On Wed, Mar 17, 2021 at 10:23:04PM -0400, Martin Gignac wrote: > Hi Pablo, > > I was finally able to reproduce the IPv6 lockup with the flowtable > counters turned on. I had conntrack -L running under 'watch' with some > greps to isolate the specific flow I wanted to check out. I also had a > tcpdump running on the OpenVPN tun interface and another tcpdump > running on the bonded VLAN interface to compare both. > > When a lockup occurred, as I said earlier, I could see some packets > coming in on the bonded VLAN interface but not being sent out the tun0 > interface. When those packets came in, I *did* see the packet count > increase by one for the "packet=" metric for that specific direction > for every one of those packets. > > Sometimes, after some time being locked up, the state of the session > would move back to "ESTABLISHED [ASSURED]" (but traffic would remain > "stuck") until the point where traffic would suddenly resume, and then > the session would move back to "[OFFLOAD]" state again. > > Commenting out the rule that offloaded IPv6 to the flowtable in the > ruleset. and reloading that ruleset with "nft -f rules.txt" > immediately fixed the lockup. > > Am I the only person that's reported any kind of issue with flowtable > and IPv6? Maybe it's something about my setup... My IPv6 testbed is working fine here. I just checked that kernel-5.10.23-200.fc33 contains commit 8d6bca156e47d68551750a384b3ff49384c67be3 Author: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx> Date: Tue Feb 2 18:01:16 2021 +0100 netfilter: flowtable: fix tcp and udp header checksum update When updating the tcp or udp header checksum on port nat the function inet_proto_csum_replace2 with the last parameter pseudohdr as true. This leads to an error in the case that GRO is used and packets are split up in GSO. The tcp or udp checksum of all packets is incorrect. The error is probably masked due to the fact the most network driver implement tcp/udp checksum offloading. It also only happens when GRO is applied and not on single packets. The error is most visible when using a pppoe connection which is not triggering the tcp/udp checksum offload. which looks similar to your issue. I don't have access to kernel 5.10.17-200.fc33.x86_64, it's been replaced in the mirrors I have access to by kernel-5.10.23-200.fc33. It would be good to confirm you have this fix before looking somewhere else.