mirror of
https://git.kernel.org/pub/scm/network/iproute2/iproute2.git
synced 2024-11-15 22:15:13 +08:00
946a135c58
The pedit callback structure table should be iniatialized using structure initialization to avoid structure changes problems. Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
162 lines
3.6 KiB
C
162 lines
3.6 KiB
C
/*
|
|
* p_ip.c packet editor: IPV4 header
|
|
*
|
|
* This program is free software; you can distribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*
|
|
* Authors: J Hadi Salim (hadi@cyberus.ca)
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <string.h>
|
|
#include "utils.h"
|
|
#include "tc_util.h"
|
|
#include "m_pedit.h"
|
|
|
|
static int
|
|
parse_ip(int *argc_p, char ***argv_p,
|
|
struct m_pedit_sel *sel, struct m_pedit_key *tkey)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
tkey->htype = sel->extended ?
|
|
TCA_PEDIT_KEY_EX_HDR_TYPE_IP4 :
|
|
TCA_PEDIT_KEY_EX_HDR_TYPE_NETWORK;
|
|
|
|
if (strcmp(*argv, "src") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 12;
|
|
res = parse_cmd(&argc, &argv, 4, TIPV4, RU32, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "dst") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 16;
|
|
res = parse_cmd(&argc, &argv, 4, TIPV4, RU32, sel, tkey);
|
|
goto done;
|
|
}
|
|
/* jamal - look at these and make them either old or new
|
|
** scheme given diffserv
|
|
** don't forget the CE bit
|
|
*/
|
|
if (strcmp(*argv, "tos") == 0 || matches(*argv, "dsfield") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 1;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, RU8, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "ihl") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 0;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, 0x0f, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "ttl") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 8;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, RU8, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "protocol") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 9;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, RU8, sel, tkey);
|
|
goto done;
|
|
}
|
|
/* jamal - fix this */
|
|
if (matches(*argv, "precedence") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 1;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, RU8, sel, tkey);
|
|
goto done;
|
|
}
|
|
/* jamal - validate this at some point */
|
|
if (strcmp(*argv, "nofrag") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 6;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, 0x3F, sel, tkey);
|
|
goto done;
|
|
}
|
|
/* jamal - validate this at some point */
|
|
if (strcmp(*argv, "firstfrag") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 6;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, 0x1F, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "ce") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 6;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, 0x80, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "df") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 6;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, 0x40, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "mf") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 6;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, 0x20, sel, tkey);
|
|
goto done;
|
|
}
|
|
|
|
if (sel->extended)
|
|
return -1; /* fields located outside IP header should be
|
|
* addressed using the relevant header type in
|
|
* extended pedit kABI
|
|
*/
|
|
|
|
if (strcmp(*argv, "dport") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 22;
|
|
res = parse_cmd(&argc, &argv, 2, TU32, RU16, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "sport") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 20;
|
|
res = parse_cmd(&argc, &argv, 2, TU32, RU16, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "icmp_type") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 20;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, RU8, sel, tkey);
|
|
goto done;
|
|
}
|
|
if (strcmp(*argv, "icmp_code") == 0) {
|
|
NEXT_ARG();
|
|
tkey->off = 20;
|
|
res = parse_cmd(&argc, &argv, 1, TU32, RU8, sel, tkey);
|
|
goto done;
|
|
}
|
|
return -1;
|
|
|
|
done:
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
struct m_pedit_util p_pedit_ip = {
|
|
.id = "ip",
|
|
.parse_peopt = parse_ip,
|
|
};
|