1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
2 #ifndef _UAPI_LINUX_IF_LINK_H
3 #define _UAPI_LINUX_IF_LINK_H
5 #include <linux/types.h>
6 #include <linux/netlink.h>
8 /* This struct should be in sync with struct rtnl_link_stats64 */
9 struct rtnl_link_stats
{
20 /* detailed rx_errors: */
21 __u32 rx_length_errors
;
24 __u32 rx_frame_errors
;
26 __u32 rx_missed_errors
;
28 /* detailed tx_errors */
29 __u32 tx_aborted_errors
;
30 __u32 tx_carrier_errors
;
32 __u32 tx_heartbeat_errors
;
33 __u32 tx_window_errors
;
43 * struct rtnl_link_stats64 - The main device statistics structure.
45 * @rx_packets: Number of good packets received by the interface.
46 * For hardware interfaces counts all good packets received from the device
47 * by the host, including packets which host had to drop at various stages
48 * of processing (even in the driver).
50 * @tx_packets: Number of packets successfully transmitted.
51 * For hardware interfaces counts packets which host was able to successfully
52 * hand over to the device, which does not necessarily mean that packets
53 * had been successfully transmitted out of the device, only that device
54 * acknowledged it copied them out of host memory.
56 * @rx_bytes: Number of good received bytes, corresponding to @rx_packets.
58 * For IEEE 802.3 devices should count the length of Ethernet Frames
61 * @tx_bytes: Number of good transmitted bytes, corresponding to @tx_packets.
63 * For IEEE 802.3 devices should count the length of Ethernet Frames
66 * @rx_errors: Total number of bad packets received on this network device.
67 * This counter must include events counted by @rx_length_errors,
68 * @rx_crc_errors, @rx_frame_errors and other errors not otherwise
71 * @tx_errors: Total number of transmit problems.
72 * This counter must include events counter by @tx_aborted_errors,
73 * @tx_carrier_errors, @tx_fifo_errors, @tx_heartbeat_errors,
74 * @tx_window_errors and other errors not otherwise counted.
76 * @rx_dropped: Number of packets received but not processed,
77 * e.g. due to lack of resources or unsupported protocol.
78 * For hardware interfaces this counter may include packets discarded
79 * due to L2 address filtering but should not include packets dropped
80 * by the device due to buffer exhaustion which are counted separately in
81 * @rx_missed_errors (since procfs folds those two counters together).
83 * @tx_dropped: Number of packets dropped on their way to transmission,
84 * e.g. due to lack of resources.
86 * @multicast: Multicast packets received.
87 * For hardware interfaces this statistic is commonly calculated
88 * at the device level (unlike @rx_packets) and therefore may include
89 * packets which did not reach the host.
91 * For IEEE 802.3 devices this counter may be equivalent to:
93 * - 30.3.1.1.21 aMulticastFramesReceivedOK
95 * @collisions: Number of collisions during packet transmissions.
97 * @rx_length_errors: Number of packets dropped due to invalid length.
98 * Part of aggregate "frame" errors in `/proc/net/dev`.
100 * For IEEE 802.3 devices this counter should be equivalent to a sum
101 * of the following attributes:
103 * - 30.3.1.1.23 aInRangeLengthErrors
104 * - 30.3.1.1.24 aOutOfRangeLengthField
105 * - 30.3.1.1.25 aFrameTooLongErrors
107 * @rx_over_errors: Receiver FIFO overflow event counter.
109 * Historically the count of overflow events. Such events may be
110 * reported in the receive descriptors or via interrupts, and may
111 * not correspond one-to-one with dropped packets.
113 * The recommended interpretation for high speed interfaces is -
114 * number of packets dropped because they did not fit into buffers
115 * provided by the host, e.g. packets larger than MTU or next buffer
116 * in the ring was not available for a scatter transfer.
118 * Part of aggregate "frame" errors in `/proc/net/dev`.
120 * This statistics was historically used interchangeably with
123 * This statistic corresponds to hardware events and is not commonly used
124 * on software devices.
126 * @rx_crc_errors: Number of packets received with a CRC error.
127 * Part of aggregate "frame" errors in `/proc/net/dev`.
129 * For IEEE 802.3 devices this counter must be equivalent to:
131 * - 30.3.1.1.6 aFrameCheckSequenceErrors
133 * @rx_frame_errors: Receiver frame alignment errors.
134 * Part of aggregate "frame" errors in `/proc/net/dev`.
136 * For IEEE 802.3 devices this counter should be equivalent to:
138 * - 30.3.1.1.7 aAlignmentErrors
140 * @rx_fifo_errors: Receiver FIFO error counter.
142 * Historically the count of overflow events. Those events may be
143 * reported in the receive descriptors or via interrupts, and may
144 * not correspond one-to-one with dropped packets.
146 * This statistics was used interchangeably with @rx_over_errors.
147 * Not recommended for use in drivers for high speed interfaces.
149 * This statistic is used on software devices, e.g. to count software
150 * packet queue overflow (can) or sequencing errors (GRE).
152 * @rx_missed_errors: Count of packets missed by the host.
153 * Folded into the "drop" counter in `/proc/net/dev`.
155 * Counts number of packets dropped by the device due to lack
156 * of buffer space. This usually indicates that the host interface
157 * is slower than the network interface, or host is not keeping up
158 * with the receive packet rate.
160 * This statistic corresponds to hardware events and is not used
161 * on software devices.
163 * @tx_aborted_errors:
164 * Part of aggregate "carrier" errors in `/proc/net/dev`.
165 * For IEEE 802.3 devices capable of half-duplex operation this counter
166 * must be equivalent to:
168 * - 30.3.1.1.11 aFramesAbortedDueToXSColls
170 * High speed interfaces may use this counter as a general device
173 * @tx_carrier_errors: Number of frame transmission errors due to loss
174 * of carrier during transmission.
175 * Part of aggregate "carrier" errors in `/proc/net/dev`.
177 * For IEEE 802.3 devices this counter must be equivalent to:
179 * - 30.3.1.1.13 aCarrierSenseErrors
181 * @tx_fifo_errors: Number of frame transmission errors due to device
182 * FIFO underrun / underflow. This condition occurs when the device
183 * begins transmission of a frame but is unable to deliver the
184 * entire frame to the transmitter in time for transmission.
185 * Part of aggregate "carrier" errors in `/proc/net/dev`.
187 * @tx_heartbeat_errors: Number of Heartbeat / SQE Test errors for
188 * old half-duplex Ethernet.
189 * Part of aggregate "carrier" errors in `/proc/net/dev`.
191 * For IEEE 802.3 devices possibly equivalent to:
193 * - 30.3.2.1.4 aSQETestErrors
195 * @tx_window_errors: Number of frame transmission errors due
196 * to late collisions (for Ethernet - after the first 64B of transmission).
197 * Part of aggregate "carrier" errors in `/proc/net/dev`.
199 * For IEEE 802.3 devices this counter must be equivalent to:
201 * - 30.3.1.1.10 aLateCollisions
203 * @rx_compressed: Number of correctly received compressed packets.
204 * This counters is only meaningful for interfaces which support
205 * packet compression (e.g. CSLIP, PPP).
207 * @tx_compressed: Number of transmitted compressed packets.
208 * This counters is only meaningful for interfaces which support
209 * packet compression (e.g. CSLIP, PPP).
211 * @rx_nohandler: Number of packets received on the interface
212 * but dropped by the networking stack because the device is
213 * not designated to receive packets (e.g. backup link in a bond).
215 * @rx_otherhost_dropped: Number of packets dropped due to mismatch
216 * in destination MAC address.
218 struct rtnl_link_stats64
{
230 /* detailed rx_errors: */
231 __u64 rx_length_errors
;
232 __u64 rx_over_errors
;
234 __u64 rx_frame_errors
;
235 __u64 rx_fifo_errors
;
236 __u64 rx_missed_errors
;
238 /* detailed tx_errors */
239 __u64 tx_aborted_errors
;
240 __u64 tx_carrier_errors
;
241 __u64 tx_fifo_errors
;
242 __u64 tx_heartbeat_errors
;
243 __u64 tx_window_errors
;
250 __u64 rx_otherhost_dropped
;
253 /* Subset of link stats useful for in-HW collection. Meaning of the fields is as
254 * for struct rtnl_link_stats64.
256 struct rtnl_hw_stats64
{
268 /* The struct should be in sync with struct ifmap */
269 struct rtnl_link_ifmap
{
280 * Contains nested attributes for address family specific attributes.
281 * Each address family may create a attribute with the address family
282 * number as type and create its own attribute structure in it.
