public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: Stefano Brivio <sbrivio@redhat.com>
To: Paul Holzinger <pholzing@redhat.com>
Cc: David Gibson <david@gibson.dropbear.id.au>, passt-dev@passt.top
Subject: Re: [PATCH v2] conf: Unify several paths in conf_ports()
Date: Tue, 18 Mar 2025 18:46:03 +0100	[thread overview]
Message-ID: <20250318184603.3b015c08@elisabeth> (raw)
In-Reply-To: <9c80668b-acd9-4cb9-963e-f7411701c8da@redhat.com>

On Tue, 18 Mar 2025 18:15:27 +0100
Paul Holzinger <pholzing@redhat.com> wrote:

> On 18/03/2025 17:54, Stefano Brivio wrote:
> > On Mon, 17 Mar 2025 12:50:36 +0100
> > Paul Holzinger <pholzing@redhat.com> wrote:
> >  
> >> On 15/03/2025 00:50, Stefano Brivio wrote:  
> >>> On Wed, 12 Mar 2025 14:43:59 +1100
> >>> David Gibson <david@gibson.dropbear.id.au> wrote:
> >>>     
> >>>> In conf_ports() we have three different paths which actually do the setup
> >>>> of an individual forwarded port: one for the "all" case, one for the
> >>>> exclusions only case and one for the range of ports with possible
> >>>> exclusions case.
> >>>>
> >>>> We can unify those cases using a new helper which handles a single range
> >>>> of ports, with a bitmap of exclusions.  Although this is slightly longer
> >>>> (largely due to the new helpers function comment), it reduces duplicated
> >>>> logic.  It will also make future improvements to the tracking of port
> >>>> forwards easier.
> >>>>
> >>>> The new conf_ports_range_except() function has a pretty prodigious
> >>>> parameter list, but I still think it's an overall improvement in conceptual
> >>>> complexity.
> >>>>
> >>>> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
> >>>> ---
> >>>>    conf.c | 173 ++++++++++++++++++++++++++++++---------------------------
> >>>>    1 file changed, 90 insertions(+), 83 deletions(-)
> >>>>
> >>>> v2:
> >>>>    * Commit message updated slightly, but otherwise unmodified.
> >>>>
> >>>>
> >>>> diff --git a/conf.c b/conf.c
> >>>> index 065e7201..4e0099ba 100644
> >>>> --- a/conf.c
> >>>> +++ b/conf.c
> >>>> @@ -123,6 +123,75 @@ static int parse_port_range(const char *s, char **endptr,
> >>>>    	return 0;
> >>>>    }
> >>>>    
> >>>> +/**
> >>>> + * conf_ports_range_except() - Set up forwarding for a range of ports minus a
> >>>> + *                             bitmap of exclusions
> >>>> + * @c:		Execution context
> >>>> + * @optname:	Short option name, t, T, u, or U
> >>>> + * @optarg:	Option argument (port specification)
> >>>> + * @fwd:	Pointer to @fwd_ports to be updated
> >>>> + * @addr:	Listening address
> >>>> + * @ifname:	Listening interface
> >>>> + * @first:	First port to forward
> >>>> + * @last:	Last port to forward
> >>>> + * @exclude:	Bitmap of ports to exclude
> >>>> + * @to:		Port to translate @first to when forwarding
> >>>> + * @weak:	Ignore errors, as long as at least one port is mapped
> >>>> + */
> >>>> +static void conf_ports_range_except(const struct ctx *c, char optname,
> >>>> +				    const char *optarg, struct fwd_ports *fwd,
> >>>> +				    const union inany_addr *addr,
> >>>> +				    const char *ifname,
> >>>> +				    uint16_t first, uint16_t last,
> >>>> +				    const uint8_t *exclude, uint16_t to,
> >>>> +				    bool weak)
> >>>> +{
> >>>> +	bool bound_one = false;
> >>>> +	unsigned i;
> >>>> +	int ret;
> >>>> +
> >>>> +	if (first == 0) {
> >>>> +		die("Can't forward port 0 for option '-%c %s'",
> >>>> +		    optname, optarg);
> >>>> +	}  
> >>> This introduces two subtle functional changes that are a bit unexpected
> >>> given the commit message. Before:
> >>>
> >>> $ ./pasta -t 0
> >>> $
> >>>
> >>> $ ./pasta -t 0-1025
> >>> Failed to bind port 1 (Permission denied) for option '-t 0-1025', exiting
> >>>
> >>> After:
> >>>
> >>> $ ./pasta -t 0
> >>> Can't forward port 0 for option '-t 0'
> >>>
> >>> $ ./pasta -t 0-1025
> >>> Can't forward port 0 for option '-t 0-1025'
> >>>
> >>> ...anyway, I doubt anybody would use -t 0 on purpose (to get a port
> >>> automatically assigned), and while it probably works for TCP (check
> >>> bound ports after starting pasta, use the assigned one), it wouldn't
> >>> necessarily work as expected for UDP if the application relies on our
> >>> flow tracking.  
> >> Why would this not work for UDP? bind() wise you can still bind 0 fine
> >> and get a free port assigned?  
> > The bind() part itself would work, but with the current implementation
> > we wouldn't be able to track flows corresponding to this specific port
> > forwarding, so I expect that the "return" (outbound) traffic won't
> > work.
> >
> > It's a matter of implementation (or lack thereof), we could get it to
> > work with a getsockname() after bind().
> >
> > Before this change, it happened to work *by mistake* for TCP, not for
> > UDP. With this change, it doesn't work for TCP. We can add it back with
> > a proper syntax (-t ...any?), as David mentioned.
> >  
> >>> For TCP, actually, -t 0 might be useful, see e.g. random_free_port() in
> >>> Podman tests (/test/system/helpers.network.bash). We should print the
> >>> port number that was bound, though, and document the feature.
> >>>
> >>> More than that: that could actually be the only race-free possibility
> >>> of picking and forwarding a port where the number doesn't matter.  
> >> Yes it could be useful for podman but then it should also work with udp.  
> > We can get it to work if needed. We would need, I guess:
> >
> > - that getsockname() for UDP, whatever is missing for the UDP case
> >
> > - a new configuration sub-option
> >
> > - documentation
> >  
> >> I am less worried about the tests, this issue is in podman proper as you
> >> can do "-p 80", then podman assigns a free host port. Except that this
> >> is super broken in podman because we do this once when we create the
> >> container so this is totally racy and non conflict free[1].  
> > Ouch, I wasn't aware of that. For pasta it should be relatively easy to
> > do that in a race-free way, because the kernel guarantees that.
> >  
> >> The thing of
> >> course is for podman we have to deal with like 4 other port forwarder
> >> implementations that we would need to support. As such I don't see us
> >> ever finding time to properly fix it unless it magically gets a ton of
> >> priority. So if pasta does not support for it I have no problems with
> >> that, however maybe one day we like to reconsider.
> >>
> >> [1]
> >> https://github.com/containers/podman/issues/10205#issuecomment-1010055023  
> > I would wait for David's feedback on this, but to me it looks like a
> > small-ish thing we can add without much thinking and planning.
> >
> > I'm not sure you can close that issue if we implement it in pasta as
> > long as forwarding is done like it's done now for custom networks, but
> > the issue would look less serious I guess.
> >
> > I don't know about the Podman side of it, but probably that would look
> > trivial to you (-t any:80 maybe? or -t :80 ?).  
> 
> I guess something like -t 0:80 could also work. That would allow me to 
> store unassigned ports as 0 and the the convert to pasta cli code would 
> not need any special handling for this case.
> 
> Overall it will be more complicated in Podman which is why I never 
> bothered to take this on. The issue is that commands like podman inspect 
> or podman port need to know the actual ports that were assigned.

Ah, right, I forgot about that.

> So it 
> would need some form of interface from pasta that prints out which host 
> port it uses for each namespace port. Then podman must need to gain 
> support to store two different set of ports, dynamic and static 
> (currently) so we can keep track of the ports pasta returned to us.

That doesn't really sound trivial, I was underestimating this.

> All stuff we can implement but until someone pushes hard for it I don't 
> think it will ever make it. I think there are better network things we 
> can spend our time on.

...so we should rather defer this I guess. Probably it will make sense
to revisit this together with the new forwarding configuration interface
once we have it implemented.

-- 
Stefano


      reply	other threads:[~2025-03-18 17:46 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-03-12  3:43 [PATCH v2] conf: Unify several paths in conf_ports() David Gibson
2025-03-14 23:50 ` Stefano Brivio
2025-03-17  3:04   ` David Gibson
2025-03-17 11:50   ` Paul Holzinger
2025-03-18 16:54     ` Stefano Brivio
2025-03-18 17:15       ` Paul Holzinger
2025-03-18 17:46         ` Stefano Brivio [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250318184603.3b015c08@elisabeth \
    --to=sbrivio@redhat.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=passt-dev@passt.top \
    --cc=pholzing@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).