]>
Commit | Line | Data |
---|---|---|
6054c1eb | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
d04bc300 SH |
2 | /* |
3 | * Get/set/delete fdb table with netlink | |
4 | * | |
0849e60a SH |
5 | * TODO: merge/replace this with ip neighbour |
6 | * | |
d04bc300 SH |
7 | * Authors: Stephen Hemminger <shemminger@vyatta.com> |
8 | */ | |
9 | ||
10 | #include <stdio.h> | |
11 | #include <stdlib.h> | |
12 | #include <unistd.h> | |
5f409678 | 13 | #include <netdb.h> |
d04bc300 SH |
14 | #include <time.h> |
15 | #include <fcntl.h> | |
16 | #include <sys/socket.h> | |
17 | #include <sys/time.h> | |
18 | #include <net/if.h> | |
19 | #include <netinet/in.h> | |
20 | #include <linux/if_bridge.h> | |
21 | #include <linux/if_ether.h> | |
22 | #include <linux/neighbour.h> | |
23 | #include <string.h> | |
dd9cc0ee | 24 | #include <limits.h> |
b239c56e | 25 | #include <stdbool.h> |
d04bc300 | 26 | |
c7c1a1ef | 27 | #include "json_print.h" |
d04bc300 SH |
28 | #include "libnetlink.h" |
29 | #include "br_common.h" | |
0849e60a | 30 | #include "rt_names.h" |
d04bc300 SH |
31 | #include "utils.h" |
32 | ||
66b4199f | 33 | static unsigned int filter_index, filter_vlan, filter_state, filter_master; |
d04bc300 SH |
34 | |
35 | static void usage(void) | |
36 | { | |
bcddcddd SH |
37 | fprintf(stderr, |
38 | "Usage: bridge fdb { add | append | del | replace } ADDR dev DEV\n" | |
b4f84bf8 | 39 | " [ self ] [ master ] [ use ] [ router ] [ extern_learn ]\n" |
c3ded6e4 NA |
40 | " [ sticky ] [ local | static | dynamic ] [ dst IPADDR ]\n" |
41 | " [ vlan VID ] [ port PORT] [ vni VNI ] [ via DEV ]\n" | |
bcddcddd | 42 | " bridge fdb [ show [ br BRDEV ] [ brport DEV ] [ vlan VID ] [ state STATE ] ]\n"); |
d04bc300 SH |
43 | exit(-1); |
44 | } | |
45 | ||
df4b043f | 46 | static const char *state_n2a(unsigned int s) |
d04bc300 SH |
47 | { |
48 | static char buf[32]; | |
49 | ||
0849e60a SH |
50 | if (s & NUD_PERMANENT) |
51 | return "permanent"; | |
d04bc300 SH |
52 | |
53 | if (s & NUD_NOARP) | |
54 | return "static"; | |
55 | ||
56 | if (s & NUD_STALE) | |
57 | return "stale"; | |
0849e60a | 58 | |
d04bc300 SH |
59 | if (s & NUD_REACHABLE) |
60 | return ""; | |
61 | ||
62 | sprintf(buf, "state=%#x", s); | |
63 | return buf; | |
64 | } | |
65 | ||
7f10090b NA |
66 | static int state_a2n(unsigned int *s, const char *arg) |
67 | { | |
68 | if (matches(arg, "permanent") == 0) | |
69 | *s = NUD_PERMANENT; | |
70 | else if (matches(arg, "static") == 0 || matches(arg, "temp") == 0) | |
71 | *s = NUD_NOARP; | |
72 | else if (matches(arg, "stale") == 0) | |
73 | *s = NUD_STALE; | |
74 | else if (matches(arg, "reachable") == 0 || matches(arg, "dynamic") == 0) | |
75 | *s = NUD_REACHABLE; | |
76 | else if (strcmp(arg, "all") == 0) | |
77 | *s = ~0; | |
78 | else if (get_unsigned(s, arg, 0)) | |
79 | return -1; | |
80 | ||
81 | return 0; | |
82 | } | |
83 | ||
c7c1a1ef SH |
84 | static void fdb_print_flags(FILE *fp, unsigned int flags) |
85 | { | |
86 | open_json_array(PRINT_JSON, | |
87 | is_json_context() ? "flags" : ""); | |
88 | ||
89 | if (flags & NTF_SELF) | |
90 | print_string(PRINT_ANY, NULL, "%s ", "self"); | |
91 | ||
92 | if (flags & NTF_ROUTER) | |
93 | print_string(PRINT_ANY, NULL, "%s ", "router"); | |
94 | ||
95 | if (flags & NTF_EXT_LEARNED) | |
96 | print_string(PRINT_ANY, NULL, "%s ", "extern_learn"); | |
97 | ||
98 | if (flags & NTF_OFFLOADED) | |
99 | print_string(PRINT_ANY, NULL, "%s ", "offload"); | |
100 | ||
101 | if (flags & NTF_MASTER) | |
102 | print_string(PRINT_ANY, NULL, "%s ", "master"); | |
103 | ||
c3ded6e4 NA |
104 | if (flags & NTF_STICKY) |
105 | print_string(PRINT_ANY, NULL, "%s ", "sticky"); | |
106 | ||
c7c1a1ef SH |
107 | close_json_array(PRINT_JSON, NULL); |
108 | } | |
109 | ||
110 | static void fdb_print_stats(FILE *fp, const struct nda_cacheinfo *ci) | |
b239c56e | 111 | { |
c7c1a1ef SH |
112 | static int hz; |
113 | ||
114 | if (!hz) | |
115 | hz = get_user_hz(); | |
116 | ||
117 | if (is_json_context()) { | |
118 | print_uint(PRINT_JSON, "used", NULL, | |
119 | ci->ndm_used / hz); | |
120 | print_uint(PRINT_JSON, "updated", NULL, | |
121 | ci->ndm_updated / hz); | |
122 | } else { | |
123 | fprintf(fp, "used %d/%d ", ci->ndm_used / hz, | |
124 | ci->ndm_updated / hz); | |
125 | ||
126 | } | |
b239c56e AK |
127 | } |
128 | ||
cd554f2c | 129 | int print_fdb(struct nlmsghdr *n, void *arg) |
d04bc300 | 130 | { |
0849e60a | 131 | FILE *fp = arg; |
d04bc300 SH |
132 | struct ndmsg *r = NLMSG_DATA(n); |
133 | int len = n->nlmsg_len; | |
df4b043f | 134 | struct rtattr *tb[NDA_MAX+1]; |
ae6eb907 | 135 | __u16 vid = 0; |
0849e60a SH |
136 | |
137 | if (n->nlmsg_type != RTM_NEWNEIGH && n->nlmsg_type != RTM_DELNEIGH) { | |
138 | fprintf(stderr, "Not RTM_NEWNEIGH: %08x %08x %08x\n", | |
139 | n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags); | |
0849e60a SH |
140 | return 0; |
141 | } | |
d04bc300 SH |
142 | |
143 | len -= NLMSG_LENGTH(sizeof(*r)); | |
144 | if (len < 0) { | |
145 | fprintf(stderr, "BUG: wrong nlmsg len %d\n", len); | |
146 | return -1; | |
147 | } | |
148 | ||
149 | if (r->ndm_family != AF_BRIDGE) | |
150 | return 0; | |
151 | ||
152 | if (filter_index && filter_index != r->ndm_ifindex) | |
153 | return 0; | |
154 | ||
7f10090b NA |
155 | if (filter_state && !(r->ndm_state & filter_state)) |
156 | return 0; | |
157 | ||
d04bc300 SH |
