1
2
3
4
5
6
7
8
9
10
11
12
13#include <stdio.h>
14#include <stdlib.h>
15#include <unistd.h>
16#include <inttypes.h>
17#include <fcntl.h>
18#include <sys/ioctl.h>
19#include <sys/socket.h>
20#include <sys/param.h>
21#include <errno.h>
22#include <netinet/in.h>
23#include <arpa/inet.h>
24#include <string.h>
25#include <fnmatch.h>
26
27#include <linux/netdevice.h>
28#include <linux/if_arp.h>
29#include <linux/if_infiniband.h>
30#include <linux/sockios.h>
31#include <linux/net_namespace.h>
32
33#include "rt_names.h"
34#include "utils.h"
35#include "ll_map.h"
36#include "ip_common.h"
37#include "color.h"
38
39enum {
40 IPADD_LIST,
41 IPADD_FLUSH,
42 IPADD_SAVE,
43};
44
45static struct link_filter filter;
46static int do_link;
47
48static void usage(void) __attribute__((noreturn));
49
50static void usage(void)
51{
52 if (do_link)
53 iplink_usage();
54
55 fprintf(stderr,
56 "Usage: ip address {add|change|replace} IFADDR dev IFNAME [ LIFETIME ]\n"
57 " [ CONFFLAG-LIST ]\n"
58 " ip address del IFADDR dev IFNAME [mngtmpaddr]\n"
59 " ip address {save|flush} [ dev IFNAME ] [ scope SCOPE-ID ]\n"
60 " [ to PREFIX ] [ FLAG-LIST ] [ label LABEL ] [up]\n"
61 " ip address [ show [ dev IFNAME ] [ scope SCOPE-ID ] [ master DEVICE ]\n"
62 " [ type TYPE ] [ to PREFIX ] [ FLAG-LIST ]\n"
63 " [ label LABEL ] [up] [ vrf NAME ] ]\n"
64 " ip address {showdump|restore}\n"
65 "IFADDR := PREFIX | ADDR peer PREFIX\n"
66 " [ broadcast ADDR ] [ anycast ADDR ]\n"
67 " [ label IFNAME ] [ scope SCOPE-ID ] [ metric METRIC ]\n"
68 "SCOPE-ID := [ host | link | global | NUMBER ]\n"
69 "FLAG-LIST := [ FLAG-LIST ] FLAG\n"
70 "FLAG := [ permanent | dynamic | secondary | primary |\n"
71 " [-]tentative | [-]deprecated | [-]dadfailed | temporary |\n"
72 " CONFFLAG-LIST ]\n"
73 "CONFFLAG-LIST := [ CONFFLAG-LIST ] CONFFLAG\n"
74 "CONFFLAG := [ home | nodad | mngtmpaddr | noprefixroute | autojoin ]\n"
75 "LIFETIME := [ valid_lft LFT ] [ preferred_lft LFT ]\n"
76 "LFT := forever | SECONDS\n"
77 "TYPE := { vlan | veth | vcan | vxcan | dummy | ifb | macvlan | macvtap |\n"
78 " bridge | bond | ipoib | ip6tnl | ipip | sit | vxlan | lowpan |\n"
79 " gre | gretap | erspan | ip6gre | ip6gretap | ip6erspan | vti |\n"
80 " nlmon | can | bond_slave | ipvlan | geneve | bridge_slave |\n"
81 " hsr | macsec | netdevsim }\n");
82
83 exit(-1);
84}
85
86static void print_link_flags(FILE *fp, unsigned int flags, unsigned int mdown)
87{
88 open_json_array(PRINT_ANY, is_json_context() ? "flags" : "<");
89 if (flags & IFF_UP && !(flags & IFF_RUNNING))
90 print_string(PRINT_ANY, NULL,
91 flags ? "%s," : "%s", "NO-CARRIER");
92 flags &= ~IFF_RUNNING;
93#define _PF(f) if (flags&IFF_##f) { \
94 flags &= ~IFF_##f ; \
95 print_string(PRINT_ANY, NULL, flags ? "%s," : "%s", #f); }
96 _PF(LOOPBACK);
97 _PF(BROADCAST);
98 _PF(POINTOPOINT);
99 _PF(MULTICAST);
100 _PF(NOARP);
101 _PF(ALLMULTI);
102 _PF(PROMISC);
103 _PF(MASTER);
104 _PF(SLAVE);
105 _PF(DEBUG);
106 _PF(DYNAMIC);
107 _PF(AUTOMEDIA);
108 _PF(PORTSEL);
109 _PF(NOTRAILERS);
110 _PF(UP);
111 _PF(LOWER_UP);
112 _PF(DORMANT);
113 _PF(ECHO);
114#undef _PF
115 if (flags)
116 print_hex(PRINT_ANY, NULL, "%x", flags);
117 if (mdown)
118 print_string(PRINT_ANY, NULL, ",%s", "M-DOWN");
119 close_json_array(PRINT_ANY, "> ");
120}
121
122static const char *oper_states[] = {
123 "UNKNOWN", "NOTPRESENT", "DOWN", "LOWERLAYERDOWN",
124 "TESTING", "DORMANT", "UP"
125};
126
127static void print_operstate(FILE *f, __u8 state)
128{
129 if (state >= ARRAY_SIZE(oper_states)) {
130 if (is_json_context())
131 print_uint(PRINT_JSON, "operstate_index", NULL, state);
132 else
133 print_0xhex(PRINT_FP, NULL, "state %#llx", state);
134 } else if (brief) {
135 print_color_string(PRINT_ANY,
136 oper_state_color(state),
137 "operstate",
138 "%-14s ",
139 oper_states[state]);
140 } else {
141 if (is_json_context())
142 print_string(PRINT_JSON,
143 "operstate",
144 NULL, oper_states[state]);
145 else {
146 fprintf(f, "state ");
147 color_fprintf(f, oper_state_color(state),
148 "%s ", oper_states[state]);
149 }
150 }
151}
152
153int get_operstate(const char *name)
154{
155 int i;
156
157 for (i = 0; i < ARRAY_SIZE(oper_states); i++)
158 if (strcasecmp(name, oper_states[i]) == 0)
159 return i;
160 return -1;
161}
162
163static void print_queuelen(FILE *f, struct rtattr *tb[IFLA_MAX + 1])
164{
165 int qlen;
166
167 if (tb[IFLA_TXQLEN])
168 qlen = rta_getattr_u32(tb[IFLA_TXQLEN]);
169 else {
170 struct ifreq ifr = {};
171 int s = socket(AF_INET, SOCK_STREAM, 0);
172
173 if (s < 0)
174 return;
175
176 strcpy(ifr.ifr_name, rta_getattr_str(tb[IFLA_IFNAME]));
177 if (ioctl(s, SIOCGIFTXQLEN, &ifr) < 0) {
178 fprintf(stderr,
179 "ioctl(SIOCGIFTXQLEN) failed: %s\n",
180 strerror(errno));
181 close(s);
182 return;
183 }
184 close(s);
185 qlen = ifr.ifr_qlen;
186 }
187 if (qlen)
188 print_int(PRINT_ANY, "txqlen", "qlen %d", qlen);
189}
190
191static const char *link_modes[] = {
192 "DEFAULT", "DORMANT"
193};
194
195static void print_linkmode(FILE *f, struct rtattr *tb)
196{
197 unsigned int mode = rta_getattr_u8(tb);
198
199 if (mode >= ARRAY_SIZE(link_modes))
200 print_int(PRINT_ANY,
201 "linkmode_index",
202 "mode %d ",
203 mode);
204 else
205 print_string(PRINT_ANY,
206 "linkmode",
207 "mode %s "
208 , link_modes[mode]);
209}
210
211static char *parse_link_kind(struct rtattr *tb, bool slave)
212{
213 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
214 int attr = slave ? IFLA_INFO_SLAVE_KIND : IFLA_INFO_KIND;
215
216 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
217
218 if (linkinfo[attr])
219 return RTA_DATA(linkinfo[attr]);
220
221 return "";
222}
223
224static int match_link_kind(struct rtattr **tb, const char *kind, bool slave)
225{
226 if (!tb[IFLA_LINKINFO])
227 return -1;
228
229 return strcmp(parse_link_kind(tb[IFLA_LINKINFO], slave), kind);
230}
231
232static void print_linktype(FILE *fp, struct rtattr *tb)
233{
234 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
235 struct link_util *lu;
236 struct link_util *slave_lu;
237 char slave[32];
238
239 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb);
240 open_json_object("linkinfo");
241
242 if (linkinfo[IFLA_INFO_KIND]) {
243 const char *kind
244 = rta_getattr_str(linkinfo[IFLA_INFO_KIND]);
245
246 print_nl();
247 print_string(PRINT_ANY, "info_kind", " %s ", kind);
248
249 lu = get_link_kind(kind);
250 if (lu && lu->print_opt) {
251 struct rtattr *attr[lu->maxattr+1], **data = NULL;
252
253 if (linkinfo[IFLA_INFO_DATA]) {
254 parse_rtattr_nested(attr, lu->maxattr,
255 linkinfo[IFLA_INFO_DATA]);
256 data = attr;
257 }
258 open_json_object("info_data");
259 lu->print_opt(lu, fp, data);
260 close_json_object();
261
262 if (linkinfo[IFLA_INFO_XSTATS] && show_stats &&
263 lu->print_xstats) {
264 open_json_object("info_xstats");
265 lu->print_xstats(lu, fp, linkinfo[IFLA_INFO_XSTATS]);
266 close_json_object();
267 }
268 }
269 }
270
271 if (linkinfo[IFLA_INFO_SLAVE_KIND]) {
272 const char *slave_kind
273 = rta_getattr_str(linkinfo[IFLA_INFO_SLAVE_KIND]);
274
275 print_nl();
276 print_string(PRINT_ANY,
277 "info_slave_kind",
278 " %s_slave ",
279 slave_kind);
280
281 snprintf(slave, sizeof(slave), "%s_slave", slave_kind);
282
283 slave_lu = get_link_kind(slave);
284 if (slave_lu && slave_lu->print_opt) {
285 struct rtattr *attr[slave_lu->maxattr+1], **data = NULL;
286
287 if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
288 parse_rtattr_nested(attr, slave_lu->maxattr,
289 linkinfo[IFLA_INFO_SLAVE_DATA]);
290 data = attr;
291 }
292 open_json_object("info_slave_data");
293 slave_lu->print_opt(slave_lu, fp, data);
294 close_json_object();
295 }
296 }
297 close_json_object();
298}
299
300static void print_af_spec(FILE *fp, struct rtattr *af_spec_attr)
301{
302 struct rtattr *inet6_attr;
303 struct rtattr *tb[IFLA_INET6_MAX + 1];
304
305 inet6_attr = parse_rtattr_one_nested(AF_INET6, af_spec_attr);
306 if (!inet6_attr)
307 return;
308
309 parse_rtattr_nested(tb, IFLA_INET6_MAX, inet6_attr);
310
311 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
312 __u8 mode = rta_getattr_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
313 SPRINT_BUF(b1);
314
315 switch (mode) {
316 case IN6_ADDR_GEN_MODE_EUI64:
317 print_string(PRINT_ANY,
318 "inet6_addr_gen_mode",
319 "addrgenmode %s ",
320 "eui64");
321 break;
322 case IN6_ADDR_GEN_MODE_NONE:
323 print_string(PRINT_ANY,
324 "inet6_addr_gen_mode",
325 "addrgenmode %s ",
326 "none");
327 break;
328 case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
329 print_string(PRINT_ANY,
330 "inet6_addr_gen_mode",
331 "addrgenmode %s ",
332 "stable_secret");
333 break;
334 case IN6_ADDR_GEN_MODE_RANDOM:
335 print_string(PRINT_ANY,
336 "inet6_addr_gen_mode",
337 "addrgenmode %s ",
338 "random");
339 break;
340 default:
341 snprintf(b1, sizeof(b1), "%#.2hhx", mode);
342 print_string(PRINT_ANY,
343 "inet6_addr_gen_mode",
344 "addrgenmode %s ",
345 b1);
346 break;
347 }
348 }
349}
350
351static void print_vf_stats64(FILE *fp, struct rtattr *vfstats);
352
353static void print_vfinfo(FILE *fp, struct ifinfomsg *ifi, struct rtattr *vfinfo)
354{
355 struct ifla_vf_mac *vf_mac;
356 struct ifla_vf_broadcast *vf_broadcast;
357 struct ifla_vf_tx_rate *vf_tx_rate;
358 struct rtattr *vf[IFLA_VF_MAX + 1] = {};
359
360 SPRINT_BUF(b1);
361
362 if (vfinfo->rta_type != IFLA_VF_INFO) {
363 fprintf(stderr, "BUG: rta type is %d\n", vfinfo->rta_type);
364 return;
365 }
366
367 parse_rtattr_nested(vf, IFLA_VF_MAX, vfinfo);
368
369 vf_mac = RTA_DATA(vf[IFLA_VF_MAC]);
370 vf_broadcast = RTA_DATA(vf[IFLA_VF_BROADCAST]);
371 vf_tx_rate = RTA_DATA(vf[IFLA_VF_TX_RATE]);
372
373 print_string(PRINT_FP, NULL, "%s ", _SL_);
374 print_int(PRINT_ANY, "vf", "vf %d ", vf_mac->vf);
375
376 print_string(PRINT_ANY,
377 "link_type",
378 " link/%s ",
379 ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
380
381 print_color_string(PRINT_ANY, COLOR_MAC,
382 "address", "%s",
383 ll_addr_n2a((unsigned char *) &vf_mac->mac,
384 ifi->ifi_type == ARPHRD_ETHER ?
