mirror of
https://git.proxmox.com/git/mirror_iproute2
synced 2025-10-04 09:44:37 +00:00

dump more than TCA_ACT_MAX_PRIO actions per batch when the kernel supports it. Introduced keyword "since" for time based filtering of actions. Some example (we have 400 actions bound to 400 filters); at installation time. Using updated when tc setting the time of interest to 120 seconds earlier (we see 400 actions): prompt$ hackedtc actions ls action gact since 120000| grep index | wc -l 400 go get some coffee and wait for > 120 seconds and try again: prompt$ hackedtc actions ls action gact since 120000 | grep index | wc -l 0 Lets see a filter bound to one of these actions: .... filter pref 10 u32 filter pref 10 u32 fh 800: ht divisor 1 filter pref 10 u32 fh 800::800 order 2048 key ht 800 bkt 0 flowid 1:10 (rule hit 2 success 1) match 7f000002/ffffffff at 12 (success 1 ) action order 1: gact action pass random type none pass val 0 index 23 ref 2 bind 1 installed 1145 sec used 802 sec Action statistics: Sent 84 bytes 1 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0 ... that coffee took long, no? It was good. Now lets ping -c 1 127.0.0.2, then run the actions again: prompt$ hackedtc actions ls action gact since 120 | grep index | wc -l 1 More details please: prompt$ hackedtc -s actions ls action gact since 120000 action order 0: gact action pass random type none pass val 0 index 23 ref 2 bind 1 installed 1270 sec used 30 sec Action statistics: Sent 168 bytes 2 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0 And the filter? filter pref 10 u32 filter pref 10 u32 fh 800: ht divisor 1 filter pref 10 u32 fh 800::800 order 2048 key ht 800 bkt 0 flowid 1:10 (rule hit 4 success 2) match 7f000002/ffffffff at 12 (success 2 ) action order 1: gact action pass random type none pass val 0 index 23 ref 2 bind 1 installed 1324 sec used 84 sec Action statistics: Sent 168 bytes 2 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0 Signed-off-by: Jamal Hadi Salim <jhs@mojatatu.com>
186 lines
4.3 KiB
C
186 lines
4.3 KiB
C
/*
|
|
* f_tcindex.c Traffic control index filter
|
|
*
|
|
* Written 1998,1999 by Werner Almesberger
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <syslog.h>
|
|
#include <fcntl.h>
|
|
#include <string.h>
|
|
#include <netinet/in.h>
|
|
|
|
#include "utils.h"
|
|
#include "tc_util.h"
|
|
|
|
static void explain(void)
|
|
{
|
|
fprintf(stderr," Usage: ... tcindex [ hash SIZE ] [ mask MASK ] [ shift SHIFT ]\n");
|
|
fprintf(stderr, " [ pass_on | fall_through ]\n");
|
|
fprintf(stderr," [ classid CLASSID ] [ action ACTION_SPEC ]\n");
|
|
}
|
|
|
|
static int tcindex_parse_opt(struct filter_util *qu, char *handle, int argc,
|
|
char **argv, struct nlmsghdr *n)
|
|
{
|
|
struct tcmsg *t = NLMSG_DATA(n);
|
|
struct rtattr *tail;
|
|
char *end;
|
|
|
|
if (handle) {
|
|
t->tcm_handle = strtoul(handle, &end, 0);
|
|
if (*end) {
|
|
fprintf(stderr, "Illegal filter ID\n");
|
|
return -1;
|
|
}
|
|
}
|
|
if (!argc) return 0;
|
|
tail = NLMSG_TAIL(n);
|
|
addattr_l(n, 4096, TCA_OPTIONS, NULL, 0);
|
|
while (argc) {
|
|
if (!strcmp(*argv, "hash")) {
|
|
int hash;
|
|
|
|
NEXT_ARG();
|
|
hash = strtoul(*argv, &end, 0);
|
|
if (*end || !hash || hash > 0x10000) {
|
|
explain();
|
|
return -1;
|
|
}
|
|
addattr_l(n, 4096, TCA_TCINDEX_HASH, &hash,
|
|
sizeof(hash));
|
|
} else if (!strcmp(*argv,"mask")) {
|
|
__u16 mask;
|
|
|
|
NEXT_ARG();
|
|
mask = strtoul(*argv, &end, 0);
|
|
if (*end) {
|
|
explain();
|
|
return -1;
|
|
}
|
|
addattr_l(n, 4096, TCA_TCINDEX_MASK, &mask,
|
|
sizeof(mask));
|
|
} else if (!strcmp(*argv,"shift")) {
|
|
int shift;
|
|
|
|
NEXT_ARG();
|
|
shift = strtoul(*argv, &end, 0);
|
|
if (*end) {
|
|
explain();
|
|
return -1;
|
|
}
|
|
addattr_l(n, 4096, TCA_TCINDEX_SHIFT, &shift,
|
|
sizeof(shift));
|
|
} else if (!strcmp(*argv,"fall_through")) {
|
|
int value = 1;
|
|
|
|
addattr_l(n, 4096, TCA_TCINDEX_FALL_THROUGH, &value,
|
|
sizeof(value));
|
|
} else if (!strcmp(*argv,"pass_on")) {
|
|
int value = 0;
|
|
|
|
addattr_l(n, 4096, TCA_TCINDEX_FALL_THROUGH, &value,
|
|
sizeof(value));
|
|
} else if (!strcmp(*argv,"classid")) {
|
|
__u32 handle;
|
|
|
|
NEXT_ARG();
|
|
if (get_tc_classid(&handle, *argv)) {
|
|
fprintf(stderr, "Illegal \"classid\"\n");
|
|
return -1;
|
|
}
|
|
addattr_l(n, 4096, TCA_TCINDEX_CLASSID, &handle, 4);
|
|
} else if (!strcmp(*argv,"police")) {
|
|
NEXT_ARG();
|
|
if (parse_police(&argc, &argv, TCA_TCINDEX_POLICE, n)) {
|
|
fprintf(stderr, "Illegal \"police\"\n");
|
|
return -1;
|
|
}
|
|
continue;
|
|
} else if (!strcmp(*argv,"action")) {
|
|
NEXT_ARG();
|
|
if (parse_action(&argc, &argv, TCA_TCINDEX_ACT, n)) {
|
|
fprintf(stderr, "Illegal \"action\"\n");
|
|
return -1;
|
|
}
|
|
continue;
|
|
} else {
|
|
explain();
|
|
return -1;
|
|
}
|
|
argc--;
|
|
argv++;
|
|
}
|
|
tail->rta_len = (void *) NLMSG_TAIL(n) - (void *) tail;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tcindex_print_opt(struct filter_util *qu, FILE *f,
|
|
struct rtattr *opt, __u32 handle)
|
|
{
|
|
struct rtattr *tb[TCA_TCINDEX_MAX+1];
|
|
|
|
if (opt == NULL)
|
|
return 0;
|
|
|
|
parse_rtattr_nested(tb, TCA_TCINDEX_MAX, opt);
|
|
|
|
if (handle != ~0) fprintf(f, "handle 0x%04x ", handle);
|
|
if (tb[TCA_TCINDEX_HASH]) {
|
|
__u16 hash;
|
|
|
|
if (RTA_PAYLOAD(tb[TCA_TCINDEX_HASH]) < sizeof(hash))
|
|
return -1;
|
|
hash = rta_getattr_u16(tb[TCA_TCINDEX_HASH]);
|
|
fprintf(f, "hash %d ", hash);
|
|
}
|
|
if (tb[TCA_TCINDEX_MASK]) {
|
|
__u16 mask;
|
|
|
|
if (RTA_PAYLOAD(tb[TCA_TCINDEX_MASK]) < sizeof(mask))
|
|
return -1;
|
|
mask = rta_getattr_u16(tb[TCA_TCINDEX_MASK]);
|
|
fprintf(f, "mask 0x%04x ", mask);
|
|
}
|
|
if (tb[TCA_TCINDEX_SHIFT]) {
|
|
int shift;
|
|
|
|
if (RTA_PAYLOAD(tb[TCA_TCINDEX_SHIFT]) < sizeof(shift))
|
|
return -1;
|
|
shift = rta_getattr_u32(tb[TCA_TCINDEX_SHIFT]);
|
|
fprintf(f, "shift %d ", shift);
|
|
}
|
|
if (tb[TCA_TCINDEX_FALL_THROUGH]) {
|
|
int fall_through;
|
|
|
|
if (RTA_PAYLOAD(tb[TCA_TCINDEX_FALL_THROUGH]) <
|
|
sizeof(fall_through))
|
|
return -1;
|
|
fall_through = rta_getattr_u32(tb[TCA_TCINDEX_FALL_THROUGH]);
|
|
fprintf(f, fall_through ? "fall_through " : "pass_on ");
|
|
}
|
|
if (tb[TCA_TCINDEX_CLASSID]) {
|
|
SPRINT_BUF(b1);
|
|
fprintf(f, "classid %s ", sprint_tc_classid(*(__u32 *)
|
|
RTA_DATA(tb[TCA_TCINDEX_CLASSID]), b1));
|
|
}
|
|
if (tb[TCA_TCINDEX_POLICE]) {
|
|
fprintf(f, "\n");
|
|
tc_print_police(f, tb[TCA_TCINDEX_POLICE]);
|
|
}
|
|
if (tb[TCA_TCINDEX_ACT]) {
|
|
fprintf(f, "\n");
|
|
tc_print_action(f, tb[TCA_TCINDEX_ACT], 0);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
struct filter_util tcindex_filter_util = {
|
|
.id = "tcindex",
|
|
.parse_fopt = tcindex_parse_opt,
|
|
.print_fopt = tcindex_print_opt,
|
|
};
|