This bug was fixed in the package linux-bluefield - 5.4.0-1060.66 --------------- linux-bluefield (5.4.0-1060.66) focal; urgency=medium
* focal/linux-bluefield: 5.4.0-1060.66 -proposed tracker (LP: #2008364) * gpio: Restrict usage of GPIO chip irq members before initialization (LP: #2007581) - gpio: Restrict usage of GPIO chip irq members before initialization - gpio: Request interrupts after IRQ is initialized * netfilter: flowtable: add counter support in HW offload (LP: #2008136) - netfilter: conntrack: add nf_ct_acct_add() - netfilter: flowtable: add counter support in HW offload [ Ubuntu: 5.4.0-145.162 ] * focal/linux: 5.4.0-145.162 -proposed tracker (LP: #2008389) * [SRU]Update ice driver to support E823 devices (LP: #1986717) - ice: Add device ids for E822 devices - ice: add support for E823 devices * btrfs/154: rename fails with EOVERFLOW when calculating item size during item key collision (LP: #2004132) - btrfs: correctly calculate item size used when item key collision happens * rtcpie in timers from ubuntu_kernel_selftests randomly failing (LP: #1814234) - SAUCE: selftest: rtcpie: Force passing unreliable subtest * [UBUNTU 20.04] KVM: s390: pv: don't allow userspace to set the clock under PV - kernel part (LP: #1999882) - KVM: s390x: fix SCK locking - KVM: s390: pv: don't allow userspace to set the clock under PV * CVE-2021-3669 - ipc: replace costly bailout check in sysvipc_find_ipc() * net:fcnal-test.sh 'nettest' command not found on F/K (LP: #2006391) - selftests/net: Find nettest in current directory * xfs: Preallocated ioend transactions cause deadlock due to log buffer exhaustion (LP: #2007219) - xfs: drop submit side trans alloc for append ioends * CVE-2022-4382 - USB: gadgetfs: Fix race between mounting and unmounting * CVE-2022-2196 - KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS * ubuntu_kernel_selftests: net:udpgso_bench.sh failed (LP: #1951447) - selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs * net:fcnal-test.sh didn't return a non-zero value even with some sub-tests failed (LP: #2006692) - selftests: net/fcnal-test.sh: add exit code * Fix selftests/ftracetests/Meta-selftests in Focal (LP: #2006453) - SAUCE: Fix ftrace/Meta-selftests bashism check * CVE-2023-23559 - wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid -- Bartlomiej Zolnierkiewicz <bartlomiej.zolnierkiew...@canonical.com> Fri, 10 Mar 2023 18:15:33 +0100 ** Changed in: linux-bluefield (Ubuntu Focal) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3669 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-2196 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-4382 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-23559 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2008136 Title: netfilter: flowtable: add counter support in HW offload Status in linux-bluefield package in Ubuntu: New Status in linux-bluefield source package in Focal: Fix Released Bug description: * Explain the bug(s) While conntrack tuples are offloaded to hardware and conntrack packet accounting is enabled, offloaded packets aren't counted. * Brief explanation of fixes Cherry-pick. No adaptation. First commit for SW, second commit of HW offloaded rules. ef803b3cf96a netfilter: flowtable: add counter support in HW offload 9312eabab4a6 netfilter: conntrack: add nf_ct_acct_add() note: need to change a little due to cherry-pick conflict with 24384e28586c netfilter: flowtable: Set offload timeouts according to proto values * How to test Create OVS bridge with 2 devices mlx5 rep devices. Enable HW offload and configure regular connection tracking OpenFlow rules: e.g: ovs-ofctl del-flows br-ovs ovs-ofctl add-flow br-ovs arp,actions=normal ovs-ofctl add-flow br-ovs "table=0, ip,ct_state=-trk actions=ct(table=1)" ovs-ofctl add-flow br-ovs "table=1, ip,ct_state=+trk+new actions=ct(commit),normal" ovs-ofctl add-flow br-ovs "table=1, ip,ct_state=+trk+est, actions=normal" Run a TCP connection, e.g: on mlx5 VF1 iperf -s on mlx5 VF2 iperf -c <ip> -t 10 Optional: In different terminal, while traffic is running, check for offload: tcpdump -nnepi <RELEVANT_MLX5_REP> tcp and see no iperf tcp packets. Dump conntrack with relevant ip: echo "1" > /proc/sys/net/netfilter/nf_conntrack_acct cat /proc/net/nf_conntrack | grep -i <ip> See counters (packets=.*) advancing while tuples were offloaded: ipv4 2 tcp 6 src=1.1.1.2 dst=1.1.1.3 sport=56394 dport=5001 packets=2 bytes=112 src=1.1.1.3 dst=1.1.1.2 sport=5001 dport=56394 packets=1777 bytes=665340 [HW_OFFLOAD] mark=0 zone=0 use=3 * What it could break. Nothing. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2008136/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp