]> git.proxmox.com Git - mirror_iproute2.git/blame - tc/f_u32.c
tc: improve filter help texts a bit
[mirror_iproute2.git] / tc / f_u32.c
CommitLineData
aba5acdf
SH
1/*
2 * q_u32.c U32 filter.
3 *
4 * This program is free software; you can u32istribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
6f0ba88b 10 * Match mark added by Catalin(ux aka Dino) BOIE <catab at umbrella.ro> [5 nov 2004]
aba5acdf
SH
11 *
12 */
13
14#include <stdio.h>
15#include <stdlib.h>
16#include <unistd.h>
17#include <syslog.h>
18#include <fcntl.h>
19#include <sys/socket.h>
20#include <netinet/in.h>
21#include <arpa/inet.h>
22#include <string.h>
2373fde9 23#include <linux/if.h>
1750abe2 24#include <linux/if_ether.h>
aba5acdf
SH
25
26#include "utils.h"
27#include "tc_util.h"
28
44dcfe82
SH
29extern int show_pretty;
30
aba5acdf
SH
31static void explain(void)
32{
e62077d0
SH
33 fprintf(stderr, "Usage: ... u32 [ match SELECTOR ... ] [ link HTID ]"
34 " [ classid CLASSID ]\n");
863ecb04 35 fprintf(stderr, " [ action ACTION_SPEC ]"
e62077d0 36 " [ offset OFFSET_SPEC ]\n");
aba5acdf
SH
37 fprintf(stderr, " [ ht HTID ] [ hashkey HASHKEY_SPEC ]\n");
38 fprintf(stderr, " [ sample SAMPLE ]\n");
39 fprintf(stderr, "or u32 divisor DIVISOR\n");
40 fprintf(stderr, "\n");
41 fprintf(stderr, "Where: SELECTOR := SAMPLE SAMPLE ...\n");
e62077d0
SH
42 fprintf(stderr, " SAMPLE := { ip | ip6 | udp | tcp | icmp |"
43 " u{32|16|8} | mark } SAMPLE_ARGS [divisor DIVISOR]\n");
aba5acdf 44 fprintf(stderr, " FILTERID := X:Y:Z\n");
e9acc242 45 fprintf(stderr, "\nNOTE: CLASSID is parsed at hexadecimal input.\n");
aba5acdf
SH
46}
47
d1f28cf1 48static int get_u32_handle(__u32 *handle, const char *str)
aba5acdf
SH
49{
50 __u32 htid=0, hash=0, nodeid=0;
51 char *tmp = strchr(str, ':');
52
53 if (tmp == NULL) {
54 if (memcmp("0x", str, 2) == 0)
55 return get_u32(handle, str, 16);
56 return -1;
57 }
58 htid = strtoul(str, &tmp, 16);
59 if (tmp == str && *str != ':' && *str != 0)
60 return -1;
61 if (htid>=0x1000)
62 return -1;
63 if (*tmp) {
64 str = tmp+1;
65 hash = strtoul(str, &tmp, 16);
66 if (tmp == str && *str != ':' && *str != 0)
67 return -1;
68 if (hash>=0x100)
69 return -1;
70 if (*tmp) {
71 str = tmp+1;
72 nodeid = strtoul(str, &tmp, 16);
73 if (tmp == str && *str != 0)
74 return -1;
75 if (nodeid>=0x1000)
76 return -1;
77 }
78 }
79 *handle = (htid<<20)|(hash<<12)|nodeid;
80 return 0;
81}
82
d1f28cf1 83static char * sprint_u32_handle(__u32 handle, char *buf)
aba5acdf
SH
84{
85 int bsize = SPRINT_BSIZE-1;
86 __u32 htid = TC_U32_HTID(handle);
87 __u32 hash = TC_U32_HASH(handle);
88 __u32 nodeid = TC_U32_NODE(handle);
89 char *b = buf;
90
91 if (handle == 0) {
92 snprintf(b, bsize, "none");
93 return b;
94 }
95 if (htid) {
96 int l = snprintf(b, bsize, "%x:", htid>>20);
97 bsize -= l;
98 b += l;
99 }
100 if (nodeid|hash) {
101 if (hash) {
102 int l = snprintf(b, bsize, "%x", hash);
103 bsize -= l;
104 b += l;
105 }
106 if (nodeid) {
107 int l = snprintf(b, bsize, ":%x", nodeid);
108 bsize -= l;
109 b += l;
110 }
111 }
112 if (show_raw)
113 snprintf(b, bsize, "[%08x] ", handle);
114 return buf;
115}
116
e62077d0
SH
117static int pack_key(struct tc_u32_sel *sel, __u32 key, __u32 mask,
118 int off, int offmask)
aba5acdf
SH
119{
120 int i;
121 int hwm = sel->nkeys;
122
123 key &= mask;
124
125 for (i=0; i<hwm; i++) {
126 if (sel->keys[i].off == off && sel->keys[i].offmask == offmask) {
127 __u32 intersect = mask&sel->keys[i].mask;
128
129 if ((key^sel->keys[i].val) & intersect)
130 return -1;
131 sel->keys[i].val |= key;
132 sel->keys[i].mask |= mask;
133 return 0;
134 }
135 }
136
137 if (hwm >= 128)
138 return -1;
139 if (off % 4)
140 return -1;
141 sel->keys[hwm].val = key;
142 sel->keys[hwm].mask = mask;
143 sel->keys[hwm].off = off;
144 sel->keys[hwm].offmask = offmask;
145 sel->nkeys++;
146 return 0;
147}
148
e62077d0
SH
149static int pack_key32(struct tc_u32_sel *sel, __u32 key, __u32 mask,
150 int off, int offmask)
aba5acdf
SH
151{
152 key = htonl(key);
153 mask = htonl(mask);
154 return pack_key(sel, key, mask, off, offmask);
155}
156
e62077d0
SH
157static int pack_key16(struct tc_u32_sel *sel, __u32 key, __u32 mask,
158 int off, int offmask)
aba5acdf
SH
159{
160 if (key > 0xFFFF || mask > 0xFFFF)
161 return -1;
162
163 if ((off & 3) == 0) {
164 key <<= 16;
