Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7014641pxb; Wed, 17 Feb 2021 21:53:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJyF+TX6iNSVnWjxOlgGhBhgmK3kUZvdqHCVBVk62bz8AoEnW7CGNZOiJL1HfCxi/DIdHGqb X-Received: by 2002:a17:906:1754:: with SMTP id d20mr1606141eje.221.1613627606778; Wed, 17 Feb 2021 21:53:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613627606; cv=none; d=google.com; s=arc-20160816; b=CABmnxogrFfF+0cJaKQSpG/bYIZmQ6SyW/hJUvdT310uH4ZgtvswRIrDJ2tYvHynQ+ r6TH79XFGd4VGuW4bVYTYTuIGjs8+kzmodjWxRZYa69frOI7U5Zi81ilq3p/JrAwEVAo 7dbyGx+oEX2H04YYq94EbPAdnNN5rX43kpo+btIYMbbBLpL9aaaltrTKBcs0Ax1940xn EsNk5Uf2NeBCkpf4KbMX8bf94nL/YTGjE6O8SeH8KWaEN8YMIGFMmYe1zcbUw1IHbTQL eX9kJjrOvU2zEQb+u/5AH8LDqPrT/HKCeuS/lARTsPi3aOkOX72gmdyN8aYRA+klchh7 tm5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=olKhSJFIEmk21kBZZWg6uSwJinyyI+Pxhn0ATbxUwAs=; b=L1fJeTYECvj8D5fD9amzyjvbvVKXjYQuVrahLqgCrIvxyIr6/hwhh5XoJwtzg43bya Fc9kE5k9Is/zzlpsYEGVYxFb0vyskN1QeC3yV9KMn4r18MHXuARNLGSFEkZIQR0JJXIO Afo/FlkfPlg4u4w+kWeMkXeFHP52p/znZtLnKSDY5XCKOJxjwQF9tE/ahph+ED+1Fltf NUOLXBLN0KPfwTOElxjn53eY15J+rgrsui1Mh1O3OohTv80H870wOKASSe+GiMH3a6XD c+n3i35E4KemlA5VggPXBcRJ1sZOdmUhDclmvRaxmCN0Szp6voo9HMd7sQFkp/ul8Q4E iiOg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kaspersky.com header.s=mail202102 header.b=oFriUFhK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=kaspersky.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e6si3123832edv.518.2021.02.17.21.53.03; Wed, 17 Feb 2021 21:53:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kaspersky.com header.s=mail202102 header.b=oFriUFhK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=kaspersky.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230310AbhBRFuc (ORCPT + 99 others); Thu, 18 Feb 2021 00:50:32 -0500 Received: from mx12.kaspersky-labs.com ([91.103.66.155]:48205 "EHLO mx12.kaspersky-labs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230508AbhBRFmM (ORCPT ); Thu, 18 Feb 2021 00:42:12 -0500 Received: from relay12.kaspersky-labs.com (unknown [127.0.0.10]) by relay12.kaspersky-labs.com (Postfix) with ESMTP id 379B4761CE; Thu, 18 Feb 2021 08:39:32 +0300 (MSK) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaspersky.com; s=mail202102; t=1613626772; bh=olKhSJFIEmk21kBZZWg6uSwJinyyI+Pxhn0ATbxUwAs=; h=From:To:Subject:Date:Message-ID:MIME-Version:Content-Type; b=oFriUFhK1J4vHWVZFZEnca2jUj3lfxzVwrciNWwKXCRPzF0l/Cr/6BQwb9QUriqIu f/w+w4zVgbLQZBf9vfp6rrP8rSmibj9b2bny6oNyCA8Dc5T2cXiXfWLGKcoZZcS4S+ eIIHz5yERonxTvJNtpXTMDP0Q7gFqGNTvo08D3XUimOcHplEMOJePRWOkhwXc9W5QC ShJc7eZc3y7D2KgmtKrEPS19u4j6zIU2qLu03BS0repHuZhFIsVt9kwTsR+Sfqa+IT FuWqv46tKehTdYvpdjhE+uQN4Pry+h6IFBz1tRr0NODZZ/WyglqlZfl6oHoGihyxjU Jh56/5GRIHNYQ== Received: from mail-hq2.kaspersky.com (unknown [91.103.66.206]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (Client CN "mail-hq2.kaspersky.com", Issuer "Kaspersky MailRelays CA G3" (verified OK)) by mailhub12.kaspersky-labs.com (Postfix) with ESMTPS id E56A8761BE; Thu, 18 Feb 2021 08:39:31 +0300 (MSK) Received: from arseniy-pc.avp.ru (10.64.68.128) by hqmailmbx3.avp.ru (10.64.67.243) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2044.4; Thu, 18 Feb 2021 08:38:57 +0300 From: Arseny Krasnov To: Stefan Hajnoczi , Stefano Garzarella , "Michael S. Tsirkin" , Jason Wang , "David S. Miller" , Jakub Kicinski , Arseny Krasnov , Jorgen Hansen , Norbert Slusarek , Colin Ian King , Andra Paraschiv CC: , , , , , Subject: [RFC PATCH v5 08/19] af_vsock: update comments for stream sockets Date: Thu, 18 Feb 2021 08:38:48 +0300 Message-ID: <20210218053852.1067811-1-arseny.krasnov@kaspersky.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210218053347.1066159-1-arseny.krasnov@kaspersky.com> References: <20210218053347.1066159-1-arseny.krasnov@kaspersky.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.64.68.128] X-ClientProxiedBy: hqmailmbx1.avp.ru (10.64.67.241) To hqmailmbx3.avp.ru (10.64.67.243) X-KSE-ServerInfo: hqmailmbx3.avp.ru, 9 X-KSE-AntiSpam-Interceptor-Info: scan successful X-KSE-AntiSpam-Version: 5.9.16, Database issued on: 02/06/2021 23:52:08 X-KSE-AntiSpam-Status: KAS_STATUS_NOT_DETECTED X-KSE-AntiSpam-Method: none X-KSE-AntiSpam-Rate: 10 X-KSE-AntiSpam-Info: Lua profiles 161679 [Feb 06 2021] X-KSE-AntiSpam-Info: LuaCore: 422 422 763e61bea9fcfcd94e075081cb96e065bc0509b4 X-KSE-AntiSpam-Info: Version: 5.9.16.0 X-KSE-AntiSpam-Info: Envelope from: arseny.krasnov@kaspersky.com X-KSE-AntiSpam-Info: {Prob_from_in_msgid} X-KSE-AntiSpam-Info: {Tracking_date, moscow} X-KSE-AntiSpam-Info: {Tracking_from_domain_doesnt_match_to} X-KSE-AntiSpam-Info: Rate: 10 X-KSE-AntiSpam-Info: Status: not_detected X-KSE-AntiSpam-Info: Method: none X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 02/06/2021 23:55:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: Clean, bases: 06.02.2021 21:17:00 X-KSE-BulkMessagesFiltering-Scan-Result: InTheLimit X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-BulkMessagesFiltering-Scan-Result: InTheLimit X-KLMS-Rule-ID: 52 X-KLMS-Message-Action: clean X-KLMS-AntiSpam-Status: not scanned, disabled by settings X-KLMS-AntiSpam-Interceptor-Info: not scanned X-KLMS-AntiPhishing: Clean, bases: 2021/02/18 04:51:00 X-KLMS-AntiVirus: Kaspersky Security for Linux Mail Server, version 8.0.3.30, bases: 2021/02/18 04:31:00 #16269527 X-KLMS-AntiVirus-Status: Clean, skipped Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This replaces 'stream' to 'connect oriented' in comments as SEQPACKET is also connect oriented. Signed-off-by: Arseny Krasnov --- net/vmw_vsock/af_vsock.c | 31 +++++++++++++++++-------------- 1 file changed, 17 insertions(+), 14 deletions(-) diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index f4b02c6d35d1..f1bf6a5ad15e 100644 --- a/net/vmw_vsock/af_vsock.c +++ b/net/vmw_vsock/af_vsock.c @@ -415,8 +415,8 @@ static void vsock_deassign_transport(struct vsock_sock *vsk) /* Assign a transport to a socket and call the .init transport callback. * - * Note: for stream socket this must be called when vsk->remote_addr is set - * (e.g. during the connect() or when a connection request on a listener + * Note: for connection oriented socket this must be called when vsk->remote_addr + * is set (e.g. during the connect() or when a connection request on a listener * socket is received). * The vsk->remote_addr is used to decide which transport to use: * - remote CID == VMADDR_CID_LOCAL or g2h->local_cid or VMADDR_CID_HOST if @@ -470,10 +470,10 @@ int vsock_assign_transport(struct vsock_sock *vsk, struct vsock_sock *psk) return 0; /* transport->release() must be called with sock lock acquired. - * This path can only be taken during vsock_stream_connect(), - * where we have already held the sock lock. - * In the other cases, this function is called on a new socket - * which is not assigned to any transport. + * This path can only be taken during vsock_connect(), where we + * have already held the sock lock. In the other cases, this + * function is called on a new socket which is not assigned to + * any transport. */ vsk->transport->release(vsk); vsock_deassign_transport(vsk); @@ -658,9 +658,10 @@ static int __vsock_bind_connectible(struct vsock_sock *vsk, vsock_addr_init(&vsk->local_addr, new_addr.svm_cid, new_addr.svm_port); - /* Remove stream sockets from the unbound list and add them to the hash - * table for easy lookup by its address. The unbound list is simply an - * extra entry at the end of the hash table, a trick used by AF_UNIX. + /* Remove connection oriented sockets from the unbound list and add them + * to the hash table for easy lookup by its address. The unbound list + * is simply an extra entry at the end of the hash table, a trick used + * by AF_UNIX. */ __vsock_remove_bound(vsk); __vsock_insert_bound(vsock_bound_sockets(&vsk->local_addr), vsk); @@ -951,10 +952,10 @@ static int vsock_shutdown(struct socket *sock, int mode) if ((mode & ~SHUTDOWN_MASK) || !mode) return -EINVAL; - /* If this is a STREAM socket and it is not connected then bail out - * immediately. If it is a DGRAM socket then we must first kick the - * socket so that it wakes up from any sleeping calls, for example - * recv(), and then afterwards return the error. + /* If this is a connection oriented socket and it is not connected then + * bail out immediately. If it is a DGRAM socket then we must first + * kick the socket so that it wakes up from any sleeping calls, for + * example recv(), and then afterwards return the error. */ sk = sock->sk; @@ -1783,7 +1784,9 @@ static int vsock_connectible_sendmsg(struct socket *sock, struct msghdr *msg, transport = vsk->transport; - /* Callers should not provide a destination with stream sockets. */ + /* Callers should not provide a destination with connection oriented + * sockets. + */ if (msg->msg_namelen) { err = sk->sk_state == TCP_ESTABLISHED ? -EISCONN : -EOPNOTSUPP; goto out; -- 2.25.1