2 * m_pedit.c generic packet editor actions module
4 * This program is free software; you can distribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
9 * Authors: J Hadi Salim (hadi@cyberus.ca)
12 * 1) Big endian broken in some spots
13 * 2) A lot of this stuff was added on the fly; get a big double-double
14 * and clean it up at some point.
23 #include <sys/socket.h>
24 #include <netinet/in.h>
25 #include <arpa/inet.h>
32 static struct m_pedit_util
*pedit_list
;
33 static int pedit_debug
;
35 static void explain(void)
37 fprintf(stderr
, "Usage: ... pedit munge <MUNGE> [CONTROL]\n");
39 "Where: MUNGE := <RAW>|<LAYERED>\n"
40 "\t<RAW>:= <OFFSETC>[ATC]<CMD>\n \t\tOFFSETC:= offset <offval> <u8|u16|u32>\n"
41 "\t\tATC:= at <atval> offmask <maskval> shift <shiftval>\n"
42 "\t\tNOTE: offval is byte offset, must be multiple of 4\n"
43 "\t\tNOTE: maskval is a 32 bit hex number\n \t\tNOTE: shiftval is a is a shift value\n"
44 "\t\tCMD:= clear | invert | set <setval>| retain\n"
45 "\t<LAYERED>:= ip <ipdata> | ip6 <ip6data>\n"
46 " \t\t| udp <udpdata> | tcp <tcpdata> | icmp <icmpdata>\n"
47 "\tCONTROL:= reclassify | pipe | drop | continue | pass\n"
48 "For Example usage look at the examples directory\n");
52 static void usage(void)
58 static int pedit_parse_nopopt(int *argc_p
, char ***argv_p
,
59 struct tc_pedit_sel
*sel
,
60 struct tc_pedit_key
*tkey
)
63 char **argv
= *argv_p
;
67 "Unknown action hence option \"%s\" is unparsable\n",
76 static struct m_pedit_util
*get_pedit_kind(const char *str
)
81 struct m_pedit_util
*p
;
83 for (p
= pedit_list
; p
; p
= p
->next
) {
84 if (strcmp(p
->id
, str
) == 0)
88 snprintf(buf
, sizeof(buf
), "p_%s.so", str
);
89 dlh
= dlopen(buf
, RTLD_LAZY
);
93 dlh
= pBODY
= dlopen(NULL
, RTLD_LAZY
);
99 snprintf(buf
, sizeof(buf
), "p_pedit_%s", str
);
105 p
->next
= pedit_list
;
110 p
= calloc(1, sizeof(*p
));
112 strncpy(p
->id
, str
, sizeof(p
->id
) - 1);
113 p
->parse_peopt
= pedit_parse_nopopt
;
119 int pack_key(struct tc_pedit_sel
*sel
, struct tc_pedit_key
*tkey
)
121 int hwm
= sel
->nkeys
;
127 fprintf(stderr
, "offsets MUST be in 32 bit boundaries\n");
131 sel
->keys
[hwm
].val
= tkey
->val
;
132 sel
->keys
[hwm
].mask
= tkey
->mask
;
133 sel
->keys
[hwm
].off
= tkey
->off
;
134 sel
->keys
[hwm
].at
= tkey
->at
;
135 sel
->keys
[hwm
].offmask
= tkey
->offmask
;
136 sel
->keys
[hwm
].shift
= tkey
->shift
;
141 int pack_key32(__u32 retain
, struct tc_pedit_sel
*sel
,
142 struct tc_pedit_key
*tkey
)
144 if (tkey
->off
> (tkey
->off
& ~3)) {
146 "pack_key32: 32 bit offsets must begin in 32bit boundaries\n");
150 tkey
->val
= htonl(tkey
->val
& retain
);
151 tkey
->mask
= htonl(tkey
->mask
| ~retain
);
152 return pack_key(sel
, tkey
);
155 int pack_key16(__u32 retain
, struct tc_pedit_sel
*sel
,
156 struct tc_pedit_key
*tkey
)
159 __u32 m
[4] = { 0x0000FFFF, 0xFF0000FF, 0xFFFF0000 };
161 if (tkey
->val
> 0xFFFF || tkey
->mask
> 0xFFFF) {
162 fprintf(stderr
, "pack_key16 bad value\n");
169 fprintf(stderr
, "pack_key16 bad index value %d\n", ind
);
173 stride
= 8 * (2 - ind
);
174 tkey
->val
= htonl((tkey
->val
& retain
) << stride
);
175 tkey
->mask
= htonl(((tkey
->mask
| ~retain
) << stride
) | m
[ind
]);
180 printf("pack_key16: Final val %08x mask %08x\n",
181 tkey
->val
, tkey
->mask
);
182 return pack_key(sel
, tkey
);
186 int pack_key8(__u32 retain
, struct tc_pedit_sel
*sel
, struct tc_pedit_key
*tkey
)
189 __u32 m
[4] = { 0x00FFFFFF, 0xFF00FFFF, 0xFFFF00FF, 0xFFFFFF00 };
191 if (tkey
->val
> 0xFF || tkey
->mask
> 0xFF) {
192 fprintf(stderr
, "pack_key8 bad value (val %x mask %x\n",
193 tkey
->val
, tkey
->mask
);
199 stride
= 8 * (3 - ind
);
200 tkey
->val
= htonl((tkey
->val
& retain
) << stride
);
201 tkey
->mask
= htonl(((tkey
->mask
| ~retain
) << stride
) | m
[ind
]);
206 printf("pack_key8: Final word off %d val %08x mask %08x\n",
207 tkey
->off
, tkey
->val
, tkey
->mask
);
208 return pack_key(sel
, tkey
);
211 int parse_val(int *argc_p
, char ***argv_p
, __u32
*val
, int type
)
214 char **argv
= *argv_p
;
220 return get_integer((int *)val
, *argv
, 0);
223 return get_u32(val
, *argv
, 0);
228 if (get_prefix_1(&addr
, *argv
, AF_INET
))
236 return -1; /* not implemented yet */
241 int parse_cmd(int *argc_p
, char ***argv_p
, __u32 len
, int type
, __u32 retain
,
242 struct tc_pedit_sel
*sel
, struct tc_pedit_key
*tkey
)
244 __u32 mask
= 0, val
= 0;
248 char **argv
= *argv_p
;
254 printf("parse_cmd argc %d %s offset %d length %d\n",
255 argc
, *argv
, tkey
->off
, len
);
262 if (matches(*argv
, "invert") == 0) {
264 } else if (matches(*argv
, "set") == 0) {
266 if (parse_val(&argc
, &argv
, &val
, type
))
268 } else if (matches(*argv
, "preserve") == 0) {
271 if (matches(*argv
, "clear") != 0)
278 if (argc
&& matches(*argv
, "retain") == 0) {
280 if (parse_val(&argc
, &argv
, &retain
, TU32
))
290 tkey
->val
= ntohl(tkey
->val
);
293 res
= pack_key8(retain
, sel
, tkey
);
297 res
= pack_key16(retain
, sel
, tkey
);
301 res
= pack_key32(retain
, sel
, tkey
);
308 printf("parse_cmd done argc %d %s offset %d length %d\n",
309 argc
, *argv
, tkey
->off
, len
);
316 int parse_offset(int *argc_p
, char ***argv_p
, struct tc_pedit_sel
*sel
,
317 struct tc_pedit_key
*tkey
)
322 char **argv
= *argv_p
;
328 if (get_integer(&off
, *argv
, 0))
338 if (matches(*argv
, "u32") == 0) {
343 if (matches(*argv
, "u16") == 0) {
348 if (matches(*argv
, "u8") == 0) {
360 /* [at <someval> offmask <maskval> shift <shiftval>] */
361 if (matches(*argv
, "at") == 0) {
363 __u32 atv
= 0, offmask
= 0x0, shift
= 0;
366 if (get_u32(&atv
, *argv
, 0))
372 if (get_u32(&offmask
, *argv
, 16))
374 tkey
->offmask
= offmask
;
378 if (get_u32(&shift
, *argv
, 0))
385 res
= parse_cmd(&argc
, &argv
, len
, TU32
, retain
, sel
, tkey
);
392 static int parse_munge(int *argc_p
, char ***argv_p
, struct tc_pedit_sel
*sel
)
394 struct tc_pedit_key tkey
= {};
396 char **argv
= *argv_p
;
402 if (matches(*argv
, "offset") == 0) {
404 res
= parse_offset(&argc
, &argv
, sel
, &tkey
);
408 struct m_pedit_util
*p
= NULL
;
410 strncpy(k
, *argv
, sizeof(k
) - 1);
413 p
= get_pedit_kind(k
);
417 res
= p
->parse_peopt(&argc
, &argv
, sel
, &tkey
);
419 fprintf(stderr
, "bad pedit parsing\n");
436 int parse_pedit(struct action_util
*a
, int *argc_p
, char ***argv_p
, int tca_id
,
440 struct tc_pedit_sel sel
;
441 struct tc_pedit_key keys
[MAX_OFFS
];
445 char **argv
= *argv_p
;
451 fprintf(stderr
, "while pedit (%d:%s)\n", argc
, *argv
);
452 if (matches(*argv
, "pedit") == 0) {
456 } else if (matches(*argv
, "help") == 0) {
458 } else if (matches(*argv
, "munge") == 0) {
460 fprintf(stderr
, "Bad pedit construct (%s)\n",
466 if (parse_munge(&argc
, &argv
, &sel
.sel
)) {
467 fprintf(stderr
, "Bad pedit construct (%s)\n",
484 if (argc
&& !action_a2n(*argv
, &sel
.sel
.action
, false))
488 if (matches(*argv
, "index") == 0) {
490 if (get_u32(&sel
.sel
.index
, *argv
, 10)) {
491 fprintf(stderr
, "Pedit: Illegal \"index\"\n");
500 tail
= NLMSG_TAIL(n
);
501 addattr_l(n
, MAX_MSG
, tca_id
, NULL
, 0);
502 addattr_l(n
, MAX_MSG
, TCA_PEDIT_PARMS
, &sel
,
504 sel
.sel
.nkeys
* sizeof(struct tc_pedit_key
));
505 tail
->rta_len
= (void *)NLMSG_TAIL(n
) - (void *)tail
;
512 int print_pedit(struct action_util
*au
, FILE *f
, struct rtattr
*arg
)
514 struct tc_pedit_sel
*sel
;
515 struct rtattr
*tb
[TCA_PEDIT_MAX
+ 1];
520 parse_rtattr_nested(tb
, TCA_PEDIT_MAX
, arg
);
522 if (tb
[TCA_PEDIT_PARMS
] == NULL
) {
523 fprintf(f
, "[NULL pedit parameters]");
526 sel
= RTA_DATA(tb
[TCA_PEDIT_PARMS
]);
528 fprintf(f
, " pedit action %s keys %d\n ",
529 action_n2a(sel
->action
), sel
->nkeys
);
530 fprintf(f
, "\t index %u ref %d bind %d", sel
->index
, sel
->refcnt
,
534 if (tb
[TCA_PEDIT_TM
]) {
535 struct tcf_t
*tm
= RTA_DATA(tb
[TCA_PEDIT_TM
]);
542 struct tc_pedit_key
*key
= sel
->keys
;
544 for (i
= 0; i
< sel
->nkeys
; i
++, key
++) {
545 fprintf(f
, "\n\t key #%d", i
);
546 fprintf(f
, " at %d: val %08x mask %08x",
547 (unsigned int)key
->off
,
548 (unsigned int)ntohl(key
->val
),
549 (unsigned int)ntohl(key
->mask
));
552 fprintf(f
, "\npedit %x keys %d is not LEGIT", sel
->index
,
560 int pedit_print_xstats(struct action_util
*au
, FILE *f
, struct rtattr
*xstats
)
565 struct action_util pedit_action_util
= {
567 .parse_aopt
= parse_pedit
,
568 .print_aopt
= print_pedit
,