Is there any interest or plan to implement BROUTE chain type for nftables? We have a situation when a network interface that is part of a bridge is used to receive PTP and/or EAPOL packets. Userspace daemons that use AF_PACKET to capture specific ether types do not receive the packets, and they are instead bridged. We are currently still using etables -t broute to send packets packets up the stack. This functionality seems to be missing in nftables. Below you can find a proposal that could be used, of course there is some work to introduce the chain type and a default priority in nftables userspace tool. I could see there are other users asking for BROUTE: [1]: https://bugzilla.netfilter.org/show_bug.cgi?id=1316 [2]: https://lore.kernel.org/netfilter-devel/20191024114653.GU25052@xxxxxxxxxxxxx/ [3]: https://marc.info/?l=netfilter&m=154807010116514 broute chain type is just a copy from etables -t broute implementation. NF_DROP: skb is routed instead of bridged, and mapped to NF_ACCEPT. All other verdicts are returned as it is. Please advise if there are better ways to solve this instead of using the br_netfilter_broute flag. --- include/net/netfilter/nf_tables.h | 4 ++ net/netfilter/Makefile | 2 +- net/netfilter/nf_tables_api.c | 2 + net/netfilter/nft_chain_broute.c | 82 +++++++++++++++++++++++++++++++ 4 files changed, 89 insertions(+), 1 deletion(-) create mode 100644 net/netfilter/nft_chain_broute.c diff --git a/include/net/netfilter/nf_tables.h b/include/net/netfilter/nf_tables.h index 9430128aae99..cf7b36d54115 100644 --- a/include/net/netfilter/nf_tables.h +++ b/include/net/netfilter/nf_tables.h @@ -1090,6 +1090,7 @@ enum nft_chain_types { NFT_CHAIN_T_DEFAULT = 0, NFT_CHAIN_T_ROUTE, NFT_CHAIN_T_NAT, + NFT_CHAIN_T_BROUTE, NFT_CHAIN_T_MAX }; @@ -1665,6 +1666,9 @@ void nft_chain_filter_fini(void); void __init nft_chain_route_init(void); void nft_chain_route_fini(void); +void __init nft_chain_broute_init(void); +void nft_chain_broute_fini(void); + void nf_tables_trans_destroy_flush_work(void); int nf_msecs_to_jiffies64(const struct nlattr *nla, u64 *result); diff --git a/net/netfilter/Makefile b/net/netfilter/Makefile index 5ffef1cd6143..fd0e79d2d11e 100644 --- a/net/netfilter/Makefile +++ b/net/netfilter/Makefile @@ -91,7 +91,7 @@ nf_tables-objs := nf_tables_core.o nf_tables_api.o nft_chain_filter.o \ nft_counter.o nft_objref.o nft_inner.o \ nft_chain_route.o nf_tables_offload.o \ nft_set_hash.o nft_set_bitmap.o nft_set_rbtree.o \ - nft_set_pipapo.o + nft_set_pipapo.o nft_chain_broute.o ifdef CONFIG_X86_64 ifndef CONFIG_UML diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c index d73edbd4eec4..a95f138562e2 100644 --- a/net/netfilter/nf_tables_api.c +++ b/net/netfilter/nf_tables_api.c @@ -10389,6 +10389,7 @@ static int __init nf_tables_module_init(void) goto err_nfnl_subsys; nft_chain_route_init(); + nft_chain_broute_init(); return err; @@ -10417,6 +10418,7 @@ static void __exit nf_tables_module_exit(void) unregister_netdevice_notifier(&nf_tables_flowtable_notifier); nft_chain_filter_fini(); nft_chain_route_fini(); + nft_chain_broute_fini(); unregister_pernet_subsys(&nf_tables_net_ops); cancel_work_sync(&trans_destroy_work); rcu_barrier(); diff --git a/net/netfilter/nft_chain_broute.c b/net/netfilter/nft_chain_broute.c new file mode 100644 index 000000000000..9c8461ec8fde --- /dev/null +++ b/net/netfilter/nft_chain_broute.c @@ -0,0 +1,82 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include <linux/module.h> +#include <linux/netfilter/nf_tables.h> +#include <net/netfilter/nf_tables.h> +#include <linux/netfilter_bridge.h> +#include <net/netfilter/nf_tables_ipv4.h> +#include <net/netfilter/nf_tables_ipv6.h> +#include "../bridge/br_private.h" + +#ifdef CONFIG_NF_TABLES_BRIDGE +static unsigned int +nft_do_chain_broute(void *priv, + struct sk_buff *skb, + const struct nf_hook_state *state) +{ + struct net_bridge_port *p = br_port_get_rcu(skb->dev); + unsigned char *dest; + struct nft_pktinfo pkt; + int ret; + + nft_set_pktinfo(&pkt, skb, state); + + switch (eth_hdr(skb)->h_proto) { + case htons(ETH_P_IP): + nft_set_pktinfo_ipv4_validate(&pkt); + break; + case htons(ETH_P_IPV6): + nft_set_pktinfo_ipv6_validate(&pkt); + break; + default: + nft_set_pktinfo_unspec(&pkt); + break; + } + + ret = nft_do_chain(&pkt, priv); + if ((ret & NF_VERDICT_MASK) == NF_DROP) { + /* DROP in ebtables -t broute means that the + * skb should be routed, not bridged. + * This is awkward, but can't be changed for compatibility + * reasons. + * + * We map DROP to ACCEPT and set the ->br_netfilter_broute flag. + */ + ret = NF_ACCEPT; + BR_INPUT_SKB_CB(skb)->br_netfilter_broute = 1; + /* undo PACKET_HOST mangling done in br_input in case the dst + * address matches the logical bridge but not the port. + */ + dest = eth_hdr(skb)->h_dest; + if (skb->pkt_type == PACKET_HOST && + !ether_addr_equal(skb->dev->dev_addr, dest) && + ether_addr_equal(p->br->dev->dev_addr, dest)) + skb->pkt_type = PACKET_OTHERHOST; + } + return ret; +} + +static const struct nft_chain_type nft_chain_broute = { + .name = "broute", + .type = NFT_CHAIN_T_BROUTE, + .family = NFPROTO_BRIDGE, + .hook_mask = (1 << NF_BR_PRE_ROUTING), + .hooks = { + [NF_BR_PRE_ROUTING] = nft_do_chain_broute, + }, +}; +#endif + +void __init nft_chain_broute_init(void) +{ +#ifdef CONFIG_NF_TABLES_BRIDGE + nft_register_chain_type(&nft_chain_broute); +#endif +} + +void __exit nft_chain_broute_fini(void) +{ +#ifdef CONFIG_NF_TABLES_BRIDGE + nft_unregister_chain_type(&nft_chain_broute); +#endif +} -- 2.34.1