mirror of
				https://git.proxmox.com/git/mirror_iproute2
				synced 2025-10-31 13:32:34 +00:00 
			
		
		
		
	 3572e01a09
			
		
	
	
		3572e01a09
		
	
	
	
	
		
			
			Not all callers want parse_action_control*() to advance the
arguments. For instance act_parse_police() does the argument
advancing itself.
Fixes: e67aba5595 ("tc: actions: add helpers to parse and print control actions")
Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
		
	
			
		
			
				
	
	
		
			841 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			841 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * m_pedit.c		generic packet editor actions module
 | |
|  *
 | |
|  *		This program is free software; you can distribute it and/or
 | |
|  *		modify it under the terms of the GNU General Public License
 | |
|  *		as published by the Free Software Foundation; either version
 | |
|  *		2 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * Authors:  J Hadi Salim (hadi@cyberus.ca)
 | |
|  *
 | |
|  * TODO:
 | |
|  *	1) Big endian broken in some spots
 | |
|  *	2) A lot of this stuff was added on the fly; get a big double-double
 | |
|  *	and clean it up at some point.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <unistd.h>
 | |
| #include <fcntl.h>
 | |
| #include <sys/socket.h>
 | |
| #include <netinet/in.h>
 | |
| #include <arpa/inet.h>
 | |
| #include <string.h>
 | |
| #include <dlfcn.h>
 | |
| #include "utils.h"
 | |
| #include "tc_util.h"
 | |
| #include "m_pedit.h"
 | |
| #include "rt_names.h"
 | |
| 
 | |
| static struct m_pedit_util *pedit_list;
 | |
| static int pedit_debug;
 | |
| 
 | |
| static void explain(void)
 | |
| {
 | |
| 	fprintf(stderr, "Usage: ... pedit munge [ex] <MUNGE> [CONTROL]\n");
 | |
| 	fprintf(stderr,
 | |
| 		"Where: MUNGE := <RAW>|<LAYERED>\n"
 | |
| 		"\t<RAW>:= <OFFSETC>[ATC]<CMD>\n \t\tOFFSETC:= offset <offval> <u8|u16|u32>\n"
 | |
| 		"\t\tATC:= at <atval> offmask <maskval> shift <shiftval>\n"
 | |
| 		"\t\tNOTE: offval is byte offset, must be multiple of 4\n"
 | |
| 		"\t\tNOTE: maskval is a 32 bit hex number\n \t\tNOTE: shiftval is a shift value\n"
 | |
| 		"\t\tCMD:= clear | invert | set <setval>| add <addval> | retain\n"
 | |
| 		"\t<LAYERED>:= ip <ipdata> | ip6 <ip6data>\n"
 | |
| 		" \t\t| udp <udpdata> | tcp <tcpdata> | icmp <icmpdata>\n"
 | |
| 		"\tCONTROL:= reclassify | pipe | drop | continue | pass |\n"
 | |
| 		"\t          goto chain <CHAIN_INDEX>\n"
 | |
| 		"\tNOTE: if 'ex' is set, extended functionality will be supported (kernel >= 4.11)\n"
 | |
| 		"For Example usage look at the examples directory\n");
 | |
| 
 | |
| }
 | |
| 
 | |
| static void usage(void)
 | |
| {
 | |
| 	explain();
 | |
| 	exit(-1);
 | |
| }
 | |
| 
 | |
| static int pedit_parse_nopopt(int *argc_p, char ***argv_p,
 | |
| 			      struct m_pedit_sel *sel,
 | |
| 			      struct m_pedit_key *tkey)
 | |
| {
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc) {
 | |
| 		fprintf(stderr,
 | |
| 			"Unknown action  hence option \"%s\" is unparsable\n",
 | |
| 			*argv);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	return 0;
 | |
| 
 | |
| }
 | |
| 
 | |
| static struct m_pedit_util *get_pedit_kind(const char *str)
 | |
| {
 | |
| 	static void *pBODY;
 | |
| 	void *dlh;
 | |
| 	char buf[256];
 | |
| 	struct m_pedit_util *p;
 | |
| 
 | |
| 	for (p = pedit_list; p; p = p->next) {
 | |
| 		if (strcmp(p->id, str) == 0)
 | |
| 			return p;
 | |
| 	}
 | |
| 
 | |
| 	snprintf(buf, sizeof(buf), "p_%s.so", str);
 | |
| 	dlh = dlopen(buf, RTLD_LAZY);
 | |
| 	if (dlh == NULL) {
 | |
| 		dlh = pBODY;
 | |
| 		if (dlh == NULL) {
 | |
| 			dlh = pBODY = dlopen(NULL, RTLD_LAZY);
 | |
| 			if (dlh == NULL)
 | |
| 				goto noexist;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	snprintf(buf, sizeof(buf), "p_pedit_%s", str);
 | |
| 	p = dlsym(dlh, buf);
 | |
| 	if (p == NULL)
 | |
| 		goto noexist;
 | |
| 
 | |
| reg:
 | |
| 	p->next = pedit_list;
 | |
| 	pedit_list = p;
 | |
| 	return p;
 | |
| 
 | |
| noexist:
 | |
| 	p = calloc(1, sizeof(*p));
 | |
| 	if (p) {
 | |
| 		strncpy(p->id, str, sizeof(p->id) - 1);
 | |
| 		p->parse_peopt = pedit_parse_nopopt;
 | |
| 		goto reg;
 | |
| 	}
 | |
| 	return p;
 | |
| }
 | |
| 
 | |
| int pack_key(struct m_pedit_sel *_sel, struct m_pedit_key *tkey)
 | |
| {
 | |
| 	struct tc_pedit_sel *sel = &_sel->sel;
 | |
| 	struct m_pedit_key_ex *keys_ex = _sel->keys_ex;
 | |
| 	int hwm = sel->nkeys;
 | |
| 
 | |
| 	if (hwm >= MAX_OFFS)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (tkey->off % 4) {
 | |
| 		fprintf(stderr, "offsets MUST be in 32 bit boundaries\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	sel->keys[hwm].val = tkey->val;
 | |
| 	sel->keys[hwm].mask = tkey->mask;
 | |
| 	sel->keys[hwm].off = tkey->off;
 | |
| 	sel->keys[hwm].at = tkey->at;
 | |
| 	sel->keys[hwm].offmask = tkey->offmask;
 | |
| 	sel->keys[hwm].shift = tkey->shift;
 | |
| 
 | |
| 	if (_sel->extended) {
 | |
| 		keys_ex[hwm].htype = tkey->htype;
 | |
| 		keys_ex[hwm].cmd = tkey->cmd;
 | |
| 	} else {
 | |
| 		if (tkey->htype != TCA_PEDIT_KEY_EX_HDR_TYPE_NETWORK ||
 | |
| 		    tkey->cmd != TCA_PEDIT_KEY_EX_CMD_SET) {
 | |
| 			fprintf(stderr,
 | |
| 				"Munge parameters not supported. Use 'pedit ex munge ...'.\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	sel->nkeys++;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int pack_key32(__u32 retain, struct m_pedit_sel *sel,
 | |
| 	       struct m_pedit_key *tkey)
 | |
| {
 | |
| 	if (tkey->off > (tkey->off & ~3)) {
 | |
| 		fprintf(stderr,
 | |
| 			"pack_key32: 32 bit offsets must begin in 32bit boundaries\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	tkey->val = htonl(tkey->val & retain);
 | |
| 	tkey->mask = htonl(tkey->mask | ~retain);
 | |
| 	return pack_key(sel, tkey);
 | |
| }
 | |
| 
 | |
| int pack_key16(__u32 retain, struct m_pedit_sel *sel,
 | |
| 	       struct m_pedit_key *tkey)
 | |
| {
 | |
| 	int ind, stride;
 | |
| 	__u32 m[4] = { 0x0000FFFF, 0xFF0000FF, 0xFFFF0000 };
 | |
| 
 | |
| 	if (tkey->val > 0xFFFF || tkey->mask > 0xFFFF) {
 | |
| 		fprintf(stderr, "pack_key16 bad value\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	ind = tkey->off & 3;
 | |
| 
 | |
| 	if (ind == 3) {
 | |
| 		fprintf(stderr, "pack_key16 bad index value %d\n", ind);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	stride = 8 * (2 - ind);
 | |
| 	tkey->val = htonl((tkey->val & retain) << stride);
 | |
| 	tkey->mask = htonl(((tkey->mask | ~retain) << stride) | m[ind]);
 | |
| 
 | |
| 	tkey->off &= ~3;
 | |
| 
 | |
| 	if (pedit_debug)
 | |
| 		printf("pack_key16: Final val %08x mask %08x\n",
 | |
| 		       tkey->val, tkey->mask);
 | |
| 	return pack_key(sel, tkey);
 | |
| 
 | |
| }
 | |
| 
 | |
| int pack_key8(__u32 retain, struct m_pedit_sel *sel, struct m_pedit_key *tkey)
 | |
| {
 | |
| 	int ind, stride;
 | |
| 	__u32 m[4] = { 0x00FFFFFF, 0xFF00FFFF, 0xFFFF00FF, 0xFFFFFF00 };
 | |
| 
 | |
| 	if (tkey->val > 0xFF || tkey->mask > 0xFF) {
 | |
| 		fprintf(stderr, "pack_key8 bad value (val %x mask %x\n",
 | |
| 			tkey->val, tkey->mask);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	ind = tkey->off & 3;
 | |
| 
 | |
| 	stride = 8 * (3 - ind);
 | |
| 	tkey->val = htonl((tkey->val & retain) << stride);
 | |
| 	tkey->mask = htonl(((tkey->mask | ~retain) << stride) | m[ind]);
 | |
| 
 | |
| 	tkey->off &= ~3;
 | |
| 
 | |
| 	if (pedit_debug)
 | |
| 		printf("pack_key8: Final word off %d  val %08x mask %08x\n",
 | |
| 		       tkey->off, tkey->val, tkey->mask);
 | |
| 	return pack_key(sel, tkey);
 | |
| }
 | |
| 
 | |
| static int pack_mac(struct m_pedit_sel *sel, struct m_pedit_key *tkey,
 | |
| 		    __u8 *mac)
 | |
| {
 | |
| 	int ret = 0;
 | |
| 
 | |
| 	if (!(tkey->off & 0x3)) {
 | |
| 		tkey->mask = 0;
 | |
| 		tkey->val = ntohl(*((__u32 *)mac));
 | |
| 		ret |= pack_key32(~0, sel, tkey);
 | |
| 
 | |
| 		tkey->off += 4;
 | |
| 		tkey->mask = 0;
 | |
| 		tkey->val = ntohs(*((__u16 *)&mac[4]));
 | |
| 		ret |= pack_key16(~0, sel, tkey);
 | |
| 	} else if (!(tkey->off & 0x1)) {
 | |
| 		tkey->mask = 0;
 | |
| 		tkey->val = ntohs(*((__u16 *)mac));
 | |
| 		ret |= pack_key16(~0, sel, tkey);
 | |
| 
 | |
| 		tkey->off += 4;
 | |
| 		tkey->mask = 0;
 | |
| 		tkey->val = ntohl(*((__u32 *)(mac + 2)));
 | |
| 		ret |= pack_key32(~0, sel, tkey);
 | |
| 	} else {
 | |
| 		fprintf(stderr,
 | |
| 			"pack_mac: mac offsets must begin in 32bit or 16bit boundaries\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| static int pack_ipv6(struct m_pedit_sel *sel, struct m_pedit_key *tkey,
 | |
| 		     __u32 *ipv6)
 | |
| {
 | |
| 	int ret = 0;
 | |
| 	int i;
 | |
| 
 | |
| 	if (tkey->off & 0x3) {
 | |
| 		fprintf(stderr,
 | |
| 			"pack_ipv6: IPv6 offsets must begin in 32bit boundaries\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	for (i = 0; i < 4; i++) {
