]> git.proxmox.com Git - mirror_iproute2.git/blame - ip/link_ip6tnl.c
tc: bash-completion: add missing 'classid' keyword
[mirror_iproute2.git] / ip / link_ip6tnl.c
CommitLineData
9d0efc10
ND
1/*
2 * link_ip6tnl.c ip6tnl driver module
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Nicolas Dichtel <nicolas.dichtel@6wind.com>
10 *
11 */
12
13#include <string.h>
14#include <net/if.h>
15#include <sys/types.h>
16#include <sys/socket.h>
17#include <arpa/inet.h>
18
19#include <linux/ip.h>
20#include <linux/if_tunnel.h>
21#include <linux/ip6_tunnel.h>
22#include "rt_names.h"
23#include "utils.h"
24#include "ip_common.h"
25#include "tunnel.h"
26
27#define IP6_FLOWINFO_TCLASS htonl(0x0FF00000)
28#define IP6_FLOWINFO_FLOWLABEL htonl(0x000FFFFF)
29
30#define DEFAULT_TNL_HOP_LIMIT (64)
31
561e650e 32static void print_usage(FILE *f)
9d0efc10 33{
8b471354
PS
34 fprintf(f,
35 "Usage: ... ip6tnl [ mode { ip6ip6 | ipip6 | any } ]\n"
36 " [ remote ADDR ]\n"
37 " [ local ADDR ]\n"
38 " [ dev PHYS_DEV ]\n"
39 " [ encaplimit ELIM ]\n"
40 " [ hoplimit HLIM ]\n"
41 " [ tclass TCLASS ]\n"
42 " [ flowlabel FLOWLABEL ]\n"
43 " [ dscp inherit ]\n"
ad4b1425 44 " [ fwmark MARK ]\n"
21440d19 45 " [ [no]allow-localremote ]\n"
8b471354
PS
46 " [ noencap ]\n"
47 " [ encap { fou | gue | none } ]\n"
48 " [ encap-sport PORT ]\n"
49 " [ encap-dport PORT ]\n"
50 " [ [no]encap-csum ]\n"
51 " [ [no]encap-csum6 ]\n"
52 " [ [no]encap-remcsum ]\n"
53 " [ external ]\n"
54 "\n"
55 "Where: ADDR := IPV6_ADDRESS\n"
56 " ELIM := { none | 0..255 }(default=%d)\n"
57 " HLIM := 0..255 (default=%d)\n"
58 " TCLASS := { 0x0..0xff | inherit }\n"
ad4b1425
CG
59 " FLOWLABEL := { 0x0..0xfffff | inherit }\n"
60 " MARK := { 0x0..0xffffffff | inherit }\n",
8b471354
PS
61 IPV6_DEFAULT_TNL_ENCAP_LIMIT, DEFAULT_TNL_HOP_LIMIT
62 );
561e650e 63}
64
65static void usage(void) __attribute__((noreturn));
66static void usage(void)
67{
68 print_usage(stderr);
9d0efc10
ND
69 exit(-1);
70}
71
72static int ip6tunnel_parse_opt(struct link_util *lu, int argc, char **argv,
73 struct nlmsghdr *n)
74{
d17b136f 75 struct ifinfomsg *ifi = (struct ifinfomsg *)(n + 1);
9d0efc10
ND
76 struct {
77 struct nlmsghdr n;
78 struct ifinfomsg i;
d17b136f
PS
79 } req = {
80 .n.nlmsg_len = NLMSG_LENGTH(sizeof(*ifi)),
81 .n.nlmsg_flags = NLM_F_REQUEST,
82 .n.nlmsg_type = RTM_GETLINK,
83 .i.ifi_family = preferred_family,
84 .i.ifi_index = ifi->ifi_index,
85 };
86bf43c7 86 struct nlmsghdr *answer = NULL;
9d0efc10
ND
87 struct rtattr *tb[IFLA_MAX + 1];
88 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
89 struct rtattr *iptuninfo[IFLA_IPTUN_MAX + 1];
90 int len;
d17b136f
PS
91 struct in6_addr laddr = {};
92 struct in6_addr raddr = {};
9d0efc10
ND
93 __u8 hop_limit = DEFAULT_TNL_HOP_LIMIT;
94 __u8 encap_limit = IPV6_DEFAULT_TNL_ENCAP_LIMIT;
95 __u32 flowinfo = 0;
96 __u32 flags = 0;
97 __u32 link = 0;
98 __u8 proto = 0;
73516e12
TH
99 __u16 encaptype = 0;
100 __u16 encapflags = TUNNEL_ENCAP_FLAG_CSUM6;
101 __u16 encapsport = 0;
102 __u16 encapdport = 0;
4bfe6825 103 __u8 metadata = 0;
ad4b1425 104 __u32 fwmark = 0;
9d0efc10 105
9d0efc10 106 if (!(n->nlmsg_flags & NLM_F_CREATE)) {
86bf43c7 107 if (rtnl_talk(&rth, &req.n, &answer) < 0) {
9d0efc10
ND
108get_failed:
109 fprintf(stderr,
110 "Failed to get existing tunnel info.\n");
86bf43c7 111 free(answer);
9d0efc10
ND
112 return -1;
113 }
114
86bf43c7 115 len = answer->nlmsg_len;
9d0efc10
ND
116 len -= NLMSG_LENGTH(sizeof(*ifi));
117 if (len < 0)
118 goto get_failed;
119
86bf43c7 120 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(NLMSG_DATA(answer)), len);
9d0efc10
ND
121
122 if (!tb[IFLA_LINKINFO])
123 goto get_failed;
124
125 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb[IFLA_LINKINFO]);
126
127 if (!linkinfo[IFLA_INFO_DATA])
128 goto get_failed;
129
130 parse_rtattr_nested(iptuninfo, IFLA_IPTUN_MAX,
131 linkinfo[IFLA_INFO_DATA]);
132
133 if (iptuninfo[IFLA_IPTUN_LOCAL])
134 memcpy(&laddr, RTA_DATA(iptuninfo[IFLA_IPTUN_LOCAL]),
135 sizeof(laddr));
136
137 if (iptuninfo[IFLA_IPTUN_REMOTE])
138 memcpy(&raddr, RTA_DATA(iptuninfo[IFLA_IPTUN_REMOTE]),
139 sizeof(raddr));
140
141 if (iptuninfo[IFLA_IPTUN_TTL])
142 hop_limit = rta_getattr_u8(iptuninfo[IFLA_IPTUN_TTL]);
143
144 if (iptuninfo[IFLA_IPTUN_ENCAP_LIMIT])
145 encap_limit = rta_getattr_u8(iptuninfo[IFLA_IPTUN_ENCAP_LIMIT]);
146
147 if (iptuninfo[IFLA_IPTUN_FLOWINFO])
148 flowinfo = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FLOWINFO]);
149
150 if (iptuninfo[IFLA_IPTUN_FLAGS])
151 flags = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FLAGS]);
152
153 if (iptuninfo[IFLA_IPTUN_LINK])
154 link = rta_getattr_u32(iptuninfo[IFLA_IPTUN_LINK]);
155
156 if (iptuninfo[IFLA_IPTUN_PROTO])
157 proto = rta_getattr_u8(iptuninfo[IFLA_IPTUN_PROTO]);
4bfe6825
AS
158 if (iptuninfo[IFLA_IPTUN_COLLECT_METADATA])
159 metadata = 1;
ad4b1425
CG
160
161 if (iptuninfo[IFLA_IPTUN_FWMARK])
162 fwmark = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FWMARK]);
86bf43c7
HL
163
164 free(answer);
9d0efc10
ND
165 }
166
167 while (argc > 0) {
168 if (matches(*argv, "mode") == 0) {
169 NEXT_ARG();
170 if (strcmp(*argv, "ipv6/ipv6") == 0 ||
171 strcmp(*argv, "ip6ip6") == 0)
172 proto = IPPROTO_IPV6;
173 else if (strcmp(*argv, "ip/ipv6") == 0 ||
174 strcmp(*argv, "ipv4/ipv6") == 0 ||
175 strcmp(*argv, "ipip6") == 0 ||
176 strcmp(*argv, "ip4ip6") == 0)
177 proto = IPPROTO_IPIP;
178 else if (strcmp(*argv, "any/ipv6") == 0 ||
179 strcmp(*argv, "any") == 0)
180 proto = 0;
181 else
182 invarg("Cannot guess tunnel mode.", *argv);
183 } else if (strcmp(*argv, "remote") == 0) {
184 inet_prefix addr;
56f5daac 185
9d0efc10
ND
186 NEXT_ARG();
187 get_prefix(&addr, *argv, preferred_family);
188 if (addr.family == AF_UNSPEC)
189 invarg("\"remote\" address family is AF_UNSPEC", *argv);
190 memcpy(&raddr, addr.data, addr.bytelen);
191 } else if (strcmp(*argv, "local") == 0) {
192 inet_prefix addr;
56f5daac 193
9d0efc10
ND
194 NEXT_ARG();
195 get_prefix(&addr, *argv, preferred_family);
196 if (addr.family == AF_UNSPEC)
197 invarg("\"local\" address family is AF_UNSPEC", *argv);
198 memcpy(&laddr, addr.data, addr.bytelen);
199 } else if (matches(*argv, "dev") == 0) {
200 NEXT_ARG();
201 link = if_nametoindex(*argv);
202 if (link == 0)
203 invarg("\"dev\" is invalid", *argv);
204 } else if (strcmp(*argv, "hoplimit") == 0 ||
205 strcmp(*argv, "ttl") == 0 ||
206 strcmp(*argv, "hlim") == 0) {
207 __u8 uval;
56f5daac 208
9d0efc10
ND
209 NEXT_ARG();
210 if (get_u8(&uval, *argv, 0))
211 invarg("invalid HLIM", *argv);
212 hop_limit = uval;
73516e12 213 } else if (strcmp(*argv, "encaplimit") == 0) {
9d0efc10
ND
214 NEXT_ARG();
215 if (strcmp(*argv, "none") == 0) {
216 flags |= IP6_TNL_F_IGN_ENCAP_LIMIT;
217 } else {
218 __u8 uval;
56f5daac 219
9d0efc10
ND
220 if (get_u8(&uval, *argv, 0) < -1)
221 invarg("invalid ELIM", *argv);
222 encap_limit = uval;
223 flags &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
224 }
225 } else if (strcmp(*argv, "tclass") == 0 ||
226 strcmp(*argv, "tc") == 0 ||
227 strcmp(*argv, "tos") == 0 ||
228 matches(*argv, "dsfield") == 0) {
229 __u8 uval;
56f5daac 230
9d0efc10
ND
231 NEXT_ARG();
232 flowinfo &= ~IP6_FLOWINFO_TCLASS;
233 if (strcmp(*argv, "inherit") == 0)
234 flags |= IP6_TNL_F_USE_ORIG_TCLASS;
235 else {
236 if (get_u8(&uval, *argv, 16))
237 invarg("invalid TClass", *argv);
238 flowinfo |= htonl((__u32)uval << 20) & IP6_FLOWINFO_TCLASS;
239 flags &= ~IP6_TNL_F_USE_ORIG_TCLASS;
240 }
241 } else if (strcmp(*argv, "flowlabel") == 0 ||
242 strcmp(*argv, "fl") == 0) {
243 __u32 uval;
56f5daac 244
9d0efc10
ND
245 NEXT_ARG();
246 flowinfo &= ~IP6_FLOWINFO_FLOWLABEL;
247 if (strcmp(*argv, "inherit") == 0)
248 flags |= IP6_TNL_F_USE_ORIG_FLOWLABEL;
249 else {
250 if (get_u32(&uval, *argv, 16))
251 invarg("invalid Flowlabel", *argv);
252 if (uval > 0xFFFFF)
253 invarg("invalid Flowlabel", *argv);
254 flowinfo |= htonl(uval) & IP6_FLOWINFO_FLOWLABEL;
255 flags &= ~IP6_TNL_F_USE_ORIG_FLOWLABEL;
256 }
257 } else if (strcmp(*argv, "dscp") == 0) {
258 NEXT_ARG();
259 if (strcmp(*argv, "inherit") != 0)
260 invarg("not inherit", *argv);
261 flags |= IP6_TNL_F_RCV_DSCP_COPY;
262 } else if (strcmp(*argv, "fwmark") == 0) {
263 NEXT_ARG();
ad4b1425
CG
264 if (strcmp(*argv, "inherit") == 0) {
265 flags |= IP6_TNL_F_USE_ORIG_FWMARK;
266 fwmark = 0;
267 } else {
268 if (get_u32(&fwmark, *argv, 0))
269 invarg("invalid fwmark\n", *argv);
270 flags &= ~IP6_TNL_F_USE_ORIG_FWMARK;
271 }
21440d19
SL
272 } else if (strcmp(*argv, "allow-localremote") == 0) {
273 flags |= IP6_TNL_F_ALLOW_LOCAL_REMOTE;
274 } else if (strcmp(*argv, "noallow-localremote") == 0) {
275 flags &= ~IP6_TNL_F_ALLOW_LOCAL_REMOTE;
73516e12
TH
276 } else if (strcmp(*argv, "noencap") == 0) {
277 encaptype = TUNNEL_ENCAP_NONE;
278 } else if (strcmp(*argv, "encap") == 0) {
279 NEXT_ARG();
280 if (strcmp(*argv, "fou") == 0)
281 encaptype = TUNNEL_ENCAP_FOU;
282 else if (strcmp(*argv, "gue") == 0)
283 encaptype = TUNNEL_ENCAP_GUE;
284 else if (strcmp(*argv, "none") == 0)
285 encaptype = TUNNEL_ENCAP_NONE;
286 else
287 invarg("Invalid encap type.", *argv);
288 } else if (strcmp(*argv, "encap-sport") == 0) {
289 NEXT_ARG();
290 if (strcmp(*argv, "auto") == 0)
291 encapsport = 0;
292 else if (get_u16(&encapsport, *argv, 0))
293 invarg("Invalid source port.", *argv);
294 } else if (strcmp(*argv, "encap-dport") == 0) {
295 NEXT_ARG();
296 if (get_u16(&encapdport, *argv, 0))
297 invarg("Invalid destination port.", *argv);
298 } else if (strcmp(*argv, "encap-csum") == 0) {
299 encapflags |= TUNNEL_ENCAP_FLAG_CSUM;
300 } else if (strcmp(*argv, "noencap-csum") == 0) {
301 encapflags &= ~TUNNEL_ENCAP_FLAG_CSUM;
302 } else if (strcmp(*argv, "encap-udp6-csum") == 0) {
303 encapflags |= TUNNEL_ENCAP_FLAG_CSUM6;
304 } else if (strcmp(*argv, "noencap-udp6-csum") == 0) {
305 encapflags &= ~TUNNEL_ENCAP_FLAG_CSUM6;
306 } else if (strcmp(*argv, "encap-remcsum") == 0) {
307 encapflags |= TUNNEL_ENCAP_FLAG_REMCSUM;
308 } else if (strcmp(*argv, "noencap-remcsum") == 0) {
309 encapflags |= ~TUNNEL_ENCAP_FLAG_REMCSUM;
4bfe6825
AS
310 } else if (strcmp(*argv, "external") == 0) {
311 metadata = 1;
9d0efc10
ND
312 } else
313 usage();
314 argc--, argv++;
315 }
316
317 addattr8(n, 1024, IFLA_IPTUN_PROTO, proto);
4bfe6825
AS
318 if (metadata) {
319 addattr_l(n, 1024, IFLA_IPTUN_COLLECT_METADATA, NULL, 0);
320 return 0;
321 }
9d0efc10
ND
322 addattr_l(n, 1024, IFLA_IPTUN_LOCAL, &laddr, sizeof(laddr));
323 addattr_l(n, 1024, IFLA_IPTUN_REMOTE, &raddr, sizeof(raddr));
324 addattr8(n, 1024, IFLA_IPTUN_TTL, hop_limit);
325 addattr8(n, 1024, IFLA_IPTUN_ENCAP_LIMIT, encap_limit);
326 addattr32(n, 1024, IFLA_IPTUN_FLOWINFO, flowinfo);
327 addattr32(n, 1024, IFLA_IPTUN_FLAGS, flags);
328 addattr32(n, 1024, IFLA_IPTUN_LINK, link);
ad4b1425 329 addattr32(n, 1024, IFLA_IPTUN_FWMARK, fwmark);
9d0efc10 330
73516e12
TH
331 addattr16(n, 1024, IFLA_IPTUN_ENCAP_TYPE, encaptype);
332 addattr16(n, 1024, IFLA_IPTUN_ENCAP_FLAGS, encapflags);
333 addattr16(n, 1024, IFLA_IPTUN_ENCAP_SPORT, htons(encapsport));
334 addattr16(n, 1024, IFLA_IPTUN_ENCAP_DPORT, htons(encapdport));
335
9d0efc10
ND
336 return 0;
337}
338
339static void ip6tunnel_print_opt(struct link_util *lu, FILE *f, struct rtattr *tb[])
340{
9d0efc10
ND
341 char s2[64];
342 int flags = 0;
343 __u32 flowinfo = 0;
344
345 if (!tb)
346 return;
347
348 if (tb[IFLA_IPTUN_FLAGS])
349 flags = rta_getattr_u32(tb[IFLA_IPTUN_FLAGS]);
350
351 if (tb[IFLA_IPTUN_FLOWINFO])
352 flowinfo = rta_getattr_u32(tb[IFLA_IPTUN_FLOWINFO]);
353
354 if (tb[IFLA_IPTUN_PROTO]) {
355 switch (rta_getattr_u8(tb[IFLA_IPTUN_PROTO])) {
356 case IPPROTO_IPIP:
1facc1c6 357 print_string(PRINT_ANY, "proto", "%s ", "ipip6");
9d0efc10
ND
358 break;
359 case IPPROTO_IPV6:
1facc1c6 360 print_string(PRINT_ANY, "proto", "%s ", "ip6ip6");
9d0efc10
ND
361 break;
362 case 0:
1facc1c6 363 print_string(PRINT_ANY, "proto", "%s ", "any");
9d0efc10
ND
364 break;
365 }
366 }
367
368 if (tb[IFLA_IPTUN_REMOTE]) {
1facc1c6
JF
369 print_string(PRINT_ANY,
370 "remote",
371 "remote %s ",
372 rt_addr_n2a_rta(AF_INET6, tb[IFLA_IPTUN_REMOTE]));
9d0efc10
ND
373 }
374
375 if (tb[IFLA_IPTUN_LOCAL]) {
1facc1c6
JF
376 print_string(PRINT_ANY,
377 "local",
378 "local %s ",
379 rt_addr_n2a_rta(AF_INET6, tb[IFLA_IPTUN_LOCAL]));
9d0efc10
ND
380 }
381
382 if (tb[IFLA_IPTUN_LINK] && rta_getattr_u32(tb[IFLA_IPTUN_LINK])) {
56f5daac 383 unsigned int link = rta_getattr_u32(tb[IFLA_IPTUN_LINK]);
9d0efc10
ND
384 const char *n = if_indextoname(link, s2);
385
386 if (n)
1facc1c6 387 print_string(PRINT_ANY, "link", "dev %s ", n);
9d0efc10 388 else
1facc1c6 389 print_uint(PRINT_ANY, "link_index", "dev %u ", link);
9d0efc10
ND
390 }
391
392 if (flags & IP6_TNL_F_IGN_ENCAP_LIMIT)
1facc1c6
JF
393 print_bool(PRINT_ANY,
394 "ip6_tnl_f_ign_encap_limit",
395 "encaplimit none ",
396 true);
9d0efc10 397 else if (tb[IFLA_IPTUN_ENCAP_LIMIT])
1facc1c6
JF
398 print_uint(PRINT_ANY,
399 "encap_limit",
400 "encaplimit %u ",
401 rta_getattr_u8(tb[IFLA_IPTUN_ENCAP_LIMIT]));
9d0efc10
ND
402
403 if (tb[IFLA_IPTUN_TTL])
1facc1c6
JF
404 print_uint(PRINT_ANY,
405 "ttl",
406 "hoplimit %u ",
407 rta_getattr_u8(tb[IFLA_IPTUN_TTL]));
9d0efc10
ND
408
409 if (flags & IP6_TNL_F_USE_ORIG_TCLASS)
1facc1c6
JF
410 print_bool(PRINT_ANY,
411 "ip6_tnl_f_use_orig_tclass",
412 "tclass inherit ",
413 true);
9d0efc10
ND
414 else if (tb[IFLA_IPTUN_FLOWINFO]) {
415 __u32 val = ntohl(flowinfo & IP6_FLOWINFO_TCLASS);
416
1facc1c6
JF
417 if (is_json_context()) {
418 SPRINT_BUF(b1);
419
420 snprintf(b1, sizeof(b1), "0x%02x", (__u8)(val >> 20));
421 print_string(PRINT_JSON, "flowinfo_tclass", NULL, b1);
422 } else {
423 printf("tclass 0x%02x ", (__u8)(val >> 20));
424 }
425 }
426
427 if (flags & IP6_TNL_F_USE_ORIG_FLOWLABEL) {
428 print_bool(PRINT_ANY,
429 "ip6_tnl_f_use_orig_flowlabel",
430 "flowlabel inherit ",
431 true);
432 } else {
433 if (is_json_context()) {
434 SPRINT_BUF(b1);
435
436 snprintf(b1, sizeof(b1), "0x%05x",
437 ntohl(flowinfo & IP6_FLOWINFO_FLOWLABEL));
438 print_string(PRINT_JSON, "flowlabel", NULL, b1);
439 } else {
440 printf("flowlabel 0x%05x ",
441 ntohl(flowinfo & IP6_FLOWINFO_FLOWLABEL));
442 }
9d0efc10
ND
443 }
444
1facc1c6
JF
445 if (is_json_context()) {
446 SPRINT_BUF(flwinfo);
9d0efc10 447
1facc1c6
JF
448 snprintf(flwinfo, sizeof(flwinfo), "0x%08x", ntohl(flowinfo));
449 print_string(PRINT_JSON, "flowinfo", NULL, flwinfo);
450 } else {
451 printf("(flowinfo 0x%08x) ", ntohl(flowinfo));
452
453 }
9d0efc10
ND
454
455 if (flags & IP6_TNL_F_RCV_DSCP_COPY)
1facc1c6
JF
456 print_bool(PRINT_ANY,
457 "ip6_tnl_f_rcv_dscp_copy",
458 "dscp inherit ",
459 true);
9d0efc10
ND
460
461 if (flags & IP6_TNL_F_MIP6_DEV)
1facc1c6
JF
462 print_bool(PRINT_ANY, "ip6_tnl_f_mip6_dev", "mip6 ", true);
463
464 if (flags & IP6_TNL_F_USE_ORIG_FWMARK) {
465 print_bool(PRINT_ANY,
466 "ip6_tnl_f_use_orig_fwmark",
467 "fwmark inherit ",
468 true);
469 } else if (tb[IFLA_IPTUN_FWMARK]) {
470 __u32 fwmark = rta_getattr_u32(tb[IFLA_IPTUN_FWMARK]);
9d0efc10 471
1facc1c6
JF
472 if (fwmark) {
473 SPRINT_BUF(b1);
474
475 snprintf(b1, sizeof(b1), "0x%x", fwmark);
476 print_string(PRINT_ANY, "fwmark", "fwmark %s ", b1);
477 }
478 }
73516e12 479
21440d19
SL
480 if (flags & IP6_TNL_F_ALLOW_LOCAL_REMOTE)
481 print_bool(PRINT_ANY,
482 "ip6_tnl_f_allow_local_remote",
483 "allow-localremote ",
484 true);
485
73516e12 486 if (tb[IFLA_IPTUN_ENCAP_TYPE] &&
1facc1c6 487 rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_TYPE]) != TUNNEL_ENCAP_NONE) {
73516e12
TH
488 __u16 type = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_TYPE]);
489 __u16 flags = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_FLAGS]);
490 __u16 sport = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_SPORT]);
491 __u16 dport = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_DPORT]);
492
1facc1c6
JF
493 open_json_object("encap");
494 print_string(PRINT_FP, NULL, "encap ", NULL);
73516e12
TH
495 switch (type) {
496 case TUNNEL_ENCAP_FOU:
1facc1c6 497 print_string(PRINT_ANY, "type", "%s ", "fou");
73516e12
TH
498 break;
499 case TUNNEL_ENCAP_GUE:
1facc1c6 500 print_string(PRINT_ANY, "type", "%s ", "gue");
73516e12
TH
501 break;
502 default:
1facc1c6 503 print_null(PRINT_ANY, "type", "unknown ", NULL);
73516e12
TH
504 break;
505 }
506
1facc1c6
JF
507 if (is_json_context()) {
508 print_uint(PRINT_JSON,
509 "sport",
510 NULL,
511 sport ? ntohs(sport) : 0);
512 print_uint(PRINT_JSON, "dport", NULL, ntohs(dport));
513 print_bool(PRINT_JSON, "csum", NULL,
514 flags & TUNNEL_ENCAP_FLAG_CSUM);
515 print_bool(PRINT_JSON, "csum6", NULL,
516 flags & TUNNEL_ENCAP_FLAG_CSUM6);
517 print_bool(PRINT_JSON, "remcsum", NULL,
518 flags & TUNNEL_ENCAP_FLAG_REMCSUM);
519 close_json_object();
520 } else {
521 if (sport == 0)
522 fputs("encap-sport auto ", f);
523 else
524 fprintf(f, "encap-sport %u", ntohs(sport));
73516e12 525
1facc1c6 526 fprintf(f, "encap-dport %u ", ntohs(dport));
73516e12 527
1facc1c6
JF
528 if (flags & TUNNEL_ENCAP_FLAG_CSUM)
529 fputs("encap-csum ", f);
530 else
531 fputs("noencap-csum ", f);
73516e12 532
1facc1c6
JF
533 if (flags & TUNNEL_ENCAP_FLAG_CSUM6)
534 fputs("encap-csum6 ", f);
535 else
536 fputs("noencap-csum6 ", f);
73516e12 537
1facc1c6
JF
538 if (flags & TUNNEL_ENCAP_FLAG_REMCSUM)
539 fputs("encap-remcsum ", f);
540 else
541 fputs("noencap-remcsum ", f);
542 }
73516e12 543 }
9d0efc10
ND
544}
545
561e650e 546static void ip6tunnel_print_help(struct link_util *lu, int argc, char **argv,
1facc1c6 547 FILE *f)
561e650e 548{
549 print_usage(f);
550}
551
9d0efc10
ND
552struct link_util ip6tnl_link_util = {
553 .id = "ip6tnl",
554 .maxattr = IFLA_IPTUN_MAX,
555 .parse_opt = ip6tunnel_parse_opt,
556 .print_opt = ip6tunnel_print_opt,
561e650e 557 .print_help = ip6tunnel_print_help,
9d0efc10 558};