Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp2402447rwr; Fri, 28 Apr 2023 09:50:37 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7SccUSlwgJQj5outIb8Eps/lt94CfiroVHbIsb12sMpjPVYpMfSTS6wsLRAq+p9F/aPtD0 X-Received: by 2002:a05:6a00:2314:b0:639:243f:da25 with SMTP id h20-20020a056a00231400b00639243fda25mr8121311pfh.22.1682700637061; Fri, 28 Apr 2023 09:50:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682700637; cv=none; d=google.com; s=arc-20160816; b=TfQjhat683ix5YIQCWm6RRJwahG4yFGfU6YLq51Cc1cgPmItMUe1O6xeK2ZifbS/FP xq7cfHGABv0d8Toxq4cSevZfl0yAfXzy0xkmcNMzpEs7scQQ5tuwiZR50+XuOp1TzIoS syGNJJwffVRxCOjw5mUYJnofIvG7K62B5tMe0Ug3m2AEJyzkHaG3+yyG5Om1TVEZo2lx 8CpO7bbq7B+vCYL/SUIlfAIxJF+ProYlFuI9outtJ2j6ga9nDjTDEP+Zqh01nsAUq1Is 630yUuGHQevj/wLX6lFMyjaRaAEcGq2jrazHII6SUepqRPjUWC6R6cdOU9M7HV/ssVgX WiMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:feedback-id:dkim-signature:dkim-signature; bh=LaoBiOojUkxX5UqrfOo3s8Jg5v907MZ8tMGaLEs3yys=; b=zr79Tuu0phogYh36s6+cmd+p+yIB/GHI8pyhIB0RRlpNwaKpPrFFcJX5SFyiOMDrQl m9/hdCMUaJ6EYKPtpNTHyXbQZcxV8x9G+Devu3VENWCK4iwqI2vdtLyozrXgsgXNX7IH exZYdpsitDvHRdHq+eS81jV7oNGJNryo7j16rZFlWKUUkH1vl/XdpwkfegLsYqCFzAPE qY9xQAoi6qWWMzg1hEjRkxpwkXacdHvS3CQ1l9HSnJiNHzUfphucdRllU0V5Cq0YZbxb eUXEp7zXgntDbEiasy12OL0rbcYVo3VwIasMcxc+mTkL1q4Xe0H9E7g7z7AucCql6ucT uSCg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joshtriplett.org header.s=fm2 header.b=RkC3SD2a; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=CES9QlwK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h30-20020a056a00001e00b0063b7b7712a6si19713433pfk.255.2023.04.28.09.50.22; Fri, 28 Apr 2023 09:50:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@joshtriplett.org header.s=fm2 header.b=RkC3SD2a; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=CES9QlwK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344431AbjD1Qkj (ORCPT + 99 others); Fri, 28 Apr 2023 12:40:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57942 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229943AbjD1Qki (ORCPT ); Fri, 28 Apr 2023 12:40:38 -0400 Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7A18646A0; Fri, 28 Apr 2023 09:40:36 -0700 (PDT) Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 9134B5C01CC; Fri, 28 Apr 2023 12:40:35 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Fri, 28 Apr 2023 12:40:35 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= joshtriplett.org; h=cc:content-type:content-type:date:date:from :from:in-reply-to:message-id:mime-version:reply-to:sender :subject:subject:to:to; s=fm2; t=1682700035; x=1682786435; bh=La oBiOojUkxX5UqrfOo3s8Jg5v907MZ8tMGaLEs3yys=; b=RkC3SD2a7FEiAVAhPd MXmr7VNG8MunOA4Iw+jsPBOg0ayo1lC10VEPl6MuGyC9zUsTGbK7PvnQk+SBPp3U VQ24Kiyv4ee7EwmU9BeLc3Lx74kMh0EbRyRXCdCNj3A5sZLrx4DWzMGNi5ycBCqG F0Z05FZhY0dONiDiao0WIA5qY67qLs1ZK6QoETggXkOnS/GOxX35IecU7tPjwC5F 9oG5+3EQCtdbMuJZbzgvStZUQxflYCpVA+MfmY91bReclKcqBLhTChRd16En6cKs ATVPREDi1Zrh+s4lhuZY+ooA9zGiB4WIWwZgchCbQZcPr8PflK5NiV0wmwW92BuV hLoA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:message-id :mime-version:reply-to:sender:subject:subject:to:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t= 1682700035; x=1682786435; bh=LaoBiOojUkxX5UqrfOo3s8Jg5v907MZ8tMG aLEs3yys=; b=CES9QlwKlDJoeXbJu6weGAC7904Mb9rccWL3Nxin2iox5aV2avR v3pVwkWr/CfwuI8bF5dAUy5AP+wA/IVm2NxoA2fRCy2zAGLyc7gxR4QBjNjPbjAT J+1G6nKUX+UWX4kx1Akp1G+d5yY9YfKNTo5kWZB/IQV0HoOAsp+mojfITo7x2BN4 cjI3XNV/j8RDoSFlrSrk8awaChoZVmDlcjx0E8i0PeUs0cLBS7XQIWtDzo4THnKP kN4smWquIotkw2616U0qWtZNBvJEC++VocQI2MTRaXYvBoRYAMy/EF0fwJFecEpb Ny1YAHkYSHVZ9uTdtO9kYvNCm6BWYUmu3HQ== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrfedukedguddtgecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enucfjughrpeffhffvuffkgggtugesthdtredttddtvdenucfhrhhomheplfhoshhhucfv rhhiphhlvghtthcuoehjohhshhesjhhoshhhthhrihhplhgvthhtrdhorhhgqeenucggtf frrghtthgvrhhnpeelleeggedtjeejfeeuvddufeeggfektdefkeehveeuvedvvdfhgeff gfdvgfffkeenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhroh hmpehjohhshhesjhhoshhhthhrihhplhgvthhtrdhorhhg X-ME-Proxy: Feedback-ID: i83e94755:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri, 28 Apr 2023 12:40:33 -0400 (EDT) Date: Sat, 29 Apr 2023 01:40:30 +0900 From: Josh Triplett To: Jens Axboe , Pavel Begunkov , io-uring@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH] io_uring: Add io_uring_setup flag to pre-register ring fd and never install it Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With IORING_REGISTER_USE_REGISTERED_RING, an application can register the ring fd and use it via registered index rather than installed fd. This allows using a registered ring for everything *except* the initial mmap. With IORING_SETUP_NO_MMAP, io_uring_setup uses buffers allocated by the user, rather than requiring a subsequent mmap. The combination of the two allows a user to operate *entirely* via a registered ring fd, making it unnecessary to ever install the fd in the first place. So, add a flag IORING_SETUP_REGISTERED_FD_ONLY to make io_uring_setup register the fd and return a registered index, without installing the fd. This allows an application to avoid touching the fd table at all, and allows a library to never even momentarily install a file descriptor. This splits out an io_ring_add_registered_file helper from io_ring_add_registered_fd, for use by io_uring_setup. Signed-off-by: Josh Triplett --- Does this seem like a reasonable approach? include/uapi/linux/io_uring.h | 7 +++++++ io_uring/io_uring.c | 37 +++++++++++++++++++++-------------- io_uring/io_uring.h | 3 +++ io_uring/tctx.c | 31 ++++++++++++++++++----------- 4 files changed, 52 insertions(+), 26 deletions(-) diff --git a/include/uapi/linux/io_uring.h b/include/uapi/linux/io_uring.h index 2edba9a274de..f222d263bc55 100644 --- a/include/uapi/linux/io_uring.h +++ b/include/uapi/linux/io_uring.h @@ -178,6 +178,13 @@ enum { */ #define IORING_SETUP_NO_MMAP (1U << 14) +/* + * Register the ring fd in itself for use with + * IORING_REGISTER_USE_REGISTERED_RING; return a registered fd index rather + * than an fd. + */ +#define IORING_SETUP_REGISTERED_FD_ONLY (1U << 15) + enum io_uring_op { IORING_OP_NOP, IORING_OP_READV, diff --git a/io_uring/io_uring.c b/io_uring/io_uring.c index fccc80c201fb..2bb44364cf86 100644 --- a/io_uring/io_uring.c +++ b/io_uring/io_uring.c @@ -3809,19 +3809,13 @@ static __cold int io_allocate_scq_urings(struct io_ring_ctx *ctx, return 0; } -static int io_uring_install_fd(struct io_ring_ctx *ctx, struct file *file) +static int io_uring_install_fd(struct file *file) { - int ret, fd; + int fd; fd = get_unused_fd_flags(O_RDWR | O_CLOEXEC); if (fd < 0) return fd; - - ret = __io_uring_add_tctx_node(ctx); - if (ret) { - put_unused_fd(fd); - return ret; - } fd_install(fd, file); return fd; } @@ -3861,6 +3855,7 @@ static __cold int io_uring_create(unsigned entries, struct io_uring_params *p, struct io_uring_params __user *params) { struct io_ring_ctx *ctx; + struct io_uring_task *tctx; struct file *file; int ret; @@ -3872,6 +3867,10 @@ static __cold int io_uring_create(unsigned entries, struct io_uring_params *p, entries = IORING_MAX_ENTRIES; } + if ((p->flags & IORING_SETUP_REGISTERED_FD_ONLY) + && !(p->flags & IORING_SETUP_NO_MMAP)) + return -EINVAL; + /* * Use twice as many entries for the CQ ring. It's possible for the * application to drive a higher depth than the size of the SQ ring, @@ -4028,22 +4027,30 @@ static __cold int io_uring_create(unsigned entries, struct io_uring_params *p, goto err; } + ret = __io_uring_add_tctx_node(ctx); + if (ret) + goto err_fput; + tctx = current->io_uring; + /* * Install ring fd as the very last thing, so we don't risk someone * having closed it before we finish setup */ - ret = io_uring_install_fd(ctx, file); - if (ret < 0) { - /* fput will clean it up */ - fput(file); - return ret; - } + if (p->flags & IORING_SETUP_REGISTERED_FD_ONLY) + ret = io_ring_add_registered_file(tctx, file, 0, IO_RINGFD_REG_MAX); + else + ret = io_uring_install_fd(file); + if (ret < 0) + goto err_fput; trace_io_uring_create(ret, ctx, p->sq_entries, p->cq_entries, p->flags); return ret; err: io_ring_ctx_wait_and_kill(ctx); return ret; +err_fput: + fput(file); + return ret; } /* @@ -4070,7 +4077,7 @@ static long io_uring_setup(u32 entries, struct io_uring_params __user *params) IORING_SETUP_COOP_TASKRUN | IORING_SETUP_TASKRUN_FLAG | IORING_SETUP_SQE128 | IORING_SETUP_CQE32 | IORING_SETUP_SINGLE_ISSUER | IORING_SETUP_DEFER_TASKRUN | - IORING_SETUP_NO_MMAP)) + IORING_SETUP_NO_MMAP | IORING_SETUP_REGISTERED_FD_ONLY)) return -EINVAL; return io_uring_create(entries, &p, params); diff --git a/io_uring/io_uring.h b/io_uring/io_uring.h index 25515d69d205..54a9a652531f 100644 --- a/io_uring/io_uring.h +++ b/io_uring/io_uring.h @@ -75,6 +75,9 @@ __cold void io_uring_cancel_generic(bool cancel_all, struct io_sq_data *sqd); int io_uring_alloc_task_context(struct task_struct *task, struct io_ring_ctx *ctx); +int io_ring_add_registered_file(struct io_uring_task *tctx, struct file *file, + int start, int end); + int io_poll_issue(struct io_kiocb *req, struct io_tw_state *ts); int io_submit_sqes(struct io_ring_ctx *ctx, unsigned int nr); int io_do_iopoll(struct io_ring_ctx *ctx, bool force_nonspin); diff --git a/io_uring/tctx.c b/io_uring/tctx.c index 3a8d1dd97e1b..c043fe93a3f2 100644 --- a/io_uring/tctx.c +++ b/io_uring/tctx.c @@ -208,31 +208,40 @@ void io_uring_unreg_ringfd(void) } } -static int io_ring_add_registered_fd(struct io_uring_task *tctx, int fd, +int io_ring_add_registered_file(struct io_uring_task *tctx, struct file *file, int start, int end) { - struct file *file; int offset; - for (offset = start; offset < end; offset++) { offset = array_index_nospec(offset, IO_RINGFD_REG_MAX); if (tctx->registered_rings[offset]) continue; - file = fget(fd); - if (!file) { - return -EBADF; - } else if (!io_is_uring_fops(file)) { - fput(file); - return -EOPNOTSUPP; - } tctx->registered_rings[offset] = file; return offset; } - return -EBUSY; } +static int io_ring_add_registered_fd(struct io_uring_task *tctx, int fd, + int start, int end) +{ + struct file *file; + int offset; + + file = fget(fd); + if (!file) { + return -EBADF; + } else if (!io_is_uring_fops(file)) { + fput(file); + return -EOPNOTSUPP; + } + offset = io_ring_add_registered_file(tctx, file, start, end); + if (offset < 0) + fput(file); + return offset; +} + /* * Register a ring fd to avoid fdget/fdput for each io_uring_enter() * invocation. User passes in an array of struct io_uring_rsrc_update -- 2.40.1