]> git.proxmox.com Git - mirror_iproute2.git/blob - ip/ipaddress.c
ipaddress: minor white space cleanup
[mirror_iproute2.git] / ip / ipaddress.c
1 /*
2 * ipaddress.c "ip address".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 */
12
13 #include <stdio.h>
14 #include <stdlib.h>
15 #include <unistd.h>
16 #include <syslog.h>
17 #include <inttypes.h>
18 #include <fcntl.h>
19 #include <sys/ioctl.h>
20 #include <sys/socket.h>
21 #include <sys/ioctl.h>
22 #include <errno.h>
23 #include <netinet/in.h>
24 #include <arpa/inet.h>
25 #include <string.h>
26 #include <fnmatch.h>
27
28 #include <linux/netdevice.h>
29 #include <linux/if_arp.h>
30 #include <linux/sockios.h>
31
32 #include "rt_names.h"
33 #include "utils.h"
34 #include "ll_map.h"
35 #include "ip_common.h"
36
37 enum {
38 IPADD_LIST,
39 IPADD_FLUSH,
40 IPADD_SAVE,
41 };
42
43 static struct
44 {
45 int ifindex;
46 int family;
47 int oneline;
48 int showqueue;
49 inet_prefix pfx;
50 int scope, scopemask;
51 int flags, flagmask;
52 int up;
53 char *label;
54 int flushed;
55 char *flushb;
56 int flushp;
57 int flushe;
58 int group;
59 } filter;
60
61 static int do_link;
62
63 static void usage(void) __attribute__((noreturn));
64
65 static void usage(void)
66 {
67 if (do_link) {
68 iplink_usage();
69 }
70 fprintf(stderr, "Usage: ip addr {add|change|replace} IFADDR dev STRING [ LIFETIME ]\n");
71 fprintf(stderr, " [ CONFFLAG-LIST ]\n");
72 fprintf(stderr, " ip addr del IFADDR dev STRING\n");
73 fprintf(stderr, " ip addr {show|save|flush} [ dev STRING ] [ scope SCOPE-ID ]\n");
74 fprintf(stderr, " [ to PREFIX ] [ FLAG-LIST ] [ label PATTERN ] [up]\n");
75 fprintf(stderr, " ip addr {showdump|restore}\n");
76 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
77 fprintf(stderr, " [ broadcast ADDR ] [ anycast ADDR ]\n");
78 fprintf(stderr, " [ label STRING ] [ scope SCOPE-ID ]\n");
79 fprintf(stderr, "SCOPE-ID := [ host | link | global | NUMBER ]\n");
80 fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] FLAG\n");
81 fprintf(stderr, "FLAG := [ permanent | dynamic | secondary | primary |\n");
82 fprintf(stderr, " tentative | deprecated | dadfailed | temporary |\n");
83 fprintf(stderr, " CONFFLAG-LIST ]\n");
84 fprintf(stderr, "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n");
85 fprintf(stderr, "CONFFLAG := [ home | nodad ]\n");
86 fprintf(stderr, "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n");
87 fprintf(stderr, "LFT := forever | SECONDS\n");
88
89 exit(-1);
90 }
91
92 static void print_link_flags(FILE *fp, unsigned flags, unsigned mdown)
93 {
94 fprintf(fp, "<");
95 if (flags & IFF_UP && !(flags & IFF_RUNNING))
96 fprintf(fp, "NO-CARRIER%s", flags ? "," : "");
97 flags &= ~IFF_RUNNING;
98 #define _PF(f) if (flags&IFF_##f) { \
99 flags &= ~IFF_##f ; \
100 fprintf(fp, #f "%s", flags ? "," : ""); }
101 _PF(LOOPBACK);
102 _PF(BROADCAST);
103 _PF(POINTOPOINT);
104 _PF(MULTICAST);
105 _PF(NOARP);
106 _PF(ALLMULTI);
107 _PF(PROMISC);
108 _PF(MASTER);
109 _PF(SLAVE);
110 _PF(DEBUG);
111 _PF(DYNAMIC);
112 _PF(AUTOMEDIA);
113 _PF(PORTSEL);
114 _PF(NOTRAILERS);
115 _PF(UP);
116 _PF(LOWER_UP);
117 _PF(DORMANT);
118 _PF(ECHO);
119 #undef _PF
120 if (flags)
121 fprintf(fp, "%x", flags);
122 if (mdown)
123 fprintf(fp, ",M-DOWN");
124 fprintf(fp, "> ");
125 }
126
127 static const char *oper_states[] = {
128 "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN",
129 "TESTING", "DORMANT", "UP"
130 };
131
132 static void print_operstate(FILE *f, __u8 state)
133 {
134 if (state >= sizeof(oper_states)/sizeof(oper_states[0]))
135 fprintf(f, "state %#x ", state);
136 else
137 fprintf(f, "state %s ", oper_states[state]);
138 }
139
140 int get_operstate(const char *name)
141 {
142 int i;
143
144 for (i = 0; i < sizeof(oper_states)/sizeof(oper_states[0]); i++)
145 if (strcasecmp(name, oper_states[i]) == 0)
146 return i;
147 return -1;
148 }
149
150 static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1])
151 {
152 int qlen;
153
154 if (tb[IFLA_TXQLEN])
155 qlen = *(int *)RTA_DATA(tb[IFLA_TXQLEN]);
156 else {
157 struct ifreq ifr;
158 int s = socket(AF_INET, SOCK_STREAM, 0);
159
160 if (s < 0)
161 return;
162
163 memset(&ifr, 0, sizeof(ifr));
164 strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME]));
165 if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) {
166 fprintf(f, "ioctl(SIOCGIFTXQLEN) failed: %s\n", strerror(errno));
167 close(s);
168 return;
169 }
170 close(s);
171 qlen = ifr.ifr_qlen;
172 }
173 if (qlen)
174 fprintf(f, "qlen %d", qlen);
175 }
176
177 static const char *link_modes[] = {
178 "DEFAULT", "DORMANT"
179 };
180
181 static void print_linkmode(FILE *f, struct rtattr *tb)
182 {
183 unsigned int mode = rta_getattr_u8(tb);
184
185 if (mode >= sizeof(link_modes) / sizeof(link_modes[0]))
186 fprintf(f, "mode %d ", mode);
187 else
188 fprintf(f, "mode %s ", link_modes[mode]);
189 }
190
191 static void print_linktype(FILE *fp, struct rtattr *tb)
192 {
193 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
194 struct link_util *lu;
195 char *kind;
196
197 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
198
199 if (!linkinfo[IFLA_INFO_KIND])
200 return;
201 kind = RTA_DATA(linkinfo[IFLA_INFO_KIND]);
202
203 fprintf(fp, "%s", _SL_);
204 fprintf(fp, " %s ", kind);
205
206 lu = get_link_kind(kind);
207 if (!lu || !lu->print_opt)
208 return;
209
210 if (1) {
211 struct rtattr *attr[lu->maxattr+1], **data = NULL;
212
213 if (linkinfo[IFLA_INFO_DATA]) {
214 parse_rtattr_nested(attr, lu->maxattr,
215 linkinfo[IFLA_INFO_DATA]);
216 data = attr;
217 }
218 lu->print_opt(lu, fp, data);
219
220 if (linkinfo[IFLA_INFO_XSTATS] && show_stats &&
221 lu->print_xstats)
222 lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]);
223 }
224 }
225
226 static void print_vfinfo(FILE *fp, struct rtattr *vfinfo)
227 {
228 struct ifla_vf_mac *vf_mac;
229 struct ifla_vf_vlan *vf_vlan;
230 struct ifla_vf_tx_rate *vf_tx_rate;
231 struct ifla_vf_spoofchk *vf_spoofchk;
232 struct rtattr *vf[IFLA_VF_MAX+1];
233 struct rtattr *tmp;
234 SPRINT_BUF(b1);
235
236 if (vfinfo->rta_type != IFLA_VF_INFO) {
237 fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type);
238 return;
239 }
240
241 parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo);
242
243 vf_mac = RTA_DATA(vf[IFLA_VF_MAC]);
244 vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]);
245 vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]);
246
247 /* Check if the spoof checking vf info type is supported by
248 * this kernel.
249 */
250 tmp = (struct rtattr *)((char *)vf[IFLA_VF_TX_RATE] +
251 vf[IFLA_VF_TX_RATE]->rta_len);
252
253 if (tmp->rta_type != IFLA_VF_SPOOFCHK)
254 vf_spoofchk = NULL;
255 else
256 vf_spoofchk = RTA_DATA(vf[IFLA_VF_SPOOFCHK]);
257
258 fprintf(fp, "\n vf %d MAC %s", vf_mac->vf,
259 ll_addr_n2a((unsigned char *)&vf_mac->mac,
260 ETH_ALEN, 0, b1, sizeof(b1)));
261 if (vf_vlan->vlan)
262 fprintf(fp, ", vlan %d", vf_vlan->vlan);
263 if (vf_vlan->qos)
264 fprintf(fp, ", qos %d", vf_vlan->qos);
265 if (vf_tx_rate->rate)
266 fprintf(fp, ", tx rate %d (Mbps)", vf_tx_rate->rate);
267 if (vf_spoofchk && vf_spoofchk->setting != -1) {
268 if (vf_spoofchk->setting)
269 fprintf(fp, ", spoof checking on");
270 else
271 fprintf(fp, ", spoof checking off");
272 }
273 }
274
275 static void print_link_stats64(FILE *fp, const struct rtnl_link_stats64 *s) {
276 fprintf(fp, "%s", _SL_);
277 fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s",
278 s->rx_compressed ? "compressed" : "", _SL_);
279 fprintf(fp, " %-10"PRIu64" %-8"PRIu64" %-7"PRIu64" %-7"PRIu64" %-7"PRIu64" %-7"PRIu64"",
280 (uint64_t)s->rx_bytes,
281 (uint64_t)s->rx_packets,
282 (uint64_t)s->rx_errors,
283 (uint64_t)s->rx_dropped,
284 (uint64_t)s->rx_over_errors,
285 (uint64_t)s->multicast);
286 if (s->rx_compressed)
287 fprintf(fp, " %-7"PRIu64"",
288 (uint64_t)s->rx_compressed);
289 if (show_stats > 1) {
290 fprintf(fp, "%s", _SL_);
291 fprintf(fp, " RX errors: length crc frame fifo missed%s", _SL_);
292 fprintf(fp, " %-7"PRIu64" %-7"PRIu64" %-7"PRIu64" %-7"PRIu64" %-7"PRIu64"",
293 (uint64_t)s->rx_length_errors,
294 (uint64_t)s->rx_crc_errors,
295 (uint64_t)s->rx_frame_errors,
296 (uint64_t)s->rx_fifo_errors,
297 (uint64_t)s->rx_missed_errors);
298 }
299 fprintf(fp, "%s", _SL_);
300 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
301 (uint64_t)s->tx_compressed ? "compressed" : "", _SL_);
302 fprintf(fp, " %-10"PRIu64" %-8"PRIu64" %-7"PRIu64" %-7"PRIu64" %-7"PRIu64" %-7"PRIu64"",
303 (uint64_t)s->tx_bytes,
304 (uint64_t)s->tx_packets,
305 (uint64_t)s->tx_errors,
306 (uint64_t)s->tx_dropped,
307 (uint64_t)s->tx_carrier_errors,
308 (uint64_t)s->collisions);
309 if (s->tx_compressed)
310 fprintf(fp, " %-7"PRIu64"",
311 (uint64_t)s->tx_compressed);
312 if (show_stats > 1) {
313 fprintf(fp, "%s", _SL_);
314 fprintf(fp, " TX errors: aborted fifo window heartbeat%s", _SL_);
315 fprintf(fp, " %-7"PRIu64" %-7"PRIu64" %-7"PRIu64" %-7"PRIu64"",
316 (uint64_t)s->tx_aborted_errors,
317 (uint64_t)s->tx_fifo_errors,
318 (uint64_t)s->tx_window_errors,
319 (uint64_t)s->tx_heartbeat_errors);
320 }
321 }
322
323 static void print_link_stats(FILE *fp, const struct rtnl_link_stats *s)
324 {
325 fprintf(fp, "%s", _SL_);
326 fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s",
327 s->rx_compressed ? "compressed" : "", _SL_);
328 fprintf(fp, " %-10u %-8u %-7u %-7u %-7u %-7u",
329 s->rx_bytes, s->rx_packets, s->rx_errors,
330 s->rx_dropped, s->rx_over_errors,
331 s->multicast
332 );
333 if (s->rx_compressed)
334 fprintf(fp, " %-7u", s->rx_compressed);
335 if (show_stats > 1) {
336 fprintf(fp, "%s", _SL_);
337 fprintf(fp, " RX errors: length crc frame fifo missed%s", _SL_);
338 fprintf(fp, " %-7u %-7u %-7u %-7u %-7u",
339 s->rx_length_errors,
340 s->rx_crc_errors,
341 s->rx_frame_errors,
342 s->rx_fifo_errors,
343 s->rx_missed_errors
344 );
345 }
346 fprintf(fp, "%s", _SL_);
347 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
348 s->tx_compressed ? "compressed" : "", _SL_);
349 fprintf(fp, " %-10u %-8u %-7u %-7u %-7u %-7u",
350 s->tx_bytes, s->tx_packets, s->tx_errors,
351 s->tx_dropped, s->tx_carrier_errors, s->collisions);
352 if (s->tx_compressed)
353 fprintf(fp, " %-7u", s->tx_compressed);
354 if (show_stats > 1) {
355 fprintf(fp, "%s", _SL_);
356 fprintf(fp, " TX errors: aborted fifo window heartbeat%s", _SL_);
357 fprintf(fp, " %-7u %-7u %-7u %-7u",
358 s->tx_aborted_errors,
359 s->tx_fifo_errors,
360 s->tx_window_errors,
361 s->tx_heartbeat_errors
362 );
363 }
364 }
365
366 int print_linkinfo(const struct sockaddr_nl *who,
367 struct nlmsghdr *n, void *arg)
368 {
369 FILE *fp = (FILE*)arg;
370 struct ifinfomsg *ifi = NLMSG_DATA(n);
371 struct rtattr * tb[IFLA_MAX+1];
372 int len = n->nlmsg_len;
373 unsigned m_flag = 0;
374
375 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
376 return 0;
377
378 len -= NLMSG_LENGTH(sizeof(*ifi));
379 if (len < 0)
380 return -1;
381
382 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
383 return 0;
384 if (filter.up && !(ifi->ifi_flags&IFF_UP))
385 return 0;
386
387 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
388 if (tb[IFLA_IFNAME] == NULL) {
389 fprintf(stderr, "BUG: device with ifindex %d has nil ifname\n", ifi->ifi_index);
390 }
391 if (filter.label &&
392 (!filter.family || filter.family == AF_PACKET) &&
