]> git.proxmox.com Git - mirror_iproute2.git/blame - ip/ipaddress.c
netns: make netns_{save,restore} static
[mirror_iproute2.git] / ip / ipaddress.c
CommitLineData
aba5acdf
SH
1/*
2 * ipaddress.c "ip address".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
aba5acdf
SH
11 */
12
13#include <stdio.h>
14#include <stdlib.h>
15#include <unistd.h>
e6e6fb5c 16#include <inttypes.h>
aba5acdf
SH
17#include <fcntl.h>
18#include <sys/ioctl.h>
19#include <sys/socket.h>
110e84a0 20#include <sys/param.h>
5bd9dd49 21#include <errno.h>
aba5acdf
SH
22#include <netinet/in.h>
23#include <arpa/inet.h>
24#include <string.h>
25#include <fnmatch.h>
26
e5779fb2
SH
27#include <linux/netdevice.h>
28#include <linux/if_arp.h>
29#include <linux/sockios.h>
ccdcbf35 30#include <linux/net_namespace.h>
e5779fb2 31
d0e72011 32#include "utils.h"
aba5acdf
SH
33#include "rt_names.h"
34#include "utils.h"
35#include "ll_map.h"
36#include "ip_common.h"
d7bd2db5 37#include "color.h"
aba5acdf 38
81824ac2
PE
39enum {
40 IPADD_LIST,
41 IPADD_FLUSH,
42 IPADD_SAVE,
43};
7b3d366e 44
741dd5cd 45static struct link_filter filter;
aba5acdf
SH
46static int do_link;
47
48static void usage(void) __attribute__((noreturn));
49
50static void usage(void)
51{
c8f7a754 52 if (do_link)
aba5acdf 53 iplink_usage();
c8f7a754 54
4e972d5e 55 fprintf(stderr, "Usage: ip address {add|change|replace} IFADDR dev IFNAME [ LIFETIME ]\n");
a1f27794 56 fprintf(stderr, " [ CONFFLAG-LIST ]\n");
4e972d5e 57 fprintf(stderr, " ip address del IFADDR dev IFNAME [mngtmpaddr]\n");
24604eb2 58 fprintf(stderr, " ip address {save|flush} [ dev IFNAME ] [ scope SCOPE-ID ]\n");
4e972d5e 59 fprintf(stderr, " [ to PREFIX ] [ FLAG-LIST ] [ label LABEL ] [up]\n");
24604eb2
PS
60 fprintf(stderr, " ip address [ show [ dev IFNAME ] [ scope SCOPE-ID ] [ master DEVICE ]\n");
61 fprintf(stderr, " [ type TYPE ] [ to PREFIX ] [ FLAG-LIST ]\n");
104444c2 62 fprintf(stderr, " [ label LABEL ] [up] [ vrf NAME ] ]\n");
4e972d5e 63 fprintf(stderr, " ip address {showdump|restore}\n");
aba5acdf
SH
64 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
65 fprintf(stderr, " [ broadcast ADDR ] [ anycast ADDR ]\n");
78d04c7b 66 fprintf(stderr, " [ label IFNAME ] [ scope SCOPE-ID ] [ metric METRIC ]\n");
aba5acdf
SH
67 fprintf(stderr, "SCOPE-ID := [ host | link | global | NUMBER ]\n");
68 fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] FLAG\n");
69 fprintf(stderr, "FLAG := [ permanent | dynamic | secondary | primary |\n");
b5f39b25 70 fprintf(stderr, " [-]tentative | [-]deprecated | [-]dadfailed | temporary |\n");
a1f27794 71 fprintf(stderr, " CONFFLAG-LIST ]\n");
bac735c5 72 fprintf(stderr, "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n");
e31867ac 73 fprintf(stderr, "CONFFLAG := [ home | nodad | mngtmpaddr | noprefixroute | autojoin ]\n");
35546df7
MN
74 fprintf(stderr, "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n");
75 fprintf(stderr, "LFT := forever | SECONDS\n");
7827b376 76 fprintf(stderr, "TYPE := { vlan | veth | vcan | vxcan | dummy | ifb | macvlan | macvtap |\n");
577cfe0b 77 fprintf(stderr, " bridge | bond | ipoib | ip6tnl | ipip | sit | vxlan | lowpan |\n");
8595cc40
WT
78 fprintf(stderr, " gre | gretap | erspan | ip6gre | ip6gretap | ip6erspan | vti |\n");
79 fprintf(stderr, " nlmon | can | bond_slave | ipvlan | geneve | bridge_slave |\n");
c8f7a754 80 fprintf(stderr, " hsr | macsec | netdevsim }\n");
35546df7 81
aba5acdf
SH
82 exit(-1);
83}
84
56f5daac 85static void print_link_flags(FILE *fp, unsigned int flags, unsigned int mdown)
aba5acdf 86{
d0e72011 87 open_json_array(PRINT_ANY, is_json_context() ? "flags" : "<");
73b49e9f 88 if (flags & IFF_UP && !(flags & IFF_RUNNING))
d0e72011
JF
89 print_string(PRINT_ANY, NULL,
90 flags ? "%s," : "%s", "NO-CARRIER");
aba5acdf 91 flags &= ~IFF_RUNNING;
d0e72011
JF
92#define _PF(f) if (flags&IFF_##f) { \
93 flags &= ~IFF_##f ; \
94 print_string(PRINT_ANY, NULL, flags ? "%s," : "%s", #f); }
aba5acdf
SH
95 _PF(LOOPBACK);
96 _PF(BROADCAST);
97 _PF(POINTOPOINT);
98 _PF(MULTICAST);
99 _PF(NOARP);
100 _PF(ALLMULTI);
101 _PF(PROMISC);
102 _PF(MASTER);
103 _PF(SLAVE);
104 _PF(DEBUG);
105 _PF(DYNAMIC);
106 _PF(AUTOMEDIA);
107 _PF(PORTSEL);
108 _PF(NOTRAILERS);
109 _PF(UP);
dcb283c3
TG
110 _PF(LOWER_UP);
111 _PF(DORMANT);
98f9a1d2 112 _PF(ECHO);
aba5acdf 113#undef _PF
1124ffb7 114 if (flags)
d0e72011 115 print_hex(PRINT_ANY, NULL, "%x", flags);
aba5acdf 116 if (mdown)
d0e72011
JF
117 print_string(PRINT_ANY, NULL, ",%s", "M-DOWN");
118 close_json_array(PRINT_ANY, "> ");
aba5acdf
SH
119}
120
3d866ba2 121static const char *oper_states[] = {
0612519e 122 "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN",
3d866ba2
SH
123 "TESTING", "DORMANT", "UP"
124};
125
126static void print_operstate(FILE *f, __u8 state)
127{
a1121aa1 128 if (state >= ARRAY_SIZE(oper_states)) {
d0e72011
JF
129 if (is_json_context())
130 print_uint(PRINT_JSON, "operstate_index", NULL, state);
131 else
90c5c969 132 print_0xhex(PRINT_FP, NULL, "state %#llx", state);
a1121aa1 133 } else if (brief) {
d0e72011
JF
134 print_color_string(PRINT_ANY,
135 oper_state_color(state),
136 "operstate",
137 "%-14s ",
138 oper_states[state]);
a1121aa1 139 } else {
d0e72011
JF
140 if (is_json_context())
141 print_string(PRINT_JSON,
142 "operstate",
143 NULL, oper_states[state]);
144 else {
145 fprintf(f, "state ");
146 color_fprintf(f, oper_state_color(state),
147 "%s ", oper_states[state]);
148 }
d7bd2db5 149 }
3d866ba2
SH
150}
151
4f2fdd44
SH
152int get_operstate(const char *name)
153{
154 int i;
155
56f5daac 156 for (i = 0; i < ARRAY_SIZE(oper_states); i++)
4f2fdd44
SH
157 if (strcasecmp(name, oper_states[i]) == 0)
158 return i;
159 return -1;
160}
161
f78e316f 162static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1])
aba5acdf 163{
f78e316f
ED
164 int qlen;
165
166 if (tb[IFLA_TXQLEN])
9f1370c0 167 qlen = rta_getattr_u32(tb[IFLA_TXQLEN]);
f78e316f 168 else {
d17b136f 169 struct ifreq ifr = {};
f78e316f
ED
170 int s = socket(AF_INET, SOCK_STREAM, 0);
171
172 if (s < 0)
173 return;
174
ff24746c 175 strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME]));
f78e316f 176 if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) {
f36f8fe5
SH
177 fprintf(stderr,
178 "ioctl(SIOCGIFTXQLEN) failed: %s\n",
179 strerror(errno));
f78e316f
ED
180 close(s);
181 return;
182 }
aba5acdf 183 close(s);
f78e316f 184 qlen = ifr.ifr_qlen;
aba5acdf 185 }
f78e316f 186 if (qlen)
d0e72011 187 print_int(PRINT_ANY, "txqlen", "qlen %d", qlen);
aba5acdf
SH
188}
189
82499282
SH
190static const char *link_modes[] = {
191 "DEFAULT", "DORMANT"
192};
193
194static void print_linkmode(FILE *f, struct rtattr *tb)
195{
196 unsigned int mode = rta_getattr_u8(tb);
197
56f5daac 198 if (mode >= ARRAY_SIZE(link_modes))
d0e72011
JF
199 print_int(PRINT_ANY,
200 "linkmode_index",
201 "mode %d ",
202 mode);
82499282 203 else
d0e72011
JF
204 print_string(PRINT_ANY,
205 "linkmode",
206 "mode %s "
207 , link_modes[mode]);
82499282
SH
208}
209
e0513807 210static char *parse_link_kind(struct rtattr *tb, bool slave)
712249d8
VK
211{
212 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
e0513807 213 int attr = slave ? IFLA_INFO_SLAVE_KIND : IFLA_INFO_KIND;
712249d8
VK
214
215 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
216
e0513807
PS
217 if (linkinfo[attr])
218 return RTA_DATA(linkinfo[attr]);
712249d8
VK
219
220 return "";
221}
222
03ac85b7 223static int match_link_kind(struct rtattr **tb, const char *kind, bool slave)
e0513807
PS
224{
225 if (!tb[IFLA_LINKINFO])
226 return -1;
227
228 return strcmp(parse_link_kind(tb[IFLA_LINKINFO], slave), kind);
229}
230
1d934839
PM
231static void print_linktype(FILE *fp, struct rtattr *tb)
232{
233 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
234 struct link_util *lu;
fbea6115 235 struct link_util *slave_lu;
22a84711 236 char slave[32];
1d934839
PM
237
238 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
d0e72011 239 open_json_object("linkinfo");
1d934839 240
fbea6115 241 if (linkinfo[IFLA_INFO_KIND]) {
9f1370c0
SH
242 const char *kind
243 = rta_getattr_str(linkinfo[IFLA_INFO_KIND]);
1d934839 244
b85076cd 245 print_nl();
d0e72011 246 print_string(PRINT_ANY, "info_kind", " %s ", kind);
1d934839 247
fbea6115
JP
248 lu = get_link_kind(kind);
249 if (lu && lu->print_opt) {
250 struct rtattr *attr[lu->maxattr+1], **data = NULL;
1d934839 251
fbea6115
JP
252 if (linkinfo[IFLA_INFO_DATA]) {
253 parse_rtattr_nested(attr, lu->maxattr,
254 linkinfo[IFLA_INFO_DATA]);
255 data = attr;
256 }
d0e72011 257 open_json_object("info_data");
fbea6115 258 lu->print_opt(lu, fp, data);
d0e72011 259 close_json_object();
1d934839 260
fbea6115 261 if (linkinfo[IFLA_INFO_XSTATS] && show_stats &&
d0e72011
JF
262 lu->print_xstats) {
263 open_json_object("info_xstats");
fbea6115 264 lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]);
d0e72011
JF
265 close_json_object();
266 }
1d934839 267 }
fbea6115
JP
268 }
269
270 if (linkinfo[IFLA_INFO_SLAVE_KIND]) {
9f1370c0
SH
271 const char *slave_kind
272 = rta_getattr_str(linkinfo[IFLA_INFO_SLAVE_KIND]);
1d934839 273
b85076cd 274 print_nl();
d0e72011
JF
275 print_string(PRINT_ANY,
276 "info_slave_kind",
277 " %s_slave ",
278 slave_kind);
279
22a84711 280 snprintf(slave, sizeof(slave), "%s_slave", slave_kind);
fbea6115 281
22a84711 282 slave_lu = get_link_kind(slave);
fbea6115
JP
283 if (slave_lu && slave_lu->print_opt) {
284 struct rtattr *attr[slave_lu->maxattr+1], **data = NULL;
285
286 if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
287 parse_rtattr_nested(attr, slave_lu->maxattr,
288 linkinfo[IFLA_INFO_SLAVE_DATA]);
289 data = attr;
290 }
d0e72011 291 open_json_object("info_slave_data");
fbea6115 292 slave_lu->print_opt(slave_lu, fp, data);
d0e72011 293 close_json_object();
fbea6115 294 }
1d934839 295 }
d0e72011 296 close_json_object();
1d934839
PM
297}
298
ee0067a9
JP
299static void print_af_spec(FILE *fp, struct rtattr *af_spec_attr)
300{
301 struct rtattr *inet6_attr;
302 struct rtattr *tb[IFLA_INET6_MAX + 1];
303
304 inet6_attr = parse_rtattr_one_nested(AF_INET6, af_spec_attr);
305 if (!inet6_attr)
306 return;
307
308 parse_rtattr_nested(tb, IFLA_INET6_MAX, inet6_attr);
309
310 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
5c5176ce 311 __u8 mode = rta_getattr_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
d0e72011 312 SPRINT_BUF(b1);
56f5daac 313
5c5176ce 314 switch (mode) {
ee0067a9 315 case IN6_ADDR_GEN_MODE_EUI64:
d0e72011
JF
316 print_string(PRINT_ANY,
317 "inet6_addr_gen_mode",
318 "addrgenmode %s ",
319 "eui64");
ee0067a9
JP
320 break;
321 case IN6_ADDR_GEN_MODE_NONE:
d0e72011
JF
322 print_string(PRINT_ANY,
323 "inet6_addr_gen_mode",
324 "addrgenmode %s ",
325 "none");
ee0067a9 326 break;
5c5176ce 327 case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
d0e72011
JF
328 print_string(PRINT_ANY,
329 "inet6_addr_gen_mode",
330 "addrgenmode %s ",
331 "stable_secret");
5c5176ce 332 break;
8e12bc0a 333 case IN6_ADDR_GEN_MODE_RANDOM:
d0e72011
JF
334 print_string(PRINT_ANY,
335 "inet6_addr_gen_mode",
336 "addrgenmode %s ",
337 "random");
8e12bc0a 338 break;
5c5176ce 339 default:
d0e72011
JF
340 snprintf(b1, sizeof(b1), "%#.2hhx", mode);
341 print_string(PRINT_ANY,
342 "inet6_addr_gen_mode",
343 "addrgenmode %s ",
344 b1);
5c5176ce 345 break;
ee0067a9
JP
346 }
347 }
348}
349
a1b99717
EBE
350static void print_vf_stats64(FILE *fp, struct rtattr *vfstats);
351
3fd86630
CW
352static void print_vfinfo(FILE *fp, struct rtattr *vfinfo)
353{
354 struct ifla_vf_mac *vf_mac;
3fd86630 355 struct ifla_vf_tx_rate *vf_tx_rate;
8c29ae7c 356 struct rtattr *vf[IFLA_VF_MAX + 1] = {};
56f5daac 357
3fd86630
CW
358 SPRINT_BUF(b1);
359
360 if (vfinfo->rta_type != IFLA_VF_INFO) {
361 fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type);
362 return;
363 }
364
365 parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo);
366
367 vf_mac = RTA_DATA(vf[IFLA_VF_MAC]);
3fd86630
CW
368 vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]);
369
d0e72011
JF
370 print_string(PRINT_FP, NULL, "%s ", _SL_);
371 print_int(PRINT_ANY, "vf", "vf %d ", vf_mac->vf);
372 print_string(PRINT_ANY, "mac", "MAC %s",
373 ll_addr_n2a((unsigned char *) &vf_mac->mac,
374 ETH_ALEN, 0, b1, sizeof(b1)));
375
56e9f0ab
MS
376 if (vf[IFLA_VF_VLAN_LIST]) {
377 struct rtattr *i, *vfvlanlist = vf[IFLA_VF_VLAN_LIST];
378 int rem = RTA_PAYLOAD(vfvlanlist);
379
d0e72011 380 open_json_array(PRINT_JSON, "vlan_list");
56e9f0ab 381 for (i = RTA_DATA(vfvlanlist);
d0e72011
JF
382 RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
383 struct ifla_vf_vlan_info *vf_vlan_info = RTA_DATA(i);
56e9f0ab
MS
384 SPRINT_BUF(b2);
385
d0e72011 386 open_json_object(NULL);
56e9f0ab 387 if (vf_vlan_info->vlan)
d0e72011
JF
388 print_int(PRINT_ANY,
389 "vlan",
390 ", vlan %d",
391 vf_vlan_info->vlan);
56e9f0ab 392 if (vf_vlan_info->qos)
d0e72011
JF
393 print_int(PRINT_ANY,
394 "qos",
395 ", qos %d",
396 vf_vlan_info->qos);
56e9f0ab
MS
397 if (vf_vlan_info->vlan_proto &&
398 vf_vlan_info->vlan_proto != htons(ETH_P_8021Q))
d0e72011
JF
399 print_string(PRINT_ANY,
400 "protocol",
401 ", vlan protocol %s",
402 ll_proto_n2a(
403 vf_vlan_info->vlan_proto,
56e9f0ab 404 b2, sizeof(b2)));
d0e72011 405 close_json_object();
56e9f0ab 406 }
d0e72011 407 close_json_array(PRINT_JSON, NULL);
56e9f0ab
MS
408 } else {
409 struct ifla_vf_vlan *vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]);
410
411 if (vf_vlan->vlan)
d0e72011
JF
412 print_int(PRINT_ANY,
413 "vlan",
414 ", vlan %d",
415 vf_vlan->vlan);
56e9f0ab 416 if (vf_vlan->qos)
d0e72011 417 print_int(PRINT_ANY, "qos", ", qos %d", vf_vlan->qos);
56e9f0ab 418 }
d0e72011 419
3fd86630 420 if (vf_tx_rate->rate)
527f8514
TT
421 print_uint(PRINT_ANY,
422 "tx_rate",
423 ", tx rate %u (Mbps)",
424 vf_tx_rate->rate);
8c29ae7c
VK
425
426 if (vf[IFLA_VF_RATE]) {
427 struct ifla_vf_rate *vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
d0e72011
JF
428 int max_tx = vf_rate->max_tx_rate;
429 int min_tx = vf_rate->min_tx_rate;
430
431 if (is_json_context()) {
432 open_json_object("rate");
527f8514
TT
433 print_uint(PRINT_JSON, "max_tx", NULL, max_tx);
434 print_uint(PRINT_ANY, "min_tx", NULL, min_tx);
d0e72011
JF
435 close_json_object();
436 } else {
437 if (max_tx)
527f8514 438 fprintf(fp, ", max_tx_rate %uMbps", max_tx);
d0e72011 439 if (min_tx)
527f8514 440 fprintf(fp, ", min_tx_rate %uMbps", min_tx);
d0e72011 441 }
8c29ae7c 442 }
d0e72011 443
ff9463e0
PS
444 if (vf[IFLA_VF_SPOOFCHK]) {
445 struct ifla_vf_spoofchk *vf_spoofchk =
446 RTA_DATA(vf[IFLA_VF_SPOOFCHK]);
8c29ae7c 447
ff9463e0 448 if (vf_spoofchk->setting != -1)
d0e72011
JF
449 print_bool(PRINT_ANY,
450 "spoofchk",
451 vf_spoofchk->setting ?
452 ", spoof checking on" : ", spoof checking off",
453 vf_spoofchk->setting);
7b8179c7 454 }
d0e72011 455
ff9463e0
PS
456 if (vf[IFLA_VF_LINK_STATE]) {
457 struct ifla_vf_link_state *vf_linkstate =
458 RTA_DATA(vf[IFLA_VF_LINK_STATE]);
459
07fa9c15 460 if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_AUTO)
d0e72011
JF
461 print_string(PRINT_ANY,
462 "link_state",
463 ", link-state %s",
464 "auto");
07fa9c15 465 else if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_ENABLE)
d0e72011
JF
466 print_string(PRINT_ANY,
467 "link_state",
468 ", link-state %s",
469 "enable");
07fa9c15 470 else
d0e72011
JF
471 print_string(PRINT_ANY,
472 "link_state",
473 ", link-state %s",
474 "disable");
07fa9c15 475 }
d0e72011 476
fe932278
PS
477 if (vf[IFLA_VF_TRUST]) {
478 struct ifla_vf_trust *vf_trust = RTA_DATA(vf[IFLA_VF_TRUST]);
479
480 if (vf_trust->setting != -1)
d0e72011
JF
481 print_bool(PRINT_ANY,
482 "trust",
483 vf_trust->setting ? ", trust on" : ", trust off",
484 vf_trust->setting);
fe932278 485 }
d0e72011 486
4fb4a10e
PS
487 if (vf[IFLA_VF_RSS_QUERY_EN]) {
488 struct ifla_vf_rss_query_en *rss_query =
489 RTA_DATA(vf[IFLA_VF_RSS_QUERY_EN]);
490
491 if (rss_query->setting != -1)
d0e72011
JF
492 print_bool(PRINT_ANY,
493 "query_rss_en",
494 rss_query->setting ? ", query_rss on"
495 : ", query_rss off",
496 rss_query->setting);
4fb4a10e 497 }
d0e72011 498
a1b99717
EBE
499 if (vf[IFLA_VF_STATS] && show_stats)
500 print_vf_stats64(fp, vf[IFLA_VF_STATS]);
3fd86630
CW
501}
502
837552b4 503void print_num(FILE *fp, unsigned int width, uint64_t count)
b68d9837 504{
1e264abc
SH
505 const char *prefix = "kMGTPE";
506 const unsigned int base = use_iec ? 1024 : 1000;
b68d9837 507 uint64_t powi = 1;
50ec6650
CH
508 uint16_t powj = 1;
509 uint8_t precision = 2;
1e264abc 510 char buf[64];
b68d9837 511
1e264abc 512 if (!human_readable || count < base) {
f4fe81d2 513 fprintf(fp, "%-*"PRIu64" ", width, count);
1e264abc 514 return;
b68d9837
CH
515 }
516
1e264abc 517 /* increase value by a factor of 1000/1024 and print
468fa020
SH
518 * if result is something a human can read
519 */
56f5daac 520 for (;;) {
1e264abc
SH
521 powi *= base;
522 if (count / base < powi)
523 break;
b68d9837 524
1e264abc
SH
525 if (!prefix[1])
526 break;
527 ++prefix;
b68d9837
CH
528 }
529
50ec6650
CH
530 /* try to guess a good number of digits for precision */
531 for (; precision > 0; precision--) {
532 powj *= 10;
533 if (count / powi < powj)
534 break;
535 }
536
537 snprintf(buf, sizeof(buf), "%.*f%c%s", precision,
d0e72011 538 (double) count / powi, *prefix, use_iec ? "i" : "");
1e264abc 539
f4fe81d2 540 fprintf(fp, "%-*s ", width, buf);
b68d9837
CH
541}
542
a1b99717
EBE
543static void print_vf_stats64(FILE *fp, struct rtattr *vfstats)
544{
30a8842c 545 struct rtattr *vf[IFLA_VF_STATS_MAX + 1];
a1b99717
EBE
546
547 if (vfstats->rta_type != IFLA_VF_STATS) {
548 fprintf(stderr, "BUG: rta type is %d\n", vfstats->rta_type);
549 return;
550 }
551
d7cf2416 552 parse_rtattr_nested(vf, IFLA_VF_STATS_MAX, vfstats);
a1b99717 553
d0e72011
JF
554 if (is_json_context()) {
555 open_json_object("stats");
556
557 /* RX stats */
558 open_json_object("rx");
4db2ff0d 559 print_u64(PRINT_JSON, "bytes", NULL,
d0e72011 560 rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
4db2ff0d 561 print_u64(PRINT_JSON, "packets", NULL,
d0e72011 562 rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
4db2ff0d 563 print_u64(PRINT_JSON, "multicast", NULL,
d0e72011 564 rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
4db2ff0d 565 print_u64(PRINT_JSON, "broadcast", NULL,
d0e72011 566 rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
8c7acf3a
EBE
567 if (vf[IFLA_VF_STATS_RX_DROPPED])
568 print_u64(PRINT_JSON, "dropped", NULL,
569 rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
d0e72011
JF
570 close_json_object();
571
572 /* TX stats */
573 open_json_object("tx");
4db2ff0d 574 print_u64(PRINT_JSON, "tx_bytes", NULL,
d0e72011 575 rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
4db2ff0d 576 print_u64(PRINT_JSON, "tx_packets", NULL,
d0e72011 577 rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
8c7acf3a
EBE
578 if (vf[IFLA_VF_STATS_TX_DROPPED])
579 print_u64(PRINT_JSON, "dropped", NULL,
580 rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
d0e72011
JF
581 close_json_object();
582 close_json_object();
583 } else {
584 /* RX stats */
585 fprintf(fp, "%s", _SL_);
8c7acf3a
EBE
586 fprintf(fp, " RX: bytes packets mcast bcast ");
587 if (vf[IFLA_VF_STATS_RX_DROPPED])
588 fprintf(fp, " dropped ");
589 fprintf(fp, "%s", _SL_);
d0e72011 590 fprintf(fp, " ");
a1b99717 591
d0e72011
JF
592 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
593 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
594 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
595 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
8c7acf3a
EBE
596 if (vf[IFLA_VF_STATS_RX_DROPPED])
597 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
a1b99717 598
d0e72011
JF
599 /* TX stats */
600 fprintf(fp, "%s", _SL_);
8c7acf3a
EBE
601 fprintf(fp, " TX: bytes packets ");
602 if (vf[IFLA_VF_STATS_TX_DROPPED])
603 fprintf(fp, " dropped ");
604 fprintf(fp, "%s", _SL_);
d0e72011 605 fprintf(fp, " ");
a1b99717 606
d0e72011
JF
607 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
608 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
8c7acf3a
EBE
609 if (vf[IFLA_VF_STATS_TX_DROPPED])
610 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
d0e72011 611 }
a1b99717
EBE
612}
613
9a7bd544 614static void __print_link_stats(FILE *fp, struct rtattr *tb[])
4b726cb1 615{
9a7bd544
SP
616 const struct rtattr *carrier_changes = tb[IFLA_CARRIER_CHANGES];
617 struct rtnl_link_stats64 _s, *s = &_s;
618 int ret;
d0e72011 619
9a7bd544
SP
620 ret = get_rtnl_link_stats_rta(s, tb);
621 if (ret < 0)
622 return;
e6e6fb5c 623
d0e72011 624 if (is_json_context()) {
9a7bd544 625 open_json_object((ret == sizeof(*s)) ? "stats64" : "stats");
d0e72011
JF
626
627 /* RX stats */
628 open_json_object("rx");
4db2ff0d
THJ
629 print_u64(PRINT_JSON, "bytes", NULL, s->rx_bytes);
630 print_u64(PRINT_JSON, "packets", NULL, s->rx_packets);
631 print_u64(PRINT_JSON, "errors", NULL, s->rx_errors);
632 print_u64(PRINT_JSON, "dropped", NULL, s->rx_dropped);
633 print_u64(PRINT_JSON, "over_errors", NULL, s->rx_over_errors);
634 print_u64(PRINT_JSON, "multicast", NULL, s->multicast);
d0e72011 635 if (s->rx_compressed)
4db2ff0d 636 print_u64(PRINT_JSON,
fb7b8168 637 "compressed", NULL, s->rx_compressed);
d0e72011
JF
638
639 /* RX error stats */
640 if (show_stats > 1) {
4db2ff0d 641 print_u64(PRINT_JSON,
d0e72011
JF
642 "length_errors",
643 NULL, s->rx_length_errors);
4db2ff0d 644 print_u64(PRINT_JSON,
d0e72011
JF
645 "crc_errors",
646 NULL, s->rx_crc_errors);
4db2ff0d 647 print_u64(PRINT_JSON,
d0e72011
JF
648 "frame_errors",
649 NULL, s->rx_frame_errors);
4db2ff0d 650 print_u64(PRINT_JSON,
d0e72011
JF
651 "fifo_errors",
652 NULL, s->rx_fifo_errors);
4db2ff0d 653 print_u64(PRINT_JSON,
d0e72011
JF
654 "missed_errors",
655 NULL, s->rx_missed_errors);
656 if (s->rx_nohandler)
4db2ff0d 657 print_u64(PRINT_JSON,
fb7b8168 658 "nohandler", NULL, s->rx_nohandler);
d0e72011
JF
659 }
660 close_json_object();
661
662 /* TX stats */
663 open_json_object("tx");
4db2ff0d
THJ
664 print_u64(PRINT_JSON, "bytes", NULL, s->tx_bytes);
665 print_u64(PRINT_JSON, "packets", NULL, s->tx_packets);
666 print_u64(PRINT_JSON, "errors", NULL, s->tx_errors);
667 print_u64(PRINT_JSON, "dropped", NULL, s->tx_dropped);
668 print_u64(PRINT_JSON,
d0e72011
JF
669 "carrier_errors",
670 NULL, s->tx_carrier_errors);
4db2ff0d 671 print_u64(PRINT_JSON, "collisions", NULL, s->collisions);
d0e72011 672 if (s->tx_compressed)
4db2ff0d 673 print_u64(PRINT_JSON,
fb7b8168 674 "compressed", NULL, s->tx_compressed);
d0e72011
JF
675
676 /* TX error stats */
677 if (show_stats > 1) {
4db2ff0d 678 print_u64(PRINT_JSON,
d0e72011
JF
679 "aborted_errors",
680 NULL, s->tx_aborted_errors);
4db2ff0d 681 print_u64(PRINT_JSON,
d0e72011
JF
682 "fifo_errors",
683 NULL, s->tx_fifo_errors);
4db2ff0d 684 print_u64(PRINT_JSON,
d0e72011
JF
685 "window_errors",
686 NULL, s->tx_window_errors);
4db2ff0d 687 print_u64(PRINT_JSON,
d0e72011
JF
688 "heartbeat_errors",
689 NULL, s->tx_heartbeat_errors);
690 if (carrier_changes)
4db2ff0d 691 print_u64(PRINT_JSON, "carrier_changes", NULL,
d0e72011
JF
692 rta_getattr_u32(carrier_changes));
693 }
b68d9837 694
d0e72011
JF
695 close_json_object();
696 close_json_object();
697 } else {
698 /* RX stats */
699 fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s",
700 s->rx_compressed ? "compressed" : "", _SL_);
701
d0e72011
JF
702 fprintf(fp, " ");
703 print_num(fp, 10, s->rx_bytes);
704 print_num(fp, 8, s->rx_packets);
705 print_num(fp, 7, s->rx_errors);
706 print_num(fp, 7, s->rx_dropped);
707 print_num(fp, 7, s->rx_over_errors);
708 print_num(fp, 7, s->multicast);
709 if (s->rx_compressed)
710 print_num(fp, 7, s->rx_compressed);
711
712 /* RX error stats */
713 if (show_stats > 1) {
714 fprintf(fp, "%s", _SL_);
715 fprintf(fp, " RX errors: length crc frame fifo missed%s%s",
716 s->rx_nohandler ? " nohandler" : "", _SL_);
717 fprintf(fp, " ");
718 print_num(fp, 8, s->rx_length_errors);
719 print_num(fp, 7, s->rx_crc_errors);
720 print_num(fp, 7, s->rx_frame_errors);
721 print_num(fp, 7, s->rx_fifo_errors);
722 print_num(fp, 7, s->rx_missed_errors);
723 if (s->rx_nohandler)
724 print_num(fp, 7, s->rx_nohandler);
725 }
4ec0ffde 726 fprintf(fp, "%s", _SL_);
1e264abc 727
d0e72011
JF
728 /* TX stats */
729 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
730 s->tx_compressed ? "compressed" : "", _SL_);
731
732 fprintf(fp, " ");
733 print_num(fp, 10, s->tx_bytes);
734 print_num(fp, 8, s->tx_packets);
735 print_num(fp, 7, s->tx_errors);
736 print_num(fp, 7, s->tx_dropped);
737 print_num(fp, 7, s->tx_carrier_errors);
738 print_num(fp, 7, s->collisions);
739 if (s->tx_compressed)
740 print_num(fp, 7, s->tx_compressed);
741
742 /* TX error stats */
743 if (show_stats > 1) {
744 fprintf(fp, "%s", _SL_);
745 fprintf(fp, " TX errors: aborted fifo window heartbeat");
746 if (carrier_changes)
747 fprintf(fp, " transns");
748 fprintf(fp, "%s", _SL_);
749
750 fprintf(fp, " ");
751 print_num(fp, 8, s->tx_aborted_errors);
752 print_num(fp, 7, s->tx_fifo_errors);
753 print_num(fp, 7, s->tx_window_errors);
754 print_num(fp, 7, s->tx_heartbeat_errors);
755 if (carrier_changes)
756 print_num(fp, 7,
757 rta_getattr_u32(carrier_changes));
758 }
e6e6fb5c
SH
759 }
760}
761
5d5cf1b4
JB
762static void print_link_stats(FILE *fp, struct nlmsghdr *n)
763{
764 struct ifinfomsg *ifi = NLMSG_DATA(n);
56f5daac 765 struct rtattr *tb[IFLA_MAX+1];
5d5cf1b4
JB
766
767 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi),
768 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)));
769 __print_link_stats(fp, tb);
b85076cd 770 print_nl();
5d5cf1b4
JB
771}
772
c956e9a9
SP
773static int print_linkinfo_brief(FILE *fp, const char *name,
774 const struct ifinfomsg *ifi,
775 struct rtattr *tb[])
5d295bb8 776{
56f5daac 777 unsigned int m_flag = 0;
5d295bb8 778
4328b687 779 m_flag = print_name_and_link("%-16s ", name, tb);
5d295bb8
AG
780
781 if (tb[IFLA_OPERSTATE])
782 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
783
2cd0578f 784 if (filter.family == AF_PACKET) {
5d295bb8 785 SPRINT_BUF(b1);
d0e72011 786
5d295bb8 787 if (tb[IFLA_ADDRESS]) {
d0e72011
JF
788 print_color_string(PRINT_ANY, COLOR_MAC,
789 "address", "%s ",
790 ll_addr_n2a(
791 RTA_DATA(tb[IFLA_ADDRESS]),
792 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
793 ifi->ifi_type,
794 b1, sizeof(b1)));
5d295bb8
AG
795 }
796 }
797
2cd0578f 798 if (filter.family == AF_PACKET) {
5d295bb8 799 print_link_flags(fp, ifi->ifi_flags, m_flag);
d0e72011
JF
800 print_string(PRINT_FP, NULL, "%s", "\n");
801 }
2cd0578f 802
5d295bb8
AG
803 fflush(fp);
804 return 0;
805}
806
735a52ce
VY
807static const char *link_events[] = {
808 [IFLA_EVENT_NONE] = "NONE",
809 [IFLA_EVENT_REBOOT] = "REBOOT",
810 [IFLA_EVENT_FEATURES] = "FEATURE CHANGE",
811 [IFLA_EVENT_BONDING_FAILOVER] = "BONDING FAILOVER",
812 [IFLA_EVENT_NOTIFY_PEERS] = "NOTIFY PEERS",
813 [IFLA_EVENT_IGMP_RESEND] = "RESEND IGMP",
814 [IFLA_EVENT_BONDING_OPTIONS] = "BONDING OPTION"
815};
816
817static void print_link_event(FILE *f, __u32 event)
818{
819 if (event >= ARRAY_SIZE(link_events))
d0e72011 820 print_int(PRINT_ANY, "event", "event %d ", event);
735a52ce
VY
821 else {
822 if (event)
d0e72011
JF
823 print_string(PRINT_ANY,
824 "event", "event %s ",
825 link_events[event]);
735a52ce
VY
826 }
827}
828
cd554f2c 829int print_linkinfo(struct nlmsghdr *n, void *arg)
aba5acdf 830{
56f5daac 831 FILE *fp = (FILE *)arg;
aba5acdf 832 struct ifinfomsg *ifi = NLMSG_DATA(n);
56f5daac 833 struct rtattr *tb[IFLA_MAX+1];
aba5acdf 834 int len = n->nlmsg_len;
95168230 835 const char *name;
56f5daac 836 unsigned int m_flag = 0;
c956e9a9 837 SPRINT_BUF(b1);
aba5acdf
SH
838
839 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
840 return 0;
841
842 len -= NLMSG_LENGTH(sizeof(*ifi));
843 if (len < 0)
844 return -1;
845
846 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
95168230 847 return -1;
aba5acdf 848 if (filter.up && !(ifi->ifi_flags&IFF_UP))
95168230 849 return -1;
aba5acdf 850
aba5acdf 851 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
fcac9665
SP
852
853 name = get_ifname_rta(ifi->ifi_index, tb[IFLA_IFNAME]);
854 if (!name)
855 return -1;
468fa020 856
8df708af
SP
857 if (filter.label)
858 return 0;
aba5acdf 859
f960c92a 860 if (tb[IFLA_GROUP]) {
9f1370c0 861 int group = rta_getattr_u32(tb[IFLA_GROUP]);
56f5daac 862
c4fdf75d 863 if (filter.group != -1 && group != filter.group)
f960c92a
VD
864 return -1;
865 }
866
1b944148 867 if (tb[IFLA_MASTER]) {
9f1370c0 868 int master = rta_getattr_u32(tb[IFLA_MASTER]);
56f5daac 869
1b944148
VK
870 if (filter.master > 0 && master != filter.master)
871 return -1;
56f5daac 872 } else if (filter.master > 0)
1b944148
VK
873 return -1;
874
e0513807
PS
875 if (filter.kind && match_link_kind(tb, filter.kind, 0))
876 return -1;
712249d8 877
e0513807
PS
878 if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1))
879 return -1;
712249d8 880
aba5acdf 881 if (n->nlmsg_type == RTM_DELLINK)
d0e72011
JF
882 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
883
c956e9a9
SP
884 if (brief)
885 return print_linkinfo_brief(fp, name, ifi, tb);
886
d0e72011 887 print_int(PRINT_ANY, "ifindex", "%d: ", ifi->ifi_index);
56f5daac 888
4328b687 889 m_flag = print_name_and_link("%s: ", name, tb);
aba5acdf
SH
890 print_link_flags(fp, ifi->ifi_flags, m_flag);
891
892 if (tb[IFLA_MTU])
d0e72011
JF
893 print_int(PRINT_ANY,
894 "mtu", "mtu %u ",
895 rta_getattr_u32(tb[IFLA_MTU]));
c7272ca7 896 if (tb[IFLA_XDP])
a0b5b7cf 897 xdp_dump(fp, tb[IFLA_XDP], do_link, false);
aba5acdf 898 if (tb[IFLA_QDISC])
d0e72011
JF
899 print_string(PRINT_ANY,
900 "qdisc",
901 "qdisc %s ",
902 rta_getattr_str(tb[IFLA_QDISC]));
aba5acdf 903 if (tb[IFLA_MASTER]) {
d92cc2d0 904 int master = rta_getattr_u32(tb[IFLA_MASTER]);
d0e72011 905
b68b361b
SH
906 print_string(PRINT_ANY,
907 "master", "master %s ",
908 ll_index_to_name(master));
aba5acdf 909 }
82499282 910
3d866ba2 911 if (tb[IFLA_OPERSTATE])
ff24746c 912 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
82499282
SH
913
914 if (do_link && tb[IFLA_LINKMODE])
915 print_linkmode(fp, tb[IFLA_LINKMODE]);
916
c4fdf75d 917 if (tb[IFLA_GROUP]) {
9f1370c0 918 int group = rta_getattr_u32(tb[IFLA_GROUP]);
56f5daac 919
d0e72011
JF
920 print_string(PRINT_ANY,
921 "group",
922 "group %s ",
923 rtnl_group_n2a(group, b1, sizeof(b1)));
c4fdf75d
ST
924 }
925
aba5acdf 926 if (filter.showqueue)
f78e316f 927 print_queuelen(fp, tb);
ae665a52 928
735a52ce
VY
929 if (tb[IFLA_EVENT])
930 print_link_event(fp, rta_getattr_u32(tb[IFLA_EVENT]));
931
2ec28933 932 if (!filter.family || filter.family == AF_PACKET || show_details) {
b85076cd 933 print_nl();
d0e72011
JF
934 print_string(PRINT_ANY,
935 "link_type",
936 " link/%s ",
937 ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
aba5acdf 938 if (tb[IFLA_ADDRESS]) {
d0e72011
JF
939 print_color_string(PRINT_ANY,
940 COLOR_MAC,
941 "address",
942 "%s",
943 ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]),
944 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
945 ifi->ifi_type,
946 b1, sizeof(b1)));
aba5acdf
SH
947 }
948 if (tb[IFLA_BROADCAST]) {
d0e72011
JF
949 if (ifi->ifi_flags&IFF_POINTOPOINT) {
950 print_string(PRINT_FP, NULL, " peer ", NULL);
951 print_bool(PRINT_JSON,
952 "link_pointtopoint", NULL, true);
953 } else {
954 print_string(PRINT_FP, NULL, " brd ", NULL);
955 }
956 print_color_string(PRINT_ANY,
957 COLOR_MAC,
958 "broadcast",
959 "%s",
960 ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]),
961 RTA_PAYLOAD(tb[IFLA_BROADCAST]),
962 ifi->ifi_type,
963 b1, sizeof(b1)));
aba5acdf
SH
964 }
965 }
1d934839 966
ccdcbf35 967 if (tb[IFLA_LINK_NETNSID]) {
9f1370c0 968 int id = rta_getattr_u32(tb[IFLA_LINK_NETNSID]);
ccdcbf35 969
d0e72011
JF
970 if (is_json_context()) {
971 print_int(PRINT_JSON, "link_netnsid", NULL, id);
972 } else {
9580bad7
ND
973 if (id >= 0) {
974 char *name = get_name_from_nsid(id);
975
976 if (name)
977 print_string(PRINT_FP, NULL,
978 " link-netns %s", name);
979 else
980 print_int(PRINT_FP, NULL,
981 " link-netnsid %d", id);
982 } else
d0e72011
JF
983 print_string(PRINT_FP, NULL,
984 " link-netnsid %s", "unknown");
985 }
ccdcbf35
ND
986 }
987
eaf89d7d
ND
988 if (tb[IFLA_NEW_NETNSID]) {
989 int id = rta_getattr_u32(tb[IFLA_NEW_NETNSID]);
9580bad7 990 char *name = get_name_from_nsid(id);
eaf89d7d 991
9580bad7
ND
992 if (name)
993 print_string(PRINT_FP, NULL, " new-netns %s", name);
994 else
995 print_int(PRINT_FP, NULL, " new-netnsid %d", id);
eaf89d7d
ND
996 }
997 if (tb[IFLA_NEW_IFINDEX]) {
998 int id = rta_getattr_u32(tb[IFLA_NEW_IFINDEX]);
999
1000 print_int(PRINT_FP, NULL, " new-ifindex %d", id);
1001 }
1002
18864827
AK
1003 if (tb[IFLA_PROTO_DOWN]) {
1004 if (rta_getattr_u8(tb[IFLA_PROTO_DOWN]))
d0e72011
JF
1005 print_bool(PRINT_ANY,
1006 "proto_down", " protodown on ", true);
18864827
AK
1007 }
1008
11522e7d
SH
1009 if (show_details) {
1010 if (tb[IFLA_PROMISCUITY])
d0e72011
JF
1011 print_uint(PRINT_ANY,
1012 "promiscuity",
1013 " promiscuity %u ",
1014 rta_getattr_u32(tb[IFLA_PROMISCUITY]));
11522e7d 1015
d97e266e
SH
1016 if (tb[IFLA_MIN_MTU])
1017 print_uint(PRINT_ANY,
1018 "min_mtu", "minmtu %u ",
1019 rta_getattr_u32(tb[IFLA_MIN_MTU]));
1020
1021 if (tb[IFLA_MAX_MTU])
1022 print_uint(PRINT_ANY,
1023 "max_mtu", "maxmtu %u ",
1024 rta_getattr_u32(tb[IFLA_MAX_MTU]));
1025
11522e7d
SH
1026 if (tb[IFLA_LINKINFO])
1027 print_linktype(fp, tb[IFLA_LINKINFO]);
1028
1029 if (do_link && tb[IFLA_AF_SPEC])
1030 print_af_spec(fp, tb[IFLA_AF_SPEC]);
1031
1032 if (tb[IFLA_NUM_TX_QUEUES])
d0e72011
JF
1033 print_uint(PRINT_ANY,
1034 "num_tx_queues",
1035 "numtxqueues %u ",
1036 rta_getattr_u32(tb[IFLA_NUM_TX_QUEUES]));
ede6a3ea 1037
11522e7d 1038 if (tb[IFLA_NUM_RX_QUEUES])
d0e72011
JF
1039 print_uint(PRINT_ANY,
1040 "num_rx_queues",
1041 "numrxqueues %u ",
1042 rta_getattr_u32(tb[IFLA_NUM_RX_QUEUES]));
1cb6a110 1043
1acd208c 1044 if (tb[IFLA_GSO_MAX_SIZE])
d0e72011
JF
1045 print_uint(PRINT_ANY,
1046 "gso_max_size",
1047 "gso_max_size %u ",
1048 rta_getattr_u32(tb[IFLA_GSO_MAX_SIZE]));
1acd208c
ED
1049
1050 if (tb[IFLA_GSO_MAX_SEGS])
d0e72011
JF
1051 print_uint(PRINT_ANY,
1052 "gso_max_segs",
1053 "gso_max_segs %u ",
1054 rta_getattr_u32(tb[IFLA_GSO_MAX_SEGS]));
1acd208c 1055
11522e7d 1056 if (tb[IFLA_PHYS_PORT_NAME])
d0e72011
JF
1057 print_string(PRINT_ANY,
1058 "phys_port_name",
1059 "portname %s ",
1060 rta_getattr_str(tb[IFLA_PHYS_PORT_NAME]));
ee0067a9 1061
11522e7d 1062 if (tb[IFLA_PHYS_PORT_ID]) {
d0e72011
JF
1063 print_string(PRINT_ANY,
1064 "phys_port_id",
1065 "portid %s ",
1066 hexstring_n2a(
1067 RTA_DATA(tb[IFLA_PHYS_PORT_ID]),
1068 RTA_PAYLOAD(tb[IFLA_PHYS_PORT_ID]),
1069 b1, sizeof(b1)));
11522e7d
SH
1070 }
1071
1072 if (tb[IFLA_PHYS_SWITCH_ID]) {
d0e72011
JF
1073 print_string(PRINT_ANY,
1074 "phys_switch_id",
1075 "switchid %s ",
1076 hexstring_n2a(RTA_DATA(tb[IFLA_PHYS_SWITCH_ID]),
1077 RTA_PAYLOAD(tb[IFLA_PHYS_SWITCH_ID]),
1078 b1, sizeof(b1)));
11522e7d
SH
1079 }
1080 }
f1c656e5 1081
2ec28933 1082 if ((do_link || show_details) && tb[IFLA_IFALIAS]) {
d0e72011
JF
1083 print_string(PRINT_FP, NULL, "%s ", _SL_);
1084 print_string(PRINT_ANY,
1085 "ifalias",
1086 "alias %s",
1087 rta_getattr_str(tb[IFLA_IFALIAS]));
263c894f 1088 }
ace9c961 1089
a0b5b7cf
DB
1090 if ((do_link || show_details) && tb[IFLA_XDP])
1091 xdp_dump(fp, tb[IFLA_XDP], true, true);
1092
e6e6fb5c 1093 if (do_link && show_stats) {
b85076cd 1094 print_nl();
5d5cf1b4 1095 __print_link_stats(fp, tb);
ae7229d5 1096 }
e6e6fb5c 1097
2ec28933 1098 if ((do_link || show_details) && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) {
3fd86630
CW
1099 struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST];
1100 int rem = RTA_PAYLOAD(vflist);
56f5daac 1101
d0e72011
JF
1102 open_json_array(PRINT_JSON, "vfinfo_list");
1103 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
1104 open_json_object(NULL);
3fd86630 1105 print_vfinfo(fp, i);
d0e72011
JF
1106 close_json_object();
1107 }
1108 close_json_array(PRINT_JSON, NULL);
aba5acdf 1109 }
3fd86630 1110
c956e9a9 1111 print_string(PRINT_FP, NULL, "%s", "\n");
aba5acdf 1112 fflush(fp);
5d5cf1b4 1113 return 1;
aba5acdf
SH
1114}
1115
1116static int flush_update(void)
1117{
e149d4e8
NH
1118
1119 /*
1120 * Note that the kernel may delete multiple addresses for one
1121 * delete request (e.g. if ipv4 address promotion is disabled).
1122 * Since a flush operation is really a series of delete requests
1123 * its possible that we may request an address delete that has
1124 * already been done by the kernel. Therefore, ignore EADDRNOTAVAIL
1125 * errors returned from a flush request
1126 */
1127 if ((rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) &&
1128 (errno != EADDRNOTAVAIL)) {
1fb0a998 1129 perror("Failed to send flush request");
aba5acdf
SH
1130 return -1;
1131 }
1132 filter.flushp = 0;
1133 return 0;
1134}
1135
35546df7
MN
1136static int set_lifetime(unsigned int *lifetime, char *argv)
1137{
1138 if (strcmp(argv, "forever") == 0)
141bb606 1139 *lifetime = INFINITY_LIFE_TIME;
35546df7
MN
1140 else if (get_u32(lifetime, argv, 0))
1141 return -1;
1142
1143 return 0;
1144}
1145
37c9b94e
JP
1146static unsigned int get_ifa_flags(struct ifaddrmsg *ifa,
1147 struct rtattr *ifa_flags_attr)
1148{
1149 return ifa_flags_attr ? rta_getattr_u32(ifa_flags_attr) :
d0e72011 1150 ifa->ifa_flags;
37c9b94e
JP
1151}
1152
f73ac674 1153/* Mapping from argument to address flag mask */
086277b5 1154static const struct {
f73ac674
SH
1155 const char *name;
1156 unsigned long value;
1157} ifa_flag_names[] = {
1158 { "secondary", IFA_F_SECONDARY },
1159 { "temporary", IFA_F_SECONDARY },
1160 { "nodad", IFA_F_NODAD },
1161 { "optimistic", IFA_F_OPTIMISTIC },
1162 { "dadfailed", IFA_F_DADFAILED },
1163 { "home", IFA_F_HOMEADDRESS },
1164 { "deprecated", IFA_F_DEPRECATED },
1165 { "tentative", IFA_F_TENTATIVE },
1166 { "permanent", IFA_F_PERMANENT },
1167 { "mngtmpaddr", IFA_F_MANAGETEMPADDR },
1168 { "noprefixroute", IFA_F_NOPREFIXROUTE },
1169 { "autojoin", IFA_F_MCAUTOJOIN },
1170 { "stable-privacy", IFA_F_STABLE_PRIVACY },
1171};
1172
1173static void print_ifa_flags(FILE *fp, const struct ifaddrmsg *ifa,
1174 unsigned int flags)
1175{
1176 unsigned int i;
1177
1178 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1179 unsigned long mask = ifa_flag_names[i].value;
1180
1181 if (mask == IFA_F_PERMANENT) {
1182 if (!(flags & mask))
d0e72011
JF
1183 print_bool(PRINT_ANY,
1184 "dynamic", "dynamic ", true);
f73ac674
SH
1185 } else if (flags & mask) {
1186 if (mask == IFA_F_SECONDARY &&
d0e72011
JF
1187 ifa->ifa_family == AF_INET6) {
1188 print_bool(PRINT_ANY,
1189 "temporary", "temporary ", true);
1190 } else {
1191 print_string(PRINT_FP, NULL,
1192 "%s ", ifa_flag_names[i].name);
1193 print_bool(PRINT_JSON,
1194 ifa_flag_names[i].name, NULL, true);
1195 }
f73ac674
SH
1196 }
1197
1198 flags &= ~mask;
1199 }
1200
d0e72011
JF
1201 if (flags) {
1202 if (is_json_context()) {
1203 SPRINT_BUF(b1);
1204
1205 snprintf(b1, sizeof(b1), "%02x", flags);
1206 print_string(PRINT_JSON, "ifa_flags", NULL, b1);
1207 } else {
1208 fprintf(fp, "flags %02x ", flags);
1209 }
1210 }
f73ac674
SH
1211
1212}
1213
1214static int get_filter(const char *arg)
1215{
133db49b 1216 bool inv = false;
f73ac674
SH
1217 unsigned int i;
1218
133db49b
PS
1219 if (arg[0] == '-') {
1220 inv = true;
1221 arg++;
1222 }
1223
f73ac674
SH
1224 /* Special cases */
1225 if (strcmp(arg, "dynamic") == 0) {
133db49b
PS
1226 inv = !inv;
1227 arg = "permanent";
f73ac674 1228 } else if (strcmp(arg, "primary") == 0) {
133db49b
PS
1229 inv = !inv;
1230 arg = "secondary";
1231 }
f73ac674 1232
133db49b
PS
1233 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1234 if (strcmp(arg, ifa_flag_names[i].name))
1235 continue;
1236
1237 if (inv)
1238 filter.flags &= ~ifa_flag_names[i].value;
1239 else
f73ac674 1240 filter.flags |= ifa_flag_names[i].value;
133db49b
PS
1241 filter.flagmask |= ifa_flag_names[i].value;
1242 return 0;
f73ac674 1243 }
133db49b 1244 return -1;
f73ac674
SH
1245}
1246
17df3d60
SP
1247static int ifa_label_match_rta(int ifindex, const struct rtattr *rta)
1248{
1249 const char *label;
17df3d60
SP
1250
1251 if (!filter.label)
1252 return 0;
1253
1254 if (rta)
1255 label = RTA_DATA(rta);
1256 else
d92cc2d0 1257 label = ll_index_to_name(ifindex);
17df3d60
SP
1258
1259 return fnmatch(filter.label, label, 0);
1260}
1261
cd554f2c 1262int print_addrinfo(struct nlmsghdr *n, void *arg)
aba5acdf 1263{
4b726cb1 1264 FILE *fp = arg;
aba5acdf
SH
1265 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1266 int len = n->nlmsg_len;
3bc1c4f2 1267 unsigned int ifa_flags;
56f5daac 1268 struct rtattr *rta_tb[IFA_MAX+1];
56f5daac 1269
aba5acdf
SH
1270 SPRINT_BUF(b1);
1271
1272 if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR)
1273 return 0;
1274 len -= NLMSG_LENGTH(sizeof(*ifa));
1275 if (len < 0) {
1276 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
1277 return -1;
1278 }
1279
1280 if (filter.flushb && n->nlmsg_type != RTM_NEWADDR)
1281 return 0;
1282
4b726cb1
SH
1283 parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa),
1284 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
aba5acdf 1285
37c9b94e
JP
1286 ifa_flags = get_ifa_flags(ifa, rta_tb[IFA_FLAGS]);
1287
aba5acdf
SH
1288 if (!rta_tb[IFA_LOCAL])
1289 rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1290 if (!rta_tb[IFA_ADDRESS])
1291 rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
1292
1293 if (filter.ifindex && filter.ifindex != ifa->ifa_index)
1294 return 0;
1295 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1296 return 0;
37c9b94e 1297 if ((filter.flags ^ ifa_flags) & filter.flagmask)
aba5acdf 1298 return 0;
aba5acdf 1299
3eb1731b 1300 if (filter.family && filter.family != ifa->ifa_family)
1301 return 0;
1302
17df3d60
SP
1303 if (ifa_label_match_rta(ifa->ifa_index, rta_tb[IFA_LABEL]))
1304 return 0;
1305
c4de9ada
SP
1306 if (inet_addr_match_rta(&filter.pfx, rta_tb[IFA_LOCAL]))
1307 return 0;
1308
aba5acdf
SH
1309 if (filter.flushb) {
1310 struct nlmsghdr *fn;
56f5daac 1311
aba5acdf
SH
1312 if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
1313 if (flush_update())
1314 return -1;
1315 }
56f5daac 1316 fn = (struct nlmsghdr *)(filter.flushb + NLMSG_ALIGN(filter.flushp));
aba5acdf
SH
1317 memcpy(fn, n, n->nlmsg_len);
1318 fn->nlmsg_type = RTM_DELADDR;
1319 fn->nlmsg_flags = NLM_F_REQUEST;
351efcde 1320 fn->nlmsg_seq = ++rth.seq;
56f5daac 1321 filter.flushp = (((char *)fn) + n->nlmsg_len) - filter.flushb;
aba5acdf
SH
1322 filter.flushed++;
1323 if (show_stats < 2)
1324 return 0;
1325 }
1326
1327 if (n->nlmsg_type == RTM_DELADDR)
d0e72011 1328 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
aba5acdf 1329
5d295bb8 1330 if (!brief) {
a3e0229e
SP
1331 const char *name;
1332
d0e72011
JF
1333 if (filter.oneline || filter.flushb) {
1334 const char *dev = ll_index_to_name(ifa->ifa_index);
1335
1336 if (is_json_context()) {
1337 print_int(PRINT_JSON,
1338 "index", NULL, ifa->ifa_index);
1339 print_string(PRINT_JSON, "dev", NULL, dev);
1340 } else {
1341 fprintf(fp, "%u: %s", ifa->ifa_index, dev);
1342 }
1343 }
1344
a3e0229e
SP
1345 name = family_name(ifa->ifa_family);
1346 if (*name != '?') {
1347 print_string(PRINT_ANY, "family", " %s ", name);
1348 } else {
1349 print_int(PRINT_ANY, "family_index", " family %d ",
1350 ifa->ifa_family);
1351 }
5d295bb8 1352 }
aba5acdf
SH
1353
1354 if (rta_tb[IFA_LOCAL]) {
d0e72011
JF
1355 print_color_string(PRINT_ANY,
1356 ifa_family_color(ifa->ifa_family),
1357 "local", "%s",
1358 format_host_rta(ifa->ifa_family,
1359 rta_tb[IFA_LOCAL]));
ff9d8f37
PS
1360 if (rta_tb[IFA_ADDRESS] &&
1361 memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
468fa020
SH
1362 RTA_DATA(rta_tb[IFA_LOCAL]),
1363 ifa->ifa_family == AF_INET ? 4 : 16)) {
d0e72011
JF
1364 print_string(PRINT_FP, NULL, " %s ", "peer");
1365 print_color_string(PRINT_ANY,
1366 ifa_family_color(ifa->ifa_family),
1367 "address",
1368 "%s",
1369 format_host_rta(ifa->ifa_family,
1370 rta_tb[IFA_ADDRESS]));
aba5acdf 1371 }
6335c5ff 1372 print_int(PRINT_ANY, "prefixlen", "/%d ", ifa->ifa_prefixlen);
78d04c7b
DA
1373
1374 if (rta_tb[IFA_RT_PRIORITY])
1375 print_uint(PRINT_ANY, "metric", "metric %u ",
1376 rta_getattr_u32(rta_tb[IFA_RT_PRIORITY]));
aba5acdf
SH
1377 }
1378
5d295bb8
AG
1379 if (brief)
1380 goto brief_exit;
1381
aba5acdf 1382 if (rta_tb[IFA_BROADCAST]) {
d0e72011
JF
1383 print_string(PRINT_FP, NULL, "%s ", "brd");
1384 print_color_string(PRINT_ANY,
1385 ifa_family_color(ifa->ifa_family),
1386 "broadcast",
1387 "%s ",
1388 format_host_rta(ifa->ifa_family,
1389 rta_tb[IFA_BROADCAST]));
aba5acdf 1390 }
d0e72011 1391
aba5acdf 1392 if (rta_tb[IFA_ANYCAST]) {
d0e72011
JF
1393 print_string(PRINT_FP, NULL, "%s ", "any");
1394 print_color_string(PRINT_ANY,
1395 ifa_family_color(ifa->ifa_family),
1396 "anycast",
1397 "%s ",
1398 format_host_rta(ifa->ifa_family,
1399 rta_tb[IFA_ANYCAST]));
aba5acdf 1400 }
d0e72011
JF
1401
1402 print_string(PRINT_ANY,
1403 "scope",
1404 "scope %s ",
1405 rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1)));
f73ac674
SH
1406
1407 print_ifa_flags(fp, ifa, ifa_flags);
1408
aba5acdf 1409 if (rta_tb[IFA_LABEL])
d0e72011
JF
1410 print_string(PRINT_ANY,
1411 "label",
1412 "%s",
1413 rta_getattr_str(rta_tb[IFA_LABEL]));
1414
aba5acdf
SH
1415 if (rta_tb[IFA_CACHEINFO]) {
1416 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
56f5daac 1417
b85076cd 1418 print_nl();
d0e72011
JF
1419 print_string(PRINT_FP, NULL, " valid_lft ", NULL);
1420
1421 if (ci->ifa_valid == INFINITY_LIFE_TIME) {
1422 print_uint(PRINT_JSON,
1423 "valid_life_time",
1424 NULL, INFINITY_LIFE_TIME);
1425 print_string(PRINT_FP, NULL, "%s", "forever");
1426 } else {
1427 print_uint(PRINT_ANY,
1428 "valid_life_time", "%usec", ci->ifa_valid);
1429 }
1430
1431 print_string(PRINT_FP, NULL, " preferred_lft ", NULL);
1432 if (ci->ifa_prefered == INFINITY_LIFE_TIME) {
1433 print_uint(PRINT_JSON,
1434 "preferred_life_time",
1435 NULL, INFINITY_LIFE_TIME);
1436 print_string(PRINT_FP, NULL, "%s", "forever");
1437 } else {
f73ac674 1438 if (ifa_flags & IFA_F_DEPRECATED)
d0e72011
JF
1439 print_int(PRINT_ANY,
1440 "preferred_life_time",
1441 "%dsec",
1442 ci->ifa_prefered);
037d950b 1443 else
d0e72011
JF
1444 print_uint(PRINT_ANY,
1445 "preferred_life_time",
1446 "%usec",
1447 ci->ifa_prefered);
037d950b 1448 }
aba5acdf 1449 }
d0e72011 1450 print_string(PRINT_FP, NULL, "%s", "\n");
5d295bb8 1451brief_exit:
aba5acdf
SH
1452 fflush(fp);
1453 return 0;
1454}
1455
5e5055bc
AH
1456static int print_selected_addrinfo(struct ifinfomsg *ifi,
1457 struct nlmsg_list *ainfo, FILE *fp)
aba5acdf 1458{
d0e72011 1459 open_json_array(PRINT_JSON, "addr_info");
56f5daac 1460 for ( ; ainfo ; ainfo = ainfo->next) {
aba5acdf
SH
1461 struct nlmsghdr *n = &ainfo->h;
1462 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1463
1464 if (n->nlmsg_type != RTM_NEWADDR)
1465 continue;
1466
6cf2609d 1467 if (n->nlmsg_len < NLMSG_LENGTH(sizeof(*ifa)))
aba5acdf
SH
1468 return -1;
1469
5e5055bc 1470 if (ifa->ifa_index != ifi->ifi_index ||
aba5acdf
SH
1471 (filter.family && filter.family != ifa->ifa_family))
1472 continue;
1473
5e5055bc
AH
1474 if (filter.up && !(ifi->ifi_flags&IFF_UP))
1475 continue;
1476
d0e72011 1477 open_json_object(NULL);
cd554f2c 1478 print_addrinfo(n, fp);
d0e72011 1479 close_json_object();
aba5acdf 1480 }
d0e72011
JF
1481 close_json_array(PRINT_JSON, NULL);
1482
5d295bb8 1483 if (brief) {
d0e72011 1484 print_string(PRINT_FP, NULL, "%s", "\n");
5d295bb8
AG
1485 fflush(fp);
1486 }
aba5acdf
SH
1487 return 0;
1488}
1489
1490
cd554f2c 1491static int store_nlmsg(struct nlmsghdr *n, void *arg)
aba5acdf 1492{
62e2e540 1493 struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg;
aba5acdf 1494 struct nlmsg_list *h;
aba5acdf 1495
56f5daac 1496 h = malloc(n->nlmsg_len+sizeof(void *));
aba5acdf
SH
1497 if (h == NULL)
1498 return -1;
1499
1500 memcpy(&h->h, n, n->nlmsg_len);
1501 h->next = NULL;
1502
62e2e540
ED
1503 if (lchain->tail)
1504 lchain->tail->next = h;
1505 else
1506 lchain->head = h;
1507 lchain->tail = h;
aba5acdf 1508
cd554f2c 1509 ll_remember_index(n, NULL);
aba5acdf
SH
1510 return 0;
1511}
1512
81824ac2
PE
1513static __u32 ipadd_dump_magic = 0x47361222;
1514
1515static int ipadd_save_prep(void)
1516{
1517 int ret;
1518
1519 if (isatty(STDOUT_FILENO)) {
14645ec2 1520 fprintf(stderr, "Not sending a binary stream to stdout\n");
81824ac2
PE
1521 return -1;
1522 }
1523
1524 ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic));
1525 if (ret != sizeof(ipadd_dump_magic)) {
1526 fprintf(stderr, "Can't write magic to dump file\n");
1527 return -1;
1528 }
1529
1530 return 0;
1531}
1532
1533static int ipadd_dump_check_magic(void)
1534{
1535 int ret;
1536 __u32 magic = 0;
1537
1538 if (isatty(STDIN_FILENO)) {
4e972d5e 1539 fprintf(stderr, "Can't restore address dump from a terminal\n");
81824ac2
PE
1540 return -1;
1541 }
1542
1543 ret = fread(&magic, sizeof(magic), 1, stdin);
1544 if (magic != ipadd_dump_magic) {
1545 fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
1546 return -1;
1547 }
1548
1549 return 0;
1550}
1551
cd554f2c 1552static int save_nlmsg(struct nlmsghdr *n, void *arg)
81824ac2
PE
1553{
1554 int ret;
1555
1556 ret = write(STDOUT_FILENO, n, n->nlmsg_len);
1557 if ((ret > 0) && (ret != n->nlmsg_len)) {
1558 fprintf(stderr, "Short write while saving nlmsg\n");
1559 ret = -EIO;
1560 }
1561
1562 return ret == n->nlmsg_len ? 0 : ret;
1563}
1564
cd554f2c 1565static int show_handler(struct rtnl_ctrl_data *ctrl,
0628cddd 1566 struct nlmsghdr *n, void *arg)
81824ac2
PE
1567{
1568 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1569
1cfcf62c
PS
1570 open_json_object(NULL);
1571 print_int(PRINT_ANY, "index", "if%d:\n", ifa->ifa_index);
cd554f2c 1572 print_addrinfo(n, stdout);
1cfcf62c 1573 close_json_object();
81824ac2
PE
1574 return 0;
1575}
1576
1577static int ipaddr_showdump(void)
1578{
1cfcf62c
PS
1579 int err;
1580
81824ac2
PE
1581 if (ipadd_dump_check_magic())
1582 exit(-1);
1583
429f314e 1584 new_json_obj(json);
1cfcf62c
PS
1585 open_json_object(NULL);
1586 open_json_array(PRINT_JSON, "addr_info");
1587
1588 err = rtnl_from_file(stdin, &show_handler, NULL);
1589
1590 close_json_array(PRINT_JSON, NULL);
1591 close_json_object();
1592 delete_json_obj();
1593
1594 exit(err);
81824ac2
PE
1595}
1596
cd554f2c 1597static int restore_handler(struct rtnl_ctrl_data *ctrl,
0628cddd 1598 struct nlmsghdr *n, void *arg)
81824ac2
PE
1599{
1600 int ret;
1601
1602 n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
1603
1604 ll_init_map(&rth);
1605
86bf43c7 1606 ret = rtnl_talk(&rth, n, NULL);
81824ac2
PE
1607 if ((ret < 0) && (errno == EEXIST))
1608 ret = 0;
1609
1610 return ret;
1611}
1612
1613static int ipaddr_restore(void)
1614{
1615 if (ipadd_dump_check_magic())
1616 exit(-1);
1617
1618 exit(rtnl_from_file(stdin, &restore_handler, NULL));
1619}
1620
4ad87594 1621void free_nlmsg_chain(struct nlmsg_chain *info)
8d07e5f7
SH
1622{
1623 struct nlmsg_list *l, *n;
1624
1625 for (l = info->head; l; l = n) {
1626 n = l->next;
1627 free(l);
1628 }
1629}
1630
1631static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1632{
1633 struct nlmsg_list *l, **lp;
1634
1635 lp = &linfo->head;
56f5daac 1636 while ((l = *lp) != NULL) {
8d07e5f7 1637 int ok = 0;
7f747fd9 1638 int missing_net_address = 1;
8d07e5f7
SH
1639 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
1640 struct nlmsg_list *a;
1641
1642 for (a = ainfo->head; a; a = a->next) {
1643 struct nlmsghdr *n = &a->h;
1644 struct ifaddrmsg *ifa = NLMSG_DATA(n);
37c9b94e
JP
1645 struct rtattr *tb[IFA_MAX + 1];
1646 unsigned int ifa_flags;
8d07e5f7 1647
7f747fd9
PP
1648 if (ifa->ifa_index != ifi->ifi_index)
1649 continue;
1650 missing_net_address = 0;
1651 if (filter.family && filter.family != ifa->ifa_family)
8d07e5f7
SH
1652 continue;
1653 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1654 continue;
37c9b94e
JP
1655
1656 parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n));
1657 ifa_flags = get_ifa_flags(ifa, tb[IFA_FLAGS]);
1658
1659 if ((filter.flags ^ ifa_flags) & filter.flagmask)
8d07e5f7 1660 continue;
17df3d60
SP
1661
1662 if (ifa_label_match_rta(ifa->ifa_index, tb[IFA_LABEL]))
1663 continue;
1664
1665 if (!tb[IFA_LOCAL])
1666 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
1667 if (inet_addr_match_rta(&filter.pfx, tb[IFA_LOCAL]))
1668 continue;
8d07e5f7
SH
1669
1670 ok = 1;
1671 break;
1672 }
7f747fd9
PP
1673 if (missing_net_address &&
1674 (filter.family == AF_UNSPEC || filter.family == AF_PACKET))
1675 ok = 1;
8d07e5f7
SH
1676 if (!ok) {
1677 *lp = l->next;
1678 free(l);
1679 } else
1680 lp = &l->next;
1681 }
1682}
1683
88470978
DA
1684static int ipaddr_dump_filter(struct nlmsghdr *nlh, int reqlen)
1685{
1686 struct ifaddrmsg *ifa = NLMSG_DATA(nlh);
1687
1688 ifa->ifa_index = filter.ifindex;
1689
1690 return 0;
1691}
1692
8d07e5f7
SH
1693static int ipaddr_flush(void)
1694{
1695 int round = 0;
1696 char flushb[4096-512];
1697
1698 filter.flushb = flushb;
1699 filter.flushp = 0;
1700 filter.flushe = sizeof(flushb);
1701
1702 while ((max_flush_loops == 0) || (round < max_flush_loops)) {
88470978
DA
1703 if (rtnl_addrdump_req(&rth, filter.family,
1704 ipaddr_dump_filter) < 0) {
8d07e5f7
SH
1705 perror("Cannot send dump request");
1706 exit(1);
1707 }
1708 filter.flushed = 0;
d25ec03e
PS
1709 if (rtnl_dump_filter_nc(&rth, print_addrinfo,
1710 stdout, NLM_F_DUMP_INTR) < 0) {
8d07e5f7
SH
1711 fprintf(stderr, "Flush terminated\n");
1712 exit(1);
1713 }
1714 if (filter.flushed == 0) {
1715 flush_done:
1716 if (show_stats) {
1717 if (round == 0)
1718 printf("Nothing to flush.\n");
1719 else
56f5daac 1720 printf("*** Flush is complete after %d round%s ***\n", round, round > 1?"s":"");
8d07e5f7
SH
1721 }
1722 fflush(stdout);
1723 return 0;
1724 }
1725 round++;
1726 if (flush_update() < 0)
1727 return 1;
1728
1729 if (show_stats) {
1730 printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed);
1731 fflush(stdout);
1732 }
1733
1734 /* If we are flushing, and specifying primary, then we
1735 * want to flush only a single round. Otherwise, we'll
1736 * start flushing secondaries that were promoted to
1737 * primaries.
1738 */
1739 if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY))
1740 goto flush_done;
1741 }
1742 fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops);
1743 fflush(stderr);
1744 return 1;
1745}
1746
b0a4ce62
DA
1747static int iplink_filter_req(struct nlmsghdr *nlh, int reqlen)
1748{
1749 int err;
1750
1751 err = addattr32(nlh, reqlen, IFLA_EXT_MASK, RTEXT_FILTER_VF);
1752 if (err)
1753 return err;
1754
1755 if (filter.master) {
1756 err = addattr32(nlh, reqlen, IFLA_MASTER, filter.master);
1757 if (err)
1758 return err;
1759 }
1760
1761 if (filter.kind) {
1762 struct rtattr *linkinfo;
1763
1764 linkinfo = addattr_nest(nlh, reqlen, IFLA_LINKINFO);
1765
1766 err = addattr_l(nlh, reqlen, IFLA_INFO_KIND, filter.kind,
1767 strlen(filter.kind));
1768 if (err)
1769 return err;
1770
1771 addattr_nest_end(nlh, linkinfo);
1772 }
1773
1774 return 0;
1775}
1776
88470978
DA
1777static int ipaddr_link_get(int index, struct nlmsg_chain *linfo)
1778{
1779 struct iplink_req req = {
1780 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
1781 .n.nlmsg_flags = NLM_F_REQUEST,
1782 .n.nlmsg_type = RTM_GETLINK,
1783 .i.ifi_family = filter.family,
1784 .i.ifi_index = index,
1785 };
1786 __u32 filt_mask = RTEXT_FILTER_VF;
1787 struct nlmsghdr *answer;
1788
1789 if (!show_stats)
1790 filt_mask |= RTEXT_FILTER_SKIP_STATS;
1791
1792 addattr32(&req.n, sizeof(req), IFLA_EXT_MASK, filt_mask);
1793
1794 if (rtnl_talk(&rth, &req.n, &answer) < 0) {
1795 perror("Cannot send link request");
1796 return 1;
1797 }
1798
1799 if (store_nlmsg(answer, linfo) < 0) {
1800 fprintf(stderr, "Failed to process link information\n");
1801 return 1;
1802 }
1803
1804 return 0;
1805}
1806
4ad87594
DA
1807/* fills in linfo with link data and optionally ainfo with address info
1808 * caller can walk lists as desired and must call free_nlmsg_chain for
1809 * both when done
1810 */
7ca9cee8 1811int ip_link_list(req_filter_fn_t filter_fn, struct nlmsg_chain *linfo)
4ad87594 1812{
31ae2912 1813 if (rtnl_linkdump_req_filter_fn(&rth, preferred_family,
4ad87594
DA
1814 filter_fn) < 0) {
1815 perror("Cannot send dump request");
1816 return 1;
1817 }
1818
1819 if (rtnl_dump_filter(&rth, store_nlmsg, linfo) < 0) {
1820 fprintf(stderr, "Dump terminated\n");
1821 return 1;
1822 }
1823
7ca9cee8
DA
1824 return 0;
1825}
4ad87594 1826
7ca9cee8
DA
1827static int ip_addr_list(struct nlmsg_chain *ainfo)
1828{
88470978 1829 if (rtnl_addrdump_req(&rth, filter.family, ipaddr_dump_filter) < 0) {
7ca9cee8
DA
1830 perror("Cannot send dump request");
1831 return 1;
1832 }
1833
1834 if (rtnl_dump_filter(&rth, store_nlmsg, ainfo) < 0) {
1835 fprintf(stderr, "Dump terminated\n");
1836 return 1;
4ad87594
DA
1837 }
1838
1839 return 0;
1840}
1841
81824ac2 1842static int ipaddr_list_flush_or_save(int argc, char **argv, int action)
aba5acdf 1843{
62e2e540 1844 struct nlmsg_chain linfo = { NULL, NULL};
7ca9cee8 1845 struct nlmsg_chain _ainfo = { NULL, NULL}, *ainfo = &_ainfo;
8d07e5f7 1846 struct nlmsg_list *l;
aba5acdf
SH
1847 char *filter_dev = NULL;
1848 int no_link = 0;
1849
093b7646 1850 ipaddr_reset_filter(oneline, 0);
aba5acdf 1851 filter.showqueue = 1;
906dfe48 1852 filter.family = preferred_family;
c4fdf75d 1853 filter.group = -1;
f960c92a 1854
81824ac2 1855 if (action == IPADD_FLUSH) {
aba5acdf
SH
1856 if (argc <= 0) {
1857 fprintf(stderr, "Flush requires arguments.\n");
f960c92a 1858
aba5acdf
SH
1859 return -1;
1860 }
1861 if (filter.family == AF_PACKET) {
1862 fprintf(stderr, "Cannot flush link addresses.\n");
1863 return -1;
1864 }
1865 }
1866
1867 while (argc > 0) {
1868 if (strcmp(*argv, "to") == 0) {
1869 NEXT_ARG();
c4de9ada
SP
1870 if (get_prefix(&filter.pfx, *argv, filter.family))
1871 invarg("invalid \"to\"\n", *argv);
aba5acdf
SH
1872 if (filter.family == AF_UNSPEC)
1873 filter.family = filter.pfx.family;
1874 } else if (strcmp(*argv, "scope") == 0) {
56f5daac
SH
1875 unsigned int scope = 0;
1876
aba5acdf
SH
1877 NEXT_ARG();
1878 filter.scopemask = -1;
1879 if (rtnl_rtscope_a2n(&scope, *argv)) {
1880 if (strcmp(*argv, "all") != 0)
1881 invarg("invalid \"scope\"\n", *argv);
1882 scope = RT_SCOPE_NOWHERE;
1883 filter.scopemask = 0;
1884 }
1885 filter.scope = scope;
1886 } else if (strcmp(*argv, "up") == 0) {
1887 filter.up = 1;
f73ac674
SH
1888 } else if (get_filter(*argv) == 0) {
1889
aba5acdf
SH
1890 } else if (strcmp(*argv, "label") == 0) {
1891 NEXT_ARG();
1892 filter.label = *argv;
f960c92a
VD
1893 } else if (strcmp(*argv, "group") == 0) {
1894 NEXT_ARG();
1895 if (rtnl_group_a2n(&filter.group, *argv))
1896 invarg("Invalid \"group\" value\n", *argv);
1b944148
VK
1897 } else if (strcmp(*argv, "master") == 0) {
1898 int ifindex;
56f5daac 1899
1b944148
VK
1900 NEXT_ARG();
1901 ifindex = ll_name_to_index(*argv);
1902 if (!ifindex)
1903 invarg("Device does not exist\n", *argv);
1904 filter.master = ifindex;
104444c2
DA
1905 } else if (strcmp(*argv, "vrf") == 0) {
1906 int ifindex;
1907
1908 NEXT_ARG();
1909 ifindex = ll_name_to_index(*argv);
1910 if (!ifindex)
1911 invarg("Not a valid VRF name\n", *argv);
1912 if (!name_is_vrf(*argv))
1913 invarg("Not a valid VRF name\n", *argv);
1914 filter.master = ifindex;
24604eb2 1915 } else if (strcmp(*argv, "type") == 0) {
e0513807
PS
1916 int soff;
1917
712249d8 1918 NEXT_ARG();
e0513807
PS
1919 soff = strlen(*argv) - strlen("_slave");
1920 if (!strcmp(*argv + soff, "_slave")) {
1921 (*argv)[soff] = '\0';
1922 filter.slave_kind = *argv;
1923 } else {
1924 filter.kind = *argv;
1925 }
aba5acdf 1926 } else {
468fa020 1927 if (strcmp(*argv, "dev") == 0)
aba5acdf 1928 NEXT_ARG();
468fa020 1929 else if (matches(*argv, "help") == 0)
aba5acdf
SH
1930 usage();
1931 if (filter_dev)
1932 duparg2("dev", *argv);
1933 filter_dev = *argv;
1934 }
1935 argv++; argc--;
1936 }
1937
aba5acdf
SH
1938 if (filter_dev) {
1939 filter.ifindex = ll_name_to_index(filter_dev);
1940 if (filter.ifindex <= 0) {
1941 fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev);
1942 return -1;
1943 }
1944 }
1945
81824ac2 1946 if (action == IPADD_FLUSH)
8d07e5f7 1947 return ipaddr_flush();
351efcde 1948
81824ac2
PE
1949 if (action == IPADD_SAVE) {
1950 if (ipadd_save_prep())
1951 exit(1);
1952
88470978
DA
1953 if (rtnl_addrdump_req(&rth, preferred_family,
1954 ipaddr_dump_filter) < 0) {
81824ac2
PE
1955 perror("Cannot send dump request");
1956 exit(1);
1957 }
1958
1959 if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) {
1960 fprintf(stderr, "Save terminated\n");
1961 exit(1);
1962 }
1963
1964 exit(0);
1965 }
1966
d0e72011
JF
1967 /*
1968 * Initialize a json_writer and open an array object
1969 * if -json was specified.
1970 */
429f314e 1971 new_json_obj(json);
d0e72011 1972
50b9950d
RP
1973 /*
1974 * If only filter_dev present and none of the other
1975 * link filters are present, use RTM_GETLINK to get
1976 * the link device
1977 */
1978 if (filter_dev && filter.group == -1 && do_link == 1) {
260137e2 1979 if (iplink_get(filter_dev, RTEXT_FILTER_VF) < 0) {
50b9950d 1980 perror("Cannot send link get request");
d0e72011 1981 delete_json_obj();
50b9950d
RP
1982 exit(1);
1983 }
d0e72011 1984 delete_json_obj();
d56c7dde 1985 goto out;
50b9950d
RP
1986 }
1987
88470978
DA
1988 if (filter.ifindex) {
1989 if (ipaddr_link_get(filter.ifindex, &linfo) != 0)
1990 goto out;
1991 } else {
1992 if (ip_link_list(iplink_filter_req, &linfo) != 0)
1993 goto out;
1994 }
4ad87594 1995
7ca9cee8 1996 if (filter.family != AF_PACKET) {
8d07e5f7
SH
1997 if (filter.oneline)
1998 no_link = 1;
1999
7ca9cee8
DA
2000 if (ip_addr_list(ainfo) != 0)
2001 goto out;
aba5acdf 2002
4ad87594 2003 ipaddr_filter(&linfo, ainfo);
7ca9cee8 2004 }
aba5acdf 2005
8d07e5f7 2006 for (l = linfo.head; l; l = l->next) {
1bccd1e4
SP
2007 struct nlmsghdr *n = &l->h;
2008 struct ifinfomsg *ifi = NLMSG_DATA(n);
c956e9a9 2009 int res = 0;
5d5cf1b4 2010
d0e72011 2011 open_json_object(NULL);
c956e9a9 2012 if (brief || !no_link)
cd554f2c 2013 res = print_linkinfo(n, stdout);
1bccd1e4
SP
2014 if (res >= 0 && filter.family != AF_PACKET)
2015 print_selected_addrinfo(ifi, ainfo->head, stdout);
2016 if (res > 0 && !do_link && show_stats)
2017 print_link_stats(stdout, n);
d0e72011 2018 close_json_object();
aba5acdf 2019 }
8d07e5f7
SH
2020 fflush(stdout);
2021
4ad87594 2022out:
88470978 2023 free_nlmsg_chain(ainfo);
8d07e5f7 2024 free_nlmsg_chain(&linfo);
d0e72011 2025 delete_json_obj();
351efcde 2026 return 0;
aba5acdf
SH
2027}
2028
f89a2a05
SC
2029static void
2030ipaddr_loop_each_vf(struct rtattr *tb[], int vfnum, int *min, int *max)
2031{
2032 struct rtattr *vflist = tb[IFLA_VFINFO_LIST];
2033 struct rtattr *i, *vf[IFLA_VF_MAX+1];
2034 struct ifla_vf_rate *vf_rate;
2035 int rem;
2036
2037 rem = RTA_PAYLOAD(vflist);
2038
2039 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
2040 parse_rtattr_nested(vf, IFLA_VF_MAX, i);
39315157
GP
2041
2042 if (!vf[IFLA_VF_RATE]) {
2043 fprintf(stderr, "VF min/max rate API not supported\n");
2044 exit(1);
2045 }
2046
f89a2a05
SC
2047 vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
2048 if (vf_rate->vf == vfnum) {
2049 *min = vf_rate->min_tx_rate;
2050 *max = vf_rate->max_tx_rate;
2051 return;
2052 }
2053 }
2054 fprintf(stderr, "Cannot find VF %d\n", vfnum);
2055 exit(1);
2056}
2057
65083b5f 2058void ipaddr_get_vf_rate(int vfnum, int *min, int *max, const char *dev)
f89a2a05
SC
2059{
2060 struct nlmsg_chain linfo = { NULL, NULL};
2061 struct rtattr *tb[IFLA_MAX+1];
2062 struct ifinfomsg *ifi;
2063 struct nlmsg_list *l;
2064 struct nlmsghdr *n;
65083b5f
SH
2065 int idx, len;
2066
2067 idx = ll_name_to_index(dev);
2068 if (idx == 0) {
2069 fprintf(stderr, "Device %s does not exist\n", dev);
2070 exit(1);
2071 }
f89a2a05 2072
31ae2912 2073 if (rtnl_linkdump_req(&rth, AF_UNSPEC) < 0) {
f89a2a05
SC
2074 perror("Cannot send dump request");
2075 exit(1);
2076 }
2077 if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) {
2078 fprintf(stderr, "Dump terminated\n");
2079 exit(1);
2080 }
2081 for (l = linfo.head; l; l = l->next) {
2082 n = &l->h;
2083 ifi = NLMSG_DATA(n);
2084
2085 len = n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi));
1199c4f5 2086 if (len < 0 || (idx && idx != ifi->ifi_index))
f89a2a05
SC
2087 continue;
2088
