blob: 660231363bb583f84fb34ebbeb217cbfb81ff433 [file] [log] [blame]
Patrick McHardy96518512013-10-14 11:00:02 +02001#ifndef _LINUX_NF_TABLES_H
2#define _LINUX_NF_TABLES_H
3
Pablo Neira Ayuso1cae5652015-03-05 15:05:36 +01004#define NFT_TABLE_MAXNAMELEN 32
Pablo Neira Ayuso0768b3b2014-02-19 17:27:06 +01005#define NFT_CHAIN_MAXNAMELEN 32
6#define NFT_USERDATA_MAXLEN 256
Patrick McHardy96518512013-10-14 11:00:02 +02007
Patrick McHardy49499c32015-04-11 02:27:37 +01008/**
9 * enum nft_registers - nf_tables registers
10 *
11 * nf_tables used to have five registers: a verdict register and four data
12 * registers of size 16. The data registers have been changed to 16 registers
13 * of size 4. For compatibility reasons, the NFT_REG_[1-4] registers still
14 * map to areas of size 16, the 4 byte registers are addressed using
15 * NFT_REG32_00 - NFT_REG32_15.
16 */
Patrick McHardy96518512013-10-14 11:00:02 +020017enum nft_registers {
18 NFT_REG_VERDICT,
19 NFT_REG_1,
20 NFT_REG_2,
21 NFT_REG_3,
22 NFT_REG_4,
Patrick McHardy49499c32015-04-11 02:27:37 +010023 __NFT_REG_MAX,
24
25 NFT_REG32_00 = 8,
26 MFT_REG32_01,
27 NFT_REG32_02,
28 NFT_REG32_03,
29 NFT_REG32_04,
30 NFT_REG32_05,
31 NFT_REG32_06,
32 NFT_REG32_07,
33 NFT_REG32_08,
34 NFT_REG32_09,
35 NFT_REG32_10,
36 NFT_REG32_11,
37 NFT_REG32_12,
38 NFT_REG32_13,
39 NFT_REG32_14,
40 NFT_REG32_15,
Patrick McHardy96518512013-10-14 11:00:02 +020041};
42#define NFT_REG_MAX (__NFT_REG_MAX - 1)
43
Patrick McHardy49499c32015-04-11 02:27:37 +010044#define NFT_REG_SIZE 16
45#define NFT_REG32_SIZE 4
46
Patrick McHardy96518512013-10-14 11:00:02 +020047/**
48 * enum nft_verdicts - nf_tables internal verdicts
49 *
50 * @NFT_CONTINUE: continue evaluation of the current rule
51 * @NFT_BREAK: terminate evaluation of the current rule
52 * @NFT_JUMP: push the current chain on the jump stack and jump to a chain
53 * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack
54 * @NFT_RETURN: return to the topmost chain on the jump stack
55 *
56 * The nf_tables verdicts share their numeric space with the netfilter verdicts.
57 */
58enum nft_verdicts {
59 NFT_CONTINUE = -1,
60 NFT_BREAK = -2,
61 NFT_JUMP = -3,
62 NFT_GOTO = -4,
63 NFT_RETURN = -5,
64};
65
66/**
67 * enum nf_tables_msg_types - nf_tables netlink message types
68 *
69 * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes)
70 * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes)
71 * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes)
72 * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes)
73 * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes)
74 * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes)
75 * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes)
76 * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes)
77 * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes)
Patrick McHardy20a69342013-10-11 12:06:22 +020078 * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes)
79 * @NFT_MSG_GETSET: get a set (enum nft_set_attributes)
80 * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes)
81 * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes)
82 * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes)
83 * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes)
Pablo Neira Ayuso84d7fce2014-09-04 14:30:22 +020084 * @NFT_MSG_NEWGEN: announce a new generation, only for events (enum nft_gen_attributes)
85 * @NFT_MSG_GETGEN: get the rule-set generation (enum nft_gen_attributes)
Florian Westphal33d5a7b2015-11-28 21:53:04 +010086 * @NFT_MSG_TRACE: trace event (enum nft_trace_attributes)
Patrick McHardy96518512013-10-14 11:00:02 +020087 */
88enum nf_tables_msg_types {
89 NFT_MSG_NEWTABLE,
90 NFT_MSG_GETTABLE,
91 NFT_MSG_DELTABLE,
92 NFT_MSG_NEWCHAIN,
93 NFT_MSG_GETCHAIN,
94 NFT_MSG_DELCHAIN,
95 NFT_MSG_NEWRULE,
96 NFT_MSG_GETRULE,
97 NFT_MSG_DELRULE,
Patrick McHardy20a69342013-10-11 12:06:22 +020098 NFT_MSG_NEWSET,
99 NFT_MSG_GETSET,
100 NFT_MSG_DELSET,
101 NFT_MSG_NEWSETELEM,
102 NFT_MSG_GETSETELEM,
103 NFT_MSG_DELSETELEM,
Pablo Neira Ayuso84d7fce2014-09-04 14:30:22 +0200104 NFT_MSG_NEWGEN,
105 NFT_MSG_GETGEN,
Florian Westphal33d5a7b2015-11-28 21:53:04 +0100106 NFT_MSG_TRACE,
Patrick McHardy96518512013-10-14 11:00:02 +0200107 NFT_MSG_MAX,
108};
109
Patrick McHardy20a69342013-10-11 12:06:22 +0200110/**
111 * enum nft_list_attributes - nf_tables generic list netlink attributes
112 *
113 * @NFTA_LIST_ELEM: list element (NLA_NESTED)
114 */
Patrick McHardy96518512013-10-14 11:00:02 +0200115enum nft_list_attributes {
116 NFTA_LIST_UNPEC,
117 NFTA_LIST_ELEM,
118 __NFTA_LIST_MAX
119};
120#define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1)
121
122/**
123 * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes
124 *
125 * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32)
126 * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32)
Pablo Neira Ayuso2cbce132015-06-12 13:55:41 +0200127 * @NFTA_HOOK_DEV: netdevice name (NLA_STRING)
Patrick McHardy96518512013-10-14 11:00:02 +0200128 */
129enum nft_hook_attributes {
130 NFTA_HOOK_UNSPEC,
131 NFTA_HOOK_HOOKNUM,
132 NFTA_HOOK_PRIORITY,
Pablo Neira Ayuso2cbce132015-06-12 13:55:41 +0200133 NFTA_HOOK_DEV,
Patrick McHardy96518512013-10-14 11:00:02 +0200134 __NFTA_HOOK_MAX
135};
136#define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1)
137
138/**
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200139 * enum nft_table_flags - nf_tables table flags
140 *
141 * @NFT_TABLE_F_DORMANT: this table is not active
142 */
143enum nft_table_flags {
144 NFT_TABLE_F_DORMANT = 0x1,
145};
146
147/**
Patrick McHardy96518512013-10-14 11:00:02 +0200148 * enum nft_table_attributes - nf_tables table netlink attributes
149 *
150 * @NFTA_TABLE_NAME: name of the table (NLA_STRING)
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200151 * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32)
Tomasz Bursztykad8bcc7682013-12-12 15:00:42 +0200152 * @NFTA_TABLE_USE: number of chains in this table (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200153 */
154enum nft_table_attributes {
155 NFTA_TABLE_UNSPEC,
156 NFTA_TABLE_NAME,
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200157 NFTA_TABLE_FLAGS,
Tomasz Bursztykad8bcc7682013-12-12 15:00:42 +0200158 NFTA_TABLE_USE,
Patrick McHardy96518512013-10-14 11:00:02 +0200159 __NFTA_TABLE_MAX
160};
161#define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1)
162
163/**
164 * enum nft_chain_attributes - nf_tables chain netlink attributes
165 *
166 * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING)
167 * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64)
168 * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING)
169 * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200170 * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32)
171 * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32)
Pablo Neira Ayuso93707612013-10-10 23:21:26 +0200172 * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200173 * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes)
Patrick McHardy96518512013-10-14 11:00:02 +0200174 */
175enum nft_chain_attributes {
176 NFTA_CHAIN_UNSPEC,
177 NFTA_CHAIN_TABLE,
178 NFTA_CHAIN_HANDLE,
179 NFTA_CHAIN_NAME,
180 NFTA_CHAIN_HOOK,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200181 NFTA_CHAIN_POLICY,
182 NFTA_CHAIN_USE,
Pablo Neira Ayuso93707612013-10-10 23:21:26 +0200183 NFTA_CHAIN_TYPE,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200184 NFTA_CHAIN_COUNTERS,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +0200185 NFTA_CHAIN_PAD,
Patrick McHardy96518512013-10-14 11:00:02 +0200186 __NFTA_CHAIN_MAX
187};
188#define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1)
189
190/**
191 * enum nft_rule_attributes - nf_tables rule netlink attributes
192 *
193 * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING)
194 * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING)
195 * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64)
196 * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200197 * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes)
Eric Leblond5e948462013-10-10 13:41:44 +0200198 * @NFTA_RULE_POSITION: numeric handle of the previous rule (NLA_U64)
Pablo Neira Ayuso0768b3b2014-02-19 17:27:06 +0100199 * @NFTA_RULE_USERDATA: user data (NLA_BINARY, NFT_USERDATA_MAXLEN)
Patrick McHardy96518512013-10-14 11:00:02 +0200200 */
201enum nft_rule_attributes {
202 NFTA_RULE_UNSPEC,
203 NFTA_RULE_TABLE,
204 NFTA_RULE_CHAIN,
205 NFTA_RULE_HANDLE,
206 NFTA_RULE_EXPRESSIONS,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200207 NFTA_RULE_COMPAT,
Eric Leblond5e948462013-10-10 13:41:44 +0200208 NFTA_RULE_POSITION,
Pablo Neira Ayuso0768b3b2014-02-19 17:27:06 +0100209 NFTA_RULE_USERDATA,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +0200210 NFTA_RULE_PAD,
Patrick McHardy96518512013-10-14 11:00:02 +0200211 __NFTA_RULE_MAX
212};
213#define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1)
214
Patrick McHardy20a69342013-10-11 12:06:22 +0200215/**
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200216 * enum nft_rule_compat_flags - nf_tables rule compat flags
217 *
218 * @NFT_RULE_COMPAT_F_INV: invert the check result
219 */
220enum nft_rule_compat_flags {
221 NFT_RULE_COMPAT_F_INV = (1 << 1),
222 NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV,
223};
224
225/**
226 * enum nft_rule_compat_attributes - nf_tables rule compat attributes
227 *
228 * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32)
229 * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32)
230 */
231enum nft_rule_compat_attributes {
232 NFTA_RULE_COMPAT_UNSPEC,
233 NFTA_RULE_COMPAT_PROTO,
234 NFTA_RULE_COMPAT_FLAGS,
235 __NFTA_RULE_COMPAT_MAX
236};
237#define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1)
238
239/**
Patrick McHardy20a69342013-10-11 12:06:22 +0200240 * enum nft_set_flags - nf_tables set flags
241 *
242 * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink
243 * @NFT_SET_CONSTANT: set contents may not change while bound
244 * @NFT_SET_INTERVAL: set contains intervals
245 * @NFT_SET_MAP: set is used as a dictionary
Patrick McHardy761da292015-03-26 12:39:36 +0000246 * @NFT_SET_TIMEOUT: set uses timeouts
Patrick McHardy7c6c6e92015-04-11 10:46:41 +0100247 * @NFT_SET_EVAL: set contains expressions for evaluation
Patrick McHardy20a69342013-10-11 12:06:22 +0200248 */
249enum nft_set_flags {
250 NFT_SET_ANONYMOUS = 0x1,
251 NFT_SET_CONSTANT = 0x2,
252 NFT_SET_INTERVAL = 0x4,
253 NFT_SET_MAP = 0x8,
Patrick McHardy761da292015-03-26 12:39:36 +0000254 NFT_SET_TIMEOUT = 0x10,
Patrick McHardy7c6c6e92015-04-11 10:46:41 +0100255 NFT_SET_EVAL = 0x20,
Patrick McHardy20a69342013-10-11 12:06:22 +0200256};
257
258/**
Patrick McHardyc50b9602014-03-28 10:19:47 +0000259 * enum nft_set_policies - set selection policy
260 *
261 * @NFT_SET_POL_PERFORMANCE: prefer high performance over low memory use
262 * @NFT_SET_POL_MEMORY: prefer low memory use over high performance
263 */
264enum nft_set_policies {
265 NFT_SET_POL_PERFORMANCE,
266 NFT_SET_POL_MEMORY,
267};
268
269/**
270 * enum nft_set_desc_attributes - set element description
271 *
272 * @NFTA_SET_DESC_SIZE: number of elements in set (NLA_U32)
273 */
274enum nft_set_desc_attributes {
275 NFTA_SET_DESC_UNSPEC,
276 NFTA_SET_DESC_SIZE,
277 __NFTA_SET_DESC_MAX
278};
279#define NFTA_SET_DESC_MAX (__NFTA_SET_DESC_MAX - 1)
280
281/**
Patrick McHardy20a69342013-10-11 12:06:22 +0200282 * enum nft_set_attributes - nf_tables set netlink attributes
283 *
284 * @NFTA_SET_TABLE: table name (NLA_STRING)
285 * @NFTA_SET_NAME: set name (NLA_STRING)
286 * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32)
287 * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32)
288 * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
289 * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
290 * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
Patrick McHardyc50b9602014-03-28 10:19:47 +0000291 * @NFTA_SET_POLICY: selection policy (NLA_U32)
292 * @NFTA_SET_DESC: set description (NLA_NESTED)
Pablo Neira Ayuso958bee12014-04-03 11:48:44 +0200293 * @NFTA_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
Patrick McHardy761da292015-03-26 12:39:36 +0000294 * @NFTA_SET_TIMEOUT: default timeout value (NLA_U64)
295 * @NFTA_SET_GC_INTERVAL: garbage collection interval (NLA_U32)
Carlos Falgueras Garcíae6d8eca2016-01-05 14:03:32 +0100296 * @NFTA_SET_USERDATA: user data (NLA_BINARY)
Patrick McHardy20a69342013-10-11 12:06:22 +0200297 */
298enum nft_set_attributes {
299 NFTA_SET_UNSPEC,
300 NFTA_SET_TABLE,
301 NFTA_SET_NAME,
302 NFTA_SET_FLAGS,
303 NFTA_SET_KEY_TYPE,
304 NFTA_SET_KEY_LEN,
305 NFTA_SET_DATA_TYPE,
306 NFTA_SET_DATA_LEN,
Patrick McHardyc50b9602014-03-28 10:19:47 +0000307 NFTA_SET_POLICY,
308 NFTA_SET_DESC,
Pablo Neira Ayuso958bee12014-04-03 11:48:44 +0200309 NFTA_SET_ID,
Patrick McHardy761da292015-03-26 12:39:36 +0000310 NFTA_SET_TIMEOUT,
311 NFTA_SET_GC_INTERVAL,
Carlos Falgueras Garcíae6d8eca2016-01-05 14:03:32 +0100312 NFTA_SET_USERDATA,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +0200313 NFTA_SET_PAD,
Patrick McHardy20a69342013-10-11 12:06:22 +0200314 __NFTA_SET_MAX
315};
316#define NFTA_SET_MAX (__NFTA_SET_MAX - 1)
317
318/**
319 * enum nft_set_elem_flags - nf_tables set element flags
320 *
321 * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval
322 */
323enum nft_set_elem_flags {
324 NFT_SET_ELEM_INTERVAL_END = 0x1,
325};
326
327/**
328 * enum nft_set_elem_attributes - nf_tables set element netlink attributes
329 *
330 * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)
331 * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)
332 * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)
Patrick McHardyc3e1b002015-03-26 12:39:37 +0000333 * @NFTA_SET_ELEM_TIMEOUT: timeout value (NLA_U64)
334 * @NFTA_SET_ELEM_EXPIRATION: expiration time (NLA_U64)
Patrick McHardy68e942e2015-04-05 14:43:38 +0200335 * @NFTA_SET_ELEM_USERDATA: user data (NLA_BINARY)
Patrick McHardyf25ad2e2015-04-11 10:46:39 +0100336 * @NFTA_SET_ELEM_EXPR: expression (NLA_NESTED: nft_expr_attributes)
Patrick McHardy20a69342013-10-11 12:06:22 +0200337 */
338enum nft_set_elem_attributes {
339 NFTA_SET_ELEM_UNSPEC,
340 NFTA_SET_ELEM_KEY,
341 NFTA_SET_ELEM_DATA,
342 NFTA_SET_ELEM_FLAGS,
Patrick McHardyc3e1b002015-03-26 12:39:37 +0000343 NFTA_SET_ELEM_TIMEOUT,
344 NFTA_SET_ELEM_EXPIRATION,
Patrick McHardy68e942e2015-04-05 14:43:38 +0200345 NFTA_SET_ELEM_USERDATA,
Patrick McHardyf25ad2e2015-04-11 10:46:39 +0100346 NFTA_SET_ELEM_EXPR,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +0200347 NFTA_SET_ELEM_PAD,
Patrick McHardy20a69342013-10-11 12:06:22 +0200348 __NFTA_SET_ELEM_MAX
349};
350#define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1)
351
352/**
353 * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes
354 *
355 * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING)
356 * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING)
357 * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes)
Pablo Neira Ayuso958bee12014-04-03 11:48:44 +0200358 * @NFTA_SET_ELEM_LIST_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
Patrick McHardy20a69342013-10-11 12:06:22 +0200359 */
360enum nft_set_elem_list_attributes {
361 NFTA_SET_ELEM_LIST_UNSPEC,
362 NFTA_SET_ELEM_LIST_TABLE,
363 NFTA_SET_ELEM_LIST_SET,
364 NFTA_SET_ELEM_LIST_ELEMENTS,
Pablo Neira Ayuso958bee12014-04-03 11:48:44 +0200365 NFTA_SET_ELEM_LIST_SET_ID,
Patrick McHardy20a69342013-10-11 12:06:22 +0200366 __NFTA_SET_ELEM_LIST_MAX
367};
368#define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1)
369
370/**
371 * enum nft_data_types - nf_tables data types
372 *
373 * @NFT_DATA_VALUE: generic data
374 * @NFT_DATA_VERDICT: netfilter verdict
375 *
376 * The type of data is usually determined by the kernel directly and is not
377 * explicitly specified by userspace. The only difference are sets, where
378 * userspace specifies the key and mapping data types.
379 *
380 * The values 0xffffff00-0xffffffff are reserved for internally used types.
381 * The remaining range can be freely used by userspace to encode types, all
382 * values are equivalent to NFT_DATA_VALUE.
383 */
384enum nft_data_types {
385 NFT_DATA_VALUE,
386 NFT_DATA_VERDICT = 0xffffff00U,
387};
388
389#define NFT_DATA_RESERVED_MASK 0xffffff00U
390
391/**
392 * enum nft_data_attributes - nf_tables data netlink attributes
393 *
394 * @NFTA_DATA_VALUE: generic data (NLA_BINARY)
395 * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes)
396 */
Patrick McHardy96518512013-10-14 11:00:02 +0200397enum nft_data_attributes {
398 NFTA_DATA_UNSPEC,
399 NFTA_DATA_VALUE,
400 NFTA_DATA_VERDICT,
401 __NFTA_DATA_MAX
402};
403#define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1)
404
Patrick McHardy7d740262015-04-11 02:27:39 +0100405/* Maximum length of a value */
406#define NFT_DATA_VALUE_MAXLEN 64
407
Patrick McHardy96518512013-10-14 11:00:02 +0200408/**
409 * enum nft_verdict_attributes - nf_tables verdict netlink attributes
410 *
411 * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts)
412 * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING)
413 */
414enum nft_verdict_attributes {
415 NFTA_VERDICT_UNSPEC,
416 NFTA_VERDICT_CODE,
417 NFTA_VERDICT_CHAIN,
418 __NFTA_VERDICT_MAX
419};
420#define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1)
421
422/**
423 * enum nft_expr_attributes - nf_tables expression netlink attributes
424 *
425 * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING)
426 * @NFTA_EXPR_DATA: type specific data (NLA_NESTED)
427 */
428enum nft_expr_attributes {
429 NFTA_EXPR_UNSPEC,
430 NFTA_EXPR_NAME,
431 NFTA_EXPR_DATA,
432 __NFTA_EXPR_MAX
433};
434#define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1)
435
436/**
437 * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes
438 *
439 * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32)
440 * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes)
441 */
442enum nft_immediate_attributes {
443 NFTA_IMMEDIATE_UNSPEC,
444 NFTA_IMMEDIATE_DREG,
445 NFTA_IMMEDIATE_DATA,
446 __NFTA_IMMEDIATE_MAX
447};
448#define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1)
449
450/**
451 * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes
452 *
453 * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers)
454 * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers)
455 * @NFTA_BITWISE_LEN: length of operands (NLA_U32)
456 * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes)
457 * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes)
458 *
459 * The bitwise expression performs the following operation:
460 *
461 * dreg = (sreg & mask) ^ xor
462 *
463 * which allow to express all bitwise operations:
464 *
465 * mask xor
466 * NOT: 1 1
467 * OR: 0 x
468 * XOR: 1 x
469 * AND: x 0
470 */
471enum nft_bitwise_attributes {
472 NFTA_BITWISE_UNSPEC,
473 NFTA_BITWISE_SREG,
474 NFTA_BITWISE_DREG,
475 NFTA_BITWISE_LEN,
476 NFTA_BITWISE_MASK,
477 NFTA_BITWISE_XOR,
478 __NFTA_BITWISE_MAX
479};
480#define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1)
481
482/**
483 * enum nft_byteorder_ops - nf_tables byteorder operators
484 *
485 * @NFT_BYTEORDER_NTOH: network to host operator
486 * @NFT_BYTEORDER_HTON: host to network opertaor
487 */
488enum nft_byteorder_ops {
489 NFT_BYTEORDER_NTOH,
490 NFT_BYTEORDER_HTON,
491};
492
493/**
494 * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes
495 *
496 * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers)
497 * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers)
498 * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops)
499 * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32)
500 * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4)
501 */
502enum nft_byteorder_attributes {
503 NFTA_BYTEORDER_UNSPEC,
504 NFTA_BYTEORDER_SREG,
505 NFTA_BYTEORDER_DREG,
506 NFTA_BYTEORDER_OP,
507 NFTA_BYTEORDER_LEN,
508 NFTA_BYTEORDER_SIZE,
509 __NFTA_BYTEORDER_MAX
510};
511#define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1)
512
513/**
514 * enum nft_cmp_ops - nf_tables relational operator
515 *
516 * @NFT_CMP_EQ: equal
517 * @NFT_CMP_NEQ: not equal
518 * @NFT_CMP_LT: less than
519 * @NFT_CMP_LTE: less than or equal to
520 * @NFT_CMP_GT: greater than
521 * @NFT_CMP_GTE: greater than or equal to
522 */
523enum nft_cmp_ops {
524 NFT_CMP_EQ,
525 NFT_CMP_NEQ,
526 NFT_CMP_LT,
527 NFT_CMP_LTE,
528 NFT_CMP_GT,
529 NFT_CMP_GTE,
530};
531
532/**
533 * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes
534 *
535 * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers)
536 * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops)
537 * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes)
538 */
539enum nft_cmp_attributes {
540 NFTA_CMP_UNSPEC,
541 NFTA_CMP_SREG,
542 NFTA_CMP_OP,
543 NFTA_CMP_DATA,
544 __NFTA_CMP_MAX
545};
546#define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1)
547
Patrick McHardy20a69342013-10-11 12:06:22 +0200548/**
549 * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes
550 *
551 * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING)
552 * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers)
553 * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers)
Pablo Neira Ayuso958bee12014-04-03 11:48:44 +0200554 * @NFTA_LOOKUP_SET_ID: uniquely identifies a set in a transaction (NLA_U32)
Patrick McHardy20a69342013-10-11 12:06:22 +0200555 */
556enum nft_lookup_attributes {
557 NFTA_LOOKUP_UNSPEC,
558 NFTA_LOOKUP_SET,
559 NFTA_LOOKUP_SREG,
560 NFTA_LOOKUP_DREG,
Pablo Neira Ayuso958bee12014-04-03 11:48:44 +0200561 NFTA_LOOKUP_SET_ID,
Patrick McHardy20a69342013-10-11 12:06:22 +0200562 __NFTA_LOOKUP_MAX
Patrick McHardy96518512013-10-14 11:00:02 +0200563};
Patrick McHardy20a69342013-10-11 12:06:22 +0200564#define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1)
Patrick McHardy96518512013-10-14 11:00:02 +0200565
Patrick McHardy22fe54d2015-04-05 14:41:08 +0200566enum nft_dynset_ops {
567 NFT_DYNSET_OP_ADD,
568 NFT_DYNSET_OP_UPDATE,
569};
570
571/**
572 * enum nft_dynset_attributes - dynset expression attributes
573 *
574 * @NFTA_DYNSET_SET_NAME: name of set the to add data to (NLA_STRING)
575 * @NFTA_DYNSET_SET_ID: uniquely identifier of the set in the transaction (NLA_U32)
576 * @NFTA_DYNSET_OP: operation (NLA_U32)
577 * @NFTA_DYNSET_SREG_KEY: source register of the key (NLA_U32)
578 * @NFTA_DYNSET_SREG_DATA: source register of the data (NLA_U32)
579 * @NFTA_DYNSET_TIMEOUT: timeout value for the new element (NLA_U64)
Patrick McHardy3e135cd2015-04-11 10:46:42 +0100580 * @NFTA_DYNSET_EXPR: expression (NLA_NESTED: nft_expr_attributes)
Patrick McHardy22fe54d2015-04-05 14:41:08 +0200581 */
582enum nft_dynset_attributes {
583 NFTA_DYNSET_UNSPEC,
584 NFTA_DYNSET_SET_NAME,
585 NFTA_DYNSET_SET_ID,
586 NFTA_DYNSET_OP,
587 NFTA_DYNSET_SREG_KEY,
588 NFTA_DYNSET_SREG_DATA,
589 NFTA_DYNSET_TIMEOUT,
Patrick McHardy3e135cd2015-04-11 10:46:42 +0100590 NFTA_DYNSET_EXPR,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +0200591 NFTA_DYNSET_PAD,
Patrick McHardy22fe54d2015-04-05 14:41:08 +0200592 __NFTA_DYNSET_MAX,
593};
594#define NFTA_DYNSET_MAX (__NFTA_DYNSET_MAX - 1)
595
Patrick McHardy96518512013-10-14 11:00:02 +0200596/**
597 * enum nft_payload_bases - nf_tables payload expression offset bases
598 *
599 * @NFT_PAYLOAD_LL_HEADER: link layer header
600 * @NFT_PAYLOAD_NETWORK_HEADER: network header
601 * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header
602 */
603enum nft_payload_bases {
604 NFT_PAYLOAD_LL_HEADER,
605 NFT_PAYLOAD_NETWORK_HEADER,
606 NFT_PAYLOAD_TRANSPORT_HEADER,
607};
608
609/**
Patrick McHardy7ec3f7b2015-11-24 10:00:22 +0000610 * enum nft_payload_csum_types - nf_tables payload expression checksum types
611 *
612 * @NFT_PAYLOAD_CSUM_NONE: no checksumming
613 * @NFT_PAYLOAD_CSUM_INET: internet checksum (RFC 791)
614 */
615enum nft_payload_csum_types {
616 NFT_PAYLOAD_CSUM_NONE,
617 NFT_PAYLOAD_CSUM_INET,
618};
619
620/**
Patrick McHardy96518512013-10-14 11:00:02 +0200621 * enum nft_payload_attributes - nf_tables payload expression netlink attributes
622 *
623 * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers)
624 * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases)
625 * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32)
626 * @NFTA_PAYLOAD_LEN: payload length (NLA_U32)
Patrick McHardy7ec3f7b2015-11-24 10:00:22 +0000627 * @NFTA_PAYLOAD_SREG: source register to load data from (NLA_U32: nft_registers)
628 * @NFTA_PAYLOAD_CSUM_TYPE: checksum type (NLA_U32)
629 * @NFTA_PAYLOAD_CSUM_OFFSET: checksum offset relative to base (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200630 */
631enum nft_payload_attributes {
632 NFTA_PAYLOAD_UNSPEC,
633 NFTA_PAYLOAD_DREG,
634 NFTA_PAYLOAD_BASE,
635 NFTA_PAYLOAD_OFFSET,
636 NFTA_PAYLOAD_LEN,
Patrick McHardy7ec3f7b2015-11-24 10:00:22 +0000637 NFTA_PAYLOAD_SREG,
638 NFTA_PAYLOAD_CSUM_TYPE,
639 NFTA_PAYLOAD_CSUM_OFFSET,
Patrick McHardy96518512013-10-14 11:00:02 +0200640 __NFTA_PAYLOAD_MAX
641};
642#define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1)
643
644/**
645 * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes
646 *
647 * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers)
648 * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8)
649 * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32)
650 * @NFTA_EXTHDR_LEN: extension header length (NLA_U32)
651 */
652enum nft_exthdr_attributes {
653 NFTA_EXTHDR_UNSPEC,
654 NFTA_EXTHDR_DREG,
655 NFTA_EXTHDR_TYPE,
656 NFTA_EXTHDR_OFFSET,
657 NFTA_EXTHDR_LEN,
658 __NFTA_EXTHDR_MAX
659};
660#define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1)
661
662/**
663 * enum nft_meta_keys - nf_tables meta expression keys
664 *
665 * @NFT_META_LEN: packet length (skb->len)
666 * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT
667 * @NFT_META_PRIORITY: packet priority (skb->priority)
668 * @NFT_META_MARK: packet mark (skb->mark)
669 * @NFT_META_IIF: packet input interface index (dev->ifindex)
670 * @NFT_META_OIF: packet output interface index (dev->ifindex)
671 * @NFT_META_IIFNAME: packet input interface name (dev->name)
672 * @NFT_META_OIFNAME: packet output interface name (dev->name)
673 * @NFT_META_IIFTYPE: packet input interface type (dev->type)
674 * @NFT_META_OIFTYPE: packet output interface type (dev->type)
675 * @NFT_META_SKUID: originating socket UID (fsuid)
676 * @NFT_META_SKGID: originating socket GID (fsgid)
677 * @NFT_META_NFTRACE: packet nftrace bit
678 * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid)
679 * @NFT_META_SECMARK: packet secmark (skb->secmark)
Patrick McHardy124edfa2014-01-03 12:16:17 +0000680 * @NFT_META_NFPROTO: netfilter protocol
Patrick McHardy4566bf22014-01-03 12:16:18 +0000681 * @NFT_META_L4PROTO: layer 4 protocol number
Tomasz Bursztykaf5efc692014-04-14 15:41:28 +0300682 * @NFT_META_BRI_IIFNAME: packet input bridge interface name
683 * @NFT_META_BRI_OIFNAME: packet output bridge interface name
Ana Reye2a093f2014-08-06 13:52:49 +0200684 * @NFT_META_PKTTYPE: packet type (skb->pkt_type), special handling for loopback
Ana Reyafc5be302014-08-24 14:08:36 +0200685 * @NFT_META_CPU: cpu id through smp_processor_id()
Ana Rey3045d762014-09-02 20:36:14 +0200686 * @NFT_META_IIFGROUP: packet input interface group
687 * @NFT_META_OIFGROUP: packet output interface group
Ana Reyce674172014-11-03 18:10:50 +0100688 * @NFT_META_CGROUP: socket control group (skb->sk->sk_classid)
Florian Westphalb07edbe2016-02-16 17:24:08 +0100689 * @NFT_META_PRANDOM: a 32bit pseudo-random number
Patrick McHardy96518512013-10-14 11:00:02 +0200690 */
691enum nft_meta_keys {
692 NFT_META_LEN,
693 NFT_META_PROTOCOL,
694 NFT_META_PRIORITY,
695 NFT_META_MARK,
696 NFT_META_IIF,
697 NFT_META_OIF,
698 NFT_META_IIFNAME,
699 NFT_META_OIFNAME,
700 NFT_META_IIFTYPE,
701 NFT_META_OIFTYPE,
702 NFT_META_SKUID,
703 NFT_META_SKGID,
704 NFT_META_NFTRACE,
705 NFT_META_RTCLASSID,
706 NFT_META_SECMARK,
Patrick McHardy124edfa2014-01-03 12:16:17 +0000707 NFT_META_NFPROTO,
Patrick McHardy4566bf22014-01-03 12:16:18 +0000708 NFT_META_L4PROTO,
Tomasz Bursztykaf5efc692014-04-14 15:41:28 +0300709 NFT_META_BRI_IIFNAME,
710 NFT_META_BRI_OIFNAME,
Ana Reye2a093f2014-08-06 13:52:49 +0200711 NFT_META_PKTTYPE,
Ana Reyafc5be302014-08-24 14:08:36 +0200712 NFT_META_CPU,
Ana Rey3045d762014-09-02 20:36:14 +0200713 NFT_META_IIFGROUP,
714 NFT_META_OIFGROUP,
Ana Reyce674172014-11-03 18:10:50 +0100715 NFT_META_CGROUP,
Florian Westphalb07edbe2016-02-16 17:24:08 +0100716 NFT_META_PRANDOM,
Patrick McHardy96518512013-10-14 11:00:02 +0200717};
718
719/**
720 * enum nft_meta_attributes - nf_tables meta expression netlink attributes
721 *
722 * @NFTA_META_DREG: destination register (NLA_U32)
723 * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys)
Arturo Borrero Gonzaleze035b772013-12-26 16:38:01 +0100724 * @NFTA_META_SREG: source register (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200725 */
726enum nft_meta_attributes {
727 NFTA_META_UNSPEC,
728 NFTA_META_DREG,
729 NFTA_META_KEY,
Arturo Borrero Gonzaleze035b772013-12-26 16:38:01 +0100730 NFTA_META_SREG,
Patrick McHardy96518512013-10-14 11:00:02 +0200731 __NFTA_META_MAX
732};
733#define NFTA_META_MAX (__NFTA_META_MAX - 1)
734
735/**
736 * enum nft_ct_keys - nf_tables ct expression keys
737 *
738 * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info)
739 * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir)
740 * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status)
741 * @NFT_CT_MARK: conntrack mark value
742 * @NFT_CT_SECMARK: conntrack secmark value
743 * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms
744 * @NFT_CT_HELPER: connection tracking helper assigned to conntrack
745 * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol
746 * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address)
747 * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address)
748 * @NFT_CT_PROTOCOL: conntrack layer 4 protocol
749 * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source
750 * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination
751 */
752enum nft_ct_keys {
753 NFT_CT_STATE,
754 NFT_CT_DIRECTION,
755 NFT_CT_STATUS,
756 NFT_CT_MARK,
757 NFT_CT_SECMARK,
758 NFT_CT_EXPIRATION,
759 NFT_CT_HELPER,
760 NFT_CT_L3PROTOCOL,
761 NFT_CT_SRC,
762 NFT_CT_DST,
763 NFT_CT_PROTOCOL,
764 NFT_CT_PROTO_SRC,
765 NFT_CT_PROTO_DST,
Florian Westphald2bf2f32014-02-18 15:25:32 +0100766 NFT_CT_LABELS,
Florian Westphal48f66c92016-01-07 21:34:24 +0100767 NFT_CT_PKTS,
768 NFT_CT_BYTES,
Patrick McHardy96518512013-10-14 11:00:02 +0200769};
770
771/**
772 * enum nft_ct_attributes - nf_tables ct expression netlink attributes
773 *
774 * @NFTA_CT_DREG: destination register (NLA_U32)
775 * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys)
776 * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8)
Kristian Evensenc4ede3d2014-01-07 16:43:54 +0100777 * @NFTA_CT_SREG: source register (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200778 */
779enum nft_ct_attributes {
780 NFTA_CT_UNSPEC,
781 NFTA_CT_DREG,
782 NFTA_CT_KEY,
783 NFTA_CT_DIRECTION,
Kristian Evensenc4ede3d2014-01-07 16:43:54 +0100784 NFTA_CT_SREG,
Patrick McHardy96518512013-10-14 11:00:02 +0200785 __NFTA_CT_MAX
786};
787#define NFTA_CT_MAX (__NFTA_CT_MAX - 1)
788
Pablo Neira Ayusod2168e82015-08-05 12:38:44 +0200789enum nft_limit_type {
790 NFT_LIMIT_PKTS,
791 NFT_LIMIT_PKT_BYTES
792};
793
Pablo Neira Ayusoc7862a52015-12-28 18:21:44 +0100794enum nft_limit_flags {
795 NFT_LIMIT_F_INV = (1 << 0),
796};
797
Patrick McHardy96518512013-10-14 11:00:02 +0200798/**
799 * enum nft_limit_attributes - nf_tables limit expression netlink attributes
800 *
801 * @NFTA_LIMIT_RATE: refill rate (NLA_U64)
802 * @NFTA_LIMIT_UNIT: refill unit (NLA_U64)
Pablo Neira Ayuso3e87baa2015-08-02 18:02:14 +0200803 * @NFTA_LIMIT_BURST: burst (NLA_U32)
Pablo Neira Ayusod2168e82015-08-05 12:38:44 +0200804 * @NFTA_LIMIT_TYPE: type of limit (NLA_U32: enum nft_limit_type)
Pablo Neira Ayusoc7862a52015-12-28 18:21:44 +0100805 * @NFTA_LIMIT_FLAGS: flags (NLA_U32: enum nft_limit_flags)
Patrick McHardy96518512013-10-14 11:00:02 +0200806 */
807enum nft_limit_attributes {
808 NFTA_LIMIT_UNSPEC,
809 NFTA_LIMIT_RATE,
810 NFTA_LIMIT_UNIT,
Pablo Neira Ayuso3e87baa2015-08-02 18:02:14 +0200811 NFTA_LIMIT_BURST,
Pablo Neira Ayusod2168e82015-08-05 12:38:44 +0200812 NFTA_LIMIT_TYPE,
Pablo Neira Ayusoc7862a52015-12-28 18:21:44 +0100813 NFTA_LIMIT_FLAGS,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +0200814 NFTA_LIMIT_PAD,
Patrick McHardy96518512013-10-14 11:00:02 +0200815 __NFTA_LIMIT_MAX
816};
817#define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1)
818
819/**
820 * enum nft_counter_attributes - nf_tables counter expression netlink attributes
821 *
822 * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64)
823 * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64)
824 */
825enum nft_counter_attributes {
826 NFTA_COUNTER_UNSPEC,
827 NFTA_COUNTER_BYTES,
828 NFTA_COUNTER_PACKETS,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +0200829 NFTA_COUNTER_PAD,
Patrick McHardy96518512013-10-14 11:00:02 +0200830 __NFTA_COUNTER_MAX
831};
832#define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1)
833
834/**
835 * enum nft_log_attributes - nf_tables log expression netlink attributes
836 *
837 * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32)
838 * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING)
839 * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32)
840 * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32)
Pablo Neira Ayuso09d27b82014-06-25 13:37:13 +0200841 * @NFTA_LOG_LEVEL: log level (NLA_U32)
842 * @NFTA_LOG_FLAGS: logging flags (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200843 */
844enum nft_log_attributes {
845 NFTA_LOG_UNSPEC,
846 NFTA_LOG_GROUP,
847 NFTA_LOG_PREFIX,
848 NFTA_LOG_SNAPLEN,
849 NFTA_LOG_QTHRESHOLD,
Pablo Neira Ayuso09d27b82014-06-25 13:37:13 +0200850 NFTA_LOG_LEVEL,
851 NFTA_LOG_FLAGS,
Patrick McHardy96518512013-10-14 11:00:02 +0200852 __NFTA_LOG_MAX
853};
854#define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1)
855
856/**
Eric Leblond0aff0782013-12-06 00:24:13 +0100857 * enum nft_queue_attributes - nf_tables queue expression netlink attributes
858 *
859 * @NFTA_QUEUE_NUM: netlink queue to send messages to (NLA_U16)
860 * @NFTA_QUEUE_TOTAL: number of queues to load balance packets on (NLA_U16)
861 * @NFTA_QUEUE_FLAGS: various flags (NLA_U16)
862 */
863enum nft_queue_attributes {
864 NFTA_QUEUE_UNSPEC,
865 NFTA_QUEUE_NUM,
866 NFTA_QUEUE_TOTAL,
867 NFTA_QUEUE_FLAGS,
868 __NFTA_QUEUE_MAX
869};
870#define NFTA_QUEUE_MAX (__NFTA_QUEUE_MAX - 1)
871
872#define NFT_QUEUE_FLAG_BYPASS 0x01 /* for compatibility with v2 */
873#define NFT_QUEUE_FLAG_CPU_FANOUT 0x02 /* use current CPU (no hashing) */
874#define NFT_QUEUE_FLAG_MASK 0x03
875
876/**
Patrick McHardy96518512013-10-14 11:00:02 +0200877 * enum nft_reject_types - nf_tables reject expression reject types
878 *
879 * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable
880 * @NFT_REJECT_TCP_RST: reject using TCP RST
Pablo Neira Ayuso51b0a5d2014-09-26 14:35:14 +0200881 * @NFT_REJECT_ICMPX_UNREACH: abstracted ICMP unreachable for bridge and inet
Patrick McHardy96518512013-10-14 11:00:02 +0200882 */
883enum nft_reject_types {
884 NFT_REJECT_ICMP_UNREACH,
885 NFT_REJECT_TCP_RST,
Pablo Neira Ayuso51b0a5d2014-09-26 14:35:14 +0200886 NFT_REJECT_ICMPX_UNREACH,
Patrick McHardy96518512013-10-14 11:00:02 +0200887};
888
889/**
Pablo Neira Ayuso51b0a5d2014-09-26 14:35:14 +0200890 * enum nft_reject_code - Generic reject codes for IPv4/IPv6
891 *
892 * @NFT_REJECT_ICMPX_NO_ROUTE: no route to host / network unreachable
893 * @NFT_REJECT_ICMPX_PORT_UNREACH: port unreachable
894 * @NFT_REJECT_ICMPX_HOST_UNREACH: host unreachable
895 * @NFT_REJECT_ICMPX_ADMIN_PROHIBITED: administratively prohibited
896 *
897 * These codes are mapped to real ICMP and ICMPv6 codes.
898 */
899enum nft_reject_inet_code {
900 NFT_REJECT_ICMPX_NO_ROUTE = 0,
901 NFT_REJECT_ICMPX_PORT_UNREACH,
902 NFT_REJECT_ICMPX_HOST_UNREACH,
903 NFT_REJECT_ICMPX_ADMIN_PROHIBITED,
904 __NFT_REJECT_ICMPX_MAX
905};
Pablo Neira Ayusof0d1f042014-10-07 19:02:11 +0200906#define NFT_REJECT_ICMPX_MAX (__NFT_REJECT_ICMPX_MAX - 1)
Pablo Neira Ayuso51b0a5d2014-09-26 14:35:14 +0200907
908/**
Patrick McHardy96518512013-10-14 11:00:02 +0200909 * enum nft_reject_attributes - nf_tables reject expression netlink attributes
910 *
911 * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types)
912 * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8)
913 */
914enum nft_reject_attributes {
915 NFTA_REJECT_UNSPEC,
916 NFTA_REJECT_TYPE,
917 NFTA_REJECT_ICMP_CODE,
918 __NFTA_REJECT_MAX
919};
920#define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1)
921
922/**
923 * enum nft_nat_types - nf_tables nat expression NAT types
924 *
925 * @NFT_NAT_SNAT: source NAT
926 * @NFT_NAT_DNAT: destination NAT
927 */
928enum nft_nat_types {
929 NFT_NAT_SNAT,
930 NFT_NAT_DNAT,
931};
932
933/**
934 * enum nft_nat_attributes - nf_tables nat expression netlink attributes
935 *
936 * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types)
Tomasz Bursztykaeb316282013-10-10 13:39:19 +0200937 * @NFTA_NAT_FAMILY: NAT family (NLA_U32)
938 * @NFTA_NAT_REG_ADDR_MIN: source register of address range start (NLA_U32: nft_registers)
939 * @NFTA_NAT_REG_ADDR_MAX: source register of address range end (NLA_U32: nft_registers)
940 * @NFTA_NAT_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
941 * @NFTA_NAT_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
Arturo Borreroe42eff82014-09-04 14:06:14 +0200942 * @NFTA_NAT_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200943 */
944enum nft_nat_attributes {
945 NFTA_NAT_UNSPEC,
946 NFTA_NAT_TYPE,
Tomasz Bursztykaeb316282013-10-10 13:39:19 +0200947 NFTA_NAT_FAMILY,
948 NFTA_NAT_REG_ADDR_MIN,
949 NFTA_NAT_REG_ADDR_MAX,
950 NFTA_NAT_REG_PROTO_MIN,
951 NFTA_NAT_REG_PROTO_MAX,
Arturo Borreroe42eff82014-09-04 14:06:14 +0200952 NFTA_NAT_FLAGS,
Patrick McHardy96518512013-10-14 11:00:02 +0200953 __NFTA_NAT_MAX
954};
955#define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1)
956
Arturo Borrero9ba1f7262014-09-08 13:45:00 +0200957/**
958 * enum nft_masq_attributes - nf_tables masquerade expression attributes
959 *
960 * @NFTA_MASQ_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
Pablo Neira Ayuso8a6bf5d2016-03-01 19:55:14 +0100961 * @NFTA_MASQ_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
962 * @NFTA_MASQ_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
Arturo Borrero9ba1f7262014-09-08 13:45:00 +0200963 */
964enum nft_masq_attributes {
Pablo Neira Ayuso39e393b2014-09-11 11:02:39 +0200965 NFTA_MASQ_UNSPEC,
Arturo Borrero9ba1f7262014-09-08 13:45:00 +0200966 NFTA_MASQ_FLAGS,
Pablo Neira Ayuso8a6bf5d2016-03-01 19:55:14 +0100967 NFTA_MASQ_REG_PROTO_MIN,
968 NFTA_MASQ_REG_PROTO_MAX,
Arturo Borrero9ba1f7262014-09-08 13:45:00 +0200969 __NFTA_MASQ_MAX
970};
971#define NFTA_MASQ_MAX (__NFTA_MASQ_MAX - 1)
972
Pablo Neira Ayuso84d7fce2014-09-04 14:30:22 +0200973/**
Arturo Borreroe9105f12014-10-17 12:39:09 +0200974 * enum nft_redir_attributes - nf_tables redirect expression netlink attributes
975 *
976 * @NFTA_REDIR_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
977 * @NFTA_REDIR_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
978 * @NFTA_REDIR_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
979 */
980enum nft_redir_attributes {
981 NFTA_REDIR_UNSPEC,
982 NFTA_REDIR_REG_PROTO_MIN,
983 NFTA_REDIR_REG_PROTO_MAX,
984 NFTA_REDIR_FLAGS,
985 __NFTA_REDIR_MAX
986};
987#define NFTA_REDIR_MAX (__NFTA_REDIR_MAX - 1)
988
989/**
Pablo Neira Ayusod877f072015-05-31 18:04:11 +0200990 * enum nft_dup_attributes - nf_tables dup expression netlink attributes
991 *
992 * @NFTA_DUP_SREG_ADDR: source register of address (NLA_U32: nft_registers)
993 * @NFTA_DUP_SREG_DEV: source register of output interface (NLA_U32: nft_register)
994 */
995enum nft_dup_attributes {
996 NFTA_DUP_UNSPEC,
997 NFTA_DUP_SREG_ADDR,
998 NFTA_DUP_SREG_DEV,
999 __NFTA_DUP_MAX
1000};
1001#define NFTA_DUP_MAX (__NFTA_DUP_MAX - 1)
1002
1003/**
Pablo Neira Ayuso39e6dea2015-11-25 13:39:38 +01001004 * enum nft_fwd_attributes - nf_tables fwd expression netlink attributes
1005 *
1006 * @NFTA_FWD_SREG_DEV: source register of output interface (NLA_U32: nft_register)
1007 */
1008enum nft_fwd_attributes {
1009 NFTA_FWD_UNSPEC,
1010 NFTA_FWD_SREG_DEV,
1011 __NFTA_FWD_MAX
1012};
1013#define NFTA_FWD_MAX (__NFTA_FWD_MAX - 1)
1014
1015/**
Pablo Neira Ayuso84d7fce2014-09-04 14:30:22 +02001016 * enum nft_gen_attributes - nf_tables ruleset generation attributes
1017 *
1018 * @NFTA_GEN_ID: Ruleset generation ID (NLA_U32)
1019 */
1020enum nft_gen_attributes {
1021 NFTA_GEN_UNSPEC,
1022 NFTA_GEN_ID,
1023 __NFTA_GEN_MAX
1024};
1025#define NFTA_GEN_MAX (__NFTA_GEN_MAX - 1)
1026
Florian Westphal33d5a7b2015-11-28 21:53:04 +01001027/**
1028 * enum nft_trace_attributes - nf_tables trace netlink attributes
1029 *
1030 * @NFTA_TRACE_TABLE: name of the table (NLA_STRING)
1031 * @NFTA_TRACE_CHAIN: name of the chain (NLA_STRING)
1032 * @NFTA_TRACE_RULE_HANDLE: numeric handle of the rule (NLA_U64)
1033 * @NFTA_TRACE_TYPE: type of the event (NLA_U32: nft_trace_types)
1034 * @NFTA_TRACE_VERDICT: verdict returned by hook (NLA_NESTED: nft_verdicts)
1035 * @NFTA_TRACE_ID: pseudo-id, same for each skb traced (NLA_U32)
1036 * @NFTA_TRACE_LL_HEADER: linklayer header (NLA_BINARY)
1037 * @NFTA_TRACE_NETWORK_HEADER: network header (NLA_BINARY)
1038 * @NFTA_TRACE_TRANSPORT_HEADER: transport header (NLA_BINARY)
1039 * @NFTA_TRACE_IIF: indev ifindex (NLA_U32)
1040 * @NFTA_TRACE_IIFTYPE: netdev->type of indev (NLA_U16)
1041 * @NFTA_TRACE_OIF: outdev ifindex (NLA_U32)
1042 * @NFTA_TRACE_OIFTYPE: netdev->type of outdev (NLA_U16)
1043 * @NFTA_TRACE_MARK: nfmark (NLA_U32)
1044 * @NFTA_TRACE_NFPROTO: nf protocol processed (NLA_U32)
1045 * @NFTA_TRACE_POLICY: policy that decided fate of packet (NLA_U32)
1046 */
1047enum nft_trace_attibutes {
1048 NFTA_TRACE_UNSPEC,
1049 NFTA_TRACE_TABLE,
1050 NFTA_TRACE_CHAIN,
1051 NFTA_TRACE_RULE_HANDLE,
1052 NFTA_TRACE_TYPE,
1053 NFTA_TRACE_VERDICT,
1054 NFTA_TRACE_ID,
1055 NFTA_TRACE_LL_HEADER,
1056 NFTA_TRACE_NETWORK_HEADER,
1057 NFTA_TRACE_TRANSPORT_HEADER,
1058 NFTA_TRACE_IIF,
1059 NFTA_TRACE_IIFTYPE,
1060 NFTA_TRACE_OIF,
1061 NFTA_TRACE_OIFTYPE,
1062 NFTA_TRACE_MARK,
1063 NFTA_TRACE_NFPROTO,
1064 NFTA_TRACE_POLICY,
Nicolas Dichtelb46f6de2016-04-22 17:31:18 +02001065 NFTA_TRACE_PAD,
Florian Westphal33d5a7b2015-11-28 21:53:04 +01001066 __NFTA_TRACE_MAX
1067};
1068#define NFTA_TRACE_MAX (__NFTA_TRACE_MAX - 1)
1069
1070enum nft_trace_types {
1071 NFT_TRACETYPE_UNSPEC,
1072 NFT_TRACETYPE_POLICY,
1073 NFT_TRACETYPE_RETURN,
1074 NFT_TRACETYPE_RULE,
1075 __NFT_TRACETYPE_MAX
1076};
1077#define NFT_TRACETYPE_MAX (__NFT_TRACETYPE_MAX - 1)
Patrick McHardy96518512013-10-14 11:00:02 +02001078#endif /* _LINUX_NF_TABLES_H */