mirror of
https://passt.top/passt
synced 2024-12-21 21:25:23 +00:00
fwd, conf: Probe host's ephemeral ports
When we forward "all" ports (-t all or -u all), or use an exclude-only range, we don't actually forward *all* ports - that wouln't leave local ports to use for outgoing connections. Rather we forward all non-ephemeral ports - those that won't be used for outgoing connections or datagrams. Currently we assume the range of ephemeral ports is that recommended by RFC 6335, 49152-65535. However, that's not the range used by default on Linux, 32768-60999 but configurable with the net.ipv4.ip_local_port_range sysctl. We can't really know what range the guest will consider ephemeral, but if it differs too much from the host it's likely to cause problems we can't avoid anyway. So, using the host's ephemeral range is a better guess than using the RFC 6335 range. Therefore, add logic to probe the host's ephemeral range, falling back to the RFC 6335 range if that fails. This has the bonus advantage of reducing the number of ports bound by -t all -u all on most Linux machines thereby reducing kernel memory usage. Specifically this reduces kernel memory usage with -t all -u all from ~380MiB to ~289MiB. Signed-off-by: David Gibson <david@gibson.dropbear.id.au> Reviewed-by: Laurent Vivier <lvivier@redhat.com> Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
This commit is contained in:
parent
4a41dc58d6
commit
eedc81b6ef
1
conf.c
1
conf.c
@ -1721,6 +1721,7 @@ void conf(struct ctx *c, int argc, char **argv)
|
||||
/* Inbound port options & DNS can be parsed now (after IPv4/IPv6
|
||||
* settings)
|
||||
*/
|
||||
fwd_probe_ephemeral();
|
||||
udp_portmap_clear();
|
||||
optind = 0;
|
||||
do {
|
||||
|
61
fwd.c
61
fwd.c
@ -28,8 +28,65 @@
|
||||
#include "flow_table.h"
|
||||
|
||||
/* Empheral port range: values from RFC 6335 */
|
||||
static const in_port_t fwd_ephemeral_min = (1 << 15) + (1 << 14);
|
||||
static const in_port_t fwd_ephemeral_max = NUM_PORTS - 1;
|
||||
static in_port_t fwd_ephemeral_min = (1 << 15) + (1 << 14);
|
||||
static in_port_t fwd_ephemeral_max = NUM_PORTS - 1;
|
||||
|
||||
#define PORT_RANGE_SYSCTL "/proc/sys/net/ipv4/ip_local_port_range"
|
||||
|
||||
/** fwd_probe_ephemeral() - Determine what ports this host considers ephemeral
|
||||
*
|
||||
* Work out what ports the host thinks are emphemeral and record it for later
|
||||
* use by fwd_port_is_ephemeral(). If we're unable to probe, assume the range
|
||||
* recommended by RFC 6335.
|
||||
*/
|
||||
void fwd_probe_ephemeral(void)
|
||||
{
|
||||
char *line, *tab, *end;
|
||||
struct lineread lr;
|
||||
long min, max;
|
||||
ssize_t len;
|
||||
int fd;
|
||||
|
||||
fd = open(PORT_RANGE_SYSCTL, O_RDONLY | O_CLOEXEC);
|
||||
if (fd < 0) {
|
||||
warn_perror("Unable to open %s", PORT_RANGE_SYSCTL);
|
||||
return;
|
||||
}
|
||||
|
||||
lineread_init(&lr, fd);
|
||||
len = lineread_get(&lr, &line);
|
||||
close(fd);
|
||||
|
||||
if (len < 0)
|
||||
goto parse_err;
|
||||
|
||||
tab = strchr(line, '\t');
|
||||
if (!tab)
|
||||
goto parse_err;
|
||||
*tab = '\0';
|
||||
|
||||
errno = 0;
|
||||
min = strtol(line, &end, 10);
|
||||
if (*end || errno)
|
||||
goto parse_err;
|
||||
|
||||
errno = 0;
|
||||
max = strtol(tab + 1, &end, 10);
|
||||
if (*end || errno)
|
||||
goto parse_err;
|
||||
|
||||
if (min < 0 || min >= NUM_PORTS ||
|
||||
max < 0 || max >= NUM_PORTS)
|
||||
goto parse_err;
|
||||
|
||||
fwd_ephemeral_min = min;
|
||||
fwd_ephemeral_max = max;
|
||||
|
||||
return;
|
||||
|
||||
parse_err:
|
||||
warn("Unable to parse %s", PORT_RANGE_SYSCTL);
|
||||
}
|
||||
|
||||
/**
|
||||
* fwd_port_is_ephemeral() - Is port number ephemeral?
|
||||
|
Loading…
Reference in New Issue
Block a user