public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: David Gibson <david@gibson.dropbear.id.au>
To: Stefano Brivio <sbrivio@redhat.com>, passt-dev@passt.top
Cc: David Gibson <david@gibson.dropbear.id.au>
Subject: [PATCH 17/17] netlink: Propagate errors for "dup" operations
Date: Mon, 24 Jul 2023 16:09:36 +1000	[thread overview]
Message-ID: <20230724060936.952659-18-david@gibson.dropbear.id.au> (raw)
In-Reply-To: <20230724060936.952659-1-david@gibson.dropbear.id.au>

We now detect errors on netlink "set" operations while configuring the
pasta namespace with --config-net.  However in many cases rather than
a simple "set" we use a more complex "dup" function to copy
configuration from the host to the namespace.  We're not yet properly
detecting and reporting netlink errors for that case.

Change the "dup" operations to propagate netlink errors to their
caller, pasta_ns_conf() and report them there.

Link: https://bugs.passt.top/show_bug.cgi?id=60

Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
---
 netlink.c | 40 ++++++++++++++++++++++++++++------------
 netlink.h |  8 ++++----
 pasta.c   | 15 ++++++++-------
 3 files changed, 40 insertions(+), 23 deletions(-)

diff --git a/netlink.c b/netlink.c
index 9e72b16..cdc18c0 100644
--- a/netlink.c
+++ b/netlink.c
@@ -413,9 +413,11 @@ int nl_route_set_def(int s, unsigned int ifi, sa_family_t af, void *gw)
  * @s_dst:	Netlink socket in destination namespace
  * @ifi_dst:	Interface index in destination namespace
  * @af:		Address family
+ *
+ * Return: 0 on success, negative error code on failure
  */
-void nl_route_dup(int s_src, unsigned int ifi_src,
-		  int s_dst, unsigned int ifi_dst, sa_family_t af)
+int nl_route_dup(int s_src, unsigned int ifi_src,
+		 int s_dst, unsigned int ifi_dst, sa_family_t af)
 {
 	struct req_t {
 		struct nlmsghdr nlh;
@@ -477,9 +479,11 @@ void nl_route_dup(int s_src, unsigned int ifi_src,
 
 		if (extra) {
 			err("netlink: Too many routes to duplicate");
-			return;
+			return -E2BIG;
 		}
 	}
+	if (status < 0)
+		return status;
 
 	/* Routes might have dependencies between each other, and the
 	 * kernel processes RTM_NEWROUTE messages sequentially. For n
@@ -494,15 +498,20 @@ void nl_route_dup(int s_src, unsigned int ifi_src,
 		     NLMSG_OK(nh, status);
 		     nh = NLMSG_NEXT(nh, status)) {
 			uint16_t flags = nh->nlmsg_flags;
+			int rc;
 
 			if (nh->nlmsg_type != RTM_NEWROUTE)
 				continue;
 
-			nl_do(s_dst, nh, RTM_NEWROUTE,
-			       (flags & ~NLM_F_DUMP_FILTERED) | NLM_F_CREATE,
-			       nh->nlmsg_len);
+			rc = nl_do(s_dst, nh, RTM_NEWROUTE,
+				   (flags & ~NLM_F_DUMP_FILTERED) | NLM_F_CREATE,
+				   nh->nlmsg_len);
+			if (rc < 0 && rc != -ENETUNREACH && rc != -EEXIST)
+				return rc;
 		}
 	}
+
+	return 0;
 }
 
 /**
@@ -635,9 +644,11 @@ int nl_addr_set(int s, unsigned int ifi, sa_family_t af,
  * @s_dst:	Netlink socket in destination network namespace
  * @ifi_dst:	Interface index in destination namespace
  * @af:		Address family
+ *
+ * Return: 0 on success, negative error code on failure
  */
-void nl_addr_dup(int s_src, unsigned int ifi_src,
-		 int s_dst, unsigned int ifi_dst, sa_family_t af)
+int nl_addr_dup(int s_src, unsigned int ifi_src,
+		int s_dst, unsigned int ifi_dst, sa_family_t af)
 {
 	struct req_t {
 		struct nlmsghdr nlh;
@@ -651,6 +662,7 @@ void nl_addr_dup(int s_src, unsigned int ifi_src,
 	struct nlmsghdr *nh;
 	ssize_t status;
 	uint16_t seq;
+	int rc= 0;
 
 	seq = nl_send(s_src, &req, RTM_GETADDR, NLM_F_DUMP, sizeof(req));
 	nl_foreach_oftype(nh, status, s_src, buf, seq, RTM_NEWADDR) {
@@ -663,7 +675,7 @@ void nl_addr_dup(int s_src, unsigned int ifi_src,
 
 		ifa = (struct ifaddrmsg *)NLMSG_DATA(nh);
 
-		if (ifa->ifa_scope == RT_SCOPE_LINK ||
+		if (rc < 0 || ifa->ifa_scope == RT_SCOPE_LINK ||
 		    ifa->ifa_index != ifi_src)
 			continue;
 
@@ -675,10 +687,14 @@ void nl_addr_dup(int s_src, unsigned int ifi_src,
 				rta->rta_type = IFA_UNSPEC;
 		}
 
