ip.c 93 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901
  1. /* ip.c - Show / manipulate routing, devices, policy routing and tunnels.
  2. *
  3. * Copyright 2014 Sameer Prakash Pradhan <sameer.p.pradhan@gmail.com>
  4. * Copyright 2014 Ranjan Kumar <ranjankumar.bth@gmail.com>
  5. * Copyright 2014 Rajni Kant <rajnikant12345@gmail.com>
  6. * Copyright 2014 Bilal Qureshi <bilal.jmi@gmail.com>
  7. *
  8. * No Standard.
  9. *
  10. USE_IP(NEWTOY(ip, NULL, TOYFLAG_SBIN))
  11. USE_IP(OLDTOY(ipaddr, ip, TOYFLAG_SBIN))
  12. USE_IP(OLDTOY(iplink, ip, TOYFLAG_SBIN))
  13. USE_IP(OLDTOY(iproute, ip, TOYFLAG_SBIN))
  14. USE_IP(OLDTOY(iprule, ip, TOYFLAG_SBIN))
  15. USE_IP(OLDTOY(iptunnel, ip, TOYFLAG_SBIN))
  16. config IP
  17. bool "ip"
  18. default n
  19. help
  20. usage: ip [ OPTIONS ] OBJECT { COMMAND }
  21. Show / manipulate routing, devices, policy routing and tunnels.
  22. where OBJECT := {address | link | route | rule | tunnel}
  23. OPTIONS := { -f[amily] { inet | inet6 | link } | -o[neline] }
  24. */
  25. #define FOR_ip
  26. #include "toys.h"
  27. #include <linux/netlink.h>
  28. #include <linux/rtnetlink.h>
  29. #include <linux/if_ether.h>
  30. #include <linux/if_addr.h>
  31. #include <net/if_arp.h>
  32. #include <ifaddrs.h>
  33. #include <fnmatch.h>
  34. #include <linux/ip.h> // Centos 7.2 EOL June 30 2024
  35. #include <linux/if_tunnel.h>
  36. #ifndef IP_DF
  37. #define IP_DF 0x4000 /* don't fragment flag. */
  38. #endif
  39. GLOBALS(
  40. char stats, singleline, flush, *filter_dev, gbuf[8192];
  41. int sockfd, connected, from_ok, route_cmd;
  42. int8_t addressfamily, is_addr;
  43. )
  44. struct arglist {
  45. char *name;
  46. int idx;
  47. };
  48. static struct
  49. {
  50. int ifindex, scope, scopemask, up, to;
  51. char *label, *addr;
  52. } addrinfo;
  53. struct linkdata {
  54. struct linkdata *next, *prev;
  55. int flags, iface_idx, mtu, txqueuelen, parent,iface_type;
  56. char qdiscpline[IFNAMSIZ+1], state[IFNAMSIZ+1], type[IFNAMSIZ+1],
  57. iface[IFNAMSIZ+1], laddr[64], bcast[64];
  58. struct rtnl_link_stats rt_stat;
  59. }*linfo;
  60. typedef int (*cmdobj)(char **argv);
  61. #define MESG_LEN 8192
  62. // For "/etc/iproute2/RPDB_tables"
  63. enum {
  64. RPDB_rtdsfield = 1,
  65. RPDB_rtprotos = 2,
  66. RPDB_rtrealms = 3,
  67. RPDB_rtscopes = 4,
  68. RPDB_rttables = 5
  69. };
  70. #define RPDB_ENTRIES 256
  71. static int8_t rttable_init;
  72. static int8_t rtprotos_init;
  73. static int8_t rtdsfield_init;
  74. static int8_t rtscope_init;
  75. static int8_t rtrealms_init;
  76. static struct arglist *rt_dsfield[RPDB_ENTRIES];
  77. static struct arglist *rt_protos[RPDB_ENTRIES];
  78. static struct arglist *rt_tables[RPDB_ENTRIES];
  79. static struct arglist *rt_realms[RPDB_ENTRIES];
  80. static struct arglist *rt_scope[RPDB_ENTRIES];
  81. static struct arglist rtmtypes[] = { {"none", RTN_UNSPEC},
  82. {"unicast", RTN_UNICAST}, {"local", RTN_LOCAL},
  83. {"broadcast", RTN_BROADCAST}, {"anycast", RTN_ANYCAST},
  84. {"multicast", RTN_MULTICAST}, {"blackhole", RTN_BLACKHOLE},
  85. {"unreachable", RTN_UNREACHABLE}, {"prohibit", RTN_PROHIBIT},
  86. {"throw", RTN_THROW}, {"nat", RTN_NAT},
  87. {"xresolve", RTN_XRESOLVE}, {NULL, -1}
  88. };
  89. static int filter_nlmesg(int (*fun)(struct nlmsghdr *mhdr, char **), char **);
  90. static int ipaddr_print(struct linkdata *, int flg);
  91. // extended route attribute metrics.
  92. static const char *mx_names[RTAX_MAX + 1] = {
  93. [RTAX_MTU] = "mtu",
  94. [RTAX_WINDOW] = "window",
  95. [RTAX_RTT] = "rtt",
  96. [RTAX_RTTVAR] = "rttvar",
  97. [RTAX_SSTHRESH] = "ssthresh",
  98. [RTAX_CWND] = "cwnd",
  99. [RTAX_ADVMSS] = "advmss",
  100. [RTAX_REORDERING] = "reordering",
  101. [RTAX_HOPLIMIT] = "hoplimit",
  102. [RTAX_INITCWND] = "initcwnd",
  103. [RTAX_FEATURES] = "features",
  104. [RTAX_RTO_MIN] = "rto_min",
  105. [RTAX_INITRWND] = "initrwnd",
  106. [RTAX_QUICKACK] = "quickack",
  107. [RTAX_CC_ALGO] = "congctl"};
  108. // ===========================================================================
  109. // Common Code for IP Options (like: addr, link, route etc.)
  110. // ===========================================================================
  111. static int substring_to_idx(char *str, struct arglist *list)
  112. {
  113. struct arglist *alist;
  114. int len;
  115. if (!str) return -1;
  116. len = strlen(str);
  117. for (alist = list; alist->name; alist++)
  118. if (!memcmp(str, alist->name, len)) return alist->idx;
  119. return -1;
  120. }
  121. static int string_to_idx(char *str, struct arglist *list)
  122. {
  123. struct arglist *alist;
  124. if (!str) return -1;
  125. for (alist = list; alist->name; alist++)
  126. if (!strcmp(str, alist->name)) return alist->idx;
  127. return -1;
  128. }
  129. static char *idx_to_string(int idx, struct arglist *list)
  130. {
  131. struct arglist *alist;
  132. if (idx < 0) return NULL;
  133. for (alist = list; alist->name; alist++)
  134. if (idx == alist->idx) return alist->name;
  135. return NULL;
  136. }
  137. static void send_nlmesg(int type, int flags, int family,
  138. void *buf, int blen)
  139. {
  140. struct {
  141. struct nlmsghdr nlh;
  142. struct rtgenmsg g;
  143. } req;
  144. if (!buf) {
  145. memset(&req, 0, sizeof(req));
  146. req.nlh.nlmsg_len = sizeof(req);
  147. req.nlh.nlmsg_type = type;
  148. req.nlh.nlmsg_flags = flags;
  149. req.g.rtgen_family = family;
  150. buf = &req;
  151. blen = sizeof(req);
  152. }
  153. if (send(TT.sockfd , (void*)buf, blen, 0) < 0)
  154. perror_exit("Unable to send data on socket.");
  155. }
  156. // Parse /etc/iproute2/RPDB_tables and prepare list.
  157. static void parseRPDB(char *fname, struct arglist **list, int32_t size)
  158. {
  159. FILE *fp = fopen(fname, "r");
  160. char *line = 0;
  161. size_t l = 0;
  162. ssize_t len;
  163. if (!fp) return;
  164. while ((len = getline(&line, &l, fp)) > 0) {
  165. char *ptr = line;
  166. int32_t idx;
  167. while (*ptr == ' ' || *ptr == '\t') ptr++;
  168. if (*ptr == 0 || *ptr == '#' || *ptr == '\n') continue;
  169. if ((sscanf(ptr, "0x%x %s\n", &idx, toybuf) != 2) &&
  170. (sscanf(ptr, "0x%x %s #", &idx, toybuf) != 2) &&
  171. (sscanf(ptr, "%d %s\n", &idx, toybuf) != 2) &&
  172. (sscanf(ptr, "%d %s #", &idx, toybuf) != 2)) {
  173. error_msg("corrupt %s", fname);
  174. break;
  175. }
  176. if (idx >= 0 && idx < size) {
  177. int index = idx & (size-1);
  178. if (list[index]) free(list[index]->name);
  179. else list[index] = xzalloc(sizeof(struct arglist));
  180. list[index]->idx = idx;
  181. list[index]->name = xstrdup(toybuf);
  182. }
  183. }
  184. free(line);
  185. fclose(fp);
  186. }
  187. static void free_alist(struct arglist **list)
  188. {
  189. int i;
  190. for (i = 0;i<RPDB_ENTRIES;i++) {
  191. if (list[i]) {
  192. free(list[i]->name);
  193. free(list[i]);
  194. }
  195. }
  196. }
  197. static void init_arglist(struct arglist **list,int value, char* name)
  198. {
  199. if (!list[value]) list[value] = xzalloc(sizeof(struct arglist));
  200. list[value]->idx = value;
  201. list[value]->name = xstrdup(name);
  202. }
  203. static struct arglist **getlist(u_int8_t whichDB)
  204. {
  205. struct arglist **alist;
  206. switch (whichDB) {
  207. case RPDB_rtdsfield:
  208. alist = rt_dsfield;
  209. if (!rtdsfield_init) {
  210. rtdsfield_init = 1;
  211. parseRPDB("/etc/iproute2/rt_dsfield", alist, ARRAY_LEN(rt_dsfield));
  212. }
  213. break;
  214. case RPDB_rtprotos:
  215. alist = rt_protos;
  216. if (!rttable_init) {
  217. rtprotos_init = 1;
  218. init_arglist(rt_protos,0,"none");
  219. init_arglist(rt_protos,1,"redirect");
  220. init_arglist(rt_protos,2,"kernel");
  221. init_arglist(rt_protos,3,"boot");
  222. init_arglist(rt_protos,4,"static");
  223. init_arglist(rt_protos,8,"gated");
  224. init_arglist(rt_protos,9,"ra");
  225. init_arglist(rt_protos,10,"mrt");
  226. init_arglist(rt_protos,11,"zebra");
  227. init_arglist(rt_protos,12,"bird");
  228. parseRPDB("/etc/iproute2/rt_protos", alist, ARRAY_LEN(rt_protos));
  229. }
  230. break;
  231. case RPDB_rtrealms:
  232. alist = rt_realms;
  233. if (!rtrealms_init) {
  234. rtrealms_init = 1;
  235. init_arglist(rt_realms,0,"unspec");
  236. parseRPDB("/etc/iproute2/rt_realms", alist, ARRAY_LEN(rt_realms));
  237. }
  238. break;
  239. case RPDB_rtscopes:
  240. alist = rt_scope;
  241. if (!rtscope_init) {
  242. rtscope_init = 1;
  243. init_arglist(rt_scope,0,"global");
  244. init_arglist(rt_scope,200,"site");
  245. init_arglist(rt_scope,253,"link");
  246. init_arglist(rt_scope,254,"host");
  247. init_arglist(rt_scope,255,"nowhere");
  248. parseRPDB("/etc/iproute2/rt_scopes", alist, ARRAY_LEN(rt_scope));
  249. }
  250. break;
  251. case RPDB_rttables:
  252. alist = rt_tables;
  253. if (!rttable_init) {
  254. rttable_init = 1;
  255. init_arglist(rt_tables,RT_TABLE_DEFAULT,"default");
  256. init_arglist(rt_tables,RT_TABLE_MAIN,"main");
  257. init_arglist(rt_tables,RT_TABLE_LOCAL,"local");
  258. parseRPDB("/etc/iproute2/rt_tables", alist, ARRAY_LEN(rt_tables));
  259. }
  260. break;
  261. default:
  262. error_exit("wrong database");
  263. break; // Unreachable code.
  264. }
  265. return alist;
  266. }
  267. /*
  268. * Parse RPBD tables (if not parsed already).
  269. * return RPDB table name as per idx.
  270. */
  271. static char *namefromRPDB(int idx, u_int8_t whichDB)
  272. {
  273. struct arglist **alist;
  274. if (idx < 0 || idx >= RPDB_ENTRIES) {
  275. snprintf(toybuf, RPDB_ENTRIES, "%u", idx);
  276. return toybuf;
  277. }
  278. alist = getlist(whichDB);
  279. if (alist[idx] && alist[idx]->name) return alist[idx]->name;
  280. if (whichDB == RPDB_rtdsfield) snprintf(toybuf, RPDB_ENTRIES, "0x%02x", idx);
  281. else snprintf(toybuf, RPDB_ENTRIES, "%u", idx);
  282. return toybuf;
  283. }
  284. static int idxfromRPDB(char *name, u_int8_t whichDB)
  285. {
  286. struct arglist **alist;
  287. long i = 0;
  288. char *ptr = NULL;
  289. for (alist = getlist(whichDB); i < RPDB_ENTRIES; i++) {
  290. if (!alist[i] || !alist[i]->name) continue;
  291. if (!strcmp(alist[i]->name, name)) return i;
  292. }
  293. i = strtol(name, &ptr, 0);
  294. if (errno || (ptr && *ptr) || i < 0 || i > 255)
  295. return -1;
  296. return i;
  297. }
  298. static char *rtmtype_idx2str(u_int8_t idx)
  299. {
  300. char *name = idx_to_string(idx, rtmtypes);
  301. if (!name) snprintf(toybuf, RPDB_ENTRIES, "%u", idx);
  302. else snprintf(toybuf, sizeof(toybuf), "%s", name);
  303. return toybuf;
  304. }
  305. static int rtmtype_str2idx(char *name)
  306. {
  307. int idx = string_to_idx(name, rtmtypes);
  308. if (idx < 0) return atolx_range(name, 0, 255);
  309. return idx;
  310. }
  311. /*
  312. * Used to get the prefix value in binary form.
  313. * For IPv4: non-standard parsing used; as 10.10 will be treated as 10.10.0.0
  314. * unlike inet_aton which is 10.0.0.10
  315. */
  316. static int get_prefix(uint32_t *addr, uint8_t *af, char *name, int family)
  317. {
  318. if (family == AF_PACKET) error_exit("'%s' may be inet prefix", name);
  319. if (!memcmp(name, "default", strlen(name))
  320. || !memcmp(name, "all", strlen(name))
  321. || !memcmp(name, "any", strlen(name))) {
  322. *af = family;
  323. return 0;
  324. }
  325. if (strchr(name, ':')) {
  326. *af = AF_INET6;
  327. if (family != AF_UNSPEC && family != AF_INET6) return 1;
  328. if (inet_pton(AF_INET6, name, (void *)addr) != 1)
  329. return 1;
  330. } else { // for IPv4.
  331. char *ptr = name;
  332. uint8_t count = 0;
  333. *af = AF_INET;
  334. if (family != AF_UNSPEC && family != AF_INET) return 1;
  335. while (*ptr) {
  336. int val, len = 0;
  337. if (*ptr == '.') ptr++;
  338. sscanf(ptr, "%d%n", &val, &len);
  339. if (!len || len > 3 || val < 0 || val > 255 || count > 3) return 1;
  340. ptr += len;
  341. ((uint8_t*)addr)[count++] = val;
  342. }
  343. }
  344. return 0;
  345. }
  346. /*
  347. * Used to calculate netmask, which can be in the form of
  348. * either 255.255.255.0 or 24 or default or any or all strings.
  349. */
  350. static int get_nmask_prefix(uint32_t *netmask, uint8_t af,
  351. char *name, uint8_t family)
  352. {
  353. char *ptr;
  354. uint32_t naddr[4] = {0,};
  355. uint64_t plen;
  356. uint8_t naf = AF_UNSPEC;
  357. *netmask = (af == AF_INET6) ? 128 : 32; // set default netmask
  358. plen = strtoul(name, &ptr, 0);
  359. if (!ptr || ptr == name || *ptr || !plen || plen > *netmask) {
  360. if (get_prefix(naddr, &naf, name, family)) return -1;
  361. if (naf == AF_INET) {
  362. uint32_t mask = htonl(*naddr), host = ~mask;
  363. if (host & (host + 1)) return -1;
  364. for (plen = 0; mask; mask <<= 1) ++plen;
  365. if (plen > 32) return -1;
  366. }
  367. }
  368. *netmask = plen;
  369. return 0;
  370. }
  371. /*
  372. * Parse prefix, which will be in form of
  373. * either default or default/default or default/24 or default/255.255.255.0
  374. * or 10.20.30.40 or 10.20.30.40/default or 10.20.30.40/24
  375. * or 10.20.30.40/255.255.255.0
  376. */
  377. static void parse_prefix(uint32_t *addr, uint32_t *netmask, uint8_t *len,
  378. char *name, int family)
  379. {
  380. uint8_t af = AF_UNSPEC;
  381. char *slash = strchr(name, '/');
  382. if (slash) *slash = 0;
  383. if (get_prefix(addr, &af, name, family)) error_exit("Invalid prefix");
  384. if (slash) { // grab netmask.
  385. if (get_nmask_prefix(netmask, af, slash+1, family))
  386. error_exit("Invalid prefix");
  387. *slash ='/';
  388. }
  389. else if (af == AF_INET && *addr) *netmask = 32;
  390. else if (af == AF_INET6 && (*addr || *(addr+3))) *netmask = 128;
  391. if (!*addr && !slash && !af) *len = 0;
  392. else *len = (af == AF_INET6) ? 16 : 4;
  393. }
  394. /*
  395. * Add a route attribute to a buffer; this is primarily used for extended
  396. * attributes which get collected in a separate buffer from the normal route
  397. * attributes and later get added to the main rtm message.
  398. */
  399. static void add_varlen_rtattr_to_buffer(struct rtattr *rta, int maxlen,
  400. int type, void *data, int alen) {
  401. struct rtattr *subrta;
  402. int len = RTA_LENGTH(alen);
  403. if (RTA_ALIGN(rta->rta_len) + RTA_ALIGN(len) > maxlen) {
  404. error_exit("RTA exceeds max length %d", maxlen);
  405. }
  406. subrta = (struct rtattr*)(((char*)rta) + RTA_ALIGN(rta->rta_len));
  407. subrta->rta_type = type;
  408. subrta->rta_len = len;
  409. if (alen) {
  410. memcpy(RTA_DATA(subrta), data, alen);
  411. }
  412. rta->rta_len = NLMSG_ALIGN(rta->rta_len) + RTA_ALIGN(len);
  413. }
  414. static void add_uint32_rtattr_to_buffer(struct rtattr *rta, int maxlen,
  415. int type, uint32_t attr) {
  416. add_varlen_rtattr_to_buffer(rta, maxlen, type, (char*)&attr, sizeof(attr));
  417. }
  418. /*
  419. * Add a route attribute to a RTM message.
  420. */
  421. static void add_string_to_rtattr(struct nlmsghdr *n, int maxlen,
  422. int type, void *data, int alen)
  423. {
  424. int len = RTA_LENGTH(alen);
  425. struct rtattr *rta;
  426. if ((int)(NLMSG_ALIGN(n->nlmsg_len) + len) > maxlen) return;
  427. rta = (struct rtattr*)(((char*)n) + NLMSG_ALIGN(n->nlmsg_len));
  428. rta->rta_type = type;
  429. rta->rta_len = len;
  430. memcpy(RTA_DATA(rta), data, alen);
  431. n->nlmsg_len = NLMSG_ALIGN(n->nlmsg_len) + len;
  432. }
  433. // ===========================================================================
  434. // Code for ip link.
  435. // ===========================================================================
  436. #ifndef NLMSG_TAIL
  437. #define NLMSG_TAIL(nmsg) \
  438. ((struct rtattr *) (((void *) (nmsg)) + NLMSG_ALIGN((nmsg)->nlmsg_len)))
  439. #endif
  440. static uint32_t get_ifaceindex(char *name, int ext)
  441. {
  442. struct if_nameindex *if_ni, *i;
  443. int index = -1;
  444. if_ni = if_nameindex();
  445. if (!if_ni) perror_exit("if_nameindex");
  446. for (i = if_ni; i->if_index && i->if_name; i++)
  447. if (!strcmp(name, i->if_name)) {
  448. index = i->if_index;
  449. break;
  450. }
  451. if_freenameindex(if_ni);
  452. if (index == -1 && ext) perror_exit("can't find device '%s'", name);
  453. return index;
  454. }
  455. static void fill_hwaddr(char *arg, int len, unsigned char *address)
  456. {
  457. int count = 0, val, length;
  458. while (count < len) {
  459. val = length = 0;
  460. if (!arg) error_exit("bad hw-addr '%s'", "");
  461. if (*arg == ':') arg++, count++;
  462. sscanf(arg, "%2x%n", &val, &length);
  463. if (!length || length > 2)
  464. error_exit("bad hw-addr '%s'", arg);
  465. arg += length;
  466. count += length;
  467. *address++ = val;
  468. }
  469. }
  470. // Multimach = 1, single match = 0
  471. static char *get_flag_string(struct arglist *aflags, int flags, int ismulti)
  472. {
  473. struct arglist *p = aflags;
  474. char *out = NULL, *tmp = NULL;
  475. for (; p->name; p++) {
  476. int test = (ismulti ? p->idx & flags : 0) || p->idx == flags;
  477. if (test) { // flags can be zero
  478. tmp = out ? xmprintf("%s,%s", out, p->name) : xmprintf("%s", p->name);
  479. if (out) free(out);
  480. out = tmp;
  481. }
  482. }
  483. return out;
  484. }
  485. static void vlan_parse_opt(char **argv, struct nlmsghdr *n, unsigned int size)
  486. {
  487. struct arglist vlan_optlist[] = {{"id", 0}, {"protocol", 1},
  488. {"reorder_hdr", 2}, {"gvrp", 3}, {NULL,-1}};
  489. struct arglist vlan_protolist[] = {{"802.1q", 0}, {"802.1ad", 1}, {NULL,-1}};
  490. struct arglist on_off[] = { {"on", 0}, {"off", 1}, {NULL,-1}};
  491. int idx;
  492. struct ifla_vlan_flags flags;
  493. memset(&flags, 0, sizeof(flags));
  494. for (; *argv; argv++) {
  495. int param, proto;
  496. if ((idx = substring_to_idx(*argv++, vlan_optlist)) == -1) help_exit(0);
  497. switch (idx) {
  498. case 0: // ARG_id
  499. if (!*argv) help_exit(0);
  500. param = atolx(*argv);
  501. add_string_to_rtattr(n, size, IFLA_VLAN_ID, &param, sizeof(param));
  502. break;
  503. case 1: // ARG_protocol
  504. if (!*argv) error_exit("Invalid vlan id.");
  505. if ((idx = substring_to_idx(*argv, vlan_protolist)) == -1) help_exit(0);
  506. if (!idx) proto = ETH_P_8021Q; // PROTO_8021Q - 0
  507. else if (idx == 1) proto = 0x88A8; // ETH Protocol - 8021AD
  508. // IFLA VLAN PROTOCOL - 5
  509. add_string_to_rtattr(n, size, 5, &proto, sizeof(proto));
  510. break;
  511. case 2: // ARG_reorder_hdr
  512. case 3: // ARG_gvrp
  513. if ((param = substring_to_idx(*argv, on_off)) == -1) help_exit(0);
  514. flags.mask |= (idx -1); // VLAN FLAG REORDER Header
  515. flags.flags &= ~(idx -1); // VLAN FLAG REORDER Header
  516. if (!param) flags.flags |= (idx -1); // VLAN FLAG REORDER Header
  517. break;
  518. }
  519. }
  520. if (flags.mask)
  521. add_string_to_rtattr(n, size, IFLA_VLAN_FLAGS, &flags, sizeof(flags));
  522. }
  523. static int linkupdate(char **argv)
  524. {
  525. struct {
  526. struct nlmsghdr mhdr;
  527. struct ifinfomsg info;
  528. char buf[1024];
  529. } request;
  530. char *name, *dev, *type, *link, *addr;
  531. struct rtattr *attr = NULL;
  532. int len = 0, add = (*argv[-1] == 'a') ? 1 : 0;
  533. name = dev = type = link = addr = NULL;
  534. for (; *argv; argv++) {
  535. struct arglist objectlist[] = { {"type", 0}, {"name", 1}, {"link", 2},
  536. {"address", 3}, {NULL,-1}};
  537. uint8_t idx = substring_to_idx(*argv, objectlist);
  538. if (!idx) {
  539. type = *++argv;
  540. break;
  541. }
  542. else if (idx == 1) dev = name = *++argv;
  543. else if (idx == 2) link = *++argv;
  544. else if (idx == 3) addr = *++argv;
  545. else if (!dev) name = dev = *argv;
  546. }
  547. if (!name && !add)
  548. error_exit("Not enough information: \"dev\" argument is required.\n");
  549. else if (!type && add)
  550. error_exit("Not enough information: \"type\" argument is required.\n");
  551. memset(&request, 0, sizeof(request));
  552. request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
  553. request.mhdr.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
  554. if (add) {
  555. request.mhdr.nlmsg_flags |= NLM_F_CREATE|NLM_F_EXCL;
  556. request.mhdr.nlmsg_type = RTM_NEWLINK;
  557. } else {
  558. request.mhdr.nlmsg_type = RTM_DELLINK;
  559. request.info.ifi_index = get_ifaceindex(name, 1);
  560. }
  561. request.info.ifi_family = AF_UNSPEC;
  562. attr = NLMSG_TAIL(&request.mhdr);
  563. if (type) {
  564. add_string_to_rtattr(&request.mhdr, sizeof(request),
  565. IFLA_LINKINFO, NULL, 0);
  566. add_string_to_rtattr(&request.mhdr, sizeof(request),
  567. IFLA_INFO_KIND, type, strlen(type));
  568. if (!strcmp(type, "vlan")) {
  569. struct rtattr *data = NLMSG_TAIL(&request.mhdr);
  570. add_string_to_rtattr(&request.mhdr, sizeof(request),
  571. IFLA_INFO_DATA, NULL, 0);
  572. vlan_parse_opt(++argv, &request.mhdr, sizeof(request));
  573. data->rta_len = (void *)NLMSG_TAIL(&request.mhdr) - (void *)data;
  574. }
  575. attr->rta_len = (void *)NLMSG_TAIL(&request.mhdr) - (void *)attr;
  576. }
  577. if (link) {
  578. uint32_t idx = get_ifaceindex(link, 1);
  579. add_string_to_rtattr(&request.mhdr, sizeof(request),
  580. IFLA_LINK, &idx, sizeof(uint32_t));
  581. }
  582. if (addr) {
  583. char abuf[IF_NAMESIZE] = {0,};
  584. fill_hwaddr(addr, IF_NAMESIZE, (unsigned char *)abuf);
  585. add_string_to_rtattr(&request.mhdr, sizeof(request),
  586. IFLA_ADDRESS, abuf, strlen(abuf));
  587. }
  588. if (!name) {
  589. snprintf(toybuf, IFNAMSIZ, "%s%d", type, 0);
  590. for (len = 1; ; len++) {
  591. if (!get_ifaceindex(toybuf, 0)) break;
  592. snprintf(toybuf, IFNAMSIZ, "%s%d", type, len);
  593. }
  594. name = toybuf;
  595. }
  596. len = strlen(name) + 1;
  597. if (len < 2 || len > IFNAMSIZ) error_exit("Invalid device name.");
  598. add_string_to_rtattr(&request.mhdr, sizeof(request), IFLA_IFNAME, name, len);
  599. send_nlmesg(0, 0, 0, (void *)&request, request.mhdr.nlmsg_len);
  600. return (filter_nlmesg(NULL,NULL));
  601. }
  602. static int link_set(char **argv)
  603. {
  604. struct arglist cmd_objectlist[] = {{"up", 0}, {"down", 1}, {"arp", 2},
  605. {"multicast", 3}, {"dynamic", 4}, {"name", 5}, {"txqueuelen", 6},
  606. {"mtu", 7},{"address", 8}, {"broadcast", 9}, {NULL,-1}};
  607. int case_flags[] = {IFF_NOARP,IFF_MULTICAST,IFF_DYNAMIC};
  608. struct ifreq req;
  609. int idx, flags = 0, masks = 0xffff, fd;
  610. memset(&req, 0, sizeof(req));
  611. if (!*argv) error_exit("\"dev\" missing");
  612. xstrncpy(req.ifr_name, *argv, IF_NAMESIZE);
  613. fd = xsocket(AF_INET, SOCK_DGRAM, 0);
  614. xioctl(fd, SIOCGIFINDEX, &req);
  615. for (++argv; *argv;) {
  616. if ((idx = substring_to_idx(*argv++, cmd_objectlist)) == -1) help_exit(0);
  617. switch(idx) {
  618. case 0:
  619. flags |= IFF_UP; break;
  620. case 1:
  621. masks &= ~IFF_UP; break;
  622. case 2:
  623. case 3:
  624. case 4:
  625. if (!*argv) help_exit(0);
  626. else if (!strcmp(*argv, "on")) {
  627. if (idx == 2) {
  628. masks &= ~case_flags[idx-2];
  629. flags &= ~case_flags[idx-2];
  630. } else flags |= case_flags[idx-2];
  631. } else if (!strcmp(*argv,"off")) {
  632. if (idx == 2) {
  633. masks |= case_flags[idx-2];
  634. flags |= case_flags[idx-2];
  635. } else masks &= ~case_flags[idx-2];
  636. } else help_exit(0);
  637. ++argv;
  638. break;
  639. case 5:
  640. xstrncpy(req.ifr_ifru.ifru_newname, *argv, IF_NAMESIZE);
  641. xioctl(fd, SIOCSIFNAME, &req);
  642. xstrncpy(req.ifr_name, *argv++, IF_NAMESIZE);
  643. xioctl(fd, SIOCGIFINDEX, &req);
  644. break;
  645. case 6:
  646. req.ifr_ifru.ifru_ivalue = atolx(*argv++);
  647. xioctl(fd, SIOCSIFTXQLEN, &req);
  648. break;
  649. case 7:
  650. req.ifr_ifru.ifru_mtu = atolx(*argv++);
  651. xioctl(fd, SIOCSIFMTU, &req);
  652. break;
  653. case 8:
  654. xioctl(fd, SIOCGIFHWADDR, &req);
  655. fill_hwaddr(*argv++, IF_NAMESIZE,
  656. (unsigned char *)(req.ifr_hwaddr.sa_data));
  657. xioctl(fd, SIOCSIFHWADDR, &req);
  658. break;
  659. case 9:
  660. xioctl(fd, SIOCGIFHWADDR, &req);
  661. fill_hwaddr(*argv++, IF_NAMESIZE,
  662. (unsigned char *)(req.ifr_hwaddr.sa_data));
  663. xioctl(fd, SIOCSIFHWBROADCAST, &req);
  664. break;
  665. }
  666. }
  667. xioctl(fd, SIOCGIFFLAGS, &req);
  668. req.ifr_ifru.ifru_flags |= flags;
  669. req.ifr_ifru.ifru_flags &= masks;
  670. xioctl(fd, SIOCSIFFLAGS, &req);
  671. xclose(fd);
  672. return 0;
  673. }
  674. static void print_stats(struct rtnl_link_stats *rtstat)
  675. {
  676. char *line_feed = (!TT.singleline ? "\n " : " ");
  677. if (TT.stats > 0) {
  678. xprintf(" RX: bytes packets errors "
  679. "dropped overrun mcast%s%-10u %-8u %-7u %-8u %-8u %-8u\n",
  680. line_feed, rtstat->rx_bytes, rtstat->rx_packets, rtstat->rx_errors,
  681. rtstat->rx_dropped, rtstat->rx_over_errors, rtstat->multicast);
  682. if (TT.stats > 1) {
  683. xprintf(" RX: errors length crc "
  684. "frame fifo missed%s%-10u %-8u %-7u %-8u %-8u %-8u\n",
  685. line_feed, rtstat->rx_errors, rtstat->rx_length_errors,
  686. rtstat->rx_crc_errors, rtstat->rx_frame_errors,
  687. rtstat->rx_fifo_errors, rtstat->rx_missed_errors);
  688. }
  689. xprintf(" TX: bytes packets errors "
  690. "dropped carrier collsns%s%-10u %-8u %-7u %-8u %-8u %-8u\n",
  691. line_feed, rtstat->tx_bytes, rtstat->tx_packets, rtstat->tx_errors,
  692. rtstat->tx_dropped, rtstat->tx_carrier_errors, rtstat->collisions);
  693. if (TT.stats > 1) {
  694. xprintf(" TX: errors aborted fifo window "
  695. "heartbeat%s%-10u %-8u %-7u %-8u %-8u\n",
  696. line_feed, rtstat->tx_errors, rtstat->tx_aborted_errors,
  697. rtstat->tx_fifo_errors, rtstat->tx_window_errors,
  698. rtstat->tx_heartbeat_errors);
  699. }
  700. }
  701. }
  702. static int print_link_output(struct linkdata *link)
  703. {
  704. char *line_feed = " ", *flags,*peer = "brd";
  705. struct arglist iface_flags[] = {{"",0},{"UP", IFF_UP},
  706. {"BROADCAST", IFF_BROADCAST}, {"DEBUG", IFF_DEBUG},
  707. {"LOOPBACK", IFF_LOOPBACK}, {"POINTOPOINT", IFF_POINTOPOINT},
  708. {"NOTRAILERS", IFF_NOTRAILERS}, {"RUNNING", IFF_RUNNING},
  709. {"NOARP", IFF_NOARP}, {"PROMISC",IFF_PROMISC},
  710. {"ALLMULTI", IFF_ALLMULTI}, {"MASTER", IFF_MASTER}, {"SLAVE", IFF_SLAVE},
  711. {"MULTICAST", IFF_MULTICAST}, {"PORTSEL", IFF_PORTSEL},
  712. {"AUTOMEDIA", IFF_AUTOMEDIA}, {"DYNAMIC", IFF_DYNAMIC}, {NULL,-1}};
  713. if (link->parent != -1) {
  714. int fd = 0;
  715. struct ifreq req;
  716. memset(&req, 0, sizeof(req));
  717. if_indextoname( link->parent,req.ifr_ifrn.ifrn_name);
  718. fd = xsocket(AF_INET, SOCK_DGRAM, 0);
  719. if (ioctl(fd, SIOCGIFTXQLEN, &req)) perror("");
  720. else link->txqueuelen = req.ifr_ifru.ifru_ivalue;
  721. xclose(fd);
  722. }
  723. if (TT.is_addr && addrinfo.label && fnmatch(addrinfo.label, link->iface, 0))
  724. return 0;
  725. if (!(flags = get_flag_string(iface_flags, link->flags, 1)))
  726. error_exit("Invalid data.");
  727. if (!TT.singleline) line_feed="\n ";
  728. if (link->parent != -1) {
  729. char iface[IF_NAMESIZE];
  730. if (!if_indextoname(link->parent, iface)) perror_exit(NULL);
  731. sprintf(toybuf,"%s@%s", link->iface, iface);
  732. }
  733. if (link->flags & IFF_POINTOPOINT) peer = "peer";
  734. if (TT.is_addr && TT.singleline && TT.addressfamily)
  735. xprintf("%d: %s", link->iface_idx,
  736. ((link->parent == -1) ? link->iface : toybuf));
  737. else xprintf("%d: %s: <%s> mtu %d qdisc %s state %s qlen %d",
  738. link->iface_idx, ((link->parent == -1) ? link->iface : toybuf), flags,
  739. link->mtu, link->qdiscpline, link->state, link->txqueuelen);
  740. if (!TT.addressfamily || TT.addressfamily == AF_PACKET)
  741. xprintf("%slink/%s %s %s %s",
  742. line_feed, link->type, link->laddr, peer ,link->bcast);
  743. xputc('\n');
  744. //user can specify stats flag two times
  745. //one for stats and other for erros e.g. -s and -s -s
  746. print_stats(&link->rt_stat);
  747. free(flags);
  748. return 0;
  749. }
  750. static void fill_address(void *p, char *ip)
  751. {
  752. unsigned char *ptr = (unsigned char*)p;
  753. snprintf(ip, 64, " %02x:%02x:%02x:%02x:%02x:%02x",
  754. ptr[0], ptr[1], ptr[2], ptr[3], ptr[4], ptr[5]);
  755. }
  756. static int get_link_info(struct nlmsghdr* h,struct linkdata* link,char **argv)
  757. {
  758. struct ifinfomsg *iface = NLMSG_DATA(h);
  759. struct rtattr *attr = IFLA_RTA(iface);
  760. int len = h->nlmsg_len - NLMSG_LENGTH(sizeof(*iface));
  761. struct arglist hwtypes[]={{"generic",0},{"ether",ARPHRD_ETHER},
  762. {"loopback", ARPHRD_LOOPBACK},{"sit",ARPHRD_SIT},
  763. #ifdef ARPHRD_INFINIBAND
  764. {"infiniband",ARPHRD_INFINIBAND},
  765. #endif
  766. #ifdef ARPHRD_IEEE802_TR
  767. {"ieee802",ARPHRD_IEEE802}, {"tr",ARPHRD_IEEE802_TR},
  768. #else
  769. {"tr",ARPHRD_IEEE802},
  770. #endif
  771. #ifdef ARPHRD_IEEE80211
  772. {"ieee802.11",ARPHRD_IEEE80211},
  773. #endif
  774. #ifdef ARPHRD_IEEE1394
  775. {"ieee1394",ARPHRD_IEEE1394},
  776. #endif
  777. {"irda",ARPHRD_IRDA},{"slip",ARPHRD_SLIP},{"cslip",ARPHRD_CSLIP},
  778. {"slip6",ARPHRD_SLIP6}, {"cslip6",ARPHRD_CSLIP6}, {"ppp",ARPHRD_PPP},
  779. {"ipip",ARPHRD_TUNNEL}, {"tunnel6",ARPHRD_TUNNEL6},
  780. {"gre",ARPHRD_IPGRE},
  781. #ifdef ARPHRD_VOID
  782. {"void",ARPHRD_VOID},
  783. #endif
  784. {NULL,-1}};
  785. char *lname = get_flag_string(hwtypes, iface->ifi_type, 0);
  786. link->next = link->prev = 0;
  787. link->iface_type = iface->ifi_type;
  788. if (!lname) error_exit("Invalid link.");
  789. xstrncpy(link->type, lname, IFNAMSIZ);
  790. free(lname);
  791. link->iface_idx = iface->ifi_index;
  792. link->flags = iface->ifi_flags;
  793. if (*argv && !strcasecmp("up",*argv) && !(link->flags & IFF_UP)) return 1;
  794. link->parent = -1;
  795. for (; RTA_OK(attr, len); attr = RTA_NEXT(attr, len)) {
  796. switch(attr->rta_type) {
  797. case IFLA_IFNAME:
  798. snprintf(link->iface, IFNAMSIZ, "%s",(char *) RTA_DATA(attr));
  799. break;
  800. case IFLA_ADDRESS:
  801. if ( iface->ifi_type== ARPHRD_TUNNEL ||
  802. iface->ifi_type == ARPHRD_SIT ||
  803. iface->ifi_type == ARPHRD_IPGRE)
  804. inet_ntop(AF_INET, RTA_DATA(attr), link->laddr, 64);
  805. else fill_address(RTA_DATA(attr), link->laddr);
  806. break;
  807. case IFLA_BROADCAST:
  808. if (iface->ifi_type== ARPHRD_TUNNEL ||
  809. iface->ifi_type == ARPHRD_SIT ||
  810. iface->ifi_type == ARPHRD_IPGRE)
  811. inet_ntop(AF_INET, RTA_DATA(attr), link->bcast, 64);
  812. else fill_address(RTA_DATA(attr), link->bcast);
  813. break;
  814. case IFLA_MTU:
  815. link->mtu = *((int*)(RTA_DATA(attr)));
  816. break;
  817. case IFLA_QDISC:
  818. snprintf(link->qdiscpline, IFNAMSIZ, "%s", (char *) RTA_DATA(attr));
  819. break;
  820. case IFLA_STATS :
  821. link->rt_stat = *((struct rtnl_link_stats*) RTA_DATA(attr));
  822. break;
  823. case IFLA_LINK:
  824. link->parent = *((int*)(RTA_DATA(attr)));
  825. break;
  826. case IFLA_TXQLEN:
  827. link->txqueuelen = *((int*)(RTA_DATA(attr)));
  828. break;
  829. case IFLA_OPERSTATE:
  830. {
  831. struct arglist flags[]={{"UNKNOWN", 0}, {"NOTPRESENT", 1},
  832. {"DOWN", 2}, {"LOWERLAYERDOWN", 3}, {"TESTING", 4},
  833. {"DORMANT", 5}, {"UP", 6}, {NULL, -1}};
  834. if (!(lname = get_flag_string(flags, *((int*)(RTA_DATA(attr))), 0)))
  835. error_exit("Invalid state.");
  836. xstrncpy(link->state, lname,IFNAMSIZ);
  837. free(lname);
  838. }
  839. break;
  840. default: break;
  841. }
  842. }
  843. return 0;
  844. }
  845. static int display_link_info(struct nlmsghdr *mhdr, char **argv)
  846. {
  847. struct linkdata link;
  848. if (!get_link_info(mhdr, &link, argv)) {
  849. if (TT.is_addr) {
  850. struct linkdata *lnk = xzalloc(sizeof(struct linkdata));
  851. memcpy(lnk, &link, sizeof(struct linkdata));
  852. dlist_add_nomalloc((struct double_list **)&linfo,
  853. (struct double_list *)lnk);
  854. }
  855. else print_link_output(&link);
  856. }
  857. return 0;
  858. }
  859. static int link_show(char **argv)
  860. {
  861. struct {
  862. struct nlmsghdr mhdr;
  863. struct ifinfomsg info;
  864. } request;
  865. uint32_t index = 0;
  866. if (*argv && strcasecmp("up",*argv)) index = get_ifaceindex(*argv, 1);
  867. memset(&request, 0, sizeof(request));
  868. request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
  869. request.mhdr.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
  870. if (!index) request.mhdr.nlmsg_flags |= NLM_F_ROOT|NLM_F_MATCH;
  871. else request.info.ifi_change = 0xffffffff; // used in single operation
  872. request.mhdr.nlmsg_type = RTM_GETLINK;
  873. request.info.ifi_index = index;
  874. request.info.ifi_family = AF_UNSPEC;
  875. send_nlmesg(0, 0, 0, (void*)&request, sizeof(request));
  876. return (filter_nlmesg(display_link_info, argv));
  877. }
  878. static int iplink(char **argv)
  879. {
  880. int idx;
  881. cmdobj ipcmd, cmdobjlist[] = {linkupdate, link_set, link_show};
  882. struct arglist cmd_objectlist[] = {{"add", 0}, {"delete", 0},
  883. {"set", 1}, {"show", 2}, {"list", 2}, {"lst", 2}, {NULL,-1}};
  884. if (!*argv) idx = 2;
  885. else if ((idx = substring_to_idx(*argv++, cmd_objectlist)) == -1)
  886. help_exit(0);
  887. ipcmd = cmdobjlist[idx];
  888. return ipcmd(argv);
  889. }
  890. // ===========================================================================
  891. // Code for ip addr.
  892. // ===========================================================================
  893. static int print_addrinfo(struct nlmsghdr *h, int flag_l)
  894. {
  895. struct rtattr *rta, *rta_tb[IFA_MAX+1] = {0,};
  896. char *family = toybuf, *scope = toybuf+256, *label = toybuf+512,
  897. *brd = toybuf+768, *peer = toybuf+1024, *any = toybuf+1280,
  898. lbuf[INET6_ADDRSTRLEN] = {0,}, lbuf_ifa[INET6_ADDRSTRLEN] = {0,};
  899. struct ifaddrmsg *ifa = NLMSG_DATA(h);
  900. int len;
  901. if ((len = h->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa))) < 0) {
  902. error_msg("wrong nlmsg len %d", len);
  903. return 0;
  904. }
  905. for (rta = IFA_RTA(ifa); RTA_OK(rta, len); rta=RTA_NEXT(rta, len))
  906. if (rta->rta_type <= IFA_MAX) rta_tb[rta->rta_type] = rta;
  907. if (!rta_tb[IFA_LOCAL]) rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
  908. if (!rta_tb[IFA_ADDRESS]) rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
  909. if ((addrinfo.scope ^ ifa->ifa_scope)&addrinfo.scopemask) return 0;
  910. if (addrinfo.ifindex && addrinfo.ifindex != ifa->ifa_index) return 0;
  911. if (flag_l && addrinfo.label && ifa->ifa_family == AF_INET6) return 0;
  912. if ((rta_tb[IFA_LABEL])) {
  913. xstrncpy(label, RTA_DATA(rta_tb[IFA_LABEL]), 256);
  914. label[255] = '\0';
  915. if (addrinfo.label && fnmatch(addrinfo.label, label, 0))
  916. return 0;
  917. }
  918. if (TT.flush) {
  919. if (ifa->ifa_index == addrinfo.ifindex) {
  920. h->nlmsg_type = RTM_DELADDR;
  921. h->nlmsg_flags = NLM_F_REQUEST;
  922. send_nlmesg(RTM_DELADDR, 0, 0, h, h->nlmsg_len);
  923. return 0;
  924. }
  925. }
  926. if (h->nlmsg_type == RTM_DELADDR) printf("Deleted ");
  927. if (TT.singleline) {
  928. if (!if_indextoname(ifa->ifa_index, lbuf)) perror_exit(NULL);
  929. printf("%u: %s",ifa->ifa_index, lbuf);
  930. }
  931. sprintf(scope, " scope %s ", namefromRPDB(ifa->ifa_scope, RPDB_rtscopes));
  932. if (ifa->ifa_family == AF_INET) strcpy(family, " inet ");
  933. else if (ifa->ifa_family == AF_INET6) strcpy(family, " inet6 ");
  934. else sprintf(family, " family %d", ifa->ifa_family);
  935. if (rta_tb[IFA_LOCAL]) {
  936. if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_LOCAL]),
  937. lbuf, sizeof(lbuf))) perror_exit("inet");
  938. sprintf(family+strlen(family), lbuf, strlen(lbuf));
  939. if (!rta_tb[IFA_ADDRESS] || !memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
  940. RTA_DATA(rta_tb[IFA_LOCAL]), 4))
  941. sprintf(family+strlen(family), "/%d ", ifa->ifa_prefixlen);
  942. else {
  943. if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_ADDRESS]),
  944. lbuf_ifa, sizeof(lbuf_ifa))) perror_exit("inet");
  945. sprintf(peer, " peer %s/%d ", lbuf_ifa, ifa->ifa_prefixlen);
  946. }
  947. }
  948. if (addrinfo.to && strcmp(addrinfo.addr, lbuf))
  949. return 0;
  950. if (rta_tb[IFA_BROADCAST]) {
  951. if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_BROADCAST]),
  952. lbuf, sizeof(lbuf))) perror_exit("inet");
  953. sprintf(brd, " brd %s", lbuf);
  954. }else brd = "";
  955. if (rta_tb[IFA_ANYCAST]) {
  956. if (!inet_ntop(ifa->ifa_family, RTA_DATA(rta_tb[IFA_ANYCAST]),
  957. lbuf, sizeof(lbuf))) perror_exit("inet");
  958. sprintf(any, " any %s", lbuf);
  959. }
  960. if (ifa->ifa_family == AF_INET)
  961. printf("%s%s%s%s%s %c", family, brd, peer, scope, label,
  962. (TT.singleline? '\0' : '\n'));
  963. else printf("%s%s %c", family, scope, (TT.singleline? '\0' : '\n'));
  964. if (TT.singleline && (ifa->ifa_family == AF_INET)) xputc('\n');
  965. if (rta_tb[IFA_CACHEINFO]) {
  966. struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
  967. printf("%c valid_lft ", (TT.singleline? '\\' : '\0'));
  968. if (ci->ifa_valid == 0xFFFFFFFFU) printf("forever");
  969. else printf("%usec", ci->ifa_valid);
  970. printf(" preferred_lft ");
  971. if (ci->ifa_prefered == 0xFFFFFFFFU) printf("forever");
  972. else printf("%dsec", ci->ifa_prefered);
  973. xputc('\n');
  974. }
  975. return 0;
  976. }
  977. static int ipaddrupdate(char **argv)
  978. {
  979. int length, cmd = !memcmp("add", argv[-1], strlen(argv[-1]))
  980. ? RTM_NEWADDR: RTM_DELADDR;
  981. int idx = 0,length_brd = 0, length_peer = 0,length_any = 0,length_local = 0,
  982. scoped = 0;
  983. char *dev = NULL,*label = NULL, reply[8192];
  984. struct nlmsghdr *addr_ptr = NULL;
  985. struct nlmsgerr *err = NULL;
  986. struct arglist cmd_objectlist[] = {{"dev",0}, {"peer", 1},
  987. {"remote", 2}, {"broadcast", 3}, {"brd", 4}, {"label", 5},
  988. {"anycast", 6},{"scope", 7}, {"local", 8}, {NULL, -1}};
  989. struct {
  990. struct nlmsghdr nlm;
  991. struct ifaddrmsg ifadd;
  992. char buf[256];
  993. } req;
  994. typedef struct {
  995. int family, bytelen, bitlen;
  996. __u32 data[8];
  997. } option_data;
  998. option_data local;
  999. memset(&req, 0, sizeof(req));
  1000. req.nlm.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg));
  1001. req.nlm.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
  1002. req.nlm.nlmsg_type = cmd;
  1003. req.ifadd.ifa_family = TT.addressfamily;
  1004. while (*argv) {
  1005. idx = substring_to_idx(*argv, cmd_objectlist);
  1006. if (idx >= 0)
  1007. if (!*++argv)
  1008. error_exit("Incomplete Command line");
  1009. switch(idx) {
  1010. case 0:
  1011. dev = *argv;
  1012. break;
  1013. case 1:
  1014. case 2:
  1015. {
  1016. uint32_t addr[4] = {0,}, netmask = 0;
  1017. uint8_t len = 0;
  1018. parse_prefix(addr, &netmask, &len, *argv,
  1019. req.ifadd.ifa_family);
  1020. if (len)
  1021. req.ifadd.ifa_family = ((len == 4) ? AF_INET : AF_INET6);
  1022. length_peer = len;
  1023. add_string_to_rtattr(&req.nlm, sizeof(req),
  1024. IFA_ADDRESS, addr, len);
  1025. req.ifadd.ifa_prefixlen = netmask;
  1026. }
  1027. break;
  1028. case 3:
  1029. case 4:
  1030. if (*argv[0] == '+') {
  1031. length_brd = -1;
  1032. } else if (*argv[0] == '-') {
  1033. length_brd = -2;
  1034. } else {
  1035. uint32_t addr[4] = {0,};
  1036. uint8_t af = AF_UNSPEC;
  1037. if (get_prefix(addr, &af, *argv, req.ifadd.ifa_family))
  1038. error_exit("Invalid prefix");
  1039. length_brd = ((af == AF_INET6) ? 16 : 4);
  1040. if (req.ifadd.ifa_family == AF_UNSPEC)
  1041. req.ifadd.ifa_family = af;
  1042. add_string_to_rtattr(&req.nlm, sizeof(req),
  1043. IFA_BROADCAST, &addr, length_brd);
  1044. }
  1045. break;
  1046. case 5:
  1047. label = *argv;
  1048. add_string_to_rtattr(&req.nlm, sizeof(req),
  1049. IFA_LABEL, label, strlen(label) + 1);
  1050. break;
  1051. case 6:
  1052. {
  1053. uint32_t addr[4] = {0,};
  1054. uint8_t af = AF_UNSPEC;
  1055. if (get_prefix(addr, &af, *argv, req.ifadd.ifa_family))
  1056. error_exit("Invalid prefix");
  1057. length_any = ((af == AF_INET6) ? 16 : 4);
  1058. if (req.ifadd.ifa_family == AF_UNSPEC)
  1059. req.ifadd.ifa_family = af;
  1060. add_string_to_rtattr(&req.nlm, sizeof(req),
  1061. IFA_ANYCAST, &addr, length_any);
  1062. }
  1063. break;
  1064. case 7:
  1065. {
  1066. int scope = idxfromRPDB(*argv, RPDB_rtscopes);
  1067. if (scope < 0) error_exit("wrong scope '%s'", *argv);
  1068. req.ifadd.ifa_scope = scope;
  1069. scoped = 1;
  1070. }
  1071. break;
  1072. default:
  1073. {
  1074. //local is by default
  1075. uint32_t addr[8] = {0,}, netmask = 0;
  1076. uint8_t len = 0;
  1077. parse_prefix(addr, &netmask, &len, *argv,
  1078. req.ifadd.ifa_family);
  1079. if (len)
  1080. req.ifadd.ifa_family = ((len == 4) ? AF_INET : AF_INET6);
  1081. length_local = len;
  1082. local.bitlen = netmask;
  1083. local.bytelen = len;
  1084. memcpy(local.data, addr, sizeof(local.data));
  1085. local.family = req.ifadd.ifa_family;
  1086. add_string_to_rtattr(&req.nlm, sizeof(req),
  1087. IFA_LOCAL, &local.data, local.bytelen);
  1088. }
  1089. break;
  1090. }
  1091. argv++;
  1092. }
  1093. if (!dev) error_exit("need \"dev \" argument");
  1094. if (label && strncmp(dev, label, strlen(dev)) != 0)
  1095. error_exit("\"dev\" (%s) must match \"label\" (%s)", dev, label);
  1096. if (length_peer == 0 && length_local && cmd != RTM_DELADDR){
  1097. add_string_to_rtattr(&req.nlm, sizeof(req),
  1098. IFA_ADDRESS, &local.data, local.bytelen);
  1099. }
  1100. if (length_brd < 0 && cmd != RTM_DELADDR){
  1101. int i;
  1102. if (req.ifadd.ifa_family != AF_INET)
  1103. error_exit("broadcast can be set only for IPv4 addresses");
  1104. if (local.bitlen <= 30) {
  1105. for (i = 31; i >= local.bitlen; i--) {
  1106. if (length_brd == -1)
  1107. local.data[0] |= htonl(1<<(31-i));
  1108. else
  1109. local.data[0] &= ~htonl(1<<(31-i));
  1110. }
  1111. add_string_to_rtattr(&req.nlm, sizeof(req),
  1112. IFA_BROADCAST, &local.data, local.bytelen);
  1113. length_brd = local.bytelen;
  1114. }
  1115. }
  1116. if (req.ifadd.ifa_prefixlen == 0)
  1117. req.ifadd.ifa_prefixlen = local.bitlen;
  1118. if (!scoped && (cmd != RTM_DELADDR) && (local.family == AF_INET)
  1119. && (local.bytelen >= 1 && *(uint8_t*)&local.data == 127))
  1120. req.ifadd.ifa_scope = RT_SCOPE_HOST;
  1121. req.ifadd.ifa_index = get_ifaceindex(dev, 1);
  1122. send_nlmesg(RTM_NEWADDR, 0, AF_UNSPEC, (void *)&req, req.nlm.nlmsg_len);
  1123. length = recv(TT.sockfd, reply, sizeof(reply), 0);
  1124. addr_ptr = (struct nlmsghdr *) reply;
  1125. for (; NLMSG_OK(addr_ptr, length); addr_ptr = NLMSG_NEXT(addr_ptr, length)) {
  1126. if (addr_ptr->nlmsg_type == NLMSG_DONE)
  1127. return 1;
  1128. if (addr_ptr->nlmsg_type == NLMSG_ERROR)
  1129. err = (struct nlmsgerr*) NLMSG_DATA(addr_ptr);
  1130. if (err && err->error) {
  1131. errno = -err->error;
  1132. perror_exit("RTNETLINK answers:");
  1133. }
  1134. }
  1135. return 0;
  1136. }
  1137. static int ipaddr_listflush(char **argv)
  1138. {
  1139. int idx; uint32_t netmask = 0, found = 0;
  1140. char *tmp = NULL, *name = NULL;
  1141. struct double_list *dlist;
  1142. struct arglist cmd_objectlist[] = {{"to", 0}, {"scope", 1}, {"up", 2},
  1143. {"label", 3}, {"dev", 4}, {NULL, -1}};
  1144. TT.flush = *argv[-1] == 'f' ? 1 : 0;
  1145. memset(&addrinfo, 0, sizeof(addrinfo));
  1146. if (TT.flush) {
  1147. if (!*argv)
  1148. error_exit("Incomplete command for \"flush\"");
  1149. if (TT.addressfamily == AF_PACKET)
  1150. error_exit("Can't flush link Addresses");
  1151. }
  1152. addrinfo.scope = -1;
  1153. while (*argv) {
  1154. switch (idx = substring_to_idx(*argv, cmd_objectlist)) {
  1155. case 0:
  1156. {// ADDR_TO
  1157. if (!*++argv) error_exit("Incomplete Command line");
  1158. else if (!strcmp(*argv, "0")) return 0;
  1159. uint32_t addr[4] = {0,};
  1160. uint8_t len = 0;
  1161. addrinfo.to = 1;
  1162. parse_prefix(addr, &netmask, &len, *argv, TT.addressfamily);
  1163. if (len)
  1164. TT.addressfamily = ((len == 4) ? AF_INET : AF_INET6);
  1165. addrinfo.addr = strtok(*argv, "/");
  1166. }
  1167. break;
  1168. case 1: // ADDR_SCOPE
  1169. {
  1170. int scope = 0;
  1171. if (!*++argv) error_exit("Incomplete Command line");
  1172. name = *argv;
  1173. addrinfo.scopemask = -1;
  1174. if (isdigit(**argv)) {
  1175. int idx = atolx(*argv);
  1176. name = xstrdup(namefromRPDB(idx, RPDB_rtscopes));
  1177. }
  1178. if ((scope = idxfromRPDB(name, RPDB_rtscopes)) < 0) {
  1179. if (strcmp(name, "all"))
  1180. error_exit("wrong scope '%s'", name);
  1181. scope = RT_SCOPE_NOWHERE;
  1182. addrinfo.scopemask = 0;
  1183. }
  1184. if (isdigit(**argv))
  1185. free(name);
  1186. addrinfo.scope = scope;
  1187. }
  1188. break;
  1189. case 2: // ADDR_UP
  1190. addrinfo.up = 1;
  1191. break;
  1192. case 3: // ADDR_LABEL
  1193. if (!*++argv) error_exit("Incomplete Command line");
  1194. addrinfo.label = *argv;
  1195. break;
  1196. case 4: // ADDR_DEV
  1197. if (!*++argv) error_exit("Incomplete Command line");
  1198. default:
  1199. if (TT.filter_dev)
  1200. error_exit("Either \"dev\" is duplicate or %s is garbage",
  1201. *argv);
  1202. TT.filter_dev = *argv;
  1203. break;
  1204. }
  1205. argv++;
  1206. }
  1207. link_show(&tmp);
  1208. while ( linfo && (dlist = dlist_pop(&linfo))){
  1209. struct linkdata *tmp = (struct linkdata*) dlist;
  1210. char *temp = &tmp->iface[0];
  1211. if (TT.filter_dev && strcmp(TT.filter_dev, temp))
  1212. continue;
  1213. found = 1;
  1214. if (TT.flush && addrinfo.label) ipaddr_print( tmp, 0);
  1215. if (addrinfo.up && !(tmp->flags & IFF_UP)){
  1216. ipaddr_print(tmp, 0);
  1217. continue;
  1218. }
  1219. if (addrinfo.label){
  1220. if ( fnmatch(addrinfo.label, temp, 0)) {
  1221. ipaddr_print(tmp, 1);
  1222. continue;
  1223. }
  1224. }
  1225. if (!TT.addressfamily && ! TT.flush ) print_link_output(tmp);
  1226. ipaddr_print(tmp, 0);
  1227. free(tmp);
  1228. }
  1229. if (TT.filter_dev && !found)
  1230. error_exit("Device \"%s\" doesn't exist. \n", TT.filter_dev);
  1231. return 0;
  1232. }
  1233. static int ipaddr_print( struct linkdata *link, int flag_l)
  1234. {
  1235. struct nlmsghdr *addr_ptr;
  1236. int ip_match = 0;
  1237. addrinfo.ifindex = link->iface_idx;
  1238. send_nlmesg(RTM_GETADDR, NLM_F_ROOT|NLM_F_MATCH|NLM_F_REQUEST,
  1239. AF_UNSPEC, NULL, 0);
  1240. if (TT.addressfamily == AF_PACKET) print_link_output(link);
  1241. if (addrinfo.label){
  1242. char *col = strchr(addrinfo.label, ':');
  1243. if (!col && (fnmatch(addrinfo.label, &link->iface[0], 0)))
  1244. return 0;
  1245. }
  1246. while (1){
  1247. int len = recv(TT.sockfd, TT.gbuf, sizeof(TT.gbuf), 0);
  1248. addr_ptr = (struct nlmsghdr *)TT.gbuf;
  1249. struct ifaddrmsg *addressInfo = NLMSG_DATA(addr_ptr);
  1250. char lbuf[INET6_ADDRSTRLEN];
  1251. struct rtattr *rta, *rta_tb[IFA_MAX+1] = {0,};
  1252. int len1 = addr_ptr->nlmsg_len - NLMSG_LENGTH(sizeof(*addressInfo));
  1253. if (len1 > 0) {
  1254. for (; NLMSG_OK(addr_ptr, len); addr_ptr = NLMSG_NEXT(addr_ptr, len)) {
  1255. addressInfo = NLMSG_DATA(addr_ptr);
  1256. if (TT.addressfamily && TT.addressfamily != addressInfo->ifa_family)
  1257. continue;
  1258. if (addrinfo.ifindex && addrinfo.ifindex != addressInfo->ifa_index)
  1259. continue;
  1260. if (addrinfo.to) {
  1261. memset(rta_tb, 0, sizeof(rta_tb));
  1262. int rt_len = IFA_PAYLOAD(addr_ptr);
  1263. for (rta = IFA_RTA(addressInfo); RTA_OK(rta, rt_len); rta=RTA_NEXT(rta, rt_len)) {
  1264. if (rta->rta_type <= IFA_MAX) rta_tb[rta->rta_type] = rta;
  1265. }
  1266. if (!rta_tb[IFA_LOCAL]) rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
  1267. if (rta_tb[IFA_LOCAL]) {
  1268. if (!inet_ntop(TT.addressfamily, RTA_DATA(rta_tb[IFA_LOCAL]),
  1269. lbuf, sizeof(lbuf))) perror_exit("inet");
  1270. if (strcmp(addrinfo.addr, lbuf))
  1271. continue;
  1272. ip_match=1;
  1273. }
  1274. if (!ip_match)
  1275. continue;
  1276. }
  1277. if (!TT.flush){
  1278. if (addrinfo.scope != -1 && TT.addressfamily && TT.addressfamily ==
  1279. addressInfo->ifa_family &&
  1280. (addrinfo.ifindex == addressInfo->ifa_index)) {
  1281. if ((addrinfo.scope ^ addressInfo->ifa_scope) & addrinfo.scopemask)
  1282. continue;
  1283. else if (addrinfo.up && (link->flags & IFF_UP))
  1284. print_link_output(link);
  1285. else if (!addrinfo.up) print_link_output(link);
  1286. }
  1287. if (TT.addressfamily &&
  1288. (addrinfo.ifindex == addressInfo->ifa_index) &&
  1289. (addrinfo.scope == -1)){
  1290. if (addrinfo.up && (link->flags & IFF_UP))
  1291. print_link_output(link);
  1292. else if (!addrinfo.up) print_link_output(link);
  1293. }
  1294. }
  1295. for (; NLMSG_OK(addr_ptr, len); addr_ptr = NLMSG_NEXT(addr_ptr, len)) {
  1296. if (addr_ptr->nlmsg_type == RTM_NEWADDR)
  1297. print_addrinfo(addr_ptr, flag_l);
  1298. if ((addr_ptr->nlmsg_type == NLMSG_DONE) ||
  1299. (addr_ptr->nlmsg_type == NLMSG_ERROR) ||
  1300. (TT.flush && addrinfo.to))
  1301. goto ret_stop;
  1302. }
  1303. if ((addr_ptr->nlmsg_type == NLMSG_DONE) ||
  1304. (addr_ptr->nlmsg_type == NLMSG_ERROR))
  1305. break;
  1306. }
  1307. }
  1308. else
  1309. return 0;
  1310. }
  1311. ret_stop:
  1312. return 0;
  1313. }
  1314. static int ipaddr(char **argv)
  1315. {
  1316. int idx;
  1317. cmdobj ipcmd, cmdobjlist[] = {ipaddrupdate, ipaddr_listflush};
  1318. struct arglist cmd_objectlist[] = { {"add", 0}, {"delete", 0},
  1319. {"list", 1},{"show", 1},{"lst", 1}, {"flush", 1}, {NULL,-1}};
  1320. TT.is_addr++;
  1321. if (!*argv) idx = 1;
  1322. else if ((idx = substring_to_idx(*argv++, cmd_objectlist)) == -1)
  1323. help_exit(0);
  1324. ipcmd = cmdobjlist[idx];
  1325. return ipcmd(argv);
  1326. }
  1327. // ===========================================================================
  1328. // code for ip route
  1329. // ===========================================================================
  1330. struct I_data {
  1331. unsigned char family;
  1332. uint32_t addr[8] , netmask ;
  1333. uint8_t len ;
  1334. };
  1335. struct {
  1336. int tb,idev,odev,proto;
  1337. struct I_data rvia, rdst, mdst, rsrc, msrc;
  1338. } gfilter;
  1339. static void show_iproute_help(void)
  1340. {
  1341. error_exit("\n\n" \
  1342. "iproute { list | flush } SELECTOR\n" \
  1343. "iproute get ADDRESS [from ADDRESS iif STRING]\n" \
  1344. " [oif STRING]\n" \
  1345. "iproute { add | del | change | append | replace | test } ROUTE\n" \
  1346. " SELECTOR := [root PREFIX] [match PREFIX] [proto RTPROTO]\n" \
  1347. " ROUTE := [TYPE] PREFIX [proto RTPROTO] [metric METRIC]");
  1348. }
  1349. static void print_rta_metrics(char* out, const struct rtattr *mxattr)
  1350. {
  1351. int32_t tvar = RTA_PAYLOAD(mxattr);
  1352. struct rtattr *rta, *mxrta[RTAX_MAX+1] = {0,};
  1353. unsigned int mxlock = 0;
  1354. int i;
  1355. for (rta = RTA_DATA(mxattr); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
  1356. if (rta->rta_type <= RTA_MAX) mxrta[rta->rta_type] = rta;
  1357. if (mxrta[RTAX_LOCK])
  1358. mxlock = *(u_int32_t *)RTA_DATA(mxrta[RTAX_LOCK]);
  1359. for (i = 2; i <= RTAX_MAX; i++) {
  1360. uint32_t val = 0;
  1361. if (mxrta[i] == NULL && !(mxlock & (1 << i)))
  1362. continue;
  1363. if (mxrta[i] != NULL && i != RTAX_CC_ALGO)
  1364. val = *(u_int32_t *)RTA_DATA(mxrta[i]);
  1365. if (i == RTAX_HOPLIMIT && (int)val == -1)
  1366. continue;
  1367. if (i < sizeof(mx_names)/sizeof(char *) && mx_names[i])
  1368. sprintf(out, "%s%s ", out, mx_names[i]);
  1369. else
  1370. sprintf(out, "%smetric %d ", out, i);
  1371. if (mxlock & (1<<i))
  1372. sprintf(out, "%slock ", out);
  1373. switch (i) {
  1374. case RTAX_RTT:
  1375. case RTAX_RTTVAR:
  1376. case RTAX_RTO_MIN:
  1377. if (i == RTAX_RTT)
  1378. val /= 8;
  1379. else if (i == RTAX_RTTVAR)
  1380. val /= 4;
  1381. if (val >= 1000)
  1382. sprintf(out, "%s%gs ", out, val / 1e3);
  1383. else
  1384. sprintf(out, "%s%ums ", out, val);
  1385. break;
  1386. case RTAX_CC_ALGO:
  1387. sprintf(out, "%scongestion %s ", out, (const char*)RTA_DATA(mxrta[i]));
  1388. break;
  1389. default:
  1390. sprintf(out, "%s%u ", out, val);
  1391. break;
  1392. }
  1393. }
  1394. }
  1395. static int display_route_info(struct nlmsghdr *mhdr, char **argv)
  1396. {
  1397. char *inetval = NULL, out[1024] = {0};
  1398. struct rtmsg *msg = NLMSG_DATA(mhdr);
  1399. struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
  1400. int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
  1401. int hlen = ((msg->rtm_family == AF_INET) ? 32
  1402. : ((msg->rtm_family == AF_INET6) ? 128 : -1));
  1403. if (mhdr->nlmsg_type != RTM_NEWROUTE) return 0;
  1404. if (msglen < 0) return 1;
  1405. if (msg->rtm_family == AF_INET6) {
  1406. if (gfilter.tb) {
  1407. if (gfilter.tb < 0) {
  1408. if (!(msg->rtm_flags & RTM_F_CLONED)) return 0;
  1409. } else {
  1410. if (msg->rtm_flags & RTM_F_CLONED) return 0;
  1411. if (gfilter.tb == RT_TABLE_LOCAL && msg->rtm_type != RTN_LOCAL)
  1412. return 0;
  1413. else if (gfilter.tb == RT_TABLE_MAIN && msg->rtm_type == RTN_LOCAL)
  1414. return 0;
  1415. }
  1416. }
  1417. }
  1418. else if (gfilter.tb > 0 && gfilter.tb != msg->rtm_table) return 0;
  1419. if (gfilter.proto && (msg->rtm_protocol != gfilter.proto)) return 0;
  1420. if (gfilter.rdst.family && (msg->rtm_family != gfilter.rdst.family ||
  1421. gfilter.rdst.netmask > msg->rtm_dst_len)) return 0;
  1422. if (gfilter.mdst.family && (msg->rtm_family != gfilter.mdst.family
  1423. || (gfilter.mdst.netmask < msg->rtm_dst_len))) return 0;
  1424. if (gfilter.rsrc.family && (msg->rtm_family != gfilter.rsrc.family
  1425. || gfilter.rsrc.netmask > msg->rtm_src_len)) return 0;
  1426. if (gfilter.msrc.family && (msg->rtm_family != gfilter.msrc.family
  1427. || (gfilter.msrc.netmask < msg->rtm_src_len))) return 0;
  1428. tvar = msglen;
  1429. for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
  1430. if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
  1431. if (msg->rtm_type != RTN_UNICAST)
  1432. sprintf(out,"%s%s ", out,rtmtype_idx2str(msg->rtm_type));
  1433. if (attr[RTA_DST]) {
  1434. inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_DST]),
  1435. toybuf, sizeof(toybuf));
  1436. if (gfilter.rdst.family &&
  1437. memcmp(RTA_DATA(attr[RTA_DST]), &gfilter.rdst.addr, gfilter.rdst.len))
  1438. return 0;
  1439. if (gfilter.mdst.family &&
  1440. memcmp(RTA_DATA(attr[RTA_DST]), &gfilter.mdst.addr, gfilter.mdst.len))
  1441. return 0;
  1442. sprintf(out,"%s%s",out,inetval);
  1443. }
  1444. if (msg->rtm_dst_len) sprintf(out,"%s/%d ", out,msg->rtm_dst_len);
  1445. else sprintf(out,"%s%s",out,"default ");
  1446. if (attr[RTA_SRC]) {
  1447. inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_SRC]),
  1448. toybuf, sizeof(toybuf));
  1449. if (gfilter.rsrc.family &&
  1450. memcmp(RTA_DATA(attr[RTA_SRC]), &gfilter.rsrc.addr, gfilter.rsrc.len))
  1451. return 0;
  1452. if (gfilter.msrc.family &&
  1453. memcmp(RTA_DATA(attr[RTA_SRC]), &gfilter.msrc.addr, gfilter.msrc.len))
  1454. return 0;
  1455. sprintf(out, "%s from %s", out, inetval);
  1456. }
  1457. if (msg->rtm_src_len) sprintf(out, "%s/%d ", out, msg->rtm_src_len);
  1458. if (attr[RTA_GATEWAY]) {
  1459. inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_GATEWAY]),
  1460. toybuf, sizeof(toybuf));
  1461. sprintf(out, "%s via %s ", out, inetval);
  1462. }
  1463. if (gfilter.rvia.family) {
  1464. char tmp[256];
  1465. if (!attr[RTA_GATEWAY]) return 0;
  1466. if (strcmp((char *)inet_ntop(msg->rtm_family, gfilter.rvia.addr,
  1467. tmp, sizeof(tmp)), inetval)) return 0;
  1468. }
  1469. if (gfilter.odev != 0) if (!attr[RTA_OIF]) return 0;
  1470. if (attr[RTA_OIF]) {
  1471. if (gfilter.odev !=0 && gfilter.odev != *(int*)RTA_DATA(attr[RTA_OIF]))
  1472. return 0;
  1473. sprintf(out, "%s dev %s ", out,
  1474. if_indextoname(*(int*)RTA_DATA(attr[RTA_OIF]), toybuf));
  1475. }
  1476. if (attr[RTA_PREFSRC] && hlen) {
  1477. inetval = (char *)inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_PREFSRC]),
  1478. toybuf, sizeof(toybuf));
  1479. sprintf(out, "%s src %s ", out, inetval);
  1480. }
  1481. if (attr[RTA_PRIORITY])
  1482. sprintf(out, "%s metric %d ", out, *(uint32_t*)RTA_DATA(attr[RTA_PRIORITY]));
  1483. if (msg->rtm_family == AF_INET6) {
  1484. struct rta_cacheinfo *ci = NULL;
  1485. if (attr[RTA_CACHEINFO]) ci = RTA_DATA(attr[RTA_CACHEINFO]);
  1486. if ((msg->rtm_flags & RTM_F_CLONED) || (ci && ci->rta_expires)) {
  1487. if (msg->rtm_flags & RTM_F_CLONED) sprintf(out, "%s%s cache ",
  1488. out, (!TT.singleline ? "\n" : " "));
  1489. if (ci && ci->rta_expires) {
  1490. int hz = 0;
  1491. FILE *fp = xfopen("/proc/net/psched","r");
  1492. if (fp) {
  1493. unsigned int nom, denom;
  1494. if (fscanf(fp, "%*08x%*08x%08x%08x", &nom, &denom) == 2)
  1495. if (nom == 1000000)
  1496. hz = denom;
  1497. fclose(fp);
  1498. }
  1499. if (!hz) hz = sysconf(_SC_CLK_TCK);
  1500. sprintf(out, "%s expires %dsec", out, ci->rta_expires /hz);
  1501. }
  1502. if (ci && ci->rta_error) sprintf(out, "%s error %d", out, ci->rta_error);
  1503. }
  1504. else if (ci && ci->rta_error)
  1505. sprintf(out, "%s error %d", out, ci->rta_error);
  1506. }
  1507. if (attr[RTA_IIF] && !gfilter.idev)
  1508. sprintf(out, "%s iif %s", out,
  1509. if_indextoname(*(int*)RTA_DATA(attr[RTA_IIF]), toybuf));
  1510. if (attr[RTA_METRICS])
  1511. print_rta_metrics(out, attr[RTA_METRICS]);
  1512. if (TT.flush || (TT.connected && !TT.from_ok))
  1513. memcpy(toybuf, (void*)mhdr,mhdr->nlmsg_len);
  1514. if (TT.flush) {
  1515. int sockfd = 0;
  1516. struct nlmsghdr* mhdr = (struct nlmsghdr*)toybuf;
  1517. struct rtmsg *msg = NLMSG_DATA(mhdr);
  1518. int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
  1519. struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
  1520. tvar = msglen;
  1521. for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
  1522. if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
  1523. if (msg->rtm_family == AF_INET6
  1524. && !msg->rtm_dst_len
  1525. && msg->rtm_type == RTN_UNREACHABLE
  1526. && attr[RTA_PRIORITY]
  1527. && *(int*)RTA_DATA(attr[RTA_PRIORITY]) == -1)
  1528. return 0;
  1529. mhdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
  1530. mhdr->nlmsg_type = RTM_DELROUTE;
  1531. mhdr->nlmsg_pid = 0;
  1532. sockfd = xsocket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
  1533. if (send(sockfd , (void*)mhdr, mhdr->nlmsg_len, 0) < 0)
  1534. perror_exit("Unable to send data on socket.");
  1535. while (1) {
  1536. struct nlmsghdr *mhdr;
  1537. int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0);
  1538. if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue;
  1539. else if (msglen < 0) {
  1540. error_msg("netlink receive error %s", strerror(errno));
  1541. xclose(sockfd);
  1542. return 1;
  1543. } else if (!msglen) {
  1544. error_msg("EOF on netlink");
  1545. xclose(sockfd);
  1546. return 1;
  1547. }
  1548. for (mhdr = (struct nlmsghdr*)toybuf; NLMSG_OK(mhdr, msglen);
  1549. mhdr = NLMSG_NEXT(mhdr, msglen)) {
  1550. switch (mhdr->nlmsg_type) {
  1551. case NLMSG_DONE:
  1552. xclose(sockfd);
  1553. return 0;
  1554. case NLMSG_ERROR:
  1555. {
  1556. struct nlmsgerr *merr = (struct nlmsgerr*)NLMSG_DATA(mhdr);
  1557. if (merr->error == 0) { xclose(sockfd); return 0; }
  1558. if (mhdr->nlmsg_len < NLMSG_LENGTH(sizeof(struct nlmsgerr)))
  1559. error_msg("ERROR truncated");
  1560. else {
  1561. errno = -merr->error;
  1562. perror_msg("RTNETLINK answers");
  1563. }
  1564. xclose(sockfd);
  1565. return 1;
  1566. }
  1567. default:
  1568. break;
  1569. }
  1570. } // End of for loop.
  1571. } // End of while loop.
  1572. xclose(sockfd);
  1573. } else printf("%s\n",out);
  1574. return 0;
  1575. }
  1576. static int route_get(char **argv)
  1577. {
  1578. int idx, flag;
  1579. struct arglist cmd_objectlist[] = {{"from", 0}, {"iif", 1}, {"oif", 2},
  1580. {"dev", 3}, {"notify", 4}, {"connected", 5}, {"to", 6}, {NULL, -1}};
  1581. char *idev = NULL, *odev = NULL;
  1582. struct {
  1583. struct nlmsghdr mhdr;
  1584. struct rtmsg msg;
  1585. char buf[1024];
  1586. } request;
  1587. memset(&request, 0, sizeof(request));
  1588. request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
  1589. request.mhdr.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
  1590. request.mhdr.nlmsg_type = RTM_GETROUTE;
  1591. request.msg.rtm_family = AF_UNSPEC;
  1592. for (; *argv; argv++) {
  1593. switch(idx = substring_to_idx(*argv, cmd_objectlist)) {
  1594. case 0: TT.from_ok = 1; // dst address
  1595. case 6: argv++; //fallthrough
  1596. default:
  1597. {
  1598. uint32_t addr[8] = {0,}, netmask = 0;
  1599. uint8_t len = 0;
  1600. if (!*argv) error_exit("'%s': Missing Prefix", argv[-1]);
  1601. parse_prefix(addr, &netmask, &len, *argv, request.msg.rtm_family);
  1602. if (len) request.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
  1603. netmask = (request.msg.rtm_family == AF_INET6) ? 128 : 32;
  1604. if (!idx) request.msg.rtm_src_len = netmask;
  1605. else request.msg.rtm_dst_len = netmask;
  1606. add_string_to_rtattr(&request.mhdr, sizeof(request),
  1607. (!idx ? RTA_SRC : RTA_DST), addr, len);
  1608. break;
  1609. }
  1610. case 1:
  1611. case 2:
  1612. case 3:
  1613. if (!*++argv) show_iproute_help();
  1614. if (idx == 1) idev = *argv, flag = RTA_IIF;
  1615. else odev = *argv, flag = RTA_OIF;
  1616. idx = get_ifaceindex(*argv, 1);
  1617. add_string_to_rtattr(&request.mhdr, sizeof(request),
  1618. flag, (char*)&idx, sizeof(idx));
  1619. break;
  1620. case 4:
  1621. request.msg.rtm_flags |= RTM_F_NOTIFY;
  1622. break;
  1623. case 5:
  1624. TT.connected = 1;
  1625. break;
  1626. }
  1627. }
  1628. if (!request.msg.rtm_dst_len)
  1629. error_exit("need at least destination address");
  1630. send_nlmesg(0, 0, 0, &request, sizeof(request));
  1631. filter_nlmesg(display_route_info, NULL);
  1632. if (TT.connected && !TT.from_ok) {
  1633. struct nlmsghdr *mhdr = (struct nlmsghdr*)toybuf;
  1634. struct rtmsg *msg = NLMSG_DATA(mhdr);
  1635. int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
  1636. struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
  1637. if (mhdr->nlmsg_type != RTM_NEWROUTE) error_exit("not a route?");
  1638. if (msglen < 0) error_exit("wrong len %d", msglen);
  1639. tvar = msglen;
  1640. for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
  1641. if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
  1642. if (attr[RTA_PREFSRC]) {
  1643. attr[RTA_PREFSRC]->rta_type = RTA_SRC;
  1644. msg->rtm_src_len = 8*RTA_PAYLOAD(attr[RTA_PREFSRC]);
  1645. } else if (!attr[RTA_SRC]) error_exit("can't connect the route");
  1646. if (!odev && attr[RTA_OIF]) attr[RTA_OIF]->rta_type = 0;
  1647. if (attr[RTA_GATEWAY]) attr[RTA_GATEWAY]->rta_type = 0;
  1648. if (!idev && attr[RTA_IIF]) attr[RTA_IIF]->rta_type = 0;
  1649. mhdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
  1650. mhdr->nlmsg_type = RTM_GETROUTE;
  1651. mhdr->nlmsg_pid = 0;
  1652. xclose(TT.sockfd);
  1653. TT.sockfd = xsocket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
  1654. send_nlmesg(0, 0, 0, mhdr, mhdr->nlmsg_len);
  1655. filter_nlmesg(display_route_info, NULL);
  1656. }
  1657. return 0;
  1658. }
  1659. static int route_show_flush(char **argv)
  1660. {
  1661. struct arglist cmd_objectlist[] = {{"protocol", 0}, {"dev", 1}, {"oif", 2},
  1662. {"iif", 3}, {"via", 4}, {"table", 5}, {"cache", 6}, {"from", 7},
  1663. {"to", 8}, {"all", 9}, {"root", 10}, {"match", 11}, {"exact", 12},
  1664. {"main", 13}, {NULL,-1}};
  1665. int family = TT.addressfamily, idx;
  1666. struct {
  1667. struct nlmsghdr mhdr;
  1668. struct rtmsg msg;
  1669. } request;
  1670. if (*argv[-1] == 'f') TT.flush = 1;
  1671. if (TT.flush && !*argv) show_iproute_help();
  1672. gfilter.tb = RT_TABLE_MAIN;
  1673. for (; *argv; argv++) {
  1674. switch (idx = substring_to_idx(*argv, cmd_objectlist)) {
  1675. case 0:
  1676. if (!*++argv) show_iproute_help();
  1677. if ((idx = idxfromRPDB(*argv,RPDB_rtprotos)) < 0)
  1678. error_exit("Invalid argument protocol.");
  1679. gfilter.proto = idx;
  1680. break;
  1681. case 1:
  1682. case 2:
  1683. case 3:
  1684. {
  1685. if (!*++argv) show_iproute_help();
  1686. int dev = get_ifaceindex(*argv, 1);
  1687. if (idx == 3) gfilter.idev = dev;
  1688. else gfilter.odev = dev;
  1689. }
  1690. break;
  1691. case 4:
  1692. if (!*++argv) show_iproute_help();
  1693. parse_prefix(gfilter.rvia.addr, &gfilter.rvia.netmask,
  1694. &gfilter.rvia.len, *argv, gfilter.rvia.family);
  1695. if (gfilter.rvia.len)
  1696. gfilter.rvia.family = ((gfilter.rvia.len == 4) ?
  1697. AF_INET : AF_INET6);
  1698. break;
  1699. case 5:
  1700. if (!*++argv) show_iproute_help();
  1701. idx = substring_to_idx(*argv, cmd_objectlist);
  1702. if (idx == 6) gfilter.tb = -1;
  1703. else if (idx == 9) gfilter.tb = 0;
  1704. else if (idx != 13) {
  1705. if ((gfilter.tb = idxfromRPDB(*argv, RPDB_rttables)) < 0)
  1706. error_exit("table %s is invalid.", *argv);
  1707. }
  1708. break;
  1709. case 6:
  1710. gfilter.tb = -1;
  1711. break;
  1712. case 7:
  1713. if (!*++argv) show_iproute_help();
  1714. idx = substring_to_idx(*argv, cmd_objectlist);
  1715. if (idx < 0) if (!*++argv) show_iproute_help();
  1716. if (idx == 10)
  1717. if (!*++argv) show_iproute_help();
  1718. parse_prefix(gfilter.rsrc.addr, &gfilter.rsrc.netmask,
  1719. &gfilter.rsrc.len, *argv, gfilter.rsrc.family);
  1720. if (gfilter.rsrc.len)
  1721. gfilter.rsrc.family = ((gfilter.rsrc.len == 4) ?
  1722. AF_INET : AF_INET6);
  1723. else {
  1724. if ((idx == 12 ||idx == 11) && !*++argv) show_iproute_help();
  1725. parse_prefix(gfilter.msrc.addr, &gfilter.msrc.netmask,
  1726. &gfilter.msrc.len, *argv, gfilter.msrc.family);
  1727. if (gfilter.msrc.len)
  1728. gfilter.msrc.family = ((gfilter.msrc.len == 4) ?
  1729. AF_INET : AF_INET6);
  1730. if (idx != 11) gfilter.rsrc = gfilter.msrc;
  1731. }
  1732. break;
  1733. case 8:
  1734. idx = substring_to_idx(*argv, cmd_objectlist);
  1735. if (idx != -1 && !*++argv) show_iproute_help();
  1736. default: // fallthrough
  1737. if (idx == 10) {
  1738. if (!*++argv) show_iproute_help();
  1739. parse_prefix(gfilter.rdst.addr, &gfilter.rdst.netmask,
  1740. &gfilter.rdst.len, *argv, gfilter.rdst.family);
  1741. if (gfilter.rdst.len)
  1742. gfilter.rdst.family = ((gfilter.rdst.len == 4) ?
  1743. AF_INET : AF_INET6);
  1744. }
  1745. else {
  1746. if ((idx == 12 ||idx == 11) && !*++argv) show_iproute_help();
  1747. parse_prefix(gfilter.mdst.addr, &gfilter.mdst.netmask,
  1748. &gfilter.mdst.len, *argv, gfilter.mdst.family);
  1749. if (gfilter.mdst.len)
  1750. gfilter.mdst.family = ((gfilter.mdst.len == 4) ?
  1751. AF_INET : AF_INET6);
  1752. if (idx != 11) gfilter.rdst = gfilter.mdst;
  1753. }
  1754. break;
  1755. }
  1756. }
  1757. if (family == AF_UNSPEC && gfilter.tb) family = AF_INET;
  1758. if (TT.flush) {
  1759. if (gfilter.tb < 0) { // flush table cache
  1760. if (family != AF_INET6) {
  1761. FILE *fp = xfopen("/proc/sys/net/ipv4/route/flush", "w");
  1762. if (fwrite("-1",1,2,fp) < 2) error_exit("can't flush routing cache");
  1763. fclose(fp);
  1764. }
  1765. if (family == AF_INET) return 0;
  1766. }
  1767. }
  1768. memset(&request, 0, sizeof (request));
  1769. request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof (struct rtmsg));
  1770. request.mhdr.nlmsg_flags = NLM_F_REQUEST;
  1771. request.mhdr.nlmsg_flags |= NLM_F_ROOT | NLM_F_MATCH;
  1772. request.mhdr.nlmsg_type = RTM_GETROUTE;
  1773. request.msg.rtm_family = family;
  1774. if (gfilter.tb < 0) request.msg.rtm_flags = RTM_F_CLONED;
  1775. send_nlmesg(0, 0, 0, (void*)&request, sizeof (request));
  1776. return (filter_nlmesg(display_route_info, NULL));
  1777. }
  1778. static int route_update(char **argv, unsigned int route_flags)
  1779. {
  1780. char mxbuf[256], *d = NULL;
  1781. struct rtattr *mxrta = (void*)mxbuf;
  1782. unsigned mxlock = 0, ok = 0;
  1783. int idx;
  1784. uint32_t addr[8] = {0,}, netmask = 0;
  1785. uint8_t len = 0;
  1786. struct arglist cmd_objectlist[] = {{"src", 0}, {"via", 1}, {"mtu", 2},
  1787. {"lock", 3}, {"protocol", 4}, {"table", 5}, {"dev", 6}, {"oif", 7},
  1788. {"to", 8}, {"metric", 9}, {NULL,-1}
  1789. };
  1790. enum {
  1791. gtwy_ok = 1,
  1792. dst_ok = 2,
  1793. proto_ok = 4,
  1794. type_ok = 8
  1795. };
  1796. struct {
  1797. struct nlmsghdr hdr;
  1798. struct rtmsg msg;
  1799. char buf[1024];
  1800. } req;
  1801. memset(&req, 0, sizeof(req));
  1802. req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
  1803. req.hdr.nlmsg_flags = NLM_F_ACK| NLM_F_REQUEST | route_flags;
  1804. req.hdr.nlmsg_type = TT.route_cmd;
  1805. req.msg.rtm_family = AF_UNSPEC;
  1806. req.msg.rtm_table = RT_TABLE_MAIN;
  1807. req.msg.rtm_scope = RT_SCOPE_NOWHERE;
  1808. if (TT.route_cmd != RTM_DELROUTE) {
  1809. req.msg.rtm_protocol = RTPROT_BOOT;
  1810. req.msg.rtm_scope = RT_SCOPE_UNIVERSE;
  1811. req.msg.rtm_type = RTN_UNICAST;
  1812. }
  1813. mxrta->rta_type = RTA_METRICS;
  1814. mxrta->rta_len = RTA_LENGTH(0);
  1815. for (; *argv; argv++) {
  1816. idx = substring_to_idx(*argv, cmd_objectlist);
  1817. if (!idx) {
  1818. if (!*++argv) show_iproute_help();
  1819. parse_prefix(addr, &netmask, &len, *argv, req.msg.rtm_family);
  1820. if (len) req.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
  1821. add_string_to_rtattr(&req.hdr, sizeof(req), RTA_PREFSRC, addr, len);
  1822. } else if (idx == 1) {
  1823. ok |= gtwy_ok;
  1824. if (!*++argv) show_iproute_help();
  1825. parse_prefix(addr, &netmask, &len, *argv, req.msg.rtm_family);
  1826. if (len) req.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
  1827. add_string_to_rtattr(&req.hdr, sizeof(req),RTA_GATEWAY, addr, len);
  1828. } else if (idx == 2) {
  1829. if (!*++argv) show_iproute_help();
  1830. if (substring_to_idx(*argv, cmd_objectlist ) == 3) {
  1831. mxlock |= (1 << RTAX_MTU);
  1832. if (!*++argv) show_iproute_help();
  1833. }
  1834. idx = atolx(*argv);
  1835. add_uint32_rtattr_to_buffer(mxrta, sizeof(mxbuf), RTAX_MTU, idx);
  1836. } else if (idx == 4) {
  1837. if (!*++argv) show_iproute_help();
  1838. if ((idx = idxfromRPDB(*argv,RPDB_rtprotos)) < 0)
  1839. error_exit("Invalid argument protocol %s.",*argv);
  1840. req.msg.rtm_protocol = idx;
  1841. ok |= proto_ok;
  1842. } else if (idx == 5) {
  1843. if (!*++argv) show_iproute_help();
  1844. req.msg.rtm_table = idxfromRPDB(*argv, RPDB_rttables);
  1845. } else if (idx == 6 || idx == 7) {
  1846. if (!*++argv) show_iproute_help();
  1847. d = *argv;
  1848. } else if (idx == 9) {
  1849. unsigned long metric;
  1850. unsigned int res;
  1851. char* ptr;
  1852. if (!*++argv) show_iproute_help();
  1853. metric = strtoul(*argv, &ptr, 0);
  1854. if (!(!*ptr && metric <= 0xFFFFFFFFUL))
  1855. error_exit("Invalid argument metric %s.",*argv);
  1856. else
  1857. res = metric;
  1858. add_string_to_rtattr(&req.hdr, sizeof(req),
  1859. RTA_PRIORITY, (char*)&res, sizeof(res));
  1860. } else {
  1861. if (idx == 8)
  1862. if (!*++argv) show_iproute_help();
  1863. idx = substring_to_idx(*argv,rtmtypes);
  1864. if (idx != -1) {
  1865. if (!*++argv) show_iproute_help();
  1866. req.msg.rtm_type = idx;
  1867. ok |= type_ok;
  1868. }
  1869. if (ok & dst_ok) error_exit("Duplicate argument 'to'");
  1870. parse_prefix(addr, &netmask, &len, *argv, req.msg.rtm_family);
  1871. if (len) req.msg.rtm_family = ((len == 4) ? AF_INET : AF_INET6);
  1872. req.msg.rtm_dst_len = netmask;
  1873. ok |= dst_ok;
  1874. if (len) add_string_to_rtattr(&req.hdr, sizeof(req),RTA_DST, addr, len);
  1875. }
  1876. }
  1877. if (d) {
  1878. idx = get_ifaceindex(d,1);
  1879. add_string_to_rtattr(&req.hdr, sizeof(req),
  1880. RTA_OIF, (char*)&idx, sizeof(idx));
  1881. }
  1882. if (mxrta->rta_len > RTA_LENGTH(0)) {
  1883. if (mxlock)
  1884. add_uint32_rtattr_to_buffer(mxrta, sizeof(mxbuf), RTAX_LOCK, mxlock);
  1885. add_string_to_rtattr(&req.hdr, sizeof(req),
  1886. RTA_METRICS, RTA_DATA(mxrta), RTA_PAYLOAD(mxrta));
  1887. }
  1888. if (req.msg.rtm_type == RTN_LOCAL || req.msg.rtm_type == RTN_NAT)
  1889. req.msg.rtm_scope = RT_SCOPE_HOST;
  1890. else if (req.msg.rtm_type == RTN_BROADCAST||req.msg.rtm_type == RTN_MULTICAST
  1891. || req.msg.rtm_type == RTN_ANYCAST)
  1892. req.msg.rtm_scope = RT_SCOPE_LINK;
  1893. else if (req.msg.rtm_type == RTN_UNICAST || req.msg.rtm_type == RTN_UNSPEC) {
  1894. if (TT.route_cmd == RTM_DELROUTE)
  1895. req.msg.rtm_scope = RT_SCOPE_NOWHERE;
  1896. else if (!(ok & gtwy_ok))
  1897. req.msg.rtm_scope = RT_SCOPE_LINK;
  1898. }
  1899. if (req.msg.rtm_family == AF_UNSPEC) req.msg.rtm_family = AF_INET;
  1900. send_nlmesg(0, 0, 0, &req, sizeof(req));
  1901. filter_nlmesg(NULL, NULL);
  1902. return 0;
  1903. }
  1904. static int iproute(char **argv)
  1905. {
  1906. int idx = 1;
  1907. struct arglist cmd_objectlist1[] = {{"add", 0}, {"append", 1},{"change", 2},
  1908. {"chg", 3},{"delete",4}, {"get", 5}, {"list", 6}, {"show", 7},
  1909. {"prepend", 8},{"replace", 9},{"test", 10}, {"flush", 11},{NULL,-1}};
  1910. TT.route_cmd = RTM_NEWROUTE;
  1911. switch (idx = substring_to_idx(*argv , cmd_objectlist1)) {
  1912. case 0: // add
  1913. return route_update(++argv , NLM_F_CREATE|NLM_F_EXCL);
  1914. case 1: // append
  1915. return route_update(++argv , NLM_F_CREATE|NLM_F_APPEND);
  1916. case 2: // change
  1917. case 3: // chg
  1918. return route_update(++argv , NLM_F_REPLACE);
  1919. case 4: // delete
  1920. TT.route_cmd = RTM_DELROUTE;
  1921. return route_update(++argv , RTM_DELROUTE);
  1922. case 5:
  1923. return route_get(++argv);
  1924. case 6:
  1925. case 7:
  1926. return route_show_flush(++argv);
  1927. case 8: // prepend
  1928. return route_update(++argv , NLM_F_CREATE);
  1929. case 9: // replace
  1930. return route_update(++argv , NLM_F_CREATE|NLM_F_REPLACE);
  1931. case 10: // test
  1932. return route_update(++argv , NLM_F_EXCL);
  1933. case 11: // flush
  1934. return route_show_flush(++argv);
  1935. default:
  1936. if (!*argv) return route_show_flush(argv);
  1937. else show_iproute_help();
  1938. }
  1939. return 0; // non reachable code.
  1940. }
  1941. // ===========================================================================
  1942. // code for ip rule.
  1943. // ===========================================================================
  1944. static void show_iprule_help(void)
  1945. {
  1946. error_exit("usage: ip rule [ list | add | del ] SELECTOR ACTION\n"
  1947. "SELECTOR := [ from PREFIX ] [ to PREFIX ] [pref NUMBER] [ tos TOS ]\n"
  1948. " [ fwmark FWMARK] [ dev/iif STRING ] [type TYPE]\n"
  1949. "ACTION := [ table TABLE_ID ] [ realms [SRCREALM/]DSTREALM ]");
  1950. }
  1951. static int ruleupdate(char **argv)
  1952. {
  1953. int8_t idx, tflag = 0, opt = (*argv[-1] == 'a') ? RTM_NEWRULE : RTM_DELRULE;
  1954. struct arglist options[] = {{"from", 0}, {"to", 1}, {"preference", 2},
  1955. {"order", 2}, {"priority", 2}, {"tos", 3}, {"dsfield", 3}, {"fwmark", 4},
  1956. {"realms", 5}, {"table", 6}, {"lookup", 6}, {"dev", 7}, {"iif", 7},
  1957. {"nat", 8}, {"map-to", 8}, {"type", 9}, {"help", 10}, {NULL, -1}};
  1958. struct {
  1959. struct nlmsghdr mhdr;
  1960. struct rtmsg msg;
  1961. char buf[1024];
  1962. } request;
  1963. memset(&request, 0, sizeof(request));
  1964. request.mhdr.nlmsg_type = opt;
  1965. request.mhdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
  1966. request.mhdr.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK |
  1967. ((opt == RTM_DELRULE) ? 0 : NLM_F_CREATE | NLM_F_EXCL);
  1968. request.msg.rtm_family = TT.addressfamily;
  1969. request.msg.rtm_protocol = RTPROT_BOOT;
  1970. request.msg.rtm_scope = RT_SCOPE_UNIVERSE;
  1971. request.msg.rtm_table = 0;
  1972. request.msg.rtm_type = ((opt == RTM_DELRULE) ? RTN_UNSPEC : RTN_UNICAST);
  1973. for (; *argv; argv++) {
  1974. switch ((idx = substring_to_idx(*argv, options))) {
  1975. case 0:
  1976. case 1:
  1977. { // e.g. from IP/Netmask and to IP/Netmask.
  1978. uint32_t addr[4] = {0,}, netmask = 0;
  1979. uint8_t len = 0, *tmp;
  1980. if (!*++argv) error_exit("'%s': Missing Prefix", argv[-1]);
  1981. parse_prefix(addr, &netmask, &len, *argv, request.msg.rtm_family);
  1982. tmp = idx ? &request.msg.rtm_dst_len : &request.msg.rtm_src_len;
  1983. if (!netmask) *tmp = 0;
  1984. else *tmp = netmask;
  1985. add_string_to_rtattr(&request.mhdr, sizeof(request),
  1986. (idx ? RTA_DST : RTA_SRC), addr, len);
  1987. }
  1988. break;
  1989. case 2:
  1990. case 4:
  1991. { // e.g. Preference p# and fwmark MARK
  1992. uint32_t pref;
  1993. char *ptr;
  1994. if (!*++argv)
  1995. error_exit("Missing %s", (idx == 2) ? "Preference" : "fwmark");
  1996. pref = strtoul(*argv, &ptr, 0);
  1997. if (!ptr || (ptr == *argv) || *ptr || pref > 0xFFFFFFFFUL)
  1998. error_exit("Invalid %s", (idx == 2) ? "Preference" : "fwmark");
  1999. add_string_to_rtattr(&request.mhdr, sizeof(request),
  2000. ((idx == 2) ? RTA_PRIORITY : RTA_PROTOINFO),
  2001. (void *)&pref, sizeof(uint32_t));
  2002. }
  2003. break;
  2004. case 3:
  2005. {
  2006. uint32_t tos;
  2007. if (!*++argv) error_exit("Missing TOS key");
  2008. if ((tos = idxfromRPDB(*argv, RPDB_rtdsfield)) < 0)
  2009. error_exit("Invalid TOS");
  2010. request.msg.rtm_tos = tos;
  2011. }
  2012. break;
  2013. case 5:
  2014. { // e.g. realms FROM_realm/TO_realm
  2015. uint32_t realms = 0;
  2016. int ret;
  2017. char *ptr;
  2018. if (!*++argv) error_exit("Missing REALMSID");
  2019. if ((ptr = strchr(*argv, '/'))) {
  2020. *ptr = 0;
  2021. if ((ret = idxfromRPDB(*argv, RPDB_rtrealms)) < 0)
  2022. error_exit("Invalid realms");
  2023. realms = ret;
  2024. realms <<= 16;
  2025. *ptr++ = '/';
  2026. } else ptr = *argv;
  2027. if ((ret = idxfromRPDB(ptr, RPDB_rtrealms)) < 0)
  2028. error_exit("Invalid realms");
  2029. realms |= ret;
  2030. add_string_to_rtattr(&request.mhdr, sizeof(request),
  2031. RTA_FLOW, (void *)&realms, sizeof(uint32_t));
  2032. }
  2033. break;
  2034. case 6:
  2035. { // e.g. table tid/tableName
  2036. int tid;
  2037. if (!*++argv) error_exit("Missing TableID");
  2038. if ((tid = idxfromRPDB(*argv, RPDB_rttables)) < 0)
  2039. error_exit("Invalid TID");
  2040. request.msg.rtm_table = tid;
  2041. tflag = 1;
  2042. }
  2043. break;
  2044. case 7:
  2045. {
  2046. if (!*++argv) error_exit("Missing dev/iif NAME");
  2047. add_string_to_rtattr(&request.mhdr, sizeof(request),
  2048. RTA_IIF, *argv, strlen(*argv)+1);
  2049. }
  2050. break;
  2051. case 8:
  2052. {
  2053. uint32_t addr[4] = {0,};
  2054. uint8_t af = AF_UNSPEC;
  2055. if (!*++argv) error_exit("Missing nat/map-to ADDRESS");
  2056. if (get_prefix(addr, &af /* Un-used variable */, *argv, AF_INET))
  2057. error_exit("Invalid mapping Address");
  2058. add_string_to_rtattr(&request.mhdr, sizeof(request),
  2059. RTA_GATEWAY, addr, sizeof(uint32_t));
  2060. request.msg.rtm_type = RTN_NAT;
  2061. }
  2062. break;
  2063. case 9:
  2064. {
  2065. if (!*++argv) error_exit("TYPE Missing");
  2066. request.msg.rtm_type = rtmtype_str2idx(*argv);
  2067. }
  2068. break;
  2069. case 10:
  2070. show_iprule_help();
  2071. break; // Unreachable code.
  2072. default:
  2073. error_exit("Invalid argument '%s'", *argv);
  2074. break; // Unreachable code.
  2075. }
  2076. }
  2077. if (!request.msg.rtm_family) request.msg.rtm_family = AF_INET;
  2078. if (!tflag && opt == RTM_NEWRULE) request.msg.rtm_table = RT_TABLE_MAIN;
  2079. send_nlmesg(0, 0, 0, &request, sizeof(request));
  2080. return (filter_nlmesg(NULL, NULL));
  2081. }
  2082. static int show_rules(struct nlmsghdr *mhdr,
  2083. char **argv __attribute__ ((__unused__)))
  2084. {
  2085. struct rtmsg *msg = NLMSG_DATA(mhdr);
  2086. struct rtattr *rta, *attr[RTA_MAX+1] = {0,};
  2087. int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
  2088. int hlen = ((msg->rtm_family == AF_INET) ? 32
  2089. : ((msg->rtm_family == AF_INET6) ? 128 : -1));
  2090. if (mhdr->nlmsg_type != RTM_NEWRULE) return 0;
  2091. if (msglen < 0) return 1;
  2092. tvar = msglen;
  2093. for (rta = RTM_RTA(msg); RTA_OK(rta, tvar); rta=RTA_NEXT(rta, tvar))
  2094. if (rta->rta_type <= RTA_MAX) attr[rta->rta_type] = rta;
  2095. if (tvar) error_msg("deficit %d, rtalen = %d!", tvar, rta->rta_len);
  2096. printf("%u:\tfrom ", attr[RTA_PRIORITY] ?
  2097. *(unsigned *)RTA_DATA(attr[RTA_PRIORITY]) : 0);
  2098. if (attr[RTA_SRC]) {
  2099. printf("%s", (msg->rtm_family == AF_INET || msg->rtm_family == AF_INET6)
  2100. ? inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_SRC]),
  2101. toybuf, sizeof(toybuf))
  2102. : "???");
  2103. (msg->rtm_src_len != hlen) ? printf("/%u", msg->rtm_src_len) : 0;
  2104. } else msg->rtm_src_len ? printf("0/%d", msg->rtm_src_len) : printf("all");
  2105. xputc(' ');
  2106. if (attr[RTA_DST]) {
  2107. printf("to %s", (msg->rtm_family == AF_INET || msg->rtm_family == AF_INET6)
  2108. ? inet_ntop(msg->rtm_family, RTA_DATA(attr[RTA_DST]),
  2109. toybuf, sizeof(toybuf)) : "???");
  2110. (msg->rtm_dst_len != hlen) ? printf("/%u", msg->rtm_dst_len) : xputc(' ');
  2111. } else if (msg->rtm_dst_len)
  2112. printf("to 0/%d ", msg->rtm_dst_len);
  2113. if (msg->rtm_tos)
  2114. printf("tos %s ", namefromRPDB(msg->rtm_tos, RPDB_rtdsfield));
  2115. if (attr[RTA_PROTOINFO])
  2116. printf("fwmark %#x ", *(uint32_t*)RTA_DATA(attr[RTA_PROTOINFO]));
  2117. if (attr[RTA_IIF]) printf("iif %s ", (char*)RTA_DATA(attr[RTA_IIF]));
  2118. if (msg->rtm_table)
  2119. printf("lookup %s ", namefromRPDB(msg->rtm_table, RPDB_rttables));
  2120. if (attr[RTA_FLOW]) {
  2121. u_int32_t from, to = *(u_int32_t *)RTA_DATA(attr[RTA_FLOW]);
  2122. char *format = "realms %s/";
  2123. to = (from = (to >> 16)) & 0xFFFF;
  2124. format = (from ? format: "%s");
  2125. printf(format, namefromRPDB((from ? from : to), RPDB_rtrealms));
  2126. }
  2127. if (msg->rtm_type == RTN_NAT) {
  2128. if (!attr[RTA_GATEWAY]) printf("masquerade");
  2129. else printf("map-to %s ", inet_ntop(msg->rtm_family,
  2130. RTA_DATA(attr[RTA_GATEWAY]), toybuf, sizeof(toybuf)));
  2131. } else if (msg->rtm_type != RTN_UNICAST)
  2132. printf("%s", rtmtype_idx2str(msg->rtm_type));
  2133. xputc('\n');
  2134. return 0;
  2135. }
  2136. static int rulelist(char **argv)
  2137. {
  2138. if (*argv) {
  2139. error_msg("'ip rule show' does not take any arguments.");
  2140. return 1;
  2141. }
  2142. send_nlmesg(RTM_GETRULE, NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST,
  2143. ((TT.addressfamily != AF_UNSPEC) ? TT.addressfamily : AF_INET), NULL, 0);
  2144. return filter_nlmesg(show_rules, argv);
  2145. }
  2146. static int iprule(char **argv)
  2147. {
  2148. int idx;
  2149. struct arglist options[] = {{"add", 0}, {"delete", 0}, {"list", 1},
  2150. {"show", 1}, {NULL, -1}};
  2151. cmdobj ipcmd, cmdobjlist[] = {ruleupdate, rulelist};
  2152. if (!*argv) idx = 1;
  2153. else if ((idx = substring_to_idx(*argv++, options)) == -1)
  2154. show_iprule_help();
  2155. ipcmd = cmdobjlist[idx];
  2156. return ipcmd(argv);
  2157. }
  2158. //============================================================================
  2159. // code for ip tunnel.
  2160. //============================================================================
  2161. static void show_iptunnel_help(void)
  2162. {
  2163. error_exit("usage: iptunnel { add | change | del | show } [NAME]\n"
  2164. " [mode { ipip | gre | sit }] [remote ADDR] [local ADDR]\n"
  2165. " [[i|o]seq] [[i|o]key KEY] [[i|o]csum] [ttl TTL]\n"
  2166. " [tos TOS] [[no]pmtudisc] [dev PHYS_DEV]");
  2167. }
  2168. static int tnl_ioctl(char *dev, int rtype, struct ip_tunnel_parm *ptnl)
  2169. {
  2170. struct ifreq req;
  2171. int fd, ret = 0;
  2172. if ((rtype == SIOCCHGTUNNEL || rtype == SIOCDELTUNNEL) && *ptnl->name)
  2173. xstrncpy(req.ifr_name, ptnl->name, IF_NAMESIZE);
  2174. else xstrncpy(req.ifr_name, dev, IF_NAMESIZE);
  2175. if (rtype != SIOCGIFHWADDR) req.ifr_ifru.ifru_data = (void*)ptnl;
  2176. fd = xsocket(AF_INET, SOCK_DGRAM, 0);
  2177. if (rtype == SIOCGETTUNNEL) ret = ioctl(fd, rtype, &req);
  2178. else if (rtype == SIOCGIFHWADDR)
  2179. ret = (ioctl(fd, rtype, &req) < 0) ? -1 : req.ifr_addr.sa_family;
  2180. else xioctl(fd, rtype, &req);
  2181. close(fd);
  2182. return ret;
  2183. }
  2184. static int display_tunnel(struct ip_tunnel_parm *ptnl)
  2185. {
  2186. char rmt_addr[64], lcl_addr[64], ikey_str[64], okey_str[64];
  2187. printf("%s: %s/ip", ptnl->name, ptnl->iph.protocol == IPPROTO_IPIP ? "ip" :
  2188. (ptnl->iph.protocol == IPPROTO_GRE ? "gre" :
  2189. (ptnl->iph.protocol == IPPROTO_IPV6 ? "ipv6" : "unknown")));
  2190. printf(" remote %s local %s ", ptnl->iph.daddr ?
  2191. inet_ntop(AF_INET, &ptnl->iph.daddr, rmt_addr, sizeof(rmt_addr)) : "any",
  2192. ptnl->iph.saddr ? inet_ntop(AF_INET, &ptnl->iph.saddr, lcl_addr,
  2193. sizeof(lcl_addr)) : "any");
  2194. if (ptnl->link) {
  2195. struct ifreq req;
  2196. int fd;
  2197. req.ifr_ifindex = ptnl->link;
  2198. fd = xsocket(AF_INET, SOCK_DGRAM, 0);
  2199. if (ioctl(fd, SIOCGIFNAME, &req) < 0) perror_msg("SIOCGIFNAME");
  2200. else printf(" dev %s ", req.ifr_name);
  2201. close(fd);
  2202. }
  2203. if (ptnl->iph.ttl) printf(" ttl %d ", ptnl->iph.ttl);
  2204. else printf(" ttl inherit ");
  2205. if (ptnl->iph.tos) {
  2206. printf(" tos");
  2207. if (ptnl->iph.tos & 1) printf(" inherit");
  2208. if (ptnl->iph.tos & ~1) printf("%c%s ", ptnl->iph.tos & 1 ? '/' : ' ',
  2209. namefromRPDB((ptnl->iph.tos & ~1), RPDB_rtdsfield));
  2210. }
  2211. if (!(ptnl->iph.frag_off & htons(IP_DF))) printf(" nopmtudisc");
  2212. inet_ntop(AF_INET, &ptnl->i_key, ikey_str, sizeof(ikey_str));
  2213. if ((ptnl->i_flags & GRE_KEY) && (ptnl->o_flags & GRE_KEY)
  2214. && ptnl->o_key == ptnl->i_key) printf(" key %s", ikey_str);
  2215. else if ((ptnl->i_flags | ptnl->o_flags) & GRE_KEY) {
  2216. inet_ntop(AF_INET, &ptnl->o_key, okey_str, sizeof(okey_str));
  2217. if (ptnl->i_flags & GRE_KEY) printf(" ikey %s ", ikey_str);
  2218. if (ptnl->o_flags & GRE_KEY) printf(" okey %s ", okey_str);
  2219. }
  2220. if (ptnl->i_flags & GRE_SEQ) printf("\n Drop packets out of sequence.\n");
  2221. if (ptnl->i_flags & GRE_CSUM)
  2222. printf("\n Checksum in received packet is required.");
  2223. if (ptnl->o_flags & GRE_SEQ) printf("\n Sequence packets on output.");
  2224. if (ptnl->o_flags & GRE_CSUM) printf("\n Checksum output packets.");
  2225. xputc('\n');
  2226. return 0;
  2227. }
  2228. static int read_tunnel(struct ip_tunnel_parm *ptnl)
  2229. {
  2230. int count = 0;
  2231. char iface[IF_NAMESIZE];
  2232. struct ip_tunnel_parm iptnl;
  2233. FILE *fp = xfopen("/proc/net/dev", "r");
  2234. while (fgets(toybuf, sizeof(toybuf), fp)) {
  2235. char *ptr;
  2236. int ret;
  2237. if (count++ < 2) continue; // 1st two lines are header.
