]> git.proxmox.com Git - mirror_iproute2.git/blob - tc/m_action.c
tc: Remove pointless assignments in batch()
[mirror_iproute2.git] / tc / m_action.c
1 /*
2 * m_action.c Action Management
3 *
4 * This program is free software; you can distribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: J Hadi Salim (hadi@cyberus.ca)
10 *
11 * TODO:
12 * - parse to be passed a filedescriptor for logging purposes
13 *
14 */
15
16 #include <stdio.h>
17 #include <stdlib.h>
18 #include <stdbool.h>
19 #include <unistd.h>
20 #include <fcntl.h>
21 #include <sys/socket.h>
22 #include <netinet/in.h>
23 #include <arpa/inet.h>
24 #include <string.h>
25 #include <dlfcn.h>
26
27 #include "utils.h"
28 #include "tc_common.h"
29 #include "tc_util.h"
30
31 static struct action_util *action_list;
32 #ifdef CONFIG_GACT
33 int gact_ld; /* f*ckin backward compatibility */
34 #endif
35 int tab_flush;
36
37 static void act_usage(void)
38 {
39 /*XXX: In the near future add a action->print_help to improve
40 * usability
41 * This would mean new tc will not be backward compatible
42 * with any action .so from the old days. But if someone really
43 * does that, they would know how to fix this ..
44 *
45 */
46 fprintf(stderr, "usage: tc actions <ACTSPECOP>*\n");
47 fprintf(stderr,
48 "Where: \tACTSPECOP := ACR | GD | FL\n"
49 "\tACR := add | change | replace <ACTSPEC>*\n"
50 "\tGD := get | delete | <ACTISPEC>*\n"
51 "\tFL := ls | list | flush | <ACTNAMESPEC>\n"
52 "\tACTNAMESPEC := action <ACTNAME>\n"
53 "\tACTISPEC := <ACTNAMESPEC> <INDEXSPEC>\n"
54 "\tACTSPEC := action <ACTDETAIL> [INDEXSPEC]\n"
55 "\tINDEXSPEC := index <32 bit indexvalue>\n"
56 "\tACTDETAIL := <ACTNAME> <ACTPARAMS>\n"
57 "\t\tExample ACTNAME is gact, mirred, bpf, etc\n"
58 "\t\tEach action has its own parameters (ACTPARAMS)\n"
59 "\n");
60
61 exit(-1);
62 }
63
64 static int print_noaopt(struct action_util *au, FILE *f, struct rtattr *opt)
65 {
66 if (opt && RTA_PAYLOAD(opt))
67 fprintf(f, "[Unknown action, optlen=%u] ",
68 (unsigned int) RTA_PAYLOAD(opt));
69 return 0;
70 }
71
72 static int parse_noaopt(struct action_util *au, int *argc_p,
73 char ***argv_p, int code, struct nlmsghdr *n)
74 {
75 int argc = *argc_p;
76 char **argv = *argv_p;
77
78 if (argc)
79 fprintf(stderr,
80 "Unknown action \"%s\", hence option \"%s\" is unparsable\n",
81 au->id, *argv);
82 else
83 fprintf(stderr, "Unknown action \"%s\"\n", au->id);
84
85 return -1;
86 }
87
88 static struct action_util *get_action_kind(char *str)
89 {
90 static void *aBODY;
91 void *dlh;
92 char buf[256];
93 struct action_util *a;
94 #ifdef CONFIG_GACT
95 int looked4gact = 0;
96 restart_s:
97 #endif
98 for (a = action_list; a; a = a->next) {
99 if (strcmp(a->id, str) == 0)
100 return a;
101 }
102
103 snprintf(buf, sizeof(buf), "%s/m_%s.so", get_tc_lib(), str);
104 dlh = dlopen(buf, RTLD_LAZY | RTLD_GLOBAL);
105 if (dlh == NULL) {
106 dlh = aBODY;
107 if (dlh == NULL) {
108 dlh = aBODY = dlopen(NULL, RTLD_LAZY);
109 if (dlh == NULL)
110 goto noexist;
111 }
112 }
113
114 snprintf(buf, sizeof(buf), "%s_action_util", str);
115 a = dlsym(dlh, buf);
116 if (a == NULL)
117 goto noexist;
118
119 reg:
120 a->next = action_list;
121 action_list = a;
122 return a;
123
124 noexist:
125 #ifdef CONFIG_GACT
126 if (!looked4gact) {
127 looked4gact = 1;
128 strcpy(str, "gact");
129 goto restart_s;
130 }
131 #endif
132 a = calloc(1, sizeof(*a));
133 if (a) {
134 strncpy(a->id, "noact", 15);
135 a->parse_aopt = parse_noaopt;
136 a->print_aopt = print_noaopt;
137 goto reg;
138 }
139 return a;
140 }
141
142 static bool
143 new_cmd(char **argv)
144 {
145 return (matches(*argv, "change") == 0) ||
146 (matches(*argv, "replace") == 0) ||
147 (matches(*argv, "delete") == 0) ||
148 (matches(*argv, "get") == 0) ||
149 (matches(*argv, "add") == 0);
150 }
151
152 int parse_action(int *argc_p, char ***argv_p, int tca_id, struct nlmsghdr *n)
153 {
154 int argc = *argc_p;
155 char **argv = *argv_p;
156 struct rtattr *tail, *tail2;
157 char k[FILTER_NAMESZ];
158 int act_ck_len = 0;
159 int ok = 0;
160 int eap = 0; /* expect action parameters */
161
162 int ret = 0;
163 int prio = 0;
164 unsigned char act_ck[TC_COOKIE_MAX_SIZE];
165
166 if (argc <= 0)
167 return -1;
168
169 tail2 = addattr_nest(n, MAX_MSG, tca_id);
170
171 while (argc > 0) {
172
173 memset(k, 0, sizeof(k));
174
175 if (strcmp(*argv, "action") == 0) {
176 argc--;
177 argv++;
178 eap = 1;
179 #ifdef CONFIG_GACT
180 if (!gact_ld)
181 get_action_kind("gact");
182 #endif
183 continue;
184 } else if (strcmp(*argv, "flowid") == 0) {
185 break;
186 } else if (strcmp(*argv, "classid") == 0) {
187 break;
188 } else if (strcmp(*argv, "help") == 0) {
189 return -1;
190 } else if (new_cmd(argv)) {
191 goto done0;
192 } else {
193 struct action_util *a = NULL;
194
195 if (!action_a2n(*argv, NULL, false))
196 strncpy(k, "gact", sizeof(k) - 1);
197 else
198 strncpy(k, *argv, sizeof(k) - 1);
199 eap = 0;
200 if (argc > 0) {
201 a = get_action_kind(k);
202 } else {
203 done0:
204 if (ok)
205 break;
206 else
207 goto done;
208 }
209
210 if (a == NULL)
211 goto bad_val;
212
213
214 tail = addattr_nest(n, MAX_MSG, ++prio);
215 addattr_l(n, MAX_MSG, TCA_ACT_KIND, k, strlen(k) + 1);
216
217 ret = a->parse_aopt(a, &argc, &argv, TCA_ACT_OPTIONS,
218 n);
219
220 if (ret < 0) {
221 fprintf(stderr, "bad action parsing\n");
222 goto bad_val;
223 }
224
225 if (*argv && strcmp(*argv, "cookie") == 0) {
226 size_t slen;
227
228 NEXT_ARG();
229 slen = strlen(*argv);
230 if (slen > TC_COOKIE_MAX_SIZE * 2) {
231 char cookie_err_m[128];
232
233 snprintf(cookie_err_m, 128,
234 "%zd Max allowed size %d",
235 slen, TC_COOKIE_MAX_SIZE*2);
236 invarg(cookie_err_m, *argv);
237 }
238
239 if (hex2mem(*argv, act_ck, slen / 2) < 0)
240 invarg("cookie must be a hex string\n",
241 *argv);
242
243 act_ck_len = slen / 2;
244 argc--;
245 argv++;
246 }
247
248 if (act_ck_len)
249 addattr_l(n, MAX_MSG, TCA_ACT_COOKIE,
250 &act_ck, act_ck_len);
251
252 addattr_nest_end(n, tail);
253 ok++;
254 }
255 }
256
257 if (eap > 0) {
258 fprintf(stderr, "bad action empty %d\n", eap);
259 goto bad_val;
260 }
261
262 addattr_nest_end(n, tail2);
263
264 done:
265 *argc_p = argc;
266 *argv_p = argv;
267 return 0;
268 bad_val:
269 /* no need to undo things, returning from here should
270 * cause enough pain
271 */
272 fprintf(stderr, "parse_action: bad value (%d:%s)!\n", argc, *argv);
273 return -1;
274 }
275
276 static int tc_print_one_action(FILE *f, struct rtattr *arg)
277 {
278
279 struct rtattr *tb[TCA_ACT_MAX + 1];
280 int err = 0;
281 struct action_util *a = NULL;
282
283 if (arg == NULL)
284 return -1;
285
286 parse_rtattr_nested(tb, TCA_ACT_MAX, arg);
287
288 if (tb[TCA_ACT_KIND] == NULL) {
289 fprintf(stderr, "NULL Action!\n");
290 return -1;
291 }
292
293
294 a = get_action_kind(RTA_DATA(tb[TCA_ACT_KIND]));
295 if (a == NULL)
296 return err;
297
298 err = a->print_aopt(a, f, tb[TCA_ACT_OPTIONS]);
299
300 if (err < 0)
301 return err;
302
303 if (show_stats && tb[TCA_ACT_STATS]) {
304 print_string(PRINT_FP, NULL, "\tAction statistics:", NULL);
305 print_string(PRINT_FP, NULL, "%s", _SL_);
306 open_json_object("stats");
307 print_tcstats2_attr(f, tb[TCA_ACT_STATS], "\t", NULL);
308 close_json_object();
309 print_string(PRINT_FP, NULL, "%s", _SL_);
310 }
311 if (tb[TCA_ACT_COOKIE]) {
312 int strsz = RTA_PAYLOAD(tb[TCA_ACT_COOKIE]);
313 char b1[strsz * 2 + 1];
314
315 print_string(PRINT_ANY, "cookie", "\tcookie %s",
316 hexstring_n2a(RTA_DATA(tb[TCA_ACT_COOKIE]),
317 strsz, b1, sizeof(b1)));
318 print_string(PRINT_FP, NULL, "%s", _SL_);
319 }
320
321 return 0;
322 }
323
324 static int
325 tc_print_action_flush(FILE *f, const struct rtattr *arg)
326 {
327
328 struct rtattr *tb[TCA_MAX + 1];
329 int err = 0;
330 struct action_util *a = NULL;
331 __u32 *delete_count = 0;
332
333 parse_rtattr_nested(tb, TCA_MAX, arg);
334
335 if (tb[TCA_KIND] == NULL) {
336 fprintf(stderr, "NULL Action!\n");
337 return -1;
338 }
339
340 a = get_action_kind(RTA_DATA(tb[TCA_KIND]));
341 if (a == NULL)
342 return err;
343
344 delete_count = RTA_DATA(tb[TCA_FCNT]);
345 fprintf(f, " %s (%d entries)\n", a->id, *delete_count);
346 tab_flush = 0;
347 return 0;
348 }
349
350 int
351 tc_print_action(FILE *f, const struct rtattr *arg, unsigned short tot_acts)
352 {
353
354 int i;
355
356 if (arg == NULL)
357 return 0;
358
359 if (!tot_acts)
360 tot_acts = TCA_ACT_MAX_PRIO;
361
362 struct rtattr *tb[tot_acts + 1];
363
364 parse_rtattr_nested(tb, tot_acts, arg);
365
366 if (tab_flush && NULL != tb[0] && NULL == tb[1])
367 return tc_print_action_flush(f, tb[0]);
368
369 open_json_array(PRINT_JSON, "actions");
370 for (i = 0; i <= tot_acts; i++) {
371 if (tb[i]) {
372 open_json_object(NULL);
373 print_string(PRINT_FP, NULL, "%s", _SL_);
374 print_uint(PRINT_ANY, "order",
375 "\taction order %u: ", i);
376 if (tc_print_one_action(f, tb[i]) < 0) {
377 print_string(PRINT_FP, NULL,
378 "Error printing action\n", NULL);
379 }
380 close_json_object();
381 }
382
383 }
384 close_json_array(PRINT_JSON, NULL);
385
386 return 0;
387 }
388
389 int print_action(const struct sockaddr_nl *who,
390 struct nlmsghdr *n,
391 void *arg)
392 {
393 FILE *fp = (FILE *)arg;
394 struct tcamsg *t = NLMSG_DATA(n);
395 int len = n->nlmsg_len;
396 __u32 *tot_acts = NULL;
397 struct rtattr *tb[TCA_ROOT_MAX+1];
398
399 len -= NLMSG_LENGTH(sizeof(*t));
400
401 if (len < 0) {
402 fprintf(stderr, "Wrong len %d\n", len);
403 return -1;
404 }
405
406 parse_rtattr(tb, TCA_ROOT_MAX, TA_RTA(t), len);
407
408 if (tb[TCA_ROOT_COUNT])
409 tot_acts = RTA_DATA(tb[TCA_ROOT_COUNT]);
410
411 open_json_object(NULL);
412 print_uint(PRINT_ANY, "total acts", "total acts %u",
413 tot_acts ? *tot_acts : 0);
414 print_string(PRINT_FP, NULL, "%s", _SL_);
415 close_json_object();
416 if (tb[TCA_ACT_TAB] == NULL) {
417 if (n->nlmsg_type != RTM_GETACTION)
418 fprintf(stderr, "print_action: NULL kind\n");
419 return -1;
420 }
421
422 if (n->nlmsg_type == RTM_DELACTION) {
423 if (n->nlmsg_flags & NLM_F_ROOT) {
424 fprintf(fp, "Flushed table ");
425 tab_flush = 1;
426 } else {
427 fprintf(fp, "Deleted action ");
428 }
429 }
430
431 if (n->nlmsg_type == RTM_NEWACTION) {
432 if ((n->nlmsg_flags & NLM_F_CREATE) &&
433 !(n->nlmsg_flags & NLM_F_REPLACE)) {
434 fprintf(fp, "Added action ");
435 } else if (n->nlmsg_flags & NLM_F_REPLACE) {
436 fprintf(fp, "Replaced action ");
437 }
438 }
439
440 open_json_object(NULL);
441 tc_print_action(fp, tb[TCA_ACT_TAB], tot_acts ? *tot_acts:0);
442 close_json_object();
443
444 return 0;
445 }
446
447 static int tc_action_gd(int cmd, unsigned int flags,
448 int *argc_p, char ***argv_p)
449 {
450 char k[FILTER_NAMESZ];
451 struct action_util *a = NULL;
452 int argc = *argc_p;
453 char **argv = *argv_p;
454 int prio = 0;
455 int ret = 0;
456 __u32 i = 0;
457 struct rtattr *tail;
458 struct rtattr *tail2;
459 struct nlmsghdr *ans = NULL;
460
461 struct {
462 struct nlmsghdr n;
463 struct tcamsg t;
464 char buf[MAX_MSG];
465 } req = {
466 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcamsg)),
467 .n.nlmsg_flags = NLM_F_REQUEST | flags,
468 .n.nlmsg_type = cmd,
469 .t.tca_family = AF_UNSPEC,
470 };
471
472 argc -= 1;
473 argv += 1;
474
475
476 tail = addattr_nest(&req.n, MAX_MSG, TCA_ACT_TAB);
477
478 while (argc > 0) {
479 if (strcmp(*argv, "action") == 0) {
480 argc--;
481 argv++;
482 continue;
483 } else if (strcmp(*argv, "help") == 0) {
484 return -1;
485 }
486
487 strncpy(k, *argv, sizeof(k) - 1);
488 a = get_action_kind(k);
489 if (a == NULL) {
490 fprintf(stderr, "Error: non existent action: %s\n", k);
491 ret = -1;
492 goto bad_val;
493 }
494 if (strcmp(a->id, k) != 0) {
495 fprintf(stderr, "Error: non existent action: %s\n", k);
496 ret = -1;
497 goto bad_val;
498 }
499
500 argc -= 1;
501 argv += 1;
502 if (argc <= 0) {
503 fprintf(stderr,
504 "Error: no index specified action: %s\n", k);
505 ret = -1;
506 goto bad_val;
507 }
508
509 if (matches(*argv, "index") == 0) {
510 NEXT_ARG();
511 if (get_u32(&i, *argv, 10)) {
512 fprintf(stderr, "Illegal \"index\"\n");
513 ret = -1;
514 goto bad_val;
515 }
516 argc -= 1;
517 argv += 1;
518 } else {
519 fprintf(stderr,
520 "Error: no index specified action: %s\n", k);
521 ret = -1;
522 goto bad_val;
523 }
524
525 tail2 = addattr_nest(&req.n, MAX_MSG, ++prio);
526 addattr_l(&req.n, MAX_MSG, TCA_ACT_KIND, k, strlen(k) + 1);
527 if (i > 0)
528 addattr32(&req.n, MAX_MSG, TCA_ACT_INDEX, i);
529 addattr_nest_end(&req.n, tail2);
530
531 }
532
533 addattr_nest_end(&req.n, tail);
534
535 req.n.nlmsg_seq = rth.dump = ++rth.seq;
536
537 if (rtnl_talk(&rth, &req.n, cmd == RTM_DELACTION ? NULL : &ans) < 0) {
538 fprintf(stderr, "We have an error talking to the kernel\n");
539 return 1;
540 }
541
542 if (cmd == RTM_GETACTION) {
543 new_json_obj(json);
544 ret = print_action(NULL, ans, stdout);
545 if (ret < 0) {
546 fprintf(stderr, "Dump terminated\n");
547 free(ans);
548 delete_json_obj();
549 return 1;
550 }
551 delete_json_obj();
552 }
553 free(ans);
554
555 *argc_p = argc;
556 *argv_p = argv;
557 bad_val:
558 return ret;
559 }
560
561 struct tc_action_req {
562 struct nlmsghdr n;
563 struct tcamsg t;
564 char buf[MAX_MSG];
565 };
566
567 static int tc_action_modify(int cmd, unsigned int flags,
568 int *argc_p, char ***argv_p,
569 void *buf, size_t buflen)
570 {
571 struct tc_action_req *req, action_req;
572 char **argv = *argv_p;
573 struct rtattr *tail;
574 int argc = *argc_p;
575 struct iovec iov;
576 int ret = 0;
577
578 if (buf) {
579 req = buf;
580 if (buflen < sizeof (struct tc_action_req)) {
581 fprintf(stderr, "buffer is too small: %zu\n", buflen);
582 return -1;
583 }
584 } else {
585 memset(&action_req, 0, sizeof (struct tc_action_req));
586 req = &action_req;
587 }
588
589 req->n.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcamsg));
590 req->n.nlmsg_flags = NLM_F_REQUEST | flags;
591 req->n.nlmsg_type = cmd;
592 req->t.tca_family = AF_UNSPEC;
593 tail = NLMSG_TAIL(&req->n);
594
595 argc -= 1;
596 argv += 1;
597 if (parse_action(&argc, &argv, TCA_ACT_TAB, &req->n)) {
598 fprintf(stderr, "Illegal \"action\"\n");
599 return -1;
600 }
601 tail->rta_len = (void *) NLMSG_TAIL(&req->n) - (void *) tail;
602
603 *argc_p = argc;
604 *argv_p = argv;
605
606 if (buf)
607 return 0;
608
609 iov.iov_base = &req->n;
610 iov.iov_len = req->n.nlmsg_len;
611 if (rtnl_talk_iov(&rth, &iov, 1, NULL) < 0) {
612 fprintf(stderr, "We have an error talking to the kernel\n");
613 ret = -1;
614 }
615
616 return ret;
617 }
618
619 static int tc_act_list_or_flush(int *argc_p, char ***argv_p, int event)
620 {
621 struct rtattr *tail, *tail2, *tail3, *tail4;
622 int ret = 0, prio = 0, msg_size = 0;
623 struct action_util *a = NULL;
624 struct nla_bitfield32 flag_select = { 0 };
625 char **argv = *argv_p;
626 __u32 msec_since = 0;
627 int argc = *argc_p;
628 char k[FILTER_NAMESZ];
629 struct {
630 struct nlmsghdr n;
631 struct tcamsg t;
632 char buf[MAX_MSG];
633 } req = {
634 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcamsg)),
635 .t.tca_family = AF_UNSPEC,
636 };
637
638 tail = addattr_nest(&req.n, MAX_MSG, TCA_ACT_TAB);
639 tail2 = NLMSG_TAIL(&req.n);
640
641 strncpy(k, *argv, sizeof(k) - 1);
642 #ifdef CONFIG_GACT
643 if (!gact_ld)
644 get_action_kind("gact");
645
646 #endif
647 a = get_action_kind(k);
648 if (a == NULL) {
649 fprintf(stderr, "bad action %s\n", k);
650 goto bad_val;
651 }
652 if (strcmp(a->id, k) != 0) {
653 fprintf(stderr, "bad action %s\n", k);
654 goto bad_val;
655 }
656 strncpy(k, *argv, sizeof(k) - 1);
657
658 argc -= 1;
659 argv += 1;
660
661 if (argc && (strcmp(*argv, "since") == 0)) {
662 NEXT_ARG();
663 if (get_u32(&msec_since, *argv, 0))
664 invarg("dump time \"since\" is invalid", *argv);
665 }
666
667 addattr_l(&req.n, MAX_MSG, ++prio, NULL, 0);
668 addattr_l(&req.n, MAX_MSG, TCA_ACT_KIND, k, strlen(k) + 1);
669 tail2->rta_len = (void *) NLMSG_TAIL(&req.n) - (void *) tail2;
670 addattr_nest_end(&req.n, tail);
671
672 tail3 = NLMSG_TAIL(&req.n);
673 flag_select.value |= TCA_FLAG_LARGE_DUMP_ON;
674 flag_select.selector |= TCA_FLAG_LARGE_DUMP_ON;
675 addattr_l(&req.n, MAX_MSG, TCA_ROOT_FLAGS, &flag_select,
676 sizeof(struct nla_bitfield32));
677 tail3->rta_len = (void *) NLMSG_TAIL(&req.n) - (void *) tail3;
678 if (msec_since) {
679 tail4 = NLMSG_TAIL(&req.n);
680 addattr32(&req.n, MAX_MSG, TCA_ROOT_TIME_DELTA, msec_since);
681 tail4->rta_len = (void *) NLMSG_TAIL(&req.n) - (void *) tail4;
682 }
683 msg_size = NLMSG_ALIGN(req.n.nlmsg_len)
684 - NLMSG_ALIGN(sizeof(struct nlmsghdr));
685
686 if (event == RTM_GETACTION) {
687 if (rtnl_dump_request(&rth, event,
688 (void *)&req.t, msg_size) < 0) {
689 perror("Cannot send dump request");
690 return 1;
691 }
692 new_json_obj(json);
693 ret = rtnl_dump_filter(&rth, print_action, stdout);
694 delete_json_obj();
695 }
696
697 if (event == RTM_DELACTION) {
698 req.n.nlmsg_len = NLMSG_ALIGN(req.n.nlmsg_len);
699 req.n.nlmsg_type = RTM_DELACTION;
700 req.n.nlmsg_flags |= NLM_F_ROOT;
701 req.n.nlmsg_flags |= NLM_F_REQUEST;
702 if (rtnl_talk(&rth, &req.n, NULL) < 0) {
703 fprintf(stderr, "We have an error flushing\n");
704 return 1;
705 }
706
707 }
708
709 bad_val:
710
711 *argc_p = argc;
712 *argv_p = argv;
713 return ret;
714 }
715
716 int do_action(int argc, char **argv, void *buf, size_t buflen)
717 {
718
719 int ret = 0;
720
721 while (argc > 0) {
722
723 if (matches(*argv, "add") == 0) {
724 ret = tc_action_modify(RTM_NEWACTION,
725 NLM_F_EXCL | NLM_F_CREATE,
726 &argc, &argv, buf, buflen);
727 } else if (matches(*argv, "change") == 0 ||
728 matches(*argv, "replace") == 0) {
729 ret = tc_action_modify(RTM_NEWACTION,
730 NLM_F_CREATE | NLM_F_REPLACE,
731 &argc, &argv, buf, buflen);
732 } else if (matches(*argv, "delete") == 0) {
733 argc -= 1;
734 argv += 1;
735 ret = tc_action_gd(RTM_DELACTION, 0, &argc, &argv);
736 } else if (matches(*argv, "get") == 0) {
737 argc -= 1;
738 argv += 1;
739 ret = tc_action_gd(RTM_GETACTION, 0, &argc, &argv);
740 } else if (matches(*argv, "list") == 0 ||
741 matches(*argv, "show") == 0 ||
742 matches(*argv, "lst") == 0) {
743 if (argc <= 2) {
744 act_usage();
745 return -1;
746 }
747
748 argc -= 2;
749 argv += 2;
750 return tc_act_list_or_flush(&argc, &argv,
751 RTM_GETACTION);
752 } else if (matches(*argv, "flush") == 0) {
753 if (argc <= 2) {
754 act_usage();
755 return -1;
756 }
757
758 argc -= 2;
759 argv += 2;
760 return tc_act_list_or_flush(&argc, &argv,
761 RTM_DELACTION);
762 } else if (matches(*argv, "help") == 0) {
763 act_usage();
764 return -1;
765 } else {
766 fprintf(stderr,
767 "Command \"%s\" is unknown, try \"tc actions help\".\n",
768 *argv);
769 return -1;
770 }
771
772 if (ret < 0)
773 return -1;
774 }
775
776 return 0;
777 }