Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp3828280ybf; Tue, 3 Mar 2020 13:40:50 -0800 (PST) X-Google-Smtp-Source: ADFU+vuU6+SaS4wEcl8sc/+Jn2gzE+3qdvbtS280miQrNuAlM/gMOthgf5FXO8sxgDSQVUHg3nca X-Received: by 2002:aca:c341:: with SMTP id t62mr403492oif.41.1583271650401; Tue, 03 Mar 2020 13:40:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583271650; cv=none; d=google.com; s=arc-20160816; b=KDtbTK2tEBC0ZHHOyyIJcute7Vk7196KKl+2cGKQLT9gB1ktDEDMndghrZk7Q7PHzq YHFHNLQLKYwgHcrz5q2dWRQvAW0GkuQmGCApt+9jWC6OwOVW/l4/k8lC6rb5ia5Ed/5y OcV/USsNKfD8rNeYxGfM7LUOxjHRbNlRTxKhyUEswvvfM3UjG4TvkthWwV/clTP4HRTN rNh64FwXkEfUTPsco22lRjgfSbNqNDCV8oRQ6EwaORSR2C77PQlUgmS0Q1Q4Gq1+qwZf NJiegSfUo0xksASuYbOxpG8ZJGmIMcJ+t2ugbc1EYsc9ALf0rb17zZNdRFhDWz9ufUa+ 6WPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=RSIzwZ/6n1PHYZDks3JSmozsY5+mdyJZ4ev6Cx2e/uo=; b=D5ZQoYhD7oJuKauL5uxq2VCp3rBzIoAeYmEzzJ23srn1zhj7nhaCzpMmOtD2xCX+J9 Sq4CNqCLXXYT6iN3tO+v2RbQFHoiPpLtyuc8UmLqDvpTLzDRZz6evTXBqTySiFxeDbpT Gr33AAq6k7gnQTf/pIj1FrDV3baafDhA3ckkSJHxJI5L//3Xl95ZbETT+8reAaaAxjb/ OfGetfa8tWpaJ/r87V+RXPnpJTCKEVlxMSOKsIl5XbXwXzS7wJdzI5KfswH3UNG/Ac7a Xjt+B3uuImrwaADlgmk+oixYXi+TqHQiy9hE7UfEuVwcWeW8VqQ6UgWDWqqfy66mxnWK OlYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gGpKtYj4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n17si10041150otf.92.2020.03.03.13.40.38; Tue, 03 Mar 2020 13:40:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gGpKtYj4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729830AbgCCTCS (ORCPT + 99 others); Tue, 3 Mar 2020 14:02:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:41412 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728089AbgCCTCS (ORCPT ); Tue, 3 Mar 2020 14:02:18 -0500 Received: from tleilax.poochiereds.net (68-20-15-154.lightspeed.rlghnc.sbcglobal.net [68.20.15.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0CEEB20866; Tue, 3 Mar 2020 19:02:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583262136; bh=qpII4wdYHJwhFAnCde4eYkRsLi/qDHubQHybtAXjWsM=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=gGpKtYj4Zyd/XRowpu2VnXeYovcLUpEgl7/Vpd0xHAtiNH6nTNlnCcwxOO3l/6hgY uAfYATLBg/pMAbBATqT45hwqBoWRVA51ZW2wG6YNCvEJG5yg51nNJKet243+LknQmZ Xz/fAJW7FOAgTl0uXByEPlcVtiTUnWepBiZBG8VQ= Message-ID: Subject: Re: [PATCH 00/17] VFS: Filesystem information and notifications [ver #17] From: Jeff Layton To: Jens Axboe , Greg Kroah-Hartman , Jann Horn Cc: Miklos Szeredi , Karel Zak , David Howells , Ian Kent , Christian Brauner , James Bottomley , Steven Whitehouse , Miklos Szeredi , viro , Christian Brauner , "Darrick J. Wong" , Linux API , linux-fsdevel , lkml Date: Tue, 03 Mar 2020 14:02:13 -0500 In-Reply-To: <7a05adc8-1ca9-c900-7b24-305f1b3a9b86@kernel.dk> References: <1509948.1583226773@warthog.procyon.org.uk> <20200303113814.rsqhljkch6tgorpu@ws.net.home> <20200303130347.GA2302029@kroah.com> <20200303131434.GA2373427@kroah.com> <20200303134316.GA2509660@kroah.com> <20200303141030.GA2811@kroah.com> <20200303142407.GA47158@kroah.com> <030888a2-db3e-919d-d8ef-79dcc10779f9@kernel.dk> <7a05adc8-1ca9-c900-7b24-305f1b3a9b86@kernel.dk> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.4 (3.34.4-1.fc31) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2020-03-03 at 09:55 -0700, Jens Axboe wrote: > On 3/3/20 9:51 AM, Jeff Layton wrote: > > On Tue, 2020-03-03 at 08:44 -0700, Jens Axboe wrote: > > > On 3/3/20 7:24 AM, Greg Kroah-Hartman wrote: > > > > On Tue, Mar 03, 2020 at 03:13:26PM +0100, Jann Horn wrote: > > > > > On Tue, Mar 3, 2020 at 3:10 PM Greg Kroah-Hartman > > > > > wrote: > > > > > > On Tue, Mar 03, 2020 at 02:43:16PM +0100, Greg Kroah-Hartman wrote: > > > > > > > On Tue, Mar 03, 2020 at 02:34:42PM +0100, Miklos Szeredi wrote: > > > > > > > > On Tue, Mar 3, 2020 at 2:14 PM Greg Kroah-Hartman > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > Unlimited beers for a 21-line kernel patch? Sign me up! > > > > > > > > > > > > > > > > > > > > Totally untested, barely compiled patch below. > > > > > > > > > > > > > > > > > > Ok, that didn't even build, let me try this for real now... > > > > > > > > > > > > > > > > Some comments on the interface: > > > > > > > > > > > > > > Ok, hey, let's do this proper :) > > > > > > > > > > > > Alright, how about this patch. > > > > > > > > > > > > Actually tested with some simple sysfs files. > > > > > > > > > > > > If people don't strongly object, I'll add "real" tests to it, hook it up > > > > > > to all arches, write a manpage, and all the fun fluff a new syscall > > > > > > deserves and submit it "for real". > > > > > > > > > > Just FYI, io_uring is moving towards the same kind of thing... IIRC > > > > > you can already use it to batch a bunch of open() calls, then batch a > > > > > bunch of read() calls on all the new fds and close them at the same > > > > > time. And I think they're planning to add support for doing > > > > > open()+read()+close() all in one go, too, except that it's a bit > > > > > complicated because passing forward the file descriptor in a generic > > > > > way is a bit complicated. > > > > > > > > It is complicated, I wouldn't recommend using io_ring for reading a > > > > bunch of procfs or sysfs files, that feels like a ton of overkill with > > > > too much setup/teardown to make it worth while. > > > > > > > > But maybe not, will have to watch and see how it goes. > > > > > > It really isn't, and I too thinks it makes more sense than having a > > > system call just for the explicit purpose of open/read/close. As Jann > > > said, you can't currently do a linked sequence of open/read/close, > > > because the fd passing between them isn't done. But that will come in > > > the future. If the use case is "a bunch of files", then you could > > > trivially do "open bunch", "read bunch", "close bunch" in three separate > > > steps. > > > > > > Curious what the use case is for this that warrants a special system > > > call? > > > > > > > Agreed. I'd really rather see something more general-purpose than the > > proposed readfile(). At least with NFS and SMB, you can compound > > together fairly arbitrary sorts of operations, and it'd be nice to be > > able to pattern calls into the kernel for those sorts of uses. > > > > So, NFSv4 has the concept of a current_stateid that is maintained by the > > server. So basically you can do all this (e.g.) in a single compound: > > > > open > > write > > close > > > > It'd be nice to be able to do something similar with io_uring. Make it > > so that when you do an open, you set the "current fd" inside the > > kernel's context, and then be able to issue io_uring requests that > > specify a magic "fd" value that use it. > > > > That would be a really useful pattern. > > For io_uring, you can link requests that you submit into a chain. Each > link in the chain is done in sequence. Which means that you could do: > > > > in a single sequence. The only thing that is missing right now is a way > to have the return of that open propagated to the 'fd' of the read and > close, and it's actually one of the topics to discuss at LSFMM next > month. > > One approach would be to use BPF to handle this passing, another > suggestion has been to have the read/close specify some magic 'fd' value > that just means "inherit fd from result of previous". The latter sounds > very close to the stateid you mention above, and the upside here is that > it wouldn't explode the necessary toolchain to need to include BPF. > > In other words, this is really close to being reality and practically > feasible. > Excellent. Yes, the latter is exactly what I had in mind for this. I suspect that that would cover a large fraction of the potential use-cases for this. Basically, all you'd need to do is keep a pointer to struct file in the internal state for the chain. Then, allow userland to specify some magic fd value for subsequent chained operations that says to use that instead of consulting the fdtable. Maybe use -4096 (-MAX_ERRNO - 1)? That would cover the smb or nfs server sort of use cases, I think. For the sysfs cases, I guess you'd need to dispatch several chains, but that doesn't sound _too_ onerous. In fact, with that you should even be able to emulate the proposed readlink syscall in a userland library. -- Jeff Layton