385 ETH_ALEN : INFINIBAND_ALEN,
386 ifi->ifi_type,
387 b1, sizeof(b1)));
388
389 if (vf[IFLA_VF_BROADCAST]) {
390 if (ifi->ifi_flags&IFF_POINTOPOINT) {
391 print_string(PRINT_FP, NULL, " peer ", NULL);
392 print_bool(PRINT_JSON,
393 "link_pointtopoint", NULL, true);
394 } else
395 print_string(PRINT_FP, NULL, " brd ", NULL);
396
397 print_color_string(PRINT_ANY, COLOR_MAC,
398 "broadcast", "%s",
399 ll_addr_n2a((unsigned char *) &vf_broadcast->broadcast,
400 ifi->ifi_type == ARPHRD_ETHER ?
401 ETH_ALEN : INFINIBAND_ALEN,
402 ifi->ifi_type,
403 b1, sizeof(b1)));
404 }
405
406 if (vf[IFLA_VF_VLAN_LIST]) {
407 struct rtattr *i, *vfvlanlist = vf[IFLA_VF_VLAN_LIST];
408 int rem = RTA_PAYLOAD(vfvlanlist);
409
410 open_json_array(PRINT_JSON, "vlan_list");
411 for (i = RTA_DATA(vfvlanlist);
412 RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
413 struct ifla_vf_vlan_info *vf_vlan_info = RTA_DATA(i);
414 SPRINT_BUF(b2);
415
416 open_json_object(NULL);
417 if (vf_vlan_info->vlan)
418 print_int(PRINT_ANY,
419 "vlan",
420 ", vlan %d",
421 vf_vlan_info->vlan);
422 if (vf_vlan_info->qos)
423 print_int(PRINT_ANY,
424 "qos",
425 ", qos %d",
426 vf_vlan_info->qos);
427 if (vf_vlan_info->vlan_proto &&
428 vf_vlan_info->vlan_proto != htons(ETH_P_8021Q))
429 print_string(PRINT_ANY,
430 "protocol",
431 ", vlan protocol %s",
432 ll_proto_n2a(
433 vf_vlan_info->vlan_proto,
434 b2, sizeof(b2)));
435 close_json_object();
436 }
437 close_json_array(PRINT_JSON, NULL);
438 } else {
439 struct ifla_vf_vlan *vf_vlan = RTA_DATA(vf[IFLA_VF_VLAN]);
440
441 if (vf_vlan->vlan)
442 print_int(PRINT_ANY,
443 "vlan",
444 ", vlan %d",
445 vf_vlan->vlan);
446 if (vf_vlan->qos)
447 print_int(PRINT_ANY, "qos", ", qos %d", vf_vlan->qos);
448 }
449
450 if (vf_tx_rate->rate)
451 print_uint(PRINT_ANY,
452 "tx_rate",
453 ", tx rate %u (Mbps)",
454 vf_tx_rate->rate);
455
456 if (vf[IFLA_VF_RATE]) {
457 struct ifla_vf_rate *vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
458 int max_tx = vf_rate->max_tx_rate;
459 int min_tx = vf_rate->min_tx_rate;
460
461 if (is_json_context()) {
462 open_json_object("rate");
463 print_uint(PRINT_JSON, "max_tx", NULL, max_tx);
464 print_uint(PRINT_ANY, "min_tx", NULL, min_tx);
465 close_json_object();
466 } else {
467 if (max_tx)
468 fprintf(fp, ", max_tx_rate %uMbps", max_tx);
469 if (min_tx)
470 fprintf(fp, ", min_tx_rate %uMbps", min_tx);
471 }
472 }
473
474 if (vf[IFLA_VF_SPOOFCHK]) {
475 struct ifla_vf_spoofchk *vf_spoofchk =
476 RTA_DATA(vf[IFLA_VF_SPOOFCHK]);
477
478 if (vf_spoofchk->setting != -1)
479 print_bool(PRINT_ANY,
480 "spoofchk",
481 vf_spoofchk->setting ?
482 ", spoof checking on" : ", spoof checking off",
483 vf_spoofchk->setting);
484 }
485
486 if (vf[IFLA_VF_IB_NODE_GUID]) {
487 struct ifla_vf_guid *guid = RTA_DATA(vf[IFLA_VF_IB_NODE_GUID]);
488 uint64_t node_guid = ntohll(guid->guid);
489
490 print_string(PRINT_ANY, "node guid", ", NODE_GUID %s",
491 ll_addr_n2a((const unsigned char *)&node_guid,
492 sizeof(node_guid), ARPHRD_INFINIBAND,
493 b1, sizeof(b1)));
494 }
495 if (vf[IFLA_VF_IB_PORT_GUID]) {
496 struct ifla_vf_guid *guid = RTA_DATA(vf[IFLA_VF_IB_PORT_GUID]);
497 uint64_t port_guid = ntohll(guid->guid);
498
499 print_string(PRINT_ANY, "port guid", ", PORT_GUID %s",
500 ll_addr_n2a((const unsigned char *)&port_guid,
501 sizeof(port_guid), ARPHRD_INFINIBAND,
502 b1, sizeof(b1)));
503 }
504 if (vf[IFLA_VF_LINK_STATE]) {
505 struct ifla_vf_link_state *vf_linkstate =
506 RTA_DATA(vf[IFLA_VF_LINK_STATE]);
507
508 if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_AUTO)
509 print_string(PRINT_ANY,
510 "link_state",
511 ", link-state %s",
512 "auto");
513 else if (vf_linkstate->link_state == IFLA_VF_LINK_STATE_ENABLE)
514 print_string(PRINT_ANY,
515 "link_state",
516 ", link-state %s",
517 "enable");
518 else
519 print_string(PRINT_ANY,
520 "link_state",
521 ", link-state %s",
522 "disable");
523 }
524
525 if (vf[IFLA_VF_TRUST]) {
526 struct ifla_vf_trust *vf_trust = RTA_DATA(vf[IFLA_VF_TRUST]);
527
528 if (vf_trust->setting != -1)
529 print_bool(PRINT_ANY,
530 "trust",
531 vf_trust->setting ? ", trust on" : ", trust off",
532 vf_trust->setting);
533 }
534
535 if (vf[IFLA_VF_RSS_QUERY_EN]) {
536 struct ifla_vf_rss_query_en *rss_query =
537 RTA_DATA(vf[IFLA_VF_RSS_QUERY_EN]);
538
539 if (rss_query->setting != -1)
540 print_bool(PRINT_ANY,
541 "query_rss_en",
542 rss_query->setting ? ", query_rss on"
543 : ", query_rss off",
544 rss_query->setting);
545 }
546
547 if (vf[IFLA_VF_STATS] && show_stats)
548 print_vf_stats64(fp, vf[IFLA_VF_STATS]);
549}
550
551void print_num(FILE *fp, unsigned int width, uint64_t count)
552{
553 const char *prefix = "kMGTPE";
554 const unsigned int base = use_iec ? 1024 : 1000;
555 uint64_t powi = 1;
556 uint16_t powj = 1;
557 uint8_t precision = 2;
558 char buf[64];
559
560 if (!human_readable || count < base) {
561 fprintf(fp, "%-*"PRIu64" ", width, count);
562 return;
563 }
564
565
566
567
568 for (;;) {
569 powi *= base;
570 if (count / base < powi)
571 break;
572
573 if (!prefix[1])
574 break;
575 ++prefix;
576 }
577
578
579 for (; precision > 0; precision--) {
580 powj *= 10;
581 if (count / powi < powj)
582 break;
583 }
584
585 snprintf(buf, sizeof(buf), "%.*f%c%s", precision,
586 (double) count / powi, *prefix, use_iec ? "i" : "");
587
588 fprintf(fp, "%-*s ", width, buf);
589}
590
591static void print_vf_stats64(FILE *fp, struct rtattr *vfstats)
592{
593 struct rtattr *vf[IFLA_VF_STATS_MAX + 1];
594
595 if (vfstats->rta_type != IFLA_VF_STATS) {
596 fprintf(stderr, "BUG: rta type is %d\n", vfstats->rta_type);
597 return;
598 }
599
600 parse_rtattr_nested(vf, IFLA_VF_STATS_MAX, vfstats);
601
602 if (is_json_context()) {
603 open_json_object("stats");
604
605
606 open_json_object("rx");
607 print_u64(PRINT_JSON, "bytes", NULL,
608 rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
609 print_u64(PRINT_JSON, "packets", NULL,
610 rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
611 print_u64(PRINT_JSON, "multicast", NULL,
612 rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
613 print_u64(PRINT_JSON, "broadcast", NULL,
614 rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
615 if (vf[IFLA_VF_STATS_RX_DROPPED])
616 print_u64(PRINT_JSON, "dropped", NULL,
617 rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
618 close_json_object();
619
620
621 open_json_object("tx");
622 print_u64(PRINT_JSON, "tx_bytes", NULL,
623 rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
624 print_u64(PRINT_JSON, "tx_packets", NULL,
625 rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
626 if (vf[IFLA_VF_STATS_TX_DROPPED])
627 print_u64(PRINT_JSON, "dropped", NULL,
628 rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
629 close_json_object();
630 close_json_object();
631 } else {
632
633 fprintf(fp, "%s", _SL_);
634 fprintf(fp, " RX: bytes packets mcast bcast ");
635 if (vf[IFLA_VF_STATS_RX_DROPPED])
636 fprintf(fp, " dropped ");
637 fprintf(fp, "%s", _SL_);
638 fprintf(fp, " ");
639
640 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_RX_BYTES]));
641 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_PACKETS]));
642 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_MULTICAST]));
643 print_num(fp, 7, rta_getattr_u64(vf[IFLA_VF_STATS_BROADCAST]));
644 if (vf[IFLA_VF_STATS_RX_DROPPED])
645 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_RX_DROPPED]));
646
647
648 fprintf(fp, "%s", _SL_);
649 fprintf(fp, " TX: bytes packets ");
650 if (vf[IFLA_VF_STATS_TX_DROPPED])
651 fprintf(fp, " dropped ");
652 fprintf(fp, "%s", _SL_);
653 fprintf(fp, " ");
654
655 print_num(fp, 10, rta_getattr_u64(vf[IFLA_VF_STATS_TX_BYTES]));
656 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_PACKETS]));
657 if (vf[IFLA_VF_STATS_TX_DROPPED])
658 print_num(fp, 8, rta_getattr_u64(vf[IFLA_VF_STATS_TX_DROPPED]));
659 }
660}
661
662static void __print_link_stats(FILE *fp, struct rtattr *tb[])
663{
664 const struct rtattr *carrier_changes = tb[IFLA_CARRIER_CHANGES];
665 struct rtnl_link_stats64 _s, *s = &_s;
666 int ret;
667
668 ret = get_rtnl_link_stats_rta(s, tb);
669 if (ret < 0)
670 return;
671
672 if (is_json_context()) {
673 open_json_object((ret == sizeof(*s)) ? "stats64" : "stats");
674
675
676 open_json_object("rx");
677 print_u64(PRINT_JSON, "bytes", NULL, s->rx_bytes);
678 print_u64(PRINT_JSON, "packets", NULL, s->rx_packets);
