From: Stefano Brivio <sbrivio@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: Jon Maloy <jmaloy@redhat.com>, passt-dev@passt.top
Subject: Re: [PATCH 3/4] udp: Rework offender address handling in udp_sock_recverr()
Date: Wed, 16 Apr 2025 16:27:36 +0200 [thread overview]
Message-ID: <20250416162736.0380a5c4@elisabeth> (raw)
In-Reply-To: <20250416090707.393497-4-david@gibson.dropbear.id.au>
On Wed, 16 Apr 2025 19:07:06 +1000
David Gibson <david@gibson.dropbear.id.au> wrote:
> Make a number of changes to udp_sock_recverr() to improve the robustness
> of how we handle addresses.
>
> * Get the "offender" address (source of the ICMP packet) using the
> SO_EE_OFFENDER() macro, reducing assumptions about structure layout.
> * Parse the offender sockaddr using inany_from_sockaddr()
> * Check explicitly that the source and destination pifs are what we
> expect. Previously we checked something that was probably equivalent
> in practice, but isn't strictly speaking what we require for the rest
> of the code.
> * Verify that for an ICMPv4 error we also have an IPv4 source/offender
> and destination/endpoint address
> * Verify that for an ICMPv6 error we have an IPv6 endpoint
> * Improve debug reporting of any failures
>
> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
> ---
> udp.c | 67 ++++++++++++++++++++++++++++++++++++++++-------------------
> 1 file changed, 46 insertions(+), 21 deletions(-)
>
> diff --git a/udp.c b/udp.c
> index 57769d06..4352520e 100644
> --- a/udp.c
> +++ b/udp.c
> @@ -159,6 +159,12 @@ udp_meta[UDP_MAX_FRAMES];
> MAX(CMSG_SPACE(sizeof(struct in_pktinfo)), \
> CMSG_SPACE(sizeof(struct in6_pktinfo)))
>
> +#define RECVERR_SPACE \
> + MAX(CMSG_SPACE(sizeof(struct sock_extended_err) + \
> + sizeof(struct sockaddr_in)), \
> + CMSG_SPACE(sizeof(struct sock_extended_err) + \
> + sizeof(struct sockaddr_in6)))
> +
> /**
> * enum udp_iov_idx - Indices for the buffers making up a single UDP frame
> * @UDP_IOV_TAP tap specific header
> @@ -516,12 +522,8 @@ static int udp_pktinfo(struct msghdr *msg, union inany_addr *dst)
> static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> uint8_t pif, in_port_t port)
> {
> - struct errhdr {
> - struct sock_extended_err ee;
> - union sockaddr_inany saddr;
> - };
> - char buf[PKTINFO_SPACE + CMSG_SPACE(sizeof(struct errhdr))];
> - const struct errhdr *eh = NULL;
> + char buf[PKTINFO_SPACE + RECVERR_SPACE];
> + const struct sock_extended_err *ee;
> char data[ICMP6_MAX_DLEN];
> struct cmsghdr *hdr;
> struct iovec iov = {
> @@ -538,7 +540,12 @@ static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> .msg_controllen = sizeof(buf),
> };
> const struct flowside *toside;
> - flow_sidx_t tosidx;
> + char astr[INANY_ADDRSTRLEN];
> + char sastr[SOCKADDR_STRLEN];
> + union inany_addr offender;
> + const struct in_addr *o4;
> + in_port_t offender_port;
> + uint8_t topif;
> size_t dlen;
> ssize_t rc;
>
> @@ -569,10 +576,10 @@ static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> return -1;
> }
>
> - eh = (const struct errhdr *)CMSG_DATA(hdr);
> + ee = (const struct sock_extended_err *)CMSG_DATA(hdr);
>
> debug("%s error on UDP socket %i: %s",
> - str_ee_origin(&eh->ee), s, strerror_(eh->ee.ee_errno));
> + str_ee_origin(ee), s, strerror_(ee->ee_errno));
>
> if (!flow_sidx_valid(sidx)) {
> /* No hint from the socket, determine flow from addresses */
> @@ -588,25 +595,43 @@ static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> debug("Ignoring UDP error without flow");
> return 1;
> }
> + } else {
> + pif = pif_at_sidx(sidx);
Two stray trailing tabs here.
> }
>
> - tosidx = flow_sidx_opposite(sidx);
> - toside = flowside_at_sidx(tosidx);
> + toside = flowside_at_sidx(flow_sidx_opposite(sidx));
> + topif = pif_at_sidx(flow_sidx_opposite(sidx));
> dlen = rc;
>
> - if (pif_is_socket(pif_at_sidx(tosidx))) {
> - /* XXX Is there any way to propagate ICMPs from socket to
> - * socket? */
> - } else if (hdr->cmsg_level == IPPROTO_IP) {
> + if (inany_from_sockaddr(&offender, &offender_port,
> + SO_EE_OFFENDER(ee)) < 0)
> + goto fail;
> +
> + if (pif != PIF_HOST || topif != PIF_TAP)
> + /* XXX Can we support any other cases? */
> + goto fail;
> +
> + if (hdr->cmsg_level == IPPROTO_IP &&
> + (o4 = inany_v4(&offender)) && inany_v4(&toside->eaddr)) {
> dlen = MIN(dlen, ICMP4_MAX_DLEN);
> - udp_send_tap_icmp4(c, &eh->ee, toside,
> - eh->saddr.sa4.sin_addr, data, dlen);
> - } else if (hdr->cmsg_level == IPPROTO_IPV6) {
> - udp_send_tap_icmp6(c, &eh->ee, toside,
> - &eh->saddr.sa6.sin6_addr, data,
> - dlen, sidx.flowi);
> + udp_send_tap_icmp4(c, ee, toside, *o4, data, dlen);
> + return 1;
> + }
> +
> + if (hdr->cmsg_level == IPPROTO_IPV6 && !inany_v4(&toside->eaddr)) {
> + udp_send_tap_icmp6(c, ee, toside, &offender.a6, data, dlen,
> + sidx.flowi);
> + return 1;
> }
>
> +fail:
> + flow_dbg(flow_at_sidx(sidx),
Coverity Scan seems to hallucinate here and says that flow_at_sidx()
could return NULL, with its return value later dereferenced by
flow_log(), even if you're explicitly checking flow_sidx_valid() in all
the paths reaching to this point.
Calling this conditionally only if flow_sidx_valid() doesn't mask the
false positive either (I guess that's the part that goes wrong
somehow), we really need to check if (flow_at_sidx(sidx)) flow_dbg(...).
Would it be possible to add the useless check just for my own sanity?
> + "Can't propagate %s error from %s %s to %s %s",
> + str_ee_origin(ee),
> + pif_name(pif),
> + sockaddr_ntop(SO_EE_OFFENDER(ee), sastr, sizeof(sastr)),
> + pif_name(topif),
> + inany_ntop(&toside->eaddr, astr, sizeof(astr)));
> return 1;
> }
--
Stefano
next prev parent reply other threads:[~2025-04-16 14:27 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-04-16 9:07 [PATCH 0/4] Translate source addresses for ICMP errors David Gibson
2025-04-16 9:07 ` [PATCH 1/4] fwd: Split out helpers for port-independent NAT David Gibson
2025-04-16 9:07 ` [PATCH 2/4] treewide: Improve robustness against sockaddrs of unexpected family David Gibson
2025-04-16 9:41 ` Stefano Brivio
2025-04-17 1:14 ` David Gibson
2025-04-16 9:07 ` [PATCH 3/4] udp: Rework offender address handling in udp_sock_recverr() David Gibson
2025-04-16 14:27 ` Stefano Brivio [this message]
2025-04-17 1:33 ` David Gibson
2025-04-16 9:07 ` [PATCH 4/4] udp: Translate offender addresses for ICMP messages David Gibson
2025-04-16 14:27 ` [PATCH 0/4] Translate source addresses for ICMP errors Stefano Brivio
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250416162736.0380a5c4@elisabeth \
--to=sbrivio@redhat.com \
--cc=david@gibson.dropbear.id.au \
--cc=jmaloy@redhat.com \
--cc=passt-dev@passt.top \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).