On Sun, May 26, 2019 at 04:25:21PM +0200, Renzo Davoli wrote:
> This patch implements an extension of eventfd to define file descriptors 
> whose I/O events can be generated at user level. These file descriptors
> trigger notifications for [p]select/[p]poll/epoll.
> 
> This feature is useful for user-level implementations of network stacks
> or virtual device drivers as libraries.

How can this be used to create a "virtual device driver"?  Do you have
any examples of this new interface being used anywhere?

Also, meta-comment, you should provide some sort of test to kselftests
for your new feature so that it can actually be tested, as well as a man
page update (separately).

> Development and porting of code often requires to find the way to wait for I/O
> events both coming from file descriptors and generated by user-level code 
> (e.g.
> user-implemented net stacks or drivers).  While it is possible to provide a
> partial support (e.g. using pipes or socketpairs), a clean and complete
> solution is still missing (as far as I have seen); e.g. I have not seen any
> clean way to generate EPOLLPRI, EPOLLERR, etc.

What's wrong with pipes or sockets for stuff like this?  Why is epoll
required?

> This proposal is based on a new tag for eventfd2(2): EFD_VPOLL.
> 
> This statement:
>       fd = eventfd(EPOLLOUT, EFD_VPOLL | EFD_CLOEXEC);
> creates a file descriptor for I/O event generation. In this case EPOLLOUT is
> initially true.
> 
> Likewise all the other eventfs services, read(2) and write(2) use a 8-byte 
> integer argument.
> 
> read(2) returns the current state of the pending events.
> 
> The argument of write(2) is an or-composition of a control command
> (EFD_VPOLL_ADDEVENTS, EFD_VPOLL_DELEVENTS or EFD_VPOLL_MODEVENTS) and the
> bitmap of events to be added, deleted to the current set of pending events.
> EFD_VPOLL_MODEVENTS completely redefines the set of pending events.
> 
> e.g.:
>       uint64_t request = EFD_VPOLL_ADDEVENTS | EPOLLIN | EPOLLPRI;
>       write(fd, &request, sizeof(request);
> adds EPOLLIN and EPOLLPRI to the set of pending events.
> 
> These are examples of messages asking for a feature like EFD_VPOLL:
> https://stackoverflow.com/questions/909189/simulating-file-descriptor-in-user-space
> https://stackoverflow.com/questions/1648147/running-a-simple-tcp-server-with-poll-how-do-i-trigger-events-artificially
> ... and I need it to write networking and device modules for vuos:
> https://github.com/virtualsquare/vuos
> (it is the new codebase of ViewOS, see www.virtualsquare.org).
> 
> EXAMPLE:
> The following program creates an eventfd/EFD_VPOLL file descriptor and then 
> forks
> a child process.  While the parent waits for events using epoll_wait the child
> generates a sequence of events. When the parent receives an event (or a set 
> of events)
> it prints it and disarm it.
> The following shell session shows a sample run of the program:
>       timeout...
>       timeout...
>       GOT event 1
>       timeout...
>       GOT event 1
>       timeout...
>       GOT event 3
>       timeout...
>       GOT event 2
>       timeout...
>       GOT event 4
>       timeout...
>       GOT event 10
> 
> Program source:
> #include <sys/eventfd.h>
> #include <sys/epoll.h>
> #include <unistd.h>
> #include <stdlib.h>
> #include <stdio.h>
> #include <stdint.h>             /* Definition of uint64_t */
> 
> #ifndef EFD_VPOLL
> #define EFD_VPOLL (1 << 1)
> #define EFD_VPOLL_ADDEVENTS (1UL << 32)
> #define EFD_VPOLL_DELEVENTS (2UL << 32)
> #define EFD_VPOLL_MODEVENTS (3UL << 32)
> #endif
> 
> #define handle_error(msg) \
>       do { perror(msg); exit(EXIT_FAILURE); } while (0)
> 
> static void vpoll_ctl(int fd, uint64_t request) {
>       ssize_t s;
>       s = write(fd, &request, sizeof(request));
>       if (s != sizeof(uint64_t))
>               handle_error("write");
> }
> 
> int
> main(int argc, char *argv[])
> {
>       int efd, epollfd; 
>       struct epoll_event ev;
>       ev.events = EPOLLIN | EPOLLRDHUP | EPOLLERR | EPOLLOUT | EPOLLHUP | 
> EPOLLPRI;
>       ev.data.u64 = 0;
> 
>       efd = eventfd(0, EFD_VPOLL | EFD_CLOEXEC);
>       if (efd == -1)
>               handle_error("eventfd");
>       epollfd = epoll_create1(EPOLL_CLOEXEC);
>       if (efd == -1)
>               handle_error("epoll_create1");
>       if (epoll_ctl(epollfd, EPOLL_CTL_ADD, efd, &ev) == -1) 
>               handle_error("epoll_ctl");
> 
>       switch (fork()) {
>               case 0:
>                       sleep(3);
>                       vpoll_ctl(efd, EFD_VPOLL_ADDEVENTS | EPOLLIN);
>                       sleep(2);
>                       vpoll_ctl(efd, EFD_VPOLL_ADDEVENTS | EPOLLIN);
>                       sleep(2);
>                       vpoll_ctl(efd, EFD_VPOLL_ADDEVENTS | EPOLLIN | 
> EPOLLPRI);
>                       sleep(2);
>                       vpoll_ctl(efd, EFD_VPOLL_ADDEVENTS | EPOLLPRI);
>                       sleep(2);
>                       vpoll_ctl(efd, EFD_VPOLL_ADDEVENTS | EPOLLOUT);
>                       sleep(2);
>                       vpoll_ctl(efd, EFD_VPOLL_ADDEVENTS | EPOLLHUP);
>                       exit(EXIT_SUCCESS);
>               default:
>                       while (1) {
>                               int nfds;
>                               nfds = epoll_wait(epollfd, &ev, 1, 1000);
>                               if (nfds < 0)
>                                       handle_error("epoll_wait");
>                               else if (nfds == 0)
>                                       printf("timeout...\n");
>                               else {
>                                       printf("GOT event %x\n", ev.events);
>                                       vpoll_ctl(efd, EFD_VPOLL_DELEVENTS | 
> ev.events);
>                                       if (ev.events & EPOLLHUP)
>                                               break;
>                               }
>                       }
>               case -1:
>                       handle_error("fork");
>       }
>       close(epollfd);
>       close(efd);
>       return 0;
> }
> 
> Signed-off-by: Renzo Davoli <re...@cs.unibo.it>
> ---
>  fs/eventfd.c                   | 115 +++++++++++++++++++++++++++++++--
>  include/linux/eventfd.h        |   7 +-
>  include/uapi/linux/eventpoll.h |   2 +
>  3 files changed, 116 insertions(+), 8 deletions(-)
> 
> diff --git a/fs/eventfd.c b/fs/eventfd.c
> index 8aa0ea8c55e8..f83b7d02307e 100644
> --- a/fs/eventfd.c
> +++ b/fs/eventfd.c
> @@ -3,6 +3,7 @@
>   *  fs/eventfd.c
>   *
>   *  Copyright (C) 2007  Davide Libenzi <davi...@xmailserver.org>
> + *  EFD_VPOLL support: 2019 Renzo Davoli <re...@cs.unibo.it>

No need for this line, that's what the git history shows.

>   *
>   */
>  
> @@ -30,12 +31,24 @@ struct eventfd_ctx {
>       struct kref kref;
>       wait_queue_head_t wqh;
>       /*
> -      * Every time that a write(2) is performed on an eventfd, the
> -      * value of the __u64 being written is added to "count" and a
> -      * wakeup is performed on "wqh". A read(2) will return the "count"
> -      * value to userspace, and will reset "count" to zero. The kernel
> -      * side eventfd_signal() also, adds to the "count" counter and
> -      * issue a wakeup.
> +      * If the EFD_VPOLL flag was NOT set at eventfd creation:
> +      *   Every time that a write(2) is performed on an eventfd, the
> +      *   value of the __u64 being written is added to "count" and a
> +      *   wakeup is performed on "wqh". A read(2) will return the "count"
> +      *   value to userspace, and will reset "count" to zero (or decrement
> +      *   "count" by 1 if the flag EFD_SEMAPHORE has been set). The kernel
> +      *   side eventfd_signal() also, adds to the "count" counter and
> +      *   issue a wakeup.
> +      *
> +      * If the EFD_VPOLL flag was set at eventfd creation:
> +      *   count is the set of pending EPOLL events.
> +      *   read(2) returns the current value of count.
> +      *   The argument of write(2) is an 8-byte integer:
> +      *   it is an or-composition of a control command (EFD_VPOLL_ADDEVENTS,
> +      *   EFD_VPOLL_DELEVENTS or EFD_VPOLL_MODEVENTS) and the bitmap of
> +      *   events to be added, deleted to the current set of pending events.
> +      *   (i.e. which bits of "count" must be set or reset).
> +      *   EFD_VPOLL_MODEVENTS redefines the set of pending events.

Ugh, overloading stuff, this is increased complexity, do you _have_ to
do it this way?

>        */
>       __u64 count;
>       unsigned int flags;
> @@ -295,6 +308,78 @@ static ssize_t eventfd_write(struct file *file, const 
> char __user *buf, size_t c
>       return res;
>  }
>  
> +static __poll_t eventfd_vpoll_poll(struct file *file, poll_table *wait)
> +{
> +     struct eventfd_ctx *ctx = file->private_data;
> +     __poll_t events = 0;
> +     u64 count;
> +
> +     poll_wait(file, &ctx->wqh, wait);
> +
> +     count = READ_ONCE(ctx->count);
> +
> +     events = (count & EPOLLALLMASK);

Why mask?

> +
> +     return events;
> +}
> +
> +static ssize_t eventfd_vpoll_read(struct file *file, char __user *buf,
> +             size_t count, loff_t *ppos)
> +{
> +     struct eventfd_ctx *ctx = file->private_data;
> +     ssize_t res;
> +     __u64 ucnt = 0;
> +
> +     if (count < sizeof(ucnt))
> +             return -EINVAL;

What is magic about the size of a __u64 here?

> +     res = sizeof(ucnt);
> +     ucnt = READ_ONCE(ctx->count);
> +     if (put_user(ucnt, (__u64 __user *)buf))
> +             return -EFAULT;
> +
> +     return res;
> +}
> +
> +static ssize_t eventfd_vpoll_write(struct file *file, const char __user *buf,
> +             size_t count, loff_t *ppos)
> +{
> +     struct eventfd_ctx *ctx = file->private_data;
> +     ssize_t res;
> +     __u64 ucnt;
> +     __u32 events;
> +
> +     if (count < sizeof(ucnt))
> +             return -EINVAL;

Why can it not be less than 64?

> +     if (copy_from_user(&ucnt, buf, sizeof(ucnt)))
> +             return -EFAULT;
> +     spin_lock_irq(&ctx->wqh.lock);
> +
> +     events = ucnt & EPOLLALLMASK;
> +     res = sizeof(ucnt);
> +     switch (ucnt & ~((__u64)EPOLLALLMASK)) {
> +     case EFD_VPOLL_ADDEVENTS:
> +             ctx->count |= events;
> +             break;
> +     case EFD_VPOLL_DELEVENTS:
> +             ctx->count &= ~(events);
> +             break;
> +     case EFD_VPOLL_MODEVENTS:
> +             ctx->count = (ctx->count & ~EPOLLALLMASK) | events;
> +             break;
> +     default:
> +             res = -EINVAL;
> +     }
> +
> +     /* wake up waiting threads */
> +     if (res >= 0 && waitqueue_active(&ctx->wqh))
> +             wake_up_locked_poll(&ctx->wqh, res);

Can you call this with a spinlock held?  I really don't remember, sorry,
if so, nevermind, but you should check...

> +
> +     spin_unlock_irq(&ctx->wqh.lock);
> +
> +     return res;
> +
> +}
> +
>  #ifdef CONFIG_PROC_FS
>  static void eventfd_show_fdinfo(struct seq_file *m, struct file *f)
>  {
> @@ -319,6 +404,17 @@ static const struct file_operations eventfd_fops = {
>       .llseek         = noop_llseek,
>  };
>  
> +static const struct file_operations eventfd_vpoll_fops = {
> +#ifdef CONFIG_PROC_FS
> +     .show_fdinfo    = eventfd_show_fdinfo,
> +#endif
> +     .release        = eventfd_release,
> +     .poll           = eventfd_vpoll_poll,
> +     .read           = eventfd_vpoll_read,
> +     .write          = eventfd_vpoll_write,
> +     .llseek         = noop_llseek,
> +};
> +
>  /**
>   * eventfd_fget - Acquire a reference of an eventfd file descriptor.
>   * @fd: [in] Eventfd file descriptor.
> @@ -391,6 +487,7 @@ EXPORT_SYMBOL_GPL(eventfd_ctx_fileget);
>  static int do_eventfd(unsigned int count, int flags)
>  {
>       struct eventfd_ctx *ctx;
> +     const struct file_operations *fops = &eventfd_fops;
>       int fd;
>  
>       /* Check the EFD_* constants for consistency.  */
> @@ -410,7 +507,11 @@ static int do_eventfd(unsigned int count, int flags)
>       ctx->flags = flags;
>       ctx->id = ida_simple_get(&eventfd_ida, 0, 0, GFP_KERNEL);
>  
> -     fd = anon_inode_getfd("[eventfd]", &eventfd_fops, ctx,
> +     if (flags & EFD_VPOLL) {
> +             fops = &eventfd_vpoll_fops;
> +             ctx->count &= EPOLLALLMASK;
> +     }
> +     fd = anon_inode_getfd("[eventfd]", fops, ctx,
>                             O_RDWR | (flags & EFD_SHARED_FCNTL_FLAGS));
>       if (fd < 0)
>               eventfd_free_ctx(ctx);
> diff --git a/include/linux/eventfd.h b/include/linux/eventfd.h
> index ffcc7724ca21..63258cf29344 100644
> --- a/include/linux/eventfd.h
> +++ b/include/linux/eventfd.h
> @@ -21,11 +21,16 @@
>   * shared O_* flags.
>   */
>  #define EFD_SEMAPHORE (1 << 0)
> +#define EFD_VPOLL (1 << 1)

BIT(1)?

>  #define EFD_CLOEXEC O_CLOEXEC
>  #define EFD_NONBLOCK O_NONBLOCK
>  
>  #define EFD_SHARED_FCNTL_FLAGS (O_CLOEXEC | O_NONBLOCK)
> -#define EFD_FLAGS_SET (EFD_SHARED_FCNTL_FLAGS | EFD_SEMAPHORE)
> +#define EFD_FLAGS_SET (EFD_SHARED_FCNTL_FLAGS | EFD_SEMAPHORE | EFD_VPOLL)
> +
> +#define EFD_VPOLL_ADDEVENTS (1UL << 32)
> +#define EFD_VPOLL_DELEVENTS (2UL << 32)
> +#define EFD_VPOLL_MODEVENTS (3UL << 32)

Aren't these part of the uapi?  Why are they hidden in here?

>  
>  struct eventfd_ctx;
>  struct file;
> diff --git a/include/uapi/linux/eventpoll.h b/include/uapi/linux/eventpoll.h
> index 8a3432d0f0dc..814de6d869c7 100644
> --- a/include/uapi/linux/eventpoll.h
> +++ b/include/uapi/linux/eventpoll.h
> @@ -41,6 +41,8 @@
>  #define EPOLLMSG     (__force __poll_t)0x00000400
>  #define EPOLLRDHUP   (__force __poll_t)0x00002000
>  
> +#define EPOLLALLMASK ((__force __poll_t)0x0fffffff)

Why is this part of the uapi?

thanks,

greg k-h

Reply via email to