Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp2118881pxb; Sun, 5 Sep 2021 09:09:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzF/KyN2aKkZC3Lr2haIY0CoCj2txAp90q2QAeT0sBaH8uZwbGIDbVKRxrA9HRY5CCefPcP X-Received: by 2002:a05:6602:d9:: with SMTP id z25mr6486116ioe.154.1630858169645; Sun, 05 Sep 2021 09:09:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630858169; cv=none; d=google.com; s=arc-20160816; b=VBRlFHzQ4eeKxDHRSW2znODyJPEYTjw8xy6sFHini+XVCFm4Se9c4zU7syvm9MpHnO 7v67qgAA1UCrjHXRL60LZ/tDK8dp7Ga6/nLbbMW+/zoe/nYdljyh6OV391T5cwxxBEpF 6zGLYOiagEixooASTRxrbYFipxsJ41x3XxTtZeQqmFZUh4/+gzL+rNGqO9C0KZqZyHG1 k+lKGt94wzj5pEtOla//r8LxR2YpoIjLjYgZZJAnPqkb4p8biLEGMCocJ8cxRfprdPoJ y+YB/nvYEaGmWGZRahuYCYLEpXTfajvJXj8G13uSBtMkHFbRq4gpxa7APqPsyyE/IUK1 YJWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=1o/rOf/o+3ebi3NRCGD99GWw+T4YfEahf28tbFoGe5I=; b=BL6zgjaMUzt7aC9CZHYeVDcuTjs0NXSK5+HFp4Cq4hxqVid+Nsje5/JFkY2xRoZlFk Nbgfbb8Wq+/15BxIf8gQXmfb0w17ZPPTtF5bxUrWVlkOfy/MZSyUUjib5Pg/ieP29PQy +Uql07Jqfr+qdHW24g10OODyX77mzeH2bpphc6ayZ+JMoMyw6M1sLaPyts16UnNJ9ZJS hOaMVefXcCSTO0TNASqSDUFQPEevBl038YCBGv2CZ8ZlmIPJdtlSvt4lX0JEKVKuWbfC YW8sAHxDalAY70yRnF8DYXXsgDDYp8JvRMLQ9ZuxZu3IJRQdmooImZz3YKQeG3bzUaTP 60ZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kaspersky.com header.s=mail202102 header.b=PE8ltYTT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=kaspersky.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g7si2753995ilb.86.2021.09.05.09.09.16; Sun, 05 Sep 2021 09:09:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kaspersky.com header.s=mail202102 header.b=PE8ltYTT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=kaspersky.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237589AbhIEQDw (ORCPT + 99 others); Sun, 5 Sep 2021 12:03:52 -0400 Received: from mx13.kaspersky-labs.com ([91.103.66.164]:26786 "EHLO mx13.kaspersky-labs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229566AbhIEQDv (ORCPT ); Sun, 5 Sep 2021 12:03:51 -0400 Received: from relay13.kaspersky-labs.com (unknown [127.0.0.10]) by relay13.kaspersky-labs.com (Postfix) with ESMTP id 576625213A4; Sun, 5 Sep 2021 19:02:46 +0300 (MSK) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaspersky.com; s=mail202102; t=1630857766; bh=1o/rOf/o+3ebi3NRCGD99GWw+T4YfEahf28tbFoGe5I=; h=Subject:To:From:Message-ID:Date:MIME-Version:Content-Type; b=PE8ltYTTOAVmFAkr9cTfJESLAmhSNpXMS9c+41aCh9YAis6qDxU3417U+ebNY43yG lyqKox0gf2OO0BWgj8rFIWKWGNmJgg1KIVLwvFc4BmleYPf7aUSNe2senkhFe9EHH4 N2KQ/UOEMR7yRaALMI6ZkfVJJHe0+2Lq7r1VHA8qiv2IAn4vh642onrWsSG0bUWyw+ plvHBkkor6vhVpPI8uFF78H6gAk+S1R/FGWVhlam1DbAkEX5mPuq+cZx/VsQOE2E56 KjDdCaL51lBo9j0ICmkHzLvK0SBasqo/Mwn67VJoP1mzSNoGKZRDZvPdyXADRVRdkF +k0e2hGJR2Ccg== Received: from mail-hq2.kaspersky.com (unknown [91.103.66.206]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail-hq2.kaspersky.com", Issuer "Kaspersky MailRelays CA G3" (verified OK)) by mailhub13.kaspersky-labs.com (Postfix) with ESMTPS id 387735213F9; Sun, 5 Sep 2021 19:02:45 +0300 (MSK) Received: from [10.16.171.77] (10.64.64.121) by hqmailmbx3.avp.ru (10.64.67.243) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.14; Sun, 5 Sep 2021 19:02:44 +0300 Subject: Re: [PATCH net-next v5 0/6] virtio/vsock: introduce MSG_EOR flag for SEQPACKET To: "Michael S. Tsirkin" CC: Stefan Hajnoczi , Stefano Garzarella , Jason Wang , "David S. Miller" , Jakub Kicinski , Colin Ian King , Norbert Slusarek , Andra Paraschiv , "kvm@vger.kernel.org" , "virtualization@lists.linux-foundation.org" , "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "stsp2@yandex.ru" , "oxffffaa@gmail.com" References: <20210903123016.3272800-1-arseny.krasnov@kaspersky.com> <20210905115139-mutt-send-email-mst@kernel.org> From: Arseny Krasnov Message-ID: <4558e96b-6330-667f-955b-b689986f884f@kaspersky.com> Date: Sun, 5 Sep 2021 19:02:44 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20210905115139-mutt-send-email-mst@kernel.org> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit Content-Language: en-US X-Originating-IP: [10.64.64.121] X-ClientProxiedBy: hqmailmbx1.avp.ru (10.64.67.241) To hqmailmbx3.avp.ru (10.64.67.243) X-KSE-ServerInfo: hqmailmbx3.avp.ru, 9 X-KSE-AntiSpam-Interceptor-Info: scan successful X-KSE-AntiSpam-Version: 5.9.20, Database issued on: 09/05/2021 15:49:49 X-KSE-AntiSpam-Status: KAS_STATUS_NOT_DETECTED X-KSE-AntiSpam-Method: none X-KSE-AntiSpam-Rate: 0 X-KSE-AntiSpam-Info: Lua profiles 165972 [Sep 05 2021] X-KSE-AntiSpam-Info: Version: 5.9.20.0 X-KSE-AntiSpam-Info: Envelope from: arseny.krasnov@kaspersky.com X-KSE-AntiSpam-Info: LuaCore: 461 461 c95454ca24f64484bdf56c7842a96dd24416624e X-KSE-AntiSpam-Info: {Tracking_uf_ne_domains} X-KSE-AntiSpam-Info: {Tracking_from_domain_doesnt_match_to} X-KSE-AntiSpam-Info: kaspersky.com:7.1.1;lkml.org:7.1.1;d41d8cd98f00b204e9800998ecf8427e.com:7.1.1;127.0.0.199:7.1.2 X-KSE-AntiSpam-Info: Rate: 0 X-KSE-AntiSpam-Info: Status: not_detected X-KSE-AntiSpam-Info: Method: none X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 09/05/2021 15:52:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: Clean, bases: 05.09.2021 14:20:00 X-KSE-BulkMessagesFiltering-Scan-Result: InTheLimit X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-BulkMessagesFiltering-Scan-Result: InTheLimit X-KLMS-Rule-ID: 52 X-KLMS-Message-Action: clean X-KLMS-AntiSpam-Status: not scanned, disabled by settings X-KLMS-AntiSpam-Interceptor-Info: not scanned X-KLMS-AntiPhishing: Clean, bases: 2021/09/05 15:01:00 X-KLMS-AntiVirus: Kaspersky Security for Linux Mail Server, version 8.0.3.30, bases: 2021/09/05 13:26:00 #17165381 X-KLMS-AntiVirus-Status: Clean, skipped Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05.09.2021 18:55, Michael S. Tsirkin wrote: > On Fri, Sep 03, 2021 at 03:30:13PM +0300, Arseny Krasnov wrote: >> This patchset implements support of MSG_EOR bit for SEQPACKET >> AF_VSOCK sockets over virtio transport. >> First we need to define 'messages' and 'records' like this: >> Message is result of sending calls: 'write()', 'send()', 'sendmsg()' >> etc. It has fixed maximum length, and it bounds are visible using >> return from receive calls: 'read()', 'recv()', 'recvmsg()' etc. >> Current implementation based on message definition above. >> Record has unlimited length, it consists of multiple message, >> and bounds of record are visible via MSG_EOR flag returned from >> 'recvmsg()' call. Sender passes MSG_EOR to