 | |
| 		tkey->mask = 0;
 | |
| 		tkey->val = ntohl(ipv6[i]);
 | |
| 
 | |
| 		ret = pack_key32(~0, sel, tkey);
 | |
| 		if (ret)
 | |
| 			return ret;
 | |
| 
 | |
| 		tkey->off += 4;
 | |
| 	}
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int parse_val(int *argc_p, char ***argv_p, __u32 *val, int type)
 | |
| {
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc <= 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (type == TINT)
 | |
| 		return get_integer((int *)val, *argv, 0);
 | |
| 
 | |
| 	if (type == TU32)
 | |
| 		return get_u32(val, *argv, 0);
 | |
| 
 | |
| 	if (type == TIPV4) {
 | |
| 		inet_prefix addr;
 | |
| 
 | |
| 		if (get_prefix_1(&addr, *argv, AF_INET))
 | |
| 			return -1;
 | |
| 
 | |
| 		*val = addr.data[0];
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	if (type == TIPV6) {
 | |
| 		inet_prefix addr;
 | |
| 
 | |
| 		if (get_prefix_1(&addr, *argv, AF_INET6))
 | |
| 			return -1;
 | |
| 
 | |
| 		memcpy(val, addr.data, addr.bytelen);
 | |
| 
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	if (type == TMAC) {
 | |
| #define MAC_ALEN 6
 | |
| 		int ret = ll_addr_a2n((char *)val, MAC_ALEN, *argv);
 | |
| 
 | |
| 		if (ret == MAC_ALEN)
 | |
| 			return 0;
 | |
| 	}
 | |
| 
 | |
| 	return -1;
 | |
| }
 | |
| 
 | |
| int parse_cmd(int *argc_p, char ***argv_p, __u32 len, int type, __u32 retain,
 | |
| 	      struct m_pedit_sel *sel, struct m_pedit_key *tkey)
 | |
| {
 | |
| 	__u32 mask[4] = { 0 };
 | |
| 	__u32 val[4] = { 0 };
 | |
| 	__u32 *m = &mask[0];
 | |
| 	__u32 *v = &val[0];
 | |
| 	__u32 o = 0xFF;
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc <= 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (pedit_debug)
 | |
| 		printf("parse_cmd argc %d %s offset %d length %d\n",
 | |
| 		       argc, *argv, tkey->off, len);
 | |
| 
 | |
| 	if (len == 2)
 | |
| 		o = 0xFFFF;
 | |
| 	if (len == 4)
 | |
| 		o = 0xFFFFFFFF;
 | |
| 
 | |
| 	if (matches(*argv, "invert") == 0) {
 | |
| 		*v = *m = o;
 | |
| 	} else if (matches(*argv, "set") == 0 ||
 | |
| 		   matches(*argv, "add") == 0) {
 | |
| 		if (matches(*argv, "add") == 0)
 | |
| 			tkey->cmd = TCA_PEDIT_KEY_EX_CMD_ADD;
 | |
| 
 | |
| 		if (!sel->extended && tkey->cmd) {
 | |
| 			fprintf(stderr,
 | |
| 				"Non extended mode. only 'set' command is supported\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_val(&argc, &argv, val, type))
 | |
| 			return -1;
 | |
| 	} else if (matches(*argv, "preserve") == 0) {
 | |
| 		retain = 0;
 | |
| 	} else {
 | |
| 		if (matches(*argv, "clear") != 0)
 | |
| 			return -1;
 | |
| 	}
 | |
| 
 | |
| 	argc--;
 | |
| 	argv++;
 | |
| 
 | |
| 	if (argc && matches(*argv, "retain") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_val(&argc, &argv, &retain, TU32))
 | |
| 			return -1;
 | |
| 		argc--;
 | |
| 		argv++;
 | |
| 	}
 | |
| 
 | |
| 	if (len > 4 && retain != ~0) {
 | |
| 		fprintf(stderr,
 | |
| 			"retain is not supported for fields longer the 32 bits\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (type == TMAC) {
 | |
| 		res = pack_mac(sel, tkey, (__u8 *)val);
 | |
| 		goto done;
 | |
| 	}
 | |
| 
 | |
| 	if (type == TIPV6) {
 | |
| 		res = pack_ipv6(sel, tkey, val);
 | |
| 		goto done;
 | |
| 	}
 | |
| 
 | |
| 	tkey->val = *v;
 | |
| 	tkey->mask = *m;
 | |
| 
 | |
| 	if (type == TIPV4)
 | |
| 		tkey->val = ntohl(tkey->val);
 | |
| 
 | |
| 	if (len == 1) {
 | |
| 		res = pack_key8(retain, sel, tkey);
 | |
| 		goto done;
 | |
| 	}
 | |
| 	if (len == 2) {
 | |
| 		res = pack_key16(retain, sel, tkey);
 | |
| 		goto done;
 | |
| 	}
 | |
| 	if (len == 4) {
 | |
| 		res = pack_key32(retain, sel, tkey);
 | |
| 		goto done;
 | |
| 	}
 | |
| 
 | |
| 	return -1;
 | |
| done:
 | |
| 	if (pedit_debug)
 | |
| 		printf("parse_cmd done argc %d %s offset %d length %d\n",
 | |
| 		       argc, *argv, tkey->off, len);
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| 
 | |
| }
 | |
| 
 | |
| int parse_offset(int *argc_p, char ***argv_p, struct m_pedit_sel *sel,
 | |
| 		 struct m_pedit_key *tkey)
 | |
| {
 | |
| 	int off;
 | |
| 	__u32 len, retain;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	int res = -1;
 | |
| 
 | |
| 	if (argc <= 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_integer(&off, *argv, 0))
 | |
| 		return -1;
 | |
| 	tkey->off = off;
 | |
| 
 | |
| 	argc--;
 | |
| 	argv++;
 | |
| 
 | |
| 	if (argc <= 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (matches(*argv, "u32") == 0) {
 | |
| 		len = 4;
 | |
| 		retain = 0xFFFFFFFF;
 | |
| 		goto done;
 | |
| 	}
 | |
| 	if (matches(*argv, "u16") == 0) {
 | |
| 		len = 2;
 | |
| 		retain = 0xffff;
 | |
| 		goto done;
 | |
| 	}
 | |
| 	if (matches(*argv, "u8") == 0) {
 | |
| 		len = 1;
 | |
| 		retain = 0xff;
 | |
| 		goto done;
 | |
| 	}
 | |
| 
 | |
| 	return -1;
 | |
| 
 | |
| done:
 | |
| 
 | |
| 	NEXT_ARG();
 | |
| 
 | |
| 	/* [at <someval> offmask <maskval> shift <shiftval>] */
 | |
| 	if (matches(*argv, "at") == 0) {
 | |
| 
 | |
| 		__u32 atv = 0, offmask = 0x0, shift = 0;
 | |
| 
 | |
| 		NEXT_ARG();
 | |
| 		if (get_u32(&atv, *argv, 0))
 | |
| 			return -1;
 | |
| 		tkey->at = atv;
 | |
| 
 | |
| 		NEXT_ARG();
 | |
| 
 | |
| 		if (get_u32(&offmask, *argv, 16))
 | |
| 			return -1;
 | |
| 		tkey->offmask = offmask;
 | |
| 
 | |
| 		NEXT_ARG();
 | |
| 
 | |
| 		if (get_u32(&shift, *argv, 0))
 | |
| 			return -1;
 | |
| 		tkey->shift = shift;
 | |
| 
 | |
| 		NEXT_ARG();
 | |
| 	}
 | |
| 
 | |
| 	res = parse_cmd(&argc, &argv, len, TU32, retain, sel, tkey);
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_munge(int *argc_p, char ***argv_p, struct m_pedit_sel *sel)
 | |
| {
 | |
| 	struct m_pedit_key tkey = {};
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	int res = -1;
 | |
| 
 | |
| 	if (argc <= 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (matches(*argv, "offset") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_offset(&argc, &argv, sel, &tkey);
 | |
| 		goto done;
 | |
| 	} else {
 | |
| 		char k[FILTER_NAMESZ];
 | |
| 		struct m_pedit_util *p = NULL;
 | |
| 
 | |
| 		strncpy(k, *argv, sizeof(k) - 1);
 | |
| 
 | |
| 		if (argc > 0) {
 | |
| 			p = get_pedit_kind(k);
 | |
| 			if (p == NULL)
 | |
| 				goto bad_val;
 | |
| 			NEXT_ARG();
 | |
| 			res = p->parse_peopt(&argc, &argv, sel, &tkey);
 | |
| 			if (res < 0) {
 | |
| 				fprintf(stderr, "bad pedit parsing\n");
 | |
| 				goto bad_val;
 | |
| 			}
 | |
| 			goto done;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| bad_val:
 | |
| 	return -1;
 | |
| 
 | |
| done:
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int pedit_keys_ex_getattr(struct rtattr *attr,
 | |
| 				 struct m_pedit_key_ex *keys_ex, int n)
 | |
| {
 | |
| 	struct rtattr *i;
 | |
| 	int rem = RTA_PAYLOAD(attr);
 | |
| 	struct rtattr *tb[TCA_PEDIT_KEY_EX_MAX + 1];
 | |
| 	struct m_pedit_key_ex *k = keys_ex;
 | |
| 
 | |
| 	for (i = RTA_DATA(attr); RTA_OK(i, rem); i = RTA_NEXT(i, rem)) {
 | |
| 		if (!n)
 | |
| 			return -1;
 | |
| 
 | |
| 		if (i->rta_type != TCA_PEDIT_KEY_EX)
 | |
| 			return -1;
 | |
| 
 | |
| 		parse_rtattr_nested(tb, TCA_PEDIT_KEY_EX_MAX, i);
 | |
| 
 | |
| 		k->htype = rta_getattr_u16(tb[TCA_PEDIT_KEY_EX_HTYPE]);
 | |
| 		k->cmd = rta_getattr_u16(tb[TCA_PEDIT_KEY_EX_CMD]);
 | |
| 
 | |
| 		k++;
 | |
| 		n--;
 | |
| 	}
 | |
| 
 | |
| 	return !!n;
 | |
| }
 | |
| 
 | |
| static int pedit_keys_ex_addattr(struct m_pedit_sel *sel, struct nlmsghdr *n)
 | |
| {
 | |
| 	struct m_pedit_key_ex *k = sel->keys_ex;
 | |
| 	struct rtattr *keys_start;
 | |
| 	int i;
 | |
| 
 | |
| 	if (!sel->extended)
 | |
| 		return 0;
 | |
| 
 | |
| 	keys_start = addattr_nest(n, MAX_MSG, TCA_PEDIT_KEYS_EX | NLA_F_NESTED);
 | |
| 
 | |
| 	for (i = 0; i < sel->sel.nkeys; i++) {
 | |
| 		struct rtattr *key_start;
 | |
| 
 | |
| 		key_start = addattr_nest(n, MAX_MSG,
 | |
| 					 TCA_PEDIT_KEY_EX | NLA_F_NESTED);
 | |
| 
 | |
| 		if (addattr16(n, MAX_MSG, TCA_PEDIT_KEY_EX_HTYPE, k->htype) ||
 | |
| 		    addattr16(n, MAX_MSG, TCA_PEDIT_KEY_EX_CMD, k->cmd)) {
 | |
| 			return -1;
 | |
| 		}
 | |
| 
 | |
| 		addattr_nest_end(n, key_start);
 | |
| 
 | |
| 		k++;
 | |
| 	}
 | |
| 
 | |
| 	addattr_nest_end(n, keys_start);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int parse_pedit(struct action_util *a, int *argc_p, char ***argv_p, int tca_id,
 | |
| 		struct nlmsghdr *n)
 | |
| {
 | |
| 	struct m_pedit_sel sel = {};
 | |
| 
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	int ok = 0, iok = 0;
 | |
| 	struct rtattr *tail;
 | |
| 
 | |
| 	while (argc > 0) {
 | |
| 		if (pedit_debug > 1)
 | |
| 			fprintf(stderr, "while pedit (%d:%s)\n", argc, *argv);
 | |
| 		if (matches(*argv, "pedit") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			ok++;
 | |
| 
 | |
| 			if (matches(*argv, "ex") == 0) {
