Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1339538ybk; Sat, 16 May 2020 08:13:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxzlcIiev1iQ4kqX3YXEncEawLVvuFrf7U3AxH1TfjquCCkPVFR93vrhC73atBYXR1GkJ7v X-Received: by 2002:a17:906:509:: with SMTP id j9mr7632501eja.152.1589641994255; Sat, 16 May 2020 08:13:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589641994; cv=none; d=google.com; s=arc-20160816; b=lIau7J5UQ/1Plll4ShdrZROw17XBSSBEpQnNUgS798qa35rjd8WPeulYNOq3chizpd gLzQQ7VfGpn718tUQnvYXBylK9Iw8tUc6gubWuFZCtgokpTMiAsczRNizG7hTmzUdbB9 hKk6pPoCXiXftIRy2Qmj0C9L+QEe90FUHns/NJODq7/n/r0ncTfRMHrMWxekFakalLBG UtB557bjTapNWIEIXeCid/efV35OVDdU93YeH5Pclx3/r+4AoGEKaO+wbc3xbfYp/CwN YWDnrLYk/j8NxLSKz03I4k4z5u9tBdLDKHjdNbd3hoOK0oTA3/G7/Uxz8itf/GcBuG9J 8Opg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from; bh=JC53c+1eAkf4n5RUJV9/TAzhG3C7lKqz1HWo1GDwurY=; b=hnX04UAlktifqDaY8b37zUCDr7vne2RYpJcC9pJ+k/hRs0OAMcoiwIyJ6jPlu7QxMe kqEqTnpgnnoT+Np6wOYYbJHh7AHnxH+QhZzRDlnV3Ej96WTfa7bPlWNxLFlfFd8oKqVu Pze5ZeWvSDTairrvYGy0rx8LEEaAkXi23uuGpxQ4rrIeWn7dH3cElPYkKf9t1qk1302P Jd8yirnpve4xcDF4wzx8q16wZupw5Ws+d0MPWLBVgViagwrn5ckDL4ZWb2btV72rU2vq 15f8TyFkzSLGk0DA9Clt32/GTW6zt4QLMvg9CyiZ0xDx7lEgEykE+/EmNzX/hQ22WVdD 2bKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=aculab.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 4si3504519edh.424.2020.05.16.08.12.38; Sat, 16 May 2020 08:13:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=aculab.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726948AbgEPPLq convert rfc822-to-8bit (ORCPT + 99 others); Sat, 16 May 2020 11:11:46 -0400 Received: from eu-smtp-delivery-151.mimecast.com ([207.82.80.151]:38278 "EHLO eu-smtp-delivery-151.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726907AbgEPPLo (ORCPT ); Sat, 16 May 2020 11:11:44 -0400 Received: from AcuMS.aculab.com (156.67.243.126 [156.67.243.126]) (Using TLS) by relay.mimecast.com with ESMTP id uk-mta-182-psAgggZzN62zzCab8iGYhQ-1; Sat, 16 May 2020 16:11:41 +0100 X-MC-Unique: psAgggZzN62zzCab8iGYhQ-1 Received: from AcuMS.Aculab.com (fd9f:af1c:a25b:0:43c:695e:880f:8750) by AcuMS.aculab.com (fd9f:af1c:a25b:0:43c:695e:880f:8750) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Sat, 16 May 2020 16:11:40 +0100 Received: from AcuMS.Aculab.com ([fe80::43c:695e:880f:8750]) by AcuMS.aculab.com ([fe80::43c:695e:880f:8750%12]) with mapi id 15.00.1347.000; Sat, 16 May 2020 16:11:40 +0100 From: David Laight To: 'David Howells' , Christoph Hellwig CC: Marcelo Ricardo Leitner , Eric Dumazet , "linux-nvme@lists.infradead.org" , "linux-sctp@vger.kernel.org" , "target-devel@vger.kernel.org" , "linux-afs@lists.infradead.org" , "drbd-dev@lists.linbit.com" , "linux-cifs@vger.kernel.org" , "rds-devel@oss.oracle.com" , "linux-rdma@vger.kernel.org" , "cluster-devel@redhat.com" , Alexey Kuznetsov , "linux-block@vger.kernel.org" , Jakub Kicinski , "ceph-devel@vger.kernel.org" , "linux-nfs@vger.kernel.org" , Neil Horman , Hideaki YOSHIFUJI , "netdev@vger.kernel.org" , Vlad Yasevich , "linux-kernel@vger.kernel.org" , Jon Maloy , Ying Xue , "David S. Miller" , "ocfs2-devel@oss.oracle.com" Subject: RE: [PATCH 27/33] sctp: export sctp_setsockopt_bindx Thread-Topic: [PATCH 27/33] sctp: export sctp_setsockopt_bindx Thread-Index: AQHWKsxNyiOODFVfBEqdWGEpseVc56iq0duQ Date: Sat, 16 May 2020 15:11:40 +0000 Message-ID: <05d946ae948946158dbfcbc07939b799@AcuMS.aculab.com> References: <20200514062820.GC8564@lst.de> <20200513062649.2100053-1-hch@lst.de> <20200513062649.2100053-28-hch@lst.de> <20200513180058.GB2491@localhost.localdomain> <129070.1589556002@warthog.procyon.org.uk> In-Reply-To: <129070.1589556002@warthog.procyon.org.uk> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.202.205.107] MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: aculab.com Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org From: David Howells > Sent: 15 May 2020 16:20 > Christoph Hellwig wrote: > > > > The advantage on using kernel_setsockopt here is that sctp module will > > > only be loaded if dlm actually creates a SCTP socket. With this > > > change, sctp will be loaded on setups that may not be actually using > > > it. It's a quite big module and might expose the system. > > > > True. Not that the intent is to kill kernel space callers of setsockopt, > > as I plan to remove the set_fs address space override used for it. > > For getsockopt, does it make sense to have the core kernel load optval/optlen > into a buffer before calling the protocol driver? Then the driver need not > see the userspace pointer at all. > > Similar could be done for setsockopt - allocate a buffer of the size requested > by the user inside the kernel and pass it into the driver, then copy the data > back afterwards. Yes, it also simplifies all the compat code. And there is a BPF test in setsockopt that also wants to pass on a kernel buffer. I'm willing to sit and write the patch. Quoting from a post I made later on Friday. Basically: This patch sequence (to be written) does the following: Patch 1: Change __sys_setsockopt() to allocate a kernel buffer, copy the data into it then call set_fs(KERNEL_DS). An on-stack buffer (say 64 bytes) will be used for small transfers. Patch 2: The same for __sys_getsockopt(). Patch 3: Compat setsockopt. Patch 4: Compat getsockopt. Patch 5: Remove the user copies from the global socket options code. Patches 6 to n-1; Remove the user copies from the per-protocol code. Patch n: Remove the set_fs(KERNEL_DS) from the entry points. This should be bisectable. David - Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK Registration No: 1397386 (Wales)