41#include <sys/socket.h>
42#include <linux/netlink.h>
43#include <linux/rtnetlink.h>
45#define SNDBUF_SIZE (1024 * 2)
46#define RCVBUF_SIZE (1024 * 4)
48#define SITNL_ADDATTR(_msg, _max_size, _attr, _data, _size) \
50 if (sitnl_addattr(_msg, _max_size, _attr, _data, _size) < 0) \
56#define SITNL_NEST(_msg, _max_size, _attr) \
58 struct rtattr *_nest = sitnl_nlmsg_tail(_msg); \
59 SITNL_ADDATTR(_msg, _max_size, _attr, NULL, 0); \
63#define SITNL_NEST_END(_msg, _nest) \
65 _nest->rta_len = (unsigned short)((void *)sitnl_nlmsg_tail(_msg) - (void *)_nest); \
79sitnl_nlmsg_tail(
const struct nlmsghdr *nlh)
81 return (
unsigned char *)nlh + NLMSG_ALIGN(nlh->nlmsg_len);
117struct sitnl_route_req
124typedef int (*sitnl_parse_reply_cb)(
struct nlmsghdr *
msg,
void *arg);
129struct sitnl_route_data_cb
139sitnl_addattr(
struct nlmsghdr *n,
size_t maxlen,
unsigned short type,
const void *data,
size_t alen)
141 size_t len = RTA_LENGTH(alen);
143 if ((NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len)) > maxlen)
145 msg(
M_WARN,
"%s: rtnl: message exceeded bound of %zu", __func__, maxlen);
149 struct rtattr *rta = sitnl_nlmsg_tail(n);
150 rta->rta_type = type;
152 rta->rta_len = (
unsigned short)len;
156 memset(RTA_DATA(rta), 0, alen);
160 memcpy(RTA_DATA(rta), data, alen);
163 n->nlmsg_len = NLMSG_ALIGN(n->nlmsg_len) + RTA_ALIGN(len);
174 int sndbuf = SNDBUF_SIZE;
175 int rcvbuf = RCVBUF_SIZE;
178 fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
181 msg(
M_WARN,
"%s: cannot open netlink socket", __func__);
188 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &sndbuf,
sizeof(sndbuf)) < 0)
195 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &rcvbuf,
sizeof(rcvbuf)) < 0)
209sitnl_bind(
int fd, uint32_t groups)
212 struct sockaddr_nl local;
216 local.nl_family = AF_NETLINK;
217 local.nl_groups = groups;
219 if (bind(fd, (
struct sockaddr *)&local,
sizeof(local)) < 0)
225 addr_len =
sizeof(local);
226 if (getsockname(fd, (
struct sockaddr *)&local, &addr_len) < 0)
232 if (addr_len !=
sizeof(local))
234 msg(
M_WARN,
"%s: wrong address length %d", __func__, addr_len);
238 if (local.nl_family != AF_NETLINK)
240 msg(
M_WARN,
"%s: wrong address family %d", __func__, local.nl_family);
251sitnl_send(
struct nlmsghdr *payload, pid_t peer,
unsigned int groups, sitnl_parse_reply_cb cb,
255 struct sockaddr_nl nladdr;
256 struct nlmsgerr *err;
261 .iov_len = payload->nlmsg_len,
263 struct msghdr nlmsg = {
265 .msg_namelen =
sizeof(nladdr),
272 nladdr.nl_family = AF_NETLINK;
273 nladdr.nl_pid = peer;
274 nladdr.nl_groups = groups;
280 payload->nlmsg_seq = (uint32_t)time(NULL);
285 payload->nlmsg_flags |= NLM_F_ACK;
295 if (sitnl_bind(fd, 0) < 0)
302 if (sendmsg(fd, &nlmsg, 0) < 0)
310 memset(buf, 0,
sizeof(buf));
319 msg(
D_RTNL,
"%s: checking for received messages", __func__);
320 iov.iov_len =
sizeof(buf);
321 ssize_t rcv_len = recvmsg(fd, &nlmsg, 0);
322 msg(
D_RTNL,
"%s: rtnl: received %zd bytes", __func__, rcv_len);
325 if ((errno == EINTR) || (errno == EAGAIN))
327 msg(
D_RTNL,
"%s: interrupted call", __func__);
337 msg(
M_WARN,
"%s: rtnl: socket reached unexpected EOF", __func__);
342 if (nlmsg.msg_namelen !=
sizeof(nladdr))
344 msg(
M_WARN,
"%s: sender address length: %u (expected %zu)", __func__, nlmsg.msg_namelen,
350 h = (
struct nlmsghdr *)buf;
351 while (rcv_len >= (
int)
sizeof(*h))
353 uint32_t len = h->nlmsg_len;
354 ssize_t rem_len = len -
sizeof(*h);
356 if ((rem_len < 0) || (len > rcv_len))
358 if (nlmsg.msg_flags & MSG_TRUNC)
360 msg(
M_WARN,
"%s: truncated message", __func__);
364 msg(
M_WARN,
"%s: malformed message: len=%u", __func__, len);
382 if (h->nlmsg_type == NLMSG_DONE)
388 if (h->nlmsg_type == NLMSG_ERROR)
390 err = (
struct nlmsgerr *)NLMSG_DATA(h);
391 if (rem_len <
sizeof(
struct nlmsgerr))
393 msg(
M_WARN,
"%s: ERROR truncated", __func__);
403 int r = cb(h, arg_cb);
412 msg(
M_WARN,
"%s: rtnl: generic error (%d): %s", __func__, err->error,
413 strerror(-err->error));
422 int r = cb(h, arg_cb);
431 msg(
M_WARN,
"%s: RTNL: unexpected reply", __func__);
434 rcv_len -= NLMSG_ALIGN(len);
435 h = (
struct nlmsghdr *)((
char *)h + NLMSG_ALIGN(len));
438 if (nlmsg.msg_flags & MSG_TRUNC)
440 msg(
M_WARN,
"%s: message truncated", __func__);
446 msg(
M_WARN,
"%s: rtnl: %zd not parsed bytes", __func__, rcv_len);
461 char iface[IFNAMSIZ];
467sitnl_route_save(
struct nlmsghdr *n,
void *arg)
469 route_res_t *res = arg;
470 struct rtmsg *r = NLMSG_DATA(n);
471 struct rtattr *rta = RTM_RTA(r);
472 size_t len = n->nlmsg_len - NLMSG_LENGTH(
sizeof(*r));
473 unsigned int table, ifindex = 0;
477 if (res->default_only && r->rtm_dst_len != 0)
483 table = r->rtm_table;
485 while (RTA_OK(rta, len))
487 switch (rta->rta_type)
491 ifindex = *(
unsigned int *)RTA_DATA(rta);
505 table = *(
unsigned int *)RTA_DATA(rta);
509 rta = RTA_NEXT(rta, len);
513 if (res->table && res->table != table)
518 if (!if_indextoname(ifindex, res->iface))
520 msg(
M_WARN |
M_ERRNO,
"%s: rtnl: can't get ifname for index %d", __func__, ifindex);
526 memcpy(&res->gw, gw, res->addr_size);
536 struct sitnl_route_req req;
546 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.r));
547 req.n.nlmsg_type = RTM_GETROUTE;
548 req.n.nlmsg_flags = NLM_F_REQUEST;
550 ASSERT(af_family <= UCHAR_MAX);
551 req.r.rtm_family = (
unsigned char)af_family;
556 res.addr_size =
sizeof(in_addr_t);
561 if (!dst || !dst->
ipv4)
563 req.n.nlmsg_flags |= NLM_F_DUMP;
564 res.default_only =
true;
565 res.table = RT_TABLE_MAIN;
569 req.r.rtm_dst_len = 32;
574 res.addr_size =
sizeof(
struct in6_addr);
576 req.r.rtm_dst_len = 128;
584 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_DST, dst, res.addr_size);
586 ret = sitnl_send(&req.n, 0, 0, sitnl_route_save, &res);
593 memcpy(best_gw, &res.gw, res.addr_size);
594 strncpy(best_iface, res.iface, IFNAMSIZ);
601net_route_v6_best_gw(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
struct in6_addr *best_gw,
605 char buf[INET6_ADDRSTRLEN];
613 msg(
D_ROUTE,
"%s query: dst %s", __func__, inet_ntop(AF_INET6, &dst_v6.
