[Bug 1766] nfqueue randomly drops packets with same tuple

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Wed Aug 28 08:31:36 CEST 2024


https://bugzilla.netfilter.org/show_bug.cgi?id=1766

--- Comment #3 from Antonio Ojea <antonio.ojea.garcia at gmail.com> ---
I was tracing the packets with this tool from cilium folks ,
https://github.com/cilium/pwru/tree/main

And I think the problem is here, bear in mind 10.244.1.5 and 10.244.2.4 are the
DNATed addresses for 10.96.0.10



SKB                CPU PROCESS          NETNS      MARK/x        IFACE      
PROTO  MTU   LEN   TUPLE FUNC


0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.96.0.10:53(udp) skb_ensure_writable
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.96.0.10:53(udp)
inet_proto_csum_replace4
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.96.0.10:53(udp)
inet_proto_csum_replace4

SKB 0xffff9523b3207080 DNAT 10.96.0.10 to 0.244.1.5 on CPU 1


0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) udp_v4_early_demux
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) ip_route_input_noref
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) ip_route_input_slow
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) fib_validate_source
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) ip_forward
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) nf_hook_slow
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) ip_forward_finish
0xffff9523b3207080 1   <empty>:913286   4026533244 0         vetha5c90841:3 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) ip_output
0xffff9523b3207080 1   <empty>:913286   4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) nf_hook_slow
0xffff9523b3207080 1   <empty>:913286   4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) apparmor_ip_postroute
0xffff9523b3207080 1   <empty>:913286   4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) nf_queue
0xffff9523b3207080 1   <empty>:913286   4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) __nf_queue

SEND 0xffff9523b3207080 to the queue

0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) skb_ensure_writable

0xffff9523b3207080 is returned on CPU 16 

0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp) skb_ensure_writable
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp)
inet_proto_csum_replace4
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.1.5:53(udp)
inet_proto_csum_replace4


and DNATTED again ?? to 10.244.2.4 (we drop here 10.244.1.5)


0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) nf_reroute
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) ip_finish_output
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) __ip_finish_output
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) ip_finish_output2
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) neigh_resolve_output
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) __neigh_event_send
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) skb_clone
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) arp_solicit
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) consume_skb
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) skb_release_head_state
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) skb_release_data
0xffff9523b3207080 16  <empty>:3178406  4026533244 0         veth271ea3e0:5 
0x0800 1500  60    10.244.1.3:45957->10.244.2.4:53(udp) kfree_skbmem

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20240828/a00e0fa0/attachment.html>


More information about the netfilter-buglog mailing list