aboutsummaryrefslogtreecommitdiffstats
path: root/tc/f_flower.c
diff options
context:
space:
mode:
authorJiri Pirko <jiri@resnulli.us>2015-05-15 13:34:04 +0200
committerStephen Hemminger <shemming@brocade.com>2015-05-21 15:22:49 -0700
commit30eb304ecd1dd7e452847fabea779de0dbe3f1a5 (patch)
treecb9c6b57cf404ab17e4c126e1a32bc9d28e1a294 /tc/f_flower.c
parent1a4dda7103bcd5efcca72ffe03eef43318897dae (diff)
downloadplatform_external_iproute2-30eb304ecd1dd7e452847fabea779de0dbe3f1a5.tar.gz
platform_external_iproute2-30eb304ecd1dd7e452847fabea779de0dbe3f1a5.tar.bz2
platform_external_iproute2-30eb304ecd1dd7e452847fabea779de0dbe3f1a5.zip
tc: add support for Flower classifier
Signed-off-by: Jiri Pirko <jiri@resnulli.us>
Diffstat (limited to 'tc/f_flower.c')
-rw-r--r--tc/f_flower.c540
1 files changed, 540 insertions, 0 deletions
diff --git a/tc/f_flower.c b/tc/f_flower.c
new file mode 100644
index 00000000..9a5ea062
--- /dev/null
+++ b/tc/f_flower.c
@@ -0,0 +1,540 @@
+/*
+ * f_flower.c Flower Classifier
+ *
+ * This program is free software; you can distribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version
+ * 2 of the License, or (at your option) any later version.
+ *
+ * Authors: Jiri Pirko <jiri@resnulli.us>
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <unistd.h>
+#include <syslog.h>
+#include <string.h>
+#include <net/if.h>
+#include <linux/if_ether.h>
+#include <linux/ip.h>
+
+#include "utils.h"
+#include "tc_util.h"
+#include "rt_names.h"
+
+static void explain(void)
+{
+ fprintf(stderr, "Usage: ... flower [ MATCH-LIST ]\n");
+ fprintf(stderr, " [ action ACTION-SPEC ] [ classid CLASSID ]\n");
+ fprintf(stderr, "\n");
+ fprintf(stderr, "Where: MATCH-LIST := [ MATCH-LIST ] MATCH\n");
+ fprintf(stderr, " MATCH := [ indev DEV-NAME | \n");
+ fprintf(stderr, " dst_mac MAC-ADDR | \n");
+ fprintf(stderr, " src_mac MAC-ADDR | \n");
+ fprintf(stderr, " eth_type [ipv4 | ipv6 | ETH-TYPE ] | \n");
+ fprintf(stderr, " ip_proto [tcp | udp | IP-PROTO ] | \n");
+ fprintf(stderr, " dst_ip [ IPV4-ADDR | IPV6-ADDR ] | \n");
+ fprintf(stderr, " src_ip [ IPV4-ADDR | IPV6-ADDR ] | \n");
+ fprintf(stderr, " dst_port PORT-NUMBER | \n");
+ fprintf(stderr, " src_port PORT-NUMBER | \n");
+ fprintf(stderr, " FILTERID := X:Y:Z\n");
+ fprintf(stderr, " ACTION-SPEC := ... look at individual actions\n");
+ fprintf(stderr, "\n");
+ fprintf(stderr, "NOTE: CLASSID, ETH-TYPE, IP-PROTO are parsed as hexadecimal input.\n");
+ fprintf(stderr, "NOTE: There can be only used one mask per one prio. If user needs\n");
+ fprintf(stderr, " to specify different mask, he has to use different prio.\n");
+}
+
+static int flower_parse_eth_addr(char *str, int addr_type, int mask_type,
+ struct nlmsghdr *n)
+{
+ int ret;
+ char addr[ETH_ALEN];
+
+ ret = ll_addr_a2n(addr, sizeof(addr), str);
+ if (ret < 0)
+ return -1;
+ addattr_l(n, MAX_MSG, addr_type, addr, sizeof(addr));
+ memset(addr, 0xff, ETH_ALEN);
+ addattr_l(n, MAX_MSG, mask_type, addr, sizeof(addr));
+ return 0;
+}
+
+static int flower_parse_eth_type(char *str, int type, __be16 *p_eth_type,
+ struct nlmsghdr *n)
+{
+ int ret;
+ __be16 eth_type;
+
+ if (matches(str, "ipv4") == 0) {
+ eth_type = htons(ETH_P_IP);
+ } else if (matches(str, "ipv6") == 0) {
+ eth_type = htons(ETH_P_IPV6);
+ } else {
+ __u16 tmp;
+
+ ret = get_u16(&tmp, str, 16);
+ if (ret)
+ return -1;
+ eth_type = htons(tmp);
+ }
+ addattr16(n, MAX_MSG, type, eth_type);
+ *p_eth_type = eth_type;
+ return 0;
+}
+
+static int flower_parse_ip_proto(char *str, __be16 eth_type, int type,
+ __u8 *p_ip_proto, struct nlmsghdr *n)
+{
+ int ret;
+ __u8 ip_proto;
+
+ if (eth_type != htons(ETH_P_IP) && eth_type != htons(ETH_P_IPV6)) {
+ fprintf(stderr, "Illegal \"eth_type\" for ip proto\n");
+ return -1;
+ }
+ if (matches(str, "tcp") == 0) {
+ ip_proto = IPPROTO_TCP;
+ } else if (matches(str, "udp") == 0) {
+ ip_proto = IPPROTO_UDP;
+ } else {
+ ret = get_u8(&ip_proto, str, 16);
+ if (ret)
+ return -1;
+ }
+ addattr8(n, MAX_MSG, type, ip_proto);
+ *p_ip_proto = ip_proto;
+ return 0;
+}
+
+static int flower_parse_ip_addr(char *str, __be16 eth_type,
+ int addr4_type, int mask4_type,
+ int addr6_type, int mask6_type,
+ struct nlmsghdr *n)
+{
+ int ret;
+ inet_prefix addr;
+ int family;
+ int bits;
+ int i;
+
+ if (eth_type == htons(ETH_P_IP)) {
+ family = AF_INET;
+ } else if (eth_type == htons(ETH_P_IPV6)) {
+ family = AF_INET6;
+ } else {
+ fprintf(stderr, "Illegal \"eth_type\" for ip address\n");
+ return -1;
+ }
+
+ ret = get_prefix(&addr, str, family);
+ if (ret)
+ return -1;
+
+ if (addr.family != family)
+ return -1;
+
+ addattr_l(n, MAX_MSG, addr.family == AF_INET ? addr4_type : addr6_type,
+ addr.data, addr.bytelen);
+
+ memset(addr.data, 0xff, addr.bytelen);
+ bits = addr.bitlen;
+ for (i = 0; i < addr.bytelen / 4; i++) {
+ if (!bits) {
+ addr.data[i] = 0;
+ } else if (bits / 32 >= 1) {
+ bits -= 32;
+ } else {
+ addr.data[i] <<= 32 - bits;
+ addr.data[i] = htonl(addr.data[i]);
+ bits = 0;
+ }
+ }
+
+ addattr_l(n, MAX_MSG, addr.family == AF_INET ? mask4_type : mask6_type,
+ addr.data, addr.bytelen);
+
+ return 0;
+}
+
+static int flower_parse_port(char *str, __u8 ip_port,
+ int tcp_type, int udp_type, struct nlmsghdr *n)
+{
+ int ret;
+ int type;
+ __be16 port;
+
+ if (ip_port == IPPROTO_TCP) {
+ type = tcp_type;
+ } else if (ip_port == IPPROTO_UDP) {
+ type = udp_type;
+ } else {
+ fprintf(stderr, "Illegal \"ip_proto\" for port\n");
+ return -1;
+ }
+
+ ret = get_u16(&port, str, 10);
+ if (ret)
+ return -1;
+
+ addattr16(n, MAX_MSG, type, htons(port));
+
+ return 0;
+}
+
+static int flower_parse_opt(struct filter_util *qu, char *handle,
+ int argc, char **argv, struct nlmsghdr *n)
+{
+ int ret;
+ struct tcmsg *t = NLMSG_DATA(n);
+ struct rtattr *tail;
+ __be16 eth_type = 0;
+ __u8 ip_proto = 0xff;
+
+ if (argc == 0)
+ return 0;
+
+ if (handle) {
+ ret = get_u32(&t->tcm_handle, handle, 0);
+ if (ret) {
+ fprintf(stderr, "Illegal \"handle\"\n");
+ return -1;
+ }
+ }
+
+ tail = (struct rtattr *) (((void *) n) + NLMSG_ALIGN(n->nlmsg_len));
+ addattr_l(n, MAX_MSG, TCA_OPTIONS, NULL, 0);
+
+ while (argc > 0) {
+ if (matches(*argv, "classid") == 0 ||
+ matches(*argv, "flowid") == 0) {
+ unsigned handle;
+
+ NEXT_ARG();
+ ret = get_tc_classid(&handle, *argv);
+ if (ret) {
+ fprintf(stderr, "Illegal \"classid\"\n");
+ return -1;
+ }
+ addattr_l(n, MAX_MSG, TCA_FLOWER_CLASSID, &handle, 4);
+ } else if (matches(*argv, "indev") == 0) {
+ char ifname[IFNAMSIZ];
+
+ NEXT_ARG();
+ memset(ifname, 0, sizeof(ifname));
+ strncpy(ifname, *argv, sizeof(ifname) - 1);
+ addattrstrz(n, MAX_MSG, TCA_FLOWER_INDEV, ifname);
+ } else if (matches(*argv, "dst_mac") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_eth_addr(*argv,
+ TCA_FLOWER_KEY_ETH_DST,
+ TCA_FLOWER_KEY_ETH_DST_MASK,
+ n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"dst_mac\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "src_mac") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_eth_addr(*argv,
+ TCA_FLOWER_KEY_ETH_SRC,
+ TCA_FLOWER_KEY_ETH_SRC_MASK,
+ n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"src_mac\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "eth_type") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_eth_type(*argv,
+ TCA_FLOWER_KEY_ETH_TYPE,
+ &eth_type, n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"eth_type\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "ip_proto") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_ip_proto(*argv, eth_type,
+ TCA_FLOWER_KEY_IP_PROTO,
+ &ip_proto, n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"ip_proto\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "dst_ip") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_ip_addr(*argv, eth_type,
+ TCA_FLOWER_KEY_IPV4_DST,
+ TCA_FLOWER_KEY_IPV4_DST_MASK,
+ TCA_FLOWER_KEY_IPV6_DST,
+ TCA_FLOWER_KEY_IPV6_DST_MASK,
+ n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"dst_ip\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "src_ip") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_ip_addr(*argv, eth_type,
+ TCA_FLOWER_KEY_IPV4_SRC,
+ TCA_FLOWER_KEY_IPV4_SRC_MASK,
+ TCA_FLOWER_KEY_IPV6_SRC,
+ TCA_FLOWER_KEY_IPV6_SRC_MASK,
+ n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"src_ip\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "dst_port") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_port(*argv, ip_proto,
+ TCA_FLOWER_KEY_TCP_DST,
+ TCA_FLOWER_KEY_UDP_DST, n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"dst_port\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "src_port") == 0) {
+ NEXT_ARG();
+ ret = flower_parse_port(*argv, ip_proto,
+ TCA_FLOWER_KEY_TCP_SRC,
+ TCA_FLOWER_KEY_UDP_SRC, n);
+ if (ret < 0) {
+ fprintf(stderr, "Illegal \"src_port\"\n");
+ return -1;
+ }
+ } else if (matches(*argv, "action") == 0) {
+ NEXT_ARG();
+ ret = parse_action(&argc, &argv, TCA_FLOWER_ACT, n);
+ if (ret) {
+ fprintf(stderr, "Illegal \"action\"\n");
+ return -1;
+ }
+ continue;
+ } else if (strcmp(*argv, "help") == 0) {
+ explain();
+ return -1;
+ } else {
+ fprintf(stderr, "What is \"%s\"?\n", *argv);
+ explain();
+ return -1;
+ }
+ argc--; argv++;
+ }
+
+ tail->rta_len = (((void*)n)+n->nlmsg_len) - (void*)tail;
+
+ return 0;
+}
+
+static int __mask_bits(char *addr, size_t len)
+{
+ int bits = 0;
+ bool hole = false;
+ int i;
+ int j;
+
+ for (i = 0; i < len; i++, addr++) {
+ for (j = 7; j >= 0; j--) {
+ if (((*addr) >> j) & 0x1) {
+ if (hole)
+ return -1;
+ bits++;
+ } else if (bits) {
+ hole = true;
+ } else{
+ return -1;
+ }
+ }
+ }
+ return bits;
+}
+
+static void flower_print_eth_addr(FILE *f, char *name,
+ struct rtattr *addr_attr,
+ struct rtattr *mask_attr)
+{
+ SPRINT_BUF(b1);
+ int bits;
+
+ if (!addr_attr || RTA_PAYLOAD(addr_attr) != ETH_ALEN)
+ return;
+ fprintf(f, "\n %s %s", name, ll_addr_n2a(RTA_DATA(addr_attr), ETH_ALEN,
+ 0, b1, sizeof(b1)));
+ if (!mask_attr || RTA_PAYLOAD(mask_attr) != ETH_ALEN)
+ return;
+ bits = __mask_bits(RTA_DATA(mask_attr), ETH_ALEN);
+ if (bits < 0)
+ fprintf(f, "/%s", ll_addr_n2a(RTA_DATA(mask_attr), ETH_ALEN,
+ 0, b1, sizeof(b1)));
+ else if (bits < ETH_ALEN * 8)
+ fprintf(f, "/%d", bits);
+}
+
+static void flower_print_eth_type(FILE *f, __be16 *p_eth_type,
+ struct rtattr *eth_type_attr)
+{
+ __be16 eth_type;
+
+ if (!eth_type_attr)
+ return;
+
+ eth_type = rta_getattr_u16(eth_type_attr);
+ fprintf(f, "\n eth_type ");
+ if (eth_type == htons(ETH_P_IP))
+ fprintf(f, "ipv4");
+ else if (eth_type == htons(ETH_P_IPV6))
+ fprintf(f, "ipv6");
+ else
+ fprintf(f, "%04x", ntohs(eth_type));
+ *p_eth_type = eth_type;
+}
+
+static void flower_print_ip_proto(FILE *f, __u8 *p_ip_proto,
+ struct rtattr *ip_proto_attr)
+{
+ __u8 ip_proto;
+
+ if (!ip_proto_attr)
+ return;
+
+ ip_proto = rta_getattr_u8(ip_proto_attr);
+ fprintf(f, "\n ip_proto ");
+ if (ip_proto == IPPROTO_TCP)
+ fprintf(f, "tcp");
+ else if (ip_proto == IPPROTO_UDP)
+ fprintf(f, "udp");
+ else
+ fprintf(f, "%02x", ip_proto);
+ *p_ip_proto = ip_proto;
+}
+
+static void flower_print_ip_addr(FILE *f, char *name, __be16 eth_type,
+ struct rtattr *addr4_attr,
+ struct rtattr *mask4_attr,
+ struct rtattr *addr6_attr,
+ struct rtattr *mask6_attr)
+{
+ SPRINT_BUF(b1);
+ struct rtattr *addr_attr;
+ struct rtattr *mask_attr;
+ int family;
+ size_t len;
+ int bits;
+
+ if (eth_type == htons(ETH_P_IP)) {
