizeof(rth->local)) < 0) {
aba5acdf
SH
228 perror("Cannot bind netlink socket");
229 return -1;
230 }
231 addr_len = sizeof(rth->local);
2c500a4d
SH
232 if (getsockname(rth->fd, (struct sockaddr *)&rth->local,
233 &addr_len) < 0) {
aba5acdf
SH
234 perror("Cannot getsockname");
235 return -1;
236 }
237 if (addr_len != sizeof(rth->local)) {
238 fprintf(stderr, "Wrong address length %d\n", addr_len);
239 return -1;
240 }
241 if (rth->local.nl_family != AF_NETLINK) {
2c500a4d
SH
242 fprintf(stderr, "Wrong address family %d\n",
243 rth->local.nl_family);
aba5acdf
SH
244 return -1;
245 }
246 rth->seq = time(NULL);
247 return 0;
248}
249
2c500a4d 250int rtnl_open(struct rtnl_handle *rth, unsigned int subscriptions)
c7699875 251{
252 return rtnl_open_byproto(rth, subscriptions, NETLINK_ROUTE);
253}
254
88470978
DA
255int rtnl_addrdump_req(struct rtnl_handle *rth, int family,
256 req_filter_fn_t filter_fn)
46917d08
DA
257{
258 struct {
259 struct nlmsghdr nlh;
260 struct ifaddrmsg ifm;
88470978 261 char buf[128];
46917d08 262 } req = {
92e03242 263 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)),
46917d08
DA
264 .nlh.nlmsg_type = RTM_GETADDR,
265 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
266 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
267 .ifm.ifa_family = family,
268 };
269
88470978
DA
270 if (filter_fn) {
271 int err;
272
273 err = filter_fn(&req.nlh, sizeof(req));
274 if (err)
275 return err;
276 }
277
46917d08
DA
278 return send(rth->fd, &req, sizeof(req), 0);
279}
280
39360023
DA
281int rtnl_addrlbldump_req(struct rtnl_handle *rth, int family)
282{
283 struct {
284 struct nlmsghdr nlh;
285 struct ifaddrlblmsg ifal;
286 } req = {
92e03242 287 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrlblmsg)),
39360023
DA
288 .nlh.nlmsg_type = RTM_GETADDRLABEL,
289 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
290 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
291 .ifal.ifal_family = family,
292 };
293
294 return send(rth->fd, &req, sizeof(req), 0);
295}
296
43fd93ae
DA
297int rtnl_routedump_req(struct rtnl_handle *rth, int family,
298 req_filter_fn_t filter_fn)
bfb27dfa
DA
299{
300 struct {
301 struct nlmsghdr nlh;
302 struct rtmsg rtm;
43fd93ae 303 char buf[128];
bfb27dfa 304 } req = {
92e03242 305 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg)),
bfb27dfa
DA
306 .nlh.nlmsg_type = RTM_GETROUTE,
307 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
308 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
309 .rtm.rtm_family = family,
310 };
311
43fd93ae
DA
312 if (filter_fn) {
313 int err;
314
315 err = filter_fn(&req.nlh, sizeof(req));
316 if (err)
317 return err;
318 }
319
bfb27dfa
DA
320 return send(rth->fd, &req, sizeof(req), 0);
321}
322
b05d9a3d
DA
323int rtnl_ruledump_req(struct rtnl_handle *rth, int family)
324{
325 struct {
326 struct nlmsghdr nlh;
327 struct fib_rule_hdr frh;
328 } req = {
92e03242 329 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct fib_rule_hdr)),
b05d9a3d
DA
330 .nlh.nlmsg_type = RTM_GETRULE,
331 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
332 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
333 .frh.family = family
334 };
335
336 return send(rth->fd, &req, sizeof(req), 0);
337}
338
f255ab12
DA
339int rtnl_neighdump_req(struct rtnl_handle *rth, int family,
340 req_filter_fn_t filter_fn)
9e0ab19c
DA
341{
342 struct {
343 struct nlmsghdr nlh;
344 struct ndmsg ndm;
f255ab12 345 char buf[256];
9e0ab19c 346 } req = {
92e03242 347 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg)),
9e0ab19c
DA
348 .nlh.nlmsg_type = RTM_GETNEIGH,
349 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
350 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
351 .ndm.ndm_family = family,
352 };
353
f255ab12
DA
354 if (filter_fn) {
355 int err;
356
357 err = filter_fn(&req.nlh, sizeof(req));
358 if (err)
359 return err;
360 }
361
9e0ab19c
DA
362 return send(rth->fd, &req, sizeof(req), 0);
363}
364
ff41db8a
DA
365int rtnl_neightbldump_req(struct rtnl_handle *rth, int family)
366{
367 struct {
368 struct nlmsghdr nlh;
369 struct ndtmsg ndtmsg;
370 } req = {
92e03242 371 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndtmsg)),
ff41db8a
DA
372 .nlh.nlmsg_type = RTM_GETNEIGHTBL,
