1 /* 2 * q_u32.c U32 filter. 3 * 4 * This program is free software; you can u32istribute it and/or 5 * modify it under the terms of the GNU General Public License 6 * as published by the Free Software Foundation; either version 7 * 2 of the License, or (at your option) any later version. 8 * 9 * Authors: Alexey Kuznetsov, <kuznet (at) ms2.inr.ac.ru> 10 * Match mark added by Catalin(ux aka Dino) BOIE <catab at umbrella.ro> [5 nov 2004] 11 * 12 */ 13 14 #include <stdio.h> 15 #include <stdlib.h> 16 #include <unistd.h> 17 #include <syslog.h> 18 #include <fcntl.h> 19 #include <sys/socket.h> 20 #include <netinet/in.h> 21 #include <arpa/inet.h> 22 #include <string.h> 23 #include <linux/if.h> 24 #include <linux/if_ether.h> 25 26 #include "utils.h" 27 #include "tc_util.h" 28 29 extern int show_pretty; 30 31 static void explain(void) 32 { 33 fprintf(stderr, "Usage: ... u32 [ match SELECTOR ... ] [ link HTID ]" 34 " [ classid CLASSID ]\n"); 35 fprintf(stderr, " [ police POLICE_SPEC ]" 36 " [ offset OFFSET_SPEC ]\n"); 37 fprintf(stderr, " [ ht HTID ] [ hashkey HASHKEY_SPEC ]\n"); 38 fprintf(stderr, " [ sample SAMPLE ]\n"); 39 fprintf(stderr, "or u32 divisor DIVISOR\n"); 40 fprintf(stderr, "\n"); 41 fprintf(stderr, "Where: SELECTOR := SAMPLE SAMPLE ...\n"); 42 fprintf(stderr, " SAMPLE := { ip | ip6 | udp | tcp | icmp |" 43 " u{32|16|8} | mark } SAMPLE_ARGS [divisor DIVISOR]\n"); 44 fprintf(stderr, " FILTERID := X:Y:Z\n"); 45 fprintf(stderr, "\nNOTE: CLASSID is parsed at hexadecimal input.\n"); 46 } 47 48 int get_u32_handle(__u32 *handle, const char *str) 49 { 50 __u32 htid=0, hash=0, nodeid=0; 51 char *tmp = strchr(str, ':'); 52 53 if (tmp == NULL) { 54 if (memcmp("0x", str, 2) == 0) 55 return get_u32(handle, str, 16); 56 return -1; 57 } 58 htid = strtoul(str, &tmp, 16); 59 if (tmp == str && *str != ':' && *str != 0) 60 return -1; 61 if (htid>=0x1000) 62 return -1; 63 if (*tmp) { 64 str = tmp+1; 65 hash = strtoul(str, &tmp, 16); 66 if (tmp == str && *str != ':' && *str != 0) 67 return -1; 68 if (hash>=0x100) 69 return -1; 70 if (*tmp) { 71 str = tmp+1; 72 nodeid = strtoul(str, &tmp, 16); 73 if (tmp == str && *str != 0) 74 return -1; 75 if (nodeid>=0x1000) 76 return -1; 77 } 78 } 79 *handle = (htid<<20)|(hash<<12)|nodeid; 80 return 0; 81 } 82 83 char * sprint_u32_handle(__u32 handle, char *buf) 84 { 85 int bsize = SPRINT_BSIZE-1; 86 __u32 htid = TC_U32_HTID(handle); 87 __u32 hash = TC_U32_HASH(handle); 88 __u32 nodeid = TC_U32_NODE(handle); 89 char *b = buf; 90 91 if (handle == 0) { 92 snprintf(b, bsize, "none"); 93 return b; 94 } 95 if (htid) { 96 int l = snprintf(b, bsize, "%x:", htid>>20); 97 bsize -= l; 98 b += l; 99 } 100 if (nodeid|hash) { 101 if (hash) { 102 int l = snprintf(b, bsize, "%x", hash); 103 bsize -= l; 104 b += l; 105 } 106 if (nodeid) { 107 int l = snprintf(b, bsize, ":%x", nodeid); 108 bsize -= l; 109 b += l; 110 } 111 } 112 if (show_raw) 113 snprintf(b, bsize, "[%08x] ", handle); 114 return buf; 115 } 116 117 static int pack_key(struct tc_u32_sel *sel, __u32 key, __u32 mask, 118 int off, int offmask) 119 { 120 int i; 121 int hwm = sel->nkeys; 122 123 key &= mask; 124 125 for (i=0; i<hwm; i++) { 126 if (sel->keys[i].off == off && sel->keys[i].offmask == offmask) { 127 __u32 intersect = mask&sel->keys[i].mask; 128 129 if ((key^sel->keys[i].val) & intersect) 130 return -1; 131 sel->keys[i].val |= key; 132 sel->keys[i].mask |= mask; 133 return 0; 134 } 135 } 136 137 if (hwm >= 128) 138 return -1; 139 if (off % 4) 140 return -1; 141 sel->keys[hwm].val = key; 142 sel->keys[hwm].mask = mask; 143 sel->keys[hwm].off = off; 144 sel->keys[hwm].offmask = offmask; 145 sel->nkeys++; 146 return 0; 147 } 148 149 static int pack_key32(struct tc_u32_sel *sel, __u32 key, __u32 mask, 150 int off, int offmask) 151 { 152 key = htonl(key); 153 mask = htonl(mask); 154 return pack_key(sel, key, mask, off, offmask); 155 } 156 157 static int pack_key16(struct tc_u32_sel *sel, __u32 key, __u32 mask, 158 int off, int offmask) 159 { 160 if (key > 0xFFFF || mask > 0xFFFF) 161 return -1; 162 163 if ((off & 3) == 0) { 164 key <<= 16; 165 mask <<= 16; 166 } 167 off &= ~3; 168 key = htonl(key); 169 mask = htonl(mask); 170 171 return pack_key(sel, key, mask, off, offmask); 172 } 173 174 static int pack_key8(struct tc_u32_sel *sel, __u32 key, __u32 mask, int off, int offmask) 175 { 176 if (key > 0xFF || mask > 0xFF) 177 return -1; 178 179 if ((off & 3) == 0) { 180 key <<= 24; 181 mask <<= 24; 182 } else if ((off & 3) == 1) { 183 key <<= 16; 184 mask <<= 16; 185 } else if ((off & 3) == 2) { 186 key <<= 8; 187 mask <<= 8; 188 } 189 off &= ~3; 190 key = htonl(key); 191 mask = htonl(mask); 192 193 return pack_key(sel, key, mask, off, offmask); 194 } 195 196 197 int parse_at(int *argc_p, char ***argv_p, int *off, int *offmask) 198 { 199 int argc = *argc_p; 200 char **argv = *argv_p; 201 char *p = *argv; 202 203 if (argc <= 0) 204 return -1; 205 206 if (strlen(p) > strlen("nexthdr+") && 207 memcmp(p, "nexthdr+", strlen("nexthdr+")) == 0) { 208 *offmask = -1; 209 p += strlen("nexthdr+"); 210 } else if (matches(*argv, "nexthdr+") == 0) { 211 NEXT_ARG(); 212 *offmask = -1; 213 p = *argv; 214 } 215 216 if (get_integer(off, p, 0)) 217 return -1; 218 argc--; argv++; 219 220 *argc_p = argc; 221 *argv_p = argv; 222 return 0; 223 } 224 225 226 static int parse_u32(int *argc_p, char ***argv_p, struct tc_u32_sel *sel, 227 int off, int offmask) 228 { 229 int res = -1; 230 int argc = *argc_p; 231 char **argv = *argv_p; 232 __u32 key; 233 __u32 mask; 234 235 if (argc < 2) 236 return -1; 237 238 if (get_u32(&key, *argv, 0)) 239 return -1; 240 argc--; argv++; 241 242 if (get_u32(&mask, *argv, 16)) 243 return -1; 244 argc--; argv++; 245 246 if (argc > 0 && strcmp(argv[0], "at") == 0) { 247 NEXT_ARG(); 248 if (parse_at(&argc, &argv, &off, &offmask)) 249 return -1; 250 } 251 252 res = pack_key32(sel, key, mask, off, offmask); 253 *argc_p = argc; 254 *argv_p = argv; 255 return res; 256 } 257 258 static int parse_u16(int *argc_p, char ***argv_p, struct tc_u32_sel *sel, 259 int off, int offmask) 260 { 261 int res = -1; 262 int argc = *argc_p; 263 char **argv = *argv_p; 264 __u32 key; 265 __u32 mask; 266 267 if (argc < 2) 268 return -1; 269 270 if (get_u32(&key, *argv, 0)) 271 return -1; 272 argc--; argv++; 273 274 if (get_u32(&mask, *argv, 16)) 275 return -1; 276 argc--; argv++; 277 278 if (argc > 0 && strcmp(argv[0], "at") == 0) { 279 NEXT_ARG(); 280 if (parse_at(&argc, &argv, &off, &offmask)) 281 return -1; 282 } 283 res = pack_key16(sel, key, mask, off, offmask); 284 *argc_p = argc; 285 *argv_p = argv; 286 return res; 287 } 288 289 static int parse_u8(int *argc_p, char ***argv_p, struct tc_u32_sel *sel, 290 int off, int offmask) 291 { 292 int res = -1; 293 int argc = *argc_p; 294 char **argv = *argv_p; 295 __u32 key; 296 __u32 mask; 297 298 if (argc < 2) 299 return -1; 300 301 if (get_u32(&key, *argv, 0)) 302 return -1; 303 argc--; argv++; 304 305 if (get_u32(&mask, *argv, 16)) 306 return -1; 307 argc--; argv++; 308 309 if (key > 0xFF || mask > 0xFF) 310 return -1; 311 312 if (argc > 0 && strcmp(argv[0], "at") == 0) { 313 NEXT_ARG(); 314 if (parse_at(&argc, &argv, &off, &offmask)) 315 return -1; 316 } 317 318 res = pack_key8(sel, key, mask, off, offmask); 319 *argc_p = argc; 320 *argv_p = argv; 321 return res; 322 } 323 324 static int parse_ip_addr(int *argc_p, char ***argv_p, struct tc_u32_sel *sel, 325 int off) 326 { 327 int res = -1; 328 int argc = *argc_p; 329 char **argv = *argv_p; 330 inet_prefix addr; 331 __u32 mask; 332 int offmask = 0; 333 334 if (argc < 1) 335 return -1; 336 337 if (get_prefix_1(&addr, *argv, AF_INET)) 338 return -1; 339 argc--; argv++; 340 341 if (argc > 0 && strcmp(argv[0], "at") == 0) { 342 NEXT_ARG(); 343 if (parse_at(&argc, &argv, &off, &offmask)) 344 return -1; 345 } 346 347 mask = 0; 348 if (addr.bitlen) 349 mask = htonl(0xFFFFFFFF<<(32-addr.bitlen)); 350 if (pack_key(sel, addr.data[0], mask, off, offmask) < 0) 351 return -1; 352 res = 0; 353 354 *argc_p = argc; 355 *argv_p = argv; 356 return res; 357 } 358 359 static int parse_ip6_addr(int *argc_p, char ***argv_p, 360 struct tc_u32_sel *sel, int off) 361 { 362 int res = -1; 363 int argc = *argc_p; 364 char **argv = *argv_p; 365 int plen = 128; 366 int i; 367 inet_prefix addr; 368 int offmask = 0; 369 370 if (argc < 1) 371 return -1; 372 373 if (get_prefix_1(&addr, *argv, AF_INET6)) 374 return -1; 375 argc--; argv++; 376 377 if (argc > 0 && strcmp(argv[0], "at") == 0) { 378 NEXT_ARG(); 379 if (parse_at(&argc, &argv, &off, &offmask)) 380 return -1; 381 } 382 383 plen = addr.bitlen; 384 for (i=0; i<plen; i+=32) { 385 // if (((i+31)&~0x1F)<=plen) { 386 if (i + 31 <= plen) { 387 res = pack_key(sel, addr.data[i/32], 388 0xFFFFFFFF, off+4*(i/32), offmask); 389 if (res < 0) 390 return -1; 391 } else if (i < plen) { 392 __u32 mask = htonl(0xFFFFFFFF << (32 - (plen -i ))); 393 res = pack_key(sel, addr.data[i/32], 394 mask, off+4*(i/32), offmask); 395 if (res < 0) 396 return -1; 397 } 398 } 399 res = 0; 400 401 *argc_p = argc; 402 *argv_p = argv; 403 return res; 404 } 405 406 static int parse_ip6_class(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 407 { 408 int res = -1; 409 int argc = *argc_p; 410 char **argv = *argv_p; 411 __u32 key; 412 __u32 mask; 413 int off = 0; 414 int offmask = 0; 415 416 if (argc < 2) 417 return -1; 418 419 if (get_u32(&key, *argv, 0)) 420 return -1; 421 argc--; argv++; 422 423 if (get_u32(&mask, *argv, 16)) 424 return -1; 425 argc--; argv++; 426 427 if (key > 0xFF || mask > 0xFF) 428 return -1; 429 430 key <<= 20; 431 mask <<= 20; 432 key = htonl(key); 433 mask = htonl(mask); 434 435 if (res = pack_key(sel, key, mask, off, offmask) < 0) 436 return -1; 437 438 *argc_p = argc; 439 *argv_p = argv; 440 return 0; 441 } 442 443 static int parse_ether_addr(int *argc_p, char ***argv_p, 444 struct tc_u32_sel *sel, int off) 445 { 446 int res = -1; 447 int argc = *argc_p; 448 char **argv = *argv_p; 449 __u8 addr[6]; 450 int offmask = 0; 451 int i; 452 453 if (argc < 1) 454 return -1; 455 456 if (sscanf(*argv, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx", 457 addr + 0, addr + 1, addr + 2, 458 addr + 3, addr + 4, addr + 5) != 6) { 459 fprintf(stderr, "parse_ether_addr: improperly formed address '%s'\n", 460 *argv); 461 return -1; 462 } 463 464 argc--; argv++; 465 if (argc > 0 && strcmp(argv[0], "at") == 0) { 466 NEXT_ARG(); 467 if (parse_at(&argc, &argv, &off, &offmask)) 468 return -1; 469 } 470 471 for (i = 0; i < 6; i++) { 472 res = pack_key8(sel, addr[i], 0xFF, off + i, offmask); 473 if (res < 0) 474 return -1; 475 } 476 477 *argc_p = argc; 478 *argv_p = argv; 479 return res; 480 } 481 482 static int parse_ip(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 483 { 484 int res = -1; 485 int argc = *argc_p; 486 char **argv = *argv_p; 487 488 if (argc < 2) 489 return -1; 490 491 if (strcmp(*argv, "src") == 0) { 492 NEXT_ARG(); 493 res = parse_ip_addr(&argc, &argv, sel, 12); 494 } else if (strcmp(*argv, "dst") == 0) { 495 NEXT_ARG(); 496 res = parse_ip_addr(&argc, &argv, sel, 16); 497 } else if (strcmp(*argv, "tos") == 0 || 498 matches(*argv, "dsfield") == 0) { 499 NEXT_ARG(); 500 res = parse_u8(&argc, &argv, sel, 1, 0); 501 } else if (strcmp(*argv, "ihl") == 0) { 502 NEXT_ARG(); 503 res = parse_u8(&argc, &argv, sel, 0, 0); 504 } else if (strcmp(*argv, "protocol") == 0) { 505 NEXT_ARG(); 506 res = parse_u8(&argc, &argv, sel, 9, 0); 507 } else if (matches(*argv, "precedence") == 0) { 508 NEXT_ARG(); 509 res = parse_u8(&argc, &argv, sel, 1, 0); 510 } else if (strcmp(*argv, "nofrag") == 0) { 511 argc--; argv++; 512 res = pack_key16(sel, 0, 0x3FFF, 6, 0); 513 } else if (strcmp(*argv, "firstfrag") == 0) { 514 argc--; argv++; 515 res = pack_key16(sel, 0, 0x1FFF, 6, 0); 516 } else if (strcmp(*argv, "df") == 0) { 517 argc--; argv++; 518 res = pack_key16(sel, 0x4000, 0x4000, 6, 0); 519 } else if (strcmp(*argv, "mf") == 0) { 520 argc--; argv++; 521 res = pack_key16(sel, 0x2000, 0x2000, 6, 0); 522 } else if (strcmp(*argv, "dport") == 0) { 523 NEXT_ARG(); 524 res = parse_u16(&argc, &argv, sel, 22, 0); 525 } else if (strcmp(*argv, "sport") == 0) { 526 NEXT_ARG(); 527 res = parse_u16(&argc, &argv, sel, 20, 0); 528 } else if (strcmp(*argv, "icmp_type") == 0) { 529 NEXT_ARG(); 530 res = parse_u8(&argc, &argv, sel, 20, 0); 531 } else if (strcmp(*argv, "icmp_code") == 0) { 532 NEXT_ARG(); 533 res = parse_u8(&argc, &argv, sel, 20, 1); 534 } else 535 return -1; 536 537 *argc_p = argc; 538 *argv_p = argv; 539 return res; 540 } 541 542 static int parse_ip6(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 543 { 544 int res = -1; 545 int argc = *argc_p; 546 char **argv = *argv_p; 547 548 if (argc < 2) 549 return -1; 550 551 if (strcmp(*argv, "src") == 0) { 552 NEXT_ARG(); 553 res = parse_ip6_addr(&argc, &argv, sel, 8); 554 } else if (strcmp(*argv, "dst") == 0) { 555 NEXT_ARG(); 556 res = parse_ip6_addr(&argc, &argv, sel, 24); 557 } else if (strcmp(*argv, "priority") == 0) { 558 NEXT_ARG(); 559 res = parse_ip6_class(&argc, &argv, sel); 560 } else if (strcmp(*argv, "protocol") == 0) { 561 NEXT_ARG(); 562 res = parse_u8(&argc, &argv, sel, 6, 0); 563 } else if (strcmp(*argv, "flowlabel") == 0) { 564 NEXT_ARG(); 565 res = parse_u32(&argc, &argv, sel, 0, 0); 566 } else if (strcmp(*argv, "dport") == 0) { 567 NEXT_ARG(); 568 res = parse_u16(&argc, &argv, sel, 42, 0); 569 } else if (strcmp(*argv, "sport") == 0) { 570 NEXT_ARG(); 571 res = parse_u16(&argc, &argv, sel, 40, 0); 572 } else if (strcmp(*argv, "icmp_type") == 0) { 573 NEXT_ARG(); 574 res = parse_u8(&argc, &argv, sel, 40, 0); 575 } else if (strcmp(*argv, "icmp_code") == 0) { 576 NEXT_ARG(); 577 res = parse_u8(&argc, &argv, sel, 41, 1); 578 } else 579 return -1; 580 581 *argc_p = argc; 582 *argv_p = argv; 583 return res; 584 } 585 586 static int parse_ether(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 587 { 588 int res = -1; 589 int argc = *argc_p; 590 char **argv = *argv_p; 591 592 if (argc < 2) 593 return -1; 594 595 if (strcmp(*argv, "src") == 0) { 596 NEXT_ARG(); 597 res = parse_ether_addr(&argc, &argv, sel, -8); 598 } else if (strcmp(*argv, "dst") == 0) { 599 NEXT_ARG(); 600 res = parse_ether_addr(&argc, &argv, sel, -14); 601 } else { 602 fprintf(stderr, "Unknown match: ether %s\n", *argv); 603 return -1; 604 } 605 606 *argc_p = argc; 607 *argv_p = argv; 608 return res; 609 } 610 611 #define parse_tcp parse_udp 612 static int parse_udp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 613 { 614 int res = -1; 615 int argc = *argc_p; 616 char **argv = *argv_p; 617 618 if (argc < 2) 619 return -1; 620 621 if (strcmp(*argv, "src") == 0) { 622 NEXT_ARG(); 623 res = parse_u16(&argc, &argv, sel, 0, -1); 624 } else if (strcmp(*argv, "dst") == 0) { 625 NEXT_ARG(); 626 res = parse_u16(&argc, &argv, sel, 2, -1); 627 } else 628 return -1; 629 630 *argc_p = argc; 631 *argv_p = argv; 632 return res; 633 } 634 635 636 static int parse_icmp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 637 { 638 int res = -1; 639 int argc = *argc_p; 640 char **argv = *argv_p; 641 642 if (argc < 2) 643 return -1; 644 645 if (strcmp(*argv, "type") == 0) { 646 NEXT_ARG(); 647 res = parse_u8(&argc, &argv, sel, 0, -1); 648 } else if (strcmp(*argv, "code") == 0) { 649 NEXT_ARG(); 650 res = parse_u8(&argc, &argv, sel, 1, -1); 651 } else 652 return -1; 653 654 *argc_p = argc; 655 *argv_p = argv; 656 return res; 657 } 658 659 static int parse_mark(int *argc_p, char ***argv_p, struct nlmsghdr *n) 660 { 661 int res = -1; 662 int argc = *argc_p; 663 char **argv = *argv_p; 664 struct tc_u32_mark mark; 665 666 if (argc <= 1) 667 return -1; 668 669 if (get_u32(&mark.val, *argv, 0)) { 670 fprintf(stderr, "Illegal \"mark\" value\n"); 671 return -1; 672 } 673 NEXT_ARG(); 674 675 if (get_u32(&mark.mask, *argv, 0)) { 676 fprintf(stderr, "Illegal \"mark\" mask\n"); 677 return -1; 678 } 679 NEXT_ARG(); 680 681 if ((mark.val & mark.mask) != mark.val) { 682 fprintf(stderr, "Illegal \"mark\" (impossible combination)\n"); 683 return -1; 684 } 685 686 addattr_l(n, MAX_MSG, TCA_U32_MARK, &mark, sizeof(mark)); 687 res = 0; 688 689 *argc_p = argc; 690 *argv_p = argv; 691 return res; 692 } 693 694 static int parse_selector(int *argc_p, char ***argv_p, 695 struct tc_u32_sel *sel, struct nlmsghdr *n) 696 { 697 int argc = *argc_p; 698 char **argv = *argv_p; 699 int res = -1; 700 701 if (argc <= 0) 702 return -1; 703 704 if (matches(*argv, "u32") == 0) { 705 NEXT_ARG(); 706 res = parse_u32(&argc, &argv, sel, 0, 0); 707 } else if (matches(*argv, "u16") == 0) { 708 NEXT_ARG(); 709 res = parse_u16(&argc, &argv, sel, 0, 0); 710 } else if (matches(*argv, "u8") == 0) { 711 NEXT_ARG(); 712 res = parse_u8(&argc, &argv, sel, 0, 0); 713 } else if (matches(*argv, "ip") == 0) { 714 NEXT_ARG(); 715 res = parse_ip(&argc, &argv, sel); 716 } else if (matches(*argv, "ip6") == 0) { 717 NEXT_ARG(); 718 res = parse_ip6(&argc, &argv, sel); 719 } else if (matches(*argv, "udp") == 0) { 720 NEXT_ARG(); 721 res = parse_udp(&argc, &argv, sel); 722 } else if (matches(*argv, "tcp") == 0) { 723 NEXT_ARG(); 724 res = parse_tcp(&argc, &argv, sel); 725 } else if (matches(*argv, "icmp") == 0) { 726 NEXT_ARG(); 727 res = parse_icmp(&argc, &argv, sel); 728 } else if (matches(*argv, "mark") == 0) { 729 NEXT_ARG(); 730 res = parse_mark(&argc, &argv, n); 731 } else if (matches(*argv, "ether") == 0) { 732 NEXT_ARG(); 733 res = parse_ether(&argc, &argv, sel); 734 } else 735 return -1; 736 737 *argc_p = argc; 738 *argv_p = argv; 739 return res; 740 } 741 742 static int parse_offset(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 743 { 744 int argc = *argc_p; 745 char **argv = *argv_p; 746 747 while (argc > 0) { 748 if (matches(*argv, "plus") == 0) { 749 int off; 750 NEXT_ARG(); 751 if (get_integer(&off, *argv, 0)) 752 return -1; 753 sel->off = off; 754 sel->flags |= TC_U32_OFFSET; 755 } else if (matches(*argv, "at") == 0) { 756 int off; 757 NEXT_ARG(); 758 if (get_integer(&off, *argv, 0)) 759 return -1; 760 sel->offoff = off; 761 if (off%2) { 762 fprintf(stderr, "offset \"at\" must be even\n"); 763 return -1; 764 } 765 sel->flags |= TC_U32_VAROFFSET; 766 } else if (matches(*argv, "mask") == 0) { 767 __u16 mask; 768 NEXT_ARG(); 769 if (get_u16(&mask, *argv, 16)) 770 return -1; 771 sel->offmask = htons(mask); 772 sel->flags |= TC_U32_VAROFFSET; 773 } else if (matches(*argv, "shift") == 0) { 774 int shift; 775 NEXT_ARG(); 776 if (get_integer(&shift, *argv, 0)) 777 return -1; 778 sel->offshift = shift; 779 sel->flags |= TC_U32_VAROFFSET; 780 } else if (matches(*argv, "eat") == 0) { 781 sel->flags |= TC_U32_EAT; 782 } else { 783 break; 784 } 785 argc--; argv++; 786 } 787 788 *argc_p = argc; 789 *argv_p = argv; 790 return 0; 791 } 792 793 static int parse_hashkey(int *argc_p, char ***argv_p, struct tc_u32_sel *sel) 794 { 795 int argc = *argc_p; 796 char **argv = *argv_p; 797 798 while (argc > 0) { 799 if (matches(*argv, "mask") == 0) { 800 __u32 mask; 801 NEXT_ARG(); 802 if (get_u32(&mask, *argv, 16)) 803 return -1; 804 sel->hmask = htonl(mask); 805 } else if (matches(*argv, "at") == 0) { 806 int num; 807 NEXT_ARG(); 808 if (get_integer(&num, *argv, 0)) 809 return -1; 810 if (num%4) 811 return -1; 812 sel->hoff = num; 813 } else { 814 break; 815 } 816 argc--; argv++; 817 } 818 819 *argc_p = argc; 820 *argv_p = argv; 821 return 0; 822 } 823 824 static void print_ipv4(FILE *f, const struct tc_u32_key *key) 825 { 826 char abuf[256]; 827 828 switch (key->off) { 829 case 0: 830 switch (ntohl(key->mask)) { 831 case 0x0f000000: 832 fprintf(f, "\n match IP ihl %u", ntohl(key->val) >> 24); 833 return; 834 case 0x00ff0000: 835 fprintf(f, "\n match IP dsfield %#x", ntohl(key->val) >> 16); 836 return; 837 } 838 break; 839 case 8: 840 if (ntohl(key->mask) == 0x00ff0000) { 841 fprintf(f, "\n match IP protocol %d", ntohl(key->val) >> 16); 842 return; 843 } 844 break; 845 case 12: 846 case 16: { 847 int bits = mask2bits(key->mask); 848 if (bits >= 0) { 849 fprintf(f, "\n %s %s/%d", 850 key->off == 12 ? "match IP src" : "match IP dst", 851 inet_ntop(AF_INET, &key->val, 852 abuf, sizeof(abuf)), 853 bits); 854 return; 855 } 856 } 857 break; 858 859 case 20: 860 switch (ntohl(key->mask)) { 861 case 0x0000ffff: 862 fprintf(f, "\n match sport %u", 863 ntohl(key->val) & 0xffff); 864 return; 865 case 0xffff0000: 866 fprintf(f, "\n match dport %u", 867 ntohl(key->val) >> 16); 868 return; 869 case 0xffffffff: 870 fprintf(f, "\n match sport %u, match dport %u", 871 ntohl(key->val) & 0xffff, 872 ntohl(key->val) >> 16); 873 874 return; 875 } 876 /* XXX: Default print_raw */ 877 } 878 } 879 880 static void print_ipv6(FILE *f, const struct tc_u32_key *key) 881 { 882 char abuf[256]; 883 884 switch (key->off) { 885 case 0: 886 switch (ntohl(key->mask)) { 887 case 0x0f000000: 888 fprintf(f, "\n match IP ihl %u", ntohl(key->val) >> 24); 889 return; 890 case 0x00ff0000: 891 fprintf(f, "\n match IP dsfield %#x", ntohl(key->val) >> 16); 892 return; 893 } 894 break; 895 case 8: 896 if (ntohl(key->mask) == 0x00ff0000) { 897 fprintf(f, "\n match IP protocol %d", ntohl(key->val) >> 16); 898 return; 899 } 900 break; 901 case 12: 902 case 16: { 903 int bits = mask2bits(key->mask); 904 if (bits >= 0) { 905 fprintf(f, "\n %s %s/%d", 906 key->off == 12 ? "match IP src" : "match IP dst", 907 inet_ntop(AF_INET, &key->val, 908 abuf, sizeof(abuf)), 909 bits); 910 return; 911 } 912 } 913 break; 914 915 case 20: 916 switch (ntohl(key->mask)) { 917 case 0x0000ffff: 918 fprintf(f, "\n match sport %u", 919 ntohl(key->val) & 0xffff); 920 return; 921 case 0xffff0000: 922 fprintf(f, "\n match dport %u", 923 ntohl(key->val) >> 16); 924 return; 925 case 0xffffffff: 926 fprintf(f, "\n match sport %u, match dport %u", 927 ntohl(key->val) & 0xffff, 928 ntohl(key->val) >> 16); 929 930 return; 931 } 932 /* XXX: Default print_raw */ 933 } 934 } 935 936 static void print_raw(FILE *f, const struct tc_u32_key *key) 937 { 938 fprintf(f, "\n match %08x/%08x at %s%d", 939 (unsigned int)ntohl(key->val), 940 (unsigned int)ntohl(key->mask), 941 key->offmask ? "nexthdr+" : "", 942 key->off); 943 } 944 945 static const struct { 946 __u16 proto; 947 __u16 pad; 948 void (*pprinter)(FILE *f, const struct tc_u32_key *key); 949 } u32_pprinters[] = { 950 {0, 0, print_raw}, 951 {ETH_P_IP, 0, print_ipv4}, 952 {ETH_P_IPV6, 0, print_ipv6}, 953 }; 954 955 static void show_keys(FILE *f, const struct tc_u32_key *key) 956 { 957 int i = 0; 958 959 if (!show_pretty) 960 goto show_k; 961 962 for (i = 0; i < sizeof(u32_pprinters) / sizeof(u32_pprinters[0]); i++) { 963 if (u32_pprinters[i].proto == ntohs(f_proto)) { 964 show_k: 965 u32_pprinters[i].pprinter(f, key); 966 return; 967 } 968 } 969 970 i = 0; 971 goto show_k; 972 } 973 974 static int u32_parse_opt(struct filter_util *qu, char *handle, 975 int argc, char **argv, struct nlmsghdr *n) 976 { 977 struct { 978 struct tc_u32_sel sel; 979 struct tc_u32_key keys[128]; 980 } sel; 981 struct tcmsg *t = NLMSG_DATA(n); 982 struct rtattr *tail; 983 int sel_ok = 0, terminal_ok = 0; 984 int sample_ok = 0; 985 __u32 htid = 0; 986 __u32 order = 0; 987 988 memset(&sel, 0, sizeof(sel)); 989 990 if (handle && get_u32_handle(&t->tcm_handle, handle)) { 991 fprintf(stderr, "Illegal filter ID\n"); 992 return -1; 993 } 994 995 if (argc == 0) 996 return 0; 997 998 tail = NLMSG_TAIL(n); 999 addattr_l(n, MAX_MSG, TCA_OPTIONS, NULL, 0); 1000 1001 while (argc > 0) { 1002 if (matches(*argv, "match") == 0) { 1003 NEXT_ARG(); 1004 if (parse_selector(&argc, &argv, &sel.sel, n)) { 1005 fprintf(stderr, "Illegal \"match\"\n"); 1006 return -1; 1007 } 1008 sel_ok++; 1009 continue; 1010 } else if (matches(*argv, "offset") == 0) { 1011 NEXT_ARG(); 1012 if (parse_offset(&argc, &argv, &sel.sel)) { 1013 fprintf(stderr, "Illegal \"offset\"\n"); 1014 return -1; 1015 } 1016 continue; 1017 } else if (matches(*argv, "hashkey") == 0) { 1018 NEXT_ARG(); 1019 if (parse_hashkey(&argc, &argv, &sel.sel)) { 1020 fprintf(stderr, "Illegal \"hashkey\"\n"); 1021 return -1; 1022 } 1023 continue; 1024 } else if (matches(*argv, "classid") == 0 || 1025 strcmp(*argv, "flowid") == 0) { 1026 unsigned handle; 1027 NEXT_ARG(); 1028 if (get_tc_classid(&handle, *argv)) { 1029 fprintf(stderr, "Illegal \"classid\"\n"); 1030 return -1; 1031 } 1032 addattr_l(n, MAX_MSG, TCA_U32_CLASSID, &handle, 4); 1033 sel.sel.flags |= TC_U32_TERMINAL; 1034 } else if (matches(*argv, "divisor") == 0) { 1035 unsigned divisor; 1036 NEXT_ARG(); 1037 if (get_unsigned(&divisor, *argv, 0) || 1038 divisor == 0 || 1039 divisor > 0x100 || ((divisor - 1) & divisor)) { 1040 fprintf(stderr, "Illegal \"divisor\"\n"); 1041 return -1; 1042 } 1043 addattr_l(n, MAX_MSG, TCA_U32_DIVISOR, &divisor, 4); 1044 } else if (matches(*argv, "order") == 0) { 1045 NEXT_ARG(); 1046 if (get_u32(&order, *argv, 0)) { 1047 fprintf(stderr, "Illegal \"order\"\n"); 1048 return -1; 1049 } 1050 } else if (strcmp(*argv, "link") == 0) { 1051 unsigned handle; 1052 NEXT_ARG(); 1053 if (get_u32_handle(&handle, *argv)) { 1054 fprintf(stderr, "Illegal \"link\"\n"); 1055 return -1; 1056 } 1057 if (handle && TC_U32_NODE(handle)) { 1058 fprintf(stderr, "\"link\" must be a hash table.\n"); 1059 return -1; 1060 } 1061 addattr_l(n, MAX_MSG, TCA_U32_LINK, &handle, 4); 1062 } else if (strcmp(*argv, "ht") == 0) { 1063 unsigned handle; 1064 NEXT_ARG(); 1065 if (get_u32_handle(&handle, *argv)) { 1066 fprintf(stderr, "Illegal \"ht\"\n"); 1067 return -1; 1068 } 1069 if (handle && TC_U32_NODE(handle)) { 1070 fprintf(stderr, "\"ht\" must be a hash table.\n"); 1071 return -1; 1072 } 1073 if (sample_ok) 1074 htid = (htid&0xFF000)|(handle&0xFFF00000); 1075 else 1076 htid = (handle&0xFFFFF000); 1077 } else if (strcmp(*argv, "sample") == 0) { 1078 __u32 hash; 1079 unsigned divisor = 0x100; 1080 1081 struct { 1082 struct tc_u32_sel sel; 1083 struct tc_u32_key keys[4]; 1084 } sel2; 1085 memset(&sel2, 0, sizeof(sel2)); 1086 NEXT_ARG(); 1087 if (parse_selector(&argc, &argv, &sel2.sel, n)) { 1088 fprintf(stderr, "Illegal \"sample\"\n"); 1089 return -1; 1090 } 1091 if (sel2.sel.nkeys != 1) { 1092 fprintf(stderr, "\"sample\" must contain" 1093 " exactly ONE key.\n"); 1094 return -1; 1095 } 1096 if (*argv != 0 && strcmp(*argv, "divisor") == 0) { 1097 NEXT_ARG(); 1098 if (get_unsigned(&divisor, *argv, 0) || divisor == 0 || 1099 divisor > 0x100 || ((divisor - 1) & divisor)) { 1100 fprintf(stderr, "Illegal sample \"divisor\"\n"); 1101 return -1; 1102 } 1103 NEXT_ARG(); 1104 } 1105 hash = sel2.sel.keys[0].val&sel2.sel.keys[0].mask; 1106 hash ^= hash>>16; 1107 hash ^= hash>>8; 1108 htid = ((hash%divisor)<<12)|(htid&0xFFF00000); 1109 sample_ok = 1; 1110 continue; 1111 } else if (strcmp(*argv, "indev") == 0) { 1112 char ind[IFNAMSIZ + 1]; 1113 memset(ind, 0, sizeof (ind)); 1114 argc--; 1115 argv++; 1116 if (argc < 1) { 1117 fprintf(stderr, "Illegal indev\n"); 1118 return -1; 1119 } 1120 strncpy(ind, *argv, sizeof (ind) - 1); 1121 addattr_l(n, MAX_MSG, TCA_U32_INDEV, ind, strlen(ind) + 1); 1122 1123 } else if (matches(*argv, "action") == 0) { 1124 NEXT_ARG(); 1125 if (parse_action(&argc, &argv, TCA_U32_ACT, n)) { 1126 fprintf(stderr, "Illegal \"action\"\n"); 1127 return -1; 1128 } 1129 terminal_ok++; 1130 continue; 1131 1132 } else if (matches(*argv, "police") == 0) { 1133 NEXT_ARG(); 1134 if (parse_police(&argc, &argv, TCA_U32_POLICE, n)) { 1135 fprintf(stderr, "Illegal \"police\"\n"); 1136 return -1; 1137 } 1138 terminal_ok++; 1139 continue; 1140 } else if (strcmp(*argv, "help") == 0) { 1141 explain(); 1142 return -1; 1143 } else { 1144 fprintf(stderr, "What is \"%s\"?\n", *argv); 1145 explain(); 1146 return -1; 1147 } 1148 argc--; argv++; 1149 } 1150 1151 /* We dont necessarily need class/flowids */ 1152 if (terminal_ok) 1153 sel.sel.flags |= TC_U32_TERMINAL; 1154 1155 if (order) { 1156 if (TC_U32_NODE(t->tcm_handle) && order != TC_U32_NODE(t->tcm_handle)) { 1157 fprintf(stderr, "\"order\" contradicts \"handle\"\n"); 1158 return -1; 1159 } 1160 t->tcm_handle |= order; 1161 } 1162 1163 if (htid) 1164 addattr_l(n, MAX_MSG, TCA_U32_HASH, &htid, 4); 1165 if (sel_ok) 1166 addattr_l(n, MAX_MSG, TCA_U32_SEL, &sel, 1167 sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_u32_key)); 1168 tail->rta_len = (void *) NLMSG_TAIL(n) - (void *) tail; 1169 return 0; 1170 } 1171 1172 static int u32_print_opt(struct filter_util *qu, FILE *f, struct rtattr *opt, 1173 __u32 handle) 1174 { 1175 struct rtattr *tb[TCA_U32_MAX+1]; 1176 struct tc_u32_sel *sel = NULL; 1177 struct tc_u32_pcnt *pf = NULL; 1178 1179 if (opt == NULL) 1180 return 0; 1181 1182 parse_rtattr_nested(tb, TCA_U32_MAX, opt); 1183 1184 if (handle) { 1185 SPRINT_BUF(b1); 1186 fprintf(f, "fh %s ", sprint_u32_handle(handle, b1)); 1187 } 1188 if (TC_U32_NODE(handle)) { 1189 fprintf(f, "order %d ", TC_U32_NODE(handle)); 1190 } 1191 1192 if (tb[TCA_U32_SEL]) { 1193 if (RTA_PAYLOAD(tb[TCA_U32_SEL]) < sizeof(*sel)) 1194 return -1; 1195 1196 sel = RTA_DATA(tb[TCA_U32_SEL]); 1197 } 1198 1199 if (tb[TCA_U32_DIVISOR]) { 1200 fprintf(f, "ht divisor %d ", *(__u32*)RTA_DATA(tb[TCA_U32_DIVISOR])); 1201 } else if (tb[TCA_U32_HASH]) { 1202 __u32 htid = *(__u32*)RTA_DATA(tb[TCA_U32_HASH]); 1203 fprintf(f, "key ht %x bkt %x ", TC_U32_USERHTID(htid), 1204 TC_U32_HASH(htid)); 1205 } else { 1206 fprintf(f, "??? "); 1207 } 1208 if (tb[TCA_U32_CLASSID]) { 1209 SPRINT_BUF(b1); 1210 fprintf(f, "%sflowid %s ", 1211 !sel || !(sel->flags&TC_U32_TERMINAL) ? "*" : "", 1212 sprint_tc_classid(*(__u32*)RTA_DATA(tb[TCA_U32_CLASSID]), b1)); 1213 } else if (sel && sel->flags&TC_U32_TERMINAL) { 1214 fprintf(f, "terminal flowid ??? "); 1215 } 1216 if (tb[TCA_U32_LINK]) { 1217 SPRINT_BUF(b1); 1218 fprintf(f, "link %s ", 1219 sprint_u32_handle(*(__u32*)RTA_DATA(tb[TCA_U32_LINK]), b1)); 1220 } 1221 1222 if (tb[TCA_U32_PCNT]) { 1223 if (RTA_PAYLOAD(tb[TCA_U32_PCNT]) < sizeof(*pf)) { 1224 fprintf(f, "Broken perf counters \n"); 1225 return -1; 1226 } 1227 pf = RTA_DATA(tb[TCA_U32_PCNT]); 1228 } 1229 1230 if (sel && show_stats && NULL != pf) 1231 fprintf(f, " (rule hit %llu success %llu)", 1232 (unsigned long long) pf->rcnt, 1233 (unsigned long long) pf->rhit); 1234 1235 if (tb[TCA_U32_MARK]) { 1236 struct tc_u32_mark *mark = RTA_DATA(tb[TCA_U32_MARK]); 1237 if (RTA_PAYLOAD(tb[TCA_U32_MARK]) < sizeof(*mark)) { 1238 fprintf(f, "\n Invalid mark (kernel&iproute2 mismatch)\n"); 1239 } else { 1240 fprintf(f, "\n mark 0x%04x 0x%04x (success %d)", 1241 mark->val, mark->mask, mark->success); 1242 } 1243 } 1244 1245 if (sel) { 1246 if (sel->nkeys) { 1247 int i; 1248 for (i=0; i<sel->nkeys; i++) { 1249 show_keys(f, sel->keys + i); 1250 if (show_stats && NULL != pf) 1251 fprintf(f, " (success %llu ) ", 1252 (unsigned long long) pf->kcnts[i]); 1253 } 1254 } 1255 1256 if (sel->flags&(TC_U32_VAROFFSET|TC_U32_OFFSET)) { 1257 fprintf(f, "\n offset "); 1258 if (sel->flags&TC_U32_VAROFFSET) 1259 fprintf(f, "%04x>>%d at %d ", 1260 ntohs(sel->offmask), 1261 sel->offshift, sel->offoff); 1262 if (sel->off) 1263 fprintf(f, "plus %d ", sel->off); 1264 } 1265 if (sel->flags&TC_U32_EAT) 1266 fprintf(f, " eat "); 1267 1268 if (sel->hmask) { 1269 fprintf(f, "\n hash mask %08x at %d ", 1270 (unsigned int)htonl(sel->hmask), sel->hoff); 1271 } 1272 } 1273 1274 if (tb[TCA_U32_POLICE]) { 1275 fprintf(f, "\n"); 1276 tc_print_police(f, tb[TCA_U32_POLICE]); 1277 } 1278 if (tb[TCA_U32_INDEV]) { 1279 struct rtattr *idev = tb[TCA_U32_INDEV]; 1280 fprintf(f, "\n input dev %s\n", (char *) RTA_DATA(idev)); 1281 } 1282 if (tb[TCA_U32_ACT]) { 1283 tc_print_action(f, tb[TCA_U32_ACT]); 1284 } 1285 1286 return 0; 1287 } 1288 1289 struct filter_util u32_filter_util = { 1290 .id = "u32", 1291 .parse_fopt = u32_parse_opt, 1292 .print_fopt = u32_print_opt, 1293 }; 1294