-		nl_do(s_dst, nh, RTM_NEWADDR,
-		       (nh->nlmsg_flags & ~NLM_F_DUMP_FILTERED) | NLM_F_CREATE,
-		       nh->nlmsg_len);
+		rc = nl_do(s_dst, nh, RTM_NEWADDR,
+			   (nh->nlmsg_flags & ~NLM_F_DUMP_FILTERED) | NLM_F_CREATE,
+			   nh->nlmsg_len);
 	}
+	if (status < 0)
+		return status;
+
+	return rc;
 }
 
 /**
diff --git a/netlink.h b/netlink.h
index b831405..9f4f8f4 100644
--- a/netlink.h
+++ b/netlink.h
@@ -13,14 +13,14 @@ void nl_sock_init(const struct ctx *c, bool ns);
 unsigned int nl_get_ext_if(int s, sa_family_t af);
 int nl_route_get_def(int s, unsigned int ifi, sa_family_t af, void *gw);
 int nl_route_set_def(int s, unsigned int ifi, sa_family_t af, void *gw);
-void nl_route_dup(int s_src, unsigned int ifi_src,
-		  int s_dst, unsigned int ifi_dst, sa_family_t af);
+int nl_route_dup(int s_src, unsigned int ifi_src,
+		 int s_dst, unsigned int ifi_dst, sa_family_t af);
 int nl_addr_get(int s, unsigned int ifi, sa_family_t af,
 		void *addr, int *prefix_len, void *addr_l);
 int nl_addr_set(int s, unsigned int ifi, sa_family_t af,
 		void *addr, int prefix_len);
-void nl_addr_dup(int s_src, unsigned int ifi_src,
-		 int s_dst, unsigned int ifi_dst, sa_family_t af);
+int nl_addr_dup(int s_src, unsigned int ifi_src,
+		int s_dst, unsigned int ifi_dst, sa_family_t af);
 int nl_link_get_mac(int s, unsigned int ifi, void *mac);
 int nl_link_set_mac(int s, unsigned int ifi, void *mac);
 int nl_link_up(int s, unsigned int ifi, int mtu);
diff --git a/pasta.c b/pasta.c
index ed6fda3..b94423c 100644
--- a/pasta.c
+++ b/pasta.c
@@ -298,8 +298,9 @@ void pasta_ns_conf(struct ctx *c)
 						 &c->ip4.addr,
 						 c->ip4.prefix_len);
 			else
-				nl_addr_dup(nl_sock, c->ifi4,
-					    nl_sock_ns, c->pasta_ifi, AF_INET);
+				rc = nl_addr_dup(nl_sock, c->ifi4,
+						 nl_sock_ns, c->pasta_ifi,
+						 AF_INET);
 			if (rc < 0)
 				die("Couldn't set IPv4 address(es) in namespace: %s",
 				    strerror(-rc));
@@ -308,7 +309,7 @@ void pasta_ns_conf(struct ctx *c)
 				rc = nl_route_set_def(nl_sock_ns, c->pasta_ifi,
 						      AF_INET, &c->ip4.gw);
 			else
-				nl_route_dup(nl_sock, c->ifi4, nl_sock_ns,
+				rc = nl_route_dup(nl_sock, c->ifi4, nl_sock_ns,
 					     c->pasta_ifi, AF_INET);
 			if (rc < 0)
 				die("Couldn't set IPv4 route(s) in guest: %s",
@@ -320,9 +321,9 @@ void pasta_ns_conf(struct ctx *c)
 				rc = nl_addr_set(nl_sock_ns, c->pasta_ifi,
 						 AF_INET6, &c->ip6.addr, 64);
 			else
-				nl_addr_dup(nl_sock, c->ifi4,
-					    nl_sock_ns, c->pasta_ifi,
-					    AF_INET6);
+				rc = nl_addr_dup(nl_sock, c->ifi4,
+						 nl_sock_ns, c->pasta_ifi,
+						 AF_INET6);
 			if (rc < 0)
 				die("Couldn't set IPv6 address(es) in namespace: %s",
 				    strerror(-rc));
@@ -331,7 +332,7 @@ void pasta_ns_conf(struct ctx *c)
 				rc = nl_route_set_def(nl_sock_ns, c->pasta_ifi,
 						      AF_INET6, &c->ip6.gw);
 			else
-				nl_route_dup(nl_sock, c->ifi6,
+				rc = nl_route_dup(nl_sock, c->ifi6,
 					     nl_sock_ns, c->pasta_ifi,
 					     AF_INET6);
 			if (rc < 0)
-- 
@@ -298,8 +298,9 @@ void pasta_ns_conf(struct ctx *c)
 						 &c->ip4.addr,
 						 c->ip4.prefix_len);
 			else
-				nl_addr_dup(nl_sock, c->ifi4,
-					    nl_sock_ns, c->pasta_ifi, AF_INET);
+				rc = nl_addr_dup(nl_sock, c->ifi4,
+						 nl_sock_ns, c->pasta_ifi,
+						 AF_INET);
 			if (rc < 0)
 				die("Couldn't set IPv4 address(es) in namespace: %s",
 				    strerror(-rc));
@@ -308,7 +309,7 @@ void pasta_ns_conf(struct ctx *c)
 				rc = nl_route_set_def(nl_sock_ns, c->pasta_ifi,
 						      AF_INET, &c->ip4.gw);
 			else
-				nl_route_dup(nl_sock, c->ifi4, nl_sock_ns,
+				rc = nl_route_dup(nl_sock, c->ifi4, nl_sock_ns,
 					     c->pasta_ifi, AF_INET);
 			if (rc < 0)
 				die("Couldn't set IPv4 route(s) in guest: %s",
@@ -320,9 +321,9 @@ void pasta_ns_conf(struct ctx *c)
 				rc = nl_addr_set(nl_sock_ns, c->pasta_ifi,
 						 AF_INET6, &c->ip6.addr, 64);
 			else
-				nl_addr_dup(nl_sock, c->ifi4,
-					    nl_sock_ns, c->pasta_ifi,
-					    AF_INET6);
+				rc = nl_addr_dup(nl_sock, c->ifi4,
+						 nl_sock_ns, c->pasta_ifi,
+						 AF_INET6);
 			if (rc < 0)
 				die("Couldn't set IPv6 address(es) in namespace: %s",
 				    strerror(-rc));
@@ -331,7 +332,7 @@ void pasta_ns_conf(struct ctx *c)
 				rc = nl_route_set_def(nl_sock_ns, c->pasta_ifi,
 						      AF_INET6, &c->ip6.gw);
 			else
-				nl_route_dup(nl_sock, c->ifi6,
+				rc = nl_route_dup(nl_sock, c->ifi6,
 					     nl_sock_ns, c->pasta_ifi,
 					     AF_INET6);
 			if (rc < 0)
-- 
2.41.0


  parent reply	other threads:[~2023-07-24  6:09 UTC|newest]

Thread overview: 35+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-07-24  6:09 [PATCH 00/17] netlink fixes and cleanups David Gibson
2023-07-24  6:09 ` [PATCH 01/17] netlink: Split up functionality if nl_link() David Gibson
2023-08-02 22:47   ` Stefano Brivio
2023-08-03  2:09     ` David Gibson
2023-08-03  4:29       ` David Gibson
2023-08-03  5:39         ` David Gibson
2023-08-03  5:40         ` Stefano Brivio
2023-07-24  6:09 ` [PATCH 02/17] netlink: Split nl_addr() into separate operation functions David Gibson
2023-08-02 22:47   ` Stefano Brivio
2023-08-03  2:11     ` David Gibson
2023-07-24  6:09 ` [PATCH 03/17] netlink: Split nl_route() " David Gibson
2023-08-02 22:47   ` Stefano Brivio
2023-08-03  2:18     ` David Gibson
2023-07-24  6:09 ` [PATCH 04/17] netlink: Use struct in_addr for IPv4 addresses, not bare uint32_t David Gibson
2023-07-24  6:09 ` [PATCH 05/17] netlink: Explicitly pass netlink sockets to operations David Gibson
2023-07-24  6:09 ` [PATCH 06/17] netlink: Make nl_*_dup() use a separate datagram for each request David Gibson
2023-07-24  6:09 ` [PATCH 07/17] netlink: Start sequence number from 1 instead of 0 David Gibson
2023-07-24  6:09 ` [PATCH 08/17] netlink: Treat send() or recv() errors as fatal David Gibson
2023-08-02 22:47   ` Stefano Brivio
2023-08-03  2:19     ` David Gibson
2023-07-24  6:09 ` [PATCH 09/17] netlink: Fill in netlink header fields from nl_req() David Gibson
2023-07-24  6:09 ` [PATCH 10/17] netlink: Add nl_do() helper for simple operations with error checking David Gibson
2023-08-02 22:48   ` Stefano Brivio
2023-08-03  2:24     ` David Gibson
2023-07-24  6:09 ` [PATCH 11/17] netlink: Clearer reasoning about the netlink response buffer size David Gibson
2023-08-02 22:48   ` Stefano Brivio
2023-08-03  2:22     ` David Gibson
2023-07-24  6:09 ` [PATCH 12/17] netlink: Split nl_req() to allow processing multiple response datagrams David Gibson
2023-07-24  6:09 ` [PATCH 13/17] netlink: Add nl_foreach_oftype to filter response message types David Gibson
2023-07-24  6:09 ` [PATCH 14/17] netlink: Propagate errors for "set" operations David Gibson
2023-07-24  6:09 ` [PATCH 15/17] netlink: Always process all responses to a netlink request David Gibson
2023-07-24  6:09 ` [PATCH 16/17] netlink: Propagate errors for "dump" operations David Gibson
2023-07-24  6:09 ` David Gibson [this message]
2023-08-02 22:48   ` [PATCH 17/17] netlink: Propagate errors for "dup" operations Stefano Brivio
2023-08-03  2:26     ` David Gibson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230724060936.952659-18-david@gibson.dropbear.id.au \
    --to=david@gibson.dropbear.id.au \
    --cc=passt-dev@passt.top \
    --cc=sbrivio@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).