Bug 26506 - [patch] sendto() syscall returns EINVAL in jail environment
Summary: [patch] sendto() syscall returns EINVAL in jail environment
Status: Closed FIXED
Alias: None
Product: Base System
Classification: Unclassified
Component: kern (show other bugs)
Version: Unspecified
Hardware: Any Any
: Normal Affects Only Me
Assignee: Gleb Smirnoff
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2001-04-12 08:00 UTC by Przemyslaw Frasunek
Modified: 2005-03-13 16:05 UTC (History)
0 users

See Also:


Attachments
patch-in_pcb.c (296 bytes, text/x-patch)
2004-11-26 15:19 UTC, viny
no flags Details
patch-in_pcb.c (296 bytes, text/x-patch)
2004-11-26 15:08 UTC, viny
no flags Details
patch-in_pcb.c (296 bytes, text/x-patch)
2004-11-26 15:03 UTC, viny
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Przemyslaw Frasunek 2001-04-12 08:00:09 UTC
	sendto() syscall return sometimes EINVAL in jail environment after
	upgrade from 4.2-STABLE (as of 22 Feb 2001) to 4.3-RC (as of 11 Apr
	2001).

	On 4.2-STABLE everything works good.

Fix: 

Unknown.
How-To-Repeat: 
	Run squid in jail enviroment, look at logs, run truss.

sendto(0x5,0x87c0400,0x1f,0x0,0x81f84c0,0x10)	 ERR#22 'Invalid argument'
sendto(0x5,0x87c0400,0x1f,0x0,0x81f84dc,0x10)	 ERR#22 'Invalid argument'
sendto(0x5,0x87c0800,0x1f,0x0,0x81f84c0,0x10)	 ERR#22 'Invalid argument'
sendto(0x5,0x87c0800,0x1f,0x0,0x81f84dc,0x10)	 ERR#22 'Invalid argument'

2001/04/12 08:03:26| comm_udp_sendto: FD 5, 212.182.115.2, port 53: (22) Invalid argument
2001/04/12 08:03:26| idnsSendQuery: FD 5: sendto: (22) Invalid argument
Comment 1 cyril 2001-05-08 15:03:51 UTC
Problem has been solved.

*** in_pcb.c.orig       Tue Mar 13 01:10:51 2001
--- in_pcb.c    Tue May  8 17:00:21 2001
***************
*** 485,499 ****
        struct sockaddr_in sa;
        int error;

-       if (inp->inp_laddr.s_addr == INADDR_ANY && p->p_prison != NULL) {
-               bzero(&sa, sizeof (sa));
-               sa.sin_addr.s_addr = htonl(p->p_prison->pr_ip);
-               sa.sin_len=sizeof (sa);
-               sa.sin_family = AF_INET;
-               error = in_pcbbind(inp, (struct sockaddr *)&sa, p);
-               if (error)
-                       return (error);
-       }
        /*
         *   Call inner routine, to assign local interface address.
         */
--- 485,490 ----
***************
*** 507,513 ****
        }
        if (inp->inp_laddr.s_addr == INADDR_ANY) {
                if (inp->inp_lport == 0) {
!                       error = in_pcbbind(inp, (struct sockaddr *)0, p);
                        if (error)
                            return (error);
                }
--- 498,509 ----
        }
        if (inp->inp_laddr.s_addr == INADDR_ANY) {
                if (inp->inp_lport == 0) {
!                       bzero(&sa, sizeof (sa));
!                       if (p->p_prison )
!                               sa.sin_addr.s_addr =
htonl(p->p_prison->pr_ip);
!                       sa.sin_len = sizeof (sa);
!                       sa.sin_family = AF_INET;
!                       error = in_pcbbind(inp, (struct sockaddr *)&sa, p);
                        if (error)
                            return (error);
Comment 2 cyril 2001-05-09 13:35:30 UTC
Sorry, previous patch produces a little performance leak.
Please, attend to this.

*** in_pcb.c.orig       Tue Mar 13 01:10:51 2001
--- in_pcb.c    Wed May  9 16:36:13 2001
***************
*** 485,499 ****
        struct sockaddr_in sa;
        int error;

-       if (inp->inp_laddr.s_addr == INADDR_ANY && p->p_prison != NULL) {
-               bzero(&sa, sizeof (sa));
-               sa.sin_addr.s_addr = htonl(p->p_prison->pr_ip);
-               sa.sin_len=sizeof (sa);
-               sa.sin_family = AF_INET;
-               error = in_pcbbind(inp, (struct sockaddr *)&sa, p);
-               if (error)
-                       return (error);
-       }
        /*
         *   Call inner routine, to assign local interface address.
         */
--- 485,490 ----
***************
*** 507,513 ****
        }
        if (inp->inp_laddr.s_addr == INADDR_ANY) {
                if (inp->inp_lport == 0) {
!                       error = in_pcbbind(inp, (struct sockaddr *)0, p);
                        if (error)
                            return (error);
                }
--- 498,511 ----
        }
        if (inp->inp_laddr.s_addr == INADDR_ANY) {
                if (inp->inp_lport == 0) {
!                       if (p->p_prison ) {
!                               bzero(&sa, sizeof (sa));
!                               sa.sin_addr.s_addr =
htonl(p->p_prison->pr_ip);
!                               sa.sin_len = sizeof (sa);
!                               sa.sin_family = AF_INET;
!                               error = in_pcbbind(inp, (struct sockaddr
*)&sa, p);
!                       } else
!                               error = in_pcbbind(inp, (struct sockaddr
*)0, p);
                        if (error)
                            return (error);
                }
Comment 3 Przemyslaw Frasunek 2002-03-05 15:46:39 UTC
This problem still persists on 4.5-STABLE. When patch from audit-trail (sent
almost year ago) will be commited?

This works for me on recent 4.5-STABLE:

--- /disc1/jail2/home/venglin/in_pcb.c  Tue Mar  5 16:36:17 2002
+++ in_pcb.c    Tue Mar  5 16:24:35 2002
@@ -499,7 +499,7 @@
        struct sockaddr_in *sin = (struct sockaddr_in *)nam;
        struct sockaddr_in sa;
        int error;
-
+/*
        if (inp->inp_laddr.s_addr == INADDR_ANY && p->p_prison != NULL) {
                bzero(&sa, sizeof (sa));
                sa.sin_addr.s_addr = htonl(p->p_prison->pr_ip);
@@ -509,6 +509,7 @@
                if (error)
                        return (error);
        }
+*/
        /*
         *   Call inner routine, to assign local interface address.
         */
@@ -522,9 +523,16 @@
        }
        if (inp->inp_laddr.s_addr == INADDR_ANY) {
                if (inp->inp_lport == 0) {
-                       error = in_pcbbind(inp, (struct sockaddr *)0, p);
         */
@@ -522,9 +523,16 @@
        }
        if (inp->inp_laddr.s_addr == INADDR_ANY) {
                if (inp->inp_lport == 0) {
-                       error = in_pcbbind(inp, (struct sockaddr *)0, p);
-                       if (error)
-                           return (error);
+                               if (p->p_prison ) {
+                                       bzero(&sa, sizeof (sa));
+                                       sa.sin_addr.s_addr = htonl(p->p_prison->pr_ip);
+                                       sa.sin_len = sizeof (sa);
+                                       sa.sin_family = AF_INET;
+                                       error = in_pcbbind(inp, (struct sockaddr *)&sa, p);
+                               } else
+                                       error = in_pcbbind(inp, (struct sockaddr *)0, p);
+                               if (error)
+                                       return (error);
                }
                inp->inp_laddr = ifaddr->sin_addr;
        }

-- 
* Fido: 2:480/124 ** WWW: http://www.frasunek.com/ ** NIC-HDL: PMF9-RIPE *
* Inet: przemyslaw@frasunek.com ** PGP: D48684904685DF43EA93AFA13BE170BF *
Comment 4 Brian Feldman freebsd_committer freebsd_triage 2002-06-20 18:21:41 UTC
Responsible Changed
From-To: freebsd-bugs->phk

