xref: /linux/include/net/pkt_cls.h (revision 10a708c24a31ae1be1ea23d1c38da2691d1fd65c)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef __NET_PKT_CLS_H
3 #define __NET_PKT_CLS_H
4 
5 #include <linux/pkt_cls.h>
6 #include <linux/workqueue.h>
7 #include <net/sch_generic.h>
8 #include <net/act_api.h>
9 #include <net/net_namespace.h>
10 
11 /* TC action not accessible from user space */
12 #define TC_ACT_CONSUMED		(TC_ACT_VALUE_MAX + 1)
13 
14 /* Basic packet classifier frontend definitions. */
15 
16 struct tcf_walker {
17 	int	stop;
18 	int	skip;
19 	int	count;
20 	bool	nonempty;
21 	unsigned long cookie;
22 	int	(*fn)(struct tcf_proto *, void *node, struct tcf_walker *);
23 };
24 
25 int register_tcf_proto_ops(struct tcf_proto_ops *ops);
26 int unregister_tcf_proto_ops(struct tcf_proto_ops *ops);
27 
28 struct tcf_block_ext_info {
29 	enum flow_block_binder_type binder_type;
30 	tcf_chain_head_change_t *chain_head_change;
31 	void *chain_head_change_priv;
32 	u32 block_index;
33 };
34 
35 struct tcf_block_cb;
36 bool tcf_queue_work(struct rcu_work *rwork, work_func_t func);
37 
38 #ifdef CONFIG_NET_CLS
39 struct tcf_chain *tcf_chain_get_by_act(struct tcf_block *block,
40 				       u32 chain_index);
41 void tcf_chain_put_by_act(struct tcf_chain *chain);
42 struct tcf_chain *tcf_get_next_chain(struct tcf_block *block,
43 				     struct tcf_chain *chain);
44 struct tcf_proto *tcf_get_next_proto(struct tcf_chain *chain,
45 				     struct tcf_proto *tp, bool rtnl_held);
46 void tcf_block_netif_keep_dst(struct tcf_block *block);
47 int tcf_block_get(struct tcf_block **p_block,
48 		  struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
49 		  struct netlink_ext_ack *extack);
50 int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
51 		      struct tcf_block_ext_info *ei,
52 		      struct netlink_ext_ack *extack);
53 void tcf_block_put(struct tcf_block *block);
54 void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
55 		       struct tcf_block_ext_info *ei);
56 
57 static inline bool tcf_block_shared(struct tcf_block *block)
58 {
59 	return block->index;
60 }
61 
62 static inline bool tcf_block_non_null_shared(struct tcf_block *block)
63 {
64 	return block && block->index;
65 }
66 
67 static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
68 {
69 	WARN_ON(tcf_block_shared(block));
70 	return block->q;
71 }
72 
73 int tcf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
74 		 struct tcf_result *res, bool compat_mode);
75 
76 #else
77 static inline bool tcf_block_shared(struct tcf_block *block)
78 {
79 	return false;
80 }
81 
82 static inline bool tcf_block_non_null_shared(struct tcf_block *block)
83 {
84 	return false;
85 }
86 
87 static inline
88 int tcf_block_get(struct tcf_block **p_block,
89 		  struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
90 		  struct netlink_ext_ack *extack)
91 {
92 	return 0;
93 }
94 
95 static inline
96 int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
97 		      struct tcf_block_ext_info *ei,
98 		      struct netlink_ext_ack *extack)
99 {
100 	return 0;
101 }
102 
103 static inline void tcf_block_put(struct tcf_block *block)
104 {
105 }
106 
107 static inline
108 void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
109 		       struct tcf_block_ext_info *ei)
110 {
111 }
112 
113 static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
114 {
115 	return NULL;
116 }
117 
118 static inline
119 int tc_setup_cb_block_register(struct tcf_block *block, flow_setup_cb_t *cb,
120 			       void *cb_priv)
121 {
122 	return 0;
123 }
124 
125 static inline
126 void tc_setup_cb_block_unregister(struct tcf_block *block, flow_setup_cb_t *cb,
127 				  void *cb_priv)
128 {
129 }
130 
131 static inline int tcf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
132 			       struct tcf_result *res, bool compat_mode)
133 {
134 	return TC_ACT_UNSPEC;
135 }
136 #endif
137 
138 static inline unsigned long
139 __cls_set_class(unsigned long *clp, unsigned long cl)
140 {
141 	return xchg(clp, cl);
142 }
143 
144 static inline unsigned long
145 cls_set_class(struct Qdisc *q, unsigned long *clp, unsigned long cl)
146 {
147 	unsigned long old_cl;
148 
149 	sch_tree_lock(q);
150 	old_cl = __cls_set_class(clp, cl);
151 	sch_tree_unlock(q);
152 	return old_cl;
153 }
154 
155 static inline void
156 tcf_bind_filter(struct tcf_proto *tp, struct tcf_result *r, unsigned long base)
157 {
158 	struct Qdisc *q = tp->chain->block->q;
159 	unsigned long cl;
160 
161 	/* Check q as it is not set for shared blocks. In that case,
162 	 * setting class is not supported.
163 	 */
164 	if (!q)
165 		return;
166 	cl = q->ops->cl_ops->bind_tcf(q, base, r->classid);
167 	cl = cls_set_class(q, &r->class, cl);
168 	if (cl)
169 		q->ops->cl_ops->unbind_tcf(q, cl);
170 }
171 
172 static inline void
173 tcf_unbind_filter(struct tcf_proto *tp, struct tcf_result *r)
174 {
175 	struct Qdisc *q = tp->chain->block->q;
176 	unsigned long cl;
177 
178 	if (!q)
179 		return;
180 	if ((cl = __cls_set_class(&r->class, 0)) != 0)
181 		q->ops->cl_ops->unbind_tcf(q, cl);
182 }
183 
184 struct tcf_exts {
185 #ifdef CONFIG_NET_CLS_ACT
186 	__u32	type; /* for backward compat(TCA_OLD_COMPAT) */
187 	int nr_actions;
188 	struct tc_action **actions;
189 	struct net *net;
190 #endif
191 	/* Map to export classifier specific extension TLV types to the
192 	 * generic extensions API. Unsupported extensions must be set to 0.
193 	 */
194 	int action;
195 	int police;
196 };
197 
198 static inline int tcf_exts_init(struct tcf_exts *exts, struct net *net,
199 				int action, int police)
200 {
201 #ifdef CONFIG_NET_CLS_ACT
202 	exts->type = 0;
203 	exts->nr_actions = 0;
204 	exts->net = net;
205 	exts->actions = kcalloc(TCA_ACT_MAX_PRIO, sizeof(struct tc_action *),
206 				GFP_KERNEL);
207 	if (!exts->actions)
208 		return -ENOMEM;
209 #endif
210 	exts->action = action;
211 	exts->police = police;
212 	return 0;
213 }
214 
215 /* Return false if the netns is being destroyed in cleanup_net(). Callers
216  * need to do cleanup synchronously in this case, otherwise may race with
217  * tc_action_net_exit(). Return true for other cases.
218  */
219 static inline bool tcf_exts_get_net(struct tcf_exts *exts)
220 {
221 #ifdef CONFIG_NET_CLS_ACT
222 	exts->net = maybe_get_net(exts->net);
223 	return exts->net != NULL;
224 #else
225 	return true;
226 #endif
227 }
228 
229 static inline void tcf_exts_put_net(struct tcf_exts *exts)
230 {
231 #ifdef CONFIG_NET_CLS_ACT
232 	if (exts->net)
233 		put_net(exts->net);
234 #endif
235 }
236 
237 #ifdef CONFIG_NET_CLS_ACT
238 #define tcf_exts_for_each_action(i, a, exts) \
239 	for (i = 0; i < TCA_ACT_MAX_PRIO && ((a) = (exts)->actions[i]); i++)
240 #else
241 #define tcf_exts_for_each_action(i, a, exts) \
242 	for (; 0; (void)(i), (void)(a), (void)(exts))
243 #endif
244 
245 static inline void
246 tcf_exts_stats_update(const struct tcf_exts *exts,
247 		      u64 bytes, u64 packets, u64 lastuse)
248 {
249 #ifdef CONFIG_NET_CLS_ACT
250 	int i;
251 
252 	preempt_disable();
253 
254 	for (i = 0; i < exts->nr_actions; i++) {
255 		struct tc_action *a = exts->actions[i];
256 
257 		tcf_action_stats_update(a, bytes, packets, lastuse, true);
258 	}
259 
260 	preempt_enable();
261 #endif
262 }
263 
264 /**
265  * tcf_exts_has_actions - check if at least one action is present
266  * @exts: tc filter extensions handle
267  *
268  * Returns true if at least one action is present.
269  */
270 static inline bool tcf_exts_has_actions(struct tcf_exts *exts)
271 {
272 #ifdef CONFIG_NET_CLS_ACT
273 	return exts->nr_actions;
274 #else
275 	return false;
276 #endif
277 }
278 
279 /**
280  * tcf_exts_exec - execute tc filter extensions
281  * @skb: socket buffer
282  * @exts: tc filter extensions handle
283  * @res: desired result
284  *
285  * Executes all configured extensions. Returns TC_ACT_OK on a normal execution,
286  * a negative number if the filter must be considered unmatched or
287  * a positive action code (TC_ACT_*) which must be returned to the
288  * underlying layer.
289  */
290 static inline int
291 tcf_exts_exec(struct sk_buff *skb, struct tcf_exts *exts,
292 	      struct tcf_result *res)
293 {
294 #ifdef CONFIG_NET_CLS_ACT
295 	return tcf_action_exec(skb, exts->actions, exts->nr_actions, res);
296 #endif
297 	return TC_ACT_OK;
298 }
299 
300 int tcf_exts_validate(struct net *net, struct tcf_proto *tp,
301 		      struct nlattr **tb, struct nlattr *rate_tlv,
302 		      struct tcf_exts *exts, bool ovr, bool rtnl_held,
303 		      struct netlink_ext_ack *extack);
304 void tcf_exts_destroy(struct tcf_exts *exts);
305 void tcf_exts_change(struct tcf_exts *dst, struct tcf_exts *src);
306 int tcf_exts_dump(struct sk_buff *skb, struct tcf_exts *exts);
307 int tcf_exts_dump_stats(struct sk_buff *skb, struct tcf_exts *exts);
308 
309 /**
310  * struct tcf_pkt_info - packet information
311  */
312 struct tcf_pkt_info {
313 	unsigned char *		ptr;
314 	int			nexthdr;
315 };
316 
317 #ifdef CONFIG_NET_EMATCH
318 
319 struct tcf_ematch_ops;
320 
321 /**
322  * struct tcf_ematch - extended match (ematch)
323  *
324  * @matchid: identifier to allow userspace to reidentify a match
325  * @flags: flags specifying attributes and the relation to other matches
326  * @ops: the operations lookup table of the corresponding ematch module
327  * @datalen: length of the ematch specific configuration data
328  * @data: ematch specific data
329  */
330 struct tcf_ematch {
331 	struct tcf_ematch_ops * ops;
332 	unsigned long		data;
333 	unsigned int		datalen;
334 	u16			matchid;
335 	u16			flags;
336 	struct net		*net;
337 };
338 
339 static inline int tcf_em_is_container(struct tcf_ematch *em)
340 {
341 	return !em->ops;
342 }
343 
344 static inline int tcf_em_is_simple(struct tcf_ematch *em)
345 {
346 	return em->flags & TCF_EM_SIMPLE;
347 }
348 
349 static inline int tcf_em_is_inverted(struct tcf_ematch *em)
350 {
351 	return em->flags & TCF_EM_INVERT;
352 }
353 
354 static inline int tcf_em_last_match(struct tcf_ematch *em)
355 {
356 	return (em->flags & TCF_EM_REL_MASK) == TCF_EM_REL_END;
357 }
358 
359 static inline int tcf_em_early_end(struct tcf_ematch *em, int result)
360 {
361 	if (tcf_em_last_match(em))
362 		return 1;
363 
364 	if (result == 0 && em->flags & TCF_EM_REL_AND)
365 		return 1;
366 
367 	if (result != 0 && em->flags & TCF_EM_REL_OR)
368 		return 1;
369 
370 	return 0;
371 }
372 
373 /**
374  * struct tcf_ematch_tree - ematch tree handle
375  *
376  * @hdr: ematch tree header supplied by userspace
377  * @matches: array of ematches
378  */
379 struct tcf_ematch_tree {
380 	struct tcf_ematch_tree_hdr hdr;
381 	struct tcf_ematch *	matches;
382 
383 };
384 
385 /**
386  * struct tcf_ematch_ops - ematch module operations
387  *
388  * @kind: identifier (kind) of this ematch module
389  * @datalen: length of expected configuration data (optional)
390  * @change: called during validation (optional)
391  * @match: called during ematch tree evaluation, must return 1/0
392  * @destroy: called during destroyage (optional)
393  * @dump: called during dumping process (optional)
394  * @owner: owner, must be set to THIS_MODULE
395  * @link: link to previous/next ematch module (internal use)
396  */
397 struct tcf_ematch_ops {
398 	int			kind;
399 	int			datalen;
400 	int			(*change)(struct net *net, void *,
401 					  int, struct tcf_ematch *);
402 	int			(*match)(struct sk_buff *, struct tcf_ematch *,
403 					 struct tcf_pkt_info *);
404 	void			(*destroy)(struct tcf_ematch *);
405 	int			(*dump)(struct sk_buff *, struct tcf_ematch *);
406 	struct module		*owner;
407 	struct list_head	link;
408 };
409 
410 int tcf_em_register(struct tcf_ematch_ops *);
411 void tcf_em_unregister(struct tcf_ematch_ops *);
412 int tcf_em_tree_validate(struct tcf_proto *, struct nlattr *,
413 			 struct tcf_ematch_tree *);
414 void tcf_em_tree_destroy(struct tcf_ematch_tree *);
415 int tcf_em_tree_dump(struct sk_buff *, struct tcf_ematch_tree *, int);
416 int __tcf_em_tree_match(struct sk_buff *, struct tcf_ematch_tree *,
417 			struct tcf_pkt_info *);
418 
419 /**
420  * tcf_em_tree_match - evaulate an ematch tree
421  *
422  * @skb: socket buffer of the packet in question
423  * @tree: ematch tree to be used for evaluation
424  * @info: packet information examined by classifier
425  *
426  * This function matches @skb against the ematch tree in @tree by going
427  * through all ematches respecting their logic relations returning
428  * as soon as the result is obvious.
429  *
430  * Returns 1 if the ematch tree as-one matches, no ematches are configured
431  * or ematch is not enabled in the kernel, otherwise 0 is returned.
432  */
433 static inline int tcf_em_tree_match(struct sk_buff *skb,
434 				    struct tcf_ematch_tree *tree,
435 				    struct tcf_pkt_info *info)
436 {
437 	if (tree->hdr.nmatches)
438 		return __tcf_em_tree_match(skb, tree, info);
439 	else
440 		return 1;
441 }
442 
443 #define MODULE_ALIAS_TCF_EMATCH(kind)	MODULE_ALIAS("ematch-kind-" __stringify(kind))
444 
445 #else /* CONFIG_NET_EMATCH */
446 
447 struct tcf_ematch_tree {
448 };
449 
450 #define tcf_em_tree_validate(tp, tb, t) ((void)(t), 0)
451 #define tcf_em_tree_destroy(t) do { (void)(t); } while(0)
452 #define tcf_em_tree_dump(skb, t, tlv) (0)
453 #define tcf_em_tree_match(skb, t, info) ((void)(info), 1)
454 
455 #endif /* CONFIG_NET_EMATCH */
456 
457 static inline unsigned char * tcf_get_base_ptr(struct sk_buff *skb, int layer)
458 {
459 	switch (layer) {
460 		case TCF_LAYER_LINK:
461 			return skb_mac_header(skb);
462 		case TCF_LAYER_NETWORK:
463 			return skb_network_header(skb);
464 		case TCF_LAYER_TRANSPORT:
465 			return skb_transport_header(skb);
466 	}
467 
468 	return NULL;
469 }
470 
471 static inline int tcf_valid_offset(const struct sk_buff *skb,
472 				   const unsigned char *ptr, const int len)
473 {
474 	return likely((ptr + len) <= skb_tail_pointer(skb) &&
475 		      ptr >= skb->head &&
476 		      (ptr <= (ptr + len)));
477 }
478 
479 static inline int
480 tcf_change_indev(struct net *net, struct nlattr *indev_tlv,
481 		 struct netlink_ext_ack *extack)
482 {
483 	char indev[IFNAMSIZ];
484 	struct net_device *dev;
485 
486 	if (nla_strlcpy(indev, indev_tlv, IFNAMSIZ) >= IFNAMSIZ) {
487 		NL_SET_ERR_MSG(extack, "Interface name too long");
488 		return -EINVAL;
489 	}
490 	dev = __dev_get_by_name(net, indev);
491 	if (!dev)
492 		return -ENODEV;
493 	return dev->ifindex;
494 }
495 
496 static inline bool
497 tcf_match_indev(struct sk_buff *skb, int ifindex)
498 {
499 	if (!ifindex)
500 		return true;
501 	if  (!skb->skb_iif)
502 		return false;
503 	return ifindex == skb->skb_iif;
504 }
505 
506 int tc_setup_flow_action(struct flow_action *flow_action,
507 			 const struct tcf_exts *exts);
508 int tc_setup_cb_call(struct tcf_block *block, enum tc_setup_type type,
509 		     void *type_data, bool err_stop);
510 unsigned int tcf_exts_num_actions(struct tcf_exts *exts);
511 
512 struct tc_cls_u32_knode {
513 	struct tcf_exts *exts;
514 	struct tcf_result *res;
515 	struct tc_u32_sel *sel;
516 	u32 handle;
517 	u32 val;
518 	u32 mask;
519 	u32 link_handle;
520 	u8 fshift;
521 };
522 
523 struct tc_cls_u32_hnode {
524 	u32 handle;
525 	u32 prio;
526 	unsigned int divisor;
527 };
528 
529 enum tc_clsu32_command {
530 	TC_CLSU32_NEW_KNODE,
531 	TC_CLSU32_REPLACE_KNODE,
532 	TC_CLSU32_DELETE_KNODE,
533 	TC_CLSU32_NEW_HNODE,
534 	TC_CLSU32_REPLACE_HNODE,
535 	TC_CLSU32_DELETE_HNODE,
536 };
537 
538 struct tc_cls_u32_offload {
539 	struct flow_cls_common_offload common;
540 	/* knode values */
541 	enum tc_clsu32_command command;
542 	union {
543 		struct tc_cls_u32_knode knode;
544 		struct tc_cls_u32_hnode hnode;
545 	};
546 };
547 
548 static inline bool tc_can_offload(const struct net_device *dev)
549 {
550 	return dev->features & NETIF_F_HW_TC;
551 }
552 
553 static inline bool tc_can_offload_extack(const struct net_device *dev,
554 					 struct netlink_ext_ack *extack)
555 {
556 	bool can = tc_can_offload(dev);
557 
558 	if (!can)
559 		NL_SET_ERR_MSG(extack, "TC offload is disabled on net device");
560 
561 	return can;
562 }
563 
564 static inline bool
565 tc_cls_can_offload_and_chain0(const struct net_device *dev,
566 			      struct flow_cls_common_offload *common)
567 {
568 	if (!tc_can_offload_extack(dev, common->extack))
569 		return false;
570 	if (common->chain_index) {
571 		NL_SET_ERR_MSG(common->extack,
572 			       "Driver supports only offload of chain 0");
573 		return false;
574 	}
575 	return true;
576 }
577 
578 static inline bool tc_skip_hw(u32 flags)
579 {
580 	return (flags & TCA_CLS_FLAGS_SKIP_HW) ? true : false;
581 }
582 
583 static inline bool tc_skip_sw(u32 flags)
584 {
585 	return (flags & TCA_CLS_FLAGS_SKIP_SW) ? true : false;
586 }
587 
588 /* SKIP_HW and SKIP_SW are mutually exclusive flags. */
589 static inline bool tc_flags_valid(u32 flags)
590 {
591 	if (flags & ~(TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW |
592 		      TCA_CLS_FLAGS_VERBOSE))
593 		return false;
594 
595 	flags &= TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW;
596 	if (!(flags ^ (TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW)))
597 		return false;
598 
599 	return true;
600 }
601 
602 static inline bool tc_in_hw(u32 flags)
603 {
604 	return (flags & TCA_CLS_FLAGS_IN_HW) ? true : false;
605 }
606 
607 static inline void
608 tc_cls_common_offload_init(struct flow_cls_common_offload *cls_common,
609 			   const struct tcf_proto *tp, u32 flags,
610 			   struct netlink_ext_ack *extack)
611 {
612 	cls_common->chain_index = tp->chain->index;
613 	cls_common->protocol = tp->protocol;
614 	cls_common->prio = tp->prio;
615 	if (tc_skip_sw(flags) || flags & TCA_CLS_FLAGS_VERBOSE)
616 		cls_common->extack = extack;
617 }
618 
619 enum tc_matchall_command {
620 	TC_CLSMATCHALL_REPLACE,
621 	TC_CLSMATCHALL_DESTROY,
622 	TC_CLSMATCHALL_STATS,
623 };
624 
625 struct tc_cls_matchall_offload {
626 	struct flow_cls_common_offload common;
627 	enum tc_matchall_command command;
628 	struct flow_rule *rule;
629 	struct flow_stats stats;
630 	unsigned long cookie;
631 };
632 
633 enum tc_clsbpf_command {
634 	TC_CLSBPF_OFFLOAD,
635 	TC_CLSBPF_STATS,
636 };
637 
638 struct tc_cls_bpf_offload {
639 	struct flow_cls_common_offload common;
640 	enum tc_clsbpf_command command;
641 	struct tcf_exts *exts;
642 	struct bpf_prog *prog;
643 	struct bpf_prog *oldprog;
644 	const char *name;
645 	bool exts_integrated;
646 };
647 
648 struct tc_mqprio_qopt_offload {
649 	/* struct tc_mqprio_qopt must always be the first element */
650 	struct tc_mqprio_qopt qopt;
651 	u16 mode;
652 	u16 shaper;
653 	u32 flags;
654 	u64 min_rate[TC_QOPT_MAX_QUEUE];
655 	u64 max_rate[TC_QOPT_MAX_QUEUE];
656 };
657 
658 /* This structure holds cookie structure that is passed from user
659  * to the kernel for actions and classifiers
660  */
661 struct tc_cookie {
662 	u8  *data;
663 	u32 len;
664 	struct rcu_head rcu;
665 };
666 
667 struct tc_qopt_offload_stats {
668 	struct gnet_stats_basic_packed *bstats;
