1
2
3
4
5
6
7
8
9
10
11
12
13#include <stdio.h>
14#include <stdlib.h>
15#include <unistd.h>
16#include <fcntl.h>
17#include <string.h>
18#include <sys/time.h>
19#include <sys/socket.h>
20#include <netinet/in.h>
21#include <errno.h>
22
23#include "rt_names.h"
24#include "utils.h"
25#include "ip_common.h"
26
27static struct {
28 int family;
29 int ifindex;
30} filter;
31
32static const char * const rp_filter_names[] = {
33 "off", "strict", "loose"
34};
35
36static void usage(void) __attribute__((noreturn));
37
38static void usage(void)
39{
40 fprintf(stderr, "Usage: ip netconf show [ dev STRING ]\n");
41 exit(-1);
42}
43
44static void print_onoff(FILE *fp, const char *flag, __u32 val)
45{
46 if (is_json_context())
47 print_bool(PRINT_JSON, flag, NULL, val);
48 else
49 fprintf(fp, "%s %s ", flag, val ? "on" : "off");
50}
51
52static struct rtattr *netconf_rta(struct netconfmsg *ncm)
53{
54 return (struct rtattr *)((char *)ncm
55 + NLMSG_ALIGN(sizeof(struct netconfmsg)));
56}
57
58int print_netconf(struct rtnl_ctrl_data *ctrl, struct nlmsghdr *n, void *arg)
59{
60 FILE *fp = (FILE *)arg;
61 struct netconfmsg *ncm = NLMSG_DATA(n);
62 int len = n->nlmsg_len;
63 struct rtattr *tb[NETCONFA_MAX+1];
64 int ifindex = 0;
65
66 if (n->nlmsg_type == NLMSG_ERROR)
67 return -1;
68
69 if (n->nlmsg_type != RTM_NEWNETCONF &&
70 n->nlmsg_type != RTM_DELNETCONF) {
71 fprintf(stderr, "Not a netconf message: %08x %08x %08x\n",
72 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
73
74 return -1;
75 }
76 len -= NLMSG_SPACE(sizeof(*ncm));
77 if (len < 0) {
78 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
79 return -1;
80 }
81
82 if (filter.family && filter.family != ncm->ncm_family)
83 return 0;
84
85 parse_rtattr(tb, NETCONFA_MAX, netconf_rta(ncm),
86 NLMSG_PAYLOAD(n, sizeof(*ncm)));
87
88 if (tb[NETCONFA_IFINDEX])
89 ifindex = rta_getattr_u32(tb[NETCONFA_IFINDEX]);
90
91 if (filter.ifindex && filter.ifindex != ifindex)
92 return 0;
93
94 open_json_object(NULL);
95 if (n->nlmsg_type == RTM_DELNETCONF)
96 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
97
98 print_string(PRINT_ANY, "family",
99 "%s ", family_name(ncm->ncm_family));
100
101 if (tb[NETCONFA_IFINDEX]) {
102 const char *dev;
103
104 switch (ifindex) {
105 case NETCONFA_IFINDEX_ALL:
106 dev = "all";
107 break;
108 case NETCONFA_IFINDEX_DEFAULT:
109 dev = "default";
110 break;
111 default:
112 dev = ll_index_to_name(ifindex);
113 break;
114 }
115 print_color_string(PRINT_ANY, COLOR_IFNAME,
116 "interface", "%s ", dev);
117 }
118
119 if (tb[NETCONFA_FORWARDING])
120 print_onoff(fp, "forwarding",
121 rta_getattr_u32(tb[NETCONFA_FORWARDING]));
122
123 if (tb[NETCONFA_RP_FILTER]) {
124 __u32 rp_filter = rta_getattr_u32(tb[NETCONFA_RP_FILTER]);
125
126 if (rp_filter < ARRAY_SIZE(rp_filter_names))
127 print_string(PRINT_ANY, "rp_filter",
128 "rp_filter %s ",
129 rp_filter_names[rp_filter]);
130 else
131 print_uint(PRINT_ANY, "rp_filter",
132 "rp_filter %u ", rp_filter);
133 }
134
135 if (tb[NETCONFA_MC_FORWARDING])
136 print_onoff(fp, "mc_forwarding",
137 rta_getattr_u32(tb[NETCONFA_MC_FORWARDING]));
138
139 if (tb[NETCONFA_PROXY_NEIGH])
140 print_onoff(fp, "proxy_neigh",
141 rta_getattr_u32(tb[NETCONFA_PROXY_NEIGH]));
142
143 if (tb[NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN])
144 print_onoff(fp, "ignore_routes_with_linkdown",
145 rta_getattr_u32(tb[NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN]));
146
147 if (tb[NETCONFA_INPUT])
148 print_onoff(fp, "input", rta_getattr_u32(tb[NETCONFA_INPUT]));
149
150 close_json_object();
151 print_string(PRINT_FP, NULL, "\n", NULL);
152 fflush(fp);
153 return 0;
154}
155
156static int print_netconf2(struct nlmsghdr *n, void *arg)
157{
158 return print_netconf(NULL, n, arg);
159}
160
161void ipnetconf_reset_filter(int ifindex)
162{
163 memset(&filter, 0, sizeof(filter));
164 filter.ifindex = ifindex;
165}
166
167static int do_show(int argc, char **argv)
168{
169 struct {
170 struct nlmsghdr n;
171 struct netconfmsg ncm;
172 char buf[1024];
173 } req = {
174 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct netconfmsg)),
175 .n.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK,
176 .n.nlmsg_type = RTM_GETNETCONF,
177 };
178
179 ipnetconf_reset_filter(0);
180 filter.family = preferred_family;
181
182 while (argc > 0) {
183 if (strcmp(*argv, "dev") == 0) {
184 NEXT_ARG();
185 filter.ifindex = ll_name_to_index(*argv);
186 if (filter.ifindex <= 0) {
187 fprintf(stderr,
188 "Device \"%s\" does not exist.\n",
189 *argv);
190 return -1;
191 }
192 }
193 argv++; argc--;
194 }
195
196 ll_init_map(&rth);
197
198 if (filter.ifindex && filter.family != AF_UNSPEC) {
199 req.ncm.ncm_family = filter.family;
200 addattr_l(&req.n, sizeof(req), NETCONFA_IFINDEX,
201 &filter.ifindex, sizeof(filter.ifindex));
202
203 if (rtnl_send(&rth, &req.n, req.n.nlmsg_len) < 0) {
204 perror("Can not send request");
205 exit(1);
206 }
207 rtnl_listen(&rth, print_netconf, stdout);
208 } else {
209 rth.flags = RTNL_HANDLE_F_SUPPRESS_NLERR;
210dump:
211 if (rtnl_netconfdump_req(&rth, filter.family) < 0) {
212 perror("Cannot send dump request");
213 exit(1);
214 }
215
216 new_json_obj(json);
217 if (rtnl_dump_filter(&rth, print_netconf2, stdout) < 0) {
218
219
220
221 if (errno == EOPNOTSUPP &&
222 filter.family == AF_UNSPEC) {
223 filter.family = AF_INET;
224 goto dump;
225 }
226 perror("RTNETLINK answers");
227 fprintf(stderr, "Dump terminated\n");
228 exit(1);
229 }
230 delete_json_obj();
231 if (preferred_family == AF_UNSPEC && filter.family == AF_INET) {
232 preferred_family = AF_INET6;
233 filter.family = AF_INET6;
234 goto dump;
235 }
236 }
237 return 0;
238}
239
240int do_ipnetconf(int argc, char **argv)
241{
242 if (argc > 0) {
243 if (matches(*argv, "show") == 0 ||
244 matches(*argv, "lst") == 0 ||
245 matches(*argv, "list") == 0)
246 return do_show(argc-1, argv+1);
247 if (matches(*argv, "help") == 0)
248 usage();
249 } else
250 return do_show(0, NULL);
251
252 fprintf(stderr,
253 "Command \"%s\" is unknown, try \"ip netconf help\".\n",
254 *argv);
255 exit(-1);
256}
257