This looks to be correct, but I'll give phk final review for deweirding 
this bug, since he is responsible for jail.
Comment 5 Lamont Granquist 2003-01-05 23:41:32 UTC
I've got a suggested two line patch for this here:

http://docs.freebsd.org/cgi/getmsg.cgi?fetch=75861+0+archive/2002/freebsd-hacke$

There's also a discusion of the root cause of the problem here:

http://docs.freebsd.org/cgi/getmsg.cgi?fetch=79811+0+archive/2002/freebsd-hacke$

I keep having people e-mailing me about this PR fairly frequently and 
the people experiencing the problems have been having success with my 
patch.
Comment 6 Oliver Eikemeier 2003-04-28 14:45:19 UTC
Just a reminder:

This bug is still not fixed in 4.8-STABLE. As a consequence port
irc/ircd-hybrid does not work properly in a jail, see the discussion
in thread "jail bug with ircd-hybrid in_pcbconnect()?" on freebsd-hackers:
<http://groups.google.com/groups?th=4298e8dddbdc169a>

The proposed patch from Lamont Granquist works for me and is in message
"UDP jail bug patch (was Re: (PATCH) Re: jail bug with ircd-hybrid in_pcbconnect()?)"
in freebsd-stable and freebsd-hackers:
<http://www.freebsd.org/cgi/getmsg.cgi?fetch=75861+78220+/usr/local/www/db/text/2002/freebsd-hackers/20020331.freebsd-hackers>
or
<http://groups.google.com/groups?selm=20020325202752.P5308-100000%40coredump.scriptkiddie.org>

--- in_pcb.c.patch begins here ---
--- sys/netinet/in_pcb.c.orig	Fri Jan 24 06:11:33 2003
+++ sys/netinet/in_pcb.c	Mon Mar 17 12:00:00 2003
@@ -512,6 +512,8 @@
 	int error;

 	if (inp->inp_laddr.s_addr == INADDR_ANY && p->p_prison != NULL) {
+		if (inp->inp_lport != 0)
+			inp->inp_laddr.s_addr = htonl(p->p_prison->pr_ip);
 		bzero(&sa, sizeof (sa));
 		sa.sin_addr.s_addr = htonl(p->p_prison->pr_ip);
 		sa.sin_len=sizeof (sa);
--- in_pcb.c.patch end here ---

Regards
    Oliver
Comment 7 Poul-Henning Kamp freebsd_committer freebsd_triage 2003-07-29 11:29:21 UTC
Responsible Changed
From-To: phk->bugs

I do not have time to work on jail right now, sorry.
Comment 8 Tilman Keskinoz freebsd_committer freebsd_triage 2003-08-04 19:19:14 UTC
Responsible Changed
From-To: bugs->freebsd-bugs

Fix responsible
Comment 9 Lupe Christoph 2003-09-14 14:33:10 UTC
The two-line patch does not work for snmpwalk. It fails on the *second*
invocation of sendto(), with or without the patch:

275   socket(PF_INET, SOCK_DGRAM, IPPROTO_IP) = 6
275   setsockopt(6, SOL_SOCKET, SO_SNDBUF, [131072], 4) = 0
275   setsockopt(6, SOL_SOCKET, SO_RCVBUF, [131072], 4) = 0
275   sendto(6, "0&\2\1\0\4\6public\241\31\2\4NE\335\376\2\1\0\2\1\0000"..., 40, 0, {sa_family=AF_INET, sin_port=htons(161), sin_addr=inet_addr("172.17.0.7")}, 16) = 40   
275   gettimeofday({1063545390, 64920}, NULL) = 0   
275   gettimeofday({1063545390, 65344}, NULL) = 0
275   select(7, [6], NULL, NULL, {0, 999576}) = 1 (in [6])
275   break(0x809b000)                  = 0
275   recvfrom(6, "0\201\200\2\1\0\4\6public\242s\2\4NE\335\376\2\1\0\2\1"..., 65536, 0, {sa_family=AF_INET, sin_port=htons(161), sin_addr=inet_addr("172.17.0.8")}, [16]) = 131
275   fstat(1, {st_mode=S_IFCHR|0620, st_rdev=makedev(5, 0), ...}) = 0
275   ioctl(1, TIOCGETA, {B38400 opost isig icanon echo ...}) = 0
275   write(1, "SNMPv2-MIB::sysDescr.0 = STRING:"..., 121) = 121
275   sendto(6, "0)\2\1\0\4\6public\241\34\2\4NE\335\377\2\1\0\2\1\0000"..., 43, 0, {sa_family=AF_INET, sin_port=htons(161), sin_addr=inet_addr("172.17.0.7")}, 16) = -1 EINVAL (Invalid argument)
275   write(2, "snmpwalk: Failure in sendto (Inv"..., 47) = 47
275   close(6)                          = 0
275   exit(1)                           = ?

