From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: passt.top; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: passt.top; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=iclYl/jX; dkim-atps=neutral Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by passt.top (Postfix) with ESMTPS id F126A5A0271 for ; Wed, 29 Jan 2025 08:04:42 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1738134282; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=gHOGUUft6TLxHN910o5/LWQjRCUs4pPQFsUR5MrB2f0=; b=iclYl/jXZtoLPN/7JmLCMYdt7k0A5lDgwDiY+Rf5mntZ6gWByP1AjAV+pCZ8lkVyhDyIE1 sCDRjPHkMeVwb46x2x/lTy1zLERH5dWfrDjw5Y6rTrCUCK9T0Mj7b+6sRJEVdvtj7HbjLi k4nr4WcbJl8jZvsxmAj9+IvIForaR34= Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-691-s7G9SxIuMOmtCjvFy-0TRA-1; Wed, 29 Jan 2025 02:04:40 -0500 X-MC-Unique: s7G9SxIuMOmtCjvFy-0TRA-1 X-Mimecast-MFC-AGG-ID: s7G9SxIuMOmtCjvFy-0TRA Received: by mail-wm1-f71.google.com with SMTP id 5b1f17b1804b1-4362b9c15d8so31172045e9.3 for ; Tue, 28 Jan 2025 23:04:40 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1738134279; x=1738739079; h=content-transfer-encoding:mime-version:organization:references :in-reply-to:message-id:subject:cc:to:from:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=gHOGUUft6TLxHN910o5/LWQjRCUs4pPQFsUR5MrB2f0=; b=OwLYYGI8kk/D6ATruC+srkKYGzr/AdJWm0ok/N8dKOa5cLXAtyKh6+14WGkYUYLm1i /1wuIxaq9Ab270Ae1QR+Wo3JfXHiLij/EmVzF5dmFygZl6nQ9xFVUVueU3n7PJThCIbs Jn4+/A8mp+c5mkTQkU/upRSo7sGHyYIePovmqIR/7jSi0pl0VEIQFJ4fowOxTxeC5FNu 1GZFdzuUxLleUwff8cGE7v25vvSNxlE6aDirjaVx9AQDYTjzzNLZE5fwn49mgqvIXR40 AsitEZlSZNEXr1r2FW9+b8G5MkjxIqtJHI95UXKqgW2SPf9J8S4aXdEFdXqf7ierYbES ++KQ== X-Gm-Message-State: AOJu0Yz9VxcZtaE3uspWn7ivUStS48bZIZziCYTJaGlm5Z1Tc2VkYak9 c2pQcOjF9ZzdewlgtGt42cP5X4MPD8WLH5zsgrnaeWqhWdEXbxIGRC9B0ha1oN+aDKKIDEUK0oA 1mTZiOYXudc7nxSUcAP8S9EpfMwyyzZi3Kbb1TW4fRko8eD2Tdg== X-Gm-Gg: ASbGncs29AmTHo5aH0jQkS9fTkHnl3dXxBYcW4+seWbIQTV4jXP9TDxgajuMOfPrqMs zeampcCyc93vpTTtyU1BygCrBfr+cxnXSN9TORqTayYwpyxfyjrWX6MkBGvqrqNKvKgj4RQklE3 ie4wr0jGyGO5SlUdOpYjeA0jVsW2YwLjT3TiI2LCHXXZ+Wbvr/GKDy8wKplEt0lZg759JX/zPf/ vlYyGan6qzMuSgsvkiBBG/kS/x6EXVs7WXF72HcoHDttN8MfOiM03a2q2xytlnqS9k0wlRx/O39 u5/tKtvPb12i3lSdHlYq6w1dnVTnfZ8xhg== X-Received: by 2002:a05:600c:3511:b0:434:f3a1:b214 with SMTP id 5b1f17b1804b1-438dc41ef52mr11020975e9.28.1738134278822; Tue, 28 Jan 2025 23:04:38 -0800 (PST) X-Google-Smtp-Source: AGHT+IHu4CDJ5P1a2RhAues8jyNapNgCyPOMJZt2ZhCShsep7rOHHUuZ6wAGfu9UHtb2MGVArS4VIQ== X-Received: by 2002:a05:600c:3511:b0:434:f3a1:b214 with SMTP id 5b1f17b1804b1-438dc41ef52mr11020735e9.28.1738134278385; Tue, 28 Jan 2025 23:04:38 -0800 (PST) Received: from maya.myfinge.rs (ifcgrfdd.trafficplex.cloud. [176.103.220.4]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-438dcc11ae6sm11837395e9.6.2025.01.28.23.04.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Jan 2025 23:04:37 -0800 (PST) Date: Wed, 29 Jan 2025 08:04:28 +0100 From: Stefano Brivio To: David Gibson Subject: Re: [PATCH 7/7] Introduce passt-repair Message-ID: <20250129080428.472744aa@elisabeth> In-Reply-To: References: <20250127231532.672363-1-sbrivio@redhat.com> <20250127231532.672363-8-sbrivio@redhat.com> <20250128075131.268f85d1@elisabeth> Organization: Red Hat X-Mailer: Claws Mail 4.2.0 (GTK 3.24.41; x86_64-pc-linux-gnu) MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: F3Jzk6tZNLIxqb3hZ_nX1CnOGlYGg1mDZmFzt2eat3Q_1738134279 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Message-ID-Hash: PCWVDD7SZSGI6P2BOTGBAJPZDA35SPWB X-Message-ID-Hash: PCWVDD7SZSGI6P2BOTGBAJPZDA35SPWB X-MailFrom: sbrivio@redhat.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: passt-dev@passt.top, Laurent Vivier X-Mailman-Version: 3.3.8 Precedence: list List-Id: Development discussion and patches for passt Archived-At: Archived-At: List-Archive: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: On Wed, 29 Jan 2025 12:29:27 +1100 David Gibson wrote: > On Tue, Jan 28, 2025 at 07:51:31AM +0100, Stefano Brivio wrote: > > On Tue, 28 Jan 2025 12:51:59 +1100 > > David Gibson wrote: > > > > > On Tue, Jan 28, 2025 at 12:15:32AM +0100, Stefano Brivio wrote: > > > > A privileged helper to set/clear TCP_REPAIR on sockets on behalf of > > > > passt. Not used yet. > > > > > > > > Signed-off-by: Stefano Brivio > > > > --- > > > > Makefile | 10 +++-- > > > > passt-repair.c | 111 +++++++++++++++++++++++++++++++++++++++++++++++++ > > > > 2 files changed, 118 insertions(+), 3 deletions(-) > > > > create mode 100644 passt-repair.c > > > > > > > > diff --git a/Makefile b/Makefile > > > > index 1383875..1b71cb0 100644 > > > > --- a/Makefile > > > > +++ b/Makefile > > > > @@ -42,7 +42,8 @@ PASST_SRCS = arch.c arp.c checksum.c conf.c dhcp.c dhcpv6.c flow.c fwd.c \ > > > > tcp.c tcp_buf.c tcp_splice.c tcp_vu.c udp.c udp_flow.c udp_vu.c util.c \ > > > > vhost_user.c virtio.c vu_common.c > > > > QRAP_SRCS = qrap.c > > > > -SRCS = $(PASST_SRCS) $(QRAP_SRCS) > > > > +PASST_REPAIR_SRCS = passt-repair.c > > > > +SRCS = $(PASST_SRCS) $(QRAP_SRCS) $(PASST_REPAIR_SRCS) > > > > > > > > MANPAGES = passt.1 pasta.1 qrap.1 > > > > > > > > @@ -72,9 +73,9 @@ mandir ?= $(datarootdir)/man > > > > man1dir ?= $(mandir)/man1 > > > > > > > > ifeq ($(TARGET_ARCH),x86_64) > > > > -BIN := passt passt.avx2 pasta pasta.avx2 qrap > > > > +BIN := passt passt.avx2 pasta pasta.avx2 qrap passt-repair > > > > else > > > > -BIN := passt pasta qrap > > > > +BIN := passt pasta qrap passt-repair > > > > endif > > > > > > > > all: $(BIN) $(MANPAGES) docs > > > > @@ -101,6 +102,9 @@ pasta.avx2 pasta.1 pasta: pasta%: passt% > > > > qrap: $(QRAP_SRCS) passt.h > > > > $(CC) $(FLAGS) $(CFLAGS) $(CPPFLAGS) -DARCH=\"$(TARGET_ARCH)\" $(QRAP_SRCS) -o qrap $(LDFLAGS) > > > > > > > > +passt-repair: $(PASST_REPAIR_SRCS) > > > > + $(CC) $(FLAGS) $(CFLAGS) $(CPPFLAGS) $(PASST_REPAIR_SRCS) -o passt-repair $(LDFLAGS) > > > > + > > > > valgrind: EXTRA_SYSCALLS += rt_sigprocmask rt_sigtimedwait rt_sigaction \ > > > > rt_sigreturn getpid gettid kill clock_gettime mmap \ > > > > mmap2 munmap open unlink gettimeofday futex statx \ > > > > diff --git a/passt-repair.c b/passt-repair.c > > > > new file mode 100644 > > > > index 0000000..e9b9609 > > > > --- /dev/null > > > > +++ b/passt-repair.c > > > > @@ -0,0 +1,111 @@ > > > > +// SPDX-License-Identifier: GPL-2.0-or-later > > > > + > > > > +/* PASST - Plug A Simple Socket Transport > > > > + * for qemu/UNIX domain socket mode > > > > + * > > > > + * passt-repair.c - Privileged helper to set/clear TCP_REPAIR on sockets > > > > + * > > > > + * Copyright (c) 2025 Red Hat GmbH > > > > + * Author: Stefano Brivio > > > > + * > > > > + * Connect to passt via UNIX domain socket, receive sockets via SCM_RIGHTS along > > > > + * with commands mapping to TCP_REPAIR values, and switch repair mode on or > > > > + * off. Reply by echoing the command. Exit if the command is INT_MAX. > > > > + */ > > > > + > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > +#include > > > > + > > > > +#include > > > > + > > > > +#define SCM_MAX_FD 253 /* From Linux kernel (include/net/scm.h), not in UAPI */ > > > > + > > > > +int main(int argc, char **argv) > > > > +{ > > > > + char buf[CMSG_SPACE(sizeof(int) * SCM_MAX_FD)] > > > > + __attribute__ ((aligned(__alignof__(struct cmsghdr)))); > > > > + struct sockaddr_un a = { AF_UNIX, "" }; > > > > + int cmd, fds[SCM_MAX_FD], s, ret, i; > > > > + struct cmsghdr *cmsg; > > > > + struct msghdr msg; > > > > + struct iovec iov; > > > > + > > > > + iov = (struct iovec){ &cmd, sizeof(cmd) }; > > > > > > I mean, local to local, it's *probably* fine, but still a network > > > protocol not defined in terms of explicit width fields makes me > > > nervous. I'd prefer to see the cmd being a packed structure with > > > fixed width elements. > > > > It actually is, because: > > > > struct { > > int cmd; > > }; > > > > is a packet structure with fixed width elements. Any architecture we > > build for (at least the ones I'm aware of) has a 32-bit int. We can > > make it uint32_t if it makes you feel better. > > Sorry, I should have said "*explicitly* fixed width fields". So, yes, > uint32_t would make me feel better :) Changed to int8_t anyway meanwhile. We don't need all those bits. > > > I also think we should do some sort of basic magic / version exchange. > > > I don't see any reason we'd need to extend the protocol, but I'd > > > rather have the option if we have to. > > > > passt-repair will be packaged and distributed together with passt, > > though. Versions must match. > > But nothing enforces that. Distribution packages. If I run claws-mail with the wrong version of, say, libpixman, it won't start. If you don't use them, you're on your own. > AIUI KubeVirt will be running passt-repair > in a different context. Which means it may well be deployed by a > different path than the passt binary No, that's not the way it works. It needs to match, in the sense that 1. it's a KubeVirt requirement to have compatible packages between distribution and the "base container image" and 2. this would most likely be sourced from the "base container image" anyway. I maintain the packages for four distributions, plus AppArmor and SELinux policies upstream and downstream, and I take care of updating the package in KubeVirt as well, so I guess I have a vague idea of what's convenient, enforced, burdensome, and so on. > which means however we > distribute it's quite plausible that a downstream screwup could > mismatch the versions. We should endeavour to have a reasonably > graceful failure mode for that. Regardless of this, I think that *this one* is an interface (I wouldn't even call it a protocol) that needs to be set in stone, except for hypothetical (and highly unlikely) UAPI additions which we'll be anyway able to accommodate for easily. It's a single socket option with three possible values (for 13 years now), of which we plan to use two. If we want this interface to do anything else, it should be another interface. So there's really no problem with this. Besides, the helper runs with CAP_NET_ADMIN (even though CAP_NET_RAW should ideally suffice), so it needs to be extremely simple and auditable. > > And latency here might matter more than in > > the rest of the migration process. > > > > Plus checking a magic number > > > should make things less damaging and more debuggable if you were to > > > point the repair helper at an entirely unrelated unix socket instead > > > of passt's repair socket. > > > > Maybe, yes, even though I don't really see good chances for that > > mistake to happen. Feel free to post a proposal, of course. > > I disagree on the good chances for a mistake thing. In GSS I saw > plenty of occasions where things that shouldn't be mismatched were due > to some packaging or user screwup. And that's before even considering > the way that KubeVirt deploys its various pieces seems to provide a > number of opportunities to mess this up. > > So, I'll see what I can come up with. I'm fine with requiring > matching versions if it's actually checked. Maybe a magic derived > from our git hash, or even our build-id. Both would make things significantly less usable, because they would make different but compatible builds incompatible, and different implementations rather inconvenient. For example, it might be a practical solution to have a Go implementation of this in KubeVirt's virt-handler itself, but if it needs to extract information or strings from the binary, that becomes impractical. -- Stefano