]> git.proxmox.com Git - mirror_iproute2.git/blame - tc/tc_filter.c
rdma: Reduce scope of _dev_map_lookup call
[mirror_iproute2.git] / tc / tc_filter.c
CommitLineData
aba5acdf
SH
1/*
2 * tc_filter.c "tc filter".
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 */
12
13#include <stdio.h>
14#include <stdlib.h>
15#include <unistd.h>
aba5acdf 16#include <fcntl.h>
aba5acdf
SH
17#include <sys/socket.h>
18#include <netinet/in.h>
19#include <arpa/inet.h>
20#include <string.h>
21#include <linux/if_ether.h>
22
23#include "rt_names.h"
24#include "utils.h"
25#include "tc_util.h"
26#include "tc_common.h"
27
aba5acdf
SH
28static void usage(void)
29{
ec2e005f
SH
30 fprintf(stderr,
31 "Usage: tc filter [ add | del | change | replace | show ] dev STRING\n"
32 "Usage: tc filter get dev STRING parent CLASSID protocol PROTO handle FILTERID pref PRIO FILTER_TYPE\n"
732f0346 33 " [ pref PRIO ] protocol PROTO [ chain CHAIN_INDEX ]\n"
ec2e005f
SH
34 " [ estimator INTERVAL TIME_CONSTANT ]\n"
35 " [ root | ingress | egress | parent CLASSID ]\n"
36 " [ handle FILTERID ] [ [ FILTER_TYPE ] [ help | OPTIONS ] ]\n"
37 "\n"
38 " tc filter show [ dev STRING ] [ root | ingress | egress | parent CLASSID ]\n"
39 "Where:\n"
40 "FILTER_TYPE := { rsvp | u32 | bpf | fw | route | etc. }\n"
41 "FILTERID := ... format depends on classifier, see there\n"
42 "OPTIONS := ... try tc filter add <desired FILTER_KIND> help\n");
aba5acdf
SH
43}
44
32a121cb 45static int tc_filter_modify(int cmd, unsigned int flags, int argc, char **argv)
aba5acdf 46{
aba5acdf 47 struct {
32a121cb
SH
48 struct nlmsghdr n;
49 struct tcmsg t;
50 char buf[MAX_MSG];
d17b136f
PS
51 } req = {
52 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg)),
53 .n.nlmsg_flags = NLM_F_REQUEST | flags,
54 .n.nlmsg_type = cmd,
55 .t.tcm_family = AF_UNSPEC,
56 };
aba5acdf
SH
57 struct filter_util *q = NULL;
58 __u32 prio = 0;
ae761068 59 __u32 protocol = 0;
083a5f00 60 int protocol_set = 0;
732f0346
JP
61 __u32 chain_index;
62 int chain_index_set = 0;
aba5acdf 63 char *fhandle = NULL;
b317557f
SH
64 char d[IFNAMSIZ] = {};
65 char k[FILTER_NAMESZ] = {};
d17b136f 66 struct tc_estimator est = {};
aba5acdf 67
ae761068 68 if (cmd == RTM_NEWTFILTER && flags & NLM_F_CREATE)
05fb9184 69 protocol = htons(ETH_P_ALL);
ae761068 70
aba5acdf
SH
71 while (argc > 0) {
72 if (strcmp(*argv, "dev") == 0) {
73 NEXT_ARG();
74 if (d[0])
75 duparg("dev", *argv);
76 strncpy(d, *argv, sizeof(d)-1);
77 } else if (strcmp(*argv, "root") == 0) {
78 if (req.t.tcm_parent) {
ec2e005f
SH
79 fprintf(stderr,
80 "Error: \"root\" is duplicate parent ID\n");
024481bb 81 return -1;
aba5acdf
SH
82 }
83 req.t.tcm_parent = TC_H_ROOT;
8f9afdd5
DB
84 } else if (strcmp(*argv, "ingress") == 0) {
85 if (req.t.tcm_parent) {
ec2e005f
SH
86 fprintf(stderr,
87 "Error: \"ingress\" is duplicate parent ID\n");
8f9afdd5
DB
88 return -1;
89 }
90 req.t.tcm_parent = TC_H_MAKE(TC_H_CLSACT,
91 TC_H_MIN_INGRESS);
92 } else if (strcmp(*argv, "egress") == 0) {
93 if (req.t.tcm_parent) {
ec2e005f
SH
94 fprintf(stderr,
95 "Error: \"egress\" is duplicate parent ID\n");
8f9afdd5
DB
96 return -1;
97 }
98 req.t.tcm_parent = TC_H_MAKE(TC_H_CLSACT,
99 TC_H_MIN_EGRESS);
aba5acdf
SH
100 } else if (strcmp(*argv, "parent") == 0) {
101 __u32 handle;
32a121cb 102
aba5acdf
SH
103 NEXT_ARG();
104 if (req.t.tcm_parent)
105 duparg("parent", *argv);
106 if (get_tc_classid(&handle, *argv))
f1675d61 107 invarg("Invalid parent ID", *argv);
aba5acdf
SH
108 req.t.tcm_parent = handle;
109 } else if (strcmp(*argv, "handle") == 0) {
110 NEXT_ARG();
111 if (fhandle)
112 duparg("handle", *argv);
113 fhandle = *argv;
114 } else if (matches(*argv, "preference") == 0 ||
115 matches(*argv, "priority") == 0) {
116 NEXT_ARG();
117 if (prio)
118 duparg("priority", *argv);
424adc19 119 if (get_u32(&prio, *argv, 0) || prio > 0xFFFF)
f1675d61 120 invarg("invalid priority value", *argv);
aba5acdf
SH
121 } else if (matches(*argv, "protocol") == 0) {
122 __u16 id;
32a121cb 123
aba5acdf 124 NEXT_ARG();
083a5f00 125 if (protocol_set)
aba5acdf
SH
126 duparg("protocol", *argv);
127 if (ll_proto_a2n(&id, *argv))
f1675d61 128 invarg("invalid protocol", *argv);
aba5acdf 129 protocol = id;
083a5f00 130 protocol_set = 1;
732f0346
JP
131 } else if (matches(*argv, "chain") == 0) {
132 NEXT_ARG();
133 if (chain_index_set)
134 duparg("chain", *argv);
135 if (get_u32(&chain_index, *argv, 0))
136 invarg("invalid chain index value", *argv);
137 chain_index_set = 1;
aba5acdf
SH
138 } else if (matches(*argv, "estimator") == 0) {
139 if (parse_estimator(&argc, &argv, &est) < 0)
140 return -1;
141 } else if (matches(*argv, "help") == 0) {
142 usage();
3a99df70 143 return 0;
aba5acdf
SH
144 } else {
145 strncpy(k, *argv, sizeof(k)-1);
146
147 q = get_filter_kind(k);
148 argc--; argv++;
149 break;
150 }
151
152 argc--; argv++;
153 }
154
155 req.t.tcm_info = TC_H_MAKE(prio<<16, protocol);
156
732f0346
JP
157 if (chain_index_set)
158 addattr32(&req.n, sizeof(req), TCA_CHAIN, chain_index);
159
aba5acdf
SH
160 if (k[0])
161 addattr_l(&req.n, sizeof(req), TCA_KIND, k, strlen(k)+1);
162
01ea76b1
JK
163 if (d[0]) {
164 ll_init_map(&rth);
165
166 req.t.tcm_ifindex = ll_name_to_index(d);
167 if (req.t.tcm_ifindex == 0) {
168 fprintf(stderr, "Cannot find device \"%s\"\n", d);
169 return 1;
170 }
171 }
172
aba5acdf
SH
173 if (q) {
174 if (q->parse_fopt(q, fhandle, argc, argv, &req.n))
024481bb 175 return 1;
aba5acdf
SH
176 } else {
177 if (fhandle) {
ec2e005f
SH
178 fprintf(stderr,
179 "Must specify filter type when using \"handle\"\n");
024481bb 180 return -1;
aba5acdf
SH
181 }
182 if (argc) {
183 if (matches(*argv, "help") == 0)
184 usage();
ec2e005f
SH
185 fprintf(stderr,
186 "Garbage instead of arguments \"%s ...\". Try \"tc filter help\".\n",
187 *argv);
024481bb 188 return -1;
aba5acdf
SH
189 }
190 }
732f0346 191
aba5acdf
SH
192 if (est.ewma_log)
193 addattr_l(&req.n, sizeof(req), TCA_RATE, &est, sizeof(est));
194
86bf43c7 195 if (rtnl_talk(&rth, &req.n, NULL) < 0) {
2373fde9 196 fprintf(stderr, "We have an error talking to the kernel\n");
024481bb 197 return 2;
2373fde9 198 }
aba5acdf 199
aba5acdf
SH
200 return 0;
201}
202
203static __u32 filter_parent;
204static int filter_ifindex;
205static __u32 filter_prio;
206static __u32 filter_protocol;
732f0346
JP
207static __u32 filter_chain_index;
208static int filter_chain_index_set;
32a121cb 209__u16 f_proto;
aba5acdf 210
120f556d 211int print_filter(const struct sockaddr_nl *who, struct nlmsghdr *n, void *arg)
aba5acdf 212{
32a121cb 213 FILE *fp = (FILE *)arg;
aba5acdf
SH
214 struct tcmsg *t = NLMSG_DATA(n);
215 int len = n->nlmsg_len;
32a121cb 216 struct rtattr *tb[TCA_MAX+1];
aba5acdf
SH
217 struct filter_util *q;
218 char abuf[256];
219
120f556d
JHS
220 if (n->nlmsg_type != RTM_NEWTFILTER &&
221 n->nlmsg_type != RTM_GETTFILTER &&
222 n->nlmsg_type != RTM_DELTFILTER) {
223 fprintf(stderr, "Not a filter(cmd %d)\n", n->nlmsg_type);
aba5acdf
SH
224 return 0;
225 }
226 len -= NLMSG_LENGTH(sizeof(*t));
227 if (len < 0) {
228 fprintf(stderr, "Wrong len %d\n", len);
229 return -1;
230 }
231
aba5acdf
SH
232 parse_rtattr(tb, TCA_MAX, TCA_RTA(t), len);
233
234 if (tb[TCA_KIND] == NULL) {
2373fde9 235 fprintf(stderr, "print_filter: NULL kind\n");
aba5acdf
SH
236 return -1;
237 }
238
249284ff
JP
239 open_json_object(NULL);
240
aba5acdf 241 if (n->nlmsg_type == RTM_DELTFILTER)
249284ff 242 print_bool(PRINT_ANY, "deleted", "deleted ", true);
aba5acdf 243
98df0c81
RM
244 if (n->nlmsg_type == RTM_NEWTFILTER &&
245 (n->nlmsg_flags & NLM_F_CREATE) &&
246 !(n->nlmsg_flags & NLM_F_EXCL))
249284ff 247 print_bool(PRINT_ANY, "replaced", "replaced ", true);
98df0c81
RM
248
249 if (n->nlmsg_type == RTM_NEWTFILTER &&
250 (n->nlmsg_flags & NLM_F_CREATE) &&
251 (n->nlmsg_flags & NLM_F_EXCL))
249284ff 252 print_bool(PRINT_ANY, "added", "added ", true);
98df0c81 253
249284ff 254 print_string(PRINT_FP, NULL, "filter ", NULL);
aba5acdf 255 if (!filter_ifindex || filter_ifindex != t->tcm_ifindex)
249284ff
JP
256 print_string(PRINT_ANY, "dev", "dev %s ",
257 ll_index_to_name(t->tcm_ifindex));
aba5acdf
SH
258
259 if (!filter_parent || filter_parent != t->tcm_parent) {
260 if (t->tcm_parent == TC_H_ROOT)
249284ff 261 print_bool(PRINT_ANY, "root", "root ", true);
8f9afdd5 262 else if (t->tcm_parent == TC_H_MAKE(TC_H_CLSACT, TC_H_MIN_INGRESS))
249284ff 263 print_bool(PRINT_ANY, "ingress", "ingress ", true);
8f9afdd5 264 else if (t->tcm_parent == TC_H_MAKE(TC_H_CLSACT, TC_H_MIN_EGRESS))
249284ff 265 print_bool(PRINT_ANY, "egress", "egress ", true);
aba5acdf
SH
266 else {
267 print_tc_classid(abuf, sizeof(abuf), t->tcm_parent);
249284ff 268 print_string(PRINT_ANY, "parent", "parent %s ", abuf);
aba5acdf
SH
269 }
270 }
8f9afdd5 271
aba5acdf 272 if (t->tcm_info) {
eefcbc72 273 f_proto = TC_H_MIN(t->tcm_info);
aba5acdf 274 __u32 prio = TC_H_MAJ(t->tcm_info)>>16;
32a121cb 275
