mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-08-28 09:22:08 +00:00

fib_rule, ip6_tunnel, and a whole lot of if_* headers lack the customary _UAPI in the header guard. Without it YNL build can't protect from in tree and system headers both getting included. YNL doesn't need most of these but it's annoying to have to fix them one by one. Note that header installation strips this _UAPI prefix so this should result in no change to the end user. Acked-by: Jamal Hadi Salim <jhs@mojatatu.com> Reviewed-by: Jason Xing <kerneljasonxing@gmail.com> Reviewed-by: Ido Schimmel <idosch@nvidia.com> Link: https://patch.msgid.link/20250416200840.1338195-1-kuba@kernel.org Signed-off-by: Jakub Kicinski <kuba@kernel.org>
97 lines
2.2 KiB
C
97 lines
2.2 KiB
C
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
|
|
#ifndef _UAPI__LINUX_FIB_RULES_H
|
|
#define _UAPI__LINUX_FIB_RULES_H
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/rtnetlink.h>
|
|
|
|
/* rule is permanent, and cannot be deleted */
|
|
#define FIB_RULE_PERMANENT 0x00000001
|
|
#define FIB_RULE_INVERT 0x00000002
|
|
#define FIB_RULE_UNRESOLVED 0x00000004
|
|
#define FIB_RULE_IIF_DETACHED 0x00000008
|
|
#define FIB_RULE_DEV_DETACHED FIB_RULE_IIF_DETACHED
|
|
#define FIB_RULE_OIF_DETACHED 0x00000010
|
|
|
|
/* try to find source address in routing lookups */
|
|
#define FIB_RULE_FIND_SADDR 0x00010000
|
|
|
|
struct fib_rule_hdr {
|
|
__u8 family;
|
|
__u8 dst_len;
|
|
__u8 src_len;
|
|
__u8 tos;
|
|
|
|
__u8 table;
|
|
__u8 res1; /* reserved */
|
|
__u8 res2; /* reserved */
|
|
__u8 action;
|
|
|
|
__u32 flags;
|
|
};
|
|
|
|
struct fib_rule_uid_range {
|
|
__u32 start;
|
|
__u32 end;
|
|
};
|
|
|
|
struct fib_rule_port_range {
|
|
__u16 start;
|
|
__u16 end;
|
|
};
|
|
|
|
enum {
|
|
FRA_UNSPEC,
|
|
FRA_DST, /* destination address */
|
|
FRA_SRC, /* source address */
|
|
FRA_IIFNAME, /* interface name */
|
|
#define FRA_IFNAME FRA_IIFNAME
|
|
FRA_GOTO, /* target to jump to (FR_ACT_GOTO) */
|
|
FRA_UNUSED2,
|
|
FRA_PRIORITY, /* priority/preference */
|
|
FRA_UNUSED3,
|
|
FRA_UNUSED4,
|
|
FRA_UNUSED5,
|
|
FRA_FWMARK, /* mark */
|
|
FRA_FLOW, /* flow/class id */
|
|
FRA_TUN_ID,
|
|
FRA_SUPPRESS_IFGROUP,
|
|
FRA_SUPPRESS_PREFIXLEN,
|
|
FRA_TABLE, /* Extended table id */
|
|
FRA_FWMASK, /* mask for netfilter mark */
|
|
FRA_OIFNAME,
|
|
FRA_PAD,
|
|
FRA_L3MDEV, /* iif or oif is l3mdev goto its table */
|
|
FRA_UID_RANGE, /* UID range */
|
|
FRA_PROTOCOL, /* Originator of the rule */
|
|
FRA_IP_PROTO, /* ip proto */
|
|
FRA_SPORT_RANGE, /* sport */
|
|
FRA_DPORT_RANGE, /* dport */
|
|
FRA_DSCP, /* dscp */
|
|
FRA_FLOWLABEL, /* flowlabel */
|
|
FRA_FLOWLABEL_MASK, /* flowlabel mask */
|
|
FRA_SPORT_MASK, /* sport mask */
|
|
FRA_DPORT_MASK, /* dport mask */
|
|
FRA_DSCP_MASK, /* dscp mask */
|
|
__FRA_MAX
|
|
};
|
|
|
|
#define FRA_MAX (__FRA_MAX - 1)
|
|
|
|
enum {
|
|
FR_ACT_UNSPEC,
|
|
FR_ACT_TO_TBL, /* Pass to fixed table */
|
|
FR_ACT_GOTO, /* Jump to another rule */
|
|
FR_ACT_NOP, /* No operation */
|
|
FR_ACT_RES3,
|
|
FR_ACT_RES4,
|
|
FR_ACT_BLACKHOLE, /* Drop without notification */
|
|
FR_ACT_UNREACHABLE, /* Drop with ENETUNREACH */
|
|
FR_ACT_PROHIBIT, /* Drop with EACCES */
|
|
__FR_ACT_MAX,
|
|
};
|
|
|
|
#define FR_ACT_MAX (__FR_ACT_MAX - 1)
|
|
|
|
#endif
|