]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/blame - include/net/pkt_cls.h
r8169: improve handling of Abit Fatal1ty F-190HD
[mirror_ubuntu-focal-kernel.git] / include / net / pkt_cls.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2#ifndef __NET_PKT_CLS_H
3#define __NET_PKT_CLS_H
4
5#include <linux/pkt_cls.h>
7aa0045d 6#include <linux/workqueue.h>
1da177e4
LT
7#include <net/sch_generic.h>
8#include <net/act_api.h>
8f256622 9#include <net/flow_offload.h>
1da177e4 10
cd11b164
PA
11/* TC action not accessible from user space */
12#define TC_ACT_REINSERT (TC_ACT_VALUE_MAX + 1)
13
1da177e4
LT
14/* Basic packet classifier frontend definitions. */
15
fd2c3ef7 16struct tcf_walker {
1da177e4
LT
17 int stop;
18 int skip;
19 int count;
6676d5e4 20 bool nonempty;
01683a14 21 unsigned long cookie;
8113c095 22 int (*fn)(struct tcf_proto *, void *node, struct tcf_walker *);
1da177e4
LT
23};
24
5c15257f
JP
25int register_tcf_proto_ops(struct tcf_proto_ops *ops);
26int unregister_tcf_proto_ops(struct tcf_proto_ops *ops);
1da177e4 27
8c4083b3
JP
28enum tcf_block_binder_type {
29 TCF_BLOCK_BINDER_TYPE_UNSPEC,
6e40cf2d
JP
30 TCF_BLOCK_BINDER_TYPE_CLSACT_INGRESS,
31 TCF_BLOCK_BINDER_TYPE_CLSACT_EGRESS,
8c4083b3
JP
32};
33
34struct tcf_block_ext_info {
35 enum tcf_block_binder_type binder_type;
c7eb7d72
JP
36 tcf_chain_head_change_t *chain_head_change;
37 void *chain_head_change_priv;
48617387 38 u32 block_index;
8c4083b3
JP
39};
40
acb67442 41struct tcf_block_cb;
aaa908ff 42bool tcf_queue_work(struct rcu_work *rwork, work_func_t func);
acb67442 43
8ae70032 44#ifdef CONFIG_NET_CLS
1f3ed383
JP
45struct tcf_chain *tcf_chain_get_by_act(struct tcf_block *block,
46 u32 chain_index);
1f3ed383 47void tcf_chain_put_by_act(struct tcf_chain *chain);
bbf73830
VB
48struct tcf_chain *tcf_get_next_chain(struct tcf_block *block,
49 struct tcf_chain *chain);
fe2923af 50struct tcf_proto *tcf_get_next_proto(struct tcf_chain *chain,
12db03b6 51 struct tcf_proto *tp, bool rtnl_held);
f36fe1c4 52void tcf_block_netif_keep_dst(struct tcf_block *block);
6529eaba 53int tcf_block_get(struct tcf_block **p_block,
8d1a77f9
AA
54 struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
55 struct netlink_ext_ack *extack);
c7eb7d72 56int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
8d1a77f9
AA
57 struct tcf_block_ext_info *ei,
58 struct netlink_ext_ack *extack);
6529eaba 59void tcf_block_put(struct tcf_block *block);
c7eb7d72 60void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
8c4083b3 61 struct tcf_block_ext_info *ei);
44186460 62
48617387
JP
63static inline bool tcf_block_shared(struct tcf_block *block)
64{
65 return block->index;
66}
67
44186460
JP
68static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
69{
48617387 70 WARN_ON(tcf_block_shared(block));
44186460
JP
71 return block->q;
72}
73
acb67442
JP
74void *tcf_block_cb_priv(struct tcf_block_cb *block_cb);
75struct tcf_block_cb *tcf_block_cb_lookup(struct tcf_block *block,
76 tc_setup_cb_t *cb, void *cb_ident);
77void tcf_block_cb_incref(struct tcf_block_cb *block_cb);
78unsigned int tcf_block_cb_decref(struct tcf_block_cb *block_cb);
79struct tcf_block_cb *__tcf_block_cb_register(struct tcf_block *block,
80 tc_setup_cb_t *cb, void *cb_ident,
60513bd8
JH
81 void *cb_priv,
82 struct netlink_ext_ack *extack);
acb67442
JP
83int tcf_block_cb_register(struct tcf_block *block,
84 tc_setup_cb_t *cb, void *cb_ident,
60513bd8 85 void *cb_priv, struct netlink_ext_ack *extack);
32636742
JH
86void __tcf_block_cb_unregister(struct tcf_block *block,
87 struct tcf_block_cb *block_cb);
acb67442
JP
88void tcf_block_cb_unregister(struct tcf_block *block,
89 tc_setup_cb_t *cb, void *cb_ident);
7f76fa36
JH
90int __tc_indr_block_cb_register(struct net_device *dev, void *cb_priv,
91 tc_indr_block_bind_cb_t *cb, void *cb_ident);
92int tc_indr_block_cb_register(struct net_device *dev, void *cb_priv,
93 tc_indr_block_bind_cb_t *cb, void *cb_ident);
94void __tc_indr_block_cb_unregister(struct net_device *dev,
95 tc_indr_block_bind_cb_t *cb, void *cb_ident);
96void tc_indr_block_cb_unregister(struct net_device *dev,
97 tc_indr_block_bind_cb_t *cb, void *cb_ident);
acb67442 98
87d83093
JP
99int tcf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
100 struct tcf_result *res, bool compat_mode);
101
8ae70032 102#else
88c44a52
PJV
103static inline bool tcf_block_shared(struct tcf_block *block)
104{
105 return false;
106}
107
6529eaba
JP
108static inline
109int tcf_block_get(struct tcf_block **p_block,
3c149091
SM
110 struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
111 struct netlink_ext_ack *extack)
6529eaba
JP
112{
113 return 0;
114}
115
8c4083b3 116static inline
c7eb7d72 117int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
33c30a8b
QM
118 struct tcf_block_ext_info *ei,
119 struct netlink_ext_ack *extack)
8c4083b3
JP
120{
121 return 0;
122}
123
6529eaba 124static inline void tcf_block_put(struct tcf_block *block)
8ae70032
JP
125{
126}
87d83093 127
8c4083b3 128static inline
c7eb7d72 129void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
8c4083b3
JP
130 struct tcf_block_ext_info *ei)
131{
132}
133
44186460
JP
134static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
135{
136 return NULL;
137}
138
acb67442
JP
139static inline
140int tc_setup_cb_block_register(struct tcf_block *block, tc_setup_cb_t *cb,
141 void *cb_priv)
142{
143 return 0;
144}
145
146static inline
147void tc_setup_cb_block_unregister(struct tcf_block *block, tc_setup_cb_t *cb,
148 void *cb_priv)
149{
150}
151
152static inline
153void *tcf_block_cb_priv(struct tcf_block_cb *block_cb)
154{
155 return NULL;
156}
157
158static inline
159struct tcf_block_cb *tcf_block_cb_lookup(struct tcf_block *block,
160 tc_setup_cb_t *cb, void *cb_ident)
161{
162 return NULL;
163}
164
165static inline
166void tcf_block_cb_incref(struct tcf_block_cb *block_cb)
167{
168}
169
170static inline
171unsigned int tcf_block_cb_decref(struct tcf_block_cb *block_cb)
172{
173 return 0;
174}
175
176static inline
177struct tcf_block_cb *__tcf_block_cb_register(struct tcf_block *block,
178 tc_setup_cb_t *cb, void *cb_ident,
60513bd8
JH
179 void *cb_priv,
180 struct netlink_ext_ack *extack)
acb67442
JP
181{
182 return NULL;
183}
184
185static inline
186int tcf_block_cb_register(struct tcf_block *block,
187 tc_setup_cb_t *cb, void *cb_ident,
60513bd8 188 void *cb_priv, struct netlink_ext_ack *extack)
acb67442
JP
189{
190 return 0;
191}
192
193static inline
32636742
JH
194void __tcf_block_cb_unregister(struct tcf_block *block,
195 struct tcf_block_cb *block_cb)
acb67442
JP
196{
197}
198
199static inline
200void tcf_block_cb_unregister(struct tcf_block *block,
201 tc_setup_cb_t *cb, void *cb_ident)
202{
203}
204
7f76fa36
JH
205static inline
206int __tc_indr_block_cb_register(struct net_device *dev, void *cb_priv,
207 tc_indr_block_bind_cb_t *cb, void *cb_ident)
208{
209 return 0;
210}
211
212static inline
213int tc_indr_block_cb_register(struct net_device *dev, void *cb_priv,
214 tc_indr_block_bind_cb_t *cb, void *cb_ident)
215{
216 return 0;
217}
218
219static inline
220void __tc_indr_block_cb_unregister(struct net_device *dev,
221 tc_indr_block_bind_cb_t *cb, void *cb_ident)
222{
223}
224
225static inline
226void tc_indr_block_cb_unregister(struct net_device *dev,
227 tc_indr_block_bind_cb_t *cb, void *cb_ident)
228{
229}
230
87d83093
JP
231static inline int tcf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
232 struct tcf_result *res, bool compat_mode)
233{
234 return TC_ACT_UNSPEC;
235}
8ae70032 236#endif
cf1facda 237
1da177e4
LT
238static inline unsigned long
239__cls_set_class(unsigned long *clp, unsigned long cl)
240{
a0efb80c 241 return xchg(clp, cl);
1da177e4
LT
242}
243
244static inline unsigned long
34e3759c 245cls_set_class(struct Qdisc *q, unsigned long *clp, unsigned long cl)
1da177e4
LT
246{
247 unsigned long old_cl;
34e3759c
JP
248
249 sch_tree_lock(q);
1da177e4 250 old_cl = __cls_set_class(clp, cl);
34e3759c 251 sch_tree_unlock(q);
1da177e4
LT
252 return old_cl;
253}
254
255static inline void
256tcf_bind_filter(struct tcf_proto *tp, struct tcf_result *r, unsigned long base)
257{
34e3759c 258 struct Qdisc *q = tp->chain->block->q;
1da177e4
LT
259 unsigned long cl;
260
34e3759c
JP
261 /* Check q as it is not set for shared blocks. In that case,
262 * setting class is not supported.
263 */
264 if (!q)
265 return;
266 cl = q->ops->cl_ops->bind_tcf(q, base, r->classid);
267 cl = cls_set_class(q, &r->class, cl);
1da177e4 268 if (cl)
34e3759c 269 q->ops->cl_ops->unbind_tcf(q, cl);
1da177e4
LT
270}
271
272static inline void
273tcf_unbind_filter(struct tcf_proto *tp, struct tcf_result *r)
274{
34e3759c 275 struct Qdisc *q = tp->chain->block->q;
1da177e4
LT
276 unsigned long cl;
277
34e3759c
JP
278 if (!q)
279 return;
1da177e4 280 if ((cl = __cls_set_class(&r->class, 0)) != 0)
34e3759c 281 q->ops->cl_ops->unbind_tcf(q, cl);
1da177e4
LT
282}
283
fd2c3ef7 284struct tcf_exts {
1da177e4 285#ifdef CONFIG_NET_CLS_ACT
33be6271 286 __u32 type; /* for backward compat(TCA_OLD_COMPAT) */
22dc13c8
WC
287 int nr_actions;
288 struct tc_action **actions;
e4b95c41 289 struct net *net;
1da177e4 290#endif
5da57f42
WC
291 /* Map to export classifier specific extension TLV types to the
292 * generic extensions API. Unsupported extensions must be set to 0.
293 */
1da177e4
LT
294 int action;
295 int police;
296};
297
14215108
CW
298static inline int tcf_exts_init(struct tcf_exts *exts, struct net *net,
299 int action, int police)
33be6271
WC
300{
301#ifdef CONFIG_NET_CLS_ACT
5da57f42 302 exts->type = 0;
22dc13c8 303 exts->nr_actions = 0;
14215108 304 exts->net = net;
22dc13c8
WC
305 exts->actions = kcalloc(TCA_ACT_MAX_PRIO, sizeof(struct tc_action *),
306 GFP_KERNEL);
b9a24bb7
WC
307 if (!exts->actions)
308 return -ENOMEM;
33be6271 309#endif
5da57f42
WC
310 exts->action = action;
311 exts->police = police;
b9a24bb7 312 return 0;
33be6271
WC
313}
314
e4b95c41
CW
315/* Return false if the netns is being destroyed in cleanup_net(). Callers
316 * need to do cleanup synchronously in this case, otherwise may race with
317 * tc_action_net_exit(). Return true for other cases.
318 */
319static inline bool tcf_exts_get_net(struct tcf_exts *exts)
320{
321#ifdef CONFIG_NET_CLS_ACT
322 exts->net = maybe_get_net(exts->net);
323 return exts->net != NULL;
324#else
325 return true;
326#endif
327}
328
329static inline void tcf_exts_put_net(struct tcf_exts *exts)
330{
331#ifdef CONFIG_NET_CLS_ACT
332 if (exts->net)
333 put_net(exts->net);
334#endif
335}
336
22dc13c8 337#ifdef CONFIG_NET_CLS_ACT
244cd96a
CW
338#define tcf_exts_for_each_action(i, a, exts) \
339 for (i = 0; i < TCA_ACT_MAX_PRIO && ((a) = (exts)->actions[i]); i++)
340#else
341#define tcf_exts_for_each_action(i, a, exts) \
191672ca 342 for (; 0; (void)(i), (void)(a), (void)(exts))
22dc13c8 343#endif
22dc13c8 344
d897a638
JK
345static inline void
346tcf_exts_stats_update(const struct tcf_exts *exts,
347 u64 bytes, u64 packets, u64 lastuse)
348{
349#ifdef CONFIG_NET_CLS_ACT
350 int i;
351
352 preempt_disable();
353
354 for (i = 0; i < exts->nr_actions; i++) {
355 struct tc_action *a = exts->actions[i];
356
28169aba 357 tcf_action_stats_update(a, bytes, packets, lastuse, true);
d897a638
JK
358 }
359
360 preempt_enable();
361#endif
362}
363
3bcc0cec
JP
364/**
365 * tcf_exts_has_actions - check if at least one action is present
366 * @exts: tc filter extensions handle
367 *
368 * Returns true if at least one action is present.
369 */
370static inline bool tcf_exts_has_actions(struct tcf_exts *exts)
371{
2734437e 372#ifdef CONFIG_NET_CLS_ACT
3bcc0cec
JP
373 return exts->nr_actions;
374#else
375 return false;
376#endif
377}
2734437e 378
af69afc5
JP
379/**
380 * tcf_exts_exec - execute tc filter extensions
381 * @skb: socket buffer
382 * @exts: tc filter extensions handle
383 * @res: desired result
384 *
af089e70 385 * Executes all configured extensions. Returns TC_ACT_OK on a normal execution,
af69afc5
JP
386 * a negative number if the filter must be considered unmatched or
387 * a positive action code (TC_ACT_*) which must be returned to the
388 * underlying layer.
389 */
390static inline int
391tcf_exts_exec(struct sk_buff *skb, struct tcf_exts *exts,
392 struct tcf_result *res)
393{
394#ifdef CONFIG_NET_CLS_ACT
ec1a9cca 395 return tcf_action_exec(skb, exts->actions, exts->nr_actions, res);
af69afc5 396#endif
af089e70 397 return TC_ACT_OK;
af69afc5
JP
398}
399
5c15257f
JP
400int tcf_exts_validate(struct net *net, struct tcf_proto *tp,
401 struct nlattr **tb, struct nlattr *rate_tlv,
ec6743a1 402 struct tcf_exts *exts, bool ovr, bool rtnl_held,
50a56190 403 struct netlink_ext_ack *extack);
18d0264f 404void tcf_exts_destroy(struct tcf_exts *exts);
9b0d4446 405void tcf_exts_change(struct tcf_exts *dst, struct tcf_exts *src);
5da57f42
WC
406int tcf_exts_dump(struct sk_buff *skb, struct tcf_exts *exts);
407int tcf_exts_dump_stats(struct sk_buff *skb, struct tcf_exts *exts);
1da177e4
LT
408
409/**
410 * struct tcf_pkt_info - packet information
411 */
fd2c3ef7 412struct tcf_pkt_info {
1da177e4
LT
413 unsigned char * ptr;
414 int nexthdr;
415};
416
417#ifdef CONFIG_NET_EMATCH
418
419struct tcf_ematch_ops;
420
421/**
422 * struct tcf_ematch - extended match (ematch)
423 *
424 * @matchid: identifier to allow userspace to reidentify a match
425 * @flags: flags specifying attributes and the relation to other matches
426 * @ops: the operations lookup table of the corresponding ematch module
427 * @datalen: length of the ematch specific configuration data
428 * @data: ematch specific data
429 */
fd2c3ef7 430struct tcf_ematch {
1da177e4
LT
431 struct tcf_ematch_ops * ops;
432 unsigned long data;
433 unsigned int datalen;
434 u16 matchid;
435 u16 flags;
82a470f1 436 struct net *net;
1da177e4
LT
437};
438
439static inline int tcf_em_is_container(struct tcf_ematch *em)
440{
441 return !em->ops;
442}
443
444static inline int tcf_em_is_simple(struct tcf_ematch *em)
445{
446 return em->flags & TCF_EM_SIMPLE;
447}
448
449static inline int tcf_em_is_inverted(struct tcf_ematch *em)
450{
451 return em->flags & TCF_EM_INVERT;
452}
453
454static inline int tcf_em_last_match(struct tcf_ematch *em)
455{
456 return (em->flags & TCF_EM_REL_MASK) == TCF_EM_REL_END;
457}
458
459static inline int tcf_em_early_end(struct tcf_ematch *em, int result)
460{
461 if (tcf_em_last_match(em))
462 return 1;
463
464 if (result == 0 && em->flags & TCF_EM_REL_AND)
465 return 1;
466
467 if (result != 0 && em->flags & TCF_EM_REL_OR)
468 return 1;
469
470 return 0;
471}
472
473/**
474 * struct tcf_ematch_tree - ematch tree handle
475 *
476 * @hdr: ematch tree header supplied by userspace
477 * @matches: array of ematches
478 */
fd2c3ef7 479struct tcf_ematch_tree {
1da177e4
LT
480 struct tcf_ematch_tree_hdr hdr;
481 struct tcf_ematch * matches;
482
483};
484
485/**
486 * struct tcf_ematch_ops - ematch module operations
