Merge branch 'tc-conntrack' into next
Paul Blakey says: ==================== This patch series add connection tracking capabilities in tc. It does so via a new tc action, called act_ct, and new tc flower classifier matching. Act ct and relevant flower matches, are still under review in net-next mailing list. Usage is as follows: $ tc qdisc add dev ens1f0_0 ingress $ tc qdisc add dev ens1f0_1 ingress $ tc filter add dev ens1f0_0 ingress \ prio 1 chain 0 proto ip \ flower ip_proto tcp ct_state -trk \ action ct zone 2 pipe \ action goto chain 2 $ tc filter add dev ens1f0_0 ingress \ prio 1 chain 2 proto ip \ flower ct_state +trk+new \ action ct zone 2 commit mark 0xbb nat src addr 5.5.5.7 pipe \ action mirred egress redirect dev ens1f0_1 $ tc filter add dev ens1f0_0 ingress \ prio 1 chain 2 proto ip \ flower ct_zone 2 ct_mark 0xbb ct_state +trk+est \ action ct nat pipe \ action mirred egress redirect dev ens1f0_1 $ tc filter add dev ens1f0_1 ingress \ prio 1 chain 0 proto ip \ flower ip_proto tcp ct_state -trk \ action ct zone 2 pipe \ action goto chain 1 $ tc filter add dev ens1f0_1 ingress \ prio 1 chain 1 proto ip \ flower ct_zone 2 ct_mark 0xbb ct_state +trk+est \ action ct nat pipe \ action mirred egress redirect dev ens1f0_0 ==================== Signed-off-by: David Ahern <dsahern@gmail.com>
This commit is contained in:
commit
86545eaffb
|
|
@ -0,0 +1,41 @@
|
|||
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
|
||||
#ifndef __UAPI_TC_CT_H
|
||||
#define __UAPI_TC_CT_H
|
||||
|
||||
#include <linux/types.h>
|
||||
#include <linux/pkt_cls.h>
|
||||
|
||||
enum {
|
||||
TCA_CT_UNSPEC,
|
||||
TCA_CT_PARMS,
|
||||
TCA_CT_TM,
|
||||
TCA_CT_ACTION, /* u16 */
|
||||
TCA_CT_ZONE, /* u16 */
|
||||
TCA_CT_MARK, /* u32 */
|
||||
TCA_CT_MARK_MASK, /* u32 */
|
||||
TCA_CT_LABELS, /* u128 */
|
||||
TCA_CT_LABELS_MASK, /* u128 */
|
||||
TCA_CT_NAT_IPV4_MIN, /* be32 */
|
||||
TCA_CT_NAT_IPV4_MAX, /* be32 */
|
||||
TCA_CT_NAT_IPV6_MIN, /* struct in6_addr */
|
||||
TCA_CT_NAT_IPV6_MAX, /* struct in6_addr */
|
||||
TCA_CT_NAT_PORT_MIN, /* be16 */
|
||||
TCA_CT_NAT_PORT_MAX, /* be16 */
|
||||
TCA_CT_PAD,
|
||||
__TCA_CT_MAX
|
||||
};
|
||||
|
||||
#define TCA_CT_MAX (__TCA_CT_MAX - 1)
|
||||
|
||||
#define TCA_CT_ACT_COMMIT (1 << 0)
|
||||
#define TCA_CT_ACT_FORCE (1 << 1)
|
||||
#define TCA_CT_ACT_CLEAR (1 << 2)
|
||||
#define TCA_CT_ACT_NAT (1 << 3)
|
||||
#define TCA_CT_ACT_NAT_SRC (1 << 4)
|
||||
#define TCA_CT_ACT_NAT_DST (1 << 5)
|
||||
|
||||
struct tc_ct {
|
||||
tc_gen;
|
||||
};
|
||||
|
||||
#endif /* __UAPI_TC_CT_H */
|
||||
|
|
@ -289,6 +289,41 @@ bits is assumed.
|
|||
.TQ
|
||||
.BI enc_ttl " NUMBER"
|
||||
.TQ
|
||||
.BR
|
||||
.TP
|
||||
.BI ct_state " CT_STATE"
|
||||
.TQ
|
||||
.BI ct_zone " CT_MASKED_ZONE"
|
||||
.TQ
|
||||
.BI ct_mark " CT_MASKED_MARK"
|
||||
.TQ
|
||||
.BI ct_label " CT_MASKED_LABEL"
|
||||
Matches on connection tracking info
|
||||
.RS
|
||||
.TP
|
||||
.I CT_STATE
|
||||
Match the connection state, and can ne combination of [{+|-}flag] flags, where flag can be one of
|
||||
.RS
|
||||
.TP
|
||||
trk - Tracked connection.
|
||||
.TP
|
||||
new - New connection.
|
||||
.TP
|
||||
est - Established connection.
|
||||
.TP
|
||||
Example: +trk+est
|
||||
.RE
|
||||
.TP
|
||||
.I CT_MASKED_ZONE
|
||||
Match the connection zone, and can be masked.
|
||||
.TP
|
||||
.I CT_MASKED_MARK
|
||||
32bit match on the connection mark, and can be masked.
|
||||
.TP
|
||||
.I CT_MASKED_LABEL
|
||||
128bit match on the connection label, and can be masked.
|
||||
.RE
|
||||
.TP
|
||||
.BI geneve_opts " OPTIONS"
|
||||
Match on IP tunnel metadata. Key id
|
||||
.I NUMBER
|
||||
|
|
|
|||
|
|
@ -53,6 +53,7 @@ TCMODULES += m_ctinfo.o
|
|||
TCMODULES += m_bpf.o
|
||||
TCMODULES += m_tunnel_key.o
|
||||
TCMODULES += m_sample.o
|
||||
TCMODULES += m_ct.o
|
||||
TCMODULES += p_ip.o
|
||||
TCMODULES += p_ip6.o
|
||||
TCMODULES += p_icmp.o
|
||||
|
|
|
|||
276
tc/f_flower.c
276
tc/f_flower.c
|
|
@ -82,9 +82,14 @@ static void explain(void)
|
|||
" enc_ttl MASKED-IP_TTL |\n"
|
||||
" geneve_opts MASKED-OPTIONS |\n"
|
||||
" ip_flags IP-FLAGS | \n"
|
||||
" enc_dst_port [ port_number ] }\n"
|
||||
" enc_dst_port [ port_number ] |\n"
|
||||
" ct_state MASKED_CT_STATE |\n"
|
||||
" ct_label MASKED_CT_LABEL |\n"
|
||||
" ct_mark MASKED_CT_MARK |\n"
|
||||
" ct_zone MASKED_CT_ZONE }\n"
|
||||
" FILTERID := X:Y:Z\n"
|
||||
" MASKED_LLADDR := { LLADDR | LLADDR/MASK | LLADDR/BITS }\n"
|
||||
" MASKED_CT_STATE := combination of {+|-} and flags trk,est,new\n"
|
||||
" ACTION-SPEC := ... look at individual actions\n"
|
||||
"\n"
|
||||
"NOTE: CLASSID, IP-PROTO are parsed as hexadecimal input.\n"
|
||||
|
|
@ -214,6 +219,159 @@ static int flower_parse_matching_flags(char *str,
|
|||
return 0;
|
||||
}
|
||||
|
||||
static int flower_parse_u16(char *str, int value_type, int mask_type,
|
||||
struct nlmsghdr *n)
|
||||
{
|
||||
__u16 value, mask;
|
||||
char *slash;
|
||||
|
||||
slash = strchr(str, '/');
|
||||
if (slash)
|
||||
*slash = '\0';
|
||||
|
||||
if (get_u16(&value, str, 0))
|
||||
return -1;
|
||||
|
||||
if (slash) {
|
||||
if (get_u16(&mask, slash + 1, 0))
|
||||
return -1;
|
||||
} else {
|
||||
mask = UINT16_MAX;
|
||||
}
|
||||
|
||||
addattr16(n, MAX_MSG, value_type, value);
|
||||
addattr16(n, MAX_MSG, mask_type, mask);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int flower_parse_u32(char *str, int value_type, int mask_type,
|
||||
struct nlmsghdr *n)
|
||||
{
|
||||
__u32 value, mask;
|
||||
char *slash;
|
||||
|
||||
slash = strchr(str, '/');
|
||||
if (slash)
|
||||
*slash = '\0';
|
||||
|
||||
if (get_u32(&value, str, 0))
|
||||
return -1;
|
||||
|
||||
if (slash) {
|
||||
if (get_u32(&mask, slash + 1, 0))
|
||||
return -1;
|
||||
} else {
|
||||
mask = UINT32_MAX;
|
||||
}
|
||||
|
||||
addattr32(n, MAX_MSG, value_type, value);
|
||||
addattr32(n, MAX_MSG, mask_type, mask);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int flower_parse_ct_mark(char *str, struct nlmsghdr *n)
|
||||
{
|
||||
return flower_parse_u32(str,
|
||||
TCA_FLOWER_KEY_CT_MARK,
|
||||
TCA_FLOWER_KEY_CT_MARK_MASK,
|
||||
n);
|
||||
}
|
||||
|
||||
static int flower_parse_ct_zone(char *str, struct nlmsghdr *n)
|
||||
{
|
||||
return flower_parse_u16(str,
|
||||
TCA_FLOWER_KEY_CT_ZONE,
|
||||
TCA_FLOWER_KEY_CT_ZONE_MASK,
|
||||
n);
|
||||
}
|
||||
|
||||
static int flower_parse_ct_labels(char *str, struct nlmsghdr *n)
|
||||
{
|
||||
#define LABELS_SIZE 16
|
||||
uint8_t labels[LABELS_SIZE], lmask[LABELS_SIZE];
|
||||
char *slash, *mask = NULL;
|
||||
size_t slen, slen_mask = 0;
|
||||
|
||||
slash = index(str, '/');
|
||||
if (slash) {
|
||||
*slash = 0;
|
||||
mask = slash + 1;
|
||||
slen_mask = strlen(mask);
|
||||
}
|
||||
|
||||
slen = strlen(str);
|
||||
if (slen > LABELS_SIZE * 2 || slen_mask > LABELS_SIZE * 2) {
|
||||
char errmsg[128];
|
||||
|
||||
snprintf(errmsg, sizeof(errmsg),
|
||||
"%zd Max allowed size %d",
|
||||
slen, LABELS_SIZE*2);
|
||||
invarg(errmsg, str);
|
||||
}
|
||||
|
||||
if (hex2mem(str, labels, slen / 2) < 0)
|
||||
invarg("labels must be a hex string\n", str);
|
||||
addattr_l(n, MAX_MSG, TCA_FLOWER_KEY_CT_LABELS, labels, slen / 2);
|
||||
|
||||
if (mask) {
|
||||
if (hex2mem(mask, lmask, slen_mask / 2) < 0)
|
||||
invarg("labels mask must be a hex string\n", mask);
|
||||
} else {
|
||||
memset(lmask, 0xff, sizeof(lmask));
|
||||
slen_mask = sizeof(lmask) * 2;
|
||||
}
|
||||
addattr_l(n, MAX_MSG, TCA_FLOWER_KEY_CT_LABELS_MASK, lmask,
|
||||
slen_mask / 2);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static struct flower_ct_states {
|
||||
char *str;
|
||||
int flag;
|
||||
} flower_ct_states[] = {
|
||||
{ "trk", TCA_FLOWER_KEY_CT_FLAGS_TRACKED },
|
||||
{ "new", TCA_FLOWER_KEY_CT_FLAGS_NEW },
|
||||
{ "est", TCA_FLOWER_KEY_CT_FLAGS_ESTABLISHED },
|
||||
};
|
||||
|
||||
static int flower_parse_ct_state(char *str, struct nlmsghdr *n)
|
||||
{
|
||||
int flags = 0, mask = 0, len, i;
|
||||
bool p;
|
||||
|
||||
while (*str != '\0') {
|
||||
if (*str == '+')
|
||||
p = true;
|
||||
else if (*str == '-')
|
||||
p = false;
|
||||
else
|
||||
return -1;
|
||||
|
||||
for (i = 0; i < ARRAY_SIZE(flower_ct_states); i++) {
|
||||
len = strlen(flower_ct_states[i].str);
|
||||
if (strncmp(str + 1, flower_ct_states[i].str, len))
|
||||
continue;
|
||||
|
||||
if (p)
|
||||
flags |= flower_ct_states[i].flag;
|
||||
mask |= flower_ct_states[i].flag;
|
||||
break;
|
||||
}
|
||||
|
||||
if (i == ARRAY_SIZE(flower_ct_states))
|
||||
return -1;
|
||||
|
||||
str += len + 1;
|
||||
}
|
||||
|
||||
addattr16(n, MAX_MSG, TCA_FLOWER_KEY_CT_STATE, flags);
|
||||
addattr16(n, MAX_MSG, TCA_FLOWER_KEY_CT_STATE_MASK, mask);
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int flower_parse_ip_proto(char *str, __be16 eth_type, int type,
|
||||
__u8 *p_ip_proto, struct nlmsghdr *n)
|
||||
{
|
||||
|
|
@ -898,6 +1056,34 @@ static int flower_parse_opt(struct filter_util *qu, char *handle,
|
|||
flags |= TCA_CLS_FLAGS_SKIP_HW;
|
||||
} else if (matches(*argv, "skip_sw") == 0) {
|
||||
flags |= TCA_CLS_FLAGS_SKIP_SW;
|
||||
} else if (matches(*argv, "ct_state") == 0) {
|
||||
NEXT_ARG();
|
||||
ret = flower_parse_ct_state(*argv, n);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Illegal \"ct_state\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "ct_zone") == 0) {
|
||||
NEXT_ARG();
|
||||
ret = flower_parse_ct_zone(*argv, n);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Illegal \"ct_zone\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "ct_mark") == 0) {
|
||||
NEXT_ARG();
|
||||
ret = flower_parse_ct_mark(*argv, n);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Illegal \"ct_mark\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "ct_label") == 0) {
|
||||
NEXT_ARG();
|
||||
ret = flower_parse_ct_labels(*argv, n);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Illegal \"ct_label\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "indev") == 0) {
|
||||
NEXT_ARG();
|
||||
if (check_ifname(*argv))
|
||||
|
|
@ -1590,6 +1776,85 @@ static void flower_print_tcp_flags(const char *name, struct rtattr *flags_attr,
|
|||
print_string(PRINT_ANY, name, namefrm, out);
|
||||
}
|
||||
|
||||
static void flower_print_ct_state(struct rtattr *flags_attr,
|
||||
struct rtattr *mask_attr)
|
||||
{
|
||||
SPRINT_BUF(out);
|
||||
uint16_t state;
|
||||
uint16_t state_mask;
|
||||
size_t done = 0;
|
||||
int i;
|
||||
|
||||
if (!flags_attr)
|
||||
return;
|
||||
|
||||
state = rta_getattr_u16(flags_attr);
|
||||
if (mask_attr)
|
||||
state_mask = rta_getattr_u16(mask_attr);
|
||||
else
|
||||
state_mask = UINT16_MAX;
|
||||
|
||||
for (i = 0; i < ARRAY_SIZE(flower_ct_states); i++) {
|
||||
if (!(state_mask & flower_ct_states[i].flag))
|
||||
continue;
|
||||
|
||||
if (state & flower_ct_states[i].flag)
|
||||
done += sprintf(out + done, "+%s",
|
||||
flower_ct_states[i].str);
|
||||
else
|
||||
done += sprintf(out + done, "-%s",
|
||||
flower_ct_states[i].str);
|
||||
}
|
||||
|
||||
print_string(PRINT_ANY, "ct_state", "\n ct_state %s", out);
|
||||
}
|
||||
|
||||
static void flower_print_ct_label(struct rtattr *attr,
|
||||
struct rtattr *mask_attr)
|
||||
{
|
||||
const unsigned char *str;
|
||||
bool print_mask = false;
|
||||
int data_len, i;
|
||||
SPRINT_BUF(out);
|
||||
char *p;
|
||||
|
||||
if (!attr)
|
||||
return;
|
||||
|
||||
data_len = RTA_PAYLOAD(attr);
|
||||
hexstring_n2a(RTA_DATA(attr), data_len, out, sizeof(out));
|
||||
p = out + data_len*2;
|
||||
|
||||
data_len = RTA_PAYLOAD(attr);
|
||||
str = RTA_DATA(mask_attr);
|
||||
if (data_len != 16)
|
||||
print_mask = true;
|
||||
for (i = 0; !print_mask && i < data_len; i++) {
|
||||
if (str[i] != 0xff)
|
||||
print_mask = true;
|
||||
}
|
||||
if (print_mask) {
|
||||
*p++ = '/';
|
||||
hexstring_n2a(RTA_DATA(mask_attr), data_len, p,
|
||||
sizeof(out)-(p-out));
|
||||
p += data_len*2;
|
||||
}
|
||||
*p = '\0';
|
||||
|
||||
print_string(PRINT_ANY, "ct_label", "\n ct_label %s", out);
|
||||
}
|
||||
|
||||
static void flower_print_ct_zone(struct rtattr *attr,
|
||||
struct rtattr *mask_attr)
|
||||
{
|
||||
print_masked_u16("ct_zone", attr, mask_attr);
|
||||
}
|
||||
|
||||
static void flower_print_ct_mark(struct rtattr *attr,
|
||||
struct rtattr *mask_attr)
|
||||
{
|
||||
print_masked_u32("ct_mark", attr, mask_attr);
|
||||
}
|
||||
|
||||
static void flower_print_key_id(const char *name, struct rtattr *attr)
|
||||
{
|
||||
|
|
@ -1949,6 +2214,15 @@ static int flower_print_opt(struct filter_util *qu, FILE *f,
|
|||
tb[TCA_FLOWER_KEY_FLAGS],
|
||||
tb[TCA_FLOWER_KEY_FLAGS_MASK]);
|
||||
|
||||
flower_print_ct_state(tb[TCA_FLOWER_KEY_CT_STATE],
|
||||
tb[TCA_FLOWER_KEY_CT_STATE_MASK]);
|
||||
flower_print_ct_zone(tb[TCA_FLOWER_KEY_CT_ZONE],
|
||||
tb[TCA_FLOWER_KEY_CT_ZONE_MASK]);
|
||||
flower_print_ct_mark(tb[TCA_FLOWER_KEY_CT_MARK],
|
||||
tb[TCA_FLOWER_KEY_CT_MARK_MASK]);
|
||||
flower_print_ct_label(tb[TCA_FLOWER_KEY_CT_LABELS],
|
||||
tb[TCA_FLOWER_KEY_CT_LABELS_MASK]);
|
||||
|
||||
close_json_object();
|
||||
|
||||
if (tb[TCA_FLOWER_FLAGS]) {
|
||||
|
|
|
|||
|
|
@ -214,7 +214,8 @@ done0:
|
|||
tail = addattr_nest(n, MAX_MSG, ++prio);
|
||||
addattr_l(n, MAX_MSG, TCA_ACT_KIND, k, strlen(k) + 1);
|
||||
|
||||
ret = a->parse_aopt(a, &argc, &argv, TCA_ACT_OPTIONS,
|
||||
ret = a->parse_aopt(a, &argc, &argv,
|
||||
TCA_ACT_OPTIONS | NLA_F_NESTED,
|
||||
n);
|
||||
|
||||
if (ret < 0) {
|
||||
|
|
|
|||
|
|
@ -0,0 +1,497 @@
|
|||
// SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB
|
||||
/* -
|
||||
* m_ct.c Connection tracking action
|
||||
*
|
||||
* Authors: Paul Blakey <paulb@mellanox.com>
|
||||
* Yossi Kuperman <yossiku@mellanox.com>
|
||||
* Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include "utils.h"
|
||||
#include "tc_util.h"
|
||||
#include <linux/tc_act/tc_ct.h>
|
||||
|
||||
static void
|
||||
usage(void)
|
||||
{
|
||||
fprintf(stderr,
|
||||
"Usage: ct clear\n"
|
||||
" ct commit [force] [zone ZONE] [mark MASKED_MARK] [label MASKED_LABEL] [nat NAT_SPEC]\n"
|
||||
" ct [nat] [zone ZONE]\n"
|
||||
"Where: ZONE is the conntrack zone table number\n"
|
||||
" NAT_SPEC is {src|dst} addr addr1[-addr2] [port port1[-port2]]\n"
|
||||
"\n");
|
||||
exit(-1);
|
||||
}
|
||||
|
||||
static int ct_parse_nat_addr_range(const char *str, struct nlmsghdr *n)
|
||||
{
|
||||
inet_prefix addr = { .family = AF_UNSPEC, };
|
||||
char *addr1, *addr2 = 0;
|
||||
SPRINT_BUF(buffer);
|
||||
int attr;
|
||||
int ret;
|
||||
|
||||
strncpy(buffer, str, sizeof(buffer) - 1);
|
||||
|
||||
addr1 = buffer;
|
||||
addr2 = strchr(addr1, '-');
|
||||
if (addr2) {
|
||||
*addr2 = '\0';
|
||||
addr2++;
|
||||
}
|
||||
|
||||
ret = get_addr(&addr, addr1, AF_UNSPEC);
|
||||
if (ret)
|
||||
return ret;
|
||||
attr = addr.family == AF_INET ? TCA_CT_NAT_IPV4_MIN :
|
||||
TCA_CT_NAT_IPV6_MIN;
|
||||
addattr_l(n, MAX_MSG, attr, addr.data, addr.bytelen);
|
||||
|
||||
if (addr2) {
|
||||
ret = get_addr(&addr, addr2, addr.family);
|
||||
if (ret)
|
||||
return ret;
|
||||
}
|
||||
attr = addr.family == AF_INET ? TCA_CT_NAT_IPV4_MAX :
|
||||
TCA_CT_NAT_IPV6_MAX;
|
||||
addattr_l(n, MAX_MSG, attr, addr.data, addr.bytelen);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ct_parse_nat_port_range(const char *str, struct nlmsghdr *n)
|
||||
{
|
||||
char *port1, *port2 = 0;
|
||||
SPRINT_BUF(buffer);
|
||||
__be16 port;
|
||||
int ret;
|
||||
|
||||
strncpy(buffer, str, sizeof(buffer) - 1);
|
||||
|
||||
port1 = buffer;
|
||||
port2 = strchr(port1, '-');
|
||||
if (port2) {
|
||||
*port2 = '\0';
|
||||
port2++;
|
||||
}
|
||||
|
||||
ret = get_be16(&port, port1, 10);
|
||||
if (ret)
|
||||
return -1;
|
||||
addattr16(n, MAX_MSG, TCA_CT_NAT_PORT_MIN, port);
|
||||
|
||||
if (port2) {
|
||||
ret = get_be16(&port, port2, 10);
|
||||
if (ret)
|
||||
return -1;
|
||||
}
|
||||
addattr16(n, MAX_MSG, TCA_CT_NAT_PORT_MAX, port);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
static int ct_parse_u16(char *str, int value_type, int mask_type,
|
||||
struct nlmsghdr *n)
|
||||
{
|
||||
__u16 value, mask;
|
||||
char *slash = 0;
|
||||
|
||||
if (mask_type != TCA_CT_UNSPEC) {
|
||||
slash = strchr(str, '/');
|
||||
if (slash)
|
||||
*slash = '\0';
|
||||
}
|
||||
|
||||
if (get_u16(&value, str, 0))
|
||||
return -1;
|
||||
|
||||
if (slash) {
|
||||
if (get_u16(&mask, slash + 1, 0))
|
||||
return -1;
|
||||
} else {
|
||||
mask = UINT16_MAX;
|
||||
}
|
||||
|
||||
addattr16(n, MAX_MSG, value_type, value);
|
||||
if (mask_type != TCA_CT_UNSPEC)
|
||||
addattr16(n, MAX_MSG, mask_type, mask);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ct_parse_u32(char *str, int value_type, int mask_type,
|
||||
struct nlmsghdr *n)
|
||||
{
|
||||
__u32 value, mask;
|
||||
char *slash;
|
||||
|
||||
slash = strchr(str, '/');
|
||||
if (slash)
|
||||
*slash = '\0';
|
||||
|
||||
if (get_u32(&value, str, 0))
|
||||
return -1;
|
||||
|
||||
if (slash) {
|
||||
if (get_u32(&mask, slash + 1, 0))
|
||||
return -1;
|
||||
} else {
|
||||
mask = UINT32_MAX;
|
||||
}
|
||||
|
||||
addattr32(n, MAX_MSG, value_type, value);
|
||||
addattr32(n, MAX_MSG, mask_type, mask);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ct_parse_mark(char *str, struct nlmsghdr *n)
|
||||
{
|
||||
return ct_parse_u32(str, TCA_CT_MARK, TCA_CT_MARK_MASK, n);
|
||||
}
|
||||
|
||||
static int ct_parse_labels(char *str, struct nlmsghdr *n)
|
||||
{
|
||||
#define LABELS_SIZE 16
|
||||
uint8_t labels[LABELS_SIZE], lmask[LABELS_SIZE];
|
||||
char *slash, *mask = NULL;
|
||||
size_t slen, slen_mask = 0;
|
||||
|
||||
slash = index(str, '/');
|
||||
if (slash) {
|
||||
*slash = 0;
|
||||
mask = slash+1;
|
||||
slen_mask = strlen(mask);
|
||||
}
|
||||
|
||||
slen = strlen(str);
|
||||
if (slen > LABELS_SIZE*2 || slen_mask > LABELS_SIZE*2) {
|
||||
char errmsg[128];
|
||||
|
||||
snprintf(errmsg, sizeof(errmsg),
|
||||
"%zd Max allowed size %d",
|
||||
slen, LABELS_SIZE*2);
|
||||
invarg(errmsg, str);
|
||||
}
|
||||
|
||||
if (hex2mem(str, labels, slen/2) < 0)
|
||||
invarg("ct: labels must be a hex string\n", str);
|
||||
addattr_l(n, MAX_MSG, TCA_CT_LABELS, labels, slen/2);
|
||||
|
||||
if (mask) {
|
||||
if (hex2mem(mask, lmask, slen_mask/2) < 0)
|
||||
invarg("ct: labels mask must be a hex string\n", mask);
|
||||
} else {
|
||||
memset(lmask, 0xff, sizeof(lmask));
|
||||
slen_mask = sizeof(lmask)*2;
|
||||
}
|
||||
addattr_l(n, MAX_MSG, TCA_CT_LABELS_MASK, lmask, slen_mask/2);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
parse_ct(struct action_util *a, int *argc_p, char ***argv_p, int tca_id,
|
||||
struct nlmsghdr *n)
|
||||
{
|
||||
struct tc_ct sel = {};
|
||||
char **argv = *argv_p;
|
||||
struct rtattr *tail;
|
||||
int argc = *argc_p;
|
||||
int ct_action = 0;
|
||||
int ret;
|
||||
|
||||
tail = addattr_nest(n, MAX_MSG, tca_id);
|
||||
|
||||
if (argc && matches(*argv, "ct") == 0)
|
||||
NEXT_ARG_FWD();
|
||||
|
||||
while (argc > 0) {
|
||||
if (matches(*argv, "zone") == 0) {
|
||||
NEXT_ARG();
|
||||
|
||||
if (ct_parse_u16(*argv,
|
||||
TCA_CT_ZONE, TCA_CT_UNSPEC, n)) {
|
||||
fprintf(stderr, "ct: Illegal \"zone\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "nat") == 0) {
|
||||
ct_action |= TCA_CT_ACT_NAT;
|
||||
|
||||
NEXT_ARG();
|
||||
if (matches(*argv, "src") == 0)
|
||||
ct_action |= TCA_CT_ACT_NAT_SRC;
|
||||
else if (matches(*argv, "dst") == 0)
|
||||
ct_action |= TCA_CT_ACT_NAT_DST;
|
||||
else
|
||||
continue;
|
||||
|
||||
NEXT_ARG();
|
||||
if (matches(*argv, "addr") != 0)
|
||||
usage();
|
||||
|
||||
NEXT_ARG();
|
||||
ret = ct_parse_nat_addr_range(*argv, n);
|
||||
if (ret) {
|
||||
fprintf(stderr, "ct: Illegal nat address range\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
NEXT_ARG_FWD();
|
||||
if (matches(*argv, "port") != 0)
|
||||
continue;
|
||||
|
||||
NEXT_ARG();
|
||||
ret = ct_parse_nat_port_range(*argv, n);
|
||||
if (ret) {
|
||||
fprintf(stderr, "ct: Illegal nat port range\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "clear") == 0) {
|
||||
ct_action |= TCA_CT_ACT_CLEAR;
|
||||
} else if (matches(*argv, "commit") == 0) {
|
||||
ct_action |= TCA_CT_ACT_COMMIT;
|
||||
} else if (matches(*argv, "force") == 0) {
|
||||
ct_action |= TCA_CT_ACT_FORCE;
|
||||
} else if (matches(*argv, "index") == 0) {
|
||||
NEXT_ARG();
|
||||
if (get_u32(&sel.index, *argv, 10)) {
|
||||
fprintf(stderr, "ct: Illegal \"index\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "mark") == 0) {
|
||||
NEXT_ARG();
|
||||
|
||||
ret = ct_parse_mark(*argv, n);
|
||||
if (ret) {
|
||||
fprintf(stderr, "ct: Illegal \"mark\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "label") == 0) {
|
||||
NEXT_ARG();
|
||||
|
||||
ret = ct_parse_labels(*argv, n);
|
||||
if (ret) {
|
||||
fprintf(stderr, "ct: Illegal \"label\"\n");
|
||||
return -1;
|
||||
}
|
||||
} else if (matches(*argv, "help") == 0) {
|
||||
usage();
|
||||
} else {
|
||||
break;
|
||||
}
|
||||
NEXT_ARG_FWD();
|
||||
}
|
||||
|
||||
if (ct_action & TCA_CT_ACT_CLEAR &&
|
||||
ct_action & ~TCA_CT_ACT_CLEAR) {
|
||||
fprintf(stderr, "ct: clear can only be used alone\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (ct_action & TCA_CT_ACT_NAT_SRC &&
|
||||
ct_action & TCA_CT_ACT_NAT_DST) {
|
||||
fprintf(stderr, "ct: src and dst nat can't be used together\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if ((ct_action & TCA_CT_ACT_COMMIT) &&
|
||||
(ct_action & TCA_CT_ACT_NAT) &&
|
||||
!(ct_action & (TCA_CT_ACT_NAT_SRC | TCA_CT_ACT_NAT_DST))) {
|
||||
fprintf(stderr, "ct: commit and nat must set src or dst\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (!(ct_action & TCA_CT_ACT_COMMIT) &&
|
||||
(ct_action & (TCA_CT_ACT_NAT_SRC | TCA_CT_ACT_NAT_DST))) {
|
||||
fprintf(stderr, "ct: src or dst is only valid if commit is set\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
parse_action_control_dflt(&argc, &argv, &sel.action, false,
|
||||
TC_ACT_PIPE);
|
||||
NEXT_ARG_FWD();
|
||||
|
||||
addattr16(n, MAX_MSG, TCA_CT_ACTION, ct_action);
|
||||
addattr_l(n, MAX_MSG, TCA_CT_PARMS, &sel, sizeof(sel));
|
||||
addattr_nest_end(n, tail);
|
||||
|
||||
*argc_p = argc;
|
||||
*argv_p = argv;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ct_sprint_port(char *buf, const char *prefix, struct rtattr *attr)
|
||||
{
|
||||
if (!attr)
|
||||
return 0;
|
||||
|
||||
return sprintf(buf, "%s%d", prefix, rta_getattr_be16(attr));
|
||||
}
|
||||
|
||||
static int ct_sprint_ip_addr(char *buf, const char *prefix,
|
||||
struct rtattr *attr)
|
||||
{
|
||||
int family;
|
||||
size_t len;
|
||||
|
||||
if (!attr)
|
||||
return 0;
|
||||
|
||||
len = RTA_PAYLOAD(attr);
|
||||
|
||||
if (len == 4)
|
||||
family = AF_INET;
|
||||
else if (len == 16)
|
||||
family = AF_INET6;
|
||||
else
|
||||
return 0;
|
||||
|
||||
return sprintf(buf, "%s%s", prefix, rt_addr_n2a_rta(family, attr));
|
||||
}
|
||||
|
||||
static void ct_print_nat(int ct_action, struct rtattr **tb)
|
||||
{
|
||||
size_t done = 0;
|
||||
char out[256] = "";
|
||||
bool nat;
|
||||
|
||||
if (!(ct_action & TCA_CT_ACT_NAT))
|
||||
return;
|
||||
|
||||
if (ct_action & TCA_CT_ACT_NAT_SRC) {
|
||||
nat = true;
|
||||
done += sprintf(out + done, "src");
|
||||
} else if (ct_action & TCA_CT_ACT_NAT_DST) {
|
||||
nat = true;
|
||||
done += sprintf(out + done, "dst");
|
||||
}
|
||||
|
||||
if (nat) {
|
||||
done += ct_sprint_ip_addr(out + done, " addr ",
|
||||
tb[TCA_CT_NAT_IPV4_MIN]);
|
||||
done += ct_sprint_ip_addr(out + done, " addr ",
|
||||
tb[TCA_CT_NAT_IPV6_MIN]);
|
||||
if (tb[TCA_CT_NAT_IPV4_MAX] &&
|
||||
memcmp(RTA_DATA(tb[TCA_CT_NAT_IPV4_MIN]),
|
||||
RTA_DATA(tb[TCA_CT_NAT_IPV4_MAX]), 4))
|
||||
done += ct_sprint_ip_addr(out + done, "-",
|
||||
tb[TCA_CT_NAT_IPV4_MAX]);
|
||||
else if (tb[TCA_CT_NAT_IPV6_MAX] &&
|
||||
memcmp(RTA_DATA(tb[TCA_CT_NAT_IPV6_MIN]),
|
||||
RTA_DATA(tb[TCA_CT_NAT_IPV6_MAX]), 16))
|
||||
done += ct_sprint_ip_addr(out + done, "-",
|
||||
tb[TCA_CT_NAT_IPV6_MAX]);
|
||||
done += ct_sprint_port(out + done, " port ",
|
||||
tb[TCA_CT_NAT_PORT_MIN]);
|
||||
if (tb[TCA_CT_NAT_PORT_MAX] &&
|
||||
memcmp(RTA_DATA(tb[TCA_CT_NAT_PORT_MIN]),
|
||||
RTA_DATA(tb[TCA_CT_NAT_PORT_MAX]), 2))
|
||||
done += ct_sprint_port(out + done, "-",
|
||||
tb[TCA_CT_NAT_PORT_MAX]);
|
||||
}
|
||||
|
||||
if (done)
|
||||
print_string(PRINT_ANY, "nat", " nat %s", out);
|
||||
else
|
||||
print_string(PRINT_ANY, "nat", " nat", "");
|
||||
}
|
||||
|
||||
static void ct_print_labels(struct rtattr *attr,
|
||||
struct rtattr *mask_attr)
|
||||
{
|
||||
const unsigned char *str;
|
||||
bool print_mask = false;
|
||||
char out[256], *p;
|
||||
int data_len, i;
|
||||
|
||||
if (!attr)
|
||||
return;
|
||||
|
||||
data_len = RTA_PAYLOAD(attr);
|
||||
hexstring_n2a(RTA_DATA(attr), data_len, out, sizeof(out));
|
||||
p = out + data_len*2;
|
||||
|
||||
data_len = RTA_PAYLOAD(attr);
|
||||
str = RTA_DATA(mask_attr);
|
||||
if (data_len != 16)
|
||||
print_mask = true;
|
||||
for (i = 0; !print_mask && i < data_len; i++) {
|
||||
if (str[i] != 0xff)
|
||||
print_mask = true;
|
||||
}
|
||||
if (print_mask) {
|
||||
*p++ = '/';
|
||||
hexstring_n2a(RTA_DATA(mask_attr), data_len, p,
|
||||
sizeof(out)-(p-out));
|
||||
p += data_len*2;
|
||||
}
|
||||
*p = '\0';
|
||||
|
||||
print_string(PRINT_ANY, "label", " label %s", out);
|
||||
}
|
||||
|
||||
static int print_ct(struct action_util *au, FILE *f, struct rtattr *arg)
|
||||
{
|
||||
struct rtattr *tb[TCA_CT_MAX + 1];
|
||||
const char *commit;
|
||||
struct tc_ct *p;
|
||||
int ct_action = 0;
|
||||
|
||||
if (arg == NULL)
|
||||
return -1;
|
||||
|
||||
parse_rtattr_nested(tb, TCA_CT_MAX, arg);
|
||||
if (tb[TCA_CT_PARMS] == NULL) {
|
||||
print_string(PRINT_FP, NULL, "%s", "[NULL ct parameters]");
|
||||
return -1;
|
||||
}
|
||||
|
||||
p = RTA_DATA(tb[TCA_CT_PARMS]);
|
||||
|
||||
print_string(PRINT_ANY, "kind", "%s", "ct");
|
||||
|
||||
if (tb[TCA_CT_ACTION])
|
||||
ct_action = rta_getattr_u16(tb[TCA_CT_ACTION]);
|
||||
if (ct_action & TCA_CT_ACT_COMMIT) {
|
||||
commit = ct_action & TCA_CT_ACT_FORCE ?
