| Crates.io | netlink-bindings |
| lib.rs | netlink-bindings |
| version | 0.2.3 |
| created_at | 2025-10-12 15:54:50.901737+00 |
| updated_at | 2025-11-19 14:33:11.559899+00 |
| description | Type-safe Rust bindings for Netlink generated from YAML specifications |
| homepage | |
| repository | https://github.com/one-d-wide/netlink-bindings |
| max_upload_size | |
| id | 1879410 |
| size | 9,461,520 |
Type-safe Rust bindings for encoding/decoding Netlink messages generated from YAML specifications.
Netlink is a collection of APIs exposed by the kernel, unified by a similar style of encoding data. The general list of Netlink families can be found in the kernel documentation, or at least those families, that were possible to condense to a machine readable description. This list very likely includes all the families that you would want to interact with.
The goal of this project is to provide an easy-to-use type-safe interface, while also being reasonably fast and supporting all properties of all sensible Netlink families.
[dependencies]
netlink-bindings = { version = "0.2", features = [ "wireguard" ] }
netlink-socket2 = { version = "0.2", features = [ ] }
A typical Netlink family, say wireguard, support multiple operations, for example, "get-device" and "set-device". Each operation may also be of "do" or "dump" kind.
For example, to get info about a device you would use a "dump" kind of "get-device" request. That's usually what it means, although different subsystems may imply different things. A typical request looks like this:
use netlink_bindings::wireguard;
use netlink_socket2::NetlinkSocket;
let mut sock = NetlinkSocket::new();
let ifname = "wg0";
// All available requests are conveniently accessible using `family::Request`
let mut request = wireguard::Request::new()
.op_get_device_dump_request();
// Add contents to the request
request.encode()
.push_ifname_bytes(ifname.as_bytes());
let mut iter = sock.request(&request).unwrap();
while let Some(res) = iter.recv() {
// Each request may return an error (literal error code), in some cases
// with some additional info from the kernel, e.g. lacking a permission,
// if you missing CAP_NET_ADMIN capability for querying wireguard info.
let attrs = res.unwrap();
// A simple approach to get a specific property from an attribute set is
// following. Note that it's not guaranteed that the property was supplied,
// nor that it can be parsed correctly. If either occurs, the error will
// include error context, i.e. name of the attribute and it's parent set.
let listen_port = attrs.get_listen_port().unwrap();
println!("Interface {ifname:?} is listening on {listen_port}");
// Print out all the attributes using the debug formatter.
println!("{:#?}", attrs);
}
Your LSP should be able to nicely suggest appropriate methods both for encoding and decoding as you type.
Let's say you have a network interface and want to assign an ip address to it. This is the domain of "rt-addr" family. It was one of the first ones created, inheriting some now-discouraged quirks, like a fixed-header - a struct that always present and may also carry some relevant data in some cases or may be just ignored (zeroed-out) for other requests.
The relevant operation is "newaddr" with "do" kind. You may also notice ".set_change()". This specifies an additional request flags. Similar to fixed-header, theses flags may invoke some additional behavior in certain operations, or do nothing in others.
use std::net::IpAddr;
use netlink_bindings::rt_addr;
use netlink_socket2::NetlinkSocket;
let mut sock = NetlinkSocket::new();
let ifindex: u32 = 1234; // Acquired via "get-addr" request
let addr: IpAddr = "10.0.0.1".parse().unwrap();
let prefix: u8 = 32; // stands for "/32" in "10.0.0.1/32"
// Create fixed-header for the request
let mut header = rt_addr::PushIfaddrmsg::new();
header.set_ifa_index(ifindex);
header.set_ifa_family(libc::AF_INET as u8); // aka ipv4
header.set_ifa_prefixlen(prefix);
let mut request = rt_addr::Request::new()
.set_change() // Don't fail if address already assigned
.op_newaddr_do_request(&header);
request.encode()
.push_local(addr);
sock.request(&request).unwrap()
.recv_ack().unwrap();
See full code in the example.
Async functionality is available using the same interface, you just need to
enable it, and to add .await keyword in all places where async IO is expected.
[dependencies]
netlink-socket2 = { ... , features = [ "tokio" ] } # or "smol"
An earlier example, but using async, would look like this:
use netlink_bindings::wireguard;
use netlink_socket2::NetlinkSocket;
let mut sock = NetlinkSocket::new();
let mut request = wireguard::Request::new()
.op_get_device_dump_request();
request.encode()
.push_ifname_bytes(b"wg0");
let mut iter = sock.request(&request).await.unwrap();
while let Some(res) = iter.recv().await {
println!("{:#?}", res);
}
conntrack -L.Under the hood, calling .encode() is just a convenience to pass the lead to
the correct encoding struct. The ecoder's job is to actually write the
attributes directly into provided buffer. All types relevant for encoding are
prefixed with Push. For example, directly encoding a "do" request of
"set-device" operation looks like the following:
use netlink_bindings::wireguard::{PushOpSetDeviceDoRequest, WgdeviceFlags};
let mut vec = Vec::new();
// Do set-device (request)
PushOpSetDeviceDoRequest::new(&mut vec)
.push_ifname(c"wg0") // &CStr
// .push_ifname_bytes("wg0".as_bytes()) // &[u8]
.push_flags(WgdeviceFlags::ReplacePeers as u32) // Remove existing peers
.array_peers()
.entry_nested()
.push_public_key(&[/* ... */]) // &[u8]
.push_endpoint("127.0.0.1:12345".parse().unwrap()) // SocketAddr
.array_allowedips()
.entry_nested()
.push_family(libc::AF_INET as u16) // aka ipv4
.push_ipaddr("0.0.0.0".parse().unwrap()) // IpAddr
.push_cidr_mask(0) // stands for "/0" in "0.0.0.0/0"
.end_nested()
// More allowed ips...
