mirror of
https://git.kernel.org/pub/scm/network/iproute2/iproute2.git
synced 2024-11-16 14:35:34 +08:00
40eb737ebb
Add missing spaces around operators to increase readability. Aside from that, make "preference" match a real synonym for "tos" and "dsfield" as it's effect was identical to them. Signed-off-by: Phil Sutter <phil@nwl.cc>
1293 lines
28 KiB
C
1293 lines
28 KiB
C
/*
|
|
* q_u32.c U32 filter.
|
|
*
|
|
* This program is free software; you can u32istribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*
|
|
* Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
|
|
* Match mark added by Catalin(ux aka Dino) BOIE <catab at umbrella.ro> [5 nov 2004]
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <syslog.h>
|
|
#include <fcntl.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <string.h>
|
|
#include <linux/if.h>
|
|
#include <linux/if_ether.h>
|
|
|
|
#include "utils.h"
|
|
#include "tc_util.h"
|
|
|
|
extern int show_pretty;
|
|
|
|
static void explain(void)
|
|
{
|
|
fprintf(stderr, "Usage: ... u32 [ match SELECTOR ... ] [ link HTID ]"
|
|
" [ classid CLASSID ]\n");
|
|
fprintf(stderr, " [ action ACTION_SPEC ]"
|
|
" [ offset OFFSET_SPEC ]\n");
|
|
fprintf(stderr, " [ ht HTID ] [ hashkey HASHKEY_SPEC ]\n");
|
|
fprintf(stderr, " [ sample SAMPLE ]\n");
|
|
fprintf(stderr, "or u32 divisor DIVISOR\n");
|
|
fprintf(stderr, "\n");
|
|
fprintf(stderr, "Where: SELECTOR := SAMPLE SAMPLE ...\n");
|
|
fprintf(stderr, " SAMPLE := { ip | ip6 | udp | tcp | icmp |"
|
|
" u{32|16|8} | mark } SAMPLE_ARGS [divisor DIVISOR]\n");
|
|
fprintf(stderr, " FILTERID := X:Y:Z\n");
|
|
fprintf(stderr, "\nNOTE: CLASSID is parsed at hexadecimal input.\n");
|
|
}
|
|
|
|
static int get_u32_handle(__u32 *handle, const char *str)
|
|
{
|
|
__u32 htid=0, hash=0, nodeid=0;
|
|
char *tmp = strchr(str, ':');
|
|
|
|
if (tmp == NULL) {
|
|
if (memcmp("0x", str, 2) == 0)
|
|
return get_u32(handle, str, 16);
|
|
return -1;
|
|
}
|
|
htid = strtoul(str, &tmp, 16);
|
|
if (tmp == str && *str != ':' && *str != 0)
|
|
return -1;
|
|
if (htid>=0x1000)
|
|
return -1;
|
|
if (*tmp) {
|
|
str = tmp + 1;
|
|
hash = strtoul(str, &tmp, 16);
|
|
if (tmp == str && *str != ':' && *str != 0)
|
|
return -1;
|
|
if (hash>=0x100)
|
|
return -1;
|
|
if (*tmp) {
|
|
str = tmp + 1;
|
|
nodeid = strtoul(str, &tmp, 16);
|
|
if (tmp == str && *str != 0)
|
|
return -1;
|
|
if (nodeid>=0x1000)
|
|
return -1;
|
|
}
|
|
}
|
|
*handle = (htid<<20)|(hash<<12)|nodeid;
|
|
return 0;
|
|
}
|
|
|
|
static char * sprint_u32_handle(__u32 handle, char *buf)
|
|
{
|
|
int bsize = SPRINT_BSIZE-1;
|
|
__u32 htid = TC_U32_HTID(handle);
|
|
__u32 hash = TC_U32_HASH(handle);
|
|
__u32 nodeid = TC_U32_NODE(handle);
|
|
char *b = buf;
|
|
|
|
if (handle == 0) {
|
|
snprintf(b, bsize, "none");
|
|
return b;
|
|
}
|
|
if (htid) {
|
|
int l = snprintf(b, bsize, "%x:", htid>>20);
|
|
bsize -= l;
|
|
b += l;
|
|
}
|
|
if (nodeid|hash) {
|
|
if (hash) {
|
|
int l = snprintf(b, bsize, "%x", hash);
|
|
bsize -= l;
|
|
b += l;
|
|
}
|
|
if (nodeid) {
|
|
int l = snprintf(b, bsize, ":%x", nodeid);
|
|
bsize -= l;
|
|
b += l;
|
|
}
|
|
}
|
|
if (show_raw)
|
|
snprintf(b, bsize, "[%08x] ", handle);
|
|
return buf;
|
|
}
|
|
|
|
static int pack_key(struct tc_u32_sel *sel, __u32 key, __u32 mask,
|
|
int off, int offmask)
|
|
{
|
|
int i;
|
|
int hwm = sel->nkeys;
|
|
|
|
key &= mask;
|
|
|
|
for (i=0; i<hwm; i++) {
|
|
if (sel->keys[i].off == off && sel->keys[i].offmask == offmask) {
|
|
__u32 intersect = mask & sel->keys[i].mask;
|
|
|
|
if ((key ^ sel->keys[i].val) & intersect)
|
|
return -1;
|
|
sel->keys[i].val |= key;
|
|
sel->keys[i].mask |= mask;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (hwm >= 128)
|
|
return -1;
|
|
if (off % 4)
|
|
return -1;
|
|
sel->keys[hwm].val = key;
|
|
sel->keys[hwm].mask = mask;
|
|
sel->keys[hwm].off = off;
|
|
sel->keys[hwm].offmask = offmask;
|
|
sel->nkeys++;
|
|
return 0;
|
|
}
|
|
|
|
static int pack_key32(struct tc_u32_sel *sel, __u32 key, __u32 mask,
|
|
int off, int offmask)
|
|
{
|
|
key = htonl(key);
|
|
mask = htonl(mask);
|
|
return pack_key(sel, key, mask, off, offmask);
|
|
}
|
|
|
|
static int pack_key16(struct tc_u32_sel *sel, __u32 key, __u32 mask,
|
|
int off, int offmask)
|
|
{
|
|
if (key > 0xFFFF || mask > 0xFFFF)
|
|
return -1;
|
|
|
|
if ((off & 3) == 0) {
|
|
key <<= 16;
|
|
mask <<= 16;
|
|
}
|
|
off &= ~3;
|
|
key = htonl(key);
|
|
mask = htonl(mask);
|
|
|
|
return pack_key(sel, key, mask, off, offmask);
|
|
}
|
|
|
|
static int pack_key8(struct tc_u32_sel *sel, __u32 key, __u32 mask, int off, int offmask)
|
|
{
|
|
if (key > 0xFF || mask > 0xFF)
|
|
return -1;
|
|
|
|
if ((off & 3) == 0) {
|
|
key <<= 24;
|
|
mask <<= 24;
|
|
} else if ((off & 3) == 1) {
|
|
key <<= 16;
|
|
mask <<= 16;
|
|
} else if ((off & 3) == 2) {
|
|
key <<= 8;
|
|
mask <<= 8;
|
|
}
|
|
off &= ~3;
|
|
key = htonl(key);
|
|
mask = htonl(mask);
|
|
|
|
return pack_key(sel, key, mask, off, offmask);
|
|
}
|
|
|
|
|
|
static int parse_at(int *argc_p, char ***argv_p, int *off, int *offmask)
|
|
{
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
char *p = *argv;
|
|
|
|
if (argc <= 0)
|
|
return -1;
|
|
|
|
if (strlen(p) > strlen("nexthdr+") &&
|
|
memcmp(p, "nexthdr+", strlen("nexthdr+")) == 0) {
|
|
*offmask = -1;
|
|
p += strlen("nexthdr+");
|
|
} else if (matches(*argv, "nexthdr+") == 0) {
|
|
NEXT_ARG();
|
|
*offmask = -1;
|
|
p = *argv;
|
|
}
|
|
|
|
if (get_integer(off, p, 0))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int parse_u32(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
|
|
int off, int offmask)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
__u32 key;
|
|
__u32 mask;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (get_u32(&key, *argv, 0))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (get_u32(&mask, *argv, 16))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (argc > 0 && strcmp(argv[0], "at") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_at(&argc, &argv, &off, &offmask))
|
|
return -1;
|
|
}
|
|
|
|
res = pack_key32(sel, key, mask, off, offmask);
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_u16(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
|
|
int off, int offmask)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
__u32 key;
|
|
__u32 mask;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (get_u32(&key, *argv, 0))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (get_u32(&mask, *argv, 16))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (argc > 0 && strcmp(argv[0], "at") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_at(&argc, &argv, &off, &offmask))
|
|
return -1;
|
|
}
|
|
res = pack_key16(sel, key, mask, off, offmask);
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_u8(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
|
|
int off, int offmask)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
__u32 key;
|
|
__u32 mask;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (get_u32(&key, *argv, 0))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (get_u32(&mask, *argv, 16))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (key > 0xFF || mask > 0xFF)
|
|
return -1;
|
|
|
|
if (argc > 0 && strcmp(argv[0], "at") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_at(&argc, &argv, &off, &offmask))
|
|
return -1;
|
|
}
|
|
|
|
res = pack_key8(sel, key, mask, off, offmask);
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_ip_addr(int *argc_p, char ***argv_p, struct tc_u32_sel *sel,
|
|
int off)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
inet_prefix addr;
|
|
__u32 mask;
|
|
int offmask = 0;
|
|
|
|
if (argc < 1)
|
|
return -1;
|
|
|
|
if (get_prefix_1(&addr, *argv, AF_INET))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (argc > 0 && strcmp(argv[0], "at") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_at(&argc, &argv, &off, &offmask))
|
|
return -1;
|
|
}
|
|
|
|
mask = 0;
|
|
if (addr.bitlen)
|
|
mask = htonl(0xFFFFFFFF << (32 - addr.bitlen));
|
|
if (pack_key(sel, addr.data[0], mask, off, offmask) < 0)
|
|
return -1;
|
|
res = 0;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_ip6_addr(int *argc_p, char ***argv_p,
|
|
struct tc_u32_sel *sel, int off)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
int plen = 128;
|
|
int i;
|
|
inet_prefix addr;
|
|
int offmask = 0;
|
|
|
|
if (argc < 1)
|
|
return -1;
|
|
|
|
if (get_prefix_1(&addr, *argv, AF_INET6))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (argc > 0 && strcmp(argv[0], "at") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_at(&argc, &argv, &off, &offmask))
|
|
return -1;
|
|
}
|
|
|
|
plen = addr.bitlen;
|
|
for (i = 0; i < plen; i += 32) {
|
|
// if (((i + 31) & ~0x1F) <= plen) {
|
|
if (i + 31 <= plen) {
|
|
res = pack_key(sel, addr.data[i / 32],
|
|
0xFFFFFFFF, off + 4 * (i / 32), offmask);
|
|
if (res < 0)
|
|
return -1;
|
|
} else if (i < plen) {
|
|
__u32 mask = htonl(0xFFFFFFFF << (32 - (plen - i)));
|
|
res = pack_key(sel, addr.data[i / 32],
|
|
mask, off + 4 * (i / 32), offmask);
|
|
if (res < 0)
|
|
return -1;
|
|
}
|
|
}
|
|
res = 0;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_ip6_class(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
__u32 key;
|
|
__u32 mask;
|
|
int off = 0;
|
|
int offmask = 0;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (get_u32(&key, *argv, 0))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (get_u32(&mask, *argv, 16))
|
|
return -1;
|
|
argc--; argv++;
|
|
|
|
if (key > 0xFF || mask > 0xFF)
|
|
return -1;
|
|
|
|
key <<= 20;
|
|
mask <<= 20;
|
|
key = htonl(key);
|
|
mask = htonl(mask);
|
|
|
|
res = pack_key(sel, key, mask, off, offmask);
|
|
if (res < 0)
|
|
return -1;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return 0;
|
|
}
|
|
|
|
static int parse_ether_addr(int *argc_p, char ***argv_p,
|
|
struct tc_u32_sel *sel, int off)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
__u8 addr[6];
|
|
int offmask = 0;
|
|
int i;
|
|
|
|
if (argc < 1)
|
|
return -1;
|
|
|
|
if (sscanf(*argv, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx",
|
|
addr + 0, addr + 1, addr + 2,
|
|
addr + 3, addr + 4, addr + 5) != 6) {
|
|
fprintf(stderr, "parse_ether_addr: improperly formed address '%s'\n",
|
|
*argv);
|
|
return -1;
|
|
}
|
|
|
|
argc--; argv++;
|
|
if (argc > 0 && strcmp(argv[0], "at") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_at(&argc, &argv, &off, &offmask))
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < 6; i++) {
|
|
res = pack_key8(sel, addr[i], 0xFF, off + i, offmask);
|
|
if (res < 0)
|
|
return -1;
|
|
}
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_ip(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (strcmp(*argv, "src") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ip_addr(&argc, &argv, sel, 12);
|
|
} else if (strcmp(*argv, "dst") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ip_addr(&argc, &argv, sel, 16);
|
|
} else if (strcmp(*argv, "tos") == 0 ||
|
|
matches(*argv, "dsfield") == 0 ||
|
|
matches(*argv, "precedence") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 1, 0);
|
|
} else if (strcmp(*argv, "ihl") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 0, 0);
|
|
} else if (strcmp(*argv, "protocol") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 9, 0);
|
|
} else if (strcmp(*argv, "nofrag") == 0) {
|
|
argc--; argv++;
|
|
res = pack_key16(sel, 0, 0x3FFF, 6, 0);
|
|
} else if (strcmp(*argv, "firstfrag") == 0) {
|
|
argc--; argv++;
|
|
res = pack_key16(sel, 0x2000, 0x3FFF, 6, 0);
|
|
} else if (strcmp(*argv, "df") == 0) {
|
|
argc--; argv++;
|
|
res = pack_key16(sel, 0x4000, 0x4000, 6, 0);
|
|
} else if (strcmp(*argv, "mf") == 0) {
|
|
argc--; argv++;
|
|
res = pack_key16(sel, 0x2000, 0x2000, 6, 0);
|
|
} else if (strcmp(*argv, "dport") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u16(&argc, &argv, sel, 22, 0);
|
|
} else if (strcmp(*argv, "sport") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u16(&argc, &argv, sel, 20, 0);
|
|
} else if (strcmp(*argv, "icmp_type") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 20, 0);
|
|
} else if (strcmp(*argv, "icmp_code") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 21, 0);
|
|
} else
|
|
return -1;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_ip6(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (strcmp(*argv, "src") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ip6_addr(&argc, &argv, sel, 8);
|
|
} else if (strcmp(*argv, "dst") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ip6_addr(&argc, &argv, sel, 24);
|
|
} else if (strcmp(*argv, "priority") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ip6_class(&argc, &argv, sel);
|
|
} else if (strcmp(*argv, "protocol") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 6, 0);
|
|
} else if (strcmp(*argv, "flowlabel") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u32(&argc, &argv, sel, 0, 0);
|
|
} else if (strcmp(*argv, "dport") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u16(&argc, &argv, sel, 42, 0);
|
|
} else if (strcmp(*argv, "sport") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u16(&argc, &argv, sel, 40, 0);
|
|
} else if (strcmp(*argv, "icmp_type") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 40, 0);
|
|
} else if (strcmp(*argv, "icmp_code") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 41, 1);
|
|
} else
|
|
return -1;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_ether(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (strcmp(*argv, "src") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ether_addr(&argc, &argv, sel, -8);
|
|
} else if (strcmp(*argv, "dst") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ether_addr(&argc, &argv, sel, -14);
|
|
} else {
|
|
fprintf(stderr, "Unknown match: ether %s\n", *argv);
|
|
return -1;
|
|
}
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
#define parse_tcp parse_udp
|
|
static int parse_udp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (strcmp(*argv, "src") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u16(&argc, &argv, sel, 0, -1);
|
|
} else if (strcmp(*argv, "dst") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u16(&argc, &argv, sel, 2, -1);
|
|
} else
|
|
return -1;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
|
|
static int parse_icmp(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
if (argc < 2)
|
|
return -1;
|
|
|
|
if (strcmp(*argv, "type") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 0, -1);
|
|
} else if (strcmp(*argv, "code") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 1, -1);
|
|
} else
|
|
return -1;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_mark(int *argc_p, char ***argv_p, struct nlmsghdr *n)
|
|
{
|
|
int res = -1;
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
struct tc_u32_mark mark;
|
|
|
|
if (argc <= 1)
|
|
return -1;
|
|
|
|
if (get_u32(&mark.val, *argv, 0)) {
|
|
fprintf(stderr, "Illegal \"mark\" value\n");
|
|
return -1;
|
|
}
|
|
NEXT_ARG();
|
|
|
|
if (get_u32(&mark.mask, *argv, 0)) {
|
|
fprintf(stderr, "Illegal \"mark\" mask\n");
|
|
return -1;
|
|
}
|
|
NEXT_ARG();
|
|
|
|
if ((mark.val & mark.mask) != mark.val) {
|
|
fprintf(stderr, "Illegal \"mark\" (impossible combination)\n");
|
|
return -1;
|
|
}
|
|
|
|
addattr_l(n, MAX_MSG, TCA_U32_MARK, &mark, sizeof(mark));
|
|
res = 0;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_selector(int *argc_p, char ***argv_p,
|
|
struct tc_u32_sel *sel, struct nlmsghdr *n)
|
|
{
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
int res = -1;
|
|
|
|
if (argc <= 0)
|
|
return -1;
|
|
|
|
if (matches(*argv, "u32") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u32(&argc, &argv, sel, 0, 0);
|
|
} else if (matches(*argv, "u16") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u16(&argc, &argv, sel, 0, 0);
|
|
} else if (matches(*argv, "u8") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_u8(&argc, &argv, sel, 0, 0);
|
|
} else if (matches(*argv, "ip") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ip(&argc, &argv, sel);
|
|
} else if (matches(*argv, "ip6") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ip6(&argc, &argv, sel);
|
|
} else if (matches(*argv, "udp") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_udp(&argc, &argv, sel);
|
|
} else if (matches(*argv, "tcp") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_tcp(&argc, &argv, sel);
|
|
} else if (matches(*argv, "icmp") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_icmp(&argc, &argv, sel);
|
|
} else if (matches(*argv, "mark") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_mark(&argc, &argv, n);
|
|
} else if (matches(*argv, "ether") == 0) {
|
|
NEXT_ARG();
|
|
res = parse_ether(&argc, &argv, sel);
|
|
} else
|
|
return -1;
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return res;
|
|
}
|
|
|
|
static int parse_offset(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
while (argc > 0) {
|
|
if (matches(*argv, "plus") == 0) {
|
|
int off;
|
|
NEXT_ARG();
|
|
if (get_integer(&off, *argv, 0))
|
|
return -1;
|
|
sel->off = off;
|
|
sel->flags |= TC_U32_OFFSET;
|
|
} else if (matches(*argv, "at") == 0) {
|
|
int off;
|
|
NEXT_ARG();
|
|
if (get_integer(&off, *argv, 0))
|
|
return -1;
|
|
sel->offoff = off;
|
|
if (off%2) {
|
|
fprintf(stderr, "offset \"at\" must be even\n");
|
|
return -1;
|
|
}
|
|
sel->flags |= TC_U32_VAROFFSET;
|
|
} else if (matches(*argv, "mask") == 0) {
|
|
__u16 mask;
|
|
NEXT_ARG();
|
|
if (get_u16(&mask, *argv, 16))
|
|
return -1;
|
|
sel->offmask = htons(mask);
|
|
sel->flags |= TC_U32_VAROFFSET;
|
|
} else if (matches(*argv, "shift") == 0) {
|
|
int shift;
|
|
NEXT_ARG();
|
|
if (get_integer(&shift, *argv, 0))
|
|
return -1;
|
|
sel->offshift = shift;
|
|
sel->flags |= TC_U32_VAROFFSET;
|
|
} else if (matches(*argv, "eat") == 0) {
|
|
sel->flags |= TC_U32_EAT;
|
|
} else {
|
|
break;
|
|
}
|
|
argc--; argv++;
|
|
}
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return 0;
|
|
}
|
|
|
|
static int parse_hashkey(int *argc_p, char ***argv_p, struct tc_u32_sel *sel)
|
|
{
|
|
int argc = *argc_p;
|
|
char **argv = *argv_p;
|
|
|
|
while (argc > 0) {
|
|
if (matches(*argv, "mask") == 0) {
|
|
__u32 mask;
|
|
NEXT_ARG();
|
|
if (get_u32(&mask, *argv, 16))
|
|
return -1;
|
|
sel->hmask = htonl(mask);
|
|
} else if (matches(*argv, "at") == 0) {
|
|
int num;
|
|
NEXT_ARG();
|
|
if (get_integer(&num, *argv, 0))
|
|
return -1;
|
|
if (num%4)
|
|
return -1;
|
|
sel->hoff = num;
|
|
} else {
|
|
break;
|
|
}
|
|
argc--; argv++;
|
|
}
|
|
|
|
*argc_p = argc;
|
|
*argv_p = argv;
|
|
return 0;
|
|
}
|
|
|
|
static void print_ipv4(FILE *f, const struct tc_u32_key *key)
|
|
{
|
|
char abuf[256];
|
|
|
|
switch (key->off) {
|
|
case 0:
|
|
switch (ntohl(key->mask)) {
|
|
case 0x0f000000:
|
|
fprintf(f, "\n match IP ihl %u", ntohl(key->val) >> 24);
|
|
return;
|
|
case 0x00ff0000:
|
|
fprintf(f, "\n match IP dsfield %#x", ntohl(key->val) >> 16);
|
|
return;
|
|
}
|
|
break;
|
|
case 8:
|
|
if (ntohl(key->mask) == 0x00ff0000) {
|
|
fprintf(f, "\n match IP protocol %d", ntohl(key->val) >> 16);
|
|
return;
|
|
}
|
|
break;
|
|
case 12:
|
|
case 16: {
|
|
int bits = mask2bits(key->mask);
|
|
if (bits >= 0) {
|
|
fprintf(f, "\n %s %s/%d",
|
|
key->off == 12 ? "match IP src" : "match IP dst",
|
|
inet_ntop(AF_INET, &key->val,
|
|
abuf, sizeof(abuf)),
|
|
bits);
|
|
return;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case 20:
|
|
switch (ntohl(key->mask)) {
|
|
case 0x0000ffff:
|
|
fprintf(f, "\n match dport %u",
|
|
ntohl(key->val) & 0xffff);
|
|
return;
|
|
case 0xffff0000:
|
|
fprintf(f, "\n match sport %u",
|
|
ntohl(key->val) >> 16);
|
|
return;
|
|
case 0xffffffff:
|
|
fprintf(f, "\n match dport %u, match sport %u",
|
|
ntohl(key->val) & 0xffff,
|
|
ntohl(key->val) >> 16);
|
|
|
|
return;
|
|
}
|
|
/* XXX: Default print_raw */
|
|
}
|
|
}
|
|
|
|
static void print_ipv6(FILE *f, const struct tc_u32_key *key)
|
|
{
|
|
char abuf[256];
|
|
|
|
switch (key->off) {
|
|
case 0:
|
|
switch (ntohl(key->mask)) {
|
|
case 0x0f000000:
|
|
fprintf(f, "\n match IP ihl %u", ntohl(key->val) >> 24);
|
|
return;
|
|
case 0x00ff0000:
|
|
fprintf(f, "\n match IP dsfield %#x", ntohl(key->val) >> 16);
|
|
return;
|
|
}
|
|
break;
|
|
case 8:
|
|
if (ntohl(key->mask) == 0x00ff0000) {
|
|
fprintf(f, "\n match IP protocol %d", ntohl(key->val) >> 16);
|
|
return;
|
|
}
|
|
break;
|
|
case 12:
|
|
case 16: {
|
|
int bits = mask2bits(key->mask);
|
|
if (bits >= 0) {
|
|
fprintf(f, "\n %s %s/%d",
|
|
key->off == 12 ? "match IP src" : "match IP dst",
|
|
inet_ntop(AF_INET, &key->val,
|
|
abuf, sizeof(abuf)),
|
|
bits);
|
|
return;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case 20:
|
|
switch (ntohl(key->mask)) {
|
|
case 0x0000ffff:
|
|
fprintf(f, "\n match sport %u",
|
|
ntohl(key->val) & 0xffff);
|
|
return;
|
|
case 0xffff0000:
|
|
fprintf(f, "\n match dport %u",
|
|
ntohl(key->val) >> 16);
|
|
return;
|
|
case 0xffffffff:
|
|
fprintf(f, "\n match sport %u, match dport %u",
|
|
ntohl(key->val) & 0xffff,
|
|
ntohl(key->val) >> 16);
|
|
|
|
return;
|
|
}
|
|
/* XXX: Default print_raw */
|
|
}
|
|
}
|
|
|
|
static void print_raw(FILE *f, const struct tc_u32_key *key)
|
|
{
|
|
fprintf(f, "\n match %08x/%08x at %s%d",
|
|
(unsigned int)ntohl(key->val),
|
|
(unsigned int)ntohl(key->mask),
|
|
key->offmask ? "nexthdr+" : "",
|
|
key->off);
|
|
}
|
|
|
|
static const struct {
|
|
__u16 proto;
|
|
__u16 pad;
|
|
void (*pprinter)(FILE *f, const struct tc_u32_key *key);
|
|
} u32_pprinters[] = {
|
|
{0, 0, print_raw},
|
|
{ETH_P_IP, 0, print_ipv4},
|
|
{ETH_P_IPV6, 0, print_ipv6},
|
|
};
|
|
|
|
static void show_keys(FILE *f, const struct tc_u32_key *key)
|
|
{
|
|
int i = 0;
|
|
|
|
if (!show_pretty)
|
|
goto show_k;
|
|
|
|
for (i = 0; i < sizeof(u32_pprinters) / sizeof(u32_pprinters[0]); i++) {
|
|
if (u32_pprinters[i].proto == ntohs(f_proto)) {
|
|
show_k:
|
|
u32_pprinters[i].pprinter(f, key);
|
|
return;
|
|
}
|
|
}
|
|
|
|
i = 0;
|
|
goto show_k;
|
|
}
|
|
|
|
static int u32_parse_opt(struct filter_util *qu, char *handle,
|
|
int argc, char **argv, struct nlmsghdr *n)
|
|
{
|
|
struct {
|
|
struct tc_u32_sel sel;
|
|
struct tc_u32_key keys[128];
|
|
} sel;
|
|
struct tcmsg *t = NLMSG_DATA(n);
|
|
struct rtattr *tail;
|
|
int sel_ok = 0, terminal_ok = 0;
|
|
int sample_ok = 0;
|
|
__u32 htid = 0;
|
|
__u32 order = 0;
|
|
|
|
memset(&sel, 0, sizeof(sel));
|
|
|
|
if (handle && get_u32_handle(&t->tcm_handle, handle)) {
|
|
fprintf(stderr, "Illegal filter ID\n");
|
|
return -1;
|
|
}
|
|
|
|
if (argc == 0)
|
|
return 0;
|
|
|
|
tail = NLMSG_TAIL(n);
|
|
addattr_l(n, MAX_MSG, TCA_OPTIONS, NULL, 0);
|
|
|
|
while (argc > 0) {
|
|
if (matches(*argv, "match") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_selector(&argc, &argv, &sel.sel, n)) {
|
|
fprintf(stderr, "Illegal \"match\"\n");
|
|
return -1;
|
|
}
|
|
sel_ok++;
|
|
continue;
|
|
} else if (matches(*argv, "offset") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_offset(&argc, &argv, &sel.sel)) {
|
|
fprintf(stderr, "Illegal \"offset\"\n");
|
|
return -1;
|
|
}
|
|
continue;
|
|
} else if (matches(*argv, "hashkey") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_hashkey(&argc, &argv, &sel.sel)) {
|
|
fprintf(stderr, "Illegal \"hashkey\"\n");
|
|
return -1;
|
|
}
|
|
continue;
|
|
} else if (matches(*argv, "classid") == 0 ||
|
|
strcmp(*argv, "flowid") == 0) {
|
|
unsigned handle;
|
|
NEXT_ARG();
|
|
if (get_tc_classid(&handle, *argv)) {
|
|
fprintf(stderr, "Illegal \"classid\"\n");
|
|
return -1;
|
|
}
|
|
addattr_l(n, MAX_MSG, TCA_U32_CLASSID, &handle, 4);
|
|
sel.sel.flags |= TC_U32_TERMINAL;
|
|
} else if (matches(*argv, "divisor") == 0) {
|
|
unsigned divisor;
|
|
NEXT_ARG();
|
|
if (get_unsigned(&divisor, *argv, 0) ||
|
|
divisor == 0 ||
|
|
divisor > 0x100 || ((divisor - 1) & divisor)) {
|
|
fprintf(stderr, "Illegal \"divisor\"\n");
|
|
return -1;
|
|
}
|
|
addattr_l(n, MAX_MSG, TCA_U32_DIVISOR, &divisor, 4);
|
|
} else if (matches(*argv, "order") == 0) {
|
|
NEXT_ARG();
|
|
if (get_u32(&order, *argv, 0)) {
|
|
fprintf(stderr, "Illegal \"order\"\n");
|
|
return -1;
|
|
}
|
|
} else if (strcmp(*argv, "link") == 0) {
|
|
unsigned handle;
|
|
NEXT_ARG();
|
|
if (get_u32_handle(&handle, *argv)) {
|
|
fprintf(stderr, "Illegal \"link\"\n");
|
|
return -1;
|
|
}
|
|
if (handle && TC_U32_NODE(handle)) {
|
|
fprintf(stderr, "\"link\" must be a hash table.\n");
|
|
return -1;
|
|
}
|
|
addattr_l(n, MAX_MSG, TCA_U32_LINK, &handle, 4);
|
|
} else if (strcmp(*argv, "ht") == 0) {
|
|
unsigned handle;
|
|
NEXT_ARG();
|
|
if (get_u32_handle(&handle, *argv)) {
|
|
fprintf(stderr, "Illegal \"ht\"\n");
|
|
return -1;
|
|
}
|
|
if (handle && TC_U32_NODE(handle)) {
|
|
fprintf(stderr, "\"ht\" must be a hash table.\n");
|
|
return -1;
|
|
}
|
|
if (sample_ok)
|
|
htid = (htid & 0xFF000) | (handle & 0xFFF00000);
|
|
else
|
|
htid = (handle & 0xFFFFF000);
|
|
} else if (strcmp(*argv, "sample") == 0) {
|
|
__u32 hash;
|
|
unsigned divisor = 0x100;
|
|
|
|
struct {
|
|
struct tc_u32_sel sel;
|
|
struct tc_u32_key keys[4];
|
|
} sel2;
|
|
memset(&sel2, 0, sizeof(sel2));
|
|
NEXT_ARG();
|
|
if (parse_selector(&argc, &argv, &sel2.sel, n)) {
|
|
fprintf(stderr, "Illegal \"sample\"\n");
|
|
return -1;
|
|
}
|
|
if (sel2.sel.nkeys != 1) {
|
|
fprintf(stderr, "\"sample\" must contain"
|
|
" exactly ONE key.\n");
|
|
return -1;
|
|
}
|
|
if (*argv != 0 && strcmp(*argv, "divisor") == 0) {
|
|
NEXT_ARG();
|
|
if (get_unsigned(&divisor, *argv, 0) || divisor == 0 ||
|
|
divisor > 0x100 || ((divisor - 1) & divisor)) {
|
|
fprintf(stderr, "Illegal sample \"divisor\"\n");
|
|
return -1;
|
|
}
|
|
NEXT_ARG();
|
|
}
|
|
hash = sel2.sel.keys[0].val & sel2.sel.keys[0].mask;
|
|
hash ^= hash >> 16;
|
|
hash ^= hash >> 8;
|
|
htid = ((hash % divisor) << 12) | (htid & 0xFFF00000);
|
|
sample_ok = 1;
|
|
continue;
|
|
} else if (strcmp(*argv, "indev") == 0) {
|
|
char ind[IFNAMSIZ + 1];
|
|
memset(ind, 0, sizeof (ind));
|
|
argc--;
|
|
argv++;
|
|
if (argc < 1) {
|
|
fprintf(stderr, "Illegal indev\n");
|
|
return -1;
|
|
}
|
|
strncpy(ind, *argv, sizeof (ind) - 1);
|
|
addattr_l(n, MAX_MSG, TCA_U32_INDEV, ind, strlen(ind) + 1);
|
|
|
|
} else if (matches(*argv, "action") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_action(&argc, &argv, TCA_U32_ACT, n)) {
|
|
fprintf(stderr, "Illegal \"action\"\n");
|
|
return -1;
|
|
}
|
|
terminal_ok++;
|
|
continue;
|
|
|
|
} else if (matches(*argv, "police") == 0) {
|
|
NEXT_ARG();
|
|
if (parse_police(&argc, &argv, TCA_U32_POLICE, n)) {
|
|
fprintf(stderr, "Illegal \"police\"\n");
|
|
return -1;
|
|
}
|
|
terminal_ok++;
|
|
continue;
|
|
} else if (strcmp(*argv, "help") == 0) {
|
|
explain();
|
|
return -1;
|
|
} else {
|
|
fprintf(stderr, "What is \"%s\"?\n", *argv);
|
|
explain();
|
|
return -1;
|
|
}
|
|
argc--; argv++;
|
|
}
|
|
|
|
/* We dont necessarily need class/flowids */
|
|
if (terminal_ok)
|
|
sel.sel.flags |= TC_U32_TERMINAL;
|
|
|
|
if (order) {
|
|
if (TC_U32_NODE(t->tcm_handle) && order != TC_U32_NODE(t->tcm_handle)) {
|
|
fprintf(stderr, "\"order\" contradicts \"handle\"\n");
|
|
return -1;
|
|
}
|
|
t->tcm_handle |= order;
|
|
}
|
|
|
|
if (htid)
|
|
addattr_l(n, MAX_MSG, TCA_U32_HASH, &htid, 4);
|
|
if (sel_ok)
|
|
addattr_l(n, MAX_MSG, TCA_U32_SEL, &sel,
|
|
sizeof(sel.sel) + sel.sel.nkeys * sizeof(struct tc_u32_key));
|
|
tail->rta_len = (void *) NLMSG_TAIL(n) - (void *) tail;
|
|
return 0;
|
|
}
|
|
|
|
static int u32_print_opt(struct filter_util *qu, FILE *f, struct rtattr *opt,
|
|
__u32 handle)
|
|
{
|
|
struct rtattr *tb[TCA_U32_MAX + 1];
|
|
struct tc_u32_sel *sel = NULL;
|
|
struct tc_u32_pcnt *pf = NULL;
|
|
|
|
if (opt == NULL)
|
|
return 0;
|
|
|
|
parse_rtattr_nested(tb, TCA_U32_MAX, opt);
|
|
|
|
if (handle) {
|
|
SPRINT_BUF(b1);
|
|
fprintf(f, "fh %s ", sprint_u32_handle(handle, b1));
|
|
}
|
|
if (TC_U32_NODE(handle)) {
|
|
fprintf(f, "order %d ", TC_U32_NODE(handle));
|
|
}
|
|
|
|
if (tb[TCA_U32_SEL]) {
|
|
if (RTA_PAYLOAD(tb[TCA_U32_SEL]) < sizeof(*sel))
|
|
return -1;
|
|
|
|
sel = RTA_DATA(tb[TCA_U32_SEL]);
|
|
}
|
|
|
|
if (tb[TCA_U32_DIVISOR]) {
|
|
fprintf(f, "ht divisor %d ", rta_getattr_u32(tb[TCA_U32_DIVISOR]));
|
|
} else if (tb[TCA_U32_HASH]) {
|
|
__u32 htid = rta_getattr_u32(tb[TCA_U32_HASH]);
|
|
fprintf(f, "key ht %x bkt %x ", TC_U32_USERHTID(htid),
|
|
TC_U32_HASH(htid));
|
|
} else {
|
|
fprintf(f, "??? ");
|
|
}
|
|
if (tb[TCA_U32_CLASSID]) {
|
|
SPRINT_BUF(b1);
|
|
fprintf(f, "%sflowid %s ",
|
|
!sel || !(sel->flags & TC_U32_TERMINAL) ? "*" : "",
|
|
sprint_tc_classid(rta_getattr_u32(tb[TCA_U32_CLASSID]), b1));
|
|
} else if (sel && sel->flags & TC_U32_TERMINAL) {
|
|
fprintf(f, "terminal flowid ??? ");
|
|
}
|
|
if (tb[TCA_U32_LINK]) {
|
|
SPRINT_BUF(b1);
|
|
fprintf(f, "link %s ",
|
|
sprint_u32_handle(rta_getattr_u32(tb[TCA_U32_LINK]), b1));
|
|
}
|
|
|
|
if (tb[TCA_U32_PCNT]) {
|
|
if (RTA_PAYLOAD(tb[TCA_U32_PCNT]) < sizeof(*pf)) {
|
|
fprintf(f, "Broken perf counters \n");
|
|
return -1;
|
|
}
|
|
pf = RTA_DATA(tb[TCA_U32_PCNT]);
|
|
}
|
|
|
|
if (sel && show_stats && NULL != pf)
|
|
fprintf(f, " (rule hit %llu success %llu)",
|
|
(unsigned long long) pf->rcnt,
|
|
(unsigned long long) pf->rhit);
|
|
|
|
if (tb[TCA_U32_MARK]) {
|
|
struct tc_u32_mark *mark = RTA_DATA(tb[TCA_U32_MARK]);
|
|
if (RTA_PAYLOAD(tb[TCA_U32_MARK]) < sizeof(*mark)) {
|
|
fprintf(f, "\n Invalid mark (kernel&iproute2 mismatch)\n");
|
|
} else {
|
|
fprintf(f, "\n mark 0x%04x 0x%04x (success %d)",
|
|
mark->val, mark->mask, mark->success);
|
|
}
|
|
}
|
|
|
|
if (sel) {
|
|
if (sel->nkeys) {
|
|
int i;
|
|
for (i=0; i<sel->nkeys; i++) {
|
|
show_keys(f, sel->keys + i);
|
|
if (show_stats && NULL != pf)
|
|
fprintf(f, " (success %llu ) ",
|
|
(unsigned long long) pf->kcnts[i]);
|
|
}
|
|
}
|
|
|
|
if (sel->flags & (TC_U32_VAROFFSET | TC_U32_OFFSET)) {
|
|
fprintf(f, "\n offset ");
|
|
if (sel->flags & TC_U32_VAROFFSET)
|
|
fprintf(f, "%04x>>%d at %d ",
|
|
ntohs(sel->offmask),
|
|
sel->offshift, sel->offoff);
|
|
if (sel->off)
|
|
fprintf(f, "plus %d ", sel->off);
|
|
}
|
|
if (sel->flags & TC_U32_EAT)
|
|
fprintf(f, " eat ");
|
|
|
|
if (sel->hmask) {
|
|
fprintf(f, "\n hash mask %08x at %d ",
|
|
(unsigned int)htonl(sel->hmask), sel->hoff);
|
|
}
|
|
}
|
|
|
|
if (tb[TCA_U32_POLICE]) {
|
|
fprintf(f, "\n");
|
|
tc_print_police(f, tb[TCA_U32_POLICE]);
|
|
}
|
|
if (tb[TCA_U32_INDEV]) {
|
|
struct rtattr *idev = tb[TCA_U32_INDEV];
|
|
fprintf(f, "\n input dev %s\n", rta_getattr_str(idev));
|
|
}
|
|
if (tb[TCA_U32_ACT]) {
|
|
tc_print_action(f, tb[TCA_U32_ACT]);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct filter_util u32_filter_util = {
|
|
.id = "u32",
|
|
.parse_fopt = u32_parse_opt,
|
|
.print_fopt = u32_print_opt,
|
|
};
|