+ family = AF_INET;
+ addr_attr = addr4_attr;
+ mask_attr = mask4_attr;
+ len = 4;
+ } else if (eth_type == htons(ETH_P_IPV6)) {
+ family = AF_INET6;
+ addr_attr = addr6_attr;
+ mask_attr = mask6_attr;
+ len = 16;
+ } else {
+ return;
+ }
+ if (!addr_attr || RTA_PAYLOAD(addr_attr) != len)
+ return;
+ fprintf(f, "\n %s %s", name, rt_addr_n2a(family,
+ RTA_PAYLOAD(addr_attr),
+ RTA_DATA(addr_attr),
+ b1, sizeof(b1)));
+ if (!mask_attr || RTA_PAYLOAD(mask_attr) != len)
+ return;
+ bits = __mask_bits(RTA_DATA(mask_attr), len);
+ if (bits < 0)
+ fprintf(f, "/%s", rt_addr_n2a(family,
+ RTA_PAYLOAD(mask_attr),
+ RTA_DATA(mask_attr),
+ b1, sizeof(b1)));
+ else if (bits < len * 8)
+ fprintf(f, "/%d", bits);
+}
+
+static void flower_print_port(FILE *f, char *name, __u8 ip_proto,
+ struct rtattr *tcp_attr,
+ struct rtattr *udp_attr)
+{
+ struct rtattr *attr;
+
+ if (ip_proto == IPPROTO_TCP)
+ attr = tcp_attr;
+ else if (ip_proto == IPPROTO_UDP)
+ attr = udp_attr;
+ else
+ return;
+ if (!attr)
+ return;
+ fprintf(f, "\n %s %d", name, ntohs(rta_getattr_u16(attr)));
+}
+
+static int flower_print_opt(struct filter_util *qu, FILE *f,
+ struct rtattr *opt, __u32 handle)
+{
+ struct rtattr *tb[TCA_FLOWER_MAX + 1];
+ __be16 eth_type = 0;
+ __u8 ip_proto = 0xff;
+
+ if (!opt)
+ return 0;
+
+ parse_rtattr_nested(tb, TCA_FLOWER_MAX, opt);
+
+ if (handle)
+ fprintf(f, "handle 0x%x ", handle);
+
+ if (tb[TCA_FLOWER_CLASSID]) {
+ SPRINT_BUF(b1);
+ fprintf(f, "classid %s ",
+ sprint_tc_classid(rta_getattr_u32(tb[TCA_FLOWER_CLASSID]), b1));
+ }
+
+ if (tb[TCA_FLOWER_INDEV]) {
+ struct rtattr *attr = tb[TCA_FLOWER_INDEV];
+
+ fprintf(f, "\n indev %s", rta_getattr_str(attr));
+ }
+
+ flower_print_eth_addr(f, "dst_mac", tb[TCA_FLOWER_KEY_ETH_DST],
+ tb[TCA_FLOWER_KEY_ETH_DST_MASK]);
+ flower_print_eth_addr(f, "src_mac", tb[TCA_FLOWER_KEY_ETH_SRC],
+ tb[TCA_FLOWER_KEY_ETH_SRC_MASK]);
+
+ flower_print_eth_type(f, &eth_type, tb[TCA_FLOWER_KEY_ETH_TYPE]);
+ flower_print_ip_proto(f, &ip_proto, tb[TCA_FLOWER_KEY_IP_PROTO]);
+
+ flower_print_ip_addr(f, "dst_ip", eth_type,
+ tb[TCA_FLOWER_KEY_IPV4_DST],
+ tb[TCA_FLOWER_KEY_IPV4_DST_MASK],
+ tb[TCA_FLOWER_KEY_IPV6_DST],
+ tb[TCA_FLOWER_KEY_IPV6_DST_MASK]);
+
+ flower_print_ip_addr(f, "src_ip", eth_type,
+ tb[TCA_FLOWER_KEY_IPV4_SRC],
+ tb[TCA_FLOWER_KEY_IPV4_SRC_MASK],
+ tb[TCA_FLOWER_KEY_IPV6_SRC],
+ tb[TCA_FLOWER_KEY_IPV6_SRC_MASK]);
+
+ flower_print_port(f, "dst_port", ip_proto,
+ tb[TCA_FLOWER_KEY_TCP_DST],
+ tb[TCA_FLOWER_KEY_UDP_DST]);
+
+ flower_print_port(f, "src_port", ip_proto,
+ tb[TCA_FLOWER_KEY_TCP_SRC],
+ tb[TCA_FLOWER_KEY_UDP_SRC]);
+
+ if (tb[TCA_FLOWER_ACT]) {
+ tc_print_action(f, tb[TCA_FLOWER_ACT]);
+ }
+
+ return 0;
+}
+
+struct filter_util flower_filter_util = {
+ .id = "flower",
+ .parse_fopt = flower_parse_opt,
+ .print_fopt = flower_print_opt,
+};