blob: 7c8615d31cd473b3c3cd4ab6cd9e906ad1d71e05 [file] [log] [blame]
Jan Engelhardt9640e522007-09-10 11:50:46 +00001U32 tests whether quantities of up to 4 bytes extracted from a packet have
2specified values. The specification of what to extract is general enough to
3find data at given offsets from tcp headers or payloads.
4.TP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +01005[\fB!\fP] \fB\-\-u32\fP \fItests\fP
Jan Engelhardt9640e522007-09-10 11:50:46 +00006The argument amounts to a program in a small language described below.
7.IP
8tests := location "=" value | tests "&&" location "=" value
9.IP
10value := range | value "," range
11.IP
12range := number | number ":" number
13.PP
Jan Engelhardtc6775d62010-07-23 21:23:05 +020014a single number, \fIn\fP, is interpreted the same as \fIn:n\fP. \fIn:m\fP is
15interpreted as the range of numbers \fB>=n\fP and \fB<=m\fP.
Jan Engelhardt9640e522007-09-10 11:50:46 +000016.IP "" 4
17location := number | location operator number
18.IP "" 4
19operator := "&" | "<<" | ">>" | "@"
20.PP
Jan Engelhardtc6775d62010-07-23 21:23:05 +020021The operators \fB&\fP, \fB<<\fP, \fB>>\fP and \fB&&\fP mean the same as in C.
22The \fB=\fP is really a set membership operator and the value syntax describes
23a set. The \fB@\fP operator is what allows moving to the next header and is
Jan Engelhardt9640e522007-09-10 11:50:46 +000024described further below.
25.PP
26There are currently some artificial implementation limits on the size of the
27tests:
28.IP " *"
Jan Engelhardtc6775d62010-07-23 21:23:05 +020029no more than 10 of "\fB=\fP" (and 9 "\fB&&\fP"s) in the u32 argument
Jan Engelhardt9640e522007-09-10 11:50:46 +000030.IP " *"
31no more than 10 ranges (and 9 commas) per value
32.IP " *"
33no more than 10 numbers (and 9 operators) per location
34.PP
35To describe the meaning of location, imagine the following machine that
36interprets it. There are three registers:
37.IP
Jan Engelhardtc6775d62010-07-23 21:23:05 +020038A is of type \fBchar *\fP, initially the address of the IP header
Jan Engelhardt9640e522007-09-10 11:50:46 +000039.IP
40B and C are unsigned 32 bit integers, initially zero
41.PP
42The instructions are:
43.IP
44number B = number;
45.IP
46C = (*(A+B)<<24) + (*(A+B+1)<<16) + (*(A+B+2)<<8) + *(A+B+3)
47.IP
48&number C = C & number
49.IP
50<< number C = C << number
51.IP
52>> number C = C >> number
53.IP
54@number A = A + C; then do the instruction number
55.PP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010056Any access of memory outside [skb\->data,skb\->end] causes the match to fail.
Jan Engelhardt9640e522007-09-10 11:50:46 +000057Otherwise the result of the computation is the final value of C.
58.PP
59Whitespace is allowed but not required in the tests. However, the characters
60that do occur there are likely to require shell quoting, so it is a good idea
61to enclose the arguments in quotes.
62.PP
63Example:
64.IP
65match IP packets with total length >= 256
66.IP
67The IP header contains a total length field in bytes 2-3.
68.IP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010069\-\-u32 "\fB0 & 0xFFFF = 0x100:0xFFFF\fP"
Jan Engelhardt9640e522007-09-10 11:50:46 +000070.IP
71read bytes 0-3
72.IP
73AND that with 0xFFFF (giving bytes 2-3), and test whether that is in the range
74[0x100:0xFFFF]
75.PP
76Example: (more realistic, hence more complicated)
77.IP
78match ICMP packets with icmp type 0
79.IP
80First test that it is an ICMP packet, true iff byte 9 (protocol) = 1
81.IP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +010082\-\-u32 "\fB6 & 0xFF = 1 &&\fP ...
Jan Engelhardt9640e522007-09-10 11:50:46 +000083.IP
Jan Engelhardtc6775d62010-07-23 21:23:05 +020084read bytes 6-9, use \fB&\fP to throw away bytes 6-8 and compare the result to
Jan Engelhardt9640e522007-09-10 11:50:46 +0000851. Next test that it is not a fragment. (If so, it might be part of such a
86packet but we cannot always tell.) N.B.: This test is generally needed if you
87want to match anything beyond the IP header. The last 6 bits of byte 6 and all
88of byte 7 are 0 iff this is a complete packet (not a fragment). Alternatively,
89you can allow first fragments by only testing the last 5 bits of byte 6.
90.IP
Jan Engelhardtc6775d62010-07-23 21:23:05 +020091 ... \fB4 & 0x3FFF = 0 &&\fP ...
Jan Engelhardt9640e522007-09-10 11:50:46 +000092.IP
93Last test: the first byte past the IP header (the type) is 0. This is where we
94have to use the @syntax. The length of the IP header (IHL) in 32 bit words is
95stored in the right half of byte 0 of the IP header itself.
96.IP
Jan Engelhardtc6775d62010-07-23 21:23:05 +020097 ... \fB0 >> 22 & 0x3C @ 0 >> 24 = 0\fP"
Jan Engelhardt9640e522007-09-10 11:50:46 +000098.IP
Jan Engelhardtc6775d62010-07-23 21:23:05 +020099The first 0 means read bytes 0-3, \fB>>22\fP means shift that 22 bits to the
Jan Engelhardt9640e522007-09-10 11:50:46 +0000100right. Shifting 24 bits would give the first byte, so only 22 bits is four
Jan Engelhardtc6775d62010-07-23 21:23:05 +0200101times that plus a few more bits. \fB&3C\fP then eliminates the two extra bits
Jan Engelhardt9640e522007-09-10 11:50:46 +0000102on the right and the first four bits of the first byte. For instance, if IHL=5,
103then the IP header is 20 (4 x 5) bytes long. In this case, bytes 0-1 are (in
Jan Engelhardtc6775d62010-07-23 21:23:05 +0200104binary) xxxx0101 yyzzzzzz, \fB>>22\fP gives the 10 bit value xxxx0101yy and
105\fB&3C\fP gives 010100. \fB@\fP means to use this number as a new offset into
Jan Engelhardt9640e522007-09-10 11:50:46 +0000106the packet, and read four bytes starting from there. This is the first 4 bytes
107of the ICMP payload, of which byte 0 is the ICMP type. Therefore, we simply
108shift the value 24 to the right to throw out all but the first byte and compare
109the result with 0.
110.PP
111Example:
112.IP
113TCP payload bytes 8-12 is any of 1, 2, 5 or 8
114.IP
115First we test that the packet is a tcp packet (similar to ICMP).
116.IP
Jan Engelhardtfea74bf2009-01-12 04:53:18 +0100117\-\-u32 "\fB6 & 0xFF = 6 &&\fP ...
Jan Engelhardt9640e522007-09-10 11:50:46 +0000118.IP
119Next, test that it is not a fragment (same as above).
120.IP
Jan Engelhardtc6775d62010-07-23 21:23:05 +0200121 ... \fB0 >> 22 & 0x3C @ 12 >> 26 & 0x3C @ 8 = 1,2,5,8\fP"
Jan Engelhardt9640e522007-09-10 11:50:46 +0000122.IP
Jan Engelhardtc6775d62010-07-23 21:23:05 +0200123\fB0>>22&3C\fP as above computes the number of bytes in the IP header. \fB@\fP
Jan Engelhardt9640e522007-09-10 11:50:46 +0000124makes this the new offset into the packet, which is the start of the TCP
125header. The length of the TCP header (again in 32 bit words) is the left half
Jan Engelhardtc6775d62010-07-23 21:23:05 +0200126of byte 12 of the TCP header. The \fB12>>26&3C\fP computes this length in bytes
Jan Engelhardt9640e522007-09-10 11:50:46 +0000127(similar to the IP header before). "@" makes this the new offset, which is the
128start of the TCP payload. Finally, 8 reads bytes 8-12 of the payload and
Jan Engelhardtc6775d62010-07-23 21:23:05 +0200129\fB=\fP checks whether the result is any of 1, 2, 5 or 8.