xref: /openbmc/linux/include/net/pkt_cls.h (revision 78beef62)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef __NET_PKT_CLS_H
3 #define __NET_PKT_CLS_H
4 
5 #include <linux/pkt_cls.h>
6 #include <linux/workqueue.h>
7 #include <net/sch_generic.h>
8 #include <net/act_api.h>
9 #include <net/net_namespace.h>
10 
11 /* TC action not accessible from user space */
12 #define TC_ACT_CONSUMED		(TC_ACT_VALUE_MAX + 1)
13 
14 /* Basic packet classifier frontend definitions. */
15 
16 struct tcf_walker {
17 	int	stop;
18 	int	skip;
19 	int	count;
20 	bool	nonempty;
21 	unsigned long cookie;
22 	int	(*fn)(struct tcf_proto *, void *node, struct tcf_walker *);
23 };
24 
25 int register_tcf_proto_ops(struct tcf_proto_ops *ops);
26 int unregister_tcf_proto_ops(struct tcf_proto_ops *ops);
27 
28 struct tcf_block_ext_info {
29 	enum flow_block_binder_type binder_type;
30 	tcf_chain_head_change_t *chain_head_change;
31 	void *chain_head_change_priv;
32 	u32 block_index;
33 };
34 
35 struct tcf_block_cb;
36 bool tcf_queue_work(struct rcu_work *rwork, work_func_t func);
37 
38 #ifdef CONFIG_NET_CLS
39 struct tcf_chain *tcf_chain_get_by_act(struct tcf_block *block,
40 				       u32 chain_index);
41 void tcf_chain_put_by_act(struct tcf_chain *chain);
42 struct tcf_chain *tcf_get_next_chain(struct tcf_block *block,
43 				     struct tcf_chain *chain);
44 struct tcf_proto *tcf_get_next_proto(struct tcf_chain *chain,
45 				     struct tcf_proto *tp, bool rtnl_held);
46 void tcf_block_netif_keep_dst(struct tcf_block *block);
47 int tcf_block_get(struct tcf_block **p_block,
48 		  struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
49 		  struct netlink_ext_ack *extack);
50 int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
51 		      struct tcf_block_ext_info *ei,
52 		      struct netlink_ext_ack *extack);
53 void tcf_block_put(struct tcf_block *block);
54 void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
55 		       struct tcf_block_ext_info *ei);
56 
57 static inline bool tcf_block_shared(struct tcf_block *block)
58 {
59 	return block->index;
60 }
61 
62 static inline bool tcf_block_non_null_shared(struct tcf_block *block)
63 {
64 	return block && block->index;
65 }
66 
67 static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
68 {
69 	WARN_ON(tcf_block_shared(block));
70 	return block->q;
71 }
72 
73 int tcf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
74 		 struct tcf_result *res, bool compat_mode);
75 
76 #else
77 static inline bool tcf_block_shared(struct tcf_block *block)
78 {
79 	return false;
80 }
81 
82 static inline bool tcf_block_non_null_shared(struct tcf_block *block)
83 {
84 	return false;
85 }
86 
87 static inline
88 int tcf_block_get(struct tcf_block **p_block,
89 		  struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
90 		  struct netlink_ext_ack *extack)
91 {
92 	return 0;
93 }
94 
95 static inline
96 int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
97 		      struct tcf_block_ext_info *ei,
98 		      struct netlink_ext_ack *extack)
99 {
100 	return 0;
101 }
102 
103 static inline void tcf_block_put(struct tcf_block *block)
104 {
105 }
106 
107 static inline
108 void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
109 		       struct tcf_block_ext_info *ei)
110 {
111 }
112 
113 static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
114 {
115 	return NULL;
116 }
117 
118 static inline
119 int tc_setup_cb_block_register(struct tcf_block *block, flow_setup_cb_t *cb,
120 			       void *cb_priv)
121 {
122 	return 0;
123 }
124 
125 static inline
126 void tc_setup_cb_block_unregister(struct tcf_block *block, flow_setup_cb_t *cb,
127 				  void *cb_priv)
128 {
129 }
130 
131 static inline int tcf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
132 			       struct tcf_result *res, bool compat_mode)
133 {
134 	return TC_ACT_UNSPEC;
135 }
136 #endif
137 
138 static inline unsigned long
139 __cls_set_class(unsigned long *clp, unsigned long cl)
140 {
141 	return xchg(clp, cl);
142 }
143 
144 static inline unsigned long
145 cls_set_class(struct Qdisc *q, unsigned long *clp, unsigned long cl)
146 {
147 	unsigned long old_cl;
148 
149 	sch_tree_lock(q);
150 	old_cl = __cls_set_class(clp, cl);
151 	sch_tree_unlock(q);
152 	return old_cl;
153 }
154 
155 static inline void
156 tcf_bind_filter(struct tcf_proto *tp, struct tcf_result *r, unsigned long base)
157 {
158 	struct Qdisc *q = tp->chain->block->q;
159 	unsigned long cl;
160 
161 	/* Check q as it is not set for shared blocks. In that case,
162 	 * setting class is not supported.
163 	 */
164 	if (!q)
165 		return;
166 	cl = q->ops->cl_ops->bind_tcf(q, base, r->classid);
167 	cl = cls_set_class(q, &r->class, cl);
168 	if (cl)
169 		q->ops->cl_ops->unbind_tcf(q, cl);
170 }
171 
172 static inline void
173 tcf_unbind_filter(struct tcf_proto *tp, struct tcf_result *r)
174 {
175 	struct Qdisc *q = tp->chain->block->q;
176 	unsigned long cl;
177 
178 	if (!q)
179 		return;
180 	if ((cl = __cls_set_class(&r->class, 0)) != 0)
181 		q->ops->cl_ops->unbind_tcf(q, cl);
182 }
183 
184 struct tcf_exts {
185 #ifdef CONFIG_NET_CLS_ACT
186 	__u32	type; /* for backward compat(TCA_OLD_COMPAT) */
187 	int nr_actions;
188 	struct tc_action **actions;
189 	struct net *net;
190 #endif
191 	/* Map to export classifier specific extension TLV types to the
192 	 * generic extensions API. Unsupported extensions must be set to 0.
193 	 */
194 	int action;
195 	int police;
196 };
197 
198 static inline int tcf_exts_init(struct tcf_exts *exts, struct net *net,
199 				int action, int police)
200 {
201 #ifdef CONFIG_NET_CLS_ACT
202 	exts->type = 0;
203 	exts->nr_actions = 0;
204 	exts->net = net;
205 	exts->actions = kcalloc(TCA_ACT_MAX_PRIO, sizeof(struct tc_action *),
206 				GFP_KERNEL);
207 	if (!exts->actions)
208 		return -ENOMEM;
209 #endif
210 	exts->action = action;
211 	exts->police = police;
212 	return 0;
213 }
214 
215 /* Return false if the netns is being destroyed in cleanup_net(). Callers
216  * need to do cleanup synchronously in this case, otherwise may race with
217  * tc_action_net_exit(). Return true for other cases.
218  */
219 static inline bool tcf_exts_get_net(struct tcf_exts *exts)
220 {
221 #ifdef CONFIG_NET_CLS_ACT
222 	exts->net = maybe_get_net(exts->net);
223 	return exts->net != NULL;
224 #else
225 	return true;
226 #endif
227 }
228 
229 static inline void tcf_exts_put_net(struct tcf_exts *exts)
230 {
231 #ifdef CONFIG_NET_CLS_ACT
232 	if (exts->net)
233 		put_net(exts->net);
234 #endif
235 }
236 
237 #ifdef CONFIG_NET_CLS_ACT
238 #define tcf_exts_for_each_action(i, a, exts) \
239 	for (i = 0; i < TCA_ACT_MAX_PRIO && ((a) = (exts)->actions[i]); i++)
240 #else
241 #define tcf_exts_for_each_action(i, a, exts) \
242 	for (; 0; (void)(i), (void)(a), (void)(exts))
243 #endif
244 
245 static inline void
246 tcf_exts_stats_update(const struct tcf_exts *exts,
247 		      u64 bytes, u64 packets, u64 lastuse)
248 {
249 #ifdef CONFIG_NET_CLS_ACT
250 	int i;
251 
252 	preempt_disable();
253 
254 	for (i = 0; i < exts->nr_actions; i++) {
255 		struct tc_action *a = exts->actions[i];
256 
257 		tcf_action_stats_update(a, bytes, packets, lastuse, true);
258 	}
259 
260 	preempt_enable();
261 #endif
262 }
263 
264 /**
265  * tcf_exts_has_actions - check if at least one action is present
266  * @exts: tc filter extensions handle
267  *
268  * Returns true if at least one action is present.
