Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4570896ybi; Tue, 11 Jun 2019 08:47:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqzOeR+hppPRdwiPxDcF9rOeBYXQasVT+zhWnDi9L7Dw9fboXL7Nb+nP8Pjg7JEWBGpG7G7k X-Received: by 2002:a63:2a89:: with SMTP id q131mr21144182pgq.359.1560268025058; Tue, 11 Jun 2019 08:47:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560268025; cv=none; d=google.com; s=arc-20160816; b=ubWuzwqubtabtuv3gYiuw5k1dlopIRNVFX6oRxUg7YzMWjpgriTEMsYc6E4olTwDSS xb1gUVGjMknVxPdjTtbLDdpfK0EDOr0knbWxQ9k4LrSNrxn8lXwkhdOUF3D21Trp5OCt brM5ToPcyjWBk0zbSYSJRml9mU5mCH3s+AXAIC6B2jwvcZo9Dgh7TLQ0BqG9FtLs8dQT SR2GO1W5N6A+B6WAfFbK0kcj7SMPf1mwKJ30tEGg5FAKEwnaj4Pf0Lcj2CLLGIe78yz/ K+Fg+fH0oquPopkLTc2MI4MTUq1j/2FFAgouW2keiE5DbaUcB0/nC2rNqNRDoLG2oPJM DWyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=xK020Z2+fgxwSXrAeA2iIclqsLfnnXY0duTo4jsqB7k=; b=phBfgIXhhIiEI0lNgDGeGxZS3XK5p/FSvVUVTXFwhspQw9MraxBG1mfpM45BR2Gw5h Uu4uJfWJRub6hUc8TCJx8XWtYRcaLV29WqpAkBkdx4Sa4OMSv628wjQmqddl7fMPnLM1 /YQoa1yVXPwmfKTcXtPz9OKpVg8InjdxQZIXZtDvAWY4pD0TP3CCK38BqyrGX+6ke2+Z DWOKiFmsBRh8QV6fdZGU7hduve0IhepGryTC6sxeVAfP3sHQFePjSZXdqexpvSv/syjK Bqfp3gKsRMjgJ14WCoEJZSnbqLAkQ+02wOjyzKDDJhb6axiGYZ0P3WQdxVdJ8i67U6gq sVwA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w13si12344264plp.271.2019.06.11.08.46.49; Tue, 11 Jun 2019 08:47:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391683AbfFKO4K (ORCPT + 99 others); Tue, 11 Jun 2019 10:56:10 -0400 Received: from mx2.suse.de ([195.135.220.15]:52414 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2388097AbfFKOzJ (ORCPT ); Tue, 11 Jun 2019 10:55:09 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id C8BD6AEF5; Tue, 11 Jun 2019 14:55:07 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Al Viro , Linus Torvalds , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v4 02/14] epoll: introduce user structures for polling from userspace Date: Tue, 11 Jun 2019 16:54:46 +0200 Message-Id: <20190611145458.9540-3-rpenyaev@suse.de> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190611145458.9540-1-rpenyaev@suse.de> References: <20190611145458.9540-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This one introduces structures of user items array: struct epoll_uheader - describes inserted epoll items. struct epoll_uitem - single epoll item visible to userspace. Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Al Viro Cc: Linus Torvalds Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- fs/eventpoll.c | 11 +++++++++++ include/uapi/linux/eventpoll.h | 29 +++++++++++++++++++++++++++++ 2 files changed, 40 insertions(+) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index 50bb99e98872..90dc75ad4144 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -4,6 +4,7 @@ * Copyright (C) 2001,...,2009 Davide Libenzi * * Davide Libenzi + * Polling from userspace support by Roman Penyaev */ #include @@ -104,6 +105,16 @@ #define EP_ITEM_COST (sizeof(struct epitem) + sizeof(struct eppoll_entry)) +/* + * That is around 1.3mb of allocated memory for one epfd. What is more + * important is ->index_length, which should be ^2, so do not increase + * max items number to avoid size doubling of user index. + * + * Before increasing the value see add_event_to_uring() and especially + * cnt_to_advance() functions and change them accordingly. + */ +#define EP_USERPOLL_MAX_ITEMS_NR 65536 + struct epoll_filefd { struct file *file; int fd; diff --git a/include/uapi/linux/eventpoll.h b/include/uapi/linux/eventpoll.h index 39dfc29f0f52..3317901b19c4 100644 --- a/include/uapi/linux/eventpoll.h +++ b/include/uapi/linux/eventpoll.h @@ -79,4 +79,33 @@ struct epoll_event { __u64 data; } EPOLL_PACKED; +#define EPOLL_USERPOLL_HEADER_MAGIC 0xeb01eb01 +#define EPOLL_USERPOLL_HEADER_SIZE 128 + +/* + * Item, shared with userspace. Unfortunately we can't embed epoll_event + * structure, because it is badly aligned on all 64-bit archs, except + * x86-64 (see EPOLL_PACKED). sizeof(epoll_uitem) == 16 + */ +struct epoll_uitem { + __poll_t ready_events; + __poll_t events; + __u64 data; +}; + +/* + * Header, shared with userspace. sizeof(epoll_uheader) == 128 + */ +struct epoll_uheader { + __u32 magic; /* epoll user header magic */ + __u32 header_length; /* length of the header + items */ + __u32 index_length; /* length of the index ring, always pow2 */ + __u32 max_items_nr; /* max number of items */ + __u32 head; /* updated by userland */ + __u32 tail; /* updated by kernel */ + + struct epoll_uitem items[] + __attribute__((__aligned__(EPOLL_USERPOLL_HEADER_SIZE))); +}; + #endif /* _UAPI_LINUX_EVENTPOLL_H */ -- 2.21.0