blob: 1d8adc57a44a3a7d3eaff2a7c67386614f1c09f3 [file] [log] [blame]
Jens Axboe2b188cc2019-01-07 10:46:33 -07001// SPDX-License-Identifier: GPL-2.0
2/*
3 * Shared application/kernel submission and completion ring pairs, for
4 * supporting fast/efficient IO.
5 *
6 * A note on the read/write ordering memory barriers that are matched between
Stefan Bühler1e84b972019-04-24 23:54:16 +02007 * the application and kernel side.
8 *
9 * After the application reads the CQ ring tail, it must use an
10 * appropriate smp_rmb() to pair with the smp_wmb() the kernel uses
11 * before writing the tail (using smp_load_acquire to read the tail will
12 * do). It also needs a smp_mb() before updating CQ head (ordering the
13 * entry load(s) with the head store), pairing with an implicit barrier
Pavel Begunkovd068b502021-05-16 22:58:11 +010014 * through a control-dependency in io_get_cqe (smp_store_release to
Stefan Bühler1e84b972019-04-24 23:54:16 +020015 * store head will do). Failure to do so could lead to reading invalid
16 * CQ entries.
17 *
18 * Likewise, the application must use an appropriate smp_wmb() before
19 * writing the SQ tail (ordering SQ entry stores with the tail store),
20 * which pairs with smp_load_acquire in io_get_sqring (smp_store_release
21 * to store the tail will do). And it needs a barrier ordering the SQ
22 * head load before writing new SQ entries (smp_load_acquire to read
23 * head will do).
24 *
25 * When using the SQ poll thread (IORING_SETUP_SQPOLL), the application
26 * needs to check the SQ flags for IORING_SQ_NEED_WAKEUP *after*
27 * updating the SQ tail; a full memory barrier smp_mb() is needed
28 * between.
Jens Axboe2b188cc2019-01-07 10:46:33 -070029 *
30 * Also see the examples in the liburing library:
31 *
32 * git://git.kernel.dk/liburing
33 *
34 * io_uring also uses READ/WRITE_ONCE() for _any_ store or load that happens
35 * from data shared between the kernel and application. This is done both
36 * for ordering purposes, but also to ensure that once a value is loaded from
37 * data that the application could potentially modify, it remains stable.
38 *
39 * Copyright (C) 2018-2019 Jens Axboe
Christoph Hellwigc992fe22019-01-11 09:43:02 -070040 * Copyright (c) 2018-2019 Christoph Hellwig
Jens Axboe2b188cc2019-01-07 10:46:33 -070041 */
42#include <linux/kernel.h>
43#include <linux/init.h>
44#include <linux/errno.h>
45#include <linux/syscalls.h>
46#include <linux/compat.h>
Jens Axboe52de1fe2020-02-27 10:15:42 -070047#include <net/compat.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070048#include <linux/refcount.h>
49#include <linux/uio.h>
Pavel Begunkov6b47ee62020-01-18 20:22:41 +030050#include <linux/bits.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070051
52#include <linux/sched/signal.h>
53#include <linux/fs.h>
54#include <linux/file.h>
55#include <linux/fdtable.h>
56#include <linux/mm.h>
57#include <linux/mman.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070058#include <linux/percpu.h>
59#include <linux/slab.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070060#include <linux/blkdev.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070061#include <linux/bvec.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070062#include <linux/net.h>
63#include <net/sock.h>
64#include <net/af_unix.h>
Jens Axboe6b063142019-01-10 22:13:58 -070065#include <net/scm.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070066#include <linux/anon_inodes.h>
67#include <linux/sched/mm.h>
68#include <linux/uaccess.h>
69#include <linux/nospec.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070070#include <linux/sizes.h>
71#include <linux/hugetlb.h>
Jens Axboeaa4c3962019-11-29 10:14:00 -070072#include <linux/highmem.h>
Jens Axboe15b71ab2019-12-11 11:20:36 -070073#include <linux/namei.h>
74#include <linux/fsnotify.h>
Jens Axboe4840e412019-12-25 22:03:45 -070075#include <linux/fadvise.h>
Jens Axboe3e4827b2020-01-08 15:18:09 -070076#include <linux/eventpoll.h>
Pavel Begunkov7d67af22020-02-24 11:32:45 +030077#include <linux/splice.h>
Jens Axboeb41e9852020-02-17 09:52:41 -070078#include <linux/task_work.h>
Jens Axboebcf5a062020-05-22 09:24:42 -060079#include <linux/pagemap.h>
Jens Axboe0f212202020-09-13 13:09:39 -060080#include <linux/io_uring.h>
Nadav Amitef98eb02021-08-07 17:13:41 -070081#include <linux/tracehook.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070082
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020083#define CREATE_TRACE_POINTS
84#include <trace/events/io_uring.h>
85
Jens Axboe2b188cc2019-01-07 10:46:33 -070086#include <uapi/linux/io_uring.h>
87
Jens Axboef435c662022-05-23 17:05:03 -060088#include "../fs/internal.h"
Jens Axboe561fb042019-10-24 07:25:42 -060089#include "io-wq.h"
Jens Axboe2b188cc2019-01-07 10:46:33 -070090
Daniel Xu5277dea2019-09-14 14:23:45 -070091#define IORING_MAX_ENTRIES 32768
Jens Axboe33a107f2019-10-04 12:10:03 -060092#define IORING_MAX_CQ_ENTRIES (2 * IORING_MAX_ENTRIES)
Olivier Langlois4ce8ad92021-06-23 11:50:18 -070093#define IORING_SQPOLL_CAP_ENTRIES_VALUE 8
Jens Axboe65e19f52019-10-26 07:20:21 -060094
wangyangbo187f08c2021-08-19 13:56:57 +080095/* only define max */
Pavel Begunkov042b0d82021-08-09 13:04:01 +010096#define IORING_MAX_FIXED_FILES (1U << 15)
Stefano Garzarella21b55db2020-08-27 16:58:30 +020097#define IORING_MAX_RESTRICTIONS (IORING_RESTRICTION_LAST + \
98 IORING_REGISTER_LAST + IORING_OP_LAST)
Jens Axboe2b188cc2019-01-07 10:46:33 -070099
wangyangbo187f08c2021-08-19 13:56:57 +0800100#define IO_RSRC_TAG_TABLE_SHIFT (PAGE_SHIFT - 3)
Pavel Begunkov2d091d62021-06-14 02:36:21 +0100101#define IO_RSRC_TAG_TABLE_MAX (1U << IO_RSRC_TAG_TABLE_SHIFT)
102#define IO_RSRC_TAG_TABLE_MASK (IO_RSRC_TAG_TABLE_MAX - 1)
103
Pavel Begunkov489809e2021-05-14 12:06:44 +0100104#define IORING_MAX_REG_BUFFERS (1U << 14)
105
Pavel Begunkovb16fed662021-02-18 18:29:40 +0000106#define SQE_VALID_FLAGS (IOSQE_FIXED_FILE|IOSQE_IO_DRAIN|IOSQE_IO_LINK| \
107 IOSQE_IO_HARDLINK | IOSQE_ASYNC | \
108 IOSQE_BUFFER_SELECT)
Pavel Begunkovc8543572021-06-17 18:14:04 +0100109#define IO_REQ_CLEAN_FLAGS (REQ_F_BUFFER_SELECTED | REQ_F_NEED_CLEANUP | \
110 REQ_F_POLLED | REQ_F_INFLIGHT | REQ_F_CREDS)
Pavel Begunkovb16fed662021-02-18 18:29:40 +0000111
Pavel Begunkov09899b12021-06-14 02:36:22 +0100112#define IO_TCTX_REFS_CACHE_NR (1U << 10)
113
Jens Axboe2b188cc2019-01-07 10:46:33 -0700114struct io_uring {
115 u32 head ____cacheline_aligned_in_smp;
116 u32 tail ____cacheline_aligned_in_smp;
117};
118
Stefan Bühler1e84b972019-04-24 23:54:16 +0200119/*
Hristo Venev75b28af2019-08-26 17:23:46 +0000120 * This data is shared with the application through the mmap at offsets
121 * IORING_OFF_SQ_RING and IORING_OFF_CQ_RING.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200122 *
123 * The offsets to the member fields are published through struct
124 * io_sqring_offsets when calling io_uring_setup.
125 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000126struct io_rings {
Stefan Bühler1e84b972019-04-24 23:54:16 +0200127 /*
128 * Head and tail offsets into the ring; the offsets need to be
129 * masked to get valid indices.
130 *
Hristo Venev75b28af2019-08-26 17:23:46 +0000131 * The kernel controls head of the sq ring and the tail of the cq ring,
132 * and the application controls tail of the sq ring and the head of the
133 * cq ring.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200134 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000135 struct io_uring sq, cq;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200136 /*
Hristo Venev75b28af2019-08-26 17:23:46 +0000137 * Bitmasks to apply to head and tail offsets (constant, equals
Stefan Bühler1e84b972019-04-24 23:54:16 +0200138 * ring_entries - 1)
139 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000140 u32 sq_ring_mask, cq_ring_mask;
141 /* Ring sizes (constant, power of 2) */
142 u32 sq_ring_entries, cq_ring_entries;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200143 /*
144 * Number of invalid entries dropped by the kernel due to
145 * invalid index stored in array
146 *
147 * Written by the kernel, shouldn't be modified by the
148 * application (i.e. get number of "new events" by comparing to
149 * cached value).
150 *
151 * After a new SQ head value was read by the application this
152 * counter includes all submissions that were dropped reaching
153 * the new SQ head (and possibly more).
154 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000155 u32 sq_dropped;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200156 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200157 * Runtime SQ flags
Stefan Bühler1e84b972019-04-24 23:54:16 +0200158 *
159 * Written by the kernel, shouldn't be modified by the
160 * application.
161 *
162 * The application needs a full memory barrier before checking
163 * for IORING_SQ_NEED_WAKEUP after updating the sq tail.
164 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000165 u32 sq_flags;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200166 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200167 * Runtime CQ flags
168 *
169 * Written by the application, shouldn't be modified by the
170 * kernel.
171 */
Pavel Begunkovfe7e3252021-06-24 15:09:57 +0100172 u32 cq_flags;
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200173 /*
Stefan Bühler1e84b972019-04-24 23:54:16 +0200174 * Number of completion events lost because the queue was full;
175 * this should be avoided by the application by making sure
LimingWu0b4295b2019-12-05 20:18:18 +0800176 * there are not more requests pending than there is space in
Stefan Bühler1e84b972019-04-24 23:54:16 +0200177 * the completion queue.
178 *
179 * Written by the kernel, shouldn't be modified by the
180 * application (i.e. get number of "new events" by comparing to
181 * cached value).
182 *
183 * As completion events come in out of order this counter is not
184 * ordered with any other data.
185 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000186 u32 cq_overflow;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200187 /*
188 * Ring buffer of completion events.
189 *
190 * The kernel writes completion events fresh every time they are
191 * produced, so the application is allowed to modify pending
192 * entries.
193 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000194 struct io_uring_cqe cqes[] ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700195};
196
Pavel Begunkov45d189c2021-02-10 00:03:07 +0000197enum io_uring_cmd_flags {
198 IO_URING_F_NONBLOCK = 1,
Pavel Begunkov889fca72021-02-10 00:03:09 +0000199 IO_URING_F_COMPLETE_DEFER = 2,
Pavel Begunkov45d189c2021-02-10 00:03:07 +0000200};
201
Jens Axboeedafcce2019-01-09 09:16:05 -0700202struct io_mapped_ubuf {
203 u64 ubuf;
Pavel Begunkov4751f532021-04-01 15:43:55 +0100204 u64 ubuf_end;
Jens Axboeedafcce2019-01-09 09:16:05 -0700205 unsigned int nr_bvecs;
Jens Axboede293932020-09-17 16:19:16 -0600206 unsigned long acct_pages;
Pavel Begunkov41edf1a2021-04-25 14:32:23 +0100207 struct bio_vec bvec[];
Jens Axboeedafcce2019-01-09 09:16:05 -0700208};
209
Bijan Mottahedeh50238532021-01-15 17:37:45 +0000210struct io_ring_ctx;
211
Pavel Begunkov6c2450a2021-02-23 12:40:22 +0000212struct io_overflow_cqe {
213 struct io_uring_cqe cqe;
214 struct list_head list;
215};
216
Pavel Begunkova04b0ac2021-04-01 15:44:04 +0100217struct io_fixed_file {
218 /* file * with additional FFS_* flags */
219 unsigned long file_ptr;
220};
221
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000222struct io_rsrc_put {
223 struct list_head list;
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +0100224 u64 tag;
Bijan Mottahedeh50238532021-01-15 17:37:45 +0000225 union {
226 void *rsrc;
227 struct file *file;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +0100228 struct io_mapped_ubuf *buf;
Bijan Mottahedeh50238532021-01-15 17:37:45 +0000229 };
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000230};
231
Pavel Begunkovaeca2412021-04-11 01:46:37 +0100232struct io_file_table {
Pavel Begunkov042b0d82021-08-09 13:04:01 +0100233 struct io_fixed_file *files;
Jens Axboe31b51512019-01-18 22:56:34 -0700234};
235
Pavel Begunkovb895c9a2021-04-01 15:43:40 +0100236struct io_rsrc_node {
Xiaoguang Wang05589552020-03-31 14:05:18 +0800237 struct percpu_ref refs;
238 struct list_head node;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000239 struct list_head rsrc_list;
Pavel Begunkovb895c9a2021-04-01 15:43:40 +0100240 struct io_rsrc_data *rsrc_data;
Jens Axboe4a38aed22020-05-14 17:21:15 -0600241 struct llist_node llist;
Pavel Begunkove2978222020-11-18 14:56:26 +0000242 bool done;
Xiaoguang Wang05589552020-03-31 14:05:18 +0800243};
244
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +0100245typedef void (rsrc_put_fn)(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc);
246
Pavel Begunkovb895c9a2021-04-01 15:43:40 +0100247struct io_rsrc_data {
Jens Axboe05f3fb32019-12-09 11:22:50 -0700248 struct io_ring_ctx *ctx;
249
Pavel Begunkov2d091d62021-06-14 02:36:21 +0100250 u64 **tags;
251 unsigned int nr;
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +0100252 rsrc_put_fn *do_put;
Pavel Begunkov3e942492021-04-11 01:46:34 +0100253 atomic_t refs;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700254 struct completion done;
Hao Xu8bad28d2021-02-19 17:19:36 +0800255 bool quiesce;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700256};
257
Jens Axboe5a2e7452020-02-23 16:23:11 -0700258struct io_buffer {
259 struct list_head list;
260 __u64 addr;
Thadeu Lima de Souza Cascardod1f82802021-05-05 09:47:06 -0300261 __u32 len;
Jens Axboe5a2e7452020-02-23 16:23:11 -0700262 __u16 bid;
263};
264
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200265struct io_restriction {
266 DECLARE_BITMAP(register_op, IORING_REGISTER_LAST);
267 DECLARE_BITMAP(sqe_op, IORING_OP_LAST);
268 u8 sqe_flags_allowed;
269 u8 sqe_flags_required;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +0200270 bool registered;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200271};
272
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700273enum {
274 IO_SQ_THREAD_SHOULD_STOP = 0,
275 IO_SQ_THREAD_SHOULD_PARK,
276};
277
Jens Axboe534ca6d2020-09-02 13:52:19 -0600278struct io_sq_data {
279 refcount_t refs;
Pavel Begunkov9e138a42021-03-14 20:57:12 +0000280 atomic_t park_pending;
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +0000281 struct mutex lock;
Jens Axboe69fb2132020-09-14 11:16:23 -0600282
283 /* ctx's that are using this sqd */
284 struct list_head ctx_list;
Jens Axboe69fb2132020-09-14 11:16:23 -0600285
Jens Axboe534ca6d2020-09-02 13:52:19 -0600286 struct task_struct *thread;
287 struct wait_queue_head wait;
Xiaoguang Wang08369242020-11-03 14:15:59 +0800288
289 unsigned sq_thread_idle;
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700290 int sq_cpu;
291 pid_t task_pid;
Jens Axboe5c2469e2021-03-11 10:17:56 -0700292 pid_t task_tgid;
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700293
294 unsigned long state;
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700295 struct completion exited;
Jens Axboe534ca6d2020-09-02 13:52:19 -0600296};
297
Pavel Begunkov6dd0be12021-02-10 00:03:13 +0000298#define IO_COMPL_BATCH 32
Pavel Begunkov6ff119a2021-02-10 00:03:18 +0000299#define IO_REQ_CACHE_SIZE 32
Pavel Begunkovbf019da2021-02-10 00:03:17 +0000300#define IO_REQ_ALLOC_BATCH 8
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000301
Pavel Begunkova1ab7b32021-02-18 18:29:42 +0000302struct io_submit_link {
303 struct io_kiocb *head;
304 struct io_kiocb *last;
305};
306
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000307struct io_submit_state {
308 struct blk_plug plug;
Pavel Begunkova1ab7b32021-02-18 18:29:42 +0000309 struct io_submit_link link;
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000310
311 /*
312 * io_kiocb alloc cache
313 */
Pavel Begunkovbf019da2021-02-10 00:03:17 +0000314 void *reqs[IO_REQ_CACHE_SIZE];
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000315 unsigned int free_reqs;
316
317 bool plug_started;
318
319 /*
320 * Batch completion logic
321 */
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +0100322 struct io_kiocb *compl_reqs[IO_COMPL_BATCH];
323 unsigned int compl_nr;
324 /* inline/task_work completion list, under ->uring_lock */
325 struct list_head free_list;
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000326
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000327 unsigned int ios_left;
328};
329
Jens Axboe2b188cc2019-01-07 10:46:33 -0700330struct io_ring_ctx {
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100331 /* const or read-mostly hot data */
Jens Axboe2b188cc2019-01-07 10:46:33 -0700332 struct {
333 struct percpu_ref refs;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700334
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100335 struct io_rings *rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700336 unsigned int flags;
Randy Dunlape1d85332020-02-05 20:57:10 -0800337 unsigned int compat: 1;
Randy Dunlape1d85332020-02-05 20:57:10 -0800338 unsigned int drain_next: 1;
339 unsigned int eventfd_async: 1;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200340 unsigned int restricted: 1;
Pavel Begunkovf18ee4c2021-06-14 23:37:25 +0100341 unsigned int off_timeout_used: 1;
Pavel Begunkov10c66902021-06-15 16:47:56 +0100342 unsigned int drain_active: 1;
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100343 } ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700344
Pavel Begunkov7f1129d2021-06-14 23:37:22 +0100345 /* submission data */
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100346 struct {
Pavel Begunkov0499e582021-06-14 23:37:29 +0100347 struct mutex uring_lock;
348
Hristo Venev75b28af2019-08-26 17:23:46 +0000349 /*
350 * Ring buffer of indices into array of io_uring_sqe, which is
351 * mmapped by the application using the IORING_OFF_SQES offset.
352 *
353 * This indirection could e.g. be used to assign fixed
354 * io_uring_sqe entries to operations and only submit them to
355 * the queue when needed.
356 *
357 * The kernel modifies neither the indices array nor the entries
358 * array.
