19 #include <netinet/in.h>
23 #include <libmnl/libmnl.h>
24 #include <linux/netfilter/nfnetlink.h>
25 #include <linux/netfilter/nf_tables.h>
26 #include <linux/netfilter.h>
27 #include <linux/netfilter_arp.h>
29 #include <libnftnl/chain.h>
30 #include <libnftnl/rule.h>
33 struct list_head head;
34 struct hlist_node hnode;
40 const char **dev_array;
59 struct list_head rule_list;
62 static const char *nftnl_hooknum2str(
int family,
int hooknum)
70 case NF_INET_PRE_ROUTING:
72 case NF_INET_LOCAL_IN:
76 case NF_INET_LOCAL_OUT:
78 case NF_INET_POST_ROUTING:
94 case NF_NETDEV_INGRESS:
102 EXPORT_SYMBOL(nftnl_chain_alloc);
111 INIT_LIST_HEAD(&c->rule_list);
116 EXPORT_SYMBOL(nftnl_chain_free);
119 struct nftnl_rule *r, *tmp;
122 list_for_each_entry_safe(r, tmp, &c->rule_list, head)
125 if (c->flags & (1 << NFTNL_CHAIN_NAME))
127 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
129 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
131 if (c->flags & (1 << NFTNL_CHAIN_DEV))
133 if (c->flags & (1 << NFTNL_CHAIN_USERDATA))
135 if (c->flags & (1 << NFTNL_CHAIN_DEVICES)) {
136 for (i = 0; i < c->dev_array_len; i++)
137 xfree(c->dev_array[i]);
144 EXPORT_SYMBOL(nftnl_chain_is_set);
145 bool nftnl_chain_is_set(
const struct nftnl_chain *c, uint16_t attr)
147 return c->flags & (1 << attr);
150 EXPORT_SYMBOL(nftnl_chain_unset);
151 void nftnl_chain_unset(
struct nftnl_chain *c, uint16_t attr)
155 if (!(c->flags & (1 << attr)))
159 case NFTNL_CHAIN_NAME:
162 case NFTNL_CHAIN_TABLE:
165 case NFTNL_CHAIN_USE:
167 case NFTNL_CHAIN_TYPE:
170 case NFTNL_CHAIN_HOOKNUM:
171 case NFTNL_CHAIN_PRIO:
172 case NFTNL_CHAIN_POLICY:
173 case NFTNL_CHAIN_BYTES:
174 case NFTNL_CHAIN_PACKETS:
175 case NFTNL_CHAIN_HANDLE:
176 case NFTNL_CHAIN_FAMILY:
177 case NFTNL_CHAIN_FLAGS:
180 case NFTNL_CHAIN_DEV:
183 case NFTNL_CHAIN_DEVICES:
184 for (i = 0; i < c->dev_array_len; i++)
185 xfree(c->dev_array[i]);
192 c->flags &= ~(1 << attr);
195 static uint32_t nftnl_chain_validate[NFTNL_CHAIN_MAX + 1] = {
196 [NFTNL_CHAIN_HOOKNUM] =
sizeof(uint32_t),
197 [NFTNL_CHAIN_PRIO] =
sizeof(int32_t),
198 [NFTNL_CHAIN_POLICY] =
sizeof(uint32_t),
199 [NFTNL_CHAIN_BYTES] =
sizeof(uint64_t),
200 [NFTNL_CHAIN_PACKETS] =
sizeof(uint64_t),
201 [NFTNL_CHAIN_HANDLE] =
sizeof(uint64_t),
202 [NFTNL_CHAIN_FAMILY] =
sizeof(uint32_t),
203 [NFTNL_CHAIN_FLAGS] =
sizeof(uint32_t),
204 [NFTNL_CHAIN_ID] =
sizeof(uint32_t),
207 EXPORT_SYMBOL(nftnl_chain_set_data);
208 int nftnl_chain_set_data(
struct nftnl_chain *c, uint16_t attr,
209 const void *data, uint32_t data_len)
211 const char **dev_array;
214 nftnl_assert_attr_exists(attr, NFTNL_CHAIN_MAX);
215 nftnl_assert_validate(data, nftnl_chain_validate, attr, data_len);
218 case NFTNL_CHAIN_NAME:
219 if (c->flags & (1 << NFTNL_CHAIN_NAME))
222 c->name = strdup(data);
226 case NFTNL_CHAIN_TABLE:
