xref: /freebsd/contrib/libpcap/grammar.y.in (revision e47161e5f1f01ef300c6e7efdb9c92e3a6c497ff)
1/*
2 * We want a reentrant parser.
3 */
4@REENTRANT_PARSER@
5
6/*
7 * We also want a reentrant scanner, so we have to pass the
8 * handle for the reentrant scanner to the parser, and the
9 * parser has to pass it to the lexical analyzer.
10 *
11 * We use void * rather than yyscan_t because, at least with some
12 * versions of Flex and Bison, if you use yyscan_t in %parse-param and
13 * %lex-param, you have to include scanner.h before grammar.h to get
14 * yyscan_t declared, and you have to include grammar.h before scanner.h
15 * to get YYSTYPE declared.  Using void * breaks the cycle; the Flex
16 * documentation says yyscan_t is just a void *.
17 */
18%parse-param   {void *yyscanner}
19%lex-param   {void *yyscanner}
20
21/*
22 * According to bison documentation, shift/reduce conflicts are not an issue
23 * in most parsers as long as the number does not evolve over time:
24 * https://www.gnu.org/software/bison/manual/html_node/Expect-Decl.html
25 * So, following the advice use %expect to check the amount of shift/reduce
26 * warnings.
27 *
28 * This doesn't appear to work in Berkeley YACC - 1.9 20170709; it still
29 * warns of 38 shift/reduce conflicts.
30 *
31 * The Berkeley YACC documentation:
32 *
33 *    https://invisible-island.net/byacc/manpage/yacc.html
34 *
35 * claims that "Bison's support for "%expect" is broken in more than one
36 * release.", but doesn't give details.  Hopefully, that only means that
37 * you get warnings even if you have the expected number of shift/reduce
38 * conflicts, not that anything else fails.
39 */
40%expect 38
41
42/*
43 * And we need to pass the compiler state to the scanner.
44 */
45%parse-param { compiler_state_t *cstate }
46
47%{
48/*
49 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996
50 *	The Regents of the University of California.  All rights reserved.
51 *
52 * Redistribution and use in source and binary forms, with or without
53 * modification, are permitted provided that: (1) source code distributions
54 * retain the above copyright notice and this paragraph in its entirety, (2)
55 * distributions including binary code include the above copyright notice and
56 * this paragraph in its entirety in the documentation or other materials
57 * provided with the distribution, and (3) all advertising materials mentioning
58 * features or use of this software display the following acknowledgement:
59 * ``This product includes software developed by the University of California,
60 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
61 * the University nor the names of its contributors may be used to endorse
62 * or promote products derived from this software without specific prior
63 * written permission.
64 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
65 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
66 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
67 *
68 */
69
70#include <config.h>
71
72/*
73 * grammar.h requires gencode.h and sometimes breaks in a polluted namespace
74 * (see ftmacros.h), so include it early.
75 */
76#include "gencode.h"
77#include "grammar.h"
78
79#include <stdlib.h>
80
81#ifndef _WIN32
82#include <sys/types.h>
83#include <sys/socket.h>
84
85#if __STDC__
86struct mbuf;
87struct rtentry;
88#endif
89
90#include <netinet/in.h>
91#include <arpa/inet.h>
92#endif /* _WIN32 */
93
94#include <stdio.h>
95
96#include "diag-control.h"
97
98#include "pcap-int.h"
99
100#include "scanner.h"
101
102#include "llc.h"
103#include "ieee80211.h"
104#include "pflog.h"
105#include <pcap/namedb.h>
106
107#ifdef HAVE_OS_PROTO_H
108#include "os-proto.h"
109#endif
110
111/*
112 * Work around some bugs in Berkeley YACC prior to the 2017-07-09
113 * release.
114 *
115 * The 2005-05-05 release was the first one to define YYPATCH, so
116 * we treat any release that either 1) doesn't define YYPATCH or
117 * 2) defines it to a value < 20170709 as being buggy.
118 */
119#if defined(YYBYACC) && (!defined(YYPATCH) || YYPATCH < 20170709)
120/*
121 * Both Berkeley YACC and Bison define yydebug (under whatever name
122 * it has) as a global, but Bison does so only if YYDEBUG is defined.
123 * Berkeley YACC, prior to the 2017-07-09 release, defines it even if
124 * YYDEBUG isn't defined; declare it here to suppress a warning.  The
125 * 2017-07-09 release fixes that.
126 */
127#if !defined(YYDEBUG)
128extern int yydebug;
129#endif
130
131/*
132 * In Berkeley YACC, prior to the 2017-07-09 release, yynerrs (under
133 * whatever name it has) is global, even if it's building a reentrant
134 * parser.  In Bison, and in the Berkeley YACC 2017-07-09 release and
135 * later, it's local in reentrant parsers.
136 *
137 * Declare it to squelch a warning.
138 */
139extern int yynerrs;
140#endif
141
142#define QSET(q, p, d, a) (q).proto = (unsigned char)(p),\
143			 (q).dir = (unsigned char)(d),\
144			 (q).addr = (unsigned char)(a)
145
146struct tok {
147	int v;			/* value */
148	const char *s;		/* string */
149};
150
151static const struct tok ieee80211_types[] = {
152	{ IEEE80211_FC0_TYPE_DATA, "data" },
153	{ IEEE80211_FC0_TYPE_MGT, "mgt" },
154	{ IEEE80211_FC0_TYPE_MGT, "management" },
155	{ IEEE80211_FC0_TYPE_CTL, "ctl" },
156	{ IEEE80211_FC0_TYPE_CTL, "control" },
157	{ 0, NULL }
158};
159static const struct tok ieee80211_mgt_subtypes[] = {
160	{ IEEE80211_FC0_SUBTYPE_ASSOC_REQ, "assocreq" },
161	{ IEEE80211_FC0_SUBTYPE_ASSOC_REQ, "assoc-req" },
162	{ IEEE80211_FC0_SUBTYPE_ASSOC_RESP, "assocresp" },
163	{ IEEE80211_FC0_SUBTYPE_ASSOC_RESP, "assoc-resp" },
164	{ IEEE80211_FC0_SUBTYPE_REASSOC_REQ, "reassocreq" },
165	{ IEEE80211_FC0_SUBTYPE_REASSOC_REQ, "reassoc-req" },
166	{ IEEE80211_FC0_SUBTYPE_REASSOC_RESP, "reassocresp" },
167	{ IEEE80211_FC0_SUBTYPE_REASSOC_RESP, "reassoc-resp" },
168	{ IEEE80211_FC0_SUBTYPE_PROBE_REQ, "probereq" },
169	{ IEEE80211_FC0_SUBTYPE_PROBE_REQ, "probe-req" },
170	{ IEEE80211_FC0_SUBTYPE_PROBE_RESP, "proberesp" },
171	{ IEEE80211_FC0_SUBTYPE_PROBE_RESP, "probe-resp" },
172	{ IEEE80211_FC0_SUBTYPE_BEACON, "beacon" },
173	{ IEEE80211_FC0_SUBTYPE_ATIM, "atim" },
174	{ IEEE80211_FC0_SUBTYPE_DISASSOC, "disassoc" },
175	{ IEEE80211_FC0_SUBTYPE_DISASSOC, "disassociation" },
176	{ IEEE80211_FC0_SUBTYPE_AUTH, "auth" },
177	{ IEEE80211_FC0_SUBTYPE_AUTH, "authentication" },
178	{ IEEE80211_FC0_SUBTYPE_DEAUTH, "deauth" },
179	{ IEEE80211_FC0_SUBTYPE_DEAUTH, "deauthentication" },
180	{ 0, NULL }
181};
182static const struct tok ieee80211_ctl_subtypes[] = {
183	{ IEEE80211_FC0_SUBTYPE_PS_POLL, "ps-poll" },
184	{ IEEE80211_FC0_SUBTYPE_RTS, "rts" },
185	{ IEEE80211_FC0_SUBTYPE_CTS, "cts" },
186	{ IEEE80211_FC0_SUBTYPE_ACK, "ack" },
187	{ IEEE80211_FC0_SUBTYPE_CF_END, "cf-end" },
188	{ IEEE80211_FC0_SUBTYPE_CF_END_ACK, "cf-end-ack" },
189	{ 0, NULL }
190};
191static const struct tok ieee80211_data_subtypes[] = {
192	{ IEEE80211_FC0_SUBTYPE_DATA, "data" },
193	{ IEEE80211_FC0_SUBTYPE_CF_ACK, "data-cf-ack" },
194	{ IEEE80211_FC0_SUBTYPE_CF_POLL, "data-cf-poll" },
195	{ IEEE80211_FC0_SUBTYPE_CF_ACPL, "data-cf-ack-poll" },
196	{ IEEE80211_FC0_SUBTYPE_NODATA, "null" },
197	{ IEEE80211_FC0_SUBTYPE_NODATA_CF_ACK, "cf-ack" },
198	{ IEEE80211_FC0_SUBTYPE_NODATA_CF_POLL, "cf-poll"  },
199	{ IEEE80211_FC0_SUBTYPE_NODATA_CF_ACPL, "cf-ack-poll" },
200	{ IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_DATA, "qos-data" },
201	{ IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_CF_ACK, "qos-data-cf-ack" },
202	{ IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_CF_POLL, "qos-data-cf-poll" },
203	{ IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_CF_ACPL, "qos-data-cf-ack-poll" },
204	{ IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_NODATA, "qos" },
205	{ IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_NODATA_CF_POLL, "qos-cf-poll" },
206	{ IEEE80211_FC0_SUBTYPE_QOS|IEEE80211_FC0_SUBTYPE_NODATA_CF_ACPL, "qos-cf-ack-poll" },
207	{ 0, NULL }
208};
209static const struct tok llc_s_subtypes[] = {
210	{ LLC_RR, "rr" },
211	{ LLC_RNR, "rnr" },
212	{ LLC_REJ, "rej" },
213	{ 0, NULL }
214};
215static const struct tok llc_u_subtypes[] = {
216	{ LLC_UI, "ui" },
217	{ LLC_UA, "ua" },
218	{ LLC_DISC, "disc" },
219	{ LLC_DM, "dm" },
220	{ LLC_SABME, "sabme" },
221	{ LLC_TEST, "test" },
222	{ LLC_XID, "xid" },
223	{ LLC_FRMR, "frmr" },
224	{ 0, NULL }
225};
226struct type2tok {
227	int type;
228	const struct tok *tok;
229};
230static const struct type2tok ieee80211_type_subtypes[] = {
231	{ IEEE80211_FC0_TYPE_MGT, ieee80211_mgt_subtypes },
232	{ IEEE80211_FC0_TYPE_CTL, ieee80211_ctl_subtypes },
233	{ IEEE80211_FC0_TYPE_DATA, ieee80211_data_subtypes },
234	{ 0, NULL }
235};
236
237static int
238str2tok(const char *str, const struct tok *toks)
239{
240	int i;
241
242	for (i = 0; toks[i].s != NULL; i++) {
243		if (pcapint_strcasecmp(toks[i].s, str) == 0) {
244			/*
245			 * Just in case somebody is using this to
246			 * generate values of -1/0xFFFFFFFF.
247			 * That won't work, as it's indistinguishable
248			 * from an error.
249			 */
250			if (toks[i].v == -1)
251				abort();
252			return (toks[i].v);
253		}
254	}
255	return (-1);
256}
257
258static const struct qual qerr = { Q_UNDEF, Q_UNDEF, Q_UNDEF, Q_UNDEF };
259
260static void
261yyerror(void *yyscanner _U_, compiler_state_t *cstate, const char *msg)
262{
263	bpf_set_error(cstate, "can't parse filter expression: %s", msg);
264}
265
266static const struct tok pflog_reasons[] = {
267	{ PFRES_MATCH,		"match" },
268	{ PFRES_BADOFF,		"bad-offset" },
269	{ PFRES_FRAG,		"fragment" },
270	{ PFRES_SHORT,		"short" },
271	{ PFRES_NORM,		"normalize" },
272	{ PFRES_MEMORY,		"memory" },
273	{ PFRES_TS,		"bad-timestamp" },
274	{ PFRES_CONGEST,	"congestion" },
275	{ PFRES_IPOPTIONS,	"ip-option" },
276	{ PFRES_PROTCKSUM,	"proto-cksum" },
277	{ PFRES_BADSTATE,	"state-mismatch" },
278	{ PFRES_STATEINS,	"state-insert" },
279	{ PFRES_MAXSTATES,	"state-limit" },
280	{ PFRES_SRCLIMIT,	"src-limit" },
281	{ PFRES_SYNPROXY,	"synproxy" },
282#if defined(__FreeBSD__)
283	{ PFRES_MAPFAILED,	"map-failed" },
284#elif defined(__NetBSD__)
285	{ PFRES_STATELOCKED,	"state-locked" },
286#elif defined(__OpenBSD__)
287	{ PFRES_TRANSLATE,	"translate" },
288	{ PFRES_NOROUTE,	"no-route" },
289#elif defined(__APPLE__)
290	{ PFRES_DUMMYNET,	"dummynet" },
291#endif
292	{ 0, NULL }
293};
294
295static int
296pfreason_to_num(compiler_state_t *cstate, const char *reason)
297{
298	int i;
299
300	i = str2tok(reason, pflog_reasons);
301	if (i == -1)
302		bpf_set_error(cstate, "unknown PF reason \"%s\"", reason);
303	return (i);
304}
305
306static const struct tok pflog_actions[] = {
307	{ PF_PASS,		"pass" },
308	{ PF_PASS,		"accept" },	/* alias for "pass" */
309	{ PF_DROP,		"drop" },
310	{ PF_DROP,		"block" },	/* alias for "drop" */
311	{ PF_SCRUB,		"scrub" },
312	{ PF_NOSCRUB,		"noscrub" },
313	{ PF_NAT,		"nat" },
314	{ PF_NONAT,		"nonat" },
315	{ PF_BINAT,		"binat" },
316	{ PF_NOBINAT,		"nobinat" },
317	{ PF_RDR,		"rdr" },
318	{ PF_NORDR,		"nordr" },
319	{ PF_SYNPROXY_DROP,	"synproxy-drop" },
320#if defined(__FreeBSD__)
321	{ PF_DEFER,		"defer" },
322#elif defined(__OpenBSD__)
323	{ PF_DEFER,		"defer" },
324	{ PF_MATCH,		"match" },
325	{ PF_DIVERT,		"divert" },
326	{ PF_RT,		"rt" },
327	{ PF_AFRT,		"afrt" },
328#elif defined(__APPLE__)
329	{ PF_DUMMYNET,		"dummynet" },
330	{ PF_NODUMMYNET,	"nodummynet" },
331	{ PF_NAT64,		"nat64" },
332	{ PF_NONAT64,		"nonat64" },
333#endif
334	{ 0, NULL },
335};
336
337static int
338pfaction_to_num(compiler_state_t *cstate, const char *action)
339{
340	int i;
341
342	i = str2tok(action, pflog_actions);
343	if (i == -1)
344		bpf_set_error(cstate, "unknown PF action \"%s\"", action);
345	return (i);
346}
347
348/*
349 * For calls that might return an "an error occurred" value.
350 */
351#define CHECK_INT_VAL(val)	if (val == -1) YYABORT
352#define CHECK_PTR_VAL(val)	if (val == NULL) YYABORT
353
354DIAG_OFF_BISON_BYACC
355%}
356
357%union {
358	int i;
359	bpf_u_int32 h;
360	char *s;
361	struct stmt *stmt;
362	struct arth *a;
363	struct {
364		struct qual q;
365		int atmfieldtype;
366		int mtp3fieldtype;
367		struct block *b;
368	} blk;
369	struct block *rblk;
370}
371
372%type	<blk>	expr id nid pid term rterm qid
373%type	<blk>	head
374%type	<i>	pqual dqual aqual ndaqual
375%type	<a>	arth narth
376%type	<i>	byteop pname relop irelop
377%type	<h>	pnum
378%type	<blk>	and or paren not null prog
379%type	<rblk>	other pfvar p80211 pllc
380%type	<i>	atmtype atmmultitype
381%type	<blk>	atmfield
382%type	<blk>	atmfieldvalue atmvalue atmlistvalue
383%type	<i>	mtp2type
384%type	<blk>	mtp3field
385%type	<blk>	mtp3fieldvalue mtp3value mtp3listvalue
386
387
388%token  DST SRC HOST GATEWAY
389%token  NET NETMASK PORT PORTRANGE LESS GREATER PROTO PROTOCHAIN CBYTE
390%token  ARP RARP IP SCTP TCP UDP ICMP IGMP IGRP PIM VRRP CARP
391%token  ATALK AARP DECNET LAT SCA MOPRC MOPDL
392%token  TK_BROADCAST TK_MULTICAST
393%token  NUM INBOUND OUTBOUND
394%token  IFINDEX
395%token  PF_IFNAME PF_RSET PF_RNR PF_SRNR PF_REASON PF_ACTION
396%token	TYPE SUBTYPE DIR ADDR1 ADDR2 ADDR3 ADDR4 RA TA
397%token  LINK
398%token	GEQ LEQ NEQ
399%token	ID EID HID HID6 AID
400%token	LSH RSH
401%token  LEN
402%token  IPV6 ICMPV6 AH ESP
403%token	VLAN MPLS
404%token	PPPOED PPPOES GENEVE
405%token  ISO ESIS CLNP ISIS L1 L2 IIH LSP SNP CSNP PSNP
406%token  STP
407%token  IPX
408%token  NETBEUI
409%token	LANE LLC METAC BCC SC ILMIC OAMF4EC OAMF4SC
410%token	OAM OAMF4 CONNECTMSG METACONNECT
411%token	VPI VCI
412%token	RADIO
413%token	FISU LSSU MSU HFISU HLSSU HMSU
414%token	SIO OPC DPC SLS HSIO HOPC HDPC HSLS
415%token	LEX_ERROR
416
417%type	<s> ID EID AID
418%type	<s> HID HID6
419%type	<h> NUM
420%type	<i> action reason type subtype type_subtype dir
421
422%left OR AND
423%nonassoc  '!'
424%left '|'
425%left '&'
426%left LSH RSH
427%left '+' '-'
428%left '*' '/'
429%nonassoc UMINUS
430%%
431prog:	  null expr
432{
433	/*
434	 * I'm not sure we have a reason to use yynerrs, but it's
435	 * declared, and incremented, whether we need it or not,
436	 * which means that Clang 15 will give a "used but not
437	 * set" warning.  This should suppress the warning for
438	 * yynerrs without suppressing it for other variables.
439	 */
440	(void) yynerrs;
441	CHECK_INT_VAL(finish_parse(cstate, $2.b));
442}
443	| null
444	;
445null:	  /* null */		{ $$.q = qerr; }
446	;
447expr:	  term
448	| expr and term		{ gen_and($1.b, $3.b); $$ = $3; }
449	| expr and id		{ gen_and($1.b, $3.b); $$ = $3; }
450	| expr or term		{ gen_or($1.b, $3.b); $$ = $3; }
451	| expr or id		{ gen_or($1.b, $3.b); $$ = $3; }
452	;
453and:	  AND			{ $$ = $<blk>0; }
454	;
455or:	  OR			{ $$ = $<blk>0; }
456	;
457id:	  nid
458	| pnum			{ CHECK_PTR_VAL(($$.b = gen_ncode(cstate, NULL, $1,
459						   $$.q = $<blk>0.q))); }
460	| paren pid ')'		{ $$ = $2; }
461	;
462nid:	  ID			{ CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_scode(cstate, $1, $$.q = $<blk>0.q))); }
463	| HID '/' NUM		{
464				  CHECK_PTR_VAL($1);
465				  /* Check whether HID/NUM is being used when appropriate */
466				  $$.q = $<blk>0.q;
467				  if ($$.q.addr == Q_PORT) {
468					bpf_set_error(cstate, "'port' modifier applied to IP address and prefix length");
469					YYABORT;
470				  } else if ($$.q.addr == Q_PORTRANGE) {
471					bpf_set_error(cstate, "'portrange' modifier applied to IP address and prefix length");
472					YYABORT;
473				  } else if ($$.q.addr == Q_PROTO) {
474					bpf_set_error(cstate, "'proto' modifier applied to IP address and prefix length");
475					YYABORT;
476				  } else if ($$.q.addr == Q_PROTOCHAIN) {
477					bpf_set_error(cstate, "'protochain' modifier applied to IP address and prefix length");
478					YYABORT;
479				  }
480				  CHECK_PTR_VAL(($$.b = gen_mcode(cstate, $1, NULL, $3, $$.q)));
481				}
482	| HID NETMASK HID	{
483				  CHECK_PTR_VAL($1);
484				  /* Check whether HID mask HID is being used when appropriate */
485				  $$.q = $<blk>0.q;
486				  if ($$.q.addr == Q_PORT) {
487					bpf_set_error(cstate, "'port' modifier applied to IP address and netmask");
488					YYABORT;
489				  } else if ($$.q.addr == Q_PORTRANGE) {
490					bpf_set_error(cstate, "'portrange' modifier applied to IP address and netmask");
491					YYABORT;
492				  } else if ($$.q.addr == Q_PROTO) {
493					bpf_set_error(cstate, "'proto' modifier applied to IP address and netmask");
494					YYABORT;
495				  } else if ($$.q.addr == Q_PROTOCHAIN) {
496					bpf_set_error(cstate, "'protochain' modifier applied to IP address and netmask");
497					YYABORT;
498				  }
499				  CHECK_PTR_VAL(($$.b = gen_mcode(cstate, $1, $3, 0, $$.q)));
500				}
501	| HID			{
502				  CHECK_PTR_VAL($1);
503				  /* Check whether HID is being used when appropriate */
504				  $$.q = $<blk>0.q;
505				  if ($$.q.addr == Q_PORT) {
506					bpf_set_error(cstate, "'port' modifier applied to IP address");
507					YYABORT;
508				  } else if ($$.q.addr == Q_PORTRANGE) {
509					bpf_set_error(cstate, "'portrange' modifier applied to IP address");
510					YYABORT;
511				  } else if ($$.q.addr == Q_PROTO) {
512					bpf_set_error(cstate, "'proto' modifier applied to IP address");
513					YYABORT;
514				  } else if ($$.q.addr == Q_PROTOCHAIN) {
515					bpf_set_error(cstate, "'protochain' modifier applied to IP address");
516					YYABORT;
517				  }
518				  CHECK_PTR_VAL(($$.b = gen_ncode(cstate, $1, 0, $$.q)));
519				}
520	| HID6 '/' NUM		{
521				  CHECK_PTR_VAL($1);
522#ifdef INET6
523				  /* Check whether HID6/NUM is being used when appropriate */
524				  $$.q = $<blk>0.q;
525				  if ($$.q.addr == Q_PORT) {
526					bpf_set_error(cstate, "'port' modifier applied to IP address and prefix length");
527					YYABORT;
528				  } else if ($$.q.addr == Q_PORTRANGE) {
529					bpf_set_error(cstate, "'portrange' modifier applied to IP address and prefix length");
530					YYABORT;
531				  } else if ($$.q.addr == Q_PROTO) {
532					bpf_set_error(cstate, "'proto' modifier applied to IP address and prefix length ");
533					YYABORT;
534				  } else if ($$.q.addr == Q_PROTOCHAIN) {
535					bpf_set_error(cstate, "'protochain' modifier applied to IP address and prefix length");
536					YYABORT;
537				  }
538				  CHECK_PTR_VAL(($$.b = gen_mcode6(cstate, $1, $3, $$.q)));
539#else
540				  bpf_set_error(cstate, "IPv6 addresses not supported "
541					"in this configuration");
542				  YYABORT;
543#endif /*INET6*/
544				}
545	| HID6			{
546				  CHECK_PTR_VAL($1);
547#ifdef INET6
548				  /* Check whether HID6 is being used when appropriate */
549				  $$.q = $<blk>0.q;
550				  if ($$.q.addr == Q_PORT) {
551					bpf_set_error(cstate, "'port' modifier applied to IP address");
552					YYABORT;
553				  } else if ($$.q.addr == Q_PORTRANGE) {
554					bpf_set_error(cstate, "'portrange' modifier applied to IP address");
555					YYABORT;
556				  } else if ($$.q.addr == Q_PROTO) {
557					bpf_set_error(cstate, "'proto' modifier applied to 'ip6addr/prefixlen");
558					YYABORT;
559				  } else if ($$.q.addr == Q_PROTOCHAIN) {
560					bpf_set_error(cstate, "'protochain' modifier applied to IP address");
561					YYABORT;
562				  }
563				  CHECK_PTR_VAL(($$.b = gen_mcode6(cstate, $1, 128, $$.q)));
564#else
565				  bpf_set_error(cstate, "IPv6 addresses not supported "
566					"in this configuration");
567				  YYABORT;
568#endif /*INET6*/
569				}
570	| EID			{ CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_ecode(cstate, $1, $$.q = $<blk>0.q))); }
571	| AID			{ CHECK_PTR_VAL($1); CHECK_PTR_VAL(($$.b = gen_acode(cstate, $1, $$.q = $<blk>0.q))); }
572	| not id		{ gen_not($2.b); $$ = $2; }
573	;
574not:	  '!'			{ $$ = $<blk>0; }
575	;
576paren:	  '('			{ $$ = $<blk>0; }
577	;
578pid:	  nid
579	| qid and id		{ gen_and($1.b, $3.b); $$ = $3; }
580	| qid or id		{ gen_or($1.b, $3.b); $$ = $3; }
581	;
582qid:	  pnum			{ CHECK_PTR_VAL(($$.b = gen_ncode(cstate, NULL, $1,
583						   $$.q = $<blk>0.q))); }
584	| pid
585	;
586term:	  rterm
587	| not term		{ gen_not($2.b); $$ = $2; }
588	;
589head:	  pqual dqual aqual	{ QSET($$.q, $1, $2, $3); }
590	| pqual dqual		{ QSET($$.q, $1, $2, Q_DEFAULT); }
591	| pqual aqual		{ QSET($$.q, $1, Q_DEFAULT, $2); }
592	| pqual PROTO		{ QSET($$.q, $1, Q_DEFAULT, Q_PROTO); }
593	| pqual PROTOCHAIN	{
594#ifdef NO_PROTOCHAIN
595				  bpf_set_error(cstate, "protochain not supported");
596				  YYABORT;
597#else
598				  QSET($$.q, $1, Q_DEFAULT, Q_PROTOCHAIN);
599#endif
600				}
601	| pqual ndaqual		{ QSET($$.q, $1, Q_DEFAULT, $2); }
602	;
603rterm:	  head id		{ $$ = $2; }
604	| paren expr ')'	{ $$.b = $2.b; $$.q = $1.q; }
605	| pname			{ CHECK_PTR_VAL(($$.b = gen_proto_abbrev(cstate, $1))); $$.q = qerr; }
606	| arth relop arth	{ CHECK_PTR_VAL(($$.b = gen_relation(cstate, $2, $1, $3, 0)));
607				  $$.q = qerr; }
608	| arth irelop arth	{ CHECK_PTR_VAL(($$.b = gen_relation(cstate, $2, $1, $3, 1)));
609				  $$.q = qerr; }
610	| other			{ $$.b = $1; $$.q = qerr; }
611	| atmtype		{ CHECK_PTR_VAL(($$.b = gen_atmtype_abbrev(cstate, $1))); $$.q = qerr; }
612	| atmmultitype		{ CHECK_PTR_VAL(($$.b = gen_atmmulti_abbrev(cstate, $1))); $$.q = qerr; }
613	| atmfield atmvalue	{ $$.b = $2.b; $$.q = qerr; }
614	| mtp2type		{ CHECK_PTR_VAL(($$.b = gen_mtp2type_abbrev(cstate, $1))); $$.q = qerr; }
615	| mtp3field mtp3value	{ $$.b = $2.b; $$.q = qerr; }
616	;
617/* protocol level qualifiers */
618pqual:	  pname
619	|			{ $$ = Q_DEFAULT; }
620	;
621/* 'direction' qualifiers */
622dqual:	  SRC			{ $$ = Q_SRC; }
623	| DST			{ $$ = Q_DST; }
624	| SRC OR DST		{ $$ = Q_OR; }
625	| DST OR SRC		{ $$ = Q_OR; }
626	| SRC AND DST		{ $$ = Q_AND; }
627	| DST AND SRC		{ $$ = Q_AND; }
628	| ADDR1			{ $$ = Q_ADDR1; }
629	| ADDR2			{ $$ = Q_ADDR2; }
