blob: 0587f5bf1c22b44747104fe757444b8229b74c7b [file] [log] [blame]
Paul Stewartf748a362012-03-07 12:01:20 -08001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Paul Stewarta3c56f92011-05-26 07:08:52 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include <errno.h>
6#include <time.h>
7#include <unistd.h>
8#include <string.h>
Darin Petkove0a312e2011-07-20 13:45:28 -07009#include <sys/ioctl.h>
Paul Stewarta3c56f92011-05-26 07:08:52 -070010#include <sys/socket.h>
11#include <arpa/inet.h>
12#include <netinet/ether.h>
13#include <net/if.h>
14#include <net/if_arp.h>
15#include <linux/netlink.h>
16#include <linux/rtnetlink.h>
17#include <fcntl.h>
Paul Stewarta3c56f92011-05-26 07:08:52 -070018
Eric Shienbrood3e20a232012-02-16 11:35:56 -050019#include <base/bind.h>
Paul Stewarta3c56f92011-05-26 07:08:52 -070020
Paul Stewart5f06a0e2012-12-20 11:11:33 -080021#include "shill/error.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070022#include "shill/event_dispatcher.h"
Paul Stewarta3c56f92011-05-26 07:08:52 -070023#include "shill/io_handler.h"
Paul Stewart1d18e8c2011-07-15 11:00:31 -070024#include "shill/ip_address.h"
Paul Stewartc39f1132011-06-22 12:02:28 -070025#include "shill/ipconfig.h"
Christopher Wileyb691efd2012-08-09 13:51:51 -070026#include "shill/logging.h"
Paul Stewarta3c56f92011-05-26 07:08:52 -070027#include "shill/rtnl_handler.h"
28#include "shill/rtnl_listener.h"
Paul Stewart75e89d22011-08-01 10:00:02 -070029#include "shill/rtnl_message.h"
Darin Petkov633ac6f2011-07-08 13:56:13 -070030#include "shill/sockets.h"
Paul Stewarta3c56f92011-05-26 07:08:52 -070031
Eric Shienbrood3e20a232012-02-16 11:35:56 -050032using base::Bind;
33using base::Unretained;
Paul Stewarta3c56f92011-05-26 07:08:52 -070034using std::string;
35
36namespace shill {
37
Julius Wernerf253c842012-12-20 14:52:30 -080038// Keep this large enough to avoid overflows on IPv6 SNM routing update spikes
39const int RTNLHandler::kReceiveBufferSize = 256 * 1024;
40
Ben Chanbbdef5f2012-04-23 13:58:15 -070041namespace {
42base::LazyInstance<RTNLHandler> g_rtnl_handler = LAZY_INSTANCE_INITIALIZER;
43} // namespace
Paul Stewart0d2ada32011-08-09 17:01:57 -070044
Paul Stewarta3c56f92011-05-26 07:08:52 -070045RTNLHandler::RTNLHandler()
Darin Petkov633ac6f2011-07-08 13:56:13 -070046 : sockets_(NULL),
Paul Stewarta3c56f92011-05-26 07:08:52 -070047 in_request_(false),
Paul Stewarta3c56f92011-05-26 07:08:52 -070048 rtnl_socket_(-1),
49 request_flags_(0),
mukesh agrawalf60e4062011-05-27 13:13:41 -070050 request_sequence_(0),
Paul Stewart9a908082011-08-31 12:18:48 -070051 last_dump_sequence_(0),
Eric Shienbrood3e20a232012-02-16 11:35:56 -050052 rtnl_callback_(Bind(&RTNLHandler::ParseRTNL, Unretained(this))) {
Ben Chanfad4a0b2012-04-18 15:49:59 -070053 SLOG(RTNL, 2) << "RTNLHandler created";
Paul Stewarta3c56f92011-05-26 07:08:52 -070054}
55
56RTNLHandler::~RTNLHandler() {
Ben Chanfad4a0b2012-04-18 15:49:59 -070057 SLOG(RTNL, 2) << "RTNLHandler removed";
Paul Stewarta3c56f92011-05-26 07:08:52 -070058 Stop();
59}
60
61RTNLHandler* RTNLHandler::GetInstance() {
Paul Stewart0d2ada32011-08-09 17:01:57 -070062 return g_rtnl_handler.Pointer();
Paul Stewarta3c56f92011-05-26 07:08:52 -070063}
64
Darin Petkov633ac6f2011-07-08 13:56:13 -070065void RTNLHandler::Start(EventDispatcher *dispatcher, Sockets *sockets) {
Paul Stewarta3c56f92011-05-26 07:08:52 -070066 struct sockaddr_nl addr;
67
Darin Petkov633ac6f2011-07-08 13:56:13 -070068 if (sockets_) {
Paul Stewarta3c56f92011-05-26 07:08:52 -070069 return;
Darin Petkov633ac6f2011-07-08 13:56:13 -070070 }
Paul Stewarta3c56f92011-05-26 07:08:52 -070071
Darin Petkov633ac6f2011-07-08 13:56:13 -070072 rtnl_socket_ = sockets->Socket(PF_NETLINK, SOCK_DGRAM, NETLINK_ROUTE);
Paul Stewarta3c56f92011-05-26 07:08:52 -070073 if (rtnl_socket_ < 0) {
74 LOG(ERROR) << "Failed to open rtnl socket";
75 return;
76 }
77
Julius Wernerf253c842012-12-20 14:52:30 -080078 if (sockets->SetReceiveBuffer(rtnl_socket_, kReceiveBufferSize)) {
79 LOG(ERROR) << "Failed to increase receive buffer size";
80 }
81
Paul Stewarta3c56f92011-05-26 07:08:52 -070082 memset(&addr, 0, sizeof(addr));
83 addr.nl_family = AF_NETLINK;
Paul Stewart9a908082011-08-31 12:18:48 -070084 addr.nl_groups = RTMGRP_LINK | RTMGRP_IPV4_IFADDR | RTMGRP_IPV4_ROUTE |
85 RTMGRP_IPV6_IFADDR | RTMGRP_IPV6_ROUTE;
Paul Stewarta3c56f92011-05-26 07:08:52 -070086
Darin Petkov633ac6f2011-07-08 13:56:13 -070087 if (sockets->Bind(rtnl_socket_,
88 reinterpret_cast<struct sockaddr *>(&addr),
89 sizeof(addr)) < 0) {
90 sockets->Close(rtnl_socket_);
Paul Stewarta3c56f92011-05-26 07:08:52 -070091 rtnl_socket_ = -1;
92 LOG(ERROR) << "RTNL socket bind failed";
93 return;
94 }
95
Paul Stewart5f06a0e2012-12-20 11:11:33 -080096 rtnl_handler_.reset(dispatcher->CreateInputHandler(
97 rtnl_socket_,
98 rtnl_callback_,
99 Bind(&RTNLHandler::OnReadError, Unretained(this))));
Darin Petkov633ac6f2011-07-08 13:56:13 -0700100 sockets_ = sockets;
Paul Stewarta3c56f92011-05-26 07:08:52 -0700101
Paul Stewart9a908082011-08-31 12:18:48 -0700102 NextRequest(last_dump_sequence_);
Ben Chanfad4a0b2012-04-18 15:49:59 -0700103 SLOG(RTNL, 2) << "RTNLHandler started";
Paul Stewarta3c56f92011-05-26 07:08:52 -0700104}
105
106void RTNLHandler::Stop() {
Darin Petkov633ac6f2011-07-08 13:56:13 -0700107 if (!sockets_)
Paul Stewarta3c56f92011-05-26 07:08:52 -0700108 return;
109
Paul Stewart7355ce12011-09-02 10:47:01 -0700110 rtnl_handler_.reset();
Darin Petkov633ac6f2011-07-08 13:56:13 -0700111 sockets_->Close(rtnl_socket_);
Paul Stewarta3c56f92011-05-26 07:08:52 -0700112 in_request_ = false;
Darin Petkov633ac6f2011-07-08 13:56:13 -0700113 sockets_ = NULL;
Paul Stewart65c40f52011-08-08 07:27:46 -0700114 request_flags_ = 0;
Ben Chanfad4a0b2012-04-18 15:49:59 -0700115 SLOG(RTNL, 2) << "RTNLHandler stopped";
Paul Stewarta3c56f92011-05-26 07:08:52 -0700116}
117
118void RTNLHandler::AddListener(RTNLListener *to_add) {
119 std::vector<RTNLListener *>::iterator it;
120 for (it = listeners_.begin(); it != listeners_.end(); ++it) {
121 if (to_add == *it)
122 return;
123 }
124 listeners_.push_back(to_add);
Ben Chanfad4a0b2012-04-18 15:49:59 -0700125 SLOG(RTNL, 2) << "RTNLHandler added listener";
Paul Stewarta3c56f92011-05-26 07:08:52 -0700126}
127
128void RTNLHandler::RemoveListener(RTNLListener *to_remove) {
129 std::vector<RTNLListener *>::iterator it;
130 for (it = listeners_.begin(); it != listeners_.end(); ++it) {
131 if (to_remove == *it) {
132 listeners_.erase(it);
133 return;
134 }
135 }
Ben Chanfad4a0b2012-04-18 15:49:59 -0700136 SLOG(RTNL, 2) << "RTNLHandler removed listener";
Paul Stewarta3c56f92011-05-26 07:08:52 -0700137}
138
139void RTNLHandler::SetInterfaceFlags(int interface_index, unsigned int flags,
Darin Petkov0828f5f2011-08-11 10:18:52 -0700140 unsigned int change) {
Paul Stewart536820d2012-03-19 16:05:59 -0700141 if (!sockets_) {
142 LOG(ERROR) << __func__ << " called while not started. "
143 "Assuming we are in unit tests.";
144 return;
145 }
146
Paul Stewarta3c56f92011-05-26 07:08:52 -0700147 struct rtnl_request {
148 struct nlmsghdr hdr;
149 struct ifinfomsg msg;
150 } req;
151
152 request_sequence_++;
153 memset(&req, 0, sizeof(req));
154
155 req.hdr.nlmsg_len = sizeof(req);
156 req.hdr.nlmsg_flags = NLM_F_REQUEST;
157 req.hdr.nlmsg_pid = 0;
158 req.hdr.nlmsg_seq = request_sequence_;
159 req.hdr.nlmsg_type = RTM_NEWLINK;
160 req.msg.ifi_index = interface_index;
161 req.msg.ifi_flags = flags;
162 req.msg.ifi_change = change;
163
Darin Petkov633ac6f2011-07-08 13:56:13 -0700164 if (sockets_->Send(rtnl_socket_, &req, sizeof(req), 0) < 0) {
Paul Stewarta3c56f92011-05-26 07:08:52 -0700165 LOG(ERROR) << "RTNL sendto failed: " << strerror(errno);
166 }
167}
168
169void RTNLHandler::RequestDump(int request_flags) {
170 request_flags_ |= request_flags;
171
Ben Chanfad4a0b2012-04-18 15:49:59 -0700172 SLOG(RTNL, 2) << "RTNLHandler got request to dump "
mukesh agrawal47009f82011-08-25 14:07:35 -0700173 << std::showbase << std::hex
174 << request_flags
175 << std::dec << std::noshowbase;
Paul Stewarta3c56f92011-05-26 07:08:52 -0700176
Darin Petkov633ac6f2011-07-08 13:56:13 -0700177 if (!in_request_ && sockets_)
Paul Stewart9a908082011-08-31 12:18:48 -0700178 NextRequest(last_dump_sequence_);
Paul Stewarta3c56f92011-05-26 07:08:52 -0700179}
180
Chris Masone2aa97072011-08-09 17:35:08 -0700181void RTNLHandler::DispatchEvent(int type, const RTNLMessage &msg) {
Paul Stewarta3c56f92011-05-26 07:08:52 -0700182 std::vector<RTNLListener *>::iterator it;
183 for (it = listeners_.begin(); it != listeners_.end(); ++it) {
Chris Masone2aa97072011-08-09 17:35:08 -0700184 (*it)->NotifyEvent(type, msg);
Paul Stewarta3c56f92011-05-26 07:08:52 -0700185 }
186}
187
Paul Stewartf748a362012-03-07 12:01:20 -0800188void RTNLHandler::NextRequest(uint32 seq) {
Paul Stewarta3c56f92011-05-26 07:08:52 -0700189 int flag = 0;
Paul Stewart9a908082011-08-31 12:18:48 -0700190 RTNLMessage::Type type;
Paul Stewarta3c56f92011-05-26 07:08:52 -0700191
Ben Chanfad4a0b2012-04-18 15:49:59 -0700192 SLOG(RTNL, 2) << "RTNLHandler nextrequest " << seq << " "
193 << last_dump_sequence_
194 << std::showbase << std::hex
195 << " " << request_flags_
196 << std::dec << std::noshowbase;
Paul Stewarta3c56f92011-05-26 07:08:52 -0700197
Paul Stewart9a908082011-08-31 12:18:48 -0700198 if (seq != last_dump_sequence_)
Paul Stewarta3c56f92011-05-26 07:08:52 -0700199 return;
200
Paul Stewart8c116a92012-05-02 18:30:03 -0700201 if ((request_flags_ & kRequestAddr) != 0) {
Paul Stewart9a908082011-08-31 12:18:48 -0700202 type = RTNLMessage::kTypeAddress;
Paul Stewarta3c56f92011-05-26 07:08:52 -0700203 flag = kRequestAddr;
204 } else if ((request_flags_ & kRequestRoute) != 0) {
Paul Stewart9a908082011-08-31 12:18:48 -0700205 type = RTNLMessage::kTypeRoute;
Paul Stewarta3c56f92011-05-26 07:08:52 -0700206 flag = kRequestRoute;
Paul Stewart8c116a92012-05-02 18:30:03 -0700207 } else if ((request_flags_ & kRequestLink) != 0) {
208 type = RTNLMessage::kTypeLink;
209 flag = kRequestLink;
Paul Stewarta3c56f92011-05-26 07:08:52 -0700210 } else {
Ben Chanfad4a0b2012-04-18 15:49:59 -0700211 SLOG(RTNL, 2) << "Done with requests";
Paul Stewarta3c56f92011-05-26 07:08:52 -0700212 in_request_ = false;
213 return;
214 }
215
Paul Stewart9a908082011-08-31 12:18:48 -0700216 RTNLMessage msg(
217 type,
218 RTNLMessage::kModeGet,
219 0,
220 0,
221 0,
222 0,
Paul Stewart7355ce12011-09-02 10:47:01 -0700223 IPAddress::kFamilyUnknown);
Paul Stewart9a908082011-08-31 12:18:48 -0700224 CHECK(SendMessage(&msg));
Paul Stewarta3c56f92011-05-26 07:08:52 -0700225
Paul Stewart9a908082011-08-31 12:18:48 -0700226 last_dump_sequence_ = msg.seq();
Paul Stewarta3c56f92011-05-26 07:08:52 -0700227 request_flags_ &= ~flag;
228 in_request_ = true;
229}
230
231void RTNLHandler::ParseRTNL(InputData *data) {
232 unsigned char *buf = data->buf;
233 unsigned char *end = buf + data->len;
234
235 while (buf < end) {
236 struct nlmsghdr *hdr = reinterpret_cast<struct nlmsghdr *>(buf);
Julius Werner87fc23e2012-10-18 14:21:33 -0700237
238 // temporary debug output
239 // TODO(jwerner@chromium.org): Remove after gathering data (crosbug 35479)
240 if (static_cast<unsigned int>(end - buf) >= sizeof(struct nlmsghdr) &&
241 hdr->nlmsg_type == RTM_NEWLINK) {
242 if (NLMSG_OK(hdr, static_cast<unsigned int>(end - buf)) &&
243 hdr->nlmsg_len <= static_cast<unsigned int>(end - buf) &&
244 hdr->nlmsg_len >= NLMSG_LENGTH(sizeof(struct ifinfomsg))) {
245 struct ifinfomsg *info =
246 reinterpret_cast<struct ifinfomsg *>(NLMSG_DATA(hdr));
247 LOG(INFO) << "RTM_NEWLINK(idx=" << info->ifi_index << ", sender=" <<
248 hdr->nlmsg_pid << ", flags=" << std::hex << info->ifi_flags << ")";
249 } else {
250 LOG(INFO) << "Broken RTM_NEWLINK packet: " <<
251 ByteString(buf, end - buf).HexEncode();
252 }
253 }
254
mukesh agrawalf60e4062011-05-27 13:13:41 -0700255 if (!NLMSG_OK(hdr, static_cast<unsigned int>(end - buf)))
Paul Stewarta3c56f92011-05-26 07:08:52 -0700256 break;
257
Ben Chanfad4a0b2012-04-18 15:49:59 -0700258 SLOG(RTNL, 3) << __func__ << ": received payload (" << end - buf << ")";
Paul Stewart7355ce12011-09-02 10:47:01 -0700259
Chris Masone2aa97072011-08-09 17:35:08 -0700260 RTNLMessage msg;
Paul Stewart44f08cb2012-04-27 16:53:05 -0700261 ByteString payload(reinterpret_cast<unsigned char *>(hdr), hdr->nlmsg_len);
262 SLOG(RTNL, 5) << "RTNL received payload length " << payload.GetLength()
263 << ": \"" << payload.HexEncode() << "\"";
264 if (!msg.Decode(payload)) {
Ben Chanfad4a0b2012-04-18 15:49:59 -0700265 SLOG(RTNL, 3) << __func__ << ": rtnl packet type "
Paul Stewart44f08cb2012-04-27 16:53:05 -0700266 << hdr->nlmsg_type
267 << " length " << hdr->nlmsg_len
268 << " sequence " << hdr->nlmsg_seq;
269
Chris Masone2aa97072011-08-09 17:35:08 -0700270 switch (hdr->nlmsg_type) {
271 case NLMSG_NOOP:
272 case NLMSG_OVERRUN:
273 break;
274 case NLMSG_DONE:
275 NextRequest(hdr->nlmsg_seq);
276 break;
277 case NLMSG_ERROR:
278 {
279 struct nlmsgerr *err =
280 reinterpret_cast<nlmsgerr *>(NLMSG_DATA(hdr));
281 LOG(ERROR) << "error " << -err->error << " ("
282 << strerror(-err->error) << ")";
283 break;
284 }
285 default:
286 NOTIMPLEMENTED() << "Unknown NL message type.";
287 }
288 } else {
289 switch (msg.type()) {
Paul Stewart9a908082011-08-31 12:18:48 -0700290 case RTNLMessage::kTypeLink:
Chris Masone2aa97072011-08-09 17:35:08 -0700291 DispatchEvent(kRequestLink, msg);
292 break;
Paul Stewart9a908082011-08-31 12:18:48 -0700293 case RTNLMessage::kTypeAddress:
Chris Masone2aa97072011-08-09 17:35:08 -0700294 DispatchEvent(kRequestAddr, msg);
295 break;
Paul Stewart9a908082011-08-31 12:18:48 -0700296 case RTNLMessage::kTypeRoute:
Chris Masone2aa97072011-08-09 17:35:08 -0700297 DispatchEvent(kRequestRoute, msg);
298 break;
299 default:
300 NOTIMPLEMENTED() << "Unknown RTNL message type.";
301 }
302 }
Paul Stewarta3c56f92011-05-26 07:08:52 -0700303 buf += hdr->nlmsg_len;
304 }
305}
306
Paul Stewart9a908082011-08-31 12:18:48 -0700307bool RTNLHandler::AddressRequest(int interface_index,
308 RTNLMessage::Mode mode,
309 int flags,
310 const IPAddress &local,
Paul Stewart1062d9d2012-04-27 10:42:27 -0700311 const IPAddress &broadcast,
Paul Stewart48100b02012-03-19 07:53:52 -0700312 const IPAddress &peer) {
Paul Stewart1062d9d2012-04-27 10:42:27 -0700313 CHECK(local.family() == broadcast.family());
Paul Stewart48100b02012-03-19 07:53:52 -0700314 CHECK(local.family() == peer.family());
Paul Stewartc39f1132011-06-22 12:02:28 -0700315
Paul Stewart9a908082011-08-31 12:18:48 -0700316 RTNLMessage msg(
317 RTNLMessage::kTypeAddress,
318 mode,
319 NLM_F_REQUEST | flags,
320 0,
321 0,
322 interface_index,
323 local.family());
Paul Stewartc39f1132011-06-22 12:02:28 -0700324
Paul Stewart9a908082011-08-31 12:18:48 -0700325 msg.set_address_status(RTNLMessage::AddressStatus(
326 local.prefix(),
327 0,
328 0));
Paul Stewartc39f1132011-06-22 12:02:28 -0700329
Paul Stewart9a908082011-08-31 12:18:48 -0700330 msg.SetAttribute(IFA_LOCAL, local.address());
Paul Stewart1062d9d2012-04-27 10:42:27 -0700331 if (!broadcast.IsDefault()) {
332 msg.SetAttribute(IFA_BROADCAST, broadcast.address());
Paul Stewartc39f1132011-06-22 12:02:28 -0700333 }
Paul Stewart48100b02012-03-19 07:53:52 -0700334 if (!peer.IsDefault()) {
335 msg.SetAttribute(IFA_ADDRESS, peer.address());
336 }
Paul Stewartc39f1132011-06-22 12:02:28 -0700337
Paul Stewart9a908082011-08-31 12:18:48 -0700338 return SendMessage(&msg);
Paul Stewartc39f1132011-06-22 12:02:28 -0700339}
340
341bool RTNLHandler::AddInterfaceAddress(int interface_index,
Paul Stewart9a908082011-08-31 12:18:48 -0700342 const IPAddress &local,
Paul Stewart48100b02012-03-19 07:53:52 -0700343 const IPAddress &broadcast,
344 const IPAddress &peer) {
Paul Stewart9a908082011-08-31 12:18:48 -0700345 return AddressRequest(interface_index,
346 RTNLMessage::kModeAdd,
Paul Stewart8c116a92012-05-02 18:30:03 -0700347 NLM_F_CREATE | NLM_F_EXCL | NLM_F_ECHO,