373 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
374 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
375 .ndtmsg.ndtm_family = family,
376 };
377
378 return send(rth->fd, &req, sizeof(req), 0);
379}
380
9dbe6df4
DA
381int rtnl_mdbdump_req(struct rtnl_handle *rth, int family)
382{
383 struct {
384 struct nlmsghdr nlh;
385 struct br_port_msg bpm;
386 } req = {
92e03242 387 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct br_port_msg)),
9dbe6df4
DA
388 .nlh.nlmsg_type = RTM_GETMDB,
389 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
390 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
391 .bpm.family = family,
392 };
393
394 return send(rth->fd, &req, sizeof(req), 0);
395}
396
ddee16bc
DA
397int rtnl_netconfdump_req(struct rtnl_handle *rth, int family)
398{
399 struct {
400 struct nlmsghdr nlh;
401 struct netconfmsg ncm;
92e03242 402 char buf[0] __aligned(NLMSG_ALIGNTO);
ddee16bc 403 } req = {
92e03242 404 .nlh.nlmsg_len = NLMSG_LENGTH(NLMSG_ALIGN(sizeof(struct netconfmsg))),
ddee16bc
DA
405 .nlh.nlmsg_type = RTM_GETNETCONF,
406 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
407 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
408 .ncm.ncm_family = family,
409 };
410
411 return send(rth->fd, &req, sizeof(req), 0);
412}
413
efb0b383
DA
414int rtnl_nsiddump_req(struct rtnl_handle *rth, int family)
415{
416 struct {
417 struct nlmsghdr nlh;
418 struct rtgenmsg rtm;
92e03242 419 char buf[0] __aligned(NLMSG_ALIGNTO);
efb0b383 420 } req = {
92e03242 421 .nlh.nlmsg_len = NLMSG_LENGTH(NLMSG_ALIGN(sizeof(struct rtgenmsg))),
efb0b383
DA
422 .nlh.nlmsg_type = RTM_GETNSID,
423 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
424 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
425 .rtm.rtgen_family = family,
426 };
427
428 return send(rth->fd, &req, sizeof(req), 0);
429}
430
d97b16b2 431static int __rtnl_linkdump_req(struct rtnl_handle *rth, int family)
aba5acdf
SH
432{
433 struct {
434 struct nlmsghdr nlh;
63338dca 435 struct ifinfomsg ifm;
d17b136f 436 } req = {
d97b16b2 437 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
31ae2912 438 .nlh.nlmsg_type = RTM_GETLINK,
d17b136f
PS
439 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
440 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
441 .ifm.ifi_family = family,
d17b136f 442 };
bd886ebb 443
2c500a4d 444 return send(rth->fd, &req, sizeof(req), 0);
aba5acdf
SH
445}
446
d97b16b2 447int rtnl_linkdump_req(struct rtnl_handle *rth, int family)
b0a4ce62 448{
d97b16b2
DA
449 if (family == AF_UNSPEC)
450 return rtnl_linkdump_req_filter(rth, family, RTEXT_FILTER_VF);
451
452 return __rtnl_linkdump_req(rth, family);
453}
454
455int rtnl_linkdump_req_filter(struct rtnl_handle *rth, int family,
456 __u32 filt_mask)
457{
97b44d57 458 if (family == AF_UNSPEC || family == AF_BRIDGE) {
d97b16b2
DA
459 struct {
460 struct nlmsghdr nlh;
461 struct ifinfomsg ifm;
462 /* attribute has to be NLMSG aligned */
463 struct rtattr ext_req __aligned(NLMSG_ALIGNTO);
464 __u32 ext_filter_mask;
465 } req = {
466 .nlh.nlmsg_len = sizeof(req),
467 .nlh.nlmsg_type = RTM_GETLINK,
468 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
469 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
470 .ifm.ifi_family = family,
471 .ext_req.rta_type = IFLA_EXT_MASK,
472 .ext_req.rta_len = RTA_LENGTH(sizeof(__u32)),
473 .ext_filter_mask = filt_mask,
474 };
475
476 return send(rth->fd, &req, sizeof(req), 0);
477 }
b0a4ce62 478
d97b16b2
DA
479 return __rtnl_linkdump_req(rth, family);
480}
b0a4ce62 481
d97b16b2
DA
482int rtnl_linkdump_req_filter_fn(struct rtnl_handle *rth, int family,
483 req_filter_fn_t filter_fn)
484{
17ed56fd 485 if (family == AF_UNSPEC || family == AF_PACKET) {
d97b16b2
DA
486 struct {
487 struct nlmsghdr nlh;
488 struct ifinfomsg ifm;
489 char buf[1024];
490 } req = {
491 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
492 .nlh.nlmsg_type = RTM_GETLINK,
493 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
494 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
495 .ifm.ifi_family = family,
496 };
497 int err;
498
499 if (!filter_fn)
500 return -EINVAL;
501
502 err = filter_fn(&req.nlh, sizeof(req));
503 if (err)
504 return err;
505
506 return send(rth->fd, &req, req.nlh.nlmsg_len, 0);
507 }
b0a4ce62 508
d97b16b2 509 return __rtnl_linkdump_req(rth, family);
b0a4ce62
DA
510}
511
264be1d8
IS
512int rtnl_fdb_linkdump_req_filter_fn(struct rtnl_handle *rth,
513 req_filter_fn_t filter_fn)
514{
515 struct {
516 struct nlmsghdr nlh;
517 struct ifinfomsg ifm;
518 char buf[128];
519 } req = {
520 .nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
521 .nlh.nlmsg_type = RTM_GETNEIGH,
522 .nlh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
523 .nlh.nlmsg_seq = rth->dump = ++rth->seq,
524 .ifm.ifi_family = PF_BRIDGE,
525 };
526 int err;
527
528 err = filter_fn(&req.nlh, sizeof(req));
529 if (err)
530 return err;
531
532 return send(rth->fd, &req, sizeof(req), 0);
533}
534
56eeeda9 535int rtnl_statsdump_req_filter(struct rtnl_handle *rth, int fam, __u32 filt_mask)
7abf5de6
NA
536{
537 struct {
538 struct nlmsghdr nlh;
539 struct if_stats_msg ifsm;
540 } req;
541
542 memset(&req, 0, sizeof(req));
543 req.nlh.nlmsg_len = NLMSG_LENGTH(sizeof(struct if_stats_msg));
56eeeda9 544 req.nlh.nlmsg_type = RTM_GETSTATS;
7abf5de6
NA
545 req.nlh.nlmsg_flags = NLM_F_DUMP|NLM_F_REQUEST;
546 req.nlh.nlmsg_pid = 0;
547 req.nlh.nlmsg_seq = rth->dump = ++rth->seq;
548 req.ifsm.family = fam;
549 req.ifsm.filter_mask = filt_mask;
550
2c500a4d 551 return send(rth->fd, &req, sizeof(req), 0);
7abf5de6
NA
552}
553
6cf8398f 554int rtnl_send(struct rtnl_handle *rth, const void *buf, int len)
aba5acdf 555{
f31a37f7
SH
556 return send(rth->fd, buf, len, 0);
557}
558
6cf8398f 559int rtnl_send_check(struct rtnl_handle *rth, const void *buf, int len)
f31a37f7 560{
54bb35c6
SH
561 struct nlmsghdr *h;
562 int status;
563 char resp[1024];
aba5acdf 564
f31a37f7 565 status = send(rth->fd, buf, len, 0);
54bb35c6
SH
566 if (status < 0)
567 return status;
568
2d8240f8
SH
569 /* Check for immediate errors */
570 status = recv(rth->fd, resp, sizeof(resp), MSG_DONTWAIT|MSG_PEEK);
54bb35c6
SH
571 if (status < 0) {
572 if (errno == EAGAIN)
573 return 0;
574 return -1;
575 }
576
577 for (h = (struct nlmsghdr *)resp; NLMSG_OK(h, status);
578 h = NLMSG_NEXT(h, status)) {
579 if (h->nlmsg_type == NLMSG_ERROR) {
2c500a4d
SH
580 struct nlmsgerr *err = (struct nlmsgerr *)NLMSG_DATA(h);
581
54bb35c6
SH
582 if (h->nlmsg_len < NLMSG_LENGTH(sizeof(struct nlmsgerr)))
583 fprintf(stderr, "ERROR truncated\n");
e9e9365b 584 else
54bb35c6 585 errno = -err->error;
24f38182 586 return -1;
54bb35c6 587 }
54bb35c6
SH
588 }
589
590 return 0;
aba5acdf
SH
591}
592
593int rtnl_dump_request(struct rtnl_handle *rth, int type, void *req, int len)
594{
d17b136f
PS
595 struct nlmsghdr nlh = {
596 .nlmsg_len = NLMSG_LENGTH(len),
597 .nlmsg_type = type,
598 .nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
599 .nlmsg_seq = rth->dump = ++rth->seq,
600 };
6cf8398f 601 struct sockaddr_nl nladdr = { .nl_family = AF_NETLINK };
8ed63ab1
SH
602 struct iovec iov[2] = {
603 { .iov_base = &nlh, .iov_len = sizeof(nlh) },
604 { .iov_base = req, .iov_len = len }
605 };
aba5acdf 606 struct msghdr msg = {
8ed63ab1 607 .msg_name = &nladdr,
d17b136f 608 .msg_namelen = sizeof(nladdr),
8ed63ab1
SH
609 .msg_iov = iov,
610 .msg_iovlen = 2,
aba5acdf
SH
611 };
612
aba5acdf
SH
613 return sendmsg(rth->fd, &msg, 0);
614}
615
0d238ca2
DA
616int rtnl_dump_request_n(struct rtnl_handle *rth, struct nlmsghdr *n)
617{
618 struct sockaddr_nl nladdr = { .nl_family = AF_NETLINK };
619 struct iovec iov = {
2c500a4d 620 .iov_base = n,
0d238ca2
DA
621 .iov_len = n->nlmsg_len
622 };
623 struct msghdr msg = {
624 .msg_name = &nladdr,
625 .msg_namelen = sizeof(nladdr),
626 .msg_iov = &iov,
627 .msg_iovlen = 1,
628 };
629
630 n->nlmsg_flags = NLM_F_DUMP|NLM_F_REQUEST;
631 n->nlmsg_pid = 0;
632 n->nlmsg_seq = rth->dump = ++rth->seq;
633
634 return sendmsg(rth->fd, &msg, 0);
635}
636
0efa6257 637static int rtnl_dump_done(struct nlmsghdr *h)
892a25e2
SH
638{
639 int len = *(int *)NLMSG_DATA(h);
640
05a14fc1
DA
641 if (h->nlmsg_len < NLMSG_LENGTH(sizeof(int))) {
642 fprintf(stderr, "DONE truncated\n");
643 return -1;
644 }
892a25e2 645
05a14fc1 646 if (len < 0) {
2750252d
DA
647 /* check for any messages returned from kernel */
648 if (nl_dump_ext_ack_done(h, len))
649 return len;
650
05a14fc1
DA
651 errno = -len;
652 switch (errno) {
653 case ENOENT:
654 case EOPNOTSUPP:
655 return -1;
656 case EMSGSIZE:
657 fprintf(stderr,
658 "Error: Buffer too small for object.\n");
659 break;
660 default:
892a25e2 661 perror("RTNETLINK answers");
892a25e2 662 }
05a14fc1 663 return len;
892a25e2 664 }
05a14fc1 665
844c37b4
DA
666 /* check for any messages returned from kernel */
667 nl_dump_ext_ack(h, NULL);
668
892a25e2
SH
669 return 0;
670}
671
672static void rtnl_dump_error(const struct rtnl_handle *rth,
673 struct nlmsghdr *h)
674{
675
676 if (h->nlmsg_len < NLMSG_LENGTH(sizeof(struct nlmsgerr))) {
677 fprintf(stderr, "ERROR truncated\n");
678 } else {
679 const struct nlmsgerr *err = (struct nlmsgerr *)NLMSG_DATA(h);
680
681 errno = -err->error;
682 if (rth->proto == NETLINK_SOCK_DIAG &&
683 (errno == ENOENT ||
684 errno == EOPNOTSUPP))
685 return;
686
3ad6d176
DA
687 if (!(rth->flags & RTNL_HANDLE_F_SUPPRESS_NLERR))
688 perror("RTNETLINK answers");
892a25e2
SH
689 }
690}
691
2d34851c
HL
692static int __rtnl_recvmsg(int fd, struct msghdr *msg, int flags)
693{
694 int len;
695
696 do {
697 len = recvmsg(fd, msg, flags);
698 } while (len < 0 && (errno == EINTR || errno == EAGAIN));
699
700 if (len < 0) {
701 fprintf(stderr, "netlink receive error %s (%d)\n",
702 strerror(errno), errno);
703 return -errno;
704 }
705
706 if (len == 0) {
707 fprintf(stderr, "EOF on netlink\n");
708 return -ENODATA;
709 }
710
711 return len;
712}
713
714static int rtnl_recvmsg(int fd, struct msghdr *msg, char **answer)
715{
716 struct iovec *iov = msg->msg_iov;
717 char *buf;
718 int len;
719
720 iov->iov_base = NULL;
721 iov->iov_len = 0;
722
723 len = __rtnl_recvmsg(fd, msg, MSG_PEEK | MSG_TRUNC);
724 if (len < 0)
725 return len;
726
bb5ae621
ED
727 if (len < 32768)
728 len = 32768;
2d34851c
HL
729 buf = malloc(len);
730 if (!buf) {
731 fprintf(stderr, "malloc error: not enough buffer\n");
732 return -ENOMEM;
733 }
734
735 iov->iov_base = buf;
736 iov->iov_len = len;
737
738 len = __rtnl_recvmsg(fd, msg, 0);
739 if (len < 0) {
740 free(buf);
741 return len;
742 }
743
744 if (answer)
745 *answer = buf;
746 else
747 free(buf);
748
749 return len;
750}
751
1d2fac41
SH
752static int rtnl_dump_filter_l(struct rtnl_handle *rth,
753 const struct rtnl_dump_filter_arg *arg)
aba5acdf 754{
aba5acdf 755 struct sockaddr_nl nladdr;
8ed63ab1
SH
756 struct iovec iov;
757 struct msghdr msg = {
758 .msg_name = &nladdr,
759 .msg_namelen = sizeof(nladdr),
760 .msg_iov = &iov,
761 .msg_iovlen = 1,
762 };
2d34851c 763 char *buf;
16f02e14 764 int dump_intr = 0;
aba5acdf
SH
765
766 while (1) {
767 int status;
b49240ec 768 const struct rtnl_dump_filter_arg *a;
3bc1c4f2
BG
769 int found_done = 0;
770 int msglen = 0;
aba5acdf 771
2d34851c
HL
772 status = rtnl_recvmsg(rth->fd, &msg, &buf);
773 if (status < 0)
774 return status;
aba5acdf 775
486ccd99
VK
776 if (rth->dump_fp)
777 fwrite(buf, 1, NLMSG_ALIGN(status), rth->dump_fp);
778
b49240ec 779 for (a = arg; a->filter; a++) {
2c500a4d
SH
780 struct nlmsghdr *h = (struct nlmsghdr *)buf;
781
3bc1c4f2 782 msglen = status;
b49240ec 783
3bc1c4f2 784 while (NLMSG_OK(h, msglen)) {
486ccd99 785 int err = 0;
b49240ec 786
8e72880f
PS
787 h->nlmsg_flags &= ~a->nc_flags;
788
b49240ec
SH
789 if (nladdr.nl_pid != 0 ||
790 h->nlmsg_pid != rth->local.nl_pid ||
cd70f3f5 791 h->nlmsg_seq != rth->dump)
b49240ec 792 goto skip_it;
aba5acdf 793
16f02e14
ND
794 if (h->nlmsg_flags & NLM_F_DUMP_INTR)
795 dump_intr = 1;
796
3bc1c4f2 797 if (h->nlmsg_type == NLMSG_DONE) {
0efa6257 798 err = rtnl_dump_done(h);
2d34851c
HL
799 if (err < 0) {
800 free(buf);
892a25e2 801 return -1;
2d34851c 802 }
892a25e2 803
3bc1c4f2
BG
804 found_done = 1;
805 break; /* process next filter */
806 }
892a25e2 807
b49240ec 808 if (h->nlmsg_type == NLMSG_ERROR) {
892a25e2 809 rtnl_dump_error(rth, h);
2d34851c 810 free(buf);
b49240ec 811 return -1;
aba5acdf 812 }
486ccd99
VK
813
814 if (!rth->dump_fp) {
cd554f2c 815 err = a->filter(h, a->arg1);
2d34851c
HL
816 if (err < 0) {
817 free(buf);
486ccd99 818 return err;
2d34851c 819 }
486ccd99 820 }
aba5acdf
SH
821
822skip_it:
3bc1c4f2 823 h = NLMSG_NEXT(h, msglen);
b49240ec 824 }
3bc1c4f2 825 }
2d34851c 826 free(buf);
3bc1c4f2 827
16f02e14
ND
828 if (found_done) {
829 if (dump_intr)
