Re: [PATCH nf] netfilter: nfnetlink_queue: reroute reinjected packets from postrouting

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 18 Sept 2024 at 21:53, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote:
>
> On Tue, Sep 17, 2024 at 11:01:31PM +0100, Antonio Ojea wrote:
> > On Fri, 13 Sept 2024 at 07:24, Antonio Ojea
> > <antonio.ojea.garcia@xxxxxxxxx> wrote:
> > >
> > > On Thu, 12 Sept 2024 at 20:58, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote:
> > > >
> > > > 368982cd7d1b ("netfilter: nfnetlink_queue: resolve clash for unconfirmed
> > > > conntracks") adjusts NAT again in case that packet loses race to confirm
> > > > the conntrack entry.
> > > >
> > > > The reinject path triggers a route lookup again for the output hook, but
> > > > not for the postrouting hook where queue to userspace is also possible.
> > > >
> > > > Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
> > > > Reported-by: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
> > > > Signed-off-by: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
> > > > ---
> > > > I tried but I am not managing to make a selftest that runs reliable.
> > > > I can reproduce it manually and validate that this works.
> > > >
> > > > ./nft_queue -d 1000 helps by introducing a delay of 1000ms in the
> > > > userspace queue processing which helps trigger the race more easily,
> > > > socat needs to send several packets in the same UDP flow.
> > > >
> > > > @Antonio: Could you try this patch meanwhile there is a testcase for
> > > > this.
> > >
> > > Let me test it and report back
> > >
> >
> > Ok, I finally managed to get this tested, and it does not seem to
> > solve the problem, it keeps dnating twice after the packet is enqueued
> > by nfqueue
>
> I really don't understand why my patch did not work.
>
> In this new test run you have use postrouting/filter chain, but it
> does not call nf_reroute as in the previous trace.
>
> Does program issues the NF_STOP verdict instead?
>

The program is the same and the environment the same, I just change
the kernel of the VM.
I have observed different drops reasons, see my original comment
https://bugzilla.netfilter.org/show_bug.cgi?id=1766#c0 has
SKB_DROP_REASON_IP_RPFILTER and SKB_DROP_REASON_NEIGH_FAILED, and in
this trace we have SKB_DROP_REASON_OTHERHOST ... , can it be possible
you fixed one scenario with your patch but not the others?

> [...]
> > 10.244.0.3:39492->10.244.0.2:53(udp) ip_output
> > 21:44:13.069 0xffff97ff83662280 0   <empty>:3552     2007044037796
> > 10.244.0.3:39492->10.244.0.2:53(udp) nf_hook_slow
> > 21:44:13.070 0xffff97ff83662280 0   <empty>:3552     2007044038241
> > 10.244.0.3:39492->10.244.0.2:53(udp) nft_do_chain_inet
> > 21:44:13.070 0xffff97ff83662280 0   <empty>:3552     2007044040343
> > 10.244.0.3:39492->10.244.0.2:53(udp) nf_queue
> > --- snipped other skbs ---
> > 21:44:13.149 0xffff97ff83662280 0   <empty>:1463     2007052515236
> > 10.244.0.3:39492->10.244.0.2:53(udp) nf_conntrack_update
> > 21:44:13.149 0xffff97ff83662280 0   <empty>:1463     2007052538616
> > 10.244.0.3:39492->10.244.0.2:53(udp) nf_nat_manip_pkt
> > 21:44:13.149 0xffff97ff83662280 0   <empty>:1463     2007052539511
> > 10.244.0.3:39492->10.244.0.2:53(udp) nf_nat_ipv4_manip_pkt
> > 21:44:13.150 0xffff97ff83662280 0   <empty>:1463     2007052540123
> > 10.244.0.3:39492->10.244.0.2:53(udp) skb_ensure_writable
> > 21:44:13.150 0xffff97ff83662280 0   <empty>:1463     2007052540589
> > 10.244.0.3:39492->10.244.0.2:53(udp) l4proto_manip_pkt
> > 21:44:13.150 0xffff97ff83662280 0   <empty>:1463     2007052540875
> > 10.244.0.3:39492->10.244.0.2:53(udp) skb_ensure_writable
> > 21:44:13.150 0xffff97ff83662280 0   <empty>:1463     2007052541326
> > 10.244.0.3:39492->10.244.0.2:53(udp) nf_csum_update
> > 21:44:13.151 0xffff97ff83662280 0   <empty>:1463     2007052541944
> > 10.244.0.3:39492->10.244.0.2:53(udp) inet_proto_csum_replace4
> > 21:44:13.151 0xffff97ff83662280 0   <empty>:1463     2007052542259
> > 10.244.0.3:39492->10.244.0.2:53(udp) inet_proto_csum_replace4  <<<<
> > DNATed twice
> > 21:44:13.151 0xffff97ff83662280 0   <empty>:1463     2007052543321
> > 10.244.0.3:39492->10.244.0.4:53(udp) ip_route_me_harder
> > 21:44:13.151 0xffff97ff83662280 0   <empty>:1463     2007052545374
> > 10.244.0.3:39492->10.244.0.4:53(udp) __xfrm_decode_session
> > 21:44:13.151 0xffff97ff83662280 0   <empty>:1463     2007052546324
> > 10.244.0.3:39492->10.244.0.4:53(udp) nf_nat_ipv4_out
> > 21:44:13.151 0xffff97ff83662280 0   <empty>:1463     2007052546676
> > 10.244.0.3:39492->10.244.0.4:53(udp) nf_nat_inet_fn
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052547186
> > 10.244.0.3:39492->10.244.0.4:53(udp) selinux_ip_postroute
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052547732
> > 10.244.0.3:39492->10.244.0.4:53(udp) selinux_ip_postroute_compat
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052548217
> > 10.244.0.3:39492->10.244.0.4:53(udp) nf_confirm
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052548744
> > 10.244.0.3:39492->10.244.0.4:53(udp) ip_finish_output
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052549162
> > 10.244.0.3:39492->10.244.0.4:53(udp) __ip_finish_output
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052549614
> > 10.244.0.3:39492->10.244.0.4:53(udp) ip_finish_output2
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052550159
> > 10.244.0.3:39492->10.244.0.4:53(udp) __dev_queue_xmit
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052550656
> > 10.244.0.3:39492->10.244.0.4:53(udp) netdev_core_pick_tx
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052551436
> > 10.244.0.3:39492->10.244.0.4:53(udp) validate_xmit_skb
> > 21:44:13.152 0xffff97ff83662280 0   <empty>:1463     2007052551882
> > 10.244.0.3:39492->10.244.0.4:53(udp) netif_skb_features
> > 21:44:13.153 0xffff97ff83662280 0   <empty>:1463     2007052552291
> > 10.244.0.3:39492->10.244.0.4:53(udp) passthru_features_check
> > 21:44:13.153 0xffff97ff83662280 0   <empty>:1463     2007052552672
> > 10.244.0.3:39492->10.244.0.4:53(udp) skb_network_protocol
> > 21:44:13.153 0xffff97ff83662280 0   <empty>:1463     2007052553191
> > 10.244.0.3:39492->10.244.0.4:53(udp) skb_csum_hwoffload_help
> > 21:44:13.154 0xffff97ff83662280 0   <empty>:1463     2007052553566
> > 10.244.0.3:39492->10.244.0.4:53(udp) validate_xmit_xfrm
> > 21:44:13.155 0xffff97ff83662280 0   <empty>:1463     2007052554026
> > 10.244.0.3:39492->10.244.0.4:53(udp) dev_hard_start_xmit
> > 21:44:13.155 0xffff97ff83662280 0   <empty>:1463     2007052554482
> > 10.244.0.3:39492->10.244.0.4:53(udp) veth_xmit
> > 21:44:13.155 0xffff97ff83662280 0   <empty>:1463     2007052555156
> > 10.244.0.3:39492->10.244.0.4:53(udp) __dev_forward_skb
> > 21:44:13.155 0xffff97ff83662280 0   <empty>:1463     2007052555604
> > 10.244.0.3:39492->10.244.0.4:53(udp) __dev_forward_skb2
> > 21:44:13.155 0xffff97ff83662280 0   <empty>:1463     2007052556045
> > 10.244.0.3:39492->10.244.0.4:53(udp) skb_scrub_packet
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052556449
> > 10.244.0.3:39492->10.244.0.4:53(udp) eth_type_trans
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052557536
> > 10.244.0.3:39492->10.244.0.4:53(udp) __netif_rx
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052559424
> > 10.244.0.3:39492->10.244.0.4:53(udp) netif_rx_internal
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052559872
> > 10.244.0.3:39492->10.244.0.4:53(udp) enqueue_to_backlog
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052560827
> > 10.244.0.3:39492->10.244.0.4:53(udp) __netif_receive_skb_one_core
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052561410
> > 10.244.0.3:39492->10.244.0.4:53(udp) ip_rcv
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052561845
> > 10.244.0.3:39492->10.244.0.4:53(udp) ip_rcv_core
> > 21:44:13.156 0xffff97ff83662280 0   <empty>:1463     2007052564056
> > 10.244.0.3:39492->10.244.0.4:53(udp)
> > kfree_skb_reason(SKB_DROP_REASON_OTHERHOST)




[Index of Archives]     [Netfitler Users]     [Berkeley Packet Filter]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux