]> git.proxmox.com Git - mirror_iproute2.git/blame - ip/ip6tunnel.c
Fix pipe I/O stream descriptor leak in init_service_resolver()
[mirror_iproute2.git] / ip / ip6tunnel.c
CommitLineData
9447a0d3
MN
1/*
2 * Copyright (C)2006 USAGI/WIDE Project
ae665a52 3 *
9447a0d3
MN
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
ae665a52 8 *
9447a0d3
MN
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
ae665a52 13 *
9447a0d3
MN
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17 */
9447a0d3
MN
18/*
19 * Author:
20 * Masahide NAKAMURA @USAGI
21 */
ae665a52 22
9447a0d3
MN
23#include <stdio.h>
24#include <string.h>
25#include <stdlib.h>
9447a0d3 26#include <unistd.h>
288384f2
MN
27#include <sys/types.h>
28#include <sys/socket.h>
9447a0d3 29#include <arpa/inet.h>
288384f2 30#include <sys/ioctl.h>
9447a0d3 31#include <linux/ip.h>
288384f2
MN
32#include <linux/if.h>
33#include <linux/if_arp.h>
9447a0d3 34#include <linux/if_tunnel.h>
288384f2 35#include <linux/ip6_tunnel.h>
9447a0d3 36
288384f2
MN
37#include "utils.h"
38#include "tunnel.h"
ea71beac 39#include "ip_common.h"
9447a0d3 40
288384f2
MN
41#define IP6_FLOWINFO_TCLASS htonl(0x0FF00000)
42#define IP6_FLOWINFO_FLOWLABEL htonl(0x000FFFFF)
9447a0d3 43
288384f2
MN
44#define DEFAULT_TNL_HOP_LIMIT (64)
45
46static void usage(void) __attribute__((noreturn));
9447a0d3
MN
47
48static void usage(void)
49{
288384f2 50 fprintf(stderr, "Usage: ip -f inet6 tunnel { add | change | del | show } [ NAME ]\n");
0b959b0f 51 fprintf(stderr, " [ mode { ip6ip6 | ipip6 | any } ]\n");
288384f2
MN
52 fprintf(stderr, " [ remote ADDR local ADDR ] [ dev PHYS_DEV ]\n");
53 fprintf(stderr, " [ encaplimit ELIM ]\n");
eddde110 54 fprintf(stderr ," [ hoplimit TTL ] [ tclass TCLASS ] [ flowlabel FLOWLABEL ]\n");
288384f2
MN
55 fprintf(stderr, " [ dscp inherit ]\n");
56 fprintf(stderr, "\n");
eddde110
YH
57 fprintf(stderr, "Where: NAME := STRING\n");
58 fprintf(stderr, " ADDR := IPV6_ADDRESS\n");
59 fprintf(stderr, " ELIM := { none | 0..255 }(default=%d)\n",
288384f2 60 IPV6_DEFAULT_TNL_ENCAP_LIMIT);
eddde110 61 fprintf(stderr, " TTL := 0..255 (default=%d)\n",
288384f2 62 DEFAULT_TNL_HOP_LIMIT);
eddde110
YH
63 fprintf(stderr, " TOS := { 0x0..0xff | inherit }\n");
64 fprintf(stderr, " FLOWLABEL := { 0x0..0xfffff | inherit }\n");
9447a0d3
MN
65 exit(-1);
66}
67
288384f2 68static void print_tunnel(struct ip6_tnl_parm *p)
9447a0d3
MN
69{
70 char remote[64];
71 char local[64];
ae665a52 72
9447a0d3
MN
73 inet_ntop(AF_INET6, &p->raddr, remote, sizeof(remote));
74 inet_ntop(AF_INET6, &p->laddr, local, sizeof(local));
75
288384f2
MN
76 printf("%s: %s/ipv6 remote %s local %s",
77 p->name, tnl_strproto(p->proto), remote, local);
