From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: passt.top; dmarc=none (p=none dis=none) header.from=gibson.dropbear.id.au Authentication-Results: passt.top; dkim=pass (2048-bit key; secure) header.d=gibson.dropbear.id.au header.i=@gibson.dropbear.id.au header.a=rsa-sha256 header.s=202410 header.b=kZ7yMvMU; dkim-atps=neutral Received: from mail.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by passt.top (Postfix) with ESMTPS id 3E8175A004E for ; Tue, 26 Nov 2024 06:31:06 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gibson.dropbear.id.au; s=202410; t=1732599053; bh=SBFd2GD926k5r6rQhRByypl4v8OT8LzWXHfEio7Qrfw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=kZ7yMvMUO37+xqRdEbABkNhY2wigALSMrm7Fv+OPAWr4WuvzvFCYaGa7kSykW603L ral8lxS3ndEraGccx7GR20eeTC9Yem4pVKI/qlFBEGQ3+z6Eiyi0JAGuAcwZ79IUnB pq94FofkiORNdobjJ0/J/D74v5lhhFJYoej1kF7skmQ71i4Al+fLR9FyTsldaFVnJx QL2VbeP9ujd4b0RqA1jyP28dVv2lrFKQrZJ5Zgo9rGmlZCk+jM66ESGoiFuRVM6WKF lx+9OrusqSQ3Hz9lLBqYkCjXuT+leJsgpytlzVEuy1SehAIvEPrqkB6+d1Kx8Yr1v2 uM2pyll8dmOqg== Received: by gandalf.ozlabs.org (Postfix, from userid 1007) id 4XyB4Y4hkRz4xfx; Tue, 26 Nov 2024 16:30:53 +1100 (AEDT) Date: Tue, 26 Nov 2024 16:28:50 +1100 From: David Gibson To: Stefano Brivio Subject: Re: [PATCH v2] treewide: Introduce 'local mode' for disconnected setups Message-ID: References: <20241124235037.4127862-1-sbrivio@redhat.com> <20241126053939.1ea11825@elisabeth> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="pd4vV/amBx9jhXcu" Content-Disposition: inline In-Reply-To: <20241126053939.1ea11825@elisabeth> Message-ID-Hash: 6J7UQ5IHFSWHRZ5T5DAGBSF52NALPGCB X-Message-ID-Hash: 6J7UQ5IHFSWHRZ5T5DAGBSF52NALPGCB X-MailFrom: dgibson@gandalf.ozlabs.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: passt-dev@passt.top, Paul Holzinger X-Mailman-Version: 3.3.8 Precedence: list List-Id: Development discussion and patches for passt Archived-At: Archived-At: List-Archive: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --pd4vV/amBx9jhXcu Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Nov 26, 2024 at 05:39:39AM +0100, Stefano Brivio wrote: > On Tue, 26 Nov 2024 15:01:06 +1100 > David Gibson wrote: >=20 > > On Mon, Nov 25, 2024 at 12:50:37AM +0100, Stefano Brivio wrote: > > > There are setups where no host interface is available or configured > > > at all, intentionally or not, temporarily or not, but users expect > > > (Podman) containers to run in any case as they did with slirp4netns, > > > and we're now getting reports that we broke such setups at a rather > > > alarming rate. =20 > >=20 > > This looks pretty good to me. It's simpler than I feared, and I don't > > think it will tie our hands much in terms of future fancier handling > > (netlink monitors, no-template-interface mode etc.). I'm pretty good > > to go ahead with this soon. > >=20 > > I do have a few thoughts on some details which might be polished, see > > below. > >=20 > > > To this end, if we don't find any usable host interface, instead of > > > exiting: > > >=20 > > > - for IPv4, use 169.254.2.1 as guest/container address and 169.254.2.2 > > > as default gateway > > >=20 > > > - for IPv6, don't assign any address (forcibly disable DHCPv6), and > > > use the *first* link-local address we observe to represent the > > > guest/container. Advertise fe80::1 as default gateway > > >=20 > > > - use 'tap0' as default interface name for pasta > > >=20 > > > Change ifi4 and ifi6 in struct ctx to int and accept a special -1 > > > value meaning that no host interface was selected, but the IP family > > > is enabled. The fact that the kernel uses unsigned int values for > > > those is not an issue as 1. one can't create so many interfaces > > > anyway and 2. we otherwise handle those values transparently. =20 > >=20 > > ifi4 and ifi6 are currently kind of overloaded. A few places that > > actually need to deal with the host side plumbing use them for the > > interface index. Most places use these only to tell if IPv4/IPv6 is > > enabled (for the guest). > >=20 > > This patch is disconnecting whether we have IPv4/IPv6 enabled from > > whether there exists a suitable external interface. So, I think it > > makes sense to disconnect the variables as well, rather than > > complexifying the encoding into ifi4/ifi6. > >=20 > > I'd suggest instead that we introduce new boolean ip[46]_enabled > > variables, and change all the places that check ifi4/ifi6 only for > > that reason to use those instead. That can be a preiminary patch. > > Then we keep the encoding of ifi4/ifi6 as is. >=20 > That turns this patch into a series, which is exactly what I'm trying > to avoid, for no particular advantage. As you say below: "slightly > cleaner". >=20 > I think we should be responsible toward distribution maintainers > (including myself) who might be trying to fix a pressing issue with a > _simple_ backport. Ah, yeah, I forgot about the complexity it would add for backporting. Ok fair enough, we can fix this up later. > > I think that will make things slightly cleaner and not a great deal > > harder for this initial version of a "local" setting. It will also > > extend more naturally if we have future modes that can interact with > > multiple host side interfaces or other more complex scenarios. >=20 > That can be changed later as needed. >=20 > > > Fix a botched conditional in conf_print() to actually skip printing > > > DHCPv6 information if DHCPv6 is disabled (and skip printing NDP > > > information if NDP is disabled). > > >=20 > > > Link: https://github.com/containers/podman/issues/24614 > > > Signed-off-by: Stefano Brivio > > > --- > > > v2: > > > - drop fixed link-local address for IPv6 > > > - change addresses to be reminiscent of libslirp's default choices > > > - add man page changes and commit message > > > - fix several things around, from testing (checked with several > > > --map-guest-addr and --map-host-loopback combinations etc.) > > >=20 > > > conf.c | 92 +++++++++++++++++++++++++++++++++++++++++++++----------= -- > > > passt.1 | 33 +++++++++++++++++---- > > > passt.h | 8 ++--- > > > pasta.c | 7 +++-- > > > tap.c | 3 ++ > > > 5 files changed, 113 insertions(+), 30 deletions(-) > > >=20 > > > diff --git a/conf.c b/conf.c > > > index 86566db..551c2b0 100644 > > > --- a/conf.c > > > +++ b/conf.c > > > @@ -48,6 +48,20 @@ > > > =20 > > > #define NETNS_RUN_DIR "/run/netns" > > > =20 > > > +#define IP4_LL_GUEST_ADDR (struct in_addr){ htonl_constant(0xa9fe020= 1) } > > > + /* 169.254.2.1, libslirp default: 10.0.2.1 */ > > > + > > > +#define IP4_LL_GUEST_GW (struct in_addr){ htonl_constant(0xa9fe0202= ) } > > > + /* 169.254.2.2, libslirp default: 10.0.2.2 */ > > > + > > > +#define IP4_LL_PREFIX_LEN 16 > > > + > > > +#define IP6_LL_GUEST_GW (struct in6_addr) \ > > > + {{{ 0xfe, 0x80, 0, 0, 0, 0, 0, 0, \ > > > + 0, 0, 0, 0, 0, 0, 0, 0x01 }}} > > > + > > > +const char *pasta_default_ifn =3D "tap0"; =20 > >=20 > > Not sure I like this as a default name, though I guess it's fine. It > > kind of exposes the underlying mechanisms we're using in a way that's > > not really necessary. Maybe just call it "pasta" or "pasta0"? >=20 > That's the default in slirp4netns, and if we have a slight chance of > being slightly more compatible, I'd pick that over proving a point or > being correct. Ok, that seems a good enough reason for "tap0". > > > + > > > /** > > > * next_chunk - Return the next piece of a string delimited by a cha= racter > > > * @s: String to search > > > @@ -631,7 +645,7 @@ static unsigned int conf_ip4(unsigned int ifi, st= ruct ip4_ctx *ip4) > > > ifi =3D nl_get_ext_if(nl_sock, AF_INET); > > > =20 > > > if (!ifi) { > > > - info("Couldn't pick external interface: disabling IPv4"); > > > + debug("Failed to detect external interface for IPv4"); > > > return 0; > > > } > > > =20 > > > @@ -639,8 +653,8 @@ static unsigned int conf_ip4(unsigned int ifi, st= ruct ip4_ctx *ip4) > > > int rc =3D nl_route_get_def(nl_sock, ifi, AF_INET, > > > &ip4->guest_gw); > > > if (rc < 0) { > > > - err("Couldn't discover IPv4 gateway address: %s", > > > - strerror(-rc)); > > > + debug("Couldn't discover IPv4 gateway address: %s", > > > + strerror(-rc)); > > > return 0; > > > } > > > } > > > @@ -649,8 +663,8 @@ static unsigned int conf_ip4(unsigned int ifi, st= ruct ip4_ctx *ip4) > > > int rc =3D nl_addr_get(nl_sock, ifi, AF_INET, > > > &ip4->addr, &ip4->prefix_len, NULL); > > > if (rc < 0) { > > > - err("Couldn't discover IPv4 address: %s", > > > - strerror(-rc)); > > > + debug("Couldn't discover IPv4 address: %s", > > > + strerror(-rc)); > > > return 0; > > > } > > > } > > > @@ -677,6 +691,19 @@ static unsigned int conf_ip4(unsigned int ifi, s= truct ip4_ctx *ip4) > > > return ifi; > > > } > > > =20 > > > +/** > > > + * conf_ip4_local() - Configure IPv4 addresses and attributes for lo= cal mode > > > + * @ip4: IPv4 context (will be written) > > > + */ > > > +static void conf_ip4_local(struct ip4_ctx *ip4) > > > +{ > > > + ip4->addr_seen =3D ip4->addr =3D IP4_LL_GUEST_ADDR; > > > + ip4->our_tap_addr =3D ip4->guest_gw =3D IP4_LL_GUEST_GW; > > > + ip4->prefix_len =3D IP4_LL_PREFIX_LEN; > > > + > > > + ip4->no_copy_addrs =3D ip4->no_copy_routes =3D true; > > > +} > > > + > > > /** > > > * conf_ip6() - Verify or detect IPv6 support, get relevant addresses > > > * @ifi: Host interface to attempt (0 to determine one) > > > @@ -693,15 +720,15 @@ static unsigned int conf_ip6(unsigned int ifi, = struct ip6_ctx *ip6) > > > ifi =3D nl_get_ext_if(nl_sock, AF_INET6); > > > =20 > > > if (!ifi) { > > > - info("Couldn't pick external interface: disabling IPv6"); > > > + debug("Failed to detect external interface for IPv6"); > > > return 0; > > > } > > > =20 > > > if (IN6_IS_ADDR_UNSPECIFIED(&ip6->guest_gw)) { > > > rc =3D nl_route_get_def(nl_sock, ifi, AF_INET6, &ip6->guest_gw); > > > if (rc < 0) { > > > - err("Couldn't discover IPv6 gateway address: %s", > > > - strerror(-rc)); > > > + debug("Couldn't discover IPv6 gateway address: %s", > > > + strerror(-rc)); > > > return 0; > > > } > > > } > > > @@ -710,7 +737,7 @@ static unsigned int conf_ip6(unsigned int ifi, st= ruct ip6_ctx *ip6) > > > IN6_IS_ADDR_UNSPECIFIED(&ip6->addr) ? &ip6->addr : NULL, > > > &prefix_len, &ip6->our_tap_ll); > > > if (rc < 0) { > > > - err("Couldn't discover IPv6 address: %s", strerror(-rc)); > > > + debug("Couldn't discover IPv6 address: %s", strerror(-rc)); > > > return 0; > > > } > > > =20 > > > @@ -726,6 +753,17 @@ static unsigned int conf_ip6(unsigned int ifi, s= truct ip6_ctx *ip6) > > > return ifi; > > > } > > > =20 > > > +/** > > > + * conf_ip6_local() - Configure IPv6 addresses and attributes for lo= cal mode > > > + * @ip6: IPv6 context (will be written) > > > + */ > > > +static void conf_ip6_local(struct ip6_ctx *ip6) > > > +{ > > > + ip6->our_tap_ll =3D ip6->guest_gw =3D IP6_LL_GUEST_GW; > > > + > > > + ip6->no_copy_addrs =3D ip6->no_copy_routes =3D true; > > > +} > > > + > > > /** > > > * usage() - Print usage, exit with given status code > > > * @name: Executable name > > > @@ -948,12 +986,14 @@ static void conf_print(const struct ctx *c) > > > char bufmac[ETH_ADDRSTRLEN], ifn[IFNAMSIZ]; > > > int i; > > > =20 > > > - info("Template interface: %s%s%s%s%s", > > > - c->ifi4 ? if_indextoname(c->ifi4, ifn) : "", > > > - c->ifi4 ? " (IPv4)" : "", > > > - (c->ifi4 && c->ifi6) ? ", " : "", > > > - c->ifi6 ? if_indextoname(c->ifi6, ifn) : "", > > > - c->ifi6 ? " (IPv6)" : ""); > > > + if (c->ifi4 > 0 || c->ifi6 > 0) { > > > + info("Template interface: %s%s%s%s%s", > > > + c->ifi4 > 0 ? if_indextoname(c->ifi4, ifn) : "", > > > + c->ifi4 > 0 ? " (IPv4)" : "", > > > + (c->ifi4 && c->ifi6) ? ", " : "", > > > + c->ifi6 > 0 ? if_indextoname(c->ifi6, ifn) : "", > > > + c->ifi6 > 0 ? " (IPv6)" : ""); > > > + } > > > =20 > > > if (*c->ip4.ifname_out || *c->ip6.ifname_out) { > > > info("Outbound interface: %s%s%s%s%s", > > > @@ -1024,9 +1064,9 @@ static void conf_print(const struct ctx *c) > > > =20 > > > if (!c->no_ndp && !c->no_dhcpv6) > > > info("NDP/DHCPv6:"); > > > - else if (!c->no_ndp) > > > - info("DHCPv6:"); > > > else if (!c->no_dhcpv6) > > > + info("DHCPv6:"); > > > + else if (!c->no_ndp) > > > info("NDP:"); > > > else > > > goto dns6; > > > @@ -1735,8 +1775,20 @@ void conf(struct ctx *c, int argc, char **argv) > > > c->ifi6 =3D conf_ip6(ifi6, &c->ip6); > > > if ((!c->ifi4 && !c->ifi6) || > > > (*c->ip4.ifname_out && !c->ifi4) || > > > - (*c->ip6.ifname_out && !c->ifi6)) > > > - die("External interface not usable"); =20 > >=20 > > I guess a question is if the host has IPv4 but no IPv6 connectivity, > > do we want to disable IPv6 in the guest, or configure local-mode IPv6? > > That is something we can probably change without too much danger later > > on. >=20 > I think we want to disable it by default, because the whole point here > is about permanently or temporarily disconnected setups, not what IP > versions are enabled on the host. If IPv4 is there, it's connected. Ok, that's reasonable. I don't think it should be too bad to change it later if we want to. > > > + (*c->ip6.ifname_out && !c->ifi6)) { > > > + info("No external interface as template, switch to local mode"); > > > + > > > + conf_ip4_local(&c->ip4); > > > + c->ifi4 =3D -1; > > > + > > > + conf_ip6_local(&c->ip6); > > > + c->ifi6 =3D -1; > > > + > > > + if (!*c->pasta_ifn) { > > > + strncpy(c->pasta_ifn, pasta_default_ifn, > > > + sizeof(c->pasta_ifn) - 1); > > > + } > > > + } > > > =20 > > > if (c->ifi4 && !no_map_gw && > > > IN4_IS_ADDR_UNSPECIFIED(&c->ip4.map_host_loopback)) > > > @@ -1840,6 +1892,8 @@ void conf(struct ctx *c, int argc, char **argv) > > > if (!c->ifi6) { > > > c->no_ndp =3D 1; > > > c->no_dhcpv6 =3D 1; > > > + } else if (IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr)) { > > > + c->no_dhcpv6 =3D 1; > > > } > > > =20 > > > if (!c->mtu) > > > diff --git a/passt.1 b/passt.1 > > > index f084978..f5cf8a4 100644 > > > --- a/passt.1 > > > +++ b/passt.1 > > > @@ -160,7 +160,9 @@ once for IPv6). > > > By default, assigned IPv4 and IPv6 addresses are taken from the host= interfaces > > > with the first default route, if any, for the corresponding IP versi= on. If no > > > default routes are available and there is any interface with any rou= te for a > > > -given IP version, the first of these interfaces will be chosen inste= ad. > > > +given IP version, the first of these interfaces will be chosen inste= ad. If no > > > +such interface exists, the link-local address 169.254.2.1 is assigne= d for IPv4, > > > +and no additional address will be assigned for IPv6. > > > =20 > > > .TP > > > .BR \-n ", " \-\-netmask " " \fImask > > > @@ -188,7 +190,9 @@ first default route, if any, for the correspondin= g IP version. If the default > > > route is a multipath one, the gateway is the first nexthop router re= turned by > > > the kernel which has the highest weight in the set of paths. If no d= efault > > > routes are available and there is just one interface with any route,= that > > > -interface will be chosen instead. > > > +interface will be chosen instead. If no such interface exists, the l= ink-local > > > +address 169.254.2.2 is used for IPv4, and the link-local address fe8= 0::1 is used > > > +for IPv6. > > > =20 > > > Note: these addresses are also used as source address for packets di= rected to > > > the guest or to the target namespace having a loopback or local sour= ce address, > > > @@ -203,7 +207,9 @@ Default is to use the interfaces specified by \fB= --outbound-if4\fR and > > > =20 > > > If no interfaces are given, the interface with the first default rou= tes for each > > > IP version is selected. If no default routes are available and there= is just one > > > -interface with any route, that interface will be chosen instead. > > > +interface with any route, that interface will be chosen instead. If = no such > > > +interface exists, host interfaces will be ignored for the purposes o= f assigning > > > +addresses and routes, and link-local addresses will be used instead. > > > =20 > > > .TP > > > .BR \-o ", " \-\-outbound " " \fIaddr > > > @@ -222,7 +228,8 @@ derive IPv4 addresses and routes. > > > =20 > > > By default, the interface given by the default route is selected. If= no default > > > routes are available and there is just one interface with any route,= that > > > -interface will be chosen instead. > > > +interface will be chosen instead. If no such interface exists, outbo= und sockets > > > +will not be bound to any specific interface. > > > =20 > > > .TP > > > .BR \-\-outbound-if6 " " \fIname > > > @@ -232,7 +239,8 @@ derive IPv6 addresses and routes. > > > =20 > > > By default, the interface given by the default route is selected. If= no default > > > routes are available and there is just one interface with any route,= that > > > -interface will be chosen instead. > > > +interface will be chosen instead. If no such interface exists, outbo= und sockets > > > +will not be bound to any specific interface. > > > =20 > > > .TP > > > .BR \-D ", " \-\-dns " " \fIaddr > > > @@ -504,6 +512,7 @@ Default is \fBnone\fR. > > > .BR \-I ", " \-\-ns-ifname " " \fIname > > > Name of tap interface to be created in target namespace. > > > By default, the same interface name as the external, routable interf= ace is used. > > > +If no such interface exists, the name \fItap0\fR will be used instea= d. > > > =20 > > > .TP > > > .BR \-t ", " \-\-tcp-ports " " \fIspec > > > @@ -1032,6 +1041,20 @@ If the sending window cannot be queried, it wi= ll always be announced as the > > > current sending buffer size to guest or target namespace. This might= affect > > > throughput of TCP connections. > > > =20 > > > +.SS Local mode for disconnected setups > > > + > > > +If \fBpasst\fR and \fBpasta\fR fail to find a host interface with a = configured > > > +address, other than loopback addresses, they will, obviously, not at= tempt to > > > +source addresses or routes from the host. > > > + > > > +In this case, unless configured otherwise, they will assign the IPv4= link-local > > > +address 169.254.2.1 to the guest or target namespace, and no IPv6 ad= dress. The > > > +notion of the guest or target namespace IPv6 address is derived from= the first > > > +link-local address observed. > > > + > > > +Default gateways will be assigned as the link-local address 169.254.= 2.2 for > > > +IPv4, and as the link-local address fe80::1 for IPv6. > > > + > > > .SH LIMITATIONS > > > =20 > > > Currently, IGMP/MLD proxying (RFC 4605) and support for SCTP (RFC 49= 60) are not > > > diff --git a/passt.h b/passt.h > > > index 72c7f72..799ee50 100644 > > > --- a/passt.h > > > +++ b/passt.h > > > @@ -202,10 +202,10 @@ struct ip6_ctx { > > > * @our_tap_mac: Pasta/passt's MAC on the tap link > > > * @guest_mac: MAC address of guest or namespace, seen or configured > > > * @hash_secret: 128-bit secret for siphash functions > > > - * @ifi4: Index of template interface for IPv4, 0 if IPv4 disabled > > > + * @ifi4: Template interface for IPv4, -1: none, 0: IPv4 disabled > > > * @ip: IPv4 configuration > > > * @dns_search: DNS search list > > > - * @ifi6: Index of template interface for IPv6, 0 if IPv6 disabled > > > + * @ifi6: Template interface for IPv6, -1: none, 0: IPv6 disabled > > > * @ip6: IPv6 configuration > > > * @pasta_ifn: Name of namespace interface for pasta > > > * @pasta_ifi: Index of namespace interface for pasta > > > @@ -258,12 +258,12 @@ struct ctx { > > > unsigned char guest_mac[ETH_ALEN]; > > > uint64_t hash_secret[2]; > > > =20 > > > - unsigned int ifi4; > > > + int ifi4; > > > struct ip4_ctx ip4; > > > =20 > > > struct fqdn dns_search[MAXDNSRCH]; > > > =20 > > > - unsigned int ifi6; > > > + int ifi6; > > > struct ip6_ctx ip6; > > > =20 > > > char pasta_ifn[IF_NAMESIZE]; > > > diff --git a/pasta.c b/pasta.c > > > index a117704..96dacc3 100644 > > > --- a/pasta.c > > > +++ b/pasta.c > > > @@ -369,8 +369,11 @@ void pasta_ns_conf(struct ctx *c) > > > 0, IFF_NOARP); > > > =20 > > > if (c->ip6.no_copy_addrs) { > > > - rc =3D nl_addr_set(nl_sock_ns, c->pasta_ifi, > > > - AF_INET6, &c->ip6.addr, 64); > > > + if (!IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr)) { > > > + rc =3D nl_addr_set(nl_sock_ns, > > > + c->pasta_ifi, AF_INET6, > > > + &c->ip6.addr, 64); > > > + } > > > } else { > > > rc =3D nl_addr_dup(nl_sock, c->ifi6, > > > nl_sock_ns, c->pasta_ifi, > > > diff --git a/tap.c b/tap.c > > > index 14d9b3d..5347df4 100644 > > > --- a/tap.c > > > +++ b/tap.c > > > @@ -803,6 +803,9 @@ resume: > > > if (IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr_seen)) { > > > c->ip6.addr_seen =3D *saddr; > > > } > > > + > > > + if (IN6_IS_ADDR_UNSPECIFIED(&c->ip6.addr)) > > > + c->ip6.addr =3D *saddr; =20 > >=20 > > Hmm.. not entirely sure if this is a good idea, or whether we should > > instead keep the assigned address blank as an indication that we never > > assigned something, the guest just picked for itself. >=20 > If you keep this blank, mapping mechanisms don't work as intended > anymore. Ah, --map-guest-addr specifically. > In v1, this was consistent with IPv4 as we always had a fixed address, > fe80::2. But we don't need to invent a particular address to assign to > the guest for IPv6, so we want to effectively behave as if we assigned > whatever the guest already picked. Ok. Good enough for the time being, anyway. So, comments considered Reviewed-by: David Gibson >=20 > > > } else if (!IN6_IS_ADDR_UNSPECIFIED(saddr)){ > > > c->ip6.addr_seen =3D *saddr; > > > } =20 >=20 --=20 David Gibson (he or they) | I'll have my music baroque, and my code david AT gibson.dropbear.id.au | minimalist, thank you, not the other way | around. http://www.ozlabs.org/~dgibson --pd4vV/amBx9jhXcu Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEO+dNsU4E3yXUXRK2zQJF27ox2GcFAmdFXJEACgkQzQJF27ox 2GdX1w/8DNFjpeQUuqGxEo0fced0eim3t/uvE/luPsIbLPZR1XggpyO+KpNFVqHK f7QtRKPtni0+qZjca81q3P0wUe1iObfJOywO89xy8nC7tH3MTgkURdKNQNo0FEow NhYU8TlmgjMxOkf69xOOjDMEdPbAc5MGdPvON+yp3tcPx/j+/o6O7Em7Wjxze2Nw T5k2IkvdkIt+PRdDA3Tl+mpKgFaGY2OpkUM5HHz8i4y4QTBjOrOfM4xNLMU74TIb WoWGXVzKJiKKDkJJoKk8ryudYUthg5yWWgXax9lGkTZ5IYDIGoayZMb5gCXP5r5b xDbF1K9yWcVXxtOL86VLpPc9nMhihSiw8FohaqRN1C7Mq9BZ9U8efp63D+Y2Agu7 qYV5XP1iiMgpsE3DP8iiUmJsilSoD7I40lglrIqPco8lf2DyRBFA0maCEfGr4fst eb9507eO/KZ8ZVrwWS9Xaj/WMvxlS/Hfct4BbdLwK+f+s8b/c0lhCBrHz6l+ucPt ARg0lq2DoRrHC6ie8T6fyx1batEBFXeexrjdMUYUX0ziNj9bpMBfsj0FW4orDXwB CAXZK/1zbqXwvozmsg1FFx41REZiUYbuf6Y8c37nOnr3VsKhYKLRMhbecL4Ty/Rx Y+24LXOQbxU/vH+rJrlG7zEfRawYMhJQ+QbDp5JzYocIaWgYF04= =SV+k -----END PGP SIGNATURE----- --pd4vV/amBx9jhXcu--