From: Stefano Brivio <sbrivio@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: passt-dev@passt.top
Subject: Re: [PATCH v2 17/23] conf: Allow user-specified auto-scanned port forwarding ranges
Date: Thu, 16 Apr 2026 00:04:51 +0200 (CEST) [thread overview]
Message-ID: <20260416000450.56189eb6@elisabeth> (raw)
In-Reply-To: <20260410010309.736855-18-david@gibson.dropbear.id.au>
On Fri, 10 Apr 2026 11:03:03 +1000
David Gibson <david@gibson.dropbear.id.au> wrote:
> The forwarding table now allows for arbitrary port ranges to be marked as
> FWD_SCAN, meaning we don't open sockets for every port, but only those we
> scan as listening on the target side. However, there's currently no way
> to create such rules, except -[tTuU] auto which always scans every port
> with an unspecified listening address and interface.
>
> Allow user-specified "auto" ranges by moving the parsing of the "auto"
> keyword from conf_ports(), to conf_ports_spec() as part of the port
> specified. "auto" can be combined freely with other port ranges, e.g.
> -t 127.0.0.1/auto
> -u %lo/5000-7000,auto
> -T auto,12345
> -U auto,~1-9000
>
> Note that any address and interface given only affects where the automatic
> forwards listen, not what addresses we consider when scanning. That is,
> if the target side is listening on *any* address, we will create a forward
> on the specified address.
>
> Link: https://bugs.passt.top/show_bug.cgi?id=180
>
> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
> ---
> conf.c | 85 ++++++++++++++++++++++++++++++++++++++++++---------------
> passt.1 | 30 ++++++++++++++------
> 2 files changed, 85 insertions(+), 30 deletions(-)
>
> diff --git a/conf.c b/conf.c
> index f62109b5..8e3b4b20 100644
> --- a/conf.c
> +++ b/conf.c
> @@ -13,6 +13,7 @@
> */
>
> #include <arpa/inet.h>
> +#include <ctype.h>
> #include <errno.h>
> #include <fcntl.h>
> #include <getopt.h>
> @@ -112,6 +113,28 @@ static int parse_port_range(const char *s, const char **endptr,
> return 0;
> }
>
> +/**
> + * parse_keyword() - Parse a literal keyword
> + * @s: String to parse
> + * @endptr: Update to the character after the keyword
> + * @kw: Keyword to accept
> + *
> + * Return: 0, if @s starts with @kw, -EINVAL if it does not
> + */
> +static int parse_keyword(const char *s, const char **endptr, const char *kw)
> +{
> + size_t len = strlen(kw);
> +
> + if (strlen(s) < len)
> + return -EINVAL;
> +
> + if (memcmp(s, kw, len))
> + return -EINVAL;
> +
> + *endptr = s + len;
> + return 0;
> +}
> +
> /**
> * conf_ports_range_except() - Set up forwarding for a range of ports minus a
> * bitmap of exclusions
> @@ -249,6 +272,7 @@ static void conf_ports_spec(const struct ctx *c,
> uint8_t exclude[PORT_BITMAP_SIZE] = { 0 };
> bool exclude_only = true;
> const char *p, *ep;
> + uint8_t flags = 0;
> unsigned i;
>
> if (!strcmp(spec, "all")) {
> @@ -256,15 +280,32 @@ static void conf_ports_spec(const struct ctx *c,
> spec = "";
> }
>
> - /* Mark all exclusions first, they might be given after base ranges */
> + /* Parse excluded ranges and "auto" in the first pass */
> for_each_chunk(p, ep, spec, ",") {
> struct port_range xrange;
>
> - if (*p != '~') {
> - /* Not an exclude range, parse later */
> + if (isdigit(*p)) {
> + /* Include range, parse later */
> exclude_only = false;
> continue;
> }
> +
> + if (parse_keyword(p, &p, "auto") == 0) {
> + if (p != ep) /* Garbage after the keyword */
> + goto bad;
> +
> + if (c->mode != MODE_PASTA) {
> + die(
> +"'auto' port forwarding is only allowed for pasta");
> + }
> +
> + flags |= FWD_SCAN;
> + continue;
> + }
> +
> + /* Should be an exclude range */
> + if (*p != '~')
> + goto bad;
> p++;
>
> if (parse_port_range(p, &p, &xrange))
> @@ -283,7 +324,7 @@ static void conf_ports_spec(const struct ctx *c,
> conf_ports_range_except(c, optname, optarg, fwd,
> proto, addr, ifname,
> 1, NUM_PORTS - 1, exclude,
> - 1, FWD_WEAK);
> + 1, flags | FWD_WEAK);
> return;
> }
>
> @@ -291,8 +332,8 @@ static void conf_ports_spec(const struct ctx *c,
> for_each_chunk(p, ep, spec, ",") {
> struct port_range orig_range, mapped_range;
>
> - if (*p == '~')
> - /* Exclude range, already parsed */
> + if (!isdigit(*p))
> + /* Already parsed */
> continue;
>
> if (parse_port_range(p, &p, &orig_range))
> @@ -320,7 +361,7 @@ static void conf_ports_spec(const struct ctx *c,
> proto, addr, ifname,
> orig_range.first, orig_range.last,
> exclude,
> - mapped_range.first, 0);
> + mapped_range.first, flags);
> }
>
> return;
> @@ -366,17 +407,6 @@ static void conf_ports(const struct ctx *c, char optname, const char *optarg,
> if (proto == IPPROTO_UDP && c->no_udp)
> die("UDP port forwarding requested but UDP is disabled");
>
> - if (!strcmp(optarg, "auto")) {
> - if (c->mode != MODE_PASTA)
> - die("'auto' port forwarding is only allowed for pasta");
> -
> - conf_ports_range_except(c, optname, optarg, fwd,
> - proto, NULL, NULL,
> - 1, NUM_PORTS - 1, NULL, 1, FWD_SCAN);
> -
> - return;
> - }
> -
> strncpy(buf, optarg, sizeof(buf) - 1);
>
> if ((spec = strchr(buf, '/'))) {
> @@ -1031,13 +1061,13 @@ static void usage(const char *name, FILE *f, int status)
> " can be specified multiple times\n"
> " SPEC can be:\n"
> " 'none': don't forward any ports\n"
> - "%s"
> " [ADDR[%%IFACE]/]PORTS: forward specific ports\n"
> " PORTS is either 'all' (forward all unbound, non-ephemeral\n"
> " ports), or a comma-separated list of ports, optionally\n"
> " ranged with '-' and optional target ports after ':'.\n"
> " Ranges can be reduced by excluding ports or ranges\n"
> - " prefixed by '~'\n"
> + " prefixed by '~'.\n"
> + "%s"
> " Examples:\n"
> " -t all Forward all ports\n"
> " -t 127.0.0.1/all Forward all ports from local address\n"
> @@ -1051,15 +1081,26 @@ static void usage(const char *name, FILE *f, int status)
> " -t 192.0.2.1/5 Bind port 5 of 192.0.2.1 to %s\n"
> " -t 5-25,~10-20 Forward ports 5 to 9, and 21 to 25\n"
> " -t ~25 Forward all ports except for 25\n"
> + "%s"
> " default: %s\n"
> " -u, --udp-ports SPEC UDP port forwarding to %s\n"
> " SPEC is as described for TCP above\n"
> " default: %s\n",
> guest,
> strstr(name, "pasta") ?
> - " 'auto': forward all ports currently bound in namespace\n"
> + " The 'auto' keyword may be given to only forward\n"
> + " ports which are bound in the target namespace\n"
> + : "",
> + guest, guest, guest,
> + strstr(name, "pasta") ?
> + " -t auto Forward all ports bound in namespace\n"
> + " -t 192.0.2.2/auto Forward ports from 192.0.2.2 if\n"
> + " they are bound in the namespace\n"
> + " -t 8000-8010,auto Forward ports 8000-8010 if they\n"
> + " are bound in the namespace\n"
The whole thing is now rendered as:
Examples:
-t all Forward all ports
-t 127.0.0.1/all Forward all ports from local address
127.0.0.1
-t 22 Forward local port 22 to 22 on namespace
-t 22:23 Forward local port 22 to 23 on namespace
-t 22,25 Forward ports 22, 25 to ports 22, 25
-t 22-80 Forward ports 22 to 80
-t 22-80:32-90 Forward ports 22 to 80 to
corresponding port numbers plus 10
-t 192.0.2.1/5 Bind port 5 of 192.0.2.1 to namespace
-t 5-25,~10-20 Forward ports 5 to 9, and 21 to 25
-t ~25 Forward all ports except for 25
-t auto Forward all ports bound in namespace
-t 192.0.2.2/auto Forward ports from 192.0.2.2 if
they are bound in the namespace
-t 8000-8010,auto Forward ports 8000-8010 if they
are bound in the namespace
I think this could be:
" -t auto\t Forward all ports bound in namespace\n"
" -t ::1/auto Forward ports from ::1 if bound in\n"
" namespace\n"
" -t 80-82,auto Forward ports 80-82 if bound in\n"
" namespace\n"
instead.
> : "",
> - guest, guest, guest, fwd_default, guest, fwd_default);
> +
> + fwd_default, guest, fwd_default);
>
> if (strstr(name, "pasta"))
> goto pasta_opts;
> diff --git a/passt.1 b/passt.1
> index 3ba447d5..eeecc0fb 100644
> --- a/passt.1
> +++ b/passt.1
> @@ -434,12 +434,6 @@ Configure TCP port forwarding to guest or namespace. \fIspec\fR can be one of:
> .BR none
> Don't forward any ports
>
> -.TP
> -.BR auto " " (\fBpasta\fR " " only)
> -Dynamically forward ports bound in the namespace. The list of ports is
> -periodically derived (every second) from listening sockets reported by
> -\fI/proc/net/tcp\fR and \fI/proc/net/tcp6\fR, see \fBproc\fR(5).
> -
> .TP
> [\fIaddress\fR[\fB%\fR\fIinterface\fR]\fB/\fR]\fIports\fR ...
> Specific ports to forward. Optionally, a specific listening address
> @@ -468,11 +462,20 @@ as \fIfirst\fR.
> \fB~\fR\fIfirst\fR[\fB-\fR\fIlast\fR]
> Exclude range. Exclude port numbers between \fIfirst\fR and
> \fIlast\fR from. This takes precedences over include ranges.
> +
> +.TP
> +.BR auto
> +(\fBpasta\fR " " only). Only forward ports in the specified set if
> +the target ports are bound in the namespace. The list of ports is
> +periodically derived (every second) from listening sockets reported by
> +\fI/proc/net/tcp\fR and \fI/proc/net/tcp6\fR, see \fBproc\fR(5).
> .RE
>
> Specifying excluded ranges only implies that all other non-ephemeral
> -ports are forwarded. In this case, no failures are reported for
> -unavailable ports, unless no ports could be forwarded at all.
> +ports are forwarded. Specifying no ranges at all implies forwarding
> +all non-ephemeral ports permitted by current capabilities. In this
> +case, no failures are reported for unavailable ports, unless no ports
> +could be forwarded at all.
>
> Examples:
> .RS
> @@ -519,6 +522,17 @@ and 30
> .TP
> -t ~20000-20010
> Forward all ports to the guest, except for the range from 20000 to 20010
> +.TP
> +-t auto
> +Automatically forward any ports which are bound in the namespace.
> +.TP
> +-t 192.0.2.2/auto
> +Automatically forward any ports which are bound in the namespace,
> +listening only on local port 192.0.2.2.
> +.TP
> +-t 8000-8010,auto
> +Forward ports in the range 8000-8010 if and only if they are bound in
> +the namespace.
> .RE
>
> Default is \fBnone\fR for \fBpasst\fR and \fBauto\fR for \fBpasta\fR.
--
Stefano
next prev parent reply other threads:[~2026-04-15 22:04 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-10 1:02 [PATCH v2 00/23] Rework forwarding option parsing David Gibson
2026-04-10 1:02 ` [PATCH v2 01/23] conf: Split parsing of port specifiers from the rest of -[tuTU] parsing David Gibson
2026-04-10 1:02 ` [PATCH v2 02/23] conf: Simplify handling of default forwarding mode David Gibson
2026-04-10 1:02 ` [PATCH v2 03/23] conf: Move first pass handling of -[TU] next to handling of -[tu] David Gibson
2026-04-10 1:02 ` [PATCH v2 04/23] doc: Consolidate -[tu] option descriptions for passt and pasta David Gibson
2026-04-10 1:02 ` [PATCH v2 05/23] conf: Permit -[tTuU] all in pasta mode David Gibson
2026-04-10 1:02 ` [PATCH v2 06/23] fwd: Better split forwarding rule specification from associated sockets David Gibson
2026-04-10 1:02 ` [PATCH v2 07/23] fwd_rule: Move forwarding rule formatting David Gibson
2026-04-10 1:02 ` [PATCH v2 08/23] conf: Pass protocol explicitly to conf_ports_range_except() David Gibson
2026-04-10 1:02 ` [PATCH v2 09/23] fwd: Split rule building from rule adding David Gibson
2026-04-10 1:02 ` [PATCH v2 10/23] fwd_rule: Move rule conflict checking from fwd_rule_add() to caller David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:19 ` David Gibson
2026-04-10 1:02 ` [PATCH v2 11/23] fwd: Improve error handling in fwd_rule_add() David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:21 ` David Gibson
2026-04-10 1:02 ` [PATCH v2 12/23] conf: Don't be strict about exclusivity of forwarding mode David Gibson
2026-04-10 1:02 ` [PATCH v2 13/23] conf: Rework stepping through chunks of port specifiers David Gibson
2026-04-10 1:03 ` [PATCH v2 14/23] conf: Rework checking for garbage after a range David Gibson
2026-04-10 1:03 ` [PATCH v2 15/23] doc: Rework man page description of port specifiers David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:34 ` David Gibson
2026-04-10 1:03 ` [PATCH v2 16/23] conf: Move "all" handling to port specifier David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:37 ` David Gibson
2026-04-10 1:03 ` [PATCH v2 17/23] conf: Allow user-specified auto-scanned port forwarding ranges David Gibson
2026-04-15 22:04 ` Stefano Brivio [this message]
2026-04-16 1:44 ` David Gibson
2026-04-10 1:03 ` [PATCH v2 18/23] conf: Move SO_BINDTODEVICE workaround to conf_ports() David Gibson
2026-04-10 1:03 ` [PATCH v2 19/23] conf: Don't pass raw commandline argument to conf_ports_spec() David Gibson
2026-04-10 1:03 ` [PATCH v2 20/23] fwd, conf: Add capabilities bits to each forwarding table David Gibson
2026-04-10 1:03 ` [PATCH v2 21/23] conf, fwd: Stricter rule checking in fwd_rule_add() David Gibson
2026-04-15 22:04 ` Stefano Brivio
2026-04-16 1:46 ` David Gibson
2026-04-10 1:03 ` [PATCH v2 22/23] fwd_rule: Move ephemeral port probing to fwd_rule.c David Gibson
2026-04-10 1:03 ` [PATCH v2 23/23] fwd, conf: Move rule parsing code to fwd_rule.[ch] David Gibson
2026-04-15 22:05 ` [PATCH v2 00/23] Rework forwarding option parsing Stefano Brivio
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260416000450.56189eb6@elisabeth \
--to=sbrivio@redhat.com \
--cc=david@gibson.dropbear.id.au \
--cc=passt-dev@passt.top \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).