679 print_u64(PRINT_JSON, "errors", NULL, s->rx_errors);
680 print_u64(PRINT_JSON, "dropped", NULL, s->rx_dropped);
681 print_u64(PRINT_JSON, "over_errors", NULL, s->rx_over_errors);
682 print_u64(PRINT_JSON, "multicast", NULL, s->multicast);
683 if (s->rx_compressed)
684 print_u64(PRINT_JSON,
685 "compressed", NULL, s->rx_compressed);
686
687
688 if (show_stats > 1) {
689 print_u64(PRINT_JSON,
690 "length_errors",
691 NULL, s->rx_length_errors);
692 print_u64(PRINT_JSON,
693 "crc_errors",
694 NULL, s->rx_crc_errors);
695 print_u64(PRINT_JSON,
696 "frame_errors",
697 NULL, s->rx_frame_errors);
698 print_u64(PRINT_JSON,
699 "fifo_errors",
700 NULL, s->rx_fifo_errors);
701 print_u64(PRINT_JSON,
702 "missed_errors",
703 NULL, s->rx_missed_errors);
704 if (s->rx_nohandler)
705 print_u64(PRINT_JSON,
706 "nohandler", NULL, s->rx_nohandler);
707 }
708 close_json_object();
709
710
711 open_json_object("tx");
712 print_u64(PRINT_JSON, "bytes", NULL, s->tx_bytes);
713 print_u64(PRINT_JSON, "packets", NULL, s->tx_packets);
714 print_u64(PRINT_JSON, "errors", NULL, s->tx_errors);
715 print_u64(PRINT_JSON, "dropped", NULL, s->tx_dropped);
716 print_u64(PRINT_JSON,
717 "carrier_errors",
718 NULL, s->tx_carrier_errors);
719 print_u64(PRINT_JSON, "collisions", NULL, s->collisions);
720 if (s->tx_compressed)
721 print_u64(PRINT_JSON,
722 "compressed", NULL, s->tx_compressed);
723
724
725 if (show_stats > 1) {
726 print_u64(PRINT_JSON,
727 "aborted_errors",
728 NULL, s->tx_aborted_errors);
729 print_u64(PRINT_JSON,
730 "fifo_errors",
731 NULL, s->tx_fifo_errors);
732 print_u64(PRINT_JSON,
733 "window_errors",
734 NULL, s->tx_window_errors);
735 print_u64(PRINT_JSON,
736 "heartbeat_errors",
737 NULL, s->tx_heartbeat_errors);
738 if (carrier_changes)
739 print_u64(PRINT_JSON, "carrier_changes", NULL,
740 rta_getattr_u32(carrier_changes));
741 }
742
743 close_json_object();
744 close_json_object();
745 } else {
746
747 fprintf(fp, " RX: bytes packets errors dropped missed mcast %s%s",
748 s->rx_compressed ? "compressed" : "", _SL_);
749
750 fprintf(fp, " ");
751 print_num(fp, 10, s->rx_bytes);
752 print_num(fp, 8, s->rx_packets);
753 print_num(fp, 7, s->rx_errors);
754 print_num(fp, 7, s->rx_dropped);
755 print_num(fp, 7, s->rx_missed_errors);
756 print_num(fp, 7, s->multicast);
757 if (s->rx_compressed)
758 print_num(fp, 7, s->rx_compressed);
759
760
761 if (show_stats > 1) {
762 fprintf(fp, "%s", _SL_);
763 fprintf(fp, " RX errors: length crc frame fifo overrun%s%s",
764 s->rx_nohandler ? " nohandler" : "", _SL_);
765 fprintf(fp, " ");
766 print_num(fp, 8, s->rx_length_errors);
767 print_num(fp, 7, s->rx_crc_errors);
768 print_num(fp, 7, s->rx_frame_errors);
769 print_num(fp, 7, s->rx_fifo_errors);
770 print_num(fp, 7, s->rx_over_errors);
771 if (s->rx_nohandler)
772 print_num(fp, 7, s->rx_nohandler);
773 }
774 fprintf(fp, "%s", _SL_);
775
776
777 fprintf(fp, " TX: bytes packets errors dropped carrier collsns %s%s",
778 s->tx_compressed ? "compressed" : "", _SL_);
779
780 fprintf(fp, " ");
781 print_num(fp, 10, s->tx_bytes);
782 print_num(fp, 8, s->tx_packets);
783 print_num(fp, 7, s->tx_errors);
784 print_num(fp, 7, s->tx_dropped);
785 print_num(fp, 7, s->tx_carrier_errors);
786 print_num(fp, 7, s->collisions);
787 if (s->tx_compressed)
788 print_num(fp, 7, s->tx_compressed);
789
790
791 if (show_stats > 1) {
792 fprintf(fp, "%s", _SL_);
793 fprintf(fp, " TX errors: aborted fifo window heartbeat");
794 if (carrier_changes)
795 fprintf(fp, " transns");
796 fprintf(fp, "%s", _SL_);
797
798 fprintf(fp, " ");
799 print_num(fp, 8, s->tx_aborted_errors);
800 print_num(fp, 7, s->tx_fifo_errors);
801 print_num(fp, 7, s->tx_window_errors);
802 print_num(fp, 7, s->tx_heartbeat_errors);
803 if (carrier_changes)
804 print_num(fp, 7,
805 rta_getattr_u32(carrier_changes));
806 }
807 }
808}
809
810static void print_link_stats(FILE *fp, struct nlmsghdr *n)
811{
812 struct ifinfomsg *ifi = NLMSG_DATA(n);
813 struct rtattr *tb[IFLA_MAX+1];
814
815 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi),
816 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)));
817 __print_link_stats(fp, tb);
818 print_nl();
819}
820
821static int print_linkinfo_brief(FILE *fp, const char *name,
822 const struct ifinfomsg *ifi,
823 struct rtattr *tb[])
824{
825 unsigned int m_flag = 0;
826
827 m_flag = print_name_and_link("%-16s ", name, tb);
828
829 if (tb[IFLA_OPERSTATE])
830 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
831
832 if (filter.family == AF_PACKET) {
833 SPRINT_BUF(b1);
834
835 if (tb[IFLA_ADDRESS]) {
836 print_color_string(PRINT_ANY, COLOR_MAC,
837 "address", "%s ",
838 ll_addr_n2a(
839 RTA_DATA(tb[IFLA_ADDRESS]),
840 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
841 ifi->ifi_type,
842 b1, sizeof(b1)));
843 }
844 }
845
846 if (filter.family == AF_PACKET) {
847 print_link_flags(fp, ifi->ifi_flags, m_flag);
848 print_string(PRINT_FP, NULL, "%s", "\n");
849 }
850
851 fflush(fp);
852 return 0;
853}
854
855static const char *link_events[] = {
856 [IFLA_EVENT_NONE] = "NONE",
857 [IFLA_EVENT_REBOOT] = "REBOOT",
858 [IFLA_EVENT_FEATURES] = "FEATURE CHANGE",
859 [IFLA_EVENT_BONDING_FAILOVER] = "BONDING FAILOVER",
860 [IFLA_EVENT_NOTIFY_PEERS] = "NOTIFY PEERS",
861 [IFLA_EVENT_IGMP_RESEND] = "RESEND IGMP",
862 [IFLA_EVENT_BONDING_OPTIONS] = "BONDING OPTION"
863};
864
865static void print_link_event(FILE *f, __u32 event)
866{
867 if (event >= ARRAY_SIZE(link_events))
868 print_int(PRINT_ANY, "event", "event %d ", event);
869 else {
870 if (event)
871 print_string(PRINT_ANY,
872 "event", "event %s ",
873 link_events[event]);
874 }
875}
876
877static void print_proto_down(FILE *f, struct rtattr *tb[])
878{
879 struct rtattr *preason[IFLA_PROTO_DOWN_REASON_MAX+1];
880
881 if (tb[IFLA_PROTO_DOWN]) {
882 if (rta_getattr_u8(tb[IFLA_PROTO_DOWN]))
883 print_bool(PRINT_ANY,
884 "proto_down", " protodown on ", true);
885 }
886
887 if (tb[IFLA_PROTO_DOWN_REASON]) {
888 char buf[255];
889 __u32 reason;
890 int i, start = 1;
891
892 parse_rtattr_nested(preason, IFLA_PROTO_DOWN_REASON_MAX,
893 tb[IFLA_PROTO_DOWN_REASON]);
894 if (!tb[IFLA_PROTO_DOWN_REASON_VALUE])
895 return;
896
897 reason = rta_getattr_u8(preason[IFLA_PROTO_DOWN_REASON_VALUE]);
898 if (!reason)
899 return;
900
901 open_json_array(PRINT_ANY,
902 is_json_context() ? "proto_down_reason" : "protodown_reason <");
903 for (i = 0; reason; i++, reason >>= 1) {
904 if (reason & 0x1) {
905 if (protodown_reason_n2a(i, buf, sizeof(buf)))
906 break;
907 print_string(PRINT_ANY, NULL,
908 start ? "%s" : ",%s", buf);
909 start = 0;
910 }
911 }
912 close_json_array(PRINT_ANY, ">");
913 }
914}
915
916int print_linkinfo(struct nlmsghdr *n, void *arg)
917{
918 FILE *fp = (FILE *)arg;
919 struct ifinfomsg *ifi = NLMSG_DATA(n);
920 struct rtattr *tb[IFLA_MAX+1];
921 int len = n->nlmsg_len;
922 const char *name;
923 unsigned int m_flag = 0;
924 SPRINT_BUF(b1);
925 bool truncated_vfs = false;
926
927 if (n->nlmsg_type != RTM_NEWLINK && n->nlmsg_type != RTM_DELLINK)
928 return 0;
929
930 len -= NLMSG_LENGTH(sizeof(*ifi));
931 if (len < 0)
932 return -1;
933
934 if (filter.ifindex && ifi->ifi_index != filter.ifindex)
935 return -1;
936 if (filter.up && !(ifi->ifi_flags&IFF_UP))
937 return -1;
938
939 parse_rtattr_flags(tb, IFLA_MAX, IFLA_RTA(ifi), len, NLA_F_NESTED);
940
941 name = get_ifname_rta(ifi->ifi_index, tb[IFLA_IFNAME]);
942 if (!name)
943 return -1;
944
945 if (filter.label)
946 return 0;
947
948 if (tb[IFLA_GROUP]) {
949 int group = rta_getattr_u32(tb[IFLA_GROUP]);
950
951 if (filter.group != -1 && group != filter.group)
952 return -1;
953 }
954
955 if (tb[IFLA_MASTER]) {
956 int master = rta_getattr_u32(tb[IFLA_MASTER]);
957
958 if (filter.master > 0 && master != filter.master)
959 return -1;
960 } else if (filter.master > 0)
961 return -1;
962
963 if (filter.kind && match_link_kind(tb, filter.kind, 0))
964 return -1;
965
966 if (filter.slave_kind && match_link_kind(tb, filter.slave_kind, 1))
967 return -1;
968
969 if (n->nlmsg_type == RTM_DELLINK)
970 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
971
972 if (brief)
973 return print_linkinfo_brief(fp, name, ifi, tb);
974
975 print_int(PRINT_ANY, "ifindex", "%d: ", ifi->ifi_index);
976
977 m_flag = print_name_and_link("%s: ", name, tb);
978 print_link_flags(fp, ifi->ifi_flags, m_flag);
979
980 if (tb[IFLA_MTU])
