public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: Stefano Brivio <sbrivio@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: Jon Maloy <jmaloy@redhat.com>, dgibson@redhat.com, passt-dev@passt.top
Subject: Re: [PATCH v12 3/9] arp/ndp: send ARP announcement / unsolicited NA when neigbour entry added
Date: Thu, 9 Oct 2025 21:29:12 +0200	[thread overview]
Message-ID: <20251009212912.510f860e@elisabeth> (raw)
In-Reply-To: <aOcxJiq33MHy50BG@zatzit>

On Thu, 9 Oct 2025 14:51:02 +1100
David Gibson <david@gibson.dropbear.id.au> wrote:

> On Wed, Oct 08, 2025 at 12:01:18PM +0200, Stefano Brivio wrote:
> > On Wed, 8 Oct 2025 11:27:32 +1100
> > David Gibson <david@gibson.dropbear.id.au> wrote:
> >   
> > > On Tue, Oct 07, 2025 at 12:10:22PM +0200, Stefano Brivio wrote:  
> > > > On Fri, 3 Oct 2025 14:41:56 +1000
> > > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > > >     
> > > > > On Thu, Oct 02, 2025 at 08:34:06PM -0400, Jon Maloy wrote:    
> > > > > > ARP announcements and unsolicited NAs should be handled with caution
> > > > > > because of the risk of malignant users emitting them to disturb
> > > > > > network communication.
> > > > > > 
> > > > > > There is however one case we where we know it is legitimate
> > > > > > and safe for us to send out such messages: The one time we switch
> > > > > > from using ctx->own_tap_mac to a MAC address received via the
> > > > > > recently added neigbour subscription function. Later changes to
> > > > > > the MAC address of a host in an existing entry cannot be fully
> > > > > > trusted, so we abstain from doing it in such cases.
> > > > > > 
> > > > > > When sending this type of messages, we notice that the guest accepts
> > > > > > the update, but shortly later asks for a confirmation in the form of
> > > > > > a regular ARP/NS request. This is responded to with the new value,
> > > > > > and we have exactly the effect we wanted.
> > > > > > 
> > > > > > This commit adds this functionality.
> > > > > > 
> > > > > > Signed-off-by: Jon Maloy <jmaloy@redhat.com>
> > > > > > 
> > > > > > ---
> > > > > > v10: -Made small changes based of feedback from David G.
> > > > > > v11: -Moved from 'Gratuitous ARP reply' model to 'ARP Announcement'
> > > > > >       model.
> > > > > > v12: -Excluding loopback and default GW addresses from the ARP/NA
> > > > > >       announcement to be sent to the guest
> > > > > > ---
> > > > > >  arp.c | 42 ++++++++++++++++++++++++++++++++++++++++++
> > > > > >  arp.h |  2 ++
> > > > > >  fwd.c | 16 ++++++++++++++++
> > > > > >  ndp.c | 10 ++++++++++
> > > > > >  ndp.h |  1 +
> > > > > >  5 files changed, 71 insertions(+)
> > > > > > 
> > > > > > diff --git a/arp.c b/arp.c
> > > > > > index ad088b1..b08780f 100644
> > > > > > --- a/arp.c
> > > > > > +++ b/arp.c
> > > > > > @@ -146,3 +146,45 @@ void arp_send_init_req(const struct ctx *c)
> > > > > >  	debug("Sending initial ARP request for guest MAC address");
> > > > > >  	tap_send_single(c, &req, sizeof(req));
> > > > > >  }
> > > > > > +
> > > > > > +/**
> > > > > > + * arp_announce() - Send an ARP announcement for an IPv4 host
> > > > > > + * @c:		Execution context
> > > > > > + * @ip:	IPv4 address we announce as owned by @mac
> > > > > > + * @mac:	MAC address to advertise for @ip
> > > > > > + */
> > > > > > +void arp_announce(const struct ctx *c, struct in_addr *ip,
> > > > > > +		  const unsigned char *mac)
> > > > > > +{
> > > > > > +	char ip_str[INET_ADDRSTRLEN];
> > > > > > +	char mac_str[ETH_ADDRSTRLEN];
> > > > > > +	struct {
> > > > > > +		struct ethhdr eh;
> > > > > > +		struct arphdr ah;
> > > > > > +		struct arpmsg am;
> > > > > > +	} __attribute__((__packed__)) annc;
> > > > > > +
> > > > > > +	/* Ethernet header */
> > > > > > +	annc.eh.h_proto = htons(ETH_P_ARP);
> > > > > > +	memcpy(annc.eh.h_dest, MAC_BROADCAST, sizeof(annc.eh.h_dest));
> > > > > > +	memcpy(annc.eh.h_source, mac, sizeof(annc.eh.h_source));
> > > > > > +
> > > > > > +	/* ARP header */
> > > > > > +	annc.ah.ar_op = htons(ARPOP_REQUEST);
> > > > > > +	annc.ah.ar_hrd = htons(ARPHRD_ETHER);
> > > > > > +	annc.ah.ar_pro = htons(ETH_P_IP);
> > > > > > +	annc.ah.ar_hln = ETH_ALEN;
> > > > > > +	annc.ah.ar_pln = 4;
> > > > > > +
> > > > > > +	/* ARP message */
> > > > > > +	memcpy(annc.am.sha, mac, sizeof(annc.am.sha));
> > > > > > +	memcpy(annc.am.sip, ip, sizeof(annc.am.sip));
> > > > > > +	memcpy(annc.am.tha, MAC_BROADCAST, sizeof(annc.am.tha));
> > > > > > +	memcpy(annc.am.tip, ip, sizeof(annc.am.tip));      
> > > > > 
> > > > > As noted in several earlier revisions, having sip == tip (but with
> > > > > different mac addresses) looks odd.  Is that what the RFCs say to do
> > > > > for ARP announcements?
> > > > >     
> > > > > > +	inet_ntop(AF_INET, ip, ip_str, sizeof(ip_str));
> > > > > > +	eth_ntop(mac, mac_str, sizeof(mac_str));
> > > > > > +	debug("Announcing ARP for %s / %s", ip_str, mac_str);
> > > > > > +
> > > > > > +	tap_send_single(c, &annc, sizeof(annc));
> > > > > > +}
> > > > > > diff --git a/arp.h b/arp.h
> > > > > > index d5ad0e1..4862e90 100644
> > > > > > --- a/arp.h
> > > > > > +++ b/arp.h
> > > > > > @@ -22,5 +22,7 @@ struct arpmsg {
> > > > > >  
> > > > > >  int arp(const struct ctx *c, struct iov_tail *data);
> > > > > >  void arp_send_init_req(const struct ctx *c);
> > > > > > +void arp_announce(const struct ctx *c, struct in_addr *ip,
> > > > > > +		  const unsigned char *mac);
> > > > > >  
> > > > > >  #endif /* ARP_H */
> > > > > > diff --git a/fwd.c b/fwd.c
> > > > > > index c34bb1c..ade97c8 100644
> > > > > > --- a/fwd.c
> > > > > > +++ b/fwd.c
> > > > > > @@ -26,6 +26,8 @@
> > > > > >  #include "passt.h"
> > > > > >  #include "lineread.h"
> > > > > >  #include "flow_table.h"
> > > > > > +#include "arp.h"
> > > > > > +#include "ndp.h"
> > > > > >  
> > > > > >  /* Empheral port range: values from RFC 6335 */
> > > > > >  static in_port_t fwd_ephemeral_min = (1 << 15) + (1 << 14);
> > > > > > @@ -140,6 +142,20 @@ void fwd_neigh_table_update(const struct ctx *c, const union inany_addr *addr,
> > > > > >  
> > > > > >  	memcpy(&e->addr, addr, sizeof(*addr));
> > > > > >  	memcpy(e->mac, mac, ETH_ALEN);
> > > > > > +
> > > > > > +	if (inany_equals(addr, &inany_loopback4))
> > > > > > +		return;
> > > > > > +	if (inany_equals(addr, &inany_loopback6))
> > > > > > +		return;      
> > > > > 
> > > > > Since you need these explicit checks anyway, there's not much point to
> > > > > the dummy entries you created - you could exit on these addresses
> > > > > before even looking up the table.    
> > > > 
> > > > I guess those entries make sense if we can drop all these checks as a
> > > > result. I think we should be able to.    
> > > 
> > > We couldn't in this version, because that might have allowed the
> > > entries for loopback to be updated, which is certainly wrong.  But
> > > it will all need re-examination after moving everything over to guest
> > > side addresses which AIUI is the plan for the next spin.  
> > 
> > Yes, I was talking about the next version. For context, when we first
> > discussed about the possibility of these entries with Jon, my
> > assumption was that the whole series used guest-side link-layer
> > addresses exclusively,  
> 
> We did use guest-side link-layer addresses - host-side LL addresses
> might not even exist.  The question is about whether we use guest side
> or host side IP addresses to index the table.

Sorry, yes, I meant to write network and I wrote link-layer.

> > but that wasn't the case, hence (I think) the
> > current struggle. If we go in that direction, I hope it's possible.  
> 
> Thinking a bit more closely, I don't think it is, for much the same
> reason it wasn't in this draft.
> 
> According to the rules Jon and I thrashed out elsewhere in the thread,
> there are certain guest side addresses that must be locked to use
> our_tap_mac.  We're essentially shadowing something that might exist
> on the host side, so we should use our MAC not the MAC of whatever is
> shadowed.
> 
> Just pre-populating an entry won't do the trick, because it could be
> overwritten if the right events occur for the shadowed host.

Right, sorry, I omitted another bit of context: I've been suggesting to
Jon that he'd introduce some kind of "permanent" or "administrative"
bit, and keep those entries at the beginning of the chain, exactly for
the reason you mention.

I can imagine we'll need those at some point if we ever want to offer
explicit link-layer address mapping in the future, and they're probably
convenient the day one can change map_guest_addr and map_host_loopback
at runtime.

We can also happily skip that for the moment, though, it's another
problem we can keep for later.

> > By the way, while they are probably more elegant because we can skip
> > explicit cases, they might be a bit more complicated to manage compared
> > to those explicit cases the day we get to change addresses and routes
> > dynamically using a netlink monitor, because at that point we might
> > need to remove some entries based on old addresses / default gateways.
> > 
> > But given that this is already complicated enough, we can keep that
> > problem for later, and just go with the simplest possible approach
> > (whatever it is) for the moment.
> > 
> > -- 
> > Stefano

-- 
Stefano


  reply	other threads:[~2025-10-09 19:29 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-10-03  0:34 [PATCH v12 0/9] Use true MAC address of LAN local remote hosts Jon Maloy
2025-10-03  0:34 ` [PATCH v12 1/9] netlink: add subsciption on changes in NDP/ARP table Jon Maloy
2025-10-03  4:01   ` David Gibson
2025-10-06 22:33   ` Stefano Brivio
2025-10-03  0:34 ` [PATCH v12 2/9] fwd: Add cache table for ARP/NDP contents Jon Maloy
2025-10-03  1:03   ` Jon Maloy
2025-10-03  4:31   ` David Gibson
2025-10-05 15:52     ` Jon Maloy
2025-10-06 22:33       ` Stefano Brivio
2025-10-07  3:33       ` David Gibson
2025-10-06 22:40   ` Stefano Brivio
2025-10-03  0:34 ` [PATCH v12 3/9] arp/ndp: send ARP announcement / unsolicited NA when neigbour entry added Jon Maloy
2025-10-03  4:41   ` David Gibson
2025-10-07 10:10     ` Stefano Brivio
2025-10-08  0:27       ` David Gibson
2025-10-08 10:01         ` Stefano Brivio
2025-10-09  3:51           ` David Gibson
2025-10-09 19:29             ` Stefano Brivio [this message]
2025-10-09 23:46               ` David Gibson
2025-10-06 22:51   ` Stefano Brivio
2025-10-03  0:34 ` [PATCH v12 4/9] arp/ndp: respond with true MAC address of LAN local remote hosts Jon Maloy
2025-10-03  4:48   ` David Gibson
2025-10-03  0:34 ` [PATCH v12 5/9] flow: add MAC address of LAN local remote hosts to flow Jon Maloy
2025-10-03  0:34 ` [PATCH v12 6/9] udp: forward external source MAC address through tap interface Jon Maloy
2025-10-03  4:52   ` David Gibson
2025-10-03  0:34 ` [PATCH v12 7/9] tcp: " Jon Maloy
2025-10-03  4:54   ` David Gibson
2025-10-03  0:34 ` [PATCH v12 8/9] tap: change signature of function tap_push_l2h() Jon Maloy
2025-10-03  0:34 ` [PATCH v12 9/9] icmp: let icmp use mac address from flowside structure Jon Maloy
2025-10-03  4:57   ` David Gibson
2025-10-03  5:33 ` [PATCH v12 0/9] Use true MAC address of LAN local remote hosts David Gibson
2025-10-05 13:39   ` Jon Maloy
2025-10-07  0:56     ` David Gibson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20251009212912.510f860e@elisabeth \
    --to=sbrivio@redhat.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=dgibson@redhat.com \
    --cc=jmaloy@redhat.com \
    --cc=passt-dev@passt.top \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).