mirror of
				https://git.proxmox.com/git/mirror_iproute2
				synced 2025-10-30 03:34:18 +00:00 
			
		
		
		
	 9c5f4251d6
			
		
	
	
		9c5f4251d6
		
	
	
	
	
		
			
			u32 uses NEXT_ARG() incorrectly when parsing skip_hw and skip_sw flags. NEXT_ARG() ensures there is another argument on the command line, and is used in handling <keyword> <value> syntax to move past <keyword> and ensure there is a <value> to read. Commit5e5b3008d1("tc: f_u32: Add support for skip_hw and skip_sw flags") seems to have copy pasted the handling from the previous command - "police", which needs an extra parameter and is kind of special due to the use of parse_police() helper. The combination of NEXT_ARG() and continue worked fine as long as skip_sw/skip_hw wasn't last, e.g.: $ tc filter add dev dummy0 ingress prio 101 protocol ipv6 \ u32 match ip6 priority 0xa0 0xe0 skip_hw action pass But would fail if it was last: $ tc filter add dev dummy0 ingress prio 101 protocol ipv6 \ u32 match ip6 priority 0xa0 0xe0 flowid :1 skip_hw Command line is not complete. Try option "help" Remove the NEXT_ARG()s and the continues, and let the argc--; argv++; at the end of the loop do its job. Fixes:5e5b3008d1("tc: f_u32: Add support for skip_hw and skip_sw flags") Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com> Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
		
			
				
	
	
		
			1341 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			1341 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * q_u32.c		U32 filter.
 | |
|  *
 | |
|  *		This program is free software; you can u32istribute it and/or
 | |
|  *		modify it under the terms of the GNU General Public License
 | |
|  *		as published by the Free Software Foundation; either version
 | |
|  *		2 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * Authors:	Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
 | |
|  *		Match mark added by Catalin(ux aka Dino) BOIE <catab at umbrella.ro> [5 nov 2004]
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <unistd.h>
 | |
| #include <fcntl.h>
 | |
| #include <sys/socket.h>
 | |
| #include <netinet/in.h>
 | |
| #include <arpa/inet.h>
 | |
| #include <string.h>
 | |
| #include <linux/if.h>
 | |
| #include <linux/if_ether.h>
 | |
| 
 | |
| #include "utils.h"
 | |
| #include "tc_util.h"
 | |
| 
 | |
| static void explain(void)
 | |
| {
 | |
| 	fprintf(stderr,
 | |
| 		"Usage: ... u32 [ match SELECTOR ... ] [ link HTID ] [ classid CLASSID ]\n"
 | |
| 		"               [ action ACTION_SPEC ] [ offset OFFSET_SPEC ]\n"
 | |
| 		"               [ ht HTID ] [ hashkey HASHKEY_SPEC ]\n"
 | |
| 		"               [ sample SAMPLE ] [skip_hw | skip_sw]\n"
 | |
| 		"or         u32 divisor DIVISOR\n"
 | |
| 		"\n"
 | |
| 		"Where: SELECTOR := SAMPLE SAMPLE ...\n"
 | |
| 		"       SAMPLE := { ip | ip6 | udp | tcp | icmp | u{32|16|8} | mark }\n"
 | |
| 		"                 SAMPLE_ARGS [ divisor DIVISOR ]\n"
 | |
| 		"       FILTERID := X:Y:Z\n"
 | |
| 		"\nNOTE: CLASSID is parsed at hexadecimal input.\n");
 | |
| }
 | |
| 
 | |
| static int get_u32_handle(__u32 *handle, const char *str)
 | |
| {
 | |
| 	__u32 htid = 0, hash = 0, nodeid = 0;
 | |
| 	char *tmp = strchr(str, ':');
 | |
| 
 | |
| 	if (tmp == NULL) {
 | |
| 		if (memcmp("0x", str, 2) == 0)
 | |
| 			return get_u32(handle, str, 16);
 | |
| 		return -1;
 | |
| 	}
 | |
| 	htid = strtoul(str, &tmp, 16);
 | |
| 	if (tmp == str && *str != ':' && *str != 0)
 | |
| 		return -1;
 | |
| 	if (htid >= 0x1000)
 | |
| 		return -1;
 | |
| 	if (*tmp) {
 | |
| 		str = tmp + 1;
 | |
| 		hash = strtoul(str, &tmp, 16);
 | |
| 		if (tmp == str && *str != ':' && *str != 0)
 | |
| 			return -1;
 | |
| 		if (hash >= 0x100)
 | |
| 			return -1;
 | |
| 		if (*tmp) {
 | |
| 			str = tmp + 1;
 | |
| 			nodeid = strtoul(str, &tmp, 16);
 | |
| 			if (tmp == str && *str != 0)
 | |
| 				return -1;
 | |
| 			if (nodeid >= 0x1000)
 | |
| 				return -1;
 | |
| 		}
 | |
| 	}
 | |
| 	*handle = (htid<<20)|(hash<<12)|nodeid;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static char *sprint_u32_handle(__u32 handle, char *buf)
 | |
| {
 | |
| 	int bsize = SPRINT_BSIZE-1;
 | |
| 	__u32 htid = TC_U32_HTID(handle);
 | |
| 	__u32 hash = TC_U32_HASH(handle);
 | |
| 	__u32 nodeid = TC_U32_NODE(handle);
 | |
| 	char *b = buf;
 | |
| 
 | |
| 	if (handle == 0) {
 | |
| 		snprintf(b, bsize, "none");
 | |
| 		return b;
 | |
| 	}
 | |
| 	if (htid) {
 | |
| 		int l = snprintf(b, bsize, "%x:", htid>>20);
 | |
| 
 | |
| 		bsize -= l;
 | |
| 		b += l;
 | |
| 	}
 | |
| 	if (nodeid|hash) {
 | |
| 		if (hash) {
 | |
| 			int l = snprintf(b, bsize, "%x", hash);
 | |
| 
 | |
| 			bsize -= l;
 | |
| 			b += l;
 | |
| 		}
 | |
| 		if (nodeid) {
 | |
| 			int l = snprintf(b, bsize, ":%x", nodeid);
 | |
| 
 | |
| 			bsize -= l;
 | |
| 			b += l;
 | |
| 		}
 | |
| 	}
 | |
| 	if (show_raw)
 | |
| 		snprintf(b, bsize, "[%08x] ", handle);
 | |
| 	return buf;
 | |
| }
 | |
| 
 | |
| static int pack_key(struct tc_u32_sel *sel, __u32 key, __u32 mask,
 | |
| 		    int off, int offmask)
 | |
| {
 | |
| 	int i;
 | |
| 	int hwm = sel->nkeys;
 | |
| 
 | |
| 	key &= mask;
 | |
| 
 | |
| 	for (i = 0; i < hwm; i++) {
 | |
| 		if (sel->keys[i].off == off && sel->keys[i].offmask == offmask) {
 | |
| 			__u32 intersect = mask & sel->keys[i].mask;
 | |
| 
 | |
| 			if ((key ^ sel->keys[i].val) & intersect)
 | |
| 				return -1;
 | |
| 			sel->keys[i].val |= key;
 | |
| 			sel->keys[i].mask |= mask;
 | |
| 			return 0;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if (hwm >= 128)
 | |
| 		return -1;
 | |
| 	if (off % 4)
 | |
| 		return -1;
 | |
| 	sel->keys[hwm].val = key;
 | |
| 	sel->keys[hwm].mask = mask;
 | |
| 	sel->keys[hwm].off = off;
 | |
| 	sel->keys[hwm].offmask = offmask;
 | |
| 	sel->nkeys++;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int pack_key32(struct tc_u32_sel *sel, __u32 key, __u32 mask,
 | |
| 		      int off, int offmask)
 | |
| {
 | |
| 	key = htonl(key);
 | |
| 	mask = htonl(mask);
 | |
| 	return pack_key(sel, key, mask, off, offmask);
 | |
| }
 | |
| 
 | |
| static int pack_key16(struct tc_u32_sel *sel, __u32 key, __u32 mask,
 | |
| 		      int off, int offmask)
 | |
| {
 | |
| 	if (key > 0xFFFF || mask > 0xFFFF)
 | |
| 		return -1;
 | |
| 
 | |
| 	if ((off & 3) == 0) {
 | |
| 		key <<= 16;
 | |
| 		mask <<= 16;
 | |
| 	}
 | |
| 	off &= ~3;
 | |
| 	key = htonl(key);
 | |
| 	mask = htonl(mask);
 | |
| 
 | |
| 	return pack_key(sel, key, mask, off, offmask);
 | |
| }
 | |
| 
 | |
| static int pack_key8(struct tc_u32_sel *sel, __u32 key, __u32 mask, int off,
 | |
| 		     int offmask)
 | |
| {
 | |
| 	if (key > 0xFF || mask > 0xFF)
 | |
| 		return -1;
 | |
| 
 | |
| 	if ((off & 3) == 0) {
 | |
| 		key <<= 24;
 | |
| 		mask <<= 24;
 | |
| 	} else if ((off & 3) == 1) {
 | |
| 		key <<= 16;
 | |
| 		mask <<= 16;
 | |
| 	} else if ((off & 3) == 2) {
 | |
| 		key <<= 8;
 | |
| 		mask <<= 8;
 | |
| 	}
 | |
| 	off &= ~3;
 | |
| 	key = htonl(key);
 | |
| 	mask = htonl(mask);
 | |
| 
 | |
| 	return pack_key(sel, key, mask, off, offmask);
 | |
| }
 | |
| 
 | |
| 
 | |
| static int parse_at(int *argc_p, char ***argv_p, int *off, int *offmask)
 | |
| {
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	char *p = *argv;
 | |
| 
 | |
| 	if (argc <= 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (strlen(p) > strlen("nexthdr+") &&
 | |
| 	    memcmp(p, "nexthdr+", strlen("nexthdr+")) == 0) {
 | |
| 		*offmask = -1;
 | |
| 		p += strlen("nexthdr+");
 | |
| 	} else if (matches(*argv, "nexthdr+") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		*offmask = -1;
 | |
| 		p = *argv;
 | |
| 	}
 | |
| 
 | |
| 	if (get_integer(off, p, 0))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int parse_u32(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
 | |
| 		     int off, int offmask)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	__u32 key;
 | |
| 	__u32 mask;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_u32(&key, *argv, 0))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (get_u32(&mask, *argv, 16))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (argc > 0 && strcmp(argv[0], "at") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_at(&argc, &argv, &off, &offmask))
 | |
| 			return -1;
 | |
| 	}
 | |
| 
 | |
| 	res = pack_key32(sel, key, mask, off, offmask);
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_u16(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
 | |
| 		     int off, int offmask)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	__u32 key;
 | |
| 	__u32 mask;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_u32(&key, *argv, 0))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (get_u32(&mask, *argv, 16))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (argc > 0 && strcmp(argv[0], "at") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_at(&argc, &argv, &off, &offmask))
 | |
| 			return -1;
 | |
| 	}
 | |
| 	res = pack_key16(sel, key, mask, off, offmask);
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_u8(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
 | |
| 		    int off, int offmask)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	__u32 key;
 | |
| 	__u32 mask;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_u32(&key, *argv, 0))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (get_u32(&mask, *argv, 16))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (key > 0xFF || mask > 0xFF)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (argc > 0 && strcmp(argv[0], "at") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_at(&argc, &argv, &off, &offmask))
 | |
| 			return -1;
 | |
| 	}
 | |
| 
 | |
| 	res = pack_key8(sel, key, mask, off, offmask);
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_ip_addr(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
 | |
| 			 int off)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	inet_prefix addr;
 | |
| 	__u32 mask;
 | |
| 	int offmask = 0;
 | |
| 
 | |
| 	if (argc < 1)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_prefix_1(&addr, *argv, AF_INET))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (argc > 0 && strcmp(argv[0], "at") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_at(&argc, &argv, &off, &offmask))
 | |
| 			return -1;
 | |
| 	}
 | |
| 
 | |
| 	mask = 0;
 | |
| 	if (addr.bitlen)
 | |
| 		mask = htonl(0xFFFFFFFF << (32 - addr.bitlen));
 | |
| 	if (pack_key(sel, addr.data[0], mask, off, offmask) < 0)
 | |
| 		return -1;
 | |
| 	res = 0;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_ip6_addr(int *argc_p, char ***argv_p,
 | |
| 			  struct tc_u32_sel *sel, int off)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	int plen = 128;
 | |
| 	int i;
 | |
| 	inet_prefix addr;
 | |
| 	int offmask = 0;
 | |
| 
 | |
| 	if (argc < 1)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_prefix_1(&addr, *argv, AF_INET6))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (argc > 0 && strcmp(argv[0], "at") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_at(&argc, &argv, &off, &offmask))
 | |
| 			return -1;
 | |
| 	}
 | |
| 
 | |
| 	plen = addr.bitlen;
 | |
| 	for (i = 0; i < plen; i += 32) {
 | |
| 		if (i + 31 < plen) {
 | |
| 			res = pack_key(sel, addr.data[i / 32],
 | |
| 				       0xFFFFFFFF, off + 4 * (i / 32), offmask);
 | |
| 			if (res < 0)
 | |
| 				return -1;
 | |
| 		} else if (i < plen) {
 | |
| 			__u32 mask = htonl(0xFFFFFFFF << (32 - (plen - i)));
 | |
| 
 | |
| 			res = pack_key(sel, addr.data[i / 32],
 | |
| 				       mask, off + 4 * (i / 32), offmask);
 | |
| 			if (res < 0)
 | |
| 				return -1;
 | |
| 		}
 | |
| 	}
 | |
| 	res = 0;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_ip6_class(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	__u32 key;
 | |
| 	__u32 mask;
 | |
| 	int off = 0;
 | |
| 	int offmask = 0;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_u32(&key, *argv, 0))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (get_u32(&mask, *argv, 16))
 | |
| 		return -1;
 | |
| 	argc--; argv++;
 | |
| 
 | |
| 	if (key > 0xFF || mask > 0xFF)
 | |
| 		return -1;
 | |
| 
 | |
| 	key <<= 20;
 | |
| 	mask <<= 20;
 | |
| 	key = htonl(key);
 | |
| 	mask = htonl(mask);
 | |
| 
 | |
| 	res = pack_key(sel, key, mask, off, offmask);
 | |
| 	if (res < 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int parse_ether_addr(int *argc_p, char ***argv_p,
 | |
| 			    struct tc_u32_sel *sel, int off)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	__u8 addr[6];
 | |
| 	int offmask = 0;
 | |
| 	int i;
 | |
| 
 | |
| 	if (argc < 1)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (sscanf(*argv, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx",
 | |
| 		   addr + 0, addr + 1, addr + 2,
 | |
| 		   addr + 3, addr + 4, addr + 5) != 6) {
 | |
| 		fprintf(stderr, "parse_ether_addr: improperly formed address '%s'\n",
 | |
| 			*argv);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	argc--; argv++;
 | |
| 	if (argc > 0 && strcmp(argv[0], "at") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		if (parse_at(&argc, &argv, &off, &offmask))
 | |
| 			return -1;
 | |
| 	}
 | |
| 
 | |
| 	for (i = 0; i < 6; i++) {
 | |
| 		res = pack_key8(sel, addr[i], 0xFF, off + i, offmask);
 | |
| 		if (res < 0)
 | |
| 			return -1;
 | |
| 	}
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_ip(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (strcmp(*argv, "src") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ip_addr(&argc, &argv, sel, 12);
 | |
| 	} else if (strcmp(*argv, "dst") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ip_addr(&argc, &argv, sel, 16);
 | |
| 	} else if (strcmp(*argv, "tos") == 0 ||
 | |
| 	    matches(*argv, "dsfield") == 0 ||
 | |
| 	    matches(*argv, "precedence") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 1, 0);
 | |
| 	} else if (strcmp(*argv, "ihl") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 0, 0);
 | |
| 	} else if (strcmp(*argv, "protocol") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 9, 0);
 | |
| 	} else if (strcmp(*argv, "nofrag") == 0) {
 | |
| 		argc--; argv++;
 | |
| 		res = pack_key16(sel, 0, 0x3FFF, 6, 0);
 | |
| 	} else if (strcmp(*argv, "firstfrag") == 0) {
 | |
| 		argc--; argv++;
 | |
| 		res = pack_key16(sel, 0x2000, 0x3FFF, 6, 0);
 | |
| 	} else if (strcmp(*argv, "df") == 0) {
 | |
| 		argc--; argv++;
 | |
| 		res = pack_key16(sel, 0x4000, 0x4000, 6, 0);
 | |
| 	} else if (strcmp(*argv, "mf") == 0) {
 | |
| 		argc--; argv++;
 | |
| 		res = pack_key16(sel, 0x2000, 0x2000, 6, 0);
 | |
| 	} else if (strcmp(*argv, "dport") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u16(&argc, &argv, sel, 22, 0);
 | |
| 	} else if (strcmp(*argv, "sport") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u16(&argc, &argv, sel, 20, 0);
 | |
| 	} else if (strcmp(*argv, "icmp_type") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 20, 0);
 | |
| 	} else if (strcmp(*argv, "icmp_code") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 21, 0);
 | |
| 	} else
 | |
| 		return -1;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_ip6(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (strcmp(*argv, "src") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ip6_addr(&argc, &argv, sel, 8);
 | |
| 	} else if (strcmp(*argv, "dst") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ip6_addr(&argc, &argv, sel, 24);
 | |
| 	} else if (strcmp(*argv, "priority") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ip6_class(&argc, &argv, sel);
 | |
| 	} else if (strcmp(*argv, "protocol") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 6, 0);
 | |
| 	} else if (strcmp(*argv, "flowlabel") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u32(&argc, &argv, sel, 0, 0);
 | |
| 	} else if (strcmp(*argv, "dport") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u16(&argc, &argv, sel, 42, 0);
 | |
| 	} else if (strcmp(*argv, "sport") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u16(&argc, &argv, sel, 40, 0);
 | |
| 	} else if (strcmp(*argv, "icmp_type") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 40, 0);
 | |
| 	} else if (strcmp(*argv, "icmp_code") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 41, 1);
 | |
| 	} else
 | |
| 		return -1;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_ether(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (strcmp(*argv, "src") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ether_addr(&argc, &argv, sel, -8);
 | |
| 	} else if (strcmp(*argv, "dst") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ether_addr(&argc, &argv, sel, -14);
 | |
| 	} else {
 | |
| 		fprintf(stderr, "Unknown match: ether %s\n", *argv);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| #define parse_tcp parse_udp
 | |
| static int parse_udp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (strcmp(*argv, "src") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u16(&argc, &argv, sel, 0, -1);
 | |
| 	} else if (strcmp(*argv, "dst") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u16(&argc, &argv, sel, 2, -1);
 | |
| 	} else
 | |
| 		return -1;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int parse_icmp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	if (argc < 2)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (strcmp(*argv, "type") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 0, -1);
 | |
| 	} else if (strcmp(*argv, "code") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 1, -1);
 | |
| 	} else
 | |
| 		return -1;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_mark(int *argc_p, char ***argv_p, struct nlmsghdr *n)
 | |
| {
 | |
| 	int res = -1;
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	struct tc_u32_mark mark;
 | |
| 
 | |
| 	if (argc <= 1)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (get_u32(&mark.val, *argv, 0)) {
 | |
| 		fprintf(stderr, "Illegal \"mark\" value\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 	NEXT_ARG();
 | |
| 
 | |
| 	if (get_u32(&mark.mask, *argv, 0)) {
 | |
| 		fprintf(stderr, "Illegal \"mark\" mask\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 	NEXT_ARG();
 | |
| 
 | |
| 	if ((mark.val & mark.mask) != mark.val) {
 | |
| 		fprintf(stderr, "Illegal \"mark\" (impossible combination)\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	addattr_l(n, MAX_MSG, TCA_U32_MARK, &mark, sizeof(mark));
 | |
| 	res = 0;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_selector(int *argc_p, char ***argv_p,
 | |
| 			  struct tc_u32_sel *sel, struct nlmsghdr *n)
 | |
| {
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 	int res = -1;
 | |
| 
 | |
| 	if (argc <= 0)
 | |
| 		return -1;
 | |
| 
 | |
| 	if (matches(*argv, "u32") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u32(&argc, &argv, sel, 0, 0);
 | |
| 	} else if (matches(*argv, "u16") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u16(&argc, &argv, sel, 0, 0);
 | |
| 	} else if (matches(*argv, "u8") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_u8(&argc, &argv, sel, 0, 0);
 | |
| 	} else if (matches(*argv, "ip") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ip(&argc, &argv, sel);
 | |
| 	} else	if (matches(*argv, "ip6") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ip6(&argc, &argv, sel);
 | |
| 	} else if (matches(*argv, "udp") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_udp(&argc, &argv, sel);
 | |
| 	} else if (matches(*argv, "tcp") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_tcp(&argc, &argv, sel);
 | |
| 	} else if (matches(*argv, "icmp") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_icmp(&argc, &argv, sel);
 | |
| 	} else if (matches(*argv, "mark") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_mark(&argc, &argv, n);
 | |
| 	} else if (matches(*argv, "ether") == 0) {
 | |
| 		NEXT_ARG();
 | |
| 		res = parse_ether(&argc, &argv, sel);
 | |
| 	} else
 | |
| 		return -1;
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int parse_offset(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	while (argc > 0) {
 | |
| 		if (matches(*argv, "plus") == 0) {
 | |
| 			int off;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_integer(&off, *argv, 0))
 | |
| 				return -1;
 | |
| 			sel->off = off;
 | |
| 			sel->flags |= TC_U32_OFFSET;
 | |
| 		} else if (matches(*argv, "at") == 0) {
 | |
| 			int off;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_integer(&off, *argv, 0))
 | |
| 				return -1;
 | |
| 			sel->offoff = off;
 | |
| 			if (off%2) {
 | |
| 				fprintf(stderr, "offset \"at\" must be even\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			sel->flags |= TC_U32_VAROFFSET;
 | |
| 		} else if (matches(*argv, "mask") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (get_be16(&sel->offmask, *argv, 16))
 | |
| 				return -1;
 | |
| 			sel->flags |= TC_U32_VAROFFSET;
 | |
| 		} else if (matches(*argv, "shift") == 0) {
 | |
| 			int shift;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_integer(&shift, *argv, 0))
 | |
| 				return -1;
 | |
| 			sel->offshift = shift;
 | |
| 			sel->flags |= TC_U32_VAROFFSET;
 | |
| 		} else if (matches(*argv, "eat") == 0) {
 | |
| 			sel->flags |= TC_U32_EAT;
 | |
| 		} else {
 | |
| 			break;
 | |
| 		}
 | |
| 		argc--; argv++;
 | |
| 	}
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int parse_hashkey(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
 | |
| {
 | |
| 	int argc = *argc_p;
 | |
| 	char **argv = *argv_p;
 | |
| 
 | |
| 	while (argc > 0) {
 | |
| 		if (matches(*argv, "mask") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (get_be32(&sel->hmask, *argv, 16))
 | |
| 				return -1;
 | |
| 		} else if (matches(*argv, "at") == 0) {
 | |
| 			int num;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_integer(&num, *argv, 0))
 | |
| 				return -1;
 | |
| 			if (num%4)
 | |
| 				return -1;
 | |
| 			sel->hoff = num;
 | |
| 		} else {
 | |
| 			break;
 | |
| 		}
 | |
| 		argc--; argv++;
 | |
| 	}
 | |
| 
 | |
| 	*argc_p = argc;
 | |
| 	*argv_p = argv;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static void print_ipv4(FILE *f, const struct tc_u32_key *key)
 | |
| {
 | |
| 	char abuf[256];
 | |
| 
 | |
| 	switch (key->off) {
 | |
| 	case 0:
 | |
| 		switch (ntohl(key->mask)) {
 | |
| 		case 0x0f000000:
 | |
| 			fprintf(f, "\n  match IP ihl %u",
 | |
| 				ntohl(key->val) >> 24);
 | |
| 			return;
 | |
| 		case 0x00ff0000:
 | |
| 			fprintf(f, "\n  match IP dsfield %#x",
 | |
| 				ntohl(key->val) >> 16);
 | |
| 			return;
 | |
| 		}
 | |
| 		break;
 | |
| 	case 8:
 | |
| 		if (ntohl(key->mask) == 0x00ff0000) {
 | |
| 			fprintf(f, "\n  match IP protocol %d",
 | |
| 				ntohl(key->val) >> 16);
 | |
| 			return;
 | |
| 		}
 | |
| 		break;
 | |
| 	case 12:
 | |
| 	case 16: {
 | |
| 			int bits = mask2bits(key->mask);
 | |
| 
 | |
| 			if (bits >= 0) {
 | |
| 				fprintf(f, "\n  %s %s/%d",
 | |
| 					key->off == 12 ? "match IP src" : "match IP dst",
 | |
| 					inet_ntop(AF_INET, &key->val,
 | |
| 						  abuf, sizeof(abuf)),
 | |
| 					bits);
 | |
| 				return;
 | |
| 			}
 | |
| 		}
 | |
| 		break;
 | |
| 
 | |
| 	case 20:
 | |
| 		switch (ntohl(key->mask)) {
 | |
| 		case 0x0000ffff:
 | |
| 			fprintf(f, "\n  match dport %u",
 | |
| 				ntohl(key->val) & 0xffff);
 | |
| 			return;
 | |
| 		case 0xffff0000:
 | |
| 			fprintf(f, "\n  match sport %u",
 | |
| 				ntohl(key->val) >> 16);
 | |
| 			return;
 | |
| 		case 0xffffffff:
 | |
| 			fprintf(f, "\n  match dport %u, match sport %u",
 | |
| 				ntohl(key->val) & 0xffff,
 | |
| 				ntohl(key->val) >> 16);
 | |
| 
 | |
| 			return;
 | |
| 		}
 | |
| 		/* XXX: Default print_raw */
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static void print_ipv6(FILE *f, const struct tc_u32_key *key)
 | |
| {
 | |
| 	char abuf[256];
 | |
| 
 | |
| 	switch (key->off) {
 | |
| 	case 0:
 | |
| 		switch (ntohl(key->mask)) {
 | |
| 		case 0x0f000000:
 | |
| 			fprintf(f, "\n  match IP ihl %u",
 | |
| 				ntohl(key->val) >> 24);
 | |
| 			return;
 | |
| 		case 0x00ff0000:
 | |
| 			fprintf(f, "\n  match IP dsfield %#x",
 | |
| 				ntohl(key->val) >> 16);
 | |
| 			return;
 | |
| 		}
 | |
| 		break;
 | |
| 	case 8:
 | |
| 		if (ntohl(key->mask) == 0x00ff0000) {
 | |
| 			fprintf(f, "\n  match IP protocol %d",
 | |
| 				ntohl(key->val) >> 16);
 | |
| 			return;
 | |
| 		}
 | |
| 		break;
 | |
| 	case 12:
 | |
| 	case 16: {
 | |
| 			int bits = mask2bits(key->mask);
 | |
| 
 | |
| 			if (bits >= 0) {
 | |
| 				fprintf(f, "\n  %s %s/%d",
 | |
| 					key->off == 12 ? "match IP src" : "match IP dst",
 | |
| 					inet_ntop(AF_INET, &key->val,
 | |
| 						  abuf, sizeof(abuf)),
 | |
| 					bits);
 | |
| 				return;
 | |
| 			}
 | |
| 		}
 | |
| 		break;
 | |
| 
 | |
| 	case 20:
 | |
| 		switch (ntohl(key->mask)) {
 | |
| 		case 0x0000ffff:
 | |
| 			fprintf(f, "\n  match sport %u",
 | |
| 				ntohl(key->val) & 0xffff);
 | |
| 			return;
 | |
| 		case 0xffff0000:
 | |
| 			fprintf(f, "\n  match dport %u",
 | |
| 				ntohl(key->val) >> 16);
 | |
| 			return;
 | |
| 		case 0xffffffff:
 | |
| 			fprintf(f, "\n  match sport %u, match dport %u",
 | |
| 				ntohl(key->val) & 0xffff,
 | |
| 				ntohl(key->val) >> 16);
 | |
| 
 | |
| 			return;
 | |
| 		}
 | |
| 		/* XXX: Default print_raw */
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static void print_raw(FILE *f, const struct tc_u32_key *key)
 | |
| {
 | |
| 	fprintf(f, "\n  match %08x/%08x at %s%d",
 | |
| 		(unsigned int)ntohl(key->val),
 | |
| 		(unsigned int)ntohl(key->mask),
 | |
| 		key->offmask ? "nexthdr+" : "",
 | |
| 		key->off);
 | |
| }
 | |
| 
 | |
| static const struct {
 | |
| 	__u16 proto;
 | |
| 	__u16 pad;
 | |
| 	void (*pprinter)(FILE *f, const struct tc_u32_key *key);
 | |
| } u32_pprinters[] = {
 | |
| 	{0,	   0, print_raw},
 | |
| 	{ETH_P_IP, 0, print_ipv4},
 | |
| 	{ETH_P_IPV6, 0, print_ipv6},
 | |
| };
 | |
| 
 | |
| static void show_keys(FILE *f, const struct tc_u32_key *key)
 | |
| {
 | |
| 	int i = 0;
 | |
| 
 | |
| 	if (!pretty)
 | |
| 		goto show_k;
 | |
| 
 | |
| 	for (i = 0; i < ARRAY_SIZE(u32_pprinters); i++) {
 | |
| 		if (u32_pprinters[i].proto == ntohs(f_proto)) {
 | |
| show_k:
 | |
| 			u32_pprinters[i].pprinter(f, key);
 | |
| 			return;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	i = 0;
 | |
| 	goto show_k;
 | |
| }
 | |
| 
 | |
| static int u32_parse_opt(struct filter_util *qu, char *handle,
 | |
| 			 int argc, char **argv, struct nlmsghdr *n)
 | |
| {
 | |
| 	struct {
 | |
| 		struct tc_u32_sel sel;
 | |
| 		struct tc_u32_key keys[128];
 | |
| 	} sel = {};
 | |
| 	struct tcmsg *t = NLMSG_DATA(n);
 | |
| 	struct rtattr *tail;
 | |
| 	int sel_ok = 0, terminal_ok = 0;
 | |
| 	int sample_ok = 0;
 | |
| 	__u32 htid = 0;
 | |
| 	__u32 order = 0;
 | |
| 	__u32 flags = 0;
 | |
| 
 | |
| 	if (handle && get_u32_handle(&t->tcm_handle, handle)) {
 | |
| 		fprintf(stderr, "Illegal filter ID\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (argc == 0)
 | |
| 		return 0;
 | |
| 
 | |
| 	tail = addattr_nest(n, MAX_MSG, TCA_OPTIONS);
 | |
| 
 | |
| 	while (argc > 0) {
 | |
| 		if (matches(*argv, "match") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (parse_selector(&argc, &argv, &sel.sel, n)) {
 | |
| 				fprintf(stderr, "Illegal \"match\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			sel_ok++;
 | |
| 			continue;
 | |
| 		} else if (matches(*argv, "offset") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (parse_offset(&argc, &argv, &sel.sel)) {
 | |
| 				fprintf(stderr, "Illegal \"offset\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			continue;
 | |
| 		} else if (matches(*argv, "hashkey") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (parse_hashkey(&argc, &argv, &sel.sel)) {
 | |
| 				fprintf(stderr, "Illegal \"hashkey\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			continue;
 | |
| 		} else if (matches(*argv, "classid") == 0 ||
 | |
| 			   strcmp(*argv, "flowid") == 0) {
 | |
| 			unsigned int flowid;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_tc_classid(&flowid, *argv)) {
 | |
| 				fprintf(stderr, "Illegal \"classid\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			addattr_l(n, MAX_MSG, TCA_U32_CLASSID, &flowid, 4);
 | |
| 			sel.sel.flags |= TC_U32_TERMINAL;
 | |
| 		} else if (matches(*argv, "divisor") == 0) {
 | |
| 			unsigned int divisor;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_unsigned(&divisor, *argv, 0) ||
 | |
| 			    divisor == 0 ||
 | |
| 			    divisor > 0x100 || ((divisor - 1) & divisor)) {
 | |
| 				fprintf(stderr, "Illegal \"divisor\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			addattr_l(n, MAX_MSG, TCA_U32_DIVISOR, &divisor, 4);
 | |
| 		} else if (matches(*argv, "order") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (get_u32(&order, *argv, 0)) {
 | |
| 				fprintf(stderr, "Illegal \"order\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 		} else if (strcmp(*argv, "link") == 0) {
 | |
| 			unsigned int linkid;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_u32_handle(&linkid, *argv)) {
 | |
| 				fprintf(stderr, "Illegal \"link\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			if (linkid && TC_U32_NODE(linkid)) {
 | |
| 				fprintf(stderr, "\"link\" must be a hash table.\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			addattr_l(n, MAX_MSG, TCA_U32_LINK, &linkid, 4);
 | |
| 		} else if (strcmp(*argv, "ht") == 0) {
 | |
| 			unsigned int ht;
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (get_u32_handle(&ht, *argv)) {
 | |
| 				fprintf(stderr, "Illegal \"ht\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			if (handle && TC_U32_NODE(ht)) {
 | |
| 				fprintf(stderr, "\"ht\" must be a hash table.\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			if (sample_ok)
 | |
| 				htid = (htid & 0xFF000) | (ht & 0xFFF00000);
 | |
| 			else
 | |
| 				htid = (ht & 0xFFFFF000);
 | |
| 		} else if (strcmp(*argv, "sample") == 0) {
 | |
| 			__u32 hash;
 | |
| 			unsigned int divisor = 0x100;
 | |
| 			struct {
 | |
| 				struct tc_u32_sel sel;
 | |
| 				struct tc_u32_key keys[4];
 | |
| 			} sel2 = {};
 | |
| 
 | |
| 			NEXT_ARG();
 | |
| 			if (parse_selector(&argc, &argv, &sel2.sel, n)) {
 | |
| 				fprintf(stderr, "Illegal \"sample\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			if (sel2.sel.nkeys != 1) {
 | |
| 				fprintf(stderr, "\"sample\" must contain exactly ONE key.\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			if (*argv != 0 && strcmp(*argv, "divisor") == 0) {
 | |
| 				NEXT_ARG();
 | |
| 				if (get_unsigned(&divisor, *argv, 0) ||
 | |
| 				    divisor == 0 || divisor > 0x100 ||
 | |
| 				    ((divisor - 1) & divisor)) {
 | |
| 					fprintf(stderr, "Illegal sample \"divisor\"\n");
 | |
| 					return -1;
 | |
| 				}
 | |
| 				NEXT_ARG();
 | |
| 			}
 | |
| 			hash = sel2.sel.keys[0].val & sel2.sel.keys[0].mask;
 | |
| 			hash ^= hash >> 16;
 | |
| 			hash ^= hash >> 8;
 | |
| 			htid = ((hash % divisor) << 12) | (htid & 0xFFF00000);
 | |
| 			sample_ok = 1;
 | |
| 			continue;
 | |
| 		} else if (strcmp(*argv, "indev") == 0) {
 | |
| 			char ind[IFNAMSIZ + 1] = {};
 | |
| 
 | |
| 			argc--;
 | |
| 			argv++;
 | |
| 			if (argc < 1) {
 | |
| 				fprintf(stderr, "Illegal indev\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			strncpy(ind, *argv, sizeof(ind) - 1);
 | |
| 			addattr_l(n, MAX_MSG, TCA_U32_INDEV, ind,
 | |
| 				  strlen(ind) + 1);
 | |
| 
 | |
| 		} else if (matches(*argv, "action") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (parse_action(&argc, &argv, TCA_U32_ACT, n)) {
 | |
| 				fprintf(stderr, "Illegal \"action\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			terminal_ok++;
 | |
| 			continue;
 | |
| 
 | |
| 		} else if (matches(*argv, "police") == 0) {
 | |
| 			NEXT_ARG();
 | |
| 			if (parse_police(&argc, &argv, TCA_U32_POLICE, n)) {
 | |
| 				fprintf(stderr, "Illegal \"police\"\n");
 | |
| 				return -1;
 | |
| 			}
 | |
| 			terminal_ok++;
 | |
| 			continue;
 | |
| 		} else if (strcmp(*argv, "skip_hw") == 0) {
 | |
| 			flags |= TCA_CLS_FLAGS_SKIP_HW;
 | |
| 		} else if (strcmp(*argv, "skip_sw") == 0) {
 | |
| 			flags |= TCA_CLS_FLAGS_SKIP_SW;
 | |
| 		} else if (strcmp(*argv, "help") == 0) {
 | |
| 			explain();
 | |
| 			return -1;
 | |
| 		} else {
 | |
| 			fprintf(stderr, "What is \"%s\"?\n", *argv);
 | |
| 			explain();
 | |
| 			return -1;
 | |
| 		}
 | |
| 		argc--; argv++;
 | |
| 	}
 | |
| 
 | |
| 	/* We don't necessarily need class/flowids */
 | |
| 	if (terminal_ok)
 | |
| 		sel.sel.flags |= TC_U32_TERMINAL;
 | |
| 
 | |
| 	if (order) {
 | |
| 		if (TC_U32_NODE(t->tcm_handle) &&
 | |
| 		    order != TC_U32_NODE(t->tcm_handle)) {
 | |
| 			fprintf(stderr, "\"order\" contradicts \"handle\"\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 		t->tcm_handle |= order;
 | |
| 	}
 | |
| 
 | |
| 	if (htid)
 | |
| 		addattr_l(n, MAX_MSG, TCA_U32_HASH, &htid, 4);
 | |
| 	if (sel_ok)
 | |
| 		addattr_l(n, MAX_MSG, TCA_U32_SEL, &sel,
 | |
| 			  sizeof(sel.sel) +
 | |
| 			  sel.sel.nkeys * sizeof(struct tc_u32_key));
 | |
| 	if (flags) {
 | |
| 		if (!(flags ^ (TCA_CLS_FLAGS_SKIP_HW |
 | |
| 			       TCA_CLS_FLAGS_SKIP_SW))) {
 | |
| 			fprintf(stderr,
 | |
| 				"skip_hw and skip_sw are mutually exclusive\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 		addattr_l(n, MAX_MSG, TCA_U32_FLAGS, &flags, 4);
 | |
| 	}
 | |
| 
 | |
| 	addattr_nest_end(n, tail);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int u32_print_opt(struct filter_util *qu, FILE *f, struct rtattr *opt,
 | |
| 			 __u32 handle)
 | |
| {
 | |
| 	struct rtattr *tb[TCA_U32_MAX + 1];
 | |
| 	struct tc_u32_sel *sel = NULL;
 | |
| 	struct tc_u32_pcnt *pf = NULL;
 | |
| 
 | |
| 	if (opt == NULL)
 | |
| 		return 0;
 | |
| 
 | |
| 	parse_rtattr_nested(tb, TCA_U32_MAX, opt);
 | |
| 
 | |
| 	if (handle) {
 | |
| 		SPRINT_BUF(b1);
 | |
| 		fprintf(f, "fh %s ", sprint_u32_handle(handle, b1));
 | |
| 	}
 | |
| 
 | |
| 	if (TC_U32_NODE(handle))
 | |
| 		fprintf(f, "order %d ", TC_U32_NODE(handle));
 | |
| 
 | |
| 	if (tb[TCA_U32_SEL]) {
 | |
| 		if (RTA_PAYLOAD(tb[TCA_U32_SEL])  < sizeof(*sel))
 | |
| 			return -1;
 | |
| 
 | |
| 		sel = RTA_DATA(tb[TCA_U32_SEL]);
 | |
| 	}
 | |
| 
 | |
| 	if (tb[TCA_U32_DIVISOR]) {
 | |
| 		fprintf(f, "ht divisor %d ",
 | |
| 			rta_getattr_u32(tb[TCA_U32_DIVISOR]));
 | |
| 	} else if (tb[TCA_U32_HASH]) {
 | |
| 		__u32 htid = rta_getattr_u32(tb[TCA_U32_HASH]);
 | |
| 
 | |
| 		fprintf(f, "key ht %x bkt %x ", TC_U32_USERHTID(htid),
 | |
| 			TC_U32_HASH(htid));
 | |
| 	} else {
 | |
| 		fprintf(f, "??? ");
 | |
| 	}
 | |
| 	if (tb[TCA_U32_CLASSID]) {
 | |
| 		SPRINT_BUF(b1);
 | |
| 		fprintf(f, "%sflowid %s ",
 | |
| 			!sel || !(sel->flags & TC_U32_TERMINAL) ? "*" : "",
 | |
| 			sprint_tc_classid(rta_getattr_u32(tb[TCA_U32_CLASSID]),
 | |
| 					  b1));
 | |
| 	} else if (sel && sel->flags & TC_U32_TERMINAL) {
 | |
| 		fprintf(f, "terminal flowid ??? ");
 | |
| 	}
 | |
| 	if (tb[TCA_U32_LINK]) {
 | |
| 		SPRINT_BUF(b1);
 | |
| 		fprintf(f, "link %s ",
 | |
| 			sprint_u32_handle(rta_getattr_u32(tb[TCA_U32_LINK]),
 | |
| 					  b1));
 | |
| 	}
 | |
| 
 | |
| 	if (tb[TCA_U32_FLAGS]) {
 | |
| 		__u32 flags = rta_getattr_u32(tb[TCA_U32_FLAGS]);
 | |
| 
 | |
| 		if (flags & TCA_CLS_FLAGS_SKIP_HW)
 | |
| 			fprintf(f, "skip_hw ");
 | |
| 		if (flags & TCA_CLS_FLAGS_SKIP_SW)
 | |
| 			fprintf(f, "skip_sw ");
 | |
| 
 | |
| 		if (flags & TCA_CLS_FLAGS_IN_HW)
 | |
| 			fprintf(f, "in_hw ");
 | |
| 		else if (flags & TCA_CLS_FLAGS_NOT_IN_HW)
 | |
| 			fprintf(f, "not_in_hw ");
 | |
| 	}
 | |
| 
 | |
| 	if (tb[TCA_U32_PCNT]) {
 | |
| 		if (RTA_PAYLOAD(tb[TCA_U32_PCNT])  < sizeof(*pf)) {
 | |
| 			fprintf(f, "Broken perf counters\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 		pf = RTA_DATA(tb[TCA_U32_PCNT]);
 | |
| 	}
 | |
| 
 | |
| 	if (sel && show_stats && NULL != pf)
 | |
| 		fprintf(f, " (rule hit %llu success %llu)",
 | |
| 			(unsigned long long) pf->rcnt,
 | |
| 			(unsigned long long) pf->rhit);
 | |
| 
 | |
| 	if (tb[TCA_U32_MARK]) {
 | |
| 		struct tc_u32_mark *mark = RTA_DATA(tb[TCA_U32_MARK]);
 | |
| 
 | |
| 		if (RTA_PAYLOAD(tb[TCA_U32_MARK]) < sizeof(*mark)) {
 | |
| 			fprintf(f, "\n  Invalid mark (kernel&iproute2 mismatch)\n");
 | |
| 		} else {
 | |
| 			fprintf(f, "\n  mark 0x%04x 0x%04x (success %d)",
 | |
| 				mark->val, mark->mask, mark->success);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if (sel) {
 | |
| 		if (sel->nkeys) {
 | |
| 			int i;
 | |
| 
 | |
| 			for (i = 0; i < sel->nkeys; i++) {
 | |
| 				show_keys(f, sel->keys + i);
 | |
| 				if (show_stats && NULL != pf)
 | |
| 					fprintf(f, " (success %llu ) ",
 | |
| 						(unsigned long long) pf->kcnts[i]);
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if (sel->flags & (TC_U32_VAROFFSET | TC_U32_OFFSET)) {
 | |
| 			fprintf(f, "\n    offset ");
 | |
| 			if (sel->flags & TC_U32_VAROFFSET)
 | |
| 				fprintf(f, "%04x>>%d at %d ",
 | |
| 					ntohs(sel->offmask),
 | |
| 					sel->offshift,  sel->offoff);
 | |
| 			if (sel->off)
 | |
| 				fprintf(f, "plus %d ", sel->off);
 | |
| 		}
 | |
| 		if (sel->flags & TC_U32_EAT)
 | |
| 			fprintf(f, " eat ");
 | |
| 
 | |
| 		if (sel->hmask) {
 | |
| 			fprintf(f, "\n    hash mask %08x at %d ",
 | |
| 				(unsigned int)htonl(sel->hmask), sel->hoff);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if (tb[TCA_U32_POLICE]) {
 | |
| 		fprintf(f, "\n");
 | |
| 		tc_print_police(f, tb[TCA_U32_POLICE]);
 | |
| 	}
 | |
| 
 | |
| 	if (tb[TCA_U32_INDEV]) {
 | |
| 		struct rtattr *idev = tb[TCA_U32_INDEV];
 | |
| 
 | |
| 		fprintf(f, "\n  input dev %s\n", rta_getattr_str(idev));
 | |
| 	}
 | |
| 
 | |
| 	if (tb[TCA_U32_ACT])
 | |
| 		tc_print_action(f, tb[TCA_U32_ACT], 0);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| struct filter_util u32_filter_util = {
 | |
| 	.id = "u32",
 | |
| 	.parse_fopt = u32_parse_opt,
 | |
| 	.print_fopt = u32_print_opt,
 | |
| };
 |