* [PATCH] pasta: make it possible to disable socket splicing @ 2024-11-29 0:45 Jon Maloy 2024-11-29 1:21 ` Jon Maloy 2024-11-29 2:48 ` David Gibson 0 siblings, 2 replies; 4+ messages in thread From: Jon Maloy @ 2024-11-29 0:45 UTC (permalink / raw) To: passt-dev, sbrivio, lvivier, dgibson, jmaloy During testing it is sometimes useful to force traffic which would normally be forwarded by socket splicing through the tap interface. In this commit, we add a command switch making it possible to disable splicing for inbound local traffic. For outbound local traffic this seems to be much trickier, so I leave that for a possible later commit. Suggested-by: David Gibson <dgibson@redhat.com> Signed-off-by: Jon Maloy <jmaloy@redhat.com> --- conf.c | 5 +++++ fwd.c | 2 +- passt.h | 1 + 3 files changed, 7 insertions(+), 1 deletion(-) diff --git a/conf.c b/conf.c index eaa7d99..8d58652 100644 --- a/conf.c +++ b/conf.c @@ -890,6 +890,7 @@ static void usage(const char *name, FILE *f, int status) " --no-ndp Disable NDP responses\n" " --no-dhcpv6 Disable DHCPv6 server\n" " --no-ra Disable router advertisements\n" + " --no-splice Disable outbound socket splicing\n" " --freebind Bind to any address for forwarding\n" " --no-map-gw Don't map gateway address to host\n" " -4, --ipv4-only Enable IPv4 operation only\n" @@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv) {"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 }, {"no-ndp", no_argument, &c->no_ndp, 1 }, {"no-ra", no_argument, &c->no_ra, 1 }, + {"no-splice", no_argument, &c->no_splice, 1 }, {"freebind", no_argument, &c->freebind, 1 }, {"no-map-gw", no_argument, &no_map_gw, 1 }, {"ipv4-only", no_argument, NULL, '4' }, @@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv) } } while (name != -1); + if (c->mode == MODE_PASST) + c->no_splice = 1; + if (c->mode == MODE_PASTA && !c->pasta_conf_ns) { if (copy_routes_opt) die("--no-copy-routes needs --config-net"); diff --git a/fwd.c b/fwd.c index 0b7f8b1..2829cd2 100644 --- a/fwd.c +++ b/fwd.c @@ -443,7 +443,7 @@ uint8_t fwd_nat_from_host(const struct ctx *c, uint8_t proto, else if (proto == IPPROTO_UDP) tgt->eport += c->udp.fwd_in.delta[tgt->eport]; - if (c->mode == MODE_PASTA && inany_is_loopback(&ini->eaddr) && + if (!c->no_splice && inany_is_loopback(&ini->eaddr) && (proto == IPPROTO_TCP || proto == IPPROTO_UDP)) { /* spliceable */ diff --git a/passt.h b/passt.h index c038630..0271e7c 100644 --- a/passt.h +++ b/passt.h @@ -291,6 +291,7 @@ struct ctx { int no_dhcpv6; int no_ndp; int no_ra; + int no_splice; int host_lo_to_ns_lo; int freebind; -- @@ -291,6 +291,7 @@ struct ctx { int no_dhcpv6; int no_ndp; int no_ra; + int no_splice; int host_lo_to_ns_lo; int freebind; -- 2.45.2 ^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] pasta: make it possible to disable socket splicing 2024-11-29 0:45 [PATCH] pasta: make it possible to disable socket splicing Jon Maloy @ 2024-11-29 1:21 ` Jon Maloy 2024-11-29 3:33 ` David Gibson 2024-11-29 2:48 ` David Gibson 1 sibling, 1 reply; 4+ messages in thread From: Jon Maloy @ 2024-11-29 1:21 UTC (permalink / raw) To: passt-dev, sbrivio, lvivier, dgibson On 2024-11-28 19:45, Jon Maloy wrote: > During testing it is sometimes useful to force traffic which would > normally be forwarded by socket splicing through the tap interface. > > In this commit, we add a command switch making it possible to disable > splicing for inbound local traffic. > > For outbound local traffic this seems to be much trickier, so I leave > that for a possible later commit. I am looking for more input here. David suggested that I simply don't re-bind any sockets inwards towards the local namespace, so that all outbound traffic would use the default route and be forced to go via the tap interface. I tried this, and realized it won't work. Outgoing traffic using INADDR_ANY or loopback address will never be routed via the default route; if it doesn't find the destination port in the local name space it will simply return with 'connection refused'. There is no nice way to force such traffic via the default route, as far as I understand. I am even questioning if it is necessary: If the port is bound on the host, the client only needs to use some of the non-loopback addresses on the host to reach it via the tap interface. ///jon > > Suggested-by: David Gibson <dgibson@redhat.com> > Signed-off-by: Jon Maloy <jmaloy@redhat.com> > --- > conf.c | 5 +++++ > fwd.c | 2 +- > passt.h | 1 + > 3 files changed, 7 insertions(+), 1 deletion(-) > > diff --git a/conf.c b/conf.c > index eaa7d99..8d58652 100644 > --- a/conf.c > +++ b/conf.c > @@ -890,6 +890,7 @@ static void usage(const char *name, FILE *f, int status) > " --no-ndp Disable NDP responses\n" > " --no-dhcpv6 Disable DHCPv6 server\n" > " --no-ra Disable router advertisements\n" > + " --no-splice Disable outbound socket splicing\n" > " --freebind Bind to any address for forwarding\n" > " --no-map-gw Don't map gateway address to host\n" > " -4, --ipv4-only Enable IPv4 operation only\n" > @@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv) > {"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 }, > {"no-ndp", no_argument, &c->no_ndp, 1 }, > {"no-ra", no_argument, &c->no_ra, 1 }, > + {"no-splice", no_argument, &c->no_splice, 1 }, > {"freebind", no_argument, &c->freebind, 1 }, > {"no-map-gw", no_argument, &no_map_gw, 1 }, > {"ipv4-only", no_argument, NULL, '4' }, > @@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv) > } > } while (name != -1); > > + if (c->mode == MODE_PASST) > + c->no_splice = 1; > + > if (c->mode == MODE_PASTA && !c->pasta_conf_ns) { > if (copy_routes_opt) > die("--no-copy-routes needs --config-net"); > diff --git a/fwd.c b/fwd.c > index 0b7f8b1..2829cd2 100644 > --- a/fwd.c > +++ b/fwd.c > @@ -443,7 +443,7 @@ uint8_t fwd_nat_from_host(const struct ctx *c, uint8_t proto, > else if (proto == IPPROTO_UDP) > tgt->eport += c->udp.fwd_in.delta[tgt->eport]; > > - if (c->mode == MODE_PASTA && inany_is_loopback(&ini->eaddr) && > + if (!c->no_splice && inany_is_loopback(&ini->eaddr) && > (proto == IPPROTO_TCP || proto == IPPROTO_UDP)) { > /* spliceable */ > > diff --git a/passt.h b/passt.h > index c038630..0271e7c 100644 > --- a/passt.h > +++ b/passt.h > @@ -291,6 +291,7 @@ struct ctx { > int no_dhcpv6; > int no_ndp; > int no_ra; > + int no_splice; > int host_lo_to_ns_lo; > int freebind; > ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] pasta: make it possible to disable socket splicing 2024-11-29 1:21 ` Jon Maloy @ 2024-11-29 3:33 ` David Gibson 0 siblings, 0 replies; 4+ messages in thread From: David Gibson @ 2024-11-29 3:33 UTC (permalink / raw) To: Jon Maloy; +Cc: passt-dev, sbrivio, lvivier, dgibson [-- Attachment #1: Type: text/plain, Size: 4780 bytes --] On Thu, Nov 28, 2024 at 08:21:23PM -0500, Jon Maloy wrote: > > > On 2024-11-28 19:45, Jon Maloy wrote: > > During testing it is sometimes useful to force traffic which would > > normally be forwarded by socket splicing through the tap interface. > > > > In this commit, we add a command switch making it possible to disable > > splicing for inbound local traffic. > > > > For outbound local traffic this seems to be much trickier, so I leave > > that for a possible later commit. > I am looking for more input here. > > David suggested that I simply don't re-bind any sockets inwards towards > the local namespace, so that all outbound traffic would use the default > route and be forced to go via the tap interface. > > I tried this, and realized it won't work. Outgoing traffic using INADDR_ANY > or loopback address will never be routed via the default route; if it > doesn't > find the destination port in the local name space it will simply return with > 'connection refused'. There is no nice way to force such traffic via the > default > route, as far as I understand. Right. I think the confusion here is because splicing kind of does two things. First, it takes some cases that would work with tap, but optimises them. Second it makes some cases possible that aren't possible with just the tap interface: specifically redirecting guest side traffic with destination 0.0.0.0 or 127.0.0.1/8. I've been assuming that a --no-splice option would disable both cases. So traffic that *can* be redirected via tap instead would be, but things that are only possible with splice would just be disallowed. The latter has the arguable advantage that it eliminates the (small) network behavioural differences between pasta and passt mode. > I am even questioning if it is necessary: If the port is bound on the host, > the client only needs to use some of the non-loopback addresses on the > host to reach it via the tap interface. Right. In fact with both --no-splice as per your draft, and no -T and -U options, I don't think any use of splice is possible. We could maybe put a test in fwd_nat_from_splice() to check. > > ///jon > > > > Suggested-by: David Gibson <dgibson@redhat.com> > > Signed-off-by: Jon Maloy <jmaloy@redhat.com> > > --- > > conf.c | 5 +++++ > > fwd.c | 2 +- > > passt.h | 1 + > > 3 files changed, 7 insertions(+), 1 deletion(-) > > > > diff --git a/conf.c b/conf.c > > index eaa7d99..8d58652 100644 > > --- a/conf.c > > +++ b/conf.c > > @@ -890,6 +890,7 @@ static void usage(const char *name, FILE *f, int status) > > " --no-ndp Disable NDP responses\n" > > " --no-dhcpv6 Disable DHCPv6 server\n" > > " --no-ra Disable router advertisements\n" > > + " --no-splice Disable outbound socket splicing\n" > > " --freebind Bind to any address for forwarding\n" > > " --no-map-gw Don't map gateway address to host\n" > > " -4, --ipv4-only Enable IPv4 operation only\n" > > @@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv) > > {"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 }, > > {"no-ndp", no_argument, &c->no_ndp, 1 }, > > {"no-ra", no_argument, &c->no_ra, 1 }, > > + {"no-splice", no_argument, &c->no_splice, 1 }, > > {"freebind", no_argument, &c->freebind, 1 }, > > {"no-map-gw", no_argument, &no_map_gw, 1 }, > > {"ipv4-only", no_argument, NULL, '4' }, > > @@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv) > > } > > } while (name != -1); > > + if (c->mode == MODE_PASST) > > + c->no_splice = 1; > > + > > if (c->mode == MODE_PASTA && !c->pasta_conf_ns) { > > if (copy_routes_opt) > > die("--no-copy-routes needs --config-net"); > > diff --git a/fwd.c b/fwd.c > > index 0b7f8b1..2829cd2 100644 > > --- a/fwd.c > > +++ b/fwd.c > > @@ -443,7 +443,7 @@ uint8_t fwd_nat_from_host(const struct ctx *c, uint8_t proto, > > else if (proto == IPPROTO_UDP) > > tgt->eport += c->udp.fwd_in.delta[tgt->eport]; > > - if (c->mode == MODE_PASTA && inany_is_loopback(&ini->eaddr) && > > + if (!c->no_splice && inany_is_loopback(&ini->eaddr) && > > (proto == IPPROTO_TCP || proto == IPPROTO_UDP)) { > > /* spliceable */ > > diff --git a/passt.h b/passt.h > > index c038630..0271e7c 100644 > > --- a/passt.h > > +++ b/passt.h > > @@ -291,6 +291,7 @@ struct ctx { > > int no_dhcpv6; > > int no_ndp; > > int no_ra; > > + int no_splice; > > int host_lo_to_ns_lo; > > int freebind; > -- David Gibson (he or they) | I'll have my music baroque, and my code david AT gibson.dropbear.id.au | minimalist, thank you, not the other way | around. http://www.ozlabs.org/~dgibson [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] pasta: make it possible to disable socket splicing 2024-11-29 0:45 [PATCH] pasta: make it possible to disable socket splicing Jon Maloy 2024-11-29 1:21 ` Jon Maloy @ 2024-11-29 2:48 ` David Gibson 1 sibling, 0 replies; 4+ messages in thread From: David Gibson @ 2024-11-29 2:48 UTC (permalink / raw) To: Jon Maloy; +Cc: passt-dev, sbrivio, lvivier, dgibson [-- Attachment #1: Type: text/plain, Size: 3292 bytes --] On Thu, Nov 28, 2024 at 07:45:32PM -0500, Jon Maloy wrote: > During testing it is sometimes useful to force traffic which would > normally be forwarded by socket splicing through the tap interface. > > In this commit, we add a command switch making it possible to disable > splicing for inbound local traffic. > > For outbound local traffic this seems to be much trickier, so I leave > that for a possible later commit. See comments on your other mail. > Suggested-by: David Gibson <dgibson@redhat.com> > Signed-off-by: Jon Maloy <jmaloy@redhat.com> This LGTM, excepting minor details. Arguably it's even enough, since you can effectively disable outbound splicing by not using -T or -U. > --- > conf.c | 5 +++++ > fwd.c | 2 +- > passt.h | 1 + > 3 files changed, 7 insertions(+), 1 deletion(-) > > diff --git a/conf.c b/conf.c > index eaa7d99..8d58652 100644 > --- a/conf.c > +++ b/conf.c > @@ -890,6 +890,7 @@ static void usage(const char *name, FILE *f, int status) > " --no-ndp Disable NDP responses\n" > " --no-dhcpv6 Disable DHCPv6 server\n" > " --no-ra Disable router advertisements\n" > + " --no-splice Disable outbound socket splicing\n" This should be "inbound" not "outbound" yes? For a final version this would need to be added to the manpage as well. I guess unless we wanted to leave it undocumented as an option intended only for developer testing. > " --freebind Bind to any address for forwarding\n" > " --no-map-gw Don't map gateway address to host\n" > " -4, --ipv4-only Enable IPv4 operation only\n" > @@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv) > {"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 }, > {"no-ndp", no_argument, &c->no_ndp, 1 }, > {"no-ra", no_argument, &c->no_ra, 1 }, > + {"no-splice", no_argument, &c->no_splice, 1 }, > {"freebind", no_argument, &c->freebind, 1 }, > {"no-map-gw", no_argument, &no_map_gw, 1 }, > {"ipv4-only", no_argument, NULL, '4' }, > @@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv) > } > } while (name != -1); > > + if (c->mode == MODE_PASST) > + c->no_splice = 1; > + > if (c->mode == MODE_PASTA && !c->pasta_conf_ns) { > if (copy_routes_opt) > die("--no-copy-routes needs --config-net"); > diff --git a/fwd.c b/fwd.c > index 0b7f8b1..2829cd2 100644 > --- a/fwd.c > +++ b/fwd.c > @@ -443,7 +443,7 @@ uint8_t fwd_nat_from_host(const struct ctx *c, uint8_t proto, > else if (proto == IPPROTO_UDP) > tgt->eport += c->udp.fwd_in.delta[tgt->eport]; > > - if (c->mode == MODE_PASTA && inany_is_loopback(&ini->eaddr) && > + if (!c->no_splice && inany_is_loopback(&ini->eaddr) && > (proto == IPPROTO_TCP || proto == IPPROTO_UDP)) { > /* spliceable */ > > diff --git a/passt.h b/passt.h > index c038630..0271e7c 100644 > --- a/passt.h > +++ b/passt.h > @@ -291,6 +291,7 @@ struct ctx { > int no_dhcpv6; > int no_ndp; > int no_ra; > + int no_splice; > int host_lo_to_ns_lo; > int freebind; > -- David Gibson (he or they) | I'll have my music baroque, and my code david AT gibson.dropbear.id.au | minimalist, thank you, not the other way | around. http://www.ozlabs.org/~dgibson [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2024-11-29 3:33 UTC | newest] Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2024-11-29 0:45 [PATCH] pasta: make it possible to disable socket splicing Jon Maloy 2024-11-29 1:21 ` Jon Maloy 2024-11-29 3:33 ` David Gibson 2024-11-29 2:48 ` David Gibson
Code repositories for project(s) associated with this public inbox https://passt.top/passt This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for IMAP folder(s).