This bug was fixed in the package linux-bluefield - 5.4.0-1062.68 --------------- linux-bluefield (5.4.0-1062.68) focal; urgency=medium
* focal/linux-bluefield: 5.4.0-1062.68 -proposed tracker (LP: #2016751) * CVE-2023-1829 - [Config] bluefield: Make sure CONFIG_NET_CLS_TCINDEX is not available * net/sched: cls_api: Support hardware miss to tc action (LP: #2012571) - Revert "net/sched: flower: fix fl_change() error recovery path" - Revert "net/sched: flower: Support hardware miss to tc action" - Revert "net/sched: flower: Move filter handle initialization earlier" - Revert "net/sched: cls_api: Support hardware miss to tc action" - Revert "UBUNTU: SAUCE: net/sched: Provide act to offload action" [ Ubuntu: 5.4.0-148.165 ] * focal/linux: 5.4.0-148.165 -proposed tracker (LP: #2016777) * CVE-2023-1829 - net/sched: Retire tcindex classifier - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available -- Bartlomiej Zolnierkiewicz <bartlomiej.zolnierkiew...@canonical.com> Thu, 27 Apr 2023 16:48:23 +0200 ** Changed in: linux-bluefield (Ubuntu Focal) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-1829 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2015293 Title: netfilter: ctnetlink: Support offloaded conntrack entry deletion Status in linux-bluefield package in Ubuntu: Invalid Status in linux-bluefield source package in Focal: Fix Released Bug description: * Explain the bug(s) conntrack -D or conntrack -F doesn't delete offloaded tuples. * brief explanation of fixes Add support for to delete offloaded tuples via netlink interface and userspace conntrack utility. * How to test Create OVS bridge with 2 devices mlx5 rep devices. Enable HW offload and configure regular connection tracking OpenFlow rules: e.g: ovs-ofctl del-flows br-ovs ovs-ofctl add-flow br-ovs arp,actions=normal ovs-ofctl add-flow br-ovs "table=0, ip,ct_state=-trk actions=ct(table=1)" ovs-ofctl add-flow br-ovs "table=1, ip,ct_state=+trk+new actions=ct(commit),normal" ovs-ofctl add-flow br-ovs "table=1, ip,ct_state=+trk+est, actions=normal" Run a UDP connection, e.g: on mlx5 VF1 iperf -s -u on mlx5 VF2 iperf -c <ip> -u -t 10 Optional: In different terminal, while traffic is running, check for offload: tcpdump -nnepi <RELEVANT_MLX5_REP> udp and see no iperf udp packets. Dump conntrack with relevant ip: cat /proc/net/nf_conntrack | grep -i <ip> See tuples were offloaded: ipv4 2 udp 17 src=1.1.1.2 dst=1.1.1.3 sport=56394 dport=5001 packets=2 bytes=112 src=1.1.1.3 dst=1.1.1.2 sport=5001 dport=56394 packets=1777 bytes=665340 [HW_OFFLOAD] mark=0 zone=0 use=3 Flush the tuples: conntrack -F Verify tuples are deleted: cat /proc/net/nf_conntrack | grep -i <ip> Before fix, the above tuple shows again, after fix, it's deleted, and shows nothing. * What it could break. Conntrack -F / -D not working on offloaded tuples. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2015293/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp