mirror_iproute2/tc/m_tunnel_key.c
Matteo Croce 8589eb4efd treewide: refactor help messages
Every tool in the iproute2 package have one or more function to show
an help message to the user. Some of these functions print the help
line by line with a series of printf call, e.g. ip/xfrm_state.c does
60 fprintf calls.
If we group all the calls to a single one and just concatenate strings,
we save a lot of libc calls and thus object size. The size difference
of the compiled binaries calculated with bloat-o-meter is:

        ip/ip:
        add/remove: 0/0 grow/shrink: 5/15 up/down: 103/-4796 (-4693)
        Total: Before=672591, After=667898, chg -0.70%
        ip/rtmon:
        add/remove: 0/0 grow/shrink: 0/1 up/down: 0/-54 (-54)
        Total: Before=48879, After=48825, chg -0.11%
        tc/tc:
        add/remove: 0/2 grow/shrink: 31/10 up/down: 882/-6133 (-5251)
        Total: Before=351912, After=346661, chg -1.49%
        bridge/bridge:
        add/remove: 0/0 grow/shrink: 0/1 up/down: 0/-459 (-459)
        Total: Before=70502, After=70043, chg -0.65%
        misc/lnstat:
        add/remove: 0/1 grow/shrink: 1/0 up/down: 48/-486 (-438)
        Total: Before=9960, After=9522, chg -4.40%
        tipc/tipc:
        add/remove: 0/0 grow/shrink: 1/1 up/down: 18/-62 (-44)
        Total: Before=79182, After=79138, chg -0.06%

While at it, indent some strings which were starting at column 0,
and use tabs where possible, to have a consistent style across helps.

Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: David Ahern <dsahern@gmail.com>
2019-05-20 14:35:07 -07:00

557 lines
13 KiB
C

/*
* m_tunnel_key.c ip tunnel manipulation module
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version
* 2 of the License, or (at your option) any later version.
*
* Authors: Amir Vadai <amir@vadai.me>
*/
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <linux/if_ether.h>
#include "utils.h"
#include "rt_names.h"
#include "tc_util.h"
#include <linux/tc_act/tc_tunnel_key.h>
static void explain(void)
{
fprintf(stderr,
"Usage: tunnel_key unset\n"
" tunnel_key set <TUNNEL_KEY>\n"
"Where TUNNEL_KEY is a combination of:\n"
"id <TUNNELID>\n"
"src_ip <IP> (mandatory)\n"
"dst_ip <IP> (mandatory)\n"
"dst_port <UDP_PORT>\n"
"geneve_opts <OPTIONS>\n"
"csum | nocsum (default is \"csum\")\n");
}
static void usage(void)
{
explain();
exit(-1);
}
static int tunnel_key_parse_ip_addr(const char *str, int addr4_type,
int addr6_type, struct nlmsghdr *n)
{
inet_prefix addr;
int ret;
ret = get_addr(&addr, str, AF_UNSPEC);
if (ret)
return ret;
addattr_l(n, MAX_MSG, addr.family == AF_INET ? addr4_type : addr6_type,
addr.data, addr.bytelen);
return 0;
}
static int tunnel_key_parse_key_id(const char *str, int type,
struct nlmsghdr *n)
{
__be32 key_id;
int ret;
ret = get_be32(&key_id, str, 10);
if (!ret)
addattr32(n, MAX_MSG, type, key_id);
return ret;
}
static int tunnel_key_parse_dst_port(char *str, int type, struct nlmsghdr *n)
{
int ret;
__be16 dst_port;
ret = get_be16(&dst_port, str, 10);
if (ret)
return -1;
addattr16(n, MAX_MSG, type, dst_port);
return 0;
}
static int tunnel_key_parse_be16(char *str, int base, int type,
struct nlmsghdr *n)
{
int ret;
__be16 value;
ret = get_be16(&value, str, base);
if (ret)
return ret;
addattr16(n, MAX_MSG, type, value);
return 0;
}
static int tunnel_key_parse_u8(char *str, int base, int type,
struct nlmsghdr *n)
{
int ret;
__u8 value;
ret = get_u8(&value, str, base);
if (ret)
return ret;
addattr8(n, MAX_MSG, type, value);
return 0;
}
static int tunnel_key_parse_geneve_opt(char *str, struct nlmsghdr *n)
{
char *token, *saveptr = NULL;
struct rtattr *nest;
int i, ret;
nest = addattr_nest(n, MAX_MSG, TCA_TUNNEL_KEY_ENC_OPTS_GENEVE);
token = strtok_r(str, ":", &saveptr);
i = 1;
while (token) {
switch (i) {
case TCA_TUNNEL_KEY_ENC_OPT_GENEVE_CLASS:
{
ret = tunnel_key_parse_be16(token, 16, i, n);
if (ret)
return ret;
break;
}
case TCA_TUNNEL_KEY_ENC_OPT_GENEVE_TYPE:
{
ret = tunnel_key_parse_u8(token, 16, i, n);
if (ret)
return ret;
break;
}
case TCA_TUNNEL_KEY_ENC_OPT_GENEVE_DATA:
{
size_t token_len = strlen(token);
uint8_t *opts;
opts = malloc(token_len / 2);
if (!opts)
return -1;
if (hex2mem(token, opts, token_len / 2) < 0) {
free(opts);
return -1;
}
addattr_l(n, MAX_MSG, i, opts, token_len / 2);
free(opts);
break;
}
default:
return -1;
}
token = strtok_r(NULL, ":", &saveptr);
i++;
}
addattr_nest_end(n, nest);
return 0;
}
static int tunnel_key_parse_geneve_opts(char *str, struct nlmsghdr *n)
{
char *token, *saveptr = NULL;
struct rtattr *nest;
int ret;
nest = addattr_nest(n, MAX_MSG, TCA_TUNNEL_KEY_ENC_OPTS);
token = strtok_r(str, ",", &saveptr);
while (token) {
ret = tunnel_key_parse_geneve_opt(token, n);
if (ret)
return ret;
token = strtok_r(NULL, ",", &saveptr);
}
addattr_nest_end(n, nest);
return 0;
}
static int tunnel_key_parse_tos_ttl(char *str, int type, struct nlmsghdr *n)
{
int ret;
__u8 val;
ret = get_u8(&val, str, 10);
if (ret)
ret = get_u8(&val, str, 16);
if (ret)
return -1;
addattr8(n, MAX_MSG, type, val);
return 0;
}
static int parse_tunnel_key(struct action_util *a, int *argc_p, char ***argv_p,
int tca_id, struct nlmsghdr *n)
{
struct tc_tunnel_key parm = {};
char **argv = *argv_p;
int argc = *argc_p;
struct rtattr *tail;
int action = 0;
int ret;
int has_src_ip = 0;
int has_dst_ip = 0;
int csum = 1;
if (matches(*argv, "tunnel_key") != 0)
return -1;
tail = addattr_nest(n, MAX_MSG, tca_id);
NEXT_ARG();
while (argc > 0) {
if (matches(*argv, "unset") == 0) {
if (action) {
fprintf(stderr, "unexpected \"%s\" - action already specified\n",
*argv);
explain();
return -1;
}
action = TCA_TUNNEL_KEY_ACT_RELEASE;
} else if (matches(*argv, "set") == 0) {
if (action) {
fprintf(stderr, "unexpected \"%s\" - action already specified\n",
*argv);
explain();
return -1;
}
action = TCA_TUNNEL_KEY_ACT_SET;
} else if (matches(*argv, "src_ip") == 0) {
NEXT_ARG();
ret = tunnel_key_parse_ip_addr(*argv,
TCA_TUNNEL_KEY_ENC_IPV4_SRC,
TCA_TUNNEL_KEY_ENC_IPV6_SRC,
n);
if (ret < 0) {
fprintf(stderr, "Illegal \"src_ip\"\n");
return -1;
}
has_src_ip = 1;
} else if (matches(*argv, "dst_ip") == 0) {
NEXT_ARG();
ret = tunnel_key_parse_ip_addr(*argv,
TCA_TUNNEL_KEY_ENC_IPV4_DST,
TCA_TUNNEL_KEY_ENC_IPV6_DST,
n);
if (ret < 0) {
fprintf(stderr, "Illegal \"dst_ip\"\n");
return -1;
}
has_dst_ip = 1;
} else if (matches(*argv, "id") == 0) {
NEXT_ARG();
ret = tunnel_key_parse_key_id(*argv, TCA_TUNNEL_KEY_ENC_KEY_ID, n);
if (ret < 0) {
fprintf(stderr, "Illegal \"id\"\n");
return -1;
}
} else if (matches(*argv, "dst_port") == 0) {
NEXT_ARG();
ret = tunnel_key_parse_dst_port(*argv,
TCA_TUNNEL_KEY_ENC_DST_PORT, n);
if (ret < 0) {
fprintf(stderr, "Illegal \"dst port\"\n");
return -1;
}
} else if (matches(*argv, "geneve_opts") == 0) {
NEXT_ARG();
if (tunnel_key_parse_geneve_opts(*argv, n)) {
fprintf(stderr, "Illegal \"geneve_opts\"\n");
return -1;
}
} else if (matches(*argv, "tos") == 0) {
NEXT_ARG();
ret = tunnel_key_parse_tos_ttl(*argv,
TCA_TUNNEL_KEY_ENC_TOS, n);
if (ret < 0) {
fprintf(stderr, "Illegal \"tos\"\n");
return -1;
}
} else if (matches(*argv, "ttl") == 0) {
NEXT_ARG();
ret = tunnel_key_parse_tos_ttl(*argv,
TCA_TUNNEL_KEY_ENC_TTL, n);
if (ret < 0) {
fprintf(stderr, "Illegal \"ttl\"\n");
return -1;
}
} else if (matches(*argv, "csum") == 0) {
csum = 1;
} else if (matches(*argv, "nocsum") == 0) {
csum = 0;
} else if (matches(*argv, "help") == 0) {
usage();
} else {
break;
}
NEXT_ARG_FWD();
}
addattr8(n, MAX_MSG, TCA_TUNNEL_KEY_NO_CSUM, !csum);
parse_action_control_dflt(&argc, &argv, &parm.action,
false, TC_ACT_PIPE);
if (argc) {
if (matches(*argv, "index") == 0) {
NEXT_ARG();
if (get_u32(&parm.index, *argv, 10)) {
fprintf(stderr, "tunnel_key: Illegal \"index\"\n");
return -1;
}
NEXT_ARG_FWD();
}
}
if (action == TCA_TUNNEL_KEY_ACT_SET &&
(!has_src_ip || !has_dst_ip)) {
fprintf(stderr, "set needs tunnel_key parameters\n");
explain();
return -1;
}
parm.t_action = action;
addattr_l(n, MAX_MSG, TCA_TUNNEL_KEY_PARMS, &parm, sizeof(parm));
addattr_nest_end(n, tail);
*argc_p = argc;
*argv_p = argv;
return 0;
}
static void tunnel_key_print_ip_addr(FILE *f, const char *name,
struct rtattr *attr)
{
int family;
size_t len;
if (!attr)
return;
len = RTA_PAYLOAD(attr);
if (len == 4)
family = AF_INET;
else if (len == 16)
family = AF_INET6;
else
return;
print_string(PRINT_FP, NULL, "%s", _SL_);
if (matches(name, "src_ip") == 0)
print_string(PRINT_ANY, "src_ip", "\tsrc_ip %s",
rt_addr_n2a_rta(family, attr));
else if (matches(name, "dst_ip") == 0)
print_string(PRINT_ANY, "dst_ip", "\tdst_ip %s",
rt_addr_n2a_rta(family, attr));
}
static void tunnel_key_print_key_id(FILE *f, const char *name,
struct rtattr *attr)
{
if (!attr)
return;
print_string(PRINT_FP, NULL, "%s", _SL_);
print_uint(PRINT_ANY, "key_id", "\tkey_id %u", rta_getattr_be32(attr));
}
static void tunnel_key_print_dst_port(FILE *f, char *name,
struct rtattr *attr)
{
if (!attr)
return;
print_string(PRINT_FP, NULL, "%s", _SL_);
print_uint(PRINT_ANY, "dst_port", "\tdst_port %u",
rta_getattr_be16(attr));
}
static void tunnel_key_print_flag(FILE *f, const char *name_on,
const char *name_off,
struct rtattr *attr)
{
if (!attr)
return;
print_string(PRINT_FP, NULL, "%s", _SL_);
print_string(PRINT_ANY, "flag", "\t%s",
rta_getattr_u8(attr) ? name_on : name_off);
}
static void tunnel_key_print_geneve_options(const char *name,
struct rtattr *attr)
{
struct rtattr *tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_MAX + 1];
struct rtattr *i = RTA_DATA(attr);
int ii, data_len = 0, offset = 0;
int rem = RTA_PAYLOAD(attr);
char strbuf[rem * 2 + 1];
char data[rem * 2 + 1];
uint8_t data_r[rem];
uint16_t clss;
uint8_t type;
open_json_array(PRINT_JSON, name);
print_string(PRINT_FP, name, "\n\t%s ", "geneve_opt");
while (rem) {
parse_rtattr(tb, TCA_TUNNEL_KEY_ENC_OPT_GENEVE_MAX, i, rem);
clss = rta_getattr_be16(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_CLASS]);
type = rta_getattr_u8(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_TYPE]);
data_len = RTA_PAYLOAD(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_DATA]);
hexstring_n2a(RTA_DATA(tb[TCA_TUNNEL_KEY_ENC_OPT_GENEVE_DATA]),
data_len, data, sizeof(data));
hex2mem(data, data_r, data_len);
offset += data_len + 20;
rem -= data_len + 20;
i = RTA_DATA(attr) + offset;
open_json_object(NULL);
print_uint(PRINT_JSON, "class", NULL, clss);
print_uint(PRINT_JSON, "type", NULL, type);
open_json_array(PRINT_JSON, "data");
for (ii = 0; ii < data_len; ii++)
print_uint(PRINT_JSON, NULL, NULL, data_r[ii]);
close_json_array(PRINT_JSON, "data");
close_json_object();
sprintf(strbuf, "%04x:%02x:%s", clss, type, data);
if (rem)
print_string(PRINT_FP, NULL, "%s,", strbuf);
else
print_string(PRINT_FP, NULL, "%s", strbuf);
}
close_json_array(PRINT_JSON, name);
}
static void tunnel_key_print_key_opt(const char *name, struct rtattr *attr)
{
struct rtattr *tb[TCA_TUNNEL_KEY_ENC_OPTS_MAX + 1];
if (!attr)
return;
parse_rtattr_nested(tb, TCA_TUNNEL_KEY_ENC_OPTS_MAX, attr);
tunnel_key_print_geneve_options(name,
tb[TCA_TUNNEL_KEY_ENC_OPTS_GENEVE]);
}
static void tunnel_key_print_tos_ttl(FILE *f, char *name,
struct rtattr *attr)
{
if (!attr)
return;
if (matches(name, "tos") == 0 && rta_getattr_u8(attr) != 0) {
print_string(PRINT_FP, NULL, "%s", _SL_);
print_uint(PRINT_ANY, "tos", "\ttos 0x%x",
rta_getattr_u8(attr));
} else if (matches(name, "ttl") == 0 && rta_getattr_u8(attr) != 0) {
print_string(PRINT_FP, NULL, "%s", _SL_);
print_uint(PRINT_ANY, "ttl", "\tttl %u",
rta_getattr_u8(attr));
}
}
static int print_tunnel_key(struct action_util *au, FILE *f, struct rtattr *arg)
{
struct rtattr *tb[TCA_TUNNEL_KEY_MAX + 1];
struct tc_tunnel_key *parm;
if (!arg)
return -1;
parse_rtattr_nested(tb, TCA_TUNNEL_KEY_MAX, arg);
if (!tb[TCA_TUNNEL_KEY_PARMS]) {
print_string(PRINT_FP, NULL, "%s",
"[NULL tunnel_key parameters]");
return -1;
}
parm = RTA_DATA(tb[TCA_TUNNEL_KEY_PARMS]);
print_string(PRINT_ANY, "kind", "%s ", "tunnel_key");
switch (parm->t_action) {
case TCA_TUNNEL_KEY_ACT_RELEASE:
print_string(PRINT_ANY, "mode", " %s", "unset");
break;
case TCA_TUNNEL_KEY_ACT_SET:
print_string(PRINT_ANY, "mode", " %s", "set");
tunnel_key_print_ip_addr(f, "src_ip",
tb[TCA_TUNNEL_KEY_ENC_IPV4_SRC]);
tunnel_key_print_ip_addr(f, "dst_ip",
tb[TCA_TUNNEL_KEY_ENC_IPV4_DST]);
tunnel_key_print_ip_addr(f, "src_ip",
tb[TCA_TUNNEL_KEY_ENC_IPV6_SRC]);
tunnel_key_print_ip_addr(f, "dst_ip",
tb[TCA_TUNNEL_KEY_ENC_IPV6_DST]);
tunnel_key_print_key_id(f, "key_id",
tb[TCA_TUNNEL_KEY_ENC_KEY_ID]);
tunnel_key_print_dst_port(f, "dst_port",
tb[TCA_TUNNEL_KEY_ENC_DST_PORT]);
tunnel_key_print_key_opt("geneve_opts",
tb[TCA_TUNNEL_KEY_ENC_OPTS]);
tunnel_key_print_flag(f, "nocsum", "csum",
tb[TCA_TUNNEL_KEY_NO_CSUM]);
tunnel_key_print_tos_ttl(f, "tos",
tb[TCA_TUNNEL_KEY_ENC_TOS]);
tunnel_key_print_tos_ttl(f, "ttl",
tb[TCA_TUNNEL_KEY_ENC_TTL]);
break;
}
print_action_control(f, " ", parm->action, "");
print_string(PRINT_FP, NULL, "%s", _SL_);
print_uint(PRINT_ANY, "index", "\t index %u", parm->index);
print_int(PRINT_ANY, "ref", " ref %d", parm->refcnt);
print_int(PRINT_ANY, "bind", " bind %d", parm->bindcnt);
if (show_stats) {
if (tb[TCA_TUNNEL_KEY_TM]) {
struct tcf_t *tm = RTA_DATA(tb[TCA_TUNNEL_KEY_TM]);
print_tm(f, tm);
}
}
print_string(PRINT_FP, NULL, "%s", _SL_);
return 0;
}
struct action_util tunnel_key_action_util = {
.id = "tunnel_key",
.parse_aopt = parse_tunnel_key,
.print_aopt = print_tunnel_key,
};