]> git.proxmox.com Git - mirror_iproute2.git/blame - bridge/fdb.c
bridge: fdb: add support for src_vni option
[mirror_iproute2.git] / bridge / fdb.c
CommitLineData
6054c1eb 1/* SPDX-License-Identifier: GPL-2.0 */
d04bc300
SH
2/*
3 * Get/set/delete fdb table with netlink
4 *
0849e60a
SH
5 * TODO: merge/replace this with ip neighbour
6 *
d04bc300
SH
7 * Authors: Stephen Hemminger <shemminger@vyatta.com>
8 */
9
10#include <stdio.h>
11#include <stdlib.h>
12#include <unistd.h>
5f409678 13#include <netdb.h>
d04bc300
SH
14#include <time.h>
15#include <fcntl.h>
16#include <sys/socket.h>
17#include <sys/time.h>
18#include <net/if.h>
19#include <netinet/in.h>
20#include <linux/if_bridge.h>
21#include <linux/if_ether.h>
22#include <linux/neighbour.h>
23#include <string.h>
dd9cc0ee 24#include <limits.h>
b239c56e 25#include <stdbool.h>
d04bc300 26
c7c1a1ef 27#include "json_print.h"
d04bc300
SH
28#include "libnetlink.h"
29#include "br_common.h"
0849e60a 30#include "rt_names.h"
d04bc300
SH
31#include "utils.h"
32
66b4199f 33static unsigned int filter_index, filter_vlan, filter_state, filter_master;
d04bc300
SH
34
35static void usage(void)
36{
bcddcddd
SH
37 fprintf(stderr,
38 "Usage: bridge fdb { add | append | del | replace } ADDR dev DEV\n"
b4f84bf8 39 " [ self ] [ master ] [ use ] [ router ] [ extern_learn ]\n"
c3ded6e4
NA
40 " [ sticky ] [ local | static | dynamic ] [ dst IPADDR ]\n"
41 " [ vlan VID ] [ port PORT] [ vni VNI ] [ via DEV ]\n"
c5b176e5 42 " [ src_vni VNI ]\n"
bcddcddd 43 " bridge fdb [ show [ br BRDEV ] [ brport DEV ] [ vlan VID ] [ state STATE ] ]\n");
d04bc300
SH
44 exit(-1);
45}
46
df4b043f 47static const char *state_n2a(unsigned int s)
d04bc300
SH
48{
49 static char buf[32];
50
0849e60a
SH
51 if (s & NUD_PERMANENT)
52 return "permanent";
d04bc300
SH
53
54 if (s & NUD_NOARP)
55 return "static";
56
57 if (s & NUD_STALE)
58 return "stale";
0849e60a 59
d04bc300
SH
60 if (s & NUD_REACHABLE)
61 return "";
62
63 sprintf(buf, "state=%#x", s);
64 return buf;
65}
66
7f10090b
NA
67static int state_a2n(unsigned int *s, const char *arg)
68{
69 if (matches(arg, "permanent") == 0)
70 *s = NUD_PERMANENT;
71 else if (matches(arg, "static") == 0 || matches(arg, "temp") == 0)
72 *s = NUD_NOARP;
73 else if (matches(arg, "stale") == 0)
74 *s = NUD_STALE;
75 else if (matches(arg, "reachable") == 0 || matches(arg, "dynamic") == 0)
76 *s = NUD_REACHABLE;
77 else if (strcmp(arg, "all") == 0)
78 *s = ~0;
79 else if (get_unsigned(s, arg, 0))
80 return -1;
81
82 return 0;
83}
84
c7c1a1ef
SH
85static void fdb_print_flags(FILE *fp, unsigned int flags)
86{
87 open_json_array(PRINT_JSON,
88 is_json_context() ? "flags" : "");
89
90 if (flags & NTF_SELF)
91 print_string(PRINT_ANY, NULL, "%s ", "self");
92
93 if (flags & NTF_ROUTER)
94 print_string(PRINT_ANY, NULL, "%s ", "router");
95
96 if (flags & NTF_EXT_LEARNED)
97 print_string(PRINT_ANY, NULL, "%s ", "extern_learn");
98
99 if (flags & NTF_OFFLOADED)
100 print_string(PRINT_ANY, NULL, "%s ", "offload");
101
102 if (flags & NTF_MASTER)
103 print_string(PRINT_ANY, NULL, "%s ", "master");
104
c3ded6e4
NA
105 if (flags & NTF_STICKY)
106 print_string(PRINT_ANY, NULL, "%s ", "sticky");
107
c7c1a1ef
SH
108 close_json_array(PRINT_JSON, NULL);
109}
110
111static void fdb_print_stats(FILE *fp, const struct nda_cacheinfo *ci)
b239c56e 112{
c7c1a1ef
SH
113 static int hz;
114
115 if (!hz)
116 hz = get_user_hz();
117
118 if (is_json_context()) {
119 print_uint(PRINT_JSON, "used", NULL,
120 ci->ndm_used / hz);
121 print_uint(PRINT_JSON, "updated", NULL,
122 ci->ndm_updated / hz);
123 } else {
124 fprintf(fp, "used %d/%d ", ci->ndm_used / hz,
125 ci->ndm_updated / hz);
126
127 }
b239c56e
AK
128}
129
cd554f2c 130int print_fdb(struct nlmsghdr *n, void *arg)
d04bc300 131{
0849e60a 132 FILE *fp = arg;
d04bc300
SH
133 struct ndmsg *r = NLMSG_DATA(n);
134 int len = n->nlmsg_len;
df4b043f 135 struct rtattr *tb[NDA_MAX+1];
ae6eb907 136 __u16 vid = 0;
0849e60a
SH
137
138 if (n->nlmsg_type != RTM_NEWNEIGH && n->nlmsg_type != RTM_DELNEIGH) {
139 fprintf(stderr, "Not RTM_NEWNEIGH: %08x %08x %08x\n",
140 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
0849e60a
SH
141 return 0;
142 }
d04bc300
SH
143
144 len -= NLMSG_LENGTH(sizeof(*r));
145 if (len < 0) {
146 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
147 return -1;
148 }
149
150 if (r->ndm_family != AF_BRIDGE)
151 return 0;
152
153 if (filter_index && filter_index != r->ndm_ifindex)
154 return 0;
155
7f10090b
NA
156 if (filter_state && !(r->ndm_state & filter_state))
157 return 0;
158
d04bc300
SH
159 parse_rtattr(tb, NDA_MAX, NDA_RTA(r),
160 n->nlmsg_len - NLMSG_LENGTH(sizeof(*r)));
161
ae6eb907
NA
162 if (tb[NDA_VLAN])
163 vid = rta_getattr_u16(tb[NDA_VLAN]);
164
165 if (filter_vlan && filter_vlan != vid)
166 return 0;
167
c7c1a1ef
SH
168 open_json_object(NULL);
169 if (n->nlmsg_type == RTM_DELNEIGH)
170 print_bool(PRINT_ANY, "deleted", "Deleted ", true);
0849e60a
SH
171
172 if (tb[NDA_LLADDR]) {
c7c1a1ef 173 const char *lladdr;
0849e60a 174 SPRINT_BUF(b1);
c7c1a1ef
SH
175
176 lladdr = ll_addr_n2a(RTA_DATA(tb[NDA_LLADDR]),
177 RTA_PAYLOAD(tb[NDA_LLADDR]),
178 ll_index_to_type(r->ndm_ifindex),
179 b1, sizeof(b1));
180
181 print_color_string(PRINT_ANY, COLOR_MAC,
182 "mac", "%s ", lladdr);
d04bc300 183 }
38df7ac9 184
a795211f 185 if (!filter_index && r->ndm_ifindex)
c7c1a1ef 186 print_color_string(PRINT_ANY, COLOR_IFNAME,
4abb8c72 187 "ifname", "dev %s ",
c7c1a1ef 188 ll_index_to_name(r->ndm_ifindex));
0849e60a
SH
189
190 if (tb[NDA_DST]) {
9e763fa5 191 int family = AF_INET;
c7c1a1ef 192 const char *dst;
9e763fa5
MR
193
194 if (RTA_PAYLOAD(tb[NDA_DST]) == sizeof(struct in6_addr))
195 family = AF_INET6;
196
c7c1a1ef
SH
197 dst = format_host(family,
198 RTA_PAYLOAD(tb[NDA_DST]),
199 RTA_DATA(tb[NDA_DST]));
b239c56e 200
c7c1a1ef
SH
201 print_color_string(PRINT_ANY,
202 ifa_family_color(family),
4abb8c72 203 "dst", "dst %s ", dst);
b239c56e
AK
204 }
205
c7c1a1ef
SH
206 if (vid)
207 print_uint(PRINT_ANY,
208 "vlan", "vlan %hu ", vid);
38df7ac9 209
c7c1a1ef
SH
210 if (tb[NDA_PORT])
211 print_uint(PRINT_ANY,
212 "port", "port %u ",
213 rta_getattr_be16(tb[NDA_PORT]));
fd08839c 214
c7c1a1ef
SH
215 if (tb[NDA_VNI])
216 print_uint(PRINT_ANY,
217 "vni", "vni %u ",
218 rta_getattr_u32(tb[NDA_VNI]));
219
220 if (tb[NDA_SRC_VNI])
221 print_uint(PRINT_ANY,
222 "src_vni", "src_vni %u ",
86d0988b 223 rta_getattr_u32(tb[NDA_SRC_VNI]));
86d0988b 224
5f409678
DS
225 if (tb[NDA_IFINDEX]) {
226 unsigned int ifindex = rta_getattr_u32(tb[NDA_IFINDEX]);
227
c7c1a1ef
SH
228 if (tb[NDA_LINK_NETNSID])
229 print_uint(PRINT_ANY,
230 "viaIfIndex", "via ifindex %u ",
231 ifindex);
b239c56e 232 else
c7c1a1ef
SH
233 print_string(PRINT_ANY,
234 "viaIf", "via %s ",
235 ll_index_to_name(ifindex));
b239c56e 236 }
5f409678 237
c7c1a1ef
SH
238 if (tb[NDA_LINK_NETNSID])
239 print_uint(PRINT_ANY,
240 "linkNetNsId", "link-netnsid %d ",
241 rta_getattr_u32(tb[NDA_LINK_NETNSID]));
d04bc300 242
c7c1a1ef
SH
243 if (show_stats && tb[NDA_CACHEINFO])
244 fdb_print_stats(fp, RTA_DATA(tb[NDA_CACHEINFO]));
b239c56e 245
c7c1a1ef 246 fdb_print_flags(fp, r->ndm_flags);
b239c56e 247
b239c56e 248
c7c1a1ef 249 if (tb[NDA_MASTER])
4abb8c72 250 print_string(PRINT_ANY, "master", "master %s ",
c7c1a1ef 251 ll_index_to_name(rta_getattr_u32(tb[NDA_MASTER])));
4d45bf3b 252
c7c1a1ef
SH
253 print_string(PRINT_ANY, "state", "%s\n",
254 state_n2a(r->ndm_state));
255 close_json_object();
256 fflush(fp);
d04bc300
SH
257 return 0;
258}
259
05880354
DA
260static int fdb_linkdump_filter(struct nlmsghdr *nlh, int reqlen)
261{
262 int err;
263
264 if (filter_index) {
265 struct ifinfomsg *ifm = NLMSG_DATA(nlh);
266
267 ifm->ifi_index = filter_index;
268 }
269
270 if (filter_master) {
271 err = addattr32(nlh, reqlen, IFLA_MASTER, filter_master);
272 if (err)
273 return err;
274 }
275
276 return 0;
277}
278
66b4199f 279static int fdb_dump_filter(struct nlmsghdr *nlh, int reqlen)
d04bc300 280{
66b4199f
DA
281 int err;
282
283 if (filter_index) {
284 struct ndmsg *ndm = NLMSG_DATA(nlh);
aeb14eb0 285
66b4199f
DA
286 ndm->ndm_ifindex = filter_index;
287 }
288
289 if (filter_master) {
290 err = addattr32(nlh, reqlen, NDA_MASTER, filter_master);
291 if (err)
292 return err;
293 }
294
295 return 0;
296}
297
298static int fdb_show(int argc, char **argv)
299{
d04bc300 300 char *filter_dev = NULL;
aeb14eb0 301 char *br = NULL;
05880354 302 int rc;
aeb14eb0 303
d04bc300 304 while (argc > 0) {
aeb14eb0 305 if ((strcmp(*argv, "brport") == 0) || strcmp(*argv, "dev") == 0) {
d04bc300 306 NEXT_ARG();
d04bc300 307 filter_dev = *argv;
aeb14eb0
JHS
308 } else if (strcmp(*argv, "br") == 0) {
309 NEXT_ARG();
310 br = *argv;
ae6eb907
NA
311 } else if (strcmp(*argv, "vlan") == 0) {
312 NEXT_ARG();
313 if (filter_vlan)
314 duparg("vlan", *argv);
315 filter_vlan = atoi(*argv);
7f10090b
NA
316 } else if (strcmp(*argv, "state") == 0) {
317 unsigned int state;
318
319 NEXT_ARG();
320 if (state_a2n(&state, *argv))
321 invarg("invalid state", *argv);
322 filter_state |= state;
aeb14eb0
JHS
323 } else {
324 if (matches(*argv, "help") == 0)
325 usage();
d04bc300
SH
326 }
327 argc--; argv++;
328 }
329
aeb14eb0
JHS
330 if (br) {
331 int br_ifindex = ll_name_to_index(br);
df4b043f 332
aeb14eb0
JHS
333 if (br_ifindex == 0) {
334 fprintf(stderr, "Cannot find bridge device \"%s\"\n", br);
335 return -1;
336 }
66b4199f 337 filter_master = br_ifindex;
aeb14eb0
JHS
338 }
339
340 /*we'll keep around filter_dev for older kernels */
d04bc300 341 if (filter_dev) {
7a14358b 342 filter_index = ll_name_to_index(filter_dev);
fe99adbc
SP
343 if (!filter_index)
344 return nodev(filter_dev);
d04bc300
SH
345 }
346
05880354
DA
347 if (rth.flags & RTNL_HANDLE_F_STRICT_CHK)
348 rc = rtnl_neighdump_req(&rth, PF_BRIDGE, fdb_dump_filter);
349 else
264be1d8 350 rc = rtnl_fdb_linkdump_req_filter_fn(&rth, fdb_linkdump_filter);
05880354 351 if (rc < 0) {
d04bc300
SH
352 perror("Cannot send dump request");
353 exit(1);
354 }
d04bc300 355
c7c1a1ef 356 new_json_obj(json);
0849e60a 357 if (rtnl_dump_filter(&rth, print_fdb, stdout) < 0) {
d04bc300
SH
358 fprintf(stderr, "Dump terminated\n");
359 exit(1);
360 }
c7c1a1ef
SH
361 delete_json_obj();
362 fflush(stdout);
d04bc300
SH
363
364 return 0;
365}
366
367static int fdb_modify(int cmd, int flags, int argc, char **argv)
368{
369 struct {
df4b043f
SH
370 struct nlmsghdr n;
371 struct ndmsg ndm;
372 char buf[256];
d17b136f
PS
373 } req = {
374 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg)),
375 .n.nlmsg_flags = NLM_F_REQUEST | flags,
376 .n.nlmsg_type = cmd,
377 .ndm.ndm_family = PF_BRIDGE,
378 .ndm.ndm_state = NUD_NOARP,
379 };
d04bc300
SH
380 char *addr = NULL;
381 char *d = NULL;
382 char abuf[ETH_ALEN];
0849e60a
SH
383 int dst_ok = 0;
384 inet_prefix dst;
5f409678
DS
385 unsigned long port = 0;
386 unsigned long vni = ~0;
c5b176e5 387 unsigned long src_vni = ~0;
5f409678
DS
388 unsigned int via = 0;
389 char *endptr;
fd08839c 390 short vid = -1;
d04bc300 391
d04bc300
SH
392 while (argc > 0) {
393 if (strcmp(*argv, "dev") == 0) {
394 NEXT_ARG();
395 d = *argv;
0849e60a
SH
396 } else if (strcmp(*argv, "dst") == 0) {
397 NEXT_ARG();
398 if (dst_ok)
399 duparg2("dst", *argv);
400 get_addr(&dst, *argv, preferred_family);
401 dst_ok = 1;
5f409678
DS
402 } else if (strcmp(*argv, "port") == 0) {
403
404 NEXT_ARG();
405 port = strtoul(*argv, &endptr, 0);
406 if (endptr && *endptr) {
407 struct servent *pse;
408
409 pse = getservbyname(*argv, "udp");
410 if (!pse)
411 invarg("invalid port\n", *argv);
412 port = ntohs(pse->s_port);
413 } else if (port > 0xffff)
414 invarg("invalid port\n", *argv);
415 } else if (strcmp(*argv, "vni") == 0) {
416 NEXT_ARG();
417 vni = strtoul(*argv, &endptr, 0);
418 if ((endptr && *endptr) ||
419 (vni >> 24) || vni == ULONG_MAX)
420 invarg("invalid VNI\n", *argv);
c5b176e5
RP
421 } else if (strcmp(*argv, "src_vni") == 0) {
422 NEXT_ARG();
423 src_vni = strtoul(*argv, &endptr, 0);
424 if ((endptr && *endptr) ||
425 (src_vni >> 24) || src_vni == ULONG_MAX)
426 invarg("invalid src VNI\n", *argv);
5f409678
DS
427 } else if (strcmp(*argv, "via") == 0) {
428 NEXT_ARG();
7a14358b 429 via = ll_name_to_index(*argv);
fe99adbc
SP
430 if (!via)
431 exit(nodev(*argv));
dc6a6a25
JF
432 } else if (strcmp(*argv, "self") == 0) {
433 req.ndm.ndm_flags |= NTF_SELF;
0849e60a 434 } else if (matches(*argv, "master") == 0) {
dc6a6a25 435 req.ndm.ndm_flags |= NTF_MASTER;
5b8a1d4a
DS
436 } else if (matches(*argv, "router") == 0) {
437 req.ndm.ndm_flags |= NTF_ROUTER;
e9e9365b 438 } else if (matches(*argv, "local") == 0 ||
0849e60a
SH
439 matches(*argv, "permanent") == 0) {
440 req.ndm.ndm_state |= NUD_PERMANENT;
a1987cd1
RP
441 } else if (matches(*argv, "temp") == 0 ||
442 matches(*argv, "static") == 0) {
0849e60a 443 req.ndm.ndm_state |= NUD_REACHABLE;
c6d0cfb5
RP
444 } else if (matches(*argv, "dynamic") == 0) {
445 req.ndm.ndm_state |= NUD_REACHABLE;
446 req.ndm.ndm_state &= ~NUD_NOARP;
fd08839c
VY
447 } else if (matches(*argv, "vlan") == 0) {
448 if (vid >= 0)
449 duparg2("vlan", *argv);
450 NEXT_ARG();
451 vid = atoi(*argv);
cd8df30b
RP
452 } else if (matches(*argv, "use") == 0) {
453 req.ndm.ndm_flags |= NTF_USE;
b4f84bf8
RP
454 } else if (matches(*argv, "extern_learn") == 0) {
455 req.ndm.ndm_flags |= NTF_EXT_LEARNED;
c3ded6e4
NA
456 } else if (matches(*argv, "sticky") == 0) {
457 req.ndm.ndm_flags |= NTF_STICKY;
d04bc300 458 } else {
bcddcddd 459 if (strcmp(*argv, "to") == 0)
d04bc300 460 NEXT_ARG();
bcddcddd 461
0849e60a
SH
462 if (matches(*argv, "help") == 0)
463 usage();
d04bc300
SH
464 if (addr)
465 duparg2("to", *argv);
466 addr = *argv;
467 }
468 argc--; argv++;
469 }
470
471 if (d == NULL || addr == NULL) {
472 fprintf(stderr, "Device and address are required arguments.\n");
42ecedd4 473 return -1;
d04bc300
SH
474 }
475
0849e60a
SH
476 /* Assume self */
477 if (!(req.ndm.ndm_flags&(NTF_SELF|NTF_MASTER)))
478 req.ndm.ndm_flags |= NTF_SELF;
479
480 /* Assume permanent */
481 if (!(req.ndm.ndm_state&(NUD_PERMANENT|NUD_REACHABLE)))
482 req.ndm.ndm_state |= NUD_PERMANENT;
483
484 if (sscanf(addr, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx",
d04bc300
SH
485 abuf, abuf+1, abuf+2,
486 abuf+3, abuf+4, abuf+5) != 6) {
487 fprintf(stderr, "Invalid mac address %s\n", addr);
42ecedd4 488 return -1;
d04bc300
SH
489 }
490
491 addattr_l(&req.n, sizeof(req), NDA_LLADDR, abuf, ETH_ALEN);
0849e60a
SH
492 if (dst_ok)
493 addattr_l(&req.n, sizeof(req), NDA_DST, &dst.data, dst.bytelen);
d04bc300 494
fd08839c 495 if (vid >= 0)
8ae66094 496 addattr16(&req.n, sizeof(req), NDA_VLAN, vid);
fd08839c 497
5f409678
DS
498 if (port) {
499 unsigned short dport;
500
501 dport = htons((unsigned short)port);
502 addattr16(&req.n, sizeof(req), NDA_PORT, dport);
503 }
504 if (vni != ~0)
505 addattr32(&req.n, sizeof(req), NDA_VNI, vni);
c5b176e5
RP
506 if (src_vni != ~0)
507 addattr32(&req.n, sizeof(req), NDA_SRC_VNI, src_vni);
5f409678
DS
508 if (via)
509 addattr32(&req.n, sizeof(req), NDA_IFINDEX, via);
510
d04bc300 511 req.ndm.ndm_ifindex = ll_name_to_index(d);
fe99adbc
SP
512 if (!req.ndm.ndm_ifindex)
513 return nodev(d);
d04bc300 514
86bf43c7 515 if (rtnl_talk(&rth, &req.n, NULL) < 0)
42ecedd4 516 return -1;
d04bc300
SH
517
518 return 0;
519}
520
521int do_fdb(int argc, char **argv)
522{
523 ll_init_map(&rth);
524
525 if (argc > 0) {
526 if (matches(*argv, "add") == 0)
527 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
5f409678
DS
528 if (matches(*argv, "append") == 0)
529 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_APPEND, argc-1, argv+1);
5464049b
TR
530 if (matches(*argv, "replace") == 0)
531 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
d04bc300
SH
532 if (matches(*argv, "delete") == 0)
533 return fdb_modify(RTM_DELNEIGH, 0, argc-1, argv+1);
534 if (matches(*argv, "show") == 0 ||
535 matches(*argv, "lst") == 0 ||
536 matches(*argv, "list") == 0)
537 return fdb_show(argc-1, argv+1);
538 if (matches(*argv, "help") == 0)
539 usage();
540 } else
541 return fdb_show(0, NULL);
542
083b46bb 543 fprintf(stderr, "Command \"%s\" is unknown, try \"bridge fdb help\".\n", *argv);
d04bc300
SH
544 exit(-1);
545}