Linux filesystem development
 help / color / mirror / Atom feed
From: Bernd Schubert <bernd@bsbernd.com>
To: Jeff Layton <jlayton@kernel.org>, Joanne Koong <joannelkoong@gmail.com>
Cc: miklos@szeredi.hu, axboe@kernel.dk, linux-fsdevel@vger.kernel.org
Subject: Re: [PATCH v2 13/14] fuse: add zero-copy over io-uring
Date: Wed, 6 May 2026 00:55:01 +0200	[thread overview]
Message-ID: <44675f24-e7db-4d92-a7ba-ce2a3c324f59@bsbernd.com> (raw)
In-Reply-To: <04f3c2ba632be1a36d4770ef4bda45c3e156fd95.camel@kernel.org>



On 4/30/26 14:55, Jeff Layton wrote:
> On Thu, 2026-04-30 at 13:35 +0100, Joanne Koong wrote:
>> On Thu, Apr 30, 2026 at 12:42 PM Jeff Layton <jlayton@kernel.org> wrote:
>>>
>>> On Thu, 2026-04-02 at 09:28 -0700, Joanne Koong wrote:
>>>> Implement zero-copy data transfer for fuse over io-uring, eliminating
>>>> memory copies between userspace, the kernel, and the fuse server for
>>>> page-backed read/write operations.
>>>>
>>>> When the FUSE_URING_ZERO_COPY flag is set alongside FUSE_URING_BUFRING,
>>>> the kernel registers the client's underlying pages as a sparse buffer at
>>>> the entry's fixed id via io_buffer_register_bvec(). The fuse server can
>>>> then perform io_uring read/write operations directly on these pages.
>>>> Non-page-backed args (eg out headers) go through the payload buffer as
>>>> normal.
>>>>
>>>> This requires CAP_SYS_ADMIN and buffer rings with pinned headers and
>>>> buffers. Gating on pinned headers and buffers keeps the configuration
>>>> space small and avoids partially-optimized modes that are unlikely to be
>>>> useful in practice. Pages are unregistered when the request completes.
>>>>
>>>
>>> Can you elaborate a bit more on why CAP_SYS_ADMIN is needed here? It's
>>> not immediately obvious to me.
>>
>> Thank you for reviewing this series, Jeff!
>>
>> This is gated behind CAP_SYS_ADMIN because zero-copy allows the server
>> direct access to the client's underlying pages, rather than operating
>> on an intermediary buffer that the contents of client's pages were
>> copied into. A malicious unprivileged server could keep direct access
>> to the client's pages (eg even if the client tries to cancel a
>> read/write, if the request was already sent to userspace, the server
>> will still have access to the underlying pages). In the non-zero-copy
>> path this isn't possible because the server only operates on the copy
>> of the pages and not on the actual pages.
>>
> 
> Thanks for the explanation. I'd suggest adding that to the commit
> message (and maybe comments near the CAP_SYS_ADMIN checks) in case
> others aren't clear why this is gated on that.

Silly question, isn't it very splice like? Fuse-server doesn't get the
access to the buffer, actually, but only forwards via io-uring. Splice
is allowed without CAP_SYS_ADMIN, so why does this need to have it?


Thanks,
Bernd

  reply	other threads:[~2026-05-05 22:55 UTC|newest]

Thread overview: 49+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-02 16:28 [PATCH v2 00/14] fuse: add io-uring buffer rings and zero-copy Joanne Koong
2026-04-02 16:28 ` [PATCH v2 01/14] fuse: separate next request fetching from sending logic Joanne Koong
2026-04-29 11:52   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 02/14] fuse: refactor io-uring header copying to ring Joanne Koong
2026-04-29 12:05   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 03/14] fuse: refactor io-uring header copying from ring Joanne Koong
2026-04-29 12:06   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 04/14] fuse: use enum types for header copying Joanne Koong
2026-04-30  8:04   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 05/14] fuse: refactor setting up copy state for payload copying Joanne Koong
2026-04-30  8:06   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 06/14] fuse: support buffer copying for kernel addresses Joanne Koong
2026-04-30  8:19   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 07/14] fuse: use named constants for io-uring iovec indices Joanne Koong
2026-04-15  9:36   ` Bernd Schubert
2026-04-30  8:20   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 08/14] fuse: move fuse_uring_abort() from header to dev_uring.c Joanne Koong
2026-04-15  9:40   ` Bernd Schubert
2026-04-30  8:21   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 09/14] fuse: rearrange io-uring iovec and ent allocation logic Joanne Koong
2026-04-15  9:45   ` Bernd Schubert
2026-04-30  8:24   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 10/14] fuse: add io-uring buffer rings Joanne Koong
2026-04-15  9:48   ` Bernd Schubert
2026-04-15 21:40     ` Joanne Koong
2026-04-30 11:08   ` Jeff Layton
2026-04-30 12:44     ` Joanne Koong
2026-05-05 22:47   ` Bernd Schubert
2026-04-02 16:28 ` [PATCH v2 11/14] fuse: add pinned headers capability for " Joanne Koong
2026-04-14 12:47   ` Bernd Schubert
2026-04-15  0:48     ` Joanne Koong
2026-05-05 22:51       ` Bernd Schubert
2026-04-30 11:22   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 12/14] fuse: add pinned payload buffers " Joanne Koong
2026-04-30 11:29   ` Jeff Layton
2026-04-02 16:28 ` [PATCH v2 13/14] fuse: add zero-copy over io-uring Joanne Koong
2026-04-30 11:42   ` Jeff Layton
2026-04-30 12:35     ` Joanne Koong
2026-04-30 12:55       ` Jeff Layton
2026-05-05 22:55         ` Bernd Schubert [this message]
2026-04-30 12:56   ` Jeff Layton
2026-05-05 23:45   ` Bernd Schubert
2026-04-02 16:28 ` [PATCH v2 14/14] docs: fuse: add io-uring bufring and zero-copy documentation Joanne Koong
2026-04-14 21:05   ` Bernd Schubert
2026-04-15  1:10     ` Joanne Koong
2026-04-15 10:55       ` Bernd Schubert
2026-04-15 22:40         ` Joanne Koong
2026-04-30 12:57   ` Jeff Layton
2026-04-30 12:59 ` [PATCH v2 00/14] fuse: add io-uring buffer rings and zero-copy Jeff Layton

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=44675f24-e7db-4d92-a7ba-ce2a3c324f59@bsbernd.com \
    --to=bernd@bsbernd.com \
    --cc=axboe@kernel.dk \
    --cc=jlayton@kernel.org \
    --cc=joannelkoong@gmail.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=miklos@szeredi.hu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox