netfilter: nf_tables: add compatibility layer for x_tables
[deliverable/linux.git] / include / uapi / linux / netfilter / nf_tables.h
1 #ifndef _LINUX_NF_TABLES_H
2 #define _LINUX_NF_TABLES_H
3
4 #define NFT_CHAIN_MAXNAMELEN 32
5
6 enum nft_registers {
7 NFT_REG_VERDICT,
8 NFT_REG_1,
9 NFT_REG_2,
10 NFT_REG_3,
11 NFT_REG_4,
12 __NFT_REG_MAX
13 };
14 #define NFT_REG_MAX (__NFT_REG_MAX - 1)
15
16 /**
17 * enum nft_verdicts - nf_tables internal verdicts
18 *
19 * @NFT_CONTINUE: continue evaluation of the current rule
20 * @NFT_BREAK: terminate evaluation of the current rule
21 * @NFT_JUMP: push the current chain on the jump stack and jump to a chain
22 * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack
23 * @NFT_RETURN: return to the topmost chain on the jump stack
24 *
25 * The nf_tables verdicts share their numeric space with the netfilter verdicts.
26 */
27 enum nft_verdicts {
28 NFT_CONTINUE = -1,
29 NFT_BREAK = -2,
30 NFT_JUMP = -3,
31 NFT_GOTO = -4,
32 NFT_RETURN = -5,
33 };
34
35 /**
36 * enum nf_tables_msg_types - nf_tables netlink message types
37 *
38 * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes)
39 * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes)
40 * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes)
41 * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes)
42 * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes)
43 * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes)
44 * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes)
45 * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes)
46 * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes)
47 * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes)
48 * @NFT_MSG_GETSET: get a set (enum nft_set_attributes)
49 * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes)
50 * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes)
51 * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes)
52 * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes)
53 */
54 enum nf_tables_msg_types {
55 NFT_MSG_NEWTABLE,
56 NFT_MSG_GETTABLE,
57 NFT_MSG_DELTABLE,
58 NFT_MSG_NEWCHAIN,
59 NFT_MSG_GETCHAIN,
60 NFT_MSG_DELCHAIN,
61 NFT_MSG_NEWRULE,
62 NFT_MSG_GETRULE,
63 NFT_MSG_DELRULE,
64 NFT_MSG_NEWSET,
65 NFT_MSG_GETSET,
66 NFT_MSG_DELSET,
67 NFT_MSG_NEWSETELEM,
68 NFT_MSG_GETSETELEM,
69 NFT_MSG_DELSETELEM,
70 NFT_MSG_MAX,
71 };
72
73 /**
74 * enum nft_list_attributes - nf_tables generic list netlink attributes
75 *
76 * @NFTA_LIST_ELEM: list element (NLA_NESTED)
77 */
78 enum nft_list_attributes {
79 NFTA_LIST_UNPEC,
80 NFTA_LIST_ELEM,
81 __NFTA_LIST_MAX
82 };
83 #define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1)
84
85 /**
86 * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes
87 *
88 * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32)
89 * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32)
90 */
91 enum nft_hook_attributes {
92 NFTA_HOOK_UNSPEC,
93 NFTA_HOOK_HOOKNUM,
94 NFTA_HOOK_PRIORITY,
95 __NFTA_HOOK_MAX
96 };
97 #define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1)
98
99 /**
100 * enum nft_table_attributes - nf_tables table netlink attributes
101 *
102 * @NFTA_TABLE_NAME: name of the table (NLA_STRING)
103 */
104 enum nft_table_attributes {
105 NFTA_TABLE_UNSPEC,
106 NFTA_TABLE_NAME,
107 __NFTA_TABLE_MAX
108 };
109 #define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1)
110
111 /**
112 * enum nft_chain_attributes - nf_tables chain netlink attributes
113 *
114 * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING)
115 * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64)
116 * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING)
117 * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes)
118 * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32)
119 * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32)
120 * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING)
121 * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes)
122 */
123 enum nft_chain_attributes {
124 NFTA_CHAIN_UNSPEC,
125 NFTA_CHAIN_TABLE,
126 NFTA_CHAIN_HANDLE,
127 NFTA_CHAIN_NAME,
128 NFTA_CHAIN_HOOK,
129 NFTA_CHAIN_POLICY,
130 NFTA_CHAIN_USE,
131 NFTA_CHAIN_TYPE,
132 NFTA_CHAIN_COUNTERS,
133 __NFTA_CHAIN_MAX
134 };
135 #define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1)
136
137 /**
138 * enum nft_rule_attributes - nf_tables rule netlink attributes
139 *
140 * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING)
141 * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING)
142 * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64)
143 * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes)
144 * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes)
145 */
146 enum nft_rule_attributes {
147 NFTA_RULE_UNSPEC,
148 NFTA_RULE_TABLE,
149 NFTA_RULE_CHAIN,
150 NFTA_RULE_HANDLE,
151 NFTA_RULE_EXPRESSIONS,
152 NFTA_RULE_COMPAT,
153 __NFTA_RULE_MAX
154 };
155 #define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1)
156
157 /**
158 * enum nft_rule_compat_flags - nf_tables rule compat flags
159 *
160 * @NFT_RULE_COMPAT_F_INV: invert the check result
161 */
162 enum nft_rule_compat_flags {
163 NFT_RULE_COMPAT_F_INV = (1 << 1),
164 NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV,
165 };
166
167 /**
168 * enum nft_rule_compat_attributes - nf_tables rule compat attributes
169 *
170 * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32)
171 * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32)
172 */
173 enum nft_rule_compat_attributes {
174 NFTA_RULE_COMPAT_UNSPEC,
175 NFTA_RULE_COMPAT_PROTO,
176 NFTA_RULE_COMPAT_FLAGS,
177 __NFTA_RULE_COMPAT_MAX
178 };
179 #define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1)
180
181 /**
182 * enum nft_set_flags - nf_tables set flags
183 *
184 * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink
185 * @NFT_SET_CONSTANT: set contents may not change while bound
186 * @NFT_SET_INTERVAL: set contains intervals
187 * @NFT_SET_MAP: set is used as a dictionary
188 */
189 enum nft_set_flags {
190 NFT_SET_ANONYMOUS = 0x1,
191 NFT_SET_CONSTANT = 0x2,
192 NFT_SET_INTERVAL = 0x4,
193 NFT_SET_MAP = 0x8,
194 };
195
196 /**
197 * enum nft_set_attributes - nf_tables set netlink attributes
198 *
199 * @NFTA_SET_TABLE: table name (NLA_STRING)
200 * @NFTA_SET_NAME: set name (NLA_STRING)
201 * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32)
202 * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32)
203 * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
204 * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
205 * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
206 */
207 enum nft_set_attributes {
208 NFTA_SET_UNSPEC,
209 NFTA_SET_TABLE,
210 NFTA_SET_NAME,
211 NFTA_SET_FLAGS,
212 NFTA_SET_KEY_TYPE,
213 NFTA_SET_KEY_LEN,
214 NFTA_SET_DATA_TYPE,
215 NFTA_SET_DATA_LEN,
216 __NFTA_SET_MAX
217 };
218 #define NFTA_SET_MAX (__NFTA_SET_MAX - 1)
219
220 /**
221 * enum nft_set_elem_flags - nf_tables set element flags
222 *
223 * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval
224 */
225 enum nft_set_elem_flags {
226 NFT_SET_ELEM_INTERVAL_END = 0x1,
227 };
228
229 /**
230 * enum nft_set_elem_attributes - nf_tables set element netlink attributes
231 *
232 * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)
233 * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)
234 * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)
235 */
236 enum nft_set_elem_attributes {
237 NFTA_SET_ELEM_UNSPEC,
238 NFTA_SET_ELEM_KEY,
239 NFTA_SET_ELEM_DATA,
240 NFTA_SET_ELEM_FLAGS,
241 __NFTA_SET_ELEM_MAX
242 };
243 #define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1)
244
245 /**
246 * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes
247 *
248 * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING)
249 * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING)
250 * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes)
251 */
252 enum nft_set_elem_list_attributes {
253 NFTA_SET_ELEM_LIST_UNSPEC,
254 NFTA_SET_ELEM_LIST_TABLE,
255 NFTA_SET_ELEM_LIST_SET,
256 NFTA_SET_ELEM_LIST_ELEMENTS,
257 __NFTA_SET_ELEM_LIST_MAX
258 };
259 #define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1)
260
261 /**
262 * enum nft_data_types - nf_tables data types
263 *
264 * @NFT_DATA_VALUE: generic data
265 * @NFT_DATA_VERDICT: netfilter verdict
266 *
267 * The type of data is usually determined by the kernel directly and is not
268 * explicitly specified by userspace. The only difference are sets, where
269 * userspace specifies the key and mapping data types.
270 *
271 * The values 0xffffff00-0xffffffff are reserved for internally used types.
272 * The remaining range can be freely used by userspace to encode types, all
273 * values are equivalent to NFT_DATA_VALUE.
274 */
275 enum nft_data_types {
276 NFT_DATA_VALUE,
277 NFT_DATA_VERDICT = 0xffffff00U,
278 };
279
280 #define NFT_DATA_RESERVED_MASK 0xffffff00U
281
282 /**
283 * enum nft_data_attributes - nf_tables data netlink attributes
284 *
285 * @NFTA_DATA_VALUE: generic data (NLA_BINARY)
286 * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes)
287 */
288 enum nft_data_attributes {
289 NFTA_DATA_UNSPEC,
290 NFTA_DATA_VALUE,
291 NFTA_DATA_VERDICT,
292 __NFTA_DATA_MAX
293 };
294 #define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1)
295
296 /**
297 * enum nft_verdict_attributes - nf_tables verdict netlink attributes
298 *
299 * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts)
300 * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING)
301 */
302 enum nft_verdict_attributes {
303 NFTA_VERDICT_UNSPEC,
304 NFTA_VERDICT_CODE,
305 NFTA_VERDICT_CHAIN,
306 __NFTA_VERDICT_MAX
307 };
308 #define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1)
309
310 /**
311 * enum nft_expr_attributes - nf_tables expression netlink attributes
312 *
313 * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING)
314 * @NFTA_EXPR_DATA: type specific data (NLA_NESTED)
315 */
316 enum nft_expr_attributes {
317 NFTA_EXPR_UNSPEC,
318 NFTA_EXPR_NAME,
319 NFTA_EXPR_DATA,
320 __NFTA_EXPR_MAX
321 };
322 #define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1)
323
324 /**
325 * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes
326 *
327 * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32)
328 * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes)
329 */
330 enum nft_immediate_attributes {
331 NFTA_IMMEDIATE_UNSPEC,
332 NFTA_IMMEDIATE_DREG,
333 NFTA_IMMEDIATE_DATA,
334 __NFTA_IMMEDIATE_MAX
335 };
336 #define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1)
337
338 /**
339 * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes
340 *
341 * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers)
342 * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers)
343 * @NFTA_BITWISE_LEN: length of operands (NLA_U32)
344 * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes)
345 * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes)
346 *
347 * The bitwise expression performs the following operation:
348 *
349 * dreg = (sreg & mask) ^ xor
350 *
351 * which allow to express all bitwise operations:
352 *
353 * mask xor
354 * NOT: 1 1
355 * OR: 0 x
356 * XOR: 1 x
357 * AND: x 0
358 */
359 enum nft_bitwise_attributes {
360 NFTA_BITWISE_UNSPEC,
361 NFTA_BITWISE_SREG,
362 NFTA_BITWISE_DREG,
363 NFTA_BITWISE_LEN,
364 NFTA_BITWISE_MASK,
365 NFTA_BITWISE_XOR,
366 __NFTA_BITWISE_MAX
367 };
368 #define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1)
369
370 /**
371 * enum nft_byteorder_ops - nf_tables byteorder operators
372 *
373 * @NFT_BYTEORDER_NTOH: network to host operator
374 * @NFT_BYTEORDER_HTON: host to network opertaor
375 */
376 enum nft_byteorder_ops {
377 NFT_BYTEORDER_NTOH,
378 NFT_BYTEORDER_HTON,
379 };
380
381 /**
382 * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes
383 *
384 * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers)
385 * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers)
386 * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops)
387 * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32)
388 * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4)
389 */
390 enum nft_byteorder_attributes {
391 NFTA_BYTEORDER_UNSPEC,
392 NFTA_BYTEORDER_SREG,
393 NFTA_BYTEORDER_DREG,
394 NFTA_BYTEORDER_OP,
395 NFTA_BYTEORDER_LEN,
396 NFTA_BYTEORDER_SIZE,
397 __NFTA_BYTEORDER_MAX
398 };
399 #define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1)
400
401 /**
402 * enum nft_cmp_ops - nf_tables relational operator
403 *
404 * @NFT_CMP_EQ: equal
405 * @NFT_CMP_NEQ: not equal
406 * @NFT_CMP_LT: less than
407 * @NFT_CMP_LTE: less than or equal to
408 * @NFT_CMP_GT: greater than
409 * @NFT_CMP_GTE: greater than or equal to
410 */
411 enum nft_cmp_ops {
412 NFT_CMP_EQ,
413 NFT_CMP_NEQ,
414 NFT_CMP_LT,
415 NFT_CMP_LTE,
416 NFT_CMP_GT,
417 NFT_CMP_GTE,
418 };
419
420 /**
421 * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes
422 *
423 * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers)
424 * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops)
425 * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes)
426 */
427 enum nft_cmp_attributes {
428 NFTA_CMP_UNSPEC,
429 NFTA_CMP_SREG,
430 NFTA_CMP_OP,
431 NFTA_CMP_DATA,
432 __NFTA_CMP_MAX
433 };
434 #define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1)
435
436 /**
437 * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes
438 *
439 * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING)
440 * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers)
441 * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers)
442 */
443 enum nft_lookup_attributes {
444 NFTA_LOOKUP_UNSPEC,
445 NFTA_LOOKUP_SET,
446 NFTA_LOOKUP_SREG,
447 NFTA_LOOKUP_DREG,
448 __NFTA_LOOKUP_MAX
449 };
450 #define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1)
451
452 /**
453 * enum nft_payload_bases - nf_tables payload expression offset bases
454 *
455 * @NFT_PAYLOAD_LL_HEADER: link layer header
456 * @NFT_PAYLOAD_NETWORK_HEADER: network header
457 * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header
458 */
459 enum nft_payload_bases {
460 NFT_PAYLOAD_LL_HEADER,
461 NFT_PAYLOAD_NETWORK_HEADER,
462 NFT_PAYLOAD_TRANSPORT_HEADER,
463 };
464
465 /**
466 * enum nft_payload_attributes - nf_tables payload expression netlink attributes
467 *
468 * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers)
469 * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases)
470 * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32)
471 * @NFTA_PAYLOAD_LEN: payload length (NLA_U32)
472 */
473 enum nft_payload_attributes {
474 NFTA_PAYLOAD_UNSPEC,
475 NFTA_PAYLOAD_DREG,
476 NFTA_PAYLOAD_BASE,
477 NFTA_PAYLOAD_OFFSET,
478 NFTA_PAYLOAD_LEN,
479 __NFTA_PAYLOAD_MAX
480 };
481 #define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1)
482
483 /**
484 * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes
485 *
486 * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers)
487 * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8)
488 * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32)
489 * @NFTA_EXTHDR_LEN: extension header length (NLA_U32)
490 */
491 enum nft_exthdr_attributes {
492 NFTA_EXTHDR_UNSPEC,
493 NFTA_EXTHDR_DREG,
494 NFTA_EXTHDR_TYPE,
495 NFTA_EXTHDR_OFFSET,
496 NFTA_EXTHDR_LEN,
497 __NFTA_EXTHDR_MAX
498 };
499 #define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1)
500
501 /**
502 * enum nft_meta_keys - nf_tables meta expression keys
503 *
504 * @NFT_META_LEN: packet length (skb->len)
505 * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT
506 * @NFT_META_PRIORITY: packet priority (skb->priority)
507 * @NFT_META_MARK: packet mark (skb->mark)
508 * @NFT_META_IIF: packet input interface index (dev->ifindex)
509 * @NFT_META_OIF: packet output interface index (dev->ifindex)
510 * @NFT_META_IIFNAME: packet input interface name (dev->name)
511 * @NFT_META_OIFNAME: packet output interface name (dev->name)
512 * @NFT_META_IIFTYPE: packet input interface type (dev->type)
513 * @NFT_META_OIFTYPE: packet output interface type (dev->type)
514 * @NFT_META_SKUID: originating socket UID (fsuid)
515 * @NFT_META_SKGID: originating socket GID (fsgid)
516 * @NFT_META_NFTRACE: packet nftrace bit
517 * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid)
518 * @NFT_META_SECMARK: packet secmark (skb->secmark)
519 */
520 enum nft_meta_keys {
521 NFT_META_LEN,
522 NFT_META_PROTOCOL,
523 NFT_META_PRIORITY,
524 NFT_META_MARK,
525 NFT_META_IIF,
526 NFT_META_OIF,
527 NFT_META_IIFNAME,
528 NFT_META_OIFNAME,
529 NFT_META_IIFTYPE,
530 NFT_META_OIFTYPE,
531 NFT_META_SKUID,
532 NFT_META_SKGID,
533 NFT_META_NFTRACE,
534 NFT_META_RTCLASSID,
535 NFT_META_SECMARK,
536 };
537
538 /**
539 * enum nft_meta_attributes - nf_tables meta expression netlink attributes
540 *
541 * @NFTA_META_DREG: destination register (NLA_U32)
542 * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys)
543 */
544 enum nft_meta_attributes {
545 NFTA_META_UNSPEC,
546 NFTA_META_DREG,
547 NFTA_META_KEY,
548 __NFTA_META_MAX
549 };
550 #define NFTA_META_MAX (__NFTA_META_MAX - 1)
551
552 /**
553 * enum nft_ct_keys - nf_tables ct expression keys
554 *
555 * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info)
556 * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir)
557 * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status)
558 * @NFT_CT_MARK: conntrack mark value
559 * @NFT_CT_SECMARK: conntrack secmark value
560 * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms
561 * @NFT_CT_HELPER: connection tracking helper assigned to conntrack
562 * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol
563 * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address)
564 * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address)
565 * @NFT_CT_PROTOCOL: conntrack layer 4 protocol
566 * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source
567 * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination
568 */
569 enum nft_ct_keys {
570 NFT_CT_STATE,
571 NFT_CT_DIRECTION,
572 NFT_CT_STATUS,
573 NFT_CT_MARK,
574 NFT_CT_SECMARK,
575 NFT_CT_EXPIRATION,
576 NFT_CT_HELPER,
577 NFT_CT_L3PROTOCOL,
578 NFT_CT_SRC,
579 NFT_CT_DST,
580 NFT_CT_PROTOCOL,
581 NFT_CT_PROTO_SRC,
582 NFT_CT_PROTO_DST,
583 };
584
585 /**
586 * enum nft_ct_attributes - nf_tables ct expression netlink attributes
587 *
588 * @NFTA_CT_DREG: destination register (NLA_U32)
589 * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys)
590 * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8)
591 */
592 enum nft_ct_attributes {
593 NFTA_CT_UNSPEC,
594 NFTA_CT_DREG,
595 NFTA_CT_KEY,
596 NFTA_CT_DIRECTION,
597 __NFTA_CT_MAX
598 };
599 #define NFTA_CT_MAX (__NFTA_CT_MAX - 1)
600
601 /**
602 * enum nft_limit_attributes - nf_tables limit expression netlink attributes
603 *
604 * @NFTA_LIMIT_RATE: refill rate (NLA_U64)
605 * @NFTA_LIMIT_UNIT: refill unit (NLA_U64)
606 */
607 enum nft_limit_attributes {
608 NFTA_LIMIT_UNSPEC,
609 NFTA_LIMIT_RATE,
610 NFTA_LIMIT_UNIT,
611 __NFTA_LIMIT_MAX
612 };
613 #define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1)
614
615 /**
616 * enum nft_counter_attributes - nf_tables counter expression netlink attributes
617 *
618 * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64)
619 * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64)
620 */
621 enum nft_counter_attributes {
622 NFTA_COUNTER_UNSPEC,
623 NFTA_COUNTER_BYTES,
624 NFTA_COUNTER_PACKETS,
625 __NFTA_COUNTER_MAX
626 };
627 #define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1)
628
629 /**
630 * enum nft_log_attributes - nf_tables log expression netlink attributes
631 *
632 * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32)
633 * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING)
634 * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32)
635 * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32)
636 */
637 enum nft_log_attributes {
638 NFTA_LOG_UNSPEC,
639 NFTA_LOG_GROUP,
640 NFTA_LOG_PREFIX,
641 NFTA_LOG_SNAPLEN,
642 NFTA_LOG_QTHRESHOLD,
643 __NFTA_LOG_MAX
644 };
645 #define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1)
646
647 /**
648 * enum nft_reject_types - nf_tables reject expression reject types
649 *
650 * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable
651 * @NFT_REJECT_TCP_RST: reject using TCP RST
652 */
653 enum nft_reject_types {
654 NFT_REJECT_ICMP_UNREACH,
655 NFT_REJECT_TCP_RST,
656 };
657
658 /**
659 * enum nft_reject_attributes - nf_tables reject expression netlink attributes
660 *
661 * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types)
662 * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8)
663 */
664 enum nft_reject_attributes {
665 NFTA_REJECT_UNSPEC,
666 NFTA_REJECT_TYPE,
667 NFTA_REJECT_ICMP_CODE,
668 __NFTA_REJECT_MAX
669 };
670 #define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1)
671
672 /**
673 * enum nft_nat_types - nf_tables nat expression NAT types
674 *
675 * @NFT_NAT_SNAT: source NAT
676 * @NFT_NAT_DNAT: destination NAT
677 */
678 enum nft_nat_types {
679 NFT_NAT_SNAT,
680 NFT_NAT_DNAT,
681 };
682
683 /**
684 * enum nft_nat_attributes - nf_tables nat expression netlink attributes
685 *
686 * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types)
687 * @NFTA_NAT_ADDR_MIN: source register of address range start (NLA_U32: nft_registers)
688 * @NFTA_NAT_ADDR_MAX: source register of address range end (NLA_U32: nft_registers)
689 * @NFTA_NAT_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
690 * @NFTA_NAT_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
691 */
692 enum nft_nat_attributes {
693 NFTA_NAT_UNSPEC,
694 NFTA_NAT_TYPE,
695 NFTA_NAT_ADDR_MIN,
696 NFTA_NAT_ADDR_MAX,
697 NFTA_NAT_PROTO_MIN,
698 NFTA_NAT_PROTO_MAX,
699 __NFTA_NAT_MAX
700 };
701 #define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1)
702
703 #endif /* _LINUX_NF_TABLES_H */
This page took 0.04569 seconds and 5 git commands to generate.