]>
Commit | Line | Data |
---|---|---|
cc26a890 JP |
1 | /* |
2 | * iplink_bond.c Bonding device support | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or | |
5 | * modify it under the terms of the GNU General Public License | |
6 | * as published by the Free Software Foundation; either version | |
7 | * 2 of the License, or (at your option) any later version. | |
8 | * | |
9 | * Authors: Jiri Pirko <jiri@resnulli.us> | |
63d127b0 | 10 | * Scott Feldman <sfeldma@cumulusnetworks.com> |
cc26a890 JP |
11 | */ |
12 | ||
13 | #include <stdio.h> | |
14 | #include <stdlib.h> | |
15 | #include <string.h> | |
16 | #include <linux/if_link.h> | |
63d127b0 | 17 | #include <linux/if_ether.h> |
cc26a890 JP |
18 | #include <net/if.h> |
19 | ||
20 | #include "rt_names.h" | |
21 | #include "utils.h" | |
22 | #include "ip_common.h" | |
23 | ||
63d127b0 | 24 | #define BOND_MAX_ARP_TARGETS 16 |
25 | ||
26 | static const char *mode_tbl[] = { | |
27 | "balance-rr", | |
28 | "active-backup", | |
29 | "balance-xor", | |
30 | "broadcast", | |
31 | "802.3ad", | |
32 | "balance-tlb", | |
33 | "balance-alb", | |
34 | NULL, | |
35 | }; | |
36 | ||
37 | static const char *arp_validate_tbl[] = { | |
38 | "none", | |
39 | "active", | |
40 | "backup", | |
41 | "all", | |
42 | NULL, | |
43 | }; | |
44 | ||
45 | static const char *arp_all_targets_tbl[] = { | |
46 | "any", | |
47 | "all", | |
48 | NULL, | |
49 | }; | |
50 | ||
51 | static const char *primary_reselect_tbl[] = { | |
52 | "always", | |
53 | "better", | |
54 | "failure", | |
55 | NULL, | |
56 | }; | |
57 | ||
58 | static const char *fail_over_mac_tbl[] = { | |
59 | "none", | |
60 | "active", | |
61 | "follow", | |
62 | NULL, | |
63 | }; | |
64 | ||
65 | static const char *xmit_hash_policy_tbl[] = { | |
66 | "layer2", | |
67 | "layer3+4", | |
68 | "layer2+3", | |
69 | "encap2+3", | |
70 | "encap3+4", | |
71 | NULL, | |
72 | }; | |
73 | ||
74 | static const char *lacp_rate_tbl[] = { | |
75 | "slow", | |
76 | "fast", | |
77 | NULL, | |
78 | }; | |
79 | ||
80 | static const char *ad_select_tbl[] = { | |
81 | "stable", | |
82 | "bandwidth", | |
83 | "count", | |
84 | NULL, | |
85 | }; | |
86 | ||
87 | static const char *get_name(const char **tbl, int index) | |
88 | { | |
89 | int i; | |
90 | ||
91 | for (i = 0; tbl[i]; i++) | |
92 | if (i == index) | |
93 | return tbl[i]; | |
94 | ||
95 | return "UNKNOWN"; | |
96 | } | |
97 | ||
98 | static int get_index(const char **tbl, char *name) | |
99 | { | |
100 | int i, index; | |
101 | ||
102 | /* check for integer index passed in instead of name */ | |
103 | if (get_integer(&index, name, 10) == 0) | |
104 | for (i = 0; tbl[i]; i++) | |
105 | if (i == index) | |
106 | return i; | |
107 | ||
108 | for (i = 0; tbl[i]; i++) | |
f7a45e09 | 109 | if (strcmp(tbl[i], name) == 0) |
63d127b0 | 110 | return i; |
111 | ||
112 | return -1; | |
113 | } | |
114 | ||
561e650e | 115 | static void print_explain(FILE *f) |
cc26a890 | 116 | { |
561e650e | 117 | fprintf(f, |
cc26a890 | 118 | "Usage: ... bond [ mode BONDMODE ] [ active_slave SLAVE_DEV ]\n" |
63d127b0 | 119 | " [ clear_active_slave ] [ miimon MIIMON ]\n" |
120 | " [ updelay UPDELAY ] [ downdelay DOWNDELAY ]\n" | |
121 | " [ use_carrier USE_CARRIER ]\n" | |
122 | " [ arp_interval ARP_INTERVAL ]\n" | |
123 | " [ arp_validate ARP_VALIDATE ]\n" | |
124 | " [ arp_all_targets ARP_ALL_TARGETS ]\n" | |
125 | " [ arp_ip_target [ ARP_IP_TARGET, ... ] ]\n" | |
126 | " [ primary SLAVE_DEV ]\n" | |
127 | " [ primary_reselect PRIMARY_RESELECT ]\n" | |
128 | " [ fail_over_mac FAIL_OVER_MAC ]\n" | |
129 | " [ xmit_hash_policy XMIT_HASH_POLICY ]\n" | |
130 | " [ resend_igmp RESEND_IGMP ]\n" | |
131 | " [ num_grat_arp|num_unsol_na NUM_GRAT_ARP|NUM_UNSOL_NA ]\n" | |
132 | " [ all_slaves_active ALL_SLAVES_ACTIVE ]\n" | |
133 | " [ min_links MIN_LINKS ]\n" | |
134 | " [ lp_interval LP_INTERVAL ]\n" | |
135 | " [ packets_per_slave PACKETS_PER_SLAVE ]\n" | |
d02e4662 | 136 | " [ tlb_dynamic_lb TLB_DYNAMIC_LB ]\n" |
63d127b0 | 137 | " [ lacp_rate LACP_RATE ]\n" |
138 | " [ ad_select AD_SELECT ]\n" | |
6fc1f8ad JT |
139 | " [ ad_user_port_key PORTKEY ]\n" |
140 | " [ ad_actor_sys_prio SYSPRIO ]\n" | |
141 | " [ ad_actor_system LLADDR ]\n" | |
cc26a890 | 142 | "\n" |
63d127b0 | 143 | "BONDMODE := balance-rr|active-backup|balance-xor|broadcast|802.3ad|balance-tlb|balance-alb\n" |
144 | "ARP_VALIDATE := none|active|backup|all\n" | |
145 | "ARP_ALL_TARGETS := any|all\n" | |
146 | "PRIMARY_RESELECT := always|better|failure\n" | |
147 | "FAIL_OVER_MAC := none|active|follow\n" | |
a1978834 | 148 | "XMIT_HASH_POLICY := layer2|layer2+3|layer3+4|encap2+3|encap3+4\n" |
63d127b0 | 149 | "LACP_RATE := slow|fast\n" |
150 | "AD_SELECT := stable|bandwidth|count\n" | |
cc26a890 JP |
151 | ); |
152 | } | |
153 | ||
561e650e | 154 | static void explain(void) |
155 | { | |
156 | print_explain(stderr); | |
157 | } | |
158 | ||
cc26a890 JP |
159 | static int bond_parse_opt(struct link_util *lu, int argc, char **argv, |
160 | struct nlmsghdr *n) | |
161 | { | |
63d127b0 | 162 | __u8 mode, use_carrier, primary_reselect, fail_over_mac; |
163 | __u8 xmit_hash_policy, num_peer_notif, all_slaves_active; | |
d02e4662 | 164 | __u8 lacp_rate, ad_select, tlb_dynamic_lb; |
6fc1f8ad | 165 | __u16 ad_user_port_key, ad_actor_sys_prio; |
63d127b0 | 166 | __u32 miimon, updelay, downdelay, arp_interval, arp_validate; |
167 | __u32 arp_all_targets, resend_igmp, min_links, lp_interval; | |
168 | __u32 packets_per_slave; | |
56f5daac | 169 | unsigned int ifindex; |
cc26a890 JP |
170 | |
171 | while (argc > 0) { | |
172 | if (matches(*argv, "mode") == 0) { | |
173 | NEXT_ARG(); | |
e0f229fb | 174 | if (get_index(mode_tbl, *argv) < 0) |
63d127b0 | 175 | invarg("invalid mode", *argv); |
63d127b0 | 176 | mode = get_index(mode_tbl, *argv); |
cc26a890 JP |
177 | addattr8(n, 1024, IFLA_BOND_MODE, mode); |
178 | } else if (matches(*argv, "active_slave") == 0) { | |
179 | NEXT_ARG(); | |
180 | ifindex = if_nametoindex(*argv); | |
181 | if (!ifindex) | |
182 | return -1; | |
183 | addattr32(n, 1024, IFLA_BOND_ACTIVE_SLAVE, ifindex); | |
184 | } else if (matches(*argv, "clear_active_slave") == 0) { | |
185 | addattr32(n, 1024, IFLA_BOND_ACTIVE_SLAVE, 0); | |
63d127b0 | 186 | } else if (matches(*argv, "miimon") == 0) { |
187 | NEXT_ARG(); | |
e0f229fb | 188 | if (get_u32(&miimon, *argv, 0)) |
63d127b0 | 189 | invarg("invalid miimon", *argv); |
63d127b0 | 190 | addattr32(n, 1024, IFLA_BOND_MIIMON, miimon); |
191 | } else if (matches(*argv, "updelay") == 0) { | |
192 | NEXT_ARG(); | |
e0f229fb | 193 | if (get_u32(&updelay, *argv, 0)) |
63d127b0 | 194 | invarg("invalid updelay", *argv); |
63d127b0 | 195 | addattr32(n, 1024, IFLA_BOND_UPDELAY, updelay); |
196 | } else if (matches(*argv, "downdelay") == 0) { | |
197 | NEXT_ARG(); | |
e0f229fb | 198 | if (get_u32(&downdelay, *argv, 0)) |
63d127b0 | 199 | invarg("invalid downdelay", *argv); |
63d127b0 | 200 | addattr32(n, 1024, IFLA_BOND_DOWNDELAY, downdelay); |
201 | } else if (matches(*argv, "use_carrier") == 0) { | |
202 | NEXT_ARG(); | |
e0f229fb | 203 | if (get_u8(&use_carrier, *argv, 0)) |
63d127b0 | 204 | invarg("invalid use_carrier", *argv); |
63d127b0 | 205 | addattr8(n, 1024, IFLA_BOND_USE_CARRIER, use_carrier); |
206 | } else if (matches(*argv, "arp_interval") == 0) { | |
207 | NEXT_ARG(); | |
e0f229fb | 208 | if (get_u32(&arp_interval, *argv, 0)) |
63d127b0 | 209 | invarg("invalid arp_interval", *argv); |
63d127b0 | 210 | addattr32(n, 1024, IFLA_BOND_ARP_INTERVAL, arp_interval); |
211 | } else if (matches(*argv, "arp_ip_target") == 0) { | |
56f5daac | 212 | struct rtattr *nest = addattr_nest(n, 1024, |
63d127b0 | 213 | IFLA_BOND_ARP_IP_TARGET); |
214 | if (NEXT_ARG_OK()) { | |
215 | NEXT_ARG(); | |
216 | char *targets = strdupa(*argv); | |
217 | char *target = strtok(targets, ","); | |
218 | int i; | |
219 | ||
56f5daac | 220 | for (i = 0; target && i < BOND_MAX_ARP_TARGETS; i++) { |
63d127b0 | 221 | __u32 addr = get_addr32(target); |
56f5daac | 222 | |
63d127b0 | 223 | addattr32(n, 1024, i, addr); |
224 | target = strtok(NULL, ","); | |
225 | } | |
226 | addattr_nest_end(n, nest); | |
227 | } | |
228 | addattr_nest_end(n, nest); | |
229 | } else if (matches(*argv, "arp_validate") == 0) { | |
230 | NEXT_ARG(); | |
e0f229fb | 231 | if (get_index(arp_validate_tbl, *argv) < 0) |
63d127b0 | 232 | invarg("invalid arp_validate", *argv); |
63d127b0 | 233 | arp_validate = get_index(arp_validate_tbl, *argv); |
234 | addattr32(n, 1024, IFLA_BOND_ARP_VALIDATE, arp_validate); | |
235 | } else if (matches(*argv, "arp_all_targets") == 0) { | |
236 | NEXT_ARG(); | |
e0f229fb | 237 | if (get_index(arp_all_targets_tbl, *argv) < 0) |
63d127b0 | 238 | invarg("invalid arp_all_targets", *argv); |
63d127b0 | 239 | arp_all_targets = get_index(arp_all_targets_tbl, *argv); |
240 | addattr32(n, 1024, IFLA_BOND_ARP_ALL_TARGETS, arp_all_targets); | |
241 | } else if (matches(*argv, "primary") == 0) { | |
242 | NEXT_ARG(); | |
243 | ifindex = if_nametoindex(*argv); | |
244 | if (!ifindex) | |
245 | return -1; | |
246 | addattr32(n, 1024, IFLA_BOND_PRIMARY, ifindex); | |
247 | } else if (matches(*argv, "primary_reselect") == 0) { | |
248 | NEXT_ARG(); | |
e0f229fb | 249 | if (get_index(primary_reselect_tbl, *argv) < 0) |
63d127b0 | 250 | invarg("invalid primary_reselect", *argv); |
63d127b0 | 251 | primary_reselect = get_index(primary_reselect_tbl, *argv); |
252 | addattr8(n, 1024, IFLA_BOND_PRIMARY_RESELECT, | |
253 | primary_reselect); | |
254 | } else if (matches(*argv, "fail_over_mac") == 0) { | |
255 | NEXT_ARG(); | |
e0f229fb | 256 | if (get_index(fail_over_mac_tbl, *argv) < 0) |
63d127b0 | 257 | invarg("invalid fail_over_mac", *argv); |
63d127b0 | 258 | fail_over_mac = get_index(fail_over_mac_tbl, *argv); |
259 | addattr8(n, 1024, IFLA_BOND_FAIL_OVER_MAC, | |
260 | fail_over_mac); | |
261 | } else if (matches(*argv, "xmit_hash_policy") == 0) { | |
262 | NEXT_ARG(); | |
e0f229fb | 263 | if (get_index(xmit_hash_policy_tbl, *argv) < 0) |
63d127b0 | 264 | invarg("invalid xmit_hash_policy", *argv); |
e0f229fb | 265 | |
63d127b0 | 266 | xmit_hash_policy = get_index(xmit_hash_policy_tbl, *argv); |
267 | addattr8(n, 1024, IFLA_BOND_XMIT_HASH_POLICY, | |
268 | xmit_hash_policy); | |
269 | } else if (matches(*argv, "resend_igmp") == 0) { | |
270 | NEXT_ARG(); | |
e0f229fb | 271 | if (get_u32(&resend_igmp, *argv, 0)) |
63d127b0 | 272 | invarg("invalid resend_igmp", *argv); |
e0f229fb | 273 | |
63d127b0 | 274 | addattr32(n, 1024, IFLA_BOND_RESEND_IGMP, resend_igmp); |
275 | } else if (matches(*argv, "num_grat_arp") == 0 || | |
276 | matches(*argv, "num_unsol_na") == 0) { | |
277 | NEXT_ARG(); | |
e0f229fb | 278 | if (get_u8(&num_peer_notif, *argv, 0)) |
63d127b0 | 279 | invarg("invalid num_grat_arp|num_unsol_na", |
280 | *argv); | |
e0f229fb | 281 | |
63d127b0 | 282 | addattr8(n, 1024, IFLA_BOND_NUM_PEER_NOTIF, |
283 | num_peer_notif); | |
284 | } else if (matches(*argv, "all_slaves_active") == 0) { | |
285 | NEXT_ARG(); | |
e0f229fb | 286 | if (get_u8(&all_slaves_active, *argv, 0)) |
63d127b0 | 287 | invarg("invalid all_slaves_active", *argv); |
e0f229fb | 288 | |
63d127b0 | 289 | addattr8(n, 1024, IFLA_BOND_ALL_SLAVES_ACTIVE, |
290 | all_slaves_active); | |
291 | } else if (matches(*argv, "min_links") == 0) { | |
292 | NEXT_ARG(); | |
e0f229fb | 293 | if (get_u32(&min_links, *argv, 0)) |
63d127b0 | 294 | invarg("invalid min_links", *argv); |
e0f229fb | 295 | |
63d127b0 | 296 | addattr32(n, 1024, IFLA_BOND_MIN_LINKS, min_links); |
297 | } else if (matches(*argv, "lp_interval") == 0) { | |
298 | NEXT_ARG(); | |
e0f229fb | 299 | if (get_u32(&lp_interval, *argv, 0)) |
63d127b0 | 300 | invarg("invalid lp_interval", *argv); |
e0f229fb | 301 | |
63d127b0 | 302 | addattr32(n, 1024, IFLA_BOND_LP_INTERVAL, lp_interval); |
303 | } else if (matches(*argv, "packets_per_slave") == 0) { | |
304 | NEXT_ARG(); | |
e0f229fb | 305 | if (get_u32(&packets_per_slave, *argv, 0)) |
63d127b0 | 306 | invarg("invalid packets_per_slave", *argv); |
e0f229fb | 307 | |
63d127b0 | 308 | addattr32(n, 1024, IFLA_BOND_PACKETS_PER_SLAVE, |
309 | packets_per_slave); | |
310 | } else if (matches(*argv, "lacp_rate") == 0) { | |
311 | NEXT_ARG(); | |
e0f229fb | 312 | if (get_index(lacp_rate_tbl, *argv) < 0) |
63d127b0 | 313 | invarg("invalid lacp_rate", *argv); |
e0f229fb | 314 | |
63d127b0 | 315 | lacp_rate = get_index(lacp_rate_tbl, *argv); |
316 | addattr8(n, 1024, IFLA_BOND_AD_LACP_RATE, lacp_rate); | |
317 | } else if (matches(*argv, "ad_select") == 0) { | |
318 | NEXT_ARG(); | |
e0f229fb | 319 | if (get_index(ad_select_tbl, *argv) < 0) |
63d127b0 | 320 | invarg("invalid ad_select", *argv); |
e0f229fb | 321 | |
63d127b0 | 322 | ad_select = get_index(ad_select_tbl, *argv); |
323 | addattr8(n, 1024, IFLA_BOND_AD_SELECT, ad_select); | |
6fc1f8ad JT |
324 | } else if (matches(*argv, "ad_user_port_key") == 0) { |
325 | NEXT_ARG(); | |
e0f229fb | 326 | if (get_u16(&ad_user_port_key, *argv, 0)) |
6fc1f8ad | 327 | invarg("invalid ad_user_port_key", *argv); |
e0f229fb | 328 | |
6fc1f8ad JT |
329 | addattr16(n, 1024, IFLA_BOND_AD_USER_PORT_KEY, |
330 | ad_user_port_key); | |
331 | } else if (matches(*argv, "ad_actor_sys_prio") == 0) { | |
332 | NEXT_ARG(); | |
e0f229fb | 333 | if (get_u16(&ad_actor_sys_prio, *argv, 0)) |
6fc1f8ad | 334 | invarg("invalid ad_actor_sys_prio", *argv); |
e0f229fb | 335 | |
6fc1f8ad JT |
336 | addattr16(n, 1024, IFLA_BOND_AD_ACTOR_SYS_PRIO, |
337 | ad_actor_sys_prio); | |
338 | } else if (matches(*argv, "ad_actor_system") == 0) { | |
339 | int len; | |
340 | char abuf[32]; | |
341 | ||
342 | NEXT_ARG(); | |
343 | len = ll_addr_a2n(abuf, sizeof(abuf), *argv); | |
344 | if (len < 0) | |
345 | return -1; | |
346 | addattr_l(n, 1024, IFLA_BOND_AD_ACTOR_SYSTEM, | |
347 | abuf, len); | |
d02e4662 NA |
348 | } else if (matches(*argv, "tlb_dynamic_lb") == 0) { |
349 | NEXT_ARG(); | |
350 | if (get_u8(&tlb_dynamic_lb, *argv, 0)) { | |
351 | invarg("invalid tlb_dynamic_lb", *argv); | |
352 | return -1; | |
353 | } | |
354 | addattr8(n, 1024, IFLA_BOND_TLB_DYNAMIC_LB, | |
355 | tlb_dynamic_lb); | |
7feb76ce JP |
356 | } else if (matches(*argv, "help") == 0) { |
357 | explain(); | |
358 | return -1; | |
cc26a890 JP |
359 | } else { |
360 | fprintf(stderr, "bond: unknown command \"%s\"?\n", *argv); | |
361 | explain(); | |
362 | return -1; | |
363 | } | |
364 | argc--, argv++; | |
365 | } | |
366 | ||
367 | return 0; | |
368 | } | |
369 | ||
370 | static void bond_print_opt(struct link_util *lu, FILE *f, struct rtattr *tb[]) | |
371 | { | |
56f5daac | 372 | unsigned int ifindex; |
cc26a890 JP |
373 | |
374 | if (!tb) | |
375 | return; | |
376 | ||
63d127b0 | 377 | if (tb[IFLA_BOND_MODE]) { |
378 | const char *mode = get_name(mode_tbl, | |
379 | rta_getattr_u8(tb[IFLA_BOND_MODE])); | |
380 | fprintf(f, "mode %s ", mode); | |
381 | } | |
cc26a890 JP |
382 | |
383 | if (tb[IFLA_BOND_ACTIVE_SLAVE] && | |
384 | (ifindex = rta_getattr_u32(tb[IFLA_BOND_ACTIVE_SLAVE]))) { | |
385 | char buf[IFNAMSIZ]; | |
386 | const char *n = if_indextoname(ifindex, buf); | |
387 | ||
388 | if (n) | |
389 | fprintf(f, "active_slave %s ", n); | |
390 | else | |
391 | fprintf(f, "active_slave %u ", ifindex); | |
392 | } | |
63d127b0 | 393 | |
394 | if (tb[IFLA_BOND_MIIMON]) | |
395 | fprintf(f, "miimon %u ", rta_getattr_u32(tb[IFLA_BOND_MIIMON])); | |
396 | ||
397 | if (tb[IFLA_BOND_UPDELAY]) | |
398 | fprintf(f, "updelay %u ", rta_getattr_u32(tb[IFLA_BOND_UPDELAY])); | |
399 | ||
400 | if (tb[IFLA_BOND_DOWNDELAY]) | |
401 | fprintf(f, "downdelay %u ", | |
402 | rta_getattr_u32(tb[IFLA_BOND_DOWNDELAY])); | |
403 | ||
404 | if (tb[IFLA_BOND_USE_CARRIER]) | |
405 | fprintf(f, "use_carrier %u ", | |
406 | rta_getattr_u8(tb[IFLA_BOND_USE_CARRIER])); | |
407 | ||
408 | if (tb[IFLA_BOND_ARP_INTERVAL]) | |
409 | fprintf(f, "arp_interval %u ", | |
410 | rta_getattr_u32(tb[IFLA_BOND_ARP_INTERVAL])); | |
411 | ||
412 | if (tb[IFLA_BOND_ARP_IP_TARGET]) { | |
413 | struct rtattr *iptb[BOND_MAX_ARP_TARGETS + 1]; | |
63d127b0 | 414 | int i; |
415 | ||
416 | parse_rtattr_nested(iptb, BOND_MAX_ARP_TARGETS, | |
417 | tb[IFLA_BOND_ARP_IP_TARGET]); | |
418 | ||
419 | if (iptb[0]) | |
420 | fprintf(f, "arp_ip_target "); | |
421 | ||
422 | for (i = 0; i < BOND_MAX_ARP_TARGETS; i++) { | |
423 | if (iptb[i]) | |
424 | fprintf(f, "%s", | |
7faf1588 | 425 | rt_addr_n2a_rta(AF_INET, iptb[i])); |
63d127b0 | 426 | if (i < BOND_MAX_ARP_TARGETS-1 && iptb[i+1]) |
427 | fprintf(f, ","); | |
428 | } | |
429 | ||
430 | if (iptb[0]) | |
431 | fprintf(f, " "); | |
432 | } | |
433 | ||
434 | if (tb[IFLA_BOND_ARP_VALIDATE]) { | |
435 | const char *arp_validate = get_name(arp_validate_tbl, | |
436 | rta_getattr_u32(tb[IFLA_BOND_ARP_VALIDATE])); | |
437 | fprintf(f, "arp_validate %s ", arp_validate); | |
438 | } | |
439 | ||
440 | if (tb[IFLA_BOND_ARP_ALL_TARGETS]) { | |
441 | const char *arp_all_targets = get_name(arp_all_targets_tbl, | |
442 | rta_getattr_u32(tb[IFLA_BOND_ARP_ALL_TARGETS])); | |
32ad31fb | 443 | fprintf(f, "arp_all_targets %s ", arp_all_targets); |
63d127b0 | 444 | } |
445 | ||
446 | if (tb[IFLA_BOND_PRIMARY] && | |
447 | (ifindex = rta_getattr_u32(tb[IFLA_BOND_PRIMARY]))) { | |
448 | char buf[IFNAMSIZ]; | |
449 | const char *n = if_indextoname(ifindex, buf); | |
450 | ||
451 | if (n) | |
452 | fprintf(f, "primary %s ", n); | |
453 | else | |
454 | fprintf(f, "primary %u ", ifindex); | |
455 | } | |
456 | ||
457 | if (tb[IFLA_BOND_PRIMARY_RESELECT]) { | |
458 | const char *primary_reselect = get_name(primary_reselect_tbl, | |
459 | rta_getattr_u8(tb[IFLA_BOND_PRIMARY_RESELECT])); | |
460 | fprintf(f, "primary_reselect %s ", primary_reselect); | |
461 | } | |
462 | ||
463 | if (tb[IFLA_BOND_FAIL_OVER_MAC]) { | |
464 | const char *fail_over_mac = get_name(fail_over_mac_tbl, | |
465 | rta_getattr_u8(tb[IFLA_BOND_FAIL_OVER_MAC])); | |
466 | fprintf(f, "fail_over_mac %s ", fail_over_mac); | |
467 | } | |
468 | ||
469 | if (tb[IFLA_BOND_XMIT_HASH_POLICY]) { | |
470 | const char *xmit_hash_policy = get_name(xmit_hash_policy_tbl, | |
471 | rta_getattr_u8(tb[IFLA_BOND_XMIT_HASH_POLICY])); | |
472 | fprintf(f, "xmit_hash_policy %s ", xmit_hash_policy); | |
473 | } | |
474 | ||
475 | if (tb[IFLA_BOND_RESEND_IGMP]) | |
476 | fprintf(f, "resend_igmp %u ", | |
477 | rta_getattr_u32(tb[IFLA_BOND_RESEND_IGMP])); | |
478 | ||
479 | if (tb[IFLA_BOND_NUM_PEER_NOTIF]) | |
480 | fprintf(f, "num_grat_arp %u ", | |
481 | rta_getattr_u8(tb[IFLA_BOND_NUM_PEER_NOTIF])); | |
482 | ||
483 | if (tb[IFLA_BOND_ALL_SLAVES_ACTIVE]) | |
484 | fprintf(f, "all_slaves_active %u ", | |
485 | rta_getattr_u8(tb[IFLA_BOND_ALL_SLAVES_ACTIVE])); | |
486 | ||
487 | if (tb[IFLA_BOND_MIN_LINKS]) | |
488 | fprintf(f, "min_links %u ", | |
489 | rta_getattr_u32(tb[IFLA_BOND_MIN_LINKS])); | |
490 | ||
491 | if (tb[IFLA_BOND_LP_INTERVAL]) | |
492 | fprintf(f, "lp_interval %u ", | |
493 | rta_getattr_u32(tb[IFLA_BOND_LP_INTERVAL])); | |
494 | ||
495 | if (tb[IFLA_BOND_PACKETS_PER_SLAVE]) | |
496 | fprintf(f, "packets_per_slave %u ", | |
497 | rta_getattr_u32(tb[IFLA_BOND_PACKETS_PER_SLAVE])); | |
498 | ||
499 | if (tb[IFLA_BOND_AD_LACP_RATE]) { | |
500 | const char *lacp_rate = get_name(lacp_rate_tbl, | |
501 | rta_getattr_u8(tb[IFLA_BOND_AD_LACP_RATE])); | |
502 | fprintf(f, "lacp_rate %s ", lacp_rate); | |
503 | } | |
504 | ||
505 | if (tb[IFLA_BOND_AD_SELECT]) { | |
506 | const char *ad_select = get_name(ad_select_tbl, | |
507 | rta_getattr_u8(tb[IFLA_BOND_AD_SELECT])); | |
508 | fprintf(f, "ad_select %s ", ad_select); | |
509 | } | |
510 | ||
511 | if (tb[IFLA_BOND_AD_INFO]) { | |
512 | struct rtattr *adtb[IFLA_BOND_AD_INFO_MAX + 1]; | |
513 | ||
514 | parse_rtattr_nested(adtb, IFLA_BOND_AD_INFO_MAX, | |
515 | tb[IFLA_BOND_AD_INFO]); | |
516 | ||
517 | if (adtb[IFLA_BOND_AD_INFO_AGGREGATOR]) | |
518 | fprintf(f, "ad_aggregator %d ", | |
519 | rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_AGGREGATOR])); | |
520 | ||
521 | if (adtb[IFLA_BOND_AD_INFO_NUM_PORTS]) | |
522 | fprintf(f, "ad_num_ports %d ", | |
523 | rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_NUM_PORTS])); | |
524 | ||
525 | if (adtb[IFLA_BOND_AD_INFO_ACTOR_KEY]) | |
526 | fprintf(f, "ad_actor_key %d ", | |
527 | rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_ACTOR_KEY])); | |
528 | ||
529 | if (adtb[IFLA_BOND_AD_INFO_PARTNER_KEY]) | |
530 | fprintf(f, "ad_partner_key %d ", | |
531 | rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_PARTNER_KEY])); | |
532 | ||
533 | if (adtb[IFLA_BOND_AD_INFO_PARTNER_MAC]) { | |
534 | unsigned char *p = | |
535 | RTA_DATA(adtb[IFLA_BOND_AD_INFO_PARTNER_MAC]); | |
536 | SPRINT_BUF(b); | |
537 | fprintf(f, "ad_partner_mac %s ", | |
538 | ll_addr_n2a(p, ETH_ALEN, 0, b, sizeof(b))); | |
539 | } | |
540 | } | |
6fc1f8ad JT |
541 | |
542 | if (tb[IFLA_BOND_AD_ACTOR_SYS_PRIO]) { | |
543 | fprintf(f, "ad_actor_sys_prio %u ", | |
544 | rta_getattr_u16(tb[IFLA_BOND_AD_ACTOR_SYS_PRIO])); | |
545 | } | |
546 | ||
547 | if (tb[IFLA_BOND_AD_USER_PORT_KEY]) { | |
548 | fprintf(f, "ad_user_port_key %u ", | |
549 | rta_getattr_u16(tb[IFLA_BOND_AD_USER_PORT_KEY])); | |
550 | } | |
551 | ||
552 | if (tb[IFLA_BOND_AD_ACTOR_SYSTEM]) { | |
553 | /* We assume the l2 address is an Ethernet MAC address */ | |
554 | SPRINT_BUF(b1); | |
555 | fprintf(f, "ad_actor_system %s ", | |
556 | ll_addr_n2a(RTA_DATA(tb[IFLA_BOND_AD_ACTOR_SYSTEM]), | |
557 | RTA_PAYLOAD(tb[IFLA_BOND_AD_ACTOR_SYSTEM]), | |
558 | 1 /*ARPHDR_ETHER*/, b1, sizeof(b1))); | |
559 | } | |
d02e4662 NA |
560 | |
561 | if (tb[IFLA_BOND_TLB_DYNAMIC_LB]) { | |
562 | fprintf(f, "tlb_dynamic_lb %u ", | |
563 | rta_getattr_u8(tb[IFLA_BOND_TLB_DYNAMIC_LB])); | |
564 | } | |
cc26a890 JP |
565 | } |
566 | ||
561e650e | 567 | static void bond_print_help(struct link_util *lu, int argc, char **argv, |
568 | FILE *f) | |
569 | { | |
570 | print_explain(f); | |
571 | } | |
572 | ||
cc26a890 JP |
573 | struct link_util bond_link_util = { |
574 | .id = "bond", | |
575 | .maxattr = IFLA_BOND_MAX, | |
576 | .parse_opt = bond_parse_opt, | |
577 | .print_opt = bond_print_opt, | |
561e650e | 578 | .print_help = bond_print_help, |
cc26a890 | 579 | }; |