mirror of
				https://git.proxmox.com/git/mirror_iproute2
				synced 2025-11-03 22:57:36 +00:00 
			
		
		
		
	dump more than TCA_ACT_MAX_PRIO actions per batch when the kernel
supports it.
Introduced keyword "since" for time based filtering of actions.
Some example (we have 400 actions bound to 400 filters); at
installation time. Using updated when tc setting the time of
interest to 120 seconds earlier (we see 400 actions):
prompt$ hackedtc actions ls action gact since 120000| grep index | wc -l
400
go get some coffee and wait for > 120 seconds and try again:
prompt$ hackedtc actions ls action gact since 120000 | grep index | wc -l
0
Lets see a filter bound to one of these actions:
....
filter pref 10 u32
filter pref 10 u32 fh 800: ht divisor 1
filter pref 10 u32 fh 800::800 order 2048 key ht 800 bkt 0 flowid 1:10  (rule hit 2 success 1)
  match 7f000002/ffffffff at 12 (success 1 )
    action order 1: gact action pass
     random type none pass val 0
     index 23 ref 2 bind 1 installed 1145 sec used 802 sec
    Action statistics:
    Sent 84 bytes 1 pkt (dropped 0, overlimits 0 requeues 0)
    backlog 0b 0p requeues 0
...
that coffee took long, no? It was good.
Now lets ping -c 1 127.0.0.2, then run the actions again:
prompt$ hackedtc actions ls action gact since 120 | grep index | wc -l
1
More details please:
prompt$ hackedtc -s actions ls action gact since 120000
    action order 0: gact action pass
     random type none pass val 0
     index 23 ref 2 bind 1 installed 1270 sec used 30 sec
    Action statistics:
    Sent 168 bytes 2 pkt (dropped 0, overlimits 0 requeues 0)
    backlog 0b 0p requeues 0
And the filter?
filter pref 10 u32
filter pref 10 u32 fh 800: ht divisor 1
filter pref 10 u32 fh 800::800 order 2048 key ht 800 bkt 0 flowid 1:10  (rule hit 4 success 2)
  match 7f000002/ffffffff at 12 (success 2 )
    action order 1: gact action pass
     random type none pass val 0
     index 23 ref 2 bind 1 installed 1324 sec used 84 sec
    Action statistics:
    Sent 168 bytes 2 pkt (dropped 0, overlimits 0 requeues 0)
    backlog 0b 0p requeues 0
Signed-off-by: Jamal Hadi Salim <jhs@mojatatu.com>
		
	
			
		
			
				
	
	
		
			158 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			158 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * f_matchall.c		Match-all Classifier
 | 
						|
 *
 | 
						|
 *		This program is free software; you can distribute it and/or
 | 
						|
 *		modify it under the terms of the GNU General Public License
 | 
						|
 *		as published by the Free Software Foundation; either version
 | 
						|
 *		2 of the License, or (at your option) any later version.
 | 
						|
 *
 | 
						|
 * Authors:	Jiri Pirko <jiri@mellanox.com>, Yotam Gigi <yotamg@mellanox.com>
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
#include <stdio.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <unistd.h>
 | 
						|
#include <syslog.h>
 | 
						|
#include <fcntl.h>
 | 
						|
#include <sys/socket.h>
 | 
						|
#include <netinet/in.h>
 | 
						|
#include <arpa/inet.h>
 | 
						|
#include <string.h>
 | 
						|
#include <linux/if.h>
 | 
						|
 | 
						|
#include "utils.h"
 | 
						|
#include "tc_util.h"
 | 
						|
 | 
						|
static void explain(void)
 | 
						|
{
 | 
						|
	fprintf(stderr, "Usage: ... matchall [skip_sw | skip_hw]\n");
 | 
						|
	fprintf(stderr, "                 [ action ACTION_SPEC ] [ classid CLASSID ]\n");
 | 
						|
	fprintf(stderr, "\n");
 | 
						|
	fprintf(stderr, "Where: SELECTOR := SAMPLE SAMPLE ...\n");
 | 
						|
	fprintf(stderr, "       FILTERID := X:Y:Z\n");
 | 
						|
	fprintf(stderr, "       ACTION_SPEC := ... look at individual actions\n");
 | 
						|
	fprintf(stderr, "\nNOTE: CLASSID is parsed as hexadecimal input.\n");
 | 
						|
}
 | 
						|
 | 
						|
static int matchall_parse_opt(struct filter_util *qu, char *handle,
 | 
						|
			   int argc, char **argv, struct nlmsghdr *n)
 | 
						|
{
 | 
						|
	struct tcmsg *t = NLMSG_DATA(n);
 | 
						|
	struct rtattr *tail;
 | 
						|
	__u32 flags = 0;
 | 
						|
	long h = 0;
 | 
						|
 | 
						|
	if (handle) {
 | 
						|
		h = strtol(handle, NULL, 0);
 | 
						|
		if (h == LONG_MIN || h == LONG_MAX) {
 | 
						|
			fprintf(stderr, "Illegal handle \"%s\", must be numeric.\n",
 | 
						|
			    handle);
 | 
						|
			return -1;
 | 
						|
		}
 | 
						|
	}
 | 
						|
	t->tcm_handle = h;
 | 
						|
 | 
						|
	if (argc == 0)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	tail = (struct rtattr *)(((void *)n)+NLMSG_ALIGN(n->nlmsg_len));
 | 
						|
	addattr_l(n, MAX_MSG, TCA_OPTIONS, NULL, 0);
 | 
						|
 | 
						|
	while (argc > 0) {
 | 
						|
		if (matches(*argv, "classid") == 0 ||
 | 
						|
			   strcmp(*argv, "flowid") == 0) {
 | 
						|
			unsigned int handle;
 | 
						|
 | 
						|
			NEXT_ARG();
 | 
						|
			if (get_tc_classid(&handle, *argv)) {
 | 
						|
				fprintf(stderr, "Illegal \"classid\"\n");
 | 
						|
				return -1;
 | 
						|
			}
 | 
						|
			addattr_l(n, MAX_MSG, TCA_MATCHALL_CLASSID, &handle, 4);
 | 
						|
		} else if (matches(*argv, "action") == 0) {
 | 
						|
			NEXT_ARG();
 | 
						|
			if (parse_action(&argc, &argv, TCA_MATCHALL_ACT, n)) {
 | 
						|
				fprintf(stderr, "Illegal \"action\"\n");
 | 
						|
				return -1;
 | 
						|
			}
 | 
						|
			continue;
 | 
						|
 | 
						|
		} else if (strcmp(*argv, "skip_hw") == 0) {
 | 
						|
			NEXT_ARG();
 | 
						|
			flags |= TCA_CLS_FLAGS_SKIP_HW;
 | 
						|
			continue;
 | 
						|
		} else if (strcmp(*argv, "skip_sw") == 0) {
 | 
						|
			NEXT_ARG();
 | 
						|
			flags |= TCA_CLS_FLAGS_SKIP_SW;
 | 
						|
			continue;
 | 
						|
		} else if (strcmp(*argv, "help") == 0) {
 | 
						|
			explain();
 | 
						|
			return -1;
 | 
						|
		} else {
 | 
						|
			fprintf(stderr, "What is \"%s\"?\n", *argv);
 | 
						|
			explain();
 | 
						|
			return -1;
 | 
						|
		}
 | 
						|
		argc--; argv++;
 | 
						|
	}
 | 
						|
 | 
						|
	if (flags) {
 | 
						|
		if (!(flags ^ (TCA_CLS_FLAGS_SKIP_HW |
 | 
						|
			       TCA_CLS_FLAGS_SKIP_SW))) {
 | 
						|
			fprintf(stderr,
 | 
						|
				"skip_hw and skip_sw are mutually exclusive\n");
 | 
						|
			return -1;
 | 
						|
		}
 | 
						|
		addattr_l(n, MAX_MSG, TCA_MATCHALL_FLAGS, &flags, 4);
 | 
						|
	}
 | 
						|
 | 
						|
	tail->rta_len = (((void *)n)+n->nlmsg_len) - (void *)tail;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int matchall_print_opt(struct filter_util *qu, FILE *f,
 | 
						|
			   struct rtattr *opt, __u32 handle)
 | 
						|
{
 | 
						|
	struct rtattr *tb[TCA_MATCHALL_MAX+1];
 | 
						|
 | 
						|
	if (opt == NULL)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	parse_rtattr_nested(tb, TCA_MATCHALL_MAX, opt);
 | 
						|
 | 
						|
	if (handle)
 | 
						|
		fprintf(f, "handle 0x%x ", handle);
 | 
						|
 | 
						|
	if (tb[TCA_MATCHALL_CLASSID]) {
 | 
						|
		SPRINT_BUF(b1);
 | 
						|
		fprintf(f, "flowid %s ",
 | 
						|
			sprint_tc_classid(rta_getattr_u32(tb[TCA_MATCHALL_CLASSID]), b1));
 | 
						|
	}
 | 
						|
 | 
						|
	if (tb[TCA_MATCHALL_FLAGS]) {
 | 
						|
		__u32 flags = rta_getattr_u32(tb[TCA_MATCHALL_FLAGS]);
 | 
						|
 | 
						|
		if (flags & TCA_CLS_FLAGS_SKIP_HW)
 | 
						|
			fprintf(f, "\n  skip_hw");
 | 
						|
		if (flags & TCA_CLS_FLAGS_SKIP_SW)
 | 
						|
			fprintf(f, "\n  skip_sw");
 | 
						|
 | 
						|
		if (flags & TCA_CLS_FLAGS_IN_HW)
 | 
						|
			fprintf(f, "\n  in_hw");
 | 
						|
		else if (flags & TCA_CLS_FLAGS_NOT_IN_HW)
 | 
						|
			fprintf(f, "\n  not_in_hw");
 | 
						|
	}
 | 
						|
 | 
						|
	if (tb[TCA_MATCHALL_ACT])
 | 
						|
		tc_print_action(f, tb[TCA_MATCHALL_ACT], 0);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
struct filter_util matchall_filter_util = {
 | 
						|
	.id = "matchall",
 | 
						|
	.parse_fopt = matchall_parse_opt,
 | 
						|
	.print_fopt = matchall_print_opt,
 | 
						|
};
 |