]> git.proxmox.com Git - mirror_iproute2.git/blame - bridge/fdb.c
tc: add support for TRAP action
[mirror_iproute2.git] / bridge / fdb.c
CommitLineData
d04bc300
SH
1/*
2 * Get/set/delete fdb table with netlink
3 *
0849e60a
SH
4 * TODO: merge/replace this with ip neighbour
5 *
d04bc300
SH
6 * Authors: Stephen Hemminger <shemminger@vyatta.com>
7 */
8
9#include <stdio.h>
10#include <stdlib.h>
11#include <unistd.h>
5f409678 12#include <netdb.h>
d04bc300
SH
13#include <time.h>
14#include <fcntl.h>
15#include <sys/socket.h>
16#include <sys/time.h>
17#include <net/if.h>
18#include <netinet/in.h>
19#include <linux/if_bridge.h>
20#include <linux/if_ether.h>
21#include <linux/neighbour.h>
22#include <string.h>
dd9cc0ee 23#include <limits.h>
b239c56e
AK
24#include <json_writer.h>
25#include <stdbool.h>
d04bc300
SH
26
27#include "libnetlink.h"
28#include "br_common.h"
0849e60a 29#include "rt_names.h"
d04bc300
SH
30#include "utils.h"
31
7f10090b 32static unsigned int filter_index, filter_vlan, filter_state;
d04bc300 33
b239c56e
AK
34json_writer_t *jw_global;
35
d04bc300
SH
36static void usage(void)
37{
bd5bbad4 38 fprintf(stderr, "Usage: bridge fdb { add | append | del | replace } ADDR dev DEV\n"
cd8df30b 39 " [ self ] [ master ] [ use ] [ router ]\n"
c6d0cfb5 40 " [ local | static | dynamic ] [ dst IPADDR ] [ vlan VID ]\n"
df4b043f 41 " [ port PORT] [ vni VNI ] [ via DEV ]\n");
7f10090b 42 fprintf(stderr, " bridge fdb [ show [ br BRDEV ] [ brport DEV ] [ vlan VID ] [ state STATE ] ]\n");
d04bc300
SH
43 exit(-1);
44}
45
df4b043f 46static const char *state_n2a(unsigned int s)
d04bc300
SH
47{
48 static char buf[32];
49
0849e60a
SH
50 if (s & NUD_PERMANENT)
51 return "permanent";
d04bc300
SH
52
53 if (s & NUD_NOARP)
54 return "static";
55
56 if (s & NUD_STALE)
57 return "stale";
0849e60a 58
d04bc300
SH
59 if (s & NUD_REACHABLE)
60 return "";
61
62 sprintf(buf, "state=%#x", s);
63 return buf;
64}
65
7f10090b
NA
66static int state_a2n(unsigned int *s, const char *arg)
67{
68 if (matches(arg, "permanent") == 0)
69 *s = NUD_PERMANENT;
70 else if (matches(arg, "static") == 0 || matches(arg, "temp") == 0)
71 *s = NUD_NOARP;
72 else if (matches(arg, "stale") == 0)
73 *s = NUD_STALE;
74 else if (matches(arg, "reachable") == 0 || matches(arg, "dynamic") == 0)
75 *s = NUD_REACHABLE;
76 else if (strcmp(arg, "all") == 0)
77 *s = ~0;
78 else if (get_unsigned(s, arg, 0))
79 return -1;
80
81 return 0;
82}
83
b239c56e
AK
84static void start_json_fdb_flags_array(bool *fdb_flags)
85{
86 if (*fdb_flags)
87 return;
88 jsonw_name(jw_global, "flags");
89 jsonw_start_array(jw_global);
90 *fdb_flags = true;
91}
92
d04bc300
SH
93int print_fdb(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg)
94{
0849e60a 95 FILE *fp = arg;
d04bc300
SH
96 struct ndmsg *r = NLMSG_DATA(n);
97 int len = n->nlmsg_len;
df4b043f 98 struct rtattr *tb[NDA_MAX+1];
ae6eb907 99 __u16 vid = 0;
b239c56e
AK
100 bool fdb_flags = false;
101 const char *state_s;
0849e60a
SH
102
103 if (n->nlmsg_type != RTM_NEWNEIGH && n->nlmsg_type != RTM_DELNEIGH) {
104 fprintf(stderr, "Not RTM_NEWNEIGH: %08x %08x %08x\n",
105 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
0849e60a
SH
106 return 0;
107 }
d04bc300
SH
108
109 len -= NLMSG_LENGTH(sizeof(*r));
110 if (len < 0) {
111 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
112 return -1;
113 }
114
115 if (r->ndm_family != AF_BRIDGE)
116 return 0;
117
118 if (filter_index && filter_index != r->ndm_ifindex)
119 return 0;
120
7f10090b
NA
121 if (filter_state && !(r->ndm_state & filter_state))
122 return 0;
123
d04bc300
SH
124 parse_rtattr(tb, NDA_MAX, NDA_RTA(r),
125 n->nlmsg_len - NLMSG_LENGTH(sizeof(*r)));
126
ae6eb907
NA
127 if (tb[NDA_VLAN])
128 vid = rta_getattr_u16(tb[NDA_VLAN]);
129
130 if (filter_vlan && filter_vlan != vid)
131 return 0;
132
afd3921e 133 if (jw_global) {
134 jsonw_pretty(jw_global, 1);
135 jsonw_start_object(jw_global);
136 }
137
b239c56e
AK
138 if (n->nlmsg_type == RTM_DELNEIGH) {
139 if (jw_global)
140 jsonw_string_field(jw_global, "opCode", "deleted");
141 else
142 fprintf(fp, "Deleted ");
143 }
0849e60a
SH
144
145 if (tb[NDA_LLADDR]) {
146 SPRINT_BUF(b1);
b239c56e
AK
147 ll_addr_n2a(RTA_DATA(tb[NDA_LLADDR]),
148 RTA_PAYLOAD(tb[NDA_LLADDR]),
149 ll_index_to_type(r->ndm_ifindex),
150 b1, sizeof(b1));
151 if (jw_global)
152 jsonw_string_field(jw_global, "mac", b1);
153 else
154 fprintf(fp, "%s ", b1);
d04bc300 155 }
38df7ac9 156
b239c56e
AK
157 if (!filter_index && r->ndm_ifindex) {
158 if (jw_global)
159 jsonw_string_field(jw_global, "dev",
160 ll_index_to_name(r->ndm_ifindex));
161 else
162 fprintf(fp, "dev %s ",
163 ll_index_to_name(r->ndm_ifindex));
164 }
0849e60a
SH
165
166 if (tb[NDA_DST]) {
9e763fa5 167 int family = AF_INET;
b239c56e 168 const char *abuf_s;
9e763fa5
MR
169
170 if (RTA_PAYLOAD(tb[NDA_DST]) == sizeof(struct in6_addr))
171 family = AF_INET6;
172
b239c56e
AK
173 abuf_s = format_host(family,
174 RTA_PAYLOAD(tb[NDA_DST]),
175 RTA_DATA(tb[NDA_DST]));
176 if (jw_global)
177 jsonw_string_field(jw_global, "dst", abuf_s);
178 else
179 fprintf(fp, "dst %s ", abuf_s);
180 }
181
182 if (vid) {
183 if (jw_global)
184 jsonw_uint_field(jw_global, "vlan", vid);
185 else
186 fprintf(fp, "vlan %hu ", vid);
187 }
188
189 if (tb[NDA_PORT]) {
190 if (jw_global)
191 jsonw_uint_field(jw_global, "port",
aab0f610 192 rta_getattr_be16(tb[NDA_PORT]));
b239c56e
AK
193 else
194 fprintf(fp, "port %d ",
aab0f610 195 rta_getattr_be16(tb[NDA_PORT]));
0849e60a 196 }
38df7ac9 197
b239c56e
AK
198 if (tb[NDA_VNI]) {
199 if (jw_global)
200 jsonw_uint_field(jw_global, "vni",
201 rta_getattr_u32(tb[NDA_VNI]));
202 else
203 fprintf(fp, "vni %d ",
204 rta_getattr_u32(tb[NDA_VNI]));
205 }
fd08839c 206
5f409678
DS
207 if (tb[NDA_IFINDEX]) {
208 unsigned int ifindex = rta_getattr_u32(tb[NDA_IFINDEX]);
209
210 if (ifindex) {
211 char ifname[IF_NAMESIZE];
212
a4797670 213 if (!tb[NDA_LINK_NETNSID] &&
b239c56e
AK
214 if_indextoname(ifindex, ifname)) {
215 if (jw_global)
216 jsonw_string_field(jw_global, "viaIf",
217 ifname);
218 else
219 fprintf(fp, "via %s ", ifname);
220 } else {
221 if (jw_global)
222 jsonw_uint_field(jw_global, "viaIfIndex",
223 ifindex);
224 else
225 fprintf(fp, "via ifindex %u ", ifindex);
226 }
5f409678
DS
227 }
228 }
b239c56e
AK
229
230 if (tb[NDA_LINK_NETNSID]) {
231 if (jw_global)
232 jsonw_uint_field(jw_global, "linkNetNsId",
233 rta_getattr_u32(tb[NDA_LINK_NETNSID]));
234 else
235 fprintf(fp, "link-netnsid %d ",
236 rta_getattr_u32(tb[NDA_LINK_NETNSID]));
237 }
5f409678 238
d04bc300
SH
239 if (show_stats && tb[NDA_CACHEINFO]) {
240 struct nda_cacheinfo *ci = RTA_DATA(tb[NDA_CACHEINFO]);
0849e60a 241 int hz = get_user_hz();
d04bc300 242
b239c56e
AK
243 if (jw_global) {
244 jsonw_uint_field(jw_global, "used",
245 ci->ndm_used/hz);
246 jsonw_uint_field(jw_global, "updated",
247 ci->ndm_updated/hz);
248 } else {
249 fprintf(fp, "used %d/%d ", ci->ndm_used/hz,
250 ci->ndm_updated/hz);
251 }
252 }
253
254 if (jw_global) {
255 if (r->ndm_flags & NTF_SELF) {
256 start_json_fdb_flags_array(&fdb_flags);
257 jsonw_string(jw_global, "self");
258 }
259 if (r->ndm_flags & NTF_ROUTER) {
260 start_json_fdb_flags_array(&fdb_flags);
261 jsonw_string(jw_global, "router");
262 }
263 if (r->ndm_flags & NTF_EXT_LEARNED) {
264 start_json_fdb_flags_array(&fdb_flags);
265 jsonw_string(jw_global, "offload");
266 }
267 if (r->ndm_flags & NTF_MASTER)
268 jsonw_string(jw_global, "master");
269 if (fdb_flags)
270 jsonw_end_array(jw_global);
271
272 if (tb[NDA_MASTER])
273 jsonw_string_field(jw_global,
274 "master",
275 ll_index_to_name(rta_getattr_u32(tb[NDA_MASTER])));
276
277 } else {
278 if (r->ndm_flags & NTF_SELF)
279 fprintf(fp, "self ");
280 if (r->ndm_flags & NTF_ROUTER)
281 fprintf(fp, "router ");
282 if (r->ndm_flags & NTF_EXT_LEARNED)
283 fprintf(fp, "offload ");
284 if (tb[NDA_MASTER]) {
285 fprintf(fp, "master %s ",
286 ll_index_to_name(rta_getattr_u32(tb[NDA_MASTER])));
287 } else if (r->ndm_flags & NTF_MASTER) {
288 fprintf(fp, "master ");
289 }
290 }
291
292 state_s = state_n2a(r->ndm_state);