This is on 4.8-RELEASE-p4. Przemyslaw Frasunek's patch for 4.5-STABLE
does not apply to 4.8-STABLE, so I can't check if that method works.
It's possible this problem is caused by something else, anyway.
-- 
| lupe@lupe-christoph.de       |           http://www.lupe-christoph.de/ |
| "Violence is the resort of the violent" Lu Tze                         |
| "Thief of Time", Terry Pratchett                                       |
Comment 10 viny 2004-11-26 15:03:37 UTC
I had the same problem on a FreeBSD 5.3-BETA4. An ircd wouldn't resolve
IPs as DNS requests would fail, sendto() returning EINVAL. As available
patches didn't apply to 5.X, I did some search and I eventually found
that it came from a test in src/sys/netinet/in_pcb.c, in function
in_pcbbind_setup(inp, nam, laddrp, lportp, cred) :

if (sin->sin_port != *lportp) {
	/* Don't allow the port to change. */
	if (*lportp != 0)
		return (EINVAL);
	lport = sin->sin_port;
}
/* NB: lport is left as 0 if the port isn't being changed. */

For some reason, *lportp isn't null. By looking a little further, it
seems that in_pcbbind_setup() is called by udp_output(inp, m, addr,
control, td) in src/sys/netinet/udp_usrreq.c.

if (lport == 0) {
	error = EINVAL;
	goto release;
}
error = in_pcbbind_setup(inp, (struct sockaddr *)&src,
    &laddr.s_addr, &lport, td->td_ucred);

So just before the call, there is a test which returns EINVAL if lport
is null. Then in_pcbbind_setup() is called with lport as value, which is
not null (else it would return EINVAL there). As nothing seems to affect
*lportp in in_pcbbind_setup(), *lportp is still not null when the second
test occurs and it returns EINVAL.

By commenting the test in in_pcbbind_setup (diff attached), I was able
to make my ircd work. I didn't see any problems since, but I'm not
really sure I did the best thing.
Comment 11 viny freebsd_committer freebsd_triage 2004-11-26 15:08:58 UTC
I had the same problem on a FreeBSD 5.3-BETA4. An ircd wouldn't resolve
IPs as DNS requests would fail, sendto() returning EINVAL. As available
patches didn't apply to 5.X, I did some search and I eventually found
that it came from a test in src/sys/netinet/in_pcb.c, in function
in_pcbbind_setup(inp, nam, laddrp, lportp, cred) :

if (sin->sin_port != *lportp) {
	/* Don't allow the port to change. */
	if (*lportp != 0)
		return (EINVAL);
	lport = sin->sin_port;
}
/* NB: lport is left as 0 if the port isn't being changed. */

For some reason, *lportp isn't null. By looking a little further, it
seems that in_pcbbind_setup() is called by udp_output(inp, m, addr,
control, td) in src/sys/netinet/udp_usrreq.c.

if (lport == 0) {
	error = EINVAL;
	goto release;
}
error = in_pcbbind_setup(inp, (struct sockaddr *)&src,
    &laddr.s_addr, &lport, td->td_ucred);

So just before the call, there is a test which returns EINVAL if lport
is null. Then in_pcbbind_setup() is called with lport as value, which is
not null (else it would return EINVAL there). As nothing seems to affect
*lportp in in_pcbbind_setup(), *lportp is still not null when the second
test occurs and it returns EINVAL.

By commenting the test in in_pcbbind_setup (diff attached), I was able
to make my ircd work. I didn't see any problems since, but I'm not
really sure I did the best thing.
Comment 12 viny 2004-11-26 15:19:07 UTC
I had the same problem on a FreeBSD 5.3-BETA4. An ircd wouldn't resolve
IPs as DNS requests would fail, sendto() returning EINVAL. As available
patches didn't apply to 5.X, I did some search and I eventually found
that it came from a test in src/sys/netinet/in_pcb.c, in function
in_pcbbind_setup(inp, nam, laddrp, lportp, cred) :

if (sin->sin_port != *lportp) {
	/* Don't allow the port to change. */
	if (*lportp != 0)
		return (EINVAL);
	lport = sin->sin_port;
}
/* NB: lport is left as 0 if the port isn't being changed. */

For some reason, *lportp isn't null. By looking a little further, it
seems that in_pcbbind_setup() is called by udp_output(inp, m, addr,
control, td) in src/sys/netinet/udp_usrreq.c.

if (lport == 0) {
	error = EINVAL;
	goto release;
}
error = in_pcbbind_setup(inp, (struct sockaddr *)&src,
    &laddr.s_addr, &lport, td->td_ucred);

So just before the call, there is a test which returns EINVAL if lport
is null. Then in_pcbbind_setup() is called with lport as value, which is
not null (else it would return EINVAL there). As nothing seems to affect
*lportp in in_pcbbind_setup(), *lportp is still not null when the second
test occurs and it returns EINVAL.

By commenting the test in in_pcbbind_setup (diff attached), I was able
to make my ircd work. I didn't see any problems since, but I'm not
really sure I did the best thing.
Comment 13 Jared Mauch 2005-01-16 03:33:57 UTC
	I'm also seeing this behaviour in FreeBSD 5.3
(EINVAL from within a Jail for SNMP)

	Is anyone working on tracking this down, or should this
just be closed/chalked up to a unfixable bug?

	I can spend some time testing a fix/fixes to this issue..

	- Jared

-- 
Jared Mauch  | pgp key available via finger from jared@puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.
Comment 14 Robert Watson freebsd_committer freebsd_triage 2005-01-16 12:24:48 UTC
Responsible Changed
From-To: freebsd-bugs->rwatson

Take ownership of this bug.
Comment 15 Gleb Smirnoff freebsd_committer freebsd_triage 2005-02-20 21:09:21 UTC
Add this patch to Audit-Trail for public review. Works for me.
Interested parties, please test.

Index: udp_usrreq.c
===================================================================
RCS file: /home/ncvs/src/sys/netinet/udp_usrreq.c,v
retrieving revision 1.171
diff -u -r1.171 udp_usrreq.c
--- udp_usrreq.c	7 Jan 2005 01:45:45 -0000	1.171
+++ udp_usrreq.c	20 Feb 2005 19:39:59 -0000
@@ -801,9 +801,10 @@
 		if (error)
 			goto release;
 
-		/* Commit the local port if newly assigned. */
+		/* Commit the local addr and port if newly assigned. */
 		if (inp->inp_laddr.s_addr == INADDR_ANY &&
 		    inp->inp_lport == 0) {
+			inp->inp_laddr = laddr;
 			inp->inp_lport = lport;
 			if (in_pcbinshash(inp) != 0) {
 				inp->inp_lport = 0;

-- 
Totus tuus, Glebius.
GLEBIUS-RIPN GLEB-RIPE
Comment 16 Gleb Smirnoff freebsd_committer freebsd_triage 2005-02-21 09:18:29 UTC
On Sun, Feb 20, 2005 at 02:30:34PM -0800, Doug White wrote:
D> This patch appears to work.  I don't know if its correct or not, just that
D> the previous behavior stops occuring after the patch is applied :-)

There is a problem with it: if a non-jail multihomed host opens socket,
and uses sendto() to send packets into different directions, this socket
is bound to the interface which was used on first packet. This is incorrect.

This patch allows binding to a particular address only for jail case. I'm
not yet sure, that this solution is the best.

Index: udp_usrreq.c
===================================================================
RCS file: /home/ncvs/src/sys/netinet/udp_usrreq.c,v
retrieving revision 1.171
diff -u -r1.171 udp_usrreq.c
--- udp_usrreq.c	7 Jan 2005 01:45:45 -0000	1.171
+++ udp_usrreq.c	21 Feb 2005 08:14:11 -0000
@@ -804,6 +804,10 @@
 		/* Commit the local port if newly assigned. */
 		if (inp->inp_laddr.s_addr == INADDR_ANY &&
 		    inp->inp_lport == 0) {
+			/* Remember addr if jailed, to prevent
+			 * rebinding */
+			if (jailed(inp->inp_socket->so_cred))
+				inp->inp_laddr = laddr;
 			inp->inp_lport = lport;
 			if (in_pcbinshash(inp) != 0) {
 				inp->inp_lport = 0;
-- 
Totus tuus, Glebius.
GLEBIUS-RIPN GLEB-RIPE
Comment 17 Jared Mauch 2005-02-21 20:55:18 UTC
On Mon, Feb 21, 2005 at 12:18:29PM +0300, Gleb Smirnoff wrote:
> On Sun, Feb 20, 2005 at 02:30:34PM -0800, Doug White wrote:
> D> This patch appears to work.  I don't know if its correct or not, just that
> D> the previous behavior stops occuring after the patch is applied :-)
> 
> There is a problem with it: if a non-jail multihomed host opens socket,
> and uses sendto() to send packets into different directions, this socket
> is bound to the interface which was used on first packet. This is incorrect.
> 
> This patch allows binding to a particular address only for jail case. I'm
> not yet sure, that this solution is the best.

	Patch seems to work in some quick testing here.

	I'll do some longer lived tests shortly.

	- jared

-- 
Jared Mauch  | pgp key available via finger from jared@puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.
Comment 18 Gleb Smirnoff freebsd_committer freebsd_triage 2005-02-22 07:56:28 UTC
State Changed
From-To: open->patched

Fixed in HEAD. 


Comment 19 Gleb Smirnoff freebsd_committer freebsd_triage 2005-02-22 07:56:28 UTC
Responsible Changed
From-To: rwatson->glebius

Blame me if any problems.
Comment 20 Jared Mauch 2005-02-22 16:02:38 UTC
On Mon, Feb 21, 2005 at 03:55:18PM -0500, Jared Mauch wrote:
> On Mon, Feb 21, 2005 at 12:18:29PM +0300, Gleb Smirnoff wrote:
> > On Sun, Feb 20, 2005 at 02:30:34PM -0800, Doug White wrote:
> > D> This patch appears to work.  I don't know if its correct or not, just that
> > D> the previous behavior stops occuring after the patch is applied :-)
> > 
> > There is a problem with it: if a non-jail multihomed host opens socket,
> > and uses sendto() to send packets into different directions, this socket
> > is bound to the interface which was used on first packet. This is incorrect.
> > 
> > This patch allows binding to a particular address only for jail case. I'm
> > not yet sure, that this solution is the best.

	Hopefully this won't cause too many issues in gnats (as
the bug got flagged as patched), but i've had no problems after many hours.

	This seems to be working nicely for my jailed host, including
the ability to do large udp transactions (snmpbulkwalk).

	Please let me know if you'd like me to perform any
specific tests on my system, otherwise I do appreciate the effort in
resolving this bug!

	- Jared

-- 
Jared Mauch  | pgp key available via finger from jared@puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.
Comment 21 Gleb Smirnoff freebsd_committer freebsd_triage 2005-03-13 16:04:42 UTC
State Changed
From-To: patched->closed

Fix merged to RELENG_5 and will go into 5.4-RELEASE