Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 1 | #ifndef _LINUX_NF_TABLES_H |
| 2 | #define _LINUX_NF_TABLES_H |
| 3 | |
Pablo Neira Ayuso | 0768b3b | 2014-02-19 17:27:06 +0100 | [diff] [blame] | 4 | #define NFT_CHAIN_MAXNAMELEN 32 |
| 5 | #define NFT_USERDATA_MAXLEN 256 |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 6 | |
| 7 | enum nft_registers { |
| 8 | NFT_REG_VERDICT, |
| 9 | NFT_REG_1, |
| 10 | NFT_REG_2, |
| 11 | NFT_REG_3, |
| 12 | NFT_REG_4, |
| 13 | __NFT_REG_MAX |
| 14 | }; |
| 15 | #define NFT_REG_MAX (__NFT_REG_MAX - 1) |
| 16 | |
| 17 | /** |
| 18 | * enum nft_verdicts - nf_tables internal verdicts |
| 19 | * |
| 20 | * @NFT_CONTINUE: continue evaluation of the current rule |
| 21 | * @NFT_BREAK: terminate evaluation of the current rule |
| 22 | * @NFT_JUMP: push the current chain on the jump stack and jump to a chain |
| 23 | * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack |
| 24 | * @NFT_RETURN: return to the topmost chain on the jump stack |
| 25 | * |
| 26 | * The nf_tables verdicts share their numeric space with the netfilter verdicts. |
| 27 | */ |
| 28 | enum nft_verdicts { |
| 29 | NFT_CONTINUE = -1, |
| 30 | NFT_BREAK = -2, |
| 31 | NFT_JUMP = -3, |
| 32 | NFT_GOTO = -4, |
| 33 | NFT_RETURN = -5, |
| 34 | }; |
| 35 | |
| 36 | /** |
| 37 | * enum nf_tables_msg_types - nf_tables netlink message types |
| 38 | * |
| 39 | * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes) |
| 40 | * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes) |
| 41 | * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes) |
| 42 | * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes) |
| 43 | * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes) |
| 44 | * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes) |
| 45 | * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes) |
| 46 | * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes) |
| 47 | * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes) |
Patrick McHardy | 20a6934 | 2013-10-11 12:06:22 +0200 | [diff] [blame] | 48 | * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes) |
| 49 | * @NFT_MSG_GETSET: get a set (enum nft_set_attributes) |
| 50 | * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes) |
| 51 | * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes) |
| 52 | * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes) |
| 53 | * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 54 | */ |
| 55 | enum nf_tables_msg_types { |
| 56 | NFT_MSG_NEWTABLE, |
| 57 | NFT_MSG_GETTABLE, |
| 58 | NFT_MSG_DELTABLE, |
| 59 | NFT_MSG_NEWCHAIN, |
| 60 | NFT_MSG_GETCHAIN, |
| 61 | NFT_MSG_DELCHAIN, |
| 62 | NFT_MSG_NEWRULE, |
| 63 | NFT_MSG_GETRULE, |
| 64 | NFT_MSG_DELRULE, |
Patrick McHardy | 20a6934 | 2013-10-11 12:06:22 +0200 | [diff] [blame] | 65 | NFT_MSG_NEWSET, |
| 66 | NFT_MSG_GETSET, |
| 67 | NFT_MSG_DELSET, |
| 68 | NFT_MSG_NEWSETELEM, |
| 69 | NFT_MSG_GETSETELEM, |
| 70 | NFT_MSG_DELSETELEM, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 71 | NFT_MSG_MAX, |
| 72 | }; |
| 73 | |
Patrick McHardy | 20a6934 | 2013-10-11 12:06:22 +0200 | [diff] [blame] | 74 | /** |
| 75 | * enum nft_list_attributes - nf_tables generic list netlink attributes |
| 76 | * |
| 77 | * @NFTA_LIST_ELEM: list element (NLA_NESTED) |
| 78 | */ |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 79 | enum nft_list_attributes { |
| 80 | NFTA_LIST_UNPEC, |
| 81 | NFTA_LIST_ELEM, |
| 82 | __NFTA_LIST_MAX |
| 83 | }; |
| 84 | #define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1) |
| 85 | |
| 86 | /** |
| 87 | * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes |
| 88 | * |
| 89 | * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32) |
| 90 | * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32) |
| 91 | */ |
| 92 | enum nft_hook_attributes { |
| 93 | NFTA_HOOK_UNSPEC, |
| 94 | NFTA_HOOK_HOOKNUM, |
| 95 | NFTA_HOOK_PRIORITY, |
| 96 | __NFTA_HOOK_MAX |
| 97 | }; |
| 98 | #define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1) |
| 99 | |
| 100 | /** |
Pablo Neira Ayuso | 9ddf632 | 2013-10-10 13:26:33 +0200 | [diff] [blame] | 101 | * enum nft_table_flags - nf_tables table flags |
| 102 | * |
| 103 | * @NFT_TABLE_F_DORMANT: this table is not active |
| 104 | */ |
| 105 | enum nft_table_flags { |
| 106 | NFT_TABLE_F_DORMANT = 0x1, |
| 107 | }; |
| 108 | |
| 109 | /** |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 110 | * enum nft_table_attributes - nf_tables table netlink attributes |
| 111 | * |
| 112 | * @NFTA_TABLE_NAME: name of the table (NLA_STRING) |
Pablo Neira Ayuso | 9ddf632 | 2013-10-10 13:26:33 +0200 | [diff] [blame] | 113 | * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32) |
Tomasz Bursztyka | d8bcc768 | 2013-12-12 15:00:42 +0200 | [diff] [blame] | 114 | * @NFTA_TABLE_USE: number of chains in this table (NLA_U32) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 115 | */ |
| 116 | enum nft_table_attributes { |
| 117 | NFTA_TABLE_UNSPEC, |
| 118 | NFTA_TABLE_NAME, |
Pablo Neira Ayuso | 9ddf632 | 2013-10-10 13:26:33 +0200 | [diff] [blame] | 119 | NFTA_TABLE_FLAGS, |
Tomasz Bursztyka | d8bcc768 | 2013-12-12 15:00:42 +0200 | [diff] [blame] | 120 | NFTA_TABLE_USE, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 121 | __NFTA_TABLE_MAX |
| 122 | }; |
| 123 | #define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1) |
| 124 | |
| 125 | /** |
| 126 | * enum nft_chain_attributes - nf_tables chain netlink attributes |
| 127 | * |
| 128 | * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING) |
| 129 | * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64) |
| 130 | * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING) |
| 131 | * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes) |
Pablo Neira Ayuso | 0ca743a | 2013-10-14 00:06:06 +0200 | [diff] [blame] | 132 | * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32) |
| 133 | * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32) |
Pablo Neira Ayuso | 9370761 | 2013-10-10 23:21:26 +0200 | [diff] [blame] | 134 | * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING) |
Pablo Neira Ayuso | 0ca743a | 2013-10-14 00:06:06 +0200 | [diff] [blame] | 135 | * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 136 | */ |
| 137 | enum nft_chain_attributes { |
| 138 | NFTA_CHAIN_UNSPEC, |
| 139 | NFTA_CHAIN_TABLE, |
| 140 | NFTA_CHAIN_HANDLE, |
| 141 | NFTA_CHAIN_NAME, |
| 142 | NFTA_CHAIN_HOOK, |
Pablo Neira Ayuso | 0ca743a | 2013-10-14 00:06:06 +0200 | [diff] [blame] | 143 | NFTA_CHAIN_POLICY, |
| 144 | NFTA_CHAIN_USE, |
Pablo Neira Ayuso | 9370761 | 2013-10-10 23:21:26 +0200 | [diff] [blame] | 145 | NFTA_CHAIN_TYPE, |
Pablo Neira Ayuso | 0ca743a | 2013-10-14 00:06:06 +0200 | [diff] [blame] | 146 | NFTA_CHAIN_COUNTERS, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 147 | __NFTA_CHAIN_MAX |
| 148 | }; |
| 149 | #define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1) |
| 150 | |
| 151 | /** |
| 152 | * enum nft_rule_attributes - nf_tables rule netlink attributes |
| 153 | * |
| 154 | * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING) |
| 155 | * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING) |
| 156 | * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64) |
| 157 | * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes) |
Pablo Neira Ayuso | 0ca743a | 2013-10-14 00:06:06 +0200 | [diff] [blame] | 158 | * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes) |
Eric Leblond | 5e94846 | 2013-10-10 13:41:44 +0200 | [diff] [blame] | 159 | * @NFTA_RULE_POSITION: numeric handle of the previous rule (NLA_U64) |
Pablo Neira Ayuso | 0768b3b | 2014-02-19 17:27:06 +0100 | [diff] [blame] | 160 | * @NFTA_RULE_USERDATA: user data (NLA_BINARY, NFT_USERDATA_MAXLEN) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 161 | */ |
| 162 | enum nft_rule_attributes { |
| 163 | NFTA_RULE_UNSPEC, |
| 164 | NFTA_RULE_TABLE, |
| 165 | NFTA_RULE_CHAIN, |
| 166 | NFTA_RULE_HANDLE, |
| 167 | NFTA_RULE_EXPRESSIONS, |
Pablo Neira Ayuso | 0ca743a | 2013-10-14 00:06:06 +0200 | [diff] [blame] | 168 | NFTA_RULE_COMPAT, |
Eric Leblond | 5e94846 | 2013-10-10 13:41:44 +0200 | [diff] [blame] | 169 | NFTA_RULE_POSITION, |
Pablo Neira Ayuso | 0768b3b | 2014-02-19 17:27:06 +0100 | [diff] [blame] | 170 | NFTA_RULE_USERDATA, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 171 | __NFTA_RULE_MAX |
| 172 | }; |
| 173 | #define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1) |
| 174 | |
Patrick McHardy | 20a6934 | 2013-10-11 12:06:22 +0200 | [diff] [blame] | 175 | /** |
Pablo Neira Ayuso | 0ca743a | 2013-10-14 00:06:06 +0200 | [diff] [blame] | 176 | * enum nft_rule_compat_flags - nf_tables rule compat flags |
| 177 | * |
| 178 | * @NFT_RULE_COMPAT_F_INV: invert the check result |
| 179 | */ |
| 180 | enum nft_rule_compat_flags { |
| 181 | NFT_RULE_COMPAT_F_INV = (1 << 1), |
| 182 | NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV, |
| 183 | }; |
| 184 | |
| 185 | /** |
| 186 | * enum nft_rule_compat_attributes - nf_tables rule compat attributes |
| 187 | * |
| 188 | * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32) |
| 189 | * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32) |
| 190 | */ |
| 191 | enum nft_rule_compat_attributes { |
| 192 | NFTA_RULE_COMPAT_UNSPEC, |
| 193 | NFTA_RULE_COMPAT_PROTO, |
| 194 | NFTA_RULE_COMPAT_FLAGS, |
| 195 | __NFTA_RULE_COMPAT_MAX |
| 196 | }; |
| 197 | #define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1) |
| 198 | |
| 199 | /** |
Patrick McHardy | 20a6934 | 2013-10-11 12:06:22 +0200 | [diff] [blame] | 200 | * enum nft_set_flags - nf_tables set flags |
| 201 | * |
| 202 | * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink |
| 203 | * @NFT_SET_CONSTANT: set contents may not change while bound |
| 204 | * @NFT_SET_INTERVAL: set contains intervals |
| 205 | * @NFT_SET_MAP: set is used as a dictionary |
| 206 | */ |
| 207 | enum nft_set_flags { |
| 208 | NFT_SET_ANONYMOUS = 0x1, |
| 209 | NFT_SET_CONSTANT = 0x2, |
| 210 | NFT_SET_INTERVAL = 0x4, |
| 211 | NFT_SET_MAP = 0x8, |
| 212 | }; |
| 213 | |
| 214 | /** |
| 215 | * enum nft_set_attributes - nf_tables set netlink attributes |
| 216 | * |
| 217 | * @NFTA_SET_TABLE: table name (NLA_STRING) |
| 218 | * @NFTA_SET_NAME: set name (NLA_STRING) |
| 219 | * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32) |
| 220 | * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32) |
| 221 | * @NFTA_SET_KEY_LEN: key data length (NLA_U32) |
| 222 | * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32) |
| 223 | * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32) |
| 224 | */ |
| 225 | enum nft_set_attributes { |
| 226 | NFTA_SET_UNSPEC, |
| 227 | NFTA_SET_TABLE, |
| 228 | NFTA_SET_NAME, |
| 229 | NFTA_SET_FLAGS, |
| 230 | NFTA_SET_KEY_TYPE, |
| 231 | NFTA_SET_KEY_LEN, |
| 232 | NFTA_SET_DATA_TYPE, |
| 233 | NFTA_SET_DATA_LEN, |
| 234 | __NFTA_SET_MAX |
| 235 | }; |
| 236 | #define NFTA_SET_MAX (__NFTA_SET_MAX - 1) |
| 237 | |
| 238 | /** |
| 239 | * enum nft_set_elem_flags - nf_tables set element flags |
| 240 | * |
| 241 | * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval |
| 242 | */ |
| 243 | enum nft_set_elem_flags { |
| 244 | NFT_SET_ELEM_INTERVAL_END = 0x1, |
| 245 | }; |
| 246 | |
| 247 | /** |
| 248 | * enum nft_set_elem_attributes - nf_tables set element netlink attributes |
| 249 | * |
| 250 | * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data) |
| 251 | * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes) |
| 252 | * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32) |
| 253 | */ |
| 254 | enum nft_set_elem_attributes { |
| 255 | NFTA_SET_ELEM_UNSPEC, |
| 256 | NFTA_SET_ELEM_KEY, |
| 257 | NFTA_SET_ELEM_DATA, |
| 258 | NFTA_SET_ELEM_FLAGS, |
| 259 | __NFTA_SET_ELEM_MAX |
| 260 | }; |
| 261 | #define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1) |
| 262 | |
| 263 | /** |
| 264 | * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes |
| 265 | * |
| 266 | * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING) |
| 267 | * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING) |
| 268 | * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes) |
| 269 | */ |
| 270 | enum nft_set_elem_list_attributes { |
| 271 | NFTA_SET_ELEM_LIST_UNSPEC, |
| 272 | NFTA_SET_ELEM_LIST_TABLE, |
| 273 | NFTA_SET_ELEM_LIST_SET, |
| 274 | NFTA_SET_ELEM_LIST_ELEMENTS, |
| 275 | __NFTA_SET_ELEM_LIST_MAX |
| 276 | }; |
| 277 | #define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1) |
| 278 | |
| 279 | /** |
| 280 | * enum nft_data_types - nf_tables data types |
| 281 | * |
| 282 | * @NFT_DATA_VALUE: generic data |
| 283 | * @NFT_DATA_VERDICT: netfilter verdict |
| 284 | * |
| 285 | * The type of data is usually determined by the kernel directly and is not |
| 286 | * explicitly specified by userspace. The only difference are sets, where |
| 287 | * userspace specifies the key and mapping data types. |
| 288 | * |
| 289 | * The values 0xffffff00-0xffffffff are reserved for internally used types. |
| 290 | * The remaining range can be freely used by userspace to encode types, all |
| 291 | * values are equivalent to NFT_DATA_VALUE. |
| 292 | */ |
| 293 | enum nft_data_types { |
| 294 | NFT_DATA_VALUE, |
| 295 | NFT_DATA_VERDICT = 0xffffff00U, |
| 296 | }; |
| 297 | |
| 298 | #define NFT_DATA_RESERVED_MASK 0xffffff00U |
| 299 | |
| 300 | /** |
| 301 | * enum nft_data_attributes - nf_tables data netlink attributes |
| 302 | * |
| 303 | * @NFTA_DATA_VALUE: generic data (NLA_BINARY) |
| 304 | * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes) |
| 305 | */ |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 306 | enum nft_data_attributes { |
| 307 | NFTA_DATA_UNSPEC, |
| 308 | NFTA_DATA_VALUE, |
| 309 | NFTA_DATA_VERDICT, |
| 310 | __NFTA_DATA_MAX |
| 311 | }; |
| 312 | #define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1) |
| 313 | |
| 314 | /** |
| 315 | * enum nft_verdict_attributes - nf_tables verdict netlink attributes |
| 316 | * |
| 317 | * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts) |
| 318 | * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING) |
| 319 | */ |
| 320 | enum nft_verdict_attributes { |
| 321 | NFTA_VERDICT_UNSPEC, |
| 322 | NFTA_VERDICT_CODE, |
| 323 | NFTA_VERDICT_CHAIN, |
| 324 | __NFTA_VERDICT_MAX |
| 325 | }; |
| 326 | #define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1) |
| 327 | |
| 328 | /** |
| 329 | * enum nft_expr_attributes - nf_tables expression netlink attributes |
| 330 | * |
| 331 | * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING) |
| 332 | * @NFTA_EXPR_DATA: type specific data (NLA_NESTED) |
| 333 | */ |
| 334 | enum nft_expr_attributes { |
| 335 | NFTA_EXPR_UNSPEC, |
| 336 | NFTA_EXPR_NAME, |
| 337 | NFTA_EXPR_DATA, |
| 338 | __NFTA_EXPR_MAX |
| 339 | }; |
| 340 | #define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1) |
| 341 | |
| 342 | /** |
| 343 | * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes |
| 344 | * |
| 345 | * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32) |
| 346 | * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes) |
| 347 | */ |
| 348 | enum nft_immediate_attributes { |
| 349 | NFTA_IMMEDIATE_UNSPEC, |
| 350 | NFTA_IMMEDIATE_DREG, |
| 351 | NFTA_IMMEDIATE_DATA, |
| 352 | __NFTA_IMMEDIATE_MAX |
| 353 | }; |
| 354 | #define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1) |
| 355 | |
| 356 | /** |
| 357 | * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes |
| 358 | * |
| 359 | * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers) |
| 360 | * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers) |
| 361 | * @NFTA_BITWISE_LEN: length of operands (NLA_U32) |
| 362 | * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes) |
| 363 | * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes) |
| 364 | * |
| 365 | * The bitwise expression performs the following operation: |
| 366 | * |
| 367 | * dreg = (sreg & mask) ^ xor |
| 368 | * |
| 369 | * which allow to express all bitwise operations: |
| 370 | * |
| 371 | * mask xor |
| 372 | * NOT: 1 1 |
| 373 | * OR: 0 x |
| 374 | * XOR: 1 x |
| 375 | * AND: x 0 |
| 376 | */ |
| 377 | enum nft_bitwise_attributes { |
| 378 | NFTA_BITWISE_UNSPEC, |
| 379 | NFTA_BITWISE_SREG, |
| 380 | NFTA_BITWISE_DREG, |
| 381 | NFTA_BITWISE_LEN, |
| 382 | NFTA_BITWISE_MASK, |
| 383 | NFTA_BITWISE_XOR, |
| 384 | __NFTA_BITWISE_MAX |
| 385 | }; |
| 386 | #define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1) |
| 387 | |
| 388 | /** |
| 389 | * enum nft_byteorder_ops - nf_tables byteorder operators |
| 390 | * |
| 391 | * @NFT_BYTEORDER_NTOH: network to host operator |
| 392 | * @NFT_BYTEORDER_HTON: host to network opertaor |
| 393 | */ |
| 394 | enum nft_byteorder_ops { |
| 395 | NFT_BYTEORDER_NTOH, |
| 396 | NFT_BYTEORDER_HTON, |
| 397 | }; |
| 398 | |
| 399 | /** |
| 400 | * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes |
| 401 | * |
| 402 | * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers) |
| 403 | * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers) |
| 404 | * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops) |
| 405 | * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32) |
| 406 | * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4) |
| 407 | */ |
| 408 | enum nft_byteorder_attributes { |
| 409 | NFTA_BYTEORDER_UNSPEC, |
| 410 | NFTA_BYTEORDER_SREG, |
| 411 | NFTA_BYTEORDER_DREG, |
| 412 | NFTA_BYTEORDER_OP, |
| 413 | NFTA_BYTEORDER_LEN, |
| 414 | NFTA_BYTEORDER_SIZE, |
| 415 | __NFTA_BYTEORDER_MAX |
| 416 | }; |
| 417 | #define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1) |
| 418 | |
| 419 | /** |
| 420 | * enum nft_cmp_ops - nf_tables relational operator |
| 421 | * |
| 422 | * @NFT_CMP_EQ: equal |
| 423 | * @NFT_CMP_NEQ: not equal |
| 424 | * @NFT_CMP_LT: less than |
| 425 | * @NFT_CMP_LTE: less than or equal to |
| 426 | * @NFT_CMP_GT: greater than |
| 427 | * @NFT_CMP_GTE: greater than or equal to |
| 428 | */ |
| 429 | enum nft_cmp_ops { |
| 430 | NFT_CMP_EQ, |
| 431 | NFT_CMP_NEQ, |
| 432 | NFT_CMP_LT, |
| 433 | NFT_CMP_LTE, |
| 434 | NFT_CMP_GT, |
| 435 | NFT_CMP_GTE, |
| 436 | }; |
| 437 | |
| 438 | /** |
| 439 | * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes |
| 440 | * |
| 441 | * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers) |
| 442 | * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops) |
| 443 | * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes) |
| 444 | */ |
| 445 | enum nft_cmp_attributes { |
| 446 | NFTA_CMP_UNSPEC, |
| 447 | NFTA_CMP_SREG, |
| 448 | NFTA_CMP_OP, |
| 449 | NFTA_CMP_DATA, |
| 450 | __NFTA_CMP_MAX |
| 451 | }; |
| 452 | #define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1) |
| 453 | |
Patrick McHardy | 20a6934 | 2013-10-11 12:06:22 +0200 | [diff] [blame] | 454 | /** |
| 455 | * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes |
| 456 | * |
| 457 | * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING) |
| 458 | * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers) |
| 459 | * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers) |
| 460 | */ |
| 461 | enum nft_lookup_attributes { |
| 462 | NFTA_LOOKUP_UNSPEC, |
| 463 | NFTA_LOOKUP_SET, |
| 464 | NFTA_LOOKUP_SREG, |
| 465 | NFTA_LOOKUP_DREG, |
| 466 | __NFTA_LOOKUP_MAX |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 467 | }; |
Patrick McHardy | 20a6934 | 2013-10-11 12:06:22 +0200 | [diff] [blame] | 468 | #define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 469 | |
| 470 | /** |
| 471 | * enum nft_payload_bases - nf_tables payload expression offset bases |
| 472 | * |
| 473 | * @NFT_PAYLOAD_LL_HEADER: link layer header |
| 474 | * @NFT_PAYLOAD_NETWORK_HEADER: network header |
| 475 | * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header |
