[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20191011101408-mutt-send-email-mst@kernel.org>
Date: Fri, 11 Oct 2019 10:19:13 -0400
From: "Michael S. Tsirkin" <mst@...hat.com>
To: Stefano Garzarella <sgarzare@...hat.com>
Cc: netdev@...r.kernel.org, virtualization@...ts.linux-foundation.org,
Jorgen Hansen <jhansen@...are.com>,
"David S. Miller" <davem@...emloft.net>,
Stefan Hajnoczi <stefanha@...hat.com>,
Adit Ranadive <aditr@...are.com>,
Jason Wang <jasowang@...hat.com>, kvm@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH net 0/2] vsock: don't allow half-closed socket in the
host transports
On Fri, Oct 11, 2019 at 03:07:56PM +0200, Stefano Garzarella wrote:
> We are implementing a test suite for the VSOCK sockets and we discovered
> that vmci_transport never allowed half-closed socket on the host side.
>
> As Jorgen explained [1] this is due to the implementation of VMCI.
>
> Since we want to have the same behaviour across all transports, this
> series adds a section in the "Implementation notes" to exaplain this
> behaviour, and changes the vhost_transport to behave the same way.
>
> [1] https://patchwork.ozlabs.org/cover/847998/#1831400
Half closed sockets are very useful, and lots of
applications use tricks to swap a vsock for a tcp socket,
which might as a result break.
If VMCI really cares it can implement an ioctl to
allow applications to detect that half closed sockets aren't supported.
It does not look like VMCI wants to bother (users do not read
kernel implementation notes) so it does not really care.
So why do we want to cripple other transports intentionally?
> Stefano Garzarella (2):
> vsock: add half-closed socket details in the implementation notes
> vhost/vsock: don't allow half-closed socket in the host
>
> drivers/vhost/vsock.c | 17 ++++++++++++++++-
> net/vmw_vsock/af_vsock.c | 4 ++++
> 2 files changed, 20 insertions(+), 1 deletion(-)
>
> --
> 2.21.0
Powered by blists - more mailing lists