  2238. ptr = strchr(toybuf, ':');
  2239. if (!ptr || (*ptr++ = 0, sscanf(toybuf, "%s", iface) != 1))
  2240. error_exit("invalid format of '/proc/net/dev'");
  2241. if (*ptnl->name && strcmp(ptnl->name, iface)) continue;
  2242. if ((ret = tnl_ioctl(iface, SIOCGIFHWADDR, &iptnl)) < 0) {
  2243. error_msg("failed to get type of '%s'", iface);
  2244. continue;
  2245. }
  2246. if (ret != ARPHRD_TUNNEL && ret != ARPHRD_SIT &&
  2247. ret != ARPHRD_IPGRE) continue;
  2248. memset(&iptnl, 0, sizeof(iptnl));
  2249. if (tnl_ioctl(iface, SIOCGETTUNNEL, &iptnl) < 0) continue;
  2250. if ((ptnl->link && iptnl.link != ptnl->link) || (*ptnl->name &&
  2251. strcmp(iptnl.name, ptnl->name)) || (ptnl->iph.daddr &&
  2252. iptnl.iph.daddr != ptnl->iph.daddr) || (ptnl->iph.saddr &&
  2253. iptnl.iph.saddr != ptnl->iph.saddr) || (ptnl->i_key &&
  2254. iptnl.i_key != ptnl->i_key)) continue;
  2255. display_tunnel(&iptnl);
  2256. }
  2257. fclose(fp);
  2258. return 0;
  2259. }
  2260. static void parse_iptunnel_args(struct ip_tunnel_parm *ptnl, char **argv,
  2261. int ipt_opt_idx)
  2262. {
  2263. int idx;
  2264. uint8_t af = AF_INET;
  2265. uint32_t addr = 0;
  2266. struct arglist opts[] = { {"mode", 0}, {"key", 1}, {"ikey", 2},
  2267. {"okey", 3}, {"seq", 4}, {"iseq", 5}, {"oseq", 6}, {"csum", 7},
  2268. {"icsum", 8}, {"ocsum", 9}, {"nopmtudisc", 10}, {"pmtudisc", 11},
  2269. {"remote", 12}, {"local", 13},{"dev", 14}, {"ttl", 15}, {"tos", 16},
  2270. {"dsfield", 17}, {"name", 18}, {NULL, -1}
  2271. };
  2272. ptnl->iph.version = 4; // The value indicates the version of IP (4 or 6)
  2273. ptnl->iph.ihl = 5; // Minimum Internet Header Length
  2274. // frag_off is measured in units of 8 octets (64 bits)
  2275. ptnl->iph.frag_off = htons(IP_DF);
  2276. if (*argv && ipt_opt_idx <= 2 && string_to_idx(*argv, opts) == -1) {
  2277. xstrncpy(ptnl->name, *argv, IF_NAMESIZE);
  2278. if (ipt_opt_idx == 1) {
  2279. struct ip_tunnel_parm iptnl_old;
  2280. memset(&iptnl_old, 0, sizeof(iptnl_old));
  2281. tnl_ioctl(ptnl->name, SIOCGETTUNNEL, &iptnl_old);
  2282. *ptnl = iptnl_old;
  2283. }
  2284. argv++;
  2285. }
  2286. for (; *argv; argv++, addr = 0) {
  2287. switch (idx = string_to_idx(*argv, opts)) {
  2288. case 0:
  2289. if (!*++argv) error_exit("mode is missing");
  2290. if ((!strcmp("ipip", *argv) || !strcmp("ip/ip", *argv)))
  2291. ptnl->iph.protocol = IPPROTO_IPIP;
  2292. else if ((!strcmp("gre", *argv) || !strcmp("gre/ip", *argv)))
  2293. ptnl->iph.protocol = IPPROTO_GRE;
  2294. else if ((!strcmp("sit", *argv) || !strcmp("ipv6/ip", *argv)))
  2295. ptnl->iph.protocol = IPPROTO_IPV6;
  2296. else show_iptunnel_help();
  2297. break;
  2298. case 1:
  2299. case 2:
  2300. case 3:
  2301. {
  2302. struct addrinfo *info, hint;
  2303. int ret;
  2304. if (!*++argv) error_exit("key value is missing");
  2305. memset(&hint, 0, sizeof(hint));
  2306. hint.ai_family = AF_INET;
  2307. ret = getaddrinfo(*argv, NULL, &hint, &info);
  2308. if (ret || !info) error_exit("invalid argument to key");
  2309. freeaddrinfo(info);
  2310. if (strchr(*argv, '.')) {
  2311. if (get_prefix(&addr, &af, *argv, AF_INET))
  2312. error_exit("invalid key '%s'", *argv);
  2313. } else {
  2314. unsigned key_val;
  2315. sscanf(*argv, "%u", &key_val);
  2316. addr = htonl(key_val);
  2317. }
  2318. if (idx == 1) {
  2319. ptnl->i_flags |= GRE_KEY;
  2320. ptnl->o_flags |= GRE_KEY;
  2321. ptnl->i_key = ptnl->o_key = addr;
  2322. } else if (idx == 2) {
  2323. ptnl->i_flags |= GRE_KEY;
  2324. ptnl->i_key = addr;
  2325. } else {
  2326. ptnl->o_flags |= GRE_KEY;
  2327. ptnl->o_key = addr;
  2328. }
  2329. }
  2330. break;
  2331. case 4:
  2332. ptnl->i_flags |= GRE_SEQ;
  2333. ptnl->o_flags |= GRE_SEQ;
  2334. break;
  2335. case 5:
  2336. ptnl->i_flags |= GRE_SEQ;
  2337. break;
  2338. case 6:
  2339. ptnl->o_flags |= GRE_SEQ;
  2340. break;
  2341. case 7:
  2342. ptnl->i_flags |= GRE_CSUM;
  2343. ptnl->o_flags |= GRE_CSUM;
  2344. break;
  2345. case 8:
  2346. ptnl->i_flags |= GRE_CSUM;
  2347. break;
  2348. case 9:
  2349. ptnl->o_flags |= GRE_CSUM;
  2350. break;
  2351. case 10:
  2352. ptnl->iph.frag_off = 0;
  2353. break;
  2354. case 11:
  2355. ptnl->iph.frag_off = htons(IP_DF);
  2356. break;
  2357. case 12:
  2358. case 13:
  2359. if (!*++argv) error_exit("remote/local address is missing");
  2360. if (get_prefix(&addr, &af, *argv, AF_INET))
  2361. error_exit("invalid remote/local address '%s'", *argv);
  2362. (idx == 12) ? (ptnl->iph.daddr = addr) : (ptnl->iph.saddr = addr);
  2363. break;
  2364. case 14:
  2365. if (!*++argv) error_exit("device name is missing");
  2366. else {
  2367. struct ifreq req;
  2368. int fd;
  2369. xstrncpy(req.ifr_name, *argv, IFNAMSIZ);
  2370. fd = xsocket(AF_INET, SOCK_DGRAM, 0);
  2371. xioctl(fd, SIOCGIFINDEX, &req);
  2372. close(fd);
  2373. ptnl->link = req.ifr_ifindex;
  2374. }
  2375. break;
  2376. case 15:
  2377. if (!*++argv) error_exit("ttl value is missing");
  2378. if (strcmp(*argv, "inherit"))
  2379. ptnl->iph.ttl = atolx_range(*argv, 0, 255);
  2380. break;
  2381. case 16:
  2382. case 17:
  2383. if (!*++argv) error_exit("tos value is missing");
  2384. if (strcmp(*argv, "inherit")) {
  2385. char *ptr;
  2386. unsigned long tval = strtoul(*argv, &ptr, 16);
  2387. if (tval > 255) error_exit("invalid tos value '%s'", *argv);
  2388. if (*ptr) {
  2389. int ret;
  2390. if ((ret = idxfromRPDB(*argv, RPDB_rtdsfield)) < 0)
  2391. error_exit("invalid tos value");
  2392. ptnl->iph.tos = ret;
  2393. } else ptnl->iph.tos = tval;
  2394. } else ptnl->iph.tos = 1;
  2395. break;
  2396. case 18:
  2397. if (*ptnl->name) error_exit("invalid tunnel");
  2398. else {
  2399. if (!*++argv) error_exit("name is missing");
  2400. xstrncpy(ptnl->name, *argv, IF_NAMESIZE);
  2401. }
  2402. break;
  2403. default:
  2404. if (*ptnl->name) error_exit("invalid tunnel");
  2405. xstrncpy(ptnl->name, *argv, IF_NAMESIZE);
  2406. break;
  2407. }
  2408. }
  2409. if (ptnl->iph.protocol == IPPROTO_IPIP ||
  2410. ptnl->iph.protocol == IPPROTO_IPV6) {
  2411. if ((ptnl->i_flags & GRE_KEY) || (ptnl->o_flags & GRE_KEY))
  2412. error_exit("[i|o]key is allowed with gre only");
  2413. if ((ptnl->i_flags & GRE_SEQ) || (ptnl->o_flags & GRE_SEQ))
  2414. error_exit("[i|o]seq is allowed with gre only");
  2415. if ((ptnl->i_flags & GRE_CSUM) || (ptnl->o_flags & GRE_CSUM))
  2416. error_exit("[i|o]csum is allowed with gre only");
  2417. }
  2418. if (!ptnl->i_key && IN_MULTICAST(ntohl(ptnl->iph.daddr))) {
  2419. ptnl->i_key = ptnl->iph.daddr;
  2420. ptnl->i_flags |= GRE_KEY;
  2421. }
  2422. if (!ptnl->o_key && IN_MULTICAST(ntohl(ptnl->iph.daddr))) {
  2423. ptnl->o_key = ptnl->iph.daddr;
  2424. ptnl->o_flags |= GRE_KEY;
  2425. }
  2426. if (IN_MULTICAST(ntohl(ptnl->iph.daddr)) && !ptnl->iph.saddr)
  2427. error_exit("broadcast tunnel requires a source address");
  2428. }
  2429. static int tunnellist(char **argv)
  2430. {
  2431. struct ip_tunnel_parm iptnl;
  2432. int ret = 0;
  2433. memset(&iptnl, 0, sizeof(iptnl));
  2434. parse_iptunnel_args(&iptnl, argv, 3);
  2435. if (iptnl.iph.protocol == IPPROTO_IPIP)
  2436. ret = tnl_ioctl(*iptnl.name ? iptnl.name : "tunl0", SIOCGETTUNNEL, &iptnl);
  2437. else if (iptnl.iph.protocol == IPPROTO_GRE)
  2438. ret = tnl_ioctl(*iptnl.name ? iptnl.name : "gre0", SIOCGETTUNNEL, &iptnl);
  2439. else if (iptnl.iph.protocol == IPPROTO_IPV6)
  2440. ret = tnl_ioctl(*iptnl.name ? iptnl.name : "sit0", SIOCGETTUNNEL, &iptnl);
  2441. else return read_tunnel(&iptnl);
  2442. if (ret < 0) {
  2443. perror_msg("SIOCGETTUNNEL");
  2444. return ret;
  2445. } else return display_tunnel(&iptnl);
  2446. }
  2447. // Performing add, change, & delete tunnel action, according to passed req_type
  2448. static int tunnelupdate(char **argv)
  2449. {
  2450. struct ip_tunnel_parm iptnl;
  2451. int idx = 2, rtype = SIOCDELTUNNEL;
  2452. if (*argv[-1] == 'a') {
  2453. idx = 0;
  2454. rtype = SIOCADDTUNNEL;
  2455. } else if (*argv[-1] == 'c') {
  2456. idx = 1;
  2457. rtype = SIOCCHGTUNNEL;
  2458. }
  2459. memset(&iptnl, 0, sizeof(iptnl));
  2460. parse_iptunnel_args(&iptnl, argv, idx);
  2461. if (idx != 2 && iptnl.iph.ttl && !(iptnl.iph.frag_off))
  2462. error_exit("ttl > 0 and nopmtudisc are incompatible");
  2463. if (iptnl.iph.protocol == IPPROTO_IPIP)
  2464. return (tnl_ioctl("tunl0", rtype, &iptnl) < 0) ? 1 : 0;
  2465. else if (iptnl.iph.protocol == IPPROTO_GRE)
  2466. return (tnl_ioctl("gre0", rtype, &iptnl) < 0) ? 1 : 0;
  2467. else if (iptnl.iph.protocol == IPPROTO_IPV6)
  2468. return (tnl_ioctl("sit0", rtype, &iptnl) < 0) ? 1 : 0;
  2469. else {
  2470. if (idx != 2) error_exit("invalid tunnel mode");
  2471. return (tnl_ioctl(iptnl.name, rtype, &iptnl) < 0) ? 1 : 0;
  2472. }
  2473. }
  2474. static int iptunnel(char **argv)
  2475. {
  2476. int idx;
  2477. struct arglist opts[] = {{"add", 0}, {"change", 0}, {"del", 0},
  2478. {"delete", 0}, {"show", 1}, {"list", 1}, {"lst", 1}, {NULL, -1}
  2479. };
  2480. cmdobj ipcmd, cmdobjlist[] = {tunnelupdate, tunnellist};
  2481. if (!*argv) idx = 1;
  2482. else if ((idx = substring_to_idx(*argv++, opts)) == -1)
  2483. show_iptunnel_help();
  2484. ipcmd = cmdobjlist[idx];
  2485. return ipcmd(argv);
  2486. }
  2487. // ===========================================================================
  2488. // Common code, which is used for all ip options.
  2489. // ===========================================================================
  2490. // Parse netlink messages and call input callback handler for action
  2491. static int filter_nlmesg(int (*fun)(struct nlmsghdr *mhdr, char **argv),
  2492. char **argv)
  2493. {
  2494. while (1) {
  2495. struct nlmsghdr *mhdr;
  2496. int msglen = recv(TT.sockfd, TT.gbuf, MESG_LEN, 0);
  2497. if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue;
  2498. else if (msglen < 0) {
  2499. error_msg("netlink receive error %s", strerror(errno));
  2500. return 1;
  2501. } else if (!msglen) {
  2502. error_msg("EOF on netlink");
  2503. return 1;
  2504. }
  2505. for (mhdr = (struct nlmsghdr*)TT.gbuf; NLMSG_OK(mhdr, msglen);
  2506. mhdr = NLMSG_NEXT(mhdr, msglen)) {
  2507. int err;
  2508. if (mhdr->nlmsg_pid != getpid())
  2509. continue;
  2510. switch (mhdr->nlmsg_type) {
  2511. case NLMSG_DONE:
  2512. return 0;
  2513. case NLMSG_ERROR:
  2514. {
  2515. struct nlmsgerr *merr = (struct nlmsgerr*)NLMSG_DATA(mhdr);
  2516. if (merr->error == 0) return 0;
  2517. if (mhdr->nlmsg_len < NLMSG_LENGTH(sizeof(struct nlmsgerr)))
  2518. error_msg("ERROR truncated");
  2519. else {
  2520. errno = -merr->error;
  2521. perror_msg("RTNETLINK answers");
  2522. }
  2523. return 1;
  2524. }
  2525. default:
  2526. if (fun && (err = fun(mhdr, argv))) return err;
  2527. break;
  2528. }
  2529. } // End of for loop.
  2530. } // End of while loop.
  2531. return 0;
  2532. }
  2533. void ip_main(void)
  2534. {
  2535. char **optargv = toys.argv;
  2536. int idx, isip = !(toys.which->name[2]); //1 -> if only ip
  2537. cmdobj ipcmd, cmdobjlist[] = {ipaddr, iplink, iproute, iprule, iptunnel};
  2538. for (++optargv; *optargv; ++optargv) {
  2539. char *ptr = *optargv;
  2540. struct arglist ip_options[] = {{"oneline", 0}, {"family", 1},
  2541. {"4", 1}, {"6", 1}, {"0", 1}, {"stats", 2}, {NULL, -1}};
  2542. if (*ptr != '-') break;
  2543. else if ((*(ptr+1) == '-') && (*(ptr+2))) ptr +=2;
  2544. //escape "--" and stop ip arg parsing.
  2545. else if ((*(ptr+1) == '-') && (!*(ptr+2))) {
  2546. *ptr +=1;
  2547. break;
  2548. } else ptr +=1;
  2549. switch (substring_to_idx(ptr, ip_options)) {
  2550. case 0: TT.singleline = 1;
  2551. break;
  2552. case 1: {
  2553. if (isdigit(*ptr)) {
  2554. long num = atolx(ptr);
  2555. if (num == 4) TT.addressfamily = AF_INET;
  2556. else if (num == 6) TT.addressfamily = AF_INET6;
  2557. else TT.addressfamily = AF_PACKET;
  2558. } else {
  2559. struct arglist ip_aflist[] = {{"inet", AF_INET},
  2560. {"inet6", AF_INET6}, {"link", AF_PACKET}, {NULL, -1}};
  2561. if (!*++optargv) help_exit(0);
  2562. if ((TT.addressfamily = string_to_idx(*optargv, ip_aflist)) == -1)
  2563. error_exit("wrong family '%s'", *optargv);
  2564. }
  2565. }
  2566. break;
  2567. case 2:
  2568. TT.stats++;
  2569. break;
  2570. default: help_exit(0);
  2571. break; // unreachable code.
  2572. }
  2573. }
  2574. TT.sockfd = xsocket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
  2575. if (isip) {// only for ip
  2576. if (*optargv) {
  2577. struct arglist ip_objectlist[] = { {"address", 0}, {"link", 1},
  2578. {"route", 2}, {"rule", 3}, {"tunnel", 4}, {"tunl", 4}, {NULL, -1}};
  2579. if ((idx = substring_to_idx(*optargv, ip_objectlist)) == -1) help_exit(0);
  2580. ipcmd = cmdobjlist[idx];
  2581. toys.exitval = ipcmd(++optargv);
  2582. } else help_exit(0);
  2583. } else {
  2584. struct arglist ip_objectlist[] = { {"ipaddr", 0}, {"iplink", 1},
  2585. {"iproute", 2}, {"iprule", 3}, {"iptunnel", 4}, {NULL, -1}};
  2586. if ((idx = string_to_idx(toys.which->name, ip_objectlist)) == -1)
  2587. help_exit(0);
  2588. ipcmd = cmdobjlist[idx];
  2589. toys.exitval = ipcmd(optargv);
  2590. }
  2591. xclose(TT.sockfd);
  2592. if (rtdsfield_init) free_alist(rt_dsfield);
  2593. if (rtrealms_init) free_alist(rt_realms);
  2594. if (rtscope_init) free_alist(rt_scope);
  2595. if (rttable_init) free_alist(rt_tables);
  2596. if (rtprotos_init) free_alist(rt_protos);
  2597. }