293 if (jw_global) {
294 if (state_s[0])
295 jsonw_string_field(jw_global, "state", state_s);
296
297 jsonw_end_object(jw_global);
298 } else {
299 fprintf(fp, "%s\n", state_s);
300
301 fflush(fp);
d04bc300 302 }
4d45bf3b 303
d04bc300
SH
304 return 0;
305}
306
307static int fdb_show(int argc, char **argv)
308{
aeb14eb0 309 struct {
df4b043f 310 struct nlmsghdr n;
aeb14eb0 311 struct ifinfomsg ifm;
df4b043f 312 char buf[256];
d17b136f
PS
313 } req = {
314 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
315 .ifm.ifi_family = PF_BRIDGE,
316 };
aeb14eb0 317
d04bc300 318 char *filter_dev = NULL;
aeb14eb0
JHS
319 char *br = NULL;
320 int msg_size = sizeof(struct ifinfomsg);
321
d04bc300 322 while (argc > 0) {
aeb14eb0 323 if ((strcmp(*argv, "brport") == 0) || strcmp(*argv, "dev") == 0) {
d04bc300 324 NEXT_ARG();
d04bc300 325 filter_dev = *argv;
aeb14eb0
JHS
326 } else if (strcmp(*argv, "br") == 0) {
327 NEXT_ARG();
328 br = *argv;
ae6eb907
NA
329 } else if (strcmp(*argv, "vlan") == 0) {
330 NEXT_ARG();
331 if (filter_vlan)
332 duparg("vlan", *argv);
333 filter_vlan = atoi(*argv);
7f10090b
NA
334 } else if (strcmp(*argv, "state") == 0) {
335 unsigned int state;
336
337 NEXT_ARG();
338 if (state_a2n(&state, *argv))
339 invarg("invalid state", *argv);
340 filter_state |= state;
aeb14eb0
JHS
341 } else {
342 if (matches(*argv, "help") == 0)
343 usage();
d04bc300
SH
344 }
345 argc--; argv++;
346 }
347
aeb14eb0
JHS
348 if (br) {
349 int br_ifindex = ll_name_to_index(br);
df4b043f 350
aeb14eb0
JHS
351 if (br_ifindex == 0) {
352 fprintf(stderr, "Cannot find bridge device \"%s\"\n", br);
353 return -1;
354 }
355 addattr32(&req.n, sizeof(req), IFLA_MASTER, br_ifindex);
356 msg_size += RTA_LENGTH(4);
357 }
358
359 /*we'll keep around filter_dev for older kernels */
d04bc300 360 if (filter_dev) {
0849e60a
SH
361 filter_index = if_nametoindex(filter_dev);
362 if (filter_index == 0) {
363 fprintf(stderr, "Cannot find device \"%s\"\n",
364 filter_dev);
d04bc300
SH
365 return -1;
366 }
aeb14eb0 367 req.ifm.ifi_index = filter_index;
d04bc300
SH
368 }
369
aeb14eb0 370 if (rtnl_dump_request(&rth, RTM_GETNEIGH, &req.ifm, msg_size) < 0) {
d04bc300
SH
371 perror("Cannot send dump request");
372 exit(1);
373 }
d04bc300 374
b239c56e
AK
375 if (json_output) {
376 jw_global = jsonw_new(stdout);
377 if (!jw_global) {
378 fprintf(stderr, "Error allocation json object\n");
379 exit(1);
380 }
381 jsonw_start_array(jw_global);
382 }
0849e60a 383 if (rtnl_dump_filter(&rth, print_fdb, stdout) < 0) {
d04bc300
SH
384 fprintf(stderr, "Dump terminated\n");
385 exit(1);
386 }
b239c56e
AK
387 if (jw_global) {
388 jsonw_end_array(jw_global);
389 jsonw_destroy(&jw_global);
390 }
d04bc300
SH
391
392 return 0;
393}
394
395static int fdb_modify(int cmd, int flags, int argc, char **argv)
396{
397 struct {
df4b043f
SH
398 struct nlmsghdr n;
399 struct ndmsg ndm;
400 char buf[256];
d17b136f
PS
401 } req = {
402 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg)),
403 .n.nlmsg_flags = NLM_F_REQUEST | flags,
404 .n.nlmsg_type = cmd,
405 .ndm.ndm_family = PF_BRIDGE,
406 .ndm.ndm_state = NUD_NOARP,
407 };
d04bc300
SH
408 char *addr = NULL;
409 char *d = NULL;
410 char abuf[ETH_ALEN];
0849e60a
SH
411 int dst_ok = 0;
412 inet_prefix dst;
5f409678
DS
413 unsigned long port = 0;
414 unsigned long vni = ~0;
415 unsigned int via = 0;
416 char *endptr;
fd08839c 417 short vid = -1;
d04bc300 418
d04bc300
SH
419 while (argc > 0) {
420 if (strcmp(*argv, "dev") == 0) {
421 NEXT_ARG();
422 d = *argv;
0849e60a
SH
423 } else if (strcmp(*argv, "dst") == 0) {
424 NEXT_ARG();
425 if (dst_ok)
426 duparg2("dst", *argv);
427 get_addr(&dst, *argv, preferred_family);
428 dst_ok = 1;
5f409678
DS
429 } else if (strcmp(*argv, "port") == 0) {
430
431 NEXT_ARG();
432 port = strtoul(*argv, &endptr, 0);
433 if (endptr && *endptr) {
434 struct servent *pse;
435
436 pse = getservbyname(*argv, "udp");
437 if (!pse)
438 invarg("invalid port\n", *argv);
439 port = ntohs(pse->s_port);
440 } else if (port > 0xffff)
441 invarg("invalid port\n", *argv);
442 } else if (strcmp(*argv, "vni") == 0) {
443 NEXT_ARG();
444 vni = strtoul(*argv, &endptr, 0);
445 if ((endptr && *endptr) ||
446 (vni >> 24) || vni == ULONG_MAX)
447 invarg("invalid VNI\n", *argv);
448 } else if (strcmp(*argv, "via") == 0) {
449 NEXT_ARG();
450 via = if_nametoindex(*argv);
451 if (via == 0)
452 invarg("invalid device\n", *argv);
dc6a6a25
JF
453 } else if (strcmp(*argv, "self") == 0) {
454 req.ndm.ndm_flags |= NTF_SELF;
0849e60a 455 } else if (matches(*argv, "master") == 0) {
dc6a6a25 456 req.ndm.ndm_flags |= NTF_MASTER;
5b8a1d4a
DS
457 } else if (matches(*argv, "router") == 0) {
458 req.ndm.ndm_flags |= NTF_ROUTER;
e9e9365b 459 } else if (matches(*argv, "local") == 0 ||
0849e60a
SH
460 matches(*argv, "permanent") == 0) {
461 req.ndm.ndm_state |= NUD_PERMANENT;
a1987cd1
RP
462 } else if (matches(*argv, "temp") == 0 ||
463 matches(*argv, "static") == 0) {
0849e60a 464 req.ndm.ndm_state |= NUD_REACHABLE;
c6d0cfb5
RP
465 } else if (matches(*argv, "dynamic") == 0) {
466 req.ndm.ndm_state |= NUD_REACHABLE;
467 req.ndm.ndm_state &= ~NUD_NOARP;
fd08839c
VY
468 } else if (matches(*argv, "vlan") == 0) {
469 if (vid >= 0)
470 duparg2("vlan", *argv);
471 NEXT_ARG();
472 vid = atoi(*argv);
cd8df30b
RP
473 } else if (matches(*argv, "use") == 0) {
474 req.ndm.ndm_flags |= NTF_USE;
d04bc300
SH
475 } else {
476 if (strcmp(*argv, "to") == 0) {
477 NEXT_ARG();
478 }
0849e60a
SH
479 if (matches(*argv, "help") == 0)
480 usage();
d04bc300
SH
481 if (addr)
482 duparg2("to", *argv);
483 addr = *argv;
484 }
485 argc--; argv++;
486 }
487
488 if (d == NULL || addr == NULL) {
489 fprintf(stderr, "Device and address are required arguments.\n");
42ecedd4 490 return -1;
d04bc300
SH
491 }
492
0849e60a
SH
493 /* Assume self */
494 if (!(req.ndm.ndm_flags&(NTF_SELF|NTF_MASTER)))
495 req.ndm.ndm_flags |= NTF_SELF;
496
497 /* Assume permanent */
498 if (!(req.ndm.ndm_state&(NUD_PERMANENT|NUD_REACHABLE)))
499 req.ndm.ndm_state |= NUD_PERMANENT;
500
501 if (sscanf(addr, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx",
d04bc300
SH
502 abuf, abuf+1, abuf+2,
503 abuf+3, abuf+4, abuf+5) != 6) {
504 fprintf(stderr, "Invalid mac address %s\n", addr);
42ecedd4 505 return -1;
d04bc300
SH
506 }
507
508 addattr_l(&req.n, sizeof(req), NDA_LLADDR, abuf, ETH_ALEN);
0849e60a
SH
509 if (dst_ok)
510 addattr_l(&req.n, sizeof(req), NDA_DST, &dst.data, dst.bytelen);
d04bc300 511
fd08839c 512 if (vid >= 0)
8ae66094 513 addattr16(&req.n, sizeof(req), NDA_VLAN, vid);
fd08839c 514
5f409678
DS
515 if (port) {
516 unsigned short dport;
517
518 dport = htons((unsigned short)port);
519 addattr16(&req.n, sizeof(req), NDA_PORT, dport);
520 }
521 if (vni != ~0)
522 addattr32(&req.n, sizeof(req), NDA_VNI, vni);
523 if (via)
524 addattr32(&req.n, sizeof(req), NDA_IFINDEX, via);
525
d04bc300
SH
526 req.ndm.ndm_ifindex = ll_name_to_index(d);
527 if (req.ndm.ndm_ifindex == 0) {
528 fprintf(stderr, "Cannot find device \"%s\"\n", d);
529 return -1;
530 }
531
c079e121 532 if (rtnl_talk(&rth, &req.n, NULL, 0) < 0)
42ecedd4 533 return -1;
d04bc300
SH
534
535 return 0;
536}
537
538int do_fdb(int argc, char **argv)
539{
540 ll_init_map(&rth);
541
542 if (argc > 0) {
543 if (matches(*argv, "add") == 0)
544 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1);
5f409678
DS
545 if (matches(*argv, "append") == 0)
546 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_APPEND, argc-1, argv+1);
5464049b
TR
547 if (matches(*argv, "replace") == 0)
548 return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1);
d04bc300
SH
549 if (matches(*argv, "delete") == 0)
550 return fdb_modify(RTM_DELNEIGH, 0, argc-1, argv+1);
551 if (matches(*argv, "show") == 0 ||
552 matches(*argv, "lst") == 0 ||
553 matches(*argv, "list") == 0)
554 return fdb_show(argc-1, argv+1);
555 if (matches(*argv, "help") == 0)
556 usage();
557 } else
558 return fdb_show(0, NULL);
559
083b46bb 560 fprintf(stderr, "Command \"%s\" is unknown, try \"bridge fdb help\".\n", *argv);
d04bc300
SH
561 exit(-1);
562}