Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2196523/?format=api
{ "id": 2196523, "url": "http://patchwork.ozlabs.org/api/patches/2196523/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/patch/20260214150851.31936-1-phil@nwl.cc/", "project": { "id": 26, "url": "http://patchwork.ozlabs.org/api/projects/26/?format=api", "name": "Netfilter Development", "link_name": "netfilter-devel", "list_id": "netfilter-devel.vger.kernel.org", "list_email": "netfilter-devel@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260214150851.31936-1-phil@nwl.cc>", "list_archive_url": null, "date": "2026-02-14T15:08:50", "name": "[iptables,1/2] include: linux: nf_tables.h: Sync with current kernel UAPI headers", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "06ef1268925f0d00160b27914fbb542698c15dc4", "submitter": { "id": 4285, "url": "http://patchwork.ozlabs.org/api/people/4285/?format=api", "name": "Phil Sutter", "email": "phil@nwl.cc" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/patch/20260214150851.31936-1-phil@nwl.cc/mbox/", "series": [ { "id": 492178, "url": "http://patchwork.ozlabs.org/api/series/492178/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=492178", "date": "2026-02-14T15:08:51", "name": "[iptables,1/2] include: linux: nf_tables.h: Sync with current kernel UAPI headers", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/492178/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2196523/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2196523/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <netfilter-devel+bounces-10773-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "netfilter-devel@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=nwl.cc header.i=@nwl.cc header.a=rsa-sha256\n header.s=mail2022 header.b=fCVLBzsv;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-10773-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key)\n header.d=nwl.cc header.i=@nwl.cc header.b=\"fCVLBzsv\"", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=151.80.46.58", "smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=nwl.cc", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=nwl.cc", "mail.nwl.cc;\n\tiprev=pass (localhost) smtp.remote-ip=::1" ], "Received": [ "from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fCsrP69Fvz1xr1\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 15 Feb 2026 02:09:09 +1100 (AEDT)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 19F6D30156DC\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 14 Feb 2026 15:09:05 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 9F68A27EC80;\n\tSat, 14 Feb 2026 15:09:01 +0000 (UTC)", "from orbyte.nwl.cc (orbyte.nwl.cc [151.80.46.58])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id A4A8923C8AE\n\tfor <netfilter-devel@vger.kernel.org>; Sat, 14 Feb 2026 15:08:59 +0000 (UTC)", "from localhost ([::1] helo=xic)\n\tby orbyte.nwl.cc with esmtp (Exim 4.98.2)\n\t(envelope-from <phil@nwl.cc>)\n\tid 1vrHGT-000000000cn-0oEE;\n\tSat, 14 Feb 2026 16:08:57 +0100" ], "ARC-Seal": "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1771081741; cv=none;\n b=YDqUCszD3mlcHFhoHE/TKvNSv6LRDrrM4ZgdlY4gUHxD8HwUE70ygvpnHm7sGNSkCCmlpkRPAos7RTCCJbS4tOFr7FyC63K7JhS/g4nTGRdFHULKTHO2ml4gC5D8TvqoutVDaPY+CW572XaMW+PfaRyTdUV7aTe183IhdFjZ508=", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1771081741; c=relaxed/simple;\n\tbh=2dMy+GDPwkMW4SVPjotfJoonoKxW0SYs+prgwC/ZmZI=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version;\n b=Klw7rg87MHKfq9hA23NDlDSp3h7SzEHSZ3DcYE/tpPTwrkxHu9B6/ECEeAjRLvGkwpnc198oJF+8M+wrIvbKH9qzUqh19QTEJrZJPCtd4sqaFD7CQ1aIrIlUAwXCQOw7GLlj2L6PGYfFAZ/W6FGY/PvRq352kJWjboXFtU/KrpU=", "ARC-Authentication-Results": "i=1; smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=nwl.cc;\n spf=pass smtp.mailfrom=nwl.cc;\n dkim=pass (2048-bit key) header.d=nwl.cc header.i=@nwl.cc header.b=fCVLBzsv;\n arc=none smtp.client-ip=151.80.46.58", "DKIM-Signature": "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=nwl.cc;\n\ts=mail2022; h=Content-Transfer-Encoding:MIME-Version:Message-ID:Date:Subject:\n\tCc:To:From:Sender:Reply-To:Content-Type:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tIn-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:\n\tList-Post:List-Owner:List-Archive;\n\tbh=67GR0fv5cQV6eu1ViDD4fx24Yh6Q984g/j3er+zjJpE=; b=fCVLBzsvc8uisQzH7lFKtW60uZ\n\tiMPhT+89cwxZ5JsvVbslGf1qzKliO0meXRRUV+4cOUUOE6YIRloAj3fhMsn+w0bXATSn6ozjmDWEq\n\tQTlUW74SVTFV64zA9PvLPL2FzS24qzHqBOeIhWjzPKQdQFFnjPLiE9SatwrpscLyYjT1FTw0B2/cK\n\t/zzSBjORnXVh3BppOs5p5zoJgErgxW9lKC7d8LIyT6QW5LSGkC1uMoVh0UtccCAxQ47aVqpituIsf\n\tHvSjdbiwsDCsBDwY+L/TwAxKJSteWH4/YCAtYs6pF/LjkX21ipKsVOD6TcBamEkvt1tc+YwfaYJ4I\n\tAFma+fnw==;", "From": "Phil Sutter <phil@nwl.cc>", "To": "netfilter-devel@vger.kernel.org", "Cc": "Florian Westphal <fw@strlen.de>,\n\t\"Remy D . Farley\" <one-d-wide@protonmail.com>", "Subject": "[iptables PATCH 1/2] include: linux: nf_tables.h: Sync with current\n kernel UAPI headers", "Date": "Sat, 14 Feb 2026 16:08:50 +0100", "Message-ID": "<20260214150851.31936-1-phil@nwl.cc>", "X-Mailer": "git-send-email 2.51.0", "Precedence": "bulk", "X-Mailing-List": "netfilter-devel@vger.kernel.org", "List-Id": "<netfilter-devel.vger.kernel.org>", "List-Subscribe": "<mailto:netfilter-devel+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:netfilter-devel+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit" }, "content": "We want NFT_BITWISE_MASK_XOR, use the occasion to sync it entirely.\n\nSigned-off-by: Phil Sutter <phil@nwl.cc>\n---\n include/linux/netfilter/nf_tables.h | 67 +++++++++++++++++++++++------\n 1 file changed, 53 insertions(+), 14 deletions(-)", "diff": "diff --git a/include/linux/netfilter/nf_tables.h b/include/linux/netfilter/nf_tables.h\nindex c4d4d8e42dc8b..45c71f7d21c25 100644\n--- a/include/linux/netfilter/nf_tables.h\n+++ b/include/linux/netfilter/nf_tables.h\n@@ -105,6 +105,7 @@ enum nft_verdicts {\n * @NFT_MSG_DESTROYSETELEM: destroy a set element (enum nft_set_elem_attributes)\n * @NFT_MSG_DESTROYOBJ: destroy a stateful object (enum nft_object_attributes)\n * @NFT_MSG_DESTROYFLOWTABLE: destroy flow table (enum nft_flowtable_attributes)\n+ * @NFT_MSG_GETSETELEM_RESET: get set elements and reset attached stateful expressions (enum nft_set_elem_attributes)\n */\n enum nf_tables_msg_types {\n \tNFT_MSG_NEWTABLE,\n@@ -140,6 +141,7 @@ enum nf_tables_msg_types {\n \tNFT_MSG_DESTROYSETELEM,\n \tNFT_MSG_DESTROYOBJ,\n \tNFT_MSG_DESTROYFLOWTABLE,\n+\tNFT_MSG_GETSETELEM_RESET,\n \tNFT_MSG_MAX,\n };\n \n@@ -177,13 +179,17 @@ enum nft_hook_attributes {\n * enum nft_table_flags - nf_tables table flags\n *\n * @NFT_TABLE_F_DORMANT: this table is not active\n+ * @NFT_TABLE_F_OWNER: this table is owned by a process\n+ * @NFT_TABLE_F_PERSIST: this table shall outlive its owner\n */\n enum nft_table_flags {\n \tNFT_TABLE_F_DORMANT\t= 0x1,\n \tNFT_TABLE_F_OWNER\t= 0x2,\n+\tNFT_TABLE_F_PERSIST\t= 0x4,\n };\n #define NFT_TABLE_F_MASK\t(NFT_TABLE_F_DORMANT | \\\n-\t\t\t\t NFT_TABLE_F_OWNER)\n+\t\t\t\t NFT_TABLE_F_OWNER | \\\n+\t\t\t\t NFT_TABLE_F_PERSIST)\n \n /**\n * enum nft_table_attributes - nf_tables table netlink attributes\n@@ -261,6 +267,7 @@ enum nft_chain_attributes {\n * @NFTA_RULE_USERDATA: user data (NLA_BINARY, NFT_USERDATA_MAXLEN)\n * @NFTA_RULE_ID: uniquely identifies a rule in a transaction (NLA_U32)\n * @NFTA_RULE_POSITION_ID: transaction unique identifier of the previous rule (NLA_U32)\n+ * @NFTA_RULE_CHAIN_ID: add the rule to chain by ID, alternative to @NFTA_RULE_CHAIN (NLA_U32)\n */\n enum nft_rule_attributes {\n \tNFTA_RULE_UNSPEC,\n@@ -282,9 +289,11 @@ enum nft_rule_attributes {\n /**\n * enum nft_rule_compat_flags - nf_tables rule compat flags\n *\n+ * @NFT_RULE_COMPAT_F_UNUSED: unused\n * @NFT_RULE_COMPAT_F_INV: invert the check result\n */\n enum nft_rule_compat_flags {\n+\tNFT_RULE_COMPAT_F_UNUSED = (1 << 0),\n \tNFT_RULE_COMPAT_F_INV\t= (1 << 1),\n \tNFT_RULE_COMPAT_F_MASK\t= NFT_RULE_COMPAT_F_INV,\n };\n@@ -385,6 +394,8 @@ enum nft_set_field_attributes {\n * @NFTA_SET_HANDLE: set handle (NLA_U64)\n * @NFTA_SET_EXPR: set expression (NLA_NESTED: nft_expr_attributes)\n * @NFTA_SET_EXPRESSIONS: list of expressions (NLA_NESTED: nft_list_attributes)\n+ * @NFTA_SET_TYPE: set backend type (NLA_STRING)\n+ * @NFTA_SET_COUNT: number of set elements (NLA_U32)\n */\n enum nft_set_attributes {\n \tNFTA_SET_UNSPEC,\n@@ -406,6 +417,8 @@ enum nft_set_attributes {\n \tNFTA_SET_HANDLE,\n \tNFTA_SET_EXPR,\n \tNFTA_SET_EXPRESSIONS,\n+\tNFTA_SET_TYPE,\n+\tNFTA_SET_COUNT,\n \t__NFTA_SET_MAX\n };\n #define NFTA_SET_MAX\t\t(__NFTA_SET_MAX - 1)\n@@ -427,7 +440,7 @@ enum nft_set_elem_flags {\n * @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)\n * @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)\n * @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)\n- * @NFTA_SET_ELEM_TIMEOUT: timeout value (NLA_U64)\n+ * @NFTA_SET_ELEM_TIMEOUT: timeout value, zero means never times out (NLA_U64)\n * @NFTA_SET_ELEM_EXPIRATION: expiration time (NLA_U64)\n * @NFTA_SET_ELEM_USERDATA: user data (NLA_BINARY)\n * @NFTA_SET_ELEM_EXPR: expression (NLA_NESTED: nft_expr_attributes)\n@@ -555,16 +568,26 @@ enum nft_immediate_attributes {\n /**\n * enum nft_bitwise_ops - nf_tables bitwise operations\n *\n- * @NFT_BITWISE_BOOL: mask-and-xor operation used to implement NOT, AND, OR and\n- * XOR boolean operations\n+ * @NFT_BITWISE_MASK_XOR: mask-and-xor operation used to implement NOT, AND, OR\n+ * and XOR boolean operations\n * @NFT_BITWISE_LSHIFT: left-shift operation\n * @NFT_BITWISE_RSHIFT: right-shift operation\n+ * @NFT_BITWISE_AND: and operation\n+ * @NFT_BITWISE_OR: or operation\n+ * @NFT_BITWISE_XOR: xor operation\n */\n enum nft_bitwise_ops {\n-\tNFT_BITWISE_BOOL,\n+\tNFT_BITWISE_MASK_XOR,\n \tNFT_BITWISE_LSHIFT,\n \tNFT_BITWISE_RSHIFT,\n+\tNFT_BITWISE_AND,\n+\tNFT_BITWISE_OR,\n+\tNFT_BITWISE_XOR,\n };\n+/*\n+ * Old name for NFT_BITWISE_MASK_XOR. Retained for backwards-compatibility.\n+ */\n+#define NFT_BITWISE_BOOL NFT_BITWISE_MASK_XOR\n \n /**\n * enum nft_bitwise_attributes - nf_tables bitwise expression netlink attributes\n@@ -577,6 +600,7 @@ enum nft_bitwise_ops {\n * @NFTA_BITWISE_OP: type of operation (NLA_U32: nft_bitwise_ops)\n * @NFTA_BITWISE_DATA: argument for non-boolean operations\n * (NLA_NESTED: nft_data_attributes)\n+ * @NFTA_BITWISE_SREG2: second source register (NLA_U32: nft_registers)\n *\n * The bitwise expression supports boolean and shift operations. It implements\n * the boolean operations by performing the following operation:\n@@ -600,6 +624,7 @@ enum nft_bitwise_attributes {\n \tNFTA_BITWISE_XOR,\n \tNFTA_BITWISE_OP,\n \tNFTA_BITWISE_DATA,\n+\tNFTA_BITWISE_SREG2,\n \t__NFTA_BITWISE_MAX\n };\n #define NFTA_BITWISE_MAX\t(__NFTA_BITWISE_MAX - 1)\n@@ -856,15 +881,17 @@ enum nft_exthdr_flags {\n * enum nft_exthdr_op - nf_tables match options\n *\n * @NFT_EXTHDR_OP_IPV6: match against ipv6 extension headers\n- * @NFT_EXTHDR_OP_TCP: match against tcp options\n+ * @NFT_EXTHDR_OP_TCPOPT: match against tcp options\n * @NFT_EXTHDR_OP_IPV4: match against ipv4 options\n * @NFT_EXTHDR_OP_SCTP: match against sctp chunks\n+ * @NFT_EXTHDR_OP_DCCP: match against dccp otions\n */\n enum nft_exthdr_op {\n \tNFT_EXTHDR_OP_IPV6,\n \tNFT_EXTHDR_OP_TCPOPT,\n \tNFT_EXTHDR_OP_IPV4,\n \tNFT_EXTHDR_OP_SCTP,\n+\tNFT_EXTHDR_OP_DCCP,\n \t__NFT_EXTHDR_OP_MAX\n };\n #define NFT_EXTHDR_OP_MAX\t(__NFT_EXTHDR_OP_MAX - 1)\n@@ -932,6 +959,7 @@ enum nft_exthdr_attributes {\n * @NFT_META_SDIF: slave device interface index\n * @NFT_META_SDIFNAME: slave device interface name\n * @NFT_META_BRI_BROUTE: packet br_netfilter_broute bit\n+ * @NFT_META_BRI_IIFHWADDR: packet input bridge interface ethernet address\n */\n enum nft_meta_keys {\n \tNFT_META_LEN,\n@@ -972,6 +1000,7 @@ enum nft_meta_keys {\n \tNFT_META_SDIFNAME,\n \tNFT_META_BRI_BROUTE,\n \t__NFT_META_IIFTYPE,\n+\tNFT_META_BRI_IIFHWADDR,\n };\n \n /**\n@@ -1171,7 +1200,7 @@ enum nft_ct_attributes {\n #define NFTA_CT_MAX\t\t(__NFTA_CT_MAX - 1)\n \n /**\n- * enum nft_flow_attributes - ct offload expression attributes\n+ * enum nft_offload_attributes - ct offload expression attributes\n * @NFTA_FLOW_TABLE_NAME: flow table name (NLA_STRING)\n */\n enum nft_offload_attributes {\n@@ -1365,7 +1394,7 @@ enum nft_secmark_attributes {\n #define NFTA_SECMARK_MAX\t(__NFTA_SECMARK_MAX - 1)\n \n /* Max security context length */\n-#define NFT_SECMARK_CTX_MAXLEN\t\t256\n+#define NFT_SECMARK_CTX_MAXLEN\t\t4096\n \n /**\n * enum nft_reject_types - nf_tables reject expression reject types\n@@ -1381,7 +1410,7 @@ enum nft_reject_types {\n };\n \n /**\n- * enum nft_reject_code - Generic reject codes for IPv4/IPv6\n+ * enum nft_reject_inet_code - Generic reject codes for IPv4/IPv6\n *\n * @NFT_REJECT_ICMPX_NO_ROUTE: no route to host / network unreachable\n * @NFT_REJECT_ICMPX_PORT_UNREACH: port unreachable\n@@ -1451,9 +1480,9 @@ enum nft_nat_attributes {\n /**\n * enum nft_tproxy_attributes - nf_tables tproxy expression netlink attributes\n *\n- * NFTA_TPROXY_FAMILY: Target address family (NLA_U32: nft_registers)\n- * NFTA_TPROXY_REG_ADDR: Target address register (NLA_U32: nft_registers)\n- * NFTA_TPROXY_REG_PORT: Target port register (NLA_U32: nft_registers)\n+ * @NFTA_TPROXY_FAMILY: Target address family (NLA_U32: nft_registers)\n+ * @NFTA_TPROXY_REG_ADDR: Target address register (NLA_U32: nft_registers)\n+ * @NFTA_TPROXY_REG_PORT: Target port register (NLA_U32: nft_registers)\n */\n enum nft_tproxy_attributes {\n \tNFTA_TPROXY_UNSPEC,\n@@ -1683,7 +1712,7 @@ enum nft_flowtable_flags {\n *\n * @NFTA_FLOWTABLE_TABLE: name of the table containing the expression (NLA_STRING)\n * @NFTA_FLOWTABLE_NAME: name of this flow table (NLA_STRING)\n- * @NFTA_FLOWTABLE_HOOK: netfilter hook configuration(NLA_U32)\n+ * @NFTA_FLOWTABLE_HOOK: netfilter hook configuration (NLA_NESTED)\n * @NFTA_FLOWTABLE_USE: number of references to this flow table (NLA_U32)\n * @NFTA_FLOWTABLE_HANDLE: object handle (NLA_U64)\n * @NFTA_FLOWTABLE_FLAGS: flags (NLA_U32)\n@@ -1754,13 +1783,15 @@ enum nft_synproxy_attributes {\n #define NFTA_SYNPROXY_MAX (__NFTA_SYNPROXY_MAX - 1)\n \n /**\n- * enum nft_device_attributes - nf_tables device netlink attributes\n+ * enum nft_devices_attributes - nf_tables device netlink attributes\n *\n * @NFTA_DEVICE_NAME: name of this device (NLA_STRING)\n+ * @NFTA_DEVICE_PREFIX: device name prefix, a simple wildcard (NLA_STRING)\n */\n enum nft_devices_attributes {\n \tNFTA_DEVICE_UNSPEC,\n \tNFTA_DEVICE_NAME,\n+\tNFTA_DEVICE_PREFIX,\n \t__NFTA_DEVICE_MAX\n };\n #define NFTA_DEVICE_MAX\t\t(__NFTA_DEVICE_MAX - 1)\n@@ -1814,6 +1845,10 @@ enum nft_xfrm_keys {\n * @NFTA_TRACE_MARK: nfmark (NLA_U32)\n * @NFTA_TRACE_NFPROTO: nf protocol processed (NLA_U32)\n * @NFTA_TRACE_POLICY: policy that decided fate of packet (NLA_U32)\n+ * @NFTA_TRACE_CT_ID: conntrack id (NLA_U32)\n+ * @NFTA_TRACE_CT_DIRECTION: packets direction (NLA_U8)\n+ * @NFTA_TRACE_CT_STATUS: conntrack status (NLA_U32)\n+ * @NFTA_TRACE_CT_STATE: packet state (new, established, ...) (NLA_U32)\n */\n enum nft_trace_attributes {\n \tNFTA_TRACE_UNSPEC,\n@@ -1834,6 +1869,10 @@ enum nft_trace_attributes {\n \tNFTA_TRACE_NFPROTO,\n \tNFTA_TRACE_POLICY,\n \tNFTA_TRACE_PAD,\n+\tNFTA_TRACE_CT_ID,\n+\tNFTA_TRACE_CT_DIRECTION,\n+\tNFTA_TRACE_CT_STATUS,\n+\tNFTA_TRACE_CT_STATE,\n \t__NFTA_TRACE_MAX\n };\n #define NFTA_TRACE_MAX (__NFTA_TRACE_MAX - 1)\n", "prefixes": [ "iptables", "1/2" ] }