mirror of
https://git.proxmox.com/git/mirror_iproute2
synced 2025-10-13 03:59:43 +00:00

This is a bit pedantic, but brackets ([]) show optional values and since TYPE must not become empty, they're not suited to surround the type keyword choices. Use curly braces instead. Also add some missing whitespace to the parameter list above. Signed-off-by: Phil Sutter <phil@nwl.cc>
1874 lines
50 KiB
C
1874 lines
50 KiB
C
/*
|
|
* iproute.c "ip route".
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*
|
|
* Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <syslog.h>
|
|
#include <fcntl.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
#include <sys/time.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/ip.h>
|
|
#include <arpa/inet.h>
|
|
#include <linux/in_route.h>
|
|
#include <linux/icmpv6.h>
|
|
#include <errno.h>
|
|
|
|
#include "rt_names.h"
|
|
#include "utils.h"
|
|
#include "ip_common.h"
|
|
#include "iproute_lwtunnel.h"
|
|
|
|
#ifndef RTAX_RTTVAR
|
|
#define RTAX_RTTVAR RTAX_HOPS
|
|
#endif
|
|
|
|
enum list_action {
|
|
IPROUTE_LIST,
|
|
IPROUTE_FLUSH,
|
|
IPROUTE_SAVE,
|
|
};
|
|
static const char *mx_names[RTAX_MAX+1] = {
|
|
[RTAX_MTU] = "mtu",
|
|
[RTAX_WINDOW] = "window",
|
|
[RTAX_RTT] = "rtt",
|
|
[RTAX_RTTVAR] = "rttvar",
|
|
[RTAX_SSTHRESH] = "ssthresh",
|
|
[RTAX_CWND] = "cwnd",
|
|
[RTAX_ADVMSS] = "advmss",
|
|
[RTAX_REORDERING]="reordering",
|
|
[RTAX_HOPLIMIT] = "hoplimit",
|
|
[RTAX_INITCWND] = "initcwnd",
|
|
[RTAX_FEATURES] = "features",
|
|
[RTAX_RTO_MIN] = "rto_min",
|
|
[RTAX_INITRWND] = "initrwnd",
|
|
[RTAX_QUICKACK] = "quickack",
|
|
[RTAX_CC_ALGO] = "congctl",
|
|
};
|
|
static void usage(void) __attribute__((noreturn));
|
|
|
|
static void usage(void)
|
|
{
|
|
fprintf(stderr, "Usage: ip route { list | flush } SELECTOR\n");
|
|
fprintf(stderr, " ip route save SELECTOR\n");
|
|
fprintf(stderr, " ip route restore\n");
|
|
fprintf(stderr, " ip route showdump\n");
|
|
fprintf(stderr, " ip route get ADDRESS [ from ADDRESS iif STRING ]\n");
|
|
fprintf(stderr, " [ oif STRING ] [ tos TOS ]\n");
|
|
fprintf(stderr, " [ mark NUMBER ]\n");
|
|
fprintf(stderr, " ip route { add | del | change | append | replace } ROUTE\n");
|
|
fprintf(stderr, "SELECTOR := [ root PREFIX ] [ match PREFIX ] [ exact PREFIX ]\n");
|
|
fprintf(stderr, " [ table TABLE_ID ] [ proto RTPROTO ]\n");
|
|
fprintf(stderr, " [ type TYPE ] [ scope SCOPE ]\n");
|
|
fprintf(stderr, "ROUTE := NODE_SPEC [ INFO_SPEC ]\n");
|
|
fprintf(stderr, "NODE_SPEC := [ TYPE ] PREFIX [ tos TOS ]\n");
|
|
fprintf(stderr, " [ table TABLE_ID ] [ proto RTPROTO ]\n");
|
|
fprintf(stderr, " [ scope SCOPE ] [ metric METRIC ]\n");
|
|
fprintf(stderr, "INFO_SPEC := NH OPTIONS FLAGS [ nexthop NH ]...\n");
|
|
fprintf(stderr, "NH := [ encap ENCAPTYPE ENCAPHDR ] [ via [ FAMILY ] ADDRESS ]\n");
|
|
fprintf(stderr, " [ dev STRING ] [ weight NUMBER ] NHFLAGS\n");
|
|
fprintf(stderr, "FAMILY := [ inet | inet6 | ipx | dnet | mpls | bridge | link ]\n");
|
|
fprintf(stderr, "OPTIONS := FLAGS [ mtu NUMBER ] [ advmss NUMBER ] [ as [ to ] ADDRESS ]\n");
|
|
fprintf(stderr, " [ rtt TIME ] [ rttvar TIME ] [ reordering NUMBER ]\n");
|
|
fprintf(stderr, " [ window NUMBER ] [ cwnd NUMBER ] [ initcwnd NUMBER ]\n");
|
|
fprintf(stderr, " [ ssthresh NUMBER ] [ realms REALM ] [ src ADDRESS ]\n");
|
|
fprintf(stderr, " [ rto_min TIME ] [ hoplimit NUMBER ] [ initrwnd NUMBER ]\n");
|
|
fprintf(stderr, " [ features FEATURES ] [ quickack BOOL ] [ congctl NAME ]\n");
|
|
fprintf(stderr, " [ pref PREF ] [ expires TIME ]\n");
|
|
fprintf(stderr, "TYPE := { unicast | local | broadcast | multicast | throw |\n");
|
|
fprintf(stderr, " unreachable | prohibit | blackhole | nat }\n");
|
|
fprintf(stderr, "TABLE_ID := [ local | main | default | all | NUMBER ]\n");
|
|
fprintf(stderr, "SCOPE := [ host | link | global | NUMBER ]\n");
|
|
fprintf(stderr, "NHFLAGS := [ onlink | pervasive ]\n");
|
|
fprintf(stderr, "RTPROTO := [ kernel | boot | static | NUMBER ]\n");
|
|
fprintf(stderr, "PREF := [ low | medium | high ]\n");
|
|
fprintf(stderr, "TIME := NUMBER[s|ms]\n");
|
|
fprintf(stderr, "BOOL := [1|0]\n");
|
|
fprintf(stderr, "FEATURES := ecn\n");
|
|
fprintf(stderr, "ENCAPTYPE := [ mpls | ip | ip6 ]\n");
|
|
fprintf(stderr, "ENCAPHDR := [ MPLSLABEL ]\n");
|
|
exit(-1);
|
|
}
|
|
|
|
|
|
static struct
|
|
{
|
|
unsigned int tb;
|
|
int cloned;
|
|
int flushed;
|
|
char *flushb;
|
|
int flushp;
|
|
int flushe;
|
|
int protocol, protocolmask;
|
|
int scope, scopemask;
|
|
int type, typemask;
|
|
int tos, tosmask;
|
|
int iif, iifmask;
|
|
int oif, oifmask;
|
|
int mark, markmask;
|
|
int realm, realmmask;
|
|
inet_prefix rprefsrc;
|
|
inet_prefix rvia;
|
|
inet_prefix rdst;
|
|
inet_prefix mdst;
|
|
inet_prefix rsrc;
|
|
inet_prefix msrc;
|
|
} filter;
|
|
|
|
static int flush_update(void)
|
|
{
|
|
if (rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) {
|
|
perror("Failed to send flush request");
|
|
return -1;
|
|
}
|
|
filter.flushp = 0;
|
|
return 0;
|
|
}
|
|
|
|
static int filter_nlmsg(struct nlmsghdr *n, struct rtattr **tb, int host_len)
|
|
{
|
|
struct rtmsg *r = NLMSG_DATA(n);
|
|
inet_prefix dst;
|
|
inet_prefix src;
|
|
inet_prefix via;
|
|
inet_prefix prefsrc;
|
|
__u32 table;
|
|
static int ip6_multiple_tables;
|
|
|
|
table = rtm_get_table(r, tb);
|
|
|
|
if (preferred_family != AF_UNSPEC && r->rtm_family != preferred_family)
|
|
return 0;
|
|
|
|
if (r->rtm_family == AF_INET6 && table != RT_TABLE_MAIN)
|
|
ip6_multiple_tables = 1;
|
|
|
|
if (filter.cloned == !(r->rtm_flags&RTM_F_CLONED))
|
|
return 0;
|
|
|
|
if (r->rtm_family == AF_INET6 && !ip6_multiple_tables) {
|
|
if (filter.tb) {
|
|
if (filter.tb == RT_TABLE_LOCAL) {
|
|
if (r->rtm_type != RTN_LOCAL)
|
|
return 0;
|
|
} else if (filter.tb == RT_TABLE_MAIN) {
|
|
if (r->rtm_type == RTN_LOCAL)
|
|
return 0;
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
} else {
|
|
if (filter.tb > 0 && filter.tb != table)
|
|
return 0;
|
|
}
|
|
if ((filter.protocol^r->rtm_protocol)&filter.protocolmask)
|
|
return 0;
|
|
if ((filter.scope^r->rtm_scope)&filter.scopemask)
|
|
return 0;
|
|
if ((filter.type^r->rtm_type)&filter.typemask)
|
|
return 0;
|
|
if ((filter.tos^r->rtm_tos)&filter.tosmask)
|
|
return 0;
|
|
if (filter.rdst.family &&
|
|
(r->rtm_family != filter.rdst.family || filter.rdst.bitlen > r->rtm_dst_len))
|
|
return 0;
|
|
if (filter.mdst.family &&
|
|
(r->rtm_family != filter.mdst.family ||
|
|
(filter.mdst.bitlen >= 0 && filter.mdst.bitlen < r->rtm_dst_len)))
|
|
return 0;
|
|
if (filter.rsrc.family &&
|
|
(r->rtm_family != filter.rsrc.family || filter.rsrc.bitlen > r->rtm_src_len))
|
|
return 0;
|
|
if (filter.msrc.family &&
|
|
(r->rtm_family != filter.msrc.family ||
|
|
(filter.msrc.bitlen >= 0 && filter.msrc.bitlen < r->rtm_src_len)))
|
|
return 0;
|
|
if (filter.rvia.family) {
|
|
int family = r->rtm_family;
|
|
if (tb[RTA_VIA]) {
|
|
struct rtvia *via = RTA_DATA(tb[RTA_VIA]);
|
|
family = via->rtvia_family;
|
|
}
|
|
if (family != filter.rvia.family)
|
|
return 0;
|
|
}
|
|
if (filter.rprefsrc.family && r->rtm_family != filter.rprefsrc.family)
|
|
return 0;
|
|
|
|
memset(&dst, 0, sizeof(dst));
|
|
dst.family = r->rtm_family;
|
|
if (tb[RTA_DST])
|
|
memcpy(&dst.data, RTA_DATA(tb[RTA_DST]), (r->rtm_dst_len+7)/8);
|
|
if (filter.rsrc.family || filter.msrc.family) {
|
|
memset(&src, 0, sizeof(src));
|
|
src.family = r->rtm_family;
|
|
if (tb[RTA_SRC])
|
|
memcpy(&src.data, RTA_DATA(tb[RTA_SRC]), (r->rtm_src_len+7)/8);
|
|
}
|
|
if (filter.rvia.bitlen>0) {
|
|
memset(&via, 0, sizeof(via));
|
|
via.family = r->rtm_family;
|
|
if (tb[RTA_GATEWAY])
|
|
memcpy(&via.data, RTA_DATA(tb[RTA_GATEWAY]), host_len/8);
|
|
if (tb[RTA_VIA]) {
|
|
size_t len = RTA_PAYLOAD(tb[RTA_VIA]) - 2;
|
|
struct rtvia *rtvia = RTA_DATA(tb[RTA_VIA]);
|
|
via.family = rtvia->rtvia_family;
|
|
memcpy(&via.data, rtvia->rtvia_addr, len);
|
|
}
|
|
}
|
|
if (filter.rprefsrc.bitlen>0) {
|
|
memset(&prefsrc, 0, sizeof(prefsrc));
|
|
prefsrc.family = r->rtm_family;
|
|
if (tb[RTA_PREFSRC])
|
|
memcpy(&prefsrc.data, RTA_DATA(tb[RTA_PREFSRC]), host_len/8);
|
|
}
|
|
|
|
if (filter.rdst.family && inet_addr_match(&dst, &filter.rdst, filter.rdst.bitlen))
|
|
return 0;
|
|
if (filter.mdst.family && filter.mdst.bitlen >= 0 &&
|
|
inet_addr_match(&dst, &filter.mdst, r->rtm_dst_len))
|
|
return 0;
|
|
|
|
if (filter.rsrc.family && inet_addr_match(&src, &filter.rsrc, filter.rsrc.bitlen))
|
|
return 0;
|
|
if (filter.msrc.family && filter.msrc.bitlen >= 0 &&
|
|
inet_addr_match(&src, &filter.msrc, r->rtm_src_len))
|
|
return 0;
|
|
|
|
if (filter.rvia.family && inet_addr_match(&via, &filter.rvia, filter.rvia.bitlen))
|
|
return 0;
|
|
if (filter.rprefsrc.family && inet_addr_match(&prefsrc, &filter.rprefsrc, filter.rprefsrc.bitlen))
|
|
return 0;
|
|
if (filter.realmmask) {
|
|
__u32 realms = 0;
|
|
if (tb[RTA_FLOW])
|
|
realms = rta_getattr_u32(tb[RTA_FLOW]);
|
|
if ((realms^filter.realm)&filter.realmmask)
|
|
return 0;
|
|
}
|
|
if (filter.iifmask) {
|
|
int iif = 0;
|
|
if (tb[RTA_IIF])
|
|
iif = *(int*)RTA_DATA(tb[RTA_IIF]);
|
|
if ((iif^filter.iif)&filter.iifmask)
|
|
return 0;
|
|
}
|
|
if (filter.oifmask) {
|
|
int oif = 0;
|
|
if (tb[RTA_OIF])
|
|
oif = *(int*)RTA_DATA(tb[RTA_OIF]);
|
|
if ((oif^filter.oif)&filter.oifmask)
|
|
return 0;
|
|
}
|
|
if (filter.markmask) {
|
|
int mark = 0;
|
|
if (tb[RTA_MARK])
|
|
mark = *(int *)RTA_DATA(tb[RTA_MARK]);
|
|
if ((mark ^ filter.mark) & filter.markmask)
|
|
return 0;
|
|
}
|
|
if (filter.flushb &&
|
|
r->rtm_family == AF_INET6 &&
|
|
r->rtm_dst_len == 0 &&
|
|
r->rtm_type == RTN_UNREACHABLE &&
|
|
tb[RTA_PRIORITY] &&
|
|
*(int*)RTA_DATA(tb[RTA_PRIORITY]) == -1)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void print_rtax_features(FILE *fp, unsigned int features)
|
|
{
|
|
unsigned int of = features;
|
|
|
|
if (features & RTAX_FEATURE_ECN) {
|
|
fprintf(fp, " ecn");
|
|
features &= ~RTAX_FEATURE_ECN;
|
|
}
|
|
|
|
if (features)
|
|
fprintf(fp, " 0x%x", of);
|
|
}
|
|
|
|
int print_route(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg)
|
|
{
|
|
FILE *fp = (FILE*)arg;
|
|
struct rtmsg *r = NLMSG_DATA(n);
|
|
int len = n->nlmsg_len;
|
|
struct rtattr * tb[RTA_MAX+1];
|
|
char abuf[256];
|
|
int host_len;
|
|
__u32 table;
|
|
SPRINT_BUF(b1);
|
|
static int hz;
|
|
|
|
if (n->nlmsg_type != RTM_NEWROUTE && n->nlmsg_type != RTM_DELROUTE) {
|
|
fprintf(stderr, "Not a route: %08x %08x %08x\n",
|
|
n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
|
|
return 0;
|
|
}
|
|
if (filter.flushb && n->nlmsg_type != RTM_NEWROUTE)
|
|
return 0;
|
|
len -= NLMSG_LENGTH(sizeof(*r));
|
|
if (len < 0) {
|
|
fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
|
|
return -1;
|
|
}
|
|
|
|
host_len = af_bit_len(r->rtm_family);
|
|
|
|
parse_rtattr(tb, RTA_MAX, RTM_RTA(r), len);
|
|
table = rtm_get_table(r, tb);
|
|
|
|
if (!filter_nlmsg(n, tb, host_len))
|
|
return 0;
|
|
|
|
if (filter.flushb) {
|
|
struct nlmsghdr *fn;
|
|
if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
|
|
if (flush_update())
|
|
return -1;
|
|
}
|
|
fn = (struct nlmsghdr*)(filter.flushb + NLMSG_ALIGN(filter.flushp));
|
|
memcpy(fn, n, n->nlmsg_len);
|
|
fn->nlmsg_type = RTM_DELROUTE;
|
|
fn->nlmsg_flags = NLM_F_REQUEST;
|
|
fn->nlmsg_seq = ++rth.seq;
|
|
filter.flushp = (((char*)fn) + n->nlmsg_len) - filter.flushb;
|
|
filter.flushed++;
|
|
if (show_stats < 2)
|
|
return 0;
|
|
}
|
|
|
|
if (n->nlmsg_type == RTM_DELROUTE)
|
|
fprintf(fp, "Deleted ");
|
|
if ((r->rtm_type != RTN_UNICAST || show_details > 0) && !filter.type)
|
|
fprintf(fp, "%s ", rtnl_rtntype_n2a(r->rtm_type, b1, sizeof(b1)));
|
|
|
|
if (tb[RTA_DST]) {
|
|
if (r->rtm_dst_len != host_len) {
|
|
fprintf(fp, "%s/%u ", rt_addr_n2a(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_DST]),
|
|
RTA_DATA(tb[RTA_DST]),
|
|
abuf, sizeof(abuf)),
|
|
r->rtm_dst_len
|
|
);
|
|
} else {
|
|
fprintf(fp, "%s ", format_host(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_DST]),
|
|
RTA_DATA(tb[RTA_DST]),
|
|
abuf, sizeof(abuf))
|
|
);
|
|
}
|
|
} else if (r->rtm_dst_len) {
|
|
fprintf(fp, "0/%d ", r->rtm_dst_len);
|
|
} else {
|
|
fprintf(fp, "default ");
|
|
}
|
|
if (tb[RTA_SRC]) {
|
|
if (r->rtm_src_len != host_len) {
|
|
fprintf(fp, "from %s/%u ", rt_addr_n2a(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_SRC]),
|
|
RTA_DATA(tb[RTA_SRC]),
|
|
abuf, sizeof(abuf)),
|
|
r->rtm_src_len
|
|
);
|
|
} else {
|
|
fprintf(fp, "from %s ", format_host(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_SRC]),
|
|
RTA_DATA(tb[RTA_SRC]),
|
|
abuf, sizeof(abuf))
|
|
);
|
|
}
|
|
} else if (r->rtm_src_len) {
|
|
fprintf(fp, "from 0/%u ", r->rtm_src_len);
|
|
}
|
|
if (tb[RTA_NEWDST]) {
|
|
fprintf(fp, "as to %s ", format_host(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_NEWDST]),
|
|
RTA_DATA(tb[RTA_NEWDST]),
|
|
abuf, sizeof(abuf))
|
|
);
|
|
}
|
|
|
|
if (tb[RTA_ENCAP])
|
|
lwt_print_encap(fp, tb[RTA_ENCAP_TYPE], tb[RTA_ENCAP]);
|
|
|
|
if (r->rtm_tos && filter.tosmask != -1) {
|
|
SPRINT_BUF(b1);
|
|
fprintf(fp, "tos %s ", rtnl_dsfield_n2a(r->rtm_tos, b1, sizeof(b1)));
|
|
}
|
|
|
|
if (tb[RTA_GATEWAY] && filter.rvia.bitlen != host_len) {
|
|
fprintf(fp, "via %s ",
|
|
format_host(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_GATEWAY]),
|
|
RTA_DATA(tb[RTA_GATEWAY]),
|
|
abuf, sizeof(abuf)));
|
|
}
|
|
if (tb[RTA_VIA]) {
|
|
size_t len = RTA_PAYLOAD(tb[RTA_VIA]) - 2;
|
|
struct rtvia *via = RTA_DATA(tb[RTA_VIA]);
|
|
fprintf(fp, "via %s %s ",
|
|
family_name(via->rtvia_family),
|
|
format_host(via->rtvia_family, len, via->rtvia_addr,
|
|
abuf, sizeof(abuf)));
|
|
}
|
|
if (tb[RTA_OIF] && filter.oifmask != -1)
|
|
fprintf(fp, "dev %s ", ll_index_to_name(*(int*)RTA_DATA(tb[RTA_OIF])));
|
|
|
|
if (table && (table != RT_TABLE_MAIN || show_details > 0) && !filter.tb)
|
|
fprintf(fp, " table %s ", rtnl_rttable_n2a(table, b1, sizeof(b1)));
|
|
if (!(r->rtm_flags&RTM_F_CLONED)) {
|
|
if ((r->rtm_protocol != RTPROT_BOOT || show_details > 0) && filter.protocolmask != -1)
|
|
fprintf(fp, " proto %s ", rtnl_rtprot_n2a(r->rtm_protocol, b1, sizeof(b1)));
|
|
if ((r->rtm_scope != RT_SCOPE_UNIVERSE || show_details > 0) && filter.scopemask != -1)
|
|
fprintf(fp, " scope %s ", rtnl_rtscope_n2a(r->rtm_scope, b1, sizeof(b1)));
|
|
}
|
|
if (tb[RTA_PREFSRC] && filter.rprefsrc.bitlen != host_len) {
|
|
/* Do not use format_host(). It is our local addr
|
|
and symbolic name will not be useful.
