From: David Gibson <david@gibson.dropbear.id.au>
To: Stefano Brivio <sbrivio@redhat.com>
Cc: passt-dev@passt.top
Subject: Re: [PATCH v2 21/23] conf, fwd: Stricter rule checking in fwd_rule_add()
Date: Thu, 16 Apr 2026 11:46:22 +1000 [thread overview]
Message-ID: <aeA_bkUS4_1Q2qnz@zatzit> (raw)
In-Reply-To: <20260416000457.55ecdbec@elisabeth>
[-- Attachment #1: Type: text/plain, Size: 5223 bytes --]
On Thu, Apr 16, 2026 at 12:04:58AM +0200, Stefano Brivio wrote:
> On Fri, 10 Apr 2026 11:03:07 +1000
> David Gibson <david@gibson.dropbear.id.au> wrote:
>
> > Although fwd_rule_add() performs some sanity checks on the rule it is
> > given, there are invalid rules we don't check for, assuming that its
> > callers will do that.
> >
> > That won't be enough when we can get rules inserted by a dynamic update
> > client without going through the existing parsing code. So, add stricter
> > checks to fwd_rule_add(), which is now possible thanks to the capabilities
> > bits in the struct fwd_table. Where those duplicate existing checks in the
> > callers, remove the old copies.
> >
> > Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
> > ---
> > conf.c | 19 -------------------
> > fwd.c | 51 ++++++++++++++++++++++++++++++++++++++++++++++-----
> > 2 files changed, 46 insertions(+), 24 deletions(-)
> >
> > diff --git a/conf.c b/conf.c
> > index b7a4459e..31627209 100644
> > --- a/conf.c
> > +++ b/conf.c
> > @@ -310,10 +310,6 @@ static void conf_ports_spec(struct fwd_table *fwd, uint8_t proto,
> > if (p != ep) /* Garbage after the ranges */
> > goto bad;
> >
> > - if (orig_range.first == 0) {
> > - die("Can't forward port 0 included in '%s'", spec);
> > - }
> > -
> > conf_ports_range_except(fwd, proto, addr, ifname,
> > orig_range.first, orig_range.last,
> > exclude,
> > @@ -356,11 +352,6 @@ static void conf_ports(char optname, const char *optarg, struct fwd_table *fwd)
> > return;
> > }
> >
> > - if (proto == IPPROTO_TCP && !(fwd->caps & FWD_CAP_TCP))
> > - die("TCP port forwarding requested but TCP is disabled");
> > - if (proto == IPPROTO_UDP && !(fwd->caps & FWD_CAP_UDP))
> > - die("UDP port forwarding requested but UDP is disabled");
> > -
> > strncpy(buf, optarg, sizeof(buf) - 1);
> >
> > if ((spec = strchr(buf, '/'))) {
> > @@ -405,16 +396,6 @@ static void conf_ports(char optname, const char *optarg, struct fwd_table *fwd)
> > addr = NULL;
> > }
> >
> > - if (addr) {
> > - if (!(fwd->caps & FWD_CAP_IPV4) && inany_v4(addr)) {
> > - die("IPv4 is disabled, can't use -%c %s",
> > - optname, optarg);
> > - } else if (!(fwd->caps & FWD_CAP_IPV6) && !inany_v4(addr)) {
> > - die("IPv6 is disabled, can't use -%c %s",
> > - optname, optarg);
> > - }
> > - }
> > -
> > if (optname == 'T' || optname == 'U') {
> > assert(!addr && !ifname);
> >
> > diff --git a/fwd.c b/fwd.c
> > index c7fd1a9d..98b04d0c 100644
> > --- a/fwd.c
> > +++ b/fwd.c
> > @@ -367,17 +367,58 @@ int fwd_rule_add(struct fwd_table *fwd, const struct fwd_rule *new)
> > new->first, new->last);
> > return -EINVAL;
> > }
> > + if (!new->first) {
> > + warn("Forwarding rule atttempts to map from port 0");
> > + return -EINVAL;
> > + }
> > + if (!new->to || (new->to + new->last - new->first) < new->to) {
> > + warn("Forwarding rule atttempts to map to port 0");
>
> Nit: attempts
Oops, fixed.
>
> > + return -EINVAL;
> > + }
> > if (new->flags & ~allowed_flags) {
> > warn("Rule has invalid flags 0x%hhx",
> > new->flags & ~allowed_flags);
> > return -EINVAL;
> > }
> > - if (new->flags & FWD_DUAL_STACK_ANY &&
> > - !inany_equals(&new->addr, &inany_any6)) {
> > - char astr[INANY_ADDRSTRLEN];
> > + if (new->flags & FWD_DUAL_STACK_ANY) {
> > + if (!inany_equals(&new->addr, &inany_any6)) {
> > + char astr[INANY_ADDRSTRLEN];
> >
> > - warn("Dual stack rule has non-wildcard address %s",
> > - inany_ntop(&new->addr, astr, sizeof(astr)));
> > + warn("Dual stack rule has non-wildcard address %s",
> > + inany_ntop(&new->addr, astr, sizeof(astr)));
> > + return -EINVAL;
> > + }
> > + if (!(fwd->caps & FWD_CAP_IPV4)) {
> > + warn("Dual stack forward, but IPv4 not enabled");
> > + return -EINVAL;
> > + }
> > + if (!(fwd->caps & FWD_CAP_IPV6)) {
> > + warn("Dual stack forward, but IPv6 not enabled");
> > + return -EINVAL;
> > + }
> > + } else {
> > + if (inany_v4(&new->addr) && !(fwd->caps & FWD_CAP_IPV4)) {
> > + warn("IPv4 forward, but IPv4 not enabled");
> > + return -EINVAL;
> > + }
> > + if (!inany_v4(&new->addr) && !(fwd->caps & FWD_CAP_IPV6)) {
> > + warn("IPv6 forward, but IPv6 not enabled");
> > + return -EINVAL;
> > + }
> > + }
> > + if (new->proto == IPPROTO_TCP) {
> > + if (!(fwd->caps & FWD_CAP_TCP)) {
> > + warn("Can't add TCP forwarding rule, TCP not enabled");
> > + return -EINVAL;
> > + }
> > + } else if (new->proto == IPPROTO_UDP) {
> > + if (!(fwd->caps & FWD_CAP_UDP)) {
> > + warn("Can't add UDP forwarding rule, UDP not enabled");
> > + return -EINVAL;
> > + }
> > + } else {
> > + warn("Unsupported protocol 0x%hhx (%s) for forwarding rule",
> > + new->proto, ipproto_name(new->proto));
> > return -EINVAL;
> > }
> >
>
> --
> Stefano
>
--
David Gibson (he or they) | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you, not the other way
| around.
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2026-04-16 1:47 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-10 1:02 [PATCH v2 00/23] Rework forwarding option parsing David Gibson
2026-04-10 1:02 ` [PATCH v2 01/23] conf: Split parsing of port specifiers from the rest of -[tuTU] parsing David Gibson
2026-04-10 1:02 ` [PATCH v2 02/23] conf: Simplify handling of default forwarding mode David Gibson
2026-04-10 1:02 ` [PATCH v2 03/23] conf: Move first pass handling of -[TU] next to handling of -[tu] David Gibson
2026-04-10 1:02 ` [PATCH v2 04/23] doc: Consolidate -[tu] option descriptions for passt and pasta David Gibson
2026-04-10 1:02 ` [PATCH v2 05/23] conf: Permit -[tTuU] all in pasta mode David Gibson
2026-04-10 1:02 ` [PATCH v2 06/23] fwd: Better split forwarding rule specification from associated sockets David Gibson
2026-04-10 1:02 ` [PATCH v2 07/23] fwd_rule: Move forwarding rule formatting David Gibson
2026-04-10 1:02 ` [PATCH v2 08/23] conf: Pass protocol explicitly to conf_ports_range_except() David Gibson
2026-04-10 1:02 ` [PATCH v2 09/23] fwd: Split rule building from rule adding David Gibson
2026-04-10 1:02 ` [PATCH v2 10/23] fwd_rule: Move rule conflict checking from fwd_rule_add() to caller David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:19 ` David Gibson
2026-04-10 1:02 ` [PATCH v2 11/23] fwd: Improve error handling in fwd_rule_add() David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:21 ` David Gibson
2026-04-10 1:02 ` [PATCH v2 12/23] conf: Don't be strict about exclusivity of forwarding mode David Gibson
2026-04-10 1:02 ` [PATCH v2 13/23] conf: Rework stepping through chunks of port specifiers David Gibson
2026-04-10 1:03 ` [PATCH v2 14/23] conf: Rework checking for garbage after a range David Gibson
2026-04-10 1:03 ` [PATCH v2 15/23] doc: Rework man page description of port specifiers David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:34 ` David Gibson
2026-04-10 1:03 ` [PATCH v2 16/23] conf: Move "all" handling to port specifier David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:37 ` David Gibson
2026-04-10 1:03 ` [PATCH v2 17/23] conf: Allow user-specified auto-scanned port forwarding ranges David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:44 ` David Gibson
2026-04-10 1:03 ` [PATCH v2 18/23] conf: Move SO_BINDTODEVICE workaround to conf_ports() David Gibson
2026-04-10 1:03 ` [PATCH v2 19/23] conf: Don't pass raw commandline argument to conf_ports_spec() David Gibson
2026-04-10 1:03 ` [PATCH v2 20/23] fwd, conf: Add capabilities bits to each forwarding table David Gibson
2026-04-10 1:03 ` [PATCH v2 21/23] conf, fwd: Stricter rule checking in fwd_rule_add() David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:46 ` David Gibson [this message]
2026-04-10 1:03 ` [PATCH v2 22/23] fwd_rule: Move ephemeral port probing to fwd_rule.c David Gibson
2026-04-10 1:03 ` [PATCH v2 23/23] fwd, conf: Move rule parsing code to fwd_rule.[ch] David Gibson
2026-04-15 22:05 ` [PATCH v2 00/23] Rework forwarding option parsing Stefano Brivio
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aeA_bkUS4_1Q2qnz@zatzit \
--to=david@gibson.dropbear.id.au \
--cc=passt-dev@passt.top \
--cc=sbrivio@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).