Merge tag 'regulator-v6.4' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie...
[linux-block.git] / include / net / pkt_cls.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2#ifndef __NET_PKT_CLS_H
3#define __NET_PKT_CLS_H
4
5#include <linux/pkt_cls.h>
7aa0045d 6#include <linux/workqueue.h>
1da177e4
LT
7#include <net/sch_generic.h>
8#include <net/act_api.h>
a5148626 9#include <net/net_namespace.h>
1da177e4 10
cd11b164 11/* TC action not accessible from user space */
720f22fe 12#define TC_ACT_CONSUMED (TC_ACT_VALUE_MAX + 1)
cd11b164 13
1da177e4
LT
14/* Basic packet classifier frontend definitions. */
15
fd2c3ef7 16struct tcf_walker {
1da177e4
LT
17 int stop;
18 int skip;
19 int count;
6676d5e4 20 bool nonempty;
01683a14 21 unsigned long cookie;
8113c095 22 int (*fn)(struct tcf_proto *, void *node, struct tcf_walker *);
1da177e4
LT
23};
24
5c15257f 25int register_tcf_proto_ops(struct tcf_proto_ops *ops);
bc5c8260 26void unregister_tcf_proto_ops(struct tcf_proto_ops *ops);
1da177e4 27
8c4083b3 28struct tcf_block_ext_info {
32f8c409 29 enum flow_block_binder_type binder_type;
c7eb7d72
JP
30 tcf_chain_head_change_t *chain_head_change;
31 void *chain_head_change_priv;
48617387 32 u32 block_index;
8c4083b3
JP
33};
34
3625750f
PM
35struct tcf_qevent {
36 struct tcf_block *block;
37 struct tcf_block_ext_info info;
38 struct tcf_proto __rcu *filter_chain;
39};
40
acb67442 41struct tcf_block_cb;
aaa908ff 42bool tcf_queue_work(struct rcu_work *rwork, work_func_t func);
acb67442 43
8ae70032 44#ifdef CONFIG_NET_CLS
1f3ed383
JP
45struct tcf_chain *tcf_chain_get_by_act(struct tcf_block *block,
46 u32 chain_index);
1f3ed383 47void tcf_chain_put_by_act(struct tcf_chain *chain);
bbf73830
VB
48struct tcf_chain *tcf_get_next_chain(struct tcf_block *block,
49 struct tcf_chain *chain);
fe2923af 50struct tcf_proto *tcf_get_next_proto(struct tcf_chain *chain,
0fca55ed 51 struct tcf_proto *tp);
f36fe1c4 52void tcf_block_netif_keep_dst(struct tcf_block *block);
6529eaba 53int tcf_block_get(struct tcf_block **p_block,
8d1a77f9
AA
54 struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
55 struct netlink_ext_ack *extack);
c7eb7d72 56int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
8d1a77f9
AA
57 struct tcf_block_ext_info *ei,
58 struct netlink_ext_ack *extack);
6529eaba 59void tcf_block_put(struct tcf_block *block);
c7eb7d72 60void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
8c4083b3 61 struct tcf_block_ext_info *ei);
80cd22c3
PB
62int tcf_exts_init_ex(struct tcf_exts *exts, struct net *net, int action,
63 int police, struct tcf_proto *tp, u32 handle, bool used_action_miss);
44186460 64
48617387
JP
65static inline bool tcf_block_shared(struct tcf_block *block)
66{
67 return block->index;
68}
69
c1a970d0
VB
70static inline bool tcf_block_non_null_shared(struct tcf_block *block)
71{
72 return block && block->index;
73}
74
44186460
JP
75static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
76{
48617387 77 WARN_ON(tcf_block_shared(block));
44186460
JP
78 return block->q;
79}
80
3aa26055
DC
81int tcf_classify(struct sk_buff *skb,
82 const struct tcf_block *block,
83 const struct tcf_proto *tp, struct tcf_result *res,
84 bool compat_mode);
87d83093 85
fe0df81d
ZS
86static inline bool tc_cls_stats_dump(struct tcf_proto *tp,
87 struct tcf_walker *arg,
88 void *filter)
89{
90 if (arg->count >= arg->skip && arg->fn(tp, filter, arg) < 0) {
91 arg->stop = 1;
92 return false;
93 }
94
95 arg->count++;
96 return true;
97}
98
8ae70032 99#else
88c44a52
PJV
100static inline bool tcf_block_shared(struct tcf_block *block)
101{
102 return false;
103}
104
c1a970d0
VB
105static inline bool tcf_block_non_null_shared(struct tcf_block *block)
106{
107 return false;
108}
109
6529eaba
JP
110static inline
111int tcf_block_get(struct tcf_block **p_block,
3c149091
SM
112 struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
113 struct netlink_ext_ack *extack)
6529eaba
JP
114{
115 return 0;
116}
117
8c4083b3 118static inline
c7eb7d72 119int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
33c30a8b
QM
120 struct tcf_block_ext_info *ei,
121 struct netlink_ext_ack *extack)
8c4083b3
JP
122{
123 return 0;
124}
125
6529eaba 126static inline void tcf_block_put(struct tcf_block *block)
8ae70032
JP
127{
128}
87d83093 129
8c4083b3 130static inline
c7eb7d72 131void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
8c4083b3
JP
132 struct tcf_block_ext_info *ei)
133{
134}
135
44186460
JP
136static inline struct Qdisc *tcf_block_q(struct tcf_block *block)
137{
138 return NULL;
139}
140
acb67442 141static inline
a7323311 142int tc_setup_cb_block_register(struct tcf_block *block, flow_setup_cb_t *cb,
acb67442
JP
143 void *cb_priv)
144{
145 return 0;
146}
147
148static inline
a7323311 149void tc_setup_cb_block_unregister(struct tcf_block *block, flow_setup_cb_t *cb,
acb67442
JP
150 void *cb_priv)
151{
152}
153
3aa26055
DC
154static inline int tcf_classify(struct sk_buff *skb,
155 const struct tcf_block *block,
156 const struct tcf_proto *tp,
87d83093
JP
157 struct tcf_result *res, bool compat_mode)
158{
159 return TC_ACT_UNSPEC;
160}
9410c940 161
8ae70032 162#endif
cf1facda 163
1da177e4
LT
164static inline unsigned long
165__cls_set_class(unsigned long *clp, unsigned long cl)
166{
a0efb80c 167 return xchg(clp, cl);
1da177e4
LT
168}
169
2e24cd75
CW
170static inline void
171__tcf_bind_filter(struct Qdisc *q, struct tcf_result *r, unsigned long base)
1da177e4 172{
2e24cd75 173 unsigned long cl;
34e3759c 174
2e24cd75
CW
175 cl = q->ops->cl_ops->bind_tcf(q, base, r->classid);
176 cl = __cls_set_class(&r->class, cl);
177 if (cl)
178 q->ops->cl_ops->unbind_tcf(q, cl);
1da177e4
LT
179}
180
181static inline void
182tcf_bind_filter(struct tcf_proto *tp, struct tcf_result *r, unsigned long base)
183{
34e3759c 184 struct Qdisc *q = tp->chain->block->q;
1da177e4 185
34e3759c
JP
186 /* Check q as it is not set for shared blocks. In that case,
187 * setting class is not supported.
188 */
189 if (!q)
190 return;
2e24cd75
CW
191 sch_tree_lock(q);
192 __tcf_bind_filter(q, r, base);
193 sch_tree_unlock(q);
194}
195
196static inline void
197__tcf_unbind_filter(struct Qdisc *q, struct tcf_result *r)
198{
199 unsigned long cl;
200
201 if ((cl = __cls_set_class(&r->class, 0)) != 0)
34e3759c 202 q->ops->cl_ops->unbind_tcf(q, cl);
1da177e4
LT
203}
204
205static inline void
206tcf_unbind_filter(struct tcf_proto *tp, struct tcf_result *r)
207{
34e3759c 208 struct Qdisc *q = tp->chain->block->q;
1da177e4 209
34e3759c
JP
210 if (!q)
211 return;
2e24cd75 212 __tcf_unbind_filter(q, r);
1da177e4
LT
213}
214
402963e3
ZS
215static inline void tc_cls_bind_class(u32 classid, unsigned long cl,
216 void *q, struct tcf_result *res,
217 unsigned long base)
218{
219 if (res->classid == classid) {
220 if (cl)
221 __tcf_bind_filter(q, res, base);
222 else
223 __tcf_unbind_filter(q, res);
224 }
225}
226
fd2c3ef7 227struct tcf_exts {
1da177e4 228#ifdef CONFIG_NET_CLS_ACT
33be6271 229 __u32 type; /* for backward compat(TCA_OLD_COMPAT) */
22dc13c8
WC
230 int nr_actions;
231 struct tc_action **actions;
dbdcda63
ED
232 struct net *net;
233 netns_tracker ns_tracker;
80cd22c3 234 struct tcf_exts_miss_cookie_node *miss_cookie_node;
1da177e4 235#endif
5da57f42
WC
236 /* Map to export classifier specific extension TLV types to the
237 * generic extensions API. Unsupported extensions must be set to 0.
238 */
1da177e4
LT
239 int action;
240 int police;
241};
242
14215108
CW
243static inline int tcf_exts_init(struct tcf_exts *exts, struct net *net,
244 int action, int police)
33be6271 245{
80cd22c3
PB
246#ifdef CONFIG_NET_CLS
247 return tcf_exts_init_ex(exts, net, action, police, NULL, 0, false);
248#else
249 return -EOPNOTSUPP;
33be6271
WC
250#endif
251}
252
e4b95c41
CW
253/* Return false if the netns is being destroyed in cleanup_net(). Callers
254 * need to do cleanup synchronously in this case, otherwise may race with
255 * tc_action_net_exit(). Return true for other cases.
256 */
257static inline bool tcf_exts_get_net(struct tcf_exts *exts)
258{
259#ifdef CONFIG_NET_CLS_ACT
260 exts->net = maybe_get_net(exts->net);
dbdcda63
ED
261 if (exts->net)
262 netns_tracker_alloc(exts->net, &exts->ns_tracker, GFP_KERNEL);
e4b95c41
CW
263 return exts->net != NULL;
264#else
265 return true;
266#endif
267}
268
269static inline void tcf_exts_put_net(struct tcf_exts *exts)
270{
271#ifdef CONFIG_NET_CLS_ACT
272 if (exts->net)
dbdcda63 273 put_net_track(exts->net, &exts->ns_tracker);
e4b95c41
CW
274#endif
275}
276
22dc13c8 277#ifdef CONFIG_NET_CLS_ACT
244cd96a
CW
278#define tcf_exts_for_each_action(i, a, exts) \
279 for (i = 0; i < TCA_ACT_MAX_PRIO && ((a) = (exts)->actions[i]); i++)
280#else
281#define tcf_exts_for_each_action(i, a, exts) \
191672ca 282 for (; 0; (void)(i), (void)(a), (void)(exts))
22dc13c8 283#endif
22dc13c8 284
8cbfe939
BZ
285#define tcf_act_for_each_action(i, a, actions) \
286 for (i = 0; i < TCA_ACT_MAX_PRIO && ((a) = actions[i]); i++)
287
5246c896
OS
288static inline bool tc_act_in_hw(struct tc_action *act)
289{
290 return !!act->in_hw_count;
291}
292
d897a638 293static inline void
bcd64368 294tcf_exts_hw_stats_update(const struct tcf_exts *exts,
5246c896
OS
295 struct flow_stats *stats,
296 bool use_act_stats)
d897a638
JK
297{
298#ifdef CONFIG_NET_CLS_ACT
299 int i;
300
d897a638
JK
301 for (i = 0; i < exts->nr_actions; i++) {
302 struct tc_action *a = exts->actions[i];
303
5246c896
OS
304 if (use_act_stats || tc_act_in_hw(a)) {
305 if (!tcf_action_update_hw_stats(a))
306 continue;
c7a66f8d 307 }
5246c896
OS
308
309 preempt_disable();
310 tcf_action_stats_update(a, stats->bytes, stats->pkts, stats->drops,
311 stats->lastused, true);
312 preempt_enable();
313
314 a->used_hw_stats = stats->used_hw_stats;
315 a->used_hw_stats_valid = stats->used_hw_stats_valid;
c7a66f8d 316 }
d897a638
JK
317#endif
318}
319
3bcc0cec
JP
320/**
321 * tcf_exts_has_actions - check if at least one action is present
322 * @exts: tc filter extensions handle
323 *
324 * Returns true if at least one action is present.
325 */
326static inline bool tcf_exts_has_actions(struct tcf_exts *exts)
327{
2734437e 328#ifdef CONFIG_NET_CLS_ACT
3bcc0cec
JP
329 return exts->nr_actions;
330#else
331 return false;
332#endif
333}
2734437e 334
af69afc5
JP
335/**
336 * tcf_exts_exec - execute tc filter extensions
337 * @skb: socket buffer
338 * @exts: tc filter extensions handle
339 * @res: desired result
340 *
af089e70 341 * Executes all configured extensions. Returns TC_ACT_OK on a normal execution,
af69afc5
JP
342 * a negative number if the filter must be considered unmatched or
343 * a positive action code (TC_ACT_*) which must be returned to the
344 * underlying layer.
345 */
346static inline int
347tcf_exts_exec(struct sk_buff *skb, struct tcf_exts *exts,
348 struct tcf_result *res)
349{
350#ifdef CONFIG_NET_CLS_ACT
ec1a9cca 351 return tcf_action_exec(skb, exts->actions, exts->nr_actions, res);
af69afc5 352#endif
af089e70 353 return TC_ACT_OK;
af69afc5
JP
354}
355
80cd22c3
PB
356static inline int
357tcf_exts_exec_ex(struct sk_buff *skb, struct tcf_exts *exts, int act_index,
358 struct tcf_result *res)
359{
360#ifdef CONFIG_NET_CLS_ACT
361 return tcf_action_exec(skb, exts->actions + act_index,
362 exts->nr_actions - act_index, res);
363#else
364 return TC_ACT_OK;
365#endif
366}
367
5c15257f
JP
368int tcf_exts_validate(struct net *net, struct tcf_proto *tp,
369 struct nlattr **tb, struct nlattr *rate_tlv,
695176bf 370 struct tcf_exts *exts, u32 flags,
50a56190 371 struct netlink_ext_ack *extack);
c86e0209
BZ
372int tcf_exts_validate_ex(struct net *net, struct tcf_proto *tp, struct nlattr **tb,
373 struct nlattr *rate_tlv, struct tcf_exts *exts,
374 u32 flags, u32 fl_flags, struct netlink_ext_ack *extack);
18d0264f 375void tcf_exts_destroy(struct tcf_exts *exts);
9b0d4446 376void tcf_exts_change(struct tcf_exts *dst, struct tcf_exts *src);
5da57f42 377int tcf_exts_dump(struct sk_buff *skb, struct tcf_exts *exts);
ca44b738 378int tcf_exts_terse_dump(struct sk_buff *skb, struct tcf_exts *exts);
5da57f42 379int tcf_exts_dump_stats(struct sk_buff *skb, struct tcf_exts *exts);
1da177e4
LT
380
381/**
382 * struct tcf_pkt_info - packet information
0161d151
BX
383 *
384 * @ptr: start of the pkt data
385 * @nexthdr: offset of the next header
1da177e4 386 */
fd2c3ef7 387struct tcf_pkt_info {
1da177e4
LT
388 unsigned char * ptr;
389 int nexthdr;
390};
391
392#ifdef CONFIG_NET_EMATCH
393
394struct tcf_ematch_ops;
395
396/**
397 * struct tcf_ematch - extended match (ematch)
398 *
399 * @matchid: identifier to allow userspace to reidentify a match
400 * @flags: flags specifying attributes and the relation to other matches
401 * @ops: the operations lookup table of the corresponding ematch module
402 * @datalen: length of the ematch specific configuration data
403 * @data: ematch specific data
0161d151 404 * @net: the network namespace
1da177e4 405 */
fd2c3ef7 406struct tcf_ematch {
1da177e4
LT
407 struct tcf_ematch_ops * ops;
408 unsigned long data;
409 unsigned int datalen;
410 u16 matchid;
411 u16 flags;
82a470f1 412 struct net *net;
1da177e4
LT
413};
414
415static inline int tcf_em_is_container(struct tcf_ematch *em)
416{
417 return !em->ops;
418}
419
420static inline int tcf_em_is_simple(struct tcf_ematch *em)
421{
422 return em->flags & TCF_EM_SIMPLE;
423}
424
425static inline int tcf_em_is_inverted(struct tcf_ematch *em)
426{
427 return em->flags & TCF_EM_INVERT;
428}
429
430static inline int tcf_em_last_match(struct tcf_ematch *em)
431{
432 return (em->flags & TCF_EM_REL_MASK) == TCF_EM_REL_END;
433}
434
435static inline int tcf_em_early_end(struct tcf_ematch *em, int result)
436{
437 if (tcf_em_last_match(em))
438 return 1;
439
440 if (result == 0 && em->flags & TCF_EM_REL_AND)
441 return 1;
442
443 if (result != 0 && em->flags & TCF_EM_REL_OR)
444 return 1;
445
446 return 0;
447}
448
449/**
450 * struct tcf_ematch_tree - ematch tree handle
451 *
452 * @hdr: ematch tree header supplied by userspace
453 * @matches: array of ematches
454 */
fd2c3ef7 455struct tcf_ematch_tree {
1da177e4
LT
456 struct tcf_ematch_tree_hdr hdr;
457 struct tcf_ematch * matches;
458
459};
460
461/**
462 * struct tcf_ematch_ops - ematch module operations
463 *
464 * @kind: identifier (kind) of this ematch module
465 * @datalen: length of expected configuration data (optional)
466 * @change: called during validation (optional)
467 * @match: called during ematch tree evaluation, must return 1/0
468 * @destroy: called during destroyage (optional)
469 * @dump: called during dumping process (optional)
470 * @owner: owner, must be set to THIS_MODULE
471 * @link: link to previous/next ematch module (internal use)
472 */
fd2c3ef7 473struct tcf_ematch_ops {
1da177e4
LT
474 int kind;
475 int datalen;
82a470f1 476 int (*change)(struct net *net, void *,
1da177e4
LT
477 int, struct tcf_ematch *);
478 int (*match)(struct sk_buff *, struct tcf_ematch *,
479 struct tcf_pkt_info *);
82a470f1 480 void (*destroy)(struct tcf_ematch *);
1da177e4
LT
481 int (*dump)(struct sk_buff *, struct tcf_ematch *);
482 struct module *owner;
483 struct list_head link;
484};
485
5c15257f
JP
486int tcf_em_register(struct tcf_ematch_ops *);
487void tcf_em_unregister(struct tcf_ematch_ops *);
488int tcf_em_tree_validate(struct tcf_proto *, struct nlattr *,
489 struct tcf_ematch_tree *);
82a470f1 490void tcf_em_tree_destroy(struct tcf_ematch_tree *);
5c15257f
JP
491int tcf_em_tree_dump(struct sk_buff *, struct tcf_ematch_tree *, int);
492int __tcf_em_tree_match(struct sk_buff *, struct tcf_ematch_tree *,
493 struct tcf_pkt_info *);
1da177e4 494
1da177e4
LT
495/**
496 * tcf_em_tree_match - evaulate an ematch tree
497 *
498 * @skb: socket buffer of the packet in question
499 * @tree: ematch tree to be used for evaluation
500 * @info: packet information examined by classifier
501 *
502 * This function matches @skb against the ematch tree in @tree by going
503 * through all ematches respecting their logic relations returning
504 * as soon as the result is obvious.
505 *
506 * Returns 1 if the ematch tree as-one matches, no ematches are configured
507 * or ematch is not enabled in the kernel, otherwise 0 is returned.
508 */
509static inline int tcf_em_tree_match(struct sk_buff *skb,
510 struct tcf_ematch_tree *tree,
511 struct tcf_pkt_info *info)
512{
513 if (tree->hdr.nmatches)
514 return __tcf_em_tree_match(skb, tree, info);
515 else
516 return 1;
517}
518
db3d99c0
PM
519#define MODULE_ALIAS_TCF_EMATCH(kind) MODULE_ALIAS("ematch-kind-" __stringify(kind))
520
1da177e4
LT
521#else /* CONFIG_NET_EMATCH */
522
fd2c3ef7 523struct tcf_ematch_tree {
1da177e4
LT
524};
525
526#define tcf_em_tree_validate(tp, tb, t) ((void)(t), 0)
82a470f1 527#define tcf_em_tree_destroy(t) do { (void)(t); } while(0)
1da177e4 528#define tcf_em_tree_dump(skb, t, tlv) (0)
1da177e4
LT
529#define tcf_em_tree_match(skb, t, info) ((void)(info), 1)
530
531#endif /* CONFIG_NET_EMATCH */
532
533static inline unsigned char * tcf_get_base_ptr(struct sk_buff *skb, int layer)
534{
535 switch (layer) {
536 case TCF_LAYER_LINK:
d3303a65 537 return skb_mac_header(skb);
1da177e4 538 case TCF_LAYER_NETWORK:
d56f90a7 539 return skb_network_header(skb);
1da177e4 540 case TCF_LAYER_TRANSPORT:
9c70220b 541 return skb_transport_header(skb);
1da177e4
LT
542 }
543
544 return NULL;
545}
546
eddc9ec5
ACM
547static inline int tcf_valid_offset(const struct sk_buff *skb,
548 const unsigned char *ptr, const int len)
1da177e4 549{
da521b2c
DM
550 return likely((ptr + len) <= skb_tail_pointer(skb) &&
551 ptr >= skb->head &&
552 (ptr <= (ptr + len)));
1da177e4
LT
553}
554
1da177e4 555static inline int
1057c55f
AA
556tcf_change_indev(struct net *net, struct nlattr *indev_tlv,
557 struct netlink_ext_ack *extack)
1da177e4 558{
2519a602
WC
559 char indev[IFNAMSIZ];
560 struct net_device *dev;
561
872f6903 562 if (nla_strscpy(indev, indev_tlv, IFNAMSIZ) < 0) {
e4a58ef3
GN
563 NL_SET_ERR_MSG_ATTR(extack, indev_tlv,
564 "Interface name too long");
1da177e4 565 return -EINVAL;
1057c55f 566 }
2519a602 567 dev = __dev_get_by_name(net, indev);
e4a58ef3
GN
568 if (!dev) {
569 NL_SET_ERR_MSG_ATTR(extack, indev_tlv,
570 "Network device not found");
2519a602 571 return -ENODEV;
e4a58ef3 572 }
2519a602 573 return dev->ifindex;
1da177e4
LT
574}
575
2519a602
WC
576static inline bool
577tcf_match_indev(struct sk_buff *skb, int ifindex)
1da177e4 578{
2519a602
WC
579 if (!ifindex)
580 return true;
581 if (!skb->skb_iif)
582 return false;
583 return ifindex == skb->skb_iif;
1da177e4 584}
1da177e4 585
9c1c0e12 586int tc_setup_offload_action(struct flow_action *flow_action,
c2ccf84e
IS
587 const struct tcf_exts *exts,
588 struct netlink_ext_ack *extack);
9c1c0e12 589void tc_cleanup_offload_action(struct flow_action *flow_action);
8cbfe939 590int tc_setup_action(struct flow_action *flow_action,
c2ccf84e 591 struct tc_action *actions[],
80cd22c3 592 u32 miss_cookie_base,
c2ccf84e 593 struct netlink_ext_ack *extack);
5a6ff4b1 594
aeb3fecd 595int tc_setup_cb_call(struct tcf_block *block, enum tc_setup_type type,
40119211
VB
596 void *type_data, bool err_stop, bool rtnl_held);
597int tc_setup_cb_add(struct tcf_block *block, struct tcf_proto *tp,
598 enum tc_setup_type type, void *type_data, bool err_stop,
599 u32 *flags, unsigned int *in_hw_count, bool rtnl_held);
600int tc_setup_cb_replace(struct tcf_block *block, struct tcf_proto *tp,
601 enum tc_setup_type type, void *type_data, bool err_stop,
602 u32 *old_flags, unsigned int *old_in_hw_count,
603 u32 *new_flags, unsigned int *new_in_hw_count,
604 bool rtnl_held);
605int tc_setup_cb_destroy(struct tcf_block *block, struct tcf_proto *tp,
606 enum tc_setup_type type, void *type_data, bool err_stop,
607 u32 *flags, unsigned int *in_hw_count, bool rtnl_held);
608int tc_setup_cb_reoffload(struct tcf_block *block, struct tcf_proto *tp,
609 bool add, flow_setup_cb_t *cb,
610 enum tc_setup_type type, void *type_data,
611 void *cb_priv, u32 *flags, unsigned int *in_hw_count);
e3ab786b 612unsigned int tcf_exts_num_actions(struct tcf_exts *exts);
717503b9 613
3625750f
PM
614#ifdef CONFIG_NET_CLS_ACT
615int tcf_qevent_init(struct tcf_qevent *qe, struct Qdisc *sch,
616 enum flow_block_binder_type binder_type,
617 struct nlattr *block_index_attr,
618 struct netlink_ext_ack *extack);
619void tcf_qevent_destroy(struct tcf_qevent *qe, struct Qdisc *sch);
620int tcf_qevent_validate_change(struct tcf_qevent *qe, struct nlattr *block_index_attr,
621 struct netlink_ext_ack *extack);
622struct sk_buff *tcf_qevent_handle(struct tcf_qevent *qe, struct Qdisc *sch, struct sk_buff *skb,
55f656cd 623 struct sk_buff **to_free, int *ret);
3625750f
PM
624int tcf_qevent_dump(struct sk_buff *skb, int attr_name, struct tcf_qevent *qe);
625#else
626static inline int tcf_qevent_init(struct tcf_qevent *qe, struct Qdisc *sch,
627 enum flow_block_binder_type binder_type,
628 struct nlattr *block_index_attr,
629 struct netlink_ext_ack *extack)
630{
631 return 0;
632}
633
634static inline void tcf_qevent_destroy(struct tcf_qevent *qe, struct Qdisc *sch)
635{
636}
637
638static inline int tcf_qevent_validate_change(struct tcf_qevent *qe, struct nlattr *block_index_attr,
639 struct netlink_ext_ack *extack)
640{
641 return 0;
642}
643
644static inline struct sk_buff *
645tcf_qevent_handle(struct tcf_qevent *qe, struct Qdisc *sch, struct sk_buff *skb,
55f656cd 646 struct sk_buff **to_free, int *ret)
3625750f
PM
647{
648 return skb;
649}
650
651static inline int tcf_qevent_dump(struct sk_buff *skb, int attr_name, struct tcf_qevent *qe)
652{
653 return 0;
654}
655#endif
656
a1b7c5fd
JF
657struct tc_cls_u32_knode {
658 struct tcf_exts *exts;
068ceb35 659 struct tcf_result *res;
e014860e 660 struct tc_u32_sel *sel;
a1b7c5fd
JF
661 u32 handle;
662 u32 val;
663 u32 mask;
664 u32 link_handle;
e014860e 665 u8 fshift;
a1b7c5fd
JF
666};
667
668struct tc_cls_u32_hnode {
669 u32 handle;
670 u32 prio;
671 unsigned int divisor;
672};
673
674enum tc_clsu32_command {
675 TC_CLSU32_NEW_KNODE,
676 TC_CLSU32_REPLACE_KNODE,
677 TC_CLSU32_DELETE_KNODE,
678 TC_CLSU32_NEW_HNODE,
679 TC_CLSU32_REPLACE_HNODE,
680 TC_CLSU32_DELETE_HNODE,
681};
682
683struct tc_cls_u32_offload {
f9e30088 684 struct flow_cls_common_offload common;
a1b7c5fd
JF
685 /* knode values */
686 enum tc_clsu32_command command;
687 union {
688 struct tc_cls_u32_knode knode;
689 struct tc_cls_u32_hnode hnode;
690 };
691};
692
7b06e8ae 693static inline bool tc_can_offload(const struct net_device *dev)
6843e7a2 694{
70b5aee4 695 return dev->features & NETIF_F_HW_TC;
6843e7a2
JF
696}
697
f9eda14f
QM
698static inline bool tc_can_offload_extack(const struct net_device *dev,
699 struct netlink_ext_ack *extack)
700{
701 bool can = tc_can_offload(dev);
702
703 if (!can)
704 NL_SET_ERR_MSG(extack, "TC offload is disabled on net device");
705
706 return can;
707}
708
878db9f0
JK
709static inline bool
710tc_cls_can_offload_and_chain0(const struct net_device *dev,
f9e30088 711 struct flow_cls_common_offload *common)
878db9f0
JK
712{
713 if (!tc_can_offload_extack(dev, common->extack))
714 return false;
715 if (common->chain_index) {
716 NL_SET_ERR_MSG(common->extack,
717 "Driver supports only offload of chain 0");
718 return false;
719 }
720 return true;
721}
722
55330f05
HHZ
723static inline bool tc_skip_hw(u32 flags)
724{
725 return (flags & TCA_CLS_FLAGS_SKIP_HW) ? true : false;
726}
727
d34e3e18
SS
728static inline bool tc_skip_sw(u32 flags)
729{
730 return (flags & TCA_CLS_FLAGS_SKIP_SW) ? true : false;
731}
732
733/* SKIP_HW and SKIP_SW are mutually exclusive flags. */
734static inline bool tc_flags_valid(u32 flags)
735{
81c7288b
MRL
736 if (flags & ~(TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW |
737 TCA_CLS_FLAGS_VERBOSE))
d34e3e18
SS
738 return false;
739
81c7288b 740 flags &= TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW;
d34e3e18
SS
741 if (!(flags ^ (TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW)))
742 return false;
743
744 return true;
745}
746
e696028a
OG
747static inline bool tc_in_hw(u32 flags)
748{
749 return (flags & TCA_CLS_FLAGS_IN_HW) ? true : false;
750}
751
34832e1c 752static inline void
f9e30088 753tc_cls_common_offload_init(struct flow_cls_common_offload *cls_common,
34832e1c
JK
754 const struct tcf_proto *tp, u32 flags,
755 struct netlink_ext_ack *extack)
756{
757 cls_common->chain_index = tp->chain->index;
758 cls_common->protocol = tp->protocol;
ef01adae 759 cls_common->prio = tp->prio >> 16;
81c7288b 760 if (tc_skip_sw(flags) || flags & TCA_CLS_FLAGS_VERBOSE)
34832e1c
JK
761 cls_common->extack = extack;
762}
763
9453d45e
VB
764#if IS_ENABLED(CONFIG_NET_TC_SKB_EXT)
765static inline struct tc_skb_ext *tc_skb_ext_alloc(struct sk_buff *skb)
766{
767 struct tc_skb_ext *tc_skb_ext = skb_ext_add(skb, TC_SKB_EXT);
768
769 if (tc_skb_ext)
770 memset(tc_skb_ext, 0, sizeof(*tc_skb_ext));
771 return tc_skb_ext;
772}
773#endif
774
b87f7936
YG
775enum tc_matchall_command {
776 TC_CLSMATCHALL_REPLACE,
777 TC_CLSMATCHALL_DESTROY,
b7fe4ab8 778 TC_CLSMATCHALL_STATS,
b87f7936
YG
779};
780
781struct tc_cls_matchall_offload {
f9e30088 782 struct flow_cls_common_offload common;
b87f7936 783 enum tc_matchall_command command;
f00cbf19 784 struct flow_rule *rule;
b7fe4ab8 785 struct flow_stats stats;
5246c896 786 bool use_act_stats;
b87f7936
YG
787 unsigned long cookie;
