]> git.proxmox.com Git - mirror_iproute2.git/blame - ip/ipaddress.c
rdma: Properly mark RDMAtool license
[mirror_iproute2.git] / ip / ipaddress.c
CommitLineData
aba5acdf
SH
1/*
2 * ipaddress.c "ip address".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
aba5acdf
SH
11 */
12
13#include <stdio.h>
14#include <stdlib.h>
15#include <unistd.h>
e6e6fb5c 16#include <inttypes.h>
aba5acdf
SH
17#include <fcntl.h>
18#include <sys/ioctl.h>
19#include <sys/socket.h>
110e84a0 20#include <sys/param.h>
5bd9dd49 21#include <errno.h>
aba5acdf
SH
22#include <netinet/in.h>
23#include <arpa/inet.h>
24#include <string.h>
25#include <fnmatch.h>
26
e5779fb2
SH
27#include <linux/netdevice.h>
28#include <linux/if_arp.h>
29#include <linux/sockios.h>
ccdcbf35 30#include <linux/net_namespace.h>
e5779fb2 31
d0e72011 32#include "utils.h"
aba5acdf
SH
33#include "rt_names.h"
34#include "utils.h"
35#include "ll_map.h"
36#include "ip_common.h"
d7bd2db5 37#include "color.h"
aba5acdf 38
81824ac2
PE
39enum {
40 IPADD_LIST,
41 IPADD_FLUSH,
42 IPADD_SAVE,
43};
7b3d366e 44
741dd5cd 45static struct link_filter filter;
aba5acdf
SH
46static int do_link;
47
48static void usage(void) __attribute__((noreturn));
49
50static void usage(void)
51{
c8f7a754 52 if (do_link)
aba5acdf 53 iplink_usage();
c8f7a754 54
4e972d5e 55 fprintf(stderr, "Usage: ip address {add|change|replace} IFADDR dev IFNAME [ LIFETIME ]\n");
a1f27794 56 fprintf(stderr, " [ CONFFLAG-LIST ]\n");
4e972d5e 57 fprintf(stderr, " ip address del IFADDR dev IFNAME [mngtmpaddr]\n");
24604eb2 58 fprintf(stderr, " ip address {save|flush} [ dev IFNAME ] [ scope SCOPE-ID ]\n");
4e972d5e 59 fprintf(stderr, " [ to PREFIX ] [ FLAG-LIST ] [ label LABEL ] [up]\n");
24604eb2
PS
60 fprintf(stderr, " ip address [ show [ dev IFNAME ] [ scope SCOPE-ID ] [ master DEVICE ]\n");
61 fprintf(stderr, " [ type TYPE ] [ to PREFIX ] [ FLAG-LIST ]\n");
104444c2 62 fprintf(stderr, " [ label LABEL ] [up] [ vrf NAME ] ]\n");
4e972d5e 63 fprintf(stderr, " ip address {showdump|restore}\n");
aba5acdf
SH
64 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
65 fprintf(stderr, " [ broadcast ADDR ] [ anycast ADDR ]\n");
78d04c7b 66 fprintf(stderr, " [ label IFNAME ] [ scope SCOPE-ID ] [ metric METRIC ]\n");
aba5acdf
SH
67 fprintf(stderr, "SCOPE-ID := [ host | link | global | NUMBER ]\n");
68 fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] FLAG\n");
69 fprintf(stderr, "FLAG := [ permanent | dynamic | secondary | primary |\n");
b5f39b25 70 fprintf(stderr, " [-]tentative | [-]deprecated | [-]dadfailed | temporary |\n");
a1f27794 71 fprintf(stderr, " CONFFLAG-LIST ]\n");
bac735c5 72 fprintf(stderr, "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n");
e31867ac 73 fprintf(stderr, "CONFFLAG := [ home | nodad | mngtmpaddr | noprefixroute | autojoin ]\n");
35546df7
MN
74 fprintf(stderr, "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n");
75 fprintf(stderr, "LFT := forever | SECONDS\n");
7827b376 76 fprintf(stderr, "TYPE := { vlan | veth | vcan | vxcan | dummy | ifb | macvlan | macvtap |\n");
577cfe0b 77 fprintf(stderr, " bridge | bond | ipoib | ip6tnl | ipip | sit | vxlan | lowpan |\n");
8595cc40
WT
78 fprintf(stderr, " gre | gretap | erspan | ip6gre | ip6gretap | ip6erspan | vti |\n");
79 fprintf(stderr, " nlmon | can | bond_slave | ipvlan | geneve | bridge_slave |\n");
c8f7a754 80 fprintf(stderr, " hsr | macsec | netdevsim }\n");
35546df7 81
aba5acdf
SH
82 exit(-1);
83}
84
56f5daac 85static void print_link_flags(FILE *fp, unsigned int flags, unsigned int mdown)
aba5acdf 86{
d0e72011 87 open_json_array(PRINT_ANY, is_json_context() ? "flags" : "<");
73b49e9f 88 if (flags & IFF_UP && !(flags & IFF_RUNNING))
d0e72011
JF
89 print_string(PRINT_ANY, NULL,
90 flags ? "%s," : "%s", "NO-CARRIER");
aba5acdf 91 flags &= ~IFF_RUNNING;
d0e72011
JF
92#define _PF(f) if (flags&IFF_##f) { \
93 flags &= ~IFF_##f ; \
94 print_string(PRINT_ANY, NULL, flags ? "%s," : "%s", #f); }
aba5acdf
SH
95 _PF(LOOPBACK);
96 _PF(BROADCAST);
97 _PF(POINTOPOINT);
98 _PF(MULTICAST);
99 _PF(NOARP);
100 _PF(ALLMULTI);
101 _PF(PROMISC);
102 _PF(MASTER);
103 _PF(SLAVE);
104 _PF(DEBUG);
105 _PF(DYNAMIC);
106 _PF(AUTOMEDIA);
107 _PF(PORTSEL);
108 _PF(NOTRAILERS);
109 _PF(UP);
dcb283c3
TG
110 _PF(LOWER_UP);
111 _PF(DORMANT);
98f9a1d2 112 _PF(ECHO);
aba5acdf 113#undef _PF
1124ffb7 114 if (flags)
d0e72011 115 print_hex(PRINT_ANY, NULL, "%x", flags);
aba5acdf 116 if (mdown)
d0e72011
JF
117 print_string(PRINT_ANY, NULL, ",%s", "M-DOWN");
118 close_json_array(PRINT_ANY, "> ");
aba5acdf
SH
119}
120
3d866ba2 121static const char *oper_states[] = {
0612519e 122 "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN",
3d866ba2
SH
123 "TESTING", "DORMANT", "UP"
124};
125
126static void print_operstate(FILE *f, __u8 state)
127{
a1121aa1 128 if (state >= ARRAY_SIZE(oper_states)) {
d0e72011
JF
129 if (is_json_context())
130 print_uint(PRINT_JSON, "operstate_index", NULL, state);
131 else
90c5c969 132 print_0xhex(PRINT_FP, NULL, "state %#llx", state);
a1121aa1 133 } else if (brief) {
d0e72011
JF
134 print_color_string(PRINT_ANY,
135 oper_state_color(state),
136 "operstate",
137 "%-14s ",
138 oper_states[state]);
a1121aa1 139 } else {
d0e72011
JF
140 if (is_json_context())
141 print_string(PRINT_JSON,
142 "operstate",
143 NULL, oper_states[state]);
144 else {
145 fprintf(f, "state ");
146 color_fprintf(f, oper_state_color(state),
147 "%s ", oper_states[state]);
148 }
d7bd2db5 149 }
3d866ba2
SH
150}
151
4f2fdd44
SH
152int get_operstate(const char *name)
153{
154 int i;
155
56f5daac 156 for (i = 0; i < ARRAY_SIZE(oper_states); i++)
4f2fdd44
SH
157 if (strcasecmp(name, oper_states[i]) == 0)
158 return i;
159 return -1;
160}
161
f78e316f 162static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1])
aba5acdf 163{
f78e316f
ED
164 int qlen;
165
166 if (tb[IFLA_TXQLEN])
9f1370c0 167 qlen = rta_getattr_u32(tb[IFLA_TXQLEN]);
f78e316f 168 else {
d17b136f 169 struct ifreq ifr = {};
f78e316f
ED
170 int s = socket(AF_INET, SOCK_STREAM, 0);
171
172 if (s < 0)
173 return;
174
ff24746c 175 strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME]));
f78e316f 176 if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) {
d3603518 177 fprintf(f, "ioctl(SIOCGIFTXQLEN) failed: %s\n", strerror(errno));
f78e316f
ED
178 close(s);
179 return;
180 }
aba5acdf 181 close(s);
f78e316f 182 qlen = ifr.ifr_qlen;
aba5acdf 183 }
f78e316f 184 if (qlen)
d0e72011 185 print_int(PRINT_ANY, "txqlen", "qlen %d", qlen);
aba5acdf
SH
186}
187
82499282
SH
188static const char *link_modes[] = {
189 "DEFAULT", "DORMANT"
190};
191
192static void print_linkmode(FILE *f, struct rtattr *tb)
193{
194 unsigned int mode = rta_getattr_u8(tb);
195
56f5daac 196 if (mode >= ARRAY_SIZE(link_modes))
d0e72011
JF
197 print_int(PRINT_ANY,
198 "linkmode_index",
199 "mode %d ",
200 mode);
82499282 201 else
d0e72011
JF
202 print_string(PRINT_ANY,
203 "linkmode",
204 "mode %s "
205 , link_modes[mode]);
82499282
SH
206}
207
e0513807 208static char *parse_link_kind(struct rtattr *tb, bool slave)
712249d8
VK
209{
210 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
e0513807 211 int attr = slave ? IFLA_INFO_SLAVE_KIND : IFLA_INFO_KIND;
712249d8
VK
212
213 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
214
e0513807
PS
215 if (linkinfo[attr])
216 return RTA_DATA(linkinfo[attr]);
712249d8
VK
217
218 return "";
219}
220
03ac85b7 221static int match_link_kind(struct rtattr **tb, const char *kind, bool slave)
e0513807
PS
222{
223 if (!tb[IFLA_LINKINFO])
224 return -1;
225
226 return strcmp(parse_link_kind(tb[IFLA_LINKINFO], slave), kind);
227}
228
1d934839
PM
229static void print_linktype(FILE *fp, struct rtattr *tb)
230{
231 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
232 struct link_util *lu;
fbea6115 233 struct link_util *slave_lu;
22a84711 234 char slave[32];
1d934839
PM
235
236 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
d0e72011 237 open_json_object("linkinfo");
1d934839 238
fbea6115 239 if (linkinfo[IFLA_INFO_KIND]) {
9f1370c0
SH
240 const char *kind
241 = rta_getattr_str(linkinfo[IFLA_INFO_KIND]);
1d934839 242
b85076cd 243 print_nl();
d0e72011 244 print_string(PRINT_ANY, "info_kind", " %s ", kind);
1d934839 245
fbea6115
JP
246 lu = get_link_kind(kind);
247 if (lu && lu->print_opt) {
248 struct rtattr *attr[lu->maxattr+1], **data = NULL;
1d934839 249
fbea6115
JP
250 if (linkinfo[IFLA_INFO_DATA]) {
251 parse_rtattr_nested(attr, lu->maxattr,
252 linkinfo[IFLA_INFO_DATA]);
253 data = attr;
254 }
d0e72011 255 open_json_object("info_data");
fbea6115 256 lu->print_opt(lu, fp, data);
d0e72011 257 close_json_object();
1d934839 258
fbea6115 259 if (linkinfo[IFLA_INFO_XSTATS] && show_stats &&
d0e72011
JF
260 lu->print_xstats) {
261 open_json_object("info_xstats");
fbea6115 262 lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]);
d0e72011
JF
263 close_json_object();
264 }
1d934839 265 }
fbea6115
JP
266 }
267
268 if (linkinfo[IFLA_INFO_SLAVE_KIND]) {
9f1370c0
SH
269 const char *slave_kind
270 = rta_getattr_str(linkinfo[IFLA_INFO_SLAVE_KIND]);
1d934839 271
b85076cd 272 print_nl();
d0e72011
JF
273 print_string(PRINT_ANY,
274 "info_slave_kind",
275 " %s_slave ",
276 slave_kind);
277
22a84711 278 snprintf(slave, sizeof(slave), "%s_slave", slave_kind);
fbea6115 279
22a84711 280 slave_lu = get_link_kind(slave);
fbea6115
JP
281 if (slave_lu && slave_lu->print_opt) {
282 struct rtattr *attr[slave_lu->maxattr+1], **data = NULL;
283
284 if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
285 parse_rtattr_nested(attr, slave_lu->maxattr,
286 linkinfo[IFLA_INFO_SLAVE_DATA]);
287 data = attr;
288 }
d0e72011 289 open_json_object("info_slave_data");
fbea6115 290 slave_lu->print_opt(slave_lu, fp, data);
d0e72011 291 close_json_object();
fbea6115 292 }
1d934839 293 }
d0e72011 294 close_json_object();
1d934839
PM
295}
296
ee0067a9
JP
297static void print_af_spec(FILE *fp, struct rtattr *af_spec_attr)
298{
299 struct rtattr *inet6_attr;
300 struct rtattr *tb[IFLA_INET6_MAX + 1];
301
302 inet6_attr = parse_rtattr_one_nested(AF_INET6, af_spec_attr);
303 if (!inet6_attr)
304 return;
305
306 parse_rtattr_nested(tb, IFLA_INET6_MAX, inet6_attr);
307
308 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
5c5176ce 309 __u8 mode = rta_getattr_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
d0e72011 310 SPRINT_BUF(b1);
56f5daac 311
5c5176ce 312 switch (mode) {
ee0067a9 313 case IN6_ADDR_GEN_MODE_EUI64:
d0e72011
JF
314 print_string(PRINT_ANY,
315 "inet6_addr_gen_mode",
316 "addrgenmode %s ",
317 "eui64");
ee0067a9
JP
318 break;
319 case IN6_ADDR_GEN_MODE_NONE:
d0e72011
JF
320 print_string(PRINT_ANY,
321 "inet6_addr_gen_mode",
322 "addrgenmode %s ",
323 "none");
ee0067a9 324 break;
5c5176ce 325 case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
d0e72011
JF
326 print_string(PRINT_ANY,
327 "inet6_addr_gen_mode",
328 "addrgenmode %s ",
329 "stable_secret");
5c5176ce 330 break;
8e12bc0a 331 case IN6_ADDR_GEN_MODE_RANDOM:
d0e72011
JF
332 print_string(PRINT_ANY,
333 "inet6_addr_gen_mode",
334 "addrgenmode %s ",
335 "random");
8e12bc0a 336 break;
5c5176ce 337 default:
d0e72011
JF
338 snprintf(b1, sizeof(b1), "%#.2hhx", mode);
339 print_string(PRINT_ANY,
340 "inet6_addr_gen_mode",
341 "addrgenmode %s ",
342 b1);
5c5176ce 343 break;
ee0067a9
JP
344 }
345 }
346}
347
a1b99717
EBE
348static void print_vf_stats64(FILE *fp, struct rtattr *vfstats);
349
3fd86630
CW
350static void print_vfinfo(FILE *fp, struct rtattr *vfinfo)
351{
352 struct ifla_vf_mac *vf_mac;
3fd86630 353 struct ifla_vf_tx_rate *vf_tx_rate;
8c29ae7c 354 struct rtattr *vf[IFLA_VF_MAX + 1] = {};
56f5daac 355
3fd86630
CW
356 SPRINT_BUF(b1);
357
358 if (vfinfo->rta_type != IFLA_VF_INFO) {
359 fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type);
360 return;
361 }
362
363 parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo);
364
365 vf_mac = RTA_DATA(vf[IFLA_VF_MAC]);
3fd86630
CW
366 vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]);
367
d0e72011
JF
368 print_string(PRINT_FP, NULL, "%s ", _SL_);
369 print_int(PRINT_ANY, "vf", "vf %d ", vf_mac->vf);
370 print_string(PRINT_ANY, "mac", "MAC %s",
371 ll_addr_n2a((unsigned char *) &vf_mac->mac,
372 ETH_ALEN, 0, b1, sizeof(b1)));
373
56e9f0ab
MS
374 if (vf[IFLA_VF_VLAN_LIST]) {
375 struct rtattr *i, *vfvlanlist = vf[IFLA_VF_VLAN_LIST];
376 int rem = RTA_PAYLOAD(vfvlanlist);
377
d0e72011 378 open_json_array(PRINT_JSON, "vlan_list");
56e9f0ab 379 for (i = RTA_DATA(vfvlanlist);
d0e72011
JF
380 RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
381 struct ifla_vf_vlan_info *vf_vlan_info = RTA_DATA(i);
56e9f0ab
MS
382 SPRINT_BUF(b2);
383
d0e72011 384 open_json_object(NULL);
56e9f0ab 385 if (vf_vlan_info->vlan)
d0e72011
JF
386 print_int(PRINT_ANY,
387 "vlan",
388 ", vlan %d",
389 vf_vlan_info->vlan);
56e9f0ab 390 if (vf_vlan_info->qos)
d0e72011
JF
391 print_int(PRINT_ANY,
392 "qos",
393 ", qos %d",
394 vf_vlan_info->qos);
56e9f0ab
MS
395 if (vf_vlan_info->vlan_proto &&
396 vf_vlan_info->vlan_proto != htons(ETH_P_8021Q))
d0e72011
JF
397 print_string(PRINT_ANY,
398 "protocol",
399 ", vlan protocol %s",
400 ll_proto_n2a(
401 vf_vlan_info->vlan_proto,
56e9f0ab 402 b2, sizeof(b2)));
d0e72011 403 close_json_object();
56e9f0ab 404 }
d0e72011 405 close_json_array(PRINT_JSON, NULL);
56e9f0ab
MS
406 } else {
407 struct ifla_vf_vlan *vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]);
408
409 if (vf_vlan->vlan)
d0e72011
JF
410 print_int(PRINT_ANY,
411 "vlan",
412 ", vlan %d",
413 vf_vlan->vlan);
56e9f0ab 414 if (vf_vlan->qos)
d0e72011 415 print_int(PRINT_ANY, "qos", ", qos %d", vf_vlan->qos);
56e9f0ab 416 }
d0e72011 417
3fd86630 418 if (vf_tx_rate->rate)
527f8514
TT
419 print_uint(PRINT_ANY,
420 "tx_rate",
421 ", tx rate %u (Mbps)",
422 vf_tx_rate->rate);
8c29ae7c
VK
423
424 if (vf[IFLA_VF_RATE]) {
425 struct ifla_vf_rate *vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
d0e72011
JF
426 int max_tx = vf_rate->max_tx_rate;
427 int min_tx = vf_rate->min_tx_rate;
428
429 if (is_json_context()) {
430 open_json_object("rate");
527f8514
TT
431 print_uint(PRINT_JSON, "max_tx", NULL, max_tx);
432 print_uint(PRINT_ANY, "min_tx", NULL, min_tx);
d0e72011
JF
433 close_json_object();
434 } else {
435 if (max_tx)
527f8514 436 fprintf(fp, ", max_tx_rate %uMbps", max_tx);
d0e72011 437 if (min_tx)
527f8514 438 fprintf(fp, ", min_tx_rate %uMbps", min_tx);
d0e72011 439 }
8c29ae7c 440 }
d0e72011 441
ff9463e0
PS
442 if (vf[IFLA_VF_SPOOFCHK]) {
443 struct ifla_vf_spoofchk *vf_spoofchk =
444 RTA_DATA(vf[IFLA_VF_SPOOFCHK]);
8c29ae7c 445
ff9463e0 446 if (vf_spoofchk->setting != -1)
d0e72011
JF
447 print_bool(PRINT_ANY,
448 "spoofchk",
449 vf_spoofchk->setting ?
450 ", spoof checking on" : ", spoof checking off",
451 vf_spoofchk->setting);
7b8179c7 452 }
d0e72011 453
ff9463e0
PS
454 if (vf[IFLA_VF_LINK_STATE]) {
455 struct ifla_vf_link_state *vf_linkstate =
456 RTA_DATA(vf[IFLA_VF_LINK_STATE]);
457
07fa9c15 458 if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_AUTO)
d0e72011
JF
459 print_string(PRINT_ANY,
460 "link_state",
461 ", link-state %s",
462 "auto");
07fa9c15 463 else if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_ENABLE)
d0e72011
JF
464 print_string(PRINT_ANY,
465 "link_state",
466 ", link-state %s",
467 "enable");
07fa9c15 468 else
d0e72011
JF
469 print_string(PRINT_ANY,
470 "link_state",
471 ", link-state %s",
472 "disable");
07fa9c15 473 }
d0e72011 474
fe932278
PS
475 if (vf[IFLA_VF_TRUST]) {
476 struct ifla_vf_trust *vf_trust = RTA_DATA(vf[IFLA_VF_TRUST]);
477
478 if (vf_trust->setting != -1)
d0e72011
JF
479 print_bool(PRINT_ANY,
480 "trust",
481 vf_trust->setting ? ", trust on" : ", trust off",
482 vf_trust->setting);
fe932278 483 }
d0e72011 484
4fb4a10e
PS
485 if (vf[IFLA_VF_RSS_QUERY_EN]) {
486 struct ifla_vf_rss_query_en *rss_query =
487 RTA_DATA(vf[IFLA_VF_RSS_QUERY_EN]);
488
489 if (rss_query->setting != -1)
d0e72011
JF
490 print_bool(PRINT_ANY,
491 "query_rss_en",
492 rss_query->setting ? ", query_rss on"
493 : ", query_rss off",
494 rss_query->setting);
4fb4a10e 495 }
d0e72011 496
a1b99717
EBE
497 if (vf[IFLA_VF_STATS] && show_stats)
498 print_vf_stats64(fp, vf[IFLA_VF_STATS]);
3fd86630
CW
499}
500
837552b4 501void print_num(FILE *fp, unsigned int width, uint64_t count)
b68d9837 502{
1e264abc
SH
503 const char *prefix = "kMGTPE";
504 const unsigned int base = use_iec ? 1024 : 1000;
b68d9837 505 uint64_t powi = 1;
50ec6650
CH
506 uint16_t powj = 1;
507 uint8_t precision = 2;
1e264abc 508 char buf[64];
b68d9837 509
1e264abc 510 if (!human_readable || count < base) {
f4fe81d2 511 fprintf(fp, "%-*"PRIu64" ", width, count);
1e264abc 512 return;
b68d9837
CH
513 }
514
1e264abc 515 /* increase value by a factor of 1000/1024 and print
468fa020
SH
516 * if result is something a human can read
517 */
56f5daac 518 for (;;) {
1e264abc
SH
519 powi *= base;
520 if (count / base < powi)
521 break;
b68d9837 522
1e264abc
SH
523 if (!prefix[1])
524 break;
525 ++prefix;
b68d9837
CH
526 }
527
50ec6650
CH
528 /* try to guess a good number of digits for precision */
529 for (; precision > 0; precision--) {
530 powj *= 10;
531 if (count / powi < powj)
532 break;
533 }
534
535 snprintf(buf, sizeof(buf), "%.*f%c%s", precision,
d0e72011 536 (double) count / powi, *prefix, use_iec ? "i" : "");
1e264abc 537
f4fe81d2 538 fprintf(fp, "%-*s ", width, buf);
b68d9837
CH
539}
540
a1b99717
EBE
541static void print_vf_stats64(FILE *fp, struct rtattr *vfstats)
542{
30a8842c 543 struct rtattr *vf[IFLA_VF_STATS_MAX + 1];
a1b99717
EBE
544
545 if (vfstats->rta_type != IFLA_VF_STATS) {
546 fprintf(stderr, "BUG: rta type is %d\n", vfstats->rta_type);
547 return;
548 }
549
d7cf2416 550 parse_rtattr_nested(vf, IFLA_VF_STATS_MAX, vfstats);
a1b99717 551
d0e72011
JF
552 if (is_json_context()) {
553 open_json_object("stats");
554
555 /* RX stats */
556 open_json_object("rx");
4db2ff0d 557 print_u64(PRINT_JSON, "bytes", NULL,
d0e72011 558 rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
4db2ff0d 559 print_u64(PRINT_JSON, "packets", NULL,
d0e72011 560 rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
4db2ff0d 561 print_u64(PRINT_JSON, "multicast", NULL,
d0e72011 562 rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
4db2ff0d 563 print_u64(PRINT_JSON, "broadcast", NULL,
d0e72011 564 rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
8c7acf3a
EBE
565 if (vf[IFLA_VF_STATS_RX_DROPPED])
566 print_u64(PRINT_JSON, "dropped", NULL,
567 rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
d0e72011
JF
568 close_json_object();
569
570 /* TX stats */
571 open_json_object("tx");
4db2ff0d 572 print_u64(PRINT_JSON, "tx_bytes", NULL,
d0e72011 573 rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
4db2ff0d 574 print_u64(PRINT_JSON, "tx_packets", NULL,
d0e72011 575 rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
8c7acf3a
EBE
576 if (vf[IFLA_VF_STATS_TX_DROPPED])
577 print_u64(PRINT_JSON, "dropped", NULL,
578 rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
d0e72011
JF
579 close_json_object();
580 close_json_object();
581 } else {
582 /* RX stats */
583 fprintf(fp, "%s", _SL_);
8c7acf3a
EBE
584 fprintf(fp, " RX: bytes packets mcast bcast ");
585 if (vf[IFLA_VF_STATS_RX_DROPPED])
586 fprintf(fp, " dropped ");
587 fprintf(fp, "%s", _SL_);
d0e72011 588 fprintf(fp, " ");
a1b99717 589
d0e72011
JF
590 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
591 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
592 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
593 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
8c7acf3a
EBE
594 if (vf[IFLA_VF_STATS_RX_DROPPED])
595 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
a1b99717 596
d0e72011
JF
597 /* TX stats */
598 fprintf(fp, "%s", _SL_);
8c7acf3a
EBE
599 fprintf(fp, " TX: bytes packets ");
600 if (vf[IFLA_VF_STATS_TX_DROPPED])
601 fprintf(fp, " dropped ");
602 fprintf(fp, "%s", _SL_);
d0e72011 603 fprintf(fp, " ");
a1b99717 604
d0e72011
JF
605 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
606 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
8c7acf3a
EBE
607 if (vf[IFLA_VF_STATS_TX_DROPPED])
608 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
d0e72011 609 }
a1b99717
EBE
610}
611
9a7bd544 612static void __print_link_stats(FILE *fp, struct rtattr *tb[])
4b726cb1 613{
9a7bd544
SP
614 const struct rtattr *carrier_changes = tb[IFLA_CARRIER_CHANGES];
615 struct rtnl_link_stats64 _s, *s = &_s;
616 int ret;
d0e72011 617
9a7bd544
SP
618 ret = get_rtnl_link_stats_rta(s, tb);
619 if (ret < 0)
620 return;
e6e6fb5c 621
d0e72011 622 if (is_json_context()) {
9a7bd544 623 open_json_object((ret == sizeof(*s)) ? "stats64" : "stats");
d0e72011
JF
624
625 /* RX stats */
626 open_json_object("rx");
4db2ff0d
THJ
627 print_u64(PRINT_JSON, "bytes", NULL, s->rx_bytes);
628 print_u64(PRINT_JSON, "packets", NULL, s->rx_packets);
629 print_u64(PRINT_JSON, "errors", NULL, s->rx_errors);
630 print_u64(PRINT_JSON, "dropped", NULL, s->rx_dropped);
631 print_u64(PRINT_JSON, "over_errors", NULL, s->rx_over_errors);
632 print_u64(PRINT_JSON, "multicast", NULL, s->multicast);
d0e72011 633 if (s->rx_compressed)
4db2ff0d 634 print_u64(PRINT_JSON,
fb7b8168 635 "compressed", NULL, s->rx_compressed);
d0e72011
JF
636
637 /* RX error stats */
638 if (show_stats > 1) {
4db2ff0d 639 print_u64(PRINT_JSON,
d0e72011
JF
640 "length_errors",
641 NULL, s->rx_length_errors);
4db2ff0d 642 print_u64(PRINT_JSON,
d0e72011
JF
643 "crc_errors",
644 NULL, s->rx_crc_errors);
4db2ff0d 645 print_u64(PRINT_JSON,
d0e72011
JF
646 "frame_errors",
647 NULL, s->rx_frame_errors);
4db2ff0d 648 print_u64(PRINT_JSON,
d0e72011
JF
649 "fifo_errors",
650 NULL, s->rx_fifo_errors);
4db2ff0d 651 print_u64(PRINT_JSON,
d0e72011
JF
652 "missed_errors",
653 NULL, s->rx_missed_errors);
654 if (s->rx_nohandler)
4db2ff0d 655 print_u64(PRINT_JSON,
fb7b8168 656 "nohandler", NULL, s->rx_nohandler);
d0e72011
JF
657 }
658 close_json_object();
659
660 /* TX stats */
661 open_json_object("tx");
4db2ff0d
THJ
662 print_u64(PRINT_JSON, "bytes", NULL, s->tx_bytes);
663 print_u64(PRINT_JSON, "packets", NULL, s->tx_packets);
664 print_u64(PRINT_JSON, "errors", NULL, s->tx_errors);
665 print_u64(PRINT_JSON, "dropped", NULL, s->tx_dropped);
666 print_u64(PRINT_JSON,
d0e72011
JF
667 "carrier_errors",
668 NULL, s->tx_carrier_errors);
4db2ff0d 669 print_u64(PRINT_JSON, "collisions", NULL, s->collisions);
d0e72011 670 if (s->tx_compressed)
4db2ff0d 671 print_u64(PRINT_JSON,
fb7b8168 672 "compressed", NULL, s->tx_compressed);
d0e72011
JF
673
674 /* TX error stats */
675 if (show_stats > 1) {
4db2ff0d 676 print_u64(PRINT_JSON,
d0e72011
JF
677 "aborted_errors",
678 NULL, s->tx_aborted_errors);
4db2ff0d 679 print_u64(PRINT_JSON,
d0e72011
JF
680 "fifo_errors",
681 NULL, s->tx_fifo_errors);
4db2ff0d 682 print_u64(PRINT_JSON,
d0e72011
JF
683 "window_errors",
684 NULL, s->tx_window_errors);
4db2ff0d 685 print_u64(PRINT_JSON,
d0e72011
JF
686 "heartbeat_errors",
687 NULL, s->tx_heartbeat_errors);
688 if (carrier_changes)
4db2ff0d 689 print_u64(PRINT_JSON, "carrier_changes", NULL,
d0e72011
JF
690 rta_getattr_u32(carrier_changes));
691 }
b68d9837 692
d0e72011
JF
693 close_json_object();
694 close_json_object();
695 } else {
696 /* RX stats */
697 fprintf(fp, " RX: bytes packets errors dropped overrun mcast %s%s",
698 s->rx_compressed ? "compressed" : "", _SL_);
699
d0e72011
JF
700 fprintf(fp, " ");
701 print_num(fp, 10, s->rx_bytes);
702 print_num(fp, 8, s->rx_packets);
703 print_num(fp, 7, s->rx_errors);
704 print_num(fp, 7, s->rx_dropped);
705 print_num(fp, 7, s->rx_over_errors);
706 print_num(fp, 7, s->multicast);
707 if (s->rx_compressed)
708 print_num(fp, 7, s->rx_compressed);
709
710 /* RX error stats */
711 if (show_stats > 1) {
712 fprintf(fp, "%s", _SL_);
713 fprintf(fp, " RX errors: length crc frame fifo missed%s%s",
714 s->rx_nohandler ? " nohandler" : "", _SL_);
715 fprintf(fp, " ");
716 print_num(fp, 8, s->rx_length_errors);
717 print_num(fp, 7, s->rx_crc_errors);
718 print_num(fp, 7, s->rx_frame_errors);
719 print_num(fp, 7, s->rx_fifo_errors);
720 print_num(fp, 7, s->rx_missed_errors);
721 if (s->rx_nohandler)
722 print_num(fp, 7, s->rx_nohandler);
723 }
4ec0ffde 724 fprintf(fp, "%s", _SL_);
1e264abc 725
d0e72011
JF
726 /* TX stats */
727 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
728 s->tx_compressed ? "compressed" : "", _SL_);
729
730 fprintf(fp, " ");
731 print_num(fp, 10, s->tx_bytes);
732 print_num(fp, 8, s->tx_packets);
733 print_num(fp, 7, s->tx_errors);
734 print_num(fp, 7, s->tx_dropped);
735 print_num(fp, 7, s->tx_carrier_errors);
736 print_num(fp, 7, s->collisions);
737 if (s->tx_compressed)
738 print_num(fp, 7, s->tx_compressed);
739
740 /* TX error stats */
741 if (show_stats > 1) {
742 fprintf(fp, "%s", _SL_);
743 fprintf(fp, " TX errors: aborted fifo window heartbeat");
744 if (carrier_changes)
745 fprintf(fp, " transns");
746 fprintf(fp, "%s", _SL_);
747
748 fprintf(fp, " ");
749 print_num(fp, 8, s->tx_aborted_errors);
750 print_num(fp, 7, s->tx_fifo_errors);
751 print_num(fp, 7, s->tx_window_errors);
752 print_num(fp, 7, s->tx_heartbeat_errors);
753 if (carrier_changes)
754 print_num(fp, 7,
755 rta_getattr_u32(carrier_changes));
756 }
e6e6fb5c
SH
757 }
758}
759
5d5cf1b4
JB
760static void print_link_stats(FILE *fp, struct nlmsghdr *n)
761{
762 struct ifinfomsg *ifi = NLMSG_DATA(n);
56f5daac 763 struct rtattr *tb[IFLA_MAX+1];
5d5cf1b4
JB
764
765 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi),
766 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)));
767 __print_link_stats(fp, tb);
b85076cd 768 print_nl();
5d5cf1b4
JB
769}
770
c956e9a9
SP
771static int print_linkinfo_brief(FILE *fp, const char *name,
772 const struct ifinfomsg *ifi,
773 struct rtattr *tb[])
5d295bb8 774{
56f5daac 775 unsigned int m_flag = 0;
5d295bb8 776
4328b687 777 m_flag = print_name_and_link("%-16s ", name, tb);
5d295bb8
AG
778
779 if (tb[IFLA_OPERSTATE])
780 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
781
2cd0578f 782 if (filter.family == AF_PACKET) {
5d295bb8 783 SPRINT_BUF(b1);
d0e72011 784
5d295bb8 785 if (tb[IFLA_ADDRESS]) {
d0e72011
JF
786 print_color_string(PRINT_ANY, COLOR_MAC,
787 "address", "%s ",
788 ll_addr_n2a(
789 RTA_DATA(tb[IFLA_ADDRESS]),
790 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
791 ifi->ifi_type,
792 b1, sizeof(b1)));
5d295bb8
AG
793 }
794 }
795
2cd0578f 796 if (filter.family == AF_PACKET) {
5d295bb8 797 print_link_flags(fp, ifi->ifi_flags, m_flag);
d0e72011
JF
798 print_string(PRINT_FP, NULL, "%s", "\n");
799 }
2cd0578f 800
5d295bb8
AG
801 fflush(fp);
802 return 0;
803}
804
735a52ce
VY
805static const char *link_events[] = {
806 [IFLA_EVENT_NONE] = "NONE",
807 [IFLA_EVENT_REBOOT] = "REBOOT",
808 [IFLA_EVENT_FEATURES] = "FEATURE CHANGE",
809 [IFLA_EVENT_BONDING_FAILOVER] = "BONDING FAILOVER",
810 [IFLA_EVENT_NOTIFY_PEERS] = "NOTIFY PEERS",
811 [IFLA_EVENT_IGMP_RESEND] = "RESEND IGMP",
812 [IFLA_EVENT_BONDING_OPTIONS] = "BONDING OPTION"
813};
814
815static void print_link_event(FILE *f, __u32 event)
816{
817 if (event >= ARRAY_SIZE(link_events))
d0e72011 818 print_int(PRINT_ANY, "event", "event %d ", event);
735a52ce
VY
819 else {
820 if (event)
d0e72011
JF
821 print_string(PRINT_ANY,
822 "event", "event %s ",
823 link_events[event]);
735a52ce
VY
824 }
825}
826
cd554f2c 827int print_linkinfo(struct nlmsghdr *n, void *arg)
aba5acdf 828{
56f5daac 829 FILE *fp = (FILE *)arg;
aba5acdf 830 struct ifinfomsg *ifi = NLMSG_DATA(n);
56f5daac 831 struct rtattr *tb[IFLA_MAX+1];
aba5acdf 832 int len = n->nlmsg_len;
95168230 833 const char *name;
56f5daac 834 unsigned int m_flag = 0;
c956e9a9 835 SPRINT_BUF(b1);
aba5acdf
SH
836
837 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
838 return 0;
839
840 len -= NLMSG_LENGTH(sizeof(*ifi));
841 if (len < 0)
842 return -1;
843
844 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
95168230 845 return -1;
aba5acdf 846 if (filter.up && !(ifi->ifi_flags&IFF_UP))
95168230 847 return -1;
aba5acdf 848
aba5acdf 849 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
fcac9665
SP
850
851 name = get_ifname_rta(ifi->ifi_index, tb[IFLA_IFNAME]);
852 if (!name)
853 return -1;
468fa020 854
8df708af
SP
855 if (filter.label)
856 return 0;
aba5acdf 857
f960c92a 858 if (tb[IFLA_GROUP]) {
9f1370c0 859 int group = rta_getattr_u32(tb[IFLA_GROUP]);
56f5daac 860
c4fdf75d 861 if (filter.group != -1 && group != filter.group)
f960c92a
VD
862 return -1;
863 }
864
1b944148 865 if (tb[IFLA_MASTER]) {
9f1370c0 866 int master = rta_getattr_u32(tb[IFLA_MASTER]);
56f5daac 867
1b944148
VK
868 if (filter.master > 0 && master != filter.master)
869 return -1;
56f5daac 870 } else if (filter.master > 0)
1b944148
VK
871 return -1;
872
e0513807
PS
873 if (filter.kind && match_link_kind(tb, filter.kind, 0))
874 return -1;
712249d8 875
e0513807
PS
876 if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1))
877 return -1;
712249d8 878
aba5acdf 879 if (n->nlmsg_type == RTM_DELLINK)
d0e72011
JF
880 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
881
c956e9a9
SP
882 if (brief)
883 return print_linkinfo_brief(fp, name, ifi, tb);
884
d0e72011 885 print_int(PRINT_ANY, "ifindex", "%d: ", ifi->ifi_index);
56f5daac 886
4328b687 887 m_flag = print_name_and_link("%s: ", name, tb);
aba5acdf
SH
888 print_link_flags(fp, ifi->ifi_flags, m_flag);
889
890 if (tb[IFLA_MTU])
d0e72011
JF
891 print_int(PRINT_ANY,
892 "mtu", "mtu %u ",
893 rta_getattr_u32(tb[IFLA_MTU]));
c7272ca7 894 if (tb[IFLA_XDP])
a0b5b7cf 895 xdp_dump(fp, tb[IFLA_XDP], do_link, false);
aba5acdf 896 if (tb[IFLA_QDISC])
d0e72011
JF
897 print_string(PRINT_ANY,
898 "qdisc",
899 "qdisc %s ",
900 rta_getattr_str(tb[IFLA_QDISC]));
aba5acdf 901 if (tb[IFLA_MASTER]) {
d92cc2d0 902 int master = rta_getattr_u32(tb[IFLA_MASTER]);
d0e72011 903
b68b361b
SH
904 print_string(PRINT_ANY,
905 "master", "master %s ",
906 ll_index_to_name(master));
aba5acdf 907 }
82499282 908
3d866ba2 909 if (tb[IFLA_OPERSTATE])
ff24746c 910 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
82499282
SH
911
912 if (do_link && tb[IFLA_LINKMODE])
913 print_linkmode(fp, tb[IFLA_LINKMODE]);
914
c4fdf75d 915 if (tb[IFLA_GROUP]) {
9f1370c0 916 int group = rta_getattr_u32(tb[IFLA_GROUP]);
56f5daac 917
d0e72011
JF
918 print_string(PRINT_ANY,
919 "group",
920 "group %s ",
921 rtnl_group_n2a(group, b1, sizeof(b1)));
c4fdf75d
ST
922 }
923
aba5acdf 924 if (filter.showqueue)
f78e316f 925 print_queuelen(fp, tb);
ae665a52 926
735a52ce
VY
927 if (tb[IFLA_EVENT])
928 print_link_event(fp, rta_getattr_u32(tb[IFLA_EVENT]));
929
2ec28933 930 if (!filter.family || filter.family == AF_PACKET || show_details) {
b85076cd 931 print_nl();
d0e72011
JF
932 print_string(PRINT_ANY,
933 "link_type",
934 " link/%s ",
935 ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
aba5acdf 936 if (tb[IFLA_ADDRESS]) {
d0e72011
JF
937 print_color_string(PRINT_ANY,
938 COLOR_MAC,
939 "address",
940 "%s",
941 ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]),
942 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
943 ifi->ifi_type,
944 b1, sizeof(b1)));
aba5acdf
SH
945 }
946 if (tb[IFLA_BROADCAST]) {
d0e72011
JF
947 if (ifi->ifi_flags&IFF_POINTOPOINT) {
948 print_string(PRINT_FP, NULL, " peer ", NULL);
949 print_bool(PRINT_JSON,
950 "link_pointtopoint", NULL, true);
951 } else {
952 print_string(PRINT_FP, NULL, " brd ", NULL);
953 }
954 print_color_string(PRINT_ANY,
955 COLOR_MAC,
956 "broadcast",
957 "%s",
958 ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]),
959 RTA_PAYLOAD(tb[IFLA_BROADCAST]),
960 ifi->ifi_type,
961 b1, sizeof(b1)));
aba5acdf
SH
962 }
963 }
1d934839 964
ccdcbf35 965 if (tb[IFLA_LINK_NETNSID]) {
9f1370c0 966 int id = rta_getattr_u32(tb[IFLA_LINK_NETNSID]);
ccdcbf35 967
d0e72011
JF
968 if (is_json_context()) {
969 print_int(PRINT_JSON, "link_netnsid", NULL, id);
970 } else {
9580bad7
ND
971 if (id >= 0) {
972 char *name = get_name_from_nsid(id);
973
974 if (name)
975 print_string(PRINT_FP, NULL,
976 " link-netns %s", name);
977 else
978 print_int(PRINT_FP, NULL,
979 " link-netnsid %d", id);
980 } else
d0e72011
JF
981 print_string(PRINT_FP, NULL,
982 " link-netnsid %s", "unknown");
983 }
ccdcbf35
ND
984 }
985
eaf89d7d
ND
986 if (tb[IFLA_NEW_NETNSID]) {
987 int id = rta_getattr_u32(tb[IFLA_NEW_NETNSID]);
9580bad7 988 char *name = get_name_from_nsid(id);
eaf89d7d 989
9580bad7
ND
990 if (name)
991 print_string(PRINT_FP, NULL, " new-netns %s", name);
992 else
993 print_int(PRINT_FP, NULL, " new-netnsid %d", id);
eaf89d7d
ND
994 }
995 if (tb[IFLA_NEW_IFINDEX]) {
996 int id = rta_getattr_u32(tb[IFLA_NEW_IFINDEX]);
997
998 print_int(PRINT_FP, NULL, " new-ifindex %d", id);
999 }
1000
18864827
AK
1001 if (tb[IFLA_PROTO_DOWN]) {
1002 if (rta_getattr_u8(tb[IFLA_PROTO_DOWN]))
d0e72011
JF
1003 print_bool(PRINT_ANY,
1004 "proto_down", " protodown on ", true);
18864827
AK
1005 }
1006
11522e7d
SH
1007 if (show_details) {
1008 if (tb[IFLA_PROMISCUITY])
d0e72011
JF
1009 print_uint(PRINT_ANY,
1010 "promiscuity",
1011 " promiscuity %u ",
1012 rta_getattr_u32(tb[IFLA_PROMISCUITY]));
11522e7d 1013
d97e266e
SH
1014 if (tb[IFLA_MIN_MTU])
1015 print_uint(PRINT_ANY,
1016 "min_mtu", "minmtu %u ",
1017 rta_getattr_u32(tb[IFLA_MIN_MTU]));
1018
1019 if (tb[IFLA_MAX_MTU])
1020 print_uint(PRINT_ANY,
1021 "max_mtu", "maxmtu %u ",
1022 rta_getattr_u32(tb[IFLA_MAX_MTU]));
1023
11522e7d
SH
1024 if (tb[IFLA_LINKINFO])
1025 print_linktype(fp, tb[IFLA_LINKINFO]);
1026
1027 if (do_link && tb[IFLA_AF_SPEC])
1028 print_af_spec(fp, tb[IFLA_AF_SPEC]);
1029
1030 if (tb[IFLA_NUM_TX_QUEUES])
d0e72011
JF
1031 print_uint(PRINT_ANY,
1032 "num_tx_queues",
1033 "numtxqueues %u ",
1034 rta_getattr_u32(tb[IFLA_NUM_TX_QUEUES]));
ede6a3ea 1035
11522e7d 1036 if (tb[IFLA_NUM_RX_QUEUES])
d0e72011
JF
1037 print_uint(PRINT_ANY,
1038 "num_rx_queues",
1039 "numrxqueues %u ",
1040 rta_getattr_u32(tb[IFLA_NUM_RX_QUEUES]));
1cb6a110 1041
1acd208c 1042 if (tb[IFLA_GSO_MAX_SIZE])
d0e72011
JF
1043 print_uint(PRINT_ANY,
1044 "gso_max_size",
1045 "gso_max_size %u ",
1046 rta_getattr_u32(tb[IFLA_GSO_MAX_SIZE]));
1acd208c
ED
1047
1048 if (tb[IFLA_GSO_MAX_SEGS])
d0e72011
JF
1049 print_uint(PRINT_ANY,
1050 "gso_max_segs",
1051 "gso_max_segs %u ",
1052 rta_getattr_u32(tb[IFLA_GSO_MAX_SEGS]));
1acd208c 1053
11522e7d 1054 if (tb[IFLA_PHYS_PORT_NAME])
d0e72011
JF
1055 print_string(PRINT_ANY,
1056 "phys_port_name",
1057 "portname %s ",
1058 rta_getattr_str(tb[IFLA_PHYS_PORT_NAME]));
ee0067a9 1059
11522e7d 1060 if (tb[IFLA_PHYS_PORT_ID]) {
d0e72011
JF
1061 print_string(PRINT_ANY,
1062 "phys_port_id",
1063 "portid %s ",
1064 hexstring_n2a(
1065 RTA_DATA(tb[IFLA_PHYS_PORT_ID]),
1066 RTA_PAYLOAD(tb[IFLA_PHYS_PORT_ID]),
1067 b1, sizeof(b1)));
11522e7d
SH
1068 }
1069
1070 if (tb[IFLA_PHYS_SWITCH_ID]) {
d0e72011
JF
1071 print_string(PRINT_ANY,
1072 "phys_switch_id",
1073 "switchid %s ",
1074 hexstring_n2a(RTA_DATA(tb[IFLA_PHYS_SWITCH_ID]),
1075 RTA_PAYLOAD(tb[IFLA_PHYS_SWITCH_ID]),
1076 b1, sizeof(b1)));
11522e7d
SH
1077 }
1078 }
f1c656e5 1079
2ec28933 1080 if ((do_link || show_details) && tb[IFLA_IFALIAS]) {
d0e72011
JF
1081 print_string(PRINT_FP, NULL, "%s ", _SL_);
1082 print_string(PRINT_ANY,
1083 "ifalias",
1084 "alias %s",
1085 rta_getattr_str(tb[IFLA_IFALIAS]));
263c894f 1086 }
ace9c961 1087
a0b5b7cf
DB
1088 if ((do_link || show_details) && tb[IFLA_XDP])
1089 xdp_dump(fp, tb[IFLA_XDP], true, true);
1090
e6e6fb5c 1091 if (do_link && show_stats) {
b85076cd 1092 print_nl();
5d5cf1b4 1093 __print_link_stats(fp, tb);
ae7229d5 1094 }
e6e6fb5c 1095
2ec28933 1096 if ((do_link || show_details) && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) {
3fd86630
CW
1097 struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST];
1098 int rem = RTA_PAYLOAD(vflist);
56f5daac 1099
d0e72011
JF
1100 open_json_array(PRINT_JSON, "vfinfo_list");
1101 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
1102 open_json_object(NULL);
3fd86630 1103 print_vfinfo(fp, i);
d0e72011
JF
1104 close_json_object();
1105 }
1106 close_json_array(PRINT_JSON, NULL);
aba5acdf 1107 }
3fd86630 1108
c956e9a9 1109 print_string(PRINT_FP, NULL, "%s", "\n");
aba5acdf 1110 fflush(fp);
5d5cf1b4 1111 return 1;
aba5acdf
SH
1112}
1113
1114static int flush_update(void)
1115{
e149d4e8
NH
1116
1117 /*
1118 * Note that the kernel may delete multiple addresses for one
1119 * delete request (e.g. if ipv4 address promotion is disabled).
1120 * Since a flush operation is really a series of delete requests
1121 * its possible that we may request an address delete that has
1122 * already been done by the kernel. Therefore, ignore EADDRNOTAVAIL
1123 * errors returned from a flush request
1124 */
1125 if ((rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) &&
1126 (errno != EADDRNOTAVAIL)) {
1fb0a998 1127 perror("Failed to send flush request");
aba5acdf
SH
1128 return -1;
1129 }
1130 filter.flushp = 0;
1131 return 0;
1132}
1133
35546df7
MN
1134static int set_lifetime(unsigned int *lifetime, char *argv)
1135{
1136 if (strcmp(argv, "forever") == 0)
141bb606 1137 *lifetime = INFINITY_LIFE_TIME;
35546df7
MN
1138 else if (get_u32(lifetime, argv, 0))
1139 return -1;
1140
1141 return 0;
1142}
1143
37c9b94e
JP
1144static unsigned int get_ifa_flags(struct ifaddrmsg *ifa,
1145 struct rtattr *ifa_flags_attr)
1146{
1147 return ifa_flags_attr ? rta_getattr_u32(ifa_flags_attr) :
d0e72011 1148 ifa->ifa_flags;
37c9b94e
JP
1149}
1150
f73ac674 1151/* Mapping from argument to address flag mask */
086277b5 1152static const struct {
f73ac674
SH
1153 const char *name;
1154 unsigned long value;
1155} ifa_flag_names[] = {
1156 { "secondary", IFA_F_SECONDARY },
1157 { "temporary", IFA_F_SECONDARY },
1158 { "nodad", IFA_F_NODAD },
1159 { "optimistic", IFA_F_OPTIMISTIC },
1160 { "dadfailed", IFA_F_DADFAILED },
1161 { "home", IFA_F_HOMEADDRESS },
1162 { "deprecated", IFA_F_DEPRECATED },
1163 { "tentative", IFA_F_TENTATIVE },
1164 { "permanent", IFA_F_PERMANENT },
1165 { "mngtmpaddr", IFA_F_MANAGETEMPADDR },
1166 { "noprefixroute", IFA_F_NOPREFIXROUTE },
1167 { "autojoin", IFA_F_MCAUTOJOIN },
1168 { "stable-privacy", IFA_F_STABLE_PRIVACY },
1169};
1170
1171static void print_ifa_flags(FILE *fp, const struct ifaddrmsg *ifa,
1172 unsigned int flags)
1173{
1174 unsigned int i;
1175
1176 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1177 unsigned long mask = ifa_flag_names[i].value;
1178
1179 if (mask == IFA_F_PERMANENT) {
1180 if (!(flags & mask))
d0e72011
JF
1181 print_bool(PRINT_ANY,
1182 "dynamic", "dynamic ", true);
f73ac674
SH
1183 } else if (flags & mask) {
1184 if (mask == IFA_F_SECONDARY &&
d0e72011
JF
1185 ifa->ifa_family == AF_INET6) {
1186 print_bool(PRINT_ANY,
1187 "temporary", "temporary ", true);
1188 } else {
1189 print_string(PRINT_FP, NULL,
1190 "%s ", ifa_flag_names[i].name);
1191 print_bool(PRINT_JSON,
1192 ifa_flag_names[i].name, NULL, true);
1193 }
f73ac674
SH
1194 }
1195
1196 flags &= ~mask;
1197 }
1198
d0e72011
JF
1199 if (flags) {
1200 if (is_json_context()) {
1201 SPRINT_BUF(b1);
1202
1203 snprintf(b1, sizeof(b1), "%02x", flags);
1204 print_string(PRINT_JSON, "ifa_flags", NULL, b1);
1205 } else {
1206 fprintf(fp, "flags %02x ", flags);
1207 }
1208 }
f73ac674
SH
1209
1210}
1211
1212static int get_filter(const char *arg)
1213{
133db49b 1214 bool inv = false;
f73ac674
SH
1215 unsigned int i;
1216
133db49b
PS
1217 if (arg[0] == '-') {
1218 inv = true;
1219 arg++;
1220 }
1221
f73ac674
SH
1222 /* Special cases */
1223 if (strcmp(arg, "dynamic") == 0) {
133db49b
PS
1224 inv = !inv;
1225 arg = "permanent";
f73ac674 1226 } else if (strcmp(arg, "primary") == 0) {
133db49b
PS
1227 inv = !inv;
1228 arg = "secondary";
1229 }
f73ac674 1230
133db49b
PS
1231 for (i = 0; i < ARRAY_SIZE(ifa_flag_names); i++) {
1232 if (strcmp(arg, ifa_flag_names[i].name))
1233 continue;
1234
1235 if (inv)
1236 filter.flags &= ~ifa_flag_names[i].value;
1237 else
f73ac674 1238 filter.flags |= ifa_flag_names[i].value;
133db49b
PS
1239 filter.flagmask |= ifa_flag_names[i].value;
1240 return 0;
f73ac674 1241 }
133db49b 1242 return -1;
f73ac674
SH
1243}
1244
17df3d60
SP
1245static int ifa_label_match_rta(int ifindex, const struct rtattr *rta)
1246{
1247 const char *label;
17df3d60
SP
1248
1249 if (!filter.label)
1250 return 0;
1251
1252 if (rta)
1253 label = RTA_DATA(rta);
1254 else
d92cc2d0 1255 label = ll_index_to_name(ifindex);
17df3d60
SP
1256
1257 return fnmatch(filter.label, label, 0);
1258}
1259
cd554f2c 1260int print_addrinfo(struct nlmsghdr *n, void *arg)
aba5acdf 1261{
4b726cb1 1262 FILE *fp = arg;
aba5acdf
SH
1263 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1264 int len = n->nlmsg_len;
3bc1c4f2 1265 unsigned int ifa_flags;
56f5daac 1266 struct rtattr *rta_tb[IFA_MAX+1];
56f5daac 1267
aba5acdf
SH
1268 SPRINT_BUF(b1);
1269
1270 if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR)
1271 return 0;
1272 len -= NLMSG_LENGTH(sizeof(*ifa));
1273 if (len < 0) {
1274 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
1275 return -1;
1276 }
1277
1278 if (filter.flushb && n->nlmsg_type != RTM_NEWADDR)
1279 return 0;
1280
4b726cb1
SH
1281 parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa),
1282 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
aba5acdf 1283
37c9b94e
JP
1284 ifa_flags = get_ifa_flags(ifa, rta_tb[IFA_FLAGS]);
1285
aba5acdf
SH
1286 if (!rta_tb[IFA_LOCAL])
1287 rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1288 if (!rta_tb[IFA_ADDRESS])
1289 rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
1290
1291 if (filter.ifindex && filter.ifindex != ifa->ifa_index)
1292 return 0;
1293 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1294 return 0;
37c9b94e 1295 if ((filter.flags ^ ifa_flags) & filter.flagmask)
aba5acdf 1296 return 0;
aba5acdf 1297
3eb1731b 1298 if (filter.family && filter.family != ifa->ifa_family)
1299 return 0;
1300
17df3d60
SP
1301 if (ifa_label_match_rta(ifa->ifa_index, rta_tb[IFA_LABEL]))
1302 return 0;
1303
c4de9ada
SP
1304 if (inet_addr_match_rta(&filter.pfx, rta_tb[IFA_LOCAL]))
1305 return 0;
1306
aba5acdf
SH
1307 if (filter.flushb) {
1308 struct nlmsghdr *fn;
56f5daac 1309
aba5acdf
SH
1310 if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
1311 if (flush_update())
1312 return -1;
1313 }
56f5daac 1314 fn = (struct nlmsghdr *)(filter.flushb + NLMSG_ALIGN(filter.flushp));
aba5acdf
SH
1315 memcpy(fn, n, n->nlmsg_len);
1316 fn->nlmsg_type = RTM_DELADDR;
1317 fn->nlmsg_flags = NLM_F_REQUEST;
351efcde 1318 fn->nlmsg_seq = ++rth.seq;
56f5daac 1319 filter.flushp = (((char *)fn) + n->nlmsg_len) - filter.flushb;
aba5acdf
SH
1320 filter.flushed++;
1321 if (show_stats < 2)
1322 return 0;
1323 }
1324
1325 if (n->nlmsg_type == RTM_DELADDR)
d0e72011 1326 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
aba5acdf 1327
5d295bb8 1328 if (!brief) {
a3e0229e
SP
1329 const char *name;
1330
d0e72011
JF
1331 if (filter.oneline || filter.flushb) {
1332 const char *dev = ll_index_to_name(ifa->ifa_index);
1333
1334 if (is_json_context()) {
1335 print_int(PRINT_JSON,
1336 "index", NULL, ifa->ifa_index);
1337 print_string(PRINT_JSON, "dev", NULL, dev);
1338 } else {
1339 fprintf(fp, "%u: %s", ifa->ifa_index, dev);
1340 }
1341 }
1342
a3e0229e
SP
1343 name = family_name(ifa->ifa_family);
1344 if (*name != '?') {
1345 print_string(PRINT_ANY, "family", " %s ", name);
1346 } else {
1347 print_int(PRINT_ANY, "family_index", " family %d ",
1348 ifa->ifa_family);
1349 }
5d295bb8 1350 }
aba5acdf
SH
1351
1352 if (rta_tb[IFA_LOCAL]) {
d0e72011
JF
1353 print_color_string(PRINT_ANY,
1354 ifa_family_color(ifa->ifa_family),
1355 "local", "%s",
1356 format_host_rta(ifa->ifa_family,
1357 rta_tb[IFA_LOCAL]));
ff9d8f37
PS
1358 if (rta_tb[IFA_ADDRESS] &&
1359 memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
468fa020
SH
1360 RTA_DATA(rta_tb[IFA_LOCAL]),
1361 ifa->ifa_family == AF_INET ? 4 : 16)) {
d0e72011
JF
1362 print_string(PRINT_FP, NULL, " %s ", "peer");
1363 print_color_string(PRINT_ANY,
1364 ifa_family_color(ifa->ifa_family),
1365 "address",
1366 "%s",
1367 format_host_rta(ifa->ifa_family,
1368 rta_tb[IFA_ADDRESS]));
aba5acdf 1369 }
6335c5ff 1370 print_int(PRINT_ANY, "prefixlen", "/%d ", ifa->ifa_prefixlen);
78d04c7b
DA
1371
1372 if (rta_tb[IFA_RT_PRIORITY])
1373 print_uint(PRINT_ANY, "metric", "metric %u ",
1374 rta_getattr_u32(rta_tb[IFA_RT_PRIORITY]));
aba5acdf
SH
1375 }
1376
5d295bb8
AG
1377 if (brief)
1378 goto brief_exit;
1379
aba5acdf 1380 if (rta_tb[IFA_BROADCAST]) {
d0e72011
JF
1381 print_string(PRINT_FP, NULL, "%s ", "brd");
1382 print_color_string(PRINT_ANY,
1383 ifa_family_color(ifa->ifa_family),
1384 "broadcast",
1385 "%s ",
1386 format_host_rta(ifa->ifa_family,
1387 rta_tb[IFA_BROADCAST]));
aba5acdf 1388 }
d0e72011 1389
aba5acdf 1390 if (rta_tb[IFA_ANYCAST]) {
d0e72011
JF
1391 print_string(PRINT_FP, NULL, "%s ", "any");
1392 print_color_string(PRINT_ANY,
1393 ifa_family_color(ifa->ifa_family),
1394 "anycast",
1395 "%s ",
1396 format_host_rta(ifa->ifa_family,
1397 rta_tb[IFA_ANYCAST]));
aba5acdf 1398 }
d0e72011
JF
1399
1400 print_string(PRINT_ANY,
1401 "scope",
1402 "scope %s ",
1403 rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1)));
f73ac674
SH
1404
1405 print_ifa_flags(fp, ifa, ifa_flags);
1406
aba5acdf 1407 if (rta_tb[IFA_LABEL])
d0e72011
JF
1408 print_string(PRINT_ANY,
1409 "label",
1410 "%s",
1411 rta_getattr_str(rta_tb[IFA_LABEL]));
1412
aba5acdf
SH
1413 if (rta_tb[IFA_CACHEINFO]) {
1414 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
56f5daac 1415
b85076cd 1416 print_nl();
d0e72011
JF
1417 print_string(PRINT_FP, NULL, " valid_lft ", NULL);
1418
1419 if (ci->ifa_valid == INFINITY_LIFE_TIME) {
1420 print_uint(PRINT_JSON,
1421 "valid_life_time",
1422 NULL, INFINITY_LIFE_TIME);
1423 print_string(PRINT_FP, NULL, "%s", "forever");
1424 } else {
1425 print_uint(PRINT_ANY,
1426 "valid_life_time", "%usec", ci->ifa_valid);
1427 }
1428
1429 print_string(PRINT_FP, NULL, " preferred_lft ", NULL);
1430 if (ci->ifa_prefered == INFINITY_LIFE_TIME) {
1431 print_uint(PRINT_JSON,
1432 "preferred_life_time",
1433 NULL, INFINITY_LIFE_TIME);
1434 print_string(PRINT_FP, NULL, "%s", "forever");
1435 } else {
f73ac674 1436 if (ifa_flags & IFA_F_DEPRECATED)
d0e72011
JF
1437 print_int(PRINT_ANY,
1438 "preferred_life_time",
1439 "%dsec",
1440 ci->ifa_prefered);
037d950b 1441 else
d0e72011
JF
1442 print_uint(PRINT_ANY,
1443 "preferred_life_time",
1444 "%usec",
1445 ci->ifa_prefered);
037d950b 1446 }
aba5acdf 1447 }
d0e72011 1448 print_string(PRINT_FP, NULL, "%s", "\n");
5d295bb8 1449brief_exit:
aba5acdf
SH
1450 fflush(fp);
1451 return 0;
1452}
1453
5e5055bc
AH
1454static int print_selected_addrinfo(struct ifinfomsg *ifi,
1455 struct nlmsg_list *ainfo, FILE *fp)
aba5acdf 1456{
d0e72011 1457 open_json_array(PRINT_JSON, "addr_info");
56f5daac 1458 for ( ; ainfo ; ainfo = ainfo->next) {
aba5acdf
SH
1459 struct nlmsghdr *n = &ainfo->h;
1460 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1461
1462 if (n->nlmsg_type != RTM_NEWADDR)
1463 continue;
1464
6cf2609d 1465 if (n->nlmsg_len < NLMSG_LENGTH(sizeof(*ifa)))
aba5acdf
SH
1466 return -1;
1467
5e5055bc 1468 if (ifa->ifa_index != ifi->ifi_index ||
aba5acdf
SH
1469 (filter.family && filter.family != ifa->ifa_family))
1470 continue;
1471
5e5055bc
AH
1472 if (filter.up && !(ifi->ifi_flags&IFF_UP))
1473 continue;
1474
d0e72011 1475 open_json_object(NULL);
cd554f2c 1476 print_addrinfo(n, fp);
d0e72011 1477 close_json_object();
aba5acdf 1478 }
d0e72011
JF
1479 close_json_array(PRINT_JSON, NULL);
1480
5d295bb8 1481 if (brief) {
d0e72011 1482 print_string(PRINT_FP, NULL, "%s", "\n");
5d295bb8
AG
1483 fflush(fp);
1484 }
aba5acdf
SH
1485 return 0;
1486}
1487
1488
cd554f2c 1489static int store_nlmsg(struct nlmsghdr *n, void *arg)
aba5acdf 1490{
62e2e540 1491 struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg;
aba5acdf 1492 struct nlmsg_list *h;
aba5acdf 1493
56f5daac 1494 h = malloc(n->nlmsg_len+sizeof(void *));
aba5acdf
SH
1495 if (h == NULL)
1496 return -1;
1497
1498 memcpy(&h->h, n, n->nlmsg_len);
1499 h->next = NULL;
1500
62e2e540
ED
1501 if (lchain->tail)
1502 lchain->tail->next = h;
1503 else
1504 lchain->head = h;
1505 lchain->tail = h;
aba5acdf 1506
cd554f2c 1507 ll_remember_index(n, NULL);
aba5acdf
SH
1508 return 0;
1509}
1510
81824ac2
PE
1511static __u32 ipadd_dump_magic = 0x47361222;
1512
1513static int ipadd_save_prep(void)
1514{
1515 int ret;
1516
1517 if (isatty(STDOUT_FILENO)) {
14645ec2 1518 fprintf(stderr, "Not sending a binary stream to stdout\n");
81824ac2
PE
1519 return -1;
1520 }
1521
1522 ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic));
1523 if (ret != sizeof(ipadd_dump_magic)) {
1524 fprintf(stderr, "Can't write magic to dump file\n");
1525 return -1;
1526 }
1527
1528 return 0;
1529}
1530
1531static int ipadd_dump_check_magic(void)
1532{
1533 int ret;
1534 __u32 magic = 0;
1535
1536 if (isatty(STDIN_FILENO)) {
4e972d5e 1537 fprintf(stderr, "Can't restore address dump from a terminal\n");
81824ac2
PE
1538 return -1;
1539 }
1540
1541 ret = fread(&magic, sizeof(magic), 1, stdin);
1542 if (magic != ipadd_dump_magic) {
1543 fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
1544 return -1;
1545 }
1546
1547 return 0;
1548}
1549
cd554f2c 1550static int save_nlmsg(struct nlmsghdr *n, void *arg)
81824ac2
PE
1551{
1552 int ret;
1553
1554 ret = write(STDOUT_FILENO, n, n->nlmsg_len);
1555 if ((ret > 0) && (ret != n->nlmsg_len)) {
1556 fprintf(stderr, "Short write while saving nlmsg\n");
1557 ret = -EIO;
1558 }
1559
1560 return ret == n->nlmsg_len ? 0 : ret;
1561}
1562
cd554f2c 1563static int show_handler(struct rtnl_ctrl_data *ctrl,
0628cddd 1564 struct nlmsghdr *n, void *arg)
81824ac2
PE
1565{
1566 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1567
1cfcf62c
PS
1568 open_json_object(NULL);
1569 print_int(PRINT_ANY, "index", "if%d:\n", ifa->ifa_index);
cd554f2c 1570 print_addrinfo(n, stdout);
1cfcf62c 1571 close_json_object();
81824ac2
PE
1572 return 0;
1573}
1574
1575static int ipaddr_showdump(void)
1576{
1cfcf62c
PS
1577 int err;
1578
81824ac2
PE
1579 if (ipadd_dump_check_magic())
1580 exit(-1);
1581
429f314e 1582 new_json_obj(json);
1cfcf62c
PS
1583 open_json_object(NULL);
1584 open_json_array(PRINT_JSON, "addr_info");
1585
1586 err = rtnl_from_file(stdin, &show_handler, NULL);
1587
1588 close_json_array(PRINT_JSON, NULL);
1589 close_json_object();
1590 delete_json_obj();
1591
1592 exit(err);
81824ac2
PE
1593}
1594
cd554f2c 1595static int restore_handler(struct rtnl_ctrl_data *ctrl,
0628cddd 1596 struct nlmsghdr *n, void *arg)
81824ac2
PE
1597{
1598 int ret;
1599
1600 n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
1601
1602 ll_init_map(&rth);
1603
86bf43c7 1604 ret = rtnl_talk(&rth, n, NULL);
81824ac2
PE
1605 if ((ret < 0) && (errno == EEXIST))
1606 ret = 0;
1607
1608 return ret;
1609}
1610
1611static int ipaddr_restore(void)
1612{
1613 if (ipadd_dump_check_magic())
1614 exit(-1);
1615
1616 exit(rtnl_from_file(stdin, &restore_handler, NULL));
1617}
1618
4ad87594 1619void free_nlmsg_chain(struct nlmsg_chain *info)
8d07e5f7
SH
1620{
1621 struct nlmsg_list *l, *n;
1622
1623 for (l = info->head; l; l = n) {
1624 n = l->next;
1625 free(l);
1626 }
1627}
1628
1629static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1630{
1631 struct nlmsg_list *l, **lp;
1632
1633 lp = &linfo->head;
56f5daac 1634 while ((l = *lp) != NULL) {
8d07e5f7 1635 int ok = 0;
7f747fd9 1636 int missing_net_address = 1;
8d07e5f7
SH
1637 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
1638 struct nlmsg_list *a;
1639
1640 for (a = ainfo->head; a; a = a->next) {
1641 struct nlmsghdr *n = &a->h;
1642 struct ifaddrmsg *ifa = NLMSG_DATA(n);
37c9b94e
JP
1643 struct rtattr *tb[IFA_MAX + 1];
1644 unsigned int ifa_flags;
8d07e5f7 1645
7f747fd9
PP
1646 if (ifa->ifa_index != ifi->ifi_index)
1647 continue;
1648 missing_net_address = 0;
1649 if (filter.family && filter.family != ifa->ifa_family)
8d07e5f7
SH
1650 continue;
1651 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1652 continue;
37c9b94e
JP
1653
1654 parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n));
1655 ifa_flags = get_ifa_flags(ifa, tb[IFA_FLAGS]);
1656
1657 if ((filter.flags ^ ifa_flags) & filter.flagmask)
8d07e5f7 1658 continue;
17df3d60
SP
1659
1660 if (ifa_label_match_rta(ifa->ifa_index, tb[IFA_LABEL]))
1661 continue;
1662
1663 if (!tb[IFA_LOCAL])
1664 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
1665 if (inet_addr_match_rta(&filter.pfx, tb[IFA_LOCAL]))
1666 continue;
8d07e5f7
SH
1667
1668 ok = 1;
1669 break;
1670 }
7f747fd9
PP
1671 if (missing_net_address &&
1672 (filter.family == AF_UNSPEC || filter.family == AF_PACKET))
1673 ok = 1;
8d07e5f7
SH
1674 if (!ok) {
1675 *lp = l->next;
1676 free(l);
1677 } else
1678 lp = &l->next;
1679 }
1680}
1681
88470978
DA
1682static int ipaddr_dump_filter(struct nlmsghdr *nlh, int reqlen)
1683{
1684 struct ifaddrmsg *ifa = NLMSG_DATA(nlh);
1685
1686 ifa->ifa_index = filter.ifindex;
1687
1688 return 0;
1689}
1690
8d07e5f7
SH
1691static int ipaddr_flush(void)
1692{
1693 int round = 0;
1694 char flushb[4096-512];
1695
1696 filter.flushb = flushb;
1697 filter.flushp = 0;
1698 filter.flushe = sizeof(flushb);
1699
1700 while ((max_flush_loops == 0) || (round < max_flush_loops)) {
88470978
DA
1701 if (rtnl_addrdump_req(&rth, filter.family,
1702 ipaddr_dump_filter) < 0) {
8d07e5f7
SH
1703 perror("Cannot send dump request");
1704 exit(1);
1705 }
1706 filter.flushed = 0;
d25ec03e
PS
1707 if (rtnl_dump_filter_nc(&rth, print_addrinfo,
1708 stdout, NLM_F_DUMP_INTR) < 0) {
8d07e5f7
SH
1709 fprintf(stderr, "Flush terminated\n");
1710 exit(1);
1711 }
1712 if (filter.flushed == 0) {
1713 flush_done:
1714 if (show_stats) {
1715 if (round == 0)
1716 printf("Nothing to flush.\n");
1717 else
56f5daac 1718 printf("*** Flush is complete after %d round%s ***\n", round, round > 1?"s":"");
8d07e5f7
SH
1719 }
1720 fflush(stdout);
1721 return 0;
1722 }
1723 round++;
1724 if (flush_update() < 0)
1725 return 1;
1726
1727 if (show_stats) {
1728 printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed);
1729 fflush(stdout);
1730 }
1731
1732 /* If we are flushing, and specifying primary, then we
1733 * want to flush only a single round. Otherwise, we'll
1734 * start flushing secondaries that were promoted to
1735 * primaries.
1736 */
1737 if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY))
1738 goto flush_done;
1739 }
1740 fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops);
1741 fflush(stderr);
1742 return 1;
1743}
1744
b0a4ce62
DA
1745static int iplink_filter_req(struct nlmsghdr *nlh, int reqlen)
1746{
1747 int err;
1748
1749 err = addattr32(nlh, reqlen, IFLA_EXT_MASK, RTEXT_FILTER_VF);
1750 if (err)
1751 return err;
1752
1753 if (filter.master) {
1754 err = addattr32(nlh, reqlen, IFLA_MASTER, filter.master);
1755 if (err)
1756 return err;
1757 }
1758
1759 if (filter.kind) {
1760 struct rtattr *linkinfo;
1761
1762 linkinfo = addattr_nest(nlh, reqlen, IFLA_LINKINFO);
1763
1764 err = addattr_l(nlh, reqlen, IFLA_INFO_KIND, filter.kind,
1765 strlen(filter.kind));
1766 if (err)
1767 return err;
1768
1769 addattr_nest_end(nlh, linkinfo);
1770 }
1771
1772 return 0;
1773}
1774
88470978
DA
1775static int ipaddr_link_get(int index, struct nlmsg_chain *linfo)
1776{
1777 struct iplink_req req = {
1778 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
1779 .n.nlmsg_flags = NLM_F_REQUEST,
1780 .n.nlmsg_type = RTM_GETLINK,
1781 .i.ifi_family = filter.family,
1782 .i.ifi_index = index,
1783 };
1784 __u32 filt_mask = RTEXT_FILTER_VF;
1785 struct nlmsghdr *answer;
1786
1787 if (!show_stats)
1788 filt_mask |= RTEXT_FILTER_SKIP_STATS;
1789
1790 addattr32(&req.n, sizeof(req), IFLA_EXT_MASK, filt_mask);
1791
1792 if (rtnl_talk(&rth, &req.n, &answer) < 0) {
1793 perror("Cannot send link request");
1794 return 1;
1795 }
1796
1797 if (store_nlmsg(answer, linfo) < 0) {
1798 fprintf(stderr, "Failed to process link information\n");
1799 return 1;
1800 }
1801
1802 return 0;
1803}
1804
4ad87594
DA
1805/* fills in linfo with link data and optionally ainfo with address info
1806 * caller can walk lists as desired and must call free_nlmsg_chain for
1807 * both when done
1808 */
7ca9cee8 1809int ip_link_list(req_filter_fn_t filter_fn, struct nlmsg_chain *linfo)
4ad87594 1810{
31ae2912 1811 if (rtnl_linkdump_req_filter_fn(&rth, preferred_family,
4ad87594
DA
1812 filter_fn) < 0) {
1813 perror("Cannot send dump request");
1814 return 1;
1815 }
1816
1817 if (rtnl_dump_filter(&rth, store_nlmsg, linfo) < 0) {
1818 fprintf(stderr, "Dump terminated\n");
1819 return 1;
1820 }
1821
7ca9cee8
DA
1822 return 0;
1823}
4ad87594 1824
7ca9cee8
DA
1825static int ip_addr_list(struct nlmsg_chain *ainfo)
1826{
88470978 1827 if (rtnl_addrdump_req(&rth, filter.family, ipaddr_dump_filter) < 0) {
7ca9cee8
DA
1828 perror("Cannot send dump request");
1829 return 1;
1830 }
1831
1832 if (rtnl_dump_filter(&rth, store_nlmsg, ainfo) < 0) {
1833 fprintf(stderr, "Dump terminated\n");
1834 return 1;
4ad87594
DA
1835 }
1836
1837 return 0;
1838}
1839
81824ac2 1840static int ipaddr_list_flush_or_save(int argc, char **argv, int action)
aba5acdf 1841{
62e2e540 1842 struct nlmsg_chain linfo = { NULL, NULL};
7ca9cee8 1843 struct nlmsg_chain _ainfo = { NULL, NULL}, *ainfo = &_ainfo;
8d07e5f7 1844 struct nlmsg_list *l;
aba5acdf
SH
1845 char *filter_dev = NULL;
1846 int no_link = 0;
1847
093b7646 1848 ipaddr_reset_filter(oneline, 0);
aba5acdf 1849 filter.showqueue = 1;
906dfe48 1850 filter.family = preferred_family;
c4fdf75d 1851 filter.group = -1;
f960c92a 1852
81824ac2 1853 if (action == IPADD_FLUSH) {
aba5acdf
SH
1854 if (argc <= 0) {
1855 fprintf(stderr, "Flush requires arguments.\n");
f960c92a 1856
aba5acdf
SH
1857 return -1;
1858 }
1859 if (filter.family == AF_PACKET) {
1860 fprintf(stderr, "Cannot flush link addresses.\n");
1861 return -1;
1862 }
1863 }
1864
1865 while (argc > 0) {
1866 if (strcmp(*argv, "to") == 0) {
1867 NEXT_ARG();
c4de9ada
SP
1868 if (get_prefix(&filter.pfx, *argv, filter.family))
1869 invarg("invalid \"to\"\n", *argv);
aba5acdf
SH
1870 if (filter.family == AF_UNSPEC)
1871 filter.family = filter.pfx.family;
1872 } else if (strcmp(*argv, "scope") == 0) {
56f5daac
SH
1873 unsigned int scope = 0;
1874
aba5acdf
SH
1875 NEXT_ARG();
1876 filter.scopemask = -1;
1877 if (rtnl_rtscope_a2n(&scope, *argv)) {
1878 if (strcmp(*argv, "all") != 0)
1879 invarg("invalid \"scope\"\n", *argv);
1880 scope = RT_SCOPE_NOWHERE;
1881 filter.scopemask = 0;
1882 }
1883 filter.scope = scope;
1884 } else if (strcmp(*argv, "up") == 0) {
1885 filter.up = 1;
f73ac674
SH
1886 } else if (get_filter(*argv) == 0) {
1887
aba5acdf
SH
1888 } else if (strcmp(*argv, "label") == 0) {
1889 NEXT_ARG();
1890 filter.label = *argv;
f960c92a
VD
1891 } else if (strcmp(*argv, "group") == 0) {
1892 NEXT_ARG();
1893 if (rtnl_group_a2n(&filter.group, *argv))
1894 invarg("Invalid \"group\" value\n", *argv);
1b944148
VK
1895 } else if (strcmp(*argv, "master") == 0) {
1896 int ifindex;
56f5daac 1897
1b944148
VK
1898 NEXT_ARG();
1899 ifindex = ll_name_to_index(*argv);
1900 if (!ifindex)
1901 invarg("Device does not exist\n", *argv);
1902 filter.master = ifindex;
104444c2
DA
1903 } else if (strcmp(*argv, "vrf") == 0) {
1904 int ifindex;
1905
1906 NEXT_ARG();
1907 ifindex = ll_name_to_index(*argv);
1908 if (!ifindex)
1909 invarg("Not a valid VRF name\n", *argv);
1910 if (!name_is_vrf(*argv))
1911 invarg("Not a valid VRF name\n", *argv);
1912 filter.master = ifindex;
24604eb2 1913 } else if (strcmp(*argv, "type") == 0) {
e0513807
PS
1914 int soff;
1915
712249d8 1916 NEXT_ARG();
e0513807
PS
1917 soff = strlen(*argv) - strlen("_slave");
1918 if (!strcmp(*argv + soff, "_slave")) {
1919 (*argv)[soff] = '\0';
1920 filter.slave_kind = *argv;
1921 } else {
1922 filter.kind = *argv;
1923 }
aba5acdf 1924 } else {
468fa020 1925 if (strcmp(*argv, "dev") == 0)
aba5acdf 1926 NEXT_ARG();
468fa020 1927 else if (matches(*argv, "help") == 0)
aba5acdf
SH
1928 usage();
1929 if (filter_dev)
1930 duparg2("dev", *argv);
1931 filter_dev = *argv;
1932 }
1933 argv++; argc--;
1934 }
1935
aba5acdf
SH
1936 if (filter_dev) {
1937 filter.ifindex = ll_name_to_index(filter_dev);
1938 if (filter.ifindex <= 0) {
1939 fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev);
1940 return -1;
1941 }
1942 }
1943
81824ac2 1944 if (action == IPADD_FLUSH)
8d07e5f7 1945 return ipaddr_flush();
351efcde 1946
81824ac2
PE
1947 if (action == IPADD_SAVE) {
1948 if (ipadd_save_prep())
1949 exit(1);
1950
88470978
DA
1951 if (rtnl_addrdump_req(&rth, preferred_family,
1952 ipaddr_dump_filter) < 0) {
81824ac2
PE
1953 perror("Cannot send dump request");
1954 exit(1);
1955 }
1956
1957 if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) {
1958 fprintf(stderr, "Save terminated\n");
1959 exit(1);
1960 }
1961
1962 exit(0);
1963 }
1964
d0e72011
JF
1965 /*
1966 * Initialize a json_writer and open an array object
1967 * if -json was specified.
1968 */
429f314e 1969 new_json_obj(json);
d0e72011 1970
50b9950d
RP
1971 /*
1972 * If only filter_dev present and none of the other
1973 * link filters are present, use RTM_GETLINK to get
1974 * the link device
1975 */
1976 if (filter_dev && filter.group == -1 && do_link == 1) {
260137e2 1977 if (iplink_get(filter_dev, RTEXT_FILTER_VF) < 0) {
50b9950d 1978 perror("Cannot send link get request");
d0e72011 1979 delete_json_obj();
50b9950d
RP
1980 exit(1);
1981 }
d0e72011 1982 delete_json_obj();
d56c7dde 1983 goto out;
50b9950d
RP
1984 }
1985
88470978
DA
1986 if (filter.ifindex) {
1987 if (ipaddr_link_get(filter.ifindex, &linfo) != 0)
1988 goto out;
1989 } else {
1990 if (ip_link_list(iplink_filter_req, &linfo) != 0)
1991 goto out;
1992 }
4ad87594 1993
7ca9cee8 1994 if (filter.family != AF_PACKET) {
8d07e5f7
SH
1995 if (filter.oneline)
1996 no_link = 1;
1997
7ca9cee8
DA
1998 if (ip_addr_list(ainfo) != 0)
1999 goto out;
aba5acdf 2000
4ad87594 2001 ipaddr_filter(&linfo, ainfo);
7ca9cee8 2002 }
aba5acdf 2003
8d07e5f7 2004 for (l = linfo.head; l; l = l->next) {
1bccd1e4
SP
2005 struct nlmsghdr *n = &l->h;
2006 struct ifinfomsg *ifi = NLMSG_DATA(n);
c956e9a9 2007 int res = 0;
5d5cf1b4 2008
d0e72011 2009 open_json_object(NULL);
c956e9a9 2010 if (brief || !no_link)
cd554f2c 2011 res = print_linkinfo(n, stdout);
1bccd1e4
SP
2012 if (res >= 0 && filter.family != AF_PACKET)
2013 print_selected_addrinfo(ifi, ainfo->head, stdout);
2014 if (res > 0 && !do_link && show_stats)
2015 print_link_stats(stdout, n);
d0e72011 2016 close_json_object();
aba5acdf 2017 }
8d07e5f7
SH
2018 fflush(stdout);
2019
4ad87594 2020out:
88470978 2021 free_nlmsg_chain(ainfo);
8d07e5f7 2022 free_nlmsg_chain(&linfo);
d0e72011 2023 delete_json_obj();
351efcde 2024 return 0;
aba5acdf
SH
2025}
2026
f89a2a05
SC
2027static void
2028ipaddr_loop_each_vf(struct rtattr *tb[], int vfnum, int *min, int *max)
2029{
2030 struct rtattr *vflist = tb[IFLA_VFINFO_LIST];
2031 struct rtattr *i, *vf[IFLA_VF_MAX+1];
2032 struct ifla_vf_rate *vf_rate;
2033 int rem;
2034
2035 rem = RTA_PAYLOAD(vflist);
2036
2037 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
2038 parse_rtattr_nested(vf, IFLA_VF_MAX, i);
39315157
GP
2039
2040 if (!vf[IFLA_VF_RATE]) {
2041 fprintf(stderr, "VF min/max rate API not supported\n");
2042 exit(1);
2043 }
2044
f89a2a05
SC
2045 vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
2046 if (vf_rate->vf == vfnum) {
2047 *min = vf_rate->min_tx_rate;
2048 *max = vf_rate->max_tx_rate;
2049 return;
2050 }
2051 }
2052 fprintf(stderr, "Cannot find VF %d\n", vfnum);
2053 exit(1);
2054}
2055
65083b5f 2056void ipaddr_get_vf_rate(int vfnum, int *min, int *max, const char *dev)
f89a2a05
SC
2057{
2058 struct nlmsg_chain linfo = { NULL, NULL};
2059 struct rtattr *tb[IFLA_MAX+1];
2060 struct ifinfomsg *ifi;
2061 struct nlmsg_list *l;
2062 struct nlmsghdr *n;
65083b5f
SH
2063 int idx, len;
2064
2065 idx = ll_name_to_index(dev);
2066 if (idx == 0) {
2067 fprintf(stderr, "Device %s does not exist\n", dev);
2068 exit(1);
2069 }
f89a2a05 2070
31ae2912 2071 if (rtnl_linkdump_req(&rth, AF_UNSPEC) < 0) {
f89a2a05
SC
2072 perror("Cannot send dump request");
2073 exit(1);
2074 }
2075 if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) {
2076 fprintf(stderr, "Dump terminated\n");
2077 exit(1);
2078 }
2079 for (l = linfo.head; l; l = l->next) {
2080 n = &l->h;
2081 ifi = NLMSG_DATA(n);
2082
2083 len = n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi));
1199c4f5 2084 if (len < 0 || (idx && idx != ifi->ifi_index))
f89a2a05
SC
2085 continue;
2086
2087 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
2088
2089 if ((tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF])) {
2090 ipaddr_loop_each_vf(tb, vfnum, min, max);
2091 return;
2092 }
2093 }
2094}
2095
aba5acdf
SH
2096int ipaddr_list_link(int argc, char **argv)
2097{
2098 preferred_family = AF_PACKET;
2099 do_link = 1;
81824ac2 2100 return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST);
aba5acdf
SH
2101}
2102
093b7646 2103void ipaddr_reset_filter(int oneline, int ifindex)
aba5acdf
SH
2104{
2105 memset(&filter, 0, sizeof(filter));
2106 filter.oneline = oneline;
093b7646 2107 filter.ifindex = ifindex;
aba5acdf
SH
2108}
2109
3d866ba2 2110static int default_scope(inet_prefix *lcl)
aba5acdf
SH
2111{
2112 if (lcl->family == AF_INET) {
56f5daac 2113 if (lcl->bytelen >= 1 && *(__u8 *)&lcl->data == 127)
aba5acdf
SH
2114 return RT_SCOPE_HOST;
2115 }
2116 return 0;
2117}
2118
e31867ac
MC
2119static bool ipaddr_is_multicast(inet_prefix *a)
2120{
2121 if (a->family == AF_INET)
2122 return IN_MULTICAST(ntohl(a->data[0]));
2123 else if (a->family == AF_INET6)
2124 return IN6_IS_ADDR_MULTICAST(a->data);
2125 else
2126 return false;
2127}
2128
cad73425
PT
2129static bool is_valid_label(const char *dev, const char *label)
2130{
2131 size_t len = strlen(dev);
2132
2133 if (strncmp(label, dev, len) != 0)
2134 return false;
2135
2136 return label[len] == '\0' || label[len] == ':';
2137}
2138
3d866ba2 2139static int ipaddr_modify(int cmd, int flags, int argc, char **argv)
aba5acdf 2140{
aba5acdf 2141 struct {
4806867a
SH
2142 struct nlmsghdr n;
2143 struct ifaddrmsg ifa;
4b726cb1 2144 char buf[256];
d17b136f
PS
2145 } req = {
2146 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)),
2147 .n.nlmsg_flags = NLM_F_REQUEST | flags,
2148 .n.nlmsg_type = cmd,
2149 .ifa.ifa_family = preferred_family,
2150 };
aba5acdf
SH
2151 char *d = NULL;
2152 char *l = NULL;
f082b64f 2153 char *lcl_arg = NULL;
35546df7
MN
2154 char *valid_lftp = NULL;
2155 char *preferred_lftp = NULL;
d044ea3e 2156 inet_prefix lcl = {};
aba5acdf
SH
2157 inet_prefix peer;
2158 int local_len = 0;
2159 int peer_len = 0;
2160 int brd_len = 0;
2161 int any_len = 0;
2162 int scoped = 0;
141bb606
MN
2163 __u32 preferred_lft = INFINITY_LIFE_TIME;
2164 __u32 valid_lft = INFINITY_LIFE_TIME;
37c9b94e 2165 unsigned int ifa_flags = 0;
aba5acdf 2166
aba5acdf
SH
2167 while (argc > 0) {
2168 if (strcmp(*argv, "peer") == 0 ||
2169 strcmp(*argv, "remote") == 0) {
2170 NEXT_ARG();
2171
2172 if (peer_len)
2173 duparg("peer", *argv);
2174 get_prefix(&peer, *argv, req.ifa.ifa_family);
2175 peer_len = peer.bytelen;
2176 if (req.ifa.ifa_family == AF_UNSPEC)
2177 req.ifa.ifa_family = peer.family;
2178 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen);
2179 req.ifa.ifa_prefixlen = peer.bitlen;
2180 } else if (matches(*argv, "broadcast") == 0 ||
2181 strcmp(*argv, "brd") == 0) {
2182 inet_prefix addr;
56f5daac 2183
aba5acdf
SH
2184 NEXT_ARG();
2185 if (brd_len)
2186 duparg("broadcast", *argv);
2187 if (strcmp(*argv, "+") == 0)
2188 brd_len = -1;
2189 else if (strcmp(*argv, "-") == 0)
2190 brd_len = -2;
2191 else {
2192 get_addr(&addr, *argv, req.ifa.ifa_family);
2193 if (req.ifa.ifa_family == AF_UNSPEC)
2194 req.ifa.ifa_family = addr.family;
2195 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen);
2196 brd_len = addr.bytelen;
2197 }
2198 } else if (strcmp(*argv, "anycast") == 0) {
2199 inet_prefix addr;
56f5daac 2200
aba5acdf
SH
2201 NEXT_ARG();
2202 if (any_len)
2203 duparg("anycast", *argv);
2204 get_addr(&addr, *argv, req.ifa.ifa_family);
2205 if (req.ifa.ifa_family == AF_UNSPEC)
2206 req.ifa.ifa_family = addr.family;
2207 addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen);
2208 any_len = addr.bytelen;
2209 } else if (strcmp(*argv, "scope") == 0) {
56f5daac
SH
2210 unsigned int scope = 0;
2211
aba5acdf
SH
2212 NEXT_ARG();
2213 if (rtnl_rtscope_a2n(&scope, *argv))
f1675d61 2214 invarg("invalid scope value.", *argv);
aba5acdf
SH
2215 req.ifa.ifa_scope = scope;
2216 scoped = 1;
2217 } else if (strcmp(*argv, "dev") == 0) {
2218 NEXT_ARG();
2219 d = *argv;
2220 } else if (strcmp(*argv, "label") == 0) {
2221 NEXT_ARG();
2222 l = *argv;
2223 addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1);
78d04c7b
DA
2224 } else if (matches(*argv, "metric") == 0 ||
2225 matches(*argv, "priority") == 0 ||
2226 matches(*argv, "preference") == 0) {
2227 __u32 metric;
2228
2229 NEXT_ARG();
2230 if (get_u32(&metric, *argv, 0))
2231 invarg("\"metric\" value is invalid\n", *argv);
2232 addattr32(&req.n, sizeof(req), IFA_RT_PRIORITY, metric);
35546df7
MN
2233 } else if (matches(*argv, "valid_lft") == 0) {
2234 if (valid_lftp)
2235 duparg("valid_lft", *argv);
2236 NEXT_ARG();
2237 valid_lftp = *argv;
2238 if (set_lifetime(&valid_lft, *argv))
2239 invarg("valid_lft value", *argv);
2240 } else if (matches(*argv, "preferred_lft") == 0) {
2241 if (preferred_lftp)
2242 duparg("preferred_lft", *argv);
2243 NEXT_ARG();
2244 preferred_lftp = *argv;
2245 if (set_lifetime(&preferred_lft, *argv))
2246 invarg("preferred_lft value", *argv);
bac735c5 2247 } else if (strcmp(*argv, "home") == 0) {
37c9b94e 2248 ifa_flags |= IFA_F_HOMEADDRESS;
bac735c5 2249 } else if (strcmp(*argv, "nodad") == 0) {
37c9b94e 2250 ifa_flags |= IFA_F_NODAD;
5b7e21c4
JP
2251 } else if (strcmp(*argv, "mngtmpaddr") == 0) {
2252 ifa_flags |= IFA_F_MANAGETEMPADDR;
58c69b22
TH
2253 } else if (strcmp(*argv, "noprefixroute") == 0) {
2254 ifa_flags |= IFA_F_NOPREFIXROUTE;
e31867ac
MC
2255 } else if (strcmp(*argv, "autojoin") == 0) {
2256 ifa_flags |= IFA_F_MCAUTOJOIN;
aba5acdf 2257 } else {
468fa020 2258 if (strcmp(*argv, "local") == 0)
aba5acdf 2259 NEXT_ARG();
aba5acdf
SH
2260 if (matches(*argv, "help") == 0)
2261 usage();
2262 if (local_len)
2263 duparg2("local", *argv);
f082b64f 2264 lcl_arg = *argv;
aba5acdf
SH
2265 get_prefix(&lcl, *argv, req.ifa.ifa_family);
2266 if (req.ifa.ifa_family == AF_UNSPEC)
2267 req.ifa.ifa_family = lcl.family;
2268 addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen);
2269 local_len = lcl.bytelen;
2270 }
2271 argc--; argv++;
2272 }
8b21f88d
WC
2273 if (ifa_flags <= 0xff)
2274 req.ifa.ifa_flags = ifa_flags;
2275 else
2276 addattr32(&req.n, sizeof(req), IFA_FLAGS, ifa_flags);
37c9b94e 2277
aba5acdf
SH
2278 if (d == NULL) {
2279 fprintf(stderr, "Not enough information: \"dev\" argument is required.\n");
2280 return -1;
2281 }
cad73425
PT
2282 if (l && !is_valid_label(d, l)) {
2283 fprintf(stderr,
2284 "\"label\" (%s) must match \"dev\" (%s) or be prefixed by \"dev\" with a colon.\n",
2285 l, d);
1db61e02 2286 return -1;
aba5acdf
SH
2287 }
2288
f082b64f 2289 if (peer_len == 0 && local_len) {
2290 if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) {
2291 fprintf(stderr,
468fa020
SH
2292 "Warning: Executing wildcard deletion to stay compatible with old scripts.\n"
2293 " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n"
2294 " This special behaviour is likely to disappear in further releases,\n"
f082b64f 2295 " fix your scripts!\n", lcl_arg, local_len*8);
2296 } else {
2297 peer = lcl;
2298 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen);
2299 }
aba5acdf
SH
2300 }
2301 if (req.ifa.ifa_prefixlen == 0)
2302 req.ifa.ifa_prefixlen = lcl.bitlen;
2303
2304 if (brd_len < 0 && cmd != RTM_DELADDR) {
2305 inet_prefix brd;
2306 int i;
56f5daac 2307
aba5acdf
SH
2308 if (req.ifa.ifa_family != AF_INET) {
2309 fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n");
2310 return -1;
2311 }
2312 brd = peer;
2313 if (brd.bitlen <= 30) {
4b726cb1 2314 for (i = 31; i >= brd.bitlen; i--) {
aba5acdf
SH
2315 if (brd_len == -1)
2316 brd.data[0] |= htonl(1<<(31-i));
2317 else
2318 brd.data[0] &= ~htonl(1<<(31-i));
2319 }
2320 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen);
2321 brd_len = brd.bytelen;
2322 }
2323 }
2324 if (!scoped && cmd != RTM_DELADDR)
2325 req.ifa.ifa_scope = default_scope(&lcl);
2326
fe99adbc
SP
2327 req.ifa.ifa_index = ll_name_to_index(d);
2328 if (!req.ifa.ifa_index)
2329 return nodev(d);
aba5acdf 2330
35546df7 2331 if (valid_lftp || preferred_lftp) {
d17b136f
PS
2332 struct ifa_cacheinfo cinfo = {};
2333
35546df7
MN
2334 if (!valid_lft) {
2335 fprintf(stderr, "valid_lft is zero\n");
2336 return -1;
2337 }
2338 if (valid_lft < preferred_lft) {
2339 fprintf(stderr, "preferred_lft is greater than valid_lft\n");
2340 return -1;
2341 }
2342
35546df7
MN
2343 cinfo.ifa_prefered = preferred_lft;
2344 cinfo.ifa_valid = valid_lft;
2345 addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo,
2346 sizeof(cinfo));
2347 }
2348
e31867ac
MC
2349 if ((ifa_flags & IFA_F_MCAUTOJOIN) && !ipaddr_is_multicast(&lcl)) {
2350 fprintf(stderr, "autojoin needs multicast address\n");
2351 return -1;
2352 }
2353
86bf43c7 2354 if (rtnl_talk(&rth, &req.n, NULL) < 0)
1db61e02 2355 return -2;
aba5acdf 2356
351efcde 2357 return 0;
aba5acdf
SH
2358}
2359
2360int do_ipaddr(int argc, char **argv)
2361{
2362 if (argc < 1)
81824ac2 2363 return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST);
aba5acdf 2364 if (matches(*argv, "add") == 0)
0aef366b
NT
2365 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
2366 if (matches(*argv, "change") == 0 ||
2367 strcmp(*argv, "chg") == 0)
2368 return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1);
2369 if (matches(*argv, "replace") == 0)
2370 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
aba5acdf 2371 if (matches(*argv, "delete") == 0)
0aef366b 2372 return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1);
aba5acdf
SH
2373 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
2374 || matches(*argv, "lst") == 0)
81824ac2 2375 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST);
aba5acdf 2376 if (matches(*argv, "flush") == 0)
81824ac2
PE
2377 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH);
2378 if (matches(*argv, "save") == 0)
2379 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE);
2380 if (matches(*argv, "showdump") == 0)
2381 return ipaddr_showdump();
2382 if (matches(*argv, "restore") == 0)
2383 return ipaddr_restore();
aba5acdf
SH
2384 if (matches(*argv, "help") == 0)
2385 usage();
4e972d5e 2386 fprintf(stderr, "Command \"%s\" is unknown, try \"ip address help\".\n", *argv);
aba5acdf
SH
2387 exit(-1);
2388}