eefcbc72 276 if (!filter_protocol || filter_protocol != f_proto) {
277 if (f_proto) {
aba5acdf 278 SPRINT_BUF(b1);
249284ff
JP
279 print_string(PRINT_JSON, "protocol",
280 "protocol %s ",
281 ll_proto_n2a(f_proto, b1, sizeof(b1)));
aba5acdf
SH
282 }
283 }
284 if (!filter_prio || filter_prio != prio) {
285 if (prio)
249284ff 286 print_uint(PRINT_ANY, "pref", "pref %u ", prio);
aba5acdf
SH
287 }
288 }
249284ff 289 print_string(PRINT_ANY, "kind", "%s ", rta_getattr_str(tb[TCA_KIND]));
732f0346
JP
290
291 if (tb[TCA_CHAIN]) {
292 __u32 chain_index = rta_getattr_u32(tb[TCA_CHAIN]);
293
294 if (!filter_chain_index_set ||
295 filter_chain_index != chain_index)
249284ff
JP
296 print_uint(PRINT_ANY, "chain", "chain %u ",
297 chain_index);
732f0346
JP
298 }
299
aba5acdf
SH
300 q = get_filter_kind(RTA_DATA(tb[TCA_KIND]));
301 if (tb[TCA_OPTIONS]) {
249284ff 302 open_json_object("options");
aba5acdf
SH
303 if (q)
304 q->print_fopt(q, fp, tb[TCA_OPTIONS], t->tcm_handle);
305 else
249284ff
JP
306 print_string(PRINT_FP, NULL,
307 "[cannot parse parameters]", NULL);
308 close_json_object();
aba5acdf 309 }
249284ff 310 print_string(PRINT_FP, NULL, "\n", NULL);
aba5acdf 311
e5879dc6 312 if (show_stats && (tb[TCA_STATS] || tb[TCA_STATS2])) {
313 print_tcstats_attr(fp, tb, " ", NULL);
249284ff 314 print_string(PRINT_FP, NULL, "\n", NULL);
aba5acdf 315 }
de481780 316
249284ff 317 close_json_object();
aba5acdf
SH
318 fflush(fp);
319 return 0;
320}
321
120f556d
JHS
322static int tc_filter_get(int cmd, unsigned int flags, int argc, char **argv)
323{
324 struct {
325 struct nlmsghdr n;
326 struct tcmsg t;
327 char buf[MAX_MSG];
328 } req = {
329 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg)),
330 /* NLM_F_ECHO is for backward compatibility. old kernels never
331 * respond without it and newer kernels will ignore it.
332 * In old kernels there is a side effect:
333 * In addition to a response to the GET you will receive an
334 * event (if you do tc mon).
335 */
336 .n.nlmsg_flags = NLM_F_REQUEST | NLM_F_ECHO | flags,
337 .n.nlmsg_type = cmd,
338 .t.tcm_parent = TC_H_UNSPEC,
339 .t.tcm_family = AF_UNSPEC,
340 };
86bf43c7 341 struct nlmsghdr *answer;
120f556d
JHS
342 struct filter_util *q = NULL;
343 __u32 prio = 0;
344 __u32 protocol = 0;
345 int protocol_set = 0;
732f0346
JP
346 __u32 chain_index;
347 int chain_index_set = 0;
120f556d
JHS
348 __u32 parent_handle = 0;
349 char *fhandle = NULL;
b317557f
SH
350 char d[IFNAMSIZ] = {};
351 char k[FILTER_NAMESZ] = {};
120f556d
JHS
352
353 while (argc > 0) {
354 if (strcmp(*argv, "dev") == 0) {
355 NEXT_ARG();
356 if (d[0])
357 duparg("dev", *argv);
358 strncpy(d, *argv, sizeof(d)-1);
359 } else if (strcmp(*argv, "root") == 0) {
360 if (req.t.tcm_parent) {
ec2e005f
SH
361 fprintf(stderr,
362 "Error: \"root\" is duplicate parent ID\n");
120f556d
JHS
363 return -1;
364 }
365 req.t.tcm_parent = TC_H_ROOT;
366 } else if (strcmp(*argv, "ingress") == 0) {
367 if (req.t.tcm_parent) {
ec2e005f
SH
368 fprintf(stderr,
369 "Error: \"ingress\" is duplicate parent ID\n");
120f556d
JHS
370 return -1;
371 }
372 req.t.tcm_parent = TC_H_MAKE(TC_H_CLSACT,
373 TC_H_MIN_INGRESS);
374 } else if (strcmp(*argv, "egress") == 0) {
375 if (req.t.tcm_parent) {
ec2e005f
SH
376 fprintf(stderr,
377 "Error: \"egress\" is duplicate parent ID\n");
120f556d
JHS
378 return -1;
379 }
380 req.t.tcm_parent = TC_H_MAKE(TC_H_CLSACT,
381 TC_H_MIN_EGRESS);
382 } else if (strcmp(*argv, "parent") == 0) {
383
384 NEXT_ARG();
385 if (req.t.tcm_parent)
386 duparg("parent", *argv);
387 if (get_tc_classid(&parent_handle, *argv))
388 invarg("Invalid parent ID", *argv);
389 req.t.tcm_parent = parent_handle;
390 } else if (strcmp(*argv, "handle") == 0) {
391 NEXT_ARG();
392 if (fhandle)
393 duparg("handle", *argv);
394 fhandle = *argv;
395 } else if (matches(*argv, "preference") == 0 ||
396 matches(*argv, "priority") == 0) {
397 NEXT_ARG();
398 if (prio)
399 duparg("priority", *argv);
400 if (get_u32(&prio, *argv, 0) || prio > 0xFFFF)
401 invarg("invalid priority value", *argv);
402 } else if (matches(*argv, "protocol") == 0) {
403 __u16 id;
404
405 NEXT_ARG();
406 if (protocol_set)
407 duparg("protocol", *argv);
408 if (ll_proto_a2n(&id, *argv))
409 invarg("invalid protocol", *argv);
410 protocol = id;
411 protocol_set = 1;
732f0346
JP
412 } else if (matches(*argv, "chain") == 0) {
413 NEXT_ARG();
414 if (chain_index_set)
415 duparg("chain", *argv);
416 if (get_u32(&chain_index, *argv, 0))
417 invarg("invalid chain index value", *argv);
418 chain_index_set = 1;
120f556d
JHS
419 } else if (matches(*argv, "help") == 0) {
420 usage();
421 return 0;
422 } else {
75716932
PS
423 if (!**argv)
424 invarg("invalid filter name", *argv);
425
120f556d
JHS
426 strncpy(k, *argv, sizeof(k)-1);
427
428 q = get_filter_kind(k);
429 argc--; argv++;
430 break;
431 }
432
433 argc--; argv++;
434 }
435
436 if (!protocol_set) {
437 fprintf(stderr, "Must specify filter protocol\n");
438 return -1;
439 }
440
441 if (!prio) {
442 fprintf(stderr, "Must specify filter priority\n");
443 return -1;
444 }
445
446 req.t.tcm_info = TC_H_MAKE(prio<<16, protocol);
447
732f0346
JP
448 if (chain_index_set)
449 addattr32(&req.n, sizeof(req), TCA_CHAIN, chain_index);
450
120f556d
JHS
451 if (req.t.tcm_parent == TC_H_UNSPEC) {
452 fprintf(stderr, "Must specify filter parent\n");
453 return -1;
454 }
455
456 if (k[0])
457 addattr_l(&req.n, sizeof(req), TCA_KIND, k, strlen(k)+1);
458 else {
459 fprintf(stderr, "Must specify filter type\n");
460 return -1;
461 }
462
01ea76b1
JK
463 if (d[0]) {
464 ll_init_map(&rth);
465
466 req.t.tcm_ifindex = ll_name_to_index(d);
467 if (req.t.tcm_ifindex == 0) {
468 fprintf(stderr, "Cannot find device \"%s\"\n", d);
469 return 1;
470 }
471 filter_ifindex = req.t.tcm_ifindex;
472 } else {
473 fprintf(stderr, "Must specify netdevice \"dev\"\n");
474 return -1;
475 }
476
120f556d
JHS
477 if (q->parse_fopt(q, fhandle, argc, argv, &req.n))
478 return 1;
479
120f556d
JHS
480 if (!fhandle) {
481 fprintf(stderr, "Must specify filter \"handle\"\n");
482 return -1;
483 }
484
485 if (argc) {
486 if (matches(*argv, "help") == 0)
487 usage();
ec2e005f
SH
488 fprintf(stderr,
489 "Garbage instead of arguments \"%s ...\". Try \"tc filter help\".\n",
120f556d
JHS
490 *argv);
491 return -1;
492 }
493
86bf43c7 494 if (rtnl_talk(&rth, &req.n, &answer) < 0) {
120f556d
JHS
495 fprintf(stderr, "We have an error talking to the kernel\n");
496 return 2;
497 }
498
249284ff 499 new_json_obj(json);
86bf43c7 500 print_filter(NULL, answer, (void *)stdout);
249284ff 501 delete_json_obj();
120f556d 502
86bf43c7 503 free(answer);
120f556d
JHS
504 return 0;
505}
506
d1f28cf1 507static int tc_filter_list(int argc, char **argv)
aba5acdf 508{
732f0346
JP
509 struct {
510 struct nlmsghdr n;
511 struct tcmsg t;
512 char buf[MAX_MSG];
513 } req = {
514 .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg)),
515 .n.nlmsg_type = RTM_GETTFILTER,
516 .t.tcm_parent = TC_H_UNSPEC,
517 .t.tcm_family = AF_UNSPEC,
518 };
b317557f 519 char d[IFNAMSIZ] = {};
aba5acdf
SH
520 __u32 prio = 0;
521 __u32 protocol = 0;
732f0346 522 __u32 chain_index;
aba5acdf
SH
523 char *fhandle = NULL;
524
aba5acdf
SH
525 while (argc > 0) {
526 if (strcmp(*argv, "dev") == 0) {
527 NEXT_ARG();
528 if (d[0])
529 duparg("dev", *argv);
530 strncpy(d, *argv, sizeof(d)-1);
531 } else if (strcmp(*argv, "root") == 0) {
732f0346 532 if (req.t.tcm_parent) {
ec2e005f
SH
533 fprintf(stderr,
534 "Error: \"root\" is duplicate parent ID\n");
024481bb 535 return -1;
aba5acdf 536 }
732f0346 537 filter_parent = req.t.tcm_parent = TC_H_ROOT;
8f9afdd5 538 } else if (strcmp(*argv, "ingress") == 0) {
732f0346 539 if (req.t.tcm_parent) {
ec2e005f
SH
540 fprintf(stderr,
541 "Error: \"ingress\" is duplicate parent ID\n");
8f9afdd5
DB
542 return -1;
543 }
544 filter_parent = TC_H_MAKE(TC_H_CLSACT,
545 TC_H_MIN_INGRESS);
732f0346 546 req.t.tcm_parent = filter_parent;
8f9afdd5 547 } else if (strcmp(*argv, "egress") == 0) {
732f0346 548 if (req.t.tcm_parent) {
ec2e005f
SH
549 fprintf(stderr,
550 "Error: \"egress\" is duplicate parent ID\n");
8f9afdd5
DB
551 return -1;
552 }
553 filter_parent = TC_H_MAKE(TC_H_CLSACT,
554 TC_H_MIN_EGRESS);
732f0346 555 req.t.tcm_parent = filter_parent;
aba5acdf
SH
556 } else if (strcmp(*argv, "parent") == 0) {
557 __u32 handle;
32a121cb 558
aba5acdf 559 NEXT_ARG();
732f0346 560 if (req.t.tcm_parent)
aba5acdf
SH
561 duparg("parent", *argv);
562 if (get_tc_classid(&handle, *argv))
f1675d61 563 invarg("invalid parent ID", *argv);
732f0346 564 filter_parent = req.t.tcm_parent = handle;
aba5acdf
SH
565 } else if (strcmp(*argv, "handle") == 0) {
566 NEXT_ARG();
567 if (fhandle)
568 duparg("handle", *argv);
569 fhandle = *argv;
570 } else if (matches(*argv, "preference") == 0 ||
571 matches(*argv, "priority") == 0) {
572 NEXT_ARG();
573 if (prio)
574 duparg("priority", *argv);
575 if (get_u32(&prio, *argv, 0))
