Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp17328095rwd; Tue, 27 Jun 2023 01:09:42 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5nj3oexijaVQ5fPrumzDN0N5cn2zOjkqmD5b6llhgU+d99VHA4yfzCASzmW8mYz05xizc0 X-Received: by 2002:a05:6a20:3952:b0:122:7245:80aa with SMTP id r18-20020a056a20395200b00122724580aamr20634539pzg.42.1687853381770; Tue, 27 Jun 2023 01:09:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687853381; cv=none; d=google.com; s=arc-20160816; b=MvwLGmSql1mZZF24v7SkTHoCGCmR+H8FQjnF3wjnFHA26YTb1rPwbMLIZcl++4W1wK esJr3A1BhJlM/ILvaYFSSoXq2z9VZQnJopCqI7fCuUtGAigkpcHVa9pW3geU/hVJXXL3 bD9CxdJRIykMc3MXywdNLI1hlEGwJm6wI6r8Ce/ezu1VHmRq3S+VUsLLTKWRhoctvHml Yz6nt+hOjo1Ii+NC5g7MTIiDQpnFF663U60A3ZfmgcCrDf1Nyz1t1nt9ivxVuFHha081 rEX4mudA9k8JrHiAQOzSPy1wORxcXYSKgJXoUvqCymKTy/YcGgGoZ9wpuhQD3eN/ZW9A SbrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=8vz3rfN1JqJlfXhLD/L5Jo/WsFsNJWGpEaFmWZTzVCg=; fh=RLIg4Qx69YbP7amk0jom0T33Cg0yCfXE56y4Wnc1/1I=; b=Xspjns/v0SzOAmp9M6FVk6RNeWi1UKy6nwBYoB5FUKeo0z9sJ6XUQk9L+jSSBmtQlA IxOnkdjTUNanb9JJYibk3/SAmONejTQzzFaA84GMVfogux9wbL663GVI1BSP6cbWJY4W QAQCuFlXB2+3zIIySnmL4Fk6yv1J/+fVFLbr759O/dIJ7hTAIQPnToN8VN4Re6quIi// Qn4IJ41lEXcZxKXlS5WWBiDFJes8FZmMvQh7vJDpMSYy4HM8uIQORpkYsrBrEzAh0KY7 k/Y08iRTqMXYeqJea25FIYed05BuRfQ+o2VNFkABh8CLQqmWrvqZsyvCuvELafCcsHov v6bw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=B7QX1cxy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x137-20020a62868f000000b006689a4f67a5si6204129pfd.80.2023.06.27.01.09.29; Tue, 27 Jun 2023 01:09:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=B7QX1cxy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229814AbjF0Hvo (ORCPT + 99 others); Tue, 27 Jun 2023 03:51:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43092 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229710AbjF0Hvn (ORCPT ); Tue, 27 Jun 2023 03:51:43 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 68ABE26BA for ; Tue, 27 Jun 2023 00:50:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1687852257; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=8vz3rfN1JqJlfXhLD/L5Jo/WsFsNJWGpEaFmWZTzVCg=; b=B7QX1cxyNzE6LaOnLRR9hkQUOOkXNtujfYQUcrgfRdPbyaG3NSyLdZJ5SSd0t5t5tDBUXG m6a6+8JkOSZym8oMygvqhfQt8KlFCxa/45lAz/i/UXqonIK8A4kpiG2SnKGD/7qpaZKLU3 jLajZJdTHIFA6Tlq87AIVoE0g7VDLys= Received: from mail-ed1-f72.google.com (mail-ed1-f72.google.com [209.85.208.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-424-ouvw0Ru-ODiGfFSPJOUp-Q-1; Tue, 27 Jun 2023 03:50:56 -0400 X-MC-Unique: ouvw0Ru-ODiGfFSPJOUp-Q-1 Received: by mail-ed1-f72.google.com with SMTP id 4fb4d7f45d1cf-51bf860d719so2486341a12.1 for ; Tue, 27 Jun 2023 00:50:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687852255; x=1690444255; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=8vz3rfN1JqJlfXhLD/L5Jo/WsFsNJWGpEaFmWZTzVCg=; b=if2osYeZ54f0ORv8ZaIoweP976uDs+IG3qwx1et/J3cVzFA6GGoseoNnLwckd68OOl rNYmb2BaV1sPd+/4Q4M7IxeEIeoRk4W6xYNw4K7SBQXOtN9IGIZujpIoDdr8BnfEVkru 01lNxAzItJ76VxXMJLCAr6MeqR+9xBAY0TOESvr9vgcbDwImXwejcIn8dFaFWPztG24y /EZBQ7Lqm+7zhJd/iXbtzaAMpanXiEGBYGQuX48uJZkVe4c93qh5lGR7vGW7uvPKhTol Aw7KDzxq4CRX8AadcDxmBUnNMTgWUokMUlvtaP1EskMg6bPzJCDgvcFB9AmG429SnrSL rw9Q== X-Gm-Message-State: AC+VfDwuXTMx4QKzgCUfwXfmustwz+JbLPj1CIT84fFnqT+e8ekSBWmB e/M4bXcKFjXxuy0ynpuZiP2vzXHDV+GpiOUsWW3Wklk3eJK/b6/WBt0tD2tDVACcp0BlhZmsY3n zRjVqDwWz3LvA8BTvrjKtaxb6 X-Received: by 2002:aa7:c689:0:b0:51d:a9be:ab79 with SMTP id n9-20020aa7c689000000b0051da9beab79mr733758edq.2.1687852254826; Tue, 27 Jun 2023 00:50:54 -0700 (PDT) X-Received: by 2002:aa7:c689:0:b0:51d:a9be:ab79 with SMTP id n9-20020aa7c689000000b0051da9beab79mr733749edq.2.1687852254390; Tue, 27 Jun 2023 00:50:54 -0700 (PDT) Received: from sgarzare-redhat (host-87-11-6-160.retail.telecomitalia.it. [87.11.6.160]) by smtp.gmail.com with ESMTPSA id v14-20020aa7d80e000000b0051a59d81c4dsm3606442edq.3.2023.06.27.00.50.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 27 Jun 2023 00:50:53 -0700 (PDT) Date: Tue, 27 Jun 2023 09:50:50 +0200 From: Stefano Garzarella To: Arseniy Krasnov Cc: Stefan Hajnoczi , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , "Michael S. Tsirkin" , Jason Wang , Bobby Eshleman , kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kernel@sberdevices.ru, oxffffaa@gmail.com Subject: Re: [RFC PATCH v4 05/17] vsock/virtio: MSG_ZEROCOPY flag support Message-ID: References: <20230603204939.1598818-1-AVKrasnov@sberdevices.ru> <20230603204939.1598818-6-AVKrasnov@sberdevices.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1; format=flowed Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 27, 2023 at 07:41:51AM +0300, Arseniy Krasnov wrote: > > >On 26.06.2023 19:03, Stefano Garzarella wrote: >> On Sat, Jun 03, 2023 at 11:49:27PM +0300, Arseniy Krasnov wrote: >>> This adds handling of MSG_ZEROCOPY flag on transmission path: if this >>> flag is set and zerocopy transmission is possible, then non-linear skb >>> will be created and filled with the pages of user's buffer. Pages of >>> user's buffer are locked in memory by 'get_user_pages()'. >>> >>> Signed-off-by: Arseniy Krasnov >>> --- >>> net/vmw_vsock/virtio_transport_common.c | 270 ++++++++++++++++++------ >>> 1 file changed, 208 insertions(+), 62 deletions(-) >>> >>> diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c >>> index 0de562c1dc4b..f1ec38c72db7 100644 >>> --- a/net/vmw_vsock/virtio_transport_common.c >>> +++ b/net/vmw_vsock/virtio_transport_common.c >>> @@ -37,27 +37,100 @@ virtio_transport_get_ops(struct vsock_sock *vsk) >>> ????return container_of(t, struct virtio_transport, transport); >>> } >>> >>> -/* Returns a new packet on success, otherwise returns NULL. >>> - * >>> - * If NULL is returned, errp is set to a negative errno. >>> - */ >>> -static struct sk_buff * >>> -virtio_transport_alloc_skb(struct virtio_vsock_pkt_info *info, >>> -?????????????? size_t len, >>> -?????????????? u32 src_cid, >>> -?????????????? u32 src_port, >>> -?????????????? u32 dst_cid, >>> -?????????????? u32 dst_port) >>> -{ >>> -??? const size_t skb_len = VIRTIO_VSOCK_SKB_HEADROOM + len; >>> -??? struct virtio_vsock_hdr *hdr; >>> -??? struct sk_buff *skb; >>> +static bool virtio_transport_can_zcopy(struct virtio_vsock_pkt_info *info, >>> +?????????????????????? size_t max_to_send) >>> +{ >>> +??? struct iov_iter *iov_iter; >>> + >>> +??? if (!info->msg) >>> +??????? return false; >>> + >>> +??? iov_iter = &info->msg->msg_iter; >>> + >>> +??? /* Data is simple buffer. */ >>> +??? if (iter_is_ubuf(iov_iter)) >>> +??????? return true; >>> + >>> +??? if (!iter_is_iovec(iov_iter)) >>> +??????? return false; >>> + >>> +??? if (iov_iter->iov_offset) >>> +??????? return false; >>> + >>> +??? /* We can't send whole iov. */ >>> +??? if (iov_iter->count > max_to_send) >>> +??????? return false; >>> + >>> +??? return true; >>> +} >>> + >>> +static int virtio_transport_init_zcopy_skb(struct vsock_sock *vsk, >>> +?????????????????????? struct sk_buff *skb, >>> +?????????????????????? struct msghdr *msg, >>> +?????????????????????? bool zerocopy) >>> +{ >>> +??? struct ubuf_info *uarg; >>> + >>> +??? if (msg->msg_ubuf) { >>> +??????? uarg = msg->msg_ubuf; >>> +??????? net_zcopy_get(uarg); >>> +??? } else { >>> +??????? struct iov_iter *iter = &msg->msg_iter; >>> +??????? struct ubuf_info_msgzc *uarg_zc; >>> +??????? int len; >>> + >>> +??????? /* Only ITER_IOVEC or ITER_UBUF are allowed and >>> +???????? * checked before. >>> +???????? */ >>> +??????? if (iter_is_iovec(iter)) >>> +??????????? len = iov_length(iter->__iov, iter->nr_segs); >>> +??????? else >>> +??????????? len = iter->count; >>> + >>> +??????? uarg = msg_zerocopy_realloc(sk_vsock(vsk), >>> +??????????????????????? len, >>> +??????????????????????? NULL); >>> + >>> +??????? if (!uarg) >>> +??????????? return -1; >>> + >>> +??????? uarg_zc = uarg_to_msgzc(uarg); >>> +??????? uarg_zc->zerocopy = zerocopy ? 1 : 0; >>> +??? } >>> + >>> +??? skb_zcopy_init(skb, uarg); >>> + >>> +??? return 0; >>> +} >>> + >>> +static int virtio_transport_fill_linear_skb(struct sk_buff *skb, >>> +??????????????????????? struct vsock_sock *vsk, >> >> `vsk` seems unused >> >>> +??????????????????????? struct virtio_vsock_pkt_info *info, >>> +??????????????????????? size_t len) >>> +{ >>> ????void *payload; >>> ????int err; >>> >>> -??? skb = virtio_vsock_alloc_skb(skb_len, GFP_KERNEL); >>> -??? if (!skb) >>> -??????? return NULL; >>> +??? payload = skb_put(skb, len); >>> +??? err = memcpy_from_msg(payload, info->msg, len); >>> +??? if (err) >>> +??????? return -1; >>> + >>> +??? if (msg_data_left(info->msg)) >>> +??????? return 0; >>> + >>> +??? return 0; >>> +} >>> + >>> +static void virtio_transport_init_hdr(struct sk_buff *skb, >>> +????????????????????? struct virtio_vsock_pkt_info *info, >>> +????????????????????? u32 src_cid, >>> +????????????????????? u32 src_port, >>> +????????????????????? u32 dst_cid, >>> +????????????????????? u32 dst_port, >>> +????????????????????? size_t len) >>> +{ >>> +??? struct virtio_vsock_hdr *hdr; >>> >>> ????hdr = virtio_vsock_hdr(skb); >>> ????hdr->type??? = cpu_to_le16(info->type); >>> @@ -68,42 +141,6 @@ virtio_transport_alloc_skb(struct virtio_vsock_pkt_info *info, >>> ????hdr->dst_port??? = cpu_to_le32(dst_port); >>> ????hdr->flags??? = cpu_to_le32(info->flags); >>> ????hdr->len??? = cpu_to_le32(len); >>> - >>> -??? if (info->msg && len > 0) { >>> -??????? payload = skb_put(skb, len); >>> -??????? err = memcpy_from_msg(payload, info->msg, len); >>> -??????? if (err) >>> -??????????? goto out; >>> - >>> -??????? if (msg_data_left(info->msg) == 0 && >>> -??????????? info->type == VIRTIO_VSOCK_TYPE_SEQPACKET) { >>> -??????????? hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOM); >>> - >>> -??????????? if (info->msg->msg_flags & MSG_EOR) >>> -??????????????? hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOR); >>> -??????? } >>> -??? } >>> - >>> -??? if (info->reply) >>> -??????? virtio_vsock_skb_set_reply(skb); >>> - >>> -??? trace_virtio_transport_alloc_pkt(src_cid, src_port, >>> -???????????????????? dst_cid, dst_port, >>> -???????????????????? len, >>> -???????????????????? info->type, >>> -???????????????????? info->op, >>> -???????????????????? info->flags); >>> - >>> -??? if (info->vsk && !skb_set_owner_sk_safe(skb, sk_vsock(info->vsk))) { >>> -??????? WARN_ONCE(1, "failed to allocate skb on vsock socket with sk_refcnt == 0\n"); >>> -??????? goto out; >>> -??? } >>> - >>> -??? return skb; >>> - >>> -out: >>> -??? kfree_skb(skb); >>> -??? return NULL; >>> } >>> >>> static void virtio_transport_copy_nonlinear_skb(struct sk_buff *skb, >>> @@ -214,6 +251,85 @@ static u16 virtio_transport_get_type(struct sock *sk) >>> ??????? return VIRTIO_VSOCK_TYPE_SEQPACKET; >>> } >>> >>> +/* Returns a new packet on success, otherwise returns NULL. >>> + * >>> + * If NULL is returned, errp is set to a negative errno. >> >> I had noticed this in Bobby's patches, I think it's an old comment we >> left around. >> >>> + */ >>> +static struct sk_buff *virtio_transport_alloc_skb(struct vsock_sock *vsk, >>> +????????????????????????? struct virtio_vsock_pkt_info *info, >>> +????????????????????????? size_t payload_len, >>> +????????????????????????? bool zcopy, >>> +????????????????????????? u32 dst_cid, >>> +????????????????????????? u32 dst_port, >>> +????????????????????????? u32 src_cid, >>> +????????????????????????? u32 src_port) >>> +{ >>> +??? struct sk_buff *skb; >>> +??? size_t skb_len; >>> + >>> +??? skb_len = VIRTIO_VSOCK_SKB_HEADROOM; >>> + >>> +??? if (!zcopy) >>> +??????? skb_len += payload_len; >>> + >>> +??? skb = virtio_vsock_alloc_skb(skb_len, GFP_KERNEL); >>> +??? if (!skb) >>> +??????? return NULL; >>> + >>> +??? virtio_transport_init_hdr(skb, info, src_cid, src_port, >>> +????????????????? dst_cid, dst_port, >>> +????????????????? payload_len); >>> + >>> +??? /* Set owner here, because '__zerocopy_sg_from_iter()' uses >>> +???? * owner of skb without check to update 'sk_wmem_alloc'. >>> +???? */ >>> +??? if (vsk) >>> +??????? skb_set_owner_w(skb, sk_vsock(vsk)); >> >> why we are moving from skb_set_owner_sk_safe() to skb_set_owner_w()? >> >> We should mention this in the commit description. >> >>> + >>> +??? if (info->msg && payload_len > 0) { >>> +??????? int err; >>> + >>> +??????? if (zcopy) { >>> +??????????? err = __zerocopy_sg_from_iter(info->msg, NULL, skb, >>> +????????????????????????????? &info->msg->msg_iter, >>> +????????????????????????????? payload_len); >>> +??????? } else { >>> +??????????? err = virtio_transport_fill_linear_skb(skb, vsk, info, payload_len); >>> +??????? } >>> + >>> +??????? if (err) >>> +??????????? goto out; >>> + >>> +??????? VIRTIO_VSOCK_SKB_CB(skb)->frag_off = 0; >>> + >>> +??????? if (info->type == VIRTIO_VSOCK_TYPE_SEQPACKET) { >>> +??????????? struct virtio_vsock_hdr *hdr; >>> + >>> +??????????? hdr = virtio_vsock_hdr(skb); >> >> Just `struct virtio_vsock_hdr *hdr = virtio_vsock_hdr(skb);` should be >> fine. >> >>> + >>> +??????????? hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOM); >>> + >>> +??????????? if (info->msg->msg_flags & MSG_EOR) >>> +??????????????? hdr->flags |= cpu_to_le32(VIRTIO_VSOCK_SEQ_EOR); >>> +??????? } >>> +??? } >>> + >>> +??? if (info->reply) >>> +??????? virtio_vsock_skb_set_reply(skb); >>> + >>> +??? trace_virtio_transport_alloc_pkt(src_cid, src_port, >>> +???????????????????? dst_cid, dst_port, >>> +???????????????????? payload_len, >>> +???????????????????? info->type, >>> +???????????????????? info->op, >>> +???????????????????? info->flags); >>> + >>> +??? return skb; >>> +out: >>> +??? kfree_skb(skb); >>> +??? return NULL; >>> +} >>> + >>> /* This function can only be used on connecting/connected sockets, >>> ?* since a socket assigned to a transport is required. >>> ?* >>> @@ -226,6 +342,8 @@ static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, >>> ????const struct virtio_transport *t_ops; >>> ????struct virtio_vsock_sock *vvs; >>> ????u32 pkt_len = info->pkt_len; >>> +??? bool can_zcopy = false; >>> +??? u32 max_skb_cap; >>> ????u32 rest_len; >>> ????int ret; >>> >>> @@ -254,22 +372,49 @@ static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, >>> ????if (pkt_len == 0 && info->op == VIRTIO_VSOCK_OP_RW) >>> ??????? return pkt_len; >>> >>> +??? /* If zerocopy is not enabled by 'setsockopt()', we behave as >>> +???? * there is no MSG_ZEROCOPY flag set. >>> +???? */ >>> +??? if (!sock_flag(sk_vsock(vsk), SOCK_ZEROCOPY)) >>> +??????? info->flags &= ~MSG_ZEROCOPY; >>> + >>> +??? if (info->flags & MSG_ZEROCOPY) >>> +??????? can_zcopy = virtio_transport_can_zcopy(info, pkt_len); >>> + >>> +??? if (can_zcopy) >>> +??????? max_skb_cap = min_t(u32, VIRTIO_VSOCK_MAX_PKT_BUF_SIZE, >>> +??????????????????? (MAX_SKB_FRAGS * PAGE_SIZE)); >>> +??? else >>> +??????? max_skb_cap = VIRTIO_VSOCK_MAX_PKT_BUF_SIZE; >>> + >> >> We use `len` very often, what about `max_skb_len`? >> >>> ????rest_len = pkt_len; >>> >>> ????do { >>> ??????? struct sk_buff *skb; >>> ??????? size_t skb_len; >>> >>> -??????? skb_len = min_t(u32, VIRTIO_VSOCK_MAX_PKT_BUF_SIZE, rest_len); >>> +??????? skb_len = min(max_skb_cap, rest_len); >>> >>> -??????? skb = virtio_transport_alloc_skb(info, skb_len, >>> -???????????????????????? src_cid, src_port, >>> -???????????????????????? dst_cid, dst_port); >>> +??????? skb = virtio_transport_alloc_skb(vsk, info, skb_len, can_zcopy, >>> +???????????????????????? dst_cid, dst_port, >>> +???????????????????????? src_cid, src_port); >>> ??????? if (!skb) { >>> ??????????? ret = -ENOMEM; >>> ??????????? break; >>> ??????? } >>> >>> +??????? /* This is last skb to send this portion of data. */ >>> +??????? if (skb_len == rest_len && >>> +??????????? info->flags & MSG_ZEROCOPY && >>> +??????????? info->op == VIRTIO_VSOCK_OP_RW) { >>> +??????????? if (virtio_transport_init_zcopy_skb(vsk, skb, >>> +??????????????????????????????? info->msg, >>> +??????????????????????????????? can_zcopy)) { >>> +??????????????? ret = -ENOMEM; >>> +??????????????? break; >>> +??????????? } >>> +??????? } >>> + >>> ??????? virtio_transport_inc_tx_pkt(vvs, skb); >>> >>> ??????? ret = t_ops->send_pkt(skb); >>> @@ -884,6 +1029,7 @@ virtio_transport_stream_enqueue(struct vsock_sock *vsk, >>> ??????? .msg = msg, >>> ??????? .pkt_len = len, >>> ??????? .vsk = vsk, >>> +??????? .flags = msg->msg_flags, >> >> These flags then get copied into the virtio_vsock_hdr, which I don't >> think is a good idea. >> >> Why not using directly info->msg->msg_flags? > >Ops, yes, it's a bug, You're right, this is really wrong as there are two different >sets of flags - MSG_XXX passed to syscall and flags in the header of packet. Yep. What about the moving from skb_set_owner_sk_safe() to skb_set_owner_w()? Was it voluntary? If so, can you explain why? Thanks, Stefano