830 fprintf(stderr,
831 "Dump was interrupted and may be inconsistent.\n");
3bc1c4f2 832 return 0;
16f02e14 833 }
3bc1c4f2 834
aba5acdf
SH
835 if (msg.msg_flags & MSG_TRUNC) {
836 fprintf(stderr, "Message truncated\n");
837 continue;
838 }
3bc1c4f2
BG
839 if (msglen) {
840 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
aba5acdf
SH
841 exit(1);
842 }
843 }
844}
845
8e72880f 846int rtnl_dump_filter_nc(struct rtnl_handle *rth,
b49240ec 847 rtnl_filter_t filter,
8e72880f 848 void *arg1, __u16 nc_flags)
b49240ec
SH
849{
850 const struct rtnl_dump_filter_arg a[2] = {
8e72880f
PS
851 { .filter = filter, .arg1 = arg1, .nc_flags = nc_flags, },
852 { .filter = NULL, .arg1 = NULL, .nc_flags = 0, },
b49240ec
SH
853 };
854
855 return rtnl_dump_filter_l(rth, a);
856}
857
b6432e68
SH
858static void rtnl_talk_error(struct nlmsghdr *h, struct nlmsgerr *err,
859 nl_ext_ack_fn_t errfn)
860{
844c37b4 861 if (nl_dump_ext_ack(h, errfn))
b6432e68
SH
862 return;
863
864 fprintf(stderr, "RTNETLINK answers: %s\n",
865 strerror(-err->error));
866}
867
72a2ff39
CM
868
869static int __rtnl_talk_iov(struct rtnl_handle *rtnl, struct iovec *iov,
870 size_t iovlen, struct nlmsghdr **answer,
871 bool show_rtnl_err, nl_ext_ack_fn_t errfn)
aba5acdf 872{
d17b136f 873 struct sockaddr_nl nladdr = { .nl_family = AF_NETLINK };
72a2ff39 874 struct iovec riov;
aba5acdf 875 struct msghdr msg = {
8ed63ab1
SH
876 .msg_name = &nladdr,
877 .msg_namelen = sizeof(nladdr),
72a2ff39
CM
878 .msg_iov = iov,
879 .msg_iovlen = iovlen,
aba5acdf 880 };
72a2ff39
CM
881 unsigned int seq = 0;
882 struct nlmsghdr *h;
883 int i, status;
2d34851c 884 char *buf;
aba5acdf 885
72a2ff39
CM
886 for (i = 0; i < iovlen; i++) {
887 h = iov[i].iov_base;
888 h->nlmsg_seq = seq = ++rtnl->seq;
889 if (answer == NULL)
890 h->nlmsg_flags |= NLM_F_ACK;
891 }
aba5acdf
SH
892
893 status = sendmsg(rtnl->fd, &msg, 0);
aba5acdf
SH
894 if (status < 0) {
895 perror("Cannot talk to rtnetlink");
896 return -1;
897 }
898
72a2ff39
CM
899 /* change msg to use the response iov */
900 msg.msg_iov = &riov;
901 msg.msg_iovlen = 1;
902 i = 0;
aba5acdf 903 while (1) {
0951cbcd 904next:
2d34851c 905 status = rtnl_recvmsg(rtnl->fd, &msg, &buf);
72a2ff39 906 ++i;
2d34851c
HL
907
908 if (status < 0)
909 return status;
aba5acdf 910
aba5acdf 911 if (msg.msg_namelen != sizeof(nladdr)) {
2c500a4d
SH
912 fprintf(stderr,
913 "sender address length == %d\n",
914 msg.msg_namelen);
aba5acdf
SH
915 exit(1);
916 }
2c500a4d 917 for (h = (struct nlmsghdr *)buf; status >= sizeof(*h); ) {
aba5acdf
SH
918 int len = h->nlmsg_len;
919 int l = len - sizeof(*h);
920
2c500a4d 921 if (l < 0 || len > status) {
aba5acdf
SH
922 if (msg.msg_flags & MSG_TRUNC) {
923 fprintf(stderr, "Truncated message\n");
2d34851c 924 free(buf);
aba5acdf
SH
925 return -1;
926 }
2c500a4d
SH
927 fprintf(stderr,
928 "!!!malformed message: len=%d\n",
929 len);
aba5acdf
SH
930 exit(1);
931 }
932
c079e121 933 if (nladdr.nl_pid != 0 ||
10f57ef1 934 h->nlmsg_pid != rtnl->local.nl_pid ||
72a2ff39 935 h->nlmsg_seq > seq || h->nlmsg_seq < seq - iovlen) {
4cca16f2
SH
936 /* Don't forget to skip that message. */
937 status -= NLMSG_ALIGN(len);
2c500a4d 938 h = (struct nlmsghdr *)((char *)h + NLMSG_ALIGN(len));
aba5acdf
SH
939 continue;
940 }
941
942 if (h->nlmsg_type == NLMSG_ERROR) {
2c500a4d 943 struct nlmsgerr *err = (struct nlmsgerr *)NLMSG_DATA(h);
8c50b728 944 int error = err->error;
2c500a4d 945
aba5acdf
SH
946 if (l < sizeof(struct nlmsgerr)) {
947 fprintf(stderr, "ERROR truncated\n");
c60389e4
SH
948 free(buf);
949 return -1;
950 }
951
bfb3bf18 952 if (!error) {
844c37b4
DA
953 /* check messages from kernel */
954 nl_dump_ext_ack(h, errfn);
bfb3bf18
SH
955 } else {
956 errno = -error;
844c37b4 957
b45e3000
SH
958 if (rtnl->proto != NETLINK_SOCK_DIAG &&
959 show_rtnl_err)
960 rtnl_talk_error(h, err, errfn);
961 }
b6432e68 962
c60389e4
SH
963 if (answer)
964 *answer = (struct nlmsghdr *)buf;
965 else
966 free(buf);
b45e3000 967
0951cbcd
PM
968 if (i < iovlen)
969 goto next;
8c50b728 970 return error ? -i : 0;
aba5acdf 971 }
c079e121 972
aba5acdf 973 if (answer) {
86bf43c7 974 *answer = (struct nlmsghdr *)buf;
aba5acdf
SH
975 return 0;
976 }
977
978 fprintf(stderr, "Unexpected reply!!!\n");
979
980 status -= NLMSG_ALIGN(len);
2c500a4d 981 h = (struct nlmsghdr *)((char *)h + NLMSG_ALIGN(len));
aba5acdf 982 }
2d34851c 983 free(buf);
c079e121 984
aba5acdf
SH
985 if (msg.msg_flags & MSG_TRUNC) {
986 fprintf(stderr, "Message truncated\n");
987 continue;
988 }
c079e121 989
aba5acdf
SH
990 if (status) {
991 fprintf(stderr, "!!!Remnant of size %d\n", status);
992 exit(1);
993 }
994 }
995}
996
72a2ff39
CM
997static int __rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n,
998 struct nlmsghdr **answer,
999 bool show_rtnl_err, nl_ext_ack_fn_t errfn)
1000{
1001 struct iovec iov = {
1002 .iov_base = n,
1003 .iov_len = n->nlmsg_len
1004 };
1005
1006 return __rtnl_talk_iov(rtnl, &iov, 1, answer, show_rtnl_err, errfn);
1007}
1008
463d9efa 1009int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n,
86bf43c7 1010 struct nlmsghdr **answer)
463d9efa 1011{
86bf43c7 1012 return __rtnl_talk(rtnl, n, answer, true, NULL);
b6432e68
SH
1013}
1014
72a2ff39
CM
1015int rtnl_talk_iov(struct rtnl_handle *rtnl, struct iovec *iovec, size_t iovlen,
1016 struct nlmsghdr **answer)
1017{
1018 return __rtnl_talk_iov(rtnl, iovec, iovlen, answer, true, NULL);
1019}
1020
463d9efa 1021int rtnl_talk_suppress_rtnl_errmsg(struct rtnl_handle *rtnl, struct nlmsghdr *n,
86bf43c7 1022 struct nlmsghdr **answer)
463d9efa 1023{
86bf43c7 1024 return __rtnl_talk(rtnl, n, answer, false, NULL);
463d9efa
DA
1025}
1026
449b824a
ND
1027int rtnl_listen_all_nsid(struct rtnl_handle *rth)
1028{
1029 unsigned int on = 1;
1030
1031 if (setsockopt(rth->fd, SOL_NETLINK, NETLINK_LISTEN_ALL_NSID, &on,
1032 sizeof(on)) < 0) {
1033 perror("NETLINK_LISTEN_ALL_NSID");
1034 return -1;
1035 }
1036 rth->flags |= RTNL_HANDLE_F_LISTEN_ALL_NSID;
1037 return 0;
1038}
1039
8ed63ab1 1040int rtnl_listen(struct rtnl_handle *rtnl,
0628cddd 1041 rtnl_listen_filter_t handler,
6dc9f016 1042 void *jarg)
aba5acdf
SH
1043{
1044 int status;
1045 struct nlmsghdr *h;
d17b136f 1046 struct sockaddr_nl nladdr = { .nl_family = AF_NETLINK };
aba5acdf 1047 struct iovec iov;
aba5acdf 1048 struct msghdr msg = {
8ed63ab1
SH
1049 .msg_name = &nladdr,
1050 .msg_namelen = sizeof(nladdr),
1051 .msg_iov = &iov,
1052 .msg_iovlen = 1,
aba5acdf 1053 };
e557212e 1054 char buf[16384];
449b824a
ND
1055 char cmsgbuf[BUFSIZ];
1056
1057 if (rtnl->flags & RTNL_HANDLE_F_LISTEN_ALL_NSID) {
1058 msg.msg_control = &cmsgbuf;
1059 msg.msg_controllen = sizeof(cmsgbuf);
1060 }
aba5acdf 1061
aba5acdf 1062 iov.iov_base = buf;
aba5acdf 1063 while (1) {
449b824a
ND
1064 struct rtnl_ctrl_data ctrl;
1065 struct cmsghdr *cmsg;
1066
aba5acdf
SH
1067 iov.iov_len = sizeof(buf);
1068 status = recvmsg(rtnl->fd, &msg, 0);
1069
1070 if (status < 0) {
aa8032e6 1071 if (errno == EINTR || errno == EAGAIN)
aba5acdf 1072 continue;
aa8032e6
SH
1073 fprintf(stderr, "netlink receive error %s (%d)\n",
1074 strerror(errno), errno);
7f03191f
PM
1075 if (errno == ENOBUFS)
1076 continue;
aa8032e6 1077 return -1;
aba5acdf
SH
1078 }
1079 if (status == 0) {
1080 fprintf(stderr, "EOF on netlink\n");
1081 return -1;
1082 }
1083 if (msg.msg_namelen != sizeof(nladdr)) {
2c500a4d
SH
1084 fprintf(stderr,
1085 "Sender address length == %d\n",
1086 msg.msg_namelen);
aba5acdf
SH
1087 exit(1);
1088 }
449b824a
ND
1089
1090 if (rtnl->flags & RTNL_HANDLE_F_LISTEN_ALL_NSID) {
1091 memset(&ctrl, 0, sizeof(ctrl));
1092 ctrl.nsid = -1;
1093 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg;
1094 cmsg = CMSG_NXTHDR(&msg, cmsg))
1095 if (cmsg->cmsg_level == SOL_NETLINK &&
1096 cmsg->cmsg_type == NETLINK_LISTEN_ALL_NSID &&
1097 cmsg->cmsg_len == CMSG_LEN(sizeof(int))) {
1098 int *data = (int *)CMSG_DATA(cmsg);
1099
1100 ctrl.nsid = *data;
1101 }
1102 }
1103
2c500a4d 1104 for (h = (struct nlmsghdr *)buf; status >= sizeof(*h); ) {
aba5acdf
SH
1105 int err;
1106 int len = h->nlmsg_len;
1107 int l = len - sizeof(*h);
1108
2c500a4d 1109 if (l < 0 || len > status) {
aba5acdf
SH
1110 if (msg.msg_flags & MSG_TRUNC) {
1111 fprintf(stderr, "Truncated message\n");
1112 return -1;
1113 }
2c500a4d
SH
1114 fprintf(stderr,
1115 "!!!malformed message: len=%d\n",
1116 len);
aba5acdf
SH
1117 exit(1);
1118 }
1119
cd554f2c 1120 err = handler(&ctrl, h, jarg);
aba5acdf
SH
1121 if (err < 0)
1122 return err;
1123
1124 status -= NLMSG_ALIGN(len);
2c500a4d 1125 h = (struct nlmsghdr *)((char *)h + NLMSG_ALIGN(len));
aba5acdf
SH
1126 }
1127 if (msg.msg_flags & MSG_TRUNC) {
1128 fprintf(stderr, "Message truncated\n");
1129 continue;
1130 }
1131 if (status) {
1132 fprintf(stderr, "!!!Remnant of size %d\n", status);
1133 exit(1);
1134 }
1135 }
1136}
1137
0628cddd 1138int rtnl_from_file(FILE *rtnl, rtnl_listen_filter_t handler,
6dc9f016 1139 void *jarg)
aba5acdf
SH
1140{
1141 int status;
2c500a4d
SH
1142 char buf[16384];
1143 struct nlmsghdr *h = (struct nlmsghdr *)buf;
aba5acdf 1144
aba5acdf 1145 while (1) {
2dd9f8e0 1146 int err, len;
aba5acdf
SH
1147 int l;
1148
1149 status = fread(&buf, 1, sizeof(*h), rtnl);
1150
1151 if (status < 0) {
1152 if (errno == EINTR)
1153 continue;
1154 perror("rtnl_from_file: fread");
1155 return -1;
1156 }
1157 if (status == 0)
1158 return 0;
1159
1160 len = h->nlmsg_len;
aba5acdf
SH
1161 l = len - sizeof(*h);
1162
2c500a4d 1163 if (l < 0 || len > sizeof(buf)) {
aba5acdf
SH
1164 fprintf(stderr, "!!!malformed message: len=%d @%lu\n",
1165 len, ftell(rtnl));
1166 return -1;
1167 }
1168
1169 status = fread(NLMSG_DATA(h), 1, NLMSG_ALIGN(l), rtnl);
1170
1171 if (status < 0) {
1172 perror("rtnl_from_file: fread");
1173 return -1;
1174 }
1175 if (status < l) {
1176 fprintf(stderr, "rtnl-from_file: truncated message\n");
1177 return -1;
1178 }
1179
cd554f2c 1180 err = handler(NULL, h, jarg);
aba5acdf
SH
1181 if (err < 0)
1182 return err;
1183 }
1184}
1185
2aa3dd29
SH
1186int addattr(struct nlmsghdr *n, int maxlen, int type)
1187{
1188 return addattr_l(n, maxlen, type, NULL, 0);
1189}
1190
1191int addattr8(struct nlmsghdr *n, int maxlen, int type, __u8 data)
1192{
1193 return addattr_l(n, maxlen, type, &data, sizeof(__u8));
1194}
1195
1196int addattr16(struct nlmsghdr *n, int maxlen, int type, __u16 data)
1197{
1198 return addattr_l(n, maxlen, type, &data, sizeof(__u16));
1199}
1200
aba5acdf
SH
1201int addattr32(struct nlmsghdr *n, int maxlen, int type, __u32 data)
1202{
2aa3dd29
SH
1203 return addattr_l(n, maxlen, type, &data, sizeof(__u32));
1204}
1205
1206int addattr64(struct nlmsghdr *n, int maxlen, int type, __u64 data)
1207{
1208 return addattr_l(n, maxlen, type, &data, sizeof(__u64));
1209}
1210
1211int addattrstrz(struct nlmsghdr *n, int maxlen, int type, const char *str)
1212{
1213 return addattr_l(n, maxlen, type, str, strlen(str)+1);
aba5acdf
SH
1214}
1215
8ed63ab1 1216int addattr_l(struct nlmsghdr *n, int maxlen, int type, const void *data,
6dc9f016 1217 int alen)
aba5acdf
SH
1218{
1219 int len = RTA_LENGTH(alen);
1220 struct rtattr *rta;
1221
3dabdbb3 1222 if (NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len) > maxlen) {
2c500a4d
SH
1223 fprintf(stderr,
1224 "addattr_l ERROR: message exceeded bound of %d\n",
1225 maxlen);
aba5acdf 1226 return -1;
007d3a3e 1227 }
07f94362 1228 rta = NLMSG_TAIL(n);
aba5acdf
SH
1229 rta->rta_type = type;
1230 rta->rta_len = len;
893deac4
PS
1231 if (alen)
1232 memcpy(RTA_DATA(rta), data, alen);
3dabdbb3 1233 n->nlmsg_len = NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len);
aba5acdf
SH
1234 return 0;
1235}
1236
07f94362 1237int addraw_l(struct nlmsghdr *n, int maxlen, const void *data, int len)
1238{
1239 if (NLMSG_ALIGN(n->nlmsg_len) + NLMSG_ALIGN(len) > maxlen) {
2c500a4d
SH
1240 fprintf(stderr,
1241 "addraw_l ERROR: message exceeded bound of %d\n",
1242 maxlen);
07f94362 1243 return -1;
1244 }
1245
1246 memcpy(NLMSG_TAIL(n), data, len);
1247 memset((void *) NLMSG_TAIL(n) + len, 0, NLMSG_ALIGN(len) - len);
1248 n->nlmsg_len = NLMSG_ALIGN(n->nlmsg_len) + NLMSG_ALIGN(len);
1249 return 0;
1250}
1251
2f90c9c0
PM
1252struct rtattr *addattr_nest(struct nlmsghdr *n, int maxlen, int type)
1253{
1254 struct rtattr *nest = NLMSG_TAIL(n);
1255
1256 addattr_l(n, maxlen, type, NULL, 0);
1257 return nest;
1258}
1259
1260int addattr_nest_end(struct nlmsghdr *n, struct rtattr *nest)
1261{
1262 nest->rta_len = (void *)NLMSG_TAIL(n) - (void *)nest;
1263 return n->nlmsg_len;
1264}
1265
1266struct rtattr *addattr_nest_compat(struct nlmsghdr *n, int maxlen, int type,
1267 const void *data, int len)
1268{
1269 struct rtattr *start = NLMSG_TAIL(n);
1270
1271 addattr_l(n, maxlen, type, data, len);
1272 addattr_nest(n, maxlen, type);
1273 return start;
1274}
1275
1276int addattr_nest_compat_end(struct nlmsghdr *n, struct rtattr *start)
1277{
1278 struct rtattr *nest = (void *)start + NLMSG_ALIGN(start->rta_len);
1279
1280 start->rta_len = (void *)NLMSG_TAIL(n) - (void *)start;
1281 addattr_nest_end(n, nest);
1282 return n->nlmsg_len;
1283}
1284
aba5acdf
SH
1285int rta_addattr32(struct rtattr *rta, int maxlen, int type, __u32 data)
1286{
1287 int len = RTA_LENGTH(4);
1288 struct rtattr *subrta;
1289
007d3a3e 1290 if (RTA_ALIGN(rta->rta_len) + len > maxlen) {
2c500a4d
SH
1291 fprintf(stderr,
1292 "rta_addattr32: Error! max allowed bound %d exceeded\n",
1293 maxlen);
aba5acdf 1294 return -1;
007d3a3e 1295 }
2c500a4d 1296 subrta = (struct rtattr *)(((char *)rta) + RTA_ALIGN(rta->rta_len));
aba5acdf
SH
1297 subrta->rta_type = type;
1298 subrta->rta_len = len;
1299 memcpy(RTA_DATA(subrta), &data, 4);
1300 rta->rta_len = NLMSG_ALIGN(rta->rta_len) + len;
1301 return 0;
1302}
1303
8ed63ab1 1304int rta_addattr_l(struct rtattr *rta, int maxlen, int type,
6dc9f016 1305 const void *data, int alen)
aba5acdf
SH
1306{
1307 struct rtattr *subrta;
1308 int len = RTA_LENGTH(alen);
1309
3dabdbb3 1310 if (RTA_ALIGN(rta->rta_len) + RTA_ALIGN(len) > maxlen) {
2c500a4d
SH
1311 fprintf(stderr,
1312 "rta_addattr_l: Error! max allowed bound %d exceeded\n",
1313 maxlen);
aba5acdf 1314 return -1;
007d3a3e 1315 }
2c500a4d 1316 subrta = (struct rtattr *)(((char *)rta) + RTA_ALIGN(rta->rta_len));
aba5acdf
SH
1317 subrta->rta_type = type;
1318 subrta->rta_len = len;
893deac4
PS
1319 if (alen)
1320 memcpy(RTA_DATA(subrta), data, alen);
3dabdbb3 1321 rta->rta_len = NLMSG_ALIGN(rta->rta_len) + RTA_ALIGN(len);
aba5acdf
SH
1322 return 0;
1323}
1324
303cc9cb
RP
1325int rta_addattr8(struct rtattr *rta, int maxlen, int type, __u8 data)
1326{
1327 return rta_addattr_l(rta, maxlen, type, &data, sizeof(__u8));
1328}
1329
1330int rta_addattr16(struct rtattr *rta, int maxlen, int type, __u16 data)
1331{
1332 return rta_addattr_l(rta, maxlen, type, &data, sizeof(__u16));
1333}
1334
1335int rta_addattr64(struct rtattr *rta, int maxlen, int type, __u64 data)
1336{
1337 return rta_addattr_l(rta, maxlen, type, &data, sizeof(__u64));
1338}
1339
1340struct rtattr *rta_nest(struct rtattr *rta, int maxlen, int type)
1341{
1342 struct rtattr *nest = RTA_TAIL(rta);
1343
1344 rta_addattr_l(rta, maxlen, type, NULL, 0);
2360b8cb 1345 nest->rta_type |= NLA_F_NESTED;
303cc9cb
RP
1346
1347 return nest;
1348}
1349
1350int rta_nest_end(struct rtattr *rta, struct rtattr *nest)
1351{
1352 nest->rta_len = (void *)RTA_TAIL(rta) - (void *)nest;
1353
1354 return rta->rta_len;
1355}
1356
aba5acdf
SH
1357int parse_rtattr(struct rtattr *tb[], int max, struct rtattr *rta, int len)
1358{
b1b7ce0f
VY
1359 return parse_rtattr_flags(tb, max, rta, len, 0);
1360}
1361
1362int parse_rtattr_flags(struct rtattr *tb[], int max, struct rtattr *rta,
1363 int len, unsigned short flags)
1364{
1365 unsigned short type;
1366
175e2440 1367 memset(tb, 0, sizeof(struct rtattr *) * (max + 1));
aba5acdf 1368 while (RTA_OK(rta, len)) {
b1b7ce0f
VY
1369 type = rta->rta_type & ~flags;
1370 if ((type <= max) && (!tb[type]))
1371 tb[type] = rta;
2c500a4d 1372 rta = RTA_NEXT(rta, len);
aba5acdf
SH
1373 }
1374 if (len)
2c500a4d
SH
1375 fprintf(stderr, "!!!Deficit %d, rta_len=%d\n",
1376 len, rta->rta_len);
aba5acdf
SH
1377 return 0;
1378}
c7699875 1379
decbb437
JP
1380struct rtattr *parse_rtattr_one(int type, struct rtattr *rta, int len)
1381{
1382 while (RTA_OK(rta, len)) {
1383 if (rta->rta_type == type)
1384 return rta;
1385 rta = RTA_NEXT(rta, len);
1386 }
2c500a4d 1387
decbb437 1388 if (len)
2c500a4d
SH
1389 fprintf(stderr, "!!!Deficit %d, rta_len=%d\n",
1390 len, rta->rta_len);
decbb437
JP
1391 return NULL;
1392}
1393
2c500a4d
SH
1394int __parse_rtattr_nested_compat(struct rtattr *tb[], int max,
1395 struct rtattr *rta,
1396 int len)
2f90c9c0
PM
1397{
1398 if (RTA_PAYLOAD(rta) < len)
1399 return -1;
1400 if (RTA_PAYLOAD(rta) >= RTA_ALIGN(len) + sizeof(struct rtattr)) {
1401 rta = RTA_DATA(rta) + RTA_ALIGN(len);
1402 return parse_rtattr_nested(tb, max, rta);
1403 }
037c635e 1404 memset(tb, 0, sizeof(struct rtattr *) * (max + 1));
2f90c9c0
PM
1405 return 0;
1406}