788};
789
332ae8e2 790enum tc_clsbpf_command {
102740bd 791 TC_CLSBPF_OFFLOAD,
68d64063 792 TC_CLSBPF_STATS,
332ae8e2
JK
793};
794
795struct tc_cls_bpf_offload {
f9e30088 796 struct flow_cls_common_offload common;
332ae8e2
JK
797 enum tc_clsbpf_command command;
798 struct tcf_exts *exts;
799 struct bpf_prog *prog;
102740bd 800 struct bpf_prog *oldprog;
332ae8e2
JK
801 const char *name;
802 bool exts_integrated;
803};
804
1045ba77
JHS
805/* This structure holds cookie structure that is passed from user
806 * to the kernel for actions and classifiers
807 */
808struct tc_cookie {
809 u8 *data;
810 u32 len;
eec94fdb 811 struct rcu_head rcu;
1045ba77 812};
602f3baf 813
f34b4aac 814struct tc_qopt_offload_stats {
50dc9a85 815 struct gnet_stats_basic_sync *bstats;
f34b4aac
NF
816 struct gnet_stats_queue *qstats;
817};
818
f971b132
JK
819enum tc_mq_command {
820 TC_MQ_CREATE,
821 TC_MQ_DESTROY,
47c669a4 822 TC_MQ_STATS,
d577a3d2
JK
823 TC_MQ_GRAFT,
824};
825
826struct tc_mq_opt_offload_graft_params {
827 unsigned long queue;
828 u32 child_handle;
f971b132
JK
829};
830
831struct tc_mq_qopt_offload {
832 enum tc_mq_command command;
833 u32 handle;
d577a3d2
JK
834 union {
835 struct tc_qopt_offload_stats stats;
836 struct tc_mq_opt_offload_graft_params graft_params;
837 };
f971b132
JK
838};
839
d03b195b
MM
840enum tc_htb_command {
841 /* Root */
842 TC_HTB_CREATE, /* Initialize HTB offload. */
843 TC_HTB_DESTROY, /* Destroy HTB offload. */
844
845 /* Classes */
846 /* Allocate qid and create leaf. */
847 TC_HTB_LEAF_ALLOC_QUEUE,
848 /* Convert leaf to inner, preserve and return qid, create new leaf. */
849 TC_HTB_LEAF_TO_INNER,
850 /* Delete leaf, while siblings remain. */
851 TC_HTB_LEAF_DEL,
852 /* Delete leaf, convert parent to leaf, preserving qid. */
853 TC_HTB_LEAF_DEL_LAST,
854 /* TC_HTB_LEAF_DEL_LAST, but delete driver data on hardware errors. */
855 TC_HTB_LEAF_DEL_LAST_FORCE,
856 /* Modify parameters of a node. */
857 TC_HTB_NODE_MODIFY,
858
859 /* Class qdisc */
860 TC_HTB_LEAF_QUERY_QUEUE, /* Query qid by classid. */
861};
862
863struct tc_htb_qopt_offload {
864 struct netlink_ext_ack *extack;
865 enum tc_htb_command command;
d03b195b 866 u32 parent_classid;
ca49bfd9 867 u16 classid;
d03b195b 868 u16 qid;
d03b195b
MM
869 u64 rate;
870 u64 ceil;
871};
872
873#define TC_HTB_CLASSID_ROOT U32_MAX
874
602f3baf
NF
875enum tc_red_command {
876 TC_RED_REPLACE,
877 TC_RED_DESTROY,
878 TC_RED_STATS,
879 TC_RED_XSTATS,
bf2a752b 880 TC_RED_GRAFT,
602f3baf
NF
881};
882
883struct tc_red_qopt_offload_params {
884 u32 min;
885 u32 max;
886 u32 probability;
c0b7490b 887 u32 limit;
602f3baf 888 bool is_ecn;
190852a5 889 bool is_harddrop;
0a7fad23 890 bool is_nodrop;
416ef9b1 891 struct gnet_stats_queue *qstats;
602f3baf 892};
602f3baf
NF
893
894struct tc_red_qopt_offload {
895 enum tc_red_command command;
896 u32 handle;
897 u32 parent;
898 union {
899 struct tc_red_qopt_offload_params set;
f34b4aac 900 struct tc_qopt_offload_stats stats;
602f3baf 901 struct red_stats *xstats;
bf2a752b 902 u32 child_handle;
602f3baf
NF
903 };
904};
905
890d8d23
JK
906enum tc_gred_command {
907 TC_GRED_REPLACE,
908 TC_GRED_DESTROY,
e49efd52 909 TC_GRED_STATS,
890d8d23
JK
910};
911
912struct tc_gred_vq_qopt_offload_params {
913 bool present;
914 u32 limit;
915 u32 prio;
916 u32 min;
917 u32 max;
918 bool is_ecn;
919 bool is_harddrop;
920 u32 probability;
921 /* Only need backlog, see struct tc_prio_qopt_offload_params */
922 u32 *backlog;
923};
924
925struct tc_gred_qopt_offload_params {
926 bool grio_on;
927 bool wred_on;
928 unsigned int dp_cnt;
929 unsigned int dp_def;
930 struct gnet_stats_queue *qstats;
931 struct tc_gred_vq_qopt_offload_params tab[MAX_DPs];
932};
933
e49efd52 934struct tc_gred_qopt_offload_stats {
50dc9a85 935 struct gnet_stats_basic_sync bstats[MAX_DPs];
e49efd52
JK
936 struct gnet_stats_queue qstats[MAX_DPs];
937 struct red_stats *xstats[MAX_DPs];
938};
939
890d8d23
JK
940struct tc_gred_qopt_offload {
941 enum tc_gred_command command;
942 u32 handle;
943 u32 parent;
944 union {
945 struct tc_gred_qopt_offload_params set;
e49efd52 946 struct tc_gred_qopt_offload_stats stats;
890d8d23
JK
947 };
948};
949
7fdb61b4
NF
950enum tc_prio_command {
951 TC_PRIO_REPLACE,
952 TC_PRIO_DESTROY,
953 TC_PRIO_STATS,
b9c7a7ac 954 TC_PRIO_GRAFT,
7fdb61b4
NF
955};
956
957struct tc_prio_qopt_offload_params {
958 int bands;
959 u8 priomap[TC_PRIO_MAX + 1];
9586a992
PM
960 /* At the point of un-offloading the Qdisc, the reported backlog and
961 * qlen need to be reduced by the portion that is in HW.
7fdb61b4
NF
962 */
963 struct gnet_stats_queue *qstats;
964};
965
b9c7a7ac
NF
966struct tc_prio_qopt_offload_graft_params {
967 u8 band;
968 u32 child_handle;
969};
970
7fdb61b4
NF
971struct tc_prio_qopt_offload {
972 enum tc_prio_command command;
973 u32 handle;
974 u32 parent;
975 union {
976 struct tc_prio_qopt_offload_params replace_params;
977 struct tc_qopt_offload_stats stats;
b9c7a7ac 978 struct tc_prio_qopt_offload_graft_params graft_params;
7fdb61b4
NF
979 };
980};
b9c7a7ac 981
98b0e5f6
JK
982enum tc_root_command {
983 TC_ROOT_GRAFT,
984};
985
986struct tc_root_qopt_offload {
987 enum tc_root_command command;
988 u32 handle;
989 bool ingress;
990};
991
d35eb52b
PM
992enum tc_ets_command {
993 TC_ETS_REPLACE,
994 TC_ETS_DESTROY,
995 TC_ETS_STATS,
996 TC_ETS_GRAFT,
997};
998
999struct tc_ets_qopt_offload_replace_params {
1000 unsigned int bands;
1001 u8 priomap[TC_PRIO_MAX + 1];
1002 unsigned int quanta[TCQ_ETS_MAX_BANDS]; /* 0 for strict bands. */
1003 unsigned int weights[TCQ_ETS_MAX_BANDS];
1004 struct gnet_stats_queue *qstats;
1005};
1006
1007struct tc_ets_qopt_offload_graft_params {
1008 u8 band;
1009 u32 child_handle;
1010};
1011
1012struct tc_ets_qopt_offload {
1013 enum tc_ets_command command;
1014 u32 handle;
1015 u32 parent;
1016 union {
1017 struct tc_ets_qopt_offload_replace_params replace_params;
1018 struct tc_qopt_offload_stats stats;
1019 struct tc_ets_qopt_offload_graft_params graft_params;
1020 };
1021};
1022
ef6aadcc
PM
1023enum tc_tbf_command {
1024 TC_TBF_REPLACE,
1025 TC_TBF_DESTROY,
1026 TC_TBF_STATS,
6b3efbfa 1027 TC_TBF_GRAFT,
ef6aadcc
PM
1028};
1029
1030struct tc_tbf_qopt_offload_replace_params {
1031 struct psched_ratecfg rate;
1032 u32 max_size;
1033 struct gnet_stats_queue *qstats;
1034};
1035
1036struct tc_tbf_qopt_offload {
1037 enum tc_tbf_command command;
1038 u32 handle;
1039 u32 parent;
1040 union {
1041 struct tc_tbf_qopt_offload_replace_params replace_params;
1042 struct tc_qopt_offload_stats stats;
6b3efbfa 1043 u32 child_handle;
ef6aadcc
PM
1044 };
1045};
1046
aaca9408
PM
1047enum tc_fifo_command {
1048 TC_FIFO_REPLACE,
1049 TC_FIFO_DESTROY,
1050 TC_FIFO_STATS,
1051};
1052
1053struct tc_fifo_qopt_offload {
1054 enum tc_fifo_command command;
1055 u32 handle;
1056 u32 parent;
1057 union {
1058 struct tc_qopt_offload_stats stats;
1059 };
1060};
1061
35d39fec
PB
1062#ifdef CONFIG_NET_CLS_ACT
1063DECLARE_STATIC_KEY_FALSE(tc_skb_ext_tc);
1064void tc_skb_ext_tc_enable(void);
1065void tc_skb_ext_tc_disable(void);
1066#define tc_skb_ext_tc_enabled() static_branch_unlikely(&tc_skb_ext_tc)
1067#else /* CONFIG_NET_CLS_ACT */
1068static inline void tc_skb_ext_tc_enable(void) { }
1069static inline void tc_skb_ext_tc_disable(void) { }
1070#define tc_skb_ext_tc_enabled() false
1071#endif
1072
1da177e4 1073#endif