2 * m_pedit.c generic packet editor actions module
4 * This program is free software; you can distribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
9 * Authors: J Hadi Salim (hadi@cyberus.ca)
12 * 1) Big endian broken in some spots
13 * 2) A lot of this stuff was added on the fly; get a big double-double
14 * and clean it up at some point.
23 #include <sys/socket.h>
24 #include <netinet/in.h>
25 #include <arpa/inet.h>
32 static struct m_pedit_util
*pedit_list
;
38 fprintf(stderr
, "Usage: ... pedit munge <MUNGE>\n");
40 "Where: MUNGE := <RAW>|<LAYERED>\n"
41 "\t<RAW>:= <OFFSETC>[ATC]<CMD>\n "
42 "\t\tOFFSETC:= offset <offval> <u8|u16|u32>\n "
43 "\t\tATC:= at <atval> offmask <maskval> shift <shiftval>\n "
44 "\t\tNOTE: offval is byte offset, must be multiple of 4\n "
45 "\t\tNOTE: maskval is a 32 bit hex number\n "
46 "\t\tNOTE: shiftval is a is a shift value\n "
47 "\t\tCMD:= clear | invert | set <setval>| retain\n "
48 "\t<LAYERED>:= ip <ipdata> | ip6 <ip6data> \n "
49 " \t\t| udp <udpdata> | tcp <tcpdata> | icmp <icmpdata> \n"
50 "For Example usage look at the examples directory\n");
62 pedit_parse_nopopt (int *argc_p
, char ***argv_p
,struct tc_pedit_sel
*sel
,struct tc_pedit_key
*tkey
)
65 char **argv
= *argv_p
;
68 fprintf(stderr
, "Unknown action hence option \"%s\" is unparsable\n", *argv
);
77 *get_pedit_kind(char *str
)
82 struct m_pedit_util
*p
;
84 for (p
= pedit_list
; p
; p
= p
->next
) {
85 if (strcmp(p
->id
, str
) == 0)
89 snprintf(buf
, sizeof(buf
), "p_%s.so", str
);
90 dlh
= dlopen(buf
, RTLD_LAZY
);
94 dlh
= pBODY
= dlopen(NULL
, RTLD_LAZY
);
100 snprintf(buf
, sizeof(buf
), "p_pedit_%s", str
);
106 p
->next
= pedit_list
;
111 p
= malloc(sizeof(*p
));
113 memset(p
, 0, sizeof(*p
));
114 strncpy(p
->id
, str
, sizeof(p
->id
)-1);
115 p
->parse_peopt
= pedit_parse_nopopt
;
122 pack_key(struct tc_pedit_sel
*sel
,struct tc_pedit_key
*tkey
)
124 int hwm
= sel
->nkeys
;
130 fprintf(stderr
, "offsets MUST be in 32 bit boundaries\n");
134 sel
->keys
[hwm
].val
= tkey
->val
;
135 sel
->keys
[hwm
].mask
= tkey
->mask
;
136 sel
->keys
[hwm
].off
= tkey
->off
;
137 sel
->keys
[hwm
].at
= tkey
->at
;
138 sel
->keys
[hwm
].offmask
= tkey
->offmask
;
139 sel
->keys
[hwm
].shift
= tkey
->shift
;
146 pack_key32(__u32 retain
,struct tc_pedit_sel
*sel
,struct tc_pedit_key
*tkey
)
148 if (tkey
->off
> (tkey
->off
& ~3)) {
150 "pack_key32: 32 bit offsets must begin in 32bit boundaries\n");
154 tkey
->val
= htonl(tkey
->val
& retain
);
155 tkey
->mask
= htonl(tkey
->mask
| ~retain
);
156 /* jamal remove this - it is not necessary given the if check above */
158 return pack_key(sel
,tkey
);
162 pack_key16(__u32 retain
,struct tc_pedit_sel
*sel
,struct tc_pedit_key
*tkey
)
164 int ind
= 0, stride
= 0;
165 __u32 m
[4] = {0xFFFF0000,0xFF0000FF,0x0000FFFF};
175 if (tkey
->val
> 0xFFFF || tkey
->mask
> 0xFFFF) {
176 fprintf(stderr
, "pack_key16 bad value\n");
182 if (0 > ind
|| 2 < ind
) {
183 fprintf(stderr
, "pack_key16 bad index value %d\n",ind
);
188 tkey
->val
= htons(tkey
->val
);
190 tkey
->val
<<= stride
;
191 tkey
->mask
<<= stride
;
194 tkey
->mask
= retain
|m
[ind
];
199 printf("pack_key16: Final val %08x mask %08x \n",tkey
->val
,tkey
->mask
);
200 return pack_key(sel
,tkey
);
205 pack_key8(__u32 retain
,struct tc_pedit_sel
*sel
,struct tc_pedit_key
*tkey
)
207 int ind
= 0, stride
= 0;
208 __u32 m
[4] = {0xFFFFFF00,0xFFFF00FF,0xFF00FFFF,0x00FFFFFF};
218 if (tkey
->val
> 0xFF || tkey
->mask
> 0xFF) {
219 fprintf(stderr
, "pack_key8 bad value (val %x mask %x\n", tkey
->val
, tkey
->mask
);
225 tkey
->val
<<= stride
;
226 tkey
->mask
<<= stride
;
228 tkey
->mask
= retain
|m
[ind
];
232 printf("pack_key8: Final word off %d val %08x mask %08x \n",tkey
->off
, tkey
->val
,tkey
->mask
);
233 return pack_key(sel
,tkey
);
237 parse_val(int *argc_p
, char ***argv_p
, __u32
* val
, int type
)
240 char **argv
= *argv_p
;
246 return get_integer((int *) val
, *argv
, 0);
249 return get_u32(val
, *argv
, 0);
253 if (get_prefix_1(&addr
, *argv
, AF_INET
)) {
260 /* not implemented yet */
268 parse_cmd(int *argc_p
, char ***argv_p
, __u32 len
, int type
,__u32 retain
,struct tc_pedit_sel
*sel
,struct tc_pedit_key
*tkey
)
270 __u32 mask
= 0, val
= 0;
274 char **argv
= *argv_p
;
280 printf("parse_cmd argc %d %s offset %d length %d\n",argc
,*argv
,tkey
->off
,len
);
287 if (matches(*argv
, "invert") == 0) {
288 retain
= val
= mask
= o
;
289 } else if (matches(*argv
, "set") == 0) {
291 if (parse_val(&argc
, &argv
, &val
, type
))
293 } else if (matches(*argv
, "preserve") == 0) {
296 if (matches(*argv
, "clear") != 0)
302 if (argc
&& matches(*argv
, "retain") == 0) {
304 if (parse_val(&argc
, &argv
, &retain
, TU32
))
313 res
= pack_key8(retain
,sel
,tkey
);
318 res
= pack_key16(retain
,sel
,tkey
);
323 res
= pack_key32(retain
,sel
,tkey
);
330 printf("parse_cmd done argc %d %s offset %d length %d\n",argc
,*argv
,tkey
->off
,len
);
338 parse_offset(int *argc_p
, char ***argv_p
,struct tc_pedit_sel
*sel
,struct tc_pedit_key
*tkey
)
343 char **argv
= *argv_p
;
349 if (get_integer(&off
, *argv
, 0))
360 if (matches(*argv
, "u32") == 0) {
365 if (matches(*argv
, "u16") == 0) {
370 if (matches(*argv
, "u8") == 0) {
382 /* [at <someval> offmask <maskval> shift <shiftval>] */
383 if (matches(*argv
, "at") == 0) {
385 __u32 atv
=0,offmask
=0x0,shift
=0;
388 if (get_u32(&atv
, *argv
, 0))
394 if (get_u32(&offmask
, *argv
, 16))
396 tkey
->offmask
= offmask
;
400 if (get_u32(&shift
, *argv
, 0))
407 res
= parse_cmd(&argc
, &argv
, len
, TU32
,retain
,sel
,tkey
);
415 parse_munge(int *argc_p
, char ***argv_p
,struct tc_pedit_sel
*sel
)
417 struct tc_pedit_key tkey
;
419 char **argv
= *argv_p
;
425 memset(&tkey
, 0, sizeof(tkey
));
427 if (matches(*argv
, "offset") == 0) {
429 res
= parse_offset(&argc
, &argv
,sel
,&tkey
);
433 struct m_pedit_util
*p
= NULL
;
435 strncpy(k
, *argv
, sizeof (k
) - 1);
438 p
= get_pedit_kind(k
);
441 res
= p
->parse_peopt(&argc
, &argv
, sel
,&tkey
);
443 fprintf(stderr
,"bad pedit parsing\n");
461 parse_pedit(struct action_util
*a
, int *argc_p
, char ***argv_p
, int tca_id
, struct nlmsghdr
*n
)
464 struct tc_pedit_sel sel
;
465 struct tc_pedit_key keys
[MAX_OFFS
];
469 char **argv
= *argv_p
;
473 memset(&sel
, 0, sizeof(sel
));
477 fprintf(stderr
, "while pedit (%d:%s)\n",argc
, *argv
);
478 if (matches(*argv
, "pedit") == 0) {
482 } else if (matches(*argv
, "help") == 0) {
484 } else if (matches(*argv
, "munge") == 0) {
486 fprintf(stderr
, "Illegal pedit construct (%s) \n", *argv
);
491 if (parse_munge(&argc
, &argv
,&sel
.sel
)) {
492 fprintf(stderr
, "Illegal pedit construct (%s) \n", *argv
);
509 if (matches(*argv
, "reclassify") == 0) {
510 sel
.sel
.action
= TC_ACT_RECLASSIFY
;
512 } else if (matches(*argv
, "pipe") == 0) {
513 sel
.sel
.action
= TC_ACT_PIPE
;
515 } else if (matches(*argv
, "drop") == 0 ||
516 matches(*argv
, "shot") == 0) {
517 sel
.sel
.action
= TC_ACT_SHOT
;
519 } else if (matches(*argv
, "continue") == 0) {
520 sel
.sel
.action
= TC_ACT_UNSPEC
;
522 } else if (matches(*argv
, "pass") == 0) {
523 sel
.sel
.action
= TC_ACT_OK
;
529 if (matches(*argv
, "index") == 0) {
531 if (get_u32(&sel
.sel
.index
, *argv
, 10)) {
532 fprintf(stderr
, "Pedit: Illegal \"index\"\n");
541 tail
= NLMSG_TAIL(n
);
542 addattr_l(n
, MAX_MSG
, tca_id
, NULL
, 0);
543 addattr_l(n
, MAX_MSG
, TCA_PEDIT_PARMS
,&sel
, sizeof(sel
.sel
)+sel
.sel
.nkeys
*sizeof(struct tc_pedit_key
));
544 tail
->rta_len
= (void *) NLMSG_TAIL(n
) - (void *) tail
;
552 print_pedit(struct action_util
*au
,FILE * f
, struct rtattr
*arg
)
554 struct tc_pedit_sel
*sel
;
555 struct rtattr
*tb
[TCA_PEDIT_MAX
+ 1];
561 parse_rtattr_nested(tb
, TCA_PEDIT_MAX
, arg
);
563 if (tb
[TCA_PEDIT_PARMS
] == NULL
) {
564 fprintf(f
, "[NULL pedit parameters]");
567 sel
= RTA_DATA(tb
[TCA_PEDIT_PARMS
]);
569 fprintf(f
, " pedit action %s keys %d\n ", action_n2a(sel
->action
, b1
, sizeof (b1
)),sel
->nkeys
);
570 fprintf(f
, "\t index %d ref %d bind %d", sel
->index
,sel
->refcnt
, sel
->bindcnt
);
573 if (tb
[TCA_PEDIT_TM
]) {
574 struct tcf_t
*tm
= RTA_DATA(tb
[TCA_PEDIT_TM
]);
580 struct tc_pedit_key
*key
= sel
->keys
;
582 for (i
=0; i
<sel
->nkeys
; i
++, key
++) {
583 fprintf(f
, "\n\t key #%d",i
);
584 fprintf(f
, " at %d: val %08x mask %08x",
585 (unsigned int)key
->off
,
586 (unsigned int)ntohl(key
->val
),
587 (unsigned int)ntohl(key
->mask
));
590 fprintf(f
, "\npedit %x keys %d is not LEGIT", sel
->index
,sel
->nkeys
);
599 pedit_print_xstats(struct action_util
*au
, FILE *f
, struct rtattr
*xstats
)
604 struct action_util pedit_action_util
= {
606 .parse_aopt
= parse_pedit
,
607 .print_aopt
= print_pedit
,