xref: /linux/include/net/dropreason-core.h (revision c532de5a67a70f8533d495f8f2aaa9a0491c3ad0)
1 /* SPDX-License-Identifier: GPL-2.0-or-later */
2 
3 #ifndef _LINUX_DROPREASON_CORE_H
4 #define _LINUX_DROPREASON_CORE_H
5 
6 #define DEFINE_DROP_REASON(FN, FNe)	\
7 	FN(NOT_SPECIFIED)		\
8 	FN(NO_SOCKET)			\
9 	FN(PKT_TOO_SMALL)		\
10 	FN(TCP_CSUM)			\
11 	FN(SOCKET_FILTER)		\
12 	FN(UDP_CSUM)			\
13 	FN(NETFILTER_DROP)		\
14 	FN(OTHERHOST)			\
15 	FN(IP_CSUM)			\
16 	FN(IP_INHDR)			\
17 	FN(IP_RPFILTER)			\
18 	FN(UNICAST_IN_L2_MULTICAST)	\
19 	FN(XFRM_POLICY)			\
20 	FN(IP_NOPROTO)			\
21 	FN(SOCKET_RCVBUFF)		\
22 	FN(PROTO_MEM)			\
23 	FN(TCP_AUTH_HDR)		\
24 	FN(TCP_MD5NOTFOUND)		\
25 	FN(TCP_MD5UNEXPECTED)		\
26 	FN(TCP_MD5FAILURE)		\
27 	FN(TCP_AONOTFOUND)		\
28 	FN(TCP_AOUNEXPECTED)		\
29 	FN(TCP_AOKEYNOTFOUND)		\
30 	FN(TCP_AOFAILURE)		\
31 	FN(SOCKET_BACKLOG)		\
32 	FN(TCP_FLAGS)			\
33 	FN(TCP_ABORT_ON_DATA)		\
34 	FN(TCP_ZEROWINDOW)		\
35 	FN(TCP_OLD_DATA)		\
36 	FN(TCP_OVERWINDOW)		\
37 	FN(TCP_OFOMERGE)		\
38 	FN(TCP_RFC7323_PAWS)		\
39 	FN(TCP_OLD_SEQUENCE)		\
40 	FN(TCP_INVALID_SEQUENCE)	\
41 	FN(TCP_INVALID_ACK_SEQUENCE)	\
42 	FN(TCP_RESET)			\
43 	FN(TCP_INVALID_SYN)		\
44 	FN(TCP_CLOSE)			\
45 	FN(TCP_FASTOPEN)		\
46 	FN(TCP_OLD_ACK)			\
47 	FN(TCP_TOO_OLD_ACK)		\
48 	FN(TCP_ACK_UNSENT_DATA)		\
49 	FN(TCP_OFO_QUEUE_PRUNE)		\
50 	FN(TCP_OFO_DROP)		\
51 	FN(IP_OUTNOROUTES)		\
52 	FN(BPF_CGROUP_EGRESS)		\
53 	FN(IPV6DISABLED)		\
54 	FN(NEIGH_CREATEFAIL)		\
55 	FN(NEIGH_FAILED)		\
56 	FN(NEIGH_QUEUEFULL)		\
57 	FN(NEIGH_DEAD)			\
58 	FN(TC_EGRESS)			\
59 	FN(SECURITY_HOOK)		\
60 	FN(QDISC_DROP)			\
61 	FN(CPU_BACKLOG)			\
62 	FN(XDP)				\
63 	FN(TC_INGRESS)			\
64 	FN(UNHANDLED_PROTO)		\
65 	FN(SKB_CSUM)			\
66 	FN(SKB_GSO_SEG)			\
67 	FN(SKB_UCOPY_FAULT)		\
68 	FN(DEV_HDR)			\
69 	FN(DEV_READY)			\
70 	FN(FULL_RING)			\
71 	FN(NOMEM)			\
72 	FN(HDR_TRUNC)			\
73 	FN(TAP_FILTER)			\
74 	FN(TAP_TXFILTER)		\
75 	FN(ICMP_CSUM)			\
76 	FN(INVALID_PROTO)		\
77 	FN(IP_INADDRERRORS)		\
78 	FN(IP_INNOROUTES)		\
79 	FN(PKT_TOO_BIG)			\
80 	FN(DUP_FRAG)			\
81 	FN(FRAG_REASM_TIMEOUT)		\
82 	FN(FRAG_TOO_FAR)		\
83 	FN(TCP_MINTTL)			\
84 	FN(IPV6_BAD_EXTHDR)		\
85 	FN(IPV6_NDISC_FRAG)		\
86 	FN(IPV6_NDISC_HOP_LIMIT)	\
87 	FN(IPV6_NDISC_BAD_CODE)		\
88 	FN(IPV6_NDISC_BAD_OPTIONS)	\
89 	FN(IPV6_NDISC_NS_OTHERHOST)	\
90 	FN(QUEUE_PURGE)			\
91 	FN(TC_COOKIE_ERROR)		\
92 	FN(PACKET_SOCK_ERROR)		\
93 	FN(TC_CHAIN_NOTFOUND)		\
94 	FN(TC_RECLASSIFY_LOOP)		\
95 	FNe(MAX)
96 
97 /**
98  * enum skb_drop_reason - the reasons of skb drops
99  *
100  * The reason of skb drop, which is used in kfree_skb_reason().
101  */
102 enum skb_drop_reason {
103 	/**
104 	 * @SKB_NOT_DROPPED_YET: skb is not dropped yet (used for no-drop case)
105 	 */
106 	SKB_NOT_DROPPED_YET = 0,
107 	/** @SKB_CONSUMED: packet has been consumed */
108 	SKB_CONSUMED,
109 	/** @SKB_DROP_REASON_NOT_SPECIFIED: drop reason is not specified */
110 	SKB_DROP_REASON_NOT_SPECIFIED,
111 	/**
112 	 * @SKB_DROP_REASON_NO_SOCKET: no valid socket that can be used.
113 	 * Reason could be one of three cases:
114 	 * 1) no established/listening socket found during lookup process
115 	 * 2) no valid request socket during 3WHS process
116 	 * 3) no valid child socket during 3WHS process
117 	 */
118 	SKB_DROP_REASON_NO_SOCKET,
119 	/** @SKB_DROP_REASON_PKT_TOO_SMALL: packet size is too small */
120 	SKB_DROP_REASON_PKT_TOO_SMALL,
121 	/** @SKB_DROP_REASON_TCP_CSUM: TCP checksum error */
122 	SKB_DROP_REASON_TCP_CSUM,
123 	/** @SKB_DROP_REASON_SOCKET_FILTER: dropped by socket filter */
124 	SKB_DROP_REASON_SOCKET_FILTER,
125 	/** @SKB_DROP_REASON_UDP_CSUM: UDP checksum error */
126 	SKB_DROP_REASON_UDP_CSUM,
127 	/** @SKB_DROP_REASON_NETFILTER_DROP: dropped by netfilter */
128 	SKB_DROP_REASON_NETFILTER_DROP,
129 	/**
130 	 * @SKB_DROP_REASON_OTHERHOST: packet don't belong to current host
131 	 * (interface is in promisc mode)
132 	 */
133 	SKB_DROP_REASON_OTHERHOST,
134 	/** @SKB_DROP_REASON_IP_CSUM: IP checksum error */
135 	SKB_DROP_REASON_IP_CSUM,
136 	/**
137 	 * @SKB_DROP_REASON_IP_INHDR: there is something wrong with IP header (see
138 	 * IPSTATS_MIB_INHDRERRORS)
139 	 */
140 	SKB_DROP_REASON_IP_INHDR,
141 	/**
142 	 * @SKB_DROP_REASON_IP_RPFILTER: IP rpfilter validate failed. see the
143 	 * document for rp_filter in ip-sysctl.rst for more information
144 	 */
145 	SKB_DROP_REASON_IP_RPFILTER,
146 	/**
147 	 * @SKB_DROP_REASON_UNICAST_IN_L2_MULTICAST: destination address of L2 is
148 	 * multicast, but L3 is unicast.
149 	 */
150 	SKB_DROP_REASON_UNICAST_IN_L2_MULTICAST,
151 	/** @SKB_DROP_REASON_XFRM_POLICY: xfrm policy check failed */
152 	SKB_DROP_REASON_XFRM_POLICY,
153 	/** @SKB_DROP_REASON_IP_NOPROTO: no support for IP protocol */
154 	SKB_DROP_REASON_IP_NOPROTO,
155 	/** @SKB_DROP_REASON_SOCKET_RCVBUFF: socket receive buff is full */
156 	SKB_DROP_REASON_SOCKET_RCVBUFF,
157 	/**
158 	 * @SKB_DROP_REASON_PROTO_MEM: proto memory limitation, such as
159 	 * udp packet drop out of udp_memory_allocated.
160 	 */
161 	SKB_DROP_REASON_PROTO_MEM,
162 	/**
163 	 * @SKB_DROP_REASON_TCP_AUTH_HDR: TCP-MD5 or TCP-AO hashes are met
164 	 * twice or set incorrectly.
165 	 */
166 	SKB_DROP_REASON_TCP_AUTH_HDR,
167 	/**
168 	 * @SKB_DROP_REASON_TCP_MD5NOTFOUND: no MD5 hash and one expected,
169 	 * corresponding to LINUX_MIB_TCPMD5NOTFOUND
170 	 */
171 	SKB_DROP_REASON_TCP_MD5NOTFOUND,
172 	/**
173 	 * @SKB_DROP_REASON_TCP_MD5UNEXPECTED: MD5 hash and we're not expecting
174 	 * one, corresponding to LINUX_MIB_TCPMD5UNEXPECTED
175 	 */
176 	SKB_DROP_REASON_TCP_MD5UNEXPECTED,
177 	/**
178 	 * @SKB_DROP_REASON_TCP_MD5FAILURE: MD5 hash and its wrong, corresponding
179 	 * to LINUX_MIB_TCPMD5FAILURE
180 	 */
181 	SKB_DROP_REASON_TCP_MD5FAILURE,
182 	/**
183 	 * @SKB_DROP_REASON_TCP_AONOTFOUND: no TCP-AO hash and one was expected,
184 	 * corresponding to LINUX_MIB_TCPAOREQUIRED
185 	 */
186 	SKB_DROP_REASON_TCP_AONOTFOUND,
187 	/**
188 	 * @SKB_DROP_REASON_TCP_AOUNEXPECTED: TCP-AO hash is present and it
189 	 * was not expected, corresponding to LINUX_MIB_TCPAOKEYNOTFOUND
190 	 */
191 	SKB_DROP_REASON_TCP_AOUNEXPECTED,
192 	/**
193 	 * @SKB_DROP_REASON_TCP_AOKEYNOTFOUND: TCP-AO key is unknown,
194 	 * corresponding to LINUX_MIB_TCPAOKEYNOTFOUND
195 	 */
196 	SKB_DROP_REASON_TCP_AOKEYNOTFOUND,
197 	/**
198 	 * @SKB_DROP_REASON_TCP_AOFAILURE: TCP-AO hash is wrong,
199 	 * corresponding to LINUX_MIB_TCPAOBAD
200 	 */
201 	SKB_DROP_REASON_TCP_AOFAILURE,
202 	/**
203 	 * @SKB_DROP_REASON_SOCKET_BACKLOG: failed to add skb to socket backlog (
204 	 * see LINUX_MIB_TCPBACKLOGDROP)
205 	 */
206 	SKB_DROP_REASON_SOCKET_BACKLOG,
207 	/** @SKB_DROP_REASON_TCP_FLAGS: TCP flags invalid */
208 	SKB_DROP_REASON_TCP_FLAGS,
209 	/**
210 	 * @SKB_DROP_REASON_TCP_ABORT_ON_DATA: abort on data, corresponding to
211 	 * LINUX_MIB_TCPABORTONDATA
212 	 */
213 	SKB_DROP_REASON_TCP_ABORT_ON_DATA,
214 	/**
215 	 * @SKB_DROP_REASON_TCP_ZEROWINDOW: TCP receive window size is zero,
216 	 * see LINUX_MIB_TCPZEROWINDOWDROP
217 	 */
218 	SKB_DROP_REASON_TCP_ZEROWINDOW,
219 	/**
220 	 * @SKB_DROP_REASON_TCP_OLD_DATA: the TCP data received is already
221 	 * received before (spurious retrans may happened), see
222 	 * LINUX_MIB_DELAYEDACKLOST
223 	 */
224 	SKB_DROP_REASON_TCP_OLD_DATA,
225 	/**
226 	 * @SKB_DROP_REASON_TCP_OVERWINDOW: the TCP data is out of window,
227 	 * the seq of the first byte exceed the right edges of receive
228 	 * window
229 	 */
230 	SKB_DROP_REASON_TCP_OVERWINDOW,
231 	/**
232 	 * @SKB_DROP_REASON_TCP_OFOMERGE: the data of skb is already in the ofo
233 	 * queue, corresponding to LINUX_MIB_TCPOFOMERGE
234 	 */
235 	SKB_DROP_REASON_TCP_OFOMERGE,
236 	/**
237 	 * @SKB_DROP_REASON_TCP_RFC7323_PAWS: PAWS check, corresponding to
238 	 * LINUX_MIB_PAWSESTABREJECTED, LINUX_MIB_PAWSACTIVEREJECTED
239 	 */
240 	SKB_DROP_REASON_TCP_RFC7323_PAWS,
241 	/** @SKB_DROP_REASON_TCP_OLD_SEQUENCE: Old SEQ field (duplicate packet) */
242 	SKB_DROP_REASON_TCP_OLD_SEQUENCE,
243 	/** @SKB_DROP_REASON_TCP_INVALID_SEQUENCE: Not acceptable SEQ field */
244 	SKB_DROP_REASON_TCP_INVALID_SEQUENCE,
245 	/**
246 	 * @SKB_DROP_REASON_TCP_INVALID_ACK_SEQUENCE: Not acceptable ACK SEQ
247 	 * field because ack sequence is not in the window between snd_una
248 	 * and snd_nxt
249 	 */
250 	SKB_DROP_REASON_TCP_INVALID_ACK_SEQUENCE,
251 	/** @SKB_DROP_REASON_TCP_RESET: Invalid RST packet */
252 	SKB_DROP_REASON_TCP_RESET,
253 	/**
254 	 * @SKB_DROP_REASON_TCP_INVALID_SYN: Incoming packet has unexpected
255 	 * SYN flag
256 	 */
257 	SKB_DROP_REASON_TCP_INVALID_SYN,
258 	/** @SKB_DROP_REASON_TCP_CLOSE: TCP socket in CLOSE state */
259 	SKB_DROP_REASON_TCP_CLOSE,
260 	/** @SKB_DROP_REASON_TCP_FASTOPEN: dropped by FASTOPEN request socket */
261 	SKB_DROP_REASON_TCP_FASTOPEN,
262 	/** @SKB_DROP_REASON_TCP_OLD_ACK: TCP ACK is old, but in window */
263 	SKB_DROP_REASON_TCP_OLD_ACK,
264 	/** @SKB_DROP_REASON_TCP_TOO_OLD_ACK: TCP ACK is too old */
265 	SKB_DROP_REASON_TCP_TOO_OLD_ACK,
266 	/**
267 	 * @SKB_DROP_REASON_TCP_ACK_UNSENT_DATA: TCP ACK for data we haven't
268 	 * sent yet
269 	 */
270 	SKB_DROP_REASON_TCP_ACK_UNSENT_DATA,
271 	/** @SKB_DROP_REASON_TCP_OFO_QUEUE_PRUNE: pruned from TCP OFO queue */
272 	SKB_DROP_REASON_TCP_OFO_QUEUE_PRUNE,
273 	/** @SKB_DROP_REASON_TCP_OFO_DROP: data already in receive queue */
274 	SKB_DROP_REASON_TCP_OFO_DROP,
275 	/** @SKB_DROP_REASON_IP_OUTNOROUTES: route lookup failed */
276 	SKB_DROP_REASON_IP_OUTNOROUTES,
277 	/**
278 	 * @SKB_DROP_REASON_BPF_CGROUP_EGRESS: dropped by BPF_PROG_TYPE_CGROUP_SKB
279 	 * eBPF program
280 	 */
281 	SKB_DROP_REASON_BPF_CGROUP_EGRESS,
282 	/** @SKB_DROP_REASON_IPV6DISABLED: IPv6 is disabled on the device */
283 	SKB_DROP_REASON_IPV6DISABLED,
284 	/** @SKB_DROP_REASON_NEIGH_CREATEFAIL: failed to create neigh entry */
285 	SKB_DROP_REASON_NEIGH_CREATEFAIL,
286 	/** @SKB_DROP_REASON_NEIGH_FAILED: neigh entry in failed state */
287 	SKB_DROP_REASON_NEIGH_FAILED,
288 	/** @SKB_DROP_REASON_NEIGH_QUEUEFULL: arp_queue for neigh entry is full */
289 	SKB_DROP_REASON_NEIGH_QUEUEFULL,
290 	/** @SKB_DROP_REASON_NEIGH_DEAD: neigh entry is dead */
291 	SKB_DROP_REASON_NEIGH_DEAD,
292 	/** @SKB_DROP_REASON_TC_EGRESS: dropped in TC egress HOOK */
293 	SKB_DROP_REASON_TC_EGRESS,
294 	/** @SKB_DROP_REASON_SECURITY_HOOK: dropped due to security HOOK */
295 	SKB_DROP_REASON_SECURITY_HOOK,
296 	/**
297 	 * @SKB_DROP_REASON_QDISC_DROP: dropped by qdisc when packet outputting (
298 	 * failed to enqueue to current qdisc)
299 	 */
300 	SKB_DROP_REASON_QDISC_DROP,
301 	/**
302 	 * @SKB_DROP_REASON_CPU_BACKLOG: failed to enqueue the skb to the per CPU
303 	 * backlog queue. This can be caused by backlog queue full (see
304 	 * netdev_max_backlog in net.rst) or RPS flow limit
305 	 */
306 	SKB_DROP_REASON_CPU_BACKLOG,
307 	/** @SKB_DROP_REASON_XDP: dropped by XDP in input path */
308 	SKB_DROP_REASON_XDP,
309 	/** @SKB_DROP_REASON_TC_INGRESS: dropped in TC ingress HOOK */
310 	SKB_DROP_REASON_TC_INGRESS,
311 	/** @SKB_DROP_REASON_UNHANDLED_PROTO: protocol not implemented or not supported */
312 	SKB_DROP_REASON_UNHANDLED_PROTO,
313 	/** @SKB_DROP_REASON_SKB_CSUM: sk_buff checksum computation error */
314 	SKB_DROP_REASON_SKB_CSUM,
315 	/** @SKB_DROP_REASON_SKB_GSO_SEG: gso segmentation error */
316 	SKB_DROP_REASON_SKB_GSO_SEG,
317 	/**
318 	 * @SKB_DROP_REASON_SKB_UCOPY_FAULT: failed to copy data from user space,
319 	 * e.g., via zerocopy_sg_from_iter() or skb_orphan_frags_rx()
320 	 */
321 	SKB_DROP_REASON_SKB_UCOPY_FAULT,
322 	/** @SKB_DROP_REASON_DEV_HDR: device driver specific header/metadata is invalid */
323 	SKB_DROP_REASON_DEV_HDR,
324 	/**
325 	 * @SKB_DROP_REASON_DEV_READY: the device is not ready to xmit/recv due to
326 	 * any of its data structure that is not up/ready/initialized,
327 	 * e.g., the IFF_UP is not set, or driver specific tun->tfiles[txq]
328 	 * is not initialized
329 	 */
330 	SKB_DROP_REASON_DEV_READY,
331 	/** @SKB_DROP_REASON_FULL_RING: ring buffer is full */
332 	SKB_DROP_REASON_FULL_RING,
333 	/** @SKB_DROP_REASON_NOMEM: error due to OOM */
334 	SKB_DROP_REASON_NOMEM,
335 	/**
336 	 * @SKB_DROP_REASON_HDR_TRUNC: failed to trunc/extract the header from
337 	 * networking data, e.g., failed to pull the protocol header from
338 	 * frags via pskb_may_pull()
339 	 */
340 	SKB_DROP_REASON_HDR_TRUNC,
341 	/**
342 	 * @SKB_DROP_REASON_TAP_FILTER: dropped by (ebpf) filter directly attached
343 	 * to tun/tap, e.g., via TUNSETFILTEREBPF
344 	 */
345 	SKB_DROP_REASON_TAP_FILTER,
346 	/**
347 	 * @SKB_DROP_REASON_TAP_TXFILTER: dropped by tx filter implemented at
348 	 * tun/tap, e.g., check_filter()
349 	 */
350 	SKB_DROP_REASON_TAP_TXFILTER,
351 	/** @SKB_DROP_REASON_ICMP_CSUM: ICMP checksum error */
352 	SKB_DROP_REASON_ICMP_CSUM,
353 	/**
354 	 * @SKB_DROP_REASON_INVALID_PROTO: the packet doesn't follow RFC 2211,
355 	 * such as a broadcasts ICMP_TIMESTAMP
356 	 */
357 	SKB_DROP_REASON_INVALID_PROTO,
358 	/**
359 	 * @SKB_DROP_REASON_IP_INADDRERRORS: host unreachable, corresponding to
360 	 * IPSTATS_MIB_INADDRERRORS
361 	 */
362 	SKB_DROP_REASON_IP_INADDRERRORS,
363 	/**
364 	 * @SKB_DROP_REASON_IP_INNOROUTES: network unreachable, corresponding to
365 	 * IPSTATS_MIB_INADDRERRORS
366 	 */
367 	SKB_DROP_REASON_IP_INNOROUTES,
368 	/**
369 	 * @SKB_DROP_REASON_PKT_TOO_BIG: packet size is too big (maybe exceed the
370 	 * MTU)
371 	 */
372 	SKB_DROP_REASON_PKT_TOO_BIG,
373 	/** @SKB_DROP_REASON_DUP_FRAG: duplicate fragment */
374 	SKB_DROP_REASON_DUP_FRAG,
375 	/** @SKB_DROP_REASON_FRAG_REASM_TIMEOUT: fragment reassembly timeout */
376 	SKB_DROP_REASON_FRAG_REASM_TIMEOUT,
377 	/**
378 	 * @SKB_DROP_REASON_FRAG_TOO_FAR: ipv4 fragment too far.
379 	 * (/proc/sys/net/ipv4/ipfrag_max_dist)
380 	 */
381 	SKB_DROP_REASON_FRAG_TOO_FAR,
382 	/**
383 	 * @SKB_DROP_REASON_TCP_MINTTL: ipv4 ttl or ipv6 hoplimit below
384 	 * the threshold (IP_MINTTL or IPV6_MINHOPCOUNT).
385 	 */
386 	SKB_DROP_REASON_TCP_MINTTL,
387 	/** @SKB_DROP_REASON_IPV6_BAD_EXTHDR: Bad IPv6 extension header. */
388 	SKB_DROP_REASON_IPV6_BAD_EXTHDR,
389 	/** @SKB_DROP_REASON_IPV6_NDISC_FRAG: invalid frag (suppress_frag_ndisc). */
390 	SKB_DROP_REASON_IPV6_NDISC_FRAG,
391 	/** @SKB_DROP_REASON_IPV6_NDISC_HOP_LIMIT: invalid hop limit. */
392 	SKB_DROP_REASON_IPV6_NDISC_HOP_LIMIT,
393 	/** @SKB_DROP_REASON_IPV6_NDISC_BAD_CODE: invalid NDISC icmp6 code. */
394 	SKB_DROP_REASON_IPV6_NDISC_BAD_CODE,
395 	/** @SKB_DROP_REASON_IPV6_NDISC_BAD_OPTIONS: invalid NDISC options. */
396 	SKB_DROP_REASON_IPV6_NDISC_BAD_OPTIONS,
397 	/**
398 	 * @SKB_DROP_REASON_IPV6_NDISC_NS_OTHERHOST: NEIGHBOUR SOLICITATION
399 	 * for another host.
400 	 */
401 	SKB_DROP_REASON_IPV6_NDISC_NS_OTHERHOST,
402 	/** @SKB_DROP_REASON_QUEUE_PURGE: bulk free. */
403 	SKB_DROP_REASON_QUEUE_PURGE,
404 	/**
405 	 * @SKB_DROP_REASON_TC_COOKIE_ERROR: An error occurred whilst
406 	 * processing a tc ext cookie.
407 	 */
408 	SKB_DROP_REASON_TC_COOKIE_ERROR,
409 	/**
410 	 * @SKB_DROP_REASON_PACKET_SOCK_ERROR: generic packet socket errors
411 	 * after its filter matches an incoming packet.
412 	 */
413 	SKB_DROP_REASON_PACKET_SOCK_ERROR,
414 	/** @SKB_DROP_REASON_TC_CHAIN_NOTFOUND: tc chain lookup failed. */
415 	SKB_DROP_REASON_TC_CHAIN_NOTFOUND,
416 	/**
417 	 * @SKB_DROP_REASON_TC_RECLASSIFY_LOOP: tc exceeded max reclassify loop
418 	 * iterations.
419 	 */
420 	SKB_DROP_REASON_TC_RECLASSIFY_LOOP,
421 	/**
422 	 * @SKB_DROP_REASON_MAX: the maximum of core drop reasons, which
423 	 * shouldn't be used as a real 'reason' - only for tracing code gen
424 	 */
425 	SKB_DROP_REASON_MAX,
426 
427 	/**
428 	 * @SKB_DROP_REASON_SUBSYS_MASK: subsystem mask in drop reasons,
429 	 * see &enum skb_drop_reason_subsys
430 	 */
431 	SKB_DROP_REASON_SUBSYS_MASK = 0xffff0000,
432 };
433 
434 #define SKB_DROP_REASON_SUBSYS_SHIFT	16
435 
436 #define SKB_DR_INIT(name, reason)				\
437 	enum skb_drop_reason name = SKB_DROP_REASON_##reason
438 #define SKB_DR(name)						\
439 	SKB_DR_INIT(name, NOT_SPECIFIED)
440 #define SKB_DR_SET(name, reason)				\
441 	(name = SKB_DROP_REASON_##reason)
442 #define SKB_DR_OR(name, reason)					\
443 	do {							\
444 		if (name == SKB_DROP_REASON_NOT_SPECIFIED ||	\
445 		    name == SKB_NOT_DROPPED_YET)		\
446 			SKB_DR_SET(name, reason);		\
447 	} while (0)
448 
449 #endif
450