* [PATCH v3] pasta: make it possible to disable socket splicing
@ 2024-12-03 21:53 Jon Maloy
2024-12-03 22:07 ` Stefano Brivio
` (2 more replies)
0 siblings, 3 replies; 5+ messages in thread
From: Jon Maloy @ 2024-12-03 21:53 UTC (permalink / raw)
To: passt-dev, sbrivio, lvivier, dgibson, jmaloy
During testing it is sometimes useful to force traffic which would
normally be forwared by socket splicing through the tap interface.
In this commit, we add a command switch enabling such funtionality
for inbound local traffic.
For outbound local traffic this is much trickier, if even possible,
so leave that for a later commit.
Suggested-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Jon Maloy <jmaloy@redhat.com>
---
v2: Some minor changes based on feedback from PASST team
v3: More changes based on feedback from D. Gibson and S. Brivio
-Moved new option to pasta-only section
-Added description to man-page
---
conf.c | 7 ++++++-
fwd.c | 2 +-
passt.1 | 4 ++++
passt.h | 2 ++
4 files changed, 13 insertions(+), 2 deletions(-)
diff --git a/conf.c b/conf.c
index eaa7d99..53f6770 100644
--- a/conf.c
+++ b/conf.c
@@ -977,7 +977,8 @@ pasta_opts:
" Don't copy all routes to namespace\n"
" --no-copy-addrs DEPRECATED:\n"
" Don't copy all addresses to namespace\n"
- " --ns-mac-addr ADDR Set MAC address on tap interface\n");
+ " --ns-mac-addr ADDR Set MAC address on tap interface\n"
+ " --no-splice Disable inbound socket splicing\n");
exit(status);
}
@@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv)
{"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 },
{"no-ndp", no_argument, &c->no_ndp, 1 },
{"no-ra", no_argument, &c->no_ra, 1 },
+ {"no-splice", no_argument, &c->no_splice, 1 },
{"freebind", no_argument, &c->freebind, 1 },
{"no-map-gw", no_argument, &no_map_gw, 1 },
{"ipv4-only", no_argument, NULL, '4' },
@@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv)
}
} while (name != -1);
+ if (c->mode == MODE_PASST)
+ c->no_splice = 1;
+
if (c->mode == MODE_PASTA && !c->pasta_conf_ns) {
if (copy_routes_opt)
die("--no-copy-routes needs --config-net");
diff --git a/fwd.c b/fwd.c
index 0b7f8b1..2829cd2 100644
--- a/fwd.c
+++ b/fwd.c
@@ -443,7 +443,7 @@ uint8_t fwd_nat_from_host(const struct ctx *c, uint8_t proto,
else if (proto == IPPROTO_UDP)
tgt->eport += c->udp.fwd_in.delta[tgt->eport];
- if (c->mode == MODE_PASTA && inany_is_loopback(&ini->eaddr) &&
+ if (!c->no_splice && inany_is_loopback(&ini->eaddr) &&
(proto == IPPROTO_TCP || proto == IPPROTO_UDP)) {
/* spliceable */
diff --git a/passt.1 b/passt.1
index b2896a2..c8a5783 100644
--- a/passt.1
+++ b/passt.1
@@ -695,6 +695,10 @@ Configure MAC address \fIaddr\fR on the tap interface in the namespace.
Default is to let the tap driver build a pseudorandom hardware address.
+.TP
+.BR \-\-no-splice
+Disable socket splicing for host to NS traffic.
+
.SH EXAMPLES
.SS \fBpasta
diff --git a/passt.h b/passt.h
index c038630..0dd4efa 100644
--- a/passt.h
+++ b/passt.h
@@ -229,6 +229,7 @@ struct ip6_ctx {
* @no_dhcpv6: Disable DHCPv6 server
* @no_ndp: Disable NDP handler altogether
* @no_ra: Disable router advertisements
+ * @no_splice: Disable socket splicing for inbound traffic
* @host_lo_to_ns_lo: Map host loopback addresses to ns loopback addresses
* @freebind: Allow binding of non-local addresses for forwarding
* @low_wmem: Low probed net.core.wmem_max
@@ -291,6 +292,7 @@ struct ctx {
int no_dhcpv6;
int no_ndp;
int no_ra;
+ int no_splice;
int host_lo_to_ns_lo;
int freebind;
--
@@ -229,6 +229,7 @@ struct ip6_ctx {
* @no_dhcpv6: Disable DHCPv6 server
* @no_ndp: Disable NDP handler altogether
* @no_ra: Disable router advertisements
+ * @no_splice: Disable socket splicing for inbound traffic
* @host_lo_to_ns_lo: Map host loopback addresses to ns loopback addresses
* @freebind: Allow binding of non-local addresses for forwarding
* @low_wmem: Low probed net.core.wmem_max
@@ -291,6 +292,7 @@ struct ctx {
int no_dhcpv6;
int no_ndp;
int no_ra;
+ int no_splice;
int host_lo_to_ns_lo;
int freebind;
--
2.45.2
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH v3] pasta: make it possible to disable socket splicing
2024-12-03 21:53 [PATCH v3] pasta: make it possible to disable socket splicing Jon Maloy
@ 2024-12-03 22:07 ` Stefano Brivio
2024-12-04 2:09 ` David Gibson
2024-12-05 20:06 ` Stefano Brivio
2 siblings, 0 replies; 5+ messages in thread
From: Stefano Brivio @ 2024-12-03 22:07 UTC (permalink / raw)
To: Jon Maloy; +Cc: passt-dev, lvivier, dgibson
On Tue, 3 Dec 2024 16:53:02 -0500
Jon Maloy <jmaloy@redhat.com> wrote:
> diff --git a/passt.1 b/passt.1
> index b2896a2..c8a5783 100644
> --- a/passt.1
> +++ b/passt.1
> @@ -695,6 +695,10 @@ Configure MAC address \fIaddr\fR on the tap interface in the namespace.
>
> Default is to let the tap driver build a pseudorandom hardware address.
>
> +.TP
> +.BR \-\-no-splice
> +Disable socket splicing for host to NS traffic.
It's not necessarily clear to users what "NS" is: we never use it in
the man page. To keep this quick, if you agree, I would fix this up on
merge with:
.TP
.BR \-\-no-splice
Disable the bypass path for inbound, local traffic. See the section \fBHandling
of local traffic in pasta\fR in the \fBNOTES\fR for more details.
Everything else looks good to me.
--
Stefano
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v3] pasta: make it possible to disable socket splicing
2024-12-03 21:53 [PATCH v3] pasta: make it possible to disable socket splicing Jon Maloy
2024-12-03 22:07 ` Stefano Brivio
@ 2024-12-04 2:09 ` David Gibson
2024-12-05 20:06 ` Stefano Brivio
2 siblings, 0 replies; 5+ messages in thread
From: David Gibson @ 2024-12-04 2:09 UTC (permalink / raw)
To: Jon Maloy; +Cc: passt-dev, sbrivio, lvivier, dgibson
[-- Attachment #1: Type: text/plain, Size: 4071 bytes --]
On Tue, Dec 03, 2024 at 04:53:02PM -0500, Jon Maloy wrote:
> During testing it is sometimes useful to force traffic which would
> normally be forwared by socket splicing through the tap interface.
>
> In this commit, we add a command switch enabling such funtionality
> for inbound local traffic.
>
> For outbound local traffic this is much trickier, if even possible,
> so leave that for a later commit.
>
> Suggested-by: David Gibson <david@gibson.dropbear.id.au>
> Signed-off-by: Jon Maloy <jmaloy@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
With the exception that I second Stefano's suggestion to improve the
text in the man page.
>
> ---
> v2: Some minor changes based on feedback from PASST team
> v3: More changes based on feedback from D. Gibson and S. Brivio
> -Moved new option to pasta-only section
> -Added description to man-page
> ---
> conf.c | 7 ++++++-
> fwd.c | 2 +-
> passt.1 | 4 ++++
> passt.h | 2 ++
> 4 files changed, 13 insertions(+), 2 deletions(-)
>
> diff --git a/conf.c b/conf.c
> index eaa7d99..53f6770 100644
> --- a/conf.c
> +++ b/conf.c
> @@ -977,7 +977,8 @@ pasta_opts:
> " Don't copy all routes to namespace\n"
> " --no-copy-addrs DEPRECATED:\n"
> " Don't copy all addresses to namespace\n"
> - " --ns-mac-addr ADDR Set MAC address on tap interface\n");
> + " --ns-mac-addr ADDR Set MAC address on tap interface\n"
> + " --no-splice Disable inbound socket splicing\n");
>
> exit(status);
> }
> @@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv)
> {"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 },
> {"no-ndp", no_argument, &c->no_ndp, 1 },
> {"no-ra", no_argument, &c->no_ra, 1 },
> + {"no-splice", no_argument, &c->no_splice, 1 },
> {"freebind", no_argument, &c->freebind, 1 },
> {"no-map-gw", no_argument, &no_map_gw, 1 },
> {"ipv4-only", no_argument, NULL, '4' },
> @@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv)
> }
> } while (name != -1);
>
> + if (c->mode == MODE_PASST)
> + c->no_splice = 1;
> +
> if (c->mode == MODE_PASTA && !c->pasta_conf_ns) {
> if (copy_routes_opt)
> die("--no-copy-routes needs --config-net");
> diff --git a/fwd.c b/fwd.c
> index 0b7f8b1..2829cd2 100644
> --- a/fwd.c
> +++ b/fwd.c
> @@ -443,7 +443,7 @@ uint8_t fwd_nat_from_host(const struct ctx *c, uint8_t proto,
> else if (proto == IPPROTO_UDP)
> tgt->eport += c->udp.fwd_in.delta[tgt->eport];
>
> - if (c->mode == MODE_PASTA && inany_is_loopback(&ini->eaddr) &&
> + if (!c->no_splice && inany_is_loopback(&ini->eaddr) &&
> (proto == IPPROTO_TCP || proto == IPPROTO_UDP)) {
> /* spliceable */
>
> diff --git a/passt.1 b/passt.1
> index b2896a2..c8a5783 100644
> --- a/passt.1
> +++ b/passt.1
> @@ -695,6 +695,10 @@ Configure MAC address \fIaddr\fR on the tap interface in the namespace.
>
> Default is to let the tap driver build a pseudorandom hardware address.
>
> +.TP
> +.BR \-\-no-splice
> +Disable socket splicing for host to NS traffic.
> +
> .SH EXAMPLES
>
> .SS \fBpasta
> diff --git a/passt.h b/passt.h
> index c038630..0dd4efa 100644
> --- a/passt.h
> +++ b/passt.h
> @@ -229,6 +229,7 @@ struct ip6_ctx {
> * @no_dhcpv6: Disable DHCPv6 server
> * @no_ndp: Disable NDP handler altogether
> * @no_ra: Disable router advertisements
> + * @no_splice: Disable socket splicing for inbound traffic
> * @host_lo_to_ns_lo: Map host loopback addresses to ns loopback addresses
> * @freebind: Allow binding of non-local addresses for forwarding
> * @low_wmem: Low probed net.core.wmem_max
> @@ -291,6 +292,7 @@ struct ctx {
> int no_dhcpv6;
> int no_ndp;
> int no_ra;
> + int no_splice;
> int host_lo_to_ns_lo;
> int freebind;
>
--
David Gibson (he or they) | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you, not the other way
| around.
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v3] pasta: make it possible to disable socket splicing
2024-12-03 21:53 [PATCH v3] pasta: make it possible to disable socket splicing Jon Maloy
2024-12-03 22:07 ` Stefano Brivio
2024-12-04 2:09 ` David Gibson
@ 2024-12-05 20:06 ` Stefano Brivio
2024-12-05 22:34 ` David Gibson
2 siblings, 1 reply; 5+ messages in thread
From: Stefano Brivio @ 2024-12-05 20:06 UTC (permalink / raw)
To: Jon Maloy; +Cc: passt-dev, lvivier, dgibson
On Tue, 3 Dec 2024 16:53:02 -0500
Jon Maloy <jmaloy@redhat.com> wrote:
> During testing it is sometimes useful to force traffic which would
> normally be forwared by socket splicing through the tap interface.
>
> In this commit, we add a command switch enabling such funtionality
> for inbound local traffic.
>
> For outbound local traffic this is much trickier, if even possible,
> so leave that for a later commit.
>
> Suggested-by: David Gibson <david@gibson.dropbear.id.au>
> Signed-off-by: Jon Maloy <jmaloy@redhat.com>
>
> ---
> v2: Some minor changes based on feedback from PASST team
> v3: More changes based on feedback from D. Gibson and S. Brivio
> -Moved new option to pasta-only section
> -Added description to man-page
> ---
> conf.c | 7 ++++++-
> fwd.c | 2 +-
> passt.1 | 4 ++++
> passt.h | 2 ++
> 4 files changed, 13 insertions(+), 2 deletions(-)
>
> diff --git a/conf.c b/conf.c
> index eaa7d99..53f6770 100644
> --- a/conf.c
> +++ b/conf.c
> @@ -977,7 +977,8 @@ pasta_opts:
> " Don't copy all routes to namespace\n"
> " --no-copy-addrs DEPRECATED:\n"
> " Don't copy all addresses to namespace\n"
> - " --ns-mac-addr ADDR Set MAC address on tap interface\n");
> + " --ns-mac-addr ADDR Set MAC address on tap interface\n"
> + " --no-splice Disable inbound socket splicing\n");
>
> exit(status);
> }
> @@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv)
> {"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 },
> {"no-ndp", no_argument, &c->no_ndp, 1 },
> {"no-ra", no_argument, &c->no_ra, 1 },
> + {"no-splice", no_argument, &c->no_splice, 1 },
> {"freebind", no_argument, &c->freebind, 1 },
> {"no-map-gw", no_argument, &no_map_gw, 1 },
> {"ipv4-only", no_argument, NULL, '4' },
> @@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv)
> }
> } while (name != -1);
>
> + if (c->mode == MODE_PASST)
> + c->no_splice = 1;
Oops, sorry, I missed this during review, but tests caught it: this
needs to be if (c->mode != MODE_PASTA) to also include the MODE_VU
case, otherwise:
> +
> if (c->mode == MODE_PASTA && !c->pasta_conf_ns) {
> if (copy_routes_opt)
> die("--no-copy-routes needs --config-net");
> diff --git a/fwd.c b/fwd.c
> index 0b7f8b1..2829cd2 100644
> --- a/fwd.c
> +++ b/fwd.c
> @@ -443,7 +443,7 @@ uint8_t fwd_nat_from_host(const struct ctx *c, uint8_t proto,
> else if (proto == IPPROTO_UDP)
> tgt->eport += c->udp.fwd_in.delta[tgt->eport];
>
> - if (c->mode == MODE_PASTA && inany_is_loopback(&ini->eaddr) &&
> + if (!c->no_splice && inany_is_loopback(&ini->eaddr) &&
...this becomes true, and we eventually hit tcp_splice_conn_from_sock()
with passt in vhost-user mode.
> (proto == IPPROTO_TCP || proto == IPPROTO_UDP)) {
> /* spliceable */
Tests fail here (240 columns wide, you might need to copy and paste this):
guest$ which socat ip jq >/dev/null │Starting tests in file: passt_vu_in_ns/tcp
guest$ socat -u TCP4-LISTEN:10001 OPEN:test_big.bin,create,trunc │
guest$ cmp test_big.bin /root/big.bin │Starting test: TCP/IPv4: host to guest: big transfer
guest$ socat -u OPEN:/root/big.bin TCP4:192.0.2.1:10003 │...passed.
guest$ socat -u OPEN:/root/big.bin TCP4:192.0.2.2:10002 │
guest$ socat -u TCP4-LISTEN:10001 OPEN:test_big.bin,create,trunc │Starting test: TCP/IPv4: host to ns (spliced): big transfer
│? cmp /tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_ns_big.bin /home/sbrivio/passt/test/big.bin
==> /home/sbrivio/passt/test/test_logs/context_qemu.log <== │...passed.
qemu-system-x86_64: Failed to set msg fds. │
qemu-system-x86_64: vhost VQ 0 ring restore failed: -22: Invalid argument (22) │Starting test: TCP/IPv4: guest to host: big transfer
qemu-system-x86_64: Failed to set msg fds. │? cmp /tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_big.bin /home/sbrivio/passt/test/big.bin
qemu-system-x86_64: vhost VQ 1 ring restore failed: -22: Invalid argument (22) │...passed.
│
──guest────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤Starting test: TCP/IPv4: guest to ns: big transfer
enp9s0 │? cmp /tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_ns_big.bin /home/sbrivio/passt/test/big.bin
ns$ ip addr add 192.0.2.1/32 dev enp9s0 │...passed.
ns$ ip addr del 192.0.2.1/32 dev enp9s0 │
ns$ ip addr add 2001:db8::1 dev enp9s0 && sleep 2 │Starting test: TCP/IPv4: ns to host (spliced): big transfer
ns$ ip addr del 2001:db8::1 dev enp9s0 │? cmp /tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_big.bin /home/sbrivio/passt/test/big.bin
ns$ which socat ip jq >/dev/null │...passed.
ns$ socat -u TCP4-LISTEN:10002 OPEN:/tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_ns_big.bin,create,trunc │
ns$ socat -u TCP4-LISTEN:10002 OPEN:/tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_ns_big.bin,create,trunc │Starting test: TCP/IPv4: ns to host (via tap): big transfer
ns$ socat -u OPEN:/home/sbrivio/passt/test/big.bin TCP4:127.0.0.1:10003 │? cmp /tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_big.bin /home/sbrivio/passt/test/big.bin
ns$ socat -u OPEN:/home/sbrivio/passt/test/big.bin TCP4:192.0.2.1:10003 │...passed.
ns$ socat -u OPEN:/home/sbrivio/passt/test/big.bin TCP4:127.0.0.1:10001 │
2024/12/05 20:46:19 socat[4796] E write(7, 0x564e4d181000, 8192): Connection reset by peer │Starting test: TCP/IPv4: ns to guest (using loopback address): big transfer
ns$ │
──namespace─────────────────────────────────────────────────────────────────────────────────────────────────────────────┬──────────────────┴──passt_vu_in_ns/tcp [7/32] - TCP/IPv4: ns to guest (using loopback address): big transfer──────────
/' │ 2a01:4ff:ff00::add:1
host$ ip -j -6 addr show|jq -rM '[.[] | select(.ifname == "enp9s0").addr_info[] | select(.scope == "global" and .depreca│You can start qemu with:
ted != true).local] | .[0]' │ kvm ... -chardev socket,id=chr0,path=/tmp/passt-tests-s5FGIm/passt_in_ns/passt.socket -netdev vhost-user,id=netdev0
2a01:4f8:222:904::2 │,chardev=chr0 -device virtio-net,netdev=netdev0 -object memory-backend-memfd,id=memfd0,share=on,size=$RAMSIZE -numa nod
host$ ip -j -6 route show|jq -rM '[.[] | select(.dst == "default").gateway] | .[0]' │e,memdev=memfd0
fe80::1 │
host$ sed -n 's/^nameserver \([^:]*:\)\([^%]*\).*//p' /etc/resolv.conf | tr ' │accepted connection from PID 4763
' ',' | sed 's/,$//;s/$/ │==4761== Warning: set address range perms: large range [0x59c8f000, 0x119c8f000) (defined)
/' │==4761== Warning: set address range perms: large range [0x119c8f000, 0x519c8f000) (defined)
2a01:4ff:ff00::add:2,2a01:4ff:ff00::add:1 │NDP: received RS, sending RA
host$ sed 's/\. / /g' /etc/resolv.conf | sed 's/\.$//g' | sed -n 's/^search \(.*\)//p' | tr ' │DHCP: offer to discover
' ',' | sed 's/,$//;s/$/ │ from 52:54:00:12:34:56
/' │DHCP: ack to request
host$ which socat ip jq >/dev/null │ from 52:54:00:12:34:56
host$ socat -u OPEN:/home/sbrivio/passt/test/big.bin TCP4:127.0.0.1:10001 │DHCPv6: received SOLICIT, sending ADVERTISE
host$ socat -u OPEN:/home/sbrivio/passt/test/big.bin TCP4:127.0.0.1:10002 │DHCPv6: received REQUEST/RENEW/CONFIRM, sending REPLY
host$ socat -u TCP4-LISTEN:10003 OPEN:/tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_big.bin,create,trunc │NDP: received NS, sending NA
host$ socat -u TCP4-LISTEN:10003 OPEN:/tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_big.bin,create,trunc │ASSERTION FAILED in tcp_splice_conn_from_sock (tcp_splice.c:428): c->mode == MODE_PASTA
host$ socat -u TCP4-LISTEN:10003 OPEN:/tmp/passt-tests-s5FGIm/passt_vu_in_ns/tcp/test_big.bin,create,trunc │Bad system call
host$ │
──host──────────────────────────────────────────────────────────────────────────────────────────────────────────────────┴──passt in pasta (namespace)───────────────────────────────────────────────────────────────────────────────────────────
Testing commit: bae9a55 udp_vu: update segment size PASS: 166 | FAIL: 0 | 2024-12-05T19:57:40+00:00
--
Stefano
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v3] pasta: make it possible to disable socket splicing
2024-12-05 20:06 ` Stefano Brivio
@ 2024-12-05 22:34 ` David Gibson
0 siblings, 0 replies; 5+ messages in thread
From: David Gibson @ 2024-12-05 22:34 UTC (permalink / raw)
To: Stefano Brivio; +Cc: Jon Maloy, passt-dev, lvivier, dgibson
[-- Attachment #1: Type: text/plain, Size: 2585 bytes --]
On Thu, Dec 05, 2024 at 09:06:26PM +0100, Stefano Brivio wrote:
> On Tue, 3 Dec 2024 16:53:02 -0500
> Jon Maloy <jmaloy@redhat.com> wrote:
>
> > During testing it is sometimes useful to force traffic which would
> > normally be forwared by socket splicing through the tap interface.
> >
> > In this commit, we add a command switch enabling such funtionality
> > for inbound local traffic.
> >
> > For outbound local traffic this is much trickier, if even possible,
> > so leave that for a later commit.
> >
> > Suggested-by: David Gibson <david@gibson.dropbear.id.au>
> > Signed-off-by: Jon Maloy <jmaloy@redhat.com>
> >
> > ---
> > v2: Some minor changes based on feedback from PASST team
> > v3: More changes based on feedback from D. Gibson and S. Brivio
> > -Moved new option to pasta-only section
> > -Added description to man-page
> > ---
> > conf.c | 7 ++++++-
> > fwd.c | 2 +-
> > passt.1 | 4 ++++
> > passt.h | 2 ++
> > 4 files changed, 13 insertions(+), 2 deletions(-)
> >
> > diff --git a/conf.c b/conf.c
> > index eaa7d99..53f6770 100644
> > --- a/conf.c
> > +++ b/conf.c
> > @@ -977,7 +977,8 @@ pasta_opts:
> > " Don't copy all routes to namespace\n"
> > " --no-copy-addrs DEPRECATED:\n"
> > " Don't copy all addresses to namespace\n"
> > - " --ns-mac-addr ADDR Set MAC address on tap interface\n");
> > + " --ns-mac-addr ADDR Set MAC address on tap interface\n"
> > + " --no-splice Disable inbound socket splicing\n");
> >
> > exit(status);
> > }
> > @@ -1319,6 +1320,7 @@ void conf(struct ctx *c, int argc, char **argv)
> > {"no-dhcpv6", no_argument, &c->no_dhcpv6, 1 },
> > {"no-ndp", no_argument, &c->no_ndp, 1 },
> > {"no-ra", no_argument, &c->no_ra, 1 },
> > + {"no-splice", no_argument, &c->no_splice, 1 },
> > {"freebind", no_argument, &c->freebind, 1 },
> > {"no-map-gw", no_argument, &no_map_gw, 1 },
> > {"ipv4-only", no_argument, NULL, '4' },
> > @@ -1756,6 +1758,9 @@ void conf(struct ctx *c, int argc, char **argv)
> > }
> > } while (name != -1);
> >
> > + if (c->mode == MODE_PASST)
> > + c->no_splice = 1;
>
> Oops, sorry, I missed this during review, but tests caught it: this
> needs to be if (c->mode != MODE_PASTA) to also include the MODE_VU
> case, otherwise:
Good point. Sorry I missed this on review.
--
David Gibson (he or they) | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you, not the other way
| around.
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2024-12-05 22:36 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-12-03 21:53 [PATCH v3] pasta: make it possible to disable socket splicing Jon Maloy
2024-12-03 22:07 ` Stefano Brivio
2024-12-04 2:09 ` David Gibson
2024-12-05 20:06 ` Stefano Brivio
2024-12-05 22:34 ` David Gibson
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).