9447a0d3 78 if (p->link) {
ea71beac 79 const char *n = ll_index_to_name(p->link);
9447a0d3
MN
80 if (n)
81 printf(" dev %s", n);
82 }
9447a0d3 83
288384f2
MN
84 if (p->flags & IP6_TNL_F_IGN_ENCAP_LIMIT)
85 printf(" encaplimit none");
86 else
87 printf(" encaplimit %u", p->encap_limit);
9447a0d3 88
288384f2 89 printf(" hoplimit %u", p->hop_limit);
9447a0d3 90
288384f2 91 if (p->flags & IP6_TNL_F_USE_ORIG_TCLASS)
eddde110 92 printf(" tclass inherit");
288384f2
MN
93 else {
94 __u32 val = ntohl(p->flowinfo & IP6_FLOWINFO_TCLASS);
eddde110 95 printf(" tclass 0x%02x", (__u8)(val >> 20));
9447a0d3 96 }
9447a0d3 97
288384f2 98 if (p->flags & IP6_TNL_F_USE_ORIG_FLOWLABEL)
eddde110 99 printf(" flowlabel inherit");
288384f2 100 else
eddde110 101 printf(" flowlabel 0x%05x", ntohl(p->flowinfo & IP6_FLOWINFO_FLOWLABEL));
9447a0d3 102
288384f2 103 printf(" (flowinfo 0x%08x)", ntohl(p->flowinfo));
9447a0d3 104
288384f2
MN
105 if (p->flags & IP6_TNL_F_RCV_DSCP_COPY)
106 printf(" dscp inherit");
9447a0d3
MN
107}
108
288384f2 109static int parse_args(int argc, char **argv, struct ip6_tnl_parm *p)
9447a0d3
MN
110{
111 char medium[IFNAMSIZ];
112
288384f2 113 memset(medium, 0, sizeof(medium));
9447a0d3
MN
114
115 while (argc > 0) {
0b959b0f
YH
116 if (strcmp(*argv, "mode") == 0) {
117 NEXT_ARG();
118 if (strcmp(*argv, "ipv6/ipv6") == 0 ||
119 strcmp(*argv, "ip6ip6") == 0)
120 p->proto = IPPROTO_IPV6;
121 else if (strcmp(*argv, "ip/ipv6") == 0 ||
122 strcmp(*argv, "ipv4/ipv6") == 0 ||
123 strcmp(*argv, "ipip6") == 0 ||
124 strcmp(*argv, "ip4ip6") == 0)
125 p->proto = IPPROTO_IPIP;
126 else if (strcmp(*argv, "any/ipv6") == 0 ||
127 strcmp(*argv, "any") == 0)
128 p->proto = 0;
129 else {
130 fprintf(stderr,"Cannot guess tunnel mode.\n");
131 exit(-1);
132 }
133 } else if (strcmp(*argv, "remote") == 0) {
288384f2
MN
134 inet_prefix raddr;
135 NEXT_ARG();
136 get_prefix(&raddr, *argv, preferred_family);
137 if (raddr.family == AF_UNSPEC)
138 invarg("\"remote\" address family is AF_UNSPEC", *argv);
139 memcpy(&p->raddr, &raddr.data, sizeof(p->raddr));
140 } else if (strcmp(*argv, "local") == 0) {
141 inet_prefix laddr;
142 NEXT_ARG();
143 get_prefix(&laddr, *argv, preferred_family);
144 if (laddr.family == AF_UNSPEC)
145 invarg("\"local\" address family is AF_UNSPEC", *argv);
146 memcpy(&p->laddr, &laddr.data, sizeof(p->laddr));
147 } else if (strcmp(*argv, "dev") == 0) {
148 NEXT_ARG();
9447a0d3 149 strncpy(medium, *argv, IFNAMSIZ - 1);
288384f2
MN
150 } else if (strcmp(*argv, "encaplimit") == 0) {
151 NEXT_ARG();
152 if (strcmp(*argv, "none") == 0) {
153 p->flags |= IP6_TNL_F_IGN_ENCAP_LIMIT;
9447a0d3
MN
154 } else {
155 __u8 uval;
288384f2
MN
156 if (get_u8(&uval, *argv, 0) < -1)
157 invarg("invalid ELIM", *argv);
9447a0d3
MN
158 p->encap_limit = uval;
159 }
eddde110
YH
160 } else if (strcmp(*argv, "hoplimit") == 0 ||
161 strcmp(*argv, "ttl") == 0 ||
162 strcmp(*argv, "hlim") == 0) {
288384f2
MN
163 __u8 uval;
164 NEXT_ARG();
165 if (get_u8(&uval, *argv, 0))
eddde110 166 invarg("invalid TTL", *argv);
288384f2 167 p->hop_limit = uval;
eddde110
YH
168 } else if (strcmp(*argv, "tclass") == 0 ||
169 strcmp(*argv, "tc") == 0 ||
170 strcmp(*argv, "tos") == 0 ||
171 matches(*argv, "dsfield") == 0) {
288384f2
MN
172 __u8 uval;
173 NEXT_ARG();
174 if (strcmp(*argv, "inherit") == 0)
175 p->flags |= IP6_TNL_F_USE_ORIG_TCLASS;
176 else {
177 if (get_u8(&uval, *argv, 16))
eddde110 178 invarg("invalid TClass", *argv);
288384f2
MN
179 p->flowinfo |= htonl((__u32)uval << 20) & IP6_FLOWINFO_TCLASS;
180 p->flags &= ~IP6_TNL_F_USE_ORIG_TCLASS;
181 }
eddde110
YH
182 } else if (strcmp(*argv, "flowlabel") == 0 ||
183 strcmp(*argv, "fl") == 0) {
288384f2
MN
184 __u32 uval;
185 NEXT_ARG();
186 if (strcmp(*argv, "inherit") == 0)
187 p->flags |= IP6_TNL_F_USE_ORIG_FLOWLABEL;
188 else {
189 if (get_u32(&uval, *argv, 16))
eddde110 190 invarg("invalid Flowlabel", *argv);
288384f2 191 if (uval > 0xFFFFF)
eddde110 192 invarg("invalid Flowlabel", *argv);
288384f2
MN
193 p->flowinfo |= htonl(uval) & IP6_FLOWINFO_FLOWLABEL;
194 p->flags &= ~IP6_TNL_F_USE_ORIG_FLOWLABEL;
195 }
196 } else if (strcmp(*argv, "dscp") == 0) {
197 NEXT_ARG();
198 if (strcmp(*argv, "inherit") != 0)
199 invarg("not inherit", *argv);
200 p->flags |= IP6_TNL_F_RCV_DSCP_COPY;
9447a0d3 201 } else {
288384f2
MN
202 if (strcmp(*argv, "name") == 0) {
203 NEXT_ARG();
204 }
205 if (matches(*argv, "help") == 0)
9447a0d3 206 usage();
288384f2
MN
207 if (p->name[0])
208 duparg2("name", *argv);
9447a0d3
MN
209 strncpy(p->name, *argv, IFNAMSIZ - 1);
210 }
211 argc--; argv++;
212 }
213 if (medium[0]) {
ea71beac 214 p->link = ll_name_to_index(medium);
9447a0d3
MN
215 if (p->link == 0)
216 return -1;
217 }
218 return 0;
219}
220
288384f2
MN
221static void ip6_tnl_parm_init(struct ip6_tnl_parm *p, int apply_default)
222{
223 memset(p, 0, sizeof(*p));
224 p->proto = IPPROTO_IPV6;
225 if (apply_default) {
226 p->hop_limit = DEFAULT_TNL_HOP_LIMIT;
227 p->encap_limit = IPV6_DEFAULT_TNL_ENCAP_LIMIT;
228 }
229}
230
231/*
232 * @p1: user specified parameter
233 * @p2: database entry
234 */
235static int ip6_tnl_parm_match(const struct ip6_tnl_parm *p1,
236 const struct ip6_tnl_parm *p2)
237{
238 return ((!p1->link || p1->link == p2->link) &&
239 (!p1->name[0] || strcmp(p1->name, p2->name) == 0) &&
240 (memcmp(&p1->laddr, &in6addr_any, sizeof(p1->laddr)) == 0 ||
241 memcmp(&p1->laddr, &p2->laddr, sizeof(p1->laddr)) == 0) &&
242 (memcmp(&p1->raddr, &in6addr_any, sizeof(p1->raddr)) == 0 ||
243 memcmp(&p1->raddr, &p2->raddr, sizeof(p1->raddr)) == 0) &&
244 (!p1->proto || !p2->proto || p1->proto == p2->proto) &&
245 (!p1->encap_limit || p1->encap_limit == p2->encap_limit) &&
246 (!p1->hop_limit || p1->hop_limit == p2->hop_limit) &&
247 (!(p1->flowinfo & IP6_FLOWINFO_TCLASS) ||
248 !((p1->flowinfo ^ p2->flowinfo) & IP6_FLOWINFO_TCLASS)) &&
249 (!(p1->flowinfo & IP6_FLOWINFO_FLOWLABEL) ||
250 !((p1->flowinfo ^ p2->flowinfo) & IP6_FLOWINFO_FLOWLABEL)) &&
251 (!p1->flags || (p1->flags & p2->flags)));
252}
253
254static int do_tunnels_list(struct ip6_tnl_parm *p)
255{
256 char buf[512];
257 int err = -1;
258 FILE *fp = fopen("/proc/net/dev", "r");
259 if (fp == NULL) {
260 perror("fopen");
261 goto end;
262 }
263
264 /* skip two lines at the begenning of the file */
38c867d2
SH
265 if (!fgets(buf, sizeof(buf), fp) ||
266 !fgets(buf, sizeof(buf), fp)) {
267 fprintf(stderr, "/proc/net/dev read error\n");
268 return -1;
269 }
288384f2
MN
270
271 while (fgets(buf, sizeof(buf), fp) != NULL) {
272 char name[IFNAMSIZ];
ea71beac 273 int index, type;
288384f2
MN
274 unsigned long rx_bytes, rx_packets, rx_errs, rx_drops,
275 rx_fifo, rx_frame,
276 tx_bytes, tx_packets, tx_errs, tx_drops,
277 tx_fifo, tx_colls, tx_carrier, rx_multi;
278 struct ip6_tnl_parm p1;
279 char *ptr;
280
281 buf[sizeof(buf) - 1] = '\0';
282 if ((ptr = strchr(buf, ':')) == NULL ||
283 (*ptr++ = 0, sscanf(buf, "%s", name) != 1)) {
284 fprintf(stderr, "Wrong format of /proc/net/dev. Sorry.\n");
285 goto end;
286 }
287 if (sscanf(ptr, "%ld%ld%ld%ld%ld%ld%ld%*d%ld%ld%ld%ld%ld%ld%ld",
288 &rx_bytes, &rx_packets, &rx_errs, &rx_drops,
289 &rx_fifo, &rx_frame, &rx_multi,
290 &tx_bytes, &tx_packets, &tx_errs, &tx_drops,
291 &tx_fifo, &tx_colls, &tx_carrier) != 14)
292 continue;
293 if (p->name[0] && strcmp(p->name, name))
294 continue;
ea71beac
SH
295 index = ll_name_to_index(name);
296 if (index == 0)
297 continue;
298 type = ll_index_to_type(index);
288384f2
MN
299 if (type == -1) {
300 fprintf(stderr, "Failed to get type of [%s]\n", name);
301 continue;
302 }
303 if (type != ARPHRD_TUNNEL6)
304 continue;
305 memset(&p1, 0, sizeof(p1));
306 ip6_tnl_parm_init(&p1, 0);
307 strcpy(p1.name, name);
ea71beac 308 p1.link = ll_name_to_index(p1.name);
288384f2
MN
309 if (p1.link == 0)
310 continue;
311 if (tnl_get_ioctl(p1.name, &p1))
312 continue;
313 if (!ip6_tnl_parm_match(p, &p1))
314 continue;
315 print_tunnel(&p1);
316 if (show_stats) {
317 printf("%s", _SL_);
318 printf("RX: Packets Bytes Errors CsumErrs OutOfSeq Mcasts%s", _SL_);
