From: Stefano Brivio <sbrivio@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: Jon Maloy <jmaloy@redhat.com>, dgibson@redhat.com, passt-dev@passt.top
Subject: Re: [PATCH v12 3/9] arp/ndp: send ARP announcement / unsolicited NA when neigbour entry added
Date: Tue, 7 Oct 2025 12:10:22 +0200 [thread overview]
Message-ID: <20251007121022.353a44fc@elisabeth> (raw)
In-Reply-To: <aN9UFH6Bg08KFu68@zatzit>
On Fri, 3 Oct 2025 14:41:56 +1000
David Gibson <david@gibson.dropbear.id.au> wrote:
> On Thu, Oct 02, 2025 at 08:34:06PM -0400, Jon Maloy wrote:
> > ARP announcements and unsolicited NAs should be handled with caution
> > because of the risk of malignant users emitting them to disturb
> > network communication.
> >
> > There is however one case we where we know it is legitimate
> > and safe for us to send out such messages: The one time we switch
> > from using ctx->own_tap_mac to a MAC address received via the
> > recently added neigbour subscription function. Later changes to
> > the MAC address of a host in an existing entry cannot be fully
> > trusted, so we abstain from doing it in such cases.
> >
> > When sending this type of messages, we notice that the guest accepts
> > the update, but shortly later asks for a confirmation in the form of
> > a regular ARP/NS request. This is responded to with the new value,
> > and we have exactly the effect we wanted.
> >
> > This commit adds this functionality.
> >
> > Signed-off-by: Jon Maloy <jmaloy@redhat.com>
> >
> > ---
> > v10: -Made small changes based of feedback from David G.
> > v11: -Moved from 'Gratuitous ARP reply' model to 'ARP Announcement'
> > model.
> > v12: -Excluding loopback and default GW addresses from the ARP/NA
> > announcement to be sent to the guest
> > ---
> > arp.c | 42 ++++++++++++++++++++++++++++++++++++++++++
> > arp.h | 2 ++
> > fwd.c | 16 ++++++++++++++++
> > ndp.c | 10 ++++++++++
> > ndp.h | 1 +
> > 5 files changed, 71 insertions(+)
> >
> > diff --git a/arp.c b/arp.c
> > index ad088b1..b08780f 100644
> > --- a/arp.c
> > +++ b/arp.c
> > @@ -146,3 +146,45 @@ void arp_send_init_req(const struct ctx *c)
> > debug("Sending initial ARP request for guest MAC address");
> > tap_send_single(c, &req, sizeof(req));
> > }
> > +
> > +/**
> > + * arp_announce() - Send an ARP announcement for an IPv4 host
> > + * @c: Execution context
> > + * @ip: IPv4 address we announce as owned by @mac
> > + * @mac: MAC address to advertise for @ip
> > + */
> > +void arp_announce(const struct ctx *c, struct in_addr *ip,
> > + const unsigned char *mac)
> > +{
> > + char ip_str[INET_ADDRSTRLEN];
> > + char mac_str[ETH_ADDRSTRLEN];
> > + struct {
> > + struct ethhdr eh;
> > + struct arphdr ah;
> > + struct arpmsg am;
> > + } __attribute__((__packed__)) annc;
> > +
> > + /* Ethernet header */
> > + annc.eh.h_proto = htons(ETH_P_ARP);
> > + memcpy(annc.eh.h_dest, MAC_BROADCAST, sizeof(annc.eh.h_dest));
> > + memcpy(annc.eh.h_source, mac, sizeof(annc.eh.h_source));
> > +
> > + /* ARP header */
> > + annc.ah.ar_op = htons(ARPOP_REQUEST);
> > + annc.ah.ar_hrd = htons(ARPHRD_ETHER);
> > + annc.ah.ar_pro = htons(ETH_P_IP);
> > + annc.ah.ar_hln = ETH_ALEN;
> > + annc.ah.ar_pln = 4;
> > +
> > + /* ARP message */
> > + memcpy(annc.am.sha, mac, sizeof(annc.am.sha));
> > + memcpy(annc.am.sip, ip, sizeof(annc.am.sip));
> > + memcpy(annc.am.tha, MAC_BROADCAST, sizeof(annc.am.tha));
> > + memcpy(annc.am.tip, ip, sizeof(annc.am.tip));
>
> As noted in several earlier revisions, having sip == tip (but with
> different mac addresses) looks odd. Is that what the RFCs say to do
> for ARP announcements?
