]> git.proxmox.com Git - mirror_iproute2.git/blame - ip/ipaddress.c
utils: Reimplement ll_idx_n2a() and introduce ll_idx_a2n()
[mirror_iproute2.git] / ip / ipaddress.c
CommitLineData
aba5acdf
SH
1/*
2 * ipaddress.c "ip address".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
aba5acdf
SH
11 */
12
13#include <stdio.h>
14#include <stdlib.h>
15#include <unistd.h>
e6e6fb5c 16#include <inttypes.h>
aba5acdf
SH
17#include <fcntl.h>
18#include <sys/ioctl.h>
19#include <sys/socket.h>
110e84a0 20#include <sys/param.h>
5bd9dd49 21#include <errno.h>
aba5acdf
SH
22#include <netinet/in.h>
23#include <arpa/inet.h>
24#include <string.h>
25#include <fnmatch.h>
26
e5779fb2
SH
27#include <linux/netdevice.h>
28#include <linux/if_arp.h>
29#include <linux/sockios.h>
ccdcbf35 30#include <linux/net_namespace.h>
e5779fb2 31
d0e72011 32#include "utils.h"
aba5acdf
SH
33#include "rt_names.h"
34#include "utils.h"
35#include "ll_map.h"
36#include "ip_common.h"
d7bd2db5 37#include "color.h"
aba5acdf 38
81824ac2
PE
39enum {
40 IPADD_LIST,
41 IPADD_FLUSH,
42 IPADD_SAVE,
43};
7b3d366e 44
741dd5cd 45static struct link_filter filter;
aba5acdf
SH
46static int do_link;
47
48static void usage(void) __attribute__((noreturn));
49
50static void usage(void)
51{
52 if (do_link) {
53 iplink_usage();
54 }
4e972d5e 55 fprintf(stderr, "Usage: ip address {add|change|replace} IFADDR dev IFNAME [ LIFETIME ]\n");
a1f27794 56 fprintf(stderr, " [ CONFFLAG-LIST ]\n");
4e972d5e 57 fprintf(stderr, " ip address del IFADDR dev IFNAME [mngtmpaddr]\n");
24604eb2 58 fprintf(stderr, " ip address {save|flush} [ dev IFNAME ] [ scope SCOPE-ID ]\n");
4e972d5e 59 fprintf(stderr, " [ to PREFIX ] [ FLAG-LIST ] [ label LABEL ] [up]\n");
24604eb2
PS
60 fprintf(stderr, " ip address [ show [ dev IFNAME ] [ scope SCOPE-ID ] [ master DEVICE ]\n");
61 fprintf(stderr, " [ type TYPE ] [ to PREFIX ] [ FLAG-LIST ]\n");
104444c2 62 fprintf(stderr, " [ label LABEL ] [up] [ vrf NAME ] ]\n");
4e972d5e 63 fprintf(stderr, " ip address {showdump|restore}\n");
aba5acdf
SH
64 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
65 fprintf(stderr, " [ broadcast ADDR ] [ anycast ADDR ]\n");
4e972d5e 66 fprintf(stderr, " [ label IFNAME ] [ scope SCOPE-ID ]\n");
aba5acdf
SH
67 fprintf(stderr, "SCOPE-ID := [ host | link | global | NUMBER ]\n");
68 fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] FLAG\n");
69 fprintf(stderr, "FLAG := [ permanent | dynamic | secondary | primary |\n");
b5f39b25 70 fprintf(stderr, " [-]tentative | [-]deprecated | [-]dadfailed | temporary |\n");
a1f27794 71 fprintf(stderr, " CONFFLAG-LIST ]\n");
bac735c5 72 fprintf(stderr, "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n");
e31867ac 73 fprintf(stderr, "CONFFLAG := [ home | nodad | mngtmpaddr | noprefixroute | autojoin ]\n");
35546df7
MN
74 fprintf(stderr, "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n");
75 fprintf(stderr, "LFT := forever | SECONDS\n");
7827b376 76 fprintf(stderr, "TYPE := { vlan | veth | vcan | vxcan | dummy | ifb | macvlan | macvtap |\n");
577cfe0b 77 fprintf(stderr, " bridge | bond | ipoib | ip6tnl | ipip | sit | vxlan | lowpan |\n");
8595cc40
WT
78 fprintf(stderr, " gre | gretap | erspan | ip6gre | ip6gretap | ip6erspan | vti |\n");
79 fprintf(stderr, " nlmon | can | bond_slave | ipvlan | geneve | bridge_slave |\n");
7d424c71 80 fprintf(stderr, " hsr | macsec | netdevsim\n");
35546df7 81
aba5acdf
SH
82 exit(-1);
83}
84
56f5daac 85static void print_link_flags(FILE *fp, unsigned int flags, unsigned int mdown)
aba5acdf 86{
d0e72011 87 open_json_array(PRINT_ANY, is_json_context() ? "flags" : "<");
73b49e9f 88 if (flags & IFF_UP && !(flags & IFF_RUNNING))
d0e72011
JF
89 print_string(PRINT_ANY, NULL,
90 flags ? "%s," : "%s", "NO-CARRIER");
aba5acdf 91 flags &= ~IFF_RUNNING;
d0e72011
JF
92#define _PF(f) if (flags&IFF_##f) { \
93 flags &= ~IFF_##f ; \
94 print_string(PRINT_ANY, NULL, flags ? "%s," : "%s", #f); }
aba5acdf
SH
95 _PF(LOOPBACK);
96 _PF(BROADCAST);
97 _PF(POINTOPOINT);
98 _PF(MULTICAST);
99 _PF(NOARP);
100 _PF(ALLMULTI);
101 _PF(PROMISC);
102 _PF(MASTER);
103 _PF(SLAVE);
104 _PF(DEBUG);
105 _PF(DYNAMIC);
106 _PF(AUTOMEDIA);
107 _PF(PORTSEL);
108 _PF(NOTRAILERS);
109 _PF(UP);
dcb283c3
TG
110 _PF(LOWER_UP);
111 _PF(DORMANT);
98f9a1d2 112 _PF(ECHO);
aba5acdf 113#undef _PF
1124ffb7 114 if (flags)
d0e72011 115 print_hex(PRINT_ANY, NULL, "%x", flags);
aba5acdf 116 if (mdown)
d0e72011
JF
117 print_string(PRINT_ANY, NULL, ",%s", "M-DOWN");
118 close_json_array(PRINT_ANY, "> ");
aba5acdf
SH
119}
120
3d866ba2 121static const char *oper_states[] = {
0612519e 122 "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN",
3d866ba2
SH
123 "TESTING", "DORMANT", "UP"
124};
125
126static void print_operstate(FILE *f, __u8 state)
127{
a1121aa1 128 if (state >= ARRAY_SIZE(oper_states)) {
d0e72011
JF
129 if (is_json_context())
130 print_uint(PRINT_JSON, "operstate_index", NULL, state);
131 else
132 print_0xhex(PRINT_FP, NULL, "state %#x", state);
a1121aa1 133 } else if (brief) {
d0e72011
JF
134 print_color_string(PRINT_ANY,
135 oper_state_color(state),
136 "operstate",
137 "%-14s ",
138 oper_states[state]);
a1121aa1 139 } else {
d0e72011
JF
140 if (is_json_context())
141 print_string(PRINT_JSON,
142 "operstate",
143 NULL, oper_states[state]);
144 else {
145 fprintf(f, "state ");
146 color_fprintf(f, oper_state_color(state),
147 "%s ", oper_states[state]);
148 }
d7bd2db5 149 }
3d866ba2
SH
150}
151
4f2fdd44
SH
152int get_operstate(const char *name)
153{
154 int i;
155
56f5daac 156 for (i = 0; i < ARRAY_SIZE(oper_states); i++)
4f2fdd44
SH
157 if (strcasecmp(name, oper_states[i]) == 0)
158 return i;
159 return -1;
160}
161
f78e316f 162static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1])
aba5acdf 163{
f78e316f
ED
164 int qlen;
165
166 if (tb[IFLA_TXQLEN])
9f1370c0 167 qlen = rta_getattr_u32(tb[IFLA_TXQLEN]);
f78e316f 168 else {
d17b136f 169 struct ifreq ifr = {};
f78e316f
ED
170 int s = socket(AF_INET, SOCK_STREAM, 0);
171
172 if (s < 0)
173 return;
174
ff24746c 175 strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME]));
f78e316f 176 if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) {
d3603518 177 fprintf(f, "ioctl(SIOCGIFTXQLEN) failed: %s\n", strerror(errno));
f78e316f
ED
178 close(s);
179 return;
180 }
aba5acdf 181 close(s);
f78e316f 182 qlen = ifr.ifr_qlen;
aba5acdf 183 }
f78e316f 184 if (qlen)
d0e72011 185 print_int(PRINT_ANY, "txqlen", "qlen %d", qlen);
aba5acdf
SH
186}
187
82499282
SH
188static const char *link_modes[] = {
189 "DEFAULT", "DORMANT"
190};
191
192static void print_linkmode(FILE *f, struct rtattr *tb)
193{
194 unsigned int mode = rta_getattr_u8(tb);
195
56f5daac 196 if (mode >= ARRAY_SIZE(link_modes))
d0e72011
JF
197 print_int(PRINT_ANY,
198 "linkmode_index",
199 "mode %d ",
200 mode);
82499282 201 else
d0e72011
JF
202 print_string(PRINT_ANY,
203 "linkmode",
204 "mode %s "
205 , link_modes[mode]);
82499282
SH
206}
207
e0513807 208static char *parse_link_kind(struct rtattr *tb, bool slave)
712249d8
VK
209{
210 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
e0513807 211 int attr = slave ? IFLA_INFO_SLAVE_KIND : IFLA_INFO_KIND;
712249d8
VK
212
213 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
214
e0513807
PS
215 if (linkinfo[attr])
216 return RTA_DATA(linkinfo[attr]);
712249d8
VK
217
218 return "";
219}
220
03ac85b7 221static int match_link_kind(struct rtattr **tb, const char *kind, bool slave)
e0513807
PS
222{
223 if (!tb[IFLA_LINKINFO])
224 return -1;
225
226 return strcmp(parse_link_kind(tb[IFLA_LINKINFO], slave), kind);
227}
228
1d934839
PM
229static void print_linktype(FILE *fp, struct rtattr *tb)
230{
231 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
232 struct link_util *lu;
fbea6115 233 struct link_util *slave_lu;
22a84711 234 char slave[32];
1d934839
PM
235
236 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
d0e72011 237 open_json_object("linkinfo");
1d934839 238
fbea6115 239 if (linkinfo[IFLA_INFO_KIND]) {
9f1370c0
SH
240 const char *kind
241 = rta_getattr_str(linkinfo[IFLA_INFO_KIND]);
1d934839 242
d0e72011
JF
243 print_string(PRINT_FP, NULL, "%s", _SL_);
244 print_string(PRINT_ANY, "info_kind", " %s ", kind);
1d934839 245
fbea6115
JP
246 lu = get_link_kind(kind);
247 if (lu && lu->print_opt) {
248 struct rtattr *attr[lu->maxattr+1], **data = NULL;
1d934839 249
fbea6115
JP
250 if (linkinfo[IFLA_INFO_DATA]) {
251 parse_rtattr_nested(attr, lu->maxattr,
252 linkinfo[IFLA_INFO_DATA]);
253 data = attr;
254 }
d0e72011 255 open_json_object("info_data");
fbea6115 256 lu->print_opt(lu, fp, data);
d0e72011 257 close_json_object();
1d934839 258
fbea6115 259 if (linkinfo[IFLA_INFO_XSTATS] && show_stats &&
d0e72011
JF
260 lu->print_xstats) {
261 open_json_object("info_xstats");
fbea6115 262 lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]);
d0e72011
JF
263 close_json_object();
264 }
1d934839 265 }
fbea6115
JP
266 }
267
268 if (linkinfo[IFLA_INFO_SLAVE_KIND]) {
9f1370c0
SH
269 const char *slave_kind
270 = rta_getattr_str(linkinfo[IFLA_INFO_SLAVE_KIND]);
1d934839 271
d0e72011
JF
272 print_string(PRINT_FP, NULL, "%s", _SL_);
273 print_string(PRINT_ANY,
274 "info_slave_kind",
275 " %s_slave ",
276 slave_kind);
277
22a84711 278 snprintf(slave, sizeof(slave), "%s_slave", slave_kind);
fbea6115 279
22a84711 280 slave_lu = get_link_kind(slave);
fbea6115
JP
281 if (slave_lu && slave_lu->print_opt) {
282 struct rtattr *attr[slave_lu->maxattr+1], **data = NULL;
283
284 if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
285 parse_rtattr_nested(attr, slave_lu->maxattr,
286 linkinfo[IFLA_INFO_SLAVE_DATA]);
287 data = attr;
288 }
d0e72011 289 open_json_object("info_slave_data");
fbea6115 290 slave_lu->print_opt(slave_lu, fp, data);
d0e72011 291 close_json_object();
fbea6115 292 }
1d934839 293 }
d0e72011 294 close_json_object();
1d934839
PM
295}
296
ee0067a9
JP
297static void print_af_spec(FILE *fp, struct rtattr *af_spec_attr)
298{
299 struct rtattr *inet6_attr;
300 struct rtattr *tb[IFLA_INET6_MAX + 1];
301
302 inet6_attr = parse_rtattr_one_nested(AF_INET6, af_spec_attr);
303 if (!inet6_attr)
304 return;
305
306 parse_rtattr_nested(tb, IFLA_INET6_MAX, inet6_attr);
307
308 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
5c5176ce 309 __u8 mode = rta_getattr_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
d0e72011 310 SPRINT_BUF(b1);
56f5daac 311
5c5176ce 312 switch (mode) {
ee0067a9 313 case IN6_ADDR_GEN_MODE_EUI64:
d0e72011
JF
314 print_string(PRINT_ANY,
315 "inet6_addr_gen_mode",
316 "addrgenmode %s ",
317 "eui64");
ee0067a9
JP
318 break;
319 case IN6_ADDR_GEN_MODE_NONE:
d0e72011
JF
320 print_string(PRINT_ANY,
321 "inet6_addr_gen_mode",
322 "addrgenmode %s ",
323 "none");
ee0067a9 324 break;
5c5176ce 325 case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
d0e72011
JF
326 print_string(PRINT_ANY,
327 "inet6_addr_gen_mode",
328 "addrgenmode %s ",
329 "stable_secret");
5c5176ce 330 break;
8e12bc0a 331 case IN6_ADDR_GEN_MODE_RANDOM:
d0e72011
JF
332 print_string(PRINT_ANY,
333 "inet6_addr_gen_mode",
334 "addrgenmode %s ",
335 "random");
8e12bc0a 336 break;
5c5176ce 337 default:
d0e72011
JF
338 snprintf(b1, sizeof(b1), "%#.2hhx", mode);
339 print_string(PRINT_ANY,
340 "inet6_addr_gen_mode",
341 "addrgenmode %s ",
342 b1);
5c5176ce 343 break;
ee0067a9
JP
344 }
345 }
346}
347
a1b99717
EBE
348static void print_vf_stats64(FILE *fp, struct rtattr *vfstats);
349
3fd86630
CW
350static void print_vfinfo(FILE *fp, struct rtattr *vfinfo)
351{
352 struct ifla_vf_mac *vf_mac;
3fd86630 353 struct ifla_vf_tx_rate *vf_tx_rate;
8c29ae7c 354 struct rtattr *vf[IFLA_VF_MAX + 1] = {};
56f5daac 355
3fd86630
CW
356 SPRINT_BUF(b1);
357
358 if (vfinfo->rta_type != IFLA_VF_INFO) {
359 fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type);
360 return;
361 }
362
363 parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo);
364
365 vf_mac = RTA_DATA(vf[IFLA_VF_MAC]);
3fd86630
CW
366 vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]);
367
d0e72011
JF
368 print_string(PRINT_FP, NULL, "%s ", _SL_);
369 print_int(PRINT_ANY, "vf", "vf %d ", vf_mac->vf);
370 print_string(PRINT_ANY, "mac", "MAC %s",
371 ll_addr_n2a((unsigned char *) &vf_mac->mac,
372 ETH_ALEN, 0, b1, sizeof(b1)));
373
56e9f0ab
MS
374 if (vf[IFLA_VF_VLAN_LIST]) {
375 struct rtattr *i, *vfvlanlist = vf[IFLA_VF_VLAN_LIST];
376 int rem = RTA_PAYLOAD(vfvlanlist);
377
d0e72011 378 open_json_array(PRINT_JSON, "vlan_list");
56e9f0ab 379 for (i = RTA_DATA(vfvlanlist);
d0e72011
JF
380 RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
381 struct ifla_vf_vlan_info *vf_vlan_info = RTA_DATA(i);
56e9f0ab
MS
382 SPRINT_BUF(b2);
383
d0e72011 384 open_json_object(NULL);
56e9f0ab 385 if (vf_vlan_info->vlan)
d0e72011
JF
386 print_int(PRINT_ANY,
387 "vlan",
388 ", vlan %d",
389 vf_vlan_info->vlan);
56e9f0ab 390 if (vf_vlan_info->qos)
d0e72011
JF
391 print_int(PRINT_ANY,
392 "qos",
393 ", qos %d",
394 vf_vlan_info->qos);
56e9f0ab
MS
395 if (vf_vlan_info->vlan_proto &&
396 vf_vlan_info->vlan_proto != htons(ETH_P_8021Q))
d0e72011
JF
397 print_string(PRINT_ANY,
398 "protocol",
399 ", vlan protocol %s",
400 ll_proto_n2a(
401 vf_vlan_info->vlan_proto,
56e9f0ab 402 b2, sizeof(b2)));
d0e72011 403 close_json_object();
56e9f0ab 404 }
d0e72011 405 close_json_array(PRINT_JSON, NULL);
56e9f0ab
MS
406 } else {
407 struct ifla_vf_vlan *vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]);
408
409 if (vf_vlan->vlan)
d0e72011
JF
410 print_int(PRINT_ANY,
411 "vlan",
412 ", vlan %d",
413 vf_vlan->vlan);
56e9f0ab 414 if (vf_vlan->qos)
d0e72011 415 print_int(PRINT_ANY, "qos", ", qos %d", vf_vlan->qos);
56e9f0ab 416 }
d0e72011 417
3fd86630 418 if (vf_tx_rate->rate)
d0e72011
JF
419 print_int(PRINT_ANY,
420 "tx_rate",
421 ", tx rate %d (Mbps)",
422 vf_tx_rate->rate);
8c29ae7c
VK
423
424 if (vf[IFLA_VF_RATE]) {
425 struct ifla_vf_rate *vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
d0e72011
JF
426 int max_tx = vf_rate->max_tx_rate;
427 int min_tx = vf_rate->min_tx_rate;
428
429 if (is_json_context()) {
430 open_json_object("rate");
431 print_int(PRINT_JSON, "max_tx", NULL, max_tx);
432 print_int(PRINT_ANY, "min_tx", NULL, min_tx);
433 close_json_object();
434 } else {
435 if (max_tx)
436 fprintf(fp, ", max_tx_rate %dMbps", max_tx);
437 if (min_tx)
438 fprintf(fp, ", min_tx_rate %dMbps", min_tx);
439 }
8c29ae7c 440 }
d0e72011 441
ff9463e0
PS
442 if (vf[IFLA_VF_SPOOFCHK]) {
443 struct ifla_vf_spoofchk *vf_spoofchk =
444 RTA_DATA(vf[IFLA_VF_SPOOFCHK]);
8c29ae7c 445
ff9463e0 446 if (vf_spoofchk->setting != -1)
d0e72011
JF
447 print_bool(PRINT_ANY,
448 "spoofchk",
449 vf_spoofchk->setting ?
450 ", spoof checking on" : ", spoof checking off",
451 vf_spoofchk->setting);
7b8179c7 452 }
d0e72011 453
ff9463e0
PS
454 if (vf[IFLA_VF_LINK_STATE]) {
455 struct ifla_vf_link_state *vf_linkstate =
456 RTA_DATA(vf[IFLA_VF_LINK_STATE]);
457
07fa9c15 458 if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_AUTO)
d0e72011
JF
459 print_string(PRINT_ANY,
460 "link_state",
461 ", link-state %s",
462 "auto");
07fa9c15 463 else if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_ENABLE)
d0e72011
JF
464 print_string(PRINT_ANY,
465 "link_state",
466 ", link-state %s",
467 "enable");
07fa9c15 468 else
d0e72011
JF
469 print_string(PRINT_ANY,
470 "link_state",
471 ", link-state %s",
472 "disable");
07fa9c15 473 }
d0e72011 474
fe932278
PS
475 if (vf[IFLA_VF_TRUST]) {
476 struct ifla_vf_trust *vf_trust = RTA_DATA(vf[IFLA_VF_TRUST]);
477
478 if (vf_trust->setting != -1)
d0e72011
JF
479 print_bool(PRINT_ANY,
480 "trust",
481 vf_trust->setting ? ", trust on" : ", trust off",
482 vf_trust->setting);
fe932278 483 }
d0e72011 484
4fb4a10e
PS
485 if (vf[IFLA_VF_RSS_QUERY_EN]) {
486 struct ifla_vf_rss_query_en *rss_query =
487 RTA_DATA(vf[IFLA_VF_RSS_QUERY_EN]);
488
489 if (rss_query->setting != -1)
d0e72011
JF
490 print_bool(PRINT_ANY,
491 "query_rss_en",
492 rss_query->setting ? ", query_rss on"
493 : ", query_rss off",
494 rss_query->setting);
4fb4a10e 495 }
d0e72011 496
a1b99717
EBE
497 if (vf[IFLA_VF_STATS] && show_stats)
498 print_vf_stats64(fp, vf[IFLA_VF_STATS]);
3fd86630
CW
499}
500
837552b4 501void print_num(FILE *fp, unsigned int width, uint64_t count)
b68d9837 502{
1e264abc
SH
503 const char *prefix = "kMGTPE";
504 const unsigned int base = use_iec ? 1024 : 1000;
b68d9837 505 uint64_t powi = 1;
50ec6650
CH
506 uint16_t powj = 1;
507 uint8_t precision = 2;
1e264abc 508 char buf[64];
b68d9837 509
1e264abc 510 if (!human_readable || count < base) {
f4fe81d2 511 fprintf(fp, "%-*"PRIu64" ", width, count);
1e264abc 512 return;
b68d9837
CH
513 }
514
1e264abc 515 /* increase value by a factor of 1000/1024 and print
468fa020
SH
516 * if result is something a human can read
517 */
56f5daac 518 for (;;) {
1e264abc
SH
519 powi *= base;
520 if (count / base < powi)
521 break;
b68d9837 522
1e264abc
SH
523 if (!prefix[1])
524 break;
525 ++prefix;
b68d9837
CH
526 }
527
50ec6650
CH
528 /* try to guess a good number of digits for precision */
529 for (; precision > 0; precision--) {
530 powj *= 10;
531 if (count / powi < powj)
532 break;
533 }
534
535 snprintf(buf, sizeof(buf), "%.*f%c%s", precision,
d0e72011 536 (double) count / powi, *prefix, use_iec ? "i" : "");
1e264abc 537
f4fe81d2 538 fprintf(fp, "%-*s ", width, buf);
b68d9837
CH
539}
540
a1b99717
EBE
541static void print_vf_stats64(FILE *fp, struct rtattr *vfstats)
542{
30a8842c 543 struct rtattr *vf[IFLA_VF_STATS_MAX + 1];
a1b99717
EBE
544
545 if (vfstats->rta_type != IFLA_VF_STATS) {
546 fprintf(stderr, "BUG: rta type is %d\n", vfstats->rta_type);
547 return;
548 }
549
550 parse_rtattr_nested(vf, IFLA_VF_MAX, vfstats);
551
d0e72011
JF
552 if (is_json_context()) {
553 open_json_object("stats");
554
555 /* RX stats */
556 open_json_object("rx");
557 print_uint(PRINT_JSON, "bytes", NULL,
558 rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
559 print_uint(PRINT_JSON, "packets", NULL,
560 rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
561 print_uint(PRINT_JSON, "multicast", NULL,
562 rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
563 print_uint(PRINT_JSON, "broadcast", NULL,
564 rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
565 close_json_object();
566
567 /* TX stats */
568 open_json_object("tx");
569 print_uint(PRINT_JSON, "tx_bytes", NULL,
570 rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
571 print_uint(PRINT_JSON, "tx_packets", NULL,
572 rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
573 close_json_object();
574 close_json_object();
575 } else {
576 /* RX stats */
577 fprintf(fp, "%s", _SL_);
578 fprintf(fp, " RX: bytes packets mcast bcast %s", _SL_);
579 fprintf(fp, " ");
a1b99717 580
d0e72011
JF
581 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
582 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
583 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
584 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
a1b99717 585
d0e72011
JF
586 /* TX stats */
587 fprintf(fp, "%s", _SL_);
588 fprintf(fp, " TX: bytes packets %s", _SL_);
589 fprintf(fp, " ");
a1b99717 590
d0e72011
JF
591 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
592 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
593 }
a1b99717
EBE
594}
595
9a7bd544 596static void __print_link_stats(FILE *fp, struct rtattr *tb[])
4b726cb1 597{
9a7bd544
SP
598 const struct rtattr *carrier_changes = tb[IFLA_CARRIER_CHANGES];
599 struct rtnl_link_stats64 _s, *s = &_s;
600 int ret;
d0e72011 601
9a7bd544
SP
602 ret = get_rtnl_link_stats_rta(s, tb);
603 if (ret < 0)
604 return;
e6e6fb5c 605
d0e72011 606 if (is_json_context()) {
9a7bd544 607 open_json_object((ret == sizeof(*s)) ? "stats64" : "stats");
d0e72011
JF
608
609 /* RX stats */
610 open_json_object("rx");
611 print_uint(PRINT_JSON, "bytes", NULL, s->rx_bytes);
612 print_uint(PRINT_JSON, "packets", NULL, s->rx_packets);
613 print_uint(PRINT_JSON, "errors", NULL, s->rx_errors);
614 print_uint(PRINT_JSON, "dropped", NULL, s->rx_dropped);
615 print_uint(PRINT_JSON, "over_errors", NULL, s->rx_over_errors);
616 print_uint(PRINT_JSON, "multicast", NULL, s->multicast);
617 if (s->rx_compressed)
fb7b8168
SP
618 print_uint(PRINT_JSON,
619 "compressed", NULL, s->rx_compressed);
d0e72011
JF
620
621 /* RX error stats */
622 if (show_stats > 1) {
623 print_uint(PRINT_JSON,
624 "length_errors",
625 NULL, s->rx_length_errors);
626 print_uint(PRINT_JSON,
627 "crc_errors",
628 NULL, s->rx_crc_errors);
629 print_uint(PRINT_JSON,
630 "frame_errors",
631 NULL, s->rx_frame_errors);
632 print_uint(PRINT_JSON,
633 "fifo_errors",
634 NULL, s->rx_fifo_errors);
635 print_uint(PRINT_JSON,
636 "missed_errors",
637 NULL, s->rx_missed_errors);
638 if (s->rx_nohandler)
fb7b8168
SP
639 print_uint(PRINT_JSON,
640 "nohandler", NULL, s->rx_nohandler);
d0e72011
JF
641 }
642 close_json_object();
643
644 /* TX stats */
645 open_json_object("tx");
646 print_uint(PRINT_JSON, "bytes", NULL, s->tx_bytes);
647 print_uint(PRINT_JSON, "packets", NULL, s->tx_packets);
648 print_uint(PRINT_JSON, "errors", NULL, s->tx_errors);
649 print_uint(PRINT_JSON, "dropped", NULL, s->tx_dropped);
650 print_uint(PRINT_JSON,
651 "carrier_errors",
652 NULL, s->tx_carrier_errors);
653 print_uint(PRINT_JSON, "collisions", NULL, s->collisions);
654 if (s->tx_compressed)
fb7b8168
SP
655 print_uint(PRINT_JSON,
656 "compressed", NULL, s->tx_compressed);
d0e72011
JF
657
658 /* TX error stats */
659 if (show_stats > 1) {
660 print_uint(PRINT_JSON,
661 "aborted_errors",
662 NULL, s->tx_aborted_errors);
663 print_uint(PRINT_JSON,
664 "fifo_errors",
665 NULL, s->tx_fifo_errors);
666 print_uint(PRINT_JSON,
667 "window_errors",
668 NULL, s->tx_window_errors);
669 print_uint(PRINT_JSON,
670 "heartbeat_errors",
671 NULL, s->tx_heartbeat_errors);
672 if (carrier_changes)
fb7b8168 673 print_uint(PRINT_JSON, "carrier_changes", NULL,
d0e72011
JF
674 rta_getattr_u32(carrier_changes));
675 }
b68d9837 676
d0e72011
JF
677 close_json_object();
678 close_json_object();
679 } else {
680 /* RX stats */
681 fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s",
682 s->rx_compressed ? "compressed" : "", _SL_);
683
d0e72011
JF
684 fprintf(fp, " ");
685 print_num(fp, 10, s->rx_bytes);
686 print_num(fp, 8, s->rx_packets);
687 print_num(fp, 7, s->rx_errors);
688 print_num(fp, 7, s->rx_dropped);
689 print_num(fp, 7, s->rx_over_errors);
690 print_num(fp, 7, s->multicast);
691 if (s->rx_compressed)
692 print_num(fp, 7, s->rx_compressed);
693
694 /* RX error stats */
695 if (show_stats > 1) {
696 fprintf(fp, "%s", _SL_);
697 fprintf(fp, " RX errors: length crc frame fifo missed%s%s",
698 s->rx_nohandler ? " nohandler" : "", _SL_);
699 fprintf(fp, " ");
700 print_num(fp, 8, s->rx_length_errors);
701 print_num(fp, 7, s->rx_crc_errors);
702 print_num(fp, 7, s->rx_frame_errors);
703 print_num(fp, 7, s->rx_fifo_errors);
704 print_num(fp, 7, s->rx_missed_errors);
705 if (s->rx_nohandler)
706 print_num(fp, 7, s->rx_nohandler);
707 }
4ec0ffde 708 fprintf(fp, "%s", _SL_);
1e264abc 709
d0e72011
JF
710 /* TX stats */
711 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
712 s->tx_compressed ? "compressed" : "", _SL_);
713
714 fprintf(fp, " ");
715 print_num(fp, 10, s->tx_bytes);
716 print_num(fp, 8, s->tx_packets);
717 print_num(fp, 7, s->tx_errors);
718 print_num(fp, 7, s->tx_dropped);
719 print_num(fp, 7, s->tx_carrier_errors);
720 print_num(fp, 7, s->collisions);
721 if (s->tx_compressed)
722 print_num(fp, 7, s->tx_compressed);
723
724 /* TX error stats */
725 if (show_stats > 1) {
726 fprintf(fp, "%s", _SL_);
727 fprintf(fp, " TX errors: aborted fifo window heartbeat");
728 if (carrier_changes)
729 fprintf(fp, " transns");
730 fprintf(fp, "%s", _SL_);
731
732 fprintf(fp, " ");
733 print_num(fp, 8, s->tx_aborted_errors);
734 print_num(fp, 7, s->tx_fifo_errors);
735 print_num(fp, 7, s->tx_window_errors);
736 print_num(fp, 7, s->tx_heartbeat_errors);
737 if (carrier_changes)
738 print_num(fp, 7,
739 rta_getattr_u32(carrier_changes));
740 }
e6e6fb5c
SH
741 }
742}
743
5d5cf1b4
JB
744static void print_link_stats(FILE *fp, struct nlmsghdr *n)
745{
746 struct ifinfomsg *ifi = NLMSG_DATA(n);
56f5daac 747 struct rtattr *tb[IFLA_MAX+1];
5d5cf1b4
JB
748
749 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi),
750 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)));
751 __print_link_stats(fp, tb);
752 fprintf(fp, "%s", _SL_);
753}
754
5d295bb8 755int print_linkinfo_brief(const struct sockaddr_nl *who,
2cd0578f 756 struct nlmsghdr *n, void *arg)
5d295bb8 757{
56f5daac 758 FILE *fp = (FILE *)arg;
5d295bb8 759 struct ifinfomsg *ifi = NLMSG_DATA(n);
56f5daac 760 struct rtattr *tb[IFLA_MAX+1];
5d295bb8 761 int len = n->nlmsg_len;
9f1370c0 762 const char *name;
5d295bb8 763 char buf[32] = { 0, };
56f5daac 764 unsigned int m_flag = 0;
5d295bb8
AG
765
766 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
767 return -1;
768
769 len -= NLMSG_LENGTH(sizeof(*ifi));
770 if (len < 0)
771 return -1;
772
2cd0578f 773 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
5d295bb8 774 return -1;
2cd0578f 775 if (filter.up && !(ifi->ifi_flags&IFF_UP))
5d295bb8
AG
776 return -1;
777
778 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
9f1370c0 779 if (tb[IFLA_IFNAME] == NULL) {
5d295bb8 780 fprintf(stderr, "BUG: device with ifindex %d has nil ifname\n", ifi->ifi_index);
9f1370c0
SH
781 name = "<nil>";
782 } else {
783 name = rta_getattr_str(tb[IFLA_IFNAME]);
784 }
468fa020 785
2cd0578f
SP
786 if (filter.label &&
787 (!filter.family || filter.family == AF_PACKET) &&
788 fnmatch(filter.label, RTA_DATA(tb[IFLA_IFNAME]), 0))
5d295bb8
AG
789 return -1;
790
791 if (tb[IFLA_GROUP]) {
9f1370c0 792 int group = rta_getattr_u32(tb[IFLA_GROUP]);
56f5daac 793
2cd0578f 794 if (filter.group != -1 && group != filter.group)
5d295bb8
AG
795 return -1;
796 }
797
84d30afd 798 if (tb[IFLA_MASTER]) {
9f1370c0 799 int master = rta_getattr_u32(tb[IFLA_MASTER]);
56f5daac 800
2cd0578f 801 if (filter.master > 0 && master != filter.master)
84d30afd 802 return -1;
2cd0578f 803 } else if (filter.master > 0)
84d30afd
DA
804 return -1;
805
2cd0578f 806 if (filter.kind && match_link_kind(tb, filter.kind, 0))
e0513807 807 return -1;
84d30afd 808
2cd0578f 809 if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1))
e0513807 810 return -1;
84d30afd 811
5d295bb8 812 if (n->nlmsg_type == RTM_DELLINK)
d0e72011 813 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
5d295bb8 814
5d295bb8 815 if (tb[IFLA_LINK]) {
9f1370c0 816 int iflink = rta_getattr_u32(tb[IFLA_LINK]);
56f5daac 817
d0e72011 818 if (iflink == 0) {
5d295bb8 819 snprintf(buf, sizeof(buf), "%s@NONE", name);
d0e72011
JF
820 print_null(PRINT_JSON, "link", NULL, NULL);
821 } else {
d92cc2d0 822 const char *link = ll_index_to_name(iflink);
d0e72011
JF
823
824 print_string(PRINT_JSON, "link", NULL, link);
825 snprintf(buf, sizeof(buf), "%s@%s", name, link);
5d295bb8
AG
826 m_flag = ll_index_to_flags(iflink);
827 m_flag = !(m_flag & IFF_UP);
828 }
829 } else
830 snprintf(buf, sizeof(buf), "%s", name);
831
d0e72011
JF
832 print_string(PRINT_FP, NULL, "%-16s ", buf);
833 print_string(PRINT_JSON, "ifname", NULL, name);
5d295bb8
AG
834
835 if (tb[IFLA_OPERSTATE])
836 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
837
2cd0578f 838 if (filter.family == AF_PACKET) {
5d295bb8 839 SPRINT_BUF(b1);
d0e72011 840
5d295bb8 841 if (tb[IFLA_ADDRESS]) {
d0e72011
JF
842 print_color_string(PRINT_ANY, COLOR_MAC,
843 "address", "%s ",
844 ll_addr_n2a(
845 RTA_DATA(tb[IFLA_ADDRESS]),
846 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
847 ifi->ifi_type,
848 b1, sizeof(b1)));
5d295bb8
AG
849 }
850 }
851
2cd0578f 852 if (filter.family == AF_PACKET) {
5d295bb8 853 print_link_flags(fp, ifi->ifi_flags, m_flag);
d0e72011
JF
854 print_string(PRINT_FP, NULL, "%s", "\n");
855 }
2cd0578f 856
5d295bb8
AG
857 fflush(fp);
858 return 0;
859}
860
735a52ce
VY
861static const char *link_events[] = {
862 [IFLA_EVENT_NONE] = "NONE",
863 [IFLA_EVENT_REBOOT] = "REBOOT",
864 [IFLA_EVENT_FEATURES] = "FEATURE CHANGE",
865 [IFLA_EVENT_BONDING_FAILOVER] = "BONDING FAILOVER",
866 [IFLA_EVENT_NOTIFY_PEERS] = "NOTIFY PEERS",
867 [IFLA_EVENT_IGMP_RESEND] = "RESEND IGMP",
868 [IFLA_EVENT_BONDING_OPTIONS] = "BONDING OPTION"
869};
870
871static void print_link_event(FILE *f, __u32 event)
872{
873 if (event >= ARRAY_SIZE(link_events))
d0e72011 874 print_int(PRINT_ANY, "event", "event %d ", event);
735a52ce
VY
875 else {
876 if (event)
d0e72011
JF
877 print_string(PRINT_ANY,
878 "event", "event %s ",
879 link_events[event]);
735a52ce
VY
880 }
881}
882
ae665a52 883int print_linkinfo(const struct sockaddr_nl *who,
50772dc5 884 struct nlmsghdr *n, void *arg)
aba5acdf 885{
56f5daac 886 FILE *fp = (FILE *)arg;
aba5acdf 887 struct ifinfomsg *ifi = NLMSG_DATA(n);
56f5daac 888 struct rtattr *tb[IFLA_MAX+1];
aba5acdf 889 int len = n->nlmsg_len;
56f5daac 890 unsigned int m_flag = 0;
aba5acdf
SH
891
892 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
893 return 0;
894
895 len -= NLMSG_LENGTH(sizeof(*ifi));
896 if (len < 0)
897 return -1;
898
899 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
900 return 0;
901 if (filter.up && !(ifi->ifi_flags&IFF_UP))
902 return 0;
903
aba5acdf 904 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
468fa020 905 if (tb[IFLA_IFNAME] == NULL)
4cd23bdd 906 fprintf(stderr, "BUG: device with ifindex %d has nil ifname\n", ifi->ifi_index);
468fa020 907
aba5acdf
SH
908 if (filter.label &&
909 (!filter.family || filter.family == AF_PACKET) &&
910 fnmatch(filter.label, RTA_DATA(tb[IFLA_IFNAME]), 0))
911 return 0;
912
f960c92a 913 if (tb[IFLA_GROUP]) {
9f1370c0 914 int group = rta_getattr_u32(tb[IFLA_GROUP]);
56f5daac 915
c4fdf75d 916 if (filter.group != -1 && group != filter.group)
f960c92a
VD
917 return -1;
918 }
919
1b944148 920 if (tb[IFLA_MASTER]) {
9f1370c0 921 int master = rta_getattr_u32(tb[IFLA_MASTER]);
56f5daac 922
1b944148
VK
923 if (filter.master > 0 && master != filter.master)
924 return -1;
56f5daac 925 } else if (filter.master > 0)
1b944148
VK
926 return -1;
927
e0513807
PS
928 if (filter.kind && match_link_kind(tb, filter.kind, 0))
929 return -1;
712249d8 930
e0513807
PS
931 if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1))
932 return -1;
712249d8 933
aba5acdf 934 if (n->nlmsg_type == RTM_DELLINK)
d0e72011
JF
935 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
936
937 print_int(PRINT_ANY, "ifindex", "%d: ", ifi->ifi_index);
938 if (tb[IFLA_IFNAME]) {
939 print_color_string(PRINT_ANY,
940 COLOR_IFNAME,
941 "ifname", "%s",
942 rta_getattr_str(tb[IFLA_IFNAME]));
943 } else {
944 print_null(PRINT_JSON, "ifname", NULL, NULL);
945 print_color_null(PRINT_FP, COLOR_IFNAME,
946 "ifname", "%s", "<nil>");
947 }
aba5acdf
SH
948
949 if (tb[IFLA_LINK]) {
9f1370c0 950 int iflink = rta_getattr_u32(tb[IFLA_LINK]);
56f5daac 951
aba5acdf 952 if (iflink == 0)
d0e72011 953 print_null(PRINT_ANY, "link", "@%s: ", "NONE");
aba5acdf 954 else {
ccdcbf35 955 if (tb[IFLA_LINK_NETNSID])
d0e72011
JF
956 print_int(PRINT_ANY,
957 "link_index", "@if%d: ", iflink);
ccdcbf35 958 else {
d0e72011
JF
959 print_string(PRINT_ANY,
960 "link",
961 "@%s: ",
d92cc2d0 962 ll_index_to_name(iflink));
ccdcbf35
ND
963 m_flag = ll_index_to_flags(iflink);
964 m_flag = !(m_flag & IFF_UP);
965 }
aba5acdf
SH
966 }
967 } else {
d0e72011 968 print_string(PRINT_FP, NULL, ": ", NULL);
aba5acdf
SH
969 }
970 print_link_flags(fp, ifi->ifi_flags, m_flag);
971
972 if (tb[IFLA_MTU])
d0e72011
JF
973 print_int(PRINT_ANY,
974 "mtu", "mtu %u ",
975 rta_getattr_u32(tb[IFLA_MTU]));
c7272ca7 976 if (tb[IFLA_XDP])
a0b5b7cf 977 xdp_dump(fp, tb[IFLA_XDP], do_link, false);
aba5acdf 978 if (tb[IFLA_QDISC])
d0e72011
JF
979 print_string(PRINT_ANY,
980 "qdisc",
981 "qdisc %s ",
982 rta_getattr_str(tb[IFLA_QDISC]));
aba5acdf 983 if (tb[IFLA_MASTER]) {
d92cc2d0 984 int master = rta_getattr_u32(tb[IFLA_MASTER]);
d0e72011 985
d92cc2d0
SP
986 print_color_string(PRINT_ANY,
987 COLOR_IFNAME,
988 "master",
989 "master %s ",
990 ll_index_to_name(master));
aba5acdf 991 }
82499282 992
3d866ba2 993 if (tb[IFLA_OPERSTATE])
ff24746c 994 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
82499282
SH
995
996 if (do_link && tb[IFLA_LINKMODE])
997 print_linkmode(fp, tb[IFLA_LINKMODE]);
998
c4fdf75d
ST
999 if (tb[IFLA_GROUP]) {
1000 SPRINT_BUF(b1);
9f1370c0 1001 int group = rta_getattr_u32(tb[IFLA_GROUP]);
56f5daac 1002
d0e72011
JF
1003 print_string(PRINT_ANY,
1004 "group",
1005 "group %s ",
1006 rtnl_group_n2a(group, b1, sizeof(b1)));
c4fdf75d
ST
1007 }
1008
aba5acdf 1009 if (filter.showqueue)
f78e316f 1010 print_queuelen(fp, tb);
ae665a52 1011
735a52ce
VY
1012 if (tb[IFLA_EVENT])
1013 print_link_event(fp, rta_getattr_u32(tb[IFLA_EVENT]));
1014
2ec28933 1015 if (!filter.family || filter.family == AF_PACKET || show_details) {
aba5acdf 1016 SPRINT_BUF(b1);
aba5acdf 1017
d0e72011
JF
1018 print_string(PRINT_FP, NULL, "%s", _SL_);
1019 print_string(PRINT_ANY,
1020 "link_type",
1021 " link/%s ",
1022 ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
aba5acdf 1023 if (tb[IFLA_ADDRESS]) {
d0e72011
JF
1024 print_color_string(PRINT_ANY,
1025 COLOR_MAC,
1026 "address",
1027 "%s",
1028 ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]),
1029 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
1030 ifi->ifi_type,
1031 b1, sizeof(b1)));
aba5acdf
SH
1032 }
1033 if (tb[IFLA_BROADCAST]) {
d0e72011
JF
1034 if (ifi->ifi_flags&IFF_POINTOPOINT) {
1035 print_string(PRINT_FP, NULL, " peer ", NULL);
1036 print_bool(PRINT_JSON,
1037 "link_pointtopoint", NULL, true);
1038 } else {
1039 print_string(PRINT_FP, NULL, " brd ", NULL);
1040 }
1041 print_color_string(PRINT_ANY,
1042 COLOR_MAC,
1043 "broadcast",
1044 "%s",
1045 ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]),
1046 RTA_PAYLOAD(tb[IFLA_BROADCAST]),
1047 ifi->ifi_type,
1048 b1, sizeof(b1)));
aba5acdf
SH
1049 }
1050 }
1d934839 1051
ccdcbf35 1052 if (tb[IFLA_LINK_NETNSID]) {
9f1370c0 1053 int id = rta_getattr_u32(tb[IFLA_LINK_NETNSID]);
ccdcbf35 1054
d0e72011
JF
1055 if (is_json_context()) {
1056 print_int(PRINT_JSON, "link_netnsid", NULL, id);
1057 } else {
1058 if (id >= 0)
1059 print_int(PRINT_FP, NULL,
1060 " link-netnsid %d", id);
1061 else
1062 print_string(PRINT_FP, NULL,
1063 " link-netnsid %s", "unknown");
1064 }
ccdcbf35
ND
1065 }
1066
18864827
AK
1067 if (tb[IFLA_PROTO_DOWN]) {
1068 if (rta_getattr_u8(tb[IFLA_PROTO_DOWN]))
d0e72011
JF
1069 print_bool(PRINT_ANY,
1070 "proto_down", " protodown on ", true);
18864827
AK
1071 }
1072
11522e7d
SH
1073 if (show_details) {
1074 if (tb[IFLA_PROMISCUITY])
d0e72011
JF
1075 print_uint(PRINT_ANY,
1076 "promiscuity",
1077 " promiscuity %u ",
1078 rta_getattr_u32(tb[IFLA_PROMISCUITY]));
11522e7d
SH
1079
1080 if (tb[IFLA_LINKINFO])
1081 print_linktype(fp, tb[IFLA_LINKINFO]);
1082
1083 if (do_link && tb[IFLA_AF_SPEC])
1084 print_af_spec(fp, tb[IFLA_AF_SPEC]);
1085
1086 if (tb[IFLA_NUM_TX_QUEUES])
d0e72011
JF
1087 print_uint(PRINT_ANY,
1088 "num_tx_queues",
1089 "numtxqueues %u ",
1090 rta_getattr_u32(tb[IFLA_NUM_TX_QUEUES]));
ede6a3ea 1091
11522e7d 1092 if (tb[IFLA_NUM_RX_QUEUES])
d0e72011
JF
1093 print_uint(PRINT_ANY,
1094 "num_rx_queues",
1095 "numrxqueues %u ",
1096 rta_getattr_u32(tb[IFLA_NUM_RX_QUEUES]));
1cb6a110 1097
1acd208c 1098 if (tb[IFLA_GSO_MAX_SIZE])
d0e72011
JF
1099 print_uint(PRINT_ANY,
1100 "gso_max_size",
1101 "gso_max_size %u ",
1102 rta_getattr_u32(tb[IFLA_GSO_MAX_SIZE]));
1acd208c
ED
1103
1104 if (tb[IFLA_GSO_MAX_SEGS])
d0e72011
JF
1105 print_uint(PRINT_ANY,
1106 "gso_max_segs",
1107 "gso_max_segs %u ",
1108 rta_getattr_u32(tb[IFLA_GSO_MAX_SEGS]));
1acd208c 1109
11522e7d 1110 if (tb[IFLA_PHYS_PORT_NAME])
d0e72011
JF
1111 print_string(PRINT_ANY,
1112 "phys_port_name",
1113 "portname %s ",
1114 rta_getattr_str(tb[IFLA_PHYS_PORT_NAME]));
ee0067a9 1115
11522e7d
SH
1116 if (tb[IFLA_PHYS_PORT_ID]) {
1117 SPRINT_BUF(b1);
d0e72011
JF
1118 print_string(PRINT_ANY,
1119 "phys_port_id",
1120 "portid %s ",
1121 hexstring_n2a(
1122 RTA_DATA(tb[IFLA_PHYS_PORT_ID]),
1123 RTA_PAYLOAD(tb[IFLA_PHYS_PORT_ID]),
1124 b1, sizeof(b1)));
11522e7d
SH
1125 }
1126
1127 if (tb[IFLA_PHYS_SWITCH_ID]) {
1128 SPRINT_BUF(b1);
d0e72011
JF
1129 print_string(PRINT_ANY,
1130 "phys_switch_id",
1131 "switchid %s ",
1132 hexstring_n2a(RTA_DATA(tb[IFLA_PHYS_SWITCH_ID]),
1133 RTA_PAYLOAD(tb[IFLA_PHYS_SWITCH_ID]),
1134 b1, sizeof(b1)));
11522e7d
SH
1135 }
1136 }
f1c656e5 1137
2ec28933 1138 if ((do_link || show_details) && tb[IFLA_IFALIAS]) {
d0e72011
JF
1139 print_string(PRINT_FP, NULL, "%s ", _SL_);
1140 print_string(PRINT_ANY,
1141 "ifalias",
1142 "alias %s",
1143 rta_getattr_str(tb[IFLA_IFALIAS]));
263c894f 1144 }
ace9c961 1145
a0b5b7cf
DB
1146 if ((do_link || show_details) && tb[IFLA_XDP])
1147 xdp_dump(fp, tb[IFLA_XDP], true, true);
1148
e6e6fb5c 1149 if (do_link && show_stats) {
d0e72011 1150 print_string(PRINT_FP, NULL, "%s", _SL_);
5d5cf1b4 1151 __print_link_stats(fp, tb);
ae7229d5 1152 }
e6e6fb5c 1153
2ec28933 1154 if ((do_link || show_details) && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) {
3fd86630
CW
1155 struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST];
1156 int rem = RTA_PAYLOAD(vflist);
56f5daac 1157
d0e72011
JF
1158 open_json_array(PRINT_JSON, "vfinfo_list");
1159 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
1160 open_json_object(NULL);
3fd86630 1161 print_vfinfo(fp, i);
d0e72011
JF
1162 close_json_object();
1163 }
1164 close_json_array(PRINT_JSON, NULL);
aba5acdf 1165 }
3fd86630 1166
d0e72011 1167 print_string(PRINT_FP, NULL, "\n", NULL);
aba5acdf 1168 fflush(fp);
5d5cf1b4 1169 return 1;
aba5acdf
SH
1170}
1171
1172static int flush_update(void)
1173{
e149d4e8
NH
1174
1175 /*
1176 * Note that the kernel may delete multiple addresses for one
1177 * delete request (e.g. if ipv4 address promotion is disabled).
1178 * Since a flush operation is really a series of delete requests
1179 * its possible that we may request an address delete that has
1180 * already been done by the kernel. Therefore, ignore EADDRNOTAVAIL
1181 * errors returned from a flush request
1182 */
1183 if ((rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) &&
1184 (errno != EADDRNOTAVAIL)) {
1fb0a998 1185 perror("Failed to send flush request");
aba5acdf
SH
1186 return -1;
1187 }
1188 filter.flushp = 0;
1189 return 0;
1190}
1191
35546df7
MN
1192static int set_lifetime(unsigned int *lifetime, char *argv)
1193{
1194 if (strcmp(argv, "forever") == 0)
141bb606 1195 *lifetime = INFINITY_LIFE_TIME;
35546df7
MN
1196 else if (get_u32(lifetime, argv, 0))
1197 return -1;
1198
1199 return 0;
1200}
1201
37c9b94e
JP
1202static unsigned int get_ifa_flags(struct ifaddrmsg *ifa,
1203 struct rtattr *ifa_flags_attr)
1204{
1205 return ifa_flags_attr ? rta_getattr_u32(ifa_flags_attr) :
d0e72011 1206 ifa->ifa_flags;
37c9b94e
JP
1207}
1208
f73ac674
SH
1209/* Mapping from argument to address flag mask */
1210struct {
1211 const char *name;
1212 unsigned long value;
1213} ifa_flag_names[] = {
1214 { "secondary", IFA_F_SECONDARY },
1215 { "temporary", IFA_F_SECONDARY },
1216 { "nodad", IFA_F_NODAD },
1217 { "optimistic", IFA_F_OPTIMISTIC },
1218 { "dadfailed", IFA_F_DADFAILED },
1219 { "home", IFA_F_HOMEADDRESS },
1220 { "deprecated", IFA_F_DEPRECATED },
1221 { "tentative", IFA_F_TENTATIVE },
1222 { "permanent", IFA_F_PERMANENT },
1223 { "mngtmpaddr", IFA_F_MANAGETEMPADDR },
1224 { "noprefixroute", IFA_F_NOPREFIXROUTE },
1225 { "autojoin", IFA_F_MCAUTOJOIN },
1226 { "stable-privacy", IFA_F_STABLE_PRIVACY },
1227};
1228
1229static void print_ifa_flags(FILE *fp, const struct ifaddrmsg *ifa,
1230 unsigned int flags)
1231{
1232 unsigned int i;
1233
1234 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1235 unsigned long mask = ifa_flag_names[i].value;
1236
1237 if (mask == IFA_F_PERMANENT) {
1238 if (!(flags & mask))
d0e72011
JF
1239 print_bool(PRINT_ANY,
1240 "dynamic", "dynamic ", true);
f73ac674
SH
1241 } else if (flags & mask) {
1242 if (mask == IFA_F_SECONDARY &&
d0e72011
JF
1243 ifa->ifa_family == AF_INET6) {
1244 print_bool(PRINT_ANY,
1245 "temporary", "temporary ", true);
1246 } else {
1247 print_string(PRINT_FP, NULL,
1248 "%s ", ifa_flag_names[i].name);
1249 print_bool(PRINT_JSON,
1250 ifa_flag_names[i].name, NULL, true);
1251 }
f73ac674
SH
1252 }
1253
1254 flags &= ~mask;
1255 }
1256
d0e72011
JF
1257 if (flags) {
1258 if (is_json_context()) {
1259 SPRINT_BUF(b1);
1260
1261 snprintf(b1, sizeof(b1), "%02x", flags);
1262 print_string(PRINT_JSON, "ifa_flags", NULL, b1);
1263 } else {
1264 fprintf(fp, "flags %02x ", flags);
1265 }
1266 }
f73ac674
SH
1267
1268}
1269
1270static int get_filter(const char *arg)
1271{
1272 unsigned int i;
1273
1274 /* Special cases */
1275 if (strcmp(arg, "dynamic") == 0) {
1276 filter.flags &= ~IFA_F_PERMANENT;
1277 filter.flagmask |= IFA_F_PERMANENT;
1278 } else if (strcmp(arg, "primary") == 0) {
1279 filter.flags &= ~IFA_F_SECONDARY;
1280 filter.flagmask |= IFA_F_SECONDARY;
1281 } else if (*arg == '-') {
1282 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1283 if (strcmp(arg + 1, ifa_flag_names[i].name))
1284 continue;
1285
1286 filter.flags &= ifa_flag_names[i].value;
1287 filter.flagmask |= ifa_flag_names[i].value;
1288 return 0;
1289 }
1290
1291 return -1;
1292 } else {
1293 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1294 if (strcmp(arg, ifa_flag_names[i].name))
1295 continue;
1296 filter.flags |= ifa_flag_names[i].value;
1297 filter.flagmask |= ifa_flag_names[i].value;
1298 return 0;
1299 }
1300 return -1;
1301 }
1302
1303 return 0;
1304}
1305
17df3d60
SP
1306static int ifa_label_match_rta(int ifindex, const struct rtattr *rta)
1307{
1308 const char *label;
17df3d60
SP
1309
1310 if (!filter.label)
1311 return 0;
1312
1313 if (rta)
1314 label = RTA_DATA(rta);
1315 else
d92cc2d0 1316 label = ll_index_to_name(ifindex);
17df3d60
SP
1317
1318 return fnmatch(filter.label, label, 0);
1319}
1320
ae665a52 1321int print_addrinfo(const struct sockaddr_nl *who, struct nlmsghdr *n,
6dc9f016 1322 void *arg)
aba5acdf 1323{
4b726cb1 1324 FILE *fp = arg;
aba5acdf
SH
1325 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1326 int len = n->nlmsg_len;
3bc1c4f2 1327 unsigned int ifa_flags;
56f5daac 1328 struct rtattr *rta_tb[IFA_MAX+1];
56f5daac 1329
aba5acdf
SH
1330 SPRINT_BUF(b1);
1331
1332 if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR)
1333 return 0;
1334 len -= NLMSG_LENGTH(sizeof(*ifa));
1335 if (len < 0) {
1336 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
1337 return -1;
1338 }
1339
1340 if (filter.flushb && n->nlmsg_type != RTM_NEWADDR)
1341 return 0;
1342
4b726cb1
SH
1343 parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa),
1344 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
aba5acdf 1345
37c9b94e
JP
1346 ifa_flags = get_ifa_flags(ifa, rta_tb[IFA_FLAGS]);
1347
aba5acdf
SH
1348 if (!rta_tb[IFA_LOCAL])
1349 rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1350 if (!rta_tb[IFA_ADDRESS])
1351 rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
1352
1353 if (filter.ifindex && filter.ifindex != ifa->ifa_index)
1354 return 0;
1355 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1356 return 0;
37c9b94e 1357 if ((filter.flags ^ ifa_flags) & filter.flagmask)
aba5acdf 1358 return 0;
aba5acdf 1359
3eb1731b 1360 if (filter.family && filter.family != ifa->ifa_family)
1361 return 0;
1362
17df3d60
SP
1363 if (ifa_label_match_rta(ifa->ifa_index, rta_tb[IFA_LABEL]))
1364 return 0;
1365
c4de9ada
SP
1366 if (inet_addr_match_rta(&filter.pfx, rta_tb[IFA_LOCAL]))
1367 return 0;
1368
aba5acdf
SH
1369 if (filter.flushb) {
1370 struct nlmsghdr *fn;
56f5daac 1371
aba5acdf
SH
1372 if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
1373 if (flush_update())
1374 return -1;
1375 }
56f5daac 1376 fn = (struct nlmsghdr *)(filter.flushb + NLMSG_ALIGN(filter.flushp));
aba5acdf
SH
1377 memcpy(fn, n, n->nlmsg_len);
1378 fn->nlmsg_type = RTM_DELADDR;
1379 fn->nlmsg_flags = NLM_F_REQUEST;
351efcde 1380 fn->nlmsg_seq = ++rth.seq;
56f5daac 1381 filter.flushp = (((char *)fn) + n->nlmsg_len) - filter.flushb;
aba5acdf
SH
1382 filter.flushed++;
1383 if (show_stats < 2)
1384 return 0;
1385 }
1386
1387 if (n->nlmsg_type == RTM_DELADDR)
d0e72011 1388 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
aba5acdf 1389
5d295bb8 1390 if (!brief) {
a3e0229e
SP
1391 const char *name;
1392
d0e72011
JF
1393 if (filter.oneline || filter.flushb) {
1394 const char *dev = ll_index_to_name(ifa->ifa_index);
1395
1396 if (is_json_context()) {
1397 print_int(PRINT_JSON,
1398 "index", NULL, ifa->ifa_index);
1399 print_string(PRINT_JSON, "dev", NULL, dev);
1400 } else {
1401 fprintf(fp, "%u: %s", ifa->ifa_index, dev);
1402 }
1403 }
1404
a3e0229e
SP
1405 name = family_name(ifa->ifa_family);
1406 if (*name != '?') {
1407 print_string(PRINT_ANY, "family", " %s ", name);
1408 } else {
1409 print_int(PRINT_ANY, "family_index", " family %d ",
1410 ifa->ifa_family);
1411 }
5d295bb8 1412 }
aba5acdf
SH
1413
1414 if (rta_tb[IFA_LOCAL]) {
d0e72011
JF
1415 print_color_string(PRINT_ANY,
1416 ifa_family_color(ifa->ifa_family),
1417 "local", "%s",
1418 format_host_rta(ifa->ifa_family,
1419 rta_tb[IFA_LOCAL]));
ff9d8f37
PS
1420 if (rta_tb[IFA_ADDRESS] &&
1421 memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
468fa020
SH
1422 RTA_DATA(rta_tb[IFA_LOCAL]),
1423 ifa->ifa_family == AF_INET ? 4 : 16)) {
d0e72011
JF
1424 print_string(PRINT_FP, NULL, " %s ", "peer");
1425 print_color_string(PRINT_ANY,
1426 ifa_family_color(ifa->ifa_family),
1427 "address",
1428 "%s",
1429 format_host_rta(ifa->ifa_family,
1430 rta_tb[IFA_ADDRESS]));
aba5acdf 1431 }
6335c5ff 1432 print_int(PRINT_ANY, "prefixlen", "/%d ", ifa->ifa_prefixlen);
aba5acdf
SH
1433 }
1434
5d295bb8
AG
1435 if (brief)
1436 goto brief_exit;
1437
aba5acdf 1438 if (rta_tb[IFA_BROADCAST]) {
d0e72011
JF
1439 print_string(PRINT_FP, NULL, "%s ", "brd");
1440 print_color_string(PRINT_ANY,
1441 ifa_family_color(ifa->ifa_family),
1442 "broadcast",
1443 "%s ",
1444 format_host_rta(ifa->ifa_family,
1445 rta_tb[IFA_BROADCAST]));
aba5acdf 1446 }
d0e72011 1447
aba5acdf 1448 if (rta_tb[IFA_ANYCAST]) {
d0e72011
JF
1449 print_string(PRINT_FP, NULL, "%s ", "any");
1450 print_color_string(PRINT_ANY,
1451 ifa_family_color(ifa->ifa_family),
1452 "anycast",
1453 "%s ",
1454 format_host_rta(ifa->ifa_family,
1455 rta_tb[IFA_ANYCAST]));
aba5acdf 1456 }
d0e72011
JF
1457
1458 print_string(PRINT_ANY,
1459 "scope",
1460 "scope %s ",
1461 rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1)));
f73ac674
SH
1462
1463 print_ifa_flags(fp, ifa, ifa_flags);
1464
aba5acdf 1465 if (rta_tb[IFA_LABEL])
d0e72011
JF
1466 print_string(PRINT_ANY,
1467 "label",
1468 "%s",
1469 rta_getattr_str(rta_tb[IFA_LABEL]));
1470
aba5acdf
SH
1471 if (rta_tb[IFA_CACHEINFO]) {
1472 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
56f5daac 1473
d0e72011
JF
1474 print_string(PRINT_FP, NULL, "%s", _SL_);
1475 print_string(PRINT_FP, NULL, " valid_lft ", NULL);
1476
1477 if (ci->ifa_valid == INFINITY_LIFE_TIME) {
1478 print_uint(PRINT_JSON,
1479 "valid_life_time",
1480 NULL, INFINITY_LIFE_TIME);
1481 print_string(PRINT_FP, NULL, "%s", "forever");
1482 } else {
1483 print_uint(PRINT_ANY,
1484 "valid_life_time", "%usec", ci->ifa_valid);
1485 }
1486
1487 print_string(PRINT_FP, NULL, " preferred_lft ", NULL);
1488 if (ci->ifa_prefered == INFINITY_LIFE_TIME) {
1489 print_uint(PRINT_JSON,
1490 "preferred_life_time",
1491 NULL, INFINITY_LIFE_TIME);
1492 print_string(PRINT_FP, NULL, "%s", "forever");
1493 } else {
f73ac674 1494 if (ifa_flags & IFA_F_DEPRECATED)
d0e72011
JF
1495 print_int(PRINT_ANY,
1496 "preferred_life_time",
1497 "%dsec",
1498 ci->ifa_prefered);
037d950b 1499 else
d0e72011
JF
1500 print_uint(PRINT_ANY,
1501 "preferred_life_time",
1502 "%usec",
1503 ci->ifa_prefered);
037d950b 1504 }
aba5acdf 1505 }
d0e72011 1506 print_string(PRINT_FP, NULL, "%s", "\n");
5d295bb8 1507brief_exit:
aba5acdf
SH
1508 fflush(fp);
1509 return 0;
1510}
1511
5e5055bc
AH
1512static int print_selected_addrinfo(struct ifinfomsg *ifi,
1513 struct nlmsg_list *ainfo, FILE *fp)
aba5acdf 1514{
d0e72011 1515 open_json_array(PRINT_JSON, "addr_info");
56f5daac 1516 for ( ; ainfo ; ainfo = ainfo->next) {
aba5acdf
SH
1517 struct nlmsghdr *n = &ainfo->h;
1518 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1519
1520 if (n->nlmsg_type != RTM_NEWADDR)
1521 continue;
1522
6cf2609d 1523 if (n->nlmsg_len < NLMSG_LENGTH(sizeof(*ifa)))
aba5acdf
SH
1524 return -1;
1525
5e5055bc 1526 if (ifa->ifa_index != ifi->ifi_index ||
aba5acdf
SH
1527 (filter.family && filter.family != ifa->ifa_family))
1528 continue;
1529
5e5055bc
AH
1530 if (filter.up && !(ifi->ifi_flags&IFF_UP))
1531 continue;
1532
d0e72011 1533 open_json_object(NULL);
aba5acdf 1534 print_addrinfo(NULL, n, fp);
d0e72011 1535 close_json_object();
aba5acdf 1536 }
d0e72011
JF
1537 close_json_array(PRINT_JSON, NULL);
1538
5d295bb8 1539 if (brief) {
d0e72011 1540 print_string(PRINT_FP, NULL, "%s", "\n");
5d295bb8
AG
1541 fflush(fp);
1542 }
aba5acdf
SH
1543 return 0;
1544}
1545
1546
ae665a52 1547static int store_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n,
6dc9f016 1548 void *arg)
aba5acdf 1549{
62e2e540 1550 struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg;
aba5acdf 1551 struct nlmsg_list *h;
aba5acdf 1552
56f5daac 1553 h = malloc(n->nlmsg_len+sizeof(void *));
aba5acdf
SH
1554 if (h == NULL)
1555 return -1;
1556
1557 memcpy(&h->h, n, n->nlmsg_len);
1558 h->next = NULL;
1559
62e2e540
ED
1560 if (lchain->tail)
1561 lchain->tail->next = h;
1562 else
1563 lchain->head = h;
1564 lchain->tail = h;
aba5acdf
SH
1565
1566 ll_remember_index(who, n, NULL);
1567 return 0;
1568}
1569
81824ac2
PE
1570static __u32 ipadd_dump_magic = 0x47361222;
1571
1572static int ipadd_save_prep(void)
1573{
1574 int ret;
1575
1576 if (isatty(STDOUT_FILENO)) {
14645ec2 1577 fprintf(stderr, "Not sending a binary stream to stdout\n");
81824ac2
PE
1578 return -1;
1579 }
1580
1581 ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic));
1582 if (ret != sizeof(ipadd_dump_magic)) {
1583 fprintf(stderr, "Can't write magic to dump file\n");
1584 return -1;
1585 }
1586
1587 return 0;
1588}
1589
1590static int ipadd_dump_check_magic(void)
1591{
1592 int ret;
1593 __u32 magic = 0;
1594
1595 if (isatty(STDIN_FILENO)) {
4e972d5e 1596 fprintf(stderr, "Can't restore address dump from a terminal\n");
81824ac2
PE
1597 return -1;
1598 }
1599
1600 ret = fread(&magic, sizeof(magic), 1, stdin);
1601 if (magic != ipadd_dump_magic) {
1602 fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
1603 return -1;
1604 }
1605
1606 return 0;
1607}
1608
1609static int save_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n,
1610 void *arg)
1611{
1612 int ret;
1613
1614 ret = write(STDOUT_FILENO, n, n->nlmsg_len);
1615 if ((ret > 0) && (ret != n->nlmsg_len)) {
1616 fprintf(stderr, "Short write while saving nlmsg\n");
1617 ret = -EIO;
1618 }
1619
1620 return ret == n->nlmsg_len ? 0 : ret;
1621}
1622
0628cddd
ND
1623static int show_handler(const struct sockaddr_nl *nl,
1624 struct rtnl_ctrl_data *ctrl,
1625 struct nlmsghdr *n, void *arg)
81824ac2
PE
1626{
1627 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1628
1cfcf62c
PS
1629 open_json_object(NULL);
1630 print_int(PRINT_ANY, "index", "if%d:\n", ifa->ifa_index);
81824ac2 1631 print_addrinfo(NULL, n, stdout);
1cfcf62c 1632 close_json_object();
81824ac2
PE
1633 return 0;
1634}
1635
1636static int ipaddr_showdump(void)
1637{
1cfcf62c
PS
1638 int err;
1639
81824ac2
PE
1640 if (ipadd_dump_check_magic())
1641 exit(-1);
1642
429f314e 1643 new_json_obj(json);
1cfcf62c
PS
1644 open_json_object(NULL);
1645 open_json_array(PRINT_JSON, "addr_info");
1646
1647 err = rtnl_from_file(stdin, &show_handler, NULL);
1648
1649 close_json_array(PRINT_JSON, NULL);
1650 close_json_object();
1651 delete_json_obj();
1652
1653 exit(err);
81824ac2
PE
1654}
1655
0628cddd
ND
1656static int restore_handler(const struct sockaddr_nl *nl,
1657 struct rtnl_ctrl_data *ctrl,
1658 struct nlmsghdr *n, void *arg)
81824ac2
PE
1659{
1660 int ret;
1661
1662 n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
1663
1664 ll_init_map(&rth);
1665
86bf43c7 1666 ret = rtnl_talk(&rth, n, NULL);
81824ac2
PE
1667 if ((ret < 0) && (errno == EEXIST))
1668 ret = 0;
1669
1670 return ret;
1671}
1672
1673static int ipaddr_restore(void)
1674{
1675 if (ipadd_dump_check_magic())
1676 exit(-1);
1677
1678 exit(rtnl_from_file(stdin, &restore_handler, NULL));
1679}
1680
4ad87594 1681void free_nlmsg_chain(struct nlmsg_chain *info)
8d07e5f7
SH
1682{
1683 struct nlmsg_list *l, *n;
1684
1685 for (l = info->head; l; l = n) {
1686 n = l->next;
1687 free(l);
1688 }
1689}
1690
1691static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1692{
1693 struct nlmsg_list *l, **lp;
1694
1695 lp = &linfo->head;
56f5daac 1696 while ((l = *lp) != NULL) {
8d07e5f7 1697 int ok = 0;
7f747fd9 1698 int missing_net_address = 1;
8d07e5f7
SH
1699 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
1700 struct nlmsg_list *a;
1701
1702 for (a = ainfo->head; a; a = a->next) {
1703 struct nlmsghdr *n = &a->h;
1704 struct ifaddrmsg *ifa = NLMSG_DATA(n);
37c9b94e
JP
1705 struct rtattr *tb[IFA_MAX + 1];
1706 unsigned int ifa_flags;
8d07e5f7 1707
7f747fd9
PP
1708 if (ifa->ifa_index != ifi->ifi_index)
1709 continue;
1710 missing_net_address = 0;
1711 if (filter.family && filter.family != ifa->ifa_family)
8d07e5f7
SH
1712 continue;
1713 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1714 continue;
37c9b94e
JP
1715
1716 parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n));
1717 ifa_flags = get_ifa_flags(ifa, tb[IFA_FLAGS]);
1718
1719 if ((filter.flags ^ ifa_flags) & filter.flagmask)
8d07e5f7 1720 continue;
17df3d60
SP
1721
1722 if (ifa_label_match_rta(ifa->ifa_index, tb[IFA_LABEL]))
1723 continue;
1724
1725 if (!tb[IFA_LOCAL])
1726 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
1727 if (inet_addr_match_rta(&filter.pfx, tb[IFA_LOCAL]))
1728 continue;
8d07e5f7
SH
1729
1730 ok = 1;
1731 break;
1732 }
7f747fd9
PP
1733 if (missing_net_address &&
1734 (filter.family == AF_UNSPEC || filter.family == AF_PACKET))
1735 ok = 1;
8d07e5f7
SH
1736 if (!ok) {
1737 *lp = l->next;
1738 free(l);
1739 } else
1740 lp = &l->next;
1741 }
1742}
1743
1744static int ipaddr_flush(void)
1745{
1746 int round = 0;
1747 char flushb[4096-512];
1748
1749 filter.flushb = flushb;
1750 filter.flushp = 0;
1751 filter.flushe = sizeof(flushb);
1752
1753 while ((max_flush_loops == 0) || (round < max_flush_loops)) {
8d07e5f7
SH
1754 if (rtnl_wilddump_request(&rth, filter.family, RTM_GETADDR) < 0) {
1755 perror("Cannot send dump request");
1756 exit(1);
1757 }
1758 filter.flushed = 0;
d25ec03e
PS
1759 if (rtnl_dump_filter_nc(&rth, print_addrinfo,
1760 stdout, NLM_F_DUMP_INTR) < 0) {
8d07e5f7
SH
1761 fprintf(stderr, "Flush terminated\n");
1762 exit(1);
1763 }
1764 if (filter.flushed == 0) {
1765 flush_done:
1766 if (show_stats) {
1767 if (round == 0)
1768 printf("Nothing to flush.\n");
1769 else
56f5daac 1770 printf("*** Flush is complete after %d round%s ***\n", round, round > 1?"s":"");
8d07e5f7
SH
1771 }
1772 fflush(stdout);
1773 return 0;
1774 }
1775 round++;
1776 if (flush_update() < 0)
1777 return 1;
1778
1779 if (show_stats) {
1780 printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed);
1781 fflush(stdout);
1782 }
1783
1784 /* If we are flushing, and specifying primary, then we
1785 * want to flush only a single round. Otherwise, we'll
1786 * start flushing secondaries that were promoted to
1787 * primaries.
1788 */
1789 if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY))
1790 goto flush_done;
1791 }
1792 fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops);
1793 fflush(stderr);
1794 return 1;
1795}
1796
b0a4ce62
DA
1797static int iplink_filter_req(struct nlmsghdr *nlh, int reqlen)
1798{
1799 int err;
1800
1801 err = addattr32(nlh, reqlen, IFLA_EXT_MASK, RTEXT_FILTER_VF);
1802 if (err)
1803 return err;
1804
1805 if (filter.master) {
1806 err = addattr32(nlh, reqlen, IFLA_MASTER, filter.master);
1807 if (err)
1808 return err;
1809 }
1810
1811 if (filter.kind) {
1812 struct rtattr *linkinfo;
1813
1814 linkinfo = addattr_nest(nlh, reqlen, IFLA_LINKINFO);
1815
1816 err = addattr_l(nlh, reqlen, IFLA_INFO_KIND, filter.kind,
1817 strlen(filter.kind));
1818 if (err)
1819 return err;
1820
1821 addattr_nest_end(nlh, linkinfo);
1822 }
1823
1824 return 0;
1825}
1826
4ad87594
DA
1827/* fills in linfo with link data and optionally ainfo with address info
1828 * caller can walk lists as desired and must call free_nlmsg_chain for
1829 * both when done
1830 */
1831int ip_linkaddr_list(int family, req_filter_fn_t filter_fn,
1832 struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1833{
1834 if (rtnl_wilddump_req_filter_fn(&rth, preferred_family, RTM_GETLINK,
1835 filter_fn) < 0) {
1836 perror("Cannot send dump request");
1837 return 1;
1838 }
1839
1840 if (rtnl_dump_filter(&rth, store_nlmsg, linfo) < 0) {
1841 fprintf(stderr, "Dump terminated\n");
1842 return 1;
1843 }
1844
1845 if (ainfo) {
1846 if (rtnl_wilddump_request(&rth, family, RTM_GETADDR) < 0) {
1847 perror("Cannot send dump request");
1848 return 1;
1849 }
1850
1851 if (rtnl_dump_filter(&rth, store_nlmsg, ainfo) < 0) {
1852 fprintf(stderr, "Dump terminated\n");
1853 return 1;
1854 }
1855 }
1856
1857 return 0;
1858}
1859
81824ac2 1860static int ipaddr_list_flush_or_save(int argc, char **argv, int action)
aba5acdf 1861{
62e2e540 1862 struct nlmsg_chain linfo = { NULL, NULL};
4ad87594 1863 struct nlmsg_chain _ainfo = { NULL, NULL}, *ainfo = NULL;
8d07e5f7 1864 struct nlmsg_list *l;
aba5acdf
SH
1865 char *filter_dev = NULL;
1866 int no_link = 0;
1867
093b7646 1868 ipaddr_reset_filter(oneline, 0);
aba5acdf 1869 filter.showqueue = 1;
906dfe48 1870 filter.family = preferred_family;
c4fdf75d 1871 filter.group = -1;
f960c92a 1872
81824ac2 1873 if (action == IPADD_FLUSH) {
aba5acdf
SH
1874 if (argc <= 0) {
1875 fprintf(stderr, "Flush requires arguments.\n");
f960c92a 1876
aba5acdf
SH
1877 return -1;
1878 }
1879 if (filter.family == AF_PACKET) {
1880 fprintf(stderr, "Cannot flush link addresses.\n");
1881 return -1;
1882 }
1883 }
1884
1885 while (argc > 0) {
1886 if (strcmp(*argv, "to") == 0) {
1887 NEXT_ARG();
c4de9ada
SP
1888 if (get_prefix(&filter.pfx, *argv, filter.family))
1889 invarg("invalid \"to\"\n", *argv);
aba5acdf
SH
1890 if (filter.family == AF_UNSPEC)
1891 filter.family = filter.pfx.family;
1892 } else if (strcmp(*argv, "scope") == 0) {
56f5daac
SH
1893 unsigned int scope = 0;
1894
aba5acdf
SH
1895 NEXT_ARG();
1896 filter.scopemask = -1;
1897 if (rtnl_rtscope_a2n(&scope, *argv)) {
1898 if (strcmp(*argv, "all") != 0)
1899 invarg("invalid \"scope\"\n", *argv);
1900 scope = RT_SCOPE_NOWHERE;
1901 filter.scopemask = 0;
1902 }
1903 filter.scope = scope;
1904 } else if (strcmp(*argv, "up") == 0) {
1905 filter.up = 1;
f73ac674
SH
1906 } else if (get_filter(*argv) == 0) {
1907
aba5acdf
SH
1908 } else if (strcmp(*argv, "label") == 0) {
1909 NEXT_ARG();
1910 filter.label = *argv;
f960c92a
VD
1911 } else if (strcmp(*argv, "group") == 0) {
1912 NEXT_ARG();
1913 if (rtnl_group_a2n(&filter.group, *argv))
1914 invarg("Invalid \"group\" value\n", *argv);
1b944148
VK
1915 } else if (strcmp(*argv, "master") == 0) {
1916 int ifindex;
56f5daac 1917
1b944148
VK
1918 NEXT_ARG();
1919 ifindex = ll_name_to_index(*argv);
1920 if (!ifindex)
1921 invarg("Device does not exist\n", *argv);
1922 filter.master = ifindex;
104444c2
DA
1923 } else if (strcmp(*argv, "vrf") == 0) {
1924 int ifindex;
1925
1926 NEXT_ARG();
1927 ifindex = ll_name_to_index(*argv);
1928 if (!ifindex)
1929 invarg("Not a valid VRF name\n", *argv);
1930 if (!name_is_vrf(*argv))
1931 invarg("Not a valid VRF name\n", *argv);
1932 filter.master = ifindex;
24604eb2 1933 } else if (strcmp(*argv, "type") == 0) {
e0513807
PS
1934 int soff;
1935
712249d8 1936 NEXT_ARG();
e0513807
PS
1937 soff = strlen(*argv) - strlen("_slave");
1938 if (!strcmp(*argv + soff, "_slave")) {
1939 (*argv)[soff] = '\0';
1940 filter.slave_kind = *argv;
1941 } else {
1942 filter.kind = *argv;
1943 }
aba5acdf 1944 } else {
468fa020 1945 if (strcmp(*argv, "dev") == 0)
aba5acdf 1946 NEXT_ARG();
468fa020 1947 else if (matches(*argv, "help") == 0)
aba5acdf
SH
1948 usage();
1949 if (filter_dev)
1950 duparg2("dev", *argv);
1951 filter_dev = *argv;
1952 }
1953 argv++; argc--;
1954 }
1955
aba5acdf
SH
1956 if (filter_dev) {
1957 filter.ifindex = ll_name_to_index(filter_dev);
1958 if (filter.ifindex <= 0) {
1959 fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev);
1960 return -1;
1961 }
1962 }
1963
81824ac2 1964 if (action == IPADD_FLUSH)
8d07e5f7 1965 return ipaddr_flush();
351efcde 1966
81824ac2
PE
1967 if (action == IPADD_SAVE) {
1968 if (ipadd_save_prep())
1969 exit(1);
1970
1971 if (rtnl_wilddump_request(&rth, preferred_family, RTM_GETADDR) < 0) {
1972 perror("Cannot send dump request");
1973 exit(1);
1974 }
1975
1976 if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) {
1977 fprintf(stderr, "Save terminated\n");
1978 exit(1);
1979 }
1980
1981 exit(0);
1982 }
1983
d0e72011
JF
1984 /*
1985 * Initialize a json_writer and open an array object
1986 * if -json was specified.
1987 */
429f314e 1988 new_json_obj(json);
d0e72011 1989
50b9950d
RP
1990 /*
1991 * If only filter_dev present and none of the other
1992 * link filters are present, use RTM_GETLINK to get
1993 * the link device
1994 */
1995 if (filter_dev && filter.group == -1 && do_link == 1) {
1996 if (iplink_get(0, filter_dev, RTEXT_FILTER_VF) < 0) {
1997 perror("Cannot send link get request");
d0e72011 1998 delete_json_obj();
50b9950d
RP
1999 exit(1);
2000 }
d0e72011 2001 delete_json_obj();
50b9950d
RP
2002 exit(0);
2003 }
2004
af9d406f 2005 if (filter.family != AF_PACKET) {
4ad87594
DA
2006 ainfo = &_ainfo;
2007
8d07e5f7
SH
2008 if (filter.oneline)
2009 no_link = 1;
4ad87594 2010 }
8d07e5f7 2011
4ad87594
DA
2012 if (ip_linkaddr_list(filter.family, iplink_filter_req,
2013 &linfo, ainfo) != 0)
2014 goto out;
aba5acdf 2015
4ad87594
DA
2016 if (filter.family != AF_PACKET)
2017 ipaddr_filter(&linfo, ainfo);
aba5acdf 2018
8d07e5f7 2019 for (l = linfo.head; l; l = l->next) {
5d5cf1b4 2020 int res = 0;
5d295bb8 2021 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
5d5cf1b4 2022
d0e72011 2023 open_json_object(NULL);
5d295bb8 2024 if (brief) {
2cd0578f 2025 if (print_linkinfo_brief(NULL, &l->h, stdout) == 0)
5d295bb8
AG
2026 if (filter.family != AF_PACKET)
2027 print_selected_addrinfo(ifi,
4ad87594 2028 ainfo->head,
5d295bb8
AG
2029 stdout);
2030 } else if (no_link ||
d0e72011 2031 (res = print_linkinfo(NULL, &l->h, stdout)) >= 0) {
aba5acdf 2032 if (filter.family != AF_PACKET)
5e5055bc 2033 print_selected_addrinfo(ifi,
4ad87594 2034 ainfo->head, stdout);
5d5cf1b4
JB
2035 if (res > 0 && !do_link && show_stats)
2036 print_link_stats(stdout, &l->h);
aba5acdf 2037 }
d0e72011 2038 close_json_object();
aba5acdf 2039 }
8d07e5f7
SH
2040 fflush(stdout);
2041
4ad87594
DA
2042out:
2043 if (ainfo)
2044 free_nlmsg_chain(ainfo);
8d07e5f7 2045 free_nlmsg_chain(&linfo);
d0e72011 2046 delete_json_obj();
351efcde 2047 return 0;
aba5acdf
SH
2048}
2049
f89a2a05
SC
2050static void
2051ipaddr_loop_each_vf(struct rtattr *tb[], int vfnum, int *min, int *max)
2052{
2053 struct rtattr *vflist = tb[IFLA_VFINFO_LIST];
2054 struct rtattr *i, *vf[IFLA_VF_MAX+1];
2055 struct ifla_vf_rate *vf_rate;
2056 int rem;
2057
2058 rem = RTA_PAYLOAD(vflist);
2059
2060 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
2061 parse_rtattr_nested(vf, IFLA_VF_MAX, i);
39315157
GP
2062
2063 if (!vf[IFLA_VF_RATE]) {
2064 fprintf(stderr, "VF min/max rate API not supported\n");
2065 exit(1);
2066 }
2067
f89a2a05
SC
2068 vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
2069 if (vf_rate->vf == vfnum) {
2070 *min = vf_rate->min_tx_rate;
2071 *max = vf_rate->max_tx_rate;
2072 return;
2073 }
2074 }
2075 fprintf(stderr, "Cannot find VF %d\n", vfnum);
2076 exit(1);
2077}
2078
2079void ipaddr_get_vf_rate(int vfnum, int *min, int *max, int idx)
2080{
2081 struct nlmsg_chain linfo = { NULL, NULL};
2082 struct rtattr *tb[IFLA_MAX+1];
2083 struct ifinfomsg *ifi;
2084 struct nlmsg_list *l;
2085 struct nlmsghdr *n;
2086 int len;
2087
2088 if (rtnl_wilddump_request(&rth, AF_UNSPEC, RTM_GETLINK) < 0) {
2089 perror("Cannot send dump request");
2090 exit(1);
2091 }
2092 if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) {
2093 fprintf(stderr, "Dump terminated\n");
2094 exit(1);
2095 }
2096 for (l = linfo.head; l; l = l->next) {
2097 n = &l->h;
2098 ifi = NLMSG_DATA(n);
2099
2100 len = n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi));
1199c4f5 2101 if (len < 0 || (idx && idx != ifi->ifi_index))
f89a2a05
SC
2102 continue;
2103
2104 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
2105
2106 if ((tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF])) {
2107 ipaddr_loop_each_vf(tb, vfnum, min, max);
2108 return;
2109 }
2110 }
2111}
2112
aba5acdf
SH
2113int ipaddr_list_link(int argc, char **argv)
2114{
2115 preferred_family = AF_PACKET;
2116 do_link = 1;
81824ac2 2117 return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST);
aba5acdf
SH
2118}
2119
093b7646 2120void ipaddr_reset_filter(int oneline, int ifindex)
aba5acdf
SH
2121{
2122 memset(&filter, 0, sizeof(filter));
2123 filter.oneline = oneline;
093b7646 2124 filter.ifindex = ifindex;
aba5acdf
SH
2125}
2126
3d866ba2 2127static int default_scope(inet_prefix *lcl)
aba5acdf
SH
2128{
2129 if (lcl->family == AF_INET) {
56f5daac 2130 if (lcl->bytelen >= 1 && *(__u8 *)&lcl->data == 127)
aba5acdf
SH
2131 return RT_SCOPE_HOST;
2132 }
2133 return 0;
2134}
2135
e31867ac
MC
2136static bool ipaddr_is_multicast(inet_prefix *a)
2137{
2138 if (a->family == AF_INET)
2139 return IN_MULTICAST(ntohl(a->data[0]));
2140 else if (a->family == AF_INET6)
2141 return IN6_IS_ADDR_MULTICAST(a->data);
2142 else
2143 return false;
2144}
2145
3d866ba2 2146static int ipaddr_modify(int cmd, int flags, int argc, char **argv)
aba5acdf 2147{
aba5acdf 2148 struct {
4806867a
SH
2149 struct nlmsghdr n;
2150 struct ifaddrmsg ifa;
4b726cb1 2151 char buf[256];
d17b136f
PS
2152 } req = {
2153 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)),
2154 .n.nlmsg_flags = NLM_F_REQUEST | flags,
2155 .n.nlmsg_type = cmd,
2156 .ifa.ifa_family = preferred_family,
2157 };
aba5acdf
SH
2158 char *d = NULL;
2159 char *l = NULL;
f082b64f 2160 char *lcl_arg = NULL;
35546df7
MN
2161 char *valid_lftp = NULL;
2162 char *preferred_lftp = NULL;
d044ea3e 2163 inet_prefix lcl = {};
aba5acdf
SH
2164 inet_prefix peer;
2165 int local_len = 0;
2166 int peer_len = 0;
2167 int brd_len = 0;
2168 int any_len = 0;
2169 int scoped = 0;
141bb606
MN
2170 __u32 preferred_lft = INFINITY_LIFE_TIME;
2171 __u32 valid_lft = INFINITY_LIFE_TIME;
37c9b94e 2172 unsigned int ifa_flags = 0;
aba5acdf 2173
aba5acdf
SH
2174 while (argc > 0) {
2175 if (strcmp(*argv, "peer") == 0 ||
2176 strcmp(*argv, "remote") == 0) {
2177 NEXT_ARG();
2178
2179 if (peer_len)
2180 duparg("peer", *argv);
2181 get_prefix(&peer, *argv, req.ifa.ifa_family);
2182 peer_len = peer.bytelen;
2183 if (req.ifa.ifa_family == AF_UNSPEC)
2184 req.ifa.ifa_family = peer.family;
2185 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen);
2186 req.ifa.ifa_prefixlen = peer.bitlen;
2187 } else if (matches(*argv, "broadcast") == 0 ||
2188 strcmp(*argv, "brd") == 0) {
2189 inet_prefix addr;
56f5daac 2190
aba5acdf
SH
2191 NEXT_ARG();
2192 if (brd_len)
2193 duparg("broadcast", *argv);
2194 if (strcmp(*argv, "+") == 0)
2195 brd_len = -1;
2196 else if (strcmp(*argv, "-") == 0)
2197 brd_len = -2;
2198 else {
2199 get_addr(&addr, *argv, req.ifa.ifa_family);
2200 if (req.ifa.ifa_family == AF_UNSPEC)
2201 req.ifa.ifa_family = addr.family;
2202 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen);
2203 brd_len = addr.bytelen;
2204 }
2205 } else if (strcmp(*argv, "anycast") == 0) {
2206 inet_prefix addr;
56f5daac 2207
aba5acdf
SH
2208 NEXT_ARG();
2209 if (any_len)
2210 duparg("anycast", *argv);
2211 get_addr(&addr, *argv, req.ifa.ifa_family);
2212 if (req.ifa.ifa_family == AF_UNSPEC)
2213 req.ifa.ifa_family = addr.family;
2214 addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen);
2215 any_len = addr.bytelen;
2216 } else if (strcmp(*argv, "scope") == 0) {
56f5daac
SH
2217 unsigned int scope = 0;
2218
aba5acdf
SH
2219 NEXT_ARG();
2220 if (rtnl_rtscope_a2n(&scope, *argv))
f1675d61 2221 invarg("invalid scope value.", *argv);
aba5acdf
SH
2222 req.ifa.ifa_scope = scope;
2223 scoped = 1;
2224 } else if (strcmp(*argv, "dev") == 0) {
2225 NEXT_ARG();
2226 d = *argv;
2227 } else if (strcmp(*argv, "label") == 0) {
2228 NEXT_ARG();
2229 l = *argv;
2230 addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1);
35546df7
MN
2231 } else if (matches(*argv, "valid_lft") == 0) {
2232 if (valid_lftp)
2233 duparg("valid_lft", *argv);
2234 NEXT_ARG();
2235 valid_lftp = *argv;
2236 if (set_lifetime(&valid_lft, *argv))
2237 invarg("valid_lft value", *argv);
2238 } else if (matches(*argv, "preferred_lft") == 0) {
2239 if (preferred_lftp)
2240 duparg("preferred_lft", *argv);
2241 NEXT_ARG();
2242 preferred_lftp = *argv;
2243 if (set_lifetime(&preferred_lft, *argv))
2244 invarg("preferred_lft value", *argv);
bac735c5 2245 } else if (strcmp(*argv, "home") == 0) {
37c9b94e 2246 ifa_flags |= IFA_F_HOMEADDRESS;
bac735c5 2247 } else if (strcmp(*argv, "nodad") == 0) {
37c9b94e 2248 ifa_flags |= IFA_F_NODAD;
5b7e21c4
JP
2249 } else if (strcmp(*argv, "mngtmpaddr") == 0) {
2250 ifa_flags |= IFA_F_MANAGETEMPADDR;
58c69b22
TH
2251 } else if (strcmp(*argv, "noprefixroute") == 0) {
2252 ifa_flags |= IFA_F_NOPREFIXROUTE;
e31867ac
MC
2253 } else if (strcmp(*argv, "autojoin") == 0) {
2254 ifa_flags |= IFA_F_MCAUTOJOIN;
aba5acdf 2255 } else {
468fa020 2256 if (strcmp(*argv, "local") == 0)
aba5acdf 2257 NEXT_ARG();
aba5acdf
SH
2258 if (matches(*argv, "help") == 0)
2259 usage();
2260 if (local_len)
2261 duparg2("local", *argv);
f082b64f 2262 lcl_arg = *argv;
aba5acdf
SH
2263 get_prefix(&lcl, *argv, req.ifa.ifa_family);
2264 if (req.ifa.ifa_family == AF_UNSPEC)
2265 req.ifa.ifa_family = lcl.family;
2266 addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen);
2267 local_len = lcl.bytelen;
2268 }
2269 argc--; argv++;
2270 }
8b21f88d
WC
2271 if (ifa_flags <= 0xff)
2272 req.ifa.ifa_flags = ifa_flags;
2273 else
2274 addattr32(&req.n, sizeof(req), IFA_FLAGS, ifa_flags);
37c9b94e 2275
aba5acdf
SH
2276 if (d == NULL) {
2277 fprintf(stderr, "Not enough information: \"dev\" argument is required.\n");
2278 return -1;
2279 }
2280 if (l && matches(d, l) != 0) {
2281 fprintf(stderr, "\"dev\" (%s) must match \"label\" (%s).\n", d, l);
1db61e02 2282 return -1;
aba5acdf
SH
2283 }
2284
f082b64f 2285 if (peer_len == 0 && local_len) {
2286 if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) {
2287 fprintf(stderr,
468fa020
SH
2288 "Warning: Executing wildcard deletion to stay compatible with old scripts.\n"
2289 " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n"
2290 " This special behaviour is likely to disappear in further releases,\n"
f082b64f 2291 " fix your scripts!\n", lcl_arg, local_len*8);
2292 } else {
2293 peer = lcl;
2294 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen);
2295 }
aba5acdf
SH
2296 }
2297 if (req.ifa.ifa_prefixlen == 0)
2298 req.ifa.ifa_prefixlen = lcl.bitlen;
2299
2300 if (brd_len < 0 && cmd != RTM_DELADDR) {
2301 inet_prefix brd;
2302 int i;
56f5daac 2303
aba5acdf
SH
2304 if (req.ifa.ifa_family != AF_INET) {
2305 fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n");
2306 return -1;
2307 }
2308 brd = peer;
2309 if (brd.bitlen <= 30) {
4b726cb1 2310 for (i = 31; i >= brd.bitlen; i--) {
aba5acdf
SH
2311 if (brd_len == -1)
2312 brd.data[0] |= htonl(1<<(31-i));
2313 else
2314 brd.data[0] &= ~htonl(1<<(31-i));
2315 }
2316 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen);
2317 brd_len = brd.bytelen;
2318 }
2319 }
2320 if (!scoped && cmd != RTM_DELADDR)
2321 req.ifa.ifa_scope = default_scope(&lcl);
2322
aba5acdf
SH
2323 if ((req.ifa.ifa_index = ll_name_to_index(d)) == 0) {
2324 fprintf(stderr, "Cannot find device \"%s\"\n", d);
2325 return -1;
2326 }
2327
35546df7 2328 if (valid_lftp || preferred_lftp) {
d17b136f
PS
2329 struct ifa_cacheinfo cinfo = {};
2330
35546df7
MN
2331 if (!valid_lft) {
2332 fprintf(stderr, "valid_lft is zero\n");
2333 return -1;
2334 }
2335 if (valid_lft < preferred_lft) {
2336 fprintf(stderr, "preferred_lft is greater than valid_lft\n");
2337 return -1;
2338 }
2339
35546df7
MN
2340 cinfo.ifa_prefered = preferred_lft;
2341 cinfo.ifa_valid = valid_lft;
2342 addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo,
2343 sizeof(cinfo));
2344 }
2345
e31867ac
MC
2346 if ((ifa_flags & IFA_F_MCAUTOJOIN) && !ipaddr_is_multicast(&lcl)) {
2347 fprintf(stderr, "autojoin needs multicast address\n");
2348 return -1;
2349 }
2350
86bf43c7 2351 if (rtnl_talk(&rth, &req.n, NULL) < 0)
1db61e02 2352 return -2;
aba5acdf 2353
351efcde 2354 return 0;
aba5acdf
SH
2355}
2356
2357int do_ipaddr(int argc, char **argv)
2358{
2359 if (argc < 1)
81824ac2 2360 return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST);
aba5acdf 2361 if (matches(*argv, "add") == 0)
0aef366b
NT
2362 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
2363 if (matches(*argv, "change") == 0 ||
2364 strcmp(*argv, "chg") == 0)
2365 return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1);
2366 if (matches(*argv, "replace") == 0)
2367 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
aba5acdf 2368 if (matches(*argv, "delete") == 0)
0aef366b 2369 return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1);
aba5acdf
SH
2370 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
2371 || matches(*argv, "lst") == 0)
81824ac2 2372 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST);
aba5acdf 2373 if (matches(*argv, "flush") == 0)
81824ac2
PE
2374 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH);
2375 if (matches(*argv, "save") == 0)
2376 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE);
2377 if (matches(*argv, "showdump") == 0)
2378 return ipaddr_showdump();
2379 if (matches(*argv, "restore") == 0)
2380 return ipaddr_restore();
aba5acdf
SH
2381 if (matches(*argv, "help") == 0)
2382 usage();
4e972d5e 2383 fprintf(stderr, "Command \"%s\" is unknown, try \"ip address help\".\n", *argv);
aba5acdf
SH
2384 exit(-1);
2385}