]> git.proxmox.com Git - mirror_iproute2.git/blame - bridge/fdb.c
rttable: Fix invalid range checking when table id is converted to u32
[mirror_iproute2.git] / bridge / fdb.c
CommitLineData
d04bc300
SH
1/*
2 * Get/set/delete fdb table with netlink
3 *
0849e60a
SH
4 * TODO: merge/replace this with ip neighbour
5 *
d04bc300
SH
6 * Authors: Stephen Hemminger <shemminger@vyatta.com>
7 */
8
9#include <stdio.h>
10#include <stdlib.h>
11#include <unistd.h>
5f409678 12#include <netdb.h>
d04bc300
SH
13#include <time.h>
14#include <fcntl.h>
15#include <sys/socket.h>
16#include <sys/time.h>
17#include <net/if.h>
18#include <netinet/in.h>
19#include <linux/if_bridge.h>
20#include <linux/if_ether.h>
21#include <linux/neighbour.h>
22#include <string.h>
dd9cc0ee 23#include <limits.h>
b239c56e
AK
24#include <json_writer.h>
25#include <stdbool.h>
d04bc300
SH
26
27#include "libnetlink.h"
28#include "br_common.h"
0849e60a 29#include "rt_names.h"
d04bc300
SH
30#include "utils.h"
31
ae6eb907 32static unsigned int filter_index, filter_vlan;
d04bc300 33
b239c56e
AK
34json_writer_t *jw_global;
35
d04bc300
SH
36static void usage(void)
37{
bd5bbad4 38 fprintf(stderr, "Usage: bridge fdb { add | append | del | replace } ADDR dev DEV\n"
cd8df30b 39 " [ self ] [ master ] [ use ] [ router ]\n"
c6d0cfb5 40 " [ local | static | dynamic ] [ dst IPADDR ] [ vlan VID ]\n"
df4b043f 41 " [ port PORT] [ vni VNI ] [ via DEV ]\n");
ae6eb907 42 fprintf(stderr, " bridge fdb [ show [ br BRDEV ] [ brport DEV ] [ vlan VID ] ]\n");
d04bc300
SH
43 exit(-1);
44}
45
df4b043f 46static const char *state_n2a(unsigned int s)
d04bc300
SH
47{
48 static char buf[32];
49
0849e60a
SH
50 if (s & NUD_PERMANENT)
51 return "permanent";
d04bc300
SH
52
53 if (s & NUD_NOARP)
54 return "static";
55
56 if (s & NUD_STALE)
57 return "stale";
0849e60a 58
d04bc300
SH
59 if (s & NUD_REACHABLE)
60 return "";
61
62 sprintf(buf, "state=%#x", s);
63 return buf;
64}
65
b239c56e
AK
66static void start_json_fdb_flags_array(bool *fdb_flags)
67{
68 if (*fdb_flags)
69 return;
70 jsonw_name(jw_global, "flags");
71 jsonw_start_array(jw_global);
72 *fdb_flags = true;
73}
74
d04bc300
SH
75int print_fdb(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg)
76{
0849e60a 77 FILE *fp = arg;
d04bc300
SH
78 struct ndmsg *r = NLMSG_DATA(n);
79 int len = n->nlmsg_len;
df4b043f 80 struct rtattr *tb[NDA_MAX+1];
ae6eb907 81 __u16 vid = 0;
b239c56e
AK
82 bool fdb_flags = false;
83 const char *state_s;
0849e60a
SH
84
85 if (n->nlmsg_type != RTM_NEWNEIGH && n->nlmsg_type != RTM_DELNEIGH) {
86 fprintf(stderr, "Not RTM_NEWNEIGH: %08x %08x %08x\n",
87 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
0849e60a
SH
88 return 0;
89 }
d04bc300
SH
90
91 len -= NLMSG_LENGTH(sizeof(*r));
92 if (len < 0) {
93 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
94 return -1;
95 }
96
97 if (r->ndm_family != AF_BRIDGE)
98 return 0;
99
100 if (filter_index && filter_index != r->ndm_ifindex)
101 return 0;
102
103 parse_rtattr(tb, NDA_MAX, NDA_RTA(r),
104 n->nlmsg_len - NLMSG_LENGTH(sizeof(*r)));
105
ae6eb907
NA
106 if (tb[NDA_VLAN])
107 vid = rta_getattr_u16(tb[NDA_VLAN]);
108
109 if (filter_vlan && filter_vlan != vid)
110 return 0;
111
afd3921e 112 if (jw_global) {
113 jsonw_pretty(jw_global, 1);
114 jsonw_start_object(jw_global);
115 }
116
b239c56e
AK
117 if (n->nlmsg_type == RTM_DELNEIGH) {
118 if (jw_global)
119 jsonw_string_field(jw_global, "opCode", "deleted");
120 else
121 fprintf(fp, "Deleted ");
122 }
0849e60a
SH
123
124 if (tb[NDA_LLADDR]) {
125 SPRINT_BUF(b1);
b239c56e
AK
126 ll_addr_n2a(RTA_DATA(tb[NDA_LLADDR]),
127 RTA_PAYLOAD(tb[NDA_LLADDR]),
128 ll_index_to_type(r->ndm_ifindex),
129 b1, sizeof(b1));
130 if (jw_global)
131 jsonw_string_field(jw_global, "mac", b1);
132 else
133 fprintf(fp, "%s ", b1);
d04bc300 134 }
38df7ac9 135
b239c56e
AK
136 if (!filter_index && r->ndm_ifindex) {
137 if (jw_global)
138 jsonw_string_field(jw_global, "dev",
139 ll_index_to_name(r->ndm_ifindex));
140 else
141 fprintf(fp, "dev %s ",
142 ll_index_to_name(r->ndm_ifindex));
143 }
0849e60a
SH
144
145 if (tb[NDA_DST]) {
9e763fa5 146 int family = AF_INET;
b239c56e 147 const char *abuf_s;
9e763fa5
MR
148
149 if (RTA_PAYLOAD(tb[NDA_DST]) == sizeof(struct in6_addr))
150 family = AF_INET6;
151
b239c56e
AK
152 abuf_s = format_host(family,
153 RTA_PAYLOAD(tb[NDA_DST]),
154 RTA_DATA(tb[NDA_DST]));
155 if (jw_global)
156 jsonw_string_field(jw_global, "dst", abuf_s);
157 else
158 fprintf(fp, "dst %s ", abuf_s);
159 }
160
161 if (vid) {
162 if (jw_global)
163 jsonw_uint_field(jw_global, "vlan", vid);
164 else
165 fprintf(fp, "vlan %hu ", vid);
166 }
167
168 if (tb[NDA_PORT]) {
169 if (jw_global)
170 jsonw_uint_field(jw_global, "port",
aab0f610 171 rta_getattr_be16(tb[NDA_PORT]));
b239c56e
AK
172 else
173 fprintf(fp, "port %d ",
aab0f610 174 rta_getattr_be16(tb[NDA_PORT]));
0849e60a 175 }
38df7ac9 176
b239c56e
AK
177 if (tb[NDA_VNI]) {
178 if (jw_global)
179 jsonw_uint_field(jw_global, "vni",
180 rta_getattr_u32(tb[NDA_VNI]));
181 else
182 fprintf(fp, "vni %d ",
183 rta_getattr_u32(tb[NDA_VNI]));
184 }
fd08839c 185
5f409678
DS
186 if (tb[NDA_IFINDEX]) {
187 unsigned int ifindex = rta_getattr_u32(tb[NDA_IFINDEX]);
188
189 if (ifindex) {
190 char ifname[IF_NAMESIZE];
191
a4797670 192 if (!tb[NDA_LINK_NETNSID] &&
b239c56e
AK
193 if_indextoname(ifindex, ifname)) {
194 if (jw_global)
195 jsonw_string_field(jw_global, "viaIf",
196 ifname);
197 else
198 fprintf(fp, "via %s ", ifname);
199 } else {
200 if (jw_global)
201 jsonw_uint_field(jw_global, "viaIfIndex",
202 ifindex);
203 else
204 fprintf(fp, "via ifindex %u ", ifindex);
205 }
5f409678
DS
206 }
207 }
b239c56e
AK
208
209 if (tb[NDA_LINK_NETNSID]) {
210 if (jw_global)
211 jsonw_uint_field(jw_global, "linkNetNsId",
212 rta_getattr_u32(tb[NDA_LINK_NETNSID]));
213 else
214 fprintf(fp, "link-netnsid %d ",
215 rta_getattr_u32(tb[NDA_LINK_NETNSID]));
216 }
5f409678 217
d04bc300
SH
218 if (show_stats && tb[NDA_CACHEINFO]) {
219 struct nda_cacheinfo *ci = RTA_DATA(tb[NDA_CACHEINFO]);
0849e60a 220 int hz = get_user_hz();
d04bc300 221
b239c56e
AK
222 if (jw_global) {
223 jsonw_uint_field(jw_global, "used",
224 ci->ndm_used/hz);
225 jsonw_uint_field(jw_global, "updated",
226 ci->ndm_updated/hz);
227 } else {
228 fprintf(fp, "used %d/%d ", ci->ndm_used/hz,
229 ci->ndm_updated/hz);
230 }
231 }
232
233 if (jw_global) {
234 if (r->ndm_flags & NTF_SELF) {
235 start_json_fdb_flags_array(&fdb_flags);
236 jsonw_string(jw_global, "self");
237 }
238 if (r->ndm_flags & NTF_ROUTER) {
239 start_json_fdb_flags_array(&fdb_flags);
240 jsonw_string(jw_global, "router");
241 }
242 if (r->ndm_flags & NTF_EXT_LEARNED) {
243 start_json_fdb_flags_array(&fdb_flags);
244 jsonw_string(jw_global, "offload");
245 }
246 if (r->ndm_flags & NTF_MASTER)
247 jsonw_string(jw_global, "master");
248 if (fdb_flags)
249 jsonw_end_array(jw_global);
250
251 if (tb[NDA_MASTER])
252 jsonw_string_field(jw_global,
253 "master",
254 ll_index_to_name(rta_getattr_u32(tb[NDA_MASTER])));
255
256 } else {
257 if (r->ndm_flags & NTF_SELF)
258 fprintf(fp, "self ");
259 if (r->ndm_flags & NTF_ROUTER)
260 fprintf(fp, "router ");
261 if (r->ndm_flags & NTF_EXT_LEARNED)
262 fprintf(fp, "offload ");
263 if (tb[NDA_MASTER]) {
264 fprintf(fp, "master %s ",
265 ll_index_to_name(rta_getattr_u32(tb[NDA_MASTER])));
266 } else if (r->ndm_flags & NTF_MASTER) {
267 fprintf(fp, "master ");
268 }
269 }
270
271 state_s = state_n2a(r->ndm_state);
272 if (jw_global) {
273 if (state_s[0])
274 jsonw_string_field(jw_global, "state", state_s);
275
276 jsonw_end_object(jw_global);
277 } else {
278 fprintf(fp, "%s\n", state_s);
279
280 fflush(fp);
d04bc300 281 }
4d45bf3b 282
d04bc300
SH
283 return 0;
284}
285
286static int fdb_show(int argc, char **argv)
287{
aeb14eb0 288 struct {
df4b043f 289 struct nlmsghdr n;
aeb14eb0 290 struct ifinfomsg ifm;
df4b043f 291 char buf[256];
d17b136f
PS
292 } req = {
293 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
294 .ifm.ifi_family = PF_BRIDGE,
295 };
aeb14eb0 296
d04bc300 297 char *filter_dev = NULL;
aeb14eb0
JHS
298 char *br = NULL;
299 int msg_size = sizeof(struct ifinfomsg);
300
d04bc300 301 while (argc > 0) {
aeb14eb0 302 if ((strcmp(*argv, "brport") == 0) || strcmp(*argv, "dev") == 0) {
d04bc300 303 NEXT_ARG();
d04bc300 304 filter_dev = *argv;
aeb14eb0
JHS
305 } else if (strcmp(*argv, "br") == 0) {
306 NEXT_ARG();
307 br = *argv;
ae6eb907
NA
308 } else if (strcmp(*argv, "vlan") == 0) {
309 NEXT_ARG();
310 if (filter_vlan)
311 duparg("vlan", *argv);
312 filter_vlan = atoi(*argv);
aeb14eb0
JHS
313 } else {
314 if (matches(*argv, "help") == 0)
315 usage();
d04bc300
SH
316 }
317 argc--; argv++;
318 }
319
aeb14eb0
JHS
320 if (br) {
321 int br_ifindex = ll_name_to_index(br);
df4b043f 322
aeb14eb0
JHS
323 if (br_ifindex == 0) {
324 fprintf(stderr, "Cannot find bridge device \"%s\"\n", br);
325 return -1;
326 }
327 addattr32(&req.n, sizeof(req), IFLA_MASTER, br_ifindex);
328 msg_size += RTA_LENGTH(4);
329 }
330
331 /*we'll keep around filter_dev for older kernels */
d04bc300 332 if (filter_dev) {
0849e60a
SH
333 filter_index = if_nametoindex(filter_dev);
334 if (filter_index == 0) {
