source: branches/stable/mindi-busybox/networking/libiproute/iptunnel.c @ 1770

Last change on this file since 1770 was 1770, checked in by Bruno Cornec, 12 years ago
  • Better output for mindi-busybox revision
  • Remove dummy file created on NFS - report from Arnaud Tiger <arnaud.tiger_at_hp.com>
  • strace useful for debug
  • fix new versions for pb (2.0.0 for mindi and 1.7.2 for mindi-busybox)
  • fix build process for mindi-busybox + options used in that version (dd for label-partitions-as-necessary)
  • fix typo in label-partitions-as-necessary which doesn't seem to work
  • Update to busybox 1.7.2
  • perl is now required at restore time to support uuid swap partitions (and will be used for many other thigs

in the future for sure)

  • next mindi version will be 2.0.0 due to all the changes made in it (udev may break working distros)
  • small optimization in mindi on keyboard handling (one single find instead of multiple)
  • better interaction for USB device when launching mindi manually
  • attempt to automatically guess block disk size for ramdisk
  • fix typos in bkphw
  • Fix the remaining problem with UUID support for swap partitions
  • Updates mondoarchive man page for USB support
  • Adds preliminary Hardware support to mindi (Proliant SSSTK)
  • Tries to add udev support also for rhel4
  • Fix UUID support which was still broken.
  • Be conservative in test for the start-nfs script
  • Update config file for mindi-busybox for 1.7.2 migration
  • Try to run around a busybox bug (1.2.2 pb on inexistant links)
  • Add build content for mindi-busybox in pb
  • Remove distributions content for mindi-busybox
  • Fix a warning on inexistant raidtab
  • Solve problem on tmpfs in restore init (Problem of inexistant symlink and busybox)
  • Create MONDO_CACHE and use it everywhere + creation at start
  • Really never try to eject a USB device
  • Fix a issue with &> usage (replaced with 1> and 2>)
  • Adds magic file to depllist in order to have file working + ldd which helps for debugging issues
  • tty modes correct to avoid sh error messages
  • Use ext3 normally and not ext2 instead
  • USB device should be corrected after reading (take 1st part)
  • Adds a mount_USB_here function derived from mount_CDROM_here
  • usb detection place before /dev detection in device name at restore time
  • Fix when restoring from USB: media is asked in interactive mode
  • Adds USB support for mondorestore
  • mount_cdrom => mount_media
  • elilo.efi is now searched throughout /boot/efi and not in a fixed place as there is no standard
  • untar-and-softlink => untar (+ interface change)
  • suppress useless softlinks creation/removal in boot process
  • avoids udevd messages on groups
  • Increase # of disks to 99 as in mindi at restore time (should be a conf file parameter)
  • skip existing big file creation
  • seems to work correctly for USB mindi boot
  • Adds group and tty link to udev conf
  • Always load usb-torage (even 2.6) to initiate USB bus discovery
  • Better printing of messages
  • Attempt to fix a bug in supporting OpenSusE 10.3 kernel for initramfs (mindi may now use multiple regex for kernel initrd detection)
  • Links were not correctly done as non relative for modules in mindi
  • exclusion of modules denied now works
  • Also create modules in their ordinary place, so that classical modprobe works + copy modules.dep
  • Fix bugs for DENY_MODS handling
  • Add device /dev/console for udev
  • ide-generic should now really be excluded
  • Fix a bug in major number for tty
  • If udev then adds modprobe/insmod to rootfs
  • tty0 is also cretaed with udev
  • ide-generic put rather in DENY_MODS
  • udevd remove from deplist s handled in mindi directly
  • better default for mindi when using --usb
  • Handles dynamically linked busybox (in case we want to use it soon ;-)
  • Adds fixed devices to create for udev
  • ide-generic should not be part of the initrd when using libata v2
  • support a dynamically linked udev (case on Ubuntu 7.10 and Mandriva 2008.0 so should be quite generic) This will give incitation to move to dyn. linked binaries in the initrd which will help for other tasks (ia6 4)
  • Improvement in udev support (do not use cl options not available in busybox)
  • Udev in mindi
    • auto creation of the right links at boot time with udev-links.conf(from Mandriva 2008.0)
    • rework startup of udev as current makes kernel crash (from Mandriva 2008.0)
    • add support for 64 bits udev
  • Try to render MyInsmod? silent at boot time
  • Adds udev support (mandatory for newest distributions to avoid remapping of devices in a different way as on the original system)
  • We also need vaft format support for USB boot
  • Adds libusual support (Ubuntu 7.10 needs it for USB)
  • Improve Ubuntu/Debian? keyboard detection and support
  • pbinit adapted to new pb (0.8.10). Filtering of docs done in it
  • Suppress some mondo warnings and errors on USB again
  • Tries to fix lack of files in deb mindi package
  • Verify should now work for USB devices
  • More log/mesages improvement for USB support
  • - Supress g_erase_tmpdir_and_scratchdir
  • Improve some log messages for USB support
  • Try to improve install in mindi to avoid issues with isolinux.cfg not installed vene if in the pkg :-(
  • Improve mindi-busybox build
  • In conformity with pb 0.8.9
  • Add support for Ubuntu 7.10 in build process
  • Add USB Key button to Menu UI (CD streamer removed)
  • Attempt to fix error messages on tmp/scratch files at the end by removing those dir at the latest possible.
  • Fix a bug linked to the size of the -E param which could be used (Arnaud Tiger/René? Ribaud).
  • Integrate ~/.pbrc content into mondorescue.pb (required project-builder >= 0.8.7)
  • Put mondorescue in conformity with new pb filtering rules
  • Add USB support at restore time (no test done yet). New start-usb script PB varibale added where useful
  • Unmounting USB device before removal of temporary scratchdir
  • Stil refining USB copy back to mondo (one command was not executed)
  • No need to have the image subdor in the csratchdir when USB.
  • umount the USB partition before attempting to use it
  • Remove useless copy from mindi to mondo at end of USB handling

(risky merge, we are raising the limits of 2 diverging branches. The status of stable is not completely sure as such. Will need lots of tests, but it's not yet done :-()
(merge -r1692:1769 $SVN_M/branches/2.2.5)

File size: 13.8 KB
Line 
1/* vi: set sw=4 ts=4: */
2/*
3 * iptunnel.c          "ip tunnel"
4 *
5 * Licensed under the GPL v2 or later, see the file LICENSE in this tarball.
6 *
7 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
8 *
9 *
10 * Changes:
11 *
12 * Rani Assaf <rani@magic.metawire.com> 980929: resolve addresses
13 * Rani Assaf <rani@magic.metawire.com> 980930: do not allow key for ipip/sit
14 * Phil Karn <karn@ka9q.ampr.org>   990408: "pmtudisc" flag
15 */
16
17#include <netinet/ip.h>
18#include <net/if.h>
19#include <net/if_arp.h>
20#include <asm/types.h>
21#ifndef __constant_htons
22#define __constant_htons htons
23#endif
24#include <linux/if_tunnel.h>
25
26#include "ip_common.h"  /* #include "libbb.h" is inside */
27#include "rt_names.h"
28#include "utils.h"
29
30
31/* Dies on error */
32static int do_ioctl_get_ifindex(char *dev)
33{
34    struct ifreq ifr;
35    int fd;
36
37    strncpy(ifr.ifr_name, dev, sizeof(ifr.ifr_name));
38    fd = xsocket(AF_INET, SOCK_DGRAM, 0);
39    xioctl(fd, SIOCGIFINDEX, &ifr);
40    close(fd);
41    return ifr.ifr_ifindex;
42}
43
44static int do_ioctl_get_iftype(char *dev)
45{
46    struct ifreq ifr;
47    int fd;
48    int err;
49
50    strncpy(ifr.ifr_name, dev, sizeof(ifr.ifr_name));
51    fd = xsocket(AF_INET, SOCK_DGRAM, 0);
52    err = ioctl_or_warn(fd, SIOCGIFHWADDR, &ifr);
53    close(fd);
54    return err ? -1 : ifr.ifr_addr.sa_family;
55}
56
57static char *do_ioctl_get_ifname(int idx)
58{
59    struct ifreq ifr;
60    int fd;
61    int err;
62
63    ifr.ifr_ifindex = idx;
64    fd = xsocket(AF_INET, SOCK_DGRAM, 0);
65    err = ioctl_or_warn(fd, SIOCGIFNAME, &ifr);
66    close(fd);
67    return err ? NULL : xstrndup(ifr.ifr_name, sizeof(ifr.ifr_name));
68}
69
70static int do_get_ioctl(const char *basedev, struct ip_tunnel_parm *p)
71{
72    struct ifreq ifr;
73    int fd;
74    int err;
75
76    strncpy(ifr.ifr_name, basedev, sizeof(ifr.ifr_name));
77    ifr.ifr_ifru.ifru_data = (void*)p;
78    fd = xsocket(AF_INET, SOCK_DGRAM, 0);
79    err = ioctl_or_warn(fd, SIOCGETTUNNEL, &ifr);
80    close(fd);
81    return err;
82}
83
84/* Dies on error, otherwise returns 0 */
85static int do_add_ioctl(int cmd, const char *basedev, struct ip_tunnel_parm *p)
86{
87    struct ifreq ifr;
88    int fd;
89
90    if (cmd == SIOCCHGTUNNEL && p->name[0]) {
91        strncpy(ifr.ifr_name, p->name, sizeof(ifr.ifr_name));
92    } else {
93        strncpy(ifr.ifr_name, basedev, sizeof(ifr.ifr_name));
94    }
95    ifr.ifr_ifru.ifru_data = (void*)p;
96    fd = xsocket(AF_INET, SOCK_DGRAM, 0);
97#if ENABLE_IOCTL_HEX2STR_ERROR
98    /* #define magic will turn ioctl# into string */
99    if (cmd == SIOCCHGTUNNEL)
100        xioctl(fd, SIOCCHGTUNNEL, &ifr);
101    else
102        xioctl(fd, SIOCADDTUNNEL, &ifr);
103#else
104    xioctl(fd, cmd, &ifr);
105#endif
106    close(fd);
107    return 0;
108}
109
110/* Dies on error, otherwise returns 0 */
111static int do_del_ioctl(const char *basedev, struct ip_tunnel_parm *p)
112{
113    struct ifreq ifr;
114    int fd;
115
116    if (p->name[0]) {
117        strncpy(ifr.ifr_name, p->name, sizeof(ifr.ifr_name));
118    } else {
119        strncpy(ifr.ifr_name, basedev, sizeof(ifr.ifr_name));
120    }
121    ifr.ifr_ifru.ifru_data = (void*)p;
122    fd = xsocket(AF_INET, SOCK_DGRAM, 0);
123    xioctl(fd, SIOCDELTUNNEL, &ifr);
124    close(fd);
125    return 0;
126}
127
128/* Dies on error */
129static void parse_args(int argc, char **argv, int cmd, struct ip_tunnel_parm *p)
130{
131    static const char keywords[] ALIGN1 =
132        "mode\0""ipip\0""ip/ip\0""gre\0""gre/ip\0""sit\0""ipv6/ip\0"
133        "key\0""ikey\0""okey\0""seq\0""iseq\0""oseq\0"
134        "csum\0""icsum\0""ocsum\0""nopmtudisc\0""pmtudisc\0"
135        "remote\0""any\0""local\0""dev\0"
136        "ttl\0""inherit\0""tos\0""dsfield\0"
137        "name\0";
138    enum {
139        ARG_mode, ARG_ipip, ARG_ip_ip, ARG_gre, ARG_gre_ip, ARG_sit, ARG_ip6_ip,
140        ARG_key, ARG_ikey, ARG_okey, ARG_seq, ARG_iseq, ARG_oseq,
141        ARG_csum, ARG_icsum, ARG_ocsum, ARG_nopmtudisc, ARG_pmtudisc,
142        ARG_remote, ARG_any, ARG_local, ARG_dev,
143        ARG_ttl, ARG_inherit, ARG_tos, ARG_dsfield,
144        ARG_name
145    };
146    int count = 0;
147    char medium[IFNAMSIZ];
148    int key;
149
150    memset(p, 0, sizeof(*p));
151    memset(&medium, 0, sizeof(medium));
152
153    p->iph.version = 4;
154    p->iph.ihl = 5;
155#ifndef IP_DF
156#define IP_DF 0x4000  /* Flag: "Don't Fragment" */
157#endif
158    p->iph.frag_off = htons(IP_DF);
159
160    while (argc > 0) {
161        key = index_in_strings(keywords, *argv);
162        if (key == ARG_mode) {
163            NEXT_ARG();
164            key = index_in_strings(keywords, *argv);
165            if (key == ARG_ipip ||
166                key == ARG_ip_ip) {
167                if (p->iph.protocol && p->iph.protocol != IPPROTO_IPIP) {
168                    bb_error_msg_and_die("you managed to ask for more than one tunnel mode");
169                }
170                p->iph.protocol = IPPROTO_IPIP;
171            } else if (key == ARG_gre ||
172                   key == ARG_gre_ip) {
173                if (p->iph.protocol && p->iph.protocol != IPPROTO_GRE) {
174                    bb_error_msg_and_die("you managed to ask for more than one tunnel mode");
175                }
176                p->iph.protocol = IPPROTO_GRE;
177            } else if (key == ARG_sit ||
178                   key == ARG_ip6_ip) {
179                if (p->iph.protocol && p->iph.protocol != IPPROTO_IPV6) {
180                    bb_error_msg_and_die("you managed to ask for more than one tunnel mode");
181                }
182                p->iph.protocol = IPPROTO_IPV6;
183            } else {
184                bb_error_msg_and_die("cannot guess tunnel mode");
185            }
186        } else if (key == ARG_key) {
187            unsigned uval;
188            NEXT_ARG();
189            p->i_flags |= GRE_KEY;
190            p->o_flags |= GRE_KEY;
191            if (strchr(*argv, '.'))
192                p->i_key = p->o_key = get_addr32(*argv);
193            else {
194                if (get_unsigned(&uval, *argv, 0)<0) {
195                    bb_error_msg_and_die("invalid value of \"key\"");
196                }
197                p->i_key = p->o_key = htonl(uval);
198            }
199        } else if (key == ARG_ikey) {
200            unsigned uval;
201            NEXT_ARG();
202            p->i_flags |= GRE_KEY;
203            if (strchr(*argv, '.'))
204                p->o_key = get_addr32(*argv);
205            else {
206                if (get_unsigned(&uval, *argv, 0)<0) {
207                    bb_error_msg_and_die("invalid value of \"ikey\"");
208                }
209                p->i_key = htonl(uval);
210            }
211        } else if (key == ARG_okey) {
212            unsigned uval;
213            NEXT_ARG();
214            p->o_flags |= GRE_KEY;
215            if (strchr(*argv, '.'))
216                p->o_key = get_addr32(*argv);
217            else {
218                if (get_unsigned(&uval, *argv, 0)<0) {
219                    bb_error_msg_and_die("invalid value of \"okey\"");
220                }
221                p->o_key = htonl(uval);
222            }
223        } else if (key == ARG_seq) {
224            p->i_flags |= GRE_SEQ;
225            p->o_flags |= GRE_SEQ;
226        } else if (key == ARG_iseq) {
227            p->i_flags |= GRE_SEQ;
228        } else if (key == ARG_oseq) {
229            p->o_flags |= GRE_SEQ;
230        } else if (key == ARG_csum) {
231            p->i_flags |= GRE_CSUM;
232            p->o_flags |= GRE_CSUM;
233        } else if (key == ARG_icsum) {
234            p->i_flags |= GRE_CSUM;
235        } else if (key == ARG_ocsum) {
236            p->o_flags |= GRE_CSUM;
237        } else if (key == ARG_nopmtudisc) {
238            p->iph.frag_off = 0;
239        } else if (key == ARG_pmtudisc) {
240            p->iph.frag_off = htons(IP_DF);
241        } else if (key == ARG_remote) {
242            NEXT_ARG();
243            key = index_in_strings(keywords, *argv);
244            if (key == ARG_any)
245                p->iph.daddr = get_addr32(*argv);
246        } else if (key == ARG_local) {
247            NEXT_ARG();
248            key = index_in_strings(keywords, *argv);
249            if (key == ARG_any)
250                p->iph.saddr = get_addr32(*argv);
251        } else if (key == ARG_dev) {
252            NEXT_ARG();
253            strncpy(medium, *argv, IFNAMSIZ-1);
254        } else if (key == ARG_ttl) {
255            unsigned uval;
256            NEXT_ARG();
257            key = index_in_strings(keywords, *argv);
258            if (key != ARG_inherit) {
259                if (get_unsigned(&uval, *argv, 0))
260                    invarg(*argv, "TTL");
261                if (uval > 255)
262                    invarg(*argv, "TTL must be <=255");
263                p->iph.ttl = uval;
264            }
265        } else if (key == ARG_tos ||
266               key == ARG_dsfield) {
267            uint32_t uval;
268            NEXT_ARG();
269            key = index_in_strings(keywords, *argv);
270            if (key != ARG_inherit) {
271                if (rtnl_dsfield_a2n(&uval, *argv))
272                    invarg(*argv, "TOS");
273                p->iph.tos = uval;
274            } else
275                p->iph.tos = 1;
276        } else {
277            if (key == ARG_name) {
278                NEXT_ARG();
279            }
280            if (p->name[0])
281                duparg2("name", *argv);
282            strncpy(p->name, *argv, IFNAMSIZ);
283            if (cmd == SIOCCHGTUNNEL && count == 0) {
284                struct ip_tunnel_parm old_p;
285                memset(&old_p, 0, sizeof(old_p));
286                if (do_get_ioctl(*argv, &old_p))
287                    exit(1);
288                *p = old_p;
289            }
290        }
291        count++;
292        argc--;
293        argv++;
294    }
295
296    if (p->iph.protocol == 0) {
297        if (memcmp(p->name, "gre", 3) == 0)
298            p->iph.protocol = IPPROTO_GRE;
299        else if (memcmp(p->name, "ipip", 4) == 0)
300            p->iph.protocol = IPPROTO_IPIP;
301        else if (memcmp(p->name, "sit", 3) == 0)
302            p->iph.protocol = IPPROTO_IPV6;
303    }
304
305    if (p->iph.protocol == IPPROTO_IPIP || p->iph.protocol == IPPROTO_IPV6) {
306        if ((p->i_flags & GRE_KEY) || (p->o_flags & GRE_KEY)) {
307            bb_error_msg_and_die("keys are not allowed with ipip and sit");
308        }
309    }
310
311    if (medium[0]) {
312        p->link = do_ioctl_get_ifindex(medium);
313    }
314
315    if (p->i_key == 0 && IN_MULTICAST(ntohl(p->iph.daddr))) {
316        p->i_key = p->iph.daddr;
317        p->i_flags |= GRE_KEY;
318    }
319    if (p->o_key == 0 && IN_MULTICAST(ntohl(p->iph.daddr))) {
320        p->o_key = p->iph.daddr;
321        p->o_flags |= GRE_KEY;
322    }
323    if (IN_MULTICAST(ntohl(p->iph.daddr)) && !p->iph.saddr) {
324        bb_error_msg_and_die("broadcast tunnel requires a source address");
325    }
326}
327
328
329/* Return value becomes exitcode. It's okay to not return at all */
330static int do_add(int cmd, int argc, char **argv)
331{
332    struct ip_tunnel_parm p;
333
334    parse_args(argc, argv, cmd, &p);
335
336    if (p.iph.ttl && p.iph.frag_off == 0) {
337        bb_error_msg_and_die("ttl != 0 and noptmudisc are incompatible");
338    }
339
340    switch (p.iph.protocol) {
341    case IPPROTO_IPIP:
342        return do_add_ioctl(cmd, "tunl0", &p);
343    case IPPROTO_GRE:
344        return do_add_ioctl(cmd, "gre0", &p);
345    case IPPROTO_IPV6:
346        return do_add_ioctl(cmd, "sit0", &p);
347    default:
348        bb_error_msg_and_die("cannot determine tunnel mode (ipip, gre or sit)");
349    }
350}
351
352/* Return value becomes exitcode. It's okay to not return at all */
353static int do_del(int argc, char **argv)
354{
355    struct ip_tunnel_parm p;
356
357    parse_args(argc, argv, SIOCDELTUNNEL, &p);
358
359    switch (p.iph.protocol) {
360    case IPPROTO_IPIP:
361        return do_del_ioctl("tunl0", &p);
362    case IPPROTO_GRE:
363        return do_del_ioctl("gre0", &p);
364    case IPPROTO_IPV6:
365        return do_del_ioctl("sit0", &p);
366    default:
367        return do_del_ioctl(p.name, &p);
368    }
369}
370
371static void print_tunnel(struct ip_tunnel_parm *p)
372{
373    char s1[256];
374    char s2[256];
375    char s3[64];
376    char s4[64];
377
378    format_host(AF_INET, 4, &p->iph.daddr, s1, sizeof(s1));
379    format_host(AF_INET, 4, &p->iph.saddr, s2, sizeof(s2));
380    inet_ntop(AF_INET, &p->i_key, s3, sizeof(s3));
381    inet_ntop(AF_INET, &p->o_key, s4, sizeof(s4));
382
383    printf("%s: %s/ip  remote %s  local %s ",
384           p->name,
385           p->iph.protocol == IPPROTO_IPIP ? "ip" :
386           (p->iph.protocol == IPPROTO_GRE ? "gre" :
387        (p->iph.protocol == IPPROTO_IPV6 ? "ipv6" : "unknown")),
388           p->iph.daddr ? s1 : "any", p->iph.saddr ? s2 : "any");
389    if (p->link) {
390        char *n = do_ioctl_get_ifname(p->link);
391        if (n) {
392            printf(" dev %s ", n);
393            free(n);
394        }
395    }
396    if (p->iph.ttl)
397        printf(" ttl %d ", p->iph.ttl);
398    else
399        printf(" ttl inherit ");
400    if (p->iph.tos) {
401        SPRINT_BUF(b1);
402        printf(" tos");
403        if (p->iph.tos & 1)
404            printf(" inherit");
405        if (p->iph.tos & ~1)
406            printf("%c%s ", p->iph.tos & 1 ? '/' : ' ',
407                   rtnl_dsfield_n2a(p->iph.tos & ~1, b1, sizeof(b1)));
408    }
409    if (!(p->iph.frag_off & htons(IP_DF)))
410        printf(" nopmtudisc");
411
412    if ((p->i_flags & GRE_KEY) && (p->o_flags & GRE_KEY) && p->o_key == p->i_key)
413        printf(" key %s", s3);
414    else if ((p->i_flags | p->o_flags) & GRE_KEY) {
415        if (p->i_flags & GRE_KEY)
416            printf(" ikey %s ", s3);
417        if (p->o_flags & GRE_KEY)
418            printf(" okey %s ", s4);
419    }
420
421    if (p->i_flags & GRE_SEQ)
422        printf("%c  Drop packets out of sequence.\n", _SL_);
423    if (p->i_flags & GRE_CSUM)
424        printf("%c  Checksum in received packet is required.", _SL_);
425    if (p->o_flags & GRE_SEQ)
426        printf("%c  Sequence packets on output.", _SL_);
427    if (p->o_flags & GRE_CSUM)
428        printf("%c  Checksum output packets.", _SL_);
429}
430
431static void do_tunnels_list(struct ip_tunnel_parm *p)
432{
433    char name[IFNAMSIZ];
434    unsigned long rx_bytes, rx_packets, rx_errs, rx_drops,
435        rx_fifo, rx_frame,
436        tx_bytes, tx_packets, tx_errs, tx_drops,
437        tx_fifo, tx_colls, tx_carrier, rx_multi;
438    int type;
439    struct ip_tunnel_parm p1;
440    char buf[512];
441    FILE *fp = fopen_or_warn("/proc/net/dev", "r");
442
443    if (fp == NULL) {
444        return;
445    }
446
447    fgets(buf, sizeof(buf), fp);
448    fgets(buf, sizeof(buf), fp);
449
450    while (fgets(buf, sizeof(buf), fp) != NULL) {
451        char *ptr;
452
453        /*buf[sizeof(buf) - 1] = 0; - fgets is safe anyway */
454        ptr = strchr(buf, ':');
455        if (ptr == NULL ||
456            (*ptr++ = 0, sscanf(buf, "%s", name) != 1)) {
457            bb_error_msg("wrong format of /proc/net/dev");
458            return;
459        }
460        if (sscanf(ptr, "%lu%lu%lu%lu%lu%lu%lu%*d%lu%lu%lu%lu%lu%lu%lu",
461               &rx_bytes, &rx_packets, &rx_errs, &rx_drops,
462               &rx_fifo, &rx_frame, &rx_multi,
463               &tx_bytes, &tx_packets, &tx_errs, &tx_drops,
464               &tx_fifo, &tx_colls, &tx_carrier) != 14)
465            continue;
466        if (p->name[0] && strcmp(p->name, name))
467            continue;
468        type = do_ioctl_get_iftype(name);
469        if (type == -1) {
470            bb_error_msg("cannot get type of [%s]", name);
471            continue;
472        }
473        if (type != ARPHRD_TUNNEL && type != ARPHRD_IPGRE && type != ARPHRD_SIT)
474            continue;
475        memset(&p1, 0, sizeof(p1));
476        if (do_get_ioctl(name, &p1))
477            continue;
478        if ((p->link && p1.link != p->link) ||
479            (p->name[0] && strcmp(p1.name, p->name)) ||
480            (p->iph.daddr && p1.iph.daddr != p->iph.daddr) ||
481            (p->iph.saddr && p1.iph.saddr != p->iph.saddr) ||
482            (p->i_key && p1.i_key != p->i_key))
483            continue;
484        print_tunnel(&p1);
485        puts("");
486    }
487}
488
489/* Return value becomes exitcode. It's okay to not return at all */
490static int do_show(int argc, char **argv)
491{
492    int err;
493    struct ip_tunnel_parm p;
494
495    parse_args(argc, argv, SIOCGETTUNNEL, &p);
496
497    switch (p.iph.protocol) {
498    case IPPROTO_IPIP:
499        err = do_get_ioctl(p.name[0] ? p.name : "tunl0", &p);
500        break;
501    case IPPROTO_GRE:
502        err = do_get_ioctl(p.name[0] ? p.name : "gre0", &p);
503        break;
504    case IPPROTO_IPV6:
505        err = do_get_ioctl(p.name[0] ? p.name : "sit0", &p);
506        break;
507    default:
508        do_tunnels_list(&p);
509        return 0;
510    }
511    if (err)
512        return -1;
513
514    print_tunnel(&p);
515    puts("");
516    return 0;
517}
518
519/* Return value becomes exitcode. It's okay to not return at all */
520int do_iptunnel(int argc, char **argv)
521{
522    static const char keywords[] ALIGN1 =
523        "add\0""change\0""delete\0""show\0""list\0""lst\0";
524    enum { ARG_add = 0, ARG_change, ARG_del, ARG_show, ARG_list, ARG_lst };
525    int key;
526
527    if (argc) {
528        key = index_in_substrings(keywords, *argv);
529        if (key < 0)
530            bb_error_msg_and_die(bb_msg_invalid_arg, *argv, applet_name);
531        --argc;
532        ++argv;
533        if (key == ARG_add)
534            return do_add(SIOCADDTUNNEL, argc, argv);
535        if (key == ARG_change)
536            return do_add(SIOCCHGTUNNEL, argc, argv);
537        if (key == ARG_del)
538            return do_del(argc, argv);
539    }
540    return do_show(argc, argv);
541}
Note: See TracBrowser for help on using the repository browser.