diff options
| author | David Gibson <david@gibson.dropbear.id.au> | 2026-04-17 15:05:15 +1000 |
|---|---|---|
| committer | Stefano Brivio <sbrivio@redhat.com> | 2026-04-21 02:09:35 +0200 |
| commit | a287375874f4f6269ed2ec833394d22ebac26a5a (patch) | |
| tree | db9c59ab366c119c457e2c3d3398b2352936f7ed | |
| parent | 2230d5b81a0d063aade36155f9e1846940852eb0 (diff) | |
| download | passt-a287375874f4f6269ed2ec833394d22ebac26a5a.tar passt-a287375874f4f6269ed2ec833394d22ebac26a5a.tar.gz passt-a287375874f4f6269ed2ec833394d22ebac26a5a.tar.bz2 passt-a287375874f4f6269ed2ec833394d22ebac26a5a.tar.lz passt-a287375874f4f6269ed2ec833394d22ebac26a5a.tar.xz passt-a287375874f4f6269ed2ec833394d22ebac26a5a.tar.zst passt-a287375874f4f6269ed2ec833394d22ebac26a5a.zip | |
conf_ports_spec() and conf_ports() take the global context structure, but
their only use for it is seeing if various things are possible: which
protocols and address formats are allowed in formatting rules. Localise
that information into the forwarding table, with a capabilities bitmap.
For now we set that caps map to the same thing for all tables, but keep it
per-table to allow for the possibility of different pif types in future
that might have different capabilities (e.g. if we add a forwarding table
for the tap interface, it won't be able to accept interface names to bind).
Use this information to remove the global context parameter from
conf_ports() and conf_ports_spec().
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Reviewed-by: Laurent Vivier <lvivier@redhat.com>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
| -rw-r--r-- | conf.c | 48 | ||||
| -rw-r--r-- | fwd.c | 17 | ||||
| -rw-r--r-- | fwd.h | 2 | ||||
| -rw-r--r-- | fwd_rule.h | 8 |
4 files changed, 49 insertions, 26 deletions
@@ -218,15 +218,13 @@ fail: /** * conf_ports_spec() - Parse port range(s) specifier - * @c: Execution context * @fwd: Forwarding table to be updated * @proto: Protocol to forward * @addr: Listening address for forwarding * @ifname: Interface name for listening * @spec: Port range(s) specifier */ -static void conf_ports_spec(const struct ctx *c, - struct fwd_table *fwd, uint8_t proto, +static void conf_ports_spec(struct fwd_table *fwd, uint8_t proto, const union inany_addr *addr, const char *ifname, const char *spec) { @@ -255,7 +253,7 @@ static void conf_ports_spec(const struct ctx *c, if (p != ep) /* Garbage after the keyword */ goto bad; - if (c->mode != MODE_PASTA) { + if (!(fwd->caps & FWD_CAP_SCAN)) { die( "'auto' port forwarding is only allowed for pasta"); } @@ -329,13 +327,11 @@ bad: /** * conf_ports() - Parse port configuration options, initialise UDP/TCP sockets - * @c: Execution context * @optname: Short option name, t, T, u, or U * @optarg: Option argument (port specification) * @fwd: Forwarding table to be updated */ -static void conf_ports(const struct ctx *c, char optname, const char *optarg, - struct fwd_table *fwd) +static void conf_ports(char optname, const char *optarg, struct fwd_table *fwd) { union inany_addr addr_buf = inany_any6, *addr = &addr_buf; char buf[BUFSIZ], *spec, *ifname = NULL; @@ -360,9 +356,9 @@ static void conf_ports(const struct ctx *c, char optname, const char *optarg, return; } - if (proto == IPPROTO_TCP && c->no_tcp) + if (proto == IPPROTO_TCP && !(fwd->caps & FWD_CAP_TCP)) die("TCP port forwarding requested but TCP is disabled"); - if (proto == IPPROTO_UDP && c->no_udp) + if (proto == IPPROTO_UDP && !(fwd->caps & FWD_CAP_UDP)) die("UDP port forwarding requested but UDP is disabled"); strncpy(buf, optarg, sizeof(buf) - 1); @@ -410,10 +406,10 @@ static void conf_ports(const struct ctx *c, char optname, const char *optarg, } if (addr) { - if (!c->ifi4 && inany_v4(addr)) { + if (!(fwd->caps & FWD_CAP_IPV4) && inany_v4(addr)) { die("IPv4 is disabled, can't use -%c %s", optname, optarg); - } else if (!c->ifi6 && !inany_v4(addr)) { + } else if (!(fwd->caps & FWD_CAP_IPV6) && !inany_v4(addr)) { die("IPv6 is disabled, can't use -%c %s", optname, optarg); } @@ -422,17 +418,17 @@ static void conf_ports(const struct ctx *c, char optname, const char *optarg, if (optname == 'T' || optname == 'U') { assert(!addr && !ifname); - if (c->no_bindtodevice) { + if (!(fwd->caps & FWD_CAP_IFNAME)) { warn( "SO_BINDTODEVICE unavailable, forwarding only 127.0.0.1 and ::1 for '-%c %s'", optname, optarg); - if (c->ifi4) { - conf_ports_spec(c, fwd, proto, + if (fwd->caps & FWD_CAP_IPV4) { + conf_ports_spec(fwd, proto, &inany_loopback4, NULL, spec); } - if (c->ifi6) { - conf_ports_spec(c, fwd, proto, + if (fwd->caps & FWD_CAP_IPV6) { + conf_ports_spec(fwd, proto, &inany_loopback6, NULL, spec); } return; @@ -441,13 +437,13 @@ static void conf_ports(const struct ctx *c, char optname, const char *optarg, ifname = "lo"; } - if (ifname && c->no_bindtodevice) { + if (ifname && !(fwd->caps & FWD_CAP_IFNAME)) { die( "Device binding for '-%c %s' unsupported (requires kernel 5.7+)", optname, optarg); } - conf_ports_spec(c, fwd, proto, addr, ifname, spec); + conf_ports_spec(fwd, proto, addr, ifname, spec); } /** @@ -2185,16 +2181,16 @@ void conf(struct ctx *c, int argc, char **argv) if (name == 't') { opt_t = true; - conf_ports(c, name, optarg, c->fwd[PIF_HOST]); + conf_ports(name, optarg, c->fwd[PIF_HOST]); } else if (name == 'u') { opt_u = true; - conf_ports(c, name, optarg, c->fwd[PIF_HOST]); + conf_ports(name, optarg, c->fwd[PIF_HOST]); } else if (name == 'T') { opt_T = true; - conf_ports(c, name, optarg, c->fwd[PIF_SPLICE]); + conf_ports(name, optarg, c->fwd[PIF_SPLICE]); } else if (name == 'U') { opt_U = true; - conf_ports(c, name, optarg, c->fwd[PIF_SPLICE]); + conf_ports(name, optarg, c->fwd[PIF_SPLICE]); } } while (name != -1); @@ -2246,13 +2242,13 @@ void conf(struct ctx *c, int argc, char **argv) if (c->mode == MODE_PASTA) { if (!opt_t) - conf_ports(c, 't', "auto", c->fwd[PIF_HOST]); + conf_ports('t', "auto", c->fwd[PIF_HOST]); if (!opt_T) - conf_ports(c, 'T', "auto", c->fwd[PIF_SPLICE]); + conf_ports('T', "auto", c->fwd[PIF_SPLICE]); if (!opt_u) - conf_ports(c, 'u', "auto", c->fwd[PIF_HOST]); + conf_ports('u', "auto", c->fwd[PIF_HOST]); if (!opt_U) - conf_ports(c, 'U', "auto", c->fwd[PIF_SPLICE]); + conf_ports('U', "auto", c->fwd[PIF_SPLICE]); } if (!c->quiet) @@ -326,6 +326,23 @@ static struct fwd_table fwd_out; */ void fwd_rule_init(struct ctx *c) { + uint32_t caps = 0; + + if (c->ifi4) + caps |= FWD_CAP_IPV4; + if (c->ifi6) + caps |= FWD_CAP_IPV6; + if (!c->no_tcp) + caps |= FWD_CAP_TCP; + if (!c->no_udp) + caps |= FWD_CAP_UDP; + if (c->mode == MODE_PASTA) + caps |= FWD_CAP_SCAN; + if (!c->no_bindtodevice) + caps |= FWD_CAP_IFNAME; + + fwd_in.caps = fwd_out.caps = caps; + c->fwd[PIF_HOST] = &fwd_in; if (c->mode == MODE_PASTA) c->fwd[PIF_SPLICE] = &fwd_out; @@ -52,6 +52,7 @@ struct fwd_listen_ref { /** * struct fwd_table - Forwarding state (per initiating pif) + * @caps: Forwarding capabilities for this initiating pif * @count: Number of forwarding rules * @rules: Array of forwarding rules * @rulesocks: Parallel array of @rules (@count valid entries) of pointers to @@ -61,6 +62,7 @@ struct fwd_listen_ref { * @socks: Listening sockets for forwarding */ struct fwd_table { + uint32_t caps; unsigned count; struct fwd_rule rules[MAX_FWD_RULES]; int *rulesocks[MAX_FWD_RULES]; @@ -17,6 +17,14 @@ #include "inany.h" #include "bitmap.h" +/* Forwarding capability bits */ +#define FWD_CAP_IPV4 BIT(0) +#define FWD_CAP_IPV6 BIT(1) +#define FWD_CAP_TCP BIT(2) +#define FWD_CAP_UDP BIT(3) +#define FWD_CAP_SCAN BIT(4) +#define FWD_CAP_IFNAME BIT(5) + /** * struct fwd_rule - Forwarding rule governing a range of ports * @addr: Address to forward from |
