]> git.proxmox.com Git - mirror_iproute2.git/blob - ip/ipaddress.c
treewide: refactor help messages
[mirror_iproute2.git] / ip / ipaddress.c
1 /*
2 * ipaddress.c "ip address".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 */
12
13 #include <stdio.h>
14 #include <stdlib.h>
15 #include <unistd.h>
16 #include <inttypes.h>
17 #include <fcntl.h>
18 #include <sys/ioctl.h>
19 #include <sys/socket.h>
20 #include <sys/param.h>
21 #include <errno.h>
22 #include <netinet/in.h>
23 #include <arpa/inet.h>
24 #include <string.h>
25 #include <fnmatch.h>
26
27 #include <linux/netdevice.h>
28 #include <linux/if_arp.h>
29 #include <linux/sockios.h>
30 #include <linux/net_namespace.h>
31
32 #include "utils.h"
33 #include "rt_names.h"
34 #include "utils.h"
35 #include "ll_map.h"
36 #include "ip_common.h"
37 #include "color.h"
38
39 enum {
40 IPADD_LIST,
41 IPADD_FLUSH,
42 IPADD_SAVE,
43 };
44
45 static struct link_filter filter;
46 static int do_link;
47
48 static void usage(void) __attribute__((noreturn));
49
50 static void usage(void)
51 {
52 if (do_link)
53 iplink_usage();
54
55 fprintf(stderr,
56 "Usage: ip address {add|change|replace} IFADDR dev IFNAME [ LIFETIME ]\n"
57 " [ CONFFLAG-LIST ]\n"
58 " ip address del IFADDR dev IFNAME [mngtmpaddr]\n"
59 " ip address {save|flush} [ dev IFNAME ] [ scope SCOPE-ID ]\n"
60 " [ to PREFIX ] [ FLAG-LIST ] [ label LABEL ] [up]\n"
61 " ip address [ show [ dev IFNAME ] [ scope SCOPE-ID ] [ master DEVICE ]\n"
62 " [ type TYPE ] [ to PREFIX ] [ FLAG-LIST ]\n"
63 " [ label LABEL ] [up] [ vrf NAME ] ]\n"
64 " ip address {showdump|restore}\n"
65 "IFADDR := PREFIX | ADDR peer PREFIX\n"
66 " [ broadcast ADDR ] [ anycast ADDR ]\n"
67 " [ label IFNAME ] [ scope SCOPE-ID ] [ metric METRIC ]\n"
68 "SCOPE-ID := [ host | link | global | NUMBER ]\n"
69 "FLAG-LIST := [ FLAG-LIST ] FLAG\n"
70 "FLAG := [ permanent | dynamic | secondary | primary |\n"
71 " [-]tentative | [-]deprecated | [-]dadfailed | temporary |\n"
72 " CONFFLAG-LIST ]\n"
73 "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n"
74 "CONFFLAG := [ home | nodad | mngtmpaddr | noprefixroute | autojoin ]\n"
75 "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n"
76 "LFT := forever | SECONDS\n"
77 "TYPE := { vlan | veth | vcan | vxcan | dummy | ifb | macvlan | macvtap |\n"
78 " bridge | bond | ipoib | ip6tnl | ipip | sit | vxlan | lowpan |\n"
79 " gre | gretap | erspan | ip6gre | ip6gretap | ip6erspan | vti |\n"
80 " nlmon | can | bond_slave | ipvlan | geneve | bridge_slave |\n"
81 " hsr | macsec | netdevsim }\n");
82
83 exit(-1);
84 }
85
86 static void print_link_flags(FILE *fp, unsigned int flags, unsigned int mdown)
87 {
88 open_json_array(PRINT_ANY, is_json_context() ? "flags" : "<");
89 if (flags & IFF_UP && !(flags & IFF_RUNNING))
90 print_string(PRINT_ANY, NULL,
91 flags ? "%s," : "%s", "NO-CARRIER");
92 flags &= ~IFF_RUNNING;
93 #define _PF(f) if (flags&IFF_##f) { \
94 flags &= ~IFF_##f ; \
95 print_string(PRINT_ANY, NULL, flags ? "%s," : "%s", #f); }
96 _PF(LOOPBACK);
97 _PF(BROADCAST);
98 _PF(POINTOPOINT);
99 _PF(MULTICAST);
100 _PF(NOARP);
101 _PF(ALLMULTI);
102 _PF(PROMISC);
103 _PF(MASTER);
104 _PF(SLAVE);
105 _PF(DEBUG);
106 _PF(DYNAMIC);
107 _PF(AUTOMEDIA);
108 _PF(PORTSEL);
109 _PF(NOTRAILERS);
110 _PF(UP);
111 _PF(LOWER_UP);
112 _PF(DORMANT);
113 _PF(ECHO);
114 #undef _PF
115 if (flags)
116 print_hex(PRINT_ANY, NULL, "%x", flags);
117 if (mdown)
118 print_string(PRINT_ANY, NULL, ",%s", "M-DOWN");
119 close_json_array(PRINT_ANY, "> ");
120 }
121
122 static const char *oper_states[] = {
123 "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN",
124 "TESTING", "DORMANT", "UP"
125 };
126
127 static void print_operstate(FILE *f, __u8 state)
128 {
129 if (state >= ARRAY_SIZE(oper_states)) {
130 if (is_json_context())
131 print_uint(PRINT_JSON, "operstate_index", NULL, state);
132 else
133 print_0xhex(PRINT_FP, NULL, "state %#llx", state);
134 } else if (brief) {
135 print_color_string(PRINT_ANY,
136 oper_state_color(state),
137 "operstate",
138 "%-14s ",
139 oper_states[state]);
140 } else {
141 if (is_json_context())
142 print_string(PRINT_JSON,
143 "operstate",
144 NULL, oper_states[state]);
145 else {
146 fprintf(f, "state ");
147 color_fprintf(f, oper_state_color(state),
148 "%s ", oper_states[state]);
149 }
150 }
151 }
152
153 int get_operstate(const char *name)
154 {
155 int i;
156
157 for (i = 0; i < ARRAY_SIZE(oper_states); i++)
158 if (strcasecmp(name, oper_states[i]) == 0)
159 return i;
160 return -1;
161 }
162
163 static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1])
164 {
165 int qlen;
166
167 if (tb[IFLA_TXQLEN])
168 qlen = rta_getattr_u32(tb[IFLA_TXQLEN]);
169 else {
170 struct ifreq ifr = {};
171 int s = socket(AF_INET, SOCK_STREAM, 0);
172
173 if (s < 0)
174 return;
175
176 strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME]));
177 if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) {
178 fprintf(stderr,
179 "ioctl(SIOCGIFTXQLEN) failed: %s\n",
180 strerror(errno));
181 close(s);
182 return;
183 }
184 close(s);
185 qlen = ifr.ifr_qlen;
186 }
187 if (qlen)
188 print_int(PRINT_ANY, "txqlen", "qlen %d", qlen);
189 }
190
191 static const char *link_modes[] = {
192 "DEFAULT", "DORMANT"
193 };
194
195 static void print_linkmode(FILE *f, struct rtattr *tb)
196 {
197 unsigned int mode = rta_getattr_u8(tb);
198
199 if (mode >= ARRAY_SIZE(link_modes))
200 print_int(PRINT_ANY,
201 "linkmode_index",
202 "mode %d ",
203 mode);
204 else
205 print_string(PRINT_ANY,
206 "linkmode",
207 "mode %s "
208 , link_modes[mode]);
209 }
210
211 static char *parse_link_kind(struct rtattr *tb, bool slave)
212 {
213 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
214 int attr = slave ? IFLA_INFO_SLAVE_KIND : IFLA_INFO_KIND;
215
216 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
217
218 if (linkinfo[attr])
219 return RTA_DATA(linkinfo[attr]);
220
221 return "";
222 }
223
224 static int match_link_kind(struct rtattr **tb, const char *kind, bool slave)
225 {
226 if (!tb[IFLA_LINKINFO])
227 return -1;
228
229 return strcmp(parse_link_kind(tb[IFLA_LINKINFO], slave), kind);
230 }
231
232 static void print_linktype(FILE *fp, struct rtattr *tb)
233 {
234 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
235 struct link_util *lu;
236 struct link_util *slave_lu;
237 char slave[32];
238
239 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
240 open_json_object("linkinfo");
241
242 if (linkinfo[IFLA_INFO_KIND]) {
243 const char *kind
244 = rta_getattr_str(linkinfo[IFLA_INFO_KIND]);
245
246 print_nl();
247 print_string(PRINT_ANY, "info_kind", " %s ", kind);
248
249 lu = get_link_kind(kind);
250 if (lu && lu->print_opt) {
251 struct rtattr *attr[lu->maxattr+1], **data = NULL;
252
253 if (linkinfo[IFLA_INFO_DATA]) {
254 parse_rtattr_nested(attr, lu->maxattr,
255 linkinfo[IFLA_INFO_DATA]);
256 data = attr;
257 }
258 open_json_object("info_data");
259 lu->print_opt(lu, fp, data);
260 close_json_object();
261
262 if (linkinfo[IFLA_INFO_XSTATS] && show_stats &&
263 lu->print_xstats) {
264 open_json_object("info_xstats");
265 lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]);
266 close_json_object();
267 }
268 }
269 }
270
271 if (linkinfo[IFLA_INFO_SLAVE_KIND]) {
272 const char *slave_kind
273 = rta_getattr_str(linkinfo[IFLA_INFO_SLAVE_KIND]);
274
275 print_nl();
276 print_string(PRINT_ANY,
277 "info_slave_kind",
278 " %s_slave ",
279 slave_kind);
280
281 snprintf(slave, sizeof(slave), "%s_slave", slave_kind);
282
283 slave_lu = get_link_kind(slave);
284 if (slave_lu && slave_lu->print_opt) {
285 struct rtattr *attr[slave_lu->maxattr+1], **data = NULL;
286
287 if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
288 parse_rtattr_nested(attr, slave_lu->maxattr,
289 linkinfo[IFLA_INFO_SLAVE_DATA]);
290 data = attr;
291 }
292 open_json_object("info_slave_data");
293 slave_lu->print_opt(slave_lu, fp, data);
294 close_json_object();
295 }
296 }
297 close_json_object();
298 }
299
300 static void print_af_spec(FILE *fp, struct rtattr *af_spec_attr)
301 {
302 struct rtattr *inet6_attr;
303 struct rtattr *tb[IFLA_INET6_MAX + 1];
304
305 inet6_attr = parse_rtattr_one_nested(AF_INET6, af_spec_attr);
306 if (!inet6_attr)
307 return;
308
309 parse_rtattr_nested(tb, IFLA_INET6_MAX, inet6_attr);
310
311 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
312 __u8 mode = rta_getattr_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
313 SPRINT_BUF(b1);
314
315 switch (mode) {
316 case IN6_ADDR_GEN_MODE_EUI64:
317 print_string(PRINT_ANY,
318 "inet6_addr_gen_mode",
319 "addrgenmode %s ",
320 "eui64");
321 break;
322 case IN6_ADDR_GEN_MODE_NONE:
323 print_string(PRINT_ANY,
324 "inet6_addr_gen_mode",
325 "addrgenmode %s ",
326 "none");
327 break;
328 case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
329 print_string(PRINT_ANY,
330 "inet6_addr_gen_mode",
331 "addrgenmode %s ",
332 "stable_secret");
333 break;
334 case IN6_ADDR_GEN_MODE_RANDOM:
335 print_string(PRINT_ANY,
336 "inet6_addr_gen_mode",
337 "addrgenmode %s ",
338 "random");
339 break;
340 default:
341 snprintf(b1, sizeof(b1), "%#.2hhx", mode);
342 print_string(PRINT_ANY,
343 "inet6_addr_gen_mode",
344 "addrgenmode %s ",
345 b1);
346 break;
347 }
348 }
349 }
350
351 static void print_vf_stats64(FILE *fp, struct rtattr *vfstats);
352
353 static void print_vfinfo(FILE *fp, struct rtattr *vfinfo)
354 {
355 struct ifla_vf_mac *vf_mac;
356 struct ifla_vf_tx_rate *vf_tx_rate;
357 struct rtattr *vf[IFLA_VF_MAX + 1] = {};
358
359 SPRINT_BUF(b1);
360
361 if (vfinfo->rta_type != IFLA_VF_INFO) {
362 fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type);
363 return;
364 }
365
366 parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo);
367
368 vf_mac = RTA_DATA(vf[IFLA_VF_MAC]);
369 vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]);
370
371 print_string(PRINT_FP, NULL, "%s ", _SL_);
372 print_int(PRINT_ANY, "vf", "vf %d ", vf_mac->vf);
373 print_string(PRINT_ANY, "mac", "MAC %s",
374 ll_addr_n2a((unsigned char *) &vf_mac->mac,
375 ETH_ALEN, 0, b1, sizeof(b1)));
376
377 if (vf[IFLA_VF_VLAN_LIST]) {
378 struct rtattr *i, *vfvlanlist = vf[IFLA_VF_VLAN_LIST];
379 int rem = RTA_PAYLOAD(vfvlanlist);
380
381 open_json_array(PRINT_JSON, "vlan_list");
382 for (i = RTA_DATA(vfvlanlist);
383 RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
384 struct ifla_vf_vlan_info *vf_vlan_info = RTA_DATA(i);
385 SPRINT_BUF(b2);
386
387 open_json_object(NULL);
388 if (vf_vlan_info->vlan)
389 print_int(PRINT_ANY,
390 "vlan",
391 ", vlan %d",
392 vf_vlan_info->vlan);
393 if (vf_vlan_info->qos)
394 print_int(PRINT_ANY,
395 "qos",
396 ", qos %d",
397 vf_vlan_info->qos);
398 if (vf_vlan_info->vlan_proto &&
399 vf_vlan_info->vlan_proto != htons(ETH_P_8021Q))
400 print_string(PRINT_ANY,
401 "protocol",
402 ", vlan protocol %s",
403 ll_proto_n2a(
404 vf_vlan_info->vlan_proto,
405 b2, sizeof(b2)));
406 close_json_object();
407 }
408 close_json_array(PRINT_JSON, NULL);
409 } else {
410 struct ifla_vf_vlan *vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]);
411
412 if (vf_vlan->vlan)
413 print_int(PRINT_ANY,
414 "vlan",
415 ", vlan %d",
416 vf_vlan->vlan);
417 if (vf_vlan->qos)
418 print_int(PRINT_ANY, "qos", ", qos %d", vf_vlan->qos);
419 }
420
421 if (vf_tx_rate->rate)
422 print_uint(PRINT_ANY,
423 "tx_rate",
424 ", tx rate %u (Mbps)",
425 vf_tx_rate->rate);
426
427 if (vf[IFLA_VF_RATE]) {
428 struct ifla_vf_rate *vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
429 int max_tx = vf_rate->max_tx_rate;
430 int min_tx = vf_rate->min_tx_rate;
431
432 if (is_json_context()) {
433 open_json_object("rate");
434 print_uint(PRINT_JSON, "max_tx", NULL, max_tx);
435 print_uint(PRINT_ANY, "min_tx", NULL, min_tx);
436 close_json_object();
437 } else {
438 if (max_tx)
439 fprintf(fp, ", max_tx_rate %uMbps", max_tx);
440 if (min_tx)
441 fprintf(fp, ", min_tx_rate %uMbps", min_tx);
442 }
443 }
444
445 if (vf[IFLA_VF_SPOOFCHK]) {
446 struct ifla_vf_spoofchk *vf_spoofchk =
447 RTA_DATA(vf[IFLA_VF_SPOOFCHK]);
448
449 if (vf_spoofchk->setting != -1)
450 print_bool(PRINT_ANY,
451 "spoofchk",
452 vf_spoofchk->setting ?
453 ", spoof checking on" : ", spoof checking off",
454 vf_spoofchk->setting);
455 }
456
457 if (vf[IFLA_VF_LINK_STATE]) {
458 struct ifla_vf_link_state *vf_linkstate =
459 RTA_DATA(vf[IFLA_VF_LINK_STATE]);
460
461 if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_AUTO)
462 print_string(PRINT_ANY,
463 "link_state",
464 ", link-state %s",
465 "auto");
466 else if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_ENABLE)
467 print_string(PRINT_ANY,
468 "link_state",
469 ", link-state %s",
470 "enable");
471 else
472 print_string(PRINT_ANY,
473 "link_state",
474 ", link-state %s",
475 "disable");
476 }
477
478 if (vf[IFLA_VF_TRUST]) {
479 struct ifla_vf_trust *vf_trust = RTA_DATA(vf[IFLA_VF_TRUST]);
480
481 if (vf_trust->setting != -1)
482 print_bool(PRINT_ANY,
483 "trust",
484 vf_trust->setting ? ", trust on" : ", trust off",
485 vf_trust->setting);
486 }
487
488 if (vf[IFLA_VF_RSS_QUERY_EN]) {
489 struct ifla_vf_rss_query_en *rss_query =
490 RTA_DATA(vf[IFLA_VF_RSS_QUERY_EN]);
491
492 if (rss_query->setting != -1)
493 print_bool(PRINT_ANY,
494 "query_rss_en",
495 rss_query->setting ? ", query_rss on"
496 : ", query_rss off",
497 rss_query->setting);
498 }
499
500 if (vf[IFLA_VF_STATS] && show_stats)
501 print_vf_stats64(fp, vf[IFLA_VF_STATS]);
502 }
503
504 void print_num(FILE *fp, unsigned int width, uint64_t count)
505 {
506 const char *prefix = "kMGTPE";
507 const unsigned int base = use_iec ? 1024 : 1000;
508 uint64_t powi = 1;
509 uint16_t powj = 1;
510 uint8_t precision = 2;
511 char buf[64];
512
513 if (!human_readable || count < base) {
514 fprintf(fp, "%-*"PRIu64" ", width, count);
515 return;
516 }
517
518 /* increase value by a factor of 1000/1024 and print
519 * if result is something a human can read
520 */
521 for (;;) {
522 powi *= base;
523 if (count / base < powi)
524 break;
525
526 if (!prefix[1])
527 break;
528 ++prefix;
529 }
530
531 /* try to guess a good number of digits for precision */
532 for (; precision > 0; precision--) {
533 powj *= 10;
534 if (count / powi < powj)
535 break;
536 }
537
538 snprintf(buf, sizeof(buf), "%.*f%c%s", precision,
539 (double) count / powi, *prefix, use_iec ? "i" : "");
540
541 fprintf(fp, "%-*s ", width, buf);
542 }
543
544 static void print_vf_stats64(FILE *fp, struct rtattr *vfstats)
545 {
546 struct rtattr *vf[IFLA_VF_STATS_MAX + 1];
547
548 if (vfstats->rta_type != IFLA_VF_STATS) {
549 fprintf(stderr, "BUG: rta type is %d\n", vfstats->rta_type);
550 return;
551 }
552
553 parse_rtattr_nested(vf, IFLA_VF_STATS_MAX, vfstats);
554
555 if (is_json_context()) {
556 open_json_object("stats");
557
558 /* RX stats */
559 open_json_object("rx");
560 print_u64(PRINT_JSON, "bytes", NULL,
561 rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
562 print_u64(PRINT_JSON, "packets", NULL,
563 rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
564 print_u64(PRINT_JSON, "multicast", NULL,
565 rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
566 print_u64(PRINT_JSON, "broadcast", NULL,
567 rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
568 if (vf[IFLA_VF_STATS_RX_DROPPED])
569 print_u64(PRINT_JSON, "dropped", NULL,
570 rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
571 close_json_object();
572
573 /* TX stats */
574 open_json_object("tx");
575 print_u64(PRINT_JSON, "tx_bytes", NULL,
576 rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
577 print_u64(PRINT_JSON, "tx_packets", NULL,
578 rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
579 if (vf[IFLA_VF_STATS_TX_DROPPED])
580 print_u64(PRINT_JSON, "dropped", NULL,
581 rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
582 close_json_object();
583 close_json_object();
584 } else {
585 /* RX stats */
586 fprintf(fp, "%s", _SL_);
587 fprintf(fp, " RX: bytes packets mcast bcast ");
588 if (vf[IFLA_VF_STATS_RX_DROPPED])
589 fprintf(fp, " dropped ");
590 fprintf(fp, "%s", _SL_);
591 fprintf(fp, " ");
592
593 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
594 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
595 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
596 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
597 if (vf[IFLA_VF_STATS_RX_DROPPED])
598 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
599
600 /* TX stats */
601 fprintf(fp, "%s", _SL_);
602 fprintf(fp, " TX: bytes packets ");
603 if (vf[IFLA_VF_STATS_TX_DROPPED])
604 fprintf(fp, " dropped ");
605 fprintf(fp, "%s", _SL_);
606 fprintf(fp, " ");
607
608 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
609 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
610 if (vf[IFLA_VF_STATS_TX_DROPPED])
611 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
612 }
613 }
614
615 static void __print_link_stats(FILE *fp, struct rtattr *tb[])
616 {
617 const struct rtattr *carrier_changes = tb[IFLA_CARRIER_CHANGES];
618 struct rtnl_link_stats64 _s, *s = &_s;
619 int ret;
620
621 ret = get_rtnl_link_stats_rta(s, tb);
622 if (ret < 0)
623 return;
624
625 if (is_json_context()) {
626 open_json_object((ret == sizeof(*s)) ? "stats64" : "stats");
627
628 /* RX stats */
629 open_json_object("rx");
630 print_u64(PRINT_JSON, "bytes", NULL, s->rx_bytes);
631 print_u64(PRINT_JSON, "packets", NULL, s->rx_packets);
632 print_u64(PRINT_JSON, "errors", NULL, s->rx_errors);
633 print_u64(PRINT_JSON, "dropped", NULL, s->rx_dropped);
634 print_u64(PRINT_JSON, "over_errors", NULL, s->rx_over_errors);
635 print_u64(PRINT_JSON, "multicast", NULL, s->multicast);
636 if (s->rx_compressed)
637 print_u64(PRINT_JSON,
638 "compressed", NULL, s->rx_compressed);
639
640 /* RX error stats */
641 if (show_stats > 1) {
642 print_u64(PRINT_JSON,
643 "length_errors",
644 NULL, s->rx_length_errors);
645 print_u64(PRINT_JSON,
646 "crc_errors",
647 NULL, s->rx_crc_errors);
648 print_u64(PRINT_JSON,
649 "frame_errors",
650 NULL, s->rx_frame_errors);
651 print_u64(PRINT_JSON,
652 "fifo_errors",
653 NULL, s->rx_fifo_errors);
654 print_u64(PRINT_JSON,
655 "missed_errors",
656 NULL, s->rx_missed_errors);
657 if (s->rx_nohandler)
658 print_u64(PRINT_JSON,
659 "nohandler", NULL, s->rx_nohandler);
660 }
661 close_json_object();
662
663 /* TX stats */
664 open_json_object("tx");
665 print_u64(PRINT_JSON, "bytes", NULL, s->tx_bytes);
666 print_u64(PRINT_JSON, "packets", NULL, s->tx_packets);
667 print_u64(PRINT_JSON, "errors", NULL, s->tx_errors);
668 print_u64(PRINT_JSON, "dropped", NULL, s->tx_dropped);
669 print_u64(PRINT_JSON,
670 "carrier_errors",
671 NULL, s->tx_carrier_errors);
672 print_u64(PRINT_JSON, "collisions", NULL, s->collisions);
673 if (s->tx_compressed)
674 print_u64(PRINT_JSON,
675 "compressed", NULL, s->tx_compressed);
676
677 /* TX error stats */
678 if (show_stats > 1) {
679 print_u64(PRINT_JSON,
680 "aborted_errors",
681 NULL, s->tx_aborted_errors);
682 print_u64(PRINT_JSON,
683 "fifo_errors",
684 NULL, s->tx_fifo_errors);
685 print_u64(PRINT_JSON,
686 "window_errors",
687 NULL, s->tx_window_errors);
688 print_u64(PRINT_JSON,
689 "heartbeat_errors",
690 NULL, s->tx_heartbeat_errors);
691 if (carrier_changes)
692 print_u64(PRINT_JSON, "carrier_changes", NULL,
693 rta_getattr_u32(carrier_changes));
694 }
695
696 close_json_object();
697 close_json_object();
698 } else {
699 /* RX stats */
700 fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s",
701 s->rx_compressed ? "compressed" : "", _SL_);
702
703 fprintf(fp, " ");
704 print_num(fp, 10, s->rx_bytes);
705 print_num(fp, 8, s->rx_packets);
706 print_num(fp, 7, s->rx_errors);
707 print_num(fp, 7, s->rx_dropped);
708 print_num(fp, 7, s->rx_over_errors);
709 print_num(fp, 7, s->multicast);
710 if (s->rx_compressed)
711 print_num(fp, 7, s->rx_compressed);
712
713 /* RX error stats */
714 if (show_stats > 1) {
715 fprintf(fp, "%s", _SL_);
716 fprintf(fp, " RX errors: length crc frame fifo missed%s%s",
717 s->rx_nohandler ? " nohandler" : "", _SL_);
718 fprintf(fp, " ");
719 print_num(fp, 8, s->rx_length_errors);
720 print_num(fp, 7, s->rx_crc_errors);
721 print_num(fp, 7, s->rx_frame_errors);
722 print_num(fp, 7, s->rx_fifo_errors);
723 print_num(fp, 7, s->rx_missed_errors);
724 if (s->rx_nohandler)
725 print_num(fp, 7, s->rx_nohandler);
726 }
727 fprintf(fp, "%s", _SL_);
728
729 /* TX stats */
730 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
731 s->tx_compressed ? "compressed" : "", _SL_);
732
733 fprintf(fp, " ");
734 print_num(fp, 10, s->tx_bytes);
735 print_num(fp, 8, s->tx_packets);
736 print_num(fp, 7, s->tx_errors);
737 print_num(fp, 7, s->tx_dropped);
738 print_num(fp, 7, s->tx_carrier_errors);
739 print_num(fp, 7, s->collisions);
740 if (s->tx_compressed)
741 print_num(fp, 7, s->tx_compressed);
742
743 /* TX error stats */
744 if (show_stats > 1) {
745 fprintf(fp, "%s", _SL_);
746 fprintf(fp, " TX errors: aborted fifo window heartbeat");
747 if (carrier_changes)
748 fprintf(fp, " transns");
749 fprintf(fp, "%s", _SL_);
750
751 fprintf(fp, " ");
752 print_num(fp, 8, s->tx_aborted_errors);
753 print_num(fp, 7, s->tx_fifo_errors);
754 print_num(fp, 7, s->tx_window_errors);
755 print_num(fp, 7, s->tx_heartbeat_errors);
756 if (carrier_changes)
757 print_num(fp, 7,
758 rta_getattr_u32(carrier_changes));
759 }
760 }
761 }
762
763 static void print_link_stats(FILE *fp, struct nlmsghdr *n)
764 {
765 struct ifinfomsg *ifi = NLMSG_DATA(n);
766 struct rtattr *tb[IFLA_MAX+1];
767
768 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi),
769 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)));
770 __print_link_stats(fp, tb);
771 print_nl();
772 }
773
774 static int print_linkinfo_brief(FILE *fp, const char *name,
775 const struct ifinfomsg *ifi,
776 struct rtattr *tb[])
777 {
778 unsigned int m_flag = 0;
779
780 m_flag = print_name_and_link("%-16s ", name, tb);
781
782 if (tb[IFLA_OPERSTATE])
783 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
784
785 if (filter.family == AF_PACKET) {
786 SPRINT_BUF(b1);
787
788 if (tb[IFLA_ADDRESS]) {
789 print_color_string(PRINT_ANY, COLOR_MAC,
790 "address", "%s ",
791 ll_addr_n2a(
792 RTA_DATA(tb[IFLA_ADDRESS]),
793 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
794 ifi->ifi_type,
795 b1, sizeof(b1)));
796 }
797 }
798
799 if (filter.family == AF_PACKET) {
800 print_link_flags(fp, ifi->ifi_flags, m_flag);
801 print_string(PRINT_FP, NULL, "%s", "\n");
802 }
803
804 fflush(fp);
805 return 0;
806 }
807
808 static const char *link_events[] = {
809 [IFLA_EVENT_NONE] = "NONE",
810 [IFLA_EVENT_REBOOT] = "REBOOT",
811 [IFLA_EVENT_FEATURES] = "FEATURE CHANGE",
812 [IFLA_EVENT_BONDING_FAILOVER] = "BONDING FAILOVER",
813 [IFLA_EVENT_NOTIFY_PEERS] = "NOTIFY PEERS",
814 [IFLA_EVENT_IGMP_RESEND] = "RESEND IGMP",
815 [IFLA_EVENT_BONDING_OPTIONS] = "BONDING OPTION"
816 };
817
818 static void print_link_event(FILE *f, __u32 event)
819 {
820 if (event >= ARRAY_SIZE(link_events))
821 print_int(PRINT_ANY, "event", "event %d ", event);
822 else {
823 if (event)
824 print_string(PRINT_ANY,
825 "event", "event %s ",
826 link_events[event]);
827 }