669 	struct gnet_stats_queue *qstats;
670 };
671 
672 enum tc_mq_command {
673 	TC_MQ_CREATE,
674 	TC_MQ_DESTROY,
675 	TC_MQ_STATS,
676 	TC_MQ_GRAFT,
677 };
678 
679 struct tc_mq_opt_offload_graft_params {
680 	unsigned long queue;
681 	u32 child_handle;
682 };
683 
684 struct tc_mq_qopt_offload {
685 	enum tc_mq_command command;
686 	u32 handle;
687 	union {
688 		struct tc_qopt_offload_stats stats;
689 		struct tc_mq_opt_offload_graft_params graft_params;
690 	};
691 };
692 
693 enum tc_red_command {
694 	TC_RED_REPLACE,
695 	TC_RED_DESTROY,
696 	TC_RED_STATS,
697 	TC_RED_XSTATS,
698 	TC_RED_GRAFT,
699 };
700 
701 struct tc_red_qopt_offload_params {
702 	u32 min;
703 	u32 max;
704 	u32 probability;
705 	u32 limit;
706 	bool is_ecn;
707 	bool is_harddrop;
708 	struct gnet_stats_queue *qstats;
709 };
710 
711 struct tc_red_qopt_offload {
712 	enum tc_red_command command;
713 	u32 handle;
714 	u32 parent;
715 	union {
716 		struct tc_red_qopt_offload_params set;
717 		struct tc_qopt_offload_stats stats;
718 		struct red_stats *xstats;
719 		u32 child_handle;
720 	};
721 };
722 
723 enum tc_gred_command {
724 	TC_GRED_REPLACE,
725 	TC_GRED_DESTROY,
726 	TC_GRED_STATS,
727 };
728 
729 struct tc_gred_vq_qopt_offload_params {
730 	bool present;
731 	u32 limit;
732 	u32 prio;
733 	u32 min;
734 	u32 max;
735 	bool is_ecn;
736 	bool is_harddrop;
737 	u32 probability;
738 	/* Only need backlog, see struct tc_prio_qopt_offload_params */
739 	u32 *backlog;
740 };
741 
742 struct tc_gred_qopt_offload_params {
743 	bool grio_on;
744 	bool wred_on;
745 	unsigned int dp_cnt;
746 	unsigned int dp_def;
747 	struct gnet_stats_queue *qstats;
748 	struct tc_gred_vq_qopt_offload_params tab[MAX_DPs];
749 };
750 
751 struct tc_gred_qopt_offload_stats {
752 	struct gnet_stats_basic_packed bstats[MAX_DPs];
753 	struct gnet_stats_queue qstats[MAX_DPs];
754 	struct red_stats *xstats[MAX_DPs];
755 };
756 
757 struct tc_gred_qopt_offload {
758 	enum tc_gred_command command;
759 	u32 handle;
760 	u32 parent;
761 	union {
762 		struct tc_gred_qopt_offload_params set;
763 		struct tc_gred_qopt_offload_stats stats;
764 	};
765 };
766 
767 enum tc_prio_command {
768 	TC_PRIO_REPLACE,
769 	TC_PRIO_DESTROY,
770 	TC_PRIO_STATS,
771 	TC_PRIO_GRAFT,
772 };
773 
774 struct tc_prio_qopt_offload_params {
775 	int bands;
776 	u8 priomap[TC_PRIO_MAX + 1];
777 	/* In case that a prio qdisc is offloaded and now is changed to a
778 	 * non-offloadedable config, it needs to update the backlog & qlen
779 	 * values to negate the HW backlog & qlen values (and only them).
780 	 */
781 	struct gnet_stats_queue *qstats;
782 };
783 
784 struct tc_prio_qopt_offload_graft_params {
785 	u8 band;
786 	u32 child_handle;
787 };
788 
789 struct tc_prio_qopt_offload {
790 	enum tc_prio_command command;
791 	u32 handle;
792 	u32 parent;
793 	union {
794 		struct tc_prio_qopt_offload_params replace_params;
795 		struct tc_qopt_offload_stats stats;
796 		struct tc_prio_qopt_offload_graft_params graft_params;
797 	};
798 };
799 
800 enum tc_root_command {
801 	TC_ROOT_GRAFT,
802 };
803 
804 struct tc_root_qopt_offload {
805 	enum tc_root_command command;
806 	u32 handle;
807 	bool ingress;
808 };
809 
810 #endif
811