1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2013 Tom Gundersen <teg@jklm.no>
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <netinet/in.h>
23 #include <netinet/ether.h>
32 #include "rtnl-util.h"
33 #include "rtnl-internal.h"
34 #include "rtnl-types.h"
36 #define GET_CONTAINER(m, i) ((i) < (m)->n_containers ? (struct rtattr*)((uint8_t*)(m)->hdr + (m)->container_offsets[i]) : NULL)
37 #define PUSH_CONTAINER(m, new) (m)->container_offsets[(m)->n_containers ++] = (uint8_t*)(new) - (uint8_t*)(m)->hdr;
39 #define RTA_TYPE(rta) ((rta)->rta_type & NLA_TYPE_MASK)
41 static int message_new_empty(sd_rtnl *rtnl, sd_rtnl_message **ret) {
44 assert_return(ret, -EINVAL);
46 /* Note that 'rtnl' is currently unused, if we start using it internally
47 we must take care to avoid problems due to mutual references between
48 busses and their queued messages. See sd-bus.
51 m = new0(sd_rtnl_message, 1);
55 m->n_ref = REFCNT_INIT;
64 int message_new(sd_rtnl *rtnl, sd_rtnl_message **ret, uint16_t type) {
65 _cleanup_rtnl_message_unref_ sd_rtnl_message *m = NULL;
66 const NLType *nl_type;
70 r = type_system_get_type(NULL, &nl_type, type);
74 r = message_new_empty(rtnl, &m);
78 size = NLMSG_SPACE(nl_type->size);
80 assert(size >= sizeof(struct nlmsghdr));
81 m->hdr = malloc0(size);
85 m->hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
87 m->container_type_system[0] = nl_type->type_system;
88 m->hdr->nlmsg_len = size;
89 m->hdr->nlmsg_type = type;
97 int sd_rtnl_message_route_set_dst_prefixlen(sd_rtnl_message *m, unsigned char prefixlen) {
100 assert_return(m, -EINVAL);
101 assert_return(m->hdr, -EINVAL);
102 assert_return(rtnl_message_type_is_route(m->hdr->nlmsg_type), -EINVAL);
104 rtm = NLMSG_DATA(m->hdr);
106 if ((rtm->rtm_family == AF_INET && prefixlen > 32) ||
107 (rtm->rtm_family == AF_INET6 && prefixlen > 128))
110 rtm->rtm_dst_len = prefixlen;
115 int sd_rtnl_message_route_set_src_prefixlen(sd_rtnl_message *m, unsigned char prefixlen) {
118 assert_return(m, -EINVAL);
119 assert_return(m->hdr, -EINVAL);
120 assert_return(rtnl_message_type_is_route(m->hdr->nlmsg_type), -EINVAL);
122 rtm = NLMSG_DATA(m->hdr);
124 if ((rtm->rtm_family == AF_INET && prefixlen > 32) ||
125 (rtm->rtm_family == AF_INET6 && prefixlen > 128))
128 rtm->rtm_src_len = prefixlen;
133 int sd_rtnl_message_route_set_scope(sd_rtnl_message *m, unsigned char scope) {
136 assert_return(m, -EINVAL);
137 assert_return(m->hdr, -EINVAL);
138 assert_return(rtnl_message_type_is_route(m->hdr->nlmsg_type), -EINVAL);
140 rtm = NLMSG_DATA(m->hdr);
142 rtm->rtm_scope = scope;
147 int sd_rtnl_message_route_get_family(sd_rtnl_message *m, int *family) {
150 assert_return(m, -EINVAL);
151 assert_return(m->hdr, -EINVAL);
152 assert_return(rtnl_message_type_is_route(m->hdr->nlmsg_type), -EINVAL);
153 assert_return(family, -EINVAL);
155 rtm = NLMSG_DATA(m->hdr);
157 *family = rtm->rtm_family;
162 int sd_rtnl_message_route_get_dst_prefixlen(sd_rtnl_message *m, unsigned char *dst_len) {
165 assert_return(m, -EINVAL);
166 assert_return(m->hdr, -EINVAL);
167 assert_return(rtnl_message_type_is_route(m->hdr->nlmsg_type), -EINVAL);
168 assert_return(dst_len, -EINVAL);
170 rtm = NLMSG_DATA(m->hdr);
172 *dst_len = rtm->rtm_dst_len;
177 int sd_rtnl_message_route_get_src_prefixlen(sd_rtnl_message *m, unsigned char *src_len) {
180 assert_return(m, -EINVAL);
181 assert_return(m->hdr, -EINVAL);
182 assert_return(rtnl_message_type_is_route(m->hdr->nlmsg_type), -EINVAL);
183 assert_return(src_len, -EINVAL);
185 rtm = NLMSG_DATA(m->hdr);
187 *src_len = rtm->rtm_src_len;
192 int sd_rtnl_message_new_route(sd_rtnl *rtnl, sd_rtnl_message **ret,
193 uint16_t nlmsg_type, int rtm_family,
194 unsigned char rtm_protocol) {
198 assert_return(rtnl_message_type_is_route(nlmsg_type), -EINVAL);
199 assert_return((nlmsg_type == RTM_GETROUTE && rtm_family == AF_UNSPEC) ||
200 rtm_family == AF_INET || rtm_family == AF_INET6, -EINVAL);
201 assert_return(ret, -EINVAL);
203 r = message_new(rtnl, ret, nlmsg_type);
207 if (nlmsg_type == RTM_NEWROUTE)
208 (*ret)->hdr->nlmsg_flags |= NLM_F_CREATE | NLM_F_APPEND;
210 rtm = NLMSG_DATA((*ret)->hdr);
212 rtm->rtm_family = rtm_family;
213 rtm->rtm_scope = RT_SCOPE_UNIVERSE;
214 rtm->rtm_type = RTN_UNICAST;
215 rtm->rtm_table = RT_TABLE_MAIN;
216 rtm->rtm_protocol = rtm_protocol;
221 int sd_rtnl_message_neigh_set_flags(sd_rtnl_message *m, uint8_t flags) {
224 assert_return(m, -EINVAL);
225 assert_return(m->hdr, -EINVAL);
226 assert_return(rtnl_message_type_is_neigh(m->hdr->nlmsg_type), -EINVAL);
228 ndm = NLMSG_DATA(m->hdr);
229 ndm->ndm_flags |= flags;
234 int sd_rtnl_message_neigh_set_state(sd_rtnl_message *m, uint16_t state) {
237 assert_return(m, -EINVAL);
238 assert_return(m->hdr, -EINVAL);
239 assert_return(rtnl_message_type_is_neigh(m->hdr->nlmsg_type), -EINVAL);
241 ndm = NLMSG_DATA(m->hdr);
242 ndm->ndm_state |= state;
247 int sd_rtnl_message_neigh_get_flags(sd_rtnl_message *m, uint8_t *flags) {
250 assert_return(m, -EINVAL);
251 assert_return(m->hdr, -EINVAL);
252 assert_return(rtnl_message_type_is_neigh(m->hdr->nlmsg_type), -EINVAL);
254 ndm = NLMSG_DATA(m->hdr);
255 *flags = ndm->ndm_flags;
260 int sd_rtnl_message_neigh_get_state(sd_rtnl_message *m, uint16_t *state) {
263 assert_return(m, -EINVAL);
264 assert_return(m->hdr, -EINVAL);
265 assert_return(rtnl_message_type_is_neigh(m->hdr->nlmsg_type), -EINVAL);
267 ndm = NLMSG_DATA(m->hdr);
268 *state = ndm->ndm_state;
273 int sd_rtnl_message_neigh_get_family(sd_rtnl_message *m, int *family) {
276 assert_return(m, -EINVAL);
277 assert_return(m->hdr, -EINVAL);
278 assert_return(rtnl_message_type_is_neigh(m->hdr->nlmsg_type), -EINVAL);
279 assert_return(family, -EINVAL);
281 ndm = NLMSG_DATA(m->hdr);
283 *family = ndm->ndm_family;
288 int sd_rtnl_message_neigh_get_ifindex(sd_rtnl_message *m, int *index) {
291 assert_return(m, -EINVAL);
292 assert_return(m->hdr, -EINVAL);
293 assert_return(rtnl_message_type_is_neigh(m->hdr->nlmsg_type), -EINVAL);
294 assert_return(index, -EINVAL);
296 ndm = NLMSG_DATA(m->hdr);
298 *index = ndm->ndm_ifindex;
303 int sd_rtnl_message_new_neigh(sd_rtnl *rtnl, sd_rtnl_message **ret, uint16_t nlmsg_type, int index, int ndm_family) {
307 assert_return(rtnl_message_type_is_neigh(nlmsg_type), -EINVAL);
308 assert_return(ndm_family == AF_INET ||
309 ndm_family == AF_INET6 ||
310 ndm_family == PF_BRIDGE, -EINVAL);
311 assert_return(ret, -EINVAL);
313 r = message_new(rtnl, ret, nlmsg_type);
317 if (nlmsg_type == RTM_NEWNEIGH)
318 (*ret)->hdr->nlmsg_flags |= NLM_F_CREATE | NLM_F_APPEND;
320 ndm = NLMSG_DATA((*ret)->hdr);
322 ndm->ndm_family = ndm_family;
323 ndm->ndm_ifindex = index;
328 int sd_rtnl_message_link_set_flags(sd_rtnl_message *m, unsigned flags, unsigned change) {
329 struct ifinfomsg *ifi;
331 assert_return(m, -EINVAL);
332 assert_return(m->hdr, -EINVAL);
333 assert_return(rtnl_message_type_is_link(m->hdr->nlmsg_type), -EINVAL);
334 assert_return(change, -EINVAL);
336 ifi = NLMSG_DATA(m->hdr);
338 ifi->ifi_flags = flags;
339 ifi->ifi_change = change;
344 int sd_rtnl_message_link_set_type(sd_rtnl_message *m, unsigned type) {
345 struct ifinfomsg *ifi;
347 assert_return(m, -EINVAL);
348 assert_return(m->hdr, -EINVAL);
349 assert_return(rtnl_message_type_is_link(m->hdr->nlmsg_type), -EINVAL);
351 ifi = NLMSG_DATA(m->hdr);
353 ifi->ifi_type = type;
358 int sd_rtnl_message_link_set_family(sd_rtnl_message *m, unsigned family) {
359 struct ifinfomsg *ifi;
361 assert_return(m, -EINVAL);
362 assert_return(m->hdr, -EINVAL);
363 assert_return(rtnl_message_type_is_link(m->hdr->nlmsg_type), -EINVAL);
365 ifi = NLMSG_DATA(m->hdr);
367 ifi->ifi_family = family;
372 int sd_rtnl_message_new_link(sd_rtnl *rtnl, sd_rtnl_message **ret,
373 uint16_t nlmsg_type, int index) {
374 struct ifinfomsg *ifi;
377 assert_return(rtnl_message_type_is_link(nlmsg_type), -EINVAL);
378 assert_return(nlmsg_type != RTM_DELLINK || index > 0, -EINVAL);
379 assert_return(ret, -EINVAL);
381 r = message_new(rtnl, ret, nlmsg_type);
385 if (nlmsg_type == RTM_NEWLINK)
386 (*ret)->hdr->nlmsg_flags |= NLM_F_CREATE | NLM_F_EXCL;
388 ifi = NLMSG_DATA((*ret)->hdr);
390 ifi->ifi_family = AF_UNSPEC;
391 ifi->ifi_index = index;
396 int sd_rtnl_message_request_dump(sd_rtnl_message *m, int dump) {
397 assert_return(m, -EINVAL);
398 assert_return(m->hdr, -EINVAL);
399 assert_return(m->hdr->nlmsg_type == RTM_GETLINK ||
400 m->hdr->nlmsg_type == RTM_GETADDR ||
401 m->hdr->nlmsg_type == RTM_GETROUTE ||
402 m->hdr->nlmsg_type == RTM_GETNEIGH,
406 m->hdr->nlmsg_flags |= NLM_F_DUMP;
408 m->hdr->nlmsg_flags &= ~NLM_F_DUMP;
413 int sd_rtnl_message_addr_set_prefixlen(sd_rtnl_message *m, unsigned char prefixlen) {
414 struct ifaddrmsg *ifa;
416 assert_return(m, -EINVAL);
417 assert_return(m->hdr, -EINVAL);
418 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
420 ifa = NLMSG_DATA(m->hdr);
422 if ((ifa->ifa_family == AF_INET && prefixlen > 32) ||
423 (ifa->ifa_family == AF_INET6 && prefixlen > 128))
426 ifa->ifa_prefixlen = prefixlen;
431 int sd_rtnl_message_addr_set_flags(sd_rtnl_message *m, unsigned char flags) {
432 struct ifaddrmsg *ifa;
434 assert_return(m, -EINVAL);
435 assert_return(m->hdr, -EINVAL);
436 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
438 ifa = NLMSG_DATA(m->hdr);
440 ifa->ifa_flags = flags;
445 int sd_rtnl_message_addr_set_scope(sd_rtnl_message *m, unsigned char scope) {
446 struct ifaddrmsg *ifa;
448 assert_return(m, -EINVAL);
449 assert_return(m->hdr, -EINVAL);
450 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
452 ifa = NLMSG_DATA(m->hdr);
454 ifa->ifa_scope = scope;
459 int sd_rtnl_message_addr_get_family(sd_rtnl_message *m, int *family) {
460 struct ifaddrmsg *ifa;
462 assert_return(m, -EINVAL);
463 assert_return(m->hdr, -EINVAL);
464 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
465 assert_return(family, -EINVAL);
467 ifa = NLMSG_DATA(m->hdr);
469 *family = ifa->ifa_family;
474 int sd_rtnl_message_addr_get_prefixlen(sd_rtnl_message *m, unsigned char *prefixlen) {
475 struct ifaddrmsg *ifa;
477 assert_return(m, -EINVAL);
478 assert_return(m->hdr, -EINVAL);
479 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
480 assert_return(prefixlen, -EINVAL);
482 ifa = NLMSG_DATA(m->hdr);
484 *prefixlen = ifa->ifa_prefixlen;
489 int sd_rtnl_message_addr_get_scope(sd_rtnl_message *m, unsigned char *scope) {
490 struct ifaddrmsg *ifa;
492 assert_return(m, -EINVAL);
493 assert_return(m->hdr, -EINVAL);
494 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
495 assert_return(scope, -EINVAL);
497 ifa = NLMSG_DATA(m->hdr);
499 *scope = ifa->ifa_scope;
504 int sd_rtnl_message_addr_get_flags(sd_rtnl_message *m, unsigned char *flags) {
505 struct ifaddrmsg *ifa;
507 assert_return(m, -EINVAL);
508 assert_return(m->hdr, -EINVAL);
509 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
510 assert_return(flags, -EINVAL);
512 ifa = NLMSG_DATA(m->hdr);
514 *flags = ifa->ifa_flags;
519 int sd_rtnl_message_addr_get_ifindex(sd_rtnl_message *m, int *ifindex) {
520 struct ifaddrmsg *ifa;
522 assert_return(m, -EINVAL);
523 assert_return(m->hdr, -EINVAL);
524 assert_return(rtnl_message_type_is_addr(m->hdr->nlmsg_type), -EINVAL);
525 assert_return(ifindex, -EINVAL);
527 ifa = NLMSG_DATA(m->hdr);
529 *ifindex = ifa->ifa_index;
534 int sd_rtnl_message_new_addr(sd_rtnl *rtnl, sd_rtnl_message **ret,
535 uint16_t nlmsg_type, int index,
537 struct ifaddrmsg *ifa;
540 assert_return(rtnl_message_type_is_addr(nlmsg_type), -EINVAL);
541 assert_return((nlmsg_type == RTM_GETADDR && index == 0) ||
543 assert_return((nlmsg_type == RTM_GETADDR && family == AF_UNSPEC) ||
544 family == AF_INET || family == AF_INET6, -EINVAL);
545 assert_return(ret, -EINVAL);
547 r = message_new(rtnl, ret, nlmsg_type);
551 if (nlmsg_type == RTM_GETADDR)
552 (*ret)->hdr->nlmsg_flags |= NLM_F_DUMP;
554 ifa = NLMSG_DATA((*ret)->hdr);
556 ifa->ifa_index = index;
557 ifa->ifa_family = family;
558 if (family == AF_INET)
559 ifa->ifa_prefixlen = 32;
560 else if (family == AF_INET6)
561 ifa->ifa_prefixlen = 128;
566 int sd_rtnl_message_new_addr_update(sd_rtnl *rtnl, sd_rtnl_message **ret,
567 int index, int family) {
570 r = sd_rtnl_message_new_addr(rtnl, ret, RTM_NEWADDR, index, family);
574 (*ret)->hdr->nlmsg_flags |= NLM_F_REPLACE;
579 sd_rtnl_message *sd_rtnl_message_ref(sd_rtnl_message *m) {
581 assert_se(REFCNT_INC(m->n_ref) >= 2);
586 sd_rtnl_message *sd_rtnl_message_unref(sd_rtnl_message *m) {
587 if (m && REFCNT_DEC(m->n_ref) == 0) {
592 for (i = 0; i <= m->n_containers; i++)
593 free(m->rta_offset_tb[i]);
595 sd_rtnl_message_unref(m->next);
603 int sd_rtnl_message_get_type(sd_rtnl_message *m, uint16_t *type) {
604 assert_return(m, -EINVAL);
605 assert_return(type, -EINVAL);
607 *type = m->hdr->nlmsg_type;
612 int sd_rtnl_message_is_broadcast(sd_rtnl_message *m) {
613 assert_return(m, -EINVAL);
615 return !m->hdr->nlmsg_pid;
618 int sd_rtnl_message_link_get_ifindex(sd_rtnl_message *m, int *ifindex) {
619 struct ifinfomsg *ifi;
621 assert_return(m, -EINVAL);
622 assert_return(m->hdr, -EINVAL);
623 assert_return(rtnl_message_type_is_link(m->hdr->nlmsg_type), -EINVAL);
624 assert_return(ifindex, -EINVAL);
626 ifi = NLMSG_DATA(m->hdr);
628 *ifindex = ifi->ifi_index;
633 int sd_rtnl_message_link_get_flags(sd_rtnl_message *m, unsigned *flags) {
634 struct ifinfomsg *ifi;
636 assert_return(m, -EINVAL);
637 assert_return(m->hdr, -EINVAL);
638 assert_return(rtnl_message_type_is_link(m->hdr->nlmsg_type), -EINVAL);
639 assert_return(flags, -EINVAL);
641 ifi = NLMSG_DATA(m->hdr);
643 *flags = ifi->ifi_flags;
648 int sd_rtnl_message_link_get_type(sd_rtnl_message *m, unsigned *type) {
649 struct ifinfomsg *ifi;
651 assert_return(m, -EINVAL);
652 assert_return(m->hdr, -EINVAL);
653 assert_return(rtnl_message_type_is_link(m->hdr->nlmsg_type), -EINVAL);
654 assert_return(type, -EINVAL);
656 ifi = NLMSG_DATA(m->hdr);
658 *type = ifi->ifi_type;
663 /* If successful the updated message will be correctly aligned, if
664 unsuccessful the old message is untouched. */
665 static int add_rtattr(sd_rtnl_message *m, unsigned short type, const void *data, size_t data_length) {
667 size_t message_length, padding_length;
668 struct nlmsghdr *new_hdr;
677 assert(NLMSG_ALIGN(m->hdr->nlmsg_len) == m->hdr->nlmsg_len);
678 assert(!data || data_length);
680 /* get offset of the new attribute */
681 offset = m->hdr->nlmsg_len;
683 /* get the size of the new rta attribute (with padding at the end) */
684 rta_length = RTA_LENGTH(data_length);
686 /* get the new message size (with padding at the end) */
687 message_length = offset + RTA_ALIGN(rta_length);
689 /* realloc to fit the new attribute */
690 new_hdr = realloc(m->hdr, message_length);
695 /* get pointer to the attribute we are about to add */
696 rta = (struct rtattr *) ((uint8_t *) m->hdr + offset);
698 /* if we are inside containers, extend them */
699 for (i = 0; i < m->n_containers; i++)
700 GET_CONTAINER(m, i)->rta_len += message_length - offset;
702 /* fill in the attribute */
703 rta->rta_type = type;
704 rta->rta_len = rta_length;
706 /* we don't deal with the case where the user lies about the type
707 * and gives us too little data (so don't do that)
709 padding = mempcpy(RTA_DATA(rta), data, data_length);
711 /* if no data was passed, make sure we still initialize the padding
712 note that we can have data_length > 0 (used by some containers) */
713 padding = RTA_DATA(rta);
716 /* make sure also the padding at the end of the message is initialized */
717 padding_length = (uint8_t*)m->hdr + message_length - (uint8_t*)padding;
718 memzero(padding, padding_length);
720 /* update message size */
721 m->hdr->nlmsg_len = message_length;
726 static int message_attribute_has_type(sd_rtnl_message *m, uint16_t attribute_type, uint16_t data_type) {
730 r = type_system_get_type(m->container_type_system[m->n_containers], &type, attribute_type);
734 if (type->type != data_type)
740 int sd_rtnl_message_append_string(sd_rtnl_message *m, unsigned short type, const char *data) {
744 assert_return(m, -EINVAL);
745 assert_return(!m->sealed, -EPERM);
746 assert_return(data, -EINVAL);
748 r = message_attribute_has_type(m, type, NLA_STRING);
755 length = strnlen(data, size+1);
759 length = strlen(data);
761 r = add_rtattr(m, type, data, length + 1);
768 int sd_rtnl_message_append_u8(sd_rtnl_message *m, unsigned short type, uint8_t data) {
771 assert_return(m, -EINVAL);
772 assert_return(!m->sealed, -EPERM);
774 r = message_attribute_has_type(m, type, NLA_U8);
778 r = add_rtattr(m, type, &data, sizeof(uint8_t));
786 int sd_rtnl_message_append_u16(sd_rtnl_message *m, unsigned short type, uint16_t data) {
789 assert_return(m, -EINVAL);
790 assert_return(!m->sealed, -EPERM);
792 r = message_attribute_has_type(m, type, NLA_U16);
796 r = add_rtattr(m, type, &data, sizeof(uint16_t));
803 int sd_rtnl_message_append_u32(sd_rtnl_message *m, unsigned short type, uint32_t data) {
806 assert_return(m, -EINVAL);
807 assert_return(!m->sealed, -EPERM);
809 r = message_attribute_has_type(m, type, NLA_U32);
813 r = add_rtattr(m, type, &data, sizeof(uint32_t));
820 int sd_rtnl_message_append_in_addr(sd_rtnl_message *m, unsigned short type, const struct in_addr *data) {
823 assert_return(m, -EINVAL);
824 assert_return(!m->sealed, -EPERM);
825 assert_return(data, -EINVAL);
827 r = message_attribute_has_type(m, type, NLA_IN_ADDR);
831 r = add_rtattr(m, type, data, sizeof(struct in_addr));
838 int sd_rtnl_message_append_in6_addr(sd_rtnl_message *m, unsigned short type, const struct in6_addr *data) {
841 assert_return(m, -EINVAL);
842 assert_return(!m->sealed, -EPERM);
843 assert_return(data, -EINVAL);
845 r = message_attribute_has_type(m, type, NLA_IN_ADDR);
849 r = add_rtattr(m, type, data, sizeof(struct in6_addr));
856 int sd_rtnl_message_append_ether_addr(sd_rtnl_message *m, unsigned short type, const struct ether_addr *data) {
859 assert_return(m, -EINVAL);
860 assert_return(!m->sealed, -EPERM);
861 assert_return(data, -EINVAL);
863 r = message_attribute_has_type(m, type, NLA_ETHER_ADDR);
867 r = add_rtattr(m, type, data, ETH_ALEN);
874 int sd_rtnl_message_append_cache_info(sd_rtnl_message *m, unsigned short type, const struct ifa_cacheinfo *info) {
877 assert_return(m, -EINVAL);
878 assert_return(!m->sealed, -EPERM);
879 assert_return(info, -EINVAL);
881 r = message_attribute_has_type(m, type, NLA_CACHE_INFO);
885 r = add_rtattr(m, type, info, sizeof(struct ifa_cacheinfo));
892 int sd_rtnl_message_open_container(sd_rtnl_message *m, unsigned short type) {
896 assert_return(m, -EINVAL);
897 assert_return(!m->sealed, -EPERM);
898 assert_return(m->n_containers < RTNL_CONTAINER_DEPTH, -ERANGE);
900 r = message_attribute_has_type(m, type, NLA_NESTED);
906 r = type_system_get_type_system(m->container_type_system[m->n_containers],
907 &m->container_type_system[m->n_containers + 1],
912 r = add_rtattr(m, type | NLA_F_NESTED, NULL, size);
916 m->container_offsets[m->n_containers ++] = r;
921 int sd_rtnl_message_open_container_union(sd_rtnl_message *m, unsigned short type, const char *key) {
922 const NLTypeSystemUnion *type_system_union;
925 assert_return(m, -EINVAL);
926 assert_return(!m->sealed, -EPERM);
928 r = type_system_get_type_system_union(m->container_type_system[m->n_containers], &type_system_union, type);
932 r = type_system_union_get_type_system(type_system_union,
933 &m->container_type_system[m->n_containers + 1],
938 r = sd_rtnl_message_append_string(m, type_system_union->match, key);
942 /* do we evere need non-null size */
943 r = add_rtattr(m, type, NULL, 0);
947 m->container_offsets[m->n_containers ++] = r;
953 int sd_rtnl_message_close_container(sd_rtnl_message *m) {
954 assert_return(m, -EINVAL);
955 assert_return(!m->sealed, -EPERM);
956 assert_return(m->n_containers > 0, -EINVAL);
958 m->container_type_system[m->n_containers] = NULL;
964 int rtnl_message_read_internal(sd_rtnl_message *m, unsigned short type, void **data) {
967 assert_return(m, -EINVAL);
968 assert_return(m->sealed, -EPERM);
969 assert_return(data, -EINVAL);
970 assert(m->n_containers <= RTNL_CONTAINER_DEPTH);
971 assert(m->rta_offset_tb[m->n_containers]);
972 assert(type < m->rta_tb_size[m->n_containers]);
974 if(!m->rta_offset_tb[m->n_containers][type])
977 rta = (struct rtattr*)((uint8_t *) m->hdr + m->rta_offset_tb[m->n_containers][type]);
979 *data = RTA_DATA(rta);
981 return RTA_PAYLOAD(rta);
984 int sd_rtnl_message_read_string(sd_rtnl_message *m, unsigned short type, const char **data) {
988 assert_return(m, -EINVAL);
990 r = message_attribute_has_type(m, type, NLA_STRING);
994 r = rtnl_message_read_internal(m, type, &attr_data);
997 else if (strnlen(attr_data, r) >= (size_t) r)
1001 *data = (const char *) attr_data;
1006 int sd_rtnl_message_read_u8(sd_rtnl_message *m, unsigned short type, uint8_t *data) {
1010 assert_return(m, -EINVAL);
1012 r = message_attribute_has_type(m, type, NLA_U8);
1016 r = rtnl_message_read_internal(m, type, &attr_data);
1019 else if ((size_t) r < sizeof(uint8_t))
1023 *data = *(uint8_t *) attr_data;
1028 int sd_rtnl_message_read_u16(sd_rtnl_message *m, unsigned short type, uint16_t *data) {
1032 assert_return(m, -EINVAL);
1034 r = message_attribute_has_type(m, type, NLA_U16);
1038 r = rtnl_message_read_internal(m, type, &attr_data);
1041 else if ((size_t) r < sizeof(uint16_t))
1045 *data = *(uint16_t *) attr_data;
1050 int sd_rtnl_message_read_u32(sd_rtnl_message *m, unsigned short type, uint32_t *data) {
1054 assert_return(m, -EINVAL);
1056 r = message_attribute_has_type(m, type, NLA_U32);
1060 r = rtnl_message_read_internal(m, type, &attr_data);
1063 else if ((size_t)r < sizeof(uint32_t))
1067 *data = *(uint32_t *) attr_data;
1072 int sd_rtnl_message_read_ether_addr(sd_rtnl_message *m, unsigned short type, struct ether_addr *data) {
1076 assert_return(m, -EINVAL);
1078 r = message_attribute_has_type(m, type, NLA_ETHER_ADDR);
1082 r = rtnl_message_read_internal(m, type, &attr_data);
1085 else if ((size_t)r < sizeof(struct ether_addr))
1089 memcpy(data, attr_data, sizeof(struct ether_addr));
1094 int sd_rtnl_message_read_cache_info(sd_rtnl_message *m, unsigned short type, struct ifa_cacheinfo *info) {
1098 assert_return(m, -EINVAL);
1100 r = message_attribute_has_type(m, type, NLA_CACHE_INFO);
1104 r = rtnl_message_read_internal(m, type, &attr_data);
1107 else if ((size_t)r < sizeof(struct ifa_cacheinfo))
1111 memcpy(info, attr_data, sizeof(struct ifa_cacheinfo));
1116 int sd_rtnl_message_read_in_addr(sd_rtnl_message *m, unsigned short type, struct in_addr *data) {
1120 assert_return(m, -EINVAL);
1122 r = message_attribute_has_type(m, type, NLA_IN_ADDR);
1126 r = rtnl_message_read_internal(m, type, &attr_data);
1129 else if ((size_t)r < sizeof(struct in_addr))
1133 memcpy(data, attr_data, sizeof(struct in_addr));
1138 int sd_rtnl_message_read_in6_addr(sd_rtnl_message *m, unsigned short type, struct in6_addr *data) {
1142 assert_return(m, -EINVAL);
1144 r = message_attribute_has_type(m, type, NLA_IN_ADDR);
1148 r = rtnl_message_read_internal(m, type, &attr_data);
1151 else if ((size_t)r < sizeof(struct in6_addr))
1155 memcpy(data, attr_data, sizeof(struct in6_addr));
1160 int sd_rtnl_message_enter_container(sd_rtnl_message *m, unsigned short type) {
1161 const NLType *nl_type;
1162 const NLTypeSystem *type_system;
1167 assert_return(m, -EINVAL);
1168 assert_return(m->n_containers < RTNL_CONTAINER_DEPTH, -EINVAL);
1170 r = type_system_get_type(m->container_type_system[m->n_containers],
1176 if (nl_type->type == NLA_NESTED) {
1177 r = type_system_get_type_system(m->container_type_system[m->n_containers],
1182 } else if (nl_type->type == NLA_UNION) {
1183 const NLTypeSystemUnion *type_system_union;
1186 r = type_system_get_type_system_union(m->container_type_system[m->n_containers],
1192 r = sd_rtnl_message_read_string(m, type_system_union->match, &key);
1196 r = type_system_union_get_type_system(type_system_union,
1204 r = rtnl_message_read_internal(m, type, &container);
1212 r = rtnl_message_parse(m,
1213 &m->rta_offset_tb[m->n_containers],
1214 &m->rta_tb_size[m->n_containers],
1223 m->container_type_system[m->n_containers] = type_system;
1228 int sd_rtnl_message_exit_container(sd_rtnl_message *m) {
1229 assert_return(m, -EINVAL);
1230 assert_return(m->sealed, -EINVAL);
1231 assert_return(m->n_containers > 0, -EINVAL);
1233 free(m->rta_offset_tb[m->n_containers]);
1234 m->rta_offset_tb[m->n_containers] = NULL;
1235 m->container_type_system[m->n_containers] = NULL;
1242 uint32_t rtnl_message_get_serial(sd_rtnl_message *m) {
1246 return m->hdr->nlmsg_seq;
1249 int sd_rtnl_message_is_error(sd_rtnl_message *m) {
1250 assert_return(m, 0);
1251 assert_return(m->hdr, 0);
1253 return m->hdr->nlmsg_type == NLMSG_ERROR;
1256 int sd_rtnl_message_get_errno(sd_rtnl_message *m) {
1257 struct nlmsgerr *err;
1259 assert_return(m, -EINVAL);
1260 assert_return(m->hdr, -EINVAL);
1262 if (!sd_rtnl_message_is_error(m))
1265 err = NLMSG_DATA(m->hdr);
1270 int rtnl_message_parse(sd_rtnl_message *m,
1271 size_t **rta_offset_tb,
1272 unsigned short *rta_tb_size,
1275 unsigned int rt_len) {
1276 unsigned short type;
1279 tb = new0(size_t, max + 1);
1283 *rta_tb_size = max + 1;
1285 for (; RTA_OK(rta, rt_len); rta = RTA_NEXT(rta, rt_len)) {
1286 type = RTA_TYPE(rta);
1288 /* if the kernel is newer than the headers we used
1289 when building, we ignore out-of-range attributes
1295 log_debug("rtnl: message parse - overwriting repeated attribute");
1297 tb[type] = (uint8_t *) rta - (uint8_t *) m->hdr;
1300 *rta_offset_tb = tb;
1305 /* returns the number of bytes sent, or a negative error code */
1306 int socket_write_message(sd_rtnl *nl, sd_rtnl_message *m) {
1309 struct sockaddr_nl nl;
1311 .nl.nl_family = AF_NETLINK,
1319 k = sendto(nl->fd, m->hdr, m->hdr->nlmsg_len,
1320 0, &addr.sa, sizeof(addr));
1322 return (errno == EAGAIN) ? 0 : -errno;
1327 static int socket_recv_message(int fd, struct iovec *iov, uint32_t *_group, bool peek) {
1328 uint8_t cred_buffer[CMSG_SPACE(sizeof(struct ucred)) +
1329 CMSG_SPACE(sizeof(struct nl_pktinfo))];
1330 struct msghdr msg = {
1333 .msg_control = cred_buffer,
1334 .msg_controllen = sizeof(cred_buffer),
1336 struct cmsghdr *cmsg;
1344 r = recvmsg(fd, &msg, MSG_TRUNC | (peek ? MSG_PEEK : 0));
1347 if (errno == ENOBUFS)
1348 log_debug("rtnl: kernel receive buffer overrun");
1349 else if (errno == EAGAIN)
1350 log_debug("rtnl: no data in socket");
1352 return (errno == EAGAIN || errno == EINTR) ? 0 : -errno;
1355 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
1356 if (cmsg->cmsg_level == SOL_SOCKET &&
1357 cmsg->cmsg_type == SCM_CREDENTIALS &&
1358 cmsg->cmsg_len == CMSG_LEN(sizeof(struct ucred))) {
1359 struct ucred *ucred = (void *)CMSG_DATA(cmsg);
1361 /* from the kernel */
1362 if (ucred->pid == 0)
1365 log_debug("rtnl: ignoring message from PID "PID_FMT, ucred->pid);
1366 } else if (cmsg->cmsg_level == SOL_NETLINK &&
1367 cmsg->cmsg_type == NETLINK_PKTINFO &&
1368 cmsg->cmsg_len == CMSG_LEN(sizeof(struct nl_pktinfo))) {
1369 struct nl_pktinfo *pktinfo = (void *)CMSG_DATA(cmsg);
1371 /* multi-cast group */
1372 group = pktinfo->group;
1377 /* not from the kernel, ignore */
1379 /* drop the message */
1380 r = recvmsg(fd, &msg, 0);
1382 return (errno == EAGAIN || errno == EINTR) ? 0 : -errno;
1394 /* On success, the number of bytes received is returned and *ret points to the received message
1395 * which has a valid header and the correct size.
1396 * If nothing useful was received 0 is returned.
1397 * On failure, a negative error code is returned.
1399 int socket_read_message(sd_rtnl *rtnl) {
1400 _cleanup_rtnl_message_unref_ sd_rtnl_message *first = NULL;
1401 struct iovec iov = {};
1403 bool multi_part = false, done = false;
1404 struct nlmsghdr *new_msg;
1410 assert(rtnl->rbuffer);
1411 assert(rtnl->rbuffer_allocated >= sizeof(struct nlmsghdr));
1413 /* read nothing, just get the pending message size */
1414 r = socket_recv_message(rtnl->fd, &iov, &group, true);
1420 /* make room for the pending message */
1421 if (!greedy_realloc((void **)&rtnl->rbuffer,
1422 &rtnl->rbuffer_allocated,
1423 len, sizeof(uint8_t)))
1426 iov.iov_base = rtnl->rbuffer;
1427 iov.iov_len = rtnl->rbuffer_allocated;
1429 /* read the pending message */
1430 r = socket_recv_message(rtnl->fd, &iov, &group, false);
1436 if (len > rtnl->rbuffer_allocated)
1437 /* message did not fit in read buffer */
1440 if (NLMSG_OK(rtnl->rbuffer, len) && rtnl->rbuffer->nlmsg_flags & NLM_F_MULTI) {
1443 for (i = 0; i < rtnl->rqueue_partial_size; i++) {
1444 if (rtnl_message_get_serial(rtnl->rqueue_partial[i]) ==
1445 rtnl->rbuffer->nlmsg_seq) {
1446 first = rtnl->rqueue_partial[i];
1452 for (new_msg = rtnl->rbuffer; NLMSG_OK(new_msg, len) && !done; new_msg = NLMSG_NEXT(new_msg, len)) {
1453 _cleanup_rtnl_message_unref_ sd_rtnl_message *m = NULL;
1454 const NLType *nl_type;
1456 if (!group && new_msg->nlmsg_pid != rtnl->sockaddr.nl.nl_pid)
1457 /* not broadcast and not for us */
1460 if (new_msg->nlmsg_type == NLMSG_NOOP)
1461 /* silently drop noop messages */
1464 if (new_msg->nlmsg_type == NLMSG_DONE) {
1465 /* finished reading multi-part message */
1471 /* check that we support this message type */
1472 r = type_system_get_type(NULL, &nl_type, new_msg->nlmsg_type);
1475 log_debug("sd-rtnl: ignored message with unknown type: %i",
1476 new_msg->nlmsg_type);
1481 /* check that the size matches the message type */
1482 if (new_msg->nlmsg_len < NLMSG_LENGTH(nl_type->size)) {
1483 log_debug("sd-rtnl: message larger than expected, dropping");
1487 r = message_new_empty(rtnl, &m);
1491 m->hdr = memdup(new_msg, new_msg->nlmsg_len);
1495 /* seal and parse the top-level message */
1496 r = sd_rtnl_message_rewind(m);
1500 /* push the message onto the multi-part message stack */
1508 log_debug("sd-rtnl: discarding %zu bytes of incoming message", len);
1513 if (!multi_part || done) {
1514 /* we got a complete message, push it on the read queue */
1515 r = rtnl_rqueue_make_room(rtnl);
1519 rtnl->rqueue[rtnl->rqueue_size ++] = first;
1522 if (multi_part && (i < rtnl->rqueue_partial_size)) {
1523 /* remove the message form the partial read queue */
1524 memmove(rtnl->rqueue_partial + i,rtnl->rqueue_partial + i + 1,
1525 sizeof(sd_rtnl_message*) * (rtnl->rqueue_partial_size - i - 1));
1526 rtnl->rqueue_partial_size --;
1531 /* we only got a partial multi-part message, push it on the
1532 partial read queue */
1533 if (i < rtnl->rqueue_partial_size) {
1534 rtnl->rqueue_partial[i] = first;
1536 r = rtnl_rqueue_partial_make_room(rtnl);
1540 rtnl->rqueue_partial[rtnl->rqueue_partial_size ++] = first;
1548 int sd_rtnl_message_rewind(sd_rtnl_message *m) {
1553 assert_return(m, -EINVAL);
1555 /* don't allow appending to message once parsed */
1557 rtnl_message_seal(m);
1559 for (i = 1; i <= m->n_containers; i++) {
1560 free(m->rta_offset_tb[i]);
1561 m->rta_offset_tb[i] = NULL;
1562 m->rta_tb_size[i] = 0;
1563 m->container_type_system[i] = NULL;
1566 m->n_containers = 0;
1568 if (m->rta_offset_tb[0]) {
1569 /* top-level attributes have already been parsed */
1575 r = type_system_get_type(NULL, &type, m->hdr->nlmsg_type);
1579 if (type->type == NLA_NESTED) {
1580 const NLTypeSystem *type_system = type->type_system;
1582 assert(type_system);
1584 m->container_type_system[0] = type_system;
1586 r = rtnl_message_parse(m,
1587 &m->rta_offset_tb[m->n_containers],
1588 &m->rta_tb_size[m->n_containers],
1590 (struct rtattr*)((uint8_t*)NLMSG_DATA(m->hdr) +
1591 NLMSG_ALIGN(type->size)),
1592 NLMSG_PAYLOAD(m->hdr, type->size));
1600 void rtnl_message_seal(sd_rtnl_message *m) {
1607 sd_rtnl_message *sd_rtnl_message_next(sd_rtnl_message *m) {
1608 assert_return(m, NULL);