]> git.proxmox.com Git - mirror_iproute2.git/blame - ip/iplink_bond.c
ip: code cleanup
[mirror_iproute2.git] / ip / iplink_bond.c
CommitLineData
cc26a890
JP
1/*
2 * iplink_bond.c Bonding device support
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Jiri Pirko <jiri@resnulli.us>
63d127b0 10 * Scott Feldman <sfeldma@cumulusnetworks.com>
cc26a890
JP
11 */
12
13#include <stdio.h>
14#include <stdlib.h>
15#include <string.h>
16#include <linux/if_link.h>
63d127b0 17#include <linux/if_ether.h>
cc26a890
JP
18#include <net/if.h>
19
20#include "rt_names.h"
21#include "utils.h"
22#include "ip_common.h"
23
63d127b0 24#define BOND_MAX_ARP_TARGETS 16
25
26static const char *mode_tbl[] = {
27 "balance-rr",
28 "active-backup",
29 "balance-xor",
30 "broadcast",
31 "802.3ad",
32 "balance-tlb",
33 "balance-alb",
34 NULL,
35};
36
37static const char *arp_validate_tbl[] = {
38 "none",
39 "active",
40 "backup",
41 "all",
42 NULL,
43};
44
45static const char *arp_all_targets_tbl[] = {
46 "any",
47 "all",
48 NULL,
49};
50
51static const char *primary_reselect_tbl[] = {
52 "always",
53 "better",
54 "failure",
55 NULL,
56};
57
58static const char *fail_over_mac_tbl[] = {
59 "none",
60 "active",
61 "follow",
62 NULL,
63};
64
65static const char *xmit_hash_policy_tbl[] = {
66 "layer2",
67 "layer3+4",
68 "layer2+3",
69 "encap2+3",
70 "encap3+4",
71 NULL,
72};
73
74static const char *lacp_rate_tbl[] = {
75 "slow",
76 "fast",
77 NULL,
78};
79
80static const char *ad_select_tbl[] = {
81 "stable",
82 "bandwidth",
83 "count",
84 NULL,
85};
86
87static const char *get_name(const char **tbl, int index)
88{
89 int i;
90
91 for (i = 0; tbl[i]; i++)
92 if (i == index)
93 return tbl[i];
94
95 return "UNKNOWN";
96}
97
98static int get_index(const char **tbl, char *name)
99{
100 int i, index;
101
102 /* check for integer index passed in instead of name */
103 if (get_integer(&index, name, 10) == 0)
104 for (i = 0; tbl[i]; i++)
105 if (i == index)
106 return i;
107
108 for (i = 0; tbl[i]; i++)
f7a45e09 109 if (strcmp(tbl[i], name) == 0)
63d127b0 110 return i;
111
112 return -1;
113}
114
561e650e 115static void print_explain(FILE *f)
cc26a890 116{
561e650e 117 fprintf(f,
cc26a890 118 "Usage: ... bond [ mode BONDMODE ] [ active_slave SLAVE_DEV ]\n"
63d127b0 119 " [ clear_active_slave ] [ miimon MIIMON ]\n"
120 " [ updelay UPDELAY ] [ downdelay DOWNDELAY ]\n"
121 " [ use_carrier USE_CARRIER ]\n"
122 " [ arp_interval ARP_INTERVAL ]\n"
123 " [ arp_validate ARP_VALIDATE ]\n"
124 " [ arp_all_targets ARP_ALL_TARGETS ]\n"
125 " [ arp_ip_target [ ARP_IP_TARGET, ... ] ]\n"
126 " [ primary SLAVE_DEV ]\n"
127 " [ primary_reselect PRIMARY_RESELECT ]\n"
128 " [ fail_over_mac FAIL_OVER_MAC ]\n"
129 " [ xmit_hash_policy XMIT_HASH_POLICY ]\n"
130 " [ resend_igmp RESEND_IGMP ]\n"
131 " [ num_grat_arp|num_unsol_na NUM_GRAT_ARP|NUM_UNSOL_NA ]\n"
132 " [ all_slaves_active ALL_SLAVES_ACTIVE ]\n"
133 " [ min_links MIN_LINKS ]\n"
134 " [ lp_interval LP_INTERVAL ]\n"
135 " [ packets_per_slave PACKETS_PER_SLAVE ]\n"
d02e4662 136 " [ tlb_dynamic_lb TLB_DYNAMIC_LB ]\n"
63d127b0 137 " [ lacp_rate LACP_RATE ]\n"
138 " [ ad_select AD_SELECT ]\n"
6fc1f8ad
JT
139 " [ ad_user_port_key PORTKEY ]\n"
140 " [ ad_actor_sys_prio SYSPRIO ]\n"
141 " [ ad_actor_system LLADDR ]\n"
cc26a890 142 "\n"
63d127b0 143 "BONDMODE := balance-rr|active-backup|balance-xor|broadcast|802.3ad|balance-tlb|balance-alb\n"
144 "ARP_VALIDATE := none|active|backup|all\n"
145 "ARP_ALL_TARGETS := any|all\n"
146 "PRIMARY_RESELECT := always|better|failure\n"
147 "FAIL_OVER_MAC := none|active|follow\n"
a1978834 148 "XMIT_HASH_POLICY := layer2|layer2+3|layer3+4|encap2+3|encap3+4\n"
63d127b0 149 "LACP_RATE := slow|fast\n"
150 "AD_SELECT := stable|bandwidth|count\n"
cc26a890
JP
151 );
152}
153
561e650e 154static void explain(void)
155{
156 print_explain(stderr);
157}
158
cc26a890
JP
159static int bond_parse_opt(struct link_util *lu, int argc, char **argv,
160 struct nlmsghdr *n)
161{
63d127b0 162 __u8 mode, use_carrier, primary_reselect, fail_over_mac;
163 __u8 xmit_hash_policy, num_peer_notif, all_slaves_active;
d02e4662 164 __u8 lacp_rate, ad_select, tlb_dynamic_lb;
6fc1f8ad 165 __u16 ad_user_port_key, ad_actor_sys_prio;
63d127b0 166 __u32 miimon, updelay, downdelay, arp_interval, arp_validate;
167 __u32 arp_all_targets, resend_igmp, min_links, lp_interval;
168 __u32 packets_per_slave;
56f5daac 169 unsigned int ifindex;
cc26a890
JP
170
171 while (argc > 0) {
172 if (matches(*argv, "mode") == 0) {
173 NEXT_ARG();
e0f229fb 174 if (get_index(mode_tbl, *argv) < 0)
63d127b0 175 invarg("invalid mode", *argv);
63d127b0 176 mode = get_index(mode_tbl, *argv);
cc26a890
JP
177 addattr8(n, 1024, IFLA_BOND_MODE, mode);
178 } else if (matches(*argv, "active_slave") == 0) {
179 NEXT_ARG();
180 ifindex = if_nametoindex(*argv);
181 if (!ifindex)
182 return -1;
183 addattr32(n, 1024, IFLA_BOND_ACTIVE_SLAVE, ifindex);
184 } else if (matches(*argv, "clear_active_slave") == 0) {
185 addattr32(n, 1024, IFLA_BOND_ACTIVE_SLAVE, 0);
63d127b0 186 } else if (matches(*argv, "miimon") == 0) {
187 NEXT_ARG();
e0f229fb 188 if (get_u32(&miimon, *argv, 0))
63d127b0 189 invarg("invalid miimon", *argv);
63d127b0 190 addattr32(n, 1024, IFLA_BOND_MIIMON, miimon);
191 } else if (matches(*argv, "updelay") == 0) {
192 NEXT_ARG();
e0f229fb 193 if (get_u32(&updelay, *argv, 0))