>
> > + inet_ntop(AF_INET, ip, ip_str, sizeof(ip_str));
> > + eth_ntop(mac, mac_str, sizeof(mac_str));
> > + debug("Announcing ARP for %s / %s", ip_str, mac_str);
> > +
> > + tap_send_single(c, &annc, sizeof(annc));
> > +}
> > diff --git a/arp.h b/arp.h
> > index d5ad0e1..4862e90 100644
> > --- a/arp.h
> > +++ b/arp.h
> > @@ -22,5 +22,7 @@ struct arpmsg {
> >
> > int arp(const struct ctx *c, struct iov_tail *data);
> > void arp_send_init_req(const struct ctx *c);
> > +void arp_announce(const struct ctx *c, struct in_addr *ip,
> > + const unsigned char *mac);
> >
> > #endif /* ARP_H */
> > diff --git a/fwd.c b/fwd.c
> > index c34bb1c..ade97c8 100644
> > --- a/fwd.c
> > +++ b/fwd.c
> > @@ -26,6 +26,8 @@
> > #include "passt.h"
> > #include "lineread.h"
> > #include "flow_table.h"
> > +#include "arp.h"
> > +#include "ndp.h"
> >
> > /* Empheral port range: values from RFC 6335 */
> > static in_port_t fwd_ephemeral_min = (1 << 15) + (1 << 14);
> > @@ -140,6 +142,20 @@ void fwd_neigh_table_update(const struct ctx *c, const union inany_addr *addr,
> >
> > memcpy(&e->addr, addr, sizeof(*addr));
> > memcpy(e->mac, mac, ETH_ALEN);
> > +
> > + if (inany_equals(addr, &inany_loopback4))
> > + return;
> > + if (inany_equals(addr, &inany_loopback6))
> > + return;
>
> Since you need these explicit checks anyway, there's not much point to
> the dummy entries you created - you could exit on these addresses
> before even looking up the table.
I guess those entries make sense if we can drop all these checks as a
result. I think we should be able to.
But if we can't, then yes, let's just go with explicit checks
everywhere, so that it's consistent.
--
Stefano
next prev parent reply other threads:[~2025-10-07 10:10 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-10-03 0:34 [PATCH v12 0/9] Use true MAC address of LAN local remote hosts Jon Maloy
2025-10-03 0:34 ` [PATCH v12 1/9] netlink: add subsciption on changes in NDP/ARP table Jon Maloy
2025-10-03 4:01 ` David Gibson
2025-10-06 22:33 ` Stefano Brivio
2025-10-03 0:34 ` [PATCH v12 2/9] fwd: Add cache table for ARP/NDP contents Jon Maloy
2025-10-03 1:03 ` Jon Maloy
2025-10-03 4:31 ` David Gibson
2025-10-05 15:52 ` Jon Maloy
2025-10-06 22:33 ` Stefano Brivio
2025-10-07 3:33 ` David Gibson
2025-10-06 22:40 ` Stefano Brivio
2025-10-03 0:34 ` [PATCH v12 3/9] arp/ndp: send ARP announcement / unsolicited NA when neigbour entry added Jon Maloy
2025-10-03 4:41 ` David Gibson
2025-10-07 10:10 ` Stefano Brivio [this message]
2025-10-06 22:51 ` Stefano Brivio
2025-10-03 0:34 ` [PATCH v12 4/9] arp/ndp: respond with true MAC address of LAN local remote hosts Jon Maloy
2025-10-03 4:48 ` David Gibson
2025-10-03 0:34 ` [PATCH v12 5/9] flow: add MAC address of LAN local remote hosts to flow Jon Maloy
2025-10-03 0:34 ` [PATCH v12 6/9] udp: forward external source MAC address through tap interface Jon Maloy
2025-10-03 4:52 ` David Gibson
2025-10-03 0:34 ` [PATCH v12 7/9] tcp: " Jon Maloy
2025-10-03 4:54 ` David Gibson
2025-10-03 0:34 ` [PATCH v12 8/9] tap: change signature of function tap_push_l2h() Jon Maloy
2025-10-03 0:34 ` [PATCH v12 9/9] icmp: let icmp use mac address from flowside structure Jon Maloy
2025-10-03 4:57 ` David Gibson
2025-10-03 5:33 ` [PATCH v12 0/9] Use true MAC address of LAN local remote hosts David Gibson
2025-10-05 13:39 ` Jon Maloy
2025-10-07 0:56 ` David Gibson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251007121022.353a44fc@elisabeth \
--to=sbrivio@redhat.com \
--cc=david@gibson.dropbear.id.au \
--cc=dgibson@redhat.com \
--cc=jmaloy@redhat.com \
--cc=passt-dev@passt.top \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).