Public bug reported:

SRU Justification:

ct conns were not offloaded if tc filter has ct commit action.

* Explain the bug(s)

Currently established connections are not offloaded if the filter has a
"ct commit" action. This behavior will not offload connections of the
following scenario:

$ tc_filter add dev $DEV ingress protocol ip prio 1 flower \
  ct_state -trk \
  action ct commit action goto chain 1

$ tc_filter add dev $DEV ingress protocol ip chain 1 prio 1 flower \
  action mirred egress redirect dev $DEV2

$ tc_filter add dev $DEV2 ingress protocol ip prio 1 flower \
  action ct commit action goto chain 1

$ tc_filter add dev $DEV2 ingress protocol ip prio 1 chain 1 flower \
  ct_state +trk+est \
  action mirred egress redirect dev $DEV

Offload established connections, regardless of the commit flag.

* brief explanation of fixes

don't skip processing ct conns if ct commit action exists.

* How to test

Add ct commit action to the tc filters, which is not +trk+new which is not 
offloaded anyway.
Can use the example explained above.
Run traffic and check if offloaded or not.

* What it could break.

Offloading of ct conns depending on how user set the rules in tc and/or ovs.
If the ct commit action exists in tc filter that is offloaded, then established 
ct conns will not be offloaded.

** Affects: linux-bluefield (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1929459

Title:
  CT: Offload connections with commit action

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1929459/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to