828 }
829
830 int print_linkinfo(struct nlmsghdr *n, void *arg)
831 {
832 FILE *fp = (FILE *)arg;
833 struct ifinfomsg *ifi = NLMSG_DATA(n);
834 struct rtattr *tb[IFLA_MAX+1];
835 int len = n->nlmsg_len;
836 const char *name;
837 unsigned int m_flag = 0;
838 SPRINT_BUF(b1);
839
840 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
841 return 0;
842
843 len -= NLMSG_LENGTH(sizeof(*ifi));
844 if (len < 0)
845 return -1;
846
847 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
848 return -1;
849 if (filter.up && !(ifi->ifi_flags&IFF_UP))
850 return -1;
851
852 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
853
854 name = get_ifname_rta(ifi->ifi_index, tb[IFLA_IFNAME]);
855 if (!name)
856 return -1;
857
858 if (filter.label)
859 return 0;
860
861 if (tb[IFLA_GROUP]) {
862 int group = rta_getattr_u32(tb[IFLA_GROUP]);
863
864 if (filter.group != -1 && group != filter.group)
865 return -1;
866 }
867
868 if (tb[IFLA_MASTER]) {
869 int master = rta_getattr_u32(tb[IFLA_MASTER]);
870
871 if (filter.master > 0 && master != filter.master)
872 return -1;
873 } else if (filter.master > 0)
874 return -1;
875
876 if (filter.kind && match_link_kind(tb, filter.kind, 0))
877 return -1;
878
879 if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1))
880 return -1;
881
882 if (n->nlmsg_type == RTM_DELLINK)
883 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
884
885 if (brief)
886 return print_linkinfo_brief(fp, name, ifi, tb);
887
888 print_int(PRINT_ANY, "ifindex", "%d: ", ifi->ifi_index);
889
890 m_flag = print_name_and_link("%s: ", name, tb);
891 print_link_flags(fp, ifi->ifi_flags, m_flag);
892
893 if (tb[IFLA_MTU])
894 print_int(PRINT_ANY,
895 "mtu", "mtu %u ",
896 rta_getattr_u32(tb[IFLA_MTU]));
897 if (tb[IFLA_XDP])
898 xdp_dump(fp, tb[IFLA_XDP], do_link, false);
899 if (tb[IFLA_QDISC])
900 print_string(PRINT_ANY,
901 "qdisc",
902 "qdisc %s ",
903 rta_getattr_str(tb[IFLA_QDISC]));
904 if (tb[IFLA_MASTER]) {
905 int master = rta_getattr_u32(tb[IFLA_MASTER]);
906
907 print_string(PRINT_ANY,
908 "master", "master %s ",
909 ll_index_to_name(master));
910 }
911
912 if (tb[IFLA_OPERSTATE])
913 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
914
915 if (do_link && tb[IFLA_LINKMODE])
916 print_linkmode(fp, tb[IFLA_LINKMODE]);
917
918 if (tb[IFLA_GROUP]) {
919 int group = rta_getattr_u32(tb[IFLA_GROUP]);
920
921 print_string(PRINT_ANY,
922 "group",
923 "group %s ",
924 rtnl_group_n2a(group, b1, sizeof(b1)));
925 }
926
927 if (filter.showqueue)
928 print_queuelen(fp, tb);
929
930 if (tb[IFLA_EVENT])
931 print_link_event(fp, rta_getattr_u32(tb[IFLA_EVENT]));
932
933 if (!filter.family || filter.family == AF_PACKET || show_details) {
934 print_nl();
935 print_string(PRINT_ANY,
936 "link_type",
937 " link/%s ",
938 ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
939 if (tb[IFLA_ADDRESS]) {
940 print_color_string(PRINT_ANY,
941 COLOR_MAC,
942 "address",
943 "%s",
944 ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]),
945 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
946 ifi->ifi_type,
947 b1, sizeof(b1)));
948 }
949 if (tb[IFLA_BROADCAST]) {
950 if (ifi->ifi_flags&IFF_POINTOPOINT) {
951 print_string(PRINT_FP, NULL, " peer ", NULL);
952 print_bool(PRINT_JSON,
953 "link_pointtopoint", NULL, true);
954 } else {
955 print_string(PRINT_FP, NULL, " brd ", NULL);
956 }
957 print_color_string(PRINT_ANY,
958 COLOR_MAC,
959 "broadcast",
960 "%s",
961 ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]),
962 RTA_PAYLOAD(tb[IFLA_BROADCAST]),
963 ifi->ifi_type,
964 b1, sizeof(b1)));
965 }
966 }
967
968 if (tb[IFLA_LINK_NETNSID]) {
969 int id = rta_getattr_u32(tb[IFLA_LINK_NETNSID]);
970
971 if (is_json_context()) {
972 print_int(PRINT_JSON, "link_netnsid", NULL, id);
973 } else {
974 if (id >= 0) {
975 char *name = get_name_from_nsid(id);
976
977 if (name)
978 print_string(PRINT_FP, NULL,
979 " link-netns %s", name);
980 else
981 print_int(PRINT_FP, NULL,
982 " link-netnsid %d", id);
983 } else
984 print_string(PRINT_FP, NULL,
985 " link-netnsid %s", "unknown");
986 }
987 }
988
989 if (tb[IFLA_NEW_NETNSID]) {
990 int id = rta_getattr_u32(tb[IFLA_NEW_NETNSID]);
991 char *name = get_name_from_nsid(id);
992
993 if (name)
994 print_string(PRINT_FP, NULL, " new-netns %s", name);
995 else
996 print_int(PRINT_FP, NULL, " new-netnsid %d", id);
997 }
998 if (tb[IFLA_NEW_IFINDEX]) {
999 int id = rta_getattr_u32(tb[IFLA_NEW_IFINDEX]);
1000
1001 print_int(PRINT_FP, NULL, " new-ifindex %d", id);
1002 }
1003
1004 if (tb[IFLA_PROTO_DOWN]) {
1005 if (rta_getattr_u8(tb[IFLA_PROTO_DOWN]))
1006 print_bool(PRINT_ANY,
1007 "proto_down", " protodown on ", true);
1008 }
1009
1010 if (show_details) {
1011 if (tb[IFLA_PROMISCUITY])
1012 print_uint(PRINT_ANY,
1013 "promiscuity",
1014 " promiscuity %u ",
1015 rta_getattr_u32(tb[IFLA_PROMISCUITY]));
1016
1017 if (tb[IFLA_MIN_MTU])
1018 print_uint(PRINT_ANY,
1019 "min_mtu", "minmtu %u ",
1020 rta_getattr_u32(tb[IFLA_MIN_MTU]));
1021
1022 if (tb[IFLA_MAX_MTU])
1023 print_uint(PRINT_ANY,
1024 "max_mtu", "maxmtu %u ",
1025 rta_getattr_u32(tb[IFLA_MAX_MTU]));
1026
1027 if (tb[IFLA_LINKINFO])
1028 print_linktype(fp, tb[IFLA_LINKINFO]);
1029
1030 if (do_link && tb[IFLA_AF_SPEC])
1031 print_af_spec(fp, tb[IFLA_AF_SPEC]);
1032
1033 if (tb[IFLA_NUM_TX_QUEUES])
1034 print_uint(PRINT_ANY,
1035 "num_tx_queues",
1036 "numtxqueues %u ",
1037 rta_getattr_u32(tb[IFLA_NUM_TX_QUEUES]));
1038
1039 if (tb[IFLA_NUM_RX_QUEUES])
1040 print_uint(PRINT_ANY,
1041 "num_rx_queues",
1042 "numrxqueues %u ",
1043 rta_getattr_u32(tb[IFLA_NUM_RX_QUEUES]));
1044
1045 if (tb[IFLA_GSO_MAX_SIZE])
1046 print_uint(PRINT_ANY,
1047 "gso_max_size",
1048 "gso_max_size %u ",
1049 rta_getattr_u32(tb[IFLA_GSO_MAX_SIZE]));
1050
1051 if (tb[IFLA_GSO_MAX_SEGS])
1052 print_uint(PRINT_ANY,
1053 "gso_max_segs",
1054 "gso_max_segs %u ",
1055 rta_getattr_u32(tb[IFLA_GSO_MAX_SEGS]));
1056
1057 if (tb[IFLA_PHYS_PORT_NAME])
1058 print_string(PRINT_ANY,
1059 "phys_port_name",
1060 "portname %s ",
1061 rta_getattr_str(tb[IFLA_PHYS_PORT_NAME]));
1062
1063 if (tb[IFLA_PHYS_PORT_ID]) {
1064 print_string(PRINT_ANY,
1065 "phys_port_id",
1066 "portid %s ",
1067 hexstring_n2a(
1068 RTA_DATA(tb[IFLA_PHYS_PORT_ID]),
1069 RTA_PAYLOAD(tb[IFLA_PHYS_PORT_ID]),
1070 b1, sizeof(b1)));
1071 }
1072
1073 if (tb[IFLA_PHYS_SWITCH_ID]) {
1074 print_string(PRINT_ANY,
1075 "phys_switch_id",
1076 "switchid %s ",
1077 hexstring_n2a(RTA_DATA(tb[IFLA_PHYS_SWITCH_ID]),
1078 RTA_PAYLOAD(tb[IFLA_PHYS_SWITCH_ID]),
1079 b1, sizeof(b1)));
1080 }
1081 }
1082
1083 if ((do_link || show_details) && tb[IFLA_IFALIAS]) {
1084 print_string(PRINT_FP, NULL, "%s ", _SL_);
1085 print_string(PRINT_ANY,
1086 "ifalias",
1087 "alias %s",
1088 rta_getattr_str(tb[IFLA_IFALIAS]));
1089 }
1090
1091 if ((do_link || show_details) && tb[IFLA_XDP])
1092 xdp_dump(fp, tb[IFLA_XDP], true, true);
1093
1094 if (do_link && show_stats) {
1095 print_nl();
1096 __print_link_stats(fp, tb);
1097 }
1098
1099 if ((do_link || show_details) && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) {
1100 struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST];
1101 int rem = RTA_PAYLOAD(vflist);
1102
1103 open_json_array(PRINT_JSON, "vfinfo_list");
1104 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
1105 open_json_object(NULL);
1106 print_vfinfo(fp, i);
1107 close_json_object();
1108 }
1109 close_json_array(PRINT_JSON, NULL);
1110 }
1111
1112 print_string(PRINT_FP, NULL, "%s", "\n");
1113 fflush(fp);
1114 return 1;
1115 }
1116
1117 static int flush_update(void)
1118 {
1119
1120 /*
1121 * Note that the kernel may delete multiple addresses for one
1122 * delete request (e.g. if ipv4 address promotion is disabled).
1123 * Since a flush operation is really a series of delete requests
1124 * its possible that we may request an address delete that has
1125 * already been done by the kernel. Therefore, ignore EADDRNOTAVAIL
1126 * errors returned from a flush request
1127 */
1128 if ((rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) &&
1129 (errno != EADDRNOTAVAIL)) {
1130 perror("Failed to send flush request");
1131 return -1;
1132 }
1133 filter.flushp = 0;
1134 return 0;
1135 }
1136
1137 static int set_lifetime(unsigned int *lifetime, char *argv)
1138 {
1139 if (strcmp(argv, "forever") == 0)
1140 *lifetime = INFINITY_LIFE_TIME;
1141 else if (get_u32(lifetime, argv, 0))
1142 return -1;
1143
1144 return 0;
1145 }
1146
1147 static unsigned int get_ifa_flags(struct ifaddrmsg *ifa,
1148 struct rtattr *ifa_flags_attr)
1149 {
1150 return ifa_flags_attr ? rta_getattr_u32(ifa_flags_attr) :
1151 ifa->ifa_flags;
1152 }
1153
1154 /* Mapping from argument to address flag mask */
1155 static const struct {
1156 const char *name;
1157 unsigned long value;
1158 } ifa_flag_names[] = {
1159 { "secondary", IFA_F_SECONDARY },
1160 { "temporary", IFA_F_SECONDARY },
1161 { "nodad", IFA_F_NODAD },
1162 { "optimistic", IFA_F_OPTIMISTIC },
1163 { "dadfailed", IFA_F_DADFAILED },
1164 { "home", IFA_F_HOMEADDRESS },
1165 { "deprecated", IFA_F_DEPRECATED },
1166 { "tentative", IFA_F_TENTATIVE },
1167 { "permanent", IFA_F_PERMANENT },
1168 { "mngtmpaddr", IFA_F_MANAGETEMPADDR },
1169 { "noprefixroute", IFA_F_NOPREFIXROUTE },
1170 { "autojoin", IFA_F_MCAUTOJOIN },
1171 { "stable-privacy", IFA_F_STABLE_PRIVACY },
1172 };
1173
1174 static void print_ifa_flags(FILE *fp, const struct ifaddrmsg *ifa,
1175 unsigned int flags)
1176 {
1177 unsigned int i;
1178
1179 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1180 unsigned long mask = ifa_flag_names[i].value;
1181
1182 if (mask == IFA_F_PERMANENT) {
1183 if (!(flags & mask))
1184 print_bool(PRINT_ANY,
1185 "dynamic", "dynamic ", true);
1186 } else if (flags & mask) {
1187 if (mask == IFA_F_SECONDARY &&
1188 ifa->ifa_family == AF_INET6) {
1189 print_bool(PRINT_ANY,
1190 "temporary", "temporary ", true);
1191 } else {
1192 print_string(PRINT_FP, NULL,
1193 "%s ", ifa_flag_names[i].name);
1194 print_bool(PRINT_JSON,
1195 ifa_flag_names[i].name, NULL, true);
1196 }
1197 }
1198
1199 flags &= ~mask;
1200 }
1201
1202 if (flags) {
1203 if (is_json_context()) {
1204 SPRINT_BUF(b1);
1205
1206 snprintf(b1, sizeof(b1), "%02x", flags);
1207 print_string(PRINT_JSON, "ifa_flags", NULL, b1);
1208 } else {
1209 fprintf(fp, "flags %02x ", flags);
1210 }
1211 }
1212
1213 }
1214
1215 static int get_filter(const char *arg)
1216 {
1217 bool inv = false;
1218 unsigned int i;
1219
1220 if (arg[0] == '-') {
1221 inv = true;
1222 arg++;
1223 }
1224
1225 /* Special cases */
1226 if (strcmp(arg, "dynamic") == 0) {
1227 inv = !inv;
1228 arg = "permanent";
1229 } else if (strcmp(arg, "primary") == 0) {
1230 inv = !inv;
1231 arg = "secondary";
1232 }
1233
1234 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1235 if (strcmp(arg, ifa_flag_names[i].name))
1236 continue;
1237
1238 if (inv)
1239 filter.flags &= ~ifa_flag_names[i].value;
1240 else
1241 filter.flags |= ifa_flag_names[i].value;
1242 filter.flagmask |= ifa_flag_names[i].value;
1243 return 0;
1244 }
1245 return -1;
1246 }
1247
1248 static int ifa_label_match_rta(int ifindex, const struct rtattr *rta)
1249 {
1250 const char *label;
1251
1252 if (!filter.label)
1253 return 0;
1254
1255 if (rta)
1256 label = RTA_DATA(rta);
1257 else
1258 label = ll_index_to_name(ifindex);
1259
1260 return fnmatch(filter.label, label, 0);
1261 }
1262
1263 int print_addrinfo(struct nlmsghdr *n, void *arg)
1264 {
1265 FILE *fp = arg;
1266 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1267 int len = n->nlmsg_len;
1268 unsigned int ifa_flags;
1269 struct rtattr *rta_tb[IFA_MAX+1];
1270
1271 SPRINT_BUF(b1);
1272
1273 if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR)
1274 return 0;
1275 len -= NLMSG_LENGTH(sizeof(*ifa));
1276 if (len < 0) {
1277 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
1278 return -1;
1279 }
1280
1281 if (filter.flushb && n->nlmsg_type != RTM_NEWADDR)
1282 return 0;
1283
1284 parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa),
1285 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
1286
1287 ifa_flags = get_ifa_flags(ifa, rta_tb[IFA_FLAGS]);
1288
1289 if (!rta_tb[IFA_LOCAL])
1290 rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1291 if (!rta_tb[IFA_ADDRESS])
1292 rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
1293
1294 if (filter.ifindex && filter.ifindex != ifa->ifa_index)
1295 return 0;
1296 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1297 return 0;
1298 if ((filter.flags ^ ifa_flags) & filter.flagmask)
1299 return 0;
1300
1301 if (filter.family && filter.family != ifa->ifa_family)
1302 return 0;
1303
1304 if (ifa_label_match_rta(ifa->ifa_index, rta_tb[IFA_LABEL]))
1305 return 0;
1306
1307 if (inet_addr_match_rta(&filter.pfx, rta_tb[IFA_LOCAL]))
1308 return 0;
1309
1310 if (filter.flushb) {
1311 struct nlmsghdr *fn;
1312
1313 if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
1314 if (flush_update())
1315 return -1;
1316 }
1317 fn = (struct nlmsghdr *)(filter.flushb + NLMSG_ALIGN(filter.flushp));
1318 memcpy(fn, n, n->nlmsg_len);
1319 fn->nlmsg_type = RTM_DELADDR;
1320 fn->nlmsg_flags = NLM_F_REQUEST;
1321 fn->nlmsg_seq = ++rth.seq;
1322 filter.flushp = (((char *)fn) + n->nlmsg_len) - filter.flushb;
1323 filter.flushed++;
1324 if (show_stats < 2)
1325 return 0;
1326 }
1327
1328 if (n->nlmsg_type == RTM_DELADDR)
1329 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
1330
1331 if (!brief) {
1332 const char *name;
1333
1334 if (filter.oneline || filter.flushb) {
1335 const char *dev = ll_index_to_name(ifa->ifa_index);
1336
1337 if (is_json_context()) {
1338 print_int(PRINT_JSON,
1339 "index", NULL, ifa->ifa_index);
1340 print_string(PRINT_JSON, "dev", NULL, dev);
1341 } else {
1342 fprintf(fp, "%u: %s", ifa->ifa_index, dev);
1343 }
1344 }
1345
1346 name = family_name(ifa->ifa_family);
1347 if (*name != '?') {
1348 print_string(PRINT_ANY, "family", " %s ", name);
1349 } else {
1350 print_int(PRINT_ANY, "family_index", " family %d ",
1351 ifa->ifa_family);
1352 }
1353 }
1354
1355 if (rta_tb[IFA_LOCAL]) {
1356 print_color_string(PRINT_ANY,
1357 ifa_family_color(ifa->ifa_family),
1358 "local", "%s",
1359 format_host_rta(ifa->ifa_family,
1360 rta_tb[IFA_LOCAL]));
1361 if (rta_tb[IFA_ADDRESS] &&
1362 memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
1363 RTA_DATA(rta_tb[IFA_LOCAL]),
1364 ifa->ifa_family == AF_INET ? 4 : 16)) {
1365 print_string(PRINT_FP, NULL, " %s ", "peer");
1366 print_color_string(PRINT_ANY,
1367 ifa_family_color(ifa->ifa_family),
1368 "address",
1369 "%s",
1370 format_host_rta(ifa->ifa_family,
1371 rta_tb[IFA_ADDRESS]));
1372 }
1373 print_int(PRINT_ANY, "prefixlen", "/%d ", ifa->ifa_prefixlen);
1374
1375 if (rta_tb[IFA_RT_PRIORITY])
1376 print_uint(PRINT_ANY, "metric", "metric %u ",
1377 rta_getattr_u32(rta_tb[IFA_RT_PRIORITY]));
1378 }
1379
1380 if (brief)
1381 goto brief_exit;
1382
1383 if (rta_tb[IFA_BROADCAST]) {
1384 print_string(PRINT_FP, NULL, "%s ", "brd");
1385 print_color_string(PRINT_ANY,
1386 ifa_family_color(ifa->ifa_family),
1387 "broadcast",
1388 "%s ",
1389 format_host_rta(ifa->ifa_family,
1390 rta_tb[IFA_BROADCAST]));
1391 }
1392
1393 if (rta_tb[IFA_ANYCAST]) {
1394 print_string(PRINT_FP, NULL, "%s ", "any");
1395 print_color_string(PRINT_ANY,
1396 ifa_family_color(ifa->ifa_family),
1397 "anycast",
1398 "%s ",
1399 format_host_rta(ifa->ifa_family,
1400 rta_tb[IFA_ANYCAST]));
1401 }
1402
1403 print_string(PRINT_ANY,
1404 "scope",
1405 "scope %s ",
1406 rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1)));
1407
1408 print_ifa_flags(fp, ifa, ifa_flags);
1409
1410 if (rta_tb[IFA_LABEL])
1411 print_string(PRINT_ANY,
1412 "label",
1413 "%s",
1414 rta_getattr_str(rta_tb[IFA_LABEL]));
1415
