1 /* ip.c - Show / manipulate routing, devices, policy routing and tunnels.
2 *
3 * Copyright 2014 Sameer Prakash Pradhan <sameer.p.pradhan@gmail.com>
4 * Copyright 2014 Ranjan Kumar <ranjankumar.bth@gmail.com>
5 * Copyright 2014 Rajni Kant <rajnikant12345@gmail.com>
6 * Copyright 2014 Bilal Qureshi <bilal.jmi@gmail.com>
7 *
8 * No Standard.
9 *
10 USE_IP(NEWTOY(ip, NULL, TOYFLAG_SBIN))
11 USE_IP(OLDTOY(ipaddr, ip, TOYFLAG_SBIN))
12 USE_IP(OLDTOY(iplink, ip, TOYFLAG_SBIN))
13 USE_IP(OLDTOY(iproute, ip, TOYFLAG_SBIN))
14 USE_IP(OLDTOY(iprule, ip, TOYFLAG_SBIN))
15 USE_IP(OLDTOY(iptunnel, ip, TOYFLAG_SBIN))
16
17 config IP
18 bool "ip"
19 default n
20 help
21 usage: ip [ OPTIONS ] OBJECT { COMMAND }
22
23 Show / manipulate routing, devices, policy routing and tunnels.
24
25 where OBJECT := {address | link | route | rule | tunnel}
26 OPTIONS := { -f[amily] { inet | inet6 | link } | -o[neline] }
27 */
28 #define FOR_ip
29 #include "toys.h"
30 #include <linux/netlink.h>
31 #include <linux/rtnetlink.h>
32 #include <linux/if_ether.h>
33 #include <linux/if_addr.h>
34 #include <net/if_arp.h>
35 #include <ifaddrs.h>
36 #include <fnmatch.h>
37 #include <linux/if_tunnel.h>
38
39 #ifndef IP_DF
40 #define IP_DF 0x4000 /* don't fragment flag. */
41 #endif
42
43 GLOBALS(
44 char stats, singleline, flush, *filter_dev, gbuf[8192];
45 int sockfd, connected, from_ok, route_cmd;
46 int8_t addressfamily, is_addr;
47 )
48
49 struct arglist {
50 char *name;
51 int idx;
52 };
53
54 static struct
55 {
56 int ifindex, scope, scopemask, up, to;
57 char *label, *addr;
58 } addrinfo;
59
60 struct linkdata {
61 struct linkdata *next, *prev;
62 int flags, iface_idx, mtu, txqueuelen, parent,iface_type;
63 char qdiscpline[IFNAMSIZ+1], state[IFNAMSIZ+1], type[IFNAMSIZ+1],
64 iface[IFNAMSIZ+1], laddr[64], bcast[64];
65 struct rtnl_link_stats rt_stat;
66 }*linfo;
67
68 typedef int (*cmdobj)(char **argv);
69
70 #define MESG_LEN 8192
71
72 // For "/etc/iproute2/RPDB_tables"
73 enum {
74 RPDB_rtdsfield = 1,
75 RPDB_rtprotos = 2,
76 RPDB_rtrealms = 3,
77 RPDB_rtscopes = 4,
78 RPDB_rttables = 5
79 };
80
81 #define RPDB_ENTRIES 256
82 static int8_t rttable_init;
83 static int8_t rtprotos_init;
84 static int8_t rtdsfield_init;
85 static int8_t rtscope_init;
86 static int8_t rtrealms_init;
87
88 static struct arglist *rt_dsfield[RPDB_ENTRIES];
89 static struct arglist *rt_protos[RPDB_ENTRIES];
90 static struct arglist *rt_tables[RPDB_ENTRIES];
91 static struct arglist *rt_realms[RPDB_ENTRIES];
92 static struct arglist *rt_scope[RPDB_ENTRIES];
93
94 static struct arglist rtmtypes[] = { {"none", RTN_UNSPEC},
95 {"unicast", RTN_UNICAST}, {"local", RTN_LOCAL},
96 {"broadcast", RTN_BROADCAST}, {"anycast", RTN_ANYCAST},
97 {"multicast", RTN_MULTICAST}, {"blackhole", RTN_BLACKHOLE},
98 {"unreachable", RTN_UNREACHABLE}, {"prohibit", RTN_PROHIBIT},
99 {"throw", RTN_THROW}, {"nat", RTN_NAT},
100 {"xresolve", RTN_XRESOLVE}, {NULL, -1}
101 };
102
103 static int filter_nlmesg(int (*fun)(struct nlmsghdr *mhdr, char **), char **);
104 static int ipaddr_print(struct linkdata *, int flg);
105
106 // extended route attribute metrics.
107 static const char *mx_names[RTAX_MAX + 1] = {
108 [RTAX_MTU] = "mtu",
109 [RTAX_WINDOW] = "window",
110 [RTAX_RTT] = "rtt",
111 [RTAX_RTTVAR] = "rttvar",
112 [RTAX_SSTHRESH] = "ssthresh",
113 [RTAX_CWND] = "cwnd",
114 [RTAX_ADVMSS] = "advmss",
115 [RTAX_REORDERING] = "reordering",
116 [RTAX_HOPLIMIT] = "hoplimit",
117 [RTAX_INITCWND] = "initcwnd",
118 [RTAX_FEATURES] = "features",
119 [RTAX_RTO_MIN] = "rto_min",
120 [RTAX_INITRWND] = "initrwnd",
121 [RTAX_QUICKACK] = "quickack",
122 [RTAX_CC_ALGO] = "congctl"};
123
124 // ===========================================================================
125 // Common Code for IP Options (like: addr, link, route etc.)
126 // ===========================================================================
substring_to_idx(char * str,struct arglist * list)127 static int substring_to_idx(char *str, struct arglist *list)
128 {
129 struct arglist *alist;
130 int len;
131
132 if (!str) return -1;
133 len = strlen(str);
134
135 for (alist = list; alist->name; alist++)
136 if (!memcmp(str, alist->name, len)) return alist->idx;
137 return -1;
138 }
139
string_to_idx(char * str,struct arglist * list)140 static int string_to_idx(char *str, struct arglist *list)
141 {
142 struct arglist *alist;
143
144 if (!str) return -1;
145 for (alist = list; alist->name; alist++)
146 if (!strcmp(str, alist->name)) return alist->idx;
147 return -1;
148 }
149
idx_to_string(int idx,struct arglist * list)150 static char *idx_to_string(int idx, struct arglist *list)
151 {
152 struct arglist *alist;
153
154 if (idx < 0) return NULL;
155 for (alist = list; alist->name; alist++)
156 if (idx == alist->idx) return alist->name;
157 return NULL;
158 }
159
send_nlmesg(int type,int flags,int family,void * buf,int blen)160 static void send_nlmesg(int type, int flags, int family,
161 void *buf, int blen)
162 {
163 struct {
164 struct nlmsghdr nlh;
165 struct rtgenmsg g;
166 } req;
167
168 if (!buf) {
169 memset(&req, 0, sizeof(req));
170 req.nlh.nlmsg_len = sizeof(req);
171 req.nlh.nlmsg_type = type;
172 req.nlh.nlmsg_flags = flags;
173 req.g.rtgen_family = family;
174 buf = &req;
175 blen = sizeof(req);
176 }
177 if (send(TT.sockfd , (void*)buf, blen, 0) < 0)
178 perror_exit("Unable to send data on socket.");
179 }
180
181 // Parse /etc/iproute2/RPDB_tables and prepare list.
parseRPDB(char * fname,struct arglist ** list,int32_t size)182 static void parseRPDB(char *fname, struct arglist **list, int32_t size)
183 {
184 FILE *fp = fopen(fname, "r");
185 char *line = 0;
186 size_t l = 0;
187 ssize_t len;
188
189 if (!fp) return;
190 while ((len = getline(&line, &l, fp)) > 0) {
191 char *ptr = line;
192 int32_t idx;
193
194 while (*ptr == ' ' || *ptr == '\t') ptr++;
195 if (*ptr == 0 || *ptr == '#' || *ptr == '\n') continue;
196 if ((sscanf(ptr, "0x%x %s\n", &idx, toybuf) != 2) &&
197 (sscanf(ptr, "0x%x %s #", &idx, toybuf) != 2) &&
198 (sscanf(ptr, "%d %s\n", &idx, toybuf) != 2) &&
199 (sscanf(ptr, "%d %s #", &idx, toybuf) != 2)) {
200 error_msg("corrupt %s", fname);
201 break;
202 }
203 if (idx >= 0 && idx < size) {
204 int index = idx & (size-1);
205 if (list[index]) free(list[index]->name);
206 else list[index] = xzalloc(sizeof(struct arglist));
207 list[index]->idx = idx;
208 list[index]->name = xstrdup(toybuf);
209 }
210 }
211 free(line);
212 fclose(fp);
213 }
214
free_alist(struct arglist ** list)215 static void free_alist(struct arglist **list)
216 {
217 int i;
218 for (i = 0;i<RPDB_ENTRIES;i++) {
219 if (list[i]) {
220 free(list[i]->name);
221 free(list[i]);
222 }
223 }
224 }
225
init_arglist(struct arglist ** list,int value,char * name)226 static void init_arglist(struct arglist **list,int value, char* name)
227 {
228 if (!list[value]) list[value] = xzalloc(sizeof(struct arglist));
229 list[value]->idx = value;
230 list[value]->name = xstrdup(name);
231 }
232
getlist(u_int8_t whichDB)233 static struct arglist **getlist(u_int8_t whichDB)
234 {
235 struct arglist **alist;
236
237 switch (whichDB) {
238 case RPDB_rtdsfield:
239 alist = rt_dsfield;
240 if (!rtdsfield_init) {
241 rtdsfield_init = 1;
242 parseRPDB("/etc/iproute2/rt_dsfield", alist, ARRAY_LEN(rt_dsfield));
243 }
244 break;
245 case RPDB_rtprotos:
246 alist = rt_protos;
247 if (!rttable_init) {
248 rtprotos_init = 1;
249 init_arglist(rt_protos,0,"none");
250 init_arglist(rt_protos,1,"redirect");
251 init_arglist(rt_protos,2,"kernel");
252 init_arglist(rt_protos,3,"boot");
253 init_arglist(rt_protos,4,"static");
254 init_arglist(rt_protos,8,"gated");
255 init_arglist(rt_protos,9,"ra");
256 init_arglist(rt_protos,10,"mrt");
257 init_arglist(rt_protos,11,"zebra");
258 init_arglist(rt_protos,12,"bird");
259 parseRPDB("/etc/iproute2/rt_protos", alist, ARRAY_LEN(rt_protos));
260 }
261 break;
262 case RPDB_rtrealms:
263 alist = rt_realms;
264 if (!rtrealms_init) {
265 rtrealms_init = 1;
266 init_arglist(rt_realms,0,"unspec");
267 parseRPDB("/etc/iproute2/rt_realms", alist, ARRAY_LEN(rt_realms));
268 }
269 break;
270 case RPDB_rtscopes:
271 alist = rt_scope;
272 if (!rtscope_init) {
273 rtscope_init = 1;
274 init_arglist(rt_scope,0,"global");
275 init_arglist(rt_scope,200,"site");
276 init_arglist(rt_scope,253,"link");
277 init_arglist(rt_scope,254,"host");
278 init_arglist(rt_scope,255,"nowhere");
279 parseRPDB("/etc/iproute2/rt_scopes", alist, ARRAY_LEN(rt_scope));
280 }
281 break;
282 case RPDB_rttables:
283 alist = rt_tables;
284 if (!rttable_init) {
285 rttable_init = 1;
286 init_arglist(rt_tables,RT_TABLE_DEFAULT,"default");
287 init_arglist(rt_tables,RT_TABLE_MAIN,"main");
288 init_arglist(rt_tables,RT_TABLE_LOCAL,"local");
289 parseRPDB("/etc/iproute2/rt_tables", alist, ARRAY_LEN(rt_tables));
290 }
291 break;
292 default:
293 error_exit("wrong database");
294 break; // Unreachable code.
295 }
296 return alist;
297 }
298
299 /*
300 * Parse RPBD tables (if not parsed already).
301 * return RPDB table name as per idx.
302 */
namefromRPDB(int idx,u_int8_t whichDB)303 static char *namefromRPDB(int idx, u_int8_t whichDB)
304 {
305 struct arglist **alist;
306
307 if (idx < 0 || idx >= RPDB_ENTRIES) {
308 snprintf(toybuf, RPDB_ENTRIES, "%u", idx);
309 return toybuf;
310 }
311
312 alist = getlist(whichDB);
313
314 if (alist[idx] && alist[idx]->name) return alist[idx]->name;
315
316 if (whichDB == RPDB_rtdsfield) snprintf(toybuf, RPDB_ENTRIES, "0x%02x", idx);
317 else snprintf(toybuf, RPDB_ENTRIES, "%u", idx);
318
319 return toybuf;
320 }
321
idxfromRPDB(char * name,u_int8_t whichDB)322 static int idxfromRPDB(char *name, u_int8_t whichDB)
323 {
324 struct arglist **alist;
325 long i = 0;
326 char *ptr = NULL;
327
328 for (alist = getlist(whichDB); i < RPDB_ENTRIES; i++) {
329 if (!alist[i] || !alist[i]->name) continue;
330 if (!strcmp(alist[i]->name, name)) return i;
331 }
332 i = strtol(name, &ptr, 0);
333 if (errno || (ptr && *ptr) || i < 0 || i > 255)
334 return -1;
335 return i;
336 }
337
rtmtype_idx2str(u_int8_t idx)338 static char *rtmtype_idx2str(u_int8_t idx)
339 {
340 char *name = idx_to_string(idx, rtmtypes);
341
342 if (!name) snprintf(toybuf, RPDB_ENTRIES, "%u", idx);
343 else snprintf(toybuf, sizeof(toybuf), "%s", name);
344 return toybuf;
345 }
346
rtmtype_str2idx(char * name)347 static int rtmtype_str2idx(char *name)
348 {
349 int idx = string_to_idx(name, rtmtypes);
350
351 if (idx < 0) return atolx_range(name, 0, 255);
352 return idx;
353 }
354
355 /*
356 * Used to get the prefix value in binary form.
357 * For IPv4: non-standard parsing used; as 10.10 will be treated as 10.10.0.0
358 * unlike inet_aton which is 10.0.0.10
359 */
get_prefix(uint32_t * addr,uint8_t * af,char * name,int family)360 static int get_prefix(uint32_t *addr, uint8_t *af, char *name, int family)
361 {
362 if (family == AF_PACKET) error_exit("'%s' may be inet prefix", name);
363 if (!memcmp(name, "default", strlen(name))
364 || !memcmp(name, "all", strlen(name))
365 || !memcmp(name, "any", strlen(name))) {
366 *af = family;
367 return 0;
368 }
369 if (strchr(name, ':')) {
370 *af = AF_INET6;
371 if (family != AF_UNSPEC && family != AF_INET6) return 1;
372 if (inet_pton(AF_INET6, name, (void *)addr) != 1)
373 return 1;
374 } else { // for IPv4.
375 char *ptr = name;
376 uint8_t count = 0;
377
378 *af = AF_INET;
379 if (family != AF_UNSPEC && family != AF_INET) return 1;
380 while (*ptr) {
381 int val, len = 0;
382
383 if (*ptr == '.') ptr++;
384 sscanf(ptr, "%d%n", &val, &len);
385 if (!len || len > 3 || val < 0 || val > 255 || count > 3) return 1;
386 ptr += len;
387 ((uint8_t*)addr)[count++] = val;
388 }
389 }
390 return 0;
391 }
392
393 /*
394 * Used to calculate netmask, which can be in the form of
395 * either 255.255.255.0 or 24 or default or any or all strings.
396 */
get_nmask_prefix(uint32_t * netmask,uint8_t af,char * name,uint8_t family)397 static int get_nmask_prefix(uint32_t *netmask, uint8_t af,
398 char *name, uint8_t family)
399 {
400 char *ptr;
401 uint32_t naddr[4] = {0,};
402 uint64_t plen;
403 uint8_t naf = AF_UNSPEC;
404
405 *netmask = (af == AF_INET6) ? 128 : 32; // set default netmask
406 plen = strtoul(name, &ptr, 0);
407
408 if (!ptr || ptr == name || *ptr || !plen || plen > *netmask) {
409 if (get_prefix(naddr, &naf, name, family)) return -1;
410 if (naf == AF_INET) {
411 uint32_t mask = htonl(*naddr), host = ~mask;
412 if (host & (host + 1)) return -1;
413 for (plen = 0; mask; mask <<= 1) ++plen;
414 if (plen > 32) return -1;
415 }
416 }
417 *netmask = plen;
418 return 0;
419 }
420
421 /*
422 * Parse prefix, which will be in form of
423 * either default or default/default or default/24 or default/255.255.255.0
424 * or 10.20.30.40 or 10.20.30.40/default or 10.20.30.40/24
425 * or 10.20.30.40/255.255.255.0
426 */
parse_prefix(uint32_t * addr,uint32_t * netmask,uint8_t * len,char * name,int family)427 static void parse_prefix(uint32_t *addr, uint32_t *netmask, uint8_t *len,
428 char *name, int family)
429 {
430 uint8_t af = AF_UNSPEC;
431 char *slash = strchr(name, '/');
432
433 if (slash) *slash = 0;
434 if (get_prefix(addr, &af, name, family)) error_exit("Invalid prefix");
435
436 if (slash) { // grab netmask.
437 if (get_nmask_prefix(netmask, af, slash+1, family))
438 error_exit("Invalid prefix");
439 *slash ='/';
440 }
441 else if (af == AF_INET && *addr) *netmask = 32;
442 else if (af == AF_INET6 && (*addr || *(addr+3))) *netmask = 128;
443
444 if (!*addr && !slash && !af) *len = 0;
445 else *len = (af == AF_INET6) ? 16 : 4;
446 }
447
448 /*
449 * Add a route attribute to a buffer; this is primarily used for extended
450 * attributes which get collected in a separate buffer from the normal route
451 * attributes and later get added to the main rtm message.
452 */
add_varlen_rtattr_to_buffer(struct rtattr * rta,int maxlen,int type,void * data,int alen)453 static void add_varlen_rtattr_to_buffer(struct rtattr *rta, int maxlen,
454 int type, void *data, int alen) {
455 struct rtattr *subrta;
456 int len = RTA_LENGTH(alen);
457 if (RTA_ALIGN(rta->rta_len) + RTA_ALIGN(len) > maxlen) {
458 error_exit("RTA exceeds max length %d", maxlen);
459 }
460 subrta = (struct rtattr*)(((char*)rta) + RTA_ALIGN(rta->rta_len));
461 subrta->rta_type = type;
462 subrta->rta_len = len;
463 if (alen) {
464 memcpy(RTA_DATA(subrta), data, alen);
465 }
466 rta->rta_len = NLMSG_ALIGN(rta->rta_len) + RTA_ALIGN(len);
467 }
468
add_uint32_rtattr_to_buffer(struct rtattr * rta,int maxlen,int type,uint32_t attr)469 static void add_uint32_rtattr_to_buffer(struct rtattr *rta, int maxlen,
470 int type, uint32_t attr) {
471 add_varlen_rtattr_to_buffer(rta, maxlen, type, (char*)&attr, sizeof(attr));
472 }
473
474 /*
475 * Add a route attribute to a RTM message.
476 */
add_string_to_rtattr(struct nlmsghdr * n,int maxlen,int type,void * data,int alen)477 static void add_string_to_rtattr(struct nlmsghdr *n, int maxlen,
478 int type, void *data, int alen)
479 {
480 int len = RTA_LENGTH(alen);
481 struct rtattr *rta;
482
483 if ((int)(NLMSG_ALIGN(n->nlmsg_len) + len) > maxlen) return;
484 rta = (struct rtattr*)(((char*)n) + NLMSG_ALIGN(n->nlmsg_len));
485 rta->rta_type = type;
486 rta->rta_len = len;
487 memcpy(RTA_DATA(rta), data, alen);
488 n->nlmsg_len = NLMSG_ALIGN(n->nlmsg_len) + len;
489 }
490
491
492
493 // ===========================================================================
494 // Code for ip link.
495 // ===========================================================================
496 #ifndef NLMSG_TAIL
497 #define NLMSG_TAIL(nmsg) \
498 ((struct rtattr *) (((void *) (nmsg)) + NLMSG_ALIGN((nmsg)->nlmsg_len)))
499 #endif
500
get_ifaceindex(char * name,int ext)501 static uint32_t get_ifaceindex(char *name, int ext)
502 {
503 struct if_nameindex *if_ni, *i;
504 int index = -1;
505
506 if_ni = if_nameindex();
507 if (!if_ni) perror_exit("if_nameindex");
508
509 for (i = if_ni; i->if_index && i->if_name; i++)
510 if (!strcmp(name, i->if_name)) {
511 index = i->if_index;
512 break;
513 }
514 if_freenameindex(if_ni);
515 if (index == -1 && ext) perror_exit("can't find device '%s'", name);
516 return index;
517 }
518
fill_hwaddr(char * arg,int len,unsigned char * address)519 static void fill_hwaddr(char *arg, int len, unsigned char *address)
520 {
521 int count = 0, val, length;
522
523 while (count < len) {
524 val = length = 0;
525 if (!arg) error_exit("bad hw-addr '%s'", "");
526 if (*arg == ':') arg++, count++;
527 sscanf(arg, "%2x%n", &val, &length);
528 if (!length || length > 2)
529 error_exit("bad hw-addr '%s'", arg);
530 arg += length;
531 count += length;
532 *address++ = val;
533 }
534 }
535
536 // Multimach = 1, single match = 0
get_flag_string(struct arglist * aflags,int flags,int ismulti)537 static char *get_flag_string(struct arglist *aflags, int flags, int ismulti)
538 {
539 struct arglist *p = aflags;
540 char *out = NULL, *tmp = NULL;
541
542 for (; p->name; p++) {
543 int test = (ismulti ? p->idx & flags : 0) || p->idx == flags;
544 if (test) { // flags can be zero
545 tmp = out ? xmprintf("%s,%s", out, p->name) : xmprintf("%s", p->name);
546 if (out) free(out);
547 out = tmp;
548 }
549 }
550 return out;
551 }
552
vlan_parse_opt(char ** argv,struct nlmsghdr * n,unsigned int size)553 static void vlan_parse_opt(char **argv, struct nlmsghdr *n, unsigned int size)
554 {
555 struct arglist vlan_optlist[] = {{"id", 0}, {"protocol", 1},
556 {"reorder_hdr", 2}, {"gvrp", 3}, {NULL,-1}};
557 struct arglist vlan_protolist[] = {{"802.1q", 0}, {"802.1ad", 1}, {NULL,-1}};
558 struct arglist on_off[] = { {"on", 0}, {"off", 1}, {NULL,-1}};
559 int idx;
560 struct ifla_vlan_flags flags;
561
562 memset(&flags, 0, sizeof(flags));
563 for (; *argv; argv++) {
564 int param, proto;
565
566 if ((idx = substring_to_idx(*argv++, vlan_optlist)) == -1) help_exit(0);
567 switch (idx) {
568 case 0: // ARG_id
569 if (!*argv) help_exit(0);
570 param = atolx(*argv);
571 add_string_to_rtattr(n, size, IFLA_VLAN_ID, ¶m, sizeof(param));
572 break;
573 case 1: // ARG_protocol
574 if (!*argv) error_exit("Invalid vlan id.");
575 if ((idx = substring_to_idx(*argv, vlan_protolist)) == -1) help_exit(0);
576 if (!idx) proto = ETH_P_8021Q; // PROTO_8021Q - 0
577 else if (idx == 1) proto = 0x88A8; // ETH Protocol - 8021AD
578 // IFLA VLAN PROTOCOL - 5
579 add_string_to_rtattr(n, size, 5, &proto, sizeof(proto));
580 break;
581 case 2: // ARG_reorder_hdr
582 case 3: // ARG_gvrp
583 if ((param = substring_to_idx(*argv, on_off)) == -1) help_exit(0);
584
585 flags.mask |= (idx -1); // VLAN FLAG REORDER Header
586 flags.flags &= ~(idx -1); // VLAN FLAG REORDER Header
587 if (!param) flags.flags |= (idx -1); // VLAN FLAG REORDER Header
588 break;
589 }
590 }
591 if (flags.mask)
592 add_string_to_rtattr(n, size, IFLA_VLAN_FLAGS, &flags, sizeof(flags));
593 }
594
linkupdate(char ** argv)595 static int linkupdate(char **argv)
596 {
597 struct {
598 struct nlmsghdr mhdr;
599 struct ifinfomsg info;
600 char buf[1024];
601 } request;
602 char *name, *dev, *type, *link, *addr;
603 struct rtattr *attr = NULL;
604 int len = 0, add = (*argv[-1] == 'a') ? 1 : 0;
605
606 name = dev = type = link = addr = NULL;
607 for (; *argv; argv++) {
608 struct arglist objectlist[] = { {"type", 0}, {"name", 1}, {"link", 2},
609 {"address", 3}, {NULL,-1}};
610 uint8_t idx = substring_to_idx(*argv, objectlist);
611
612 if (!idx) {
613 type = *++argv;
614 break;
615 }
616 else if (idx == 1) dev = name = *++argv;
617 else if (idx == 2) link = *++argv;
618 else if (idx == 3) addr = *++argv;
619 else if (!dev) name = dev = *argv;
620 }
621
622 if (!name && !add)
623 error_exit("Not enough information: \"dev\" argument is required.\n");
624 else if (!type && add)
625 error_exit("Not enough information: \"type\" argument is required.\n");
626
627 memset(&request, 0, sizeof(request));
628 request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
629 request.mhdr.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
630 if (add) {
631 request.mhdr.nlmsg_flags |= NLM_F_CREATE|NLM_F_EXCL;
632 request.mhdr.nlmsg_type = RTM_NEWLINK;
633 } else {
634 request.mhdr.nlmsg_type = RTM_DELLINK;
635 request.info.ifi_index = get_ifaceindex(name, 1);
636 }
637 request.info.ifi_family = AF_UNSPEC;
638 attr = NLMSG_TAIL(&request.mhdr);
639 if (type) {
640 add_string_to_rtattr(&request.mhdr, sizeof(request),
641 IFLA_LINKINFO, NULL, 0);
642 add_string_to_rtattr(&request.mhdr, sizeof(request),
643 IFLA_INFO_KIND, type, strlen(type));
644 if (!strcmp(type, "vlan")) {
645 struct rtattr *data = NLMSG_TAIL(&request.mhdr);
646 add_string_to_rtattr(&request.mhdr, sizeof(request),
647 IFLA_INFO_DATA, NULL, 0);
648 vlan_parse_opt(++argv, &request.mhdr, sizeof(request));
649 data->rta_len = (void *)NLMSG_TAIL(&request.mhdr) - (void *)data;
650 }
651 attr->rta_len = (void *)NLMSG_TAIL(&request.mhdr) - (void *)attr;
652 }
653
654 if (link) {
655 uint32_t idx = get_ifaceindex(link, 1);
656 add_string_to_rtattr(&request.mhdr, sizeof(request),
657 IFLA_LINK, &idx, sizeof(uint32_t));
658 }
659 if (addr) {
660 char abuf[IF_NAMESIZE] = {0,};
661
662 fill_hwaddr(addr, IF_NAMESIZE, (unsigned char *)abuf);
663 add_string_to_rtattr(&request.mhdr, sizeof(request),
664 IFLA_ADDRESS, abuf, strlen(abuf));
665 }
666 if (!name) {
667 snprintf(toybuf, IFNAMSIZ, "%s%d", type, 0);
668 for (len = 1; ; len++) {
669 if (!get_ifaceindex(toybuf, 0)) break;
670 snprintf(toybuf, IFNAMSIZ, "%s%d", type, len);
671 }
672 name = toybuf;
673 }
674 len = strlen(name) + 1;
675 if (len < 2 || len > IFNAMSIZ) error_exit("Invalid device name.");
676 add_string_to_rtattr(&request.mhdr, sizeof(request), IFLA_IFNAME, name, len);
677
678 send_nlmesg(0, 0, 0, (void *)&request, request.mhdr.nlmsg_len);
679 return (filter_nlmesg(NULL,NULL));
680 }
681
link_set(char ** argv)682 static int link_set(char **argv)
683 {
684 struct arglist cmd_objectlist[] = {{"up", 0}, {"down", 1}, {"arp", 2},
685 {"multicast", 3}, {"dynamic", 4}, {"name", 5}, {"txqueuelen", 6},
686 {"mtu", 7},{"address", 8}, {"broadcast", 9}, {NULL,-1}};
687 int case_flags[] = {IFF_NOARP,IFF_MULTICAST,IFF_DYNAMIC};
688 struct ifreq req;
689 int idx, flags = 0, masks = 0xffff, fd;
690
691 memset(&req, 0, sizeof(req));
692 if (!*argv) error_exit("\"dev\" missing");
693 xstrncpy(req.ifr_name, *argv, IF_NAMESIZE);
694 fd = xsocket(AF_INET, SOCK_DGRAM, 0);
695 xioctl(fd, SIOCGIFINDEX, &req);
696 for (++argv; *argv;) {
697 if ((idx = substring_to_idx(*argv++, cmd_objectlist)) == -1) help_exit(0);
698 switch(idx) {
699 case 0:
700 flags |= IFF_UP; break;
701 case 1:
702 masks &= ~IFF_UP; break;
703 case 2:
704 case 3:
705 case 4:
706 if (!*argv) help_exit(0);
707 else if (!strcmp(*argv, "on")) {
708 if (idx == 2) {
709 masks &= ~case_flags[idx-2];
710 flags &= ~case_flags[idx-2];
711 } else flags |= case_flags[idx-2];
712 } else if (!strcmp(*argv,"off")) {
713 if (idx == 2) {
714 masks |= case_flags[idx-2];
715 flags |= case_flags[idx-2];
716 } else masks &= ~case_flags[idx-2];
717 } else help_exit(0);
718 ++argv;
719 break;
720 case 5:
721 xstrncpy(req.ifr_ifru.ifru_newname, *argv, IF_NAMESIZE);
722 xioctl(fd, SIOCSIFNAME, &req);
723 xstrncpy(req.ifr_name, *argv++, IF_NAMESIZE);
724 xioctl(fd, SIOCGIFINDEX, &req);
725 break;
726 case 6:
727 req.ifr_ifru.ifru_ivalue = atolx(*argv++);
728 xioctl(fd, SIOCSIFTXQLEN, &req);
729 break;
730 case 7:
731 req.ifr_ifru.ifru_mtu = atolx(*argv++);
732 xioctl(fd, SIOCSIFMTU, &req);
733 break;
734 case 8:
735 xioctl(fd, SIOCGIFHWADDR, &req);
736 fill_hwaddr(*argv++, IF_NAMESIZE,
737 (unsigned char *)(req.ifr_hwaddr.sa_data));
738 xioctl(fd, SIOCSIFHWADDR, &req);
739 break;
740 case 9:
741 xioctl(fd, SIOCGIFHWADDR, &req);
742 fill_hwaddr(*argv++, IF_NAMESIZE,
743 (unsigned char *)(req.ifr_hwaddr.sa_data));
744 xioctl(fd, SIOCSIFHWBROADCAST, &req);
745 break;
746 }
747 }
748 xioctl(fd, SIOCGIFFLAGS, &req);
749 req.ifr_ifru.ifru_flags |= flags;
750 req.ifr_ifru.ifru_flags &= masks;
751 xioctl(fd, SIOCSIFFLAGS, &req);
752 xclose(fd);
753 return 0;
754 }
755
print_stats(struct rtnl_link_stats * rtstat)756 static void print_stats(struct rtnl_link_stats *rtstat)
757 {
758 char *line_feed = (!TT.singleline ? "\n " : " ");
759
760 if (TT.stats > 0) {
761 xprintf(" RX: bytes packets errors "
762 "dropped overrun mcast%s%-10u %-8u %-7u %-8u %-8u %-8u\n",
763 line_feed, rtstat->rx_bytes, rtstat->rx_packets, rtstat->rx_errors,
764 rtstat->rx_dropped, rtstat->rx_over_errors, rtstat->multicast);
765 if (TT.stats > 1) {
766 xprintf(" RX: errors length crc "
767 "frame fifo missed%s%-10u %-8u %-7u %-8u %-8u %-8u\n",
768 line_feed, rtstat->rx_errors, rtstat->rx_length_errors,
769 rtstat->rx_crc_errors, rtstat->rx_frame_errors,
770 rtstat->rx_fifo_errors, rtstat->rx_missed_errors);
771 }
772 xprintf(" TX: bytes packets errors "
773 "dropped carrier collsns%s%-10u %-8u %-7u %-8u %-8u %-8u\n",
774 line_feed, rtstat->tx_bytes, rtstat->tx_packets, rtstat->tx_errors,
775 rtstat->tx_dropped, rtstat->tx_carrier_errors, rtstat->collisions);
776 if (TT.stats > 1) {
777 xprintf(" TX: errors aborted fifo window "
778 "heartbeat%s%-10u %-8u %-7u %-8u %-8u\n",
779 line_feed, rtstat->tx_errors, rtstat->tx_aborted_errors,
780 rtstat->tx_fifo_errors, rtstat->tx_window_errors,
781 rtstat->tx_heartbeat_errors);
782 }
783 }
784 }
785
print_link_output(struct linkdata * link)786 static int print_link_output(struct linkdata *link)
787 {
788 char *line_feed = " ", *flags,*peer = "brd";
789 struct arglist iface_flags[] = {{"",0},{"UP", IFF_UP},
790 {"BROADCAST", IFF_BROADCAST}, {"DEBUG", IFF_DEBUG},
791 {"LOOPBACK", IFF_LOOPBACK}, {"POINTOPOINT", IFF_POINTOPOINT},
792 {"NOTRAILERS", IFF_NOTRAILERS}, {"RUNNING", IFF_RUNNING},
793 {"NOARP", IFF_NOARP}, {"PROMISC",IFF_PROMISC},
794 {"ALLMULTI", IFF_ALLMULTI}, {"MASTER", IFF_MASTER}, {"SLAVE", IFF_SLAVE},
795 {"MULTICAST", IFF_MULTICAST}, {"PORTSEL", IFF_PORTSEL},
796 {"AUTOMEDIA", IFF_AUTOMEDIA}, {"DYNAMIC", IFF_DYNAMIC}, {NULL,-1}};
797
798 if (link->parent != -1) {
799 int fd = 0;
800 struct ifreq req;
801
802 memset(&req, 0, sizeof(req));
803 if_indextoname( link->parent,req.ifr_ifrn.ifrn_name);
804 fd = xsocket(AF_INET, SOCK_DGRAM, 0);
805 if (ioctl(fd, SIOCGIFTXQLEN, &req)) perror("");
806 else link->txqueuelen = req.ifr_ifru.ifru_ivalue;
807 xclose(fd);
808 }
809
810 if (TT.is_addr && addrinfo.label && fnmatch(addrinfo.label, link->iface, 0))
811 return 0;
812
813
814 if (!(flags = get_flag_string(iface_flags, link->flags, 1)))
815 error_exit("Invalid data.");
816 if (!TT.singleline) line_feed="\n ";
817 if (link->parent != -1) {
818 char iface[IF_NAMESIZE];
819
820 if (!if_indextoname(link->parent, iface)) perror_exit(NULL);
821 sprintf(toybuf,"%s@%s", link->iface, iface);
822 }
823 if (link->flags & IFF_POINTOPOINT) peer = "peer";
824 if (TT.is_addr && TT.singleline && TT.addressfamily)
825 xprintf("%d: %s", link->iface_idx,
826 ((link->parent == -1) ? link->iface : toybuf));
827 else xprintf("%d: %s: <%s> mtu %d qdisc %s state %s qlen %d",
828 link->iface_idx, ((link->parent == -1) ? link->iface : toybuf), flags,
829 link->mtu, link->qdiscpline, link->state, link->txqueuelen);
830
831 if (!TT.addressfamily || TT.addressfamily == AF_PACKET)
832 xprintf("%slink/%s %s %s %s",
833 line_feed, link->type, link->laddr, peer ,link->bcast);
834
835 xputc('\n');
836
837 //user can specify stats flag two times
838 //one for stats and other for erros e.g. -s and -s -s
839 print_stats(&link->rt_stat);
840 free(flags);
841
842 return 0;
843 }
844
fill_address(void * p,char * ip)845 static void fill_address(void *p, char *ip)
846 {
847 unsigned char *ptr = (unsigned char*)p;
848 snprintf(ip, 64, " %02x:%02x:%02x:%02x:%02x:%02x",
849 ptr[0], ptr[1], ptr[2], ptr[3], ptr[4], ptr[5]);
850 }
851
get_link_info(struct nlmsghdr * h,struct linkdata * link,char ** argv)852 static int get_link_info(struct nlmsghdr* h,struct linkdata* link,char **argv)
853 {
854 struct ifinfomsg *iface = NLMSG_DATA(h);
855 struct rtattr *attr = IFLA_RTA(iface);
856 int len = h->nlmsg_len - NLMSG_LENGTH(sizeof(*iface));
857 struct arglist hwtypes[]={{"generic",0},{"ether",ARPHRD_ETHER},
858 {"loopback", ARPHRD_LOOPBACK},{"sit",ARPHRD_SIT},
859 #ifdef ARPHRD_INFINIBAND
860 {"infiniband",ARPHRD_INFINIBAND},
861 #endif
862 #ifdef ARPHRD_IEEE802_TR
863 {"ieee802",ARPHRD_IEEE802}, {"tr",ARPHRD_IEEE802_TR},
864 #else
865 {"tr",ARPHRD_IEEE802},
866 #endif
867 #ifdef ARPHRD_IEEE80211
868 {"ieee802.11",ARPHRD_IEEE80211},
869 #endif
870 #ifdef ARPHRD_IEEE1394
871 {"ieee1394",ARPHRD_IEEE1394},
872 #endif
873 {"irda",ARPHRD_IRDA},{"slip",ARPHRD_SLIP},{"cslip",ARPHRD_CSLIP},
874 {"slip6",ARPHRD_SLIP6}, {"cslip6",ARPHRD_CSLIP6}, {"ppp",ARPHRD_PPP},
875 {"ipip",ARPHRD_TUNNEL}, {"tunnel6",ARPHRD_TUNNEL6},
876 {"gre",ARPHRD_IPGRE},
877 #ifdef ARPHRD_VOID
878 {"void",ARPHRD_VOID},
879 #endif
880 {NULL,-1}};
881 char *lname = get_flag_string(hwtypes, iface->ifi_type, 0);
882
883 link->next = link->prev = 0;
884 link->iface_type = iface->ifi_type;
885 if (!lname) error_exit("Invalid link.");
886 xstrncpy(link->type, lname, IFNAMSIZ);
887 free(lname);
888 link->iface_idx = iface->ifi_index;
889 link->flags = iface->ifi_flags;
890 if (*argv && !strcasecmp("up",*argv) && !(link->flags & IFF_UP)) return 1;
891 link->parent = -1;
892 for (; RTA_OK(attr, len); attr = RTA_NEXT(attr, len)) {
893 switch(attr->rta_type) {
894 case IFLA_IFNAME:
895 snprintf(link->iface, IFNAMSIZ, "%s",(char *) RTA_DATA(attr));
896 break;
897 case IFLA_ADDRESS:
898 if ( iface->ifi_type== ARPHRD_TUNNEL ||
899 iface->ifi_type == ARPHRD_SIT ||
900 iface->ifi_type == ARPHRD_IPGRE)
901 inet_ntop(AF_INET, RTA_DATA(attr), link->laddr, 64);
902 else fill_address(RTA_DATA(attr), link->laddr);
903 break;
904 case IFLA_BROADCAST:
905 if (iface->ifi_type== ARPHRD_TUNNEL ||
906 iface->ifi_type == ARPHRD_SIT ||
907 iface->ifi_type == ARPHRD_IPGRE)
908 inet_ntop(AF_INET, RTA_DATA(attr), link->bcast, 64);
909 else fill_address(RTA_DATA(attr), link->bcast);
910 break;
911 case IFLA_MTU:
912 link->mtu = *((int*)(RTA_DATA(attr)));
913 break;
914 case IFLA_QDISC:
915 snprintf(link->qdiscpline, IFNAMSIZ, "%s", (char *) RTA_DATA(attr));
916 break;
917 case IFLA_STATS :
918 link->rt_stat = *((struct rtnl_link_stats*) RTA_DATA(attr));
919 break;
920 case IFLA_LINK:
921 link->parent = *((int*)(RTA_DATA(attr)));
922 break;
923 case IFLA_TXQLEN:
924 link->txqueuelen = *((int*)(RTA_DATA(attr)));
925 break;
926 case IFLA_OPERSTATE:
927 {
928 struct arglist flags[]={{"UNKNOWN", 0}, {"NOTPRESENT", 1},
929 {"DOWN", 2}, {"LOWERLAYERDOWN", 3}, {"TESTING", 4},
930 {"DORMANT", 5}, {"UP", 6}, {NULL, -1}};
931 if (!(lname = get_flag_string(flags, *((int*)(RTA_DATA(attr))), 0)))
932 error_exit("Invalid state.");
933 xstrncpy(link->state, lname,IFNAMSIZ);
934 free(lname);
935 }
936 break;
937 default: break;
938 }
939 }
940 return 0;
941 }
942
display_link_info(struct nlmsghdr * mhdr,char ** argv)943 static int display_link_info(struct nlmsghdr *mhdr, char **argv)
944 {
945 struct linkdata link;
946
947 if (!get_link_info(mhdr, &link, argv)) {
948 if (TT.is_addr) {
949 struct linkdata *lnk = xzalloc(sizeof(struct linkdata));
950 memcpy(lnk, &link, sizeof(struct linkdata));
951 dlist_add_nomalloc((struct double_list **)&linfo,
952 (struct double_list *)lnk);
953 }
954 else print_link_output(&link);
955 }
956 return 0;
957 }
958
link_show(char ** argv)959 static int link_show(char **argv)
960 {
961 struct {
962 struct nlmsghdr mhdr;
963 struct ifinfomsg info;
964 } request;
965 uint32_t index = 0;
966
967 if (*argv && strcasecmp("up",*argv)) index = get_ifaceindex(*argv, 1);
968 memset(&request, 0, sizeof(request));
969 request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
970 request.mhdr.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
971 if (!index) request.mhdr.nlmsg_flags |= NLM_F_ROOT|NLM_F_MATCH;
972 else request.info.ifi_change = 0xffffffff; // used in single operation
973 request.mhdr.nlmsg_type = RTM_GETLINK;
974 request.info.ifi_index = index;
975 request.info.ifi_family = AF_UNSPEC;
976 send_nlmesg(0, 0, 0, (void*)&request, sizeof(request));
977 return (filter_nlmesg(display_link_info, argv));
978 }
979
iplink(char ** argv)980 static int iplink(char **argv)
981 {
982 int idx;
983 cmdobj ipcmd, cmdobjlist[] = {linkupdate, link_set, link_show};
984 struct arglist cmd_objectlist[] = {{"add", 0}, {"delete", 0},
985 {"set", 1}, {"show", 2}, {"list", 2}, {"lst", 2}, {NULL,-1}};
986
987 if (!*argv) idx = 2;
988 else if ((idx = substring_to_idx(*argv++, cmd_objectlist)) == -1)
989 help_exit(0);
990 ipcmd = cmdobjlist[idx];
991 return ipcmd(argv);
992 }
993
994 // ===========================================================================
995 // Code for ip addr.
996 // ===========================================================================
997
print_addrinfo(struct nlmsghdr * h,int flag_l)998 static int print_addrinfo(struct nlmsghdr *h, int flag_l)
999 {
1000 struct rtattr *rta, *rta_tb[IFA_MAX+1] = {0,};
1001 char *family = toybuf, *scope = toybuf+256, *label = toybuf+512,
1002 *brd = toybuf+768, *peer = toybuf+1024, *any = toybuf+1280,
1003 lbuf[INET6_ADDRSTRLEN] = {0,}, lbuf_ifa[INET6_ADDRSTRLEN] = {0,};
1004 struct ifaddrmsg *ifa = NLMSG_DATA(h);
1005 int len;
1006
1007 if ((len = h->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa))) < 0) {
1008 error_msg("wrong nlmsg len %d", len);
1009 return 0;
1010 }
1011
1012 for (rta = IFA_RTA(ifa); RTA_OK(rta, len); rta=RTA_NEXT(rta, len))
1013 if (rta->rta_type <= IFA_MAX) rta_tb[rta->rta_type] = rta;
1014
1015 if (!rta_tb[IFA_LOCAL]) rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1016 if (!rta_tb[IFA_ADDRESS]) rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
1017 if ((addrinfo.scope ^ ifa->ifa_scope)&addrinfo.scopemask) return 0;
1018 if (addrinfo.ifindex && addrinfo.ifindex != ifa->ifa_index) return 0;
1019
1020 if (flag_l && addrinfo.label && ifa->ifa_family == AF_INET6) return 0;
1021 if ((rta_tb[IFA_LABEL])) {
1022 xstrncpy(label, RTA_DATA(rta_tb[IFA_LABEL]), 256);
1023 label[255] = '\0';
1024 if (addrinfo.label && fnmatch(addrinfo.label, label, 0))
1025 return 0;
1026 }
1027
1028 if (TT.flush) {
1029 if (ifa->ifa_index == addrinfo.ifindex) {
1030 h->nlmsg_type = RTM_DELADDR;
1031 h->nlmsg_flags = NLM_F_REQUEST;
1032 send_nlmesg(RTM_DELADDR, 0, 0, h, h->nlmsg_len);
1033 return 0;
1034 }
1035 }
1036
1037 if (h->nlmsg_type == RTM_DELADDR) printf("Deleted ");
1038
1039 if (TT.singleline) {
1040 if (!if_indextoname(ifa->ifa_index, lbuf)) perror_exit(NULL);
1041 printf("%u: %s",ifa->ifa_index, lbuf);
1042 }
1043
1044 sprintf(scope, " scope %s ", namefromRPDB(ifa->ifa_scope, RPDB_rtscopes));
1045
1046 if (ifa->ifa_family == AF_INET) strcpy(family, " inet ");
1047 else if (ifa->ifa_family == AF_INET6) strcpy(family, " inet6 ");
1048 else sprintf(family, " family %d", ifa->ifa_family);
1049
1050 if (rta_tb[IFA_LOCAL]) {
1051 if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_LOCAL]),
1052 lbuf, sizeof(lbuf))) perror_exit("inet");
1053
1054 sprintf(family+strlen(family), lbuf, strlen(lbuf));
1055 if (!rta_tb[IFA_ADDRESS] || !memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
1056 RTA_DATA(rta_tb[IFA_LOCAL]), 4))
1057 sprintf(family+strlen(family), "/%d ", ifa->ifa_prefixlen);
1058 else {
1059 if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_ADDRESS]),
1060 lbuf_ifa, sizeof(lbuf_ifa))) perror_exit("inet");
1061 sprintf(peer, " peer %s/%d ", lbuf_ifa, ifa->ifa_prefixlen);
1062 }
1063 }
1064
1065 if (addrinfo.to && strcmp(addrinfo.addr, lbuf))
1066 return 0;
1067
1068 if (rta_tb[IFA_BROADCAST]) {
1069 if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_BROADCAST]),
1070 lbuf, sizeof(lbuf))) perror_exit("inet");
1071 sprintf(brd, " brd %s", lbuf);
1072 }else brd = "";
1073
1074 if (rta_tb[IFA_ANYCAST]) {
1075 if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_ANYCAST]),
1076 lbuf, sizeof(lbuf))) perror_exit("inet");
1077 sprintf(any, " any %s", lbuf);
1078 }
1079
1080 if (ifa->ifa_family == AF_INET)
1081 printf("%s%s%s%s%s %c", family, brd, peer, scope, label,
1082 (TT.singleline? '\0' : '\n'));
1083 else printf("%s%s %c", family, scope, (TT.singleline? '\0' : '\n'));
1084 if (TT.singleline && (ifa->ifa_family == AF_INET)) xputc('\n');
1085
1086 if (rta_tb[IFA_CACHEINFO]) {
1087 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
1088
1089 printf("%c valid_lft ", (TT.singleline? '\\' : '\0'));
1090 if (ci->ifa_valid == 0xFFFFFFFFU) printf("forever");
1091 else printf("%usec", ci->ifa_valid);
1092 printf(" preferred_lft ");
1093 if (ci->ifa_prefered == 0xFFFFFFFFU) printf("forever");
1094 else printf("%dsec", ci->ifa_prefered);
1095 xputc('\n');
1096 }
1097 return 0;
1098 }
1099
ipaddrupdate(char ** argv)1100 static int ipaddrupdate(char **argv)
1101 {
1102 int length, cmd = !memcmp("add", argv[-1], strlen(argv[-1]))
1103 ? RTM_NEWADDR: RTM_DELADDR;
1104 int idx = 0,length_brd = 0, length_peer = 0,length_any = 0,length_local = 0,
1105 scoped = 0;
1106 char *dev = NULL,*label = NULL, reply[8192];
1107
1108 struct nlmsghdr *addr_ptr = NULL;
1109 struct nlmsgerr *err = NULL;
1110 struct arglist cmd_objectlist[] = {{"dev",0}, {"peer", 1},
1111 {"remote", 2}, {"broadcast", 3}, {"brd", 4}, {"label", 5},
1112 {"anycast", 6},{"scope", 7}, {"local", 8}, {NULL, -1}};
1113 struct {
1114 struct nlmsghdr nlm;
1115 struct ifaddrmsg ifadd;
1116 char buf[256];
1117 } req;
1118 typedef struct {
1119 int family, bytelen, bitlen;
1120 __u32 data[8];
1121 } option_data;
1122 option_data local;
1123
1124 memset(&req, 0, sizeof(req));
1125 req.nlm.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg));
1126 req.nlm.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
1127 req.nlm.nlmsg_type = cmd;
1128 req.ifadd.ifa_family = TT.addressfamily;
1129
1130 while (*argv) {
1131 idx = substring_to_idx(*argv, cmd_objectlist);
1132 if (idx >= 0)
1133 if (!*++argv)
1134 error_exit("Incomplete Command line");
1135 switch(idx) {
1136 case 0:
1137 dev = *argv;
1138 break;
1139 case 1:
1140 case 2:
1141 {
1142 uint32_t addr[4] = {0,}, netmask = 0;
1143 uint8_t len = 0;
1144 parse_prefix(addr, &netmask, &len, *argv,
1145 req.ifadd.ifa_family);
1146 if (len)
1147 req.ifadd.ifa_family = ((len == 4) ? AF_INET : AF_INET6);
1148 length_peer = len;
1149 add_string_to_rtattr(&req.nlm, sizeof(req),
1150 IFA_ADDRESS, addr, len);
1151 req.ifadd.ifa_prefixlen = netmask;
1152 }
1153 break;
1154 case 3:
1155 case 4:
1156 if (*argv[0] == '+') {
1157 length_brd = -1;
1158 } else if (*argv[0] == '-') {
1159 length_brd = -2;
1160 } else {
1161 uint32_t addr[4] = {0,};
1162 uint8_t af = AF_UNSPEC;
1163
1164 if (get_prefix(addr, &af, *argv, req.ifadd.ifa_family))
1165 error_exit("Invalid prefix");
1166
1167 length_brd = ((af == AF_INET6) ? 16 : 4);
1168 if (req.ifadd.ifa_family == AF_UNSPEC)
1169 req.ifadd.ifa_family = af;
1170 add_string_to_rtattr(&req.nlm, sizeof(req),
1171 IFA_BROADCAST, &addr, length_brd);
1172 }
1173 break;
1174 case 5:
1175 label = *argv;
1176 add_string_to_rtattr(&req.nlm, sizeof(req),
1177 IFA_LABEL, label, strlen(label) + 1);
1178 break;
1179 case 6:
1180 {
1181 uint32_t addr[4] = {0,};
1182 uint8_t af = AF_UNSPEC;
1183
1184 if (get_prefix(addr, &af, *argv, req.ifadd.ifa_family))
1185 error_exit("Invalid prefix");
1186 length_any = ((af == AF_INET6) ? 16 : 4);
1187 if (req.ifadd.ifa_family == AF_UNSPEC)
1188 req.ifadd.ifa_family = af;
1189 add_string_to_rtattr(&req.nlm, sizeof(req),
1190 IFA_ANYCAST, &addr, length_any);
1191 }
1192 break;
1193 case 7:
1194 {
1195 int scope = idxfromRPDB(*argv, RPDB_rtscopes);
1196 if (scope < 0) error_exit("wrong scope '%s'", *argv);
1197 req.ifadd.ifa_scope = scope;
1198 scoped = 1;
1199 }
1200 break;
1201 default:
1202 {
1203 //local is by default
1204 uint32_t addr[8] = {0,}, netmask = 0;
1205 uint8_t len = 0;
1206
1207 parse_prefix(addr, &netmask, &len, *argv,
1208 req.ifadd.ifa_family);
1209 if (len)
1210 req.ifadd.ifa_family = ((len == 4) ? AF_INET : AF_INET6);
1211 length_local = len;
1212 local.bitlen = netmask;
1213 local.bytelen = len;
1214 memcpy(local.data, addr, sizeof(local.data));
1215 local.family = req.ifadd.ifa_family;
1216 add_string_to_rtattr(&req.nlm, sizeof(req),
1217 IFA_LOCAL, &local.data, local.bytelen);
1218 }
1219 break;
1220 }
1221 argv++;
1222 }
1223 if (!dev) error_exit("need \"dev \" argument");
1224 if (label && strncmp(dev, label, strlen(dev)) != 0)
1225 error_exit("\"dev\" (%s) must match \"label\" (%s)", dev, label);
1226
1227 if (length_peer == 0 && length_local && cmd != RTM_DELADDR){
1228 add_string_to_rtattr(&req.nlm, sizeof(req),
1229 IFA_ADDRESS, &local.data, local.bytelen);
1230 }
1231
1232 if (length_brd < 0 && cmd != RTM_DELADDR){
1233 int i;
1234
1235 if (req.ifadd.ifa_family != AF_INET)
1236 error_exit("broadcast can be set only for IPv4 addresses");
1237
1238 if (local.bitlen <= 30) {
1239 for (i = 31; i >= local.bitlen; i--) {
1240 if (length_brd == -1)
1241 local.data[0] |= htonl(1<<(31-i));
1242 else
1243 local.data[0] &= ~htonl(1<<(31-i));
1244 }
1245 add_string_to_rtattr(&req.nlm, sizeof(req),
1246 IFA_BROADCAST, &local.data, local.bytelen);
1247 length_brd = local.bytelen;
1248 }
1249 }
1250 if (req.ifadd.ifa_prefixlen == 0)
1251 req.ifadd.ifa_prefixlen = local.bitlen;
1252 if (!scoped && (cmd != RTM_DELADDR) && (local.family == AF_INET)
1253 && (local.bytelen >= 1 && *(uint8_t*)&local.data == 127))
1254 req.ifadd.ifa_scope = RT_SCOPE_HOST;
1255 req.ifadd.ifa_index = get_ifaceindex(dev, 1);
1256
1257 send_nlmesg(RTM_NEWADDR, 0, AF_UNSPEC, (void *)&req, req.nlm.nlmsg_len);
1258 length = recv(TT.sockfd, reply, sizeof(reply), 0);
1259 addr_ptr = (struct nlmsghdr *) reply;
1260 for (; NLMSG_OK(addr_ptr, length); addr_ptr = NLMSG_NEXT(addr_ptr, length)) {
1261 if (addr_ptr->nlmsg_type == NLMSG_DONE)
1262 return 1;
1263 if (addr_ptr->nlmsg_type == NLMSG_ERROR)
1264 err = (struct nlmsgerr*) NLMSG_DATA(addr_ptr);
1265 if (err && err->error) {
1266 errno = -err->error;
1267 perror_exit("RTNETLINK answers:");
1268 }
1269 }
1270 return 0;
1271 }
1272
ipaddr_listflush(char ** argv)1273 static int ipaddr_listflush(char **argv)
1274 {
1275 int idx; uint32_t netmask = 0, found = 0;
1276 char *tmp = NULL, *name = NULL;
1277 struct double_list *dlist;
1278 struct arglist cmd_objectlist[] = {{"to", 0}, {"scope", 1}, {"up", 2},
1279 {"label", 3}, {"dev", 4}, {NULL, -1}};
1280
1281 TT.flush = *argv[-1] == 'f' ? 1 : 0;
1282 memset(&addrinfo, 0, sizeof(addrinfo));
1283
1284 if (TT.flush) {
1285 if (!*argv)
1286 error_exit("Incomplete command for \"flush\"");
1287 if (TT.addressfamily == AF_PACKET)
1288 error_exit("Can't flush link Addresses");
1289 }
1290 addrinfo.scope = -1;
1291 while (*argv) {
1292 switch (idx = substring_to_idx(*argv, cmd_objectlist)) {
1293 case 0:
1294 {// ADDR_TO
1295 if (!*++argv) error_exit("Incomplete Command line");
1296 else if (!strcmp(*argv, "0")) return 0;
1297 uint32_t addr[4] = {0,};
1298 uint8_t len = 0;
1299
1300 addrinfo.to = 1;
1301 parse_prefix(addr, &netmask, &len, *argv, TT.addressfamily);
1302 if (len)
1303 TT.addressfamily = ((len == 4) ? AF_INET : AF_INET6);
1304 addrinfo.addr = strtok(*argv, "/");
1305 }
1306 break;
1307 case 1: // ADDR_SCOPE
1308 {
1309 int scope = 0;
1310 if (!*++argv) error_exit("Incomplete Command line");
1311 name = *argv;
1312
1313 addrinfo.scopemask = -1;
1314 if (isdigit(**argv)) {
1315 int idx = atolx(*argv);
1316
1317 name = xstrdup(namefromRPDB(idx, RPDB_rtscopes));
1318 }
1319 if ((scope = idxfromRPDB(name, RPDB_rtscopes)) < 0) {
1320 if (strcmp(name, "all"))
1321 error_exit("wrong scope '%s'", name);
1322 scope = RT_SCOPE_NOWHERE;
1323 addrinfo.scopemask = 0;
1324 }
1325
1326 if (isdigit(**argv))
1327 free(name);
1328 addrinfo.scope = scope;
1329 }
1330 break;
1331 case 2: // ADDR_UP
1332 addrinfo.up = 1;
1333 break;
1334 case 3: // ADDR_LABEL
1335 if (!*++argv) error_exit("Incomplete Command line");
1336 addrinfo.label = *argv;
1337 break;
1338 case 4: // ADDR_DEV
1339 if (!*++argv) error_exit("Incomplete Command line");
1340
1341 default:
1342 if (TT.filter_dev)
1343 error_exit("Either \"dev\" is duplicate or %s is garbage",
1344 *argv);
1345 TT.filter_dev = *argv;
1346 break;
1347 }
1348 argv++;
1349 }
1350
1351 link_show(&tmp);
1352 while ( linfo && (dlist = dlist_pop(&linfo))){
1353 struct linkdata *tmp = (struct linkdata*) dlist;
1354 char *temp = &tmp->iface[0];
1355
1356 if (TT.filter_dev && strcmp(TT.filter_dev, temp))
1357 continue;
1358 found = 1;
1359 if (TT.flush && addrinfo.label) ipaddr_print( tmp, 0);
1360 if (addrinfo.up && !(tmp->flags & IFF_UP)){
1361 ipaddr_print(tmp, 0);
1362 continue;
1363 }
1364 if (addrinfo.label){
1365 if ( fnmatch(addrinfo.label, temp, 0)) {
1366 ipaddr_print(tmp, 1);
1367 continue;
1368 }
1369 }
1370 if (!TT.addressfamily && ! TT.flush ) print_link_output(tmp);
1371
1372 ipaddr_print(tmp, 0);
1373 free(tmp);
1374 }
1375 if (TT.filter_dev && !found)
1376 error_exit("Device \"%s\" doesn't exist. \n", TT.filter_dev);
1377 return 0;
1378 }
1379
ipaddr_print(struct linkdata * link,int flag_l)1380 static int ipaddr_print( struct linkdata *link, int flag_l)
1381 {
1382 struct nlmsghdr *addr_ptr;
1383 int ip_match = 0;
1384
1385 addrinfo.ifindex = link->iface_idx;
1386 send_nlmesg(RTM_GETADDR, NLM_F_ROOT|NLM_F_MATCH|NLM_F_REQUEST,
1387 AF_UNSPEC, NULL, 0);
1388 if (TT.addressfamily == AF_PACKET) print_link_output(link);
1389
1390 if (addrinfo.label){
1391 char *col = strchr(addrinfo.label, ':');
1392 if (!col && (fnmatch(addrinfo.label, &link->iface[0], 0)))
1393 return 0;
1394 }
1395
1396 while (1){
1397 int len = recv(TT.sockfd, TT.gbuf, sizeof(TT.gbuf), 0);
1398 addr_ptr = (struct nlmsghdr *)TT.gbuf;
1399 struct ifaddrmsg *addressInfo = NLMSG_DATA(addr_ptr);
1400 char lbuf[INET6_ADDRSTRLEN];
1401 struct rtattr *rta, *rta_tb[IFA_MAX+1] = {0,};
1402
1403 int len1 = addr_ptr->nlmsg_len - NLMSG_LENGTH(sizeof(*addressInfo));
1404 if (len1 > 0) {
1405 for (; NLMSG_OK(addr_ptr, len); addr_ptr = NLMSG_NEXT(addr_ptr, len)) {
1406 addressInfo = NLMSG_DATA(addr_ptr);
1407 if (TT.addressfamily && TT.addressfamily != addressInfo->ifa_family)
1408 continue;
1409 if (addrinfo.ifindex && addrinfo.ifindex != addressInfo->ifa_index)
1410 continue;
1411
1412 if (addrinfo.to) {
1413 memset(rta_tb, 0, sizeof(rta_tb));
1414 int rt_len = IFA_PAYLOAD(addr_ptr);
1415 for (rta = IFA_RTA(addressInfo); RTA_OK(rta, rt_len); rta=RTA_NEXT(rta, rt_len)) {
1416 if (rta->rta_type <= IFA_MAX) rta_tb[rta->rta_type] = rta;
1417 }
1418 if (!rta_tb[IFA_LOCAL]) rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1419 if (rta_tb[IFA_LOCAL]) {
1420 if (!inet_ntop(TT.addressfamily, RTA_DATA(rta_tb[IFA_LOCAL]),
1421 lbuf, sizeof(lbuf))) perror_exit("inet");
1422 if (strcmp(addrinfo.addr, lbuf))
1423 continue;
1424 ip_match=1;
1425 }
1426 if (!ip_match)
1427 continue;
1428 }
1429
1430 if (!TT.flush){
1431 if (addrinfo.scope != -1 && TT.addressfamily && TT.addressfamily ==
1432 addressInfo->ifa_family &&
1433 (addrinfo.ifindex == addressInfo->ifa_index)) {
1434 if ((addrinfo.scope ^ addressInfo->ifa_scope) & addrinfo.scopemask)
1435 continue;
1436 else if (addrinfo.up && (link->flags & IFF_UP))
1437 print_link_output(link);
1438 else if (!addrinfo.up) print_link_output(link);
1439 }
1440 if (TT.addressfamily &&
1441 (addrinfo.ifindex == addressInfo->ifa_index) &&
1442 (addrinfo.scope == -1)){
1443 if (addrinfo.up && (link->flags & IFF_UP))
1444 print_link_output(link);
1445 else if (!addrinfo.up) print_link_output(link);
1446 }
1447 }
1448
1449 for (; NLMSG_OK(addr_ptr, len); addr_ptr = NLMSG_NEXT(addr_ptr, len)) {
1450 if (addr_ptr->nlmsg_type == RTM_NEWADDR)
1451 print_addrinfo(addr_ptr, flag_l);
1452 if ((addr_ptr->nlmsg_type == NLMSG_DONE) ||
1453 (addr_ptr->nlmsg_type == NLMSG_ERROR) ||
1454 (TT.flush && addrinfo.to))
1455 goto ret_stop;
1456 }
1457 if ((addr_ptr->nlmsg_type == NLMSG_DONE) ||
1458 (addr_ptr->nlmsg_type == NLMSG_ERROR))
1459 break;
1460 }
1461 }
1462 else
1463 return 0;
1464 }
1465
1466 ret_stop:
1467 return 0;
1468 }
1469
ipaddr(char ** argv)1470 static int ipaddr(char **argv)
1471 {
1472 int idx;
1473 cmdobj ipcmd, cmdobjlist[] = {ipaddrupdate, ipaddr_listflush};
1474 struct arglist cmd_objectlist[] = { {"add", 0}, {"delete", 0},
1475 {"list", 1},{"show", 1},{"lst", 1}, {"flush", 1}, {NULL,-1}};
1476
1477 TT.is_addr++;
1478 if (!*argv) idx = 1;
1479 else if ((idx = substring_to_idx(*argv++, cmd_objectlist)) == -1)
1480 help_exit(0);
1481
1482 ipcmd = cmdobjlist[idx];
1483 return ipcmd(argv);
1484 }
1485
1486 // ===========================================================================
1487 // code for ip route
1488 // ===========================================================================
1489 struct I_data {
1490 unsigned char family;
1491 uint32_t addr[8] , netmask ;
1492 uint8_t len ;
1493 };
1494
1495 struct {
1496 int tb,idev,odev,proto;
1497 struct I_data rvia, rdst, mdst, rsrc, msrc;
1498 } gfilter;
1499
show_iproute_help(void)1500 static void show_iproute_help(void)
1501 {
1502 error_exit("\n\n" \
1503 "iproute { list | flush } SELECTOR\n" \
1504 "iproute get ADDRESS [from ADDRESS iif STRING]\n" \
1505 " [oif STRING]\n" \
1506 "iproute { add | del | change | append | replace | test } ROUTE\n" \
1507 " SELECTOR := [root PREFIX] [match PREFIX] [proto RTPROTO]\n" \
1508 " ROUTE := [TYPE] PREFIX [proto RTPROTO] [metric METRIC]");
1509 }
1510
print_rta_metrics(char * out,const struct rtattr * mxattr)1511 static void print_rta_metrics(char* out, const struct rtattr *mxattr)
1512 {
1513 int32_t tvar = RTA_PAYLOAD(mxattr);
1514 struct rtattr *rta, *mxrta[RTAX_MAX+1] = {0,};
1515 unsigned int mxlock = 0;
1516 int i;
1517
1518 for (rta = RTA_DATA(mxattr); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
1519 if (rta->rta_type <= RTA_MAX) mxrta[rta->rta_type] = rta;
1520
1521 if (mxrta[RTAX_LOCK])
1522 mxlock = *(u_int32_t *)RTA_DATA(mxrta[RTAX_LOCK]);
1523
1524 for (i = 2; i <= RTAX_MAX; i++) {
1525 uint32_t val = 0;
1526
1527 if (mxrta[i] == NULL && !(mxlock & (1 << i)))
1528 continue;
1529
1530 if (mxrta[i] != NULL && i != RTAX_CC_ALGO)
1531 val = *(u_int32_t *)RTA_DATA(mxrta[i]);
1532
1533 if (i == RTAX_HOPLIMIT && (int)val == -1)
1534 continue;
1535
1536 if (i < sizeof(mx_names)/sizeof(char *) && mx_names[i])
1537 sprintf(out, "%s%s ", out, mx_names[i]);
1538 else
1539 sprintf(out, "%smetric %d ", out, i);
1540
1541 if (mxlock & (1<<i))
1542 sprintf(out, "%slock ", out);
1543
1544 switch (i) {
1545 case RTAX_RTT:
1546 case RTAX_RTTVAR:
1547 case RTAX_RTO_MIN:
1548 if (i == RTAX_RTT)
1549 val /= 8;
1550 else if (i == RTAX_RTTVAR)
1551 val /= 4;
1552
1553 if (val >= 1000)
1554 sprintf(out, "%s%gs ", out, val / 1e3);
1555 else
1556 sprintf(out, "%s%ums ", out, val);
1557 break;
1558
1559 case RTAX_CC_ALGO:
1560 sprintf(out, "%scongestion %s ", out, (const char*)RTA_DATA(mxrta[i]));
1561 break;
1562
1563 default:
1564 sprintf(out, "%s%u ", out, val);
1565 break;
1566 }
1567 }
1568 }
1569
display_route_info(struct nlmsghdr * mhdr,char ** argv)1570 static int display_route_info(struct nlmsghdr *mhdr, char **argv)
1571 {
1572 char *inetval = NULL, out[1024] = {0};
1573 struct rtmsg *msg = NLMSG_DATA(mhdr);
1574 struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
1575 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
1576 int hlen = ((msg->rtm_family == AF_INET) ? 32
1577 : ((msg->rtm_family == AF_INET6) ? 128 : -1));
1578
1579 if (mhdr->nlmsg_type != RTM_NEWROUTE) return 0;
1580 if (msglen < 0) return 1;
1581
1582 if (msg->rtm_family == AF_INET6) {
1583 if (gfilter.tb) {
1584 if (gfilter.tb < 0) {
1585 if (!(msg->rtm_flags & RTM_F_CLONED)) return 0;
1586 } else {
1587 if (msg->rtm_flags & RTM_F_CLONED) return 0;
1588 if (gfilter.tb == RT_TABLE_LOCAL && msg->rtm_type != RTN_LOCAL)
1589 return 0;
1590 else if (gfilter.tb == RT_TABLE_MAIN && msg->rtm_type == RTN_LOCAL)
1591 return 0;
1592 }
1593 }
1594 }
1595 else if (gfilter.tb > 0 && gfilter.tb != msg->rtm_table) return 0;
1596
1597 if (gfilter.proto && (msg->rtm_protocol != gfilter.proto)) return 0;
1598
1599
1600 if (gfilter.rdst.family && (msg->rtm_family != gfilter.rdst.family ||
1601 gfilter.rdst.netmask > msg->rtm_dst_len)) return 0;
1602 if (gfilter.mdst.family && (msg->rtm_family != gfilter.mdst.family
1603 || (gfilter.mdst.netmask < msg->rtm_dst_len))) return 0;
1604 if (gfilter.rsrc.family && (msg->rtm_family != gfilter.rsrc.family
1605 || gfilter.rsrc.netmask > msg->rtm_src_len)) return 0;
1606 if (gfilter.msrc.family && (msg->rtm_family != gfilter.msrc.family
1607 || (gfilter.msrc.netmask < msg->rtm_src_len))) return 0;
1608 tvar = msglen;
1609
1610 for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
1611 if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
1612
1613 if (msg->rtm_type != RTN_UNICAST)
1614 sprintf(out,"%s%s ", out,rtmtype_idx2str(msg->rtm_type));
1615 if (attr[RTA_DST]) {
1616 inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_DST]),
1617 toybuf, sizeof(toybuf));
1618 if (gfilter.rdst.family &&
1619 memcmp(RTA_DATA(attr[RTA_DST]), &gfilter.rdst.addr, gfilter.rdst.len))
1620 return 0;
1621 if (gfilter.mdst.family &&
1622 memcmp(RTA_DATA(attr[RTA_DST]), &gfilter.mdst.addr, gfilter.mdst.len))
1623 return 0;
1624 sprintf(out,"%s%s",out,inetval);
1625 }
1626 if (msg->rtm_dst_len) sprintf(out,"%s/%d ", out,msg->rtm_dst_len);
1627 else sprintf(out,"%s%s",out,"default ");
1628
1629 if (attr[RTA_SRC]) {
1630 inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_SRC]),
1631 toybuf, sizeof(toybuf));
1632 if (gfilter.rsrc.family &&
1633 memcmp(RTA_DATA(attr[RTA_SRC]), &gfilter.rsrc.addr, gfilter.rsrc.len))
1634 return 0;
1635 if (gfilter.msrc.family &&
1636 memcmp(RTA_DATA(attr[RTA_SRC]), &gfilter.msrc.addr, gfilter.msrc.len))
1637 return 0;
1638 sprintf(out, "%s from %s", out, inetval);
1639 }
1640 if (msg->rtm_src_len) sprintf(out, "%s/%d ", out, msg->rtm_src_len);
1641
1642 if (attr[RTA_GATEWAY]) {
1643 inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_GATEWAY]),
1644 toybuf, sizeof(toybuf));
1645 sprintf(out, "%s via %s ", out, inetval);
1646 }
1647 if (gfilter.rvia.family) {
1648 char tmp[256];
1649
1650 if (!attr[RTA_GATEWAY]) return 0;
1651 if (strcmp((char *)inet_ntop(msg->rtm_family, gfilter.rvia.addr,
1652 tmp, sizeof(tmp)), inetval)) return 0;
1653 }
1654
1655 if (gfilter.odev != 0) if (!attr[RTA_OIF]) return 0;
1656 if (attr[RTA_OIF]) {
1657 if (gfilter.odev !=0 && gfilter.odev != *(int*)RTA_DATA(attr[RTA_OIF]))
1658 return 0;
1659 sprintf(out, "%s dev %s ", out,
1660 if_indextoname(*(int*)RTA_DATA(attr[RTA_OIF]), toybuf));
1661 }
1662
1663 if (attr[RTA_PREFSRC] && hlen) {
1664 inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_PREFSRC]),
1665 toybuf, sizeof(toybuf));
1666 sprintf(out, "%s src %s ", out, inetval);
1667 }
1668 if (attr[RTA_PRIORITY])
1669 sprintf(out, "%s metric %d ", out, *(uint32_t*)RTA_DATA(attr[RTA_PRIORITY]));
1670 if (msg->rtm_family == AF_INET6) {
1671 struct rta_cacheinfo *ci = NULL;
1672 if (attr[RTA_CACHEINFO]) ci = RTA_DATA(attr[RTA_CACHEINFO]);
1673 if ((msg->rtm_flags & RTM_F_CLONED) || (ci && ci->rta_expires)) {
1674 if (msg->rtm_flags & RTM_F_CLONED) sprintf(out, "%s%s cache ",
1675 out, (!TT.singleline ? "\n" : " "));
1676 if (ci && ci->rta_expires) {
1677 int hz = 0;
1678 FILE *fp = xfopen("/proc/net/psched","r");
1679
1680 if (fp) {
1681 unsigned int nom, denom;
1682
1683 if (fscanf(fp, "%*08x%*08x%08x%08x", &nom, &denom) == 2)
1684 if (nom == 1000000)
1685 hz = denom;
1686 fclose(fp);
1687 }
1688 if (!hz) hz = sysconf(_SC_CLK_TCK);
1689 sprintf(out, "%s expires %dsec", out, ci->rta_expires /hz);
1690 }
1691 if (ci && ci->rta_error) sprintf(out, "%s error %d", out, ci->rta_error);
1692 }
1693 else if (ci && ci->rta_error)
1694 sprintf(out, "%s error %d", out, ci->rta_error);
1695 }
1696 if (attr[RTA_IIF] && !gfilter.idev)
1697 sprintf(out, "%s iif %s", out,
1698 if_indextoname(*(int*)RTA_DATA(attr[RTA_IIF]), toybuf));
1699
1700 if (attr[RTA_METRICS])
1701 print_rta_metrics(out, attr[RTA_METRICS]);
1702
1703 if (TT.flush || (TT.connected && !TT.from_ok))
1704 memcpy(toybuf, (void*)mhdr,mhdr->nlmsg_len);
1705
1706 if (TT.flush) {
1707 int sockfd = 0;
1708 struct nlmsghdr* mhdr = (struct nlmsghdr*)toybuf;
1709 struct rtmsg *msg = NLMSG_DATA(mhdr);
1710 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
1711 struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
1712
1713 tvar = msglen;
1714 for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
1715 if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
1716
1717 if (msg->rtm_family == AF_INET6
1718 && !msg->rtm_dst_len
1719 && msg->rtm_type == RTN_UNREACHABLE
1720 && attr[RTA_PRIORITY]
1721 && *(int*)RTA_DATA(attr[RTA_PRIORITY]) == -1)
1722 return 0;
1723
1724 mhdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
1725 mhdr->nlmsg_type = RTM_DELROUTE;
1726 mhdr->nlmsg_pid = 0;
1727 sockfd = xsocket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
1728 if (send(sockfd , (void*)mhdr, mhdr->nlmsg_len, 0) < 0)
1729 perror_exit("Unable to send data on socket.");
1730
1731 while (1) {
1732 struct nlmsghdr *mhdr;
1733 int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0);
1734
1735 if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue;
1736 else if (msglen < 0) {
1737 error_msg("netlink receive error %s", strerror(errno));
1738 xclose(sockfd);
1739 return 1;
1740 } else if (!msglen) {
1741 error_msg("EOF on netlink");
1742 xclose(sockfd);
1743 return 1;
1744 }
1745
1746 for (mhdr = (struct nlmsghdr*)toybuf; NLMSG_OK(mhdr, msglen);
1747 mhdr = NLMSG_NEXT(mhdr, msglen)) {
1748 switch (mhdr->nlmsg_type) {
1749 case NLMSG_DONE:
1750 xclose(sockfd);
1751 return 0;
1752 case NLMSG_ERROR:
1753 {
1754 struct nlmsgerr *merr = (struct nlmsgerr*)NLMSG_DATA(mhdr);
1755
1756 if (merr->error == 0) { xclose(sockfd); return 0; }
1757 if (mhdr->nlmsg_len < NLMSG_LENGTH(sizeof(struct nlmsgerr)))
1758 error_msg("ERROR truncated");
1759 else {
1760 errno = -merr->error;
1761 perror_msg("RTNETLINK answers");
1762 }
1763 xclose(sockfd);
1764 return 1;
1765 }
1766 default:
1767 break;
1768 }
1769 } // End of for loop.
1770 } // End of while loop.
1771
1772 xclose(sockfd);
1773 } else printf("%s\n",out);
1774 return 0;
1775 }
1776
route_get(char ** argv)1777 static int route_get(char **argv)
1778 {
1779 int idx, flag;
1780 struct arglist cmd_objectlist[] = {{"from", 0}, {"iif", 1}, {"oif", 2},
1781 {"dev", 3}, {"notify", 4}, {"connected", 5}, {"to", 6}, {NULL, -1}};
1782 char *idev = NULL, *odev = NULL;
1783 struct {
1784 struct nlmsghdr mhdr;
1785 struct rtmsg msg;
1786 char buf[1024];
1787 } request;
1788
1789 memset(&request, 0, sizeof(request));
1790 request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
1791 request.mhdr.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
1792 request.mhdr.nlmsg_type = RTM_GETROUTE;
1793 request.msg.rtm_family = AF_UNSPEC;
1794
1795 for (; *argv; argv++) {
1796 switch(idx = substring_to_idx(*argv, cmd_objectlist)) {
1797 case 0: TT.from_ok = 1; // dst address
1798 case 6: argv++; //fallthrough
1799 default:
1800 {
1801 uint32_t addr[8] = {0,}, netmask = 0;
1802 uint8_t len = 0;
1803
1804 if (!*argv) error_exit("'%s': Missing Prefix", argv[-1]);
1805 parse_prefix(addr, &netmask, &len, *argv, request.msg.rtm_family);
1806 if (len) request.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
1807 netmask = (request.msg.rtm_family == AF_INET6) ? 128 : 32;
1808 if (!idx) request.msg.rtm_src_len = netmask;
1809 else request.msg.rtm_dst_len = netmask;
1810 add_string_to_rtattr(&request.mhdr, sizeof(request),
1811 (!idx ? RTA_SRC : RTA_DST), addr, len);
1812 break;
1813 }
1814 case 1:
1815 case 2:
1816 case 3:
1817 if (!*++argv) show_iproute_help();
1818 if (idx == 1) idev = *argv, flag = RTA_IIF;
1819 else odev = *argv, flag = RTA_OIF;
1820 idx = get_ifaceindex(*argv, 1);
1821 add_string_to_rtattr(&request.mhdr, sizeof(request),
1822 flag, (char*)&idx, sizeof(idx));
1823 break;
1824 case 4:
1825 request.msg.rtm_flags |= RTM_F_NOTIFY;
1826 break;
1827 case 5:
1828 TT.connected = 1;
1829 break;
1830 }
1831 }
1832 if (!request.msg.rtm_dst_len)
1833 error_exit("need at least destination address");
1834
1835 send_nlmesg(0, 0, 0, &request, sizeof(request));
1836 filter_nlmesg(display_route_info, NULL);
1837
1838 if (TT.connected && !TT.from_ok) {
1839 struct nlmsghdr *mhdr = (struct nlmsghdr*)toybuf;
1840 struct rtmsg *msg = NLMSG_DATA(mhdr);
1841 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
1842 struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
1843
1844 if (mhdr->nlmsg_type != RTM_NEWROUTE) error_exit("not a route?");
1845 if (msglen < 0) error_exit("wrong len %d", msglen);
1846
1847 tvar = msglen;
1848 for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
1849 if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
1850
1851 if (attr[RTA_PREFSRC]) {
1852 attr[RTA_PREFSRC]->rta_type = RTA_SRC;
1853 msg->rtm_src_len = 8*RTA_PAYLOAD(attr[RTA_PREFSRC]);
1854 } else if (!attr[RTA_SRC]) error_exit("can't connect the route");
1855
1856 if (!odev && attr[RTA_OIF]) attr[RTA_OIF]->rta_type = 0;
1857 if (attr[RTA_GATEWAY]) attr[RTA_GATEWAY]->rta_type = 0;
1858 if (!idev && attr[RTA_IIF]) attr[RTA_IIF]->rta_type = 0;
1859 mhdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
1860 mhdr->nlmsg_type = RTM_GETROUTE;
1861 mhdr->nlmsg_pid = 0;
1862 xclose(TT.sockfd);
1863 TT.sockfd = xsocket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
1864 send_nlmesg(0, 0, 0, mhdr, mhdr->nlmsg_len);
1865 filter_nlmesg(display_route_info, NULL);
1866 }
1867 return 0;
1868 }
1869
route_show_flush(char ** argv)1870 static int route_show_flush(char **argv)
1871 {
1872 struct arglist cmd_objectlist[] = {{"protocol", 0}, {"dev", 1}, {"oif", 2},
1873 {"iif", 3}, {"via", 4}, {"table", 5}, {"cache", 6}, {"from", 7},
1874 {"to", 8}, {"all", 9}, {"root", 10}, {"match", 11}, {"exact", 12},
1875 {"main", 13}, {NULL,-1}};
1876 int family = TT.addressfamily, idx;
1877 struct {
1878 struct nlmsghdr mhdr;
1879 struct rtmsg msg;
1880 } request;
1881
1882 if (*argv[-1] == 'f') TT.flush = 1;
1883 if (TT.flush && !*argv) show_iproute_help();
1884
1885 gfilter.tb = RT_TABLE_MAIN;
1886 for (; *argv; argv++) {
1887 switch (idx = substring_to_idx(*argv, cmd_objectlist)) {
1888 case 0:
1889 if (!*++argv) show_iproute_help();
1890 if ((idx = idxfromRPDB(*argv,RPDB_rtprotos)) < 0)
1891 error_exit("Invalid argument protocol.");
1892 gfilter.proto = idx;
1893 break;
1894 case 1:
1895 case 2:
1896 case 3:
1897 {
1898 if (!*++argv) show_iproute_help();
1899 int dev = get_ifaceindex(*argv, 1);
1900
1901 if (idx == 3) gfilter.idev = dev;
1902 else gfilter.odev = dev;
1903 }
1904 break;
1905 case 4:
1906 if (!*++argv) show_iproute_help();
1907 parse_prefix(gfilter.rvia.addr, &gfilter.rvia.netmask,
1908 &gfilter.rvia.len, *argv, gfilter.rvia.family);
1909 if (gfilter.rvia.len)
1910 gfilter.rvia.family = ((gfilter.rvia.len == 4) ?