63d127b0 194 invarg("invalid updelay", *argv);
63d127b0 195 addattr32(n, 1024, IFLA_BOND_UPDELAY, updelay);
196 } else if (matches(*argv, "downdelay") == 0) {
197 NEXT_ARG();
e0f229fb 198 if (get_u32(&downdelay, *argv, 0))
63d127b0 199 invarg("invalid downdelay", *argv);
63d127b0 200 addattr32(n, 1024, IFLA_BOND_DOWNDELAY, downdelay);
201 } else if (matches(*argv, "use_carrier") == 0) {
202 NEXT_ARG();
e0f229fb 203 if (get_u8(&use_carrier, *argv, 0))
63d127b0 204 invarg("invalid use_carrier", *argv);
63d127b0 205 addattr8(n, 1024, IFLA_BOND_USE_CARRIER, use_carrier);
206 } else if (matches(*argv, "arp_interval") == 0) {
207 NEXT_ARG();
e0f229fb 208 if (get_u32(&arp_interval, *argv, 0))
63d127b0 209 invarg("invalid arp_interval", *argv);
63d127b0 210 addattr32(n, 1024, IFLA_BOND_ARP_INTERVAL, arp_interval);
211 } else if (matches(*argv, "arp_ip_target") == 0) {
56f5daac 212 struct rtattr *nest = addattr_nest(n, 1024,
63d127b0 213 IFLA_BOND_ARP_IP_TARGET);
214 if (NEXT_ARG_OK()) {
215 NEXT_ARG();
216 char *targets = strdupa(*argv);
217 char *target = strtok(targets, ",");
218 int i;
219
56f5daac 220 for (i = 0; target && i < BOND_MAX_ARP_TARGETS; i++) {
63d127b0 221 __u32 addr = get_addr32(target);
56f5daac 222
63d127b0 223 addattr32(n, 1024, i, addr);
224 target = strtok(NULL, ",");
225 }
226 addattr_nest_end(n, nest);
227 }
228 addattr_nest_end(n, nest);
229 } else if (matches(*argv, "arp_validate") == 0) {
230 NEXT_ARG();
e0f229fb 231 if (get_index(arp_validate_tbl, *argv) < 0)
63d127b0 232 invarg("invalid arp_validate", *argv);
63d127b0 233 arp_validate = get_index(arp_validate_tbl, *argv);
234 addattr32(n, 1024, IFLA_BOND_ARP_VALIDATE, arp_validate);
235 } else if (matches(*argv, "arp_all_targets") == 0) {
236 NEXT_ARG();
e0f229fb 237 if (get_index(arp_all_targets_tbl, *argv) < 0)
63d127b0 238 invarg("invalid arp_all_targets", *argv);
63d127b0 239 arp_all_targets = get_index(arp_all_targets_tbl, *argv);
240 addattr32(n, 1024, IFLA_BOND_ARP_ALL_TARGETS, arp_all_targets);
241 } else if (matches(*argv, "primary") == 0) {
242 NEXT_ARG();
243 ifindex = if_nametoindex(*argv);
244 if (!ifindex)
245 return -1;
246 addattr32(n, 1024, IFLA_BOND_PRIMARY, ifindex);
247 } else if (matches(*argv, "primary_reselect") == 0) {
248 NEXT_ARG();
e0f229fb 249 if (get_index(primary_reselect_tbl, *argv) < 0)
63d127b0 250 invarg("invalid primary_reselect", *argv);
63d127b0 251 primary_reselect = get_index(primary_reselect_tbl, *argv);
252 addattr8(n, 1024, IFLA_BOND_PRIMARY_RESELECT,
253 primary_reselect);
254 } else if (matches(*argv, "fail_over_mac") == 0) {
255 NEXT_ARG();
e0f229fb 256 if (get_index(fail_over_mac_tbl, *argv) < 0)
