From: wenxu <[email protected]>

With nf_conntrack_bridge function. The bridge family can do
conntrack it self. The flow offload function based on the
conntrack. So the flow in the bridge wih conntrack can be
offloaded.

Signed-off-by: wenxu <[email protected]>
---
 include/net/netfilter/nf_flow_table.h |  31 +++++++-
 net/bridge/br_vlan.c                  |   1 +
 net/netfilter/nf_flow_table_core.c    |  58 ++++++++++++---
 net/netfilter/nf_flow_table_ip.c      |  43 +++++++++++-
 net/netfilter/nft_flow_offload.c      | 129 ++++++++++++++++++++++++++++++++--
 5 files changed, 243 insertions(+), 19 deletions(-)

diff --git a/include/net/netfilter/nf_flow_table.h 
b/include/net/netfilter/nf_flow_table.h
index d40d409..dcf197a 100644
--- a/include/net/netfilter/nf_flow_table.h
+++ b/include/net/netfilter/nf_flow_table.h
@@ -33,8 +33,23 @@ enum flow_offload_tuple_dir {
        FLOW_OFFLOAD_DIR_MAX = IP_CT_DIR_MAX
 };
 
+enum flow_offload_tuple_type {
+       FLOW_OFFLOAD_TYPE_INET,
+       FLOW_OFFLOAD_TYPE_BRIDGE,
+};
+
+struct dst_br_port {
+       struct net_device *dev;
+       u16     dst_vlan_tag;
+       u16     vlan_proto;
+};
+
 struct flow_offload_dst {
-       struct dst_entry                *dst_cache;
+       enum flow_offload_tuple_type type;
+       union {
+               struct dst_entry                *dst_cache;
+               struct dst_br_port              dst_port;
+       };
 };
 
 struct flow_offload_tuple {
@@ -52,6 +67,7 @@ struct flow_offload_tuple {
        };
 
        int                             iifidx;
+       u16                             vlan_tag;
 
        u8                              l3proto;
        u8                              l4proto;
@@ -89,8 +105,19 @@ struct nf_flow_route {
        } tuple[FLOW_OFFLOAD_DIR_MAX];
 };
 
+struct nf_flow_forward {
+       struct {
+               struct dst_br_port      dst_port;
+               u16 vlan_tag;
+       } tuple[FLOW_OFFLOAD_DIR_MAX];
+};
+
 struct nf_flow_dst {
-       struct nf_flow_route route;
+       enum flow_offload_tuple_type type;
+       union {
+               struct nf_flow_route route;
+               struct nf_flow_forward forward;
+       };
 };
 
 struct flow_offload *flow_offload_alloc(struct nf_conn *ct,
diff --git a/net/bridge/br_vlan.c b/net/bridge/br_vlan.c
index f47f526..bcb7ce4 100644
--- a/net/bridge/br_vlan.c
+++ b/net/bridge/br_vlan.c
@@ -729,6 +729,7 @@ struct net_bridge_vlan *br_vlan_find(struct 
net_bridge_vlan_group *vg, u16 vid)
 
        return br_vlan_lookup(&vg->vlan_hash, vid);
 }
+EXPORT_SYMBOL_GPL(br_vlan_find);
 
 /* Must be protected by RTNL. */
 static void recalculate_group_addr(struct net_bridge *br)
diff --git a/net/netfilter/nf_flow_table_core.c 
b/net/netfilter/nf_flow_table_core.c
index 2bec409..08c1ca4 100644
--- a/net/netfilter/nf_flow_table_core.c
+++ b/net/netfilter/nf_flow_table_core.c
@@ -36,6 +36,21 @@ struct flow_offload_entry {
        return dst;
 }
 
+static struct dst_br_port *
+flow_offload_fill_bridge_dst(struct flow_offload_tuple *ft,
+                            struct nf_flow_forward *forward,
+                            enum flow_offload_tuple_dir dir)
+{
+       struct dst_br_port other_dst_port = forward->tuple[!dir].dst_port;
+       struct dst_br_port dst_port = forward->tuple[dir].dst_port;
+
+       ft->iifidx = other_dst_port.dev->ifindex;
+       ft->dst.dst_port = dst_port;
+       ft->vlan_tag = forward->tuple[dir].vlan_tag;
+
+       return &ft->dst.dst_port;
+}
+
 static void
 flow_offload_fill_dir(struct flow_offload *flow, struct nf_conn *ct,
                      struct nf_flow_dst *flow_dst,
@@ -43,16 +58,29 @@ struct flow_offload_entry {
 {
        struct flow_offload_tuple *ft = &flow->tuplehash[dir].tuple;
        struct nf_conntrack_tuple *ctt = &ct->tuplehash[dir].tuple;
+       struct dst_br_port *dst_port;
        struct dst_entry *dst;
 
-       dst = flow_offload_fill_inet_dst(ft, &flow_dst->route, dir);
+       switch (flow_dst->type) {
+       case FLOW_OFFLOAD_TYPE_INET:
+               dst = flow_offload_fill_inet_dst(ft, &flow_dst->route, dir);
+               break;
+       case FLOW_OFFLOAD_TYPE_BRIDGE:
+               dst_port = flow_offload_fill_bridge_dst(ft, &flow_dst->forward, 
dir);
+               break;
+       }
+
+       ft->dst.type = flow_dst->type;
        ft->dir = dir;
 
        switch (ctt->src.l3num) {
        case NFPROTO_IPV4:
                ft->src_v4 = ctt->src.u3.in;
                ft->dst_v4 = ctt->dst.u3.in;
-               ft->mtu = ip_dst_mtu_maybe_forward(dst, true);
+               if (flow_dst->type == FLOW_OFFLOAD_TYPE_INET)
+                       ft->mtu = ip_dst_mtu_maybe_forward(dst, true);
+               else
+                       ft->mtu = dst_port->dev->mtu;
                break;
        case NFPROTO_IPV6:
                ft->src_v6 = ctt->src.u3.in6;
@@ -67,13 +95,13 @@ struct flow_offload_entry {
        ft->dst_port = ctt->dst.u.tcp.port;
 }
 
-static int flow_offload_dst_hold(struct nf_flow_dst *flow_dst)
+static int flow_offload_dst_hold(struct nf_flow_route *route)
 {
-       if 
(!dst_hold_safe(flow_dst->route.tuple[FLOW_OFFLOAD_DIR_ORIGINAL].dst))
+       if (!dst_hold_safe(route->tuple[FLOW_OFFLOAD_DIR_ORIGINAL].dst))
                return -1;
 
-       if (!dst_hold_safe(flow_dst->route.tuple[FLOW_OFFLOAD_DIR_REPLY].dst)) {
-               
dst_release(flow_dst->route.tuple[FLOW_OFFLOAD_DIR_ORIGINAL].dst);
+       if (!dst_hold_safe(route->tuple[FLOW_OFFLOAD_DIR_REPLY].dst)) {
+               dst_release(route->tuple[FLOW_OFFLOAD_DIR_ORIGINAL].dst);
                return -1;
        }
 
@@ -96,7 +124,8 @@ struct flow_offload *
 
        flow = &entry->flow;
 
-       if (flow_offload_dst_hold(flow_dst))
+       if (flow_dst->type == FLOW_OFFLOAD_TYPE_INET &&
+           flow_offload_dst_hold(&flow_dst->route))
                goto err_dst_cache;
 
        entry->ct = ct;
@@ -156,8 +185,19 @@ static void flow_offload_fixup_ct_state(struct nf_conn *ct)
 
 static void flow_offload_dst_release(struct flow_offload *flow)
 {
-       
dst_release(flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst.dst_cache);
-       
dst_release(flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst.dst_cache);
+       enum flow_offload_tuple_type type = 
flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst.type;
+
+       switch (type) {
+       case FLOW_OFFLOAD_TYPE_INET:
+               
dst_release(flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst.dst_cache);
+               
dst_release(flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst.dst_cache);
+               break;
+
+       case FLOW_OFFLOAD_TYPE_BRIDGE:
+               
dev_put(flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst.dst_port.dev);
+               
dev_put(flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst.dst_port.dev);
+               break;
+       }
 }
 
 void flow_offload_free(struct flow_offload *flow)
diff --git a/net/netfilter/nf_flow_table_ip.c b/net/netfilter/nf_flow_table_ip.c
index 24263e2..490b4be 100644
--- a/net/netfilter/nf_flow_table_ip.c
+++ b/net/netfilter/nf_flow_table_ip.c
@@ -233,12 +233,40 @@ static void nf_flow_inet_xmit(struct flow_offload *flow, 
struct sk_buff *skb,
        neigh_xmit(NEIGH_ARP_TABLE, outdev, &nexthop, skb);
 }
 
+static void nf_flow_bridge_xmit(struct flow_offload *flow, struct sk_buff *skb,
+                               enum flow_offload_tuple_dir dir)
+{
+       struct net_device *outdev;
+       u16 vlan_tag, vlan_proto;
+
+       vlan_tag = flow->tuplehash[dir].tuple.dst.dst_port.dst_vlan_tag;
+       vlan_proto = flow->tuplehash[dir].tuple.dst.dst_port.vlan_proto;
+       outdev = flow->tuplehash[dir].tuple.dst.dst_port.dev;
+       skb->dev = outdev;
+
+       if (vlan_tag)
+               __vlan_hwaccel_put_tag(skb, vlan_proto, vlan_tag);
+       else
+               __vlan_hwaccel_clear_tag(skb);
+
+       skb_push(skb, ETH_HLEN);
+       if (!is_skb_forwardable(skb->dev, skb))
+               goto drop;
+
+       dev_queue_xmit(skb);
+       return;
+
+drop:
+       kfree_skb(skb);
+}
+
 unsigned int
 nf_flow_offload_ip_hook(void *priv, struct sk_buff *skb,
                        const struct nf_hook_state *state)
 {
        struct flow_offload_tuple_rhash *tuplehash;
        struct nf_flowtable *flow_table = priv;
+       int family = flow_table->type->family;
        struct flow_offload_tuple tuple = {};
        enum flow_offload_tuple_dir dir;
        struct flow_offload *flow;
@@ -247,9 +275,15 @@ static void nf_flow_inet_xmit(struct flow_offload *flow, 
struct sk_buff *skb,
        if (skb->protocol != htons(ETH_P_IP))
                return NF_ACCEPT;
 
+       if (family != NFPROTO_BRIDGE && family != NFPROTO_IPV4)
+               return NF_ACCEPT;
+
        if (nf_flow_tuple_ip(skb, state->in, &tuple) < 0)
                return NF_ACCEPT;
 
+       if (family == NFPROTO_BRIDGE && skb_vlan_tag_present(skb))
+               tuple.vlan_tag = skb_vlan_tag_get_id(skb);
+
        tuplehash = flow_offload_lookup(flow_table, &tuple);
        if (tuplehash == NULL)
                return NF_ACCEPT;
@@ -272,7 +306,14 @@ static void nf_flow_inet_xmit(struct flow_offload *flow, 
struct sk_buff *skb,
 
        flow->timeout = (u32)jiffies + NF_FLOW_TIMEOUT;
 
-       nf_flow_inet_xmit(flow, skb, dir);
+       switch (family) {
+       case NFPROTO_IPV4:
+               nf_flow_inet_xmit(flow, skb, dir);
+               break;
+       case NFPROTO_BRIDGE:
+               nf_flow_bridge_xmit(flow, skb, dir);
+               break;
+       }
 
        return NF_STOLEN;
 }
diff --git a/net/netfilter/nft_flow_offload.c b/net/netfilter/nft_flow_offload.c
index 4af94ce..0cdadd4 100644
--- a/net/netfilter/nft_flow_offload.c
+++ b/net/netfilter/nft_flow_offload.c
@@ -14,6 +14,10 @@
 #include <linux/netfilter/nf_conntrack_common.h>
 #include <net/netfilter/nf_flow_table.h>
 
+#ifdef CONFIG_NF_TABLES_BRIDGE
+#include "../bridge/br_private.h"
+#endif
+
 struct nft_flow_offload {
        struct nft_flowtable    *flowtable;
 };
@@ -49,23 +53,130 @@ static int nft_flow_route(const struct nft_pktinfo *pkt,
        return 0;
 }
 
+static int nft_flow_forward(const struct nft_pktinfo *pkt,
+                           const struct nf_conn *ct,
+                           struct nf_flow_forward *forward,
+                           enum ip_conntrack_dir dir)
+{
+#ifdef CONFIG_NF_TABLES_BRIDGE
+       struct net_bridge_vlan_group *vg;
+       const struct net_bridge_port *p;
+       u16 vlan_proto = 0;
+       u16 vid = 0;
+
+       if (skb_vlan_tag_present(pkt->skb)) {
+               vid = skb_vlan_tag_get_id(pkt->skb);
+               vlan_proto = pkt->skb->vlan_proto;
+       }
+
+       forward->tuple[dir].dst_port.dst_vlan_tag = vid;
+       forward->tuple[dir].dst_port.vlan_proto = vlan_proto;
+       forward->tuple[!dir].vlan_tag = vid;
+       forward->tuple[dir].dst_port.dev = 
dev_get_by_index(dev_net(nft_out(pkt)),
+                                                           
nft_out(pkt)->ifindex);
+       forward->tuple[!dir].dst_port.dev = 
dev_get_by_index(dev_net(nft_in(pkt)),
+                                                            
nft_in(pkt)->ifindex);
+
+       p = br_port_get_rtnl_rcu(nft_out(pkt));
+       if (!p)
+               goto err;
+       if (!br_opt_get(p->br, BROPT_VLAN_ENABLED))
+               goto out;
+
+       if (!vid) {
+               vg = nbp_vlan_group_rcu(p);
+               vid = br_get_pvid(vg);
+       }
+
+       if (vid) {
+               struct net_bridge_vlan *vlan;
+
+               p = br_port_get_rtnl_rcu(nft_in(pkt));
+               if (!p)
+                       goto err;
+
+               vlan_proto = p->br->vlan_proto;
+               vg = nbp_vlan_group_rcu(p);
+               vlan = br_vlan_find(vg, vid);
+               if (vlan && vlan->flags & BRIDGE_VLAN_INFO_UNTAGGED) {
+                       vid = 0;
+                       vlan_proto = 0;
+               }
+       }
+
+out:
+       forward->tuple[!dir].dst_port.vlan_proto = vlan_proto;
+       forward->tuple[!dir].dst_port.dst_vlan_tag = vid;
+       forward->tuple[dir].vlan_tag = vid;
+
+       return 0;
+
+err:
+       dev_put(forward->tuple[dir].dst_port.dev);
+       dev_put(forward->tuple[!dir].dst_port.dev);
+#endif
+       return -ENOENT;
+}
+
 static bool nft_flow_offload_skip(struct sk_buff *skb, int family)
 {
        if (skb_sec_path(skb))
                return true;
 
-       if (family == NFPROTO_IPV4) {
+       switch (family) {
+       case NFPROTO_IPV4: {
                const struct ip_options *opt;
 
                opt = &(IPCB(skb)->opt);
 
                if (unlikely(opt->optlen))
                        return true;
+               break;
+       }
+       case NFPROTO_BRIDGE: {
+               const struct iphdr *iph;
+
+               if (skb->protocol != htons(ETH_P_IP))
+                       return true;
+
+               iph = ip_hdr(skb);
+               if (iph->ihl > 5)
+                       return true;
+               break;
+       }
        }
 
        return false;
 }
 
+static void flow_offload_release_dst(struct nf_flow_dst *flow_dst,
+                                    enum ip_conntrack_dir dir)
+{
+       if (flow_dst->type == FLOW_OFFLOAD_TYPE_BRIDGE) {
+               dev_put(flow_dst->forward.tuple[dir].dst_port.dev);
+               dev_put(flow_dst->forward.tuple[!dir].dst_port.dev);
+       } else {
+               dst_release(flow_dst->route.tuple[!dir].dst);
+       }
+}
+
+static int flow_offload_get_dst(const struct nft_pktinfo *pkt, struct nf_conn 
*ct,
+                               enum ip_conntrack_dir dir, int family,
+                               struct nf_flow_dst *flow_dst)
+{
+       if (family == NFPROTO_BRIDGE) {
+               flow_dst->type = FLOW_OFFLOAD_TYPE_BRIDGE;
+               if (nft_flow_forward(pkt, ct, &flow_dst->forward, dir) < 0)
+                       return -1;
+       } else {
+               flow_dst->type = FLOW_OFFLOAD_TYPE_INET;
+               if (nft_flow_route(pkt, ct, &flow_dst->route, dir) < 0)
+                       return -1;
+       }
+
+       return 0;
+}
+
 static void nft_flow_offload_eval(const struct nft_expr *expr,
                                  struct nft_regs *regs,
                                  const struct nft_pktinfo *pkt)
@@ -76,11 +187,12 @@ static void nft_flow_offload_eval(const struct nft_expr 
*expr,
        struct nf_flow_dst flow_dst;
        struct flow_offload *flow;
        enum ip_conntrack_dir dir;
+       int family = nft_pf(pkt);
        bool is_tcp = false;
        struct nf_conn *ct;
        int ret;
 
-       if (nft_flow_offload_skip(pkt->skb, nft_pf(pkt)))
+       if (nft_flow_offload_skip(pkt->skb, family))
                goto out;
 
        ct = nf_ct_get(pkt->skb, &ctinfo);
@@ -108,8 +220,9 @@ static void nft_flow_offload_eval(const struct nft_expr 
*expr,
                goto out;
 
        dir = CTINFO2DIR(ctinfo);
-       if (nft_flow_route(pkt, ct, &flow_dst.route, dir) < 0)
-               goto err_flow_route;
+
+       if (flow_offload_get_dst(pkt, ct, dir, family, &flow_dst) < 0)
+               goto err_flow_dst;
 
        flow = flow_offload_alloc(ct, &flow_dst);
        if (!flow)
@@ -124,14 +237,16 @@ static void nft_flow_offload_eval(const struct nft_expr 
*expr,
        if (ret < 0)
                goto err_flow_add;
 
-       dst_release(flow_dst.route.tuple[!dir].dst);
+       if (family != NFPROTO_BRIDGE)
+               dst_release(flow_dst.route.tuple[!dir].dst);
+
        return;
 
 err_flow_add:
        flow_offload_free(flow);
 err_flow_alloc:
-       dst_release(flow_dst.route.tuple[!dir].dst);
-err_flow_route:
+       flow_offload_release_dst(&flow_dst, dir);
+err_flow_dst:
        clear_bit(IPS_OFFLOAD_BIT, &ct->status);
 out:
        regs->verdict.code = NFT_BREAK;
-- 
1.8.3.1

Reply via email to