Paul Stewart9a908082011-08-31 12:18:48 -0700348 local,
Paul Stewart48100b02012-03-19 07:53:52 -0700349 broadcast,
350 peer);
Paul Stewartc39f1132011-06-22 12:02:28 -0700351}
352
353bool RTNLHandler::RemoveInterfaceAddress(int interface_index,
Paul Stewart9a908082011-08-31 12:18:48 -0700354 const IPAddress &local) {
355 return AddressRequest(interface_index,
356 RTNLMessage::kModeDelete,
Paul Stewart8c116a92012-05-02 18:30:03 -0700357 NLM_F_ECHO,
Paul Stewart9a908082011-08-31 12:18:48 -0700358 local,
Paul Stewart48100b02012-03-19 07:53:52 -0700359 IPAddress(local.family()),
Paul Stewart9a908082011-08-31 12:18:48 -0700360 IPAddress(local.family()));
Paul Stewartc39f1132011-06-22 12:02:28 -0700361}
362
Paul Stewartcba0f7f2012-02-29 16:33:05 -0800363bool RTNLHandler::RemoveInterface(int interface_index) {
364 RTNLMessage msg(
365 RTNLMessage::kTypeLink,
366 RTNLMessage::kModeDelete,
367 NLM_F_REQUEST,
368 0,
369 0,
370 interface_index,
371 IPAddress::kFamilyUnknown);
372 return SendMessage(&msg);
373}
374
Darin Petkove0a312e2011-07-20 13:45:28 -0700375int RTNLHandler::GetInterfaceIndex(const string &interface_name) {
376 if (interface_name.empty()) {
377 LOG(ERROR) << "Empty interface name -- unable to obtain index.";
378 return -1;
379 }
380 struct ifreq ifr;
381 if (interface_name.size() >= sizeof(ifr.ifr_name)) {
382 LOG(ERROR) << "Interface name too long: " << interface_name.size() << " >= "
383 << sizeof(ifr.ifr_name);
384 return -1;
385 }
386 int socket = sockets_->Socket(PF_INET, SOCK_DGRAM, 0);
387 if (socket < 0) {
388 PLOG(ERROR) << "Unable to open INET socket";
389 return -1;
390 }
391 ScopedSocketCloser socket_closer(sockets_, socket);
392 memset(&ifr, 0, sizeof(ifr));
393 strncpy(ifr.ifr_name, interface_name.c_str(), sizeof(ifr.ifr_name));
394 if (sockets_->Ioctl(socket, SIOCGIFINDEX, &ifr) < 0) {
395 PLOG(ERROR) << "SIOCGIFINDEX error for " << interface_name;
396 return -1;
397 }
398 return ifr.ifr_ifindex;
399}
400
Paul Stewart75e89d22011-08-01 10:00:02 -0700401bool RTNLHandler::SendMessage(RTNLMessage *message) {
Paul Stewart44f08cb2012-04-27 16:53:05 -0700402 message->set_seq(request_sequence_);
Paul Stewart75e89d22011-08-01 10:00:02 -0700403 ByteString msgdata = message->Encode();
404
405 if (msgdata.GetLength() == 0) {
406 return false;
407 }
408
Paul Stewart44f08cb2012-04-27 16:53:05 -0700409 SLOG(RTNL, 5) << "RTNL sending payload with request sequence "
410 << request_sequence_ << ", length " << msgdata.GetLength()
411 << ": \"" << msgdata.HexEncode() << "\"";
412
413 request_sequence_++;
414
Paul Stewart75e89d22011-08-01 10:00:02 -0700415 if (sockets_->Send(rtnl_socket_,
Paul Stewart9a908082011-08-31 12:18:48 -0700416 msgdata.GetConstData(),
Paul Stewart75e89d22011-08-01 10:00:02 -0700417 msgdata.GetLength(),
418 0) < 0) {
419 PLOG(ERROR) << "RTNL send failed: " << strerror(errno);
420 return false;
421 }
422
423 return true;
424}
425
Paul Stewart5f06a0e2012-12-20 11:11:33 -0800426void RTNLHandler::OnReadError(const Error &error) {
427 LOG(FATAL) << "RTNL Socket read returns error: "
428 << error.message();
429}
430
Paul Stewarta3c56f92011-05-26 07:08:52 -0700431} // namespace shill