| 476 | */ |
| 477 | enum nft_payload_bases { |
| 478 | NFT_PAYLOAD_LL_HEADER, |
| 479 | NFT_PAYLOAD_NETWORK_HEADER, |
| 480 | NFT_PAYLOAD_TRANSPORT_HEADER, |
| 481 | }; |
| 482 | |
| 483 | /** |
| 484 | * enum nft_payload_attributes - nf_tables payload expression netlink attributes |
| 485 | * |
| 486 | * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers) |
| 487 | * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases) |
| 488 | * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32) |
| 489 | * @NFTA_PAYLOAD_LEN: payload length (NLA_U32) |
| 490 | */ |
| 491 | enum nft_payload_attributes { |
| 492 | NFTA_PAYLOAD_UNSPEC, |
| 493 | NFTA_PAYLOAD_DREG, |
| 494 | NFTA_PAYLOAD_BASE, |
| 495 | NFTA_PAYLOAD_OFFSET, |
| 496 | NFTA_PAYLOAD_LEN, |
| 497 | __NFTA_PAYLOAD_MAX |
| 498 | }; |
| 499 | #define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1) |
| 500 | |
| 501 | /** |
| 502 | * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes |
| 503 | * |
| 504 | * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers) |
| 505 | * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8) |
| 506 | * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32) |
| 507 | * @NFTA_EXTHDR_LEN: extension header length (NLA_U32) |
| 508 | */ |
| 509 | enum nft_exthdr_attributes { |
| 510 | NFTA_EXTHDR_UNSPEC, |
| 511 | NFTA_EXTHDR_DREG, |
| 512 | NFTA_EXTHDR_TYPE, |
| 513 | NFTA_EXTHDR_OFFSET, |
| 514 | NFTA_EXTHDR_LEN, |
| 515 | __NFTA_EXTHDR_MAX |
| 516 | }; |
| 517 | #define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1) |
| 518 | |
| 519 | /** |
| 520 | * enum nft_meta_keys - nf_tables meta expression keys |
| 521 | * |
| 522 | * @NFT_META_LEN: packet length (skb->len) |
| 523 | * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT |
| 524 | * @NFT_META_PRIORITY: packet priority (skb->priority) |
| 525 | * @NFT_META_MARK: packet mark (skb->mark) |
| 526 | * @NFT_META_IIF: packet input interface index (dev->ifindex) |
| 527 | * @NFT_META_OIF: packet output interface index (dev->ifindex) |
| 528 | * @NFT_META_IIFNAME: packet input interface name (dev->name) |
| 529 | * @NFT_META_OIFNAME: packet output interface name (dev->name) |
| 530 | * @NFT_META_IIFTYPE: packet input interface type (dev->type) |
| 531 | * @NFT_META_OIFTYPE: packet output interface type (dev->type) |
| 532 | * @NFT_META_SKUID: originating socket UID (fsuid) |
| 533 | * @NFT_META_SKGID: originating socket GID (fsgid) |
| 534 | * @NFT_META_NFTRACE: packet nftrace bit |
| 535 | * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid) |
| 536 | * @NFT_META_SECMARK: packet secmark (skb->secmark) |
Patrick McHardy | 124edfa | 2014-01-03 12:16:17 +0000 | [diff] [blame] | 537 | * @NFT_META_NFPROTO: netfilter protocol |
Patrick McHardy | 4566bf2 | 2014-01-03 12:16:18 +0000 | [diff] [blame] | 538 | * @NFT_META_L4PROTO: layer 4 protocol number |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 539 | */ |
| 540 | enum nft_meta_keys { |
| 541 | NFT_META_LEN, |
| 542 | NFT_META_PROTOCOL, |
| 543 | NFT_META_PRIORITY, |
| 544 | NFT_META_MARK, |
| 545 | NFT_META_IIF, |
| 546 | NFT_META_OIF, |
| 547 | NFT_META_IIFNAME, |
| 548 | NFT_META_OIFNAME, |
| 549 | NFT_META_IIFTYPE, |
| 550 | NFT_META_OIFTYPE, |
| 551 | NFT_META_SKUID, |
| 552 | NFT_META_SKGID, |
| 553 | NFT_META_NFTRACE, |
| 554 | NFT_META_RTCLASSID, |
| 555 | NFT_META_SECMARK, |
Patrick McHardy | 124edfa | 2014-01-03 12:16:17 +0000 | [diff] [blame] | 556 | NFT_META_NFPROTO, |
Patrick McHardy | 4566bf2 | 2014-01-03 12:16:18 +0000 | [diff] [blame] | 557 | NFT_META_L4PROTO, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 558 | }; |
| 559 | |
| 560 | /** |
| 561 | * enum nft_meta_attributes - nf_tables meta expression netlink attributes |
| 562 | * |
| 563 | * @NFTA_META_DREG: destination register (NLA_U32) |
| 564 | * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys) |
Arturo Borrero Gonzalez | e035b77 | 2013-12-26 16:38:01 +0100 | [diff] [blame] | 565 | * @NFTA_META_SREG: source register (NLA_U32) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 566 | */ |
| 567 | enum nft_meta_attributes { |
| 568 | NFTA_META_UNSPEC, |
| 569 | NFTA_META_DREG, |
| 570 | NFTA_META_KEY, |
Arturo Borrero Gonzalez | e035b77 | 2013-12-26 16:38:01 +0100 | [diff] [blame] | 571 | NFTA_META_SREG, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 572 | __NFTA_META_MAX |
| 573 | }; |
| 574 | #define NFTA_META_MAX (__NFTA_META_MAX - 1) |
| 575 | |
| 576 | /** |
| 577 | * enum nft_ct_keys - nf_tables ct expression keys |
| 578 | * |
| 579 | * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info) |
| 580 | * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir) |
| 581 | * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status) |
| 582 | * @NFT_CT_MARK: conntrack mark value |
| 583 | * @NFT_CT_SECMARK: conntrack secmark value |
| 584 | * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms |
| 585 | * @NFT_CT_HELPER: connection tracking helper assigned to conntrack |
| 586 | * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol |
| 587 | * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address) |
| 588 | * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address) |
| 589 | * @NFT_CT_PROTOCOL: conntrack layer 4 protocol |
| 590 | * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source |
| 591 | * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination |
| 592 | */ |
| 593 | enum nft_ct_keys { |
| 594 | NFT_CT_STATE, |
| 595 | NFT_CT_DIRECTION, |
| 596 | NFT_CT_STATUS, |
| 597 | NFT_CT_MARK, |
| 598 | NFT_CT_SECMARK, |
| 599 | NFT_CT_EXPIRATION, |
| 600 | NFT_CT_HELPER, |
| 601 | NFT_CT_L3PROTOCOL, |
| 602 | NFT_CT_SRC, |
| 603 | NFT_CT_DST, |
| 604 | NFT_CT_PROTOCOL, |
| 605 | NFT_CT_PROTO_SRC, |
| 606 | NFT_CT_PROTO_DST, |
Florian Westphal | d2bf2f3 | 2014-02-18 15:25:32 +0100 | [diff] [blame] | 607 | NFT_CT_LABELS, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 608 | }; |
| 609 | |
| 610 | /** |
| 611 | * enum nft_ct_attributes - nf_tables ct expression netlink attributes |
| 612 | * |
| 613 | * @NFTA_CT_DREG: destination register (NLA_U32) |
| 614 | * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys) |
| 615 | * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8) |
Kristian Evensen | c4ede3d | 2014-01-07 16:43:54 +0100 | [diff] [blame] | 616 | * @NFTA_CT_SREG: source register (NLA_U32) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 617 | */ |
| 618 | enum nft_ct_attributes { |
| 619 | NFTA_CT_UNSPEC, |
| 620 | NFTA_CT_DREG, |
| 621 | NFTA_CT_KEY, |
| 622 | NFTA_CT_DIRECTION, |
Kristian Evensen | c4ede3d | 2014-01-07 16:43:54 +0100 | [diff] [blame] | 623 | NFTA_CT_SREG, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 624 | __NFTA_CT_MAX |
| 625 | }; |
| 626 | #define NFTA_CT_MAX (__NFTA_CT_MAX - 1) |
| 627 | |
| 628 | /** |
| 629 | * enum nft_limit_attributes - nf_tables limit expression netlink attributes |
| 630 | * |
| 631 | * @NFTA_LIMIT_RATE: refill rate (NLA_U64) |
| 632 | * @NFTA_LIMIT_UNIT: refill unit (NLA_U64) |
| 633 | */ |
| 634 | enum nft_limit_attributes { |
| 635 | NFTA_LIMIT_UNSPEC, |
| 636 | NFTA_LIMIT_RATE, |
| 637 | NFTA_LIMIT_UNIT, |
| 638 | __NFTA_LIMIT_MAX |
| 639 | }; |
| 640 | #define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1) |
| 641 | |
| 642 | /** |
| 643 | * enum nft_counter_attributes - nf_tables counter expression netlink attributes |
| 644 | * |
| 645 | * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64) |
| 646 | * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64) |
| 647 | */ |
| 648 | enum nft_counter_attributes { |
| 649 | NFTA_COUNTER_UNSPEC, |
| 650 | NFTA_COUNTER_BYTES, |
| 651 | NFTA_COUNTER_PACKETS, |
| 652 | __NFTA_COUNTER_MAX |
| 653 | }; |
| 654 | #define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1) |
| 655 | |
| 656 | /** |
| 657 | * enum nft_log_attributes - nf_tables log expression netlink attributes |
| 658 | * |
| 659 | * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32) |
| 660 | * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING) |
| 661 | * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32) |
| 662 | * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32) |
| 663 | */ |
| 664 | enum nft_log_attributes { |
| 665 | NFTA_LOG_UNSPEC, |
| 666 | NFTA_LOG_GROUP, |
| 667 | NFTA_LOG_PREFIX, |
| 668 | NFTA_LOG_SNAPLEN, |
| 669 | NFTA_LOG_QTHRESHOLD, |
| 670 | __NFTA_LOG_MAX |
| 671 | }; |
| 672 | #define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1) |
| 673 | |
| 674 | /** |
Eric Leblond | 0aff078 | 2013-12-06 00:24:13 +0100 | [diff] [blame] | 675 | * enum nft_queue_attributes - nf_tables queue expression netlink attributes |
| 676 | * |
| 677 | * @NFTA_QUEUE_NUM: netlink queue to send messages to (NLA_U16) |
| 678 | * @NFTA_QUEUE_TOTAL: number of queues to load balance packets on (NLA_U16) |
| 679 | * @NFTA_QUEUE_FLAGS: various flags (NLA_U16) |
| 680 | */ |
| 681 | enum nft_queue_attributes { |
| 682 | NFTA_QUEUE_UNSPEC, |
| 683 | NFTA_QUEUE_NUM, |
| 684 | NFTA_QUEUE_TOTAL, |
| 685 | NFTA_QUEUE_FLAGS, |
| 686 | __NFTA_QUEUE_MAX |
| 687 | }; |
| 688 | #define NFTA_QUEUE_MAX (__NFTA_QUEUE_MAX - 1) |
| 689 | |
| 690 | #define NFT_QUEUE_FLAG_BYPASS 0x01 /* for compatibility with v2 */ |
| 691 | #define NFT_QUEUE_FLAG_CPU_FANOUT 0x02 /* use current CPU (no hashing) */ |
| 692 | #define NFT_QUEUE_FLAG_MASK 0x03 |
| 693 | |
| 694 | /** |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 695 | * enum nft_reject_types - nf_tables reject expression reject types |
| 696 | * |
| 697 | * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable |
| 698 | * @NFT_REJECT_TCP_RST: reject using TCP RST |
| 699 | */ |
| 700 | enum nft_reject_types { |
| 701 | NFT_REJECT_ICMP_UNREACH, |
| 702 | NFT_REJECT_TCP_RST, |
| 703 | }; |
| 704 | |
| 705 | /** |
| 706 | * enum nft_reject_attributes - nf_tables reject expression netlink attributes |
| 707 | * |
| 708 | * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types) |
| 709 | * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8) |
| 710 | */ |
| 711 | enum nft_reject_attributes { |
| 712 | NFTA_REJECT_UNSPEC, |
| 713 | NFTA_REJECT_TYPE, |
| 714 | NFTA_REJECT_ICMP_CODE, |
| 715 | __NFTA_REJECT_MAX |
| 716 | }; |
| 717 | #define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1) |
| 718 | |
| 719 | /** |
| 720 | * enum nft_nat_types - nf_tables nat expression NAT types |
| 721 | * |
| 722 | * @NFT_NAT_SNAT: source NAT |
| 723 | * @NFT_NAT_DNAT: destination NAT |
| 724 | */ |
| 725 | enum nft_nat_types { |
| 726 | NFT_NAT_SNAT, |
| 727 | NFT_NAT_DNAT, |
| 728 | }; |
| 729 | |
| 730 | /** |
| 731 | * enum nft_nat_attributes - nf_tables nat expression netlink attributes |
| 732 | * |
| 733 | * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types) |
Tomasz Bursztyka | eb31628 | 2013-10-10 13:39:19 +0200 | [diff] [blame] | 734 | * @NFTA_NAT_FAMILY: NAT family (NLA_U32) |
| 735 | * @NFTA_NAT_REG_ADDR_MIN: source register of address range start (NLA_U32: nft_registers) |
| 736 | * @NFTA_NAT_REG_ADDR_MAX: source register of address range end (NLA_U32: nft_registers) |
| 737 | * @NFTA_NAT_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers) |
| 738 | * @NFTA_NAT_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers) |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 739 | */ |
| 740 | enum nft_nat_attributes { |
| 741 | NFTA_NAT_UNSPEC, |
| 742 | NFTA_NAT_TYPE, |
Tomasz Bursztyka | eb31628 | 2013-10-10 13:39:19 +0200 | [diff] [blame] | 743 | NFTA_NAT_FAMILY, |
| 744 | NFTA_NAT_REG_ADDR_MIN, |
| 745 | NFTA_NAT_REG_ADDR_MAX, |
| 746 | NFTA_NAT_REG_PROTO_MIN, |
| 747 | NFTA_NAT_REG_PROTO_MAX, |
Patrick McHardy | 9651851 | 2013-10-14 11:00:02 +0200 | [diff] [blame] | 748 | __NFTA_NAT_MAX |
| 749 | }; |
| 750 | #define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1) |
| 751 | |
| 752 | #endif /* _LINUX_NF_TABLES_H */ |