269  */
270 static inline bool tcf_exts_has_actions(struct tcf_exts *exts)
271 {
272 #ifdef CONFIG_NET_CLS_ACT
273 	return exts->nr_actions;
274 #else
275 	return false;
276 #endif
277 }
278 
279 /**
280  * tcf_exts_exec - execute tc filter extensions
281  * @skb: socket buffer
282  * @exts: tc filter extensions handle
283  * @res: desired result
284  *
285  * Executes all configured extensions. Returns TC_ACT_OK on a normal execution,
286  * a negative number if the filter must be considered unmatched or
287  * a positive action code (TC_ACT_*) which must be returned to the
288  * underlying layer.
289  */
290 static inline int
291 tcf_exts_exec(struct sk_buff *skb, struct tcf_exts *exts,
292 	      struct tcf_result *res)
293 {
294 #ifdef CONFIG_NET_CLS_ACT
295 	return tcf_action_exec(skb, exts->actions, exts->nr_actions, res);
296 #endif
297 	return TC_ACT_OK;
298 }
299 
300 int tcf_exts_validate(struct net *net, struct tcf_proto *tp,
301 		      struct nlattr **tb, struct nlattr *rate_tlv,
302 		      struct tcf_exts *exts, bool ovr, bool rtnl_held,
303 		      struct netlink_ext_ack *extack);
304 void tcf_exts_destroy(struct tcf_exts *exts);
305 void tcf_exts_change(struct tcf_exts *dst, struct tcf_exts *src);
306 int tcf_exts_dump(struct sk_buff *skb, struct tcf_exts *exts);
307 int tcf_exts_dump_stats(struct sk_buff *skb, struct tcf_exts *exts);
308 
309 /**
310  * struct tcf_pkt_info - packet information
311  */
312 struct tcf_pkt_info {
313 	unsigned char *		ptr;
314 	int			nexthdr;
315 };
316 
317 #ifdef CONFIG_NET_EMATCH
318 
319 struct tcf_ematch_ops;
320 
321 /**
322  * struct tcf_ematch - extended match (ematch)
323  *
324  * @matchid: identifier to allow userspace to reidentify a match
325  * @flags: flags specifying attributes and the relation to other matches
326  * @ops: the operations lookup table of the corresponding ematch module
327  * @datalen: length of the ematch specific configuration data
328  * @data: ematch specific data
329  */
330 struct tcf_ematch {
331 	struct tcf_ematch_ops * ops;
332 	unsigned long		data;
333 	unsigned int		datalen;
334 	u16			matchid;
335 	u16			flags;
336 	struct net		*net;
337 };
338 
339 static inline int tcf_em_is_container(struct tcf_ematch *em)
340 {
341 	return !em->ops;
342 }
343 
344 static inline int tcf_em_is_simple(struct tcf_ematch *em)
345 {
346 	return em->flags & TCF_EM_SIMPLE;
347 }
348 
349 static inline int tcf_em_is_inverted(struct tcf_ematch *em)
350 {
351 	return em->flags & TCF_EM_INVERT;
352 }
353 
354 static inline int tcf_em_last_match(struct tcf_ematch *em)
355 {
356 	return (em->flags & TCF_EM_REL_MASK) == TCF_EM_REL_END;
357 }
358 
359 static inline int tcf_em_early_end(struct tcf_ematch *em, int result)
360 {
361 	if (tcf_em_last_match(em))
362 		return 1;
363 
364 	if (result == 0 && em->flags & TCF_EM_REL_AND)
365 		return 1;
366 
367 	if (result != 0 && em->flags & TCF_EM_REL_OR)
368 		return 1;
369 
370 	return 0;
371 }
372 
373 /**
374  * struct tcf_ematch_tree - ematch tree handle
375  *
376  * @hdr: ematch tree header supplied by userspace
377  * @matches: array of ematches
378  */
379 struct tcf_ematch_tree {
