Lines Matching +full:port +full:- +full:number

1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
43 * struct rtnl_link_stats64 - The main device statistics structure.
45 * @rx_packets: Number of good packets received by the interface.
50 * @tx_packets: Number of packets successfully transmitted.
56 * @rx_bytes: Number of good received bytes, corresponding to @rx_packets.
61 * @tx_bytes: Number of good transmitted bytes, corresponding to @tx_packets.
66 * @rx_errors: Total number of bad packets received on this network device.
71 * @tx_errors: Total number of transmit problems.
76 * @rx_dropped: Number of packets received but not processed,
83 * @tx_dropped: Number of packets dropped on their way to transmission,
93 * - 30.3.1.1.21 aMulticastFramesReceivedOK
95 * @collisions: Number of collisions during packet transmissions.
97 * @rx_length_errors: Number of packets dropped due to invalid length.
103 * - 30.3.1.1.23 aInRangeLengthErrors
104 * - 30.3.1.1.24 aOutOfRangeLengthField
105 * - 30.3.1.1.25 aFrameTooLongErrors
111 * not correspond one-to-one with dropped packets.
113 * The recommended interpretation for high speed interfaces is -
114 * number of packets dropped because they did not fit into buffers
126 * @rx_crc_errors: Number of packets received with a CRC error.
131 * - 30.3.1.1.6 aFrameCheckSequenceErrors
138 * - 30.3.1.1.7 aAlignmentErrors
144 * not correspond one-to-one with dropped packets.
155 * Counts number of packets dropped by the device due to lack
165 * For IEEE 802.3 devices capable of half-duplex operation this counter
168 * - 30.3.1.1.11 aFramesAbortedDueToXSColls
173 * @tx_carrier_errors: Number of frame transmission errors due to loss
179 * - 30.3.1.1.13 aCarrierSenseErrors
181 * @tx_fifo_errors: Number of frame transmission errors due to device
187 * @tx_heartbeat_errors: Number of Heartbeat / SQE Test errors for
188 * old half-duplex Ethernet.
193 * - 30.3.2.1.4 aSQETestErrors
195 * @tx_window_errors: Number of frame transmission errors due
196 * to late collisions (for Ethernet - after the first 64B of transmission).
201 * - 30.3.1.1.10 aLateCollisions
203 * @rx_compressed: Number of correctly received compressed packets.
207 * @tx_compressed: Number of transmitted compressed packets.
211 * @rx_nohandler: Number of packets received on the interface
215 * @rx_otherhost_dropped: Number of packets dropped due to mismatch
253 /* Subset of link stats useful for in-HW collection. Meaning of the fields is as
275 __u8 port; member
282 * number as type and create its own attribute structure in it.
311 IFLA_WIRELESS, /* Wireless Extension event - see wireless.h */
327 IFLA_NUM_VF, /* Number of VFs if device is SR-IOV PF */
385 #define IFLA_MAX (__IFLA_MAX - 1)
393 IFLA_PROTO_DOWN_REASON_MAX = __IFLA_PROTO_DOWN_REASON_CNT - 1
408 #define IFLA_INET_MAX (__IFLA_INET_MAX - 1)
420 - Combination IFF_BROADCAST|IFF_POINTOPOINT is invalid
421 - If neither of these three flags are set;
424 - IFF_MULTICAST does not mean anything special:
425 multicasts can be used on all not-NBMA links.
454 #define IFLA_INET6_MAX (__IFLA_INET6_MAX - 1)
501 * * 0 - entry never ages (all permanent)
502 * * 1 - entry disappears (no persistence)
533 * decide whether to forward incoming frames destined to link-local
537 * link-local frames coming on this port.
546 * The bridge root port, read only.
571 * The address must be a link-local address in standard Ethernet MAC address
583 * * 0 - disabled.
584 * * 1 - automatic (queried).
585 * * 2 - permanently enabled.
620 * The Last Member Query Count is the number of Group-Specific Queries
622 * Member Query Count is also the number of Group-and-Source-Specific
629 * The Startup Query Count is the number of Queries sent out on startup,
636 * Group-Specific Queries sent in response to Leave Group messages, and
637 * is also the amount of time between Group-Specific Query messages.
690 * VLAN ID applied to untagged and priority-tagged incoming packets.
694 * not accept VLAN-untagged traffic.
701 * (*IFLA_BR_VLAN_STATS_ENABLED* == 0) per-VLAN stats accounting.
724 * (*IFLA_BR_VLAN_STATS_PER_PORT* == 0) per-VLAN per-port stats accounting.
725 * Can be changed only when there are no port VLANs configured.
738 * The number of dynamically learned FDB entries for the current bridge,
742 * Set the number of max dynamically learned FDB entries for the current
799 #define IFLA_BR_MAX (__IFLA_BR_MAX - 1)
810 * Controls whether traffic may be sent back out of the port on which it
812 * used to support basic VEPA (Virtual Ethernet Port Aggregator)
814 * not forward traffic back out of the receiving port.
822 * DOC: Bridge port enum definition
825 * The operation state of the port. Here are the valid values.
827 * * 0 - port is in STP *DISABLED* state. Make this port completely
829 * to disable STP on an untrusted port, like a leaf virtual device.
830 * The traffic forwarding is also stopped on this port.
831 * * 1 - port is in STP *LISTENING* state. Only valid if STP is enabled
832 * on the bridge. In this state the port listens for STP BPDUs and
834 * * 2 - port is in STP *LEARNING* state. Only valid if STP is enabled on
835 * the bridge. In this state the port will accept traffic only for the
837 * * 3 - port is in STP *FORWARDING* state. Port is fully active.
838 * * 4 - port is in STP *BLOCKING* state. Only valid if STP is enabled on
840 * In this state, port will only process STP BPDUs.
843 * The STP port priority. The valid values are between 0 and 255.
846 * The STP path cost of the port. The valid values are between 1 and 65535.
849 * Set the bridge port mode. See *BRIDGE_MODE_HAIRPIN* for more details.
852 * Controls whether STP BPDUs will be processed by the bridge port. By
854 * flag on will disable the bridge port if a STP BPDU packet is received.
857 * may send BPDU on a port and cause network failure. Setting *guard on*
858 * will detect and stop this by disabling the port. The port will be
862 * Controls whether a given port is allowed to become a root port or not.
865 * This feature is also called root port guard. If BPDU is received from a
866 * leaf (edge) port, it should not be elected as root port. This could
872 * forwarding on a port that receives an IGMP Leave message. It is only used
876 * Controls whether a given port will learn *source* MAC addresses from
883 * be flooded towards this port. By default this flag is on.
886 * Enable proxy ARP on this port.
889 * Controls whether a given port will sync MAC addresses learned on device
890 * port to bridge FDB.
893 * Enable proxy ARP on this port which meets extended requirements by
922 * Configure the port's multicast router presence. A port with
926 * * 0 disable multicast routers on this port
928 * * 2 permanently enable multicast traffic forwarding on this port
929 * * 3 enable multicast routers temporarily on this port, not depending
935 * Controls whether a given port will flood multicast traffic for which
939 * Controls whether a given port will replicate packets using unicast
958 * Delivery of STA-to-STA IP multicast is made possible again by enabling
959 * and utilizing the bridge hairpin mode, which considers the incoming port
960 * as a potential outgoing port, too (see *BRIDGE_MODE_HAIRPIN* option).
965 * Controls whether vlan to tunnel mapping is enabled on the port.
969 * Controls flooding of broadcast traffic on the given port. By default
974 * decide whether to forward incoming frames destined to link-local
976 * to 0, which means the bridge does not forward any link-local frames
977 * coming on this port).
981 * is enabled on the port. By default this flag is off.
984 * Controls whether a given port will be isolated, which means it will be
985 * able to communicate with non-isolated ports only. By default this
989 * Set a backup port. If the port loses carrier all traffic will be
990 * redirected to the configured backup port. Set the value to 0 to disable
998 * The number of per-port EHT hosts limit. The default value is 512.
1002 * The current number of tracked hosts, read only.
1005 * Controls whether a port will be locked, meaning that hosts behind the
1006 * port will not be able to communicate through the port unless an FDB
1013 * FDB based on link-local (EAPOL) traffic received on the port.
1016 * Controls whether a port will use MAC Authentication Bypass (MAB), a
1018 * port, without using 802.1X authentication. Packets with an unknown source
1019 * MAC address generates a "locked" FDB entry on the incoming bridge port.
1033 * Sets the maximum number of MDB entries that can be registered for a
1034 * given port. Attempts to register more MDB entries at the port than this
1041 * enabled for a given port. By default this flag is off.
1044 * is enabled for a given port.
1048 * backup port that has VLAN tunnel mapping enabled (via the
1059 IFLA_BRPORT_PROTECT, /* root port protection */
1065 IFLA_BRPORT_PROXYARP_WIFI, /* proxy ARP for Wi-Fi */
1100 #define IFLA_BRPORT_MAX (__IFLA_BRPORT_MAX - 1)
1119 #define IFLA_INFO_MAX (__IFLA_INFO_MAX - 1)
1133 #define IFLA_VLAN_MAX (__IFLA_VLAN_MAX - 1)
1146 #define IFLA_VLAN_QOS_MAX (__IFLA_VLAN_QOS_MAX - 1)
1168 #define IFLA_MACVLAN_MAX (__IFLA_MACVLAN_MAX - 1)
1195 #define IFLA_VRF_MAX (__IFLA_VRF_MAX - 1)
1203 #define IFLA_VRF_PORT_MAX (__IFLA_VRF_PORT_MAX - 1)
1226 #define IFLA_MACSEC_MAX (__IFLA_MACSEC_MAX - 1)
1237 #define IFLA_XFRM_MAX (__IFLA_XFRM_MAX - 1)
1244 MACSEC_VALIDATE_MAX = __MACSEC_VALIDATE_END - 1,
1252 MACSEC_OFFLOAD_MAX = __MACSEC_OFFLOAD_END - 1,
1263 #define IFLA_IPVLAN_MAX (__IFLA_IPVLAN_MAX - 1)
1285 NETKIT_NEXT = -1,
1296 /* NETKIT_SCRUB_NONE leaves clearing skb->{mark,priority} up to
1300 * NETKIT_SCRUB_DEFAULT zeroes skb->{mark,priority} fields before
1322 #define IFLA_NETKIT_MAX (__IFLA_NETKIT_MAX - 1)
1345 #define VNIFILTER_ENTRY_STATS_MAX (__VNIFILTER_ENTRY_STATS_MAX - 1)
1356 #define VXLAN_VNIFILTER_ENTRY_MAX (__VXLAN_VNIFILTER_ENTRY_MAX - 1)
1363 #define VXLAN_VNIFILTER_MAX (__VXLAN_VNIFILTER_MAX - 1)
1376 IFLA_VXLAN_PORT_RANGE, /* source port */
1381 IFLA_VXLAN_PORT, /* destination port */
1401 #define IFLA_VXLAN_MAX (__IFLA_VXLAN_MAX - 1)
1413 VXLAN_DF_MAX = __VXLAN_DF_END - 1,
1420 VXLAN_LABEL_MAX = __VXLAN_LABEL_END - 1,
1430 IFLA_GENEVE_PORT, /* destination port */
1442 #define IFLA_GENEVE_MAX (__IFLA_GENEVE_MAX - 1)
1449 GENEVE_DF_MAX = __GENEVE_DF_END - 1,
1462 #define IFLA_BAREUDP_MAX (__IFLA_BAREUDP_MAX - 1)
1470 #define IFLA_PPP_MAX (__IFLA_PPP_MAX - 1)
1491 #define IFLA_GTP_MAX (__IFLA_GTP_MAX - 1)
1532 #define IFLA_BOND_MAX (__IFLA_BOND_MAX - 1)
1544 #define IFLA_BOND_AD_INFO_MAX (__IFLA_BOND_AD_INFO_MAX - 1)
1560 #define IFLA_BOND_SLAVE_MAX (__IFLA_BOND_SLAVE_MAX - 1)
1562 /* SR-IOV virtual function management section */
1570 #define IFLA_VF_INFO_MAX (__IFLA_VF_INFO_MAX - 1)
1586 IFLA_VF_IB_PORT_GUID, /* VF Infiniband port GUID */
1592 #define IFLA_VF_MAX (__IFLA_VF_MAX - 1)
1605 __u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
1615 #define IFLA_VF_VLAN_INFO_MAX (__IFLA_VF_VLAN_INFO_MAX - 1)
1620 __u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
1676 #define IFLA_VF_STATS_MAX (__IFLA_VF_STATS_MAX - 1)
1704 #define IFLA_VF_PORT_MAX (__IFLA_VF_PORT_MAX - 1)
1710 IFLA_PORT_VSI_TYPE, /* 802.1Qbg (pre-)standard VDP */
1718 #define IFLA_PORT_MAX (__IFLA_PORT_MAX - 1)
1722 #define PORT_SELF_VF -1
1739 /* 0x08-0xFF reserved for future VDP use */
1771 #define IFLA_IPOIB_MAX (__IFLA_IPOIB_MAX - 1)
1798 #define IFLA_HSR_MAX (__IFLA_HSR_MAX - 1)
1823 #define IFLA_STATS_MAX (__IFLA_STATS_MAX - 1)
1825 #define IFLA_STATS_FILTER_BIT(ATTR) (1 << (ATTR - 1))
1836 #define IFLA_STATS_GETSET_MAX (__IFLA_STATS_GETSET_MAX - 1)
1840 * -> [LINK_XSTATS_TYPE_xxx]
1841 * -> [rtnl link type specific attributes]
1849 #define LINK_XSTATS_TYPE_MAX (__LINK_XSTATS_TYPE_MAX - 1)
1859 #define IFLA_OFFLOAD_XSTATS_MAX (__IFLA_OFFLOAD_XSTATS_MAX - 1)
1868 (__IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX - 1)
1905 #define IFLA_XDP_MAX (__IFLA_XDP_MAX - 1)
1912 IFLA_EVENT_NOTIFY_PEERS, /* re-sent grat. arp/ndisc */
1913 IFLA_EVENT_IGMP_RESEND, /* re-sent IGMP JOIN */
1933 #define IFLA_TUN_MAX (__IFLA_TUN_MAX - 1)
1951 #define IFLA_RMNET_MAX (__IFLA_RMNET_MAX - 1)
1966 #define IFLA_MCTP_MAX (__IFLA_MCTP_MAX - 1)
1978 #define IFLA_DSA_MAX (__IFLA_DSA_MAX - 1)