.end_array() // Explicitly closing isn't necessary
.end_nested()
// More peers...
.end_array();
Additionally, check out all available methods, along with the in-line documentation.
Similarly, under the hood, receiving a reply yield an attribute decoder. The decoder itself is just a slice, therefore it can be cheaply cloned, copying it's frame. The low-level interface is based on iterators, with nice-to-use wrapper on top.
use netlink_bindings::wireguard::OpGetDeviceDumpReply;
let buf = vec![/* ... */];
// Dump get-device (reply)
let attrs = OpGetDeviceDumpReply::new(&buf);
println!("Ifname: {:?}", attrs.get_ifname().unwrap()); // &CStr
for peer in attrs.get_peers().unwrap() {
println!("Endpoint: {}", peer.get_endpoint().unwrap()); // SockAddr
for addr in peer.get_allowedips().unwrap() {
let ip = addr.get_ipaddr().unwrap(); // IpAddr
let mask = addr.get_cidr_mask().unwrap(); // u8
println!("Allowed ip: {ip}/{mask}");
}
}
See full code in the example. And as previously, check out all available methods, along with the in-line documentation.
A low-level decoding interface is exposed as an iterator, that yields enum variants, containing either a target type, e.g. SockAddr, or another iterator, in case of a nested attribute set. But as you can see, using it directly quickly turns very ugly.
use netlink_bindings::wireguard::{OpGetDeviceDumpReply, Wgpeer};
let buf = vec![/* ... */];
for attr in OpGetDeviceDumpReply::new(&buf) {
match attr.unwrap() {
OpGetDeviceDumpReply::Ifname(n) => println!("Ifname: {n:?}"),
OpGetDeviceDumpReply::Peers(iter) => {
for entry in iter {
for attr in entry.unwrap() {
match attr.unwrap() {
Wgpeer::Endpoint(e) => println!("Endpoint: {e:?}"),
_ => {}
}
}
}
}
_ => {}
}
}
Both don't use codegen to generate bindings, hence many Netlink families are not supported. Another difference is that they represent netlink messages as lists of rust enums, while this project works with the binary representation directly, with a separate interfaces for encoding and decoding: a builder pattern-like interface for encoding, and an iterator interface for decoding (internally).
| subsystem | ? | comment |
|---|---|---|
| nlctrl | ✅ | |
| conntrack | ✅ | |
| nftables | ✅ | |
| nl80211 | ✅ | |
| rt-addr | ✅ | |
| rt-link | ✅ | |
| wireguard | ✅ | |
| devlink | ✔️ | |
| netdev | ✔️ | |
| rt-neigh | ✔️ | |
| rt-route | ✔️ | |
| rt-rule | ✔️ | |
| tc | ✔️ | |
| ethtool | ? | |
| dpll | ? | |
| fou | ? | |
| handshake | ? | |
| lockd | ? | |
| mptcp_pm | ? | |
| net-shaper | ? | |
| nfsd | ? | |
| ovpn | ? | |
| ovs_datapath | ? | |
| ovs_flow | ? | |
| ovs_vport | ? | |
| tcp_metrics | ? | |
| team | ? |
The following netlink features are not implemented (yet):
If there's an existing tool using Netlink, you can use reverse-lookup binary
from this project to decipher it's Netlink communications, and work off of
that. Let's say you want to inspect what wg command does.
$ strace -o ./output_file --decode-fd=socket -e %network --{write,read}=$(seq -s, 0 100) -- wg
$ cargo run --bin reverse-lookup --features=wireguard,nlctrl,rt-link -- ./output_file
Decoding request in family ROUTE flags=[REQUEST,ACK,DUMP,REPLACE,EXCL] Raw { protonum: 0, request_type: 0 }
...
Update protocol bindings using the yaml description from the protocol directory.
$ cargo run --bin codegen -- -d ./netlink-bindings/src/wireguard/
Writing "netlink-bindings/src/wireguard/mod.rs"
Dumping "netlink-bindings/src/wireguard/wireguard.md"
Dumping all "netlink-bindings/src/wireguard/wireguard-all.md"
Generate protocol bindings for a new family, copying yaml specification from somewhere else.
$ cargo run --bin codegen -- -d ./netlink-bindings/src/ linux/Documentation/netlink/specs/wireguard.yaml
Writing "netlink-bindings/src/wireguard/mod.rs"
Dumping "netlink-bindings/src/wireguard/wireguard.md"
Dumping all "netlink-bindings/src/wireguard/wireguard-all.md"
Yaml attributes specific to our codegen that may be helpful when dealing with incomplete netlink specifications:
operations.fallback-attrs: <attrset> - create a placeholder request type
with an operation type provided at runtime. Also, the provided attribute set is
used as a fallback in reverse lookup if operation type wasn't recognized.operations.transparent: true or operations.[].transparent: true - make
request types use common encoding/decoding types, instead of generating new
ones that are narrowed down. Reduces generated code size.operations.[].request_type_at_runtime: true - allow operation type to be
provided at runtime.operations.all-attrs: true or operations.[].all-attrs: true - don't
narrow down attributes in generated request types.Feature flags:
--features=netlink-bindings/deny-unknown-attrs - treat unknown attributes
as errors.If your want to contribute, you can, for example: