Английская Википедия:Io uring
io_uring (previously known as aioring) is a Linux kernel system call interface for storage device asynchronous I/O operations addressing performance issues with similar interfaces provided by functions like Шаблон:Code/Шаблон:Code or Шаблон:Code/Шаблон:Code etc. for operations on data accessed by file descriptors.[1][2]Шаблон:Rp
Development is ongoing, worked on primarily by Jens Axboe at Meta.[1]
Interface
It works by creating two circular buffers, called "queue rings", for storage of submission and completion of I/O requests, respectively. For storage devices, these are called the submission queue (SQ) and completion queue (CQ).[3] Keeping these buffers shared between the kernel and application helps to boost the I/O performance by eliminating the need to issue extra and expensive system calls to copy these buffers between the two.[1][3][4] According to the io_uring design paper, the SQ buffer is writable only by consumer applications, and the CQ buffer is writable only by the kernel.Шаблон:R
eBPF can be combined with io_uring.[5]
History
The Linux kernel has supported asynchronous I/O since version 2.5, but it was seen as difficult to use and inefficient.[6] This older API only supported certain niche use cases,[7] notably it only enables asynchronous operation when using the O_DIRECT flag and while accessing already allocated files. This prevents utilizing the page cache, while also exposing the application to complex O_DIRECT semantics. Linux AIO also does not support sockets, so it cannot be used to multiplex network and disk I/O.[8]
The io_uring kernel interface was adopted in Linux kernel version 5.1 to resolve the deficiencies of Linux AIO.[1][4][9] The Шаблон:Code library provides an API to interact with the kernel interface easily from userspace.[1]Шаблон:R
Security
io_uring has been noted for exposing a significant attack surface and structural difficulties integrating it with the Linux security subsystem.[10]
In June 2023, Google's security team reported that 60% of Linux kernel exploits submitted to their bug bounty program in 2022 were exploits of io_uring vulnerabilities. As a result, io_uring was disabled for apps in Android, and disabled entirely in ChromeOS as well as Google servers.[11] Docker also consequently disabled io_uring from their default seccomp profile.[12]
References
External links
- Efficient I/O with io_uring, in-depth description of motivation behind io_uring, interface (data structures etc.), and performance assessment
- Шаблон:Code source repository
- Шаблон:Code source directory in the Linux kernel repository
- Страницы с игнорируемыми отображаемыми названиями
- Английская Википедия
- Interfaces of the Linux kernel
- Linux kernel features
- Articles with underscores in the title
- Страницы, где используется шаблон "Навигационная таблица/Телепорт"
- Страницы с телепортом
- Википедия
- Статья из Википедии
- Статья из Английской Википедии