]>
Commit | Line | Data |
---|---|---|
1 | /* | |
2 | * ipaddress.c "ip address". | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or | |
5 | * modify it under the terms of the GNU General Public License | |
6 | * as published by the Free Software Foundation; either version | |
7 | * 2 of the License, or (at your option) any later version. | |
8 | * | |
9 | * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> | |
10 | * | |
11 | */ | |
12 | ||
13 | #include <stdio.h> | |
14 | #include <stdlib.h> | |
15 | #include <unistd.h> | |
16 | #include <inttypes.h> | |
17 | #include <fcntl.h> | |
18 | #include <sys/ioctl.h> | |
19 | #include <sys/socket.h> | |
20 | #include <sys/param.h> | |
21 | #include <errno.h> | |
22 | #include <netinet/in.h> | |
23 | #include <arpa/inet.h> | |
24 | #include <string.h> | |
25 | #include <fnmatch.h> | |
26 | ||
27 | #include <linux/netdevice.h> | |
28 | #include <linux/if_arp.h> | |
29 | #include <linux/sockios.h> | |
30 | #include <linux/net_namespace.h> | |
31 | ||
32 | #include "utils.h" | |
33 | #include "rt_names.h" | |
34 | #include "utils.h" | |
35 | #include "ll_map.h" | |
36 | #include "ip_common.h" | |
37 | #include "color.h" | |
38 | ||
39 | enum { | |
40 | IPADD_LIST, | |
41 | IPADD_FLUSH, | |
42 | IPADD_SAVE, | |
43 | }; | |
44 | ||
45 | static struct link_filter filter; | |
46 | static int do_link; | |
47 | ||
48 | static void usage(void) __attribute__((noreturn)); | |
49 | ||
50 | static void usage(void) | |
51 | { | |
52 | if (do_link) | |
53 | iplink_usage(); | |
54 | ||
55 | fprintf(stderr, "Usage: ip address {add|change|replace} IFADDR dev IFNAME [ LIFETIME ]\n"); | |
56 | fprintf(stderr, " [ CONFFLAG-LIST ]\n"); | |
57 | fprintf(stderr, " ip address del IFADDR dev IFNAME [mngtmpaddr]\n"); | |
58 | fprintf(stderr, " ip address {save|flush} [ dev IFNAME ] [ scope SCOPE-ID ]\n"); | |
59 | fprintf(stderr, " [ to PREFIX ] [ FLAG-LIST ] [ label LABEL ] [up]\n"); | |
60 | fprintf(stderr, " ip address [ show [ dev IFNAME ] [ scope SCOPE-ID ] [ master DEVICE ]\n"); | |
61 | fprintf(stderr, " [ type TYPE ] [ to PREFIX ] [ FLAG-LIST ]\n"); | |
62 | fprintf(stderr, " [ label LABEL ] [up] [ vrf NAME ] ]\n"); | |
63 | fprintf(stderr, " ip address {showdump|restore}\n"); | |
64 | fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); | |
65 | fprintf(stderr, " [ broadcast ADDR ] [ anycast ADDR ]\n"); | |
66 | fprintf(stderr, " [ label IFNAME ] [ scope SCOPE-ID ] [ metric METRIC ]\n"); | |
67 | fprintf(stderr, "SCOPE-ID := [ host | link | global | NUMBER ]\n"); | |
68 | fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] FLAG\n"); | |
69 | fprintf(stderr, "FLAG := [ permanent | dynamic | secondary | primary |\n"); | |
70 | fprintf(stderr, " [-]tentative | [-]deprecated | [-]dadfailed | temporary |\n"); | |
71 | fprintf(stderr, " CONFFLAG-LIST ]\n"); | |
72 | fprintf(stderr, "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n"); | |
73 | fprintf(stderr, "CONFFLAG := [ home | nodad | mngtmpaddr | noprefixroute | autojoin ]\n"); | |
74 | fprintf(stderr, "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n"); | |
75 | fprintf(stderr, "LFT := forever | SECONDS\n"); | |
76 | fprintf(stderr, "TYPE := { vlan | veth | vcan | vxcan | dummy | ifb | macvlan | macvtap |\n"); | |
77 | fprintf(stderr, " bridge | bond | ipoib | ip6tnl | ipip | sit | vxlan | lowpan |\n"); | |
78 | fprintf(stderr, " gre | gretap | erspan | ip6gre | ip6gretap | ip6erspan | vti |\n"); | |
79 | fprintf(stderr, " nlmon | can | bond_slave | ipvlan | geneve | bridge_slave |\n"); | |
80 | fprintf(stderr, " hsr | macsec | netdevsim }\n"); | |
81 | ||
82 | exit(-1); | |
83 | } | |
84 | ||
85 | static void print_link_flags(FILE *fp, unsigned int flags, unsigned int mdown) | |
86 | { | |
87 | open_json_array(PRINT_ANY, is_json_context() ? "flags" : "<"); | |
88 | if (flags & IFF_UP && !(flags & IFF_RUNNING)) | |
89 | print_string(PRINT_ANY, NULL, | |
90 | flags ? "%s," : "%s", "NO-CARRIER"); | |
91 | flags &= ~IFF_RUNNING; | |
92 | #define _PF(f) if (flags&IFF_##f) { \ | |
93 | flags &= ~IFF_##f ; \ | |
94 | print_string(PRINT_ANY, NULL, flags ? "%s," : "%s", #f); } | |
95 | _PF(LOOPBACK); | |
96 | _PF(BROADCAST); | |
97 | _PF(POINTOPOINT); | |
98 | _PF(MULTICAST); | |
99 | _PF(NOARP); | |
100 | _PF(ALLMULTI); | |
101 | _PF(PROMISC); | |
102 | _PF(MASTER); | |
103 | _PF(SLAVE); | |
104 | _PF(DEBUG); | |
105 | _PF(DYNAMIC); | |
106 | _PF(AUTOMEDIA); | |
107 | _PF(PORTSEL); | |
108 | _PF(NOTRAILERS); | |
109 | _PF(UP); | |
110 | _PF(LOWER_UP); | |
111 | _PF(DORMANT); | |
112 | _PF(ECHO); | |
113 | #undef _PF | |
114 | if (flags) | |
115 | print_hex(PRINT_ANY, NULL, "%x", flags); | |
116 | if (mdown) | |
117 | print_string(PRINT_ANY, NULL, ",%s", "M-DOWN"); | |
118 | close_json_array(PRINT_ANY, "> "); | |
119 | } | |
120 | ||
121 | static const char *oper_states[] = { | |
122 | "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN", | |
123 | "TESTING", "DORMANT", "UP" | |
124 | }; | |
125 | ||
126 | static void print_operstate(FILE *f, __u8 state) | |
127 | { | |
128 | if (state >= ARRAY_SIZE(oper_states)) { | |
129 | if (is_json_context()) | |
130 | print_uint(PRINT_JSON, "operstate_index", NULL, state); | |
131 | else | |
132 | print_0xhex(PRINT_FP, NULL, "state %#x", state); | |
133 | } else if (brief) { | |
134 | print_color_string(PRINT_ANY, | |
135 | oper_state_color(state), | |
136 | "operstate", | |
137 | "%-14s ", | |
138 | oper_states[state]); | |
139 | } else { | |
140 | if (is_json_context()) | |
141 | print_string(PRINT_JSON, | |
142 | "operstate", | |
143 | NULL, oper_states[state]); | |
144 | else { | |
145 | fprintf(f, "state "); | |
146 | color_fprintf(f, oper_state_color(state), | |
147 | "%s ", oper_states[state]); | |
148 | } | |
149 | } | |
150 | } | |
151 | ||
152 | int get_operstate(const char *name) | |
153 | { | |
154 | int i; | |
155 | ||
156 | for (i = 0; i < ARRAY_SIZE(oper_states); i++) | |
157 | if (strcasecmp(name, oper_states[i]) == 0) | |
158 | return i; | |
159 | return -1; | |
160 | } | |
161 | ||
162 | static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1]) | |
163 | { | |
164 | int qlen; | |
165 | ||
166 | if (tb[IFLA_TXQLEN]) | |
167 | qlen = rta_getattr_u32(tb[IFLA_TXQLEN]); | |
168 | else { | |
169 | struct ifreq ifr = {}; | |
170 | int s = socket(AF_INET, SOCK_STREAM, 0); | |
171 | ||
172 | if (s < 0) | |
173 | return; | |
174 | ||
175 | strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME])); | |
176 | if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) { | |
177 | fprintf(f, "ioctl(SIOCGIFTXQLEN) failed: %s\n", strerror(errno)); | |
178 | close(s); | |
179 | return; | |
180 | } | |
181 | close(s); | |
182 | qlen = ifr.ifr_qlen; | |
183 | } | |
184 | if (qlen) | |
185 | print_int(PRINT_ANY, "txqlen", "qlen %d", qlen); | |
186 | } | |
187 | ||
188 | static const char *link_modes[] = { | |
189 | "DEFAULT", "DORMANT" | |
190 | }; | |
191 | ||
192 | static void print_linkmode(FILE *f, struct rtattr *tb) | |
193 | { | |
194 | unsigned int mode = rta_getattr_u8(tb); | |
195 | ||
196 | if (mode >= ARRAY_SIZE(link_modes)) | |
197 | print_int(PRINT_ANY, | |
198 | "linkmode_index", | |
199 | "mode %d ", | |
200 | mode); | |
201 | else | |
202 | print_string(PRINT_ANY, | |
203 | "linkmode", | |
204 | "mode %s " | |
205 | , link_modes[mode]); | |
206 | } | |
207 | ||
208 | static char *parse_link_kind(struct rtattr *tb, bool slave) | |
209 | { | |
210 | struct rtattr *linkinfo[IFLA_INFO_MAX+1]; | |
211 | int attr = slave ? IFLA_INFO_SLAVE_KIND : IFLA_INFO_KIND; | |
212 | ||
213 | parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb); | |
214 | ||
215 | if (linkinfo[attr]) | |
216 | return RTA_DATA(linkinfo[attr]); | |
217 | ||
218 | return ""; | |
219 | } | |
220 | ||
221 | static int match_link_kind(struct rtattr **tb, const char *kind, bool slave) | |
222 | { | |
223 | if (!tb[IFLA_LINKINFO]) | |
224 | return -1; | |
225 | ||
226 | return strcmp(parse_link_kind(tb[IFLA_LINKINFO], slave), kind); | |
227 | } | |
228 | ||
229 | static void print_linktype(FILE *fp, struct rtattr *tb) | |
230 | { | |
231 | struct rtattr *linkinfo[IFLA_INFO_MAX+1]; | |
232 | struct link_util *lu; | |
233 | struct link_util *slave_lu; | |
234 | char slave[32]; | |
235 | ||
236 | parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb); | |
237 | open_json_object("linkinfo"); | |
238 | ||
239 | if (linkinfo[IFLA_INFO_KIND]) { | |
240 | const char *kind | |
241 | = rta_getattr_str(linkinfo[IFLA_INFO_KIND]); | |
242 | ||
243 | print_nl(); | |
244 | print_string(PRINT_ANY, "info_kind", " %s ", kind); | |
245 | ||
246 | lu = get_link_kind(kind); | |
247 | if (lu && lu->print_opt) { | |
248 | struct rtattr *attr[lu->maxattr+1], **data = NULL; | |
249 | ||
250 | if (linkinfo[IFLA_INFO_DATA]) { | |
251 | parse_rtattr_nested(attr, lu->maxattr, | |
252 | linkinfo[IFLA_INFO_DATA]); | |
253 | data = attr; | |
254 | } | |
255 | open_json_object("info_data"); | |
256 | lu->print_opt(lu, fp, data); | |
257 | close_json_object(); | |
258 | ||
259 | if (linkinfo[IFLA_INFO_XSTATS] && show_stats && | |
260 | lu->print_xstats) { | |
261 | open_json_object("info_xstats"); | |
262 | lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]); | |
263 | close_json_object(); | |
264 | } | |
265 | } | |
266 | } | |
267 | ||
268 | if (linkinfo[IFLA_INFO_SLAVE_KIND]) { | |
269 | const char *slave_kind | |
270 | = rta_getattr_str(linkinfo[IFLA_INFO_SLAVE_KIND]); | |
271 | ||
272 | print_nl(); | |
273 | print_string(PRINT_ANY, | |
274 | "info_slave_kind", | |
275 | " %s_slave ", | |
276 | slave_kind); | |
277 | ||
278 | snprintf(slave, sizeof(slave), "%s_slave", slave_kind); | |
279 | ||
280 | slave_lu = get_link_kind(slave); | |
281 | if (slave_lu && slave_lu->print_opt) { | |
282 | struct rtattr *attr[slave_lu->maxattr+1], **data = NULL; | |
283 | ||
284 | if (linkinfo[IFLA_INFO_SLAVE_DATA]) { | |
285 | parse_rtattr_nested(attr, slave_lu->maxattr, | |
286 | linkinfo[IFLA_INFO_SLAVE_DATA]); | |
287 | data = attr; | |
288 | } | |
289 | open_json_object("info_slave_data"); | |
290 | slave_lu->print_opt(slave_lu, fp, data); | |
291 | close_json_object(); | |
292 | } | |
293 | } | |
294 | close_json_object(); | |
295 | } | |
296 | ||
297 | static void print_af_spec(FILE *fp, struct rtattr *af_spec_attr) | |
298 | { | |
299 | struct rtattr *inet6_attr; | |
300 | struct rtattr *tb[IFLA_INET6_MAX + 1]; | |
301 | ||
302 | inet6_attr = parse_rtattr_one_nested(AF_INET6, af_spec_attr); | |
303 | if (!inet6_attr) | |
304 | return; | |
305 | ||
306 | parse_rtattr_nested(tb, IFLA_INET6_MAX, inet6_attr); | |
307 | ||
308 | if (tb[IFLA_INET6_ADDR_GEN_MODE]) { | |
309 | __u8 mode = rta_getattr_u8(tb[IFLA_INET6_ADDR_GEN_MODE]); | |
310 | SPRINT_BUF(b1); | |
311 | ||
312 | switch (mode) { | |
313 | case IN6_ADDR_GEN_MODE_EUI64: | |
314 | print_string(PRINT_ANY, | |
315 | "inet6_addr_gen_mode", | |
316 | "addrgenmode %s ", | |
317 | "eui64"); | |
318 | break; | |
319 | case IN6_ADDR_GEN_MODE_NONE: | |
320 | print_string(PRINT_ANY, | |
321 | "inet6_addr_gen_mode", | |
322 | "addrgenmode %s ", | |
323 | "none"); | |
324 | break; | |
325 | case IN6_ADDR_GEN_MODE_STABLE_PRIVACY: | |
326 | print_string(PRINT_ANY, | |
327 | "inet6_addr_gen_mode", | |
328 | "addrgenmode %s ", | |
329 | "stable_secret"); | |
330 | break; | |
331 | case IN6_ADDR_GEN_MODE_RANDOM: | |
332 | print_string(PRINT_ANY, | |
333 | "inet6_addr_gen_mode", | |
334 | "addrgenmode %s ", | |
335 | "random"); | |
336 | break; | |
337 | default: | |
338 | snprintf(b1, sizeof(b1), "%#.2hhx", mode); | |
339 | print_string(PRINT_ANY, | |
340 | "inet6_addr_gen_mode", | |
341 | "addrgenmode %s ", | |
342 | b1); | |
343 | break; | |
344 | } | |
345 | } | |
346 | } | |
347 | ||
348 | static void print_vf_stats64(FILE *fp, struct rtattr *vfstats); | |
349 | ||
350 | static void print_vfinfo(FILE *fp, struct rtattr *vfinfo) | |
351 | { | |
352 | struct ifla_vf_mac *vf_mac; | |
353 | struct ifla_vf_tx_rate *vf_tx_rate; | |
354 | struct rtattr *vf[IFLA_VF_MAX + 1] = {}; | |
355 | ||
356 | SPRINT_BUF(b1); | |
357 | ||
358 | if (vfinfo->rta_type != IFLA_VF_INFO) { | |
359 | fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type); | |
360 | return; | |
361 | } | |
362 | ||
363 | parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo); | |
364 | ||
365 | vf_mac = RTA_DATA(vf[IFLA_VF_MAC]); | |
366 | vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]); | |
367 | ||
368 | print_string(PRINT_FP, NULL, "%s ", _SL_); | |
369 | print_int(PRINT_ANY, "vf", "vf %d ", vf_mac->vf); | |
370 | print_string(PRINT_ANY, "mac", "MAC %s", | |
371 | ll_addr_n2a((unsigned char *) &vf_mac->mac, | |
372 | ETH_ALEN, 0, b1, sizeof(b1))); | |
373 | ||
374 | if (vf[IFLA_VF_VLAN_LIST]) { | |
375 | struct rtattr *i, *vfvlanlist = vf[IFLA_VF_VLAN_LIST]; | |
376 | int rem = RTA_PAYLOAD(vfvlanlist); | |
377 | ||
378 | open_json_array(PRINT_JSON, "vlan_list"); | |
379 | for (i = RTA_DATA(vfvlanlist); | |
380 | RTA_OK(i, rem); i = RTA_NEXT(i, rem)) { | |
381 | struct ifla_vf_vlan_info *vf_vlan_info = RTA_DATA(i); | |
382 | SPRINT_BUF(b2); | |
383 | ||
384 | open_json_object(NULL); | |
385 | if (vf_vlan_info->vlan) | |
386 | print_int(PRINT_ANY, | |
387 | "vlan", | |
388 | ", vlan %d", | |
389 | vf_vlan_info->vlan); | |
390 | if (vf_vlan_info->qos) | |
391 | print_int(PRINT_ANY, | |
392 | "qos", | |
393 | ", qos %d", | |
394 | vf_vlan_info->qos); | |
395 | if (vf_vlan_info->vlan_proto && | |
396 | vf_vlan_info->vlan_proto != htons(ETH_P_8021Q)) | |
397 | print_string(PRINT_ANY, | |
398 | "protocol", | |
399 | ", vlan protocol %s", | |
400 | ll_proto_n2a( | |
401 | vf_vlan_info->vlan_proto, | |
402 | b2, sizeof(b2))); | |
403 | close_json_object(); | |
404 | } | |
405 | close_json_array(PRINT_JSON, NULL); | |
406 | } else { | |
407 | struct ifla_vf_vlan *vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]); | |
408 | ||
409 | if (vf_vlan->vlan) | |
410 | print_int(PRINT_ANY, | |
411 | "vlan", | |
412 | ", vlan %d", | |
413 | vf_vlan->vlan); | |
414 | if (vf_vlan->qos) | |
415 | print_int(PRINT_ANY, "qos", ", qos %d", vf_vlan->qos); | |
416 | } | |
417 | ||
418 | if (vf_tx_rate->rate) | |
419 | print_uint(PRINT_ANY, | |
420 | "tx_rate", | |
421 | ", tx rate %u (Mbps)", | |
422 | vf_tx_rate->rate); | |
423 | ||
424 | if (vf[IFLA_VF_RATE]) { | |
425 | struct ifla_vf_rate *vf_rate = RTA_DATA(vf[IFLA_VF_RATE]); | |
426 | int max_tx = vf_rate->max_tx_rate; | |
427 | int min_tx = vf_rate->min_tx_rate; | |
428 | ||
429 | if (is_json_context()) { | |
430 | open_json_object("rate"); | |
431 | print_uint(PRINT_JSON, "max_tx", NULL, max_tx); | |
432 | print_uint(PRINT_ANY, "min_tx", NULL, min_tx); | |
433 | close_json_object(); | |
434 | } else { | |
435 | if (max_tx) | |
436 | fprintf(fp, ", max_tx_rate %uMbps", max_tx); | |
437 | if (min_tx) | |
438 | fprintf(fp, ", min_tx_rate %uMbps", min_tx); | |
439 | } | |
440 | } | |
441 | ||
442 | if (vf[IFLA_VF_SPOOFCHK]) { | |
443 | struct ifla_vf_spoofchk *vf_spoofchk = | |
444 | RTA_DATA(vf[IFLA_VF_SPOOFCHK]); | |
445 | ||
446 | if (vf_spoofchk->setting != -1) | |
447 | print_bool(PRINT_ANY, | |
448 | "spoofchk", | |
449 | vf_spoofchk->setting ? | |
450 | ", spoof checking on" : ", spoof checking off", | |
451 | vf_spoofchk->setting); | |
452 | } | |
453 | ||
454 | if (vf[IFLA_VF_LINK_STATE]) { | |
455 | struct ifla_vf_link_state *vf_linkstate = | |
456 | RTA_DATA(vf[IFLA_VF_LINK_STATE]); | |
457 | ||
458 | if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_AUTO) | |
459 | print_string(PRINT_ANY, | |
460 | "link_state", | |
461 | ", link-state %s", | |
462 | "auto"); | |
463 | else if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_ENABLE) | |
464 | print_string(PRINT_ANY, | |
465 | "link_state", | |
466 | ", link-state %s", | |
467 | "enable"); | |
468 | else | |
469 | print_string(PRINT_ANY, | |
470 | "link_state", | |
471 | ", link-state %s", | |
472 | "disable"); | |
473 | } | |
474 | ||
475 | if (vf[IFLA_VF_TRUST]) { | |
476 | struct ifla_vf_trust *vf_trust = RTA_DATA(vf[IFLA_VF_TRUST]); | |
477 | ||
478 | if (vf_trust->setting != -1) | |
479 | print_bool(PRINT_ANY, | |
480 | "trust", | |
481 | vf_trust->setting ? ", trust on" : ", trust off", | |
482 | vf_trust->setting); | |
483 | } | |
484 | ||
485 | if (vf[IFLA_VF_RSS_QUERY_EN]) { | |
486 | struct ifla_vf_rss_query_en *rss_query = | |
487 | RTA_DATA(vf[IFLA_VF_RSS_QUERY_EN]); | |
488 | ||
489 | if (rss_query->setting != -1) | |
490 | print_bool(PRINT_ANY, | |
491 | "query_rss_en", | |
492 | rss_query->setting ? ", query_rss on" | |
493 | : ", query_rss off", | |
494 | rss_query->setting); | |
495 | } | |
496 | ||
497 | if (vf[IFLA_VF_STATS] && show_stats) | |
498 | print_vf_stats64(fp, vf[IFLA_VF_STATS]); | |
499 | } | |
500 | ||
501 | void print_num(FILE *fp, unsigned int width, uint64_t count) | |
502 | { | |
503 | const char *prefix = "kMGTPE"; | |
504 | const unsigned int base = use_iec ? 1024 : 1000; | |
505 | uint64_t powi = 1; | |
506 | uint16_t powj = 1; | |
507 | uint8_t precision = 2; | |
508 | char buf[64]; | |
509 | ||
510 | if (!human_readable || count < base) { | |
511 | fprintf(fp, "%-*"PRIu64" ", width, count); | |
512 | return; | |
513 | } | |
514 | ||
515 | /* increase value by a factor of 1000/1024 and print | |
516 | * if result is something a human can read | |
517 | */ | |
518 | for (;;) { | |
519 | powi *= base; | |
520 | if (count / base < powi) | |
521 | break; | |
522 | ||
523 | if (!prefix[1]) | |
524 | break; | |
525 | ++prefix; | |
526 | } | |
527 | ||
528 | /* try to guess a good number of digits for precision */ | |
529 | for (; precision > 0; precision--) { | |
530 | powj *= 10; | |
531 | if (count / powi < powj) | |
532 | break; | |
533 | } | |
534 | ||
535 | snprintf(buf, sizeof(buf), "%.*f%c%s", precision, | |
536 | (double) count / powi, *prefix, use_iec ? "i" : ""); | |
537 | ||
538 | fprintf(fp, "%-*s ", width, buf); | |
539 | } | |
540 | ||
541 | static void print_vf_stats64(FILE *fp, struct rtattr *vfstats) | |
542 | { | |
543 | struct rtattr *vf[IFLA_VF_STATS_MAX + 1]; | |
544 | ||
545 | if (vfstats->rta_type != IFLA_VF_STATS) { | |
546 | fprintf(stderr, "BUG: rta type is %d\n", vfstats->rta_type); | |
547 | return; | |
548 | } | |
549 | ||
550 | parse_rtattr_nested(vf, IFLA_VF_MAX, vfstats); | |
551 | ||
552 | if (is_json_context()) { | |
553 | open_json_object("stats"); | |
554 | ||
555 | /* RX stats */ | |
556 | open_json_object("rx"); | |
557 | print_u64(PRINT_JSON, "bytes", NULL, | |
558 | rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES])); | |
559 | print_u64(PRINT_JSON, "packets", NULL, | |
560 | rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS])); | |
561 | print_u64(PRINT_JSON, "multicast", NULL, | |
562 | rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST])); | |
563 | print_u64(PRINT_JSON, "broadcast", NULL, | |
564 | rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST])); | |
565 | if (vf[IFLA_VF_STATS_RX_DROPPED]) | |
566 | print_u64(PRINT_JSON, "dropped", NULL, | |
567 | rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED])); | |
568 | close_json_object(); | |
569 | ||
570 | /* TX stats */ | |
571 | open_json_object("tx"); | |
572 | print_u64(PRINT_JSON, "tx_bytes", NULL, | |
573 | rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES])); | |
574 | print_u64(PRINT_JSON, "tx_packets", NULL, | |
575 | rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS])); | |
576 | if (vf[IFLA_VF_STATS_TX_DROPPED]) | |
577 | print_u64(PRINT_JSON, "dropped", NULL, | |
578 | rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED])); | |
579 | close_json_object(); | |
580 | close_json_object(); | |
581 | } else { | |
