Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1545486rwd; Tue, 16 May 2023 20:02:16 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6uyoxz6FMJvJJ3s33iDqdRu1Qch8PA6jAEPfKdqE1FqmafgX/001DeyTUTAEVHCLiNEPhK X-Received: by 2002:a17:90b:1c8b:b0:247:26da:5de2 with SMTP id oo11-20020a17090b1c8b00b0024726da5de2mr38210350pjb.20.1684292535773; Tue, 16 May 2023 20:02:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684292535; cv=none; d=google.com; s=arc-20160816; b=ARJJXJDKKZbVPPKH5xdfXnvGrnIBMdNpAAx44uIrJWIXK6MKUrFO5EZ4EBBXP09+kv c2JCUoh7lR4C8Yqf7Mt1GvVRG4sM4mt8oBV0bTK8FLSkFqjT9q20IOV3oONR34HM/rlI DHLQikctpr/HUkpgTLVnwZVYV+TYRvhQ7OgIfqN1Rg8m5+6kTiy/4O+v1I1KudJ/UVPx 32XQhkVa8r9B7pS2+VLrapcfh9sqI+ZucS4oKZPfEWwKfFeYSxa+7y5EsBzKMMKng1YX x5VkfuLumW7HIrRSbxbuklWp+we/OiY8iNOMHabecT5ViOcjujKzvnPsfROm9Ao3/0DP Mo8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:feedback-id:content-transfer-encoding :mime-version:references:in-reply-to:from:subject:cc:to:message-id :date:dkim-signature:dkim-signature; bh=OCCHsehpwpTiqbn/RMnVD3BJ53Lefnpx+BHvyg1QJ+Y=; b=FaH5b1ddXFgVuD4Md6E5pLOtn16xhUcUcDJi0000812lmmlJOCt2undr/7pZhJpjzo Oiow2yC+vxaWRq4GoLdeUuw56mF/HbOK+y4J5Qst1OSt8k0t2RQ7VFGuLYax7EfznR9N ebY7aZfkiNJSN10dja0ayXVb+XqgOLG6xJOzoMwpwcUv47RH8RK+hxAWKueMD+NGDf6G /KoyXrzh3e7WedTz8MlqqNDFKkCDZsFt2hmhaixssHQdIAXxlFu3DUI+eWoTh2ds1d1N DuPYsZPwf9qkUtBg8B1coyWOBHLp7cfQ0ujA3b/l2fAdOOiuc7hLlZhAaY2dyx4RZoJE gttQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@exabit.dev header.s=s25kmyuhzvo7troimxqpmtptpemzlc6l header.b=eFZ25YFh; dkim=pass header.i=@amazonses.com header.s=hsbnp7p3ensaochzwyq5wwmceodymuwv header.b=VECbSMQE; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=exabit.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bt21-20020a632915000000b0052c30f8deafsi13688228pgb.767.2023.05.16.20.01.56; Tue, 16 May 2023 20:02:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@exabit.dev header.s=s25kmyuhzvo7troimxqpmtptpemzlc6l header.b=eFZ25YFh; dkim=pass header.i=@amazonses.com header.s=hsbnp7p3ensaochzwyq5wwmceodymuwv header.b=VECbSMQE; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=exabit.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232226AbjEQCx2 (ORCPT + 99 others); Tue, 16 May 2023 22:53:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37426 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231966AbjEQCx0 (ORCPT ); Tue, 16 May 2023 22:53:26 -0400 Received: from a27-52.smtp-out.us-west-2.amazonses.com (a27-52.smtp-out.us-west-2.amazonses.com [54.240.27.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 643094493 for ; Tue, 16 May 2023 19:53:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=s25kmyuhzvo7troimxqpmtptpemzlc6l; d=exabit.dev; t=1684291599; h=Date:Message-Id:To:Cc:Subject:From:In-Reply-To:References:Mime-Version:Content-Type:Content-Transfer-Encoding; bh=KQmit5OcpOxpqlAG2WNT/FBrH9mqQ2rnKfBqNv+af6o=; b=eFZ25YFhluKlo44NiPU38p0wv+C3FA3LRpGXKYCj/SecwKEYys9EP568OoXONrJ2 4hqgX3Zh/wRRBwrIbDlhhQ+Jmsz5fs6XeiizE564GGnDGIea+rnIstcr+S0v75OP0t+ U9QruQC7N1azgTDrLnvoguexkLpDm20UY1sZAWhGoWLIfWWLbPaSj4paBe6tNokoV+x X6pkgKiW9wwxOJe5CLFmyodL7sZ6VKp1rspoHI0w2Zx3kK34cpzftKQ6N3dbSUtS/du oko4jBQv/5qL42ZPO31461TtdRHKZxPw8SXWrcQq5Z6FzKuVgFi02hPL1pQT3BHmZkU uLAOmHbMjA== DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=hsbnp7p3ensaochzwyq5wwmceodymuwv; d=amazonses.com; t=1684291599; h=Date:Message-Id:To:Cc:Subject:From:In-Reply-To:References:Mime-Version:Content-Type:Content-Transfer-Encoding:Feedback-ID; bh=KQmit5OcpOxpqlAG2WNT/FBrH9mqQ2rnKfBqNv+af6o=; b=VECbSMQEsdcKEVV5U/aNeTaehZqFXGP17fiictEbFu96F/C20w302G31gZ7q8qNO +r4G8noPf3JofkgR55seDkKhveinmOO+t4tT6u70DLumUymchi5QL7ifCNdO5j6KVuU 5fPQyEl3hnSFdAX6MZWUgcOBR9yHCEyj2qw9F6T0= Date: Wed, 17 May 2023 02:46:39 +0000 Message-ID: <01010188279a3c77-331a93b1-4bef-491f-b772-564ec329b92c-000000@us-west-2.amazonses.com> To: wedsonaf@gmail.com Cc: tomo@exabit.dev, rust-for-linux@vger.kernel.org, netdev@vger.kernel.org, linux-crypto@vger.kernel.org, fujita.tomonori@gmail.com Subject: Re: [PATCH 2/2] rust: add socket support From: FUJITA Tomonori In-Reply-To: References: <20230515043353.2324288-1-tomo@exabit.dev> <010101881db03866-754b644c-682c-44be-8d8e-8376d34c77b3-000000@us-west-2.amazonses.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Feedback-ID: 1.us-west-2.j0GTvY5MHQQ5Spu+i4ZGzzYI1gDE7m7iuMEacWMZbe8=:AmazonSES X-SES-Outgoing: 2023.05.17-54.240.27.52 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, On Tue, 16 May 2023 14:08:47 -0300 Wedson Almeida Filho wrote: > We have basic networking support in the `rust` branch. In fact, we > also have support for async networking in there as well. For example, > the 9p server uses it. > > At the moment we're prioritizing upstreaming the pieces for which we > have projects waiting. Do you have an _actual_ user in mind for this? I've implemented in-kernel TLS 1.3 handshake on the top of this. https://github.com/fujita/rust-tls The in-kernel TLS handshake feature is controversial. Proposals were rejected in the past. So I like to know the opinions of subsystem maintainers early, implementing in-kernel security-relevant code in Rust could change the situation. The requirement for networking is simple, read/write with a vector and setsockopt. So I submitted minimum abstractions. > In any case, let's please start with that instead of a brand-new > reimplementation. Sure, if netdev maintainers could merge Rust abstractions for networking soon, I'll rework on this. But I don't think there is much overlap between this and rust branch. Even if we could have abstractions specific for TCP like TcpListener and TcpStream, we still need thin abstractions for socket because there are several use-cases of non IP sockets, I think. Thanks,