Received: by 2002:a05:6a10:c7d3:0:0:0:0 with SMTP id h19csp1022026pxy; Sun, 15 Aug 2021 07:27:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwx5HNMhLA4VzK0KhdtHjcWrq4w1ljG0uLZOJKd/iMqX0XbfrmEO1Dn1iwME2Hj5nPeUChn X-Received: by 2002:a05:6602:341:: with SMTP id w1mr9149910iou.40.1629037641088; Sun, 15 Aug 2021 07:27:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629037641; cv=none; d=google.com; s=arc-20160816; b=BZ/yOxw3XX0r026rLMrWDHJ/MflmSxX38bHumuMiVuV6hy5kWAJMpStcLyZTTY/XXh 3kg+Pbd9p13pWa+67RLeoxv1K3Q/GRiEXSIroOeXVbLWoWXGZ26AeiziR3jIKXXyjf3N D7CFGXBL5clyFxtc7OtXCo0ogMvlNgh2xP5797ty8kncHw3ZuhVG3KUfRWCsy7Ab2uFI iBrPLjRO8alshjgFhNiDafHtobvhIb1OsUCUXnWk9W8VxTDwVWNFpxYHZ9LoiIhCcTXj aF/CchempvdIl9WcWjuy2j7HdwqTFUwPbknnCU45DTVWMsAEtB2kjmBFhoAVfErRZyux cbFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:subject :references:cc:to:from:dkim-signature; bh=CRJ1+O+VcHyTW4c7AMy1AHZjxvE1uhNkBIW8CcFWgPM=; b=E9JAbr4y5hUEKVr6YKeEuOihjsmbTaibE1qprPbLhyqvf7ym70bBVEoDBJM8IK3aT3 KQB5nzw66zsozorNgPYOC+zqe++LSlGYEw5ZfYvA24wJ6ixmE2o0LvLzefoNISDK173F Lf19hcUItN43IQC9fJt9xt8ELbhACQr0BMO/XF0mthxrteUmWjs4lIMs1rLnNRHIPcJ8 WeW5TfLjoqojcih06caaDlkxqglfq14h1hldUcqlVTSyWAP5Ak0GrL3PZCNuUQ/g+Yza RQwjTOAEIxaNKbaaiOtkDm1mvmbL2dvuTP3B/E7btTAqHowvJ+OAQJmeNxX/OrF6TQ/P XjDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AXBVZSe2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l13si67758jaq.11.2021.08.15.07.27.09; Sun, 15 Aug 2021 07:27:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AXBVZSe2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234707AbhHOOYa (ORCPT + 99 others); Sun, 15 Aug 2021 10:24:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52178 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233116AbhHOOY3 (ORCPT ); Sun, 15 Aug 2021 10:24:29 -0400 Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76794C061764; Sun, 15 Aug 2021 07:23:57 -0700 (PDT) Received: by mail-wr1-x434.google.com with SMTP id x10so13675931wrt.8; Sun, 15 Aug 2021 07:23:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:references:subject:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=CRJ1+O+VcHyTW4c7AMy1AHZjxvE1uhNkBIW8CcFWgPM=; b=AXBVZSe25UBmXPWv67tPGh26bOe9s1RkD+hTxHQNvdS1qD8etYso0gGVVGXumJLIUN wXBx/vojObCxwAdFViRUaOfdo115XxFMYFeYjEIxzz2jnIHDRwxj/5tgt1KuZLDov+le 8y3AL94DDQkBTQbXld2d+Xzvp5IPgVqdy469EIs3AnR4Nv9sn5Bhgid3rwprWwrCkfmf 6eHDp7cma8IcOUYatMAycp7ThWxkIyZimPIEmcwm4rfHyL7rCcw6dz7dyHbTFTc6904A GVW8iSYqVbdWLXIDRujjTGXsdhq5aLdKrzTpACyrUuPSraJ3NFu/QPsN1FsDFnwpbnnR ZHQQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:subject:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=CRJ1+O+VcHyTW4c7AMy1AHZjxvE1uhNkBIW8CcFWgPM=; b=m3cCKVKER25rd7LsmnnyOqBNqHATKPf3o/zv6LPjLZI+fKzlDuiC+fxMX1u14oPVc9 uE90mmjNTZYqsaFsdctNDUtBFxiLM+NPVQiYXVWtZb153H5IhkP3KwoJaBeCdUwBX0zK wIbjXjzHGtlbZApsFRKUZw0RH2Rd+cWIc/f4D8lBaWmBb3+XqNWe2cpyZjH+A9j8tgzd yNeLYpEdz3ZmwIlTq9u1B68Ze4hqpfmHdTldKKXufBfmd5H72FS19I61qPcldGvP/9dH WZPJ6hh4O0tBQuYTjw4zihwdTy2ZhuGGiTF7xMKTV9f8viG8z8+xzJ37+Kixb3cwQO8H a8QA== X-Gm-Message-State: AOAM531PZ8Zwd+KSpTUz2dR+0XKjf4BpKccqsqLcaCMtaowMwnZPa6QM gYt6JcFmZ6ZgvC6u/BkmARI= X-Received: by 2002:a5d:694f:: with SMTP id r15mr13520580wrw.86.1629037436077; Sun, 15 Aug 2021 07:23:56 -0700 (PDT) Received: from [192.168.8.197] ([148.252.133.97]) by smtp.gmail.com with ESMTPSA id k3sm3234567wms.28.2021.08.15.07.23.54 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 15 Aug 2021 07:23:55 -0700 (PDT) From: Pavel Begunkov To: Josh Triplett Cc: Jens Axboe , io-uring@vger.kernel.org, "David S . Miller" , Jakub Kicinski , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, Stefan Metzmacher References: Subject: Re: [PATCH v2 0/4] open/accept directly into io_uring fixed file table Message-ID: <4c607e25-b6bd-b24d-11d5-887dcee21e2b@gmail.com> Date: Sun, 15 Aug 2021 15:23:25 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/15/21 11:48 AM, Pavel Begunkov wrote: > On 8/15/21 4:31 AM, Josh Triplett wrote: >> On Sat, Aug 14, 2021 at 01:50:24PM +0100, Pavel Begunkov wrote: >>> On 8/13/21 8:00 PM, Josh Triplett wrote: >>>> Rather than using sqe->file_index - 1, which feels like an error-prone >>>> interface, I think it makes sense to use a dedicated flag for this, like >>>> IOSQE_OPEN_FIXED. That flag could work for any open-like operation, >>>> including open, accept, and in the future many other operations such as >>>> memfd_create. (Imagine using a single ring submission to open a memfd, >>>> write a buffer into it, seal it, send it over a UNIX socket, and then >>>> close it.) >>>> >>>> The only downside is that you'll need to reject that flag in all >>>> non-open operations. One way to unify that code might be to add a flag >>>> in io_op_def for open-like operations, and then check in common code for >>>> the case of non-open-like operations passing IOSQE_OPEN_FIXED. >>> >>> io_uring is really thin, and so I absolutely don't want any extra >>> overhead in the generic path, IOW anything affecting >>> reads/writes/sends/recvs. >> >> There are already several checks for valid flags in io_init_req. For >> instance: > > Yes, it's horrible and I don't want to make it any worse. > >> if ((sqe_flags & IOSQE_BUFFER_SELECT) && >> !io_op_defs[req->opcode].buffer_select) >> return -EOPNOTSUPP; >> It'd be trivial to make io_op_defs have a "valid flags" byte, and one >> bitwise op tells you if any invalid flags were passed. *Zero* additional >> overhead for other operations. > > Good point > >> Alternatively, since there are so few operations that open a file >> descriptor, you could just add a separate opcode for those few >> operations. That still seems preferable to overloading a 16-bit index >> field for this. > > I don't think so > >> With this new mechanism, I think we're going to want to support more >> than 65535 fixed-file entries. I can easily imagine wanting to handle >> hundreds of thousands of files or sockets this way. > > May be. What I'm curious about is that the feature doesn't really > change anything in this regard, but seems I haven't heard people > asking for larger tables. > >>> The other reason is that there are only 2 bits left in sqe->flags, >>> and we may use them for something better, considering that it's >>> only open/accept and not much as this. >> >> pipe, dup3, socket, socketpair, pidfds (via either pidfd_open or a >> ring-based spawn mechanism), epoll_create, inotify, fanotify, signalfd, >> timerfd, eventfd, memfd_create, userfaultfd, open_tree, fsopen, fsmount, >> memfd_secret. > > We could argue for many of those whether they should be in io_uring, > and whether there are many benefits having them async and so. It would > have another story if all the ecosystem was io_uring centric, but > that's speculations. > >> Of those, I personally would *love* to have at least pipe, socket, >> pidfd, memfd_create, and fsopen/fsmount/open_tree, plus some manner of >> dup-like operation for moving things between the fixed-file table and >> file descriptors. >> >> I think this is valuable and versatile enough to merit a flag. It would >> also be entirely reasonable to create separate operations for these. But >> either way, I don't think this should just be determined by whether a >> 16-bit index is non-zero. >> >>> I agree that it feels error-prone, but at least it can be wrapped >>> nicely enough in liburing, e.g. >>> >>> void io_uring_prep_openat_direct(struct io_uring_sqe *sqe, int dfd, >>> const char *path, int flags, >>> mode_t mode, int slot_idx); >> >> That wrapper wouldn't be able to handle more than a 16-bit slot index >> though. > > It would. Note, the index is "int" there, so if doesn't fit > into u16, we can fail it. And do conversion if required. > >>>> Also, rather than using a 16-bit index for the fixed file table and >>>> potentially requiring expansion into a different field in the future, >>>> what about overlapping it with the nofile field in the open and accept >>>> requests? If they're not opening a normal file descriptor, they don't >>>> need nofile. And in the original sqe, you can then overlap it with a >>>> 32-bit field like splice_fd_in. >>> >>> There is no nofile in SQEs, though >>> >>> req->open.nofile = rlimit(RLIMIT_NOFILE); >> >> nofile isn't needed for opening into the fixed-file table, so it could >> be omitted in that case, and another field unioned with it. > > There is no problem to place it internally. Moreover, it's at the > moment uniformly placed inside io_kiocb, but with nofile we'd need > to find the place on per-op basis. > > Not like any matters, it's just bike shedding. > >> allow passing a 32-bit fixed-file index into open and accept without >> growing the size of their structures. I think, with this new capability, >> we're going to want a large number of fixed files available. >> >> In the SQE, you could overlap it with the splice_fd_in field, which >> isn't needed by any calls other than splice. > > But it doesn't mean it won't be used, as happened with pretty every > other field in SQE. So, it rather depends on what packing is wanted. > And reusing almost never used ->buf_index (and potentially ->ioprio), > sounds reasonable. Aliasing with ->splice_fd_in looks better indeed (apart from it inherently not being checked, but meh?), But I still don't think it's a good option to use sqe->flags, and so still needs some way to switch between modes. Can be sqe->rw_flags as once was done with SPLICE_F_FD_IN_FIXED, but it's IMHO an ugly hackish way. I still lean to the 0 vs >0 encoding . -- Pavel Begunkov