Move initial iprule flushing to system_add_iprule() to not collide with generic multi...
[project/netifd.git] / system-linux.c
1 /*
2 * netifd - network interface daemon
3 * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
4 * Copyright (C) 2013 Jo-Philipp Wich <jow@openwrt.org>
5 * Copyright (C) 2013 Steven Barth <steven@midlink.org>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2
9 * as published by the Free Software Foundation
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 */
16 #define _GNU_SOURCE
17
18 #include <sys/socket.h>
19 #include <sys/ioctl.h>
20 #include <sys/stat.h>
21 #include <sys/syscall.h>
22
23 #include <net/if.h>
24 #include <net/if_arp.h>
25
26 #include <arpa/inet.h>
27 #include <netinet/in.h>
28
29 #include <linux/rtnetlink.h>
30 #include <linux/sockios.h>
31 #include <linux/ip.h>
32 #include <linux/if_vlan.h>
33 #include <linux/if_bridge.h>
34 #include <linux/if_tunnel.h>
35 #include <linux/ip6_tunnel.h>
36 #include <linux/ethtool.h>
37 #include <linux/fib_rules.h>
38
39 #include <unistd.h>
40 #include <string.h>
41 #include <fcntl.h>
42 #include <glob.h>
43 #include <time.h>
44
45 #include <netlink/msg.h>
46 #include <netlink/attr.h>
47 #include <netlink/socket.h>
48 #include <libubox/uloop.h>
49
50 #include "netifd.h"
51 #include "device.h"
52 #include "system.h"
53
54 struct event_socket {
55 struct uloop_fd uloop;
56 struct nl_sock *sock;
57 struct nl_cb *cb;
58 };
59
60 static int sock_ioctl = -1;
61 static struct nl_sock *sock_rtnl = NULL;
62
63 static int cb_rtnl_event(struct nl_msg *msg, void *arg);
64 static void handle_hotplug_event(struct uloop_fd *u, unsigned int events);
65
66 static char dev_buf[256];
67
68 static bool iprules_flushed = false;
69
70 static void
71 handler_nl_event(struct uloop_fd *u, unsigned int events)
72 {
73 struct event_socket *ev = container_of(u, struct event_socket, uloop);
74 nl_recvmsgs(ev->sock, ev->cb);
75 }
76
77 static struct nl_sock *
78 create_socket(int protocol, int groups)
79 {
80 struct nl_sock *sock;
81
82 sock = nl_socket_alloc();
83 if (!sock)
84 return NULL;
85
86 if (groups)
87 nl_join_groups(sock, groups);
88
89 if (nl_connect(sock, protocol))
90 return NULL;
91
92 return sock;
93 }
94
95 static bool
96 create_raw_event_socket(struct event_socket *ev, int protocol, int groups,
97 uloop_fd_handler cb)
98 {
99 ev->sock = create_socket(protocol, groups);
100 if (!ev->sock)
101 return false;
102
103 ev->uloop.fd = nl_socket_get_fd(ev->sock);
104 ev->uloop.cb = cb;
105 uloop_fd_add(&ev->uloop, ULOOP_READ | ULOOP_EDGE_TRIGGER);
106 return true;
107 }
108
109 static bool
110 create_event_socket(struct event_socket *ev, int protocol,
111 int (*cb)(struct nl_msg *msg, void *arg))
112 {
113 // Prepare socket for link events
114 ev->cb = nl_cb_alloc(NL_CB_DEFAULT);
115 if (!ev->cb)
116 return false;
117
118 nl_cb_set(ev->cb, NL_CB_VALID, NL_CB_CUSTOM, cb, NULL);
119
120 return create_raw_event_socket(ev, protocol, 0, handler_nl_event);
121 }
122
123 int system_init(void)
124 {
125 static struct event_socket rtnl_event;
126 static struct event_socket hotplug_event;
127
128 sock_ioctl = socket(AF_LOCAL, SOCK_DGRAM, 0);
129 fcntl(sock_ioctl, F_SETFD, fcntl(sock_ioctl, F_GETFD) | FD_CLOEXEC);
130
131 // Prepare socket for routing / address control
132 sock_rtnl = create_socket(NETLINK_ROUTE, 0);
133 if (!sock_rtnl)
134 return -1;
135
136 if (!create_event_socket(&rtnl_event, NETLINK_ROUTE, cb_rtnl_event))
137 return -1;
138
139 if (!create_raw_event_socket(&hotplug_event, NETLINK_KOBJECT_UEVENT, 1,
140 handle_hotplug_event))
141 return -1;
142
143 // Receive network link events form kernel
144 nl_socket_add_membership(rtnl_event.sock, RTNLGRP_LINK);
145
146 return 0;
147 }
148
149 static void system_set_sysctl(const char *path, const char *val)
150 {
151 int fd;
152
153 fd = open(path, O_WRONLY);
154 if (fd < 0)
155 return;
156
157 write(fd, val, strlen(val));
158 close(fd);
159 }
160
161 static void system_set_dev_sysctl(const char *path, const char *device, const char *val)
162 {
163 snprintf(dev_buf, sizeof(dev_buf), path, device);
164 system_set_sysctl(dev_buf, val);
165 }
166
167 static void system_set_disable_ipv6(struct device *dev, const char *val)
168 {
169 system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/disable_ipv6", dev->ifname, val);
170 }
171
172 // Evaluate netlink messages
173 static int cb_rtnl_event(struct nl_msg *msg, void *arg)
174 {
175 struct nlmsghdr *nh = nlmsg_hdr(msg);
176 struct ifinfomsg *ifi = NLMSG_DATA(nh);
177 struct nlattr *nla[__IFLA_MAX];
178
179 if (nh->nlmsg_type != RTM_DELLINK && nh->nlmsg_type != RTM_NEWLINK)
180 goto out;
181
182 nlmsg_parse(nh, sizeof(*ifi), nla, __IFLA_MAX - 1, NULL);
183 if (!nla[IFLA_IFNAME])
184 goto out;
185
186 struct device *dev = device_get(RTA_DATA(nla[IFLA_IFNAME]), false);
187 if (!dev)
188 goto out;
189
190 dev->ifindex = ifi->ifi_index;
191 /* TODO: parse link status */
192
193 out:
194 return 0;
195 }
196
197 static void
198 handle_hotplug_msg(char *data, int size)
199 {
200 const char *subsystem = NULL, *interface = NULL;
201 char *cur, *end, *sep;
202 struct device *dev;
203 int skip;
204 bool add;
205
206 if (!strncmp(data, "add@", 4))
207 add = true;
208 else if (!strncmp(data, "remove@", 7))
209 add = false;
210 else
211 return;
212
213 skip = strlen(data) + 1;
214 end = data + size;
215
216 for (cur = data + skip; cur < end; cur += skip) {
217 skip = strlen(cur) + 1;
218
219 sep = strchr(cur, '=');
220 if (!sep)
221 continue;
222
223 *sep = 0;
224 if (!strcmp(cur, "INTERFACE"))
225 interface = sep + 1;
226 else if (!strcmp(cur, "SUBSYSTEM")) {
227 subsystem = sep + 1;
228 if (strcmp(subsystem, "net") != 0)
229 return;
230 }
231 if (subsystem && interface)
232 goto found;
233 }
234 return;
235
236 found:
237 dev = device_get(interface, false);
238 if (!dev)
239 return;
240
241 if (dev->type != &simple_device_type)
242 return;
243
244 if (add && system_if_force_external(dev->ifname))
245 return;
246
247 device_set_present(dev, add);
248 }
249
250 static void
251 handle_hotplug_event(struct uloop_fd *u, unsigned int events)
252 {
253 struct event_socket *ev = container_of(u, struct event_socket, uloop);
254 struct sockaddr_nl nla;
255 unsigned char *buf = NULL;
256 int size;
257
258 while ((size = nl_recv(ev->sock, &nla, &buf, NULL)) > 0) {
259 if (nla.nl_pid == 0)
260 handle_hotplug_msg((char *) buf, size);
261
262 free(buf);
263 }
264 }
265
266 static int system_rtnl_call(struct nl_msg *msg)
267 {
268 int ret;
269
270 ret = nl_send_auto_complete(sock_rtnl, msg);
271 nlmsg_free(msg);
272
273 if (ret < 0)
274 return ret;
275
276 return nl_wait_for_ack(sock_rtnl);
277 }
278
279 int system_bridge_delbr(struct device *bridge)
280 {
281 return ioctl(sock_ioctl, SIOCBRDELBR, bridge->ifname);
282 }
283
284 static int system_bridge_if(const char *bridge, struct device *dev, int cmd, void *data)
285 {
286 struct ifreq ifr;
287
288 memset(&ifr, 0, sizeof(ifr));
289 if (dev)
290 ifr.ifr_ifindex = dev->ifindex;
291 else
292 ifr.ifr_data = data;
293 strncpy(ifr.ifr_name, bridge, sizeof(ifr.ifr_name));
294 return ioctl(sock_ioctl, cmd, &ifr);
295 }
296
297 static bool system_is_bridge(const char *name, char *buf, int buflen)
298 {
299 struct stat st;
300
301 snprintf(buf, buflen, "/sys/devices/virtual/net/%s/bridge", name);
302 if (stat(buf, &st) < 0)
303 return false;
304
305 return true;
306 }
307
308 static char *system_get_bridge(const char *name, char *buf, int buflen)
309 {
310 char *path;
311 ssize_t len;
312 glob_t gl;
313
314 snprintf(buf, buflen, "/sys/devices/virtual/net/*/brif/%s/bridge", name);
315 if (glob(buf, GLOB_NOSORT, NULL, &gl) < 0)
316 return NULL;
317
318 if (gl.gl_pathc == 0)
319 return NULL;
320
321 len = readlink(gl.gl_pathv[0], buf, buflen);
322 if (len < 0)
323 return NULL;
324
325 buf[len] = 0;
326 path = strrchr(buf, '/');
327 if (!path)
328 return NULL;
329
330 return path + 1;
331 }
332
333 int system_bridge_addif(struct device *bridge, struct device *dev)
334 {
335 char *oldbr;
336
337 system_set_disable_ipv6(dev, "1");
338 oldbr = system_get_bridge(dev->ifname, dev_buf, sizeof(dev_buf));
339 if (oldbr && !strcmp(oldbr, bridge->ifname))
340 return 0;
341
342 return system_bridge_if(bridge->ifname, dev, SIOCBRADDIF, NULL);
343 }
344
345 int system_bridge_delif(struct device *bridge, struct device *dev)
346 {
347 system_set_disable_ipv6(dev, "0");
348 return system_bridge_if(bridge->ifname, dev, SIOCBRDELIF, NULL);
349 }
350
351 static int system_if_resolve(struct device *dev)
352 {
353 struct ifreq ifr;
354 strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name));
355 if (!ioctl(sock_ioctl, SIOCGIFINDEX, &ifr))
356 return ifr.ifr_ifindex;
357 else
358 return 0;
359 }
360
361 static int system_if_flags(const char *ifname, unsigned add, unsigned rem)
362 {
363 struct ifreq ifr;
364
365 memset(&ifr, 0, sizeof(ifr));
366 strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
367 ioctl(sock_ioctl, SIOCGIFFLAGS, &ifr);
368 ifr.ifr_flags |= add;
369 ifr.ifr_flags &= ~rem;
370 return ioctl(sock_ioctl, SIOCSIFFLAGS, &ifr);
371 }
372
373 struct clear_data {
374 struct nl_msg *msg;
375 struct device *dev;
376 int type;
377 int size;
378 int af;
379 };
380
381
382 static bool check_ifaddr(struct nlmsghdr *hdr, int ifindex)
383 {
384 struct ifaddrmsg *ifa = NLMSG_DATA(hdr);
385
386 return ifa->ifa_index == ifindex;
387 }
388
389 static bool check_route(struct nlmsghdr *hdr, int ifindex)
390 {
391 struct rtmsg *r = NLMSG_DATA(hdr);
392 struct nlattr *tb[__RTA_MAX];
393
394 if (r->rtm_protocol == RTPROT_KERNEL &&
395 r->rtm_family == AF_INET6)
396 return false;
397
398 nlmsg_parse(hdr, sizeof(struct rtmsg), tb, __RTA_MAX - 1, NULL);
399 if (!tb[RTA_OIF])
400 return false;
401
402 return *(int *)RTA_DATA(tb[RTA_OIF]) == ifindex;
403 }
404
405 static bool check_rule(struct nlmsghdr *hdr, int ifindex)
406 {
407 return true;
408 }
409
410 static int cb_clear_event(struct nl_msg *msg, void *arg)
411 {
412 struct clear_data *clr = arg;
413 struct nlmsghdr *hdr = nlmsg_hdr(msg);
414 bool (*cb)(struct nlmsghdr *, int ifindex);
415 int type;
416
417 switch(clr->type) {
418 case RTM_GETADDR:
419 type = RTM_DELADDR;
420 if (hdr->nlmsg_type != RTM_NEWADDR)
421 return NL_SKIP;
422
423 cb = check_ifaddr;
424 break;
425 case RTM_GETROUTE:
426 type = RTM_DELROUTE;
427 if (hdr->nlmsg_type != RTM_NEWROUTE)
428 return NL_SKIP;
429
430 cb = check_route;
431 break;
432 case RTM_GETRULE:
433 type = RTM_DELRULE;
434 if (hdr->nlmsg_type != RTM_NEWRULE)
435 return NL_SKIP;
436
437 cb = check_rule;
438 break;
439 default:
440 return NL_SKIP;
441 }
442
443 if (!cb(hdr, clr->dev ? clr->dev->ifindex : 0))
444 return NL_SKIP;
445
446 if (type == RTM_DELRULE)
447 D(SYSTEM, "Remove a rule\n");
448 else
449 D(SYSTEM, "Remove %s from device %s\n",
450 type == RTM_DELADDR ? "an address" : "a route",
451 clr->dev->ifname);
452 memcpy(nlmsg_hdr(clr->msg), hdr, hdr->nlmsg_len);
453 hdr = nlmsg_hdr(clr->msg);
454 hdr->nlmsg_type = type;
455 hdr->nlmsg_flags = NLM_F_REQUEST;
456
457 if (!nl_send_auto_complete(sock_rtnl, clr->msg))
458 nl_wait_for_ack(sock_rtnl);
459
460 return NL_SKIP;
461 }
462
463 static int
464 cb_finish_event(struct nl_msg *msg, void *arg)
465 {
466 int *pending = arg;
467 *pending = 0;
468 return NL_STOP;
469 }
470
471 static int
472 error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err, void *arg)
473 {
474 int *pending = arg;
475 *pending = err->error;
476 return NL_STOP;
477 }
478
479 static void
480 system_if_clear_entries(struct device *dev, int type, int af)
481 {
482 struct clear_data clr;
483 struct nl_cb *cb = nl_cb_alloc(NL_CB_DEFAULT);
484 struct rtmsg rtm = {
485 .rtm_family = af,
486 .rtm_flags = RTM_F_CLONED,
487 };
488 int flags = NLM_F_DUMP;
489 int pending = 1;
490
491 clr.af = af;
492 clr.dev = dev;
493 clr.type = type;
494 switch (type) {
495 case RTM_GETADDR:
496 case RTM_GETRULE:
497 clr.size = sizeof(struct rtgenmsg);
498 break;
499 case RTM_GETROUTE:
500 clr.size = sizeof(struct rtmsg);
501 break;
502 default:
503 return;
504 }
505
506 if (!cb)
507 return;
508
509 clr.msg = nlmsg_alloc_simple(type, flags);
510 if (!clr.msg)
511 goto out;
512
513 nlmsg_append(clr.msg, &rtm, clr.size, 0);
514 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, cb_clear_event, &clr);
515 nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, cb_finish_event, &pending);
516 nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &pending);
517
518 nl_send_auto_complete(sock_rtnl, clr.msg);
519 while (pending > 0)
520 nl_recvmsgs(sock_rtnl, cb);
521
522 nlmsg_free(clr.msg);
523 out:
524 nl_cb_put(cb);
525 }
526
527 /*
528 * Clear bridge (membership) state and bring down device
529 */
530 void system_if_clear_state(struct device *dev)
531 {
532 static char buf[256];
533 char *bridge;
534
535 if (dev->external)
536 return;
537
538 dev->ifindex = system_if_resolve(dev);
539 if (!dev->ifindex)
540 return;
541
542 system_if_flags(dev->ifname, 0, IFF_UP);
543
544 if (system_is_bridge(dev->ifname, buf, sizeof(buf))) {
545 D(SYSTEM, "Delete existing bridge named '%s'\n", dev->ifname);
546 system_bridge_delbr(dev);
547 return;
548 }
549
550 bridge = system_get_bridge(dev->ifname, buf, sizeof(buf));
551 if (bridge) {
552 D(SYSTEM, "Remove device '%s' from bridge '%s'\n", dev->ifname, bridge);
553 system_bridge_if(bridge, dev, SIOCBRDELIF, NULL);
554 }
555
556 system_if_clear_entries(dev, RTM_GETROUTE, AF_INET);
557 system_if_clear_entries(dev, RTM_GETADDR, AF_INET);
558 system_if_clear_entries(dev, RTM_GETROUTE, AF_INET6);
559 system_if_clear_entries(dev, RTM_GETADDR, AF_INET6);
560 system_set_disable_ipv6(dev, "0");
561 }
562
563 static inline unsigned long
564 sec_to_jiffies(int val)
565 {
566 return (unsigned long) val * 100;
567 }
568
569 int system_bridge_addbr(struct device *bridge, struct bridge_config *cfg)
570 {
571 unsigned long args[4] = {};
572
573 if (ioctl(sock_ioctl, SIOCBRADDBR, bridge->ifname) < 0)
574 return -1;
575
576 args[0] = BRCTL_SET_BRIDGE_STP_STATE;
577 args[1] = !!cfg->stp;
578 system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
579
580 args[0] = BRCTL_SET_BRIDGE_FORWARD_DELAY;
581 args[1] = sec_to_jiffies(cfg->forward_delay);
582 system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
583
584 system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_snooping",
585 bridge->ifname, cfg->igmp_snoop ? "1" : "0");
586
587 args[0] = BRCTL_SET_BRIDGE_PRIORITY;
588 args[1] = cfg->priority;
589 system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
590
591 if (cfg->flags & BRIDGE_OPT_AGEING_TIME) {
592 args[0] = BRCTL_SET_AGEING_TIME;
593 args[1] = sec_to_jiffies(cfg->ageing_time);
594 system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
595 }
596
597 if (cfg->flags & BRIDGE_OPT_HELLO_TIME) {
598 args[0] = BRCTL_SET_BRIDGE_HELLO_TIME;
599 args[1] = sec_to_jiffies(cfg->hello_time);
600 system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
601 }
602
603 if (cfg->flags & BRIDGE_OPT_MAX_AGE) {
604 args[0] = BRCTL_SET_BRIDGE_MAX_AGE;
605 args[1] = sec_to_jiffies(cfg->max_age);
606 system_bridge_if(bridge->ifname, NULL, SIOCDEVPRIVATE, &args);
607 }
608
609 return 0;
610 }
611
612 static int system_vlan(struct device *dev, int id)
613 {
614 struct vlan_ioctl_args ifr = {
615 .cmd = SET_VLAN_NAME_TYPE_CMD,
616 .u.name_type = VLAN_NAME_TYPE_RAW_PLUS_VID_NO_PAD,
617 };
618
619 ioctl(sock_ioctl, SIOCSIFVLAN, &ifr);
620
621 if (id < 0) {
622 ifr.cmd = DEL_VLAN_CMD;
623 ifr.u.VID = 0;
624 } else {
625 ifr.cmd = ADD_VLAN_CMD;
626 ifr.u.VID = id;
627 }
628 strncpy(ifr.device1, dev->ifname, sizeof(ifr.device1));
629 return ioctl(sock_ioctl, SIOCSIFVLAN, &ifr);
630 }
631
632 int system_vlan_add(struct device *dev, int id)
633 {
634 return system_vlan(dev, id);
635 }
636
637 int system_vlan_del(struct device *dev)
638 {
639 return system_vlan(dev, -1);
640 }
641
642 static void
643 system_if_get_settings(struct device *dev, struct device_settings *s)
644 {
645 struct ifreq ifr;
646
647 memset(&ifr, 0, sizeof(ifr));
648 strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name));
649
650 if (ioctl(sock_ioctl, SIOCGIFMTU, &ifr) == 0) {
651 s->mtu = ifr.ifr_mtu;
652 s->flags |= DEV_OPT_MTU;
653 }
654
655 if (ioctl(sock_ioctl, SIOCGIFTXQLEN, &ifr) == 0) {
656 s->txqueuelen = ifr.ifr_qlen;
657 s->flags |= DEV_OPT_TXQUEUELEN;
658 }
659
660 if (ioctl(sock_ioctl, SIOCGIFHWADDR, &ifr) == 0) {
661 memcpy(s->macaddr, &ifr.ifr_hwaddr.sa_data, sizeof(s->macaddr));
662 s->flags |= DEV_OPT_MACADDR;
663 }
664 }
665
666 void
667 system_if_apply_settings(struct device *dev, struct device_settings *s)
668 {
669 struct ifreq ifr;
670
671 memset(&ifr, 0, sizeof(ifr));
672 strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name));
673 if (s->flags & DEV_OPT_MTU) {
674 ifr.ifr_mtu = s->mtu;
675 if (ioctl(sock_ioctl, SIOCSIFMTU, &ifr) < 0)
676 s->flags &= ~DEV_OPT_MTU;
677 }
678 if (s->flags & DEV_OPT_TXQUEUELEN) {
679 ifr.ifr_qlen = s->txqueuelen;
680 if (ioctl(sock_ioctl, SIOCSIFTXQLEN, &ifr) < 0)
681 s->flags &= ~DEV_OPT_TXQUEUELEN;
682 }
683 if ((s->flags & DEV_OPT_MACADDR) && !dev->external) {
684 ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
685 memcpy(&ifr.ifr_hwaddr.sa_data, s->macaddr, sizeof(s->macaddr));
686 if (ioctl(sock_ioctl, SIOCSIFHWADDR, &ifr) < 0)
687 s->flags &= ~DEV_OPT_MACADDR;
688 }
689 }
690
691 int system_if_up(struct device *dev)
692 {
693 system_if_get_settings(dev, &dev->orig_settings);
694 system_if_apply_settings(dev, &dev->settings);
695 dev->ifindex = system_if_resolve(dev);
696 return system_if_flags(dev->ifname, IFF_UP, 0);
697 }
698
699 int system_if_down(struct device *dev)
700 {
701 int ret = system_if_flags(dev->ifname, 0, IFF_UP);
702 dev->orig_settings.flags &= dev->settings.flags;
703 system_if_apply_settings(dev, &dev->orig_settings);
704 return ret;
705 }
706
707 int system_if_check(struct device *dev)
708 {
709 device_set_present(dev, (system_if_resolve(dev) > 0));
710 return 0;
711 }
712
713 struct device *
714 system_if_get_parent(struct device *dev)
715 {
716 char buf[64], *devname;
717 int ifindex, iflink, len;
718 FILE *f;
719
720 snprintf(buf, sizeof(buf), "/sys/class/net/%s/iflink", dev->ifname);
721 f = fopen(buf, "r");
722 if (!f)
723 return NULL;
724
725 len = fread(buf, 1, sizeof(buf) - 1, f);
726 fclose(f);
727
728 if (len <= 0)
729 return NULL;
730
731 buf[len] = 0;
732 iflink = strtoul(buf, NULL, 0);
733 ifindex = system_if_resolve(dev);
734 if (!iflink || iflink == ifindex)
735 return NULL;
736
737 devname = if_indextoname(iflink, buf);
738 if (!devname)
739 return NULL;
740
741 return device_get(devname, true);
742 }
743
744 static bool
745 read_string_file(int dir_fd, const char *file, char *buf, int len)
746 {
747 bool ret = false;
748 char *c;
749 int fd;
750
751 fd = openat(dir_fd, file, O_RDONLY);
752 if (fd < 0)
753 return false;
754
755 retry:
756 len = read(fd, buf, len - 1);
757 if (len < 0) {
758 if (errno == EINTR)
759 goto retry;
760 } else if (len > 0) {
761 buf[len] = 0;
762
763 c = strchr(buf, '\n');
764 if (c)
765 *c = 0;
766
767 ret = true;
768 }
769
770 close(fd);
771
772 return ret;
773 }
774
775 static bool
776 read_uint64_file(int dir_fd, const char *file, uint64_t *val)
777 {
778 char buf[64];
779 bool ret = false;
780
781 ret = read_string_file(dir_fd, file, buf, sizeof(buf));
782 if (ret)
783 *val = strtoull(buf, NULL, 0);
784
785 return ret;
786 }
787
788 /* Assume advertised flags == supported flags */
789 static const struct {
790 uint32_t mask;
791 const char *name;
792 } ethtool_link_modes[] = {
793 { ADVERTISED_10baseT_Half, "10H" },
794 { ADVERTISED_10baseT_Full, "10F" },
795 { ADVERTISED_100baseT_Half, "100H" },
796 { ADVERTISED_100baseT_Full, "100F" },
797 { ADVERTISED_1000baseT_Half, "1000H" },
798 { ADVERTISED_1000baseT_Full, "1000F" },
799 };
800
801 static void system_add_link_modes(struct blob_buf *b, __u32 mask)
802 {
803 int i;
804 for (i = 0; i < ARRAY_SIZE(ethtool_link_modes); i++) {
805 if (mask & ethtool_link_modes[i].mask)
806 blobmsg_add_string(b, NULL, ethtool_link_modes[i].name);
807 }
808 }
809
810 bool
811 system_if_force_external(const char *ifname)
812 {
813 char buf[64];
814 struct stat s;
815
816 snprintf(buf, sizeof(buf), "/sys/class/net/%s/phy80211", ifname);
817 return stat(buf, &s) == 0;
818 }
819
820 int
821 system_if_dump_info(struct device *dev, struct blob_buf *b)
822 {
823 struct ethtool_cmd ecmd;
824 struct ifreq ifr;
825 char buf[64], *s;
826 void *c;
827 int dir_fd;
828 uint64_t val = 0;
829
830 snprintf(buf, sizeof(buf), "/sys/class/net/%s", dev->ifname);
831 dir_fd = open(buf, O_DIRECTORY);
832
833 if (read_uint64_file(dir_fd, "carrier", &val))
834 blobmsg_add_u8(b, "link", !!val);
835
836 memset(&ecmd, 0, sizeof(ecmd));
837 memset(&ifr, 0, sizeof(ifr));
838 strcpy(ifr.ifr_name, dev->ifname);
839 ifr.ifr_data = (caddr_t) &ecmd;
840 ecmd.cmd = ETHTOOL_GSET;
841
842 if (ioctl(sock_ioctl, SIOCETHTOOL, &ifr) == 0) {
843 c = blobmsg_open_array(b, "link-advertising");
844 system_add_link_modes(b, ecmd.advertising);
845 blobmsg_close_array(b, c);
846
847 c = blobmsg_open_array(b, "link-supported");
848 system_add_link_modes(b, ecmd.supported);
849 blobmsg_close_array(b, c);
850
851 s = blobmsg_alloc_string_buffer(b, "speed", 8);
852 snprintf(s, 8, "%d%c", ethtool_cmd_speed(&ecmd),
853 ecmd.duplex == DUPLEX_HALF ? 'H' : 'F');
854 blobmsg_add_string_buffer(b);
855 }
856
857 close(dir_fd);
858 return 0;
859 }
860
861 int
862 system_if_dump_stats(struct device *dev, struct blob_buf *b)
863 {
864 const char *const counters[] = {
865 "collisions", "rx_frame_errors", "tx_compressed",
866 "multicast", "rx_length_errors", "tx_dropped",
867 "rx_bytes", "rx_missed_errors", "tx_errors",
868 "rx_compressed", "rx_over_errors", "tx_fifo_errors",
869 "rx_crc_errors", "rx_packets", "tx_heartbeat_errors",
870 "rx_dropped", "tx_aborted_errors", "tx_packets",
871 "rx_errors", "tx_bytes", "tx_window_errors",
872 "rx_fifo_errors", "tx_carrier_errors",
873 };
874 char buf[64];
875 int stats_dir;
876 int i;
877 uint64_t val = 0;
878
879 snprintf(buf, sizeof(buf), "/sys/class/net/%s/statistics", dev->ifname);
880 stats_dir = open(buf, O_DIRECTORY);
881 if (stats_dir < 0)
882 return -1;
883
884 for (i = 0; i < ARRAY_SIZE(counters); i++)
885 if (read_uint64_file(stats_dir, counters[i], &val))
886 blobmsg_add_u64(b, counters[i], val);
887
888 close(stats_dir);
889 return 0;
890 }
891
892 static int system_addr(struct device *dev, struct device_addr *addr, int cmd)
893 {
894 bool v4 = ((addr->flags & DEVADDR_FAMILY) == DEVADDR_INET4);
895 int alen = v4 ? 4 : 16;
896 unsigned int flags = 0;
897 struct ifaddrmsg ifa = {
898 .ifa_family = (alen == 4) ? AF_INET : AF_INET6,
899 .ifa_prefixlen = addr->mask,
900 .ifa_index = dev->ifindex,
901 };
902
903 struct nl_msg *msg;
904 if (cmd == RTM_NEWADDR)
905 flags |= NLM_F_CREATE | NLM_F_REPLACE;
906
907 msg = nlmsg_alloc_simple(cmd, flags);
908 if (!msg)
909 return -1;
910
911 nlmsg_append(msg, &ifa, sizeof(ifa), 0);
912 nla_put(msg, IFA_LOCAL, alen, &addr->addr);
913 if (v4) {
914 if (addr->broadcast)
915 nla_put_u32(msg, IFA_BROADCAST, addr->broadcast);
916 if (addr->point_to_point)
917 nla_put_u32(msg, IFA_ADDRESS, addr->point_to_point);
918 } else {
919 time_t now = system_get_rtime();
920 struct ifa_cacheinfo cinfo = {0xffffffffU, 0xffffffffU, 0, 0};
921
922 if (addr->preferred_until) {
923 int preferred = addr->preferred_until - now;
924 if (preferred < 0)
925 preferred = 0;
926
927 cinfo.ifa_prefered = preferred;
928 }
929
930 if (addr->valid_until) {
931 int valid = addr->valid_until - now;
932 if (valid <= 0)
933 return -1;
934
935 cinfo.ifa_valid = valid;
936 }
937
938 nla_put(msg, IFA_CACHEINFO, sizeof(cinfo), &cinfo);
939 }
940
941 return system_rtnl_call(msg);
942 }
943
944 int system_add_address(struct device *dev, struct device_addr *addr)
945 {
946 return system_addr(dev, addr, RTM_NEWADDR);
947 }
948
949 int system_del_address(struct device *dev, struct device_addr *addr)
950 {
951 return system_addr(dev, addr, RTM_DELADDR);
952 }
953
954 static int system_rt(struct device *dev, struct device_route *route, int cmd)
955 {
956 int alen = ((route->flags & DEVADDR_FAMILY) == DEVADDR_INET4) ? 4 : 16;
957 bool have_gw;
958 unsigned int flags = 0;
959
960 if (alen == 4)
961 have_gw = !!route->nexthop.in.s_addr;
962 else
963 have_gw = route->nexthop.in6.s6_addr32[0] ||
964 route->nexthop.in6.s6_addr32[1] ||
965 route->nexthop.in6.s6_addr32[2] ||
966 route->nexthop.in6.s6_addr32[3];
967
968 unsigned char scope = (cmd == RTM_DELROUTE) ? RT_SCOPE_NOWHERE :
969 (have_gw) ? RT_SCOPE_UNIVERSE : RT_SCOPE_LINK;
970
971 unsigned int table = (route->flags & (DEVROUTE_TABLE | DEVROUTE_SRCTABLE))
972 ? route->table : RT_TABLE_MAIN;
973
974 struct rtmsg rtm = {
975 .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
976 .rtm_dst_len = route->mask,
977 .rtm_table = (table < 256) ? table : RT_TABLE_UNSPEC,
978 .rtm_protocol = (route->flags & DEVADDR_KERNEL) ? RTPROT_KERNEL : RTPROT_STATIC,
979 .rtm_scope = scope,
980 .rtm_type = (cmd == RTM_DELROUTE) ? 0: RTN_UNICAST,
981 };
982 struct nl_msg *msg;
983
984 if (cmd == RTM_NEWROUTE) {
985 flags |= NLM_F_CREATE | NLM_F_REPLACE;
986
987 if (!dev) { // Add null-route
988 rtm.rtm_scope = RT_SCOPE_UNIVERSE;
989 rtm.rtm_type = RTN_UNREACHABLE;
990 }
991 }
992
993 msg = nlmsg_alloc_simple(cmd, flags);
994 if (!msg)
995 return -1;
996
997 nlmsg_append(msg, &rtm, sizeof(rtm), 0);
998
999 if (route->mask)
1000 nla_put(msg, RTA_DST, alen, &route->addr);
1001
1002 if (route->metric > 0)
1003 nla_put_u32(msg, RTA_PRIORITY, route->metric);
1004
1005 if (have_gw)
1006 nla_put(msg, RTA_GATEWAY, alen, &route->nexthop);
1007
1008 if (dev)
1009 nla_put_u32(msg, RTA_OIF, dev->ifindex);
1010
1011 if (table >= 256)
1012 nla_put_u32(msg, RTA_TABLE, table);
1013
1014 return system_rtnl_call(msg);
1015 }
1016
1017 int system_add_route(struct device *dev, struct device_route *route)
1018 {
1019 return system_rt(dev, route, RTM_NEWROUTE);
1020 }
1021
1022 int system_del_route(struct device *dev, struct device_route *route)
1023 {
1024 return system_rt(dev, route, RTM_DELROUTE);
1025 }
1026
1027 int system_flush_routes(void)
1028 {
1029 const char *names[] = {
1030 "/proc/sys/net/ipv4/route/flush",
1031 "/proc/sys/net/ipv6/route/flush"
1032 };
1033 int fd, i;
1034
1035 for (i = 0; i < ARRAY_SIZE(names); i++) {
1036 fd = open(names[i], O_WRONLY);
1037 if (fd < 0)
1038 continue;
1039
1040 write(fd, "-1", 2);
1041 close(fd);
1042 }
1043 return 0;
1044 }
1045
1046 bool system_resolve_rt_table(const char *name, unsigned int *id)
1047 {
1048 FILE *f;
1049 char *e, buf[128];
1050 unsigned int n, table = RT_TABLE_UNSPEC;
1051
1052 /* first try to parse table as number */
1053 if ((n = strtoul(name, &e, 0)) > 0 && !*e)
1054 table = n;
1055
1056 /* handle well known aliases */
1057 else if (!strcmp(name, "default"))
1058 table = RT_TABLE_DEFAULT;
1059 else if (!strcmp(name, "main"))
1060 table = RT_TABLE_MAIN;
1061 else if (!strcmp(name, "local"))
1062 table = RT_TABLE_LOCAL;
1063
1064 /* try to look up name in /etc/iproute2/rt_tables */
1065 else if ((f = fopen("/etc/iproute2/rt_tables", "r")) != NULL)
1066 {
1067 while (fgets(buf, sizeof(buf) - 1, f) != NULL)
1068 {
1069 if ((e = strtok(buf, " \t\n")) == NULL || *e == '#')
1070 continue;
1071
1072 n = strtoul(e, NULL, 10);
1073 e = strtok(NULL, " \t\n");
1074
1075 if (e && !strcmp(e, name))
1076 {
1077 table = n;
1078 break;
1079 }
1080 }
1081
1082 fclose(f);
1083 }
1084
1085 if (table == RT_TABLE_UNSPEC)
1086 return false;
1087
1088 /* do not consider main table special */
1089 if (table == RT_TABLE_MAIN)
1090 table = RT_TABLE_UNSPEC;
1091
1092 *id = table;
1093 return true;
1094 }
1095
1096 static int system_iprule(struct iprule *rule, int cmd)
1097 {
1098 int alen = ((rule->flags & IPRULE_FAMILY) == IPRULE_INET4) ? 4 : 16;
1099
1100 struct nl_msg *msg;
1101 struct rtmsg rtm = {
1102 .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
1103 .rtm_protocol = RTPROT_STATIC,
1104 .rtm_scope = RT_SCOPE_UNIVERSE,
1105 .rtm_table = RT_TABLE_UNSPEC,
1106 .rtm_type = RTN_UNSPEC,
1107 .rtm_flags = 0,
1108 };
1109
1110 if (cmd == RTM_NEWRULE) {
1111 rtm.rtm_type = RTN_UNICAST;
1112 rtm.rtm_flags |= NLM_F_REPLACE | NLM_F_EXCL;
1113 }
1114
1115 if (rule->invert)
1116 rtm.rtm_flags |= FIB_RULE_INVERT;
1117
1118 if (rule->flags & IPRULE_SRC)
1119 rtm.rtm_src_len = rule->src_mask;
1120
1121 if (rule->flags & IPRULE_DEST)
1122 rtm.rtm_dst_len = rule->dest_mask;
1123
1124 if (rule->flags & IPRULE_TOS)
1125 rtm.rtm_tos = rule->tos;
1126
1127 if (rule->flags & IPRULE_LOOKUP) {
1128 if (rule->lookup < 256)
1129 rtm.rtm_table = rule->lookup;
1130 }
1131
1132 if (rule->flags & IPRULE_ACTION)
1133 rtm.rtm_type = rule->action;
1134 else if (rule->flags & IPRULE_GOTO)
1135 rtm.rtm_type = FR_ACT_GOTO;
1136 else if (!(rule->flags & (IPRULE_LOOKUP | IPRULE_ACTION | IPRULE_GOTO)))
1137 rtm.rtm_type = FR_ACT_NOP;
1138
1139 msg = nlmsg_alloc_simple(cmd, NLM_F_REQUEST);
1140
1141 if (!msg)
1142 return -1;
1143
1144 nlmsg_append(msg, &rtm, sizeof(rtm), 0);
1145
1146 if (rule->flags & IPRULE_IN)
1147 nla_put(msg, FRA_IFNAME, strlen(rule->in_dev) + 1, rule->in_dev);
1148
1149 if (rule->flags & IPRULE_OUT)
1150 nla_put(msg, FRA_OIFNAME, strlen(rule->out_dev) + 1, rule->out_dev);
1151
1152 if (rule->flags & IPRULE_SRC)
1153 nla_put(msg, FRA_SRC, alen, &rule->src_addr);
1154
1155 if (rule->flags & IPRULE_DEST)
1156 nla_put(msg, FRA_DST, alen, &rule->dest_addr);
1157
1158 if (rule->flags & IPRULE_PRIORITY)
1159 nla_put_u32(msg, FRA_PRIORITY, rule->priority);
1160 else if (cmd == RTM_NEWRULE)
1161 nla_put_u32(msg, FRA_PRIORITY, rule->order);
1162
1163 if (rule->flags & IPRULE_FWMARK)
1164 nla_put_u32(msg, FRA_FWMARK, rule->fwmark);
1165
1166 if (rule->flags & IPRULE_FWMASK)
1167 nla_put_u32(msg, FRA_FWMASK, rule->fwmask);
1168
1169 if (rule->flags & IPRULE_LOOKUP) {
1170 if (rule->lookup >= 256)
1171 nla_put_u32(msg, FRA_TABLE, rule->lookup);
1172 }
1173
1174 if (rule->flags & IPRULE_GOTO)
1175 nla_put_u32(msg, FRA_GOTO, rule->gotoid);
1176
1177 return system_rtnl_call(msg);
1178 }
1179
1180 int system_add_iprule(struct iprule *rule)
1181 {
1182 /* trigger flush of existing rules when adding first rule the first time */
1183 if (!iprules_flushed)
1184 {
1185 system_flush_iprules();
1186 iprules_flushed = true;
1187 }
1188
1189 return system_iprule(rule, RTM_NEWRULE);
1190 }
1191
1192 int system_del_iprule(struct iprule *rule)
1193 {
1194 return system_iprule(rule, RTM_DELRULE);
1195 }
1196
1197 int system_flush_iprules(void)
1198 {
1199 int rv = 0;
1200 struct iprule rule;
1201
1202 system_if_clear_entries(NULL, RTM_GETRULE, AF_INET);
1203 system_if_clear_entries(NULL, RTM_GETRULE, AF_INET6);
1204
1205 memset(&rule, 0, sizeof(rule));
1206
1207
1208 rule.flags = IPRULE_INET4 | IPRULE_PRIORITY | IPRULE_LOOKUP;
1209
1210 rule.priority = 0;
1211 rule.lookup = RT_TABLE_LOCAL;
1212 rv |= system_iprule(&rule, RTM_NEWRULE);
1213
1214 rule.priority = 32766;
1215 rule.lookup = RT_TABLE_MAIN;
1216 rv |= system_iprule(&rule, RTM_NEWRULE);
1217
1218 rule.priority = 32767;
1219 rule.lookup = RT_TABLE_DEFAULT;
1220 rv |= system_iprule(&rule, RTM_NEWRULE);
1221
1222
1223 rule.flags = IPRULE_INET6 | IPRULE_PRIORITY | IPRULE_LOOKUP;
1224
1225 rule.priority = 0;
1226 rule.lookup = RT_TABLE_LOCAL;
1227 rv |= system_iprule(&rule, RTM_NEWRULE);
1228
1229 rule.priority = 32766;
1230 rule.lookup = RT_TABLE_MAIN;
1231 rv |= system_iprule(&rule, RTM_NEWRULE);
1232
1233 return rv;
1234 }
1235
1236 bool system_resolve_iprule_action(const char *action, unsigned int *id)
1237 {
1238 char *e;
1239 unsigned int n;
1240
1241 if (!strcmp(action, "local"))
1242 n = RTN_LOCAL;
1243 else if (!strcmp(action, "nat"))
1244 n = RTN_NAT;
1245 else if (!strcmp(action, "broadcast"))
1246 n = RTN_BROADCAST;
1247 else if (!strcmp(action, "anycast"))
1248 n = RTN_ANYCAST;
1249 else if (!strcmp(action, "multicast"))
1250 n = RTN_MULTICAST;
1251 else if (!strcmp(action, "prohibit"))
1252 n = RTN_PROHIBIT;
1253 else if (!strcmp(action, "unreachable"))
1254 n = RTN_UNREACHABLE;
1255 else if (!strcmp(action, "blackhole"))
1256 n = RTN_BLACKHOLE;
1257 else if (!strcmp(action, "xresolve"))
1258 n = RTN_XRESOLVE;
1259 else if (!strcmp(action, "unicast"))
1260 n = RTN_UNICAST;
1261 else if (!strcmp(action, "throw"))
1262 n = RTN_THROW;
1263 else {
1264 n = strtoul(action, &e, 0);
1265 if (!e || *e || e == action || n > 255)
1266 return false;
1267 }
1268
1269 *id = n;
1270 return true;
1271 }
1272
1273 time_t system_get_rtime(void)
1274 {
1275 struct timespec ts;
1276 struct timeval tv;
1277
1278 if (syscall(__NR_clock_gettime, CLOCK_MONOTONIC, &ts) == 0)
1279 return ts.tv_sec;
1280
1281 if (gettimeofday(&tv, NULL) == 0)
1282 return tv.tv_sec;
1283
1284 return 0;
1285 }
1286
1287 #ifndef IP_DF
1288 #define IP_DF 0x4000
1289 #endif
1290
1291 static int tunnel_ioctl(const char *name, int cmd, void *p)
1292 {
1293 struct ifreq ifr;
1294
1295 memset(&ifr, 0, sizeof(ifr));
1296 strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name));
1297 ifr.ifr_ifru.ifru_data = p;
1298 return ioctl(sock_ioctl, cmd, &ifr);
1299 }
1300
1301 int system_del_ip_tunnel(const char *name)
1302 {
1303 return tunnel_ioctl(name, SIOCDELTUNNEL, NULL);
1304 }
1305
1306 int system_update_ipv6_mtu(struct device *dev, int mtu)
1307 {
1308 int ret = -1;
1309 char buf[64];
1310 snprintf(buf, sizeof(buf), "/proc/sys/net/ipv6/conf/%s/mtu",
1311 dev->ifname);
1312
1313 int fd = open(buf, O_RDWR);
1314 ssize_t len = read(fd, buf, sizeof(buf) - 1);
1315 if (len < 0)
1316 goto out;
1317
1318 buf[len] = 0;
1319 ret = atoi(buf);
1320
1321 if (!mtu || ret <= mtu)
1322 goto out;
1323
1324 lseek(fd, 0, SEEK_SET);
1325 if (write(fd, buf, snprintf(buf, sizeof(buf), "%i", mtu)) <= 0)
1326 ret = -1;
1327
1328 out:
1329 close(fd);
1330 return ret;
1331 }
1332
1333
1334 int system_add_ip_tunnel(const char *name, struct blob_attr *attr)
1335 {
1336 struct blob_attr *tb[__TUNNEL_ATTR_MAX];
1337 struct blob_attr *cur;
1338 const char *str;
1339
1340 system_del_ip_tunnel(name);
1341
1342 blobmsg_parse(tunnel_attr_list.params, __TUNNEL_ATTR_MAX, tb,
1343 blob_data(attr), blob_len(attr));
1344
1345 if (!(cur = tb[TUNNEL_ATTR_TYPE]))
1346 return -EINVAL;
1347 str = blobmsg_data(cur);
1348
1349 unsigned int ttl = 0;
1350 if ((cur = tb[TUNNEL_ATTR_TTL]) && (ttl = blobmsg_get_u32(cur)) > 255)
1351 return -EINVAL;
1352
1353 unsigned int link = 0;
1354 if ((cur = tb[TUNNEL_ATTR_LINK])) {
1355 struct interface *iface = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
1356 if (!iface)
1357 return -EINVAL;
1358
1359 if (iface->l3_dev.dev)
1360 link = iface->l3_dev.dev->ifindex;
1361 }
1362
1363
1364 if (!strcmp(str, "sit")) {
1365 struct ip_tunnel_parm p = {
1366 .link = link,
1367 .iph = {
1368 .version = 4,
1369 .ihl = 5,
1370 .frag_off = htons(IP_DF),
1371 .protocol = IPPROTO_IPV6,
1372 .ttl = ttl
1373 }
1374 };
1375
1376 if ((cur = tb[TUNNEL_ATTR_LOCAL]) &&
1377 inet_pton(AF_INET, blobmsg_data(cur), &p.iph.saddr) < 1)
1378 return -EINVAL;
1379
1380 if ((cur = tb[TUNNEL_ATTR_REMOTE]) &&
1381 inet_pton(AF_INET, blobmsg_data(cur), &p.iph.daddr) < 1)
1382 return -EINVAL;
1383
1384 strncpy(p.name, name, sizeof(p.name));
1385 if (tunnel_ioctl("sit0", SIOCADDTUNNEL, &p) < 0)
1386 return -1;
1387
1388 #ifdef SIOCADD6RD
1389 if ((cur = tb[TUNNEL_ATTR_6RD_PREFIX])) {
1390 unsigned int mask;
1391 struct ip_tunnel_6rd p6;
1392
1393 memset(&p6, 0, sizeof(p6));
1394
1395 if (!parse_ip_and_netmask(AF_INET6, blobmsg_data(cur),
1396 &p6.prefix, &mask) || mask > 128)
1397 return -EINVAL;
1398 p6.prefixlen = mask;
1399
1400 if ((cur = tb[TUNNEL_ATTR_6RD_RELAY_PREFIX])) {
1401 if (!parse_ip_and_netmask(AF_INET, blobmsg_data(cur),
1402 &p6.relay_prefix, &mask) || mask > 32)
1403 return -EINVAL;
1404 p6.relay_prefixlen = mask;
1405 }
1406
1407 if (tunnel_ioctl(name, SIOCADD6RD, &p6) < 0) {
1408 system_del_ip_tunnel(name);
1409 return -1;
1410 }
1411 }
1412 #endif
1413 } else if (!strcmp(str, "ipip6")) {
1414 struct ip6_tnl_parm p = {
1415 .link = link,
1416 .proto = IPPROTO_IPIP,
1417 .hop_limit = (ttl) ? ttl : 64,
1418 .encap_limit = 4,
1419 };
1420
1421 if ((cur = tb[TUNNEL_ATTR_LOCAL]) &&
1422 inet_pton(AF_INET6, blobmsg_data(cur), &p.laddr) < 1)
1423 return -EINVAL;
1424
1425 if ((cur = tb[TUNNEL_ATTR_REMOTE]) &&
1426 inet_pton(AF_INET6, blobmsg_data(cur), &p.raddr) < 1)
1427 return -EINVAL;
1428
1429 strncpy(p.name, name, sizeof(p.name));
1430 if (tunnel_ioctl("ip6tnl0", SIOCADDTUNNEL, &p) < 0)
1431 return -1;
1432 } else
1433 return -EINVAL;
1434
1435 return 0;
1436 }