From 54254071d12482d0874dead2e49d1cb03076d3f9 Mon Sep 17 00:00:00 2001 From: Patrick McHardy Date: Sun, 12 Apr 2015 20:17:51 +0100 Subject: expr: add support for the dynset expr Signed-off-by: Patrick McHardy --- src/expr/dynset.c | 317 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 317 insertions(+) create mode 100644 src/expr/dynset.c (limited to 'src/expr/dynset.c') diff --git a/src/expr/dynset.c b/src/expr/dynset.c new file mode 100644 index 0000000..a2c1946 --- /dev/null +++ b/src/expr/dynset.c @@ -0,0 +1,317 @@ +/* + * Copyright (c) 2014, 2015 Patrick McHardy + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published + * by the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + */ + +#include "internal.h" + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include "data_reg.h" +#include "expr_ops.h" +#include + +#ifndef IFNAMSIZ +#define IFNAMSIZ 16 +#endif + +struct nft_expr_dynset { + enum nft_registers sreg_key; + enum nft_registers sreg_data; + enum nft_dynset_ops op; + uint64_t timeout; + char set_name[IFNAMSIZ]; + uint32_t set_id; +}; + +static int +nft_rule_expr_dynset_set(struct nft_rule_expr *e, uint16_t type, + const void *data, uint32_t data_len) +{ + struct nft_expr_dynset *dynset = nft_expr_data(e); + + switch (type) { + case NFT_EXPR_DYNSET_SREG_KEY: + dynset->sreg_key = *((uint32_t *)data); + break; + case NFT_EXPR_DYNSET_SREG_DATA: + dynset->sreg_data = *((uint32_t *)data); + break; + case NFT_EXPR_DYNSET_OP: + dynset->op = *((uint32_t *)data); + break; + case NFT_EXPR_DYNSET_TIMEOUT: + dynset->timeout = *((uint64_t *)data); + break; + case NFT_EXPR_DYNSET_SET_NAME: + snprintf(dynset->set_name, sizeof(dynset->set_name), "%s", + (const char *)data); + break; + case NFT_EXPR_DYNSET_SET_ID: + dynset->set_id = *((uint32_t *)data); + break; + default: + return -1; + } + return 0; +} + +static const void * +nft_rule_expr_dynset_get(const struct nft_rule_expr *e, uint16_t type, + uint32_t *data_len) +{ + struct nft_expr_dynset *dynset = nft_expr_data(e); + + switch (type) { + case NFT_EXPR_DYNSET_SREG_KEY: + *data_len = sizeof(dynset->sreg_key); + return &dynset->sreg_key; + case NFT_EXPR_DYNSET_SREG_DATA: + *data_len = sizeof(dynset->sreg_data); + return &dynset->sreg_data; + case NFT_EXPR_DYNSET_OP: + *data_len = sizeof(dynset->op); + return &dynset->op; + case NFT_EXPR_DYNSET_TIMEOUT: + *data_len = sizeof(dynset->timeout); + return &dynset->timeout; + case NFT_EXPR_DYNSET_SET_NAME: + return dynset->set_name; + case NFT_EXPR_DYNSET_SET_ID: + return &dynset->set_id; + } + return NULL; +} + +static int nft_rule_expr_dynset_cb(const struct nlattr *attr, void *data) +{ + const struct nlattr **tb = data; + int type = mnl_attr_get_type(attr); + + if (mnl_attr_type_valid(attr, NFTA_SET_MAX) < 0) + return MNL_CB_OK; + + switch (type) { + case NFTA_DYNSET_SREG_KEY: + case NFTA_DYNSET_SREG_DATA: + case NFTA_DYNSET_SET_ID: + case NFTA_DYNSET_OP: + if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0) + abi_breakage(); + break; + case NFTA_DYNSET_TIMEOUT: + if (mnl_attr_validate(attr, MNL_TYPE_U64) < 0) + abi_breakage(); + break; + case NFTA_DYNSET_SET_NAME: + if (mnl_attr_validate(attr, MNL_TYPE_STRING) < 0) + abi_breakage(); + break; + } + + tb[type] = attr; + return MNL_CB_OK; +} + +static void +nft_rule_expr_dynset_build(struct nlmsghdr *nlh, struct nft_rule_expr *e) +{ + struct nft_expr_dynset *dynset = nft_expr_data(e); + + if (e->flags & (1 << NFT_EXPR_DYNSET_SREG_KEY)) + mnl_attr_put_u32(nlh, NFTA_DYNSET_SREG_KEY, htonl(dynset->sreg_key)); + if (e->flags & (1 << NFT_EXPR_DYNSET_SREG_DATA)) + mnl_attr_put_u32(nlh, NFTA_DYNSET_SREG_DATA, htonl(dynset->sreg_data)); + if (e->flags & (1 << NFT_EXPR_DYNSET_OP)) + mnl_attr_put_u32(nlh, NFTA_DYNSET_OP, htonl(dynset->op)); + if (e->flags & (1 << NFT_EXPR_DYNSET_TIMEOUT)) + mnl_attr_put_u64(nlh, NFTA_DYNSET_TIMEOUT, htobe64(dynset->timeout)); + if (e->flags & (1 << NFT_EXPR_DYNSET_SET_NAME)) + mnl_attr_put_strz(nlh, NFTA_DYNSET_SET_NAME, dynset->set_name); + if (e->flags & (1 << NFT_EXPR_DYNSET_SET_ID)) + mnl_attr_put_u32(nlh, NFTA_DYNSET_SET_ID, htonl(dynset->set_id)); +} + +static int +nft_rule_expr_dynset_parse(struct nft_rule_expr *e, struct nlattr *attr) +{ + struct nft_expr_dynset *dynset = nft_expr_data(e); + struct nlattr *tb[NFTA_SET_MAX+1] = {}; + int ret = 0; + + if (mnl_attr_parse_nested(attr, nft_rule_expr_dynset_cb, tb) < 0) + return -1; + + if (tb[NFTA_DYNSET_SREG_KEY]) { + dynset->sreg_key = ntohl(mnl_attr_get_u32(tb[NFTA_DYNSET_SREG_KEY])); + e->flags |= (1 << NFT_EXPR_DYNSET_SREG_KEY); + } + if (tb[NFTA_DYNSET_SREG_DATA]) { + dynset->sreg_data = ntohl(mnl_attr_get_u32(tb[NFTA_DYNSET_SREG_DATA])); + e->flags |= (1 << NFT_EXPR_DYNSET_SREG_DATA); + } + if (tb[NFTA_DYNSET_OP]) { + dynset->op = ntohl(mnl_attr_get_u32(tb[NFTA_DYNSET_OP])); + e->flags |= (1 << NFT_EXPR_DYNSET_OP); + } + if (tb[NFTA_DYNSET_TIMEOUT]) { + dynset->timeout = be64toh(mnl_attr_get_u64(tb[NFTA_DYNSET_TIMEOUT])); + e->flags |= (1 << NFT_EXPR_DYNSET_TIMEOUT); + } + if (tb[NFTA_DYNSET_SET_NAME]) { + strcpy(dynset->set_name, mnl_attr_get_str(tb[NFTA_DYNSET_SET_NAME])); + e->flags |= (1 << NFT_EXPR_DYNSET_SET_NAME); + } + if (tb[NFTA_DYNSET_SET_ID]) { + dynset->set_id = ntohl(mnl_attr_get_u32(tb[NFTA_DYNSET_SET_ID])); + e->flags |= (1 << NFT_EXPR_DYNSET_SET_ID); + } + + return ret; +} + +static int +nft_rule_expr_dynset_json_parse(struct nft_rule_expr *e, json_t *root, + struct nft_parse_err *err) +{ +#ifdef JSON_PARSING + const char *set_name; + uint32_t sreg, dreg; + + set_name = nft_jansson_parse_str(root, "set", err); + if (set_name != NULL) + nft_rule_expr_dynset_str(e, NFT_EXPR_DYNSET_SET, set_name); + + if (nft_jansson_parse_reg(root, "sreg", NFT_TYPE_U32, &sreg, err) == 0) + nft_rule_expr_dynset_u32(e, NFT_EXPR_DYNSET_SREG, sreg); + + if (nft_jansson_parse_reg(root, "dreg", NFT_TYPE_U32, &dreg, err) == 0) + nft_rule_expr_dynset_u32(e, NFT_EXPR_DYNSET_DREG, dreg); + + return 0; +#else + errno = EOPNOTSUPP; + return -1; +#endif +} + +static int +nft_rule_expr_dynset_xml_parse(struct nft_rule_expr *e, mxml_node_t *tree, + struct nft_parse_err *err) +{ +#ifdef XML_PARSING + const char *set_name; + uint32_t sreg, dreg; + + set_name = nft_mxml_str_parse(tree, "set", MXML_DESCEND_FIRST, + NFT_XML_MAND, err); + if (set_name != NULL) + nft_rule_expr_dynset_str(e, NFT_EXPR_DYNSET_SET, set_name); + + if (nft_mxml_reg_parse(tree, "sreg", &sreg, MXML_DESCEND, NFT_XML_MAND, + err) == 0) + nft_rule_expr_dynset_u32(e, NFT_EXPR_DYNSET_SREG, sreg); + + if (nft_mxml_reg_parse(tree, "dreg", &dreg, MXML_DESCEND, NFT_XML_OPT, + err) == 0) + nft_rule_expr_dynset_u32(e, NFT_EXPR_DYNSET_DREG, dreg); + + return 0; +#else + errno = EOPNOTSUPP; + return -1; +#endif +} + +static int +nft_rule_expr_dynset_export(char *buf, size_t size, + struct nft_rule_expr *e, int type) +{ + struct nft_expr_dynset *dynset = nft_expr_data(e); + NFT_BUF_INIT(b, buf, size); + + if (e->flags & (1 << NFT_EXPR_DYNSET_SET_NAME)) + nft_buf_str(&b, type, dynset->set_name, SET_NAME); + if (e->flags & (1 << NFT_EXPR_DYNSET_SREG_KEY)) + nft_buf_u32(&b, type, dynset->sreg_key, SREG_KEY); + if (e->flags & (1 << NFT_EXPR_DYNSET_SREG_DATA)) + nft_buf_u32(&b, type, dynset->sreg_data, SREG_DATA); + + return nft_buf_done(&b); +} + +static char *op2str_array[] = { + [NFT_DYNSET_OP_ADD] = "add", + [NFT_DYNSET_OP_UPDATE] = "update", +}; + +static const char *op2str(enum nft_dynset_ops op) +{ + if (op > NFT_DYNSET_OP_UPDATE) + return "unknown"; + return op2str_array[op]; +} + +static int +nft_rule_expr_dynset_snprintf_default(char *buf, size_t size, + struct nft_rule_expr *e) +{ + struct nft_expr_dynset *dynset = nft_expr_data(e); + int len = size, offset = 0, ret; + + ret = snprintf(buf, len, "%s reg_key %u set %s ", + op2str(dynset->op), dynset->sreg_key, dynset->set_name); + SNPRINTF_BUFFER_SIZE(ret, size, len, offset); + + if (e->flags & (1 << NFT_EXPR_DYNSET_SREG_DATA)) { + ret = snprintf(buf+offset, len, "sreg_data %u ", dynset->sreg_data); + SNPRINTF_BUFFER_SIZE(ret, size, len, offset); + } + if (e->flags & (1 << NFT_EXPR_DYNSET_TIMEOUT)) { + ret = snprintf(buf+offset, len, "timeout %"PRIu64"ms ", + dynset->timeout); + SNPRINTF_BUFFER_SIZE(ret, size, len, offset); + } + return offset; +} + +static int +nft_rule_expr_dynset_snprintf(char *buf, size_t size, uint32_t type, + uint32_t flags, struct nft_rule_expr *e) +{ + + switch (type) { + case NFT_OUTPUT_DEFAULT: + return nft_rule_expr_dynset_snprintf_default(buf, size, e); + case NFT_OUTPUT_XML: + case NFT_OUTPUT_JSON: + return nft_rule_expr_dynset_export(buf, size, e, type); + default: + break; + } + return -1; +} + +struct expr_ops expr_ops_dynset = { + .name = "dynset", + .alloc_len = sizeof(struct nft_expr_dynset), + .max_attr = NFTA_DYNSET_MAX, + .set = nft_rule_expr_dynset_set, + .get = nft_rule_expr_dynset_get, + .parse = nft_rule_expr_dynset_parse, + .build = nft_rule_expr_dynset_build, + .snprintf = nft_rule_expr_dynset_snprintf, + .xml_parse = nft_rule_expr_dynset_xml_parse, + .json_parse = nft_rule_expr_dynset_json_parse, +}; -- cgit v1.2.3