]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - include/uapi/linux/netfilter/nf_tables.h
netfilter: nf_tables: introduce routing expression
[mirror_ubuntu-artful-kernel.git] / include / uapi / linux / netfilter / nf_tables.h
1 #ifndef _LINUX_NF_TABLES_H
2 #define _LINUX_NF_TABLES_H
3
4 #define NFT_TABLE_MAXNAMELEN 32
5 #define NFT_CHAIN_MAXNAMELEN 32
6 #define NFT_SET_MAXNAMELEN 32
7 #define NFT_USERDATA_MAXLEN 256
8
9 /**
10 * enum nft_registers - nf_tables registers
11 *
12 * nf_tables used to have five registers: a verdict register and four data
13 * registers of size 16. The data registers have been changed to 16 registers
14 * of size 4. For compatibility reasons, the NFT_REG_[1-4] registers still
15 * map to areas of size 16, the 4 byte registers are addressed using
16 * NFT_REG32_00 - NFT_REG32_15.
17 */
18 enum nft_registers {
19 NFT_REG_VERDICT,
20 NFT_REG_1,
21 NFT_REG_2,
22 NFT_REG_3,
23 NFT_REG_4,
24 __NFT_REG_MAX,
25
26 NFT_REG32_00 = 8,
27 NFT_REG32_01,
28 NFT_REG32_02,
29 NFT_REG32_03,
30 NFT_REG32_04,
31 NFT_REG32_05,
32 NFT_REG32_06,
33 NFT_REG32_07,
34 NFT_REG32_08,
35 NFT_REG32_09,
36 NFT_REG32_10,
37 NFT_REG32_11,
38 NFT_REG32_12,
39 NFT_REG32_13,
40 NFT_REG32_14,
41 NFT_REG32_15,
42 };
43 #define NFT_REG_MAX (__NFT_REG_MAX - 1)
44
45 #define NFT_REG_SIZE 16
46 #define NFT_REG32_SIZE 4
47
48 /**
49 * enum nft_verdicts - nf_tables internal verdicts
50 *
51 * @NFT_CONTINUE: continue evaluation of the current rule
52 * @NFT_BREAK: terminate evaluation of the current rule
53 * @NFT_JUMP: push the current chain on the jump stack and jump to a chain
54 * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack
55 * @NFT_RETURN: return to the topmost chain on the jump stack
56 *
57 * The nf_tables verdicts share their numeric space with the netfilter verdicts.
58 */
59 enum nft_verdicts {
60 NFT_CONTINUE = -1,
61 NFT_BREAK = -2,
62 NFT_JUMP = -3,
63 NFT_GOTO = -4,
64 NFT_RETURN = -5,
65 };
66
67 /**
68 * enum nf_tables_msg_types - nf_tables netlink message types
69 *
70 * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes)
71 * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes)
72 * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes)
73 * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes)
74 * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes)
75 * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes)
76 * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes)
77 * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes)
78 * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes)
79 * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes)
80 * @NFT_MSG_GETSET: get a set (enum nft_set_attributes)
81 * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes)
82 * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes)
83 * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes)
84 * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes)
85 * @NFT_MSG_NEWGEN: announce a new generation, only for events (enum nft_gen_attributes)
86 * @NFT_MSG_GETGEN: get the rule-set generation (enum nft_gen_attributes)
87 * @NFT_MSG_TRACE: trace event (enum nft_trace_attributes)
88 */
89 enum nf_tables_msg_types {
90 NFT_MSG_NEWTABLE,
91 NFT_MSG_GETTABLE,
92 NFT_MSG_DELTABLE,
93 NFT_MSG_NEWCHAIN,
94 NFT_MSG_GETCHAIN,
95 NFT_MSG_DELCHAIN,
96 NFT_MSG_NEWRULE,
97 NFT_MSG_GETRULE,
98 NFT_MSG_DELRULE,
99 NFT_MSG_NEWSET,
100 NFT_MSG_GETSET,
101 NFT_MSG_DELSET,
102 NFT_MSG_NEWSETELEM,
103 NFT_MSG_GETSETELEM,
104 NFT_MSG_DELSETELEM,
105 NFT_MSG_NEWGEN,
106 NFT_MSG_GETGEN,
107 NFT_MSG_TRACE,
108 NFT_MSG_MAX,
109 };
110
111 /**
112 * enum nft_list_attributes - nf_tables generic list netlink attributes
113 *
114 * @NFTA_LIST_ELEM: list element (NLA_NESTED)
115 */
116 enum nft_list_attributes {
117 NFTA_LIST_UNPEC,
118 NFTA_LIST_ELEM,
119 __NFTA_LIST_MAX
120 };
121 #define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1)
122
123 /**
124 * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes
125 *
126 * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32)
127 * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32)
128 * @NFTA_HOOK_DEV: netdevice name (NLA_STRING)
129 */
130 enum nft_hook_attributes {
131 NFTA_HOOK_UNSPEC,
132 NFTA_HOOK_HOOKNUM,
133 NFTA_HOOK_PRIORITY,
134 NFTA_HOOK_DEV,
135 __NFTA_HOOK_MAX
136 };
137 #define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1)
138
139 /**
140 * enum nft_table_flags - nf_tables table flags
141 *
142 * @NFT_TABLE_F_DORMANT: this table is not active
143 */
144 enum nft_table_flags {
145 NFT_TABLE_F_DORMANT = 0x1,
146 };
147
148 /**
149 * enum nft_table_attributes - nf_tables table netlink attributes
150 *
151 * @NFTA_TABLE_NAME: name of the table (NLA_STRING)
152 * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32)
153 * @NFTA_TABLE_USE: number of chains in this table (NLA_U32)
154 */
155 enum nft_table_attributes {
156 NFTA_TABLE_UNSPEC,
157 NFTA_TABLE_NAME,
158 NFTA_TABLE_FLAGS,
159 NFTA_TABLE_USE,
160 __NFTA_TABLE_MAX
161 };
162 #define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1)
163
164 /**
165 * enum nft_chain_attributes - nf_tables chain netlink attributes
166 *
167 * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING)
168 * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64)
169 * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING)
170 * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes)
171 * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32)
172 * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32)
173 * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING)
174 * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes)
175 */
176 enum nft_chain_attributes {
177 NFTA_CHAIN_UNSPEC,
178 NFTA_CHAIN_TABLE,
179 NFTA_CHAIN_HANDLE,
180 NFTA_CHAIN_NAME,
181 NFTA_CHAIN_HOOK,
182 NFTA_CHAIN_POLICY,
183 NFTA_CHAIN_USE,
184 NFTA_CHAIN_TYPE,
185 NFTA_CHAIN_COUNTERS,
186 NFTA_CHAIN_PAD,
187 __NFTA_CHAIN_MAX
188 };
189 #define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1)
190
191 /**
192 * enum nft_rule_attributes - nf_tables rule netlink attributes
193 *
194 * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING)
195 * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING)
196 * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64)
197 * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes)
198 * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes)
199 * @NFTA_RULE_POSITION: numeric handle of the previous rule (NLA_U64)
200 * @NFTA_RULE_USERDATA: user data (NLA_BINARY, NFT_USERDATA_MAXLEN)
201 */
202 enum nft_rule_attributes {
203 NFTA_RULE_UNSPEC,
204 NFTA_RULE_TABLE,
205 NFTA_RULE_CHAIN,
206 NFTA_RULE_HANDLE,
207 NFTA_RULE_EXPRESSIONS,
208 NFTA_RULE_COMPAT,
209 NFTA_RULE_POSITION,
210 NFTA_RULE_USERDATA,
211 NFTA_RULE_PAD,
212 __NFTA_RULE_MAX
213 };
214 #define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1)
215
216 /**
217 * enum nft_rule_compat_flags - nf_tables rule compat flags
218 *
219 * @NFT_RULE_COMPAT_F_INV: invert the check result
220 */
221 enum nft_rule_compat_flags {
222 NFT_RULE_COMPAT_F_INV = (1 << 1),
223 NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV,
224 };
225
226 /**
227 * enum nft_rule_compat_attributes - nf_tables rule compat attributes
228 *
229 * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32)
230 * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32)
231 */
232 enum nft_rule_compat_attributes {
233 NFTA_RULE_COMPAT_UNSPEC,
234 NFTA_RULE_COMPAT_PROTO,
235 NFTA_RULE_COMPAT_FLAGS,
236 __NFTA_RULE_COMPAT_MAX
237 };
238 #define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1)
239
240 /**
241 * enum nft_set_flags - nf_tables set flags
242 *
243 * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink
244 * @NFT_SET_CONSTANT: set contents may not change while bound
245 * @NFT_SET_INTERVAL: set contains intervals
246 * @NFT_SET_MAP: set is used as a dictionary
247 * @NFT_SET_TIMEOUT: set uses timeouts
248 * @NFT_SET_EVAL: set contains expressions for evaluation
249 */
250 enum nft_set_flags {
251 NFT_SET_ANONYMOUS = 0x1,
252 NFT_SET_CONSTANT = 0x2,
253 NFT_SET_INTERVAL = 0x4,
254 NFT_SET_MAP = 0x8,
255 NFT_SET_TIMEOUT = 0x10,
256 NFT_SET_EVAL = 0x20,
257 };
258
259 /**
260 * enum nft_set_policies - set selection policy
261 *
262 * @NFT_SET_POL_PERFORMANCE: prefer high performance over low memory use
263 * @NFT_SET_POL_MEMORY: prefer low memory use over high performance
264 */
265 enum nft_set_policies {
266 NFT_SET_POL_PERFORMANCE,
267 NFT_SET_POL_MEMORY,
268 };
269
270 /**
271 * enum nft_set_desc_attributes - set element description
272 *
273 * @NFTA_SET_DESC_SIZE: number of elements in set (NLA_U32)
274 */
275 enum nft_set_desc_attributes {
276 NFTA_SET_DESC_UNSPEC,
277 NFTA_SET_DESC_SIZE,
278 __NFTA_SET_DESC_MAX
279 };
280 #define NFTA_SET_DESC_MAX (__NFTA_SET_DESC_MAX - 1)
281
282 /**
283 * enum nft_set_attributes - nf_tables set netlink attributes
284 *
285 * @NFTA_SET_TABLE: table name (NLA_STRING)
286 * @NFTA_SET_NAME: set name (NLA_STRING)
287 * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32)
288 * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32)
289 * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
290 * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
291 * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
292 * @NFTA_SET_POLICY: selection policy (NLA_U32)
293 * @NFTA_SET_DESC: set description (NLA_NESTED)
294 * @NFTA_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
295 * @NFTA_SET_TIMEOUT: default timeout value (NLA_U64)
296 * @NFTA_SET_GC_INTERVAL: garbage collection interval (NLA_U32)
297 * @NFTA_SET_USERDATA: user data (NLA_BINARY)
298 */
299 enum nft_set_attributes {
300 NFTA_SET_UNSPEC,
301 NFTA_SET_TABLE,
302 NFTA_SET_NAME,
303 NFTA_SET_FLAGS,
304 NFTA_SET_KEY_TYPE,
305 NFTA_SET_KEY_LEN,
306 NFTA_SET_DATA_TYPE,
307 NFTA_SET_DATA_LEN,
308 NFTA_SET_POLICY,
309 NFTA_SET_DESC,
310 NFTA_SET_ID,
311 NFTA_SET_TIMEOUT,
312 NFTA_SET_GC_INTERVAL,
313 NFTA_SET_USERDATA,
314 NFTA_SET_PAD,
315 __NFTA_SET_MAX
316 };
317 #define NFTA_SET_MAX (__NFTA_SET_MAX - 1)
318
319 /**
320 * enum nft_set_elem_flags - nf_tables set element flags
321 *
322 * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval
323 */
324 enum nft_set_elem_flags {
325 NFT_SET_ELEM_INTERVAL_END = 0x1,
326 };
327
328 /**
329 * enum nft_set_elem_attributes - nf_tables set element netlink attributes
330 *
331 * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)
332 * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)
333 * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)
334 * @NFTA_SET_ELEM_TIMEOUT: timeout value (NLA_U64)
335 * @NFTA_SET_ELEM_EXPIRATION: expiration time (NLA_U64)
336 * @NFTA_SET_ELEM_USERDATA: user data (NLA_BINARY)
337 * @NFTA_SET_ELEM_EXPR: expression (NLA_NESTED: nft_expr_attributes)
338 */
339 enum nft_set_elem_attributes {
340 NFTA_SET_ELEM_UNSPEC,
341 NFTA_SET_ELEM_KEY,
342 NFTA_SET_ELEM_DATA,
343 NFTA_SET_ELEM_FLAGS,
344 NFTA_SET_ELEM_TIMEOUT,
345 NFTA_SET_ELEM_EXPIRATION,
346 NFTA_SET_ELEM_USERDATA,
347 NFTA_SET_ELEM_EXPR,
348 NFTA_SET_ELEM_PAD,
349 __NFTA_SET_ELEM_MAX
350 };
351 #define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1)
352
353 /**
354 * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes
355 *
356 * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING)
357 * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING)
358 * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes)
359 * @NFTA_SET_ELEM_LIST_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
360 */
361 enum nft_set_elem_list_attributes {
362 NFTA_SET_ELEM_LIST_UNSPEC,
363 NFTA_SET_ELEM_LIST_TABLE,
364 NFTA_SET_ELEM_LIST_SET,
365 NFTA_SET_ELEM_LIST_ELEMENTS,
366 NFTA_SET_ELEM_LIST_SET_ID,
367 __NFTA_SET_ELEM_LIST_MAX
368 };
369 #define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1)
370
371 /**
372 * enum nft_data_types - nf_tables data types
373 *
374 * @NFT_DATA_VALUE: generic data
375 * @NFT_DATA_VERDICT: netfilter verdict
376 *
377 * The type of data is usually determined by the kernel directly and is not
378 * explicitly specified by userspace. The only difference are sets, where
379 * userspace specifies the key and mapping data types.
380 *
381 * The values 0xffffff00-0xffffffff are reserved for internally used types.
382 * The remaining range can be freely used by userspace to encode types, all
383 * values are equivalent to NFT_DATA_VALUE.
384 */
385 enum nft_data_types {
386 NFT_DATA_VALUE,
387 NFT_DATA_VERDICT = 0xffffff00U,
388 };
389
390 #define NFT_DATA_RESERVED_MASK 0xffffff00U
391
392 /**
393 * enum nft_data_attributes - nf_tables data netlink attributes
394 *
395 * @NFTA_DATA_VALUE: generic data (NLA_BINARY)
396 * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes)
397 */
398 enum nft_data_attributes {
399 NFTA_DATA_UNSPEC,
400 NFTA_DATA_VALUE,
401 NFTA_DATA_VERDICT,
402 __NFTA_DATA_MAX
403 };
404 #define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1)
405
406 /* Maximum length of a value */
407 #define NFT_DATA_VALUE_MAXLEN 64
408
409 /**
410 * enum nft_verdict_attributes - nf_tables verdict netlink attributes
411 *
412 * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts)
413 * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING)
414 */
415 enum nft_verdict_attributes {
416 NFTA_VERDICT_UNSPEC,
417 NFTA_VERDICT_CODE,
418 NFTA_VERDICT_CHAIN,
419 __NFTA_VERDICT_MAX
420 };
421 #define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1)
422
423 /**
424 * enum nft_expr_attributes - nf_tables expression netlink attributes
425 *
426 * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING)
427 * @NFTA_EXPR_DATA: type specific data (NLA_NESTED)
428 */
429 enum nft_expr_attributes {
430 NFTA_EXPR_UNSPEC,
431 NFTA_EXPR_NAME,
432 NFTA_EXPR_DATA,
433 __NFTA_EXPR_MAX
434 };
435 #define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1)
436
437 /**
438 * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes
439 *
440 * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32)
441 * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes)
442 */
443 enum nft_immediate_attributes {
444 NFTA_IMMEDIATE_UNSPEC,
445 NFTA_IMMEDIATE_DREG,
446 NFTA_IMMEDIATE_DATA,
447 __NFTA_IMMEDIATE_MAX
448 };
449 #define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1)
450
451 /**
452 * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes
453 *
454 * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers)
455 * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers)
456 * @NFTA_BITWISE_LEN: length of operands (NLA_U32)
457 * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes)
458 * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes)
459 *
460 * The bitwise expression performs the following operation:
461 *
462 * dreg = (sreg & mask) ^ xor
463 *
464 * which allow to express all bitwise operations:
465 *
466 * mask xor
467 * NOT: 1 1
468 * OR: 0 x
469 * XOR: 1 x
470 * AND: x 0
471 */
472 enum nft_bitwise_attributes {
473 NFTA_BITWISE_UNSPEC,
474 NFTA_BITWISE_SREG,
475 NFTA_BITWISE_DREG,
476 NFTA_BITWISE_LEN,
477 NFTA_BITWISE_MASK,
478 NFTA_BITWISE_XOR,
479 __NFTA_BITWISE_MAX
480 };
481 #define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1)
482
483 /**
484 * enum nft_byteorder_ops - nf_tables byteorder operators
485 *
486 * @NFT_BYTEORDER_NTOH: network to host operator
487 * @NFT_BYTEORDER_HTON: host to network opertaor
488 */
489 enum nft_byteorder_ops {
490 NFT_BYTEORDER_NTOH,
491 NFT_BYTEORDER_HTON,
492 };
493
494 /**
495 * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes
496 *
497 * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers)
498 * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers)
499 * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops)
500 * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32)
501 * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4)
502 */
503 enum nft_byteorder_attributes {
504 NFTA_BYTEORDER_UNSPEC,
505 NFTA_BYTEORDER_SREG,
506 NFTA_BYTEORDER_DREG,
507 NFTA_BYTEORDER_OP,
508 NFTA_BYTEORDER_LEN,
509 NFTA_BYTEORDER_SIZE,
510 __NFTA_BYTEORDER_MAX
511 };
512 #define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1)
513
514 /**
515 * enum nft_cmp_ops - nf_tables relational operator
516 *
517 * @NFT_CMP_EQ: equal
518 * @NFT_CMP_NEQ: not equal
519 * @NFT_CMP_LT: less than
520 * @NFT_CMP_LTE: less than or equal to
521 * @NFT_CMP_GT: greater than
522 * @NFT_CMP_GTE: greater than or equal to
523 */
524 enum nft_cmp_ops {
525 NFT_CMP_EQ,
526 NFT_CMP_NEQ,
527 NFT_CMP_LT,
528 NFT_CMP_LTE,
529 NFT_CMP_GT,
530 NFT_CMP_GTE,
531 };
532
533 /**
534 * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes
535 *
536 * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers)
537 * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops)
538 * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes)
539 */
540 enum nft_cmp_attributes {
541 NFTA_CMP_UNSPEC,
542 NFTA_CMP_SREG,
543 NFTA_CMP_OP,
544 NFTA_CMP_DATA,
545 __NFTA_CMP_MAX
546 };
547 #define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1)
548
549 /**
550 * enum nft_range_ops - nf_tables range operator
551 *
552 * @NFT_RANGE_EQ: equal
553 * @NFT_RANGE_NEQ: not equal
554 */
555 enum nft_range_ops {
556 NFT_RANGE_EQ,
557 NFT_RANGE_NEQ,
558 };
559
560 /**
561 * enum nft_range_attributes - nf_tables range expression netlink attributes
562 *
563 * @NFTA_RANGE_SREG: source register of data to compare (NLA_U32: nft_registers)
564 * @NFTA_RANGE_OP: cmp operation (NLA_U32: nft_cmp_ops)
565 * @NFTA_RANGE_FROM_DATA: data range from (NLA_NESTED: nft_data_attributes)
566 * @NFTA_RANGE_TO_DATA: data range to (NLA_NESTED: nft_data_attributes)
567 */
568 enum nft_range_attributes {
569 NFTA_RANGE_UNSPEC,
570 NFTA_RANGE_SREG,
571 NFTA_RANGE_OP,
572 NFTA_RANGE_FROM_DATA,
573 NFTA_RANGE_TO_DATA,
574 __NFTA_RANGE_MAX
575 };
576 #define NFTA_RANGE_MAX (__NFTA_RANGE_MAX - 1)
577
578 enum nft_lookup_flags {
579 NFT_LOOKUP_F_INV = (1 << 0),
580 };
581
582 /**
583 * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes
584 *
585 * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING)
586 * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers)
587 * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers)
588 * @NFTA_LOOKUP_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
589 * @NFTA_LOOKUP_FLAGS: flags (NLA_U32: enum nft_lookup_flags)
590 */
591 enum nft_lookup_attributes {
592 NFTA_LOOKUP_UNSPEC,
593 NFTA_LOOKUP_SET,
594 NFTA_LOOKUP_SREG,
595 NFTA_LOOKUP_DREG,
596 NFTA_LOOKUP_SET_ID,
597 NFTA_LOOKUP_FLAGS,
598 __NFTA_LOOKUP_MAX
599 };
600 #define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1)
601
602 enum nft_dynset_ops {
603 NFT_DYNSET_OP_ADD,
604 NFT_DYNSET_OP_UPDATE,
605 };
606
607 enum nft_dynset_flags {
608 NFT_DYNSET_F_INV = (1 << 0),
609 };
610
611 /**
612 * enum nft_dynset_attributes - dynset expression attributes
613 *
614 * @NFTA_DYNSET_SET_NAME: name of set the to add data to (NLA_STRING)
615 * @NFTA_DYNSET_SET_ID: uniquely identifier of the set in the transaction (NLA_U32)
616 * @NFTA_DYNSET_OP: operation (NLA_U32)
617 * @NFTA_DYNSET_SREG_KEY: source register of the key (NLA_U32)
618 * @NFTA_DYNSET_SREG_DATA: source register of the data (NLA_U32)
619 * @NFTA_DYNSET_TIMEOUT: timeout value for the new element (NLA_U64)
620 * @NFTA_DYNSET_EXPR: expression (NLA_NESTED: nft_expr_attributes)
621 * @NFTA_DYNSET_FLAGS: flags (NLA_U32)
622 */
623 enum nft_dynset_attributes {
624 NFTA_DYNSET_UNSPEC,
625 NFTA_DYNSET_SET_NAME,
626 NFTA_DYNSET_SET_ID,
627 NFTA_DYNSET_OP,
628 NFTA_DYNSET_SREG_KEY,
629 NFTA_DYNSET_SREG_DATA,
630 NFTA_DYNSET_TIMEOUT,
631 NFTA_DYNSET_EXPR,
632 NFTA_DYNSET_PAD,
633 NFTA_DYNSET_FLAGS,
634 __NFTA_DYNSET_MAX,
635 };
636 #define NFTA_DYNSET_MAX (__NFTA_DYNSET_MAX - 1)
637
638 /**
639 * enum nft_payload_bases - nf_tables payload expression offset bases
640 *
641 * @NFT_PAYLOAD_LL_HEADER: link layer header
642 * @NFT_PAYLOAD_NETWORK_HEADER: network header
643 * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header
644 */
645 enum nft_payload_bases {
646 NFT_PAYLOAD_LL_HEADER,
647 NFT_PAYLOAD_NETWORK_HEADER,
648 NFT_PAYLOAD_TRANSPORT_HEADER,
649 };
650
651 /**
652 * enum nft_payload_csum_types - nf_tables payload expression checksum types
653 *
654 * @NFT_PAYLOAD_CSUM_NONE: no checksumming
655 * @NFT_PAYLOAD_CSUM_INET: internet checksum (RFC 791)
656 */
657 enum nft_payload_csum_types {
658 NFT_PAYLOAD_CSUM_NONE,
659 NFT_PAYLOAD_CSUM_INET,
660 };
661
662 /**
663 * enum nft_payload_attributes - nf_tables payload expression netlink attributes
664 *
665 * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers)
666 * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases)
667 * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32)
668 * @NFTA_PAYLOAD_LEN: payload length (NLA_U32)
669 * @NFTA_PAYLOAD_SREG: source register to load data from (NLA_U32: nft_registers)
670 * @NFTA_PAYLOAD_CSUM_TYPE: checksum type (NLA_U32)
671 * @NFTA_PAYLOAD_CSUM_OFFSET: checksum offset relative to base (NLA_U32)
672 */
673 enum nft_payload_attributes {
674 NFTA_PAYLOAD_UNSPEC,
675 NFTA_PAYLOAD_DREG,
676 NFTA_PAYLOAD_BASE,
677 NFTA_PAYLOAD_OFFSET,
678 NFTA_PAYLOAD_LEN,
679 NFTA_PAYLOAD_SREG,
680 NFTA_PAYLOAD_CSUM_TYPE,
681 NFTA_PAYLOAD_CSUM_OFFSET,
682 __NFTA_PAYLOAD_MAX
683 };
684 #define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1)
685
686 /**
687 * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes
688 *
689 * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers)
690 * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8)
691 * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32)
692 * @NFTA_EXTHDR_LEN: extension header length (NLA_U32)
693 */
694 enum nft_exthdr_attributes {
695 NFTA_EXTHDR_UNSPEC,
696 NFTA_EXTHDR_DREG,
697 NFTA_EXTHDR_TYPE,
698 NFTA_EXTHDR_OFFSET,
699 NFTA_EXTHDR_LEN,
700 __NFTA_EXTHDR_MAX
701 };
702 #define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1)
703
704 /**
705 * enum nft_meta_keys - nf_tables meta expression keys
706 *
707 * @NFT_META_LEN: packet length (skb->len)
708 * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT
709 * @NFT_META_PRIORITY: packet priority (skb->priority)
710 * @NFT_META_MARK: packet mark (skb->mark)
711 * @NFT_META_IIF: packet input interface index (dev->ifindex)
712 * @NFT_META_OIF: packet output interface index (dev->ifindex)
713 * @NFT_META_IIFNAME: packet input interface name (dev->name)
714 * @NFT_META_OIFNAME: packet output interface name (dev->name)
715 * @NFT_META_IIFTYPE: packet input interface type (dev->type)
716 * @NFT_META_OIFTYPE: packet output interface type (dev->type)
717 * @NFT_META_SKUID: originating socket UID (fsuid)
718 * @NFT_META_SKGID: originating socket GID (fsgid)
719 * @NFT_META_NFTRACE: packet nftrace bit
720 * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid)
721 * @NFT_META_SECMARK: packet secmark (skb->secmark)
722 * @NFT_META_NFPROTO: netfilter protocol
723 * @NFT_META_L4PROTO: layer 4 protocol number
724 * @NFT_META_BRI_IIFNAME: packet input bridge interface name
725 * @NFT_META_BRI_OIFNAME: packet output bridge interface name
726 * @NFT_META_PKTTYPE: packet type (skb->pkt_type), special handling for loopback
727 * @NFT_META_CPU: cpu id through smp_processor_id()
728 * @NFT_META_IIFGROUP: packet input interface group
729 * @NFT_META_OIFGROUP: packet output interface group
730 * @NFT_META_CGROUP: socket control group (skb->sk->sk_classid)
731 * @NFT_META_PRANDOM: a 32bit pseudo-random number
732 */
733 enum nft_meta_keys {
734 NFT_META_LEN,
735 NFT_META_PROTOCOL,
736 NFT_META_PRIORITY,
737 NFT_META_MARK,
738 NFT_META_IIF,
739 NFT_META_OIF,
740 NFT_META_IIFNAME,
741 NFT_META_OIFNAME,
742 NFT_META_IIFTYPE,
743 NFT_META_OIFTYPE,
744 NFT_META_SKUID,
745 NFT_META_SKGID,
746 NFT_META_NFTRACE,
747 NFT_META_RTCLASSID,
748 NFT_META_SECMARK,
749 NFT_META_NFPROTO,
750 NFT_META_L4PROTO,
751 NFT_META_BRI_IIFNAME,
752 NFT_META_BRI_OIFNAME,
753 NFT_META_PKTTYPE,
754 NFT_META_CPU,
755 NFT_META_IIFGROUP,
756 NFT_META_OIFGROUP,
757 NFT_META_CGROUP,
758 NFT_META_PRANDOM,
759 };
760
761 /**
762 * enum nft_rt_keys - nf_tables routing expression keys
763 *
764 * @NFT_RT_CLASSID: realm value of packet's route (skb->dst->tclassid)
765 * @NFT_RT_NEXTHOP4: routing nexthop for IPv4
766 * @NFT_RT_NEXTHOP6: routing nexthop for IPv6
767 */
768 enum nft_rt_keys {
769 NFT_RT_CLASSID,
770 NFT_RT_NEXTHOP4,
771 NFT_RT_NEXTHOP6,
772 };
773
774 /**
775 * enum nft_hash_attributes - nf_tables hash expression netlink attributes
776 *
777 * @NFTA_HASH_SREG: source register (NLA_U32)
778 * @NFTA_HASH_DREG: destination register (NLA_U32)
779 * @NFTA_HASH_LEN: source data length (NLA_U32)
780 * @NFTA_HASH_MODULUS: modulus value (NLA_U32)
781 * @NFTA_HASH_SEED: seed value (NLA_U32)
782 * @NFTA_HASH_OFFSET: add this offset value to hash result (NLA_U32)
783 */
784 enum nft_hash_attributes {
785 NFTA_HASH_UNSPEC,
786 NFTA_HASH_SREG,
787 NFTA_HASH_DREG,
788 NFTA_HASH_LEN,
789 NFTA_HASH_MODULUS,
790 NFTA_HASH_SEED,
791 NFTA_HASH_OFFSET,
792 __NFTA_HASH_MAX,
793 };
794 #define NFTA_HASH_MAX (__NFTA_HASH_MAX - 1)
795
796 /**
797 * enum nft_meta_attributes - nf_tables meta expression netlink attributes
798 *
799 * @NFTA_META_DREG: destination register (NLA_U32)
800 * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys)
801 * @NFTA_META_SREG: source register (NLA_U32)
802 */
803 enum nft_meta_attributes {
804 NFTA_META_UNSPEC,
805 NFTA_META_DREG,
806 NFTA_META_KEY,
807 NFTA_META_SREG,
808 __NFTA_META_MAX
809 };
810 #define NFTA_META_MAX (__NFTA_META_MAX - 1)
811
812 /**
813 * enum nft_rt_attributes - nf_tables routing expression netlink attributes
814 *
815 * @NFTA_RT_DREG: destination register (NLA_U32)
816 * @NFTA_RT_KEY: routing data item to load (NLA_U32: nft_rt_keys)
817 */
818 enum nft_rt_attributes {
819 NFTA_RT_UNSPEC,
820 NFTA_RT_DREG,
821 NFTA_RT_KEY,
822 __NFTA_RT_MAX
823 };
824 #define NFTA_RT_MAX (__NFTA_RT_MAX - 1)
825
826 /**
827 * enum nft_ct_keys - nf_tables ct expression keys
828 *
829 * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info)
830 * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir)
831 * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status)
832 * @NFT_CT_MARK: conntrack mark value
833 * @NFT_CT_SECMARK: conntrack secmark value
834 * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms
835 * @NFT_CT_HELPER: connection tracking helper assigned to conntrack
836 * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol
837 * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address)
838 * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address)
839 * @NFT_CT_PROTOCOL: conntrack layer 4 protocol
840 * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source
841 * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination
842 */
843 enum nft_ct_keys {
844 NFT_CT_STATE,
845 NFT_CT_DIRECTION,
846 NFT_CT_STATUS,
847 NFT_CT_MARK,
848 NFT_CT_SECMARK,
849 NFT_CT_EXPIRATION,
850 NFT_CT_HELPER,
851 NFT_CT_L3PROTOCOL,
852 NFT_CT_SRC,
853 NFT_CT_DST,
854 NFT_CT_PROTOCOL,
855 NFT_CT_PROTO_SRC,
856 NFT_CT_PROTO_DST,
857 NFT_CT_LABELS,
858 NFT_CT_PKTS,
859 NFT_CT_BYTES,
860 };
861
862 /**
863 * enum nft_ct_attributes - nf_tables ct expression netlink attributes
864 *
865 * @NFTA_CT_DREG: destination register (NLA_U32)
866 * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys)
867 * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8)
868 * @NFTA_CT_SREG: source register (NLA_U32)
869 */
870 enum nft_ct_attributes {
871 NFTA_CT_UNSPEC,
872 NFTA_CT_DREG,
873 NFTA_CT_KEY,
874 NFTA_CT_DIRECTION,
875 NFTA_CT_SREG,
876 __NFTA_CT_MAX
877 };
878 #define NFTA_CT_MAX (__NFTA_CT_MAX - 1)
879
880 enum nft_limit_type {
881 NFT_LIMIT_PKTS,
882 NFT_LIMIT_PKT_BYTES
883 };
884
885 enum nft_limit_flags {
886 NFT_LIMIT_F_INV = (1 << 0),
887 };
888
889 /**
890 * enum nft_limit_attributes - nf_tables limit expression netlink attributes
891 *
892 * @NFTA_LIMIT_RATE: refill rate (NLA_U64)
893 * @NFTA_LIMIT_UNIT: refill unit (NLA_U64)
894 * @NFTA_LIMIT_BURST: burst (NLA_U32)
895 * @NFTA_LIMIT_TYPE: type of limit (NLA_U32: enum nft_limit_type)
896 * @NFTA_LIMIT_FLAGS: flags (NLA_U32: enum nft_limit_flags)
897 */
898 enum nft_limit_attributes {
899 NFTA_LIMIT_UNSPEC,
900 NFTA_LIMIT_RATE,
901 NFTA_LIMIT_UNIT,
902 NFTA_LIMIT_BURST,
903 NFTA_LIMIT_TYPE,
904 NFTA_LIMIT_FLAGS,
905 NFTA_LIMIT_PAD,
906 __NFTA_LIMIT_MAX
907 };
908 #define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1)
909
910 /**
911 * enum nft_counter_attributes - nf_tables counter expression netlink attributes
912 *
913 * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64)
914 * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64)
915 */
916 enum nft_counter_attributes {
917 NFTA_COUNTER_UNSPEC,
918 NFTA_COUNTER_BYTES,
919 NFTA_COUNTER_PACKETS,
920 NFTA_COUNTER_PAD,
921 __NFTA_COUNTER_MAX
922 };
923 #define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1)
924
925 /**
926 * enum nft_log_attributes - nf_tables log expression netlink attributes
927 *
928 * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32)
929 * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING)
930 * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32)
931 * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32)
932 * @NFTA_LOG_LEVEL: log level (NLA_U32)
933 * @NFTA_LOG_FLAGS: logging flags (NLA_U32)
934 */
935 enum nft_log_attributes {
936 NFTA_LOG_UNSPEC,
937 NFTA_LOG_GROUP,
938 NFTA_LOG_PREFIX,
939 NFTA_LOG_SNAPLEN,
940 NFTA_LOG_QTHRESHOLD,
941 NFTA_LOG_LEVEL,
942 NFTA_LOG_FLAGS,
943 __NFTA_LOG_MAX
944 };
945 #define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1)
946
947 /**
948 * enum nft_queue_attributes - nf_tables queue expression netlink attributes
949 *
950 * @NFTA_QUEUE_NUM: netlink queue to send messages to (NLA_U16)
951 * @NFTA_QUEUE_TOTAL: number of queues to load balance packets on (NLA_U16)
952 * @NFTA_QUEUE_FLAGS: various flags (NLA_U16)
953 * @NFTA_QUEUE_SREG_QNUM: source register of queue number (NLA_U32: nft_registers)
954 */
955 enum nft_queue_attributes {
956 NFTA_QUEUE_UNSPEC,
957 NFTA_QUEUE_NUM,
958 NFTA_QUEUE_TOTAL,
959 NFTA_QUEUE_FLAGS,
960 NFTA_QUEUE_SREG_QNUM,
961 __NFTA_QUEUE_MAX
962 };
963 #define NFTA_QUEUE_MAX (__NFTA_QUEUE_MAX - 1)
964
965 #define NFT_QUEUE_FLAG_BYPASS 0x01 /* for compatibility with v2 */
966 #define NFT_QUEUE_FLAG_CPU_FANOUT 0x02 /* use current CPU (no hashing) */
967 #define NFT_QUEUE_FLAG_MASK 0x03
968
969 enum nft_quota_flags {
970 NFT_QUOTA_F_INV = (1 << 0),
971 };
972
973 /**
974 * enum nft_quota_attributes - nf_tables quota expression netlink attributes
975 *
976 * @NFTA_QUOTA_BYTES: quota in bytes (NLA_U16)
977 * @NFTA_QUOTA_FLAGS: flags (NLA_U32)
978 */
979 enum nft_quota_attributes {
980 NFTA_QUOTA_UNSPEC,
981 NFTA_QUOTA_BYTES,
982 NFTA_QUOTA_FLAGS,
983 NFTA_QUOTA_PAD,
984 __NFTA_QUOTA_MAX
985 };
986 #define NFTA_QUOTA_MAX (__NFTA_QUOTA_MAX - 1)
987
988 /**
989 * enum nft_reject_types - nf_tables reject expression reject types
990 *
991 * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable
992 * @NFT_REJECT_TCP_RST: reject using TCP RST
993 * @NFT_REJECT_ICMPX_UNREACH: abstracted ICMP unreachable for bridge and inet
994 */
995 enum nft_reject_types {
996 NFT_REJECT_ICMP_UNREACH,
997 NFT_REJECT_TCP_RST,
998 NFT_REJECT_ICMPX_UNREACH,
999 };
1000
1001 /**
1002 * enum nft_reject_code - Generic reject codes for IPv4/IPv6
1003 *
1004 * @NFT_REJECT_ICMPX_NO_ROUTE: no route to host / network unreachable
1005 * @NFT_REJECT_ICMPX_PORT_UNREACH: port unreachable
1006 * @NFT_REJECT_ICMPX_HOST_UNREACH: host unreachable
1007 * @NFT_REJECT_ICMPX_ADMIN_PROHIBITED: administratively prohibited
1008 *
1009 * These codes are mapped to real ICMP and ICMPv6 codes.
1010 */
1011 enum nft_reject_inet_code {
1012 NFT_REJECT_ICMPX_NO_ROUTE = 0,
1013 NFT_REJECT_ICMPX_PORT_UNREACH,
1014 NFT_REJECT_ICMPX_HOST_UNREACH,
1015 NFT_REJECT_ICMPX_ADMIN_PROHIBITED,
1016 __NFT_REJECT_ICMPX_MAX
1017 };
1018 #define NFT_REJECT_ICMPX_MAX (__NFT_REJECT_ICMPX_MAX - 1)
1019
1020 /**
1021 * enum nft_reject_attributes - nf_tables reject expression netlink attributes
1022 *
1023 * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types)
1024 * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8)
1025 */
1026 enum nft_reject_attributes {
1027 NFTA_REJECT_UNSPEC,
1028 NFTA_REJECT_TYPE,
1029 NFTA_REJECT_ICMP_CODE,
1030 __NFTA_REJECT_MAX
1031 };
1032 #define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1)
1033
1034 /**
1035 * enum nft_nat_types - nf_tables nat expression NAT types
1036 *
1037 * @NFT_NAT_SNAT: source NAT
1038 * @NFT_NAT_DNAT: destination NAT
1039 */
1040 enum nft_nat_types {
1041 NFT_NAT_SNAT,
1042 NFT_NAT_DNAT,
1043 };
1044
1045 /**
1046 * enum nft_nat_attributes - nf_tables nat expression netlink attributes
1047 *
1048 * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types)
1049 * @NFTA_NAT_FAMILY: NAT family (NLA_U32)
1050 * @NFTA_NAT_REG_ADDR_MIN: source register of address range start (NLA_U32: nft_registers)
1051 * @NFTA_NAT_REG_ADDR_MAX: source register of address range end (NLA_U32: nft_registers)
1052 * @NFTA_NAT_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
1053 * @NFTA_NAT_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
1054 * @NFTA_NAT_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
1055 */
1056 enum nft_nat_attributes {
1057 NFTA_NAT_UNSPEC,
1058 NFTA_NAT_TYPE,
1059 NFTA_NAT_FAMILY,
1060 NFTA_NAT_REG_ADDR_MIN,
1061 NFTA_NAT_REG_ADDR_MAX,
1062 NFTA_NAT_REG_PROTO_MIN,
1063 NFTA_NAT_REG_PROTO_MAX,
1064 NFTA_NAT_FLAGS,
1065 __NFTA_NAT_MAX
1066 };
1067 #define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1)
1068
1069 /**
1070 * enum nft_masq_attributes - nf_tables masquerade expression attributes
1071 *
1072 * @NFTA_MASQ_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
1073 * @NFTA_MASQ_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
1074 * @NFTA_MASQ_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
1075 */
1076 enum nft_masq_attributes {
1077 NFTA_MASQ_UNSPEC,
1078 NFTA_MASQ_FLAGS,
1079 NFTA_MASQ_REG_PROTO_MIN,
1080 NFTA_MASQ_REG_PROTO_MAX,
1081 __NFTA_MASQ_MAX
1082 };
1083 #define NFTA_MASQ_MAX (__NFTA_MASQ_MAX - 1)
1084
1085 /**
1086 * enum nft_redir_attributes - nf_tables redirect expression netlink attributes
1087 *
1088 * @NFTA_REDIR_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
1089 * @NFTA_REDIR_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
1090 * @NFTA_REDIR_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
1091 */
1092 enum nft_redir_attributes {
1093 NFTA_REDIR_UNSPEC,
1094 NFTA_REDIR_REG_PROTO_MIN,
1095 NFTA_REDIR_REG_PROTO_MAX,
1096 NFTA_REDIR_FLAGS,
1097 __NFTA_REDIR_MAX
1098 };
1099 #define NFTA_REDIR_MAX (__NFTA_REDIR_MAX - 1)
1100
1101 /**
1102 * enum nft_dup_attributes - nf_tables dup expression netlink attributes
1103 *
1104 * @NFTA_DUP_SREG_ADDR: source register of address (NLA_U32: nft_registers)
1105 * @NFTA_DUP_SREG_DEV: source register of output interface (NLA_U32: nft_register)
1106 */
1107 enum nft_dup_attributes {
1108 NFTA_DUP_UNSPEC,
1109 NFTA_DUP_SREG_ADDR,
1110 NFTA_DUP_SREG_DEV,
1111 __NFTA_DUP_MAX
1112 };
1113 #define NFTA_DUP_MAX (__NFTA_DUP_MAX - 1)
1114
1115 /**
1116 * enum nft_fwd_attributes - nf_tables fwd expression netlink attributes
1117 *
1118 * @NFTA_FWD_SREG_DEV: source register of output interface (NLA_U32: nft_register)
1119 */
1120 enum nft_fwd_attributes {
1121 NFTA_FWD_UNSPEC,
1122 NFTA_FWD_SREG_DEV,
1123 __NFTA_FWD_MAX
1124 };
1125 #define NFTA_FWD_MAX (__NFTA_FWD_MAX - 1)
1126
1127 /**
1128 * enum nft_gen_attributes - nf_tables ruleset generation attributes
1129 *
1130 * @NFTA_GEN_ID: Ruleset generation ID (NLA_U32)
1131 */
1132 enum nft_gen_attributes {
1133 NFTA_GEN_UNSPEC,
1134 NFTA_GEN_ID,
1135 __NFTA_GEN_MAX
1136 };
1137 #define NFTA_GEN_MAX (__NFTA_GEN_MAX - 1)
1138
1139 /*
1140 * enum nft_fib_attributes - nf_tables fib expression netlink attributes
1141 *
1142 * @NFTA_FIB_DREG: destination register (NLA_U32)
1143 * @NFTA_FIB_RESULT: desired result (NLA_U32)
1144 * @NFTA_FIB_FLAGS: flowi fields to initialize when querying the FIB (NLA_U32)
1145 *
1146 * The FIB expression performs a route lookup according
1147 * to the packet data.
1148 */
1149 enum nft_fib_attributes {
1150 NFTA_FIB_UNSPEC,
1151 NFTA_FIB_DREG,
1152 NFTA_FIB_RESULT,
1153 NFTA_FIB_FLAGS,
1154 __NFTA_FIB_MAX
1155 };
1156 #define NFTA_FIB_MAX (__NFTA_FIB_MAX - 1)
1157
1158 enum nft_fib_result {
1159 NFT_FIB_RESULT_UNSPEC,
1160 NFT_FIB_RESULT_OIF,
1161 NFT_FIB_RESULT_OIFNAME,
1162 NFT_FIB_RESULT_ADDRTYPE,
1163 __NFT_FIB_RESULT_MAX
1164 };
1165 #define NFT_FIB_RESULT_MAX (__NFT_FIB_RESULT_MAX - 1)
1166
1167 enum nft_fib_flags {
1168 NFTA_FIB_F_SADDR = 1 << 0, /* look up src */
1169 NFTA_FIB_F_DADDR = 1 << 1, /* look up dst */
1170 NFTA_FIB_F_MARK = 1 << 2, /* use skb->mark */
1171 NFTA_FIB_F_IIF = 1 << 3, /* restrict to iif */
1172 NFTA_FIB_F_OIF = 1 << 4, /* restrict to oif */
1173 };
1174
1175 /**
1176 * enum nft_trace_attributes - nf_tables trace netlink attributes
1177 *
1178 * @NFTA_TRACE_TABLE: name of the table (NLA_STRING)
1179 * @NFTA_TRACE_CHAIN: name of the chain (NLA_STRING)
1180 * @NFTA_TRACE_RULE_HANDLE: numeric handle of the rule (NLA_U64)
1181 * @NFTA_TRACE_TYPE: type of the event (NLA_U32: nft_trace_types)
1182 * @NFTA_TRACE_VERDICT: verdict returned by hook (NLA_NESTED: nft_verdicts)
1183 * @NFTA_TRACE_ID: pseudo-id, same for each skb traced (NLA_U32)
1184 * @NFTA_TRACE_LL_HEADER: linklayer header (NLA_BINARY)
1185 * @NFTA_TRACE_NETWORK_HEADER: network header (NLA_BINARY)
1186 * @NFTA_TRACE_TRANSPORT_HEADER: transport header (NLA_BINARY)
1187 * @NFTA_TRACE_IIF: indev ifindex (NLA_U32)
1188 * @NFTA_TRACE_IIFTYPE: netdev->type of indev (NLA_U16)
1189 * @NFTA_TRACE_OIF: outdev ifindex (NLA_U32)
1190 * @NFTA_TRACE_OIFTYPE: netdev->type of outdev (NLA_U16)
1191 * @NFTA_TRACE_MARK: nfmark (NLA_U32)
1192 * @NFTA_TRACE_NFPROTO: nf protocol processed (NLA_U32)
1193 * @NFTA_TRACE_POLICY: policy that decided fate of packet (NLA_U32)
1194 */
1195 enum nft_trace_attributes {
1196 NFTA_TRACE_UNSPEC,
1197 NFTA_TRACE_TABLE,
1198 NFTA_TRACE_CHAIN,
1199 NFTA_TRACE_RULE_HANDLE,
1200 NFTA_TRACE_TYPE,
1201 NFTA_TRACE_VERDICT,
1202 NFTA_TRACE_ID,
1203 NFTA_TRACE_LL_HEADER,
1204 NFTA_TRACE_NETWORK_HEADER,
1205 NFTA_TRACE_TRANSPORT_HEADER,
1206 NFTA_TRACE_IIF,
1207 NFTA_TRACE_IIFTYPE,
1208 NFTA_TRACE_OIF,
1209 NFTA_TRACE_OIFTYPE,
1210 NFTA_TRACE_MARK,
1211 NFTA_TRACE_NFPROTO,
1212 NFTA_TRACE_POLICY,
1213 NFTA_TRACE_PAD,
1214 __NFTA_TRACE_MAX
1215 };
1216 #define NFTA_TRACE_MAX (__NFTA_TRACE_MAX - 1)
1217
1218 enum nft_trace_types {
1219 NFT_TRACETYPE_UNSPEC,
1220 NFT_TRACETYPE_POLICY,
1221 NFT_TRACETYPE_RETURN,
1222 NFT_TRACETYPE_RULE,
1223 __NFT_TRACETYPE_MAX
1224 };
1225 #define NFT_TRACETYPE_MAX (__NFT_TRACETYPE_MAX - 1)
1226
1227 /**
1228 * enum nft_ng_attributes - nf_tables number generator expression netlink attributes
1229 *
1230 * @NFTA_NG_DREG: destination register (NLA_U32)
1231 * @NFTA_NG_MODULUS: maximum counter value (NLA_U32)
1232 * @NFTA_NG_TYPE: operation type (NLA_U32)
1233 * @NFTA_NG_OFFSET: offset to be added to the counter (NLA_U32)
1234 */
1235 enum nft_ng_attributes {
1236 NFTA_NG_UNSPEC,
1237 NFTA_NG_DREG,
1238 NFTA_NG_MODULUS,
1239 NFTA_NG_TYPE,
1240 NFTA_NG_OFFSET,
1241 __NFTA_NG_MAX
1242 };
1243 #define NFTA_NG_MAX (__NFTA_NG_MAX - 1)
1244
1245 enum nft_ng_types {
1246 NFT_NG_INCREMENTAL,
1247 NFT_NG_RANDOM,
1248 __NFT_NG_MAX
1249 };
1250 #define NFT_NG_MAX (__NFT_NG_MAX - 1)
1251
1252 #endif /* _LINUX_NF_TABLES_H */