On Wed, 18 Sept 2024 at 21:53, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > > On Tue, Sep 17, 2024 at 11:01:31PM +0100, Antonio Ojea wrote: > > On Fri, 13 Sept 2024 at 07:24, Antonio Ojea > > <antonio.ojea.garcia@xxxxxxxxx> wrote: > > > > > > On Thu, 12 Sept 2024 at 20:58, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > > > > > > > > 368982cd7d1b ("netfilter: nfnetlink_queue: resolve clash for unconfirmed > > > > conntracks") adjusts NAT again in case that packet loses race to confirm > > > > the conntrack entry. > > > > > > > > The reinject path triggers a route lookup again for the output hook, but > > > > not for the postrouting hook where queue to userspace is also possible. > > > > > > > > Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") > > > > Reported-by: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx> > > > > Signed-off-by: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> > > > > --- > > > > I tried but I am not managing to make a selftest that runs reliable. > > > > I can reproduce it manually and validate that this works. > > > > > > > > ./nft_queue -d 1000 helps by introducing a delay of 1000ms in the > > > > userspace queue processing which helps trigger the race more easily, > > > > socat needs to send several packets in the same UDP flow. > > > > > > > > @Antonio: Could you try this patch meanwhile there is a testcase for > > > > this. > > > > > > Let me test it and report back > > > > > > > Ok, I finally managed to get this tested, and it does not seem to > > solve the problem, it keeps dnating twice after the packet is enqueued > > by nfqueue > > I really don't understand why my patch did not work. > > In this new test run you have use postrouting/filter chain, but it > does not call nf_reroute as in the previous trace. > > Does program issues the NF_STOP verdict instead? > The program is the same and the environment the same, I just change the kernel of the VM. I have observed different drops reasons, see my original comment https://bugzilla.netfilter.org/show_bug.cgi?id=1766#c0 has SKB_DROP_REASON_IP_RPFILTER and SKB_DROP_REASON_NEIGH_FAILED, and in this trace we have SKB_DROP_REASON_OTHERHOST ... , can it be possible you fixed one scenario with your patch but not the others? > [...] > > 10.244.0.3:39492->10.244.0.2:53(udp) ip_output > > 21:44:13.069 0xffff97ff83662280 0 <empty>:3552 2007044037796 > > 10.244.0.3:39492->10.244.0.2:53(udp) nf_hook_slow > > 21:44:13.070 0xffff97ff83662280 0 <empty>:3552 2007044038241 > > 10.244.0.3:39492->10.244.0.2:53(udp) nft_do_chain_inet > > 21:44:13.070 0xffff97ff83662280 0 <empty>:3552 2007044040343 > > 10.244.0.3:39492->10.244.0.2:53(udp) nf_queue > > --- snipped other skbs --- > > 21:44:13.149 0xffff97ff83662280 0 <empty>:1463 2007052515236 > > 10.244.0.3:39492->10.244.0.2:53(udp) nf_conntrack_update > > 21:44:13.149 0xffff97ff83662280 0 <empty>:1463 2007052538616 > > 10.244.0.3:39492->10.244.0.2:53(udp) nf_nat_manip_pkt > > 21:44:13.149 0xffff97ff83662280 0 <empty>:1463 2007052539511 > > 10.244.0.3:39492->10.244.0.2:53(udp) nf_nat_ipv4_manip_pkt > > 21:44:13.150 0xffff97ff83662280 0 <empty>:1463 2007052540123 > > 10.244.0.3:39492->10.244.0.2:53(udp) skb_ensure_writable > > 21:44:13.150 0xffff97ff83662280 0 <empty>:1463 2007052540589 > > 10.244.0.3:39492->10.244.0.2:53(udp) l4proto_manip_pkt > > 21:44:13.150 0xffff97ff83662280 0 <empty>:1463 2007052540875 > > 10.244.0.3:39492->10.244.0.2:53(udp) skb_ensure_writable > > 21:44:13.150 0xffff97ff83662280 0 <empty>:1463 2007052541326 > > 10.244.0.3:39492->10.244.0.2:53(udp) nf_csum_update > > 21:44:13.151 0xffff97ff83662280 0 <empty>:1463 2007052541944 > > 10.244.0.3:39492->10.244.0.2:53(udp) inet_proto_csum_replace4 > > 21:44:13.151 0xffff97ff83662280 0 <empty>:1463 2007052542259 > > 10.244.0.3:39492->10.244.0.2:53(udp) inet_proto_csum_replace4 <<<< > > DNATed twice > > 21:44:13.151 0xffff97ff83662280 0 <empty>:1463 2007052543321 > > 10.244.0.3:39492->10.244.0.4:53(udp) ip_route_me_harder > > 21:44:13.151 0xffff97ff83662280 0 <empty>:1463 2007052545374 > > 10.244.0.3:39492->10.244.0.4:53(udp) __xfrm_decode_session > > 21:44:13.151 0xffff97ff83662280 0 <empty>:1463 2007052546324 > > 10.244.0.3:39492->10.244.0.4:53(udp) nf_nat_ipv4_out > > 21:44:13.151 0xffff97ff83662280 0 <empty>:1463 2007052546676 > > 10.244.0.3:39492->10.244.0.4:53(udp) nf_nat_inet_fn > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052547186 > > 10.244.0.3:39492->10.244.0.4:53(udp) selinux_ip_postroute > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052547732 > > 10.244.0.3:39492->10.244.0.4:53(udp) selinux_ip_postroute_compat > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052548217 > > 10.244.0.3:39492->10.244.0.4:53(udp) nf_confirm > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052548744 > > 10.244.0.3:39492->10.244.0.4:53(udp) ip_finish_output > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052549162 > > 10.244.0.3:39492->10.244.0.4:53(udp) __ip_finish_output > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052549614 > > 10.244.0.3:39492->10.244.0.4:53(udp) ip_finish_output2 > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052550159 > > 10.244.0.3:39492->10.244.0.4:53(udp) __dev_queue_xmit > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052550656 > > 10.244.0.3:39492->10.244.0.4:53(udp) netdev_core_pick_tx > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052551436 > > 10.244.0.3:39492->10.244.0.4:53(udp) validate_xmit_skb > > 21:44:13.152 0xffff97ff83662280 0 <empty>:1463 2007052551882 > > 10.244.0.3:39492->10.244.0.4:53(udp) netif_skb_features > > 21:44:13.153 0xffff97ff83662280 0 <empty>:1463 2007052552291 > > 10.244.0.3:39492->10.244.0.4:53(udp) passthru_features_check > > 21:44:13.153 0xffff97ff83662280 0 <empty>:1463 2007052552672 > > 10.244.0.3:39492->10.244.0.4:53(udp) skb_network_protocol > > 21:44:13.153 0xffff97ff83662280 0 <empty>:1463 2007052553191 > > 10.244.0.3:39492->10.244.0.4:53(udp) skb_csum_hwoffload_help > > 21:44:13.154 0xffff97ff83662280 0 <empty>:1463 2007052553566 > > 10.244.0.3:39492->10.244.0.4:53(udp) validate_xmit_xfrm > > 21:44:13.155 0xffff97ff83662280 0 <empty>:1463 2007052554026 > > 10.244.0.3:39492->10.244.0.4:53(udp) dev_hard_start_xmit > > 21:44:13.155 0xffff97ff83662280 0 <empty>:1463 2007052554482 > > 10.244.0.3:39492->10.244.0.4:53(udp) veth_xmit > > 21:44:13.155 0xffff97ff83662280 0 <empty>:1463 2007052555156 > > 10.244.0.3:39492->10.244.0.4:53(udp) __dev_forward_skb > > 21:44:13.155 0xffff97ff83662280 0 <empty>:1463 2007052555604 > > 10.244.0.3:39492->10.244.0.4:53(udp) __dev_forward_skb2 > > 21:44:13.155 0xffff97ff83662280 0 <empty>:1463 2007052556045 > > 10.244.0.3:39492->10.244.0.4:53(udp) skb_scrub_packet > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052556449 > > 10.244.0.3:39492->10.244.0.4:53(udp) eth_type_trans > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052557536 > > 10.244.0.3:39492->10.244.0.4:53(udp) __netif_rx > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052559424 > > 10.244.0.3:39492->10.244.0.4:53(udp) netif_rx_internal > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052559872 > > 10.244.0.3:39492->10.244.0.4:53(udp) enqueue_to_backlog > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052560827 > > 10.244.0.3:39492->10.244.0.4:53(udp) __netif_receive_skb_one_core > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052561410 > > 10.244.0.3:39492->10.244.0.4:53(udp) ip_rcv > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052561845 > > 10.244.0.3:39492->10.244.0.4:53(udp) ip_rcv_core > > 21:44:13.156 0xffff97ff83662280 0 <empty>:1463 2007052564056 > > 10.244.0.3:39492->10.244.0.4:53(udp) > > kfree_skb_reason(SKB_DROP_REASON_OTHERHOST)