On Mon, Feb 29, 2016 at 05:25:40PM +0100, Carlos Falgueras García wrote: > Now it is possible to store multiple variable length user data into rule. > Modify the parser in order to fill the nftnl_attrbuf with the comment, and > the print function for extract these commentary and print it to user. > > Signed-off-by: Carlos Falgueras García <carlosfg@xxxxxxxxxx> > --- > include/rule.h | 11 +++++++++-- > src/netlink_delinearize.c | 7 +++++-- > src/netlink_linearize.c | 6 ++++-- > src/parser_bison.y | 17 ++++++++++++++++- > src/rule.c | 40 +++++++++++++++++++++++++++++++++++++--- > 5 files changed, 71 insertions(+), 10 deletions(-) > > diff --git a/include/rule.h b/include/rule.h > index c848f0f..e079aa1 100644 > --- a/include/rule.h > +++ b/include/rule.h > @@ -4,6 +4,7 @@ > #include <stdint.h> > #include <nftables.h> > #include <list.h> > +#include <libnftnl/attr.h> > > /** > * struct handle - handle for tables, chains, rules and sets > @@ -155,7 +156,7 @@ extern void chain_print_plain(const struct chain *chain); > * @location: location the rule was defined at > * @stmt: list of statements > * @num_stmts: number of statements in stmts list > - * @comment: comment > + * @udata: user data > */ > struct rule { > struct list_head list; > @@ -163,7 +164,7 @@ struct rule { > struct location location; > struct list_head stmts; > unsigned int num_stmts; > - const char *comment; > + struct nftnl_attrbuf *udata; > }; > > extern struct rule *rule_alloc(const struct location *loc, > @@ -396,4 +397,10 @@ extern int do_command(struct netlink_ctx *ctx, struct cmd *cmd); > extern int cache_update(enum cmd_ops cmd, struct list_head *msgs); > extern void cache_release(void); > > +enum udata_type { > + UDATA_TYPE_COMMENT, > + __UDATA_TYPE_MAX, > +}; > +#define UDATA_TYPE_MAX (__UDATA_TYPE_MAX - 1) > + > #endif /* NFTABLES_RULE_H */ > diff --git a/src/netlink_delinearize.c b/src/netlink_delinearize.c > index ae6abb0..c7448d3 100644 > --- a/src/netlink_delinearize.c > +++ b/src/netlink_delinearize.c > @@ -25,6 +25,7 @@ > #include <utils.h> > #include <erec.h> > #include <sys/socket.h> > +#include <libnftnl/attr.h> > > struct netlink_parse_ctx { > struct list_head *msgs; > @@ -1738,8 +1739,10 @@ struct rule *netlink_delinearize_rule(struct netlink_ctx *ctx, > uint32_t len; > > data = nftnl_rule_get_data(nlr, NFTNL_RULE_USERDATA, &len); > - pctx->rule->comment = xmalloc(len); > - memcpy((char *)pctx->rule->comment, data, len); > + pctx->rule->udata = nftnl_attrbuf_alloc(len); > + if (!pctx->rule->udata) > + memory_allocation_error(); > + nftnl_attrbuf_copy_data(pctx->rule->udata, data, len); > } > > nftnl_expr_foreach((struct nftnl_rule *)nlr, netlink_parse_expr, pctx); > diff --git a/src/netlink_linearize.c b/src/netlink_linearize.c > index 86b49c6..7b33f33 100644 > --- a/src/netlink_linearize.c > +++ b/src/netlink_linearize.c > @@ -21,6 +21,7 @@ > #include <netinet/in.h> > > #include <linux/netfilter.h> > +#include <libnftnl/attr.h> > > > struct netlink_linearize_ctx { > @@ -1108,9 +1109,10 @@ void netlink_linearize_rule(struct netlink_ctx *ctx, struct nftnl_rule *nlr, > list_for_each_entry(stmt, &rule->stmts, list) > netlink_gen_stmt(&lctx, stmt); > > - if (rule->comment) > + if (rule->udata) > nftnl_rule_set_data(nlr, NFTNL_RULE_USERDATA, > - rule->comment, strlen(rule->comment) + 1); > + nftnl_attrbuf_get_data(rule->udata), > + nftnl_attrbuf_get_len(rule->udata)); > > netlink_dump_rule(nlr); > } > diff --git a/src/parser_bison.y b/src/parser_bison.y > index 05ade0f..019e9a2 100644 > --- a/src/parser_bison.y > +++ b/src/parser_bison.y > @@ -24,6 +24,7 @@ > #include <netinet/icmp6.h> > #include <libnftnl/common.h> > #include <libnftnl/set.h> > +#include <libnftnl/attr.h> > > #include <rule.h> > #include <statement.h> > @@ -1304,7 +1305,21 @@ rule : stmt_list comment_spec > struct stmt *i; > > $$ = rule_alloc(&@$, NULL); > - $$->comment = $2; > + > + if ($2) { > + if (!($$->udata = nftnl_attrbuf_alloc(NFT_USERDATA_MAXLEN))) > + memory_allocation_error(); > + > + if (!(nftnl_attr_put_check($$->udata, > + UDATA_TYPE_COMMENT, > + strlen($2) + 1, $2)) > + ) { if (!(nftnl_attr_put_check($$->udata, UDATA_TYPE_COMMENT, strlen($2) + 1, $2)) ) { Please, check coding style. You can add a helper function, eg. if (!(nftnl_udata_put_strz($$->udata, UDATA_TYPE_COMMENT, $2) { > + erec_queue(error(&@2, "Comment too long: \"%s\"", $2), > + state->msgs); > + YYERROR; > + } > + } > + > list_for_each_entry(i, $1, list) > $$->num_stmts++; > list_splice_tail($1, &$$->stmts); > diff --git a/src/rule.c b/src/rule.c > index 18ff592..499fa7b 100644 > --- a/src/rule.c > +++ b/src/rule.c > @@ -23,6 +23,7 @@ > > #include <libnftnl/common.h> > #include <libnftnl/ruleset.h> > +#include <libnftnl/attr.h> > #include <netinet/ip.h> > #include <linux/netfilter.h> > #include <linux/netfilter_arp.h> > @@ -366,6 +367,7 @@ struct rule *rule_alloc(const struct location *loc, const struct handle *h) > rule->location = *loc; > init_list_head(&rule->list); > init_list_head(&rule->stmts); > + rule->udata = NULL; > if (h != NULL) > rule->handle = *h; > return rule; > @@ -375,21 +377,53 @@ void rule_free(struct rule *rule) > { > stmt_list_free(&rule->stmts); > handle_free(&rule->handle); > - xfree(rule->comment); > + nftnl_attrbuf_free(rule->udata); I would rename this function to: nftnl_udata_free(); So all functions that now refer to nftnl_attrbuf_* look like: nftnl_udata_*() then, to push/retrieve attributes, I would use the prefix: nftnl_udata_attr_*() > xfree(rule); > } > > +static int rule_parse_userdata_cb(const struct nftnl_attr *attr, > + void *data) > +{ > + const struct nftnl_attr **tb = data; > + uint8_t type = nftnl_attr_get_type(attr); > + uint8_t len = nftnl_attr_get_len(attr); > + unsigned char *value = nftnl_attr_get_value(attr); > + > + /* Validation */ > + switch (type) { > + case UDATA_TYPE_COMMENT: > + if (value[len-1] != '\0') > + return NFTNL_CB_ERROR; > + break; > + default: > + break; > + }; > + > + tb[type] = attr; > + return NFTNL_CB_OK; > +} > + > + > void rule_print(const struct rule *rule) > { > const struct stmt *stmt; > + const struct nftnl_attr *tb[UDATA_TYPE_MAX+1] = {}; const struct nftnl_attr *tb[UDATA_TYPE_MAX + 1] = {}; ^ ^ This space is preferred. > + const struct nftnl_attr *attr; > > list_for_each_entry(stmt, &rule->stmts, list) { > stmt->ops->print(stmt); > printf(" "); > } > > - if (rule->comment) > - printf("comment \"%s\" ", rule->comment); > + if (rule->udata) { > + if (nftnl_attr_parse(rule->udata, rule_parse_userdata_cb, tb) > + != NFTNL_CB_ERROR > + ) { > + attr = tb[UDATA_TYPE_COMMENT]; You have to check here for the attribute: if (tb[UDATA_COMMENT]) { printf("comment \"%s\" ", (char *)nftnl_attr_get_value(attr)); } Otherwise this will break once we get new attributes. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html