BusterMQ, Thread-per-core NATS server in Zig with io_uring
BusterMQ, Thread-per-core NATS server in Zig with io_uring
If I have a single threaded application using io_uring submit a batch of file reads then wait for them all to complete, and if _all_ the data being read was already in the page cache, then is it the case that no parallelism occurs?
As I understand it parallelism on file reads only occurs if data has to be read from the device, and it’s in the form of multiple reads being sent off to the storage hardware in parallel (or at least with QD > 1).
Io_uring, kTLS and Rust for zero syscall HTTPS server
https://blog.habets.se/2025/04/io-uring-ktls-and-rust-for-zero-syscall-https-server.html
#HackerNews #IoUring #kTLS #Rust #HTTPS #Server #ZeroSyscall
#PostgreSQL Database Lands Initial Support For #iouring: "Can Be Considerably Faster" - Phoronix
As a very exciting improvement for the open-source PostgreSQL database server, it has merged initial support for making use of IO_uring on Linux servers for asynchronous I/O and can provide for some nice performance improvements.
JUring: Experimental IO_uring For Java With Big Performance Gains
https://www.phoronix.com/news/JUring-IO_uring-Java?utm_medium=erik.in&utm_source=mastodon
Async #Rust is not safe with io_uring | by Tzu Gwo
Well written blog post on exploiting a Use-after-Free (UaF) in Linux kernel (CVE-2024-0582, io_uring)
Credits Oriol Castejón
By Oriol Castejón Overview This post discusses a use-after-free vulnerability, CVE-2024-0582, in io_uring in the Linux kernel. Despite the vulnerability being patched in the stable kernel in December 2023, it wasn’t ported to Ubuntu kernels for over two months, making it an easy 0day vector in Ubuntu during that time. In early January 2024, a Project Zero issue ... Read more Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu
Well written blog post on exploiting a Use-after-Free (UaF) in Linux kernel (CVE-2024-0582, io_uring)
Credits Oriol Castejón
By Oriol Castejón Overview This post discusses a use-after-free vulnerability, CVE-2024-0582, in io_uring in the Linux kernel. Despite the vulnerability being patched in the stable kernel in December 2023, it wasn’t ported to Ubuntu kernels for over two months, making it an easy 0day vector in Ubuntu during that time. In early January 2024, a Project Zero issue ... Read more Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu
Excellent blog post on Linux kernel and its io_uring subsystem (worker pool)
https://blog.cloudflare.com/missing-manuals-io_uring-worker-pool/
Chances are you might have heard of io_uring. It first appeared in Linux 5.1, back in 2019, and was advertised as the new API for asynchronous I/O. Its goal was to be an alternative to the deemed-to-be-broken-beyond-repair AIO, the “old” asynchronous I/O API
Adding io_uring to Java | Ilya Korennoy
https://korennoy.com/2023/06/09/adding-io_uring-to-java/