]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - include/uapi/linux/netfilter/nf_tables.h
Merge remote-tracking branches 'asoc/topic/sgtl5000', 'asoc/topic/simple', 'asoc...
[mirror_ubuntu-bionic-kernel.git] / include / uapi / linux / netfilter / nf_tables.h
1 #ifndef _LINUX_NF_TABLES_H
2 #define _LINUX_NF_TABLES_H
3
4 #define NFT_TABLE_MAXNAMELEN 32
5 #define NFT_CHAIN_MAXNAMELEN 32
6 #define NFT_SET_MAXNAMELEN 32
7 #define NFT_USERDATA_MAXLEN 256
8
9 /**
10 * enum nft_registers - nf_tables registers
11 *
12 * nf_tables used to have five registers: a verdict register and four data
13 * registers of size 16. The data registers have been changed to 16 registers
14 * of size 4. For compatibility reasons, the NFT_REG_[1-4] registers still
15 * map to areas of size 16, the 4 byte registers are addressed using
16 * NFT_REG32_00 - NFT_REG32_15.
17 */
18 enum nft_registers {
19 NFT_REG_VERDICT,
20 NFT_REG_1,
21 NFT_REG_2,
22 NFT_REG_3,
23 NFT_REG_4,
24 __NFT_REG_MAX,
25
26 NFT_REG32_00 = 8,
27 NFT_REG32_01,
28 NFT_REG32_02,
29 NFT_REG32_03,
30 NFT_REG32_04,
31 NFT_REG32_05,
32 NFT_REG32_06,
33 NFT_REG32_07,
34 NFT_REG32_08,
35 NFT_REG32_09,
36 NFT_REG32_10,
37 NFT_REG32_11,
38 NFT_REG32_12,
39 NFT_REG32_13,
40 NFT_REG32_14,
41 NFT_REG32_15,
42 };
43 #define NFT_REG_MAX (__NFT_REG_MAX - 1)
44
45 #define NFT_REG_SIZE 16
46 #define NFT_REG32_SIZE 4
47
48 /**
49 * enum nft_verdicts - nf_tables internal verdicts
50 *
51 * @NFT_CONTINUE: continue evaluation of the current rule
52 * @NFT_BREAK: terminate evaluation of the current rule
53 * @NFT_JUMP: push the current chain on the jump stack and jump to a chain
54 * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack
55 * @NFT_RETURN: return to the topmost chain on the jump stack
56 *
57 * The nf_tables verdicts share their numeric space with the netfilter verdicts.
58 */
59 enum nft_verdicts {
60 NFT_CONTINUE = -1,
61 NFT_BREAK = -2,
62 NFT_JUMP = -3,
63 NFT_GOTO = -4,
64 NFT_RETURN = -5,
65 };
66
67 /**
68 * enum nf_tables_msg_types - nf_tables netlink message types
69 *
70 * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes)
71 * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes)
72 * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes)
73 * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes)
74 * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes)
75 * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes)
76 * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes)
77 * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes)
78 * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes)
79 * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes)
80 * @NFT_MSG_GETSET: get a set (enum nft_set_attributes)
81 * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes)
82 * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes)
83 * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes)
84 * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes)
85 * @NFT_MSG_NEWGEN: announce a new generation, only for events (enum nft_gen_attributes)
86 * @NFT_MSG_GETGEN: get the rule-set generation (enum nft_gen_attributes)
87 * @NFT_MSG_TRACE: trace event (enum nft_trace_attributes)
88 */
89 enum nf_tables_msg_types {
90 NFT_MSG_NEWTABLE,
91 NFT_MSG_GETTABLE,
92 NFT_MSG_DELTABLE,
93 NFT_MSG_NEWCHAIN,
94 NFT_MSG_GETCHAIN,
95 NFT_MSG_DELCHAIN,
96 NFT_MSG_NEWRULE,
97 NFT_MSG_GETRULE,
98 NFT_MSG_DELRULE,
99 NFT_MSG_NEWSET,
100 NFT_MSG_GETSET,
101 NFT_MSG_DELSET,
102 NFT_MSG_NEWSETELEM,
103 NFT_MSG_GETSETELEM,
104 NFT_MSG_DELSETELEM,
105 NFT_MSG_NEWGEN,
106 NFT_MSG_GETGEN,
107 NFT_MSG_TRACE,
108 NFT_MSG_MAX,
109 };
110
111 /**
112 * enum nft_list_attributes - nf_tables generic list netlink attributes
113 *
114 * @NFTA_LIST_ELEM: list element (NLA_NESTED)
115 */
116 enum nft_list_attributes {
117 NFTA_LIST_UNPEC,
118 NFTA_LIST_ELEM,
119 __NFTA_LIST_MAX
120 };
121 #define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1)
122
123 /**
124 * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes
125 *
126 * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32)
127 * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32)
128 * @NFTA_HOOK_DEV: netdevice name (NLA_STRING)
129 */
130 enum nft_hook_attributes {
131 NFTA_HOOK_UNSPEC,
132 NFTA_HOOK_HOOKNUM,
133 NFTA_HOOK_PRIORITY,
134 NFTA_HOOK_DEV,
135 __NFTA_HOOK_MAX
136 };
137 #define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1)
138
139 /**
140 * enum nft_table_flags - nf_tables table flags
141 *
142 * @NFT_TABLE_F_DORMANT: this table is not active
143 */
144 enum nft_table_flags {
145 NFT_TABLE_F_DORMANT = 0x1,
146 };
147
148 /**
149 * enum nft_table_attributes - nf_tables table netlink attributes
150 *
151 * @NFTA_TABLE_NAME: name of the table (NLA_STRING)
152 * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32)
153 * @NFTA_TABLE_USE: number of chains in this table (NLA_U32)
154 */
155 enum nft_table_attributes {
156 NFTA_TABLE_UNSPEC,
157 NFTA_TABLE_NAME,
158 NFTA_TABLE_FLAGS,
159 NFTA_TABLE_USE,
160 __NFTA_TABLE_MAX
161 };
162 #define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1)
163
164 /**
165 * enum nft_chain_attributes - nf_tables chain netlink attributes
166 *
167 * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING)
168 * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64)
169 * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING)
170 * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes)
171 * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32)
172 * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32)
173 * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING)
174 * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes)
175 */
176 enum nft_chain_attributes {
177 NFTA_CHAIN_UNSPEC,
178 NFTA_CHAIN_TABLE,
179 NFTA_CHAIN_HANDLE,
180 NFTA_CHAIN_NAME,
181 NFTA_CHAIN_HOOK,
182 NFTA_CHAIN_POLICY,
183 NFTA_CHAIN_USE,
184 NFTA_CHAIN_TYPE,
185 NFTA_CHAIN_COUNTERS,
186 NFTA_CHAIN_PAD,
187 __NFTA_CHAIN_MAX
188 };
189 #define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1)
190
191 /**
192 * enum nft_rule_attributes - nf_tables rule netlink attributes
193 *
194 * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING)
195 * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING)
196 * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64)
197 * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes)
198 * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes)
199 * @NFTA_RULE_POSITION: numeric handle of the previous rule (NLA_U64)
200 * @NFTA_RULE_USERDATA: user data (NLA_BINARY, NFT_USERDATA_MAXLEN)
201 */
202 enum nft_rule_attributes {
203 NFTA_RULE_UNSPEC,
204 NFTA_RULE_TABLE,
205 NFTA_RULE_CHAIN,
206 NFTA_RULE_HANDLE,
207 NFTA_RULE_EXPRESSIONS,
208 NFTA_RULE_COMPAT,
209 NFTA_RULE_POSITION,
210 NFTA_RULE_USERDATA,
211 NFTA_RULE_PAD,
212 __NFTA_RULE_MAX
213 };
214 #define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1)
215
216 /**
217 * enum nft_rule_compat_flags - nf_tables rule compat flags
218 *
219 * @NFT_RULE_COMPAT_F_INV: invert the check result
220 */
221 enum nft_rule_compat_flags {
222 NFT_RULE_COMPAT_F_INV = (1 << 1),
223 NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV,
224 };
225
226 /**
227 * enum nft_rule_compat_attributes - nf_tables rule compat attributes
228 *
229 * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32)
230 * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32)
231 */
232 enum nft_rule_compat_attributes {
233 NFTA_RULE_COMPAT_UNSPEC,
234 NFTA_RULE_COMPAT_PROTO,
235 NFTA_RULE_COMPAT_FLAGS,
236 __NFTA_RULE_COMPAT_MAX
237 };
238 #define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1)
239
240 /**
241 * enum nft_set_flags - nf_tables set flags
242 *
243 * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink
244 * @NFT_SET_CONSTANT: set contents may not change while bound
245 * @NFT_SET_INTERVAL: set contains intervals
246 * @NFT_SET_MAP: set is used as a dictionary
247 * @NFT_SET_TIMEOUT: set uses timeouts
248 * @NFT_SET_EVAL: set contains expressions for evaluation
249 */
250 enum nft_set_flags {
251 NFT_SET_ANONYMOUS = 0x1,
252 NFT_SET_CONSTANT = 0x2,
253 NFT_SET_INTERVAL = 0x4,
254 NFT_SET_MAP = 0x8,
255 NFT_SET_TIMEOUT = 0x10,
256 NFT_SET_EVAL = 0x20,
257 };
258
259 /**
260 * enum nft_set_policies - set selection policy
261 *
262 * @NFT_SET_POL_PERFORMANCE: prefer high performance over low memory use
263 * @NFT_SET_POL_MEMORY: prefer low memory use over high performance
264 */
265 enum nft_set_policies {
266 NFT_SET_POL_PERFORMANCE,
267 NFT_SET_POL_MEMORY,
268 };
269
270 /**
271 * enum nft_set_desc_attributes - set element description
272 *
273 * @NFTA_SET_DESC_SIZE: number of elements in set (NLA_U32)
274 */
275 enum nft_set_desc_attributes {
276 NFTA_SET_DESC_UNSPEC,
277 NFTA_SET_DESC_SIZE,
278 __NFTA_SET_DESC_MAX
279 };
280 #define NFTA_SET_DESC_MAX (__NFTA_SET_DESC_MAX - 1)
281
282 /**
283 * enum nft_set_attributes - nf_tables set netlink attributes
284 *
285 * @NFTA_SET_TABLE: table name (NLA_STRING)
286 * @NFTA_SET_NAME: set name (NLA_STRING)
287 * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32)
288 * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32)
289 * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
290 * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
291 * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
292 * @NFTA_SET_POLICY: selection policy (NLA_U32)
293 * @NFTA_SET_DESC: set description (NLA_NESTED)
294 * @NFTA_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
295 * @NFTA_SET_TIMEOUT: default timeout value (NLA_U64)
296 * @NFTA_SET_GC_INTERVAL: garbage collection interval (NLA_U32)
297 * @NFTA_SET_USERDATA: user data (NLA_BINARY)
298 */
299 enum nft_set_attributes {
300 NFTA_SET_UNSPEC,
301 NFTA_SET_TABLE,
302 NFTA_SET_NAME,
303 NFTA_SET_FLAGS,
304 NFTA_SET_KEY_TYPE,
305 NFTA_SET_KEY_LEN,
306 NFTA_SET_DATA_TYPE,
307 NFTA_SET_DATA_LEN,
308 NFTA_SET_POLICY,
309 NFTA_SET_DESC,
310 NFTA_SET_ID,
311 NFTA_SET_TIMEOUT,
312 NFTA_SET_GC_INTERVAL,
313 NFTA_SET_USERDATA,
314 NFTA_SET_PAD,
315 __NFTA_SET_MAX
316 };
317 #define NFTA_SET_MAX (__NFTA_SET_MAX - 1)
318
319 /**
320 * enum nft_set_elem_flags - nf_tables set element flags
321 *
322 * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval
323 */
324 enum nft_set_elem_flags {
325 NFT_SET_ELEM_INTERVAL_END = 0x1,
326 };
327
328 /**
329 * enum nft_set_elem_attributes - nf_tables set element netlink attributes
330 *
331 * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)
332 * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)
333 * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)
334 * @NFTA_SET_ELEM_TIMEOUT: timeout value (NLA_U64)
335 * @NFTA_SET_ELEM_EXPIRATION: expiration time (NLA_U64)
336 * @NFTA_SET_ELEM_USERDATA: user data (NLA_BINARY)
337 * @NFTA_SET_ELEM_EXPR: expression (NLA_NESTED: nft_expr_attributes)
338 */
339 enum nft_set_elem_attributes {
340 NFTA_SET_ELEM_UNSPEC,
341 NFTA_SET_ELEM_KEY,
342 NFTA_SET_ELEM_DATA,
343 NFTA_SET_ELEM_FLAGS,
344 NFTA_SET_ELEM_TIMEOUT,
345 NFTA_SET_ELEM_EXPIRATION,
346 NFTA_SET_ELEM_USERDATA,
347 NFTA_SET_ELEM_EXPR,
348 NFTA_SET_ELEM_PAD,
349 __NFTA_SET_ELEM_MAX
350 };
351 #define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1)
352
353 /**
354 * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes
355 *
356 * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING)
357 * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING)
358 * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes)
359 * @NFTA_SET_ELEM_LIST_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
360 */
361 enum nft_set_elem_list_attributes {
362 NFTA_SET_ELEM_LIST_UNSPEC,
363 NFTA_SET_ELEM_LIST_TABLE,
364 NFTA_SET_ELEM_LIST_SET,
365 NFTA_SET_ELEM_LIST_ELEMENTS,
366 NFTA_SET_ELEM_LIST_SET_ID,
367 __NFTA_SET_ELEM_LIST_MAX
368 };
369 #define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1)
370
371 /**
372 * enum nft_data_types - nf_tables data types
373 *
374 * @NFT_DATA_VALUE: generic data
375 * @NFT_DATA_VERDICT: netfilter verdict
376 *
377 * The type of data is usually determined by the kernel directly and is not
378 * explicitly specified by userspace. The only difference are sets, where
379 * userspace specifies the key and mapping data types.
380 *
381 * The values 0xffffff00-0xffffffff are reserved for internally used types.
382 * The remaining range can be freely used by userspace to encode types, all
383 * values are equivalent to NFT_DATA_VALUE.
384 */
385 enum nft_data_types {
386 NFT_DATA_VALUE,
387 NFT_DATA_VERDICT = 0xffffff00U,
388 };
389
390 #define NFT_DATA_RESERVED_MASK 0xffffff00U
391
392 /**
393 * enum nft_data_attributes - nf_tables data netlink attributes
394 *
395 * @NFTA_DATA_VALUE: generic data (NLA_BINARY)
396 * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes)
397 */
398 enum nft_data_attributes {
399 NFTA_DATA_UNSPEC,
400 NFTA_DATA_VALUE,
401 NFTA_DATA_VERDICT,
402 __NFTA_DATA_MAX
403 };
404 #define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1)
405
406 /* Maximum length of a value */
407 #define NFT_DATA_VALUE_MAXLEN 64
408
409 /**
410 * enum nft_verdict_attributes - nf_tables verdict netlink attributes
411 *
412 * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts)
413 * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING)
414 */
415 enum nft_verdict_attributes {
416 NFTA_VERDICT_UNSPEC,
417 NFTA_VERDICT_CODE,
418 NFTA_VERDICT_CHAIN,
419 __NFTA_VERDICT_MAX
420 };
421 #define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1)
422
423 /**
424 * enum nft_expr_attributes - nf_tables expression netlink attributes
425 *
426 * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING)
427 * @NFTA_EXPR_DATA: type specific data (NLA_NESTED)
428 */
429 enum nft_expr_attributes {
430 NFTA_EXPR_UNSPEC,
431 NFTA_EXPR_NAME,
432 NFTA_EXPR_DATA,
433 __NFTA_EXPR_MAX
434 };
435 #define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1)
436
437 /**
438 * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes
439 *
440 * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32)
441 * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes)
442 */
443 enum nft_immediate_attributes {
444 NFTA_IMMEDIATE_UNSPEC,
445 NFTA_IMMEDIATE_DREG,
446 NFTA_IMMEDIATE_DATA,
447 __NFTA_IMMEDIATE_MAX
448 };
449 #define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1)
450
451 /**
452 * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes
453 *
454 * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers)
455 * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers)
456 * @NFTA_BITWISE_LEN: length of operands (NLA_U32)
457 * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes)
458 * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes)
459 *
460 * The bitwise expression performs the following operation:
461 *
462 * dreg = (sreg & mask) ^ xor
463 *
464 * which allow to express all bitwise operations:
465 *
466 * mask xor
467 * NOT: 1 1
468 * OR: 0 x
469 * XOR: 1 x
470 * AND: x 0
471 */
472 enum nft_bitwise_attributes {
473 NFTA_BITWISE_UNSPEC,
474 NFTA_BITWISE_SREG,
475 NFTA_BITWISE_DREG,
476 NFTA_BITWISE_LEN,
477 NFTA_BITWISE_MASK,
478 NFTA_BITWISE_XOR,
479 __NFTA_BITWISE_MAX
480 };
481 #define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1)
482
483 /**
484 * enum nft_byteorder_ops - nf_tables byteorder operators
485 *
486 * @NFT_BYTEORDER_NTOH: network to host operator
487 * @NFT_BYTEORDER_HTON: host to network opertaor
488 */
489 enum nft_byteorder_ops {
490 NFT_BYTEORDER_NTOH,
491 NFT_BYTEORDER_HTON,
492 };
493
494 /**
495 * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes
496 *
497 * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers)
498 * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers)
499 * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops)
500 * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32)
501 * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4)
502 */
503 enum nft_byteorder_attributes {
504 NFTA_BYTEORDER_UNSPEC,
505 NFTA_BYTEORDER_SREG,
506 NFTA_BYTEORDER_DREG,
507 NFTA_BYTEORDER_OP,
508 NFTA_BYTEORDER_LEN,
509 NFTA_BYTEORDER_SIZE,
510 __NFTA_BYTEORDER_MAX
511 };
512 #define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1)
513
514 /**
515 * enum nft_cmp_ops - nf_tables relational operator
516 *
517 * @NFT_CMP_EQ: equal
518 * @NFT_CMP_NEQ: not equal
519 * @NFT_CMP_LT: less than
520 * @NFT_CMP_LTE: less than or equal to
521 * @NFT_CMP_GT: greater than
522 * @NFT_CMP_GTE: greater than or equal to
523 */
524 enum nft_cmp_ops {
525 NFT_CMP_EQ,
526 NFT_CMP_NEQ,
527 NFT_CMP_LT,
528 NFT_CMP_LTE,
529 NFT_CMP_GT,
530 NFT_CMP_GTE,
531 };
532
533 /**
534 * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes
535 *
536 * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers)
537 * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops)
538 * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes)
539 */
540 enum nft_cmp_attributes {
541 NFTA_CMP_UNSPEC,
542 NFTA_CMP_SREG,
543 NFTA_CMP_OP,
544 NFTA_CMP_DATA,
545 __NFTA_CMP_MAX
546 };
547 #define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1)
548
549 enum nft_lookup_flags {
550 NFT_LOOKUP_F_INV = (1 << 0),
551 };
552
553 /**
554 * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes
555 *
556 * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING)
557 * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers)
558 * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers)
559 * @NFTA_LOOKUP_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
560 * @NFTA_LOOKUP_FLAGS: flags (NLA_U32: enum nft_lookup_flags)
561 */
562 enum nft_lookup_attributes {
563 NFTA_LOOKUP_UNSPEC,
564 NFTA_LOOKUP_SET,
565 NFTA_LOOKUP_SREG,
566 NFTA_LOOKUP_DREG,
567 NFTA_LOOKUP_SET_ID,
568 NFTA_LOOKUP_FLAGS,
569 __NFTA_LOOKUP_MAX
570 };
571 #define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1)
572
573 enum nft_dynset_ops {
574 NFT_DYNSET_OP_ADD,
575 NFT_DYNSET_OP_UPDATE,
576 };
577
578 /**
579 * enum nft_dynset_attributes - dynset expression attributes
580 *
581 * @NFTA_DYNSET_SET_NAME: name of set the to add data to (NLA_STRING)
582 * @NFTA_DYNSET_SET_ID: uniquely identifier of the set in the transaction (NLA_U32)
583 * @NFTA_DYNSET_OP: operation (NLA_U32)
584 * @NFTA_DYNSET_SREG_KEY: source register of the key (NLA_U32)
585 * @NFTA_DYNSET_SREG_DATA: source register of the data (NLA_U32)
586 * @NFTA_DYNSET_TIMEOUT: timeout value for the new element (NLA_U64)
587 * @NFTA_DYNSET_EXPR: expression (NLA_NESTED: nft_expr_attributes)
588 */
589 enum nft_dynset_attributes {
590 NFTA_DYNSET_UNSPEC,
591 NFTA_DYNSET_SET_NAME,
592 NFTA_DYNSET_SET_ID,
593 NFTA_DYNSET_OP,
594 NFTA_DYNSET_SREG_KEY,
595 NFTA_DYNSET_SREG_DATA,
596 NFTA_DYNSET_TIMEOUT,
597 NFTA_DYNSET_EXPR,
598 NFTA_DYNSET_PAD,
599 __NFTA_DYNSET_MAX,
600 };
601 #define NFTA_DYNSET_MAX (__NFTA_DYNSET_MAX - 1)
602
603 /**
604 * enum nft_payload_bases - nf_tables payload expression offset bases
605 *
606 * @NFT_PAYLOAD_LL_HEADER: link layer header
607 * @NFT_PAYLOAD_NETWORK_HEADER: network header
608 * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header
609 */
610 enum nft_payload_bases {
611 NFT_PAYLOAD_LL_HEADER,
612 NFT_PAYLOAD_NETWORK_HEADER,
613 NFT_PAYLOAD_TRANSPORT_HEADER,
614 };
615
616 /**
617 * enum nft_payload_csum_types - nf_tables payload expression checksum types
618 *
619 * @NFT_PAYLOAD_CSUM_NONE: no checksumming
620 * @NFT_PAYLOAD_CSUM_INET: internet checksum (RFC 791)
621 */
622 enum nft_payload_csum_types {
623 NFT_PAYLOAD_CSUM_NONE,
624 NFT_PAYLOAD_CSUM_INET,
625 };
626
627 /**
628 * enum nft_payload_attributes - nf_tables payload expression netlink attributes
629 *
630 * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers)
631 * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases)
632 * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32)
633 * @NFTA_PAYLOAD_LEN: payload length (NLA_U32)
634 * @NFTA_PAYLOAD_SREG: source register to load data from (NLA_U32: nft_registers)
635 * @NFTA_PAYLOAD_CSUM_TYPE: checksum type (NLA_U32)
636 * @NFTA_PAYLOAD_CSUM_OFFSET: checksum offset relative to base (NLA_U32)
637 */
638 enum nft_payload_attributes {
639 NFTA_PAYLOAD_UNSPEC,
640 NFTA_PAYLOAD_DREG,
641 NFTA_PAYLOAD_BASE,
642 NFTA_PAYLOAD_OFFSET,
643 NFTA_PAYLOAD_LEN,
644 NFTA_PAYLOAD_SREG,
645 NFTA_PAYLOAD_CSUM_TYPE,
646 NFTA_PAYLOAD_CSUM_OFFSET,
647 __NFTA_PAYLOAD_MAX
648 };
649 #define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1)
650
651 /**
652 * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes
653 *
654 * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers)
655 * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8)
656 * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32)
657 * @NFTA_EXTHDR_LEN: extension header length (NLA_U32)
658 */
659 enum nft_exthdr_attributes {
660 NFTA_EXTHDR_UNSPEC,
661 NFTA_EXTHDR_DREG,
662 NFTA_EXTHDR_TYPE,
663 NFTA_EXTHDR_OFFSET,
664 NFTA_EXTHDR_LEN,
665 __NFTA_EXTHDR_MAX
666 };
667 #define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1)
668
669 /**
670 * enum nft_meta_keys - nf_tables meta expression keys
671 *
672 * @NFT_META_LEN: packet length (skb->len)
673 * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT
674 * @NFT_META_PRIORITY: packet priority (skb->priority)
675 * @NFT_META_MARK: packet mark (skb->mark)
676 * @NFT_META_IIF: packet input interface index (dev->ifindex)
677 * @NFT_META_OIF: packet output interface index (dev->ifindex)
678 * @NFT_META_IIFNAME: packet input interface name (dev->name)
679 * @NFT_META_OIFNAME: packet output interface name (dev->name)
680 * @NFT_META_IIFTYPE: packet input interface type (dev->type)
681 * @NFT_META_OIFTYPE: packet output interface type (dev->type)
682 * @NFT_META_SKUID: originating socket UID (fsuid)
683 * @NFT_META_SKGID: originating socket GID (fsgid)
684 * @NFT_META_NFTRACE: packet nftrace bit
685 * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid)
686 * @NFT_META_SECMARK: packet secmark (skb->secmark)
687 * @NFT_META_NFPROTO: netfilter protocol
688 * @NFT_META_L4PROTO: layer 4 protocol number
689 * @NFT_META_BRI_IIFNAME: packet input bridge interface name
690 * @NFT_META_BRI_OIFNAME: packet output bridge interface name
691 * @NFT_META_PKTTYPE: packet type (skb->pkt_type), special handling for loopback
692 * @NFT_META_CPU: cpu id through smp_processor_id()
693 * @NFT_META_IIFGROUP: packet input interface group
694 * @NFT_META_OIFGROUP: packet output interface group
695 * @NFT_META_CGROUP: socket control group (skb->sk->sk_classid)
696 * @NFT_META_PRANDOM: a 32bit pseudo-random number
697 */
698 enum nft_meta_keys {
699 NFT_META_LEN,
700 NFT_META_PROTOCOL,
701 NFT_META_PRIORITY,
702 NFT_META_MARK,
703 NFT_META_IIF,
704 NFT_META_OIF,
705 NFT_META_IIFNAME,
706 NFT_META_OIFNAME,
707 NFT_META_IIFTYPE,
708 NFT_META_OIFTYPE,
709 NFT_META_SKUID,
710 NFT_META_SKGID,
711 NFT_META_NFTRACE,
712 NFT_META_RTCLASSID,
713 NFT_META_SECMARK,
714 NFT_META_NFPROTO,
715 NFT_META_L4PROTO,
716 NFT_META_BRI_IIFNAME,
717 NFT_META_BRI_OIFNAME,
718 NFT_META_PKTTYPE,
719 NFT_META_CPU,
720 NFT_META_IIFGROUP,
721 NFT_META_OIFGROUP,
722 NFT_META_CGROUP,
723 NFT_META_PRANDOM,
724 };
725
726 /**
727 * enum nft_meta_attributes - nf_tables meta expression netlink attributes
728 *
729 * @NFTA_META_DREG: destination register (NLA_U32)
730 * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys)
731 * @NFTA_META_SREG: source register (NLA_U32)
732 */
733 enum nft_meta_attributes {
734 NFTA_META_UNSPEC,
735 NFTA_META_DREG,
736 NFTA_META_KEY,
737 NFTA_META_SREG,
738 __NFTA_META_MAX
739 };
740 #define NFTA_META_MAX (__NFTA_META_MAX - 1)
741
742 /**
743 * enum nft_ct_keys - nf_tables ct expression keys
744 *
745 * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info)
746 * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir)
747 * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status)
748 * @NFT_CT_MARK: conntrack mark value
749 * @NFT_CT_SECMARK: conntrack secmark value
750 * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms
751 * @NFT_CT_HELPER: connection tracking helper assigned to conntrack
752 * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol
753 * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address)
754 * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address)
755 * @NFT_CT_PROTOCOL: conntrack layer 4 protocol
756 * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source
757 * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination
758 */
759 enum nft_ct_keys {
760 NFT_CT_STATE,
761 NFT_CT_DIRECTION,
762 NFT_CT_STATUS,
763 NFT_CT_MARK,
764 NFT_CT_SECMARK,
765 NFT_CT_EXPIRATION,
766 NFT_CT_HELPER,
767 NFT_CT_L3PROTOCOL,
768 NFT_CT_SRC,
769 NFT_CT_DST,
770 NFT_CT_PROTOCOL,
771 NFT_CT_PROTO_SRC,
772 NFT_CT_PROTO_DST,
773 NFT_CT_LABELS,
774 NFT_CT_PKTS,
775 NFT_CT_BYTES,
776 };
777
778 /**
779 * enum nft_ct_attributes - nf_tables ct expression netlink attributes
780 *
781 * @NFTA_CT_DREG: destination register (NLA_U32)
782 * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys)
783 * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8)
784 * @NFTA_CT_SREG: source register (NLA_U32)
785 */
786 enum nft_ct_attributes {
787 NFTA_CT_UNSPEC,
788 NFTA_CT_DREG,
789 NFTA_CT_KEY,
790 NFTA_CT_DIRECTION,
791 NFTA_CT_SREG,
792 __NFTA_CT_MAX
793 };
794 #define NFTA_CT_MAX (__NFTA_CT_MAX - 1)
795
796 enum nft_limit_type {
797 NFT_LIMIT_PKTS,
798 NFT_LIMIT_PKT_BYTES
799 };
800
801 enum nft_limit_flags {
802 NFT_LIMIT_F_INV = (1 << 0),
803 };
804
805 /**
806 * enum nft_limit_attributes - nf_tables limit expression netlink attributes
807 *
808 * @NFTA_LIMIT_RATE: refill rate (NLA_U64)
809 * @NFTA_LIMIT_UNIT: refill unit (NLA_U64)
810 * @NFTA_LIMIT_BURST: burst (NLA_U32)
811 * @NFTA_LIMIT_TYPE: type of limit (NLA_U32: enum nft_limit_type)
812 * @NFTA_LIMIT_FLAGS: flags (NLA_U32: enum nft_limit_flags)
813 */
814 enum nft_limit_attributes {
815 NFTA_LIMIT_UNSPEC,
816 NFTA_LIMIT_RATE,
817 NFTA_LIMIT_UNIT,
818 NFTA_LIMIT_BURST,
819 NFTA_LIMIT_TYPE,
820 NFTA_LIMIT_FLAGS,
821 NFTA_LIMIT_PAD,
822 __NFTA_LIMIT_MAX
823 };
824 #define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1)
825
826 /**
827 * enum nft_counter_attributes - nf_tables counter expression netlink attributes
828 *
829 * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64)
830 * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64)
831 */
832 enum nft_counter_attributes {
833 NFTA_COUNTER_UNSPEC,
834 NFTA_COUNTER_BYTES,
835 NFTA_COUNTER_PACKETS,
836 NFTA_COUNTER_PAD,
837 __NFTA_COUNTER_MAX
838 };
839 #define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1)
840
841 /**
842 * enum nft_log_attributes - nf_tables log expression netlink attributes
843 *
844 * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32)
845 * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING)
846 * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32)
847 * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32)
848 * @NFTA_LOG_LEVEL: log level (NLA_U32)
849 * @NFTA_LOG_FLAGS: logging flags (NLA_U32)
850 */
851 enum nft_log_attributes {
852 NFTA_LOG_UNSPEC,
853 NFTA_LOG_GROUP,
854 NFTA_LOG_PREFIX,
855 NFTA_LOG_SNAPLEN,
856 NFTA_LOG_QTHRESHOLD,
857 NFTA_LOG_LEVEL,
858 NFTA_LOG_FLAGS,
859 __NFTA_LOG_MAX
860 };
861 #define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1)
862
863 /**
864 * enum nft_queue_attributes - nf_tables queue expression netlink attributes
865 *
866 * @NFTA_QUEUE_NUM: netlink queue to send messages to (NLA_U16)
867 * @NFTA_QUEUE_TOTAL: number of queues to load balance packets on (NLA_U16)
868 * @NFTA_QUEUE_FLAGS: various flags (NLA_U16)
869 */
870 enum nft_queue_attributes {
871 NFTA_QUEUE_UNSPEC,
872 NFTA_QUEUE_NUM,
873 NFTA_QUEUE_TOTAL,
874 NFTA_QUEUE_FLAGS,
875 __NFTA_QUEUE_MAX
876 };
877 #define NFTA_QUEUE_MAX (__NFTA_QUEUE_MAX - 1)
878
879 #define NFT_QUEUE_FLAG_BYPASS 0x01 /* for compatibility with v2 */
880 #define NFT_QUEUE_FLAG_CPU_FANOUT 0x02 /* use current CPU (no hashing) */
881 #define NFT_QUEUE_FLAG_MASK 0x03
882
883 /**
884 * enum nft_reject_types - nf_tables reject expression reject types
885 *
886 * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable
887 * @NFT_REJECT_TCP_RST: reject using TCP RST
888 * @NFT_REJECT_ICMPX_UNREACH: abstracted ICMP unreachable for bridge and inet
889 */
890 enum nft_reject_types {
891 NFT_REJECT_ICMP_UNREACH,
892 NFT_REJECT_TCP_RST,
893 NFT_REJECT_ICMPX_UNREACH,
894 };
895
896 /**
897 * enum nft_reject_code - Generic reject codes for IPv4/IPv6
898 *
899 * @NFT_REJECT_ICMPX_NO_ROUTE: no route to host / network unreachable
900 * @NFT_REJECT_ICMPX_PORT_UNREACH: port unreachable
901 * @NFT_REJECT_ICMPX_HOST_UNREACH: host unreachable
902 * @NFT_REJECT_ICMPX_ADMIN_PROHIBITED: administratively prohibited
903 *
904 * These codes are mapped to real ICMP and ICMPv6 codes.
905 */
906 enum nft_reject_inet_code {
907 NFT_REJECT_ICMPX_NO_ROUTE = 0,
908 NFT_REJECT_ICMPX_PORT_UNREACH,
909 NFT_REJECT_ICMPX_HOST_UNREACH,
910 NFT_REJECT_ICMPX_ADMIN_PROHIBITED,
911 __NFT_REJECT_ICMPX_MAX
912 };
913 #define NFT_REJECT_ICMPX_MAX (__NFT_REJECT_ICMPX_MAX - 1)
914
915 /**
916 * enum nft_reject_attributes - nf_tables reject expression netlink attributes
917 *
918 * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types)
919 * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8)
920 */
921 enum nft_reject_attributes {
922 NFTA_REJECT_UNSPEC,
923 NFTA_REJECT_TYPE,
924 NFTA_REJECT_ICMP_CODE,
925 __NFTA_REJECT_MAX
926 };
927 #define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1)
928
929 /**
930 * enum nft_nat_types - nf_tables nat expression NAT types
931 *
932 * @NFT_NAT_SNAT: source NAT
933 * @NFT_NAT_DNAT: destination NAT
934 */
935 enum nft_nat_types {
936 NFT_NAT_SNAT,
937 NFT_NAT_DNAT,
938 };
939
940 /**
941 * enum nft_nat_attributes - nf_tables nat expression netlink attributes
942 *
943 * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types)
944 * @NFTA_NAT_FAMILY: NAT family (NLA_U32)
945 * @NFTA_NAT_REG_ADDR_MIN: source register of address range start (NLA_U32: nft_registers)
946 * @NFTA_NAT_REG_ADDR_MAX: source register of address range end (NLA_U32: nft_registers)
947 * @NFTA_NAT_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
948 * @NFTA_NAT_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
949 * @NFTA_NAT_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
950 */
951 enum nft_nat_attributes {
952 NFTA_NAT_UNSPEC,
953 NFTA_NAT_TYPE,
954 NFTA_NAT_FAMILY,
955 NFTA_NAT_REG_ADDR_MIN,
956 NFTA_NAT_REG_ADDR_MAX,
957 NFTA_NAT_REG_PROTO_MIN,
958 NFTA_NAT_REG_PROTO_MAX,
959 NFTA_NAT_FLAGS,
960 __NFTA_NAT_MAX
961 };
962 #define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1)
963
964 /**
965 * enum nft_masq_attributes - nf_tables masquerade expression attributes
966 *
967 * @NFTA_MASQ_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
968 * @NFTA_MASQ_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
969 * @NFTA_MASQ_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
970 */
971 enum nft_masq_attributes {
972 NFTA_MASQ_UNSPEC,
973 NFTA_MASQ_FLAGS,
974 NFTA_MASQ_REG_PROTO_MIN,
975 NFTA_MASQ_REG_PROTO_MAX,
976 __NFTA_MASQ_MAX
977 };
978 #define NFTA_MASQ_MAX (__NFTA_MASQ_MAX - 1)
979
980 /**
981 * enum nft_redir_attributes - nf_tables redirect expression netlink attributes
982 *
983 * @NFTA_REDIR_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
984 * @NFTA_REDIR_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
985 * @NFTA_REDIR_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
986 */
987 enum nft_redir_attributes {
988 NFTA_REDIR_UNSPEC,
989 NFTA_REDIR_REG_PROTO_MIN,
990 NFTA_REDIR_REG_PROTO_MAX,
991 NFTA_REDIR_FLAGS,
992 __NFTA_REDIR_MAX
993 };
994 #define NFTA_REDIR_MAX (__NFTA_REDIR_MAX - 1)
995
996 /**
997 * enum nft_dup_attributes - nf_tables dup expression netlink attributes
998 *
999 * @NFTA_DUP_SREG_ADDR: source register of address (NLA_U32: nft_registers)
1000 * @NFTA_DUP_SREG_DEV: source register of output interface (NLA_U32: nft_register)
1001 */
1002 enum nft_dup_attributes {
1003 NFTA_DUP_UNSPEC,
1004 NFTA_DUP_SREG_ADDR,
1005 NFTA_DUP_SREG_DEV,
1006 __NFTA_DUP_MAX
1007 };
1008 #define NFTA_DUP_MAX (__NFTA_DUP_MAX - 1)
1009
1010 /**
1011 * enum nft_fwd_attributes - nf_tables fwd expression netlink attributes
1012 *
1013 * @NFTA_FWD_SREG_DEV: source register of output interface (NLA_U32: nft_register)
1014 */
1015 enum nft_fwd_attributes {
1016 NFTA_FWD_UNSPEC,
1017 NFTA_FWD_SREG_DEV,
1018 __NFTA_FWD_MAX
1019 };
1020 #define NFTA_FWD_MAX (__NFTA_FWD_MAX - 1)
1021
1022 /**
1023 * enum nft_gen_attributes - nf_tables ruleset generation attributes
1024 *
1025 * @NFTA_GEN_ID: Ruleset generation ID (NLA_U32)
1026 */
1027 enum nft_gen_attributes {
1028 NFTA_GEN_UNSPEC,
1029 NFTA_GEN_ID,
1030 __NFTA_GEN_MAX
1031 };
1032 #define NFTA_GEN_MAX (__NFTA_GEN_MAX - 1)
1033
1034 /**
1035 * enum nft_trace_attributes - nf_tables trace netlink attributes
1036 *
1037 * @NFTA_TRACE_TABLE: name of the table (NLA_STRING)
1038 * @NFTA_TRACE_CHAIN: name of the chain (NLA_STRING)
1039 * @NFTA_TRACE_RULE_HANDLE: numeric handle of the rule (NLA_U64)
1040 * @NFTA_TRACE_TYPE: type of the event (NLA_U32: nft_trace_types)
1041 * @NFTA_TRACE_VERDICT: verdict returned by hook (NLA_NESTED: nft_verdicts)
1042 * @NFTA_TRACE_ID: pseudo-id, same for each skb traced (NLA_U32)
1043 * @NFTA_TRACE_LL_HEADER: linklayer header (NLA_BINARY)
1044 * @NFTA_TRACE_NETWORK_HEADER: network header (NLA_BINARY)
1045 * @NFTA_TRACE_TRANSPORT_HEADER: transport header (NLA_BINARY)
1046 * @NFTA_TRACE_IIF: indev ifindex (NLA_U32)
1047 * @NFTA_TRACE_IIFTYPE: netdev->type of indev (NLA_U16)
1048 * @NFTA_TRACE_OIF: outdev ifindex (NLA_U32)
1049 * @NFTA_TRACE_OIFTYPE: netdev->type of outdev (NLA_U16)
1050 * @NFTA_TRACE_MARK: nfmark (NLA_U32)
1051 * @NFTA_TRACE_NFPROTO: nf protocol processed (NLA_U32)
1052 * @NFTA_TRACE_POLICY: policy that decided fate of packet (NLA_U32)
1053 */
1054 enum nft_trace_attibutes {
1055 NFTA_TRACE_UNSPEC,
1056 NFTA_TRACE_TABLE,
1057 NFTA_TRACE_CHAIN,
1058 NFTA_TRACE_RULE_HANDLE,
1059 NFTA_TRACE_TYPE,
1060 NFTA_TRACE_VERDICT,
1061 NFTA_TRACE_ID,
1062 NFTA_TRACE_LL_HEADER,
1063 NFTA_TRACE_NETWORK_HEADER,
1064 NFTA_TRACE_TRANSPORT_HEADER,
1065 NFTA_TRACE_IIF,
1066 NFTA_TRACE_IIFTYPE,
1067 NFTA_TRACE_OIF,
1068 NFTA_TRACE_OIFTYPE,
1069 NFTA_TRACE_MARK,
1070 NFTA_TRACE_NFPROTO,
1071 NFTA_TRACE_POLICY,
1072 NFTA_TRACE_PAD,
1073 __NFTA_TRACE_MAX
1074 };
1075 #define NFTA_TRACE_MAX (__NFTA_TRACE_MAX - 1)
1076
1077 enum nft_trace_types {
1078 NFT_TRACETYPE_UNSPEC,
1079 NFT_TRACETYPE_POLICY,
1080 NFT_TRACETYPE_RETURN,
1081 NFT_TRACETYPE_RULE,
1082 __NFT_TRACETYPE_MAX
1083 };
1084 #define NFT_TRACETYPE_MAX (__NFT_TRACETYPE_MAX - 1)
1085 #endif /* _LINUX_NF_TABLES_H */