319 printf(" %-10ld %-12ld %-6ld %-8ld %-8ld %-8ld%s",
320 rx_packets, rx_bytes, rx_errs, rx_frame, rx_fifo, rx_multi, _SL_);
321 printf("TX: Packets Bytes Errors DeadLoop NoRoute NoBufs%s", _SL_);
322 printf(" %-10ld %-12ld %-6ld %-8ld %-8ld %-6ld",
323 tx_packets, tx_bytes, tx_errs, tx_colls, tx_carrier, tx_drops);
324 }
325 printf("\n");
326 }
327 err = 0;
328
329 end:
330 if (fp)
331 fclose(fp);
332 return err;
333}
334
9447a0d3
MN
335static int do_show(int argc, char **argv)
336{
288384f2
MN
337 struct ip6_tnl_parm p;
338
ea71beac 339 ll_init_map(&rth);
288384f2 340 ip6_tnl_parm_init(&p, 0);
c3651bf4 341 p.proto = 0; /* default to any */
9447a0d3
MN
342
343 if (parse_args(argc, argv, &p) < 0)
344 return -1;
345
288384f2
MN
346 if (!p.name[0] || show_stats)
347 do_tunnels_list(&p);
348 else {
349 if (tnl_get_ioctl(p.name, &p))
350 return -1;
351 print_tunnel(&p);
352 printf("\n");
353 }
9447a0d3 354
9447a0d3
MN
355 return 0;
356}
357
9447a0d3
MN
358static int do_add(int cmd, int argc, char **argv)
359{
288384f2
MN
360 struct ip6_tnl_parm p;
361
362 ip6_tnl_parm_init(&p, 1);
9447a0d3
MN
363
364 if (parse_args(argc, argv, &p) < 0)
365 return -1;
288384f2
MN
366
367 return tnl_add_ioctl(cmd,
368 cmd == SIOCCHGTUNNEL && p.name[0] ?
369 p.name : "ip6tnl0", p.name, &p);
9447a0d3
MN
370}
371
288384f2 372static int do_del(int argc, char **argv)
9447a0d3 373{
288384f2
MN
374 struct ip6_tnl_parm p;
375
376 ip6_tnl_parm_init(&p, 1);
9447a0d3
MN
377
378 if (parse_args(argc, argv, &p) < 0)
379 return -1;
380
288384f2 381 return tnl_del_ioctl(p.name[0] ? p.name : "ip6tnl0", p.name, &p);
9447a0d3
MN
382}
383
ae665a52
SH
384int do_ip6tunnel(int argc, char **argv)
385{
288384f2
MN
386 switch (preferred_family) {
387 case AF_UNSPEC:
388 preferred_family = AF_INET6;
389 break;
390 case AF_INET6:
391 break;
392 default:
393 fprintf(stderr, "Unsupported family:%d\n", preferred_family);
394 exit(-1);
395 }
396
9447a0d3 397 if (argc > 0) {
288384f2 398 if (matches(*argv, "add") == 0)
9447a0d3 399 return do_add(SIOCADDTUNNEL, argc - 1, argv + 1);
288384f2 400 if (matches(*argv, "change") == 0)
9447a0d3 401 return do_add(SIOCCHGTUNNEL, argc - 1, argv + 1);
288384f2 402 if (matches(*argv, "del") == 0)
9447a0d3 403 return do_del(argc - 1, argv + 1);
288384f2
MN
404 if (matches(*argv, "show") == 0 ||
405 matches(*argv, "lst") == 0 ||
406 matches(*argv, "list") == 0)
9447a0d3 407 return do_show(argc - 1, argv + 1);
288384f2 408 if (matches(*argv, "help") == 0)
9447a0d3 409 usage();
9447a0d3
MN
410 } else
411 return do_show(0, NULL);
412
288384f2
MN
413 fprintf(stderr, "Command \"%s\" is unknown, try \"ip -f inet6 tunnel help\".\n", *argv);
414 exit(-1);
9447a0d3 415}