| #ifndef _LINUX_NF_TABLES_H |
| #define _LINUX_NF_TABLES_H |
| |
| #define NFT_TABLE_MAXNAMELEN 32 |
| #define NFT_CHAIN_MAXNAMELEN 32 |
| #define NFT_USERDATA_MAXLEN 256 |
| |
| /** |
| * enum nft_registers - nf_tables registers |
| * |
| * nf_tables used to have five registers: a verdict register and four data |
| * registers of size 16. The data registers have been changed to 16 registers |
| * of size 4. For compatibility reasons, the NFT_REG_[1-4] registers still |
| * map to areas of size 16, the 4 byte registers are addressed using |
| * NFT_REG32_00 - NFT_REG32_15. |
| */ |
| enum nft_registers { |
| NFT_REG_VERDICT, |
| NFT_REG_1, |
| NFT_REG_2, |
| NFT_REG_3, |
| NFT_REG_4, |
| __NFT_REG_MAX, |
| |
| NFT_REG32_00 = 8, |
| MFT_REG32_01, |
| NFT_REG32_02, |
| NFT_REG32_03, |
| NFT_REG32_04, |
| NFT_REG32_05, |
| NFT_REG32_06, |
| NFT_REG32_07, |
| NFT_REG32_08, |
| NFT_REG32_09, |
| NFT_REG32_10, |
| NFT_REG32_11, |
| NFT_REG32_12, |
| NFT_REG32_13, |
| NFT_REG32_14, |
| NFT_REG32_15, |
| }; |
| #define NFT_REG_MAX (__NFT_REG_MAX - 1) |
| |
| #define NFT_REG_SIZE 16 |
| #define NFT_REG32_SIZE 4 |
| |
| /** |
| * enum nft_verdicts - nf_tables internal verdicts |
| * |
| * @NFT_CONTINUE: continue evaluation of the current rule |
| * @NFT_BREAK: terminate evaluation of the current rule |
| * @NFT_JUMP: push the current chain on the jump stack and jump to a chain |
| * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack |
| * @NFT_RETURN: return to the topmost chain on the jump stack |
| * |
| * The nf_tables verdicts share their numeric space with the netfilter verdicts. |
| */ |
| enum nft_verdicts { |
| NFT_CONTINUE = -1, |
| NFT_BREAK = -2, |
| NFT_JUMP = -3, |
| NFT_GOTO = -4, |
| NFT_RETURN = -5, |
| }; |
| |
| /** |
| * enum nf_tables_msg_types - nf_tables netlink message types |
| * |
| * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes) |
| * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes) |
| * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes) |
| * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes) |
| * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes) |
| * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes) |
| * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes) |
| * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes) |
| * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes) |
| * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes) |
| * @NFT_MSG_GETSET: get a set (enum nft_set_attributes) |
| * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes) |
| * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes) |
| * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes) |
| * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes) |
| * @NFT_MSG_NEWGEN: announce a new generation, only for events (enum nft_gen_attributes) |
| * @NFT_MSG_GETGEN: get the rule-set generation (enum nft_gen_attributes) |
| * @NFT_MSG_TRACE: trace event (enum nft_trace_attributes) |
| */ |
| enum nf_tables_msg_types { |
| NFT_MSG_NEWTABLE, |
| NFT_MSG_GETTABLE, |
| NFT_MSG_DELTABLE, |
| NFT_MSG_NEWCHAIN, |
| NFT_MSG_GETCHAIN, |
| NFT_MSG_DELCHAIN, |
| NFT_MSG_NEWRULE, |
| NFT_MSG_GETRULE, |
| NFT_MSG_DELRULE, |
| NFT_MSG_NEWSET, |
| NFT_MSG_GETSET, |
| NFT_MSG_DELSET, |
| NFT_MSG_NEWSETELEM, |
| NFT_MSG_GETSETELEM, |
| NFT_MSG_DELSETELEM, |
| NFT_MSG_NEWGEN, |
| NFT_MSG_GETGEN, |
| NFT_MSG_TRACE, |
| NFT_MSG_MAX, |
| }; |
| |
| /** |
| * enum nft_list_attributes - nf_tables generic list netlink attributes |
| * |
| * @NFTA_LIST_ELEM: list element (NLA_NESTED) |
| */ |
| enum nft_list_attributes { |
| NFTA_LIST_UNPEC, |
| NFTA_LIST_ELEM, |
| __NFTA_LIST_MAX |
| }; |
| #define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1) |
| |
| /** |
| * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes |
| * |
| * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32) |
| * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32) |
| * @NFTA_HOOK_DEV: netdevice name (NLA_STRING) |
| */ |
| enum nft_hook_attributes { |
| NFTA_HOOK_UNSPEC, |
| NFTA_HOOK_HOOKNUM, |
| NFTA_HOOK_PRIORITY, |
| NFTA_HOOK_DEV, |
| __NFTA_HOOK_MAX |
| }; |
| #define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1) |
| |
| /** |
| * enum nft_table_flags - nf_tables table flags |
| * |
| * @NFT_TABLE_F_DORMANT: this table is not active |
| */ |
| enum nft_table_flags { |
| NFT_TABLE_F_DORMANT = 0x1, |
| }; |
| |
| /** |
| * enum nft_table_attributes - nf_tables table netlink attributes |
| * |
| * @NFTA_TABLE_NAME: name of the table (NLA_STRING) |
| * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32) |
| * @NFTA_TABLE_USE: number of chains in this table (NLA_U32) |
| */ |
| enum nft_table_attributes { |
| NFTA_TABLE_UNSPEC, |
| NFTA_TABLE_NAME, |
| NFTA_TABLE_FLAGS, |
| NFTA_TABLE_USE, |
| __NFTA_TABLE_MAX |
| }; |
| #define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1) |
| |
| /** |
| * enum nft_chain_attributes - nf_tables chain netlink attributes |
| * |
| * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING) |
| * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64) |
| * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING) |
| * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes) |
| * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32) |
| * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32) |
| * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING) |
| * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes) |
| */ |
| enum nft_chain_attributes { |
| NFTA_CHAIN_UNSPEC, |
| NFTA_CHAIN_TABLE, |
| NFTA_CHAIN_HANDLE, |
| NFTA_CHAIN_NAME, |
| NFTA_CHAIN_HOOK, |
| NFTA_CHAIN_POLICY, |
| NFTA_CHAIN_USE, |
| NFTA_CHAIN_TYPE, |
| NFTA_CHAIN_COUNTERS, |
| __NFTA_CHAIN_MAX |
| }; |
| #define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1) |
| |
| /** |
| * enum nft_rule_attributes - nf_tables rule netlink attributes |
| * |
| * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING) |
| * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING) |
| * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64) |
| * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes) |
| * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes) |
| * @NFTA_RULE_POSITION: numeric handle of the previous rule (NLA_U64) |
| * @NFTA_RULE_USERDATA: user data (NLA_BINARY, NFT_USERDATA_MAXLEN) |
| */ |
| enum nft_rule_attributes { |
| NFTA_RULE_UNSPEC, |
| NFTA_RULE_TABLE, |
| NFTA_RULE_CHAIN, |
| NFTA_RULE_HANDLE, |
| NFTA_RULE_EXPRESSIONS, |
| NFTA_RULE_COMPAT, |
| NFTA_RULE_POSITION, |
| NFTA_RULE_USERDATA, |
| __NFTA_RULE_MAX |
| }; |
| #define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1) |
| |
| /** |
| * enum nft_rule_compat_flags - nf_tables rule compat flags |
| * |
| * @NFT_RULE_COMPAT_F_INV: invert the check result |
| */ |
| enum nft_rule_compat_flags { |
| NFT_RULE_COMPAT_F_INV = (1 << 1), |
| NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV, |
| }; |
| |
| /** |
| * enum nft_rule_compat_attributes - nf_tables rule compat attributes |
| * |
| * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32) |
| * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32) |
| */ |
| enum nft_rule_compat_attributes { |
| NFTA_RULE_COMPAT_UNSPEC, |
| NFTA_RULE_COMPAT_PROTO, |
| NFTA_RULE_COMPAT_FLAGS, |
| __NFTA_RULE_COMPAT_MAX |
| }; |
| #define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1) |
| |
| /** |
| * enum nft_set_flags - nf_tables set flags |
| * |
| * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink |
| * @NFT_SET_CONSTANT: set contents may not change while bound |
| * @NFT_SET_INTERVAL: set contains intervals |
| * @NFT_SET_MAP: set is used as a dictionary |
| * @NFT_SET_TIMEOUT: set uses timeouts |
| * @NFT_SET_EVAL: set contains expressions for evaluation |
| */ |
| enum nft_set_flags { |
| NFT_SET_ANONYMOUS = 0x1, |
| NFT_SET_CONSTANT = 0x2, |
| NFT_SET_INTERVAL = 0x4, |
| NFT_SET_MAP = 0x8, |
| NFT_SET_TIMEOUT = 0x10, |
| NFT_SET_EVAL = 0x20, |
| }; |
| |
| /** |
| * enum nft_set_policies - set selection policy |
| * |
| * @NFT_SET_POL_PERFORMANCE: prefer high performance over low memory use |
| * @NFT_SET_POL_MEMORY: prefer low memory use over high performance |
| */ |
| enum nft_set_policies { |
| NFT_SET_POL_PERFORMANCE, |
| NFT_SET_POL_MEMORY, |
| }; |
| |
| /** |
| * enum nft_set_desc_attributes - set element description |
| * |
| * @NFTA_SET_DESC_SIZE: number of elements in set (NLA_U32) |
| */ |
| enum nft_set_desc_attributes { |
| NFTA_SET_DESC_UNSPEC, |
| NFTA_SET_DESC_SIZE, |
| __NFTA_SET_DESC_MAX |
| }; |
| #define NFTA_SET_DESC_MAX (__NFTA_SET_DESC_MAX - 1) |
| |
| /** |
| * enum nft_set_attributes - nf_tables set netlink attributes |
| * |
| * @NFTA_SET_TABLE: table name (NLA_STRING) |
| * @NFTA_SET_NAME: set name (NLA_STRING) |
| * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32) |
| * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32) |
| * @NFTA_SET_KEY_LEN: key data length (NLA_U32) |
| * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32) |
| * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32) |
| * @NFTA_SET_POLICY: selection policy (NLA_U32) |
| * @NFTA_SET_DESC: set description (NLA_NESTED) |
| * @NFTA_SET_ID: uniquely identifies a set in a transaction (NLA_U32) |
| * @NFTA_SET_TIMEOUT: default timeout value (NLA_U64) |
| * @NFTA_SET_GC_INTERVAL: garbage collection interval (NLA_U32) |
| * @NFTA_SET_USERDATA: user data (NLA_BINARY) |
| */ |
| enum nft_set_attributes { |
| NFTA_SET_UNSPEC, |
| NFTA_SET_TABLE, |
| NFTA_SET_NAME, |
| NFTA_SET_FLAGS, |
| NFTA_SET_KEY_TYPE, |
| NFTA_SET_KEY_LEN, |
| NFTA_SET_DATA_TYPE, |
| NFTA_SET_DATA_LEN, |
| NFTA_SET_POLICY, |
| NFTA_SET_DESC, |
| NFTA_SET_ID, |
| NFTA_SET_TIMEOUT, |
| NFTA_SET_GC_INTERVAL, |
| NFTA_SET_USERDATA, |
| __NFTA_SET_MAX |
| }; |
| #define NFTA_SET_MAX (__NFTA_SET_MAX - 1) |
| |
| /** |
| * enum nft_set_elem_flags - nf_tables set element flags |
| * |
| * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval |
| */ |
| enum nft_set_elem_flags { |
| NFT_SET_ELEM_INTERVAL_END = 0x1, |
| }; |
| |
| /** |
| * enum nft_set_elem_attributes - nf_tables set element netlink attributes |
| * |
| * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data) |
| * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes) |
| * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32) |
| * @NFTA_SET_ELEM_TIMEOUT: timeout value (NLA_U64) |
| * @NFTA_SET_ELEM_EXPIRATION: expiration time (NLA_U64) |
| * @NFTA_SET_ELEM_USERDATA: user data (NLA_BINARY) |
| * @NFTA_SET_ELEM_EXPR: expression (NLA_NESTED: nft_expr_attributes) |
| */ |
| enum nft_set_elem_attributes { |
| NFTA_SET_ELEM_UNSPEC, |
| NFTA_SET_ELEM_KEY, |
| NFTA_SET_ELEM_DATA, |
| NFTA_SET_ELEM_FLAGS, |
| NFTA_SET_ELEM_TIMEOUT, |
| NFTA_SET_ELEM_EXPIRATION, |
| NFTA_SET_ELEM_USERDATA, |
| NFTA_SET_ELEM_EXPR, |
| __NFTA_SET_ELEM_MAX |
| }; |
| #define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1) |
| |
| /** |
| * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes |
| * |
| * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING) |
| * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING) |
| * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes) |
| * @NFTA_SET_ELEM_LIST_SET_ID: uniquely identifies a set in a transaction (NLA_U32) |
| */ |
| enum nft_set_elem_list_attributes { |
| NFTA_SET_ELEM_LIST_UNSPEC, |
| NFTA_SET_ELEM_LIST_TABLE, |
| NFTA_SET_ELEM_LIST_SET, |
| NFTA_SET_ELEM_LIST_ELEMENTS, |
| NFTA_SET_ELEM_LIST_SET_ID, |
| __NFTA_SET_ELEM_LIST_MAX |
| }; |
| #define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1) |
| |
| /** |
| * enum nft_data_types - nf_tables data types |
| * |
| * @NFT_DATA_VALUE: generic data |
| * @NFT_DATA_VERDICT: netfilter verdict |
| * |
| * The type of data is usually determined by the kernel directly and is not |
| * explicitly specified by userspace. The only difference are sets, where |
| * userspace specifies the key and mapping data types. |
| * |
| * The values 0xffffff00-0xffffffff are reserved for internally used types. |
| * The remaining range can be freely used by userspace to encode types, all |
| * values are equivalent to NFT_DATA_VALUE. |
| */ |
| enum nft_data_types { |
| NFT_DATA_VALUE, |
| NFT_DATA_VERDICT = 0xffffff00U, |
| }; |
| |
| #define NFT_DATA_RESERVED_MASK 0xffffff00U |
| |
| /** |
| * enum nft_data_attributes - nf_tables data netlink attributes |
| * |
| * @NFTA_DATA_VALUE: generic data (NLA_BINARY) |
| * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes) |
| */ |
| enum nft_data_attributes { |
| NFTA_DATA_UNSPEC, |
| NFTA_DATA_VALUE, |
| NFTA_DATA_VERDICT, |
| __NFTA_DATA_MAX |
| }; |
| #define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1) |
| |
| /* Maximum length of a value */ |
| #define NFT_DATA_VALUE_MAXLEN 64 |
| |
| /** |
| * enum nft_verdict_attributes - nf_tables verdict netlink attributes |
| * |
| * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts) |
| * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING) |
| */ |
| enum nft_verdict_attributes { |
| NFTA_VERDICT_UNSPEC, |
| NFTA_VERDICT_CODE, |
| NFTA_VERDICT_CHAIN, |
| __NFTA_VERDICT_MAX |
| }; |
| #define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1) |
| |
| /** |
| * enum nft_expr_attributes - nf_tables expression netlink attributes |
| * |
| * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING) |
| * @NFTA_EXPR_DATA: type specific data (NLA_NESTED) |
| */ |
| enum nft_expr_attributes { |
| NFTA_EXPR_UNSPEC, |
| NFTA_EXPR_NAME, |
| NFTA_EXPR_DATA, |
| __NFTA_EXPR_MAX |
| }; |
| #define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1) |
| |
| /** |
| * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes |
| * |
| * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32) |
| * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes) |
| */ |
| enum nft_immediate_attributes { |
| NFTA_IMMEDIATE_UNSPEC, |
| NFTA_IMMEDIATE_DREG, |
| NFTA_IMMEDIATE_DATA, |
| __NFTA_IMMEDIATE_MAX |
| }; |
| #define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1) |
| |
| /** |
| * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes |
| * |
| * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers) |
| * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers) |
| * @NFTA_BITWISE_LEN: length of operands (NLA_U32) |
| * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes) |
| * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes) |
| * |
| * The bitwise expression performs the following operation: |
| * |
| * dreg = (sreg & mask) ^ xor |
| * |
| * which allow to express all bitwise operations: |
| * |
| * mask xor |
| * NOT: 1 1 |
| * OR: 0 x |
| * XOR: 1 x |
| * AND: x 0 |
| */ |
| enum nft_bitwise_attributes { |
| NFTA_BITWISE_UNSPEC, |
| NFTA_BITWISE_SREG, |
| NFTA_BITWISE_DREG, |
| NFTA_BITWISE_LEN, |
| NFTA_BITWISE_MASK, |
| NFTA_BITWISE_XOR, |
| __NFTA_BITWISE_MAX |
| }; |
| #define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1) |
| |
| /** |
| * enum nft_byteorder_ops - nf_tables byteorder operators |
| * |
| * @NFT_BYTEORDER_NTOH: network to host operator |
| * @NFT_BYTEORDER_HTON: host to network opertaor |
| */ |
| enum nft_byteorder_ops { |
| NFT_BYTEORDER_NTOH, |
| NFT_BYTEORDER_HTON, |
| }; |
| |
| /** |
| * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes |
| * |
| * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers) |
| * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers) |
| * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops) |
| * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32) |
| * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4) |
| */ |
| enum nft_byteorder_attributes { |
| NFTA_BYTEORDER_UNSPEC, |
| NFTA_BYTEORDER_SREG, |
| NFTA_BYTEORDER_DREG, |
| NFTA_BYTEORDER_OP, |
| NFTA_BYTEORDER_LEN, |
| NFTA_BYTEORDER_SIZE, |
| __NFTA_BYTEORDER_MAX |
| }; |
| #define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1) |
| |
| /** |
| * enum nft_cmp_ops - nf_tables relational operator |
| * |
| * @NFT_CMP_EQ: equal |
| * @NFT_CMP_NEQ: not equal |
| * @NFT_CMP_LT: less than |
| * @NFT_CMP_LTE: less than or equal to |
| * @NFT_CMP_GT: greater than |
| * @NFT_CMP_GTE: greater than or equal to |
| */ |
| enum nft_cmp_ops { |
| NFT_CMP_EQ, |
| NFT_CMP_NEQ, |
| NFT_CMP_LT, |
| NFT_CMP_LTE, |
| NFT_CMP_GT, |
| NFT_CMP_GTE, |
| }; |
| |
| /** |
| * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes |
| * |
| * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers) |
| * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops) |
| * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes) |
| */ |
| enum nft_cmp_attributes { |
| NFTA_CMP_UNSPEC, |
| NFTA_CMP_SREG, |
| NFTA_CMP_OP, |
| NFTA_CMP_DATA, |
| __NFTA_CMP_MAX |
| }; |
| #define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1) |
| |
| /** |
| * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes |
| * |
| * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING) |
| * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers) |
| * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers) |
| * @NFTA_LOOKUP_SET_ID: uniquely identifies a set in a transaction (NLA_U32) |
| */ |
| enum nft_lookup_attributes { |
| NFTA_LOOKUP_UNSPEC, |
| NFTA_LOOKUP_SET, |
| NFTA_LOOKUP_SREG, |
| NFTA_LOOKUP_DREG, |
| NFTA_LOOKUP_SET_ID, |
| __NFTA_LOOKUP_MAX |
| }; |
| #define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1) |
| |
| enum nft_dynset_ops { |
| NFT_DYNSET_OP_ADD, |
| NFT_DYNSET_OP_UPDATE, |
| }; |
| |
| /** |
| * enum nft_dynset_attributes - dynset expression attributes |
| * |
| * @NFTA_DYNSET_SET_NAME: name of set the to add data to (NLA_STRING) |
| * @NFTA_DYNSET_SET_ID: uniquely identifier of the set in the transaction (NLA_U32) |
| * @NFTA_DYNSET_OP: operation (NLA_U32) |
| * @NFTA_DYNSET_SREG_KEY: source register of the key (NLA_U32) |
| * @NFTA_DYNSET_SREG_DATA: source register of the data (NLA_U32) |
| * @NFTA_DYNSET_TIMEOUT: timeout value for the new element (NLA_U64) |
| * @NFTA_DYNSET_EXPR: expression (NLA_NESTED: nft_expr_attributes) |
| */ |
| enum nft_dynset_attributes { |
| NFTA_DYNSET_UNSPEC, |
| NFTA_DYNSET_SET_NAME, |
| NFTA_DYNSET_SET_ID, |
| NFTA_DYNSET_OP, |
| NFTA_DYNSET_SREG_KEY, |
| NFTA_DYNSET_SREG_DATA, |
| NFTA_DYNSET_TIMEOUT, |
| NFTA_DYNSET_EXPR, |
| __NFTA_DYNSET_MAX, |
| }; |
| #define NFTA_DYNSET_MAX (__NFTA_DYNSET_MAX - 1) |
| |
| /** |
| * enum nft_payload_bases - nf_tables payload expression offset bases |
| * |
| * @NFT_PAYLOAD_LL_HEADER: link layer header |
| * @NFT_PAYLOAD_NETWORK_HEADER: network header |
| * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header |
| */ |
| enum nft_payload_bases { |
| NFT_PAYLOAD_LL_HEADER, |
| NFT_PAYLOAD_NETWORK_HEADER, |
| NFT_PAYLOAD_TRANSPORT_HEADER, |
| }; |
| |
| /** |
| * enum nft_payload_csum_types - nf_tables payload expression checksum types |
| * |
| * @NFT_PAYLOAD_CSUM_NONE: no checksumming |
| * @NFT_PAYLOAD_CSUM_INET: internet checksum (RFC 791) |
| */ |
| enum nft_payload_csum_types { |
| NFT_PAYLOAD_CSUM_NONE, |
| NFT_PAYLOAD_CSUM_INET, |
| }; |
| |
| /** |
| * enum nft_payload_attributes - nf_tables payload expression netlink attributes |
| * |
| * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers) |
| * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases) |
| * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32) |
| * @NFTA_PAYLOAD_LEN: payload length (NLA_U32) |
| * @NFTA_PAYLOAD_SREG: source register to load data from (NLA_U32: nft_registers) |
| * @NFTA_PAYLOAD_CSUM_TYPE: checksum type (NLA_U32) |
| * @NFTA_PAYLOAD_CSUM_OFFSET: checksum offset relative to base (NLA_U32) |
| */ |
| enum nft_payload_attributes { |
| NFTA_PAYLOAD_UNSPEC, |
| NFTA_PAYLOAD_DREG, |
| NFTA_PAYLOAD_BASE, |
| NFTA_PAYLOAD_OFFSET, |
| NFTA_PAYLOAD_LEN, |
| NFTA_PAYLOAD_SREG, |
| NFTA_PAYLOAD_CSUM_TYPE, |
| NFTA_PAYLOAD_CSUM_OFFSET, |
| __NFTA_PAYLOAD_MAX |
| }; |
| #define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1) |
| |
| /** |
| * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes |
| * |
| * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers) |
| * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8) |
| * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32) |
| * @NFTA_EXTHDR_LEN: extension header length (NLA_U32) |
| */ |
| enum nft_exthdr_attributes { |
| NFTA_EXTHDR_UNSPEC, |
| NFTA_EXTHDR_DREG, |
| NFTA_EXTHDR_TYPE, |
| NFTA_EXTHDR_OFFSET, |
| NFTA_EXTHDR_LEN, |
| __NFTA_EXTHDR_MAX |
| }; |
| #define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1) |
| |
| /** |
| * enum nft_meta_keys - nf_tables meta expression keys |
| * |
| * @NFT_META_LEN: packet length (skb->len) |
| * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT |
| * @NFT_META_PRIORITY: packet priority (skb->priority) |
| * @NFT_META_MARK: packet mark (skb->mark) |
| * @NFT_META_IIF: packet input interface index (dev->ifindex) |
| * @NFT_META_OIF: packet output interface index (dev->ifindex) |
| * @NFT_META_IIFNAME: packet input interface name (dev->name) |
| * @NFT_META_OIFNAME: packet output interface name (dev->name) |
| * @NFT_META_IIFTYPE: packet input interface type (dev->type) |
| * @NFT_META_OIFTYPE: packet output interface type (dev->type) |
| * @NFT_META_SKUID: originating socket UID (fsuid) |
| * @NFT_META_SKGID: originating socket GID (fsgid) |
| * @NFT_META_NFTRACE: packet nftrace bit |
| * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid) |
| * @NFT_META_SECMARK: packet secmark (skb->secmark) |
| * @NFT_META_NFPROTO: netfilter protocol |
| * @NFT_META_L4PROTO: layer 4 protocol number |
| * @NFT_META_BRI_IIFNAME: packet input bridge interface name |
| * @NFT_META_BRI_OIFNAME: packet output bridge interface name |
| * @NFT_META_PKTTYPE: packet type (skb->pkt_type), special handling for loopback |
| * @NFT_META_CPU: cpu id through smp_processor_id() |
| * @NFT_META_IIFGROUP: packet input interface group |
| * @NFT_META_OIFGROUP: packet output interface group |
| * @NFT_META_CGROUP: socket control group (skb->sk->sk_classid) |
| * @NFT_META_PRANDOM: a 32bit pseudo-random number |
| */ |
| enum nft_meta_keys { |
| NFT_META_LEN, |
| NFT_META_PROTOCOL, |
| NFT_META_PRIORITY, |
| NFT_META_MARK, |
| NFT_META_IIF, |
| NFT_META_OIF, |
| NFT_META_IIFNAME, |
| NFT_META_OIFNAME, |
| NFT_META_IIFTYPE, |
| NFT_META_OIFTYPE, |
| NFT_META_SKUID, |
| NFT_META_SKGID, |
| NFT_META_NFTRACE, |
| NFT_META_RTCLASSID, |
| NFT_META_SECMARK, |
| NFT_META_NFPROTO, |
| NFT_META_L4PROTO, |
| NFT_META_BRI_IIFNAME, |
| NFT_META_BRI_OIFNAME, |
| NFT_META_PKTTYPE, |
| NFT_META_CPU, |
| NFT_META_IIFGROUP, |
| NFT_META_OIFGROUP, |
| NFT_META_CGROUP, |
| NFT_META_PRANDOM, |
| }; |
| |
| /** |
| * enum nft_meta_attributes - nf_tables meta expression netlink attributes |
| * |
| * @NFTA_META_DREG: destination register (NLA_U32) |
| * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys) |
| * @NFTA_META_SREG: source register (NLA_U32) |
| */ |
| enum nft_meta_attributes { |
| NFTA_META_UNSPEC, |
| NFTA_META_DREG, |
| NFTA_META_KEY, |
| NFTA_META_SREG, |
| __NFTA_META_MAX |
| }; |
| #define NFTA_META_MAX (__NFTA_META_MAX - 1) |
| |
| /** |
| * enum nft_ct_keys - nf_tables ct expression keys |
| * |
| * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info) |
| * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir) |
| * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status) |
| * @NFT_CT_MARK: conntrack mark value |
| * @NFT_CT_SECMARK: conntrack secmark value |
| * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms |
| * @NFT_CT_HELPER: connection tracking helper assigned to conntrack |
| * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol |
| * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address) |
| * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address) |
| * @NFT_CT_PROTOCOL: conntrack layer 4 protocol |
| * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source |
| * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination |
| */ |
| enum nft_ct_keys { |
| NFT_CT_STATE, |
| NFT_CT_DIRECTION, |
| NFT_CT_STATUS, |
| NFT_CT_MARK, |
| NFT_CT_SECMARK, |
| NFT_CT_EXPIRATION, |
| NFT_CT_HELPER, |
| NFT_CT_L3PROTOCOL, |
| NFT_CT_SRC, |
| NFT_CT_DST, |
| NFT_CT_PROTOCOL, |
| NFT_CT_PROTO_SRC, |
| NFT_CT_PROTO_DST, |
| NFT_CT_LABELS, |
| NFT_CT_PKTS, |
| NFT_CT_BYTES, |
| }; |
| |
| /** |
| * enum nft_ct_attributes - nf_tables ct expression netlink attributes |
| * |
| * @NFTA_CT_DREG: destination register (NLA_U32) |
| * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys) |
| * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8) |
| * @NFTA_CT_SREG: source register (NLA_U32) |
| */ |
| enum nft_ct_attributes { |
| NFTA_CT_UNSPEC, |
| NFTA_CT_DREG, |
| NFTA_CT_KEY, |
| NFTA_CT_DIRECTION, |
| NFTA_CT_SREG, |
| __NFTA_CT_MAX |
| }; |
| #define NFTA_CT_MAX (__NFTA_CT_MAX - 1) |
| |
| enum nft_limit_type { |
| NFT_LIMIT_PKTS, |
| NFT_LIMIT_PKT_BYTES |
| }; |
| |
| enum nft_limit_flags { |
| NFT_LIMIT_F_INV = (1 << 0), |
| }; |
| |
| /** |
| * enum nft_limit_attributes - nf_tables limit expression netlink attributes |
| * |
| * @NFTA_LIMIT_RATE: refill rate (NLA_U64) |
| * @NFTA_LIMIT_UNIT: refill unit (NLA_U64) |
| * @NFTA_LIMIT_BURST: burst (NLA_U32) |
| * @NFTA_LIMIT_TYPE: type of limit (NLA_U32: enum nft_limit_type) |
| * @NFTA_LIMIT_FLAGS: flags (NLA_U32: enum nft_limit_flags) |
| */ |
| enum nft_limit_attributes { |
| NFTA_LIMIT_UNSPEC, |
| NFTA_LIMIT_RATE, |
| NFTA_LIMIT_UNIT, |
| NFTA_LIMIT_BURST, |
| NFTA_LIMIT_TYPE, |
| NFTA_LIMIT_FLAGS, |
| __NFTA_LIMIT_MAX |
| }; |
| #define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1) |
| |
| /** |
| * enum nft_counter_attributes - nf_tables counter expression netlink attributes |
| * |
| * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64) |
| * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64) |
| */ |
| enum nft_counter_attributes { |
| NFTA_COUNTER_UNSPEC, |
| NFTA_COUNTER_BYTES, |
| NFTA_COUNTER_PACKETS, |
| __NFTA_COUNTER_MAX |
| }; |
| #define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1) |
| |
| /** |
| * enum nft_log_attributes - nf_tables log expression netlink attributes |
| * |
| * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32) |
| * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING) |
| * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32) |
| * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32) |
| * @NFTA_LOG_LEVEL: log level (NLA_U32) |
| * @NFTA_LOG_FLAGS: logging flags (NLA_U32) |
| */ |
| enum nft_log_attributes { |
| NFTA_LOG_UNSPEC, |
| NFTA_LOG_GROUP, |
| NFTA_LOG_PREFIX, |
| NFTA_LOG_SNAPLEN, |
| NFTA_LOG_QTHRESHOLD, |
| NFTA_LOG_LEVEL, |
| NFTA_LOG_FLAGS, |
| __NFTA_LOG_MAX |
| }; |
| #define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1) |
| |
| /** |
| * enum nft_queue_attributes - nf_tables queue expression netlink attributes |
| * |
| * @NFTA_QUEUE_NUM: netlink queue to send messages to (NLA_U16) |
| * @NFTA_QUEUE_TOTAL: number of queues to load balance packets on (NLA_U16) |
| * @NFTA_QUEUE_FLAGS: various flags (NLA_U16) |
| */ |
| enum nft_queue_attributes { |
| NFTA_QUEUE_UNSPEC, |
| NFTA_QUEUE_NUM, |
| NFTA_QUEUE_TOTAL, |
| NFTA_QUEUE_FLAGS, |
| __NFTA_QUEUE_MAX |
| }; |
| #define NFTA_QUEUE_MAX (__NFTA_QUEUE_MAX - 1) |
| |
| #define NFT_QUEUE_FLAG_BYPASS 0x01 /* for compatibility with v2 */ |
| #define NFT_QUEUE_FLAG_CPU_FANOUT 0x02 /* use current CPU (no hashing) */ |
| #define NFT_QUEUE_FLAG_MASK 0x03 |
| |
| /** |
| * enum nft_reject_types - nf_tables reject expression reject types |
| * |
| * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable |
| * @NFT_REJECT_TCP_RST: reject using TCP RST |
| * @NFT_REJECT_ICMPX_UNREACH: abstracted ICMP unreachable for bridge and inet |
| */ |
| enum nft_reject_types { |
| NFT_REJECT_ICMP_UNREACH, |
| NFT_REJECT_TCP_RST, |
| NFT_REJECT_ICMPX_UNREACH, |
| }; |
| |
| /** |
| * enum nft_reject_code - Generic reject codes for IPv4/IPv6 |
| * |
| * @NFT_REJECT_ICMPX_NO_ROUTE: no route to host / network unreachable |
| * @NFT_REJECT_ICMPX_PORT_UNREACH: port unreachable |
| * @NFT_REJECT_ICMPX_HOST_UNREACH: host unreachable |
| * @NFT_REJECT_ICMPX_ADMIN_PROHIBITED: administratively prohibited |
| * |
| * These codes are mapped to real ICMP and ICMPv6 codes. |
| */ |
| enum nft_reject_inet_code { |
| NFT_REJECT_ICMPX_NO_ROUTE = 0, |
| NFT_REJECT_ICMPX_PORT_UNREACH, |
| NFT_REJECT_ICMPX_HOST_UNREACH, |
| NFT_REJECT_ICMPX_ADMIN_PROHIBITED, |
| __NFT_REJECT_ICMPX_MAX |
| }; |
| #define NFT_REJECT_ICMPX_MAX (__NFT_REJECT_ICMPX_MAX - 1) |
| |
| /** |
| * enum nft_reject_attributes - nf_tables reject expression netlink attributes |
| * |
| * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types) |
| * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8) |
| */ |
| enum nft_reject_attributes { |
| NFTA_REJECT_UNSPEC, |
| NFTA_REJECT_TYPE, |
| NFTA_REJECT_ICMP_CODE, |
| __NFTA_REJECT_MAX |
| }; |
| #define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1) |
| |
| /** |
| * enum nft_nat_types - nf_tables nat expression NAT types |
| * |
| * @NFT_NAT_SNAT: source NAT |
| * @NFT_NAT_DNAT: destination NAT |
| */ |
| enum nft_nat_types { |
| NFT_NAT_SNAT, |
| NFT_NAT_DNAT, |
| }; |
| |
| /** |
| * enum nft_nat_attributes - nf_tables nat expression netlink attributes |
| * |
| * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types) |
| * @NFTA_NAT_FAMILY: NAT family (NLA_U32) |
| * @NFTA_NAT_REG_ADDR_MIN: source register of address range start (NLA_U32: nft_registers) |
| * @NFTA_NAT_REG_ADDR_MAX: source register of address range end (NLA_U32: nft_registers) |
| * @NFTA_NAT_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers) |
| * @NFTA_NAT_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers) |
| * @NFTA_NAT_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32) |
| */ |
| enum nft_nat_attributes { |
| NFTA_NAT_UNSPEC, |
| NFTA_NAT_TYPE, |
| NFTA_NAT_FAMILY, |
| NFTA_NAT_REG_ADDR_MIN, |
| NFTA_NAT_REG_ADDR_MAX, |
| NFTA_NAT_REG_PROTO_MIN, |
| NFTA_NAT_REG_PROTO_MAX, |
| NFTA_NAT_FLAGS, |
| __NFTA_NAT_MAX |
| }; |
| #define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1) |
| |
| /** |
| * enum nft_masq_attributes - nf_tables masquerade expression attributes |
| * |
| * @NFTA_MASQ_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32) |
| * @NFTA_MASQ_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers) |
| * @NFTA_MASQ_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers) |
| */ |
| enum nft_masq_attributes { |
| NFTA_MASQ_UNSPEC, |
| NFTA_MASQ_FLAGS, |
| NFTA_MASQ_REG_PROTO_MIN, |
| NFTA_MASQ_REG_PROTO_MAX, |
| __NFTA_MASQ_MAX |
| }; |
| #define NFTA_MASQ_MAX (__NFTA_MASQ_MAX - 1) |
| |
| /** |
| * enum nft_redir_attributes - nf_tables redirect expression netlink attributes |
| * |
| * @NFTA_REDIR_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers) |
| * @NFTA_REDIR_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers) |
| * @NFTA_REDIR_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32) |
| */ |
| enum nft_redir_attributes { |
| NFTA_REDIR_UNSPEC, |
| NFTA_REDIR_REG_PROTO_MIN, |
| NFTA_REDIR_REG_PROTO_MAX, |
| NFTA_REDIR_FLAGS, |
| __NFTA_REDIR_MAX |
| }; |
| #define NFTA_REDIR_MAX (__NFTA_REDIR_MAX - 1) |
| |
| /** |
| * enum nft_dup_attributes - nf_tables dup expression netlink attributes |
| * |
| * @NFTA_DUP_SREG_ADDR: source register of address (NLA_U32: nft_registers) |
| * @NFTA_DUP_SREG_DEV: source register of output interface (NLA_U32: nft_register) |
| */ |
| enum nft_dup_attributes { |
| NFTA_DUP_UNSPEC, |
| NFTA_DUP_SREG_ADDR, |
| NFTA_DUP_SREG_DEV, |
| __NFTA_DUP_MAX |
| }; |
| #define NFTA_DUP_MAX (__NFTA_DUP_MAX - 1) |
| |
| /** |
| * enum nft_fwd_attributes - nf_tables fwd expression netlink attributes |
| * |
| * @NFTA_FWD_SREG_DEV: source register of output interface (NLA_U32: nft_register) |
| */ |
| enum nft_fwd_attributes { |
| NFTA_FWD_UNSPEC, |
| NFTA_FWD_SREG_DEV, |
| __NFTA_FWD_MAX |
| }; |
| #define NFTA_FWD_MAX (__NFTA_FWD_MAX - 1) |
| |
| /** |
| * enum nft_gen_attributes - nf_tables ruleset generation attributes |
| * |
| * @NFTA_GEN_ID: Ruleset generation ID (NLA_U32) |
| */ |
| enum nft_gen_attributes { |
| NFTA_GEN_UNSPEC, |
| NFTA_GEN_ID, |
| __NFTA_GEN_MAX |
| }; |
| #define NFTA_GEN_MAX (__NFTA_GEN_MAX - 1) |
| |
| /** |
| * enum nft_trace_attributes - nf_tables trace netlink attributes |
| * |
| * @NFTA_TRACE_TABLE: name of the table (NLA_STRING) |
| * @NFTA_TRACE_CHAIN: name of the chain (NLA_STRING) |
| * @NFTA_TRACE_RULE_HANDLE: numeric handle of the rule (NLA_U64) |
| * @NFTA_TRACE_TYPE: type of the event (NLA_U32: nft_trace_types) |
| * @NFTA_TRACE_VERDICT: verdict returned by hook (NLA_NESTED: nft_verdicts) |
| * @NFTA_TRACE_ID: pseudo-id, same for each skb traced (NLA_U32) |
| * @NFTA_TRACE_LL_HEADER: linklayer header (NLA_BINARY) |
| * @NFTA_TRACE_NETWORK_HEADER: network header (NLA_BINARY) |
| * @NFTA_TRACE_TRANSPORT_HEADER: transport header (NLA_BINARY) |
| * @NFTA_TRACE_IIF: indev ifindex (NLA_U32) |
| * @NFTA_TRACE_IIFTYPE: netdev->type of indev (NLA_U16) |
| * @NFTA_TRACE_OIF: outdev ifindex (NLA_U32) |
| * @NFTA_TRACE_OIFTYPE: netdev->type of outdev (NLA_U16) |
| * @NFTA_TRACE_MARK: nfmark (NLA_U32) |
| * @NFTA_TRACE_NFPROTO: nf protocol processed (NLA_U32) |
| * @NFTA_TRACE_POLICY: policy that decided fate of packet (NLA_U32) |
| */ |
| enum nft_trace_attibutes { |
| NFTA_TRACE_UNSPEC, |
| NFTA_TRACE_TABLE, |
| NFTA_TRACE_CHAIN, |
| NFTA_TRACE_RULE_HANDLE, |
| NFTA_TRACE_TYPE, |
| NFTA_TRACE_VERDICT, |
| NFTA_TRACE_ID, |
| NFTA_TRACE_LL_HEADER, |
| NFTA_TRACE_NETWORK_HEADER, |
| NFTA_TRACE_TRANSPORT_HEADER, |
| NFTA_TRACE_IIF, |
| NFTA_TRACE_IIFTYPE, |
| NFTA_TRACE_OIF, |
| NFTA_TRACE_OIFTYPE, |
| NFTA_TRACE_MARK, |
| NFTA_TRACE_NFPROTO, |
| NFTA_TRACE_POLICY, |
| __NFTA_TRACE_MAX |
| }; |
| #define NFTA_TRACE_MAX (__NFTA_TRACE_MAX - 1) |
| |
| enum nft_trace_types { |
| NFT_TRACETYPE_UNSPEC, |
| NFT_TRACETYPE_POLICY, |
| NFT_TRACETYPE_RETURN, |
| NFT_TRACETYPE_RULE, |
| __NFT_TRACETYPE_MAX |
| }; |
| #define NFT_TRACETYPE_MAX (__NFT_TRACETYPE_MAX - 1) |
| #endif /* _LINUX_NF_TABLES_H */ |