41#include <sys/socket.h>
42#include <linux/netlink.h>
43#include <linux/rtnetlink.h>
45#define SNDBUF_SIZE (1024 * 2)
46#define RCVBUF_SIZE (1024 * 4)
48#define SITNL_ADDATTR(_msg, _max_size, _attr, _data, _size) \
50 if (sitnl_addattr(_msg, _max_size, _attr, _data, _size) < 0) \
56#define SITNL_NEST(_msg, _max_size, _attr) \
58 struct rtattr *_nest = sitnl_nlmsg_tail(_msg); \
59 SITNL_ADDATTR(_msg, _max_size, _attr, NULL, 0); \
63#define SITNL_NEST_END(_msg, _nest) \
65 _nest->rta_len = (unsigned short)((void *)sitnl_nlmsg_tail(_msg) - (void *)_nest); \
79sitnl_nlmsg_tail(
const struct nlmsghdr *nlh)
81 return (
unsigned char *)nlh + NLMSG_ALIGN(nlh->nlmsg_len);
117struct sitnl_route_req
124typedef int (*sitnl_parse_reply_cb)(
struct nlmsghdr *
msg,
void *arg);
130sitnl_addattr(
struct nlmsghdr *n,
size_t maxlen,
unsigned short type,
const void *data,
size_t alen)
132 size_t len = RTA_LENGTH(alen);
134 if ((NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len)) > maxlen)
136 msg(
M_WARN,
"%s: rtnl: message exceeded bound of %zu", __func__, maxlen);
140 struct rtattr *rta = sitnl_nlmsg_tail(n);
141 rta->rta_type = type;
143 rta->rta_len = (
unsigned short)len;
147 memset(RTA_DATA(rta), 0, alen);
151 memcpy(RTA_DATA(rta), data, alen);
154 n->nlmsg_len = NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len);
165 int sndbuf = SNDBUF_SIZE;
166 int rcvbuf = RCVBUF_SIZE;
169 fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
172 msg(
M_WARN,
"%s: cannot open netlink socket", __func__);
179 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &sndbuf,
sizeof(sndbuf)) < 0)
186 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &rcvbuf,
sizeof(rcvbuf)) < 0)
200sitnl_bind(
int fd, uint32_t groups)
203 struct sockaddr_nl local;
207 local.nl_family = AF_NETLINK;
208 local.nl_groups = groups;
210 if (bind(fd, (
struct sockaddr *)&local,
sizeof(local)) < 0)
216 addr_len =
sizeof(local);
217 if (getsockname(fd, (
struct sockaddr *)&local, &addr_len) < 0)
223 if (addr_len !=
sizeof(local))
225 msg(
M_WARN,
"%s: wrong address length %d", __func__, addr_len);
229 if (local.nl_family != AF_NETLINK)
231 msg(
M_WARN,
"%s: wrong address family %d", __func__, local.nl_family);
242sitnl_send(
struct nlmsghdr *payload, pid_t peer,
unsigned int groups, sitnl_parse_reply_cb cb,
246 struct sockaddr_nl nladdr;
247 struct nlmsgerr *err;
252 .iov_len = payload->nlmsg_len,
254 struct msghdr nlmsg = {
256 .msg_namelen =
sizeof(nladdr),
263 nladdr.nl_family = AF_NETLINK;
264 nladdr.nl_pid = peer;
265 nladdr.nl_groups = groups;
271 payload->nlmsg_seq = (uint32_t)time(NULL);
276 payload->nlmsg_flags |= NLM_F_ACK;
286 if (sitnl_bind(fd, 0) < 0)
293 if (sendmsg(fd, &nlmsg, 0) < 0)
301 memset(buf, 0,
sizeof(buf));
310 msg(
D_RTNL,
"%s: checking for received messages", __func__);
311 iov.iov_len =
sizeof(buf);
312 ssize_t rcv_len = recvmsg(fd, &nlmsg, 0);
313 msg(
D_RTNL,
"%s: rtnl: received %zd bytes", __func__, rcv_len);
316 if ((errno == EINTR) || (errno == EAGAIN))
318 msg(
D_RTNL,
"%s: interrupted call", __func__);
328 msg(
M_WARN,
"%s: rtnl: socket reached unexpected EOF", __func__);
333 if (nlmsg.msg_namelen !=
sizeof(nladdr))
335 msg(
M_WARN,
"%s: sender address length: %u (expected %zu)", __func__, nlmsg.msg_namelen,
341 h = (
struct nlmsghdr *)buf;
342 while (rcv_len >= (
int)
sizeof(*h))
344 uint32_t len = h->nlmsg_len;
345 ssize_t rem_len = len -
sizeof(*h);
347 if ((rem_len < 0) || (len > rcv_len))
349 if (nlmsg.msg_flags & MSG_TRUNC)
351 msg(
M_WARN,
"%s: truncated message", __func__);
355 msg(
M_WARN,
"%s: malformed message: len=%u", __func__, len);
373 if (h->nlmsg_type == NLMSG_DONE)
379 if (h->nlmsg_type == NLMSG_ERROR)
381 err = (
struct nlmsgerr *)NLMSG_DATA(h);
382 if (rem_len < (
int)
sizeof(
struct nlmsgerr))
384 msg(
M_WARN,
"%s: ERROR truncated", __func__);
394 int r = cb(h, arg_cb);
403 msg(
M_WARN,
"%s: rtnl: generic error (%d): %s", __func__, err->error,
404 strerror(-err->error));
413 int r = cb(h, arg_cb);
422 msg(
M_WARN,
"%s: RTNL: unexpected reply", __func__);
425 rcv_len -= NLMSG_ALIGN(len);
426 h = (
struct nlmsghdr *)((
char *)h + NLMSG_ALIGN(len));
429 if (nlmsg.msg_flags & MSG_TRUNC)
431 msg(
M_WARN,
"%s: message truncated", __func__);
437 msg(
M_WARN,
"%s: rtnl: %zd not parsed bytes", __func__, rcv_len);
452 char iface[IFNAMSIZ];
458sitnl_route_save(
struct nlmsghdr *n,
void *arg)
460 route_res_t *res = arg;
461 struct rtmsg *r = NLMSG_DATA(n);
462 struct rtattr *rta = RTM_RTA(r);
463 size_t len = n->nlmsg_len - NLMSG_LENGTH(
sizeof(*r));
464 unsigned int table, ifindex = 0;
468 if (res->default_only && r->rtm_dst_len != 0)
474 table = r->rtm_table;
476 while (RTA_OK(rta, len))
478 switch (rta->rta_type)
482 ifindex = *(
unsigned int *)RTA_DATA(rta);
496 table = *(
unsigned int *)RTA_DATA(rta);
500 rta = RTA_NEXT(rta, len);
504 if (res->table && res->table != table)
509 if (!if_indextoname(ifindex, res->iface))
511 msg(
M_WARN |
M_ERRNO,
"%s: rtnl: can't get ifname for index %d", __func__, ifindex);
517 memcpy(&res->gw, gw, res->addr_size);
527 struct sitnl_route_req req;
537 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.r));
538 req.n.nlmsg_type = RTM_GETROUTE;
539 req.n.nlmsg_flags = NLM_F_REQUEST;
541 ASSERT(af_family <= UCHAR_MAX);
542 req.r.rtm_family = (
unsigned char)af_family;
552 if (!dst || !dst->
ipv4)
554 req.n.nlmsg_flags |= NLM_F_DUMP;
555 res.default_only =
true;
556 res.table = RT_TABLE_MAIN;
560 req.r.rtm_dst_len = 32;
565 res.addr_size =
sizeof(
struct in6_addr);
567 req.r.rtm_dst_len = 128;
575 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_DST, dst, res.addr_size);
577 ret = sitnl_send(&req.n, 0, 0, sitnl_route_save, &res);
584 memcpy(best_gw, &res.gw, res.addr_size);
585 strncpy(best_iface, res.iface, IFNAMSIZ);
592net_route_v6_best_gw(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
struct in6_addr *best_gw,
596 char buf[INET6_ADDRSTRLEN];
604 msg(
D_ROUTE,
"%s query: dst %s", __func__, inet_ntop(AF_INET6, &dst_v6.
ipv6, buf,
sizeof(buf)));
606 ret = sitnl_route_best_gw(AF_INET6, &dst_v6, best_gw, best_iface);
612 msg(
D_ROUTE,
"%s result: via %s dev %s", __func__,
613 inet_ntop(AF_INET6, best_gw, buf,
sizeof(buf)), best_iface);
624 char buf[INET_ADDRSTRLEN];
629 dst_v4.
ipv4 = htonl(*dst);
632 msg(
D_ROUTE,
"%s query: dst %s", __func__, inet_ntop(AF_INET, &dst_v4.
ipv4, buf,
sizeof(buf)));
634 ret = sitnl_route_best_gw(AF_INET, &dst_v4, best_gw, best_iface);
640 msg(
D_ROUTE,
"%s result: via %s dev %s", __func__,
641 inet_ntop(AF_INET, best_gw, buf,
sizeof(buf)), best_iface);
644 *best_gw = ntohl(*best_gw);
654 struct sitnl_link_req req;
661 msg(
M_WARN,
"%s: passed NULL interface", __func__);
665 ifindex = if_nametoindex(
iface);
668 msg(
M_WARN,
"%s: rtnl: cannot get ifindex for %s: %s", __func__,
iface, strerror(errno));
672 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
673 req.n.nlmsg_flags = NLM_F_REQUEST;
674 req.n.nlmsg_type = RTM_NEWLINK;
676 req.i.ifi_family = AF_PACKET;
677 req.i.ifi_index = ifindex;
678 req.i.ifi_change |= IFF_UP;
681 req.i.ifi_flags |= IFF_UP;
685 req.i.ifi_flags &= ~IFF_UP;
688 msg(
M_INFO,
"%s: set %s %s", __func__,
iface, up ?
"up" :
"down");
690 return sitnl_send(&req.n, 0, 0, NULL, NULL);
696 struct sitnl_link_req req;
697 int ifindex, ret = -1;
701 ifindex = if_nametoindex(
iface);
708 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
709 req.n.nlmsg_flags = NLM_F_REQUEST;
710 req.n.nlmsg_type = RTM_NEWLINK;
712 req.i.ifi_family = AF_PACKET;
713 req.i.ifi_index = ifindex;
715 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_MTU, &mtu, 4);
719 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
727 struct sitnl_link_req req;
728 int ifindex, ret = -1;
732 ifindex = if_nametoindex(
iface);
739 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
740 req.n.nlmsg_flags = NLM_F_REQUEST;
741 req.n.nlmsg_type = RTM_NEWLINK;
743 req.i.ifi_family = AF_PACKET;
744 req.i.ifi_index = ifindex;
750 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
756sitnl_addr_set(uint16_t cmd, uint16_t flags,
int ifindex,
sa_family_t af_family,
759 struct sitnl_addr_req req;
765 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
766 req.n.nlmsg_type = cmd;
767 req.n.nlmsg_flags = NLM_F_REQUEST | flags;
769 req.i.ifa_index = ifindex;
770 ASSERT(af_family <= UINT8_MAX);
771 req.i.ifa_family = (uint8_t)af_family;
776 size =
sizeof(
struct in_addr);
780 size =
sizeof(
struct in6_addr);
784 msg(
M_WARN,
"%s: rtnl: unknown address family %d", __func__, af_family);
791 prefixlen = size * 8;
793 ASSERT(prefixlen <= UINT8_MAX);
794 req.i.ifa_prefixlen = (uint8_t)prefixlen;
798 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_ADDRESS, remote, size);
803 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_LOCAL, local, size);
806 if (af_family == AF_INET && local && !remote && prefixlen <= 30)
810 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_BROADCAST, &broadcast, size);
813 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
840 msg(
M_WARN,
"%s: passed NULL interface", __func__);
844 ifindex = if_nametoindex(
iface);
847 msg(
M_WARN,
"%s: cannot get ifindex for %s: %s", __func__,
np(
iface), strerror(errno));
851 return sitnl_addr_set(RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, ifindex, af_family, local,
872 msg(
M_WARN,
"%s: passed NULL interface", __func__);
876 ifindex = if_nametoindex(
iface);
883 return sitnl_addr_set(RTM_DELADDR, 0, ifindex, af_family, local, NULL, 0);
887sitnl_route_set(uint16_t cmd, uint16_t flags,
int ifindex,
sa_family_t af_family,
const void *dst,
888 int prefixlen,
const void *gw,
enum rt_class_t table,
int metric,
889 enum rt_scope_t scope,
unsigned char protocol,
unsigned char type)
891 struct sitnl_route_req req;
903 size =
sizeof(
struct in6_addr);
910 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.r));
911 req.n.nlmsg_type = cmd;
912 req.n.nlmsg_flags = NLM_F_REQUEST | flags;
914 ASSERT(af_family <= UCHAR_MAX);
915 req.r.rtm_family = (
unsigned char)af_family;
916 req.r.rtm_scope = (
unsigned char)scope;
917 req.r.rtm_protocol = protocol;
918 req.r.rtm_type = type;
919 ASSERT(prefixlen >= 0 && prefixlen <= UCHAR_MAX);
920 req.r.rtm_dst_len = (
unsigned char)prefixlen;
922 if (table <= UCHAR_MAX)
924 req.r.rtm_table = (
unsigned char)table;
928 req.r.rtm_table = RT_TABLE_UNSPEC;
929 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_TABLE, &table, 4);
934 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_DST, dst, size);
939 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_GATEWAY, gw, size);
944 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_OIF, &ifindex, 4);
949 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_PRIORITY, &metric, 4);
952 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
974 msg(
M_WARN,
"%s: passed NULL interface", __func__);
978 ifindex = if_nametoindex(
iface);
985 return sitnl_addr_set(RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, ifindex, af_family, addr, NULL,
1006 msg(
M_WARN,
"%s: passed NULL interface", __func__);
1010 ifindex = if_nametoindex(
iface);
1017 return sitnl_addr_set(RTM_DELADDR, 0, ifindex, af_family, addr, NULL, prefixlen);
1024 char buf[INET_ADDRSTRLEN];
1031 addr_v4.
ipv4 = htonl(*addr);
1033 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET, &addr_v4.
ipv4, buf,
sizeof(buf)),
1036 return sitnl_addr_add(AF_INET,
iface, &addr_v4, prefixlen);
1044 char buf[INET6_ADDRSTRLEN];
1051 addr_v6.
ipv6 = *addr;
1053 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET6, &addr_v6.
ipv6, buf,
sizeof(buf)),
1056 return sitnl_addr_add(AF_INET6,
iface, &addr_v6, prefixlen);
1063 char buf[INET_ADDRSTRLEN];
1070 addr_v4.
ipv4 = htonl(*addr);
1072 msg(
M_INFO,
"%s: %s dev %s", __func__, inet_ntop(AF_INET, &addr_v4.
ipv4, buf,
sizeof(buf)),
1075 return sitnl_addr_del(AF_INET,
iface, &addr_v4, prefixlen);
1083 char buf[INET6_ADDRSTRLEN];
1090 addr_v6.
ipv6 = *addr;
1092 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET6, &addr_v6.
ipv6, buf,
sizeof(buf)),
1095 return sitnl_addr_del(AF_INET6,
iface, &addr_v6, prefixlen);
1104 char buf1[INET_ADDRSTRLEN];
1105 char buf2[INET_ADDRSTRLEN];
1112 local_v4.
ipv4 = htonl(*local);
1116 remote_v4.
ipv4 = htonl(*remote);
1119 msg(
M_INFO,
"%s: %s peer %s dev %s", __func__,
1120 inet_ntop(AF_INET, &local_v4.
ipv4, buf1,
sizeof(buf1)),
1121 inet_ntop(AF_INET, &remote_v4.
ipv4, buf2,
sizeof(buf2)),
iface);
1123 return sitnl_addr_ptp_add(AF_INET,
iface, &local_v4, &remote_v4);
1131 char buf[INET6_ADDRSTRLEN];
1139 local_v4.
ipv4 = htonl(*local);
1141 msg(
M_INFO,
"%s: %s dev %s", __func__, inet_ntop(AF_INET, &local_v4.
ipv4, buf,
sizeof(buf)),
1144 return sitnl_addr_ptp_del(AF_INET,
iface, &local_v4);
1148sitnl_route_add(
const char *
iface,
sa_family_t af_family,
const void *dst,
int prefixlen,
1149 const void *gw, uint32_t table,
int metric)
1151 enum rt_scope_t scope = RT_SCOPE_UNIVERSE;
1156 ifindex = if_nametoindex(
iface);
1166 table = RT_TABLE_MAIN;
1171 scope = RT_SCOPE_LINK;
1174 return sitnl_route_set(RTM_NEWROUTE, NLM_F_CREATE, ifindex, af_family, dst, prefixlen, gw,
1175 table, metric, scope, RTPROT_BOOT, RTN_UNICAST);
1180 const char *
iface, uint32_t table,
int metric)
1182 in_addr_t *dst_ptr = NULL, *gw_ptr = NULL;
1184 char dst_str[INET_ADDRSTRLEN];
1185 char gw_str[INET_ADDRSTRLEN];
1189 dst_be = htonl(*dst);
1199 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1200 inet_ntop(AF_INET, &dst_be, dst_str,
sizeof(dst_str)), prefixlen,
1201 inet_ntop(AF_INET, &gw_be, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1203 return sitnl_route_add(
iface, AF_INET, dst_ptr, prefixlen, gw_ptr, table, metric);
1207net_route_v6_add(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
int prefixlen,
1208 const struct in6_addr *gw,
const char *
iface, uint32_t table,
int metric)
1212 char dst_str[INET6_ADDRSTRLEN];
1213 char gw_str[INET6_ADDRSTRLEN];
1225 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1226 inet_ntop(AF_INET6, &dst_v6.
ipv6, dst_str,
sizeof(dst_str)), prefixlen,
1227 inet_ntop(AF_INET6, &gw_v6.
ipv6, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1229 return sitnl_route_add(
iface, AF_INET6, dst, prefixlen, gw, table, metric);
1240 ifindex = if_nametoindex(
iface);
1250 table = RT_TABLE_MAIN;
1253 return sitnl_route_set(RTM_DELROUTE, 0, ifindex, af_family, dst, prefixlen, gw, table, metric,
1254 RT_SCOPE_NOWHERE, 0, 0);
1259 const char *
iface, uint32_t table,
int metric)
1263 char dst_str[INET_ADDRSTRLEN];
1264 char gw_str[INET_ADDRSTRLEN];
1268 dst_v4.
ipv4 = htonl(*dst);
1273 gw_v4.
ipv4 = htonl(*gw);
1276 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1277 inet_ntop(AF_INET, &dst_v4.
ipv4, dst_str,
sizeof(dst_str)), prefixlen,
1278 inet_ntop(AF_INET, &gw_v4.
ipv4, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1280 return sitnl_route_del(
iface, AF_INET, &dst_v4, prefixlen, &gw_v4, table, metric);
1284net_route_v6_del(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
int prefixlen,
1285 const struct in6_addr *gw,
const char *
iface, uint32_t table,
int metric)
1289 char dst_str[INET6_ADDRSTRLEN];
1290 char gw_str[INET6_ADDRSTRLEN];
1302 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1303 inet_ntop(AF_INET6, &dst_v6.
ipv6, dst_str,
sizeof(dst_str)), prefixlen,
1304 inet_ntop(AF_INET6, &gw_v6.
ipv6, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1306 return sitnl_route_del(
iface, AF_INET6, &dst_v6, prefixlen, &gw_v6, table, metric);
1313 struct sitnl_link_req req = {};
1318 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1319 req.n.nlmsg_flags = NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL;
1320 req.n.nlmsg_type = RTM_NEWLINK;
1322 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_IFNAME,
iface, strlen(
iface) + 1);
1324 struct rtattr *linkinfo = SITNL_NEST(&req.n,
sizeof(req), IFLA_LINKINFO);
1325 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_INFO_KIND, type, strlen(type) + 1);
1326#if defined(ENABLE_DCO)
1330 struct rtattr *data = SITNL_NEST(&req.n,
sizeof(req), IFLA_INFO_DATA);
1338 uint8_t ifmode = (uint8_t)dco->ifmode;
1339 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_OVPN_MODE, &ifmode,
sizeof(uint8_t));
1340 SITNL_NEST_END(&req.n, data);
1343 SITNL_NEST_END(&req.n, linkinfo);
1345 req.i.ifi_family = AF_PACKET;
1349 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
1355sitnl_parse_rtattr_flags(
struct rtattr *tb[],
size_t max,
struct rtattr *rta,
size_t len,
1356 unsigned short flags)
1358 unsigned short type;
1360 memset(tb, 0,
sizeof(
struct rtattr *) * (max + 1));
1362 while (RTA_OK(rta, len))
1364 type = rta->rta_type & ~flags;
1366 if ((type <= max) && (!tb[type]))
1371 rta = RTA_NEXT(rta, len);
1376 msg(
D_ROUTE,
"%s: %zu bytes not parsed! (rta_len=%u)", __func__, len, rta->rta_len);
1381sitnl_parse_rtattr(
struct rtattr *tb[],
size_t max,
struct rtattr *rta,
size_t len)
1383 sitnl_parse_rtattr_flags(tb, max, rta, len, 0);
1386#define sitnl_parse_rtattr_nested(tb, max, rta) \
1387 (sitnl_parse_rtattr_flags(tb, max, RTA_DATA(rta), RTA_PAYLOAD(rta), NLA_F_NESTED))
1390sitnl_type_save(
struct nlmsghdr *n,
void *arg)
1393 struct ifinfomsg *ifi = NLMSG_DATA(n);
1394 struct rtattr *tb[IFLA_MAX + 1];
1396 sitnl_parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), IFLA_PAYLOAD(n));
1398 if (tb[IFLA_LINKINFO])
1400 struct rtattr *tb_link[IFLA_INFO_MAX + 1];
1402 sitnl_parse_rtattr_nested(tb_link, IFLA_INFO_MAX, tb[IFLA_LINKINFO]);
1404 if (!tb_link[IFLA_INFO_KIND])
1418 struct sitnl_link_req req = {};
1419 int ifindex = if_nametoindex(
iface);
1426 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1427 req.n.nlmsg_flags = NLM_F_REQUEST;
1428 req.n.nlmsg_type = RTM_GETLINK;
1430 req.i.ifi_family = AF_PACKET;
1431 req.i.ifi_index = ifindex;
1435 int ret = sitnl_send(&req.n, 0, 0, sitnl_type_save, type);
1438 msg(
D_ROUTE,
"%s: cannot retrieve iface %s: %s (%d)", __func__,
iface, strerror(-ret), ret);
1450 struct sitnl_link_req req = {};
1451 int ifindex = if_nametoindex(
iface);
1458 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1459 req.n.nlmsg_flags = NLM_F_REQUEST;
1460 req.n.nlmsg_type = RTM_DELLINK;
1462 req.i.ifi_family = AF_PACKET;
1463 req.i.ifi_index = ifindex;
1467 return sitnl_send(&req.n, 0, 0, NULL, NULL);
static void strncpynt(char *dest, const char *src, size_t maxlen)
void set_cloexec(socket_descriptor_t fd)
#define MAC_PRINT_ARG(_mac)
static const char * np(const char *str)
void * openvpn_net_iface_t
#define IFACE_TYPE_LEN_MAX
static in_addr_t netbits_to_netmask(const int netbits)
unsigned short sa_family_t