From: David Gibson <david@gibson.dropbear.id.au>
To: Stefano Brivio <sbrivio@redhat.com>
Cc: Jon Maloy <jmaloy@redhat.com>, passt-dev@passt.top
Subject: Re: [PATCH 3/4] udp: Rework offender address handling in udp_sock_recverr()
Date: Thu, 17 Apr 2025 11:33:12 +1000 [thread overview]
Message-ID: <aABaWB5Ww1Q6KzEv@zatzit> (raw)
In-Reply-To: <20250416162736.0380a5c4@elisabeth>
[-- Attachment #1: Type: text/plain, Size: 6465 bytes --]
On Wed, Apr 16, 2025 at 04:27:36PM +0200, Stefano Brivio wrote:
> On Wed, 16 Apr 2025 19:07:06 +1000
> David Gibson <david@gibson.dropbear.id.au> wrote:
>
> > Make a number of changes to udp_sock_recverr() to improve the robustness
> > of how we handle addresses.
> >
> > * Get the "offender" address (source of the ICMP packet) using the
> > SO_EE_OFFENDER() macro, reducing assumptions about structure layout.
> > * Parse the offender sockaddr using inany_from_sockaddr()
> > * Check explicitly that the source and destination pifs are what we
> > expect. Previously we checked something that was probably equivalent
> > in practice, but isn't strictly speaking what we require for the rest
> > of the code.
> > * Verify that for an ICMPv4 error we also have an IPv4 source/offender
> > and destination/endpoint address
> > * Verify that for an ICMPv6 error we have an IPv6 endpoint
> > * Improve debug reporting of any failures
> >
> > Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
> > ---
> > udp.c | 67 ++++++++++++++++++++++++++++++++++++++++-------------------
> > 1 file changed, 46 insertions(+), 21 deletions(-)
> >
> > diff --git a/udp.c b/udp.c
> > index 57769d06..4352520e 100644
> > --- a/udp.c
> > +++ b/udp.c
> > @@ -159,6 +159,12 @@ udp_meta[UDP_MAX_FRAMES];
> > MAX(CMSG_SPACE(sizeof(struct in_pktinfo)), \
> > CMSG_SPACE(sizeof(struct in6_pktinfo)))
> >
> > +#define RECVERR_SPACE \
> > + MAX(CMSG_SPACE(sizeof(struct sock_extended_err) + \
> > + sizeof(struct sockaddr_in)), \
> > + CMSG_SPACE(sizeof(struct sock_extended_err) + \
> > + sizeof(struct sockaddr_in6)))
> > +
> > /**
> > * enum udp_iov_idx - Indices for the buffers making up a single UDP frame
> > * @UDP_IOV_TAP tap specific header
> > @@ -516,12 +522,8 @@ static int udp_pktinfo(struct msghdr *msg, union inany_addr *dst)
> > static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> > uint8_t pif, in_port_t port)
> > {
> > - struct errhdr {
> > - struct sock_extended_err ee;
> > - union sockaddr_inany saddr;
> > - };
> > - char buf[PKTINFO_SPACE + CMSG_SPACE(sizeof(struct errhdr))];
> > - const struct errhdr *eh = NULL;
> > + char buf[PKTINFO_SPACE + RECVERR_SPACE];
> > + const struct sock_extended_err *ee;
> > char data[ICMP6_MAX_DLEN];
> > struct cmsghdr *hdr;
> > struct iovec iov = {
> > @@ -538,7 +540,12 @@ static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> > .msg_controllen = sizeof(buf),
> > };
> > const struct flowside *toside;
> > - flow_sidx_t tosidx;
> > + char astr[INANY_ADDRSTRLEN];
> > + char sastr[SOCKADDR_STRLEN];
> > + union inany_addr offender;
> > + const struct in_addr *o4;
> > + in_port_t offender_port;
> > + uint8_t topif;
> > size_t dlen;
> > ssize_t rc;
> >
> > @@ -569,10 +576,10 @@ static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> > return -1;
> > }
> >
> > - eh = (const struct errhdr *)CMSG_DATA(hdr);
> > + ee = (const struct sock_extended_err *)CMSG_DATA(hdr);
> >
> > debug("%s error on UDP socket %i: %s",
> > - str_ee_origin(&eh->ee), s, strerror_(eh->ee.ee_errno));
> > + str_ee_origin(ee), s, strerror_(ee->ee_errno));
> >
> > if (!flow_sidx_valid(sidx)) {
> > /* No hint from the socket, determine flow from addresses */
> > @@ -588,25 +595,43 @@ static int udp_sock_recverr(const struct ctx *c, int s, flow_sidx_t sidx,
> > debug("Ignoring UDP error without flow");
> > return 1;
> > }
> > + } else {
> > + pif = pif_at_sidx(sidx);
>
> Two stray trailing tabs here.
Oops, fixed.
> > }
> >
> > - tosidx = flow_sidx_opposite(sidx);
> > - toside = flowside_at_sidx(tosidx);
> > + toside = flowside_at_sidx(flow_sidx_opposite(sidx));
> > + topif = pif_at_sidx(flow_sidx_opposite(sidx));
> > dlen = rc;
> >
> > - if (pif_is_socket(pif_at_sidx(tosidx))) {
> > - /* XXX Is there any way to propagate ICMPs from socket to
> > - * socket? */
> > - } else if (hdr->cmsg_level == IPPROTO_IP) {
> > + if (inany_from_sockaddr(&offender, &offender_port,
> > + SO_EE_OFFENDER(ee)) < 0)
> > + goto fail;
> > +
> > + if (pif != PIF_HOST || topif != PIF_TAP)
> > + /* XXX Can we support any other cases? */
> > + goto fail;
> > +
> > + if (hdr->cmsg_level == IPPROTO_IP &&
> > + (o4 = inany_v4(&offender)) && inany_v4(&toside->eaddr)) {
> > dlen = MIN(dlen, ICMP4_MAX_DLEN);
> > - udp_send_tap_icmp4(c, &eh->ee, toside,
> > - eh->saddr.sa4.sin_addr, data, dlen);
> > - } else if (hdr->cmsg_level == IPPROTO_IPV6) {
> > - udp_send_tap_icmp6(c, &eh->ee, toside,
> > - &eh->saddr.sa6.sin6_addr, data,
> > - dlen, sidx.flowi);
> > + udp_send_tap_icmp4(c, ee, toside, *o4, data, dlen);
> > + return 1;
> > + }
> > +
> > + if (hdr->cmsg_level == IPPROTO_IPV6 && !inany_v4(&toside->eaddr)) {
> > + udp_send_tap_icmp6(c, ee, toside, &offender.a6, data, dlen,
> > + sidx.flowi);
> > + return 1;
> > }
> >
> > +fail:
> > + flow_dbg(flow_at_sidx(sidx),
>
> Coverity Scan seems to hallucinate here and says that flow_at_sidx()
> could return NULL, with its return value later dereferenced by
> flow_log(), even if you're explicitly checking flow_sidx_valid() in all
> the paths reaching to this point.
>
> Calling this conditionally only if flow_sidx_valid() doesn't mask the
> false positive either (I guess that's the part that goes wrong
> somehow), we really need to check if (flow_at_sidx(sidx)) flow_dbg(...).
>
> Would it be possible to add the useless check just for my own sanity?
Sure. I was already borderline on whether it was clearer to introduce
an explicit uflow variable, so I've done that now, and asserted it's
non-NULL. I've checked that removes the coverity whinge, at least
running locally.
> > + "Can't propagate %s error from %s %s to %s %s",
> > + str_ee_origin(ee),
> > + pif_name(pif),
> > + sockaddr_ntop(SO_EE_OFFENDER(ee), sastr, sizeof(sastr)),
> > + pif_name(topif),
> > + inany_ntop(&toside->eaddr, astr, sizeof(astr)));
> > return 1;
> > }
>
--
David Gibson (he or they) | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you, not the other way
| around.
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2025-04-17 1:56 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-04-16 9:07 [PATCH 0/4] Translate source addresses for ICMP errors David Gibson
2025-04-16 9:07 ` [PATCH 1/4] fwd: Split out helpers for port-independent NAT David Gibson
2025-04-16 9:07 ` [PATCH 2/4] treewide: Improve robustness against sockaddrs of unexpected family David Gibson
2025-04-16 9:41 ` Stefano Brivio
2025-04-17 1:14 ` David Gibson
2025-04-16 9:07 ` [PATCH 3/4] udp: Rework offender address handling in udp_sock_recverr() David Gibson
2025-04-16 14:27 ` Stefano Brivio
2025-04-17 1:33 ` David Gibson [this message]
2025-04-16 9:07 ` [PATCH 4/4] udp: Translate offender addresses for ICMP messages David Gibson
2025-04-16 14:27 ` [PATCH 0/4] Translate source addresses for ICMP errors Stefano Brivio
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aABaWB5Ww1Q6KzEv@zatzit \
--to=david@gibson.dropbear.id.au \
--cc=jmaloy@redhat.com \
--cc=passt-dev@passt.top \
--cc=sbrivio@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).