158 | parse_rtattr(tb, NDA_MAX, NDA_RTA(r), |
159 | n->nlmsg_len - NLMSG_LENGTH(sizeof(*r))); | |
160 | ||
ae6eb907 NA |
161 | if (tb[NDA_VLAN]) |
162 | vid = rta_getattr_u16(tb[NDA_VLAN]); | |
163 | ||
164 | if (filter_vlan && filter_vlan != vid) | |
165 | return 0; | |
166 | ||
c7c1a1ef SH |
167 | open_json_object(NULL); |
168 | if (n->nlmsg_type == RTM_DELNEIGH) | |
169 | print_bool(PRINT_ANY, "deleted", "Deleted ", true); | |
0849e60a SH |
170 | |
171 | if (tb[NDA_LLADDR]) { | |
c7c1a1ef | 172 | const char *lladdr; |
0849e60a | 173 | SPRINT_BUF(b1); |
c7c1a1ef SH |
174 | |
175 | lladdr = ll_addr_n2a(RTA_DATA(tb[NDA_LLADDR]), | |
176 | RTA_PAYLOAD(tb[NDA_LLADDR]), | |
177 | ll_index_to_type(r->ndm_ifindex), | |
178 | b1, sizeof(b1)); | |
179 | ||
180 | print_color_string(PRINT_ANY, COLOR_MAC, | |
181 | "mac", "%s ", lladdr); | |
d04bc300 | 182 | } |
38df7ac9 | 183 | |
a795211f | 184 | if (!filter_index && r->ndm_ifindex) |
c7c1a1ef | 185 | print_color_string(PRINT_ANY, COLOR_IFNAME, |
4abb8c72 | 186 | "ifname", "dev %s ", |
c7c1a1ef | 187 | ll_index_to_name(r->ndm_ifindex)); |
0849e60a SH |
188 | |
189 | if (tb[NDA_DST]) { | |
9e763fa5 | 190 | int family = AF_INET; |
c7c1a1ef | 191 | const char *dst; |
9e763fa5 MR |
192 | |
193 | if (RTA_PAYLOAD(tb[NDA_DST]) == sizeof(struct in6_addr)) | |
194 | family = AF_INET6; | |
195 | ||
c7c1a1ef SH |
196 | dst = format_host(family, |
197 | RTA_PAYLOAD(tb[NDA_DST]), | |
198 | RTA_DATA(tb[NDA_DST])); | |
b239c56e | 199 | |
c7c1a1ef SH |
200 | print_color_string(PRINT_ANY, |
201 | ifa_family_color(family), | |
4abb8c72 | 202 | "dst", "dst %s ", dst); |
b239c56e AK |
203 | } |
204 | ||
c7c1a1ef SH |
205 | if (vid) |
206 | print_uint(PRINT_ANY, | |
207 | "vlan", "vlan %hu ", vid); | |
38df7ac9 | 208 | |
c7c1a1ef SH |
209 | if (tb[NDA_PORT]) |
210 | print_uint(PRINT_ANY, | |
211 | "port", "port %u ", | |
212 | rta_getattr_be16(tb[NDA_PORT])); | |
fd08839c | 213 | |
c7c1a1ef SH |
214 | if (tb[NDA_VNI]) |
215 | print_uint(PRINT_ANY, | |
216 | "vni", "vni %u ", | |
217 | rta_getattr_u32(tb[NDA_VNI])); | |
218 | ||
219 | if (tb[NDA_SRC_VNI]) | |
220 | print_uint(PRINT_ANY, | |
221 | "src_vni", "src_vni %u ", | |
86d0988b | 222 | rta_getattr_u32(tb[NDA_SRC_VNI])); |
86d0988b | 223 | |
5f409678 DS |
224 | if (tb[NDA_IFINDEX]) { |
225 | unsigned int ifindex = rta_getattr_u32(tb[NDA_IFINDEX]); | |
226 | ||
c7c1a1ef SH |
227 | if (tb[NDA_LINK_NETNSID]) |
228 | print_uint(PRINT_ANY, | |
229 | "viaIfIndex", "via ifindex %u ", | |
230 | ifindex); | |
b239c56e | 231 | else |
c7c1a1ef SH |
232 | print_string(PRINT_ANY, |
233 | "viaIf", "via %s ", | |
234 | ll_index_to_name(ifindex)); | |
b239c56e | 235 | } |
5f409678 | 236 | |
c7c1a1ef SH |
