From: Fernando Fernandez Mancera <fmancera@suse.de>
To: netfilter-devel@vger.kernel.org
Cc: coreteam@netfilter.org, Fernando Fernandez Mancera <fmancera@suse.de>
Subject: [PATCH libnftnl] src: add connlimit stateful object support
Date: Tue, 4 Nov 2025 18:11:51 +0100 [thread overview]
Message-ID: <20251104171151.29350-1-fmancera@suse.de> (raw)
Add all the implementation needed to handle connlimit objects.
Signed-off-by: Fernando Fernandez Mancera <fmancera@suse.de>
---
include/libnftnl/object.h | 6 ++
include/obj.h | 5 ++
src/Makefile.am | 1 +
src/obj/connlimit.c | 129 ++++++++++++++++++++++++++++++++++++++
src/object.c | 1 +
5 files changed, 142 insertions(+)
create mode 100644 src/obj/connlimit.c
diff --git a/include/libnftnl/object.h b/include/libnftnl/object.h
index 490e8b4..fb81385 100644
--- a/include/libnftnl/object.h
+++ b/include/libnftnl/object.h
@@ -146,6 +146,12 @@ enum {
NFTNL_TUNNEL_GENEVE_DATA,
};
+enum {
+ NFTNL_OBJ_CONNLIMIT_COUNT = NFTNL_OBJ_BASE,
+ NFTNL_OBJ_CONNLIMIT_FLAGS,
+ __NFTNL_OBJ_CONNLIMIT_MAX,
+};
+
struct nftnl_tunnel_opt;
struct nftnl_tunnel_opts;
diff --git a/include/obj.h b/include/obj.h
index 5d3c4ec..811680e 100644
--- a/include/obj.h
+++ b/include/obj.h
@@ -83,6 +83,10 @@ struct nftnl_obj {
struct nftnl_obj_secmark {
char ctx[NFT_SECMARK_CTX_MAXLEN];
} secmark;
+ struct nftnl_obj_connlimit {
+ uint32_t count;
+ uint32_t flags;
+ } connlimit;
} data;
};
@@ -108,6 +112,7 @@ extern struct obj_ops obj_ops_limit;
extern struct obj_ops obj_ops_synproxy;
extern struct obj_ops obj_ops_tunnel;
extern struct obj_ops obj_ops_secmark;
+extern struct obj_ops obj_ops_connlimit;
#define nftnl_obj_data(obj) (void *)&obj->data
diff --git a/src/Makefile.am b/src/Makefile.am
index 1c38d00..14c6dd5 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -71,4 +71,5 @@ libnftnl_la_SOURCES = utils.c \
obj/ct_timeout.c \
obj/secmark.c \
obj/ct_expect.c \
+ obj/connlimit.c \
libnftnl.map
diff --git a/src/obj/connlimit.c b/src/obj/connlimit.c
new file mode 100644
index 0000000..34c0558
--- /dev/null
+++ b/src/obj/connlimit.c
@@ -0,0 +1,129 @@
+/* SPDX-License-Identifier: GPL-2.0-or-later */
+/*
+ * (C) 2025 by Fernando Fernandez Mancera <fmancera@suse.de>
+ */
+
+#include <stdio.h>
+#include <stdint.h>
+#include <arpa/inet.h>
+
+#include <linux/netfilter/nf_tables.h>
+
+#include <internal.h>
+#include <libmnl/libmnl.h>
+#include <libnftnl/object.h>
+
+#include "obj.h"
+
+static int nftnl_obj_connlimit_set(struct nftnl_obj *e, uint16_t type,
+ const void *data, uint32_t data_len)
+{
+ struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+ switch(type) {
+ case NFTNL_OBJ_CONNLIMIT_COUNT:
+ memcpy(&connlimit->count, data, data_len);
+ break;
+ case NFTNL_OBJ_CONNLIMIT_FLAGS:
+ memcpy(&connlimit->flags, data, data_len);
+ break;
+ }
+ return 0;
+}
+
+static const void *nftnl_obj_connlimit_get(const struct nftnl_obj *e,
+ uint16_t type, uint32_t *data_len)
+{
+ struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+ switch (type) {
+ case NFTNL_OBJ_CONNLIMIT_COUNT:
+ *data_len = sizeof(connlimit->count);
+ return &connlimit->count;
+ case NFTNL_OBJ_CONNLIMIT_FLAGS:
+ *data_len = sizeof(connlimit->flags);
+ return &connlimit->flags;
+ }
+ return NULL;
+}
+
+static int nftnl_obj_connlimit_cb(const struct nlattr *attr, void *data)
+{
+ int type = mnl_attr_get_type(attr);
+ const struct nlattr **tb = data;
+
+ if (mnl_attr_type_valid(attr, NFTA_CONNLIMIT_MAX) < 0)
+ return MNL_CB_OK;
+
+ switch (type) {
+ case NFTA_CONNLIMIT_COUNT:
+ case NFTA_CONNLIMIT_FLAGS:
+ if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0)
+ abi_breakage();
+ break;
+ }
+
+ tb[type] = attr;
+ return MNL_CB_OK;
+}
+
+static void nftnl_obj_connlimit_build(struct nlmsghdr *nlh,
+ const struct nftnl_obj *e)
+{
+ struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+ if (e->flags & (1 << NFTNL_OBJ_CONNLIMIT_COUNT))
+ mnl_attr_put_u32(nlh, NFTA_CONNLIMIT_COUNT,
+ htonl(connlimit->count));
+ if (e->flags & (1 << NFTNL_OBJ_CONNLIMIT_FLAGS))
+ mnl_attr_put_u32(nlh, NFTA_CONNLIMIT_FLAGS,
+ htonl(connlimit->flags));
+}
+
+static int nftnl_obj_connlimit_parse(struct nftnl_obj *e, struct nlattr *attr)
+{
+ struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+ struct nlattr *tb[NFTA_CONNLIMIT_MAX + 1] = {};
+
+ if (mnl_attr_parse_nested(attr, nftnl_obj_connlimit_cb, tb) < 0)
+ return -1;
+
+ if (tb[NFTA_CONNLIMIT_COUNT]) {
+ connlimit->count = ntohl(mnl_attr_get_u32(tb[NFTA_CONNLIMIT_COUNT]));
+ e->flags |= (1 << NFTNL_OBJ_CONNLIMIT_COUNT);
+ }
+ if (tb[NFTA_CONNLIMIT_FLAGS]) {
+ connlimit->flags = ntohl(mnl_attr_get_u32(tb[NFTA_CONNLIMIT_FLAGS]));
+ e->flags |= (1 << NFTNL_OBJ_CONNLIMIT_FLAGS);
+ }
+
+ return 0;
+}
+
+static int nftnl_obj_connlimit_snprintf(char *buf, size_t len,
+ uint32_t flags,
+ const struct nftnl_obj *e)
+{
+ struct nftnl_obj_connlimit *connlimit = nftnl_obj_data(e);
+
+ return snprintf(buf, len, "count %u flags %x ",
+ connlimit->count, connlimit->flags);
+}
+
+static struct attr_policy obj_connlimit_attr_policy[__NFTNL_OBJ_CONNLIMIT_MAX] = {
+ [NFTNL_OBJ_CONNLIMIT_COUNT] = { .maxlen = sizeof(uint32_t) },
+ [NFTNL_OBJ_CONNLIMIT_FLAGS] = { .maxlen = sizeof(uint32_t) },
+};
+
+struct obj_ops obj_ops_connlimit = {
+ .name = "connlimit",
+ .type = NFT_OBJECT_CONNLIMIT,
+ .alloc_len = sizeof(struct nftnl_obj_connlimit),
+ .nftnl_max_attr = __NFTNL_OBJ_CONNLIMIT_MAX,
+ .attr_policy = obj_connlimit_attr_policy,
+ .set = nftnl_obj_connlimit_set,
+ .get = nftnl_obj_connlimit_get,
+ .parse = nftnl_obj_connlimit_parse,
+ .build = nftnl_obj_connlimit_build,
+ .output = nftnl_obj_connlimit_snprintf,
+};
diff --git a/src/object.c b/src/object.c
index 3d358cc..aa5b544 100644
--- a/src/object.c
+++ b/src/object.c
@@ -30,6 +30,7 @@ static struct obj_ops *obj_ops[__NFT_OBJECT_MAX] = {
[NFT_OBJECT_SECMARK] = &obj_ops_secmark,
[NFT_OBJECT_CT_EXPECT] = &obj_ops_ct_expect,
[NFT_OBJECT_SYNPROXY] = &obj_ops_synproxy,
+ [NFT_OBJECT_CONNLIMIT] = &obj_ops_connlimit,
};
static struct obj_ops *nftnl_obj_ops_lookup(uint32_t type)
--
2.51.0
reply other threads:[~2025-11-04 17:12 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251104171151.29350-1-fmancera@suse.de \
--to=fmancera@suse.de \
--cc=coreteam@netfilter.org \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).