165 mask <<= 16;
166 }
167 off &= ~3;
168 key = htonl(key);
169 mask = htonl(mask);
170
171 return pack_key(sel, key, mask, off, offmask);
172}
173
174static int pack_key8(struct tc_u32_sel *sel, __u32 key, __u32 mask, int off, int offmask)
175{
176 if (key > 0xFF || mask > 0xFF)
177 return -1;
178
179 if ((off & 3) == 0) {
180 key <<= 24;
181 mask <<= 24;
182 } else if ((off & 3) == 1) {
183 key <<= 16;
184 mask <<= 16;
185 } else if ((off & 3) == 2) {
186 key <<= 8;
187 mask <<= 8;
188 }
189 off &= ~3;
190 key = htonl(key);
191 mask = htonl(mask);
192
193 return pack_key(sel, key, mask, off, offmask);
194}
195
196
d1f28cf1 197static int parse_at(int *argc_p, char ***argv_p, int *off, int *offmask)
aba5acdf
SH
198{
199 int argc = *argc_p;
200 char **argv = *argv_p;
201 char *p = *argv;
202
203 if (argc <= 0)
204 return -1;
205
206 if (strlen(p) > strlen("nexthdr+") &&
207 memcmp(p, "nexthdr+", strlen("nexthdr+")) == 0) {
208 *offmask = -1;
209 p += strlen("nexthdr+");
210 } else if (matches(*argv, "nexthdr+") == 0) {
211 NEXT_ARG();
212 *offmask = -1;
213 p = *argv;
214 }
215
216 if (get_integer(off, p, 0))
217 return -1;
218 argc--; argv++;
219
220 *argc_p = argc;
221 *argv_p = argv;
222 return 0;
223}
224
225
e62077d0
SH
226static int parse_u32(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
227 int off, int offmask)
aba5acdf
SH
228{
229 int res = -1;
230 int argc = *argc_p;
231 char **argv = *argv_p;
232 __u32 key;
233 __u32 mask;
234
235 if (argc < 2)
236 return -1;
237
238 if (get_u32(&key, *argv, 0))
239 return -1;
240 argc--; argv++;
241
242 if (get_u32(&mask, *argv, 16))
243 return -1;
244 argc--; argv++;
245
246 if (argc > 0 && strcmp(argv[0], "at") == 0) {
247 NEXT_ARG();
248 if (parse_at(&argc, &argv, &off, &offmask))
249 return -1;
250 }
251
252 res = pack_key32(sel, key, mask, off, offmask);
253 *argc_p = argc;
254 *argv_p = argv;
255 return res;
256}
257
e62077d0
SH
258static int parse_u16(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
259 int off, int offmask)
aba5acdf
SH
260{
261 int res = -1;
262 int argc = *argc_p;
263 char **argv = *argv_p;
264 __u32 key;
265 __u32 mask;
266
267 if (argc < 2)
268 return -1;
269
270 if (get_u32(&key, *argv, 0))
271 return -1;
272 argc--; argv++;
273
274 if (get_u32(&mask, *argv, 16))
275 return -1;
276 argc--; argv++;
277
278 if (argc > 0 && strcmp(argv[0], "at") == 0) {
279 NEXT_ARG();
280 if (parse_at(&argc, &argv, &off, &offmask))
281 return -1;
282 }
283 res = pack_key16(sel, key, mask, off, offmask);
284 *argc_p = argc;
285 *argv_p = argv;
286 return res;
287}
288
e62077d0
SH
289static int parse_u8(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
290 int off, int offmask)
aba5acdf
SH
291{
292 int res = -1;
293 int argc = *argc_p;
294 char **argv = *argv_p;
295 __u32 key;
296 __u32 mask;
297
298 if (argc < 2)
299 return -1;
300
301 if (get_u32(&key, *argv, 0))
302 return -1;
303 argc--; argv++;
304
305 if (get_u32(&mask, *argv, 16))
306 return -1;
307 argc--; argv++;
308
309 if (key > 0xFF || mask > 0xFF)
310 return -1;
311
312 if (argc > 0 && strcmp(argv[0], "at") == 0) {
313 NEXT_ARG();
314 if (parse_at(&argc, &argv, &off, &offmask))
315 return -1;
316 }
317
318 res = pack_key8(sel, key, mask, off, offmask);
319 *argc_p = argc;
320 *argv_p = argv;
321 return res;
322}
323
e62077d0
SH
324static int parse_ip_addr(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
325 int off)
aba5acdf
SH
326{
327 int res = -1;
328 int argc = *argc_p;
329 char **argv = *argv_p;
330 inet_prefix addr;
331 __u32 mask;
332 int offmask = 0;
333
334 if (argc < 1)
335 return -1;
336
337 if (get_prefix_1(&addr, *argv, AF_INET))
338 return -1;
339 argc--; argv++;
340
341 if (argc > 0 && strcmp(argv[0], "at") == 0) {
342 NEXT_ARG();
343 if (parse_at(&argc, &argv, &off, &offmask))
344 return -1;
345 }
346
347 mask = 0;
348 if (addr.bitlen)
349 mask = htonl(0xFFFFFFFF<<(32-addr.bitlen));
350 if (pack_key(sel, addr.data[0], mask, off, offmask) < 0)
351 return -1;
352 res = 0;
353
354 *argc_p = argc;
355 *argv_p = argv;
356 return res;
357}
358
e62077d0
SH
359static int parse_ip6_addr(int *argc_p, char ***argv_p,
360 struct tc_u32_sel *sel, int off)
aba5acdf
SH
361{
362 int res = -1;
363 int argc = *argc_p;
364 char **argv = *argv_p;
365 int plen = 128;
366 int i;
