1 /* 2 * We want a reentrant parser. 3 */ 4 %pure-parser 5 6 /* 7 * We also want a reentrant scanner, so we have to pass the 8 * handle for the reentrant scanner to the parser, and the 9 * parser has to pass it to the lexical analyzer. 10 * 11 * We use void * rather than yyscan_t because, at least with some 12 * versions of Flex and Bison, if you use yyscan_t in %parse-param and 13 * %lex-param, you have to include scanner.h before grammar.h to get 14 * yyscan_t declared, and you have to include grammar.h before scanner.h 15 * to get YYSTYPE declared. Using void * breaks the cycle; the Flex 16 * documentation says yyscan_t is just a void *. 17 */ 18 %parse-param {void *yyscanner} 19 %lex-param {void *yyscanner} 20 21 /* 22 * According to bison documentation, shift/reduce conflicts are not an issue 23 * in most parsers as long as the number does not evolve over time: 24 * https://www.gnu.org/software/bison/manual/html_node/Expect-Decl.html 25 * So, following the advice use %expect to check the amount of shift/reduce 26 * warnings. 27 * 28 * This doesn't appear to work in Berkeley YACC - 1.9 20170709; it still 29 * warns of 38 shift/reduce conflicts. 30 * 31 * The Berkeley YACC documentation: 32 * 33 * https://invisible-island.net/byacc/manpage/yacc.html 34 * 35 * claims that "Bison's support for "%expect" is broken in more than one 36 * release.", but doesn't give details. Hopefully, that only means that 37 * you get warnings even if you have the expected number of shift/reduce 38 * conflicts, not that anything else fails. 39 */ 40 %expect 38 41 42 /* 43 * And we need to pass the compiler state to the scanner. 44 */ 45 %parse-param { compiler_state_t *cstate } 46 47 %{ 48 /* 49 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996 50 * The Regents of the University of California. All rights reserved. 51 * 52 * Redistribution and use in source and binary forms, with or without 53 * modification, are permitted provided that: (1) source code distributions 54 * retain the above copyright notice and this paragraph in its entirety, (2) 55 * distributions including binary code include the above copyright notice and 56 * this paragraph in its entirety in the documentation or other materials 57 * provided with the distribution, and (3) all advertising materials mentioning 58 * features or use of this software display the following acknowledgement: 59 * ``This product includes software developed by the University of California, 60 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 61 * the University nor the names of its contributors may be used to endorse 62 * or promote products derived from this software without specific prior 63 * written permission. 64 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 65 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 66 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 67 * 68 */ 69 70 #ifdef HAVE_CONFIG_H 71 #include <config.h> 72 #endif 73 74 #include <stdlib.h> 75 76 #ifndef _WIN32 77 #include <sys/types.h> 78 #include <sys/socket.h> 79 80 #if __STDC__ 81 struct mbuf; 82 struct rtentry; 83 #endif 84 85 #include <netinet/in.h> 86 #include <arpa/inet.h> 87 #endif /* _WIN32 */ 88 89 #include <stdio.h> 90 91 #include "diag-control.h" 92 93 #include "pcap-int.h" 94 95 #include "gencode.h" 96 #include "grammar.h" 97 #include "scanner.h" 98 99 /* 100 * TODO(tuxillo): Upstream this change to libpcap since our pfvar.h headers 101 * are in a different path. 102 * 103 */ 104 #ifdef HAVE_NET_PF_PFVAR_H 105 #include <net/if.h> 106 #include <net/pf/pfvar.h> 107 #include <net/pf/if_pflog.h> 108 #endif 109 #include "llc.h" 110 #include "ieee80211.h" 111 #include <pcap/namedb.h> 112 113 #ifdef HAVE_OS_PROTO_H 114 #include "os-proto.h" 115 #endif 116 117 #ifdef YYBYACC 118 /* 119 * Both Berkeley YACC and Bison define yydebug (under whatever name 120 * it has) as a global, but Bison does so only if YYDEBUG is defined. 121 * Berkeley YACC define it even if YYDEBUG isn't defined; declare it 122 * here to suppress a warning. 123 */ 124 #if !defined(YYDEBUG) 125 extern int yydebug; 126 #endif 127 128 /* 129 * In Berkeley YACC, yynerrs (under whatever name it has) is global, 130 * even if it's building a reentrant parser. In Bison, it's local 131 * in reentrant parsers. 132 * 133 * Declare it to squelch a warning. 134 */ 135 extern int yynerrs; 136 #endif 137 138 #define QSET(q, p, d, a) (q).proto = (unsigned char)(p),\ 139 (q).dir = (unsigned char)(d),\ 140 (q).addr = (unsigned char)(a) 141 142 struct tok { 143 int v; /* value */ 144 const char *s; /* string */ 145 }; 146 147 static const struct tok ieee80211_types[] = { 148 { IEEE80211_FC0_TYPE_DATA, "data" }, 149 { IEEE80211_FC0_TYPE_MGT, "mgt" }, 150 { IEEE80211_FC0_TYPE_MGT, "management" }, 151 { IEEE80211_FC0_TYPE_CTL, "ctl" }, 152 { IEEE80211_FC0_TYPE_CTL, "control" }, 153 { 0, NULL } 154 }; 155 static const struct tok ieee80211_mgt_subtypes[] = { 156 { IEEE80211_FC0_SUBTYPE_ASSOC_REQ, "assocreq" }, 157 { IEEE80211_FC0_SUBTYPE_ASSOC_REQ, "assoc-req" }, 158 { IEEE80211_FC0_SUBTYPE_ASSOC_RESP, "assocresp" }, 159 { IEEE80211_FC0_SUBTYPE_ASSOC_RESP, "assoc-resp" }, 160 { IEEE80211_FC0_SUBTYPE_REASSOC_REQ, "reassocreq" }, 161 { IEEE80211_FC0_SUBTYPE_REASSOC_REQ, "reassoc-req" }, 162 { IEEE80211_FC0_SUBTYPE_REASSOC_RESP, "reassocresp" }, 163 { IEEE80211_FC0_SUBTYPE_REASSOC_RESP, "reassoc-resp" }, 164 { IEEE80211_FC0_SUBTYPE_PROBE_REQ, "probereq" }, 165 { IEEE80211_FC0_SUBTYPE_PROBE_REQ, "probe-req" }, 166 { IEEE80211_FC0_SUBTYPE_PROBE_RESP, "proberesp" }, 167 { IEEE80211_FC0_SUBTYPE_PROBE_RESP, "probe-resp" }, 168 { IEEE80211_FC0_SUBTYPE_BEACON, "beacon" }, 169 { IEEE80211_FC0_SUBTYPE_ATIM, "atim" }, 170 { IEEE80211_FC0_SUBTYPE_DISASSOC, "disassoc" }, 171 { IEEE80211_FC0_SUBTYPE_DISASSOC, "disassociation" }, 172 { IEEE80211_FC0_SUBTYPE_AUTH, "auth" }, 173 { IEEE80211_FC0_SUBTYPE_AUTH, "authentication" }, 174 { IEEE80211_FC0_SUBTYPE_DEAUTH, "deauth" }, 175 { IEEE80211_FC0_SUBTYPE_DEAUTH, "deauthentication" }, 176 { 0, NULL } 177 }; 178 static const struct tok ieee80211_ctl_subtypes[] = { 179 { IEEE80211_FC0_SUBTYPE_PS_POLL, "ps-poll" }, 180 { IEEE80211_FC0_SUBTYPE_RTS, "rts" }, 181 { IEEE80211_FC0_SUBTYPE_CTS, "cts" }, 182 { IEEE80211_FC0_SUBTYPE_ACK, "ack" }, 183 { IEEE80211_FC0_SUBTYPE_CF_END, "cf-end" }, 184 { IEEE80211_FC0_SUBTYPE_CF_END_ACK, "cf-end-ack" }, 185 { 0, NULL } 186 }; 187 static const struct tok ieee80211_data_subtypes[] = { 188 { IEEE80211_FC0_SUBTYPE_DATA, "data" }, 189 { IEEE80211_FC0_SUBTYPE_CF_ACK, "data-cf-ack" }, 190 { IEEE80211_FC0_SUBTYPE_CF_POLL, "data-cf-poll" }, 191 { IEEE80211_FC0_SUBTYPE_CF_ACPL, "data-cf-ack-poll" }, 192 { IEEE80211_FC0_SUBTYPE_NODATA, "null" }, 193 { IEEE80211_FC0_SUBTYPE_NODATA_CF_ACK, "cf-ack" }, 194 { IEEE80211_FC0_SUBTYPE_NODATA_CF_POLL, "cf-poll" }, 195 { IEEE80211_FC0_SUBTYPE_NODATA_CF_ACPL, "cf-ack-poll" }, 196 { IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_DATA, "qos-data" }, 197 { IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_CF_ACK, "qos-data-cf-ack" }, 198 { IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_CF_POLL, "qos-data-cf-poll" }, 199 { IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_CF_ACPL, "qos-data-cf-ack-poll" }, 200 { IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_NODATA, "qos" }, 201 { IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_NODATA_CF_POLL, "qos-cf-poll" }, 202 { IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_NODATA_CF_ACPL, "qos-cf-ack-poll" }, 203 { 0, NULL } 204 }; 205 static const struct tok llc_s_subtypes[] = { 206 { LLC_RR, "rr" }, 207 { LLC_RNR, "rnr" }, 208 { LLC_REJ, "rej" }, 209 { 0, NULL } 210 }; 211 static const struct tok llc_u_subtypes[] = { 212 { LLC_UI, "ui" }, 213 { LLC_UA, "ua" }, 214 { LLC_DISC, "disc" }, 215 { LLC_DM, "dm" }, 216 { LLC_SABME, "sabme" }, 217 { LLC_TEST, "test" }, 218 { LLC_XID, "xid" }, 219 { LLC_FRMR, "frmr" }, 220 { 0, NULL } 221 }; 222 struct type2tok { 223 int type; 224 const struct tok *tok; 225 }; 226 static const struct type2tok ieee80211_type_subtypes[] = { 227 { IEEE80211_FC0_TYPE_MGT, ieee80211_mgt_subtypes }, 228 { IEEE80211_FC0_TYPE_CTL, ieee80211_ctl_subtypes }, 229 { IEEE80211_FC0_TYPE_DATA, ieee80211_data_subtypes }, 230 { 0, NULL } 231 }; 232 233 static int 234 str2tok(const char *str, const struct tok *toks) 235 { 236 int i; 237 238 for (i = 0; toks[i].s != NULL; i++) { 239 if (pcap_strcasecmp(toks[i].s, str) == 0) { 240 /* 241 * Just in case somebody is using this to 242 * generate values of -1/0xFFFFFFFF. 243 * That won't work, as it's indistinguishable 244 * from an error. 245 */ 246 if (toks[i].v == -1) 247 abort(); 248 return (toks[i].v); 249 } 250 } 251 return (-1); 252 } 253 254 static const struct qual qerr = { Q_UNDEF, Q_UNDEF, Q_UNDEF, Q_UNDEF }; 255 256 static void 257 yyerror(void *yyscanner _U_, compiler_state_t *cstate, const char *msg) 258 { 259 bpf_set_error(cstate, "can't parse filter expression: %s", msg); 260 } 261 262 #ifdef HAVE_NET_PFVAR_H 263 static int 264 pfreason_to_num(compiler_state_t *cstate, const char *reason) 265 { 266 const char *reasons[] = PFRES_NAMES; 267 int i; 268 269 for (i = 0; reasons[i]; i++) { 270 if (pcap_strcasecmp(reason, reasons[i]) == 0) 271 return (i); 272 } 273 bpf_set_error(cstate, "unknown PF reason \"%s\"", reason); 274 return (-1); 275 } 276 277 static int 278 pfaction_to_num(compiler_state_t *cstate, const char *action) 279 { 280 if (pcap_strcasecmp(action, "pass") == 0 || 281 pcap_strcasecmp(action, "accept") == 0) 282 return (PF_PASS); 283 else if (pcap_strcasecmp(action, "drop") == 0 || 284 pcap_strcasecmp(action, "block") == 0) 285 return (PF_DROP); 286 #if HAVE_PF_NAT_THROUGH_PF_NORDR 287 else if (pcap_strcasecmp(action, "rdr") == 0) 288 return (PF_RDR); 289 else if (pcap_strcasecmp(action, "nat") == 0) 290 return (PF_NAT); 291 else if (pcap_strcasecmp(action, "binat") == 0) 292 return (PF_BINAT); 293 else if (pcap_strcasecmp(action, "nordr") == 0) 294 return (PF_NORDR); 295 #endif 296 else { 297 bpf_set_error(cstate, "unknown PF action \"%s\"", action); 298 return (-1); 299 } 300 } 301 #else /* !HAVE_NET_PFVAR_H */ 302 static int 303 pfreason_to_num(compiler_state_t *cstate, const char *reason _U_) 304 { 305 bpf_set_error(cstate, "libpcap was compiled on a machine without pf support"); 306 return (-1); 307 } 308 309 static int 310 pfaction_to_num(compiler_state_t *cstate, const char *action _U_) 311 { 312 bpf_set_error(cstate, "libpcap was compiled on a machine without pf support"); 313 return (-1); 314 } 315 #endif /* HAVE_NET_PFVAR_H */ 316 317 /* 318 * For calls that might return an "an error occurred" value. 319 */ 320 #define CHECK_INT_VAL(val) if (val == -1) YYABORT 321 #define CHECK_PTR_VAL(val) if (val == NULL) YYABORT 322 323 DIAG_OFF_BISON_BYACC 324 %} 325 326 %union { 327 int i; 328 bpf_u_int32 h; 329 char *s; 330 struct stmt *stmt; 331 struct arth *a; 332 struct { 333 struct qual q; 334 int atmfieldtype; 335 int mtp3fieldtype; 336 struct block *b; 337 } blk; 338 struct block *rblk; 339 } 340 341 %type <blk> expr id nid pid term rterm qid 342 %type <blk> head 343 %type <i> pqual dqual aqual ndaqual 344 %type <a> arth narth 345 %type <i> byteop pname relop irelop 346 %type <h> pnum 347 %type <blk> and or paren not null prog 348 %type <rblk> other pfvar p80211 pllc 349 %type <i> atmtype atmmultitype 350 %type <blk> atmfield 351 %type <blk> atmfieldvalue atmvalue atmlistvalue 352 %type <i> mtp2type 353 %type <blk> mtp3field 354 %type <blk> mtp3fieldvalue mtp3value mtp3listvalue 355 356 357 %token DST SRC HOST GATEWAY 358 %token NET NETMASK PORT PORTRANGE LESS GREATER PROTO PROTOCHAIN CBYTE 359 %token ARP RARP IP SCTP TCP UDP ICMP IGMP IGRP PIM VRRP CARP 360 %token ATALK AARP DECNET LAT SCA MOPRC MOPDL 361 %token TK_BROADCAST TK_MULTICAST 362 %token NUM INBOUND OUTBOUND 363 %token IFINDEX 364 %token PF_IFNAME PF_RSET PF_RNR PF_SRNR PF_REASON PF_ACTION 365 %token TYPE SUBTYPE DIR ADDR1 ADDR2 ADDR3 ADDR4 RA TA 366 %token LINK 367 %token GEQ LEQ NEQ 368 %token ID EID HID HID6 AID 369 %token LSH RSH 370 %token LEN 371 %token IPV6 ICMPV6 AH ESP 372 %token VLAN MPLS 373 %token PPPOED PPPOES GENEVE 374 %token ISO ESIS CLNP ISIS L1 L2 IIH LSP SNP CSNP PSNP 375 %token STP 376 %token IPX 377 %token NETBEUI 378 %token LANE LLC METAC BCC SC ILMIC OAMF4EC OAMF4SC 379 %token OAM OAMF4 CONNECTMSG METACONNECT 380 %token VPI VCI 381 %token RADIO 382 %token FISU LSSU MSU HFISU HLSSU HMSU 383 %token SIO OPC DPC SLS HSIO HOPC HDPC HSLS 384 %token LEX_ERROR 385 386 %type <s> ID EID AID 387 %type <s> HID HID6 388 %type <h> NUM 389 %type <i> action reason type subtype type_subtype dir 390 391 %left OR AND 392 %nonassoc '!' 393 %left '|' 394 %left '&' 395 %left LSH RSH 396 %left '+' '-' 397 %left '*' '/' 398 %nonassoc UMINUS 399 %% 400 prog: null expr 401 { 402 CHECK_INT_VAL(finish_parse(cstate, $2.b)); 403 } 404 | null 405 ; 406 null: /* null */ { $$.q = qerr; } 407 ; 408 expr: term 409 | expr and term { gen_and($1.b, $3.b); $$ = $3; } 410 | expr and id { gen_and($1.b, $3.b); $$ = $3; } 411 | expr or term { gen_or($1.b, $3.b); $$ = $3; } 412 | expr or id { gen_or($1.b, $3.b); $$ = $3; } 413 ; 414 and: AND { $$ = $<blk>0; } 415 ; 416 or: OR { $$ = $<blk>0; } 417 ; 418 id: nid 419 | pnum { CHECK_PTR_VAL(($$.b = gen_ncode(cstate, NULL, $1, 420 $$.q = $<blk>0.q))); } 421 | paren pid ')' { $$ = $2; } 422 ; 423 nid: ID { CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_scode(cstate, $1, $$.q = $<blk>0.q))); } 424 | HID '/' NUM { CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_mcode(cstate, $1, NULL, $3, 425 $$.q = $<blk>0.q))); } 426 | HID NETMASK HID { CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_mcode(cstate, $1, $3, 0, 427 $$.q = $<blk>0.q))); } 428 | HID { 429 CHECK_PTR_VAL($1); 430 /* Decide how to parse HID based on proto */ 431 $$.q = $<blk>0.q; 432 if ($$.q.addr == Q_PORT) { 433 bpf_set_error(cstate, "'port' modifier applied to ip host"); 434 YYABORT; 435 } else if ($$.q.addr == Q_PORTRANGE) { 436 bpf_set_error(cstate, "'portrange' modifier applied to ip host"); 437 YYABORT; 438 } else if ($$.q.addr == Q_PROTO) { 439 bpf_set_error(cstate, "'proto' modifier applied to ip host"); 440 YYABORT; 441 } else if ($$.q.addr == Q_PROTOCHAIN) { 442 bpf_set_error(cstate, "'protochain' modifier applied to ip host"); 443 YYABORT; 444 } 445 CHECK_PTR_VAL(($$.b = gen_ncode(cstate, $1, 0, $$.q))); 446 } 447 | HID6 '/' NUM { 448 CHECK_PTR_VAL($1); 449 #ifdef INET6 450 CHECK_PTR_VAL(($$.b = gen_mcode6(cstate, $1, NULL, $3, 451 $$.q = $<blk>0.q))); 452 #else 453 bpf_set_error(cstate, "'ip6addr/prefixlen' not supported " 454 "in this configuration"); 455 YYABORT; 456 #endif /*INET6*/ 457 } 458 | HID6 { 459 CHECK_PTR_VAL($1); 460 #ifdef INET6 461 CHECK_PTR_VAL(($$.b = gen_mcode6(cstate, $1, 0, 128, 462 $$.q = $<blk>0.q))); 463 #else 464 bpf_set_error(cstate, "'ip6addr' not supported " 465 "in this configuration"); 466 YYABORT; 467 #endif /*INET6*/ 468 } 469 | EID { CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_ecode(cstate, $1, $$.q = $<blk>0.q))); } 470 | AID { CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_acode(cstate, $1, $$.q = $<blk>0.q))); } 471 | not id { gen_not($2.b); $$ = $2; } 472 ; 473 not: '!' { $$ = $<blk>0; } 474 ; 475 paren: '(' { $$ = $<blk>0; } 476 ; 477 pid: nid 478 | qid and id { gen_and($1.b, $3.b); $$ = $3; } 479 | qid or id { gen_or($1.b, $3.b); $$ = $3; } 480 ; 481 qid: pnum { CHECK_PTR_VAL(($$.b = gen_ncode(cstate, NULL, $1, 482 $$.q = $<blk>0.q))); } 483 | pid 484 ; 485 term: rterm 486 | not term { gen_not($2.b); $$ = $2; } 487 ; 488 head: pqual dqual aqual { QSET($$.q, $1, $2, $3); } 489 | pqual dqual { QSET($$.q, $1, $2, Q_DEFAULT); } 490 | pqual aqual { QSET($$.q, $1, Q_DEFAULT, $2); } 491 | pqual PROTO { QSET($$.q, $1, Q_DEFAULT, Q_PROTO); } 492 | pqual PROTOCHAIN { 493 #ifdef NO_PROTOCHAIN 494 bpf_set_error(cstate, "protochain not supported"); 495 YYABORT; 496 #else 497 QSET($$.q, $1, Q_DEFAULT, Q_PROTOCHAIN); 498 #endif 499 } 500 | pqual ndaqual { QSET($$.q, $1, Q_DEFAULT, $2); } 501 ; 502 rterm: head id { $$ = $2; } 503 | paren expr ')' { $$.b = $2.b; $$.q = $1.q; } 504 | pname { CHECK_PTR_VAL(($$.b = gen_proto_abbrev(cstate, $1))); $$.q = qerr; } 505 | arth relop arth { CHECK_PTR_VAL(($$.b = gen_relation(cstate, $2, $1, $3, 0))); 506 $$.q = qerr; } 507 | arth irelop arth { CHECK_PTR_VAL(($$.b = gen_relation(cstate, $2, $1, $3, 1))); 508 $$.q = qerr; } 509 | other { $$.b = $1; $$.q = qerr; } 510 | atmtype { CHECK_PTR_VAL(($$.b = gen_atmtype_abbrev(cstate, $1))); $$.q = qerr; } 511 | atmmultitype { CHECK_PTR_VAL(($$.b = gen_atmmulti_abbrev(cstate, $1))); $$.q = qerr; } 512 | atmfield atmvalue { $$.b = $2.b; $$.q = qerr; } 513 | mtp2type { CHECK_PTR_VAL(($$.b = gen_mtp2type_abbrev(cstate, $1))); $$.q = qerr; } 514 | mtp3field mtp3value { $$.b = $2.b; $$.q = qerr; } 515 ; 516 /* protocol level qualifiers */ 517 pqual: pname 518 | { $$ = Q_DEFAULT; } 519 ; 520 /* 'direction' qualifiers */ 521 dqual: SRC { $$ = Q_SRC; } 522 | DST { $$ = Q_DST; } 523 | SRC OR DST { $$ = Q_OR; } 524 | DST OR SRC { $$ = Q_OR; } 525 | SRC AND DST { $$ = Q_AND; } 526 | DST AND SRC { $$ = Q_AND; } 527 | ADDR1 { $$ = Q_ADDR1; } 528 | ADDR2 { $$ = Q_ADDR2; } 529 | ADDR3 { $$ = Q_ADDR3; } 530 | ADDR4 { $$ = Q_ADDR4; } 531 | RA { $$ = Q_RA; } 532 | TA { $$ = Q_TA; } 533 ; 534 /* address type qualifiers */ 535 aqual: HOST { $$ = Q_HOST; } 536 | NET { $$ = Q_NET; } 537 | PORT { $$ = Q_PORT; } 538 | PORTRANGE { $$ = Q_PORTRANGE; } 539 ; 540 /* non-directional address type qualifiers */ 541 ndaqual: GATEWAY { $$ = Q_GATEWAY; } 542 ; 543 pname: LINK { $$ = Q_LINK; } 544 | IP { $$ = Q_IP; } 545 | ARP { $$ = Q_ARP; } 546 | RARP { $$ = Q_RARP; } 547 | SCTP { $$ = Q_SCTP; } 548 | TCP { $$ = Q_TCP; } 549 | UDP { $$ = Q_UDP; } 550 | ICMP { $$ = Q_ICMP; } 551 | IGMP { $$ = Q_IGMP; } 552 | IGRP { $$ = Q_IGRP; } 553 | PIM { $$ = Q_PIM; } 554 | VRRP { $$ = Q_VRRP; } 555 | CARP { $$ = Q_CARP; } 556 | ATALK { $$ = Q_ATALK; } 557 | AARP { $$ = Q_AARP; } 558 | DECNET { $$ = Q_DECNET; } 559 | LAT { $$ = Q_LAT; } 560 | SCA { $$ = Q_SCA; } 561 | MOPDL { $$ = Q_MOPDL; } 562 | MOPRC { $$ = Q_MOPRC; } 563 | IPV6 { $$ = Q_IPV6; } 564 | ICMPV6 { $$ = Q_ICMPV6; } 565 | AH { $$ = Q_AH; } 566 | ESP { $$ = Q_ESP; } 567 | ISO { $$ = Q_ISO; } 568 | ESIS { $$ = Q_ESIS; } 569 | ISIS { $$ = Q_ISIS; } 570 | L1 { $$ = Q_ISIS_L1; } 571 | L2 { $$ = Q_ISIS_L2; } 572 | IIH { $$ = Q_ISIS_IIH; } 573 | LSP { $$ = Q_ISIS_LSP; } 574 | SNP { $$ = Q_ISIS_SNP; } 575 | PSNP { $$ = Q_ISIS_PSNP; } 576 | CSNP { $$ = Q_ISIS_CSNP; } 577 | CLNP { $$ = Q_CLNP; } 578 | STP { $$ = Q_STP; } 579 | IPX { $$ = Q_IPX; } 580 | NETBEUI { $$ = Q_NETBEUI; } 581 | RADIO { $$ = Q_RADIO; } 582 ; 583 other: pqual TK_BROADCAST { CHECK_PTR_VAL(($$ = gen_broadcast(cstate, $1))); } 584 | pqual TK_MULTICAST { CHECK_PTR_VAL(($$ = gen_multicast(cstate, $1))); } 585 | LESS NUM { CHECK_PTR_VAL(($$ = gen_less(cstate, $2))); } 586 | GREATER NUM { CHECK_PTR_VAL(($$ = gen_greater(cstate, $2))); } 587 | CBYTE NUM byteop NUM { CHECK_PTR_VAL(($$ = gen_byteop(cstate, $3, $2, $4))); } 588 | INBOUND { CHECK_PTR_VAL(($$ = gen_inbound(cstate, 0))); } 589 | OUTBOUND { CHECK_PTR_VAL(($$ = gen_inbound(cstate, 1))); } 590 | IFINDEX NUM { CHECK_PTR_VAL(($$ = gen_ifindex(cstate, $2))); } 591 | VLAN pnum { CHECK_PTR_VAL(($$ = gen_vlan(cstate, $2, 1))); } 592 | VLAN { CHECK_PTR_VAL(($$ = gen_vlan(cstate, 0, 0))); } 593 | MPLS pnum { CHECK_PTR_VAL(($$ = gen_mpls(cstate, $2, 1))); } 594 | MPLS { CHECK_PTR_VAL(($$ = gen_mpls(cstate, 0, 0))); } 595 | PPPOED { CHECK_PTR_VAL(($$ = gen_pppoed(cstate))); } 596 | PPPOES pnum { CHECK_PTR_VAL(($$ = gen_pppoes(cstate, $2, 1))); } 597 | PPPOES { CHECK_PTR_VAL(($$ = gen_pppoes(cstate, 0, 0))); } 598 | GENEVE pnum { CHECK_PTR_VAL(($$ = gen_geneve(cstate, $2, 1))); } 599 | GENEVE { CHECK_PTR_VAL(($$ = gen_geneve(cstate, 0, 0))); } 600 | pfvar { $$ = $1; } 601 | pqual p80211 { $$ = $2; } 602 | pllc { $$ = $1; } 603 ; 604 605 pfvar: PF_IFNAME ID { CHECK_PTR_VAL($2); CHECK_PTR_VAL(($$ = gen_pf_ifname(cstate, $2))); } 606 | PF_RSET ID { CHECK_PTR_VAL($2); CHECK_PTR_VAL(($$ = gen_pf_ruleset(cstate, $2))); } 607 | PF_RNR NUM { CHECK_PTR_VAL(($$ = gen_pf_rnr(cstate, $2))); } 608 | PF_SRNR NUM { CHECK_PTR_VAL(($$ = gen_pf_srnr(cstate, $2))); } 609 | PF_REASON reason { CHECK_PTR_VAL(($$ = gen_pf_reason(cstate, $2))); } 610 | PF_ACTION action { CHECK_PTR_VAL(($$ = gen_pf_action(cstate, $2))); } 611 ; 612 613 p80211: TYPE type SUBTYPE subtype 614 { CHECK_PTR_VAL(($$ = gen_p80211_type(cstate, $2 | $4, 615 IEEE80211_FC0_TYPE_MASK | 616 IEEE80211_FC0_SUBTYPE_MASK))); 617 } 618 | TYPE type { CHECK_PTR_VAL(($$ = gen_p80211_type(cstate, $2, 619 IEEE80211_FC0_TYPE_MASK))); 620 } 621 | SUBTYPE type_subtype { CHECK_PTR_VAL(($$ = gen_p80211_type(cstate, $2, 622 IEEE80211_FC0_TYPE_MASK | 623 IEEE80211_FC0_SUBTYPE_MASK))); 624 } 625 | DIR dir { CHECK_PTR_VAL(($$ = gen_p80211_fcdir(cstate, $2))); } 626 ; 627 628 type: NUM { if (($1 & (~IEEE80211_FC0_TYPE_MASK)) != 0) { 629 bpf_set_error(cstate, "invalid 802.11 type value 0x%02x", $1); 630 YYABORT; 631 } 632 $$ = (int)$1; 633 } 634 | ID { CHECK_PTR_VAL($1); 635 $$ = str2tok($1, ieee80211_types); 636 if ($$ == -1) { 637 bpf_set_error(cstate, "unknown 802.11 type name \"%s\"", $1); 638 YYABORT; 639 } 640 } 641 ; 642 643 subtype: NUM { if (($1 & (~IEEE80211_FC0_SUBTYPE_MASK)) != 0) { 644 bpf_set_error(cstate, "invalid 802.11 subtype value 0x%02x", $1); 645 YYABORT; 646 } 647 $$ = (int)$1; 648 } 649 | ID { const struct tok *types = NULL; 650 int i; 651 CHECK_PTR_VAL($1); 652 for (i = 0;; i++) { 653 if (ieee80211_type_subtypes[i].tok == NULL) { 654 /* Ran out of types */ 655 bpf_set_error(cstate, "unknown 802.11 type"); 656 YYABORT; 657 } 658 if ($<i>-1 == ieee80211_type_subtypes[i].type) { 659 types = ieee80211_type_subtypes[i].tok; 660 break; 661 } 662 } 663 664 $$ = str2tok($1, types); 665 if ($$ == -1) { 666 bpf_set_error(cstate, "unknown 802.11 subtype name \"%s\"", $1); 667 YYABORT; 668 } 669 } 670 ; 671 672 type_subtype: ID { int i; 673 CHECK_PTR_VAL($1); 674 for (i = 0;; i++) { 675 if (ieee80211_type_subtypes[i].tok == NULL) { 676 /* Ran out of types */ 677 bpf_set_error(cstate, "unknown 802.11 type name"); 678 YYABORT; 679 } 680 $$ = str2tok($1, ieee80211_type_subtypes[i].tok); 681 if ($$ != -1) { 682 $$ |= ieee80211_type_subtypes[i].type; 683 break; 684 } 685 } 686 } 687 ; 688 689 pllc: LLC { CHECK_PTR_VAL(($$ = gen_llc(cstate))); } 690 | LLC ID { CHECK_PTR_VAL($2); 691 if (pcap_strcasecmp($2, "i") == 0) { 692 CHECK_PTR_VAL(($$ = gen_llc_i(cstate))); 693 } else if (pcap_strcasecmp($2, "s") == 0) { 694 CHECK_PTR_VAL(($$ = gen_llc_s(cstate))); 695 } else if (pcap_strcasecmp($2, "u") == 0) { 696 CHECK_PTR_VAL(($$ = gen_llc_u(cstate))); 697 } else { 698 int subtype; 699 700 subtype = str2tok($2, llc_s_subtypes); 701 if (subtype != -1) { 702 CHECK_PTR_VAL(($$ = gen_llc_s_subtype(cstate, subtype))); 703 } else { 704 subtype = str2tok($2, llc_u_subtypes); 705 if (subtype == -1) { 706 bpf_set_error(cstate, "unknown LLC type name \"%s\"", $2); 707 YYABORT; 708 } 709 CHECK_PTR_VAL(($$ = gen_llc_u_subtype(cstate, subtype))); 710 } 711 } 712 } 713 /* sigh, "rnr" is already a keyword for PF */ 714 | LLC PF_RNR { CHECK_PTR_VAL(($$ = gen_llc_s_subtype(cstate, LLC_RNR))); } 715 ; 716 717 dir: NUM { $$ = (int)$1; } 718 | ID { CHECK_PTR_VAL($1); 719 if (pcap_strcasecmp($1, "nods") == 0) 720 $$ = IEEE80211_FC1_DIR_NODS; 721 else if (pcap_strcasecmp($1, "tods") == 0) 722 $$ = IEEE80211_FC1_DIR_TODS; 723 else if (pcap_strcasecmp($1, "fromds") == 0) 724 $$ = IEEE80211_FC1_DIR_FROMDS; 725 else if (pcap_strcasecmp($1, "dstods") == 0) 726 $$ = IEEE80211_FC1_DIR_DSTODS; 727 else { 728 bpf_set_error(cstate, "unknown 802.11 direction"); 729 YYABORT; 730 } 731 } 732 ; 733 734 reason: NUM { $$ = $1; } 735 | ID { CHECK_PTR_VAL($1); CHECK_INT_VAL(($$ = pfreason_to_num(cstate, $1))); } 736 ; 737 738 action: ID { CHECK_PTR_VAL($1); CHECK_INT_VAL(($$ = pfaction_to_num(cstate, $1))); } 739 ; 740 741 relop: '>' { $$ = BPF_JGT; } 742 | GEQ { $$ = BPF_JGE; } 743 | '=' { $$ = BPF_JEQ; } 744 ; 745 irelop: LEQ { $$ = BPF_JGT; } 746 | '<' { $$ = BPF_JGE; } 747 | NEQ { $$ = BPF_JEQ; } 748 ; 749 arth: pnum { CHECK_PTR_VAL(($$ = gen_loadi(cstate, $1))); } 750 | narth 751 ; 752 narth: pname '[' arth ']' { CHECK_PTR_VAL(($$ = gen_load(cstate, $1, $3, 1))); } 753 | pname '[' arth ':' NUM ']' { CHECK_PTR_VAL(($$ = gen_load(cstate, $1, $3, $5))); } 754 | arth '+' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_ADD, $1, $3))); } 755 | arth '-' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_SUB, $1, $3))); } 756 | arth '*' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_MUL, $1, $3))); } 757 | arth '/' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_DIV, $1, $3))); } 758 | arth '%' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_MOD, $1, $3))); } 759 | arth '&' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_AND, $1, $3))); } 760 | arth '|' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_OR, $1, $3))); } 761 | arth '^' arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_XOR, $1, $3))); } 762 | arth LSH arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_LSH, $1, $3))); } 763 | arth RSH arth { CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_RSH, $1, $3))); } 764 | '-' arth %prec UMINUS { CHECK_PTR_VAL(($$ = gen_neg(cstate, $2))); } 765 | paren narth ')' { $$ = $2; } 766 | LEN { CHECK_PTR_VAL(($$ = gen_loadlen(cstate))); } 767 ; 768 byteop: '&' { $$ = '&'; } 769 | '|' { $$ = '|'; } 770 | '<' { $$ = '<'; } 771 | '>' { $$ = '>'; } 772 | '=' { $$ = '='; } 773 ; 774 pnum: NUM 775 | paren pnum ')' { $$ = $2; } 776 ; 777 atmtype: LANE { $$ = A_LANE; } 778 | METAC { $$ = A_METAC; } 779 | BCC { $$ = A_BCC; } 780 | OAMF4EC { $$ = A_OAMF4EC; } 781 | OAMF4SC { $$ = A_OAMF4SC; } 782 | SC { $$ = A_SC; } 783 | ILMIC { $$ = A_ILMIC; } 784 ; 785 atmmultitype: OAM { $$ = A_OAM; } 786 | OAMF4 { $$ = A_OAMF4; } 787 | CONNECTMSG { $$ = A_CONNECTMSG; } 788 | METACONNECT { $$ = A_METACONNECT; } 789 ; 790 /* ATM field types quantifier */ 791 atmfield: VPI { $$.atmfieldtype = A_VPI; } 792 | VCI { $$.atmfieldtype = A_VCI; } 793 ; 794 atmvalue: atmfieldvalue 795 | relop NUM { CHECK_PTR_VAL(($$.b = gen_atmfield_code(cstate, $<blk>0.atmfieldtype, $2, $1, 0))); } 796 | irelop NUM { CHECK_PTR_VAL(($$.b = gen_atmfield_code(cstate, $<blk>0.atmfieldtype, $2, $1, 1))); } 797 | paren atmlistvalue ')' { $$.b = $2.b; $$.q = qerr; } 798 ; 799 atmfieldvalue: NUM { 800 $$.atmfieldtype = $<blk>0.atmfieldtype; 801 if ($$.atmfieldtype == A_VPI || 802 $$.atmfieldtype == A_VCI) 803 CHECK_PTR_VAL(($$.b = gen_atmfield_code(cstate, $$.atmfieldtype, $1, BPF_JEQ, 0))); 804 } 805 ; 806 atmlistvalue: atmfieldvalue 807 | atmlistvalue or atmfieldvalue { gen_or($1.b, $3.b); $$ = $3; } 808 ; 809 /* MTP2 types quantifier */ 810 mtp2type: FISU { $$ = M_FISU; } 811 | LSSU { $$ = M_LSSU; } 812 | MSU { $$ = M_MSU; } 813 | HFISU { $$ = MH_FISU; } 814 | HLSSU { $$ = MH_LSSU; } 815 | HMSU { $$ = MH_MSU; } 816 ; 817 /* MTP3 field types quantifier */ 818 mtp3field: SIO { $$.mtp3fieldtype = M_SIO; } 819 | OPC { $$.mtp3fieldtype = M_OPC; } 820 | DPC { $$.mtp3fieldtype = M_DPC; } 821 | SLS { $$.mtp3fieldtype = M_SLS; } 822 | HSIO { $$.mtp3fieldtype = MH_SIO; } 823 | HOPC { $$.mtp3fieldtype = MH_OPC; } 824 | HDPC { $$.mtp3fieldtype = MH_DPC; } 825 | HSLS { $$.mtp3fieldtype = MH_SLS; } 826 ; 827 mtp3value: mtp3fieldvalue 828 | relop NUM { CHECK_PTR_VAL(($$.b = gen_mtp3field_code(cstate, $<blk>0.mtp3fieldtype, $2, $1, 0))); } 829 | irelop NUM { CHECK_PTR_VAL(($$.b = gen_mtp3field_code(cstate, $<blk>0.mtp3fieldtype, $2, $1, 1))); } 830 | paren mtp3listvalue ')' { $$.b = $2.b; $$.q = qerr; } 831 ; 832 mtp3fieldvalue: NUM { 833 $$.mtp3fieldtype = $<blk>0.mtp3fieldtype; 834 if ($$.mtp3fieldtype == M_SIO || 835 $$.mtp3fieldtype == M_OPC || 836 $$.mtp3fieldtype == M_DPC || 837 $$.mtp3fieldtype == M_SLS || 838 $$.mtp3fieldtype == MH_SIO || 839 $$.mtp3fieldtype == MH_OPC || 840 $$.mtp3fieldtype == MH_DPC || 841 $$.mtp3fieldtype == MH_SLS) 842 CHECK_PTR_VAL(($$.b = gen_mtp3field_code(cstate, $$.mtp3fieldtype, $1, BPF_JEQ, 0))); 843 } 844 ; 845 mtp3listvalue: mtp3fieldvalue 846 | mtp3listvalue or mtp3fieldvalue { gen_or($1.b, $3.b); $$ = $3; } 847 ; 848 %% 849