582 | /* RX stats */ | |
583 | fprintf(fp, "%s", _SL_); | |
584 | fprintf(fp, " RX: bytes packets mcast bcast "); | |
585 | if (vf[IFLA_VF_STATS_RX_DROPPED]) | |
586 | fprintf(fp, " dropped "); | |
587 | fprintf(fp, "%s", _SL_); | |
588 | fprintf(fp, " "); | |
589 | ||
590 | print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES])); | |
591 | print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS])); | |
592 | print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST])); | |
593 | print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST])); | |
594 | if (vf[IFLA_VF_STATS_RX_DROPPED]) | |
595 | print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED])); | |
596 | ||
597 | /* TX stats */ | |
598 | fprintf(fp, "%s", _SL_); | |
599 | fprintf(fp, " TX: bytes packets "); | |
600 | if (vf[IFLA_VF_STATS_TX_DROPPED]) | |
601 | fprintf(fp, " dropped "); | |
602 | fprintf(fp, "%s", _SL_); | |
603 | fprintf(fp, " "); | |
604 | ||
605 | print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES])); | |
606 | print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS])); | |
607 | if (vf[IFLA_VF_STATS_TX_DROPPED]) | |
608 | print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED])); | |
609 | } | |
610 | } | |
611 | ||
612 | static void __print_link_stats(FILE *fp, struct rtattr *tb[]) | |
613 | { | |
614 | const struct rtattr *carrier_changes = tb[IFLA_CARRIER_CHANGES]; | |
615 | struct rtnl_link_stats64 _s, *s = &_s; | |
616 | int ret; | |
617 | ||
618 | ret = get_rtnl_link_stats_rta(s, tb); | |
619 | if (ret < 0) | |
620 | return; | |
621 | ||
622 | if (is_json_context()) { | |
623 | open_json_object((ret == sizeof(*s)) ? "stats64" : "stats"); | |
624 | ||
625 | /* RX stats */ | |
626 | open_json_object("rx"); | |
627 | print_u64(PRINT_JSON, "bytes", NULL, s->rx_bytes); | |
628 | print_u64(PRINT_JSON, "packets", NULL, s->rx_packets); | |
629 | print_u64(PRINT_JSON, "errors", NULL, s->rx_errors); | |
630 | print_u64(PRINT_JSON, "dropped", NULL, s->rx_dropped); | |
631 | print_u64(PRINT_JSON, "over_errors", NULL, s->rx_over_errors); | |
632 | print_u64(PRINT_JSON, "multicast", NULL, s->multicast); | |
633 | if (s->rx_compressed) | |
634 | print_u64(PRINT_JSON, | |
635 | "compressed", NULL, s->rx_compressed); | |
636 | ||
637 | /* RX error stats */ | |
638 | if (show_stats > 1) { | |
639 | print_u64(PRINT_JSON, | |
640 | "length_errors", | |
641 | NULL, s->rx_length_errors); | |
642 | print_u64(PRINT_JSON, | |
643 | "crc_errors", | |
644 | NULL, s->rx_crc_errors); | |
645 | print_u64(PRINT_JSON, | |
646 | "frame_errors", | |
647 | NULL, s->rx_frame_errors); | |
648 | print_u64(PRINT_JSON, | |
649 | "fifo_errors", | |
650 | NULL, s->rx_fifo_errors); | |
651 | print_u64(PRINT_JSON, | |
652 | "missed_errors", | |
653 | NULL, s->rx_missed_errors); | |
654 | if (s->rx_nohandler) | |
655 | print_u64(PRINT_JSON, | |
656 | "nohandler", NULL, s->rx_nohandler); | |
657 | } | |
658 | close_json_object(); | |
659 | ||
660 | /* TX stats */ | |
661 | open_json_object("tx"); | |
662 | print_u64(PRINT_JSON, "bytes", NULL, s->tx_bytes); | |
663 | print_u64(PRINT_JSON, "packets", NULL, s->tx_packets); | |
664 | print_u64(PRINT_JSON, "errors", NULL, s->tx_errors); | |
665 | print_u64(PRINT_JSON, "dropped", NULL, s->tx_dropped); | |
666 | print_u64(PRINT_JSON, | |
667 | "carrier_errors", | |
668 | NULL, s->tx_carrier_errors); | |
669 | print_u64(PRINT_JSON, "collisions", NULL, s->collisions); | |
670 | if (s->tx_compressed) | |
671 | print_u64(PRINT_JSON, | |
672 | "compressed", NULL, s->tx_compressed); | |
673 | ||
674 | /* TX error stats */ | |
675 | if (show_stats > 1) { | |
676 | print_u64(PRINT_JSON, | |
677 | "aborted_errors", | |
678 | NULL, s->tx_aborted_errors); | |
679 | print_u64(PRINT_JSON, | |
680 | "fifo_errors", | |
681 | NULL, s->tx_fifo_errors); | |
682 | print_u64(PRINT_JSON, | |
683 | "window_errors", | |
684 | NULL, s->tx_window_errors); | |
685 | print_u64(PRINT_JSON, | |
686 | "heartbeat_errors", | |
687 | NULL, s->tx_heartbeat_errors); | |
688 | if (carrier_changes) | |
689 | print_u64(PRINT_JSON, "carrier_changes", NULL, | |
690 | rta_getattr_u32(carrier_changes)); | |
691 | } | |
692 | ||
693 | close_json_object(); | |
694 | close_json_object(); | |
695 | } else { | |
696 | /* RX stats */ | |
697 | fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s", | |
698 | s->rx_compressed ? "compressed" : "", _SL_); | |
699 | ||
700 | fprintf(fp, " "); | |
701 | print_num(fp, 10, s->rx_bytes); | |
702 | print_num(fp, 8, s->rx_packets); | |
703 | print_num(fp, 7, s->rx_errors); | |
704 | print_num(fp, 7, s->rx_dropped); | |
705 | print_num(fp, 7, s->rx_over_errors); | |
706 | print_num(fp, 7, s->multicast); | |
707 | if (s->rx_compressed) | |
708 | print_num(fp, 7, s->rx_compressed); | |
709 | ||
710 | /* RX error stats */ | |
711 | if (show_stats > 1) { | |
712 | fprintf(fp, "%s", _SL_); | |
713 | fprintf(fp, " RX errors: length crc frame fifo missed%s%s", | |
714 | s->rx_nohandler ? " nohandler" : "", _SL_); | |
715 | fprintf(fp, " "); | |
716 | print_num(fp, 8, s->rx_length_errors); | |
717 | print_num(fp, 7, s->rx_crc_errors); | |
718 | print_num(fp, 7, s->rx_frame_errors); | |
719 | print_num(fp, 7, s->rx_fifo_errors); | |
720 | print_num(fp, 7, s->rx_missed_errors); | |
721 | if (s->rx_nohandler) | |
722 | print_num(fp, 7, s->rx_nohandler); | |
723 | } | |
724 | fprintf(fp, "%s", _SL_); | |
725 | ||
726 | /* TX stats */ | |
727 | fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s", | |
728 | s->tx_compressed ? "compressed" : "", _SL_); | |
729 | ||
730 | fprintf(fp, " "); | |
731 | print_num(fp, 10, s->tx_bytes); | |
732 | print_num(fp, 8, s->tx_packets); | |
733 | print_num(fp, 7, s->tx_errors); | |
734 | print_num(fp, 7, s->tx_dropped); | |
735 | print_num(fp, 7, s->tx_carrier_errors); | |
736 | print_num(fp, 7, s->collisions); | |
737 | if (s->tx_compressed) | |
738 | print_num(fp, 7, s->tx_compressed); | |
739 | ||
740 | /* TX error stats */ | |
741 | if (show_stats > 1) { | |
742 | fprintf(fp, "%s", _SL_); | |
743 | fprintf(fp, " TX errors: aborted fifo window heartbeat"); | |
744 | if (carrier_changes) | |
745 | fprintf(fp, " transns"); | |
746 | fprintf(fp, "%s", _SL_); | |
747 | ||
748 | fprintf(fp, " "); | |
749 | print_num(fp, 8, s->tx_aborted_errors); | |
750 | print_num(fp, 7, s->tx_fifo_errors); | |
751 | print_num(fp, 7, s->tx_window_errors); | |
752 | print_num(fp, 7, s->tx_heartbeat_errors); | |
753 | if (carrier_changes) | |
754 | print_num(fp, 7, | |
755 | rta_getattr_u32(carrier_changes)); | |
756 | } | |
757 | } | |
758 | } | |
759 | ||
760 | static void print_link_stats(FILE *fp, struct nlmsghdr *n) | |
761 | { | |
762 | struct ifinfomsg *ifi = NLMSG_DATA(n); | |
763 | struct rtattr *tb[IFLA_MAX+1]; | |
764 | ||
765 | parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), | |
766 | n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi))); | |
767 | __print_link_stats(fp, tb); | |
768 | print_nl(); | |
769 | } | |
770 | ||
771 | static int print_linkinfo_brief(FILE *fp, const char *name, | |
772 | const struct ifinfomsg *ifi, | |
773 | struct rtattr *tb[]) | |
774 | { | |
775 | unsigned int m_flag = 0; | |
776 | ||
777 | m_flag = print_name_and_link("%-16s ", name, tb); | |
778 | ||
779 | if (tb[IFLA_OPERSTATE]) | |
780 | print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE])); | |
781 | ||
782 | if (filter.family == AF_PACKET) { | |
783 | SPRINT_BUF(b1); | |
784 | ||
785 | if (tb[IFLA_ADDRESS]) { | |
786 | print_color_string(PRINT_ANY, COLOR_MAC, | |
787 | "address", "%s ", | |
788 | ll_addr_n2a( | |
789 | RTA_DATA(tb[IFLA_ADDRESS]), | |
790 | RTA_PAYLOAD(tb[IFLA_ADDRESS]), | |
791 | ifi->ifi_type, | |
792 | b1, sizeof(b1))); | |
793 | } | |
794 | } | |
795 | ||
796 | if (filter.family == AF_PACKET) { | |
797 | print_link_flags(fp, ifi->ifi_flags, m_flag); | |
798 | print_string(PRINT_FP, NULL, "%s", "\n"); | |
799 | } | |
800 | ||
801 | fflush(fp); | |
802 | return 0; | |
803 | } | |
804 | ||
805 | static const char *link_events[] = { | |
806 | [IFLA_EVENT_NONE] = "NONE", | |
807 | [IFLA_EVENT_REBOOT] = "REBOOT", | |
808 | [IFLA_EVENT_FEATURES] = "FEATURE CHANGE", | |
809 | [IFLA_EVENT_BONDING_FAILOVER] = "BONDING FAILOVER", | |
810 | [IFLA_EVENT_NOTIFY_PEERS] = "NOTIFY PEERS", | |
811 | [IFLA_EVENT_IGMP_RESEND] = "RESEND IGMP", | |
812 | [IFLA_EVENT_BONDING_OPTIONS] = "BONDING OPTION" | |
813 | }; | |
814 | ||
815 | static void print_link_event(FILE *f, __u32 event) | |
816 | { | |
817 | if (event >= ARRAY_SIZE(link_events)) | |
818 | print_int(PRINT_ANY, "event", "event %d ", event); | |
819 | else { | |
820 | if (event) | |
821 | print_string(PRINT_ANY, | |
822 | "event", "event %s ", | |
823 | link_events[event]); | |
824 | } | |
825 | } | |
826 | ||
827 | int print_linkinfo(const struct sockaddr_nl *who, | |
828 | struct nlmsghdr *n, void *arg) | |
829 | { | |
830 | FILE *fp = (FILE *)arg; | |
831 | struct ifinfomsg *ifi = NLMSG_DATA(n); | |
832 | struct rtattr *tb[IFLA_MAX+1]; | |
833 | int len = n->nlmsg_len; | |
834 | const char *name; | |
835 | unsigned int m_flag = 0; | |
836 | SPRINT_BUF(b1); | |
837 | ||
838 | if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK) | |
839 | return 0; | |
840 | ||
841 | len -= NLMSG_LENGTH(sizeof(*ifi)); | |
842 | if (len < 0) | |
843 | return -1; | |
844 | ||
845 | if (filter.ifindex && ifi->ifi_index != filter.ifindex) | |
846 | return -1; | |
847 | if (filter.up && !(ifi->ifi_flags&IFF_UP)) | |
848 | return -1; | |
849 | ||
850 | parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len); | |
851 | ||
852 | name = get_ifname_rta(ifi->ifi_index, tb[IFLA_IFNAME]); | |
853 | if (!name) | |
854 | return -1; | |
855 | ||
856 | if (filter.label) | |
857 | return 0; | |
858 | ||
859 | if (tb[IFLA_GROUP]) { | |
860 | int group = rta_getattr_u32(tb[IFLA_GROUP]); | |
861 | ||
862 | if (filter.group != -1 && group != filter.group) | |
863 | return -1; | |
864 | } | |
865 | ||
866 | if (tb[IFLA_MASTER]) { | |
867 | int master = rta_getattr_u32(tb[IFLA_MASTER]); | |
868 | ||
869 | if (filter.master > 0 && master != filter.master) | |
870 | return -1; | |
871 | } else if (filter.master > 0) | |
872 | return -1; | |
873 | ||
874 | if (filter.kind && match_link_kind(tb, filter.kind, 0)) | |
875 | return -1; | |
876 | ||
877 | if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1)) | |
878 | return -1; | |
879 | ||
880 | if (n->nlmsg_type == RTM_DELLINK) | |
881 | print_bool(PRINT_ANY, "deleted", "Deleted ", true); | |
882 | ||
883 | if (brief) | |
884 | return print_linkinfo_brief(fp, name, ifi, tb); | |
885 | ||
886 | print_int(PRINT_ANY, "ifindex", "%d: ", ifi->ifi_index); | |
887 | ||
888 | m_flag = print_name_and_link("%s: ", name, tb); | |
889 | print_link_flags(fp, ifi->ifi_flags, m_flag); | |
890 | ||
891 | if (tb[IFLA_MTU]) | |
892 | print_int(PRINT_ANY, | |
893 | "mtu", "mtu %u ", | |
894 | rta_getattr_u32(tb[IFLA_MTU])); | |
895 | if (tb[IFLA_XDP]) | |
896 | xdp_dump(fp, tb[IFLA_XDP], do_link, false); | |
897 | if (tb[IFLA_QDISC]) | |
898 | print_string(PRINT_ANY, | |
899 | "qdisc", | |
900 | "qdisc %s ", | |
901 | rta_getattr_str(tb[IFLA_QDISC])); | |
902 | if (tb[IFLA_MASTER]) { | |
903 | int master = rta_getattr_u32(tb[IFLA_MASTER]); | |
904 | ||
905 | print_string(PRINT_ANY, | |
906 | "master", "master %s ", | |
907 | ll_index_to_name(master)); | |
908 | } | |
909 | ||
910 | if (tb[IFLA_OPERSTATE]) | |
911 | print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE])); | |
912 | ||
913 | if (do_link && tb[IFLA_LINKMODE]) | |
914 | print_linkmode(fp, tb[IFLA_LINKMODE]); | |
915 | ||
916 | if (tb[IFLA_GROUP]) { | |
917 | int group = rta_getattr_u32(tb[IFLA_GROUP]); | |
918 | ||
919 | print_string(PRINT_ANY, | |
920 | "group", | |
921 | "group %s ", | |
922 | rtnl_group_n2a(group, b1, sizeof(b1))); | |
923 | } | |
924 | ||
925 | if (filter.showqueue) | |
926 | print_queuelen(fp, tb); | |
927 | ||
928 | if (tb[IFLA_EVENT]) | |
929 | print_link_event(fp, rta_getattr_u32(tb[IFLA_EVENT])); | |
930 | ||
931 | if (!filter.family || filter.family == AF_PACKET || show_details) { | |
932 | print_nl(); | |
933 | print_string(PRINT_ANY, | |
934 | "link_type", | |
935 | " link/%s ", | |
936 | ll_type_n2a(ifi->ifi_type, b1, sizeof(b1))); | |
937 | if (tb[IFLA_ADDRESS]) { | |
938 | print_color_string(PRINT_ANY, | |
939 | COLOR_MAC, | |
940 | "address", | |
941 | "%s", | |
942 | ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]), | |
943 | RTA_PAYLOAD(tb[IFLA_ADDRESS]), | |
944 | ifi->ifi_type, | |
945 | b1, sizeof(b1))); | |
946 | } | |
947 | if (tb[IFLA_BROADCAST]) { | |
948 | if (ifi->ifi_flags&IFF_POINTOPOINT) { | |
949 | print_string(PRINT_FP, NULL, " peer ", NULL); | |
950 | print_bool(PRINT_JSON, | |
951 | "link_pointtopoint", NULL, true); | |
952 | } else { | |
953 | print_string(PRINT_FP, NULL, " brd ", NULL); | |
954 | } | |
955 | print_color_string(PRINT_ANY, | |
956 | COLOR_MAC, | |
957 | "broadcast", | |
958 | "%s", | |
959 | ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]), | |
960 | RTA_PAYLOAD(tb[IFLA_BROADCAST]), | |
961 | ifi->ifi_type, | |
962 | b1, sizeof(b1))); | |
963 | } | |
964 | } | |
965 | ||
966 | if (tb[IFLA_LINK_NETNSID]) { | |
967 | int id = rta_getattr_u32(tb[IFLA_LINK_NETNSID]); | |
968 | ||
969 | if (is_json_context()) { | |
970 | print_int(PRINT_JSON, "link_netnsid", NULL, id); | |
971 | } else { | |
972 | if (id >= 0) { | |
973 | char *name = get_name_from_nsid(id); | |
974 | ||
975 | if (name) | |
976 | print_string(PRINT_FP, NULL, | |
977 | " link-netns %s", name); | |
978 | else | |
979 | print_int(PRINT_FP, NULL, | |
980 | " link-netnsid %d", id); | |
981 | } else | |
982 | print_string(PRINT_FP, NULL, | |
983 | " link-netnsid %s", "unknown"); | |
984 | } | |
985 | } | |
986 | ||
987 | if (tb[IFLA_NEW_NETNSID]) { | |
988 | int id = rta_getattr_u32(tb[IFLA_NEW_NETNSID]); | |
989 | char *name = get_name_from_nsid(id); | |
990 | ||
991 | if (name) | |
992 | print_string(PRINT_FP, NULL, " new-netns %s", name); | |
993 | else | |
994 | print_int(PRINT_FP, NULL, " new-netnsid %d", id); | |
995 | } | |
996 | if (tb[IFLA_NEW_IFINDEX]) { | |
997 | int id = rta_getattr_u32(tb[IFLA_NEW_IFINDEX]); | |
998 | ||
999 | print_int(PRINT_FP, NULL, " new-ifindex %d", id); | |
1000 | } | |
1001 | ||
1002 | if (tb[IFLA_PROTO_DOWN]) { | |
1003 | if (rta_getattr_u8(tb[IFLA_PROTO_DOWN])) | |
1004 | print_bool(PRINT_ANY, | |
1005 | "proto_down", " protodown on ", true); | |
1006 | } | |
1007 | ||
1008 | if (show_details) { | |
1009 | if (tb[IFLA_PROMISCUITY]) | |
1010 | print_uint(PRINT_ANY, | |
1011 | "promiscuity", | |
1012 | " promiscuity %u ", | |
1013 | rta_getattr_u32(tb[IFLA_PROMISCUITY])); | |
1014 | ||
1015 | if (tb[IFLA_MIN_MTU]) | |
1016 | print_uint(PRINT_ANY, | |
1017 | "min_mtu", "minmtu %u ", | |
1018 | rta_getattr_u32(tb[IFLA_MIN_MTU])); | |
1019 | ||
1020 | if (tb[IFLA_MAX_MTU]) | |
1021 | print_uint(PRINT_ANY, | |
1022 | "max_mtu", "maxmtu %u ", | |
1023 | rta_getattr_u32(tb[IFLA_MAX_MTU])); | |
1024 | ||
1025 | if (tb[IFLA_LINKINFO]) | |
1026 | print_linktype(fp, tb[IFLA_LINKINFO]); | |
1027 | ||
1028 | if (do_link && tb[IFLA_AF_SPEC]) | |
1029 | print_af_spec(fp, tb[IFLA_AF_SPEC]); | |
1030 | ||
1031 | if (tb[IFLA_NUM_TX_QUEUES]) | |
1032 | print_uint(PRINT_ANY, | |
1033 | "num_tx_queues", | |
1034 | "numtxqueues %u ", | |
1035 | rta_getattr_u32(tb[IFLA_NUM_TX_QUEUES])); | |
1036 | ||
1037 | if (tb[IFLA_NUM_RX_QUEUES]) | |
1038 | print_uint(PRINT_ANY, | |
1039 | "num_rx_queues", | |
1040 | "numrxqueues %u ", | |
1041 | rta_getattr_u32(tb[IFLA_NUM_RX_QUEUES])); | |
1042 | ||
1043 | if (tb[IFLA_GSO_MAX_SIZE]) | |
1044 | print_uint(PRINT_ANY, | |
1045 | "gso_max_size", | |
1046 | "gso_max_size %u ", | |
1047 | rta_getattr_u32(tb[IFLA_GSO_MAX_SIZE])); | |
1048 | ||
1049 | if (tb[IFLA_GSO_MAX_SEGS]) | |
1050 | print_uint(PRINT_ANY, | |
1051 | "gso_max_segs", | |
1052 | "gso_max_segs %u ", | |
1053 | rta_getattr_u32(tb[IFLA_GSO_MAX_SEGS])); | |
1054 | ||
1055 | if (tb[IFLA_PHYS_PORT_NAME]) | |
1056 | print_string(PRINT_ANY, | |
1057 | "phys_port_name", | |
1058 | "portname %s ", | |
1059 | rta_getattr_str(tb[IFLA_PHYS_PORT_NAME])); | |
1060 | ||
1061 | if (tb[IFLA_PHYS_PORT_ID]) { | |
1062 | print_string(PRINT_ANY, | |
1063 | "phys_port_id", | |
1064 | "portid %s ", | |
1065 | hexstring_n2a( | |
1066 | RTA_DATA(tb[IFLA_PHYS_PORT_ID]), | |
1067 | RTA_PAYLOAD(tb[IFLA_PHYS_PORT_ID]), | |
1068 | b1, sizeof(b1))); | |
1069 | } | |
1070 | ||
1071 | if (tb[IFLA_PHYS_SWITCH_ID]) { | |
1072 | print_string(PRINT_ANY, | |
1073 | "phys_switch_id", | |
1074 | "switchid %s ", | |
1075 | hexstring_n2a(RTA_DATA(tb[IFLA_PHYS_SWITCH_ID]), | |
1076 | RTA_PAYLOAD(tb[IFLA_PHYS_SWITCH_ID]), | |
1077 | b1, sizeof(b1))); | |
1078 | } | |
1079 | } | |
1080 | ||
1081 | if ((do_link || show_details) && tb[IFLA_IFALIAS]) { | |
1082 | print_string(PRINT_FP, NULL, "%s ", _SL_); | |
1083 | print_string(PRINT_ANY, | |
1084 | "ifalias", | |
1085 | "alias %s", | |
1086 | rta_getattr_str(tb[IFLA_IFALIAS])); | |
1087 | } | |
1088 | ||
1089 | if ((do_link || show_details) && tb[IFLA_XDP]) | |
1090 | xdp_dump(fp, tb[IFLA_XDP], true, true); | |
1091 | ||
1092 | if (do_link && show_stats) { | |
1093 | print_nl(); | |
1094 | __print_link_stats(fp, tb); | |
1095 | } | |
1096 | ||
1097 | if ((do_link || show_details) && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) { | |
1098 | struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST]; | |
1099 | int rem = RTA_PAYLOAD(vflist); | |
1100 | ||
1101 | open_json_array(PRINT_JSON, "vfinfo_list"); | |
1102 | for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) { | |
1103 | open_json_object(NULL); | |
1104 | print_vfinfo(fp, i); | |
1105 | close_json_object(); | |
1106 | } | |
1107 | close_json_array(PRINT_JSON, NULL); | |
1108 | } | |
1109 | ||
1110 | print_string(PRINT_FP, NULL, "%s", "\n"); | |
1111 | fflush(fp); | |
1112 | return 1; | |
1113 | } | |
1114 | ||
1115 | static int flush_update(void) | |
1116 | { | |
1117 | ||
1118 | /* | |
1119 | * Note that the kernel may delete multiple addresses for one | |
1120 | * delete request (e.g. if ipv4 address promotion is disabled). | |
1121 | * Since a flush operation is really a series of delete requests | |
1122 | * its possible that we may request an address delete that has | |
1123 | * already been done by the kernel. Therefore, ignore EADDRNOTAVAIL | |
1124 | * errors returned from a flush request | |
1125 | */ | |
1126 | if ((rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) && | |
1127 | (errno != EADDRNOTAVAIL)) { | |
1128 | perror("Failed to send flush request"); | |
1129 | return -1; | |
1130 | } | |
1131 | filter.flushp = 0; | |
1132 | return 0; | |
1133 | } | |
1134 | ||
1135 | static int set_lifetime(unsigned int *lifetime, char *argv) | |
1136 | { | |
1137 | if (strcmp(argv, "forever") == 0) | |
1138 | *lifetime = INFINITY_LIFE_TIME; | |
1139 | else if (get_u32(lifetime, argv, 0)) | |
1140 | return -1; | |
1141 | ||
1142 | return 0; | |
1143 | } | |
1144 | ||
1145 | static unsigned int get_ifa_flags(struct ifaddrmsg *ifa, | |
1146 | struct rtattr *ifa_flags_attr) | |
1147 | { | |
1148 | return ifa_flags_attr ? rta_getattr_u32(ifa_flags_attr) : | |
1149 | ifa->ifa_flags; | |
1150 | } | |
1151 | ||
1152 | /* Mapping from argument to address flag mask */ | |
1153 | struct { | |
1154 | const char *name; | |
1155 | unsigned long value; | |
1156 | } ifa_flag_names[] = { | |
1157 | { "secondary", IFA_F_SECONDARY }, | |
1158 | { "temporary", IFA_F_SECONDARY }, | |
1159 | { "nodad", IFA_F_NODAD }, | |
1160 | { "optimistic", IFA_F_OPTIMISTIC }, | |
1161 | { "dadfailed", IFA_F_DADFAILED }, | |
1162 | { "home", IFA_F_HOMEADDRESS }, | |
1163 | { "deprecated", IFA_F_DEPRECATED }, | |
1164 | { "tentative", IFA_F_TENTATIVE }, | |
1165 | { "permanent", IFA_F_PERMANENT }, | |
1166 | { "mngtmpaddr", IFA_F_MANAGETEMPADDR }, | |
1167 | { "noprefixroute", IFA_F_NOPREFIXROUTE }, | |
1168 | { "autojoin", IFA_F_MCAUTOJOIN }, | |
1169 | { "stable-privacy", IFA_F_STABLE_PRIVACY }, | |
1170 | }; | |
1171 | ||
1172 | static void print_ifa_flags(FILE *fp, const struct ifaddrmsg *ifa, | |
1173 | unsigned int flags) | |
1174 | { | |
1175 | unsigned int i; | |
1176 | ||
1177 | for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) { | |
1178 | unsigned long mask = ifa_flag_names[i].value; | |
1179 | ||
1180 | if (mask == IFA_F_PERMANENT) { | |
1181 | if (!(flags & mask)) | |
1182 | print_bool(PRINT_ANY, | |
1183 | "dynamic", "dynamic ", true); | |
1184 | } else if (flags & mask) { | |
1185 | if (mask == IFA_F_SECONDARY && | |
1186 | ifa->ifa_family == AF_INET6) { | |
1187 | print_bool(PRINT_ANY, | |
1188 | "temporary", "temporary ", true); | |
1189 | } else { | |
1190 | print_string(PRINT_FP, NULL, | |
1191 | "%s ", ifa_flag_names[i].name); | |
1192 | print_bool(PRINT_JSON, | |
1193 | ifa_flag_names[i].name, NULL, true); | |
1194 | } | |
1195 | } | |
1196 | ||
1197 | flags &= ~mask; | |
1198 | } | |
1199 | ||
1200 | if (flags) { | |
1201 | if (is_json_context()) { | |
1202 | SPRINT_BUF(b1); | |
1203 | ||
1204 | snprintf(b1, sizeof(b1), "%02x", flags); | |
1205 | print_string(PRINT_JSON, "ifa_flags", NULL, b1); | |
1206 | } else { | |
1207 | fprintf(fp, "flags %02x ", flags); | |
1208 | } | |
1209 | } | |
1210 | ||
1211 | } | |
1212 | ||
1213 | static int get_filter(const char *arg) | |
1214 | { | |
1215 | unsigned int i; | |
1216 | ||
1217 | /* Special cases */ | |
1218 | if (strcmp(arg, "dynamic") == 0) { | |
1219 | filter.flags &= ~IFA_F_PERMANENT; | |
1220 | filter.flagmask |= IFA_F_PERMANENT; | |
1221 | } else if (strcmp(arg, "primary") == 0) { | |
1222 | filter.flags &= ~IFA_F_SECONDARY; | |
1223 | filter.flagmask |= IFA_F_SECONDARY; | |
1224 | } else if (*arg == '-') { | |
1225 | for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) { | |
1226 | if (strcmp(arg + 1, ifa_flag_names[i].name)) | |
1227 | continue; | |
1228 | ||
1229 | filter.flags &= ifa_flag_names[i].value; | |
1230 | filter.flagmask |= ifa_flag_names[i].value; | |
1231 | return 0; | |
1232 | } | |
1233 | ||
1234 | return -1; | |
1235 | } else { | |
1236 | for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) { | |
1237 | if (strcmp(arg, ifa_flag_names[i].name)) | |
1238 | continue; | |
1239 | filter.flags |= ifa_flag_names[i].value; | |
1240 | filter.flagmask |= ifa_flag_names[i].value; | |
1241 | return 0; | |
1242 | } | |
1243 | return -1; | |
1244 | } | |
1245 | ||
1246 | return 0; | |
1247 | } | |
1248 | ||
1249 | static int ifa_label_match_rta(int ifindex, const struct rtattr *rta) | |
1250 | { | |
1251 | const char *label; | |
1252 | ||
1253 | if (!filter.label) | |
1254 | return 0; | |
1255 | ||
1256 | if (rta) | |
1257 | label = RTA_DATA(rta); | |
1258 | else | |
1259 | label = ll_index_to_name(ifindex); | |
1260 | ||
1261 | return fnmatch(filter.label, label, 0); | |
1262 | } | |
1263 | ||
1264 | int print_addrinfo(const struct sockaddr_nl *who, struct nlmsghdr *n, | |
1265 | void *arg) | |
1266 | { | |
1267 | FILE *fp = arg; | |
1268 | struct ifaddrmsg *ifa = NLMSG_DATA(n); | |
1269 | int len = n->nlmsg_len; | |
1270 | unsigned int ifa_flags; | |
1271 | struct rtattr *rta_tb[IFA_MAX+1]; | |
1272 | ||
1273 | SPRINT_BUF(b1); | |
1274 | ||
1275 | if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR) | |
1276 | return 0; | |
1277 | len -= NLMSG_LENGTH(sizeof(*ifa)); | |
1278 | if (len < 0) { | |
1279 | fprintf(stderr, "BUG: wrong nlmsg len %d\n", len); | |
1280 | return -1; | |
1281 | } | |
1282 | ||
1283 | if (filter.flushb && n->nlmsg_type != RTM_NEWADDR) | |
1284 | return 0; | |
1285 | ||
1286 | parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa), | |
1287 | n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa))); | |
1288 | ||
1289 | ifa_flags = get_ifa_flags(ifa, rta_tb[IFA_FLAGS]); | |
1290 | ||
1291 | if (!rta_tb[IFA_LOCAL]) | |
1292 | rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS]; | |
1293 | if (!rta_tb[IFA_ADDRESS]) | |
1294 | rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL]; | |
1295 | ||
1296 | if (filter.ifindex && filter.ifindex != ifa->ifa_index) | |
1297 | return 0; | |
1298 | if ((filter.scope^ifa->ifa_scope)&filter.scopemask) | |
1299 | return 0; | |
1300 | if ((filter.flags ^ ifa_flags) & filter.flagmask) | |
1301 | return 0; | |
1302 | ||
1303 | if (filter.family && filter.family != ifa->ifa_family) | |
1304 | return 0; | |
1305 | ||
1306 | if (ifa_label_match_rta(ifa->ifa_index, rta_tb[IFA_LABEL])) | |
1307 | return 0; | |
1308 | ||
1309 | if (inet_addr_match_rta(&filter.pfx, rta_tb[IFA_LOCAL])) | |
1310 | return 0; | |
1311 | ||
1312 | if (filter.flushb) { | |
1313 | struct nlmsghdr *fn; | |
1314 | ||
1315 | if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) { | |
1316 | if (flush_update()) | |
1317 | return -1; | |
1318 | } | |
1319 | fn = (struct nlmsghdr *)(filter.flushb + NLMSG_ALIGN(filter.flushp)); | |
1320 | memcpy(fn, n, n->nlmsg_len); | |
1321 | fn->nlmsg_type = RTM_DELADDR; | |
1322 | fn->nlmsg_flags = NLM_F_REQUEST; | |
1323 | fn->nlmsg_seq = ++rth.seq; | |
1324 | filter.flushp = (((char *)fn) + n->nlmsg_len) - filter.flushb; | |
1325 | filter.flushed++; | |
1326 | if (show_stats < 2) | |
1327 | return 0; | |
1328 | } | |
1329 | ||
1330 | if (n->nlmsg_type == RTM_DELADDR) | |
1331 | print_bool(PRINT_ANY, "deleted", "Deleted ", true); | |
1332 | ||
1333 | if (!brief) { | |
1334 | const char *name; | |
1335 | ||
1336 | if (filter.oneline || filter.flushb) { | |
1337 | const char *dev = ll_index_to_name(ifa->ifa_index); | |
1338 | ||
1339 | if (is_json_context()) { | |
1340 | print_int(PRINT_JSON, | |
1341 | "index", NULL, ifa->ifa_index); | |
1342 | print_string(PRINT_JSON, "dev", NULL, dev); | |
1343 | } else { | |
1344 | fprintf(fp, "%u: %s", ifa->ifa_index, dev); | |
1345 | } | |
1346 | } | |
1347 | ||
1348 | name = family_name(ifa->ifa_family); | |
1349 | if (*name != '?') { | |
1350 | print_string(PRINT_ANY, "family", " %s ", name); | |
1351 | } else { | |
1352 | print_int(PRINT_ANY, "family_index", " family %d ", | |
1353 | ifa->ifa_family); | |
1354 | } | |
1355 | } | |
1356 | ||
1357 | if (rta_tb[IFA_LOCAL]) { | |
1358 | print_color_string(PRINT_ANY, | |
1359 | ifa_family_color(ifa->ifa_family), | |
1360 | "local", "%s", | |
1361 | format_host_rta(ifa->ifa_family, | |
1362 | rta_tb[IFA_LOCAL])); | |
1363 | if (rta_tb[IFA_ADDRESS] && | |
1364 | memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]), | |
1365 | RTA_DATA(rta_tb[IFA_LOCAL]), | |
1366 | ifa->ifa_family == AF_INET ? 4 : 16)) { | |
1367 | print_string(PRINT_FP, NULL, " %s ", "peer"); | |
1368 | print_color_string(PRINT_ANY, | |
1369 | ifa_family_color(ifa->ifa_family), | |
1370 | "address", | |
1371 | "%s", | |
1372 | format_host_rta(ifa->ifa_family, | |
1373 | rta_tb[IFA_ADDRESS])); | |
1374 | } | |
1375 | print_int(PRINT_ANY, "prefixlen", "/%d ", ifa->ifa_prefixlen); | |
1376 | ||
1377 | if (rta_tb[IFA_RT_PRIORITY]) | |
1378 | print_uint(PRINT_ANY, "metric", "metric %u ", | |
1379 | rta_getattr_u32(rta_tb[IFA_RT_PRIORITY])); | |
1380 | } | |
1381 | ||
1382 | if (brief) | |
1383 | goto brief_exit; | |
1384 | ||
1385 | if (rta_tb[IFA_BROADCAST]) { | |
1386 | print_string(PRINT_FP, NULL, "%s ", "brd"); | |
1387 | print_color_string(PRINT_ANY, | |
1388 | ifa_family_color(ifa->ifa_family), | |
1389 | "broadcast", | |
1390 | "%s ", | |
1391 | format_host_rta(ifa->ifa_family, | |
1392 | rta_tb[IFA_BROADCAST])); | |
1393 | } | |
1394 | ||
1395 | if (rta_tb[IFA_ANYCAST]) { | |
1396 | print_string(PRINT_FP, NULL, "%s ", "any"); | |
1397 | print_color_string(PRINT_ANY, | |
1398 | ifa_family_color(ifa->ifa_family), | |
1399 | "anycast", | |
1400 | "%s ", | |
1401 | format_host_rta(ifa->ifa_family, | |
1402 | rta_tb[IFA_ANYCAST])); | |
1403 | } | |
1404 | ||
1405 | print_string(PRINT_ANY, | |
1406 | "scope", | |
1407 | "scope %s ", | |
1408 | rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1))); | |
1409 | ||
1410 | print_ifa_flags(fp, ifa, ifa_flags); | |
1411 | ||
1412 | if (rta_tb[IFA_LABEL]) | |
1413 | print_string(PRINT_ANY, | |
1414 | "label", | |
1415 | "%s", | |
1416 | rta_getattr_str(rta_tb[IFA_LABEL])); | |
1417 | ||
1418 | if (rta_tb[IFA_CACHEINFO]) { | |
1419 | struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]); | |
1420 | ||
1421 | print_nl(); | |
1422 | print_string(PRINT_FP, NULL, " valid_lft ", NULL); | |
1423 | ||
1424 | if (ci->ifa_valid == INFINITY_LIFE_TIME) { | |
1425 | print_uint(PRINT_JSON, | |
1426 | "valid_life_time", | |
1427 | NULL, INFINITY_LIFE_TIME); | |
1428 | print_string(PRINT_FP, NULL, "%s", "forever"); | |
1429 | } else { | |
1430 | print_uint(PRINT_ANY, | |
1431 | "valid_life_time", "%usec", ci->ifa_valid); | |
1432 | } | |
1433 | ||
1434 | print_string(PRINT_FP, NULL, " preferred_lft ", NULL); | |
1435 | if (ci->ifa_prefered == INFINITY_LIFE_TIME) { | |
1436 | print_uint(PRINT_JSON, | |
1437 | "preferred_life_time", | |
1438 | NULL, INFINITY_LIFE_TIME); | |
1439 | print_string(PRINT_FP, NULL, "%s", "forever"); | |
1440 | } else { | |
1441 | if (ifa_flags & IFA_F_DEPRECATED) | |
1442 | print_int(PRINT_ANY, | |
1443 | "preferred_life_time", | |
1444 | "%dsec", | |
1445 | ci->ifa_prefered); | |
1446 | else | |
1447 | print_uint(PRINT_ANY, | |
1448 | "preferred_life_time", | |
1449 | "%usec", | |
1450 | ci->ifa_prefered); | |
1451 | } | |
1452 | } | |
1453 | print_string(PRINT_FP, NULL, "%s", "\n"); | |
1454 | brief_exit: | |
1455 | fflush(fp); | |
1456 | return 0; | |
1457 | } | |
1458 | ||
1459 | static int print_selected_addrinfo(struct ifinfomsg *ifi, | |
1460 | struct nlmsg_list *ainfo, FILE *fp) | |
1461 | { | |
1462 | open_json_array(PRINT_JSON, "addr_info"); | |
1463 | for ( ; ainfo ; ainfo = ainfo->next) { | |
1464 | struct nlmsghdr *n = &ainfo->h; | |
1465 | struct ifaddrmsg *ifa = NLMSG_DATA(n); | |
1466 | ||
1467 | if (n->nlmsg_type != RTM_NEWADDR) | |
1468 | continue; | |
1469 | ||
1470 | if (n->nlmsg_len < NLMSG_LENGTH(sizeof(*ifa))) | |
1471 | return -1; | |
1472 | ||
1473 | if (ifa->ifa_index != ifi->ifi_index || | |
1474 | (filter.family && filter.family != ifa->ifa_family)) | |
1475 | continue; | |
1476 | ||
1477 | if (filter.up && !(ifi->ifi_flags&IFF_UP)) | |
1478 | continue; | |
1479 | ||
1480 | open_json_object(NULL); | |
1481 | print_addrinfo(NULL, n, fp); | |
1482 | close_json_object(); | |
1483 | } | |
1484 | close_json_array(PRINT_JSON, NULL); | |
1485 | ||
1486 | if (brief) { | |
1487 | print_string(PRINT_FP, NULL, "%s", "\n"); | |
1488 | fflush(fp); | |
1489 | } | |
1490 | return 0; | |
1491 | } | |
1492 | ||
1493 | ||
1494 | static int store_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n, | |
1495 | void *arg) | |
1496 | { | |
1497 | struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg; | |
1498 | struct nlmsg_list *h; | |
1499 | ||
1500 | h = malloc(n->nlmsg_len+sizeof(void *)); | |
1501 | if (h == NULL) | |
1502 | return -1; | |
1503 | ||
1504 | memcpy(&h->h, n, n->nlmsg_len); | |
1505 | h->next = NULL; | |
1506 | ||
1507 | if (lchain->tail) | |
1508 | lchain->tail->next = h; | |
1509 | else | |
1510 | lchain->head = h; | |
1511 | lchain->tail = h; | |
1512 | ||
1513 | ll_remember_index(who, n, NULL); | |
1514 | return 0; | |
1515 | } | |
1516 | ||
1517 | static __u32 ipadd_dump_magic = 0x47361222; | |
1518 | ||
1519 | static int ipadd_save_prep(void) | |
1520 | { | |
1521 | int ret; | |
1522 | ||
1523 | if (isatty(STDOUT_FILENO)) { | |
1524 | fprintf(stderr, "Not sending a binary stream to stdout\n"); | |
1525 | return -1; | |
1526 | } | |
1527 | ||
1528 | ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic)); | |
1529 | if (ret != sizeof(ipadd_dump_magic)) { | |
1530 | fprintf(stderr, "Can't write magic to dump file\n"); | |
1531 | return -1; | |
1532 | } | |
1533 | ||
1534 | return 0; | |
1535 | } | |
1536 | ||
1537 | static int ipadd_dump_check_magic(void) | |
1538 | { | |
1539 | int ret; | |
1540 | __u32 magic = 0; | |
1541 | ||
1542 | if (isatty(STDIN_FILENO)) { | |
1543 | fprintf(stderr, "Can't restore address dump from a terminal\n"); | |
1544 | return -1; | |
1545 | } | |
1546 | ||
1547 | ret = fread(&magic, sizeof(magic), 1, stdin); | |
1548 | if (magic != ipadd_dump_magic) { | |
1549 | fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic); | |
1550 | return -1; | |
1551 | } | |
1552 | ||
1553 | return 0; | |
1554 | } | |
1555 | ||
1556 | static int save_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n, | |
1557 | void *arg) | |
1558 | { | |
1559 | int ret; | |
1560 | ||
1561 | ret = write(STDOUT_FILENO, n, n->nlmsg_len); | |
1562 | if ((ret > 0) && (ret != n->nlmsg_len)) { | |
1563 | fprintf(stderr, "Short write while saving nlmsg\n"); | |
1564 | ret = -EIO; | |
1565 | } | |
1566 | ||
1567 | return ret == n->nlmsg_len ? 0 : ret; | |
1568 | } | |
1569 | ||
1570 | static int show_handler(const struct sockaddr_nl *nl, | |
1571 | struct rtnl_ctrl_data *ctrl, | |
1572 | struct nlmsghdr *n, void *arg) | |
1573 | { | |
1574 | struct ifaddrmsg *ifa = NLMSG_DATA(n); | |
1575 | ||
1576 | open_json_object(NULL); | |
1577 | print_int(PRINT_ANY, "index", "if%d:\n", ifa->ifa_index); | |
1578 | print_addrinfo(NULL, n, stdout); | |
1579 | close_json_object(); | |
1580 | return 0; | |
1581 | } | |
1582 | ||
1583 | static int ipaddr_showdump(void) | |
1584 | { | |
1585 | int err; | |
1586 | ||
1587 | if (ipadd_dump_check_magic()) | |
1588 | exit(-1); | |
1589 | ||
1590 | new_json_obj(json); | |
1591 | open_json_object(NULL); | |
1592 | open_json_array(PRINT_JSON, "addr_info"); | |
1593 | ||
1594 | err = rtnl_from_file(stdin, &show_handler, NULL); | |
1595 | ||
1596 | close_json_array(PRINT_JSON, NULL); | |
1597 | close_json_object(); | |
1598 | delete_json_obj(); | |
1599 | ||
1600 | exit(err); | |
1601 | } | |
1602 | ||
1603 | static int restore_handler(const struct sockaddr_nl *nl, | |
1604 | struct rtnl_ctrl_data *ctrl, | |
1605 | struct nlmsghdr *n, void *arg) | |
1606 | { | |
1607 | int ret; | |
1608 | ||
1609 | n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK; | |
1610 | ||
1611 | ll_init_map(&rth); | |
1612 | ||
1613 | ret = rtnl_talk(&rth, n, NULL); | |
1614 | if ((ret < 0) && (errno == EEXIST)) | |
1615 | ret = 0; | |
1616 | ||
1617 | return ret; | |
1618 | } | |
1619 | ||
1620 | static int ipaddr_restore(void) | |
1621 | { | |
1622 | if (ipadd_dump_check_magic()) | |
1623 | exit(-1); | |
1624 | ||
1625 | exit(rtnl_from_file(stdin, &restore_handler, NULL)); | |
1626 | } | |
1627 | ||
1628 | void free_nlmsg_chain(struct nlmsg_chain *info) | |
1629 | { | |
1630 | struct nlmsg_list *l, *n; | |
1631 | ||
1632 | for (l = info->head; l; l = n) { | |
1633 | n = l->next; | |
1634 | free(l); | |
1635 | } | |
1636 | } | |
1637 | ||
1638 | static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo) | |
1639 | { | |
1640 | struct nlmsg_list *l, **lp; | |
1641 | ||
1642 | lp = &linfo->head; | |
1643 | while ((l = *lp) != NULL) { | |
1644 | int ok = 0; | |
1645 | int missing_net_address = 1; | |
1646 | struct ifinfomsg *ifi = NLMSG_DATA(&l->h); | |
1647 | struct nlmsg_list *a; | |
1648 | ||
1649 | for (a = ainfo->head; a; a = a->next) { | |
1650 | struct nlmsghdr *n = &a->h; | |
1651 | struct ifaddrmsg *ifa = NLMSG_DATA(n); | |
1652 | struct rtattr *tb[IFA_MAX + 1]; | |
1653 | unsigned int ifa_flags; | |
1654 | ||
1655 | if (ifa->ifa_index != ifi->ifi_index) | |
1656 | continue; | |
1657 | missing_net_address = 0; | |
1658 | if (filter.family && filter.family != ifa->ifa_family) | |
1659 | continue; | |
1660 | if ((filter.scope^ifa->ifa_scope)&filter.scopemask) | |
1661 | continue; | |
1662 | ||
1663 | parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n)); | |
1664 | ifa_flags = get_ifa_flags(ifa, tb[IFA_FLAGS]); | |
1665 | ||
1666 | if ((filter.flags ^ ifa_flags) & filter.flagmask) | |
1667 | continue; | |
1668 | ||
1669 | if (ifa_label_match_rta(ifa->ifa_index, tb[IFA_LABEL])) | |
1670 | continue; | |
1671 | ||
1672 | if (!tb[IFA_LOCAL]) | |
1673 | tb[IFA_LOCAL] = tb[IFA_ADDRESS]; | |
1674 | if (inet_addr_match_rta(&filter.pfx, tb[IFA_LOCAL])) | |
1675 | continue; | |
1676 | ||
1677 | ok = 1; | |
1678 | break; | |
1679 | } | |
1680 | if (missing_net_address && | |
1681 | (filter.family == AF_UNSPEC || filter.family == AF_PACKET)) | |
1682 | ok = 1; | |
1683 | if (!ok) { | |
1684 | *lp = l->next; | |
1685 | free(l); | |
1686 | } else | |
1687 | lp = &l->next; | |
1688 | } | |
1689 | } | |
1690 | ||
1691 | static int ipaddr_flush(void) | |
1692 | { | |
1693 | int round = 0; | |
1694 | char flushb[4096-512]; | |
1695 | ||
1696 | filter.flushb = flushb; | |
1697 | filter.flushp = 0; | |
1698 | filter.flushe = sizeof(flushb); | |
1699 | ||
1700 | while ((max_flush_loops == 0) || (round < max_flush_loops)) { | |
1701 | if (rtnl_addrdump_req(&rth, filter.family) < 0) { | |
1702 | perror("Cannot send dump request"); | |
1703 | exit(1); | |
1704 | } | |
1705 | filter.flushed = 0; | |
1706 | if (rtnl_dump_filter_nc(&rth, print_addrinfo, | |
1707 | stdout, NLM_F_DUMP_INTR) < 0) { | |
1708 | fprintf(stderr, "Flush terminated\n"); | |
1709 | exit(1); | |
1710 | } | |
1711 | if (filter.flushed == 0) { | |
1712 | flush_done: | |
1713 | if (show_stats) { | |
1714 | if (round == 0) | |
1715 | printf("Nothing to flush.\n"); | |
1716 | else | |
1717 | printf("*** Flush is complete after %d round%s ***\n", round, round > 1?"s":""); | |
1718 | } | |
1719 | fflush(stdout); | |
1720 | return 0; | |
1721 | } | |
1722 | round++; | |
1723 | if (flush_update() < 0) | |
1724 | return 1; | |
1725 | ||
1726 | if (show_stats) { | |
1727 | printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed); | |
1728 | fflush(stdout); | |
1729 | } | |
1730 | ||
1731 | /* If we are flushing, and specifying primary, then we | |
1732 | * want to flush only a single round. Otherwise, we'll | |
1733 | * start flushing secondaries that were promoted to | |
1734 | * primaries. | |
1735 | */ | |
1736 | if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY)) | |
1737 | goto flush_done; | |
1738 | } | |
1739 | fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops); | |
1740 | fflush(stderr); | |
1741 | return 1; | |
1742 | } | |
1743 | ||
1744 | static int iplink_filter_req(struct nlmsghdr *nlh, int reqlen) | |
1745 | { | |
1746 | int err; | |
1747 | ||
1748 | err = addattr32(nlh, reqlen, IFLA_EXT_MASK, RTEXT_FILTER_VF); | |
1749 | if (err) | |
1750 | return err; | |
1751 | ||
1752 | if (filter.master) { | |
1753 | err = addattr32(nlh, reqlen, IFLA_MASTER, filter.master); | |
1754 | if (err) | |
1755 | return err; | |
1756 | } | |
1757 | ||
1758 | if (filter.kind) { | |
1759 | struct rtattr *linkinfo; | |
1760 | ||
1761 | linkinfo = addattr_nest(nlh, reqlen, IFLA_LINKINFO); | |
1762 | ||
1763 | err = addattr_l(nlh, reqlen, IFLA_INFO_KIND, filter.kind, | |
1764 | strlen(filter.kind)); | |
1765 | if (err) | |
1766 | return err; | |
1767 | ||
1768 | addattr_nest_end(nlh, linkinfo); | |
1769 | } | |
1770 | ||
1771 | return 0; | |
1772 | } | |
1773 | ||
1774 | /* fills in linfo with link data and optionally ainfo with address info | |
1775 | * caller can walk lists as desired and must call free_nlmsg_chain for | |
1776 | * both when done | |
1777 | */ | |
1778 | int ip_linkaddr_list(int family, req_filter_fn_t filter_fn, | |
1779 | struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo) | |
1780 | { | |
1781 | if (rtnl_linkdump_req_filter_fn(&rth, preferred_family, | |
