fix numbering in switch(): we don't have "del" anymore,
[oweals/busybox.git] / networking / libiproute / iptunnel.c
index 52396efe80d1f3944cd7d5c5eef8a52cfe6649f3..a67803ff43ca73e067ee8fa06d3b529992f2f496 100644 (file)
@@ -1,10 +1,8 @@
+/* vi: set sw=4 ts=4: */
 /*
  * iptunnel.c         "ip tunnel"
  *
- *             This program is free software; you can redistribute it and/or
- *             modify it under the terms of the GNU General Public License
- *             as published by the Free Software Foundation; either version
- *             2 of the License, or (at your option) any later version.
+ * Licensed under the GPL v2 or later, see the file LICENSE in this tarball.
  *
  * Authors:    Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
  *
  * Phil Karn <karn@ka9q.ampr.org>      990408: "pmtudisc" flag
  */
 
+#include "libbb.h"
 #include <sys/socket.h>
 #include <sys/ioctl.h>
 
-#include <stdlib.h>
 #include <string.h>
 #include <unistd.h>
 
-#include <arpa/inet.h>
 #include <netinet/ip.h>
-#include <netinet/in.h>
 
 #include <net/if.h>
 #include <net/if_arp.h>
 
 #include <asm/types.h>
+#ifndef __constant_htons
 #define __constant_htons htons
+#endif
 #include <linux/if_tunnel.h>
 
 #include "rt_names.h"
 #include "utils.h"
 #include "ip_common.h"
 
-#include "libbb.h"
 
 static int do_ioctl_get_ifindex(char *dev)
 {
        struct ifreq ifr;
        int fd;
 
-       strcpy(ifr.ifr_name, dev);
-       fd = socket(AF_INET, SOCK_DGRAM, 0);
+       strncpy(ifr.ifr_name, dev, sizeof(ifr.ifr_name));
+       fd = xsocket(AF_INET, SOCK_DGRAM, 0);
        if (ioctl(fd, SIOCGIFINDEX, &ifr)) {
                bb_perror_msg("ioctl");
                return 0;
@@ -60,8 +57,8 @@ static int do_ioctl_get_iftype(char *dev)
        struct ifreq ifr;
        int fd;
 
-       strcpy(ifr.ifr_name, dev);
-       fd = socket(AF_INET, SOCK_DGRAM, 0);
+       strncpy(ifr.ifr_name, dev, sizeof(ifr.ifr_name));
+       fd = xsocket(AF_INET, SOCK_DGRAM, 0);
        if (ioctl(fd, SIOCGIFHWADDR, &ifr)) {
                bb_perror_msg("ioctl");
                return -1;
@@ -77,7 +74,7 @@ static char *do_ioctl_get_ifname(int idx)
        int fd;
 
        ifr.ifr_ifindex = idx;
-       fd = socket(AF_INET, SOCK_DGRAM, 0);
+       fd = xsocket(AF_INET, SOCK_DGRAM, 0);
        if (ioctl(fd, SIOCGIFNAME, &ifr)) {
                bb_perror_msg("ioctl");
                return NULL;
@@ -94,9 +91,9 @@ static int do_get_ioctl(char *basedev, struct ip_tunnel_parm *p)
        int fd;
        int err;
 
-       strcpy(ifr.ifr_name, basedev);
+       strncpy(ifr.ifr_name, basedev, sizeof(ifr.ifr_name));
        ifr.ifr_ifru.ifru_data = (void*)p;
-       fd = socket(AF_INET, SOCK_DGRAM, 0);
+       fd = xsocket(AF_INET, SOCK_DGRAM, 0);
        err = ioctl(fd, SIOCGETTUNNEL, &ifr);
        if (err) {
                bb_perror_msg("ioctl");
@@ -112,12 +109,12 @@ static int do_add_ioctl(int cmd, char *basedev, struct ip_tunnel_parm *p)
        int err;
 
        if (cmd == SIOCCHGTUNNEL && p->name[0]) {
-               strcpy(ifr.ifr_name, p->name);
+               strncpy(ifr.ifr_name, p->name, sizeof(ifr.ifr_name));
        } else {
-               strcpy(ifr.ifr_name, basedev);
+               strncpy(ifr.ifr_name, basedev, sizeof(ifr.ifr_name));
        }
        ifr.ifr_ifru.ifru_data = (void*)p;
-       fd = socket(AF_INET, SOCK_DGRAM, 0);
+       fd = xsocket(AF_INET, SOCK_DGRAM, 0);
        err = ioctl(fd, cmd, &ifr);
        if (err) {
                bb_perror_msg("ioctl");
@@ -133,12 +130,12 @@ static int do_del_ioctl(char *basedev, struct ip_tunnel_parm *p)
        int err;
 
        if (p->name[0]) {
-               strcpy(ifr.ifr_name, p->name);
+               strncpy(ifr.ifr_name, p->name, sizeof(ifr.ifr_name));
        } else {
-               strcpy(ifr.ifr_name, basedev);
+               strncpy(ifr.ifr_name, basedev, sizeof(ifr.ifr_name));
        }
        ifr.ifr_ifru.ifru_data = (void*)p;
-       fd = socket(AF_INET, SOCK_DGRAM, 0);
+       fd = xsocket(AF_INET, SOCK_DGRAM, 0);
        err = ioctl(fd, SIOCDELTUNNEL, &ifr);
        if (err) {
                bb_perror_msg("ioctl");
@@ -167,26 +164,26 @@ static int parse_args(int argc, char **argv, int cmd, struct ip_tunnel_parm *p)
                        if (strcmp(*argv, "ipip") == 0 ||
                            strcmp(*argv, "ip/ip") == 0) {
                                if (p->iph.protocol && p->iph.protocol != IPPROTO_IPIP) {
-                                       bb_error_msg("You managed to ask for more than one tunnel mode.");
+                                       bb_error_msg("you managed to ask for more than one tunnel mode");
                                        exit(-1);
                                }
                                p->iph.protocol = IPPROTO_IPIP;
                        } else if (strcmp(*argv, "gre") == 0 ||
                                   strcmp(*argv, "gre/ip") == 0) {
                                if (p->iph.protocol && p->iph.protocol != IPPROTO_GRE) {
-                                       bb_error_msg("You managed to ask for more than one tunnel mode.");
+                                       bb_error_msg("you managed to ask for more than one tunnel mode");
                                        exit(-1);
                                }
                                p->iph.protocol = IPPROTO_GRE;
                        } else if (strcmp(*argv, "sit") == 0 ||
                                   strcmp(*argv, "ipv6/ip") == 0) {
                                if (p->iph.protocol && p->iph.protocol != IPPROTO_IPV6) {
-                                       bb_error_msg("You managed to ask for more than one tunnel mode.");
+                                       bb_error_msg("you managed to ask for more than one tunnel mode");
                                        exit(-1);
                                }
                                p->iph.protocol = IPPROTO_IPV6;
                        } else {
-                               bb_error_msg("Cannot guess tunnel mode.");
+                               bb_error_msg("cannot guess tunnel mode");
                                exit(-1);
                        }
                } else if (strcmp(*argv, "key") == 0) {
@@ -263,18 +260,18 @@ static int parse_args(int argc, char **argv, int cmd, struct ip_tunnel_parm *p)
                        NEXT_ARG();
                        if (strcmp(*argv, "inherit") != 0) {
                                if (get_unsigned(&uval, *argv, 0))
-                                       invarg("invalid TTL\n", *argv);
+                                       invarg(*argv, "TTL");
                                if (uval > 255)
-                                       invarg("TTL must be <=255\n", *argv);
+                                       invarg(*argv, "TTL must be <=255");
                                p->iph.ttl = uval;
                        }
                } else if (strcmp(*argv, "tos") == 0 ||
                           matches(*argv, "dsfield") == 0) {
-                       __u32 uval;
+                       uint32_t uval;
                        NEXT_ARG();
                        if (strcmp(*argv, "inherit") != 0) {
                                if (rtnl_dsfield_a2n(&uval, *argv))
-                                       invarg("bad TOS value", *argv);
+                                       invarg(*argv, "TOS");
                                p->iph.tos = uval;
                        } else
                                p->iph.tos = 1;
@@ -309,7 +306,7 @@ static int parse_args(int argc, char **argv, int cmd, struct ip_tunnel_parm *p)
 
        if (p->iph.protocol == IPPROTO_IPIP || p->iph.protocol == IPPROTO_IPV6) {
                if ((p->i_flags & GRE_KEY) || (p->o_flags & GRE_KEY)) {
-                       bb_error_msg("Keys are not allowed with ipip and sit.");
+                       bb_error_msg("keys are not allowed with ipip and sit");
                        return -1;
                }
        }
@@ -329,7 +326,7 @@ static int parse_args(int argc, char **argv, int cmd, struct ip_tunnel_parm *p)
                p->o_flags |= GRE_KEY;
        }
        if (IN_MULTICAST(ntohl(p->iph.daddr)) && !p->iph.saddr) {
-               bb_error_msg("Broadcast tunnel requires a source address.");
+               bb_error_msg("broadcast tunnel requires a source address");
                return -1;
        }
        return 0;
@@ -412,46 +409,46 @@ static void print_tunnel(struct ip_tunnel_parm *p)
        if (p->iph.tos) {
                SPRINT_BUF(b1);
                printf(" tos");
-               if (p->iph.tos&1)
+               if (p->iph.tos & 1)
                        printf(" inherit");
-               if (p->iph.tos&~1)
-                       printf("%c%s ", p->iph.tos&1 ? '/' : ' ',
-                              rtnl_dsfield_n2a(p->iph.tos&~1, b1, sizeof(b1)));
+               if (p->iph.tos & ~1)
+                       printf("%c%s ", p->iph.tos & 1 ? '/' : ' ',
+                              rtnl_dsfield_n2a(p->iph.tos & ~1, b1, sizeof(b1)));
        }
-       if (!(p->iph.frag_off&htons(IP_DF)))
+       if (!(p->iph.frag_off & htons(IP_DF)))
                printf(" nopmtudisc");
 
-       if ((p->i_flags&GRE_KEY) && (p->o_flags&GRE_KEY) && p->o_key == p->i_key)
+       if ((p->i_flags & GRE_KEY) && (p->o_flags & GRE_KEY) && p->o_key == p->i_key)
                printf(" key %s", s3);
-       else if ((p->i_flags|p->o_flags)&GRE_KEY) {
-               if (p->i_flags&GRE_KEY)
+       else if ((p->i_flags | p->o_flags) & GRE_KEY) {
+               if (p->i_flags & GRE_KEY)
                        printf(" ikey %s ", s3);
-               if (p->o_flags&GRE_KEY)
+               if (p->o_flags & GRE_KEY)
                        printf(" okey %s ", s4);
        }
 
-       if (p->i_flags&GRE_SEQ)
+       if (p->i_flags & GRE_SEQ)
                printf("%s  Drop packets out of sequence.\n", _SL_);
-       if (p->i_flags&GRE_CSUM)
+       if (p->i_flags & GRE_CSUM)
                printf("%s  Checksum in received packet is required.", _SL_);
-       if (p->o_flags&GRE_SEQ)
+       if (p->o_flags & GRE_SEQ)
                printf("%s  Sequence packets on output.", _SL_);
-       if (p->o_flags&GRE_CSUM)
+       if (p->o_flags & GRE_CSUM)
                printf("%s  Checksum output packets.", _SL_);
 }
 
 static int do_tunnels_list(struct ip_tunnel_parm *p)
 {
        char name[IFNAMSIZ];
-       unsigned long  rx_bytes, rx_packets, rx_errs, rx_drops,
-       rx_fifo, rx_frame,
-       tx_bytes, tx_packets, tx_errs, tx_drops,
-       tx_fifo, tx_colls, tx_carrier, rx_multi;
+       unsigned long rx_bytes, rx_packets, rx_errs, rx_drops,
+               rx_fifo, rx_frame,
+               tx_bytes, tx_packets, tx_errs, tx_drops,
+               tx_fifo, tx_colls, tx_carrier, rx_multi;
        int type;
        struct ip_tunnel_parm p1;
-
        char buf[512];
        FILE *fp = fopen("/proc/net/dev", "r");
+
        if (fp == NULL) {
                perror("fopen");
                return -1;
@@ -462,13 +459,15 @@ static int do_tunnels_list(struct ip_tunnel_parm *p)
 
        while (fgets(buf, sizeof(buf), fp) != NULL) {
                char *ptr;
-               buf[sizeof(buf) - 1] = 0;
-               if ((ptr = strchr(buf, ':')) == NULL ||
+
+               /*buf[sizeof(buf) - 1] = 0; - fgets is safe anyway */
+               ptr = strchr(buf, ':');
+               if (ptr == NULL ||
                    (*ptr++ = 0, sscanf(buf, "%s", name) != 1)) {
-                       bb_error_msg("Wrong format of /proc/net/dev. Sorry.");
+                       bb_error_msg("wrong format of /proc/net/dev. Sorry");
                        return -1;
                }
-               if (sscanf(ptr, "%ld%ld%ld%ld%ld%ld%ld%*d%ld%ld%ld%ld%ld%ld%ld",
+               if (sscanf(ptr, "%lu%lu%lu%lu%lu%lu%lu%*d%lu%lu%lu%lu%lu%lu%lu",
                           &rx_bytes, &rx_packets, &rx_errs, &rx_drops,
                           &rx_fifo, &rx_frame, &rx_multi,
                           &tx_bytes, &tx_packets, &tx_errs, &tx_drops,
@@ -478,7 +477,7 @@ static int do_tunnels_list(struct ip_tunnel_parm *p)
                        continue;
                type = do_ioctl_get_iftype(name);
                if (type == -1) {
-                       bb_error_msg("Failed to get type of [%s]", name);
+                       bb_error_msg("failed to get type of [%s]", name);
                        continue;
                }
                if (type != ARPHRD_TUNNEL && type != ARPHRD_IPGRE && type != ARPHRD_SIT)
@@ -493,7 +492,7 @@ static int do_tunnels_list(struct ip_tunnel_parm *p)
                    (p->i_key && p1.i_key != p->i_key))
                        continue;
                print_tunnel(&p1);
-               printf("\n");
+               puts("");
        }
        return 0;
 }
@@ -524,7 +523,7 @@ static int do_show(int argc, char **argv)
                return -1;
 
        print_tunnel(&p);
-       printf("\n");
+       puts("");
        return 0;
 }
 
@@ -544,6 +543,5 @@ int do_iptunnel(int argc, char **argv)
        } else
                return do_show(0, NULL);
 
-       bb_error_msg("Command \"%s\" is unknown.", *argv);
-       exit(-1);
+       bb_error_msg_and_die("command \"%s\" is unknown", *argv);
 }