|
|
*/
|
|
fprintf(fp, " src %s ",
|
|
rt_addr_n2a(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_PREFSRC]),
|
|
RTA_DATA(tb[RTA_PREFSRC]),
|
|
abuf, sizeof(abuf)));
|
|
}
|
|
if (tb[RTA_PRIORITY])
|
|
fprintf(fp, " metric %u ", rta_getattr_u32(tb[RTA_PRIORITY]));
|
|
if (r->rtm_flags & RTNH_F_DEAD)
|
|
fprintf(fp, "dead ");
|
|
if (r->rtm_flags & RTNH_F_ONLINK)
|
|
fprintf(fp, "onlink ");
|
|
if (r->rtm_flags & RTNH_F_PERVASIVE)
|
|
fprintf(fp, "pervasive ");
|
|
if (r->rtm_flags & RTNH_F_OFFLOAD)
|
|
fprintf(fp, "offload ");
|
|
if (r->rtm_flags & RTM_F_NOTIFY)
|
|
fprintf(fp, "notify ");
|
|
if (r->rtm_flags & RTNH_F_LINKDOWN)
|
|
fprintf(fp, "linkdown ");
|
|
if (tb[RTA_MARK]) {
|
|
unsigned int mark = *(unsigned int*)RTA_DATA(tb[RTA_MARK]);
|
|
if (mark) {
|
|
if (mark >= 16)
|
|
fprintf(fp, " mark 0x%x", mark);
|
|
else
|
|
fprintf(fp, " mark %u", mark);
|
|
}
|
|
}
|
|
|
|
if (tb[RTA_FLOW] && filter.realmmask != ~0U) {
|
|
__u32 to = rta_getattr_u32(tb[RTA_FLOW]);
|
|
__u32 from = to>>16;
|
|
to &= 0xFFFF;
|
|
fprintf(fp, "realm%s ", from ? "s" : "");
|
|
if (from) {
|
|
fprintf(fp, "%s/",
|
|
rtnl_rtrealm_n2a(from, b1, sizeof(b1)));
|
|
}
|
|
fprintf(fp, "%s ",
|
|
rtnl_rtrealm_n2a(to, b1, sizeof(b1)));
|
|
}
|
|
if ((r->rtm_flags&RTM_F_CLONED) && r->rtm_family == AF_INET) {
|
|
__u32 flags = r->rtm_flags&~0xFFFF;
|
|
int first = 1;
|
|
|
|
fprintf(fp, "%s cache ", _SL_);
|
|
|
|
#define PRTFL(fl,flname) if (flags&RTCF_##fl) { \
|
|
flags &= ~RTCF_##fl; \
|
|
fprintf(fp, "%s" flname "%s", first ? "<" : "", flags ? "," : "> "); \
|
|
first = 0; }
|
|
PRTFL(LOCAL, "local");
|
|
PRTFL(REJECT, "reject");
|
|
PRTFL(MULTICAST, "mc");
|
|
PRTFL(BROADCAST, "brd");
|
|
PRTFL(DNAT, "dst-nat");
|
|
PRTFL(SNAT, "src-nat");
|
|
PRTFL(MASQ, "masq");
|
|
PRTFL(DIRECTDST, "dst-direct");
|
|
PRTFL(DIRECTSRC, "src-direct");
|
|
PRTFL(REDIRECTED, "redirected");
|
|
PRTFL(DOREDIRECT, "redirect");
|
|
PRTFL(FAST, "fastroute");
|
|
PRTFL(NOTIFY, "notify");
|
|
PRTFL(TPROXY, "proxy");
|
|
|
|
if (flags)
|
|
fprintf(fp, "%s%x> ", first ? "<" : "", flags);
|
|
if (tb[RTA_CACHEINFO]) {
|
|
struct rta_cacheinfo *ci = RTA_DATA(tb[RTA_CACHEINFO]);
|
|
if (!hz)
|
|
hz = get_user_hz();
|
|
if (ci->rta_expires != 0)
|
|
fprintf(fp, " expires %dsec", ci->rta_expires/hz);
|
|
if (ci->rta_error != 0)
|
|
fprintf(fp, " error %d", ci->rta_error);
|
|
if (show_stats) {
|
|
if (ci->rta_clntref)
|
|
fprintf(fp, " users %d", ci->rta_clntref);
|
|
if (ci->rta_used != 0)
|
|
fprintf(fp, " used %d", ci->rta_used);
|
|
if (ci->rta_lastuse != 0)
|
|
fprintf(fp, " age %dsec", ci->rta_lastuse/hz);
|
|
}
|
|
if (ci->rta_id)
|
|
fprintf(fp, " ipid 0x%04x", ci->rta_id);
|
|
if (ci->rta_ts || ci->rta_tsage)
|
|
fprintf(fp, " ts 0x%x tsage %dsec",
|
|
ci->rta_ts, ci->rta_tsage);
|
|
}
|
|
} else if (r->rtm_family == AF_INET6) {
|
|
struct rta_cacheinfo *ci = NULL;
|
|
if (tb[RTA_CACHEINFO])
|
|
ci = RTA_DATA(tb[RTA_CACHEINFO]);
|
|
if ((r->rtm_flags & RTM_F_CLONED) || (ci && ci->rta_expires)) {
|
|
if (!hz)
|
|
hz = get_user_hz();
|
|
if (r->rtm_flags & RTM_F_CLONED)
|
|
fprintf(fp, "%s cache ", _SL_);
|
|
if (ci->rta_expires)
|
|
fprintf(fp, " expires %dsec", ci->rta_expires/hz);
|
|
if (ci->rta_error != 0)
|
|
fprintf(fp, " error %d", ci->rta_error);
|
|
if (show_stats) {
|
|
if (ci->rta_clntref)
|
|
fprintf(fp, " users %d", ci->rta_clntref);
|
|
if (ci->rta_used != 0)
|
|
fprintf(fp, " used %d", ci->rta_used);
|
|
if (ci->rta_lastuse != 0)
|
|
fprintf(fp, " age %dsec", ci->rta_lastuse/hz);
|
|
}
|
|
} else if (ci) {
|
|
if (ci->rta_error != 0)
|
|
fprintf(fp, " error %d", ci->rta_error);
|
|
}
|
|
}
|
|
if (tb[RTA_METRICS]) {
|
|
int i;
|
|
unsigned mxlock = 0;
|
|
struct rtattr *mxrta[RTAX_MAX+1];
|
|
|
|
parse_rtattr(mxrta, RTAX_MAX, RTA_DATA(tb[RTA_METRICS]),
|
|
RTA_PAYLOAD(tb[RTA_METRICS]));
|
|
if (mxrta[RTAX_LOCK])
|
|
mxlock = *(unsigned*)RTA_DATA(mxrta[RTAX_LOCK]);
|
|
|
|
for (i=2; i<= RTAX_MAX; i++) {
|
|
__u32 val = 0U;
|
|
|
|
if (mxrta[i] == NULL)
|
|
continue;
|
|
|
|
if (i != RTAX_CC_ALGO)
|
|
val = rta_getattr_u32(mxrta[i]);
|
|
|
|
if (i == RTAX_HOPLIMIT && (int)val == -1)
|
|
continue;
|
|
|
|
if (i < sizeof(mx_names)/sizeof(char*) && mx_names[i])
|
|
fprintf(fp, " %s", mx_names[i]);
|
|
else
|
|
fprintf(fp, " metric %d", i);
|
|
|
|
if (mxlock & (1<<i))
|
|
fprintf(fp, " lock");
|
|
|
|
switch (i) {
|
|
case RTAX_FEATURES:
|
|
print_rtax_features(fp, val);
|
|
break;
|
|
default:
|
|
fprintf(fp, " %u", val);
|
|
break;
|
|
|
|
case RTAX_RTT:
|
|
case RTAX_RTTVAR:
|
|
case RTAX_RTO_MIN:
|
|
if (i == RTAX_RTT)
|
|
val /= 8;
|
|
else if (i == RTAX_RTTVAR)
|
|
val /= 4;
|
|
|
|
if (val >= 1000)
|
|
fprintf(fp, " %gs", val/1e3);
|
|
else
|
|
fprintf(fp, " %ums", val);
|
|
break;
|
|
case RTAX_CC_ALGO:
|
|
fprintf(fp, " %s", rta_getattr_str(mxrta[i]));
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (tb[RTA_IIF] && filter.iifmask != -1) {
|
|
fprintf(fp, " iif %s", ll_index_to_name(*(int*)RTA_DATA(tb[RTA_IIF])));
|
|
}
|
|
if (tb[RTA_MULTIPATH]) {
|
|
struct rtnexthop *nh = RTA_DATA(tb[RTA_MULTIPATH]);
|
|
int first = 0;
|
|
|
|
len = RTA_PAYLOAD(tb[RTA_MULTIPATH]);
|
|
|
|
for (;;) {
|
|
if (len < sizeof(*nh))
|
|
break;
|
|
if (nh->rtnh_len > len)
|
|
break;
|
|
if (r->rtm_flags&RTM_F_CLONED && r->rtm_type == RTN_MULTICAST) {
|
|
if (first)
|
|
fprintf(fp, " Oifs:");
|
|
else
|
|
fprintf(fp, " ");
|
|
} else
|
|
fprintf(fp, "%s\tnexthop", _SL_);
|
|
if (nh->rtnh_len > sizeof(*nh)) {
|
|
parse_rtattr(tb, RTA_MAX, RTNH_DATA(nh), nh->rtnh_len - sizeof(*nh));
|
|
|
|
if (tb[RTA_ENCAP])
|
|
lwt_print_encap(fp,
|
|
tb[RTA_ENCAP_TYPE],
|
|
tb[RTA_ENCAP]);
|
|
if (tb[RTA_NEWDST]) {
|
|
fprintf(fp, " as to %s ",
|
|
format_host(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_NEWDST]),
|
|
RTA_DATA(tb[RTA_NEWDST]),
|
|
abuf, sizeof(abuf)));
|
|
}
|
|
if (tb[RTA_GATEWAY]) {
|
|
fprintf(fp, " via %s ",
|
|
format_host(r->rtm_family,
|
|
RTA_PAYLOAD(tb[RTA_GATEWAY]),
|
|
RTA_DATA(tb[RTA_GATEWAY]),
|
|
abuf, sizeof(abuf)));
|
|
}
|
|
if (tb[RTA_VIA]) {
|
|
size_t len = RTA_PAYLOAD(tb[RTA_VIA]) - 2;
|
|
struct rtvia *via = RTA_DATA(tb[RTA_VIA]);
|
|
fprintf(fp, "via %s %s ",
|
|
family_name(via->rtvia_family),
|
|
format_host(via->rtvia_family, len, via->rtvia_addr,
|
|
abuf, sizeof(abuf)));
|
|
}
|
|
if (tb[RTA_FLOW]) {
|
|
__u32 to = rta_getattr_u32(tb[RTA_FLOW]);
|
|
__u32 from = to>>16;
|
|
to &= 0xFFFF;
|
|
fprintf(fp, " realm%s ", from ? "s" : "");
|
|
if (from) {
|
|
fprintf(fp, "%s/",
|
|
rtnl_rtrealm_n2a(from, b1, sizeof(b1)));
|
|
}
|
|
fprintf(fp, "%s",
|
|
rtnl_rtrealm_n2a(to, b1, sizeof(b1)));
|
