On Mon, 2022-11-21 at 12:01 +0000, Bobby Eshleman wrote: > On Tue, Dec 06, 2022 at 11:20:21AM +0100, Paolo Abeni wrote: > > Hello, > > > > On Fri, 2022-12-02 at 09:35 -0800, Bobby Eshleman wrote: > > [...] > > > diff --git a/include/linux/virtio_vsock.h b/include/linux/virtio_vsock.h > > > index 35d7eedb5e8e..6c0b2d4da3fe 100644 > > > --- a/include/linux/virtio_vsock.h > > > +++ b/include/linux/virtio_vsock.h > > > @@ -3,10 +3,129 @@ > > > #define _LINUX_VIRTIO_VSOCK_H > > > > > > #include <uapi/linux/virtio_vsock.h> > > > +#include <linux/bits.h> > > > #include <linux/socket.h> > > > #include <net/sock.h> > > > #include <net/af_vsock.h> > > > > > > +#define VIRTIO_VSOCK_SKB_HEADROOM (sizeof(struct virtio_vsock_hdr)) > > > + > > > +enum virtio_vsock_skb_flags { > > > + VIRTIO_VSOCK_SKB_FLAGS_REPLY = BIT(0), > > > + VIRTIO_VSOCK_SKB_FLAGS_TAP_DELIVERED = BIT(1), > > > +}; > > > + > > > +static inline struct virtio_vsock_hdr *virtio_vsock_hdr(struct sk_buff *skb) > > > +{ > > > + return (struct virtio_vsock_hdr *)skb->head; > > > +} > > > + > > > +static inline bool virtio_vsock_skb_reply(struct sk_buff *skb) > > > +{ > > > + return skb->_skb_refdst & VIRTIO_VSOCK_SKB_FLAGS_REPLY; > > > +} > > > > I'm sorry for the late feedback. The above is extremelly risky: if the > > skb will land later into the networking stack, we could experience the > > most difficult to track bugs. > > > > You should use the skb control buffer instead (skb->cb), with the > > additional benefit you could use e.g. bool - the compiler could emit > > better code to manipulate such fields - and you will not need to clear > > the field before release nor enqueue. > > > > [...] > > > > Hey Paolo, thank you for the review. For my own learning, this would > happen presumably when the skb is dropped? And I assume we don't see > this in sockmap because it is always cleared before leaving sockmap's > hands? I sanity checked this patch with an out-of-tree patch I have that > uses the networking stack, but I suspect I didn't see issues because my > test harness didn't induce dropping... skb->_skb_refdst carries a dst and a flag in the less significative bit specifying if the dst is refcounted. Passing to the network stack a skb overloading such bit semanthic is quite alike intentionally corrupting the kernel memory. > I originally avoided skb->cb because the reply flag is set at allocation > and would potentially be clobbered by a pass through the networking > stack. The reply flag would be used after a pass through the networking > stack (e.g., during transmission at the device level and when sockets > close while skbs are still queued for xmit). I assumed the 'tap_delivered' and 'reply' flag where relevant only while the skb is owned by the virtio socket. If you need to preserve such information _after_ delivering the skb to the network stack, that is quite unfortunate - and skb->cb will not work. The are a couple of options for adding new metadata inside the skb, both of them are quite discouraged/need a strong use-case: - adding new fields in some skb hole - adding a new skb extension. Could you please describe the 'reply' and 'tap_delivered' life-cycle and their interaction with the network stack? Cheers, Paolo _______________________________________________ Virtualization mailing list Virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/virtualization