1782 | filter_fn) < 0) { | |
1783 | perror("Cannot send dump request"); | |
1784 | return 1; | |
1785 | } | |
1786 | ||
1787 | if (rtnl_dump_filter(&rth, store_nlmsg, linfo) < 0) { | |
1788 | fprintf(stderr, "Dump terminated\n"); | |
1789 | return 1; | |
1790 | } | |
1791 | ||
1792 | if (ainfo) { | |
1793 | if (rtnl_addrdump_req(&rth, family) < 0) { | |
1794 | perror("Cannot send dump request"); | |
1795 | return 1; | |
1796 | } | |
1797 | ||
1798 | if (rtnl_dump_filter(&rth, store_nlmsg, ainfo) < 0) { | |
1799 | fprintf(stderr, "Dump terminated\n"); | |
1800 | return 1; | |
1801 | } | |
1802 | } | |
1803 | ||
1804 | return 0; | |
1805 | } | |
1806 | ||
1807 | static int ipaddr_list_flush_or_save(int argc, char **argv, int action) | |
1808 | { | |
1809 | struct nlmsg_chain linfo = { NULL, NULL}; | |
1810 | struct nlmsg_chain _ainfo = { NULL, NULL}, *ainfo = NULL; | |
1811 | struct nlmsg_list *l; | |
1812 | char *filter_dev = NULL; | |
1813 | int no_link = 0; | |
1814 | ||
1815 | ipaddr_reset_filter(oneline, 0); | |
1816 | filter.showqueue = 1; | |
1817 | filter.family = preferred_family; | |
1818 | filter.group = -1; | |
1819 | ||
1820 | if (action == IPADD_FLUSH) { | |
1821 | if (argc <= 0) { | |
1822 | fprintf(stderr, "Flush requires arguments.\n"); | |
1823 | ||
1824 | return -1; | |
1825 | } | |
1826 | if (filter.family == AF_PACKET) { | |
1827 | fprintf(stderr, "Cannot flush link addresses.\n"); | |
1828 | return -1; | |
1829 | } | |
1830 | } | |
1831 | ||
1832 | while (argc > 0) { | |
1833 | if (strcmp(*argv, "to") == 0) { | |
1834 | NEXT_ARG(); | |
1835 | if (get_prefix(&filter.pfx, *argv, filter.family)) | |
1836 | invarg("invalid \"to\"\n", *argv); | |
1837 | if (filter.family == AF_UNSPEC) | |
1838 | filter.family = filter.pfx.family; | |
1839 | } else if (strcmp(*argv, "scope") == 0) { | |
1840 | unsigned int scope = 0; | |
1841 | ||
1842 | NEXT_ARG(); | |
1843 | filter.scopemask = -1; | |
1844 | if (rtnl_rtscope_a2n(&scope, *argv)) { | |
1845 | if (strcmp(*argv, "all") != 0) | |
1846 | invarg("invalid \"scope\"\n", *argv); | |
1847 | scope = RT_SCOPE_NOWHERE; | |
1848 | filter.scopemask = 0; | |
1849 | } | |
1850 | filter.scope = scope; | |
1851 | } else if (strcmp(*argv, "up") == 0) { | |
1852 | filter.up = 1; | |
1853 | } else if (get_filter(*argv) == 0) { | |
1854 | ||
1855 | } else if (strcmp(*argv, "label") == 0) { | |
1856 | NEXT_ARG(); | |
1857 | filter.label = *argv; | |
1858 | } else if (strcmp(*argv, "group") == 0) { | |
1859 | NEXT_ARG(); | |
1860 | if (rtnl_group_a2n(&filter.group, *argv)) | |
1861 | invarg("Invalid \"group\" value\n", *argv); | |
1862 | } else if (strcmp(*argv, "master") == 0) { | |
1863 | int ifindex; | |
1864 | ||
1865 | NEXT_ARG(); | |
1866 | ifindex = ll_name_to_index(*argv); | |
1867 | if (!ifindex) | |
1868 | invarg("Device does not exist\n", *argv); | |
1869 | filter.master = ifindex; | |
1870 | } else if (strcmp(*argv, "vrf") == 0) { | |
1871 | int ifindex; | |
1872 | ||
1873 | NEXT_ARG(); | |
1874 | ifindex = ll_name_to_index(*argv); | |
1875 | if (!ifindex) | |
1876 | invarg("Not a valid VRF name\n", *argv); | |
1877 | if (!name_is_vrf(*argv)) | |
1878 | invarg("Not a valid VRF name\n", *argv); | |
1879 | filter.master = ifindex; | |
1880 | } else if (strcmp(*argv, "type") == 0) { | |
1881 | int soff; | |
1882 | ||
1883 | NEXT_ARG(); | |
1884 | soff = strlen(*argv) - strlen("_slave"); | |
1885 | if (!strcmp(*argv + soff, "_slave")) { | |
1886 | (*argv)[soff] = '\0'; | |
1887 | filter.slave_kind = *argv; | |
1888 | } else { | |
1889 | filter.kind = *argv; | |
1890 | } | |
1891 | } else { | |
1892 | if (strcmp(*argv, "dev") == 0) | |
1893 | NEXT_ARG(); | |
1894 | else if (matches(*argv, "help") == 0) | |
1895 | usage(); | |
1896 | if (filter_dev) | |
1897 | duparg2("dev", *argv); | |
1898 | filter_dev = *argv; | |
1899 | } | |
1900 | argv++; argc--; | |
1901 | } | |
1902 | ||
1903 | if (filter_dev) { | |
1904 | filter.ifindex = ll_name_to_index(filter_dev); | |
1905 | if (filter.ifindex <= 0) { | |
1906 | fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev); | |
1907 | return -1; | |
1908 | } | |
1909 | } | |
1910 | ||
1911 | if (action == IPADD_FLUSH) | |
1912 | return ipaddr_flush(); | |
1913 | ||
1914 | if (action == IPADD_SAVE) { | |
1915 | if (ipadd_save_prep()) | |
1916 | exit(1); | |
1917 | ||
1918 | if (rtnl_addrdump_req(&rth, preferred_family) < 0) { | |
1919 | perror("Cannot send dump request"); | |
1920 | exit(1); | |
1921 | } | |
1922 | ||
1923 | if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) { | |
1924 | fprintf(stderr, "Save terminated\n"); | |
1925 | exit(1); | |
1926 | } | |
1927 | ||
1928 | exit(0); | |
1929 | } | |
1930 | ||
1931 | /* | |
1932 | * Initialize a json_writer and open an array object | |
1933 | * if -json was specified. | |
1934 | */ | |
1935 | new_json_obj(json); | |
1936 | ||
1937 | /* | |
1938 | * If only filter_dev present and none of the other | |
1939 | * link filters are present, use RTM_GETLINK to get | |
1940 | * the link device | |
1941 | */ | |
1942 | if (filter_dev && filter.group == -1 && do_link == 1) { | |
1943 | if (iplink_get(0, filter_dev, RTEXT_FILTER_VF) < 0) { | |
1944 | perror("Cannot send link get request"); | |
1945 | delete_json_obj(); | |
1946 | exit(1); | |
1947 | } | |
1948 | delete_json_obj(); | |
1949 | goto out; | |
1950 | } | |
1951 | ||
1952 | if (filter.family != AF_PACKET) { | |
1953 | ainfo = &_ainfo; | |
1954 | ||
1955 | if (filter.oneline) | |
1956 | no_link = 1; | |
1957 | } | |
1958 | ||
1959 | if (ip_linkaddr_list(filter.family, iplink_filter_req, | |
1960 | &linfo, ainfo) != 0) | |
1961 | goto out; | |
1962 | ||
1963 | if (filter.family != AF_PACKET) | |
1964 | ipaddr_filter(&linfo, ainfo); | |
1965 | ||
1966 | for (l = linfo.head; l; l = l->next) { | |
1967 | struct nlmsghdr *n = &l->h; | |
1968 | struct ifinfomsg *ifi = NLMSG_DATA(n); | |
1969 | int res = 0; | |
1970 | ||
1971 | open_json_object(NULL); | |
1972 | if (brief || !no_link) | |
1973 | res = print_linkinfo(NULL, n, stdout); | |
1974 | if (res >= 0 && filter.family != AF_PACKET) | |
1975 | print_selected_addrinfo(ifi, ainfo->head, stdout); | |
1976 | if (res > 0 && !do_link && show_stats) | |
1977 | print_link_stats(stdout, n); | |
1978 | close_json_object(); | |
1979 | } | |
1980 | fflush(stdout); | |
1981 | ||
1982 | out: | |
1983 | if (ainfo) | |
1984 | free_nlmsg_chain(ainfo); | |
1985 | free_nlmsg_chain(&linfo); | |
1986 | delete_json_obj(); | |
1987 | return 0; | |
1988 | } | |
1989 | ||
1990 | static void | |
1991 | ipaddr_loop_each_vf(struct rtattr *tb[], int vfnum, int *min, int *max) | |
1992 | { | |
1993 | struct rtattr *vflist = tb[IFLA_VFINFO_LIST]; | |
1994 | struct rtattr *i, *vf[IFLA_VF_MAX+1]; | |
1995 | struct ifla_vf_rate *vf_rate; | |
1996 | int rem; | |
1997 | ||
1998 | rem = RTA_PAYLOAD(vflist); | |
1999 | ||
2000 | for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) { | |
2001 | parse_rtattr_nested(vf, IFLA_VF_MAX, i); | |
2002 | ||
2003 | if (!vf[IFLA_VF_RATE]) { | |
2004 | fprintf(stderr, "VF min/max rate API not supported\n"); | |
2005 | exit(1); | |
2006 | } | |
2007 | ||
2008 | vf_rate = RTA_DATA(vf[IFLA_VF_RATE]); | |
2009 | if (vf_rate->vf == vfnum) { | |
2010 | *min = vf_rate->min_tx_rate; | |
2011 | *max = vf_rate->max_tx_rate; | |
2012 | return; | |
2013 | } | |
2014 | } | |
2015 | fprintf(stderr, "Cannot find VF %d\n", vfnum); | |
2016 | exit(1); | |
2017 | } | |
2018 | ||
2019 | void ipaddr_get_vf_rate(int vfnum, int *min, int *max, const char *dev) | |
2020 | { | |
2021 | struct nlmsg_chain linfo = { NULL, NULL}; | |
2022 | struct rtattr *tb[IFLA_MAX+1]; | |
2023 | struct ifinfomsg *ifi; | |
2024 | struct nlmsg_list *l; | |
2025 | struct nlmsghdr *n; | |
2026 | int idx, len; | |
2027 | ||
2028 | idx = ll_name_to_index(dev); | |
2029 | if (idx == 0) { | |
2030 | fprintf(stderr, "Device %s does not exist\n", dev); | |
2031 | exit(1); | |
2032 | } | |
2033 | ||
2034 | if (rtnl_linkdump_req(&rth, AF_UNSPEC) < 0) { | |
2035 | perror("Cannot send dump request"); | |
2036 | exit(1); | |
2037 | } | |
2038 | if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) { | |
2039 | fprintf(stderr, "Dump terminated\n"); | |
2040 | exit(1); | |
2041 | } | |
2042 | for (l = linfo.head; l; l = l->next) { | |
2043 | n = &l->h; | |
2044 | ifi = NLMSG_DATA(n); | |
2045 | ||
2046 | len = n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)); | |
2047 | if (len < 0 || (idx && idx != ifi->ifi_index)) | |
2048 | continue; | |
2049 | ||
2050 | parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len); | |
2051 | ||
2052 | if ((tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF])) { | |
2053 | ipaddr_loop_each_vf(tb, vfnum, min, max); | |
2054 | return; | |
2055 | } | |
2056 | } | |
2057 | } | |
2058 | ||
2059 | int ipaddr_list_link(int argc, char **argv) | |
2060 | { | |
2061 | preferred_family = AF_PACKET; | |
2062 | do_link = 1; | |
2063 | return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST); | |
2064 | } | |
2065 | ||
2066 | void ipaddr_reset_filter(int oneline, int ifindex) | |
2067 | { | |
2068 | memset(&filter, 0, sizeof(filter)); | |
2069 | filter.oneline = oneline; | |
2070 | filter.ifindex = ifindex; | |
2071 | } | |
2072 | ||
2073 | static int default_scope(inet_prefix *lcl) | |
2074 | { | |
2075 | if (lcl->family == AF_INET) { | |
2076 | if (lcl->bytelen >= 1 && *(__u8 *)&lcl->data == 127) | |
2077 | return RT_SCOPE_HOST; | |
2078 | } | |
2079 | return 0; | |
2080 | } | |
2081 | ||
2082 | static bool ipaddr_is_multicast(inet_prefix *a) | |
2083 | { | |
2084 | if (a->family == AF_INET) | |
2085 | return IN_MULTICAST(ntohl(a->data[0])); | |
2086 | else if (a->family == AF_INET6) | |
2087 | return IN6_IS_ADDR_MULTICAST(a->data); | |
2088 | else | |
2089 | return false; | |
2090 | } | |
