system-linux.c 82 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423
  1. /*
  2. * netifd - network interface daemon
  3. * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
  4. * Copyright (C) 2013 Jo-Philipp Wich <jow@openwrt.org>
  5. * Copyright (C) 2013 Steven Barth <steven@midlink.org>
  6. * Copyright (C) 2014 Gioacchino Mazzurco <gio@eigenlab.org>
  7. * Copyright (C) 2017 Matthias Schiffer <mschiffer@universe-factory.net>
  8. * Copyright (C) 2018 Hans Dedecker <dedeckeh@gmail.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2
  12. * as published by the Free Software Foundation
  13. *
  14. * This program is distributed in the hope that it will be useful,
  15. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. * GNU General Public License for more details.
  18. */
  19. #define _GNU_SOURCE
  20. #include <sys/socket.h>
  21. #include <sys/ioctl.h>
  22. #include <sys/stat.h>
  23. #include <sys/syscall.h>
  24. #include <net/if.h>
  25. #include <net/if_arp.h>
  26. #include <limits.h>
  27. #include <arpa/inet.h>
  28. #include <netinet/ether.h>
  29. #include <netinet/in.h>
  30. #include <linux/rtnetlink.h>
  31. #include <linux/neighbour.h>
  32. #include <linux/sockios.h>
  33. #include <linux/ip.h>
  34. #include <linux/if_addr.h>
  35. #include <linux/if_link.h>
  36. #include <linux/if_vlan.h>
  37. #include <linux/if_bridge.h>
  38. #include <linux/if_tunnel.h>
  39. #include <linux/ip6_tunnel.h>
  40. #include <linux/ethtool.h>
  41. #include <linux/fib_rules.h>
  42. #include <linux/veth.h>
  43. #include <linux/version.h>
  44. #include <sched.h>
  45. #ifndef RTN_FAILED_POLICY
  46. #define RTN_FAILED_POLICY 12
  47. #endif
  48. #ifndef IFA_F_NOPREFIXROUTE
  49. #define IFA_F_NOPREFIXROUTE 0x200
  50. #endif
  51. #ifndef IFA_FLAGS
  52. #define IFA_FLAGS (IFA_MULTICAST + 1)
  53. #endif
  54. #include <string.h>
  55. #include <fcntl.h>
  56. #include <glob.h>
  57. #include <time.h>
  58. #include <unistd.h>
  59. #include <netlink/msg.h>
  60. #include <netlink/attr.h>
  61. #include <netlink/socket.h>
  62. #include <libubox/uloop.h>
  63. #include "netifd.h"
  64. #include "device.h"
  65. #include "system.h"
  66. #include "utils.h"
  67. struct event_socket {
  68. struct uloop_fd uloop;
  69. struct nl_sock *sock;
  70. int bufsize;
  71. };
  72. static int sock_ioctl = -1;
  73. static struct nl_sock *sock_rtnl = NULL;
  74. static int cb_rtnl_event(struct nl_msg *msg, void *arg);
  75. static void handle_hotplug_event(struct uloop_fd *u, unsigned int events);
  76. static int system_add_proto_tunnel(const char *name, const uint8_t proto,
  77. const unsigned int link, struct blob_attr **tb);
  78. static int __system_del_ip_tunnel(const char *name, struct blob_attr **tb);
  79. static char dev_buf[256];
  80. static void
  81. handler_nl_event(struct uloop_fd *u, unsigned int events)
  82. {
  83. struct event_socket *ev = container_of(u, struct event_socket, uloop);
  84. int err;
  85. socklen_t errlen = sizeof(err);
  86. if (!u->error) {
  87. nl_recvmsgs_default(ev->sock);
  88. return;
  89. }
  90. if (getsockopt(u->fd, SOL_SOCKET, SO_ERROR, (void *)&err, &errlen))
  91. goto abort;
  92. switch(err) {
  93. case ENOBUFS:
  94. /* Increase rx buffer size on netlink socket */
  95. ev->bufsize *= 2;
  96. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  97. goto abort;
  98. /* Request full dump since some info got dropped */
  99. struct rtgenmsg msg = { .rtgen_family = AF_UNSPEC };
  100. nl_send_simple(ev->sock, RTM_GETLINK, NLM_F_DUMP, &msg, sizeof(msg));
  101. break;
  102. default:
  103. goto abort;
  104. }
  105. u->error = false;
  106. return;
  107. abort:
  108. uloop_fd_delete(&ev->uloop);
  109. return;
  110. }
  111. static struct nl_sock *
  112. create_socket(int protocol, int groups)
  113. {
  114. struct nl_sock *sock;
  115. sock = nl_socket_alloc();
  116. if (!sock)
  117. return NULL;
  118. if (groups)
  119. nl_join_groups(sock, groups);
  120. if (nl_connect(sock, protocol)) {
  121. nl_socket_free(sock);
  122. return NULL;
  123. }
  124. return sock;
  125. }
  126. static bool
  127. create_raw_event_socket(struct event_socket *ev, int protocol, int groups,
  128. uloop_fd_handler cb, int flags)
  129. {
  130. ev->sock = create_socket(protocol, groups);
  131. if (!ev->sock)
  132. return false;
  133. ev->uloop.fd = nl_socket_get_fd(ev->sock);
  134. ev->uloop.cb = cb;
  135. if (uloop_fd_add(&ev->uloop, ULOOP_READ|flags))
  136. return false;
  137. return true;
  138. }
  139. static bool
  140. create_event_socket(struct event_socket *ev, int protocol,
  141. int (*cb)(struct nl_msg *msg, void *arg))
  142. {
  143. if (!create_raw_event_socket(ev, protocol, 0, handler_nl_event, ULOOP_ERROR_CB))
  144. return false;
  145. /* Install the valid custom callback handler */
  146. nl_socket_modify_cb(ev->sock, NL_CB_VALID, NL_CB_CUSTOM, cb, NULL);
  147. /* Disable sequence number checking on event sockets */
  148. nl_socket_disable_seq_check(ev->sock);
  149. /* Increase rx buffer size to 65K on event sockets */
  150. ev->bufsize = 65535;
  151. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  152. return false;
  153. return true;
  154. }
  155. static bool
  156. create_hotplug_event_socket(struct event_socket *ev, int protocol,
  157. void (*cb)(struct uloop_fd *u, unsigned int events))
  158. {
  159. if (!create_raw_event_socket(ev, protocol, 1, cb, ULOOP_ERROR_CB))
  160. return false;
  161. /* Increase rx buffer size to 65K on event sockets */
  162. ev->bufsize = 65535;
  163. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  164. return false;
  165. return true;
  166. }
  167. static bool
  168. system_rtn_aton(const char *src, unsigned int *dst)
  169. {
  170. char *e;
  171. unsigned int n;
  172. if (!strcmp(src, "local"))
  173. n = RTN_LOCAL;
  174. else if (!strcmp(src, "nat"))
  175. n = RTN_NAT;
  176. else if (!strcmp(src, "broadcast"))
  177. n = RTN_BROADCAST;
  178. else if (!strcmp(src, "anycast"))
  179. n = RTN_ANYCAST;
  180. else if (!strcmp(src, "multicast"))
  181. n = RTN_MULTICAST;
  182. else if (!strcmp(src, "prohibit"))
  183. n = RTN_PROHIBIT;
  184. else if (!strcmp(src, "unreachable"))
  185. n = RTN_UNREACHABLE;
  186. else if (!strcmp(src, "blackhole"))
  187. n = RTN_BLACKHOLE;
  188. else if (!strcmp(src, "xresolve"))
  189. n = RTN_XRESOLVE;
  190. else if (!strcmp(src, "unicast"))
  191. n = RTN_UNICAST;
  192. else if (!strcmp(src, "throw"))
  193. n = RTN_THROW;
  194. else if (!strcmp(src, "failed_policy"))
  195. n = RTN_FAILED_POLICY;
  196. else {
  197. n = strtoul(src, &e, 0);
  198. if (!e || *e || e == src || n > 255)
  199. return false;
  200. }
  201. *dst = n;
  202. return true;
  203. }
  204. static bool
  205. system_tos_aton(const char *src, unsigned *dst)
  206. {
  207. char *e;
  208. *dst = strtoul(src, &e, 16);
  209. if (e == src || *e || *dst > 255)
  210. return false;
  211. return true;
  212. }
  213. int system_init(void)
  214. {
  215. static struct event_socket rtnl_event;
  216. static struct event_socket hotplug_event;
  217. sock_ioctl = socket(AF_LOCAL, SOCK_DGRAM, 0);
  218. system_fd_set_cloexec(sock_ioctl);
  219. /* Prepare socket for routing / address control */
  220. sock_rtnl = create_socket(NETLINK_ROUTE, 0);
  221. if (!sock_rtnl)
  222. return -1;
  223. if (!create_event_socket(&rtnl_event, NETLINK_ROUTE, cb_rtnl_event))
  224. return -1;
  225. if (!create_hotplug_event_socket(&hotplug_event, NETLINK_KOBJECT_UEVENT,
  226. handle_hotplug_event))
  227. return -1;
  228. /* Receive network link events form kernel */
  229. nl_socket_add_membership(rtnl_event.sock, RTNLGRP_LINK);
  230. return 0;
  231. }
  232. static void system_set_sysctl(const char *path, const char *val)
  233. {
  234. int fd;
  235. fd = open(path, O_WRONLY);
  236. if (fd < 0)
  237. return;
  238. if (write(fd, val, strlen(val))) {}
  239. close(fd);
  240. }
  241. static void system_set_dev_sysctl(const char *path, const char *device, const char *val)
  242. {
  243. snprintf(dev_buf, sizeof(dev_buf), path, device);
  244. system_set_sysctl(dev_buf, val);
  245. }
  246. static void system_set_disable_ipv6(struct device *dev, const char *val)
  247. {
  248. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/disable_ipv6", dev->ifname, val);
  249. }
  250. static void system_set_rpfilter(struct device *dev, const char *val)
  251. {
  252. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/rp_filter", dev->ifname, val);
  253. }
  254. static void system_set_acceptlocal(struct device *dev, const char *val)
  255. {
  256. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/accept_local", dev->ifname, val);
  257. }
  258. static void system_set_igmpversion(struct device *dev, const char *val)
  259. {
  260. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/force_igmp_version", dev->ifname, val);
  261. }
  262. static void system_set_mldversion(struct device *dev, const char *val)
  263. {
  264. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/force_mld_version", dev->ifname, val);
  265. }
  266. static void system_set_neigh4reachabletime(struct device *dev, const char *val)
  267. {
  268. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/base_reachable_time_ms", dev->ifname, val);
  269. }
  270. static void system_set_neigh6reachabletime(struct device *dev, const char *val)
  271. {
  272. system_set_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/base_reachable_time_ms", dev->ifname, val);
  273. }
  274. static void system_set_neigh4gcstaletime(struct device *dev, const char *val)
  275. {
  276. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/gc_stale_time", dev->ifname, val);
  277. }
  278. static void system_set_neigh6gcstaletime(struct device *dev, const char *val)
  279. {
  280. system_set_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/gc_stale_time", dev->ifname, val);
  281. }
  282. static void system_set_neigh4locktime(struct device *dev, const char *val)
  283. {
  284. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/locktime", dev->ifname, val);
  285. }
  286. static void system_set_dadtransmits(struct device *dev, const char *val)
  287. {
  288. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/dad_transmits", dev->ifname, val);
  289. }
  290. static void system_bridge_set_multicast_to_unicast(struct device *dev, const char *val)
  291. {
  292. system_set_dev_sysctl("/sys/class/net/%s/brport/multicast_to_unicast", dev->ifname, val);
  293. }
  294. static void system_bridge_set_multicast_fast_leave(struct device *dev, const char *val)
  295. {
  296. system_set_dev_sysctl("/sys/class/net/%s/brport/multicast_fast_leave", dev->ifname, val);
  297. }
  298. static void system_bridge_set_hairpin_mode(struct device *dev, const char *val)
  299. {
  300. system_set_dev_sysctl("/sys/class/net/%s/brport/hairpin_mode", dev->ifname, val);
  301. }
  302. static void system_bridge_set_isolated(struct device *dev, const char *val)
  303. {
  304. system_set_dev_sysctl("/sys/class/net/%s/brport/isolated", dev->ifname, val);
  305. }
  306. static void system_bridge_set_multicast_router(struct device *dev, const char *val, bool bridge)
  307. {
  308. system_set_dev_sysctl(bridge ? "/sys/class/net/%s/bridge/multicast_router" :
  309. "/sys/class/net/%s/brport/multicast_router",
  310. dev->ifname, val);
  311. }
  312. static void system_bridge_set_robustness(struct device *dev, const char *val)
  313. {
  314. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_startup_query_count",
  315. dev->ifname, val);
  316. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_last_member_count",
  317. dev->ifname, val);
  318. }
  319. static void system_bridge_set_query_interval(struct device *dev, const char *val)
  320. {
  321. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_query_interval",
  322. dev->ifname, val);
  323. }
  324. static void system_bridge_set_query_response_interval(struct device *dev, const char *val)
  325. {
  326. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_query_response_interval",
  327. dev->ifname, val);
  328. }
  329. static void system_bridge_set_last_member_interval(struct device *dev, const char *val)
  330. {
  331. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_last_member_interval",
  332. dev->ifname, val);
  333. }
  334. static void system_bridge_set_membership_interval(struct device *dev, const char *val)
  335. {
  336. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_membership_interval",
  337. dev->ifname, val);
  338. }
  339. static void system_bridge_set_other_querier_timeout(struct device *dev, const char *val)
  340. {
  341. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_querier_interval",
  342. dev->ifname, val);
  343. }
  344. static void system_bridge_set_startup_query_interval(struct device *dev, const char *val)
  345. {
  346. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_startup_query_interval",
  347. dev->ifname, val);
  348. }
  349. static void system_bridge_set_stp_state(struct device *dev, const char *val)
  350. {
  351. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/stp_state", dev->ifname, val);
  352. }
  353. static void system_bridge_set_forward_delay(struct device *dev, const char *val)
  354. {
  355. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/forward_delay", dev->ifname, val);
  356. }
  357. static void system_bridge_set_priority(struct device *dev, const char *val)
  358. {
  359. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/priority", dev->ifname, val);
  360. }
  361. static void system_bridge_set_ageing_time(struct device *dev, const char *val)
  362. {
  363. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/ageing_time", dev->ifname, val);
  364. }
  365. static void system_bridge_set_hello_time(struct device *dev, const char *val)
  366. {
  367. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/hello_time", dev->ifname, val);
  368. }
  369. static void system_bridge_set_max_age(struct device *dev, const char *val)
  370. {
  371. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/max_age", dev->ifname, val);
  372. }
  373. static void system_bridge_set_learning(struct device *dev, const char *val)
  374. {
  375. system_set_dev_sysctl("/sys/class/net/%s/brport/learning", dev->ifname, val);
  376. }
  377. static void system_bridge_set_unicast_flood(struct device *dev, const char *val)
  378. {
  379. system_set_dev_sysctl("/sys/class/net/%s/brport/unicast_flood", dev->ifname, val);
  380. }
  381. static void system_set_sendredirects(struct device *dev, const char *val)
  382. {
  383. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/send_redirects", dev->ifname, val);
  384. }
  385. static int system_get_sysctl(const char *path, char *buf, const size_t buf_sz)
  386. {
  387. int fd = -1, ret = -1;
  388. fd = open(path, O_RDONLY);
  389. if (fd < 0)
  390. goto out;
  391. ssize_t len = read(fd, buf, buf_sz - 1);
  392. if (len < 0)
  393. goto out;
  394. ret = buf[len] = 0;
  395. out:
  396. if (fd >= 0)
  397. close(fd);
  398. return ret;
  399. }
  400. static int
  401. system_get_dev_sysctl(const char *path, const char *device, char *buf, const size_t buf_sz)
  402. {
  403. snprintf(dev_buf, sizeof(dev_buf), path, device);
  404. return system_get_sysctl(dev_buf, buf, buf_sz);
  405. }
  406. static int system_get_disable_ipv6(struct device *dev, char *buf, const size_t buf_sz)
  407. {
  408. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/disable_ipv6",
  409. dev->ifname, buf, buf_sz);
  410. }
  411. static int system_get_rpfilter(struct device *dev, char *buf, const size_t buf_sz)
  412. {
  413. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/rp_filter",
  414. dev->ifname, buf, buf_sz);
  415. }
  416. static int system_get_acceptlocal(struct device *dev, char *buf, const size_t buf_sz)
  417. {
  418. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/accept_local",
  419. dev->ifname, buf, buf_sz);
  420. }
  421. static int system_get_igmpversion(struct device *dev, char *buf, const size_t buf_sz)
  422. {
  423. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/force_igmp_version",
  424. dev->ifname, buf, buf_sz);
  425. }
  426. static int system_get_mldversion(struct device *dev, char *buf, const size_t buf_sz)
  427. {
  428. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/force_mld_version",
  429. dev->ifname, buf, buf_sz);
  430. }
  431. static int system_get_neigh4reachabletime(struct device *dev, char *buf, const size_t buf_sz)
  432. {
  433. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/base_reachable_time_ms",
  434. dev->ifname, buf, buf_sz);
  435. }
  436. static int system_get_neigh6reachabletime(struct device *dev, char *buf, const size_t buf_sz)
  437. {
  438. return system_get_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/base_reachable_time_ms",
  439. dev->ifname, buf, buf_sz);
  440. }
  441. static int system_get_neigh4gcstaletime(struct device *dev, char *buf, const size_t buf_sz)
  442. {
  443. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/gc_stale_time",
  444. dev->ifname, buf, buf_sz);
  445. }
  446. static int system_get_neigh6gcstaletime(struct device *dev, char *buf, const size_t buf_sz)
  447. {
  448. return system_get_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/gc_stale_time",
  449. dev->ifname, buf, buf_sz);
  450. }
  451. static int system_get_neigh4locktime(struct device *dev, char *buf, const size_t buf_sz)
  452. {
  453. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/locktime",
  454. dev->ifname, buf, buf_sz);
  455. }
  456. static int system_get_dadtransmits(struct device *dev, char *buf, const size_t buf_sz)
  457. {
  458. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/dad_transmits",
  459. dev->ifname, buf, buf_sz);
  460. }
  461. static int system_get_sendredirects(struct device *dev, char *buf, const size_t buf_sz)
  462. {
  463. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/send_redirects",
  464. dev->ifname, buf, buf_sz);
  465. }
  466. /* Evaluate netlink messages */
  467. static int cb_rtnl_event(struct nl_msg *msg, void *arg)
  468. {
  469. struct nlmsghdr *nh = nlmsg_hdr(msg);
  470. struct nlattr *nla[__IFLA_MAX];
  471. int link_state = 0;
  472. char buf[10];
  473. if (nh->nlmsg_type != RTM_NEWLINK)
  474. goto out;
  475. nlmsg_parse(nh, sizeof(struct ifinfomsg), nla, __IFLA_MAX - 1, NULL);
  476. if (!nla[IFLA_IFNAME])
  477. goto out;
  478. struct device *dev = device_find(nla_data(nla[IFLA_IFNAME]));
  479. if (!dev)
  480. goto out;
  481. if (!system_get_dev_sysctl("/sys/class/net/%s/carrier", dev->ifname, buf, sizeof(buf)))
  482. link_state = strtoul(buf, NULL, 0);
  483. if (dev->type == &simple_device_type && !system_if_force_external(dev->ifname))
  484. device_set_present(dev, true);
  485. device_set_link(dev, link_state ? true : false);
  486. out:
  487. return 0;
  488. }
  489. static void
  490. handle_hotplug_msg(char *data, int size)
  491. {
  492. const char *subsystem = NULL, *interface = NULL, *interface_old = NULL;
  493. char *cur, *end, *sep;
  494. struct device *dev;
  495. int skip;
  496. bool add, move = false;
  497. if (!strncmp(data, "add@", 4))
  498. add = true;
  499. else if (!strncmp(data, "remove@", 7))
  500. add = false;
  501. else if (!strncmp(data, "move@", 5)) {
  502. add = true;
  503. move = true;
  504. }
  505. else
  506. return;
  507. skip = strlen(data) + 1;
  508. end = data + size;
  509. for (cur = data + skip; cur < end; cur += skip) {
  510. skip = strlen(cur) + 1;
  511. sep = strchr(cur, '=');
  512. if (!sep)
  513. continue;
  514. *sep = 0;
  515. if (!strcmp(cur, "INTERFACE"))
  516. interface = sep + 1;
  517. else if (!strcmp(cur, "SUBSYSTEM")) {
  518. subsystem = sep + 1;
  519. if (strcmp(subsystem, "net") != 0)
  520. return;
  521. } else if (!strcmp(cur, "DEVPATH_OLD")) {
  522. interface_old = strrchr(sep + 1, '/');
  523. if (interface_old)
  524. interface_old++;
  525. }
  526. }
  527. if (subsystem && interface) {
  528. if (move && interface_old)
  529. goto move;
  530. else
  531. goto found;
  532. }
  533. return;
  534. move:
  535. dev = device_find(interface_old);
  536. if (!dev)
  537. return;
  538. if (dev->type != &simple_device_type)
  539. goto found;
  540. device_set_present(dev, false);
  541. return;
  542. found:
  543. dev = device_find(interface);
  544. if (!dev)
  545. return;
  546. if (dev->type != &simple_device_type)
  547. return;
  548. if (add && system_if_force_external(dev->ifname))
  549. return;
  550. device_set_present(dev, add);
  551. }
  552. static void
  553. handle_hotplug_event(struct uloop_fd *u, unsigned int events)
  554. {
  555. struct event_socket *ev = container_of(u, struct event_socket, uloop);
  556. struct sockaddr_nl nla;
  557. unsigned char *buf = NULL;
  558. int size;
  559. int err;
  560. socklen_t errlen = sizeof(err);
  561. if (!u->error) {
  562. while ((size = nl_recv(ev->sock, &nla, &buf, NULL)) > 0) {
  563. if (nla.nl_pid == 0)
  564. handle_hotplug_msg((char *) buf, size);
  565. free(buf);
  566. }
  567. return;
  568. }
  569. if (getsockopt(u->fd, SOL_SOCKET, SO_ERROR, (void *)&err, &errlen))
  570. goto abort;
  571. switch(err) {
  572. case ENOBUFS:
  573. /* Increase rx buffer size on netlink socket */
  574. ev->bufsize *= 2;
  575. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  576. goto abort;
  577. break;
  578. default:
  579. goto abort;
  580. }
  581. u->error = false;
  582. return;
  583. abort:
  584. uloop_fd_delete(&ev->uloop);
  585. return;
  586. }
  587. static int system_rtnl_call(struct nl_msg *msg)
  588. {
  589. int ret;
  590. ret = nl_send_auto_complete(sock_rtnl, msg);
  591. nlmsg_free(msg);
  592. if (ret < 0)
  593. return ret;
  594. return nl_wait_for_ack(sock_rtnl);
  595. }
  596. int system_bridge_delbr(struct device *bridge)
  597. {
  598. return ioctl(sock_ioctl, SIOCBRDELBR, bridge->ifname);
  599. }
  600. static int system_bridge_if(const char *bridge, struct device *dev, int cmd, void *data)
  601. {
  602. struct ifreq ifr;
  603. memset(&ifr, 0, sizeof(ifr));
  604. if (dev)
  605. ifr.ifr_ifindex = dev->ifindex;
  606. else
  607. ifr.ifr_data = data;
  608. strncpy(ifr.ifr_name, bridge, sizeof(ifr.ifr_name) - 1);
  609. return ioctl(sock_ioctl, cmd, &ifr);
  610. }
  611. static bool system_is_bridge(const char *name, char *buf, int buflen)
  612. {
  613. struct stat st;
  614. snprintf(buf, buflen, "/sys/devices/virtual/net/%s/bridge", name);
  615. if (stat(buf, &st) < 0)
  616. return false;
  617. return true;
  618. }
  619. static char *system_get_bridge(const char *name, char *buf, int buflen)
  620. {
  621. char *path;
  622. ssize_t len = -1;
  623. glob_t gl;
  624. snprintf(buf, buflen, "/sys/devices/virtual/net/*/brif/%s/bridge", name);
  625. if (glob(buf, GLOB_NOSORT, NULL, &gl) < 0)
  626. return NULL;
  627. if (gl.gl_pathc > 0)
  628. len = readlink(gl.gl_pathv[0], buf, buflen);
  629. globfree(&gl);
  630. if (len < 0)
  631. return NULL;
  632. buf[len] = 0;
  633. path = strrchr(buf, '/');
  634. if (!path)
  635. return NULL;
  636. return path + 1;
  637. }
  638. static void
  639. system_bridge_set_wireless(struct device *bridge, struct device *dev)
  640. {
  641. bool mcast_to_ucast = dev->wireless_ap;
  642. bool hairpin = true;
  643. if (bridge->settings.flags & DEV_OPT_MULTICAST_TO_UNICAST &&
  644. !bridge->settings.multicast_to_unicast)
  645. mcast_to_ucast = false;
  646. if (!mcast_to_ucast || dev->wireless_isolate)
  647. hairpin = false;
  648. system_bridge_set_multicast_to_unicast(dev, mcast_to_ucast ? "1" : "0");
  649. system_bridge_set_hairpin_mode(dev, hairpin ? "1" : "0");
  650. }
  651. int system_bridge_addif(struct device *bridge, struct device *dev)
  652. {
  653. char buf[64];
  654. char *oldbr;
  655. int ret = 0;
  656. oldbr = system_get_bridge(dev->ifname, dev_buf, sizeof(dev_buf));
  657. if (!oldbr || strcmp(oldbr, bridge->ifname) != 0)
  658. ret = system_bridge_if(bridge->ifname, dev, SIOCBRADDIF, NULL);
  659. if (dev->wireless)
  660. system_bridge_set_wireless(bridge, dev);
  661. if (dev->settings.flags & DEV_OPT_MULTICAST_ROUTER) {
  662. snprintf(buf, sizeof(buf), "%u", dev->settings.multicast_router);
  663. system_bridge_set_multicast_router(dev, buf, false);
  664. }
  665. if (dev->settings.flags & DEV_OPT_MULTICAST_FAST_LEAVE &&
  666. dev->settings.multicast_fast_leave)
  667. system_bridge_set_multicast_fast_leave(dev, "1");
  668. if (dev->settings.flags & DEV_OPT_LEARNING &&
  669. !dev->settings.learning)
  670. system_bridge_set_learning(dev, "0");
  671. if (dev->settings.flags & DEV_OPT_UNICAST_FLOOD &&
  672. !dev->settings.unicast_flood)
  673. system_bridge_set_unicast_flood(dev, "0");
  674. if (dev->settings.flags & DEV_OPT_ISOLATE &&
  675. dev->settings.isolate)
  676. system_bridge_set_isolated(dev, "1");
  677. return ret;
  678. }
  679. int system_bridge_delif(struct device *bridge, struct device *dev)
  680. {
  681. return system_bridge_if(bridge->ifname, dev, SIOCBRDELIF, NULL);
  682. }
  683. int system_if_resolve(struct device *dev)
  684. {
  685. struct ifreq ifr;
  686. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  687. if (!ioctl(sock_ioctl, SIOCGIFINDEX, &ifr))
  688. return ifr.ifr_ifindex;
  689. else
  690. return 0;
  691. }
  692. static int system_if_flags(const char *ifname, unsigned add, unsigned rem)
  693. {
  694. struct ifreq ifr;
  695. memset(&ifr, 0, sizeof(ifr));
  696. strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1);
  697. if (ioctl(sock_ioctl, SIOCGIFFLAGS, &ifr) < 0)
  698. return -1;
  699. ifr.ifr_flags |= add;
  700. ifr.ifr_flags &= ~rem;
  701. return ioctl(sock_ioctl, SIOCSIFFLAGS, &ifr);
  702. }
  703. struct clear_data {
  704. struct nl_msg *msg;
  705. struct device *dev;
  706. int type;
  707. int size;
  708. int af;
  709. };
  710. static bool check_ifaddr(struct nlmsghdr *hdr, int ifindex)
  711. {
  712. struct ifaddrmsg *ifa = NLMSG_DATA(hdr);
  713. return ifa->ifa_index == ifindex;
  714. }
  715. static bool check_route(struct nlmsghdr *hdr, int ifindex)
  716. {
  717. struct rtmsg *r = NLMSG_DATA(hdr);
  718. struct nlattr *tb[__RTA_MAX];
  719. if (r->rtm_protocol == RTPROT_KERNEL &&
  720. r->rtm_family == AF_INET6)
  721. return false;
  722. nlmsg_parse(hdr, sizeof(struct rtmsg), tb, __RTA_MAX - 1, NULL);
  723. if (!tb[RTA_OIF])
  724. return false;
  725. return *(int *)RTA_DATA(tb[RTA_OIF]) == ifindex;
  726. }
  727. static bool check_rule(struct nlmsghdr *hdr, int ifindex)
  728. {
  729. return true;
  730. }
  731. static int cb_clear_event(struct nl_msg *msg, void *arg)
  732. {
  733. struct clear_data *clr = arg;
  734. struct nlmsghdr *hdr = nlmsg_hdr(msg);
  735. bool (*cb)(struct nlmsghdr *, int ifindex);
  736. int type, ret;
  737. switch(clr->type) {
  738. case RTM_GETADDR:
  739. type = RTM_DELADDR;
  740. if (hdr->nlmsg_type != RTM_NEWADDR)
  741. return NL_SKIP;
  742. cb = check_ifaddr;
  743. break;
  744. case RTM_GETROUTE:
  745. type = RTM_DELROUTE;
  746. if (hdr->nlmsg_type != RTM_NEWROUTE)
  747. return NL_SKIP;
  748. cb = check_route;
  749. break;
  750. case RTM_GETRULE:
  751. type = RTM_DELRULE;
  752. if (hdr->nlmsg_type != RTM_NEWRULE)
  753. return NL_SKIP;
  754. cb = check_rule;
  755. break;
  756. default:
  757. return NL_SKIP;
  758. }
  759. if (!cb(hdr, clr->dev ? clr->dev->ifindex : 0))
  760. return NL_SKIP;
  761. if (type == RTM_DELRULE)
  762. D(SYSTEM, "Remove a rule\n");
  763. else
  764. D(SYSTEM, "Remove %s from device %s\n",
  765. type == RTM_DELADDR ? "an address" : "a route",
  766. clr->dev->ifname);
  767. memcpy(nlmsg_hdr(clr->msg), hdr, hdr->nlmsg_len);
  768. hdr = nlmsg_hdr(clr->msg);
  769. hdr->nlmsg_type = type;
  770. hdr->nlmsg_flags = NLM_F_REQUEST;
  771. nl_socket_disable_auto_ack(sock_rtnl);
  772. ret = nl_send_auto_complete(sock_rtnl, clr->msg);
  773. if (ret < 0) {
  774. if (type == RTM_DELRULE)
  775. D(SYSTEM, "Error deleting a rule: %d\n", ret);
  776. else
  777. D(SYSTEM, "Error deleting %s from device '%s': %d\n",
  778. type == RTM_DELADDR ? "an address" : "a route",
  779. clr->dev->ifname, ret);
  780. }
  781. nl_socket_enable_auto_ack(sock_rtnl);
  782. return NL_SKIP;
  783. }
  784. static int
  785. cb_finish_event(struct nl_msg *msg, void *arg)
  786. {
  787. int *pending = arg;
  788. *pending = 0;
  789. return NL_STOP;
  790. }
  791. static int
  792. error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err, void *arg)
  793. {
  794. int *pending = arg;
  795. *pending = err->error;
  796. return NL_STOP;
  797. }
  798. static void
  799. system_if_clear_entries(struct device *dev, int type, int af)
  800. {
  801. struct clear_data clr;
  802. struct nl_cb *cb;
  803. struct rtmsg rtm = {
  804. .rtm_family = af,
  805. .rtm_flags = RTM_F_CLONED,
  806. };
  807. int flags = NLM_F_DUMP;
  808. int pending = 1;
  809. clr.af = af;
  810. clr.dev = dev;
  811. clr.type = type;
  812. switch (type) {
  813. case RTM_GETADDR:
  814. case RTM_GETRULE:
  815. clr.size = sizeof(struct rtgenmsg);
  816. break;
  817. case RTM_GETROUTE:
  818. clr.size = sizeof(struct rtmsg);
  819. break;
  820. default:
  821. return;
  822. }
  823. cb = nl_cb_alloc(NL_CB_DEFAULT);
  824. if (!cb)
  825. return;
  826. clr.msg = nlmsg_alloc_simple(type, flags);
  827. if (!clr.msg)
  828. goto out;
  829. nlmsg_append(clr.msg, &rtm, clr.size, 0);
  830. nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, cb_clear_event, &clr);
  831. nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, cb_finish_event, &pending);
  832. nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &pending);
  833. if (nl_send_auto_complete(sock_rtnl, clr.msg) < 0)
  834. goto free;
  835. while (pending > 0)
  836. nl_recvmsgs(sock_rtnl, cb);
  837. free:
  838. nlmsg_free(clr.msg);
  839. out:
  840. nl_cb_put(cb);
  841. }
  842. /*
  843. * Clear bridge (membership) state and bring down device
  844. */
  845. void system_if_clear_state(struct device *dev)
  846. {
  847. static char buf[256];
  848. char *bridge;
  849. device_set_ifindex(dev, system_if_resolve(dev));
  850. if (dev->external || !dev->ifindex)
  851. return;
  852. system_if_flags(dev->ifname, 0, IFF_UP);
  853. if (system_is_bridge(dev->ifname, buf, sizeof(buf))) {
  854. D(SYSTEM, "Delete existing bridge named '%s'\n", dev->ifname);
  855. system_bridge_delbr(dev);
  856. return;
  857. }
  858. bridge = system_get_bridge(dev->ifname, buf, sizeof(buf));
  859. if (bridge) {
  860. D(SYSTEM, "Remove device '%s' from bridge '%s'\n", dev->ifname, bridge);
  861. system_bridge_if(bridge, dev, SIOCBRDELIF, NULL);
  862. }
  863. system_if_clear_entries(dev, RTM_GETROUTE, AF_INET);
  864. system_if_clear_entries(dev, RTM_GETADDR, AF_INET);
  865. system_if_clear_entries(dev, RTM_GETROUTE, AF_INET6);
  866. system_if_clear_entries(dev, RTM_GETADDR, AF_INET6);
  867. system_if_clear_entries(dev, RTM_GETNEIGH, AF_INET);
  868. system_if_clear_entries(dev, RTM_GETNEIGH, AF_INET6);
  869. system_set_disable_ipv6(dev, "0");
  870. }
  871. static inline unsigned long
  872. sec_to_jiffies(int val)
  873. {
  874. return (unsigned long) val * 100;
  875. }
  876. static void system_bridge_conf_multicast_deps(struct device *bridge,
  877. struct bridge_config *cfg,
  878. char *buf,
  879. int buf_len)
  880. {
  881. int val;
  882. if (cfg->flags & BRIDGE_OPT_ROBUSTNESS ||
  883. cfg->flags & BRIDGE_OPT_QUERY_INTERVAL ||
  884. cfg->flags & BRIDGE_OPT_QUERY_RESPONSE_INTERVAL) {
  885. val = cfg->robustness * cfg->query_interval +
  886. cfg->query_response_interval;
  887. snprintf(buf, buf_len, "%i", val);
  888. system_bridge_set_membership_interval(bridge, buf);
  889. val = cfg->robustness * cfg->query_interval +
  890. cfg->query_response_interval / 2;
  891. snprintf(buf, buf_len, "%i", val);
  892. system_bridge_set_other_querier_timeout(bridge, buf);
  893. }
  894. if (cfg->flags & BRIDGE_OPT_QUERY_INTERVAL) {
  895. val = cfg->query_interval / 4;
  896. snprintf(buf, buf_len, "%i", val);
  897. system_bridge_set_startup_query_interval(bridge, buf);
  898. }
  899. }
  900. static void system_bridge_conf_multicast(struct device *bridge,
  901. struct bridge_config *cfg,
  902. char *buf,
  903. int buf_len)
  904. {
  905. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_snooping",
  906. bridge->ifname, cfg->igmp_snoop ? "1" : "0");
  907. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_querier",
  908. bridge->ifname, cfg->multicast_querier ? "1" : "0");
  909. snprintf(buf, buf_len, "%i", cfg->hash_max);
  910. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/hash_max",
  911. bridge->ifname, buf);
  912. if (bridge->settings.flags & DEV_OPT_MULTICAST_ROUTER) {
  913. snprintf(buf, buf_len, "%u", bridge->settings.multicast_router);
  914. system_bridge_set_multicast_router(bridge, buf, true);
  915. }
  916. if (cfg->flags & BRIDGE_OPT_ROBUSTNESS) {
  917. snprintf(buf, buf_len, "%i", cfg->robustness);
  918. system_bridge_set_robustness(bridge, buf);
  919. }
  920. if (cfg->flags & BRIDGE_OPT_QUERY_INTERVAL) {
  921. snprintf(buf, buf_len, "%i", cfg->query_interval);
  922. system_bridge_set_query_interval(bridge, buf);
  923. }
  924. if (cfg->flags & BRIDGE_OPT_QUERY_RESPONSE_INTERVAL) {
  925. snprintf(buf, buf_len, "%i", cfg->query_response_interval);
  926. system_bridge_set_query_response_interval(bridge, buf);
  927. }
  928. if (cfg->flags & BRIDGE_OPT_LAST_MEMBER_INTERVAL) {
  929. snprintf(buf, buf_len, "%i", cfg->last_member_interval);
  930. system_bridge_set_last_member_interval(bridge, buf);
  931. }
  932. system_bridge_conf_multicast_deps(bridge, cfg, buf, buf_len);
  933. }
  934. int system_bridge_addbr(struct device *bridge, struct bridge_config *cfg)
  935. {
  936. char buf[64];
  937. if (ioctl(sock_ioctl, SIOCBRADDBR, bridge->ifname) < 0)
  938. return -1;
  939. system_bridge_set_stp_state(bridge, cfg->stp ? "1" : "0");
  940. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->forward_delay));
  941. system_bridge_set_forward_delay(bridge, buf);
  942. system_bridge_conf_multicast(bridge, cfg, buf, sizeof(buf));
  943. snprintf(buf, sizeof(buf), "%d", cfg->priority);
  944. system_bridge_set_priority(bridge, buf);
  945. if (cfg->flags & BRIDGE_OPT_AGEING_TIME) {
  946. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->ageing_time));
  947. system_bridge_set_ageing_time(bridge, buf);
  948. }
  949. if (cfg->flags & BRIDGE_OPT_HELLO_TIME) {
  950. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->hello_time));
  951. system_bridge_set_hello_time(bridge, buf);
  952. }
  953. if (cfg->flags & BRIDGE_OPT_MAX_AGE) {
  954. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->max_age));
  955. system_bridge_set_max_age(bridge, buf);
  956. }
  957. return 0;
  958. }
  959. int system_macvlan_add(struct device *macvlan, struct device *dev, struct macvlan_config *cfg)
  960. {
  961. struct nl_msg *msg;
  962. struct nlattr *linkinfo, *data;
  963. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC, };
  964. int i, rv;
  965. static const struct {
  966. const char *name;
  967. enum macvlan_mode val;
  968. } modes[] = {
  969. { "private", MACVLAN_MODE_PRIVATE },
  970. { "vepa", MACVLAN_MODE_VEPA },
  971. { "bridge", MACVLAN_MODE_BRIDGE },
  972. { "passthru", MACVLAN_MODE_PASSTHRU },
  973. };
  974. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  975. if (!msg)
  976. return -1;
  977. nlmsg_append(msg, &iim, sizeof(iim), 0);
  978. if (cfg->flags & MACVLAN_OPT_MACADDR)
  979. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->macaddr), cfg->macaddr);
  980. nla_put_string(msg, IFLA_IFNAME, macvlan->ifname);
  981. nla_put_u32(msg, IFLA_LINK, dev->ifindex);
  982. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  983. goto nla_put_failure;
  984. nla_put_string(msg, IFLA_INFO_KIND, "macvlan");
  985. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  986. goto nla_put_failure;
  987. if (cfg->mode) {
  988. for (i = 0; i < ARRAY_SIZE(modes); i++) {
  989. if (strcmp(cfg->mode, modes[i].name) != 0)
  990. continue;
  991. nla_put_u32(msg, IFLA_MACVLAN_MODE, modes[i].val);
  992. break;
  993. }
  994. }
  995. nla_nest_end(msg, data);
  996. nla_nest_end(msg, linkinfo);
  997. rv = system_rtnl_call(msg);
  998. if (rv)
  999. D(SYSTEM, "Error adding macvlan '%s' over '%s': %d\n", macvlan->ifname, dev->ifname, rv);
  1000. return rv;
  1001. nla_put_failure:
  1002. nlmsg_free(msg);
  1003. return -ENOMEM;
  1004. }
  1005. int system_link_netns_move(struct device *dev, int netns_fd, const char *target_ifname)
  1006. {
  1007. struct nl_msg *msg;
  1008. struct ifinfomsg iim = {
  1009. .ifi_family = AF_UNSPEC,
  1010. };
  1011. if (!dev)
  1012. return -1;
  1013. iim.ifi_index = system_if_resolve(dev);
  1014. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST);
  1015. if (!msg)
  1016. return -1;
  1017. nlmsg_append(msg, &iim, sizeof(iim), 0);
  1018. if (target_ifname)
  1019. nla_put_string(msg, IFLA_IFNAME, target_ifname);
  1020. nla_put_u32(msg, IFLA_NET_NS_FD, netns_fd);
  1021. return system_rtnl_call(msg);
  1022. }
  1023. static int system_link_del(const char *ifname)
  1024. {
  1025. struct nl_msg *msg;
  1026. struct ifinfomsg iim = {
  1027. .ifi_family = AF_UNSPEC,
  1028. .ifi_index = 0,
  1029. };
  1030. msg = nlmsg_alloc_simple(RTM_DELLINK, NLM_F_REQUEST);
  1031. if (!msg)
  1032. return -1;
  1033. nlmsg_append(msg, &iim, sizeof(iim), 0);
  1034. nla_put_string(msg, IFLA_IFNAME, ifname);
  1035. return system_rtnl_call(msg);
  1036. }
  1037. int system_macvlan_del(struct device *macvlan)
  1038. {
  1039. return system_link_del(macvlan->ifname);
  1040. }
  1041. int system_netns_open(const pid_t target_ns)
  1042. {
  1043. char pid_net_path[PATH_MAX];
  1044. snprintf(pid_net_path, sizeof(pid_net_path), "/proc/%u/ns/net", target_ns);
  1045. return open(pid_net_path, O_RDONLY);
  1046. }
  1047. int system_netns_set(int netns_fd)
  1048. {
  1049. return setns(netns_fd, CLONE_NEWNET);
  1050. }
  1051. int system_veth_add(struct device *veth, struct veth_config *cfg)
  1052. {
  1053. struct nl_msg *msg;
  1054. struct ifinfomsg empty_iim = {};
  1055. struct nlattr *linkinfo, *data, *veth_info;
  1056. int rv;
  1057. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  1058. if (!msg)
  1059. return -1;
  1060. nlmsg_append(msg, &empty_iim, sizeof(empty_iim), 0);
  1061. if (cfg->flags & VETH_OPT_MACADDR)
  1062. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->macaddr), cfg->macaddr);
  1063. nla_put_string(msg, IFLA_IFNAME, veth->ifname);
  1064. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  1065. goto nla_put_failure;
  1066. nla_put_string(msg, IFLA_INFO_KIND, "veth");
  1067. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  1068. goto nla_put_failure;
  1069. if (!(veth_info = nla_nest_start(msg, VETH_INFO_PEER)))
  1070. goto nla_put_failure;
  1071. nlmsg_append(msg, &empty_iim, sizeof(empty_iim), 0);
  1072. if (cfg->flags & VETH_OPT_PEER_NAME)
  1073. nla_put_string(msg, IFLA_IFNAME, cfg->peer_name);
  1074. if (cfg->flags & VETH_OPT_PEER_MACADDR)
  1075. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->peer_macaddr), cfg->peer_macaddr);
  1076. nla_nest_end(msg, veth_info);
  1077. nla_nest_end(msg, data);
  1078. nla_nest_end(msg, linkinfo);
  1079. rv = system_rtnl_call(msg);
  1080. if (rv) {
  1081. if (cfg->flags & VETH_OPT_PEER_NAME)
  1082. D(SYSTEM, "Error adding veth '%s' with peer '%s': %d\n", veth->ifname, cfg->peer_name, rv);
  1083. else
  1084. D(SYSTEM, "Error adding veth '%s': %d\n", veth->ifname, rv);
  1085. }
  1086. return rv;
  1087. nla_put_failure:
  1088. nlmsg_free(msg);
  1089. return -ENOMEM;
  1090. }
  1091. int system_veth_del(struct device *veth)
  1092. {
  1093. return system_link_del(veth->ifname);
  1094. }
  1095. static int system_vlan(struct device *dev, int id)
  1096. {
  1097. struct vlan_ioctl_args ifr = {
  1098. .cmd = SET_VLAN_NAME_TYPE_CMD,
  1099. .u.name_type = VLAN_NAME_TYPE_RAW_PLUS_VID_NO_PAD,
  1100. };
  1101. if (ioctl(sock_ioctl, SIOCSIFVLAN, &ifr) < 0)
  1102. return -1;
  1103. if (id < 0) {
  1104. ifr.cmd = DEL_VLAN_CMD;
  1105. ifr.u.VID = 0;
  1106. } else {
  1107. ifr.cmd = ADD_VLAN_CMD;
  1108. ifr.u.VID = id;
  1109. }
  1110. strncpy(ifr.device1, dev->ifname, sizeof(ifr.device1));
  1111. return ioctl(sock_ioctl, SIOCSIFVLAN, &ifr);
  1112. }
  1113. int system_vlan_add(struct device *dev, int id)
  1114. {
  1115. return system_vlan(dev, id);
  1116. }
  1117. int system_vlan_del(struct device *dev)
  1118. {
  1119. return system_vlan(dev, -1);
  1120. }
  1121. int system_vlandev_add(struct device *vlandev, struct device *dev, struct vlandev_config *cfg)
  1122. {
  1123. struct nl_msg *msg;
  1124. struct nlattr *linkinfo, *data, *qos;
  1125. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC };
  1126. struct vlan_qos_mapping *elem;
  1127. struct ifla_vlan_qos_mapping nl_qos_map;
  1128. int rv;
  1129. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  1130. if (!msg)
  1131. return -1;
  1132. nlmsg_append(msg, &iim, sizeof(iim), 0);
  1133. nla_put_string(msg, IFLA_IFNAME, vlandev->ifname);
  1134. nla_put_u32(msg, IFLA_LINK, dev->ifindex);
  1135. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  1136. goto nla_put_failure;
  1137. nla_put_string(msg, IFLA_INFO_KIND, "vlan");
  1138. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  1139. goto nla_put_failure;
  1140. nla_put_u16(msg, IFLA_VLAN_ID, cfg->vid);
  1141. #if LINUX_VERSION_CODE >= KERNEL_VERSION(3,10,0)
  1142. nla_put_u16(msg, IFLA_VLAN_PROTOCOL, htons(cfg->proto));
  1143. #else
  1144. if(cfg->proto == VLAN_PROTO_8021AD)
  1145. netifd_log_message(L_WARNING, "%s Your kernel is older than linux 3.10.0, 802.1ad is not supported defaulting to 802.1q", vlandev->type->name);
  1146. #endif
  1147. if (!(qos = nla_nest_start(msg, IFLA_VLAN_INGRESS_QOS)))
  1148. goto nla_put_failure;
  1149. vlist_simple_for_each_element(&cfg->ingress_qos_mapping_list, elem, node) {
  1150. nl_qos_map.from = elem->from;
  1151. nl_qos_map.to = elem->to;
  1152. nla_put(msg, IFLA_VLAN_QOS_MAPPING, sizeof(nl_qos_map), &nl_qos_map);
  1153. }
  1154. nla_nest_end(msg, qos);
  1155. if (!(qos = nla_nest_start(msg, IFLA_VLAN_EGRESS_QOS)))
  1156. goto nla_put_failure;
  1157. vlist_simple_for_each_element(&cfg->egress_qos_mapping_list, elem, node) {
  1158. nl_qos_map.from = elem->from;
  1159. nl_qos_map.to = elem->to;
  1160. nla_put(msg, IFLA_VLAN_QOS_MAPPING, sizeof(nl_qos_map), &nl_qos_map);
  1161. }
  1162. nla_nest_end(msg, qos);
  1163. nla_nest_end(msg, data);
  1164. nla_nest_end(msg, linkinfo);
  1165. rv = system_rtnl_call(msg);
  1166. if (rv)
  1167. D(SYSTEM, "Error adding vlandev '%s' over '%s': %d\n", vlandev->ifname, dev->ifname, rv);
  1168. return rv;
  1169. nla_put_failure:
  1170. nlmsg_free(msg);
  1171. return -ENOMEM;
  1172. }
  1173. int system_vlandev_del(struct device *vlandev)
  1174. {
  1175. return system_link_del(vlandev->ifname);
  1176. }
  1177. void
  1178. system_if_get_settings(struct device *dev, struct device_settings *s)
  1179. {
  1180. struct ifreq ifr;
  1181. char buf[10];
  1182. memset(&ifr, 0, sizeof(ifr));
  1183. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1184. if (ioctl(sock_ioctl, SIOCGIFMTU, &ifr) == 0) {
  1185. s->mtu = ifr.ifr_mtu;
  1186. s->flags |= DEV_OPT_MTU;
  1187. }
  1188. s->mtu6 = system_update_ipv6_mtu(dev, 0);
  1189. if (s->mtu6 > 0)
  1190. s->flags |= DEV_OPT_MTU6;
  1191. if (ioctl(sock_ioctl, SIOCGIFTXQLEN, &ifr) == 0) {
  1192. s->txqueuelen = ifr.ifr_qlen;
  1193. s->flags |= DEV_OPT_TXQUEUELEN;
  1194. }
  1195. if (ioctl(sock_ioctl, SIOCGIFHWADDR, &ifr) == 0) {
  1196. memcpy(s->macaddr, &ifr.ifr_hwaddr.sa_data, sizeof(s->macaddr));
  1197. s->flags |= DEV_OPT_MACADDR;
  1198. }
  1199. if (!system_get_disable_ipv6(dev, buf, sizeof(buf))) {
  1200. s->ipv6 = !strtoul(buf, NULL, 0);
  1201. s->flags |= DEV_OPT_IPV6;
  1202. }
  1203. if (ioctl(sock_ioctl, SIOCGIFFLAGS, &ifr) == 0) {
  1204. s->promisc = ifr.ifr_flags & IFF_PROMISC;
  1205. s->flags |= DEV_OPT_PROMISC;
  1206. s->multicast = ifr.ifr_flags & IFF_MULTICAST;
  1207. s->flags |= DEV_OPT_MULTICAST;
  1208. }
  1209. if (!system_get_rpfilter(dev, buf, sizeof(buf))) {
  1210. s->rpfilter = strtoul(buf, NULL, 0);
  1211. s->flags |= DEV_OPT_RPFILTER;
  1212. }
  1213. if (!system_get_acceptlocal(dev, buf, sizeof(buf))) {
  1214. s->acceptlocal = strtoul(buf, NULL, 0);
  1215. s->flags |= DEV_OPT_ACCEPTLOCAL;
  1216. }
  1217. if (!system_get_igmpversion(dev, buf, sizeof(buf))) {
  1218. s->igmpversion = strtoul(buf, NULL, 0);
  1219. s->flags |= DEV_OPT_IGMPVERSION;
  1220. }
  1221. if (!system_get_mldversion(dev, buf, sizeof(buf))) {
  1222. s->mldversion = strtoul(buf, NULL, 0);
  1223. s->flags |= DEV_OPT_MLDVERSION;
  1224. }
  1225. if (!system_get_neigh4reachabletime(dev, buf, sizeof(buf))) {
  1226. s->neigh4reachabletime = strtoul(buf, NULL, 0);
  1227. s->flags |= DEV_OPT_NEIGHREACHABLETIME;
  1228. }
  1229. if (!system_get_neigh6reachabletime(dev, buf, sizeof(buf))) {
  1230. s->neigh6reachabletime = strtoul(buf, NULL, 0);
  1231. s->flags |= DEV_OPT_NEIGHREACHABLETIME;
  1232. }
  1233. if (!system_get_neigh4locktime(dev, buf, sizeof(buf))) {
  1234. s->neigh4locktime = strtol(buf, NULL, 0);
  1235. s->flags |= DEV_OPT_NEIGHLOCKTIME;
  1236. }
  1237. if (!system_get_neigh4gcstaletime(dev, buf, sizeof(buf))) {
  1238. s->neigh4gcstaletime = strtoul(buf, NULL, 0);
  1239. s->flags |= DEV_OPT_NEIGHGCSTALETIME;
  1240. }
  1241. if (!system_get_neigh6gcstaletime(dev, buf, sizeof(buf))) {
  1242. s->neigh6gcstaletime = strtoul(buf, NULL, 0);
  1243. s->flags |= DEV_OPT_NEIGHGCSTALETIME;
  1244. }
  1245. if (!system_get_dadtransmits(dev, buf, sizeof(buf))) {
  1246. s->dadtransmits = strtoul(buf, NULL, 0);
  1247. s->flags |= DEV_OPT_DADTRANSMITS;
  1248. }
  1249. if (!system_get_sendredirects(dev, buf, sizeof(buf))) {
  1250. s->sendredirects = strtoul(buf, NULL, 0);
  1251. s->flags |= DEV_OPT_SENDREDIRECTS;
  1252. }
  1253. }
  1254. void
  1255. system_if_apply_settings(struct device *dev, struct device_settings *s, unsigned int apply_mask)
  1256. {
  1257. struct ifreq ifr;
  1258. char buf[12];
  1259. memset(&ifr, 0, sizeof(ifr));
  1260. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1261. if (s->flags & DEV_OPT_MTU & apply_mask) {
  1262. ifr.ifr_mtu = s->mtu;
  1263. if (ioctl(sock_ioctl, SIOCSIFMTU, &ifr) < 0)
  1264. s->flags &= ~DEV_OPT_MTU;
  1265. }
  1266. if (s->flags & DEV_OPT_MTU6 & apply_mask) {
  1267. system_update_ipv6_mtu(dev, s->mtu6);
  1268. }
  1269. if (s->flags & DEV_OPT_TXQUEUELEN & apply_mask) {
  1270. ifr.ifr_qlen = s->txqueuelen;
  1271. if (ioctl(sock_ioctl, SIOCSIFTXQLEN, &ifr) < 0)
  1272. s->flags &= ~DEV_OPT_TXQUEUELEN;
  1273. }
  1274. if ((s->flags & DEV_OPT_MACADDR & apply_mask) && !dev->external) {
  1275. ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
  1276. memcpy(&ifr.ifr_hwaddr.sa_data, s->macaddr, sizeof(s->macaddr));
  1277. if (ioctl(sock_ioctl, SIOCSIFHWADDR, &ifr) < 0)
  1278. s->flags &= ~DEV_OPT_MACADDR;
  1279. }
  1280. if (s->flags & DEV_OPT_IPV6 & apply_mask)
  1281. system_set_disable_ipv6(dev, s->ipv6 ? "0" : "1");
  1282. if (s->flags & DEV_OPT_PROMISC & apply_mask) {
  1283. if (system_if_flags(dev->ifname, s->promisc ? IFF_PROMISC : 0,
  1284. !s->promisc ? IFF_PROMISC : 0) < 0)
  1285. s->flags &= ~DEV_OPT_PROMISC;
  1286. }
  1287. if (s->flags & DEV_OPT_RPFILTER & apply_mask) {
  1288. snprintf(buf, sizeof(buf), "%u", s->rpfilter);
  1289. system_set_rpfilter(dev, buf);
  1290. }
  1291. if (s->flags & DEV_OPT_ACCEPTLOCAL & apply_mask)
  1292. system_set_acceptlocal(dev, s->acceptlocal ? "1" : "0");
  1293. if (s->flags & DEV_OPT_IGMPVERSION & apply_mask) {
  1294. snprintf(buf, sizeof(buf), "%u", s->igmpversion);
  1295. system_set_igmpversion(dev, buf);
  1296. }
  1297. if (s->flags & DEV_OPT_MLDVERSION & apply_mask) {
  1298. snprintf(buf, sizeof(buf), "%u", s->mldversion);
  1299. system_set_mldversion(dev, buf);
  1300. }
  1301. if (s->flags & DEV_OPT_NEIGHREACHABLETIME & apply_mask) {
  1302. snprintf(buf, sizeof(buf), "%u", s->neigh4reachabletime);
  1303. system_set_neigh4reachabletime(dev, buf);
  1304. snprintf(buf, sizeof(buf), "%u", s->neigh6reachabletime);
  1305. system_set_neigh6reachabletime(dev, buf);
  1306. }
  1307. if (s->flags & DEV_OPT_NEIGHLOCKTIME & apply_mask) {
  1308. snprintf(buf, sizeof(buf), "%d", s->neigh4locktime);
  1309. system_set_neigh4locktime(dev, buf);
  1310. }
  1311. if (s->flags & DEV_OPT_NEIGHGCSTALETIME & apply_mask) {
  1312. snprintf(buf, sizeof(buf), "%u", s->neigh4gcstaletime);
  1313. system_set_neigh4gcstaletime(dev, buf);
  1314. snprintf(buf, sizeof(buf), "%u", s->neigh6gcstaletime);
  1315. system_set_neigh6gcstaletime(dev, buf);
  1316. }
  1317. if (s->flags & DEV_OPT_DADTRANSMITS & apply_mask) {
  1318. snprintf(buf, sizeof(buf), "%u", s->dadtransmits);
  1319. system_set_dadtransmits(dev, buf);
  1320. }
  1321. if (s->flags & DEV_OPT_MULTICAST & apply_mask) {
  1322. if (system_if_flags(dev->ifname, s->multicast ? IFF_MULTICAST : 0,
  1323. !s->multicast ? IFF_MULTICAST : 0) < 0)
  1324. s->flags &= ~DEV_OPT_MULTICAST;
  1325. }
  1326. if (s->flags & DEV_OPT_SENDREDIRECTS & apply_mask)
  1327. system_set_sendredirects(dev, s->sendredirects ? "1" : "0");
  1328. }
  1329. int system_if_up(struct device *dev)
  1330. {
  1331. system_if_get_settings(dev, &dev->orig_settings);
  1332. /* Only keep orig settings based on what needs to be set */
  1333. dev->orig_settings.valid_flags = dev->orig_settings.flags;
  1334. dev->orig_settings.flags &= dev->settings.flags;
  1335. system_if_apply_settings(dev, &dev->settings, dev->settings.flags);
  1336. return system_if_flags(dev->ifname, IFF_UP, 0);
  1337. }
  1338. int system_if_down(struct device *dev)
  1339. {
  1340. int ret = system_if_flags(dev->ifname, 0, IFF_UP);
  1341. system_if_apply_settings(dev, &dev->orig_settings, dev->orig_settings.flags);
  1342. return ret;
  1343. }
  1344. struct if_check_data {
  1345. struct device *dev;
  1346. int pending;
  1347. int ret;
  1348. };
  1349. #ifndef IFF_LOWER_UP
  1350. #define IFF_LOWER_UP 0x10000
  1351. #endif
  1352. static int cb_if_check_valid(struct nl_msg *msg, void *arg)
  1353. {
  1354. struct nlmsghdr *nh = nlmsg_hdr(msg);
  1355. struct ifinfomsg *ifi = NLMSG_DATA(nh);
  1356. struct if_check_data *chk = (struct if_check_data *)arg;
  1357. if (nh->nlmsg_type != RTM_NEWLINK)
  1358. return NL_SKIP;
  1359. device_set_present(chk->dev, ifi->ifi_index > 0 ? true : false);
  1360. device_set_link(chk->dev, ifi->ifi_flags & IFF_LOWER_UP ? true : false);
  1361. return NL_OK;
  1362. }
  1363. static int cb_if_check_ack(struct nl_msg *msg, void *arg)
  1364. {
  1365. struct if_check_data *chk = (struct if_check_data *)arg;
  1366. chk->pending = 0;
  1367. return NL_STOP;
  1368. }
  1369. static int cb_if_check_error(struct sockaddr_nl *nla, struct nlmsgerr *err, void *arg)
  1370. {
  1371. struct if_check_data *chk = (struct if_check_data *)arg;
  1372. device_set_present(chk->dev, false);
  1373. device_set_link(chk->dev, false);
  1374. chk->pending = err->error;
  1375. return NL_STOP;
  1376. }
  1377. int system_if_check(struct device *dev)
  1378. {
  1379. struct nl_cb *cb = nl_cb_alloc(NL_CB_DEFAULT);
  1380. struct nl_msg *msg;
  1381. struct ifinfomsg ifi = {
  1382. .ifi_family = AF_UNSPEC,
  1383. .ifi_index = 0,
  1384. };
  1385. struct if_check_data chk = {
  1386. .dev = dev,
  1387. .pending = 1,
  1388. };
  1389. int ret = 1;
  1390. if (!cb)
  1391. return ret;
  1392. msg = nlmsg_alloc_simple(RTM_GETLINK, 0);
  1393. if (!msg)
  1394. goto out;
  1395. if (nlmsg_append(msg, &ifi, sizeof(ifi), 0) ||
  1396. nla_put_string(msg, IFLA_IFNAME, dev->ifname))
  1397. goto free;
  1398. nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, cb_if_check_valid, &chk);
  1399. nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, cb_if_check_ack, &chk);
  1400. nl_cb_err(cb, NL_CB_CUSTOM, cb_if_check_error, &chk);
  1401. ret = nl_send_auto_complete(sock_rtnl, msg);
  1402. if (ret < 0)
  1403. goto free;
  1404. while (chk.pending > 0)
  1405. nl_recvmsgs(sock_rtnl, cb);
  1406. ret = chk.pending;
  1407. free:
  1408. nlmsg_free(msg);
  1409. out:
  1410. nl_cb_put(cb);
  1411. return ret;
  1412. }
  1413. struct device *
  1414. system_if_get_parent(struct device *dev)
  1415. {
  1416. char buf[64], *devname;
  1417. int ifindex, iflink, len;
  1418. FILE *f;
  1419. snprintf(buf, sizeof(buf), "/sys/class/net/%s/iflink", dev->ifname);
  1420. f = fopen(buf, "r");
  1421. if (!f)
  1422. return NULL;
  1423. len = fread(buf, 1, sizeof(buf) - 1, f);
  1424. fclose(f);
  1425. if (len <= 0)
  1426. return NULL;
  1427. buf[len] = 0;
  1428. iflink = strtoul(buf, NULL, 0);
  1429. ifindex = system_if_resolve(dev);
  1430. if (!iflink || iflink == ifindex)
  1431. return NULL;
  1432. devname = if_indextoname(iflink, buf);
  1433. if (!devname)
  1434. return NULL;
  1435. return device_get(devname, true);
  1436. }
  1437. static bool
  1438. read_string_file(int dir_fd, const char *file, char *buf, int len)
  1439. {
  1440. bool ret = false;
  1441. char *c;
  1442. int fd;
  1443. fd = openat(dir_fd, file, O_RDONLY);
  1444. if (fd < 0)
  1445. return false;
  1446. retry:
  1447. len = read(fd, buf, len - 1);
  1448. if (len < 0) {
  1449. if (errno == EINTR)
  1450. goto retry;
  1451. } else if (len > 0) {
  1452. buf[len] = 0;
  1453. c = strchr(buf, '\n');
  1454. if (c)
  1455. *c = 0;
  1456. ret = true;
  1457. }
  1458. close(fd);
  1459. return ret;
  1460. }
  1461. static bool
  1462. read_uint64_file(int dir_fd, const char *file, uint64_t *val)
  1463. {
  1464. char buf[64];
  1465. bool ret = false;
  1466. ret = read_string_file(dir_fd, file, buf, sizeof(buf));
  1467. if (ret)
  1468. *val = strtoull(buf, NULL, 0);
  1469. return ret;
  1470. }
  1471. /* Assume advertised flags == supported flags */
  1472. static const struct {
  1473. uint32_t mask;
  1474. const char *name;
  1475. } ethtool_link_modes[] = {
  1476. { ADVERTISED_10baseT_Half, "10baseT-H" },
  1477. { ADVERTISED_10baseT_Full, "10baseT-F" },
  1478. { ADVERTISED_100baseT_Half, "100baseT-H" },
  1479. { ADVERTISED_100baseT_Full, "100baseT-F" },
  1480. { ADVERTISED_1000baseT_Half, "1000baseT-H" },
  1481. { ADVERTISED_1000baseT_Full, "1000baseT-F" },
  1482. { ADVERTISED_1000baseKX_Full, "1000baseKX-F" },
  1483. { ADVERTISED_2500baseX_Full, "2500baseX-F" },
  1484. { ADVERTISED_10000baseT_Full, "10000baseT-F" },
  1485. { ADVERTISED_10000baseKX4_Full, "10000baseKX4-F" },
  1486. { ADVERTISED_10000baseKR_Full, "10000baseKR-F" },
  1487. { ADVERTISED_20000baseMLD2_Full, "20000baseMLD2-F" },
  1488. { ADVERTISED_20000baseKR2_Full, "20000baseKR2-F" },
  1489. { ADVERTISED_40000baseKR4_Full, "40000baseKR4-F" },
  1490. { ADVERTISED_40000baseCR4_Full, "40000baseCR4-F" },
  1491. { ADVERTISED_40000baseSR4_Full, "40000baseSR4-F" },
  1492. { ADVERTISED_40000baseLR4_Full, "40000baseLR4-F" },
  1493. #ifdef ADVERTISED_56000baseKR4_Full
  1494. { ADVERTISED_56000baseKR4_Full, "56000baseKR4-F" },
  1495. { ADVERTISED_56000baseCR4_Full, "56000baseCR4-F" },
  1496. { ADVERTISED_56000baseSR4_Full, "56000baseSR4-F" },
  1497. { ADVERTISED_56000baseLR4_Full, "56000baseLR4-F" },
  1498. #endif
  1499. };
  1500. static void system_add_link_modes(struct blob_buf *b, __u32 mask)
  1501. {
  1502. int i;
  1503. for (i = 0; i < ARRAY_SIZE(ethtool_link_modes); i++) {
  1504. if (mask & ethtool_link_modes[i].mask)
  1505. blobmsg_add_string(b, NULL, ethtool_link_modes[i].name);
  1506. }
  1507. }
  1508. bool
  1509. system_if_force_external(const char *ifname)
  1510. {
  1511. char buf[64];
  1512. struct stat s;
  1513. snprintf(buf, sizeof(buf), "/sys/class/net/%s/phy80211", ifname);
  1514. return stat(buf, &s) == 0;
  1515. }
  1516. int
  1517. system_if_dump_info(struct device *dev, struct blob_buf *b)
  1518. {
  1519. struct ethtool_cmd ecmd;
  1520. struct ifreq ifr;
  1521. char *s;
  1522. void *c;
  1523. memset(&ecmd, 0, sizeof(ecmd));
  1524. memset(&ifr, 0, sizeof(ifr));
  1525. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1526. ifr.ifr_data = (caddr_t) &ecmd;
  1527. ecmd.cmd = ETHTOOL_GSET;
  1528. if (ioctl(sock_ioctl, SIOCETHTOOL, &ifr) == 0) {
  1529. c = blobmsg_open_array(b, "link-advertising");
  1530. system_add_link_modes(b, ecmd.advertising);
  1531. blobmsg_close_array(b, c);
  1532. c = blobmsg_open_array(b, "link-partner-advertising");
  1533. system_add_link_modes(b, ecmd.lp_advertising);
  1534. blobmsg_close_array(b, c);
  1535. c = blobmsg_open_array(b, "link-supported");
  1536. system_add_link_modes(b, ecmd.supported);
  1537. blobmsg_close_array(b, c);
  1538. s = blobmsg_alloc_string_buffer(b, "speed", 8);
  1539. snprintf(s, 8, "%d%c", ethtool_cmd_speed(&ecmd),
  1540. ecmd.duplex == DUPLEX_HALF ? 'H' : 'F');
  1541. blobmsg_add_string_buffer(b);
  1542. blobmsg_add_u8(b, "autoneg", !!ecmd.autoneg);
  1543. }
  1544. return 0;
  1545. }
  1546. int
  1547. system_if_dump_stats(struct device *dev, struct blob_buf *b)
  1548. {
  1549. const char *const counters[] = {
  1550. "collisions", "rx_frame_errors", "tx_compressed",
  1551. "multicast", "rx_length_errors", "tx_dropped",
  1552. "rx_bytes", "rx_missed_errors", "tx_errors",
  1553. "rx_compressed", "rx_over_errors", "tx_fifo_errors",
  1554. "rx_crc_errors", "rx_packets", "tx_heartbeat_errors",
  1555. "rx_dropped", "tx_aborted_errors", "tx_packets",
  1556. "rx_errors", "tx_bytes", "tx_window_errors",
  1557. "rx_fifo_errors", "tx_carrier_errors",
  1558. };
  1559. char buf[64];
  1560. int stats_dir;
  1561. int i;
  1562. uint64_t val = 0;
  1563. snprintf(buf, sizeof(buf), "/sys/class/net/%s/statistics", dev->ifname);
  1564. stats_dir = open(buf, O_DIRECTORY);
  1565. if (stats_dir < 0)
  1566. return -1;
  1567. for (i = 0; i < ARRAY_SIZE(counters); i++)
  1568. if (read_uint64_file(stats_dir, counters[i], &val))
  1569. blobmsg_add_u64(b, counters[i], val);
  1570. close(stats_dir);
  1571. return 0;
  1572. }
  1573. static int system_addr(struct device *dev, struct device_addr *addr, int cmd)
  1574. {
  1575. bool v4 = ((addr->flags & DEVADDR_FAMILY) == DEVADDR_INET4);
  1576. int alen = v4 ? 4 : 16;
  1577. unsigned int flags = 0;
  1578. struct ifaddrmsg ifa = {
  1579. .ifa_family = (alen == 4) ? AF_INET : AF_INET6,
  1580. .ifa_prefixlen = addr->mask,
  1581. .ifa_index = dev->ifindex,
  1582. };
  1583. struct nl_msg *msg;
  1584. if (cmd == RTM_NEWADDR)
  1585. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1586. msg = nlmsg_alloc_simple(cmd, flags);
  1587. if (!msg)
  1588. return -1;
  1589. nlmsg_append(msg, &ifa, sizeof(ifa), 0);
  1590. nla_put(msg, IFA_LOCAL, alen, &addr->addr);
  1591. if (v4) {
  1592. if (addr->broadcast)
  1593. nla_put_u32(msg, IFA_BROADCAST, addr->broadcast);
  1594. if (addr->point_to_point)
  1595. nla_put_u32(msg, IFA_ADDRESS, addr->point_to_point);
  1596. } else {
  1597. time_t now = system_get_rtime();
  1598. struct ifa_cacheinfo cinfo = {0xffffffffU, 0xffffffffU, 0, 0};
  1599. if (addr->preferred_until) {
  1600. int64_t preferred = addr->preferred_until - now;
  1601. if (preferred < 0)
  1602. preferred = 0;
  1603. else if (preferred > UINT32_MAX)
  1604. preferred = UINT32_MAX;
  1605. cinfo.ifa_prefered = preferred;
  1606. }
  1607. if (addr->valid_until) {
  1608. int64_t valid = addr->valid_until - now;
  1609. if (valid <= 0) {
  1610. nlmsg_free(msg);
  1611. return -1;
  1612. }
  1613. else if (valid > UINT32_MAX)
  1614. valid = UINT32_MAX;
  1615. cinfo.ifa_valid = valid;
  1616. }
  1617. nla_put(msg, IFA_CACHEINFO, sizeof(cinfo), &cinfo);
  1618. if (cmd == RTM_NEWADDR && (addr->flags & DEVADDR_OFFLINK))
  1619. nla_put_u32(msg, IFA_FLAGS, IFA_F_NOPREFIXROUTE);
  1620. }
  1621. return system_rtnl_call(msg);
  1622. }
  1623. int system_add_address(struct device *dev, struct device_addr *addr)
  1624. {
  1625. return system_addr(dev, addr, RTM_NEWADDR);
  1626. }
  1627. int system_del_address(struct device *dev, struct device_addr *addr)
  1628. {
  1629. return system_addr(dev, addr, RTM_DELADDR);
  1630. }
  1631. static int system_neigh(struct device *dev, struct device_neighbor *neighbor, int cmd)
  1632. {
  1633. int alen = ((neighbor->flags & DEVADDR_FAMILY) == DEVADDR_INET4) ? 4 : 16;
  1634. unsigned int flags = 0;
  1635. struct ndmsg ndm = {
  1636. .ndm_family = (alen == 4) ? AF_INET : AF_INET6,
  1637. .ndm_ifindex = dev->ifindex,
  1638. .ndm_state = NUD_PERMANENT,
  1639. .ndm_flags = (neighbor->proxy ? NTF_PROXY : 0) | (neighbor->router ? NTF_ROUTER : 0),
  1640. };
  1641. struct nl_msg *msg;
  1642. if (cmd == RTM_NEWNEIGH)
  1643. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1644. msg = nlmsg_alloc_simple(cmd, flags);
  1645. if (!msg)
  1646. return -1;
  1647. nlmsg_append(msg, &ndm, sizeof(ndm), 0);
  1648. nla_put(msg, NDA_DST, alen, &neighbor->addr);
  1649. if (neighbor->flags & DEVNEIGH_MAC)
  1650. nla_put(msg, NDA_LLADDR, sizeof(neighbor->macaddr), &neighbor->macaddr);
  1651. return system_rtnl_call(msg);
  1652. }
  1653. int system_add_neighbor(struct device *dev, struct device_neighbor *neighbor)
  1654. {
  1655. return system_neigh(dev, neighbor, RTM_NEWNEIGH);
  1656. }
  1657. int system_del_neighbor(struct device *dev, struct device_neighbor *neighbor)
  1658. {
  1659. return system_neigh(dev, neighbor, RTM_DELNEIGH);
  1660. }
  1661. static int system_rt(struct device *dev, struct device_route *route, int cmd)
  1662. {
  1663. int alen = ((route->flags & DEVADDR_FAMILY) == DEVADDR_INET4) ? 4 : 16;
  1664. bool have_gw;
  1665. unsigned int flags = 0;
  1666. if (alen == 4)
  1667. have_gw = !!route->nexthop.in.s_addr;
  1668. else
  1669. have_gw = route->nexthop.in6.s6_addr32[0] ||
  1670. route->nexthop.in6.s6_addr32[1] ||
  1671. route->nexthop.in6.s6_addr32[2] ||
  1672. route->nexthop.in6.s6_addr32[3];
  1673. unsigned int table = (route->flags & (DEVROUTE_TABLE | DEVROUTE_SRCTABLE))
  1674. ? route->table : RT_TABLE_MAIN;
  1675. struct rtmsg rtm = {
  1676. .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
  1677. .rtm_dst_len = route->mask,
  1678. .rtm_src_len = route->sourcemask,
  1679. .rtm_table = (table < 256) ? table : RT_TABLE_UNSPEC,
  1680. .rtm_protocol = (route->flags & DEVROUTE_PROTO) ? route->proto : RTPROT_STATIC,
  1681. .rtm_scope = RT_SCOPE_NOWHERE,
  1682. .rtm_type = (cmd == RTM_DELROUTE) ? 0: RTN_UNICAST,
  1683. .rtm_flags = (route->flags & DEVROUTE_ONLINK) ? RTNH_F_ONLINK : 0,
  1684. };
  1685. struct nl_msg *msg;
  1686. if (cmd == RTM_NEWROUTE) {
  1687. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1688. if (!dev) { /* Add null-route */
  1689. rtm.rtm_scope = RT_SCOPE_UNIVERSE;
  1690. rtm.rtm_type = RTN_UNREACHABLE;
  1691. }
  1692. else
  1693. rtm.rtm_scope = (have_gw) ? RT_SCOPE_UNIVERSE : RT_SCOPE_LINK;
  1694. }
  1695. if (route->flags & DEVROUTE_TYPE) {
  1696. rtm.rtm_type = route->type;
  1697. if (!(route->flags & (DEVROUTE_TABLE | DEVROUTE_SRCTABLE))) {
  1698. if (rtm.rtm_type == RTN_LOCAL || rtm.rtm_type == RTN_BROADCAST ||
  1699. rtm.rtm_type == RTN_NAT || rtm.rtm_type == RTN_ANYCAST)
  1700. rtm.rtm_table = RT_TABLE_LOCAL;
  1701. }
  1702. if (rtm.rtm_type == RTN_LOCAL || rtm.rtm_type == RTN_NAT) {
  1703. rtm.rtm_scope = RT_SCOPE_HOST;
  1704. } else if (rtm.rtm_type == RTN_BROADCAST || rtm.rtm_type == RTN_MULTICAST ||
  1705. rtm.rtm_type == RTN_ANYCAST) {
  1706. rtm.rtm_scope = RT_SCOPE_LINK;
  1707. } else if (rtm.rtm_type == RTN_BLACKHOLE || rtm.rtm_type == RTN_UNREACHABLE ||
  1708. rtm.rtm_type == RTN_PROHIBIT || rtm.rtm_type == RTN_FAILED_POLICY ||
  1709. rtm.rtm_type == RTN_THROW) {
  1710. rtm.rtm_scope = RT_SCOPE_UNIVERSE;
  1711. dev = NULL;
  1712. }
  1713. }
  1714. msg = nlmsg_alloc_simple(cmd, flags);
  1715. if (!msg)
  1716. return -1;
  1717. nlmsg_append(msg, &rtm, sizeof(rtm), 0);
  1718. if (route->mask)
  1719. nla_put(msg, RTA_DST, alen, &route->addr);
  1720. if (route->sourcemask) {
  1721. if (rtm.rtm_family == AF_INET)
  1722. nla_put(msg, RTA_PREFSRC, alen, &route->source);
  1723. else
  1724. nla_put(msg, RTA_SRC, alen, &route->source);
  1725. }
  1726. if (route->metric > 0)
  1727. nla_put_u32(msg, RTA_PRIORITY, route->metric);
  1728. if (have_gw)
  1729. nla_put(msg, RTA_GATEWAY, alen, &route->nexthop);
  1730. if (dev)
  1731. nla_put_u32(msg, RTA_OIF, dev->ifindex);
  1732. if (table >= 256)
  1733. nla_put_u32(msg, RTA_TABLE, table);
  1734. if (route->flags & DEVROUTE_MTU) {
  1735. struct nlattr *metrics;
  1736. if (!(metrics = nla_nest_start(msg, RTA_METRICS)))
  1737. goto nla_put_failure;
  1738. nla_put_u32(msg, RTAX_MTU, route->mtu);
  1739. nla_nest_end(msg, metrics);
  1740. }
  1741. return system_rtnl_call(msg);
  1742. nla_put_failure:
  1743. nlmsg_free(msg);
  1744. return -ENOMEM;
  1745. }
  1746. int system_add_route(struct device *dev, struct device_route *route)
  1747. {
  1748. return system_rt(dev, route, RTM_NEWROUTE);
  1749. }
  1750. int system_del_route(struct device *dev, struct device_route *route)
  1751. {
  1752. return system_rt(dev, route, RTM_DELROUTE);
  1753. }
  1754. int system_flush_routes(void)
  1755. {
  1756. const char *names[] = {
  1757. "/proc/sys/net/ipv4/route/flush",
  1758. "/proc/sys/net/ipv6/route/flush"
  1759. };
  1760. int fd, i;
  1761. for (i = 0; i < ARRAY_SIZE(names); i++) {
  1762. fd = open(names[i], O_WRONLY);
  1763. if (fd < 0)
  1764. continue;
  1765. if (write(fd, "-1", 2)) {}
  1766. close(fd);
  1767. }
  1768. return 0;
  1769. }
  1770. bool system_resolve_rt_type(const char *type, unsigned int *id)
  1771. {
  1772. return system_rtn_aton(type, id);
  1773. }
  1774. bool system_resolve_rt_proto(const char *type, unsigned int *id)
  1775. {
  1776. FILE *f;
  1777. char *e, buf[128];
  1778. unsigned int n, proto = 256;
  1779. n = strtoul(type, &e, 0);
  1780. if (!*e && e != type)
  1781. proto = n;
  1782. else if (!strcmp(type, "unspec"))
  1783. proto = RTPROT_UNSPEC;
  1784. else if (!strcmp(type, "kernel"))
  1785. proto = RTPROT_KERNEL;
  1786. else if (!strcmp(type, "boot"))
  1787. proto = RTPROT_BOOT;
  1788. else if (!strcmp(type, "static"))
  1789. proto = RTPROT_STATIC;
  1790. else if ((f = fopen("/etc/iproute2/rt_protos", "r")) != NULL) {
  1791. while (fgets(buf, sizeof(buf) - 1, f) != NULL) {
  1792. if ((e = strtok(buf, " \t\n")) == NULL || *e == '#')
  1793. continue;
  1794. n = strtoul(e, NULL, 10);
  1795. e = strtok(NULL, " \t\n");
  1796. if (e && !strcmp(e, type)) {
  1797. proto = n;
  1798. break;
  1799. }
  1800. }
  1801. fclose(f);
  1802. }
  1803. if (proto > 255)
  1804. return false;
  1805. *id = proto;
  1806. return true;
  1807. }
  1808. bool system_resolve_rt_table(const char *name, unsigned int *id)
  1809. {
  1810. FILE *f;
  1811. char *e, buf[128];
  1812. unsigned int n, table = RT_TABLE_UNSPEC;
  1813. /* first try to parse table as number */
  1814. if ((n = strtoul(name, &e, 0)) > 0 && !*e)
  1815. table = n;
  1816. /* handle well known aliases */
  1817. else if (!strcmp(name, "default"))
  1818. table = RT_TABLE_DEFAULT;
  1819. else if (!strcmp(name, "main"))
  1820. table = RT_TABLE_MAIN;
  1821. else if (!strcmp(name, "local"))
  1822. table = RT_TABLE_LOCAL;
  1823. /* try to look up name in /etc/iproute2/rt_tables */
  1824. else if ((f = fopen("/etc/iproute2/rt_tables", "r")) != NULL)
  1825. {
  1826. while (fgets(buf, sizeof(buf) - 1, f) != NULL)
  1827. {
  1828. if ((e = strtok(buf, " \t\n")) == NULL || *e == '#')
  1829. continue;
  1830. n = strtoul(e, NULL, 10);
  1831. e = strtok(NULL, " \t\n");
  1832. if (e && !strcmp(e, name))
  1833. {
  1834. table = n;
  1835. break;
  1836. }
  1837. }
  1838. fclose(f);
  1839. }
  1840. if (table == RT_TABLE_UNSPEC)
  1841. return false;
  1842. *id = table;
  1843. return true;
  1844. }
  1845. bool system_is_default_rt_table(unsigned int id)
  1846. {
  1847. return (id == RT_TABLE_MAIN);
  1848. }
  1849. bool system_resolve_rpfilter(const char *filter, unsigned int *id)
  1850. {
  1851. char *e;
  1852. unsigned int n;
  1853. if (!strcmp(filter, "strict"))
  1854. n = 1;
  1855. else if (!strcmp(filter, "loose"))
  1856. n = 2;
  1857. else {
  1858. n = strtoul(filter, &e, 0);
  1859. if (*e || e == filter || n > 2)
  1860. return false;
  1861. }
  1862. *id = n;
  1863. return true;
  1864. }
  1865. static int system_iprule(struct iprule *rule, int cmd)
  1866. {
  1867. int alen = ((rule->flags & IPRULE_FAMILY) == IPRULE_INET4) ? 4 : 16;
  1868. struct nl_msg *msg;
  1869. struct rtmsg rtm = {
  1870. .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
  1871. .rtm_protocol = RTPROT_STATIC,
  1872. .rtm_scope = RT_SCOPE_UNIVERSE,
  1873. .rtm_table = RT_TABLE_UNSPEC,
  1874. .rtm_type = RTN_UNSPEC,
  1875. .rtm_flags = 0,
  1876. };
  1877. if (cmd == RTM_NEWRULE)
  1878. rtm.rtm_type = RTN_UNICAST;
  1879. if (rule->invert)
  1880. rtm.rtm_flags |= FIB_RULE_INVERT;
  1881. if (rule->flags & IPRULE_SRC)
  1882. rtm.rtm_src_len = rule->src_mask;
  1883. if (rule->flags & IPRULE_DEST)
  1884. rtm.rtm_dst_len = rule->dest_mask;
  1885. if (rule->flags & IPRULE_TOS)
  1886. rtm.rtm_tos = rule->tos;
  1887. if (rule->flags & IPRULE_LOOKUP) {
  1888. if (rule->lookup < 256)
  1889. rtm.rtm_table = rule->lookup;
  1890. }
  1891. if (rule->flags & IPRULE_ACTION)
  1892. rtm.rtm_type = rule->action;
  1893. else if (rule->flags & IPRULE_GOTO)
  1894. rtm.rtm_type = FR_ACT_GOTO;
  1895. else if (!(rule->flags & (IPRULE_LOOKUP | IPRULE_ACTION | IPRULE_GOTO)))
  1896. rtm.rtm_type = FR_ACT_NOP;
  1897. msg = nlmsg_alloc_simple(cmd, NLM_F_REQUEST);
  1898. if (!msg)
  1899. return -1;
  1900. nlmsg_append(msg, &rtm, sizeof(rtm), 0);
  1901. if (rule->flags & IPRULE_IN)
  1902. nla_put(msg, FRA_IFNAME, strlen(rule->in_dev) + 1, rule->in_dev);
  1903. if (rule->flags & IPRULE_OUT)
  1904. nla_put(msg, FRA_OIFNAME, strlen(rule->out_dev) + 1, rule->out_dev);
  1905. if (rule->flags & IPRULE_SRC)
  1906. nla_put(msg, FRA_SRC, alen, &rule->src_addr);
  1907. if (rule->flags & IPRULE_DEST)
  1908. nla_put(msg, FRA_DST, alen, &rule->dest_addr);
  1909. if (rule->flags & IPRULE_PRIORITY)
  1910. nla_put_u32(msg, FRA_PRIORITY, rule->priority);
  1911. else if (cmd == RTM_NEWRULE)
  1912. nla_put_u32(msg, FRA_PRIORITY, rule->order);
  1913. if (rule->flags & IPRULE_FWMARK)
  1914. nla_put_u32(msg, FRA_FWMARK, rule->fwmark);
  1915. if (rule->flags & IPRULE_FWMASK)
  1916. nla_put_u32(msg, FRA_FWMASK, rule->fwmask);
  1917. if (rule->flags & IPRULE_LOOKUP) {
  1918. if (rule->lookup >= 256)
  1919. nla_put_u32(msg, FRA_TABLE, rule->lookup);
  1920. }
  1921. if (rule->flags & IPRULE_SUP_PREFIXLEN)
  1922. nla_put_u32(msg, FRA_SUPPRESS_PREFIXLEN, rule->sup_prefixlen);
  1923. if (rule->flags & IPRULE_GOTO)
  1924. nla_put_u32(msg, FRA_GOTO, rule->gotoid);
  1925. return system_rtnl_call(msg);
  1926. }
  1927. int system_add_iprule(struct iprule *rule)
  1928. {
  1929. return system_iprule(rule, RTM_NEWRULE);
  1930. }
  1931. int system_del_iprule(struct iprule *rule)
  1932. {
  1933. return system_iprule(rule, RTM_DELRULE);
  1934. }
  1935. int system_flush_iprules(void)
  1936. {
  1937. int rv = 0;
  1938. struct iprule rule;
  1939. system_if_clear_entries(NULL, RTM_GETRULE, AF_INET);
  1940. system_if_clear_entries(NULL, RTM_GETRULE, AF_INET6);
  1941. memset(&rule, 0, sizeof(rule));
  1942. rule.flags = IPRULE_INET4 | IPRULE_PRIORITY | IPRULE_LOOKUP;
  1943. rule.priority = 0;
  1944. rule.lookup = RT_TABLE_LOCAL;
  1945. rv |= system_iprule(&rule, RTM_NEWRULE);
  1946. rule.priority = 32766;
  1947. rule.lookup = RT_TABLE_MAIN;
  1948. rv |= system_iprule(&rule, RTM_NEWRULE);
  1949. rule.priority = 32767;
  1950. rule.lookup = RT_TABLE_DEFAULT;
  1951. rv |= system_iprule(&rule, RTM_NEWRULE);
  1952. rule.flags = IPRULE_INET6 | IPRULE_PRIORITY | IPRULE_LOOKUP;
  1953. rule.priority = 0;
  1954. rule.lookup = RT_TABLE_LOCAL;
  1955. rv |= system_iprule(&rule, RTM_NEWRULE);
  1956. rule.priority = 32766;
  1957. rule.lookup = RT_TABLE_MAIN;
  1958. rv |= system_iprule(&rule, RTM_NEWRULE);
  1959. return rv;
  1960. }
  1961. bool system_resolve_iprule_action(const char *action, unsigned int *id)
  1962. {
  1963. return system_rtn_aton(action, id);
  1964. }
  1965. time_t system_get_rtime(void)
  1966. {
  1967. struct timespec ts;
  1968. struct timeval tv;
  1969. if (clock_gettime(CLOCK_MONOTONIC, &ts) == 0)
  1970. return ts.tv_sec;
  1971. if (gettimeofday(&tv, NULL) == 0)
  1972. return tv.tv_sec;
  1973. return 0;
  1974. }
  1975. #ifndef IP_DF
  1976. #define IP_DF 0x4000
  1977. #endif
  1978. static int tunnel_ioctl(const char *name, int cmd, void *p)
  1979. {
  1980. struct ifreq ifr;
  1981. memset(&ifr, 0, sizeof(ifr));
  1982. strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name) - 1);
  1983. ifr.ifr_ifru.ifru_data = p;
  1984. return ioctl(sock_ioctl, cmd, &ifr);
  1985. }
  1986. #ifdef IFLA_IPTUN_MAX
  1987. static int system_add_ip6_tunnel(const char *name, const unsigned int link,
  1988. struct blob_attr **tb)
  1989. {
  1990. struct nl_msg *nlm = nlmsg_alloc_simple(RTM_NEWLINK,
  1991. NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  1992. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC };
  1993. struct blob_attr *cur;
  1994. int ret = 0, ttl = 0;
  1995. if (!nlm)
  1996. return -1;
  1997. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  1998. nla_put_string(nlm, IFLA_IFNAME, name);
  1999. if (link)
  2000. nla_put_u32(nlm, IFLA_LINK, link);
  2001. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2002. if (!linkinfo) {
  2003. ret = -ENOMEM;
  2004. goto failure;
  2005. }
  2006. nla_put_string(nlm, IFLA_INFO_KIND, "ip6tnl");
  2007. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2008. if (!infodata) {
  2009. ret = -ENOMEM;
  2010. goto failure;
  2011. }
  2012. if (link)
  2013. nla_put_u32(nlm, IFLA_IPTUN_LINK, link);
  2014. if ((cur = tb[TUNNEL_ATTR_TTL]))
  2015. ttl = blobmsg_get_u32(cur);
  2016. nla_put_u8(nlm, IFLA_IPTUN_PROTO, IPPROTO_IPIP);
  2017. nla_put_u8(nlm, IFLA_IPTUN_TTL, (ttl) ? ttl : 64);
  2018. struct in6_addr in6buf;
  2019. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2020. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2021. ret = -EINVAL;
  2022. goto failure;
  2023. }
  2024. nla_put(nlm, IFLA_IPTUN_LOCAL, sizeof(in6buf), &in6buf);
  2025. }
  2026. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2027. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2028. ret = -EINVAL;
  2029. goto failure;
  2030. }
  2031. nla_put(nlm, IFLA_IPTUN_REMOTE, sizeof(in6buf), &in6buf);
  2032. }
  2033. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2034. struct blob_attr *tb_data[__IPIP6_DATA_ATTR_MAX];
  2035. uint32_t tun_flags = IP6_TNL_F_IGN_ENCAP_LIMIT;
  2036. blobmsg_parse(ipip6_data_attr_list.params, __IPIP6_DATA_ATTR_MAX, tb_data,
  2037. blobmsg_data(cur), blobmsg_len(cur));
  2038. if ((cur = tb_data[IPIP6_DATA_ENCAPLIMIT])) {
  2039. char *str = blobmsg_get_string(cur);
  2040. if (strcmp(str, "ignore")) {
  2041. char *e;
  2042. unsigned encap_limit = strtoul(str, &e, 0);
  2043. if (e == str || *e || encap_limit > 255) {
  2044. ret = -EINVAL;
  2045. goto failure;
  2046. }
  2047. nla_put_u8(nlm, IFLA_IPTUN_ENCAP_LIMIT, encap_limit);
  2048. tun_flags &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
  2049. }
  2050. }
  2051. #ifdef IFLA_IPTUN_FMR_MAX
  2052. if ((cur = tb_data[IPIP6_DATA_FMRS])) {
  2053. struct blob_attr *rcur;
  2054. unsigned rrem, fmrcnt = 0;
  2055. struct nlattr *fmrs = nla_nest_start(nlm, IFLA_IPTUN_FMRS);
  2056. if (!fmrs) {
  2057. ret = -ENOMEM;
  2058. goto failure;
  2059. }
  2060. blobmsg_for_each_attr(rcur, cur, rrem) {
  2061. struct blob_attr *tb_fmr[__FMR_DATA_ATTR_MAX], *tb_cur;
  2062. struct in6_addr ip6prefix;
  2063. struct in_addr ip4prefix;
  2064. unsigned ip4len, ip6len, ealen, offset;
  2065. blobmsg_parse(fmr_data_attr_list.params, __FMR_DATA_ATTR_MAX, tb_fmr,
  2066. blobmsg_data(rcur), blobmsg_len(rcur));
  2067. if (!(tb_cur = tb_fmr[FMR_DATA_PREFIX6]) ||
  2068. !parse_ip_and_netmask(AF_INET6,
  2069. blobmsg_data(tb_cur), &ip6prefix,
  2070. &ip6len)) {
  2071. ret = -EINVAL;
  2072. goto failure;
  2073. }
  2074. if (!(tb_cur = tb_fmr[FMR_DATA_PREFIX4]) ||
  2075. !parse_ip_and_netmask(AF_INET,
  2076. blobmsg_data(tb_cur), &ip4prefix,
  2077. &ip4len)) {
  2078. ret = -EINVAL;
  2079. goto failure;
  2080. }
  2081. if (!(tb_cur = tb_fmr[FMR_DATA_EALEN])) {
  2082. ret = -EINVAL;
  2083. goto failure;
  2084. }
  2085. ealen = blobmsg_get_u32(tb_cur);
  2086. if (!(tb_cur = tb_fmr[FMR_DATA_OFFSET])) {
  2087. ret = -EINVAL;
  2088. goto failure;
  2089. }
  2090. offset = blobmsg_get_u32(tb_cur);
  2091. struct nlattr *rule = nla_nest_start(nlm, ++fmrcnt);
  2092. if (!rule) {
  2093. ret = -ENOMEM;
  2094. goto failure;
  2095. }
  2096. nla_put(nlm, IFLA_IPTUN_FMR_IP6_PREFIX, sizeof(ip6prefix), &ip6prefix);
  2097. nla_put(nlm, IFLA_IPTUN_FMR_IP4_PREFIX, sizeof(ip4prefix), &ip4prefix);
  2098. nla_put_u8(nlm, IFLA_IPTUN_FMR_IP6_PREFIX_LEN, ip6len);
  2099. nla_put_u8(nlm, IFLA_IPTUN_FMR_IP4_PREFIX_LEN, ip4len);
  2100. nla_put_u8(nlm, IFLA_IPTUN_FMR_EA_LEN, ealen);
  2101. nla_put_u8(nlm, IFLA_IPTUN_FMR_OFFSET, offset);
  2102. nla_nest_end(nlm, rule);
  2103. }
  2104. nla_nest_end(nlm, fmrs);
  2105. }
  2106. #endif
  2107. if (tun_flags)
  2108. nla_put_u32(nlm, IFLA_IPTUN_FLAGS, tun_flags);
  2109. }
  2110. nla_nest_end(nlm, infodata);
  2111. nla_nest_end(nlm, linkinfo);
  2112. return system_rtnl_call(nlm);
  2113. failure:
  2114. nlmsg_free(nlm);
  2115. return ret;
  2116. }
  2117. #endif
  2118. #ifdef IFLA_IPTUN_MAX
  2119. #define IP6_FLOWINFO_TCLASS htonl(0x0FF00000)
  2120. static int system_add_gre_tunnel(const char *name, const char *kind,
  2121. const unsigned int link, struct blob_attr **tb, bool v6)
  2122. {
  2123. struct nl_msg *nlm;
  2124. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  2125. struct blob_attr *cur;
  2126. uint32_t ikey = 0, okey = 0, flowinfo = 0, flags6 = IP6_TNL_F_IGN_ENCAP_LIMIT;
  2127. uint16_t iflags = 0, oflags = 0;
  2128. uint8_t tos = 0;
  2129. int ret = 0, ttl = 0;
  2130. unsigned encap_limit = 0;
  2131. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  2132. if (!nlm)
  2133. return -1;
  2134. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  2135. nla_put_string(nlm, IFLA_IFNAME, name);
  2136. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2137. if (!linkinfo) {
  2138. ret = -ENOMEM;
  2139. goto failure;
  2140. }
  2141. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  2142. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2143. if (!infodata) {
  2144. ret = -ENOMEM;
  2145. goto failure;
  2146. }
  2147. if (link)
  2148. nla_put_u32(nlm, IFLA_GRE_LINK, link);
  2149. if ((cur = tb[TUNNEL_ATTR_TTL]))
  2150. ttl = blobmsg_get_u32(cur);
  2151. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2152. char *str = blobmsg_get_string(cur);
  2153. if (strcmp(str, "inherit")) {
  2154. unsigned uval;
  2155. if (!system_tos_aton(str, &uval)) {
  2156. ret = -EINVAL;
  2157. goto failure;
  2158. }
  2159. if (v6)
  2160. flowinfo |= htonl(uval << 20) & IP6_FLOWINFO_TCLASS;
  2161. else
  2162. tos = uval;
  2163. } else {
  2164. if (v6)
  2165. flags6 |= IP6_TNL_F_USE_ORIG_TCLASS;
  2166. else
  2167. tos = 1;
  2168. }
  2169. }
  2170. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2171. struct blob_attr *tb_data[__GRE_DATA_ATTR_MAX];
  2172. blobmsg_parse(gre_data_attr_list.params, __GRE_DATA_ATTR_MAX, tb_data,
  2173. blobmsg_data(cur), blobmsg_len(cur));
  2174. if ((cur = tb_data[GRE_DATA_IKEY])) {
  2175. if ((ikey = blobmsg_get_u32(cur)))
  2176. iflags |= GRE_KEY;
  2177. }
  2178. if ((cur = tb_data[GRE_DATA_OKEY])) {
  2179. if ((okey = blobmsg_get_u32(cur)))
  2180. oflags |= GRE_KEY;
  2181. }
  2182. if ((cur = tb_data[GRE_DATA_ICSUM])) {
  2183. if (blobmsg_get_bool(cur))
  2184. iflags |= GRE_CSUM;
  2185. }
  2186. if ((cur = tb_data[GRE_DATA_OCSUM])) {
  2187. if (blobmsg_get_bool(cur))
  2188. oflags |= GRE_CSUM;
  2189. }
  2190. if ((cur = tb_data[GRE_DATA_ISEQNO])) {
  2191. if (blobmsg_get_bool(cur))
  2192. iflags |= GRE_SEQ;
  2193. }
  2194. if ((cur = tb_data[GRE_DATA_OSEQNO])) {
  2195. if (blobmsg_get_bool(cur))
  2196. oflags |= GRE_SEQ;
  2197. }
  2198. if ((cur = tb_data[GRE_DATA_ENCAPLIMIT])) {
  2199. char *str = blobmsg_get_string(cur);
  2200. if (strcmp(str, "ignore")) {
  2201. char *e;
  2202. encap_limit = strtoul(str, &e, 0);
  2203. if (e == str || *e || encap_limit > 255) {
  2204. ret = -EINVAL;
  2205. goto failure;
  2206. }
  2207. flags6 &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
  2208. }
  2209. }
  2210. }
  2211. if (v6) {
  2212. struct in6_addr in6buf;
  2213. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2214. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2215. ret = -EINVAL;
  2216. goto failure;
  2217. }
  2218. nla_put(nlm, IFLA_GRE_LOCAL, sizeof(in6buf), &in6buf);
  2219. }
  2220. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2221. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2222. ret = -EINVAL;
  2223. goto failure;
  2224. }
  2225. nla_put(nlm, IFLA_GRE_REMOTE, sizeof(in6buf), &in6buf);
  2226. }
  2227. if (!(flags6 & IP6_TNL_F_IGN_ENCAP_LIMIT))
  2228. nla_put_u8(nlm, IFLA_GRE_ENCAP_LIMIT, encap_limit);
  2229. if (flowinfo)
  2230. nla_put_u32(nlm, IFLA_GRE_FLOWINFO, flowinfo);
  2231. if (flags6)
  2232. nla_put_u32(nlm, IFLA_GRE_FLAGS, flags6);
  2233. if (!ttl)
  2234. ttl = 64;
  2235. } else {
  2236. struct in_addr inbuf;
  2237. bool set_df = true;
  2238. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2239. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2240. ret = -EINVAL;
  2241. goto failure;
  2242. }
  2243. nla_put(nlm, IFLA_GRE_LOCAL, sizeof(inbuf), &inbuf);
  2244. }
  2245. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2246. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2247. ret = -EINVAL;
  2248. goto failure;
  2249. }
  2250. nla_put(nlm, IFLA_GRE_REMOTE, sizeof(inbuf), &inbuf);
  2251. if (IN_MULTICAST(ntohl(inbuf.s_addr))) {
  2252. if (!okey) {
  2253. okey = inbuf.s_addr;
  2254. oflags |= GRE_KEY;
  2255. }
  2256. if (!ikey) {
  2257. ikey = inbuf.s_addr;
  2258. iflags |= GRE_KEY;
  2259. }
  2260. }
  2261. }
  2262. if ((cur = tb[TUNNEL_ATTR_DF]))
  2263. set_df = blobmsg_get_bool(cur);
  2264. if (!set_df) {
  2265. /* ttl != 0 and nopmtudisc are incompatible */
  2266. if (ttl) {
  2267. ret = -EINVAL;
  2268. goto failure;
  2269. }
  2270. } else if (!ttl)
  2271. ttl = 64;
  2272. nla_put_u8(nlm, IFLA_GRE_PMTUDISC, set_df ? 1 : 0);
  2273. nla_put_u8(nlm, IFLA_GRE_TOS, tos);
  2274. }
  2275. if (ttl)
  2276. nla_put_u8(nlm, IFLA_GRE_TTL, ttl);
  2277. if (oflags)
  2278. nla_put_u16(nlm, IFLA_GRE_OFLAGS, oflags);
  2279. if (iflags)
  2280. nla_put_u16(nlm, IFLA_GRE_IFLAGS, iflags);
  2281. if (okey)
  2282. nla_put_u32(nlm, IFLA_GRE_OKEY, htonl(okey));
  2283. if (ikey)
  2284. nla_put_u32(nlm, IFLA_GRE_IKEY, htonl(ikey));
  2285. nla_nest_end(nlm, infodata);
  2286. nla_nest_end(nlm, linkinfo);
  2287. return system_rtnl_call(nlm);
  2288. failure:
  2289. nlmsg_free(nlm);
  2290. return ret;
  2291. }
  2292. #endif
  2293. #ifdef IFLA_VTI_MAX
  2294. static int system_add_vti_tunnel(const char *name, const char *kind,
  2295. const unsigned int link, struct blob_attr **tb, bool v6)
  2296. {
  2297. struct nl_msg *nlm;
  2298. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  2299. struct blob_attr *cur;
  2300. int ret = 0;
  2301. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  2302. if (!nlm)
  2303. return -1;
  2304. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  2305. nla_put_string(nlm, IFLA_IFNAME, name);
  2306. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2307. if (!linkinfo) {
  2308. ret = -ENOMEM;
  2309. goto failure;
  2310. }
  2311. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  2312. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2313. if (!infodata) {
  2314. ret = -ENOMEM;
  2315. goto failure;
  2316. }
  2317. if (link)
  2318. nla_put_u32(nlm, IFLA_VTI_LINK, link);
  2319. if (v6) {
  2320. struct in6_addr in6buf;
  2321. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2322. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2323. ret = -EINVAL;
  2324. goto failure;
  2325. }
  2326. nla_put(nlm, IFLA_VTI_LOCAL, sizeof(in6buf), &in6buf);
  2327. }
  2328. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2329. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2330. ret = -EINVAL;
  2331. goto failure;
  2332. }
  2333. nla_put(nlm, IFLA_VTI_REMOTE, sizeof(in6buf), &in6buf);
  2334. }
  2335. } else {
  2336. struct in_addr inbuf;
  2337. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2338. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2339. ret = -EINVAL;
  2340. goto failure;
  2341. }
  2342. nla_put(nlm, IFLA_VTI_LOCAL, sizeof(inbuf), &inbuf);
  2343. }
  2344. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2345. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2346. ret = -EINVAL;
  2347. goto failure;
  2348. }
  2349. nla_put(nlm, IFLA_VTI_REMOTE, sizeof(inbuf), &inbuf);
  2350. }
  2351. }
  2352. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2353. struct blob_attr *tb_data[__VTI_DATA_ATTR_MAX];
  2354. uint32_t ikey = 0, okey = 0;
  2355. blobmsg_parse(vti_data_attr_list.params, __VTI_DATA_ATTR_MAX, tb_data,
  2356. blobmsg_data(cur), blobmsg_len(cur));
  2357. if ((cur = tb_data[VTI_DATA_IKEY])) {
  2358. if ((ikey = blobmsg_get_u32(cur)))
  2359. nla_put_u32(nlm, IFLA_VTI_IKEY, htonl(ikey));
  2360. }
  2361. if ((cur = tb_data[VTI_DATA_OKEY])) {
  2362. if ((okey = blobmsg_get_u32(cur)))
  2363. nla_put_u32(nlm, IFLA_VTI_OKEY, htonl(okey));
  2364. }
  2365. }
  2366. nla_nest_end(nlm, infodata);
  2367. nla_nest_end(nlm, linkinfo);
  2368. return system_rtnl_call(nlm);
  2369. failure:
  2370. nlmsg_free(nlm);
  2371. return ret;
  2372. }
  2373. #endif
  2374. #ifdef IFLA_XFRM_MAX
  2375. static int system_add_xfrm_tunnel(const char *name, const char *kind,
  2376. const unsigned int link, struct blob_attr **tb)
  2377. {
  2378. struct nl_msg *nlm;
  2379. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  2380. struct blob_attr *cur;
  2381. int ret = 0;
  2382. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  2383. if (!nlm)
  2384. return -1;
  2385. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  2386. nla_put_string(nlm, IFLA_IFNAME, name);
  2387. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2388. if (!linkinfo) {
  2389. ret = -ENOMEM;
  2390. goto failure;
  2391. }
  2392. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  2393. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2394. if (!infodata) {
  2395. ret = -ENOMEM;
  2396. goto failure;
  2397. }
  2398. if (link)
  2399. nla_put_u32(nlm, IFLA_XFRM_LINK, link);
  2400. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2401. struct blob_attr *tb_data[__XFRM_DATA_ATTR_MAX];
  2402. uint32_t if_id = 0;
  2403. blobmsg_parse(xfrm_data_attr_list.params, __XFRM_DATA_ATTR_MAX, tb_data,
  2404. blobmsg_data(cur), blobmsg_len(cur));
  2405. if ((cur = tb_data[XFRM_DATA_IF_ID])) {
  2406. if ((if_id = blobmsg_get_u32(cur)))
  2407. nla_put_u32(nlm, IFLA_XFRM_IF_ID, if_id);
  2408. }
  2409. }
  2410. nla_nest_end(nlm, infodata);
  2411. nla_nest_end(nlm, linkinfo);
  2412. return system_rtnl_call(nlm);
  2413. failure:
  2414. nlmsg_free(nlm);
  2415. return ret;
  2416. }
  2417. #endif
  2418. #ifdef IFLA_VXLAN_MAX
  2419. static int system_add_vxlan(const char *name, const unsigned int link, struct blob_attr **tb, bool v6)
  2420. {
  2421. struct blob_attr *tb_data[__VXLAN_DATA_ATTR_MAX];
  2422. struct nl_msg *msg;
  2423. struct nlattr *linkinfo, *data;
  2424. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC, };
  2425. struct blob_attr *cur;
  2426. int ret = 0;
  2427. if ((cur = tb[TUNNEL_ATTR_DATA]))
  2428. blobmsg_parse(vxlan_data_attr_list.params, __VXLAN_DATA_ATTR_MAX, tb_data,
  2429. blobmsg_data(cur), blobmsg_len(cur));
  2430. else
  2431. return -EINVAL;
  2432. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  2433. if (!msg)
  2434. return -1;
  2435. nlmsg_append(msg, &iim, sizeof(iim), 0);
  2436. nla_put_string(msg, IFLA_IFNAME, name);
  2437. if ((cur = tb_data[VXLAN_DATA_ATTR_MACADDR])) {
  2438. struct ether_addr *ea = ether_aton(blobmsg_get_string(cur));
  2439. if (!ea) {
  2440. ret = -EINVAL;
  2441. goto failure;
  2442. }
  2443. nla_put(msg, IFLA_ADDRESS, ETH_ALEN, ea);
  2444. }
  2445. if ((cur = tb[TUNNEL_ATTR_MTU])) {
  2446. uint32_t mtu = blobmsg_get_u32(cur);
  2447. nla_put_u32(msg, IFLA_MTU, mtu);
  2448. }
  2449. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO))) {
  2450. ret = -ENOMEM;
  2451. goto failure;
  2452. }
  2453. nla_put_string(msg, IFLA_INFO_KIND, "vxlan");
  2454. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA))) {
  2455. ret = -ENOMEM;
  2456. goto failure;
  2457. }
  2458. if (link)
  2459. nla_put_u32(msg, IFLA_VXLAN_LINK, link);
  2460. if ((cur = tb_data[VXLAN_DATA_ATTR_ID])) {
  2461. uint32_t id = blobmsg_get_u32(cur);
  2462. if (id >= (1u << 24) - 1) {
  2463. ret = -EINVAL;
  2464. goto failure;
  2465. }
  2466. nla_put_u32(msg, IFLA_VXLAN_ID, id);
  2467. }
  2468. if (v6) {
  2469. struct in6_addr in6buf;
  2470. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2471. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2472. ret = -EINVAL;
  2473. goto failure;
  2474. }
  2475. nla_put(msg, IFLA_VXLAN_LOCAL6, sizeof(in6buf), &in6buf);
  2476. }
  2477. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2478. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2479. ret = -EINVAL;
  2480. goto failure;
  2481. }
  2482. nla_put(msg, IFLA_VXLAN_GROUP6, sizeof(in6buf), &in6buf);
  2483. }
  2484. } else {
  2485. struct in_addr inbuf;
  2486. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2487. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2488. ret = -EINVAL;
  2489. goto failure;
  2490. }
  2491. nla_put(msg, IFLA_VXLAN_LOCAL, sizeof(inbuf), &inbuf);
  2492. }
  2493. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2494. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2495. ret = -EINVAL;
  2496. goto failure;
  2497. }
  2498. nla_put(msg, IFLA_VXLAN_GROUP, sizeof(inbuf), &inbuf);
  2499. }
  2500. }
  2501. uint32_t port = 4789;
  2502. if ((cur = tb_data[VXLAN_DATA_ATTR_PORT])) {
  2503. port = blobmsg_get_u32(cur);
  2504. if (port < 1 || port > 65535) {
  2505. ret = -EINVAL;
  2506. goto failure;
  2507. }
  2508. }
  2509. nla_put_u16(msg, IFLA_VXLAN_PORT, htons(port));
  2510. if ((cur = tb_data[VXLAN_DATA_ATTR_RXCSUM])) {
  2511. bool rxcsum = blobmsg_get_bool(cur);
  2512. nla_put_u8(msg, IFLA_VXLAN_UDP_ZERO_CSUM6_RX, !rxcsum);
  2513. }
  2514. if ((cur = tb_data[VXLAN_DATA_ATTR_TXCSUM])) {
  2515. bool txcsum = blobmsg_get_bool(cur);
  2516. nla_put_u8(msg, IFLA_VXLAN_UDP_CSUM, txcsum);
  2517. nla_put_u8(msg, IFLA_VXLAN_UDP_ZERO_CSUM6_TX, !txcsum);
  2518. }
  2519. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2520. char *str = blobmsg_get_string(cur);
  2521. unsigned tos = 1;
  2522. if (strcmp(str, "inherit")) {
  2523. if (!system_tos_aton(str, &tos)) {
  2524. ret = -EINVAL;
  2525. goto failure;
  2526. }
  2527. }
  2528. nla_put_u8(msg, IFLA_VXLAN_TOS, tos);
  2529. }
  2530. if ((cur = tb[TUNNEL_ATTR_TTL])) {
  2531. uint32_t ttl = blobmsg_get_u32(cur);
  2532. if (ttl < 1 || ttl > 255) {
  2533. ret = -EINVAL;
  2534. goto failure;
  2535. }
  2536. nla_put_u8(msg, IFLA_VXLAN_TTL, ttl);
  2537. }
  2538. nla_nest_end(msg, data);
  2539. nla_nest_end(msg, linkinfo);
  2540. ret = system_rtnl_call(msg);
  2541. if (ret)
  2542. D(SYSTEM, "Error adding vxlan '%s': %d\n", name, ret);
  2543. return ret;
  2544. failure:
  2545. nlmsg_free(msg);
  2546. return ret;
  2547. }
  2548. #endif
  2549. static int system_add_sit_tunnel(const char *name, const unsigned int link, struct blob_attr **tb)
  2550. {
  2551. struct blob_attr *cur;
  2552. int ret = 0;
  2553. if (system_add_proto_tunnel(name, IPPROTO_IPV6, link, tb) < 0)
  2554. return -1;
  2555. #ifdef SIOCADD6RD
  2556. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2557. struct blob_attr *tb_data[__SIXRD_DATA_ATTR_MAX];
  2558. unsigned int mask;
  2559. struct ip_tunnel_6rd p6;
  2560. blobmsg_parse(sixrd_data_attr_list.params, __SIXRD_DATA_ATTR_MAX, tb_data,
  2561. blobmsg_data(cur), blobmsg_len(cur));
  2562. memset(&p6, 0, sizeof(p6));
  2563. if ((cur = tb_data[SIXRD_DATA_PREFIX])) {
  2564. if (!parse_ip_and_netmask(AF_INET6, blobmsg_data(cur),
  2565. &p6.prefix, &mask) || mask > 128) {
  2566. ret = -EINVAL;
  2567. goto failure;
  2568. }
  2569. p6.prefixlen = mask;
  2570. }
  2571. if ((cur = tb_data[SIXRD_DATA_RELAY_PREFIX])) {
  2572. if (!parse_ip_and_netmask(AF_INET, blobmsg_data(cur),
  2573. &p6.relay_prefix, &mask) || mask > 32) {
  2574. ret = -EINVAL;
  2575. goto failure;
  2576. }
  2577. p6.relay_prefixlen = mask;
  2578. }
  2579. if (tunnel_ioctl(name, SIOCADD6RD, &p6) < 0) {
  2580. ret = -1;
  2581. goto failure;
  2582. }
  2583. }
  2584. #endif
  2585. return ret;
  2586. failure:
  2587. __system_del_ip_tunnel(name, tb);
  2588. return ret;
  2589. }
  2590. static int system_add_proto_tunnel(const char *name, const uint8_t proto, const unsigned int link, struct blob_attr **tb)
  2591. {
  2592. struct blob_attr *cur;
  2593. bool set_df = true;
  2594. struct ip_tunnel_parm p = {
  2595. .link = link,
  2596. .iph = {
  2597. .version = 4,
  2598. .ihl = 5,
  2599. .protocol = proto,
  2600. }
  2601. };
  2602. if ((cur = tb[TUNNEL_ATTR_LOCAL]) &&
  2603. inet_pton(AF_INET, blobmsg_data(cur), &p.iph.saddr) < 1)
  2604. return -EINVAL;
  2605. if ((cur = tb[TUNNEL_ATTR_REMOTE]) &&
  2606. inet_pton(AF_INET, blobmsg_data(cur), &p.iph.daddr) < 1)
  2607. return -EINVAL;
  2608. if ((cur = tb[TUNNEL_ATTR_DF]))
  2609. set_df = blobmsg_get_bool(cur);
  2610. if ((cur = tb[TUNNEL_ATTR_TTL]))
  2611. p.iph.ttl = blobmsg_get_u32(cur);
  2612. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2613. char *str = blobmsg_get_string(cur);
  2614. if (strcmp(str, "inherit")) {
  2615. unsigned uval;
  2616. if (!system_tos_aton(str, &uval))
  2617. return -EINVAL;
  2618. p.iph.tos = uval;
  2619. } else
  2620. p.iph.tos = 1;
  2621. }
  2622. p.iph.frag_off = set_df ? htons(IP_DF) : 0;
  2623. /* ttl !=0 and nopmtudisc are incompatible */
  2624. if (p.iph.ttl && p.iph.frag_off == 0)
  2625. return -EINVAL;
  2626. strncpy(p.name, name, sizeof(p.name) - 1);
  2627. switch (p.iph.protocol) {
  2628. case IPPROTO_IPIP:
  2629. return tunnel_ioctl("tunl0", SIOCADDTUNNEL, &p);
  2630. case IPPROTO_IPV6:
  2631. return tunnel_ioctl("sit0", SIOCADDTUNNEL, &p);
  2632. default:
  2633. break;
  2634. }
  2635. return -1;
  2636. }
  2637. static int __system_del_ip_tunnel(const char *name, struct blob_attr **tb)
  2638. {
  2639. struct blob_attr *cur;
  2640. const char *str;
  2641. if (!(cur = tb[TUNNEL_ATTR_TYPE]))
  2642. return -EINVAL;
  2643. str = blobmsg_data(cur);
  2644. if (!strcmp(str, "greip") || !strcmp(str, "gretapip") ||
  2645. !strcmp(str, "greip6") || !strcmp(str, "gretapip6") ||
  2646. !strcmp(str, "vtiip") || !strcmp(str, "vtiip6") ||
  2647. !strcmp(str, "vxlan") || !strcmp(str, "vxlan6") ||
  2648. !strcmp(str, "xfrm"))
  2649. return system_link_del(name);
  2650. else
  2651. return tunnel_ioctl(name, SIOCDELTUNNEL, NULL);
  2652. }
  2653. int system_del_ip_tunnel(const char *name, struct blob_attr *attr)
  2654. {
  2655. struct blob_attr *tb[__TUNNEL_ATTR_MAX];
  2656. blobmsg_parse(tunnel_attr_list.params, __TUNNEL_ATTR_MAX, tb,
  2657. blob_data(attr), blob_len(attr));
  2658. return __system_del_ip_tunnel(name, tb);
  2659. }
  2660. int system_update_ipv6_mtu(struct device *dev, int mtu)
  2661. {
  2662. int ret = -1;
  2663. char buf[64];
  2664. int fd;
  2665. snprintf(buf, sizeof(buf), "/proc/sys/net/ipv6/conf/%s/mtu",
  2666. dev->ifname);
  2667. fd = open(buf, O_RDWR);
  2668. if (fd < 0)
  2669. return ret;
  2670. if (!mtu) {
  2671. ssize_t len = read(fd, buf, sizeof(buf) - 1);
  2672. if (len < 0)
  2673. goto out;
  2674. buf[len] = 0;
  2675. ret = atoi(buf);
  2676. } else {
  2677. if (write(fd, buf, snprintf(buf, sizeof(buf), "%i", mtu)) > 0)
  2678. ret = mtu;
  2679. }
  2680. out:
  2681. close(fd);
  2682. return ret;
  2683. }
  2684. int system_add_ip_tunnel(const char *name, struct blob_attr *attr)
  2685. {
  2686. struct blob_attr *tb[__TUNNEL_ATTR_MAX];
  2687. struct blob_attr *cur;
  2688. const char *str;
  2689. blobmsg_parse(tunnel_attr_list.params, __TUNNEL_ATTR_MAX, tb,
  2690. blob_data(attr), blob_len(attr));
  2691. __system_del_ip_tunnel(name, tb);
  2692. if (!(cur = tb[TUNNEL_ATTR_TYPE]))
  2693. return -EINVAL;
  2694. str = blobmsg_data(cur);
  2695. unsigned int ttl = 0;
  2696. if ((cur = tb[TUNNEL_ATTR_TTL])) {
  2697. ttl = blobmsg_get_u32(cur);
  2698. if (ttl > 255)
  2699. return -EINVAL;
  2700. }
  2701. unsigned int link = 0;
  2702. if ((cur = tb[TUNNEL_ATTR_LINK])) {
  2703. struct interface *iface = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
  2704. if (!iface)
  2705. return -EINVAL;
  2706. if (iface->l3_dev.dev)
  2707. link = iface->l3_dev.dev->ifindex;
  2708. }
  2709. if (!strcmp(str, "sit"))
  2710. return system_add_sit_tunnel(name, link, tb);
  2711. #ifdef IFLA_IPTUN_MAX
  2712. else if (!strcmp(str, "ipip6")) {
  2713. return system_add_ip6_tunnel(name, link, tb);
  2714. } else if (!strcmp(str, "greip")) {
  2715. return system_add_gre_tunnel(name, "gre", link, tb, false);
  2716. } else if (!strcmp(str, "gretapip")) {
  2717. return system_add_gre_tunnel(name, "gretap", link, tb, false);
  2718. } else if (!strcmp(str, "greip6")) {
  2719. return system_add_gre_tunnel(name, "ip6gre", link, tb, true);
  2720. } else if (!strcmp(str, "gretapip6")) {
  2721. return system_add_gre_tunnel(name, "ip6gretap", link, tb, true);
  2722. #ifdef IFLA_VTI_MAX
  2723. } else if (!strcmp(str, "vtiip")) {
  2724. return system_add_vti_tunnel(name, "vti", link, tb, false);
  2725. } else if (!strcmp(str, "vtiip6")) {
  2726. return system_add_vti_tunnel(name, "vti6", link, tb, true);
  2727. #endif
  2728. #ifdef IFLA_XFRM_MAX
  2729. } else if (!strcmp(str, "xfrm")) {
  2730. return system_add_xfrm_tunnel(name, "xfrm", link, tb);
  2731. #endif
  2732. #ifdef IFLA_VXLAN_MAX
  2733. } else if(!strcmp(str, "vxlan")) {
  2734. return system_add_vxlan(name, link, tb, false);
  2735. } else if(!strcmp(str, "vxlan6")) {
  2736. return system_add_vxlan(name, link, tb, true);
  2737. #endif
  2738. #endif
  2739. } else if (!strcmp(str, "ipip")) {
  2740. return system_add_proto_tunnel(name, IPPROTO_IPIP, link, tb);
  2741. }
  2742. else
  2743. return -EINVAL;
  2744. return 0;
  2745. }