From: wenxu <wenxu@xxxxxxxxx> This series patch support more expr and obj offload: fw_nedev, set payload, tunnel encap/decap action, tunnel meta match, objref offload Keep the action data in reg through immedidate offload The follwing is the test sample: # nft add table netdev firewall # nft add tunnel netdev firewall encap tunid 1000 tundst 0xf198a8ac tunsrc 0x4b98a8ac tunrelease 0 # nft add tunnel netdev firewall decap tunid 0 tundst 0 tunsrc 0 tunrelease 1 # nft add chain netdev firewall aclout { type filter hook ingress device mlx_pf0vf0 priority - 300 \; } # nft --debug=netlink add rule netdev firewall aclout ip daddr 10.0.1.7 @ll,0,48 set 0x00002e9ca06e2596 @ll,48,48 set 0xfaffffffffff tunnel name encap fwd to gretap [ meta load protocol => reg 1 ] [ cmp eq reg 1 0x00000008 ] [ payload load 4b @ network header + 16 => reg 1 ] [ cmp eq reg 1 0x0701000a ] [ immediate reg 1 0x6ea09c2e 0x00009625 ] [ payload write reg 1 => 6b @ link header + 0 csum_type 0 csum_off 0 csum_flags 0x0 ] [ immediate reg 1 0xfffffffa 0x0000ffff ] [ payload write reg 1 => 6b @ link header + 6 csum_type 0 csum_off 0 csum_flags 0x0 ] [ objref type 6 name encap ] [ immediate reg 1 0x00000019 ] [ fwd sreg_dev 1 ] # nft add chain netdev firewall aclin { type filter hook ingress device gretap priority - 300 \; } # nft --debug=netlink add rule netdev firewall aclin ip daddr 10.0.0.7 tunnel tunid 1000 tunnel tundst 172.168.152.75 tunnel tunsrc 172.168.152.241 tunnel name decap @ll,0,48 set 0x0000525400001275 @ll,48,48 set 0xfaffffffffff fwd to mlx_pf0vf0 [ meta load protocol => reg 1 ] [ cmp eq reg 1 0x00000008 ] [ payload load 4b @ network header + 16 => reg 1 ] [ cmp eq reg 1 0x0700000a ] [ tunnel load id => reg 1 ] [ cmp eq reg 1 0x000003e8 ] [ tunnel load tun_dst => reg 1 ] [ cmp eq reg 1 0xaca8984b ] [ tunnel load tun_src => reg 1 ] [ cmp eq reg 1 0xaca898f1 ] [ objref type 6 name decap ] [ immediate reg 1 0x00005452 0x00007512 ] [ payload write reg 1 => 6b @ link header + 0 csum_type 0 csum_off 0 csum_flags 0x0 ] [ immediate reg 1 0xfffffffa 0x0000ffff ] [ payload write reg 1 => 6b @ link header + 6 csum_type 0 csum_off 0 csum_flags 0x0 ] [ immediate reg 1 0x0000000f ] [ fwd sreg_dev 1 ] wenxu (11): netfilter: nf_flow_offload: add net in offload_ctx netfilter: nf_tables_offload: add offload_actions callback netfilter: nf_tables_offload: split nft_offload_reg to match and action type netfilter: nft_immediate: add offload support for actions netfilter: nft_fwd_netdev: add fw_netdev action support netfilter: nft_payload: add nft_set_payload offload support netfilter: nft_tunnel: support NFT_TUNNEL_SRC/DST_IP match netfilter: nft_tunnel: support tunnel meta match offload netfilter: nft_tunnel: add NFTA_TUNNEL_KEY_RELEASE action netfilter: nft_objref: add nft_objref_type offload netfilter: nft_tunnel: support nft_tunnel_obj offload include/net/netfilter/nf_tables.h | 10 ++- include/net/netfilter/nf_tables_offload.h | 27 ++++++- include/uapi/linux/netfilter/nf_tables.h | 3 + net/netfilter/nf_tables_api.c | 2 +- net/netfilter/nf_tables_offload.c | 7 +- net/netfilter/nft_cmp.c | 10 +-- net/netfilter/nft_fwd_netdev.c | 30 ++++++++ net/netfilter/nft_immediate.c | 47 +++++++----- net/netfilter/nft_meta.c | 6 +- net/netfilter/nft_objref.c | 15 ++++ net/netfilter/nft_payload.c | 90 +++++++++++++++++++--- net/netfilter/nft_tunnel.c | 123 ++++++++++++++++++++++++++---- 12 files changed, 312 insertions(+), 58 deletions(-) -- 1.8.3.1