netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [Q RFC nft] how to add bridge vlan header match support?
@ 2015-07-02 15:24 Florian Westphal
  2015-07-05 22:03 ` Florian Westphal
  0 siblings, 1 reply; 2+ messages in thread
From: Florian Westphal @ 2015-07-02 15:24 UTC (permalink / raw)
  To: netfilter-devel

Hi.

Matching VLAN id from bridge netfilter doesn't seem to work:

nft add rule bridge filter input vlan type ip
<cmdline>:1:30-38: Error: conflicting protocols specified: ether vs. vlan

This happens in expr_evaluate_payload(),
ctx->pctx.protocol[base].desc != payload->payload.desc is true.

So, how to fix this?
This seems to work, but I'm not sure this approach is sane
(also lacks reverse translation):

+static bool resolve_protocol_conflict(struct eval_ctx *ctx,
+                                     struct expr *payload)
+{
+       const struct hook_proto_desc *h = &hook_proto_desc[ctx->pctx.family];
+       enum proto_bases base = payload->payload.base;
+       const struct proto_desc *desc;
+       struct stmt *nstmt;
+       int link;
+
+       desc = ctx->pctx.protocol[base].desc;
+       if (desc == payload->payload.desc)
+               return true;
+
+       if (payload->payload.base != h->base)
+               return false;
+
+       link = proto_find_num(desc, payload->payload.desc);
+       if (link < 0 || payload_gen_dependency(ctx, payload, &nstmt) < 0)
+               return false;
+
+       payload->payload.offset += 8*14; /* XXX: add size to proto_desc? */
+       list_add_tail(&nstmt->list, &ctx->stmt->list);
+
+       return true;
+}
@@ -286,7 +312,7 @@ static int expr_evaluate_payload(struct eval_ctx *ctx, struct expr **expr)
                if (payload_gen_dependency(ctx, payload, &nstmt) < 0)
                        return -1;
                list_add_tail(&nstmt->list, &ctx->stmt->list);
-       } else if (ctx->pctx.protocol[base].desc != payload->payload.desc)
+       } else if (!resolve_protocol_conflict(ctx, payload))

It creates following code with above rule:
  [ payload load 2b @ link header + 12 => reg 1 ]
  [ cmp eq reg 1 0x00000081 ] -> implict dependency, eth->type == vlan?
  [ payload load 2b @ link header + 16 => reg 1 ], vlan id
  [ cmp eq reg 1 0x00000008 ]

Is this a sane approach?
If yes, where would you store the underlying ll header size needed for offset correction?

Do you think we should already consider arbitary stacking (e.g. qinq)?
If yes, any hints on how to add this on nft side?

Thanks,
Florian

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [Q RFC nft] how to add bridge vlan header match support?
  2015-07-02 15:24 [Q RFC nft] how to add bridge vlan header match support? Florian Westphal
@ 2015-07-05 22:03 ` Florian Westphal
  0 siblings, 0 replies; 2+ messages in thread
From: Florian Westphal @ 2015-07-05 22:03 UTC (permalink / raw)
  To: Florian Westphal; +Cc: netfilter-devel

Florian Westphal <fw@strlen.de> wrote:
> Hi.
> 
> Matching VLAN id from bridge netfilter doesn't seem to work:
> 
> nft add rule bridge filter input vlan type ip
> <cmdline>:1:30-38: Error: conflicting protocols specified: ether vs. vlan
> 
> This happens in expr_evaluate_payload(),
> ctx->pctx.protocol[base].desc != payload->payload.desc is true.
> 
> So, how to fix this?
> This seems to work, but I'm not sure this approach is sane
> (also lacks reverse translation):
> 
> +static bool resolve_protocol_conflict(struct eval_ctx *ctx,
> +                                     struct expr *payload)
> +{
> +       const struct hook_proto_desc *h = &hook_proto_desc[ctx->pctx.family];
> +       enum proto_bases base = payload->payload.base;
> +       const struct proto_desc *desc;
> +       struct stmt *nstmt;
> +       int link;
> +
> +       desc = ctx->pctx.protocol[base].desc;
> +       if (desc == payload->payload.desc)
> +               return true;
> +
> +       if (payload->payload.base != h->base)
> +               return false;
> +
> +       link = proto_find_num(desc, payload->payload.desc);
> +       if (link < 0 || payload_gen_dependency(ctx, payload, &nstmt) < 0)
> +               return false;
> +
> +       payload->payload.offset += 8*14; /* XXX: add size to proto_desc? */
> +       list_add_tail(&nstmt->list, &ctx->stmt->list);
> +
> +       return true;
> +}
> @@ -286,7 +312,7 @@ static int expr_evaluate_payload(struct eval_ctx *ctx, struct expr **expr)
>                 if (payload_gen_dependency(ctx, payload, &nstmt) < 0)
>                         return -1;
>                 list_add_tail(&nstmt->list, &ctx->stmt->list);
> -       } else if (ctx->pctx.protocol[base].desc != payload->payload.desc)
> +       } else if (!resolve_protocol_conflict(ctx, payload))
> 
> It creates following code with above rule:
>   [ payload load 2b @ link header + 12 => reg 1 ]
>   [ cmp eq reg 1 0x00000081 ] -> implict dependency, eth->type == vlan?
>   [ payload load 2b @ link header + 16 => reg 1 ], vlan id
>   [ cmp eq reg 1 0x00000008 ]
> 
> Is this a sane approach?

"No".  Its not sufficient.

This makes

nft add rule bridge filter input vlan type ip

work, but thats not enough.  F.e.

nft add rule bridge filter input vlan id 42 ip saddr 10.2.3.4

Must inject *two* dependency tests.

'vlan' should add 'ether type vlan'.
'ip' should add 'vlan type ip'.

And both must be done respecting the correct nexthdr protocol offsets.

Which for the intermediate (vlan) header must be done respecting the
ether hdr size.

Any idea how to allow such stacking on nft side?

Thanks,
Florian

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2015-07-05 22:03 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-07-02 15:24 [Q RFC nft] how to add bridge vlan header match support? Florian Westphal
2015-07-05 22:03 ` Florian Westphal

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).