From: Stefano Brivio <sbrivio@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: passt-dev@passt.top
Subject: Re: [PATCH 15/18] pif: Limit pif names to IFNAMSIZ (16) bytes
Date: Mon, 30 Mar 2026 10:45:27 +0200 (CEST) [thread overview]
Message-ID: <20260330104526.51f590c1@elisabeth> (raw)
In-Reply-To: <acnNKuko-9syzC9i@zatzit>
On Mon, 30 Mar 2026 12:08:58 +1100
David Gibson <david@gibson.dropbear.id.au> wrote:
> On Sun, Mar 29, 2026 at 02:02:27PM +0200, Stefano Brivio wrote:
> > On Fri, 27 Mar 2026 15:34:27 +1100
> > David Gibson <david@gibson.dropbear.id.au> wrote:
> >
> > > All current pif names are quite short, and we expect them to remain short
> > > when/if we allow arbitrary pifs. However, because of the structure of
> > > the current code we don't enforce any limit on the length.
> > >
> > > This will become more important with dynamic configuration updates, so
> > > start enforcing a length limit. Specifically we allow pif names to be up
> > > to IFNAMSIZ bytes, including the terminating \0. This is semi-arbitrary -
> > > there's no particular reason we have to use the same length limit as
> > > kernel netif names. However, when we do allow arbitrary pifs, we expect
> > > that we might support a similar number to the number of kernel interfaces.
> > > It might make sense to use names matching kernel interface names in that
> > > future. So, re-use IFNAMSIZ to avoid surprise.
> >
> > And what if... we used 128 instead, which is reasonably longer than
> > UNIX_PATH_MAX (108, which despite the application usage in POSIX 2024.1:
> > https://pubs.opengroup.org/onlinepubs/9799919799/basedefs/sys_un.h.html
> > is still commonly used a path length limit, also by passt itself)?
>
> Well, certainly we could make pif names longer...
>
> > At that point we could embed UNIX domain socket paths as PIF name
> > (possibly with some additional specifier) which _might_ be useful to
> > forward UNIX sockets in the https://bugs.passt.top/show_bug.cgi?id=200
> > sense.
>
> ...but I don't think that rationale is compelling. The unix socket
> path would be the equivalent of IP+port, not the pif.
Right, that was the "obvious" idea we assumed so far, but I was
thinking that if you want to stick to only PIFs and addresses in rules
and flow tables (from what I understood, you would see some value in
keeping that), we could think of modelling that UNIX domain socket as a
PIF that can only map to a given TCP or UDP port (depending on the UNIX
domain socket type) instead.
It's a bit of a stretch but maybe it's convenient?
On the other hand it would conflict with the current (and perhaps only
reasonable) concept of PIF, that is, "the host", "the guest", etc.
> I don't see how embedding a unix path in the pif would be useful.
...and maybe something else entirely: should we, one day, add support
for multiple virtual machines, with each one connecting to different
UNIX domain sockets (either data or vhost-user control sockets), would
it be convenient to differentiate between those "TAP" (current name)
PIFs using their UNIX domain socket path instead?
Or would there be a separate table mapping PIF names to socket paths?
This looks more elegant and flexible but I'm not sure if it's
preferable to the former.
> > It's not the only way to implement it, but perhaps it's one possibility
> > that might make sense for what we know now? What do you think?
> >
> > It also has the advantage of being sufficiently longer than IFNAMSIZ,
> > so that should we ever need to have stuff like "container_A:eth0" in a
> > PIF name, we could have it as well.
>
> That's a more convincing case. Ok, I'll expand the pif name size for
> the next spin.
By the way, I forgot to mention, Podman container IDs (the ID you get
from 'podman create', and if I recall correctly also from Docker) are
64 hex digits, which might be convenient to represent as 64 (printable)
characters (instead of 32 bytes) for users to refer to.
The OCI specification (surprise) just says that it's a "string",
without defining the maximum length:
https://github.com/opencontainers/runtime-spec/blob/main/runtime.md#state
...anyway, if Podman, Docker, or their users want to refer to
containers using those IDs, that plus IFNAMSIZ would be 80 bytes.
--
Stefano
next prev parent reply other threads:[~2026-03-30 8:45 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-27 4:34 [PATCH 00/18] More pesto preliminaries David Gibson
2026-03-27 4:34 ` [PATCH 01/18] conf: runas can be const David Gibson
2026-03-27 4:34 ` [PATCH 02/18] fwd: Comparing rule " David Gibson
2026-03-27 4:34 ` [PATCH 03/18] vhost_user: Fix assorted minor cppcheck warnings David Gibson
2026-03-27 4:34 ` [PATCH 04/18] serialise: Split functions user for serialisation from util.c David Gibson
2026-03-27 4:34 ` [PATCH 05/18] serialise: Add helpers for serialising unsigned integers David Gibson
2026-03-27 4:34 ` [PATCH 06/18] fwd: Move selecting correct scan bitmap into fwd_sync_one() David Gibson
2026-03-27 4:34 ` [PATCH 07/18] fwd: Look up rule index in fwd_sync_one() David Gibson
2026-03-27 4:34 ` [PATCH 08/18] fwd: Store forwarding tables indexed by (origin) pif David Gibson
2026-03-27 4:34 ` [PATCH 09/18] fwd: Allow FWD_DUAL_STACK_ANY flag to be passed directly to fwd_rule_add() David Gibson
2026-03-27 4:34 ` [PATCH 10/18] fwd, conf: Expose ephemeral ports as bitmap rather than function David Gibson
2026-03-27 4:34 ` [PATCH 11/18] conf: Don't bother complaining about overlapping excluded ranges David Gibson
2026-03-27 4:34 ` [PATCH 12/18] conf: Move check for mapping port 0 to caller David Gibson
2026-03-27 4:34 ` [PATCH 13/18] conf: Move check for disabled interfaces earlier David Gibson
2026-03-27 4:34 ` [PATCH 14/18] conf: Remove redundant warning when SO_BINDTODEVICE is unavailable David Gibson
2026-03-27 4:34 ` [PATCH 15/18] pif: Limit pif names to IFNAMSIZ (16) bytes David Gibson
2026-03-29 12:02 ` Stefano Brivio
2026-03-30 1:08 ` David Gibson
2026-03-30 8:45 ` Stefano Brivio [this message]
2026-03-27 4:34 ` [PATCH 16/18] ip: Define a bound for the string returned by ipproto_name() David Gibson
2026-03-27 4:34 ` [PATCH 17/18] bitmap: Split bitmap helper functions into their own module David Gibson
2026-03-27 4:34 ` [PATCH 18/18] fwd: Split forwading rule specification from its implementation state David Gibson
2026-03-29 12:02 ` [PATCH 00/18] More pesto preliminaries Stefano Brivio
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260330104526.51f590c1@elisabeth \
--to=sbrivio@redhat.com \
--cc=david@gibson.dropbear.id.au \
--cc=passt-dev@passt.top \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).