15#include <netinet/in.h>
17#include <linux/netfilter.h>
18#include <linux/netfilter/nf_tables.h>
20#include <libmnl/libmnl.h>
21#include <libnftnl/chain.h>
23static struct nftnl_chain *chain_del_parse(
int argc,
char *argv[])
27 t = nftnl_chain_alloc();
33 nftnl_chain_set_str(t, NFTNL_CHAIN_TABLE, argv[2]);
34 nftnl_chain_set_str(t, NFTNL_CHAIN_NAME, argv[3]);
39int main(
int argc,
char *argv[])
41 struct mnl_socket *nl;
42 struct mnl_nlmsg_batch *batch;
43 char buf[MNL_SOCKET_BUFFER_SIZE];
45 uint32_t portid, seq, chain_seq;
50 fprintf(stderr,
"Usage: %s <family> <table> <chain>\n",
55 if (strcmp(argv[1],
"ip") == 0)
56 family = NFPROTO_IPV4;
57 else if (strcmp(argv[1],
"ip6") == 0)
58 family = NFPROTO_IPV6;
59 else if (strcmp(argv[1],
"inet") == 0)
60 family = NFPROTO_INET;
61 else if (strcmp(argv[1],
"bridge") == 0)
62 family = NFPROTO_BRIDGE;
63 else if (strcmp(argv[1],
"arp") == 0)
66 fprintf(stderr,
"Unknown family: ip, ip6, inet, bridge, arp\n");
70 t = chain_del_parse(argc, argv);
75 batch = mnl_nlmsg_batch_start(buf,
sizeof(buf));
77 nftnl_batch_begin(mnl_nlmsg_batch_current(batch), seq++);
78 mnl_nlmsg_batch_next(batch);
81 nlh = nftnl_nlmsg_build_hdr(mnl_nlmsg_batch_current(batch),
82 NFT_MSG_DELCHAIN, family, NLM_F_ACK, seq++);
83 nftnl_chain_nlmsg_build_payload(nlh, t);
85 mnl_nlmsg_batch_next(batch);
87 nftnl_batch_end(mnl_nlmsg_batch_current(batch), seq++);
88 mnl_nlmsg_batch_next(batch);
90 nl = mnl_socket_open(NETLINK_NETFILTER);
92 perror(
"mnl_socket_open");
96 if (mnl_socket_bind(nl, 0, MNL_SOCKET_AUTOPID) < 0) {
97 perror(
"mnl_socket_bind");
100 portid = mnl_socket_get_portid(nl);
102 if (mnl_socket_sendto(nl, mnl_nlmsg_batch_head(batch),
103 mnl_nlmsg_batch_size(batch)) < 0) {
104 perror(
"mnl_socket_send");
108 mnl_nlmsg_batch_stop(batch);
110 ret = mnl_socket_recvfrom(nl, buf,
sizeof(buf));
112 ret = mnl_cb_run(buf, ret, chain_seq, portid, NULL, NULL);
115 ret = mnl_socket_recvfrom(nl, buf,
sizeof(buf));
121 mnl_socket_close(nl);