blob: e6683d36815f7172217e8c87418176088707c485 [file] [log] [blame]
xjb04a4022021-11-25 15:01:52 +08001#include <stdlib.h>
2#include <stdio.h>
3#include <string.h>
4#include <sys/ioctl.h>
5#include <fcntl.h>
6#include <getopt.h>
7
8#include "acl_ioctl.h"
9#include "acl_api.h"
10
11void show_usage(void)
12{
13 printf("Add SDMAC Entry for Any Protocol\n");
14 printf("acl -A -n [SDMAC] -U[UP] -u [Allow/Deny/FP]\n");
15 printf("Ex: acl -A -n 00:11:22:33:44:55 -u Deny \n\n");
16 printf("Ex: acl -A -n 00:11:22:33:44:55 -U 3 -u FP \n\n");
17
18 printf("Add SMAC to DIP Entry for Any Protocol\n");
19 printf("acl -a -n [SMAC] -q [DipS] -r [DipE] -U[UP] -u [Allow/Deny/FP]\n");
20 printf("Ex: acl -a -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -u Deny \n\n");
21 printf("Ex: acl -a -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -U 3 -u FP \n\n");
22
23 printf("Add SMAC to DIP Entry for Tcp Protocol\n");
24 printf("acl -b -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n");
25 printf("Ex: acl -b -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024 -u Deny\n\n");
26
27 printf("SMAC to DIP Entry for Udp Protocol\n");
28 printf("acl -c -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n");
29 printf("Ex: acl -c -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024 -u Deny\n\n");
30
31 printf("Del SDMAC Entry for Any Protocol\n");
32 printf("acl -D -n [SMAC]\n");
33 printf("Ex: acl -D -n 00:11:22:33:44:55 \n\n");
34
35 printf("Del SMAC to DIP Entry for Any Protocol\n");
36 printf("acl -d -n [SMAC] -q [DipS] -r [DipE]\n");
37 printf("Ex: acl -d -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5\n\n");
38
39 printf("Del SMAC to DIP Entry for Tcp Protocol\n");
40 printf("acl -e -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n");
41 printf("Ex: acl -e -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024\n\n");
42
43 printf("Del SMAC to DIP Entry for Udp Protocol\n");
44 printf("acl -f -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n");
45 printf("Ex: acl -f -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024\n\n");
46
47 printf("Add SIP to DIP Entry for Any Protocol\n");
48 printf("acl -H -o [SipS] -p [SipE] -q [DipS] -r [DipE] -U[UP] -u [Allow/Deny/FP]\n");
49 printf("Ex: acl -H -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -u Deny\n\n");
50
51
52 printf("Add SIP to DIP Entry for Tcp Protocol\n");
53 printf("acl -h -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n");
54 printf("Ex: acl -h -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -u Deny\n\n");
55
56
57 printf("Add SIP to DIP Entry for Udp Protocol\n");
58 printf("acl -i -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]-U[UP] -u [Allow/Deny/FP]\n");
59 printf("Ex: acl -i -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -u Deny\n\n");
60
61 printf("Del SIP to DIP Entry for Any Protocol\n");
62 printf("acl -j -o [SipS] -p [SipE] -q [DipS] -r [DipE]\n");
63 printf("Ex: acl -j -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3\n\n");
64
65
66 printf("Del SIP to DIP Entry for Tcp Protocol\n");
67 printf("acl -k -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n");
68 printf("Ex: acl -k -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024\n\n");
69
70
71 printf("Del SIP to DIP Entry for Udp Protocol\n");
72 printf("acl -l -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n");
73 printf("Ex: acl -l -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024\n\n");
74 printf("Del All Entries\n");
75 printf("acl -m\n\n");
76
77 printf("Add S/DMAC ETYPE VID PROTOCOL SIP DIP SP DP Entry\n");
78 printf("acl -E -n[SMAC] -N[DMAC] -P[ESW Port] -Z[Ethertype] -S[Protocol] -o[SipS] -p[SipE] -q[DipS] -r[DipE] -s[DpS] -t[DpE] -v[SpS] -x[SpE] -y[TosS] -z[TosE] -F[TCP/UDP/ANY] -V[VID] -u[Allow/Deny/FP]\n");
79 printf("Ex: acl -E -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -F UDP -u Deny\n\n");
80
81
82 printf("Del S/DMAC ETYPE VID PROTOCOL SIP DIP SP DP Entry\n");
83 printf("acl -G -n[SMAC] -N[DMAC] -P[ESW Port] -Z[Ethertype] -S[Protocol] -o[SipS] -p[SipE] -q[DipS] -r[DipE] -s[DpS] -t[DpE] -v[SpS] -x[SpE] -y[TosS] -z[TosE] -F[TCP/UDP/ANY] -V[VID] \n");
84 printf("Ex: acl -G -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -F UDP\n\n");
85
86 printf("Show All ACL Entry\n");
87 printf("Ex: acl -g\n\n");
88
89}
90
91int main(int argc, char *argv[])
92{
93 int opt;
94 char options[] = "AabcDdEefGgHhijklm?F:n:N:o:P:p:q:r:s:S:t:u:U:v:x:y:V:z:Z:";
95 int fd;
96 struct acl_args args;
97 struct acl_list_args *args2;
98 int method=-1;
99 int result;
100 int i;
101
102 memset(&args, 0, sizeof(struct acl_args));
103 args.pn = 7; /* Default do not care*/
104 /* Max 511 acl entries */
105 args2=malloc(sizeof(struct acl_list_args) + sizeof(struct acl_args)*511);
106 if (NULL == args2)
107 {
108 printf(" Allocate memory for acl_list_args and acl_args failed.\n");
109 return 0;
110 }
111 fd = open("/dev/"ACL_DEVNAME, O_RDONLY);
112
113 if (fd < 0)
114 {
115 printf("Open %s pseudo device failed\n","/dev/"ACL_DEVNAME);
116 free(args2);
117 return 0;
118 }
119
120 if(argc < 2) {
121 show_usage();
122 free(args2);
123 close(fd);
124 return 0;
125 }
126
127 while ((opt = getopt (argc, argv, options)) != -1) {
128 switch (opt) {
129 case 'A':
130 method=ACL_ADD_SDMAC_ANY;
131 break;
132 case 'a':
133 method=ACL_ADD_SMAC_DIP_ANY;
134 break;
135 case 'b':
136 method=ACL_ADD_SMAC_DIP_TCP;
137 break;
138 case 'c':
139 method=ACL_ADD_SMAC_DIP_UDP;
140 break;
141 case 'D':
142 method=ACL_DEL_SDMAC_ANY;
143 break;
144 case 'd':
145 method=ACL_DEL_SMAC_DIP_ANY;
146 break;
147 case 'e':
148 method=ACL_DEL_SMAC_DIP_TCP;
149 break;
150 case 'E':
151 method=ACL_ADD_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT;
152 break;
153 case 'F':
154 if(strcasecmp(optarg,"TCP")==0){
155 args.L4=ACL_PROTO_TCP;
156 }else if(strcasecmp(optarg,"UDP")==0){
157 args.L4=ACL_PROTO_UDP;
158 }else if(strcasecmp(optarg,"ANY")==0){
159 args.L4=ACL_PROTO_ANY;
160 }else{
161 printf("Error: -t TCP or UDP or ANY\n");
162 free(args2);
163 close(fd);
164 return 0;
165 }
166
167 break;
168 case 'G':
169 method=ACL_DEL_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT;
170 break;
171 case 'f':
172 method=ACL_DEL_SMAC_DIP_UDP;
173 break;
174 case 'H':
175 method=ACL_ADD_SIP_DIP_ANY;
176 break;
177 case 'g':
178 method = ACL_GET_ALL_ENTRIES;
179 break;
180 case 'h':
181 method=ACL_ADD_SIP_DIP_TCP;
182 break;
183 case 'i':
184 method=ACL_ADD_SIP_DIP_UDP;
185 break;
186 case 'j':
187 method=ACL_DEL_SIP_DIP_ANY;
188 break;
189 case 'k':
190 method=ACL_DEL_SIP_DIP_TCP;
191 break;
192 case 'l':
193 method=ACL_DEL_SIP_DIP_UDP;
194 break;
195 case 'm':
196 method=ACL_CLEAN_TBL;
197 break;
198 case 'n': /* source mac address */
199 str_to_mac(args.mac, optarg);
200 break;
201 case 'N': /* destination mac address */
202 str_to_mac(args.dmac, optarg);
203 break;
204 case 'o': /* start of sip */
205 str_to_ip(&args.sip_s, optarg);
206 break;
207 case 'p': /* end of sip */
208 str_to_ip(&args.sip_e, optarg);
209 break;
210 case 'P': /* Port Number */
211 args.pn=strtoll(optarg, NULL, 10);
212 break;
213 case 'q': /* start of dip */
214 str_to_ip(&args.dip_s, optarg);
215 break;
216 case 'r': /* end of dip */
217 str_to_ip(&args.dip_e, optarg);
218 break;
219 case 's': /* start of dp */
220 args.dp_s=strtoll(optarg, NULL, 10);
221 break;
222 case 't': /* end of dp */
223 args.dp_e=strtoll(optarg, NULL, 10);
224 break;
225 case 'S': /* Protocol */
226 args.protocol=strtoll(optarg, NULL, 10);
227 break;
228
229 case 'v': /* start of sp */
230 args.sp_s=strtoll(optarg, NULL, 10);
231 break;
232 case 'x': /* end of sp */
233 args.sp_e=strtoll(optarg, NULL, 10);
234 break;
235 case 'y': /* start of tos */
236 args.tos_s=strtoll(optarg, NULL, 10);
237 break;
238 case 'z': /* end of tos */
239 args.tos_e=strtoll(optarg, NULL, 10);
240 break;
241 case 'Z': /* ethertype */
242 args.ethertype=strtoll(optarg, NULL, 16);
243 break;
244 case 'V': /* VID */
245 args.vid=strtoll(optarg, NULL, 10);
246 break;
247 case 'u': /* Deny/Allow */
248 if(strcasecmp(optarg,"Deny")==0){
249 args.method=ACL_DENY_RULE;
250 }else if(strcasecmp(optarg,"Allow")==0){
251 args.method=ACL_ALLOW_RULE;
252 }else if(strcasecmp(optarg,"FP")==0){
253 args.method=ACL_PRIORITY_RULE;
254 }else{
255 printf("Error: -t Deny or Allow\n");
256 free(args2);
257 close(fd);
258 return 0;
259 }
260 break;
261 case 'U': /* User Priority */
262 args.up=strtoll(optarg, NULL, 10);
263 break;
264 case '?':
265 default:
266 show_usage();
267 free(args2);
268 close(fd);
269 return 0;
270 }
271 }
272 switch(method) {
273 case ACL_ADD_SDMAC_ANY:
274 case ACL_ADD_ETYPE_ANY:
275 case ACL_ADD_SMAC_DIP_ANY:
276 case ACL_ADD_SMAC_DIP_TCP:
277 case ACL_ADD_SMAC_DIP_UDP:
278 case ACL_DEL_SDMAC_ANY:
279 case ACL_DEL_ETYPE_ANY:
280 case ACL_DEL_SMAC_DIP_ANY:
281 case ACL_DEL_SMAC_DIP_TCP:
282 case ACL_DEL_SMAC_DIP_UDP:
283 case ACL_ADD_SIP_DIP_ANY:
284 case ACL_ADD_SIP_DIP_TCP:
285 case ACL_ADD_SIP_DIP_UDP:
286 case ACL_ADD_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT:
287 case ACL_DEL_SIP_DIP_ANY:
288 case ACL_DEL_SIP_DIP_TCP:
289 case ACL_DEL_SIP_DIP_UDP:
290 case ACL_DEL_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT:
291 case ACL_CLEAN_TBL:
292 SetAclEntry(&args, method);
293 result = args.result;
294 break;
295 case ACL_GET_ALL_ENTRIES:
296 AclGetAllEntries(args2);
297 result = args2->result;
298
299 printf("Total Entry Count = %d\n",args2->num_of_entries);
300 for(i=0;i<args2->num_of_entries;i++){
301 printf("#%d :SMAC=%02X:%02X:%02X:%02X:%02X:%02X => DMAC=%02X:%02X:%02X:%02X:%02X:%02X PROTOCOL=0x%2x\n", \
302 i, args2->entries[i].mac[0], args2->entries[i].mac[1], args2->entries[i].mac[2], \
303 args2->entries[i].mac[3], args2->entries[i].mac[4], args2->entries[i].mac[5], \
304 args2->entries[i].dmac[0], args2->entries[i].dmac[1],args2->entries[i].dmac[2], \
305 args2->entries[i].dmac[3], args2->entries[i].dmac[4],args2->entries[i].dmac[5], \
306 args2->entries[i].protocol);
307
308 printf(" :SIP %u.%u.%u.%u->%u.%u.%u.%u=>DIP %u.%u.%u.%u->%u.%u.%u.%u SP %d->%d=>DP %d->%d TOS:0x%2x->0x%2x VID:%d ETYPE=0x%4x TCP_UDP=0/TCP=1/UDP=2:%d PN:%d\n\r", \
309 NIPQUAD(args2->entries[i].sip_s), \
310 NIPQUAD(args2->entries[i].sip_e), \
311 NIPQUAD(args2->entries[i].dip_s), \
312 NIPQUAD(args2->entries[i].dip_e), \
313 args2->entries[i].sp_s, \
314 args2->entries[i].sp_e, \
315 args2->entries[i].dp_s, \
316 args2->entries[i].dp_e, \
317 args2->entries[i].tos_s, \
318 args2->entries[i].tos_e, \
319 args2->entries[i].vid, \
320 args2->entries[i].ethertype, \
321 args2->entries[i].L4, \
322 args2->entries[i].pn);
323 }
324 break;
325 default:
326 result = ACL_FAIL;
327 }
328
329
330 if(result == ACL_SUCCESS) {
331 printf("done\n");
332 }else if (result == ACL_TBL_FULL) {
333 printf("table full\n");
334 } else {
335 printf("fail\n");
336 }
337
338 free(args2);
339 close(fd);
340 return 0;
341}