287 * [IFLA_INET_CONF] = ...,
290 * [IFLA_INET6_FLAGS] = ...,
291 * [IFLA_INET6_CONF] = ...,
306 #define IFLA_COST IFLA_COST
308 #define IFLA_PRIORITY IFLA_PRIORITY
310 #define IFLA_MASTER IFLA_MASTER
311 IFLA_WIRELESS
, /* Wireless Extension event - see wireless.h */
312 #define IFLA_WIRELESS IFLA_WIRELESS
313 IFLA_PROTINFO
, /* Protocol specific information for a link */
314 #define IFLA_PROTINFO IFLA_PROTINFO
316 #define IFLA_TXQLEN IFLA_TXQLEN
318 #define IFLA_MAP IFLA_MAP
320 #define IFLA_WEIGHT IFLA_WEIGHT
324 #define IFLA_LINKINFO IFLA_LINKINFO
327 IFLA_NUM_VF
, /* Number of VFs if device is SR-IOV PF */
333 IFLA_GROUP
, /* Group the device belongs to */
335 IFLA_EXT_MASK
, /* Extended info mask, VFs, etc */
336 IFLA_PROMISCUITY
, /* Promiscuity count: > 0 means acts PROMISC */
337 #define IFLA_PROMISCUITY IFLA_PROMISCUITY
342 IFLA_CARRIER_CHANGES
,
354 IFLA_TARGET_NETNSID
= IFLA_IF_NETNSID
, /* new alias */
355 IFLA_CARRIER_UP_COUNT
,
356 IFLA_CARRIER_DOWN_COUNT
,
361 IFLA_ALT_IFNAME
, /* Alternative ifname */
363 IFLA_PROTO_DOWN_REASON
,
365 /* device (sysfs) name as parent, used instead
366 * of IFLA_LINK where there's no parent netdev
368 IFLA_PARENT_DEV_NAME
,
369 IFLA_PARENT_DEV_BUS_NAME
,
373 IFLA_ALLMULTI
, /* Allmulti count: > 0 means acts ALLMULTI */
377 IFLA_GSO_IPV4_MAX_SIZE
,
378 IFLA_GRO_IPV4_MAX_SIZE
,
380 IFLA_MAX_PACING_OFFLOAD_HORIZON
,
385 #define IFLA_MAX (__IFLA_MAX - 1)
388 IFLA_PROTO_DOWN_REASON_UNSPEC
,
389 IFLA_PROTO_DOWN_REASON_MASK
, /* u32, mask for reason bits */
390 IFLA_PROTO_DOWN_REASON_VALUE
, /* u32, reason bit value */
392 __IFLA_PROTO_DOWN_REASON_CNT
,
393 IFLA_PROTO_DOWN_REASON_MAX
= __IFLA_PROTO_DOWN_REASON_CNT
- 1
396 /* backwards compatibility for userspace */
398 #define IFLA_RTA(r) ((struct rtattr*)(((char*)(r)) + NLMSG_ALIGN(sizeof(struct ifinfomsg))))
399 #define IFLA_PAYLOAD(n) NLMSG_PAYLOAD(n,sizeof(struct ifinfomsg))
408 #define IFLA_INET_MAX (__IFLA_INET_MAX - 1)
415 IFF_LOOPBACK, IFF_BROADCAST and IFF_POINTOPOINT are
416 more not changeable by user. They describe link media
417 characteristics and set by device driver.
420 - Combination IFF_BROADCAST|IFF_POINTOPOINT is invalid
421 - If neither of these three flags are set;
422 the interface is NBMA.
424 - IFF_MULTICAST does not mean anything special:
425 multicasts can be used on all not-NBMA links.
426 IFF_MULTICAST means that this media uses special encapsulation
427 for multicast frames. Apparently, all IFF_POINTOPOINT and
428 IFF_BROADCAST devices are able to use multicasts too.
432 For usual devices it is equal ifi_index.
433 If it is a "virtual interface" (f.e. tunnel), ifi_link
434 can point to real physical interface (f.e. for bandwidth calculations),
435 or maybe 0, what means, that real media is unknown (usual
436 for IPIP tunnels, when route to endpoint is allowed to change)
439 /* Subtype attributes for IFLA_PROTINFO */
442 IFLA_INET6_FLAGS
, /* link flags */
443 IFLA_INET6_CONF
, /* sysctl parameters */
444 IFLA_INET6_STATS
, /* statistics */
445 IFLA_INET6_MCAST
, /* MC things. What of them? */
446 IFLA_INET6_CACHEINFO
, /* time values and max reasm size */
447 IFLA_INET6_ICMP6STATS
, /* statistics (icmpv6) */
448 IFLA_INET6_TOKEN
, /* device token */
449 IFLA_INET6_ADDR_GEN_MODE
, /* implicit address generator mode */
450 IFLA_INET6_RA_MTU
, /* mtu carried in the RA message */
454 #define IFLA_INET6_MAX (__IFLA_INET6_MAX - 1)
456 enum in6_addr_gen_mode
{
457 IN6_ADDR_GEN_MODE_EUI64
,
458 IN6_ADDR_GEN_MODE_NONE
,
459 IN6_ADDR_GEN_MODE_STABLE_PRIVACY
,
460 IN6_ADDR_GEN_MODE_RANDOM
,
466 * DOC: Bridge enum definition
468 * Please *note* that the timer values in the following section are expected
469 * in clock_t format, which is seconds multiplied by USER_HZ (generally
472 * @IFLA_BR_FORWARD_DELAY
473 * The bridge forwarding delay is the time spent in LISTENING state
474 * (before moving to LEARNING) and in LEARNING state (before moving
475 * to FORWARDING). Only relevant if STP is enabled.
477 * The valid values are between (2 * USER_HZ) and (30 * USER_HZ).
478 * The default value is (15 * USER_HZ).
480 * @IFLA_BR_HELLO_TIME
481 * The time between hello packets sent by the bridge, when it is a root
482 * bridge or a designated bridge. Only relevant if STP is enabled.
484 * The valid values are between (1 * USER_HZ) and (10 * USER_HZ).
485 * The default value is (2 * USER_HZ).
488 * The hello packet timeout is the time until another bridge in the
489 * spanning tree is assumed to be dead, after reception of its last hello
490 * message. Only relevant if STP is enabled.
492 * The valid values are between (6 * USER_HZ) and (40 * USER_HZ).
493 * The default value is (20 * USER_HZ).
495 * @IFLA_BR_AGEING_TIME
496 * Configure the bridge's FDB entries aging time. It is the time a MAC
497 * address will be kept in the FDB after a packet has been received from
498 * that address. After this time has passed, entries are cleaned up.
499 * Allow values outside the 802.1 standard specification for special cases:
501 * * 0 - entry never ages (all permanent)
502 * * 1 - entry disappears (no persistence)
504 * The default value is (300 * USER_HZ).
507 * Turn spanning tree protocol on (*IFLA_BR_STP_STATE* > 0) or off
508 * (*IFLA_BR_STP_STATE* == 0) for this bridge.
510 * The default value is 0 (disabled).
513 * Set this bridge's spanning tree priority, used during STP root bridge
516 * The valid values are between 0 and 65535.
518 * @IFLA_BR_VLAN_FILTERING
519 * Turn VLAN filtering on (*IFLA_BR_VLAN_FILTERING* > 0) or off
520 * (*IFLA_BR_VLAN_FILTERING* == 0). When disabled, the bridge will not
521 * consider the VLAN tag when handling packets.
523 * The default value is 0 (disabled).
525 * @IFLA_BR_VLAN_PROTOCOL
526 * Set the protocol used for VLAN filtering.
528 * The valid values are 0x8100(802.1Q) or 0x88A8(802.1AD). The default value
531 * @IFLA_BR_GROUP_FWD_MASK
532 * The group forwarding mask. This is the bitmask that is applied to
533 * decide whether to forward incoming frames destined to link-local
534 * addresses (of the form 01:80:C2:00:00:0X).
536 * The default value is 0, which means the bridge does not forward any
537 * link-local frames coming on this port.
540 * The bridge root id, read only.
543 * The bridge id, read only.
546 * The bridge root port, read only.
548 * @IFLA_BR_ROOT_PATH_COST
549 * The bridge root path cost, read only.
551 * @IFLA_BR_TOPOLOGY_CHANGE
552 * The bridge topology change, read only.
554 * @IFLA_BR_TOPOLOGY_CHANGE_DETECTED
555 * The bridge topology change detected, read only.
557 * @IFLA_BR_HELLO_TIMER
558 * The bridge hello timer, read only.
561 * The bridge tcn timer, read only.
563 * @IFLA_BR_TOPOLOGY_CHANGE_TIMER
564 * The bridge topology change timer, read only.
567 * The bridge gc timer, read only.
569 * @IFLA_BR_GROUP_ADDR
570 * Set the MAC address of the multicast group this bridge uses for STP.
571 * The address must be a link-local address in standard Ethernet MAC address
572 * format. It is an address of the form 01:80:C2:00:00:0X, with X in [0, 4..f].
574 * The default value is 0.
577 * Flush bridge's fdb dynamic entries.
579 * @IFLA_BR_MCAST_ROUTER
580 * Set bridge's multicast router if IGMP snooping is enabled.
581 * The valid values are:
584 * * 1 - automatic (queried).
585 * * 2 - permanently enabled.
587 * The default value is 1.
589 * @IFLA_BR_MCAST_SNOOPING
590 * Turn multicast snooping on (*IFLA_BR_MCAST_SNOOPING* > 0) or off
591 * (*IFLA_BR_MCAST_SNOOPING* == 0).
593 * The default value is 1.
595 * @IFLA_BR_MCAST_QUERY_USE_IFADDR
596 * If enabled use the bridge's own IP address as source address for IGMP
597 * queries (*IFLA_BR_MCAST_QUERY_USE_IFADDR* > 0) or the default of 0.0.0.0
598 * (*IFLA_BR_MCAST_QUERY_USE_IFADDR* == 0).
600 * The default value is 0 (disabled).
602 * @IFLA_BR_MCAST_QUERIER
603 * Enable (*IFLA_BR_MULTICAST_QUERIER* > 0) or disable
604 * (*IFLA_BR_MULTICAST_QUERIER* == 0) IGMP querier, ie sending of multicast
605 * queries by the bridge.
607 * The default value is 0 (disabled).
609 * @IFLA_BR_MCAST_HASH_ELASTICITY
610 * Set multicast database hash elasticity, It is the maximum chain length in
611 * the multicast hash table. This attribute is *deprecated* and the value
614 * @IFLA_BR_MCAST_HASH_MAX
615 * Set maximum size of the multicast hash table
617 * The default value is 4096, the value must be a power of 2.
619 * @IFLA_BR_MCAST_LAST_MEMBER_CNT
620 * The Last Member Query Count is the number of Group-Specific Queries
621 * sent before the router assumes there are no local members. The Last
622 * Member Query Count is also the number of Group-and-Source-Specific
623 * Queries sent before the router assumes there are no listeners for a
626 * The default value is 2.
628 * @IFLA_BR_MCAST_STARTUP_QUERY_CNT
629 * The Startup Query Count is the number of Queries sent out on startup,
630 * separated by the Startup Query Interval.
632 * The default value is 2.
634 * @IFLA_BR_MCAST_LAST_MEMBER_INTVL
635 * The Last Member Query Interval is the Max Response Time inserted into
636 * Group-Specific Queries sent in response to Leave Group messages, and
637 * is also the amount of time between Group-Specific Query messages.
639 * The default value is (1 * USER_HZ).
641 * @IFLA_BR_MCAST_MEMBERSHIP_INTVL
642 * The interval after which the bridge will leave a group, if no membership
643 * reports for this group are received.
645 * The default value is (260 * USER_HZ).
647 * @IFLA_BR_MCAST_QUERIER_INTVL
648 * The interval between queries sent by other routers. if no queries are
649 * seen after this delay has passed, the bridge will start to send its own
650 * queries (as if *IFLA_BR_MCAST_QUERIER_INTVL* was enabled).
652 * The default value is (255 * USER_HZ).
654 * @IFLA_BR_MCAST_QUERY_INTVL
655 * The Query Interval is the interval between General Queries sent by
658 * The default value is (125 * USER_HZ). The minimum value is (1 * USER_HZ).
660 * @IFLA_BR_MCAST_QUERY_RESPONSE_INTVL
661 * The Max Response Time used to calculate the Max Resp Code inserted
662 * into the periodic General Queries.
664 * The default value is (10 * USER_HZ).
666 * @IFLA_BR_MCAST_STARTUP_QUERY_INTVL
667 * The interval between queries in the startup phase.
669 * The default value is (125 * USER_HZ) / 4. The minimum value is (1 * USER_HZ).
671 * @IFLA_BR_NF_CALL_IPTABLES
672 * Enable (*NF_CALL_IPTABLES* > 0) or disable (*NF_CALL_IPTABLES* == 0)
673 * iptables hooks on the bridge.
675 * The default value is 0 (disabled).
677 * @IFLA_BR_NF_CALL_IP6TABLES
678 * Enable (*NF_CALL_IP6TABLES* > 0) or disable (*NF_CALL_IP6TABLES* == 0)
679 * ip6tables hooks on the bridge.
681 * The default value is 0 (disabled).
683 * @IFLA_BR_NF_CALL_ARPTABLES
684 * Enable (*NF_CALL_ARPTABLES* > 0) or disable (*NF_CALL_ARPTABLES* == 0)
685 * arptables hooks on the bridge.
687 * The default value is 0 (disabled).
689 * @IFLA_BR_VLAN_DEFAULT_PVID
690 * VLAN ID applied to untagged and priority-tagged incoming packets.
692 * The default value is 1. Setting to the special value 0 makes all ports of
693 * this bridge not have a PVID by default, which means that they will
694 * not accept VLAN-untagged traffic.
697 * Bridge attribute padding type for netlink message.
699 * @IFLA_BR_VLAN_STATS_ENABLED
700 * Enable (*IFLA_BR_VLAN_STATS_ENABLED* == 1) or disable
701 * (*IFLA_BR_VLAN_STATS_ENABLED* == 0) per-VLAN stats accounting.
703 * The default value is 0 (disabled).
705 * @IFLA_BR_MCAST_STATS_ENABLED
706 * Enable (*IFLA_BR_MCAST_STATS_ENABLED* > 0) or disable
707 * (*IFLA_BR_MCAST_STATS_ENABLED* == 0) multicast (IGMP/MLD) stats
710 * The default value is 0 (disabled).
712 * @IFLA_BR_MCAST_IGMP_VERSION
713 * Set the IGMP version.
715 * The valid values are 2 and 3. The default value is 2.
717 * @IFLA_BR_MCAST_MLD_VERSION
718 * Set the MLD version.
720 * The valid values are 1 and 2. The default value is 1.
722 * @IFLA_BR_VLAN_STATS_PER_PORT
723 * Enable (*IFLA_BR_VLAN_STATS_PER_PORT* == 1) or disable
724 * (*IFLA_BR_VLAN_STATS_PER_PORT* == 0) per-VLAN per-port stats accounting.
725 * Can be changed only when there are no port VLANs configured.
727 * The default value is 0 (disabled).
729 * @IFLA_BR_MULTI_BOOLOPT
730 * The multi_boolopt is used to control new boolean options to avoid adding
731 * new netlink attributes. You can look at ``enum br_boolopt_id`` for those
734 * @IFLA_BR_MCAST_QUERIER_STATE
735 * Bridge mcast querier states, read only.
737 * @IFLA_BR_FDB_N_LEARNED
738 * The number of dynamically learned FDB entries for the current bridge,
741 * @IFLA_BR_FDB_MAX_LEARNED
742 * Set the number of max dynamically learned FDB entries for the current
747 IFLA_BR_FORWARD_DELAY
,
753 IFLA_BR_VLAN_FILTERING
,
754 IFLA_BR_VLAN_PROTOCOL
,
755 IFLA_BR_GROUP_FWD_MASK
,
759 IFLA_BR_ROOT_PATH_COST
,
760 IFLA_BR_TOPOLOGY_CHANGE
,
761 IFLA_BR_TOPOLOGY_CHANGE_DETECTED
,
764 IFLA_BR_TOPOLOGY_CHANGE_TIMER
,
768 IFLA_BR_MCAST_ROUTER
,
769 IFLA_BR_MCAST_SNOOPING
,
770 IFLA_BR_MCAST_QUERY_USE_IFADDR
,
771 IFLA_BR_MCAST_QUERIER
,
772 IFLA_BR_MCAST_HASH_ELASTICITY
,
773 IFLA_BR_MCAST_HASH_MAX
,
774 IFLA_BR_MCAST_LAST_MEMBER_CNT
,
775 IFLA_BR_MCAST_STARTUP_QUERY_CNT
,
776 IFLA_BR_MCAST_LAST_MEMBER_INTVL
,
777 IFLA_BR_MCAST_MEMBERSHIP_INTVL
,
778 IFLA_BR_MCAST_QUERIER_INTVL
,
779 IFLA_BR_MCAST_QUERY_INTVL
,
780 IFLA_BR_MCAST_QUERY_RESPONSE_INTVL
,
781 IFLA_BR_MCAST_STARTUP_QUERY_INTVL
,
782 IFLA_BR_NF_CALL_IPTABLES
,
783 IFLA_BR_NF_CALL_IP6TABLES
,
784 IFLA_BR_NF_CALL_ARPTABLES
,
785 IFLA_BR_VLAN_DEFAULT_PVID
,
787 IFLA_BR_VLAN_STATS_ENABLED
,
788 IFLA_BR_MCAST_STATS_ENABLED
,
789 IFLA_BR_MCAST_IGMP_VERSION
,
790 IFLA_BR_MCAST_MLD_VERSION
,
791 IFLA_BR_VLAN_STATS_PER_PORT
,
792 IFLA_BR_MULTI_BOOLOPT
,
793 IFLA_BR_MCAST_QUERIER_STATE
,
794 IFLA_BR_FDB_N_LEARNED
,
795 IFLA_BR_FDB_MAX_LEARNED
,
799 #define IFLA_BR_MAX (__IFLA_BR_MAX - 1)
801 struct ifla_bridge_id
{
803 __u8 addr
[6]; /* ETH_ALEN */
807 * DOC: Bridge mode enum definition
809 * @BRIDGE_MODE_HAIRPIN
810 * Controls whether traffic may be sent back out of the port on which it
811 * was received. This option is also called reflective relay mode, and is
812 * used to support basic VEPA (Virtual Ethernet Port Aggregator)
813 * capabilities. By default, this flag is turned off and the bridge will
814 * not forward traffic back out of the receiving port.
822 * DOC: Bridge port enum definition
825 * The operation state of the port. Here are the valid values.
827 * * 0 - port is in STP *DISABLED* state. Make this port completely
828 * inactive for STP. This is also called BPDU filter and could be used
829 * to disable STP on an untrusted port, like a leaf virtual device.
830 * The traffic forwarding is also stopped on this port.
831 * * 1 - port is in STP *LISTENING* state. Only valid if STP is enabled
832 * on the bridge. In this state the port listens for STP BPDUs and
833 * drops all other traffic frames.
834 * * 2 - port is in STP *LEARNING* state. Only valid if STP is enabled on
835 * the bridge. In this state the port will accept traffic only for the
836 * purpose of updating MAC address tables.
837 * * 3 - port is in STP *FORWARDING* state. Port is fully active.
838 * * 4 - port is in STP *BLOCKING* state. Only valid if STP is enabled on
839 * the bridge. This state is used during the STP election process.
840 * In this state, port will only process STP BPDUs.
842 * @IFLA_BRPORT_PRIORITY
843 * The STP port priority. The valid values are between 0 and 255.
846 * The STP path cost of the port. The valid values are between 1 and 65535.
849 * Set the bridge port mode. See *BRIDGE_MODE_HAIRPIN* for more details.
852 * Controls whether STP BPDUs will be processed by the bridge port. By
853 * default, the flag is turned off to allow BPDU processing. Turning this
854 * flag on will disable the bridge port if a STP BPDU packet is received.
856 * If the bridge has Spanning Tree enabled, hostile devices on the network
857 * may send BPDU on a port and cause network failure. Setting *guard on*
858 * will detect and stop this by disabling the port. The port will be
859 * restarted if the link is brought down, or removed and reattached.
861 * @IFLA_BRPORT_PROTECT
862 * Controls whether a given port is allowed to become a root port or not.
863 * Only used when STP is enabled on the bridge. By default the flag is off.
865 * This feature is also called root port guard. If BPDU is received from a
866 * leaf (edge) port, it should not be elected as root port. This could
867 * be used if using STP on a bridge and the downstream bridges are not fully
868 * trusted; this prevents a hostile guest from rerouting traffic.
870 * @IFLA_BRPORT_FAST_LEAVE
871 * This flag allows the bridge to immediately stop multicast traffic
872 * forwarding on a port that receives an IGMP Leave message. It is only used
873 * when IGMP snooping is enabled on the bridge. By default the flag is off.
875 * @IFLA_BRPORT_LEARNING
876 * Controls whether a given port will learn *source* MAC addresses from
877 * received traffic or not. Also controls whether dynamic FDB entries
878 * (which can also be added by software) will be refreshed by incoming
879 * traffic. By default this flag is on.
881 * @IFLA_BRPORT_UNICAST_FLOOD
882 * Controls whether unicast traffic for which there is no FDB entry will
883 * be flooded towards this port. By default this flag is on.
885 * @IFLA_BRPORT_PROXYARP
886 * Enable proxy ARP on this port.
888 * @IFLA_BRPORT_LEARNING_SYNC
889 * Controls whether a given port will sync MAC addresses learned on device
890 * port to bridge FDB.
892 * @IFLA_BRPORT_PROXYARP_WIFI
893 * Enable proxy ARP on this port which meets extended requirements by
894 * IEEE 802.11 and Hotspot 2.0 specifications.
896 * @IFLA_BRPORT_ROOT_ID
898 * @IFLA_BRPORT_BRIDGE_ID
900 * @IFLA_BRPORT_DESIGNATED_PORT
902 * @IFLA_BRPORT_DESIGNATED_COST
908 * @IFLA_BRPORT_TOPOLOGY_CHANGE_ACK
910 * @IFLA_BRPORT_CONFIG_PENDING
912 * @IFLA_BRPORT_MESSAGE_AGE_TIMER
914 * @IFLA_BRPORT_FORWARD_DELAY_TIMER
916 * @IFLA_BRPORT_HOLD_TIMER
919 * Flush bridge ports' fdb dynamic entries.
921 * @IFLA_BRPORT_MULTICAST_ROUTER
922 * Configure the port's multicast router presence. A port with
923 * a multicast router will receive all multicast traffic.
924 * The valid values are:
926 * * 0 disable multicast routers on this port
927 * * 1 let the system detect the presence of routers (default)
928 * * 2 permanently enable multicast traffic forwarding on this port
929 * * 3 enable multicast routers temporarily on this port, not depending
930 * on incoming queries.
934 * @IFLA_BRPORT_MCAST_FLOOD
935 * Controls whether a given port will flood multicast traffic for which
936 * there is no MDB entry. By default this flag is on.
938 * @IFLA_BRPORT_MCAST_TO_UCAST
939 * Controls whether a given port will replicate packets using unicast
940 * instead of multicast. By default this flag is off.
942 * This is done by copying the packet per host and changing the multicast
943 * destination MAC to a unicast one accordingly.
945 * *mcast_to_unicast* works on top of the multicast snooping feature of the
946 * bridge. Which means unicast copies are only delivered to hosts which
947 * are interested in unicast and signaled this via IGMP/MLD reports previously.
949 * This feature is intended for interface types which have a more reliable
950 * and/or efficient way to deliver unicast packets than broadcast ones
953 * However, it should only be enabled on interfaces where no IGMPv2/MLDv1
954 * report suppression takes place. IGMP/MLD report suppression issue is
955 * usually overcome by the network daemon (supplicant) enabling AP isolation
956 * and by that separating all STAs.
958 * Delivery of STA-to-STA IP multicast is made possible again by enabling
959 * and utilizing the bridge hairpin mode, which considers the incoming port
960 * as a potential outgoing port, too (see *BRIDGE_MODE_HAIRPIN* option).
961 * Hairpin mode is performed after multicast snooping, therefore leading
962 * to only deliver reports to STAs running a multicast router.
964 * @IFLA_BRPORT_VLAN_TUNNEL
965 * Controls whether vlan to tunnel mapping is enabled on the port.
966 * By default this flag is off.
968 * @IFLA_BRPORT_BCAST_FLOOD
969 * Controls flooding of broadcast traffic on the given port. By default
972 * @IFLA_BRPORT_GROUP_FWD_MASK
973 * Set the group forward mask. This is a bitmask that is applied to
974 * decide whether to forward incoming frames destined to link-local
975 * addresses. The addresses of the form are 01:80:C2:00:00:0X (defaults
976 * to 0, which means the bridge does not forward any link-local frames
977 * coming on this port).
979 * @IFLA_BRPORT_NEIGH_SUPPRESS
980 * Controls whether neighbor discovery (arp and nd) proxy and suppression
981 * is enabled on the port. By default this flag is off.
983 * @IFLA_BRPORT_ISOLATED
984 * Controls whether a given port will be isolated, which means it will be
985 * able to communicate with non-isolated ports only. By default this
988 * @IFLA_BRPORT_BACKUP_PORT
989 * Set a backup port. If the port loses carrier all traffic will be
990 * redirected to the configured backup port. Set the value to 0 to disable
993 * @IFLA_BRPORT_MRP_RING_OPEN
995 * @IFLA_BRPORT_MRP_IN_OPEN
997 * @IFLA_BRPORT_MCAST_EHT_HOSTS_LIMIT
998 * The number of per-port EHT hosts limit. The default value is 512.
999 * Setting to 0 is not allowed.
1001 * @IFLA_BRPORT_MCAST_EHT_HOSTS_CNT
1002 * The current number of tracked hosts, read only.
1004 * @IFLA_BRPORT_LOCKED
1005 * Controls whether a port will be locked, meaning that hosts behind the
1006 * port will not be able to communicate through the port unless an FDB
1007 * entry with the unit's MAC address is in the FDB. The common use case is
1008 * that hosts are allowed access through authentication with the IEEE 802.1X
1009 * protocol or based on whitelists. By default this flag is off.
1011 * Please note that secure 802.1X deployments should always use the
1012 * *BR_BOOLOPT_NO_LL_LEARN* flag, to not permit the bridge to populate its
1013 * FDB based on link-local (EAPOL) traffic received on the port.
1016 * Controls whether a port will use MAC Authentication Bypass (MAB), a
1017 * technique through which select MAC addresses may be allowed on a locked
1018 * port, without using 802.1X authentication. Packets with an unknown source
1019 * MAC address generates a "locked" FDB entry on the incoming bridge port.
1020 * The common use case is for user space to react to these bridge FDB
1021 * notifications and optionally replace the locked FDB entry with a normal
1022 * one, allowing traffic to pass for whitelisted MAC addresses.
1024 * Setting this flag also requires *IFLA_BRPORT_LOCKED* and
1025 * *IFLA_BRPORT_LEARNING*. *IFLA_BRPORT_LOCKED* ensures that unauthorized
1026 * data packets are dropped, and *IFLA_BRPORT_LEARNING* allows the dynamic
1027 * FDB entries installed by user space (as replacements for the locked FDB
1028 * entries) to be refreshed and/or aged out.
1030 * @IFLA_BRPORT_MCAST_N_GROUPS
1032 * @IFLA_BRPORT_MCAST_MAX_GROUPS
1033 * Sets the maximum number of MDB entries that can be registered for a
1034 * given port. Attempts to register more MDB entries at the port than this
1035 * limit allows will be rejected, whether they are done through netlink
1036 * (e.g. the bridge tool), or IGMP or MLD membership reports. Setting a
1037 * limit of 0 disables the limit. The default value is 0.
1039 * @IFLA_BRPORT_NEIGH_VLAN_SUPPRESS
1040 * Controls whether neighbor discovery (arp and nd) proxy and suppression is
1041 * enabled for a given port. By default this flag is off.
1043 * Note that this option only takes effect when *IFLA_BRPORT_NEIGH_SUPPRESS*
1044 * is enabled for a given port.
1046 * @IFLA_BRPORT_BACKUP_NHID
1047 * The FDB nexthop object ID to attach to packets being redirected to a
1048 * backup port that has VLAN tunnel mapping enabled (via the
1049 * *IFLA_BRPORT_VLAN_TUNNEL* option). Setting a value of 0 (default) has
1050 * the effect of not attaching any ID.
1054 IFLA_BRPORT_STATE
, /* Spanning tree state */
1055 IFLA_BRPORT_PRIORITY
, /* " priority */
1056 IFLA_BRPORT_COST
, /* " cost */
1057 IFLA_BRPORT_MODE
, /* mode (hairpin) */
1058 IFLA_BRPORT_GUARD
, /* bpdu guard */
1059 IFLA_BRPORT_PROTECT
, /* root port protection */
1060 IFLA_BRPORT_FAST_LEAVE
, /* multicast fast leave */
1061 IFLA_BRPORT_LEARNING
, /* mac learning */
1062 IFLA_BRPORT_UNICAST_FLOOD
, /* flood unicast traffic */
1063 IFLA_BRPORT_PROXYARP
, /* proxy ARP */
1064 IFLA_BRPORT_LEARNING_SYNC
, /* mac learning sync from device */
1065 IFLA_BRPORT_PROXYARP_WIFI
, /* proxy ARP for Wi-Fi */
1066 IFLA_BRPORT_ROOT_ID
, /* designated root */
1067 IFLA_BRPORT_BRIDGE_ID
, /* designated bridge */
1068 IFLA_BRPORT_DESIGNATED_PORT
,
1069 IFLA_BRPORT_DESIGNATED_COST
,
1072 IFLA_BRPORT_TOPOLOGY_CHANGE_ACK
,
1073 IFLA_BRPORT_CONFIG_PENDING
,
1074 IFLA_BRPORT_MESSAGE_AGE_TIMER
,
1075 IFLA_BRPORT_FORWARD_DELAY_TIMER
,
1076 IFLA_BRPORT_HOLD_TIMER
,
1078 IFLA_BRPORT_MULTICAST_ROUTER
,
1080 IFLA_BRPORT_MCAST_FLOOD
,
1081 IFLA_BRPORT_MCAST_TO_UCAST
,
1082 IFLA_BRPORT_VLAN_TUNNEL
,
1083 IFLA_BRPORT_BCAST_FLOOD
,
1084 IFLA_BRPORT_GROUP_FWD_MASK
,
1085 IFLA_BRPORT_NEIGH_SUPPRESS
,
1086 IFLA_BRPORT_ISOLATED
,
1087 IFLA_BRPORT_BACKUP_PORT
,
1088 IFLA_BRPORT_MRP_RING_OPEN
,
1089 IFLA_BRPORT_MRP_IN_OPEN
,
1090 IFLA_BRPORT_MCAST_EHT_HOSTS_LIMIT
,
1091 IFLA_BRPORT_MCAST_EHT_HOSTS_CNT
,
1094 IFLA_BRPORT_MCAST_N_GROUPS
,
1095 IFLA_BRPORT_MCAST_MAX_GROUPS
,
1096 IFLA_BRPORT_NEIGH_VLAN_SUPPRESS
,
1097 IFLA_BRPORT_BACKUP_NHID
,
1100 #define IFLA_BRPORT_MAX (__IFLA_BRPORT_MAX - 1)
1102 struct ifla_cacheinfo
{
1103 __u32 max_reasm_len
;
1104 __u32 tstamp
; /* ipv6InterfaceTable updated timestamp */
1105 __u32 reachable_time
;
1114 IFLA_INFO_SLAVE_KIND
,
1115 IFLA_INFO_SLAVE_DATA
,
1119 #define IFLA_INFO_MAX (__IFLA_INFO_MAX - 1)
1127 IFLA_VLAN_EGRESS_QOS
,
1128 IFLA_VLAN_INGRESS_QOS
,
1133 #define IFLA_VLAN_MAX (__IFLA_VLAN_MAX - 1)
1135 struct ifla_vlan_flags
{
1141 IFLA_VLAN_QOS_UNSPEC
,
1142 IFLA_VLAN_QOS_MAPPING
,
1146 #define IFLA_VLAN_QOS_MAX (__IFLA_VLAN_QOS_MAX - 1)
1148 struct ifla_vlan_qos_mapping
{
1153 /* MACVLAN section */
1155 IFLA_MACVLAN_UNSPEC
,
1158 IFLA_MACVLAN_MACADDR_MODE
,
1159 IFLA_MACVLAN_MACADDR
,
1160 IFLA_MACVLAN_MACADDR_DATA
,
1161 IFLA_MACVLAN_MACADDR_COUNT
,
1162 IFLA_MACVLAN_BC_QUEUE_LEN
,
1163 IFLA_MACVLAN_BC_QUEUE_LEN_USED
,
1164 IFLA_MACVLAN_BC_CUTOFF
,
1168 #define IFLA_MACVLAN_MAX (__IFLA_MACVLAN_MAX - 1)
1171 MACVLAN_MODE_PRIVATE
= 1, /* don't talk to other macvlans */
1172 MACVLAN_MODE_VEPA
= 2, /* talk to other ports through ext bridge */
1173 MACVLAN_MODE_BRIDGE
= 4, /* talk to bridge ports directly */
1174 MACVLAN_MODE_PASSTHRU
= 8,/* take over the underlying device */
1175 MACVLAN_MODE_SOURCE
= 16,/* use source MAC address list to assign */
1178 enum macvlan_macaddr_mode
{
1179 MACVLAN_MACADDR_ADD
,
1180 MACVLAN_MACADDR_DEL
,
1181 MACVLAN_MACADDR_FLUSH
,
1182 MACVLAN_MACADDR_SET
,
1185 #define MACVLAN_FLAG_NOPROMISC 1
1186 #define MACVLAN_FLAG_NODST 2 /* skip dst macvlan if matching src macvlan */
1195 #define IFLA_VRF_MAX (__IFLA_VRF_MAX - 1)
1198 IFLA_VRF_PORT_UNSPEC
,
1199 IFLA_VRF_PORT_TABLE
,
1203 #define IFLA_VRF_PORT_MAX (__IFLA_VRF_PORT_MAX - 1)
1205 /* MACSEC section */
1210 IFLA_MACSEC_ICV_LEN
,
1211 IFLA_MACSEC_CIPHER_SUITE
,
1213 IFLA_MACSEC_ENCODING_SA
,
1214 IFLA_MACSEC_ENCRYPT
,
1215 IFLA_MACSEC_PROTECT
,
1216 IFLA_MACSEC_INC_SCI
,
1219 IFLA_MACSEC_REPLAY_PROTECT
,
1220 IFLA_MACSEC_VALIDATION
,
1222 IFLA_MACSEC_OFFLOAD
,
1226 #define IFLA_MACSEC_MAX (__IFLA_MACSEC_MAX - 1)
1233 IFLA_XFRM_COLLECT_METADATA
,
1237 #define IFLA_XFRM_MAX (__IFLA_XFRM_MAX - 1)
1239 enum macsec_validation_type
{
1240 MACSEC_VALIDATE_DISABLED
= 0,
1241 MACSEC_VALIDATE_CHECK
= 1,
1242 MACSEC_VALIDATE_STRICT
= 2,
1243 __MACSEC_VALIDATE_END
,
1244 MACSEC_VALIDATE_MAX
= __MACSEC_VALIDATE_END
- 1,
1247 enum macsec_offload
{
1248 MACSEC_OFFLOAD_OFF
= 0,
1249 MACSEC_OFFLOAD_PHY
= 1,
1250 MACSEC_OFFLOAD_MAC
= 2,
1251 __MACSEC_OFFLOAD_END
,
1252 MACSEC_OFFLOAD_MAX
= __MACSEC_OFFLOAD_END
- 1,
1255 /* IPVLAN section */
1263 #define IFLA_IPVLAN_MAX (__IFLA_IPVLAN_MAX - 1)
1272 #define IPVLAN_F_PRIVATE 0x01
1273 #define IPVLAN_F_VEPA 0x02
1275 /* Tunnel RTM header */
1283 /* netkit section */
1284 enum netkit_action
{
1288 NETKIT_REDIRECT
= 7,
1296 /* NETKIT_SCRUB_NONE leaves clearing skb->{mark,priority} up to
1297 * the BPF program if attached. This also means the latter can
1298 * consume the two fields if they were populated earlier.
1300 * NETKIT_SCRUB_DEFAULT zeroes skb->{mark,priority} fields before
1301 * invoking the attached BPF program when the peer device resides
1302 * in a different network namespace. This is the default behavior.
1306 NETKIT_SCRUB_DEFAULT
,
1311 IFLA_NETKIT_PEER_INFO
,
1312 IFLA_NETKIT_PRIMARY
,
1314 IFLA_NETKIT_PEER_POLICY
,
1317 IFLA_NETKIT_PEER_SCRUB
,
1320 #define IFLA_NETKIT_MAX (__IFLA_NETKIT_MAX - 1)
1324 /* include statistics in the dump */
1325 #define TUNNEL_MSG_FLAG_STATS 0x01
1327 #define TUNNEL_MSG_VALID_USER_FLAGS TUNNEL_MSG_FLAG_STATS
1329 /* Embedded inside VXLAN_VNIFILTER_ENTRY_STATS */
1331 VNIFILTER_ENTRY_STATS_UNSPEC
,
1332 VNIFILTER_ENTRY_STATS_RX_BYTES
,
1333 VNIFILTER_ENTRY_STATS_RX_PKTS
,
1334 VNIFILTER_ENTRY_STATS_RX_DROPS
,
1335 VNIFILTER_ENTRY_STATS_RX_ERRORS
,
1336 VNIFILTER_ENTRY_STATS_TX_BYTES
,
1337 VNIFILTER_ENTRY_STATS_TX_PKTS
,
1338 VNIFILTER_ENTRY_STATS_TX_DROPS
,
1339 VNIFILTER_ENTRY_STATS_TX_ERRORS
,
1340 VNIFILTER_ENTRY_STATS_PAD
,
1341 __VNIFILTER_ENTRY_STATS_MAX
1343 #define VNIFILTER_ENTRY_STATS_MAX (__VNIFILTER_ENTRY_STATS_MAX - 1)
1346 VXLAN_VNIFILTER_ENTRY_UNSPEC
,
1347 VXLAN_VNIFILTER_ENTRY_START
,
1348 VXLAN_VNIFILTER_ENTRY_END
,
1349 VXLAN_VNIFILTER_ENTRY_GROUP
,
1350 VXLAN_VNIFILTER_ENTRY_GROUP6
,
1351 VXLAN_VNIFILTER_ENTRY_STATS
,
1352 __VXLAN_VNIFILTER_ENTRY_MAX
1354 #define VXLAN_VNIFILTER_ENTRY_MAX (__VXLAN_VNIFILTER_ENTRY_MAX - 1)
1357 VXLAN_VNIFILTER_UNSPEC
,
1358 VXLAN_VNIFILTER_ENTRY
,
1359 __VXLAN_VNIFILTER_MAX
1361 #define VXLAN_VNIFILTER_MAX (__VXLAN_VNIFILTER_MAX - 1)
1366 IFLA_VXLAN_GROUP
, /* group or remote address */
1371 IFLA_VXLAN_LEARNING
,
1374 IFLA_VXLAN_PORT_RANGE
, /* source port */
1379 IFLA_VXLAN_PORT
, /* destination port */
1382 IFLA_VXLAN_UDP_CSUM
,
1383 IFLA_VXLAN_UDP_ZERO_CSUM6_TX
,
1384 IFLA_VXLAN_UDP_ZERO_CSUM6_RX
,
1385 IFLA_VXLAN_REMCSUM_TX
,
1386 IFLA_VXLAN_REMCSUM_RX
,
1388 IFLA_VXLAN_REMCSUM_NOPARTIAL
,
1389 IFLA_VXLAN_COLLECT_METADATA
,
1392 IFLA_VXLAN_TTL_INHERIT
,
1394 IFLA_VXLAN_VNIFILTER
, /* only applicable with COLLECT_METADATA mode */
1395 IFLA_VXLAN_LOCALBYPASS
,
1396 IFLA_VXLAN_LABEL_POLICY
, /* IPv6 flow label policy; ifla_vxlan_label_policy */
1399 #define IFLA_VXLAN_MAX (__IFLA_VXLAN_MAX - 1)
1401 struct ifla_vxlan_port_range
{
1406 enum ifla_vxlan_df
{
1411 VXLAN_DF_MAX
= __VXLAN_DF_END
- 1,
1414 enum ifla_vxlan_label_policy
{
1415 VXLAN_LABEL_FIXED
= 0,
1416 VXLAN_LABEL_INHERIT
= 1,
1418 VXLAN_LABEL_MAX
= __VXLAN_LABEL_END
- 1,
1421 /* GENEVE section */
1428 IFLA_GENEVE_PORT
, /* destination port */
1429 IFLA_GENEVE_COLLECT_METADATA
,
1430 IFLA_GENEVE_REMOTE6
,
1431 IFLA_GENEVE_UDP_CSUM
,
1432 IFLA_GENEVE_UDP_ZERO_CSUM6_TX
,
1433 IFLA_GENEVE_UDP_ZERO_CSUM6_RX
,
1435 IFLA_GENEVE_TTL_INHERIT
,
1437 IFLA_GENEVE_INNER_PROTO_INHERIT
,
1440 #define IFLA_GENEVE_MAX (__IFLA_GENEVE_MAX - 1)
1442 enum ifla_geneve_df
{
1443 GENEVE_DF_UNSET
= 0,
1447 GENEVE_DF_MAX
= __GENEVE_DF_END
- 1,
1450 /* Bareudp section */
1452 IFLA_BAREUDP_UNSPEC
,
1454 IFLA_BAREUDP_ETHERTYPE
,
1455 IFLA_BAREUDP_SRCPORT_MIN
,
1456 IFLA_BAREUDP_MULTIPROTO_MODE
,
1460 #define IFLA_BAREUDP_MAX (__IFLA_BAREUDP_MAX - 1)
1468 #define IFLA_PPP_MAX (__IFLA_PPP_MAX - 1)
1472 enum ifla_gtp_role
{
1481 IFLA_GTP_PDP_HASHSIZE
,
1483 IFLA_GTP_CREATE_SOCKETS
,
1484 IFLA_GTP_RESTART_COUNT
,
1489 #define IFLA_GTP_MAX (__IFLA_GTP_MAX - 1)
1491 /* Bonding section */
1496 IFLA_BOND_ACTIVE_SLAVE
,
1499 IFLA_BOND_DOWNDELAY
,
1500 IFLA_BOND_USE_CARRIER
,
1501 IFLA_BOND_ARP_INTERVAL
,
1502 IFLA_BOND_ARP_IP_TARGET
,
1503 IFLA_BOND_ARP_VALIDATE
,
1504 IFLA_BOND_ARP_ALL_TARGETS
,
1506 IFLA_BOND_PRIMARY_RESELECT
,
1507 IFLA_BOND_FAIL_OVER_MAC
,
1508 IFLA_BOND_XMIT_HASH_POLICY
,
1509 IFLA_BOND_RESEND_IGMP
,
1510 IFLA_BOND_NUM_PEER_NOTIF
,
1511 IFLA_BOND_ALL_SLAVES_ACTIVE
,
1512 IFLA_BOND_MIN_LINKS
,
1513 IFLA_BOND_LP_INTERVAL
,
1514 IFLA_BOND_PACKETS_PER_SLAVE
,
1515 IFLA_BOND_AD_LACP_RATE
,
1516 IFLA_BOND_AD_SELECT
,
1518 IFLA_BOND_AD_ACTOR_SYS_PRIO
,
1519 IFLA_BOND_AD_USER_PORT_KEY
,
1520 IFLA_BOND_AD_ACTOR_SYSTEM
,
1521 IFLA_BOND_TLB_DYNAMIC_LB
,
1522 IFLA_BOND_PEER_NOTIF_DELAY
,
1523 IFLA_BOND_AD_LACP_ACTIVE
,
1524 IFLA_BOND_MISSED_MAX
,
1525 IFLA_BOND_NS_IP6_TARGET
,
1526 IFLA_BOND_COUPLED_CONTROL
,
1530 #define IFLA_BOND_MAX (__IFLA_BOND_MAX - 1)
1533 IFLA_BOND_AD_INFO_UNSPEC
,
1534 IFLA_BOND_AD_INFO_AGGREGATOR
,
1535 IFLA_BOND_AD_INFO_NUM_PORTS
,
1536 IFLA_BOND_AD_INFO_ACTOR_KEY
,
1537 IFLA_BOND_AD_INFO_PARTNER_KEY
,
1538 IFLA_BOND_AD_INFO_PARTNER_MAC
,
1539 __IFLA_BOND_AD_INFO_MAX
,
1542 #define IFLA_BOND_AD_INFO_MAX (__IFLA_BOND_AD_INFO_MAX - 1)
1545 IFLA_BOND_SLAVE_UNSPEC
,
1546 IFLA_BOND_SLAVE_STATE
,
1547 IFLA_BOND_SLAVE_MII_STATUS
,
1548 IFLA_BOND_SLAVE_LINK_FAILURE_COUNT
,
1549 IFLA_BOND_SLAVE_PERM_HWADDR
,
1550 IFLA_BOND_SLAVE_QUEUE_ID
,
1551 IFLA_BOND_SLAVE_AD_AGGREGATOR_ID
,
1552 IFLA_BOND_SLAVE_AD_ACTOR_OPER_PORT_STATE
,
1553 IFLA_BOND_SLAVE_AD_PARTNER_OPER_PORT_STATE
,
1554 IFLA_BOND_SLAVE_PRIO
,
1555 __IFLA_BOND_SLAVE_MAX
,
1558 #define IFLA_BOND_SLAVE_MAX (__IFLA_BOND_SLAVE_MAX - 1)
1560 /* SR-IOV virtual function management section */
1563 IFLA_VF_INFO_UNSPEC
,
1568 #define IFLA_VF_INFO_MAX (__IFLA_VF_INFO_MAX - 1)
1572 IFLA_VF_MAC
, /* Hardware queue specific attributes */
1573 IFLA_VF_VLAN
, /* VLAN ID and QoS */
1574 IFLA_VF_TX_RATE
, /* Max TX Bandwidth Allocation */
1575 IFLA_VF_SPOOFCHK
, /* Spoof Checking on/off switch */
1576 IFLA_VF_LINK_STATE
, /* link state enable/disable/auto switch */
1577 IFLA_VF_RATE
, /* Min and Max TX Bandwidth Allocation */
1578 IFLA_VF_RSS_QUERY_EN
, /* RSS Redirection Table and Hash Key query
1581 IFLA_VF_STATS
, /* network device statistics */
1582 IFLA_VF_TRUST
, /* Trust VF */
1583 IFLA_VF_IB_NODE_GUID
, /* VF Infiniband node GUID */
1584 IFLA_VF_IB_PORT_GUID
, /* VF Infiniband port GUID */
1585 IFLA_VF_VLAN_LIST
, /* nested list of vlans, option for QinQ */
1586 IFLA_VF_BROADCAST
, /* VF broadcast */
1590 #define IFLA_VF_MAX (__IFLA_VF_MAX - 1)
1592 struct ifla_vf_mac
{
1594 __u8 mac
[32]; /* MAX_ADDR_LEN */
1597 struct ifla_vf_broadcast
{
1601 struct ifla_vf_vlan
{
1603 __u32 vlan
; /* 0 - 4095, 0 disables VLAN filter */
1608 IFLA_VF_VLAN_INFO_UNSPEC
,
1609 IFLA_VF_VLAN_INFO
, /* VLAN ID, QoS and VLAN protocol */
1610 __IFLA_VF_VLAN_INFO_MAX
,
1613 #define IFLA_VF_VLAN_INFO_MAX (__IFLA_VF_VLAN_INFO_MAX - 1)
1614 #define MAX_VLAN_LIST_LEN 1
1616 struct ifla_vf_vlan_info
{
1618 __u32 vlan
; /* 0 - 4095, 0 disables VLAN filter */
1620 __be16 vlan_proto
; /* VLAN protocol either 802.1Q or 802.1ad */
1623 struct ifla_vf_tx_rate
{
1625 __u32 rate
; /* Max TX bandwidth in Mbps, 0 disables throttling */
1628 struct ifla_vf_rate
{
1630 __u32 min_tx_rate
; /* Min Bandwidth in Mbps */
1631 __u32 max_tx_rate
; /* Max Bandwidth in Mbps */
1634 struct ifla_vf_spoofchk
{
1639 struct ifla_vf_guid
{
1645 IFLA_VF_LINK_STATE_AUTO
, /* link state of the uplink */
1646 IFLA_VF_LINK_STATE_ENABLE
, /* link always up */
1647 IFLA_VF_LINK_STATE_DISABLE
, /* link always down */
1648 __IFLA_VF_LINK_STATE_MAX
,
1651 struct ifla_vf_link_state
{
1656 struct ifla_vf_rss_query_en
{
1662 IFLA_VF_STATS_RX_PACKETS
,
1663 IFLA_VF_STATS_TX_PACKETS
,
1664 IFLA_VF_STATS_RX_BYTES
,
1665 IFLA_VF_STATS_TX_BYTES
,
1666 IFLA_VF_STATS_BROADCAST
,
1667 IFLA_VF_STATS_MULTICAST
,
1669 IFLA_VF_STATS_RX_DROPPED
,
1670 IFLA_VF_STATS_TX_DROPPED
,
1671 __IFLA_VF_STATS_MAX
,
1674 #define IFLA_VF_STATS_MAX (__IFLA_VF_STATS_MAX - 1)
1676 struct ifla_vf_trust
{
1681 /* VF ports management section
1683 * Nested layout of set/get msg is:
1688 * [IFLA_PORT_*], ...
1690 * [IFLA_PORT_*], ...
1693 * [IFLA_PORT_*], ...
1697 IFLA_VF_PORT_UNSPEC
,
1698 IFLA_VF_PORT
, /* nest */
1702 #define IFLA_VF_PORT_MAX (__IFLA_VF_PORT_MAX - 1)
1706 IFLA_PORT_VF
, /* __u32 */
1707 IFLA_PORT_PROFILE
, /* string */
1708 IFLA_PORT_VSI_TYPE
, /* 802.1Qbg (pre-)standard VDP */
1709 IFLA_PORT_INSTANCE_UUID
, /* binary UUID */
1710 IFLA_PORT_HOST_UUID
, /* binary UUID */
1711 IFLA_PORT_REQUEST
, /* __u8 */
1712 IFLA_PORT_RESPONSE
, /* __u16, output only */
1716 #define IFLA_PORT_MAX (__IFLA_PORT_MAX - 1)
1718 #define PORT_PROFILE_MAX 40
1719 #define PORT_UUID_MAX 16
1720 #define PORT_SELF_VF -1
1723 PORT_REQUEST_PREASSOCIATE
= 0,
1724 PORT_REQUEST_PREASSOCIATE_RR
,
1725 PORT_REQUEST_ASSOCIATE
,
1726 PORT_REQUEST_DISASSOCIATE
,
1730 PORT_VDP_RESPONSE_SUCCESS
= 0,
1731 PORT_VDP_RESPONSE_INVALID_FORMAT
,
1732 PORT_VDP_RESPONSE_INSUFFICIENT_RESOURCES
,
1733 PORT_VDP_RESPONSE_UNUSED_VTID
,
1734 PORT_VDP_RESPONSE_VTID_VIOLATION
,
1735 PORT_VDP_RESPONSE_VTID_VERSION_VIOALTION
,
1736 PORT_VDP_RESPONSE_OUT_OF_SYNC
,
1737 /* 0x08-0xFF reserved for future VDP use */
1738 PORT_PROFILE_RESPONSE_SUCCESS
= 0x100,
1739 PORT_PROFILE_RESPONSE_INPROGRESS
,
1740 PORT_PROFILE_RESPONSE_INVALID
,
1741 PORT_PROFILE_RESPONSE_BADSTATE
,
1742 PORT_PROFILE_RESPONSE_INSUFFICIENT_RESOURCES
,
1743 PORT_PROFILE_RESPONSE_ERROR
,
1746 struct ifla_port_vsi
{
1748 __u8 vsi_type_id
[3];
1749 __u8 vsi_type_version
;
1765 IPOIB_MODE_DATAGRAM
= 0, /* using unreliable datagram QPs */
1766 IPOIB_MODE_CONNECTED
= 1, /* using connected QPs */
1769 #define IFLA_IPOIB_MAX (__IFLA_IPOIB_MAX - 1)
1772 /* HSR/PRP section, both uses same interface */
1774 /* Different redundancy protocols for hsr device */
1785 IFLA_HSR_MULTICAST_SPEC
, /* Last byte of supervision addr */
1786 IFLA_HSR_SUPERVISION_ADDR
, /* Supervision frame multicast addr */
1788 IFLA_HSR_VERSION
, /* HSR version */
1789 IFLA_HSR_PROTOCOL
, /* Indicate different protocol than
1790 * HSR. For example PRP.
1792 IFLA_HSR_INTERLINK
, /* HSR interlink network device */
1796 #define IFLA_HSR_MAX (__IFLA_HSR_MAX - 1)
1800 struct if_stats_msg
{
1808 /* A stats attribute can be netdev specific or a global stat.
1809 * For netdev stats, lets use the prefix IFLA_STATS_LINK_*
1812 IFLA_STATS_UNSPEC
, /* also used as 64bit pad attribute */
1814 IFLA_STATS_LINK_XSTATS
,
1815 IFLA_STATS_LINK_XSTATS_SLAVE
,
1816 IFLA_STATS_LINK_OFFLOAD_XSTATS
,
1821 #define IFLA_STATS_MAX (__IFLA_STATS_MAX - 1)
1823 #define IFLA_STATS_FILTER_BIT(ATTR) (1 << (ATTR - 1))
1826 IFLA_STATS_GETSET_UNSPEC
,
1827 IFLA_STATS_GET_FILTERS
, /* Nest of IFLA_STATS_LINK_xxx, each a u32 with
1828 * a filter mask for the corresponding group.
1830 IFLA_STATS_SET_OFFLOAD_XSTATS_L3_STATS
, /* 0 or 1 as u8 */
1831 __IFLA_STATS_GETSET_MAX
,
1834 #define IFLA_STATS_GETSET_MAX (__IFLA_STATS_GETSET_MAX - 1)
1836 /* These are embedded into IFLA_STATS_LINK_XSTATS:
1837 * [IFLA_STATS_LINK_XSTATS]
1838 * -> [LINK_XSTATS_TYPE_xxx]
1839 * -> [rtnl link type specific attributes]
1842 LINK_XSTATS_TYPE_UNSPEC
,
1843 LINK_XSTATS_TYPE_BRIDGE
,
1844 LINK_XSTATS_TYPE_BOND
,
1845 __LINK_XSTATS_TYPE_MAX
1847 #define LINK_XSTATS_TYPE_MAX (__LINK_XSTATS_TYPE_MAX - 1)
1849 /* These are stats embedded into IFLA_STATS_LINK_OFFLOAD_XSTATS */
1851 IFLA_OFFLOAD_XSTATS_UNSPEC
,
1852 IFLA_OFFLOAD_XSTATS_CPU_HIT
, /* struct rtnl_link_stats64 */
1853 IFLA_OFFLOAD_XSTATS_HW_S_INFO
, /* HW stats info. A nest */
1854 IFLA_OFFLOAD_XSTATS_L3_STATS
, /* struct rtnl_hw_stats64 */
1855 __IFLA_OFFLOAD_XSTATS_MAX
1857 #define IFLA_OFFLOAD_XSTATS_MAX (__IFLA_OFFLOAD_XSTATS_MAX - 1)
1860 IFLA_OFFLOAD_XSTATS_HW_S_INFO_UNSPEC
,
1861 IFLA_OFFLOAD_XSTATS_HW_S_INFO_REQUEST
, /* u8 */
1862 IFLA_OFFLOAD_XSTATS_HW_S_INFO_USED
, /* u8 */
1863 __IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX
,
1865 #define IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX \
1866 (__IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX - 1)
1870 #define XDP_FLAGS_UPDATE_IF_NOEXIST (1U << 0)
1871 #define XDP_FLAGS_SKB_MODE (1U << 1)
1872 #define XDP_FLAGS_DRV_MODE (1U << 2)
1873 #define XDP_FLAGS_HW_MODE (1U << 3)
1874 #define XDP_FLAGS_REPLACE (1U << 4)
1875 #define XDP_FLAGS_MODES (XDP_FLAGS_SKB_MODE | \
1876 XDP_FLAGS_DRV_MODE | \
1878 #define XDP_FLAGS_MASK (XDP_FLAGS_UPDATE_IF_NOEXIST | \
1879 XDP_FLAGS_MODES | XDP_FLAGS_REPLACE)
1881 /* These are stored into IFLA_XDP_ATTACHED on dump. */
1883 XDP_ATTACHED_NONE
= 0,
1896 IFLA_XDP_DRV_PROG_ID
,
1897 IFLA_XDP_SKB_PROG_ID
,
1898 IFLA_XDP_HW_PROG_ID
,
1899 IFLA_XDP_EXPECTED_FD
,
1903 #define IFLA_XDP_MAX (__IFLA_XDP_MAX - 1)
1907 IFLA_EVENT_REBOOT
, /* internal reset / reboot */
1908 IFLA_EVENT_FEATURES
, /* change in offload features */
1909 IFLA_EVENT_BONDING_FAILOVER
, /* change in active slave */
1910 IFLA_EVENT_NOTIFY_PEERS
, /* re-sent grat. arp/ndisc */
1911 IFLA_EVENT_IGMP_RESEND
, /* re-sent IGMP JOIN */
1912 IFLA_EVENT_BONDING_OPTIONS
, /* change in bonding options */
1925 IFLA_TUN_MULTI_QUEUE
,
1926 IFLA_TUN_NUM_QUEUES
,
1927 IFLA_TUN_NUM_DISABLED_QUEUES
,
1931 #define IFLA_TUN_MAX (__IFLA_TUN_MAX - 1)
1935 #define RMNET_FLAGS_INGRESS_DEAGGREGATION (1U << 0)
1936 #define RMNET_FLAGS_INGRESS_MAP_COMMANDS (1U << 1)
1937 #define RMNET_FLAGS_INGRESS_MAP_CKSUMV4 (1U << 2)
1938 #define RMNET_FLAGS_EGRESS_MAP_CKSUMV4 (1U << 3)
1939 #define RMNET_FLAGS_INGRESS_MAP_CKSUMV5 (1U << 4)
1940 #define RMNET_FLAGS_EGRESS_MAP_CKSUMV5 (1U << 5)
1949 #define IFLA_RMNET_MAX (__IFLA_RMNET_MAX - 1)
1951 struct ifla_rmnet_flags
{
1961 IFLA_MCTP_PHYS_BINDING
,
1965 #define IFLA_MCTP_MAX (__IFLA_MCTP_MAX - 1)
1972 /* Deprecated, use IFLA_DSA_CONDUIT instead */
1973 IFLA_DSA_MASTER
= IFLA_DSA_CONDUIT
,
1977 #define IFLA_DSA_MAX (__IFLA_DSA_MAX - 1)
1979 #endif /* _UAPI_LINUX_IF_LINK_H */