214 lines
4.8 KiB
C
214 lines
4.8 KiB
C
/*
|
|
* ipnetconf.c "ip netconf".
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*
|
|
* Authors: Nicolas Dichtel, <nicolas.dichtel@6wind.com>
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <syslog.h>
|
|
#include <fcntl.h>
|
|
#include <string.h>
|
|
#include <sys/time.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
|
|
#include "rt_names.h"
|
|
#include "utils.h"
|
|
#include "ip_common.h"
|
|
|
|
static struct
|
|
{
|
|
int family;
|
|
int ifindex;
|
|
} filter;
|
|
|
|
static void usage(void) __attribute__((noreturn));
|
|
|
|
static void usage(void)
|
|
{
|
|
fprintf(stderr, "Usage: ip netconf show [ dev STRING ]\n");
|
|
exit(-1);
|
|
}
|
|
|
|
#define NETCONF_RTA(r) ((struct rtattr*)(((char*)(r)) + NLMSG_ALIGN(sizeof(struct netconfmsg))))
|
|
|
|
int print_netconf(const struct sockaddr_nl *who, struct rtnl_ctrl_data *ctrl,
|
|
struct nlmsghdr *n, void *arg)
|
|
{
|
|
FILE *fp = (FILE*)arg;
|
|
struct netconfmsg *ncm = NLMSG_DATA(n);
|
|
int len = n->nlmsg_len;
|
|
struct rtattr *tb[NETCONFA_MAX+1];
|
|
|
|
if (n->nlmsg_type == NLMSG_ERROR)
|
|
return -1;
|
|
if (n->nlmsg_type != RTM_NEWNETCONF) {
|
|
fprintf(stderr, "Not RTM_NEWNETCONF: %08x %08x %08x\n",
|
|
n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
|
|
|
|
return -1;
|
|
}
|
|
len -= NLMSG_SPACE(sizeof(*ncm));
|
|
if (len < 0) {
|
|
fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
|
|
return -1;
|
|
}
|
|
|
|
if (filter.family && filter.family != ncm->ncm_family)
|
|
return 0;
|
|
|
|
parse_rtattr(tb, NETCONFA_MAX, NETCONF_RTA(ncm),
|
|
NLMSG_PAYLOAD(n, sizeof(*ncm)));
|
|
|
|
switch (ncm->ncm_family) {
|
|
case AF_INET:
|
|
fprintf(fp, "ipv4 ");
|
|
break;
|
|
case AF_INET6:
|
|
fprintf(fp, "ipv6 ");
|
|
break;
|
|
default:
|
|
fprintf(fp, "unknown ");
|
|
break;
|
|
}
|
|
|
|
if (tb[NETCONFA_IFINDEX]) {
|
|
int *ifindex = (int *)RTA_DATA(tb[NETCONFA_IFINDEX]);
|
|
|
|
switch (*ifindex) {
|
|
case NETCONFA_IFINDEX_ALL:
|
|
fprintf(fp, "all ");
|
|
break;
|
|
case NETCONFA_IFINDEX_DEFAULT:
|
|
fprintf(fp, "default ");
|
|
break;
|
|
default:
|
|
fprintf(fp, "dev %s ", ll_index_to_name(*ifindex));
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (tb[NETCONFA_FORWARDING])
|
|
fprintf(fp, "forwarding %s ",
|
|
*(int *)RTA_DATA(tb[NETCONFA_FORWARDING])?"on":"off");
|
|
if (tb[NETCONFA_RP_FILTER]) {
|
|
int rp_filter = *(int *)RTA_DATA(tb[NETCONFA_RP_FILTER]);
|
|
|
|
if (rp_filter == 0)
|
|
fprintf(fp, "rp_filter off ");
|
|
else if (rp_filter == 1)
|
|
fprintf(fp, "rp_filter strict ");
|
|
else if (rp_filter == 2)
|
|
fprintf(fp, "rp_filter loose ");
|
|
else
|
|
fprintf(fp, "rp_filter unknown mode ");
|
|
}
|
|
if (tb[NETCONFA_MC_FORWARDING])
|
|
fprintf(fp, "mc_forwarding %d ",
|
|
*(int *)RTA_DATA(tb[NETCONFA_MC_FORWARDING]));
|
|
|
|
if (tb[NETCONFA_PROXY_NEIGH])
|
|
fprintf(fp, "proxy_neigh %s ",
|
|
*(int *)RTA_DATA(tb[NETCONFA_PROXY_NEIGH])?"on":"off");
|
|
|
|
fprintf(fp, "\n");
|
|
fflush(fp);
|
|
return 0;
|
|
}
|
|
|
|
static int print_netconf2(const struct sockaddr_nl *who,
|
|
struct nlmsghdr *n, void *arg)
|
|
{
|
|
return print_netconf(who, NULL, n, arg);
|
|
}
|
|
|
|
void ipnetconf_reset_filter(int ifindex)
|
|
{
|
|
memset(&filter, 0, sizeof(filter));
|
|
filter.ifindex = ifindex;
|
|
}
|
|
|
|
static int do_show(int argc, char **argv)
|
|
{
|
|
struct {
|
|
struct nlmsghdr n;
|
|
struct netconfmsg ncm;
|
|
char buf[1024];
|
|
} req;
|
|
|
|
ipnetconf_reset_filter(0);
|
|
filter.family = preferred_family;
|
|
if (filter.family == AF_UNSPEC)
|
|
filter.family = AF_INET;
|
|
|
|
while (argc > 0) {
|
|
if (strcmp(*argv, "dev") == 0) {
|
|
NEXT_ARG();
|
|
filter.ifindex = ll_name_to_index(*argv);
|
|
if (filter.ifindex <= 0) {
|
|
fprintf(stderr, "Device \"%s\" does not exist.\n",
|
|
*argv);
|
|
return -1;
|
|
}
|
|
}
|
|
argv++; argc--;
|
|
}
|
|
|
|
ll_init_map(&rth);
|
|
if (filter.ifindex) {
|
|
memset(&req, 0, sizeof(req));
|
|
req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct netconfmsg));
|
|
req.n.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
|
|
req.n.nlmsg_type = RTM_GETNETCONF;
|
|
req.ncm.ncm_family = filter.family;
|
|
if (filter.ifindex)
|
|
addattr_l(&req.n, sizeof(req), NETCONFA_IFINDEX,
|
|
&filter.ifindex, sizeof(filter.ifindex));
|
|
|
|
if (rtnl_send(&rth, &req.n, req.n.nlmsg_len) < 0) {
|
|
perror("Can not send request");
|
|
exit(1);
|
|
}
|
|
rtnl_listen(&rth, print_netconf, stdout);
|
|
} else {
|
|
dump:
|
|
if (rtnl_wilddump_request(&rth, filter.family, RTM_GETNETCONF) < 0) {
|
|
perror("Cannot send dump request");
|
|
exit(1);
|
|
}
|
|
if (rtnl_dump_filter(&rth, print_netconf2, stdout) < 0) {
|
|
fprintf(stderr, "Dump terminated\n");
|
|
exit(1);
|
|
}
|
|
if (preferred_family == AF_UNSPEC) {
|
|
preferred_family = AF_INET6;
|
|
filter.family = AF_INET6;
|
|
goto dump;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int do_ipnetconf(int argc, char **argv)
|
|
{
|
|
if (argc > 0) {
|
|
if (matches(*argv, "show") == 0 ||
|
|
matches(*argv, "lst") == 0 ||
|
|
matches(*argv, "list") == 0)
|
|
return do_show(argc-1, argv+1);
|
|
if (matches(*argv, "help") == 0)
|
|
usage();
|
|
} else
|
|
return do_show(0, NULL);
|
|
|
|
fprintf(stderr, "Command \"%s\" is unknown, try \"ip netconf help\".\n", *argv);
|
|
exit(-1);
|
|
}
|