380 	struct tcf_ematch_tree_hdr hdr;
381 	struct tcf_ematch *	matches;
382 
383 };
384 
385 /**
386  * struct tcf_ematch_ops - ematch module operations
387  *
388  * @kind: identifier (kind) of this ematch module
389  * @datalen: length of expected configuration data (optional)
390  * @change: called during validation (optional)
391  * @match: called during ematch tree evaluation, must return 1/0
392  * @destroy: called during destroyage (optional)
393  * @dump: called during dumping process (optional)
394  * @owner: owner, must be set to THIS_MODULE
395  * @link: link to previous/next ematch module (internal use)
396  */
397 struct tcf_ematch_ops {
398 	int			kind;
399 	int			datalen;
400 	int			(*change)(struct net *net, void *,
401 					  int, struct tcf_ematch *);
402 	int			(*match)(struct sk_buff *, struct tcf_ematch *,
403 					 struct tcf_pkt_info *);
404 	void			(*destroy)(struct tcf_ematch *);
405 	int			(*dump)(struct sk_buff *, struct tcf_ematch *);
406 	struct module		*owner;
407 	struct list_head	link;
408 };
409 
410 int tcf_em_register(struct tcf_ematch_ops *);
411 void tcf_em_unregister(struct tcf_ematch_ops *);
412 int tcf_em_tree_validate(struct tcf_proto *, struct nlattr *,
413 			 struct tcf_ematch_tree *);
414 void tcf_em_tree_destroy(struct tcf_ematch_tree *);
415 int tcf_em_tree_dump(struct sk_buff *, struct tcf_ematch_tree *, int);
416 int __tcf_em_tree_match(struct sk_buff *, struct tcf_ematch_tree *,
417 			struct tcf_pkt_info *);
418 
419 /**
420  * tcf_em_tree_match - evaulate an ematch tree
421  *
422  * @skb: socket buffer of the packet in question
423  * @tree: ematch tree to be used for evaluation
424  * @info: packet information examined by classifier
425  *
426  * This function matches @skb against the ematch tree in @tree by going
427  * through all ematches respecting their logic relations returning
428  * as soon as the result is obvious.
429  *
430  * Returns 1 if the ematch tree as-one matches, no ematches are configured
431  * or ematch is not enabled in the kernel, otherwise 0 is returned.
432  */
433 static inline int tcf_em_tree_match(struct sk_buff *skb,
434 				    struct tcf_ematch_tree *tree,
435 				    struct tcf_pkt_info *info)
436 {
437 	if (tree->hdr.nmatches)
438 		return __tcf_em_tree_match(skb, tree, info);
439 	else
440 		return 1;
441 }
442 
443 #define MODULE_ALIAS_TCF_EMATCH(kind)	MODULE_ALIAS("ematch-kind-" __stringify(kind))
444 
445 #else /* CONFIG_NET_EMATCH */
446 
447 struct tcf_ematch_tree {
448 };
449 
450 #define tcf_em_tree_validate(tp, tb, t) ((void)(t), 0)
451 #define tcf_em_tree_destroy(t) do { (void)(t); } while(0)
452 #define tcf_em_tree_dump(skb, t, tlv) (0)
453 #define tcf_em_tree_match(skb, t, info) ((void)(info), 1)
454 
455 #endif /* CONFIG_NET_EMATCH */
456 
457 static inline unsigned char * tcf_get_base_ptr(struct sk_buff *skb, int layer)
458 {
459 	switch (layer) {
460 		case TCF_LAYER_LINK:
461 			return skb_mac_header(skb);
462 		case TCF_LAYER_NETWORK:
463 			return skb_network_header(skb);
464 		case TCF_LAYER_TRANSPORT:
465 			return skb_transport_header(skb);
466 	}
467 
468 	return NULL;
469 }
470 
471 static inline int tcf_valid_offset(const struct sk_buff *skb,
472 				   const unsigned char *ptr, const int len)
473 {
474 	return likely((ptr + len) <= skb_tail_pointer(skb) &&
475 		      ptr >= skb->head &&
476 		      (ptr <= (ptr + len)));
477 }
478 
479 static inline int
480 tcf_change_indev(struct net *net, struct nlattr *indev_tlv,
481 		 struct netlink_ext_ack *extack)
482 {
483 	char indev[IFNAMSIZ];
484 	struct net_device *dev;
485 
486 	if (nla_strlcpy(indev, indev_tlv, IFNAMSIZ) >= IFNAMSIZ) {
487 		NL_SET_ERR_MSG(extack, "Interface name too long");
488 		return -EINVAL;
489 	}
490 	dev = __dev_get_by_name(net, indev);
491 	if (!dev)
492 		return -ENODEV;
493 	return dev->ifindex;
494 }
495 
496 static inline bool
497 tcf_match_indev(struct sk_buff *skb, int ifindex)
498 {
499 	if (!ifindex)
500 		return true;
501 	if  (!skb->skb_iif)
502 		return false;
503 	return ifindex == skb->skb_iif;
504 }
505 
506 int tc_setup_flow_action(struct flow_action *flow_action,
507 			 const struct tcf_exts *exts, bool rtnl_held);
508 void tc_cleanup_flow_action(struct flow_action *flow_action);
509 
510 int tc_setup_cb_call(struct tcf_block *block, enum tc_setup_type type,
511 		     void *type_data, bool err_stop, bool rtnl_held);
512 int tc_setup_cb_add(struct tcf_block *block, struct tcf_proto *tp,
513 		    enum tc_setup_type type, void *type_data, bool err_stop,
514 		    u32 *flags, unsigned int *in_hw_count, bool rtnl_held);
515 int tc_setup_cb_replace(struct tcf_block *block, struct tcf_proto *tp,
516 			enum tc_setup_type type, void *type_data, bool err_stop,
517 			u32 *old_flags, unsigned int *old_in_hw_count,
518 			u32 *new_flags, unsigned int *new_in_hw_count,
519 			bool rtnl_held);
520 int tc_setup_cb_destroy(struct tcf_block *block, struct tcf_proto *tp,
521 			enum tc_setup_type type, void *type_data, bool err_stop,
522 			u32 *flags, unsigned int *in_hw_count, bool rtnl_held);
523 int tc_setup_cb_reoffload(struct tcf_block *block, struct tcf_proto *tp,
524 			  bool add, flow_setup_cb_t *cb,
525 			  enum tc_setup_type type, void *type_data,
526 			  void *cb_priv, u32 *flags, unsigned int *in_hw_count);
527 unsigned int tcf_exts_num_actions(struct tcf_exts *exts);
528 
529 struct tc_cls_u32_knode {
530 	struct tcf_exts *exts;
531 	struct tcf_result *res;
532 	struct tc_u32_sel *sel;
533 	u32 handle;
534 	u32 val;
535 	u32 mask;
536 	u32 link_handle;
537 	u8 fshift;
538 };
539 
540 struct tc_cls_u32_hnode {
541 	u32 handle;
542 	u32 prio;
543 	unsigned int divisor;
544 };
545 
546 enum tc_clsu32_command {
547 	TC_CLSU32_NEW_KNODE,
548 	TC_CLSU32_REPLACE_KNODE,
549 	TC_CLSU32_DELETE_KNODE,
550 	TC_CLSU32_NEW_HNODE,
551 	TC_CLSU32_REPLACE_HNODE,
552 	TC_CLSU32_DELETE_HNODE,
553 };
554 
555 struct tc_cls_u32_offload {
556 	struct flow_cls_common_offload common;
557 	/* knode values */
558 	enum tc_clsu32_command command;
559 	union {
560 		struct tc_cls_u32_knode knode;
561 		struct tc_cls_u32_hnode hnode;
562 	};
563 };
564 
565 static inline bool tc_can_offload(const struct net_device *dev)
566 {
567 	return dev->features & NETIF_F_HW_TC;
568 }
569 
570 static inline bool tc_can_offload_extack(const struct net_device *dev,
571 					 struct netlink_ext_ack *extack)
572 {
573 	bool can = tc_can_offload(dev);
574 
575 	if (!can)
576 		NL_SET_ERR_MSG(extack, "TC offload is disabled on net device");
577 
578 	return can;
579 }
580 
581 static inline bool
582 tc_cls_can_offload_and_chain0(const struct net_device *dev,
583 			      struct flow_cls_common_offload *common)
584 {
585 	if (!tc_can_offload_extack(dev, common->extack))
586 		return false;
587 	if (common->chain_index) {
588 		NL_SET_ERR_MSG(common->extack,
589 			       "Driver supports only offload of chain 0");
590 		return false;
591 	}
592 	return true;
593 }
594 
595 static inline bool tc_skip_hw(u32 flags)
596 {
597 	return (flags & TCA_CLS_FLAGS_SKIP_HW) ? true : false;
598 }
599 
600 static inline bool tc_skip_sw(u32 flags)
601 {
602 	return (flags & TCA_CLS_FLAGS_SKIP_SW) ? true : false;
603 }
604 
605 /* SKIP_HW and SKIP_SW are mutually exclusive flags. */
606 static inline bool tc_flags_valid(u32 flags)
607 {
608 	if (flags & ~(TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW |
609 		      TCA_CLS_FLAGS_VERBOSE))
610 		return false;
611 
612 	flags &= TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW;
613 	if (!(flags ^ (TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW)))
614 		return false;
615 
616 	return true;
617 }
618 
619 static inline bool tc_in_hw(u32 flags)
620 {
621 	return (flags & TCA_CLS_FLAGS_IN_HW) ? true : false;
622 }
623 
624 static inline void
625 tc_cls_common_offload_init(struct flow_cls_common_offload *cls_common,
626 			   const struct tcf_proto *tp, u32 flags,
627 			   struct netlink_ext_ack *extack)
628 {
629 	cls_common->chain_index = tp->chain->index;
630 	cls_common->protocol = tp->protocol;
631 	cls_common->prio = tp->prio >> 16;
632 	if (tc_skip_sw(flags) || flags & TCA_CLS_FLAGS_VERBOSE)
633 		cls_common->extack = extack;
634 }
635 
636 enum tc_matchall_command {
637 	TC_CLSMATCHALL_REPLACE,
638 	TC_CLSMATCHALL_DESTROY,
639 	TC_CLSMATCHALL_STATS,
640 };
641 
642 struct tc_cls_matchall_offload {
643 	struct flow_cls_common_offload common;
644 	enum tc_matchall_command command;
645 	struct flow_rule *rule;
646 	struct flow_stats stats;
647 	unsigned long cookie;
648 };
649 
650 enum tc_clsbpf_command {
651 	TC_CLSBPF_OFFLOAD,
652 	TC_CLSBPF_STATS,
653 };
654 
655 struct tc_cls_bpf_offload {
656 	struct flow_cls_common_offload common;
657 	enum tc_clsbpf_command command;
658 	struct tcf_exts *exts;
659 	struct bpf_prog *prog;
660 	struct bpf_prog *oldprog;
661 	const char *name;
662 	bool exts_integrated;
663 };
664 
665 struct tc_mqprio_qopt_offload {
666 	/* struct tc_mqprio_qopt must always be the first element */
667 	struct tc_mqprio_qopt qopt;
668 	u16 mode;
669 	u16 shaper;
670 	u32 flags;
671 	u64 min_rate[TC_QOPT_MAX_QUEUE];
672 	u64 max_rate[TC_QOPT_MAX_QUEUE];
673 };
674 
675 /* This structure holds cookie structure that is passed from user
676  * to the kernel for actions and classifiers
677  */
678 struct tc_cookie {
679 	u8  *data;
680 	u32 len;
681 	struct rcu_head rcu;
682 };
683 
684 struct tc_qopt_offload_stats {
685 	struct gnet_stats_basic_packed *bstats;
686 	struct gnet_stats_queue *qstats;
687 };
688 
689 enum tc_mq_command {
690 	TC_MQ_CREATE,
691 	TC_MQ_DESTROY,
692 	TC_MQ_STATS,
693 	TC_MQ_GRAFT,
694 };
695 
696 struct tc_mq_opt_offload_graft_params {
697 	unsigned long queue;
698 	u32 child_handle;
699 };
700 
701 struct tc_mq_qopt_offload {
702 	enum tc_mq_command command;
703 	u32 handle;
704 	union {
705 		struct tc_qopt_offload_stats stats;
706 		struct tc_mq_opt_offload_graft_params graft_params;
707 	};
708 };
709 
710 enum tc_red_command {
711 	TC_RED_REPLACE,
712 	TC_RED_DESTROY,
713 	TC_RED_STATS,
714 	TC_RED_XSTATS,
715 	TC_RED_GRAFT,
716 };
717 
718 struct tc_red_qopt_offload_params {
719 	u32 min;
720 	u32 max;
721 	u32 probability;
722 	u32 limit;
723 	bool is_ecn;
724 	bool is_harddrop;
725 	struct gnet_stats_queue *qstats;
726 };
727 
728 struct tc_red_qopt_offload {
729 	enum tc_red_command command;
730 	u32 handle;
731 	u32 parent;
732 	union {
733 		struct tc_red_qopt_offload_params set;
734 		struct tc_qopt_offload_stats stats;
735 		struct red_stats *xstats;
736 		u32 child_handle;
737 	};
738 };
739 
740 enum tc_gred_command {
741 	TC_GRED_REPLACE,
742 	TC_GRED_DESTROY,
743 	TC_GRED_STATS,
744 };
745 
746 struct tc_gred_vq_qopt_offload_params {
747 	bool present;
748 	u32 limit;
749 	u32 prio;
750 	u32 min;
751 	u32 max;
752 	bool is_ecn;
753 	bool is_harddrop;
754 	u32 probability;
755 	/* Only need backlog, see struct tc_prio_qopt_offload_params */
756 	u32 *backlog;
757 };
758 
759 struct tc_gred_qopt_offload_params {
760 	bool grio_on;
761 	bool wred_on;
762 	unsigned int dp_cnt;
763 	unsigned int dp_def;
764 	struct gnet_stats_queue *qstats;
765 	struct tc_gred_vq_qopt_offload_params tab[MAX_DPs];
766 };
767 
768 struct tc_gred_qopt_offload_stats {
769 	struct gnet_stats_basic_packed bstats[MAX_DPs];
770 	struct gnet_stats_queue qstats[MAX_DPs];
771 	struct red_stats *xstats[MAX_DPs];
772 };
773 
774 struct tc_gred_qopt_offload {
775 	enum tc_gred_command command;
776 	u32 handle;
777 	u32 parent;
778 	union {
779 		struct tc_gred_qopt_offload_params set;
780 		struct tc_gred_qopt_offload_stats stats;
781 	};
782 };
783 
784 enum tc_prio_command {
785 	TC_PRIO_REPLACE,
786 	TC_PRIO_DESTROY,
787 	TC_PRIO_STATS,
788 	TC_PRIO_GRAFT,
789 };
790 
791 struct tc_prio_qopt_offload_params {
792 	int bands;
793 	u8 priomap[TC_PRIO_MAX + 1];
794 	/* In case that a prio qdisc is offloaded and now is changed to a
795 	 * non-offloadedable config, it needs to update the backlog & qlen
796 	 * values to negate the HW backlog & qlen values (and only them).
797 	 */
798 	struct gnet_stats_queue *qstats;
799 };
800 
801 struct tc_prio_qopt_offload_graft_params {
802 	u8 band;
803 	u32 child_handle;
804 };
805 
806 struct tc_prio_qopt_offload {
807 	enum tc_prio_command command;
808 	u32 handle;
809 	u32 parent;
810 	union {
811 		struct tc_prio_qopt_offload_params replace_params;
812 		struct tc_qopt_offload_stats stats;
813 		struct tc_prio_qopt_offload_graft_params graft_params;
814 	};
815 };
816 
817 enum tc_root_command {
818 	TC_ROOT_GRAFT,
819 };
820 
821 struct tc_root_qopt_offload {
822 	enum tc_root_command command;
823 	u32 handle;
824 	bool ingress;
825 };
826 
827 #endif
828