public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: David Gibson <david@gibson.dropbear.id.au>
To: Stefano Brivio <sbrivio@redhat.com>
Cc: passt-dev@passt.top
Subject: Re: [PATCH v4 2/2] conf, icmp, tcp, udp: Add options to bind to outbound address and interface
Date: Thu, 9 Mar 2023 13:31:19 +1100	[thread overview]
Message-ID: <ZAlE95uHMImFZnMI@yekko> (raw)
In-Reply-To: <20230309020947.2609964-3-sbrivio@redhat.com>

[-- Attachment #1: Type: text/plain, Size: 20617 bytes --]

On Thu, Mar 09, 2023 at 03:09:47AM +0100, Stefano Brivio wrote:
> I didn't notice earlier: libslirp (and slirp4netns) supports binding
> outbound sockets to specific IPv4 and IPv6 addresses, to force the
> source addresse selection. If we want to claim feature parity, we
> should implement that as well.
> 
> Further, Podman supports specifying outbound interfaces as well, but
> this is simply done by resolving the primary address for an interface
> when the network back-end is started. However, since kernel version
> 5.7, commit c427bfec18f2 ("net: core: enable SO_BINDTODEVICE for
> non-root users"), we can actually bind to a specific interface name,
> which doesn't need to be validated in advance.
> 
> Implement -o / --outbound ADDR to bind to IPv4 and IPv6 addresses,
> and --outbound-ip4 and --outbound-ip6 to bind IPv4 and IPv6 sockets
> to given interfaces.

s/outbound-ip/outbound-if/g

> Given that it probably makes little sense to select addresses and
> routes from interfaces different than the ones given for outbound
> sockets, also assign those as "template" interfaces, by default,
> unless explicitly overridden by '-i'.
> 
> For ICMP and UDP, we call sock_l4() to open outbound sockets, as we
> already needed to bind to given ports or echo identifiers, and we
> can bind() a socket only once: there, pass address (if any) and
> interface (if any) for the existing bind() and setsockopt() calls.
> 
> For TCP, in general, we wouldn't otherwise bind sockets. Add a
> specific helper to do that.
> 
> For UDP outbound sockets, we need to know if the final destination
> of the socket is a loopback address, before we decide whether it
> makes sense to bind the socket at all: move the block mangling the
> address destination before the creation of the socket in the IPv4
> path. This was already the case for the IPv6 path.
> 
> Signed-off-by: Stefano Brivio <sbrivio@redhat.com>

Otherwise,

Reviewed-by: David Gibson <david@gibson.dropbear.id.au>

> ---
>  conf.c  | 101 +++++++++++++++++++++++++++++++++++++++++++++++++-------
>  icmp.c  |  24 +++++++++++---
>  passt.1 |  29 ++++++++++++++--
>  passt.h |  10 ++++++
>  tcp.c   |  60 +++++++++++++++++++++++++++++++++
>  udp.c   |  54 ++++++++++++++++++++----------
>  6 files changed, 243 insertions(+), 35 deletions(-)
> 
> diff --git a/conf.c b/conf.c
> index 3aa3314..e2a7d68 100644
> --- a/conf.c
> +++ b/conf.c
> @@ -775,7 +775,15 @@ static void usage(const char *name)
>  	info(   "  -g, --gateway ADDR	Pass IPv4 or IPv6 address as gateway");
>  	info(   "    default: gateway from interface with default route");
>  	info(   "  -i, --interface NAME	Interface for addresses and routes");
> -	info(   "    default: interface with first default route");
> +	info(   "    default: from --outbound-if4 and --outbound-if6, if any");
> +	info(   "             otherwise interface with first default route");
> +	info(   "  -o, --outbound ADDR	Bind to address as outbound source");
> +	info(   "    can be specified zero to two times (for IPv4 and IPv6)");
> +	info(   "    default: use source address from routing tables");
> +	info(   "  --outbound-if4 NAME	Bind to outbound interface for IPv4");
> +	info(   "    default: use interface from default route");
> +	info(   "  --outbound-if6 NAME	Bind to outbound interface for IPv6");
> +	info(   "    default: use interface from default route");
>  	info(   "  -D, --dns ADDR	Use IPv4 or IPv6 address as DNS");
>  	info(   "    can be specified multiple times");
>  	info(   "    a single, empty option disables DNS information");
> @@ -900,7 +908,7 @@ pasta_opts:
>   */
>  static void conf_print(const struct ctx *c)
>  {
> -	char buf4[INET_ADDRSTRLEN], ifn[IFNAMSIZ];
> +	char buf4[INET_ADDRSTRLEN], buf6[INET6_ADDRSTRLEN], ifn[IFNAMSIZ];
>  	int i;
>  
>  	info("Template interface: %s%s%s%s%s",
> @@ -910,6 +918,26 @@ static void conf_print(const struct ctx *c)
>  	     c->ifi6 ? if_indextoname(c->ifi6, ifn) : "",
>  	     c->ifi6 ? " (IPv6)" : "");
>  
> +	if (*c->ip4.ifname_out || *c->ip6.ifname_out) {
> +		info("Outbound interface: %s%s%s%s%s",
> +		     *c->ip4.ifname_out ? c->ip4.ifname_out : "",
> +		     *c->ip4.ifname_out ? " (IPv4)" : "",
> +		     (*c->ip4.ifname_out && *c->ip6.ifname_out) ? ", " : "",
> +		     *c->ip6.ifname_out ? c->ip6.ifname_out : "",
> +		     *c->ip6.ifname_out ? " (IPv6)" : "");
> +	}
> +
> +	if (!IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out) ||
> +	    !IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out)) {
> +		info("Outbound address: %s%s%s",
> +		     IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out) ? "" :
> +		     inet_ntop(AF_INET, &c->ip4.addr_out, buf4, sizeof(buf4)),
> +		     (!IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out) &&
> +		      !IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out)) ? ", " : "",
> +		     IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out) ? "" :
> +		     inet_ntop(AF_INET6, &c->ip6.addr_out, buf6, sizeof(buf6)));
> +	}
> +
>  	if (c->mode == MODE_PASTA)
>  		info("Namespace interface: %s", c->pasta_ifn);
>  
> @@ -948,8 +976,6 @@ static void conf_print(const struct ctx *c)
>  	}
>  
>  	if (c->ifi6) {
> -		char buf6[INET6_ADDRSTRLEN];
> -
>  		if (!c->no_ndp && !c->no_dhcpv6)
>  			info("NDP/DHCPv6:");
>  		else if (!c->no_ndp)
> @@ -1125,6 +1151,7 @@ void conf(struct ctx *c, int argc, char **argv)
>  		{"mac-addr",	required_argument,	NULL,		'M' },
>  		{"gateway",	required_argument,	NULL,		'g' },
>  		{"interface",	required_argument,	NULL,		'i' },
> +		{"outbound",	required_argument,	NULL,		'o' },
>  		{"dns",		required_argument,	NULL,		'D' },
>  		{"search",	required_argument,	NULL,		'S' },
>  		{"no-tcp",	no_argument,		&c->no_tcp,	1 },
> @@ -1157,6 +1184,8 @@ void conf(struct ctx *c, int argc, char **argv)
>  		{"runas",	required_argument,	NULL,		12 },
>  		{"log-size",	required_argument,	NULL,		13 },
>  		{"version",	no_argument,		NULL,		14 },
> +		{"outbound-if4", required_argument,	NULL,		15 },
> +		{"outbound-if6", required_argument,	NULL,		16 },
>  		{ 0 },
>  	};
>  	struct get_bound_ports_ns_arg ns_ports_arg = { .c = c };
> @@ -1166,8 +1195,8 @@ void conf(struct ctx *c, int argc, char **argv)
>  	struct in6_addr *dns6 = c->ip6.dns;
>  	struct fqdn *dnss = c->dns_search;
>  	struct in_addr *dns4 = c->ip4.dns;
> +	unsigned int ifi4 = 0, ifi6 = 0;
>  	const char *optstring;
> -	unsigned int ifi = 0;
>  	int name, ret, b, i;
>  	size_t logsize = 0;
>  	uid_t uid;
> @@ -1175,9 +1204,9 @@ void conf(struct ctx *c, int argc, char **argv)
>  
>  	if (c->mode == MODE_PASTA) {
>  		c->no_dhcp_dns = c->no_dhcp_dns_search = 1;
> -		optstring = "dqfel:hF:I:p:P:m:a:n:M:g:i:D:S:46t:u:T:U:";
> +		optstring = "dqfel:hF:I:p:P:m:a:n:M:g:i:o:D:S:46t:u:T:U:";
>  	} else {
> -		optstring = "dqfel:hs:F:p:P:m:a:n:M:g:i:D:S:461t:u:";
> +		optstring = "dqfel:hs:F:p:P:m:a:n:M:g:i:o:D:S:461t:u:";
>  	}
>  
>  	c->tcp.fwd_in.mode = c->tcp.fwd_out.mode = 0;
> @@ -1295,6 +1324,26 @@ void conf(struct ctx *c, int argc, char **argv)
>  				c->mode == MODE_PASST ? "passt " : "pasta ");
>  			fprintf(stdout, VERSION_BLOB);
>  			exit(EXIT_SUCCESS);
> +		case 15:
> +			if (*c->ip4.ifname_out)
> +				die("Redundant outbound interface: %s", optarg);
> +
> +			ret = snprintf(c->ip4.ifname_out,
> +				       sizeof(c->ip4.ifname_out), "%s", optarg);
> +			if (ret <= 0 || ret >= (int)sizeof(c->ip4.ifname_out))
> +				die("Invalid interface name: %s", optarg);
> +
> +			break;
> +		case 16:
> +			if (*c->ip6.ifname_out)
> +				die("Redundant outbound interface: %s", optarg);
> +
> +			ret = snprintf(c->ip6.ifname_out,
> +				       sizeof(c->ip6.ifname_out), "%s", optarg);
> +			if (ret <= 0 || ret >= (int)sizeof(c->ip6.ifname_out))
> +				die("Invalid interface name: %s", optarg);
> +
> +			break;
>  		case 'd':
>  			if (c->debug)
>  				die("Multiple --debug options given");
> @@ -1459,13 +1508,33 @@ void conf(struct ctx *c, int argc, char **argv)
>  			die("Invalid gateway address: %s", optarg);
>  			break;
>  		case 'i':
> -			if (ifi)
> +			if (ifi4 || ifi6)
>  				die("Redundant interface: %s", optarg);
>  
> -			if (!(ifi = if_nametoindex(optarg)))
> +			if (!(ifi4 = ifi6 = if_nametoindex(optarg)))
>  				die("Invalid interface name %s: %s", optarg,
>  				    strerror(errno));
>  			break;
> +		case 'o':
> +			if (IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out)	  &&
> +			    inet_pton(AF_INET6, optarg, &c->ip6.addr_out) &&
> +			    !IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out)	  &&
> +			    !IN6_IS_ADDR_LOOPBACK(&c->ip6.addr_out)	  &&
> +			    !IN6_IS_ADDR_V4MAPPED(&c->ip6.addr_out)	  &&
> +			    !IN6_IS_ADDR_V4COMPAT(&c->ip6.addr_out)	  &&
> +			    !IN6_IS_ADDR_MULTICAST(&c->ip6.addr_out))
> +				break;
> +
> +			if (IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out)	 &&
> +			    inet_pton(AF_INET, optarg, &c->ip4.addr_out) &&
> +			    !IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out)	 &&
> +			    !IN4_IS_ADDR_BROADCAST(&c->ip4.addr_out)	 &&
> +			    !IN4_IS_ADDR_MULTICAST(&c->ip4.addr_out))
> +				break;
> +
> +			die("Invalid or redundant outbound address: %s",
> +			    optarg);
> +			break;
>  		case 'D':
>  			if (!strcmp(optarg, "none")) {
>  				if (c->no_dns)
> @@ -1557,6 +1626,12 @@ void conf(struct ctx *c, int argc, char **argv)
>  	if (*c->sock_path && c->fd_tap >= 0)
>  		die("Options --socket and --fd are mutually exclusive");
>  
> +	if (!ifi4 && *c->ip4.ifname_out)
> +		ifi4 = if_nametoindex(c->ip4.ifname_out);
> +
> +	if (!ifi6 && *c->ip6.ifname_out)
> +		ifi6 = if_nametoindex(c->ip6.ifname_out);
> +
>  	conf_ugid(runas, &uid, &gid);
>  
>  	if (logfile) {
> @@ -1566,10 +1641,12 @@ void conf(struct ctx *c, int argc, char **argv)
>  
>  	nl_sock_init(c, false);
>  	if (!v6_only)
> -		c->ifi4 = conf_ip4(ifi, &c->ip4, c->mac);
> +		c->ifi4 = conf_ip4(ifi4, &c->ip4, c->mac);
>  	if (!v4_only)
> -		c->ifi6 = conf_ip6(ifi, &c->ip6, c->mac);
> -	if (!c->ifi4 && !c->ifi6)
> +		c->ifi6 = conf_ip6(ifi6, &c->ip6, c->mac);
> +	if ((!c->ifi4 && !c->ifi6) ||
> +	    (*c->ip4.ifname_out && !c->ifi4) ||
> +	    (*c->ip6.ifname_out && !c->ifi6))
>  		die("External interface not usable");
>  
>  	/* Inbound port options can be parsed now (after IPv4/IPv6 settings) */
> diff --git a/icmp.c b/icmp.c
> index b842fa8..ddf83f8 100644
> --- a/icmp.c
> +++ b/icmp.c
> @@ -170,8 +170,16 @@ int icmp_tap_handler(const struct ctx *c, int af, const void *addr,
>  		iref.icmp.id = id = ntohs(ih->un.echo.id);
>  
>  		if ((s = icmp_id_map[V4][id].sock) <= 0) {
> -			s = sock_l4(c, AF_INET, IPPROTO_ICMP, NULL, NULL, id,
> -				    iref.u32);
> +			const struct in_addr *bind_addr = NULL;
> +			const char *bind_if;
> +
> +			bind_if = *c->ip4.ifname_out ? c->ip4.ifname_out : NULL;
> +
> +			if (!IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out))
> +				bind_addr = &c->ip4.addr_out;
> +
> +			s = sock_l4(c, AF_INET, IPPROTO_ICMP, bind_addr,
> +				    bind_if, id, iref.u32);
>  			if (s < 0)
>  				goto fail_sock;
>  			if (s > SOCKET_MAX) {
> @@ -216,8 +224,16 @@ int icmp_tap_handler(const struct ctx *c, int af, const void *addr,
>  
>  		iref.icmp.id = id = ntohs(ih->icmp6_identifier);
>  		if ((s = icmp_id_map[V6][id].sock) <= 0) {
> -			s = sock_l4(c, AF_INET6, IPPROTO_ICMPV6, NULL, NULL, id,
> -				    iref.u32);
> +			const struct in6_addr *bind_addr = NULL;
> +			const char *bind_if;
> +
> +			bind_if = *c->ip6.ifname_out ? c->ip6.ifname_out : NULL;
> +
> +			if (!IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out))
> +				bind_addr = &c->ip6.addr_out;
> +
> +			s = sock_l4(c, AF_INET6, IPPROTO_ICMPV6, bind_addr,
> +				    bind_if, id, iref.u32);
>  			if (s < 0)
>  				goto fail_sock;
>  			if (s > SOCKET_MAX) {
> diff --git a/passt.1 b/passt.1
> index f317c33..6136fa5 100644
> --- a/passt.1
> +++ b/passt.1
> @@ -180,8 +180,33 @@ to allow mapping of local traffic to guest and target namespace. See the
>  .TP
>  .BR \-i ", " \-\-interface " " \fIname
>  Use host interface \fIname\fR to derive addresses and routes.
> -Default is to use the interfaces with the first default routes for each IP
> -version.
> +Default is to use the interfaces specified by \fB--outbound-if4\fR and
> +\fB--outbound-if6\fR, for IPv4 and IPv6 addresses and routes, respectively. If
> +no interfaces are given, the interface with the first default routes for each IP
> +version is selected.
> +
> +.TP
> +.BR \-o ", " \-\-outbound " " \fIaddr
> +Use an IPv4 \fIaddr\fR as source address for IPv4 outbound TCP connections, UDP
> +flows, ICMP requests, or an IPv6 \fIaddr\fR for IPv6 ones, by binding outbound
> +sockets to it.
> +This option can be specified zero (for defaults) to two times (once for IPv4,
> +once for IPv6).
> +By default, the source address is selected by the routing tables.
> +
> +.TP
> +.BR \-\-outbound-if4 " " \fIname
> +Bind IPv4 outbound sockets to host interface \fIname\fR, and, unless another
> +interface is specified via \fB-i\fR, \fB--interface\fR, use this interface to
> +derive IPv4 addresses and routes.
> +By default, the interface given by the default route is selected.
> +
> +.TP
> +.BR \-\-outbound-if6 " " \fIname
> +Bind IPv6 outbound sockets to host interface \fIname\fR, and, unless another
> +interface is specified via \fB-i\fR, \fB--interface\fR, use this interface to
> +derive IPv6 addresses and routes.
> +By default, the interface given by the default route is selected.
>  
>  .TP
>  .BR \-D ", " \-\-dns " " \fIaddr
> diff --git a/passt.h b/passt.h
> index cc60c84..b73f4ff 100644
> --- a/passt.h
> +++ b/passt.h
> @@ -106,6 +106,8 @@ enum passt_modes {
>   * @dns:		DNS addresses for DHCP, zero-terminated, network order
>   * @dns_match:		Forward DNS query if sent to this address, network order
>   * @dns_host:		Use this DNS on the host for forwarding, network order
> + * @addr_out:		Optional source address for outbound traffic
> + * @ifname_out:		Optional interface name to bind outbound sockets to
>   */
>  struct ip4_ctx {
>  	struct in_addr addr;
> @@ -115,6 +117,9 @@ struct ip4_ctx {
>  	struct in_addr dns[MAXNS + 1];
>  	struct in_addr dns_match;
>  	struct in_addr dns_host;
> +
> +	struct in_addr addr_out;
> +	char ifname_out[IFNAMSIZ];
>  };
>  
>  /**
> @@ -127,6 +132,8 @@ struct ip4_ctx {
>   * @dns:		DNS addresses for DHCPv6 and NDP, zero-terminated
>   * @dns_match:		Forward DNS query if sent to this address
>   * @dns_host:		Use this DNS on the host for forwarding
> + * @addr_out:		Optional source address for outbound traffic
> + * @ifname_out:		Optional interface name to bind outbound sockets to
>   */
>  struct ip6_ctx {
>  	struct in6_addr addr;
> @@ -137,6 +144,9 @@ struct ip6_ctx {
>  	struct in6_addr dns[MAXNS + 1];
>  	struct in6_addr dns_match;
>  	struct in6_addr dns_host;
> +
> +	struct in6_addr addr_out;
> +	char ifname_out[IFNAMSIZ];
>  };
>  
>  #include <netinet/if_ether.h>
> diff --git a/tcp.c b/tcp.c
> index b674311..8e8d653 100644
> --- a/tcp.c
> +++ b/tcp.c
> @@ -1946,6 +1946,61 @@ static uint16_t tcp_conn_tap_mss(const struct ctx *c,