393 fnmatch(filter.label, RTA_DATA(tb[IFLA_IFNAME]), 0))
394 return 0;
395
396 if (tb[IFLA_GROUP]) {
397 int group = *(int*)RTA_DATA(tb[IFLA_GROUP]);
398 if (group != filter.group)
399 return -1;
400 }
401
402 if (n->nlmsg_type == RTM_DELLINK)
403 fprintf(fp, "Deleted ");
404
405 fprintf(fp, "%d: %s", ifi->ifi_index,
406 tb[IFLA_IFNAME] ? rta_getattr_str(tb[IFLA_IFNAME]) : "<nil>");
407
408 if (tb[IFLA_LINK]) {
409 SPRINT_BUF(b1);
410 int iflink = *(int*)RTA_DATA(tb[IFLA_LINK]);
411 if (iflink == 0)
412 fprintf(fp, "@NONE: ");
413 else {
414 fprintf(fp, "@%s: ", ll_idx_n2a(iflink, b1));
415 m_flag = ll_index_to_flags(iflink);
416 m_flag = !(m_flag & IFF_UP);
417 }
418 } else {
419 fprintf(fp, ": ");
420 }
421 print_link_flags(fp, ifi->ifi_flags, m_flag);
422
423 if (tb[IFLA_MTU])
424 fprintf(fp, "mtu %u ", *(int*)RTA_DATA(tb[IFLA_MTU]));
425 if (tb[IFLA_QDISC])
426 fprintf(fp, "qdisc %s ", rta_getattr_str(tb[IFLA_QDISC]));
427 if (tb[IFLA_MASTER]) {
428 SPRINT_BUF(b1);
429 fprintf(fp, "master %s ", ll_idx_n2a(*(int*)RTA_DATA(tb[IFLA_MASTER]), b1));
430 }
431
432 if (tb[IFLA_OPERSTATE])
433 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
434
435 if (do_link && tb[IFLA_LINKMODE])
436 print_linkmode(fp, tb[IFLA_LINKMODE]);
437
438 if (filter.showqueue)
439 print_queuelen(fp, tb);
440
441 if (!filter.family || filter.family == AF_PACKET) {
442 SPRINT_BUF(b1);
443 fprintf(fp, "%s", _SL_);
444 fprintf(fp, " link/%s ", ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
445
446 if (tb[IFLA_ADDRESS]) {
447 fprintf(fp, "%s", ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]),
448 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
449 ifi->ifi_type,
450 b1, sizeof(b1)));
451 }
452 if (tb[IFLA_BROADCAST]) {
453 if (ifi->ifi_flags&IFF_POINTOPOINT)
454 fprintf(fp, " peer ");
455 else
456 fprintf(fp, " brd ");
457 fprintf(fp, "%s", ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]),
458 RTA_PAYLOAD(tb[IFLA_BROADCAST]),
459 ifi->ifi_type,
460 b1, sizeof(b1)));
461 }
462 }
463
464 if (do_link && tb[IFLA_PROMISCUITY] && show_details)
465 fprintf(fp, " promiscuity %u ",
466 *(int*)RTA_DATA(tb[IFLA_PROMISCUITY]));
467
468 if (do_link && tb[IFLA_LINKINFO] && show_details)
469 print_linktype(fp, tb[IFLA_LINKINFO]);
470
471 if (do_link && tb[IFLA_IFALIAS]) {
472 fprintf(fp, "%s alias %s", _SL_,
473 rta_getattr_str(tb[IFLA_IFALIAS]));
474 }
475
476 if (do_link && show_stats) {
477 if (tb[IFLA_STATS64])
478 print_link_stats64(fp, RTA_DATA(tb[IFLA_STATS64]));
479 else if (tb[IFLA_STATS])
480 print_link_stats(fp, RTA_DATA(tb[IFLA_STATS]));
481 }
482
483 if (do_link && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) {
484 struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST];
485 int rem = RTA_PAYLOAD(vflist);
486 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem))
487 print_vfinfo(fp, i);
488 }
489
490 fprintf(fp, "\n");
491 fflush(fp);
492 return 0;
493 }
494
495 static int flush_update(void)
496 {
497 if (rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) {
498 perror("Failed to send flush request");
499 return -1;
500 }
501 filter.flushp = 0;
502 return 0;
503 }
504
505 static int set_lifetime(unsigned int *lifetime, char *argv)
506 {
507 if (strcmp(argv, "forever") == 0)
508 *lifetime = INFINITY_LIFE_TIME;
509 else if (get_u32(lifetime, argv, 0))
510 return -1;
511
512 return 0;
513 }
514
515 int print_addrinfo(const struct sockaddr_nl *who, struct nlmsghdr *n,
516 void *arg)
517 {
518 FILE *fp = (FILE*)arg;
519 struct ifaddrmsg *ifa = NLMSG_DATA(n);
520 int len = n->nlmsg_len;
521 int deprecated = 0;
522 /* Use local copy of ifa_flags to not interfere with filtering code */
523 unsigned int ifa_flags;
524 struct rtattr * rta_tb[IFA_MAX+1];
525 char abuf[256];
526 SPRINT_BUF(b1);
527
528 if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR)
529 return 0;
530 len -= NLMSG_LENGTH(sizeof(*ifa));
531 if (len < 0) {
532 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
533 return -1;
534 }
535
536 if (filter.flushb && n->nlmsg_type != RTM_NEWADDR)
537 return 0;
538
539 parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa), n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
540
541 if (!rta_tb[IFA_LOCAL])
542 rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
543 if (!rta_tb[IFA_ADDRESS])
544 rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
545
546 if (filter.ifindex && filter.ifindex != ifa->ifa_index)
547 return 0;
548 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
549 return 0;
550 if ((filter.flags^ifa->ifa_flags)&filter.flagmask)
551 return 0;
552 if (filter.label) {
553 SPRINT_BUF(b1);
554 const char *label;
555 if (rta_tb[IFA_LABEL])
556 label = RTA_DATA(rta_tb[IFA_LABEL]);
557 else
558 label = ll_idx_n2a(ifa->ifa_index, b1);
559 if (fnmatch(filter.label, label, 0) != 0)
560 return 0;
561 }
562 if (filter.pfx.family) {
563 if (rta_tb[IFA_LOCAL]) {
564 inet_prefix dst;
565 memset(&dst, 0, sizeof(dst));
566 dst.family = ifa->ifa_family;
567 memcpy(&dst.data, RTA_DATA(rta_tb[IFA_LOCAL]), RTA_PAYLOAD(rta_tb[IFA_LOCAL]));
568 if (inet_addr_match(&dst, &filter.pfx, filter.pfx.bitlen))
569 return 0;
570 }
571 }
572
573 if (filter.family && filter.family != ifa->ifa_family)
574 return 0;
575
576 if (filter.flushb) {
577 struct nlmsghdr *fn;
578 if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
579 if (flush_update())
580 return -1;
581 }
582 fn = (struct nlmsghdr*)(filter.flushb + NLMSG_ALIGN(filter.flushp));
583 memcpy(fn, n, n->nlmsg_len);
584 fn->nlmsg_type = RTM_DELADDR;
585 fn->nlmsg_flags = NLM_F_REQUEST;
586 fn->nlmsg_seq = ++rth.seq;
587 filter.flushp = (((char*)fn) + n->nlmsg_len) - filter.flushb;
588 filter.flushed++;
589 if (show_stats < 2)
590 return 0;
591 }
592
593 if (n->nlmsg_type == RTM_DELADDR)
594 fprintf(fp, "Deleted ");
595
596 if (filter.oneline || filter.flushb)
597 fprintf(fp, "%u: %s", ifa->ifa_index, ll_index_to_name(ifa->ifa_index));
598 if (ifa->ifa_family == AF_INET)
599 fprintf(fp, " inet ");
600 else if (ifa->ifa_family == AF_INET6)
601 fprintf(fp, " inet6 ");
602 else if (ifa->ifa_family == AF_DECnet)
603 fprintf(fp, " dnet ");
604 else if (ifa->ifa_family == AF_IPX)
605 fprintf(fp, " ipx ");
606 else
607 fprintf(fp, " family %d ", ifa->ifa_family);
608
609 if (rta_tb[IFA_LOCAL]) {
610 fprintf(fp, "%s", rt_addr_n2a(ifa->ifa_family,
611 RTA_PAYLOAD(rta_tb[IFA_LOCAL]),
612 RTA_DATA(rta_tb[IFA_LOCAL]),
613 abuf, sizeof(abuf)));
614
615 if (rta_tb[IFA_ADDRESS] == NULL ||
616 memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]), RTA_DATA(rta_tb[IFA_LOCAL]), 4) == 0) {
617 fprintf(fp, "/%d ", ifa->ifa_prefixlen);
618 } else {
619 fprintf(fp, " peer %s/%d ",
620 rt_addr_n2a(ifa->ifa_family,
621 RTA_PAYLOAD(rta_tb[IFA_ADDRESS]),
622 RTA_DATA(rta_tb[IFA_ADDRESS]),
623 abuf, sizeof(abuf)),
624 ifa->ifa_prefixlen);
625 }
626 }
627
628 if (rta_tb[IFA_BROADCAST]) {
629 fprintf(fp, "brd %s ",
630 rt_addr_n2a(ifa->ifa_family,
631 RTA_PAYLOAD(rta_tb[IFA_BROADCAST]),
632 RTA_DATA(rta_tb[IFA_BROADCAST]),
633 abuf, sizeof(abuf)));
634 }
635 if (rta_tb[IFA_ANYCAST]) {
636 fprintf(fp, "any %s ",
637 rt_addr_n2a(ifa->ifa_family,
638 RTA_PAYLOAD(rta_tb[IFA_ANYCAST]),
639 RTA_DATA(rta_tb[IFA_ANYCAST]),
640 abuf, sizeof(abuf)));
641 }
642 fprintf(fp, "scope %s ", rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1)));
643 ifa_flags = ifa->ifa_flags;
644 if (ifa->ifa_flags&IFA_F_SECONDARY) {
645 ifa_flags &= ~IFA_F_SECONDARY;
646 if (ifa->ifa_family == AF_INET6)
647 fprintf(fp, "temporary ");
648 else
649 fprintf(fp, "secondary ");
650 }
651 if (ifa->ifa_flags&IFA_F_TENTATIVE) {
652 ifa_flags &= ~IFA_F_TENTATIVE;
653 fprintf(fp, "tentative ");
654 }
655 if (ifa->ifa_flags&IFA_F_DEPRECATED) {
656 ifa_flags &= ~IFA_F_DEPRECATED;
657 deprecated = 1;
658 fprintf(fp, "deprecated ");
659 }
660 if (ifa->ifa_flags&IFA_F_HOMEADDRESS) {
661 ifa_flags &= ~IFA_F_HOMEADDRESS;
662 fprintf(fp, "home ");
663 }
664 if (ifa->ifa_flags&IFA_F_NODAD) {
665 ifa_flags &= ~IFA_F_NODAD;
666 fprintf(fp, "nodad ");
667 }
668 if (!(ifa->ifa_flags&IFA_F_PERMANENT)) {
669 fprintf(fp, "dynamic ");
670 } else
671 ifa_flags &= ~IFA_F_PERMANENT;
672 if (ifa->ifa_flags&IFA_F_DADFAILED) {
673 ifa_flags &= ~IFA_F_DADFAILED;
674 fprintf(fp, "dadfailed ");
675 }
676 if (ifa_flags)
677 fprintf(fp, "flags %02x ", ifa_flags);
678 if (rta_tb[IFA_LABEL])
679 fprintf(fp, "%s", rta_getattr_str(rta_tb[IFA_LABEL]));
680 if (rta_tb[IFA_CACHEINFO]) {
681 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
682 fprintf(fp, "%s", _SL_);
683 fprintf(fp, " valid_lft ");
684 if (ci->ifa_valid == INFINITY_LIFE_TIME)
685 fprintf(fp, "forever");
686 else
687 fprintf(fp, "%usec", ci->ifa_valid);
688 fprintf(fp, " preferred_lft ");
689 if (ci->ifa_prefered == INFINITY_LIFE_TIME)
690 fprintf(fp, "forever");
691 else {
692 if (deprecated)
693 fprintf(fp, "%dsec", ci->ifa_prefered);
694 else
695 fprintf(fp, "%usec", ci->ifa_prefered);
696 }
697 }
698 fprintf(fp, "\n");
699 fflush(fp);
700 return 0;
701 }
702
703 static int print_addrinfo_primary(const struct sockaddr_nl *who,
704 struct nlmsghdr *n, void *arg)
705 {
706 struct ifaddrmsg *ifa = NLMSG_DATA(n);
707
708 if (ifa->ifa_flags & IFA_F_SECONDARY)
709 return 0;
710
711 return print_addrinfo(who, n, arg);
712 }
713
714 static int print_addrinfo_secondary(const struct sockaddr_nl *who,
715 struct nlmsghdr *n, void *arg)
716 {
717 struct ifaddrmsg *ifa = NLMSG_DATA(n);
718
719 if (!(ifa->ifa_flags & IFA_F_SECONDARY))
720 return 0;
721
722 return print_addrinfo(who, n, arg);
723 }
724
725 struct nlmsg_list
726 {
727 struct nlmsg_list *next;
728 struct nlmsghdr h;
729 };
730
731 struct nlmsg_chain
732 {
733 struct nlmsg_list *head;
734 struct nlmsg_list *tail;
735 };
736
737 static int print_selected_addrinfo(int ifindex, struct nlmsg_list *ainfo, FILE *fp)
738 {
739 for ( ;ainfo ; ainfo = ainfo->next) {
740 struct nlmsghdr *n = &ainfo->h;
741 struct ifaddrmsg *ifa = NLMSG_DATA(n);
742
743 if (n->nlmsg_type != RTM_NEWADDR)
744 continue;
745
746 if (n->nlmsg_len < NLMSG_LENGTH(sizeof(ifa)))
747 return -1;
748
749 if (ifa->ifa_index != ifindex ||
750 (filter.family && filter.family != ifa->ifa_family))
751 continue;
752
753 print_addrinfo(NULL, n, fp);
754 }
755 return 0;
756 }
757
758
759 static int store_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n,
760 void *arg)
761 {
762 struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg;
763 struct nlmsg_list *h;
764
765 h = malloc(n->nlmsg_len+sizeof(void*));
766 if (h == NULL)
767 return -1;
768
769 memcpy(&h->h, n, n->nlmsg_len);
770 h->next = NULL;
771
772 if (lchain->tail)
773 lchain->tail->next = h;
774 else
775 lchain->head = h;
776 lchain->tail = h;
777
778 ll_remember_index(who, n, NULL);
779 return 0;
780 }
781
782 static __u32 ipadd_dump_magic = 0x47361222;
783
784 static int ipadd_save_prep(void)
785 {
786 int ret;
787
788 if (isatty(STDOUT_FILENO)) {
789 fprintf(stderr, "Not sending a binary stream to stdout\n");
790 return -1;
791 }
792
793 ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic));
794 if (ret != sizeof(ipadd_dump_magic)) {
795 fprintf(stderr, "Can't write magic to dump file\n");
796 return -1;
797 }
798
799 return 0;
800 }
801
802 static int ipadd_dump_check_magic(void)
803 {
804 int ret;
805 __u32 magic = 0;
806
807 if (isatty(STDIN_FILENO)) {
808 fprintf(stderr, "Can't restore addr dump from a terminal\n");
809 return -1;
810 }
811
812 ret = fread(&magic, sizeof(magic), 1, stdin);
813 if (magic != ipadd_dump_magic) {
814 fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
815 return -1;
816 }
817
818 return 0;
819 }
820
821 static int save_nlmsg(const struct sockaddr_nl *who, struct nlmsghdr *n,
822 void *arg)
823 {
824 int ret;
825
826 ret = write(STDOUT_FILENO, n, n->nlmsg_len);
827 if ((ret > 0) && (ret != n->nlmsg_len)) {
828 fprintf(stderr, "Short write while saving nlmsg\n");
829 ret = -EIO;
830 }
831
832 return ret == n->nlmsg_len ? 0 : ret;
833 }
834
835 static int show_handler(const struct sockaddr_nl *nl, struct nlmsghdr *n, void *arg)
836 {
837 struct ifaddrmsg *ifa = NLMSG_DATA(n);
838
839 printf("if%d:\n", ifa->ifa_index);
840 print_addrinfo(NULL, n, stdout);
841 return 0;
842 }
843
844 static int ipaddr_showdump(void)
845 {
846 if (ipadd_dump_check_magic())
847 exit(-1);
848
849 exit(rtnl_from_file(stdin, &show_handler, NULL));
850 }
851
852 static int restore_handler(const struct sockaddr_nl *nl, struct nlmsghdr *n, void *arg)
853 {
854 int ret;
855
856 n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
857
858 ll_init_map(&rth);
859
860 ret = rtnl_talk(&rth, n, 0, 0, n);
861 if ((ret < 0) && (errno == EEXIST))
862 ret = 0;
863
864 return ret;
865 }
866
867 static int ipaddr_restore(void)
868 {
869 if (ipadd_dump_check_magic())
870 exit(-1);
871
872 exit(rtnl_from_file(stdin, &restore_handler, NULL));
873 }
874
875 static void free_nlmsg_chain(struct nlmsg_chain *info)
876 {
877 struct nlmsg_list *l, *n;
878
879 for (l = info->head; l; l = n) {
880 n = l->next;
881 free(l);
882 }
883 }
884
885 static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
886 {
887 struct nlmsg_list *l, **lp;
888
889 lp = &linfo->head;
890 while ( (l = *lp) != NULL) {
891 int ok = 0;
892 int missing_net_address = 1;
893 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
894 struct nlmsg_list *a;
895
896 for (a = ainfo->head; a; a = a->next) {
897 struct nlmsghdr *n = &a->h;
898 struct ifaddrmsg *ifa = NLMSG_DATA(n);
899
900 if (ifa->ifa_index != ifi->ifi_index)
901 continue;
902 missing_net_address = 0;
903 if (filter.family && filter.family != ifa->ifa_family)
904 continue;
905 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
906 continue;
907 if ((filter.flags^ifa->ifa_flags)&filter.flagmask)
908 continue;
909 if (filter.pfx.family || filter.label) {
910 struct rtattr *tb[IFA_MAX+1];
911 parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n));
912 if (!tb[IFA_LOCAL])
913 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
914
915 if (filter.pfx.family && tb[IFA_LOCAL]) {
916 inet_prefix dst;
917 memset(&dst, 0, sizeof(dst));
918 dst.family = ifa->ifa_family;
919 memcpy(&dst.data, RTA_DATA(tb[IFA_LOCAL]), RTA_PAYLOAD(tb[IFA_LOCAL]));
920 if (inet_addr_match(&dst, &filter.pfx, filter.pfx.bitlen))
921 continue;
922 }
923 if (filter.label) {
924 SPRINT_BUF(b1);
925 const char *label;
926 if (tb[IFA_LABEL])
927 label = RTA_DATA(tb[IFA_LABEL]);
928 else
929 label = ll_idx_n2a(ifa->ifa_index, b1);
930 if (fnmatch(filter.label, label, 0) != 0)
931 continue;
932 }
933 }
934
935 ok = 1;
936 break;
937 }
938 if (missing_net_address &&
939 (filter.family == AF_UNSPEC || filter.family == AF_PACKET))
940 ok = 1;
941 if (!ok) {
942 *lp = l->next;
943 free(l);
944 } else
945 lp = &l->next;
946 }
947 }
948
949 static int ipaddr_flush(void)
950 {
951 int round = 0;
952 char flushb[4096-512];
953
954 filter.flushb = flushb;
955 filter.flushp = 0;
956 filter.flushe = sizeof(flushb);
957
958 while ((max_flush_loops == 0) || (round < max_flush_loops)) {
959 const struct rtnl_dump_filter_arg a[3] = {
960 {
961 .filter = print_addrinfo_secondary,
962 .arg1 = stdout,
963 },
964 {
965 .filter = print_addrinfo_primary,
966 .arg1 = stdout,
967 },
968 {
969 .filter = NULL,
970 .arg1 = NULL,
971 },
972 };
973 if (rtnl_wilddump_request(&rth, filter.family, RTM_GETADDR) < 0) {
974 perror("Cannot send dump request");
975 exit(1);
976 }
977 filter.flushed = 0;
978 if (rtnl_dump_filter_l(&rth, a) < 0) {
979 fprintf(stderr, "Flush terminated\n");
980 exit(1);
981 }
982 if (filter.flushed == 0) {
983 flush_done:
984 if (show_stats) {
985 if (round == 0)
986 printf("Nothing to flush.\n");
987 else
988 printf("*** Flush is complete after %d round%s ***\n", round, round>1?"s":"");
989 }
990 fflush(stdout);
991 return 0;
992 }
993 round++;
994 if (flush_update() < 0)
995 return 1;
996
997 if (show_stats) {
998 printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed);
999 fflush(stdout);
1000 }
1001
1002 /* If we are flushing, and specifying primary, then we
1003 * want to flush only a single round. Otherwise, we'll
1004 * start flushing secondaries that were promoted to
1005 * primaries.
1006 */
1007 if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY))
1008 goto flush_done;
1009 }
1010 fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops);
1011 fflush(stderr);
1012 return 1;
1013 }
1014
1015 static int ipaddr_list_flush_or_save(int argc, char **argv, int action)
1016 {
1017 struct nlmsg_chain linfo = { NULL, NULL};
1018 struct nlmsg_chain ainfo = { NULL, NULL};
1019 struct nlmsg_list *l;
1020 char *filter_dev = NULL;
1021 int no_link = 0;
1022
1023 ipaddr_reset_filter(oneline);
1024 filter.showqueue = 1;
1025
1026 if (filter.family == AF_UNSPEC)
1027 filter.family = preferred_family;
1028
1029 filter.group = INIT_NETDEV_GROUP;
1030
1031 if (action == IPADD_FLUSH) {
1032 if (argc <= 0) {
1033 fprintf(stderr, "Flush requires arguments.\n");
1034
1035 return -1;
1036 }
1037 if (filter.family == AF_PACKET) {
1038 fprintf(stderr, "Cannot flush link addresses.\n");
1039 return -1;
1040 }
1041 }
1042
1043 while (argc > 0) {
1044 if (strcmp(*argv, "to") == 0) {
1045 NEXT_ARG();
1046 get_prefix(&filter.pfx, *argv, filter.family);
1047 if (filter.family == AF_UNSPEC)
1048 filter.family = filter.pfx.family;
1049 } else if (strcmp(*argv, "scope") == 0) {
1050 unsigned scope = 0;
1051 NEXT_ARG();
1052 filter.scopemask = -1;
1053 if (rtnl_rtscope_a2n(&scope, *argv)) {
1054 if (strcmp(*argv, "all") != 0)
1055 invarg("invalid \"scope\"\n", *argv);
1056 scope = RT_SCOPE_NOWHERE;
1057 filter.scopemask = 0;
1058 }
1059 filter.scope = scope;
1060 } else if (strcmp(*argv, "up") == 0) {
1061 filter.up = 1;
1062 } else if (strcmp(*argv, "dynamic") == 0) {
1063 filter.flags &= ~IFA_F_PERMANENT;
1064 filter.flagmask |= IFA_F_PERMANENT;
1065 } else if (strcmp(*argv, "permanent") == 0) {
1066 filter.flags |= IFA_F_PERMANENT;
1067 filter.flagmask |= IFA_F_PERMANENT;
1068 } else if (strcmp(*argv, "secondary") == 0 ||
1069 strcmp(*argv, "temporary") == 0) {
1070 filter.flags |= IFA_F_SECONDARY;
1071 filter.flagmask |= IFA_F_SECONDARY;
1072 } else if (strcmp(*argv, "primary") == 0) {
1073 filter.flags &= ~IFA_F_SECONDARY;
1074 filter.flagmask |= IFA_F_SECONDARY;
1075 } else if (strcmp(*argv, "tentative") == 0) {
1076 filter.flags |= IFA_F_TENTATIVE;
1077 filter.flagmask |= IFA_F_TENTATIVE;
1078 } else if (strcmp(*argv, "deprecated") == 0) {
1079 filter.flags |= IFA_F_DEPRECATED;
1080 filter.flagmask |= IFA_F_DEPRECATED;
1081 } else if (strcmp(*argv, "home") == 0) {
1082 filter.flags |= IFA_F_HOMEADDRESS;
1083 filter.flagmask |= IFA_F_HOMEADDRESS;
1084 } else if (strcmp(*argv, "nodad") == 0) {
1085 filter.flags |= IFA_F_NODAD;
1086 filter.flagmask |= IFA_F_NODAD;
1087 } else if (strcmp(*argv, "dadfailed") == 0) {
1088 filter.flags |= IFA_F_DADFAILED;
1089 filter.flagmask |= IFA_F_DADFAILED;
1090 } else if (strcmp(*argv, "label") == 0) {
1091 NEXT_ARG();
1092 filter.label = *argv;
1093 } else if (strcmp(*argv, "group") == 0) {
1094 NEXT_ARG();
1095 if (rtnl_group_a2n(&filter.group, *argv))
1096 invarg("Invalid \"group\" value\n", *argv);
1097 } else {
1098 if (strcmp(*argv, "dev") == 0) {
1099 NEXT_ARG();
1100 }
1101 if (matches(*argv, "help") == 0)
1102 usage();
1103 if (filter_dev)
1104 duparg2("dev", *argv);
1105 filter_dev = *argv;
1106 }
1107 argv++; argc--;
1108 }
1109
1110 if (filter_dev) {
1111 filter.ifindex = ll_name_to_index(filter_dev);
1112 if (filter.ifindex <= 0) {
1113 fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev);
1114 return -1;
1115 }
1116 }
1117
1118 if (action == IPADD_FLUSH)
1119 return ipaddr_flush();
1120
1121 if (action == IPADD_SAVE) {
1122 if (ipadd_save_prep())
1123 exit(1);
1124
1125 if (rtnl_wilddump_request(&rth, preferred_family, RTM_GETADDR) < 0) {
1126 perror("Cannot send dump request");
1127 exit(1);
1128 }
1129
1130 if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) {
1131 fprintf(stderr, "Save terminated\n");
1132 exit(1);
1133 }
1134
1135 exit(0);
1136 }
1137
1138 if (rtnl_wilddump_request(&rth, preferred_family, RTM_GETLINK) < 0) {
1139 perror("Cannot send dump request");
1140 exit(1);
1141 }
1142
1143 if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) {
1144 fprintf(stderr, "Dump terminated\n");
1145 exit(1);
1146 }
1147
1148 if (filter.family != AF_PACKET) {
1149 if (filter.oneline)
1150 no_link = 1;
1151
1152 if (rtnl_wilddump_request(&rth, filter.family, RTM_GETADDR) < 0) {
1153 perror("Cannot send dump request");
1154 exit(1);
1155 }
1156
1157 if (rtnl_dump_filter(&rth, store_nlmsg, &ainfo) < 0) {
1158 fprintf(stderr, "Dump terminated\n");
1159 exit(1);
1160 }
1161
1162 ipaddr_filter(&linfo, &ainfo);
1163 }
1164
1165 for (l = linfo.head; l; l = l->next) {
1166 if (no_link || print_linkinfo(NULL, &l->h, stdout) == 0) {
1167 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
1168 if (filter.family != AF_PACKET)
1169 print_selected_addrinfo(ifi->ifi_index,
1170 ainfo.head, stdout);
1171 }
1172 }
1173 fflush(stdout);
1174
1175 free_nlmsg_chain(&ainfo);
1176 free_nlmsg_chain(&linfo);
1177
1178 return 0;
1179 }
1180
1181 int ipaddr_list_link(int argc, char **argv)
1182 {
1183 preferred_family = AF_PACKET;
1184 do_link = 1;
1185 return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST);
1186 }
1187
1188 void ipaddr_reset_filter(int oneline)
1189 {
1190 memset(&filter, 0, sizeof(filter));
1191 filter.oneline = oneline;
1192 }
1193
1194 static int default_scope(inet_prefix *lcl)
1195 {
1196 if (lcl->family == AF_INET) {
1197 if (lcl->bytelen >= 1 && *(__u8*)&lcl->data == 127)
1198 return RT_SCOPE_HOST;
1199 }
1200 return 0;
1201 }
1202
1203 static int ipaddr_modify(int cmd, int flags, int argc, char **argv)
1204 {
1205 struct {
1206 struct nlmsghdr n;
1207 struct ifaddrmsg ifa;
1208 char buf[256];
1209 } req;
1210 char *d = NULL;
1211 char *l = NULL;
1212 char *lcl_arg = NULL;
1213 char *valid_lftp = NULL;
1214 char *preferred_lftp = NULL;
1215 inet_prefix lcl;
1216 inet_prefix peer;
1217 int local_len = 0;
1218 int peer_len = 0;
1219 int brd_len = 0;
1220 int any_len = 0;
1221 int scoped = 0;
1222 __u32 preferred_lft = INFINITY_LIFE_TIME;
1223 __u32 valid_lft = INFINITY_LIFE_TIME;
1224 struct ifa_cacheinfo cinfo;
1225
1226 memset(&req, 0, sizeof(req));
1227
1228 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg));
1229 req.n.nlmsg_flags = NLM_F_REQUEST | flags;
1230 req.n.nlmsg_type = cmd;
1231 req.ifa.ifa_family = preferred_family;
1232
1233 while (argc > 0) {
1234 if (strcmp(*argv, "peer") == 0 ||
1235 strcmp(*argv, "remote") == 0) {
1236 NEXT_ARG();
1237
1238 if (peer_len)
1239 duparg("peer", *argv);
1240 get_prefix(&peer, *argv, req.ifa.ifa_family);
1241 peer_len = peer.bytelen;
1242 if (req.ifa.ifa_family == AF_UNSPEC)
1243 req.ifa.ifa_family = peer.family;
1244 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen);
1245 req.ifa.ifa_prefixlen = peer.bitlen;
1246 } else if (matches(*argv, "broadcast") == 0 ||
1247 strcmp(*argv, "brd") == 0) {
1248 inet_prefix addr;
1249 NEXT_ARG();
1250 if (brd_len)
1251 duparg("broadcast", *argv);
1252 if (strcmp(*argv, "+") == 0)
1253 brd_len = -1;
1254 else if (strcmp(*argv, "-") == 0)
1255 brd_len = -2;
1256 else {
1257 get_addr(&addr, *argv, req.ifa.ifa_family);
1258 if (req.ifa.ifa_family == AF_UNSPEC)
1259 req.ifa.ifa_family = addr.family;
1260 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen);
1261 brd_len = addr.bytelen;
1262 }
1263 } else if (strcmp(*argv, "anycast") == 0) {
1264 inet_prefix addr;
1265 NEXT_ARG();
1266 if (any_len)
1267 duparg("anycast", *argv);
1268 get_addr(&addr, *argv, req.ifa.ifa_family);
1269 if (req.ifa.ifa_family == AF_UNSPEC)
1270 req.ifa.ifa_family = addr.family;
1271 addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen);
1272 any_len = addr.bytelen;
1273 } else if (strcmp(*argv, "scope") == 0) {
1274 unsigned scope = 0;
1275 NEXT_ARG();
1276 if (rtnl_rtscope_a2n(&scope, *argv))
1277 invarg("invalid scope value.", *argv);
1278 req.ifa.ifa_scope = scope;
1279 scoped = 1;
1280 } else if (strcmp(*argv, "dev") == 0) {
1281 NEXT_ARG();
1282 d = *argv;
1283 } else if (strcmp(*argv, "label") == 0) {
1284 NEXT_ARG();
1285 l = *argv;
1286 addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1);
1287 } else if (matches(*argv, "valid_lft") == 0) {
1288 if (valid_lftp)
1289 duparg("valid_lft", *argv);
1290 NEXT_ARG();
1291 valid_lftp = *argv;
1292 if (set_lifetime(&valid_lft, *argv))
1293 invarg("valid_lft value", *argv);
1294 } else if (matches(*argv, "preferred_lft") == 0) {
1295 if (preferred_lftp)
1296 duparg("preferred_lft", *argv);
1297 NEXT_ARG();
1298 preferred_lftp = *argv;
1299 if (set_lifetime(&preferred_lft, *argv))
1300 invarg("preferred_lft value", *argv);
1301 } else if (strcmp(*argv, "home") == 0) {
1302 req.ifa.ifa_flags |= IFA_F_HOMEADDRESS;
1303 } else if (strcmp(*argv, "nodad") == 0) {
1304 req.ifa.ifa_flags |= IFA_F_NODAD;
1305 } else {
1306 if (strcmp(*argv, "local") == 0) {
1307 NEXT_ARG();
1308 }
1309 if (matches(*argv, "help") == 0)
1310 usage();
1311 if (local_len)
1312 duparg2("local", *argv);
1313 lcl_arg = *argv;
1314 get_prefix(&lcl, *argv, req.ifa.ifa_family);
1315 if (req.ifa.ifa_family == AF_UNSPEC)
1316 req.ifa.ifa_family = lcl.family;
1317 addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen);
1318 local_len = lcl.bytelen;
1319 }
1320 argc--; argv++;
1321 }
1322 if (d == NULL) {
1323 fprintf(stderr, "Not enough information: \"dev\" argument is required.\n");
1324 return -1;
1325 }
1326 if (l && matches(d, l) != 0) {
1327 fprintf(stderr, "\"dev\" (%s) must match \"label\" (%s).\n", d, l);
1328 return -1;
1329 }
1330
1331 if (peer_len == 0 && local_len) {
1332 if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) {
1333 fprintf(stderr,
1334 "Warning: Executing wildcard deletion to stay compatible with old scripts.\n" \
1335 " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n" \
1336 " This special behaviour is likely to disappear in further releases,\n" \
1337 " fix your scripts!\n", lcl_arg, local_len*8);
1338 } else {
1339 peer = lcl;
1340 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen);
1341 }
1342 }
1343 if (req.ifa.ifa_prefixlen == 0)
1344 req.ifa.ifa_prefixlen = lcl.bitlen;
1345
1346 if (brd_len < 0 && cmd != RTM_DELADDR) {
1347 inet_prefix brd;
1348 int i;
1349 if (req.ifa.ifa_family != AF_INET) {
1350 fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n");
1351 return -1;
1352 }
1353 brd = peer;
1354 if (brd.bitlen <= 30) {
1355 for (i=31; i>=brd.bitlen; i--) {
1356 if (brd_len == -1)
1357 brd.data[0] |= htonl(1<<(31-i));
1358 else
1359 brd.data[0] &= ~htonl(1<<(31-i));
1360 }
1361 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen);
1362 brd_len = brd.bytelen;
1363 }
1364 }
1365 if (!scoped && cmd != RTM_DELADDR)
1366 req.ifa.ifa_scope = default_scope(&lcl);
1367
1368 ll_init_map(&rth);
1369
1370 if ((req.ifa.ifa_index = ll_name_to_index(d)) == 0) {
1371 fprintf(stderr, "Cannot find device \"%s\"\n", d);
1372 return -1;
1373 }
1374
1375 if (valid_lftp || preferred_lftp) {
1376 if (!valid_lft) {
1377 fprintf(stderr, "valid_lft is zero\n");
1378 return -1;
1379 }
1380 if (valid_lft < preferred_lft) {
1381 fprintf(stderr, "preferred_lft is greater than valid_lft\n");
1382 return -1;
1383 }
1384
1385 memset(&cinfo, 0, sizeof(cinfo));
1386 cinfo.ifa_prefered = preferred_lft;
1387 cinfo.ifa_valid = valid_lft;
1388 addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo,
1389 sizeof(cinfo));
1390 }
1391
1392 if (rtnl_talk(&rth, &req.n, 0, 0, NULL) < 0)
1393 return -2;
1394
1395 return 0;
1396 }
1397
1398 int do_ipaddr(int argc, char **argv)
1399 {
1400 if (argc < 1)
1401 return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST);
1402 if (matches(*argv, "add") == 0)
1403 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
1404 if (matches(*argv, "change") == 0 ||
1405 strcmp(*argv, "chg") == 0)
1406 return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1);
1407 if (matches(*argv, "replace") == 0)
1408 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
1409 if (matches(*argv, "delete") == 0)
1410 return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1);
1411 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
1412 || matches(*argv, "lst") == 0)
1413 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST);
1414 if (matches(*argv, "flush") == 0)
1415 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH);
1416 if (matches(*argv, "save") == 0)
1417 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE);
1418 if (matches(*argv, "showdump") == 0)
1419 return ipaddr_showdump();
1420 if (matches(*argv, "restore") == 0)
1421 return ipaddr_restore();
1422 if (matches(*argv, "help") == 0)
1423 usage();
1424 fprintf(stderr, "Command \"%s\" is unknown, try \"ip addr help\".\n", *argv);
1425 exit(-1);
1426 }