|
}
|
|
}
|
|
if (r->rtm_flags&RTM_F_CLONED && r->rtm_type == RTN_MULTICAST) {
|
|
fprintf(fp, " %s", ll_index_to_name(nh->rtnh_ifindex));
|
|
if (nh->rtnh_hops != 1)
|
|
fprintf(fp, "(ttl>%d)", nh->rtnh_hops);
|
|
} else {
|
|
fprintf(fp, " dev %s", ll_index_to_name(nh->rtnh_ifindex));
|
|
if (r->rtm_family != AF_MPLS)
|
|
fprintf(fp, " weight %d",
|
|
nh->rtnh_hops+1);
|
|
}
|
|
if (nh->rtnh_flags & RTNH_F_DEAD)
|
|
fprintf(fp, " dead");
|
|
if (nh->rtnh_flags & RTNH_F_ONLINK)
|
|
fprintf(fp, " onlink");
|
|
if (nh->rtnh_flags & RTNH_F_PERVASIVE)
|
|
fprintf(fp, " pervasive");
|
|
if (nh->rtnh_flags & RTNH_F_LINKDOWN)
|
|
fprintf(fp, " linkdown");
|
|
len -= NLMSG_ALIGN(nh->rtnh_len);
|
|
nh = RTNH_NEXT(nh);
|
|
}
|
|
}
|
|
if (tb[RTA_PREF]) {
|
|
unsigned int pref = rta_getattr_u8(tb[RTA_PREF]);
|
|
fprintf(fp, " pref ");
|
|
|
|
switch (pref) {
|
|
case ICMPV6_ROUTER_PREF_LOW:
|
|
fprintf(fp, "low");
|
|
break;
|
|
case ICMPV6_ROUTER_PREF_MEDIUM:
|
|
fprintf(fp, "medium");
|
|
break;
|
|
case ICMPV6_ROUTER_PREF_HIGH:
|
|
fprintf(fp, "high");
|
|
break;
|
|
default:
|
|
fprintf(fp, "%u", pref);
|
|
}
|
|
}
|
|
fprintf(fp, "\n");
|
|
fflush(fp);
|
|
return 0;
|
|
}
|
|
|
|
static int parse_one_nh(struct nlmsghdr *n, struct rtmsg *r,
|
|
struct rtattr *rta, struct rtnexthop *rtnh,
|
|
int *argcp, char ***argvp)
|
|
{
|
|
int argc = *argcp;
|
|
char **argv = *argvp;
|
|
|
|
while (++argv, --argc > 0) {
|
|
if (strcmp(*argv, "via") == 0) {
|
|
inet_prefix addr;
|
|
int family;
|
|
NEXT_ARG();
|
|
family = read_family(*argv);
|
|
if (family == AF_UNSPEC)
|
|
family = r->rtm_family;
|
|
else
|
|
NEXT_ARG();
|
|
get_addr(&addr, *argv, family);
|
|
if (r->rtm_family == AF_UNSPEC)
|
|
r->rtm_family = addr.family;
|
|
if (addr.family == r->rtm_family) {
|
|
rta_addattr_l(rta, 4096, RTA_GATEWAY, &addr.data, addr.bytelen);
|
|
rtnh->rtnh_len += sizeof(struct rtattr) + addr.bytelen;
|
|
} else {
|
|
rta_addattr_l(rta, 4096, RTA_VIA, &addr.family, addr.bytelen+2);
|
|
rtnh->rtnh_len += RTA_SPACE(addr.bytelen+2);
|
|
}
|
|
} else if (strcmp(*argv, "dev") == 0) {
|
|
NEXT_ARG();
|
|
if ((rtnh->rtnh_ifindex = ll_name_to_index(*argv)) == 0) {
|
|
fprintf(stderr, "Cannot find device \"%s\"\n", *argv);
|
|
exit(1);
|
|
}
|
|
} else if (strcmp(*argv, "weight") == 0) {
|
|
unsigned w;
|
|
NEXT_ARG();
|
|
if (get_unsigned(&w, *argv, 0) || w == 0 || w > 256)
|
|
invarg("\"weight\" is invalid\n", *argv);
|
|
rtnh->rtnh_hops = w - 1;
|
|
} else if (strcmp(*argv, "onlink") == 0) {
|
|
rtnh->rtnh_flags |= RTNH_F_ONLINK;
|
|
} else if (matches(*argv, "realms") == 0) {
|
|
__u32 realm;
|
|
NEXT_ARG();
|
|
if (get_rt_realms_or_raw(&realm, *argv))
|
|
invarg("\"realm\" value is invalid\n", *argv);
|
|
rta_addattr32(rta, 4096, RTA_FLOW, realm);
|
|
rtnh->rtnh_len += sizeof(struct rtattr) + 4;
|
|
} else if (strcmp(*argv, "encap") == 0) {
|
|
int len = rta->rta_len;
|
|
|
|
lwt_parse_encap(rta, 4096, &argc, &argv);
|
|
rtnh->rtnh_len += rta->rta_len - len;
|
|
} else if (strcmp(*argv, "as") == 0) {
|
|
inet_prefix addr;
|
|
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "to") == 0)
|
|
NEXT_ARG();
|
|
get_addr(&addr, *argv, r->rtm_family);
|
|
rta_addattr_l(rta, 4096, RTA_NEWDST, &addr.data,
|
|
addr.bytelen);
|
|
rtnh->rtnh_len += sizeof(struct rtattr) + addr.bytelen;
|
|
} else
|
|
break;
|
|
}
|
|
*argcp = argc;
|
|
*argvp = argv;
|
|
return 0;
|
|
}
|
|
|
|
static int parse_nexthops(struct nlmsghdr *n, struct rtmsg *r,
|
|
int argc, char **argv)
|
|
{
|
|
char buf[1024];
|
|
struct rtattr *rta = (void*)buf;
|
|
struct rtnexthop *rtnh;
|
|
|
|
rta->rta_type = RTA_MULTIPATH;
|
|
rta->rta_len = RTA_LENGTH(0);
|
|
rtnh = RTA_DATA(rta);
|
|
|
|
while (argc > 0) {
|
|
if (strcmp(*argv, "nexthop") != 0) {
|
|
fprintf(stderr, "Error: \"nexthop\" or end of line is expected instead of \"%s\"\n", *argv);
|
|
exit(-1);
|
|
}
|
|
if (argc <= 1) {
|
|
fprintf(stderr, "Error: unexpected end of line after \"nexthop\"\n");
|
|
exit(-1);
|
|
}
|
|
memset(rtnh, 0, sizeof(*rtnh));
|
|
rtnh->rtnh_len = sizeof(*rtnh);
|
|
rta->rta_len += rtnh->rtnh_len;
|
|
parse_one_nh(n, r, rta, rtnh, &argc, &argv);
|
|
rtnh = RTNH_NEXT(rtnh);
|
|
}
|
|
|
|
if (rta->rta_len > RTA_LENGTH(0))
|
|
addattr_l(n, 1024, RTA_MULTIPATH, RTA_DATA(rta), RTA_PAYLOAD(rta));
|
|
return 0;
|
|
}
|
|
|
|
static int iproute_modify(int cmd, unsigned flags, int argc, char **argv)
|
|
{
|
|
struct {
|
|
struct nlmsghdr n;
|
|
struct rtmsg r;
|
|
char buf[1024];
|
|
} req;
|
|
char mxbuf[256];
|
|
struct rtattr * mxrta = (void*)mxbuf;
|
|
unsigned mxlock = 0;
|
|
char *d = NULL;
|
|
int gw_ok = 0;
|
|
int dst_ok = 0;
|
|
int nhs_ok = 0;
|
|
int scope_ok = 0;
|
|
int table_ok = 0;
|
|
int raw = 0;
|
|
int type_ok = 0;
|
|
static int hz;
|
|
|
|
memset(&req, 0, sizeof(req));
|
|
|
|
req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
|
|
req.n.nlmsg_flags = NLM_F_REQUEST|flags;
|
|
req.n.nlmsg_type = cmd;
|
|
req.r.rtm_family = preferred_family;
|
|
req.r.rtm_table = RT_TABLE_MAIN;
|
|
req.r.rtm_scope = RT_SCOPE_NOWHERE;
|
|
|
|
if (cmd != RTM_DELROUTE) {
|
|
req.r.rtm_protocol = RTPROT_BOOT;
|
|
req.r.rtm_scope = RT_SCOPE_UNIVERSE;
|
|
req.r.rtm_type = RTN_UNICAST;
|
|
}
|
|
|
|
mxrta->rta_type = RTA_METRICS;
|
|
mxrta->rta_len = RTA_LENGTH(0);
|
|
|
|
while (argc > 0) {
|
|
if (strcmp(*argv, "src") == 0) {
|
|
inet_prefix addr;
|
|
NEXT_ARG();
|
|
get_addr(&addr, *argv, req.r.rtm_family);
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = addr.family;
|
|
addattr_l(&req.n, sizeof(req), RTA_PREFSRC, &addr.data, addr.bytelen);
|
|
} else if (strcmp(*argv, "as") == 0) {
|
|
inet_prefix addr;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "to") == 0) {
|
|
NEXT_ARG();
|
|
}
|
|
get_addr(&addr, *argv, req.r.rtm_family);
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = addr.family;
|
|
addattr_l(&req.n, sizeof(req), RTA_NEWDST, &addr.data, addr.bytelen);
|
|
} else if (strcmp(*argv, "via") == 0) {
|
|
inet_prefix addr;
|
|
int family;
|
|
gw_ok = 1;
|
|
NEXT_ARG();
|
|
family = read_family(*argv);
|
|
if (family == AF_UNSPEC)
|
|
family = req.r.rtm_family;
|
|
else
|
|
NEXT_ARG();
|
|
get_addr(&addr, *argv, family);
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = addr.family;
|
|
if (addr.family == req.r.rtm_family)
|
|
addattr_l(&req.n, sizeof(req), RTA_GATEWAY,
|
|
&addr.data, addr.bytelen);
|
|
else
|
|
addattr_l(&req.n, sizeof(req), RTA_VIA,
|
|
&addr.family, addr.bytelen+2);
|
|
} else if (strcmp(*argv, "from") == 0) {
|
|
inet_prefix addr;
|
|
NEXT_ARG();
|
|
get_prefix(&addr, *argv, req.r.rtm_family);
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = addr.family;
|
|
if (addr.bytelen)
|
|
addattr_l(&req.n, sizeof(req), RTA_SRC, &addr.data, addr.bytelen);
|
|
req.r.rtm_src_len = addr.bitlen;
|
|
} else if (strcmp(*argv, "tos") == 0 ||
|
|
matches(*argv, "dsfield") == 0) {
|
|
__u32 tos;
|
|
NEXT_ARG();
|
|
if (rtnl_dsfield_a2n(&tos, *argv))
|
|
invarg("\"tos\" value is invalid\n", *argv);
|
|
req.r.rtm_tos = tos;
|
|
} else if (strcmp(*argv, "expires") == 0 ) {
|
|
__u32 expires;
|
|
NEXT_ARG();
|
|
if (get_u32(&expires, *argv, 0))
|
|
invarg("\"expires\" value is invalid\n", *argv);
|
|
if (!hz)
|
|
hz = get_user_hz();
|
|
addattr32(&req.n, sizeof(req), RTA_EXPIRES, expires*hz);
|
|
} else if (matches(*argv, "metric") == 0 ||
|
|
matches(*argv, "priority") == 0 ||
|
|
strcmp(*argv, "preference") == 0) {
|
|
__u32 metric;
|
|
NEXT_ARG();
|
|
if (get_u32(&metric, *argv, 0))
|
|
invarg("\"metric\" value is invalid\n", *argv);
|
|
addattr32(&req.n, sizeof(req), RTA_PRIORITY, metric);
|
|
} else if (strcmp(*argv, "scope") == 0) {
|
|
__u32 scope = 0;
|
|
NEXT_ARG();
|
|
if (rtnl_rtscope_a2n(&scope, *argv))
|
|
invarg("invalid \"scope\" value\n", *argv);
|
|
req.r.rtm_scope = scope;
|
|
scope_ok = 1;
|
|
} else if (strcmp(*argv, "mtu") == 0) {
|
|
unsigned mtu;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_MTU);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&mtu, *argv, 0))
|
|
invarg("\"mtu\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_MTU, mtu);
|
|
} else if (strcmp(*argv, "hoplimit") == 0) {
|
|
unsigned hoplimit;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_HOPLIMIT);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&hoplimit, *argv, 0) || hoplimit > 255)
|
|
invarg("\"hoplimit\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_HOPLIMIT, hoplimit);
|
|
} else if (strcmp(*argv, "advmss") == 0) {
|
|
unsigned mss;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_ADVMSS);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&mss, *argv, 0))
|
|
invarg("\"mss\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_ADVMSS, mss);
|
|
} else if (matches(*argv, "reordering") == 0) {
|
|
unsigned reord;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_REORDERING);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&reord, *argv, 0))
|
|
invarg("\"reordering\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_REORDERING, reord);
|
|
} else if (strcmp(*argv, "rtt") == 0) {
|
|
unsigned rtt;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_RTT);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_time_rtt(&rtt, *argv, &raw))
|
|
invarg("\"rtt\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_RTT,
|
|
(raw) ? rtt : rtt * 8);
|
|
} else if (strcmp(*argv, "rto_min") == 0) {
|
|
unsigned rto_min;
|
|
NEXT_ARG();
|
|
mxlock |= (1<<RTAX_RTO_MIN);
|
|
if (get_time_rtt(&rto_min, *argv, &raw))
|
|
invarg("\"rto_min\" value is invalid\n",
|
|
*argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_RTO_MIN,
|
|
rto_min);
|
|
} else if (matches(*argv, "window") == 0) {
|
|
unsigned win;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_WINDOW);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&win, *argv, 0))
|
|
invarg("\"window\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_WINDOW, win);
|
|
} else if (matches(*argv, "cwnd") == 0) {
|
|
unsigned win;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_CWND);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&win, *argv, 0))
|
|
invarg("\"cwnd\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_CWND, win);
|
|
} else if (matches(*argv, "initcwnd") == 0) {
|
|
unsigned win;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_INITCWND);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&win, *argv, 0))
|
|
invarg("\"initcwnd\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_INITCWND, win);
|
|
} else if (matches(*argv, "initrwnd") == 0) {
|
|
unsigned win;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_INITRWND);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&win, *argv, 0))
|
|
invarg("\"initrwnd\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_INITRWND, win);
|
|
} else if (matches(*argv, "features") == 0) {
|
|
unsigned int features = 0;
|
|
|
|
while (argc > 0) {
|
|
NEXT_ARG();
|
|
|
|
if (strcmp(*argv, "ecn") == 0)
|
|
features |= RTAX_FEATURE_ECN;
|
|
else
|
|
invarg("\"features\" value not valid\n", *argv);
|
|
break;
|
|
}
|
|
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_FEATURES, features);
|
|
} else if (matches(*argv, "quickack") == 0) {
|
|
unsigned quickack;
|
|
NEXT_ARG();
|
|
if (get_unsigned(&quickack, *argv, 0))
|
|
invarg("\"quickack\" value is invalid\n", *argv);
|
|
if (quickack != 1 && quickack != 0)
|
|
invarg("\"quickack\" value should be 0 or 1\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_QUICKACK, quickack);
|
|
} else if (matches(*argv, "congctl") == 0) {
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= 1 << RTAX_CC_ALGO;
|
|
NEXT_ARG();
|
|
}
|
|
rta_addattr_l(mxrta, sizeof(mxbuf), RTAX_CC_ALGO, *argv,
|
|
strlen(*argv));
|
|
} else if (matches(*argv, "rttvar") == 0) {
|
|
unsigned win;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_RTTVAR);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_time_rtt(&win, *argv, &raw))
|
|
invarg("\"rttvar\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_RTTVAR,
|
|
(raw) ? win : win * 4);
|
|
} else if (matches(*argv, "ssthresh") == 0) {
|
|
unsigned win;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "lock") == 0) {
|
|
mxlock |= (1<<RTAX_SSTHRESH);
|
|
NEXT_ARG();
|
|
}
|
|
if (get_unsigned(&win, *argv, 0))
|
|
invarg("\"ssthresh\" value is invalid\n", *argv);
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_SSTHRESH, win);
|
|
} else if (matches(*argv, "realms") == 0) {
|
|
__u32 realm;
|
|
NEXT_ARG();
|
|
if (get_rt_realms_or_raw(&realm, *argv))
|
|
invarg("\"realm\" value is invalid\n", *argv);
|
|
addattr32(&req.n, sizeof(req), RTA_FLOW, realm);
|
|
} else if (strcmp(*argv, "onlink") == 0) {
|
|
req.r.rtm_flags |= RTNH_F_ONLINK;
|
|
} else if (strcmp(*argv, "nexthop") == 0) {
|
|
nhs_ok = 1;
|
|
break;
|
|
} else if (matches(*argv, "protocol") == 0) {
|
|
__u32 prot;
|
|
NEXT_ARG();
|
|
if (rtnl_rtprot_a2n(&prot, *argv))
|
|
invarg("\"protocol\" value is invalid\n", *argv);
|
|
req.r.rtm_protocol = prot;
|
|
} else if (matches(*argv, "table") == 0) {
|
|
__u32 tid;
|
|
NEXT_ARG();
|
|
if (rtnl_rttable_a2n(&tid, *argv))
|
|
invarg("\"table\" value is invalid\n", *argv);
|
|
if (tid < 256)
|
|
req.r.rtm_table = tid;
|
|
else {
|
|
req.r.rtm_table = RT_TABLE_UNSPEC;
|
|
