diff options
author | David Gibson <david@gibson.dropbear.id.au> | 2024-07-18 15:26:47 +1000 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2024-07-19 18:33:42 +0200 |
commit | e0647ad80c63fcad6a9dc31541881fa02aeaac98 (patch) | |
tree | 875373b69da2ee73d7051aae36ab83c24e77bfbd /udp.h | |
parent | a45a7e97982acc7c9d00fddb0192fbbfcd2030d6 (diff) | |
download | passt-e0647ad80c63fcad6a9dc31541881fa02aeaac98.tar passt-e0647ad80c63fcad6a9dc31541881fa02aeaac98.tar.gz passt-e0647ad80c63fcad6a9dc31541881fa02aeaac98.tar.bz2 passt-e0647ad80c63fcad6a9dc31541881fa02aeaac98.tar.lz passt-e0647ad80c63fcad6a9dc31541881fa02aeaac98.tar.xz passt-e0647ad80c63fcad6a9dc31541881fa02aeaac98.tar.zst passt-e0647ad80c63fcad6a9dc31541881fa02aeaac98.zip |
udp: Handle "spliced" datagrams with per-flow sockets
When forwarding a datagram to a socket, we need to find a socket with a
suitable local address to send it. Currently we keep track of such sockets
in an array indexed by local port, but this can't properly handle cases
where we have multiple local addresses in active use.
For "spliced" (socket to socket) cases, improve this by instead opening
a socket specifically for the target side of the flow. We connect() as
well as bind()ing that socket, so that it will only receive the flow's
reply packets, not anything else. We direct datagrams sent via that socket
using the addresses from the flow table, effectively replacing bespoke
addressing logic with the unified logic in fwd.c
When we create the flow, we also take a duplicate of the originating
socket, and use that to deliver reply datagrams back to the origin, again
using addresses from the flow table entry.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'udp.h')
-rw-r--r-- | udp.h | 6 |
1 files changed, 4 insertions, 2 deletions
@@ -9,8 +9,10 @@ #define UDP_TIMER_INTERVAL 1000 /* ms */ void udp_portmap_clear(void); -void udp_buf_sock_handler(const struct ctx *c, union epoll_ref ref, uint32_t events, - const struct timespec *now); +void udp_buf_sock_handler(const struct ctx *c, union epoll_ref ref, + uint32_t events, const struct timespec *now); +void udp_reply_sock_handler(const struct ctx *c, union epoll_ref ref, + uint32_t events, const struct timespec *now); int udp_tap_handler(struct ctx *c, uint8_t pif, sa_family_t af, const void *saddr, const void *daddr, const struct pool *p, int idx, const struct timespec *now); |