2 * m_pedit.c generic packet editor actions module
4 * This program is free software; you can distribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
9 * Authors: J Hadi Salim (hadi@cyberus.ca)
12 * 1) Big endian broken in some spots
13 * 2) A lot of this stuff was added on the fly; get a big double-double
14 * and clean it up at some point.
23 #include <sys/socket.h>
24 #include <netinet/in.h>
25 #include <arpa/inet.h>
32 static struct m_pedit_util *pedit_list;
38 fprintf(stderr, "Usage: ... pedit munge <MUNGE>\n");
40 "Where: MUNGE := <RAW>|<LAYERED>\n"
41 "\t<RAW>:= <OFFSETC>[ATC]<CMD>\n "
42 "\t\tOFFSETC:= offset <offval> <u8|u16|u32>\n "
43 "\t\tATC:= at <atval> offmask <maskval> shift <shiftval>\n "
44 "\t\tNOTE: offval is byte offset, must be multiple of 4\n "
45 "\t\tNOTE: maskval is a 32 bit hex number\n "
46 "\t\tNOTE: shiftval is a is a shift value\n "
47 "\t\tCMD:= clear | invert | set <setval>| retain\n "
48 "\t<LAYERED>:= ip <ipdata> | ip6 <ip6data> \n "
49 " \t\t| udp <udpdata> | tcp <tcpdata> | icmp <icmpdata> \n"
50 "For Example usage look at the examples directory\n");
62 pedit_parse_nopopt (int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
65 char **argv = *argv_p;
68 fprintf(stderr, "Unknown action hence option \"%s\" is unparsable\n", *argv);
77 *get_pedit_kind(char *str)
82 struct m_pedit_util *p;
84 for (p = pedit_list; p; p = p->next) {
85 if (strcmp(p->id, str) == 0)
89 snprintf(buf, sizeof(buf), "p_%s.so", str);
90 dlh = dlopen(buf, RTLD_LAZY);
94 dlh = pBODY = dlopen(NULL, RTLD_LAZY);
100 snprintf(buf, sizeof(buf), "p_pedit_%s", str);
106 p->next = pedit_list;
111 p = malloc(sizeof(*p));
113 memset(p, 0, sizeof(*p));
114 strncpy(p->id, str, sizeof(p->id)-1);
115 p->parse_peopt = pedit_parse_nopopt;
122 pack_key(struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
124 int hwm = sel->nkeys;
130 fprintf(stderr, "offsets MUST be in 32 bit boundaries\n");
134 sel->keys[hwm].val = tkey->val;
135 sel->keys[hwm].mask = tkey->mask;
136 sel->keys[hwm].off = tkey->off;
137 sel->keys[hwm].at = tkey->at;
138 sel->keys[hwm].offmask = tkey->offmask;
139 sel->keys[hwm].shift = tkey->shift;
146 pack_key32(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
148 if (tkey->off > (tkey->off & ~3)) {
150 "pack_key32: 32 bit offsets must begin in 32bit boundaries\n");
154 tkey->val = htonl(tkey->val & retain);
155 tkey->mask = htonl(tkey->mask | ~retain);
156 /* jamal remove this - it is not necessary given the if check above */
158 return pack_key(sel,tkey);
162 pack_key16(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
164 int ind = 0, stride = 0;
165 __u32 m[4] = {0xFFFF0000,0xFF0000FF,0x0000FFFF};
175 if (tkey->val > 0xFFFF || tkey->mask > 0xFFFF) {
176 fprintf(stderr, "pack_key16 bad value\n");
182 if (0 > ind || 2 < ind) {
183 fprintf(stderr, "pack_key16 bad index value %d\n",ind);
188 tkey->val = htons(tkey->val);
190 tkey->val <<= stride;
191 tkey->mask <<= stride;
194 tkey->mask = retain|m[ind];
199 printf("pack_key16: Final val %08x mask %08x \n",tkey->val,tkey->mask);
200 return pack_key(sel,tkey);
205 pack_key8(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
207 int ind = 0, stride = 0;
208 __u32 m[4] = {0xFFFFFF00,0xFFFF00FF,0xFF00FFFF,0x00FFFFFF};
218 if (tkey->val > 0xFF || tkey->mask > 0xFF) {
219 fprintf(stderr, "pack_key8 bad value (val %x mask %x\n", tkey->val, tkey->mask);
225 tkey->val <<= stride;
226 tkey->mask <<= stride;
228 tkey->mask = retain|m[ind];
232 printf("pack_key8: Final word off %d val %08x mask %08x \n",tkey->off , tkey->val,tkey->mask);
233 return pack_key(sel,tkey);
237 parse_val(int *argc_p, char ***argv_p, __u32 * val, int type)
240 char **argv = *argv_p;
246 return get_integer((int *) val, *argv, 0);
249 return get_u32(val, *argv, 0);
253 if (get_prefix_1(&addr, *argv, AF_INET)) {
260 /* not implemented yet */
268 parse_cmd(int *argc_p, char ***argv_p, __u32 len, int type,__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
270 __u32 mask = 0, val = 0;
274 char **argv = *argv_p;
280 printf("parse_cmd argc %d %s offset %d length %d\n",argc,*argv,tkey->off,len);
287 if (matches(*argv, "invert") == 0) {
288 retain = val = mask = o;
289 } else if (matches(*argv, "set") == 0) {
291 if (parse_val(&argc, &argv, &val, type))
293 } else if (matches(*argv, "preserve") == 0) {
296 if (matches(*argv, "clear") != 0)
302 if (argc && matches(*argv, "retain") == 0) {
304 if (parse_val(&argc, &argv, &retain, TU32))
313 res = pack_key8(retain,sel,tkey);
318 res = pack_key16(retain,sel,tkey);
323 res = pack_key32(retain,sel,tkey);
330 printf("parse_cmd done argc %d %s offset %d length %d\n",argc,*argv,tkey->off,len);
338 parse_offset(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey)
343 char **argv = *argv_p;
349 if (get_integer(&off, *argv, 0))
360 if (matches(*argv, "u32") == 0) {
365 if (matches(*argv, "u16") == 0) {
370 if (matches(*argv, "u8") == 0) {
382 /* [at <someval> offmask <maskval> shift <shiftval>] */
383 if (matches(*argv, "at") == 0) {
385 __u32 atv=0,offmask=0x0,shift=0;
388 if (get_u32(&atv, *argv, 0))
394 if (get_u32(&offmask, *argv, 16))
396 tkey->offmask = offmask;
400 if (get_u32(&shift, *argv, 0))
407 res = parse_cmd(&argc, &argv, len, TU32,retain,sel,tkey);
415 parse_munge(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel)
417 struct tc_pedit_key tkey;
419 char **argv = *argv_p;
425 memset(&tkey, 0, sizeof(tkey));
427 if (matches(*argv, "offset") == 0) {
429 res = parse_offset(&argc, &argv,sel,&tkey);
433 struct m_pedit_util *p = NULL;
435 strncpy(k, *argv, sizeof (k) - 1);
438 p = get_pedit_kind(k);
441 res = p->parse_peopt(&argc, &argv, sel,&tkey);
443 fprintf(stderr,"bad pedit parsing\n");
461 parse_pedit(struct action_util *a, int *argc_p, char ***argv_p, int tca_id, struct nlmsghdr *n)
464 struct tc_pedit_sel sel;
465 struct tc_pedit_key keys[MAX_OFFS];
469 char **argv = *argv_p;
473 memset(&sel, 0, sizeof(sel));
477 fprintf(stderr, "while pedit (%d:%s)\n",argc, *argv);
478 if (matches(*argv, "pedit") == 0) {
482 } else if (matches(*argv, "help") == 0) {
484 } else if (matches(*argv, "munge") == 0) {
486 fprintf(stderr, "Illegal pedit construct (%s) \n", *argv);
491 if (parse_munge(&argc, &argv,&sel.sel)) {
492 fprintf(stderr, "Illegal pedit construct (%s) \n", *argv);
509 if (matches(*argv, "reclassify") == 0) {
510 sel.sel.action = TC_ACT_RECLASSIFY;
512 } else if (matches(*argv, "pipe") == 0) {
513 sel.sel.action = TC_ACT_PIPE;
515 } else if (matches(*argv, "drop") == 0 ||
516 matches(*argv, "shot") == 0) {
517 sel.sel.action = TC_ACT_SHOT;
519 } else if (matches(*argv, "continue") == 0) {
520 sel.sel.action = TC_ACT_UNSPEC;
522 } else if (matches(*argv, "pass") == 0) {
523 sel.sel.action = TC_ACT_OK;
529 if (matches(*argv, "index") == 0) {
531 if (get_u32(&sel.sel.index, *argv, 10)) {
532 fprintf(stderr, "Pedit: Illegal \"index\"\n");
541 tail = NLMSG_TAIL(n);
542 addattr_l(n, MAX_MSG, tca_id, NULL, 0);
543 addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS,&sel, sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_pedit_key));
544 tail->rta_len = (void *) NLMSG_TAIL(n) - (void *) tail;
552 print_pedit(struct action_util *au,FILE * f, struct rtattr *arg)
554 struct tc_pedit_sel *sel;
555 struct rtattr *tb[TCA_PEDIT_MAX + 1];
561 parse_rtattr_nested(tb, TCA_PEDIT_MAX, arg);
563 if (tb[TCA_PEDIT_PARMS] == NULL) {
564 fprintf(f, "[NULL pedit parameters]");
567 sel = RTA_DATA(tb[TCA_PEDIT_PARMS]);
569 fprintf(f, " pedit action %s keys %d\n ", action_n2a(sel->action, b1, sizeof (b1)),sel->nkeys);
570 fprintf(f, "\t index %d ref %d bind %d", sel->index,sel->refcnt, sel->bindcnt);
573 if (tb[TCA_PEDIT_TM]) {
574 struct tcf_t *tm = RTA_DATA(tb[TCA_PEDIT_TM]);
580 struct tc_pedit_key *key = sel->keys;
582 for (i=0; i<sel->nkeys; i++, key++) {
583 fprintf(f, "\n\t key #%d",i);
584 fprintf(f, " at %d: val %08x mask %08x",
585 (unsigned int)key->off,
586 (unsigned int)ntohl(key->val),
587 (unsigned int)ntohl(key->mask));
590 fprintf(f, "\npedit %x keys %d is not LEGIT", sel->index,sel->nkeys);
599 pedit_print_xstats(struct action_util *au, FILE *f, struct rtattr *xstats)
604 struct action_util pedit_action_util = {
606 .parse_aopt = parse_pedit,
607 .print_aopt = print_pedit,