addattr32(&req.n, sizeof(req), RTA_TABLE, tid);
|
|
}
|
|
table_ok = 1;
|
|
} else if (strcmp(*argv, "dev") == 0 ||
|
|
strcmp(*argv, "oif") == 0) {
|
|
NEXT_ARG();
|
|
d = *argv;
|
|
} else if (matches(*argv, "pref") == 0) {
|
|
__u8 pref;
|
|
NEXT_ARG();
|
|
if (strcmp(*argv, "low") == 0)
|
|
pref = ICMPV6_ROUTER_PREF_LOW;
|
|
else if (strcmp(*argv, "medium") == 0)
|
|
pref = ICMPV6_ROUTER_PREF_MEDIUM;
|
|
else if (strcmp(*argv, "high") == 0)
|
|
pref = ICMPV6_ROUTER_PREF_HIGH;
|
|
else if (get_u8(&pref, *argv, 0))
|
|
invarg("\"pref\" value is invalid\n", *argv);
|
|
addattr8(&req.n, sizeof(req), RTA_PREF, pref);
|
|
} else if (strcmp(*argv, "encap") == 0) {
|
|
char buf[1024];
|
|
struct rtattr *rta = (void*)buf;
|
|
|
|
rta->rta_type = RTA_ENCAP;
|
|
rta->rta_len = RTA_LENGTH(0);
|
|
|
|
lwt_parse_encap(rta, sizeof(buf), &argc, &argv);
|
|
|
|
if (rta->rta_len > RTA_LENGTH(0))
|
|
addraw_l(&req.n, 1024, RTA_DATA(rta), RTA_PAYLOAD(rta));
|
|
} else {
|
|
int type;
|
|
inet_prefix dst;
|
|
|
|
if (strcmp(*argv, "to") == 0) {
|
|
NEXT_ARG();
|
|
}
|
|
if ((**argv < '0' || **argv > '9') &&
|
|
rtnl_rtntype_a2n(&type, *argv) == 0) {
|
|
NEXT_ARG();
|
|
req.r.rtm_type = type;
|
|
type_ok = 1;
|
|
}
|
|
|
|
if (matches(*argv, "help") == 0)
|
|
usage();
|
|
if (dst_ok)
|
|
duparg2("to", *argv);
|
|
get_prefix(&dst, *argv, req.r.rtm_family);
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = dst.family;
|
|
req.r.rtm_dst_len = dst.bitlen;
|
|
dst_ok = 1;
|
|
if (dst.bytelen)
|
|
addattr_l(&req.n, sizeof(req), RTA_DST, &dst.data, dst.bytelen);
|
|
}
|
|
argc--; argv++;
|
|
}
|
|
|
|
if (!dst_ok)
|
|
usage();
|
|
|
|
if (d || nhs_ok) {
|
|
int idx;
|
|
|
|
if (d) {
|
|
if ((idx = ll_name_to_index(d)) == 0) {
|
|
fprintf(stderr, "Cannot find device \"%s\"\n", d);
|
|
return -1;
|
|
}
|
|
addattr32(&req.n, sizeof(req), RTA_OIF, idx);
|
|
}
|
|
}
|
|
|
|
if (mxrta->rta_len > RTA_LENGTH(0)) {
|
|
if (mxlock)
|
|
rta_addattr32(mxrta, sizeof(mxbuf), RTAX_LOCK, mxlock);
|
|
addattr_l(&req.n, sizeof(req), RTA_METRICS, RTA_DATA(mxrta), RTA_PAYLOAD(mxrta));
|
|
}
|
|
|
|
if (nhs_ok)
|
|
parse_nexthops(&req.n, &req.r, argc, argv);
|
|
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = AF_INET;
|
|
|
|
if (!table_ok) {
|
|
if (req.r.rtm_type == RTN_LOCAL ||
|
|
req.r.rtm_type == RTN_BROADCAST ||
|
|
req.r.rtm_type == RTN_NAT ||
|
|
req.r.rtm_type == RTN_ANYCAST)
|
|
req.r.rtm_table = RT_TABLE_LOCAL;
|
|
}
|
|
if (!scope_ok) {
|
|
if (req.r.rtm_family == AF_INET6 ||
|
|
req.r.rtm_family == AF_MPLS)
|
|
req.r.rtm_scope = RT_SCOPE_UNIVERSE;
|
|
else if (req.r.rtm_type == RTN_LOCAL ||
|
|
req.r.rtm_type == RTN_NAT)
|
|
req.r.rtm_scope = RT_SCOPE_HOST;
|
|
else if (req.r.rtm_type == RTN_BROADCAST ||
|
|
req.r.rtm_type == RTN_MULTICAST ||
|
|
req.r.rtm_type == RTN_ANYCAST)
|
|
req.r.rtm_scope = RT_SCOPE_LINK;
|
|
else if (req.r.rtm_type == RTN_UNICAST ||
|
|
req.r.rtm_type == RTN_UNSPEC) {
|
|
if (cmd == RTM_DELROUTE)
|
|
req.r.rtm_scope = RT_SCOPE_NOWHERE;
|
|
else if (!gw_ok && !nhs_ok)
|
|
req.r.rtm_scope = RT_SCOPE_LINK;
|
|
}
|
|
}
|
|
|
|
if (!type_ok && req.r.rtm_family == AF_MPLS)
|
|
req.r.rtm_type = RTN_UNICAST;
|
|
|
|
if (rtnl_talk(&rth, &req.n, NULL, 0) < 0)
|
|
return -2;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int rtnl_rtcache_request(struct rtnl_handle *rth, int family)
|
|
{
|
|
struct {
|
|
struct nlmsghdr nlh;
|
|
struct rtmsg rtm;
|
|
} req;
|
|
struct sockaddr_nl nladdr;
|
|
|
|
memset(&nladdr, 0, sizeof(nladdr));
|
|
memset(&req, 0, sizeof(req));
|
|
nladdr.nl_family = AF_NETLINK;
|
|
|
|
req.nlh.nlmsg_len = sizeof(req);
|
|
req.nlh.nlmsg_type = RTM_GETROUTE;
|
|
req.nlh.nlmsg_flags = NLM_F_ROOT|NLM_F_REQUEST;
|
|
req.nlh.nlmsg_pid = 0;
|
|
req.nlh.nlmsg_seq = rth->dump = ++rth->seq;
|
|
req.rtm.rtm_family = family;
|
|
req.rtm.rtm_flags |= RTM_F_CLONED;
|
|
|
|
return sendto(rth->fd, (void*)&req, sizeof(req), 0, (struct sockaddr*)&nladdr, sizeof(nladdr));
|
|
}
|
|
|
|
static int iproute_flush_cache(void)
|
|
{
|
|
#define ROUTE_FLUSH_PATH "/proc/sys/net/ipv4/route/flush"
|
|
|
|
int len;
|
|
int flush_fd = open (ROUTE_FLUSH_PATH, O_WRONLY);
|
|
char *buffer = "-1";
|
|
|
|
if (flush_fd < 0) {
|
|
fprintf (stderr, "Cannot open \"%s\": %s\n",
|
|
ROUTE_FLUSH_PATH, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
len = strlen (buffer);
|
|
|
|
if ((write (flush_fd, (void *)buffer, len)) < len) {
|
|
fprintf (stderr, "Cannot flush routing cache\n");
|
|
close(flush_fd);
|
|
return -1;
|
|
}
|
|
close(flush_fd);
|
|
return 0;
|
|
}
|
|
|
|
static __u32 route_dump_magic = 0x45311224;
|
|
|
|
static int save_route(const struct sockaddr_nl *who, struct nlmsghdr *n,
|
|
void *arg)
|
|
{
|
|
int ret;
|
|
int len = n->nlmsg_len;
|
|
struct rtmsg *r = NLMSG_DATA(n);
|
|
struct rtattr *tb[RTA_MAX+1];
|
|
int host_len;
|
|
|
|
host_len = af_bit_len(r->rtm_family);
|
|
len -= NLMSG_LENGTH(sizeof(*r));
|
|
parse_rtattr(tb, RTA_MAX, RTM_RTA(r), len);
|
|
|
|
if (!filter_nlmsg(n, tb, host_len))
|
|
return 0;
|
|
|
|
ret = write(STDOUT_FILENO, n, n->nlmsg_len);
|
|
if ((ret > 0) && (ret != n->nlmsg_len)) {
|
|
fprintf(stderr, "Short write while saving nlmsg\n");
|
|
ret = -EIO;
|
|
}
|
|
|
|
return ret == n->nlmsg_len ? 0 : ret;
|
|
}
|
|
|
|
static int save_route_prep(void)
|
|
{
|
|
int ret;
|
|
|
|
if (isatty(STDOUT_FILENO)) {
|
|
fprintf(stderr, "Not sending a binary stream to stdout\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = write(STDOUT_FILENO, &route_dump_magic, sizeof(route_dump_magic));
|
|
if (ret != sizeof(route_dump_magic)) {
|
|
fprintf(stderr, "Can't write magic to dump file\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int iproute_list_flush_or_save(int argc, char **argv, int action)
|
|
{
|
|
int do_ipv6 = preferred_family;
|
|
char *id = NULL;
|
|
char *od = NULL;
|
|
unsigned int mark = 0;
|
|
rtnl_filter_t filter_fn;
|
|
|
|
if (action == IPROUTE_SAVE) {
|
|
if (save_route_prep())
|
|
return -1;
|
|
|
|
filter_fn = save_route;
|
|
} else
|
|
filter_fn = print_route;
|
|
|
|
iproute_reset_filter(0);
|
|
filter.tb = RT_TABLE_MAIN;
|
|
|
|
if ((action == IPROUTE_FLUSH) && argc <= 0) {
|
|
fprintf(stderr, "\"ip route flush\" requires arguments.\n");
|
|
return -1;
|
|
}
|
|
|
|
while (argc > 0) {
|
|
if (matches(*argv, "table") == 0) {
|
|
__u32 tid;
|
|
NEXT_ARG();
|
|
if (rtnl_rttable_a2n(&tid, *argv)) {
|
|
if (strcmp(*argv, "all") == 0) {
|
|
filter.tb = 0;
|
|
} else if (strcmp(*argv, "cache") == 0) {
|
|
filter.cloned = 1;
|
|
} else if (strcmp(*argv, "help") == 0) {
|
|
usage();
|
|
} else {
|
|
invarg("table id value is invalid\n", *argv);
|
|
}
|
|
} else
|
|
filter.tb = tid;
|
|
} else if (matches(*argv, "cached") == 0 ||
|
|
matches(*argv, "cloned") == 0) {
|
|
filter.cloned = 1;
|
|
} else if (strcmp(*argv, "tos") == 0 ||
|
|
matches(*argv, "dsfield") == 0) {
|
|
__u32 tos;
|
|
NEXT_ARG();
|
|
if (rtnl_dsfield_a2n(&tos, *argv))
|
|
invarg("TOS value is invalid\n", *argv);
|
|
filter.tos = tos;
|
|
filter.tosmask = -1;
|
|
} else if (matches(*argv, "protocol") == 0) {
|
|
__u32 prot = 0;
|
|
NEXT_ARG();
|
|
filter.protocolmask = -1;
|
|
if (rtnl_rtprot_a2n(&prot, *argv)) {
|
|
if (strcmp(*argv, "all") != 0)
|
|
invarg("invalid \"protocol\"\n", *argv);
|
|
prot = 0;
|
|
filter.protocolmask = 0;
|
|
}
|
|
filter.protocol = prot;
|
|
} else if (matches(*argv, "scope") == 0) {
|
|
__u32 scope = 0;
|
|
NEXT_ARG();
|
|
filter.scopemask = -1;
|
|
if (rtnl_rtscope_a2n(&scope, *argv)) {
|
|
if (strcmp(*argv, "all") != 0)
|
|
invarg("invalid \"scope\"\n", *argv);
|
|
scope = RT_SCOPE_NOWHERE;
|
|
filter.scopemask = 0;
|
|
}
|
|
filter.scope = scope;
|
|
} else if (matches(*argv, "type") == 0) {
|
|
int type;
|
|
NEXT_ARG();
|
|
filter.typemask = -1;
|
|
if (rtnl_rtntype_a2n(&type, *argv))
|
|
invarg("node type value is invalid\n", *argv);
|
|
filter.type = type;
|
|
} else if (strcmp(*argv, "dev") == 0 ||
|
|
strcmp(*argv, "oif") == 0) {
|
|
NEXT_ARG();
|
|
od = *argv;
|
|
} else if (strcmp(*argv, "iif") == 0) {
|
|
NEXT_ARG();
|
|
id = *argv;
|
|
} else if (strcmp(*argv, "mark") == 0) {
|
|
NEXT_ARG();
|
|
get_unsigned(&mark, *argv, 0);
|
|
filter.markmask = -1;
|
|
} else if (strcmp(*argv, "via") == 0) {
|
|
int family;
|
|
NEXT_ARG();
|
|
family = read_family(*argv);
|
|
if (family == AF_UNSPEC)
|
|
family = do_ipv6;
|
|
else
|
|
NEXT_ARG();
|
|
get_prefix(&filter.rvia, *argv, family);
|
|
} else if (strcmp(*argv, "src") == 0) {
|
|
NEXT_ARG();
|
|
get_prefix(&filter.rprefsrc, *argv, do_ipv6);
|
|
} else if (matches(*argv, "realms") == 0) {
|
|
__u32 realm;
|
|
NEXT_ARG();
|
|
if (get_rt_realms_or_raw(&realm, *argv))
|
|
invarg("invalid realms\n", *argv);
|
|
filter.realm = realm;
|
|
filter.realmmask = ~0U;
|
|
if ((filter.realm&0xFFFF) == 0 &&
|
|
(*argv)[strlen(*argv) - 1] == '/')
|
|
filter.realmmask &= ~0xFFFF;
|
|
if ((filter.realm&0xFFFF0000U) == 0 &&
|
|
(strchr(*argv, '/') == NULL ||
|
|
(*argv)[0] == '/'))
|
|
filter.realmmask &= ~0xFFFF0000U;
|
|
} else if (matches(*argv, "from") == 0) {
|
|
NEXT_ARG();
|
|
if (matches(*argv, "root") == 0) {
|
|
NEXT_ARG();
|
|
get_prefix(&filter.rsrc, *argv, do_ipv6);
|
|
} else if (matches(*argv, "match") == 0) {
|
|
NEXT_ARG();
|
|
get_prefix(&filter.msrc, *argv, do_ipv6);
|
|
} else {
|
|
if (matches(*argv, "exact") == 0) {
|
|
NEXT_ARG();
|
|
}
|
|
get_prefix(&filter.msrc, *argv, do_ipv6);
|
|
filter.rsrc = filter.msrc;
|
|
}
|
|
} else {
|
|
if (matches(*argv, "to") == 0) {
|
|
NEXT_ARG();
|
|
}
|
|
if (matches(*argv, "root") == 0) {
|
|
NEXT_ARG();
|
|
get_prefix(&filter.rdst, *argv, do_ipv6);
|
|
} else if (matches(*argv, "match") == 0) {
|
|
NEXT_ARG();
|
|
get_prefix(&filter.mdst, *argv, do_ipv6);
|
|
} else {
|
|
if (matches(*argv, "exact") == 0) {
|
|
NEXT_ARG();
|
|
}
|
|
get_prefix(&filter.mdst, *argv, do_ipv6);
|
|
filter.rdst = filter.mdst;
|
|
}
|
|
}
|
|
argc--; argv++;
|
|
}
|
|
|
|
if (do_ipv6 == AF_UNSPEC && filter.tb)
|
|
do_ipv6 = AF_INET;
|
|
|
|
if (id || od) {
|
|
int idx;
|
|
|
|
if (id) {
|
|
if ((idx = ll_name_to_index(id)) == 0) {
|
|
fprintf(stderr, "Cannot find device \"%s\"\n", id);
|
|
return -1;
|
|
}
|
|
filter.iif = idx;
|
|
filter.iifmask = -1;
|
|
}
|
|
if (od) {
|
|
if ((idx = ll_name_to_index(od)) == 0) {
|
|
fprintf(stderr, "Cannot find device \"%s\"\n", od);
|
|
return -1;
|
|
}
|
|
filter.oif = idx;
|
|
filter.oifmask = -1;
|
|
}
|
|
}
|
|
filter.mark = mark;
|
|
|
|
if (action == IPROUTE_FLUSH) {
|
|
int round = 0;
|
|
char flushb[4096-512];
|
|
time_t start = time(0);
|
|
|
|
if (filter.cloned) {
|
|
if (do_ipv6 != AF_INET6) {
|
|
iproute_flush_cache();
|
|
if (show_stats)
|
|
printf("*** IPv4 routing cache is flushed.\n");
|
|
}
|
|
if (do_ipv6 == AF_INET)
|
|
return 0;
|
|
}
|
|
|
|
filter.flushb = flushb;
|
|
filter.flushp = 0;
|
|
filter.flushe = sizeof(flushb);
|
|
|
|
for (;;) {
|
|
if (rtnl_wilddump_request(&rth, do_ipv6, RTM_GETROUTE) < 0) {
|
|
perror("Cannot send dump request");
|
|
exit(1);
|
|
}
|
|
filter.flushed = 0;
|
|
if (rtnl_dump_filter(&rth, filter_fn, stdout) < 0) {
|
|
fprintf(stderr, "Flush terminated\n");
|
|
exit(1);
|
|
}
|
|
if (filter.flushed == 0) {
|
|
if (show_stats) {
|
|
if (round == 0 && (!filter.cloned || do_ipv6 == AF_INET6))
|
|
printf("Nothing to flush.\n");
|
|
else
|
|
printf("*** Flush is complete after %d round%s ***\n", round, round>1?"s":"");
|
|
}
|
|
fflush(stdout);
|
|
return 0;
|
|
}
|
|
round++;
|
|
if (flush_update() < 0)
|
|
exit(1);
|
|
|
|
if (time(0) - start > 30) {
|
|
printf("\n*** Flush not completed after %ld seconds, %d entries remain ***\n",
|
|
(long)(time(0) - start), filter.flushed);
|
|
exit(1);
|
|
}
|
|
|
|
if (show_stats) {
|
|
printf("\n*** Round %d, deleting %d entries ***\n", round, filter.flushed);
|
|
fflush(stdout);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!filter.cloned) {
|
|
if (rtnl_wilddump_request(&rth, do_ipv6, RTM_GETROUTE) < 0) {
|
|
perror("Cannot send dump request");
|
|
exit(1);
|
|
}
|
|
} else {
|
|
if (rtnl_rtcache_request(&rth, do_ipv6) < 0) {
|
|
perror("Cannot send dump request");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
if (rtnl_dump_filter(&rth, filter_fn, stdout) < 0) {
|
|
fprintf(stderr, "Dump terminated\n");
|
|
exit(1);
|
|
}
|
|
|
|
exit(0);
|
|
}
|
|
|
|
|
|
static int iproute_get(int argc, char **argv)
|
|
{
|
|
struct {
|
|
struct nlmsghdr n;
|
|
struct rtmsg r;
|
|
char buf[1024];
|
|
} req;
|
|
char *idev = NULL;
|
|
char *odev = NULL;
|
|
int connected = 0;
|
|
int from_ok = 0;
|
|
unsigned int mark = 0;
|
|
|
|
memset(&req, 0, sizeof(req));
|
|
|
|
iproute_reset_filter(0);
|
|
filter.cloned = 2;
|
|
|
|
req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
|
|
req.n.nlmsg_flags = NLM_F_REQUEST;
|
|
req.n.nlmsg_type = RTM_GETROUTE;
|
|
req.r.rtm_family = preferred_family;
|
|
req.r.rtm_table = 0;
|
|
req.r.rtm_protocol = 0;
|
|
req.r.rtm_scope = 0;
|
|
req.r.rtm_type = 0;
|
|
req.r.rtm_src_len = 0;
|
|
req.r.rtm_dst_len = 0;
|
|
req.r.rtm_tos = 0;
|
|
|
|
while (argc > 0) {
|
|
if (strcmp(*argv, "tos") == 0 ||
|
|
matches(*argv, "dsfield") == 0) {
|
|
__u32 tos;
|
|
NEXT_ARG();
|
|
if (rtnl_dsfield_a2n(&tos, *argv))
|
|
invarg("TOS value is invalid\n", *argv);
|
|
req.r.rtm_tos = tos;
|
|
} else if (matches(*argv, "from") == 0) {