359 */
360 u32 *sq_array;
Pavel Begunkovc7af47c2021-06-14 23:37:20 +0100361 struct io_uring_sqe *sq_sqes;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700362 unsigned cached_sq_head;
363 unsigned sq_entries;
Jens Axboede0617e2019-04-06 21:51:27 -0600364 struct list_head defer_list;
Pavel Begunkov7f1129d2021-06-14 23:37:22 +0100365
366 /*
367 * Fixed resources fast path, should be accessed only under
368 * uring_lock, and updated through io_uring_register(2)
369 */
370 struct io_rsrc_node *rsrc_node;
371 struct io_file_table file_table;
372 unsigned nr_user_files;
373 unsigned nr_user_bufs;
374 struct io_mapped_ubuf **user_bufs;
375
376 struct io_submit_state submit_state;
Jens Axboe5262f562019-09-17 12:26:57 -0600377 struct list_head timeout_list;
Pavel Begunkovef9dd632021-08-28 19:54:38 -0600378 struct list_head ltimeout_list;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -0700379 struct list_head cq_overflow_list;
Pavel Begunkov7f1129d2021-06-14 23:37:22 +0100380 struct xarray io_buffers;
381 struct xarray personalities;
382 u32 pers_next;
383 unsigned sq_thread_idle;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700384 } ____cacheline_aligned_in_smp;
385
Pavel Begunkovd0acdee2021-05-16 22:58:12 +0100386 /* IRQ completion list, under ->completion_lock */
387 struct list_head locked_free_list;
388 unsigned int locked_free_nr;
Jens Axboe3c1a2ea2021-02-11 10:48:03 -0700389
Stefan Metzmacher7c30f36a2021-03-07 11:54:28 +0100390 const struct cred *sq_creds; /* cred used for __io_sq_thread() */
Jens Axboe534ca6d2020-09-02 13:52:19 -0600391 struct io_sq_data *sq_data; /* if using sq thread polling */
392
Jens Axboe90554202020-09-03 12:12:41 -0600393 struct wait_queue_head sqo_sq_wait;
Jens Axboe69fb2132020-09-14 11:16:23 -0600394 struct list_head sqd_list;
Hristo Venev75b28af2019-08-26 17:23:46 +0000395
Pavel Begunkov5ed7a372021-06-14 23:37:27 +0100396 unsigned long check_cq_overflow;
397
Jens Axboe206aefd2019-11-07 18:27:42 -0700398 struct {
399 unsigned cached_cq_tail;
400 unsigned cq_entries;
Jens Axboe206aefd2019-11-07 18:27:42 -0700401 struct eventfd_ctx *cq_ev_fd;
Pavel Begunkov0499e582021-06-14 23:37:29 +0100402 struct wait_queue_head poll_wait;
403 struct wait_queue_head cq_wait;
404 unsigned cq_extra;
405 atomic_t cq_timeouts;
Pavel Begunkov0499e582021-06-14 23:37:29 +0100406 unsigned cq_last_tm_flush;
Jens Axboe206aefd2019-11-07 18:27:42 -0700407 } ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700408
409 struct {
Jens Axboe2b188cc2019-01-07 10:46:33 -0700410 spinlock_t completion_lock;
Jens Axboee94f1412019-12-19 12:06:02 -0700411
Jens Axboe89850fc2021-08-10 15:11:51 -0600412 spinlock_t timeout_lock;
413
Jens Axboedef596e2019-01-09 08:59:42 -0700414 /*
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300415 * ->iopoll_list is protected by the ctx->uring_lock for
Jens Axboedef596e2019-01-09 08:59:42 -0700416 * io_uring instances that don't use IORING_SETUP_SQPOLL.
417 * For SQPOLL, only the single threaded io_sq_thread() will
418 * manipulate the list, hence no extra locking is needed there.
419 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300420 struct list_head iopoll_list;
Jens Axboe78076bb2019-12-04 19:56:40 -0700421 struct hlist_head *cancel_hash;
422 unsigned cancel_hash_bits;
Hao Xu915b3dd2021-06-28 05:37:30 +0800423 bool poll_multi_queue;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700424 } ____cacheline_aligned_in_smp;
Jens Axboe85faa7b2020-04-09 18:14:00 -0600425
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200426 struct io_restriction restrictions;
Jens Axboe3c1a2ea2021-02-11 10:48:03 -0700427
Pavel Begunkovb13a8912021-05-16 22:58:07 +0100428 /* slow path rsrc auxilary data, used by update/register */
429 struct {
430 struct io_rsrc_node *rsrc_backup_node;
431 struct io_mapped_ubuf *dummy_ubuf;
432 struct io_rsrc_data *file_data;
433 struct io_rsrc_data *buf_data;
434
435 struct delayed_work rsrc_put_work;
436 struct llist_head rsrc_put_llist;
437 struct list_head rsrc_ref_list;
438 spinlock_t rsrc_ref_lock;
439 };
440
Jens Axboe3c1a2ea2021-02-11 10:48:03 -0700441 /* Keep this last, we don't need it for the fast path */
Pavel Begunkovb986af72021-05-16 22:58:06 +0100442 struct {
443 #if defined(CONFIG_UNIX)
444 struct socket *ring_sock;
445 #endif
446 /* hashed buffered write serialization */
447 struct io_wq_hash *hash_map;
448
449 /* Only used for accounting purposes */
450 struct user_struct *user;
451 struct mm_struct *mm_account;
452
453 /* ctx exit and cancelation */
Pavel Begunkov9011bf92021-06-30 21:54:03 +0100454 struct llist_head fallback_llist;
455 struct delayed_work fallback_work;
Pavel Begunkovb986af72021-05-16 22:58:06 +0100456 struct work_struct exit_work;
457 struct list_head tctx_list;
458 struct completion ref_comp;
Pavel Begunkove139a1e2021-10-19 23:43:46 +0100459 u32 iowq_limits[2];
460 bool iowq_limits_set;
Pavel Begunkovb986af72021-05-16 22:58:06 +0100461 };
Jens Axboe2b188cc2019-01-07 10:46:33 -0700462};
463
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100464struct io_uring_task {
465 /* submission side */
Pavel Begunkov09899b12021-06-14 02:36:22 +0100466 int cached_refs;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100467 struct xarray xa;
468 struct wait_queue_head wait;
Stefan Metzmacheree53fb22021-03-15 12:56:57 +0100469 const struct io_ring_ctx *last;
470 struct io_wq *io_wq;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100471 struct percpu_counter inflight;
Pavel Begunkovb303fe22021-04-11 01:46:26 +0100472 atomic_t inflight_tracked;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100473 atomic_t in_idle;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100474
475 spinlock_t task_lock;
476 struct io_wq_work_list task_list;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100477 struct callback_head task_work;
Pavel Begunkov6294f362021-08-10 17:53:55 +0100478 bool task_running;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100479};
480
Jens Axboe09bb8392019-03-13 12:39:28 -0600481/*
482 * First field must be the file pointer in all the
483 * iocb unions! See also 'struct kiocb' in <linux/fs.h>
484 */
Jens Axboe221c5eb2019-01-17 09:41:58 -0700485struct io_poll_iocb {
486 struct file *file;
Pavel Begunkov018043b2020-10-27 23:17:18 +0000487 struct wait_queue_head *head;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700488 __poll_t events;
Jens Axboe345fb362023-03-06 13:28:57 -0700489 int retries;
Jens Axboe392edb42019-12-09 17:52:20 -0700490 struct wait_queue_entry wait;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700491};
492
Pavel Begunkov9d805892021-04-13 02:58:40 +0100493struct io_poll_update {
Pavel Begunkov018043b2020-10-27 23:17:18 +0000494 struct file *file;
Pavel Begunkov9d805892021-04-13 02:58:40 +0100495 u64 old_user_data;
496 u64 new_user_data;
497 __poll_t events;
Jens Axboeb69de282021-03-17 08:37:41 -0600498 bool update_events;
499 bool update_user_data;
Pavel Begunkov018043b2020-10-27 23:17:18 +0000500};
501
Jens Axboeb5dba592019-12-11 14:02:38 -0700502struct io_close {
503 struct file *file;
Jens Axboeb5dba592019-12-11 14:02:38 -0700504 int fd;
Pavel Begunkov7df778b2021-09-24 20:04:29 +0100505 u32 file_slot;
Jens Axboeb5dba592019-12-11 14:02:38 -0700506};
507
Jens Axboead8a48a2019-11-15 08:49:11 -0700508struct io_timeout_data {
509 struct io_kiocb *req;
510 struct hrtimer timer;
511 struct timespec64 ts;
512 enum hrtimer_mode mode;
Jens Axboe50c1df22021-08-27 17:11:06 -0600513 u32 flags;
Jens Axboead8a48a2019-11-15 08:49:11 -0700514};
515
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700516struct io_accept {
517 struct file *file;
518 struct sockaddr __user *addr;
519 int __user *addr_len;
520 int flags;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +0100521 u32 file_slot;
Jens Axboe09952e32020-03-19 20:16:56 -0600522 unsigned long nofile;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700523};
524
525struct io_sync {
526 struct file *file;
527 loff_t len;
528 loff_t off;
529 int flags;
Jens Axboed63d1b52019-12-10 10:38:56 -0700530 int mode;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700531};
532
Jens Axboefbf23842019-12-17 18:45:56 -0700533struct io_cancel {
534 struct file *file;
535 u64 addr;
536};
537
Jens Axboeb29472e2019-12-17 18:50:29 -0700538struct io_timeout {
539 struct file *file;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +0300540 u32 off;
541 u32 target_seq;
Pavel Begunkov135fcde2020-07-13 23:37:12 +0300542 struct list_head list;
Pavel Begunkov90cd7e42020-10-27 23:25:36 +0000543 /* head of the link, used by linked timeouts only */
544 struct io_kiocb *head;
Jens Axboe89b263f2021-08-10 15:14:18 -0600545 /* for linked completions */
546 struct io_kiocb *prev;
Jens Axboeb29472e2019-12-17 18:50:29 -0700547};
548
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100549struct io_timeout_rem {
550 struct file *file;
551 u64 addr;
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +0000552
553 /* timeout update */
554 struct timespec64 ts;
555 u32 flags;
Pavel Begunkovf1042b62021-08-28 19:54:39 -0600556 bool ltimeout;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100557};
558
Jens Axboe9adbd452019-12-20 08:45:55 -0700559struct io_rw {
560 /* NOTE: kiocb has the file as the first member, so don't do it here */
561 struct kiocb kiocb;
562 u64 addr;
563 u64 len;
564};
565
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700566struct io_connect {
567 struct file *file;
568 struct sockaddr __user *addr;
569 int addr_len;
570};
571
Jens Axboee47293f2019-12-20 08:58:21 -0700572struct io_sr_msg {
573 struct file *file;
Jens Axboefddafac2020-01-04 20:19:44 -0700574 union {
Pavel Begunkov4af34172021-04-11 01:46:30 +0100575 struct compat_msghdr __user *umsg_compat;
576 struct user_msghdr __user *umsg;
577 void __user *buf;
Jens Axboefddafac2020-01-04 20:19:44 -0700578 };
Jens Axboee47293f2019-12-20 08:58:21 -0700579 int msg_flags;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700580 int bgid;
Jens Axboefddafac2020-01-04 20:19:44 -0700581 size_t len;
Jens Axboe9b7b0f22023-01-21 10:21:22 -0700582 size_t done_io;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700583 struct io_buffer *kbuf;
Jens Axboee47293f2019-12-20 08:58:21 -0700584};
585
Jens Axboe15b71ab2019-12-11 11:20:36 -0700586struct io_open {
587 struct file *file;
588 int dfd;
Pavel Begunkovb9445592021-08-25 12:25:45 +0100589 u32 file_slot;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700590 struct filename *filename;
Jens Axboec12cedf2020-01-08 17:41:21 -0700591 struct open_how how;
Jens Axboe4022e7a2020-03-19 19:23:18 -0600592 unsigned long nofile;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700593};
594
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000595struct io_rsrc_update {
Jens Axboe05f3fb32019-12-09 11:22:50 -0700596 struct file *file;
597 u64 arg;
598 u32 nr_args;
599 u32 offset;
600};
601
Jens Axboe4840e412019-12-25 22:03:45 -0700602struct io_fadvise {
603 struct file *file;
604 u64 offset;
605 u32 len;
606 u32 advice;
607};
608
Jens Axboec1ca7572019-12-25 22:18:28 -0700609struct io_madvise {
610 struct file *file;
611 u64 addr;
612 u32 len;
613 u32 advice;
614};
615
Jens Axboe3e4827b2020-01-08 15:18:09 -0700616struct io_epoll {
617 struct file *file;
618 int epfd;
619 int op;
620 int fd;
621 struct epoll_event event;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700622};
623
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300624struct io_splice {
625 struct file *file_out;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300626 loff_t off_out;
627 loff_t off_in;
628 u64 len;
Jens Axboeae6cba32022-03-29 10:59:20 -0600629 int splice_fd_in;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300630 unsigned int flags;
631};
632
Jens Axboeddf0322d2020-02-23 16:41:33 -0700633struct io_provide_buf {
634 struct file *file;
635 __u64 addr;
Pavel Begunkov38134ad2021-04-15 13:07:39 +0100636 __u32 len;
Jens Axboeddf0322d2020-02-23 16:41:33 -0700637 __u32 bgid;
638 __u16 nbufs;
639 __u16 bid;
640};
641
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700642struct io_statx {
643 struct file *file;
644 int dfd;
645 unsigned int mask;
646 unsigned int flags;
Bijan Mottahedehe62753e2020-05-22 21:31:18 -0700647 const char __user *filename;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700648 struct statx __user *buffer;
649};
650
Jens Axboe36f4fa62020-09-05 11:14:22 -0600651struct io_shutdown {
652 struct file *file;
653 int how;
654};
655
Jens Axboe80a261f2020-09-28 14:23:58 -0600656struct io_rename {
657 struct file *file;
658 int old_dfd;
659 int new_dfd;
660 struct filename *oldpath;
661 struct filename *newpath;
662 int flags;
663};
664
Jens Axboe14a11432020-09-28 14:27:37 -0600665struct io_unlink {
666 struct file *file;
667 int dfd;
668 int flags;
669 struct filename *filename;
670};
671
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +0700672struct io_mkdir {
673 struct file *file;
674 int dfd;
675 umode_t mode;
676 struct filename *filename;
677};
678
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +0700679struct io_symlink {
680 struct file *file;
681 int new_dfd;
682 struct filename *oldpath;
683 struct filename *newpath;
684};
685
Dmitry Kadashevcf30da92021-07-08 13:34:47 +0700686struct io_hardlink {
687 struct file *file;
688 int old_dfd;
689 int new_dfd;
690 struct filename *oldpath;
691 struct filename *newpath;
692 int flags;
693};
694
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300695struct io_completion {
696 struct file *file;
Pavel Begunkov8c3f9cd2021-02-28 22:35:15 +0000697 u32 cflags;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300698};
699
Jens Axboef499a022019-12-02 16:28:46 -0700700struct io_async_connect {
701 struct sockaddr_storage address;
702};
703
Jens Axboe03b12302019-12-02 18:50:25 -0700704struct io_async_msghdr {
705 struct iovec fast_iov[UIO_FASTIOV];
Pavel Begunkov257e84a2021-02-05 00:58:00 +0000706 /* points to an allocated iov, if NULL we use fast_iov instead */
707 struct iovec *free_iov;
Jens Axboe03b12302019-12-02 18:50:25 -0700708 struct sockaddr __user *uaddr;
709 struct msghdr msg;
Jens Axboeb5379162020-02-09 11:29:15 -0700710 struct sockaddr_storage addr;
Jens Axboe03b12302019-12-02 18:50:25 -0700711};
712
Jens Axboef67676d2019-12-02 11:03:47 -0700713struct io_async_rw {
714 struct iovec fast_iov[UIO_FASTIOV];
Jens Axboeff6165b2020-08-13 09:47:43 -0600715 const struct iovec *free_iovec;
716 struct iov_iter iter;
Jens Axboecd658692021-09-10 11:19:14 -0600717 struct iov_iter_state iter_state;
Jens Axboe227c0c92020-08-13 11:51:40 -0600718 size_t bytes_done;
Jens Axboebcf5a062020-05-22 09:24:42 -0600719 struct wait_page_queue wpq;
Jens Axboef67676d2019-12-02 11:03:47 -0700720};
721
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300722enum {
723 REQ_F_FIXED_FILE_BIT = IOSQE_FIXED_FILE_BIT,
724 REQ_F_IO_DRAIN_BIT = IOSQE_IO_DRAIN_BIT,
725 REQ_F_LINK_BIT = IOSQE_IO_LINK_BIT,
726 REQ_F_HARDLINK_BIT = IOSQE_IO_HARDLINK_BIT,
727 REQ_F_FORCE_ASYNC_BIT = IOSQE_ASYNC_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700728 REQ_F_BUFFER_SELECT_BIT = IOSQE_BUFFER_SELECT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300729
Pavel Begunkovdddca222021-04-27 16:13:52 +0100730 /* first byte is taken by user flags, shift it to not overlap */
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +0100731 REQ_F_FAIL_BIT = 8,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300732 REQ_F_INFLIGHT_BIT,
733 REQ_F_CUR_POS_BIT,
734 REQ_F_NOWAIT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300735 REQ_F_LINK_TIMEOUT_BIT,
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300736 REQ_F_NEED_CLEANUP_BIT,
Jens Axboed7718a92020-02-14 22:23:12 -0700737 REQ_F_POLLED_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700738 REQ_F_BUFFER_SELECTED_BIT,
Pavel Begunkove342c802021-01-19 13:32:47 +0000739 REQ_F_COMPLETE_INLINE_BIT,
Jens Axboe230d50d2021-04-01 20:41:15 -0600740 REQ_F_REISSUE_BIT,
Pavel Begunkovb8e64b52021-06-17 18:14:02 +0100741 REQ_F_CREDS_BIT,
Pavel Begunkov20e60a32021-08-11 19:28:30 +0100742 REQ_F_REFCOUNT_BIT,
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +0100743 REQ_F_ARM_LTIMEOUT_BIT,
Jens Axboe390b8812022-03-23 09:30:05 -0600744 REQ_F_PARTIAL_IO_BIT,
Jens Axboe7b29f922021-03-12 08:30:14 -0700745 /* keep async read/write and isreg together and in order */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +0100746 REQ_F_NOWAIT_READ_BIT,
747 REQ_F_NOWAIT_WRITE_BIT,
Jens Axboe7b29f922021-03-12 08:30:14 -0700748 REQ_F_ISREG_BIT,
Jens Axboe84557872020-03-03 15:28:17 -0700749
750 /* not a real bit, just to check we're not overflowing the space */
751 __REQ_F_LAST_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300752};
753
754enum {
755 /* ctx owns file */
756 REQ_F_FIXED_FILE = BIT(REQ_F_FIXED_FILE_BIT),
757 /* drain existing IO first */
758 REQ_F_IO_DRAIN = BIT(REQ_F_IO_DRAIN_BIT),
759 /* linked sqes */
760 REQ_F_LINK = BIT(REQ_F_LINK_BIT),
761 /* doesn't sever on completion < 0 */
762 REQ_F_HARDLINK = BIT(REQ_F_HARDLINK_BIT),
763 /* IOSQE_ASYNC */
764 REQ_F_FORCE_ASYNC = BIT(REQ_F_FORCE_ASYNC_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700765 /* IOSQE_BUFFER_SELECT */
766 REQ_F_BUFFER_SELECT = BIT(REQ_F_BUFFER_SELECT_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300767
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300768 /* fail rest of links */
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +0100769 REQ_F_FAIL = BIT(REQ_F_FAIL_BIT),
Pavel Begunkovb05a1bc2021-03-04 13:59:24 +0000770 /* on inflight list, should be cancelled and waited on exit reliably */
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300771 REQ_F_INFLIGHT = BIT(REQ_F_INFLIGHT_BIT),
772 /* read/write uses file position */
773 REQ_F_CUR_POS = BIT(REQ_F_CUR_POS_BIT),
774 /* must not punt to workers */
775 REQ_F_NOWAIT = BIT(REQ_F_NOWAIT_BIT),
Pavel Begunkov900fad42020-10-19 16:39:16 +0100776 /* has or had linked timeout */
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300777 REQ_F_LINK_TIMEOUT = BIT(REQ_F_LINK_TIMEOUT_BIT),
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300778 /* needs cleanup */
779 REQ_F_NEED_CLEANUP = BIT(REQ_F_NEED_CLEANUP_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700780 /* already went through poll handler */
781 REQ_F_POLLED = BIT(REQ_F_POLLED_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700782 /* buffer already selected */
783 REQ_F_BUFFER_SELECTED = BIT(REQ_F_BUFFER_SELECTED_BIT),
Pavel Begunkove342c802021-01-19 13:32:47 +0000784 /* completion is deferred through io_comp_state */
785 REQ_F_COMPLETE_INLINE = BIT(REQ_F_COMPLETE_INLINE_BIT),
Jens Axboe230d50d2021-04-01 20:41:15 -0600786 /* caller should reissue async */
787 REQ_F_REISSUE = BIT(REQ_F_REISSUE_BIT),
Jens Axboe7b29f922021-03-12 08:30:14 -0700788 /* supports async reads */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +0100789 REQ_F_NOWAIT_READ = BIT(REQ_F_NOWAIT_READ_BIT),
Jens Axboe7b29f922021-03-12 08:30:14 -0700790 /* supports async writes */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +0100791 REQ_F_NOWAIT_WRITE = BIT(REQ_F_NOWAIT_WRITE_BIT),
Jens Axboe7b29f922021-03-12 08:30:14 -0700792 /* regular file */
793 REQ_F_ISREG = BIT(REQ_F_ISREG_BIT),
Pavel Begunkovb8e64b52021-06-17 18:14:02 +0100794 /* has creds assigned */
795 REQ_F_CREDS = BIT(REQ_F_CREDS_BIT),
Pavel Begunkov20e60a32021-08-11 19:28:30 +0100796 /* skip refcounting if not set */
797 REQ_F_REFCOUNT = BIT(REQ_F_REFCOUNT_BIT),
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +0100798 /* there is a linked timeout that has to be armed */
799 REQ_F_ARM_LTIMEOUT = BIT(REQ_F_ARM_LTIMEOUT_BIT),
Jens Axboe390b8812022-03-23 09:30:05 -0600800 /* request has already done partial IO */
801 REQ_F_PARTIAL_IO = BIT(REQ_F_PARTIAL_IO_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700802};
803
804struct async_poll {
805 struct io_poll_iocb poll;
Jens Axboe807abcb2020-07-17 17:09:27 -0600806 struct io_poll_iocb *double_poll;
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300807};
808
Pavel Begunkovf237c302021-08-18 12:42:46 +0100809typedef void (*io_req_tw_func_t)(struct io_kiocb *req, bool *locked);
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +0100810
Jens Axboe7cbf1722021-02-10 00:03:20 +0000811struct io_task_work {
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +0100812 union {
813 struct io_wq_work_node node;
814 struct llist_node fallback_node;
815 };
816 io_req_tw_func_t func;
Jens Axboe7cbf1722021-02-10 00:03:20 +0000817};
818
Pavel Begunkov992da012021-06-10 16:37:37 +0100819enum {
820 IORING_RSRC_FILE = 0,
821 IORING_RSRC_BUFFER = 1,
822};
823
Jens Axboe09bb8392019-03-13 12:39:28 -0600824/*
825 * NOTE! Each of the iocb union members has the file pointer
826 * as the first entry in their struct definition. So you can
827 * access the file pointer through any of the sub-structs,
828 * or directly as just 'ki_filp' in this struct.
829 */
Jens Axboe2b188cc2019-01-07 10:46:33 -0700830struct io_kiocb {
Jens Axboe221c5eb2019-01-17 09:41:58 -0700831 union {
Jens Axboe09bb8392019-03-13 12:39:28 -0600832 struct file *file;
Jens Axboe9adbd452019-12-20 08:45:55 -0700833 struct io_rw rw;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700834 struct io_poll_iocb poll;
Pavel Begunkov9d805892021-04-13 02:58:40 +0100835 struct io_poll_update poll_update;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700836 struct io_accept accept;
837 struct io_sync sync;
Jens Axboefbf23842019-12-17 18:45:56 -0700838 struct io_cancel cancel;
Jens Axboeb29472e2019-12-17 18:50:29 -0700839 struct io_timeout timeout;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100840 struct io_timeout_rem timeout_rem;
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700841 struct io_connect connect;
Jens Axboee47293f2019-12-20 08:58:21 -0700842 struct io_sr_msg sr_msg;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700843 struct io_open open;
Jens Axboeb5dba592019-12-11 14:02:38 -0700844 struct io_close close;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000845 struct io_rsrc_update rsrc_update;
Jens Axboe4840e412019-12-25 22:03:45 -0700846 struct io_fadvise fadvise;
Jens Axboec1ca7572019-12-25 22:18:28 -0700847 struct io_madvise madvise;
Jens Axboe3e4827b2020-01-08 15:18:09 -0700848 struct io_epoll epoll;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300849 struct io_splice splice;
Jens Axboeddf0322d2020-02-23 16:41:33 -0700850 struct io_provide_buf pbuf;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700851 struct io_statx statx;
Jens Axboe36f4fa62020-09-05 11:14:22 -0600852 struct io_shutdown shutdown;
Jens Axboe80a261f2020-09-28 14:23:58 -0600853 struct io_rename rename;
Jens Axboe14a11432020-09-28 14:27:37 -0600854 struct io_unlink unlink;
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +0700855 struct io_mkdir mkdir;
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +0700856 struct io_symlink symlink;
Dmitry Kadashevcf30da92021-07-08 13:34:47 +0700857 struct io_hardlink hardlink;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300858 /* use only after cleaning per-op data, see io_clean_op() */
859 struct io_completion compl;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700860 };
Jens Axboe2b188cc2019-01-07 10:46:33 -0700861
Jens Axboee8c2bc12020-08-15 18:44:09 -0700862 /* opcode allocated if it needs to store data for async defer */
863 void *async_data;
Jens Axboed625c6e2019-12-17 19:53:05 -0700864 u8 opcode;
Xiaoguang Wang65a65432020-06-11 23:39:36 +0800865 /* polled IO has completed */
866 u8 iopoll_completed;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700867
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700868 u16 buf_index;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300869 u32 result;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700870
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300871 struct io_ring_ctx *ctx;
872 unsigned int flags;
Jens Axboeabc54d62021-02-24 13:32:30 -0700873 atomic_t refs;
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300874 struct task_struct *task;
875 u64 user_data;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700876
Pavel Begunkovf2f87372020-10-27 23:25:37 +0000877 struct io_kiocb *link;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000878 struct percpu_ref *fixed_rsrc_refs;
Jens Axboed7718a92020-02-14 22:23:12 -0700879
Pavel Begunkovb303fe22021-04-11 01:46:26 +0100880 /* used with ctx->iopoll_list with reads/writes */
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300881 struct list_head inflight_entry;
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +0100882 struct io_task_work io_task_work;
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300883 /* for polled requests, i.e. IORING_OP_POLL_ADD and async armed poll */
884 struct hlist_node hash_node;
885 struct async_poll *apoll;
886 struct io_wq_work work;
Pavel Begunkovfe7e3252021-06-24 15:09:57 +0100887 const struct cred *creds;
Pavel Begunkovc10d1f92021-06-17 18:14:01 +0100888
Pavel Begunkoveae071c2021-04-25 14:32:24 +0100889 /* store used ubuf, so we can prevent reloading */
890 struct io_mapped_ubuf *imu;
Pavel Begunkovf770fba2022-08-29 14:30:18 +0100891 /* stores selected buf, valid IFF REQ_F_BUFFER_SELECTED is set */
892 struct io_buffer *kbuf;
893 atomic_t poll_refs;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700894};
895
Pavel Begunkov13bf43f2021-03-06 11:02:12 +0000896struct io_tctx_node {
897 struct list_head ctx_node;
898 struct task_struct *task;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +0000899 struct io_ring_ctx *ctx;
900};
901
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300902struct io_defer_entry {
903 struct list_head list;
904 struct io_kiocb *req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300905 u32 seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300906};
907
Jens Axboed3656342019-12-18 09:50:26 -0700908struct io_op_def {
Jens Axboed3656342019-12-18 09:50:26 -0700909 /* needs req->file assigned */
910 unsigned needs_file : 1;
Jens Axboed3656342019-12-18 09:50:26 -0700911 /* hash wq insertion if file is a regular file */
912 unsigned hash_reg_file : 1;
913 /* unbound wq insertion if file is a non-regular file */
914 unsigned unbound_nonreg_file : 1;
Jens Axboe66f4af92020-01-16 15:36:52 -0700915 /* opcode is not supported by this kernel */
916 unsigned not_supported : 1;
Jens Axboe8a727582020-02-20 09:59:44 -0700917 /* set if opcode supports polled "wait" */
918 unsigned pollin : 1;
919 unsigned pollout : 1;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700920 /* op supports buffer selection */
921 unsigned buffer_select : 1;
Pavel Begunkov26f05052021-02-28 22:35:18 +0000922 /* do prep async if is going to be punted */
923 unsigned needs_async_setup : 1;
Jens Axboe27926b62020-10-28 09:33:23 -0600924 /* should block plug */
925 unsigned plug : 1;
Jens Axboee8c2bc12020-08-15 18:44:09 -0700926 /* size of async data needed, if any */
927 unsigned short async_size;
Jens Axboed3656342019-12-18 09:50:26 -0700928};
929
Jens Axboe09186822020-10-13 15:01:40 -0600930static const struct io_op_def io_op_defs[] = {
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300931 [IORING_OP_NOP] = {},
932 [IORING_OP_READV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700933 .needs_file = 1,
934 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700935 .pollin = 1,
Jens Axboe4d954c22020-02-27 07:31:19 -0700936 .buffer_select = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000937 .needs_async_setup = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600938 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700939 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700940 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300941 [IORING_OP_WRITEV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700942 .needs_file = 1,
943 .hash_reg_file = 1,
944 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700945 .pollout = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000946 .needs_async_setup = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600947 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700948 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700949 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300950 [IORING_OP_FSYNC] = {
Jens Axboed3656342019-12-18 09:50:26 -0700951 .needs_file = 1,
952 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300953 [IORING_OP_READ_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700954 .needs_file = 1,
955 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700956 .pollin = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600957 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700958 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700959 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300960 [IORING_OP_WRITE_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700961 .needs_file = 1,
962 .hash_reg_file = 1,
963 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700964 .pollout = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600965 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700966 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700967 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300968 [IORING_OP_POLL_ADD] = {
Jens Axboed3656342019-12-18 09:50:26 -0700969 .needs_file = 1,
970 .unbound_nonreg_file = 1,
971 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300972 [IORING_OP_POLL_REMOVE] = {},
973 [IORING_OP_SYNC_FILE_RANGE] = {
Jens Axboed3656342019-12-18 09:50:26 -0700974 .needs_file = 1,
975 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300976 [IORING_OP_SENDMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700977 .needs_file = 1,
978 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700979 .pollout = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000980 .needs_async_setup = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700981 .async_size = sizeof(struct io_async_msghdr),
Jens Axboed3656342019-12-18 09:50:26 -0700982 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300983 [IORING_OP_RECVMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700984 .needs_file = 1,
985 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700986 .pollin = 1,
Jens Axboe52de1fe2020-02-27 10:15:42 -0700987 .buffer_select = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000988 .needs_async_setup = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700989 .async_size = sizeof(struct io_async_msghdr),
Jens Axboed3656342019-12-18 09:50:26 -0700990 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300991 [IORING_OP_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -0700992 .async_size = sizeof(struct io_timeout_data),
Jens Axboed3656342019-12-18 09:50:26 -0700993 },
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +0000994 [IORING_OP_TIMEOUT_REMOVE] = {
995 /* used by timeout updates' prep() */
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +0000996 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300997 [IORING_OP_ACCEPT] = {
Jens Axboed3656342019-12-18 09:50:26 -0700998 .needs_file = 1,
999 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001000 .pollin = 1,
Jens Axboed3656342019-12-18 09:50:26 -07001001 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001002 [IORING_OP_ASYNC_CANCEL] = {},
1003 [IORING_OP_LINK_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -07001004 .async_size = sizeof(struct io_timeout_data),
Jens Axboed3656342019-12-18 09:50:26 -07001005 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001006 [IORING_OP_CONNECT] = {
Jens Axboed3656342019-12-18 09:50:26 -07001007 .needs_file = 1,
1008 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001009 .pollout = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +00001010 .needs_async_setup = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -07001011 .async_size = sizeof(struct io_async_connect),
Jens Axboed3656342019-12-18 09:50:26 -07001012 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001013 [IORING_OP_FALLOCATE] = {
Jens Axboed3656342019-12-18 09:50:26 -07001014 .needs_file = 1,
1015 },
Jens Axboe44526be2021-02-15 13:32:18 -07001016 [IORING_OP_OPENAT] = {},
1017 [IORING_OP_CLOSE] = {},
1018 [IORING_OP_FILES_UPDATE] = {},
1019 [IORING_OP_STATX] = {},
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001020 [IORING_OP_READ] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -07001021 .needs_file = 1,
1022 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001023 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -07001024 .buffer_select = 1,
Jens Axboe27926b62020-10-28 09:33:23 -06001025 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -07001026 .async_size = sizeof(struct io_async_rw),
Jens Axboe3a6820f2019-12-22 15:19:35 -07001027 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001028 [IORING_OP_WRITE] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -07001029 .needs_file = 1,
Jens Axboe7b3188e2021-08-30 19:37:41 -06001030 .hash_reg_file = 1,
Jens Axboe3a6820f2019-12-22 15:19:35 -07001031 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001032 .pollout = 1,
Jens Axboe27926b62020-10-28 09:33:23 -06001033 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -07001034 .async_size = sizeof(struct io_async_rw),
Jens Axboe3a6820f2019-12-22 15:19:35 -07001035 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001036 [IORING_OP_FADVISE] = {
Jens Axboe4840e412019-12-25 22:03:45 -07001037 .needs_file = 1,
1038 },
Jens Axboe44526be2021-02-15 13:32:18 -07001039 [IORING_OP_MADVISE] = {},
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001040 [IORING_OP_SEND] = {
Jens Axboefddafac2020-01-04 20:19:44 -07001041 .needs_file = 1,
1042 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001043 .pollout = 1,
Jens Axboefddafac2020-01-04 20:19:44 -07001044 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001045 [IORING_OP_RECV] = {
Jens Axboefddafac2020-01-04 20:19:44 -07001046 .needs_file = 1,
1047 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001048 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -07001049 .buffer_select = 1,
Jens Axboefddafac2020-01-04 20:19:44 -07001050 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001051 [IORING_OP_OPENAT2] = {
Jens Axboecebdb982020-01-08 17:59:24 -07001052 },
Jens Axboe3e4827b2020-01-08 15:18:09 -07001053 [IORING_OP_EPOLL_CTL] = {
1054 .unbound_nonreg_file = 1,
Jens Axboe3e4827b2020-01-08 15:18:09 -07001055 },
Pavel Begunkov7d67af22020-02-24 11:32:45 +03001056 [IORING_OP_SPLICE] = {
1057 .needs_file = 1,
1058 .hash_reg_file = 1,
1059 .unbound_nonreg_file = 1,
Jens Axboeddf0322d2020-02-23 16:41:33 -07001060 },
1061 [IORING_OP_PROVIDE_BUFFERS] = {},
Jens Axboe067524e2020-03-02 16:32:28 -07001062 [IORING_OP_REMOVE_BUFFERS] = {},
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03001063 [IORING_OP_TEE] = {
1064 .needs_file = 1,
1065 .hash_reg_file = 1,
1066 .unbound_nonreg_file = 1,
1067 },
Jens Axboe36f4fa62020-09-05 11:14:22 -06001068 [IORING_OP_SHUTDOWN] = {
1069 .needs_file = 1,
1070 },
Jens Axboe44526be2021-02-15 13:32:18 -07001071 [IORING_OP_RENAMEAT] = {},
1072 [IORING_OP_UNLINKAT] = {},
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07001073 [IORING_OP_MKDIRAT] = {},
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07001074 [IORING_OP_SYMLINKAT] = {},
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07001075 [IORING_OP_LINKAT] = {},
Jens Axboed3656342019-12-18 09:50:26 -07001076};
1077
Pavel Begunkov0756a862021-08-15 10:40:25 +01001078/* requests with any of those set should undergo io_disarm_next() */
1079#define IO_DISARM_MASK (REQ_F_ARM_LTIMEOUT | REQ_F_LINK_TIMEOUT | REQ_F_FAIL)
1080
Pavel Begunkov7a612352021-03-09 00:37:59 +00001081static bool io_disarm_next(struct io_kiocb *req);
Pavel Begunkoveef51da2021-06-14 02:36:15 +01001082static void io_uring_del_tctx_node(unsigned long index);
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00001083static void io_uring_try_cancel_requests(struct io_ring_ctx *ctx,
1084 struct task_struct *task,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01001085 bool cancel_all);
Pavel Begunkov78cc6872021-06-14 02:36:23 +01001086static void io_uring_cancel_generic(bool cancel_all, struct io_sq_data *sqd);
Pavel Begunkov1ffc5422020-12-30 21:34:15 +00001087
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001088static void io_fill_cqe_req(struct io_kiocb *req, s32 res, u32 cflags);
1089
Jackie Liuec9c02a2019-11-08 23:50:36 +08001090static void io_put_req(struct io_kiocb *req);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01001091static void io_put_req_deferred(struct io_kiocb *req);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001092static void io_dismantle_req(struct io_kiocb *req);
Jens Axboe94ae5e72019-11-14 19:39:52 -07001093static void io_queue_linked_timeout(struct io_kiocb *req);
Pavel Begunkovfdecb662021-04-25 14:32:20 +01001094static int __io_register_rsrc_update(struct io_ring_ctx *ctx, unsigned type,
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01001095 struct io_uring_rsrc_update2 *up,
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01001096 unsigned nr_args);
Pavel Begunkov68fb8972021-03-19 17:22:41 +00001097static void io_clean_op(struct io_kiocb *req);
Pavel Begunkovac177052021-08-09 13:04:02 +01001098static struct file *io_file_get(struct io_ring_ctx *ctx,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08001099 struct io_kiocb *req, int fd, bool fixed,
1100 unsigned int issue_flags);
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00001101static void __io_queue_sqe(struct io_kiocb *req);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001102static void io_rsrc_put_work(struct work_struct *work);
Jens Axboede0617e2019-04-06 21:51:27 -06001103
Pavel Begunkov907d1df2021-01-26 23:35:10 +00001104static void io_req_task_queue(struct io_kiocb *req);
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01001105static void io_submit_flush_completions(struct io_ring_ctx *ctx);
Pavel Begunkov179ae0d2021-02-28 22:35:20 +00001106static int io_req_prep_async(struct io_kiocb *req);
Jens Axboe9a56a232019-01-09 09:06:50 -07001107
Pavel Begunkovb9445592021-08-25 12:25:45 +01001108static int io_install_fixed_file(struct io_kiocb *req, struct file *file,
1109 unsigned int issue_flags, u32 slot_index);
Pavel Begunkov7df778b2021-09-24 20:04:29 +01001110static int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags);
1111
Pavel Begunkovf1042b62021-08-28 19:54:39 -06001112static enum hrtimer_restart io_link_timeout_fn(struct hrtimer *timer);
Pavel Begunkovb9445592021-08-25 12:25:45 +01001113
Jens Axboe2b188cc2019-01-07 10:46:33 -07001114static struct kmem_cache *req_cachep;
1115
Jens Axboe09186822020-10-13 15:01:40 -06001116static const struct file_operations io_uring_fops;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001117
1118struct sock *io_uring_get_socket(struct file *file)
1119{
1120#if defined(CONFIG_UNIX)
1121 if (file->f_op == &io_uring_fops) {
1122 struct io_ring_ctx *ctx = file->private_data;
1123
1124 return ctx->ring_sock->sk;
1125 }
1126#endif
1127 return NULL;
1128}
1129EXPORT_SYMBOL(io_uring_get_socket);
1130
Pavel Begunkovf237c302021-08-18 12:42:46 +01001131static inline void io_tw_lock(struct io_ring_ctx *ctx, bool *locked)
1132{
1133 if (!*locked) {
1134 mutex_lock(&ctx->uring_lock);
1135 *locked = true;
1136 }
1137}
1138
Pavel Begunkovf2f87372020-10-27 23:25:37 +00001139#define io_for_each_link(pos, head) \
1140 for (pos = (head); pos; pos = pos->link)
1141
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001142/*
1143 * Shamelessly stolen from the mm implementation of page reference checking,
1144 * see commit f958d7b528b1 for details.
1145 */
1146#define req_ref_zero_or_close_to_overflow(req) \
1147 ((unsigned int) atomic_read(&(req->refs)) + 127u <= 127u)
1148
1149static inline bool req_ref_inc_not_zero(struct io_kiocb *req)
1150{
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001151 WARN_ON_ONCE(!(req->flags & REQ_F_REFCOUNT));
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001152 return atomic_inc_not_zero(&req->refs);
1153}
1154
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001155static inline bool req_ref_put_and_test(struct io_kiocb *req)
1156{
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001157 if (likely(!(req->flags & REQ_F_REFCOUNT)))
1158 return true;
1159
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001160 WARN_ON_ONCE(req_ref_zero_or_close_to_overflow(req));
1161 return atomic_dec_and_test(&req->refs);
1162}
1163
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001164static inline void req_ref_get(struct io_kiocb *req)
1165{
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001166 WARN_ON_ONCE(!(req->flags & REQ_F_REFCOUNT));
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001167 WARN_ON_ONCE(req_ref_zero_or_close_to_overflow(req));
1168 atomic_inc(&req->refs);
1169}
1170
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001171static inline void __io_req_set_refcount(struct io_kiocb *req, int nr)
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001172{
1173 if (!(req->flags & REQ_F_REFCOUNT)) {
1174 req->flags |= REQ_F_REFCOUNT;
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001175 atomic_set(&req->refs, nr);
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001176 }
1177}
1178
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001179static inline void io_req_set_refcount(struct io_kiocb *req)
1180{
1181 __io_req_set_refcount(req, 1);
1182}
1183
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01001184static inline void io_req_set_rsrc_node(struct io_kiocb *req)
Jens Axboec40f6372020-06-25 15:39:59 -06001185{
Pavel Begunkov36f72fe2020-11-18 19:57:26 +00001186 struct io_ring_ctx *ctx = req->ctx;
1187
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001188 if (!req->fixed_rsrc_refs) {
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01001189 req->fixed_rsrc_refs = &ctx->rsrc_node->refs;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001190 percpu_ref_get(req->fixed_rsrc_refs);
Pavel Begunkov36f72fe2020-11-18 19:57:26 +00001191 }
1192}
1193
Pavel Begunkovf70865d2021-04-11 01:46:40 +01001194static void io_refs_resurrect(struct percpu_ref *ref, struct completion *compl)
1195{
1196 bool got = percpu_ref_tryget(ref);
1197
1198 /* already at zero, wait for ->release() */
1199 if (!got)
1200 wait_for_completion(compl);
1201 percpu_ref_resurrect(ref);
1202 if (got)
1203 percpu_ref_put(ref);
1204}
1205
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01001206static bool io_match_task(struct io_kiocb *head, struct task_struct *task,
1207 bool cancel_all)
Pavel Begunkov1c939a52021-11-26 14:38:15 +00001208 __must_hold(&req->ctx->timeout_lock)
Pavel Begunkov08d23632020-11-06 13:00:22 +00001209{
1210 struct io_kiocb *req;
1211
Pavel Begunkov68207682021-03-22 01:58:25 +00001212 if (task && head->task != task)
Pavel Begunkov08d23632020-11-06 13:00:22 +00001213 return false;
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01001214 if (cancel_all)
Pavel Begunkov08d23632020-11-06 13:00:22 +00001215 return true;
1216
1217 io_for_each_link(req, head) {
Pavel Begunkovb05a1bc2021-03-04 13:59:24 +00001218 if (req->flags & REQ_F_INFLIGHT)
Jens Axboe02a13672021-01-23 15:49:31 -07001219 return true;
Pavel Begunkov08d23632020-11-06 13:00:22 +00001220 }
1221 return false;
1222}
1223
Pavel Begunkov1c939a52021-11-26 14:38:15 +00001224static bool io_match_linked(struct io_kiocb *head)
1225{
1226 struct io_kiocb *req;
1227
1228 io_for_each_link(req, head) {
1229 if (req->flags & REQ_F_INFLIGHT)
1230 return true;
1231 }
1232 return false;
1233}
1234
1235/*
1236 * As io_match_task() but protected against racing with linked timeouts.
1237 * User must not hold timeout_lock.
1238 */
1239static bool io_match_task_safe(struct io_kiocb *head, struct task_struct *task,
1240 bool cancel_all)
1241{
1242 bool matched;
1243
1244 if (task && head->task != task)
1245 return false;
1246 if (cancel_all)
1247 return true;
1248
1249 if (head->flags & REQ_F_LINK_TIMEOUT) {
1250 struct io_ring_ctx *ctx = head->ctx;
1251
1252 /* protect against races with linked timeouts */
1253 spin_lock_irq(&ctx->timeout_lock);
1254 matched = io_match_linked(head);
1255 spin_unlock_irq(&ctx->timeout_lock);
1256 } else {
1257 matched = io_match_linked(head);
1258 }
1259 return matched;
1260}
1261
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01001262static inline void req_set_fail(struct io_kiocb *req)
Jens Axboec40f6372020-06-25 15:39:59 -06001263{
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01001264 req->flags |= REQ_F_FAIL;
Jens Axboec40f6372020-06-25 15:39:59 -06001265}
Jens Axboe4a38aed22020-05-14 17:21:15 -06001266
Hao Xua8295b92021-08-27 17:46:09 +08001267static inline void req_fail_link_node(struct io_kiocb *req, int res)
1268{
1269 req_set_fail(req);
1270 req->result = res;
1271}
1272
Jens Axboe2b188cc2019-01-07 10:46:33 -07001273static void io_ring_ctx_ref_free(struct percpu_ref *ref)
1274{
1275 struct io_ring_ctx *ctx = container_of(ref, struct io_ring_ctx, refs);
1276
Jens Axboe0f158b42020-05-14 17:18:39 -06001277 complete(&ctx->ref_comp);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001278}
1279
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001280static inline bool io_is_timeout_noseq(struct io_kiocb *req)
1281{
1282 return !req->timeout.off;
1283}
1284
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001285static void io_fallback_req_func(struct work_struct *work)
1286{
1287 struct io_ring_ctx *ctx = container_of(work, struct io_ring_ctx,
1288 fallback_work.work);
1289 struct llist_node *node = llist_del_all(&ctx->fallback_llist);
1290 struct io_kiocb *req, *tmp;
Pavel Begunkovf237c302021-08-18 12:42:46 +01001291 bool locked = false;
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001292
1293 percpu_ref_get(&ctx->refs);
1294 llist_for_each_entry_safe(req, tmp, node, io_task_work.fallback_node)
Pavel Begunkovf237c302021-08-18 12:42:46 +01001295 req->io_task_work.func(req, &locked);
Pavel Begunkov5636c002021-08-18 12:42:45 +01001296
Pavel Begunkovf237c302021-08-18 12:42:46 +01001297 if (locked) {
1298 if (ctx->submit_state.compl_nr)
1299 io_submit_flush_completions(ctx);
1300 mutex_unlock(&ctx->uring_lock);
1301 }
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001302 percpu_ref_put(&ctx->refs);
Pavel Begunkovf237c302021-08-18 12:42:46 +01001303
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001304}
1305
Jens Axboe2b188cc2019-01-07 10:46:33 -07001306static struct io_ring_ctx *io_ring_ctx_alloc(struct io_uring_params *p)
1307{
1308 struct io_ring_ctx *ctx;
Jens Axboe78076bb2019-12-04 19:56:40 -07001309 int hash_bits;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001310
1311 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
1312 if (!ctx)
1313 return NULL;
1314
Jens Axboe78076bb2019-12-04 19:56:40 -07001315 /*
1316 * Use 5 bits less than the max cq entries, that should give us around
1317 * 32 entries per hash list if totally full and uniformly spread.
