]> git.proxmox.com Git - mirror_iproute2.git/blob - ip/ipaddress.c
ipaddress: strengthen check on 'label' input
[mirror_iproute2.git] / ip / ipaddress.c
1 /*
2 * ipaddress.c "ip address".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 */
12
13 #include <stdio.h>
14 #include <stdlib.h>
15 #include <unistd.h>
16 #include <inttypes.h>
17 #include <fcntl.h>
18 #include <sys/ioctl.h>
19 #include <sys/socket.h>
20 #include <sys/param.h>
21 #include <errno.h>
22 #include <netinet/in.h>
23 #include <arpa/inet.h>
24 #include <string.h>
25 #include <fnmatch.h>
26
27 #include <linux/netdevice.h>
28 #include <linux/if_arp.h>
29 #include <linux/sockios.h>
30 #include <linux/net_namespace.h>
31
32 #include "utils.h"
33 #include "rt_names.h"
34 #include "utils.h"
35 #include "ll_map.h"
36 #include "ip_common.h"
37 #include "color.h"
38
39 enum {
40 IPADD_LIST,
41 IPADD_FLUSH,
42 IPADD_SAVE,
43 };
44
45 static struct link_filter filter;
46 static int do_link;
47
48 static void usage(void) __attribute__((noreturn));
49
50 static void usage(void)
51 {
52 if (do_link) {
53 iplink_usage();
54 }
55 fprintf(stderr, "Usage: ip address {add|change|replace} IFADDR dev IFNAME [ LIFETIME ]\n");
56 fprintf(stderr, " [ CONFFLAG-LIST ]\n");
57 fprintf(stderr, " ip address del IFADDR dev IFNAME [mngtmpaddr]\n");
58 fprintf(stderr, " ip address {save|flush} [ dev IFNAME ] [ scope SCOPE-ID ]\n");
59 fprintf(stderr, " [ to PREFIX ] [ FLAG-LIST ] [ label LABEL ] [up]\n");
60 fprintf(stderr, " ip address [ show [ dev IFNAME ] [ scope SCOPE-ID ] [ master DEVICE ]\n");
61 fprintf(stderr, " [ type TYPE ] [ to PREFIX ] [ FLAG-LIST ]\n");
62 fprintf(stderr, " [ label LABEL ] [up] [ vrf NAME ] ]\n");
63 fprintf(stderr, " ip address {showdump|restore}\n");
64 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
65 fprintf(stderr, " [ broadcast ADDR ] [ anycast ADDR ]\n");
66 fprintf(stderr, " [ label IFNAME ] [ scope SCOPE-ID ] [ metric METRIC ]\n");
67 fprintf(stderr, "SCOPE-ID := [ host | link | global | NUMBER ]\n");
68 fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] FLAG\n");
69 fprintf(stderr, "FLAG := [ permanent | dynamic | secondary | primary |\n");
70 fprintf(stderr, " [-]tentative | [-]deprecated | [-]dadfailed | temporary |\n");
71 fprintf(stderr, " CONFFLAG-LIST ]\n");
72 fprintf(stderr, "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n");
73 fprintf(stderr, "CONFFLAG := [ home | nodad | mngtmpaddr | noprefixroute | autojoin ]\n");
74 fprintf(stderr, "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n");
75 fprintf(stderr, "LFT := forever | SECONDS\n");
76 fprintf(stderr, "TYPE := { vlan | veth | vcan | vxcan | dummy | ifb | macvlan | macvtap |\n");
77 fprintf(stderr, " bridge | bond | ipoib | ip6tnl | ipip | sit | vxlan | lowpan |\n");
78 fprintf(stderr, " gre | gretap | erspan | ip6gre | ip6gretap | ip6erspan | vti |\n");
79 fprintf(stderr, " nlmon | can | bond_slave | ipvlan | geneve | bridge_slave |\n");
80 fprintf(stderr, " hsr | macsec | netdevsim\n");
81
82 exit(-1);
83 }
84
85 static void print_link_flags(FILE *fp, unsigned int flags, unsigned int mdown)
86 {
87 open_json_array(PRINT_ANY, is_json_context() ? "flags" : "<");
88 if (flags & IFF_UP && !(flags & IFF_RUNNING))
89 print_string(PRINT_ANY, NULL,
90 flags ? "%s," : "%s", "NO-CARRIER");
91 flags &= ~IFF_RUNNING;
92 #define _PF(f) if (flags&IFF_##f) { \
93 flags &= ~IFF_##f ; \
94 print_string(PRINT_ANY, NULL, flags ? "%s," : "%s", #f); }
95 _PF(LOOPBACK);
96 _PF(BROADCAST);
97 _PF(POINTOPOINT);
98 _PF(MULTICAST);
99 _PF(NOARP);
100 _PF(ALLMULTI);
101 _PF(PROMISC);
102 _PF(MASTER);
103 _PF(SLAVE);
104 _PF(DEBUG);
105 _PF(DYNAMIC);
106 _PF(AUTOMEDIA);
107 _PF(PORTSEL);
108 _PF(NOTRAILERS);
109 _PF(UP);
110 _PF(LOWER_UP);
111 _PF(DORMANT);
112 _PF(ECHO);
113 #undef _PF
114 if (flags)
115 print_hex(PRINT_ANY, NULL, "%x", flags);
116 if (mdown)
117 print_string(PRINT_ANY, NULL, ",%s", "M-DOWN");
118 close_json_array(PRINT_ANY, "> ");
119 }
120
121 static const char *oper_states[] = {
122 "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN",
123 "TESTING", "DORMANT", "UP"
124 };
125
126 static void print_operstate(FILE *f, __u8 state)
127 {
128 if (state >= ARRAY_SIZE(oper_states)) {
129 if (is_json_context())
130 print_uint(PRINT_JSON, "operstate_index", NULL, state);
131 else
132 print_0xhex(PRINT_FP, NULL, "state %#x", state);
133 } else if (brief) {
134 print_color_string(PRINT_ANY,
135 oper_state_color(state),
136 "operstate",
137 "%-14s ",
138 oper_states[state]);
139 } else {
140 if (is_json_context())
141 print_string(PRINT_JSON,
142 "operstate",
143 NULL, oper_states[state]);
144 else {
145 fprintf(f, "state ");
146 color_fprintf(f, oper_state_color(state),
147 "%s ", oper_states[state]);
148 }
149 }
150 }
151
152 int get_operstate(const char *name)
153 {
154 int i;
155
156 for (i = 0; i < ARRAY_SIZE(oper_states); i++)
157 if (strcasecmp(name, oper_states[i]) == 0)
158 return i;
159 return -1;
160 }
161
162 static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1])
163 {
164 int qlen;
165
166 if (tb[IFLA_TXQLEN])
167 qlen = rta_getattr_u32(tb[IFLA_TXQLEN]);
168 else {
169 struct ifreq ifr = {};
170 int s = socket(AF_INET, SOCK_STREAM, 0);
171
172 if (s < 0)
173 return;
174
175 strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME]));
176 if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) {
177 fprintf(f, "ioctl(SIOCGIFTXQLEN) failed: %s\n", strerror(errno));
178 close(s);
179 return;
180 }
181 close(s);
182 qlen = ifr.ifr_qlen;
183 }
184 if (qlen)
185 print_int(PRINT_ANY, "txqlen", "qlen %d", qlen);
186 }
187
188 static const char *link_modes[] = {
189 "DEFAULT", "DORMANT"
190 };
191
192 static void print_linkmode(FILE *f, struct rtattr *tb)
193 {
194 unsigned int mode = rta_getattr_u8(tb);
195
196 if (mode >= ARRAY_SIZE(link_modes))
197 print_int(PRINT_ANY,
198 "linkmode_index",
199 "mode %d ",
200 mode);
201 else
202 print_string(PRINT_ANY,
203 "linkmode",
204 "mode %s "
205 , link_modes[mode]);
206 }
207
208 static char *parse_link_kind(struct rtattr *tb, bool slave)
209 {
210 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
211 int attr = slave ? IFLA_INFO_SLAVE_KIND : IFLA_INFO_KIND;
212
213 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
214
215 if (linkinfo[attr])
216 return RTA_DATA(linkinfo[attr]);
217
218 return "";
219 }
220
221 static int match_link_kind(struct rtattr **tb, const char *kind, bool slave)
222 {
223 if (!tb[IFLA_LINKINFO])
224 return -1;
225
226 return strcmp(parse_link_kind(tb[IFLA_LINKINFO], slave), kind);
227 }
228
229 static void print_linktype(FILE *fp, struct rtattr *tb)
230 {
231 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
232 struct link_util *lu;
233 struct link_util *slave_lu;
234 char slave[32];
235
236 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
237 open_json_object("linkinfo");
238
239 if (linkinfo[IFLA_INFO_KIND]) {
240 const char *kind
241 = rta_getattr_str(linkinfo[IFLA_INFO_KIND]);
242
243 print_string(PRINT_FP, NULL, "%s", _SL_);
244 print_string(PRINT_ANY, "info_kind", " %s ", kind);
245
246 lu = get_link_kind(kind);
247 if (lu && lu->print_opt) {
248 struct rtattr *attr[lu->maxattr+1], **data = NULL;
249
250 if (linkinfo[IFLA_INFO_DATA]) {
251 parse_rtattr_nested(attr, lu->maxattr,
252 linkinfo[IFLA_INFO_DATA]);
253 data = attr;
254 }
255 open_json_object("info_data");
256 lu->print_opt(lu, fp, data);
257 close_json_object();
258
259 if (linkinfo[IFLA_INFO_XSTATS] && show_stats &&
260 lu->print_xstats) {
261 open_json_object("info_xstats");
262 lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]);
263 close_json_object();
264 }
265 }
266 }
267
268 if (linkinfo[IFLA_INFO_SLAVE_KIND]) {
269 const char *slave_kind
270 = rta_getattr_str(linkinfo[IFLA_INFO_SLAVE_KIND]);
271
272 print_string(PRINT_FP, NULL, "%s", _SL_);
273 print_string(PRINT_ANY,
274 "info_slave_kind",
275 " %s_slave ",
276 slave_kind);
277
278 snprintf(slave, sizeof(slave), "%s_slave", slave_kind);
279
280 slave_lu = get_link_kind(slave);
281 if (slave_lu && slave_lu->print_opt) {
282 struct rtattr *attr[slave_lu->maxattr+1], **data = NULL;
283
284 if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
285 parse_rtattr_nested(attr, slave_lu->maxattr,
286 linkinfo[IFLA_INFO_SLAVE_DATA]);
287 data = attr;
288 }
289 open_json_object("info_slave_data");
290 slave_lu->print_opt(slave_lu, fp, data);
291 close_json_object();
292 }
293 }
294 close_json_object();
295 }
296
297 static void print_af_spec(FILE *fp, struct rtattr *af_spec_attr)
298 {
299 struct rtattr *inet6_attr;
300 struct rtattr *tb[IFLA_INET6_MAX + 1];
301
302 inet6_attr = parse_rtattr_one_nested(AF_INET6, af_spec_attr);
303 if (!inet6_attr)
304 return;
305
306 parse_rtattr_nested(tb, IFLA_INET6_MAX, inet6_attr);
307
308 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
309 __u8 mode = rta_getattr_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
310 SPRINT_BUF(b1);
311
312 switch (mode) {
313 case IN6_ADDR_GEN_MODE_EUI64:
314 print_string(PRINT_ANY,
315 "inet6_addr_gen_mode",
316 "addrgenmode %s ",
317 "eui64");
318 break;
319 case IN6_ADDR_GEN_MODE_NONE:
320 print_string(PRINT_ANY,
321 "inet6_addr_gen_mode",
322 "addrgenmode %s ",
323 "none");
324 break;
325 case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
326 print_string(PRINT_ANY,
327 "inet6_addr_gen_mode",
328 "addrgenmode %s ",
329 "stable_secret");
330 break;
331 case IN6_ADDR_GEN_MODE_RANDOM:
332 print_string(PRINT_ANY,
333 "inet6_addr_gen_mode",
334 "addrgenmode %s ",
335 "random");
336 break;
337 default:
338 snprintf(b1, sizeof(b1), "%#.2hhx", mode);
339 print_string(PRINT_ANY,
340 "inet6_addr_gen_mode",
341 "addrgenmode %s ",
342 b1);
343 break;
344 }
345 }
346 }
347
348 static void print_vf_stats64(FILE *fp, struct rtattr *vfstats);
349
350 static void print_vfinfo(FILE *fp, struct rtattr *vfinfo)
351 {
352 struct ifla_vf_mac *vf_mac;
353 struct ifla_vf_tx_rate *vf_tx_rate;
354 struct rtattr *vf[IFLA_VF_MAX + 1] = {};
355
356 SPRINT_BUF(b1);
357
358 if (vfinfo->rta_type != IFLA_VF_INFO) {
359 fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type);
360 return;
361 }
362
363 parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo);
364
365 vf_mac = RTA_DATA(vf[IFLA_VF_MAC]);
366 vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]);
367
368 print_string(PRINT_FP, NULL, "%s ", _SL_);
369 print_int(PRINT_ANY, "vf", "vf %d ", vf_mac->vf);
370 print_string(PRINT_ANY, "mac", "MAC %s",
371 ll_addr_n2a((unsigned char *) &vf_mac->mac,
372 ETH_ALEN, 0, b1, sizeof(b1)));
373
374 if (vf[IFLA_VF_VLAN_LIST]) {
375 struct rtattr *i, *vfvlanlist = vf[IFLA_VF_VLAN_LIST];
376 int rem = RTA_PAYLOAD(vfvlanlist);
377
378 open_json_array(PRINT_JSON, "vlan_list");
379 for (i = RTA_DATA(vfvlanlist);
380 RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
381 struct ifla_vf_vlan_info *vf_vlan_info = RTA_DATA(i);
382 SPRINT_BUF(b2);
383
384 open_json_object(NULL);
385 if (vf_vlan_info->vlan)
386 print_int(PRINT_ANY,
387 "vlan",
388 ", vlan %d",
389 vf_vlan_info->vlan);
390 if (vf_vlan_info->qos)
391 print_int(PRINT_ANY,
392 "qos",
393 ", qos %d",
394 vf_vlan_info->qos);
395 if (vf_vlan_info->vlan_proto &&
396 vf_vlan_info->vlan_proto != htons(ETH_P_8021Q))
397 print_string(PRINT_ANY,
398 "protocol",
399 ", vlan protocol %s",
400 ll_proto_n2a(
401 vf_vlan_info->vlan_proto,
402 b2, sizeof(b2)));
403 close_json_object();
404 }
405 close_json_array(PRINT_JSON, NULL);
406 } else {
407 struct ifla_vf_vlan *vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]);
408
409 if (vf_vlan->vlan)
410 print_int(PRINT_ANY,
411 "vlan",
412 ", vlan %d",
413 vf_vlan->vlan);
414 if (vf_vlan->qos)
415 print_int(PRINT_ANY, "qos", ", qos %d", vf_vlan->qos);
416 }
417
418 if (vf_tx_rate->rate)
419 print_uint(PRINT_ANY,
420 "tx_rate",
421 ", tx rate %u (Mbps)",
422 vf_tx_rate->rate);
423
424 if (vf[IFLA_VF_RATE]) {
425 struct ifla_vf_rate *vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
426 int max_tx = vf_rate->max_tx_rate;
427 int min_tx = vf_rate->min_tx_rate;
428
429 if (is_json_context()) {
430 open_json_object("rate");
431 print_uint(PRINT_JSON, "max_tx", NULL, max_tx);
432 print_uint(PRINT_ANY, "min_tx", NULL, min_tx);
433 close_json_object();
434 } else {
435 if (max_tx)
436 fprintf(fp, ", max_tx_rate %uMbps", max_tx);
437 if (min_tx)
438 fprintf(fp, ", min_tx_rate %uMbps", min_tx);
439 }
440 }
441
442 if (vf[IFLA_VF_SPOOFCHK]) {
443 struct ifla_vf_spoofchk *vf_spoofchk =
444 RTA_DATA(vf[IFLA_VF_SPOOFCHK]);
445
446 if (vf_spoofchk->setting != -1)
447 print_bool(PRINT_ANY,
448 "spoofchk",
449 vf_spoofchk->setting ?
450 ", spoof checking on" : ", spoof checking off",
451 vf_spoofchk->setting);
452 }
453
454 if (vf[IFLA_VF_LINK_STATE]) {
455 struct ifla_vf_link_state *vf_linkstate =
456 RTA_DATA(vf[IFLA_VF_LINK_STATE]);
457
458 if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_AUTO)
459 print_string(PRINT_ANY,
460 "link_state",
461 ", link-state %s",
462 "auto");
463 else if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_ENABLE)
464 print_string(PRINT_ANY,
465 "link_state",
466 ", link-state %s",
467 "enable");
468 else
469 print_string(PRINT_ANY,
470 "link_state",
471 ", link-state %s",
472 "disable");
473 }
474
475 if (vf[IFLA_VF_TRUST]) {
476 struct ifla_vf_trust *vf_trust = RTA_DATA(vf[IFLA_VF_TRUST]);
477
478 if (vf_trust->setting != -1)
479 print_bool(PRINT_ANY,
480 "trust",
481 vf_trust->setting ? ", trust on" : ", trust off",
482 vf_trust->setting);
483 }
484
485 if (vf[IFLA_VF_RSS_QUERY_EN]) {
486 struct ifla_vf_rss_query_en *rss_query =
487 RTA_DATA(vf[IFLA_VF_RSS_QUERY_EN]);
488
489 if (rss_query->setting != -1)
490 print_bool(PRINT_ANY,
491 "query_rss_en",
492 rss_query->setting ? ", query_rss on"
493 : ", query_rss off",
494 rss_query->setting);
495 }
496
497 if (vf[IFLA_VF_STATS] && show_stats)
498 print_vf_stats64(fp, vf[IFLA_VF_STATS]);
499 }
500
501 void print_num(FILE *fp, unsigned int width, uint64_t count)
502 {
503 const char *prefix = "kMGTPE";
504 const unsigned int base = use_iec ? 1024 : 1000;
505 uint64_t powi = 1;
506 uint16_t powj = 1;
507 uint8_t precision = 2;
508 char buf[64];
509
510 if (!human_readable || count < base) {
511 fprintf(fp, "%-*"PRIu64" ", width, count);
512 return;
513 }
514
515 /* increase value by a factor of 1000/1024 and print
516 * if result is something a human can read
517 */
518 for (;;) {
519 powi *= base;
520 if (count / base < powi)
521 break;
522
523 if (!prefix[1])
524 break;
525 ++prefix;
526 }
527
528 /* try to guess a good number of digits for precision */
529 for (; precision > 0; precision--) {
530 powj *= 10;
531 if (count / powi < powj)
532 break;
533 }
534
535 snprintf(buf, sizeof(buf), "%.*f%c%s", precision,
536 (double) count / powi, *prefix, use_iec ? "i" : "");
537
538 fprintf(fp, "%-*s ", width, buf);
539 }
540
541 static void print_vf_stats64(FILE *fp, struct rtattr *vfstats)
542 {
543 struct rtattr *vf[IFLA_VF_STATS_MAX + 1];
544
545 if (vfstats->rta_type != IFLA_VF_STATS) {
546 fprintf(stderr, "BUG: rta type is %d\n", vfstats->rta_type);
547 return;
548 }
549
550 parse_rtattr_nested(vf, IFLA_VF_MAX, vfstats);
551
552 if (is_json_context()) {
553 open_json_object("stats");
554
555 /* RX stats */
556 open_json_object("rx");
557 print_u64(PRINT_JSON, "bytes", NULL,
558 rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
559 print_u64(PRINT_JSON, "packets", NULL,
560 rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
561 print_u64(PRINT_JSON, "multicast", NULL,
562 rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
563 print_u64(PRINT_JSON, "broadcast", NULL,
564 rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
565 close_json_object();
566
567 /* TX stats */
568 open_json_object("tx");
569 print_u64(PRINT_JSON, "tx_bytes", NULL,
570 rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
571 print_u64(PRINT_JSON, "tx_packets", NULL,
572 rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
573 close_json_object();
574 close_json_object();
575 } else {
576 /* RX stats */
577 fprintf(fp, "%s", _SL_);
578 fprintf(fp, " RX: bytes packets mcast bcast %s", _SL_);
579 fprintf(fp, " ");
580
581 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
582 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
583 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
584 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
585
586 /* TX stats */
587 fprintf(fp, "%s", _SL_);
588 fprintf(fp, " TX: bytes packets %s", _SL_);
589 fprintf(fp, " ");
590
591 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
592 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
593 }
594 }
595
596 static void __print_link_stats(FILE *fp, struct rtattr *tb[])
597 {
598 const struct rtattr *carrier_changes = tb[IFLA_CARRIER_CHANGES];
599 struct rtnl_link_stats64 _s, *s = &_s;
600 int ret;
601
602 ret = get_rtnl_link_stats_rta(s, tb);
603 if (ret < 0)
604 return;
605
606 if (is_json_context()) {
607 open_json_object((ret == sizeof(*s)) ? "stats64" : "stats");
608
609 /* RX stats */
610 open_json_object("rx");
611 print_u64(PRINT_JSON, "bytes", NULL, s->rx_bytes);
612 print_u64(PRINT_JSON, "packets", NULL, s->rx_packets);
613 print_u64(PRINT_JSON, "errors", NULL, s->rx_errors);
614 print_u64(PRINT_JSON, "dropped", NULL, s->rx_dropped);
615 print_u64(PRINT_JSON, "over_errors", NULL, s->rx_over_errors);
616 print_u64(PRINT_JSON, "multicast", NULL, s->multicast);
617 if (s->rx_compressed)
618 print_u64(PRINT_JSON,
619 "compressed", NULL, s->rx_compressed);
620
621 /* RX error stats */
622 if (show_stats > 1) {
623 print_u64(PRINT_JSON,
624 "length_errors",
625 NULL, s->rx_length_errors);
626 print_u64(PRINT_JSON,
627 "crc_errors",
628 NULL, s->rx_crc_errors);
629 print_u64(PRINT_JSON,
630 "frame_errors",
631 NULL, s->rx_frame_errors);
632 print_u64(PRINT_JSON,
633 "fifo_errors",
634 NULL, s->rx_fifo_errors);
635 print_u64(PRINT_JSON,
636 "missed_errors",
637 NULL, s->rx_missed_errors);
638 if (s->rx_nohandler)
639 print_u64(PRINT_JSON,
640 "nohandler", NULL, s->rx_nohandler);
641 }
642 close_json_object();
643
644 /* TX stats */
645 open_json_object("tx");
646 print_u64(PRINT_JSON, "bytes", NULL, s->tx_bytes);
647 print_u64(PRINT_JSON, "packets", NULL, s->tx_packets);
648 print_u64(PRINT_JSON, "errors", NULL, s->tx_errors);
649 print_u64(PRINT_JSON, "dropped", NULL, s->tx_dropped);
650 print_u64(PRINT_JSON,
651 "carrier_errors",
652 NULL, s->tx_carrier_errors);
653 print_u64(PRINT_JSON, "collisions", NULL, s->collisions);
654 if (s->tx_compressed)
655 print_u64(PRINT_JSON,
656 "compressed", NULL, s->tx_compressed);
657
658 /* TX error stats */
659 if (show_stats > 1) {
660 print_u64(PRINT_JSON,
661 "aborted_errors",
662 NULL, s->tx_aborted_errors);
663 print_u64(PRINT_JSON,
664 "fifo_errors",
665 NULL, s->tx_fifo_errors);
666 print_u64(PRINT_JSON,
667 "window_errors",
668 NULL, s->tx_window_errors);
669 print_u64(PRINT_JSON,
670 "heartbeat_errors",
671 NULL, s->tx_heartbeat_errors);
672 if (carrier_changes)
673 print_u64(PRINT_JSON, "carrier_changes", NULL,
674 rta_getattr_u32(carrier_changes));
675 }
676
677 close_json_object();
678 close_json_object();
679 } else {
680 /* RX stats */
681 fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s",
682 s->rx_compressed ? "compressed" : "", _SL_);
683
684 fprintf(fp, " ");
685 print_num(fp, 10, s->rx_bytes);
686 print_num(fp, 8, s->rx_packets);
687 print_num(fp, 7, s->rx_errors);
688 print_num(fp, 7, s->rx_dropped);
689 print_num(fp, 7, s->rx_over_errors);
690 print_num(fp, 7, s->multicast);
691 if (s->rx_compressed)
692 print_num(fp, 7, s->rx_compressed);
693
694 /* RX error stats */
695 if (show_stats > 1) {
696 fprintf(fp, "%s", _SL_);
697 fprintf(fp, " RX errors: length crc frame fifo missed%s%s",
698 s->rx_nohandler ? " nohandler" : "", _SL_);
699 fprintf(fp, " ");
700 print_num(fp, 8, s->rx_length_errors);
701 print_num(fp, 7, s->rx_crc_errors);
702 print_num(fp, 7, s->rx_frame_errors);
703 print_num(fp, 7, s->rx_fifo_errors);
704 print_num(fp, 7, s->rx_missed_errors);
705 if (s->rx_nohandler)
706 print_num(fp, 7, s->rx_nohandler);
707 }
708 fprintf(fp, "%s", _SL_);
709
710 /* TX stats */
711 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
712 s->tx_compressed ? "compressed" : "", _SL_);
713
714 fprintf(fp, " ");
715 print_num(fp, 10, s->tx_bytes);
716 print_num(fp, 8, s->tx_packets);
717 print_num(fp, 7, s->tx_errors);
718 print_num(fp, 7, s->tx_dropped);
719 print_num(fp, 7, s->tx_carrier_errors);
720 print_num(fp, 7, s->collisions);
721 if (s->tx_compressed)
722 print_num(fp, 7, s->tx_compressed);
723
724 /* TX error stats */
725 if (show_stats > 1) {
726 fprintf(fp, "%s", _SL_);
727 fprintf(fp, " TX errors: aborted fifo window heartbeat");
728 if (carrier_changes)
729 fprintf(fp, " transns");
730 fprintf(fp, "%s", _SL_);
731
732 fprintf(fp, " ");
733 print_num(fp, 8, s->tx_aborted_errors);
734 print_num(fp, 7, s->tx_fifo_errors);
735 print_num(fp, 7, s->tx_window_errors);
736 print_num(fp, 7, s->tx_heartbeat_errors);
737 if (carrier_changes)
738 print_num(fp, 7,
739 rta_getattr_u32(carrier_changes));
740 }
741 }
742 }
743
744 static void print_link_stats(FILE *fp, struct nlmsghdr *n)
745 {
746 struct ifinfomsg *ifi = NLMSG_DATA(n);
747 struct rtattr *tb[IFLA_MAX+1];
748
749 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi),
750 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)));
751 __print_link_stats(fp, tb);
752 fprintf(fp, "%s", _SL_);
753 }
754
755 static int print_linkinfo_brief(FILE *fp, const char *name,
756 const struct ifinfomsg *ifi,
757 struct rtattr *tb[])
758 {
759 unsigned int m_flag = 0;
760
761 m_flag = print_name_and_link("%-16s ", name, tb);
762
763 if (tb[IFLA_OPERSTATE])
764 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
765
766 if (filter.family == AF_PACKET) {
767 SPRINT_BUF(b1);
768
769 if (tb[IFLA_ADDRESS]) {
770 print_color_string(PRINT_ANY, COLOR_MAC,
771 "address", "%s ",
772 ll_addr_n2a(
773 RTA_DATA(tb[IFLA_ADDRESS]),
774 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
775 ifi->ifi_type,
776 b1, sizeof(b1)));
777 }
778 }
779
780 if (filter.family == AF_PACKET) {
781 print_link_flags(fp, ifi->ifi_flags, m_flag);
782 print_string(PRINT_FP, NULL, "%s", "\n");
783 }
784
785 fflush(fp);
786 return 0;
787 }
788
789 static const char *link_events[] = {
790 [IFLA_EVENT_NONE] = "NONE",
791 [IFLA_EVENT_REBOOT] = "REBOOT",
792 [IFLA_EVENT_FEATURES] = "FEATURE CHANGE",
793 [IFLA_EVENT_BONDING_FAILOVER] = "BONDING FAILOVER",
794 [IFLA_EVENT_NOTIFY_PEERS] = "NOTIFY PEERS",
795 [IFLA_EVENT_IGMP_RESEND] = "RESEND IGMP",
796 [IFLA_EVENT_BONDING_OPTIONS] = "BONDING OPTION"
797 };
798
799 static void print_link_event(FILE *f, __u32 event)
800 {
801 if (event >= ARRAY_SIZE(link_events))
802 print_int(PRINT_ANY, "event", "event %d ", event);
803 else {
804 if (event)
805 print_string(PRINT_ANY,
806 "event", "event %s ",
807 link_events[event]);
808 }
809 }
810
811 int print_linkinfo(const struct sockaddr_nl *who,
812 struct nlmsghdr *n, void *arg)
813 {
814 FILE *fp = (FILE *)arg;
815 struct ifinfomsg *ifi = NLMSG_DATA(n);
816 struct rtattr *tb[IFLA_MAX+1];
817 int len = n->nlmsg_len;
818 const char *name;
819 unsigned int m_flag = 0;
820 SPRINT_BUF(b1);
821
822 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
823 return 0;
824
825 len -= NLMSG_LENGTH(sizeof(*ifi));
826 if (len < 0)
827 return -1;
828
829 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
830 return -1;
831 if (filter.up && !(ifi->ifi_flags&IFF_UP))
832 return -1;
833
834 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
835
836 name = get_ifname_rta(ifi->ifi_index, tb[IFLA_IFNAME]);
837 if (!name)
838 return -1;
839
840 if (filter.label &&
841 (!filter.family || filter.family == AF_PACKET) &&
842 fnmatch(filter.label, name, 0))
843 return -1;
844
845 if (tb[IFLA_GROUP]) {
846 int group = rta_getattr_u32(tb[IFLA_GROUP]);
847
848 if (filter.group != -1 && group != filter.group)
849 return -1;
850 }
851
852 if (tb[IFLA_MASTER]) {
853 int master = rta_getattr_u32(tb[IFLA_MASTER]);
854
855 if (filter.master > 0 && master != filter.master)
856 return -1;
857 } else if (filter.master > 0)
858 return -1;
859
860 if (filter.kind && match_link_kind(tb, filter.kind, 0))
861 return -1;
862
863 if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1))
864 return -1;
865
866 if (n->nlmsg_type == RTM_DELLINK)
867 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
868
869 if (brief)
870 return print_linkinfo_brief(fp, name, ifi, tb);
871
872 print_int(PRINT_ANY, "ifindex", "%d: ", ifi->ifi_index);
873
874 m_flag = print_name_and_link("%s: ", name, tb);
875 print_link_flags(fp, ifi->ifi_flags, m_flag);
876
877 if (tb[IFLA_MTU])
878 print_int(PRINT_ANY,
879 "mtu", "mtu %u ",
880 rta_getattr_u32(tb[IFLA_MTU]));
881 if (tb[IFLA_XDP])
882 xdp_dump(fp, tb[IFLA_XDP], do_link, false);
883 if (tb[IFLA_QDISC])
884 print_string(PRINT_ANY,
885 "qdisc",
886 "qdisc %s ",
887 rta_getattr_str(tb[IFLA_QDISC]));
888 if (tb[IFLA_MASTER]) {
889 int master = rta_getattr_u32(tb[IFLA_MASTER]);
890
891 print_string(PRINT_ANY,
892 "master", "master %s ",
893 ll_index_to_name(master));
894 }
895
896 if (tb[IFLA_OPERSTATE])
897 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
898
899 if (do_link && tb[IFLA_LINKMODE])
900 print_linkmode(fp, tb[IFLA_LINKMODE]);
901
902 if (tb[IFLA_GROUP]) {
903 int group = rta_getattr_u32(tb[IFLA_GROUP]);
904
905 print_string(PRINT_ANY,
906 "group",
907 "group %s ",
908 rtnl_group_n2a(group, b1, sizeof(b1)));
909 }
910
911 if (filter.showqueue)
912 print_queuelen(fp, tb);
913
914 if (tb[IFLA_EVENT])
915 print_link_event(fp, rta_getattr_u32(tb[IFLA_EVENT]));
916
917 if (!filter.family || filter.family == AF_PACKET || show_details) {
918 print_string(PRINT_FP, NULL, "%s", _SL_);
919 print_string(PRINT_ANY,
920 "link_type",
921 " link/%s ",
922 ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
923 if (tb[IFLA_ADDRESS]) {
924 print_color_string(PRINT_ANY,
925 COLOR_MAC,
926 "address",
927 "%s",
928 ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]),
929 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
930 ifi->ifi_type,
931 b1, sizeof(b1)));
932 }
933 if (tb[IFLA_BROADCAST]) {
934 if (ifi->ifi_flags&IFF_POINTOPOINT) {
935 print_string(PRINT_FP, NULL, " peer ", NULL);
936 print_bool(PRINT_JSON,
937 "link_pointtopoint", NULL, true);
938 } else {
939 print_string(PRINT_FP, NULL, " brd ", NULL);
940 }
941 print_color_string(PRINT_ANY,
942 COLOR_MAC,
943 "broadcast",
944 "%s",
945 ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]),
946 RTA_PAYLOAD(tb[IFLA_BROADCAST]),
947 ifi->ifi_type,
948 b1, sizeof(b1)));
949 }
950 }
951
952 if (tb[IFLA_LINK_NETNSID]) {
953 int id = rta_getattr_u32(tb[IFLA_LINK_NETNSID]);
954
955 if (is_json_context()) {
956 print_int(PRINT_JSON, "link_netnsid", NULL, id);
957 } else {
958 if (id >= 0) {
959 char *name = get_name_from_nsid(id);
960
961 if (name)
962 print_string(PRINT_FP, NULL,
963 " link-netns %s", name);
964 else
965 print_int(PRINT_FP, NULL,
966 " link-netnsid %d", id);
967 } else
968 print_string(PRINT_FP, NULL,
969 " link-netnsid %s", "unknown");
970 }
971 }
972
973 if (tb[IFLA_NEW_NETNSID]) {
974 int id = rta_getattr_u32(tb[IFLA_NEW_NETNSID]);
975 char *name = get_name_from_nsid(id);
976
977 if (name)
978 print_string(PRINT_FP, NULL, " new-netns %s", name);
979 else
980 print_int(PRINT_FP, NULL, " new-netnsid %d", id);
981 }
982 if (tb[IFLA_NEW_IFINDEX]) {
983 int id = rta_getattr_u32(tb[IFLA_NEW_IFINDEX]);
984
985 print_int(PRINT_FP, NULL, " new-ifindex %d", id);
986 }
987
988 if (tb[IFLA_PROTO_DOWN]) {
989 if (rta_getattr_u8(tb[IFLA_PROTO_DOWN]))
990 print_bool(PRINT_ANY,
991 "proto_down", " protodown on ", true);
992 }
993
994 if (show_details) {
995 if (tb[IFLA_PROMISCUITY])
996 print_uint(PRINT_ANY,
997 "promiscuity",
998 " promiscuity %u ",
999 rta_getattr_u32(tb[IFLA_PROMISCUITY]));
1000
1001 if (tb[IFLA_LINKINFO])
1002 print_linktype(fp, tb[IFLA_LINKINFO]);
1003
1004 if (do_link && tb[IFLA_AF_SPEC])
1005 print_af_spec(fp, tb[IFLA_AF_SPEC]);
1006
1007 if (tb[IFLA_NUM_TX_QUEUES])
1008 print_uint(PRINT_ANY,
1009 "num_tx_queues",
1010 "numtxqueues %u ",
1011 rta_getattr_u32(tb[IFLA_NUM_TX_QUEUES]));
1012
1013 if (tb[IFLA_NUM_RX_QUEUES])
1014 print_uint(PRINT_ANY,
1015 "num_rx_queues",
1016 "numrxqueues %u ",
1017 rta_getattr_u32(tb[IFLA_NUM_RX_QUEUES]));
1018
1019 if (tb[IFLA_GSO_MAX_SIZE])
1020 print_uint(PRINT_ANY,
1021 "gso_max_size",
1022 "gso_max_size %u ",
1023 rta_getattr_u32(tb[IFLA_GSO_MAX_SIZE]));
1024
1025 if (tb[IFLA_GSO_MAX_SEGS])
1026 print_uint(PRINT_ANY,
1027 "gso_max_segs",
1028 "gso_max_segs %u ",
1029 rta_getattr_u32(tb[IFLA_GSO_MAX_SEGS]));
1030
1031 if (tb[IFLA_PHYS_PORT_NAME])
1032 print_string(PRINT_ANY,
1033 "phys_port_name",
1034 "portname %s ",
1035 rta_getattr_str(tb[IFLA_PHYS_PORT_NAME]));
1036
1037 if (tb[IFLA_PHYS_PORT_ID]) {
1038 print_string(PRINT_ANY,
1039 "phys_port_id",
1040 "portid %s ",
1041 hexstring_n2a(
1042 RTA_DATA(tb[IFLA_PHYS_PORT_ID]),
1043 RTA_PAYLOAD(tb[IFLA_PHYS_PORT_ID]),
1044 b1, sizeof(b1)));
1045 }
1046
1047 if (tb[IFLA_PHYS_SWITCH_ID]) {
1048 print_string(PRINT_ANY,
1049 "phys_switch_id",
1050 "switchid %s ",
1051 hexstring_n2a(RTA_DATA(tb[IFLA_PHYS_SWITCH_ID]),
1052 RTA_PAYLOAD(tb[IFLA_PHYS_SWITCH_ID]),
1053 b1, sizeof(b1)));
1054 }
1055 }
1056
1057 if ((do_link || show_details) && tb[IFLA_IFALIAS]) {
1058 print_string(PRINT_FP, NULL, "%s ", _SL_);
1059 print_string(PRINT_ANY,
1060 "ifalias",
1061 "alias %s",
1062 rta_getattr_str(tb[IFLA_IFALIAS]));
1063 }
1064
1065 if ((do_link || show_details) && tb[IFLA_XDP])
1066 xdp_dump(fp, tb[IFLA_XDP], true, true);
1067
1068 if (do_link && show_stats) {
1069 print_string(PRINT_FP, NULL, "%s", _SL_);
1070 __print_link_stats(fp, tb);
1071 }
1072
1073 if ((do_link || show_details) && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) {
1074 struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST];
1075 int rem = RTA_PAYLOAD(vflist);
1076
1077 open_json_array(PRINT_JSON, "vfinfo_list");
1078 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
1079 open_json_object(NULL);
1080 print_vfinfo(fp, i);
1081 close_json_object();
1082 }
1083 close_json_array(PRINT_JSON, NULL);
1084 }
1085
1086 print_string(PRINT_FP, NULL, "%s", "\n");
1087 fflush(fp);
1088 return 1;
1089 }
1090
1091 static int flush_update(void)
1092 {
1093
1094 /*
1095 * Note that the kernel may delete multiple addresses for one
1096 * delete request (e.g. if ipv4 address promotion is disabled).
1097 * Since a flush operation is really a series of delete requests
1098 * its possible that we may request an address delete that has
1099 * already been done by the kernel. Therefore, ignore EADDRNOTAVAIL
1100 * errors returned from a flush request
1101 */
1102 if ((rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) &&
1103 (errno != EADDRNOTAVAIL)) {
1104 perror("Failed to send flush request");
1105 return -1;
1106 }
1107 filter.flushp = 0;
1108 return 0;
1109 }
1110
1111 static int set_lifetime(unsigned int *lifetime, char *argv)
1112 {
1113 if (strcmp(argv, "forever") == 0)
1114 *lifetime = INFINITY_LIFE_TIME;
1115 else if (get_u32(lifetime, argv, 0))
1116 return -1;
1117
1118 return 0;
1119 }
1120
1121 static unsigned int get_ifa_flags(struct ifaddrmsg *ifa,
1122 struct rtattr *ifa_flags_attr)
1123 {
1124 return ifa_flags_attr ? rta_getattr_u32(ifa_flags_attr) :
1125 ifa->ifa_flags;
1126 }
1127
1128 /* Mapping from argument to address flag mask */
1129 struct {
1130 const char *name;
1131 unsigned long value;
1132 } ifa_flag_names[] = {
1133 { "secondary", IFA_F_SECONDARY },
1134 { "temporary", IFA_F_SECONDARY },
1135 { "nodad", IFA_F_NODAD },
1136 { "optimistic", IFA_F_OPTIMISTIC },
1137 { "dadfailed", IFA_F_DADFAILED },
1138 { "home", IFA_F_HOMEADDRESS },
1139 { "deprecated", IFA_F_DEPRECATED },
1140 { "tentative", IFA_F_TENTATIVE },
1141 { "permanent", IFA_F_PERMANENT },
1142 { "mngtmpaddr", IFA_F_MANAGETEMPADDR },
1143 { "noprefixroute", IFA_F_NOPREFIXROUTE },
1144 { "autojoin", IFA_F_MCAUTOJOIN },
1145 { "stable-privacy", IFA_F_STABLE_PRIVACY },
1146 };
1147
1148 static void print_ifa_flags(FILE *fp, const struct ifaddrmsg *ifa,
1149 unsigned int flags)
1150 {
1151 unsigned int i;
1152
1153 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1154 unsigned long mask = ifa_flag_names[i].value;
1155
1156 if (mask == IFA_F_PERMANENT) {
1157 if (!(flags & mask))
1158 print_bool(PRINT_ANY,
1159 "dynamic", "dynamic ", true);
1160 } else if (flags & mask) {
1161 if (mask == IFA_F_SECONDARY &&
1162 ifa->ifa_family == AF_INET6) {
1163 print_bool(PRINT_ANY,
1164 "temporary", "temporary ", true);
1165 } else {
1166 print_string(PRINT_FP, NULL,
1167 "%s ", ifa_flag_names[i].name);
1168 print_bool(PRINT_JSON,
1169 ifa_flag_names[i].name, NULL, true);
1170 }
1171 }
1172
1173 flags &= ~mask;
1174 }
1175
1176 if (flags) {
1177 if (is_json_context()) {
1178 SPRINT_BUF(b1);
1179
1180 snprintf(b1, sizeof(b1), "%02x", flags);
1181 print_string(PRINT_JSON, "ifa_flags", NULL, b1);
1182 } else {
1183 fprintf(fp, "flags %02x ", flags);
1184 }
1185 }
1186
1187 }
1188
1189 static int get_filter(const char *arg)
1190 {
1191 unsigned int i;
1192
1193 /* Special cases */
1194 if (strcmp(arg, "dynamic") == 0) {
1195 filter.flags &= ~IFA_F_PERMANENT;
1196 filter.flagmask |= IFA_F_PERMANENT;
1197 } else if (strcmp(arg, "primary") == 0) {
1198 filter.flags &= ~IFA_F_SECONDARY;
1199 filter.flagmask |= IFA_F_SECONDARY;
1200 } else if (*arg == '-') {
1201 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1202 if (strcmp(arg + 1, ifa_flag_names[i].name))
1203 continue;
1204
1205 filter.flags &= ifa_flag_names[i].value;
1206 filter.flagmask |= ifa_flag_names[i].value;
1207 return 0;
1208 }
1209
1210 return -1;
1211 } else {
1212 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1213 if (strcmp(arg, ifa_flag_names[i].name))
1214 continue;
1215 filter.flags |= ifa_flag_names[i].value;
1216 filter.flagmask |= ifa_flag_names[i].value;
1217 return 0;
1218 }
1219 return -1;
1220 }
1221
1222 return 0;
1223 }
1224
1225 static int ifa_label_match_rta(int ifindex, const struct rtattr *rta)
1226 {
1227 const char *label;
1228
1229 if (!filter.label)
1230 return 0;
1231
1232 if (rta)
1233 label = RTA_DATA(rta);
1234 else
1235 label = ll_index_to_name(ifindex);
1236
1237 return fnmatch(filter.label, label, 0);
1238 }
1239
1240 int print_addrinfo(const struct sockaddr_nl *who, struct nlmsghdr *n,
1241 void *arg)
1242 {
1243 FILE *fp = arg;
1244 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1245 int len = n->nlmsg_len;
1246 unsigned int ifa_flags;
1247 struct rtattr *rta_tb[IFA_MAX+1];
1248
1249 SPRINT_BUF(b1);
1250
1251 if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR)
1252 return 0;
1253 len -= NLMSG_LENGTH(sizeof(*ifa));
1254 if (len < 0) {
1255 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
1256 return -1;
1257 }
1258
1259 if (filter.flushb && n->nlmsg_type != RTM_NEWADDR)
1260 return 0;
1261
1262 parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa),
1263 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
1264
1265 ifa_flags = get_ifa_flags(ifa, rta_tb[IFA_FLAGS]);
1266
1267 if (!rta_tb[IFA_LOCAL])
1268 rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1269 if (!rta_tb[IFA_ADDRESS])
1270 rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
1271
1272 if (filter.ifindex && filter.ifindex != ifa->ifa_index)
1273 return 0;
1274 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1275 return 0;
1276 if ((filter.flags ^ ifa_flags) & filter.flagmask)
1277 return 0;
1278
1279 if (filter.family && filter.family != ifa->ifa_family)
1280 return 0;
1281
1282 if (ifa_label_match_rta(ifa->ifa_index, rta_tb[IFA_LABEL]))
1283 return 0;
1284
1285 if (inet_addr_match_rta(&filter.pfx, rta_tb[IFA_LOCAL]))
1286 return 0;
1287
1288 if (filter.flushb) {
1289 struct nlmsghdr *fn;
1290
1291 if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
1292 if (flush_update())
1293 return -1;
1294 }
1295 fn = (struct nlmsghdr *)(filter.flushb + NLMSG_ALIGN(filter.flushp));
1296 memcpy(fn, n, n->nlmsg_len);
1297 fn->nlmsg_type = RTM_DELADDR;
1298 fn->nlmsg_flags = NLM_F_REQUEST;
1299 fn->nlmsg_seq = ++rth.seq;
1300 filter.flushp = (((char *)fn) + n->nlmsg_len) - filter.flushb;
1301 filter.flushed++;
1302 if (show_stats < 2)
1303 return 0;
1304 }
1305
1306 if (n->nlmsg_type == RTM_DELADDR)
1307 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
1308
1309 if (!brief) {
1310 const char *name;
1311
1312 if (filter.oneline || filter.flushb) {
1313 const char *dev = ll_index_to_name(ifa->ifa_index);
1314
1315 if (is_json_context()) {
1316 print_int(PRINT_JSON,
1317 "index", NULL, ifa->ifa_index);
1318 print_string(PRINT_JSON, "dev", NULL, dev);
1319 } else {
1320 fprintf(fp, "%u: %s", ifa->ifa_index, dev);
1321 }
1322 }
1323
1324 name = family_name(ifa->ifa_family);
1325 if (*name != '?') {
1326 print_string(PRINT_ANY, "family", " %s ", name);
1327 } else {
1328 print_int(PRINT_ANY, "family_index", " family %d ",
1329 ifa->ifa_family);
1330 }
1331 }
1332
1333 if (rta_tb[IFA_LOCAL]) {
1334 print_color_string(PRINT_ANY,
1335 ifa_family_color(ifa->ifa_family),
1336 "local", "%s",
1337 format_host_rta(ifa->ifa_family,
1338 rta_tb[IFA_LOCAL]));
1339 if (rta_tb[IFA_ADDRESS] &&
1340 memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
1341 RTA_DATA(rta_tb[IFA_LOCAL]),
1342 ifa->ifa_family == AF_INET ? 4 : 16)) {
1343 print_string(PRINT_FP, NULL, " %s ", "peer");
1344 print_color_string(PRINT_ANY,
1345 ifa_family_color(ifa->ifa_family),
1346 "address",
1347 "%s",
1348 format_host_rta(ifa->ifa_family,
1349 rta_tb[IFA_ADDRESS]));
1350 }
1351 print_int(PRINT_ANY, "prefixlen", "/%d ", ifa->ifa_prefixlen);
1352
1353 if (rta_tb[IFA_RT_PRIORITY])
1354 print_uint(PRINT_ANY, "metric", "metric %u ",
1355 rta_getattr_u32(rta_tb[IFA_RT_PRIORITY]));
1356 }
1357
1358 if (brief)
1359 goto brief_exit;
1360
1361 if (rta_tb[IFA_BROADCAST]) {
1362 print_string(PRINT_FP, NULL, "%s ", "brd");
1363 print_color_string(PRINT_ANY,
1364 ifa_family_color(ifa->ifa_family),
1365 "broadcast",
1366 "%s ",
1367 format_host_rta(ifa->ifa_family,
1368 rta_tb[IFA_BROADCAST]));
1369 }
1370
1371 if (rta_tb[IFA_ANYCAST]) {
1372 print_string(PRINT_FP, NULL, "%s ", "any");
1373 print_color_string(PRINT_ANY,
1374 ifa_family_color(ifa->ifa_family),
1375 "anycast",
1376 "%s ",
1377 format_host_rta(ifa->ifa_family,
1378 rta_tb[IFA_ANYCAST]));
1379 }
1380
1381 print_string(PRINT_ANY,
1382 "scope",
1383 "scope %s ",
1384 rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1)));
1385
1386 print_ifa_flags(fp, ifa, ifa_flags);
1387
1388 if (rta_tb[IFA_LABEL])
1389 print_string(PRINT_ANY,
1390 "label",
1391 "%s",
1392 rta_getattr_str(rta_tb[IFA_LABEL]));
1393
1394 if (rta_tb[IFA_CACHEINFO]) {
1395 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
1396
1397 print_string(PRINT_FP, NULL, "%s", _SL_);
1398 print_string(PRINT_FP, NULL, " valid_lft ", NULL);
1399
1400 if (ci->ifa_valid == INFINITY_LIFE_TIME) {
1401 print_uint(PRINT_JSON,
1402 "valid_life_time",
1403 NULL, INFINITY_LIFE_TIME);
1404 print_string(PRINT_FP, NULL, "%s", "forever");
1405 } else {
1406 print_uint(PRINT_ANY,
1407 "valid_life_time", "%usec", ci->ifa_valid);
1408 }
1409
1410 print_string(PRINT_FP, NULL, " preferred_lft ", NULL);
1411 if (ci->ifa_prefered == INFINITY_LIFE_TIME) {
1412 print_uint(PRINT_JSON,
1413 "preferred_life_time",
1414 NULL, INFINITY_LIFE_TIME);
1415 print_string(PRINT_FP, NULL, "%s", "forever");
1416 } else {
1417 if (ifa_flags & IFA_F_DEPRECATED)
1418 print_int(PRINT_ANY,
1419 "preferred_life_time",
1420 "%dsec",
1421 ci->ifa_prefered);
1422 else
1423 print_uint(PRINT_ANY,
1424 "preferred_life_time",
1425 "%usec",
1426 ci->ifa_prefered);
1427 }
1428 }
1429 print_string(PRINT_FP, NULL, "%s", "\n");
1430 brief_exit:
1431 fflush(fp);
1432 return 0;
1433 }
1434
1435 static int print_selected_addrinfo(struct ifinfomsg *ifi,
1436 struct nlmsg_list *ainfo, FILE *fp)
1437 {
1438 open_json_array(PRINT_JSON, "addr_info");
1439 for ( ; ainfo ; ainfo = ainfo->next) {
1440 struct nlmsghdr *n = &ainfo->h;
1441 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1442
1443 if (n->nlmsg_type != RTM_NEWADDR)
1444 continue;
1445
1446 if (n->nlmsg_len < NLMSG_LENGTH(sizeof(*ifa)))
1447 return -1;
1448
1449 if (ifa->ifa_index != ifi->ifi_index ||
1450 (filter.family && filter.family != ifa->ifa_family))
1451 continue;
1452
1453 if (filter.up && !(ifi->ifi_flags&IFF_UP))
1454 continue;
1455
1456 open_json_object(NULL);
1457 print_addrinfo(NULL, n, fp);
1458 close_json_object();
1459 }
1460 close_json_array(PRINT_JSON, NULL);
1461
1462 if (brief) {
1463 print_string(PRINT_FP, NULL, "%s", "\n");
1464 fflush(fp);
1465 }
1466 return 0;
1467 }
1468
1469
1470 static int store_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n,
1471 void *arg)
1472 {
1473 struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg;
1474 struct nlmsg_list *h;
1475
1476 h = malloc(n->nlmsg_len+sizeof(void *));
1477 if (h == NULL)
1478 return -1;
1479
1480 memcpy(&h->h, n, n->nlmsg_len);
1481 h->next = NULL;
1482
1483 if (lchain->tail)
1484 lchain->tail->next = h;
1485 else
1486 lchain->head = h;
1487 lchain->tail = h;
1488
1489 ll_remember_index(who, n, NULL);
1490 return 0;
1491 }
1492
1493 static __u32 ipadd_dump_magic = 0x47361222;
1494
1495 static int ipadd_save_prep(void)
1496 {
1497 int ret;
1498
1499 if (isatty(STDOUT_FILENO)) {
1500 fprintf(stderr, "Not sending a binary stream to stdout\n");
1501 return -1;
1502 }
1503
1504 ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic));
1505 if (ret != sizeof(ipadd_dump_magic)) {
1506 fprintf(stderr, "Can't write magic to dump file\n");
1507 return -1;
1508 }
1509
1510 return 0;
1511 }
1512
1513 static int ipadd_dump_check_magic(void)
1514 {
1515 int ret;
1516 __u32 magic = 0;
1517
1518 if (isatty(STDIN_FILENO)) {
1519 fprintf(stderr, "Can't restore address dump from a terminal\n");
1520 return -1;
1521 }
1522
1523 ret = fread(&magic, sizeof(magic), 1, stdin);
1524 if (magic != ipadd_dump_magic) {
1525 fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
1526 return -1;
1527 }
1528
1529 return 0;
1530 }
1531
1532 static int save_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n,
1533 void *arg)
1534 {
1535 int ret;
1536
1537 ret = write(STDOUT_FILENO, n, n->nlmsg_len);
1538 if ((ret > 0) && (ret != n->nlmsg_len)) {
1539 fprintf(stderr, "Short write while saving nlmsg\n");
1540 ret = -EIO;
1541 }
1542
1543 return ret == n->nlmsg_len ? 0 : ret;
1544 }
1545
1546 static int show_handler(const struct sockaddr_nl *nl,
1547 struct rtnl_ctrl_data *ctrl,
1548 struct nlmsghdr *n, void *arg)
1549 {
1550 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1551
1552 open_json_object(NULL);
1553 print_int(PRINT_ANY, "index", "if%d:\n", ifa->ifa_index);
1554 print_addrinfo(NULL, n, stdout);
1555 close_json_object();
1556 return 0;
1557 }
1558
1559 static int ipaddr_showdump(void)
1560 {
1561 int err;
1562
1563 if (ipadd_dump_check_magic())
1564 exit(-1);
1565
1566 new_json_obj(json);
1567 open_json_object(NULL);
1568 open_json_array(PRINT_JSON, "addr_info");
1569
1570 err = rtnl_from_file(stdin, &show_handler, NULL);
1571
1572 close_json_array(PRINT_JSON, NULL);
1573 close_json_object();
1574 delete_json_obj();
1575
1576 exit(err);
1577 }
1578
1579 static int restore_handler(const struct sockaddr_nl *nl,
1580 struct rtnl_ctrl_data *ctrl,
1581 struct nlmsghdr *n, void *arg)
1582 {
1583 int ret;
1584
1585 n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
1586
1587 ll_init_map(&rth);
1588
1589 ret = rtnl_talk(&rth, n, NULL);
1590 if ((ret < 0) && (errno == EEXIST))
1591 ret = 0;
1592
1593 return ret;
1594 }
1595
1596 static int ipaddr_restore(void)
1597 {
1598 if (ipadd_dump_check_magic())
1599 exit(-1);
1600
1601 exit(rtnl_from_file(stdin, &restore_handler, NULL));
1602 }
1603
1604 void free_nlmsg_chain(struct nlmsg_chain *info)
1605 {
1606 struct nlmsg_list *l, *n;
1607
1608 for (l = info->head; l; l = n) {
1609 n = l->next;
1610 free(l);
1611 }
1612 }
1613
1614 static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1615 {
1616 struct nlmsg_list *l, **lp;
1617
1618 lp = &linfo->head;
1619 while ((l = *lp) != NULL) {
1620 int ok = 0;
1621 int missing_net_address = 1;
1622 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
1623 struct nlmsg_list *a;
1624
1625 for (a = ainfo->head; a; a = a->next) {
1626 struct nlmsghdr *n = &a->h;
1627 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1628 struct rtattr *tb[IFA_MAX + 1];
1629 unsigned int ifa_flags;
1630
1631 if (ifa->ifa_index != ifi->ifi_index)
1632 continue;
1633 missing_net_address = 0;
1634 if (filter.family && filter.family != ifa->ifa_family)
1635 continue;
1636 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1637 continue;
1638
1639 parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n));
1640 ifa_flags = get_ifa_flags(ifa, tb[IFA_FLAGS]);
1641
1642 if ((filter.flags ^ ifa_flags) & filter.flagmask)
1643 continue;
1644
1645 if (ifa_label_match_rta(ifa->ifa_index, tb[IFA_LABEL]))
1646 continue;
1647
1648 if (!tb[IFA_LOCAL])
1649 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
1650 if (inet_addr_match_rta(&filter.pfx, tb[IFA_LOCAL]))
1651 continue;
1652
1653 ok = 1;
1654 break;
1655 }
1656 if (missing_net_address &&
1657 (filter.family == AF_UNSPEC || filter.family == AF_PACKET))
1658 ok = 1;
1659 if (!ok) {
1660 *lp = l->next;
1661 free(l);
1662 } else
1663 lp = &l->next;
1664 }
1665 }
1666
1667 static int ipaddr_flush(void)
1668 {
1669 int round = 0;
1670 char flushb[4096-512];
1671
1672 filter.flushb = flushb;
1673 filter.flushp = 0;
1674 filter.flushe = sizeof(flushb);
1675
1676 while ((max_flush_loops == 0) || (round < max_flush_loops)) {
1677 if (rtnl_wilddump_request(&rth, filter.family, RTM_GETADDR) < 0) {
1678 perror("Cannot send dump request");
1679 exit(1);
1680 }
1681 filter.flushed = 0;
1682 if (rtnl_dump_filter_nc(&rth, print_addrinfo,
1683 stdout, NLM_F_DUMP_INTR) < 0) {
1684 fprintf(stderr, "Flush terminated\n");
1685 exit(1);
1686 }
1687 if (filter.flushed == 0) {
1688 flush_done:
1689 if (show_stats) {
1690 if (round == 0)
1691 printf("Nothing to flush.\n");
1692 else
1693 printf("*** Flush is complete after %d round%s ***\n", round, round > 1?"s":"");
1694 }
1695 fflush(stdout);
1696 return 0;
1697 }
1698 round++;
1699 if (flush_update() < 0)
1700 return 1;
1701
1702 if (show_stats) {
1703 printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed);
1704 fflush(stdout);
1705 }
1706
1707 /* If we are flushing, and specifying primary, then we
1708 * want to flush only a single round. Otherwise, we'll
1709 * start flushing secondaries that were promoted to
1710 * primaries.
1711 */
1712 if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY))
1713 goto flush_done;
1714 }
1715 fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops);
1716 fflush(stderr);
1717 return 1;
1718 }
1719
1720 static int iplink_filter_req(struct nlmsghdr *nlh, int reqlen)
1721 {
1722 int err;
1723
1724 err = addattr32(nlh, reqlen, IFLA_EXT_MASK, RTEXT_FILTER_VF);
1725 if (err)
1726 return err;
1727
1728 if (filter.master) {
1729 err = addattr32(nlh, reqlen, IFLA_MASTER, filter.master);
1730 if (err)
1731 return err;
1732 }
1733
1734 if (filter.kind) {
1735 struct rtattr *linkinfo;
1736
1737 linkinfo = addattr_nest(nlh, reqlen, IFLA_LINKINFO);
1738
1739 err = addattr_l(nlh, reqlen, IFLA_INFO_KIND, filter.kind,
1740 strlen(filter.kind));
1741 if (err)
1742 return err;
1743
1744 addattr_nest_end(nlh, linkinfo);
1745 }
1746
1747 return 0;
1748 }
1749
1750 /* fills in linfo with link data and optionally ainfo with address info
1751 * caller can walk lists as desired and must call free_nlmsg_chain for
1752 * both when done
1753 */
1754 int ip_linkaddr_list(int family, req_filter_fn_t filter_fn,
1755 struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1756 {
1757 if (rtnl_wilddump_req_filter_fn(&rth, preferred_family, RTM_GETLINK,
1758 filter_fn) < 0) {
1759 perror("Cannot send dump request");
1760 return 1;
1761 }
1762
1763 if (rtnl_dump_filter(&rth, store_nlmsg, linfo) < 0) {
1764 fprintf(stderr, "Dump terminated\n");
1765 return 1;
1766 }
1767
1768 if (ainfo) {
1769 if (rtnl_wilddump_request(&rth, family, RTM_GETADDR) < 0) {
1770 perror("Cannot send dump request");
1771 return 1;
1772 }
1773
1774 if (rtnl_dump_filter(&rth, store_nlmsg, ainfo) < 0) {
1775 fprintf(stderr, "Dump terminated\n");
1776 return 1;
1777 }
1778 }
1779
1780 return 0;
1781 }
1782
1783 static int ipaddr_list_flush_or_save(int argc, char **argv, int action)
1784 {
1785 struct nlmsg_chain linfo = { NULL, NULL};
1786 struct nlmsg_chain _ainfo = { NULL, NULL}, *ainfo = NULL;
1787 struct nlmsg_list *l;
1788 char *filter_dev = NULL;
1789 int no_link = 0;
1790
1791 ipaddr_reset_filter(oneline, 0);
1792 filter.showqueue = 1;
1793 filter.family = preferred_family;
1794 filter.group = -1;
1795
1796 if (action == IPADD_FLUSH) {
1797 if (argc <= 0) {
1798 fprintf(stderr, "Flush requires arguments.\n");
1799
1800 return -1;
1801 }
1802 if (filter.family == AF_PACKET) {
1803 fprintf(stderr, "Cannot flush link addresses.\n");
1804 return -1;
1805 }
1806 }
1807
1808 while (argc > 0) {
1809 if (strcmp(*argv, "to") == 0) {
1810 NEXT_ARG();
1811 if (get_prefix(&filter.pfx, *argv, filter.family))
1812 invarg("invalid \"to\"\n", *argv);
1813 if (filter.family == AF_UNSPEC)
1814 filter.family = filter.pfx.family;
1815 } else if (strcmp(*argv, "scope") == 0) {
1816 unsigned int scope = 0;
1817
1818 NEXT_ARG();
1819 filter.scopemask = -1;
1820 if (rtnl_rtscope_a2n(&scope, *argv)) {
1821 if (strcmp(*argv, "all") != 0)
1822 invarg("invalid \"scope\"\n", *argv);
1823 scope = RT_SCOPE_NOWHERE;
1824 filter.scopemask = 0;
1825 }
1826 filter.scope = scope;
1827 } else if (strcmp(*argv, "up") == 0) {
1828 filter.up = 1;
1829 } else if (get_filter(*argv) == 0) {
1830
1831 } else if (strcmp(*argv, "label") == 0) {
1832 NEXT_ARG();
1833 filter.label = *argv;
1834 } else if (strcmp(*argv, "group") == 0) {
1835 NEXT_ARG();
1836 if (rtnl_group_a2n(&filter.group, *argv))
1837 invarg("Invalid \"group\" value\n", *argv);
1838 } else if (strcmp(*argv, "master") == 0) {
1839 int ifindex;
1840
1841 NEXT_ARG();
1842 ifindex = ll_name_to_index(*argv);
1843 if (!ifindex)
1844 invarg("Device does not exist\n", *argv);
1845 filter.master = ifindex;
1846 } else if (strcmp(*argv, "vrf") == 0) {
1847 int ifindex;
1848
1849 NEXT_ARG();
1850 ifindex = ll_name_to_index(*argv);
1851 if (!ifindex)
1852 invarg("Not a valid VRF name\n", *argv);
1853 if (!name_is_vrf(*argv))
1854 invarg("Not a valid VRF name\n", *argv);
1855 filter.master = ifindex;
1856 } else if (strcmp(*argv, "type") == 0) {
1857 int soff;
1858
1859 NEXT_ARG();
1860 soff = strlen(*argv) - strlen("_slave");
1861 if (!strcmp(*argv + soff, "_slave")) {
1862 (*argv)[soff] = '\0';
1863 filter.slave_kind = *argv;
1864 } else {
1865 filter.kind = *argv;
1866 }
1867 } else {
1868 if (strcmp(*argv, "dev") == 0)
1869 NEXT_ARG();
1870 else if (matches(*argv, "help") == 0)
1871 usage();
1872 if (filter_dev)
1873 duparg2("dev", *argv);
1874 filter_dev = *argv;
1875 }
1876 argv++; argc--;
1877 }
1878
1879 if (filter_dev) {
1880 filter.ifindex = ll_name_to_index(filter_dev);
1881 if (filter.ifindex <= 0) {
1882 fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev);
1883 return -1;
1884 }
1885 }
1886
1887 if (action == IPADD_FLUSH)
1888 return ipaddr_flush();
1889
1890 if (action == IPADD_SAVE) {
1891 if (ipadd_save_prep())
1892 exit(1);
1893
1894 if (rtnl_wilddump_request(&rth, preferred_family, RTM_GETADDR) < 0) {
1895 perror("Cannot send dump request");
1896 exit(1);
1897 }
1898
1899 if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) {
1900 fprintf(stderr, "Save terminated\n");
1901 exit(1);
1902 }
1903
1904 exit(0);
1905 }
1906
1907 /*
1908 * Initialize a json_writer and open an array object
1909 * if -json was specified.
1910 */
1911 new_json_obj(json);
1912
1913 /*
1914 * If only filter_dev present and none of the other
1915 * link filters are present, use RTM_GETLINK to get
1916 * the link device
1917 */
1918 if (filter_dev && filter.group == -1 && do_link == 1) {
1919 if (iplink_get(0, filter_dev, RTEXT_FILTER_VF) < 0) {
1920 perror("Cannot send link get request");
1921 delete_json_obj();
1922 exit(1);
1923 }
1924 delete_json_obj();
1925 exit(0);
1926 }
1927
1928 if (filter.family != AF_PACKET) {
1929 ainfo = &_ainfo;
1930
1931 if (filter.oneline)
1932 no_link = 1;
1933 }
1934
1935 if (ip_linkaddr_list(filter.family, iplink_filter_req,
1936 &linfo, ainfo) != 0)
1937 goto out;
1938
1939 if (filter.family != AF_PACKET)
1940 ipaddr_filter(&linfo, ainfo);
1941
1942 for (l = linfo.head; l; l = l->next) {
1943 struct nlmsghdr *n = &l->h;
1944 struct ifinfomsg *ifi = NLMSG_DATA(n);
1945 int res = 0;
1946
1947 open_json_object(NULL);
1948 if (brief || !no_link)
1949 res = print_linkinfo(NULL, n, stdout);
1950 if (res >= 0 && filter.family != AF_PACKET)
1951 print_selected_addrinfo(ifi, ainfo->head, stdout);
1952 if (res > 0 && !do_link && show_stats)
1953 print_link_stats(stdout, n);
1954 close_json_object();
1955 }
1956 fflush(stdout);
1957
1958 out:
1959 if (ainfo)
1960 free_nlmsg_chain(ainfo);
1961 free_nlmsg_chain(&linfo);
1962 delete_json_obj();
1963 return 0;
1964 }
1965
1966 static void
1967 ipaddr_loop_each_vf(struct rtattr *tb[], int vfnum, int *min, int *max)
1968 {
1969 struct rtattr *vflist = tb[IFLA_VFINFO_LIST];
1970 struct rtattr *i, *vf[IFLA_VF_MAX+1];
1971 struct ifla_vf_rate *vf_rate;
1972 int rem;
1973
1974 rem = RTA_PAYLOAD(vflist);
1975
1976 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
1977 parse_rtattr_nested(vf, IFLA_VF_MAX, i);
1978
1979 if (!vf[IFLA_VF_RATE]) {
1980 fprintf(stderr, "VF min/max rate API not supported\n");
1981 exit(1);
1982 }
1983
1984 vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
1985 if (vf_rate->vf == vfnum) {
1986 *min = vf_rate->min_tx_rate;
1987 *max = vf_rate->max_tx_rate;
1988 return;
1989 }
1990 }
1991 fprintf(stderr, "Cannot find VF %d\n", vfnum);
1992 exit(1);
1993 }
1994
1995 void ipaddr_get_vf_rate(int vfnum, int *min, int *max, const char *dev)
1996 {
1997 struct nlmsg_chain linfo = { NULL, NULL};
1998 struct rtattr *tb[IFLA_MAX+1];
1999 struct ifinfomsg *ifi;
2000 struct nlmsg_list *l;
2001 struct nlmsghdr *n;
2002 int idx, len;
2003
2004 idx = ll_name_to_index(dev);
2005 if (idx == 0) {
2006 fprintf(stderr, "Device %s does not exist\n", dev);
2007 exit(1);
2008 }
2009
2010 if (rtnl_wilddump_request(&rth, AF_UNSPEC, RTM_GETLINK) < 0) {
2011 perror("Cannot send dump request");
2012 exit(1);
2013 }
2014 if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) {
2015 fprintf(stderr, "Dump terminated\n");
2016 exit(1);
2017 }
2018 for (l = linfo.head; l; l = l->next) {
2019 n = &l->h;
2020 ifi = NLMSG_DATA(n);
2021
2022 len = n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi));
2023 if (len < 0 || (idx && idx != ifi->ifi_index))
2024 continue;
2025
2026 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
2027
2028 if ((tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF])) {
2029 ipaddr_loop_each_vf(tb, vfnum, min, max);
2030 return;
2031 }
2032 }
2033 }
2034
2035 int ipaddr_list_link(int argc, char **argv)
2036 {
2037 preferred_family = AF_PACKET;
2038 do_link = 1;
2039 return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST);
2040 }
2041
2042 void ipaddr_reset_filter(int oneline, int ifindex)
2043 {
2044 memset(&filter, 0, sizeof(filter));
2045 filter.oneline = oneline;
2046 filter.ifindex = ifindex;
2047 }
2048
2049 static int default_scope(inet_prefix *lcl)
2050 {
2051 if (lcl->family == AF_INET) {
2052 if (lcl->bytelen >= 1 && *(__u8 *)&lcl->data == 127)
2053 return RT_SCOPE_HOST;
2054 }
2055 return 0;
2056 }
2057
2058 static bool ipaddr_is_multicast(inet_prefix *a)
2059 {
2060 if (a->family == AF_INET)
2061 return IN_MULTICAST(ntohl(a->data[0]));
2062 else if (a->family == AF_INET6)
2063 return IN6_IS_ADDR_MULTICAST(a->data);
2064 else
2065 return false;
2066 }
2067
2068 static bool is_valid_label(const char *dev, const char *label)
2069 {
2070 size_t len = strlen(dev);
2071
2072 if (strncmp(label, dev, len) != 0)
2073 return false;
2074
2075 return label[len] == '\0' || label[len] == ':';
2076 }
2077
2078 static int ipaddr_modify(int cmd, int flags, int argc, char **argv)
2079 {
2080 struct {
2081 struct nlmsghdr n;
2082 struct ifaddrmsg ifa;
2083 char buf[256];
2084 } req = {
2085 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)),
2086 .n.nlmsg_flags = NLM_F_REQUEST | flags,
2087 .n.nlmsg_type = cmd,
2088 .ifa.ifa_family = preferred_family,
2089 };
2090 char *d = NULL;
2091 char *l = NULL;
2092 char *lcl_arg = NULL;
2093 char *valid_lftp = NULL;
2094 char *preferred_lftp = NULL;
2095 inet_prefix lcl = {};
2096 inet_prefix peer;
2097 int local_len = 0;
2098 int peer_len = 0;
2099 int brd_len = 0;
2100 int any_len = 0;
2101 int scoped = 0;
2102 __u32 preferred_lft = INFINITY_LIFE_TIME;
2103 __u32 valid_lft = INFINITY_LIFE_TIME;
2104 unsigned int ifa_flags = 0;
2105
2106 while (argc > 0) {
2107 if (strcmp(*argv, "peer") == 0 ||
2108 strcmp(*argv, "remote") == 0) {
2109 NEXT_ARG();
2110
2111 if (peer_len)
2112 duparg("peer", *argv);
2113 get_prefix(&peer, *argv, req.ifa.ifa_family);
2114 peer_len = peer.bytelen;
2115 if (req.ifa.ifa_family == AF_UNSPEC)
2116 req.ifa.ifa_family = peer.family;
2117 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen);
2118 req.ifa.ifa_prefixlen = peer.bitlen;
2119 } else if (matches(*argv, "broadcast") == 0 ||
2120 strcmp(*argv, "brd") == 0) {
2121 inet_prefix addr;
2122
2123 NEXT_ARG();
2124 if (brd_len)
2125 duparg("broadcast", *argv);
2126 if (strcmp(*argv, "+") == 0)
2127 brd_len = -1;
2128 else if (strcmp(*argv, "-") == 0)
2129 brd_len = -2;
2130 else {
2131 get_addr(&addr, *argv, req.ifa.ifa_family);
2132 if (req.ifa.ifa_family == AF_UNSPEC)
2133 req.ifa.ifa_family = addr.family;
2134 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen);
2135 brd_len = addr.bytelen;
2136 }
2137 } else if (strcmp(*argv, "anycast") == 0) {
2138 inet_prefix addr;
2139
2140 NEXT_ARG();
2141 if (any_len)
2142 duparg("anycast", *argv);
2143 get_addr(&addr, *argv, req.ifa.ifa_family);
2144 if (req.ifa.ifa_family == AF_UNSPEC)
2145 req.ifa.ifa_family = addr.family;
2146 addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen);
2147 any_len = addr.bytelen;
2148 } else if (strcmp(*argv, "scope") == 0) {
2149 unsigned int scope = 0;
2150
2151 NEXT_ARG();
2152 if (rtnl_rtscope_a2n(&scope, *argv))
2153 invarg("invalid scope value.", *argv);
2154 req.ifa.ifa_scope = scope;
2155 scoped = 1;
2156 } else if (strcmp(*argv, "dev") == 0) {
2157 NEXT_ARG();
2158 d = *argv;
2159 } else if (strcmp(*argv, "label") == 0) {
2160 NEXT_ARG();
2161 l = *argv;
2162 addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1);
2163 } else if (matches(*argv, "metric") == 0 ||
2164 matches(*argv, "priority") == 0 ||
2165 matches(*argv, "preference") == 0) {
2166 __u32 metric;
2167
2168 NEXT_ARG();
2169 if (get_u32(&metric, *argv, 0))
2170 invarg("\"metric\" value is invalid\n", *argv);
2171 addattr32(&req.n, sizeof(req), IFA_RT_PRIORITY, metric);
2172 } else if (matches(*argv, "valid_lft") == 0) {
2173 if (valid_lftp)
2174 duparg("valid_lft", *argv);
2175 NEXT_ARG();
2176 valid_lftp = *argv;
2177 if (set_lifetime(&valid_lft, *argv))
2178 invarg("valid_lft value", *argv);
2179 } else if (matches(*argv, "preferred_lft") == 0) {
2180 if (preferred_lftp)
2181 duparg("preferred_lft", *argv);
2182 NEXT_ARG();
2183 preferred_lftp = *argv;
2184 if (set_lifetime(&preferred_lft, *argv))
2185 invarg("preferred_lft value", *argv);
2186 } else if (strcmp(*argv, "home") == 0) {
2187 ifa_flags |= IFA_F_HOMEADDRESS;
2188 } else if (strcmp(*argv, "nodad") == 0) {
2189 ifa_flags |= IFA_F_NODAD;
2190 } else if (strcmp(*argv, "mngtmpaddr") == 0) {
2191 ifa_flags |= IFA_F_MANAGETEMPADDR;
2192 } else if (strcmp(*argv, "noprefixroute") == 0) {
2193 ifa_flags |= IFA_F_NOPREFIXROUTE;
2194 } else if (strcmp(*argv, "autojoin") == 0) {
2195 ifa_flags |= IFA_F_MCAUTOJOIN;
2196 } else {
2197 if (strcmp(*argv, "local") == 0)
2198 NEXT_ARG();
2199 if (matches(*argv, "help") == 0)
2200 usage();
2201 if (local_len)
2202 duparg2("local", *argv);
2203 lcl_arg = *argv;
2204 get_prefix(&lcl, *argv, req.ifa.ifa_family);
2205 if (req.ifa.ifa_family == AF_UNSPEC)
2206 req.ifa.ifa_family = lcl.family;
2207 addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen);
2208 local_len = lcl.bytelen;
2209 }
2210 argc--; argv++;
2211 }
2212 if (ifa_flags <= 0xff)
2213 req.ifa.ifa_flags = ifa_flags;
2214 else
2215 addattr32(&req.n, sizeof(req), IFA_FLAGS, ifa_flags);
2216
2217 if (d == NULL) {
2218 fprintf(stderr, "Not enough information: \"dev\" argument is required.\n");
2219 return -1;
2220 }
2221 if (l && !is_valid_label(d, l)) {
2222 fprintf(stderr,
2223 "\"label\" (%s) must match \"dev\" (%s) or be prefixed by \"dev\" with a colon.\n",
2224 l, d);
2225 return -1;
2226 }
2227
2228 if (peer_len == 0 && local_len) {
2229 if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) {
2230 fprintf(stderr,
2231 "Warning: Executing wildcard deletion to stay compatible with old scripts.\n"
2232 " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n"
2233 " This special behaviour is likely to disappear in further releases,\n"
2234 " fix your scripts!\n", lcl_arg, local_len*8);
2235 } else {
2236 peer = lcl;
2237 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen);
2238 }
2239 }
2240 if (req.ifa.ifa_prefixlen == 0)
2241 req.ifa.ifa_prefixlen = lcl.bitlen;
2242
2243 if (brd_len < 0 && cmd != RTM_DELADDR) {
2244 inet_prefix brd;
2245 int i;
2246
2247 if (req.ifa.ifa_family != AF_INET) {
2248 fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n");
2249 return -1;
2250 }
2251 brd = peer;
2252 if (brd.bitlen <= 30) {
2253 for (i = 31; i >= brd.bitlen; i--) {
2254 if (brd_len == -1)
2255 brd.data[0] |= htonl(1<<(31-i));
2256 else
2257 brd.data[0] &= ~htonl(1<<(31-i));
2258 }
2259 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen);
2260 brd_len = brd.bytelen;
2261 }
2262 }
2263 if (!scoped && cmd != RTM_DELADDR)
2264 req.ifa.ifa_scope = default_scope(&lcl);
2265
2266 req.ifa.ifa_index = ll_name_to_index(d);
2267 if (!req.ifa.ifa_index)
2268 return nodev(d);
2269
2270 if (valid_lftp || preferred_lftp) {
2271 struct ifa_cacheinfo cinfo = {};
2272
2273 if (!valid_lft) {
2274 fprintf(stderr, "valid_lft is zero\n");
2275 return -1;
2276 }
2277 if (valid_lft < preferred_lft) {
2278 fprintf(stderr, "preferred_lft is greater than valid_lft\n");
2279 return -1;
2280 }
2281
2282 cinfo.ifa_prefered = preferred_lft;
2283 cinfo.ifa_valid = valid_lft;
2284 addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo,
2285 sizeof(cinfo));
2286 }
2287
2288 if ((ifa_flags & IFA_F_MCAUTOJOIN) && !ipaddr_is_multicast(&lcl)) {
2289 fprintf(stderr, "autojoin needs multicast address\n");
2290 return -1;
2291 }
2292
2293 if (rtnl_talk(&rth, &req.n, NULL) < 0)
2294 return -2;
2295
2296 return 0;
2297 }
2298
2299 int do_ipaddr(int argc, char **argv)
2300 {
2301 if (argc < 1)
2302 return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST);
2303 if (matches(*argv, "add") == 0)
2304 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
2305 if (matches(*argv, "change") == 0 ||
2306 strcmp(*argv, "chg") == 0)
2307 return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1);
2308 if (matches(*argv, "replace") == 0)
2309 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
2310 if (matches(*argv, "delete") == 0)
2311 return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1);
2312 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
2313 || matches(*argv, "lst") == 0)
2314 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST);
2315 if (matches(*argv, "flush") == 0)
2316 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH);
2317 if (matches(*argv, "save") == 0)
2318 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE);
2319 if (matches(*argv, "showdump") == 0)
2320 return ipaddr_showdump();
2321 if (matches(*argv, "restore") == 0)
2322 return ipaddr_restore();
2323 if (matches(*argv, "help") == 0)
2324 usage();
2325 fprintf(stderr, "Command \"%s\" is unknown, try \"ip address help\".\n", *argv);
2326 exit(-1);
2327 }