[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190609162304.3388-1-christian@brauner.io>
Date: Sun, 9 Jun 2019 18:23:03 +0200
From: Christian Brauner <christian@...uner.io>
To: davem@...emloft.net, netdev@...r.kernel.org,
netfilter-devel@...r.kernel.org, coreteam@...filter.org,
bridge@...ts.linux-foundation.org
Cc: tyhicks@...onical.com, pablo@...filter.org,
kadlec@...ckhole.kfki.hu, fw@...len.de, roopa@...ulusnetworks.com,
nikolay@...ulusnetworks.com, linux-kernel@...r.kernel.org,
richardrose@...gle.com, vapier@...omium.org, bhthompson@...gle.com,
smbarber@...omium.org, joelhockey@...omium.org,
ueberall@...menzentrisch.de,
Christian Brauner <christian@...uner.io>
Subject: [PATCH net-next v1 0/1] br_netfilter: enable in non-initial netns
Hey everyone,
/* v1 */
This is a rework of the patch to not touch struct net at all and instead
rely on the pernet infrastructure directly to namespace the sysctls.
/* v0 */
This is another resend of the same patch series. I have received so many
requests, pings, and questions that I would really like to push for this
again.
Over time I have seen multiple reports by users who want to run applications
(Kubernetes e.g. via [1]) that require the br_netfilter module in
non-initial network namespaces. There are *a lot* of issues for this. A
shortlist including ChromeOS and other big users is found below under
[2]! Even non-devs already tried to get more traction on this by
commenting on the patchset (cf. [3]).
Currently, the /proc/sys/net/bridge folder is only created in the
initial network namespace. This patch series ensures that the
/proc/sys/net/bridge folder is available in each network namespace if
the module is loaded and disappears from all network namespaces when the
module is unloaded.
The patch series also makes the sysctls:
bridge-nf-call-arptables
bridge-nf-call-ip6tables
bridge-nf-call-iptables
bridge-nf-filter-pppoe-tagged
bridge-nf-filter-vlan-tagged
bridge-nf-pass-vlan-input-dev
apply per network namespace. This unblocks some use-cases where users
would like to e.g. not do bridge filtering for bridges in a specific
network namespace while doing so for bridges located in another network
namespace.
The netfilter rules are afaict already per network namespace so it
should be safe for users to specify whether a bridge device inside their
network namespace is supposed to go through iptables et al. or not.
Also, this can already be done by setting an option for each individual
bridge via Netlink. It should also be possible to do this for all
bridges in a network namespace via sysctls.
Thanks!
Christian
[1]: https://github.com/zimmertr/Bootstrap-Kubernetes-with-Ansible
[2]: https://bugs.chromium.org/p/chromium/issues/detail?id=878034
https://github.com/lxc/lxd/issues/5193
https://discuss.linuxcontainers.org/t/bridge-nf-call-iptables-and-swap-error-on-lxd-with-kubeadm/2204
https://github.com/lxc/lxd/issues/3306
https://gitlab.com/gitlab-org/gitlab-runner/issues/3705
https://ubuntuforums.org/showthread.php?t=2415032
https://medium.com/@thomaszimmerman93/hi-im-unable-to-get-kubeadm-init-to-run-due-to-br-netfilter-not-being-loaded-within-the-5642a4ccfece
[3]: https://lkml.org/lkml/2019/3/7/365
*** BLURB HERE ***
Christian Brauner (1):
br_netfilter: namespace bridge netfilter sysctls
include/net/netfilter/br_netfilter.h | 3 +-
net/bridge/br_netfilter_hooks.c | 291 ++++++++++++++++++---------
net/bridge/br_netfilter_ipv6.c | 2 +-
3 files changed, 204 insertions(+), 92 deletions(-)
--
2.21.0
Powered by blists - more mailing lists