Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758137AbbGHD5T (ORCPT ); Tue, 7 Jul 2015 23:57:19 -0400 Received: from mail-bl2on0112.outbound.protection.outlook.com ([65.55.169.112]:33760 "EHLO na01-bl2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932189AbbGHD5C convert rfc822-to-8bit (ORCPT ); Tue, 7 Jul 2015 23:57:02 -0400 Authentication-Results: spf=pass (sender IP is 206.191.229.116) smtp.mailfrom=microsoft.com; networkplumber.org; dkim=none (message not signed) header.d=none; From: Dexuan Cui To: Stephen Hemminger CC: "gregkh@linuxfoundation.org" , "davem@davemloft.net" , "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "driverdev-devel@linuxdriverproject.org" , "olaf@aepfle.de" , "apw@canonical.com" , "jasowang@redhat.com" , KY Srinivasan , Haiyang Zhang Subject: RE: [PATCH 6/7] hvsock: introduce Hyper-V VM Sockets feature Thread-Topic: [PATCH 6/7] hvsock: introduce Hyper-V VM Sockets feature Thread-Index: AQHQuOMZ2uH1a74wRkupK8dXvLERIJ3QsmKg Date: Wed, 8 Jul 2015 03:56:52 +0000 Message-ID: <31d2369255894515bd040d22452d9df8@SIXPR30MB031.064d.mgd.msft.net> References: <1436194049-27829-1-git-send-email-decui@microsoft.com> <20150707113112.408b6c5d@urahara> In-Reply-To: <20150707113112.408b6c5d@urahara> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [141.251.57.68] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-Microsoft-Exchange-Diagnostics: 1;BY2FFO11FD010;1:AWVoX1c8leIDZ+/JTMVMcY/SMNCykmomhQpGWzIzm8SpODlONb1H7asz0wfUWhyJVYflgAYSgeB83yDnmMJ+2j8q6Ow7EAGkbaCCkksZGb5KZ59umsp9B0oegrVl5474zPCuENTJ58oBQ+6Qba/1NUoh0uCMT+Gavuir8t8pAsFYBdXe+v8yPaOOKiSzrzbMqD4UgnlXXx8d4tynyDQRPrqIRScv6MyaF+cqiw/9G4XyMNnwaFm6T4FF+hP4VuMKk7xmUv6JO/1IMiTsCJZy/w== X-Forefront-Antispam-Report: CIP:206.191.229.116;CTRY:US;IPV:CAL;IPV:NLI;EFV:NLI;SFV:NSPM;SFS:(10019020)(6009001)(2980300002)(438002)(51704005)(199003)(13464003)(52314003)(189002)(164054003)(24454002)(51914003)(62966003)(77156002)(107886002)(2900100001)(6806004)(5001960100002)(24736003)(110136002)(189998001)(5003600100002)(76176999)(46102003)(86362001)(87936001)(47776003)(66066001)(54356999)(50986999)(106466001)(19580395003)(97756001)(2656002)(2950100001)(102836002)(86612001)(19580405001)(108616004)(86146001)(46406003)(23726002)(16796002)(15975445007)(106116001)(92566002)(33646002)(4001430100001);DIR:OUT;SFP:1102;SCL:1;SRVR:BN1PR03MB071;H:064-smtp-out.microsoft.com;FPR:;SPF:Pass;MLV:sfv;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: 1;BN1PR03MB071;2:MuFoFdU23roGLQItExZYrT1vBXph6CiEZthPrxlgABH7eik4PQvcHJdAiJ9INuF5;3:Cs7gxQNB+R18Oclq0wo5bY+LFAM//2YcJjOMUiXn28GjBmxPbxC/C9zth4e+WY26hvBQ6bYeth1rblu1R/lnQLSiTo4qCElqAal8/a2nvJSsg/Vq00xWGnl7N1pqqa0tp3L8A1ZgHlL6n+cKB6f4FUqxlQXc1XEPmYHXAXxsWJsKsoye0xTS6CRRkYLhx63XFrzue4OLOOVNXWcVkc39kIz0VhhHyYHy7U9ZgOC1U8bE1z2mmQoy0JdYAEoYnEvg;25:bvrisKKJ8T/FDbxdIQINpJH1dkIAmG1VFsRSNDDW0RaqwLVguOY26RwZqEBZa6D0KJmNcL8hF9GEFLjCAJ8D+BZAhfJIsg2cCfes3ufenqb1RACM7y2l170qYHNocnWRZTDPR4KoeBdxhL5QqMAroUDjp0lzGtL9NN1NWZR+MLxe2Y1LiSjdEdGAaapFUkz2IZi7caioLgdSn8z948oqa6w40ilLjwSwloXOmrJCx/aqgiR6qulSIZHm2dGMq9RSD03XX9iOymywNNKg+xF6Hw== X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN1PR03MB071; X-Microsoft-Exchange-Diagnostics: 1;BN1PR03MB071;20:c26KHquXlrQjP2FpV6hDlTWDSaq/DjzIvpAQg6kUtx1c89f/6OxOlsmhyA9kkzdcBpBu+I0sVjX94q/u9pv1llnrUvQ3SekcUFNILU9KoAZu14dUZ4WQ1UTtsHSGNYUCX8DzRPmIdP2YmtdnIgV8m4YlsaQFpwgtIt0yEpbs3e1q3aBgg/Az5VLo49jToNOio36m4U5isj6nmmIVDIoDfCODsp9uVVpCxTIviDiDqEnJDNjnedhwUGITfIcCKZB3ZoT7XLISTlnQIACkbXLsm26ZGWpyBgtA9/mg1Rg/YsgmTQYcLClGDvn8UXeSxsZ6p4ONWpb7/QbmE1SV6QtKxqbcUbXBit61pFadMSK4KPSXcyfHWmSaf9P383g7F6fxjKse1MrIq2hQn9GUk+6UnUNPXIKWQypA10l0RpfvZfnWYYhKK2Vt5mBuIaRKYtwpMsMFpXG73KutYeoZjh9iBMbkAlBEGiQdfnohd2ROXTduSesfh50T5K7ksYcornnH;4:LafGNoocMPT5T/TrxcH8VeZsCl5zfXnmPOARxyDDH1ikFG/s6SqWAsjnGDHXN4q1GxsxnYIlqhIwZ+zhGeKcgrP9oN090l9pC8tT7wo4bcBfFjPVur9D4uVNolxN62gxhIM3nv5rJoYpq3RLCnY0IU7eV5u2Q5cplFT4If8kMMuuKdEOFT5WTDy4HziFAiHS+vSEkqD29l3hTUgBY994A0hH0Th55y1m0Q9U9v3APcyqlkqZwPuhpfyJEbRGtExOqMP00JST8OmwahqzUHy9u7Lq4e8/4hevVn6DBQCckbD0X8nWp3wgj2QcoKzPi+VT X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(108003899814671); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(2401001)(5005006)(3002001);SRVR:BN1PR03MB071;BCL:0;PCL:0;RULEID:;SRVR:BN1PR03MB071; X-Forefront-PRVS: 0631F0BC3D X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;BN1PR03MB071;23:1sIcbf6tMZftiy/FfEf1E1/ZetQhk3yZR3lSbeXJ0w?= =?us-ascii?Q?X0M8He4zUQNDB3s+iclnVfGddtNTk0igWWxuuYTdZwZ/RF+E5qm9IY8tYAQy?= =?us-ascii?Q?+5zrCJ/dXnJPjDNWv5CaJQsiRF+OJhdmxx6U9NOJ4/YStJ6qXPueYZvjsQZi?= =?us-ascii?Q?4hyCjwvfz2hdigWgyFUI/e8V2LjVQrSe/7yMUz8/2t+8BRD6yWZh1QU3EUra?= =?us-ascii?Q?jRevYUBBSb6IfoH+okgJ+jzo/2+bMS0Du4wMbfLYYELk5Gm7eDqFLlZFupm9?= =?us-ascii?Q?9yjJtr3ZZK+9rFxxbomyk09jFsLgtoWqOURP04n4bg+QeKL+0CaCWoaEv+db?= =?us-ascii?Q?MFUYCG/0aovHur4AKqtgqfHSdZcLh6iApqtPmYTxwTtecrhVrQGDp6B+z1++?= =?us-ascii?Q?Wjh8ELCZQp6tc2X5KrgL1ZHovihs6dyzuIJRSgL6ZV1Ia0IBnY+TyrcmOqKq?= =?us-ascii?Q?8mHUXE9Uv0ecb4tlv6CDn9hNgED29H+Lb3Avz70TvhuoeKXqdRPhbh1rR3xb?= =?us-ascii?Q?ORxzv35SfyN/LkoKmIp0L1kR8mSFTJdNgndJHhMHIaBOWZHcH+uVj26KPKd2?= =?us-ascii?Q?74UaYecSCEDmX6Relq0O6T0Bp6KA0LYOqjlAqipX/AmjAdnqBUashxR9qK6H?= =?us-ascii?Q?u7aXx+1UJcp5M1qFoswaXMANjDFG5QL1uI21I77YHIHAf4g+zc0bFC/733wG?= =?us-ascii?Q?txuXiu4z4vBvRL2YHNjwPFD3Y9+Uzw3K4AjsqmaeYvv4ZPdwfV4D0KNaQsrJ?= =?us-ascii?Q?8yRlpcxR+T2FOnDFbiMuuWmYi/1E5Bskyi+d2DxQvfJCTMi8k40nFGaeg4qK?= =?us-ascii?Q?Z5CNJ1cjwV+EIcS4X3yr8/7k/svX3VvHXqZj2vmTeDJ9Ec3VGa3edP2X6uvC?= =?us-ascii?Q?7iRMCs9dIVPDv99jT18fYOIxjoASX1nIPGnhX9ysGy92p3RwlYdctXviFBkK?= =?us-ascii?Q?PkENySut9jZEnLAejM3zFTt5f3NFHpTmjqMYKyBd7ZVW4E6qTxmiwJJeNxYZ?= =?us-ascii?Q?kKe39XqS3/aVvWtRqGOat1YumA9GjFUWhc0WRQc6vORZHZDoMxm64muUpNjm?= =?us-ascii?Q?6XEJPCGdUqD5HUyA444tBcNfLpydl3c6j/46E5H4PqsClxxvFbDaMn1OV1BE?= =?us-ascii?Q?+f3h6nkEHni2r6A0Z4+TdrPTqDDS48fTRbTvt4UHVG+EQgW7sQMKwpAFpOQW?= =?us-ascii?Q?Tg6CpYiqsNzG3Ghl0SaKIq8mLXmjC6d2cF?= X-Microsoft-Exchange-Diagnostics: 1;BN1PR03MB071;5:vrz/Xn5ktvrSz9yhfDdzEpDDdux3OpcGYbc0Vo0shsCZOmUgrY5cMmYrk+nYOyw1NG/KMLC56ulOJH4TqM4B271PziTs0Nbp1mleoL2Br9e3WrXxCmZYkKSgFQQua1y0rwjhYoc4Lhc6a6fqTFj/OQ==;24:JbSM623RDEHJ4Xuem24Y154zL4jKqVsoKyzWQT2dfyQQ9jAN+8VuQ/4xwIrZGQQIlZCtWom17u99MMBkje/zhwqDnntcLpGmx0pdk9wx7PQ=;20:jspn40kIb04DN4C5dmJ3VaPZHDNzumoCl12YciiMY/CAEqqdvHvxRy3TYt7Ei5Dz0dRGIaVq9y61AOU1j1yl6w== X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jul 2015 03:56:57.1955 (UTC) X-MS-Exchange-CrossTenant-Id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=72f988bf-86f1-41af-91ab-2d7cd011db47;Ip=[206.191.229.116];Helo=[064-smtp-out.microsoft.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR03MB071 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2433 Lines: 56 > -----Original Message----- > From: Stephen Hemminger > Sent: Wednesday, July 8, 2015 2:31 > Subject: Re: [PATCH 6/7] hvsock: introduce Hyper-V VM Sockets feature > > On Mon, 6 Jul 2015 07:47:29 -0700 > Dexuan Cui wrote: > > > Hyper-V VM sockets (hvsock) supplies a byte-stream based communication > > mechanism between the host and a guest. It's kind of TCP over VMBus, but > > the transportation layer (VMBus) is much simpler than IP. With Hyper-V VM > > Sockets, applications between the host and a guest can talk with each > > other directly by the traditional BSD-style socket APIs. > > > > Hyper-V VM Sockets is only available on Windows 10 host and later. The > > patch implements the necessary support in the guest side by introducing > > a new socket address family AF_HYPERV. > > > > Signed-off-by: Dexuan Cui > > Is there any chance that AF_VSOCK could be used with different transport > for VMware and Hyper-V. Better to make guest applications host independent. Hi Stephen, Thanks for the question. I tried to do that (since AF_HYPERV and AF_VSOCK are conceptually similar), but I found it would be impractical: I listed the reasons in my cover letter of the patchset: https://lkml.org/lkml/2015/7/6/431 IMO the biggest difference is the size of the endpoint (u128 vs. u32): in AF_VOSCK vs. in AF_HYPERV. In the current code of AF_VSOCK and the related transport layer (the wrapper ops of VMware's VMCI), the size is widely used by "struct sockaddr_vm" (this struct is also exported to the user space). So, anyway, the user space application has to explicitly handle the different endpoint size. And in the driver side, I'm afraid there is no way to directly reuse the code of AF_VSOCK with trivial change :-( , because we would have to make the AF_VSOCK code be able to know the real sockaddr type (sockaddr_vm or sockaddr_hv? The two structs have different layout and different field names) at runtime and behave differently. This would make the code a mess, IMO. That's why I think it would be better to introduce a new address family. Thanks, -- Dexuan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/