]> git.proxmox.com Git - mirror_iproute2.git/blob - ip/ipnetconf.c
Merge branch 'master' into net-next-for-3.13
[mirror_iproute2.git] / ip / ipnetconf.c
1 /*
2 * ipnetconf.c "ip netconf".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Nicolas Dichtel, <nicolas.dichtel@6wind.com>
10 *
11 */
12
13 #include <stdio.h>
14 #include <stdlib.h>
15 #include <unistd.h>
16 #include <syslog.h>
17 #include <fcntl.h>
18 #include <string.h>
19 #include <sys/time.h>
20 #include <sys/socket.h>
21 #include <netinet/in.h>
22
23 #include "rt_names.h"
24 #include "utils.h"
25 #include "ip_common.h"
26
27 static struct
28 {
29 int family;
30 int ifindex;
31 } filter;
32
33 static void usage(void) __attribute__((noreturn));
34
35 static void usage(void)
36 {
37 fprintf(stderr, "Usage: ip netconf show [ dev STRING ]\n");
38 exit(-1);
39 }
40
41 #define NETCONF_RTA(r) ((struct rtattr*)(((char*)(r)) + NLMSG_ALIGN(sizeof(struct netconfmsg))))
42
43 int print_netconf(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg)
44 {
45 FILE *fp = (FILE*)arg;
46 struct netconfmsg *ncm = NLMSG_DATA(n);
47 int len = n->nlmsg_len;
48 struct rtattr *tb[NETCONFA_MAX+1];
49
50 if (n->nlmsg_type == NLMSG_ERROR)
51 return -1;
52 if (n->nlmsg_type != RTM_NEWNETCONF) {
53 fprintf(stderr, "Not RTM_NEWNETCONF: %08x %08x %08x\n",
54 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
55
56 return -1;
57 }
58 len -= NLMSG_SPACE(sizeof(*ncm));
59 if (len < 0) {
60 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
61 return -1;
62 }
63
64 if (filter.family && filter.family != ncm->ncm_family)
65 return 0;
66
67 parse_rtattr(tb, NETCONFA_MAX, NETCONF_RTA(ncm),
68 NLMSG_PAYLOAD(n, sizeof(*ncm)));
69
70 switch (ncm->ncm_family) {
71 case AF_INET:
72 fprintf(fp, "ipv4 ");
73 break;
74 case AF_INET6:
75 fprintf(fp, "ipv6 ");
76 break;
77 default:
78 fprintf(fp, "unknown ");
79 break;
80 }
81
82 if (tb[NETCONFA_IFINDEX]) {
83 int *ifindex = (int *)RTA_DATA(tb[NETCONFA_IFINDEX]);
84
85 switch (*ifindex) {
86 case NETCONFA_IFINDEX_ALL:
87 fprintf(fp, "all ");
88 break;
89 case NETCONFA_IFINDEX_DEFAULT:
90 fprintf(fp, "default ");
91 break;
92 default:
93 fprintf(fp, "dev %s ", ll_index_to_name(*ifindex));
94 break;
95 }
96 }
97
98 if (tb[NETCONFA_FORWARDING])
99 fprintf(fp, "forwarding %s ",
100 *(int *)RTA_DATA(tb[NETCONFA_FORWARDING])?"on":"off");
101 if (tb[NETCONFA_RP_FILTER]) {
102 int rp_filter = *(int *)RTA_DATA(tb[NETCONFA_RP_FILTER]);
103
104 if (rp_filter == 0)
105 fprintf(fp, "rp_filter off ");
106 else if (rp_filter == 1)
107 fprintf(fp, "rp_filter strict ");
108 else if (rp_filter == 2)
109 fprintf(fp, "rp_filter loose ");
110 else
111 fprintf(fp, "rp_filter unknown mode ");
112 }
113 if (tb[NETCONFA_MC_FORWARDING])
114 fprintf(fp, "mc_forwarding %d ",
115 *(int *)RTA_DATA(tb[NETCONFA_MC_FORWARDING]));
116
117 if (tb[NETCONFA_PROXY_NEIGH])
118 fprintf(fp, "proxy_neigh %s ",
119 *(int *)RTA_DATA(tb[NETCONFA_PROXY_NEIGH])?"on":"off");
120
121 fprintf(fp, "\n");
122 fflush(fp);
123 return 0;
124 }
125
126 static void ipnetconf_reset_filter(void)
127 {
128 memset(&filter, 0, sizeof(filter));
129 }
130
131 static int do_show(int argc, char **argv)
132 {
133 struct {
134 struct nlmsghdr n;
135 struct netconfmsg ncm;
136 char buf[1024];
137 } req;
138
139 ipnetconf_reset_filter();
140 filter.family = preferred_family;
141 if (filter.family == AF_UNSPEC)
142 filter.family = AF_INET;
143
144 while (argc > 0) {
145 if (strcmp(*argv, "dev") == 0) {
146 NEXT_ARG();
147 filter.ifindex = ll_name_to_index(*argv);
148 if (filter.ifindex <= 0) {
149 fprintf(stderr, "Device \"%s\" does not exist.\n",
150 *argv);
151 return -1;
152 }
153 }
154 argv++; argc--;
155 }
156
157 ll_init_map(&rth);
158 if (filter.ifindex) {
159 memset(&req, 0, sizeof(req));
160 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct netconfmsg));
161 req.n.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
162 req.n.nlmsg_type = RTM_GETNETCONF;
163 req.ncm.ncm_family = filter.family;
164 if (filter.ifindex)
165 addattr_l(&req.n, sizeof(req), NETCONFA_IFINDEX,
166 &filter.ifindex, sizeof(filter.ifindex));
167
168 if (rtnl_send(&rth, &req.n, req.n.nlmsg_len) < 0) {
169 perror("Can not send request");
170 exit(1);
171 }
172 rtnl_listen(&rth, print_netconf, stdout);
173 } else {
174 dump:
175 if (rtnl_wilddump_request(&rth, filter.family, RTM_GETNETCONF) < 0) {
176 perror("Cannot send dump request");
177 exit(1);
178 }
179 if (rtnl_dump_filter(&rth, print_netconf, stdout) < 0) {
180 fprintf(stderr, "Dump terminated\n");
181 exit(1);
182 }
183 if (preferred_family == AF_UNSPEC) {
184 preferred_family = AF_INET6;
185 filter.family = AF_INET6;
186 goto dump;
187 }
188 }
189 return 0;
190 }
191
192 int do_ipnetconf(int argc, char **argv)
193 {
194 if (argc > 0) {
195 if (matches(*argv, "show") == 0 ||
196 matches(*argv, "lst") == 0 ||
197 matches(*argv, "list") == 0)
198 return do_show(argc-1, argv+1);
199 if (matches(*argv, "help") == 0)
200 usage();
201 } else
202 return do_show(0, NULL);
203
204 fprintf(stderr, "Command \"%s\" is unknown, try \"ip netconf help\".\n", *argv);
205 exit(-1);
206 }