227 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
230 c->table = strdup(data);
234 case NFTNL_CHAIN_HOOKNUM:
235 memcpy(&c->hooknum, data,
sizeof(c->hooknum));
237 case NFTNL_CHAIN_PRIO:
238 memcpy(&c->prio, data,
sizeof(c->prio));
240 case NFTNL_CHAIN_POLICY:
241 memcpy(&c->policy, data,
sizeof(c->policy));
243 case NFTNL_CHAIN_USE:
244 memcpy(&c->use, data,
sizeof(c->use));
246 case NFTNL_CHAIN_BYTES:
247 memcpy(&c->bytes, data,
sizeof(c->bytes));
249 case NFTNL_CHAIN_PACKETS:
250 memcpy(&c->packets, data,
sizeof(c->packets));
252 case NFTNL_CHAIN_HANDLE:
253 memcpy(&c->handle, data,
sizeof(c->handle));
255 case NFTNL_CHAIN_FAMILY:
256 memcpy(&c->family, data,
sizeof(c->family));
258 case NFTNL_CHAIN_TYPE:
259 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
262 c->type = strdup(data);
266 case NFTNL_CHAIN_DEV:
267 if (c->flags & (1 << NFTNL_CHAIN_DEV))
270 c->dev = strdup(data);
274 case NFTNL_CHAIN_DEVICES:
275 dev_array = (
const char **)data;
276 while (dev_array[len] != NULL)
279 if (c->flags & (1 << NFTNL_CHAIN_DEVICES)) {
280 for (i = 0; i < c->dev_array_len; i++)
281 xfree(c->dev_array[i]);
285 c->dev_array = calloc(len + 1,
sizeof(
char *));
289 for (i = 0; i < len; i++)
290 c->dev_array[i] = strdup(dev_array[i]);
292 c->dev_array_len = len;
294 case NFTNL_CHAIN_FLAGS:
295 memcpy(&c->chain_flags, data,
sizeof(c->chain_flags));
298 memcpy(&c->chain_id, data,
sizeof(c->chain_id));
300 case NFTNL_CHAIN_USERDATA:
301 if (c->flags & (1 << NFTNL_CHAIN_USERDATA))
304 c->user.data = malloc(data_len);
307 memcpy(c->user.data, data, data_len);
308 c->user.len = data_len;
311 c->flags |= (1 << attr);
315 void nftnl_chain_set(
struct nftnl_chain *c, uint16_t attr,
const void *data) __visible;
316 void nftnl_chain_set(
struct nftnl_chain *c, uint16_t attr,
const void *data)
318 nftnl_chain_set_data(c, attr, data, nftnl_chain_validate[attr]);
321 EXPORT_SYMBOL(nftnl_chain_set_u32);
322 void nftnl_chain_set_u32(
struct nftnl_chain *c, uint16_t attr, uint32_t data)
324 nftnl_chain_set_data(c, attr, &data,
sizeof(uint32_t));
327 EXPORT_SYMBOL(nftnl_chain_set_s32);
328 void nftnl_chain_set_s32(
struct nftnl_chain *c, uint16_t attr, int32_t data)
330 nftnl_chain_set_data(c, attr, &data,
sizeof(int32_t));
333 EXPORT_SYMBOL(nftnl_chain_set_u64);
334 void nftnl_chain_set_u64(
struct nftnl_chain *c, uint16_t attr, uint64_t data)
336 nftnl_chain_set_data(c, attr, &data,
sizeof(uint64_t));
339 EXPORT_SYMBOL(nftnl_chain_set_u8);
340 void nftnl_chain_set_u8(
struct nftnl_chain *c, uint16_t attr, uint8_t data)
342 nftnl_chain_set_data(c, attr, &data,
sizeof(uint8_t));
345 EXPORT_SYMBOL(nftnl_chain_set_str);
346 int nftnl_chain_set_str(
struct nftnl_chain *c, uint16_t attr,
const char *str)
348 return nftnl_chain_set_data(c, attr, str, strlen(str) + 1);
351 EXPORT_SYMBOL(nftnl_chain_set_array);
352 int nftnl_chain_set_array(
struct nftnl_chain *c, uint16_t attr,
355 return nftnl_chain_set_data(c, attr, data, 0);
358 EXPORT_SYMBOL(nftnl_chain_get_data);
359 const void *nftnl_chain_get_data(
const struct nftnl_chain *c, uint16_t attr,
362 if (!(c->flags & (1 << attr)))
366 case NFTNL_CHAIN_NAME:
367 *data_len = strlen(c->name) + 1;
369 case NFTNL_CHAIN_TABLE:
370 *data_len = strlen(c->table) + 1;
372 case NFTNL_CHAIN_HOOKNUM:
373 *data_len =
sizeof(uint32_t);
375 case NFTNL_CHAIN_PRIO:
376 *data_len =
sizeof(int32_t);
378 case NFTNL_CHAIN_POLICY:
379 *data_len =
sizeof(uint32_t);
381 case NFTNL_CHAIN_USE:
382 *data_len =
sizeof(uint32_t);
384 case NFTNL_CHAIN_BYTES:
385 *data_len =
sizeof(uint64_t);
387 case NFTNL_CHAIN_PACKETS:
388 *data_len =
sizeof(uint64_t);
390 case NFTNL_CHAIN_HANDLE:
391 *data_len =
sizeof(uint64_t);
393 case NFTNL_CHAIN_FAMILY:
394 *data_len =
sizeof(uint32_t);
396 case NFTNL_CHAIN_TYPE:
397 *data_len =
sizeof(uint32_t);
399 case NFTNL_CHAIN_DEV:
400 *data_len = strlen(c->dev) + 1;
402 case NFTNL_CHAIN_DEVICES:
404 return &c->dev_array[0];
405 case NFTNL_CHAIN_FLAGS:
406 *data_len =
sizeof(uint32_t);
407 return &c->chain_flags;
409 *data_len =
sizeof(uint32_t);
411 case NFTNL_CHAIN_USERDATA:
412 *data_len = c->user.len;
418 EXPORT_SYMBOL(nftnl_chain_get);
419 const void *nftnl_chain_get(
const struct nftnl_chain *c, uint16_t attr)
422 return nftnl_chain_get_data(c, attr, &data_len);
425 EXPORT_SYMBOL(nftnl_chain_get_str);
426 const char *nftnl_chain_get_str(
const struct nftnl_chain *c, uint16_t attr)
428 return nftnl_chain_get(c, attr);
431 EXPORT_SYMBOL(nftnl_chain_get_u32);
432 uint32_t nftnl_chain_get_u32(
const struct nftnl_chain *c, uint16_t attr)
435 const uint32_t *val = nftnl_chain_get_data(c, attr, &data_len);
437 nftnl_assert(val, attr, data_len ==
sizeof(uint32_t));
439 return val ? *val : 0;
442 EXPORT_SYMBOL(nftnl_chain_get_s32);
443 int32_t nftnl_chain_get_s32(
const struct nftnl_chain *c, uint16_t attr)
446 const int32_t *val = nftnl_chain_get_data(c, attr, &data_len);
448 nftnl_assert(val, attr, data_len ==
sizeof(int32_t));
450 return val ? *val : 0;
453 EXPORT_SYMBOL(nftnl_chain_get_u64);
454 uint64_t nftnl_chain_get_u64(
const struct nftnl_chain *c, uint16_t attr)
457 const uint64_t *val = nftnl_chain_get_data(c, attr, &data_len);
459 nftnl_assert(val, attr, data_len ==
sizeof(int64_t));
461 return val ? *val : 0;
464 EXPORT_SYMBOL(nftnl_chain_get_u8);
465 uint8_t nftnl_chain_get_u8(
const struct nftnl_chain *c, uint16_t attr)
468 const uint8_t *val = nftnl_chain_get_data(c, attr, &data_len);
470 nftnl_assert(val, attr, data_len ==
sizeof(int8_t));
472 return val ? *val : 0;
475 EXPORT_SYMBOL(nftnl_chain_get_array);
476 const char *
const *nftnl_chain_get_array(
const struct nftnl_chain *c, uint16_t attr)
479 const char *
const *val = nftnl_chain_get_data(c, attr, &data_len);
481 nftnl_assert(val, attr, attr == NFTNL_CHAIN_DEVICES);
486 EXPORT_SYMBOL(nftnl_chain_nlmsg_build_payload);
487 void nftnl_chain_nlmsg_build_payload(
struct nlmsghdr *nlh,
const struct nftnl_chain *c)
491 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
492 mnl_attr_put_strz(nlh, NFTA_CHAIN_TABLE, c->table);
493 if (c->flags & (1 << NFTNL_CHAIN_NAME))
494 mnl_attr_put_strz(nlh, NFTA_CHAIN_NAME, c->name);
495 if ((c->flags & (1 << NFTNL_CHAIN_HOOKNUM)) &&
496 (c->flags & (1 << NFTNL_CHAIN_PRIO))) {
499 nest = mnl_attr_nest_start(nlh, NFTA_CHAIN_HOOK);
500 mnl_attr_put_u32(nlh, NFTA_HOOK_HOOKNUM, htonl(c->hooknum));
501 mnl_attr_put_u32(nlh, NFTA_HOOK_PRIORITY, htonl(c->prio));
502 if (c->flags & (1 << NFTNL_CHAIN_DEV))
503 mnl_attr_put_strz(nlh, NFTA_HOOK_DEV, c->dev);
504 else if (c->flags & (1 << NFTNL_CHAIN_DEVICES)) {
505 struct nlattr *nest_dev;
507 nest_dev = mnl_attr_nest_start(nlh, NFTA_HOOK_DEVS);
508 for (i = 0; i < c->dev_array_len; i++)
509 mnl_attr_put_strz(nlh, NFTA_DEVICE_NAME,
511 mnl_attr_nest_end(nlh, nest_dev);
513 mnl_attr_nest_end(nlh, nest);
515 if (c->flags & (1 << NFTNL_CHAIN_POLICY))
516 mnl_attr_put_u32(nlh, NFTA_CHAIN_POLICY, htonl(c->policy));
517 if (c->flags & (1 << NFTNL_CHAIN_USE))
518 mnl_attr_put_u32(nlh, NFTA_CHAIN_USE, htonl(c->use));
519 if ((c->flags & (1 << NFTNL_CHAIN_PACKETS)) &&
520 (c->flags & (1 << NFTNL_CHAIN_BYTES))) {
523 nest = mnl_attr_nest_start(nlh, NFTA_CHAIN_COUNTERS);
524 mnl_attr_put_u64(nlh, NFTA_COUNTER_PACKETS, be64toh(c->packets));
525 mnl_attr_put_u64(nlh, NFTA_COUNTER_BYTES, be64toh(c->bytes));
526 mnl_attr_nest_end(nlh, nest);
528 if (c->flags & (1 << NFTNL_CHAIN_HANDLE))
529 mnl_attr_put_u64(nlh, NFTA_CHAIN_HANDLE, be64toh(c->handle));
530 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
531 mnl_attr_put_strz(nlh, NFTA_CHAIN_TYPE, c->type);
532 if (c->flags & (1 << NFTNL_CHAIN_FLAGS))
533 mnl_attr_put_u32(nlh, NFTA_CHAIN_FLAGS, htonl(c->chain_flags));
534 if (c->flags & (1 << NFTNL_CHAIN_ID))
535 mnl_attr_put_u32(nlh, NFTA_CHAIN_ID, htonl(c->chain_id));
536 if (c->flags & (1 << NFTNL_CHAIN_USERDATA))
537 mnl_attr_put(nlh, NFTA_CHAIN_USERDATA, c->user.len, c->user.data);
540 EXPORT_SYMBOL(nftnl_chain_rule_add);
541 void nftnl_chain_rule_add(
struct nftnl_rule *rule,
struct nftnl_chain *c)
543 list_add(&rule->head, &c->rule_list);
546 EXPORT_SYMBOL(nftnl_chain_rule_del);
547 void nftnl_chain_rule_del(
struct nftnl_rule *r)
552 EXPORT_SYMBOL(nftnl_chain_rule_add_tail);
553 void nftnl_chain_rule_add_tail(
struct nftnl_rule *rule,
struct nftnl_chain *c)
555 list_add_tail(&rule->head, &c->rule_list);
558 EXPORT_SYMBOL(nftnl_chain_rule_insert_at);
559 void nftnl_chain_rule_insert_at(
struct nftnl_rule *rule,
struct nftnl_rule *pos)
561 list_add_tail(&rule->head, &pos->head);
564 EXPORT_SYMBOL(nftnl_chain_rule_append_at);
565 void nftnl_chain_rule_append_at(
struct nftnl_rule *rule,
struct nftnl_rule *pos)
567 list_add(&rule->head, &pos->head);
570 static int nftnl_chain_parse_attr_cb(
const struct nlattr *attr,
void *data)
572 const struct nlattr **tb = data;
573 int type = mnl_attr_get_type(attr);
575 if (mnl_attr_type_valid(attr, NFTA_CHAIN_MAX) < 0)
579 case NFTA_CHAIN_NAME:
580 case NFTA_CHAIN_TABLE:
581 case NFTA_CHAIN_TYPE:
582 if (mnl_attr_validate(attr, MNL_TYPE_STRING) < 0)
585 case NFTA_CHAIN_HOOK:
586 case NFTA_CHAIN_COUNTERS:
587 if (mnl_attr_validate(attr, MNL_TYPE_NESTED) < 0)
590 case NFTA_CHAIN_POLICY:
592 case NFTA_CHAIN_FLAGS:
594 if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0)
597 case NFTA_CHAIN_HANDLE:
598 if (mnl_attr_validate(attr, MNL_TYPE_U64) < 0)
601 case NFTA_CHAIN_USERDATA:
602 if (mnl_attr_validate(attr, MNL_TYPE_BINARY) < 0)
611 static int nftnl_chain_parse_counters_cb(
const struct nlattr *attr,
void *data)
613 const struct nlattr **tb = data;
614 int type = mnl_attr_get_type(attr);
616 if (mnl_attr_type_valid(attr, NFTA_COUNTER_MAX) < 0)
620 case NFTA_COUNTER_BYTES:
621 case NFTA_COUNTER_PACKETS:
622 if (mnl_attr_validate(attr, MNL_TYPE_U64) < 0)
631 static int nftnl_chain_parse_counters(
struct nlattr *attr,
struct nftnl_chain *c)
633 struct nlattr *tb[NFTA_COUNTER_MAX+1] = {};
635 if (mnl_attr_parse_nested(attr, nftnl_chain_parse_counters_cb, tb) < 0)
638 if (tb[NFTA_COUNTER_PACKETS]) {
639 c->packets = be64toh(mnl_attr_get_u64(tb[NFTA_COUNTER_PACKETS]));
640 c->flags |= (1 << NFTNL_CHAIN_PACKETS);
642 if (tb[NFTA_COUNTER_BYTES]) {
643 c->bytes = be64toh(mnl_attr_get_u64(tb[NFTA_COUNTER_BYTES]));
644 c->flags |= (1 << NFTNL_CHAIN_BYTES);
650 static int nftnl_chain_parse_hook_cb(
const struct nlattr *attr,
void *data)
652 const struct nlattr **tb = data;
653 int type = mnl_attr_get_type(attr);
655 if (mnl_attr_type_valid(attr, NFTA_HOOK_MAX) < 0)
659 case NFTA_HOOK_HOOKNUM:
660 case NFTA_HOOK_PRIORITY:
661 if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0)
665 if (mnl_attr_validate(attr, MNL_TYPE_STRING) < 0)
674 static int nftnl_chain_parse_devs(
struct nlattr *nest,
struct nftnl_chain *c)
676 const char **dev_array, **tmp;
677 int len = 0, size = 8;
680 dev_array = calloc(8,
sizeof(
char *));
684 mnl_attr_for_each_nested(attr, nest) {
685 if (mnl_attr_get_type(attr) != NFTA_DEVICE_NAME)
687 dev_array[len++] = strdup(mnl_attr_get_str(attr));
689 tmp = realloc(dev_array, size * 2 *
sizeof(
char *));
694 memset(&tmp[len], 0, (size - len) *
sizeof(
char *));
699 c->dev_array = dev_array;
700 c->dev_array_len = len;
705 xfree(dev_array[len]);
710 static int nftnl_chain_parse_hook(
struct nlattr *attr,
struct nftnl_chain *c)
712 struct nlattr *tb[NFTA_HOOK_MAX+1] = {};
715 if (mnl_attr_parse_nested(attr, nftnl_chain_parse_hook_cb, tb) < 0)
718 if (tb[NFTA_HOOK_HOOKNUM]) {
719 c->hooknum = ntohl(mnl_attr_get_u32(tb[NFTA_HOOK_HOOKNUM]));
720 c->flags |= (1 << NFTNL_CHAIN_HOOKNUM);
722 if (tb[NFTA_HOOK_PRIORITY]) {
723 c->prio = ntohl(mnl_attr_get_u32(tb[NFTA_HOOK_PRIORITY]));
724 c->flags |= (1 << NFTNL_CHAIN_PRIO);
726 if (tb[NFTA_HOOK_DEV]) {
727 c->dev = strdup(mnl_attr_get_str(tb[NFTA_HOOK_DEV]));
730 c->flags |= (1 << NFTNL_CHAIN_DEV);
732 if (tb[NFTA_HOOK_DEVS]) {
733 ret = nftnl_chain_parse_devs(tb[NFTA_HOOK_DEVS], c);
736 c->flags |= (1 << NFTNL_CHAIN_DEVICES);
742 EXPORT_SYMBOL(nftnl_chain_nlmsg_parse);
743 int nftnl_chain_nlmsg_parse(
const struct nlmsghdr *nlh,
struct nftnl_chain *c)
745 struct nlattr *tb[NFTA_CHAIN_MAX+1] = {};
746 struct nfgenmsg *nfg = mnl_nlmsg_get_payload(nlh);
749 if (mnl_attr_parse(nlh,
sizeof(*nfg), nftnl_chain_parse_attr_cb, tb) < 0)
752 if (tb[NFTA_CHAIN_NAME]) {
753 if (c->flags & (1 << NFTNL_CHAIN_NAME))
755 c->name = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_NAME]));
758 c->flags |= (1 << NFTNL_CHAIN_NAME);
760 if (tb[NFTA_CHAIN_TABLE]) {
761 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
763 c->table = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TABLE]));
766 c->flags |= (1 << NFTNL_CHAIN_TABLE);
768 if (tb[NFTA_CHAIN_HOOK]) {
769 ret = nftnl_chain_parse_hook(tb[NFTA_CHAIN_HOOK], c);
773 if (tb[NFTA_CHAIN_POLICY]) {
774 c->policy = ntohl(mnl_attr_get_u32(tb[NFTA_CHAIN_POLICY]));
775 c->flags |= (1 << NFTNL_CHAIN_POLICY);
777 if (tb[NFTA_CHAIN_USE]) {
778 c->use = ntohl(mnl_attr_get_u32(tb[NFTA_CHAIN_USE]));
779 c->flags |= (1 << NFTNL_CHAIN_USE);
781 if (tb[NFTA_CHAIN_COUNTERS]) {
782 ret = nftnl_chain_parse_counters(tb[NFTA_CHAIN_COUNTERS], c);
786 if (tb[NFTA_CHAIN_HANDLE]) {
787 c->handle = be64toh(mnl_attr_get_u64(tb[NFTA_CHAIN_HANDLE]));
788 c->flags |= (1 << NFTNL_CHAIN_HANDLE);
790 if (tb[NFTA_CHAIN_TYPE]) {
791 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
793 c->type = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TYPE]));
796 c->flags |= (1 << NFTNL_CHAIN_TYPE);
798 if (tb[NFTA_CHAIN_FLAGS]) {
799 c->chain_flags = ntohl(mnl_attr_get_u32(tb[NFTA_CHAIN_FLAGS]));
800 c->flags |= (1 << NFTNL_CHAIN_FLAGS);
802 if (tb[NFTA_CHAIN_ID]) {
803 c->chain_id = ntohl(mnl_attr_get_u32(tb[NFTA_CHAIN_ID]));
804 c->flags |= (1 << NFTNL_CHAIN_ID);
806 if (tb[NFTA_CHAIN_USERDATA]) {
807 nftnl_chain_set_data(c, NFTNL_CHAIN_USERDATA,
808 mnl_attr_get_payload(tb[NFTA_CHAIN_USERDATA]),
809 mnl_attr_get_payload_len(tb[NFTA_CHAIN_USERDATA]));
812 c->family = nfg->nfgen_family;
813 c->flags |= (1 << NFTNL_CHAIN_FAMILY);
818 static inline int nftnl_str2hooknum(
int family,
const char *hook)
822 for (hooknum = 0; hooknum < NF_INET_NUMHOOKS; hooknum++) {
823 if (strcmp(hook, nftnl_hooknum2str(family, hooknum)) == 0)
829 static int nftnl_chain_snprintf_default(
char *buf,
size_t size,
832 int ret, remain = size, offset = 0, i;
834 ret = snprintf(buf, remain,
"%s %s %s use %u",
835 nftnl_family2str(c->family), c->table, c->name, c->use);
836 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
838 if (c->flags & (1 << NFTNL_CHAIN_HOOKNUM)) {
839 ret = snprintf(buf + offset, remain,
" type %s hook %s prio %d",
840 c->type, nftnl_hooknum2str(c->family, c->hooknum),
842 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
844 if (c->flags & (1 << NFTNL_CHAIN_POLICY)) {
845 ret = snprintf(buf + offset, remain,
" policy %s",
846 nftnl_verdict2str(c->policy));
847 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
850 ret = snprintf(buf + offset, remain,
851 " packets %"PRIu64
" bytes %"PRIu64
"",
852 c->packets, c->bytes);
853 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
855 if (c->flags & (1 << NFTNL_CHAIN_DEV)) {
856 ret = snprintf(buf + offset, remain,
" dev %s ",
858 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
860 if (c->flags & (1 << NFTNL_CHAIN_DEVICES)) {
861 ret = snprintf(buf + offset, remain,
" dev { ");
862 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
864 for (i = 0; i < c->dev_array_len; i++) {
865 ret = snprintf(buf + offset, remain,
" %s ",
867 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
869 ret = snprintf(buf + offset, remain,
" } ");
870 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
872 if (c->flags & (1 << NFTNL_CHAIN_FLAGS)) {
873 ret = snprintf(buf + offset, remain,
" flags %x",
875 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
877 if (c->flags & (1 << NFTNL_CHAIN_ID)) {
878 ret = snprintf(buf + offset, remain,
" id %x",
880 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
887 static int nftnl_chain_cmd_snprintf(
char *buf,
size_t size,
889 uint32_t type, uint32_t flags)
891 int ret, remain = size, offset = 0;
894 case NFTNL_OUTPUT_DEFAULT:
895 ret = nftnl_chain_snprintf_default(buf + offset, remain, c);
896 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
898 case NFTNL_OUTPUT_XML:
899 case NFTNL_OUTPUT_JSON:
907 EXPORT_SYMBOL(nftnl_chain_snprintf);
908 int nftnl_chain_snprintf(
char *buf,
size_t size,
const struct nftnl_chain *c,
909 uint32_t type, uint32_t flags)
914 return nftnl_chain_cmd_snprintf(buf, size, c, nftnl_flag2cmd(flags),
918 static int nftnl_chain_do_snprintf(
char *buf,
size_t size,
const void *c,
919 uint32_t cmd, uint32_t type, uint32_t flags)
921 return nftnl_chain_snprintf(buf, size, c, type, flags);
924 EXPORT_SYMBOL(nftnl_chain_fprintf);
925 int nftnl_chain_fprintf(FILE *fp,
const struct nftnl_chain *c, uint32_t type,
928 return nftnl_fprintf(fp, c, NFTNL_CMD_UNSPEC, type, flags,
929 nftnl_chain_do_snprintf);
932 EXPORT_SYMBOL(nftnl_rule_foreach);
934 int (*cb)(
struct nftnl_rule *r,
void *data),
937 struct nftnl_rule *cur, *tmp;
940 list_for_each_entry_safe(cur, tmp, &c->rule_list, head) {
948 EXPORT_SYMBOL(nftnl_rule_lookup_byindex);
950 nftnl_rule_lookup_byindex(
struct nftnl_chain *c, uint32_t index)
952 struct nftnl_rule *r;
954 list_for_each_entry(r, &c->rule_list, head) {
964 struct nftnl_rule *cur;
967 static void nftnl_rule_iter_init(
const struct nftnl_chain *c,
971 if (list_empty(&c->rule_list))
974 iter->cur = list_entry(c->rule_list.next,
struct nftnl_rule,
978 EXPORT_SYMBOL(nftnl_rule_iter_create);
987 nftnl_rule_iter_init(c, iter);
992 EXPORT_SYMBOL(nftnl_rule_iter_next);
995 struct nftnl_rule *rule = iter->cur;
1001 iter->cur = list_entry(iter->cur->head.next,
struct nftnl_rule, head);
1002 if (&iter->cur->head == iter->c->rule_list.next)
1008 EXPORT_SYMBOL(nftnl_rule_iter_destroy);
1014 #define CHAIN_NAME_HSIZE 512
1018 struct list_head list;
1019 struct hlist_head name_hash[CHAIN_NAME_HSIZE];
1022 EXPORT_SYMBOL(nftnl_chain_list_alloc);
1032 INIT_LIST_HEAD(&list->list);
1033 for (i = 0; i < CHAIN_NAME_HSIZE; i++)
1034 INIT_HLIST_HEAD(&list->name_hash[i]);
1039 EXPORT_SYMBOL(nftnl_chain_list_free);
1044 list_for_each_entry_safe(r, tmp, &list->list, head) {
1046 hlist_del(&r->hnode);
1047 nftnl_chain_free(r);
1052 EXPORT_SYMBOL(nftnl_chain_list_is_empty);
1055 return list_empty(&list->list);
1058 static uint32_t djb_hash(
const char *key)
1060 uint32_t i, hash = 5381;
1062 for (i = 0; i < strlen(key); i++)
1063 hash = ((hash << 5) + hash) + key[i];
1068 EXPORT_SYMBOL(nftnl_chain_list_add);
1071 int key = djb_hash(r->name) % CHAIN_NAME_HSIZE;
1073 hlist_add_head(&r->hnode, &list->name_hash[key]);
1074 list_add(&r->head, &list->list);
1077 EXPORT_SYMBOL(nftnl_chain_list_add_tail);
1080 int key = djb_hash(r->name) % CHAIN_NAME_HSIZE;
1082 hlist_add_head(&r->hnode, &list->name_hash[key]);
1083 list_add_tail(&r->head, &list->list);
1086 EXPORT_SYMBOL(nftnl_chain_list_del);
1090 hlist_del(&r->hnode);
1093 EXPORT_SYMBOL(nftnl_chain_list_foreach);
1101 list_for_each_entry_safe(cur, tmp, &chain_list->list, head) {
1102 ret = cb(cur, data);
1109 EXPORT_SYMBOL(nftnl_chain_list_lookup_byname);
1114 int key = djb_hash(chain) % CHAIN_NAME_HSIZE;
1116 struct hlist_node *n;
1118 hlist_for_each_entry(c, n, &chain_list->name_hash[key], hnode) {
1119 if (!strcmp(chain, c->name))
1130 EXPORT_SYMBOL(nftnl_chain_list_iter_create);
1141 if (nftnl_chain_list_is_empty(l))
1144 iter->cur = list_entry(l->list.next,
struct nftnl_chain, head);
1149 EXPORT_SYMBOL(nftnl_chain_list_iter_next);
1158 iter->cur = list_entry(iter->cur->head.next,
struct nftnl_chain, head);
1159 if (&iter->cur->head == iter->list->list.next)
1165 EXPORT_SYMBOL(nftnl_chain_list_iter_destroy);