|
||||
"commit force" : "commit";
|
||||
print_string(PRINT_ANY, "action", " %s", commit);
|
||||
} else if (ct_action & TCA_CT_ACT_CLEAR) {
|
||||
print_string(PRINT_ANY, "action", " %s", "clear");
|
||||
}
|
||||
|
||||
print_masked_u32("mark", tb[TCA_CT_MARK], tb[TCA_CT_MARK_MASK]);
|
||||
print_masked_u16("zone", tb[TCA_CT_ZONE], NULL);
|
||||
ct_print_labels(tb[TCA_CT_LABELS], tb[TCA_CT_LABELS_MASK]);
|
||||
ct_print_nat(ct_action, tb);
|
||||
|
||||
print_action_control(f, " ", p->action, "");
|
||||
|
||||
print_uint(PRINT_ANY, "index", "\n\t index %u", p->index);
|
||||
print_int(PRINT_ANY, "ref", " ref %d", p->refcnt);
|
||||
print_int(PRINT_ANY, "bind", " bind %d", p->bindcnt);
|
||||
|
||||
if (show_stats) {
|
||||
if (tb[TCA_CT_TM]) {
|
||||
struct tcf_t *tm = RTA_DATA(tb[TCA_CT_TM]);
|
||||
|
||||
print_tm(f, tm);
|
||||
}
|
||||
}
|
||||
print_string(PRINT_FP, NULL, "%s", "\n ");
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
struct action_util ct_action_util = {
|
||||
.id = "ct",
|
||||
.parse_aopt = parse_ct,
|
||||
.print_aopt = print_ct,
|
||||
};
|
||||
44
tc/tc_util.c
44
tc/tc_util.c
|
|
@ -913,3 +913,47 @@ compat_xstats:
|
|||
if (tb[TCA_XSTATS] && xstats)
|
||||
*xstats = tb[TCA_XSTATS];
|
||||
}
|
||||
|
||||
void print_masked_u32(const char *name, struct rtattr *attr,
|
||||
struct rtattr *mask_attr)
|
||||
{
|
||||
__u32 value, mask;
|
||||
SPRINT_BUF(namefrm);
|
||||
SPRINT_BUF(out);
|
||||
size_t done;
|
||||
|
||||
if (!attr)
|
||||
return;
|
||||
|
||||
value = rta_getattr_u32(attr);
|
||||
mask = mask_attr ? rta_getattr_u32(mask_attr) : UINT32_MAX;
|
||||
|
||||
done = sprintf(out, "%u", value);
|
||||
if (mask != UINT32_MAX)
|
||||
sprintf(out + done, "/0x%x", mask);
|
||||
|
||||
sprintf(namefrm, " %s %%s", name);
|
||||
print_string(PRINT_ANY, name, namefrm, out);
|
||||
}
|
||||
|
||||
void print_masked_u16(const char *name, struct rtattr *attr,
|
||||
struct rtattr *mask_attr)
|
||||
{
|
||||
__u16 value, mask;
|
||||
SPRINT_BUF(namefrm);
|
||||
SPRINT_BUF(out);
|
||||
size_t done;
|
||||
|
||||
if (!attr)
|
||||
return;
|
||||
|
||||
value = rta_getattr_u16(attr);
|
||||
mask = mask_attr ? rta_getattr_u16(mask_attr) : UINT16_MAX;
|
||||
|
||||
done = sprintf(out, "%u", value);
|
||||
if (mask != UINT16_MAX)
|
||||
sprintf(out + done, "/0x%x", mask);
|
||||
|
||||
sprintf(namefrm, " %s %%s", name);
|
||||
print_string(PRINT_ANY, name, namefrm, out);
|
||||
}
|
||||
|
|
|
|||
|
|
@ -127,4 +127,8 @@ int action_a2n(char *arg, int *result, bool allow_num);
|
|||
|
||||
bool tc_qdisc_block_exists(__u32 block_index);
|
||||
|
||||
void print_masked_u32(const char *name, struct rtattr *attr,
|
||||
struct rtattr *mask_attr);
|
||||
void print_masked_u16(const char *name, struct rtattr *attr,
|
||||
struct rtattr *mask_attr);
|
||||
#endif
|
||||
|
|
|
|||
Loading…
Reference in New Issue