Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp5640045rwl; Tue, 11 Apr 2023 08:06:40 -0700 (PDT) X-Google-Smtp-Source: AKy350auEYPxZFl1Ty3luZVKh7WiiNmvK3ZrGQlkUvHiDsVeXrJQu9uNOYAaBDqlutbgBfHnvtRd X-Received: by 2002:a17:907:969e:b0:94d:4920:762c with SMTP id hd30-20020a170907969e00b0094d4920762cmr5054178ejc.63.1681225599851; Tue, 11 Apr 2023 08:06:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681225599; cv=none; d=google.com; s=arc-20160816; b=U5MyOkqjv1mUzNtq2BrGztyZ2thXhCRvjRgwuzA9yTZmKIP05ZGAmM0wsk08tFmhzQ hsYEt7wZX5ghu/KaqvjzESvTE6Vmk7y2IWZoxhYPuc5H08BqGsXFQU+89aCNoXCoi+I4 kTBaDEOu/3aDCdTUyRpj6aZxsTwmmwmySPuF9JiBt74RKnlZeeGxeW9m3cTZQVnWBrnE BKEaSwZTVjTWCfdX41qf05BdHDoROdIrOVwAu6p4Ib6O1WEd49x4Wd/MmY13+M9AQs5W xql72irvcCfkRGSk42URYiWLC36AepwtOGU5568+cMKDTUSGiHrXLMiTaH0GKaeRFLXp 2AWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=n1/uakkZjv9cQF6P7up1HAscrfLZ1PckVlhhE3kXYRA=; b=bcLXxwWXYqcYWVHdbvKmbmJKn9vAIz0tPd5wlA2bLxzYNK28x4p2D0EBYKNex5BHV3 85ukKtJ7eqVnckDd75/1iiSjjdc51GtH28GwP3/ZtyDw8nPJpaq8c1NkJ8jM6LRaOFUK Ec8zKMsS0297uV6YcUuEhD/j9peCY7eqqO9cX6wogDrej2LSnBypWsSLdfwLIZuimKUs psDiLdG7r50cXdQrfPu87pkFsPtXWjLGt+p6TaDacGsl8gNtghIDrNb1dmwECBh1QSlz cgH2tFTpRZi1Q96/tNh999Z4D3OYfTVicyEbRvzvTymVyPxTjwh4RHbQkfBLNIR9ZdhY mXYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20210112.gappssmtp.com header.s=20210112 header.b=i2M7Gt5e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x13-20020a170906710d00b0094aa6845719si2480411ejj.758.2023.04.11.08.06.13; Tue, 11 Apr 2023 08:06:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20210112.gappssmtp.com header.s=20210112 header.b=i2M7Gt5e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230120AbjDKOzR (ORCPT + 99 others); Tue, 11 Apr 2023 10:55:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46592 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230185AbjDKOy4 (ORCPT ); Tue, 11 Apr 2023 10:54:56 -0400 Received: from mail-io1-xd2d.google.com (mail-io1-xd2d.google.com [IPv6:2607:f8b0:4864:20::d2d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AB72E4C0E for ; Tue, 11 Apr 2023 07:54:51 -0700 (PDT) Received: by mail-io1-xd2d.google.com with SMTP id ca18e2360f4ac-7606d7cc9bdso2756339f.1 for ; Tue, 11 Apr 2023 07:54:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20210112.gappssmtp.com; s=20210112; t=1681224891; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=n1/uakkZjv9cQF6P7up1HAscrfLZ1PckVlhhE3kXYRA=; b=i2M7Gt5eHTm8Zs3MHrk2JXdsmGkyZeCGjw4sJo9A0tJ26iSzx4aGtypYqkuS6DYNUz lv1RUSJkcY1cOnuVLJs4ky1/FBfMdyPk/UbAr++vHYTxtv9pREyb/taP47PWOFzlSuMd u2X+Rt6tRRnnS6EJ6xBsDnWIVJG5kzFKGBG5C34Rf8brfoKsgQR70flgDtlaTr4hkMtK 40GCjDp8pq2KkGHK2ikm830ZQw/BPjREs1RKfJNSmVi1XbgCbldOvyTDewUFzkQmuKs/ AERVqGet/CWXA1fCNIa0kcXhEBm1pVqsYVUPejuHM9u2J0G9iMPDz/RN2vBo+F8bg4R/ zszg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1681224891; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=n1/uakkZjv9cQF6P7up1HAscrfLZ1PckVlhhE3kXYRA=; b=VQ4aBoJ3Xa/yNHMzG89js1216DULXzTPHE8niu2N6RsyeaXT5EFT+2fQv1durpkQ7L 0IsNMvKbv9frLpAKF7qK9cwuI9Kb/agY8m3BOHwccM6kutW6LiyTHova4F9a9fo84pIO x9B9vQNF0kkJPj/9XiO/fNCWbhr5tW2NmAOy8c7LKH5iu00zL7oyLlMWCrczhPfZQIE1 RBmCpXRFWThlGhy0oaEruqi9rttLPizaaJ9AgNZaG4G74GAJNAYsSBkVAPTc23hq1YAS P8579gB6mxD2nY7Z6x6y5zsbYGjJvA0gvVl9a+KFwozu8VmXYc1aRDw3MYjbbMZqcEFc nPSg== X-Gm-Message-State: AAQBX9dWSQdIpKbRswewLcl6zqLbneSOPE3vn+H8RYrCYkw80LTzJBOf QA5uSpSI9OvQfsgtJtNcuaXCDA== X-Received: by 2002:a6b:8d84:0:b0:740:7d21:d96f with SMTP id p126-20020a6b8d84000000b007407d21d96fmr4946123iod.1.1681224890937; Tue, 11 Apr 2023 07:54:50 -0700 (PDT) Received: from [192.168.1.94] ([96.43.243.2]) by smtp.gmail.com with ESMTPSA id y32-20020a029523000000b0040bd91e4803sm980367jah.155.2023.04.11.07.54.49 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 11 Apr 2023 07:54:50 -0700 (PDT) Message-ID: <036c80e5-4844-5c84-304c-7e553fe17a9b@kernel.dk> Date: Tue, 11 Apr 2023 08:54:49 -0600 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [PATCH 0/5] add initial io_uring_cmd support for sockets Content-Language: en-US To: Willem de Bruijn , David Ahern , Breno Leitao Cc: Willem de Bruijn , io-uring@vger.kernel.org, netdev@vger.kernel.org, kuba@kernel.org, asml.silence@gmail.com, leit@fb.com, edumazet@google.com, pabeni@redhat.com, davem@davemloft.net, dccp@vger.kernel.org, mptcp@lists.linux.dev, linux-kernel@vger.kernel.org, matthieu.baerts@tessares.net, marcelo.leitner@gmail.com References: <20230406144330.1932798-1-leitao@debian.org> <75e3c434-eb8b-66e5-5768-ca0f906979a1@kernel.org> <67831406-8d2f-feff-f56b-d0f002a95d96@kernel.dk> <643573df81e20_11117c2942@willemb.c.googlers.com.notmuch> From: Jens Axboe In-Reply-To: <643573df81e20_11117c2942@willemb.c.googlers.com.notmuch> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/11/23 8:51?AM, Willem de Bruijn wrote: > Jens Axboe wrote: >> On 4/11/23 8:36?AM, David Ahern wrote: >>> On 4/11/23 6:00 AM, Breno Leitao wrote: >>>> I am not sure if avoiding io_uring details in network code is possible. >>>> >>>> The "struct proto"->uring_cmd callback implementation (tcp_uring_cmd() >>>> in the TCP case) could be somewhere else, such as in the io_uring/ >>>> directory, but, I think it might be cleaner if these implementations are >>>> closer to function assignment (in the network subsystem). >>>> >>>> And this function (tcp_uring_cmd() for instance) is the one that I am >>>> planning to map io_uring CMDs to ioctls. Such as SOCKET_URING_OP_SIOCINQ >>>> -> SIOCINQ. >>>> >>>> Please let me know if you have any other idea in mind. >>> >>> I am not convinced that this io_uring_cmd is needed. This is one >>> in-kernel subsystem calling into another, and there are APIs for that. >>> All of this set is ioctl based and as Willem noted a little refactoring >>> separates the get_user/put_user out so that in-kernel can call can be >>> made with existing ops. >> >> How do you want to wire it up then? We can't use fops->unlocked_ioctl() >> obviously, and we already have ->uring_cmd() for this purpose. > > Does this suggestion not work? Not sure I follow, what suggestion? >>> I was thinking just having sock_uring_cmd call sock->ops->ioctl, like >>> sock_do_ioctl. > >> I do think the right thing to do is have a common helper that returns >> whatever value you want (or sets it), and split the ioctl parts into a >> wrapper around that that simply copies in/out as needed. Then >> ->uring_cmd() could call that, or you could some exported function that >> does supports that. >> >> This works for the basic cases, though I do suspect we'll want to go >> down the ->uring_cmd() at some point for more advanced cases or cases >> that cannot sanely be done in an ioctl fashion. > > Right now the two examples are ioctls that return an integer. Do you > already have other calls in mind? That would help estimate whether > ->uring_cmd() indeed will be needed and we might as well do it now. Right, it's a proof of concept. But we'd want to support anything that setsockopt/getsockopt would do. This is necessary so that direct descriptors (eg ones that describe a struct file that isn't in the process file table or have a regular fd) can be used for anything that a regular file can. Beyond that, perhaps various things necessary for efficient zero copy rx. I do think we can make the ->uring_cmd() hookup a bit more palatable in terms of API. It really should be just a sub-opcode and then arguments to support that. The grunt of the work is really refactoring the ioctl and set/getsockopt bits so that they can be called in-kernel rather than assuming copy in/out is needed. Once that is done, the actual uring_cmd hookup should be simple and trivial. -- Jens Axboe