[FS#4239] flow_offloading_hw doesn't work with nftables (mt7621)
OpenWrt Bugs
openwrt-bugs at lists.openwrt.org
Mon Feb 7 06:09:20 PST 2022
THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
The following task has a new comment added:
FS#4239 - flow_offloading_hw doesn't work with nftables (mt7621)
User who did this - Jo-Philipp Wich (jow-)
----------
Nftables/firewall4 issues fixed with
* [[https://github.com/openwrt/openwrt/commit/2dd6777f15defc6fe343e8485d3e22325570fb2b|2dd6777f firewall4: update to latest Git HEAD]]
* [[https://github.com/openwrt/openwrt/commit/3b1692c463fae107177fcee51874696f6323d0d2|3b1692c4 netifd: update to latest Git HEAD]]
* [[https://git.openwrt.org/?p=project/firewall4.git;a=commitdiff;h=52831a00bec8e3676e2747029c0349f6be9c2593;hp=7cb10c809314261c20ddca069eacd469adf44be3|52831a00 fw4: improve flowtable handling]]
* [[https://git.openwrt.org/?p=project/netifd.git;a=commitdiff;h=fd4c9e17c8f22b866c1bf386c580074e3e678910|fd4c9e17 system-linux: expose hw-tc-offload ethtool feature in device status dump]]
On my ER-X hw flow offloading is properly utilized:
root at er-x:~# grep HW_OFFLOAD /proc/net/nf_conntrack | sed -e 's#dst=[^[:space:]]*#dst=...#g'
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=48642 dport=993 packets=3 bytes=207 src=212.204.60.9 dst=... sport=993 dport=48642 packets=87 bytes=8526 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=48634 dport=993 packets=14 bytes=1191 src=212.204.60.9 dst=... sport=993 dport=48634 packets=97 bytes=9701 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.211 dst=... sport=56921 dport=80 packets=2 bytes=144 src=18.159.56.174 dst=... sport=80 dport=56921 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=45320 dport=443 packets=1 bytes=60 src=162.125.19.131 dst=... sport=443 dport=45320 packets=6 bytes=973 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.246 dst=... sport=57477 dport=5223 packets=1 bytes=64 src=17.57.146.173 dst=... sport=5223 dport=57477 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=49386 dport=443 packets=1 bytes=60 src=139.59.210.197 dst=... sport=443 dport=49386 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.153 dst=... sport=50663 dport=5223 packets=1 bytes=64 src=17.57.146.68 dst=... sport=5223 dport=50663 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=33622 dport=443 packets=1 bytes=60 src=130.211.10.112 dst=... sport=443 dport=33622 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=52920 dport=993 packets=15 bytes=1278 src=85.13.138.36 dst=... sport=993 dport=52920 packets=101 bytes=9814 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 udp 17 src=10.11.12.246 dst=... sport=123 dport=123 packets=1 bytes=76 src=17.253.54.253 dst=... sport=123 dport=123 packets=1 bytes=76 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=35796 dport=443 packets=1 bytes=60 src=104.16.181.15 dst=... sport=443 dport=35796 packets=16 bytes=2037 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=47338 dport=443 packets=131 bytes=19204 src=52.149.21.60 dst=... sport=443 dport=47338 packets=53 bytes=23989 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=48644 dport=993 packets=8 bytes=634 src=212.204.60.9 dst=... sport=993 dport=48644 packets=61 bytes=5935 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=48636 dport=993 packets=34 bytes=3006 src=212.204.60.9 dst=... sport=993 dport=48636 packets=96 bytes=9593 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=48638 dport=993 packets=5 bytes=408 src=212.204.60.9 dst=... sport=993 dport=48638 packets=96 bytes=9358 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=34664 dport=443 packets=1 bytes=60 src=140.82.113.25 dst=... sport=443 dport=34664 packets=5 bytes=598 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=47352 dport=443 packets=65 bytes=8140 src=52.149.21.60 dst=... sport=443 dport=47352 packets=48 bytes=19987 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=52922 dport=993 packets=1 bytes=60 src=85.13.138.36 dst=... sport=993 dport=52922 packets=9 bytes=844 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=35746 dport=443 packets=1 bytes=60 src=104.16.181.15 dst=... sport=443 dport=35746 packets=185 bytes=23581 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=43772 dport=443 packets=3 bytes=242 src=34.98.75.36 dst=... sport=443 dport=43772 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=41642 dport=443 packets=2 bytes=152 src=157.240.240.60 dst=... sport=443 dport=41642 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 tcp 6 src=10.11.12.7 dst=... sport=46492 dport=443 packets=4 bytes=651 src=162.125.19.130 dst=... sport=443 dport=46492 packets=1 bytes=60 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 udp 17 src=10.11.12.246 dst=... sport=123 dport=123 packets=1 bytes=76 src=17.253.54.125 dst=... sport=123 dport=123 packets=1 bytes=76 [HW_OFFLOAD] mark=0 zone=0 use=3
ipv4 2 udp 17 src=10.11.12.246 dst=... sport=123 dport=123 packets=1 bytes=76 src=17.253.52.125 dst=... sport=123 dport=123 packets=1 bytes=76 [HW_OFFLOAD] mark=0 zone=0 use=3
root at er-x:~#
----------
More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=4239#comment10522
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.
More information about the openwrt-bugs
mailing list