system-linux.c 76 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167
  1. /*
  2. * netifd - network interface daemon
  3. * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
  4. * Copyright (C) 2013 Jo-Philipp Wich <jow@openwrt.org>
  5. * Copyright (C) 2013 Steven Barth <steven@midlink.org>
  6. * Copyright (C) 2014 Gioacchino Mazzurco <gio@eigenlab.org>
  7. * Copyright (C) 2017 Matthias Schiffer <mschiffer@universe-factory.net>
  8. * Copyright (C) 2018 Hans Dedecker <dedeckeh@gmail.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2
  12. * as published by the Free Software Foundation
  13. *
  14. * This program is distributed in the hope that it will be useful,
  15. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. * GNU General Public License for more details.
  18. */
  19. #define _GNU_SOURCE
  20. #include <sys/socket.h>
  21. #include <sys/ioctl.h>
  22. #include <sys/stat.h>
  23. #include <sys/syscall.h>
  24. #include <net/if.h>
  25. #include <net/if_arp.h>
  26. #include <arpa/inet.h>
  27. #include <netinet/ether.h>
  28. #include <netinet/in.h>
  29. #include <linux/rtnetlink.h>
  30. #include <linux/sockios.h>
  31. #include <linux/ip.h>
  32. #include <linux/if_addr.h>
  33. #include <linux/if_link.h>
  34. #include <linux/if_vlan.h>
  35. #include <linux/if_bridge.h>
  36. #include <linux/if_tunnel.h>
  37. #include <linux/ip6_tunnel.h>
  38. #include <linux/ethtool.h>
  39. #include <linux/fib_rules.h>
  40. #include <linux/veth.h>
  41. #include <linux/version.h>
  42. #ifndef RTN_FAILED_POLICY
  43. #define RTN_FAILED_POLICY 12
  44. #endif
  45. #ifndef IFA_F_NOPREFIXROUTE
  46. #define IFA_F_NOPREFIXROUTE 0x200
  47. #endif
  48. #ifndef IFA_FLAGS
  49. #define IFA_FLAGS (IFA_MULTICAST + 1)
  50. #endif
  51. #include <string.h>
  52. #include <fcntl.h>
  53. #include <glob.h>
  54. #include <time.h>
  55. #include <unistd.h>
  56. #include <netlink/msg.h>
  57. #include <netlink/attr.h>
  58. #include <netlink/socket.h>
  59. #include <libubox/uloop.h>
  60. #include "netifd.h"
  61. #include "device.h"
  62. #include "system.h"
  63. struct event_socket {
  64. struct uloop_fd uloop;
  65. struct nl_sock *sock;
  66. int bufsize;
  67. };
  68. static int sock_ioctl = -1;
  69. static struct nl_sock *sock_rtnl = NULL;
  70. static int cb_rtnl_event(struct nl_msg *msg, void *arg);
  71. static void handle_hotplug_event(struct uloop_fd *u, unsigned int events);
  72. static int system_add_proto_tunnel(const char *name, const uint8_t proto,
  73. const unsigned int link, struct blob_attr **tb);
  74. static int __system_del_ip_tunnel(const char *name, struct blob_attr **tb);
  75. static char dev_buf[256];
  76. static void
  77. handler_nl_event(struct uloop_fd *u, unsigned int events)
  78. {
  79. struct event_socket *ev = container_of(u, struct event_socket, uloop);
  80. int err;
  81. socklen_t errlen = sizeof(err);
  82. if (!u->error) {
  83. nl_recvmsgs_default(ev->sock);
  84. return;
  85. }
  86. if (getsockopt(u->fd, SOL_SOCKET, SO_ERROR, (void *)&err, &errlen))
  87. goto abort;
  88. switch(err) {
  89. case ENOBUFS:
  90. /* Increase rx buffer size on netlink socket */
  91. ev->bufsize *= 2;
  92. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  93. goto abort;
  94. /* Request full dump since some info got dropped */
  95. struct rtgenmsg msg = { .rtgen_family = AF_UNSPEC };
  96. nl_send_simple(ev->sock, RTM_GETLINK, NLM_F_DUMP, &msg, sizeof(msg));
  97. break;
  98. default:
  99. goto abort;
  100. }
  101. u->error = false;
  102. return;
  103. abort:
  104. uloop_fd_delete(&ev->uloop);
  105. return;
  106. }
  107. static struct nl_sock *
  108. create_socket(int protocol, int groups)
  109. {
  110. struct nl_sock *sock;
  111. sock = nl_socket_alloc();
  112. if (!sock)
  113. return NULL;
  114. if (groups)
  115. nl_join_groups(sock, groups);
  116. if (nl_connect(sock, protocol))
  117. return NULL;
  118. return sock;
  119. }
  120. static bool
  121. create_raw_event_socket(struct event_socket *ev, int protocol, int groups,
  122. uloop_fd_handler cb, int flags)
  123. {
  124. ev->sock = create_socket(protocol, groups);
  125. if (!ev->sock)
  126. return false;
  127. ev->uloop.fd = nl_socket_get_fd(ev->sock);
  128. ev->uloop.cb = cb;
  129. if (uloop_fd_add(&ev->uloop, ULOOP_READ|flags))
  130. return false;
  131. return true;
  132. }
  133. static bool
  134. create_event_socket(struct event_socket *ev, int protocol,
  135. int (*cb)(struct nl_msg *msg, void *arg))
  136. {
  137. if (!create_raw_event_socket(ev, protocol, 0, handler_nl_event, ULOOP_ERROR_CB))
  138. return false;
  139. /* Install the valid custom callback handler */
  140. nl_socket_modify_cb(ev->sock, NL_CB_VALID, NL_CB_CUSTOM, cb, NULL);
  141. /* Disable sequence number checking on event sockets */
  142. nl_socket_disable_seq_check(ev->sock);
  143. /* Increase rx buffer size to 65K on event sockets */
  144. ev->bufsize = 65535;
  145. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  146. return false;
  147. return true;
  148. }
  149. static bool
  150. system_rtn_aton(const char *src, unsigned int *dst)
  151. {
  152. char *e;
  153. unsigned int n;
  154. if (!strcmp(src, "local"))
  155. n = RTN_LOCAL;
  156. else if (!strcmp(src, "nat"))
  157. n = RTN_NAT;
  158. else if (!strcmp(src, "broadcast"))
  159. n = RTN_BROADCAST;
  160. else if (!strcmp(src, "anycast"))
  161. n = RTN_ANYCAST;
  162. else if (!strcmp(src, "multicast"))
  163. n = RTN_MULTICAST;
  164. else if (!strcmp(src, "prohibit"))
  165. n = RTN_PROHIBIT;
  166. else if (!strcmp(src, "unreachable"))
  167. n = RTN_UNREACHABLE;
  168. else if (!strcmp(src, "blackhole"))
  169. n = RTN_BLACKHOLE;
  170. else if (!strcmp(src, "xresolve"))
  171. n = RTN_XRESOLVE;
  172. else if (!strcmp(src, "unicast"))
  173. n = RTN_UNICAST;
  174. else if (!strcmp(src, "throw"))
  175. n = RTN_THROW;
  176. else if (!strcmp(src, "failed_policy"))
  177. n = RTN_FAILED_POLICY;
  178. else {
  179. n = strtoul(src, &e, 0);
  180. if (!e || *e || e == src || n > 255)
  181. return false;
  182. }
  183. *dst = n;
  184. return true;
  185. }
  186. static bool
  187. system_tos_aton(const char *src, unsigned *dst)
  188. {
  189. char *e;
  190. *dst = strtoul(src, &e, 16);
  191. if (e == src || *e || *dst > 255)
  192. return false;
  193. return true;
  194. }
  195. int system_init(void)
  196. {
  197. static struct event_socket rtnl_event;
  198. static struct event_socket hotplug_event;
  199. sock_ioctl = socket(AF_LOCAL, SOCK_DGRAM, 0);
  200. system_fd_set_cloexec(sock_ioctl);
  201. /* Prepare socket for routing / address control */
  202. sock_rtnl = create_socket(NETLINK_ROUTE, 0);
  203. if (!sock_rtnl)
  204. return -1;
  205. if (!create_event_socket(&rtnl_event, NETLINK_ROUTE, cb_rtnl_event))
  206. return -1;
  207. if (!create_raw_event_socket(&hotplug_event, NETLINK_KOBJECT_UEVENT, 1,
  208. handle_hotplug_event, 0))
  209. return -1;
  210. /* Receive network link events form kernel */
  211. nl_socket_add_membership(rtnl_event.sock, RTNLGRP_LINK);
  212. return 0;
  213. }
  214. static void system_set_sysctl(const char *path, const char *val)
  215. {
  216. int fd;
  217. fd = open(path, O_WRONLY);
  218. if (fd < 0)
  219. return;
  220. if (write(fd, val, strlen(val))) {}
  221. close(fd);
  222. }
  223. static void system_set_dev_sysctl(const char *path, const char *device, const char *val)
  224. {
  225. snprintf(dev_buf, sizeof(dev_buf), path, device);
  226. system_set_sysctl(dev_buf, val);
  227. }
  228. static void system_set_disable_ipv6(struct device *dev, const char *val)
  229. {
  230. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/disable_ipv6", dev->ifname, val);
  231. }
  232. static void system_set_rpfilter(struct device *dev, const char *val)
  233. {
  234. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/rp_filter", dev->ifname, val);
  235. }
  236. static void system_set_acceptlocal(struct device *dev, const char *val)
  237. {
  238. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/accept_local", dev->ifname, val);
  239. }
  240. static void system_set_igmpversion(struct device *dev, const char *val)
  241. {
  242. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/force_igmp_version", dev->ifname, val);
  243. }
  244. static void system_set_mldversion(struct device *dev, const char *val)
  245. {
  246. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/force_mld_version", dev->ifname, val);
  247. }
  248. static void system_set_neigh4reachabletime(struct device *dev, const char *val)
  249. {
  250. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/base_reachable_time_ms", dev->ifname, val);
  251. }
  252. static void system_set_neigh6reachabletime(struct device *dev, const char *val)
  253. {
  254. system_set_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/base_reachable_time_ms", dev->ifname, val);
  255. }
  256. static void system_set_neigh4gcstaletime(struct device *dev, const char *val)
  257. {
  258. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/gc_stale_time", dev->ifname, val);
  259. }
  260. static void system_set_neigh6gcstaletime(struct device *dev, const char *val)
  261. {
  262. system_set_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/gc_stale_time", dev->ifname, val);
  263. }
  264. static void system_set_neigh4locktime(struct device *dev, const char *val)
  265. {
  266. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/locktime", dev->ifname, val);
  267. }
  268. static void system_set_dadtransmits(struct device *dev, const char *val)
  269. {
  270. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/dad_transmits", dev->ifname, val);
  271. }
  272. static void system_bridge_set_multicast_to_unicast(struct device *dev, const char *val)
  273. {
  274. system_set_dev_sysctl("/sys/class/net/%s/brport/multicast_to_unicast", dev->ifname, val);
  275. }
  276. static void system_bridge_set_multicast_fast_leave(struct device *dev, const char *val)
  277. {
  278. system_set_dev_sysctl("/sys/class/net/%s/brport/multicast_fast_leave", dev->ifname, val);
  279. }
  280. static void system_bridge_set_hairpin_mode(struct device *dev, const char *val)
  281. {
  282. system_set_dev_sysctl("/sys/class/net/%s/brport/hairpin_mode", dev->ifname, val);
  283. }
  284. static void system_bridge_set_isolated(struct device *dev, const char *val)
  285. {
  286. system_set_dev_sysctl("/sys/class/net/%s/brport/isolated", dev->ifname, val);
  287. }
  288. static void system_bridge_set_multicast_router(struct device *dev, const char *val, bool bridge)
  289. {
  290. system_set_dev_sysctl(bridge ? "/sys/class/net/%s/bridge/multicast_router" :
  291. "/sys/class/net/%s/brport/multicast_router",
  292. dev->ifname, val);
  293. }
  294. static void system_bridge_set_robustness(struct device *dev, const char *val)
  295. {
  296. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_startup_query_count",
  297. dev->ifname, val);
  298. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_last_member_count",
  299. dev->ifname, val);
  300. }
  301. static void system_bridge_set_query_interval(struct device *dev, const char *val)
  302. {
  303. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_query_interval",
  304. dev->ifname, val);
  305. }
  306. static void system_bridge_set_query_response_interval(struct device *dev, const char *val)
  307. {
  308. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_query_response_interval",
  309. dev->ifname, val);
  310. }
  311. static void system_bridge_set_last_member_interval(struct device *dev, const char *val)
  312. {
  313. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_last_member_interval",
  314. dev->ifname, val);
  315. }
  316. static void system_bridge_set_membership_interval(struct device *dev, const char *val)
  317. {
  318. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_membership_interval",
  319. dev->ifname, val);
  320. }
  321. static void system_bridge_set_other_querier_timeout(struct device *dev, const char *val)
  322. {
  323. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_querier_interval",
  324. dev->ifname, val);
  325. }
  326. static void system_bridge_set_startup_query_interval(struct device *dev, const char *val)
  327. {
  328. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_startup_query_interval",
  329. dev->ifname, val);
  330. }
  331. static void system_bridge_set_learning(struct device *dev, const char *val)
  332. {
  333. system_set_dev_sysctl("/sys/class/net/%s/brport/learning", dev->ifname, val);
  334. }
  335. static void system_bridge_set_unicast_flood(struct device *dev, const char *val)
  336. {
  337. system_set_dev_sysctl("/sys/class/net/%s/brport/unicast_flood", dev->ifname, val);
  338. }
  339. static void system_set_sendredirects(struct device *dev, const char *val)
  340. {
  341. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/send_redirects", dev->ifname, val);
  342. }
  343. static int system_get_sysctl(const char *path, char *buf, const size_t buf_sz)
  344. {
  345. int fd = -1, ret = -1;
  346. fd = open(path, O_RDONLY);
  347. if (fd < 0)
  348. goto out;
  349. ssize_t len = read(fd, buf, buf_sz - 1);
  350. if (len < 0)
  351. goto out;
  352. ret = buf[len] = 0;
  353. out:
  354. if (fd >= 0)
  355. close(fd);
  356. return ret;
  357. }
  358. static int
  359. system_get_dev_sysctl(const char *path, const char *device, char *buf, const size_t buf_sz)
  360. {
  361. snprintf(dev_buf, sizeof(dev_buf), path, device);
  362. return system_get_sysctl(dev_buf, buf, buf_sz);
  363. }
  364. static int system_get_disable_ipv6(struct device *dev, char *buf, const size_t buf_sz)
  365. {
  366. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/disable_ipv6",
  367. dev->ifname, buf, buf_sz);
  368. }
  369. static int system_get_rpfilter(struct device *dev, char *buf, const size_t buf_sz)
  370. {
  371. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/rp_filter",
  372. dev->ifname, buf, buf_sz);
  373. }
  374. static int system_get_acceptlocal(struct device *dev, char *buf, const size_t buf_sz)
  375. {
  376. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/accept_local",
  377. dev->ifname, buf, buf_sz);
  378. }
  379. static int system_get_igmpversion(struct device *dev, char *buf, const size_t buf_sz)
  380. {
  381. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/force_igmp_version",
  382. dev->ifname, buf, buf_sz);
  383. }
  384. static int system_get_mldversion(struct device *dev, char *buf, const size_t buf_sz)
  385. {
  386. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/force_mld_version",
  387. dev->ifname, buf, buf_sz);
  388. }
  389. static int system_get_neigh4reachabletime(struct device *dev, char *buf, const size_t buf_sz)
  390. {
  391. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/base_reachable_time_ms",
  392. dev->ifname, buf, buf_sz);
  393. }
  394. static int system_get_neigh6reachabletime(struct device *dev, char *buf, const size_t buf_sz)
  395. {
  396. return system_get_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/base_reachable_time_ms",
  397. dev->ifname, buf, buf_sz);
  398. }
  399. static int system_get_neigh4gcstaletime(struct device *dev, char *buf, const size_t buf_sz)
  400. {
  401. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/gc_stale_time",
  402. dev->ifname, buf, buf_sz);
  403. }
  404. static int system_get_neigh6gcstaletime(struct device *dev, char *buf, const size_t buf_sz)
  405. {
  406. return system_get_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/gc_stale_time",
  407. dev->ifname, buf, buf_sz);
  408. }
  409. static int system_get_neigh4locktime(struct device *dev, char *buf, const size_t buf_sz)
  410. {
  411. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/locktime",
  412. dev->ifname, buf, buf_sz);
  413. }
  414. static int system_get_dadtransmits(struct device *dev, char *buf, const size_t buf_sz)
  415. {
  416. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/dad_transmits",
  417. dev->ifname, buf, buf_sz);
  418. }
  419. static int system_get_sendredirects(struct device *dev, char *buf, const size_t buf_sz)
  420. {
  421. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/send_redirects",
  422. dev->ifname, buf, buf_sz);
  423. }
  424. /* Evaluate netlink messages */
  425. static int cb_rtnl_event(struct nl_msg *msg, void *arg)
  426. {
  427. struct nlmsghdr *nh = nlmsg_hdr(msg);
  428. struct nlattr *nla[__IFLA_MAX];
  429. int link_state = 0;
  430. char buf[10];
  431. if (nh->nlmsg_type != RTM_NEWLINK)
  432. goto out;
  433. nlmsg_parse(nh, sizeof(struct ifinfomsg), nla, __IFLA_MAX - 1, NULL);
  434. if (!nla[IFLA_IFNAME])
  435. goto out;
  436. struct device *dev = device_find(nla_data(nla[IFLA_IFNAME]));
  437. if (!dev)
  438. goto out;
  439. if (!system_get_dev_sysctl("/sys/class/net/%s/carrier", dev->ifname, buf, sizeof(buf)))
  440. link_state = strtoul(buf, NULL, 0);
  441. device_set_link(dev, link_state ? true : false);
  442. out:
  443. return 0;
  444. }
  445. static void
  446. handle_hotplug_msg(char *data, int size)
  447. {
  448. const char *subsystem = NULL, *interface = NULL, *interface_old = NULL;
  449. char *cur, *end, *sep;
  450. struct device *dev;
  451. int skip;
  452. bool add, move = false;
  453. if (!strncmp(data, "add@", 4))
  454. add = true;
  455. else if (!strncmp(data, "remove@", 7))
  456. add = false;
  457. else if (!strncmp(data, "move@", 5)) {
  458. add = true;
  459. move = true;
  460. }
  461. else
  462. return;
  463. skip = strlen(data) + 1;
  464. end = data + size;
  465. for (cur = data + skip; cur < end; cur += skip) {
  466. skip = strlen(cur) + 1;
  467. sep = strchr(cur, '=');
  468. if (!sep)
  469. continue;
  470. *sep = 0;
  471. if (!strcmp(cur, "INTERFACE"))
  472. interface = sep + 1;
  473. else if (!strcmp(cur, "SUBSYSTEM")) {
  474. subsystem = sep + 1;
  475. if (strcmp(subsystem, "net") != 0)
  476. return;
  477. } else if (!strcmp(cur, "DEVPATH_OLD")) {
  478. interface_old = strrchr(sep + 1, '/');
  479. if (interface_old)
  480. interface_old++;
  481. }
  482. }
  483. if (subsystem && interface) {
  484. if (move && interface_old)
  485. goto move;
  486. else
  487. goto found;
  488. }
  489. return;
  490. move:
  491. dev = device_find(interface_old);
  492. if (!dev)
  493. goto found;
  494. if (dev->type != &simple_device_type)
  495. goto found;
  496. device_set_present(dev, false);
  497. found:
  498. dev = device_find(interface);
  499. if (!dev)
  500. return;
  501. if (dev->type != &simple_device_type)
  502. return;
  503. if (add && system_if_force_external(dev->ifname))
  504. return;
  505. device_set_present(dev, add);
  506. }
  507. static void
  508. handle_hotplug_event(struct uloop_fd *u, unsigned int events)
  509. {
  510. struct event_socket *ev = container_of(u, struct event_socket, uloop);
  511. struct sockaddr_nl nla;
  512. unsigned char *buf = NULL;
  513. int size;
  514. while ((size = nl_recv(ev->sock, &nla, &buf, NULL)) > 0) {
  515. if (nla.nl_pid == 0)
  516. handle_hotplug_msg((char *) buf, size);
  517. free(buf);
  518. }
  519. }
  520. static int system_rtnl_call(struct nl_msg *msg)
  521. {
  522. int ret;
  523. ret = nl_send_auto_complete(sock_rtnl, msg);
  524. nlmsg_free(msg);
  525. if (ret < 0)
  526. return ret;
  527. return nl_wait_for_ack(sock_rtnl);
  528. }
  529. int system_bridge_delbr(struct device *bridge)
  530. {
  531. return ioctl(sock_ioctl, SIOCBRDELBR, bridge->ifname);
  532. }
  533. static int system_bridge_if(const char *bridge, struct device *dev, int cmd, void *data)
  534. {
  535. struct ifreq ifr;
  536. memset(&ifr, 0, sizeof(ifr));
  537. if (dev)
  538. ifr.ifr_ifindex = dev->ifindex;
  539. else
  540. ifr.ifr_data = data;
  541. strncpy(ifr.ifr_name, bridge, sizeof(ifr.ifr_name) - 1);
  542. return ioctl(sock_ioctl, cmd, &ifr);
  543. }
  544. static bool system_is_bridge(const char *name, char *buf, int buflen)
  545. {
  546. struct stat st;
  547. snprintf(buf, buflen, "/sys/devices/virtual/net/%s/bridge", name);
  548. if (stat(buf, &st) < 0)
  549. return false;
  550. return true;
  551. }
  552. static char *system_get_bridge(const char *name, char *buf, int buflen)
  553. {
  554. char *path;
  555. ssize_t len = -1;
  556. glob_t gl;
  557. snprintf(buf, buflen, "/sys/devices/virtual/net/*/brif/%s/bridge", name);
  558. if (glob(buf, GLOB_NOSORT, NULL, &gl) < 0)
  559. return NULL;
  560. if (gl.gl_pathc > 0)
  561. len = readlink(gl.gl_pathv[0], buf, buflen);
  562. globfree(&gl);
  563. if (len < 0)
  564. return NULL;
  565. buf[len] = 0;
  566. path = strrchr(buf, '/');
  567. if (!path)
  568. return NULL;
  569. return path + 1;
  570. }
  571. static void
  572. system_bridge_set_wireless(struct device *bridge, struct device *dev)
  573. {
  574. bool mcast_to_ucast = dev->wireless_ap;
  575. bool hairpin = true;
  576. if (bridge->settings.flags & DEV_OPT_MULTICAST_TO_UNICAST &&
  577. !bridge->settings.multicast_to_unicast)
  578. mcast_to_ucast = false;
  579. if (!mcast_to_ucast || dev->wireless_isolate)
  580. hairpin = false;
  581. system_bridge_set_multicast_to_unicast(dev, mcast_to_ucast ? "1" : "0");
  582. system_bridge_set_hairpin_mode(dev, hairpin ? "1" : "0");
  583. }
  584. int system_bridge_addif(struct device *bridge, struct device *dev)
  585. {
  586. char buf[64];
  587. char *oldbr;
  588. int ret = 0;
  589. oldbr = system_get_bridge(dev->ifname, dev_buf, sizeof(dev_buf));
  590. if (!oldbr || strcmp(oldbr, bridge->ifname) != 0)
  591. ret = system_bridge_if(bridge->ifname, dev, SIOCBRADDIF, NULL);
  592. if (dev->wireless)
  593. system_bridge_set_wireless(bridge, dev);
  594. if (dev->settings.flags & DEV_OPT_MULTICAST_ROUTER) {
  595. snprintf(buf, sizeof(buf), "%u", dev->settings.multicast_router);
  596. system_bridge_set_multicast_router(dev, buf, false);
  597. }
  598. if (dev->settings.flags & DEV_OPT_MULTICAST_FAST_LEAVE &&
  599. dev->settings.multicast_fast_leave)
  600. system_bridge_set_multicast_fast_leave(dev, "1");
  601. if (dev->settings.flags & DEV_OPT_LEARNING &&
  602. !dev->settings.learning)
  603. system_bridge_set_learning(dev, "0");
  604. if (dev->settings.flags & DEV_OPT_UNICAST_FLOOD &&
  605. !dev->settings.unicast_flood)
  606. system_bridge_set_unicast_flood(dev, "0");
  607. if (dev->settings.flags & DEV_OPT_ISOLATE &&
  608. dev->settings.isolate)
  609. system_bridge_set_isolated(dev, "1");
  610. return ret;
  611. }
  612. int system_bridge_delif(struct device *bridge, struct device *dev)
  613. {
  614. return system_bridge_if(bridge->ifname, dev, SIOCBRDELIF, NULL);
  615. }
  616. int system_if_resolve(struct device *dev)
  617. {
  618. struct ifreq ifr;
  619. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  620. if (!ioctl(sock_ioctl, SIOCGIFINDEX, &ifr))
  621. return ifr.ifr_ifindex;
  622. else
  623. return 0;
  624. }
  625. static int system_if_flags(const char *ifname, unsigned add, unsigned rem)
  626. {
  627. struct ifreq ifr;
  628. memset(&ifr, 0, sizeof(ifr));
  629. strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1);
  630. if (ioctl(sock_ioctl, SIOCGIFFLAGS, &ifr) < 0)
  631. return -1;
  632. ifr.ifr_flags |= add;
  633. ifr.ifr_flags &= ~rem;
  634. return ioctl(sock_ioctl, SIOCSIFFLAGS, &ifr);
  635. }
  636. struct clear_data {
  637. struct nl_msg *msg;
  638. struct device *dev;
  639. int type;
  640. int size;
  641. int af;
  642. };
  643. static bool check_ifaddr(struct nlmsghdr *hdr, int ifindex)
  644. {
  645. struct ifaddrmsg *ifa = NLMSG_DATA(hdr);
  646. return ifa->ifa_index == ifindex;
  647. }
  648. static bool check_route(struct nlmsghdr *hdr, int ifindex)
  649. {
  650. struct rtmsg *r = NLMSG_DATA(hdr);
  651. struct nlattr *tb[__RTA_MAX];
  652. if (r->rtm_protocol == RTPROT_KERNEL &&
  653. r->rtm_family == AF_INET6)
  654. return false;
  655. nlmsg_parse(hdr, sizeof(struct rtmsg), tb, __RTA_MAX - 1, NULL);
  656. if (!tb[RTA_OIF])
  657. return false;
  658. return *(int *)RTA_DATA(tb[RTA_OIF]) == ifindex;
  659. }
  660. static bool check_rule(struct nlmsghdr *hdr, int ifindex)
  661. {
  662. return true;
  663. }
  664. static int cb_clear_event(struct nl_msg *msg, void *arg)
  665. {
  666. struct clear_data *clr = arg;
  667. struct nlmsghdr *hdr = nlmsg_hdr(msg);
  668. bool (*cb)(struct nlmsghdr *, int ifindex);
  669. int type;
  670. switch(clr->type) {
  671. case RTM_GETADDR:
  672. type = RTM_DELADDR;
  673. if (hdr->nlmsg_type != RTM_NEWADDR)
  674. return NL_SKIP;
  675. cb = check_ifaddr;
  676. break;
  677. case RTM_GETROUTE:
  678. type = RTM_DELROUTE;
  679. if (hdr->nlmsg_type != RTM_NEWROUTE)
  680. return NL_SKIP;
  681. cb = check_route;
  682. break;
  683. case RTM_GETRULE:
  684. type = RTM_DELRULE;
  685. if (hdr->nlmsg_type != RTM_NEWRULE)
  686. return NL_SKIP;
  687. cb = check_rule;
  688. break;
  689. default:
  690. return NL_SKIP;
  691. }
  692. if (!cb(hdr, clr->dev ? clr->dev->ifindex : 0))
  693. return NL_SKIP;
  694. if (type == RTM_DELRULE)
  695. D(SYSTEM, "Remove a rule\n");
  696. else
  697. D(SYSTEM, "Remove %s from device %s\n",
  698. type == RTM_DELADDR ? "an address" : "a route",
  699. clr->dev->ifname);
  700. memcpy(nlmsg_hdr(clr->msg), hdr, hdr->nlmsg_len);
  701. hdr = nlmsg_hdr(clr->msg);
  702. hdr->nlmsg_type = type;
  703. hdr->nlmsg_flags = NLM_F_REQUEST;
  704. nl_socket_disable_auto_ack(sock_rtnl);
  705. nl_send_auto_complete(sock_rtnl, clr->msg);
  706. nl_socket_enable_auto_ack(sock_rtnl);
  707. return NL_SKIP;
  708. }
  709. static int
  710. cb_finish_event(struct nl_msg *msg, void *arg)
  711. {
  712. int *pending = arg;
  713. *pending = 0;
  714. return NL_STOP;
  715. }
  716. static int
  717. error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err, void *arg)
  718. {
  719. int *pending = arg;
  720. *pending = err->error;
  721. return NL_STOP;
  722. }
  723. static void
  724. system_if_clear_entries(struct device *dev, int type, int af)
  725. {
  726. struct clear_data clr;
  727. struct nl_cb *cb = nl_cb_alloc(NL_CB_DEFAULT);
  728. struct rtmsg rtm = {
  729. .rtm_family = af,
  730. .rtm_flags = RTM_F_CLONED,
  731. };
  732. int flags = NLM_F_DUMP;
  733. int pending = 1;
  734. clr.af = af;
  735. clr.dev = dev;
  736. clr.type = type;
  737. switch (type) {
  738. case RTM_GETADDR:
  739. case RTM_GETRULE:
  740. clr.size = sizeof(struct rtgenmsg);
  741. break;
  742. case RTM_GETROUTE:
  743. clr.size = sizeof(struct rtmsg);
  744. break;
  745. default:
  746. return;
  747. }
  748. if (!cb)
  749. return;
  750. clr.msg = nlmsg_alloc_simple(type, flags);
  751. if (!clr.msg)
  752. goto out;
  753. nlmsg_append(clr.msg, &rtm, clr.size, 0);
  754. nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, cb_clear_event, &clr);
  755. nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, cb_finish_event, &pending);
  756. nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &pending);
  757. nl_send_auto_complete(sock_rtnl, clr.msg);
  758. while (pending > 0)
  759. nl_recvmsgs(sock_rtnl, cb);
  760. nlmsg_free(clr.msg);
  761. out:
  762. nl_cb_put(cb);
  763. }
  764. /*
  765. * Clear bridge (membership) state and bring down device
  766. */
  767. void system_if_clear_state(struct device *dev)
  768. {
  769. static char buf[256];
  770. char *bridge;
  771. device_set_ifindex(dev, system_if_resolve(dev));
  772. if (dev->external || !dev->ifindex)
  773. return;
  774. system_if_flags(dev->ifname, 0, IFF_UP);
  775. if (system_is_bridge(dev->ifname, buf, sizeof(buf))) {
  776. D(SYSTEM, "Delete existing bridge named '%s'\n", dev->ifname);
  777. system_bridge_delbr(dev);
  778. return;
  779. }
  780. bridge = system_get_bridge(dev->ifname, buf, sizeof(buf));
  781. if (bridge) {
  782. D(SYSTEM, "Remove device '%s' from bridge '%s'\n", dev->ifname, bridge);
  783. system_bridge_if(bridge, dev, SIOCBRDELIF, NULL);
  784. }
  785. system_if_clear_entries(dev, RTM_GETROUTE, AF_INET);
  786. system_if_clear_entries(dev, RTM_GETADDR, AF_INET);
  787. system_if_clear_entries(dev, RTM_GETROUTE, AF_INET6);
  788. system_if_clear_entries(dev, RTM_GETADDR, AF_INET6);
  789. system_set_disable_ipv6(dev, "0");
  790. }
  791. static inline unsigned long
  792. sec_to_jiffies(int val)
  793. {
  794. return (unsigned long) val * 100;
  795. }
  796. static void system_bridge_conf_multicast_deps(struct device *bridge,
  797. struct bridge_config *cfg,
  798. char *buf,
  799. int buf_len)
  800. {
  801. int val;
  802. if (cfg->flags & BRIDGE_OPT_ROBUSTNESS ||
  803. cfg->flags & BRIDGE_OPT_QUERY_INTERVAL ||
  804. cfg->flags & BRIDGE_OPT_QUERY_RESPONSE_INTERVAL) {
  805. val = cfg->robustness * cfg->query_interval +
  806. cfg->query_response_interval;
  807. snprintf(buf, buf_len, "%i", val);
  808. system_bridge_set_membership_interval(bridge, buf);
  809. val = cfg->robustness * cfg->query_interval +
  810. cfg->query_response_interval / 2;
  811. snprintf(buf, buf_len, "%i", val);
  812. system_bridge_set_other_querier_timeout(bridge, buf);
  813. }
  814. if (cfg->flags & BRIDGE_OPT_QUERY_INTERVAL) {
  815. val = cfg->query_interval / 4;
  816. snprintf(buf, buf_len, "%i", val);
  817. system_bridge_set_startup_query_interval(bridge, buf);
  818. }
  819. }
  820. static void system_bridge_conf_multicast(struct device *bridge,
  821. struct bridge_config *cfg,
  822. char *buf,
  823. int buf_len)
  824. {
  825. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_snooping",
  826. bridge->ifname, cfg->igmp_snoop ? "1" : "0");
  827. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_querier",
  828. bridge->ifname, cfg->multicast_querier ? "1" : "0");
  829. snprintf(buf, buf_len, "%i", cfg->hash_max);
  830. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/hash_max",
  831. bridge->ifname, buf);
  832. if (bridge->settings.flags & DEV_OPT_MULTICAST_ROUTER) {
  833. snprintf(buf, buf_len, "%u", bridge->settings.multicast_router);
  834. system_bridge_set_multicast_router(bridge, buf, true);
  835. }
  836. if (cfg->flags & BRIDGE_OPT_ROBUSTNESS) {
  837. snprintf(buf, buf_len, "%i", cfg->robustness);
  838. system_bridge_set_robustness(bridge, buf);
  839. }
  840. if (cfg->flags & BRIDGE_OPT_QUERY_INTERVAL) {
  841. snprintf(buf, buf_len, "%i", cfg->query_interval);
  842. system_bridge_set_query_interval(bridge, buf);
  843. }
  844. if (cfg->flags & BRIDGE_OPT_QUERY_RESPONSE_INTERVAL) {
  845. snprintf(buf, buf_len, "%i", cfg->query_response_interval);
  846. system_bridge_set_query_response_interval(bridge, buf);
  847. }
  848. if (cfg->flags & BRIDGE_OPT_LAST_MEMBER_INTERVAL) {
  849. snprintf(buf, buf_len, "%i", cfg->last_member_interval);
  850. system_bridge_set_last_member_interval(bridge, buf);
  851. }
  852. system_bridge_conf_multicast_deps(bridge, cfg, buf, buf_len);
  853. }
  854. int system_bridge_addbr(struct device *bridge, struct bridge_config *cfg)
  855. {
  856. char buf[64];
  857. unsigned long args[4] = {};
  858. if (ioctl(sock_ioctl, SIOCBRADDBR, bridge->ifname) < 0)
  859. return -1;
  860. args[0] = BRCTL_SET_BRIDGE_STP_STATE;
  861. args[1] = !!cfg->stp;
  862. system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
  863. args[0] = BRCTL_SET_BRIDGE_FORWARD_DELAY;
  864. args[1] = sec_to_jiffies(cfg->forward_delay);
  865. system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
  866. system_bridge_conf_multicast(bridge, cfg, buf, sizeof(buf));
  867. args[0] = BRCTL_SET_BRIDGE_PRIORITY;
  868. args[1] = cfg->priority;
  869. system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
  870. if (cfg->flags & BRIDGE_OPT_AGEING_TIME) {
  871. args[0] = BRCTL_SET_AGEING_TIME;
  872. args[1] = sec_to_jiffies(cfg->ageing_time);
  873. system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
  874. }
  875. if (cfg->flags & BRIDGE_OPT_HELLO_TIME) {
  876. args[0] = BRCTL_SET_BRIDGE_HELLO_TIME;
  877. args[1] = sec_to_jiffies(cfg->hello_time);
  878. system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
  879. }
  880. if (cfg->flags & BRIDGE_OPT_MAX_AGE) {
  881. args[0] = BRCTL_SET_BRIDGE_MAX_AGE;
  882. args[1] = sec_to_jiffies(cfg->max_age);
  883. system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
  884. }
  885. return 0;
  886. }
  887. int system_macvlan_add(struct device *macvlan, struct device *dev, struct macvlan_config *cfg)
  888. {
  889. struct nl_msg *msg;
  890. struct nlattr *linkinfo, *data;
  891. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC, };
  892. int i, rv;
  893. static const struct {
  894. const char *name;
  895. enum macvlan_mode val;
  896. } modes[] = {
  897. { "private", MACVLAN_MODE_PRIVATE },
  898. { "vepa", MACVLAN_MODE_VEPA },
  899. { "bridge", MACVLAN_MODE_BRIDGE },
  900. { "passthru", MACVLAN_MODE_PASSTHRU },
  901. };
  902. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  903. if (!msg)
  904. return -1;
  905. nlmsg_append(msg, &iim, sizeof(iim), 0);
  906. if (cfg->flags & MACVLAN_OPT_MACADDR)
  907. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->macaddr), cfg->macaddr);
  908. nla_put_string(msg, IFLA_IFNAME, macvlan->ifname);
  909. nla_put_u32(msg, IFLA_LINK, dev->ifindex);
  910. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  911. goto nla_put_failure;
  912. nla_put_string(msg, IFLA_INFO_KIND, "macvlan");
  913. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  914. goto nla_put_failure;
  915. if (cfg->mode) {
  916. for (i = 0; i < ARRAY_SIZE(modes); i++) {
  917. if (strcmp(cfg->mode, modes[i].name) != 0)
  918. continue;
  919. nla_put_u32(msg, IFLA_MACVLAN_MODE, modes[i].val);
  920. break;
  921. }
  922. }
  923. nla_nest_end(msg, data);
  924. nla_nest_end(msg, linkinfo);
  925. rv = system_rtnl_call(msg);
  926. if (rv)
  927. D(SYSTEM, "Error adding macvlan '%s' over '%s': %d\n", macvlan->ifname, dev->ifname, rv);
  928. return rv;
  929. nla_put_failure:
  930. nlmsg_free(msg);
  931. return -ENOMEM;
  932. }
  933. static int system_link_del(const char *ifname)
  934. {
  935. struct nl_msg *msg;
  936. struct ifinfomsg iim = {
  937. .ifi_family = AF_UNSPEC,
  938. .ifi_index = 0,
  939. };
  940. msg = nlmsg_alloc_simple(RTM_DELLINK, NLM_F_REQUEST);
  941. if (!msg)
  942. return -1;
  943. nlmsg_append(msg, &iim, sizeof(iim), 0);
  944. nla_put_string(msg, IFLA_IFNAME, ifname);
  945. return system_rtnl_call(msg);
  946. }
  947. int system_macvlan_del(struct device *macvlan)
  948. {
  949. return system_link_del(macvlan->ifname);
  950. }
  951. int system_veth_add(struct device *veth, struct veth_config *cfg)
  952. {
  953. struct nl_msg *msg;
  954. struct ifinfomsg empty_iim = {};
  955. struct nlattr *linkinfo, *data, *veth_info;
  956. int rv;
  957. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  958. if (!msg)
  959. return -1;
  960. nlmsg_append(msg, &empty_iim, sizeof(empty_iim), 0);
  961. if (cfg->flags & VETH_OPT_MACADDR)
  962. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->macaddr), cfg->macaddr);
  963. nla_put_string(msg, IFLA_IFNAME, veth->ifname);
  964. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  965. goto nla_put_failure;
  966. nla_put_string(msg, IFLA_INFO_KIND, "veth");
  967. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  968. goto nla_put_failure;
  969. if (!(veth_info = nla_nest_start(msg, VETH_INFO_PEER)))
  970. goto nla_put_failure;
  971. nlmsg_append(msg, &empty_iim, sizeof(empty_iim), 0);
  972. if (cfg->flags & VETH_OPT_PEER_NAME)
  973. nla_put_string(msg, IFLA_IFNAME, cfg->peer_name);
  974. if (cfg->flags & VETH_OPT_PEER_MACADDR)
  975. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->peer_macaddr), cfg->peer_macaddr);
  976. nla_nest_end(msg, veth_info);
  977. nla_nest_end(msg, data);
  978. nla_nest_end(msg, linkinfo);
  979. rv = system_rtnl_call(msg);
  980. if (rv) {
  981. if (cfg->flags & VETH_OPT_PEER_NAME)
  982. D(SYSTEM, "Error adding veth '%s' with peer '%s': %d\n", veth->ifname, cfg->peer_name, rv);
  983. else
  984. D(SYSTEM, "Error adding veth '%s': %d\n", veth->ifname, rv);
  985. }
  986. return rv;
  987. nla_put_failure:
  988. nlmsg_free(msg);
  989. return -ENOMEM;
  990. }
  991. int system_veth_del(struct device *veth)
  992. {
  993. return system_link_del(veth->ifname);
  994. }
  995. static int system_vlan(struct device *dev, int id)
  996. {
  997. struct vlan_ioctl_args ifr = {
  998. .cmd = SET_VLAN_NAME_TYPE_CMD,
  999. .u.name_type = VLAN_NAME_TYPE_RAW_PLUS_VID_NO_PAD,
  1000. };
  1001. if (ioctl(sock_ioctl, SIOCSIFVLAN, &ifr) < 0)
  1002. return -1;
  1003. if (id < 0) {
  1004. ifr.cmd = DEL_VLAN_CMD;
  1005. ifr.u.VID = 0;
  1006. } else {
  1007. ifr.cmd = ADD_VLAN_CMD;
  1008. ifr.u.VID = id;
  1009. }
  1010. strncpy(ifr.device1, dev->ifname, sizeof(ifr.device1));
  1011. return ioctl(sock_ioctl, SIOCSIFVLAN, &ifr);
  1012. }
  1013. int system_vlan_add(struct device *dev, int id)
  1014. {
  1015. return system_vlan(dev, id);
  1016. }
  1017. int system_vlan_del(struct device *dev)
  1018. {
  1019. return system_vlan(dev, -1);
  1020. }
  1021. int system_vlandev_add(struct device *vlandev, struct device *dev, struct vlandev_config *cfg)
  1022. {
  1023. struct nl_msg *msg;
  1024. struct nlattr *linkinfo, *data;
  1025. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC };
  1026. int rv;
  1027. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  1028. if (!msg)
  1029. return -1;
  1030. nlmsg_append(msg, &iim, sizeof(iim), 0);
  1031. nla_put_string(msg, IFLA_IFNAME, vlandev->ifname);
  1032. nla_put_u32(msg, IFLA_LINK, dev->ifindex);
  1033. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  1034. goto nla_put_failure;
  1035. nla_put_string(msg, IFLA_INFO_KIND, "vlan");
  1036. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  1037. goto nla_put_failure;
  1038. nla_put_u16(msg, IFLA_VLAN_ID, cfg->vid);
  1039. #if LINUX_VERSION_CODE >= KERNEL_VERSION(3,10,0)
  1040. nla_put_u16(msg, IFLA_VLAN_PROTOCOL, htons(cfg->proto));
  1041. #else
  1042. if(cfg->proto == VLAN_PROTO_8021AD)
  1043. netifd_log_message(L_WARNING, "%s Your kernel is older than linux 3.10.0, 802.1ad is not supported defaulting to 802.1q", vlandev->type->name);
  1044. #endif
  1045. nla_nest_end(msg, data);
  1046. nla_nest_end(msg, linkinfo);
  1047. rv = system_rtnl_call(msg);
  1048. if (rv)
  1049. D(SYSTEM, "Error adding vlandev '%s' over '%s': %d\n", vlandev->ifname, dev->ifname, rv);
  1050. return rv;
  1051. nla_put_failure:
  1052. nlmsg_free(msg);
  1053. return -ENOMEM;
  1054. }
  1055. int system_vlandev_del(struct device *vlandev)
  1056. {
  1057. return system_link_del(vlandev->ifname);
  1058. }
  1059. void
  1060. system_if_get_settings(struct device *dev, struct device_settings *s)
  1061. {
  1062. struct ifreq ifr;
  1063. char buf[10];
  1064. memset(&ifr, 0, sizeof(ifr));
  1065. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1066. if (ioctl(sock_ioctl, SIOCGIFMTU, &ifr) == 0) {
  1067. s->mtu = ifr.ifr_mtu;
  1068. s->flags |= DEV_OPT_MTU;
  1069. }
  1070. s->mtu6 = system_update_ipv6_mtu(dev, 0);
  1071. if (s->mtu6 > 0)
  1072. s->flags |= DEV_OPT_MTU6;
  1073. if (ioctl(sock_ioctl, SIOCGIFTXQLEN, &ifr) == 0) {
  1074. s->txqueuelen = ifr.ifr_qlen;
  1075. s->flags |= DEV_OPT_TXQUEUELEN;
  1076. }
  1077. if (ioctl(sock_ioctl, SIOCGIFHWADDR, &ifr) == 0) {
  1078. memcpy(s->macaddr, &ifr.ifr_hwaddr.sa_data, sizeof(s->macaddr));
  1079. s->flags |= DEV_OPT_MACADDR;
  1080. }
  1081. if (!system_get_disable_ipv6(dev, buf, sizeof(buf))) {
  1082. s->ipv6 = !strtoul(buf, NULL, 0);
  1083. s->flags |= DEV_OPT_IPV6;
  1084. }
  1085. if (ioctl(sock_ioctl, SIOCGIFFLAGS, &ifr) == 0) {
  1086. s->promisc = ifr.ifr_flags & IFF_PROMISC;
  1087. s->flags |= DEV_OPT_PROMISC;
  1088. s->multicast = ifr.ifr_flags & IFF_MULTICAST;
  1089. s->flags |= DEV_OPT_MULTICAST;
  1090. }
  1091. if (!system_get_rpfilter(dev, buf, sizeof(buf))) {
  1092. s->rpfilter = strtoul(buf, NULL, 0);
  1093. s->flags |= DEV_OPT_RPFILTER;
  1094. }
  1095. if (!system_get_acceptlocal(dev, buf, sizeof(buf))) {
  1096. s->acceptlocal = strtoul(buf, NULL, 0);
  1097. s->flags |= DEV_OPT_ACCEPTLOCAL;
  1098. }
  1099. if (!system_get_igmpversion(dev, buf, sizeof(buf))) {
  1100. s->igmpversion = strtoul(buf, NULL, 0);
  1101. s->flags |= DEV_OPT_IGMPVERSION;
  1102. }
  1103. if (!system_get_mldversion(dev, buf, sizeof(buf))) {
  1104. s->mldversion = strtoul(buf, NULL, 0);
  1105. s->flags |= DEV_OPT_MLDVERSION;
  1106. }
  1107. if (!system_get_neigh4reachabletime(dev, buf, sizeof(buf))) {
  1108. s->neigh4reachabletime = strtoul(buf, NULL, 0);
  1109. s->flags |= DEV_OPT_NEIGHREACHABLETIME;
  1110. }
  1111. if (!system_get_neigh6reachabletime(dev, buf, sizeof(buf))) {
  1112. s->neigh6reachabletime = strtoul(buf, NULL, 0);
  1113. s->flags |= DEV_OPT_NEIGHREACHABLETIME;
  1114. }
  1115. if (!system_get_neigh4locktime(dev, buf, sizeof(buf))) {
  1116. s->neigh4locktime = strtol(buf, NULL, 0);
  1117. s->flags |= DEV_OPT_NEIGHLOCKTIME;
  1118. }
  1119. if (!system_get_neigh4gcstaletime(dev, buf, sizeof(buf))) {
  1120. s->neigh4gcstaletime = strtoul(buf, NULL, 0);
  1121. s->flags |= DEV_OPT_NEIGHGCSTALETIME;
  1122. }
  1123. if (!system_get_neigh6gcstaletime(dev, buf, sizeof(buf))) {
  1124. s->neigh6gcstaletime = strtoul(buf, NULL, 0);
  1125. s->flags |= DEV_OPT_NEIGHGCSTALETIME;
  1126. }
  1127. if (!system_get_dadtransmits(dev, buf, sizeof(buf))) {
  1128. s->dadtransmits = strtoul(buf, NULL, 0);
  1129. s->flags |= DEV_OPT_DADTRANSMITS;
  1130. }
  1131. if (!system_get_sendredirects(dev, buf, sizeof(buf))) {
  1132. s->sendredirects = strtoul(buf, NULL, 0);
  1133. s->flags |= DEV_OPT_SENDREDIRECTS;
  1134. }
  1135. }
  1136. void
  1137. system_if_apply_settings(struct device *dev, struct device_settings *s, unsigned int apply_mask)
  1138. {
  1139. struct ifreq ifr;
  1140. char buf[12];
  1141. memset(&ifr, 0, sizeof(ifr));
  1142. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1143. if (s->flags & DEV_OPT_MTU & apply_mask) {
  1144. ifr.ifr_mtu = s->mtu;
  1145. if (ioctl(sock_ioctl, SIOCSIFMTU, &ifr) < 0)
  1146. s->flags &= ~DEV_OPT_MTU;
  1147. }
  1148. if (s->flags & DEV_OPT_MTU6 & apply_mask) {
  1149. system_update_ipv6_mtu(dev, s->mtu6);
  1150. }
  1151. if (s->flags & DEV_OPT_TXQUEUELEN & apply_mask) {
  1152. ifr.ifr_qlen = s->txqueuelen;
  1153. if (ioctl(sock_ioctl, SIOCSIFTXQLEN, &ifr) < 0)
  1154. s->flags &= ~DEV_OPT_TXQUEUELEN;
  1155. }
  1156. if ((s->flags & DEV_OPT_MACADDR & apply_mask) && !dev->external) {
  1157. ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
  1158. memcpy(&ifr.ifr_hwaddr.sa_data, s->macaddr, sizeof(s->macaddr));
  1159. if (ioctl(sock_ioctl, SIOCSIFHWADDR, &ifr) < 0)
  1160. s->flags &= ~DEV_OPT_MACADDR;
  1161. }
  1162. if (s->flags & DEV_OPT_IPV6 & apply_mask)
  1163. system_set_disable_ipv6(dev, s->ipv6 ? "0" : "1");
  1164. if (s->flags & DEV_OPT_PROMISC & apply_mask) {
  1165. if (system_if_flags(dev->ifname, s->promisc ? IFF_PROMISC : 0,
  1166. !s->promisc ? IFF_PROMISC : 0) < 0)
  1167. s->flags &= ~DEV_OPT_PROMISC;
  1168. }
  1169. if (s->flags & DEV_OPT_RPFILTER & apply_mask) {
  1170. snprintf(buf, sizeof(buf), "%u", s->rpfilter);
  1171. system_set_rpfilter(dev, buf);
  1172. }
  1173. if (s->flags & DEV_OPT_ACCEPTLOCAL & apply_mask)
  1174. system_set_acceptlocal(dev, s->acceptlocal ? "1" : "0");
  1175. if (s->flags & DEV_OPT_IGMPVERSION & apply_mask) {
  1176. snprintf(buf, sizeof(buf), "%u", s->igmpversion);
  1177. system_set_igmpversion(dev, buf);
  1178. }
  1179. if (s->flags & DEV_OPT_MLDVERSION & apply_mask) {
  1180. snprintf(buf, sizeof(buf), "%u", s->mldversion);
  1181. system_set_mldversion(dev, buf);
  1182. }
  1183. if (s->flags & DEV_OPT_NEIGHREACHABLETIME & apply_mask) {
  1184. snprintf(buf, sizeof(buf), "%u", s->neigh4reachabletime);
  1185. system_set_neigh4reachabletime(dev, buf);
  1186. snprintf(buf, sizeof(buf), "%u", s->neigh6reachabletime);
  1187. system_set_neigh6reachabletime(dev, buf);
  1188. }
  1189. if (s->flags & DEV_OPT_NEIGHLOCKTIME & apply_mask) {
  1190. snprintf(buf, sizeof(buf), "%d", s->neigh4locktime);
  1191. system_set_neigh4locktime(dev, buf);
  1192. }
  1193. if (s->flags & DEV_OPT_NEIGHGCSTALETIME & apply_mask) {
  1194. snprintf(buf, sizeof(buf), "%u", s->neigh4gcstaletime);
  1195. system_set_neigh4gcstaletime(dev, buf);
  1196. snprintf(buf, sizeof(buf), "%u", s->neigh6gcstaletime);
  1197. system_set_neigh6gcstaletime(dev, buf);
  1198. }
  1199. if (s->flags & DEV_OPT_DADTRANSMITS & apply_mask) {
  1200. snprintf(buf, sizeof(buf), "%u", s->dadtransmits);
  1201. system_set_dadtransmits(dev, buf);
  1202. }
  1203. if (s->flags & DEV_OPT_MULTICAST & apply_mask) {
  1204. if (system_if_flags(dev->ifname, s->multicast ? IFF_MULTICAST : 0,
  1205. !s->multicast ? IFF_MULTICAST : 0) < 0)
  1206. s->flags &= ~DEV_OPT_MULTICAST;
  1207. }
  1208. if (s->flags & DEV_OPT_SENDREDIRECTS & apply_mask)
  1209. system_set_sendredirects(dev, s->sendredirects ? "1" : "0");
  1210. }
  1211. int system_if_up(struct device *dev)
  1212. {
  1213. system_if_get_settings(dev, &dev->orig_settings);
  1214. /* Only keep orig settings based on what needs to be set */
  1215. dev->orig_settings.valid_flags = dev->orig_settings.flags;
  1216. dev->orig_settings.flags &= dev->settings.flags;
  1217. system_if_apply_settings(dev, &dev->settings, dev->settings.flags);
  1218. return system_if_flags(dev->ifname, IFF_UP, 0);
  1219. }
  1220. int system_if_down(struct device *dev)
  1221. {
  1222. int ret = system_if_flags(dev->ifname, 0, IFF_UP);
  1223. system_if_apply_settings(dev, &dev->orig_settings, dev->orig_settings.flags);
  1224. return ret;
  1225. }
  1226. struct if_check_data {
  1227. struct device *dev;
  1228. int pending;
  1229. int ret;
  1230. };
  1231. #ifndef IFF_LOWER_UP
  1232. #define IFF_LOWER_UP 0x10000
  1233. #endif
  1234. static int cb_if_check_valid(struct nl_msg *msg, void *arg)
  1235. {
  1236. struct nlmsghdr *nh = nlmsg_hdr(msg);
  1237. struct ifinfomsg *ifi = NLMSG_DATA(nh);
  1238. struct if_check_data *chk = (struct if_check_data *)arg;
  1239. if (nh->nlmsg_type != RTM_NEWLINK)
  1240. return NL_SKIP;
  1241. device_set_present(chk->dev, ifi->ifi_index > 0 ? true : false);
  1242. device_set_link(chk->dev, ifi->ifi_flags & IFF_LOWER_UP ? true : false);
  1243. return NL_OK;
  1244. }
  1245. static int cb_if_check_ack(struct nl_msg *msg, void *arg)
  1246. {
  1247. struct if_check_data *chk = (struct if_check_data *)arg;
  1248. chk->pending = 0;
  1249. return NL_STOP;
  1250. }
  1251. static int cb_if_check_error(struct sockaddr_nl *nla, struct nlmsgerr *err, void *arg)
  1252. {
  1253. struct if_check_data *chk = (struct if_check_data *)arg;
  1254. device_set_present(chk->dev, false);
  1255. device_set_link(chk->dev, false);
  1256. chk->pending = err->error;
  1257. return NL_STOP;
  1258. }
  1259. int system_if_check(struct device *dev)
  1260. {
  1261. struct nl_cb *cb = nl_cb_alloc(NL_CB_DEFAULT);
  1262. struct nl_msg *msg;
  1263. struct ifinfomsg ifi = {
  1264. .ifi_family = AF_UNSPEC,
  1265. .ifi_index = 0,
  1266. };
  1267. struct if_check_data chk = {
  1268. .dev = dev,
  1269. .pending = 1,
  1270. };
  1271. int ret = 1;
  1272. if (!cb)
  1273. return ret;
  1274. msg = nlmsg_alloc_simple(RTM_GETLINK, 0);
  1275. if (!msg)
  1276. goto out;
  1277. if (nlmsg_append(msg, &ifi, sizeof(ifi), 0) ||
  1278. nla_put_string(msg, IFLA_IFNAME, dev->ifname))
  1279. goto free;
  1280. nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, cb_if_check_valid, &chk);
  1281. nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, cb_if_check_ack, &chk);
  1282. nl_cb_err(cb, NL_CB_CUSTOM, cb_if_check_error, &chk);
  1283. nl_send_auto_complete(sock_rtnl, msg);
  1284. while (chk.pending > 0)
  1285. nl_recvmsgs(sock_rtnl, cb);
  1286. ret = chk.pending;
  1287. free:
  1288. nlmsg_free(msg);
  1289. out:
  1290. nl_cb_put(cb);
  1291. return ret;
  1292. }
  1293. struct device *
  1294. system_if_get_parent(struct device *dev)
  1295. {
  1296. char buf[64], *devname;
  1297. int ifindex, iflink, len;
  1298. FILE *f;
  1299. snprintf(buf, sizeof(buf), "/sys/class/net/%s/iflink", dev->ifname);
  1300. f = fopen(buf, "r");
  1301. if (!f)
  1302. return NULL;
  1303. len = fread(buf, 1, sizeof(buf) - 1, f);
  1304. fclose(f);
  1305. if (len <= 0)
  1306. return NULL;
  1307. buf[len] = 0;
  1308. iflink = strtoul(buf, NULL, 0);
  1309. ifindex = system_if_resolve(dev);
  1310. if (!iflink || iflink == ifindex)
  1311. return NULL;
  1312. devname = if_indextoname(iflink, buf);
  1313. if (!devname)
  1314. return NULL;
  1315. return device_get(devname, true);
  1316. }
  1317. static bool
  1318. read_string_file(int dir_fd, const char *file, char *buf, int len)
  1319. {
  1320. bool ret = false;
  1321. char *c;
  1322. int fd;
  1323. fd = openat(dir_fd, file, O_RDONLY);
  1324. if (fd < 0)
  1325. return false;
  1326. retry:
  1327. len = read(fd, buf, len - 1);
  1328. if (len < 0) {
  1329. if (errno == EINTR)
  1330. goto retry;
  1331. } else if (len > 0) {
  1332. buf[len] = 0;
  1333. c = strchr(buf, '\n');
  1334. if (c)
  1335. *c = 0;
  1336. ret = true;
  1337. }
  1338. close(fd);
  1339. return ret;
  1340. }
  1341. static bool
  1342. read_uint64_file(int dir_fd, const char *file, uint64_t *val)
  1343. {
  1344. char buf[64];
  1345. bool ret = false;
  1346. ret = read_string_file(dir_fd, file, buf, sizeof(buf));
  1347. if (ret)
  1348. *val = strtoull(buf, NULL, 0);
  1349. return ret;
  1350. }
  1351. /* Assume advertised flags == supported flags */
  1352. static const struct {
  1353. uint32_t mask;
  1354. const char *name;
  1355. } ethtool_link_modes[] = {
  1356. { ADVERTISED_10baseT_Half, "10baseT-H" },
  1357. { ADVERTISED_10baseT_Full, "10baseT-F" },
  1358. { ADVERTISED_100baseT_Half, "100baseT-H" },
  1359. { ADVERTISED_100baseT_Full, "100baseT-F" },
  1360. { ADVERTISED_1000baseT_Half, "1000baseT-H" },
  1361. { ADVERTISED_1000baseT_Full, "1000baseT-F" },
  1362. { ADVERTISED_1000baseKX_Full, "1000baseKX-F" },
  1363. { ADVERTISED_2500baseX_Full, "2500baseX-F" },
  1364. { ADVERTISED_10000baseT_Full, "10000baseT-F" },
  1365. { ADVERTISED_10000baseKX4_Full, "10000baseKX4-F" },
  1366. { ADVERTISED_10000baseKR_Full, "10000baseKR-F" },
  1367. { ADVERTISED_20000baseMLD2_Full, "20000baseMLD2-F" },
  1368. { ADVERTISED_20000baseKR2_Full, "20000baseKR2-F" },
  1369. { ADVERTISED_40000baseKR4_Full, "40000baseKR4-F" },
  1370. { ADVERTISED_40000baseCR4_Full, "40000baseCR4-F" },
  1371. { ADVERTISED_40000baseSR4_Full, "40000baseSR4-F" },
  1372. { ADVERTISED_40000baseLR4_Full, "40000baseLR4-F" },
  1373. #ifdef ADVERTISED_56000baseKR4_Full
  1374. { ADVERTISED_56000baseKR4_Full, "56000baseKR4-F" },
  1375. { ADVERTISED_56000baseCR4_Full, "56000baseCR4-F" },
  1376. { ADVERTISED_56000baseSR4_Full, "56000baseSR4-F" },
  1377. { ADVERTISED_56000baseLR4_Full, "56000baseLR4-F" },
  1378. #endif
  1379. };
  1380. static void system_add_link_modes(struct blob_buf *b, __u32 mask)
  1381. {
  1382. int i;
  1383. for (i = 0; i < ARRAY_SIZE(ethtool_link_modes); i++) {
  1384. if (mask & ethtool_link_modes[i].mask)
  1385. blobmsg_add_string(b, NULL, ethtool_link_modes[i].name);
  1386. }
  1387. }
  1388. bool
  1389. system_if_force_external(const char *ifname)
  1390. {
  1391. char buf[64];
  1392. struct stat s;
  1393. snprintf(buf, sizeof(buf), "/sys/class/net/%s/phy80211", ifname);
  1394. return stat(buf, &s) == 0;
  1395. }
  1396. int
  1397. system_if_dump_info(struct device *dev, struct blob_buf *b)
  1398. {
  1399. struct ethtool_cmd ecmd;
  1400. struct ifreq ifr;
  1401. char *s;
  1402. void *c;
  1403. memset(&ecmd, 0, sizeof(ecmd));
  1404. memset(&ifr, 0, sizeof(ifr));
  1405. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1406. ifr.ifr_data = (caddr_t) &ecmd;
  1407. ecmd.cmd = ETHTOOL_GSET;
  1408. if (ioctl(sock_ioctl, SIOCETHTOOL, &ifr) == 0) {
  1409. c = blobmsg_open_array(b, "link-advertising");
  1410. system_add_link_modes(b, ecmd.advertising);
  1411. blobmsg_close_array(b, c);
  1412. c = blobmsg_open_array(b, "link-partner-advertising");
  1413. system_add_link_modes(b, ecmd.lp_advertising);
  1414. blobmsg_close_array(b, c);
  1415. c = blobmsg_open_array(b, "link-supported");
  1416. system_add_link_modes(b, ecmd.supported);
  1417. blobmsg_close_array(b, c);
  1418. s = blobmsg_alloc_string_buffer(b, "speed", 8);
  1419. snprintf(s, 8, "%d%c", ethtool_cmd_speed(&ecmd),
  1420. ecmd.duplex == DUPLEX_HALF ? 'H' : 'F');
  1421. blobmsg_add_string_buffer(b);
  1422. blobmsg_add_u8(b, "autoneg", !!ecmd.autoneg);
  1423. }
  1424. return 0;
  1425. }
  1426. int
  1427. system_if_dump_stats(struct device *dev, struct blob_buf *b)
  1428. {
  1429. const char *const counters[] = {
  1430. "collisions", "rx_frame_errors", "tx_compressed",
  1431. "multicast", "rx_length_errors", "tx_dropped",
  1432. "rx_bytes", "rx_missed_errors", "tx_errors",
  1433. "rx_compressed", "rx_over_errors", "tx_fifo_errors",
  1434. "rx_crc_errors", "rx_packets", "tx_heartbeat_errors",
  1435. "rx_dropped", "tx_aborted_errors", "tx_packets",
  1436. "rx_errors", "tx_bytes", "tx_window_errors",
  1437. "rx_fifo_errors", "tx_carrier_errors",
  1438. };
  1439. char buf[64];
  1440. int stats_dir;
  1441. int i;
  1442. uint64_t val = 0;
  1443. snprintf(buf, sizeof(buf), "/sys/class/net/%s/statistics", dev->ifname);
  1444. stats_dir = open(buf, O_DIRECTORY);
  1445. if (stats_dir < 0)
  1446. return -1;
  1447. for (i = 0; i < ARRAY_SIZE(counters); i++)
  1448. if (read_uint64_file(stats_dir, counters[i], &val))
  1449. blobmsg_add_u64(b, counters[i], val);
  1450. close(stats_dir);
  1451. return 0;
  1452. }
  1453. static int system_addr(struct device *dev, struct device_addr *addr, int cmd)
  1454. {
  1455. bool v4 = ((addr->flags & DEVADDR_FAMILY) == DEVADDR_INET4);
  1456. int alen = v4 ? 4 : 16;
  1457. unsigned int flags = 0;
  1458. struct ifaddrmsg ifa = {
  1459. .ifa_family = (alen == 4) ? AF_INET : AF_INET6,
  1460. .ifa_prefixlen = addr->mask,
  1461. .ifa_index = dev->ifindex,
  1462. };
  1463. struct nl_msg *msg;
  1464. if (cmd == RTM_NEWADDR)
  1465. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1466. msg = nlmsg_alloc_simple(cmd, flags);
  1467. if (!msg)
  1468. return -1;
  1469. nlmsg_append(msg, &ifa, sizeof(ifa), 0);
  1470. nla_put(msg, IFA_LOCAL, alen, &addr->addr);
  1471. if (v4) {
  1472. if (addr->broadcast)
  1473. nla_put_u32(msg, IFA_BROADCAST, addr->broadcast);
  1474. if (addr->point_to_point)
  1475. nla_put_u32(msg, IFA_ADDRESS, addr->point_to_point);
  1476. } else {
  1477. time_t now = system_get_rtime();
  1478. struct ifa_cacheinfo cinfo = {0xffffffffU, 0xffffffffU, 0, 0};
  1479. if (addr->preferred_until) {
  1480. int64_t preferred = addr->preferred_until - now;
  1481. if (preferred < 0)
  1482. preferred = 0;
  1483. else if (preferred > UINT32_MAX)
  1484. preferred = UINT32_MAX;
  1485. cinfo.ifa_prefered = preferred;
  1486. }
  1487. if (addr->valid_until) {
  1488. int64_t valid = addr->valid_until - now;
  1489. if (valid <= 0) {
  1490. nlmsg_free(msg);
  1491. return -1;
  1492. }
  1493. else if (valid > UINT32_MAX)
  1494. valid = UINT32_MAX;
  1495. cinfo.ifa_valid = valid;
  1496. }
  1497. nla_put(msg, IFA_CACHEINFO, sizeof(cinfo), &cinfo);
  1498. if (cmd == RTM_NEWADDR && (addr->flags & DEVADDR_OFFLINK))
  1499. nla_put_u32(msg, IFA_FLAGS, IFA_F_NOPREFIXROUTE);
  1500. }
  1501. return system_rtnl_call(msg);
  1502. }
  1503. int system_add_address(struct device *dev, struct device_addr *addr)
  1504. {
  1505. return system_addr(dev, addr, RTM_NEWADDR);
  1506. }
  1507. int system_del_address(struct device *dev, struct device_addr *addr)
  1508. {
  1509. return system_addr(dev, addr, RTM_DELADDR);
  1510. }
  1511. static int system_rt(struct device *dev, struct device_route *route, int cmd)
  1512. {
  1513. int alen = ((route->flags & DEVADDR_FAMILY) == DEVADDR_INET4) ? 4 : 16;
  1514. bool have_gw;
  1515. unsigned int flags = 0;
  1516. if (alen == 4)
  1517. have_gw = !!route->nexthop.in.s_addr;
  1518. else
  1519. have_gw = route->nexthop.in6.s6_addr32[0] ||
  1520. route->nexthop.in6.s6_addr32[1] ||
  1521. route->nexthop.in6.s6_addr32[2] ||
  1522. route->nexthop.in6.s6_addr32[3];
  1523. unsigned int table = (route->flags & (DEVROUTE_TABLE | DEVROUTE_SRCTABLE))
  1524. ? route->table : RT_TABLE_MAIN;
  1525. struct rtmsg rtm = {
  1526. .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
  1527. .rtm_dst_len = route->mask,
  1528. .rtm_src_len = route->sourcemask,
  1529. .rtm_table = (table < 256) ? table : RT_TABLE_UNSPEC,
  1530. .rtm_protocol = (route->flags & DEVROUTE_PROTO) ? route->proto : RTPROT_STATIC,
  1531. .rtm_scope = RT_SCOPE_NOWHERE,
  1532. .rtm_type = (cmd == RTM_DELROUTE) ? 0: RTN_UNICAST,
  1533. .rtm_flags = (route->flags & DEVROUTE_ONLINK) ? RTNH_F_ONLINK : 0,
  1534. };
  1535. struct nl_msg *msg;
  1536. if (cmd == RTM_NEWROUTE) {
  1537. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1538. if (!dev) { /* Add null-route */
  1539. rtm.rtm_scope = RT_SCOPE_UNIVERSE;
  1540. rtm.rtm_type = RTN_UNREACHABLE;
  1541. }
  1542. else
  1543. rtm.rtm_scope = (have_gw) ? RT_SCOPE_UNIVERSE : RT_SCOPE_LINK;
  1544. }
  1545. if (route->flags & DEVROUTE_TYPE) {
  1546. rtm.rtm_type = route->type;
  1547. if (!(route->flags & (DEVROUTE_TABLE | DEVROUTE_SRCTABLE))) {
  1548. if (rtm.rtm_type == RTN_LOCAL || rtm.rtm_type == RTN_BROADCAST ||
  1549. rtm.rtm_type == RTN_NAT || rtm.rtm_type == RTN_ANYCAST)
  1550. rtm.rtm_table = RT_TABLE_LOCAL;
  1551. }
  1552. if (rtm.rtm_type == RTN_LOCAL || rtm.rtm_type == RTN_NAT) {
  1553. rtm.rtm_scope = RT_SCOPE_HOST;
  1554. } else if (rtm.rtm_type == RTN_BROADCAST || rtm.rtm_type == RTN_MULTICAST ||
  1555. rtm.rtm_type == RTN_ANYCAST) {
  1556. rtm.rtm_scope = RT_SCOPE_LINK;
  1557. } else if (rtm.rtm_type == RTN_BLACKHOLE || rtm.rtm_type == RTN_UNREACHABLE ||
  1558. rtm.rtm_type == RTN_PROHIBIT || rtm.rtm_type == RTN_FAILED_POLICY ||
  1559. rtm.rtm_type == RTN_THROW) {
  1560. rtm.rtm_scope = RT_SCOPE_UNIVERSE;
  1561. dev = NULL;
  1562. }
  1563. }
  1564. msg = nlmsg_alloc_simple(cmd, flags);
  1565. if (!msg)
  1566. return -1;
  1567. nlmsg_append(msg, &rtm, sizeof(rtm), 0);
  1568. if (route->mask)
  1569. nla_put(msg, RTA_DST, alen, &route->addr);
  1570. if (route->sourcemask) {
  1571. if (rtm.rtm_family == AF_INET)
  1572. nla_put(msg, RTA_PREFSRC, alen, &route->source);
  1573. else
  1574. nla_put(msg, RTA_SRC, alen, &route->source);
  1575. }
  1576. if (route->metric > 0)
  1577. nla_put_u32(msg, RTA_PRIORITY, route->metric);
  1578. if (have_gw)
  1579. nla_put(msg, RTA_GATEWAY, alen, &route->nexthop);
  1580. if (dev)
  1581. nla_put_u32(msg, RTA_OIF, dev->ifindex);
  1582. if (table >= 256)
  1583. nla_put_u32(msg, RTA_TABLE, table);
  1584. if (route->flags & DEVROUTE_MTU) {
  1585. struct nlattr *metrics;
  1586. if (!(metrics = nla_nest_start(msg, RTA_METRICS)))
  1587. goto nla_put_failure;
  1588. nla_put_u32(msg, RTAX_MTU, route->mtu);
  1589. nla_nest_end(msg, metrics);
  1590. }
  1591. return system_rtnl_call(msg);
  1592. nla_put_failure:
  1593. nlmsg_free(msg);
  1594. return -ENOMEM;
  1595. }
  1596. int system_add_route(struct device *dev, struct device_route *route)
  1597. {
  1598. return system_rt(dev, route, RTM_NEWROUTE);
  1599. }
  1600. int system_del_route(struct device *dev, struct device_route *route)
  1601. {
  1602. return system_rt(dev, route, RTM_DELROUTE);
  1603. }
  1604. int system_flush_routes(void)
  1605. {
  1606. const char *names[] = {
  1607. "/proc/sys/net/ipv4/route/flush",
  1608. "/proc/sys/net/ipv6/route/flush"
  1609. };
  1610. int fd, i;
  1611. for (i = 0; i < ARRAY_SIZE(names); i++) {
  1612. fd = open(names[i], O_WRONLY);
  1613. if (fd < 0)
  1614. continue;
  1615. if (write(fd, "-1", 2)) {}
  1616. close(fd);
  1617. }
  1618. return 0;
  1619. }
  1620. bool system_resolve_rt_type(const char *type, unsigned int *id)
  1621. {
  1622. return system_rtn_aton(type, id);
  1623. }
  1624. bool system_resolve_rt_proto(const char *type, unsigned int *id)
  1625. {
  1626. FILE *f;
  1627. char *e, buf[128];
  1628. unsigned int n, proto = 256;
  1629. n = strtoul(type, &e, 0);
  1630. if (!*e && e != type)
  1631. proto = n;
  1632. else if (!strcmp(type, "unspec"))
  1633. proto = RTPROT_UNSPEC;
  1634. else if (!strcmp(type, "kernel"))
  1635. proto = RTPROT_KERNEL;
  1636. else if (!strcmp(type, "boot"))
  1637. proto = RTPROT_BOOT;
  1638. else if (!strcmp(type, "static"))
  1639. proto = RTPROT_STATIC;
  1640. else if ((f = fopen("/etc/iproute2/rt_protos", "r")) != NULL) {
  1641. while (fgets(buf, sizeof(buf) - 1, f) != NULL) {
  1642. if ((e = strtok(buf, " \t\n")) == NULL || *e == '#')
  1643. continue;
  1644. n = strtoul(e, NULL, 10);
  1645. e = strtok(NULL, " \t\n");
  1646. if (e && !strcmp(e, type)) {
  1647. proto = n;
  1648. break;
  1649. }
  1650. }
  1651. fclose(f);
  1652. }
  1653. if (proto > 255)
  1654. return false;
  1655. *id = proto;
  1656. return true;
  1657. }
  1658. bool system_resolve_rt_table(const char *name, unsigned int *id)
  1659. {
  1660. FILE *f;
  1661. char *e, buf[128];
  1662. unsigned int n, table = RT_TABLE_UNSPEC;
  1663. /* first try to parse table as number */
  1664. if ((n = strtoul(name, &e, 0)) > 0 && !*e)
  1665. table = n;
  1666. /* handle well known aliases */
  1667. else if (!strcmp(name, "default"))
  1668. table = RT_TABLE_DEFAULT;
  1669. else if (!strcmp(name, "main"))
  1670. table = RT_TABLE_MAIN;
  1671. else if (!strcmp(name, "local"))
  1672. table = RT_TABLE_LOCAL;
  1673. /* try to look up name in /etc/iproute2/rt_tables */
  1674. else if ((f = fopen("/etc/iproute2/rt_tables", "r")) != NULL)
  1675. {
  1676. while (fgets(buf, sizeof(buf) - 1, f) != NULL)
  1677. {
  1678. if ((e = strtok(buf, " \t\n")) == NULL || *e == '#')
  1679. continue;
  1680. n = strtoul(e, NULL, 10);
  1681. e = strtok(NULL, " \t\n");
  1682. if (e && !strcmp(e, name))
  1683. {
  1684. table = n;
  1685. break;
  1686. }
  1687. }
  1688. fclose(f);
  1689. }
  1690. if (table == RT_TABLE_UNSPEC)
  1691. return false;
  1692. *id = table;
  1693. return true;
  1694. }
  1695. bool system_is_default_rt_table(unsigned int id)
  1696. {
  1697. return (id == RT_TABLE_MAIN);
  1698. }
  1699. bool system_resolve_rpfilter(const char *filter, unsigned int *id)
  1700. {
  1701. char *e;
  1702. unsigned int n;
  1703. if (!strcmp(filter, "strict"))
  1704. n = 1;
  1705. else if (!strcmp(filter, "loose"))
  1706. n = 2;
  1707. else {
  1708. n = strtoul(filter, &e, 0);
  1709. if (*e || e == filter || n > 2)
  1710. return false;
  1711. }
  1712. *id = n;
  1713. return true;
  1714. }
  1715. static int system_iprule(struct iprule *rule, int cmd)
  1716. {
  1717. int alen = ((rule->flags & IPRULE_FAMILY) == IPRULE_INET4) ? 4 : 16;
  1718. struct nl_msg *msg;
  1719. struct rtmsg rtm = {
  1720. .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
  1721. .rtm_protocol = RTPROT_STATIC,
  1722. .rtm_scope = RT_SCOPE_UNIVERSE,
  1723. .rtm_table = RT_TABLE_UNSPEC,
  1724. .rtm_type = RTN_UNSPEC,
  1725. .rtm_flags = 0,
  1726. };
  1727. if (cmd == RTM_NEWRULE)
  1728. rtm.rtm_type = RTN_UNICAST;
  1729. if (rule->invert)
  1730. rtm.rtm_flags |= FIB_RULE_INVERT;
  1731. if (rule->flags & IPRULE_SRC)
  1732. rtm.rtm_src_len = rule->src_mask;
  1733. if (rule->flags & IPRULE_DEST)
  1734. rtm.rtm_dst_len = rule->dest_mask;
  1735. if (rule->flags & IPRULE_TOS)
  1736. rtm.rtm_tos = rule->tos;
  1737. if (rule->flags & IPRULE_LOOKUP) {
  1738. if (rule->lookup < 256)
  1739. rtm.rtm_table = rule->lookup;
  1740. }
  1741. if (rule->flags & IPRULE_ACTION)
  1742. rtm.rtm_type = rule->action;
  1743. else if (rule->flags & IPRULE_GOTO)
  1744. rtm.rtm_type = FR_ACT_GOTO;
  1745. else if (!(rule->flags & (IPRULE_LOOKUP | IPRULE_ACTION | IPRULE_GOTO)))
  1746. rtm.rtm_type = FR_ACT_NOP;
  1747. msg = nlmsg_alloc_simple(cmd, NLM_F_REQUEST);
  1748. if (!msg)
  1749. return -1;
  1750. nlmsg_append(msg, &rtm, sizeof(rtm), 0);
  1751. if (rule->flags & IPRULE_IN)
  1752. nla_put(msg, FRA_IFNAME, strlen(rule->in_dev) + 1, rule->in_dev);
  1753. if (rule->flags & IPRULE_OUT)
  1754. nla_put(msg, FRA_OIFNAME, strlen(rule->out_dev) + 1, rule->out_dev);
  1755. if (rule->flags & IPRULE_SRC)
  1756. nla_put(msg, FRA_SRC, alen, &rule->src_addr);
  1757. if (rule->flags & IPRULE_DEST)
  1758. nla_put(msg, FRA_DST, alen, &rule->dest_addr);
  1759. if (rule->flags & IPRULE_PRIORITY)
  1760. nla_put_u32(msg, FRA_PRIORITY, rule->priority);
  1761. else if (cmd == RTM_NEWRULE)
  1762. nla_put_u32(msg, FRA_PRIORITY, rule->order);
  1763. if (rule->flags & IPRULE_FWMARK)
  1764. nla_put_u32(msg, FRA_FWMARK, rule->fwmark);
  1765. if (rule->flags & IPRULE_FWMASK)
  1766. nla_put_u32(msg, FRA_FWMASK, rule->fwmask);
  1767. if (rule->flags & IPRULE_LOOKUP) {
  1768. if (rule->lookup >= 256)
  1769. nla_put_u32(msg, FRA_TABLE, rule->lookup);
  1770. }
  1771. if (rule->flags & IPRULE_SUP_PREFIXLEN)
  1772. nla_put_u32(msg, FRA_SUPPRESS_PREFIXLEN, rule->sup_prefixlen);
  1773. if (rule->flags & IPRULE_GOTO)
  1774. nla_put_u32(msg, FRA_GOTO, rule->gotoid);
  1775. return system_rtnl_call(msg);
  1776. }
  1777. int system_add_iprule(struct iprule *rule)
  1778. {
  1779. return system_iprule(rule, RTM_NEWRULE);
  1780. }
  1781. int system_del_iprule(struct iprule *rule)
  1782. {
  1783. return system_iprule(rule, RTM_DELRULE);
  1784. }
  1785. int system_flush_iprules(void)
  1786. {
  1787. int rv = 0;
  1788. struct iprule rule;
  1789. system_if_clear_entries(NULL, RTM_GETRULE, AF_INET);
  1790. system_if_clear_entries(NULL, RTM_GETRULE, AF_INET6);
  1791. memset(&rule, 0, sizeof(rule));
  1792. rule.flags = IPRULE_INET4 | IPRULE_PRIORITY | IPRULE_LOOKUP;
  1793. rule.priority = 0;
  1794. rule.lookup = RT_TABLE_LOCAL;
  1795. rv |= system_iprule(&rule, RTM_NEWRULE);
  1796. rule.priority = 32766;
  1797. rule.lookup = RT_TABLE_MAIN;
  1798. rv |= system_iprule(&rule, RTM_NEWRULE);
  1799. rule.priority = 32767;
  1800. rule.lookup = RT_TABLE_DEFAULT;
  1801. rv |= system_iprule(&rule, RTM_NEWRULE);
  1802. rule.flags = IPRULE_INET6 | IPRULE_PRIORITY | IPRULE_LOOKUP;
  1803. rule.priority = 0;
  1804. rule.lookup = RT_TABLE_LOCAL;
  1805. rv |= system_iprule(&rule, RTM_NEWRULE);
  1806. rule.priority = 32766;
  1807. rule.lookup = RT_TABLE_MAIN;
  1808. rv |= system_iprule(&rule, RTM_NEWRULE);
  1809. return rv;
  1810. }
  1811. bool system_resolve_iprule_action(const char *action, unsigned int *id)
  1812. {
  1813. return system_rtn_aton(action, id);
  1814. }
  1815. time_t system_get_rtime(void)
  1816. {
  1817. struct timespec ts;
  1818. struct timeval tv;
  1819. if (syscall(__NR_clock_gettime, CLOCK_MONOTONIC, &ts) == 0)
  1820. return ts.tv_sec;
  1821. if (gettimeofday(&tv, NULL) == 0)
  1822. return tv.tv_sec;
  1823. return 0;
  1824. }
  1825. #ifndef IP_DF
  1826. #define IP_DF 0x4000
  1827. #endif
  1828. static int tunnel_ioctl(const char *name, int cmd, void *p)
  1829. {
  1830. struct ifreq ifr;
  1831. memset(&ifr, 0, sizeof(ifr));
  1832. strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name) - 1);
  1833. ifr.ifr_ifru.ifru_data = p;
  1834. return ioctl(sock_ioctl, cmd, &ifr);
  1835. }
  1836. #ifdef IFLA_IPTUN_MAX
  1837. static int system_add_ip6_tunnel(const char *name, const unsigned int link,
  1838. struct blob_attr **tb)
  1839. {
  1840. struct nl_msg *nlm = nlmsg_alloc_simple(RTM_NEWLINK,
  1841. NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  1842. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC };
  1843. struct blob_attr *cur;
  1844. int ret = 0, ttl = 0;
  1845. if (!nlm)
  1846. return -1;
  1847. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  1848. nla_put_string(nlm, IFLA_IFNAME, name);
  1849. if (link)
  1850. nla_put_u32(nlm, IFLA_LINK, link);
  1851. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  1852. if (!linkinfo) {
  1853. ret = -ENOMEM;
  1854. goto failure;
  1855. }
  1856. nla_put_string(nlm, IFLA_INFO_KIND, "ip6tnl");
  1857. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  1858. if (!infodata) {
  1859. ret = -ENOMEM;
  1860. goto failure;
  1861. }
  1862. if (link)
  1863. nla_put_u32(nlm, IFLA_IPTUN_LINK, link);
  1864. if ((cur = tb[TUNNEL_ATTR_TTL]))
  1865. ttl = blobmsg_get_u32(cur);
  1866. nla_put_u8(nlm, IFLA_IPTUN_PROTO, IPPROTO_IPIP);
  1867. nla_put_u8(nlm, IFLA_IPTUN_TTL, (ttl) ? ttl : 64);
  1868. struct in6_addr in6buf;
  1869. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  1870. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  1871. ret = -EINVAL;
  1872. goto failure;
  1873. }
  1874. nla_put(nlm, IFLA_IPTUN_LOCAL, sizeof(in6buf), &in6buf);
  1875. }
  1876. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  1877. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  1878. ret = -EINVAL;
  1879. goto failure;
  1880. }
  1881. nla_put(nlm, IFLA_IPTUN_REMOTE, sizeof(in6buf), &in6buf);
  1882. }
  1883. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  1884. struct blob_attr *tb_data[__IPIP6_DATA_ATTR_MAX];
  1885. uint32_t tun_flags = IP6_TNL_F_IGN_ENCAP_LIMIT;
  1886. blobmsg_parse(ipip6_data_attr_list.params, __IPIP6_DATA_ATTR_MAX, tb_data,
  1887. blobmsg_data(cur), blobmsg_len(cur));
  1888. if ((cur = tb_data[IPIP6_DATA_ENCAPLIMIT])) {
  1889. char *str = blobmsg_get_string(cur);
  1890. if (strcmp(str, "ignore")) {
  1891. char *e;
  1892. unsigned encap_limit = strtoul(str, &e, 0);
  1893. if (e == str || *e || encap_limit > 255) {
  1894. ret = -EINVAL;
  1895. goto failure;
  1896. }
  1897. nla_put_u8(nlm, IFLA_IPTUN_ENCAP_LIMIT, encap_limit);
  1898. tun_flags &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
  1899. }
  1900. }
  1901. #ifdef IFLA_IPTUN_FMR_MAX
  1902. if ((cur = tb_data[IPIP6_DATA_FMRS])) {
  1903. struct blob_attr *rcur;
  1904. unsigned rrem, fmrcnt = 0;
  1905. struct nlattr *fmrs = nla_nest_start(nlm, IFLA_IPTUN_FMRS);
  1906. if (!fmrs) {
  1907. ret = -ENOMEM;
  1908. goto failure;
  1909. }
  1910. blobmsg_for_each_attr(rcur, cur, rrem) {
  1911. struct blob_attr *tb_fmr[__FMR_DATA_ATTR_MAX], *tb_cur;
  1912. struct in6_addr ip6prefix;
  1913. struct in_addr ip4prefix;
  1914. unsigned ip4len, ip6len, ealen, offset;
  1915. blobmsg_parse(fmr_data_attr_list.params, __FMR_DATA_ATTR_MAX, tb_fmr,
  1916. blobmsg_data(rcur), blobmsg_len(rcur));
  1917. if (!(tb_cur = tb_fmr[FMR_DATA_PREFIX6]) ||
  1918. !parse_ip_and_netmask(AF_INET6,
  1919. blobmsg_data(tb_cur), &ip6prefix,
  1920. &ip6len)) {
  1921. ret = -EINVAL;
  1922. goto failure;
  1923. }
  1924. if (!(tb_cur = tb_fmr[FMR_DATA_PREFIX4]) ||
  1925. !parse_ip_and_netmask(AF_INET,
  1926. blobmsg_data(tb_cur), &ip4prefix,
  1927. &ip4len)) {
  1928. ret = -EINVAL;
  1929. goto failure;
  1930. }
  1931. if (!(tb_cur = tb_fmr[FMR_DATA_EALEN])) {
  1932. ret = -EINVAL;
  1933. goto failure;
  1934. }
  1935. ealen = blobmsg_get_u32(tb_cur);
  1936. if (!(tb_cur = tb_fmr[FMR_DATA_OFFSET])) {
  1937. ret = -EINVAL;
  1938. goto failure;
  1939. }
  1940. offset = blobmsg_get_u32(tb_cur);
  1941. struct nlattr *rule = nla_nest_start(nlm, ++fmrcnt);
  1942. if (!rule) {
  1943. ret = -ENOMEM;
  1944. goto failure;
  1945. }
  1946. nla_put(nlm, IFLA_IPTUN_FMR_IP6_PREFIX, sizeof(ip6prefix), &ip6prefix);
  1947. nla_put(nlm, IFLA_IPTUN_FMR_IP4_PREFIX, sizeof(ip4prefix), &ip4prefix);
  1948. nla_put_u8(nlm, IFLA_IPTUN_FMR_IP6_PREFIX_LEN, ip6len);
  1949. nla_put_u8(nlm, IFLA_IPTUN_FMR_IP4_PREFIX_LEN, ip4len);
  1950. nla_put_u8(nlm, IFLA_IPTUN_FMR_EA_LEN, ealen);
  1951. nla_put_u8(nlm, IFLA_IPTUN_FMR_OFFSET, offset);
  1952. nla_nest_end(nlm, rule);
  1953. }
  1954. nla_nest_end(nlm, fmrs);
  1955. }
  1956. #endif
  1957. if (tun_flags)
  1958. nla_put_u32(nlm, IFLA_IPTUN_FLAGS, tun_flags);
  1959. }
  1960. nla_nest_end(nlm, infodata);
  1961. nla_nest_end(nlm, linkinfo);
  1962. return system_rtnl_call(nlm);
  1963. failure:
  1964. nlmsg_free(nlm);
  1965. return ret;
  1966. }
  1967. #endif
  1968. #ifdef IFLA_IPTUN_MAX
  1969. #define IP6_FLOWINFO_TCLASS htonl(0x0FF00000)
  1970. static int system_add_gre_tunnel(const char *name, const char *kind,
  1971. const unsigned int link, struct blob_attr **tb, bool v6)
  1972. {
  1973. struct nl_msg *nlm;
  1974. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  1975. struct blob_attr *cur;
  1976. uint32_t ikey = 0, okey = 0, flowinfo = 0, flags6 = IP6_TNL_F_IGN_ENCAP_LIMIT;
  1977. uint16_t iflags = 0, oflags = 0;
  1978. uint8_t tos = 0;
  1979. int ret = 0, ttl = 0;
  1980. unsigned encap_limit = 0;
  1981. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  1982. if (!nlm)
  1983. return -1;
  1984. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  1985. nla_put_string(nlm, IFLA_IFNAME, name);
  1986. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  1987. if (!linkinfo) {
  1988. ret = -ENOMEM;
  1989. goto failure;
  1990. }
  1991. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  1992. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  1993. if (!infodata) {
  1994. ret = -ENOMEM;
  1995. goto failure;
  1996. }
  1997. if (link)
  1998. nla_put_u32(nlm, IFLA_GRE_LINK, link);
  1999. if ((cur = tb[TUNNEL_ATTR_TTL]))
  2000. ttl = blobmsg_get_u32(cur);
  2001. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2002. char *str = blobmsg_get_string(cur);
  2003. if (strcmp(str, "inherit")) {
  2004. unsigned uval;
  2005. if (!system_tos_aton(str, &uval)) {
  2006. ret = -EINVAL;
  2007. goto failure;
  2008. }
  2009. if (v6)
  2010. flowinfo |= htonl(uval << 20) & IP6_FLOWINFO_TCLASS;
  2011. else
  2012. tos = uval;
  2013. } else {
  2014. if (v6)
  2015. flags6 |= IP6_TNL_F_USE_ORIG_TCLASS;
  2016. else
  2017. tos = 1;
  2018. }
  2019. }
  2020. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2021. struct blob_attr *tb_data[__GRE_DATA_ATTR_MAX];
  2022. blobmsg_parse(gre_data_attr_list.params, __GRE_DATA_ATTR_MAX, tb_data,
  2023. blobmsg_data(cur), blobmsg_len(cur));
  2024. if ((cur = tb_data[GRE_DATA_IKEY])) {
  2025. if ((ikey = blobmsg_get_u32(cur)))
  2026. iflags |= GRE_KEY;
  2027. }
  2028. if ((cur = tb_data[GRE_DATA_OKEY])) {
  2029. if ((okey = blobmsg_get_u32(cur)))
  2030. oflags |= GRE_KEY;
  2031. }
  2032. if ((cur = tb_data[GRE_DATA_ICSUM])) {
  2033. if (blobmsg_get_bool(cur))
  2034. iflags |= GRE_CSUM;
  2035. }
  2036. if ((cur = tb_data[GRE_DATA_OCSUM])) {
  2037. if (blobmsg_get_bool(cur))
  2038. oflags |= GRE_CSUM;
  2039. }
  2040. if ((cur = tb_data[GRE_DATA_ISEQNO])) {
  2041. if (blobmsg_get_bool(cur))
  2042. iflags |= GRE_SEQ;
  2043. }
  2044. if ((cur = tb_data[GRE_DATA_OSEQNO])) {
  2045. if (blobmsg_get_bool(cur))
  2046. oflags |= GRE_SEQ;
  2047. }
  2048. if ((cur = tb_data[GRE_DATA_ENCAPLIMIT])) {
  2049. char *str = blobmsg_get_string(cur);
  2050. if (strcmp(str, "ignore")) {
  2051. char *e;
  2052. encap_limit = strtoul(str, &e, 0);
  2053. if (e == str || *e || encap_limit > 255) {
  2054. ret = -EINVAL;
  2055. goto failure;
  2056. }
  2057. flags6 &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
  2058. }
  2059. }
  2060. }
  2061. if (v6) {
  2062. struct in6_addr in6buf;
  2063. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2064. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2065. ret = -EINVAL;
  2066. goto failure;
  2067. }
  2068. nla_put(nlm, IFLA_GRE_LOCAL, sizeof(in6buf), &in6buf);
  2069. }
  2070. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2071. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2072. ret = -EINVAL;
  2073. goto failure;
  2074. }
  2075. nla_put(nlm, IFLA_GRE_REMOTE, sizeof(in6buf), &in6buf);
  2076. }
  2077. if (!(flags6 & IP6_TNL_F_IGN_ENCAP_LIMIT))
  2078. nla_put_u8(nlm, IFLA_GRE_ENCAP_LIMIT, encap_limit);
  2079. if (flowinfo)
  2080. nla_put_u32(nlm, IFLA_GRE_FLOWINFO, flowinfo);
  2081. if (flags6)
  2082. nla_put_u32(nlm, IFLA_GRE_FLAGS, flags6);
  2083. if (!ttl)
  2084. ttl = 64;
  2085. } else {
  2086. struct in_addr inbuf;
  2087. bool set_df = true;
  2088. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2089. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2090. ret = -EINVAL;
  2091. goto failure;
  2092. }
  2093. nla_put(nlm, IFLA_GRE_LOCAL, sizeof(inbuf), &inbuf);
  2094. }
  2095. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2096. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2097. ret = -EINVAL;
  2098. goto failure;
  2099. }
  2100. nla_put(nlm, IFLA_GRE_REMOTE, sizeof(inbuf), &inbuf);
  2101. if (IN_MULTICAST(ntohl(inbuf.s_addr))) {
  2102. if (!okey) {
  2103. okey = inbuf.s_addr;
  2104. oflags |= GRE_KEY;
  2105. }
  2106. if (!ikey) {
  2107. ikey = inbuf.s_addr;
  2108. iflags |= GRE_KEY;
  2109. }
  2110. }
  2111. }
  2112. if ((cur = tb[TUNNEL_ATTR_DF]))
  2113. set_df = blobmsg_get_bool(cur);
  2114. if (!set_df) {
  2115. /* ttl != 0 and nopmtudisc are incompatible */
  2116. if (ttl) {
  2117. ret = -EINVAL;
  2118. goto failure;
  2119. }
  2120. } else if (!ttl)
  2121. ttl = 64;
  2122. nla_put_u8(nlm, IFLA_GRE_PMTUDISC, set_df ? 1 : 0);
  2123. nla_put_u8(nlm, IFLA_GRE_TOS, tos);
  2124. }
  2125. if (ttl)
  2126. nla_put_u8(nlm, IFLA_GRE_TTL, ttl);
  2127. if (oflags)
  2128. nla_put_u16(nlm, IFLA_GRE_OFLAGS, oflags);
  2129. if (iflags)
  2130. nla_put_u16(nlm, IFLA_GRE_IFLAGS, iflags);
  2131. if (okey)
  2132. nla_put_u32(nlm, IFLA_GRE_OKEY, htonl(okey));
  2133. if (ikey)
  2134. nla_put_u32(nlm, IFLA_GRE_IKEY, htonl(ikey));
  2135. nla_nest_end(nlm, infodata);
  2136. nla_nest_end(nlm, linkinfo);
  2137. return system_rtnl_call(nlm);
  2138. failure:
  2139. nlmsg_free(nlm);
  2140. return ret;
  2141. }
  2142. #endif
  2143. #ifdef IFLA_VTI_MAX
  2144. static int system_add_vti_tunnel(const char *name, const char *kind,
  2145. const unsigned int link, struct blob_attr **tb, bool v6)
  2146. {
  2147. struct nl_msg *nlm;
  2148. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  2149. struct blob_attr *cur;
  2150. int ret = 0;
  2151. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  2152. if (!nlm)
  2153. return -1;
  2154. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  2155. nla_put_string(nlm, IFLA_IFNAME, name);
  2156. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2157. if (!linkinfo) {
  2158. ret = -ENOMEM;
  2159. goto failure;
  2160. }
  2161. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  2162. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2163. if (!infodata) {
  2164. ret = -ENOMEM;
  2165. goto failure;
  2166. }
  2167. if (link)
  2168. nla_put_u32(nlm, IFLA_VTI_LINK, link);
  2169. if (v6) {
  2170. struct in6_addr in6buf;
  2171. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2172. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2173. ret = -EINVAL;
  2174. goto failure;
  2175. }
  2176. nla_put(nlm, IFLA_VTI_LOCAL, sizeof(in6buf), &in6buf);
  2177. }
  2178. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2179. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2180. ret = -EINVAL;
  2181. goto failure;
  2182. }
  2183. nla_put(nlm, IFLA_VTI_REMOTE, sizeof(in6buf), &in6buf);
  2184. }
  2185. } else {
  2186. struct in_addr inbuf;
  2187. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2188. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2189. ret = -EINVAL;
  2190. goto failure;
  2191. }
  2192. nla_put(nlm, IFLA_VTI_LOCAL, sizeof(inbuf), &inbuf);
  2193. }
  2194. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2195. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2196. ret = -EINVAL;
  2197. goto failure;
  2198. }
  2199. nla_put(nlm, IFLA_VTI_REMOTE, sizeof(inbuf), &inbuf);
  2200. }
  2201. }
  2202. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2203. struct blob_attr *tb_data[__VTI_DATA_ATTR_MAX];
  2204. uint32_t ikey = 0, okey = 0;
  2205. blobmsg_parse(vti_data_attr_list.params, __VTI_DATA_ATTR_MAX, tb_data,
  2206. blobmsg_data(cur), blobmsg_len(cur));
  2207. if ((cur = tb_data[VTI_DATA_IKEY])) {
  2208. if ((ikey = blobmsg_get_u32(cur)))
  2209. nla_put_u32(nlm, IFLA_VTI_IKEY, htonl(ikey));
  2210. }
  2211. if ((cur = tb_data[VTI_DATA_OKEY])) {
  2212. if ((okey = blobmsg_get_u32(cur)))
