40#include <sys/socket.h>
41#include <linux/netlink.h>
42#include <linux/rtnetlink.h>
44#define SNDBUF_SIZE (1024 * 2)
45#define RCVBUF_SIZE (1024 * 4)
47#define SITNL_ADDATTR(_msg, _max_size, _attr, _data, _size) \
49 if (sitnl_addattr(_msg, _max_size, _attr, _data, _size) < 0) \
55#define SITNL_NEST(_msg, _max_size, _attr) \
57 struct rtattr *_nest = sitnl_nlmsg_tail(_msg); \
58 SITNL_ADDATTR(_msg, _max_size, _attr, NULL, 0); \
62#define SITNL_NEST_END(_msg, _nest) \
64 _nest->rta_len = (unsigned short)((void *)sitnl_nlmsg_tail(_msg) - (void *)_nest); \
78sitnl_nlmsg_tail(
const struct nlmsghdr *nlh)
80 return (
unsigned char *)nlh + NLMSG_ALIGN(nlh->nlmsg_len);
116struct sitnl_route_req
123typedef int (*sitnl_parse_reply_cb)(
struct nlmsghdr *
msg,
void *arg);
128struct sitnl_route_data_cb
138sitnl_addattr(
struct nlmsghdr *n,
size_t maxlen,
unsigned short type,
const void *data,
size_t alen)
140 size_t len = RTA_LENGTH(alen);
142 if ((NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len)) > maxlen)
144 msg(
M_WARN,
"%s: rtnl: message exceeded bound of %zu", __func__, maxlen);
148 struct rtattr *rta = sitnl_nlmsg_tail(n);
149 rta->rta_type = type;
151 rta->rta_len = (
unsigned short)len;
155 memset(RTA_DATA(rta), 0, alen);
159 memcpy(RTA_DATA(rta), data, alen);
162 n->nlmsg_len = NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len);
173 int sndbuf = SNDBUF_SIZE;
174 int rcvbuf = RCVBUF_SIZE;
177 fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
180 msg(
M_WARN,
"%s: cannot open netlink socket", __func__);
184 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &sndbuf,
sizeof(sndbuf)) < 0)
191 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &rcvbuf,
sizeof(rcvbuf)) < 0)
205sitnl_bind(
int fd, uint32_t groups)
208 struct sockaddr_nl local;
212 local.nl_family = AF_NETLINK;
213 local.nl_groups = groups;
215 if (bind(fd, (
struct sockaddr *)&local,
sizeof(local)) < 0)
221 addr_len =
sizeof(local);
222 if (getsockname(fd, (
struct sockaddr *)&local, &addr_len) < 0)
228 if (addr_len !=
sizeof(local))
230 msg(
M_WARN,
"%s: wrong address length %d", __func__, addr_len);
234 if (local.nl_family != AF_NETLINK)
236 msg(
M_WARN,
"%s: wrong address family %d", __func__, local.nl_family);
247sitnl_send(
struct nlmsghdr *payload, pid_t peer,
unsigned int groups, sitnl_parse_reply_cb cb,
251 struct sockaddr_nl nladdr;
252 struct nlmsgerr *err;
257 .iov_len = payload->nlmsg_len,
259 struct msghdr nlmsg = {
261 .msg_namelen =
sizeof(nladdr),
268 nladdr.nl_family = AF_NETLINK;
269 nladdr.nl_pid = peer;
270 nladdr.nl_groups = groups;
276 payload->nlmsg_seq = (uint32_t)time(NULL);
281 payload->nlmsg_flags |= NLM_F_ACK;
291 if (sitnl_bind(fd, 0) < 0)
298 if (sendmsg(fd, &nlmsg, 0) < 0)
306 memset(buf, 0,
sizeof(buf));
315 msg(
D_RTNL,
"%s: checking for received messages", __func__);
316 iov.iov_len =
sizeof(buf);
317 ssize_t rcv_len = recvmsg(fd, &nlmsg, 0);
318 msg(
D_RTNL,
"%s: rtnl: received %zd bytes", __func__, rcv_len);
321 if ((errno == EINTR) || (errno == EAGAIN))
323 msg(
D_RTNL,
"%s: interrupted call", __func__);
333 msg(
M_WARN,
"%s: rtnl: socket reached unexpected EOF", __func__);
338 if (nlmsg.msg_namelen !=
sizeof(nladdr))
340 msg(
M_WARN,
"%s: sender address length: %u (expected %zu)", __func__, nlmsg.msg_namelen,
346 h = (
struct nlmsghdr *)buf;
347 while (rcv_len >= (
int)
sizeof(*h))
349 uint32_t len = h->nlmsg_len;
350 ssize_t rem_len = len -
sizeof(*h);
352 if ((rem_len < 0) || (len > rcv_len))
354 if (nlmsg.msg_flags & MSG_TRUNC)
356 msg(
M_WARN,
"%s: truncated message", __func__);
360 msg(
M_WARN,
"%s: malformed message: len=%u", __func__, len);
378 if (h->nlmsg_type == NLMSG_DONE)
384 if (h->nlmsg_type == NLMSG_ERROR)
386 err = (
struct nlmsgerr *)NLMSG_DATA(h);
387 if (rem_len <
sizeof(
struct nlmsgerr))
389 msg(
M_WARN,
"%s: ERROR truncated", __func__);
399 int r = cb(h, arg_cb);
408 msg(
M_WARN,
"%s: rtnl: generic error (%d): %s", __func__, err->error,
409 strerror(-err->error));
418 int r = cb(h, arg_cb);
427 msg(
M_WARN,
"%s: RTNL: unexpected reply", __func__);
430 rcv_len -= NLMSG_ALIGN(len);
431 h = (
struct nlmsghdr *)((
char *)h + NLMSG_ALIGN(len));
434 if (nlmsg.msg_flags & MSG_TRUNC)
436 msg(
M_WARN,
"%s: message truncated", __func__);
442 msg(
M_WARN,
"%s: rtnl: %zd not parsed bytes", __func__, rcv_len);
457 char iface[IFNAMSIZ];
463sitnl_route_save(
struct nlmsghdr *n,
void *arg)
465 route_res_t *
res = arg;
466 struct rtmsg *r = NLMSG_DATA(n);
467 struct rtattr *rta = RTM_RTA(r);
468 size_t len = n->nlmsg_len - NLMSG_LENGTH(
sizeof(*r));
469 unsigned int table, ifindex = 0;
473 if (
res->default_only && r->rtm_dst_len != 0)
479 table = r->rtm_table;
481 while (RTA_OK(rta, len))
483 switch (rta->rta_type)
487 ifindex = *(
unsigned int *)RTA_DATA(rta);
501 table = *(
unsigned int *)RTA_DATA(rta);
505 rta = RTA_NEXT(rta, len);
509 if (
res->table &&
res->table != table)
514 if (!if_indextoname(ifindex,
res->iface))
516 msg(
M_WARN |
M_ERRNO,
"%s: rtnl: can't get ifname for index %d", __func__, ifindex);
522 memcpy(&
res->gw, gw,
res->addr_size);
532 struct sitnl_route_req req;
542 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.r));
543 req.n.nlmsg_type = RTM_GETROUTE;
544 req.n.nlmsg_flags = NLM_F_REQUEST;
546 ASSERT(af_family <= UCHAR_MAX);
547 req.r.rtm_family = (
unsigned char)af_family;
552 res.addr_size =
sizeof(in_addr_t);
557 if (!dst || !dst->
ipv4)
559 req.n.nlmsg_flags |= NLM_F_DUMP;
560 res.default_only =
true;
561 res.table = RT_TABLE_MAIN;
565 req.r.rtm_dst_len = 32;
570 res.addr_size =
sizeof(
struct in6_addr);
572 req.r.rtm_dst_len = 128;
580 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_DST, dst,
res.addr_size);
582 ret = sitnl_send(&req.n, 0, 0, sitnl_route_save, &
res);
589 memcpy(best_gw, &
res.gw,
res.addr_size);
590 strncpy(best_iface,
res.iface, IFNAMSIZ);
597net_route_v6_best_gw(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
struct in6_addr *best_gw,
601 char buf[INET6_ADDRSTRLEN];
609 msg(
D_ROUTE,
"%s query: dst %s", __func__, inet_ntop(AF_INET6, &dst_v6.
ipv6, buf,
sizeof(buf)));
611 ret = sitnl_route_best_gw(AF_INET6, &dst_v6, best_gw, best_iface);
617 msg(
D_ROUTE,
"%s result: via %s dev %s", __func__,
618 inet_ntop(AF_INET6, best_gw, buf,
sizeof(buf)), best_iface);
625net_route_v4_best_gw(
openvpn_net_ctx_t *ctx,
const in_addr_t *dst, in_addr_t *best_gw,
629 char buf[INET_ADDRSTRLEN];
634 dst_v4.
ipv4 = htonl(*dst);
637 msg(
D_ROUTE,
"%s query: dst %s", __func__, inet_ntop(AF_INET, &dst_v4.
ipv4, buf,
sizeof(buf)));
639 ret = sitnl_route_best_gw(AF_INET, &dst_v4, best_gw, best_iface);
645 msg(
D_ROUTE,
"%s result: via %s dev %s", __func__,
646 inet_ntop(AF_INET, best_gw, buf,
sizeof(buf)), best_iface);
649 *best_gw = ntohl(*best_gw);
659 struct sitnl_link_req req;
666 msg(
M_WARN,
"%s: passed NULL interface", __func__);
670 ifindex = if_nametoindex(
iface);
673 msg(
M_WARN,
"%s: rtnl: cannot get ifindex for %s: %s", __func__,
iface, strerror(errno));
677 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
678 req.n.nlmsg_flags = NLM_F_REQUEST;
679 req.n.nlmsg_type = RTM_NEWLINK;
681 req.i.ifi_family = AF_PACKET;
682 req.i.ifi_index = ifindex;
683 req.i.ifi_change |= IFF_UP;
686 req.i.ifi_flags |= IFF_UP;
690 req.i.ifi_flags &= ~IFF_UP;
693 msg(
M_INFO,
"%s: set %s %s", __func__,
iface, up ?
"up" :
"down");
695 return sitnl_send(&req.n, 0, 0, NULL, NULL);
701 struct sitnl_link_req req;
702 int ifindex, ret = -1;
706 ifindex = if_nametoindex(
iface);
713 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
714 req.n.nlmsg_flags = NLM_F_REQUEST;
715 req.n.nlmsg_type = RTM_NEWLINK;
717 req.i.ifi_family = AF_PACKET;
718 req.i.ifi_index = ifindex;
720 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_MTU, &mtu, 4);
724 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
732 struct sitnl_link_req req;
733 int ifindex, ret = -1;
737 ifindex = if_nametoindex(
iface);
744 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
745 req.n.nlmsg_flags = NLM_F_REQUEST;
746 req.n.nlmsg_type = RTM_NEWLINK;
748 req.i.ifi_family = AF_PACKET;
749 req.i.ifi_index = ifindex;
755 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
761sitnl_addr_set(uint16_t cmd, uint16_t flags,
int ifindex,
sa_family_t af_family,
764 struct sitnl_addr_req req;
770 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
771 req.n.nlmsg_type = cmd;
772 req.n.nlmsg_flags = NLM_F_REQUEST | flags;
774 req.i.ifa_index = ifindex;
775 ASSERT(af_family <= UINT8_MAX);
776 req.i.ifa_family = (uint8_t)af_family;
781 size =
sizeof(
struct in_addr);
785 size =
sizeof(
struct in6_addr);
789 msg(
M_WARN,
"%s: rtnl: unknown address family %d", __func__, af_family);
796 prefixlen = size * 8;
798 ASSERT(prefixlen <= UINT8_MAX);
799 req.i.ifa_prefixlen = (uint8_t)prefixlen;
803 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_ADDRESS, remote, size);
808 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_LOCAL, local, size);
811 if (af_family == AF_INET && local && !remote && prefixlen <= 30)
815 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_BROADCAST, &broadcast, size);
818 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
845 msg(
M_WARN,
"%s: passed NULL interface", __func__);
849 ifindex = if_nametoindex(
iface);
852 msg(
M_WARN,
"%s: cannot get ifindex for %s: %s", __func__,
np(
iface), strerror(errno));
856 return sitnl_addr_set(RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, ifindex, af_family, local,
877 msg(
M_WARN,
"%s: passed NULL interface", __func__);
881 ifindex = if_nametoindex(
iface);
888 return sitnl_addr_set(RTM_DELADDR, 0, ifindex, af_family, local, NULL, 0);
892sitnl_route_set(uint16_t cmd, uint16_t flags,
int ifindex,
sa_family_t af_family,
const void *dst,
893 int prefixlen,
const void *gw,
enum rt_class_t table,
int metric,
894 enum rt_scope_t scope,
unsigned char protocol,
unsigned char type)
896 struct sitnl_route_req req;
904 size =
sizeof(in_addr_t);
908 size =
sizeof(
struct in6_addr);
915 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.r));
916 req.n.nlmsg_type = cmd;
917 req.n.nlmsg_flags = NLM_F_REQUEST | flags;
919 ASSERT(af_family <= UCHAR_MAX);
920 req.r.rtm_family = (
unsigned char)af_family;
921 req.r.rtm_scope = (
unsigned char)scope;
922 req.r.rtm_protocol = protocol;
923 req.r.rtm_type = type;
924 ASSERT(prefixlen >= 0 && prefixlen <= UCHAR_MAX);
925 req.r.rtm_dst_len = (
unsigned char)prefixlen;
927 if (table <= UCHAR_MAX)
929 req.r.rtm_table = (
unsigned char)table;
933 req.r.rtm_table = RT_TABLE_UNSPEC;
934 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_TABLE, &table, 4);
939 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_DST, dst, size);
944 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_GATEWAY, gw, size);
949 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_OIF, &ifindex, 4);
954 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_PRIORITY, &metric, 4);
957 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
979 msg(
M_WARN,
"%s: passed NULL interface", __func__);
983 ifindex = if_nametoindex(
iface);
990 return sitnl_addr_set(RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, ifindex, af_family, addr, NULL,
1011 msg(
M_WARN,
"%s: passed NULL interface", __func__);
1015 ifindex = if_nametoindex(
iface);
1022 return sitnl_addr_set(RTM_DELADDR, 0, ifindex, af_family, addr, NULL, prefixlen);
1029 char buf[INET_ADDRSTRLEN];
1036 addr_v4.
ipv4 = htonl(*addr);
1038 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET, &addr_v4.
ipv4, buf,
sizeof(buf)),
1041 return sitnl_addr_add(AF_INET,
iface, &addr_v4, prefixlen);
1049 char buf[INET6_ADDRSTRLEN];
1056 addr_v6.
ipv6 = *addr;
1058 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET6, &addr_v6.
ipv6, buf,
sizeof(buf)),
1061 return sitnl_addr_add(AF_INET6,
iface, &addr_v6, prefixlen);
1068 char buf[INET_ADDRSTRLEN];
1075 addr_v4.
ipv4 = htonl(*addr);
1077 msg(
M_INFO,
"%s: %s dev %s", __func__, inet_ntop(AF_INET, &addr_v4.
ipv4, buf,
sizeof(buf)),
1080 return sitnl_addr_del(AF_INET,
iface, &addr_v4, prefixlen);
1088 char buf[INET6_ADDRSTRLEN];
1095 addr_v6.
ipv6 = *addr;
1097 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET6, &addr_v6.
ipv6, buf,
sizeof(buf)),
1100 return sitnl_addr_del(AF_INET6,
iface, &addr_v6, prefixlen);
1105 const in_addr_t *remote)
1109 char buf1[INET_ADDRSTRLEN];
1110 char buf2[INET_ADDRSTRLEN];
1117 local_v4.
ipv4 = htonl(*local);
1121 remote_v4.
ipv4 = htonl(*remote);
1124 msg(
M_INFO,
"%s: %s peer %s dev %s", __func__,
1125 inet_ntop(AF_INET, &local_v4.
ipv4, buf1,
sizeof(buf1)),
1126 inet_ntop(AF_INET, &remote_v4.
ipv4, buf2,
sizeof(buf2)),
iface);
1128 return sitnl_addr_ptp_add(AF_INET,
iface, &local_v4, &remote_v4);
1133 const in_addr_t *remote)
1136 char buf[INET6_ADDRSTRLEN];
1144 local_v4.
ipv4 = htonl(*local);
1146 msg(
M_INFO,
"%s: %s dev %s", __func__, inet_ntop(AF_INET, &local_v4.
ipv4, buf,
sizeof(buf)),
1149 return sitnl_addr_ptp_del(AF_INET,
iface, &local_v4);
1153sitnl_route_add(
const char *
iface,
sa_family_t af_family,
const void *dst,
int prefixlen,
1154 const void *gw, uint32_t table,
int metric)
1156 enum rt_scope_t scope = RT_SCOPE_UNIVERSE;
1161 ifindex = if_nametoindex(
iface);
1171 table = RT_TABLE_MAIN;
1176 scope = RT_SCOPE_LINK;
1179 return sitnl_route_set(RTM_NEWROUTE, NLM_F_CREATE, ifindex, af_family, dst, prefixlen, gw,
1180 table, metric, scope, RTPROT_BOOT, RTN_UNICAST);
1184net_route_v4_add(
openvpn_net_ctx_t *ctx,
const in_addr_t *dst,
int prefixlen,
const in_addr_t *gw,
1185 const char *
iface, uint32_t table,
int metric)
1187 in_addr_t *dst_ptr = NULL, *gw_ptr = NULL;
1188 in_addr_t dst_be = 0, gw_be = 0;
1189 char dst_str[INET_ADDRSTRLEN];
1190 char gw_str[INET_ADDRSTRLEN];
1194 dst_be = htonl(*dst);
1204 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1205 inet_ntop(AF_INET, &dst_be, dst_str,
sizeof(dst_str)), prefixlen,
1206 inet_ntop(AF_INET, &gw_be, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1208 return sitnl_route_add(
iface, AF_INET, dst_ptr, prefixlen, gw_ptr, table, metric);
1212net_route_v6_add(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
int prefixlen,
1213 const struct in6_addr *gw,
const char *
iface, uint32_t table,
int metric)
1217 char dst_str[INET6_ADDRSTRLEN];
1218 char gw_str[INET6_ADDRSTRLEN];
1230 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1231 inet_ntop(AF_INET6, &dst_v6.
ipv6, dst_str,
sizeof(dst_str)), prefixlen,
1232 inet_ntop(AF_INET6, &gw_v6.
ipv6, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1234 return sitnl_route_add(
iface, AF_INET6, dst, prefixlen, gw, table, metric);
1245 ifindex = if_nametoindex(
iface);
1255 table = RT_TABLE_MAIN;
1258 return sitnl_route_set(RTM_DELROUTE, 0, ifindex, af_family, dst, prefixlen, gw, table, metric,
1259 RT_SCOPE_NOWHERE, 0, 0);
1263net_route_v4_del(
openvpn_net_ctx_t *ctx,
const in_addr_t *dst,
int prefixlen,
const in_addr_t *gw,
1264 const char *
iface, uint32_t table,
int metric)
1268 char dst_str[INET_ADDRSTRLEN];
1269 char gw_str[INET_ADDRSTRLEN];
1273 dst_v4.
ipv4 = htonl(*dst);
1278 gw_v4.
ipv4 = htonl(*gw);
1281 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1282 inet_ntop(AF_INET, &dst_v4.
ipv4, dst_str,
sizeof(dst_str)), prefixlen,
1283 inet_ntop(AF_INET, &gw_v4.
ipv4, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1285 return sitnl_route_del(
iface, AF_INET, &dst_v4, prefixlen, &gw_v4, table, metric);
1289net_route_v6_del(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
int prefixlen,
1290 const struct in6_addr *gw,
const char *
iface, uint32_t table,
int metric)
1294 char dst_str[INET6_ADDRSTRLEN];
1295 char gw_str[INET6_ADDRSTRLEN];
1307 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1308 inet_ntop(AF_INET6, &dst_v6.
ipv6, dst_str,
sizeof(dst_str)), prefixlen,
1309 inet_ntop(AF_INET6, &gw_v6.
ipv6, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1311 return sitnl_route_del(
iface, AF_INET6, &dst_v6, prefixlen, &gw_v6, table, metric);
1318 struct sitnl_link_req req = {};
1323 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1324 req.n.nlmsg_flags = NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL;
1325 req.n.nlmsg_type = RTM_NEWLINK;
1327 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_IFNAME,
iface, strlen(
iface) + 1);
1329 struct rtattr *linkinfo = SITNL_NEST(&req.n,
sizeof(req), IFLA_LINKINFO);
1330 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_INFO_KIND, type, strlen(type) + 1);
1331#if defined(ENABLE_DCO)
1335 struct rtattr *data = SITNL_NEST(&req.n,
sizeof(req), IFLA_INFO_DATA);
1336 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_OVPN_MODE, &dco->ifmode,
sizeof(uint8_t));
1337 SITNL_NEST_END(&req.n, data);
1340 SITNL_NEST_END(&req.n, linkinfo);
1342 req.i.ifi_family = AF_PACKET;
1346 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
1352sitnl_parse_rtattr_flags(
struct rtattr *tb[],
size_t max,
struct rtattr *rta,
size_t len,
1353 unsigned short flags)
1355 unsigned short type;
1357 memset(tb, 0,
sizeof(
struct rtattr *) * (max + 1));
1359 while (RTA_OK(rta, len))
1361 type = rta->rta_type & ~flags;
1363 if ((type <= max) && (!tb[type]))
1368 rta = RTA_NEXT(rta, len);
1373 msg(
D_ROUTE,
"%s: %zu bytes not parsed! (rta_len=%u)", __func__, len, rta->rta_len);
1380sitnl_parse_rtattr(
struct rtattr *tb[],
size_t max,
struct rtattr *rta,
size_t len)
1382 return sitnl_parse_rtattr_flags(tb, max, rta, len, 0);
1385#define sitnl_parse_rtattr_nested(tb, max, rta) \
1386 (sitnl_parse_rtattr_flags(tb, max, RTA_DATA(rta), RTA_PAYLOAD(rta), NLA_F_NESTED))
1389sitnl_type_save(
struct nlmsghdr *n,
void *arg)
1392 struct ifinfomsg *ifi = NLMSG_DATA(n);
1393 struct rtattr *tb[IFLA_MAX + 1];
1396 ret = sitnl_parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), IFLA_PAYLOAD(n));
1402 if (tb[IFLA_LINKINFO])
1404 struct rtattr *tb_link[IFLA_INFO_MAX + 1];
1406 ret = sitnl_parse_rtattr_nested(tb_link, IFLA_INFO_MAX, tb[IFLA_LINKINFO]);
1412 if (!tb_link[IFLA_INFO_KIND])
1426 struct sitnl_link_req req = {};
1427 int ifindex = if_nametoindex(
iface);
1434 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1435 req.n.nlmsg_flags = NLM_F_REQUEST;
1436 req.n.nlmsg_type = RTM_GETLINK;
1438 req.i.ifi_family = AF_PACKET;
1439 req.i.ifi_index = ifindex;
1443 int ret = sitnl_send(&req.n, 0, 0, sitnl_type_save, type);
1446 msg(
D_ROUTE,
"%s: cannot retrieve iface %s: %s (%d)", __func__,
iface, strerror(-ret), ret);
1458 struct sitnl_link_req req = {};
1459 int ifindex = if_nametoindex(
iface);
1466 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1467 req.n.nlmsg_flags = NLM_F_REQUEST;
1468 req.n.nlmsg_type = RTM_DELLINK;
1470 req.i.ifi_family = AF_PACKET;
1471 req.i.ifi_index = ifindex;
1475 return sitnl_send(&req.n, 0, 0, NULL, NULL);
static void strncpynt(char *dest, const char *src, size_t maxlen)
#define MAC_PRINT_ARG(_mac)
static const char * np(const char *str)
void * openvpn_net_iface_t
#define IFACE_TYPE_LEN_MAX
static in_addr_t netbits_to_netmask(const int netbits)
unsigned short sa_family_t