630	| ADDR3			{ $$ = Q_ADDR3; }
631	| ADDR4			{ $$ = Q_ADDR4; }
632	| RA			{ $$ = Q_RA; }
633	| TA			{ $$ = Q_TA; }
634	;
635/* address type qualifiers */
636aqual:	  HOST			{ $$ = Q_HOST; }
637	| NET			{ $$ = Q_NET; }
638	| PORT			{ $$ = Q_PORT; }
639	| PORTRANGE		{ $$ = Q_PORTRANGE; }
640	;
641/* non-directional address type qualifiers */
642ndaqual:  GATEWAY		{ $$ = Q_GATEWAY; }
643	;
644pname:	  LINK			{ $$ = Q_LINK; }
645	| IP			{ $$ = Q_IP; }
646	| ARP			{ $$ = Q_ARP; }
647	| RARP			{ $$ = Q_RARP; }
648	| SCTP			{ $$ = Q_SCTP; }
649	| TCP			{ $$ = Q_TCP; }
650	| UDP			{ $$ = Q_UDP; }
651	| ICMP			{ $$ = Q_ICMP; }
652	| IGMP			{ $$ = Q_IGMP; }
653	| IGRP			{ $$ = Q_IGRP; }
654	| PIM			{ $$ = Q_PIM; }
655	| VRRP			{ $$ = Q_VRRP; }
656	| CARP			{ $$ = Q_CARP; }
657	| ATALK			{ $$ = Q_ATALK; }
658	| AARP			{ $$ = Q_AARP; }
659	| DECNET		{ $$ = Q_DECNET; }
660	| LAT			{ $$ = Q_LAT; }
661	| SCA			{ $$ = Q_SCA; }
662	| MOPDL			{ $$ = Q_MOPDL; }
663	| MOPRC			{ $$ = Q_MOPRC; }
664	| IPV6			{ $$ = Q_IPV6; }
665	| ICMPV6		{ $$ = Q_ICMPV6; }
666	| AH			{ $$ = Q_AH; }
667	| ESP			{ $$ = Q_ESP; }
668	| ISO			{ $$ = Q_ISO; }
669	| ESIS			{ $$ = Q_ESIS; }
670	| ISIS			{ $$ = Q_ISIS; }
671	| L1			{ $$ = Q_ISIS_L1; }
672	| L2			{ $$ = Q_ISIS_L2; }
673	| IIH			{ $$ = Q_ISIS_IIH; }
674	| LSP			{ $$ = Q_ISIS_LSP; }
675	| SNP			{ $$ = Q_ISIS_SNP; }
676	| PSNP			{ $$ = Q_ISIS_PSNP; }
677	| CSNP			{ $$ = Q_ISIS_CSNP; }
678	| CLNP			{ $$ = Q_CLNP; }
679	| STP			{ $$ = Q_STP; }
680	| IPX			{ $$ = Q_IPX; }
681	| NETBEUI		{ $$ = Q_NETBEUI; }
682	| RADIO			{ $$ = Q_RADIO; }
683	;
684other:	  pqual TK_BROADCAST	{ CHECK_PTR_VAL(($$ = gen_broadcast(cstate, $1))); }
685	| pqual TK_MULTICAST	{ CHECK_PTR_VAL(($$ = gen_multicast(cstate, $1))); }
686	| LESS NUM		{ CHECK_PTR_VAL(($$ = gen_less(cstate, $2))); }
687	| GREATER NUM		{ CHECK_PTR_VAL(($$ = gen_greater(cstate, $2))); }
688	| CBYTE NUM byteop NUM	{ CHECK_PTR_VAL(($$ = gen_byteop(cstate, $3, $2, $4))); }
689	| INBOUND		{ CHECK_PTR_VAL(($$ = gen_inbound(cstate, 0))); }
690	| OUTBOUND		{ CHECK_PTR_VAL(($$ = gen_inbound(cstate, 1))); }
691	| IFINDEX NUM		{ CHECK_PTR_VAL(($$ = gen_ifindex(cstate, $2))); }
692	| VLAN pnum		{ CHECK_PTR_VAL(($$ = gen_vlan(cstate, $2, 1))); }
693	| VLAN			{ CHECK_PTR_VAL(($$ = gen_vlan(cstate, 0, 0))); }
694	| MPLS pnum		{ CHECK_PTR_VAL(($$ = gen_mpls(cstate, $2, 1))); }
695	| MPLS			{ CHECK_PTR_VAL(($$ = gen_mpls(cstate, 0, 0))); }
696	| PPPOED		{ CHECK_PTR_VAL(($$ = gen_pppoed(cstate))); }
697	| PPPOES pnum		{ CHECK_PTR_VAL(($$ = gen_pppoes(cstate, $2, 1))); }
698	| PPPOES		{ CHECK_PTR_VAL(($$ = gen_pppoes(cstate, 0, 0))); }
699	| GENEVE pnum		{ CHECK_PTR_VAL(($$ = gen_geneve(cstate, $2, 1))); }
700	| GENEVE		{ CHECK_PTR_VAL(($$ = gen_geneve(cstate, 0, 0))); }
701	| pfvar			{ $$ = $1; }
702	| pqual p80211		{ $$ = $2; }
703	| pllc			{ $$ = $1; }
704	;
705
706pfvar:	  PF_IFNAME ID		{ CHECK_PTR_VAL($2); CHECK_PTR_VAL(($$ = gen_pf_ifname(cstate, $2))); }
707	| PF_RSET ID		{ CHECK_PTR_VAL($2); CHECK_PTR_VAL(($$ = gen_pf_ruleset(cstate, $2))); }
708	| PF_RNR NUM		{ CHECK_PTR_VAL(($$ = gen_pf_rnr(cstate, $2))); }
709	| PF_SRNR NUM		{ CHECK_PTR_VAL(($$ = gen_pf_srnr(cstate, $2))); }
710	| PF_REASON reason	{ CHECK_PTR_VAL(($$ = gen_pf_reason(cstate, $2))); }
711	| PF_ACTION action	{ CHECK_PTR_VAL(($$ = gen_pf_action(cstate, $2))); }
712	;
713
714p80211:   TYPE type SUBTYPE subtype
715				{ CHECK_PTR_VAL(($$ = gen_p80211_type(cstate, $2 | $4,
716					IEEE80211_FC0_TYPE_MASK |
717					IEEE80211_FC0_SUBTYPE_MASK)));
718				}
719	| TYPE type		{ CHECK_PTR_VAL(($$ = gen_p80211_type(cstate, $2,
720					IEEE80211_FC0_TYPE_MASK)));
721				}
722	| SUBTYPE type_subtype	{ CHECK_PTR_VAL(($$ = gen_p80211_type(cstate, $2,
723					IEEE80211_FC0_TYPE_MASK |
724					IEEE80211_FC0_SUBTYPE_MASK)));
725				}
726	| DIR dir		{ CHECK_PTR_VAL(($$ = gen_p80211_fcdir(cstate, $2))); }
727	;
728
729type:	  NUM			{ if (($1 & (~IEEE80211_FC0_TYPE_MASK)) != 0) {
730					bpf_set_error(cstate, "invalid 802.11 type value 0x%02x", $1);
731					YYABORT;
732				  }
733				  $$ = (int)$1;
734				}
735	| ID			{ CHECK_PTR_VAL($1);
736				  $$ = str2tok($1, ieee80211_types);
737				  if ($$ == -1) {
738					bpf_set_error(cstate, "unknown 802.11 type name \"%s\"", $1);
739					YYABORT;
740				  }
741				}
742	;
743
744subtype:  NUM			{ if (($1 & (~IEEE80211_FC0_SUBTYPE_MASK)) != 0) {
745					bpf_set_error(cstate, "invalid 802.11 subtype value 0x%02x", $1);
746					YYABORT;
747				  }
748				  $$ = (int)$1;
749				}
750	| ID			{ const struct tok *types = NULL;
751				  int i;
752				  CHECK_PTR_VAL($1);
753				  for (i = 0;; i++) {
754					if (ieee80211_type_subtypes[i].tok == NULL) {
755						/* Ran out of types */
756						bpf_set_error(cstate, "unknown 802.11 type");
757						YYABORT;
758					}
759					if ($<i>-1 == ieee80211_type_subtypes[i].type) {
760						types = ieee80211_type_subtypes[i].tok;
761						break;
762					}
763				  }
764
765				  $$ = str2tok($1, types);
766				  if ($$ == -1) {
767					bpf_set_error(cstate, "unknown 802.11 subtype name \"%s\"", $1);
768					YYABORT;
769				  }
770				}
771	;
772
773type_subtype:	ID		{ int i;
774				  CHECK_PTR_VAL($1);
775				  for (i = 0;; i++) {
776					if (ieee80211_type_subtypes[i].tok == NULL) {
777						/* Ran out of types */
778						bpf_set_error(cstate, "unknown 802.11 type name");
779						YYABORT;
780					}
781					$$ = str2tok($1, ieee80211_type_subtypes[i].tok);
782					if ($$ != -1) {
783						$$ |= ieee80211_type_subtypes[i].type;
784						break;
785					}
786				  }
787				}
788		;
789
790pllc:	LLC			{ CHECK_PTR_VAL(($$ = gen_llc(cstate))); }
791	| LLC ID		{ CHECK_PTR_VAL($2);
792				  if (pcapint_strcasecmp($2, "i") == 0) {
793					CHECK_PTR_VAL(($$ = gen_llc_i(cstate)));
794				  } else if (pcapint_strcasecmp($2, "s") == 0) {
795					CHECK_PTR_VAL(($$ = gen_llc_s(cstate)));
796				  } else if (pcapint_strcasecmp($2, "u") == 0) {
797					CHECK_PTR_VAL(($$ = gen_llc_u(cstate)));
798				  } else {
799					int subtype;
800
801					subtype = str2tok($2, llc_s_subtypes);
802					if (subtype != -1) {
803						CHECK_PTR_VAL(($$ = gen_llc_s_subtype(cstate, subtype)));
804					} else {
805						subtype = str2tok($2, llc_u_subtypes);
806						if (subtype == -1) {
807							bpf_set_error(cstate, "unknown LLC type name \"%s\"", $2);
808							YYABORT;
809						}
810						CHECK_PTR_VAL(($$ = gen_llc_u_subtype(cstate, subtype)));
811					}
812				  }
813				}
814				/* sigh, "rnr" is already a keyword for PF */
815	| LLC PF_RNR		{ CHECK_PTR_VAL(($$ = gen_llc_s_subtype(cstate, LLC_RNR))); }
816	;
817
818dir:	  NUM			{ $$ = (int)$1; }
819	| ID			{ CHECK_PTR_VAL($1);
820				  if (pcapint_strcasecmp($1, "nods") == 0)
821					$$ = IEEE80211_FC1_DIR_NODS;
822				  else if (pcapint_strcasecmp($1, "tods") == 0)
823					$$ = IEEE80211_FC1_DIR_TODS;
824				  else if (pcapint_strcasecmp($1, "fromds") == 0)
825					$$ = IEEE80211_FC1_DIR_FROMDS;
826				  else if (pcapint_strcasecmp($1, "dstods") == 0)
827					$$ = IEEE80211_FC1_DIR_DSTODS;
828				  else {
829					bpf_set_error(cstate, "unknown 802.11 direction");
830					YYABORT;
831				  }
832				}
833	;
834
835reason:	  NUM			{ $$ = $1; }
836	| ID			{ CHECK_PTR_VAL($1); CHECK_INT_VAL(($$ = pfreason_to_num(cstate, $1))); }
837	;
838
839action:	  ID			{ CHECK_PTR_VAL($1); CHECK_INT_VAL(($$ = pfaction_to_num(cstate, $1))); }
840	;
841
842relop:	  '>'			{ $$ = BPF_JGT; }
843	| GEQ			{ $$ = BPF_JGE; }
844	| '='			{ $$ = BPF_JEQ; }
845	;
846irelop:	  LEQ			{ $$ = BPF_JGT; }
847	| '<'			{ $$ = BPF_JGE; }
848	| NEQ			{ $$ = BPF_JEQ; }
849	;
850arth:	  pnum			{ CHECK_PTR_VAL(($$ = gen_loadi(cstate, $1))); }
851	| narth
852	;
853narth:	  pname '[' arth ']'		{ CHECK_PTR_VAL(($$ = gen_load(cstate, $1, $3, 1))); }
854	| pname '[' arth ':' NUM ']'	{ CHECK_PTR_VAL(($$ = gen_load(cstate, $1, $3, $5))); }
855	| arth '+' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_ADD, $1, $3))); }
856	| arth '-' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_SUB, $1, $3))); }
857	| arth '*' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_MUL, $1, $3))); }
858	| arth '/' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_DIV, $1, $3))); }
859	| arth '%' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_MOD, $1, $3))); }
860	| arth '&' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_AND, $1, $3))); }
861	| arth '|' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_OR, $1, $3))); }
862	| arth '^' arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_XOR, $1, $3))); }
863	| arth LSH arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_LSH, $1, $3))); }
864	| arth RSH arth			{ CHECK_PTR_VAL(($$ = gen_arth(cstate, BPF_RSH, $1, $3))); }
865	| '-' arth %prec UMINUS		{ CHECK_PTR_VAL(($$ = gen_neg(cstate, $2))); }
866	| paren narth ')'		{ $$ = $2; }
867	| LEN				{ CHECK_PTR_VAL(($$ = gen_loadlen(cstate))); }
868	;
869byteop:	  '&'			{ $$ = '&'; }
870	| '|'			{ $$ = '|'; }
871	| '<'			{ $$ = '<'; }
872	| '>'			{ $$ = '>'; }
873	| '='			{ $$ = '='; }
874	;
875pnum:	  NUM
876	| paren pnum ')'	{ $$ = $2; }
877	;
878atmtype: LANE			{ $$ = A_LANE; }
879	| METAC			{ $$ = A_METAC;	}
880	| BCC			{ $$ = A_BCC; }
881	| OAMF4EC		{ $$ = A_OAMF4EC; }
882	| OAMF4SC		{ $$ = A_OAMF4SC; }
883	| SC			{ $$ = A_SC; }
884	| ILMIC			{ $$ = A_ILMIC; }
885	;
886atmmultitype: OAM		{ $$ = A_OAM; }
887	| OAMF4			{ $$ = A_OAMF4; }
888	| CONNECTMSG		{ $$ = A_CONNECTMSG; }
889	| METACONNECT		{ $$ = A_METACONNECT; }
890	;
891	/* ATM field types quantifier */
892atmfield: VPI			{ $$.atmfieldtype = A_VPI; }
893	| VCI			{ $$.atmfieldtype = A_VCI; }
894	;
895atmvalue: atmfieldvalue
896	| relop NUM		{ CHECK_PTR_VAL(($$.b = gen_atmfield_code(cstate, $<blk>0.atmfieldtype, $2, $1, 0))); }
897	| irelop NUM		{ CHECK_PTR_VAL(($$.b = gen_atmfield_code(cstate, $<blk>0.atmfieldtype, $2, $1, 1))); }
898	| paren atmlistvalue ')' { $$.b = $2.b; $$.q = qerr; }
899	;
900atmfieldvalue: NUM {
901	$$.atmfieldtype = $<blk>0.atmfieldtype;
902	if ($$.atmfieldtype == A_VPI ||
903	    $$.atmfieldtype == A_VCI)
904		CHECK_PTR_VAL(($$.b = gen_atmfield_code(cstate, $$.atmfieldtype, $1, BPF_JEQ, 0)));
905	}
906	;
907atmlistvalue: atmfieldvalue
908	| atmlistvalue or atmfieldvalue { gen_or($1.b, $3.b); $$ = $3; }
909	;
910	/* MTP2 types quantifier */
911mtp2type: FISU			{ $$ = M_FISU; }
912	| LSSU			{ $$ = M_LSSU; }
913	| MSU			{ $$ = M_MSU; }
914	| HFISU			{ $$ = MH_FISU; }
915	| HLSSU			{ $$ = MH_LSSU; }
916	| HMSU			{ $$ = MH_MSU; }
917	;
918	/* MTP3 field types quantifier */
919mtp3field: SIO			{ $$.mtp3fieldtype = M_SIO; }
920	| OPC			{ $$.mtp3fieldtype = M_OPC; }
921	| DPC			{ $$.mtp3fieldtype = M_DPC; }
922	| SLS                   { $$.mtp3fieldtype = M_SLS; }
923	| HSIO			{ $$.mtp3fieldtype = MH_SIO; }
924	| HOPC			{ $$.mtp3fieldtype = MH_OPC; }
925	| HDPC			{ $$.mtp3fieldtype = MH_DPC; }
926	| HSLS                  { $$.mtp3fieldtype = MH_SLS; }
927	;
928mtp3value: mtp3fieldvalue
929	| relop NUM		{ CHECK_PTR_VAL(($$.b = gen_mtp3field_code(cstate, $<blk>0.mtp3fieldtype, $2, $1, 0))); }
930	| irelop NUM		{ CHECK_PTR_VAL(($$.b = gen_mtp3field_code(cstate, $<blk>0.mtp3fieldtype, $2, $1, 1))); }
931	| paren mtp3listvalue ')' { $$.b = $2.b; $$.q = qerr; }
932	;
933mtp3fieldvalue: NUM {
934	$$.mtp3fieldtype = $<blk>0.mtp3fieldtype;
935	if ($$.mtp3fieldtype == M_SIO ||
936	    $$.mtp3fieldtype == M_OPC ||
937	    $$.mtp3fieldtype == M_DPC ||
938	    $$.mtp3fieldtype == M_SLS ||
939	    $$.mtp3fieldtype == MH_SIO ||
940	    $$.mtp3fieldtype == MH_OPC ||
941	    $$.mtp3fieldtype == MH_DPC ||
942	    $$.mtp3fieldtype == MH_SLS)
943		CHECK_PTR_VAL(($$.b = gen_mtp3field_code(cstate, $$.mtp3fieldtype, $1, BPF_JEQ, 0)));
944	}
945	;
946mtp3listvalue: mtp3fieldvalue
947	| mtp3listvalue or mtp3fieldvalue { gen_or($1.b, $3.b); $$ = $3; }
948	;
949%%
950