1911 AF_INET : AF_INET6);
1912 break;
1913 case 5:
1914 if (!*++argv) show_iproute_help();
1915 idx = substring_to_idx(*argv, cmd_objectlist);
1916 if (idx == 6) gfilter.tb = -1;
1917 else if (idx == 9) gfilter.tb = 0;
1918 else if (idx != 13) {
1919 if ((gfilter.tb = idxfromRPDB(*argv, RPDB_rttables)) < 0)
1920 error_exit("table %s is invalid.", *argv);
1921 }
1922 break;
1923 case 6:
1924 gfilter.tb = -1;
1925 break;
1926 case 7:
1927 if (!*++argv) show_iproute_help();
1928 idx = substring_to_idx(*argv, cmd_objectlist);
1929 if (idx < 0) if (!*++argv) show_iproute_help();
1930 if (idx == 10)
1931 if (!*++argv) show_iproute_help();
1932 parse_prefix(gfilter.rsrc.addr, &gfilter.rsrc.netmask,
1933 &gfilter.rsrc.len, *argv, gfilter.rsrc.family);
1934 if (gfilter.rsrc.len)
1935 gfilter.rsrc.family = ((gfilter.rsrc.len == 4) ?
1936 AF_INET : AF_INET6);
1937 else {
1938 if ((idx == 12 ||idx == 11) && !*++argv) show_iproute_help();
1939 parse_prefix(gfilter.msrc.addr, &gfilter.msrc.netmask,
1940 &gfilter.msrc.len, *argv, gfilter.msrc.family);
1941 if (gfilter.msrc.len)
1942 gfilter.msrc.family = ((gfilter.msrc.len == 4) ?
1943 AF_INET : AF_INET6);
1944 if (idx != 11) gfilter.rsrc = gfilter.msrc;
1945 }
1946 break;
1947 case 8:
1948 idx = substring_to_idx(*argv, cmd_objectlist);
1949 if (idx != -1 && !*++argv) show_iproute_help();
1950 default: // fallthrough
1951 if (idx == 10) {
1952 if (!*++argv) show_iproute_help();
1953 parse_prefix(gfilter.rdst.addr, &gfilter.rdst.netmask,
1954 &gfilter.rdst.len, *argv, gfilter.rdst.family);
1955 if (gfilter.rdst.len)
1956 gfilter.rdst.family = ((gfilter.rdst.len == 4) ?
1957 AF_INET : AF_INET6);
1958 }
1959 else {
1960 if ((idx == 12 ||idx == 11) && !*++argv) show_iproute_help();
1961 parse_prefix(gfilter.mdst.addr, &gfilter.mdst.netmask,
1962 &gfilter.mdst.len, *argv, gfilter.mdst.family);
1963 if (gfilter.mdst.len)
1964 gfilter.mdst.family = ((gfilter.mdst.len == 4) ?
1965 AF_INET : AF_INET6);
1966 if (idx != 11) gfilter.rdst = gfilter.mdst;
1967 }
1968 break;
1969 }
1970 }
1971 if (family == AF_UNSPEC && gfilter.tb) family = AF_INET;
1972
1973 if (TT.flush) {
1974 if (gfilter.tb < 0) { // flush table cache
1975 if (family != AF_INET6) {
1976 FILE *fp = xfopen("/proc/sys/net/ipv4/route/flush", "w");
1977
1978 if (fwrite("-1",1,2,fp) < 2) error_exit("can't flush routing cache");
1979 fclose(fp);
1980 }
1981 if (family == AF_INET) return 0;
1982 }
1983 }
1984
1985 memset(&request, 0, sizeof (request));
1986 request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof (struct rtmsg));
1987 request.mhdr.nlmsg_flags = NLM_F_REQUEST;
1988 request.mhdr.nlmsg_flags |= NLM_F_ROOT | NLM_F_MATCH;
1989 request.mhdr.nlmsg_type = RTM_GETROUTE;
1990 request.msg.rtm_family = family;
1991 if (gfilter.tb < 0) request.msg.rtm_flags = RTM_F_CLONED;
1992 send_nlmesg(0, 0, 0, (void*)&request, sizeof (request));
1993 return (filter_nlmesg(display_route_info, NULL));
1994 }
1995
route_update(char ** argv,unsigned int route_flags)1996 static int route_update(char **argv, unsigned int route_flags)
1997 {
1998 char mxbuf[256], *d = NULL;
1999 struct rtattr *mxrta = (void*)mxbuf;
2000 unsigned mxlock = 0, ok = 0;
2001 int idx;
2002 uint32_t addr[8] = {0,}, netmask = 0;
2003 uint8_t len = 0;
2004
2005 struct arglist cmd_objectlist[] = {{"src", 0}, {"via", 1}, {"mtu", 2},
2006 {"lock", 3}, {"protocol", 4}, {"table", 5}, {"dev", 6}, {"oif", 7},
2007 {"to", 8}, {"metric", 9}, {NULL,-1}
2008 };
2009 enum {
2010 gtwy_ok = 1,
2011 dst_ok = 2,
2012 proto_ok = 4,
2013 type_ok = 8
2014 };
2015 struct {
2016 struct nlmsghdr hdr;
2017 struct rtmsg msg;
2018 char buf[1024];
2019 } req;
2020
2021 memset(&req, 0, sizeof(req));
2022 req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
2023 req.hdr.nlmsg_flags = NLM_F_ACK| NLM_F_REQUEST | route_flags;
2024 req.hdr.nlmsg_type = TT.route_cmd;
2025 req.msg.rtm_family = AF_UNSPEC;
2026 req.msg.rtm_table = RT_TABLE_MAIN;
2027 req.msg.rtm_scope = RT_SCOPE_NOWHERE;
2028
2029 if (TT.route_cmd != RTM_DELROUTE) {
2030 req.msg.rtm_protocol = RTPROT_BOOT;
2031 req.msg.rtm_scope = RT_SCOPE_UNIVERSE;
2032 req.msg.rtm_type = RTN_UNICAST;
2033 }
2034
2035 mxrta->rta_type = RTA_METRICS;
2036 mxrta->rta_len = RTA_LENGTH(0);
2037
2038 for (; *argv; argv++) {
2039 idx = substring_to_idx(*argv, cmd_objectlist);
2040 if (!idx) {
2041 if (!*++argv) show_iproute_help();
2042 parse_prefix(addr, &netmask, &len, *argv, req.msg.rtm_family);
2043 if (len) req.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
2044 add_string_to_rtattr(&req.hdr, sizeof(req), RTA_PREFSRC, addr, len);
2045 } else if (idx == 1) {
2046 ok |= gtwy_ok;
2047 if (!*++argv) show_iproute_help();
2048 parse_prefix(addr, &netmask, &len, *argv, req.msg.rtm_family);
2049 if (len) req.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
2050 add_string_to_rtattr(&req.hdr, sizeof(req),RTA_GATEWAY, addr, len);
2051 } else if (idx == 2) {
2052 if (!*++argv) show_iproute_help();
2053 if (substring_to_idx(*argv, cmd_objectlist ) == 3) {
2054 mxlock |= (1 << RTAX_MTU);
2055 if (!*++argv) show_iproute_help();
2056 }
2057 idx = atolx(*argv);
2058 add_uint32_rtattr_to_buffer(mxrta, sizeof(mxbuf), RTAX_MTU, idx);
2059 } else if (idx == 4) {
2060 if (!*++argv) show_iproute_help();
2061 if ((idx = idxfromRPDB(*argv,RPDB_rtprotos)) < 0)
2062 error_exit("Invalid argument protocol %s.",*argv);
2063 req.msg.rtm_protocol = idx;
2064 ok |= proto_ok;
2065 } else if (idx == 5) {
2066 if (!*++argv) show_iproute_help();
2067 req.msg.rtm_table = idxfromRPDB(*argv, RPDB_rttables);
2068 } else if (idx == 6 || idx == 7) {
2069 if (!*++argv) show_iproute_help();
2070 d = *argv;
2071 } else if (idx == 9) {
2072 unsigned long metric;
2073 unsigned int res;
2074 char* ptr;
2075 if (!*++argv) show_iproute_help();
2076 metric = strtoul(*argv, &ptr, 0);
2077 if (!(!*ptr && metric <= 0xFFFFFFFFUL))
2078 error_exit("Invalid argument metric %s.",*argv);
2079 else
2080 res = metric;
2081 add_string_to_rtattr(&req.hdr, sizeof(req),
2082 RTA_PRIORITY, (char*)&res, sizeof(res));
2083 } else {
2084 if (idx == 8)
2085 if (!*++argv) show_iproute_help();
2086 idx = substring_to_idx(*argv,rtmtypes);
2087 if (idx != -1) {
2088 if (!*++argv) show_iproute_help();
2089 req.msg.rtm_type = idx;
2090 ok |= type_ok;
2091 }
2092 if (ok & dst_ok) error_exit("Duplicate argument 'to'");
2093 parse_prefix(addr, &netmask, &len, *argv, req.msg.rtm_family);
2094 if (len) req.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
2095 req.msg.rtm_dst_len = netmask;
2096 ok |= dst_ok;
2097 if (len) add_string_to_rtattr(&req.hdr, sizeof(req),RTA_DST, addr, len);
2098 }
2099 }
2100
2101 if (d) {
2102 idx = get_ifaceindex(d,1);
2103 add_string_to_rtattr(&req.hdr, sizeof(req),
2104 RTA_OIF, (char*)&idx, sizeof(idx));
2105 }
2106 if (mxrta->rta_len > RTA_LENGTH(0)) {
2107 if (mxlock)
2108 add_uint32_rtattr_to_buffer(mxrta, sizeof(mxbuf), RTAX_LOCK, mxlock);
2109 add_string_to_rtattr(&req.hdr, sizeof(req),
2110 RTA_METRICS, RTA_DATA(mxrta), RTA_PAYLOAD(mxrta));
2111 }
2112
2113 if (req.msg.rtm_type == RTN_LOCAL || req.msg.rtm_type == RTN_NAT)
2114 req.msg.rtm_scope = RT_SCOPE_HOST;
2115 else if (req.msg.rtm_type == RTN_BROADCAST||req.msg.rtm_type == RTN_MULTICAST
2116 || req.msg.rtm_type == RTN_ANYCAST)
2117 req.msg.rtm_scope = RT_SCOPE_LINK;
2118 else if (req.msg.rtm_type == RTN_UNICAST || req.msg.rtm_type == RTN_UNSPEC) {
2119 if (TT.route_cmd == RTM_DELROUTE)
2120 req.msg.rtm_scope = RT_SCOPE_NOWHERE;
2121 else if (!(ok & gtwy_ok))
2122 req.msg.rtm_scope = RT_SCOPE_LINK;
2123 }
2124 if (req.msg.rtm_family == AF_UNSPEC) req.msg.rtm_family = AF_INET;
2125 send_nlmesg(0, 0, 0, &req, sizeof(req));
2126 filter_nlmesg(NULL, NULL);
2127 return 0;
2128 }
2129
iproute(char ** argv)2130 static int iproute(char **argv)
2131 {
2132 int idx = 1;
2133 struct arglist cmd_objectlist1[] = {{"add", 0}, {"append", 1},{"change", 2},
2134 {"chg", 3},{"delete",4}, {"get", 5}, {"list", 6}, {"show", 7},
2135 {"prepend", 8},{"replace", 9},{"test", 10}, {"flush", 11},{NULL,-1}};
2136
2137 TT.route_cmd = RTM_NEWROUTE;
2138 switch (idx = substring_to_idx(*argv , cmd_objectlist1)) {
2139 case 0: // add
2140 return route_update(++argv , NLM_F_CREATE|NLM_F_EXCL);
2141 case 1: // append
2142 return route_update(++argv , NLM_F_CREATE|NLM_F_APPEND);
2143 case 2: // change
2144 case 3: // chg
2145 return route_update(++argv , NLM_F_REPLACE);
2146 case 4: // delete
2147 TT.route_cmd = RTM_DELROUTE;
2148 return route_update(++argv , RTM_DELROUTE);
2149 case 5:
2150 return route_get(++argv);
2151 case 6:
2152 case 7:
2153 return route_show_flush(++argv);
2154 case 8: // prepend
2155 return route_update(++argv , NLM_F_CREATE);
2156 case 9: // replace
2157 return route_update(++argv , NLM_F_CREATE|NLM_F_REPLACE);
2158 case 10: // test
2159 return route_update(++argv , NLM_F_EXCL);
2160 case 11: // flush
2161 return route_show_flush(++argv);
2162 default:
2163 if (!*argv) return route_show_flush(argv);
2164 else show_iproute_help();
2165 }
2166 return 0; // non reachable code.
2167 }
2168
2169
2170 // ===========================================================================
2171 // code for ip rule.
2172 // ===========================================================================
show_iprule_help(void)2173 static void show_iprule_help(void)
2174 {
2175 error_exit("usage: ip rule [ list | add | del ] SELECTOR ACTION\n"
2176 "SELECTOR := [ from PREFIX ] [ to PREFIX ] [pref NUMBER] [ tos TOS ]\n"
2177 " [ fwmark FWMARK] [ dev/iif STRING ] [type TYPE]\n"
2178 "ACTION := [ table TABLE_ID ] [ realms [SRCREALM/]DSTREALM ]");
2179 }
2180
ruleupdate(char ** argv)2181 static int ruleupdate(char **argv)
2182 {
2183 int8_t idx, tflag = 0, opt = (*argv[-1] == 'a') ? RTM_NEWRULE : RTM_DELRULE;
2184 struct arglist options[] = {{"from", 0}, {"to", 1}, {"preference", 2},
2185 {"order", 2}, {"priority", 2}, {"tos", 3}, {"dsfield", 3}, {"fwmark", 4},
2186 {"realms", 5}, {"table", 6}, {"lookup", 6}, {"dev", 7}, {"iif", 7},
2187 {"nat", 8}, {"map-to", 8}, {"type", 9}, {"help", 10}, {NULL, -1}};
2188 struct {
2189 struct nlmsghdr mhdr;
2190 struct rtmsg msg;
2191 char buf[1024];
2192 } request;
2193
2194 memset(&request, 0, sizeof(request));
2195 request.mhdr.nlmsg_type = opt;
2196 request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
2197 request.mhdr.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK |
2198 ((opt == RTM_DELRULE) ? 0 : NLM_F_CREATE | NLM_F_EXCL);
2199 request.msg.rtm_family = TT.addressfamily;
2200 request.msg.rtm_protocol = RTPROT_BOOT;
2201 request.msg.rtm_scope = RT_SCOPE_UNIVERSE;
2202 request.msg.rtm_table = 0;
2203 request.msg.rtm_type = ((opt == RTM_DELRULE) ? RTN_UNSPEC : RTN_UNICAST);
2204
2205 for (; *argv; argv++) {
2206 switch ((idx = substring_to_idx(*argv, options))) {
2207 case 0:
2208 case 1:
2209 { // e.g. from IP/Netmask and to IP/Netmask.
2210 uint32_t addr[4] = {0,}, netmask = 0;
2211 uint8_t len = 0, *tmp;
2212
2213 if (!*++argv) error_exit("'%s': Missing Prefix", argv[-1]);
2214 parse_prefix(addr, &netmask, &len, *argv, request.msg.rtm_family);
2215
2216 tmp = idx ? &request.msg.rtm_dst_len : &request.msg.rtm_src_len;
2217 if (!netmask) *tmp = 0;
2218 else *tmp = netmask;
2219
2220 add_string_to_rtattr(&request.mhdr, sizeof(request),
2221 (idx ? RTA_DST : RTA_SRC), addr, len);
2222 }
2223 break;
2224 case 2:
2225 case 4:
2226 { // e.g. Preference p# and fwmark MARK
2227 uint32_t pref;
2228 char *ptr;
2229
2230 if (!*++argv)
2231 error_exit("Missing %s", (idx == 2) ? "Preference" : "fwmark");
2232 pref = strtoul(*argv, &ptr, 0);
2233 if (!ptr || (ptr == *argv) || *ptr || pref > 0xFFFFFFFFUL)
2234 error_exit("Invalid %s", (idx == 2) ? "Preference" : "fwmark");
2235 add_string_to_rtattr(&request.mhdr, sizeof(request),
2236 ((idx == 2) ? RTA_PRIORITY : RTA_PROTOINFO),
2237 (void *)&pref, sizeof(uint32_t));
2238 }
2239 break;
2240 case 3:
2241 {
2242 uint32_t tos;
2243 if (!*++argv) error_exit("Missing TOS key");
2244 if ((tos = idxfromRPDB(*argv, RPDB_rtdsfield)) < 0)
2245 error_exit("Invalid TOS");
2246 request.msg.rtm_tos = tos;
2247 }
2248 break;
2249 case 5:
2250 { // e.g. realms FROM_realm/TO_realm
2251 uint32_t realms = 0;
2252 int ret;
2253 char *ptr;
2254
2255 if (!*++argv) error_exit("Missing REALMSID");
2256 if ((ptr = strchr(*argv, '/'))) {
2257 *ptr = 0;
2258 if ((ret = idxfromRPDB(*argv, RPDB_rtrealms)) < 0)
2259 error_exit("Invalid realms");
2260 realms = ret;
2261 realms <<= 16;
2262 *ptr++ = '/';
2263 } else ptr = *argv;
2264 if ((ret = idxfromRPDB(ptr, RPDB_rtrealms)) < 0)
2265 error_exit("Invalid realms");
2266 realms |= ret;
2267 add_string_to_rtattr(&request.mhdr, sizeof(request),
2268 RTA_FLOW, (void *)&realms, sizeof(uint32_t));
2269 }
2270 break;
2271 case 6:
2272 { // e.g. table tid/tableName
2273 int tid;
2274 if (!*++argv) error_exit("Missing TableID");
2275 if ((tid = idxfromRPDB(*argv, RPDB_rttables)) < 0)
2276 error_exit("Invalid TID");
2277 request.msg.rtm_table = tid;
2278 tflag = 1;
2279 }
2280 break;
2281 case 7:
2282 {
2283 if (!*++argv) error_exit("Missing dev/iif NAME");
2284 add_string_to_rtattr(&request.mhdr, sizeof(request),
2285 RTA_IIF, *argv, strlen(*argv)+1);
2286 }
2287 break;
2288 case 8:
2289 {
2290 uint32_t addr[4] = {0,};
2291 uint8_t af = AF_UNSPEC;
2292
2293 if (!*++argv) error_exit("Missing nat/map-to ADDRESS");
2294 if (get_prefix(addr, &af /* Un-used variable */, *argv, AF_INET))
2295 error_exit("Invalid mapping Address");
2296
2297 add_string_to_rtattr(&request.mhdr, sizeof(request),
2298 RTA_GATEWAY, addr, sizeof(uint32_t));
2299 request.msg.rtm_type = RTN_NAT;
2300 }
2301 break;
2302 case 9:
2303 {
2304 if (!*++argv) error_exit("TYPE Missing");
2305 request.msg.rtm_type = rtmtype_str2idx(*argv);
2306 }
2307 break;
2308 case 10:
2309 show_iprule_help();
2310 break; // Unreachable code.
2311 default:
2312 error_exit("Invalid argument '%s'", *argv);
2313 break; // Unreachable code.
2314 }
2315 }
2316
2317 if (!request.msg.rtm_family) request.msg.rtm_family = AF_INET;
2318 if (!tflag && opt == RTM_NEWRULE) request.msg.rtm_table = RT_TABLE_MAIN;
2319
2320 send_nlmesg(0, 0, 0, &request, sizeof(request));
2321 return (filter_nlmesg(NULL, NULL));
2322 }
2323
show_rules(struct nlmsghdr * mhdr,char ** argv)2324 static int show_rules(struct nlmsghdr *mhdr,
2325 char **argv __attribute__ ((__unused__)))
2326 {
2327 struct rtmsg *msg = NLMSG_DATA(mhdr);
2328 struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
2329 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
2330 int hlen = ((msg->rtm_family == AF_INET) ? 32
2331 : ((msg->rtm_family == AF_INET6) ? 128 : -1));
2332
2333 if (mhdr->nlmsg_type != RTM_NEWRULE) return 0;
2334 if (msglen < 0) return 1;
2335
2336 tvar = msglen;
2337 for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
2338 if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
2339
2340 if (tvar) error_msg("deficit %d, rtalen = %d!", tvar, rta->rta_len);
2341
2342 printf("%u:\tfrom ", attr[RTA_PRIORITY] ?
2343 *(unsigned *)RTA_DATA(attr[RTA_PRIORITY]) : 0);
2344
2345 if (attr[RTA_SRC]) {
2346 printf("%s", (msg->rtm_family == AF_INET || msg->rtm_family == AF_INET6)
2347 ? inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_SRC]),
2348 toybuf, sizeof(toybuf))
2349 : "???");
2350 (msg->rtm_src_len != hlen) ? printf("/%u", msg->rtm_src_len) : 0;
2351 } else msg->rtm_src_len ? printf("0/%d", msg->rtm_src_len) : printf("all");
2352
2353 xputc(' ');
2354 if (attr[RTA_DST]) {
2355 printf("to %s", (msg->rtm_family == AF_INET || msg->rtm_family == AF_INET6)
2356 ? inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_DST]),
2357 toybuf, sizeof(toybuf)) : "???");
2358 (msg->rtm_dst_len != hlen) ? printf("/%u", msg->rtm_dst_len) : xputc(' ');
2359 } else if (msg->rtm_dst_len)
2360 printf("to 0/%d ", msg->rtm_dst_len);
2361
2362 if (msg->rtm_tos)
2363 printf("tos %s ", namefromRPDB(msg->rtm_tos, RPDB_rtdsfield));
2364
2365 if (attr[RTA_PROTOINFO])
2366 printf("fwmark %#x ", *(uint32_t*)RTA_DATA(attr[RTA_PROTOINFO]));
2367
2368 if (attr[RTA_IIF]) printf("iif %s ", (char*)RTA_DATA(attr[RTA_IIF]));
2369
2370 if (msg->rtm_table)
2371 printf("lookup %s ", namefromRPDB(msg->rtm_table, RPDB_rttables));
2372
2373 if (attr[RTA_FLOW]) {
2374 u_int32_t from, to = *(u_int32_t *)RTA_DATA(attr[RTA_FLOW]);
2375 char *format = "realms %s/";
2376
2377 to = (from = (to >> 16)) & 0xFFFF;
2378 format = (from ? format: "%s");
2379 printf(format, namefromRPDB((from ? from : to), RPDB_rtrealms));
2380 }
2381
2382 if (msg->rtm_type == RTN_NAT) {
2383 if (!attr[RTA_GATEWAY]) printf("masquerade");
2384 else printf("map-to %s ", inet_ntop(msg->rtm_family,
2385 RTA_DATA(attr[RTA_GATEWAY]), toybuf, sizeof(toybuf)));
2386 } else if (msg->rtm_type != RTN_UNICAST)
2387 printf("%s", rtmtype_idx2str(msg->rtm_type));
2388
2389 xputc('\n');
2390 return 0;
2391 }
2392
rulelist(char ** argv)2393 static int rulelist(char **argv)
2394 {
2395 if (*argv) {
2396 error_msg("'ip rule show' does not take any arguments.");
2397 return 1;
2398 }
2399 send_nlmesg(RTM_GETRULE, NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST,
2400 ((TT.addressfamily != AF_UNSPEC) ? TT.addressfamily : AF_INET), NULL, 0);
2401 return filter_nlmesg(show_rules, argv);
2402 }
2403
iprule(char ** argv)2404 static int iprule(char **argv)
2405 {
2406 int idx;
2407 struct arglist options[] = {{"add", 0}, {"delete", 0}, {"list", 1},
2408 {"show", 1}, {NULL, -1}};
2409 cmdobj ipcmd, cmdobjlist[] = {ruleupdate, rulelist};
2410
2411 if (!*argv) idx = 1;
2412 else if ((idx = substring_to_idx(*argv++, options)) == -1)
2413 show_iprule_help();
2414 ipcmd = cmdobjlist[idx];
2415 return ipcmd(argv);
2416 }
2417 //============================================================================
2418 // code for ip tunnel.
2419 //============================================================================
show_iptunnel_help(void)2420 static void show_iptunnel_help(void)
2421 {
2422 error_exit("usage: iptunnel { add | change | del | show } [NAME]\n"
2423 " [mode { ipip | gre | sit }] [remote ADDR] [local ADDR]\n"
2424 " [[i|o]seq] [[i|o]key KEY] [[i|o]csum] [ttl TTL]\n"
2425 " [tos TOS] [[no]pmtudisc] [dev PHYS_DEV]");
2426 }
2427
tnl_ioctl(char * dev,int rtype,struct ip_tunnel_parm * ptnl)2428 static int tnl_ioctl(char *dev, int rtype, struct ip_tunnel_parm *ptnl)
2429 {
2430 struct ifreq req;
2431 int fd, ret = 0;
2432
2433 if ((rtype == SIOCCHGTUNNEL || rtype == SIOCDELTUNNEL) && *ptnl->name)
2434 xstrncpy(req.ifr_name, ptnl->name, IF_NAMESIZE);
2435 else xstrncpy(req.ifr_name, dev, IF_NAMESIZE);
2436
2437 if (rtype != SIOCGIFHWADDR) req.ifr_ifru.ifru_data = (void*)ptnl;
2438 fd = xsocket(AF_INET, SOCK_DGRAM, 0);
2439
2440 if (rtype == SIOCGETTUNNEL) ret = ioctl(fd, rtype, &req);
2441 else if (rtype == SIOCGIFHWADDR)
2442 ret = (ioctl(fd, rtype, &req) < 0) ? -1 : req.ifr_addr.sa_family;
2443 else xioctl(fd, rtype, &req);
2444
2445 close(fd);
2446 return ret;
2447 }
2448
display_tunnel(struct ip_tunnel_parm * ptnl)2449 static int display_tunnel(struct ip_tunnel_parm *ptnl)
2450 {
2451 char rmt_addr[64], lcl_addr[64], ikey_str[64], okey_str[64];
2452
2453 printf("%s: %s/ip", ptnl->name, ptnl->iph.protocol == IPPROTO_IPIP ? "ip" :
2454 (ptnl->iph.protocol == IPPROTO_GRE ? "gre" :
2455 (ptnl->iph.protocol == IPPROTO_IPV6 ? "ipv6" : "unknown")));
2456 printf(" remote %s local %s ", ptnl->iph.daddr ?
2457 inet_ntop(AF_INET, &ptnl->iph.daddr, rmt_addr, sizeof(rmt_addr)) : "any",
2458 ptnl->iph.saddr ? inet_ntop(AF_INET, &ptnl->iph.saddr, lcl_addr,
2459 sizeof(lcl_addr)) : "any");
2460 if (ptnl->link) {
2461 struct ifreq req;
2462 int fd;
2463
2464 req.ifr_ifindex = ptnl->link;
2465 fd = xsocket(AF_INET, SOCK_DGRAM, 0);
2466 if (ioctl(fd, SIOCGIFNAME, &req) < 0) perror_msg("SIOCGIFNAME");
2467 else printf(" dev %s ", req.ifr_name);
2468 close(fd);
2469 }
2470 if (ptnl->iph.ttl) printf(" ttl %d ", ptnl->iph.ttl);
2471 else printf(" ttl inherit ");
2472
2473 if (ptnl->iph.tos) {
2474 printf(" tos");
2475 if (ptnl->iph.tos & 1) printf(" inherit");
2476 if (ptnl->iph.tos & ~1) printf("%c%s ", ptnl->iph.tos & 1 ? '/' : ' ',
2477 namefromRPDB((ptnl->iph.tos & ~1), RPDB_rtdsfield));
2478 }
2479 if (!(ptnl->iph.frag_off & htons(IP_DF))) printf(" nopmtudisc");
2480 inet_ntop(AF_INET, &ptnl->i_key, ikey_str, sizeof(ikey_str));
2481 if ((ptnl->i_flags & GRE_KEY) && (ptnl->o_flags & GRE_KEY)
2482 && ptnl->o_key == ptnl->i_key) printf(" key %s", ikey_str);
2483 else if ((ptnl->i_flags | ptnl->o_flags) & GRE_KEY) {
2484 inet_ntop(AF_INET, &ptnl->o_key, okey_str, sizeof(okey_str));
2485 if (ptnl->i_flags & GRE_KEY) printf(" ikey %s ", ikey_str);
2486 if (ptnl->o_flags & GRE_KEY) printf(" okey %s ", okey_str);
2487 }
2488 if (ptnl->i_flags & GRE_SEQ) printf("\n Drop packets out of sequence.\n");
2489 if (ptnl->i_flags & GRE_CSUM)
2490 printf("\n Checksum in received packet is required.");
2491 if (ptnl->o_flags & GRE_SEQ) printf("\n Sequence packets on output.");
2492 if (ptnl->o_flags & GRE_CSUM) printf("\n Checksum output packets.");
2493 xputc('\n');
2494 return 0;
2495 }
2496
read_tunnel(struct ip_tunnel_parm * ptnl)2497 static int read_tunnel(struct ip_tunnel_parm *ptnl)
2498 {
2499 int count = 0;
2500 char iface[IF_NAMESIZE];
2501 struct ip_tunnel_parm iptnl;
2502 FILE *fp = xfopen("/proc/net/dev", "r");
2503
2504 while (fgets(toybuf, sizeof(toybuf), fp)) {
2505 char *ptr;
2506 int ret;
2507
2508 if (count++ < 2) continue; // 1st two lines are header.
2509
2510 ptr = strchr(toybuf, ':');
2511 if (!ptr || (*ptr++ = 0, sscanf(toybuf, "%s", iface) != 1))
2512 error_exit("invalid format of '/proc/net/dev'");
2513 if (*ptnl->name && strcmp(ptnl->name, iface)) continue;
2514 if ((ret = tnl_ioctl(iface, SIOCGIFHWADDR, &iptnl)) < 0) {
2515 error_msg("failed to get type of '%s'", iface);
2516 continue;
2517 }
2518 if (ret != ARPHRD_TUNNEL && ret != ARPHRD_SIT &&
2519 ret != ARPHRD_IPGRE) continue;
2520
2521 memset(&iptnl, 0, sizeof(iptnl));
2522 if (tnl_ioctl(iface, SIOCGETTUNNEL, &iptnl) < 0) continue;
2523 if ((ptnl->link && iptnl.link != ptnl->link) || (*ptnl->name &&
2524 strcmp(iptnl.name, ptnl->name)) || (ptnl->iph.daddr &&
2525 iptnl.iph.daddr != ptnl->iph.daddr) || (ptnl->iph.saddr &&
2526 iptnl.iph.saddr != ptnl->iph.saddr) || (ptnl->i_key &&
2527 iptnl.i_key != ptnl->i_key)) continue;
2528 display_tunnel(&iptnl);
2529 }
2530 fclose(fp);
2531 return 0;
2532 }
2533
parse_iptunnel_args(struct ip_tunnel_parm * ptnl,char ** argv,int ipt_opt_idx)2534 static void parse_iptunnel_args(struct ip_tunnel_parm *ptnl, char **argv,
2535 int ipt_opt_idx)
2536 {
2537 int idx;
2538 uint8_t af = AF_INET;
2539 uint32_t addr = 0;
2540 struct arglist opts[] = { {"mode", 0}, {"key", 1}, {"ikey", 2},
2541 {"okey", 3}, {"seq", 4}, {"iseq", 5}, {"oseq", 6}, {"csum", 7},
2542 {"icsum", 8}, {"ocsum", 9}, {"nopmtudisc", 10}, {"pmtudisc", 11},
2543 {"remote", 12}, {"local", 13},{"dev", 14}, {"ttl", 15}, {"tos", 16},
2544 {"dsfield", 17}, {"name", 18}, {NULL, -1}
2545 };
2546
2547 ptnl->iph.version = 4; // The value indicates the version of IP (4 or 6)
2548 ptnl->iph.ihl = 5; // Minimum Internet Header Length
2549 // frag_off is measured in units of 8 octets (64 bits)
2550 ptnl->iph.frag_off = htons(IP_DF);
2551 if (*argv && ipt_opt_idx <= 2 && string_to_idx(*argv, opts) == -1) {
2552 xstrncpy(ptnl->name, *argv, IF_NAMESIZE);
2553 if (ipt_opt_idx == 1) {
2554 struct ip_tunnel_parm iptnl_old;
2555
2556 memset(&iptnl_old, 0, sizeof(iptnl_old));
2557 tnl_ioctl(ptnl->name, SIOCGETTUNNEL, &iptnl_old);
2558 *ptnl = iptnl_old;
2559 }
2560 argv++;
2561 }
2562 for (; *argv; argv++, addr = 0) {
2563 switch (idx = string_to_idx(*argv, opts)) {
2564 case 0:
2565 if (!*++argv) error_exit("mode is missing");
2566 if ((!strcmp("ipip", *argv) || !strcmp("ip/ip", *argv)))
2567 ptnl->iph.protocol = IPPROTO_IPIP;
2568 else if ((!strcmp("gre", *argv) || !strcmp("gre/ip", *argv)))
2569 ptnl->iph.protocol = IPPROTO_GRE;
2570 else if ((!strcmp("sit", *argv) || !strcmp("ipv6/ip", *argv)))
2571 ptnl->iph.protocol = IPPROTO_IPV6;
2572 else show_iptunnel_help();
2573 break;
2574 case 1:
2575 case 2:
2576 case 3:
2577 {
2578 struct addrinfo *info, hint;
2579 int ret;
2580
2581 if (!*++argv) error_exit("key value is missing");
2582 memset(&hint, 0, sizeof(hint));
2583 hint.ai_family = AF_INET;
2584 ret = getaddrinfo(*argv, NULL, &hint, &info);
2585 if (ret || !info) error_exit("invalid argument to key");
2586 freeaddrinfo(info);
2587
2588 if (strchr(*argv, '.')) {
2589 if (get_prefix(&addr, &af, *argv, AF_INET))
2590 error_exit("invalid key '%s'", *argv);
2591 } else {
2592 unsigned key_val;
2593
2594 sscanf(*argv, "%u", &key_val);
2595 addr = htonl(key_val);
2596 }
2597 if (idx == 1) {
2598 ptnl->i_flags |= GRE_KEY;
2599 ptnl->o_flags |= GRE_KEY;
2600 ptnl->i_key = ptnl->o_key = addr;
2601 } else if (idx == 2) {
2602 ptnl->i_flags |= GRE_KEY;
2603 ptnl->i_key = addr;
2604 } else {
2605 ptnl->o_flags |= GRE_KEY;
2606 ptnl->o_key = addr;
2607 }
2608 }
2609 break;
2610 case 4:
2611 ptnl->i_flags |= GRE_SEQ;
2612 ptnl->o_flags |= GRE_SEQ;
2613 break;
2614 case 5:
2615 ptnl->i_flags |= GRE_SEQ;
2616 break;
2617 case 6:
2618 ptnl->o_flags |= GRE_SEQ;
2619 break;
2620 case 7:
2621 ptnl->i_flags |= GRE_CSUM;
2622 ptnl->o_flags |= GRE_CSUM;
2623 break;
2624 case 8:
2625 ptnl->i_flags |= GRE_CSUM;
2626 break;
2627 case 9:
2628 ptnl->o_flags |= GRE_CSUM;
2629 break;
2630 case 10:
2631 ptnl->iph.frag_off = 0;
2632 break;
2633 case 11:
2634 ptnl->iph.frag_off = htons(IP_DF);
2635 break;
2636 case 12:
2637 case 13:
2638 if (!*++argv) error_exit("remote/local address is missing");
2639 if (get_prefix(&addr, &af, *argv, AF_INET))
2640 error_exit("invalid remote/local address '%s'", *argv);
2641 (idx == 12) ? (ptnl->iph.daddr = addr) : (ptnl->iph.saddr = addr);
2642 break;
2643 case 14:
2644 if (!*++argv) error_exit("device name is missing");
2645 else {
2646 struct ifreq req;
2647 int fd;
2648
2649 xstrncpy(req.ifr_name, *argv, IFNAMSIZ);
2650 fd = xsocket(AF_INET, SOCK_DGRAM, 0);
2651 xioctl(fd, SIOCGIFINDEX, &req);
2652 close(fd);
2653 ptnl->link = req.ifr_ifindex;
2654 }
2655 break;
2656 case 15:
2657 if (!*++argv) error_exit("ttl value is missing");
2658 if (strcmp(*argv, "inherit"))
2659 ptnl->iph.ttl = atolx_range(*argv, 0, 255);
2660 break;
2661 case 16:
2662 case 17:
2663 if (!*++argv) error_exit("tos value is missing");
2664 if (strcmp(*argv, "inherit")) {
2665 char *ptr;
2666 unsigned long tval = strtoul(*argv, &ptr, 16);
2667
2668 if (tval > 255) error_exit("invalid tos value '%s'", *argv);
2669 if (*ptr) {
2670 int ret;
2671
2672 if ((ret = idxfromRPDB(*argv, RPDB_rtdsfield)) < 0)
2673 error_exit("invalid tos value");
2674 ptnl->iph.tos = ret;
2675 } else ptnl->iph.tos = tval;
2676 } else ptnl->iph.tos = 1;
2677 break;
2678 case 18:
2679 if (*ptnl->name) error_exit("invalid tunnel");
2680 else {
2681 if (!*++argv) error_exit("name is missing");
2682 xstrncpy(ptnl->name, *argv, IF_NAMESIZE);
2683 }
2684 break;
2685 default:
2686 if (*ptnl->name) error_exit("invalid tunnel");
2687 xstrncpy(ptnl->name, *argv, IF_NAMESIZE);
2688 break;
2689 }
2690 }
2691 if (ptnl->iph.protocol == IPPROTO_IPIP ||
2692 ptnl->iph.protocol == IPPROTO_IPV6) {
2693 if ((ptnl->i_flags & GRE_KEY) || (ptnl->o_flags & GRE_KEY))
2694 error_exit("[i|o]key is allowed with gre only");
2695 if ((ptnl->i_flags & GRE_SEQ) || (ptnl->o_flags & GRE_SEQ))
2696 error_exit("[i|o]seq is allowed with gre only");
2697 if ((ptnl->i_flags & GRE_CSUM) || (ptnl->o_flags & GRE_CSUM))
2698 error_exit("[i|o]csum is allowed with gre only");
2699 }
2700 if (!ptnl->i_key && IN_MULTICAST(ntohl(ptnl->iph.daddr))) {
2701 ptnl->i_key = ptnl->iph.daddr;
2702 ptnl->i_flags |= GRE_KEY;
2703 }
2704 if (!ptnl->o_key && IN_MULTICAST(ntohl(ptnl->iph.daddr))) {
2705 ptnl->o_key = ptnl->iph.daddr;
2706 ptnl->o_flags |= GRE_KEY;
2707 }
2708 if (IN_MULTICAST(ntohl(ptnl->iph.daddr)) && !ptnl->iph.saddr)
2709 error_exit("broadcast tunnel requires a source address");
2710 }
2711
tunnellist(char ** argv)2712 static int tunnellist(char **argv)
2713 {
2714 struct ip_tunnel_parm iptnl;
2715 int ret = 0;
2716
2717 memset(&iptnl, 0, sizeof(iptnl));
2718 parse_iptunnel_args(&iptnl, argv, 3);
2719
2720 if (iptnl.iph.protocol == IPPROTO_IPIP)
2721 ret = tnl_ioctl(*iptnl.name ? iptnl.name : "tunl0", SIOCGETTUNNEL, &iptnl);
2722 else if (iptnl.iph.protocol == IPPROTO_GRE)
2723 ret = tnl_ioctl(*iptnl.name ? iptnl.name : "gre0", SIOCGETTUNNEL, &iptnl);
2724 else if (iptnl.iph.protocol == IPPROTO_IPV6)
2725 ret = tnl_ioctl(*iptnl.name ? iptnl.name : "sit0", SIOCGETTUNNEL, &iptnl);
2726 else return read_tunnel(&iptnl);
2727
2728 if (ret < 0) {
2729 perror_msg("SIOCGETTUNNEL");
2730 return ret;
2731 } else return display_tunnel(&iptnl);
2732 }
2733
2734 // Performing add, change, & delete tunnel action, according to passed req_type
tunnelupdate(char ** argv)2735 static int tunnelupdate(char **argv)
2736 {
2737 struct ip_tunnel_parm iptnl;
2738 int idx = 2, rtype = SIOCDELTUNNEL;
2739
2740 if (*argv[-1] == 'a') {
2741 idx = 0;
2742 rtype = SIOCADDTUNNEL;
2743 } else if (*argv[-1] == 'c') {
2744 idx = 1;
2745 rtype = SIOCCHGTUNNEL;
2746 }
2747
2748 memset(&iptnl, 0, sizeof(iptnl));
2749 parse_iptunnel_args(&iptnl, argv, idx);
2750 if (idx != 2 && iptnl.iph.ttl && !(iptnl.iph.frag_off))
2751 error_exit("ttl > 0 and nopmtudisc are incompatible");
2752 if (iptnl.iph.protocol == IPPROTO_IPIP)
2753 return (tnl_ioctl("tunl0", rtype, &iptnl) < 0) ? 1 : 0;
2754 else if (iptnl.iph.protocol == IPPROTO_GRE)
2755 return (tnl_ioctl("gre0", rtype, &iptnl) < 0) ? 1 : 0;
2756 else if (iptnl.iph.protocol == IPPROTO_IPV6)
2757 return (tnl_ioctl("sit0", rtype, &iptnl) < 0) ? 1 : 0;
2758 else {
2759 if (idx != 2) error_exit("invalid tunnel mode");
2760 return (tnl_ioctl(iptnl.name, rtype, &iptnl) < 0) ? 1 : 0;
2761 }
2762 }
2763
iptunnel(char ** argv)2764 static int iptunnel(char **argv)
2765 {
2766 int idx;
2767 struct arglist opts[] = {{"add", 0}, {"change", 0}, {"del", 0},
2768 {"delete", 0}, {"show", 1}, {"list", 1}, {"lst", 1}, {NULL, -1}
2769 };
2770 cmdobj ipcmd, cmdobjlist[] = {tunnelupdate, tunnellist};
2771
2772 if (!*argv) idx = 1;
2773 else if ((idx = substring_to_idx(*argv++, opts)) == -1)
2774 show_iptunnel_help();
2775 ipcmd = cmdobjlist[idx];
2776 return ipcmd(argv);
2777 }
2778
2779 // ===========================================================================
2780 // Common code, which is used for all ip options.
2781 // ===========================================================================
2782
2783 // Parse netlink messages and call input callback handler for action
filter_nlmesg(int (* fun)(struct nlmsghdr * mhdr,char ** argv),char ** argv)2784 static int filter_nlmesg(int (*fun)(struct nlmsghdr *mhdr, char **argv),
2785 char **argv)
2786 {
2787 while (1) {
2788 struct nlmsghdr *mhdr;
2789 int msglen = recv(TT.sockfd, TT.gbuf, MESG_LEN, 0);
2790
2791 if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue;
2792 else if (msglen < 0) {
2793 error_msg("netlink receive error %s", strerror(errno));
2794 return 1;
2795 } else if (!msglen) {
2796 error_msg("EOF on netlink");
2797 return 1;
2798 }
2799
2800 for (mhdr = (struct nlmsghdr*)TT.gbuf; NLMSG_OK(mhdr, msglen);
2801 mhdr = NLMSG_NEXT(mhdr, msglen)) {
2802 int err;
2803 if (mhdr->nlmsg_pid != getpid())
2804 continue;
2805 switch (mhdr->nlmsg_type) {
2806 case NLMSG_DONE:
2807 return 0;
2808 case NLMSG_ERROR:
2809 {
2810 struct nlmsgerr *merr = (struct nlmsgerr*)NLMSG_DATA(mhdr);
2811
2812 if (merr->error == 0) return 0;
2813 if (mhdr->nlmsg_len < NLMSG_LENGTH(sizeof(struct nlmsgerr)))
2814 error_msg("ERROR truncated");
2815 else {
2816 errno = -merr->error;
2817 perror_msg("RTNETLINK answers");
2818 }
2819 return 1;
2820 }
2821 default:
2822 if (fun && (err = fun(mhdr, argv))) return err;
2823 break;
2824 }
2825 } // End of for loop.
2826 } // End of while loop.
2827 return 0;
2828 }
2829
ip_main(void)2830 void ip_main(void)
2831 {
2832 char **optargv = toys.argv;
2833 int idx, isip = !(toys.which->name[2]); //1 -> if only ip
2834 cmdobj ipcmd, cmdobjlist[] = {ipaddr, iplink, iproute, iprule, iptunnel};
2835
2836 for (++optargv; *optargv; ++optargv) {
2837 char *ptr = *optargv;
2838 struct arglist ip_options[] = {{"oneline", 0}, {"family", 1},
2839 {"4", 1}, {"6", 1}, {"0", 1}, {"stats", 2}, {NULL, -1}};
2840
2841 if (*ptr != '-') break;
2842 else if ((*(ptr+1) == '-') && (*(ptr+2))) ptr +=2;
2843 //escape "--" and stop ip arg parsing.
2844 else if ((*(ptr+1) == '-') && (!*(ptr+2))) {
2845 *ptr +=1;
2846 break;
2847 } else ptr +=1;
2848 switch (substring_to_idx(ptr, ip_options)) {
2849 case 0: TT.singleline = 1;
2850 break;
2851 case 1: {
2852 if (isdigit(*ptr)) {
2853 long num = atolx(ptr);
2854 if (num == 4) TT.addressfamily = AF_INET;
2855 else if (num == 6) TT.addressfamily = AF_INET6;
2856 else TT.addressfamily = AF_PACKET;
2857 } else {
2858 struct arglist ip_aflist[] = {{"inet", AF_INET},
2859 {"inet6", AF_INET6}, {"link", AF_PACKET}, {NULL, -1}};
2860
2861 if (!*++optargv) help_exit(0);
2862 if ((TT.addressfamily = string_to_idx(*optargv, ip_aflist)) == -1)
2863 error_exit("wrong family '%s'", *optargv);
2864 }
2865 }
2866 break;
2867 case 2:
2868 TT.stats++;
2869 break;
2870 default: help_exit(0);
2871 break; // unreachable code.
2872 }
2873 }
2874
2875 TT.sockfd = xsocket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
2876
2877 if (isip) {// only for ip
2878 if (*optargv) {
2879 struct arglist ip_objectlist[] = { {"address", 0}, {"link", 1},
2880 {"route", 2}, {"rule", 3}, {"tunnel", 4}, {"tunl", 4}, {NULL, -1}};
2881
2882 if ((idx = substring_to_idx(*optargv, ip_objectlist)) == -1) help_exit(0);
2883 ipcmd = cmdobjlist[idx];
2884 toys.exitval = ipcmd(++optargv);
2885 } else help_exit(0);
2886 } else {
2887 struct arglist ip_objectlist[] = { {"ipaddr", 0}, {"iplink", 1},
2888 {"iproute", 2}, {"iprule", 3}, {"iptunnel", 4}, {NULL, -1}};
2889 if ((idx = string_to_idx(toys.which->name, ip_objectlist)) == -1)
2890 help_exit(0);
2891 ipcmd = cmdobjlist[idx];
2892 toys.exitval = ipcmd(optargv);
2893 }
2894 xclose(TT.sockfd);
2895 if (rtdsfield_init) free_alist(rt_dsfield);
2896 if (rtrealms_init) free_alist(rt_realms);
2897 if (rtscope_init) free_alist(rt_scope);
2898 if (rttable_init) free_alist(rt_tables);
2899 if (rtprotos_init) free_alist(rt_protos);
2900 }
2901