mirror of
				https://git.proxmox.com/git/mirror_iproute2
				synced 2025-10-31 23:05:30 +00:00 
			
		
		
		
	 7b0d424abe
			
		
	
	
		7b0d424abe
		
	
	
	
	
		
			
			In oneline mode the line seperator should be \ but several parts of tc aren't doing it right. Signed-off-by: Stephen Hemminger <stephen@networkplumber.org> Signed-off-by: David Ahern <dsahern@gmail.com>
		
			
				
	
	
		
			557 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			557 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * m_tunnel_key.c	ip tunnel manipulation module
 | |
|  *
 | |
|  *              This program is free software; you can redistribute it and/or
 | |
|  *              modify it under the terms of the GNU General Public License
 | |
|  *              as published by the Free Software Foundation; either version
 | |
|  *              2 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * Authors:     Amir Vadai <amir@vadai.me>
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <unistd.h>
 | |
| #include <string.h>
 | |
| #include <linux/if_ether.h>
 | |
| #include "utils.h"
 | |
| #include "rt_names.h"
 | |
| #include "tc_util.h"
 | |
| #include <linux/tc_act/tc_tunnel_key.h>
 | |
| 
 | |
| static void explain(void)
 | |
| {
 | |
| 	fprintf(stderr,
 | |
| 		"Usage: tunnel_key unset\n"
 | |
| 		"       tunnel_key set <TUNNEL_KEY>\n"
 | |
| 		"Where TUNNEL_KEY is a combination of:\n"
 | |
| 		"id <TUNNELID>\n"
 | |
| 		"src_ip <IP> (mandatory)\n"
 | |
| 		"dst_ip <IP> (mandatory)\n"
 | |
| 		"dst_port <UDP_PORT>\n"
 | |
| 		"geneve_opts <OPTIONS>\n"
 | |
| 		"csum | nocsum (default is \"csum\")\n");
 | |
| }
 | |
| 
 | |
| static void usage(void)
 | |
| {
 | |
| 	explain();
 | |
| 	exit(-1);
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_ip_addr(const char *str, int addr4_type,
 | |
| 				    int addr6_type, struct nlmsghdr *n)
 | |
| {
 | |
| 	inet_prefix addr;
 | |
| 	int ret;
 | |
| 
 | |
| 	ret = get_addr(&addr, str, AF_UNSPEC);
 | |
| 	if (ret)
 | |
| 		return ret;
 | |
| 
 | |
| 	addattr_l(n, MAX_MSG, addr.family == AF_INET ? addr4_type : addr6_type,
 | |
| 		  addr.data, addr.bytelen);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_key_id(const char *str, int type,
 | |
| 				   struct nlmsghdr *n)
 | |
| {
 | |
| 	__be32 key_id;
 | |
| 	int ret;
 | |
| 
 | |
| 	ret = get_be32(&key_id, str, 10);
 | |
| 	if (!ret)
 | |
| 		addattr32(n, MAX_MSG, type, key_id);
 | |
| 
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_dst_port(char *str, int type, struct nlmsghdr *n)
 | |
| {
 | |
| 	int ret;
 | |
| 	__be16 dst_port;
 | |
| 
 | |
| 	ret = get_be16(&dst_port, str, 10);
 | |
| 	if (ret)
 | |
| 		return -1;
 | |
| 
 | |
| 	addattr16(n, MAX_MSG, type, dst_port);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_be16(char *str, int base, int type,
 | |
| 				 struct nlmsghdr *n)
 | |
| {
 | |
| 	int ret;
 | |
| 	__be16 value;
 | |
| 
 | |
| 	ret = get_be16(&value, str, base);
 | |
| 	if (ret)
 | |
| 		return ret;
 | |
| 
 | |
| 	addattr16(n, MAX_MSG, type, value);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_u8(char *str, int base, int type,
 | |
| 			       struct nlmsghdr *n)
 | |
| {
 | |
| 	int ret;
 | |
| 	__u8 value;
 | |
| 
 | |
| 	ret = get_u8(&value, str, base);
 | |
| 	if (ret)
 | |
| 		return ret;
 | |
| 
 | |
| 	addattr8(n, MAX_MSG, type, value);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_geneve_opt(char *str, struct nlmsghdr *n)
 | |
| {
 | |
| 	char *token, *saveptr = NULL;
 | |
| 	struct rtattr *nest;
 | |
| 	int i, ret;
 | |
| 
 | |
| 	nest = addattr_nest(n, MAX_MSG, TCA_TUNNEL_KEY_ENC_OPTS_GENEVE);
 | |
| 
 | |
| 	token = strtok_r(str, ":", &saveptr);
 | |
| 	i = 1;
 | |
| 	while (token) {
 | |
| 		switch (i) {
 | |
| 		case TCA_TUNNEL_KEY_ENC_OPT_GENEVE_CLASS:
 | |
| 		{
 | |
| 			ret = tunnel_key_parse_be16(token, 16, i, n);
 | |
| 			if (ret)
 | |
| 				return ret;
 | |
| 			break;
 | |
| 		}
 | |
| 		case TCA_TUNNEL_KEY_ENC_OPT_GENEVE_TYPE:
 | |
| 		{
 | |
| 			ret = tunnel_key_parse_u8(token, 16, i, n);
 | |
| 			if (ret)
 | |
| 				return ret;
 | |
| 			break;
 | |
| 		}
 | |
| 		case TCA_TUNNEL_KEY_ENC_OPT_GENEVE_DATA:
 | |
| 		{
 | |
| 			size_t token_len = strlen(token);
 | |
| 			uint8_t *opts;
 | |
| 
 | |
| 			opts = malloc(token_len / 2);
 | |
| 			if (!opts)
 | |
| 				return -1;
 | |
| 			if (hex2mem(token, opts, token_len / 2) < 0) {
 | |
| 				free(opts);
 | |
| 				return -1;
 | |
| 			}
 | |
| 			addattr_l(n, MAX_MSG, i, opts, token_len / 2);
 | |
| 			free(opts);
 | |
| 
 | |
| 			break;
 | |
| 		}
 | |
| 		default:
 | |
| 			return -1;
 | |
| 		}
 | |
| 
 | |
| 		token = strtok_r(NULL, ":", &saveptr);
 | |
| 		i++;
 | |
| 	}
 | |
| 
 | |
| 	addattr_nest_end(n, nest);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_geneve_opts(char *str, struct nlmsghdr *n)
 | |
| {
 | |
| 	char *token, *saveptr = NULL;
 | |
| 	struct rtattr *nest;
 | |
| 	int ret;
 | |
| 
 | |
| 	nest = addattr_nest(n, MAX_MSG, TCA_TUNNEL_KEY_ENC_OPTS);
 | |
| 
 | |
| 	token = strtok_r(str, ",", &saveptr);
 | |
| 	while (token) {
 | |
| 		ret = tunnel_key_parse_geneve_opt(token, n);
 | |
| 		if (ret)
 | |
| 			return ret;
 | |
| 
 | |
| 		token = strtok_r(NULL, ",", &saveptr);
 | |
| 	}
 | |
| 
 | |
| 	addattr_nest_end(n, nest);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int tunnel_key_parse_tos_ttl(char *str, int type, struct nlmsghdr *n)
 | |
| {
 | |
| 	int ret;
 | |
| 	__u8 val;
 | |
| 
 | |
| 	ret = get_u8(&val, str, 10);
 | |
| 	if (ret)
 | |
| 		ret = get_u8(&val, str, 16);
 | |
| 	if (ret)
 | |
| 		return -1;
 | |
| 
 | |
| 	addattr8(n, MAX_MSG, type, val);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int parse_tunnel_key(struct action_util *a, int *argc_p, char ***argv_p,
 | |
| 			    int tca_id, struct nlmsghdr *n)
 | |
| {
 | |
| 	struct tc_tunnel_key parm = {};
 | |
| 	char **argv = *argv_p;
 | |
| 	int argc = *argc_p;
 | |
| 	struct rtattr *tail;
 | |
| 	int action = 0;
 | |
| 	int ret;
 | |
| 	int has_src_ip = 0;
 | |
| 	int has_dst_ip = 0;
 | |
| 	int csum = 1;
 | |
| 
 | |
| 	if (matches(*argv, "tunnel_key") != 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	tail = addattr_nest(n, MAX_MSG, tca_id);
 | |
| 
 | |
| 	NEXT_ARG();
 | |
| 
 | |
| 	while (argc > 0) {
 | |
| 		if (matches(*argv, "unset") == 0) {
 | |
| 			if (action) {
 | |
| 				fprintf(stderr, "unexpected \"%s\" - action already specified\n",
 | |
| 					*argv);
 | |
| 				explain();
 | |
| 				return -1;
 | |
| 			}
 | |
| 			action = TCA_TUNNEL_KEY_ACT_RELEASE;
 | |
| 		} else if (matches(*argv, "set") == 0) {
 | |
| 			if (action) {
 | |
| 				fprintf(stderr, "unexpected \"%s\" - action already specified\n",
 | |
| 					*argv);
 | |
| 				explain();
 | |
| 				return -1;
 | |
| 			}
 | |
| 			action = TCA_TUNNEL_KEY_ACT_SET;
 | |
| 		} else if (matches(*argv, "src_ip") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			ret = tunnel_key_parse_ip_addr(*argv,
 | |
| 						       TCA_TUNNEL_KEY_ENC_IPV4_SRC,
 | |
| 						       TCA_TUNNEL_KEY_ENC_IPV6_SRC,
 | |
| 						       n);
 | |
| 			if (ret < 0) {
 | |
| 				fprintf(stderr, "Illegal \"src_ip\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			has_src_ip = 1;
 | |
| 		} else if (matches(*argv, "dst_ip") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			ret = tunnel_key_parse_ip_addr(*argv,
 | |
| 						       TCA_TUNNEL_KEY_ENC_IPV4_DST,
 | |
| 						       TCA_TUNNEL_KEY_ENC_IPV6_DST,
 | |
| 						       n);
 | |
| 			if (ret < 0) {
 | |
| 				fprintf(stderr, "Illegal \"dst_ip\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			has_dst_ip = 1;
 | |
| 		} else if (matches(*argv, "id") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			ret = tunnel_key_parse_key_id(*argv, TCA_TUNNEL_KEY_ENC_KEY_ID, n);
 | |
| 			if (ret < 0) {
 | |
| 				fprintf(stderr, "Illegal \"id\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 		} else if (matches(*argv, "dst_port") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			ret = tunnel_key_parse_dst_port(*argv,
 | |
| 							TCA_TUNNEL_KEY_ENC_DST_PORT, n);
 | |
| 			if (ret < 0) {
 | |
| 				fprintf(stderr, "Illegal \"dst port\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 		} else if (matches(*argv, "geneve_opts") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 
 | |
| 			if (tunnel_key_parse_geneve_opts(*argv, n)) {
 | |
| 				fprintf(stderr, "Illegal \"geneve_opts\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 		} else if (matches(*argv, "tos") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			ret = tunnel_key_parse_tos_ttl(*argv,
 | |
| 							TCA_TUNNEL_KEY_ENC_TOS, n);
 | |
| 			if (ret < 0) {
 | |
| 				fprintf(stderr, "Illegal \"tos\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 		} else if (matches(*argv, "ttl") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			ret = tunnel_key_parse_tos_ttl(*argv,
 | |
| 							TCA_TUNNEL_KEY_ENC_TTL, n);
 | |
| 			if (ret < 0) {
 | |
| 				fprintf(stderr, "Illegal \"ttl\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 		} else if (matches(*argv, "csum") == 0) {
 | |
| 			csum = 1;
 | |
| 		} else if (matches(*argv, "nocsum") == 0) {
 | |
| 			csum = 0;
 | |
| 		} else if (matches(*argv, "help") == 0) {
 | |
| 			usage();
 | |
| 		} else {
 | |
| 			break;
 | |
| 		}
 | |
| 		NEXT_ARG_FWD();
 | |
| 	}
 | |
| 
 | |
| 	addattr8(n, MAX_MSG, TCA_TUNNEL_KEY_NO_CSUM, !csum);
 | |
| 
 | |
| 	parse_action_control_dflt(&argc, &argv, &parm.action,
 | |
| 				  false, TC_ACT_PIPE);
 | |
| 
 | |
| 	if (argc) {
 | |
| 		if (matches(*argv, "index") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (get_u32(&parm.index, *argv, 10)) {
 | |
| 				fprintf(stderr, "tunnel_key: Illegal \"index\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 
 | |
| 			NEXT_ARG_FWD();
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if (action == TCA_TUNNEL_KEY_ACT_SET &&
 | |
| 	    (!has_src_ip || !has_dst_ip)) {
 | |
| 		fprintf(stderr, "set needs tunnel_key parameters\n");
 | |
| 		explain();
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	parm.t_action = action;
 | |
| 	addattr_l(n, MAX_MSG, TCA_TUNNEL_KEY_PARMS, &parm, sizeof(parm));
 | |
| 	addattr_nest_end(n, tail);
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static void tunnel_key_print_ip_addr(FILE *f, const char *name,
 | |
| 				     struct rtattr *attr)
 | |
| {
 | |
| 	int family;
 | |
| 	size_t len;
 | |
| 
 | |
| 	if (!attr)
 | |
| 		return;
 | |
| 
 | |
| 	len = RTA_PAYLOAD(attr);
 | |
| 
 | |
| 	if (len == 4)
 | |
| 		family = AF_INET;
 | |
| 	else if (len == 16)
 | |
| 		family = AF_INET6;
 | |
| 	else
 | |
| 		return;
 | |
| 
 | |
| 	print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 	if (matches(name, "src_ip") == 0)
 | |
| 		print_string(PRINT_ANY, "src_ip", "\tsrc_ip %s",
 | |
| 			     rt_addr_n2a_rta(family, attr));
 | |
| 	else if (matches(name, "dst_ip") == 0)
 | |
| 		print_string(PRINT_ANY, "dst_ip", "\tdst_ip %s",
 | |
| 			     rt_addr_n2a_rta(family, attr));
 | |
| }
 | |
| 
 | |
| static void tunnel_key_print_key_id(FILE *f, const char *name,
 | |
| 				    struct rtattr *attr)
 | |
| {
 | |
| 	if (!attr)
 | |
| 		return;
 | |
| 	print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 	print_uint(PRINT_ANY, "key_id", "\tkey_id %u", rta_getattr_be32(attr));
 | |
| }
 | |
| 
 | |
| static void tunnel_key_print_dst_port(FILE *f, char *name,
 | |
| 				      struct rtattr *attr)
 | |
| {
 | |
| 	if (!attr)
 | |
| 		return;
 | |
| 	print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 	print_uint(PRINT_ANY, "dst_port", "\tdst_port %u",
 | |
| 		   rta_getattr_be16(attr));
 | |
| }
 | |
| 
 | |
| static void tunnel_key_print_flag(FILE *f, const char *name_on,
 | |
| 				  const char *name_off,
 | |
| 				  struct rtattr *attr)
 | |
| {
 | |
| 	if (!attr)
 | |
| 		return;
 | |
| 	print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 	print_string(PRINT_ANY, "flag", "\t%s",
 | |
| 		     rta_getattr_u8(attr) ? name_on : name_off);
 | |
| }
 | |
| 
 | |
| static void tunnel_key_print_geneve_options(const char *name,
 | |
| 					    struct rtattr *attr)
 | |
| {
 | |
| 	struct rtattr *tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_MAX + 1];
 | |
| 	struct rtattr *i = RTA_DATA(attr);
 | |
| 	int ii, data_len = 0, offset = 0;
 | |
| 	int rem = RTA_PAYLOAD(attr);
 | |
| 	char strbuf[rem * 2 + 1];
 | |
| 	char data[rem * 2 + 1];
 | |
| 	uint8_t data_r[rem];
 | |
| 	uint16_t clss;
 | |
| 	uint8_t type;
 | |
| 
 | |
| 	open_json_array(PRINT_JSON, name);
 | |
| 	print_nl();
 | |
| 	print_string(PRINT_FP, name, "\t%s ", "geneve_opt");
 | |
| 
 | |
| 	while (rem) {
 | |
| 		parse_rtattr(tb, TCA_TUNNEL_KEY_ENC_OPT_GENEVE_MAX, i, rem);
 | |
| 		clss = rta_getattr_be16(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_CLASS]);
 | |
| 		type = rta_getattr_u8(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_TYPE]);
 | |
| 		data_len = RTA_PAYLOAD(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_DATA]);
 | |
| 		hexstring_n2a(RTA_DATA(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_DATA]),
 | |
| 			      data_len, data, sizeof(data));
 | |
| 		hex2mem(data, data_r, data_len);
 | |
| 		offset += data_len + 20;
 | |
| 		rem -= data_len + 20;
 | |
| 		i = RTA_DATA(attr) + offset;
 | |
| 
 | |
| 		open_json_object(NULL);
 | |
| 		print_uint(PRINT_JSON, "class", NULL, clss);
 | |
| 		print_uint(PRINT_JSON, "type", NULL, type);
 | |
| 		open_json_array(PRINT_JSON, "data");
 | |
| 		for (ii = 0; ii < data_len; ii++)
 | |
| 			print_uint(PRINT_JSON, NULL, NULL, data_r[ii]);
 | |
| 		close_json_array(PRINT_JSON, "data");
 | |
| 		close_json_object();
 | |
| 
 | |
| 		sprintf(strbuf, "%04x:%02x:%s", clss, type, data);
 | |
| 		if (rem)
 | |
| 			print_string(PRINT_FP, NULL, "%s,", strbuf);
 | |
| 		else
 | |
| 			print_string(PRINT_FP, NULL, "%s", strbuf);
 | |
| 	}
 | |
| 
 | |
| 	close_json_array(PRINT_JSON, name);
 | |
| }
 | |
| 
 | |
| static void tunnel_key_print_key_opt(const char *name, struct rtattr *attr)
 | |
| {
 | |
| 	struct rtattr *tb[TCA_TUNNEL_KEY_ENC_OPTS_MAX + 1];
 | |
| 
 | |
| 	if (!attr)
 | |
| 		return;
 | |
| 
 | |
| 	parse_rtattr_nested(tb, TCA_TUNNEL_KEY_ENC_OPTS_MAX, attr);
 | |
| 	tunnel_key_print_geneve_options(name,
 | |
| 					tb[TCA_TUNNEL_KEY_ENC_OPTS_GENEVE]);
 | |
| }
 | |
| 
 | |
| static void tunnel_key_print_tos_ttl(FILE *f, char *name,
 | |
| 				     struct rtattr *attr)
 | |
| {
 | |
| 	if (!attr)
 | |
| 		return;
 | |
| 
 | |
| 	if (matches(name, "tos") == 0 && rta_getattr_u8(attr) != 0) {
 | |
| 		print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 		print_uint(PRINT_ANY, "tos", "\ttos 0x%x",
 | |
| 			   rta_getattr_u8(attr));
 | |
| 	} else if (matches(name, "ttl") == 0 && rta_getattr_u8(attr) != 0) {
 | |
| 		print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 		print_uint(PRINT_ANY, "ttl", "\tttl %u",
 | |
| 			   rta_getattr_u8(attr));
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static int print_tunnel_key(struct action_util *au, FILE *f, struct rtattr *arg)
 | |
| {
 | |
| 	struct rtattr *tb[TCA_TUNNEL_KEY_MAX + 1];
 | |
| 	struct tc_tunnel_key *parm;
 | |
| 
 | |
| 	if (!arg)
 | |
| 		return -1;
 | |
| 
 | |
| 	parse_rtattr_nested(tb, TCA_TUNNEL_KEY_MAX, arg);
 | |
| 
 | |
| 	if (!tb[TCA_TUNNEL_KEY_PARMS]) {
 | |
| 		fprintf(stderr, "Missing tunnel_key parameters\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 	parm = RTA_DATA(tb[TCA_TUNNEL_KEY_PARMS]);
 | |
| 
 | |
| 	print_string(PRINT_ANY, "kind", "%s ", "tunnel_key");
 | |
| 
 | |
| 	switch (parm->t_action) {
 | |
| 	case TCA_TUNNEL_KEY_ACT_RELEASE:
 | |
| 		print_string(PRINT_ANY, "mode", " %s", "unset");
 | |
| 		break;
 | |
| 	case TCA_TUNNEL_KEY_ACT_SET:
 | |
| 		print_string(PRINT_ANY, "mode", " %s", "set");
 | |
| 		tunnel_key_print_ip_addr(f, "src_ip",
 | |
| 					 tb[TCA_TUNNEL_KEY_ENC_IPV4_SRC]);
 | |
| 		tunnel_key_print_ip_addr(f, "dst_ip",
 | |
| 					 tb[TCA_TUNNEL_KEY_ENC_IPV4_DST]);
 | |
| 		tunnel_key_print_ip_addr(f, "src_ip",
 | |
| 					 tb[TCA_TUNNEL_KEY_ENC_IPV6_SRC]);
 | |
| 		tunnel_key_print_ip_addr(f, "dst_ip",
 | |
| 					 tb[TCA_TUNNEL_KEY_ENC_IPV6_DST]);
 | |
| 		tunnel_key_print_key_id(f, "key_id",
 | |
| 					tb[TCA_TUNNEL_KEY_ENC_KEY_ID]);
 | |
| 		tunnel_key_print_dst_port(f, "dst_port",
 | |
| 					  tb[TCA_TUNNEL_KEY_ENC_DST_PORT]);
 | |
| 		tunnel_key_print_key_opt("geneve_opts",
 | |
| 					 tb[TCA_TUNNEL_KEY_ENC_OPTS]);
 | |
| 		tunnel_key_print_flag(f, "nocsum", "csum",
 | |
| 				      tb[TCA_TUNNEL_KEY_NO_CSUM]);
 | |
| 		tunnel_key_print_tos_ttl(f, "tos",
 | |
| 					  tb[TCA_TUNNEL_KEY_ENC_TOS]);
 | |
| 		tunnel_key_print_tos_ttl(f, "ttl",
 | |
| 					  tb[TCA_TUNNEL_KEY_ENC_TTL]);
 | |
| 		break;
 | |
| 	}
 | |
| 	print_action_control(f, " ", parm->action, "");
 | |
| 
 | |
| 	print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 	print_uint(PRINT_ANY, "index", "\t index %u", parm->index);
 | |
| 	print_int(PRINT_ANY, "ref", " ref %d", parm->refcnt);
 | |
| 	print_int(PRINT_ANY, "bind", " bind %d", parm->bindcnt);
 | |
| 
 | |
| 	if (show_stats) {
 | |
| 		if (tb[TCA_TUNNEL_KEY_TM]) {
 | |
| 			struct tcf_t *tm = RTA_DATA(tb[TCA_TUNNEL_KEY_TM]);
 | |
| 
 | |
| 			print_tm(f, tm);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	print_string(PRINT_FP, NULL, "%s", _SL_);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| struct action_util tunnel_key_action_util = {
 | |
| 	.id = "tunnel_key",
 | |
| 	.parse_aopt = parse_tunnel_key,
 | |
| 	.print_aopt = print_tunnel_key,
 | |
| };
 |