>  	return MIN(mss, USHRT_MAX);
>  }
>  
> +/**
> + * tcp_bind_outbound() - Bind socket to outbound address and interface if given
> + * @c:		Execution context
> + * @s:		Outbound TCP socket
> + * @af:		Address family
> + */
> +static void tcp_bind_outbound(const struct ctx *c, int s, sa_family_t af)
> +{
> +	if (af == AF_INET) {
> +		if (!IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out)) {
> +			struct sockaddr_in addr4 = {
> +				.sin_family = AF_INET,
> +				.sin_port = 0,
> +				.sin_addr = c->ip4.addr_out,
> +			};
> +
> +			if (bind(s, (struct sockaddr *)&addr4, sizeof(addr4))) {
> +				debug("Can't bind IPv4 TCP socket address: %s",
> +				      strerror(errno));
> +			}
> +		}
> +
> +		if (*c->ip4.ifname_out) {
> +			if (setsockopt(s, SOL_SOCKET, SO_BINDTODEVICE,
> +				       c->ip4.ifname_out,
> +				       strlen(c->ip4.ifname_out))) {
> +				debug("Can't bind IPv4 TCP socket to interface:"
> +				      " %s", strerror(errno));
> +			}
> +		}
> +	} else if (af == AF_INET6) {
> +		if (!IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out)) {
> +			struct sockaddr_in6 addr6 = {
> +				.sin6_family = AF_INET6,
> +				.sin6_port = 0,
> +				.sin6_addr = c->ip6.addr_out,
> +			};
> +
> +			if (bind(s, (struct sockaddr *)&addr6, sizeof(addr6))) {
> +				debug("Can't bind IPv6 TCP socket address: %s",
> +				      strerror(errno));
> +			}
> +		}
> +
> +		if (*c->ip6.ifname_out) {
> +			if (setsockopt(s, SOL_SOCKET, SO_BINDTODEVICE,
> +				       c->ip6.ifname_out,
> +				       strlen(c->ip6.ifname_out))) {
> +				debug("Can't bind IPv6 TCP socket to interface:"
> +				      " %s", strerror(errno));
> +			}
> +		}
> +	}
> +}
> +
>  /**
>   * tcp_conn_from_tap() - Handle connection request (SYN segment) from tap
>   * @c:		Execution context
> @@ -2052,6 +2107,11 @@ static void tcp_conn_from_tap(struct ctx *c, int af, const void *addr,
>  	if (errno != EADDRNOTAVAIL && errno != EACCES)
>  		conn_flag(c, conn, LOCAL);
>  
> +	if ((af == AF_INET &&  !IN4_IS_ADDR_LOOPBACK(&addr4.sin_addr)) ||
> +	    (af == AF_INET6 && !IN6_IS_ADDR_LOOPBACK(&addr6.sin6_addr) &&
> +			       !IN6_IS_ADDR_LINKLOCAL(&addr6.sin6_addr)))
> +		tcp_bind_outbound(c, s, af);
> +
>  	if (connect(s, sa, sl)) {
>  		if (errno != EINPROGRESS) {
>  			tcp_rst(c, conn);
> diff --git a/udp.c b/udp.c
> index b7cbfdc..ef486fe 100644
> --- a/udp.c
> +++ b/udp.c
> @@ -843,20 +843,6 @@ int udp_tap_handler(struct ctx *c, int af, const void *addr,
>  		sa = (struct sockaddr *)&s_in;
>  		sl = sizeof(s_in);
>  
> -		if (!(s = udp_tap_map[V4][src].sock)) {
> -			union udp_epoll_ref uref = { .udp.port = src };
> -
> -			s = sock_l4(c, AF_INET, IPPROTO_UDP, NULL, NULL, src,
> -				    uref.u32);
> -			if (s < 0)
> -				return p->count;
> -
> -			udp_tap_map[V4][src].sock = s;
> -			bitmap_set(udp_act[V4][UDP_ACT_TAP], src);
> -		}
> -
> -		udp_tap_map[V4][src].ts = now->tv_sec;
> -
>  		if (IN4_ARE_ADDR_EQUAL(&s_in.sin_addr, &c->ip4.dns_match) &&
>  		    ntohs(s_in.sin_port) == 53) {
>  			s_in.sin_addr = c->ip4.dns_host;
> @@ -868,13 +854,37 @@ int udp_tap_handler(struct ctx *c, int af, const void *addr,
>  			else
>  				s_in.sin_addr = c->ip4.addr_seen;
>  		}
> +
> +		if (!(s = udp_tap_map[V4][src].sock)) {
> +			union udp_epoll_ref uref = { .udp.port = src };
> +			in_addr_t bind_addr = { 0 };
> +			const char *bind_if = NULL;
> +
> +			if (!IN6_IS_ADDR_LOOPBACK(&s_in.sin_addr) &&
> +			    *c->ip6.ifname_out)
> +				bind_if = c->ip6.ifname_out;
> +
> +			if (!IN4_IS_ADDR_UNSPECIFIED(&c->ip4.addr_out) &&
> +			    !IN4_IS_ADDR_LOOPBACK(&s_in.sin_addr))
> +				bind_addr = c->ip4.addr_out.s_addr;
> +
> +			s = sock_l4(c, AF_INET, IPPROTO_UDP, &bind_addr,
> +				    bind_if, src, uref.u32);
> +			if (s < 0)
> +				return p->count;
> +
> +			udp_tap_map[V4][src].sock = s;
> +			bitmap_set(udp_act[V4][UDP_ACT_TAP], src);
> +		}
> +
> +		udp_tap_map[V4][src].ts = now->tv_sec;
>  	} else {
>  		s_in6 = (struct sockaddr_in6) {
>  			.sin6_family = AF_INET6,
>  			.sin6_port = uh->dest,
>  			.sin6_addr = *(struct in6_addr *)addr,
>  		};
> -		const void *bind_addr = &in6addr_any;
> +		const struct in6_addr *bind_addr = &in6addr_any;
>  
>  		sa = (struct sockaddr *)&s_in6;
>  		sl = sizeof(s_in6);
> @@ -898,9 +908,19 @@ int udp_tap_handler(struct ctx *c, int af, const void *addr,
>  		if (!(s = udp_tap_map[V6][src].sock)) {
>  			union udp_epoll_ref uref = { .udp.v6 = 1,
>  						     .udp.port = src };
> +			const char *bind_if = NULL;
> +
> +			if (!IN6_IS_ADDR_LOOPBACK(&s_in6.sin6_addr) &&
> +			    *c->ip6.ifname_out)
> +				bind_if = c->ip6.ifname_out;
> +
> +			if (!IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_out) &&
> +			    !IN6_IS_ADDR_LOOPBACK(&s_in6.sin6_addr) &&
> +			    !IN6_IS_ADDR_LINKLOCAL(&s_in6.sin6_addr))
> +				bind_addr = &c->ip6.addr_out;
>  
> -			s = sock_l4(c, AF_INET6, IPPROTO_UDP, bind_addr, NULL,
> -				    src, uref.u32);
> +			s = sock_l4(c, AF_INET6, IPPROTO_UDP, bind_addr,
> +				    bind_if, src, uref.u32);
>  			if (s < 0)
>  				return p->count;
>  

-- 
David Gibson			| I'll have my music baroque, and my code
david AT gibson.dropbear.id.au	| minimalist, thank you.  NOT _the_ _other_
				| _way_ _around_!
http://www.ozlabs.org/~dgibson

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

  reply	other threads:[~2023-03-09  2:31 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-09  2:09 [PATCH v4 0/2] Implement explicit outbound address and interface selection Stefano Brivio
2023-03-09  2:09 ` [PATCH v4 1/2] conf, passt.h: Rename "outbound" interface to "template" interface Stefano Brivio
2023-03-09  2:09 ` [PATCH v4 2/2] conf, icmp, tcp, udp: Add options to bind to outbound address and interface Stefano Brivio
2023-03-09  2:31   ` David Gibson [this message]
2023-03-09  2:42     ` Stefano Brivio

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ZAlE95uHMImFZnMI@yekko \
    --to=david@gibson.dropbear.id.au \
    --cc=passt-dev@passt.top \
    --cc=sbrivio@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).