237 | if (tb[NDA_LINK_NETNSID]) |
238 | print_uint(PRINT_ANY, | |
239 | "linkNetNsId", "link-netnsid %d ", | |
240 | rta_getattr_u32(tb[NDA_LINK_NETNSID])); | |
d04bc300 | 241 | |
c7c1a1ef SH |
242 | if (show_stats && tb[NDA_CACHEINFO]) |
243 | fdb_print_stats(fp, RTA_DATA(tb[NDA_CACHEINFO])); | |
b239c56e | 244 | |
c7c1a1ef | 245 | fdb_print_flags(fp, r->ndm_flags); |
b239c56e | 246 | |
b239c56e | 247 | |
c7c1a1ef | 248 | if (tb[NDA_MASTER]) |
4abb8c72 | 249 | print_string(PRINT_ANY, "master", "master %s ", |
c7c1a1ef | 250 | ll_index_to_name(rta_getattr_u32(tb[NDA_MASTER]))); |
4d45bf3b | 251 | |
c7c1a1ef SH |
252 | print_string(PRINT_ANY, "state", "%s\n", |
253 | state_n2a(r->ndm_state)); | |
254 | close_json_object(); | |
255 | fflush(fp); | |
d04bc300 SH |
256 | return 0; |
257 | } | |
258 | ||
05880354 DA |
259 | static int fdb_linkdump_filter(struct nlmsghdr *nlh, int reqlen) |
260 | { | |
261 | int err; | |
262 | ||
263 | if (filter_index) { | |
264 | struct ifinfomsg *ifm = NLMSG_DATA(nlh); | |
265 | ||
266 | ifm->ifi_index = filter_index; | |
267 | } | |
268 | ||
269 | if (filter_master) { | |
270 | err = addattr32(nlh, reqlen, IFLA_MASTER, filter_master); | |
271 | if (err) | |
272 | return err; | |
273 | } | |
274 | ||
275 | return 0; | |
276 | } | |
277 | ||
66b4199f | 278 | static int fdb_dump_filter(struct nlmsghdr *nlh, int reqlen) |
d04bc300 | 279 | { |
66b4199f DA |
280 | int err; |
281 | ||
282 | if (filter_index) { | |
283 | struct ndmsg *ndm = NLMSG_DATA(nlh); | |
aeb14eb0 | 284 | |
66b4199f DA |
285 | ndm->ndm_ifindex = filter_index; |
286 | } | |
287 | ||
288 | if (filter_master) { | |
289 | err = addattr32(nlh, reqlen, NDA_MASTER, filter_master); | |
290 | if (err) | |
291 | return err; | |
292 | } | |
293 | ||
294 | return 0; | |
295 | } | |
296 | ||
297 | static int fdb_show(int argc, char **argv) | |
298 | { | |
d04bc300 | 299 | char *filter_dev = NULL; |
aeb14eb0 | 300 | char *br = NULL; |
05880354 | 301 | int rc; |
aeb14eb0 | 302 | |
d04bc300 | 303 | while (argc > 0) { |
aeb14eb0 | 304 | if ((strcmp(*argv, "brport") == 0) || strcmp(*argv, "dev") == 0) { |
d04bc300 | 305 | NEXT_ARG(); |
d04bc300 | 306 | filter_dev = *argv; |
aeb14eb0 JHS |
307 | } else if (strcmp(*argv, "br") == 0) { |
308 | NEXT_ARG(); | |
309 | br = *argv; | |
ae6eb907 NA |
310 | } else if (strcmp(*argv, "vlan") == 0) { |
311 | NEXT_ARG(); | |
312 | if (filter_vlan) | |
313 | duparg("vlan", *argv); | |
314 | filter_vlan = atoi(*argv); | |
7f10090b NA |
315 | } else if (strcmp(*argv, "state") == 0) { |
316 | unsigned int state; | |
317 | ||
318 | NEXT_ARG(); | |
319 | if (state_a2n(&state, *argv)) | |
320 | invarg("invalid state", *argv); | |
321 | filter_state |= state; | |
aeb14eb0 JHS |
322 | } else { |
323 | if (matches(*argv, "help") == 0) | |
324 | usage(); | |
d04bc300 SH |
325 | } |
326 | argc--; argv++; | |
327 | } | |
328 | ||
aeb14eb0 JHS |
329 | if (br) { |
330 | int br_ifindex = ll_name_to_index(br); | |
df4b043f | 331 | |
aeb14eb0 JHS |
332 | if (br_ifindex == 0) { |
333 | fprintf(stderr, "Cannot find bridge device \"%s\"\n", br); | |
334 | return -1; | |
335 | } | |
66b4199f | 336 | filter_master = br_ifindex; |
aeb14eb0 JHS |
337 | } |
338 | ||
339 | /*we'll keep around filter_dev for older kernels */ | |
d04bc300 | 340 | if (filter_dev) { |
7a14358b | 341 | filter_index = ll_name_to_index(filter_dev); |
fe99adbc SP |
342 | if (!filter_index) |
343 | return nodev(filter_dev); | |
d04bc300 SH |
344 | } |
345 | ||
05880354 DA |
346 | if (rth.flags & RTNL_HANDLE_F_STRICT_CHK) |
347 | rc = rtnl_neighdump_req(&rth, PF_BRIDGE, fdb_dump_filter); | |
348 | else | |
264be1d8 | 349 | rc = rtnl_fdb_linkdump_req_filter_fn(&rth, fdb_linkdump_filter); |
05880354 | 350 | if (rc < 0) { |
d04bc300 SH |
351 | perror("Cannot send dump request"); |
352 | exit(1); | |
353 | } | |
d04bc300 | 354 | |
c7c1a1ef | 355 | new_json_obj(json); |
0849e60a | 356 | if (rtnl_dump_filter(&rth, print_fdb, stdout) < 0) { |
d04bc300 SH |
357 | fprintf(stderr, "Dump terminated\n"); |
358 | exit(1); | |
359 | } | |
c7c1a1ef SH |
360 | delete_json_obj(); |
361 | fflush(stdout); | |
d04bc300 SH |
362 | |
363 | return 0; | |
364 | } | |
365 | ||
366 | static int fdb_modify(int cmd, int flags, int argc, char **argv) | |
367 | { | |
368 | struct { | |
df4b043f SH |
369 | struct nlmsghdr n; |
370 | struct ndmsg ndm; | |
371 | char buf[256]; | |
d17b136f PS |
372 | } req = { |
373 | .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg)), | |
374 | .n.nlmsg_flags = NLM_F_REQUEST | flags, | |
375 | .n.nlmsg_type = cmd, | |
376 | .ndm.ndm_family = PF_BRIDGE, | |
377 | .ndm.ndm_state = NUD_NOARP, | |
378 | }; | |
d04bc300 SH |
379 | char *addr = NULL; |
380 | char *d = NULL; | |
381 | char abuf[ETH_ALEN]; | |
0849e60a SH |
382 | int dst_ok = 0; |
383 | inet_prefix dst; | |
5f409678 DS |
384 | unsigned long port = 0; |
385 | unsigned long vni = ~0; | |
386 | unsigned int via = 0; | |
387 | char *endptr; | |
fd08839c | 388 | short vid = -1; |
d04bc300 | 389 | |
d04bc300 SH |
390 | while (argc > 0) { |
391 | if (strcmp(*argv, "dev") == 0) { | |
392 | NEXT_ARG(); | |
393 | d = *argv; | |
0849e60a SH |
394 | } else if (strcmp(*argv, "dst") == 0) { |
395 | NEXT_ARG(); | |
396 | if (dst_ok) | |
397 | duparg2("dst", *argv); | |
398 | get_addr(&dst, *argv, preferred_family); | |
399 | dst_ok = 1; | |
5f409678 DS |
400 | } else if (strcmp(*argv, "port") == 0) { |
401 | ||
402 | NEXT_ARG(); | |
403 | port = strtoul(*argv, &endptr, 0); | |
404 | if (endptr && *endptr) { | |
405 | struct servent *pse; | |
406 | ||
407 | pse = getservbyname(*argv, "udp"); | |
408 | if (!pse) | |
409 | invarg("invalid port\n", *argv); | |
410 | port = ntohs(pse->s_port); | |
411 | } else if (port > 0xffff) | |
412 | invarg("invalid port\n", *argv); | |
413 | } else if (strcmp(*argv, "vni") == 0) { | |
414 | NEXT_ARG(); | |
415 | vni = strtoul(*argv, &endptr, 0); | |
416 | if ((endptr && *endptr) || | |
417 | (vni >> 24) || vni == ULONG_MAX) | |
418 | invarg("invalid VNI\n", *argv); | |
419 | } else if (strcmp(*argv, "via") == 0) { | |
420 | NEXT_ARG(); | |
7a14358b | 421 | via = ll_name_to_index(*argv); |
fe99adbc SP |
422 | if (!via) |
423 | exit(nodev(*argv)); | |
dc6a6a25 JF |
424 | } else if (strcmp(*argv, "self") == 0) { |
425 | req.ndm.ndm_flags |= NTF_SELF; | |
0849e60a | 426 | } else if (matches(*argv, "master") == 0) { |
dc6a6a25 | 427 | req.ndm.ndm_flags |= NTF_MASTER; |
5b8a1d4a DS |
428 | } else if (matches(*argv, "router") == 0) { |
429 | req.ndm.ndm_flags |= NTF_ROUTER; | |
e9e9365b | 430 | } else if (matches(*argv, "local") == 0 || |
0849e60a SH |
431 | matches(*argv, "permanent") == 0) { |
432 | req.ndm.ndm_state |= NUD_PERMANENT; | |
a1987cd1 RP |
433 | } else if (matches(*argv, "temp") == 0 || |
434 | matches(*argv, "static") == 0) { | |
0849e60a | 435 | req.ndm.ndm_state |= NUD_REACHABLE; |
c6d0cfb5 RP |
436 | } else if (matches(*argv, "dynamic") == 0) { |
437 | req.ndm.ndm_state |= NUD_REACHABLE; | |
438 | req.ndm.ndm_state &= ~NUD_NOARP; | |
fd08839c VY |
439 | } else if (matches(*argv, "vlan") == 0) { |
440 | if (vid >= 0) | |
441 | duparg2("vlan", *argv); | |
442 | NEXT_ARG(); | |
443 | vid = atoi(*argv); | |
cd8df30b RP |
444 | } else if (matches(*argv, "use") == 0) { |
445 | req.ndm.ndm_flags |= NTF_USE; | |
b4f84bf8 RP |
446 | } else if (matches(*argv, "extern_learn") == 0) { |
447 | req.ndm.ndm_flags |= NTF_EXT_LEARNED; | |
c3ded6e4 NA |
448 | } else if (matches(*argv, "sticky") == 0) { |
449 | req.ndm.ndm_flags |= NTF_STICKY; | |
d04bc300 | 450 | } else { |
bcddcddd | 451 | if (strcmp(*argv, "to") == 0) |
d04bc300 | 452 | NEXT_ARG(); |
bcddcddd | 453 | |
0849e60a SH |
454 | if (matches(*argv, "help") == 0) |
455 | usage(); | |
d04bc300 SH |
456 | if (addr) |
457 | duparg2("to", *argv); | |
458 | addr = *argv; | |
459 | } | |
460 | argc--; argv++; | |
461 | } | |
462 | ||
463 | if (d == NULL || addr == NULL) { | |
464 | fprintf(stderr, "Device and address are required arguments.\n"); | |
42ecedd4 | 465 | return -1; |
d04bc300 SH |
466 | } |
467 | ||
0849e60a SH |
468 | /* Assume self */ |
469 | if (!(req.ndm.ndm_flags&(NTF_SELF|NTF_MASTER))) | |
470 | req.ndm.ndm_flags |= NTF_SELF; | |
471 | ||
472 | /* Assume permanent */ | |
473 | if (!(req.ndm.ndm_state&(NUD_PERMANENT|NUD_REACHABLE))) | |
474 | req.ndm.ndm_state |= NUD_PERMANENT; | |
475 | ||
476 | if (sscanf(addr, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx", | |
d04bc300 SH |
477 | abuf, abuf+1, abuf+2, |
478 | abuf+3, abuf+4, abuf+5) != 6) { | |
479 | fprintf(stderr, "Invalid mac address %s\n", addr); | |
42ecedd4 | 480 | return -1; |
d04bc300 SH |
481 | } |
482 | ||
483 | addattr_l(&req.n, sizeof(req), NDA_LLADDR, abuf, ETH_ALEN); | |
0849e60a SH |
484 | if (dst_ok) |
485 | addattr_l(&req.n, sizeof(req), NDA_DST, &dst.data, dst.bytelen); | |
d04bc300 | 486 | |
fd08839c | 487 | if (vid >= 0) |
8ae66094 | 488 | addattr16(&req.n, sizeof(req), NDA_VLAN, vid); |
fd08839c | 489 | |
5f409678 DS |
490 | if (port) { |
491 | unsigned short dport; | |
492 | ||
493 | dport = htons((unsigned short)port); | |
494 | addattr16(&req.n, sizeof(req), NDA_PORT, dport); | |
495 | } | |
496 | if (vni != ~0) | |
497 | addattr32(&req.n, sizeof(req), NDA_VNI, vni); | |
498 | if (via) | |
499 | addattr32(&req.n, sizeof(req), NDA_IFINDEX, via); | |
500 | ||
d04bc300 | 501 | req.ndm.ndm_ifindex = ll_name_to_index(d); |
fe99adbc SP |
502 | if (!req.ndm.ndm_ifindex) |
503 | return nodev(d); | |
d04bc300 | 504 | |
86bf43c7 | 505 | if (rtnl_talk(&rth, &req.n, NULL) < 0) |
42ecedd4 | 506 | return -1; |
d04bc300 SH |
507 | |
508 | return 0; | |
509 | } | |
510 | ||
511 | int do_fdb(int argc, char **argv) | |
512 | { | |
513 | ll_init_map(&rth); | |
514 | ||
515 | if (argc > 0) { | |
516 | if (matches(*argv, "add") == 0) | |
517 | return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_EXCL, argc-1, argv+1); | |
5f409678 DS |
518 | if (matches(*argv, "append") == 0) |
519 | return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_APPEND, argc-1, argv+1); | |
5464049b TR |
520 | if (matches(*argv, "replace") == 0) |
521 | return fdb_modify(RTM_NEWNEIGH, NLM_F_CREATE|NLM_F_REPLACE, argc-1, argv+1); | |
d04bc300 SH |
522 | if (matches(*argv, "delete") == 0) |
523 | return fdb_modify(RTM_DELNEIGH, 0, argc-1, argv+1); | |
524 | if (matches(*argv, "show") == 0 || | |
525 | matches(*argv, "lst") == 0 || | |
526 | matches(*argv, "list") == 0) | |
527 | return fdb_show(argc-1, argv+1); | |
528 | if (matches(*argv, "help") == 0) | |
529 | usage(); | |
530 | } else | |
531 | return fdb_show(0, NULL); | |
532 | ||
083b46bb | 533 | fprintf(stderr, "Command \"%s\" is unknown, try \"bridge fdb help\".\n", *argv); |
d04bc300 SH |
534 | exit(-1); |
535 | } |