summaryrefslogtreecommitdiff
path: root/iprule.c
diff options
context:
space:
mode:
authorJo-Philipp Wich <jow@openwrt.org>2013-04-04 14:41:39 +0200
committerJo-Philipp Wich <jow@openwrt.org>2013-04-04 15:06:02 +0200
commita47c3353cdf46b730f43198052c8f807e2bd313f (patch)
treed823e8d658d662e90e02531aeab997629e02e7d1 /iprule.c
parent09ae3bfa2ad7a3a9630fdf290b872a2d7673843f (diff)
downloadnetifd-a47c3353cdf46b730f43198052c8f807e2bd313f.tar.gz
Add support for ip rules
Diffstat (limited to 'iprule.c')
-rw-r--r--iprule.c255
1 files changed, 255 insertions, 0 deletions
diff --git a/iprule.c b/iprule.c
new file mode 100644
index 0000000..7172f29
--- /dev/null
+++ b/iprule.c
@@ -0,0 +1,255 @@
+/*
+ * netifd - network interface daemon
+ * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
+ * Copyright (C) 2013 Jo-Philipp Wich <jow@openwrt.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2
+ * as published by the Free Software Foundation
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ */
+#include <string.h>
+#include <stdlib.h>
+#include <stdio.h>
+#include <unistd.h>
+
+#include <arpa/inet.h>
+
+#include "netifd.h"
+#include "device.h"
+#include "interface.h"
+#include "iprule.h"
+#include "proto.h"
+#include "ubus.h"
+#include "system.h"
+
+struct vlist_tree iprules;
+static bool iprules_flushed = false;
+
+enum {
+ RULE_INTERFACE_IN,
+ RULE_INTERFACE_OUT,
+ RULE_INVERT,
+ RULE_SRC,
+ RULE_DEST,
+ RULE_PRIORITY,
+ RULE_TOS,
+ RULE_FWMARK,
+ RULE_LOOKUP,
+ RULE_ACTION,
+ RULE_GOTO,
+ __RULE_MAX
+};
+
+static const struct blobmsg_policy rule_attr[__RULE_MAX] = {
+ [RULE_INTERFACE_IN] = { .name = "in", .type = BLOBMSG_TYPE_STRING },
+ [RULE_INTERFACE_OUT] = { .name = "out", .type = BLOBMSG_TYPE_STRING },
+ [RULE_INVERT] = { .name = "invert", .type = BLOBMSG_TYPE_BOOL },
+ [RULE_SRC] = { .name = "src", .type = BLOBMSG_TYPE_STRING },
+ [RULE_DEST] = { .name = "dest", .type = BLOBMSG_TYPE_STRING },
+ [RULE_PRIORITY] = { .name = "priority", .type = BLOBMSG_TYPE_INT32 },
+ [RULE_TOS] = { .name = "tos", .type = BLOBMSG_TYPE_INT32 },
+ [RULE_FWMARK] = { .name = "mark", .type = BLOBMSG_TYPE_STRING },
+ [RULE_LOOKUP] = { .name = "lookup", .type = BLOBMSG_TYPE_STRING },
+ [RULE_ACTION] = { .name = "action", .type = BLOBMSG_TYPE_STRING },
+ [RULE_GOTO] = { .name = "goto", .type = BLOBMSG_TYPE_INT32 },
+};
+
+const struct config_param_list rule_attr_list = {
+ .n_params = __RULE_MAX,
+ .params = rule_attr,
+};
+
+
+static bool
+iprule_parse_mark(const char *mark, struct iprule *rule)
+{
+ char *s, *e;
+ unsigned int n;
+
+ if ((s = strchr(mark, '/')) != NULL)
+ *s++ = 0;
+
+ n = strtoul(mark, &e, 0);
+
+ if (e == mark || *e)
+ return false;
+
+ rule->fwmark = n;
+ rule->flags |= IPRULE_FWMARK;
+
+ if (s) {
+ n = strtoul(s, &e, 0);
+
+ if (e == s || *e)
+ return false;
+
+ rule->fwmask = n;
+ rule->flags |= IPRULE_FWMASK;
+ }
+
+ return true;
+}
+
+void
+iprule_add(struct blob_attr *attr, bool v6)
+{
+ struct interface *iif = NULL, *oif = NULL;
+ struct blob_attr *tb[__RULE_MAX], *cur;
+ struct interface *iface;
+ struct iprule *rule;
+ int af = v6 ? AF_INET6 : AF_INET;
+
+ blobmsg_parse(rule_attr, __RULE_MAX, tb, blobmsg_data(attr), blobmsg_data_len(attr));
+
+ rule = calloc(1, sizeof(*rule));
+ if (!rule)
+ return;
+
+ rule->flags = v6 ? IPRULE_INET6 : IPRULE_INET4;
+
+ if ((cur = tb[RULE_INVERT]) != NULL)
+ rule->invert = blobmsg_get_bool(cur);
+
+ if ((cur = tb[RULE_INTERFACE_IN]) != NULL) {
