public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: Laurent Vivier <lvivier@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>,
	passt-dev@passt.top, Stefano Brivio <sbrivio@redhat.com>
Subject: Re: [PATCH v3 03/11] conf: Allow user-specified auto-scanned port forwarding ranges
Date: Mon, 20 Apr 2026 16:45:24 +0200	[thread overview]
Message-ID: <da072b12-68db-4bbe-a6b5-4c67276738cb@redhat.com> (raw)
In-Reply-To: <20260417050520.102247-4-david@gibson.dropbear.id.au>

On 4/17/26 07:05, David Gibson wrote:
> The forwarding table now allows for arbitrary port ranges to be marked as
> FWD_SCAN, meaning we don't open sockets for every port, but only those we
> scan as listening on the target side.  However, there's currently no way
> to create such rules, except -[tTuU] auto which always scans every port
> with an unspecified listening address and interface.
> 
> Allow user-specified "auto" ranges by moving the parsing of the "auto"
> keyword from conf_ports(), to conf_ports_spec() as part of the port
> specified.  "auto" can be combined freely with other port ranges, e.g.
>      -t 127.0.0.1/auto
>      -u %lo/5000-7000,auto
>      -T auto,12345
>      -U auto,~1-9000
> 
> Note that any address and interface given only affects where the automatic
> forwards listen, not what addresses we consider when scanning.  That is,
> if the target side is listening on *any* address, we will create a forward
> on the specified address.
> 
> Link: https://bugs.passt.top/show_bug.cgi?id=180
> 
> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>

Reviewed-by: Laurent Vivier <lvivier@redhat.com>

With a minor cosmetic nit below

> ---
>   conf.c  | 85 ++++++++++++++++++++++++++++++++++++++++++---------------
>   passt.1 | 30 ++++++++++++++------
>   2 files changed, 85 insertions(+), 30 deletions(-)
> 
> diff --git a/conf.c b/conf.c
> index dacea182..33b96eac 100644
> --- a/conf.c
> +++ b/conf.c
> @@ -13,6 +13,7 @@
>    */
>   
>   #include <arpa/inet.h>
> +#include <ctype.h>
>   #include <errno.h>
>   #include <fcntl.h>
>   #include <getopt.h>
> @@ -112,6 +113,28 @@ static int parse_port_range(const char *s, const char **endptr,
>   	return 0;
>   }
>   
> +/**
> + * parse_keyword() - Parse a literal keyword
> + * @s:		String to parse
> + * @endptr:	Update to the character after the keyword
> + * @kw:		Keyword to accept
> + *
> + * Return: 0, if @s starts with @kw, -EINVAL if it does not
> + */
> +static int parse_keyword(const char *s, const char **endptr, const char *kw)
> +{
> +	size_t len = strlen(kw);
> +
> +	if (strlen(s) < len)
> +		return -EINVAL;
> +
> +	if (memcmp(s, kw, len))
> +		return -EINVAL;
> +
> +	*endptr = s + len;
> +	return 0;
> +}
> +
>   /**
>    * conf_ports_range_except() - Set up forwarding for a range of ports minus a
>    *                             bitmap of exclusions
> @@ -249,6 +272,7 @@ static void conf_ports_spec(const struct ctx *c,
>   	uint8_t exclude[PORT_BITMAP_SIZE] = { 0 };
>   	bool exclude_only = true;
>   	const char *p, *ep;
> +	uint8_t flags = 0;
>   	unsigned i;
>   
>   	if (!strcmp(spec, "all")) {
> @@ -256,15 +280,32 @@ static void conf_ports_spec(const struct ctx *c,
>   		spec = "";
>   	}
>   
> -	/* Mark all exclusions first, they might be given after base ranges */
> +	/* Parse excluded ranges and "auto" in the first pass */
>   	for_each_chunk(p, ep, spec, ",") {
>   		struct port_range xrange;
>   
> -		if (*p != '~') {
> -			/* Not an exclude range, parse later */
> +		if (isdigit(*p))  {

double space between ) and {

Thanks,
Laurent
> +			/* Include range, parse later */
>   			exclude_only = false;
>   			continue;
>   		}
> +
> +		if (parse_keyword(p, &p, "auto") == 0) {
> +			if (p != ep) /* Garbage after the keyword */
> +				goto bad;
> +
> +			if (c->mode != MODE_PASTA) {
> +				die(
> +"'auto' port forwarding is only allowed for pasta");
> +			}
> +
> +			flags |= FWD_SCAN;
> +			continue;
> +		}
> +
> +		/* Should be an exclude range */
> +		if (*p != '~')
> +			goto bad;
>   		p++;
>   
>   		if (parse_port_range(p, &p, &xrange))
> @@ -283,7 +324,7 @@ static void conf_ports_spec(const struct ctx *c,
>   		conf_ports_range_except(c, optname, optarg, fwd,
>   					proto, addr, ifname,
>   					1, NUM_PORTS - 1, exclude,
> -					1, FWD_WEAK);
> +					1, flags | FWD_WEAK);
>   		return;
>   	}
>   
> @@ -291,8 +332,8 @@ static void conf_ports_spec(const struct ctx *c,
>   	for_each_chunk(p, ep, spec, ",") {
>   		struct port_range orig_range, mapped_range;
>   
> -		if (*p == '~')
> -			/* Exclude range, already parsed */
> +		if (!isdigit(*p))
> +			/* Already parsed */
>   			continue;
>   
>   		if (parse_port_range(p, &p, &orig_range))
> @@ -320,7 +361,7 @@ static void conf_ports_spec(const struct ctx *c,
>   					proto, addr, ifname,
>   					orig_range.first, orig_range.last,
>   					exclude,
> -					mapped_range.first, 0);
> +					mapped_range.first, flags);
>   	}
>   
>   	return;
> @@ -366,17 +407,6 @@ static void conf_ports(const struct ctx *c, char optname, const char *optarg,
>   	if (proto == IPPROTO_UDP && c->no_udp)
>   		die("UDP port forwarding requested but UDP is disabled");
>   
> -	if (!strcmp(optarg, "auto")) {
> -		if (c->mode != MODE_PASTA)
> -			die("'auto' port forwarding is only allowed for pasta");
> -
> -		conf_ports_range_except(c, optname, optarg, fwd,
> -					proto, NULL, NULL,
> -					1, NUM_PORTS - 1, NULL, 1, FWD_SCAN);
> -
> -		return;
> -	}
> -
>   	strncpy(buf, optarg, sizeof(buf) - 1);
>   
>   	if ((spec = strchr(buf, '/'))) {
> @@ -1031,13 +1061,13 @@ static void usage(const char *name, FILE *f, int status)
>   		"    can be specified multiple times\n"
>   		"    SPEC can be:\n"
>   		"      'none': don't forward any ports\n"
> -		"%s"
>   		"      [ADDR[%%IFACE]/]PORTS: forward specific ports\n"
>   		"        PORTS is either 'all' (forward all unbound, non-ephemeral\n"
>   		"        ports), or a comma-separated list of ports, optionally\n"
>   		"        ranged with '-' and optional target ports after ':'.\n"
>   		"        Ranges can be reduced by excluding ports or ranges\n"
> -		"        prefixed by '~'\n"
> +		"        prefixed by '~'.\n"
> +		"%s"
>   		"        Examples:\n"
>   		"        -t all		Forward all ports\n"
>   		"        -t ::1/all	Forward all ports from local address ::1\n"
> @@ -1050,15 +1080,26 @@ static void usage(const char *name, FILE *f, int status)
>   		"        -t 192.0.2.1/5	Bind port 5 of 192.0.2.1 to %s\n"
>   		"        -t 5-25,~10-20	Forward ports 5 to 9, and 21 to 25\n"
>   		"        -t ~25		Forward all ports except for 25\n"
> +		"%s"
>   		"    default: %s\n"
>   		"  -u, --udp-ports SPEC	UDP port forwarding to %s\n"
>   		"    SPEC is as described for TCP above\n"
>   		"    default: %s\n",
>   		guest,
>   		strstr(name, "pasta") ?
> -		"      'auto': forward all ports currently bound in namespace\n"
> +		"        The 'auto' keyword may be given to only forward\n"
> +		"        ports which are bound in the target namespace\n"
> +		: "",
> +		guest, guest, guest,
> +		strstr(name, "pasta") ?
> +		"        -t auto\t	Forward all ports bound in namespace\n"
> +		"        -t ::1/auto	Forward ports from ::1 if they are\n"
> +		"        		bound in the namespace\n"
> +		"        -t 80-82,auto	Forward ports 80-82 if they are bound\n"
> +		"        		in the namespace\n"
>   		: "",
> -		guest, guest, guest, fwd_default, guest, fwd_default);
> +
> +		fwd_default, guest, fwd_default);
>   
>   	if (strstr(name, "pasta"))
>   		goto pasta_opts;
> diff --git a/passt.1 b/passt.1
> index 20dc72ca..6303aeb0 100644
> --- a/passt.1
> +++ b/passt.1
> @@ -434,12 +434,6 @@ Configure TCP port forwarding to guest or namespace. \fIspec\fR can be one of:
>   .BR none
>   Don't forward any ports
>   
> -.TP
> -.BR auto " " (\fBpasta\fR " " only)
> -Dynamically forward ports bound in the namespace. The list of ports is
> -periodically derived (every second) from listening sockets reported by
> -\fI/proc/net/tcp\fR and \fI/proc/net/tcp6\fR, see \fBproc\fR(5).
> -
>   .TP
>   [\fIaddress\fR[\fB%\fR\fIinterface\fR]\fB/\fR]\fIports\fR ...
>   Specific ports to forward.  Optionally, a specific listening address
> @@ -468,11 +462,20 @@ as \fIfirst\fR.
>   \fB~\fR\fIfirst\fR[\fB-\fR\fIlast\fR]
>   Exclude range.  Don't forward port numbers between \fIfirst\fR and
>   \fIlast\fR.  This takes precedences over include ranges.
> +
> +.TP
> +.BR auto
> +\fBpasta\fR only.  Only forward ports in the specified set if the
> +target ports are bound in the namespace. The list of ports is
> +periodically derived (every second) from listening sockets reported by
> +\fI/proc/net/tcp\fR and \fI/proc/net/tcp6\fR, see \fBproc\fR(5).
>   .RE
>   
>   Specifying excluded ranges only implies that all other non-ephemeral
> -ports are forwarded. In this case, no failures are reported for
> -unavailable ports, unless no ports could be forwarded at all.
> +ports are forwarded. Specifying no ranges at all implies forwarding
> +all non-ephemeral ports permitted by current capabilities.  In this
> +case, no failures are reported for unavailable ports, unless no ports
> +could be forwarded at all.
>   
>   Examples:
>   .RS
> @@ -519,6 +522,17 @@ and 30
>   .TP
>   -t ~20000-20010
>   Forward all ports to the guest, except for the range from 20000 to 20010
> +.TP
> +-t auto
> +Automatically forward any ports which are bound in the namespace
> +.TP
> +-t ::1/auto
> +Automatically forward any ports which are bound in the namespace,
> +listening only on local port ::1
> +.TP
> +-t 8000-8010,auto
> +Forward ports in the range 8000-8010 if and only if they are bound in
> +the namespace
>   .RE
>   
>   Default is \fBnone\fR for \fBpasst\fR and \fBauto\fR for \fBpasta\fR.


  reply	other threads:[~2026-04-20 14:45 UTC|newest]

Thread overview: 23+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-17  5:05 [PATCH v3 00/11] Rework forwarding option parsing David Gibson
2026-04-17  5:05 ` [PATCH v3 01/11] doc: Rework man page description of port specifiers David Gibson
2026-04-20 13:31   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 02/11] conf: Move "all" handling to port specifier David Gibson
2026-04-20 13:44   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 03/11] conf: Allow user-specified auto-scanned port forwarding ranges David Gibson
2026-04-20 14:45   ` Laurent Vivier [this message]
2026-04-17  5:05 ` [PATCH v3 04/11] conf: Move SO_BINDTODEVICE workaround to conf_ports() David Gibson
2026-04-20 15:06   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 05/11] conf: Don't pass raw commandline argument to conf_ports_spec() David Gibson
2026-04-20 16:11   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 06/11] fwd, conf: Add capabilities bits to each forwarding table David Gibson
2026-04-20 16:17   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 07/11] conf, fwd: Stricter rule checking in fwd_rule_add() David Gibson
2026-04-20 16:48   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 08/11] fwd_rule: Move ephemeral port probing to fwd_rule.c David Gibson
2026-04-20 16:52   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 09/11] fwd, conf: Move rule parsing code to fwd_rule.[ch] David Gibson
2026-04-20 17:06   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 10/11] fwd_rule: Move conflict checking back within fwd_rule_add() David Gibson
2026-04-20 17:15   ` Laurent Vivier
2026-04-17  5:05 ` [PATCH v3 11/11] fwd: Generalise fwd_rules_info() David Gibson
2026-04-20 17:21   ` Laurent Vivier

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=da072b12-68db-4bbe-a6b5-4c67276738cb@redhat.com \
    --to=lvivier@redhat.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=passt-dev@passt.top \
    --cc=sbrivio@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).