| ▲ | georgyo 2 days ago | |||||||
Maybe not so doable. The whole point of io_uring is to reduce syscalls. So you end up just three. io_uring_setup, io_uring_register, io_uring_enter There is now a memory buffer that the user space and the kernel is reading, and with that buffer you can _always_ do any syscall that io_uring supports. And things like strace, eBPF, and seccomp cannot see the actual syscalls that are being called in that memory buffer. And, having something like seccomp or eBPF inspect the stream might slow it down enough to eat the performance gain. | ||||||||
| ▲ | to_ziegler 2 days ago | parent | next [-] | |||||||
There is some interesting ongoing research on eBPF and uring that you might find interesting, e.g., RingGuard: Guarding io_uring with eBPF (https://dl.acm.org/doi/10.1145/3609021.3609304 ). | ||||||||
| ▲ | Asmod4n 2 days ago | parent | prev | next [-] | |||||||
Ain’t eBPF hooks there so you can limit what a cgroup/process can do, not matter what API it’s calling. Like disallowing opening files or connecting sockets altogether. | ||||||||
| ▲ | actionfromafar 2 days ago | parent | prev [-] | |||||||
So io_uring is like transactions in sql but for syscalls? | ||||||||
| ||||||||