[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160704111202.GI12335@gauss.secunet.com>
Date: Mon, 4 Jul 2016 13:12:02 +0200
From: Steffen Klassert <steffen.klassert@...unet.com>
To: Matt Bennett <Matt.Bennett@...iedtelesis.co.nz>
CC: "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
Herbert Xu <herbert@...dor.apana.org.au>
Subject: Re: PROBLEM: MTU of ipsec tunnel drops continuously until traffic
stops
On Mon, Jul 04, 2016 at 03:52:50AM +0000, Matt Bennett wrote:
> *Resending as plain text so the mailing list accepts it.. Sorry Steffen and Herbert*
>
> Hi,
>
> During long run testing of an ipsec tunnel over a PPP link it was found that occasionally traffic would stop flowing over the tunnel. Eventually the traffic would start again, however using the command "ip route flush cache" causes traffic to start flowing again immediately.
>
> Note, I am using a 4.4.6 based kernel, however I see no major differences between 4.4.6 and 4.4.14 (current LTS) in any of the code I am debugging. I have manually debugged the code as far as I can, however I don't know the code well enough to make further progress. What I have uncovered is outlined below:
>
> By pinging the other end of the tunnel when the traffic stops flowing I get messages like the following:
>
> 10-AR4050#ping 172.16.0.5
> PING 172.16.0.5 (172.16.0.5) 56(84) bytes of data.
> From 172.16.0.6 icmp_seq=1 Frag needed and DF set (mtu = 46)
> From 172.16.0.6 icmp_seq=2 Frag needed and DF set (mtu = 46)
>
> but this is weird considering (note the mtu values):
>
> [root@...AR4050 /flash]# ip link
> 16778240: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 qdisc htb state UP mode DEFAULT group default qlen 3
> link/ppp
> 14: tunnel64@...E: <POINTOPOINT,MULTICAST,UP,LOWER_UP> mtu 1200 qdisc htb state UNKNOWN mode DEFAULT group default qlen 1
> link/ipip 203.0.113.10 peer 203.0.113.5
>
> The code that generates the ICMP_FRAG_NEEDED packet is vti_xmit() (ip_vti.c) where there is a check of skb length against the mtu of dst entry. Since the mtu is lower than the packet (debug shows the mtu is 46 as expected from the ping output) the ICMP error is generated.
Semms like you use vti tunnels. Is tunnel64@...E a vti device, and
if so did you set the mtu to 1200?
Not sure if it is related to your problem, but there was a recent
fix for vti pmtu handling. It was commit d6af1a31 ("vti: Add pmtu
handling to vti_xmit.") Do you have this on your branch?
>
> Digging further I find that when the issue occurs the mtu value is being updated in what appears to be an error case in xfrm_bundle_ok (xfrm_policy.c). Specifically the block of code:
>
> if (likely(!last))
> return 1;
>
> is not hit meaning there is a difference between the cached mtu value and the value just calculated. I then see this code being hit continuously and each time the mtu keeps getting lowered. i.e. (I don't know if the drop by 80 bytes is significant)
>
> 1200
> 1118
> 1038
> 958
> 878
> ....
> 46
I remember that we had a similar problem with IPsec when no
vti was used some years ago...
Unfortunately, today is my last office day before my vacation,
so no fix from me for the next two weeks.
Powered by blists - more mailing lists