2 * libnetlink.c RTnetlink service routines.
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
18 #include <net/if_arp.h>
19 #include <sys/socket.h>
20 #include <netinet/in.h>
25 #include <linux/fib_rules.h>
26 #include <linux/if_addrlabel.h>
27 #include <linux/if_bridge.h>
29 #include "libnetlink.h"
32 #define SOL_NETLINK 270
36 #define MIN(a, b) ((a) < (b) ? (a) : (b))
39 int rcvbuf
= 1024 * 1024;
42 #include <libmnl/libmnl.h>
44 static const enum mnl_attr_data_type extack_policy
[NLMSGERR_ATTR_MAX
+ 1] = {
45 [NLMSGERR_ATTR_MSG
] = MNL_TYPE_NUL_STRING
,
46 [NLMSGERR_ATTR_OFFS
] = MNL_TYPE_U32
,
49 static int err_attr_cb(const struct nlattr
*attr
, void *data
)
51 const struct nlattr
**tb
= data
;
54 if (mnl_attr_type_valid(attr
, NLMSGERR_ATTR_MAX
) < 0) {
55 fprintf(stderr
, "Invalid extack attribute\n");
59 type
= mnl_attr_get_type(attr
);
60 if (mnl_attr_validate(attr
, extack_policy
[type
]) < 0) {
61 fprintf(stderr
, "extack attribute %d failed validation\n",
70 /* dump netlink extended ack error message */
71 int nl_dump_ext_ack(const struct nlmsghdr
*nlh
, nl_ext_ack_fn_t errfn
)
73 struct nlattr
*tb
[NLMSGERR_ATTR_MAX
+ 1] = {};
74 const struct nlmsgerr
*err
= mnl_nlmsg_get_payload(nlh
);
75 const struct nlmsghdr
*err_nlh
= NULL
;
76 unsigned int hlen
= sizeof(*err
);
77 const char *msg
= NULL
;
80 /* no TLVs, nothing to do here */
81 if (!(nlh
->nlmsg_flags
& NLM_F_ACK_TLVS
))
84 /* if NLM_F_CAPPED is set then the inner err msg was capped */
85 if (!(nlh
->nlmsg_flags
& NLM_F_CAPPED
))
86 hlen
+= mnl_nlmsg_get_payload_len(&err
->msg
);
88 if (mnl_attr_parse(nlh
, hlen
, err_attr_cb
, tb
) != MNL_CB_OK
)
91 if (tb
[NLMSGERR_ATTR_MSG
])
92 msg
= mnl_attr_get_str(tb
[NLMSGERR_ATTR_MSG
]);
94 if (tb
[NLMSGERR_ATTR_OFFS
]) {
95 off
= mnl_attr_get_u32(tb
[NLMSGERR_ATTR_OFFS
]);
97 if (off
> nlh
->nlmsg_len
) {
99 "Invalid offset for NLMSGERR_ATTR_OFFS\n");
101 } else if (!(nlh
->nlmsg_flags
& NLM_F_CAPPED
))
106 return errfn(msg
, off
, err_nlh
);
108 if (msg
&& *msg
!= '\0') {
109 bool is_err
= !!err
->error
;
111 fprintf(stderr
, "%s: %s",
112 is_err
? "Error" : "Warning", msg
);
113 if (msg
[strlen(msg
) - 1] != '.')
114 fprintf(stderr
, ".");
115 fprintf(stderr
, "\n");
117 return is_err
? 1 : 0;
123 #warning "libmnl required for error support"
125 /* No extended error ack without libmnl */
126 int nl_dump_ext_ack(const struct nlmsghdr
*nlh
, nl_ext_ack_fn_t errfn
)
132 void rtnl_close(struct rtnl_handle
*rth
)
140 int rtnl_open_byproto(struct rtnl_handle
*rth
, unsigned int subscriptions
,
147 memset(rth
, 0, sizeof(*rth
));
149 rth
->proto
= protocol
;
150 rth
->fd
= socket(AF_NETLINK
, SOCK_RAW
| SOCK_CLOEXEC
, protocol
);
152 perror("Cannot open netlink socket");
156 if (setsockopt(rth
->fd
, SOL_SOCKET
, SO_SNDBUF
,
157 &sndbuf
, sizeof(sndbuf
)) < 0) {
162 if (setsockopt(rth
->fd
, SOL_SOCKET
, SO_RCVBUF
,
163 &rcvbuf
, sizeof(rcvbuf
)) < 0) {
168 /* Older kernels may no support extended ACK reporting */
169 setsockopt(rth
->fd
, SOL_NETLINK
, NETLINK_EXT_ACK
,
172 memset(&rth
->local
, 0, sizeof(rth
->local
));
173 rth
->local
.nl_family
= AF_NETLINK
;
174 rth
->local
.nl_groups
= subscriptions
;
176 if (bind(rth
->fd
, (struct sockaddr
*)&rth
->local
,
177 sizeof(rth
->local
)) < 0) {
178 perror("Cannot bind netlink socket");
181 addr_len
= sizeof(rth
->local
);
182 if (getsockname(rth
->fd
, (struct sockaddr
*)&rth
->local
,
184 perror("Cannot getsockname");
187 if (addr_len
!= sizeof(rth
->local
)) {
188 fprintf(stderr
, "Wrong address length %d\n", addr_len
);
191 if (rth
->local
.nl_family
!= AF_NETLINK
) {
192 fprintf(stderr
, "Wrong address family %d\n",
193 rth
->local
.nl_family
);
196 rth
->seq
= time(NULL
);
200 int rtnl_open(struct rtnl_handle
*rth
, unsigned int subscriptions
)
202 return rtnl_open_byproto(rth
, subscriptions
, NETLINK_ROUTE
);
205 int rtnl_addrdump_req(struct rtnl_handle
*rth
, int family
)
209 struct ifaddrmsg ifm
;
211 .nlh
.nlmsg_len
= sizeof(req
),
212 .nlh
.nlmsg_type
= RTM_GETADDR
,
213 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
214 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
215 .ifm
.ifa_family
= family
,
218 return send(rth
->fd
, &req
, sizeof(req
), 0);
221 int rtnl_addrlbldump_req(struct rtnl_handle
*rth
, int family
)
225 struct ifaddrlblmsg ifal
;
227 .nlh
.nlmsg_len
= sizeof(req
),
228 .nlh
.nlmsg_type
= RTM_GETADDRLABEL
,
229 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
230 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
231 .ifal
.ifal_family
= family
,
234 return send(rth
->fd
, &req
, sizeof(req
), 0);
237 int rtnl_routedump_req(struct rtnl_handle
*rth
, int family
)
243 .nlh
.nlmsg_len
= sizeof(req
),
244 .nlh
.nlmsg_type
= RTM_GETROUTE
,
245 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
246 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
247 .rtm
.rtm_family
= family
,
250 return send(rth
->fd
, &req
, sizeof(req
), 0);
253 int rtnl_ruledump_req(struct rtnl_handle
*rth
, int family
)
257 struct fib_rule_hdr frh
;
259 .nlh
.nlmsg_len
= sizeof(req
),
260 .nlh
.nlmsg_type
= RTM_GETRULE
,
261 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
262 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
266 return send(rth
->fd
, &req
, sizeof(req
), 0);
269 int rtnl_mdbdump_req(struct rtnl_handle
*rth
, int family
)
273 struct br_port_msg bpm
;
275 .nlh
.nlmsg_len
= sizeof(req
),
276 .nlh
.nlmsg_type
= RTM_GETMDB
,
277 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
278 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
279 .bpm
.family
= family
,
282 return send(rth
->fd
, &req
, sizeof(req
), 0);
285 int rtnl_netconfdump_req(struct rtnl_handle
*rth
, int family
)
289 struct netconfmsg ncm
;
291 .nlh
.nlmsg_len
= sizeof(req
),
292 .nlh
.nlmsg_type
= RTM_GETNETCONF
,
293 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
294 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
295 .ncm
.ncm_family
= family
,
298 return send(rth
->fd
, &req
, sizeof(req
), 0);
301 int rtnl_wilddump_request(struct rtnl_handle
*rth
, int family
, int type
)
303 return rtnl_wilddump_req_filter(rth
, family
, type
, RTEXT_FILTER_VF
);
306 int rtnl_wilddump_req_filter(struct rtnl_handle
*rth
, int family
, int type
,
311 struct ifinfomsg ifm
;
312 /* attribute has to be NLMSG aligned */
313 struct rtattr ext_req
__attribute__ ((aligned(NLMSG_ALIGNTO
)));
314 __u32 ext_filter_mask
;
316 .nlh
.nlmsg_len
= sizeof(req
),
317 .nlh
.nlmsg_type
= type
,
318 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
319 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
320 .ifm
.ifi_family
= family
,
321 .ext_req
.rta_type
= IFLA_EXT_MASK
,
322 .ext_req
.rta_len
= RTA_LENGTH(sizeof(__u32
)),
323 .ext_filter_mask
= filt_mask
,
326 return send(rth
->fd
, &req
, sizeof(req
), 0);
329 int rtnl_wilddump_req_filter_fn(struct rtnl_handle
*rth
, int family
, int type
,
330 req_filter_fn_t filter_fn
)
334 struct ifinfomsg ifm
;
337 .nlh
.nlmsg_len
= NLMSG_LENGTH(sizeof(struct ifinfomsg
)),
338 .nlh
.nlmsg_type
= type
,
339 .nlh
.nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
340 .nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
,
341 .ifm
.ifi_family
= family
,
348 err
= filter_fn(&req
.nlh
, sizeof(req
));
352 return send(rth
->fd
, &req
, req
.nlh
.nlmsg_len
, 0);
355 int rtnl_wilddump_stats_req_filter(struct rtnl_handle
*rth
, int fam
, int type
,
360 struct if_stats_msg ifsm
;
363 memset(&req
, 0, sizeof(req
));
364 req
.nlh
.nlmsg_len
= NLMSG_LENGTH(sizeof(struct if_stats_msg
));
365 req
.nlh
.nlmsg_type
= type
;
366 req
.nlh
.nlmsg_flags
= NLM_F_DUMP
|NLM_F_REQUEST
;
367 req
.nlh
.nlmsg_pid
= 0;
368 req
.nlh
.nlmsg_seq
= rth
->dump
= ++rth
->seq
;
369 req
.ifsm
.family
= fam
;
370 req
.ifsm
.filter_mask
= filt_mask
;
372 return send(rth
->fd
, &req
, sizeof(req
), 0);
375 int rtnl_send(struct rtnl_handle
*rth
, const void *buf
, int len
)
377 return send(rth
->fd
, buf
, len
, 0);
380 int rtnl_send_check(struct rtnl_handle
*rth
, const void *buf
, int len
)
386 status
= send(rth
->fd
, buf
, len
, 0);
390 /* Check for immediate errors */
391 status
= recv(rth
->fd
, resp
, sizeof(resp
), MSG_DONTWAIT
|MSG_PEEK
);
398 for (h
= (struct nlmsghdr
*)resp
; NLMSG_OK(h
, status
);
399 h
= NLMSG_NEXT(h
, status
)) {
400 if (h
->nlmsg_type
== NLMSG_ERROR
) {
401 struct nlmsgerr
*err
= (struct nlmsgerr
*)NLMSG_DATA(h
);
403 if (h
->nlmsg_len
< NLMSG_LENGTH(sizeof(struct nlmsgerr
)))
404 fprintf(stderr
, "ERROR truncated\n");
414 int rtnl_dump_request(struct rtnl_handle
*rth
, int type
, void *req
, int len
)
416 struct nlmsghdr nlh
= {
417 .nlmsg_len
= NLMSG_LENGTH(len
),
419 .nlmsg_flags
= NLM_F_DUMP
| NLM_F_REQUEST
,
420 .nlmsg_seq
= rth
->dump
= ++rth
->seq
,
422 struct sockaddr_nl nladdr
= { .nl_family
= AF_NETLINK
};
423 struct iovec iov
[2] = {
424 { .iov_base
= &nlh
, .iov_len
= sizeof(nlh
) },
425 { .iov_base
= req
, .iov_len
= len
}
427 struct msghdr msg
= {
429 .msg_namelen
= sizeof(nladdr
),
434 return sendmsg(rth
->fd
, &msg
, 0);
437 int rtnl_dump_request_n(struct rtnl_handle
*rth
, struct nlmsghdr
*n
)
439 struct sockaddr_nl nladdr
= { .nl_family
= AF_NETLINK
};
442 .iov_len
= n
->nlmsg_len
444 struct msghdr msg
= {
446 .msg_namelen
= sizeof(nladdr
),
451 n
->nlmsg_flags
= NLM_F_DUMP
|NLM_F_REQUEST
;
453 n
->nlmsg_seq
= rth
->dump
= ++rth
->seq
;
455 return sendmsg(rth
->fd
, &msg
, 0);
458 static int rtnl_dump_done(struct nlmsghdr
*h
)
460 int len
= *(int *)NLMSG_DATA(h
);
462 if (h
->nlmsg_len
< NLMSG_LENGTH(sizeof(int))) {
463 fprintf(stderr
, "DONE truncated\n");
475 "Error: Buffer too small for object.\n");
478 perror("RTNETLINK answers");
483 /* check for any messages returned from kernel */
484 nl_dump_ext_ack(h
, NULL
);
489 static void rtnl_dump_error(const struct rtnl_handle
*rth
,
493 if (h
->nlmsg_len
< NLMSG_LENGTH(sizeof(struct nlmsgerr
))) {
494 fprintf(stderr
, "ERROR truncated\n");
496 const struct nlmsgerr
*err
= (struct nlmsgerr
*)NLMSG_DATA(h
);
499 if (rth
->proto
== NETLINK_SOCK_DIAG
&&
501 errno
== EOPNOTSUPP
))
504 if (!(rth
->flags
& RTNL_HANDLE_F_SUPPRESS_NLERR
))
505 perror("RTNETLINK answers");
509 static int __rtnl_recvmsg(int fd
, struct msghdr
*msg
, int flags
)
514 len
= recvmsg(fd
, msg
, flags
);
515 } while (len
< 0 && (errno
== EINTR
|| errno
== EAGAIN
));
518 fprintf(stderr
, "netlink receive error %s (%d)\n",
519 strerror(errno
), errno
);
524 fprintf(stderr
, "EOF on netlink\n");
531 static int rtnl_recvmsg(int fd
, struct msghdr
*msg
, char **answer
)
533 struct iovec
*iov
= msg
->msg_iov
;
537 iov
->iov_base
= NULL
;
540 len
= __rtnl_recvmsg(fd
, msg
, MSG_PEEK
| MSG_TRUNC
);
546 fprintf(stderr
, "malloc error: not enough buffer\n");
553 len
= __rtnl_recvmsg(fd
, msg
, 0);
567 int rtnl_dump_filter_l(struct rtnl_handle
*rth
,
568 const struct rtnl_dump_filter_arg
*arg
)
570 struct sockaddr_nl nladdr
;
572 struct msghdr msg
= {
574 .msg_namelen
= sizeof(nladdr
),
583 const struct rtnl_dump_filter_arg
*a
;
587 status
= rtnl_recvmsg(rth
->fd
, &msg
, &buf
);
592 fwrite(buf
, 1, NLMSG_ALIGN(status
), rth
->dump_fp
);
594 for (a
= arg
; a
->filter
; a
++) {
595 struct nlmsghdr
*h
= (struct nlmsghdr
*)buf
;
599 while (NLMSG_OK(h
, msglen
)) {
602 h
->nlmsg_flags
&= ~a
->nc_flags
;
604 if (nladdr
.nl_pid
!= 0 ||
605 h
->nlmsg_pid
!= rth
->local
.nl_pid
||
606 h
->nlmsg_seq
!= rth
->dump
)
609 if (h
->nlmsg_flags
& NLM_F_DUMP_INTR
)
612 if (h
->nlmsg_type
== NLMSG_DONE
) {
613 err
= rtnl_dump_done(h
);
620 break; /* process next filter */
623 if (h
->nlmsg_type
== NLMSG_ERROR
) {
624 rtnl_dump_error(rth
, h
);
630 err
= a
->filter(&nladdr
, h
, a
->arg1
);
638 h
= NLMSG_NEXT(h
, msglen
);
646 "Dump was interrupted and may be inconsistent.\n");
650 if (msg
.msg_flags
& MSG_TRUNC
) {
651 fprintf(stderr
, "Message truncated\n");
655 fprintf(stderr
, "!!!Remnant of size %d\n", msglen
);
661 int rtnl_dump_filter_nc(struct rtnl_handle
*rth
,
662 rtnl_filter_t filter
,
663 void *arg1
, __u16 nc_flags
)
665 const struct rtnl_dump_filter_arg a
[2] = {
666 { .filter
= filter
, .arg1
= arg1
, .nc_flags
= nc_flags
, },
667 { .filter
= NULL
, .arg1
= NULL
, .nc_flags
= 0, },
670 return rtnl_dump_filter_l(rth
, a
);
673 static void rtnl_talk_error(struct nlmsghdr
*h
, struct nlmsgerr
*err
,
674 nl_ext_ack_fn_t errfn
)
676 if (nl_dump_ext_ack(h
, errfn
))
679 fprintf(stderr
, "RTNETLINK answers: %s\n",
680 strerror(-err
->error
));
684 static int __rtnl_talk_iov(struct rtnl_handle
*rtnl
, struct iovec
*iov
,
685 size_t iovlen
, struct nlmsghdr
**answer
,
686 bool show_rtnl_err
, nl_ext_ack_fn_t errfn
)
688 struct sockaddr_nl nladdr
= { .nl_family
= AF_NETLINK
};
690 struct msghdr msg
= {
692 .msg_namelen
= sizeof(nladdr
),
694 .msg_iovlen
= iovlen
,
696 unsigned int seq
= 0;
701 for (i
= 0; i
< iovlen
; i
++) {
703 h
->nlmsg_seq
= seq
= ++rtnl
->seq
;
705 h
->nlmsg_flags
|= NLM_F_ACK
;
708 status
= sendmsg(rtnl
->fd
, &msg
, 0);
710 perror("Cannot talk to rtnetlink");
714 /* change msg to use the response iov */
719 status
= rtnl_recvmsg(rtnl
->fd
, &msg
, &buf
);
725 if (msg
.msg_namelen
!= sizeof(nladdr
)) {
727 "sender address length == %d\n",
731 for (h
= (struct nlmsghdr
*)buf
; status
>= sizeof(*h
); ) {
732 int len
= h
->nlmsg_len
;
733 int l
= len
- sizeof(*h
);
735 if (l
< 0 || len
> status
) {
736 if (msg
.msg_flags
& MSG_TRUNC
) {
737 fprintf(stderr
, "Truncated message\n");
742 "!!!malformed message: len=%d\n",
747 if (nladdr
.nl_pid
!= 0 ||
748 h
->nlmsg_pid
!= rtnl
->local
.nl_pid
||
749 h
->nlmsg_seq
> seq
|| h
->nlmsg_seq
< seq
- iovlen
) {
750 /* Don't forget to skip that message. */
751 status
-= NLMSG_ALIGN(len
);
752 h
= (struct nlmsghdr
*)((char *)h
+ NLMSG_ALIGN(len
));
756 if (h
->nlmsg_type
== NLMSG_ERROR
) {
757 struct nlmsgerr
*err
= (struct nlmsgerr
*)NLMSG_DATA(h
);
759 if (l
< sizeof(struct nlmsgerr
)) {
760 fprintf(stderr
, "ERROR truncated\n");
766 /* check messages from kernel */
767 nl_dump_ext_ack(h
, errfn
);
771 if (rtnl
->proto
!= NETLINK_SOCK_DIAG
&&
773 rtnl_talk_error(h
, err
, errfn
);
777 *answer
= (struct nlmsghdr
*)buf
;
781 return err
->error
? -i
: 0;
785 *answer
= (struct nlmsghdr
*)buf
;
789 fprintf(stderr
, "Unexpected reply!!!\n");
791 status
-= NLMSG_ALIGN(len
);
792 h
= (struct nlmsghdr
*)((char *)h
+ NLMSG_ALIGN(len
));
796 if (msg
.msg_flags
& MSG_TRUNC
) {
797 fprintf(stderr
, "Message truncated\n");
802 fprintf(stderr
, "!!!Remnant of size %d\n", status
);
808 static int __rtnl_talk(struct rtnl_handle
*rtnl
, struct nlmsghdr
*n
,
809 struct nlmsghdr
**answer
,
810 bool show_rtnl_err
, nl_ext_ack_fn_t errfn
)
814 .iov_len
= n
->nlmsg_len
817 return __rtnl_talk_iov(rtnl
, &iov
, 1, answer
, show_rtnl_err
, errfn
);
820 int rtnl_talk(struct rtnl_handle
*rtnl
, struct nlmsghdr
*n
,
821 struct nlmsghdr
**answer
)
823 return __rtnl_talk(rtnl
, n
, answer
, true, NULL
);
826 int rtnl_talk_iov(struct rtnl_handle
*rtnl
, struct iovec
*iovec
, size_t iovlen
,
827 struct nlmsghdr
**answer
)
829 return __rtnl_talk_iov(rtnl
, iovec
, iovlen
, answer
, true, NULL
);
832 int rtnl_talk_extack(struct rtnl_handle
*rtnl
, struct nlmsghdr
*n
,
833 struct nlmsghdr
**answer
,
834 nl_ext_ack_fn_t errfn
)
836 return __rtnl_talk(rtnl
, n
, answer
, true, errfn
);
839 int rtnl_talk_suppress_rtnl_errmsg(struct rtnl_handle
*rtnl
, struct nlmsghdr
*n
,
840 struct nlmsghdr
**answer
)
842 return __rtnl_talk(rtnl
, n
, answer
, false, NULL
);
845 int rtnl_listen_all_nsid(struct rtnl_handle
*rth
)
849 if (setsockopt(rth
->fd
, SOL_NETLINK
, NETLINK_LISTEN_ALL_NSID
, &on
,
851 perror("NETLINK_LISTEN_ALL_NSID");
854 rth
->flags
|= RTNL_HANDLE_F_LISTEN_ALL_NSID
;
858 int rtnl_listen(struct rtnl_handle
*rtnl
,
859 rtnl_listen_filter_t handler
,
864 struct sockaddr_nl nladdr
= { .nl_family
= AF_NETLINK
};
866 struct msghdr msg
= {
868 .msg_namelen
= sizeof(nladdr
),
873 char cmsgbuf
[BUFSIZ
];
875 if (rtnl
->flags
& RTNL_HANDLE_F_LISTEN_ALL_NSID
) {
876 msg
.msg_control
= &cmsgbuf
;
877 msg
.msg_controllen
= sizeof(cmsgbuf
);
882 struct rtnl_ctrl_data ctrl
;
883 struct cmsghdr
*cmsg
;
885 iov
.iov_len
= sizeof(buf
);
886 status
= recvmsg(rtnl
->fd
, &msg
, 0);
889 if (errno
== EINTR
|| errno
== EAGAIN
)
891 fprintf(stderr
, "netlink receive error %s (%d)\n",
892 strerror(errno
), errno
);
893 if (errno
== ENOBUFS
)
898 fprintf(stderr
, "EOF on netlink\n");
901 if (msg
.msg_namelen
!= sizeof(nladdr
)) {
903 "Sender address length == %d\n",
908 if (rtnl
->flags
& RTNL_HANDLE_F_LISTEN_ALL_NSID
) {
909 memset(&ctrl
, 0, sizeof(ctrl
));
911 for (cmsg
= CMSG_FIRSTHDR(&msg
); cmsg
;
912 cmsg
= CMSG_NXTHDR(&msg
, cmsg
))
913 if (cmsg
->cmsg_level
== SOL_NETLINK
&&
914 cmsg
->cmsg_type
== NETLINK_LISTEN_ALL_NSID
&&
915 cmsg
->cmsg_len
== CMSG_LEN(sizeof(int))) {
916 int *data
= (int *)CMSG_DATA(cmsg
);
922 for (h
= (struct nlmsghdr
*)buf
; status
>= sizeof(*h
); ) {
924 int len
= h
->nlmsg_len
;
925 int l
= len
- sizeof(*h
);
927 if (l
< 0 || len
> status
) {
928 if (msg
.msg_flags
& MSG_TRUNC
) {
929 fprintf(stderr
, "Truncated message\n");
933 "!!!malformed message: len=%d\n",
938 err
= handler(&nladdr
, &ctrl
, h
, jarg
);
942 status
-= NLMSG_ALIGN(len
);
943 h
= (struct nlmsghdr
*)((char *)h
+ NLMSG_ALIGN(len
));
945 if (msg
.msg_flags
& MSG_TRUNC
) {
946 fprintf(stderr
, "Message truncated\n");
950 fprintf(stderr
, "!!!Remnant of size %d\n", status
);
956 int rtnl_from_file(FILE *rtnl
, rtnl_listen_filter_t handler
,
960 struct sockaddr_nl nladdr
= { .nl_family
= AF_NETLINK
};
962 struct nlmsghdr
*h
= (struct nlmsghdr
*)buf
;
968 status
= fread(&buf
, 1, sizeof(*h
), rtnl
);
973 perror("rtnl_from_file: fread");
980 l
= len
- sizeof(*h
);
982 if (l
< 0 || len
> sizeof(buf
)) {
983 fprintf(stderr
, "!!!malformed message: len=%d @%lu\n",
988 status
= fread(NLMSG_DATA(h
), 1, NLMSG_ALIGN(l
), rtnl
);
991 perror("rtnl_from_file: fread");
995 fprintf(stderr
, "rtnl-from_file: truncated message\n");
999 err
= handler(&nladdr
, NULL
, h
, jarg
);
1005 int addattr(struct nlmsghdr
*n
, int maxlen
, int type
)
1007 return addattr_l(n
, maxlen
, type
, NULL
, 0);
1010 int addattr8(struct nlmsghdr
*n
, int maxlen
, int type
, __u8 data
)
1012 return addattr_l(n
, maxlen
, type
, &data
, sizeof(__u8
));
1015 int addattr16(struct nlmsghdr
*n
, int maxlen
, int type
, __u16 data
)
1017 return addattr_l(n
, maxlen
, type
, &data
, sizeof(__u16
));
1020 int addattr32(struct nlmsghdr
*n
, int maxlen
, int type
, __u32 data
)
1022 return addattr_l(n
, maxlen
, type
, &data
, sizeof(__u32
));
1025 int addattr64(struct nlmsghdr
*n
, int maxlen
, int type
, __u64 data
)
1027 return addattr_l(n
, maxlen
, type
, &data
, sizeof(__u64
));
1030 int addattrstrz(struct nlmsghdr
*n
, int maxlen
, int type
, const char *str
)
1032 return addattr_l(n
, maxlen
, type
, str
, strlen(str
)+1);
1035 int addattr_l(struct nlmsghdr
*n
, int maxlen
, int type
, const void *data
,
1038 int len
= RTA_LENGTH(alen
);
1041 if (NLMSG_ALIGN(n
->nlmsg_len
) + RTA_ALIGN(len
) > maxlen
) {
1043 "addattr_l ERROR: message exceeded bound of %d\n",
1047 rta
= NLMSG_TAIL(n
);
1048 rta
->rta_type
= type
;
1051 memcpy(RTA_DATA(rta
), data
, alen
);
1052 n
->nlmsg_len
= NLMSG_ALIGN(n
->nlmsg_len
) + RTA_ALIGN(len
);
1056 int addraw_l(struct nlmsghdr
*n
, int maxlen
, const void *data
, int len
)
1058 if (NLMSG_ALIGN(n
->nlmsg_len
) + NLMSG_ALIGN(len
) > maxlen
) {
1060 "addraw_l ERROR: message exceeded bound of %d\n",
1065 memcpy(NLMSG_TAIL(n
), data
, len
);
1066 memset((void *) NLMSG_TAIL(n
) + len
, 0, NLMSG_ALIGN(len
) - len
);
1067 n
->nlmsg_len
= NLMSG_ALIGN(n
->nlmsg_len
) + NLMSG_ALIGN(len
);
1071 struct rtattr
*addattr_nest(struct nlmsghdr
*n
, int maxlen
, int type
)
1073 struct rtattr
*nest
= NLMSG_TAIL(n
);
1075 addattr_l(n
, maxlen
, type
, NULL
, 0);
1079 int addattr_nest_end(struct nlmsghdr
*n
, struct rtattr
*nest
)
1081 nest
->rta_len
= (void *)NLMSG_TAIL(n
) - (void *)nest
;
1082 return n
->nlmsg_len
;
1085 struct rtattr
*addattr_nest_compat(struct nlmsghdr
*n
, int maxlen
, int type
,
1086 const void *data
, int len
)
1088 struct rtattr
*start
= NLMSG_TAIL(n
);
1090 addattr_l(n
, maxlen
, type
, data
, len
);
1091 addattr_nest(n
, maxlen
, type
);
1095 int addattr_nest_compat_end(struct nlmsghdr
*n
, struct rtattr
*start
)
1097 struct rtattr
*nest
= (void *)start
+ NLMSG_ALIGN(start
->rta_len
);
1099 start
->rta_len
= (void *)NLMSG_TAIL(n
) - (void *)start
;
1100 addattr_nest_end(n
, nest
);
1101 return n
->nlmsg_len
;
1104 int rta_addattr32(struct rtattr
*rta
, int maxlen
, int type
, __u32 data
)
1106 int len
= RTA_LENGTH(4);
1107 struct rtattr
*subrta
;
1109 if (RTA_ALIGN(rta
->rta_len
) + len
> maxlen
) {
1111 "rta_addattr32: Error! max allowed bound %d exceeded\n",
1115 subrta
= (struct rtattr
*)(((char *)rta
) + RTA_ALIGN(rta
->rta_len
));
1116 subrta
->rta_type
= type
;
1117 subrta
->rta_len
= len
;
1118 memcpy(RTA_DATA(subrta
), &data
, 4);
1119 rta
->rta_len
= NLMSG_ALIGN(rta
->rta_len
) + len
;
1123 int rta_addattr_l(struct rtattr
*rta
, int maxlen
, int type
,
1124 const void *data
, int alen
)
1126 struct rtattr
*subrta
;
1127 int len
= RTA_LENGTH(alen
);
1129 if (RTA_ALIGN(rta
->rta_len
) + RTA_ALIGN(len
) > maxlen
) {
1131 "rta_addattr_l: Error! max allowed bound %d exceeded\n",
1135 subrta
= (struct rtattr
*)(((char *)rta
) + RTA_ALIGN(rta
->rta_len
));
1136 subrta
->rta_type
= type
;
1137 subrta
->rta_len
= len
;
1139 memcpy(RTA_DATA(subrta
), data
, alen
);
1140 rta
->rta_len
= NLMSG_ALIGN(rta
->rta_len
) + RTA_ALIGN(len
);
1144 int rta_addattr8(struct rtattr
*rta
, int maxlen
, int type
, __u8 data
)
1146 return rta_addattr_l(rta
, maxlen
, type
, &data
, sizeof(__u8
));
1149 int rta_addattr16(struct rtattr
*rta
, int maxlen
, int type
, __u16 data
)
1151 return rta_addattr_l(rta
, maxlen
, type
, &data
, sizeof(__u16
));
1154 int rta_addattr64(struct rtattr
*rta
, int maxlen
, int type
, __u64 data
)
1156 return rta_addattr_l(rta
, maxlen
, type
, &data
, sizeof(__u64
));
1159 struct rtattr
*rta_nest(struct rtattr
*rta
, int maxlen
, int type
)
1161 struct rtattr
*nest
= RTA_TAIL(rta
);
1163 rta_addattr_l(rta
, maxlen
, type
, NULL
, 0);
1168 int rta_nest_end(struct rtattr
*rta
, struct rtattr
*nest
)
1170 nest
->rta_len
= (void *)RTA_TAIL(rta
) - (void *)nest
;
1172 return rta
->rta_len
;
1175 int parse_rtattr(struct rtattr
*tb
[], int max
, struct rtattr
*rta
, int len
)
1177 return parse_rtattr_flags(tb
, max
, rta
, len
, 0);
1180 int parse_rtattr_flags(struct rtattr
*tb
[], int max
, struct rtattr
*rta
,
1181 int len
, unsigned short flags
)
1183 unsigned short type
;
1185 memset(tb
, 0, sizeof(struct rtattr
*) * (max
+ 1));
1186 while (RTA_OK(rta
, len
)) {
1187 type
= rta
->rta_type
& ~flags
;
1188 if ((type
<= max
) && (!tb
[type
]))
1190 rta
= RTA_NEXT(rta
, len
);
1193 fprintf(stderr
, "!!!Deficit %d, rta_len=%d\n",
1198 int parse_rtattr_byindex(struct rtattr
*tb
[], int max
,
1199 struct rtattr
*rta
, int len
)
1203 memset(tb
, 0, sizeof(struct rtattr
*) * max
);
1204 while (RTA_OK(rta
, len
)) {
1205 if (rta
->rta_type
<= max
&& i
< max
)
1207 rta
= RTA_NEXT(rta
, len
);
1210 fprintf(stderr
, "!!!Deficit %d, rta_len=%d\n",
1215 struct rtattr
*parse_rtattr_one(int type
, struct rtattr
*rta
, int len
)
1217 while (RTA_OK(rta
, len
)) {
1218 if (rta
->rta_type
== type
)
1220 rta
= RTA_NEXT(rta
, len
);
1224 fprintf(stderr
, "!!!Deficit %d, rta_len=%d\n",
1229 int __parse_rtattr_nested_compat(struct rtattr
*tb
[], int max
,
1233 if (RTA_PAYLOAD(rta
) < len
)
1235 if (RTA_PAYLOAD(rta
) >= RTA_ALIGN(len
) + sizeof(struct rtattr
)) {
1236 rta
= RTA_DATA(rta
) + RTA_ALIGN(len
);
1237 return parse_rtattr_nested(tb
, max
, rta
);
1239 memset(tb
, 0, sizeof(struct rtattr
*) * (max
+ 1));