63d127b0 257 invarg("invalid fail_over_mac", *argv);
63d127b0 258 fail_over_mac = get_index(fail_over_mac_tbl, *argv);
259 addattr8(n, 1024, IFLA_BOND_FAIL_OVER_MAC,
260 fail_over_mac);
261 } else if (matches(*argv, "xmit_hash_policy") == 0) {
262 NEXT_ARG();
e0f229fb 263 if (get_index(xmit_hash_policy_tbl, *argv) < 0)
63d127b0 264 invarg("invalid xmit_hash_policy", *argv);
e0f229fb 265
63d127b0 266 xmit_hash_policy = get_index(xmit_hash_policy_tbl, *argv);
267 addattr8(n, 1024, IFLA_BOND_XMIT_HASH_POLICY,
268 xmit_hash_policy);
269 } else if (matches(*argv, "resend_igmp") == 0) {
270 NEXT_ARG();
e0f229fb 271 if (get_u32(&resend_igmp, *argv, 0))
63d127b0 272 invarg("invalid resend_igmp", *argv);
e0f229fb 273
63d127b0 274 addattr32(n, 1024, IFLA_BOND_RESEND_IGMP, resend_igmp);
275 } else if (matches(*argv, "num_grat_arp") == 0 ||
276 matches(*argv, "num_unsol_na") == 0) {
277 NEXT_ARG();
e0f229fb 278 if (get_u8(&num_peer_notif, *argv, 0))
63d127b0 279 invarg("invalid num_grat_arp|num_unsol_na",
280 *argv);
e0f229fb 281
63d127b0 282 addattr8(n, 1024, IFLA_BOND_NUM_PEER_NOTIF,
283 num_peer_notif);
284 } else if (matches(*argv, "all_slaves_active") == 0) {
285 NEXT_ARG();
e0f229fb 286 if (get_u8(&all_slaves_active, *argv, 0))
63d127b0 287 invarg("invalid all_slaves_active", *argv);
e0f229fb 288
63d127b0 289 addattr8(n, 1024, IFLA_BOND_ALL_SLAVES_ACTIVE,
290 all_slaves_active);
291 } else if (matches(*argv, "min_links") == 0) {
292 NEXT_ARG();
e0f229fb 293 if (get_u32(&min_links, *argv, 0))
63d127b0 294 invarg("invalid min_links", *argv);
e0f229fb 295
63d127b0 296 addattr32(n, 1024, IFLA_BOND_MIN_LINKS, min_links);
297 } else if (matches(*argv, "lp_interval") == 0) {
298 NEXT_ARG();
e0f229fb 299 if (get_u32(&lp_interval, *argv, 0))
63d127b0 300 invarg("invalid lp_interval", *argv);
e0f229fb 301
63d127b0 302 addattr32(n, 1024, IFLA_BOND_LP_INTERVAL, lp_interval);
303 } else if (matches(*argv, "packets_per_slave") == 0) {
304 NEXT_ARG();
e0f229fb 305 if (get_u32(&packets_per_slave, *argv, 0))
63d127b0 306 invarg("invalid packets_per_slave", *argv);
e0f229fb 307
63d127b0 308 addattr32(n, 1024, IFLA_BOND_PACKETS_PER_SLAVE,
309 packets_per_slave);
310 } else if (matches(*argv, "lacp_rate") == 0) {
311 NEXT_ARG();
e0f229fb 312 if (get_index(lacp_rate_tbl, *argv) < 0)
63d127b0 313 invarg("invalid lacp_rate", *argv);
e0f229fb 314
63d127b0 315 lacp_rate = get_index(lacp_rate_tbl, *argv);
316 addattr8(n, 1024, IFLA_BOND_AD_LACP_RATE, lacp_rate);
317 } else if (matches(*argv, "ad_select") == 0) {
318 NEXT_ARG();
e0f229fb 319 if (get_index(ad_select_tbl, *argv) < 0)
63d127b0 320 invarg("invalid ad_select", *argv);
e0f229fb 321
63d127b0 322 ad_select = get_index(ad_select_tbl, *argv);
323 addattr8(n, 1024, IFLA_BOND_AD_SELECT, ad_select);
6fc1f8ad
JT
324 } else if (matches(*argv, "ad_user_port_key") == 0) {
325 NEXT_ARG();
e0f229fb 326 if (get_u16(&ad_user_port_key, *argv, 0))
6fc1f8ad 327 invarg("invalid ad_user_port_key", *argv);
e0f229fb 328
6fc1f8ad
JT
329 addattr16(n, 1024, IFLA_BOND_AD_USER_PORT_KEY,
330 ad_user_port_key);
331 } else if (matches(*argv, "ad_actor_sys_prio") == 0) {
332 NEXT_ARG();
e0f229fb 333 if (get_u16(&ad_actor_sys_prio, *argv, 0))
6fc1f8ad 334 invarg("invalid ad_actor_sys_prio", *argv);
e0f229fb 335
6fc1f8ad
JT
336 addattr16(n, 1024, IFLA_BOND_AD_ACTOR_SYS_PRIO,
337 ad_actor_sys_prio);
338 } else if (matches(*argv, "ad_actor_system") == 0) {
339 int len;
340 char abuf[32];
341
342 NEXT_ARG();
343 len = ll_addr_a2n(abuf, sizeof(abuf), *argv);
344 if (len < 0)
345 return -1;
346 addattr_l(n, 1024, IFLA_BOND_AD_ACTOR_SYSTEM,
347 abuf, len);
d02e4662
NA
348 } else if (matches(*argv, "tlb_dynamic_lb") == 0) {
349 NEXT_ARG();
350 if (get_u8(&tlb_dynamic_lb, *argv, 0)) {
351 invarg("invalid tlb_dynamic_lb", *argv);
352 return -1;
353 }
354 addattr8(n, 1024, IFLA_BOND_TLB_DYNAMIC_LB,
355 tlb_dynamic_lb);
7feb76ce
JP
356 } else if (matches(*argv, "help") == 0) {
357 explain();
358 return -1;
cc26a890
JP
359 } else {
360 fprintf(stderr, "bond: unknown command \"%s\"?\n", *argv);
361 explain();
362 return -1;
363 }
364 argc--, argv++;
365 }
366
367 return 0;
368}
369
370static void bond_print_opt(struct link_util *lu, FILE *f, struct rtattr *tb[])
371{
56f5daac 372 unsigned int ifindex;
cc26a890
JP
373
374 if (!tb)
375 return;
376
63d127b0 377 if (tb[IFLA_BOND_MODE]) {
378 const char *mode = get_name(mode_tbl,
379 rta_getattr_u8(tb[IFLA_BOND_MODE]));
380 fprintf(f, "mode %s ", mode);
381 }
cc26a890
JP
382
383 if (tb[IFLA_BOND_ACTIVE_SLAVE] &&
384 (ifindex = rta_getattr_u32(tb[IFLA_BOND_ACTIVE_SLAVE]))) {
385 char buf[IFNAMSIZ];
386 const char *n = if_indextoname(ifindex, buf);
387
388 if (n)
389 fprintf(f, "active_slave %s ", n);
390 else
391 fprintf(f, "active_slave %u ", ifindex);
392 }
63d127b0 393
394 if (tb[IFLA_BOND_MIIMON])
395 fprintf(f, "miimon %u ", rta_getattr_u32(tb[IFLA_BOND_MIIMON]));
396
397 if (tb[IFLA_BOND_UPDELAY])
398 fprintf(f, "updelay %u ", rta_getattr_u32(tb[IFLA_BOND_UPDELAY]));
399
400 if (tb[IFLA_BOND_DOWNDELAY])
401 fprintf(f, "downdelay %u ",
402 rta_getattr_u32(tb[IFLA_BOND_DOWNDELAY]));
403
404 if (tb[IFLA_BOND_USE_CARRIER])
405 fprintf(f, "use_carrier %u ",
406 rta_getattr_u8(tb[IFLA_BOND_USE_CARRIER]));
407
408 if (tb[IFLA_BOND_ARP_INTERVAL])
409 fprintf(f, "arp_interval %u ",
410 rta_getattr_u32(tb[IFLA_BOND_ARP_INTERVAL]));
411
412 if (tb[IFLA_BOND_ARP_IP_TARGET]) {
413 struct rtattr *iptb[BOND_MAX_ARP_TARGETS + 1];
414 char buf[INET_ADDRSTRLEN];
415 int i;
416
417 parse_rtattr_nested(iptb, BOND_MAX_ARP_TARGETS,
418 tb[IFLA_BOND_ARP_IP_TARGET]);
419
420 if (iptb[0])
421 fprintf(f, "arp_ip_target ");
422
423 for (i = 0; i < BOND_MAX_ARP_TARGETS; i++) {
424 if (iptb[i])
425 fprintf(f, "%s",
426 rt_addr_n2a(AF_INET,
26dcdf3a 427 RTA_PAYLOAD(iptb[i]),
63d127b0 428 RTA_DATA(iptb[i]),
429 buf,
430 INET_ADDRSTRLEN));
431 if (i < BOND_MAX_ARP_TARGETS-1 && iptb[i+1])
432 fprintf(f, ",");
433 }
434
435 if (iptb[0])
436 fprintf(f, " ");
437 }
438
439 if (tb[IFLA_BOND_ARP_VALIDATE]) {
440 const char *arp_validate = get_name(arp_validate_tbl,
441 rta_getattr_u32(tb[IFLA_BOND_ARP_VALIDATE]));
442 fprintf(f, "arp_validate %s ", arp_validate);
443 }
444
445 if (tb[IFLA_BOND_ARP_ALL_TARGETS]) {
446 const char *arp_all_targets = get_name(arp_all_targets_tbl,
447 rta_getattr_u32(tb[IFLA_BOND_ARP_ALL_TARGETS]));
32ad31fb 448 fprintf(f, "arp_all_targets %s ", arp_all_targets);
63d127b0 449 }
450
451 if (tb[IFLA_BOND_PRIMARY] &&
452 (ifindex = rta_getattr_u32(tb[IFLA_BOND_PRIMARY]))) {
453 char buf[IFNAMSIZ];
454 const char *n = if_indextoname(ifindex, buf);
455
456 if (n)
457 fprintf(f, "primary %s ", n);
458 else
459 fprintf(f, "primary %u ", ifindex);
460 }
461
462 if (tb[IFLA_BOND_PRIMARY_RESELECT]) {
463 const char *primary_reselect = get_name(primary_reselect_tbl,
464 rta_getattr_u8(tb[IFLA_BOND_PRIMARY_RESELECT]));
465 fprintf(f, "primary_reselect %s ", primary_reselect);
466 }
467
468 if (tb[IFLA_BOND_FAIL_OVER_MAC]) {
469 const char *fail_over_mac = get_name(fail_over_mac_tbl,
470 rta_getattr_u8(tb[IFLA_BOND_FAIL_OVER_MAC]));
471 fprintf(f, "fail_over_mac %s ", fail_over_mac);
472 }
473
474 if (tb[IFLA_BOND_XMIT_HASH_POLICY]) {
475 const char *xmit_hash_policy = get_name(xmit_hash_policy_tbl,
476 rta_getattr_u8(tb[IFLA_BOND_XMIT_HASH_POLICY]));
477 fprintf(f, "xmit_hash_policy %s ", xmit_hash_policy);
478 }
479
480 if (tb[IFLA_BOND_RESEND_IGMP])
481 fprintf(f, "resend_igmp %u ",
482 rta_getattr_u32(tb[IFLA_BOND_RESEND_IGMP]));
483
484 if (tb[IFLA_BOND_NUM_PEER_NOTIF])
485 fprintf(f, "num_grat_arp %u ",
486 rta_getattr_u8(tb[IFLA_BOND_NUM_PEER_NOTIF]));
487
488 if (tb[IFLA_BOND_ALL_SLAVES_ACTIVE])
489 fprintf(f, "all_slaves_active %u ",
490 rta_getattr_u8(tb[IFLA_BOND_ALL_SLAVES_ACTIVE]));
491
492 if (tb[IFLA_BOND_MIN_LINKS])
493 fprintf(f, "min_links %u ",
494 rta_getattr_u32(tb[IFLA_BOND_MIN_LINKS]));
495
496 if (tb[IFLA_BOND_LP_INTERVAL])
497 fprintf(f, "lp_interval %u ",
498 rta_getattr_u32(tb[IFLA_BOND_LP_INTERVAL]));
499
500 if (tb[IFLA_BOND_PACKETS_PER_SLAVE])
501 fprintf(f, "packets_per_slave %u ",
502 rta_getattr_u32(tb[IFLA_BOND_PACKETS_PER_SLAVE]));
503
504 if (tb[IFLA_BOND_AD_LACP_RATE]) {
505 const char *lacp_rate = get_name(lacp_rate_tbl,
506 rta_getattr_u8(tb[IFLA_BOND_AD_LACP_RATE]));
507 fprintf(f, "lacp_rate %s ", lacp_rate);
508 }
509
510 if (tb[IFLA_BOND_AD_SELECT]) {
511 const char *ad_select = get_name(ad_select_tbl,
512 rta_getattr_u8(tb[IFLA_BOND_AD_SELECT]));
513 fprintf(f, "ad_select %s ", ad_select);
514 }
515
516 if (tb[IFLA_BOND_AD_INFO]) {
517 struct rtattr *adtb[IFLA_BOND_AD_INFO_MAX + 1];
518
519 parse_rtattr_nested(adtb, IFLA_BOND_AD_INFO_MAX,
520 tb[IFLA_BOND_AD_INFO]);
521
522 if (adtb[IFLA_BOND_AD_INFO_AGGREGATOR])
523 fprintf(f, "ad_aggregator %d ",
524 rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_AGGREGATOR]));
525
526 if (adtb[IFLA_BOND_AD_INFO_NUM_PORTS])
527 fprintf(f, "ad_num_ports %d ",
528 rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_NUM_PORTS]));
529
530 if (adtb[IFLA_BOND_AD_INFO_ACTOR_KEY])
531 fprintf(f, "ad_actor_key %d ",
532 rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_ACTOR_KEY]));
533
534 if (adtb[IFLA_BOND_AD_INFO_PARTNER_KEY])
535 fprintf(f, "ad_partner_key %d ",
536 rta_getattr_u16(adtb[IFLA_BOND_AD_INFO_PARTNER_KEY]));
537
538 if (adtb[IFLA_BOND_AD_INFO_PARTNER_MAC]) {
539 unsigned char *p =
540 RTA_DATA(adtb[IFLA_BOND_AD_INFO_PARTNER_MAC]);
541 SPRINT_BUF(b);
542 fprintf(f, "ad_partner_mac %s ",
543 ll_addr_n2a(p, ETH_ALEN, 0, b, sizeof(b)));
544 }
545 }
6fc1f8ad
JT
546
547 if (tb[IFLA_BOND_AD_ACTOR_SYS_PRIO]) {
548 fprintf(f, "ad_actor_sys_prio %u ",
549 rta_getattr_u16(tb[IFLA_BOND_AD_ACTOR_SYS_PRIO]));
550 }
551
552 if (tb[IFLA_BOND_AD_USER_PORT_KEY]) {
553 fprintf(f, "ad_user_port_key %u ",
554 rta_getattr_u16(tb[IFLA_BOND_AD_USER_PORT_KEY]));
555 }
556
557 if (tb[IFLA_BOND_AD_ACTOR_SYSTEM]) {
558 /* We assume the l2 address is an Ethernet MAC address */
559 SPRINT_BUF(b1);
560 fprintf(f, "ad_actor_system %s ",
561 ll_addr_n2a(RTA_DATA(tb[IFLA_BOND_AD_ACTOR_SYSTEM]),
562 RTA_PAYLOAD(tb[IFLA_BOND_AD_ACTOR_SYSTEM]),
563 1 /*ARPHDR_ETHER*/, b1, sizeof(b1)));
564 }
d02e4662
NA
565
566 if (tb[IFLA_BOND_TLB_DYNAMIC_LB]) {
567 fprintf(f, "tlb_dynamic_lb %u ",
568 rta_getattr_u8(tb[IFLA_BOND_TLB_DYNAMIC_LB]));
569 }
cc26a890
JP
570}
571
561e650e 572static void bond_print_help(struct link_util *lu, int argc, char **argv,
573 FILE *f)
574{
575 print_explain(f);
576}
577
cc26a890
JP
578struct link_util bond_link_util = {
579 .id = "bond",
580 .maxattr = IFLA_BOND_MAX,
581 .parse_opt = bond_parse_opt,
582 .print_opt = bond_print_opt,
561e650e 583 .print_help = bond_print_help,
cc26a890 584};