sending system call and >> receiver will see MSG_EOR when corresponding message will be processed. >> Idea of patchset comes from POSIX: it says that SEQPACKET >> supports record boundaries which are visible for receiver using >> MSG_EOR bit. So, it looks like MSG_EOR is enough thing for SEQPACKET >> and we don't need to maintain boundaries of corresponding send - >> receive system calls. But, for 'sendXXX()' and 'recXXX()' POSIX says, >> that all these calls operates with messages, e.g. 'sendXXX()' sends >> message, while 'recXXX()' reads messages and for SEQPACKET, 'recXXX()' >> must read one entire message from socket, dropping all out of size >> bytes. Thus, both message boundaries and MSG_EOR bit must be supported >> to follow POSIX rules. >> To support MSG_EOR new bit was added along with existing >> 'VIRTIO_VSOCK_SEQ_EOR': 'VIRTIO_VSOCK_SEQ_EOM'(end-of-message) - now it >> works in the same way as 'VIRTIO_VSOCK_SEQ_EOR'. But 'VIRTIO_VSOCK_SEQ_EOR' >> is used to mark 'MSG_EOR' bit passed from userspace. >> This patchset includes simple test for MSG_EOR. > > I'm prepared to merge this for this window, > but I'm not sure who's supposed to ack the net/vmw_vsock/af_vsock.c > bits. It's a harmless variable renaming so maybe it does not matter. > > The rest is virtio stuff so I guess my tree is ok. > > Objections, anyone? https://lkml.org/lkml/2021/9/3/76 this is v4. It is same as v5 in af_vsock.c changes. It has Reviewed by from Stefano Garzarella. > > >> Arseny Krasnov(6): >> virtio/vsock: rename 'EOR' to 'EOM' bit. >> virtio/vsock: add 'VIRTIO_VSOCK_SEQ_EOR' bit. >> vhost/vsock: support MSG_EOR bit processing >> virtio/vsock: support MSG_EOR bit processing >> af_vsock: rename variables in receive loop >> vsock_test: update message bounds test for MSG_EOR >> >> drivers/vhost/vsock.c | 28 +++++++++++++---------- >> include/uapi/linux/virtio_vsock.h | 3 ++- >> net/vmw_vsock/af_vsock.c | 10 ++++---- >> net/vmw_vsock/virtio_transport_common.c | 23 ++++++++++++------- >> tools/testing/vsock/vsock_test.c | 8 ++++++- >> 5 files changed, 45 insertions(+), 27 deletions(-) >> >> v4 -> v5: >> - Move bitwise and out of le32_to_cpu() in 0003. >> >> v3 -> v4: >> - 'sendXXX()' renamed to 'send*()' in 0002- commit msg. >> - Comment about bit restore updated in 0003-. >> - 'same' renamed to 'similar' in 0003- commit msg. >> - u32 used instead of uint32_t in 0003-. >> >> v2 -> v3: >> - 'virtio/vsock: rename 'EOR' to 'EOM' bit.' - commit message updated. >> - 'VIRTIO_VSOCK_SEQ_EOR' bit add moved to separate patch. >> - 'vhost/vsock: support MSG_EOR bit processing' - commit message >> updated. >> - 'vhost/vsock: support MSG_EOR bit processing' - removed unneeded >> 'le32_to_cpu()', because input argument was already in CPU >> endianness. >> >> v1 -> v2: >> - 'VIRTIO_VSOCK_SEQ_EOR' is renamed to 'VIRTIO_VSOCK_SEQ_EOM', to >> support backward compatibility. >> - use bitmask of flags to restore in vhost.c, instead of separated >> bool variable for each flag. >> - test for EAGAIN removed, as logically it is not part of this >> patchset(will be sent separately). >> - cover letter updated(added part with POSIX description). >> >> Signed-off-by: Arseny Krasnov >> -- >> 2.25.1 >