Re: [PATCH v2] io_uring: let IORING_OP_FILES_UPDATE support to choose fixed file slots

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hello Pavel,

> On 5/30/22 14:15, Xiaoguang Wang wrote:
>> One big issue with file registration feature is that it needs user
>> space apps to maintain free slot info about io_uring's fixed file
>> table, which really is a burden for development. Now since io_uring
>> starts to choose free file slot for user space apps by using
>> IORING_FILE_INDEX_ALLOC flag in accept or open operations, but they
>> need app to uses direct accept or direct open, which as far as I know,
>> some apps are not prepared to use direct accept or open yet.
>>
>> To support apps, who still need real fds, use registration feature
>> easier, let IORING_OP_FILES_UPDATE support to choose fixed file slots,
>> which will store picked fixed files slots in fd array and let cqe return
>> the number of slots allocated.
>
> Why close bits are piggybacked in this patch without any mention
> in the commit message? 
Sorry, it actually should be in one separate patch.

> What is error semantics of
> IORING_CLOSE_FD_AND_FILE_SLOT. Fail if any errored or both? How
> can it be reliably used? Why we do two separate things in one
> request with not clear semantics?
Yeah, indeed I know this issue when writing this patch, either normal
fd close or file slot close may fail independently.  I put them together
just for efficiency, one CLOSE op can do two jobs.

>
> There is already one fix pending. Another problem on the surface
> is that it may call io_close() twice and the second will fail, e.g.
>
> -> io_close()
> ---> close_fixed()
> ---> if (file->flush) return -EAGAIN
> -> io_close()
> ---> close_fixed() // fails
Thanks for pointing this issue.

>
>
> I do think we need to revert the close change, and then remake
> properly and only if someone can describe sane semantics for it.
Revert this close change seems reasonable, I thought for a while,
didn't figure out better solutions yet.
Sorry for the trouble again.

Regards,
Xiaoguang Wang
>
>
>
>> Suggested-by: Hao Xu <howeyxu@xxxxxxxxxxx>
>> Signed-off-by: Xiaoguang Wang <xiaoguang.wang@xxxxxxxxxxxxxxxxx>
>> ---
>> V2:
>>    Add illegal flags check in io_close_prep().
>> ---
>>   fs/io_uring.c                 | 75 +++++++++++++++++++++++++++++++++++++------
>>   include/uapi/linux/io_uring.h |  1 +
>>   2 files changed, 66 insertions(+), 10 deletions(-)
>>
>> diff --git a/fs/io_uring.c b/fs/io_uring.c
>> index 6d91148e9679..18a7459fb6e7 100644
>> --- a/fs/io_uring.c
>> +++ b/fs/io_uring.c
>> @@ -574,6 +574,7 @@ struct io_close {
>>       struct file            *file;
>>       int                fd;
>>       u32                file_slot;
>> +    u32                flags;
>>   };
>>     struct io_timeout_data {
>> @@ -1366,7 +1367,9 @@ static int io_req_prep_async(struct io_kiocb *req);
>>     static int io_install_fixed_file(struct io_kiocb *req, struct file *file,
>>                    unsigned int issue_flags, u32 slot_index);
>> -static int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags);
>> +static int __io_close_fixed(struct io_kiocb *req, unsigned int issue_flags,
>> +                unsigned int offset);
>> +static inline int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags);
>>     static enum hrtimer_restart io_link_timeout_fn(struct hrtimer *timer);
>>   static void io_eventfd_signal(struct io_ring_ctx *ctx);
>> @@ -5945,16 +5948,22 @@ static int io_statx(struct io_kiocb *req, unsigned int issue_flags)
>>       return 0;
>>   }
>>   +#define IORING_CLOSE_FD_AND_FILE_SLOT 1
>> +
>>   static int io_close_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
>>   {
>> -    if (sqe->off || sqe->addr || sqe->len || sqe->rw_flags || sqe->buf_index)
>> +    if (sqe->off || sqe->addr || sqe->len || sqe->buf_index)
>>           return -EINVAL;
>>       if (req->flags & REQ_F_FIXED_FILE)
>>           return -EBADF;
>>         req->close.fd = READ_ONCE(sqe->fd);
>>       req->close.file_slot = READ_ONCE(sqe->file_index);
>> -    if (req->close.file_slot && req->close.fd)
>> +    req->close.flags = READ_ONCE(sqe->close_flags);
>> +    if (req->close.flags & ~IORING_CLOSE_FD_AND_FILE_SLOT)
>> +        return -EINVAL;
>> +    if (!(req->close.flags & IORING_CLOSE_FD_AND_FILE_SLOT) &&
>> +        req->close.file_slot && req->close.fd)
>>           return -EINVAL;
>>         return 0;
>> @@ -5970,7 +5979,8 @@ static int io_close(struct io_kiocb *req, unsigned int issue_flags)
>>         if (req->close.file_slot) {
>>           ret = io_close_fixed(req, issue_flags);
>> -        goto err;
>> +        if (ret || !(req->close.flags & IORING_CLOSE_FD_AND_FILE_SLOT))
>> +            goto err;
>>       }
>>         spin_lock(&files->file_lock);
>> @@ -8003,6 +8013,42 @@ static int io_files_update_prep(struct io_kiocb *req,
>>       return 0;
>>   }
>>   +static int io_files_update_with_index_alloc(struct io_kiocb *req,
>> +                        unsigned int issue_flags)
>> +{
>> +    __s32 __user *fds = u64_to_user_ptr(req->rsrc_update.arg);
>> +    struct file *file;
>> +    unsigned int done, nr_fds = req->rsrc_update.nr_args;
>> +    int ret, fd;
>> +
>> +    for (done = 0; done < nr_fds; done++) {
>> +        if (copy_from_user(&fd, &fds[done], sizeof(fd))) {
>> +            ret = -EFAULT;
>> +            break;
>> +        }
>> +
>> +        file = fget(fd);
>> +        if (!file) {
>> +            ret = -EBADF;
>> +            goto out;
>> +        }
>> +        ret = io_fixed_fd_install(req, issue_flags, file,
>> +                      IORING_FILE_INDEX_ALLOC);
>> +        if (ret < 0)
>> +            goto out;
>> +        if (copy_to_user(&fds[done], &ret, sizeof(ret))) {
>> +            ret = -EFAULT;
>> +            __io_close_fixed(req, issue_flags, ret);
>> +            break;
>> +        }
>> +    }
>> +
>> +out:
>> +    if (done)
>> +        return done;
>> +    return ret;
>> +}
>> +
>>   static int io_files_update(struct io_kiocb *req, unsigned int issue_flags)
>>   {
>>       struct io_ring_ctx *ctx = req->ctx;
>> @@ -8016,10 +8062,14 @@ static int io_files_update(struct io_kiocb *req, unsigned int issue_flags)
>>       up.resv = 0;
>>       up.resv2 = 0;
>>   -    io_ring_submit_lock(ctx, issue_flags);
>> -    ret = __io_register_rsrc_update(ctx, IORING_RSRC_FILE,
>> -                    &up, req->rsrc_update.nr_args);
>> -    io_ring_submit_unlock(ctx, issue_flags);
>> +    if (req->rsrc_update.offset == IORING_FILE_INDEX_ALLOC) {
>> +        ret = io_files_update_with_index_alloc(req, issue_flags);
>> +    } else {
>> +        io_ring_submit_lock(ctx, issue_flags);
>> +        ret = __io_register_rsrc_update(ctx, IORING_RSRC_FILE,
>> +                &up, req->rsrc_update.nr_args);
>> +        io_ring_submit_unlock(ctx, issue_flags);
>> +    }
>>         if (ret < 0)
>>           req_set_fail(req);
>> @@ -10183,9 +10233,9 @@ static int io_install_fixed_file(struct io_kiocb *req, struct file *file,
>>       return ret;
>>   }
>>   -static int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags)
>> +static int __io_close_fixed(struct io_kiocb *req, unsigned int issue_flags,
>> +                unsigned int offset)
>>   {
>> -    unsigned int offset = req->close.file_slot - 1;
>>       struct io_ring_ctx *ctx = req->ctx;
>>       struct io_fixed_file *file_slot;
>>       struct file *file;
>> @@ -10222,6 +10272,11 @@ static int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags)
>>       return ret;
>>   }
>>   +static inline int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags)
>> +{
>> +    return __io_close_fixed(req, issue_flags, req->close.file_slot - 1);
>> +}
>> +
>>   static int __io_sqe_files_update(struct io_ring_ctx *ctx,
>>                    struct io_uring_rsrc_update2 *up,
>>                    unsigned nr_args)
>> diff --git a/include/uapi/linux/io_uring.h b/include/uapi/linux/io_uring.h
>> index 53e7dae92e42..e347b3fea4e4 100644
>> --- a/include/uapi/linux/io_uring.h
>> +++ b/include/uapi/linux/io_uring.h
>> @@ -47,6 +47,7 @@ struct io_uring_sqe {
>>           __u32        unlink_flags;
>>           __u32        hardlink_flags;
>>           __u32        xattr_flags;
>> +        __u32        close_flags;
>>       };
>>       __u64    user_data;    /* data to be passed back at completion time */
>>       /* pack this to avoid bogus arm OABI complaints */
>




[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux