[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20071206.005344.74817074.davem@davemloft.net>
Date: Thu, 06 Dec 2007 00:53:44 -0800 (PST)
From: David Miller <davem@...emloft.net>
To: stefan@...lof.de
Cc: herbert@...dor.apana.org.au, simon@...e.lp0.eu,
linux-kernel@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: sockets affected by IPsec always block (2.6.23)
From: Stefan Rompf <stefan@...lof.de>
Date: Thu, 6 Dec 2007 09:49:01 +0100
> "If the connection cannot be established immediately and O_NONBLOCK is set for
> the file descriptor for the socket, connect() shall fail and set errno to
> [EINPROGRESS], but the connection request shall not be aborted, and the
> connection shall be established asynchronously."
>
> I think the words "shall fail" and "immediately" are quite clear.
They are, but the context in which they apply is vague.
I can equally generate examples where the non-blocking behavior you
are a proponent of would break non-blocking UDP apps during a
sendmsg() call when we hit IPSEC resolution. Yet similar language on
blocking semantics exists for sendmsg() in the standards.
The world is shades of gray, implying anything else is foolhardy and
that's how I'm handling this.
> Well, the only reason this doesn't break on a daily basis is because the code
> isn't in the kernel that long and not many people run applications on an
> IPSEC gateway. This will change if kernel based IPSEC is used for roadwarrior
> connections or dnssec based anonymous IPSEC someday. Trust me, you will
> revert this misbehaviour in -stable then.
I use IPSEC every single day in this fashion, and I haven't.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists