[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ee13e83b22b7411c97a2a961015343d1@AcuMS.aculab.com>
Date: Fri, 29 Jan 2021 23:47:14 +0000
From: David Laight <David.Laight@...LAB.COM>
To: 'Matthew Wilcox' <willy@...radead.org>,
Jakub Kicinski <kuba@...nel.org>
CC: Shoaib Rao <rao.shoaib@...cle.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-api@...r.kernel.org" <linux-api@...r.kernel.org>,
"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
"David S. Miller" <davem@...emloft.net>,
"andy.rudoff@...el.com" <andy.rudoff@...el.com>
Subject: RE: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
> I'd encourage anyone thinking about "using OOB" to read
> https://tools.ietf.org/html/rfc6093 first. Basically, TCP does not
> actually provide an OOB mechanism, and frankly Unix sockets shouldn't
> try either.
OOB data maps much better onto ISO transport 'expedited data'
than anything in a bytestream protocol like TCP.
There you can send a message (it is message oriented) that isn't
subject to normal data flow control.
The length is limited (IIRC 32 bytes) and expedited data has
its own credit of one, but can overtake (and is expected to
overtake) flow control blocked normal data.
All TCP provides is a byte sequence number for OOB data.
This is just a marker in the bytestream.
It really doesn't map onto the socket OOB data data all.
David
-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
Registration No: 1397386 (Wales)
Powered by blists - more mailing lists