f1675d61 576 invarg("invalid preference", *argv);
aba5acdf
SH
577 filter_prio = prio;
578 } else if (matches(*argv, "protocol") == 0) {
579 __u16 res;
32a121cb 580
aba5acdf
SH
581 NEXT_ARG();
582 if (protocol)
583 duparg("protocol", *argv);
584 if (ll_proto_a2n(&res, *argv))
f1675d61 585 invarg("invalid protocol", *argv);
aba5acdf
SH
586 protocol = res;
587 filter_protocol = protocol;
732f0346
JP
588 } else if (matches(*argv, "chain") == 0) {
589 NEXT_ARG();
590 if (filter_chain_index_set)
591 duparg("chain", *argv);
592 if (get_u32(&chain_index, *argv, 0))
593 invarg("invalid chain index value", *argv);
594 filter_chain_index_set = 1;
595 filter_chain_index = chain_index;
aba5acdf
SH
596 } else if (matches(*argv, "help") == 0) {
597 usage();
598 } else {
ec2e005f
SH
599 fprintf(stderr,
600 " What is \"%s\"? Try \"tc filter help\"\n",
601 *argv);
024481bb 602 return -1;
aba5acdf
SH
603 }
604
605 argc--; argv++;
606 }
607
732f0346 608 req.t.tcm_info = TC_H_MAKE(prio<<16, protocol);
aba5acdf 609
3d0b7439 610 ll_init_map(&rth);
aba5acdf
SH
611
612 if (d[0]) {
732f0346
JP
613 req.t.tcm_ifindex = ll_name_to_index(d);
614 if (req.t.tcm_ifindex == 0) {
aba5acdf 615 fprintf(stderr, "Cannot find device \"%s\"\n", d);
024481bb 616 return 1;
aba5acdf 617 }
732f0346 618 filter_ifindex = req.t.tcm_ifindex;
aba5acdf
SH
619 }
620
732f0346
JP
621 if (filter_chain_index_set)
622 addattr32(&req.n, sizeof(req), TCA_CHAIN, chain_index);
623
624 if (rtnl_dump_request_n(&rth, &req.n) < 0) {
aba5acdf 625 perror("Cannot send dump request");
024481bb 626 return 1;
aba5acdf
SH
627 }
628
249284ff 629 new_json_obj(json);
3d0b7439 630 if (rtnl_dump_filter(&rth, print_filter, stdout) < 0) {
aba5acdf 631 fprintf(stderr, "Dump terminated\n");
024481bb 632 return 1;
aba5acdf 633 }
249284ff 634 delete_json_obj();
aba5acdf 635
aba5acdf
SH
636 return 0;
637}
638
639int do_filter(int argc, char **argv)
640{
641 if (argc < 1)
642 return tc_filter_list(0, NULL);
643 if (matches(*argv, "add") == 0)
120f556d
JHS
644 return tc_filter_modify(RTM_NEWTFILTER, NLM_F_EXCL|NLM_F_CREATE,
645 argc-1, argv+1);
aba5acdf
SH
646 if (matches(*argv, "change") == 0)
647 return tc_filter_modify(RTM_NEWTFILTER, 0, argc-1, argv+1);
648 if (matches(*argv, "replace") == 0)
120f556d
JHS
649 return tc_filter_modify(RTM_NEWTFILTER, NLM_F_CREATE, argc-1,
650 argv+1);
aba5acdf
SH
651 if (matches(*argv, "delete") == 0)
652 return tc_filter_modify(RTM_DELTFILTER, 0, argc-1, argv+1);
aba5acdf
SH
653 if (matches(*argv, "get") == 0)
654 return tc_filter_get(RTM_GETTFILTER, 0, argc-1, argv+1);
aba5acdf
SH
655 if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
656 || matches(*argv, "lst") == 0)
657 return tc_filter_list(argc-1, argv+1);
e5d179d8 658 if (matches(*argv, "help") == 0) {
aba5acdf 659 usage();
e5d179d8 660 return 0;
32a121cb 661 }
120f556d
JHS
662 fprintf(stderr, "Command \"%s\" is unknown, try \"tc filter help\".\n",
663 *argv);
024481bb 664 return -1;
aba5acdf 665}