ACK/Cmnt: [SRU][F:linux-bluefield][PATCH] UBUNTU: SAUCE: netfilter: flowtable: Do flow offload refresh when requested

Tim Gardner tim.gardner at canonical.com
Fri May 7 15:12:23 UTC 2021


Acked-by: Tim Gardner <tim.gardner at canonical.com>

If I'm reading this right, this patch is dealing with offload request 
responses from NIC firmware, right ?

I'm not convinced this will pass an upstream review because it seems 
like a bit a of a hack, but then the patch this is fixing 8b3646d6e0c4 
("net/sched: act_ct: Support refreshing the flow table entries") seems 
like a bit of a hack too. Sometimes you just have to work around 
firmware behaviors.

Feel free to tell me if I'm completely wrong :)

On 5/6/21 6:46 AM, Daniel Jurgens wrote:
> BugLink: https://bugs.launchpad.net/bugs/1927374
> 
> Offload could fail for multiple reasons and a hw refresh bit is
> set to try to reoffload it in next sw packet.
> But sometimes the hw refresh bit is not set but a refresh could succeed.
> Remove the hw refresh bit and do offload refresh if requested.
> There won't be a new work entry if a work is already pending
> anyway as there is the hw pending bit.
> 
> Fixes: 8b3646d6e0c4 ("net/sched: act_ct: Support refreshing the flow table entries")
> Signed-off-by: Roi Dayan <roid at nvidia.com>
> Signed-off-by: Daniel Jurgens <danielj at nvidia.com>
> ---
>   include/net/netfilter/nf_flow_table.h | 1 -
>   net/netfilter/nf_flow_table_core.c    | 3 +--
>   net/netfilter/nf_flow_table_offload.c | 7 ++++---
>   3 files changed, 5 insertions(+), 6 deletions(-)
> 
> diff --git a/include/net/netfilter/nf_flow_table.h b/include/net/netfilter/nf_flow_table.h
> index ff14b39..ba3b58a 100644
> --- a/include/net/netfilter/nf_flow_table.h
> +++ b/include/net/netfilter/nf_flow_table.h
> @@ -126,7 +126,6 @@ enum nf_flow_flags {
>   	NF_FLOW_HW,
>   	NF_FLOW_HW_DYING,
>   	NF_FLOW_HW_DEAD,
> -	NF_FLOW_HW_REFRESH,
>   	NF_FLOW_HW_PENDING,
>   };
>   
> diff --git a/net/netfilter/nf_flow_table_core.c b/net/netfilter/nf_flow_table_core.c
> index 64df3f8..2405eac 100644
> --- a/net/netfilter/nf_flow_table_core.c
> +++ b/net/netfilter/nf_flow_table_core.c
> @@ -261,8 +261,7 @@ void flow_offload_refresh(struct nf_flowtable *flow_table,
>   	flow->timeout = nf_flowtable_time_stamp +
>   			nf_flow_offload_timeout(flow_table);
>   
> -	if (likely(!nf_flowtable_hw_offload(flow_table) ||
> -		   !test_and_clear_bit(NF_FLOW_HW_REFRESH, &flow->flags)))
> +	if (likely(!nf_flowtable_hw_offload(flow_table)))
>   		return;
>   
>   	nf_flow_offload_add(flow_table, flow);
> diff --git a/net/netfilter/nf_flow_table_offload.c b/net/netfilter/nf_flow_table_offload.c
> index 28a2983..ad705ca 100644
> --- a/net/netfilter/nf_flow_table_offload.c
> +++ b/net/netfilter/nf_flow_table_offload.c
> @@ -759,10 +759,11 @@ static void flow_offload_work_add(struct flow_offload_work *offload)
>   
>   	err = flow_offload_rule_add(offload, flow_rule);
>   	if (err < 0)
> -		set_bit(NF_FLOW_HW_REFRESH, &offload->flow->flags);
> -	else
> -		set_bit(IPS_HW_OFFLOAD_BIT, &offload->flow->ct->status);
> +		goto out;
> +
> +	set_bit(IPS_HW_OFFLOAD_BIT, &offload->flow->ct->status);
>   
> +out:
>   	nf_flow_offload_destroy(flow_rule);
>   }
>   
> 

-- 
-----------
Tim Gardner
Canonical, Inc



More information about the kernel-team mailing list