]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkctl.c
Merge pull request #31827 from rpigott/resolved-faster-dnssec
[thirdparty/systemd.git] / src / network / networkctl.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <arpa/inet.h>
4 #include <getopt.h>
5 #include <linux/if_addrlabel.h>
6 #include <net/if.h>
7 #include <stdbool.h>
8 #include <sys/stat.h>
9 #include <sys/types.h>
10 #include <unistd.h>
11 #include <linux/if_bridge.h>
12 #include <linux/if_tunnel.h>
13
14 #include "sd-bus.h"
15 #include "sd-device.h"
16 #include "sd-dhcp-client.h"
17 #include "sd-hwdb.h"
18 #include "sd-netlink.h"
19 #include "sd-network.h"
20
21 #include "alloc-util.h"
22 #include "bond-util.h"
23 #include "bridge-util.h"
24 #include "build.h"
25 #include "bus-common-errors.h"
26 #include "bus-error.h"
27 #include "bus-locator.h"
28 #include "device-util.h"
29 #include "escape.h"
30 #include "ether-addr-util.h"
31 #include "ethtool-util.h"
32 #include "fd-util.h"
33 #include "format-table.h"
34 #include "format-util.h"
35 #include "fs-util.h"
36 #include "geneve-util.h"
37 #include "glob-util.h"
38 #include "hwdb-util.h"
39 #include "ipvlan-util.h"
40 #include "local-addresses.h"
41 #include "locale-util.h"
42 #include "logs-show.h"
43 #include "macro.h"
44 #include "macvlan-util.h"
45 #include "main-func.h"
46 #include "netif-util.h"
47 #include "netlink-util.h"
48 #include "network-internal.h"
49 #include "network-util.h"
50 #include "networkctl.h"
51 #include "networkctl-config-file.h"
52 #include "pager.h"
53 #include "parse-argument.h"
54 #include "parse-util.h"
55 #include "path-lookup.h"
56 #include "path-util.h"
57 #include "pretty-print.h"
58 #include "set.h"
59 #include "sigbus.h"
60 #include "socket-netlink.h"
61 #include "socket-util.h"
62 #include "sort-util.h"
63 #include "sparse-endian.h"
64 #include "stdio-util.h"
65 #include "string-table.h"
66 #include "string-util.h"
67 #include "strv.h"
68 #include "strxcpyx.h"
69 #include "terminal-util.h"
70 #include "udev-util.h"
71 #include "unit-def.h"
72 #include "varlink.h"
73 #include "verbs.h"
74 #include "wifi-util.h"
75
76 /* Kernel defines MODULE_NAME_LEN as 64 - sizeof(unsigned long). So, 64 is enough. */
77 #define NETDEV_KIND_MAX 64
78
79 /* use 128 kB for receive socket kernel queue, we shouldn't need more here */
80 #define RCVBUF_SIZE (128*1024)
81
82 PagerFlags arg_pager_flags = 0;
83 bool arg_legend = true;
84 bool arg_no_reload = false;
85 bool arg_all = false;
86 bool arg_stats = false;
87 bool arg_full = false;
88 bool arg_runtime = false;
89 unsigned arg_lines = 10;
90 char *arg_drop_in = NULL;
91 JsonFormatFlags arg_json_format_flags = JSON_FORMAT_OFF;
92
93 STATIC_DESTRUCTOR_REGISTER(arg_drop_in, freep);
94
95 static int varlink_connect_networkd(Varlink **ret_varlink) {
96 _cleanup_(varlink_unrefp) Varlink *vl = NULL;
97 JsonVariant *reply;
98 uint64_t id;
99 int r;
100
101 r = varlink_connect_address(&vl, "/run/systemd/netif/io.systemd.Network");
102 if (r < 0)
103 return log_error_errno(r, "Failed to connect to network service /run/systemd/netif/io.systemd.Network: %m");
104
105 r = varlink_set_allow_fd_passing_output(vl, true);
106 if (r < 0)
107 return log_error_errno(r, "Failed to allow passing file descriptor through varlink: %m");
108
109 r = varlink_call_and_log(vl, "io.systemd.Network.GetNamespaceId", /* parameters= */ NULL, &reply);
110 if (r < 0)
111 return r;
112
113 static const JsonDispatch dispatch_table[] = {
114 { "NamespaceId", JSON_VARIANT_UNSIGNED, json_dispatch_uint64, 0, JSON_MANDATORY },
115 {},
116 };
117
118 r = json_dispatch(reply, dispatch_table, JSON_LOG|JSON_ALLOW_EXTENSIONS, &id);
119 if (r < 0)
120 return r;
121
122 if (id == 0)
123 log_debug("systemd-networkd.service not running in a network namespace (?), skipping netns check.");
124 else {
125 struct stat st;
126
127 if (stat("/proc/self/ns/net", &st) < 0)
128 return log_error_errno(errno, "Failed to determine our own network namespace ID: %m");
129
130 if (id != st.st_ino)
131 return log_error_errno(SYNTHETIC_ERRNO(EREMOTE),
132 "networkctl must be invoked in same network namespace as systemd-networkd.service.");
133 }
134
135 if (ret_varlink)
136 *ret_varlink = TAKE_PTR(vl);
137 return 0;
138 }
139
140 bool networkd_is_running(void) {
141 static int cached = -1;
142 int r;
143
144 if (cached < 0) {
145 r = access("/run/systemd/netif/state", F_OK);
146 if (r < 0) {
147 if (errno != ENOENT)
148 log_debug_errno(errno,
149 "Failed to determine whether networkd is running, assuming it's not: %m");
150
151 cached = false;
152 } else
153 cached = true;
154 }
155
156 return cached;
157 }
158
159 int acquire_bus(sd_bus **ret) {
160 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
161 int r;
162
163 assert(ret);
164
165 r = sd_bus_open_system(&bus);
166 if (r < 0)
167 return log_error_errno(r, "Failed to connect to system bus: %m");
168
169 if (networkd_is_running()) {
170 r = varlink_connect_networkd(/* ret_varlink = */ NULL);
171 if (r < 0)
172 return r;
173 } else
174 log_warning("systemd-networkd is not running, output might be incomplete.");
175
176 *ret = TAKE_PTR(bus);
177 return 0;
178 }
179
180 static int get_description(sd_bus *bus, JsonVariant **ret) {
181 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
182 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
183 const char *text;
184 int r;
185
186 assert(bus);
187 assert(ret);
188
189 r = bus_call_method(bus, bus_network_mgr, "Describe", &error, &reply, NULL);
190 if (r < 0)
191 return log_error_errno(r, "Failed to get description: %s", bus_error_message(&error, r));
192
193 r = sd_bus_message_read(reply, "s", &text);
194 if (r < 0)
195 return bus_log_parse_error(r);
196
197 r = json_parse(text, 0, ret, NULL, NULL);
198 if (r < 0)
199 return log_error_errno(r, "Failed to parse JSON: %m");
200
201 return 0;
202 }
203
204 static int dump_manager_description(sd_bus *bus) {
205 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
206 int r;
207
208 assert(bus);
209
210 r = get_description(bus, &v);
211 if (r < 0)
212 return r;
213
214 json_variant_dump(v, arg_json_format_flags, NULL, NULL);
215 return 0;
216 }
217
218 static int dump_link_description(sd_bus *bus, char * const *patterns) {
219 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
220 _cleanup_free_ bool *matched_patterns = NULL;
221 JsonVariant *i;
222 size_t c = 0;
223 int r;
224
225 assert(bus);
226 assert(patterns);
227
228 r = get_description(bus, &v);
229 if (r < 0)
230 return r;
231
232 matched_patterns = new0(bool, strv_length(patterns));
233 if (!matched_patterns)
234 return log_oom();
235
236 JSON_VARIANT_ARRAY_FOREACH(i, json_variant_by_key(v, "Interfaces")) {
237 char ifindex_str[DECIMAL_STR_MAX(int64_t)];
238 const char *name;
239 int64_t index;
240 size_t pos;
241
242 name = json_variant_string(json_variant_by_key(i, "Name"));
243 index = json_variant_integer(json_variant_by_key(i, "Index"));
244 xsprintf(ifindex_str, "%" PRIi64, index);
245
246 if (!strv_fnmatch_full(patterns, ifindex_str, 0, &pos) &&
247 !strv_fnmatch_full(patterns, name, 0, &pos)) {
248 bool match = false;
249 JsonVariant *a;
250
251 JSON_VARIANT_ARRAY_FOREACH(a, json_variant_by_key(i, "AlternativeNames"))
252 if (strv_fnmatch_full(patterns, json_variant_string(a), 0, &pos)) {
253 match = true;
254 break;
255 }
256
257 if (!match)
258 continue;
259 }
260
261 matched_patterns[pos] = true;
262 json_variant_dump(i, arg_json_format_flags, NULL, NULL);
263 c++;
264 }
265
266 /* Look if we matched all our arguments that are not globs. It is OK for a glob to match
267 * nothing, but not for an exact argument. */
268 for (size_t pos = 0; pos < strv_length(patterns); pos++) {
269 if (matched_patterns[pos])
270 continue;
271
272 if (string_is_glob(patterns[pos]))
273 log_debug("Pattern \"%s\" doesn't match any interface, ignoring.",
274 patterns[pos]);
275 else
276 return log_error_errno(SYNTHETIC_ERRNO(ENODEV),
277 "Interface \"%s\" not found.", patterns[pos]);
278 }
279
280 if (c == 0)
281 log_warning("No interfaces matched.");
282
283 return 0;
284 }
285
286 static void operational_state_to_color(
287 const char *name,
288 const char *state,
289 const char **on,
290 const char **off) {
291
292 if (STRPTR_IN_SET(state, "routable", "enslaved") ||
293 (streq_ptr(name, "lo") && streq_ptr(state, "carrier"))) {
294 if (on)
295 *on = ansi_highlight_green();
296 if (off)
297 *off = ansi_normal();
298 } else if (streq_ptr(state, "degraded")) {
299 if (on)
300 *on = ansi_highlight_yellow();
301 if (off)
302 *off = ansi_normal();
303 } else {
304 if (on)
305 *on = "";
306 if (off)
307 *off = "";
308 }
309 }
310
311 static void setup_state_to_color(const char *state, const char **on, const char **off) {
312 if (streq_ptr(state, "configured")) {
313 if (on)
314 *on = ansi_highlight_green();
315 if (off)
316 *off = ansi_normal();
317 } else if (streq_ptr(state, "configuring")) {
318 if (on)
319 *on = ansi_highlight_yellow();
320 if (off)
321 *off = ansi_normal();
322 } else if (STRPTR_IN_SET(state, "failed", "linger")) {
323 if (on)
324 *on = ansi_highlight_red();
325 if (off)
326 *off = ansi_normal();
327 } else {
328 if (on)
329 *on = "";
330 if (off)
331 *off = "";
332 }
333 }
334
335 static void online_state_to_color(const char *state, const char **on, const char **off) {
336 if (streq_ptr(state, "online")) {
337 if (on)
338 *on = ansi_highlight_green();
339 if (off)
340 *off = ansi_normal();
341 } else if (streq_ptr(state, "partial")) {
342 if (on)
343 *on = ansi_highlight_yellow();
344 if (off)
345 *off = ansi_normal();
346 } else {
347 if (on)
348 *on = "";
349 if (off)
350 *off = "";
351 }
352 }
353
354 typedef struct VxLanInfo {
355 uint32_t vni;
356 uint32_t link;
357
358 int local_family;
359 int group_family;
360
361 union in_addr_union local;
362 union in_addr_union group;
363
364 uint16_t dest_port;
365
366 uint8_t proxy;
367 uint8_t learning;
368 uint8_t rsc;
369 uint8_t l2miss;
370 uint8_t l3miss;
371 uint8_t tos;
372 uint8_t ttl;
373 } VxLanInfo;
374
375 typedef struct LinkInfo {
376 char name[IFNAMSIZ+1];
377 char *netdev_kind;
378 sd_device *sd_device;
379 int ifindex;
380 unsigned short iftype;
381 struct hw_addr_data hw_address;
382 struct hw_addr_data permanent_hw_address;
383 uint32_t master;
384 uint32_t mtu;
385 uint32_t min_mtu;
386 uint32_t max_mtu;
387 uint32_t tx_queues;
388 uint32_t rx_queues;
389 uint8_t addr_gen_mode;
390 char *qdisc;
391 char **alternative_names;
392
393 union {
394 struct rtnl_link_stats64 stats64;
395 struct rtnl_link_stats stats;
396 };
397
398 uint64_t tx_bitrate;
399 uint64_t rx_bitrate;
400
401 /* bridge info */
402 uint32_t forward_delay;
403 uint32_t hello_time;
404 uint32_t max_age;
405 uint32_t ageing_time;
406 uint32_t stp_state;
407 uint32_t cost;
408 uint16_t priority;
409 uint8_t mcast_igmp_version;
410 uint8_t port_state;
411
412 /* vxlan info */
413 VxLanInfo vxlan_info;
414
415 /* vlan info */
416 uint16_t vlan_id;
417
418 /* tunnel info */
419 uint8_t ttl;
420 uint8_t tos;
421 uint8_t inherit;
422 uint8_t df;
423 uint8_t csum;
424 uint8_t csum6_tx;
425 uint8_t csum6_rx;
426 uint16_t tunnel_port;
427 uint32_t vni;
428 uint32_t label;
429 union in_addr_union local;
430 union in_addr_union remote;
431
432 /* bonding info */
433 uint8_t mode;
434 uint32_t miimon;
435 uint32_t updelay;
436 uint32_t downdelay;
437
438 /* macvlan and macvtap info */
439 uint32_t macvlan_mode;
440
441 /* ipvlan info */
442 uint16_t ipvlan_mode;
443 uint16_t ipvlan_flags;
444
445 /* ethtool info */
446 int autonegotiation;
447 uint64_t speed;
448 Duplex duplex;
449 NetDevPort port;
450
451 /* wlan info */
452 enum nl80211_iftype wlan_iftype;
453 char *ssid;
454 struct ether_addr bssid;
455
456 bool has_hw_address:1;
457 bool has_permanent_hw_address:1;
458 bool has_tx_queues:1;
459 bool has_rx_queues:1;
460 bool has_stats64:1;
461 bool has_stats:1;
462 bool has_bitrates:1;
463 bool has_ethtool_link_info:1;
464 bool has_wlan_link_info:1;
465 bool has_tunnel_ipv4:1;
466 bool has_ipv6_address_generation_mode:1;
467
468 bool needs_freeing:1;
469 } LinkInfo;
470
471 static int link_info_compare(const LinkInfo *a, const LinkInfo *b) {
472 return CMP(a->ifindex, b->ifindex);
473 }
474
475 static LinkInfo* link_info_array_free(LinkInfo *array) {
476 for (unsigned i = 0; array && array[i].needs_freeing; i++) {
477 sd_device_unref(array[i].sd_device);
478 free(array[i].netdev_kind);
479 free(array[i].ssid);
480 free(array[i].qdisc);
481 strv_free(array[i].alternative_names);
482 }
483
484 return mfree(array);
485 }
486 DEFINE_TRIVIAL_CLEANUP_FUNC(LinkInfo*, link_info_array_free);
487
488 static int decode_netdev(sd_netlink_message *m, LinkInfo *info) {
489 int r;
490
491 assert(m);
492 assert(info);
493
494 r = sd_netlink_message_enter_container(m, IFLA_LINKINFO);
495 if (r < 0)
496 return r;
497
498 r = sd_netlink_message_read_string_strdup(m, IFLA_INFO_KIND, &info->netdev_kind);
499 if (r < 0) {
500 (void) sd_netlink_message_exit_container(m);
501 return r;
502 }
503
504 r = sd_netlink_message_enter_container(m, IFLA_INFO_DATA);
505 if (r < 0)
506 return r;
507
508 if (streq(info->netdev_kind, "bridge")) {
509 (void) sd_netlink_message_read_u32(m, IFLA_BR_FORWARD_DELAY, &info->forward_delay);
510 (void) sd_netlink_message_read_u32(m, IFLA_BR_HELLO_TIME, &info->hello_time);
511 (void) sd_netlink_message_read_u32(m, IFLA_BR_MAX_AGE, &info->max_age);
512 (void) sd_netlink_message_read_u32(m, IFLA_BR_AGEING_TIME, &info->ageing_time);
513 (void) sd_netlink_message_read_u32(m, IFLA_BR_STP_STATE, &info->stp_state);
514 (void) sd_netlink_message_read_u32(m, IFLA_BRPORT_COST, &info->cost);
515 (void) sd_netlink_message_read_u16(m, IFLA_BR_PRIORITY, &info->priority);
516 (void) sd_netlink_message_read_u8(m, IFLA_BR_MCAST_IGMP_VERSION, &info->mcast_igmp_version);
517 (void) sd_netlink_message_read_u8(m, IFLA_BRPORT_STATE, &info->port_state);
518 } if (streq(info->netdev_kind, "bond")) {
519 (void) sd_netlink_message_read_u8(m, IFLA_BOND_MODE, &info->mode);
520 (void) sd_netlink_message_read_u32(m, IFLA_BOND_MIIMON, &info->miimon);
521 (void) sd_netlink_message_read_u32(m, IFLA_BOND_DOWNDELAY, &info->downdelay);
522 (void) sd_netlink_message_read_u32(m, IFLA_BOND_UPDELAY, &info->updelay);
523 } else if (streq(info->netdev_kind, "vxlan")) {
524 (void) sd_netlink_message_read_u32(m, IFLA_VXLAN_ID, &info->vxlan_info.vni);
525
526 r = sd_netlink_message_read_in_addr(m, IFLA_VXLAN_GROUP, &info->vxlan_info.group.in);
527 if (r >= 0)
528 info->vxlan_info.group_family = AF_INET;
529 else {
530 r = sd_netlink_message_read_in6_addr(m, IFLA_VXLAN_GROUP6, &info->vxlan_info.group.in6);
531 if (r >= 0)
532 info->vxlan_info.group_family = AF_INET6;
533 }
534
535 r = sd_netlink_message_read_in_addr(m, IFLA_VXLAN_LOCAL, &info->vxlan_info.local.in);
536 if (r >= 0)
537 info->vxlan_info.local_family = AF_INET;
538 else {
539 r = sd_netlink_message_read_in6_addr(m, IFLA_VXLAN_LOCAL6, &info->vxlan_info.local.in6);
540 if (r >= 0)
541 info->vxlan_info.local_family = AF_INET6;
542 }
543
544 (void) sd_netlink_message_read_u32(m, IFLA_VXLAN_LINK, &info->vxlan_info.link);
545 (void) sd_netlink_message_read_u16(m, IFLA_VXLAN_PORT, &info->vxlan_info.dest_port);
546 (void) sd_netlink_message_read_u8(m, IFLA_VXLAN_PROXY, &info->vxlan_info.proxy);
547 (void) sd_netlink_message_read_u8(m, IFLA_VXLAN_LEARNING, &info->vxlan_info.learning);
548 (void) sd_netlink_message_read_u8(m, IFLA_VXLAN_RSC, &info->vxlan_info.rsc);
549 (void) sd_netlink_message_read_u8(m, IFLA_VXLAN_L3MISS, &info->vxlan_info.l3miss);
550 (void) sd_netlink_message_read_u8(m, IFLA_VXLAN_L2MISS, &info->vxlan_info.l2miss);
551 (void) sd_netlink_message_read_u8(m, IFLA_VXLAN_TOS, &info->vxlan_info.tos);
552 (void) sd_netlink_message_read_u8(m, IFLA_VXLAN_TTL, &info->vxlan_info.ttl);
553 } else if (streq(info->netdev_kind, "vlan"))
554 (void) sd_netlink_message_read_u16(m, IFLA_VLAN_ID, &info->vlan_id);
555 else if (STR_IN_SET(info->netdev_kind, "ipip", "sit")) {
556 (void) sd_netlink_message_read_in_addr(m, IFLA_IPTUN_LOCAL, &info->local.in);
557 (void) sd_netlink_message_read_in_addr(m, IFLA_IPTUN_REMOTE, &info->remote.in);
558 } else if (streq(info->netdev_kind, "geneve")) {
559 (void) sd_netlink_message_read_u32(m, IFLA_GENEVE_ID, &info->vni);
560
561 r = sd_netlink_message_read_in_addr(m, IFLA_GENEVE_REMOTE, &info->remote.in);
562 if (r >= 0)
563 info->has_tunnel_ipv4 = true;
564 else
565 (void) sd_netlink_message_read_in6_addr(m, IFLA_GENEVE_REMOTE6, &info->remote.in6);
566
567 (void) sd_netlink_message_read_u8(m, IFLA_GENEVE_TTL, &info->ttl);
568 (void) sd_netlink_message_read_u8(m, IFLA_GENEVE_TTL_INHERIT, &info->inherit);
569 (void) sd_netlink_message_read_u8(m, IFLA_GENEVE_TOS, &info->tos);
570 (void) sd_netlink_message_read_u8(m, IFLA_GENEVE_DF, &info->df);
571 (void) sd_netlink_message_read_u8(m, IFLA_GENEVE_UDP_CSUM, &info->csum);
572 (void) sd_netlink_message_read_u8(m, IFLA_GENEVE_UDP_ZERO_CSUM6_TX, &info->csum6_tx);
573 (void) sd_netlink_message_read_u8(m, IFLA_GENEVE_UDP_ZERO_CSUM6_RX, &info->csum6_rx);
574 (void) sd_netlink_message_read_u16(m, IFLA_GENEVE_PORT, &info->tunnel_port);
575 (void) sd_netlink_message_read_u32(m, IFLA_GENEVE_LABEL, &info->label);
576 } else if (STR_IN_SET(info->netdev_kind, "gre", "gretap", "erspan")) {
577 (void) sd_netlink_message_read_in_addr(m, IFLA_GRE_LOCAL, &info->local.in);
578 (void) sd_netlink_message_read_in_addr(m, IFLA_GRE_REMOTE, &info->remote.in);
579 } else if (STR_IN_SET(info->netdev_kind, "ip6gre", "ip6gretap", "ip6erspan")) {
580 (void) sd_netlink_message_read_in6_addr(m, IFLA_GRE_LOCAL, &info->local.in6);
581 (void) sd_netlink_message_read_in6_addr(m, IFLA_GRE_REMOTE, &info->remote.in6);
582 } else if (streq(info->netdev_kind, "vti")) {
583 (void) sd_netlink_message_read_in_addr(m, IFLA_VTI_LOCAL, &info->local.in);
584 (void) sd_netlink_message_read_in_addr(m, IFLA_VTI_REMOTE, &info->remote.in);
585 } else if (streq(info->netdev_kind, "vti6")) {
586 (void) sd_netlink_message_read_in6_addr(m, IFLA_VTI_LOCAL, &info->local.in6);
587 (void) sd_netlink_message_read_in6_addr(m, IFLA_VTI_REMOTE, &info->remote.in6);
588 } else if (STR_IN_SET(info->netdev_kind, "macvlan", "macvtap"))
589 (void) sd_netlink_message_read_u32(m, IFLA_MACVLAN_MODE, &info->macvlan_mode);
590 else if (streq(info->netdev_kind, "ipvlan")) {
591 (void) sd_netlink_message_read_u16(m, IFLA_IPVLAN_MODE, &info->ipvlan_mode);
592 (void) sd_netlink_message_read_u16(m, IFLA_IPVLAN_FLAGS, &info->ipvlan_flags);
593 }
594
595 (void) sd_netlink_message_exit_container(m);
596 (void) sd_netlink_message_exit_container(m);
597
598 return 0;
599 }
600
601 static int decode_link(
602 sd_netlink_message *m,
603 LinkInfo *info,
604 char * const *patterns,
605 bool matched_patterns[]) {
606
607 _cleanup_strv_free_ char **altnames = NULL;
608 const char *name, *qdisc;
609 int ifindex, r;
610 uint16_t type;
611
612 assert(m);
613 assert(info);
614
615 r = sd_netlink_message_get_type(m, &type);
616 if (r < 0)
617 return r;
618
619 if (type != RTM_NEWLINK)
620 return 0;
621
622 r = sd_rtnl_message_link_get_ifindex(m, &ifindex);
623 if (r < 0)
624 return r;
625
626 r = sd_netlink_message_read_string(m, IFLA_IFNAME, &name);
627 if (r < 0)
628 return r;
629
630 r = sd_netlink_message_read_strv(m, IFLA_PROP_LIST, IFLA_ALT_IFNAME, &altnames);
631 if (r < 0 && r != -ENODATA)
632 return r;
633
634 if (patterns) {
635 char str[DECIMAL_STR_MAX(int)];
636 size_t pos;
637
638 assert(matched_patterns);
639
640 xsprintf(str, "%i", ifindex);
641 if (!strv_fnmatch_full(patterns, str, 0, &pos) &&
642 !strv_fnmatch_full(patterns, name, 0, &pos)) {
643 bool match = false;
644
645 STRV_FOREACH(p, altnames)
646 if (strv_fnmatch_full(patterns, *p, 0, &pos)) {
647 match = true;
648 break;
649 }
650 if (!match)
651 return 0;
652 }
653
654 matched_patterns[pos] = true;
655 }
656
657 r = sd_rtnl_message_link_get_type(m, &info->iftype);
658 if (r < 0)
659 return r;
660
661 strscpy(info->name, sizeof info->name, name);
662 info->ifindex = ifindex;
663 info->alternative_names = TAKE_PTR(altnames);
664
665 info->has_hw_address =
666 netlink_message_read_hw_addr(m, IFLA_ADDRESS, &info->hw_address) >= 0 &&
667 info->hw_address.length > 0;
668
669 info->has_permanent_hw_address =
670 (netlink_message_read_hw_addr(m, IFLA_PERM_ADDRESS, &info->permanent_hw_address) >= 0 ||
671 ethtool_get_permanent_hw_addr(NULL, info->name, &info->permanent_hw_address) >= 0) &&
672 !hw_addr_is_null(&info->permanent_hw_address) &&
673 !hw_addr_equal(&info->permanent_hw_address, &info->hw_address);
674
675 (void) sd_netlink_message_read_u32(m, IFLA_MTU, &info->mtu);
676 (void) sd_netlink_message_read_u32(m, IFLA_MIN_MTU, &info->min_mtu);
677 (void) sd_netlink_message_read_u32(m, IFLA_MAX_MTU, &info->max_mtu);
678
679 info->has_rx_queues =
680 sd_netlink_message_read_u32(m, IFLA_NUM_RX_QUEUES, &info->rx_queues) >= 0 &&
681 info->rx_queues > 0;
682
683 info->has_tx_queues =
684 sd_netlink_message_read_u32(m, IFLA_NUM_TX_QUEUES, &info->tx_queues) >= 0 &&
685 info->tx_queues > 0;
686
687 if (sd_netlink_message_read(m, IFLA_STATS64, sizeof info->stats64, &info->stats64) >= 0)
688 info->has_stats64 = true;
689 else if (sd_netlink_message_read(m, IFLA_STATS, sizeof info->stats, &info->stats) >= 0)
690 info->has_stats = true;
691
692 r = sd_netlink_message_read_string(m, IFLA_QDISC, &qdisc);
693 if (r >= 0) {
694 info->qdisc = strdup(qdisc);
695 if (!info->qdisc)
696 return log_oom();
697 }
698
699 (void) sd_netlink_message_read_u32(m, IFLA_MASTER, &info->master);
700
701 r = sd_netlink_message_enter_container(m, IFLA_AF_SPEC);
702 if (r >= 0) {
703 r = sd_netlink_message_enter_container(m, AF_INET6);
704 if (r >= 0) {
705 r = sd_netlink_message_read_u8(m, IFLA_INET6_ADDR_GEN_MODE, &info->addr_gen_mode);
706 if (r >= 0 && IN_SET(info->addr_gen_mode,
707 IN6_ADDR_GEN_MODE_EUI64,
708 IN6_ADDR_GEN_MODE_NONE,
709 IN6_ADDR_GEN_MODE_STABLE_PRIVACY,
710 IN6_ADDR_GEN_MODE_RANDOM))
711 info->has_ipv6_address_generation_mode = true;
712
713 (void) sd_netlink_message_exit_container(m);
714 }
715 (void) sd_netlink_message_exit_container(m);
716 }
717
718 /* fill kind info */
719 (void) decode_netdev(m, info);
720
721 return 1;
722 }
723
724 static int link_get_property(
725 sd_bus *bus,
726 const LinkInfo *link,
727 sd_bus_error *error,
728 sd_bus_message **reply,
729 const char *iface,
730 const char *propname,
731 const char *type) {
732
733 _cleanup_free_ char *path = NULL;
734 char ifindex_str[DECIMAL_STR_MAX(int)];
735 int r;
736
737 assert(bus);
738 assert(link);
739 assert(link->ifindex >= 0);
740 assert(error);
741 assert(reply);
742 assert(iface);
743 assert(propname);
744 assert(type);
745
746 xsprintf(ifindex_str, "%i", link->ifindex);
747
748 r = sd_bus_path_encode("/org/freedesktop/network1/link", ifindex_str, &path);
749 if (r < 0)
750 return r;
751
752 return sd_bus_get_property(bus, "org.freedesktop.network1", path, iface, propname, error, reply, type);
753 }
754
755 static int acquire_link_bitrates(sd_bus *bus, LinkInfo *link) {
756 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
757 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
758 int r;
759
760 assert(bus);
761 assert(link);
762
763 r = link_get_property(bus, link, &error, &reply, "org.freedesktop.network1.Link", "BitRates", "(tt)");
764 if (r < 0) {
765 bool quiet = sd_bus_error_has_names(&error, SD_BUS_ERROR_UNKNOWN_PROPERTY,
766 BUS_ERROR_SPEED_METER_INACTIVE);
767
768 return log_full_errno(quiet ? LOG_DEBUG : LOG_WARNING,
769 r, "Failed to query link bit rates: %s", bus_error_message(&error, r));
770 }
771
772 r = sd_bus_message_read(reply, "(tt)", &link->tx_bitrate, &link->rx_bitrate);
773 if (r < 0)
774 return bus_log_parse_error(r);
775
776 r = sd_bus_message_exit_container(reply);
777 if (r < 0)
778 return bus_log_parse_error(r);
779
780 link->has_bitrates = link->tx_bitrate != UINT64_MAX && link->rx_bitrate != UINT64_MAX;
781
782 return 0;
783 }
784
785 static void acquire_ether_link_info(int *fd, LinkInfo *link) {
786 assert(fd);
787 assert(link);
788
789 if (ethtool_get_link_info(fd,
790 link->name,
791 &link->autonegotiation,
792 &link->speed,
793 &link->duplex,
794 &link->port) >= 0)
795 link->has_ethtool_link_info = true;
796 }
797
798 static void acquire_wlan_link_info(LinkInfo *link) {
799 _cleanup_(sd_netlink_unrefp) sd_netlink *genl = NULL;
800 int r, k = 0;
801
802 assert(link);
803
804 if (!link->sd_device)
805 return;
806
807 if (!device_is_devtype(link->sd_device, "wlan"))
808 return;
809
810 r = sd_genl_socket_open(&genl);
811 if (r < 0) {
812 log_debug_errno(r, "Failed to open generic netlink socket: %m");
813 return;
814 }
815
816 (void) sd_netlink_increase_rxbuf(genl, RCVBUF_SIZE);
817
818 r = wifi_get_interface(genl, link->ifindex, &link->wlan_iftype, &link->ssid);
819 if (r < 0)
820 log_debug_errno(r, "%s: failed to query ssid: %m", link->name);
821
822 if (link->wlan_iftype == NL80211_IFTYPE_STATION) {
823 k = wifi_get_station(genl, link->ifindex, &link->bssid);
824 if (k < 0)
825 log_debug_errno(k, "%s: failed to query bssid: %m", link->name);
826 }
827
828 link->has_wlan_link_info = r > 0 || k > 0;
829 }
830
831 static int acquire_link_info(sd_bus *bus, sd_netlink *rtnl, char * const *patterns, LinkInfo **ret) {
832 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
833 _cleanup_(link_info_array_freep) LinkInfo *links = NULL;
834 _cleanup_free_ bool *matched_patterns = NULL;
835 _cleanup_close_ int fd = -EBADF;
836 size_t c = 0;
837 int r;
838
839 assert(rtnl);
840 assert(ret);
841
842 r = sd_rtnl_message_new_link(rtnl, &req, RTM_GETLINK, 0);
843 if (r < 0)
844 return rtnl_log_create_error(r);
845
846 r = sd_netlink_message_set_request_dump(req, true);
847 if (r < 0)
848 return rtnl_log_create_error(r);
849
850 r = sd_netlink_call(rtnl, req, 0, &reply);
851 if (r < 0)
852 return log_error_errno(r, "Failed to enumerate links: %m");
853
854 if (patterns) {
855 matched_patterns = new0(bool, strv_length(patterns));
856 if (!matched_patterns)
857 return log_oom();
858 }
859
860 for (sd_netlink_message *i = reply; i; i = sd_netlink_message_next(i)) {
861 if (!GREEDY_REALLOC0(links, c + 2)) /* We keep one trailing one as marker */
862 return -ENOMEM;
863
864 r = decode_link(i, links + c, patterns, matched_patterns);
865 if (r < 0)
866 return r;
867 if (r == 0)
868 continue;
869
870 links[c].needs_freeing = true;
871
872 (void) sd_device_new_from_ifindex(&links[c].sd_device, links[c].ifindex);
873
874 acquire_ether_link_info(&fd, &links[c]);
875 acquire_wlan_link_info(&links[c]);
876
877 c++;
878 }
879
880 /* Look if we matched all our arguments that are not globs. It
881 * is OK for a glob to match nothing, but not for an exact argument. */
882 for (size_t pos = 0; pos < strv_length(patterns); pos++) {
883 if (matched_patterns[pos])
884 continue;
885
886 if (string_is_glob(patterns[pos]))
887 log_debug("Pattern \"%s\" doesn't match any interface, ignoring.",
888 patterns[pos]);
889 else
890 return log_error_errno(SYNTHETIC_ERRNO(ENODEV),
891 "Interface \"%s\" not found.", patterns[pos]);
892 }
893
894 typesafe_qsort(links, c, link_info_compare);
895
896 if (bus)
897 FOREACH_ARRAY(link, links, c)
898 (void) acquire_link_bitrates(bus, link);
899
900 *ret = TAKE_PTR(links);
901
902 if (patterns && c == 0)
903 log_warning("No interfaces matched.");
904
905 return (int) c;
906 }
907
908 static int list_links(int argc, char *argv[], void *userdata) {
909 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
910 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
911 _cleanup_(link_info_array_freep) LinkInfo *links = NULL;
912 _cleanup_(table_unrefp) Table *table = NULL;
913 TableCell *cell;
914 int c, r;
915
916 r = acquire_bus(&bus);
917 if (r < 0)
918 return r;
919
920 if (arg_json_format_flags != JSON_FORMAT_OFF) {
921 if (arg_all || argc <= 1)
922 return dump_manager_description(bus);
923 else
924 return dump_link_description(bus, strv_skip(argv, 1));
925 }
926
927 r = sd_netlink_open(&rtnl);
928 if (r < 0)
929 return log_error_errno(r, "Failed to connect to netlink: %m");
930
931 c = acquire_link_info(NULL, rtnl, argc > 1 ? argv + 1 : NULL, &links);
932 if (c < 0)
933 return c;
934
935 pager_open(arg_pager_flags);
936
937 table = table_new("idx", "link", "type", "operational", "setup");
938 if (!table)
939 return log_oom();
940
941 if (arg_full)
942 table_set_width(table, 0);
943
944 table_set_header(table, arg_legend);
945 table_set_ersatz_string(table, TABLE_ERSATZ_DASH);
946
947 assert_se(cell = table_get_cell(table, 0, 0));
948 (void) table_set_minimum_width(table, cell, 3);
949 (void) table_set_weight(table, cell, 0);
950 (void) table_set_ellipsize_percent(table, cell, 100);
951 (void) table_set_align_percent(table, cell, 100);
952
953 assert_se(cell = table_get_cell(table, 0, 1));
954 (void) table_set_ellipsize_percent(table, cell, 100);
955
956 FOREACH_ARRAY(link, links, c) {
957 _cleanup_free_ char *setup_state = NULL, *operational_state = NULL;
958 _cleanup_free_ char *t = NULL;
959 const char *on_color_operational, *on_color_setup;
960
961 (void) sd_network_link_get_operational_state(link->ifindex, &operational_state);
962 operational_state_to_color(link->name, operational_state, &on_color_operational, NULL);
963
964 (void) sd_network_link_get_setup_state(link->ifindex, &setup_state);
965 setup_state_to_color(setup_state, &on_color_setup, NULL);
966
967 r = net_get_type_string(link->sd_device, link->iftype, &t);
968 if (r == -ENOMEM)
969 return log_oom();
970
971 r = table_add_many(table,
972 TABLE_INT, link->ifindex,
973 TABLE_STRING, link->name,
974 TABLE_STRING, t,
975 TABLE_STRING, operational_state,
976 TABLE_SET_COLOR, on_color_operational,
977 TABLE_STRING, setup_state ?: "unmanaged",
978 TABLE_SET_COLOR, on_color_setup);
979 if (r < 0)
980 return table_log_add_error(r);
981 }
982
983 r = table_print(table, NULL);
984 if (r < 0)
985 return table_log_print_error(r);
986
987 if (arg_legend)
988 printf("\n%i links listed.\n", c);
989
990 return 0;
991 }
992
993 /* IEEE Organizationally Unique Identifier vendor string */
994 static int ieee_oui(sd_hwdb *hwdb, const struct ether_addr *mac, char **ret) {
995 _cleanup_free_ char *desc = NULL;
996 const char *description;
997 char modalias[STRLEN("OUI:XXYYXXYYXXYY") + 1];
998 int r;
999
1000 assert(ret);
1001
1002 if (!hwdb || !mac)
1003 return -EINVAL;
1004
1005 /* skip commonly misused 00:00:00 (Xerox) prefix */
1006 if (memcmp(mac, "\0\0\0", 3) == 0)
1007 return -EINVAL;
1008
1009 xsprintf(modalias, "OUI:" ETHER_ADDR_FORMAT_STR, ETHER_ADDR_FORMAT_VAL(*mac));
1010
1011 r = sd_hwdb_get(hwdb, modalias, "ID_OUI_FROM_DATABASE", &description);
1012 if (r < 0)
1013 return r;
1014
1015 desc = strdup(description);
1016 if (!desc)
1017 return -ENOMEM;
1018
1019 *ret = TAKE_PTR(desc);
1020
1021 return 0;
1022 }
1023
1024 static int get_gateway_description(
1025 sd_netlink *rtnl,
1026 sd_hwdb *hwdb,
1027 int ifindex,
1028 int family,
1029 union in_addr_union *gateway,
1030 char **ret) {
1031
1032 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1033 int r;
1034
1035 assert(rtnl);
1036 assert(ifindex >= 0);
1037 assert(IN_SET(family, AF_INET, AF_INET6));
1038 assert(gateway);
1039 assert(ret);
1040
1041 r = sd_rtnl_message_new_neigh(rtnl, &req, RTM_GETNEIGH, ifindex, family);
1042 if (r < 0)
1043 return r;
1044
1045 r = sd_netlink_message_set_request_dump(req, true);
1046 if (r < 0)
1047 return r;
1048
1049 r = sd_netlink_call(rtnl, req, 0, &reply);
1050 if (r < 0)
1051 return r;
1052
1053 for (sd_netlink_message *m = reply; m; m = sd_netlink_message_next(m)) {
1054 union in_addr_union gw = IN_ADDR_NULL;
1055 struct ether_addr mac = ETHER_ADDR_NULL;
1056 uint16_t type;
1057 int ifi, fam;
1058
1059 r = sd_netlink_message_get_errno(m);
1060 if (r < 0) {
1061 log_error_errno(r, "Failed to get netlink message, ignoring: %m");
1062 continue;
1063 }
1064
1065 r = sd_netlink_message_get_type(m, &type);
1066 if (r < 0) {
1067 log_error_errno(r, "Failed to get netlink message type, ignoring: %m");
1068 continue;
1069 }
1070
1071 if (type != RTM_NEWNEIGH) {
1072 log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1073 "Got unexpected netlink message type %u, ignoring",
1074 type);
1075 continue;
1076 }
1077
1078 r = sd_rtnl_message_neigh_get_family(m, &fam);
1079 if (r < 0) {
1080 log_error_errno(r, "Failed to get rtnl family, ignoring: %m");
1081 continue;
1082 }
1083
1084 if (fam != family) {
1085 log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Got invalid rtnl family %d, ignoring", fam);
1086 continue;
1087 }
1088
1089 r = sd_rtnl_message_neigh_get_ifindex(m, &ifi);
1090 if (r < 0) {
1091 log_error_errno(r, "Failed to get rtnl ifindex, ignoring: %m");
1092 continue;
1093 }
1094
1095 if (ifindex > 0 && ifi != ifindex)
1096 continue;
1097
1098 switch (fam) {
1099
1100 case AF_INET:
1101 r = sd_netlink_message_read_in_addr(m, NDA_DST, &gw.in);
1102 if (r < 0)
1103 continue;
1104
1105 break;
1106
1107 case AF_INET6:
1108 r = sd_netlink_message_read_in6_addr(m, NDA_DST, &gw.in6);
1109 if (r < 0)
1110 continue;
1111
1112 break;
1113
1114 default:
1115 assert_not_reached();
1116 }
1117
1118 if (!in_addr_equal(fam, &gw, gateway))
1119 continue;
1120
1121 r = sd_netlink_message_read(m, NDA_LLADDR, sizeof(mac), &mac);
1122 if (r < 0)
1123 continue;
1124
1125 r = ieee_oui(hwdb, &mac, ret);
1126 if (r < 0)
1127 continue;
1128
1129 return 0;
1130 }
1131
1132 return -ENODATA;
1133 }
1134
1135 static int dump_list(Table *table, const char *key, char * const *l) {
1136 int r;
1137
1138 assert(table);
1139 assert(key);
1140
1141 if (strv_isempty(l))
1142 return 0;
1143
1144 r = table_add_many(table,
1145 TABLE_FIELD, key,
1146 TABLE_STRV, l);
1147 if (r < 0)
1148 return table_log_add_error(r);
1149
1150 return 0;
1151 }
1152
1153 static int dump_gateways(sd_netlink *rtnl, sd_hwdb *hwdb, Table *table, int ifindex) {
1154 _cleanup_free_ struct local_address *local_addrs = NULL;
1155 _cleanup_strv_free_ char **buf = NULL;
1156 int r, n;
1157
1158 assert(rtnl);
1159 assert(table);
1160
1161 n = local_gateways(rtnl, ifindex, AF_UNSPEC, &local_addrs);
1162 if (n <= 0)
1163 return n;
1164
1165 FOREACH_ARRAY(local, local_addrs, n) {
1166 _cleanup_free_ char *description = NULL;
1167
1168 r = get_gateway_description(rtnl, hwdb, local->ifindex, local->family, &local->address, &description);
1169 if (r < 0)
1170 log_debug_errno(r, "Could not get description of gateway, ignoring: %m");
1171
1172 /* Show interface name for the entry if we show entries for all interfaces */
1173 r = strv_extendf(&buf, "%s%s%s%s%s%s",
1174 IN_ADDR_TO_STRING(local->family, &local->address),
1175 description ? " (" : "",
1176 strempty(description),
1177 description ? ")" : "",
1178 ifindex <= 0 ? " on " : "",
1179 ifindex <= 0 ? FORMAT_IFNAME_FULL(local->ifindex, FORMAT_IFNAME_IFINDEX_WITH_PERCENT) : "");
1180 if (r < 0)
1181 return log_oom();
1182 }
1183
1184 return dump_list(table, "Gateway", buf);
1185 }
1186
1187 static int dump_addresses(
1188 sd_netlink *rtnl,
1189 sd_dhcp_lease *lease,
1190 Table *table,
1191 int ifindex) {
1192
1193 _cleanup_free_ struct local_address *local_addrs = NULL;
1194 _cleanup_strv_free_ char **buf = NULL;
1195 struct in_addr dhcp4_address = {};
1196 int r, n;
1197
1198 assert(rtnl);
1199 assert(table);
1200
1201 n = local_addresses(rtnl, ifindex, AF_UNSPEC, &local_addrs);
1202 if (n <= 0)
1203 return n;
1204
1205 if (lease)
1206 (void) sd_dhcp_lease_get_address(lease, &dhcp4_address);
1207
1208 FOREACH_ARRAY(local, local_addrs, n) {
1209 struct in_addr server_address;
1210 bool dhcp4 = false;
1211
1212 if (local->family == AF_INET && in4_addr_equal(&local->address.in, &dhcp4_address))
1213 dhcp4 = sd_dhcp_lease_get_server_identifier(lease, &server_address) >= 0;
1214
1215 r = strv_extendf(&buf, "%s%s%s%s%s%s",
1216 IN_ADDR_TO_STRING(local->family, &local->address),
1217 dhcp4 ? " (DHCP4 via " : "",
1218 dhcp4 ? IN4_ADDR_TO_STRING(&server_address) : "",
1219 dhcp4 ? ")" : "",
1220 ifindex <= 0 ? " on " : "",
1221 ifindex <= 0 ? FORMAT_IFNAME_FULL(local->ifindex, FORMAT_IFNAME_IFINDEX_WITH_PERCENT) : "");
1222 if (r < 0)
1223 return log_oom();
1224 }
1225
1226 return dump_list(table, "Address", buf);
1227 }
1228
1229 static int dump_address_labels(sd_netlink *rtnl) {
1230 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1231 _cleanup_(table_unrefp) Table *table = NULL;
1232 TableCell *cell;
1233 int r;
1234
1235 assert(rtnl);
1236
1237 r = sd_rtnl_message_new_addrlabel(rtnl, &req, RTM_GETADDRLABEL, 0, AF_INET6);
1238 if (r < 0)
1239 return log_error_errno(r, "Could not allocate RTM_GETADDRLABEL message: %m");
1240
1241 r = sd_netlink_message_set_request_dump(req, true);
1242 if (r < 0)
1243 return r;
1244
1245 r = sd_netlink_call(rtnl, req, 0, &reply);
1246 if (r < 0)
1247 return r;
1248
1249 table = table_new("label", "prefix/prefixlen");
1250 if (!table)
1251 return log_oom();
1252
1253 if (arg_full)
1254 table_set_width(table, 0);
1255
1256 r = table_set_sort(table, (size_t) 0);
1257 if (r < 0)
1258 return r;
1259
1260 assert_se(cell = table_get_cell(table, 0, 0));
1261 (void) table_set_align_percent(table, cell, 100);
1262 (void) table_set_ellipsize_percent(table, cell, 100);
1263
1264 assert_se(cell = table_get_cell(table, 0, 1));
1265 (void) table_set_align_percent(table, cell, 100);
1266
1267 for (sd_netlink_message *m = reply; m; m = sd_netlink_message_next(m)) {
1268 struct in6_addr prefix;
1269 uint8_t prefixlen;
1270 uint32_t label;
1271
1272 r = sd_netlink_message_get_errno(m);
1273 if (r < 0) {
1274 log_error_errno(r, "Failed to get netlink message, ignoring: %m");
1275 continue;
1276 }
1277
1278 r = sd_netlink_message_read_u32(m, IFAL_LABEL, &label);
1279 if (r < 0 && r != -ENODATA) {
1280 log_error_errno(r, "Could not read IFAL_LABEL, ignoring: %m");
1281 continue;
1282 }
1283
1284 r = sd_netlink_message_read_in6_addr(m, IFAL_ADDRESS, &prefix);
1285 if (r < 0)
1286 continue;
1287
1288 r = sd_rtnl_message_addrlabel_get_prefixlen(m, &prefixlen);
1289 if (r < 0)
1290 continue;
1291
1292 r = table_add_cell(table, NULL, TABLE_UINT32, &label);
1293 if (r < 0)
1294 return table_log_add_error(r);
1295
1296 r = table_add_cell_stringf(table, NULL, "%s/%u", IN6_ADDR_TO_STRING(&prefix), prefixlen);
1297 if (r < 0)
1298 return table_log_add_error(r);
1299 }
1300
1301 r = table_print(table, NULL);
1302 if (r < 0)
1303 return table_log_print_error(r);
1304
1305 return 0;
1306 }
1307
1308 static int list_address_labels(int argc, char *argv[], void *userdata) {
1309 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
1310 int r;
1311
1312 r = sd_netlink_open(&rtnl);
1313 if (r < 0)
1314 return log_error_errno(r, "Failed to connect to netlink: %m");
1315
1316 return dump_address_labels(rtnl);
1317 }
1318
1319 typedef struct InterfaceInfo {
1320 int ifindex;
1321 const char *ifname;
1322 char **altnames;
1323 JsonVariant *v;
1324 } InterfaceInfo;
1325
1326 static void interface_info_done(InterfaceInfo *p) {
1327 if (!p)
1328 return;
1329
1330 strv_free(p->altnames);
1331 json_variant_unref(p->v);
1332 }
1333
1334 static const JsonDispatch interface_info_dispatch_table[] = {
1335 { "InterfaceIndex", _JSON_VARIANT_TYPE_INVALID, json_dispatch_int, offsetof(InterfaceInfo, ifindex), JSON_MANDATORY },
1336 { "InterfaceName", JSON_VARIANT_STRING, json_dispatch_const_string, offsetof(InterfaceInfo, ifname), JSON_MANDATORY },
1337 { "InterfaceAlternativeNames", JSON_VARIANT_ARRAY, json_dispatch_strv, offsetof(InterfaceInfo, altnames), 0 },
1338 { "Neighbors", JSON_VARIANT_ARRAY, json_dispatch_variant, offsetof(InterfaceInfo, v), 0 },
1339 {},
1340 };
1341
1342 typedef struct LLDPNeighborInfo {
1343 const char *chassis_id;
1344 const char *port_id;
1345 const char *port_description;
1346 const char *system_name;
1347 const char *system_description;
1348 uint16_t capabilities;
1349 } LLDPNeighborInfo;
1350
1351 static const JsonDispatch lldp_neighbor_dispatch_table[] = {
1352 { "ChassisID", JSON_VARIANT_STRING, json_dispatch_const_string, offsetof(LLDPNeighborInfo, chassis_id), 0 },
1353 { "PortID", JSON_VARIANT_STRING, json_dispatch_const_string, offsetof(LLDPNeighborInfo, port_id), 0 },
1354 { "PortDescription", JSON_VARIANT_STRING, json_dispatch_const_string, offsetof(LLDPNeighborInfo, port_description), 0 },
1355 { "SystemName", JSON_VARIANT_STRING, json_dispatch_const_string, offsetof(LLDPNeighborInfo, system_name), 0 },
1356 { "SystemDescription", JSON_VARIANT_STRING, json_dispatch_const_string, offsetof(LLDPNeighborInfo, system_description), 0 },
1357 { "EnabledCapabilities", _JSON_VARIANT_TYPE_INVALID, json_dispatch_uint16, offsetof(LLDPNeighborInfo, capabilities), 0 },
1358 {},
1359 };
1360
1361 static int dump_lldp_neighbors(Varlink *vl, Table *table, int ifindex) {
1362 _cleanup_strv_free_ char **buf = NULL;
1363 JsonVariant *reply;
1364 int r;
1365
1366 assert(vl);
1367 assert(table);
1368 assert(ifindex > 0);
1369
1370 r = varlink_callb_and_log(vl, "io.systemd.Network.GetLLDPNeighbors", &reply,
1371 JSON_BUILD_OBJECT(JSON_BUILD_PAIR_INTEGER("InterfaceIndex", ifindex)));
1372 if (r < 0)
1373 return r;
1374
1375 JsonVariant *i;
1376 JSON_VARIANT_ARRAY_FOREACH(i, json_variant_by_key(reply, "Neighbors")) {
1377 _cleanup_(interface_info_done) InterfaceInfo info = {};
1378
1379 r = json_dispatch(i, interface_info_dispatch_table, JSON_LOG|JSON_ALLOW_EXTENSIONS, &info);
1380 if (r < 0)
1381 return r;
1382
1383 if (info.ifindex != ifindex)
1384 continue;
1385
1386 JsonVariant *neighbor;
1387 JSON_VARIANT_ARRAY_FOREACH(neighbor, info.v) {
1388 LLDPNeighborInfo neighbor_info = {};
1389
1390 r = json_dispatch(neighbor, lldp_neighbor_dispatch_table, JSON_LOG|JSON_ALLOW_EXTENSIONS, &neighbor_info);
1391 if (r < 0)
1392 return r;
1393
1394 r = strv_extendf(&buf, "%s%s%s%s on port %s%s%s%s",
1395 strna(neighbor_info.system_name),
1396 isempty(neighbor_info.system_description) ? "" : " (",
1397 strempty(neighbor_info.system_description),
1398 isempty(neighbor_info.system_description) ? "" : ")",
1399 strna(neighbor_info.port_id),
1400 isempty(neighbor_info.port_description) ? "" : " (",
1401 strempty(neighbor_info.port_description),
1402 isempty(neighbor_info.port_description) ? "" : ")");
1403 if (r < 0)
1404 return log_oom();
1405 }
1406 }
1407
1408 return dump_list(table, "Connected To", buf);
1409 }
1410
1411 static int dump_dhcp_leases(Table *table, const char *prefix, sd_bus *bus, const LinkInfo *link) {
1412 _cleanup_strv_free_ char **buf = NULL;
1413 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1414 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1415 int r;
1416
1417 assert(table);
1418 assert(prefix);
1419 assert(bus);
1420 assert(link);
1421
1422 r = link_get_property(bus, link, &error, &reply, "org.freedesktop.network1.DHCPServer", "Leases", "a(uayayayayt)");
1423 if (r < 0) {
1424 bool quiet = sd_bus_error_has_name(&error, SD_BUS_ERROR_UNKNOWN_PROPERTY);
1425
1426 log_full_errno(quiet ? LOG_DEBUG : LOG_WARNING,
1427 r, "Failed to query link DHCP leases: %s", bus_error_message(&error, r));
1428 return 0;
1429 }
1430
1431 r = sd_bus_message_enter_container(reply, 'a', "(uayayayayt)");
1432 if (r < 0)
1433 return bus_log_parse_error(r);
1434
1435 while ((r = sd_bus_message_enter_container(reply, 'r', "uayayayayt")) > 0) {
1436 _cleanup_free_ char *id = NULL, *ip = NULL;
1437 const void *client_id, *addr, *gtw, *hwaddr;
1438 size_t client_id_sz, sz;
1439 uint64_t expiration;
1440 uint32_t family;
1441
1442 r = sd_bus_message_read(reply, "u", &family);
1443 if (r < 0)
1444 return bus_log_parse_error(r);
1445
1446 r = sd_bus_message_read_array(reply, 'y', &client_id, &client_id_sz);
1447 if (r < 0)
1448 return bus_log_parse_error(r);
1449
1450 r = sd_bus_message_read_array(reply, 'y', &addr, &sz);
1451 if (r < 0 || sz != 4)
1452 return bus_log_parse_error(r);
1453
1454 r = sd_bus_message_read_array(reply, 'y', &gtw, &sz);
1455 if (r < 0 || sz != 4)
1456 return bus_log_parse_error(r);
1457
1458 r = sd_bus_message_read_array(reply, 'y', &hwaddr, &sz);
1459 if (r < 0)
1460 return bus_log_parse_error(r);
1461
1462 r = sd_bus_message_read_basic(reply, 't', &expiration);
1463 if (r < 0)
1464 return bus_log_parse_error(r);
1465
1466 r = sd_dhcp_client_id_to_string_from_raw(client_id, client_id_sz, &id);
1467 if (r < 0)
1468 return bus_log_parse_error(r);
1469
1470 r = in_addr_to_string(family, addr, &ip);
1471 if (r < 0)
1472 return bus_log_parse_error(r);
1473
1474 r = strv_extendf(&buf, "%s (to %s)", ip, id);
1475 if (r < 0)
1476 return log_oom();
1477
1478 r = sd_bus_message_exit_container(reply);
1479 if (r < 0)
1480 return bus_log_parse_error(r);
1481 }
1482 if (r < 0)
1483 return bus_log_parse_error(r);
1484
1485 r = sd_bus_message_exit_container(reply);
1486 if (r < 0)
1487 return bus_log_parse_error(r);
1488
1489 r = sd_bus_message_exit_container(reply);
1490 if (r < 0)
1491 return bus_log_parse_error(r);
1492
1493 if (strv_isempty(buf)) {
1494 r = strv_extendf(&buf, "none");
1495 if (r < 0)
1496 return log_oom();
1497 }
1498
1499 return dump_list(table, prefix, buf);
1500 }
1501
1502 static int dump_ifindexes(Table *table, const char *prefix, const int *ifindexes) {
1503 int r;
1504
1505 assert(table);
1506 assert(prefix);
1507
1508 if (!ifindexes)
1509 return 0;
1510
1511 for (unsigned c = 0; ifindexes[c] > 0; c++) {
1512 if (c == 0)
1513 r = table_add_cell(table, NULL, TABLE_FIELD, prefix);
1514 else
1515 r = table_add_cell(table, NULL, TABLE_EMPTY, NULL);
1516 if (r < 0)
1517 return table_log_add_error(r);
1518
1519 r = table_add_cell(table, NULL, TABLE_IFINDEX, &ifindexes[c]);
1520 if (r < 0)
1521 return table_log_add_error(r);
1522 }
1523
1524 return 0;
1525 }
1526
1527 #define DUMP_STATS_ONE(name, val_name) \
1528 ({ \
1529 r = table_add_cell(table, NULL, TABLE_FIELD, name); \
1530 if (r < 0) \
1531 return table_log_add_error(r); \
1532 r = table_add_cell(table, NULL, \
1533 info->has_stats64 ? TABLE_UINT64 : TABLE_UINT32, \
1534 info->has_stats64 ? (void*) &info->stats64.val_name : (void*) &info->stats.val_name); \
1535 if (r < 0) \
1536 return table_log_add_error(r); \
1537 })
1538
1539 static int dump_statistics(Table *table, const LinkInfo *info) {
1540 int r;
1541
1542 assert(table);
1543 assert(info);
1544
1545 if (!arg_stats)
1546 return 0;
1547
1548 if (!info->has_stats64 && !info->has_stats)
1549 return 0;
1550
1551 DUMP_STATS_ONE("Rx Packets", rx_packets);
1552 DUMP_STATS_ONE("Tx Packets", tx_packets);
1553 DUMP_STATS_ONE("Rx Bytes", rx_bytes);
1554 DUMP_STATS_ONE("Tx Bytes", tx_bytes);
1555 DUMP_STATS_ONE("Rx Errors", rx_errors);
1556 DUMP_STATS_ONE("Tx Errors", tx_errors);
1557 DUMP_STATS_ONE("Rx Dropped", rx_dropped);
1558 DUMP_STATS_ONE("Tx Dropped", tx_dropped);
1559 DUMP_STATS_ONE("Multicast Packets", multicast);
1560 DUMP_STATS_ONE("Collisions", collisions);
1561
1562 return 0;
1563 }
1564
1565 static int dump_hw_address(Table *table, sd_hwdb *hwdb, const char *field, const struct hw_addr_data *addr) {
1566 _cleanup_free_ char *description = NULL;
1567 int r;
1568
1569 assert(table);
1570 assert(field);
1571 assert(addr);
1572
1573 if (addr->length == ETH_ALEN)
1574 (void) ieee_oui(hwdb, &addr->ether, &description);
1575
1576 r = table_add_cell(table, NULL, TABLE_FIELD, field);
1577 if (r < 0)
1578 return table_log_add_error(r);
1579
1580 r = table_add_cell_stringf(table, NULL, "%s%s%s%s",
1581 HW_ADDR_TO_STR(addr),
1582 description ? " (" : "",
1583 strempty(description),
1584 description ? ")" : "");
1585 if (r < 0)
1586 return table_log_add_error(r);
1587
1588 return 0;
1589 }
1590
1591 static OutputFlags get_output_flags(void) {
1592 return
1593 arg_all * OUTPUT_SHOW_ALL |
1594 (arg_full || !on_tty() || pager_have()) * OUTPUT_FULL_WIDTH |
1595 colors_enabled() * OUTPUT_COLOR;
1596 }
1597
1598 static int show_logs(const LinkInfo *info) {
1599 _cleanup_(sd_journal_closep) sd_journal *j = NULL;
1600 int r;
1601
1602 if (arg_lines == 0)
1603 return 0;
1604
1605 r = sd_journal_open(&j, SD_JOURNAL_LOCAL_ONLY | SD_JOURNAL_ASSUME_IMMUTABLE);
1606 if (r < 0)
1607 return log_error_errno(r, "Failed to open journal: %m");
1608
1609 r = add_match_this_boot(j, NULL);
1610 if (r < 0)
1611 return log_error_errno(r, "Failed to add boot matches: %m");
1612
1613 if (info) {
1614 char m1[STRLEN("_KERNEL_DEVICE=n") + DECIMAL_STR_MAX(int)];
1615 const char *m2, *m3;
1616
1617 /* kernel */
1618 xsprintf(m1, "_KERNEL_DEVICE=n%i", info->ifindex);
1619 /* networkd */
1620 m2 = strjoina("INTERFACE=", info->name);
1621 /* udevd */
1622 m3 = strjoina("DEVICE=", info->name);
1623
1624 (void)(
1625 (r = sd_journal_add_match(j, m1, 0)) ||
1626 (r = sd_journal_add_disjunction(j)) ||
1627 (r = sd_journal_add_match(j, m2, 0)) ||
1628 (r = sd_journal_add_disjunction(j)) ||
1629 (r = sd_journal_add_match(j, m3, 0))
1630 );
1631 if (r < 0)
1632 return log_error_errno(r, "Failed to add link matches: %m");
1633 } else {
1634 r = add_matches_for_unit(j, "systemd-networkd.service");
1635 if (r < 0)
1636 return log_error_errno(r, "Failed to add unit matches: %m");
1637
1638 r = add_matches_for_unit(j, "systemd-networkd-wait-online.service");
1639 if (r < 0)
1640 return log_error_errno(r, "Failed to add unit matches: %m");
1641 }
1642
1643 return show_journal(
1644 stdout,
1645 j,
1646 OUTPUT_SHORT,
1647 0,
1648 0,
1649 arg_lines,
1650 get_output_flags() | OUTPUT_BEGIN_NEWLINE,
1651 NULL);
1652 }
1653
1654 static int table_add_string_line(Table *table, const char *key, const char *value) {
1655 int r;
1656
1657 assert(table);
1658 assert(key);
1659
1660 if (isempty(value))
1661 return 0;
1662
1663 r = table_add_many(table,
1664 TABLE_FIELD, key,
1665 TABLE_STRING, value);
1666 if (r < 0)
1667 return table_log_add_error(r);
1668
1669 return 0;
1670 }
1671
1672 static int format_dropins(char **dropins) {
1673 STRV_FOREACH(d, dropins) {
1674 _cleanup_free_ char *s = NULL;
1675 int glyph = *(d + 1) == NULL ? SPECIAL_GLYPH_TREE_RIGHT : SPECIAL_GLYPH_TREE_BRANCH;
1676
1677 s = strjoin(special_glyph(glyph), *d);
1678 if (!s)
1679 return log_oom();
1680
1681 free_and_replace(*d, s);
1682 }
1683
1684 return 0;
1685 }
1686
1687 static int link_status_one(
1688 sd_bus *bus,
1689 sd_netlink *rtnl,
1690 sd_hwdb *hwdb,
1691 Varlink *vl,
1692 const LinkInfo *info) {
1693
1694 _cleanup_strv_free_ char **dns = NULL, **ntp = NULL, **sip = NULL, **search_domains = NULL,
1695 **route_domains = NULL, **link_dropins = NULL, **network_dropins = NULL;
1696 _cleanup_free_ char *t = NULL, *network = NULL, *iaid = NULL, *duid = NULL, *captive_portal = NULL,
1697 *setup_state = NULL, *operational_state = NULL, *online_state = NULL, *activation_policy = NULL;
1698 const char *driver = NULL, *path = NULL, *vendor = NULL, *model = NULL, *link = NULL,
1699 *on_color_operational, *off_color_operational, *on_color_setup, *off_color_setup, *on_color_online;
1700 _cleanup_free_ int *carrier_bound_to = NULL, *carrier_bound_by = NULL;
1701 _cleanup_(sd_dhcp_lease_unrefp) sd_dhcp_lease *lease = NULL;
1702 _cleanup_(table_unrefp) Table *table = NULL;
1703 int r;
1704
1705 assert(bus);
1706 assert(rtnl);
1707 assert(vl);
1708 assert(info);
1709
1710 (void) sd_network_link_get_operational_state(info->ifindex, &operational_state);
1711 operational_state_to_color(info->name, operational_state, &on_color_operational, &off_color_operational);
1712
1713 (void) sd_network_link_get_online_state(info->ifindex, &online_state);
1714 online_state_to_color(online_state, &on_color_online, NULL);
1715
1716 (void) sd_network_link_get_setup_state(info->ifindex, &setup_state);
1717 setup_state_to_color(setup_state, &on_color_setup, &off_color_setup);
1718
1719 (void) sd_network_link_get_dns(info->ifindex, &dns);
1720 (void) sd_network_link_get_search_domains(info->ifindex, &search_domains);
1721 (void) sd_network_link_get_route_domains(info->ifindex, &route_domains);
1722 (void) sd_network_link_get_ntp(info->ifindex, &ntp);
1723 (void) sd_network_link_get_sip(info->ifindex, &sip);
1724 (void) sd_network_link_get_captive_portal(info->ifindex, &captive_portal);
1725 (void) sd_network_link_get_network_file(info->ifindex, &network);
1726 (void) sd_network_link_get_network_file_dropins(info->ifindex, &network_dropins);
1727 (void) sd_network_link_get_carrier_bound_to(info->ifindex, &carrier_bound_to);
1728 (void) sd_network_link_get_carrier_bound_by(info->ifindex, &carrier_bound_by);
1729 (void) sd_network_link_get_activation_policy(info->ifindex, &activation_policy);
1730
1731 if (info->sd_device) {
1732 const char *joined;
1733
1734 (void) sd_device_get_property_value(info->sd_device, "ID_NET_LINK_FILE", &link);
1735
1736 if (sd_device_get_property_value(info->sd_device, "ID_NET_LINK_FILE_DROPINS", &joined) >= 0) {
1737 r = strv_split_full(&link_dropins, joined, ":", EXTRACT_CUNESCAPE);
1738 if (r < 0)
1739 return r;
1740 }
1741
1742 (void) sd_device_get_property_value(info->sd_device, "ID_NET_DRIVER", &driver);
1743 (void) sd_device_get_property_value(info->sd_device, "ID_PATH", &path);
1744 (void) device_get_vendor_string(info->sd_device, &vendor);
1745 (void) device_get_model_string(info->sd_device, &model);
1746 }
1747
1748 r = net_get_type_string(info->sd_device, info->iftype, &t);
1749 if (r == -ENOMEM)
1750 return log_oom();
1751
1752 char lease_file[STRLEN("/run/systemd/netif/leases/") + DECIMAL_STR_MAX(int)];
1753 xsprintf(lease_file, "/run/systemd/netif/leases/%i", info->ifindex);
1754
1755 (void) dhcp_lease_load(&lease, lease_file);
1756
1757 r = format_dropins(network_dropins);
1758 if (r < 0)
1759 return r;
1760
1761 if (strv_prepend(&network_dropins, network) < 0)
1762 return log_oom();
1763
1764 r = format_dropins(link_dropins);
1765 if (r < 0)
1766 return r;
1767
1768 if (strv_prepend(&link_dropins, link) < 0)
1769 return log_oom();
1770
1771 table = table_new_vertical();
1772 if (!table)
1773 return log_oom();
1774
1775 if (arg_full)
1776 table_set_width(table, 0);
1777
1778 /* unit files and basic states. */
1779 r = table_add_many(table,
1780 TABLE_FIELD, "Link File",
1781 TABLE_STRV, link_dropins ?: STRV_MAKE("n/a"),
1782 TABLE_FIELD, "Network File",
1783 TABLE_STRV, network_dropins ?: STRV_MAKE("n/a"),
1784 TABLE_FIELD, "State");
1785 if (r < 0)
1786 return table_log_add_error(r);
1787
1788 r = table_add_cell_stringf(table, NULL, "%s%s%s (%s%s%s)",
1789 on_color_operational, strna(operational_state), off_color_operational,
1790 on_color_setup, setup_state ?: "unmanaged", off_color_setup);
1791 if (r < 0)
1792 return table_log_add_error(r);
1793
1794 r = table_add_many(table,
1795 TABLE_FIELD, "Online state",
1796 TABLE_STRING, online_state ?: "unknown",
1797 TABLE_SET_COLOR, on_color_online);
1798 if (r < 0)
1799 return table_log_add_error(r);
1800
1801 r = table_add_string_line(table, "Type", t);
1802 if (r < 0)
1803 return r;
1804
1805 r = table_add_string_line(table, "Kind", info->netdev_kind);
1806 if (r < 0)
1807 return r;
1808
1809 r = table_add_string_line(table, "Path", path);
1810 if (r < 0)
1811 return r;
1812
1813 r = table_add_string_line(table, "Driver", driver);
1814 if (r < 0)
1815 return r;
1816
1817 r = table_add_string_line(table, "Vendor", vendor);
1818 if (r < 0)
1819 return r;
1820
1821 r = table_add_string_line(table, "Model", model);
1822 if (r < 0)
1823 return r;
1824
1825 strv_sort(info->alternative_names);
1826 r = dump_list(table, "Alternative Names", info->alternative_names);
1827 if (r < 0)
1828 return r;
1829
1830 if (info->has_hw_address) {
1831 r = dump_hw_address(table, hwdb, "Hardware Address", &info->hw_address);
1832 if (r < 0)
1833 return r;
1834 }
1835
1836 if (info->has_permanent_hw_address) {
1837 r = dump_hw_address(table, hwdb, "Permanent Hardware Address", &info->permanent_hw_address);
1838 if (r < 0)
1839 return r;
1840 }
1841
1842 if (info->mtu > 0) {
1843 char min_str[DECIMAL_STR_MAX(uint32_t)], max_str[DECIMAL_STR_MAX(uint32_t)];
1844
1845 xsprintf(min_str, "%" PRIu32, info->min_mtu);
1846 xsprintf(max_str, "%" PRIu32, info->max_mtu);
1847
1848 r = table_add_cell(table, NULL, TABLE_FIELD, "MTU");
1849 if (r < 0)
1850 return table_log_add_error(r);
1851
1852 r = table_add_cell_stringf(table, NULL, "%" PRIu32 "%s%s%s%s%s%s%s",
1853 info->mtu,
1854 info->min_mtu > 0 || info->max_mtu > 0 ? " (" : "",
1855 info->min_mtu > 0 ? "min: " : "",
1856 info->min_mtu > 0 ? min_str : "",
1857 info->min_mtu > 0 && info->max_mtu > 0 ? ", " : "",
1858 info->max_mtu > 0 ? "max: " : "",
1859 info->max_mtu > 0 ? max_str : "",
1860 info->min_mtu > 0 || info->max_mtu > 0 ? ")" : "");
1861 if (r < 0)
1862 return table_log_add_error(r);
1863 }
1864
1865 r = table_add_string_line(table, "QDisc", info->qdisc);
1866 if (r < 0)
1867 return r;
1868
1869 if (info->master > 0) {
1870 r = table_add_many(table,
1871 TABLE_FIELD, "Master",
1872 TABLE_IFINDEX, info->master);
1873 if (r < 0)
1874 return table_log_add_error(r);
1875 }
1876
1877 if (info->has_ipv6_address_generation_mode) {
1878 static const struct {
1879 const char *mode;
1880 } mode_table[] = {
1881 { "eui64" },
1882 { "none" },
1883 { "stable-privacy" },
1884 { "random" },
1885 };
1886
1887 r = table_add_many(table,
1888 TABLE_FIELD, "IPv6 Address Generation Mode",
1889 TABLE_STRING, mode_table[info->addr_gen_mode]);
1890 if (r < 0)
1891 return table_log_add_error(r);
1892 }
1893
1894 if (streq_ptr(info->netdev_kind, "bridge")) {
1895 r = table_add_many(table,
1896 TABLE_FIELD, "Forward Delay",
1897 TABLE_TIMESPAN_MSEC, jiffies_to_usec(info->forward_delay),
1898 TABLE_FIELD, "Hello Time",
1899 TABLE_TIMESPAN_MSEC, jiffies_to_usec(info->hello_time),
1900 TABLE_FIELD, "Max Age",
1901 TABLE_TIMESPAN_MSEC, jiffies_to_usec(info->max_age),
1902 TABLE_FIELD, "Ageing Time",
1903 TABLE_TIMESPAN_MSEC, jiffies_to_usec(info->ageing_time),
1904 TABLE_FIELD, "Priority",
1905 TABLE_UINT16, info->priority,
1906 TABLE_FIELD, "STP",
1907 TABLE_BOOLEAN, info->stp_state > 0,
1908 TABLE_FIELD, "Multicast IGMP Version",
1909 TABLE_UINT8, info->mcast_igmp_version,
1910 TABLE_FIELD, "Cost",
1911 TABLE_UINT32, info->cost);
1912 if (r < 0)
1913 return table_log_add_error(r);
1914
1915 if (info->port_state <= BR_STATE_BLOCKING) {
1916 r = table_add_many(table,
1917 TABLE_FIELD, "Port State",
1918 TABLE_STRING, bridge_state_to_string(info->port_state));
1919 if (r < 0)
1920 return table_log_add_error(r);
1921 }
1922
1923 } else if (streq_ptr(info->netdev_kind, "bond")) {
1924 r = table_add_many(table,
1925 TABLE_FIELD, "Mode",
1926 TABLE_STRING, bond_mode_to_string(info->mode),
1927 TABLE_FIELD, "Miimon",
1928 TABLE_TIMESPAN_MSEC, info->miimon * USEC_PER_MSEC,
1929 TABLE_FIELD, "Updelay",
1930 TABLE_TIMESPAN_MSEC, info->updelay * USEC_PER_MSEC,
1931 TABLE_FIELD, "Downdelay",
1932 TABLE_TIMESPAN_MSEC, info->downdelay * USEC_PER_MSEC);
1933 if (r < 0)
1934 return table_log_add_error(r);
1935
1936 } else if (streq_ptr(info->netdev_kind, "vxlan")) {
1937 char ttl[CONST_MAX(STRLEN("auto") + 1, DECIMAL_STR_MAX(uint8_t))];
1938
1939 if (info->vxlan_info.vni > 0) {
1940 r = table_add_many(table,
1941 TABLE_FIELD, "VNI",
1942 TABLE_UINT32, info->vxlan_info.vni);
1943 if (r < 0)
1944 return table_log_add_error(r);
1945 }
1946
1947 if (IN_SET(info->vxlan_info.group_family, AF_INET, AF_INET6)) {
1948 const char *p;
1949
1950 r = in_addr_is_multicast(info->vxlan_info.group_family, &info->vxlan_info.group);
1951 if (r <= 0)
1952 p = "Remote";
1953 else
1954 p = "Group";
1955
1956 r = table_add_many(table,
1957 TABLE_FIELD, p,
1958 info->vxlan_info.group_family == AF_INET ? TABLE_IN_ADDR : TABLE_IN6_ADDR, &info->vxlan_info.group);
1959 if (r < 0)
1960 return table_log_add_error(r);
1961 }
1962
1963 if (IN_SET(info->vxlan_info.local_family, AF_INET, AF_INET6)) {
1964 r = table_add_many(table,
1965 TABLE_FIELD, "Local",
1966 info->vxlan_info.local_family == AF_INET ? TABLE_IN_ADDR : TABLE_IN6_ADDR, &info->vxlan_info.local);
1967 if (r < 0)
1968 return table_log_add_error(r);
1969 }
1970
1971 if (info->vxlan_info.dest_port > 0) {
1972 r = table_add_many(table,
1973 TABLE_FIELD, "Destination Port",
1974 TABLE_UINT16, be16toh(info->vxlan_info.dest_port));
1975 if (r < 0)
1976 return table_log_add_error(r);
1977 }
1978
1979 if (info->vxlan_info.link > 0) {
1980 r = table_add_many(table,
1981 TABLE_FIELD, "Underlying Device",
1982 TABLE_IFINDEX, info->vxlan_info.link);
1983 if (r < 0)
1984 return table_log_add_error(r);
1985 }
1986
1987 r = table_add_many(table,
1988 TABLE_FIELD, "Learning",
1989 TABLE_BOOLEAN, info->vxlan_info.learning,
1990 TABLE_FIELD, "RSC",
1991 TABLE_BOOLEAN, info->vxlan_info.rsc,
1992 TABLE_FIELD, "L3MISS",
1993 TABLE_BOOLEAN, info->vxlan_info.l3miss,
1994 TABLE_FIELD, "L2MISS",
1995 TABLE_BOOLEAN, info->vxlan_info.l2miss);
1996 if (r < 0)
1997 return table_log_add_error(r);
1998
1999 if (info->vxlan_info.tos > 1) {
2000 r = table_add_many(table,
2001 TABLE_FIELD, "TOS",
2002 TABLE_UINT8, info->vxlan_info.tos);
2003 if (r < 0)
2004 return table_log_add_error(r);
2005 }
2006
2007 if (info->vxlan_info.ttl > 0)
2008 xsprintf(ttl, "%" PRIu8, info->vxlan_info.ttl);
2009 else
2010 strcpy(ttl, "auto");
2011
2012 r = table_add_many(table,
2013 TABLE_FIELD, "TTL",
2014 TABLE_STRING, ttl);
2015 if (r < 0)
2016 return table_log_add_error(r);
2017
2018 } else if (streq_ptr(info->netdev_kind, "vlan") && info->vlan_id > 0) {
2019 r = table_add_many(table,
2020 TABLE_FIELD, "VLan Id",
2021 TABLE_UINT16, info->vlan_id);
2022 if (r < 0)
2023 return table_log_add_error(r);
2024
2025 } else if (STRPTR_IN_SET(info->netdev_kind, "ipip", "sit", "gre", "gretap", "erspan", "vti")) {
2026 if (in_addr_is_set(AF_INET, &info->local)) {
2027 r = table_add_many(table,
2028 TABLE_FIELD, "Local",
2029 TABLE_IN_ADDR, &info->local);
2030 if (r < 0)
2031 return table_log_add_error(r);
2032 }
2033
2034 if (in_addr_is_set(AF_INET, &info->remote)) {
2035 r = table_add_many(table,
2036 TABLE_FIELD, "Remote",
2037 TABLE_IN_ADDR, &info->remote);
2038 if (r < 0)
2039 return table_log_add_error(r);
2040 }
2041
2042 } else if (STRPTR_IN_SET(info->netdev_kind, "ip6gre", "ip6gretap", "ip6erspan", "vti6")) {
2043 if (in_addr_is_set(AF_INET6, &info->local)) {
2044 r = table_add_many(table,
2045 TABLE_FIELD, "Local",
2046 TABLE_IN6_ADDR, &info->local);
2047 if (r < 0)
2048 return table_log_add_error(r);
2049 }
2050
2051 if (in_addr_is_set(AF_INET6, &info->remote)) {
2052 r = table_add_many(table,
2053 TABLE_FIELD, "Remote",
2054 TABLE_IN6_ADDR, &info->remote);
2055 if (r < 0)
2056 return table_log_add_error(r);
2057 }
2058
2059 } else if (streq_ptr(info->netdev_kind, "geneve")) {
2060 r = table_add_many(table,
2061 TABLE_FIELD, "VNI",
2062 TABLE_UINT32, info->vni);
2063 if (r < 0)
2064 return table_log_add_error(r);
2065
2066 if (info->has_tunnel_ipv4 && in_addr_is_set(AF_INET, &info->remote)) {
2067 r = table_add_many(table,
2068 TABLE_FIELD, "Remote",
2069 TABLE_IN_ADDR, &info->remote);
2070 if (r < 0)
2071 return table_log_add_error(r);
2072 } else if (in_addr_is_set(AF_INET6, &info->remote)) {
2073 r = table_add_many(table,
2074 TABLE_FIELD, "Remote",
2075 TABLE_IN6_ADDR, &info->remote);
2076 if (r < 0)
2077 return table_log_add_error(r);
2078 }
2079
2080 if (info->ttl > 0) {
2081 r = table_add_many(table,
2082 TABLE_FIELD, "TTL",
2083 TABLE_UINT8, info->ttl);
2084 if (r < 0)
2085 return table_log_add_error(r);
2086 }
2087
2088 if (info->tos > 0) {
2089 r = table_add_many(table,
2090 TABLE_FIELD, "TOS",
2091 TABLE_UINT8, info->tos);
2092 if (r < 0)
2093 return table_log_add_error(r);
2094 }
2095
2096 r = table_add_many(table,
2097 TABLE_FIELD, "Port",
2098 TABLE_UINT16, info->tunnel_port,
2099 TABLE_FIELD, "Inherit",
2100 TABLE_STRING, geneve_df_to_string(info->inherit));
2101 if (r < 0)
2102 return table_log_add_error(r);
2103
2104 if (info->df > 0) {
2105 r = table_add_many(table,
2106 TABLE_FIELD, "IPDoNotFragment",
2107 TABLE_UINT8, info->df);
2108 if (r < 0)
2109 return table_log_add_error(r);
2110 }
2111
2112 r = table_add_many(table,
2113 TABLE_FIELD, "UDPChecksum",
2114 TABLE_BOOLEAN, info->csum,
2115 TABLE_FIELD, "UDP6ZeroChecksumTx",
2116 TABLE_BOOLEAN, info->csum6_tx,
2117 TABLE_FIELD, "UDP6ZeroChecksumRx",
2118 TABLE_BOOLEAN, info->csum6_rx);
2119 if (r < 0)
2120 return table_log_add_error(r);
2121
2122 if (info->label > 0) {
2123 r = table_add_many(table,
2124 TABLE_FIELD, "FlowLabel",
2125 TABLE_UINT32, info->label);
2126 if (r < 0)
2127 return table_log_add_error(r);
2128 }
2129
2130 } else if (STRPTR_IN_SET(info->netdev_kind, "macvlan", "macvtap")) {
2131 r = table_add_many(table,
2132 TABLE_FIELD, "Mode",
2133 TABLE_STRING, macvlan_mode_to_string(info->macvlan_mode));
2134 if (r < 0)
2135 return table_log_add_error(r);
2136
2137 } else if (streq_ptr(info->netdev_kind, "ipvlan")) {
2138 const char *p;
2139
2140 if (info->ipvlan_flags & IPVLAN_F_PRIVATE)
2141 p = "private";
2142 else if (info->ipvlan_flags & IPVLAN_F_VEPA)
2143 p = "vepa";
2144 else
2145 p = "bridge";
2146
2147 r = table_add_cell(table, NULL, TABLE_FIELD, "Mode");
2148 if (r < 0)
2149 return table_log_add_error(r);
2150
2151 r = table_add_cell_stringf(table, NULL, "%s (%s)",
2152 ipvlan_mode_to_string(info->ipvlan_mode), p);
2153 if (r < 0)
2154 return table_log_add_error(r);
2155 }
2156
2157 if (info->has_wlan_link_info) {
2158 _cleanup_free_ char *esc = NULL;
2159
2160 r = table_add_cell(table, NULL, TABLE_FIELD, "Wi-Fi access point");
2161 if (r < 0)
2162 return table_log_add_error(r);
2163
2164 if (info->ssid)
2165 esc = cescape(info->ssid);
2166
2167 r = table_add_cell_stringf(table, NULL, "%s (%s)",
2168 strnull(esc),
2169 ETHER_ADDR_TO_STR(&info->bssid));
2170 if (r < 0)
2171 return table_log_add_error(r);
2172 }
2173
2174 if (info->has_bitrates) {
2175 r = table_add_cell(table, NULL, TABLE_FIELD, "Bit Rate (Tx/Rx)");
2176 if (r < 0)
2177 return table_log_add_error(r);
2178
2179 r = table_add_cell_stringf(table, NULL, "%sbps/%sbps",
2180 FORMAT_BYTES_FULL(info->tx_bitrate, 0),
2181 FORMAT_BYTES_FULL(info->rx_bitrate, 0));
2182 if (r < 0)
2183 return table_log_add_error(r);
2184 }
2185
2186 if (info->has_tx_queues || info->has_rx_queues) {
2187 r = table_add_cell(table, NULL, TABLE_FIELD, "Number of Queues (Tx/Rx)");
2188 if (r < 0)
2189 return table_log_add_error(r);
2190
2191 r = table_add_cell_stringf(table, NULL, "%" PRIu32 "/%" PRIu32, info->tx_queues, info->rx_queues);
2192 if (r < 0)
2193 return table_log_add_error(r);
2194 }
2195
2196 if (info->has_ethtool_link_info) {
2197 if (IN_SET(info->autonegotiation, AUTONEG_DISABLE, AUTONEG_ENABLE)) {
2198 r = table_add_many(table,
2199 TABLE_FIELD, "Auto negotiation",
2200 TABLE_BOOLEAN, info->autonegotiation == AUTONEG_ENABLE);
2201 if (r < 0)
2202 return table_log_add_error(r);
2203 }
2204
2205 if (info->speed > 0 && info->speed != UINT64_MAX) {
2206 r = table_add_many(table,
2207 TABLE_FIELD, "Speed",
2208 TABLE_BPS, info->speed);
2209 if (r < 0)
2210 return table_log_add_error(r);
2211 }
2212
2213 r = table_add_string_line(table, "Duplex", duplex_to_string(info->duplex));
2214 if (r < 0)
2215 return r;
2216
2217 r = table_add_string_line(table, "Port", port_to_string(info->port));
2218 if (r < 0)
2219 return r;
2220 }
2221
2222 r = dump_addresses(rtnl, lease, table, info->ifindex);
2223 if (r < 0)
2224 return r;
2225
2226 r = dump_gateways(rtnl, hwdb, table, info->ifindex);
2227 if (r < 0)
2228 return r;
2229
2230 r = dump_list(table, "DNS", dns);
2231 if (r < 0)
2232 return r;
2233
2234 r = dump_list(table, "Search Domains", search_domains);
2235 if (r < 0)
2236 return r;
2237
2238 r = dump_list(table, "Route Domains", route_domains);
2239 if (r < 0)
2240 return r;
2241
2242 r = dump_list(table, "NTP", ntp);
2243 if (r < 0)
2244 return r;
2245
2246 r = dump_list(table, "SIP", sip);
2247 if (r < 0)
2248 return r;
2249
2250 r = dump_ifindexes(table, "Carrier Bound To", carrier_bound_to);
2251 if (r < 0)
2252 return r;
2253
2254 r = dump_ifindexes(table, "Carrier Bound By", carrier_bound_by);
2255 if (r < 0)
2256 return r;
2257
2258 r = table_add_string_line(table, "Activation Policy", activation_policy);
2259 if (r < 0)
2260 return r;
2261
2262 r = sd_network_link_get_required_for_online(info->ifindex);
2263 if (r >= 0) {
2264 r = table_add_many(table,
2265 TABLE_FIELD, "Required For Online",
2266 TABLE_BOOLEAN, r);
2267 if (r < 0)
2268 return table_log_add_error(r);
2269 }
2270
2271 if (captive_portal) {
2272 r = table_add_many(table,
2273 TABLE_FIELD, "Captive Portal",
2274 TABLE_STRING, captive_portal,
2275 TABLE_SET_URL, captive_portal);
2276 if (r < 0)
2277 return table_log_add_error(r);
2278 }
2279
2280 if (lease) {
2281 const sd_dhcp_client_id *client_id;
2282 const char *tz;
2283
2284 r = sd_dhcp_lease_get_timezone(lease, &tz);
2285 if (r >= 0) {
2286 r = table_add_many(table,
2287 TABLE_FIELD, "Time Zone",
2288 TABLE_STRING, tz);
2289 if (r < 0)
2290 return table_log_add_error(r);
2291 }
2292
2293 r = sd_dhcp_lease_get_client_id(lease, &client_id);
2294 if (r >= 0) {
2295 _cleanup_free_ char *id = NULL;
2296
2297 r = sd_dhcp_client_id_to_string(client_id, &id);
2298 if (r >= 0) {
2299 r = table_add_many(table,
2300 TABLE_FIELD, "DHCP4 Client ID",
2301 TABLE_STRING, id);
2302 if (r < 0)
2303 return table_log_add_error(r);
2304 }
2305 }
2306 }
2307
2308 r = sd_network_link_get_dhcp6_client_iaid_string(info->ifindex, &iaid);
2309 if (r >= 0) {
2310 r = table_add_many(table,
2311 TABLE_FIELD, "DHCP6 Client IAID",
2312 TABLE_STRING, iaid);
2313 if (r < 0)
2314 return table_log_add_error(r);
2315 }
2316
2317 r = sd_network_link_get_dhcp6_client_duid_string(info->ifindex, &duid);
2318 if (r >= 0) {
2319 r = table_add_many(table,
2320 TABLE_FIELD, "DHCP6 Client DUID",
2321 TABLE_STRING, duid);
2322 if (r < 0)
2323 return table_log_add_error(r);
2324 }
2325
2326 r = dump_lldp_neighbors(vl, table, info->ifindex);
2327 if (r < 0)
2328 return r;
2329
2330 r = dump_dhcp_leases(table, "Offered DHCP leases", bus, info);
2331 if (r < 0)
2332 return r;
2333
2334 r = dump_statistics(table, info);
2335 if (r < 0)
2336 return r;
2337
2338 /* First line: circle, ifindex, ifname. */
2339 printf("%s%s%s %d: %s\n",
2340 on_color_operational, special_glyph(SPECIAL_GLYPH_BLACK_CIRCLE), off_color_operational,
2341 info->ifindex, info->name);
2342
2343 r = table_print(table, NULL);
2344 if (r < 0)
2345 return table_log_print_error(r);
2346
2347 return show_logs(info);
2348 }
2349
2350 static int system_status(sd_netlink *rtnl, sd_hwdb *hwdb) {
2351 _cleanup_free_ char *operational_state = NULL, *online_state = NULL, *netifs_joined = NULL;
2352 _cleanup_strv_free_ char **netifs = NULL, **dns = NULL, **ntp = NULL, **search_domains = NULL, **route_domains = NULL;
2353 const char *on_color_operational, *off_color_operational, *on_color_online;
2354 _cleanup_(table_unrefp) Table *table = NULL;
2355 int r;
2356
2357 assert(rtnl);
2358
2359 (void) sd_network_get_operational_state(&operational_state);
2360 operational_state_to_color(NULL, operational_state, &on_color_operational, &off_color_operational);
2361
2362 (void) sd_network_get_online_state(&online_state);
2363 online_state_to_color(online_state, &on_color_online, NULL);
2364
2365 table = table_new_vertical();
2366 if (!table)
2367 return log_oom();
2368
2369 if (arg_full)
2370 table_set_width(table, 0);
2371
2372 r = get_files_in_directory("/run/systemd/netif/links/", &netifs);
2373 if (r < 0 && r != -ENOENT)
2374 return log_error_errno(r, "Failed to list network interfaces: %m");
2375 else if (r > 0) {
2376 netifs_joined = strv_join(netifs, ", ");
2377 if (!netifs_joined)
2378 return log_oom();
2379 }
2380
2381 r = table_add_many(table,
2382 TABLE_FIELD, "State",
2383 TABLE_STRING, strna(operational_state),
2384 TABLE_SET_COLOR, on_color_operational,
2385 TABLE_FIELD, "Online state",
2386 TABLE_STRING, online_state ?: "unknown",
2387 TABLE_SET_COLOR, on_color_online);
2388 if (r < 0)
2389 return table_log_add_error(r);
2390
2391 r = dump_addresses(rtnl, NULL, table, 0);
2392 if (r < 0)
2393 return r;
2394
2395 r = dump_gateways(rtnl, hwdb, table, 0);
2396 if (r < 0)
2397 return r;
2398
2399 (void) sd_network_get_dns(&dns);
2400 r = dump_list(table, "DNS", dns);
2401 if (r < 0)
2402 return r;
2403
2404 (void) sd_network_get_search_domains(&search_domains);
2405 r = dump_list(table, "Search Domains", search_domains);
2406 if (r < 0)
2407 return r;
2408
2409 (void) sd_network_get_route_domains(&route_domains);
2410 r = dump_list(table, "Route Domains", route_domains);
2411 if (r < 0)
2412 return r;
2413
2414 (void) sd_network_get_ntp(&ntp);
2415 r = dump_list(table, "NTP", ntp);
2416 if (r < 0)
2417 return r;
2418
2419 printf("%s%s%s Interfaces: %s\n",
2420 on_color_operational, special_glyph(SPECIAL_GLYPH_BLACK_CIRCLE), off_color_operational,
2421 strna(netifs_joined));
2422
2423 r = table_print(table, NULL);
2424 if (r < 0)
2425 return table_log_print_error(r);
2426
2427 return show_logs(NULL);
2428 }
2429
2430 static int link_status(int argc, char *argv[], void *userdata) {
2431 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2432 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
2433 _cleanup_(sd_hwdb_unrefp) sd_hwdb *hwdb = NULL;
2434 _cleanup_(varlink_unrefp) Varlink *vl = NULL;
2435 _cleanup_(link_info_array_freep) LinkInfo *links = NULL;
2436 int r, c;
2437
2438 r = acquire_bus(&bus);
2439 if (r < 0)
2440 return r;
2441
2442 if (arg_json_format_flags != JSON_FORMAT_OFF) {
2443 if (arg_all || argc <= 1)
2444 return dump_manager_description(bus);
2445 else
2446 return dump_link_description(bus, strv_skip(argv, 1));
2447 }
2448
2449 pager_open(arg_pager_flags);
2450
2451 r = sd_netlink_open(&rtnl);
2452 if (r < 0)
2453 return log_error_errno(r, "Failed to connect to netlink: %m");
2454
2455 r = sd_hwdb_new(&hwdb);
2456 if (r < 0)
2457 log_debug_errno(r, "Failed to open hardware database: %m");
2458
2459 r = varlink_connect_networkd(&vl);
2460 if (r < 0)
2461 return r;
2462
2463 if (arg_all)
2464 c = acquire_link_info(bus, rtnl, NULL, &links);
2465 else if (argc <= 1)
2466 return system_status(rtnl, hwdb);
2467 else
2468 c = acquire_link_info(bus, rtnl, argv + 1, &links);
2469 if (c < 0)
2470 return c;
2471
2472 r = 0;
2473
2474 bool first = true;
2475 FOREACH_ARRAY(i, links, c) {
2476 if (!first)
2477 putchar('\n');
2478
2479 RET_GATHER(r, link_status_one(bus, rtnl, hwdb, vl, i));
2480
2481 first = false;
2482 }
2483
2484 return r;
2485 }
2486
2487 static char *lldp_capabilities_to_string(uint64_t x) {
2488 static const char characters[] = {
2489 'o', 'p', 'b', 'w', 'r', 't', 'd', 'a', 'c', 's', 'm',
2490 };
2491 char *ret;
2492 unsigned i;
2493
2494 ret = new(char, ELEMENTSOF(characters) + 1);
2495 if (!ret)
2496 return NULL;
2497
2498 for (i = 0; i < ELEMENTSOF(characters); i++)
2499 ret[i] = (x & (1U << i)) ? characters[i] : '.';
2500
2501 ret[i] = 0;
2502 return ret;
2503 }
2504
2505 static void lldp_capabilities_legend(uint16_t x) {
2506 unsigned cols = columns();
2507 static const char* const table[] = {
2508 "o - Other",
2509 "p - Repeater",
2510 "b - Bridge",
2511 "w - WLAN Access Point",
2512 "r - Router",
2513 "t - Telephone",
2514 "d - DOCSIS cable device",
2515 "a - Station",
2516 "c - Customer VLAN",
2517 "s - Service VLAN",
2518 "m - Two-port MAC Relay (TPMR)",
2519 };
2520
2521 if (x == 0)
2522 return;
2523
2524 printf("\nCapability Flags:\n");
2525 for (unsigned w = 0, i = 0; i < ELEMENTSOF(table); i++)
2526 if (x & (1U << i) || arg_all) {
2527 bool newline;
2528
2529 newline = w + strlen(table[i]) + (w == 0 ? 0 : 2) > cols;
2530 if (newline)
2531 w = 0;
2532 w += printf("%s%s%s", newline ? "\n" : "", w == 0 ? "" : "; ", table[i]);
2533 }
2534 puts("");
2535 }
2536
2537 static bool interface_match_pattern(const InterfaceInfo *info, char * const *patterns) {
2538 assert(info);
2539
2540 if (strv_isempty(patterns))
2541 return true;
2542
2543 if (strv_fnmatch(patterns, info->ifname))
2544 return true;
2545
2546 char str[DECIMAL_STR_MAX(int)];
2547 xsprintf(str, "%i", info->ifindex);
2548 if (strv_fnmatch(patterns, str))
2549 return true;
2550
2551 STRV_FOREACH(a, info->altnames)
2552 if (strv_fnmatch(patterns, *a))
2553 return true;
2554
2555 return false;
2556 }
2557
2558 static int dump_lldp_neighbors_json(JsonVariant *reply, char * const *patterns) {
2559 _cleanup_(json_variant_unrefp) JsonVariant *array = NULL, *v = NULL;
2560 int r;
2561
2562 assert(reply);
2563
2564 if (strv_isempty(patterns))
2565 return json_variant_dump(reply, arg_json_format_flags, NULL, NULL);
2566
2567 /* Filter and dump the result. */
2568
2569 JsonVariant *i;
2570 JSON_VARIANT_ARRAY_FOREACH(i, json_variant_by_key(reply, "Neighbors")) {
2571 _cleanup_(interface_info_done) InterfaceInfo info = {};
2572
2573 r = json_dispatch(i, interface_info_dispatch_table, JSON_LOG|JSON_ALLOW_EXTENSIONS, &info);
2574 if (r < 0)
2575 return r;
2576
2577 if (!interface_match_pattern(&info, patterns))
2578 continue;
2579
2580 r = json_variant_append_array(&array, i);
2581 if (r < 0)
2582 return log_error_errno(r, "Failed to append json variant to array: %m");
2583 }
2584
2585 r = json_build(&v,
2586 JSON_BUILD_OBJECT(
2587 JSON_BUILD_PAIR_CONDITION(json_variant_is_blank_array(array), "Neighbors", JSON_BUILD_EMPTY_ARRAY),
2588 JSON_BUILD_PAIR_CONDITION(!json_variant_is_blank_array(array), "Neighbors", JSON_BUILD_VARIANT(array))));
2589 if (r < 0)
2590 return log_error_errno(r, "Failed to build json varinat: %m");
2591
2592 return json_variant_dump(v, arg_json_format_flags, NULL, NULL);
2593 }
2594
2595 static int link_lldp_status(int argc, char *argv[], void *userdata) {
2596 _cleanup_(varlink_unrefp) Varlink *vl = NULL;
2597 _cleanup_(table_unrefp) Table *table = NULL;
2598 JsonVariant *reply;
2599 uint64_t all = 0;
2600 TableCell *cell;
2601 size_t m = 0;
2602 int r;
2603
2604 r = varlink_connect_networkd(&vl);
2605 if (r < 0)
2606 return r;
2607
2608 r = varlink_call_and_log(vl, "io.systemd.Network.GetLLDPNeighbors", NULL, &reply);
2609 if (r < 0)
2610 return r;
2611
2612 if (arg_json_format_flags != JSON_FORMAT_OFF)
2613 return dump_lldp_neighbors_json(reply, strv_skip(argv, 1));
2614
2615 pager_open(arg_pager_flags);
2616
2617 table = table_new("index",
2618 "link",
2619 "system-name",
2620 "system-description",
2621 "chassis-id",
2622 "port-id",
2623 "port-description",
2624 "caps");
2625 if (!table)
2626 return log_oom();
2627
2628 if (arg_full)
2629 table_set_width(table, 0);
2630
2631 table_set_header(table, arg_legend);
2632 table_set_ersatz_string(table, TABLE_ERSATZ_DASH);
2633 table_set_sort(table, (size_t) 0, (size_t) 2);
2634 table_hide_column_from_display(table, (size_t) 0);
2635
2636 /* Make the capabilities not truncated */
2637 assert_se(cell = table_get_cell(table, 0, 7));
2638 table_set_minimum_width(table, cell, 11);
2639
2640 JsonVariant *i;
2641 JSON_VARIANT_ARRAY_FOREACH(i, json_variant_by_key(reply, "Neighbors")) {
2642 _cleanup_(interface_info_done) InterfaceInfo info = {};
2643
2644 r = json_dispatch(i, interface_info_dispatch_table, JSON_LOG|JSON_ALLOW_EXTENSIONS, &info);
2645 if (r < 0)
2646 return r;
2647
2648 if (!interface_match_pattern(&info, strv_skip(argv, 1)))
2649 continue;
2650
2651 JsonVariant *neighbor;
2652 JSON_VARIANT_ARRAY_FOREACH(neighbor, info.v) {
2653 LLDPNeighborInfo neighbor_info = {};
2654
2655 r = json_dispatch(neighbor, lldp_neighbor_dispatch_table, JSON_LOG|JSON_ALLOW_EXTENSIONS, &neighbor_info);
2656 if (r < 0)
2657 return r;
2658
2659 all |= neighbor_info.capabilities;
2660
2661 _cleanup_free_ char *cap_str = lldp_capabilities_to_string(neighbor_info.capabilities);
2662
2663 r = table_add_many(table,
2664 TABLE_INT, info.ifindex,
2665 TABLE_STRING, info.ifname,
2666 TABLE_STRING, neighbor_info.system_name,
2667 TABLE_STRING, neighbor_info.system_description,
2668 TABLE_STRING, neighbor_info.chassis_id,
2669 TABLE_STRING, neighbor_info.port_id,
2670 TABLE_STRING, neighbor_info.port_description,
2671 TABLE_STRING, cap_str);
2672 if (r < 0)
2673 return table_log_add_error(r);
2674
2675 m++;
2676 }
2677 }
2678
2679 r = table_print(table, NULL);
2680 if (r < 0)
2681 return table_log_print_error(r);
2682
2683 if (arg_legend) {
2684 lldp_capabilities_legend(all);
2685 printf("\n%zu neighbor(s) listed.\n", m);
2686 }
2687
2688 return 0;
2689 }
2690
2691 static int link_delete_send_message(sd_netlink *rtnl, int index) {
2692 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
2693 int r;
2694
2695 assert(rtnl);
2696 assert(index >= 0);
2697
2698 r = sd_rtnl_message_new_link(rtnl, &req, RTM_DELLINK, index);
2699 if (r < 0)
2700 return rtnl_log_create_error(r);
2701
2702 r = sd_netlink_call(rtnl, req, 0, NULL);
2703 if (r < 0)
2704 return r;
2705
2706 return 0;
2707 }
2708
2709 static int link_up_down_send_message(sd_netlink *rtnl, char *command, int index) {
2710 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
2711 int r;
2712
2713 assert(rtnl);
2714 assert(index >= 0);
2715
2716 r = sd_rtnl_message_new_link(rtnl, &req, RTM_SETLINK, index);
2717 if (r < 0)
2718 return rtnl_log_create_error(r);
2719
2720 if (streq(command, "up"))
2721 r = sd_rtnl_message_link_set_flags(req, IFF_UP, IFF_UP);
2722 else
2723 r = sd_rtnl_message_link_set_flags(req, 0, IFF_UP);
2724 if (r < 0)
2725 return log_error_errno(r, "Could not set link flags: %m");
2726
2727 r = sd_netlink_call(rtnl, req, 0, NULL);
2728 if (r < 0)
2729 return r;
2730
2731 return 0;
2732 }
2733
2734 static int link_up_down(int argc, char *argv[], void *userdata) {
2735 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
2736 _cleanup_set_free_ Set *indexes = NULL;
2737 int index, r;
2738 void *p;
2739
2740 r = sd_netlink_open(&rtnl);
2741 if (r < 0)
2742 return log_error_errno(r, "Failed to connect to netlink: %m");
2743
2744 indexes = set_new(NULL);
2745 if (!indexes)
2746 return log_oom();
2747
2748 for (int i = 1; i < argc; i++) {
2749 index = rtnl_resolve_interface_or_warn(&rtnl, argv[i]);
2750 if (index < 0)
2751 return index;
2752
2753 r = set_put(indexes, INT_TO_PTR(index));
2754 if (r < 0)
2755 return log_oom();
2756 }
2757
2758 SET_FOREACH(p, indexes) {
2759 index = PTR_TO_INT(p);
2760 r = link_up_down_send_message(rtnl, argv[0], index);
2761 if (r < 0)
2762 return log_error_errno(r, "Failed to bring %s interface %s: %m",
2763 argv[0], FORMAT_IFNAME_FULL(index, FORMAT_IFNAME_IFINDEX));
2764 }
2765
2766 return r;
2767 }
2768
2769 static int link_delete(int argc, char *argv[], void *userdata) {
2770 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
2771 _cleanup_set_free_ Set *indexes = NULL;
2772 int index, r;
2773 void *p;
2774
2775 r = sd_netlink_open(&rtnl);
2776 if (r < 0)
2777 return log_error_errno(r, "Failed to connect to netlink: %m");
2778
2779 indexes = set_new(NULL);
2780 if (!indexes)
2781 return log_oom();
2782
2783 for (int i = 1; i < argc; i++) {
2784 index = rtnl_resolve_interface_or_warn(&rtnl, argv[i]);
2785 if (index < 0)
2786 return index;
2787
2788 r = set_put(indexes, INT_TO_PTR(index));
2789 if (r < 0)
2790 return log_oom();
2791 }
2792
2793 SET_FOREACH(p, indexes) {
2794 index = PTR_TO_INT(p);
2795 r = link_delete_send_message(rtnl, index);
2796 if (r < 0)
2797 return log_error_errno(r, "Failed to delete interface %s: %m",
2798 FORMAT_IFNAME_FULL(index, FORMAT_IFNAME_IFINDEX));
2799 }
2800
2801 return r;
2802 }
2803
2804 static int link_renew_one(sd_bus *bus, int index, const char *name) {
2805 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2806 int r;
2807
2808 assert(bus);
2809 assert(index >= 0);
2810 assert(name);
2811
2812 r = bus_call_method(bus, bus_network_mgr, "RenewLink", &error, NULL, "i", index);
2813 if (r < 0)
2814 return log_error_errno(r, "Failed to renew dynamic configuration of interface %s: %s",
2815 name, bus_error_message(&error, r));
2816
2817 return 0;
2818 }
2819
2820 static int link_renew(int argc, char *argv[], void *userdata) {
2821 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2822 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
2823 int r;
2824
2825 r = acquire_bus(&bus);
2826 if (r < 0)
2827 return r;
2828
2829 r = 0;
2830
2831 for (int i = 1; i < argc; i++) {
2832 int index;
2833
2834 index = rtnl_resolve_interface_or_warn(&rtnl, argv[i]);
2835 if (index < 0)
2836 return index;
2837
2838 RET_GATHER(r, link_renew_one(bus, index, argv[i]));
2839 }
2840
2841 return r;
2842 }
2843
2844 static int link_force_renew_one(sd_bus *bus, int index, const char *name) {
2845 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2846 int r;
2847
2848 assert(bus);
2849 assert(index >= 0);
2850 assert(name);
2851
2852 r = bus_call_method(bus, bus_network_mgr, "ForceRenewLink", &error, NULL, "i", index);
2853 if (r < 0)
2854 return log_error_errno(r, "Failed to force renew dynamic configuration of interface %s: %s",
2855 name, bus_error_message(&error, r));
2856
2857 return 0;
2858 }
2859
2860 static int link_force_renew(int argc, char *argv[], void *userdata) {
2861 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2862 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
2863 int k = 0, r;
2864
2865 r = acquire_bus(&bus);
2866 if (r < 0)
2867 return r;
2868
2869 for (int i = 1; i < argc; i++) {
2870 int index = rtnl_resolve_interface_or_warn(&rtnl, argv[i]);
2871 if (index < 0)
2872 return index;
2873
2874 r = link_force_renew_one(bus, index, argv[i]);
2875 if (r < 0 && k >= 0)
2876 k = r;
2877 }
2878
2879 return k;
2880 }
2881
2882 static int verb_reload(int argc, char *argv[], void *userdata) {
2883 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2884 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2885 int r;
2886
2887 r = acquire_bus(&bus);
2888 if (r < 0)
2889 return r;
2890
2891 r = bus_call_method(bus, bus_network_mgr, "Reload", &error, NULL, NULL);
2892 if (r < 0)
2893 return log_error_errno(r, "Failed to reload network settings: %s", bus_error_message(&error, r));
2894
2895 return 0;
2896 }
2897
2898 static int verb_reconfigure(int argc, char *argv[], void *userdata) {
2899 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2900 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2901 _cleanup_(sd_netlink_unrefp) sd_netlink *rtnl = NULL;
2902 _cleanup_set_free_ Set *indexes = NULL;
2903 int index, r;
2904 void *p;
2905
2906 r = acquire_bus(&bus);
2907 if (r < 0)
2908 return r;
2909
2910 indexes = set_new(NULL);
2911 if (!indexes)
2912 return log_oom();
2913
2914 for (int i = 1; i < argc; i++) {
2915 index = rtnl_resolve_interface_or_warn(&rtnl, argv[i]);
2916 if (index < 0)
2917 return index;
2918
2919 r = set_put(indexes, INT_TO_PTR(index));
2920 if (r < 0)
2921 return log_oom();
2922 }
2923
2924 SET_FOREACH(p, indexes) {
2925 index = PTR_TO_INT(p);
2926 r = bus_call_method(bus, bus_network_mgr, "ReconfigureLink", &error, NULL, "i", index);
2927 if (r < 0)
2928 return log_error_errno(r, "Failed to reconfigure network interface %s: %s",
2929 FORMAT_IFNAME_FULL(index, FORMAT_IFNAME_IFINDEX),
2930 bus_error_message(&error, r));
2931 }
2932
2933 return 0;
2934 }
2935
2936 static int verb_persistent_storage(int argc, char *argv[], void *userdata) {
2937 _cleanup_(varlink_unrefp) Varlink *vl = NULL;
2938 bool ready;
2939 int r;
2940
2941 r = parse_boolean(argv[1]);
2942 if (r < 0)
2943 return log_error_errno(r, "Failed to parse argument: %s", argv[1]);
2944 ready = r;
2945
2946 r = varlink_connect_networkd(&vl);
2947 if (r < 0)
2948 return r;
2949
2950 if (ready) {
2951 _cleanup_close_ int fd = -EBADF;
2952
2953 fd = open("/var/lib/systemd/network/", O_CLOEXEC | O_DIRECTORY);
2954 if (fd < 0)
2955 return log_error_errno(errno, "Failed to open /var/lib/systemd/network/: %m");
2956
2957 r = varlink_push_fd(vl, fd);
2958 if (r < 0)
2959 return log_error_errno(r, "Failed to push file descriptor of /var/lib/systemd/network/ into varlink: %m");
2960
2961 TAKE_FD(fd);
2962 }
2963
2964 return varlink_callb_and_log(vl, "io.systemd.Network.SetPersistentStorage", /* reply = */ NULL,
2965 JSON_BUILD_OBJECT(JSON_BUILD_PAIR_BOOLEAN("Ready", ready)));
2966 }
2967
2968 static int help(void) {
2969 _cleanup_free_ char *link = NULL;
2970 int r;
2971
2972 r = terminal_urlify_man("networkctl", "1", &link);
2973 if (r < 0)
2974 return log_oom();
2975
2976 printf("%s [OPTIONS...] COMMAND\n\n"
2977 "%sQuery and control the networking subsystem.%s\n"
2978 "\nCommands:\n"
2979 " list [PATTERN...] List links\n"
2980 " status [PATTERN...] Show link status\n"
2981 " lldp [PATTERN...] Show LLDP neighbors\n"
2982 " label Show current address label entries in the kernel\n"
2983 " delete DEVICES... Delete virtual netdevs\n"
2984 " up DEVICES... Bring devices up\n"
2985 " down DEVICES... Bring devices down\n"
2986 " renew DEVICES... Renew dynamic configurations\n"
2987 " forcerenew DEVICES... Trigger DHCP reconfiguration of all connected clients\n"
2988 " reconfigure DEVICES... Reconfigure interfaces\n"
2989 " reload Reload .network and .netdev files\n"
2990 " edit FILES|DEVICES... Edit network configuration files\n"
2991 " cat FILES|DEVICES... Show network configuration files\n"
2992 " mask FILES... Mask network configuration files\n"
2993 " unmask FILES... Unmask network configuration files\n"
2994 " persistent-storage BOOL\n"
2995 " Notify systemd-networkd if persistent storage is ready\n"
2996 "\nOptions:\n"
2997 " -h --help Show this help\n"
2998 " --version Show package version\n"
2999 " --no-pager Do not pipe output into a pager\n"
3000 " --no-legend Do not show the headers and footers\n"
3001 " -a --all Show status for all links\n"
3002 " -s --stats Show detailed link statistics\n"
3003 " -l --full Do not ellipsize output\n"
3004 " -n --lines=INTEGER Number of journal entries to show\n"
3005 " --json=pretty|short|off\n"
3006 " Generate JSON output\n"
3007 " --no-reload Do not reload systemd-networkd or systemd-udevd\n"
3008 " after editing network config\n"
3009 " --drop-in=NAME Edit specified drop-in instead of main config file\n"
3010 " --runtime Edit runtime config files\n"
3011 "\nSee the %s for details.\n",
3012 program_invocation_short_name,
3013 ansi_highlight(),
3014 ansi_normal(),
3015 link);
3016
3017 return 0;
3018 }
3019
3020 static int parse_argv(int argc, char *argv[]) {
3021 enum {
3022 ARG_VERSION = 0x100,
3023 ARG_NO_PAGER,
3024 ARG_NO_LEGEND,
3025 ARG_JSON,
3026 ARG_NO_RELOAD,
3027 ARG_DROP_IN,
3028 ARG_RUNTIME,
3029 };
3030
3031 static const struct option options[] = {
3032 { "help", no_argument, NULL, 'h' },
3033 { "version", no_argument, NULL, ARG_VERSION },
3034 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
3035 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
3036 { "all", no_argument, NULL, 'a' },
3037 { "stats", no_argument, NULL, 's' },
3038 { "full", no_argument, NULL, 'l' },
3039 { "lines", required_argument, NULL, 'n' },
3040 { "json", required_argument, NULL, ARG_JSON },
3041 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
3042 { "drop-in", required_argument, NULL, ARG_DROP_IN },
3043 { "runtime", no_argument, NULL, ARG_RUNTIME },
3044 {}
3045 };
3046
3047 int c, r;
3048
3049 assert(argc >= 0);
3050 assert(argv);
3051
3052 while ((c = getopt_long(argc, argv, "hasln:", options, NULL)) >= 0) {
3053
3054 switch (c) {
3055
3056 case 'h':
3057 return help();
3058
3059 case ARG_VERSION:
3060 return version();
3061
3062 case ARG_NO_PAGER:
3063 arg_pager_flags |= PAGER_DISABLE;
3064 break;
3065
3066 case ARG_NO_LEGEND:
3067 arg_legend = false;
3068 break;
3069
3070 case ARG_NO_RELOAD:
3071 arg_no_reload = true;
3072 break;
3073
3074 case ARG_RUNTIME:
3075 arg_runtime = true;
3076 break;
3077
3078 case ARG_DROP_IN:
3079 if (isempty(optarg))
3080 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Empty drop-in file name.");
3081
3082 if (!endswith(optarg, ".conf")) {
3083 char *conf;
3084
3085 conf = strjoin(optarg, ".conf");
3086 if (!conf)
3087 return log_oom();
3088
3089 free_and_replace(arg_drop_in, conf);
3090 } else {
3091 r = free_and_strdup(&arg_drop_in, optarg);
3092 if (r < 0)
3093 return log_oom();
3094 }
3095
3096 if (!filename_is_valid(arg_drop_in))
3097 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
3098 "Invalid drop-in file name '%s'.", arg_drop_in);
3099
3100 break;
3101
3102 case 'a':
3103 arg_all = true;
3104 break;
3105
3106 case 's':
3107 arg_stats = true;
3108 break;
3109
3110 case 'l':
3111 arg_full = true;
3112 break;
3113
3114 case 'n':
3115 if (safe_atou(optarg, &arg_lines) < 0)
3116 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
3117 "Failed to parse lines '%s'", optarg);
3118 break;
3119
3120 case ARG_JSON:
3121 r = parse_json_argument(optarg, &arg_json_format_flags);
3122 if (r <= 0)
3123 return r;
3124 break;
3125
3126 case '?':
3127 return -EINVAL;
3128
3129 default:
3130 assert_not_reached();
3131 }
3132 }
3133
3134 return 1;
3135 }
3136
3137 static int networkctl_main(int argc, char *argv[]) {
3138 static const Verb verbs[] = {
3139 { "list", VERB_ANY, VERB_ANY, VERB_DEFAULT|VERB_ONLINE_ONLY, list_links },
3140 { "status", VERB_ANY, VERB_ANY, VERB_ONLINE_ONLY, link_status },
3141 { "lldp", VERB_ANY, VERB_ANY, 0, link_lldp_status },
3142 { "label", 1, 1, 0, list_address_labels },
3143 { "delete", 2, VERB_ANY, 0, link_delete },
3144 { "up", 2, VERB_ANY, 0, link_up_down },
3145 { "down", 2, VERB_ANY, 0, link_up_down },
3146 { "renew", 2, VERB_ANY, VERB_ONLINE_ONLY, link_renew },
3147 { "forcerenew", 2, VERB_ANY, VERB_ONLINE_ONLY, link_force_renew },
3148 { "reconfigure", 2, VERB_ANY, VERB_ONLINE_ONLY, verb_reconfigure },
3149 { "reload", 1, 1, VERB_ONLINE_ONLY, verb_reload },
3150 { "edit", 2, VERB_ANY, 0, verb_edit },
3151 { "cat", 2, VERB_ANY, 0, verb_cat },
3152 { "mask", 2, VERB_ANY, 0, verb_mask },
3153 { "unmask", 2, VERB_ANY, 0, verb_unmask },
3154 { "persistent-storage", 2, 2, 0, verb_persistent_storage },
3155 {}
3156 };
3157
3158 return dispatch_verb(argc, argv, verbs, NULL);
3159 }
3160
3161 static int run(int argc, char* argv[]) {
3162 int r;
3163
3164 log_setup();
3165
3166 sigbus_install();
3167
3168 r = parse_argv(argc, argv);
3169 if (r <= 0)
3170 return r;
3171
3172 return networkctl_main(argc, argv);
3173 }
3174
3175 DEFINE_MAIN_FUNCTION(run);