-j CONTINUE can be added, but it can't be removed:
extensions/libebt_standard.t: ERROR: line 5 (cannot find: ebtables -I INPUT -d 
de:ad:be:ef:00:00 -j CONTINUE)

This problem stems from silly ambiguity in ebtables-nft vs. iptables.

In iptables, you can do
iptables -A INPUT
(no -j)
in ebtables, you can do either
ebtables -A INPUT
or
ebtables -A INPUT -j CONTINUE

both are *supposed* to be the same (and they do the same even
in ebtables-nft on netlink side).

However, the temprary binary representation within ebtables-nft is not
the same: when parsing -j CONTINUE, we add a standard target, then omit
it later in _add_target().

When translating netlink representation to ebt binary one,
we do not add a standard target and instead just print '-j CONTINUE'
when listing rules.

So when doing
-I INPUT -j CONTINUE
-D INPUT -j CONTINUE

the -D operation fails because it has a standard target in the binary
representation, whereas the rule we obtained from translating
nftables netlink back to ebtables' binary represenation doesn't.

Fix it by ignoring 'CONTINUE' on parser side.

Signed-off-by: Florian Westphal <f...@strlen.de>
---
 extensions/libebt_standard.t |  1 +
 iptables/nft-bridge.c        | 26 +-------------------------
 iptables/xtables-eb.c        |  7 +++++--
 3 files changed, 7 insertions(+), 27 deletions(-)

diff --git a/extensions/libebt_standard.t b/extensions/libebt_standard.t
index 59ca337a97c4..04991e1f3290 100644
--- a/extensions/libebt_standard.t
+++ b/extensions/libebt_standard.t
@@ -2,5 +2,6 @@
 -s 0:0:0:0:0:0;=;OK
 -d 00:00:0:00:00:00;-d 0:0:0:0:0:0;OK
 -s de:ad:be:ef:0:00 -j RETURN;-s de:ad:be:ef:0:0 -j RETURN;OK
+-d de:ad:be:ef:00:00 -j CONTINUE;=;OK
 -d de:ad:be:ef:0:0;=;OK
 -d de:ad:be:ef:00:00/ff:ff:ff:ff:00:00 -j DROP;-d 
de:ad:be:ef:0:0/ff:ff:ff:ff:0:0 -j DROP;OK
diff --git a/iptables/nft-bridge.c b/iptables/nft-bridge.c
index 35c862cfda81..a616f8458a74 100644
--- a/iptables/nft-bridge.c
+++ b/iptables/nft-bridge.c
@@ -120,33 +120,9 @@ static void add_logical_outiface(struct nftnl_rule *r, 
char *iface, uint32_t op)
                add_cmp_ptr(r, op, iface, iface_len + 1);
 }
 
-/* TODO: Use generic add_action() once we convert this to use
- * iptables_command_state.
- */
 static int _add_action(struct nftnl_rule *r, struct iptables_command_state *cs)
 {
-       int ret = 0;
-
-       if (cs->jumpto == NULL || strcmp(cs->jumpto, "CONTINUE") == 0)
-               return 0;
-
-       /* If no target at all, add nothing (default to continue) */
-       if (cs->target != NULL) {
-               /* Standard target? */
-               if (strcmp(cs->jumpto, XTC_LABEL_ACCEPT) == 0)
-                       ret = add_verdict(r, NF_ACCEPT);
-               else if (strcmp(cs->jumpto, XTC_LABEL_DROP) == 0)
-                       ret = add_verdict(r, NF_DROP);
-               else if (strcmp(cs->jumpto, XTC_LABEL_RETURN) == 0)
-                       ret = add_verdict(r, NFT_RETURN);
-               else
-                       ret = add_target(r, cs->target->t);
-       } else if (strlen(cs->jumpto) > 0) {
-               /* Not standard, then it's a jump to chain */
-               ret = add_jumpto(r, cs->jumpto, NFT_JUMP);
-       }
-
-       return ret;
+       return add_action(r, cs, false);
 }
 
 static int nft_bridge_add(struct nftnl_rule *r, void *data)
diff --git a/iptables/xtables-eb.c b/iptables/xtables-eb.c
index 64f332c17143..721bab578ae8 100644
--- a/iptables/xtables-eb.c
+++ b/iptables/xtables-eb.c
@@ -824,6 +824,7 @@ int do_commandeb(struct nft_handle *h, int argc, char 
*argv[], char **table,
        struct xtables_target *t;
        struct iptables_command_state cs = {
                .argv = argv,
+               .jumpto = "",
                .eb.bitmask = EBT_NOPROTO,
        };
        char command = 'h';
@@ -1066,8 +1067,10 @@ print_zero:
                                break;
                        } else if (c == 'j') {
                                ebt_check_option2(&flags, OPT_JUMP);
-                               cs.jumpto = parse_target(optarg);
-                               cs.target = ebt_command_jump(cs.jumpto);
+                               if (strcmp(optarg, "CONTINUE") != 0) {
+                                       cs.jumpto = parse_target(optarg);
+                                       cs.target = ebt_command_jump(cs.jumpto);
+                               }
                                break;
                        } else if (c == 's') {
                                ebt_check_option2(&flags, OPT_SOURCE);
-- 
2.18.1

Reply via email to