blob: 7d4a1992f89c9bbbbf295e6b60fd632fcecac2a9 [file] [log] [blame]
Patrick McHardy96518512013-10-14 11:00:02 +02001#ifndef _LINUX_NF_TABLES_H
2#define _LINUX_NF_TABLES_H
3
4#define NFT_CHAIN_MAXNAMELEN 32
5
6enum nft_registers {
7 NFT_REG_VERDICT,
8 NFT_REG_1,
9 NFT_REG_2,
10 NFT_REG_3,
11 NFT_REG_4,
12 __NFT_REG_MAX
13};
14#define NFT_REG_MAX (__NFT_REG_MAX - 1)
15
16/**
17 * enum nft_verdicts - nf_tables internal verdicts
18 *
19 * @NFT_CONTINUE: continue evaluation of the current rule
20 * @NFT_BREAK: terminate evaluation of the current rule
21 * @NFT_JUMP: push the current chain on the jump stack and jump to a chain
22 * @NFT_GOTO: jump to a chain without pushing the current chain on the jump stack
23 * @NFT_RETURN: return to the topmost chain on the jump stack
24 *
25 * The nf_tables verdicts share their numeric space with the netfilter verdicts.
26 */
27enum nft_verdicts {
28 NFT_CONTINUE = -1,
29 NFT_BREAK = -2,
30 NFT_JUMP = -3,
31 NFT_GOTO = -4,
32 NFT_RETURN = -5,
33};
34
35/**
36 * enum nf_tables_msg_types - nf_tables netlink message types
37 *
38 * @NFT_MSG_NEWTABLE: create a new table (enum nft_table_attributes)
39 * @NFT_MSG_GETTABLE: get a table (enum nft_table_attributes)
40 * @NFT_MSG_DELTABLE: delete a table (enum nft_table_attributes)
41 * @NFT_MSG_NEWCHAIN: create a new chain (enum nft_chain_attributes)
42 * @NFT_MSG_GETCHAIN: get a chain (enum nft_chain_attributes)
43 * @NFT_MSG_DELCHAIN: delete a chain (enum nft_chain_attributes)
44 * @NFT_MSG_NEWRULE: create a new rule (enum nft_rule_attributes)
45 * @NFT_MSG_GETRULE: get a rule (enum nft_rule_attributes)
46 * @NFT_MSG_DELRULE: delete a rule (enum nft_rule_attributes)
Patrick McHardy20a69342013-10-11 12:06:22 +020047 * @NFT_MSG_NEWSET: create a new set (enum nft_set_attributes)
48 * @NFT_MSG_GETSET: get a set (enum nft_set_attributes)
49 * @NFT_MSG_DELSET: delete a set (enum nft_set_attributes)
50 * @NFT_MSG_NEWSETELEM: create a new set element (enum nft_set_elem_attributes)
51 * @NFT_MSG_GETSETELEM: get a set element (enum nft_set_elem_attributes)
52 * @NFT_MSG_DELSETELEM: delete a set element (enum nft_set_elem_attributes)
Patrick McHardy96518512013-10-14 11:00:02 +020053 */
54enum nf_tables_msg_types {
55 NFT_MSG_NEWTABLE,
56 NFT_MSG_GETTABLE,
57 NFT_MSG_DELTABLE,
58 NFT_MSG_NEWCHAIN,
59 NFT_MSG_GETCHAIN,
60 NFT_MSG_DELCHAIN,
61 NFT_MSG_NEWRULE,
62 NFT_MSG_GETRULE,
63 NFT_MSG_DELRULE,
Patrick McHardy20a69342013-10-11 12:06:22 +020064 NFT_MSG_NEWSET,
65 NFT_MSG_GETSET,
66 NFT_MSG_DELSET,
67 NFT_MSG_NEWSETELEM,
68 NFT_MSG_GETSETELEM,
69 NFT_MSG_DELSETELEM,
Patrick McHardy96518512013-10-14 11:00:02 +020070 NFT_MSG_MAX,
71};
72
Patrick McHardy20a69342013-10-11 12:06:22 +020073/**
74 * enum nft_list_attributes - nf_tables generic list netlink attributes
75 *
76 * @NFTA_LIST_ELEM: list element (NLA_NESTED)
77 */
Patrick McHardy96518512013-10-14 11:00:02 +020078enum nft_list_attributes {
79 NFTA_LIST_UNPEC,
80 NFTA_LIST_ELEM,
81 __NFTA_LIST_MAX
82};
83#define NFTA_LIST_MAX (__NFTA_LIST_MAX - 1)
84
85/**
86 * enum nft_hook_attributes - nf_tables netfilter hook netlink attributes
87 *
88 * @NFTA_HOOK_HOOKNUM: netfilter hook number (NLA_U32)
89 * @NFTA_HOOK_PRIORITY: netfilter hook priority (NLA_U32)
90 */
91enum nft_hook_attributes {
92 NFTA_HOOK_UNSPEC,
93 NFTA_HOOK_HOOKNUM,
94 NFTA_HOOK_PRIORITY,
95 __NFTA_HOOK_MAX
96};
97#define NFTA_HOOK_MAX (__NFTA_HOOK_MAX - 1)
98
99/**
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200100 * enum nft_table_flags - nf_tables table flags
101 *
102 * @NFT_TABLE_F_DORMANT: this table is not active
103 */
104enum nft_table_flags {
105 NFT_TABLE_F_DORMANT = 0x1,
106};
107
108/**
Patrick McHardy96518512013-10-14 11:00:02 +0200109 * enum nft_table_attributes - nf_tables table netlink attributes
110 *
111 * @NFTA_TABLE_NAME: name of the table (NLA_STRING)
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200112 * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32)
Patrick McHardy96518512013-10-14 11:00:02 +0200113 */
114enum nft_table_attributes {
115 NFTA_TABLE_UNSPEC,
116 NFTA_TABLE_NAME,
Pablo Neira Ayuso9ddf6322013-10-10 13:26:33 +0200117 NFTA_TABLE_FLAGS,
Patrick McHardy96518512013-10-14 11:00:02 +0200118 __NFTA_TABLE_MAX
119};
120#define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1)
121
122/**
123 * enum nft_chain_attributes - nf_tables chain netlink attributes
124 *
125 * @NFTA_CHAIN_TABLE: name of the table containing the chain (NLA_STRING)
126 * @NFTA_CHAIN_HANDLE: numeric handle of the chain (NLA_U64)
127 * @NFTA_CHAIN_NAME: name of the chain (NLA_STRING)
128 * @NFTA_CHAIN_HOOK: hook specification for basechains (NLA_NESTED: nft_hook_attributes)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200129 * @NFTA_CHAIN_POLICY: numeric policy of the chain (NLA_U32)
130 * @NFTA_CHAIN_USE: number of references to this chain (NLA_U32)
Pablo Neira Ayuso93707612013-10-10 23:21:26 +0200131 * @NFTA_CHAIN_TYPE: type name of the string (NLA_NUL_STRING)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200132 * @NFTA_CHAIN_COUNTERS: counter specification of the chain (NLA_NESTED: nft_counter_attributes)
Patrick McHardy96518512013-10-14 11:00:02 +0200133 */
134enum nft_chain_attributes {
135 NFTA_CHAIN_UNSPEC,
136 NFTA_CHAIN_TABLE,
137 NFTA_CHAIN_HANDLE,
138 NFTA_CHAIN_NAME,
139 NFTA_CHAIN_HOOK,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200140 NFTA_CHAIN_POLICY,
141 NFTA_CHAIN_USE,
Pablo Neira Ayuso93707612013-10-10 23:21:26 +0200142 NFTA_CHAIN_TYPE,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200143 NFTA_CHAIN_COUNTERS,
Patrick McHardy96518512013-10-14 11:00:02 +0200144 __NFTA_CHAIN_MAX
145};
146#define NFTA_CHAIN_MAX (__NFTA_CHAIN_MAX - 1)
147
148/**
149 * enum nft_rule_attributes - nf_tables rule netlink attributes
150 *
151 * @NFTA_RULE_TABLE: name of the table containing the rule (NLA_STRING)
152 * @NFTA_RULE_CHAIN: name of the chain containing the rule (NLA_STRING)
153 * @NFTA_RULE_HANDLE: numeric handle of the rule (NLA_U64)
154 * @NFTA_RULE_EXPRESSIONS: list of expressions (NLA_NESTED: nft_expr_attributes)
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200155 * @NFTA_RULE_COMPAT: compatibility specifications of the rule (NLA_NESTED: nft_rule_compat_attributes)
Patrick McHardy96518512013-10-14 11:00:02 +0200156 */
157enum nft_rule_attributes {
158 NFTA_RULE_UNSPEC,
159 NFTA_RULE_TABLE,
160 NFTA_RULE_CHAIN,
161 NFTA_RULE_HANDLE,
162 NFTA_RULE_EXPRESSIONS,
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200163 NFTA_RULE_COMPAT,
Patrick McHardy96518512013-10-14 11:00:02 +0200164 __NFTA_RULE_MAX
165};
166#define NFTA_RULE_MAX (__NFTA_RULE_MAX - 1)
167
Patrick McHardy20a69342013-10-11 12:06:22 +0200168/**
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200169 * enum nft_rule_compat_flags - nf_tables rule compat flags
170 *
171 * @NFT_RULE_COMPAT_F_INV: invert the check result
172 */
173enum nft_rule_compat_flags {
174 NFT_RULE_COMPAT_F_INV = (1 << 1),
175 NFT_RULE_COMPAT_F_MASK = NFT_RULE_COMPAT_F_INV,
176};
177
178/**
179 * enum nft_rule_compat_attributes - nf_tables rule compat attributes
180 *
181 * @NFTA_RULE_COMPAT_PROTO: numerice value of handled protocol (NLA_U32)
182 * @NFTA_RULE_COMPAT_FLAGS: bitmask of enum nft_rule_compat_flags (NLA_U32)
183 */
184enum nft_rule_compat_attributes {
185 NFTA_RULE_COMPAT_UNSPEC,
186 NFTA_RULE_COMPAT_PROTO,
187 NFTA_RULE_COMPAT_FLAGS,
188 __NFTA_RULE_COMPAT_MAX
189};
190#define NFTA_RULE_COMPAT_MAX (__NFTA_RULE_COMPAT_MAX - 1)
191
192/**
Patrick McHardy20a69342013-10-11 12:06:22 +0200193 * enum nft_set_flags - nf_tables set flags
194 *
195 * @NFT_SET_ANONYMOUS: name allocation, automatic cleanup on unlink
196 * @NFT_SET_CONSTANT: set contents may not change while bound
197 * @NFT_SET_INTERVAL: set contains intervals
198 * @NFT_SET_MAP: set is used as a dictionary
199 */
200enum nft_set_flags {
201 NFT_SET_ANONYMOUS = 0x1,
202 NFT_SET_CONSTANT = 0x2,
203 NFT_SET_INTERVAL = 0x4,
204 NFT_SET_MAP = 0x8,
205};
206
207/**
208 * enum nft_set_attributes - nf_tables set netlink attributes
209 *
210 * @NFTA_SET_TABLE: table name (NLA_STRING)
211 * @NFTA_SET_NAME: set name (NLA_STRING)
212 * @NFTA_SET_FLAGS: bitmask of enum nft_set_flags (NLA_U32)
213 * @NFTA_SET_KEY_TYPE: key data type, informational purpose only (NLA_U32)
214 * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
215 * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
216 * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
217 */
218enum nft_set_attributes {
219 NFTA_SET_UNSPEC,
220 NFTA_SET_TABLE,
221 NFTA_SET_NAME,
222 NFTA_SET_FLAGS,
223 NFTA_SET_KEY_TYPE,
224 NFTA_SET_KEY_LEN,
225 NFTA_SET_DATA_TYPE,
226 NFTA_SET_DATA_LEN,
227 __NFTA_SET_MAX
228};
229#define NFTA_SET_MAX (__NFTA_SET_MAX - 1)
230
231/**
232 * enum nft_set_elem_flags - nf_tables set element flags
233 *
234 * @NFT_SET_ELEM_INTERVAL_END: element ends the previous interval
235 */
236enum nft_set_elem_flags {
237 NFT_SET_ELEM_INTERVAL_END = 0x1,
238};
239
240/**
241 * enum nft_set_elem_attributes - nf_tables set element netlink attributes
242 *
243 * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)
244 * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)
245 * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)
246 */
247enum nft_set_elem_attributes {
248 NFTA_SET_ELEM_UNSPEC,
249 NFTA_SET_ELEM_KEY,
250 NFTA_SET_ELEM_DATA,
251 NFTA_SET_ELEM_FLAGS,
252 __NFTA_SET_ELEM_MAX
253};
254#define NFTA_SET_ELEM_MAX (__NFTA_SET_ELEM_MAX - 1)
255
256/**
257 * enum nft_set_elem_list_attributes - nf_tables set element list netlink attributes
258 *
259 * @NFTA_SET_ELEM_LIST_TABLE: table of the set to be changed (NLA_STRING)
260 * @NFTA_SET_ELEM_LIST_SET: name of the set to be changed (NLA_STRING)
261 * @NFTA_SET_ELEM_LIST_ELEMENTS: list of set elements (NLA_NESTED: nft_set_elem_attributes)
262 */
263enum nft_set_elem_list_attributes {
264 NFTA_SET_ELEM_LIST_UNSPEC,
265 NFTA_SET_ELEM_LIST_TABLE,
266 NFTA_SET_ELEM_LIST_SET,
267 NFTA_SET_ELEM_LIST_ELEMENTS,
268 __NFTA_SET_ELEM_LIST_MAX
269};
270#define NFTA_SET_ELEM_LIST_MAX (__NFTA_SET_ELEM_LIST_MAX - 1)
271
272/**
273 * enum nft_data_types - nf_tables data types
274 *
275 * @NFT_DATA_VALUE: generic data
276 * @NFT_DATA_VERDICT: netfilter verdict
277 *
278 * The type of data is usually determined by the kernel directly and is not
279 * explicitly specified by userspace. The only difference are sets, where
280 * userspace specifies the key and mapping data types.
281 *
282 * The values 0xffffff00-0xffffffff are reserved for internally used types.
283 * The remaining range can be freely used by userspace to encode types, all
284 * values are equivalent to NFT_DATA_VALUE.
285 */
286enum nft_data_types {
287 NFT_DATA_VALUE,
288 NFT_DATA_VERDICT = 0xffffff00U,
289};
290
291#define NFT_DATA_RESERVED_MASK 0xffffff00U
292
293/**
294 * enum nft_data_attributes - nf_tables data netlink attributes
295 *
296 * @NFTA_DATA_VALUE: generic data (NLA_BINARY)
297 * @NFTA_DATA_VERDICT: nf_tables verdict (NLA_NESTED: nft_verdict_attributes)
298 */
Patrick McHardy96518512013-10-14 11:00:02 +0200299enum nft_data_attributes {
300 NFTA_DATA_UNSPEC,
301 NFTA_DATA_VALUE,
302 NFTA_DATA_VERDICT,
303 __NFTA_DATA_MAX
304};
305#define NFTA_DATA_MAX (__NFTA_DATA_MAX - 1)
306
307/**
308 * enum nft_verdict_attributes - nf_tables verdict netlink attributes
309 *
310 * @NFTA_VERDICT_CODE: nf_tables verdict (NLA_U32: enum nft_verdicts)
311 * @NFTA_VERDICT_CHAIN: jump target chain name (NLA_STRING)
312 */
313enum nft_verdict_attributes {
314 NFTA_VERDICT_UNSPEC,
315 NFTA_VERDICT_CODE,
316 NFTA_VERDICT_CHAIN,
317 __NFTA_VERDICT_MAX
318};
319#define NFTA_VERDICT_MAX (__NFTA_VERDICT_MAX - 1)
320
321/**
322 * enum nft_expr_attributes - nf_tables expression netlink attributes
323 *
324 * @NFTA_EXPR_NAME: name of the expression type (NLA_STRING)
325 * @NFTA_EXPR_DATA: type specific data (NLA_NESTED)
326 */
327enum nft_expr_attributes {
328 NFTA_EXPR_UNSPEC,
329 NFTA_EXPR_NAME,
330 NFTA_EXPR_DATA,
331 __NFTA_EXPR_MAX
332};
333#define NFTA_EXPR_MAX (__NFTA_EXPR_MAX - 1)
334
335/**
336 * enum nft_immediate_attributes - nf_tables immediate expression netlink attributes
337 *
338 * @NFTA_IMMEDIATE_DREG: destination register to load data into (NLA_U32)
339 * @NFTA_IMMEDIATE_DATA: data to load (NLA_NESTED: nft_data_attributes)
340 */
341enum nft_immediate_attributes {
342 NFTA_IMMEDIATE_UNSPEC,
343 NFTA_IMMEDIATE_DREG,
344 NFTA_IMMEDIATE_DATA,
345 __NFTA_IMMEDIATE_MAX
346};
347#define NFTA_IMMEDIATE_MAX (__NFTA_IMMEDIATE_MAX - 1)
348
349/**
350 * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes
351 *
352 * @NFTA_BITWISE_SREG: source register (NLA_U32: nft_registers)
353 * @NFTA_BITWISE_DREG: destination register (NLA_U32: nft_registers)
354 * @NFTA_BITWISE_LEN: length of operands (NLA_U32)
355 * @NFTA_BITWISE_MASK: mask value (NLA_NESTED: nft_data_attributes)
356 * @NFTA_BITWISE_XOR: xor value (NLA_NESTED: nft_data_attributes)
357 *
358 * The bitwise expression performs the following operation:
359 *
360 * dreg = (sreg & mask) ^ xor
361 *
362 * which allow to express all bitwise operations:
363 *
364 * mask xor
365 * NOT: 1 1
366 * OR: 0 x
367 * XOR: 1 x
368 * AND: x 0
369 */
370enum nft_bitwise_attributes {
371 NFTA_BITWISE_UNSPEC,
372 NFTA_BITWISE_SREG,
373 NFTA_BITWISE_DREG,
374 NFTA_BITWISE_LEN,
375 NFTA_BITWISE_MASK,
376 NFTA_BITWISE_XOR,
377 __NFTA_BITWISE_MAX
378};
379#define NFTA_BITWISE_MAX (__NFTA_BITWISE_MAX - 1)
380
381/**
382 * enum nft_byteorder_ops - nf_tables byteorder operators
383 *
384 * @NFT_BYTEORDER_NTOH: network to host operator
385 * @NFT_BYTEORDER_HTON: host to network opertaor
386 */
387enum nft_byteorder_ops {
388 NFT_BYTEORDER_NTOH,
389 NFT_BYTEORDER_HTON,
390};
391
392/**
393 * enum nft_byteorder_attributes - nf_tables byteorder expression netlink attributes
394 *
395 * @NFTA_BYTEORDER_SREG: source register (NLA_U32: nft_registers)
396 * @NFTA_BYTEORDER_DREG: destination register (NLA_U32: nft_registers)
397 * @NFTA_BYTEORDER_OP: operator (NLA_U32: enum nft_byteorder_ops)
398 * @NFTA_BYTEORDER_LEN: length of the data (NLA_U32)
399 * @NFTA_BYTEORDER_SIZE: data size in bytes (NLA_U32: 2 or 4)
400 */
401enum nft_byteorder_attributes {
402 NFTA_BYTEORDER_UNSPEC,
403 NFTA_BYTEORDER_SREG,
404 NFTA_BYTEORDER_DREG,
405 NFTA_BYTEORDER_OP,
406 NFTA_BYTEORDER_LEN,
407 NFTA_BYTEORDER_SIZE,
408 __NFTA_BYTEORDER_MAX
409};
410#define NFTA_BYTEORDER_MAX (__NFTA_BYTEORDER_MAX - 1)
411
412/**
413 * enum nft_cmp_ops - nf_tables relational operator
414 *
415 * @NFT_CMP_EQ: equal
416 * @NFT_CMP_NEQ: not equal
417 * @NFT_CMP_LT: less than
418 * @NFT_CMP_LTE: less than or equal to
419 * @NFT_CMP_GT: greater than
420 * @NFT_CMP_GTE: greater than or equal to
421 */
422enum nft_cmp_ops {
423 NFT_CMP_EQ,
424 NFT_CMP_NEQ,
425 NFT_CMP_LT,
426 NFT_CMP_LTE,
427 NFT_CMP_GT,
428 NFT_CMP_GTE,
429};
430
431/**
432 * enum nft_cmp_attributes - nf_tables cmp expression netlink attributes
433 *
434 * @NFTA_CMP_SREG: source register of data to compare (NLA_U32: nft_registers)
435 * @NFTA_CMP_OP: cmp operation (NLA_U32: nft_cmp_ops)
436 * @NFTA_CMP_DATA: data to compare against (NLA_NESTED: nft_data_attributes)
437 */
438enum nft_cmp_attributes {
439 NFTA_CMP_UNSPEC,
440 NFTA_CMP_SREG,
441 NFTA_CMP_OP,
442 NFTA_CMP_DATA,
443 __NFTA_CMP_MAX
444};
445#define NFTA_CMP_MAX (__NFTA_CMP_MAX - 1)
446
Patrick McHardy20a69342013-10-11 12:06:22 +0200447/**
448 * enum nft_lookup_attributes - nf_tables set lookup expression netlink attributes
449 *
450 * @NFTA_LOOKUP_SET: name of the set where to look for (NLA_STRING)
451 * @NFTA_LOOKUP_SREG: source register of the data to look for (NLA_U32: nft_registers)
452 * @NFTA_LOOKUP_DREG: destination register (NLA_U32: nft_registers)
453 */
454enum nft_lookup_attributes {
455 NFTA_LOOKUP_UNSPEC,
456 NFTA_LOOKUP_SET,
457 NFTA_LOOKUP_SREG,
458 NFTA_LOOKUP_DREG,
459 __NFTA_LOOKUP_MAX
Patrick McHardy96518512013-10-14 11:00:02 +0200460};
Patrick McHardy20a69342013-10-11 12:06:22 +0200461#define NFTA_LOOKUP_MAX (__NFTA_LOOKUP_MAX - 1)
Patrick McHardy96518512013-10-14 11:00:02 +0200462
463/**
464 * enum nft_payload_bases - nf_tables payload expression offset bases
465 *
466 * @NFT_PAYLOAD_LL_HEADER: link layer header
467 * @NFT_PAYLOAD_NETWORK_HEADER: network header
468 * @NFT_PAYLOAD_TRANSPORT_HEADER: transport header
469 */
470enum nft_payload_bases {
471 NFT_PAYLOAD_LL_HEADER,
472 NFT_PAYLOAD_NETWORK_HEADER,
473 NFT_PAYLOAD_TRANSPORT_HEADER,
474};
475
476/**
477 * enum nft_payload_attributes - nf_tables payload expression netlink attributes
478 *
479 * @NFTA_PAYLOAD_DREG: destination register to load data into (NLA_U32: nft_registers)
480 * @NFTA_PAYLOAD_BASE: payload base (NLA_U32: nft_payload_bases)
481 * @NFTA_PAYLOAD_OFFSET: payload offset relative to base (NLA_U32)
482 * @NFTA_PAYLOAD_LEN: payload length (NLA_U32)
483 */
484enum nft_payload_attributes {
485 NFTA_PAYLOAD_UNSPEC,
486 NFTA_PAYLOAD_DREG,
487 NFTA_PAYLOAD_BASE,
488 NFTA_PAYLOAD_OFFSET,
489 NFTA_PAYLOAD_LEN,
490 __NFTA_PAYLOAD_MAX
491};
492#define NFTA_PAYLOAD_MAX (__NFTA_PAYLOAD_MAX - 1)
493
494/**
495 * enum nft_exthdr_attributes - nf_tables IPv6 extension header expression netlink attributes
496 *
497 * @NFTA_EXTHDR_DREG: destination register (NLA_U32: nft_registers)
498 * @NFTA_EXTHDR_TYPE: extension header type (NLA_U8)
499 * @NFTA_EXTHDR_OFFSET: extension header offset (NLA_U32)
500 * @NFTA_EXTHDR_LEN: extension header length (NLA_U32)
501 */
502enum nft_exthdr_attributes {
503 NFTA_EXTHDR_UNSPEC,
504 NFTA_EXTHDR_DREG,
505 NFTA_EXTHDR_TYPE,
506 NFTA_EXTHDR_OFFSET,
507 NFTA_EXTHDR_LEN,
508 __NFTA_EXTHDR_MAX
509};
510#define NFTA_EXTHDR_MAX (__NFTA_EXTHDR_MAX - 1)
511
512/**
513 * enum nft_meta_keys - nf_tables meta expression keys
514 *
515 * @NFT_META_LEN: packet length (skb->len)
516 * @NFT_META_PROTOCOL: packet ethertype protocol (skb->protocol), invalid in OUTPUT
517 * @NFT_META_PRIORITY: packet priority (skb->priority)
518 * @NFT_META_MARK: packet mark (skb->mark)
519 * @NFT_META_IIF: packet input interface index (dev->ifindex)
520 * @NFT_META_OIF: packet output interface index (dev->ifindex)
521 * @NFT_META_IIFNAME: packet input interface name (dev->name)
522 * @NFT_META_OIFNAME: packet output interface name (dev->name)
523 * @NFT_META_IIFTYPE: packet input interface type (dev->type)
524 * @NFT_META_OIFTYPE: packet output interface type (dev->type)
525 * @NFT_META_SKUID: originating socket UID (fsuid)
526 * @NFT_META_SKGID: originating socket GID (fsgid)
527 * @NFT_META_NFTRACE: packet nftrace bit
528 * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid)
529 * @NFT_META_SECMARK: packet secmark (skb->secmark)
530 */
531enum nft_meta_keys {
532 NFT_META_LEN,
533 NFT_META_PROTOCOL,
534 NFT_META_PRIORITY,
535 NFT_META_MARK,
536 NFT_META_IIF,
537 NFT_META_OIF,
538 NFT_META_IIFNAME,
539 NFT_META_OIFNAME,
540 NFT_META_IIFTYPE,
541 NFT_META_OIFTYPE,
542 NFT_META_SKUID,
543 NFT_META_SKGID,
544 NFT_META_NFTRACE,
545 NFT_META_RTCLASSID,
546 NFT_META_SECMARK,
547};
548
549/**
550 * enum nft_meta_attributes - nf_tables meta expression netlink attributes
551 *
552 * @NFTA_META_DREG: destination register (NLA_U32)
553 * @NFTA_META_KEY: meta data item to load (NLA_U32: nft_meta_keys)
554 */
555enum nft_meta_attributes {
556 NFTA_META_UNSPEC,
557 NFTA_META_DREG,
558 NFTA_META_KEY,
559 __NFTA_META_MAX
560};
561#define NFTA_META_MAX (__NFTA_META_MAX - 1)
562
563/**
564 * enum nft_ct_keys - nf_tables ct expression keys
565 *
566 * @NFT_CT_STATE: conntrack state (bitmask of enum ip_conntrack_info)
567 * @NFT_CT_DIRECTION: conntrack direction (enum ip_conntrack_dir)
568 * @NFT_CT_STATUS: conntrack status (bitmask of enum ip_conntrack_status)
569 * @NFT_CT_MARK: conntrack mark value
570 * @NFT_CT_SECMARK: conntrack secmark value
571 * @NFT_CT_EXPIRATION: relative conntrack expiration time in ms
572 * @NFT_CT_HELPER: connection tracking helper assigned to conntrack
573 * @NFT_CT_L3PROTOCOL: conntrack layer 3 protocol
574 * @NFT_CT_SRC: conntrack layer 3 protocol source (IPv4/IPv6 address)
575 * @NFT_CT_DST: conntrack layer 3 protocol destination (IPv4/IPv6 address)
576 * @NFT_CT_PROTOCOL: conntrack layer 4 protocol
577 * @NFT_CT_PROTO_SRC: conntrack layer 4 protocol source
578 * @NFT_CT_PROTO_DST: conntrack layer 4 protocol destination
579 */
580enum nft_ct_keys {
581 NFT_CT_STATE,
582 NFT_CT_DIRECTION,
583 NFT_CT_STATUS,
584 NFT_CT_MARK,
585 NFT_CT_SECMARK,
586 NFT_CT_EXPIRATION,
587 NFT_CT_HELPER,
588 NFT_CT_L3PROTOCOL,
589 NFT_CT_SRC,
590 NFT_CT_DST,
591 NFT_CT_PROTOCOL,
592 NFT_CT_PROTO_SRC,
593 NFT_CT_PROTO_DST,
594};
595
596/**
597 * enum nft_ct_attributes - nf_tables ct expression netlink attributes
598 *
599 * @NFTA_CT_DREG: destination register (NLA_U32)
600 * @NFTA_CT_KEY: conntrack data item to load (NLA_U32: nft_ct_keys)
601 * @NFTA_CT_DIRECTION: direction in case of directional keys (NLA_U8)
602 */
603enum nft_ct_attributes {
604 NFTA_CT_UNSPEC,
605 NFTA_CT_DREG,
606 NFTA_CT_KEY,
607 NFTA_CT_DIRECTION,
608 __NFTA_CT_MAX
609};
610#define NFTA_CT_MAX (__NFTA_CT_MAX - 1)
611
612/**
613 * enum nft_limit_attributes - nf_tables limit expression netlink attributes
614 *
615 * @NFTA_LIMIT_RATE: refill rate (NLA_U64)
616 * @NFTA_LIMIT_UNIT: refill unit (NLA_U64)
617 */
618enum nft_limit_attributes {
619 NFTA_LIMIT_UNSPEC,
620 NFTA_LIMIT_RATE,
621 NFTA_LIMIT_UNIT,
622 __NFTA_LIMIT_MAX
623};
624#define NFTA_LIMIT_MAX (__NFTA_LIMIT_MAX - 1)
625
626/**
627 * enum nft_counter_attributes - nf_tables counter expression netlink attributes
628 *
629 * @NFTA_COUNTER_BYTES: number of bytes (NLA_U64)
630 * @NFTA_COUNTER_PACKETS: number of packets (NLA_U64)
631 */
632enum nft_counter_attributes {
633 NFTA_COUNTER_UNSPEC,
634 NFTA_COUNTER_BYTES,
635 NFTA_COUNTER_PACKETS,
636 __NFTA_COUNTER_MAX
637};
638#define NFTA_COUNTER_MAX (__NFTA_COUNTER_MAX - 1)
639
640/**
641 * enum nft_log_attributes - nf_tables log expression netlink attributes
642 *
643 * @NFTA_LOG_GROUP: netlink group to send messages to (NLA_U32)
644 * @NFTA_LOG_PREFIX: prefix to prepend to log messages (NLA_STRING)
645 * @NFTA_LOG_SNAPLEN: length of payload to include in netlink message (NLA_U32)
646 * @NFTA_LOG_QTHRESHOLD: queue threshold (NLA_U32)
647 */
648enum nft_log_attributes {
649 NFTA_LOG_UNSPEC,
650 NFTA_LOG_GROUP,
651 NFTA_LOG_PREFIX,
652 NFTA_LOG_SNAPLEN,
653 NFTA_LOG_QTHRESHOLD,
654 __NFTA_LOG_MAX
655};
656#define NFTA_LOG_MAX (__NFTA_LOG_MAX - 1)
657
658/**
659 * enum nft_reject_types - nf_tables reject expression reject types
660 *
661 * @NFT_REJECT_ICMP_UNREACH: reject using ICMP unreachable
662 * @NFT_REJECT_TCP_RST: reject using TCP RST
663 */
664enum nft_reject_types {
665 NFT_REJECT_ICMP_UNREACH,
666 NFT_REJECT_TCP_RST,
667};
668
669/**
670 * enum nft_reject_attributes - nf_tables reject expression netlink attributes
671 *
672 * @NFTA_REJECT_TYPE: packet type to use (NLA_U32: nft_reject_types)
673 * @NFTA_REJECT_ICMP_CODE: ICMP code to use (NLA_U8)
674 */
675enum nft_reject_attributes {
676 NFTA_REJECT_UNSPEC,
677 NFTA_REJECT_TYPE,
678 NFTA_REJECT_ICMP_CODE,
679 __NFTA_REJECT_MAX
680};
681#define NFTA_REJECT_MAX (__NFTA_REJECT_MAX - 1)
682
683/**
684 * enum nft_nat_types - nf_tables nat expression NAT types
685 *
686 * @NFT_NAT_SNAT: source NAT
687 * @NFT_NAT_DNAT: destination NAT
688 */
689enum nft_nat_types {
690 NFT_NAT_SNAT,
691 NFT_NAT_DNAT,
692};
693
694/**
695 * enum nft_nat_attributes - nf_tables nat expression netlink attributes
696 *
697 * @NFTA_NAT_TYPE: NAT type (NLA_U32: nft_nat_types)
Tomasz Bursztykaeb316282013-10-10 13:39:19 +0200698 * @NFTA_NAT_FAMILY: NAT family (NLA_U32)
699 * @NFTA_NAT_REG_ADDR_MIN: source register of address range start (NLA_U32: nft_registers)
700 * @NFTA_NAT_REG_ADDR_MAX: source register of address range end (NLA_U32: nft_registers)
701 * @NFTA_NAT_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
702 * @NFTA_NAT_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
Patrick McHardy96518512013-10-14 11:00:02 +0200703 */
704enum nft_nat_attributes {
705 NFTA_NAT_UNSPEC,
706 NFTA_NAT_TYPE,
Tomasz Bursztykaeb316282013-10-10 13:39:19 +0200707 NFTA_NAT_FAMILY,
708 NFTA_NAT_REG_ADDR_MIN,
709 NFTA_NAT_REG_ADDR_MAX,
710 NFTA_NAT_REG_PROTO_MIN,
711 NFTA_NAT_REG_PROTO_MAX,
Patrick McHardy96518512013-10-14 11:00:02 +0200712 __NFTA_NAT_MAX
713};
714#define NFTA_NAT_MAX (__NFTA_NAT_MAX - 1)
715
716#endif /* _LINUX_NF_TABLES_H */