  2213. nla_put_u32(nlm, IFLA_VTI_OKEY, htonl(okey));
  2214. }
  2215. }
  2216. nla_nest_end(nlm, infodata);
  2217. nla_nest_end(nlm, linkinfo);
  2218. return system_rtnl_call(nlm);
  2219. failure:
  2220. nlmsg_free(nlm);
  2221. return ret;
  2222. }
  2223. #endif
  2224. #ifdef IFLA_VXLAN_MAX
  2225. static int system_add_vxlan(const char *name, const unsigned int link, struct blob_attr **tb, bool v6)
  2226. {
  2227. struct blob_attr *tb_data[__VXLAN_DATA_ATTR_MAX];
  2228. struct nl_msg *msg;
  2229. struct nlattr *linkinfo, *data;
  2230. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC, };
  2231. struct blob_attr *cur;
  2232. int ret = 0;
  2233. if ((cur = tb[TUNNEL_ATTR_DATA]))
  2234. blobmsg_parse(vxlan_data_attr_list.params, __VXLAN_DATA_ATTR_MAX, tb_data,
  2235. blobmsg_data(cur), blobmsg_len(cur));
  2236. else
  2237. return -EINVAL;
  2238. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  2239. if (!msg)
  2240. return -1;
  2241. nlmsg_append(msg, &iim, sizeof(iim), 0);
  2242. nla_put_string(msg, IFLA_IFNAME, name);
  2243. if ((cur = tb_data[VXLAN_DATA_ATTR_MACADDR])) {
  2244. struct ether_addr *ea = ether_aton(blobmsg_get_string(cur));
  2245. if (!ea) {
  2246. ret = -EINVAL;
  2247. goto failure;
  2248. }
  2249. nla_put(msg, IFLA_ADDRESS, ETH_ALEN, ea);
  2250. }
  2251. if ((cur = tb[TUNNEL_ATTR_MTU])) {
  2252. uint32_t mtu = blobmsg_get_u32(cur);
  2253. nla_put_u32(msg, IFLA_MTU, mtu);
  2254. }
  2255. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO))) {
  2256. ret = -ENOMEM;
  2257. goto failure;
  2258. }
  2259. nla_put_string(msg, IFLA_INFO_KIND, "vxlan");
  2260. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA))) {
  2261. ret = -ENOMEM;
  2262. goto failure;
  2263. }
  2264. if (link)
  2265. nla_put_u32(msg, IFLA_VXLAN_LINK, link);
  2266. if ((cur = tb_data[VXLAN_DATA_ATTR_ID])) {
  2267. uint32_t id = blobmsg_get_u32(cur);
  2268. if (id >= (1u << 24) - 1) {
  2269. ret = -EINVAL;
  2270. goto failure;
  2271. }
  2272. nla_put_u32(msg, IFLA_VXLAN_ID, id);
  2273. }
  2274. if (v6) {
  2275. struct in6_addr in6buf;
  2276. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2277. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2278. ret = -EINVAL;
  2279. goto failure;
  2280. }
  2281. nla_put(msg, IFLA_VXLAN_LOCAL6, sizeof(in6buf), &in6buf);
  2282. }
  2283. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2284. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2285. ret = -EINVAL;
  2286. goto failure;
  2287. }
  2288. nla_put(msg, IFLA_VXLAN_GROUP6, sizeof(in6buf), &in6buf);
  2289. }
  2290. } else {
  2291. struct in_addr inbuf;
  2292. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2293. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2294. ret = -EINVAL;
  2295. goto failure;
  2296. }
  2297. nla_put(msg, IFLA_VXLAN_LOCAL, sizeof(inbuf), &inbuf);
  2298. }
  2299. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2300. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2301. ret = -EINVAL;
  2302. goto failure;
  2303. }
  2304. nla_put(msg, IFLA_VXLAN_GROUP, sizeof(inbuf), &inbuf);
  2305. }
  2306. }
  2307. uint32_t port = 4789;
  2308. if ((cur = tb_data[VXLAN_DATA_ATTR_PORT])) {
  2309. port = blobmsg_get_u32(cur);
  2310. if (port < 1 || port > 65535) {
  2311. ret = -EINVAL;
  2312. goto failure;
  2313. }
  2314. }
  2315. nla_put_u16(msg, IFLA_VXLAN_PORT, htons(port));
  2316. if ((cur = tb_data[VXLAN_DATA_ATTR_RXCSUM])) {
  2317. bool rxcsum = blobmsg_get_bool(cur);
  2318. nla_put_u8(msg, IFLA_VXLAN_UDP_ZERO_CSUM6_RX, !rxcsum);
  2319. }
  2320. if ((cur = tb_data[VXLAN_DATA_ATTR_TXCSUM])) {
  2321. bool txcsum = blobmsg_get_bool(cur);
  2322. nla_put_u8(msg, IFLA_VXLAN_UDP_CSUM, txcsum);
  2323. nla_put_u8(msg, IFLA_VXLAN_UDP_ZERO_CSUM6_TX, !txcsum);
  2324. }
  2325. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2326. char *str = blobmsg_get_string(cur);
  2327. unsigned tos = 1;
  2328. if (strcmp(str, "inherit")) {
  2329. if (!system_tos_aton(str, &tos)) {
  2330. ret = -EINVAL;
  2331. goto failure;
  2332. }
  2333. }
  2334. nla_put_u8(msg, IFLA_VXLAN_TOS, tos);
  2335. }
  2336. if ((cur = tb[TUNNEL_ATTR_TTL])) {
  2337. uint32_t ttl = blobmsg_get_u32(cur);
  2338. if (ttl < 1 || ttl > 255) {
  2339. ret = -EINVAL;
  2340. goto failure;
  2341. }
  2342. nla_put_u8(msg, IFLA_VXLAN_TTL, ttl);
  2343. }
  2344. nla_nest_end(msg, data);
  2345. nla_nest_end(msg, linkinfo);
  2346. ret = system_rtnl_call(msg);
  2347. if (ret)
  2348. D(SYSTEM, "Error adding vxlan '%s': %d\n", name, ret);
  2349. return ret;
  2350. failure:
  2351. nlmsg_free(msg);
  2352. return ret;
  2353. }
  2354. #endif
  2355. static int system_add_sit_tunnel(const char *name, const unsigned int link, struct blob_attr **tb)
  2356. {
  2357. struct blob_attr *cur;
  2358. int ret = 0;
  2359. if (system_add_proto_tunnel(name, IPPROTO_IPV6, link, tb) < 0)
  2360. return -1;
  2361. #ifdef SIOCADD6RD
  2362. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2363. struct blob_attr *tb_data[__SIXRD_DATA_ATTR_MAX];
  2364. unsigned int mask;
  2365. struct ip_tunnel_6rd p6;
  2366. blobmsg_parse(sixrd_data_attr_list.params, __SIXRD_DATA_ATTR_MAX, tb_data,
  2367. blobmsg_data(cur), blobmsg_len(cur));
  2368. memset(&p6, 0, sizeof(p6));
  2369. if ((cur = tb_data[SIXRD_DATA_PREFIX])) {
  2370. if (!parse_ip_and_netmask(AF_INET6, blobmsg_data(cur),
  2371. &p6.prefix, &mask) || mask > 128) {
  2372. ret = -EINVAL;
  2373. goto failure;
  2374. }
  2375. p6.prefixlen = mask;
  2376. }
  2377. if ((cur = tb_data[SIXRD_DATA_RELAY_PREFIX])) {
  2378. if (!parse_ip_and_netmask(AF_INET, blobmsg_data(cur),
  2379. &p6.relay_prefix, &mask) || mask > 32) {
  2380. ret = -EINVAL;
  2381. goto failure;
  2382. }
  2383. p6.relay_prefixlen = mask;
  2384. }
  2385. if (tunnel_ioctl(name, SIOCADD6RD, &p6) < 0) {
  2386. ret = -1;
  2387. goto failure;
  2388. }
  2389. }
  2390. #endif
  2391. return ret;
  2392. failure:
  2393. __system_del_ip_tunnel(name, tb);
  2394. return ret;
  2395. }
  2396. static int system_add_proto_tunnel(const char *name, const uint8_t proto, const unsigned int link, struct blob_attr **tb)
  2397. {
  2398. struct blob_attr *cur;
  2399. bool set_df = true;
  2400. struct ip_tunnel_parm p = {
  2401. .link = link,
  2402. .iph = {
  2403. .version = 4,
  2404. .ihl = 5,
  2405. .protocol = proto,
  2406. }
  2407. };
  2408. if ((cur = tb[TUNNEL_ATTR_LOCAL]) &&
  2409. inet_pton(AF_INET, blobmsg_data(cur), &p.iph.saddr) < 1)
  2410. return -EINVAL;
  2411. if ((cur = tb[TUNNEL_ATTR_REMOTE]) &&
  2412. inet_pton(AF_INET, blobmsg_data(cur), &p.iph.daddr) < 1)
  2413. return -EINVAL;
  2414. if ((cur = tb[TUNNEL_ATTR_DF]))
  2415. set_df = blobmsg_get_bool(cur);
  2416. if ((cur = tb[TUNNEL_ATTR_TTL]))
  2417. p.iph.ttl = blobmsg_get_u32(cur);
  2418. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2419. char *str = blobmsg_get_string(cur);
  2420. if (strcmp(str, "inherit")) {
  2421. unsigned uval;
  2422. if (!system_tos_aton(str, &uval))
  2423. return -EINVAL;
  2424. p.iph.tos = uval;
  2425. } else
  2426. p.iph.tos = 1;
  2427. }
  2428. p.iph.frag_off = set_df ? htons(IP_DF) : 0;
  2429. /* ttl !=0 and nopmtudisc are incompatible */
  2430. if (p.iph.ttl && p.iph.frag_off == 0)
  2431. return -EINVAL;
  2432. strncpy(p.name, name, sizeof(p.name) - 1);
  2433. switch (p.iph.protocol) {
  2434. case IPPROTO_IPIP:
  2435. return tunnel_ioctl("tunl0", SIOCADDTUNNEL, &p);
  2436. case IPPROTO_IPV6:
  2437. return tunnel_ioctl("sit0", SIOCADDTUNNEL, &p);
  2438. default:
  2439. break;
  2440. }
  2441. return -1;
  2442. }
  2443. static int __system_del_ip_tunnel(const char *name, struct blob_attr **tb)
  2444. {
  2445. struct blob_attr *cur;
  2446. const char *str;
  2447. if (!(cur = tb[TUNNEL_ATTR_TYPE]))
  2448. return -EINVAL;
  2449. str = blobmsg_data(cur);
  2450. if (!strcmp(str, "greip") || !strcmp(str, "gretapip") ||
  2451. !strcmp(str, "greip6") || !strcmp(str, "gretapip6") ||
  2452. !strcmp(str, "vtiip") || !strcmp(str, "vtiip6") ||
  2453. !strcmp(str, "vxlan") || !strcmp(str, "vxlan6"))
  2454. return system_link_del(name);
  2455. else
  2456. return tunnel_ioctl(name, SIOCDELTUNNEL, NULL);
  2457. }
  2458. int system_del_ip_tunnel(const char *name, struct blob_attr *attr)
  2459. {
  2460. struct blob_attr *tb[__TUNNEL_ATTR_MAX];
  2461. blobmsg_parse(tunnel_attr_list.params, __TUNNEL_ATTR_MAX, tb,
  2462. blob_data(attr), blob_len(attr));
  2463. return __system_del_ip_tunnel(name, tb);
  2464. }
  2465. int system_update_ipv6_mtu(struct device *dev, int mtu)
  2466. {
  2467. int ret = -1;
  2468. char buf[64];
  2469. int fd;
  2470. snprintf(buf, sizeof(buf), "/proc/sys/net/ipv6/conf/%s/mtu",
  2471. dev->ifname);
  2472. fd = open(buf, O_RDWR);
  2473. if (fd < 0)
  2474. return ret;
  2475. if (!mtu) {
  2476. ssize_t len = read(fd, buf, sizeof(buf) - 1);
  2477. if (len < 0)
  2478. goto out;
  2479. buf[len] = 0;
  2480. ret = atoi(buf);
  2481. } else {
  2482. if (write(fd, buf, snprintf(buf, sizeof(buf), "%i", mtu)) > 0)
  2483. ret = mtu;
  2484. }
  2485. out:
  2486. close(fd);
  2487. return ret;
  2488. }
  2489. int system_add_ip_tunnel(const char *name, struct blob_attr *attr)
  2490. {
  2491. struct blob_attr *tb[__TUNNEL_ATTR_MAX];
  2492. struct blob_attr *cur;
  2493. const char *str;
  2494. blobmsg_parse(tunnel_attr_list.params, __TUNNEL_ATTR_MAX, tb,
  2495. blob_data(attr), blob_len(attr));
  2496. __system_del_ip_tunnel(name, tb);
  2497. if (!(cur = tb[TUNNEL_ATTR_TYPE]))
  2498. return -EINVAL;
  2499. str = blobmsg_data(cur);
  2500. unsigned int ttl = 0;
  2501. if ((cur = tb[TUNNEL_ATTR_TTL])) {
  2502. ttl = blobmsg_get_u32(cur);
  2503. if (ttl > 255)
  2504. return -EINVAL;
  2505. }
  2506. unsigned int link = 0;
  2507. if ((cur = tb[TUNNEL_ATTR_LINK])) {
  2508. struct interface *iface = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
  2509. if (!iface)
  2510. return -EINVAL;
  2511. if (iface->l3_dev.dev)
  2512. link = iface->l3_dev.dev->ifindex;
  2513. }
  2514. if (!strcmp(str, "sit"))
  2515. return system_add_sit_tunnel(name, link, tb);
  2516. #ifdef IFLA_IPTUN_MAX
  2517. else if (!strcmp(str, "ipip6")) {
  2518. return system_add_ip6_tunnel(name, link, tb);
  2519. } else if (!strcmp(str, "greip")) {
  2520. return system_add_gre_tunnel(name, "gre", link, tb, false);
  2521. } else if (!strcmp(str, "gretapip")) {
  2522. return system_add_gre_tunnel(name, "gretap", link, tb, false);
  2523. } else if (!strcmp(str, "greip6")) {
  2524. return system_add_gre_tunnel(name, "ip6gre", link, tb, true);
  2525. } else if (!strcmp(str, "gretapip6")) {
  2526. return system_add_gre_tunnel(name, "ip6gretap", link, tb, true);
  2527. #ifdef IFLA_VTI_MAX
  2528. } else if (!strcmp(str, "vtiip")) {
  2529. return system_add_vti_tunnel(name, "vti", link, tb, false);
  2530. } else if (!strcmp(str, "vtiip6")) {
  2531. return system_add_vti_tunnel(name, "vti6", link, tb, true);
  2532. #endif
  2533. #ifdef IFLA_VXLAN_MAX
  2534. } else if(!strcmp(str, "vxlan")) {
  2535. return system_add_vxlan(name, link, tb, false);
  2536. } else if(!strcmp(str, "vxlan6")) {
  2537. return system_add_vxlan(name, link, tb, true);
  2538. #endif
  2539. #endif
  2540. } else if (!strcmp(str, "ipip")) {
  2541. return system_add_proto_tunnel(name, IPPROTO_IPIP, link, tb);
  2542. }
  2543. else
  2544. return -EINVAL;
  2545. return 0;
  2546. }