487 *
488 * @kind: identifier (kind) of this ematch module
489 * @datalen: length of expected configuration data (optional)
490 * @change: called during validation (optional)
491 * @match: called during ematch tree evaluation, must return 1/0
492 * @destroy: called during destroyage (optional)
493 * @dump: called during dumping process (optional)
494 * @owner: owner, must be set to THIS_MODULE
495 * @link: link to previous/next ematch module (internal use)
496 */
fd2c3ef7 497struct tcf_ematch_ops {
1da177e4
LT
498 int kind;
499 int datalen;
82a470f1 500 int (*change)(struct net *net, void *,
1da177e4
LT
501 int, struct tcf_ematch *);
502 int (*match)(struct sk_buff *, struct tcf_ematch *,
503 struct tcf_pkt_info *);
82a470f1 504 void (*destroy)(struct tcf_ematch *);
1da177e4
LT
505 int (*dump)(struct sk_buff *, struct tcf_ematch *);
506 struct module *owner;
507 struct list_head link;
508};
509
5c15257f
JP
510int tcf_em_register(struct tcf_ematch_ops *);
511void tcf_em_unregister(struct tcf_ematch_ops *);
512int tcf_em_tree_validate(struct tcf_proto *, struct nlattr *,
513 struct tcf_ematch_tree *);
82a470f1 514void tcf_em_tree_destroy(struct tcf_ematch_tree *);
5c15257f
JP
515int tcf_em_tree_dump(struct sk_buff *, struct tcf_ematch_tree *, int);
516int __tcf_em_tree_match(struct sk_buff *, struct tcf_ematch_tree *,
517 struct tcf_pkt_info *);
1da177e4 518
1da177e4
LT
519/**
520 * tcf_em_tree_match - evaulate an ematch tree
521 *
522 * @skb: socket buffer of the packet in question
523 * @tree: ematch tree to be used for evaluation
524 * @info: packet information examined by classifier
525 *
526 * This function matches @skb against the ematch tree in @tree by going
527 * through all ematches respecting their logic relations returning
528 * as soon as the result is obvious.
529 *
530 * Returns 1 if the ematch tree as-one matches, no ematches are configured
531 * or ematch is not enabled in the kernel, otherwise 0 is returned.
532 */
533static inline int tcf_em_tree_match(struct sk_buff *skb,
534 struct tcf_ematch_tree *tree,
535 struct tcf_pkt_info *info)
536{
537 if (tree->hdr.nmatches)
538 return __tcf_em_tree_match(skb, tree, info);
539 else
540 return 1;
541}
542
db3d99c0
PM
543#define MODULE_ALIAS_TCF_EMATCH(kind) MODULE_ALIAS("ematch-kind-" __stringify(kind))
544
1da177e4
LT
545#else /* CONFIG_NET_EMATCH */
546
fd2c3ef7 547struct tcf_ematch_tree {
1da177e4
LT
548};
549
550#define tcf_em_tree_validate(tp, tb, t) ((void)(t), 0)
82a470f1 551#define tcf_em_tree_destroy(t) do { (void)(t); } while(0)
1da177e4 552#define tcf_em_tree_dump(skb, t, tlv) (0)
1da177e4
LT
553#define tcf_em_tree_match(skb, t, info) ((void)(info), 1)
554
555#endif /* CONFIG_NET_EMATCH */
556
557static inline unsigned char * tcf_get_base_ptr(struct sk_buff *skb, int layer)
558{
559 switch (layer) {
560 case TCF_LAYER_LINK:
d3303a65 561 return skb_mac_header(skb);
1da177e4 562 case TCF_LAYER_NETWORK:
d56f90a7 563 return skb_network_header(skb);
1da177e4 564 case TCF_LAYER_TRANSPORT:
9c70220b 565 return skb_transport_header(skb);
1da177e4
LT
566 }
567
568 return NULL;
569}
570
eddc9ec5
ACM
571static inline int tcf_valid_offset(const struct sk_buff *skb,
572 const unsigned char *ptr, const int len)
1da177e4 573{
da521b2c
DM
574 return likely((ptr + len) <= skb_tail_pointer(skb) &&
575 ptr >= skb->head &&
576 (ptr <= (ptr + len)));
1da177e4
LT
577}
578
579#ifdef CONFIG_NET_CLS_IND
0eeb8ffc
DL
580#include <net/net_namespace.h>
581
1da177e4 582static inline int
1057c55f
AA
583tcf_change_indev(struct net *net, struct nlattr *indev_tlv,
584 struct netlink_ext_ack *extack)
1da177e4 585{
2519a602
WC
586 char indev[IFNAMSIZ];
587 struct net_device *dev;
588
1057c55f
AA
589 if (nla_strlcpy(indev, indev_tlv, IFNAMSIZ) >= IFNAMSIZ) {
590 NL_SET_ERR_MSG(extack, "Interface name too long");
1da177e4 591 return -EINVAL;
1057c55f 592 }
2519a602
WC
593 dev = __dev_get_by_name(net, indev);
594 if (!dev)
595 return -ENODEV;
596 return dev->ifindex;
1da177e4
LT
597}
598
2519a602
WC
599static inline bool
600tcf_match_indev(struct sk_buff *skb, int ifindex)
1da177e4 601{
2519a602
WC
602 if (!ifindex)
603 return true;
604 if (!skb->skb_iif)
605 return false;
606 return ifindex == skb->skb_iif;
1da177e4
LT
607}
608#endif /* CONFIG_NET_CLS_IND */
609
3a7b6861
PNA
610int tc_setup_flow_action(struct flow_action *flow_action,
611 const struct tcf_exts *exts);
aeb3fecd
CW
612int tc_setup_cb_call(struct tcf_block *block, enum tc_setup_type type,
613 void *type_data, bool err_stop);
e3ab786b 614unsigned int tcf_exts_num_actions(struct tcf_exts *exts);
717503b9 615
8c4083b3
JP
616enum tc_block_command {
617 TC_BLOCK_BIND,
618 TC_BLOCK_UNBIND,
619};
620
621struct tc_block_offload {
622 enum tc_block_command command;
623 enum tcf_block_binder_type binder_type;
624 struct tcf_block *block;
60513bd8 625 struct netlink_ext_ack *extack;
8c4083b3
JP
626};
627
5fd9fc4e 628struct tc_cls_common_offload {
5fd9fc4e
JP
629 u32 chain_index;
630 __be16 protocol;
d7c1c8d2 631 u32 prio;
8f0b425a 632 struct netlink_ext_ack *extack;
5fd9fc4e
JP
633};
634
a1b7c5fd
JF
635struct tc_cls_u32_knode {
636 struct tcf_exts *exts;
068ceb35 637 struct tcf_result *res;
e014860e 638 struct tc_u32_sel *sel;
a1b7c5fd
JF
639 u32 handle;
640 u32 val;
641 u32 mask;
642 u32 link_handle;
e014860e 643 u8 fshift;
a1b7c5fd
JF
644};
645
646struct tc_cls_u32_hnode {
647 u32 handle;
648 u32 prio;
649 unsigned int divisor;
650};
651
652enum tc_clsu32_command {
653 TC_CLSU32_NEW_KNODE,
654 TC_CLSU32_REPLACE_KNODE,
655 TC_CLSU32_DELETE_KNODE,
656 TC_CLSU32_NEW_HNODE,
657 TC_CLSU32_REPLACE_HNODE,
658 TC_CLSU32_DELETE_HNODE,
659};
660
661struct tc_cls_u32_offload {
5fd9fc4e 662 struct tc_cls_common_offload common;
a1b7c5fd
JF
663 /* knode values */
664 enum tc_clsu32_command command;
665 union {
666 struct tc_cls_u32_knode knode;
667 struct tc_cls_u32_hnode hnode;
668 };
669};
670
7b06e8ae 671static inline bool tc_can_offload(const struct net_device *dev)
6843e7a2 672{
70b5aee4 673 return dev->features & NETIF_F_HW_TC;
6843e7a2
JF
674}
675
f9eda14f
QM
676static inline bool tc_can_offload_extack(const struct net_device *dev,
677 struct netlink_ext_ack *extack)
678{
679 bool can = tc_can_offload(dev);
680
681 if (!can)
682 NL_SET_ERR_MSG(extack, "TC offload is disabled on net device");
683
684 return can;
685}
686
878db9f0
JK
687static inline bool
688tc_cls_can_offload_and_chain0(const struct net_device *dev,
689 struct tc_cls_common_offload *common)
690{
691 if (!tc_can_offload_extack(dev, common->extack))
692 return false;
693 if (common->chain_index) {
694 NL_SET_ERR_MSG(common->extack,
695 "Driver supports only offload of chain 0");
696 return false;
697 }
698 return true;
699}
700
55330f05
HHZ
701static inline bool tc_skip_hw(u32 flags)
702{
703 return (flags & TCA_CLS_FLAGS_SKIP_HW) ? true : false;
704}
705
d34e3e18
SS
706static inline bool tc_skip_sw(u32 flags)
707{
708 return (flags & TCA_CLS_FLAGS_SKIP_SW) ? true : false;
709}
710
711/* SKIP_HW and SKIP_SW are mutually exclusive flags. */
712static inline bool tc_flags_valid(u32 flags)
713{
81c7288b
MRL
714 if (flags & ~(TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW |
715 TCA_CLS_FLAGS_VERBOSE))
d34e3e18
SS
716 return false;
717
81c7288b 718 flags &= TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW;
d34e3e18
SS
719 if (!(flags ^ (TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW)))
720 return false;
721
722 return true;
723}
724
e696028a
OG
725static inline bool tc_in_hw(u32 flags)
726{
727 return (flags & TCA_CLS_FLAGS_IN_HW) ? true : false;
728}
729
34832e1c
JK
730static inline void
731tc_cls_common_offload_init(struct tc_cls_common_offload *cls_common,
732 const struct tcf_proto *tp, u32 flags,
733 struct netlink_ext_ack *extack)
734{
735 cls_common->chain_index = tp->chain->index;
736 cls_common->protocol = tp->protocol;
737 cls_common->prio = tp->prio;
81c7288b 738 if (tc_skip_sw(flags) || flags & TCA_CLS_FLAGS_VERBOSE)
34832e1c
JK
739 cls_common->extack = extack;
740}
741
5b33f488
AV
742enum tc_fl_command {
743 TC_CLSFLOWER_REPLACE,
744 TC_CLSFLOWER_DESTROY,
10cbc684 745 TC_CLSFLOWER_STATS,
34738452
JP
746 TC_CLSFLOWER_TMPLT_CREATE,
747 TC_CLSFLOWER_TMPLT_DESTROY,
5b33f488
AV
748};
749
750struct tc_cls_flower_offload {
5fd9fc4e 751 struct tc_cls_common_offload common;
5b33f488 752 enum tc_fl_command command;
8208d21b 753 unsigned long cookie;
8f256622 754 struct flow_rule *rule;
3b1903ef 755 struct flow_stats stats;
384c181e 756 u32 classid;
5b33f488
AV
757};
758
8f256622
PNA
759static inline struct flow_rule *
760tc_cls_flower_offload_flow_rule(struct tc_cls_flower_offload *tc_flow_cmd)
761{
762 return tc_flow_cmd->rule;
763}
764
b87f7936
YG
765enum tc_matchall_command {
766 TC_CLSMATCHALL_REPLACE,
767 TC_CLSMATCHALL_DESTROY,
b7fe4ab8 768 TC_CLSMATCHALL_STATS,
b87f7936
YG
769};
770
771struct tc_cls_matchall_offload {
5fd9fc4e 772 struct tc_cls_common_offload common;
b87f7936 773 enum tc_matchall_command command;
f00cbf19 774 struct flow_rule *rule;
b7fe4ab8 775 struct flow_stats stats;
b87f7936
YG
776 unsigned long cookie;
777};
778
332ae8e2 779enum tc_clsbpf_command {
102740bd 780 TC_CLSBPF_OFFLOAD,
68d64063 781 TC_CLSBPF_STATS,
332ae8e2
JK
782};
783
784struct tc_cls_bpf_offload {
5fd9fc4e 785 struct tc_cls_common_offload common;
332ae8e2
JK
786 enum tc_clsbpf_command command;
787 struct tcf_exts *exts;
788 struct bpf_prog *prog;
102740bd 789 struct bpf_prog *oldprog;
332ae8e2
JK
790 const char *name;
791 bool exts_integrated;
792};
793
4e8b86c0
AN
794struct tc_mqprio_qopt_offload {
795 /* struct tc_mqprio_qopt must always be the first element */
796 struct tc_mqprio_qopt qopt;
797 u16 mode;
798 u16 shaper;
799 u32 flags;
800 u64 min_rate[TC_QOPT_MAX_QUEUE];
801 u64 max_rate[TC_QOPT_MAX_QUEUE];
802};
1045ba77
JHS
803
804/* This structure holds cookie structure that is passed from user
805 * to the kernel for actions and classifiers
806 */
807struct tc_cookie {
808 u8 *data;
809 u32 len;
eec94fdb 810 struct rcu_head rcu;
1045ba77 811};
602f3baf 812
f34b4aac
NF
813struct tc_qopt_offload_stats {
814 struct gnet_stats_basic_packed *bstats;
815 struct gnet_stats_queue *qstats;
816};
817
f971b132
JK
818enum tc_mq_command {
819 TC_MQ_CREATE,
820 TC_MQ_DESTROY,
47c669a4 821 TC_MQ_STATS,
d577a3d2
JK
822 TC_MQ_GRAFT,
823};
824
825struct tc_mq_opt_offload_graft_params {
826 unsigned long queue;
827 u32 child_handle;
f971b132
JK
828};
829
830struct tc_mq_qopt_offload {
831 enum tc_mq_command command;
832 u32 handle;
d577a3d2
JK
833 union {
834 struct tc_qopt_offload_stats stats;
835 struct tc_mq_opt_offload_graft_params graft_params;
836 };
f971b132
JK
837};
838
602f3baf
NF
839enum tc_red_command {
840 TC_RED_REPLACE,
841 TC_RED_DESTROY,
842 TC_RED_STATS,
843 TC_RED_XSTATS,
bf2a752b 844 TC_RED_GRAFT,
602f3baf
NF
845};
846
847struct tc_red_qopt_offload_params {
848 u32 min;
849 u32 max;
850 u32 probability;
c0b7490b 851 u32 limit;
602f3baf 852 bool is_ecn;
190852a5 853 bool is_harddrop;
416ef9b1 854 struct gnet_stats_queue *qstats;
602f3baf 855};
602f3baf
NF
856
857struct tc_red_qopt_offload {
858 enum tc_red_command command;
859 u32 handle;
860 u32 parent;
861 union {
862 struct tc_red_qopt_offload_params set;
f34b4aac 863 struct tc_qopt_offload_stats stats;
602f3baf 864 struct red_stats *xstats;
bf2a752b 865 u32 child_handle;
602f3baf
NF
866 };
867};
868
890d8d23
JK
869enum tc_gred_command {
870 TC_GRED_REPLACE,
871 TC_GRED_DESTROY,
e49efd52 872 TC_GRED_STATS,
890d8d23
JK
873};
874
875struct tc_gred_vq_qopt_offload_params {
876 bool present;
877 u32 limit;
878 u32 prio;
879 u32 min;
880 u32 max;
881 bool is_ecn;
882 bool is_harddrop;
883 u32 probability;
884 /* Only need backlog, see struct tc_prio_qopt_offload_params */
885 u32 *backlog;
886};
887
888struct tc_gred_qopt_offload_params {
889 bool grio_on;
890 bool wred_on;
891 unsigned int dp_cnt;
892 unsigned int dp_def;
893 struct gnet_stats_queue *qstats;
894 struct tc_gred_vq_qopt_offload_params tab[MAX_DPs];
895};
896
e49efd52
JK
897struct tc_gred_qopt_offload_stats {
898 struct gnet_stats_basic_packed bstats[MAX_DPs];
899 struct gnet_stats_queue qstats[MAX_DPs];
900 struct red_stats *xstats[MAX_DPs];
901};
902
890d8d23
JK
903struct tc_gred_qopt_offload {
904 enum tc_gred_command command;
905 u32 handle;
906 u32 parent;
907 union {
908 struct tc_gred_qopt_offload_params set;
e49efd52 909 struct tc_gred_qopt_offload_stats stats;
890d8d23
JK
910 };
911};
912
7fdb61b4
NF
913enum tc_prio_command {
914 TC_PRIO_REPLACE,
915 TC_PRIO_DESTROY,
916 TC_PRIO_STATS,
b9c7a7ac 917 TC_PRIO_GRAFT,
7fdb61b4
NF
918};
919
920struct tc_prio_qopt_offload_params {
921 int bands;
922 u8 priomap[TC_PRIO_MAX + 1];
923 /* In case that a prio qdisc is offloaded and now is changed to a
924 * non-offloadedable config, it needs to update the backlog & qlen
925 * values to negate the HW backlog & qlen values (and only them).
926 */
927 struct gnet_stats_queue *qstats;
928};
929
b9c7a7ac
NF
930struct tc_prio_qopt_offload_graft_params {
931 u8 band;
932 u32 child_handle;
933};
934
7fdb61b4
NF
935struct tc_prio_qopt_offload {
936 enum tc_prio_command command;
937 u32 handle;
938 u32 parent;
939 union {
940 struct tc_prio_qopt_offload_params replace_params;
941 struct tc_qopt_offload_stats stats;
b9c7a7ac 942 struct tc_prio_qopt_offload_graft_params graft_params;
7fdb61b4
NF
943 };
944};
b9c7a7ac 945
98b0e5f6
JK
946enum tc_root_command {
947 TC_ROOT_GRAFT,
948};
949
950struct tc_root_qopt_offload {
951 enum tc_root_command command;
952 u32 handle;
953 bool ingress;
954};
955
1da177e4 956#endif