|
|
inet_prefix addr;
|
|
NEXT_ARG();
|
|
if (matches(*argv, "help") == 0)
|
|
usage();
|
|
from_ok = 1;
|
|
get_prefix(&addr, *argv, req.r.rtm_family);
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = addr.family;
|
|
if (addr.bytelen)
|
|
addattr_l(&req.n, sizeof(req), RTA_SRC, &addr.data, addr.bytelen);
|
|
req.r.rtm_src_len = addr.bitlen;
|
|
} else if (matches(*argv, "iif") == 0) {
|
|
NEXT_ARG();
|
|
idev = *argv;
|
|
} else if (matches(*argv, "mark") == 0) {
|
|
NEXT_ARG();
|
|
get_unsigned(&mark, *argv, 0);
|
|
} else if (matches(*argv, "oif") == 0 ||
|
|
strcmp(*argv, "dev") == 0) {
|
|
NEXT_ARG();
|
|
odev = *argv;
|
|
} else if (matches(*argv, "notify") == 0) {
|
|
req.r.rtm_flags |= RTM_F_NOTIFY;
|
|
} else if (matches(*argv, "connected") == 0) {
|
|
connected = 1;
|
|
} else {
|
|
inet_prefix addr;
|
|
if (strcmp(*argv, "to") == 0) {
|
|
NEXT_ARG();
|
|
}
|
|
if (matches(*argv, "help") == 0)
|
|
usage();
|
|
get_prefix(&addr, *argv, req.r.rtm_family);
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = addr.family;
|
|
if (addr.bytelen)
|
|
addattr_l(&req.n, sizeof(req), RTA_DST, &addr.data, addr.bytelen);
|
|
req.r.rtm_dst_len = addr.bitlen;
|
|
}
|
|
argc--; argv++;
|
|
}
|
|
|
|
if (req.r.rtm_dst_len == 0) {
|
|
fprintf(stderr, "need at least a destination address\n");
|
|
exit(1);
|
|
}
|
|
|
|
if (idev || odev) {
|
|
int idx;
|
|
|
|
if (idev) {
|
|
if ((idx = ll_name_to_index(idev)) == 0) {
|
|
fprintf(stderr, "Cannot find device \"%s\"\n", idev);
|
|
return -1;
|
|
}
|
|
addattr32(&req.n, sizeof(req), RTA_IIF, idx);
|
|
}
|
|
if (odev) {
|
|
if ((idx = ll_name_to_index(odev)) == 0) {
|
|
fprintf(stderr, "Cannot find device \"%s\"\n", odev);
|
|
return -1;
|
|
}
|
|
addattr32(&req.n, sizeof(req), RTA_OIF, idx);
|
|
}
|
|
}
|
|
if (mark)
|
|
addattr32(&req.n, sizeof(req), RTA_MARK, mark);
|
|
|
|
if (req.r.rtm_family == AF_UNSPEC)
|
|
req.r.rtm_family = AF_INET;
|
|
|
|
req.r.rtm_flags |= RTM_F_LOOKUP_TABLE;
|
|
|
|
if (rtnl_talk(&rth, &req.n, &req.n, sizeof(req)) < 0)
|
|
return -2;
|
|
|
|
if (connected && !from_ok) {
|
|
struct rtmsg *r = NLMSG_DATA(&req.n);
|
|
int len = req.n.nlmsg_len;
|
|
struct rtattr * tb[RTA_MAX+1];
|
|
|
|
if (print_route(NULL, &req.n, (void*)stdout) < 0) {
|
|
fprintf(stderr, "An error :-)\n");
|
|
exit(1);
|
|
}
|
|
|
|
if (req.n.nlmsg_type != RTM_NEWROUTE) {
|
|
fprintf(stderr, "Not a route?\n");
|
|
return -1;
|
|
}
|
|
len -= NLMSG_LENGTH(sizeof(*r));
|
|
if (len < 0) {
|
|
fprintf(stderr, "Wrong len %d\n", len);
|
|
return -1;
|
|
}
|
|
|
|
parse_rtattr(tb, RTA_MAX, RTM_RTA(r), len);
|
|
|
|
if (tb[RTA_PREFSRC]) {
|
|
tb[RTA_PREFSRC]->rta_type = RTA_SRC;
|
|
r->rtm_src_len = 8*RTA_PAYLOAD(tb[RTA_PREFSRC]);
|
|
} else if (!tb[RTA_SRC]) {
|
|
fprintf(stderr, "Failed to connect the route\n");
|
|
return -1;
|
|
}
|
|
if (!odev && tb[RTA_OIF])
|
|
tb[RTA_OIF]->rta_type = 0;
|
|
if (tb[RTA_GATEWAY])
|
|
tb[RTA_GATEWAY]->rta_type = 0;
|
|
if (tb[RTA_VIA])
|
|
tb[RTA_VIA]->rta_type = 0;
|
|
if (!idev && tb[RTA_IIF])
|
|
tb[RTA_IIF]->rta_type = 0;
|
|
req.n.nlmsg_flags = NLM_F_REQUEST;
|
|
req.n.nlmsg_type = RTM_GETROUTE;
|
|
|
|
if (rtnl_talk(&rth, &req.n, &req.n, sizeof(req)) < 0)
|
|
return -2;
|
|
}
|
|
|
|
if (print_route(NULL, &req.n, (void*)stdout) < 0) {
|
|
fprintf(stderr, "An error :-)\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int restore_handler(const struct sockaddr_nl *nl,
|
|
struct rtnl_ctrl_data *ctrl,
|
|
struct nlmsghdr *n, void *arg)
|
|
{
|
|
int ret;
|
|
|
|
n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
|
|
|
|
ll_init_map(&rth);
|
|
|
|
ret = rtnl_talk(&rth, n, n, sizeof(*n));
|
|
if ((ret < 0) && (errno == EEXIST))
|
|
ret = 0;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int route_dump_check_magic(void)
|
|
{
|
|
int ret;
|
|
__u32 magic = 0;
|
|
|
|
if (isatty(STDIN_FILENO)) {
|
|
fprintf(stderr, "Can't restore route dump from a terminal\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = fread(&magic, sizeof(magic), 1, stdin);
|
|
if (magic != route_dump_magic) {
|
|
fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int iproute_restore(void)
|
|
{
|
|
if (route_dump_check_magic())
|
|
exit(-1);
|
|
|
|
exit(rtnl_from_file(stdin, &restore_handler, NULL));
|
|
}
|
|
|
|
static int show_handler(const struct sockaddr_nl *nl,
|
|
struct rtnl_ctrl_data *ctrl,
|
|
struct nlmsghdr *n, void *arg)
|
|
{
|
|
print_route(nl, n, stdout);
|
|
return 0;
|
|
}
|
|
|
|
static int iproute_showdump(void)
|
|
{
|
|
if (route_dump_check_magic())
|
|
exit(-1);
|
|
|
|
exit(rtnl_from_file(stdin, &show_handler, NULL));
|
|
}
|
|
|
|
void iproute_reset_filter(int ifindex)
|
|
{
|
|
memset(&filter, 0, sizeof(filter));
|
|
filter.mdst.bitlen = -1;
|
|
filter.msrc.bitlen = -1;
|
|
filter.oif = ifindex;
|
|
if (filter.oif > 0)
|
|
filter.oifmask = -1;
|
|
}
|
|
|
|
int do_iproute(int argc, char **argv)
|
|
{
|
|
if (argc < 1)
|
|
return iproute_list_flush_or_save(0, NULL, IPROUTE_LIST);
|
|
|
|
if (matches(*argv, "add") == 0)
|
|
return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE|NLM_F_EXCL,
|
|
argc-1, argv+1);
|
|
if (matches(*argv, "change") == 0 || strcmp(*argv, "chg") == 0)
|
|
return iproute_modify(RTM_NEWROUTE, NLM_F_REPLACE,
|
|
argc-1, argv+1);
|
|
if (matches(*argv, "replace") == 0)
|
|
return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE|NLM_F_REPLACE,
|
|
argc-1, argv+1);
|
|
if (matches(*argv, "prepend") == 0)
|
|
return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE,
|
|
argc-1, argv+1);
|
|
if (matches(*argv, "append") == 0)
|
|
return iproute_modify(RTM_NEWROUTE, NLM_F_CREATE|NLM_F_APPEND,
|
|
argc-1, argv+1);
|
|
if (matches(*argv, "test") == 0)
|
|
return iproute_modify(RTM_NEWROUTE, NLM_F_EXCL,
|
|
argc-1, argv+1);
|
|
if (matches(*argv, "delete") == 0)
|
|
return iproute_modify(RTM_DELROUTE, 0,
|
|
argc-1, argv+1);
|
|
if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
|
|
|| matches(*argv, "lst") == 0)
|
|
return iproute_list_flush_or_save(argc-1, argv+1, IPROUTE_LIST);
|
|
if (matches(*argv, "get") == 0)
|
|
return iproute_get(argc-1, argv+1);
|
|
if (matches(*argv, "flush") == 0)
|
|
return iproute_list_flush_or_save(argc-1, argv+1, IPROUTE_FLUSH);
|
|
if (matches(*argv, "save") == 0)
|
|
return iproute_list_flush_or_save(argc-1, argv+1, IPROUTE_SAVE);
|
|
if (matches(*argv, "restore") == 0)
|
|
return iproute_restore();
|
|
if (matches(*argv, "showdump") == 0)
|
|
return iproute_showdump();
|
|
if (matches(*argv, "help") == 0)
|
|
usage();
|
|
fprintf(stderr, "Command \"%s\" is unknown, try \"ip route help\".\n", *argv);
|
|
exit(-1);
|
|
}
|