Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
2#ifndef _UAPI_LINUX_IF_LINK_H
3#define _UAPI_LINUX_IF_LINK_H
4
5#include <linux/types.h>
6#include <linux/netlink.h>
7
8/* This struct should be in sync with struct rtnl_link_stats64 */
9struct rtnl_link_stats {
10 __u32 rx_packets;
11 __u32 tx_packets;
12 __u32 rx_bytes;
13 __u32 tx_bytes;
14 __u32 rx_errors;
15 __u32 tx_errors;
16 __u32 rx_dropped;
17 __u32 tx_dropped;
18 __u32 multicast;
19 __u32 collisions;
20 /* detailed rx_errors: */
21 __u32 rx_length_errors;
22 __u32 rx_over_errors;
23 __u32 rx_crc_errors;
24 __u32 rx_frame_errors;
25 __u32 rx_fifo_errors;
26 __u32 rx_missed_errors;
27
28 /* detailed tx_errors */
29 __u32 tx_aborted_errors;
30 __u32 tx_carrier_errors;
31 __u32 tx_fifo_errors;
32 __u32 tx_heartbeat_errors;
33 __u32 tx_window_errors;
34
35 /* for cslip etc */
36 __u32 rx_compressed;
37 __u32 tx_compressed;
38
39 __u32 rx_nohandler;
40};
41
42/**
43 * struct rtnl_link_stats64 - The main device statistics structure.
44 *
45 * @rx_packets: Number of good packets received by the interface.
46 * For hardware interfaces counts all good packets received from the device
47 * by the host, including packets which host had to drop at various stages
48 * of processing (even in the driver).
49 *
50 * @tx_packets: Number of packets successfully transmitted.
51 * For hardware interfaces counts packets which host was able to successfully
52 * hand over to the device, which does not necessarily mean that packets
53 * had been successfully transmitted out of the device, only that device
54 * acknowledged it copied them out of host memory.
55 *
56 * @rx_bytes: Number of good received bytes, corresponding to @rx_packets.
57 *
58 * For IEEE 802.3 devices should count the length of Ethernet Frames
59 * excluding the FCS.
60 *
61 * @tx_bytes: Number of good transmitted bytes, corresponding to @tx_packets.
62 *
63 * For IEEE 802.3 devices should count the length of Ethernet Frames
64 * excluding the FCS.
65 *
66 * @rx_errors: Total number of bad packets received on this network device.
67 * This counter must include events counted by @rx_length_errors,
68 * @rx_crc_errors, @rx_frame_errors and other errors not otherwise
69 * counted.
70 *
71 * @tx_errors: Total number of transmit problems.
72 * This counter must include events counter by @tx_aborted_errors,
73 * @tx_carrier_errors, @tx_fifo_errors, @tx_heartbeat_errors,
74 * @tx_window_errors and other errors not otherwise counted.
75 *
76 * @rx_dropped: Number of packets received but not processed,
77 * e.g. due to lack of resources or unsupported protocol.
78 * For hardware interfaces this counter may include packets discarded
79 * due to L2 address filtering but should not include packets dropped
80 * by the device due to buffer exhaustion which are counted separately in
81 * @rx_missed_errors (since procfs folds those two counters together).
82 *
83 * @tx_dropped: Number of packets dropped on their way to transmission,
84 * e.g. due to lack of resources.
85 *
86 * @multicast: Multicast packets received.
87 * For hardware interfaces this statistic is commonly calculated
88 * at the device level (unlike @rx_packets) and therefore may include
89 * packets which did not reach the host.
90 *
91 * For IEEE 802.3 devices this counter may be equivalent to:
92 *
93 * - 30.3.1.1.21 aMulticastFramesReceivedOK
94 *
95 * @collisions: Number of collisions during packet transmissions.
96 *
97 * @rx_length_errors: Number of packets dropped due to invalid length.
98 * Part of aggregate "frame" errors in `/proc/net/dev`.
99 *
100 * For IEEE 802.3 devices this counter should be equivalent to a sum
101 * of the following attributes:
102 *
103 * - 30.3.1.1.23 aInRangeLengthErrors
104 * - 30.3.1.1.24 aOutOfRangeLengthField
105 * - 30.3.1.1.25 aFrameTooLongErrors
106 *
107 * @rx_over_errors: Receiver FIFO overflow event counter.
108 *
109 * Historically the count of overflow events. Such events may be
110 * reported in the receive descriptors or via interrupts, and may
111 * not correspond one-to-one with dropped packets.
112 *
113 * The recommended interpretation for high speed interfaces is -
114 * number of packets dropped because they did not fit into buffers
115 * provided by the host, e.g. packets larger than MTU or next buffer
116 * in the ring was not available for a scatter transfer.
117 *
118 * Part of aggregate "frame" errors in `/proc/net/dev`.
119 *
120 * This statistics was historically used interchangeably with
121 * @rx_fifo_errors.
122 *
123 * This statistic corresponds to hardware events and is not commonly used
124 * on software devices.
125 *
126 * @rx_crc_errors: Number of packets received with a CRC error.
127 * Part of aggregate "frame" errors in `/proc/net/dev`.
128 *
129 * For IEEE 802.3 devices this counter must be equivalent to:
130 *
131 * - 30.3.1.1.6 aFrameCheckSequenceErrors
132 *
133 * @rx_frame_errors: Receiver frame alignment errors.
134 * Part of aggregate "frame" errors in `/proc/net/dev`.
135 *
136 * For IEEE 802.3 devices this counter should be equivalent to:
137 *
138 * - 30.3.1.1.7 aAlignmentErrors
139 *
140 * @rx_fifo_errors: Receiver FIFO error counter.
141 *
142 * Historically the count of overflow events. Those events may be
143 * reported in the receive descriptors or via interrupts, and may
144 * not correspond one-to-one with dropped packets.
145 *
146 * This statistics was used interchangeably with @rx_over_errors.
147 * Not recommended for use in drivers for high speed interfaces.
148 *
149 * This statistic is used on software devices, e.g. to count software
150 * packet queue overflow (can) or sequencing errors (GRE).
151 *
152 * @rx_missed_errors: Count of packets missed by the host.
153 * Folded into the "drop" counter in `/proc/net/dev`.
154 *
155 * Counts number of packets dropped by the device due to lack
156 * of buffer space. This usually indicates that the host interface
157 * is slower than the network interface, or host is not keeping up
158 * with the receive packet rate.
159 *
160 * This statistic corresponds to hardware events and is not used
161 * on software devices.
162 *
163 * @tx_aborted_errors:
164 * Part of aggregate "carrier" errors in `/proc/net/dev`.
165 * For IEEE 802.3 devices capable of half-duplex operation this counter
166 * must be equivalent to:
167 *
168 * - 30.3.1.1.11 aFramesAbortedDueToXSColls
169 *
170 * High speed interfaces may use this counter as a general device
171 * discard counter.
172 *
173 * @tx_carrier_errors: Number of frame transmission errors due to loss
174 * of carrier during transmission.
175 * Part of aggregate "carrier" errors in `/proc/net/dev`.
176 *
177 * For IEEE 802.3 devices this counter must be equivalent to:
178 *
179 * - 30.3.1.1.13 aCarrierSenseErrors
180 *
181 * @tx_fifo_errors: Number of frame transmission errors due to device
182 * FIFO underrun / underflow. This condition occurs when the device
183 * begins transmission of a frame but is unable to deliver the
184 * entire frame to the transmitter in time for transmission.
185 * Part of aggregate "carrier" errors in `/proc/net/dev`.
186 *
187 * @tx_heartbeat_errors: Number of Heartbeat / SQE Test errors for
188 * old half-duplex Ethernet.
189 * Part of aggregate "carrier" errors in `/proc/net/dev`.
190 *
191 * For IEEE 802.3 devices possibly equivalent to:
192 *
193 * - 30.3.2.1.4 aSQETestErrors
194 *
195 * @tx_window_errors: Number of frame transmission errors due
196 * to late collisions (for Ethernet - after the first 64B of transmission).
197 * Part of aggregate "carrier" errors in `/proc/net/dev`.
198 *
199 * For IEEE 802.3 devices this counter must be equivalent to:
200 *
201 * - 30.3.1.1.10 aLateCollisions
202 *
203 * @rx_compressed: Number of correctly received compressed packets.
204 * This counters is only meaningful for interfaces which support
205 * packet compression (e.g. CSLIP, PPP).
206 *
207 * @tx_compressed: Number of transmitted compressed packets.
208 * This counters is only meaningful for interfaces which support
209 * packet compression (e.g. CSLIP, PPP).
210 *
211 * @rx_nohandler: Number of packets received on the interface
212 * but dropped by the networking stack because the device is
213 * not designated to receive packets (e.g. backup link in a bond).
214 *
215 * @rx_otherhost_dropped: Number of packets dropped due to mismatch
216 * in destination MAC address.
217 */
218struct rtnl_link_stats64 {
219 __u64 rx_packets;
220 __u64 tx_packets;
221 __u64 rx_bytes;
222 __u64 tx_bytes;
223 __u64 rx_errors;
224 __u64 tx_errors;
225 __u64 rx_dropped;
226 __u64 tx_dropped;
227 __u64 multicast;
228 __u64 collisions;
229
230 /* detailed rx_errors: */
231 __u64 rx_length_errors;
232 __u64 rx_over_errors;
233 __u64 rx_crc_errors;
234 __u64 rx_frame_errors;
235 __u64 rx_fifo_errors;
236 __u64 rx_missed_errors;
237
238 /* detailed tx_errors */
239 __u64 tx_aborted_errors;
240 __u64 tx_carrier_errors;
241 __u64 tx_fifo_errors;
242 __u64 tx_heartbeat_errors;
243 __u64 tx_window_errors;
244
245 /* for cslip etc */
246 __u64 rx_compressed;
247 __u64 tx_compressed;
248 __u64 rx_nohandler;
249
250 __u64 rx_otherhost_dropped;
251};
252
253/* Subset of link stats useful for in-HW collection. Meaning of the fields is as
254 * for struct rtnl_link_stats64.
255 */
256struct rtnl_hw_stats64 {
257 __u64 rx_packets;
258 __u64 tx_packets;
259 __u64 rx_bytes;
260 __u64 tx_bytes;
261 __u64 rx_errors;
262 __u64 tx_errors;
263 __u64 rx_dropped;
264 __u64 tx_dropped;
265 __u64 multicast;
266};
267
268/* The struct should be in sync with struct ifmap */
269struct rtnl_link_ifmap {
270 __u64 mem_start;
271 __u64 mem_end;
272 __u64 base_addr;
273 __u16 irq;
274 __u8 dma;
275 __u8 port;
276};
277
278/*
279 * IFLA_AF_SPEC
280 * Contains nested attributes for address family specific attributes.
281 * Each address family may create a attribute with the address family
282 * number as type and create its own attribute structure in it.
283 *
284 * Example:
285 * [IFLA_AF_SPEC] = {
286 * [AF_INET] = {
287 * [IFLA_INET_CONF] = ...,
288 * },
289 * [AF_INET6] = {
290 * [IFLA_INET6_FLAGS] = ...,
291 * [IFLA_INET6_CONF] = ...,
292 * }
293 * }
294 */
295
296enum {
297 IFLA_UNSPEC,
298 IFLA_ADDRESS,
299 IFLA_BROADCAST,
300 IFLA_IFNAME,
301 IFLA_MTU,
302 IFLA_LINK,
303 IFLA_QDISC,
304 IFLA_STATS,
305 IFLA_COST,
306#define IFLA_COST IFLA_COST
307 IFLA_PRIORITY,
308#define IFLA_PRIORITY IFLA_PRIORITY
309 IFLA_MASTER,
310#define IFLA_MASTER IFLA_MASTER
311 IFLA_WIRELESS, /* Wireless Extension event - see wireless.h */
312#define IFLA_WIRELESS IFLA_WIRELESS
313 IFLA_PROTINFO, /* Protocol specific information for a link */
314#define IFLA_PROTINFO IFLA_PROTINFO
315 IFLA_TXQLEN,
316#define IFLA_TXQLEN IFLA_TXQLEN
317 IFLA_MAP,
318#define IFLA_MAP IFLA_MAP
319 IFLA_WEIGHT,
320#define IFLA_WEIGHT IFLA_WEIGHT
321 IFLA_OPERSTATE,
322 IFLA_LINKMODE,
323 IFLA_LINKINFO,
324#define IFLA_LINKINFO IFLA_LINKINFO
325 IFLA_NET_NS_PID,
326 IFLA_IFALIAS,
327 IFLA_NUM_VF, /* Number of VFs if device is SR-IOV PF */
328 IFLA_VFINFO_LIST,
329 IFLA_STATS64,
330 IFLA_VF_PORTS,
331 IFLA_PORT_SELF,
332 IFLA_AF_SPEC,
333 IFLA_GROUP, /* Group the device belongs to */
334 IFLA_NET_NS_FD,
335 IFLA_EXT_MASK, /* Extended info mask, VFs, etc */
336 IFLA_PROMISCUITY, /* Promiscuity count: > 0 means acts PROMISC */
337#define IFLA_PROMISCUITY IFLA_PROMISCUITY
338 IFLA_NUM_TX_QUEUES,
339 IFLA_NUM_RX_QUEUES,
340 IFLA_CARRIER,
341 IFLA_PHYS_PORT_ID,
342 IFLA_CARRIER_CHANGES,
343 IFLA_PHYS_SWITCH_ID,
344 IFLA_LINK_NETNSID,
345 IFLA_PHYS_PORT_NAME,
346 IFLA_PROTO_DOWN,
347 IFLA_GSO_MAX_SEGS,
348 IFLA_GSO_MAX_SIZE,
349 IFLA_PAD,
350 IFLA_XDP,
351 IFLA_EVENT,
352 IFLA_NEW_NETNSID,
353 IFLA_IF_NETNSID,
354 IFLA_TARGET_NETNSID = IFLA_IF_NETNSID, /* new alias */
355 IFLA_CARRIER_UP_COUNT,
356 IFLA_CARRIER_DOWN_COUNT,
357 IFLA_NEW_IFINDEX,
358 IFLA_MIN_MTU,
359 IFLA_MAX_MTU,
360 IFLA_PROP_LIST,
361 IFLA_ALT_IFNAME, /* Alternative ifname */
362 IFLA_PERM_ADDRESS,
363 IFLA_PROTO_DOWN_REASON,
364
365 /* device (sysfs) name as parent, used instead
366 * of IFLA_LINK where there's no parent netdev
367 */
368 IFLA_PARENT_DEV_NAME,
369 IFLA_PARENT_DEV_BUS_NAME,
370 IFLA_GRO_MAX_SIZE,
371 IFLA_TSO_MAX_SIZE,
372 IFLA_TSO_MAX_SEGS,
373 IFLA_ALLMULTI, /* Allmulti count: > 0 means acts ALLMULTI */
374
375 IFLA_DEVLINK_PORT,
376
377 IFLA_GSO_IPV4_MAX_SIZE,
378 IFLA_GRO_IPV4_MAX_SIZE,
379 IFLA_DPLL_PIN,
380 IFLA_MAX_PACING_OFFLOAD_HORIZON,
381 IFLA_NETNS_IMMUTABLE,
382 IFLA_HEADROOM,
383 IFLA_TAILROOM,
384 __IFLA_MAX
385};
386
387
388#define IFLA_MAX (__IFLA_MAX - 1)
389
390enum {
391 IFLA_PROTO_DOWN_REASON_UNSPEC,
392 IFLA_PROTO_DOWN_REASON_MASK, /* u32, mask for reason bits */
393 IFLA_PROTO_DOWN_REASON_VALUE, /* u32, reason bit value */
394
395 __IFLA_PROTO_DOWN_REASON_CNT,
396 IFLA_PROTO_DOWN_REASON_MAX = __IFLA_PROTO_DOWN_REASON_CNT - 1
397};
398
399/* backwards compatibility for userspace */
400#ifndef __KERNEL__
401#define IFLA_RTA(r) ((struct rtattr*)(((char*)(r)) + NLMSG_ALIGN(sizeof(struct ifinfomsg))))
402#define IFLA_PAYLOAD(n) NLMSG_PAYLOAD(n,sizeof(struct ifinfomsg))
403#endif
404
405enum {
406 IFLA_INET_UNSPEC,
407 IFLA_INET_CONF,
408 __IFLA_INET_MAX,
409};
410
411#define IFLA_INET_MAX (__IFLA_INET_MAX - 1)
412
413/* ifi_flags.
414
415 IFF_* flags.
416
417 The only change is:
418 IFF_LOOPBACK, IFF_BROADCAST and IFF_POINTOPOINT are
419 more not changeable by user. They describe link media
420 characteristics and set by device driver.
421
422 Comments:
423 - Combination IFF_BROADCAST|IFF_POINTOPOINT is invalid
424 - If neither of these three flags are set;
425 the interface is NBMA.
426
427 - IFF_MULTICAST does not mean anything special:
428 multicasts can be used on all not-NBMA links.
429 IFF_MULTICAST means that this media uses special encapsulation
430 for multicast frames. Apparently, all IFF_POINTOPOINT and
431 IFF_BROADCAST devices are able to use multicasts too.
432 */
433
434/* IFLA_LINK.
435 For usual devices it is equal ifi_index.
436 If it is a "virtual interface" (f.e. tunnel), ifi_link
437 can point to real physical interface (f.e. for bandwidth calculations),
438 or maybe 0, what means, that real media is unknown (usual
439 for IPIP tunnels, when route to endpoint is allowed to change)
440 */
441
442/* Subtype attributes for IFLA_PROTINFO */
443enum {
444 IFLA_INET6_UNSPEC,
445 IFLA_INET6_FLAGS, /* link flags */
446 IFLA_INET6_CONF, /* sysctl parameters */
447 IFLA_INET6_STATS, /* statistics */
448 IFLA_INET6_MCAST, /* MC things. What of them? */
449 IFLA_INET6_CACHEINFO, /* time values and max reasm size */
450 IFLA_INET6_ICMP6STATS, /* statistics (icmpv6) */
451 IFLA_INET6_TOKEN, /* device token */
452 IFLA_INET6_ADDR_GEN_MODE, /* implicit address generator mode */
453 IFLA_INET6_RA_MTU, /* mtu carried in the RA message */
454 __IFLA_INET6_MAX
455};
456
457#define IFLA_INET6_MAX (__IFLA_INET6_MAX - 1)
458
459enum in6_addr_gen_mode {
460 IN6_ADDR_GEN_MODE_EUI64,
461 IN6_ADDR_GEN_MODE_NONE,
462 IN6_ADDR_GEN_MODE_STABLE_PRIVACY,
463 IN6_ADDR_GEN_MODE_RANDOM,
464};
465
466/* Bridge section */
467
468/**
469 * DOC: Bridge enum definition
470 *
471 * Please *note* that the timer values in the following section are expected
472 * in clock_t format, which is seconds multiplied by USER_HZ (generally
473 * defined as 100).
474 *
475 * @IFLA_BR_FORWARD_DELAY
476 * The bridge forwarding delay is the time spent in LISTENING state
477 * (before moving to LEARNING) and in LEARNING state (before moving
478 * to FORWARDING). Only relevant if STP is enabled.
479 *
480 * The valid values are between (2 * USER_HZ) and (30 * USER_HZ).
481 * The default value is (15 * USER_HZ).
482 *
483 * @IFLA_BR_HELLO_TIME
484 * The time between hello packets sent by the bridge, when it is a root
485 * bridge or a designated bridge. Only relevant if STP is enabled.
486 *
487 * The valid values are between (1 * USER_HZ) and (10 * USER_HZ).
488 * The default value is (2 * USER_HZ).
489 *
490 * @IFLA_BR_MAX_AGE
491 * The hello packet timeout is the time until another bridge in the
492 * spanning tree is assumed to be dead, after reception of its last hello
493 * message. Only relevant if STP is enabled.
494 *
495 * The valid values are between (6 * USER_HZ) and (40 * USER_HZ).
496 * The default value is (20 * USER_HZ).
497 *
498 * @IFLA_BR_AGEING_TIME
499 * Configure the bridge's FDB entries aging time. It is the time a MAC
500 * address will be kept in the FDB after a packet has been received from
501 * that address. After this time has passed, entries are cleaned up.
502 * Allow values outside the 802.1 standard specification for special cases:
503 *
504 * * 0 - entry never ages (all permanent)
505 * * 1 - entry disappears (no persistence)
506 *
507 * The default value is (300 * USER_HZ).
508 *
509 * @IFLA_BR_STP_STATE
510 * Turn spanning tree protocol on (*IFLA_BR_STP_STATE* > 0) or off
511 * (*IFLA_BR_STP_STATE* == 0) for this bridge.
512 *
513 * The default value is 0 (disabled).
514 *
515 * @IFLA_BR_PRIORITY
516 * Set this bridge's spanning tree priority, used during STP root bridge
517 * election.
518 *
519 * The valid values are between 0 and 65535.
520 *
521 * @IFLA_BR_VLAN_FILTERING
522 * Turn VLAN filtering on (*IFLA_BR_VLAN_FILTERING* > 0) or off
523 * (*IFLA_BR_VLAN_FILTERING* == 0). When disabled, the bridge will not
524 * consider the VLAN tag when handling packets.
525 *
526 * The default value is 0 (disabled).
527 *
528 * @IFLA_BR_VLAN_PROTOCOL
529 * Set the protocol used for VLAN filtering.
530 *
531 * The valid values are 0x8100(802.1Q) or 0x88A8(802.1AD). The default value
532 * is 0x8100(802.1Q).
533 *
534 * @IFLA_BR_GROUP_FWD_MASK
535 * The group forwarding mask. This is the bitmask that is applied to
536 * decide whether to forward incoming frames destined to link-local
537 * addresses (of the form 01:80:C2:00:00:0X).
538 *
539 * The default value is 0, which means the bridge does not forward any
540 * link-local frames coming on this port.
541 *
542 * @IFLA_BR_ROOT_ID
543 * The bridge root id, read only.
544 *
545 * @IFLA_BR_BRIDGE_ID
546 * The bridge id, read only.
547 *
548 * @IFLA_BR_ROOT_PORT
549 * The bridge root port, read only.
550 *
551 * @IFLA_BR_ROOT_PATH_COST
552 * The bridge root path cost, read only.
553 *
554 * @IFLA_BR_TOPOLOGY_CHANGE
555 * The bridge topology change, read only.
556 *
557 * @IFLA_BR_TOPOLOGY_CHANGE_DETECTED
558 * The bridge topology change detected, read only.
559 *
560 * @IFLA_BR_HELLO_TIMER
561 * The bridge hello timer, read only.
562 *
563 * @IFLA_BR_TCN_TIMER
564 * The bridge tcn timer, read only.
565 *
566 * @IFLA_BR_TOPOLOGY_CHANGE_TIMER
567 * The bridge topology change timer, read only.
568 *
569 * @IFLA_BR_GC_TIMER
570 * The bridge gc timer, read only.
571 *
572 * @IFLA_BR_GROUP_ADDR
573 * Set the MAC address of the multicast group this bridge uses for STP.
574 * The address must be a link-local address in standard Ethernet MAC address
575 * format. It is an address of the form 01:80:C2:00:00:0X, with X in [0, 4..f].
576 *
577 * The default value is 0.
578 *
579 * @IFLA_BR_FDB_FLUSH
580 * Flush bridge's fdb dynamic entries.
581 *
582 * @IFLA_BR_MCAST_ROUTER
583 * Set bridge's multicast router if IGMP snooping is enabled.
584 * The valid values are:
585 *
586 * * 0 - disabled.
587 * * 1 - automatic (queried).
588 * * 2 - permanently enabled.
589 *
590 * The default value is 1.
591 *
592 * @IFLA_BR_MCAST_SNOOPING
593 * Turn multicast snooping on (*IFLA_BR_MCAST_SNOOPING* > 0) or off
594 * (*IFLA_BR_MCAST_SNOOPING* == 0).
595 *
596 * The default value is 1.
597 *
598 * @IFLA_BR_MCAST_QUERY_USE_IFADDR
599 * If enabled use the bridge's own IP address as source address for IGMP
600 * queries (*IFLA_BR_MCAST_QUERY_USE_IFADDR* > 0) or the default of 0.0.0.0
601 * (*IFLA_BR_MCAST_QUERY_USE_IFADDR* == 0).
602 *
603 * The default value is 0 (disabled).
604 *
605 * @IFLA_BR_MCAST_QUERIER
606 * Enable (*IFLA_BR_MULTICAST_QUERIER* > 0) or disable
607 * (*IFLA_BR_MULTICAST_QUERIER* == 0) IGMP querier, ie sending of multicast
608 * queries by the bridge.
609 *
610 * The default value is 0 (disabled).
611 *
612 * @IFLA_BR_MCAST_HASH_ELASTICITY
613 * Set multicast database hash elasticity, It is the maximum chain length in
614 * the multicast hash table. This attribute is *deprecated* and the value
615 * is always 16.
616 *
617 * @IFLA_BR_MCAST_HASH_MAX
618 * Set maximum size of the multicast hash table
619 *
620 * The default value is 4096, the value must be a power of 2.
621 *
622 * @IFLA_BR_MCAST_LAST_MEMBER_CNT
623 * The Last Member Query Count is the number of Group-Specific Queries
624 * sent before the router assumes there are no local members. The Last
625 * Member Query Count is also the number of Group-and-Source-Specific
626 * Queries sent before the router assumes there are no listeners for a
627 * particular source.
628 *
629 * The default value is 2.
630 *
631 * @IFLA_BR_MCAST_STARTUP_QUERY_CNT
632 * The Startup Query Count is the number of Queries sent out on startup,
633 * separated by the Startup Query Interval.
634 *
635 * The default value is 2.
636 *
637 * @IFLA_BR_MCAST_LAST_MEMBER_INTVL
638 * The Last Member Query Interval is the Max Response Time inserted into
639 * Group-Specific Queries sent in response to Leave Group messages, and
640 * is also the amount of time between Group-Specific Query messages.
641 *
642 * The default value is (1 * USER_HZ).
643 *
644 * @IFLA_BR_MCAST_MEMBERSHIP_INTVL
645 * The interval after which the bridge will leave a group, if no membership
646 * reports for this group are received.
647 *
648 * The default value is (260 * USER_HZ).
649 *
650 * @IFLA_BR_MCAST_QUERIER_INTVL
651 * The interval between queries sent by other routers. if no queries are
652 * seen after this delay has passed, the bridge will start to send its own
653 * queries (as if *IFLA_BR_MCAST_QUERIER_INTVL* was enabled).
654 *
655 * The default value is (255 * USER_HZ).
656 *
657 * @IFLA_BR_MCAST_QUERY_INTVL
658 * The Query Interval is the interval between General Queries sent by
659 * the Querier.
660 *
661 * The default value is (125 * USER_HZ). The minimum value is (1 * USER_HZ).
662 *
663 * @IFLA_BR_MCAST_QUERY_RESPONSE_INTVL
664 * The Max Response Time used to calculate the Max Resp Code inserted
665 * into the periodic General Queries.
666 *
667 * The default value is (10 * USER_HZ).
668 *
669 * @IFLA_BR_MCAST_STARTUP_QUERY_INTVL
670 * The interval between queries in the startup phase.
671 *
672 * The default value is (125 * USER_HZ) / 4. The minimum value is (1 * USER_HZ).
673 *
674 * @IFLA_BR_NF_CALL_IPTABLES
675 * Enable (*NF_CALL_IPTABLES* > 0) or disable (*NF_CALL_IPTABLES* == 0)
676 * iptables hooks on the bridge.
677 *
678 * The default value is 0 (disabled).
679 *
680 * @IFLA_BR_NF_CALL_IP6TABLES
681 * Enable (*NF_CALL_IP6TABLES* > 0) or disable (*NF_CALL_IP6TABLES* == 0)
682 * ip6tables hooks on the bridge.
683 *
684 * The default value is 0 (disabled).
685 *
686 * @IFLA_BR_NF_CALL_ARPTABLES
687 * Enable (*NF_CALL_ARPTABLES* > 0) or disable (*NF_CALL_ARPTABLES* == 0)
688 * arptables hooks on the bridge.
689 *
690 * The default value is 0 (disabled).
691 *
692 * @IFLA_BR_VLAN_DEFAULT_PVID
693 * VLAN ID applied to untagged and priority-tagged incoming packets.
694 *
695 * The default value is 1. Setting to the special value 0 makes all ports of
696 * this bridge not have a PVID by default, which means that they will
697 * not accept VLAN-untagged traffic.
698 *
699 * @IFLA_BR_PAD
700 * Bridge attribute padding type for netlink message.
701 *
702 * @IFLA_BR_VLAN_STATS_ENABLED
703 * Enable (*IFLA_BR_VLAN_STATS_ENABLED* == 1) or disable
704 * (*IFLA_BR_VLAN_STATS_ENABLED* == 0) per-VLAN stats accounting.
705 *
706 * The default value is 0 (disabled).
707 *
708 * @IFLA_BR_MCAST_STATS_ENABLED
709 * Enable (*IFLA_BR_MCAST_STATS_ENABLED* > 0) or disable
710 * (*IFLA_BR_MCAST_STATS_ENABLED* == 0) multicast (IGMP/MLD) stats
711 * accounting.
712 *
713 * The default value is 0 (disabled).
714 *
715 * @IFLA_BR_MCAST_IGMP_VERSION
716 * Set the IGMP version.
717 *
718 * The valid values are 2 and 3. The default value is 2.
719 *
720 * @IFLA_BR_MCAST_MLD_VERSION
721 * Set the MLD version.
722 *
723 * The valid values are 1 and 2. The default value is 1.
724 *
725 * @IFLA_BR_VLAN_STATS_PER_PORT
726 * Enable (*IFLA_BR_VLAN_STATS_PER_PORT* == 1) or disable
727 * (*IFLA_BR_VLAN_STATS_PER_PORT* == 0) per-VLAN per-port stats accounting.
728 * Can be changed only when there are no port VLANs configured.
729 *
730 * The default value is 0 (disabled).
731 *
732 * @IFLA_BR_MULTI_BOOLOPT
733 * The multi_boolopt is used to control new boolean options to avoid adding
734 * new netlink attributes. You can look at ``enum br_boolopt_id`` for those
735 * options.
736 *
737 * @IFLA_BR_MCAST_QUERIER_STATE
738 * Bridge mcast querier states, read only.
739 *
740 * @IFLA_BR_FDB_N_LEARNED
741 * The number of dynamically learned FDB entries for the current bridge,
742 * read only.
743 *
744 * @IFLA_BR_FDB_MAX_LEARNED
745 * Set the number of max dynamically learned FDB entries for the current
746 * bridge.
747 *
748 * @IFLA_BR_STP_MODE
749 * Set the STP mode for the bridge, which controls how the bridge
750 * selects between userspace and kernel STP. The valid values are
751 * documented below in the ``BR_STP_MODE_*`` constants.
752 */
753enum {
754 IFLA_BR_UNSPEC,
755 IFLA_BR_FORWARD_DELAY,
756 IFLA_BR_HELLO_TIME,
757 IFLA_BR_MAX_AGE,
758 IFLA_BR_AGEING_TIME,
759 IFLA_BR_STP_STATE,
760 IFLA_BR_PRIORITY,
761 IFLA_BR_VLAN_FILTERING,
762 IFLA_BR_VLAN_PROTOCOL,
763 IFLA_BR_GROUP_FWD_MASK,
764 IFLA_BR_ROOT_ID,
765 IFLA_BR_BRIDGE_ID,
766 IFLA_BR_ROOT_PORT,
767 IFLA_BR_ROOT_PATH_COST,
768 IFLA_BR_TOPOLOGY_CHANGE,
769 IFLA_BR_TOPOLOGY_CHANGE_DETECTED,
770 IFLA_BR_HELLO_TIMER,
771 IFLA_BR_TCN_TIMER,
772 IFLA_BR_TOPOLOGY_CHANGE_TIMER,
773 IFLA_BR_GC_TIMER,
774 IFLA_BR_GROUP_ADDR,
775 IFLA_BR_FDB_FLUSH,
776 IFLA_BR_MCAST_ROUTER,
777 IFLA_BR_MCAST_SNOOPING,
778 IFLA_BR_MCAST_QUERY_USE_IFADDR,
779 IFLA_BR_MCAST_QUERIER,
780 IFLA_BR_MCAST_HASH_ELASTICITY,
781 IFLA_BR_MCAST_HASH_MAX,
782 IFLA_BR_MCAST_LAST_MEMBER_CNT,
783 IFLA_BR_MCAST_STARTUP_QUERY_CNT,
784 IFLA_BR_MCAST_LAST_MEMBER_INTVL,
785 IFLA_BR_MCAST_MEMBERSHIP_INTVL,
786 IFLA_BR_MCAST_QUERIER_INTVL,
787 IFLA_BR_MCAST_QUERY_INTVL,
788 IFLA_BR_MCAST_QUERY_RESPONSE_INTVL,
789 IFLA_BR_MCAST_STARTUP_QUERY_INTVL,
790 IFLA_BR_NF_CALL_IPTABLES,
791 IFLA_BR_NF_CALL_IP6TABLES,
792 IFLA_BR_NF_CALL_ARPTABLES,
793 IFLA_BR_VLAN_DEFAULT_PVID,
794 IFLA_BR_PAD,
795 IFLA_BR_VLAN_STATS_ENABLED,
796 IFLA_BR_MCAST_STATS_ENABLED,
797 IFLA_BR_MCAST_IGMP_VERSION,
798 IFLA_BR_MCAST_MLD_VERSION,
799 IFLA_BR_VLAN_STATS_PER_PORT,
800 IFLA_BR_MULTI_BOOLOPT,
801 IFLA_BR_MCAST_QUERIER_STATE,
802 IFLA_BR_FDB_N_LEARNED,
803 IFLA_BR_FDB_MAX_LEARNED,
804 IFLA_BR_STP_MODE,
805 __IFLA_BR_MAX,
806};
807
808#define IFLA_BR_MAX (__IFLA_BR_MAX - 1)
809
810/**
811 * DOC: Bridge STP mode values
812 *
813 * @BR_STP_MODE_AUTO
814 * Default. The kernel invokes the ``/sbin/bridge-stp`` helper to hand
815 * the bridge to a userspace STP daemon (e.g. mstpd). Only attempted in
816 * the initial network namespace; in other namespaces this falls back to
817 * kernel STP.
818 *
819 * @BR_STP_MODE_USER
820 * Directly enable userspace STP (``BR_USER_STP``) without invoking the
821 * ``/sbin/bridge-stp`` helper. Works in any network namespace.
822 * Userspace is responsible for ensuring an STP daemon manages the
823 * bridge.
824 *
825 * @BR_STP_MODE_KERNEL
826 * Directly enable kernel STP (``BR_KERNEL_STP``) without invoking the
827 * helper.
828 *
829 * The mode controls how the bridge selects between userspace and kernel
830 * STP when STP is enabled via ``IFLA_BR_STP_STATE``. It can only be
831 * changed while STP is disabled (``IFLA_BR_STP_STATE`` == 0), returns
832 * ``-EBUSY`` otherwise. The default value is ``BR_STP_MODE_AUTO``.
833 */
834enum br_stp_mode {
835 BR_STP_MODE_AUTO,
836 BR_STP_MODE_USER,
837 BR_STP_MODE_KERNEL,
838 __BR_STP_MODE_MAX
839};
840
841#define BR_STP_MODE_MAX (__BR_STP_MODE_MAX - 1)
842
843struct ifla_bridge_id {
844 __u8 prio[2];
845 __u8 addr[6]; /* ETH_ALEN */
846};
847
848/**
849 * DOC: Bridge mode enum definition
850 *
851 * @BRIDGE_MODE_HAIRPIN
852 * Controls whether traffic may be sent back out of the port on which it
853 * was received. This option is also called reflective relay mode, and is
854 * used to support basic VEPA (Virtual Ethernet Port Aggregator)
855 * capabilities. By default, this flag is turned off and the bridge will
856 * not forward traffic back out of the receiving port.
857 */
858enum {
859 BRIDGE_MODE_UNSPEC,
860 BRIDGE_MODE_HAIRPIN,
861};
862
863/**
864 * DOC: Bridge port enum definition
865 *
866 * @IFLA_BRPORT_STATE
867 * The operation state of the port. Here are the valid values.
868 *
869 * * 0 - port is in STP *DISABLED* state. Make this port completely
870 * inactive for STP. This is also called BPDU filter and could be used
871 * to disable STP on an untrusted port, like a leaf virtual device.
872 * The traffic forwarding is also stopped on this port.
873 * * 1 - port is in STP *LISTENING* state. Only valid if STP is enabled
874 * on the bridge. In this state the port listens for STP BPDUs and
875 * drops all other traffic frames.
876 * * 2 - port is in STP *LEARNING* state. Only valid if STP is enabled on
877 * the bridge. In this state the port will accept traffic only for the
878 * purpose of updating MAC address tables.
879 * * 3 - port is in STP *FORWARDING* state. Port is fully active.
880 * * 4 - port is in STP *BLOCKING* state. Only valid if STP is enabled on
881 * the bridge. This state is used during the STP election process.
882 * In this state, port will only process STP BPDUs.
883 *
884 * @IFLA_BRPORT_PRIORITY
885 * The STP port priority. The valid values are between 0 and 255.
886 *
887 * @IFLA_BRPORT_COST
888 * The STP path cost of the port. The valid values are between 1 and 65535.
889 *
890 * @IFLA_BRPORT_MODE
891 * Set the bridge port mode. See *BRIDGE_MODE_HAIRPIN* for more details.
892 *
893 * @IFLA_BRPORT_GUARD
894 * Controls whether STP BPDUs will be processed by the bridge port. By
895 * default, the flag is turned off to allow BPDU processing. Turning this
896 * flag on will disable the bridge port if a STP BPDU packet is received.
897 *
898 * If the bridge has Spanning Tree enabled, hostile devices on the network
899 * may send BPDU on a port and cause network failure. Setting *guard on*
900 * will detect and stop this by disabling the port. The port will be
901 * restarted if the link is brought down, or removed and reattached.
902 *
903 * @IFLA_BRPORT_PROTECT
904 * Controls whether a given port is allowed to become a root port or not.
905 * Only used when STP is enabled on the bridge. By default the flag is off.
906 *
907 * This feature is also called root port guard. If BPDU is received from a
908 * leaf (edge) port, it should not be elected as root port. This could
909 * be used if using STP on a bridge and the downstream bridges are not fully
910 * trusted; this prevents a hostile guest from rerouting traffic.
911 *
912 * @IFLA_BRPORT_FAST_LEAVE
913 * This flag allows the bridge to immediately stop multicast traffic
914 * forwarding on a port that receives an IGMP Leave message. It is only used
915 * when IGMP snooping is enabled on the bridge. By default the flag is off.
916 *
917 * @IFLA_BRPORT_LEARNING
918 * Controls whether a given port will learn *source* MAC addresses from
919 * received traffic or not. Also controls whether dynamic FDB entries
920 * (which can also be added by software) will be refreshed by incoming
921 * traffic. By default this flag is on.
922 *
923 * @IFLA_BRPORT_UNICAST_FLOOD
924 * Controls whether unicast traffic for which there is no FDB entry will
925 * be flooded towards this port. By default this flag is on.
926 *
927 * @IFLA_BRPORT_PROXYARP
928 * Enable proxy ARP on this port.
929 *
930 * @IFLA_BRPORT_LEARNING_SYNC
931 * Controls whether a given port will sync MAC addresses learned on device
932 * port to bridge FDB.
933 *
934 * @IFLA_BRPORT_PROXYARP_WIFI
935 * Enable proxy ARP on this port which meets extended requirements by
936 * IEEE 802.11 and Hotspot 2.0 specifications.
937 *
938 * @IFLA_BRPORT_ROOT_ID
939 *
940 * @IFLA_BRPORT_BRIDGE_ID
941 *
942 * @IFLA_BRPORT_DESIGNATED_PORT
943 *
944 * @IFLA_BRPORT_DESIGNATED_COST
945 *
946 * @IFLA_BRPORT_ID
947 *
948 * @IFLA_BRPORT_NO
949 *
950 * @IFLA_BRPORT_TOPOLOGY_CHANGE_ACK
951 *
952 * @IFLA_BRPORT_CONFIG_PENDING
953 *
954 * @IFLA_BRPORT_MESSAGE_AGE_TIMER
955 *
956 * @IFLA_BRPORT_FORWARD_DELAY_TIMER
957 *
958 * @IFLA_BRPORT_HOLD_TIMER
959 *
960 * @IFLA_BRPORT_FLUSH
961 * Flush bridge ports' fdb dynamic entries.
962 *
963 * @IFLA_BRPORT_MULTICAST_ROUTER
964 * Configure the port's multicast router presence. A port with
965 * a multicast router will receive all multicast traffic.
966 * The valid values are:
967 *
968 * * 0 disable multicast routers on this port
969 * * 1 let the system detect the presence of routers (default)
970 * * 2 permanently enable multicast traffic forwarding on this port
971 * * 3 enable multicast routers temporarily on this port, not depending
972 * on incoming queries.
973 *
974 * @IFLA_BRPORT_PAD
975 *
976 * @IFLA_BRPORT_MCAST_FLOOD
977 * Controls whether a given port will flood multicast traffic for which
978 * there is no MDB entry. By default this flag is on.
979 *
980 * @IFLA_BRPORT_MCAST_TO_UCAST
981 * Controls whether a given port will replicate packets using unicast
982 * instead of multicast. By default this flag is off.
983 *
984 * This is done by copying the packet per host and changing the multicast
985 * destination MAC to a unicast one accordingly.
986 *
987 * *mcast_to_unicast* works on top of the multicast snooping feature of the
988 * bridge. Which means unicast copies are only delivered to hosts which
989 * are interested in unicast and signaled this via IGMP/MLD reports previously.
990 *
991 * This feature is intended for interface types which have a more reliable
992 * and/or efficient way to deliver unicast packets than broadcast ones
993 * (e.g. WiFi).
994 *
995 * However, it should only be enabled on interfaces where no IGMPv2/MLDv1
996 * report suppression takes place. IGMP/MLD report suppression issue is
997 * usually overcome by the network daemon (supplicant) enabling AP isolation
998 * and by that separating all STAs.
999 *
1000 * Delivery of STA-to-STA IP multicast is made possible again by enabling
1001 * and utilizing the bridge hairpin mode, which considers the incoming port
1002 * as a potential outgoing port, too (see *BRIDGE_MODE_HAIRPIN* option).
1003 * Hairpin mode is performed after multicast snooping, therefore leading
1004 * to only deliver reports to STAs running a multicast router.
1005 *
1006 * @IFLA_BRPORT_VLAN_TUNNEL
1007 * Controls whether vlan to tunnel mapping is enabled on the port.
1008 * By default this flag is off.
1009 *
1010 * @IFLA_BRPORT_BCAST_FLOOD
1011 * Controls flooding of broadcast traffic on the given port. By default
1012 * this flag is on.
1013 *
1014 * @IFLA_BRPORT_GROUP_FWD_MASK
1015 * Set the group forward mask. This is a bitmask that is applied to
1016 * decide whether to forward incoming frames destined to link-local
1017 * addresses. The addresses of the form are 01:80:C2:00:00:0X (defaults
1018 * to 0, which means the bridge does not forward any link-local frames
1019 * coming on this port).
1020 *
1021 * @IFLA_BRPORT_NEIGH_SUPPRESS
1022 * Controls whether neighbor discovery (arp and nd) proxy and suppression
1023 * is enabled on the port. By default this flag is off.
1024 *
1025 * @IFLA_BRPORT_ISOLATED
1026 * Controls whether a given port will be isolated, which means it will be
1027 * able to communicate with non-isolated ports only. By default this
1028 * flag is off.
1029 *
1030 * @IFLA_BRPORT_BACKUP_PORT
1031 * Set a backup port. If the port loses carrier all traffic will be
1032 * redirected to the configured backup port. Set the value to 0 to disable
1033 * it.
1034 *
1035 * @IFLA_BRPORT_MRP_RING_OPEN
1036 *
1037 * @IFLA_BRPORT_MRP_IN_OPEN
1038 *
1039 * @IFLA_BRPORT_MCAST_EHT_HOSTS_LIMIT
1040 * The number of per-port EHT hosts limit. The default value is 512.
1041 * Setting to 0 is not allowed.
1042 *
1043 * @IFLA_BRPORT_MCAST_EHT_HOSTS_CNT
1044 * The current number of tracked hosts, read only.
1045 *
1046 * @IFLA_BRPORT_LOCKED
1047 * Controls whether a port will be locked, meaning that hosts behind the
1048 * port will not be able to communicate through the port unless an FDB
1049 * entry with the unit's MAC address is in the FDB. The common use case is
1050 * that hosts are allowed access through authentication with the IEEE 802.1X
1051 * protocol or based on whitelists. By default this flag is off.
1052 *
1053 * Please note that secure 802.1X deployments should always use the
1054 * *BR_BOOLOPT_NO_LL_LEARN* flag, to not permit the bridge to populate its
1055 * FDB based on link-local (EAPOL) traffic received on the port.
1056 *
1057 * @IFLA_BRPORT_MAB
1058 * Controls whether a port will use MAC Authentication Bypass (MAB), a
1059 * technique through which select MAC addresses may be allowed on a locked
1060 * port, without using 802.1X authentication. Packets with an unknown source
1061 * MAC address generates a "locked" FDB entry on the incoming bridge port.
1062 * The common use case is for user space to react to these bridge FDB
1063 * notifications and optionally replace the locked FDB entry with a normal
1064 * one, allowing traffic to pass for whitelisted MAC addresses.
1065 *
1066 * Setting this flag also requires *IFLA_BRPORT_LOCKED* and
1067 * *IFLA_BRPORT_LEARNING*. *IFLA_BRPORT_LOCKED* ensures that unauthorized
1068 * data packets are dropped, and *IFLA_BRPORT_LEARNING* allows the dynamic
1069 * FDB entries installed by user space (as replacements for the locked FDB
1070 * entries) to be refreshed and/or aged out.
1071 *
1072 * @IFLA_BRPORT_MCAST_N_GROUPS
1073 *
1074 * @IFLA_BRPORT_MCAST_MAX_GROUPS
1075 * Sets the maximum number of MDB entries that can be registered for a
1076 * given port. Attempts to register more MDB entries at the port than this
1077 * limit allows will be rejected, whether they are done through netlink
1078 * (e.g. the bridge tool), or IGMP or MLD membership reports. Setting a
1079 * limit of 0 disables the limit. The default value is 0.
1080 *
1081 * @IFLA_BRPORT_NEIGH_VLAN_SUPPRESS
1082 * Controls whether neighbor discovery (arp and nd) proxy and suppression is
1083 * enabled for a given port. By default this flag is off.
1084 *
1085 * Note that this option only takes effect when *IFLA_BRPORT_NEIGH_SUPPRESS*
1086 * is enabled for a given port.
1087 *
1088 * @IFLA_BRPORT_BACKUP_NHID
1089 * The FDB nexthop object ID to attach to packets being redirected to a
1090 * backup port that has VLAN tunnel mapping enabled (via the
1091 * *IFLA_BRPORT_VLAN_TUNNEL* option). Setting a value of 0 (default) has
1092 * the effect of not attaching any ID.
1093 */
1094enum {
1095 IFLA_BRPORT_UNSPEC,
1096 IFLA_BRPORT_STATE, /* Spanning tree state */
1097 IFLA_BRPORT_PRIORITY, /* " priority */
1098 IFLA_BRPORT_COST, /* " cost */
1099 IFLA_BRPORT_MODE, /* mode (hairpin) */
1100 IFLA_BRPORT_GUARD, /* bpdu guard */
1101 IFLA_BRPORT_PROTECT, /* root port protection */
1102 IFLA_BRPORT_FAST_LEAVE, /* multicast fast leave */
1103 IFLA_BRPORT_LEARNING, /* mac learning */
1104 IFLA_BRPORT_UNICAST_FLOOD, /* flood unicast traffic */
1105 IFLA_BRPORT_PROXYARP, /* proxy ARP */
1106 IFLA_BRPORT_LEARNING_SYNC, /* mac learning sync from device */
1107 IFLA_BRPORT_PROXYARP_WIFI, /* proxy ARP for Wi-Fi */
1108 IFLA_BRPORT_ROOT_ID, /* designated root */
1109 IFLA_BRPORT_BRIDGE_ID, /* designated bridge */
1110 IFLA_BRPORT_DESIGNATED_PORT,
1111 IFLA_BRPORT_DESIGNATED_COST,
1112 IFLA_BRPORT_ID,
1113 IFLA_BRPORT_NO,
1114 IFLA_BRPORT_TOPOLOGY_CHANGE_ACK,
1115 IFLA_BRPORT_CONFIG_PENDING,
1116 IFLA_BRPORT_MESSAGE_AGE_TIMER,
1117 IFLA_BRPORT_FORWARD_DELAY_TIMER,
1118 IFLA_BRPORT_HOLD_TIMER,
1119 IFLA_BRPORT_FLUSH,
1120 IFLA_BRPORT_MULTICAST_ROUTER,
1121 IFLA_BRPORT_PAD,
1122 IFLA_BRPORT_MCAST_FLOOD,
1123 IFLA_BRPORT_MCAST_TO_UCAST,
1124 IFLA_BRPORT_VLAN_TUNNEL,
1125 IFLA_BRPORT_BCAST_FLOOD,
1126 IFLA_BRPORT_GROUP_FWD_MASK,
1127 IFLA_BRPORT_NEIGH_SUPPRESS,
1128 IFLA_BRPORT_ISOLATED,
1129 IFLA_BRPORT_BACKUP_PORT,
1130 IFLA_BRPORT_MRP_RING_OPEN,
1131 IFLA_BRPORT_MRP_IN_OPEN,
1132 IFLA_BRPORT_MCAST_EHT_HOSTS_LIMIT,
1133 IFLA_BRPORT_MCAST_EHT_HOSTS_CNT,
1134 IFLA_BRPORT_LOCKED,
1135 IFLA_BRPORT_MAB,
1136 IFLA_BRPORT_MCAST_N_GROUPS,
1137 IFLA_BRPORT_MCAST_MAX_GROUPS,
1138 IFLA_BRPORT_NEIGH_VLAN_SUPPRESS,
1139 IFLA_BRPORT_BACKUP_NHID,
1140 __IFLA_BRPORT_MAX
1141};
1142#define IFLA_BRPORT_MAX (__IFLA_BRPORT_MAX - 1)
1143
1144struct ifla_cacheinfo {
1145 __u32 max_reasm_len;
1146 __u32 tstamp; /* ipv6InterfaceTable updated timestamp */
1147 __u32 reachable_time;
1148 __u32 retrans_time;
1149};
1150
1151enum {
1152 IFLA_INFO_UNSPEC,
1153 IFLA_INFO_KIND,
1154 IFLA_INFO_DATA,
1155 IFLA_INFO_XSTATS,
1156 IFLA_INFO_SLAVE_KIND,
1157 IFLA_INFO_SLAVE_DATA,
1158 __IFLA_INFO_MAX,
1159};
1160
1161#define IFLA_INFO_MAX (__IFLA_INFO_MAX - 1)
1162
1163/* VLAN section */
1164
1165enum {
1166 IFLA_VLAN_UNSPEC,
1167 IFLA_VLAN_ID,
1168 IFLA_VLAN_FLAGS,
1169 IFLA_VLAN_EGRESS_QOS,
1170 IFLA_VLAN_INGRESS_QOS,
1171 IFLA_VLAN_PROTOCOL,
1172 __IFLA_VLAN_MAX,
1173};
1174
1175#define IFLA_VLAN_MAX (__IFLA_VLAN_MAX - 1)
1176
1177struct ifla_vlan_flags {
1178 __u32 flags;
1179 __u32 mask;
1180};
1181
1182enum {
1183 IFLA_VLAN_QOS_UNSPEC,
1184 IFLA_VLAN_QOS_MAPPING,
1185 __IFLA_VLAN_QOS_MAX
1186};
1187
1188#define IFLA_VLAN_QOS_MAX (__IFLA_VLAN_QOS_MAX - 1)
1189
1190struct ifla_vlan_qos_mapping {
1191 __u32 from;
1192 __u32 to;
1193};
1194
1195/* MACVLAN section */
1196enum {
1197 IFLA_MACVLAN_UNSPEC,
1198 IFLA_MACVLAN_MODE,
1199 IFLA_MACVLAN_FLAGS,
1200 IFLA_MACVLAN_MACADDR_MODE,
1201 IFLA_MACVLAN_MACADDR,
1202 IFLA_MACVLAN_MACADDR_DATA,
1203 IFLA_MACVLAN_MACADDR_COUNT,
1204 IFLA_MACVLAN_BC_QUEUE_LEN,
1205 IFLA_MACVLAN_BC_QUEUE_LEN_USED,
1206 IFLA_MACVLAN_BC_CUTOFF,
1207 __IFLA_MACVLAN_MAX,
1208};
1209
1210#define IFLA_MACVLAN_MAX (__IFLA_MACVLAN_MAX - 1)
1211
1212enum macvlan_mode {
1213 MACVLAN_MODE_PRIVATE = 1, /* don't talk to other macvlans */
1214 MACVLAN_MODE_VEPA = 2, /* talk to other ports through ext bridge */
1215 MACVLAN_MODE_BRIDGE = 4, /* talk to bridge ports directly */
1216 MACVLAN_MODE_PASSTHRU = 8,/* take over the underlying device */
1217 MACVLAN_MODE_SOURCE = 16,/* use source MAC address list to assign */
1218};
1219
1220enum macvlan_macaddr_mode {
1221 MACVLAN_MACADDR_ADD,
1222 MACVLAN_MACADDR_DEL,
1223 MACVLAN_MACADDR_FLUSH,
1224 MACVLAN_MACADDR_SET,
1225};
1226
1227#define MACVLAN_FLAG_NOPROMISC 1
1228#define MACVLAN_FLAG_NODST 2 /* skip dst macvlan if matching src macvlan */
1229
1230/* VRF section */
1231enum {
1232 IFLA_VRF_UNSPEC,
1233 IFLA_VRF_TABLE,
1234 __IFLA_VRF_MAX
1235};
1236
1237#define IFLA_VRF_MAX (__IFLA_VRF_MAX - 1)
1238
1239enum {
1240 IFLA_VRF_PORT_UNSPEC,
1241 IFLA_VRF_PORT_TABLE,
1242 __IFLA_VRF_PORT_MAX
1243};
1244
1245#define IFLA_VRF_PORT_MAX (__IFLA_VRF_PORT_MAX - 1)
1246
1247/* MACSEC section */
1248enum {
1249 IFLA_MACSEC_UNSPEC,
1250 IFLA_MACSEC_SCI,
1251 IFLA_MACSEC_PORT,
1252 IFLA_MACSEC_ICV_LEN,
1253 IFLA_MACSEC_CIPHER_SUITE,
1254 IFLA_MACSEC_WINDOW,
1255 IFLA_MACSEC_ENCODING_SA,
1256 IFLA_MACSEC_ENCRYPT,
1257 IFLA_MACSEC_PROTECT,
1258 IFLA_MACSEC_INC_SCI,
1259 IFLA_MACSEC_ES,
1260 IFLA_MACSEC_SCB,
1261 IFLA_MACSEC_REPLAY_PROTECT,
1262 IFLA_MACSEC_VALIDATION,
1263 IFLA_MACSEC_PAD,
1264 IFLA_MACSEC_OFFLOAD,
1265 __IFLA_MACSEC_MAX,
1266};
1267
1268#define IFLA_MACSEC_MAX (__IFLA_MACSEC_MAX - 1)
1269
1270/* XFRM section */
1271enum {
1272 IFLA_XFRM_UNSPEC,
1273 IFLA_XFRM_LINK,
1274 IFLA_XFRM_IF_ID,
1275 IFLA_XFRM_COLLECT_METADATA,
1276 __IFLA_XFRM_MAX
1277};
1278
1279#define IFLA_XFRM_MAX (__IFLA_XFRM_MAX - 1)
1280
1281enum macsec_validation_type {
1282 MACSEC_VALIDATE_DISABLED = 0,
1283 MACSEC_VALIDATE_CHECK = 1,
1284 MACSEC_VALIDATE_STRICT = 2,
1285 __MACSEC_VALIDATE_END,
1286 MACSEC_VALIDATE_MAX = __MACSEC_VALIDATE_END - 1,
1287};
1288
1289enum macsec_offload {
1290 MACSEC_OFFLOAD_OFF = 0,
1291 MACSEC_OFFLOAD_PHY = 1,
1292 MACSEC_OFFLOAD_MAC = 2,
1293 __MACSEC_OFFLOAD_END,
1294 MACSEC_OFFLOAD_MAX = __MACSEC_OFFLOAD_END - 1,
1295};
1296
1297/* IPVLAN section */
1298enum {
1299 IFLA_IPVLAN_UNSPEC,
1300 IFLA_IPVLAN_MODE,
1301 IFLA_IPVLAN_FLAGS,
1302 __IFLA_IPVLAN_MAX
1303};
1304
1305#define IFLA_IPVLAN_MAX (__IFLA_IPVLAN_MAX - 1)
1306
1307enum ipvlan_mode {
1308 IPVLAN_MODE_L2 = 0,
1309 IPVLAN_MODE_L3,
1310 IPVLAN_MODE_L3S,
1311 IPVLAN_MODE_MAX
1312};
1313
1314#define IPVLAN_F_PRIVATE 0x01
1315#define IPVLAN_F_VEPA 0x02
1316
1317/* Tunnel RTM header */
1318struct tunnel_msg {
1319 __u8 family;
1320 __u8 flags;
1321 __u16 reserved2;
1322 __u32 ifindex;
1323};
1324
1325/* netkit section */
1326enum netkit_action {
1327 NETKIT_NEXT = -1,
1328 NETKIT_PASS = 0,
1329 NETKIT_DROP = 2,
1330 NETKIT_REDIRECT = 7,
1331};
1332
1333enum netkit_mode {
1334 NETKIT_L2,
1335 NETKIT_L3,
1336};
1337
1338enum netkit_pairing {
1339 NETKIT_DEVICE_PAIR,
1340 NETKIT_DEVICE_SINGLE,
1341};
1342
1343/* NETKIT_SCRUB_NONE leaves clearing skb->{mark,priority} up to
1344 * the BPF program if attached. This also means the latter can
1345 * consume the two fields if they were populated earlier.
1346 *
1347 * NETKIT_SCRUB_DEFAULT zeroes skb->{mark,priority} fields before
1348 * invoking the attached BPF program when the peer device resides
1349 * in a different network namespace. This is the default behavior.
1350 */
1351enum netkit_scrub {
1352 NETKIT_SCRUB_NONE,
1353 NETKIT_SCRUB_DEFAULT,
1354};
1355
1356enum {
1357 IFLA_NETKIT_UNSPEC,
1358 IFLA_NETKIT_PEER_INFO,
1359 IFLA_NETKIT_PRIMARY,
1360 IFLA_NETKIT_POLICY,
1361 IFLA_NETKIT_PEER_POLICY,
1362 IFLA_NETKIT_MODE,
1363 IFLA_NETKIT_SCRUB,
1364 IFLA_NETKIT_PEER_SCRUB,
1365 IFLA_NETKIT_HEADROOM,
1366 IFLA_NETKIT_TAILROOM,
1367 IFLA_NETKIT_PAIRING,
1368 __IFLA_NETKIT_MAX,
1369};
1370#define IFLA_NETKIT_MAX (__IFLA_NETKIT_MAX - 1)
1371
1372/* VXLAN section */
1373
1374/* include statistics in the dump */
1375#define TUNNEL_MSG_FLAG_STATS 0x01
1376
1377#define TUNNEL_MSG_VALID_USER_FLAGS TUNNEL_MSG_FLAG_STATS
1378
1379/* Embedded inside VXLAN_VNIFILTER_ENTRY_STATS */
1380enum {
1381 VNIFILTER_ENTRY_STATS_UNSPEC,
1382 VNIFILTER_ENTRY_STATS_RX_BYTES,
1383 VNIFILTER_ENTRY_STATS_RX_PKTS,
1384 VNIFILTER_ENTRY_STATS_RX_DROPS,
1385 VNIFILTER_ENTRY_STATS_RX_ERRORS,
1386 VNIFILTER_ENTRY_STATS_TX_BYTES,
1387 VNIFILTER_ENTRY_STATS_TX_PKTS,
1388 VNIFILTER_ENTRY_STATS_TX_DROPS,
1389 VNIFILTER_ENTRY_STATS_TX_ERRORS,
1390 VNIFILTER_ENTRY_STATS_PAD,
1391 __VNIFILTER_ENTRY_STATS_MAX
1392};
1393#define VNIFILTER_ENTRY_STATS_MAX (__VNIFILTER_ENTRY_STATS_MAX - 1)
1394
1395enum {
1396 VXLAN_VNIFILTER_ENTRY_UNSPEC,
1397 VXLAN_VNIFILTER_ENTRY_START,
1398 VXLAN_VNIFILTER_ENTRY_END,
1399 VXLAN_VNIFILTER_ENTRY_GROUP,
1400 VXLAN_VNIFILTER_ENTRY_GROUP6,
1401 VXLAN_VNIFILTER_ENTRY_STATS,
1402 __VXLAN_VNIFILTER_ENTRY_MAX
1403};
1404#define VXLAN_VNIFILTER_ENTRY_MAX (__VXLAN_VNIFILTER_ENTRY_MAX - 1)
1405
1406enum {
1407 VXLAN_VNIFILTER_UNSPEC,
1408 VXLAN_VNIFILTER_ENTRY,
1409 __VXLAN_VNIFILTER_MAX
1410};
1411#define VXLAN_VNIFILTER_MAX (__VXLAN_VNIFILTER_MAX - 1)
1412
1413enum {
1414 IFLA_VXLAN_UNSPEC,
1415 IFLA_VXLAN_ID,
1416 IFLA_VXLAN_GROUP, /* group or remote address */
1417 IFLA_VXLAN_LINK,
1418 IFLA_VXLAN_LOCAL,
1419 IFLA_VXLAN_TTL,
1420 IFLA_VXLAN_TOS,
1421 IFLA_VXLAN_LEARNING,
1422 IFLA_VXLAN_AGEING,
1423 IFLA_VXLAN_LIMIT,
1424 IFLA_VXLAN_PORT_RANGE, /* source port */
1425 IFLA_VXLAN_PROXY,
1426 IFLA_VXLAN_RSC,
1427 IFLA_VXLAN_L2MISS,
1428 IFLA_VXLAN_L3MISS,
1429 IFLA_VXLAN_PORT, /* destination port */
1430 IFLA_VXLAN_GROUP6,
1431 IFLA_VXLAN_LOCAL6,
1432 IFLA_VXLAN_UDP_CSUM,
1433 IFLA_VXLAN_UDP_ZERO_CSUM6_TX,
1434 IFLA_VXLAN_UDP_ZERO_CSUM6_RX,
1435 IFLA_VXLAN_REMCSUM_TX,
1436 IFLA_VXLAN_REMCSUM_RX,
1437 IFLA_VXLAN_GBP,
1438 IFLA_VXLAN_REMCSUM_NOPARTIAL,
1439 IFLA_VXLAN_COLLECT_METADATA,
1440 IFLA_VXLAN_LABEL,
1441 IFLA_VXLAN_GPE,
1442 IFLA_VXLAN_TTL_INHERIT,
1443 IFLA_VXLAN_DF,
1444 IFLA_VXLAN_VNIFILTER, /* only applicable with COLLECT_METADATA mode */
1445 IFLA_VXLAN_LOCALBYPASS,
1446 IFLA_VXLAN_LABEL_POLICY, /* IPv6 flow label policy; ifla_vxlan_label_policy */
1447 IFLA_VXLAN_RESERVED_BITS,
1448 IFLA_VXLAN_MC_ROUTE,
1449 __IFLA_VXLAN_MAX
1450};
1451#define IFLA_VXLAN_MAX (__IFLA_VXLAN_MAX - 1)
1452
1453struct ifla_vxlan_port_range {
1454 __be16 low;
1455 __be16 high;
1456};
1457
1458enum ifla_vxlan_df {
1459 VXLAN_DF_UNSET = 0,
1460 VXLAN_DF_SET,
1461 VXLAN_DF_INHERIT,
1462 __VXLAN_DF_END,
1463 VXLAN_DF_MAX = __VXLAN_DF_END - 1,
1464};
1465
1466enum ifla_vxlan_label_policy {
1467 VXLAN_LABEL_FIXED = 0,
1468 VXLAN_LABEL_INHERIT = 1,
1469 __VXLAN_LABEL_END,
1470 VXLAN_LABEL_MAX = __VXLAN_LABEL_END - 1,
1471};
1472
1473/* GENEVE section */
1474enum {
1475 IFLA_GENEVE_UNSPEC,
1476 IFLA_GENEVE_ID,
1477 IFLA_GENEVE_REMOTE,
1478 IFLA_GENEVE_TTL,
1479 IFLA_GENEVE_TOS,
1480 IFLA_GENEVE_PORT, /* destination port */
1481 IFLA_GENEVE_COLLECT_METADATA,
1482 IFLA_GENEVE_REMOTE6,
1483 IFLA_GENEVE_UDP_CSUM,
1484 IFLA_GENEVE_UDP_ZERO_CSUM6_TX,
1485 IFLA_GENEVE_UDP_ZERO_CSUM6_RX,
1486 IFLA_GENEVE_LABEL,
1487 IFLA_GENEVE_TTL_INHERIT,
1488 IFLA_GENEVE_DF,
1489 IFLA_GENEVE_INNER_PROTO_INHERIT,
1490 IFLA_GENEVE_PORT_RANGE,
1491 IFLA_GENEVE_GRO_HINT,
1492 __IFLA_GENEVE_MAX
1493};
1494#define IFLA_GENEVE_MAX (__IFLA_GENEVE_MAX - 1)
1495
1496enum ifla_geneve_df {
1497 GENEVE_DF_UNSET = 0,
1498 GENEVE_DF_SET,
1499 GENEVE_DF_INHERIT,
1500 __GENEVE_DF_END,
1501 GENEVE_DF_MAX = __GENEVE_DF_END - 1,
1502};
1503
1504struct ifla_geneve_port_range {
1505 __be16 low;
1506 __be16 high;
1507};
1508
1509/* Bareudp section */
1510enum {
1511 IFLA_BAREUDP_UNSPEC,
1512 IFLA_BAREUDP_PORT,
1513 IFLA_BAREUDP_ETHERTYPE,
1514 IFLA_BAREUDP_SRCPORT_MIN,
1515 IFLA_BAREUDP_MULTIPROTO_MODE,
1516 __IFLA_BAREUDP_MAX
1517};
1518
1519#define IFLA_BAREUDP_MAX (__IFLA_BAREUDP_MAX - 1)
1520
1521/* PPP section */
1522enum {
1523 IFLA_PPP_UNSPEC,
1524 IFLA_PPP_DEV_FD,
1525 __IFLA_PPP_MAX
1526};
1527#define IFLA_PPP_MAX (__IFLA_PPP_MAX - 1)
1528
1529/* GTP section */
1530
1531enum ifla_gtp_role {
1532 GTP_ROLE_GGSN = 0,
1533 GTP_ROLE_SGSN,
1534};
1535
1536enum {
1537 IFLA_GTP_UNSPEC,
1538 IFLA_GTP_FD0,
1539 IFLA_GTP_FD1,
1540 IFLA_GTP_PDP_HASHSIZE,
1541 IFLA_GTP_ROLE,
1542 IFLA_GTP_CREATE_SOCKETS,
1543 IFLA_GTP_RESTART_COUNT,
1544 IFLA_GTP_LOCAL,
1545 IFLA_GTP_LOCAL6,
1546 __IFLA_GTP_MAX,
1547};
1548#define IFLA_GTP_MAX (__IFLA_GTP_MAX - 1)
1549
1550/* Bonding section */
1551
1552enum {
1553 IFLA_BOND_UNSPEC,
1554 IFLA_BOND_MODE,
1555 IFLA_BOND_ACTIVE_SLAVE,
1556 IFLA_BOND_MIIMON,
1557 IFLA_BOND_UPDELAY,
1558 IFLA_BOND_DOWNDELAY,
1559 IFLA_BOND_USE_CARRIER,
1560 IFLA_BOND_ARP_INTERVAL,
1561 IFLA_BOND_ARP_IP_TARGET,
1562 IFLA_BOND_ARP_VALIDATE,
1563 IFLA_BOND_ARP_ALL_TARGETS,
1564 IFLA_BOND_PRIMARY,
1565 IFLA_BOND_PRIMARY_RESELECT,
1566 IFLA_BOND_FAIL_OVER_MAC,
1567 IFLA_BOND_XMIT_HASH_POLICY,
1568 IFLA_BOND_RESEND_IGMP,
1569 IFLA_BOND_NUM_PEER_NOTIF,
1570 IFLA_BOND_ALL_SLAVES_ACTIVE,
1571 IFLA_BOND_MIN_LINKS,
1572 IFLA_BOND_LP_INTERVAL,
1573 IFLA_BOND_PACKETS_PER_SLAVE,
1574 IFLA_BOND_AD_LACP_RATE,
1575 IFLA_BOND_AD_SELECT,
1576 IFLA_BOND_AD_INFO,
1577 IFLA_BOND_AD_ACTOR_SYS_PRIO,
1578 IFLA_BOND_AD_USER_PORT_KEY,
1579 IFLA_BOND_AD_ACTOR_SYSTEM,
1580 IFLA_BOND_TLB_DYNAMIC_LB,
1581 IFLA_BOND_PEER_NOTIF_DELAY,
1582 IFLA_BOND_AD_LACP_ACTIVE,
1583 IFLA_BOND_MISSED_MAX,
1584 IFLA_BOND_NS_IP6_TARGET,
1585 IFLA_BOND_COUPLED_CONTROL,
1586 IFLA_BOND_BROADCAST_NEIGH,
1587 __IFLA_BOND_MAX,
1588};
1589
1590#define IFLA_BOND_MAX (__IFLA_BOND_MAX - 1)
1591
1592enum {
1593 IFLA_BOND_AD_INFO_UNSPEC,
1594 IFLA_BOND_AD_INFO_AGGREGATOR,
1595 IFLA_BOND_AD_INFO_NUM_PORTS,
1596 IFLA_BOND_AD_INFO_ACTOR_KEY,
1597 IFLA_BOND_AD_INFO_PARTNER_KEY,
1598 IFLA_BOND_AD_INFO_PARTNER_MAC,
1599 __IFLA_BOND_AD_INFO_MAX,
1600};
1601
1602#define IFLA_BOND_AD_INFO_MAX (__IFLA_BOND_AD_INFO_MAX - 1)
1603
1604enum {
1605 IFLA_BOND_SLAVE_UNSPEC,
1606 IFLA_BOND_SLAVE_STATE,
1607 IFLA_BOND_SLAVE_MII_STATUS,
1608 IFLA_BOND_SLAVE_LINK_FAILURE_COUNT,
1609 IFLA_BOND_SLAVE_PERM_HWADDR,
1610 IFLA_BOND_SLAVE_QUEUE_ID,
1611 IFLA_BOND_SLAVE_AD_AGGREGATOR_ID,
1612 IFLA_BOND_SLAVE_AD_ACTOR_OPER_PORT_STATE,
1613 IFLA_BOND_SLAVE_AD_PARTNER_OPER_PORT_STATE,
1614 IFLA_BOND_SLAVE_PRIO,
1615 IFLA_BOND_SLAVE_ACTOR_PORT_PRIO,
1616 IFLA_BOND_SLAVE_AD_CHURN_ACTOR_STATE,
1617 IFLA_BOND_SLAVE_AD_CHURN_PARTNER_STATE,
1618 __IFLA_BOND_SLAVE_MAX,
1619};
1620
1621#define IFLA_BOND_SLAVE_MAX (__IFLA_BOND_SLAVE_MAX - 1)
1622
1623/* SR-IOV virtual function management section */
1624
1625enum {
1626 IFLA_VF_INFO_UNSPEC,
1627 IFLA_VF_INFO,
1628 __IFLA_VF_INFO_MAX,
1629};
1630
1631#define IFLA_VF_INFO_MAX (__IFLA_VF_INFO_MAX - 1)
1632
1633enum {
1634 IFLA_VF_UNSPEC,
1635 IFLA_VF_MAC, /* Hardware queue specific attributes */
1636 IFLA_VF_VLAN, /* VLAN ID and QoS */
1637 IFLA_VF_TX_RATE, /* Max TX Bandwidth Allocation */
1638 IFLA_VF_SPOOFCHK, /* Spoof Checking on/off switch */
1639 IFLA_VF_LINK_STATE, /* link state enable/disable/auto switch */
1640 IFLA_VF_RATE, /* Min and Max TX Bandwidth Allocation */
1641 IFLA_VF_RSS_QUERY_EN, /* RSS Redirection Table and Hash Key query
1642 * on/off switch
1643 */
1644 IFLA_VF_STATS, /* network device statistics */
1645 IFLA_VF_TRUST, /* Trust VF */
1646 IFLA_VF_IB_NODE_GUID, /* VF Infiniband node GUID */
1647 IFLA_VF_IB_PORT_GUID, /* VF Infiniband port GUID */
1648 IFLA_VF_VLAN_LIST, /* nested list of vlans, option for QinQ */
1649 IFLA_VF_BROADCAST, /* VF broadcast */
1650 __IFLA_VF_MAX,
1651};
1652
1653#define IFLA_VF_MAX (__IFLA_VF_MAX - 1)
1654
1655struct ifla_vf_mac {
1656 __u32 vf;
1657 __u8 mac[32]; /* MAX_ADDR_LEN */
1658};
1659
1660struct ifla_vf_broadcast {
1661 __u8 broadcast[32];
1662};
1663
1664struct ifla_vf_vlan {
1665 __u32 vf;
1666 __u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
1667 __u32 qos;
1668};
1669
1670enum {
1671 IFLA_VF_VLAN_INFO_UNSPEC,
1672 IFLA_VF_VLAN_INFO, /* VLAN ID, QoS and VLAN protocol */
1673 __IFLA_VF_VLAN_INFO_MAX,
1674};
1675
1676#define IFLA_VF_VLAN_INFO_MAX (__IFLA_VF_VLAN_INFO_MAX - 1)
1677#define MAX_VLAN_LIST_LEN 1
1678
1679struct ifla_vf_vlan_info {
1680 __u32 vf;
1681 __u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
1682 __u32 qos;
1683 __be16 vlan_proto; /* VLAN protocol either 802.1Q or 802.1ad */
1684};
1685
1686struct ifla_vf_tx_rate {
1687 __u32 vf;
1688 __u32 rate; /* Max TX bandwidth in Mbps, 0 disables throttling */
1689};
1690
1691struct ifla_vf_rate {
1692 __u32 vf;
1693 __u32 min_tx_rate; /* Min Bandwidth in Mbps */
1694 __u32 max_tx_rate; /* Max Bandwidth in Mbps */
1695};
1696
1697struct ifla_vf_spoofchk {
1698 __u32 vf;
1699 __u32 setting;
1700};
1701
1702struct ifla_vf_guid {
1703 __u32 vf;
1704 __u64 guid;
1705};
1706
1707enum {
1708 IFLA_VF_LINK_STATE_AUTO, /* link state of the uplink */
1709 IFLA_VF_LINK_STATE_ENABLE, /* link always up */
1710 IFLA_VF_LINK_STATE_DISABLE, /* link always down */
1711 __IFLA_VF_LINK_STATE_MAX,
1712};
1713
1714struct ifla_vf_link_state {
1715 __u32 vf;
1716 __u32 link_state;
1717};
1718
1719struct ifla_vf_rss_query_en {
1720 __u32 vf;
1721 __u32 setting;
1722};
1723
1724enum {
1725 IFLA_VF_STATS_RX_PACKETS,
1726 IFLA_VF_STATS_TX_PACKETS,
1727 IFLA_VF_STATS_RX_BYTES,
1728 IFLA_VF_STATS_TX_BYTES,
1729 IFLA_VF_STATS_BROADCAST,
1730 IFLA_VF_STATS_MULTICAST,
1731 IFLA_VF_STATS_PAD,
1732 IFLA_VF_STATS_RX_DROPPED,
1733 IFLA_VF_STATS_TX_DROPPED,
1734 __IFLA_VF_STATS_MAX,
1735};
1736
1737#define IFLA_VF_STATS_MAX (__IFLA_VF_STATS_MAX - 1)
1738
1739struct ifla_vf_trust {
1740 __u32 vf;
1741 __u32 setting;
1742};
1743
1744/* VF ports management section
1745 *
1746 * Nested layout of set/get msg is:
1747 *
1748 * [IFLA_NUM_VF]
1749 * [IFLA_VF_PORTS]
1750 * [IFLA_VF_PORT]
1751 * [IFLA_PORT_*], ...
1752 * [IFLA_VF_PORT]
1753 * [IFLA_PORT_*], ...
1754 * ...
1755 * [IFLA_PORT_SELF]
1756 * [IFLA_PORT_*], ...
1757 */
1758
1759enum {
1760 IFLA_VF_PORT_UNSPEC,
1761 IFLA_VF_PORT, /* nest */
1762 __IFLA_VF_PORT_MAX,
1763};
1764
1765#define IFLA_VF_PORT_MAX (__IFLA_VF_PORT_MAX - 1)
1766
1767enum {
1768 IFLA_PORT_UNSPEC,
1769 IFLA_PORT_VF, /* __u32 */
1770 IFLA_PORT_PROFILE, /* string */
1771 IFLA_PORT_VSI_TYPE, /* 802.1Qbg (pre-)standard VDP */
1772 IFLA_PORT_INSTANCE_UUID, /* binary UUID */
1773 IFLA_PORT_HOST_UUID, /* binary UUID */
1774 IFLA_PORT_REQUEST, /* __u8 */
1775 IFLA_PORT_RESPONSE, /* __u16, output only */
1776 __IFLA_PORT_MAX,
1777};
1778
1779#define IFLA_PORT_MAX (__IFLA_PORT_MAX - 1)
1780
1781#define PORT_PROFILE_MAX 40
1782#define PORT_UUID_MAX 16
1783#define PORT_SELF_VF -1
1784
1785enum {
1786 PORT_REQUEST_PREASSOCIATE = 0,
1787 PORT_REQUEST_PREASSOCIATE_RR,
1788 PORT_REQUEST_ASSOCIATE,
1789 PORT_REQUEST_DISASSOCIATE,
1790};
1791
1792enum {
1793 PORT_VDP_RESPONSE_SUCCESS = 0,
1794 PORT_VDP_RESPONSE_INVALID_FORMAT,
1795 PORT_VDP_RESPONSE_INSUFFICIENT_RESOURCES,
1796 PORT_VDP_RESPONSE_UNUSED_VTID,
1797 PORT_VDP_RESPONSE_VTID_VIOLATION,
1798 PORT_VDP_RESPONSE_VTID_VERSION_VIOALTION,
1799 PORT_VDP_RESPONSE_OUT_OF_SYNC,
1800 /* 0x08-0xFF reserved for future VDP use */
1801 PORT_PROFILE_RESPONSE_SUCCESS = 0x100,
1802 PORT_PROFILE_RESPONSE_INPROGRESS,
1803 PORT_PROFILE_RESPONSE_INVALID,
1804 PORT_PROFILE_RESPONSE_BADSTATE,
1805 PORT_PROFILE_RESPONSE_INSUFFICIENT_RESOURCES,
1806 PORT_PROFILE_RESPONSE_ERROR,
1807};
1808
1809struct ifla_port_vsi {
1810 __u8 vsi_mgr_id;
1811 __u8 vsi_type_id[3];
1812 __u8 vsi_type_version;
1813 __u8 pad[3];
1814};
1815
1816
1817/* IPoIB section */
1818
1819enum {
1820 IFLA_IPOIB_UNSPEC,
1821 IFLA_IPOIB_PKEY,
1822 IFLA_IPOIB_MODE,
1823 IFLA_IPOIB_UMCAST,
1824 __IFLA_IPOIB_MAX
1825};
1826
1827enum {
1828 IPOIB_MODE_DATAGRAM = 0, /* using unreliable datagram QPs */
1829 IPOIB_MODE_CONNECTED = 1, /* using connected QPs */
1830};
1831
1832#define IFLA_IPOIB_MAX (__IFLA_IPOIB_MAX - 1)
1833
1834
1835/* HSR/PRP section, both uses same interface */
1836
1837/* Different redundancy protocols for hsr device */
1838enum {
1839 HSR_PROTOCOL_HSR,
1840 HSR_PROTOCOL_PRP,
1841 HSR_PROTOCOL_MAX,
1842};
1843
1844enum {
1845 IFLA_HSR_UNSPEC,
1846 IFLA_HSR_SLAVE1,
1847 IFLA_HSR_SLAVE2,
1848 IFLA_HSR_MULTICAST_SPEC, /* Last byte of supervision addr */
1849 IFLA_HSR_SUPERVISION_ADDR, /* Supervision frame multicast addr */
1850 IFLA_HSR_SEQ_NR,
1851 IFLA_HSR_VERSION, /* HSR version */
1852 IFLA_HSR_PROTOCOL, /* Indicate different protocol than
1853 * HSR. For example PRP.
1854 */
1855 IFLA_HSR_INTERLINK, /* HSR interlink network device */
1856 __IFLA_HSR_MAX,
1857};
1858
1859#define IFLA_HSR_MAX (__IFLA_HSR_MAX - 1)
1860
1861/* STATS section */
1862
1863struct if_stats_msg {
1864 __u8 family;
1865 __u8 pad1;
1866 __u16 pad2;
1867 __u32 ifindex;
1868 __u32 filter_mask;
1869};
1870
1871/* A stats attribute can be netdev specific or a global stat.
1872 * For netdev stats, lets use the prefix IFLA_STATS_LINK_*
1873 */
1874enum {
1875 IFLA_STATS_UNSPEC, /* also used as 64bit pad attribute */
1876 IFLA_STATS_LINK_64,
1877 IFLA_STATS_LINK_XSTATS,
1878 IFLA_STATS_LINK_XSTATS_SLAVE,
1879 IFLA_STATS_LINK_OFFLOAD_XSTATS,
1880 IFLA_STATS_AF_SPEC,
1881 __IFLA_STATS_MAX,
1882};
1883
1884#define IFLA_STATS_MAX (__IFLA_STATS_MAX - 1)
1885
1886#define IFLA_STATS_FILTER_BIT(ATTR) (1 << (ATTR - 1))
1887
1888enum {
1889 IFLA_STATS_GETSET_UNSPEC,
1890 IFLA_STATS_GET_FILTERS, /* Nest of IFLA_STATS_LINK_xxx, each a u32 with
1891 * a filter mask for the corresponding group.
1892 */
1893 IFLA_STATS_SET_OFFLOAD_XSTATS_L3_STATS, /* 0 or 1 as u8 */
1894 __IFLA_STATS_GETSET_MAX,
1895};
1896
1897#define IFLA_STATS_GETSET_MAX (__IFLA_STATS_GETSET_MAX - 1)
1898
1899/* These are embedded into IFLA_STATS_LINK_XSTATS:
1900 * [IFLA_STATS_LINK_XSTATS]
1901 * -> [LINK_XSTATS_TYPE_xxx]
1902 * -> [rtnl link type specific attributes]
1903 */
1904enum {
1905 LINK_XSTATS_TYPE_UNSPEC,
1906 LINK_XSTATS_TYPE_BRIDGE,
1907 LINK_XSTATS_TYPE_BOND,
1908 __LINK_XSTATS_TYPE_MAX
1909};
1910#define LINK_XSTATS_TYPE_MAX (__LINK_XSTATS_TYPE_MAX - 1)
1911
1912/* These are stats embedded into IFLA_STATS_LINK_OFFLOAD_XSTATS */
1913enum {
1914 IFLA_OFFLOAD_XSTATS_UNSPEC,
1915 IFLA_OFFLOAD_XSTATS_CPU_HIT, /* struct rtnl_link_stats64 */
1916 IFLA_OFFLOAD_XSTATS_HW_S_INFO, /* HW stats info. A nest */
1917 IFLA_OFFLOAD_XSTATS_L3_STATS, /* struct rtnl_hw_stats64 */
1918 __IFLA_OFFLOAD_XSTATS_MAX
1919};
1920#define IFLA_OFFLOAD_XSTATS_MAX (__IFLA_OFFLOAD_XSTATS_MAX - 1)
1921
1922enum {
1923 IFLA_OFFLOAD_XSTATS_HW_S_INFO_UNSPEC,
1924 IFLA_OFFLOAD_XSTATS_HW_S_INFO_REQUEST, /* u8 */
1925 IFLA_OFFLOAD_XSTATS_HW_S_INFO_USED, /* u8 */
1926 __IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX,
1927};
1928#define IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX \
1929 (__IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX - 1)
1930
1931/* XDP section */
1932
1933#define XDP_FLAGS_UPDATE_IF_NOEXIST (1U << 0)
1934#define XDP_FLAGS_SKB_MODE (1U << 1)
1935#define XDP_FLAGS_DRV_MODE (1U << 2)
1936#define XDP_FLAGS_HW_MODE (1U << 3)
1937#define XDP_FLAGS_REPLACE (1U << 4)
1938#define XDP_FLAGS_MODES (XDP_FLAGS_SKB_MODE | \
1939 XDP_FLAGS_DRV_MODE | \
1940 XDP_FLAGS_HW_MODE)
1941#define XDP_FLAGS_MASK (XDP_FLAGS_UPDATE_IF_NOEXIST | \
1942 XDP_FLAGS_MODES | XDP_FLAGS_REPLACE)
1943
1944/* These are stored into IFLA_XDP_ATTACHED on dump. */
1945enum {
1946 XDP_ATTACHED_NONE = 0,
1947 XDP_ATTACHED_DRV,
1948 XDP_ATTACHED_SKB,
1949 XDP_ATTACHED_HW,
1950 XDP_ATTACHED_MULTI,
1951};
1952
1953enum {
1954 IFLA_XDP_UNSPEC,
1955 IFLA_XDP_FD,
1956 IFLA_XDP_ATTACHED,
1957 IFLA_XDP_FLAGS,
1958 IFLA_XDP_PROG_ID,
1959 IFLA_XDP_DRV_PROG_ID,
1960 IFLA_XDP_SKB_PROG_ID,
1961 IFLA_XDP_HW_PROG_ID,
1962 IFLA_XDP_EXPECTED_FD,
1963 __IFLA_XDP_MAX,
1964};
1965
1966#define IFLA_XDP_MAX (__IFLA_XDP_MAX - 1)
1967
1968enum {
1969 IFLA_EVENT_NONE,
1970 IFLA_EVENT_REBOOT, /* internal reset / reboot */
1971 IFLA_EVENT_FEATURES, /* change in offload features */
1972 IFLA_EVENT_BONDING_FAILOVER, /* change in active slave */
1973 IFLA_EVENT_NOTIFY_PEERS, /* re-sent grat. arp/ndisc */
1974 IFLA_EVENT_IGMP_RESEND, /* re-sent IGMP JOIN */
1975 IFLA_EVENT_BONDING_OPTIONS, /* change in bonding options */
1976};
1977
1978/* tun section */
1979
1980enum {
1981 IFLA_TUN_UNSPEC,
1982 IFLA_TUN_OWNER,
1983 IFLA_TUN_GROUP,
1984 IFLA_TUN_TYPE,
1985 IFLA_TUN_PI,
1986 IFLA_TUN_VNET_HDR,
1987 IFLA_TUN_PERSIST,
1988 IFLA_TUN_MULTI_QUEUE,
1989 IFLA_TUN_NUM_QUEUES,
1990 IFLA_TUN_NUM_DISABLED_QUEUES,
1991 __IFLA_TUN_MAX,
1992};
1993
1994#define IFLA_TUN_MAX (__IFLA_TUN_MAX - 1)
1995
1996/* rmnet section */
1997
1998#define RMNET_FLAGS_INGRESS_DEAGGREGATION (1U << 0)
1999#define RMNET_FLAGS_INGRESS_MAP_COMMANDS (1U << 1)
2000#define RMNET_FLAGS_INGRESS_MAP_CKSUMV4 (1U << 2)
2001#define RMNET_FLAGS_EGRESS_MAP_CKSUMV4 (1U << 3)
2002#define RMNET_FLAGS_INGRESS_MAP_CKSUMV5 (1U << 4)
2003#define RMNET_FLAGS_EGRESS_MAP_CKSUMV5 (1U << 5)
2004
2005enum {
2006 IFLA_RMNET_UNSPEC,
2007 IFLA_RMNET_MUX_ID,
2008 IFLA_RMNET_FLAGS,
2009 __IFLA_RMNET_MAX,
2010};
2011
2012#define IFLA_RMNET_MAX (__IFLA_RMNET_MAX - 1)
2013
2014struct ifla_rmnet_flags {
2015 __u32 flags;
2016 __u32 mask;
2017};
2018
2019/* MCTP section */
2020
2021enum {
2022 IFLA_MCTP_UNSPEC,
2023 IFLA_MCTP_NET,
2024 IFLA_MCTP_PHYS_BINDING,
2025 __IFLA_MCTP_MAX,
2026};
2027
2028#define IFLA_MCTP_MAX (__IFLA_MCTP_MAX - 1)
2029
2030/* DSA section */
2031
2032enum {
2033 IFLA_DSA_UNSPEC,
2034 IFLA_DSA_CONDUIT,
2035 /* Deprecated, use IFLA_DSA_CONDUIT instead */
2036 IFLA_DSA_MASTER = IFLA_DSA_CONDUIT,
2037 __IFLA_DSA_MAX,
2038};
2039
2040#define IFLA_DSA_MAX (__IFLA_DSA_MAX - 1)
2041
2042/* OVPN section */
2043
2044enum ovpn_mode {
2045 OVPN_MODE_P2P,
2046 OVPN_MODE_MP,
2047};
2048
2049enum {
2050 IFLA_OVPN_UNSPEC,
2051 IFLA_OVPN_MODE,
2052 __IFLA_OVPN_MAX,
2053};
2054
2055#define IFLA_OVPN_MAX (__IFLA_OVPN_MAX - 1)
2056
2057#endif /* _UAPI_LINUX_IF_LINK_H */