367 inet_prefix addr;
368 int offmask = 0;
369
370 if (argc < 1)
371 return -1;
372
373 if (get_prefix_1(&addr, *argv, AF_INET6))
374 return -1;
375 argc--; argv++;
376
377 if (argc > 0 && strcmp(argv[0], "at") == 0) {
378 NEXT_ARG();
379 if (parse_at(&argc, &argv, &off, &offmask))
380 return -1;
381 }
382
383 plen = addr.bitlen;
384 for (i=0; i<plen; i+=32) {
2373fde9 385// if (((i+31)&~0x1F)<=plen) {
e62077d0
SH
386 if (i + 31 <= plen) {
387 res = pack_key(sel, addr.data[i/32],
388 0xFFFFFFFF, off+4*(i/32), offmask);
389 if (res < 0)
aba5acdf 390 return -1;
e62077d0
SH
391 } else if (i < plen) {
392 __u32 mask = htonl(0xFFFFFFFF << (32 - (plen -i )));
393 res = pack_key(sel, addr.data[i/32],
394 mask, off+4*(i/32), offmask);
395 if (res < 0)
aba5acdf
SH
396 return -1;
397 }
398 }
399 res = 0;
400
401 *argc_p = argc;
402 *argv_p = argv;
403 return res;
404}
405
01564122
PL
406static int parse_ip6_class(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
407{
408 int res = -1;
409 int argc = *argc_p;
410 char **argv = *argv_p;
411 __u32 key;
412 __u32 mask;
413 int off = 0;
414 int offmask = 0;
415
416 if (argc < 2)
417 return -1;
418
419 if (get_u32(&key, *argv, 0))
420 return -1;
421 argc--; argv++;
422
423 if (get_u32(&mask, *argv, 16))
424 return -1;
425 argc--; argv++;
426
427 if (key > 0xFF || mask > 0xFF)
428 return -1;
429
430 key <<= 20;
431 mask <<= 20;
432 key = htonl(key);
433 mask = htonl(mask);
434
d7ac9ad4
SH
435 res = pack_key(sel, key, mask, off, offmask);
436 if (res < 0)
01564122
PL
437 return -1;
438
439 *argc_p = argc;
440 *argv_p = argv;
441 return 0;
442}
443
b4d41f41
SH
444static int parse_ether_addr(int *argc_p, char ***argv_p,
445 struct tc_u32_sel *sel, int off)
446{
447 int res = -1;
448 int argc = *argc_p;
449 char **argv = *argv_p;
450 __u8 addr[6];
451 int offmask = 0;
b4d41f41
SH
452 int i;
453
454 if (argc < 1)
455 return -1;
456
457 if (sscanf(*argv, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx",
458 addr + 0, addr + 1, addr + 2,
459 addr + 3, addr + 4, addr + 5) != 6) {
460 fprintf(stderr, "parse_ether_addr: improperly formed address '%s'\n",
461 *argv);
462 return -1;
463 }
464
465 argc--; argv++;
466 if (argc > 0 && strcmp(argv[0], "at") == 0) {
467 NEXT_ARG();
468 if (parse_at(&argc, &argv, &off, &offmask))
469 return -1;
470 }
471
e3d153c1
SH
472 for (i = 0; i < 6; i++) {
473 res = pack_key8(sel, addr[i], 0xFF, off + i, offmask);
b4d41f41
SH
474 if (res < 0)
475 return -1;
476 }
477
478 *argc_p = argc;
479 *argv_p = argv;
480 return res;
481}
482
aba5acdf
SH
483static int parse_ip(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
484{
485 int res = -1;
486 int argc = *argc_p;
487 char **argv = *argv_p;
488
489 if (argc < 2)
490 return -1;
491
492 if (strcmp(*argv, "src") == 0) {
493 NEXT_ARG();
494 res = parse_ip_addr(&argc, &argv, sel, 12);
9fce67dd 495 } else if (strcmp(*argv, "dst") == 0) {
aba5acdf
SH
496 NEXT_ARG();
497 res = parse_ip_addr(&argc, &argv, sel, 16);
9fce67dd 498 } else if (strcmp(*argv, "tos") == 0 ||
aba5acdf
SH
499 matches(*argv, "dsfield") == 0) {
500 NEXT_ARG();
501 res = parse_u8(&argc, &argv, sel, 1, 0);
9fce67dd 502 } else if (strcmp(*argv, "ihl") == 0) {
aba5acdf
SH
503 NEXT_ARG();
504 res = parse_u8(&argc, &argv, sel, 0, 0);
9fce67dd 505 } else if (strcmp(*argv, "protocol") == 0) {
aba5acdf
SH
506 NEXT_ARG();
507 res = parse_u8(&argc, &argv, sel, 9, 0);
9fce67dd 508 } else if (matches(*argv, "precedence") == 0) {
aba5acdf
SH
509 NEXT_ARG();
510 res = parse_u8(&argc, &argv, sel, 1, 0);
9fce67dd 511 } else if (strcmp(*argv, "nofrag") == 0) {
aba5acdf
SH
512 argc--; argv++;
513 res = pack_key16(sel, 0, 0x3FFF, 6, 0);
9fce67dd 514 } else if (strcmp(*argv, "firstfrag") == 0) {
aba5acdf 515 argc--; argv++;
690b11f4 516 res = pack_key16(sel, 0x2000, 0x3FFF, 6, 0);
9fce67dd 517 } else if (strcmp(*argv, "df") == 0) {
aba5acdf
SH
518 argc--; argv++;
519 res = pack_key16(sel, 0x4000, 0x4000, 6, 0);
9fce67dd 520 } else if (strcmp(*argv, "mf") == 0) {
aba5acdf
SH
521 argc--; argv++;
522 res = pack_key16(sel, 0x2000, 0x2000, 6, 0);
9fce67dd 523 } else if (strcmp(*argv, "dport") == 0) {
aba5acdf
SH
524 NEXT_ARG();
525 res = parse_u16(&argc, &argv, sel, 22, 0);
9fce67dd 526 } else if (strcmp(*argv, "sport") == 0) {
aba5acdf
SH
527 NEXT_ARG();
528 res = parse_u16(&argc, &argv, sel, 20, 0);
9fce67dd 529 } else if (strcmp(*argv, "icmp_type") == 0) {
aba5acdf
SH
530 NEXT_ARG();
531 res = parse_u8(&argc, &argv, sel, 20, 0);
9fce67dd 532 } else if (strcmp(*argv, "icmp_code") == 0) {
aba5acdf 533 NEXT_ARG();
1d62f99f 534 res = parse_u8(&argc, &argv, sel, 21, 0);
9fce67dd
SH
535 } else
536 return -1;
aba5acdf 537
aba5acdf
SH
538 *argc_p = argc;
539 *argv_p = argv;
540 return res;
541}
3d0b7439 542
aba5acdf
SH
543static int parse_ip6(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
544{
545 int res = -1;
546 int argc = *argc_p;
547 char **argv = *argv_p;
548
549 if (argc < 2)
550 return -1;
551
552 if (strcmp(*argv, "src") == 0) {
553 NEXT_ARG();
554 res = parse_ip6_addr(&argc, &argv, sel, 8);
9fce67dd 555 } else if (strcmp(*argv, "dst") == 0) {
aba5acdf
SH
556 NEXT_ARG();
557 res = parse_ip6_addr(&argc, &argv, sel, 24);
9fce67dd 558 } else if (strcmp(*argv, "priority") == 0) {
aba5acdf 559 NEXT_ARG();
01564122 560 res = parse_ip6_class(&argc, &argv, sel);
9fce67dd 561 } else if (strcmp(*argv, "protocol") == 0) {
aba5acdf
SH
562 NEXT_ARG();
563 res = parse_u8(&argc, &argv, sel, 6, 0);
9fce67dd 564 } else if (strcmp(*argv, "flowlabel") == 0) {
aba5acdf
SH
565 NEXT_ARG();
566 res = parse_u32(&argc, &argv, sel, 0, 0);
9fce67dd 567 } else if (strcmp(*argv, "dport") == 0) {
aba5acdf
SH
568 NEXT_ARG();
569 res = parse_u16(&argc, &argv, sel, 42, 0);
9fce67dd 570 } else if (strcmp(*argv, "sport") == 0) {
aba5acdf
SH
571 NEXT_ARG();
572 res = parse_u16(&argc, &argv, sel, 40, 0);
9fce67dd 573 } else if (strcmp(*argv, "icmp_type") == 0) {
aba5acdf
SH
574 NEXT_ARG();
575 res = parse_u8(&argc, &argv, sel, 40, 0);
9fce67dd 576 } else if (strcmp(*argv, "icmp_code") == 0) {
aba5acdf
SH
577 NEXT_ARG();
578 res = parse_u8(&argc, &argv, sel, 41, 1);
9fce67dd
SH
579 } else
580 return -1;
aba5acdf 581
aba5acdf
SH
582 *argc_p = argc;
583 *argv_p = argv;
584 return res;
585}
586
b4d41f41
SH
587static int parse_ether(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
588{
589 int res = -1;
590 int argc = *argc_p;
591 char **argv = *argv_p;
592
593 if (argc < 2)
594 return -1;
595
596 if (strcmp(*argv, "src") == 0) {
597 NEXT_ARG();
598 res = parse_ether_addr(&argc, &argv, sel, -8);
599 } else if (strcmp(*argv, "dst") == 0) {
600 NEXT_ARG();
601 res = parse_ether_addr(&argc, &argv, sel, -14);
602 } else {
603 fprintf(stderr, "Unknown match: ether %s\n", *argv);
604 return -1;
605 }
606
607 *argc_p = argc;
608 *argv_p = argv;
609 return res;
610}
611
aba5acdf
SH
612#define parse_tcp parse_udp
613static int parse_udp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
614{
615 int res = -1;
616 int argc = *argc_p;
617 char **argv = *argv_p;
618
619 if (argc < 2)
620 return -1;
621
622 if (strcmp(*argv, "src") == 0) {
623 NEXT_ARG();
624 res = parse_u16(&argc, &argv, sel, 0, -1);
9fce67dd 625 } else if (strcmp(*argv, "dst") == 0) {
aba5acdf
SH
626 NEXT_ARG();
627 res = parse_u16(&argc, &argv, sel, 2, -1);
9fce67dd
SH
628 } else
629 return -1;
aba5acdf 630
aba5acdf
SH
631 *argc_p = argc;
632 *argv_p = argv;
633 return res;
634}
635
6b1ac654 636
aba5acdf
SH
637static int parse_icmp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
638{
639 int res = -1;
640 int argc = *argc_p;
641 char **argv = *argv_p;
642
643 if (argc < 2)
644 return -1;
645
646 if (strcmp(*argv, "type") == 0) {
647 NEXT_ARG();
648 res = parse_u8(&argc, &argv, sel, 0, -1);
9fce67dd 649 } else if (strcmp(*argv, "code") == 0) {
aba5acdf
SH
650 NEXT_ARG();
651 res = parse_u8(&argc, &argv, sel, 1, -1);
9fce67dd
SH
652 } else
653 return -1;
aba5acdf 654
aba5acdf
SH
655 *argc_p = argc;
656 *argv_p = argv;
657 return res;
658}
659
6f0ba88b 660static int parse_mark(int *argc_p, char ***argv_p, struct nlmsghdr *n)
661{
662 int res = -1;
663 int argc = *argc_p;
664 char **argv = *argv_p;
665 struct tc_u32_mark mark;
666
667 if (argc <= 1)
668 return -1;
669
670 if (get_u32(&mark.val, *argv, 0)) {
671 fprintf(stderr, "Illegal \"mark\" value\n");
672 return -1;
673 }
674 NEXT_ARG();
675
676 if (get_u32(&mark.mask, *argv, 0)) {
677 fprintf(stderr, "Illegal \"mark\" mask\n");
678 return -1;
679 }
680 NEXT_ARG();
681
682 if ((mark.val & mark.mask) != mark.val) {
683 fprintf(stderr, "Illegal \"mark\" (impossible combination)\n");
684 return -1;
685 }
aba5acdf 686
6f0ba88b 687 addattr_l(n, MAX_MSG, TCA_U32_MARK, &mark, sizeof(mark));
688 res = 0;
689
690 *argc_p = argc;
691 *argv_p = argv;
692 return res;
693}
aba5acdf 694
e62077d0
SH
695static int parse_selector(int *argc_p, char ***argv_p,
696 struct tc_u32_sel *sel, struct nlmsghdr *n)
aba5acdf
SH
697{
698 int argc = *argc_p;
699 char **argv = *argv_p;
700 int res = -1;
701
702 if (argc <= 0)
703 return -1;
704
705 if (matches(*argv, "u32") == 0) {
706 NEXT_ARG();
707 res = parse_u32(&argc, &argv, sel, 0, 0);
9fce67dd 708 } else if (matches(*argv, "u16") == 0) {
aba5acdf
SH
709 NEXT_ARG();
710 res = parse_u16(&argc, &argv, sel, 0, 0);
9fce67dd 711 } else if (matches(*argv, "u8") == 0) {
aba5acdf
SH
712 NEXT_ARG();
713 res = parse_u8(&argc, &argv, sel, 0, 0);
9fce67dd 714 } else if (matches(*argv, "ip") == 0) {
aba5acdf
SH
715 NEXT_ARG();
716 res = parse_ip(&argc, &argv, sel);
9fce67dd 717 } else if (matches(*argv, "ip6") == 0) {
aba5acdf
SH
718 NEXT_ARG();
719 res = parse_ip6(&argc, &argv, sel);
9fce67dd 720 } else if (matches(*argv, "udp") == 0) {
aba5acdf
SH
721 NEXT_ARG();
722 res = parse_udp(&argc, &argv, sel);
9fce67dd 723 } else if (matches(*argv, "tcp") == 0) {
aba5acdf
SH
724 NEXT_ARG();
725 res = parse_tcp(&argc, &argv, sel);
9fce67dd 726 } else if (matches(*argv, "icmp") == 0) {
aba5acdf
SH
727 NEXT_ARG();
728 res = parse_icmp(&argc, &argv, sel);
9fce67dd 729 } else if (matches(*argv, "mark") == 0) {
6f0ba88b 730 NEXT_ARG();
731 res = parse_mark(&argc, &argv, n);
b4d41f41
SH
732 } else if (matches(*argv, "ether") == 0) {
733 NEXT_ARG();
734 res = parse_ether(&argc, &argv, sel);
3d0b7439 735 } else
9fce67dd 736 return -1;
aba5acdf 737
aba5acdf
SH
738 *argc_p = argc;
739 *argv_p = argv;
740 return res;
741}
742
743static int parse_offset(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
744{
745 int argc = *argc_p;
746 char **argv = *argv_p;
747
748 while (argc > 0) {
749 if (matches(*argv, "plus") == 0) {
750 int off;
751 NEXT_ARG();
752 if (get_integer(&off, *argv, 0))
753 return -1;
754 sel->off = off;
755 sel->flags |= TC_U32_OFFSET;
756 } else if (matches(*argv, "at") == 0) {
757 int off;
758 NEXT_ARG();
759 if (get_integer(&off, *argv, 0))
760 return -1;
761 sel->offoff = off;
762 if (off%2) {
763 fprintf(stderr, "offset \"at\" must be even\n");
764 return -1;
765 }
766 sel->flags |= TC_U32_VAROFFSET;
767 } else if (matches(*argv, "mask") == 0) {
768 __u16 mask;
769 NEXT_ARG();
770 if (get_u16(&mask, *argv, 16))
771 return -1;
772 sel->offmask = htons(mask);
773 sel->flags |= TC_U32_VAROFFSET;
774 } else if (matches(*argv, "shift") == 0) {
775 int shift;
776 NEXT_ARG();
777 if (get_integer(&shift, *argv, 0))
778 return -1;
779 sel->offshift = shift;
780 sel->flags |= TC_U32_VAROFFSET;
781 } else if (matches(*argv, "eat") == 0) {
782 sel->flags |= TC_U32_EAT;
783 } else {
784 break;
785 }
786 argc--; argv++;
787 }
788
789 *argc_p = argc;
790 *argv_p = argv;
791 return 0;
792}
793
794static int parse_hashkey(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
795{
796 int argc = *argc_p;
797 char **argv = *argv_p;
798
799 while (argc > 0) {
800 if (matches(*argv, "mask") == 0) {
801 __u32 mask;
802 NEXT_ARG();
803 if (get_u32(&mask, *argv, 16))
804 return -1;
805 sel->hmask = htonl(mask);
806 } else if (matches(*argv, "at") == 0) {
807 int num;
808 NEXT_ARG();
809 if (get_integer(&num, *argv, 0))
810 return -1;
811 if (num%4)
812 return -1;
813 sel->hoff = num;
814 } else {
815 break;
816 }
817 argc--; argv++;
818 }
819
820 *argc_p = argc;
821 *argv_p = argv;
822 return 0;
823}
824
1750abe2 825static void print_ipv4(FILE *f, const struct tc_u32_key *key)
6b1ac654
SH
826{
827 char abuf[256];
828
6b1ac654 829 switch (key->off) {
4c9ffc2f
SH
830 case 0:
831 switch (ntohl(key->mask)) {
832 case 0x0f000000:
1750abe2 833 fprintf(f, "\n match IP ihl %u", ntohl(key->val) >> 24);
4c9ffc2f
SH
834 return;
835 case 0x00ff0000:
1750abe2 836 fprintf(f, "\n match IP dsfield %#x", ntohl(key->val) >> 16);
4c9ffc2f
SH
837 return;
838 }
839 break;
840 case 8:
841 if (ntohl(key->mask) == 0x00ff0000) {
1750abe2 842 fprintf(f, "\n match IP protocol %d", ntohl(key->val) >> 16);
4c9ffc2f
SH
843 return;
844 }
845 break;
6b1ac654
SH
846 case 12:
847 case 16: {
848 int bits = mask2bits(key->mask);
849 if (bits >= 0) {
3d0b7439 850 fprintf(f, "\n %s %s/%d",
1750abe2 851 key->off == 12 ? "match IP src" : "match IP dst",
e62077d0
SH
852 inet_ntop(AF_INET, &key->val,
853 abuf, sizeof(abuf)),
6b1ac654
SH
854 bits);
855 return;
856 }
857 }
858 break;
859
860 case 20:
4c9ffc2f
SH
861 switch (ntohl(key->mask)) {
862 case 0x0000ffff:
bcd7abdd 863 fprintf(f, "\n match dport %u",
4c9ffc2f
SH
864 ntohl(key->val) & 0xffff);
865 return;
866 case 0xffff0000:
bcd7abdd 867 fprintf(f, "\n match sport %u",
4c9ffc2f
SH
868 ntohl(key->val) >> 16);
869 return;
870 case 0xffffffff:
bcd7abdd 871 fprintf(f, "\n match dport %u, match sport %u",
4c9ffc2f
SH
872 ntohl(key->val) & 0xffff,
873 ntohl(key->val) >> 16);
874
6b1ac654
SH
875 return;
876 }
1750abe2 877 /* XXX: Default print_raw */
6b1ac654 878 }
1750abe2 879}
6b1ac654 880
d13cee6d
SH
881static void print_ipv6(FILE *f, const struct tc_u32_key *key)
882{
883 char abuf[256];
884
885 switch (key->off) {
886 case 0:
887 switch (ntohl(key->mask)) {
888 case 0x0f000000:
889 fprintf(f, "\n match IP ihl %u", ntohl(key->val) >> 24);
890 return;
891 case 0x00ff0000:
892 fprintf(f, "\n match IP dsfield %#x", ntohl(key->val) >> 16);
893 return;
894 }
895 break;
896 case 8:
897 if (ntohl(key->mask) == 0x00ff0000) {
898 fprintf(f, "\n match IP protocol %d", ntohl(key->val) >> 16);
899 return;
900 }
901 break;
902 case 12:
903 case 16: {
904 int bits = mask2bits(key->mask);
905 if (bits >= 0) {
3d0b7439 906 fprintf(f, "\n %s %s/%d",
d13cee6d
SH
907 key->off == 12 ? "match IP src" : "match IP dst",
908 inet_ntop(AF_INET, &key->val,
909 abuf, sizeof(abuf)),
910 bits);
911 return;
912 }
913 }
914 break;
915
916 case 20:
917 switch (ntohl(key->mask)) {
918 case 0x0000ffff:
919 fprintf(f, "\n match sport %u",
920 ntohl(key->val) & 0xffff);
921 return;
922 case 0xffff0000:
923 fprintf(f, "\n match dport %u",
924 ntohl(key->val) >> 16);
925 return;
926 case 0xffffffff:
927 fprintf(f, "\n match sport %u, match dport %u",
928 ntohl(key->val) & 0xffff,
929 ntohl(key->val) >> 16);
930
931 return;
932 }
933 /* XXX: Default print_raw */
934 }
935}
936
1750abe2 937static void print_raw(FILE *f, const struct tc_u32_key *key)
938{
3d0b7439 939 fprintf(f, "\n match %08x/%08x at %s%d",
6b1ac654
SH
940 (unsigned int)ntohl(key->val),
941 (unsigned int)ntohl(key->mask),
942 key->offmask ? "nexthdr+" : "",
943 key->off);
944}
945
1750abe2 946static const struct {
947 __u16 proto;
948 __u16 pad;
949 void (*pprinter)(FILE *f, const struct tc_u32_key *key);
950} u32_pprinters[] = {
951 {0, 0, print_raw},
952 {ETH_P_IP, 0, print_ipv4},
d13cee6d 953 {ETH_P_IPV6, 0, print_ipv6},
1750abe2 954};
955
956static void show_keys(FILE *f, const struct tc_u32_key *key)
957{
958 int i = 0;
959
960 if (!show_pretty)
961 goto show_k;
962
963 for (i = 0; i < sizeof(u32_pprinters) / sizeof(u32_pprinters[0]); i++) {
964 if (u32_pprinters[i].proto == ntohs(f_proto)) {
965show_k:
966 u32_pprinters[i].pprinter(f, key);
967 return;
968 }
969 }
970
971 i = 0;
972 goto show_k;
973}
974
975static int u32_parse_opt(struct filter_util *qu, char *handle,
6b1ac654 976 int argc, char **argv, struct nlmsghdr *n)
aba5acdf
SH
977{
978 struct {
979 struct tc_u32_sel sel;
980 struct tc_u32_key keys[128];
981 } sel;
982 struct tcmsg *t = NLMSG_DATA(n);
983 struct rtattr *tail;
dcf13497 984 int sel_ok = 0, terminal_ok = 0;
aba5acdf
SH
985 int sample_ok = 0;
986 __u32 htid = 0;
987 __u32 order = 0;
988
989 memset(&sel, 0, sizeof(sel));
990
991 if (handle && get_u32_handle(&t->tcm_handle, handle)) {
992 fprintf(stderr, "Illegal filter ID\n");
993 return -1;
994 }
995
996 if (argc == 0)
997 return 0;
998
4a86fe19 999 tail = NLMSG_TAIL(n);
2373fde9 1000 addattr_l(n, MAX_MSG, TCA_OPTIONS, NULL, 0);
aba5acdf
SH
1001
1002 while (argc > 0) {
1003 if (matches(*argv, "match") == 0) {
1004 NEXT_ARG();
6f0ba88b 1005 if (parse_selector(&argc, &argv, &sel.sel, n)) {
aba5acdf
SH
1006 fprintf(stderr, "Illegal \"match\"\n");
1007 return -1;
1008 }
1009 sel_ok++;
1010 continue;
1011 } else if (matches(*argv, "offset") == 0) {
1012 NEXT_ARG();
1013 if (parse_offset(&argc, &argv, &sel.sel)) {
1014 fprintf(stderr, "Illegal \"offset\"\n");
1015 return -1;
1016 }
1017 continue;
1018 } else if (matches(*argv, "hashkey") == 0) {
1019 NEXT_ARG();
1020 if (parse_hashkey(&argc, &argv, &sel.sel)) {
1021 fprintf(stderr, "Illegal \"hashkey\"\n");
1022 return -1;
1023 }
1024 continue;
1025 } else if (matches(*argv, "classid") == 0 ||
1026 strcmp(*argv, "flowid") == 0) {
1027 unsigned handle;
1028 NEXT_ARG();
1029 if (get_tc_classid(&handle, *argv)) {
1030 fprintf(stderr, "Illegal \"classid\"\n");
1031 return -1;
1032 }
2373fde9 1033 addattr_l(n, MAX_MSG, TCA_U32_CLASSID, &handle, 4);
aba5acdf
SH
1034 sel.sel.flags |= TC_U32_TERMINAL;
1035 } else if (matches(*argv, "divisor") == 0) {
1036 unsigned divisor;
1037 NEXT_ARG();
ae665a52 1038 if (get_unsigned(&divisor, *argv, 0) ||
46b67dab
SH
1039 divisor == 0 ||
1040 divisor > 0x100 || ((divisor - 1) & divisor)) {
aba5acdf
SH
1041 fprintf(stderr, "Illegal \"divisor\"\n");
1042 return -1;
1043 }
2373fde9 1044 addattr_l(n, MAX_MSG, TCA_U32_DIVISOR, &divisor, 4);
aba5acdf
SH
1045 } else if (matches(*argv, "order") == 0) {
1046 NEXT_ARG();
1047 if (get_u32(&order, *argv, 0)) {
1048 fprintf(stderr, "Illegal \"order\"\n");
1049 return -1;
1050 }
1051 } else if (strcmp(*argv, "link") == 0) {
1052 unsigned handle;
1053 NEXT_ARG();
1054 if (get_u32_handle(&handle, *argv)) {
1055 fprintf(stderr, "Illegal \"link\"\n");
1056 return -1;
1057 }
1058 if (handle && TC_U32_NODE(handle)) {
1059 fprintf(stderr, "\"link\" must be a hash table.\n");
1060 return -1;
1061 }
2373fde9 1062 addattr_l(n, MAX_MSG, TCA_U32_LINK, &handle, 4);
aba5acdf
SH
1063 } else if (strcmp(*argv, "ht") == 0) {
1064 unsigned handle;
1065 NEXT_ARG();
1066 if (get_u32_handle(&handle, *argv)) {
1067 fprintf(stderr, "Illegal \"ht\"\n");
1068 return -1;
1069 }
1070 if (handle && TC_U32_NODE(handle)) {
1071 fprintf(stderr, "\"ht\" must be a hash table.\n");
1072 return -1;
1073 }
1074 if (sample_ok)
1075 htid = (htid&0xFF000)|(handle&0xFFF00000);
1076 else
1077 htid = (handle&0xFFFFF000);
1078 } else if (strcmp(*argv, "sample") == 0) {
1079 __u32 hash;
3925ad81 1080 unsigned divisor = 0x100;
267480f5 1081
aba5acdf
SH
1082 struct {
1083 struct tc_u32_sel sel;
1084 struct tc_u32_key keys[4];
1085 } sel2;
46b67dab 1086 memset(&sel2, 0, sizeof(sel2));
aba5acdf 1087 NEXT_ARG();
6f0ba88b 1088 if (parse_selector(&argc, &argv, &sel2.sel, n)) {
aba5acdf
SH
1089 fprintf(stderr, "Illegal \"sample\"\n");
1090 return -1;
1091 }
1092 if (sel2.sel.nkeys != 1) {
e62077d0
SH
1093 fprintf(stderr, "\"sample\" must contain"
1094 " exactly ONE key.\n");
aba5acdf
SH
1095 return -1;
1096 }
3925ad81
SH
1097 if (*argv != 0 && strcmp(*argv, "divisor") == 0) {
1098 NEXT_ARG();
1099 if (get_unsigned(&divisor, *argv, 0) || divisor == 0 ||
46b67dab 1100 divisor > 0x100 || ((divisor - 1) & divisor)) {
3925ad81
SH
1101 fprintf(stderr, "Illegal sample \"divisor\"\n");
1102 return -1;
1103 }
1104 NEXT_ARG();
1105 }
aba5acdf 1106 hash = sel2.sel.keys[0].val&sel2.sel.keys[0].mask;
267480f5
SH
1107 hash ^= hash>>16;
1108 hash ^= hash>>8;
3925ad81 1109 htid = ((hash%divisor)<<12)|(htid&0xFFF00000);
aba5acdf
SH
1110 sample_ok = 1;
1111 continue;
2373fde9
SH
1112 } else if (strcmp(*argv, "indev") == 0) {
1113 char ind[IFNAMSIZ + 1];
1114 memset(ind, 0, sizeof (ind));
1115 argc--;
1116 argv++;
1117 if (argc < 1) {
1118 fprintf(stderr, "Illegal indev\n");
1119 return -1;
1120 }
1121 strncpy(ind, *argv, sizeof (ind) - 1);
1122 addattr_l(n, MAX_MSG, TCA_U32_INDEV, ind, strlen(ind) + 1);
d81b135b 1123
2373fde9
SH
1124 } else if (matches(*argv, "action") == 0) {
1125 NEXT_ARG();
1126 if (parse_action(&argc, &argv, TCA_U32_ACT, n)) {
1127 fprintf(stderr, "Illegal \"action\"\n");
1128 return -1;
1129 }
dcf13497 1130 terminal_ok++;
2373fde9 1131 continue;
d81b135b 1132
aba5acdf
SH
1133 } else if (matches(*argv, "police") == 0) {
1134 NEXT_ARG();
1135 if (parse_police(&argc, &argv, TCA_U32_POLICE, n)) {
1136 fprintf(stderr, "Illegal \"police\"\n");
1137 return -1;
1138 }
dcf13497 1139 terminal_ok++;
aba5acdf
SH
1140 continue;
1141 } else if (strcmp(*argv, "help") == 0) {
1142 explain();
1143 return -1;
1144 } else {
1145 fprintf(stderr, "What is \"%s\"?\n", *argv);
1146 explain();
1147 return -1;
1148 }
1149 argc--; argv++;
1150 }
1151
dcf13497 1152 /* We dont necessarily need class/flowids */
81c61790 1153 if (terminal_ok)
dcf13497 1154 sel.sel.flags |= TC_U32_TERMINAL;
3d0b7439 1155
aba5acdf
SH
1156 if (order) {
1157 if (TC_U32_NODE(t->tcm_handle) && order != TC_U32_NODE(t->tcm_handle)) {
1158 fprintf(stderr, "\"order\" contradicts \"handle\"\n");
1159 return -1;
1160 }
1161 t->tcm_handle |= order;
1162 }
1163
1164 if (htid)
2373fde9 1165 addattr_l(n, MAX_MSG, TCA_U32_HASH, &htid, 4);
aba5acdf 1166 if (sel_ok)
3d0b7439 1167 addattr_l(n, MAX_MSG, TCA_U32_SEL, &sel,
e62077d0 1168 sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_u32_key));
4a86fe19 1169 tail->rta_len = (void *) NLMSG_TAIL(n) - (void *) tail;
aba5acdf
SH
1170 return 0;
1171}
1172
6b1ac654
SH
1173static int u32_print_opt(struct filter_util *qu, FILE *f, struct rtattr *opt,
1174 __u32 handle)
aba5acdf
SH
1175{
1176 struct rtattr *tb[TCA_U32_MAX+1];
1177 struct tc_u32_sel *sel = NULL;
d81b135b 1178 struct tc_u32_pcnt *pf = NULL;
aba5acdf
SH
1179
1180 if (opt == NULL)
1181 return 0;
1182
ac2fc2df 1183 parse_rtattr_nested(tb, TCA_U32_MAX, opt);
aba5acdf
SH
1184
1185 if (handle) {
1186 SPRINT_BUF(b1);
1187 fprintf(f, "fh %s ", sprint_u32_handle(handle, b1));
1188 }
1189 if (TC_U32_NODE(handle)) {
1190 fprintf(f, "order %d ", TC_U32_NODE(handle));
1191 }
1192
1193 if (tb[TCA_U32_SEL]) {
1194 if (RTA_PAYLOAD(tb[TCA_U32_SEL]) < sizeof(*sel))
1195 return -1;
1196
1197 sel = RTA_DATA(tb[TCA_U32_SEL]);
1198 }
1199
1200 if (tb[TCA_U32_DIVISOR]) {
ff24746c 1201 fprintf(f, "ht divisor %d ", rta_getattr_u32(tb[TCA_U32_DIVISOR]));
aba5acdf 1202 } else if (tb[TCA_U32_HASH]) {
ff24746c 1203 __u32 htid = rta_getattr_u32(tb[TCA_U32_HASH]);
e62077d0
SH
1204 fprintf(f, "key ht %x bkt %x ", TC_U32_USERHTID(htid),
1205 TC_U32_HASH(htid));
aba5acdf
SH
1206 } else {
1207 fprintf(f, "??? ");
1208 }
1209 if (tb[TCA_U32_CLASSID]) {
1210 SPRINT_BUF(b1);
1211 fprintf(f, "%sflowid %s ",
1212 !sel || !(sel->flags&TC_U32_TERMINAL) ? "*" : "",
ff24746c 1213 sprint_tc_classid(rta_getattr_u32(tb[TCA_U32_CLASSID]), b1));
aba5acdf
SH
1214 } else if (sel && sel->flags&TC_U32_TERMINAL) {
1215 fprintf(f, "terminal flowid ??? ");
1216 }
1217 if (tb[TCA_U32_LINK]) {
1218 SPRINT_BUF(b1);
e62077d0 1219 fprintf(f, "link %s ",
ff24746c 1220 sprint_u32_handle(rta_getattr_u32(tb[TCA_U32_LINK]), b1));
aba5acdf 1221 }
2373fde9 1222
d81b135b 1223 if (tb[TCA_U32_PCNT]) {
1224 if (RTA_PAYLOAD(tb[TCA_U32_PCNT]) < sizeof(*pf)) {
1225 fprintf(f, "Broken perf counters \n");
1226 return -1;
1227 }
1228 pf = RTA_DATA(tb[TCA_U32_PCNT]);
1229 }
aba5acdf 1230
6f0ba88b 1231 if (sel && show_stats && NULL != pf)
b906243b 1232 fprintf(f, " (rule hit %llu success %llu)",
1233 (unsigned long long) pf->rcnt,
1234 (unsigned long long) pf->rhit);
6f0ba88b 1235
1236 if (tb[TCA_U32_MARK]) {
1237 struct tc_u32_mark *mark = RTA_DATA(tb[TCA_U32_MARK]);
1238 if (RTA_PAYLOAD(tb[TCA_U32_MARK]) < sizeof(*mark)) {
1239 fprintf(f, "\n Invalid mark (kernel&iproute2 mismatch)\n");
1240 } else {
1241 fprintf(f, "\n mark 0x%04x 0x%04x (success %d)",
1242 mark->val, mark->mask, mark->success);
1243 }
1244 }
1245
aba5acdf 1246 if (sel) {
aba5acdf 1247 if (sel->nkeys) {
6b1ac654
SH
1248 int i;
1249 for (i=0; i<sel->nkeys; i++) {
1750abe2 1250 show_keys(f, sel->keys + i);
d81b135b 1251 if (show_stats && NULL != pf)
6b1ac654 1252 fprintf(f, " (success %llu ) ",
b906243b 1253 (unsigned long long) pf->kcnts[i]);
2373fde9 1254 }
aba5acdf
SH
1255 }
1256
1257 if (sel->flags&(TC_U32_VAROFFSET|TC_U32_OFFSET)) {
1258 fprintf(f, "\n offset ");
1259 if (sel->flags&TC_U32_VAROFFSET)
e62077d0
SH
1260 fprintf(f, "%04x>>%d at %d ",
1261 ntohs(sel->offmask),
1262 sel->offshift, sel->offoff);
aba5acdf
SH
1263 if (sel->off)
1264 fprintf(f, "plus %d ", sel->off);
1265 }
1266 if (sel->flags&TC_U32_EAT)
1267 fprintf(f, " eat ");
1268
1269 if (sel->hmask) {
1270 fprintf(f, "\n hash mask %08x at %d ",
1271 (unsigned int)htonl(sel->hmask), sel->hoff);
1272 }
1273 }
1274
2373fde9
SH
1275 if (tb[TCA_U32_POLICE]) {
1276 fprintf(f, "\n");
1277 tc_print_police(f, tb[TCA_U32_POLICE]);
1278 }
1279 if (tb[TCA_U32_INDEV]) {
1280 struct rtattr *idev = tb[TCA_U32_INDEV];
ff24746c 1281 fprintf(f, "\n input dev %s\n", rta_getattr_str(idev));
2373fde9
SH
1282 }
1283 if (tb[TCA_U32_ACT]) {
1284 tc_print_action(f, tb[TCA_U32_ACT]);
1285 }
1286
aba5acdf
SH
1287 return 0;
1288}
1289
6b7dff17
SH
1290struct filter_util u32_filter_util = {
1291 .id = "u32",
1292 .parse_fopt = u32_parse_opt,
1293 .print_fopt = u32_print_opt,
aba5acdf 1294};