335 fprintf(stderr, "Cannot find device \"%s\"\n",
336 filter_dev);
d04bc300
SH
337 return -1;
338 }
aeb14eb0 339 req.ifm.ifi_index = filter_index;
d04bc300
SH
340 }
341
aeb14eb0 342 if (rtnl_dump_request(&rth, RTM_GETNEIGH, &req.ifm, msg_size) < 0) {
d04bc300
SH
343 perror("Cannot send dump request");
344 exit(1);
345 }
d04bc300 346
b239c56e
AK
347 if (json_output) {
348 jw_global = jsonw_new(stdout);
349 if (!jw_global) {
350 fprintf(stderr, "Error allocation json object\n");
351 exit(1);
352 }
353 jsonw_start_array(jw_global);
354 }
0849e60a 355 if (rtnl_dump_filter(&rth, print_fdb, stdout) < 0) {
d04bc300
SH
356 fprintf(stderr, "Dump terminated\n");
357 exit(1);
358 }
b239c56e
AK
359 if (jw_global) {
360 jsonw_end_array(jw_global);
361 jsonw_destroy(&jw_global);
362 }
d04bc300
SH
363
364 return 0;
365}
366
367static int fdb_modify(int cmd, int flags, int argc, char **argv)
368{
369 struct {
df4b043f
SH
370 struct nlmsghdr n;
371 struct ndmsg ndm;
372 char buf[256];
d17b136f
PS
373 } req = {
374 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg)),
375 .n.nlmsg_flags = NLM_F_REQUEST | flags,
376 .n.nlmsg_type = cmd,
377 .ndm.ndm_family = PF_BRIDGE,
378 .ndm.ndm_state = NUD_NOARP,
379 };
d04bc300
SH
380 char *addr = NULL;
381 char *d = NULL;
382 char abuf[ETH_ALEN];
0849e60a
SH
383 int dst_ok = 0;
384 inet_prefix dst;
5f409678
DS
385 unsigned long port = 0;
386 unsigned long vni = ~0;
387 unsigned int via = 0;
388 char *endptr;
fd08839c 389 short vid = -1;
d04bc300 390
d04bc300
SH
391 while (argc > 0) {
392 if (strcmp(*argv, "dev") == 0) {
393 NEXT_ARG();
394 d = *argv;
0849e60a
SH
395 } else if (strcmp(*argv, "dst") == 0) {
396 NEXT_ARG();
397 if (dst_ok)
398 duparg2("dst", *argv);
399 get_addr(&dst, *argv, preferred_family);
400 dst_ok = 1;
5f409678
DS
401 } else if (strcmp(*argv, "port") == 0) {
402
403 NEXT_ARG();
404 port = strtoul(*argv, &endptr, 0);
405 if (endptr && *endptr) {
406 struct servent *pse;
407
408 pse = getservbyname(*argv, "udp");
409 if (!pse)
410 invarg("invalid port\n", *argv);
411 port = ntohs(pse->s_port);
412 } else if (port > 0xffff)
413 invarg("invalid port\n", *argv);
414 } else if (strcmp(*argv, "vni") == 0) {
415 NEXT_ARG();
416 vni = strtoul(*argv, &endptr, 0);
417 if ((endptr && *endptr) ||
418 (vni >> 24) || vni == ULONG_MAX)
419 invarg("invalid VNI\n", *argv);
420 } else if (strcmp(*argv, "via") == 0) {
421 NEXT_ARG();
422 via = if_nametoindex(*argv);
423 if (via == 0)
424 invarg("invalid device\n", *argv);
dc6a6a25
JF
425 } else if (strcmp(*argv, "self") == 0) {
426 req.ndm.ndm_flags |= NTF_SELF;
0849e60a 427 } else if (matches(*argv, "master") == 0) {
dc6a6a25 428 req.ndm.ndm_flags |= NTF_MASTER;
5b8a1d4a
DS
429 } else if (matches(*argv, "router") == 0) {
430 req.ndm.ndm_flags |= NTF_ROUTER;
e9e9365b 431 } else if (matches(*argv, "local") == 0 ||
0849e60a
SH
432 matches(*argv, "permanent") == 0) {
433 req.ndm.ndm_state |= NUD_PERMANENT;
a1987cd1
RP
434 } else if (matches(*argv, "temp") == 0 ||
435 matches(*argv, "static") == 0) {
0849e60a 436 req.ndm.ndm_state |= NUD_REACHABLE;
c6d0cfb5
RP
437 } else if (matches(*argv, "dynamic") == 0) {
438 req.ndm.ndm_state |= NUD_REACHABLE;
439 req.ndm.ndm_state &= ~NUD_NOARP;
fd08839c
VY
440 } else if (matches(*argv, "vlan") == 0) {
441 if (vid >= 0)
442 duparg2("vlan", *argv);
443 NEXT_ARG();
444 vid = atoi(*argv);
cd8df30b
RP
445 } else if (matches(*argv, "use") == 0) {
446 req.ndm.ndm_flags |= NTF_USE;
d04bc300
SH
447 } else {
448 if (strcmp(*argv, "to") == 0) {
449 NEXT_ARG();
450 }
0849e60a
SH
451 if (matches(*argv, "help") == 0)
452 usage();
d04bc300
SH
453 if (addr)
454 duparg2("to", *argv);
455 addr = *argv;
456 }
457 argc--; argv++;
458 }
459
460 if (d == NULL || addr == NULL) {
461 fprintf(stderr, "Device and address are required arguments.\n");
42ecedd4 462 return -1;
d04bc300
SH
463 }
464
0849e60a
SH
465 /* Assume self */
466 if (!(req.ndm.ndm_flags&(NTF_SELF|NTF_MASTER)))
467 req.ndm.ndm_flags |= NTF_SELF;
468
469 /* Assume permanent */
470 if (!(req.ndm.ndm_state&(NUD_PERMANENT|NUD_REACHABLE)))
471 req.ndm.ndm_state |= NUD_PERMANENT;
472
473 if (sscanf(addr, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx",
d04bc300
SH
474 abuf, abuf+1, abuf+2,
475 abuf+3, abuf+4, abuf+5) != 6) {
476 fprintf(stderr, "Invalid mac address %s\n", addr);
42ecedd4 477 return -1;
d04bc300
SH
478 }
479
480 addattr_l(&req.n, sizeof(req), NDA_LLADDR, abuf, ETH_ALEN);
0849e60a
SH
481 if (dst_ok)
482 addattr_l(&req.n, sizeof(req), NDA_DST, &dst.data, dst.bytelen);
d04bc300 483
fd08839c 484 if (vid >= 0)
8ae66094 485 addattr16(&req.n, sizeof(req), NDA_VLAN, vid);
fd08839c 486
5f409678
DS
487 if (port) {
488 unsigned short dport;
489
490 dport = htons((unsigned short)port);
491 addattr16(&req.n, sizeof(req), NDA_PORT, dport);
492 }
493 if (vni != ~0)
494 addattr32(&req.n, sizeof(req), NDA_VNI, vni);
495 if (via)
496 addattr32(&req.n, sizeof(req), NDA_IFINDEX, via);
497
d04bc300
SH
498 req.ndm.ndm_ifindex = ll_name_to_index(d);
499 if (req.ndm.ndm_ifindex == 0) {
500 fprintf(stderr, "Cannot find device \"%s\"\n", d);
501 return -1;
502 }
503
c079e121 504 if (rtnl_talk(&rth, &req.n, NULL, 0) < 0)
42ecedd4 505 return -1;
d04bc300
SH
506
507 return 0;
508}
509
510int do_fdb(int argc, char **argv)
511{
512 ll_init_map(&rth);
513
514 if (argc > 0) {
515 if (matches(*argv, "add") == 0)
516 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
5f409678
DS
517 if (matches(*argv, "append") == 0)
518 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_APPEND, argc-1, argv+1);
5464049b
TR
519 if (matches(*argv, "replace") == 0)
520 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
d04bc300
SH
521 if (matches(*argv, "delete") == 0)
522 return fdb_modify(RTM_DELNEIGH, 0, argc-1, argv+1);
523 if (matches(*argv, "show") == 0 ||
524 matches(*argv, "lst") == 0 ||
525 matches(*argv, "list") == 0)
526 return fdb_show(argc-1, argv+1);
527 if (matches(*argv, "help") == 0)
528 usage();
529 } else
530 return fdb_show(0, NULL);
531
083b46bb 532 fprintf(stderr, "Command \"%s\" is unknown, try \"bridge fdb help\".\n", *argv);
d04bc300
SH
533 exit(-1);
534}