981 print_int(PRINT_ANY,
982 "mtu", "mtu %u ",
983 rta_getattr_u32(tb[IFLA_MTU]));
984 if (tb[IFLA_XDP])
985 xdp_dump(fp, tb[IFLA_XDP], do_link, false);
986 if (tb[IFLA_QDISC])
987 print_string(PRINT_ANY,
988 "qdisc",
989 "qdisc %s ",
990 rta_getattr_str(tb[IFLA_QDISC]));
991 if (tb[IFLA_MASTER]) {
992 int master = rta_getattr_u32(tb[IFLA_MASTER]);
993
994 print_string(PRINT_ANY,
995 "master", "master %s ",
996 ll_index_to_name(master));
997 }
998
999 if (tb[IFLA_OPERSTATE])
1000 print_operstate(fp, rta_getattr_u8(tb[IFLA_OPERSTATE]));
1001
1002 if (do_link && tb[IFLA_LINKMODE])
1003 print_linkmode(fp, tb[IFLA_LINKMODE]);
1004
1005 if (tb[IFLA_GROUP]) {
1006 int group = rta_getattr_u32(tb[IFLA_GROUP]);
1007
1008 print_string(PRINT_ANY,
1009 "group",
1010 "group %s ",
1011 rtnl_group_n2a(group, b1, sizeof(b1)));
1012 }
1013
1014 if (filter.showqueue)
1015 print_queuelen(fp, tb);
1016
1017 if (tb[IFLA_EVENT])
1018 print_link_event(fp, rta_getattr_u32(tb[IFLA_EVENT]));
1019
1020 if (!filter.family || filter.family == AF_PACKET || show_details) {
1021 print_nl();
1022 print_string(PRINT_ANY,
1023 "link_type",
1024 " link/%s ",
1025 ll_type_n2a(ifi->ifi_type, b1, sizeof(b1)));
1026 if (tb[IFLA_ADDRESS]) {
1027 print_color_string(PRINT_ANY,
1028 COLOR_MAC,
1029 "address",
1030 "%s",
1031 ll_addr_n2a(RTA_DATA(tb[IFLA_ADDRESS]),
1032 RTA_PAYLOAD(tb[IFLA_ADDRESS]),
1033 ifi->ifi_type,
1034 b1, sizeof(b1)));
1035 }
1036 if (tb[IFLA_BROADCAST]) {
1037 if (ifi->ifi_flags&IFF_POINTOPOINT) {
1038 print_string(PRINT_FP, NULL, " peer ", NULL);
1039 print_bool(PRINT_JSON,
1040 "link_pointtopoint", NULL, true);
1041 } else {
1042 print_string(PRINT_FP, NULL, " brd ", NULL);
1043 }
1044 print_color_string(PRINT_ANY,
1045 COLOR_MAC,
1046 "broadcast",
1047 "%s",
1048 ll_addr_n2a(RTA_DATA(tb[IFLA_BROADCAST]),
1049 RTA_PAYLOAD(tb[IFLA_BROADCAST]),
1050 ifi->ifi_type,
1051 b1, sizeof(b1)));
1052 }
1053 if (tb[IFLA_PERM_ADDRESS]) {
1054 unsigned int len = RTA_PAYLOAD(tb[IFLA_PERM_ADDRESS]);
1055
1056 if (!tb[IFLA_ADDRESS] ||
1057 RTA_PAYLOAD(tb[IFLA_ADDRESS]) != len ||
1058 memcmp(RTA_DATA(tb[IFLA_PERM_ADDRESS]),
1059 RTA_DATA(tb[IFLA_ADDRESS]), len)) {
1060 print_string(PRINT_FP, NULL, " permaddr ", NULL);
1061 print_color_string(PRINT_ANY,
1062 COLOR_MAC,
1063 "permaddr",
1064 "%s",
1065 ll_addr_n2a(RTA_DATA(tb[IFLA_PERM_ADDRESS]),
1066 RTA_PAYLOAD(tb[IFLA_PERM_ADDRESS]),
1067 ifi->ifi_type,
1068 b1, sizeof(b1)));
1069 }
1070 }
1071 }
1072
1073 if (tb[IFLA_LINK_NETNSID]) {
1074 int id = rta_getattr_u32(tb[IFLA_LINK_NETNSID]);
1075
1076 if (is_json_context()) {
1077 print_int(PRINT_JSON, "link_netnsid", NULL, id);
1078 } else {
1079 if (id >= 0) {
1080 char *name = get_name_from_nsid(id);
1081
1082 if (name)
1083 print_string(PRINT_FP, NULL,
1084 " link-netns %s", name);
1085 else
1086 print_int(PRINT_FP, NULL,
1087 " link-netnsid %d", id);
1088 } else
1089 print_string(PRINT_FP, NULL,
1090 " link-netnsid %s", "unknown");
1091 }
1092 }
1093
1094 if (tb[IFLA_NEW_NETNSID]) {
1095 int id = rta_getattr_u32(tb[IFLA_NEW_NETNSID]);
1096 char *name = get_name_from_nsid(id);
1097
1098 if (name)
1099 print_string(PRINT_FP, NULL, " new-netns %s", name);
1100 else
1101 print_int(PRINT_FP, NULL, " new-netnsid %d", id);
1102 }
1103 if (tb[IFLA_NEW_IFINDEX]) {
1104 int id = rta_getattr_u32(tb[IFLA_NEW_IFINDEX]);
1105
1106 print_int(PRINT_FP, NULL, " new-ifindex %d", id);
1107 }
1108
1109 if (tb[IFLA_PROTO_DOWN])
1110 print_proto_down(fp, tb);
1111
1112 if (show_details) {
1113 if (tb[IFLA_PROMISCUITY])
1114 print_uint(PRINT_ANY,
1115 "promiscuity",
1116 " promiscuity %u ",
1117 rta_getattr_u32(tb[IFLA_PROMISCUITY]));
1118
1119 if (tb[IFLA_MIN_MTU])
1120 print_uint(PRINT_ANY,
1121 "min_mtu", "minmtu %u ",
1122 rta_getattr_u32(tb[IFLA_MIN_MTU]));
1123
1124 if (tb[IFLA_MAX_MTU])
1125 print_uint(PRINT_ANY,
1126 "max_mtu", "maxmtu %u ",
1127 rta_getattr_u32(tb[IFLA_MAX_MTU]));
1128
1129 if (tb[IFLA_LINKINFO])
1130 print_linktype(fp, tb[IFLA_LINKINFO]);
1131
1132 if (do_link && tb[IFLA_AF_SPEC])
1133 print_af_spec(fp, tb[IFLA_AF_SPEC]);
1134
1135 if (tb[IFLA_NUM_TX_QUEUES])
1136 print_uint(PRINT_ANY,
1137 "num_tx_queues",
1138 "numtxqueues %u ",
1139 rta_getattr_u32(tb[IFLA_NUM_TX_QUEUES]));
1140
1141 if (tb[IFLA_NUM_RX_QUEUES])
1142 print_uint(PRINT_ANY,
1143 "num_rx_queues",
1144 "numrxqueues %u ",
1145 rta_getattr_u32(tb[IFLA_NUM_RX_QUEUES]));
1146
1147 if (tb[IFLA_GSO_MAX_SIZE])
1148 print_uint(PRINT_ANY,
1149 "gso_max_size",
1150 "gso_max_size %u ",
1151 rta_getattr_u32(tb[IFLA_GSO_MAX_SIZE]));
1152
1153 if (tb[IFLA_GSO_MAX_SEGS])
1154 print_uint(PRINT_ANY,
1155 "gso_max_segs",
1156 "gso_max_segs %u ",
1157 rta_getattr_u32(tb[IFLA_GSO_MAX_SEGS]));
1158
1159 if (tb[IFLA_PHYS_PORT_NAME])
1160 print_string(PRINT_ANY,
1161 "phys_port_name",
1162 "portname %s ",
1163 rta_getattr_str(tb[IFLA_PHYS_PORT_NAME]));
1164
1165 if (tb[IFLA_PHYS_PORT_ID]) {
1166 print_string(PRINT_ANY,
1167 "phys_port_id",
1168 "portid %s ",
1169 hexstring_n2a(
1170 RTA_DATA(tb[IFLA_PHYS_PORT_ID]),
1171 RTA_PAYLOAD(tb[IFLA_PHYS_PORT_ID]),
1172 b1, sizeof(b1)));
1173 }
1174
1175 if (tb[IFLA_PHYS_SWITCH_ID]) {
1176 print_string(PRINT_ANY,
1177 "phys_switch_id",
1178 "switchid %s ",
1179 hexstring_n2a(RTA_DATA(tb[IFLA_PHYS_SWITCH_ID]),
1180 RTA_PAYLOAD(tb[IFLA_PHYS_SWITCH_ID]),
1181 b1, sizeof(b1)));
1182 }
1183 }
1184
1185 if ((do_link || show_details) && tb[IFLA_IFALIAS]) {
1186 print_string(PRINT_FP, NULL, "%s ", _SL_);
1187 print_string(PRINT_ANY,
1188 "ifalias",
1189 "alias %s",
1190 rta_getattr_str(tb[IFLA_IFALIAS]));
1191 }
1192
1193 if ((do_link || show_details) && tb[IFLA_XDP])
1194 xdp_dump(fp, tb[IFLA_XDP], true, true);
1195
1196 if (do_link && show_stats) {
1197 print_nl();
1198 __print_link_stats(fp, tb);
1199 }
1200
1201 if ((do_link || show_details) && tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF]) {
1202 struct rtattr *i, *vflist = tb[IFLA_VFINFO_LIST];
1203 int rem = RTA_PAYLOAD(vflist), count = 0;
1204
1205 open_json_array(PRINT_JSON, "vfinfo_list");
1206 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
1207 open_json_object(NULL);
1208 print_vfinfo(fp, ifi, i);
1209 close_json_object();
1210 count++;
1211 }
1212 close_json_array(PRINT_JSON, NULL);
1213 if (count != rta_getattr_u32(tb[IFLA_NUM_VF]))
1214 truncated_vfs = true;
1215 }
1216
1217 if (tb[IFLA_PROP_LIST]) {
1218 struct rtattr *i, *proplist = tb[IFLA_PROP_LIST];
1219 int rem = RTA_PAYLOAD(proplist);
1220
1221 open_json_array(PRINT_JSON, "altnames");
1222 for (i = RTA_DATA(proplist); RTA_OK(i, rem);
1223 i = RTA_NEXT(i, rem)) {
1224 if (i->rta_type != IFLA_ALT_IFNAME)
1225 continue;
1226 print_string(PRINT_FP, NULL, "%s altname ", _SL_);
1227 print_string(PRINT_ANY, NULL,
1228 "%s", rta_getattr_str(i));
1229 }
1230 close_json_array(PRINT_JSON, NULL);
1231 }
1232
1233 print_string(PRINT_FP, NULL, "%s", "\n");
1234 fflush(fp);
1235
1236 if (truncated_vfs)
1237 fprintf(stderr, "Truncated VF list: %s\n", name);
1238 return 1;
1239}
1240
1241static int flush_update(void)
1242{
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252 if ((rtnl_send_check(&rth, filter.flushb, filter.flushp) < 0) &&
1253 (errno != EADDRNOTAVAIL)) {
1254 perror("Failed to send flush request");
1255 return -1;
1256 }
1257 filter.flushp = 0;
1258 return 0;
1259}
1260
1261static int set_lifetime(unsigned int *lifetime, char *argv)
1262{
1263 if (strcmp(argv, "forever") == 0)
1264 *lifetime = INFINITY_LIFE_TIME;
1265 else if (get_u32(lifetime, argv, 0))
1266 return -1;
1267
1268 return 0;
1269}
1270
1271static unsigned int get_ifa_flags(struct ifaddrmsg *ifa,
1272 struct rtattr *ifa_flags_attr)
1273{
1274 return ifa_flags_attr ? rta_getattr_u32(ifa_flags_attr) :
1275 ifa->ifa_flags;
1276}
1277
1278
1279static const struct ifa_flag_data_t {
1280 const char *name;
1281 unsigned long mask;
1282 bool readonly;
1283 bool v6only;
1284} ifa_flag_data[] = {
1285 { .name = "secondary", .mask = IFA_F_SECONDARY, .readonly = true, .v6only = false},
1286 { .name = "temporary", .mask = IFA_F_SECONDARY, .readonly = true, .v6only = false},
1287 { .name = "nodad", .mask = IFA_F_NODAD, .readonly = false, .v6only = true},
1288 { .name = "optimistic", .mask = IFA_F_OPTIMISTIC, .readonly = false, .v6only = true},
1289 { .name = "dadfailed", .mask = IFA_F_DADFAILED, .readonly = true, .v6only = true},
1290 { .name = "home", .mask = IFA_F_HOMEADDRESS, .readonly = false, .v6only = true},
1291 { .name = "deprecated", .mask = IFA_F_DEPRECATED, .readonly = true, .v6only = true},
1292 { .name = "tentative", .mask = IFA_F_TENTATIVE, .readonly = true, .v6only = true},
1293 { .name = "permanent", .mask = IFA_F_PERMANENT, .readonly = true, .v6only = true},
1294 { .name = "mngtmpaddr", .mask = IFA_F_MANAGETEMPADDR, .readonly = false, .v6only = true},
1295 { .name = "noprefixroute", .mask = IFA_F_NOPREFIXROUTE, .readonly = false, .v6only = false},
1296 { .name = "autojoin", .mask = IFA_F_MCAUTOJOIN, .readonly = false, .v6only = false},
1297 { .name = "stable-privacy", .mask = IFA_F_STABLE_PRIVACY, .readonly = true, .v6only = true},
1298};
1299
1300
1301static const struct ifa_flag_data_t* lookup_flag_data_by_name(const char* flag_name) {
1302 unsigned int i;
1303
1304 for (i = 0; i < ARRAY_SIZE(ifa_flag_data); ++i) {
1305 if (strcmp(flag_name, ifa_flag_data[i].name) == 0)
1306 return &ifa_flag_data[i];
1307 }
1308 return NULL;
1309}
1310
1311static void print_ifa_flags(FILE *fp, const struct ifaddrmsg *ifa,
1312 unsigned int flags)
1313{
1314 unsigned int i;
1315
1316 for (i = 0; i < ARRAY_SIZE(ifa_flag_data); i++) {
1317 const struct ifa_flag_data_t* flag_data = &ifa_flag_data[i];
1318
1319 if (flag_data->mask == IFA_F_PERMANENT) {
1320 if (!(flags & flag_data->mask))
1321 print_bool(PRINT_ANY,
1322 "dynamic", "dynamic ", true);
1323 } else if (flags & flag_data->mask) {
1324 if (flag_data->mask == IFA_F_SECONDARY &&
1325 ifa->ifa_family == AF_INET6) {
1326 print_bool(PRINT_ANY,
1327 "temporary", "temporary ", true);
1328 } else {
1329 print_string(PRINT_FP, NULL,
1330 "%s ", flag_data->name);
1331 print_bool(PRINT_JSON,
1332 flag_data->name, NULL, true);
1333 }
1334 }
1335
1336 flags &= ~flag_data->mask;
1337 }
1338
1339 if (flags) {
1340 if (is_json_context()) {
1341 SPRINT_BUF(b1);
1342
1343 snprintf(b1, sizeof(b1), "%02x", flags);
1344 print_string(PRINT_JSON, "ifa_flags", NULL, b1);
1345 } else {
1346 fprintf(fp, "flags %02x ", flags);
1347 }
1348 }
1349
1350}
1351
1352static int get_filter(const char *arg)
1353{
1354 bool inv = false;
1355
1356 if (arg[0] == '-') {
1357 inv = true;
1358 arg++;
1359 }
1360
1361
1362 if (strcmp(arg, "dynamic") == 0) {
1363 inv = !inv;
1364 arg = "permanent";
1365 } else if (strcmp(arg, "primary") == 0) {
1366 inv = !inv;
1367 arg = "secondary";
1368 }
1369
1370 const struct ifa_flag_data_t* flag_data = lookup_flag_data_by_name(arg);
1371 if (flag_data == NULL)
1372 return -1;
1373
1374 if (inv)
1375 filter.flags &= ~flag_data->mask;
1376 else
1377 filter.flags |= flag_data->mask;
1378 filter.flagmask |= flag_data->mask;
1379 return 0;
1380}
1381
1382static int ifa_label_match_rta(int ifindex, const struct rtattr *rta)
1383{
1384 const char *label;
1385
1386 if (!filter.label)
1387 return 0;
1388
1389 if (rta)
1390 label = RTA_DATA(rta);
1391 else
1392 label = ll_index_to_name(ifindex);
1393
1394 return fnmatch(filter.label, label, 0);
1395}
1396
1397int print_addrinfo(struct nlmsghdr *n, void *arg)
1398{
1399 FILE *fp = arg;
1400 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1401 int len = n->nlmsg_len;
1402 unsigned int ifa_flags;
1403 struct rtattr *rta_tb[IFA_MAX+1];
1404
1405 SPRINT_BUF(b1);
1406
1407 if (n->nlmsg_type != RTM_NEWADDR && n->nlmsg_type != RTM_DELADDR)
1408 return 0;
1409 len -= NLMSG_LENGTH(sizeof(*ifa));
1410 if (len < 0) {
1411 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
1412 return -1;
1413 }
1414
1415 if (filter.flushb && n->nlmsg_type != RTM_NEWADDR)
1416 return 0;
1417
1418 parse_rtattr(rta_tb, IFA_MAX, IFA_RTA(ifa),
1419 n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
1420
1421 ifa_flags = get_ifa_flags(ifa, rta_tb[IFA_FLAGS]);
1422
1423 if (!rta_tb[IFA_LOCAL])
1424 rta_tb[IFA_LOCAL] = rta_tb[IFA_ADDRESS];
1425 if (!rta_tb[IFA_ADDRESS])
1426 rta_tb[IFA_ADDRESS] = rta_tb[IFA_LOCAL];
1427
1428 if (filter.ifindex && filter.ifindex != ifa->ifa_index)
1429 return 0;
1430 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1431 return 0;
1432 if ((filter.flags ^ ifa_flags) & filter.flagmask)
1433 return 0;
1434
1435 if (filter.family && filter.family != ifa->ifa_family)
1436 return 0;
1437
1438 if (ifa_label_match_rta(ifa->ifa_index, rta_tb[IFA_LABEL]))
1439 return 0;
1440
1441 if (inet_addr_match_rta(&filter.pfx, rta_tb[IFA_LOCAL]))
1442 return 0;
1443
1444 if (filter.flushb) {
1445 struct nlmsghdr *fn;
1446
1447 if (NLMSG_ALIGN(filter.flushp) + n->nlmsg_len > filter.flushe) {
1448 if (flush_update())
1449 return -1;
1450 }
1451 fn = (struct nlmsghdr *)(filter.flushb + NLMSG_ALIGN(filter.flushp));
1452 memcpy(fn, n, n->nlmsg_len);
1453 fn->nlmsg_type = RTM_DELADDR;
1454 fn->nlmsg_flags = NLM_F_REQUEST;
1455 fn->nlmsg_seq = ++rth.seq;
1456 filter.flushp = (((char *)fn) + n->nlmsg_len) - filter.flushb;
1457 filter.flushed++;
1458 if (show_stats < 2)
1459 return 0;
1460 }
1461
1462 if (n->nlmsg_type == RTM_DELADDR)
1463 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
1464
1465 if (!brief) {
1466 const char *name;
1467
1468 if (filter.oneline || filter.flushb) {
1469 const char *dev = ll_index_to_name(ifa->ifa_index);
1470
1471 if (is_json_context()) {
1472 print_int(PRINT_JSON,
1473 "index", NULL, ifa->ifa_index);
1474 print_string(PRINT_JSON, "dev", NULL, dev);
1475 } else {
1476 fprintf(fp, "%u: %s", ifa->ifa_index, dev);
1477 }
1478 }
1479
1480 name = family_name(ifa->ifa_family);
1481 if (*name != '?') {
1482 print_string(PRINT_ANY, "family", " %s ", name);
1483 } else {
1484 print_int(PRINT_ANY, "family_index", " family %d ",
1485 ifa->ifa_family);
1486 }
1487 }
1488
1489 if (rta_tb[IFA_LOCAL]) {
1490 print_color_string(PRINT_ANY,
1491 ifa_family_color(ifa->ifa_family),
1492 "local", "%s",
1493 format_host_rta(ifa->ifa_family,
1494 rta_tb[IFA_LOCAL]));
1495 if (rta_tb[IFA_ADDRESS] &&
1496 memcmp(RTA_DATA(rta_tb[IFA_ADDRESS]),
1497 RTA_DATA(rta_tb[IFA_LOCAL]),
1498 ifa->ifa_family == AF_INET ? 4 : 16)) {
1499 print_string(PRINT_FP, NULL, " %s ", "peer");
1500 print_color_string(PRINT_ANY,
1501 ifa_family_color(ifa->ifa_family),
1502 "address",
1503 "%s",
1504 format_host_rta(ifa->ifa_family,
1505 rta_tb[IFA_ADDRESS]));
1506 }
1507 print_int(PRINT_ANY, "prefixlen", "/%d ", ifa->ifa_prefixlen);
1508
1509 if (rta_tb[IFA_RT_PRIORITY])
1510 print_uint(PRINT_ANY, "metric", "metric %u ",
1511 rta_getattr_u32(rta_tb[IFA_RT_PRIORITY]));
1512 }
1513
1514 if (brief)
1515 goto brief_exit;
1516
1517 if (rta_tb[IFA_BROADCAST]) {
1518 print_string(PRINT_FP, NULL, "%s ", "brd");
1519 print_color_string(PRINT_ANY,
1520 ifa_family_color(ifa->ifa_family),
1521 "broadcast",
1522 "%s ",
1523 format_host_rta(ifa->ifa_family,
1524 rta_tb[IFA_BROADCAST]));
1525 }
1526
1527 if (rta_tb[IFA_ANYCAST]) {
1528 print_string(PRINT_FP, NULL, "%s ", "any");
1529 print_color_string(PRINT_ANY,
1530 ifa_family_color(ifa->ifa_family),
1531 "anycast",
1532 "%s ",
1533 format_host_rta(ifa->ifa_family,
1534 rta_tb[IFA_ANYCAST]));
1535 }
1536
1537 print_string(PRINT_ANY,
1538 "scope",
1539 "scope %s ",
1540 rtnl_rtscope_n2a(ifa->ifa_scope, b1, sizeof(b1)));
1541
1542 print_ifa_flags(fp, ifa, ifa_flags);
1543
1544 if (rta_tb[IFA_LABEL])
1545 print_string(PRINT_ANY,
1546 "label",
1547 "%s",
1548 rta_getattr_str(rta_tb[IFA_LABEL]));
1549
1550 if (rta_tb[IFA_CACHEINFO]) {
1551 struct ifa_cacheinfo *ci = RTA_DATA(rta_tb[IFA_CACHEINFO]);
1552
1553 print_nl();
1554 print_string(PRINT_FP, NULL, " valid_lft ", NULL);
1555
1556 if (ci->ifa_valid == INFINITY_LIFE_TIME) {
1557 print_uint(PRINT_JSON,
1558 "valid_life_time",
1559 NULL, INFINITY_LIFE_TIME);
1560 print_string(PRINT_FP, NULL, "%s", "forever");
1561 } else {
1562 print_uint(PRINT_ANY,
1563 "valid_life_time", "%usec", ci->ifa_valid);
1564 }
1565
1566 print_string(PRINT_FP, NULL, " preferred_lft ", NULL);
1567 if (ci->ifa_prefered == INFINITY_LIFE_TIME) {
1568 print_uint(PRINT_JSON,
1569 "preferred_life_time",
1570 NULL, INFINITY_LIFE_TIME);
1571 print_string(PRINT_FP, NULL, "%s", "forever");
1572 } else {
1573 if (ifa_flags & IFA_F_DEPRECATED)
1574 print_int(PRINT_ANY,
1575 "preferred_life_time",
1576 "%dsec",
1577 ci->ifa_prefered);
1578 else
1579 print_uint(PRINT_ANY,
1580 "preferred_life_time",
1581 "%usec",
1582 ci->ifa_prefered);
1583 }
1584 }
1585 print_string(PRINT_FP, NULL, "%s", "\n");
1586brief_exit:
1587 fflush(fp);
1588 return 0;
1589}
1590
1591static int print_selected_addrinfo(struct ifinfomsg *ifi,
1592 struct nlmsg_list *ainfo, FILE *fp)
1593{
1594 open_json_array(PRINT_JSON, "addr_info");
1595 for ( ; ainfo ; ainfo = ainfo->next) {
1596 struct nlmsghdr *n = &ainfo->h;
1597 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1598
1599 if (n->nlmsg_type != RTM_NEWADDR)
1600 continue;
1601
1602 if (n->nlmsg_len < NLMSG_LENGTH(sizeof(*ifa)))
1603 return -1;
1604
1605 if (ifa->ifa_index != ifi->ifi_index ||
1606 (filter.family && filter.family != ifa->ifa_family))
1607 continue;
1608
1609 if (filter.up && !(ifi->ifi_flags&IFF_UP))
1610 continue;
1611
1612 open_json_object(NULL);
1613 print_addrinfo(n, fp);
1614 close_json_object();
1615 }
1616 close_json_array(PRINT_JSON, NULL);
1617
1618 if (brief) {
1619 print_string(PRINT_FP, NULL, "%s", "\n");
1620 fflush(fp);
1621 }
1622 return 0;
1623}
1624
1625
1626static int store_nlmsg(struct nlmsghdr *n, void *arg)
1627{
1628 struct nlmsg_chain *lchain = (struct nlmsg_chain *)arg;
1629 struct nlmsg_list *h;
1630
1631 h = malloc(n->nlmsg_len+sizeof(void *));
1632 if (h == NULL)
1633 return -1;
1634
1635 memcpy(&h->h, n, n->nlmsg_len);
1636 h->next = NULL;
1637
1638 if (lchain->tail)
1639 lchain->tail->next = h;
1640 else
1641 lchain->head = h;
1642 lchain->tail = h;
1643
1644 ll_remember_index(n, NULL);
1645 return 0;
1646}
1647
1648static __u32 ipadd_dump_magic = 0x47361222;
1649
1650static int ipadd_save_prep(void)
1651{
1652 int ret;
1653
1654 if (isatty(STDOUT_FILENO)) {
1655 fprintf(stderr, "Not sending a binary stream to stdout\n");
1656 return -1;
1657 }
1658
1659 ret = write(STDOUT_FILENO, &ipadd_dump_magic, sizeof(ipadd_dump_magic));
1660 if (ret != sizeof(ipadd_dump_magic)) {
1661 fprintf(stderr, "Can't write magic to dump file\n");
1662 return -1;
1663 }
1664
1665 return 0;
1666}
1667
1668static int ipadd_dump_check_magic(void)
1669{
1670 int ret;
1671 __u32 magic = 0;
1672
1673 if (isatty(STDIN_FILENO)) {
1674 fprintf(stderr, "Can't restore address dump from a terminal\n");
1675 return -1;
1676 }
1677
1678 ret = fread(&magic, sizeof(magic), 1, stdin);
1679 if (magic != ipadd_dump_magic) {
1680 fprintf(stderr, "Magic mismatch (%d elems, %x magic)\n", ret, magic);
1681 return -1;
1682 }
1683
1684 return 0;
1685}
1686
1687static int save_nlmsg(struct nlmsghdr *n, void *arg)
1688{
1689 int ret;
1690
1691 ret = write(STDOUT_FILENO, n, n->nlmsg_len);
1692 if ((ret > 0) && (ret != n->nlmsg_len)) {
1693 fprintf(stderr, "Short write while saving nlmsg\n");
1694 ret = -EIO;
1695 }
1696
1697 return ret == n->nlmsg_len ? 0 : ret;
1698}
1699
1700static int show_handler(struct rtnl_ctrl_data *ctrl,
1701 struct nlmsghdr *n, void *arg)
1702{
1703 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1704
1705 open_json_object(NULL);
1706 print_int(PRINT_ANY, "index", "if%d:", ifa->ifa_index);
1707 print_nl();
1708 print_addrinfo(n, stdout);
1709 close_json_object();
1710 return 0;
1711}
1712
1713static int ipaddr_showdump(void)
1714{
1715 int err;
1716
1717 if (ipadd_dump_check_magic())
1718 exit(-1);
1719
1720 new_json_obj(json);
1721 open_json_object(NULL);
1722 open_json_array(PRINT_JSON, "addr_info");
1723
1724 err = rtnl_from_file(stdin, &show_handler, NULL);
1725
1726 close_json_array(PRINT_JSON, NULL);
1727 close_json_object();
1728 delete_json_obj();
1729
1730 exit(err);
1731}
1732
1733static int restore_handler(struct rtnl_ctrl_data *ctrl,
1734 struct nlmsghdr *n, void *arg)
1735{
1736 int ret;
1737
1738 n->nlmsg_flags |= NLM_F_REQUEST | NLM_F_CREATE | NLM_F_ACK;
1739
1740 ll_init_map(&rth);
1741
1742 ret = rtnl_talk(&rth, n, NULL);
1743 if ((ret < 0) && (errno == EEXIST))
1744 ret = 0;
1745
1746 return ret;
1747}
1748
1749static int ipaddr_restore(void)
1750{
1751 if (ipadd_dump_check_magic())
1752 exit(-1);
1753
1754 exit(rtnl_from_file(stdin, &restore_handler, NULL));
1755}
1756
1757void free_nlmsg_chain(struct nlmsg_chain *info)
1758{
1759 struct nlmsg_list *l, *n;
1760
1761 for (l = info->head; l; l = n) {
1762 n = l->next;
1763 free(l);
1764 }
1765}
1766
1767static void ipaddr_filter(struct nlmsg_chain *linfo, struct nlmsg_chain *ainfo)
1768{
1769 struct nlmsg_list *l, **lp;
1770
1771 lp = &linfo->head;
1772 while ((l = *lp) != NULL) {
1773 int ok = 0;
1774 int missing_net_address = 1;
1775 struct ifinfomsg *ifi = NLMSG_DATA(&l->h);
1776 struct nlmsg_list *a;
1777
1778 for (a = ainfo->head; a; a = a->next) {
1779 struct nlmsghdr *n = &a->h;
1780 struct ifaddrmsg *ifa = NLMSG_DATA(n);
1781 struct rtattr *tb[IFA_MAX + 1];
1782 unsigned int ifa_flags;
1783
1784 if (ifa->ifa_index != ifi->ifi_index)
1785 continue;
1786 missing_net_address = 0;
1787 if (filter.family && filter.family != ifa->ifa_family)
1788 continue;
1789 if ((filter.scope^ifa->ifa_scope)&filter.scopemask)
1790 continue;
1791
1792 parse_rtattr(tb, IFA_MAX, IFA_RTA(ifa), IFA_PAYLOAD(n));
1793 ifa_flags = get_ifa_flags(ifa, tb[IFA_FLAGS]);
1794
1795 if ((filter.flags ^ ifa_flags) & filter.flagmask)
1796 continue;
1797
1798 if (ifa_label_match_rta(ifa->ifa_index, tb[IFA_LABEL]))
1799 continue;
1800
1801 if (!tb[IFA_LOCAL])
1802 tb[IFA_LOCAL] = tb[IFA_ADDRESS];
1803 if (inet_addr_match_rta(&filter.pfx, tb[IFA_LOCAL]))
1804 continue;
1805
1806 ok = 1;
1807 break;
1808 }
1809 if (missing_net_address &&
1810 (filter.family == AF_UNSPEC || filter.family == AF_PACKET))
1811 ok = 1;
1812 if (!ok) {
1813 *lp = l->next;
1814 free(l);
1815 } else
1816 lp = &l->next;
1817 }
1818}
1819
1820static int ipaddr_dump_filter(struct nlmsghdr *nlh, int reqlen)
1821{
1822 struct ifaddrmsg *ifa = NLMSG_DATA(nlh);
1823
1824 ifa->ifa_index = filter.ifindex;
1825
1826 return 0;
1827}
1828
1829static int ipaddr_flush(void)
1830{
1831 int round = 0;
1832 char flushb[4096-512];
1833
1834 filter.flushb = flushb;
1835 filter.flushp = 0;
1836 filter.flushe = sizeof(flushb);
1837
1838 while ((max_flush_loops == 0) || (round < max_flush_loops)) {
1839 if (rtnl_addrdump_req(&rth, filter.family,
1840 ipaddr_dump_filter) < 0) {
1841 perror("Cannot send dump request");
1842 exit(1);
1843 }
1844 filter.flushed = 0;
1845 if (rtnl_dump_filter_nc(&rth, print_addrinfo,
1846 stdout, NLM_F_DUMP_INTR) < 0) {
1847 fprintf(stderr, "Flush terminated\n");
1848 exit(1);
1849 }
1850 if (filter.flushed == 0) {
1851 flush_done:
1852 if (show_stats) {
1853 if (round == 0)
1854 printf("Nothing to flush.\n");
1855 else
1856 printf("*** Flush is complete after %d round%s ***\n", round, round > 1?"s":"");
1857 }
1858 fflush(stdout);
1859 return 0;
1860 }
1861 round++;
1862 if (flush_update() < 0)
1863 return 1;
1864
1865 if (show_stats) {
1866 printf("\n*** Round %d, deleting %d addresses ***\n", round, filter.flushed);
1867 fflush(stdout);
1868 }
1869
1870
1871
1872
1873
1874
1875 if (!(filter.flags & IFA_F_SECONDARY) && (filter.flagmask & IFA_F_SECONDARY))
1876 goto flush_done;
1877 }
1878 fprintf(stderr, "*** Flush remains incomplete after %d rounds. ***\n", max_flush_loops);
1879 fflush(stderr);
1880 return 1;
1881}
1882
1883static int iplink_filter_req(struct nlmsghdr *nlh, int reqlen)
1884{
1885 int err;
1886
1887 err = addattr32(nlh, reqlen, IFLA_EXT_MASK, RTEXT_FILTER_VF);
1888 if (err)
1889 return err;
1890
1891 if (filter.master) {
1892 err = addattr32(nlh, reqlen, IFLA_MASTER, filter.master);
1893 if (err)
1894 return err;
1895 }
1896
1897 if (filter.kind) {
1898 struct rtattr *linkinfo;
1899
1900 linkinfo = addattr_nest(nlh, reqlen, IFLA_LINKINFO);
1901
1902 err = addattr_l(nlh, reqlen, IFLA_INFO_KIND, filter.kind,
1903 strlen(filter.kind));
1904 if (err)
1905 return err;
1906
1907 addattr_nest_end(nlh, linkinfo);
1908 }
1909
1910 return 0;
1911}
1912
1913static int ipaddr_link_get(int index, struct nlmsg_chain *linfo)
1914{
1915 struct iplink_req req = {
1916 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
1917 .n.nlmsg_flags = NLM_F_REQUEST,
1918 .n.nlmsg_type = RTM_GETLINK,
1919 .i.ifi_family = filter.family,
1920 .i.ifi_index = index,
1921 };
1922 __u32 filt_mask = RTEXT_FILTER_VF;
1923 struct nlmsghdr *answer;
1924
1925 if (!show_stats)
1926 filt_mask |= RTEXT_FILTER_SKIP_STATS;
1927
1928 addattr32(&req.n, sizeof(req), IFLA_EXT_MASK, filt_mask);
1929
1930 if (rtnl_talk(&rth, &req.n, &answer) < 0) {
1931 perror("Cannot send link request");
1932 return 1;
1933 }
1934
1935 if (store_nlmsg(answer, linfo) < 0) {
1936 fprintf(stderr, "Failed to process link information\n");
1937 return 1;
1938 }
1939
1940 return 0;
1941}
1942
1943
1944
1945
1946
1947int ip_link_list(req_filter_fn_t filter_fn, struct nlmsg_chain *linfo)
1948{
1949 if (rtnl_linkdump_req_filter_fn(&rth, preferred_family,
1950 filter_fn) < 0) {
1951 perror("Cannot send dump request");
1952 return 1;
1953 }
1954
1955 if (rtnl_dump_filter(&rth, store_nlmsg, linfo) < 0) {
1956 fprintf(stderr, "Dump terminated\n");
1957 return 1;
1958 }
1959
1960 return 0;
1961}
1962
1963static int ip_addr_list(struct nlmsg_chain *ainfo)
1964{
1965 if (rtnl_addrdump_req(&rth, filter.family, ipaddr_dump_filter) < 0) {
1966 perror("Cannot send dump request");
1967 return 1;
1968 }
1969
1970 if (rtnl_dump_filter(&rth, store_nlmsg, ainfo) < 0) {
1971 fprintf(stderr, "Dump terminated\n");
1972 return 1;
1973 }
1974
1975 return 0;
1976}
1977
1978static int ipaddr_list_flush_or_save(int argc, char **argv, int action)
1979{
1980 struct nlmsg_chain linfo = { NULL, NULL};
1981 struct nlmsg_chain _ainfo = { NULL, NULL}, *ainfo = &_ainfo;
1982 struct nlmsg_list *l;
1983 char *filter_dev = NULL;
1984 int no_link = 0;
1985
1986 ipaddr_reset_filter(oneline, 0);
1987 filter.showqueue = 1;
1988 filter.family = preferred_family;
1989
1990 if (action == IPADD_FLUSH) {
1991 if (argc <= 0) {
1992 fprintf(stderr, "Flush requires arguments.\n");
1993
1994 return -1;
1995 }
1996 if (filter.family == AF_PACKET) {
1997 fprintf(stderr, "Cannot flush link addresses.\n");
1998 return -1;
1999 }
2000 }
2001
2002 while (argc > 0) {
2003 if (strcmp(*argv, "to") == 0) {
2004 NEXT_ARG();
2005 if (get_prefix(&filter.pfx, *argv, filter.family))
2006 invarg("invalid \"to\"\n", *argv);
2007 if (filter.family == AF_UNSPEC)
2008 filter.family = filter.pfx.family;
2009 } else if (strcmp(*argv, "scope") == 0) {
2010 unsigned int scope = 0;
2011
2012 NEXT_ARG();
2013 filter.scopemask = -1;
2014 if (rtnl_rtscope_a2n(&scope, *argv)) {
2015 if (strcmp(*argv, "all") != 0)
2016 invarg("invalid \"scope\"\n", *argv);
2017 scope = RT_SCOPE_NOWHERE;
2018 filter.scopemask = 0;
2019 }
2020 filter.scope = scope;
2021 } else if (strcmp(*argv, "up") == 0) {
2022 filter.up = 1;
2023 } else if (get_filter(*argv) == 0) {
2024
2025 } else if (strcmp(*argv, "label") == 0) {
2026 NEXT_ARG();
2027 filter.label = *argv;
2028 } else if (strcmp(*argv, "group") == 0) {
2029 NEXT_ARG();
2030 if (rtnl_group_a2n(&filter.group, *argv))
2031 invarg("Invalid \"group\" value\n", *argv);
2032 } else if (strcmp(*argv, "master") == 0) {
2033 int ifindex;
2034
2035 NEXT_ARG();
2036 ifindex = ll_name_to_index(*argv);
2037 if (!ifindex)
2038 invarg("Device does not exist\n", *argv);
2039 filter.master = ifindex;
2040 } else if (strcmp(*argv, "vrf") == 0) {
2041 int ifindex;
2042
2043 NEXT_ARG();
2044 ifindex = ll_name_to_index(*argv);
2045 if (!ifindex)
2046 invarg("Not a valid VRF name\n", *argv);
2047 if (!name_is_vrf(*argv))
2048 invarg("Not a valid VRF name\n", *argv);
2049 filter.master = ifindex;
2050 } else if (strcmp(*argv, "type") == 0) {
2051 int soff;
2052
2053 NEXT_ARG();
2054 soff = strlen(*argv) - strlen("_slave");
2055 if (!strcmp(*argv + soff, "_slave")) {
2056 (*argv)[soff] = '\0';
2057 filter.slave_kind = *argv;
2058 } else {
2059 filter.kind = *argv;
2060 }
2061 } else {
2062 if (strcmp(*argv, "dev") == 0)
2063 NEXT_ARG();
2064 else if (matches(*argv, "help") == 0)
2065 usage();
2066 if (filter_dev)
2067 duparg2("dev", *argv);
2068 filter_dev = *argv;
2069 }
2070 argv++; argc--;
2071 }
2072
2073 if (filter_dev) {
2074 filter.ifindex = ll_name_to_index(filter_dev);
2075 if (filter.ifindex <= 0) {
2076 fprintf(stderr, "Device \"%s\" does not exist.\n", filter_dev);
2077 return -1;
2078 }
2079 }
2080
2081 if (action == IPADD_FLUSH)
2082 return ipaddr_flush();
2083
2084 if (action == IPADD_SAVE) {
2085 if (ipadd_save_prep())
2086 exit(1);
2087
2088 if (rtnl_addrdump_req(&rth, preferred_family,
2089 ipaddr_dump_filter) < 0) {
2090 perror("Cannot send dump request");
2091 exit(1);
2092 }
2093
2094 if (rtnl_dump_filter(&rth, save_nlmsg, stdout) < 0) {
2095 fprintf(stderr, "Save terminated\n");
2096 exit(1);
2097 }
2098
2099 exit(0);
2100 }
2101
2102
2103
2104
2105
2106 new_json_obj(json);
2107
2108
2109
2110
2111
2112
2113 if (filter_dev && filter.group == -1 && do_link == 1) {
2114 if (iplink_get(filter_dev, RTEXT_FILTER_VF) < 0) {
2115 perror("Cannot send link get request");
2116 delete_json_obj();
2117 exit(1);
2118 }
2119 delete_json_obj();
2120 goto out;
2121 }
2122
2123 if (filter.ifindex) {
2124 if (ipaddr_link_get(filter.ifindex, &linfo) != 0)
2125 goto out;
2126 } else {
2127 if (ip_link_list(iplink_filter_req, &linfo) != 0)
2128 goto out;
2129 }
2130
2131 if (filter.family != AF_PACKET) {
2132 if (filter.oneline)
2133 no_link = 1;
2134
2135 if (ip_addr_list(ainfo) != 0)
2136 goto out;
2137
2138 ipaddr_filter(&linfo, ainfo);
2139 }
2140
2141 for (l = linfo.head; l; l = l->next) {
2142 struct nlmsghdr *n = &l->h;
2143 struct ifinfomsg *ifi = NLMSG_DATA(n);
2144 int res = 0;
2145
2146 open_json_object(NULL);
2147 if (brief || !no_link)
2148 res = print_linkinfo(n, stdout);
2149 if (res >= 0 && filter.family != AF_PACKET)
2150 print_selected_addrinfo(ifi, ainfo->head, stdout);
2151 if (res > 0 && !do_link && show_stats)
2152 print_link_stats(stdout, n);
2153 close_json_object();
2154 }
2155 fflush(stdout);
2156
2157out:
2158 free_nlmsg_chain(ainfo);
2159 free_nlmsg_chain(&linfo);
2160 delete_json_obj();
2161 return 0;
2162}
2163
2164static void
2165ipaddr_loop_each_vf(struct rtattr *tb[], int vfnum, int *min, int *max)
2166{
2167 struct rtattr *vflist = tb[IFLA_VFINFO_LIST];
2168 struct rtattr *i, *vf[IFLA_VF_MAX+1];
2169 struct ifla_vf_rate *vf_rate;
2170 int rem;
2171
2172 rem = RTA_PAYLOAD(vflist);
2173
2174 for (i = RTA_DATA(vflist); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
2175 parse_rtattr_nested(vf, IFLA_VF_MAX, i);
2176
2177 if (!vf[IFLA_VF_RATE]) {
2178 fprintf(stderr, "VF min/max rate API not supported\n");
2179 exit(1);
2180 }
2181
2182 vf_rate = RTA_DATA(vf[IFLA_VF_RATE]);
2183 if (vf_rate->vf == vfnum) {
2184 *min = vf_rate->min_tx_rate;
2185 *max = vf_rate->max_tx_rate;
2186 return;
2187 }
2188 }
2189 fprintf(stderr, "Cannot find VF %d\n", vfnum);
2190 exit(1);
2191}
2192
2193void ipaddr_get_vf_rate(int vfnum, int *min, int *max, const char *dev)
2194{
2195 struct nlmsg_chain linfo = { NULL, NULL};
2196 struct rtattr *tb[IFLA_MAX+1];
2197 struct ifinfomsg *ifi;
2198 struct nlmsg_list *l;
2199 struct nlmsghdr *n;
2200 int idx, len;
2201
2202 idx = ll_name_to_index(dev);
2203 if (idx == 0) {
2204 fprintf(stderr, "Device %s does not exist\n", dev);
2205 exit(1);
2206 }
2207
2208 if (rtnl_linkdump_req(&rth, AF_UNSPEC) < 0) {
2209 perror("Cannot send dump request");
2210 exit(1);
2211 }
2212 if (rtnl_dump_filter(&rth, store_nlmsg, &linfo) < 0) {
2213 fprintf(stderr, "Dump terminated\n");
2214 exit(1);
2215 }
2216 for (l = linfo.head; l; l = l->next) {
2217 n = &l->h;
2218 ifi = NLMSG_DATA(n);
2219
2220 len = n->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi));
2221 if (len < 0 || (idx && idx != ifi->ifi_index))
2222 continue;
2223
2224 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(ifi), len);
2225
2226 if ((tb[IFLA_VFINFO_LIST] && tb[IFLA_NUM_VF])) {
2227 ipaddr_loop_each_vf(tb, vfnum, min, max);
2228 return;
2229 }
2230 }
2231}
2232
2233int ipaddr_list_link(int argc, char **argv)
2234{
2235 preferred_family = AF_PACKET;
2236 do_link = 1;
2237 return ipaddr_list_flush_or_save(argc, argv, IPADD_LIST);
2238}
2239
2240void ipaddr_reset_filter(int oneline, int ifindex)
2241{
2242 memset(&filter, 0, sizeof(filter));
2243 filter.oneline = oneline;
2244 filter.ifindex = ifindex;
2245 filter.group = -1;
2246}
2247
2248static int default_scope(inet_prefix *lcl)
2249{
2250 if (lcl->family == AF_INET) {
2251 if (lcl->bytelen >= 1 && *(__u8 *)&lcl->data == 127)
2252 return RT_SCOPE_HOST;
2253 }
2254 return 0;
2255}
2256
2257static bool ipaddr_is_multicast(inet_prefix *a)
2258{
2259 if (a->family == AF_INET)
2260 return IN_MULTICAST(ntohl(a->data[0]));
2261 else if (a->family == AF_INET6)
2262 return IN6_IS_ADDR_MULTICAST(a->data);
2263 else
2264 return false;
2265}
2266
2267static bool is_valid_label(const char *dev, const char *label)
2268{
2269 size_t len = strlen(dev);
2270
2271 if (strncmp(label, dev, len) != 0)
2272 return false;
2273
2274 return label[len] == '\0' || label[len] == ':';
2275}
2276
2277static int ipaddr_modify(int cmd, int flags, int argc, char **argv)
2278{
2279 struct {
2280 struct nlmsghdr n;
2281 struct ifaddrmsg ifa;
2282 char buf[256];
2283 } req = {
2284 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)),
2285 .n.nlmsg_flags = NLM_F_REQUEST | flags,
2286 .n.nlmsg_type = cmd,
2287 .ifa.ifa_family = preferred_family,
2288 };
2289 char *d = NULL;
2290 char *l = NULL;
2291 char *lcl_arg = NULL;
2292 char *valid_lftp = NULL;
2293 char *preferred_lftp = NULL;
2294 inet_prefix lcl = {};
2295 inet_prefix peer;
2296 int local_len = 0;
2297 int peer_len = 0;
2298 int brd_len = 0;
2299 int any_len = 0;
2300 int scoped = 0;
2301 __u32 preferred_lft = INFINITY_LIFE_TIME;
2302 __u32 valid_lft = INFINITY_LIFE_TIME;
2303 unsigned int ifa_flags = 0;
2304
2305 while (argc > 0) {
2306 if (strcmp(*argv, "peer") == 0 ||
2307 strcmp(*argv, "remote") == 0) {
2308 NEXT_ARG();
2309
2310 if (peer_len)
2311 duparg("peer", *argv);
2312 get_prefix(&peer, *argv, req.ifa.ifa_family);
2313 peer_len = peer.bytelen;
2314 if (req.ifa.ifa_family == AF_UNSPEC)
2315 req.ifa.ifa_family = peer.family;
2316 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen);
2317 req.ifa.ifa_prefixlen = peer.bitlen;
2318 } else if (matches(*argv, "broadcast") == 0 ||
2319 strcmp(*argv, "brd") == 0) {
2320 inet_prefix addr;
2321
2322 NEXT_ARG();
2323 if (brd_len)
2324 duparg("broadcast", *argv);
2325 if (strcmp(*argv, "+") == 0)
2326 brd_len = -1;
2327 else if (strcmp(*argv, "-") == 0)
2328 brd_len = -2;
2329 else {
2330 get_addr(&addr, *argv, req.ifa.ifa_family);
2331 if (req.ifa.ifa_family == AF_UNSPEC)
2332 req.ifa.ifa_family = addr.family;
2333 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &addr.data, addr.bytelen);
2334 brd_len = addr.bytelen;
2335 }
2336 } else if (strcmp(*argv, "anycast") == 0) {
2337 inet_prefix addr;
2338
2339 NEXT_ARG();
2340 if (any_len)
2341 duparg("anycast", *argv);
2342 get_addr(&addr, *argv, req.ifa.ifa_family);
2343 if (req.ifa.ifa_family == AF_UNSPEC)
2344 req.ifa.ifa_family = addr.family;
2345 addattr_l(&req.n, sizeof(req), IFA_ANYCAST, &addr.data, addr.bytelen);
2346 any_len = addr.bytelen;
2347 } else if (strcmp(*argv, "scope") == 0) {
2348 unsigned int scope = 0;
2349
2350 NEXT_ARG();
2351 if (rtnl_rtscope_a2n(&scope, *argv))
2352 invarg("invalid scope value.", *argv);
2353 req.ifa.ifa_scope = scope;
2354 scoped = 1;
2355 } else if (strcmp(*argv, "dev") == 0) {
2356 NEXT_ARG();
2357 d = *argv;
2358 } else if (strcmp(*argv, "label") == 0) {
2359 NEXT_ARG();
2360 l = *argv;
2361 addattr_l(&req.n, sizeof(req), IFA_LABEL, l, strlen(l)+1);
2362 } else if (matches(*argv, "metric") == 0 ||
2363 matches(*argv, "priority") == 0 ||
2364 matches(*argv, "preference") == 0) {
2365 __u32 metric;
2366
2367 NEXT_ARG();
2368 if (get_u32(&metric, *argv, 0))
2369 invarg("\"metric\" value is invalid\n", *argv);
2370 addattr32(&req.n, sizeof(req), IFA_RT_PRIORITY, metric);
2371 } else if (matches(*argv, "valid_lft") == 0) {
2372 if (valid_lftp)
2373 duparg("valid_lft", *argv);
2374 NEXT_ARG();
2375 valid_lftp = *argv;
2376 if (set_lifetime(&valid_lft, *argv))
2377 invarg("valid_lft value", *argv);
2378 } else if (matches(*argv, "preferred_lft") == 0) {
2379 if (preferred_lftp)
2380 duparg("preferred_lft", *argv);
2381 NEXT_ARG();
2382 preferred_lftp = *argv;
2383 if (set_lifetime(&preferred_lft, *argv))
2384 invarg("preferred_lft value", *argv);
2385 } else if (lookup_flag_data_by_name(*argv)) {
2386 const struct ifa_flag_data_t* flag_data = lookup_flag_data_by_name(*argv);
2387 if (flag_data->readonly) {
2388 fprintf(stderr, "Warning: %s option is not mutable from userspace\n", flag_data->name);
2389 } else if (flag_data->v6only && req.ifa.ifa_family != AF_INET6) {
2390 fprintf(stderr, "Warning: %s option can be set only for IPv6 addresses\n", flag_data->name);
2391 } else {
2392 ifa_flags |= flag_data->mask;
2393 }
2394 } else {
2395 if (strcmp(*argv, "local") == 0)
2396 NEXT_ARG();
2397 if (matches(*argv, "help") == 0)
2398 usage();
2399 if (local_len)
2400 duparg2("local", *argv);
2401 lcl_arg = *argv;
2402 get_prefix(&lcl, *argv, req.ifa.ifa_family);
2403 if (req.ifa.ifa_family == AF_UNSPEC)
2404 req.ifa.ifa_family = lcl.family;
2405 addattr_l(&req.n, sizeof(req), IFA_LOCAL, &lcl.data, lcl.bytelen);
2406 local_len = lcl.bytelen;
2407 }
2408 argc--; argv++;
2409 }
2410 if (ifa_flags <= 0xff)
2411 req.ifa.ifa_flags = ifa_flags;
2412 else
2413 addattr32(&req.n, sizeof(req), IFA_FLAGS, ifa_flags);
2414
2415 if (d == NULL) {
2416 fprintf(stderr, "Not enough information: \"dev\" argument is required.\n");
2417 return -1;
2418 }
2419 if (l && !is_valid_label(d, l)) {
2420 fprintf(stderr,
2421 "\"label\" (%s) must match \"dev\" (%s) or be prefixed by \"dev\" with a colon.\n",
2422 l, d);
2423 return -1;
2424 }
2425
2426 if (peer_len == 0 && local_len) {
2427 if (cmd == RTM_DELADDR && lcl.family == AF_INET && !(lcl.flags & PREFIXLEN_SPECIFIED)) {
2428 fprintf(stderr,
2429 "Warning: Executing wildcard deletion to stay compatible with old scripts.\n"
2430 " Explicitly specify the prefix length (%s/%d) to avoid this warning.\n"
2431 " This special behaviour is likely to disappear in further releases,\n"
2432 " fix your scripts!\n", lcl_arg, local_len*8);
2433 } else {
2434 peer = lcl;
2435 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &lcl.data, lcl.bytelen);
2436 }
2437 }
2438 if (req.ifa.ifa_prefixlen == 0)
2439 req.ifa.ifa_prefixlen = lcl.bitlen;
2440
2441 if (brd_len < 0 && cmd != RTM_DELADDR) {
2442 inet_prefix brd;
2443 int i;
2444
2445 if (req.ifa.ifa_family != AF_INET) {
2446 fprintf(stderr, "Broadcast can be set only for IPv4 addresses\n");
2447 return -1;
2448 }
2449 brd = peer;
2450 if (brd.bitlen <= 30) {
2451 for (i = 31; i >= brd.bitlen; i--) {
2452 if (brd_len == -1)
2453 brd.data[0] |= htonl(1<<(31-i));
2454 else
2455 brd.data[0] &= ~htonl(1<<(31-i));
2456 }
2457 addattr_l(&req.n, sizeof(req), IFA_BROADCAST, &brd.data, brd.bytelen);
2458 brd_len = brd.bytelen;
2459 }
2460 }
2461 if (!scoped && cmd != RTM_DELADDR)
2462 req.ifa.ifa_scope = default_scope(&lcl);
2463
2464 req.ifa.ifa_index = ll_name_to_index(d);
2465 if (!req.ifa.ifa_index)
2466 return nodev(d);
2467
2468 if (valid_lftp || preferred_lftp) {
2469 struct ifa_cacheinfo cinfo = {};
2470
2471 if (!valid_lft) {
2472 fprintf(stderr, "valid_lft is zero\n");
2473 return -1;
2474 }
2475 if (valid_lft < preferred_lft) {
2476 fprintf(stderr, "preferred_lft is greater than valid_lft\n");
2477 return -1;
2478 }
2479
2480 cinfo.ifa_prefered = preferred_lft;
2481 cinfo.ifa_valid = valid_lft;
2482 addattr_l(&req.n, sizeof(req), IFA_CACHEINFO, &cinfo,
2483 sizeof(cinfo));
2484 }
2485
2486 if ((ifa_flags & IFA_F_MCAUTOJOIN) && !ipaddr_is_multicast(&lcl)) {
2487 fprintf(stderr, "autojoin needs multicast address\n");
2488 return -1;
2489 }
2490
2491 if (rtnl_talk(&rth, &req.n, NULL) < 0)
2492 return -2;
2493
2494 return 0;
2495}
2496
2497int do_ipaddr(int argc, char **argv)
2498{
2499 if (argc < 1)
2500 return ipaddr_list_flush_or_save(0, NULL, IPADD_LIST);
2501 if (matches(*argv, "add") == 0)
2502 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
2503 if (matches(*argv, "change") == 0 ||
2504 strcmp(*argv, "chg") == 0)
2505 return ipaddr_modify(RTM_NEWADDR, NLM_F_REPLACE, argc-1, argv+1);
2506 if (matches(*argv, "replace") == 0)
2507 return ipaddr_modify(RTM_NEWADDR, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
2508 if (matches(*argv, "delete") == 0)
2509 return ipaddr_modify(RTM_DELADDR, 0, argc-1, argv+1);
2510 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
2511 || matches(*argv, "lst") == 0)
2512 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_LIST);
2513 if (matches(*argv, "flush") == 0)
2514 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_FLUSH);
2515 if (matches(*argv, "save") == 0)
2516 return ipaddr_list_flush_or_save(argc-1, argv+1, IPADD_SAVE);
2517 if (matches(*argv, "showdump") == 0)
2518 return ipaddr_showdump();
2519 if (matches(*argv, "restore") == 0)
2520 return ipaddr_restore();
2521 if (matches(*argv, "help") == 0)
2522 usage();
2523 fprintf(stderr, "Command \"%s\" is unknown, try \"ip address help\".\n", *argv);
2524 exit(-1);
2525}
2526