Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 60900C64EC4 for ; Thu, 9 Mar 2023 16:32:52 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230519AbjCIQcu (ORCPT ); Thu, 9 Mar 2023 11:32:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58758 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229614AbjCIQc1 (ORCPT ); Thu, 9 Mar 2023 11:32:27 -0500 Received: from mx.sberdevices.ru (mx.sberdevices.ru [45.89.227.171]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 86C695A6F4; Thu, 9 Mar 2023 08:24:12 -0800 (PST) Received: from s-lin-edge02.sberdevices.ru (localhost [127.0.0.1]) by mx.sberdevices.ru (Postfix) with ESMTP id AABC25FD16; Thu, 9 Mar 2023 19:23:24 +0300 (MSK) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sberdevices.ru; s=mail; t=1678379004; bh=EyTvpN4uMn4RAx5VHlCi+JShMPq/ATAlo5vfvsx5t7I=; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type; b=BOS3W4hL13GYcIkyEf3x1WCW2RO+yErg77QInwNZBjnpUAhQbMGF7l1gC1tIftnnI EpBmox6JCMX26SybqWt9dYc6ySvnQo9Qtjx7BKayOFtBrlqGOqgsZZZ/62T6HUBQo7 sKn2yFDLYTNH+wJvjp/PNIJgaKW9oSnJtLz8d2v0i4Tk01ZNPc+TU6mjlI5GR+YM7Y kqYGullPXnmaHzFW9n7PY9rZrnSC1sGO0iTSqVo0ibyriycfdtHe1yscwysUk7RIUm tIsDmr2iuR2ENzXJ1fHdXoaLdGytAhkoUcufHp9HcsRH1c+Ruz70tHy7PYjS7G6Gya 5Y/A9sKUHpSmA== Received: from S-MS-EXCH01.sberdevices.ru (S-MS-EXCH01.sberdevices.ru [172.16.1.4]) by mx.sberdevices.ru (Postfix) with ESMTP; Thu, 9 Mar 2023 19:23:20 +0300 (MSK) Message-ID: Date: Thu, 9 Mar 2023 19:20:20 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Subject: Re: [RFC PATCH v3 0/4] several updates to virtio/vsock Content-Language: en-US To: Stefano Garzarella CC: Stefan Hajnoczi , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Bobby Eshleman , , , , , , References: <0abeec42-a11d-3a51-453b-6acf76604f2e@sberdevices.ru> <20230309162150.qqrlqmqghi5muucx@sgarzare-redhat> From: Arseniy Krasnov In-Reply-To: <20230309162150.qqrlqmqghi5muucx@sgarzare-redhat> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [172.16.1.6] X-ClientProxiedBy: S-MS-EXCH02.sberdevices.ru (172.16.1.5) To S-MS-EXCH01.sberdevices.ru (172.16.1.4) X-KSMG-Rule-ID: 4 X-KSMG-Message-Action: clean X-KSMG-AntiSpam-Status: not scanned, disabled by settings X-KSMG-AntiSpam-Interceptor-Info: not scanned X-KSMG-AntiPhishing: not scanned, disabled by settings X-KSMG-AntiVirus: Kaspersky Secure Mail Gateway, version 1.1.2.30, bases: 2023/03/09 14:25:00 #20928723 X-KSMG-AntiVirus-Status: Clean, skipped Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09.03.2023 19:21, Stefano Garzarella wrote: > On Thu, Mar 09, 2023 at 01:10:36PM +0300, Arseniy Krasnov wrote: >> Hello, >> >> this patchset evolved from previous v2 version (see link below). It does >> several updates to virtio/vsock: >> 1) Changes 'virtio_transport_inc/dec_rx_pkt()' interface. Now instead of >>   using skbuff state ('head' and 'data' pointers) to update 'fwd_cnt' >>   and 'rx_bytes', integer value is passed as an input argument. This >>   makes code more simple, because in this case we don't need to udpate >>   skbuff state before calling 'virtio_transport_inc/dec_rx_pkt()'. In >>   more common words - we don't need to change skbuff state to update >>   'rx_bytes' and 'fwd_cnt' correctly. >> 2) For SOCK_STREAM, when copying data to user fails, current skbuff is >>   not dropped. Next read attempt will use same skbuff and last offset. >>   Instead of 'skb_dequeue()', 'skb_peek()' + '__skb_unlink()' are used. >>   This behaviour was implemented before skbuff support. >> 3) For SOCK_SEQPACKET it removes unneeded 'skb_pull()' call, because for >>   this type of socket each skbuff is used only once: after removing it >>   from socket's queue, it will be freed anyway. >> >> Test for 2) also added: >> Test tries to 'recv()' data to NULL buffer, then does 'recv()' with valid >> buffer. For SOCK_STREAM second 'recv()' must return data, because skbuff >> must not be dropped, but for SOCK_SEQPACKET skbuff will be dropped by >> kernel, and 'recv()' will return EAGAIN. >> >> Link to v1 on lore: >> https://lore.kernel.org/netdev/c2d3e204-89d9-88e9-8a15-3fe027e56b4b@sberdevices.ru/ >> >> Link to v2 on lore: >> https://lore.kernel.org/netdev/a7ab414b-5e41-c7b6-250b-e8401f335859@sberdevices.ru/ >> >> Change log: >> >> v1 -> v2: >> - For SOCK_SEQPACKET call 'skb_pull()' also in case of copy failure or >>   dropping skbuff (when we just waiting message end). >> - Handle copy failure for SOCK_STREAM in the same manner (plus free >>   current skbuff). >> - Replace bug repdroducer with new test in vsock_test.c >> >> v2 -> v3: >> - Replace patch which removes 'skb->len' subtraction from function >>   'virtio_transport_dec_rx_pkt()' with patch which updates functions >>   'virtio_transport_inc/dec_rx_pkt()' by passing integer argument >>   instead of skbuff pointer. >> - Replace patch which drops skbuff when copying to user fails with >>   patch which changes this behaviour by keeping skbuff in queue until >>   it has no data. >> - Add patch for SOCK_SEQPACKET which removes redundant 'skb_pull()' >>   call on read. >> - I remove "Fixes" tag from all patches, because all of them now change >>   code logic, not only fix something. > > Yes, but they solve the problem, so we should use the tag (I think at > least in patch 1 and 3). > > We usually use the tag when we are fixing a problem introduced by a > previous change. So we need to backport the patch to the stable branches > as well, and we need the tag to figure out which branches have the patch > or not. Ahh, sorry. Ok. I see now :) Thanks, Arseniy > > Thanks, > Stefano > >> >> Arseniy Krasnov (4): >>  virtio/vsock: don't use skbuff state to account credit >>  virtio/vsock: remove redundant 'skb_pull()' call >>  virtio/vsock: don't drop skbuff on copy failure >>  test/vsock: copy to user failure test >> >> net/vmw_vsock/virtio_transport_common.c |  29 +++--- >> tools/testing/vsock/vsock_test.c        | 118 ++++++++++++++++++++++++ >> 2 files changed, 131 insertions(+), 16 deletions(-) >> >> --  >> 2.25.1 >> >