19 #include <netinet/in.h>
23 #include <libmnl/libmnl.h>
24 #include <linux/netfilter/nfnetlink.h>
25 #include <linux/netfilter/nf_tables.h>
26 #include <linux/netfilter.h>
27 #include <linux/netfilter_arp.h>
29 #include <libnftnl/chain.h>
30 #include <libnftnl/rule.h>
34 struct list_head head;
35 struct hlist_node hnode;
51 struct list_head rule_list;
54 static const char *nftnl_hooknum2str(
int family,
int hooknum)
62 case NF_INET_PRE_ROUTING:
64 case NF_INET_LOCAL_IN:
68 case NF_INET_LOCAL_OUT:
70 case NF_INET_POST_ROUTING:
86 case NF_NETDEV_INGRESS:
94 EXPORT_SYMBOL(nftnl_chain_alloc);
103 INIT_LIST_HEAD(&c->rule_list);
108 EXPORT_SYMBOL(nftnl_chain_free);
111 struct nftnl_rule *r, *tmp;
113 list_for_each_entry_safe(r, tmp, &c->rule_list, head)
116 if (c->flags & (1 << NFTNL_CHAIN_NAME))
118 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
120 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
122 if (c->flags & (1 << NFTNL_CHAIN_DEV))
127 EXPORT_SYMBOL(nftnl_chain_is_set);
128 bool nftnl_chain_is_set(const struct
nftnl_chain *c, uint16_t attr)
130 return c->flags & (1 << attr);
133 EXPORT_SYMBOL(nftnl_chain_unset);
134 void nftnl_chain_unset(
struct nftnl_chain *c, uint16_t attr)
136 if (!(c->flags & (1 << attr)))
140 case NFTNL_CHAIN_NAME:
143 case NFTNL_CHAIN_TABLE:
146 case NFTNL_CHAIN_USE:
148 case NFTNL_CHAIN_TYPE:
151 case NFTNL_CHAIN_HOOKNUM:
152 case NFTNL_CHAIN_PRIO:
153 case NFTNL_CHAIN_POLICY:
154 case NFTNL_CHAIN_BYTES:
155 case NFTNL_CHAIN_PACKETS:
156 case NFTNL_CHAIN_HANDLE:
157 case NFTNL_CHAIN_FAMILY:
159 case NFTNL_CHAIN_DEV:
166 c->flags &= ~(1 << attr);
169 static uint32_t nftnl_chain_validate[NFTNL_CHAIN_MAX + 1] = {
170 [NFTNL_CHAIN_HOOKNUM] =
sizeof(uint32_t),
171 [NFTNL_CHAIN_PRIO] =
sizeof(int32_t),
172 [NFTNL_CHAIN_POLICY] =
sizeof(uint32_t),
173 [NFTNL_CHAIN_BYTES] =
sizeof(uint64_t),
174 [NFTNL_CHAIN_PACKETS] =
sizeof(uint64_t),
175 [NFTNL_CHAIN_HANDLE] =
sizeof(uint64_t),
176 [NFTNL_CHAIN_FAMILY] =
sizeof(uint32_t),
179 EXPORT_SYMBOL(nftnl_chain_set_data);
180 int nftnl_chain_set_data(
struct nftnl_chain *c, uint16_t attr,
181 const void *data, uint32_t data_len)
183 nftnl_assert_attr_exists(attr, NFTNL_CHAIN_MAX);
184 nftnl_assert_validate(data, nftnl_chain_validate, attr, data_len);
187 case NFTNL_CHAIN_NAME:
188 if (c->flags & (1 << NFTNL_CHAIN_NAME))
191 c->name = strdup(data);
195 case NFTNL_CHAIN_TABLE:
196 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
199 c->table = strdup(data);
203 case NFTNL_CHAIN_HOOKNUM:
204 memcpy(&c->hooknum, data,
sizeof(c->hooknum));
206 case NFTNL_CHAIN_PRIO:
207 memcpy(&c->prio, data,
sizeof(c->prio));
209 case NFTNL_CHAIN_POLICY:
210 memcpy(&c->policy, data,
sizeof(c->policy));
212 case NFTNL_CHAIN_USE:
213 memcpy(&c->use, data,
sizeof(c->use));
215 case NFTNL_CHAIN_BYTES:
216 memcpy(&c->bytes, data,
sizeof(c->bytes));
218 case NFTNL_CHAIN_PACKETS:
219 memcpy(&c->packets, data,
sizeof(c->packets));
221 case NFTNL_CHAIN_HANDLE:
222 memcpy(&c->handle, data,
sizeof(c->handle));
224 case NFTNL_CHAIN_FAMILY:
225 memcpy(&c->family, data,
sizeof(c->family));
227 case NFTNL_CHAIN_TYPE:
228 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
231 c->type = strdup(data);
235 case NFTNL_CHAIN_DEV:
236 if (c->flags & (1 << NFTNL_CHAIN_DEV))
239 c->dev = strdup(data);
244 c->flags |= (1 << attr);
248 EXPORT_SYMBOL(nftnl_chain_set);
249 void nftnl_chain_set(
struct nftnl_chain *c, uint16_t attr,
const void *data)
251 nftnl_chain_set_data(c, attr, data, nftnl_chain_validate[attr]);
254 EXPORT_SYMBOL(nftnl_chain_set_u32);
255 void nftnl_chain_set_u32(
struct nftnl_chain *c, uint16_t attr, uint32_t data)
257 nftnl_chain_set_data(c, attr, &data,
sizeof(uint32_t));
260 EXPORT_SYMBOL(nftnl_chain_set_s32);
261 void nftnl_chain_set_s32(
struct nftnl_chain *c, uint16_t attr, int32_t data)
263 nftnl_chain_set_data(c, attr, &data,
sizeof(int32_t));
266 EXPORT_SYMBOL(nftnl_chain_set_u64);
267 void nftnl_chain_set_u64(
struct nftnl_chain *c, uint16_t attr, uint64_t data)
269 nftnl_chain_set_data(c, attr, &data,
sizeof(uint64_t));
272 EXPORT_SYMBOL(nftnl_chain_set_u8);
273 void nftnl_chain_set_u8(
struct nftnl_chain *c, uint16_t attr, uint8_t data)
275 nftnl_chain_set_data(c, attr, &data,
sizeof(uint8_t));
278 EXPORT_SYMBOL(nftnl_chain_set_str);
279 int nftnl_chain_set_str(
struct nftnl_chain *c, uint16_t attr,
const char *str)
281 return nftnl_chain_set_data(c, attr, str, strlen(str) + 1);
284 EXPORT_SYMBOL(nftnl_chain_get_data);
285 const void *nftnl_chain_get_data(
const struct nftnl_chain *c, uint16_t attr,
288 if (!(c->flags & (1 << attr)))
292 case NFTNL_CHAIN_NAME:
293 *data_len = strlen(c->name) + 1;
295 case NFTNL_CHAIN_TABLE:
296 *data_len = strlen(c->table) + 1;
298 case NFTNL_CHAIN_HOOKNUM:
299 *data_len =
sizeof(uint32_t);
301 case NFTNL_CHAIN_PRIO:
302 *data_len =
sizeof(int32_t);
304 case NFTNL_CHAIN_POLICY:
305 *data_len =
sizeof(uint32_t);
307 case NFTNL_CHAIN_USE:
308 *data_len =
sizeof(uint32_t);
310 case NFTNL_CHAIN_BYTES:
311 *data_len =
sizeof(uint64_t);
313 case NFTNL_CHAIN_PACKETS:
314 *data_len =
sizeof(uint64_t);
316 case NFTNL_CHAIN_HANDLE:
317 *data_len =
sizeof(uint64_t);
319 case NFTNL_CHAIN_FAMILY:
320 *data_len =
sizeof(uint32_t);
322 case NFTNL_CHAIN_TYPE:
323 *data_len =
sizeof(uint32_t);
325 case NFTNL_CHAIN_DEV:
326 *data_len = strlen(c->dev) + 1;
332 EXPORT_SYMBOL(nftnl_chain_get);
333 const void *nftnl_chain_get(
const struct nftnl_chain *c, uint16_t attr)
336 return nftnl_chain_get_data(c, attr, &data_len);
339 EXPORT_SYMBOL(nftnl_chain_get_str);
340 const char *nftnl_chain_get_str(
const struct nftnl_chain *c, uint16_t attr)
342 return nftnl_chain_get(c, attr);
345 EXPORT_SYMBOL(nftnl_chain_get_u32);
346 uint32_t nftnl_chain_get_u32(
const struct nftnl_chain *c, uint16_t attr)
349 const uint32_t *val = nftnl_chain_get_data(c, attr, &data_len);
351 nftnl_assert(val, attr, data_len ==
sizeof(uint32_t));
353 return val ? *val : 0;
356 EXPORT_SYMBOL(nftnl_chain_get_s32);
357 int32_t nftnl_chain_get_s32(
const struct nftnl_chain *c, uint16_t attr)
360 const int32_t *val = nftnl_chain_get_data(c, attr, &data_len);
362 nftnl_assert(val, attr, data_len ==
sizeof(int32_t));
364 return val ? *val : 0;
367 EXPORT_SYMBOL(nftnl_chain_get_u64);
368 uint64_t nftnl_chain_get_u64(
const struct nftnl_chain *c, uint16_t attr)
371 const uint64_t *val = nftnl_chain_get_data(c, attr, &data_len);
373 nftnl_assert(val, attr, data_len ==
sizeof(int64_t));
375 return val ? *val : 0;
378 EXPORT_SYMBOL(nftnl_chain_get_u8);
379 uint8_t nftnl_chain_get_u8(
const struct nftnl_chain *c, uint16_t attr)
382 const uint8_t *val = nftnl_chain_get_data(c, attr, &data_len);
384 nftnl_assert(val, attr, data_len ==
sizeof(int8_t));
386 return val ? *val : 0;
389 EXPORT_SYMBOL(nftnl_chain_nlmsg_build_payload);
390 void nftnl_chain_nlmsg_build_payload(
struct nlmsghdr *nlh,
const struct nftnl_chain *c)
392 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
393 mnl_attr_put_strz(nlh, NFTA_CHAIN_TABLE, c->table);
394 if (c->flags & (1 << NFTNL_CHAIN_NAME))
395 mnl_attr_put_strz(nlh, NFTA_CHAIN_NAME, c->name);
396 if ((c->flags & (1 << NFTNL_CHAIN_HOOKNUM)) &&
397 (c->flags & (1 << NFTNL_CHAIN_PRIO))) {
400 nest = mnl_attr_nest_start(nlh, NFTA_CHAIN_HOOK);
401 mnl_attr_put_u32(nlh, NFTA_HOOK_HOOKNUM, htonl(c->hooknum));
402 mnl_attr_put_u32(nlh, NFTA_HOOK_PRIORITY, htonl(c->prio));
403 if (c->flags & (1 << NFTNL_CHAIN_DEV))
404 mnl_attr_put_strz(nlh, NFTA_HOOK_DEV, c->dev);
405 mnl_attr_nest_end(nlh, nest);
407 if (c->flags & (1 << NFTNL_CHAIN_POLICY))
408 mnl_attr_put_u32(nlh, NFTA_CHAIN_POLICY, htonl(c->policy));
409 if (c->flags & (1 << NFTNL_CHAIN_USE))
410 mnl_attr_put_u32(nlh, NFTA_CHAIN_USE, htonl(c->use));
411 if ((c->flags & (1 << NFTNL_CHAIN_PACKETS)) &&
412 (c->flags & (1 << NFTNL_CHAIN_BYTES))) {
415 nest = mnl_attr_nest_start(nlh, NFTA_CHAIN_COUNTERS);
416 mnl_attr_put_u64(nlh, NFTA_COUNTER_PACKETS, be64toh(c->packets));
417 mnl_attr_put_u64(nlh, NFTA_COUNTER_BYTES, be64toh(c->bytes));
418 mnl_attr_nest_end(nlh, nest);
420 if (c->flags & (1 << NFTNL_CHAIN_HANDLE))
421 mnl_attr_put_u64(nlh, NFTA_CHAIN_HANDLE, be64toh(c->handle));
422 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
423 mnl_attr_put_strz(nlh, NFTA_CHAIN_TYPE, c->type);
426 EXPORT_SYMBOL(nftnl_chain_rule_add);
427 void nftnl_chain_rule_add(
struct nftnl_rule *rule,
struct nftnl_chain *c)
429 list_add(&rule->head, &c->rule_list);
432 EXPORT_SYMBOL(nftnl_chain_rule_del);
433 void nftnl_chain_rule_del(
struct nftnl_rule *r)
438 EXPORT_SYMBOL(nftnl_chain_rule_add_tail);
439 void nftnl_chain_rule_add_tail(
struct nftnl_rule *rule,
struct nftnl_chain *c)
441 list_add_tail(&rule->head, &c->rule_list);
444 EXPORT_SYMBOL(nftnl_chain_rule_insert_at);
445 void nftnl_chain_rule_insert_at(
struct nftnl_rule *rule,
struct nftnl_rule *pos)
447 list_add_tail(&rule->head, &pos->head);
450 EXPORT_SYMBOL(nftnl_chain_rule_append_at);
451 void nftnl_chain_rule_append_at(
struct nftnl_rule *rule,
struct nftnl_rule *pos)
453 list_add(&rule->head, &pos->head);
456 static int nftnl_chain_parse_attr_cb(
const struct nlattr *attr,
void *data)
458 const struct nlattr **tb = data;
459 int type = mnl_attr_get_type(attr);
461 if (mnl_attr_type_valid(attr, NFTA_CHAIN_MAX) < 0)
465 case NFTA_CHAIN_NAME:
466 case NFTA_CHAIN_TABLE:
467 case NFTA_CHAIN_TYPE:
468 if (mnl_attr_validate(attr, MNL_TYPE_STRING) < 0)
471 case NFTA_CHAIN_HOOK:
472 case NFTA_CHAIN_COUNTERS:
473 if (mnl_attr_validate(attr, MNL_TYPE_NESTED) < 0)
476 case NFTA_CHAIN_POLICY:
478 if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0)
481 case NFTA_CHAIN_HANDLE:
482 if (mnl_attr_validate(attr, MNL_TYPE_U64) < 0)
491 static int nftnl_chain_parse_counters_cb(
const struct nlattr *attr,
void *data)
493 const struct nlattr **tb = data;
494 int type = mnl_attr_get_type(attr);
496 if (mnl_attr_type_valid(attr, NFTA_COUNTER_MAX) < 0)
500 case NFTA_COUNTER_BYTES:
501 case NFTA_COUNTER_PACKETS:
502 if (mnl_attr_validate(attr, MNL_TYPE_U64) < 0)
511 static int nftnl_chain_parse_counters(
struct nlattr *attr,
struct nftnl_chain *c)
513 struct nlattr *tb[NFTA_COUNTER_MAX+1] = {};
515 if (mnl_attr_parse_nested(attr, nftnl_chain_parse_counters_cb, tb) < 0)
518 if (tb[NFTA_COUNTER_PACKETS]) {
519 c->packets = be64toh(mnl_attr_get_u64(tb[NFTA_COUNTER_PACKETS]));
520 c->flags |= (1 << NFTNL_CHAIN_PACKETS);
522 if (tb[NFTA_COUNTER_BYTES]) {
523 c->bytes = be64toh(mnl_attr_get_u64(tb[NFTA_COUNTER_BYTES]));
524 c->flags |= (1 << NFTNL_CHAIN_BYTES);
530 static int nftnl_chain_parse_hook_cb(
const struct nlattr *attr,
void *data)
532 const struct nlattr **tb = data;
533 int type = mnl_attr_get_type(attr);
535 if (mnl_attr_type_valid(attr, NFTA_HOOK_MAX) < 0)
539 case NFTA_HOOK_HOOKNUM:
540 case NFTA_HOOK_PRIORITY:
541 if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0)
545 if (mnl_attr_validate(attr, MNL_TYPE_STRING) < 0)
554 static int nftnl_chain_parse_hook(
struct nlattr *attr,
struct nftnl_chain *c)
556 struct nlattr *tb[NFTA_HOOK_MAX+1] = {};
558 if (mnl_attr_parse_nested(attr, nftnl_chain_parse_hook_cb, tb) < 0)
561 if (tb[NFTA_HOOK_HOOKNUM]) {
562 c->hooknum = ntohl(mnl_attr_get_u32(tb[NFTA_HOOK_HOOKNUM]));
563 c->flags |= (1 << NFTNL_CHAIN_HOOKNUM);
565 if (tb[NFTA_HOOK_PRIORITY]) {
566 c->prio = ntohl(mnl_attr_get_u32(tb[NFTA_HOOK_PRIORITY]));
567 c->flags |= (1 << NFTNL_CHAIN_PRIO);
569 if (tb[NFTA_HOOK_DEV]) {
570 c->dev = strdup(mnl_attr_get_str(tb[NFTA_HOOK_DEV]));
573 c->flags |= (1 << NFTNL_CHAIN_DEV);
579 EXPORT_SYMBOL(nftnl_chain_nlmsg_parse);
580 int nftnl_chain_nlmsg_parse(
const struct nlmsghdr *nlh,
struct nftnl_chain *c)
582 struct nlattr *tb[NFTA_CHAIN_MAX+1] = {};
583 struct nfgenmsg *nfg = mnl_nlmsg_get_payload(nlh);
586 if (mnl_attr_parse(nlh,
sizeof(*nfg), nftnl_chain_parse_attr_cb, tb) < 0)
589 if (tb[NFTA_CHAIN_NAME]) {
590 if (c->flags & (1 << NFTNL_CHAIN_NAME))
592 c->name = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_NAME]));
595 c->flags |= (1 << NFTNL_CHAIN_NAME);
597 if (tb[NFTA_CHAIN_TABLE]) {
598 if (c->flags & (1 << NFTNL_CHAIN_TABLE))
600 c->table = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TABLE]));
603 c->flags |= (1 << NFTNL_CHAIN_TABLE);
605 if (tb[NFTA_CHAIN_HOOK]) {
606 ret = nftnl_chain_parse_hook(tb[NFTA_CHAIN_HOOK], c);
610 if (tb[NFTA_CHAIN_POLICY]) {
611 c->policy = ntohl(mnl_attr_get_u32(tb[NFTA_CHAIN_POLICY]));
612 c->flags |= (1 << NFTNL_CHAIN_POLICY);
614 if (tb[NFTA_CHAIN_USE]) {
615 c->use = ntohl(mnl_attr_get_u32(tb[NFTA_CHAIN_USE]));
616 c->flags |= (1 << NFTNL_CHAIN_USE);
618 if (tb[NFTA_CHAIN_COUNTERS]) {
619 ret = nftnl_chain_parse_counters(tb[NFTA_CHAIN_COUNTERS], c);
623 if (tb[NFTA_CHAIN_HANDLE]) {
624 c->handle = be64toh(mnl_attr_get_u64(tb[NFTA_CHAIN_HANDLE]));
625 c->flags |= (1 << NFTNL_CHAIN_HANDLE);
627 if (tb[NFTA_CHAIN_TYPE]) {
628 if (c->flags & (1 << NFTNL_CHAIN_TYPE))
630 c->type = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TYPE]));
633 c->flags |= (1 << NFTNL_CHAIN_TYPE);
636 c->family = nfg->nfgen_family;
637 c->flags |= (1 << NFTNL_CHAIN_FAMILY);
642 static inline int nftnl_str2hooknum(
int family,
const char *hook)
646 for (hooknum = 0; hooknum < NF_INET_NUMHOOKS; hooknum++) {
647 if (strcmp(hook, nftnl_hooknum2str(family, hooknum)) == 0)
653 static int nftnl_chain_snprintf_default(
char *buf,
size_t size,
656 int ret, remain = size, offset = 0;
658 ret = snprintf(buf, remain,
"%s %s %s use %u",
659 nftnl_family2str(c->family), c->table, c->name, c->use);
660 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
662 if (c->flags & (1 << NFTNL_CHAIN_HOOKNUM)) {
663 ret = snprintf(buf + offset, remain,
" type %s hook %s prio %d",
664 c->type, nftnl_hooknum2str(c->family, c->hooknum),
666 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
668 if (c->flags & (1 << NFTNL_CHAIN_POLICY)) {
669 ret = snprintf(buf + offset, remain,
" policy %s",
670 nftnl_verdict2str(c->policy));
671 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
674 ret = snprintf(buf + offset, remain,
675 " packets %"PRIu64
" bytes %"PRIu64
"",
676 c->packets, c->bytes);
677 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
679 if (c->flags & (1 << NFTNL_CHAIN_DEV)) {
680 ret = snprintf(buf + offset, remain,
" dev %s ",
682 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
689 static int nftnl_chain_cmd_snprintf(
char *buf,
size_t size,
691 uint32_t type, uint32_t flags)
693 int ret, remain = size, offset = 0;
696 case NFTNL_OUTPUT_DEFAULT:
697 ret = nftnl_chain_snprintf_default(buf + offset, remain, c);
698 SNPRINTF_BUFFER_SIZE(ret, remain, offset);
700 case NFTNL_OUTPUT_XML:
701 case NFTNL_OUTPUT_JSON:
709 EXPORT_SYMBOL(nftnl_chain_snprintf);
710 int nftnl_chain_snprintf(
char *buf,
size_t size,
const struct nftnl_chain *c,
711 uint32_t type, uint32_t flags)
716 return nftnl_chain_cmd_snprintf(buf, size, c, nftnl_flag2cmd(flags),
720 static int nftnl_chain_do_snprintf(
char *buf,
size_t size,
const void *c,
721 uint32_t cmd, uint32_t type, uint32_t flags)
723 return nftnl_chain_snprintf(buf, size, c, type, flags);
726 EXPORT_SYMBOL(nftnl_chain_fprintf);
727 int nftnl_chain_fprintf(FILE *fp,
const struct nftnl_chain *c, uint32_t type,
730 return nftnl_fprintf(fp, c, NFTNL_CMD_UNSPEC, type, flags,
731 nftnl_chain_do_snprintf);
734 EXPORT_SYMBOL(nftnl_rule_foreach);
736 int (*cb)(
struct nftnl_rule *r,
void *data),
739 struct nftnl_rule *cur, *tmp;
742 list_for_each_entry_safe(cur, tmp, &c->rule_list, head) {
750 EXPORT_SYMBOL(nftnl_rule_lookup_byindex);
752 nftnl_rule_lookup_byindex(
struct nftnl_chain *c, uint32_t index)
754 struct nftnl_rule *r;
756 list_for_each_entry(r, &c->rule_list, head) {
766 struct nftnl_rule *cur;
769 static void nftnl_rule_iter_init(
const struct nftnl_chain *c,
773 if (list_empty(&c->rule_list))
776 iter->cur = list_entry(c->rule_list.next,
struct nftnl_rule,
780 EXPORT_SYMBOL(nftnl_rule_iter_create);
789 nftnl_rule_iter_init(c, iter);
794 EXPORT_SYMBOL(nftnl_rule_iter_next);
797 struct nftnl_rule *rule = iter->cur;
803 iter->cur = list_entry(iter->cur->head.next,
struct nftnl_rule, head);
804 if (&iter->cur->head == iter->c->rule_list.next)
810 EXPORT_SYMBOL(nftnl_rule_iter_destroy);
816 #define CHAIN_NAME_HSIZE 512
820 struct list_head list;
821 struct hlist_head name_hash[CHAIN_NAME_HSIZE];
824 EXPORT_SYMBOL(nftnl_chain_list_alloc);
834 INIT_LIST_HEAD(&list->list);
835 for (i = 0; i < CHAIN_NAME_HSIZE; i++)
836 INIT_HLIST_HEAD(&list->name_hash[i]);
841 EXPORT_SYMBOL(nftnl_chain_list_free);
846 list_for_each_entry_safe(r, tmp, &list->list, head) {
848 hlist_del(&r->hnode);
854 EXPORT_SYMBOL(nftnl_chain_list_is_empty);
857 return list_empty(&list->list);
860 static uint32_t djb_hash(
const char *key)
862 uint32_t i, hash = 5381;
864 for (i = 0; i < strlen(key); i++)
865 hash = ((hash << 5) + hash) + key[i];
870 EXPORT_SYMBOL(nftnl_chain_list_add);
873 int key = djb_hash(r->name) % CHAIN_NAME_HSIZE;
875 hlist_add_head(&r->hnode, &list->name_hash[key]);
876 list_add(&r->head, &list->list);
879 EXPORT_SYMBOL(nftnl_chain_list_add_tail);
882 int key = djb_hash(r->name) % CHAIN_NAME_HSIZE;
884 hlist_add_head(&r->hnode, &list->name_hash[key]);
885 list_add_tail(&r->head, &list->list);
888 EXPORT_SYMBOL(nftnl_chain_list_del);
892 hlist_del(&r->hnode);
895 EXPORT_SYMBOL(nftnl_chain_list_foreach);
903 list_for_each_entry_safe(cur, tmp, &chain_list->list, head) {
911 EXPORT_SYMBOL(nftnl_chain_list_lookup_byname);
916 int key = djb_hash(chain) % CHAIN_NAME_HSIZE;
918 struct hlist_node *n;
920 hlist_for_each_entry(c, n, &chain_list->name_hash[key], hnode) {
921 if (!strcmp(chain, c->name))
932 EXPORT_SYMBOL(nftnl_chain_list_iter_create);
943 if (nftnl_chain_list_is_empty(l))
946 iter->cur = list_entry(l->list.next,
struct nftnl_chain, head);
951 EXPORT_SYMBOL(nftnl_chain_list_iter_next);
960 iter->cur = list_entry(iter->cur->head.next,
struct nftnl_chain, head);
961 if (&iter->cur->head == iter->list->list.next)
967 EXPORT_SYMBOL(nftnl_chain_list_iter_destroy);