From patchwork Fri Aug 10 14:57:56 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Harsha Sharma X-Patchwork-Id: 956280 X-Patchwork-Delegate: pablo@netfilter.org Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netfilter-devel-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="sCuEo7zE"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 41n7Y4218dz9ryt for ; Sat, 11 Aug 2018 00:58:32 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727543AbeHJR2p (ORCPT ); Fri, 10 Aug 2018 13:28:45 -0400 Received: from mail-pl0-f44.google.com ([209.85.160.44]:41374 "EHLO mail-pl0-f44.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727522AbeHJR2o (ORCPT ); Fri, 10 Aug 2018 13:28:44 -0400 Received: by mail-pl0-f44.google.com with SMTP id w19-v6so4151596ply.8 for ; Fri, 10 Aug 2018 07:58:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=czu8691I0ElfZIi7HjhzTxijxL5eGKSX/y31c4is0gg=; b=sCuEo7zEcwooHpa625lBgnqNXbrpPFz6hpMZEkBErZfkiAimhnk4ynKnLbsldXoaEU VccWUmxOi54BNHfkSuJjeGHxhEEWpy3lqS9Y6JEMnfnbZ1FqWZZOVZ+CUN+Kmka8q9ft LBOAj6xIPuNLM7el8nD7Rkw1hq4oDZMax0X/YsCbfKPZtL6FoHMAvydQNzK/1zi5BKOw WwZePvOrB3rnGir4FuIFYtHZTdPxgFmdRC6QNj7KeNAnQeMGtU/xvxDSEW1b3wAdCs5x 1LqZ1M7XqXefXPqtSWfeKKFjrs7pNJa3lGERaHaRejaWFp636NqmZYy1UMZ+k7+F6LY1 Y8aA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=czu8691I0ElfZIi7HjhzTxijxL5eGKSX/y31c4is0gg=; b=GtLObAeFxVJOMoNL5BLHzb76xpOr3bA1XGaz6wJMBQUECP/Tvai7eyiHeQgWssDXrj TmWz5OSsrAdPrP6zbzPczxx+jQklzgyUwDZVjRajFrmZ/aW7Ue5ErnaD8fOuEpD8/Ics nva+X/t787yhFYrnhl0JSo91IYm9TmGBCJbu869f4PhHN08BQ3TZlAKj9WnYz4GLYEYh FE6itjSajXeQnHYAALv7UnRyr0tbB42micFDfje1I5DnuV1Qo2Ci7dj0fthw+84fAQad o8f41yox6y68o2jxrt28EUwx041j6yqPXGhMh5ARNQ8HASNHThbzFT1uD3aFFGIbKKlE qQLw== X-Gm-Message-State: AOUpUlHLRBuOyUoNJiL0Yl0Sfcg9XMO5rfsc99ElpYjHhkBQnw2E8T3a qftRACAvuhr82F+eaFWgIBDoQWey X-Google-Smtp-Source: AA+uWPwU1pkHp6xRDbWFELz7sKBAlIRwjGSuHkPFjkdNPCWiiOJ0456G4JcuEKUtL3lSTk++U8kcOw== X-Received: by 2002:a17:902:8bc4:: with SMTP id r4-v6mr6334133plo.257.1533913110084; Fri, 10 Aug 2018 07:58:30 -0700 (PDT) Received: from XDDDDD.iitr.ernet.in ([27.60.156.54]) by smtp.gmail.com with ESMTPSA id 21-v6sm13720515pgx.20.2018.08.10.07.58.22 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 10 Aug 2018 07:58:29 -0700 (PDT) From: Harsha Sharma To: harshasharmaiitr@gmail.com, pablo@netfilter.org Cc: netfilter-devel@vger.kernel.org Subject: [PATCH libnftnl v6 3/3] examples: Add test for assigning timeout objects via rule Date: Fri, 10 Aug 2018 20:27:56 +0530 Message-Id: <20180810145756.11865-1-harshasharmaiitr@gmail.com> X-Mailer: git-send-email 2.14.1 Sender: netfilter-devel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netfilter-devel@vger.kernel.org Usage: ./nft-rule-ct-timeout-add ip filter input some-name ./nft-rule-get ip filter ip filter input 4 [ objref type 7 name some-name ] nft list ruleset ... chain input { ct timeout set "some-name" } Signed-off-by: Harsha Sharma --- Changes in v6: - No changes Changes in v5: - No changes Changes in v4: - updated objref_imm_type Changes in v3: - No changes Changes in v2: - Add this in example examples/Makefile.am | 6 +- examples/nft-rule-ct-timeout-add.c | 154 +++++++++++++++++++++++++++++++++++++ 2 files changed, 159 insertions(+), 1 deletion(-) create mode 100644 examples/nft-rule-ct-timeout-add.c diff --git a/examples/Makefile.am b/examples/Makefile.am index d5584e5..67f0156 100644 --- a/examples/Makefile.am +++ b/examples/Makefile.am @@ -37,7 +37,8 @@ check_PROGRAMS = nft-table-add \ nft-ct-helper-add \ nft-ct-helper-get \ nft-ct-helper-del \ - nft-rule-ct-helper-add + nft-rule-ct-helper-add \ + nft-rule-ct-timeout-add nft_table_add_SOURCES = nft-table-add.c nft_table_add_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS} @@ -152,3 +153,6 @@ nft_ct_helper_del_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS} nft_rule_ct_helper_add_SOURCES = nft-rule-ct-helper-add.c nft_rule_ct_helper_add_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS} + +nft_rule_ct_timeout_add_SOURCES = nft-rule-ct-timeout-add.c +nft_rule_ct_timeout_add_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS} diff --git a/examples/nft-rule-ct-timeout-add.c b/examples/nft-rule-ct-timeout-add.c new file mode 100644 index 0000000..d779d9a --- /dev/null +++ b/examples/nft-rule-ct-timeout-add.c @@ -0,0 +1,154 @@ +/* + * (C) 2012 by Pablo Neira Ayuso + * + * This program is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This software has been sponsored by Sophos Astaro + */ + +#include +#include +#include +#include /* for offsetof */ +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include + +#include +#include +#include + +static void add_ct_timeout(struct nftnl_rule *r, const char *obj_name) +{ + struct nftnl_expr *e; + + e = nftnl_expr_alloc("objref"); + if (e == NULL) { + perror("expr objref oom"); + exit(EXIT_FAILURE); + } + nftnl_expr_set_str(e, NFTNL_EXPR_OBJREF_IMM_NAME, obj_name); + nftnl_expr_set_u32(e, NFTNL_EXPR_OBJREF_IMM_TYPE, NFT_OBJECT_CT_TIMEOUT); + + nftnl_rule_add_expr(r, e); +} + +static struct nftnl_rule *setup_rule(uint8_t family, const char *table, + const char *chain, const char *handle, const char *obj_name) +{ + struct nftnl_rule *r = NULL; + uint64_t handle_num; + + r = nftnl_rule_alloc(); + if (r == NULL) { + perror("OOM"); + exit(EXIT_FAILURE); + } + + nftnl_rule_set(r, NFTNL_RULE_TABLE, table); + nftnl_rule_set(r, NFTNL_RULE_CHAIN, chain); + nftnl_rule_set_u32(r, NFTNL_RULE_FAMILY, family); + + if (handle != NULL) { + handle_num = atoll(handle); + nftnl_rule_set_u64(r, NFTNL_RULE_POSITION, handle_num); + } + + add_ct_timeout(r, obj_name); + + return r; +} + +int main(int argc, char *argv[]) +{ + struct mnl_socket *nl; + struct nftnl_rule *r; + struct nlmsghdr *nlh; + struct mnl_nlmsg_batch *batch; + uint8_t family; + char buf[MNL_SOCKET_BUFFER_SIZE]; + uint32_t seq = time(NULL); + int ret; + + if (argc < 5 || argc > 6) { + fprintf(stderr, "Usage: %s \n", argv[0]); + exit(EXIT_FAILURE); + } + if (strcmp(argv[1], "ip") == 0) + family = NFPROTO_IPV4; + else if (strcmp(argv[1], "ip6") == 0) + family = NFPROTO_IPV6; + else { + fprintf(stderr, "Unknown family: ip, ip6\n"); + exit(EXIT_FAILURE); + } + + if (argc != 6) + r = setup_rule(family, argv[2], argv[3], NULL, argv[4]); + else + r = setup_rule(family, argv[2], argv[3], argv[4], argv[5]); + + nl = mnl_socket_open(NETLINK_NETFILTER); + if (nl == NULL) { + perror("mnl_socket_open"); + exit(EXIT_FAILURE); + } + + if (mnl_socket_bind(nl, 0, MNL_SOCKET_AUTOPID) < 0) { + perror("mnl_socket_bind"); + exit(EXIT_FAILURE); + } + + batch = mnl_nlmsg_batch_start(buf, sizeof(buf)); + + nftnl_batch_begin(mnl_nlmsg_batch_current(batch), seq++); + mnl_nlmsg_batch_next(batch); + + nlh = nftnl_rule_nlmsg_build_hdr(mnl_nlmsg_batch_current(batch), + NFT_MSG_NEWRULE, + nftnl_rule_get_u32(r, NFTNL_RULE_FAMILY), + NLM_F_APPEND|NLM_F_CREATE|NLM_F_ACK, seq++); + + nftnl_rule_nlmsg_build_payload(nlh, r); + nftnl_rule_free(r); + mnl_nlmsg_batch_next(batch); + + nftnl_batch_end(mnl_nlmsg_batch_current(batch), seq++); + mnl_nlmsg_batch_next(batch); + + ret = mnl_socket_sendto(nl, mnl_nlmsg_batch_head(batch), + mnl_nlmsg_batch_size(batch)); + if (ret == -1) { + perror("mnl_socket_sendto"); + exit(EXIT_FAILURE); + } + + mnl_nlmsg_batch_stop(batch); + + ret = mnl_socket_recvfrom(nl, buf, sizeof(buf)); + if (ret == -1) { + perror("mnl_socket_recvfrom"); + exit(EXIT_FAILURE); + } + + ret = mnl_cb_run(buf, ret, 0, mnl_socket_get_portid(nl), NULL, NULL); + if (ret < 0) { + perror("mnl_cb_run"); + exit(EXIT_FAILURE); + } + + mnl_socket_close(nl); + + return EXIT_SUCCESS; +}