ipv6, buf,
sizeof(buf)));
615 ret = sitnl_route_best_gw(AF_INET6, &dst_v6, best_gw, best_iface);
621 msg(
D_ROUTE,
"%s result: via %s dev %s", __func__,
622 inet_ntop(AF_INET6, best_gw, buf,
sizeof(buf)), best_iface);
629net_route_v4_best_gw(
openvpn_net_ctx_t *ctx,
const in_addr_t *dst, in_addr_t *best_gw,
633 char buf[INET_ADDRSTRLEN];
638 dst_v4.
ipv4 = htonl(*dst);
641 msg(
D_ROUTE,
"%s query: dst %s", __func__, inet_ntop(AF_INET, &dst_v4.
ipv4, buf,
sizeof(buf)));
643 ret = sitnl_route_best_gw(AF_INET, &dst_v4, best_gw, best_iface);
649 msg(
D_ROUTE,
"%s result: via %s dev %s", __func__,
650 inet_ntop(AF_INET, best_gw, buf,
sizeof(buf)), best_iface);
653 *best_gw = ntohl(*best_gw);
663 struct sitnl_link_req req;
670 msg(
M_WARN,
"%s: passed NULL interface", __func__);
674 ifindex = if_nametoindex(
iface);
677 msg(
M_WARN,
"%s: rtnl: cannot get ifindex for %s: %s", __func__,
iface, strerror(errno));
681 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
682 req.n.nlmsg_flags = NLM_F_REQUEST;
683 req.n.nlmsg_type = RTM_NEWLINK;
685 req.i.ifi_family = AF_PACKET;
686 req.i.ifi_index = ifindex;
687 req.i.ifi_change |= IFF_UP;
690 req.i.ifi_flags |= IFF_UP;
694 req.i.ifi_flags &= ~IFF_UP;
697 msg(
M_INFO,
"%s: set %s %s", __func__,
iface, up ?
"up" :
"down");
699 return sitnl_send(&req.n, 0, 0, NULL, NULL);
705 struct sitnl_link_req req;
706 int ifindex, ret = -1;
710 ifindex = if_nametoindex(
iface);
717 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
718 req.n.nlmsg_flags = NLM_F_REQUEST;
719 req.n.nlmsg_type = RTM_NEWLINK;
721 req.i.ifi_family = AF_PACKET;
722 req.i.ifi_index = ifindex;
724 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_MTU, &mtu, 4);
728 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
736 struct sitnl_link_req req;
737 int ifindex, ret = -1;
741 ifindex = if_nametoindex(
iface);
748 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
749 req.n.nlmsg_flags = NLM_F_REQUEST;
750 req.n.nlmsg_type = RTM_NEWLINK;
752 req.i.ifi_family = AF_PACKET;
753 req.i.ifi_index = ifindex;
759 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
765sitnl_addr_set(uint16_t cmd, uint16_t flags,
int ifindex,
sa_family_t af_family,
768 struct sitnl_addr_req req;
774 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
775 req.n.nlmsg_type = cmd;
776 req.n.nlmsg_flags = NLM_F_REQUEST | flags;
778 req.i.ifa_index = ifindex;
779 ASSERT(af_family <= UINT8_MAX);
780 req.i.ifa_family = (uint8_t)af_family;
785 size =
sizeof(
struct in_addr);
789 size =
sizeof(
struct in6_addr);
793 msg(
M_WARN,
"%s: rtnl: unknown address family %d", __func__, af_family);
800 prefixlen = size * 8;
802 ASSERT(prefixlen <= UINT8_MAX);
803 req.i.ifa_prefixlen = (uint8_t)prefixlen;
807 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_ADDRESS, remote, size);
812 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_LOCAL, local, size);
815 if (af_family == AF_INET && local && !remote && prefixlen <= 30)
819 SITNL_ADDATTR(&req.n,
sizeof(req), IFA_BROADCAST, &broadcast, size);
822 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
849 msg(
M_WARN,
"%s: passed NULL interface", __func__);
853 ifindex = if_nametoindex(
iface);
856 msg(
M_WARN,
"%s: cannot get ifindex for %s: %s", __func__,
np(
iface), strerror(errno));
860 return sitnl_addr_set(RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, ifindex, af_family, local,
881 msg(
M_WARN,
"%s: passed NULL interface", __func__);
885 ifindex = if_nametoindex(
iface);
892 return sitnl_addr_set(RTM_DELADDR, 0, ifindex, af_family, local, NULL, 0);
896sitnl_route_set(uint16_t cmd, uint16_t flags,
int ifindex,
sa_family_t af_family,
const void *dst,
897 int prefixlen,
const void *gw,
enum rt_class_t table,
int metric,
898 enum rt_scope_t scope,
unsigned char protocol,
unsigned char type)
900 struct sitnl_route_req req;
908 size =
sizeof(in_addr_t);
912 size =
sizeof(
struct in6_addr);
919 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.r));
920 req.n.nlmsg_type = cmd;
921 req.n.nlmsg_flags = NLM_F_REQUEST | flags;
923 ASSERT(af_family <= UCHAR_MAX);
924 req.r.rtm_family = (
unsigned char)af_family;
925 req.r.rtm_scope = (
unsigned char)scope;
926 req.r.rtm_protocol = protocol;
927 req.r.rtm_type = type;
928 ASSERT(prefixlen >= 0 && prefixlen <= UCHAR_MAX);
929 req.r.rtm_dst_len = (
unsigned char)prefixlen;
931 if (table <= UCHAR_MAX)
933 req.r.rtm_table = (
unsigned char)table;
937 req.r.rtm_table = RT_TABLE_UNSPEC;
938 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_TABLE, &table, 4);
943 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_DST, dst, size);
948 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_GATEWAY, gw, size);
953 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_OIF, &ifindex, 4);
958 SITNL_ADDATTR(&req.n,
sizeof(req), RTA_PRIORITY, &metric, 4);
961 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
983 msg(
M_WARN,
"%s: passed NULL interface", __func__);
987 ifindex = if_nametoindex(
iface);
994 return sitnl_addr_set(RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, ifindex, af_family, addr, NULL,
1015 msg(
M_WARN,
"%s: passed NULL interface", __func__);
1019 ifindex = if_nametoindex(
iface);
1026 return sitnl_addr_set(RTM_DELADDR, 0, ifindex, af_family, addr, NULL, prefixlen);
1033 char buf[INET_ADDRSTRLEN];
1040 addr_v4.
ipv4 = htonl(*addr);
1042 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET, &addr_v4.
ipv4, buf,
sizeof(buf)),
1045 return sitnl_addr_add(AF_INET,
iface, &addr_v4, prefixlen);
1053 char buf[INET6_ADDRSTRLEN];
1060 addr_v6.
ipv6 = *addr;
1062 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET6, &addr_v6.
ipv6, buf,
sizeof(buf)),
1065 return sitnl_addr_add(AF_INET6,
iface, &addr_v6, prefixlen);
1072 char buf[INET_ADDRSTRLEN];
1079 addr_v4.
ipv4 = htonl(*addr);
1081 msg(
M_INFO,
"%s: %s dev %s", __func__, inet_ntop(AF_INET, &addr_v4.
ipv4, buf,
sizeof(buf)),
1084 return sitnl_addr_del(AF_INET,
iface, &addr_v4, prefixlen);
1092 char buf[INET6_ADDRSTRLEN];
1099 addr_v6.
ipv6 = *addr;
1101 msg(
M_INFO,
"%s: %s/%d dev %s", __func__, inet_ntop(AF_INET6, &addr_v6.
ipv6, buf,
sizeof(buf)),
1104 return sitnl_addr_del(AF_INET6,
iface, &addr_v6, prefixlen);
1109 const in_addr_t *remote)
1113 char buf1[INET_ADDRSTRLEN];
1114 char buf2[INET_ADDRSTRLEN];
1121 local_v4.
ipv4 = htonl(*local);
1125 remote_v4.
ipv4 = htonl(*remote);
1128 msg(
M_INFO,
"%s: %s peer %s dev %s", __func__,
1129 inet_ntop(AF_INET, &local_v4.
ipv4, buf1,
sizeof(buf1)),
1130 inet_ntop(AF_INET, &remote_v4.
ipv4, buf2,
sizeof(buf2)),
iface);
1132 return sitnl_addr_ptp_add(AF_INET,
iface, &local_v4, &remote_v4);
1137 const in_addr_t *remote)
1140 char buf[INET6_ADDRSTRLEN];
1148 local_v4.
ipv4 = htonl(*local);
1150 msg(
M_INFO,
"%s: %s dev %s", __func__, inet_ntop(AF_INET, &local_v4.
ipv4, buf,
sizeof(buf)),
1153 return sitnl_addr_ptp_del(AF_INET,
iface, &local_v4);
1157sitnl_route_add(
const char *
iface,
sa_family_t af_family,
const void *dst,
int prefixlen,
1158 const void *gw, uint32_t table,
int metric)
1160 enum rt_scope_t scope = RT_SCOPE_UNIVERSE;
1165 ifindex = if_nametoindex(
iface);
1175 table = RT_TABLE_MAIN;
1180 scope = RT_SCOPE_LINK;
1183 return sitnl_route_set(RTM_NEWROUTE, NLM_F_CREATE, ifindex, af_family, dst, prefixlen, gw,
1184 table, metric, scope, RTPROT_BOOT, RTN_UNICAST);
1188net_route_v4_add(
openvpn_net_ctx_t *ctx,
const in_addr_t *dst,
int prefixlen,
const in_addr_t *gw,
1189 const char *
iface, uint32_t table,
int metric)
1191 in_addr_t *dst_ptr = NULL, *gw_ptr = NULL;
1192 in_addr_t dst_be = 0, gw_be = 0;
1193 char dst_str[INET_ADDRSTRLEN];
1194 char gw_str[INET_ADDRSTRLEN];
1198 dst_be = htonl(*dst);
1208 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1209 inet_ntop(AF_INET, &dst_be, dst_str,
sizeof(dst_str)), prefixlen,
1210 inet_ntop(AF_INET, &gw_be, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1212 return sitnl_route_add(
iface, AF_INET, dst_ptr, prefixlen, gw_ptr, table, metric);
1216net_route_v6_add(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
int prefixlen,
1217 const struct in6_addr *gw,
const char *
iface, uint32_t table,
int metric)
1221 char dst_str[INET6_ADDRSTRLEN];
1222 char gw_str[INET6_ADDRSTRLEN];
1234 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1235 inet_ntop(AF_INET6, &dst_v6.
ipv6, dst_str,
sizeof(dst_str)), prefixlen,
1236 inet_ntop(AF_INET6, &gw_v6.
ipv6, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1238 return sitnl_route_add(
iface, AF_INET6, dst, prefixlen, gw, table, metric);
1249 ifindex = if_nametoindex(
iface);
1259 table = RT_TABLE_MAIN;
1262 return sitnl_route_set(RTM_DELROUTE, 0, ifindex, af_family, dst, prefixlen, gw, table, metric,
1263 RT_SCOPE_NOWHERE, 0, 0);
1267net_route_v4_del(
openvpn_net_ctx_t *ctx,
const in_addr_t *dst,
int prefixlen,
const in_addr_t *gw,
1268 const char *
iface, uint32_t table,
int metric)
1272 char dst_str[INET_ADDRSTRLEN];
1273 char gw_str[INET_ADDRSTRLEN];
1277 dst_v4.
ipv4 = htonl(*dst);
1282 gw_v4.
ipv4 = htonl(*gw);
1285 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1286 inet_ntop(AF_INET, &dst_v4.
ipv4, dst_str,
sizeof(dst_str)), prefixlen,
1287 inet_ntop(AF_INET, &gw_v4.
ipv4, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1289 return sitnl_route_del(
iface, AF_INET, &dst_v4, prefixlen, &gw_v4, table, metric);
1293net_route_v6_del(
openvpn_net_ctx_t *ctx,
const struct in6_addr *dst,
int prefixlen,
1294 const struct in6_addr *gw,
const char *
iface, uint32_t table,
int metric)
1298 char dst_str[INET6_ADDRSTRLEN];
1299 char gw_str[INET6_ADDRSTRLEN];
1311 msg(
D_ROUTE,
"%s: %s/%d via %s dev %s table %d metric %d", __func__,
1312 inet_ntop(AF_INET6, &dst_v6.
ipv6, dst_str,
sizeof(dst_str)), prefixlen,
1313 inet_ntop(AF_INET6, &gw_v6.
ipv6, gw_str,
sizeof(gw_str)),
np(
iface), table, metric);
1315 return sitnl_route_del(
iface, AF_INET6, &dst_v6, prefixlen, &gw_v6, table, metric);
1322 struct sitnl_link_req req = {};
1327 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1328 req.n.nlmsg_flags = NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL;
1329 req.n.nlmsg_type = RTM_NEWLINK;
1331 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_IFNAME,
iface, strlen(
iface) + 1);
1333 struct rtattr *linkinfo = SITNL_NEST(&req.n,
sizeof(req), IFLA_LINKINFO);
1334 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_INFO_KIND, type, strlen(type) + 1);
1335#if defined(ENABLE_DCO)
1339 struct rtattr *data = SITNL_NEST(&req.n,
sizeof(req), IFLA_INFO_DATA);
1340 SITNL_ADDATTR(&req.n,
sizeof(req), IFLA_OVPN_MODE, &dco->ifmode,
sizeof(uint8_t));
1341 SITNL_NEST_END(&req.n, data);
1344 SITNL_NEST_END(&req.n, linkinfo);
1346 req.i.ifi_family = AF_PACKET;
1350 ret = sitnl_send(&req.n, 0, 0, NULL, NULL);
1356sitnl_parse_rtattr_flags(
struct rtattr *tb[],
size_t max,
struct rtattr *rta,
size_t len,
1357 unsigned short flags)
1359 unsigned short type;
1361 memset(tb, 0,
sizeof(
struct rtattr *) * (max + 1));
1363 while (RTA_OK(rta, len))
1365 type = rta->rta_type & ~flags;
1367 if ((type <= max) && (!tb[type]))
1372 rta = RTA_NEXT(rta, len);
1377 msg(
D_ROUTE,
"%s: %zu bytes not parsed! (rta_len=%u)", __func__, len, rta->rta_len);
1384sitnl_parse_rtattr(
struct rtattr *tb[],
size_t max,
struct rtattr *rta,
size_t len)
1386 return sitnl_parse_rtattr_flags(tb, max, rta, len, 0);
1389#define sitnl_parse_rtattr_nested(tb, max, rta) \
1390 (sitnl_parse_rtattr_flags(tb, max, RTA_DATA(rta), RTA_PAYLOAD(rta), NLA_F_NESTED))
1393sitnl_type_save(
struct nlmsghdr *n,
void *arg)
1396 struct ifinfomsg *ifi = NLMSG_DATA(n);
1397 struct rtattr *tb[IFLA_MAX + 1];
1400 ret = sitnl_parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), IFLA_PAYLOAD(n));
1406 if (tb[IFLA_LINKINFO])
1408 struct rtattr *tb_link[IFLA_INFO_MAX + 1];
1410 ret = sitnl_parse_rtattr_nested(tb_link, IFLA_INFO_MAX, tb[IFLA_LINKINFO]);
1416 if (!tb_link[IFLA_INFO_KIND])
1430 struct sitnl_link_req req = {};
1431 int ifindex = if_nametoindex(
iface);
1438 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1439 req.n.nlmsg_flags = NLM_F_REQUEST;
1440 req.n.nlmsg_type = RTM_GETLINK;
1442 req.i.ifi_family = AF_PACKET;
1443 req.i.ifi_index = ifindex;
1447 int ret = sitnl_send(&req.n, 0, 0, sitnl_type_save, type);
1450 msg(
D_ROUTE,
"%s: cannot retrieve iface %s: %s (%d)", __func__,
iface, strerror(-ret), ret);
1462 struct sitnl_link_req req = {};
1463 int ifindex = if_nametoindex(
iface);
1470 req.n.nlmsg_len = NLMSG_LENGTH(
sizeof(req.i));
1471 req.n.nlmsg_flags = NLM_F_REQUEST;
1472 req.n.nlmsg_type = RTM_DELLINK;
1474 req.i.ifi_family = AF_PACKET;
1475 req.i.ifi_index = ifindex;
1479 return sitnl_send(&req.n, 0, 0, NULL, NULL);
static void strncpynt(char *dest, const char *src, size_t maxlen)
void set_cloexec(socket_descriptor_t fd)
#define MAC_PRINT_ARG(_mac)
static const char * np(const char *str)
void * openvpn_net_iface_t
#define IFACE_TYPE_LEN_MAX
static in_addr_t netbits_to_netmask(const int netbits)
unsigned short sa_family_t