2091 | ||
2092 | static bool is_valid_label(const char *dev, const char *label) | |
2093 | { | |
2094 | size_t len = strlen(dev); | |
2095 | ||
2096 | if (strncmp(label, dev, len) != 0) | |
2097 | return false; | |
2098 | ||
2099 | return label[len] == '\0' || label[len] == ':'; | |
2100 | } | |
2101 | ||
2102 | static int ipaddr_modify(int cmd, int flags, int argc, char **argv) | |
2103 | { | |
2104 | struct { | |
2105 | struct nlmsghdr n; | |
2106 | struct ifaddrmsg ifa; | |
2107 | char buf[256]; | |
2108 | } req = { | |
2109 | .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)), | |
2110 | .n.nlmsg_flags = NLM_F_REQUEST | flags, | |
2111 | .n.nlmsg_type = cmd, | |
2112 | .ifa.ifa_family = preferred_family, | |
2113 | }; | |
2114 | char *d = NULL; | |
2115 | char *l = NULL; | |
2116 | char *lcl_arg = NULL; | |
2117 | char *valid_lftp = NULL; | |
2118 | char *preferred_lftp = NULL; | |
2119 | inet_prefix lcl = {}; | |
2120 | inet_prefix peer; | |
2121 | int local_len = 0; | |
2122 | int peer_len = 0; | |
2123 | int brd_len = 0; | |
2124 | int any_len = 0; | |
2125 | int scoped = 0; | |
2126 | __u32 preferred_lft = INFINITY_LIFE_TIME; | |
2127 | __u32 valid_lft = INFINITY_LIFE_TIME; | |
2128 | unsigned int ifa_flags = 0; | |
2129 | ||
2130 | while (argc > 0) { | |
2131 | if (strcmp(*argv, "peer") == 0 || | |
2132 | strcmp(*argv, "remote") == 0) { | |
2133 | NEXT_ARG(); | |
2134 | ||
2135 | if (peer_len) | |
2136 | duparg("peer", *argv); | |
2137 | get_prefix(&peer, *argv, req.ifa.ifa_family); | |
2138 | peer_len = peer.bytelen; | |
2139 | if (req.ifa.ifa_family == AF_UNSPEC) | |
2140 | req.ifa.ifa_family = peer.family; | |
2141 | addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen); | |
2142 | req.ifa.ifa_prefixlen = peer.bitlen; | |
2143 | } else if (matches(*argv, "broadcast") == 0 || | |
2144 | strcmp(*argv, "brd") == 0) { | |
2145 | inet_prefix addr; | |
2146 | ||
2147 | NEXT_ARG(); | |
2148 | if (brd_len) | |
2149 | duparg("broadcast", *argv); | |
2150 | if (strcmp(*argv, "+") == 0) | |
2151 | brd_len = -1; | |
2152 | else if (strcmp(*argv, "-") == 0) | |
2153 | brd_len = -2; | |
2154 | else { | |
2155 | get_addr(&addr, *argv, req.ifa.ifa_family); | |
2156 | if (req.ifa.ifa_family == AF_UNSPEC) | |
2157 | req.ifa.ifa_family = addr.family; | |
2158 | addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen); | |
2159 | brd_len = addr.bytelen; | |
2160 | } | |
2161 | } else if (strcmp(*argv, "anycast") == 0) { | |
2162 | inet_prefix addr; | |
2163 | ||
2164 | NEXT_ARG(); | |
2165 | if (any_len) | |
2166 | duparg("anycast", *argv); | |
2167 | get_addr(&addr, *argv, req.ifa.ifa_family); | |
2168 | if (req.ifa.ifa_family == AF_UNSPEC) | |
2169 | req.ifa.ifa_family = addr.family; | |
2170 | addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen); | |
2171 | any_len = addr.bytelen; | |
2172 | } else if (strcmp(*argv, "scope") == 0) { | |
2173 | unsigned int scope = 0; | |
2174 | ||
2175 | NEXT_ARG(); | |
2176 | if (rtnl_rtscope_a2n(&scope, *argv)) | |
2177 | invarg("invalid scope value.", *argv); | |
2178 | req.ifa.ifa_scope = scope; | |
2179 | scoped = 1; | |
2180 | } else if (strcmp(*argv, "dev") == 0) { | |
2181 | NEXT_ARG(); | |
2182 | d = *argv; | |
2183 | } else if (strcmp(*argv, "label") == 0) { | |
2184 | NEXT_ARG(); | |
2185 | l = *argv; | |
2186 | addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1); | |
2187 | } else if (matches(*argv, "metric") == 0 || | |
2188 | matches(*argv, "priority") == 0 || | |
2189 | matches(*argv, "preference") == 0) { | |
2190 | __u32 metric; | |
2191 | ||
2192 | NEXT_ARG(); | |
2193 | if (get_u32(&metric, *argv, 0)) | |
2194 | invarg("\"metric\" value is invalid\n", *argv); | |
2195 | addattr32(&req.n, sizeof(req), IFA_RT_PRIORITY, metric); | |
2196 | } else if (matches(*argv, "valid_lft") == 0) { | |
2197 | if (valid_lftp) | |
2198 | duparg("valid_lft", *argv); | |
2199 | NEXT_ARG(); | |
2200 | valid_lftp = *argv; | |
2201 | if (set_lifetime(&valid_lft, *argv)) | |
2202 | invarg("valid_lft value", *argv); | |
2203 | } else if (matches(*argv, "preferred_lft") == 0) { | |
2204 | if (preferred_lftp) | |
2205 | duparg("preferred_lft", *argv); | |
2206 | NEXT_ARG(); | |
2207 | preferred_lftp = *argv; | |
2208 | if (set_lifetime(&preferred_lft, *argv)) | |
2209 | invarg("preferred_lft value", *argv); | |
2210 | } else if (strcmp(*argv, "home") == 0) { | |
2211 | ifa_flags |= IFA_F_HOMEADDRESS; | |
2212 | } else if (strcmp(*argv, "nodad") == 0) { | |
2213 | ifa_flags |= IFA_F_NODAD; | |
2214 | } else if (strcmp(*argv, "mngtmpaddr") == 0) { | |
2215 | ifa_flags |= IFA_F_MANAGETEMPADDR; | |
2216 | } else if (strcmp(*argv, "noprefixroute") == 0) { | |
2217 | ifa_flags |= IFA_F_NOPREFIXROUTE; | |
2218 | } else if (strcmp(*argv, "autojoin") == 0) { | |
2219 | ifa_flags |= IFA_F_MCAUTOJOIN; | |
2220 | } else { | |
2221 | if (strcmp(*argv, "local") == 0) | |
2222 | NEXT_ARG(); | |
2223 | if (matches(*argv, "help") == 0) | |
2224 | usage(); | |
2225 | if (local_len) | |
2226 | duparg2("local", *argv); | |
2227 | lcl_arg = *argv; | |
2228 | get_prefix(&lcl, *argv, req.ifa.ifa_family); | |
2229 | if (req.ifa.ifa_family == AF_UNSPEC) | |
2230 | req.ifa.ifa_family = lcl.family; | |
2231 | addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen); | |
2232 | local_len = lcl.bytelen; | |
2233 | } | |
2234 | argc--; argv++; | |
2235 | } | |
2236 | if (ifa_flags <= 0xff) | |
2237 | req.ifa.ifa_flags = ifa_flags; | |
2238 | else | |
2239 | addattr32(&req.n, sizeof(req), IFA_FLAGS, ifa_flags); | |
2240 | ||
2241 | if (d == NULL) { | |
2242 | fprintf(stderr, "Not enough information: \"dev\" argument is required.\n"); | |
2243 | return -1; | |
2244 | } | |
2245 | if (l && !is_valid_label(d, l)) { | |
2246 | fprintf(stderr, | |
2247 | "\"label\" (%s) must match \"dev\" (%s) or be prefixed by \"dev\" with a colon.\n", | |
2248 | l, d); | |
2249 | return -1; | |
2250 | } | |
2251 | ||
2252 | if (peer_len == 0 && local_len) { | |
2253 | if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) { | |
2254 | fprintf(stderr, | |
2255 | "Warning: Executing wildcard deletion to stay compatible with old scripts.\n" | |
2256 | " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n" | |
2257 | " This special behaviour is likely to disappear in further releases,\n" | |
2258 | " fix your scripts!\n", lcl_arg, local_len*8); | |
2259 | } else { | |
2260 | peer = lcl; | |
2261 | addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen); | |
2262 | } | |
2263 | } | |
2264 | if (req.ifa.ifa_prefixlen == 0) | |
2265 | req.ifa.ifa_prefixlen = lcl.bitlen; | |
2266 | ||
2267 | if (brd_len < 0 && cmd != RTM_DELADDR) { | |
2268 | inet_prefix brd; | |
2269 | int i; | |
2270 | ||
2271 | if (req.ifa.ifa_family != AF_INET) { | |
2272 | fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n"); | |
2273 | return -1; | |
2274 | } | |
2275 | brd = peer; | |
2276 | if (brd.bitlen <= 30) { | |
2277 | for (i = 31; i >= brd.bitlen; i--) { | |
2278 | if (brd_len == -1) | |
2279 | brd.data[0] |= htonl(1<<(31-i)); | |
2280 | else | |
2281 | brd.data[0] &= ~htonl(1<<(31-i)); | |
2282 | } | |
2283 | addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen); | |
2284 | brd_len = brd.bytelen; | |
2285 | } | |
2286 | } | |
2287 | if (!scoped && cmd != RTM_DELADDR) | |
2288 | req.ifa.ifa_scope = default_scope(&lcl); | |
2289 | ||
2290 | req.ifa.ifa_index = ll_name_to_index(d); | |
2291 | if (!req.ifa.ifa_index) | |
2292 | return nodev(d); | |
2293 | ||
2294 | if (valid_lftp || preferred_lftp) { | |
2295 | struct ifa_cacheinfo cinfo = {}; | |
2296 | ||
2297 | if (!valid_lft) { | |
2298 | fprintf(stderr, "valid_lft is zero\n"); | |
2299 | return -1; | |
2300 | } | |
2301 | if (valid_lft < preferred_lft) { | |
2302 | fprintf(stderr, "preferred_lft is greater than valid_lft\n"); | |
2303 | return -1; | |
2304 | } | |
2305 | ||
2306 | cinfo.ifa_prefered = preferred_lft; | |
2307 | cinfo.ifa_valid = valid_lft; | |
2308 | addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo, | |
2309 | sizeof(cinfo)); | |
2310 | } | |
2311 | ||
2312 | if ((ifa_flags & IFA_F_MCAUTOJOIN) && !ipaddr_is_multicast(&lcl)) { | |
2313 | fprintf(stderr, "autojoin needs multicast address\n"); | |
2314 | return -1; | |
2315 | } | |
2316 | ||
2317 | if (rtnl_talk(&rth, &req.n, NULL) < 0) | |
2318 | return -2; | |
2319 | ||
2320 | return 0; | |
2321 | } | |
2322 | ||
2323 | int do_ipaddr(int argc, char **argv) | |
2324 | { | |
2325 | if (argc < 1) | |
2326 | return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST); | |
2327 | if (matches(*argv, "add") == 0) | |
2328 | return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1); | |
2329 | if (matches(*argv, "change") == 0 || | |
2330 | strcmp(*argv, "chg") == 0) | |
2331 | return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1); | |
2332 | if (matches(*argv, "replace") == 0) | |
2333 | return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1); | |
2334 | if (matches(*argv, "delete") == 0) | |
2335 | return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1); | |
2336 | if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0 | |
2337 | || matches(*argv, "lst") == 0) | |
2338 | return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST); | |
2339 | if (matches(*argv, "flush") == 0) | |
2340 | return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH); | |
2341 | if (matches(*argv, "save") == 0) | |
2342 | return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE); | |
2343 | if (matches(*argv, "showdump") == 0) | |
2344 | return ipaddr_showdump(); | |
2345 | if (matches(*argv, "restore") == 0) | |
2346 | return ipaddr_restore(); | |
2347 | if (matches(*argv, "help") == 0) | |
2348 | usage(); | |
2349 | fprintf(stderr, "Command \"%s\" is unknown, try \"ip address help\".\n", *argv); | |
2350 | exit(-1); | |
2351 | } |