 | |
| 				if (ok > 1) {
 | |
| 					fprintf(stderr,
 | |
| 						"'ex' must be before first 'munge'\n");
 | |
| 					explain();
 | |
| 					return -1;
 | |
| 				}
 | |
| 				sel.extended = true;
 | |
| 				NEXT_ARG();
 | |
| 			}
 | |
| 
 | |
| 			continue;
 | |
| 		} else if (matches(*argv, "help") == 0) {
 | |
| 			usage();
 | |
| 		} else if (matches(*argv, "munge") == 0) {
 | |
| 			if (!ok) {
 | |
| 				fprintf(stderr, "Bad pedit construct (%s)\n",
 | |
| 					*argv);
 | |
| 				explain();
 | |
| 				return -1;
 | |
| 			}
 | |
| 			NEXT_ARG();
 | |
| 
 | |
| 			if (parse_munge(&argc, &argv, &sel)) {
 | |
| 				fprintf(stderr, "Bad pedit construct (%s)\n",
 | |
| 					*argv);
 | |
| 				explain();
 | |
| 				return -1;
 | |
| 			}
 | |
| 			ok++;
 | |
| 		} else {
 | |
| 			break;
 | |
| 		}
 | |
| 
 | |
| 	}
 | |
| 
 | |
| 	if (!ok) {
 | |
| 		explain();
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	parse_action_control_dflt(&argc, &argv, &sel.sel.action, false, TC_ACT_OK);
 | |
| 
 | |
| 	NEXT_ARG_FWD();
 | |
| 	if (argc) {
 | |
| 		if (matches(*argv, "index") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (get_u32(&sel.sel.index, *argv, 10)) {
 | |
| 				fprintf(stderr, "Pedit: Illegal \"index\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			argc--;
 | |
| 			argv++;
 | |
| 			iok++;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	tail = NLMSG_TAIL(n);
 | |
| 	addattr_l(n, MAX_MSG, tca_id, NULL, 0);
 | |
| 	if (!sel.extended) {
 | |
| 		addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS, &sel,
 | |
| 			  sizeof(sel.sel) +
 | |
| 			  sel.sel.nkeys * sizeof(struct tc_pedit_key));
 | |
| 	} else {
 | |
| 		addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS_EX, &sel,
 | |
| 			  sizeof(sel.sel) +
 | |
| 			  sel.sel.nkeys * sizeof(struct tc_pedit_key));
 | |
| 
 | |
| 		pedit_keys_ex_addattr(&sel, n);
 | |
| 	}
 | |
| 
 | |
| 	tail->rta_len = (void *)NLMSG_TAIL(n) - (void *)tail;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| const char *pedit_htype_str[] = {
 | |
| 	[TCA_PEDIT_KEY_EX_HDR_TYPE_NETWORK] = "",
 | |
| 	[TCA_PEDIT_KEY_EX_HDR_TYPE_ETH] = "eth",
 | |
| 	[TCA_PEDIT_KEY_EX_HDR_TYPE_IP4] = "ipv4",
 | |
| 	[TCA_PEDIT_KEY_EX_HDR_TYPE_IP6] = "ipv6",
 | |
| 	[TCA_PEDIT_KEY_EX_HDR_TYPE_TCP] = "tcp",
 | |
| 	[TCA_PEDIT_KEY_EX_HDR_TYPE_UDP] = "udp",
 | |
| };
 | |
| 
 | |
| static void print_pedit_location(FILE *f,
 | |
| 				 enum pedit_header_type htype, __u32 off)
 | |
| {
 | |
| 	if (htype == TCA_PEDIT_KEY_EX_HDR_TYPE_NETWORK) {
 | |
| 		fprintf(f, "%d", (unsigned int)off);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	if (htype < ARRAY_SIZE(pedit_htype_str))
 | |
| 		fprintf(f, "%s", pedit_htype_str[htype]);
 | |
| 	else
 | |
| 		fprintf(f, "unknown(%d)", htype);
 | |
| 
 | |
| 	fprintf(f, "%c%d", (int)off  >= 0 ? '+' : '-', abs((int)off));
 | |
| }
 | |
| 
 | |
| int print_pedit(struct action_util *au, FILE *f, struct rtattr *arg)
 | |
| {
 | |
| 	struct tc_pedit_sel *sel;
 | |
| 	struct rtattr *tb[TCA_PEDIT_MAX + 1];
 | |
| 	struct m_pedit_key_ex *keys_ex = NULL;
 | |
| 
 | |
| 	if (arg == NULL)
 | |
| 		return -1;
 | |
| 
 | |
| 	parse_rtattr_nested(tb, TCA_PEDIT_MAX, arg);
 | |
| 
 | |
| 	if (!tb[TCA_PEDIT_PARMS] && !tb[TCA_PEDIT_PARMS_EX]) {
 | |
| 		fprintf(f, "[NULL pedit parameters]");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (tb[TCA_PEDIT_PARMS]) {
 | |
| 		sel = RTA_DATA(tb[TCA_PEDIT_PARMS]);
 | |
| 	} else {
 | |
| 		int err;
 | |
| 
 | |
| 		sel = RTA_DATA(tb[TCA_PEDIT_PARMS_EX]);
 | |
| 
 | |
| 		if (!tb[TCA_PEDIT_KEYS_EX]) {
 | |
| 			fprintf(f, "Netlink error\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 
 | |
| 		keys_ex = calloc(sel->nkeys, sizeof(*keys_ex));
 | |
| 		if (!keys_ex) {
 | |
| 			fprintf(f, "Out of memory\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 
 | |
| 		err = pedit_keys_ex_getattr(tb[TCA_PEDIT_KEYS_EX], keys_ex,
 | |
| 					    sel->nkeys);
 | |
| 		if (err) {
 | |
| 			fprintf(f, "Netlink error\n");
 | |
| 
 | |
| 			free(keys_ex);
 | |
| 			return -1;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	fprintf(f, " pedit ");
 | |
| 	print_action_control(f, "action ", sel->action, " ");
 | |
| 	fprintf(f,"keys %d\n ", sel->nkeys);
 | |
| 	fprintf(f, "\t index %u ref %d bind %d", sel->index, sel->refcnt,
 | |
| 		sel->bindcnt);
 | |
| 
 | |
| 	if (show_stats) {
 | |
| 		if (tb[TCA_PEDIT_TM]) {
 | |
| 			struct tcf_t *tm = RTA_DATA(tb[TCA_PEDIT_TM]);
 | |
| 
 | |
| 			print_tm(f, tm);
 | |
| 		}
 | |
| 	}
 | |
| 	if (sel->nkeys) {
 | |
| 		int i;
 | |
| 		struct tc_pedit_key *key = sel->keys;
 | |
| 		struct m_pedit_key_ex *key_ex = keys_ex;
 | |
| 
 | |
| 		for (i = 0; i < sel->nkeys; i++, key++) {
 | |
| 			enum pedit_header_type htype =
 | |
| 				TCA_PEDIT_KEY_EX_HDR_TYPE_NETWORK;
 | |
| 			enum pedit_cmd cmd = TCA_PEDIT_KEY_EX_CMD_SET;
 | |
| 
 | |
| 			if (keys_ex) {
 | |
| 				htype = key_ex->htype;
 | |
| 				cmd = key_ex->cmd;
 | |
| 
 | |
| 				key_ex++;
 | |
| 			}
 | |
| 
 | |
| 			fprintf(f, "\n\t key #%d", i);
 | |
| 
 | |
| 			fprintf(f, "  at ");
 | |
| 
 | |
| 			print_pedit_location(f, htype, key->off);
 | |
| 
 | |
| 			fprintf(f, ": %s %08x mask %08x",
 | |
| 				cmd ? "add" : "val",
 | |
| 				(unsigned int)ntohl(key->val),
 | |
| 				(unsigned int)ntohl(key->mask));
 | |
| 		}
 | |
| 	} else {
 | |
| 		fprintf(f, "\npedit %x keys %d is not LEGIT", sel->index,
 | |
| 			sel->nkeys);
 | |
| 	}
 | |
| 
 | |
| 	fprintf(f, "\n ");
 | |
| 
 | |
| 	free(keys_ex);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int pedit_print_xstats(struct action_util *au, FILE *f, struct rtattr *xstats)
 | |
| {
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| struct action_util pedit_action_util = {
 | |
| 	.id = "pedit",
 | |
| 	.parse_aopt = parse_pedit,
 | |
| 	.print_aopt = print_pedit,
 | |
| };
 |