** Also affects: linux-bluefield (Ubuntu Focal) Importance: Undecided Status: New
** Changed in: linux-bluefield (Ubuntu Focal) Importance: Undecided => Medium ** Changed in: linux-bluefield (Ubuntu Focal) Status: New => In Progress ** Changed in: linux-bluefield (Ubuntu Focal) Assignee: (unassigned) => Bodong Wang (bodong-wang) ** Changed in: linux-bluefield (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2006397 Title: nft_lookup crash when running DDOS attack Status in linux-bluefield package in Ubuntu: Invalid Status in linux-bluefield source package in Focal: In Progress Bug description: * Explain the bug Running DDOS test on tcp port 22 will trigger kernel crash. * Brief explanation of fixes Do not update stateful expressions if lookup is inverted * How to test Configuration nftables with config file below: flush ruleset table inet filter { chain input { type filter hook input priority 0 jump filter_ssh } chain filter_ssh { tcp dport { 22 } ct state new accept } } * {22}: {} is mandatory to repro If we don’t add {}, nft_lookup_eval function is never called and kernel crush isn’t reproduced. Then apply nft by doing: # nft -f temp_nftables.conf Start hping3 from peer: # hping3 -I {Host Device} -p 22 -d 52 {SmartNIC IP Address} --flood DPU side will crash with kernel call trace without this fix. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2006397/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp