]> git.proxmox.com Git - mirror_iproute2.git/blame - ip/link_ip6tnl.c
ip6/tunnel: Fix tclass output
[mirror_iproute2.git] / ip / link_ip6tnl.c
CommitLineData
9d0efc10
ND
1/*
2 * link_ip6tnl.c ip6tnl driver module
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Nicolas Dichtel <nicolas.dichtel@6wind.com>
10 *
11 */
12
13#include <string.h>
14#include <net/if.h>
15#include <sys/types.h>
16#include <sys/socket.h>
17#include <arpa/inet.h>
18
19#include <linux/ip.h>
20#include <linux/if_tunnel.h>
21#include <linux/ip6_tunnel.h>
22#include "rt_names.h"
23#include "utils.h"
24#include "ip_common.h"
25#include "tunnel.h"
26
27#define IP6_FLOWINFO_TCLASS htonl(0x0FF00000)
28#define IP6_FLOWINFO_FLOWLABEL htonl(0x000FFFFF)
29
30#define DEFAULT_TNL_HOP_LIMIT (64)
31
561e650e 32static void print_usage(FILE *f)
9d0efc10 33{
8b471354
PS
34 fprintf(f,
35 "Usage: ... ip6tnl [ mode { ip6ip6 | ipip6 | any } ]\n"
36 " [ remote ADDR ]\n"
37 " [ local ADDR ]\n"
38 " [ dev PHYS_DEV ]\n"
39 " [ encaplimit ELIM ]\n"
40 " [ hoplimit HLIM ]\n"
41 " [ tclass TCLASS ]\n"
42 " [ flowlabel FLOWLABEL ]\n"
43 " [ dscp inherit ]\n"
ad4b1425 44 " [ fwmark MARK ]\n"
21440d19 45 " [ [no]allow-localremote ]\n"
8b471354
PS
46 " [ noencap ]\n"
47 " [ encap { fou | gue | none } ]\n"
48 " [ encap-sport PORT ]\n"
49 " [ encap-dport PORT ]\n"
50 " [ [no]encap-csum ]\n"
51 " [ [no]encap-csum6 ]\n"
52 " [ [no]encap-remcsum ]\n"
53 " [ external ]\n"
54 "\n"
55 "Where: ADDR := IPV6_ADDRESS\n"
56 " ELIM := { none | 0..255 }(default=%d)\n"
57 " HLIM := 0..255 (default=%d)\n"
58 " TCLASS := { 0x0..0xff | inherit }\n"
ad4b1425
CG
59 " FLOWLABEL := { 0x0..0xfffff | inherit }\n"
60 " MARK := { 0x0..0xffffffff | inherit }\n",
8b471354
PS
61 IPV6_DEFAULT_TNL_ENCAP_LIMIT, DEFAULT_TNL_HOP_LIMIT
62 );
561e650e 63}
64
65static void usage(void) __attribute__((noreturn));
66static void usage(void)
67{
68 print_usage(stderr);
9d0efc10
ND
69 exit(-1);
70}
71
72static int ip6tunnel_parse_opt(struct link_util *lu, int argc, char **argv,
73 struct nlmsghdr *n)
74{
d17b136f 75 struct ifinfomsg *ifi = (struct ifinfomsg *)(n + 1);
9d0efc10
ND
76 struct {
77 struct nlmsghdr n;
78 struct ifinfomsg i;
d17b136f
PS
79 } req = {
80 .n.nlmsg_len = NLMSG_LENGTH(sizeof(*ifi)),
81 .n.nlmsg_flags = NLM_F_REQUEST,
82 .n.nlmsg_type = RTM_GETLINK,
83 .i.ifi_family = preferred_family,
84 .i.ifi_index = ifi->ifi_index,
85 };
08ede25f 86 struct nlmsghdr *answer;
9d0efc10
ND
87 struct rtattr *tb[IFLA_MAX + 1];
88 struct rtattr *linkinfo[IFLA_INFO_MAX+1];
89 struct rtattr *iptuninfo[IFLA_IPTUN_MAX + 1];
90 int len;
95614cc8
SP
91 struct in6_addr laddr = IN6ADDR_ANY_INIT;
92 struct in6_addr raddr = IN6ADDR_ANY_INIT;
9d0efc10
ND
93 __u8 hop_limit = DEFAULT_TNL_HOP_LIMIT;
94 __u8 encap_limit = IPV6_DEFAULT_TNL_ENCAP_LIMIT;
95 __u32 flowinfo = 0;
96 __u32 flags = 0;
97 __u32 link = 0;
98 __u8 proto = 0;
73516e12
TH
99 __u16 encaptype = 0;
100 __u16 encapflags = TUNNEL_ENCAP_FLAG_CSUM6;
101 __u16 encapsport = 0;
102 __u16 encapdport = 0;
4bfe6825 103 __u8 metadata = 0;
ad4b1425 104 __u32 fwmark = 0;
9d0efc10 105
9d0efc10 106 if (!(n->nlmsg_flags & NLM_F_CREATE)) {
86bf43c7 107 if (rtnl_talk(&rth, &req.n, &answer) < 0) {
9d0efc10
ND
108get_failed:
109 fprintf(stderr,
110 "Failed to get existing tunnel info.\n");
111 return -1;
112 }
113
86bf43c7 114 len = answer->nlmsg_len;
9d0efc10
ND
115 len -= NLMSG_LENGTH(sizeof(*ifi));
116 if (len < 0)
117 goto get_failed;
118
86bf43c7 119 parse_rtattr(tb, IFLA_MAX, IFLA_RTA(NLMSG_DATA(answer)), len);
9d0efc10
ND
120
121 if (!tb[IFLA_LINKINFO])
122 goto get_failed;
123
124 parse_rtattr_nested(linkinfo, IFLA_INFO_MAX, tb[IFLA_LINKINFO]);
125
126 if (!linkinfo[IFLA_INFO_DATA])
127 goto get_failed;
128
129 parse_rtattr_nested(iptuninfo, IFLA_IPTUN_MAX,
130 linkinfo[IFLA_INFO_DATA]);
131
132 if (iptuninfo[IFLA_IPTUN_LOCAL])
133 memcpy(&laddr, RTA_DATA(iptuninfo[IFLA_IPTUN_LOCAL]),
134 sizeof(laddr));
135
136 if (iptuninfo[IFLA_IPTUN_REMOTE])
137 memcpy(&raddr, RTA_DATA(iptuninfo[IFLA_IPTUN_REMOTE]),
138 sizeof(raddr));
139
140 if (iptuninfo[IFLA_IPTUN_TTL])
141 hop_limit = rta_getattr_u8(iptuninfo[IFLA_IPTUN_TTL]);
142
143 if (iptuninfo[IFLA_IPTUN_ENCAP_LIMIT])
144 encap_limit = rta_getattr_u8(iptuninfo[IFLA_IPTUN_ENCAP_LIMIT]);
145
146 if (iptuninfo[IFLA_IPTUN_FLOWINFO])
147 flowinfo = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FLOWINFO]);
148
149 if (iptuninfo[IFLA_IPTUN_FLAGS])
150 flags = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FLAGS]);
151
152 if (iptuninfo[IFLA_IPTUN_LINK])
153 link = rta_getattr_u32(iptuninfo[IFLA_IPTUN_LINK]);
154
155 if (iptuninfo[IFLA_IPTUN_PROTO])
156 proto = rta_getattr_u8(iptuninfo[IFLA_IPTUN_PROTO]);
4bfe6825
AS
157 if (iptuninfo[IFLA_IPTUN_COLLECT_METADATA])
158 metadata = 1;
ad4b1425
CG
159
160 if (iptuninfo[IFLA_IPTUN_FWMARK])
161 fwmark = rta_getattr_u32(iptuninfo[IFLA_IPTUN_FWMARK]);
86bf43c7
HL
162
163 free(answer);
9d0efc10
ND
164 }
165
166 while (argc > 0) {
167 if (matches(*argv, "mode") == 0) {
168 NEXT_ARG();
169 if (strcmp(*argv, "ipv6/ipv6") == 0 ||
170 strcmp(*argv, "ip6ip6") == 0)
171 proto = IPPROTO_IPV6;
172 else if (strcmp(*argv, "ip/ipv6") == 0 ||
173 strcmp(*argv, "ipv4/ipv6") == 0 ||
174 strcmp(*argv, "ipip6") == 0 ||
175 strcmp(*argv, "ip4ip6") == 0)
176 proto = IPPROTO_IPIP;
177 else if (strcmp(*argv, "any/ipv6") == 0 ||
178 strcmp(*argv, "any") == 0)
179 proto = 0;
180 else
181 invarg("Cannot guess tunnel mode.", *argv);
182 } else if (strcmp(*argv, "remote") == 0) {
183 inet_prefix addr;
56f5daac 184
9d0efc10 185 NEXT_ARG();
9aceaad7
SP
186 get_addr(&addr, *argv, AF_INET6);
187 memcpy(&raddr, addr.data, sizeof(raddr));
9d0efc10
ND
188 } else if (strcmp(*argv, "local") == 0) {
189 inet_prefix addr;
56f5daac 190
9d0efc10 191 NEXT_ARG();
9aceaad7
SP
192 get_addr(&addr, *argv, AF_INET6);
193 memcpy(&laddr, addr.data, sizeof(laddr));
9d0efc10
ND
194 } else if (matches(*argv, "dev") == 0) {
195 NEXT_ARG();
196 link = if_nametoindex(*argv);
197 if (link == 0)
198 invarg("\"dev\" is invalid", *argv);
199 } else if (strcmp(*argv, "hoplimit") == 0 ||
200 strcmp(*argv, "ttl") == 0 ||
201 strcmp(*argv, "hlim") == 0) {
202 __u8 uval;
56f5daac 203
9d0efc10
ND
204 NEXT_ARG();
205 if (get_u8(&uval, *argv, 0))
206 invarg("invalid HLIM", *argv);
207 hop_limit = uval;
73516e12 208 } else if (strcmp(*argv, "encaplimit") == 0) {
9d0efc10
ND
209 NEXT_ARG();
210 if (strcmp(*argv, "none") == 0) {
211 flags |= IP6_TNL_F_IGN_ENCAP_LIMIT;
212 } else {
213 __u8 uval;
56f5daac 214
9d0efc10
ND
215 if (get_u8(&uval, *argv, 0) < -1)
216 invarg("invalid ELIM", *argv);
217 encap_limit = uval;
218 flags &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
219 }
220 } else if (strcmp(*argv, "tclass") == 0 ||
221 strcmp(*argv, "tc") == 0 ||
222 strcmp(*argv, "tos") == 0 ||
223 matches(*argv, "dsfield") == 0) {
224 __u8 uval;
56f5daac 225
9d0efc10
ND
226 NEXT_ARG();
227 flowinfo &= ~IP6_FLOWINFO_TCLASS;
228 if (strcmp(*argv, "inherit") == 0)
229 flags |= IP6_TNL_F_USE_ORIG_TCLASS;
230 else {
231 if (get_u8(&uval, *argv, 16))
232 invarg("invalid TClass", *argv);
233 flowinfo |= htonl((__u32)uval << 20) & IP6_FLOWINFO_TCLASS;
234 flags &= ~IP6_TNL_F_USE_ORIG_TCLASS;
235 }
236 } else if (strcmp(*argv, "flowlabel") == 0 ||
237 strcmp(*argv, "fl") == 0) {
238 __u32 uval;
56f5daac 239
9d0efc10
ND
240 NEXT_ARG();
241 flowinfo &= ~IP6_FLOWINFO_FLOWLABEL;
242 if (strcmp(*argv, "inherit") == 0)
243 flags |= IP6_TNL_F_USE_ORIG_FLOWLABEL;
244 else {
245 if (get_u32(&uval, *argv, 16))
246 invarg("invalid Flowlabel", *argv);
247 if (uval > 0xFFFFF)
248 invarg("invalid Flowlabel", *argv);
249 flowinfo |= htonl(uval) & IP6_FLOWINFO_FLOWLABEL;
250 flags &= ~IP6_TNL_F_USE_ORIG_FLOWLABEL;
251 }
252 } else if (strcmp(*argv, "dscp") == 0) {
253 NEXT_ARG();
254 if (strcmp(*argv, "inherit") != 0)
255 invarg("not inherit", *argv);
256 flags |= IP6_TNL_F_RCV_DSCP_COPY;
257 } else if (strcmp(*argv, "fwmark") == 0) {
258 NEXT_ARG();
ad4b1425
CG
259 if (strcmp(*argv, "inherit") == 0) {
260 flags |= IP6_TNL_F_USE_ORIG_FWMARK;
261 fwmark = 0;
262 } else {
263 if (get_u32(&fwmark, *argv, 0))
264 invarg("invalid fwmark\n", *argv);
265 flags &= ~IP6_TNL_F_USE_ORIG_FWMARK;
266 }
21440d19
SL
267 } else if (strcmp(*argv, "allow-localremote") == 0) {
268 flags |= IP6_TNL_F_ALLOW_LOCAL_REMOTE;
269 } else if (strcmp(*argv, "noallow-localremote") == 0) {
270 flags &= ~IP6_TNL_F_ALLOW_LOCAL_REMOTE;
73516e12
TH
271 } else if (strcmp(*argv, "noencap") == 0) {
272 encaptype = TUNNEL_ENCAP_NONE;
273 } else if (strcmp(*argv, "encap") == 0) {
274 NEXT_ARG();
275 if (strcmp(*argv, "fou") == 0)
276 encaptype = TUNNEL_ENCAP_FOU;
277 else if (strcmp(*argv, "gue") == 0)
278 encaptype = TUNNEL_ENCAP_GUE;
279 else if (strcmp(*argv, "none") == 0)
280 encaptype = TUNNEL_ENCAP_NONE;
281 else
282 invarg("Invalid encap type.", *argv);
283 } else if (strcmp(*argv, "encap-sport") == 0) {
284 NEXT_ARG();
285 if (strcmp(*argv, "auto") == 0)
286 encapsport = 0;
287 else if (get_u16(&encapsport, *argv, 0))
288 invarg("Invalid source port.", *argv);
289 } else if (strcmp(*argv, "encap-dport") == 0) {
290 NEXT_ARG();
291 if (get_u16(&encapdport, *argv, 0))
292 invarg("Invalid destination port.", *argv);
293 } else if (strcmp(*argv, "encap-csum") == 0) {
294 encapflags |= TUNNEL_ENCAP_FLAG_CSUM;
295 } else if (strcmp(*argv, "noencap-csum") == 0) {
296 encapflags &= ~TUNNEL_ENCAP_FLAG_CSUM;
297 } else if (strcmp(*argv, "encap-udp6-csum") == 0) {
298 encapflags |= TUNNEL_ENCAP_FLAG_CSUM6;
299 } else if (strcmp(*argv, "noencap-udp6-csum") == 0) {
300 encapflags &= ~TUNNEL_ENCAP_FLAG_CSUM6;
301 } else if (strcmp(*argv, "encap-remcsum") == 0) {
302 encapflags |= TUNNEL_ENCAP_FLAG_REMCSUM;
303 } else if (strcmp(*argv, "noencap-remcsum") == 0) {
147ade01 304 encapflags &= ~TUNNEL_ENCAP_FLAG_REMCSUM;
4bfe6825
AS
305 } else if (strcmp(*argv, "external") == 0) {
306 metadata = 1;
9d0efc10
ND
307 } else
308 usage();
309 argc--, argv++;
310 }
311
312 addattr8(n, 1024, IFLA_IPTUN_PROTO, proto);
4bfe6825
AS
313 if (metadata) {
314 addattr_l(n, 1024, IFLA_IPTUN_COLLECT_METADATA, NULL, 0);
315 return 0;
316 }
9d0efc10
ND
317 addattr_l(n, 1024, IFLA_IPTUN_LOCAL, &laddr, sizeof(laddr));
318 addattr_l(n, 1024, IFLA_IPTUN_REMOTE, &raddr, sizeof(raddr));
319 addattr8(n, 1024, IFLA_IPTUN_TTL, hop_limit);
320 addattr8(n, 1024, IFLA_IPTUN_ENCAP_LIMIT, encap_limit);
321 addattr32(n, 1024, IFLA_IPTUN_FLOWINFO, flowinfo);
322 addattr32(n, 1024, IFLA_IPTUN_FLAGS, flags);
323 addattr32(n, 1024, IFLA_IPTUN_LINK, link);
ad4b1425 324 addattr32(n, 1024, IFLA_IPTUN_FWMARK, fwmark);
9d0efc10 325
73516e12
TH
326 addattr16(n, 1024, IFLA_IPTUN_ENCAP_TYPE, encaptype);
327 addattr16(n, 1024, IFLA_IPTUN_ENCAP_FLAGS, encapflags);
328 addattr16(n, 1024, IFLA_IPTUN_ENCAP_SPORT, htons(encapsport));
329 addattr16(n, 1024, IFLA_IPTUN_ENCAP_DPORT, htons(encapdport));
330
9d0efc10
ND
331 return 0;
332}
333
334static void ip6tunnel_print_opt(struct link_util *lu, FILE *f, struct rtattr *tb[])
335{
9d0efc10
ND
336 char s2[64];
337 int flags = 0;
338 __u32 flowinfo = 0;
339
340 if (!tb)
341 return;
342
7b178324
PD
343 if (tb[IFLA_IPTUN_COLLECT_METADATA])
344 print_bool(PRINT_ANY, "external", "external ", true);
345
9d0efc10
ND
346 if (tb[IFLA_IPTUN_FLAGS])
347 flags = rta_getattr_u32(tb[IFLA_IPTUN_FLAGS]);
348
349 if (tb[IFLA_IPTUN_FLOWINFO])
350 flowinfo = rta_getattr_u32(tb[IFLA_IPTUN_FLOWINFO]);
351
352 if (tb[IFLA_IPTUN_PROTO]) {
353 switch (rta_getattr_u8(tb[IFLA_IPTUN_PROTO])) {
354 case IPPROTO_IPIP:
1facc1c6 355 print_string(PRINT_ANY, "proto", "%s ", "ipip6");
9d0efc10
ND
356 break;
357 case IPPROTO_IPV6:
1facc1c6 358 print_string(PRINT_ANY, "proto", "%s ", "ip6ip6");
9d0efc10
ND
359 break;
360 case 0:
1facc1c6 361 print_string(PRINT_ANY, "proto", "%s ", "any");
9d0efc10
ND
362 break;
363 }
364 }
365
366 if (tb[IFLA_IPTUN_REMOTE]) {
1facc1c6
JF
367 print_string(PRINT_ANY,
368 "remote",
369 "remote %s ",
370 rt_addr_n2a_rta(AF_INET6, tb[IFLA_IPTUN_REMOTE]));
9d0efc10
ND
371 }
372
373 if (tb[IFLA_IPTUN_LOCAL]) {
1facc1c6
JF
374 print_string(PRINT_ANY,
375 "local",
376 "local %s ",
377 rt_addr_n2a_rta(AF_INET6, tb[IFLA_IPTUN_LOCAL]));
9d0efc10
ND
378 }
379
380 if (tb[IFLA_IPTUN_LINK] && rta_getattr_u32(tb[IFLA_IPTUN_LINK])) {
56f5daac 381 unsigned int link = rta_getattr_u32(tb[IFLA_IPTUN_LINK]);
9d0efc10
ND
382 const char *n = if_indextoname(link, s2);
383
384 if (n)
1facc1c6 385 print_string(PRINT_ANY, "link", "dev %s ", n);
9d0efc10 386 else
1facc1c6 387 print_uint(PRINT_ANY, "link_index", "dev %u ", link);
9d0efc10
ND
388 }
389
390 if (flags & IP6_TNL_F_IGN_ENCAP_LIMIT)
1facc1c6
JF
391 print_bool(PRINT_ANY,
392 "ip6_tnl_f_ign_encap_limit",
393 "encaplimit none ",
394 true);
9d0efc10 395 else if (tb[IFLA_IPTUN_ENCAP_LIMIT])
1facc1c6
JF
396 print_uint(PRINT_ANY,
397 "encap_limit",
398 "encaplimit %u ",
399 rta_getattr_u8(tb[IFLA_IPTUN_ENCAP_LIMIT]));
9d0efc10
ND
400
401 if (tb[IFLA_IPTUN_TTL])
1facc1c6
JF
402 print_uint(PRINT_ANY,
403 "ttl",
404 "hoplimit %u ",
405 rta_getattr_u8(tb[IFLA_IPTUN_TTL]));
9d0efc10
ND
406
407 if (flags & IP6_TNL_F_USE_ORIG_TCLASS)
1facc1c6
JF
408 print_bool(PRINT_ANY,
409 "ip6_tnl_f_use_orig_tclass",
410 "tclass inherit ",
411 true);
9d0efc10
ND
412 else if (tb[IFLA_IPTUN_FLOWINFO]) {
413 __u32 val = ntohl(flowinfo & IP6_FLOWINFO_TCLASS);
414
1facc1c6
JF
415 if (is_json_context()) {
416 SPRINT_BUF(b1);
417
418 snprintf(b1, sizeof(b1), "0x%02x", (__u8)(val >> 20));
b76b2400 419 print_string(PRINT_JSON, "tclass", NULL, b1);
1facc1c6
JF
420 } else {
421 printf("tclass 0x%02x ", (__u8)(val >> 20));
422 }
423 }
424
425 if (flags & IP6_TNL_F_USE_ORIG_FLOWLABEL) {
426 print_bool(PRINT_ANY,
427 "ip6_tnl_f_use_orig_flowlabel",
428 "flowlabel inherit ",
429 true);
430 } else {
431 if (is_json_context()) {
432 SPRINT_BUF(b1);
433
434 snprintf(b1, sizeof(b1), "0x%05x",
435 ntohl(flowinfo & IP6_FLOWINFO_FLOWLABEL));
436 print_string(PRINT_JSON, "flowlabel", NULL, b1);
437 } else {
438 printf("flowlabel 0x%05x ",
439 ntohl(flowinfo & IP6_FLOWINFO_FLOWLABEL));
440 }
9d0efc10
ND
441 }
442
1facc1c6
JF
443 if (is_json_context()) {
444 SPRINT_BUF(flwinfo);
9d0efc10 445
1facc1c6
JF
446 snprintf(flwinfo, sizeof(flwinfo), "0x%08x", ntohl(flowinfo));
447 print_string(PRINT_JSON, "flowinfo", NULL, flwinfo);
448 } else {
449 printf("(flowinfo 0x%08x) ", ntohl(flowinfo));
450
451 }
9d0efc10
ND
452
453 if (flags & IP6_TNL_F_RCV_DSCP_COPY)
1facc1c6
JF
454 print_bool(PRINT_ANY,
455 "ip6_tnl_f_rcv_dscp_copy",
456 "dscp inherit ",
457 true);
9d0efc10
ND
458
459 if (flags & IP6_TNL_F_MIP6_DEV)
1facc1c6
JF
460 print_bool(PRINT_ANY, "ip6_tnl_f_mip6_dev", "mip6 ", true);
461
462 if (flags & IP6_TNL_F_USE_ORIG_FWMARK) {
463 print_bool(PRINT_ANY,
464 "ip6_tnl_f_use_orig_fwmark",
465 "fwmark inherit ",
466 true);
467 } else if (tb[IFLA_IPTUN_FWMARK]) {
468 __u32 fwmark = rta_getattr_u32(tb[IFLA_IPTUN_FWMARK]);
9d0efc10 469
1facc1c6
JF
470 if (fwmark) {
471 SPRINT_BUF(b1);
472
473 snprintf(b1, sizeof(b1), "0x%x", fwmark);
474 print_string(PRINT_ANY, "fwmark", "fwmark %s ", b1);
475 }
476 }
73516e12 477
21440d19
SL
478 if (flags & IP6_TNL_F_ALLOW_LOCAL_REMOTE)
479 print_bool(PRINT_ANY,
480 "ip6_tnl_f_allow_local_remote",
481 "allow-localremote ",
482 true);
483
73516e12 484 if (tb[IFLA_IPTUN_ENCAP_TYPE] &&
1facc1c6 485 rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_TYPE]) != TUNNEL_ENCAP_NONE) {
73516e12
TH
486 __u16 type = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_TYPE]);
487 __u16 flags = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_FLAGS]);
488 __u16 sport = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_SPORT]);
489 __u16 dport = rta_getattr_u16(tb[IFLA_IPTUN_ENCAP_DPORT]);
490
1facc1c6
JF
491 open_json_object("encap");
492 print_string(PRINT_FP, NULL, "encap ", NULL);
73516e12
TH
493 switch (type) {
494 case TUNNEL_ENCAP_FOU:
1facc1c6 495 print_string(PRINT_ANY, "type", "%s ", "fou");
73516e12
TH
496 break;
497 case TUNNEL_ENCAP_GUE:
1facc1c6 498 print_string(PRINT_ANY, "type", "%s ", "gue");
73516e12
TH
499 break;
500 default:
1facc1c6 501 print_null(PRINT_ANY, "type", "unknown ", NULL);
73516e12
TH
502 break;
503 }
504
1facc1c6
JF
505 if (is_json_context()) {
506 print_uint(PRINT_JSON,
507 "sport",
508 NULL,
509 sport ? ntohs(sport) : 0);
510 print_uint(PRINT_JSON, "dport", NULL, ntohs(dport));
511 print_bool(PRINT_JSON, "csum", NULL,
512 flags & TUNNEL_ENCAP_FLAG_CSUM);
513 print_bool(PRINT_JSON, "csum6", NULL,
514 flags & TUNNEL_ENCAP_FLAG_CSUM6);
515 print_bool(PRINT_JSON, "remcsum", NULL,
516 flags & TUNNEL_ENCAP_FLAG_REMCSUM);
517 close_json_object();
518 } else {
519 if (sport == 0)
520 fputs("encap-sport auto ", f);
521 else
522 fprintf(f, "encap-sport %u", ntohs(sport));
73516e12 523
1facc1c6 524 fprintf(f, "encap-dport %u ", ntohs(dport));
73516e12 525
1facc1c6
JF
526 if (flags & TUNNEL_ENCAP_FLAG_CSUM)
527 fputs("encap-csum ", f);
528 else
529 fputs("noencap-csum ", f);
73516e12 530
1facc1c6
JF
531 if (flags & TUNNEL_ENCAP_FLAG_CSUM6)
532 fputs("encap-csum6 ", f);
533 else
534 fputs("noencap-csum6 ", f);
73516e12 535
1facc1c6
JF
536 if (flags & TUNNEL_ENCAP_FLAG_REMCSUM)
537 fputs("encap-remcsum ", f);
538 else
539 fputs("noencap-remcsum ", f);
540 }
73516e12 541 }
9d0efc10
ND
542}
543
561e650e 544static void ip6tunnel_print_help(struct link_util *lu, int argc, char **argv,
1facc1c6 545 FILE *f)
561e650e 546{
547 print_usage(f);
548}
549
9d0efc10
ND
550struct link_util ip6tnl_link_util = {
551 .id = "ip6tnl",
552 .maxattr = IFLA_IPTUN_MAX,
553 .parse_opt = ip6tunnel_parse_opt,
554 .print_opt = ip6tunnel_print_opt,
561e650e 555 .print_help = ip6tunnel_print_help,
9d0efc10 556};