1 /* 2 * Copyright (C)2006 USAGI/WIDE Project 3 * 4 * This program is free software; you can redistribute it and/or modify 5 * it under the terms of the GNU General Public License as published by 6 * the Free Software Foundation; either version 2 of the License, or 7 * (at your option) any later version. 8 * 9 * This program is distributed in the hope that it will be useful, 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 * GNU General Public License for more details. 13 * 14 * You should have received a copy of the GNU General Public License 15 * along with this program; if not, write to the Free Software 16 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 17 */ 18 /* 19 * based on ipneigh.c 20 */ 21 /* 22 * Authors: 23 * Masahide NAKAMURA @USAGI 24 */ 25 26 #include <stdio.h> 27 #include <stdlib.h> 28 #include <string.h> 29 #include <sys/time.h> 30 #include <time.h> 31 32 #include "utils.h" 33 #include "ip_common.h" 34 35 static struct 36 { 37 int family; 38 int index; 39 #define NONE_DEV (-1) 40 char name[1024]; 41 } filter; 42 43 static void usage(void) __attribute__((noreturn)); 44 45 static void usage(void) 46 { 47 fprintf(stderr, 48 "Usage: ip ntable change name NAME [ dev DEV ]\n" 49 " [ thresh1 VAL ] [ thresh2 VAL ] [ thresh3 VAL ] [ gc_int MSEC ]\n" 50 " [ PARMS ]\n" 51 "Usage: ip ntable show [ dev DEV ] [ name NAME ]\n" 52 53 "PARMS := [ base_reachable MSEC ] [ retrans MSEC ] [ gc_stale MSEC ]\n" 54 " [ delay_probe MSEC ] [ queue LEN ]\n" 55 " [ app_probs VAL ] [ ucast_probes VAL ] [ mcast_probes VAL ]\n" 56 " [ anycast_delay MSEC ] [ proxy_delay MSEC ] [ proxy_queue LEN ]\n" 57 " [ locktime MSEC ]\n" 58 ); 59 60 exit(-1); 61 } 62 63 static int ipntable_modify(int cmd, int flags, int argc, char **argv) 64 { 65 struct { 66 struct nlmsghdr n; 67 struct ndtmsg ndtm; 68 char buf[1024]; 69 } req; 70 char *namep = NULL; 71 char *threshsp = NULL; 72 char *gc_intp = NULL; 73 char parms_buf[1024]; 74 struct rtattr *parms_rta = (struct rtattr *)parms_buf; 75 int parms_change = 0; 76 77 memset(&req, 0, sizeof(req)); 78 79 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndtmsg)); 80 req.n.nlmsg_flags = NLM_F_REQUEST|flags; 81 req.n.nlmsg_type = cmd; 82 83 req.ndtm.ndtm_family = preferred_family; 84 req.ndtm.ndtm_pad1 = 0; 85 req.ndtm.ndtm_pad2 = 0; 86 87 memset(&parms_buf, 0, sizeof(parms_buf)); 88 89 parms_rta->rta_type = NDTA_PARMS; 90 parms_rta->rta_len = RTA_LENGTH(0); 91 92 while (argc > 0) { 93 if (strcmp(*argv, "name") == 0) { 94 int len; 95 96 NEXT_ARG(); 97 if (namep) 98 duparg("NAME", *argv); 99 100 namep = *argv; 101 len = strlen(namep) + 1; 102 addattr_l(&req.n, sizeof(req), NDTA_NAME, namep, len); 103 } else if (strcmp(*argv, "thresh1") == 0) { 104 __u32 thresh1; 105 106 NEXT_ARG(); 107 threshsp = *argv; 108 109 if (get_u32(&thresh1, *argv, 0)) 110 invarg("\"thresh1\" value is invalid", *argv); 111 112 addattr32(&req.n, sizeof(req), NDTA_THRESH1, thresh1); 113 } else if (strcmp(*argv, "thresh2") == 0) { 114 __u32 thresh2; 115 116 NEXT_ARG(); 117 threshsp = *argv; 118 119 if (get_u32(&thresh2, *argv, 0)) 120 invarg("\"thresh2\" value is invalid", *argv); 121 122 addattr32(&req.n, sizeof(req), NDTA_THRESH2, thresh2); 123 } else if (strcmp(*argv, "thresh3") == 0) { 124 __u32 thresh3; 125 126 NEXT_ARG(); 127 threshsp = *argv; 128 129 if (get_u32(&thresh3, *argv, 0)) 130 invarg("\"thresh3\" value is invalid", *argv); 131 132 addattr32(&req.n, sizeof(req), NDTA_THRESH3, thresh3); 133 } else if (strcmp(*argv, "gc_int") == 0) { 134 __u64 gc_int; 135 136 NEXT_ARG(); 137 gc_intp = *argv; 138 139 if (get_u64(&gc_int, *argv, 0)) 140 invarg("\"gc_int\" value is invalid", *argv); 141 142 addattr_l(&req.n, sizeof(req), NDTA_GC_INTERVAL, 143 &gc_int, sizeof(gc_int)); 144 } else if (strcmp(*argv, "dev") == 0) { 145 __u32 ifindex; 146 147 NEXT_ARG(); 148 ifindex = ll_name_to_index(*argv); 149 if (ifindex == 0) { 150 fprintf(stderr, "Cannot find device \"%s\"\n", *argv); 151 return -1; 152 } 153 154 rta_addattr32(parms_rta, sizeof(parms_buf), 155 NDTPA_IFINDEX, ifindex); 156 } else if (strcmp(*argv, "base_reachable") == 0) { 157 __u64 breachable; 158 159 NEXT_ARG(); 160 161 if (get_u64(&breachable, *argv, 0)) 162 invarg("\"base_reachable\" value is invalid", *argv); 163 164 rta_addattr_l(parms_rta, sizeof(parms_buf), 165 NDTPA_BASE_REACHABLE_TIME, 166 &breachable, sizeof(breachable)); 167 parms_change = 1; 168 } else if (strcmp(*argv, "retrans") == 0) { 169 __u64 retrans; 170 171 NEXT_ARG(); 172 173 if (get_u64(&retrans, *argv, 0)) 174 invarg("\"retrans\" value is invalid", *argv); 175 176 rta_addattr_l(parms_rta, sizeof(parms_buf), 177 NDTPA_RETRANS_TIME, 178 &retrans, sizeof(retrans)); 179 parms_change = 1; 180 } else if (strcmp(*argv, "gc_stale") == 0) { 181 __u64 gc_stale; 182 183 NEXT_ARG(); 184 185 if (get_u64(&gc_stale, *argv, 0)) 186 invarg("\"gc_stale\" value is invalid", *argv); 187 188 rta_addattr_l(parms_rta, sizeof(parms_buf), 189 NDTPA_GC_STALETIME, 190 &gc_stale, sizeof(gc_stale)); 191 parms_change = 1; 192 } else if (strcmp(*argv, "delay_probe") == 0) { 193 __u64 delay_probe; 194 195 NEXT_ARG(); 196 197 if (get_u64(&delay_probe, *argv, 0)) 198 invarg("\"delay_probe\" value is invalid", *argv); 199 200 rta_addattr_l(parms_rta, sizeof(parms_buf), 201 NDTPA_DELAY_PROBE_TIME, 202 &delay_probe, sizeof(delay_probe)); 203 parms_change = 1; 204 } else if (strcmp(*argv, "queue") == 0) { 205 __u32 queue; 206 207 NEXT_ARG(); 208 209 if (get_u32(&queue, *argv, 0)) 210 invarg("\"queue\" value is invalid", *argv); 211 212 if (!parms_rta) 213 parms_rta = (struct rtattr *)&parms_buf; 214 rta_addattr32(parms_rta, sizeof(parms_buf), 215 NDTPA_QUEUE_LEN, queue); 216 parms_change = 1; 217 } else if (strcmp(*argv, "app_probes") == 0) { 218 __u32 aprobe; 219 220 NEXT_ARG(); 221 222 if (get_u32(&aprobe, *argv, 0)) 223 invarg("\"app_probes\" value is invalid", *argv); 224 225 rta_addattr32(parms_rta, sizeof(parms_buf), 226 NDTPA_APP_PROBES, aprobe); 227 parms_change = 1; 228 } else if (strcmp(*argv, "ucast_probes") == 0) { 229 __u32 uprobe; 230 231 NEXT_ARG(); 232 233 if (get_u32(&uprobe, *argv, 0)) 234 invarg("\"ucast_probes\" value is invalid", *argv); 235 236 rta_addattr32(parms_rta, sizeof(parms_buf), 237 NDTPA_UCAST_PROBES, uprobe); 238 parms_change = 1; 239 } else if (strcmp(*argv, "mcast_probes") == 0) { 240 __u32 mprobe; 241 242 NEXT_ARG(); 243 244 if (get_u32(&mprobe, *argv, 0)) 245 invarg("\"mcast_probes\" value is invalid", *argv); 246 247 rta_addattr32(parms_rta, sizeof(parms_buf), 248 NDTPA_MCAST_PROBES, mprobe); 249 parms_change = 1; 250 } else if (strcmp(*argv, "anycast_delay") == 0) { 251 __u64 anycast_delay; 252 253 NEXT_ARG(); 254 255 if (get_u64(&anycast_delay, *argv, 0)) 256 invarg("\"anycast_delay\" value is invalid", *argv); 257 258 rta_addattr_l(parms_rta, sizeof(parms_buf), 259 NDTPA_ANYCAST_DELAY, 260 &anycast_delay, sizeof(anycast_delay)); 261 parms_change = 1; 262 } else if (strcmp(*argv, "proxy_delay") == 0) { 263 __u64 proxy_delay; 264 265 NEXT_ARG(); 266 267 if (get_u64(&proxy_delay, *argv, 0)) 268 invarg("\"proxy_delay\" value is invalid", *argv); 269 270 rta_addattr_l(parms_rta, sizeof(parms_buf), 271 NDTPA_PROXY_DELAY, 272 &proxy_delay, sizeof(proxy_delay)); 273 parms_change = 1; 274 } else if (strcmp(*argv, "proxy_queue") == 0) { 275 __u32 pqueue; 276 277 NEXT_ARG(); 278 279 if (get_u32(&pqueue, *argv, 0)) 280 invarg("\"proxy_queue\" value is invalid", *argv); 281 282 rta_addattr32(parms_rta, sizeof(parms_buf), 283 NDTPA_PROXY_QLEN, pqueue); 284 parms_change = 1; 285 } else if (strcmp(*argv, "locktime") == 0) { 286 __u64 locktime; 287 288 NEXT_ARG(); 289 290 if (get_u64(&locktime, *argv, 0)) 291 invarg("\"locktime\" value is invalid", *argv); 292 293 rta_addattr_l(parms_rta, sizeof(parms_buf), 294 NDTPA_LOCKTIME, 295 &locktime, sizeof(locktime)); 296 parms_change = 1; 297 } else { 298 invarg("unknown", *argv); 299 } 300 301 argc--; argv++; 302 } 303 304 if (!namep) 305 missarg("NAME"); 306 if (!threshsp && !gc_intp && !parms_change) { 307 fprintf(stderr, "Not enough information: changable attributes required.\n"); 308 exit(-1); 309 } 310 311 if (parms_rta->rta_len > RTA_LENGTH(0)) { 312 addattr_l(&req.n, sizeof(req), NDTA_PARMS, RTA_DATA(parms_rta), 313 RTA_PAYLOAD(parms_rta)); 314 } 315 316 if (rtnl_talk(&rth, &req.n, 0, 0, NULL) < 0) 317 exit(2); 318 319 return 0; 320 } 321 322 static const char *ntable_strtime_delta(__u32 msec) 323 { 324 static char str[32]; 325 struct timeval now; 326 time_t t; 327 struct tm *tp; 328 329 if (msec == 0) 330 goto error; 331 332 memset(&now, 0, sizeof(now)); 333 334 if (gettimeofday(&now, NULL) < 0) { 335 perror("gettimeofday"); 336 goto error; 337 } 338 339 t = now.tv_sec - (msec / 1000); 340 tp = localtime(&t); 341 if (!tp) 342 goto error; 343 344 strftime(str, sizeof(str), "%Y-%m-%d %T", tp); 345 346 return str; 347 error: 348 strcpy(str, "(error)"); 349 return str; 350 } 351 352 int print_ntable(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg) 353 { 354 FILE *fp = (FILE*)arg; 355 struct ndtmsg *ndtm = NLMSG_DATA(n); 356 int len = n->nlmsg_len; 357 struct rtattr *tb[NDTA_MAX+1]; 358 struct rtattr *tpb[NDTPA_MAX+1]; 359 int ret; 360 361 if (n->nlmsg_type != RTM_NEWNEIGHTBL) { 362 fprintf(stderr, "Not NEIGHTBL: %08x %08x %08x\n", 363 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags); 364 return 0; 365 } 366 len -= NLMSG_LENGTH(sizeof(*ndtm)); 367 if (len < 0) { 368 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len); 369 return -1; 370 } 371 372 if (preferred_family && preferred_family != ndtm->ndtm_family) 373 return 0; 374 375 parse_rtattr(tb, NDTA_MAX, NDTA_RTA(ndtm), 376 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ndtm))); 377 378 if (tb[NDTA_NAME]) { 379 const char *name = rta_getattr_str(tb[NDTA_NAME]); 380 381 if (strlen(filter.name) > 0 && strcmp(filter.name, name)) 382 return 0; 383 } 384 if (tb[NDTA_PARMS]) { 385 parse_rtattr(tpb, NDTPA_MAX, RTA_DATA(tb[NDTA_PARMS]), 386 RTA_PAYLOAD(tb[NDTA_PARMS])); 387 388 if (tpb[NDTPA_IFINDEX]) { 389 __u32 ifindex = rta_getattr_u32(tpb[NDTPA_IFINDEX]); 390 391 if (filter.index && filter.index != ifindex) 392 return 0; 393 } else { 394 if (filter.index && filter.index != NONE_DEV) 395 return 0; 396 } 397 } 398 399 if (ndtm->ndtm_family == AF_INET) 400 fprintf(fp, "inet "); 401 else if (ndtm->ndtm_family == AF_INET6) 402 fprintf(fp, "inet6 "); 403 else if (ndtm->ndtm_family == AF_DECnet) 404 fprintf(fp, "dnet "); 405 else 406 fprintf(fp, "(%d) ", ndtm->ndtm_family); 407 408 if (tb[NDTA_NAME]) { 409 const char *name = rta_getattr_str(tb[NDTA_NAME]); 410 fprintf(fp, "%s ", name); 411 } 412 413 fprintf(fp, "%s", _SL_); 414 415 ret = (tb[NDTA_THRESH1] || tb[NDTA_THRESH2] || tb[NDTA_THRESH3] || 416 tb[NDTA_GC_INTERVAL]); 417 if (ret) 418 fprintf(fp, " "); 419 420 if (tb[NDTA_THRESH1]) { 421 __u32 thresh1 = rta_getattr_u32(tb[NDTA_THRESH1]); 422 fprintf(fp, "thresh1 %u ", thresh1); 423 } 424 if (tb[NDTA_THRESH2]) { 425 __u32 thresh2 = rta_getattr_u32(tb[NDTA_THRESH2]); 426 fprintf(fp, "thresh2 %u ", thresh2); 427 } 428 if (tb[NDTA_THRESH3]) { 429 __u32 thresh3 = rta_getattr_u32(tb[NDTA_THRESH3]); 430 fprintf(fp, "thresh3 %u ", thresh3); 431 } 432 if (tb[NDTA_GC_INTERVAL]) { 433 __u64 gc_int = rta_getattr_u64(tb[NDTA_GC_INTERVAL]); 434 fprintf(fp, "gc_int %llu ", gc_int); 435 } 436 437 if (ret) 438 fprintf(fp, "%s", _SL_); 439 440 if (tb[NDTA_CONFIG] && show_stats) { 441 struct ndt_config *ndtc = RTA_DATA(tb[NDTA_CONFIG]); 442 443 fprintf(fp, " "); 444 fprintf(fp, "config "); 445 446 fprintf(fp, "key_len %u ", ndtc->ndtc_key_len); 447 fprintf(fp, "entry_size %u ", ndtc->ndtc_entry_size); 448 fprintf(fp, "entries %u ", ndtc->ndtc_entries); 449 450 fprintf(fp, "%s", _SL_); 451 fprintf(fp, " "); 452 453 fprintf(fp, "last_flush %s ", 454 ntable_strtime_delta(ndtc->ndtc_last_flush)); 455 fprintf(fp, "last_rand %s ", 456 ntable_strtime_delta(ndtc->ndtc_last_rand)); 457 458 fprintf(fp, "%s", _SL_); 459 fprintf(fp, " "); 460 461 fprintf(fp, "hash_rnd %u ", ndtc->ndtc_hash_rnd); 462 fprintf(fp, "hash_mask %08x ", ndtc->ndtc_hash_mask); 463 464 fprintf(fp, "hash_chain_gc %u ", ndtc->ndtc_hash_chain_gc); 465 fprintf(fp, "proxy_qlen %u ", ndtc->ndtc_proxy_qlen); 466 467 fprintf(fp, "%s", _SL_); 468 } 469 470 if (tb[NDTA_PARMS]) { 471 if (tpb[NDTPA_IFINDEX]) { 472 __u32 ifindex = rta_getattr_u32(tpb[NDTPA_IFINDEX]); 473 474 fprintf(fp, " "); 475 fprintf(fp, "dev %s ", ll_index_to_name(ifindex)); 476 fprintf(fp, "%s", _SL_); 477 } 478 479 fprintf(fp, " "); 480 481 if (tpb[NDTPA_REFCNT]) { 482 __u32 refcnt = rta_getattr_u32(tpb[NDTPA_REFCNT]); 483 fprintf(fp, "refcnt %u ", refcnt); 484 } 485 if (tpb[NDTPA_REACHABLE_TIME]) { 486 __u64 reachable = rta_getattr_u64(tpb[NDTPA_REACHABLE_TIME]); 487 fprintf(fp, "reachable %llu ", reachable); 488 } 489 if (tpb[NDTPA_BASE_REACHABLE_TIME]) { 490 __u64 breachable = rta_getattr_u64(tpb[NDTPA_BASE_REACHABLE_TIME]); 491 fprintf(fp, "base_reachable %llu ", breachable); 492 } 493 if (tpb[NDTPA_RETRANS_TIME]) { 494 __u64 retrans = rta_getattr_u64(tpb[NDTPA_RETRANS_TIME]); 495 fprintf(fp, "retrans %llu ", retrans); 496 } 497 498 fprintf(fp, "%s", _SL_); 499 500 fprintf(fp, " "); 501 502 if (tpb[NDTPA_GC_STALETIME]) { 503 __u64 gc_stale = rta_getattr_u64(tpb[NDTPA_GC_STALETIME]); 504 fprintf(fp, "gc_stale %llu ", gc_stale); 505 } 506 if (tpb[NDTPA_DELAY_PROBE_TIME]) { 507 __u64 delay_probe = rta_getattr_u64(tpb[NDTPA_DELAY_PROBE_TIME]); 508 fprintf(fp, "delay_probe %llu ", delay_probe); 509 } 510 if (tpb[NDTPA_QUEUE_LEN]) { 511 __u32 queue = rta_getattr_u32(tpb[NDTPA_QUEUE_LEN]); 512 fprintf(fp, "queue %u ", queue); 513 } 514 515 fprintf(fp, "%s", _SL_); 516 517 fprintf(fp, " "); 518 519 if (tpb[NDTPA_APP_PROBES]) { 520 __u32 aprobe = rta_getattr_u32(tpb[NDTPA_APP_PROBES]); 521 fprintf(fp, "app_probes %u ", aprobe); 522 } 523 if (tpb[NDTPA_UCAST_PROBES]) { 524 __u32 uprobe = rta_getattr_u32(tpb[NDTPA_UCAST_PROBES]); 525 fprintf(fp, "ucast_probes %u ", uprobe); 526 } 527 if (tpb[NDTPA_MCAST_PROBES]) { 528 __u32 mprobe = rta_getattr_u32(tpb[NDTPA_MCAST_PROBES]); 529 fprintf(fp, "mcast_probes %u ", mprobe); 530 } 531 532 fprintf(fp, "%s", _SL_); 533 534 fprintf(fp, " "); 535 536 if (tpb[NDTPA_ANYCAST_DELAY]) { 537 __u64 anycast_delay = rta_getattr_u64(tpb[NDTPA_ANYCAST_DELAY]); 538 fprintf(fp, "anycast_delay %llu ", anycast_delay); 539 } 540 if (tpb[NDTPA_PROXY_DELAY]) { 541 __u64 proxy_delay = rta_getattr_u64(tpb[NDTPA_PROXY_DELAY]); 542 fprintf(fp, "proxy_delay %llu ", proxy_delay); 543 } 544 if (tpb[NDTPA_PROXY_QLEN]) { 545 __u32 pqueue = rta_getattr_u32(tpb[NDTPA_PROXY_QLEN]); 546 fprintf(fp, "proxy_queue %u ", pqueue); 547 } 548 if (tpb[NDTPA_LOCKTIME]) { 549 __u64 locktime = rta_getattr_u64(tpb[NDTPA_LOCKTIME]); 550 fprintf(fp, "locktime %llu ", locktime); 551 } 552 553 fprintf(fp, "%s", _SL_); 554 } 555 556 if (tb[NDTA_STATS] && show_stats) { 557 struct ndt_stats *ndts = RTA_DATA(tb[NDTA_STATS]); 558 559 fprintf(fp, " "); 560 fprintf(fp, "stats "); 561 562 fprintf(fp, "allocs %llu ", ndts->ndts_allocs); 563 fprintf(fp, "destroys %llu ", ndts->ndts_destroys); 564 fprintf(fp, "hash_grows %llu ", ndts->ndts_hash_grows); 565 566 fprintf(fp, "%s", _SL_); 567 fprintf(fp, " "); 568 569 fprintf(fp, "res_failed %llu ", ndts->ndts_res_failed); 570 fprintf(fp, "lookups %llu ", ndts->ndts_lookups); 571 fprintf(fp, "hits %llu ", ndts->ndts_hits); 572 573 fprintf(fp, "%s", _SL_); 574 fprintf(fp, " "); 575 576 fprintf(fp, "rcv_probes_mcast %llu ", ndts->ndts_rcv_probes_mcast); 577 fprintf(fp, "rcv_probes_ucast %llu ", ndts->ndts_rcv_probes_ucast); 578 579 fprintf(fp, "%s", _SL_); 580 fprintf(fp, " "); 581 582 fprintf(fp, "periodic_gc_runs %llu ", ndts->ndts_periodic_gc_runs); 583 fprintf(fp, "forced_gc_runs %llu ", ndts->ndts_forced_gc_runs); 584 585 fprintf(fp, "%s", _SL_); 586 } 587 588 fprintf(fp, "\n"); 589 590 fflush(fp); 591 return 0; 592 } 593 594 void ipntable_reset_filter(void) 595 { 596 memset(&filter, 0, sizeof(filter)); 597 } 598 599 static int ipntable_show(int argc, char **argv) 600 { 601 ipntable_reset_filter(); 602 603 filter.family = preferred_family; 604 605 while (argc > 0) { 606 if (strcmp(*argv, "dev") == 0) { 607 NEXT_ARG(); 608 609 if (strcmp("none", *argv) == 0) 610 filter.index = NONE_DEV; 611 else if ((filter.index = ll_name_to_index(*argv)) == 0) 612 invarg("\"DEV\" is invalid", *argv); 613 } else if (strcmp(*argv, "name") == 0) { 614 NEXT_ARG(); 615 616 strncpy(filter.name, *argv, sizeof(filter.name)); 617 } else 618 invarg("unknown", *argv); 619 620 argc--; argv++; 621 } 622 623 if (rtnl_wilddump_request(&rth, preferred_family, RTM_GETNEIGHTBL) < 0) { 624 perror("Cannot send dump request"); 625 exit(1); 626 } 627 628 if (rtnl_dump_filter(&rth, print_ntable, stdout) < 0) { 629 fprintf(stderr, "Dump terminated\n"); 630 exit(1); 631 } 632 633 return 0; 634 } 635 636 int do_ipntable(int argc, char **argv) 637 { 638 ll_init_map(&rth); 639 640 if (argc > 0) { 641 if (matches(*argv, "change") == 0 || 642 matches(*argv, "chg") == 0) 643 return ipntable_modify(RTM_SETNEIGHTBL, 644 NLM_F_REPLACE, 645 argc-1, argv+1); 646 if (matches(*argv, "show") == 0 || 647 matches(*argv, "lst") == 0 || 648 matches(*argv, "list") == 0) 649 return ipntable_show(argc-1, argv+1); 650 if (matches(*argv, "help") == 0) 651 usage(); 652 } else 653 return ipntable_show(0, NULL); 654 655 fprintf(stderr, "Command \"%s\" is unknown, try \"ip ntable help\".\n", *argv); 656 exit(-1); 657 } 658