+ iif = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
+
+ if (!iif || !iif->l3_dev.dev) {
+ DPRINTF("Failed to resolve device of network: %s\n", (char *) blobmsg_data(cur));
+ goto error;
+ }
+
+ memcpy(rule->in_dev, iif->l3_dev.dev->ifname, sizeof(rule->in_dev));
+ rule->flags |= IPRULE_IN;
+ }
+
+ if ((cur = tb[RULE_INTERFACE_OUT]) != NULL) {
+ oif = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
+
+ if (!oif || !oif->l3_dev.dev) {
+ DPRINTF("Failed to resolve device of network: %s\n", (char *) blobmsg_data(cur));
+ goto error;
+ }
+
+ memcpy(rule->out_dev, oif->l3_dev.dev->ifname, sizeof(rule->out_dev));
+ rule->flags |= IPRULE_OUT;
+ }
+
+ if ((cur = tb[RULE_SRC]) != NULL) {
+ if (!parse_ip_and_netmask(af, blobmsg_data(cur), &rule->src_addr, &rule->src_mask)) {
+ DPRINTF("Failed to parse rule source: %s\n", (char *) blobmsg_data(cur));
+ goto error;
+ }
+ rule->flags |= IPRULE_SRC;
+ }
+
+ if ((cur = tb[RULE_DEST]) != NULL) {
+ if (!parse_ip_and_netmask(af, blobmsg_data(cur), &rule->dest_addr, &rule->dest_mask)) {
+ DPRINTF("Failed to parse rule destination: %s\n", (char *) blobmsg_data(cur));
+ goto error;
+ }
+ rule->flags |= IPRULE_DEST;
+ }
+
+ if ((cur = tb[RULE_PRIORITY]) != NULL) {
+ rule->priority = blobmsg_get_u32(cur);
+ rule->flags |= IPRULE_PRIORITY;
+ }
+
+ if ((cur = tb[RULE_TOS]) != NULL) {
+ if ((rule->tos = blobmsg_get_u32(cur)) > 255) {
+ DPRINTF("Invalid TOS value: %u\n", blobmsg_get_u32(cur));
+ goto error;
+ }
+ rule->flags |= IPRULE_TOS;
+ }
+
+ if ((cur = tb[RULE_FWMARK]) != NULL) {
+ if (!iprule_parse_mark(blobmsg_data(cur), rule)) {
+ DPRINTF("Failed to parse rule fwmark: %s\n", (char *) blobmsg_data(cur));
+ goto error;
+ }
+ /* flags set by iprule_parse_mark() */
+ }
+
+ if ((cur = tb[RULE_LOOKUP]) != NULL) {
+ if (!system_resolve_rt_table(blobmsg_data(cur), &rule->lookup)) {
+ DPRINTF("Failed to parse rule lookup table: %s\n", (char *) blobmsg_data(cur));
+ goto error;
+ }
+ rule->flags |= IPRULE_LOOKUP;
+ }
+
+ if ((cur = tb[RULE_ACTION]) != NULL) {
+ if (!system_resolve_iprule_action(blobmsg_data(cur), &rule->action)) {
+ DPRINTF("Failed to parse rule action: %s\n", (char *) blobmsg_data(cur));
+ goto error;
+ }
+ rule->flags |= IPRULE_ACTION;
+ }
+
+ if ((cur = tb[RULE_GOTO]) != NULL) {
+ rule->gotoid = blobmsg_get_u32(cur);
+ rule->flags |= IPRULE_GOTO;
+ }
+
+ /* trigger flush of existing rules when adding first uci rule the first time */
+ if (!iprules_flushed)
+ {
+ system_flush_iprules();
+ iprules_flushed = true;
+ }
+
+ vlist_add(&iprules, &rule->node, &rule->flags);
+ return;
+
+error:
+ free(rule);
+}
+
+void
+iprule_update_start(void)
+{
+ vlist_update(&iprules);
+}
+
+void
+iprule_update_complete(void)
+{
+ vlist_flush(&iprules);
+}
+
+
+static int
+rule_cmp(const void *k1, const void *k2, void *ptr)
+{
+ return memcmp(k1, k2, sizeof(struct iprule)-offsetof(struct iprule, flags));
+}
+
+static void
+iprule_update_rule(struct vlist_tree *tree,
+ struct vlist_node *node_new, struct vlist_node *node_old)
+{
+ struct iprule *rule_old, *rule_new;
+
+ rule_old = container_of(node_old, struct iprule, node);
+ rule_new = container_of(node_new, struct iprule, node);
+
+ if (node_old) {
+ system_del_iprule(rule_old);
+ free(rule_old);
+ }
+
+ if (node_new)
+ system_add_iprule(rule_new);
+}
+
+static void __init
+iprule_init_list(void)
+{
+ vlist_init(&iprules, rule_cmp, iprule_update_rule);
+}