1416 if (rta_tb[IFA_CACHEINFO]) {
1417 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
1418
1419 print_nl();
1420 print_string(PRINT_FP, NULL, " valid_lft ", NULL);
1421
1422 if (ci->ifa_valid == INFINITY_LIFE_TIME) {
1423 print_uint(PRINT_JSON,
1424 "valid_life_time",
1425 NULL, INFINITY_LIFE_TIME);
1426 print_string(PRINT_FP, NULL, "%s", "forever");
1427 } else {
1428 print_uint(PRINT_ANY,
1429 "valid_life_time", "%usec", ci->ifa_valid);
1430 }
1431
1432 print_string(PRINT_FP, NULL, " preferred_lft ", NULL);
1433 if (ci->ifa_prefered == INFINITY_LIFE_TIME) {
1434 print_uint(PRINT_JSON,
1435 "preferred_life_time",
1436 NULL, INFINITY_LIFE_TIME);
1437 print_string(PRINT_FP, NULL, "%s", "forever");
1438 } else {
1439 if (ifa_flags & IFA_F_DEPRECATED)
1440 print_int(PRINT_ANY,
1441 "preferred_life_time",
1442 "%dsec",
1443 ci->ifa_prefered);
1444 else
1445 print_uint(PRINT_ANY,
1446 "preferred_life_time",
1447 "%usec",
1448 ci->ifa_prefered);
1449 }
1450 }
1451 print_string(PRINT_FP, NULL, "%s", "\n");
1452 brief_exit:
1453 fflush(fp);
1454 return 0;
1455 }
1456
1457 static int print_selected_addrinfo(struct ifinfomsg *ifi,
1458 struct nlmsg_list *ainfo, FILE *fp)
1459 {
1460 open_json_array(PRINT_JSON, "addr_info");
1461 for ( ; ainfo ; ainfo = ainfo->next) {
1462 struct nlmsghdr *n = &ainfo->h;
1463 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1464
1465 if (n->nlmsg_type != RTM_NEWADDR)
1466 continue;
1467
1468 if (n->nlmsg_len < NLMSG_LENGTH(sizeof(*ifa)))
1469 return -1;
1470
1471 if (ifa->ifa_index != ifi->ifi_index ||
1472 (filter.family && filter.family != ifa->ifa_family))
1473 continue;
1474
1475 if (filter.up && !(ifi->ifi_flags&IFF_UP))
1476 continue;
1477
1478 open_json_object(NULL);
1479 print_addrinfo(n, fp);
1480 close_json_object();
1481 }
1482 close_json_array(PRINT_JSON, NULL);
1483
1484 if (brief) {
1485 print_string(PRINT_FP, NULL, "%s", "\n");
1486 fflush(fp);
1487 }
1488 return 0;
1489 }
1490
1491
1492 static int store_nlmsg(struct nlmsghdr *n, void *arg)
1493 {
1494 struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg;
1495 struct nlmsg_list *h;
1496
1497 h = malloc(n->nlmsg_len+sizeof(void *));
1498 if (h == NULL)
1499 return -1;
1500
1501 memcpy(&h->h, n, n->nlmsg_len);
1502 h->next = NULL;
1503
1504 if (lchain->tail)
1505 lchain->tail->next = h;
1506 else
1507 lchain->head = h;
1508 lchain->tail = h;
1509
1510 ll_remember_index(n, NULL);
1511 return 0;
1512 }
1513
1514 static __u32 ipadd_dump_magic = 0x47361222;
1515
1516 static int ipadd_save_prep(void)
1517 {
1518 int ret;
1519
1520 if (isatty(STDOUT_FILENO)) {
1521 fprintf(stderr, "Not sending a binary stream to stdout\n");
1522 return -1;
1523 }
1524
1525 ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic));
1526 if (ret != sizeof(ipadd_dump_magic)) {
1527 fprintf(stderr, "Can't write magic to dump file\n");
1528 return -1;
1529 }
1530
1531 return 0;
1532 }
1533
1534 static int ipadd_dump_check_magic(void)
1535 {
1536 int ret;
1537 __u32 magic = 0;
1538
1539 if (isatty(STDIN_FILENO)) {
1540 fprintf(stderr, "Can't restore address dump from a terminal\n");
1541 return -1;
1542 }
1543
1544 ret = fread(&magic, sizeof(magic), 1, stdin);
1545 if (magic != ipadd_dump_magic) {
1546 fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
1547 return -1;
1548 }
1549
1550 return 0;
1551 }
1552
1553 static int save_nlmsg(struct nlmsghdr *n, void *arg)
1554 {
1555 int ret;
1556
1557 ret = write(STDOUT_FILENO, n, n->nlmsg_len);
1558 if ((ret > 0) && (ret != n->nlmsg_len)) {
1559 fprintf(stderr, "Short write while saving nlmsg\n");
1560 ret = -EIO;
1561 }
1562
1563 return ret == n->nlmsg_len ? 0 : ret;
1564 }
1565
1566 static int show_handler(struct rtnl_ctrl_data *ctrl,
1567 struct nlmsghdr *n, void *arg)
1568 {
1569 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1570
1571 open_json_object(NULL);
1572 print_int(PRINT_ANY, "index", "if%d:\n", ifa->ifa_index);
1573 print_addrinfo(n, stdout);
1574 close_json_object();
1575 return 0;
1576 }
1577
1578 static int ipaddr_showdump(void)
1579 {
1580 int err;
1581
1582 if (ipadd_dump_check_magic())
1583 exit(-1);
1584
1585 new_json_obj(json);
1586 open_json_object(NULL);
1587 open_json_array(PRINT_JSON, "addr_info");
1588
1589 err = rtnl_from_file(stdin, &show_handler, NULL);
1590
1591 close_json_array(PRINT_JSON, NULL);
1592 close_json_object();
1593 delete_json_obj();
1594
1595 exit(err);
1596 }
1597
1598 static int restore_handler(struct rtnl_ctrl_data *ctrl,
1599 struct nlmsghdr *n, void *arg)
1600 {
1601 int ret;
1602
1603 n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
1604
1605 ll_init_map(&rth);
1606
1607 ret = rtnl_talk(&rth, n, NULL);
1608 if ((ret < 0) && (errno == EEXIST))
1609 ret = 0;
1610
1611 return ret;
1612 }
1613
1614 static int ipaddr_restore(void)
1615 {
1616 if (ipadd_dump_check_magic())
1617 exit(-1);
1618
1619 exit(rtnl_from_file(stdin, &restore_handler, NULL));
1620 }
1621
1622 void free_nlmsg_chain(struct nlmsg_chain *info)
1623 {
1624 struct nlmsg_list *l, *n;
1625
1626 for (l = info->head; l; l = n) {
1627 n = l->next;
1628 free(l);
1629 }
1630 }
1631
1632 static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1633 {
1634 struct nlmsg_list *l, **lp;
1635
1636 lp = &linfo->head;
1637 while ((l = *lp) != NULL) {
1638 int ok = 0;
1639 int missing_net_address = 1;
1640 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
1641 struct nlmsg_list *a;
1642
1643 for (a = ainfo->head; a; a = a->next) {
1644 struct nlmsghdr *n = &a->h;
1645 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1646 struct rtattr *tb[IFA_MAX + 1];
1647 unsigned int ifa_flags;
1648
1649 if (ifa->ifa_index != ifi->ifi_index)
1650 continue;
1651 missing_net_address = 0;
1652 if (filter.family && filter.family != ifa->ifa_family)
1653 continue;
1654 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1655 continue;
1656
1657 parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n));
1658 ifa_flags = get_ifa_flags(ifa, tb[IFA_FLAGS]);
1659
1660 if ((filter.flags ^ ifa_flags) & filter.flagmask)
1661 continue;
1662
1663 if (ifa_label_match_rta(ifa->ifa_index, tb[IFA_LABEL]))
1664 continue;
1665
1666 if (!tb[IFA_LOCAL])
1667 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
1668 if (inet_addr_match_rta(&filter.pfx, tb[IFA_LOCAL]))
1669 continue;
1670
1671 ok = 1;
1672 break;
1673 }
1674 if (missing_net_address &&
1675 (filter.family == AF_UNSPEC || filter.family == AF_PACKET))
1676 ok = 1;
1677 if (!ok) {
1678 *lp = l->next;
1679 free(l);
1680 } else
1681 lp = &l->next;
1682 }
1683 }
1684
1685 static int ipaddr_dump_filter(struct nlmsghdr *nlh, int reqlen)
1686 {
1687 struct ifaddrmsg *ifa = NLMSG_DATA(nlh);
1688
1689 ifa->ifa_index = filter.ifindex;
1690
1691 return 0;
1692 }
1693
1694 static int ipaddr_flush(void)
1695 {
1696 int round = 0;
1697 char flushb[4096-512];
1698
1699 filter.flushb = flushb;
1700 filter.flushp = 0;
1701 filter.flushe = sizeof(flushb);
1702
1703 while ((max_flush_loops == 0) || (round < max_flush_loops)) {
1704 if (rtnl_addrdump_req(&rth, filter.family,
1705 ipaddr_dump_filter) < 0) {
1706 perror("Cannot send dump request");
1707 exit(1);
1708 }
1709 filter.flushed = 0;
1710 if (rtnl_dump_filter_nc(&rth, print_addrinfo,
1711 stdout, NLM_F_DUMP_INTR) < 0) {
1712 fprintf(stderr, "Flush terminated\n");
1713 exit(1);
1714 }
1715 if (filter.flushed == 0) {
1716 flush_done:
1717 if (show_stats) {
1718 if (round == 0)
1719 printf("Nothing to flush.\n");
1720 else
1721 printf("*** Flush is complete after %d round%s ***\n", round, round > 1?"s":"");
1722 }
1723 fflush(stdout);
1724 return 0;
1725 }
1726 round++;
1727 if (flush_update() < 0)
1728 return 1;
1729
1730 if (show_stats) {
1731 printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed);
1732 fflush(stdout);
1733 }
1734
1735 /* If we are flushing, and specifying primary, then we
1736 * want to flush only a single round. Otherwise, we'll
1737 * start flushing secondaries that were promoted to
1738 * primaries.
1739 */
1740 if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY))
1741 goto flush_done;
1742 }
1743 fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops);
1744 fflush(stderr);
1745 return 1;
1746 }
1747
1748 static int iplink_filter_req(struct nlmsghdr *nlh, int reqlen)
1749 {
1750 int err;
1751
1752 err = addattr32(nlh, reqlen, IFLA_EXT_MASK, RTEXT_FILTER_VF);
1753 if (err)
1754 return err;
1755
1756 if (filter.master) {
1757 err = addattr32(nlh, reqlen, IFLA_MASTER, filter.master);
1758 if (err)
1759 return err;
1760 }
1761
1762 if (filter.kind) {
1763 struct rtattr *linkinfo;
1764
1765 linkinfo = addattr_nest(nlh, reqlen, IFLA_LINKINFO);
1766
1767 err = addattr_l(nlh, reqlen, IFLA_INFO_KIND, filter.kind,
1768 strlen(filter.kind));
1769 if (err)
1770 return err;
1771
1772 addattr_nest_end(nlh, linkinfo);
1773 }
1774
1775 return 0;
1776 }
1777
1778 static int ipaddr_link_get(int index, struct nlmsg_chain *linfo)
1779 {
1780 struct iplink_req req = {
1781 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
1782 .n.nlmsg_flags = NLM_F_REQUEST,
1783 .n.nlmsg_type = RTM_GETLINK,
1784 .i.ifi_family = filter.family,
1785 .i.ifi_index = index,
1786 };
1787 __u32 filt_mask = RTEXT_FILTER_VF;
1788 struct nlmsghdr *answer;
1789
1790 if (!show_stats)
1791 filt_mask |= RTEXT_FILTER_SKIP_STATS;
1792
1793 addattr32(&req.n, sizeof(req), IFLA_EXT_MASK, filt_mask);
1794
1795 if (rtnl_talk(&rth, &req.n, &answer) < 0) {
1796 perror("Cannot send link request");
1797 return 1;
1798 }
1799
1800 if (store_nlmsg(answer, linfo) < 0) {
1801 fprintf(stderr, "Failed to process link information\n");
1802 return 1;
1803 }
1804
1805 return 0;
1806 }
1807
1808 /* fills in linfo with link data and optionally ainfo with address info
1809 * caller can walk lists as desired and must call free_nlmsg_chain for
1810 * both when done
1811 */
1812 int ip_link_list(req_filter_fn_t filter_fn, struct nlmsg_chain *linfo)
1813 {
1814 if (rtnl_linkdump_req_filter_fn(&rth, preferred_family,
1815 filter_fn) < 0) {
1816 perror("Cannot send dump request");
1817 return 1;
1818 }
1819
1820 if (rtnl_dump_filter(&rth, store_nlmsg, linfo) < 0) {
1821 fprintf(stderr, "Dump terminated\n");
1822 return 1;
1823 }
1824
1825 return 0;
1826 }
1827
1828 static int ip_addr_list(struct nlmsg_chain *ainfo)
1829 {
1830 if (rtnl_addrdump_req(&rth, filter.family, ipaddr_dump_filter) < 0) {
1831 perror("Cannot send dump request");
1832 return 1;
1833 }
1834
1835 if (rtnl_dump_filter(&rth, store_nlmsg, ainfo) < 0) {
1836 fprintf(stderr, "Dump terminated\n");
1837 return 1;
1838 }
1839
1840 return 0;
1841 }
1842
1843 static int ipaddr_list_flush_or_save(int argc, char **argv, int action)
1844 {
1845 struct nlmsg_chain linfo = { NULL, NULL};
1846 struct nlmsg_chain _ainfo = { NULL, NULL}, *ainfo = &_ainfo;
1847 struct nlmsg_list *l;
1848 char *filter_dev = NULL;
1849 int no_link = 0;
1850
1851 ipaddr_reset_filter(oneline, 0);
1852 filter.showqueue = 1;
1853 filter.family = preferred_family;
1854 filter.group = -1;
1855
1856 if (action == IPADD_FLUSH) {
1857 if (argc <= 0) {
1858 fprintf(stderr, "Flush requires arguments.\n");
1859
1860 return -1;
1861 }
1862 if (filter.family == AF_PACKET) {
1863 fprintf(stderr, "Cannot flush link addresses.\n");
1864 return -1;
1865 }
1866 }
1867
1868 while (argc > 0) {
1869 if (strcmp(*argv, "to") == 0) {
1870 NEXT_ARG();
1871 if (get_prefix(&filter.pfx, *argv, filter.family))
1872 invarg("invalid \"to\"\n", *argv);
1873 if (filter.family == AF_UNSPEC)
1874 filter.family = filter.pfx.family;
1875 } else if (strcmp(*argv, "scope") == 0) {
1876 unsigned int scope = 0;
1877
1878 NEXT_ARG();
1879 filter.scopemask = -1;
1880 if (rtnl_rtscope_a2n(&scope, *argv)) {
1881 if (strcmp(*argv, "all") != 0)
1882 invarg("invalid \"scope\"\n", *argv);
1883 scope = RT_SCOPE_NOWHERE;
1884 filter.scopemask = 0;
1885 }
1886 filter.scope = scope;
1887 } else if (strcmp(*argv, "up") == 0) {
1888 filter.up = 1;
1889 } else if (get_filter(*argv) == 0) {
1890
1891 } else if (strcmp(*argv, "label") == 0) {
1892 NEXT_ARG();
1893 filter.label = *argv;
1894 } else if (strcmp(*argv, "group") == 0) {
1895 NEXT_ARG();
1896 if (rtnl_group_a2n(&filter.group, *argv))
1897 invarg("Invalid \"group\" value\n", *argv);
1898 } else if (strcmp(*argv, "master") == 0) {
1899 int ifindex;
1900
1901 NEXT_ARG();
1902 ifindex = ll_name_to_index(*argv);
1903 if (!ifindex)
1904 invarg("Device does not exist\n", *argv);
1905 filter.master = ifindex;
1906 } else if (strcmp(*argv, "vrf") == 0) {
1907 int ifindex;
1908
1909 NEXT_ARG();
1910 ifindex = ll_name_to_index(*argv);
1911 if (!ifindex)
1912 invarg("Not a valid VRF name\n", *argv);
1913 if (!name_is_vrf(*argv))
1914 invarg("Not a valid VRF name\n", *argv);
1915 filter.master = ifindex;
1916 } else if (strcmp(*argv, "type") == 0) {
1917 int soff;
1918
1919 NEXT_ARG();
1920 soff = strlen(*argv) - strlen("_slave");
1921 if (!strcmp(*argv + soff, "_slave")) {
1922 (*argv)[soff] = '\0';
1923 filter.slave_kind = *argv;
1924 } else {
1925 filter.kind = *argv;
1926 }
1927 } else {
1928 if (strcmp(*argv, "dev") == 0)
1929 NEXT_ARG();
1930 else if (matches(*argv, "help") == 0)
1931 usage();
1932 if (filter_dev)
1933 duparg2("dev", *argv);
1934 filter_dev = *argv;
1935 }
1936 argv++; argc--;
1937 }
1938
1939 if (filter_dev) {
1940 filter.ifindex = ll_name_to_index(filter_dev);
1941 if (filter.ifindex <= 0) {
1942 fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev);
1943 return -1;
1944 }
1945 }
1946
1947 if (action == IPADD_FLUSH)
1948 return ipaddr_flush();
1949
1950 if (action == IPADD_SAVE) {
1951 if (ipadd_save_prep())
1952 exit(1);
1953
1954 if (rtnl_addrdump_req(&rth, preferred_family,
1955 ipaddr_dump_filter) < 0) {
1956 perror("Cannot send dump request");
1957 exit(1);
1958 }
1959
1960 if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) {
1961 fprintf(stderr, "Save terminated\n");
1962 exit(1);
1963 }
1964
1965 exit(0);
1966 }
1967
1968 /*
1969 * Initialize a json_writer and open an array object
1970 * if -json was specified.
1971 */
1972 new_json_obj(json);
1973
1974 /*
1975 * If only filter_dev present and none of the other
1976 * link filters are present, use RTM_GETLINK to get
1977 * the link device
1978 */
1979 if (filter_dev && filter.group == -1 && do_link == 1) {
1980 if (iplink_get(filter_dev, RTEXT_FILTER_VF) < 0) {
1981 perror("Cannot send link get request");
1982 delete_json_obj();
1983 exit(1);
1984 }
1985 delete_json_obj();
1986 goto out;
1987 }
1988
1989 if (filter.ifindex) {
1990 if (ipaddr_link_get(filter.ifindex, &linfo) != 0)
1991 goto out;
1992 } else {
1993 if (ip_link_list(iplink_filter_req, &linfo) != 0)
1994 goto out;
1995 }
1996
1997 if (filter.family != AF_PACKET) {
1998 if (filter.oneline)
1999 no_link = 1;
2000
2001 if (ip_addr_list(ainfo) != 0)
2002 goto out;
2003
2004 ipaddr_filter(&linfo, ainfo);
2005 }
2006
2007 for (l = linfo.head; l; l = l->next) {
2008 struct nlmsghdr *n = &l->h;
2009 struct ifinfomsg *ifi = NLMSG_DATA(n);
2010 int res = 0;
2011
2012 open_json_object(NULL);
2013 if (brief || !no_link)
2014 res = print_linkinfo(n, stdout);
2015 if (res >= 0 && filter.family != AF_PACKET)
2016 print_selected_addrinfo(ifi, ainfo->head, stdout);
2017 if (res > 0 && !do_link && show_stats)
2018 print_link_stats(stdout, n);
2019 close_json_object();
2020 }
2021 fflush(stdout);
2022
2023 out:
2024 free_nlmsg_chain(ainfo);
2025 free_nlmsg_chain(&linfo);
2026 delete_json_obj();
2027 return 0;
2028 }
2029
2030 static void
2031 ipaddr_loop_each_vf(struct rtattr *tb[], int vfnum, int *min, int *max)
2032 {
2033 struct rtattr *vflist = tb[IFLA_VFINFO_LIST];
2034 struct rtattr *i, *vf[IFLA_VF_MAX+1];
2035 struct ifla_vf_rate *vf_rate;
2036 int rem;
2037
2038 rem = RTA_PAYLOAD(vflist);
2039
2040 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
2041 parse_rtattr_nested(vf, IFLA_VF_MAX, i);
2042
2043 if (!vf[IFLA_VF_RATE]) {
2044 fprintf(stderr, "VF min/max rate API not supported\n");
2045 exit(1);
2046 }
2047
2048 vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
2049 if (vf_rate->vf == vfnum) {
2050 *min = vf_rate->min_tx_rate;
2051 *max = vf_rate->max_tx_rate;
2052 return;
2053 }
2054 }
2055 fprintf(stderr, "Cannot find VF %d\n", vfnum);
2056 exit(1);
2057 }
2058
2059 void ipaddr_get_vf_rate(int vfnum, int *min, int *max, const char *dev)
2060 {
2061 struct nlmsg_chain linfo = { NULL, NULL};
2062 struct rtattr *tb[IFLA_MAX+1];
2063 struct ifinfomsg *ifi;
2064 struct nlmsg_list *l;
2065 struct nlmsghdr *n;
2066 int idx, len;
2067
2068 idx = ll_name_to_index(dev);
2069 if (idx == 0) {
2070 fprintf(stderr, "Device %s does not exist\n", dev);
2071 exit(1);
2072 }
2073
2074 if (rtnl_linkdump_req(&rth, AF_UNSPEC) < 0) {
2075 perror("Cannot send dump request");
2076 exit(1);
2077 }
2078 if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) {
2079 fprintf(stderr, "Dump terminated\n");
2080 exit(1);
2081 }
2082 for (l = linfo.head; l; l = l->next) {
2083 n = &l->h;
2084 ifi = NLMSG_DATA(n);
2085
2086 len = n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi));
2087 if (len < 0 || (idx && idx != ifi->ifi_index))
2088 continue;
2089
2090 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
2091
2092 if ((tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF])) {
2093 ipaddr_loop_each_vf(tb, vfnum, min, max);
2094 return;
2095 }
2096 }
2097 }
2098
2099 int ipaddr_list_link(int argc, char **argv)
2100 {
2101 preferred_family = AF_PACKET;
2102 do_link = 1;
2103 return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST);
2104 }
2105
2106 void ipaddr_reset_filter(int oneline, int ifindex)
2107 {
2108 memset(&filter, 0, sizeof(filter));
2109 filter.oneline = oneline;
2110 filter.ifindex = ifindex;
2111 }
2112
2113 static int default_scope(inet_prefix *lcl)
2114 {
2115 if (lcl->family == AF_INET) {
2116 if (lcl->bytelen >= 1 && *(__u8 *)&lcl->data == 127)
2117 return RT_SCOPE_HOST;
2118 }
2119 return 0;
2120 }
2121
2122 static bool ipaddr_is_multicast(inet_prefix *a)
2123 {
2124 if (a->family == AF_INET)
2125 return IN_MULTICAST(ntohl(a->data[0]));
2126 else if (a->family == AF_INET6)
2127 return IN6_IS_ADDR_MULTICAST(a->data);
2128 else
2129 return false;
2130 }
2131
2132 static bool is_valid_label(const char *dev, const char *label)
2133 {
2134 size_t len = strlen(dev);
2135
2136 if (strncmp(label, dev, len) != 0)
2137 return false;
2138
2139 return label[len] == '\0' || label[len] == ':';
2140 }
2141
2142 static int ipaddr_modify(int cmd, int flags, int argc, char **argv)
2143 {
2144 struct {
2145 struct nlmsghdr n;
2146 struct ifaddrmsg ifa;
2147 char buf[256];
2148 } req = {
2149 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)),
2150 .n.nlmsg_flags = NLM_F_REQUEST | flags,
2151 .n.nlmsg_type = cmd,
2152 .ifa.ifa_family = preferred_family,
2153 };
2154 char *d = NULL;
2155 char *l = NULL;
2156 char *lcl_arg = NULL;
2157 char *valid_lftp = NULL;
2158 char *preferred_lftp = NULL;
2159 inet_prefix lcl = {};
2160 inet_prefix peer;
2161 int local_len = 0;
2162 int peer_len = 0;
2163 int brd_len = 0;
2164 int any_len = 0;
2165 int scoped = 0;
2166 __u32 preferred_lft = INFINITY_LIFE_TIME;
2167 __u32 valid_lft = INFINITY_LIFE_TIME;
2168 unsigned int ifa_flags = 0;
2169
2170 while (argc > 0) {
2171 if (strcmp(*argv, "peer") == 0 ||
2172 strcmp(*argv, "remote") == 0) {
2173 NEXT_ARG();
2174
2175 if (peer_len)
2176 duparg("peer", *argv);
2177 get_prefix(&peer, *argv, req.ifa.ifa_family);
2178 peer_len = peer.bytelen;
2179 if (req.ifa.ifa_family == AF_UNSPEC)
2180 req.ifa.ifa_family = peer.family;
2181 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen);
2182 req.ifa.ifa_prefixlen = peer.bitlen;
2183 } else if (matches(*argv, "broadcast") == 0 ||
2184 strcmp(*argv, "brd") == 0) {
2185 inet_prefix addr;
2186
2187 NEXT_ARG();
2188 if (brd_len)
2189 duparg("broadcast", *argv);
2190 if (strcmp(*argv, "+") == 0)
2191 brd_len = -1;
2192 else if (strcmp(*argv, "-") == 0)
2193 brd_len = -2;
2194 else {
2195 get_addr(&addr, *argv, req.ifa.ifa_family);
2196 if (req.ifa.ifa_family == AF_UNSPEC)
2197 req.ifa.ifa_family = addr.family;
2198 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen);
2199 brd_len = addr.bytelen;
2200 }
2201 } else if (strcmp(*argv, "anycast") == 0) {
2202 inet_prefix addr;
2203
2204 NEXT_ARG();
2205 if (any_len)
2206 duparg("anycast", *argv);
2207 get_addr(&addr, *argv, req.ifa.ifa_family);
2208 if (req.ifa.ifa_family == AF_UNSPEC)
2209 req.ifa.ifa_family = addr.family;
2210 addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen);
2211 any_len = addr.bytelen;
2212 } else if (strcmp(*argv, "scope") == 0) {
2213 unsigned int scope = 0;
2214
2215 NEXT_ARG();
2216 if (rtnl_rtscope_a2n(&scope, *argv))
2217 invarg("invalid scope value.", *argv);
2218 req.ifa.ifa_scope = scope;
2219 scoped = 1;
2220 } else if (strcmp(*argv, "dev") == 0) {
2221 NEXT_ARG();
2222 d = *argv;
2223 } else if (strcmp(*argv, "label") == 0) {
2224 NEXT_ARG();
2225 l = *argv;
2226 addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1);
2227 } else if (matches(*argv, "metric") == 0 ||
2228 matches(*argv, "priority") == 0 ||
2229 matches(*argv, "preference") == 0) {
2230 __u32 metric;
2231
2232 NEXT_ARG();
2233 if (get_u32(&metric, *argv, 0))
2234 invarg("\"metric\" value is invalid\n", *argv);
2235 addattr32(&req.n, sizeof(req), IFA_RT_PRIORITY, metric);
2236 } else if (matches(*argv, "valid_lft") == 0) {
2237 if (valid_lftp)
2238 duparg("valid_lft", *argv);
2239 NEXT_ARG();
2240 valid_lftp = *argv;
2241 if (set_lifetime(&valid_lft, *argv))
2242 invarg("valid_lft value", *argv);
2243 } else if (matches(*argv, "preferred_lft") == 0) {
2244 if (preferred_lftp)
2245 duparg("preferred_lft", *argv);
2246 NEXT_ARG();
2247 preferred_lftp = *argv;
2248 if (set_lifetime(&preferred_lft, *argv))
2249 invarg("preferred_lft value", *argv);
2250 } else if (strcmp(*argv, "home") == 0) {
2251 ifa_flags |= IFA_F_HOMEADDRESS;
2252 } else if (strcmp(*argv, "nodad") == 0) {
2253 ifa_flags |= IFA_F_NODAD;
2254 } else if (strcmp(*argv, "mngtmpaddr") == 0) {
2255 ifa_flags |= IFA_F_MANAGETEMPADDR;
2256 } else if (strcmp(*argv, "noprefixroute") == 0) {
2257 ifa_flags |= IFA_F_NOPREFIXROUTE;
2258 } else if (strcmp(*argv, "autojoin") == 0) {
2259 ifa_flags |= IFA_F_MCAUTOJOIN;
2260 } else {
2261 if (strcmp(*argv, "local") == 0)
2262 NEXT_ARG();
2263 if (matches(*argv, "help") == 0)
2264 usage();
2265 if (local_len)
2266 duparg2("local", *argv);
2267 lcl_arg = *argv;
2268 get_prefix(&lcl, *argv, req.ifa.ifa_family);
2269 if (req.ifa.ifa_family == AF_UNSPEC)
2270 req.ifa.ifa_family = lcl.family;
2271 addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen);
2272 local_len = lcl.bytelen;
2273 }
2274 argc--; argv++;
2275 }
2276 if (ifa_flags <= 0xff)
2277 req.ifa.ifa_flags = ifa_flags;
2278 else
2279 addattr32(&req.n, sizeof(req), IFA_FLAGS, ifa_flags);
2280
2281 if (d == NULL) {
2282 fprintf(stderr, "Not enough information: \"dev\" argument is required.\n");
2283 return -1;
2284 }
2285 if (l && !is_valid_label(d, l)) {
2286 fprintf(stderr,
2287 "\"label\" (%s) must match \"dev\" (%s) or be prefixed by \"dev\" with a colon.\n",
2288 l, d);
2289 return -1;
2290 }
2291
2292 if (peer_len == 0 && local_len) {
2293 if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) {
2294 fprintf(stderr,
2295 "Warning: Executing wildcard deletion to stay compatible with old scripts.\n"
2296 " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n"
2297 " This special behaviour is likely to disappear in further releases,\n"
2298 " fix your scripts!\n", lcl_arg, local_len*8);
2299 } else {
2300 peer = lcl;
2301 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen);
2302 }
2303 }
2304 if (req.ifa.ifa_prefixlen == 0)
2305 req.ifa.ifa_prefixlen = lcl.bitlen;
2306
2307 if (brd_len < 0 && cmd != RTM_DELADDR) {
2308 inet_prefix brd;
2309 int i;
2310
2311 if (req.ifa.ifa_family != AF_INET) {
2312 fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n");
2313 return -1;
2314 }
2315 brd = peer;
2316 if (brd.bitlen <= 30) {
2317 for (i = 31; i >= brd.bitlen; i--) {
2318 if (brd_len == -1)
2319 brd.data[0] |= htonl(1<<(31-i));
2320 else
2321 brd.data[0] &= ~htonl(1<<(31-i));
2322 }
2323 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen);
2324 brd_len = brd.bytelen;
2325 }
2326 }
2327 if (!scoped && cmd != RTM_DELADDR)
2328 req.ifa.ifa_scope = default_scope(&lcl);
2329
2330 req.ifa.ifa_index = ll_name_to_index(d);
2331 if (!req.ifa.ifa_index)
2332 return nodev(d);
2333
2334 if (valid_lftp || preferred_lftp) {
2335 struct ifa_cacheinfo cinfo = {};
2336
2337 if (!valid_lft) {
2338 fprintf(stderr, "valid_lft is zero\n");
2339 return -1;
2340 }
2341 if (valid_lft < preferred_lft) {
2342 fprintf(stderr, "preferred_lft is greater than valid_lft\n");
2343 return -1;
2344 }
2345
2346 cinfo.ifa_prefered = preferred_lft;
2347 cinfo.ifa_valid = valid_lft;
2348 addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo,
2349 sizeof(cinfo));
2350 }
2351
2352 if ((ifa_flags & IFA_F_MCAUTOJOIN) && !ipaddr_is_multicast(&lcl)) {
2353 fprintf(stderr, "autojoin needs multicast address\n");
2354 return -1;
2355 }
2356
2357 if (rtnl_talk(&rth, &req.n, NULL) < 0)
2358 return -2;
2359
2360 return 0;
2361 }
2362
2363 int do_ipaddr(int argc, char **argv)
2364 {
2365 if (argc < 1)
2366 return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST);
2367 if (matches(*argv, "add") == 0)
2368 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
2369 if (matches(*argv, "change") == 0 ||
2370 strcmp(*argv, "chg") == 0)
2371 return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1);
2372 if (matches(*argv, "replace") == 0)
2373 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
2374 if (matches(*argv, "delete") == 0)
2375 return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1);
2376 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
2377 || matches(*argv, "lst") == 0)
2378 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST);
2379 if (matches(*argv, "flush") == 0)
2380 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH);
2381 if (matches(*argv, "save") == 0)
2382 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE);
2383 if (matches(*argv, "showdump") == 0)
2384 return ipaddr_showdump();
2385 if (matches(*argv, "restore") == 0)
2386 return ipaddr_restore();
2387 if (matches(*argv, "help") == 0)
2388 usage();
2389 fprintf(stderr, "Command \"%s\" is unknown, try \"ip address help\".\n", *argv);
2390 exit(-1);
2391 }