netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Fernando Fernandez Mancera <fmancera@suse.de>
To: netfilter-devel@vger.kernel.org
Cc: coreteam@netfilter.org, Fernando Fernandez Mancera <fmancera@suse.de>
Subject: [PATCH libnftnl] src: add connlimit stateful object support
Date: Tue,  4 Nov 2025 18:11:51 +0100	[thread overview]
Message-ID: <20251104171151.29350-1-fmancera@suse.de> (raw)

Add all the implementation needed to handle connlimit objects.

Signed-off-by: Fernando Fernandez Mancera <fmancera@suse.de>
---
 include/libnftnl/object.h |   6 ++
 include/obj.h             |   5 ++
 src/Makefile.am           |   1 +
 src/obj/connlimit.c       | 129 ++++++++++++++++++++++++++++++++++++++
 src/object.c              |   1 +
 5 files changed, 142 insertions(+)
 create mode 100644 src/obj/connlimit.c

diff --git a/include/libnftnl/object.h b/include/libnftnl/object.h
index 490e8b4..fb81385 100644
--- a/include/libnftnl/object.h
+++ b/include/libnftnl/object.h
@@ -146,6 +146,12 @@ enum {
 	NFTNL_TUNNEL_GENEVE_DATA,
 };
 
+enum {
+	NFTNL_OBJ_CONNLIMIT_COUNT = NFTNL_OBJ_BASE,
+	NFTNL_OBJ_CONNLIMIT_FLAGS,
+	__NFTNL_OBJ_CONNLIMIT_MAX,
+};
+
 struct nftnl_tunnel_opt;
 struct nftnl_tunnel_opts;
 
diff --git a/include/obj.h b/include/obj.h
index 5d3c4ec..811680e 100644
--- a/include/obj.h
+++ b/include/obj.h
@@ -83,6 +83,10 @@ struct nftnl_obj {
 		struct nftnl_obj_secmark {
 			char		ctx[NFT_SECMARK_CTX_MAXLEN];
 		} secmark;
+		struct nftnl_obj_connlimit {
+			uint32_t	count;
+			uint32_t	flags;
+		} connlimit;
 	} data;
 };
 
@@ -108,6 +112,7 @@ extern struct obj_ops obj_ops_limit;
 extern struct obj_ops obj_ops_synproxy;
 extern struct obj_ops obj_ops_tunnel;
 extern struct obj_ops obj_ops_secmark;
+extern struct obj_ops obj_ops_connlimit;
 
 #define nftnl_obj_data(obj) (void *)&obj->data
 
diff --git a/src/Makefile.am b/src/Makefile.am
index 1c38d00..14c6dd5 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -71,4 +71,5 @@ libnftnl_la_SOURCES = utils.c		\
 		      obj/ct_timeout.c 	\
 		      obj/secmark.c	\
 		      obj/ct_expect.c 	\
+		      obj/connlimit.c	\
 		      libnftnl.map
diff --git a/src/obj/connlimit.c b/src/obj/connlimit.c
new file mode 100644
index 0000000..34c0558
--- /dev/null
+++ b/src/obj/connlimit.c
@@ -0,0 +1,129 @@
+/* SPDX-License-Identifier: GPL-2.0-or-later */
+/*
+ * (C) 2025 by Fernando Fernandez Mancera <fmancera@suse.de>
+ */
+
+#include <stdio.h>
+#include <stdint.h>
+#include <arpa/inet.h>
+
+#include <linux/netfilter/nf_tables.h>
+
+#include <internal.h>
+#include <libmnl/libmnl.h>
+#include <libnftnl/object.h>
+
+#include "obj.h"
+
+static int nftnl_obj_connlimit_set(struct nftnl_obj *e, uint16_t type,
+				   const void *data, uint32_t data_len)
+{
+	struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+	switch(type) {
+	case NFTNL_OBJ_CONNLIMIT_COUNT:
+		memcpy(&connlimit->count, data, data_len);
+		break;
+	case NFTNL_OBJ_CONNLIMIT_FLAGS:
+		memcpy(&connlimit->flags, data, data_len);
+		break;
+	}
+	return 0;
+}
+
+static const void *nftnl_obj_connlimit_get(const struct nftnl_obj *e,
+					   uint16_t type, uint32_t *data_len)
+{
+	struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+	switch (type) {
+	case NFTNL_OBJ_CONNLIMIT_COUNT:
+		*data_len = sizeof(connlimit->count);
+		return &connlimit->count;
+	case NFTNL_OBJ_CONNLIMIT_FLAGS:
+		*data_len = sizeof(connlimit->flags);
+		return &connlimit->flags;
+	}
+	return NULL;
+}
+
+static int nftnl_obj_connlimit_cb(const struct nlattr *attr, void *data)
+{
+	int type = mnl_attr_get_type(attr);
+	const struct nlattr **tb = data;
+
+	if (mnl_attr_type_valid(attr, NFTA_CONNLIMIT_MAX) < 0)
+		return MNL_CB_OK;
+
+	switch (type) {
+	case NFTA_CONNLIMIT_COUNT:
+	case NFTA_CONNLIMIT_FLAGS:
+		if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0)
+			abi_breakage();
+		break;
+	}
+
+	tb[type] = attr;
+	return MNL_CB_OK;
+}
+
+static void nftnl_obj_connlimit_build(struct nlmsghdr *nlh,
+				      const struct nftnl_obj *e)
+{
+	struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+	if (e->flags & (1 << NFTNL_OBJ_CONNLIMIT_COUNT))
+		mnl_attr_put_u32(nlh, NFTA_CONNLIMIT_COUNT,
+				 htonl(connlimit->count));
+	if (e->flags & (1 << NFTNL_OBJ_CONNLIMIT_FLAGS))
+		mnl_attr_put_u32(nlh, NFTA_CONNLIMIT_FLAGS,
+				 htonl(connlimit->flags));
+}
+
+static int nftnl_obj_connlimit_parse(struct nftnl_obj *e, struct nlattr *attr)
+{
+	struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+	struct nlattr *tb[NFTA_CONNLIMIT_MAX + 1] = {};
+
+	if (mnl_attr_parse_nested(attr, nftnl_obj_connlimit_cb, tb) < 0)
+		return -1;
+
+	if (tb[NFTA_CONNLIMIT_COUNT]) {
+		connlimit->count = ntohl(mnl_attr_get_u32(tb[NFTA_CONNLIMIT_COUNT]));
+		e->flags |= (1 << NFTNL_OBJ_CONNLIMIT_COUNT);
+	}
+	if (tb[NFTA_CONNLIMIT_FLAGS]) {
+		connlimit->flags = ntohl(mnl_attr_get_u32(tb[NFTA_CONNLIMIT_FLAGS]));
+		e->flags |= (1 << NFTNL_OBJ_CONNLIMIT_FLAGS);
+	}
+
+	return 0;
+}
+
+static int nftnl_obj_connlimit_snprintf(char *buf, size_t len,
+					uint32_t flags,
+					const struct nftnl_obj *e)
+{
+	struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+	return snprintf(buf, len, "count %u flags %x ",
+			connlimit->count, connlimit->flags);
+}
+
+static struct attr_policy obj_connlimit_attr_policy[__NFTNL_OBJ_CONNLIMIT_MAX] = {
+	[NFTNL_OBJ_CONNLIMIT_COUNT]	= { .maxlen = sizeof(uint32_t) },
+	[NFTNL_OBJ_CONNLIMIT_FLAGS]	= { .maxlen = sizeof(uint32_t) },
+};
+
+struct obj_ops obj_ops_connlimit = {
+	.name		= "connlimit",
+	.type		= NFT_OBJECT_CONNLIMIT,
+	.alloc_len	= sizeof(struct nftnl_obj_connlimit),
+	.nftnl_max_attr	= __NFTNL_OBJ_CONNLIMIT_MAX,
+	.attr_policy	= obj_connlimit_attr_policy,
+	.set		= nftnl_obj_connlimit_set,
+	.get		= nftnl_obj_connlimit_get,
+	.parse		= nftnl_obj_connlimit_parse,
+	.build		= nftnl_obj_connlimit_build,
+	.output		= nftnl_obj_connlimit_snprintf,
+};
diff --git a/src/object.c b/src/object.c
index 3d358cc..aa5b544 100644
--- a/src/object.c
+++ b/src/object.c
@@ -30,6 +30,7 @@ static struct obj_ops *obj_ops[__NFT_OBJECT_MAX] = {
 	[NFT_OBJECT_SECMARK]	= &obj_ops_secmark,
 	[NFT_OBJECT_CT_EXPECT]	= &obj_ops_ct_expect,
 	[NFT_OBJECT_SYNPROXY]	= &obj_ops_synproxy,
+	[NFT_OBJECT_CONNLIMIT]	= &obj_ops_connlimit,
 };
 
 static struct obj_ops *nftnl_obj_ops_lookup(uint32_t type)
-- 
2.51.0


                 reply	other threads:[~2025-11-04 17:12 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20251104171151.29350-1-fmancera@suse.de \
    --to=fmancera@suse.de \
    --cc=coreteam@netfilter.org \
    --cc=netfilter-devel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).