2 * iplink_bridge_slave.c Bridge slave device support
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
9 * Authors: Jiri Pirko <jiri@resnulli.us>
13 #include <sys/socket.h>
14 #include <netinet/in.h>
15 #include <linux/if_link.h>
16 #include <linux/if_bridge.h>
20 #include "ip_common.h"
22 static void print_explain(FILE *f
)
25 "Usage: ... bridge_slave [ fdb_flush ]\n"
27 " [ priority PRIO ]\n"
29 " [ guard {on | off} ]\n"
30 " [ hairpin {on | off} ]\n"
31 " [ fastleave {on | off} ]\n"
32 " [ root_block {on | off} ]\n"
33 " [ learning {on | off} ]\n"
34 " [ flood {on | off} ]\n"
35 " [ proxy_arp {on | off} ]\n"
36 " [ proxy_arp_wifi {on | off} ]\n"
37 " [ mcast_router MULTICAST_ROUTER ]\n"
38 " [ mcast_fast_leave {on | off} ]\n"
39 " [ mcast_flood {on | off} ]\n"
40 " [ mcast_to_unicast {on | off} ]\n"
41 " [ group_fwd_mask MASK ]\n"
42 " [ neigh_suppress {on | off} ]\n"
43 " [ vlan_tunnel {on | off} ]\n"
44 " [ isolated {on | off} ]\n"
45 " [ backup_port DEVICE ] [ nobackup_port ]\n"
49 static void explain(void)
51 print_explain(stderr
);
54 static const char *port_states
[] = {
55 [BR_STATE_DISABLED
] = "disabled",
56 [BR_STATE_LISTENING
] = "listening",
57 [BR_STATE_LEARNING
] = "learning",
58 [BR_STATE_FORWARDING
] = "forwarding",
59 [BR_STATE_BLOCKING
] = "blocking",
62 static const char *fwd_mask_tbl
[16] = {
68 static void print_portstate(FILE *f
, __u8 state
)
70 if (state
<= BR_STATE_BLOCKING
)
71 print_string(PRINT_ANY
,
76 print_int(PRINT_ANY
, "state_index", "state (%d) ", state
);
79 static void _print_timer(FILE *f
, const char *attr
, struct rtattr
*timer
)
83 __jiffies_to_tv(&tv
, rta_getattr_u64(timer
));
84 if (is_json_context()) {
85 json_writer_t
*jw
= get_json_writer();
88 jsonw_printf(jw
, "%i.%.2i",
89 (int)tv
.tv_sec
, (int)tv
.tv_usec
/ 10000);
91 fprintf(f
, "%s %4i.%.2i ", attr
, (int)tv
.tv_sec
,
92 (int)tv
.tv_usec
/ 10000);
96 static void _bitmask2str(__u16 bitmask
, char *dst
, size_t dst_size
,
101 for (i
= 0, len
= 0; bitmask
; i
++, bitmask
>>= 1) {
104 len
+= snprintf(dst
+ len
, dst_size
- len
, "%s,",
107 len
+= snprintf(dst
+ len
, dst_size
- len
, "0x%x,",
113 snprintf(dst
, dst_size
, "0x0");
118 static void bridge_slave_print_opt(struct link_util
*lu
, FILE *f
,
124 if (tb
[IFLA_BRPORT_STATE
])
125 print_portstate(f
, rta_getattr_u8(tb
[IFLA_BRPORT_STATE
]));
127 if (tb
[IFLA_BRPORT_PRIORITY
])
131 rta_getattr_u16(tb
[IFLA_BRPORT_PRIORITY
]));
133 if (tb
[IFLA_BRPORT_COST
])
137 rta_getattr_u32(tb
[IFLA_BRPORT_COST
]));
139 if (tb
[IFLA_BRPORT_MODE
])
140 print_on_off(PRINT_ANY
, "hairpin", "hairpin %s ",
141 rta_getattr_u8(tb
[IFLA_BRPORT_MODE
]));
143 if (tb
[IFLA_BRPORT_GUARD
])
144 print_on_off(PRINT_ANY
, "guard", "guard %s ",
145 rta_getattr_u8(tb
[IFLA_BRPORT_GUARD
]));
147 if (tb
[IFLA_BRPORT_PROTECT
])
148 print_on_off(PRINT_ANY
, "root_block", "root_block %s ",
149 rta_getattr_u8(tb
[IFLA_BRPORT_PROTECT
]));
151 if (tb
[IFLA_BRPORT_FAST_LEAVE
])
152 print_on_off(PRINT_ANY
, "fastleave", "fastleave %s ",
153 rta_getattr_u8(tb
[IFLA_BRPORT_FAST_LEAVE
]));
155 if (tb
[IFLA_BRPORT_LEARNING
])
156 print_on_off(PRINT_ANY
, "learning", "learning %s ",
157 rta_getattr_u8(tb
[IFLA_BRPORT_LEARNING
]));
159 if (tb
[IFLA_BRPORT_UNICAST_FLOOD
])
160 print_on_off(PRINT_ANY
, "flood", "flood %s ",
161 rta_getattr_u8(tb
[IFLA_BRPORT_UNICAST_FLOOD
]));
163 if (tb
[IFLA_BRPORT_ID
])
164 print_0xhex(PRINT_ANY
, "id", "port_id %#llx ",
165 rta_getattr_u16(tb
[IFLA_BRPORT_ID
]));
167 if (tb
[IFLA_BRPORT_NO
])
168 print_0xhex(PRINT_ANY
, "no", "port_no %#llx ",
169 rta_getattr_u16(tb
[IFLA_BRPORT_NO
]));
171 if (tb
[IFLA_BRPORT_DESIGNATED_PORT
])
172 print_uint(PRINT_ANY
,
174 "designated_port %u ",
175 rta_getattr_u16(tb
[IFLA_BRPORT_DESIGNATED_PORT
]));
177 if (tb
[IFLA_BRPORT_DESIGNATED_COST
])
178 print_uint(PRINT_ANY
,
180 "designated_cost %u ",
181 rta_getattr_u16(tb
[IFLA_BRPORT_DESIGNATED_COST
]));
183 if (tb
[IFLA_BRPORT_BRIDGE_ID
]) {
186 br_dump_bridge_id(RTA_DATA(tb
[IFLA_BRPORT_BRIDGE_ID
]),
187 bridge_id
, sizeof(bridge_id
));
188 print_string(PRINT_ANY
,
190 "designated_bridge %s ",
194 if (tb
[IFLA_BRPORT_ROOT_ID
]) {
197 br_dump_bridge_id(RTA_DATA(tb
[IFLA_BRPORT_ROOT_ID
]),
198 root_id
, sizeof(root_id
));
199 print_string(PRINT_ANY
,
201 "designated_root %s ", root_id
);
204 if (tb
[IFLA_BRPORT_HOLD_TIMER
])
205 _print_timer(f
, "hold_timer", tb
[IFLA_BRPORT_HOLD_TIMER
]);
207 if (tb
[IFLA_BRPORT_MESSAGE_AGE_TIMER
])
208 _print_timer(f
, "message_age_timer",
209 tb
[IFLA_BRPORT_MESSAGE_AGE_TIMER
]);
211 if (tb
[IFLA_BRPORT_FORWARD_DELAY_TIMER
])
212 _print_timer(f
, "forward_delay_timer",
213 tb
[IFLA_BRPORT_FORWARD_DELAY_TIMER
]);
215 if (tb
[IFLA_BRPORT_TOPOLOGY_CHANGE_ACK
])
216 print_uint(PRINT_ANY
,
217 "topology_change_ack",
218 "topology_change_ack %u ",
219 rta_getattr_u8(tb
[IFLA_BRPORT_TOPOLOGY_CHANGE_ACK
]));
221 if (tb
[IFLA_BRPORT_CONFIG_PENDING
])
222 print_uint(PRINT_ANY
,
224 "config_pending %u ",
225 rta_getattr_u8(tb
[IFLA_BRPORT_CONFIG_PENDING
]));
227 if (tb
[IFLA_BRPORT_PROXYARP
])
228 print_on_off(PRINT_ANY
, "proxy_arp", "proxy_arp %s ",
229 rta_getattr_u8(tb
[IFLA_BRPORT_PROXYARP
]));
231 if (tb
[IFLA_BRPORT_PROXYARP_WIFI
])
232 print_on_off(PRINT_ANY
, "proxy_arp_wifi", "proxy_arp_wifi %s ",
233 rta_getattr_u8(tb
[IFLA_BRPORT_PROXYARP_WIFI
]));
235 if (tb
[IFLA_BRPORT_MULTICAST_ROUTER
])
236 print_uint(PRINT_ANY
,
239 rta_getattr_u8(tb
[IFLA_BRPORT_MULTICAST_ROUTER
]));
241 if (tb
[IFLA_BRPORT_FAST_LEAVE
])
242 // not printing any json here because
243 // we already printed fast_leave before
244 print_string(PRINT_FP
,
246 "mcast_fast_leave %s ",
247 rta_getattr_u8(tb
[IFLA_BRPORT_FAST_LEAVE
]) ? "on" : "off");
249 if (tb
[IFLA_BRPORT_MCAST_FLOOD
])
250 print_on_off(PRINT_ANY
, "mcast_flood", "mcast_flood %s ",
251 rta_getattr_u8(tb
[IFLA_BRPORT_MCAST_FLOOD
]));
253 if (tb
[IFLA_BRPORT_MCAST_TO_UCAST
])
254 print_on_off(PRINT_ANY
, "mcast_to_unicast", "mcast_to_unicast %s ",
255 rta_getattr_u8(tb
[IFLA_BRPORT_MCAST_TO_UCAST
]));
257 if (tb
[IFLA_BRPORT_NEIGH_SUPPRESS
])
258 print_on_off(PRINT_ANY
, "neigh_suppress", "neigh_suppress %s ",
259 rta_getattr_u8(tb
[IFLA_BRPORT_NEIGH_SUPPRESS
]));
261 if (tb
[IFLA_BRPORT_GROUP_FWD_MASK
]) {
265 fwd_mask
= rta_getattr_u16(tb
[IFLA_BRPORT_GROUP_FWD_MASK
]);
266 print_0xhex(PRINT_ANY
, "group_fwd_mask",
267 "group_fwd_mask %#llx ", fwd_mask
);
268 _bitmask2str(fwd_mask
, convbuf
, sizeof(convbuf
), fwd_mask_tbl
);
269 print_string(PRINT_ANY
, "group_fwd_mask_str",
270 "group_fwd_mask_str %s ", convbuf
);
273 if (tb
[IFLA_BRPORT_VLAN_TUNNEL
])
274 print_on_off(PRINT_ANY
, "vlan_tunnel", "vlan_tunnel %s ",
275 rta_getattr_u8(tb
[IFLA_BRPORT_VLAN_TUNNEL
]));
277 if (tb
[IFLA_BRPORT_ISOLATED
])
278 print_on_off(PRINT_ANY
, "isolated", "isolated %s ",
279 rta_getattr_u8(tb
[IFLA_BRPORT_ISOLATED
]));
281 if (tb
[IFLA_BRPORT_BACKUP_PORT
]) {
282 int backup_p
= rta_getattr_u32(tb
[IFLA_BRPORT_BACKUP_PORT
]);
284 print_string(PRINT_ANY
, "backup_port", "backup_port %s ",
285 ll_index_to_name(backup_p
));
289 static void bridge_slave_parse_on_off(char *arg_name
, char *arg_val
,
290 struct nlmsghdr
*n
, int type
)
293 __u8 val
= parse_on_off(arg_name
, arg_val
, &ret
);
297 addattr8(n
, 1024, type
, val
);
300 static int bridge_slave_parse_opt(struct link_util
*lu
, int argc
, char **argv
,
308 if (matches(*argv
, "fdb_flush") == 0) {
309 addattr(n
, 1024, IFLA_BRPORT_FLUSH
);
310 } else if (matches(*argv
, "state") == 0) {
312 if (get_u8(&state
, *argv
, 0))
313 invarg("state is invalid", *argv
);
314 addattr8(n
, 1024, IFLA_BRPORT_STATE
, state
);
315 } else if (matches(*argv
, "priority") == 0) {
317 if (get_u16(&priority
, *argv
, 0))
318 invarg("priority is invalid", *argv
);
319 addattr16(n
, 1024, IFLA_BRPORT_PRIORITY
, priority
);
320 } else if (matches(*argv
, "cost") == 0) {
322 if (get_u32(&cost
, *argv
, 0))
323 invarg("cost is invalid", *argv
);
324 addattr32(n
, 1024, IFLA_BRPORT_COST
, cost
);
325 } else if (matches(*argv
, "hairpin") == 0) {
327 bridge_slave_parse_on_off("hairpin", *argv
, n
,
329 } else if (matches(*argv
, "guard") == 0) {
331 bridge_slave_parse_on_off("guard", *argv
, n
,
333 } else if (matches(*argv
, "root_block") == 0) {
335 bridge_slave_parse_on_off("root_block", *argv
, n
,
336 IFLA_BRPORT_PROTECT
);
337 } else if (matches(*argv
, "fastleave") == 0) {
339 bridge_slave_parse_on_off("fastleave", *argv
, n
,
340 IFLA_BRPORT_FAST_LEAVE
);
341 } else if (matches(*argv
, "learning") == 0) {
343 bridge_slave_parse_on_off("learning", *argv
, n
,
344 IFLA_BRPORT_LEARNING
);
345 } else if (matches(*argv
, "flood") == 0) {
347 bridge_slave_parse_on_off("flood", *argv
, n
,
348 IFLA_BRPORT_UNICAST_FLOOD
);
349 } else if (matches(*argv
, "mcast_flood") == 0) {
351 bridge_slave_parse_on_off("mcast_flood", *argv
, n
,
352 IFLA_BRPORT_MCAST_FLOOD
);
353 } else if (matches(*argv
, "mcast_to_unicast") == 0) {
355 bridge_slave_parse_on_off("mcast_to_unicast", *argv
, n
,
356 IFLA_BRPORT_MCAST_TO_UCAST
);
357 } else if (matches(*argv
, "proxy_arp") == 0) {
359 bridge_slave_parse_on_off("proxy_arp", *argv
, n
,
360 IFLA_BRPORT_PROXYARP
);
361 } else if (matches(*argv
, "proxy_arp_wifi") == 0) {
363 bridge_slave_parse_on_off("proxy_arp_wifi", *argv
, n
,
364 IFLA_BRPORT_PROXYARP_WIFI
);
365 } else if (matches(*argv
, "mcast_router") == 0) {
369 if (get_u8(&mcast_router
, *argv
, 0))
370 invarg("invalid mcast_router", *argv
);
371 addattr8(n
, 1024, IFLA_BRPORT_MULTICAST_ROUTER
,
373 } else if (matches(*argv
, "mcast_fast_leave") == 0) {
375 bridge_slave_parse_on_off("mcast_fast_leave", *argv
, n
,
376 IFLA_BRPORT_FAST_LEAVE
);
377 } else if (matches(*argv
, "neigh_suppress") == 0) {
379 bridge_slave_parse_on_off("neigh_suppress", *argv
, n
,
380 IFLA_BRPORT_NEIGH_SUPPRESS
);
381 } else if (matches(*argv
, "group_fwd_mask") == 0) {
385 if (get_u16(&mask
, *argv
, 0))
386 invarg("invalid group_fwd_mask", *argv
);
387 addattr16(n
, 1024, IFLA_BRPORT_GROUP_FWD_MASK
, mask
);
388 } else if (matches(*argv
, "vlan_tunnel") == 0) {
390 bridge_slave_parse_on_off("vlan_tunnel", *argv
, n
,
391 IFLA_BRPORT_VLAN_TUNNEL
);
392 } else if (matches(*argv
, "isolated") == 0) {
394 bridge_slave_parse_on_off("isolated", *argv
, n
,
395 IFLA_BRPORT_ISOLATED
);
396 } else if (matches(*argv
, "backup_port") == 0) {
400 ifindex
= ll_name_to_index(*argv
);
402 invarg("Device does not exist\n", *argv
);
403 addattr32(n
, 1024, IFLA_BRPORT_BACKUP_PORT
, ifindex
);
404 } else if (matches(*argv
, "nobackup_port") == 0) {
405 addattr32(n
, 1024, IFLA_BRPORT_BACKUP_PORT
, 0);
406 } else if (matches(*argv
, "help") == 0) {
410 fprintf(stderr
, "bridge_slave: unknown option \"%s\"?\n",
421 static void bridge_slave_print_help(struct link_util
*lu
, int argc
, char **argv
,
427 struct link_util bridge_slave_link_util
= {
428 .id
= "bridge_slave",
429 .maxattr
= IFLA_BRPORT_MAX
,
430 .print_opt
= bridge_slave_print_opt
,
431 .parse_opt
= bridge_slave_parse_opt
,
432 .print_help
= bridge_slave_print_help
,
433 .parse_ifla_xstats
= bridge_parse_xstats
,
434 .print_ifla_xstats
= bridge_print_xstats
,