]> git.proxmox.com Git - mirror_iproute2.git/blame - bridge/fdb.c
libnetlink: Add RTNL_HANDLE_F_STRICT_CHK flag
[mirror_iproute2.git] / bridge / fdb.c
CommitLineData
6054c1eb 1/* SPDX-License-Identifier: GPL-2.0 */
d04bc300
SH
2/*
3 * Get/set/delete fdb table with netlink
4 *
0849e60a
SH
5 * TODO: merge/replace this with ip neighbour
6 *
d04bc300
SH
7 * Authors: Stephen Hemminger <shemminger@vyatta.com>
8 */
9
10#include <stdio.h>
11#include <stdlib.h>
12#include <unistd.h>
5f409678 13#include <netdb.h>
d04bc300
SH
14#include <time.h>
15#include <fcntl.h>
16#include <sys/socket.h>
17#include <sys/time.h>
18#include <net/if.h>
19#include <netinet/in.h>
20#include <linux/if_bridge.h>
21#include <linux/if_ether.h>
22#include <linux/neighbour.h>
23#include <string.h>
dd9cc0ee 24#include <limits.h>
b239c56e 25#include <stdbool.h>
d04bc300 26
c7c1a1ef 27#include "json_print.h"
d04bc300
SH
28#include "libnetlink.h"
29#include "br_common.h"
0849e60a 30#include "rt_names.h"
d04bc300
SH
31#include "utils.h"
32
66b4199f 33static unsigned int filter_index, filter_vlan, filter_state, filter_master;
d04bc300
SH
34
35static void usage(void)
36{
bcddcddd
SH
37 fprintf(stderr,
38 "Usage: bridge fdb { add | append | del | replace } ADDR dev DEV\n"
b4f84bf8 39 " [ self ] [ master ] [ use ] [ router ] [ extern_learn ]\n"
c3ded6e4
NA
40 " [ sticky ] [ local | static | dynamic ] [ dst IPADDR ]\n"
41 " [ vlan VID ] [ port PORT] [ vni VNI ] [ via DEV ]\n"
bcddcddd 42 " bridge fdb [ show [ br BRDEV ] [ brport DEV ] [ vlan VID ] [ state STATE ] ]\n");
d04bc300
SH
43 exit(-1);
44}
45
df4b043f 46static const char *state_n2a(unsigned int s)
d04bc300
SH
47{
48 static char buf[32];
49
0849e60a
SH
50 if (s & NUD_PERMANENT)
51 return "permanent";
d04bc300
SH
52
53 if (s & NUD_NOARP)
54 return "static";
55
56 if (s & NUD_STALE)
57 return "stale";
0849e60a 58
d04bc300
SH
59 if (s & NUD_REACHABLE)
60 return "";
61
62 sprintf(buf, "state=%#x", s);
63 return buf;
64}
65
7f10090b
NA
66static int state_a2n(unsigned int *s, const char *arg)
67{
68 if (matches(arg, "permanent") == 0)
69 *s = NUD_PERMANENT;
70 else if (matches(arg, "static") == 0 || matches(arg, "temp") == 0)
71 *s = NUD_NOARP;
72 else if (matches(arg, "stale") == 0)
73 *s = NUD_STALE;
74 else if (matches(arg, "reachable") == 0 || matches(arg, "dynamic") == 0)
75 *s = NUD_REACHABLE;
76 else if (strcmp(arg, "all") == 0)
77 *s = ~0;
78 else if (get_unsigned(s, arg, 0))
79 return -1;
80
81 return 0;
82}
83
c7c1a1ef
SH
84static void fdb_print_flags(FILE *fp, unsigned int flags)
85{
86 open_json_array(PRINT_JSON,
87 is_json_context() ? "flags" : "");
88
89 if (flags & NTF_SELF)
90 print_string(PRINT_ANY, NULL, "%s ", "self");
91
92 if (flags & NTF_ROUTER)
93 print_string(PRINT_ANY, NULL, "%s ", "router");
94
95 if (flags & NTF_EXT_LEARNED)
96 print_string(PRINT_ANY, NULL, "%s ", "extern_learn");
97
98 if (flags & NTF_OFFLOADED)
99 print_string(PRINT_ANY, NULL, "%s ", "offload");
100
101 if (flags & NTF_MASTER)
102 print_string(PRINT_ANY, NULL, "%s ", "master");
103
c3ded6e4
NA
104 if (flags & NTF_STICKY)
105 print_string(PRINT_ANY, NULL, "%s ", "sticky");
106
c7c1a1ef
SH
107 close_json_array(PRINT_JSON, NULL);
108}
109
110static void fdb_print_stats(FILE *fp, const struct nda_cacheinfo *ci)
b239c56e 111{
c7c1a1ef
SH
112 static int hz;
113
114 if (!hz)
115 hz = get_user_hz();
116
117 if (is_json_context()) {
118 print_uint(PRINT_JSON, "used", NULL,
119 ci->ndm_used / hz);
120 print_uint(PRINT_JSON, "updated", NULL,
121 ci->ndm_updated / hz);
122 } else {
123 fprintf(fp, "used %d/%d ", ci->ndm_used / hz,
124 ci->ndm_updated / hz);
125
126 }
b239c56e
AK
127}
128
cd554f2c 129int print_fdb(struct nlmsghdr *n, void *arg)
d04bc300 130{
0849e60a 131 FILE *fp = arg;
d04bc300
SH
132 struct ndmsg *r = NLMSG_DATA(n);
133 int len = n->nlmsg_len;
df4b043f 134 struct rtattr *tb[NDA_MAX+1];
ae6eb907 135 __u16 vid = 0;
0849e60a
SH
136
137 if (n->nlmsg_type != RTM_NEWNEIGH && n->nlmsg_type != RTM_DELNEIGH) {
138 fprintf(stderr, "Not RTM_NEWNEIGH: %08x %08x %08x\n",
139 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
0849e60a
SH
140 return 0;
141 }
d04bc300
SH
142
143 len -= NLMSG_LENGTH(sizeof(*r));
144 if (len < 0) {
145 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
146 return -1;
147 }
148
149 if (r->ndm_family != AF_BRIDGE)
150 return 0;
151
152 if (filter_index && filter_index != r->ndm_ifindex)
153 return 0;
154
7f10090b
NA
155 if (filter_state && !(r->ndm_state & filter_state))
156 return 0;
157
d04bc300
SH
158 parse_rtattr(tb, NDA_MAX, NDA_RTA(r),
159 n->nlmsg_len - NLMSG_LENGTH(sizeof(*r)));
160
ae6eb907
NA
161 if (tb[NDA_VLAN])
162 vid = rta_getattr_u16(tb[NDA_VLAN]);
163
164 if (filter_vlan && filter_vlan != vid)
165 return 0;
166
c7c1a1ef
SH
167 open_json_object(NULL);
168 if (n->nlmsg_type == RTM_DELNEIGH)
169 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
0849e60a
SH
170
171 if (tb[NDA_LLADDR]) {
c7c1a1ef 172 const char *lladdr;
0849e60a 173 SPRINT_BUF(b1);
c7c1a1ef
SH
174
175 lladdr = ll_addr_n2a(RTA_DATA(tb[NDA_LLADDR]),
176 RTA_PAYLOAD(tb[NDA_LLADDR]),
177 ll_index_to_type(r->ndm_ifindex),
178 b1, sizeof(b1));
179
180 print_color_string(PRINT_ANY, COLOR_MAC,
181 "mac", "%s ", lladdr);
d04bc300 182 }
38df7ac9 183
a795211f 184 if (!filter_index && r->ndm_ifindex)
c7c1a1ef 185 print_color_string(PRINT_ANY, COLOR_IFNAME,
4abb8c72 186 "ifname", "dev %s ",
c7c1a1ef 187 ll_index_to_name(r->ndm_ifindex));
0849e60a
SH
188
189 if (tb[NDA_DST]) {
9e763fa5 190 int family = AF_INET;
c7c1a1ef 191 const char *dst;
9e763fa5
MR
192
193 if (RTA_PAYLOAD(tb[NDA_DST]) == sizeof(struct in6_addr))
194 family = AF_INET6;
195
c7c1a1ef
SH
196 dst = format_host(family,
197 RTA_PAYLOAD(tb[NDA_DST]),
198 RTA_DATA(tb[NDA_DST]));
b239c56e 199
c7c1a1ef
SH
200 print_color_string(PRINT_ANY,
201 ifa_family_color(family),
4abb8c72 202 "dst", "dst %s ", dst);
b239c56e
AK
203 }
204
c7c1a1ef
SH
205 if (vid)
206 print_uint(PRINT_ANY,
207 "vlan", "vlan %hu ", vid);
38df7ac9 208
c7c1a1ef
SH
209 if (tb[NDA_PORT])
210 print_uint(PRINT_ANY,
211 "port", "port %u ",
212 rta_getattr_be16(tb[NDA_PORT]));
fd08839c 213
c7c1a1ef
SH
214 if (tb[NDA_VNI])
215 print_uint(PRINT_ANY,
216 "vni", "vni %u ",
217 rta_getattr_u32(tb[NDA_VNI]));
218
219 if (tb[NDA_SRC_VNI])
220 print_uint(PRINT_ANY,
221 "src_vni", "src_vni %u ",
86d0988b 222 rta_getattr_u32(tb[NDA_SRC_VNI]));
86d0988b 223
5f409678
DS
224 if (tb[NDA_IFINDEX]) {
225 unsigned int ifindex = rta_getattr_u32(tb[NDA_IFINDEX]);
226
c7c1a1ef
SH
227 if (tb[NDA_LINK_NETNSID])
228 print_uint(PRINT_ANY,
229 "viaIfIndex", "via ifindex %u ",
230 ifindex);
b239c56e 231 else
c7c1a1ef
SH
232 print_string(PRINT_ANY,
233 "viaIf", "via %s ",
234 ll_index_to_name(ifindex));
b239c56e 235 }
5f409678 236
c7c1a1ef
SH
237 if (tb[NDA_LINK_NETNSID])
238 print_uint(PRINT_ANY,
239 "linkNetNsId", "link-netnsid %d ",
240 rta_getattr_u32(tb[NDA_LINK_NETNSID]));
d04bc300 241
c7c1a1ef
SH
242 if (show_stats && tb[NDA_CACHEINFO])
243 fdb_print_stats(fp, RTA_DATA(tb[NDA_CACHEINFO]));
b239c56e 244
c7c1a1ef 245 fdb_print_flags(fp, r->ndm_flags);
b239c56e 246
b239c56e 247
c7c1a1ef 248 if (tb[NDA_MASTER])
4abb8c72 249 print_string(PRINT_ANY, "master", "master %s ",
c7c1a1ef 250 ll_index_to_name(rta_getattr_u32(tb[NDA_MASTER])));
4d45bf3b 251
c7c1a1ef
SH
252 print_string(PRINT_ANY, "state", "%s\n",
253 state_n2a(r->ndm_state));
254 close_json_object();
255 fflush(fp);
d04bc300
SH
256 return 0;
257}
258
66b4199f 259static int fdb_dump_filter(struct nlmsghdr *nlh, int reqlen)
d04bc300 260{
66b4199f
DA
261 int err;
262
263 if (filter_index) {
264 struct ndmsg *ndm = NLMSG_DATA(nlh);
aeb14eb0 265
66b4199f
DA
266 ndm->ndm_ifindex = filter_index;
267 }
268
269 if (filter_master) {
270 err = addattr32(nlh, reqlen, NDA_MASTER, filter_master);
271 if (err)
272 return err;
273 }
274
275 return 0;
276}
277
278static int fdb_show(int argc, char **argv)
279{
d04bc300 280 char *filter_dev = NULL;
aeb14eb0 281 char *br = NULL;
aeb14eb0 282
d04bc300 283 while (argc > 0) {
aeb14eb0 284 if ((strcmp(*argv, "brport") == 0) || strcmp(*argv, "dev") == 0) {
d04bc300 285 NEXT_ARG();
d04bc300 286 filter_dev = *argv;
aeb14eb0
JHS
287 } else if (strcmp(*argv, "br") == 0) {
288 NEXT_ARG();
289 br = *argv;
ae6eb907
NA
290 } else if (strcmp(*argv, "vlan") == 0) {
291 NEXT_ARG();
292 if (filter_vlan)
293 duparg("vlan", *argv);
294 filter_vlan = atoi(*argv);
7f10090b
NA
295 } else if (strcmp(*argv, "state") == 0) {
296 unsigned int state;
297
298 NEXT_ARG();
299 if (state_a2n(&state, *argv))
300 invarg("invalid state", *argv);
301 filter_state |= state;
aeb14eb0
JHS
302 } else {
303 if (matches(*argv, "help") == 0)
304 usage();
d04bc300
SH
305 }
306 argc--; argv++;
307 }
308
aeb14eb0
JHS
309 if (br) {
310 int br_ifindex = ll_name_to_index(br);
df4b043f 311
aeb14eb0
JHS
312 if (br_ifindex == 0) {
313 fprintf(stderr, "Cannot find bridge device \"%s\"\n", br);
314 return -1;
315 }
66b4199f 316 filter_master = br_ifindex;
aeb14eb0
JHS
317 }
318
319 /*we'll keep around filter_dev for older kernels */
d04bc300 320 if (filter_dev) {
7a14358b 321 filter_index = ll_name_to_index(filter_dev);
fe99adbc
SP
322 if (!filter_index)
323 return nodev(filter_dev);
d04bc300
SH
324 }
325
66b4199f 326 if (rtnl_neighdump_req(&rth, PF_BRIDGE, fdb_dump_filter) < 0) {
d04bc300
SH
327 perror("Cannot send dump request");
328 exit(1);
329 }
d04bc300 330
c7c1a1ef 331 new_json_obj(json);
0849e60a 332 if (rtnl_dump_filter(&rth, print_fdb, stdout) < 0) {
d04bc300
SH
333 fprintf(stderr, "Dump terminated\n");
334 exit(1);
335 }
c7c1a1ef
SH
336 delete_json_obj();
337 fflush(stdout);
d04bc300
SH
338
339 return 0;
340}
341
342static int fdb_modify(int cmd, int flags, int argc, char **argv)
343{
344 struct {
df4b043f
SH
345 struct nlmsghdr n;
346 struct ndmsg ndm;
347 char buf[256];
d17b136f
PS
348 } req = {
349 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg)),
350 .n.nlmsg_flags = NLM_F_REQUEST | flags,
351 .n.nlmsg_type = cmd,
352 .ndm.ndm_family = PF_BRIDGE,
353 .ndm.ndm_state = NUD_NOARP,
354 };
d04bc300
SH
355 char *addr = NULL;
356 char *d = NULL;
357 char abuf[ETH_ALEN];
0849e60a
SH
358 int dst_ok = 0;
359 inet_prefix dst;
5f409678
DS
360 unsigned long port = 0;
361 unsigned long vni = ~0;
362 unsigned int via = 0;
363 char *endptr;
fd08839c 364 short vid = -1;
d04bc300 365
d04bc300
SH
366 while (argc > 0) {
367 if (strcmp(*argv, "dev") == 0) {
368 NEXT_ARG();
369 d = *argv;
0849e60a
SH
370 } else if (strcmp(*argv, "dst") == 0) {
371 NEXT_ARG();
372 if (dst_ok)
373 duparg2("dst", *argv);
374 get_addr(&dst, *argv, preferred_family);
375 dst_ok = 1;
5f409678
DS
376 } else if (strcmp(*argv, "port") == 0) {
377
378 NEXT_ARG();
379 port = strtoul(*argv, &endptr, 0);
380 if (endptr && *endptr) {
381 struct servent *pse;
382
383 pse = getservbyname(*argv, "udp");
384 if (!pse)
385 invarg("invalid port\n", *argv);
386 port = ntohs(pse->s_port);
387 } else if (port > 0xffff)
388 invarg("invalid port\n", *argv);
389 } else if (strcmp(*argv, "vni") == 0) {
390 NEXT_ARG();
391 vni = strtoul(*argv, &endptr, 0);
392 if ((endptr && *endptr) ||
393 (vni >> 24) || vni == ULONG_MAX)
394 invarg("invalid VNI\n", *argv);
395 } else if (strcmp(*argv, "via") == 0) {
396 NEXT_ARG();
7a14358b 397 via = ll_name_to_index(*argv);
fe99adbc
SP
398 if (!via)
399 exit(nodev(*argv));
dc6a6a25
JF
400 } else if (strcmp(*argv, "self") == 0) {
401 req.ndm.ndm_flags |= NTF_SELF;
0849e60a 402 } else if (matches(*argv, "master") == 0) {
dc6a6a25 403 req.ndm.ndm_flags |= NTF_MASTER;
5b8a1d4a
DS
404 } else if (matches(*argv, "router") == 0) {
405 req.ndm.ndm_flags |= NTF_ROUTER;
e9e9365b 406 } else if (matches(*argv, "local") == 0 ||
0849e60a
SH
407 matches(*argv, "permanent") == 0) {
408 req.ndm.ndm_state |= NUD_PERMANENT;
a1987cd1
RP
409 } else if (matches(*argv, "temp") == 0 ||
410 matches(*argv, "static") == 0) {
0849e60a 411 req.ndm.ndm_state |= NUD_REACHABLE;
c6d0cfb5
RP
412 } else if (matches(*argv, "dynamic") == 0) {
413 req.ndm.ndm_state |= NUD_REACHABLE;
414 req.ndm.ndm_state &= ~NUD_NOARP;
fd08839c
VY
415 } else if (matches(*argv, "vlan") == 0) {
416 if (vid >= 0)
417 duparg2("vlan", *argv);
418 NEXT_ARG();
419 vid = atoi(*argv);
cd8df30b
RP
420 } else if (matches(*argv, "use") == 0) {
421 req.ndm.ndm_flags |= NTF_USE;
b4f84bf8
RP
422 } else if (matches(*argv, "extern_learn") == 0) {
423 req.ndm.ndm_flags |= NTF_EXT_LEARNED;
c3ded6e4
NA
424 } else if (matches(*argv, "sticky") == 0) {
425 req.ndm.ndm_flags |= NTF_STICKY;
d04bc300 426 } else {
bcddcddd 427 if (strcmp(*argv, "to") == 0)
d04bc300 428 NEXT_ARG();
bcddcddd 429
0849e60a
SH
430 if (matches(*argv, "help") == 0)
431 usage();
d04bc300
SH
432 if (addr)
433 duparg2("to", *argv);
434 addr = *argv;
435 }
436 argc--; argv++;
437 }
438
439 if (d == NULL || addr == NULL) {
440 fprintf(stderr, "Device and address are required arguments.\n");
42ecedd4 441 return -1;
d04bc300
SH
442 }
443
0849e60a
SH
444 /* Assume self */
445 if (!(req.ndm.ndm_flags&(NTF_SELF|NTF_MASTER)))
446 req.ndm.ndm_flags |= NTF_SELF;
447
448 /* Assume permanent */
449 if (!(req.ndm.ndm_state&(NUD_PERMANENT|NUD_REACHABLE)))
450 req.ndm.ndm_state |= NUD_PERMANENT;
451
452 if (sscanf(addr, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx",
d04bc300
SH
453 abuf, abuf+1, abuf+2,
454 abuf+3, abuf+4, abuf+5) != 6) {
455 fprintf(stderr, "Invalid mac address %s\n", addr);
42ecedd4 456 return -1;
d04bc300
SH
457 }
458
459 addattr_l(&req.n, sizeof(req), NDA_LLADDR, abuf, ETH_ALEN);
0849e60a
SH
460 if (dst_ok)
461 addattr_l(&req.n, sizeof(req), NDA_DST, &dst.data, dst.bytelen);
d04bc300 462
fd08839c 463 if (vid >= 0)
8ae66094 464 addattr16(&req.n, sizeof(req), NDA_VLAN, vid);
fd08839c 465
5f409678
DS
466 if (port) {
467 unsigned short dport;
468
469 dport = htons((unsigned short)port);
470 addattr16(&req.n, sizeof(req), NDA_PORT, dport);
471 }
472 if (vni != ~0)
473 addattr32(&req.n, sizeof(req), NDA_VNI, vni);
474 if (via)
475 addattr32(&req.n, sizeof(req), NDA_IFINDEX, via);
476
d04bc300 477 req.ndm.ndm_ifindex = ll_name_to_index(d);
fe99adbc
SP
478 if (!req.ndm.ndm_ifindex)
479 return nodev(d);
d04bc300 480
86bf43c7 481 if (rtnl_talk(&rth, &req.n, NULL) < 0)
42ecedd4 482 return -1;
d04bc300
SH
483
484 return 0;
485}
486
487int do_fdb(int argc, char **argv)
488{
489 ll_init_map(&rth);
490
491 if (argc > 0) {
492 if (matches(*argv, "add") == 0)
493 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
5f409678
DS
494 if (matches(*argv, "append") == 0)
495 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_APPEND, argc-1, argv+1);
5464049b
TR
496 if (matches(*argv, "replace") == 0)
497 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
d04bc300
SH
498 if (matches(*argv, "delete") == 0)
499 return fdb_modify(RTM_DELNEIGH, 0, argc-1, argv+1);
500 if (matches(*argv, "show") == 0 ||
501 matches(*argv, "lst") == 0 ||
502 matches(*argv, "list") == 0)
503 return fdb_show(argc-1, argv+1);
504 if (matches(*argv, "help") == 0)
505 usage();
506 } else
507 return fdb_show(0, NULL);
508
083b46bb 509 fprintf(stderr, "Command \"%s\" is unknown, try \"bridge fdb help\".\n", *argv);
d04bc300
SH
510 exit(-1);
511}