2089 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
2090
2091 if ((tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF])) {
2092 ipaddr_loop_each_vf(tb, vfnum, min, max);
2093 return;
2094 }
2095 }
2096}
2097
aba5acdf
SH
2098int ipaddr_list_link(int argc, char **argv)
2099{
2100 preferred_family = AF_PACKET;
2101 do_link = 1;
81824ac2 2102 return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST);
aba5acdf
SH
2103}
2104
093b7646 2105void ipaddr_reset_filter(int oneline, int ifindex)
aba5acdf
SH
2106{
2107 memset(&filter, 0, sizeof(filter));
2108 filter.oneline = oneline;
093b7646 2109 filter.ifindex = ifindex;
aba5acdf
SH
2110}
2111
3d866ba2 2112static int default_scope(inet_prefix *lcl)
aba5acdf
SH
2113{
2114 if (lcl->family == AF_INET) {
56f5daac 2115 if (lcl->bytelen >= 1 && *(__u8 *)&lcl->data == 127)
aba5acdf
SH
2116 return RT_SCOPE_HOST;
2117 }
2118 return 0;
2119}
2120
e31867ac
MC
2121static bool ipaddr_is_multicast(inet_prefix *a)
2122{
2123 if (a->family == AF_INET)
2124 return IN_MULTICAST(ntohl(a->data[0]));
2125 else if (a->family == AF_INET6)
2126 return IN6_IS_ADDR_MULTICAST(a->data);
2127 else
2128 return false;
2129}
2130
cad73425
PT
2131static bool is_valid_label(const char *dev, const char *label)
2132{
2133 size_t len = strlen(dev);
2134
2135 if (strncmp(label, dev, len) != 0)
2136 return false;
2137
2138 return label[len] == '\0' || label[len] == ':';
2139}
2140
3d866ba2 2141static int ipaddr_modify(int cmd, int flags, int argc, char **argv)
aba5acdf 2142{
aba5acdf 2143 struct {
4806867a
SH
2144 struct nlmsghdr n;
2145 struct ifaddrmsg ifa;
4b726cb1 2146 char buf[256];
d17b136f
PS
2147 } req = {
2148 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)),
2149 .n.nlmsg_flags = NLM_F_REQUEST | flags,
2150 .n.nlmsg_type = cmd,
2151 .ifa.ifa_family = preferred_family,
2152 };
aba5acdf
SH
2153 char *d = NULL;
2154 char *l = NULL;
f082b64f 2155 char *lcl_arg = NULL;
35546df7
MN
2156 char *valid_lftp = NULL;
2157 char *preferred_lftp = NULL;
d044ea3e 2158 inet_prefix lcl = {};
aba5acdf
SH
2159 inet_prefix peer;
2160 int local_len = 0;
2161 int peer_len = 0;
2162 int brd_len = 0;
2163 int any_len = 0;
2164 int scoped = 0;
141bb606
MN
2165 __u32 preferred_lft = INFINITY_LIFE_TIME;
2166 __u32 valid_lft = INFINITY_LIFE_TIME;
37c9b94e 2167 unsigned int ifa_flags = 0;
aba5acdf 2168
aba5acdf
SH
2169 while (argc > 0) {
2170 if (strcmp(*argv, "peer") == 0 ||
2171 strcmp(*argv, "remote") == 0) {
2172 NEXT_ARG();
2173
2174 if (peer_len)
2175 duparg("peer", *argv);
2176 get_prefix(&peer, *argv, req.ifa.ifa_family);
2177 peer_len = peer.bytelen;
2178 if (req.ifa.ifa_family == AF_UNSPEC)
2179 req.ifa.ifa_family = peer.family;
2180 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen);
2181 req.ifa.ifa_prefixlen = peer.bitlen;
2182 } else if (matches(*argv, "broadcast") == 0 ||
2183 strcmp(*argv, "brd") == 0) {
2184 inet_prefix addr;
56f5daac 2185
aba5acdf
SH
2186 NEXT_ARG();
2187 if (brd_len)
2188 duparg("broadcast", *argv);
2189 if (strcmp(*argv, "+") == 0)
2190 brd_len = -1;
2191 else if (strcmp(*argv, "-") == 0)
2192 brd_len = -2;
2193 else {
2194 get_addr(&addr, *argv, req.ifa.ifa_family);
2195 if (req.ifa.ifa_family == AF_UNSPEC)
2196 req.ifa.ifa_family = addr.family;
2197 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen);
2198 brd_len = addr.bytelen;
2199 }
2200 } else if (strcmp(*argv, "anycast") == 0) {
2201 inet_prefix addr;
56f5daac 2202
aba5acdf
SH
2203 NEXT_ARG();
2204 if (any_len)
2205 duparg("anycast", *argv);
2206 get_addr(&addr, *argv, req.ifa.ifa_family);
2207 if (req.ifa.ifa_family == AF_UNSPEC)
2208 req.ifa.ifa_family = addr.family;
2209 addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen);
2210 any_len = addr.bytelen;
2211 } else if (strcmp(*argv, "scope") == 0) {
56f5daac
SH
2212 unsigned int scope = 0;
2213
aba5acdf
SH
2214 NEXT_ARG();
2215 if (rtnl_rtscope_a2n(&scope, *argv))
f1675d61 2216 invarg("invalid scope value.", *argv);
aba5acdf
SH
2217 req.ifa.ifa_scope = scope;
2218 scoped = 1;
2219 } else if (strcmp(*argv, "dev") == 0) {
2220 NEXT_ARG();
2221 d = *argv;
2222 } else if (strcmp(*argv, "label") == 0) {
2223 NEXT_ARG();
2224 l = *argv;
2225 addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1);
78d04c7b
DA
2226 } else if (matches(*argv, "metric") == 0 ||
2227 matches(*argv, "priority") == 0 ||
2228 matches(*argv, "preference") == 0) {
2229 __u32 metric;
2230
2231 NEXT_ARG();
2232 if (get_u32(&metric, *argv, 0))
2233 invarg("\"metric\" value is invalid\n", *argv);
2234 addattr32(&req.n, sizeof(req), IFA_RT_PRIORITY, metric);
35546df7
MN
2235 } else if (matches(*argv, "valid_lft") == 0) {
2236 if (valid_lftp)
2237 duparg("valid_lft", *argv);
2238 NEXT_ARG();
2239 valid_lftp = *argv;
2240 if (set_lifetime(&valid_lft, *argv))
2241 invarg("valid_lft value", *argv);
2242 } else if (matches(*argv, "preferred_lft") == 0) {
2243 if (preferred_lftp)
2244 duparg("preferred_lft", *argv);
2245 NEXT_ARG();
2246 preferred_lftp = *argv;
2247 if (set_lifetime(&preferred_lft, *argv))
2248 invarg("preferred_lft value", *argv);
bac735c5 2249 } else if (strcmp(*argv, "home") == 0) {
37c9b94e 2250 ifa_flags |= IFA_F_HOMEADDRESS;
bac735c5 2251 } else if (strcmp(*argv, "nodad") == 0) {
37c9b94e 2252 ifa_flags |= IFA_F_NODAD;
5b7e21c4
JP
2253 } else if (strcmp(*argv, "mngtmpaddr") == 0) {
2254 ifa_flags |= IFA_F_MANAGETEMPADDR;
58c69b22
TH
2255 } else if (strcmp(*argv, "noprefixroute") == 0) {
2256 ifa_flags |= IFA_F_NOPREFIXROUTE;
e31867ac
MC
2257 } else if (strcmp(*argv, "autojoin") == 0) {
2258 ifa_flags |= IFA_F_MCAUTOJOIN;
aba5acdf 2259 } else {
468fa020 2260 if (strcmp(*argv, "local") == 0)
aba5acdf 2261 NEXT_ARG();
aba5acdf
SH
2262 if (matches(*argv, "help") == 0)
2263 usage();
2264 if (local_len)
2265 duparg2("local", *argv);
f082b64f 2266 lcl_arg = *argv;
aba5acdf
SH
2267 get_prefix(&lcl, *argv, req.ifa.ifa_family);
2268 if (req.ifa.ifa_family == AF_UNSPEC)
2269 req.ifa.ifa_family = lcl.family;
2270 addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen);
2271 local_len = lcl.bytelen;
2272 }
2273 argc--; argv++;
2274 }
8b21f88d
WC
2275 if (ifa_flags <= 0xff)
2276 req.ifa.ifa_flags = ifa_flags;
2277 else
2278 addattr32(&req.n, sizeof(req), IFA_FLAGS, ifa_flags);
37c9b94e 2279
aba5acdf
SH
2280 if (d == NULL) {
2281 fprintf(stderr, "Not enough information: \"dev\" argument is required.\n");
2282 return -1;
2283 }
cad73425
PT
2284 if (l && !is_valid_label(d, l)) {
2285 fprintf(stderr,
2286 "\"label\" (%s) must match \"dev\" (%s) or be prefixed by \"dev\" with a colon.\n",
2287 l, d);
1db61e02 2288 return -1;
aba5acdf
SH
2289 }
2290
f082b64f 2291 if (peer_len == 0 && local_len) {
2292 if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) {
2293 fprintf(stderr,
468fa020
SH
2294 "Warning: Executing wildcard deletion to stay compatible with old scripts.\n"
2295 " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n"
2296 " This special behaviour is likely to disappear in further releases,\n"
f082b64f 2297 " fix your scripts!\n", lcl_arg, local_len*8);
2298 } else {
2299 peer = lcl;
2300 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen);
2301 }
aba5acdf
SH
2302 }
2303 if (req.ifa.ifa_prefixlen == 0)
2304 req.ifa.ifa_prefixlen = lcl.bitlen;
2305
2306 if (brd_len < 0 && cmd != RTM_DELADDR) {
2307 inet_prefix brd;
2308 int i;
56f5daac 2309
aba5acdf
SH
2310 if (req.ifa.ifa_family != AF_INET) {
2311 fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n");
2312 return -1;
2313 }
2314 brd = peer;
2315 if (brd.bitlen <= 30) {
4b726cb1 2316 for (i = 31; i >= brd.bitlen; i--) {
aba5acdf
SH
2317 if (brd_len == -1)
2318 brd.data[0] |= htonl(1<<(31-i));
2319 else
2320 brd.data[0] &= ~htonl(1<<(31-i));
2321 }
2322 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen);
2323 brd_len = brd.bytelen;
2324 }
2325 }
2326 if (!scoped && cmd != RTM_DELADDR)
2327 req.ifa.ifa_scope = default_scope(&lcl);
2328
fe99adbc
SP
2329 req.ifa.ifa_index = ll_name_to_index(d);
2330 if (!req.ifa.ifa_index)
2331 return nodev(d);
aba5acdf 2332
35546df7 2333 if (valid_lftp || preferred_lftp) {
d17b136f
PS
2334 struct ifa_cacheinfo cinfo = {};
2335
35546df7
MN
2336 if (!valid_lft) {
2337 fprintf(stderr, "valid_lft is zero\n");
2338 return -1;
2339 }
2340 if (valid_lft < preferred_lft) {
2341 fprintf(stderr, "preferred_lft is greater than valid_lft\n");
2342 return -1;
2343 }
2344
35546df7
MN
2345 cinfo.ifa_prefered = preferred_lft;
2346 cinfo.ifa_valid = valid_lft;
2347 addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo,
2348 sizeof(cinfo));
2349 }
2350
e31867ac
MC
2351 if ((ifa_flags & IFA_F_MCAUTOJOIN) && !ipaddr_is_multicast(&lcl)) {
2352 fprintf(stderr, "autojoin needs multicast address\n");
2353 return -1;
2354 }
2355
86bf43c7 2356 if (rtnl_talk(&rth, &req.n, NULL) < 0)
1db61e02 2357 return -2;
aba5acdf 2358
351efcde 2359 return 0;
aba5acdf
SH
2360}
2361
2362int do_ipaddr(int argc, char **argv)
2363{
2364 if (argc < 1)
81824ac2 2365 return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST);
aba5acdf 2366 if (matches(*argv, "add") == 0)
0aef366b
NT
2367 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
2368 if (matches(*argv, "change") == 0 ||
2369 strcmp(*argv, "chg") == 0)
2370 return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1);
2371 if (matches(*argv, "replace") == 0)
2372 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
aba5acdf 2373 if (matches(*argv, "delete") == 0)
0aef366b 2374 return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1);
aba5acdf
SH
2375 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
2376 || matches(*argv, "lst") == 0)
81824ac2 2377 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST);
aba5acdf 2378 if (matches(*argv, "flush") == 0)
81824ac2
PE
2379 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH);
2380 if (matches(*argv, "save") == 0)
2381 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE);
2382 if (matches(*argv, "showdump") == 0)
2383 return ipaddr_showdump();
2384 if (matches(*argv, "restore") == 0)
2385 return ipaddr_restore();
aba5acdf
SH
2386 if (matches(*argv, "help") == 0)
2387 usage();
4e972d5e 2388 fprintf(stderr, "Command \"%s\" is unknown, try \"ip address help\".\n", *argv);
aba5acdf
SH
2389 exit(-1);
2390}