1318 */
1319 hash_bits = ilog2(p->cq_entries);
1320 hash_bits -= 5;
1321 if (hash_bits <= 0)
1322 hash_bits = 1;
1323 ctx->cancel_hash_bits = hash_bits;
1324 ctx->cancel_hash = kmalloc((1U << hash_bits) * sizeof(struct hlist_head),
1325 GFP_KERNEL);
1326 if (!ctx->cancel_hash)
1327 goto err;
1328 __hash_init(ctx->cancel_hash, 1U << hash_bits);
1329
Pavel Begunkov62248432021-04-28 13:11:29 +01001330 ctx->dummy_ubuf = kzalloc(sizeof(*ctx->dummy_ubuf), GFP_KERNEL);
1331 if (!ctx->dummy_ubuf)
1332 goto err;
1333 /* set invalid range, so io_import_fixed() fails meeting it */
1334 ctx->dummy_ubuf->ubuf = -1UL;
1335
Roman Gushchin21482892019-05-07 10:01:48 -07001336 if (percpu_ref_init(&ctx->refs, io_ring_ctx_ref_free,
Jens Axboe206aefd2019-11-07 18:27:42 -07001337 PERCPU_REF_ALLOW_REINIT, GFP_KERNEL))
1338 goto err;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001339
1340 ctx->flags = p->flags;
Jens Axboe90554202020-09-03 12:12:41 -06001341 init_waitqueue_head(&ctx->sqo_sq_wait);
Jens Axboe69fb2132020-09-14 11:16:23 -06001342 INIT_LIST_HEAD(&ctx->sqd_list);
Pavel Begunkov311997b2021-06-14 23:37:28 +01001343 init_waitqueue_head(&ctx->poll_wait);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001344 INIT_LIST_HEAD(&ctx->cq_overflow_list);
Jens Axboe0f158b42020-05-14 17:18:39 -06001345 init_completion(&ctx->ref_comp);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07001346 xa_init_flags(&ctx->io_buffers, XA_FLAGS_ALLOC1);
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00001347 xa_init_flags(&ctx->personalities, XA_FLAGS_ALLOC1);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001348 mutex_init(&ctx->uring_lock);
Pavel Begunkov311997b2021-06-14 23:37:28 +01001349 init_waitqueue_head(&ctx->cq_wait);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001350 spin_lock_init(&ctx->completion_lock);
Jens Axboe89850fc2021-08-10 15:11:51 -06001351 spin_lock_init(&ctx->timeout_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03001352 INIT_LIST_HEAD(&ctx->iopoll_list);
Jens Axboede0617e2019-04-06 21:51:27 -06001353 INIT_LIST_HEAD(&ctx->defer_list);
Jens Axboe5262f562019-09-17 12:26:57 -06001354 INIT_LIST_HEAD(&ctx->timeout_list);
Pavel Begunkovef9dd632021-08-28 19:54:38 -06001355 INIT_LIST_HEAD(&ctx->ltimeout_list);
Bijan Mottahedehd67d2262021-01-15 17:37:46 +00001356 spin_lock_init(&ctx->rsrc_ref_lock);
1357 INIT_LIST_HEAD(&ctx->rsrc_ref_list);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001358 INIT_DELAYED_WORK(&ctx->rsrc_put_work, io_rsrc_put_work);
1359 init_llist_head(&ctx->rsrc_put_llist);
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00001360 INIT_LIST_HEAD(&ctx->tctx_list);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001361 INIT_LIST_HEAD(&ctx->submit_state.free_list);
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001362 INIT_LIST_HEAD(&ctx->locked_free_list);
Pavel Begunkov9011bf92021-06-30 21:54:03 +01001363 INIT_DELAYED_WORK(&ctx->fallback_work, io_fallback_req_func);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001364 return ctx;
Jens Axboe206aefd2019-11-07 18:27:42 -07001365err:
Pavel Begunkov62248432021-04-28 13:11:29 +01001366 kfree(ctx->dummy_ubuf);
Jens Axboe78076bb2019-12-04 19:56:40 -07001367 kfree(ctx->cancel_hash);
Jens Axboe206aefd2019-11-07 18:27:42 -07001368 kfree(ctx);
1369 return NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001370}
1371
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001372static void io_account_cq_overflow(struct io_ring_ctx *ctx)
1373{
1374 struct io_rings *r = ctx->rings;
1375
1376 WRITE_ONCE(r->cq_overflow, READ_ONCE(r->cq_overflow) + 1);
1377 ctx->cq_extra--;
1378}
1379
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001380static bool req_need_defer(struct io_kiocb *req, u32 seq)
Jens Axboede0617e2019-04-06 21:51:27 -06001381{
Jens Axboe2bc99302020-07-09 09:43:27 -06001382 if (unlikely(req->flags & REQ_F_IO_DRAIN)) {
1383 struct io_ring_ctx *ctx = req->ctx;
Jackie Liua197f662019-11-08 08:09:12 -07001384
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001385 return seq + READ_ONCE(ctx->cq_extra) != ctx->cached_cq_tail;
Jens Axboe2bc99302020-07-09 09:43:27 -06001386 }
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001387
Bob Liu9d858b22019-11-13 18:06:25 +08001388 return false;
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001389}
1390
Pavel Begunkovc97d8a02021-08-09 13:04:04 +01001391#define FFS_ASYNC_READ 0x1UL
1392#define FFS_ASYNC_WRITE 0x2UL
1393#ifdef CONFIG_64BIT
1394#define FFS_ISREG 0x4UL
1395#else
1396#define FFS_ISREG 0x0UL
1397#endif
1398#define FFS_MASK ~(FFS_ASYNC_READ|FFS_ASYNC_WRITE|FFS_ISREG)
1399
1400static inline bool io_req_ffs_set(struct io_kiocb *req)
1401{
1402 return IS_ENABLED(CONFIG_64BIT) && (req->flags & REQ_F_FIXED_FILE);
1403}
1404
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001405static void io_req_track_inflight(struct io_kiocb *req)
1406{
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001407 if (!(req->flags & REQ_F_INFLIGHT)) {
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001408 req->flags |= REQ_F_INFLIGHT;
Jens Axboe3746d622022-06-23 11:06:43 -06001409 atomic_inc(&req->task->io_uring->inflight_tracked);
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001410 }
1411}
1412
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001413static struct io_kiocb *__io_prep_linked_timeout(struct io_kiocb *req)
1414{
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01001415 if (WARN_ON_ONCE(!req->link))
1416 return NULL;
1417
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01001418 req->flags &= ~REQ_F_ARM_LTIMEOUT;
1419 req->flags |= REQ_F_LINK_TIMEOUT;
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001420
1421 /* linked timeouts should have two refs once prep'ed */
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001422 io_req_set_refcount(req);
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01001423 __io_req_set_refcount(req->link, 2);
1424 return req->link;
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001425}
1426
1427static inline struct io_kiocb *io_prep_linked_timeout(struct io_kiocb *req)
1428{
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01001429 if (likely(!(req->flags & REQ_F_ARM_LTIMEOUT)))
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001430 return NULL;
1431 return __io_prep_linked_timeout(req);
1432}
1433
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001434static void io_prep_async_work(struct io_kiocb *req)
Jens Axboe561fb042019-10-24 07:25:42 -06001435{
Jens Axboed3656342019-12-18 09:50:26 -07001436 const struct io_op_def *def = &io_op_defs[req->opcode];
Pavel Begunkov23329512020-10-10 18:34:06 +01001437 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe54a91f32019-09-10 09:15:04 -06001438
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01001439 if (!(req->flags & REQ_F_CREDS)) {
1440 req->flags |= REQ_F_CREDS;
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01001441 req->creds = get_current_cred();
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01001442 }
Jens Axboe003e8dc2021-03-06 09:22:27 -07001443
Pavel Begunkove1d675d2021-03-22 01:58:29 +00001444 req->work.list.next = NULL;
1445 req->work.flags = 0;
Pavel Begunkovfeaadc42020-10-22 16:47:16 +01001446 if (req->flags & REQ_F_FORCE_ASYNC)
1447 req->work.flags |= IO_WQ_WORK_CONCURRENT;
1448
Jens Axboed3656342019-12-18 09:50:26 -07001449 if (req->flags & REQ_F_ISREG) {
Pavel Begunkov23329512020-10-10 18:34:06 +01001450 if (def->hash_reg_file || (ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov8766dd52020-03-14 00:31:04 +03001451 io_wq_hash_work(&req->work, file_inode(req->file));
Jens Axboe4b982bd2021-04-01 08:38:34 -06001452 } else if (!req->file || !S_ISBLK(file_inode(req->file)->i_mode)) {
Jens Axboed3656342019-12-18 09:50:26 -07001453 if (def->unbound_nonreg_file)
Jens Axboe3529d8c2019-12-19 18:24:38 -07001454 req->work.flags |= IO_WQ_WORK_UNBOUND;
Jens Axboe54a91f32019-09-10 09:15:04 -06001455 }
Jens Axboe561fb042019-10-24 07:25:42 -06001456}
1457
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001458static void io_prep_async_link(struct io_kiocb *req)
1459{
1460 struct io_kiocb *cur;
1461
Pavel Begunkov44eff402021-07-26 14:14:31 +01001462 if (req->flags & REQ_F_LINK_TIMEOUT) {
1463 struct io_ring_ctx *ctx = req->ctx;
1464
Pavel Begunkov09eb40f2021-11-23 01:45:35 +00001465 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov44eff402021-07-26 14:14:31 +01001466 io_for_each_link(cur, req)
1467 io_prep_async_work(cur);
Pavel Begunkov09eb40f2021-11-23 01:45:35 +00001468 spin_unlock_irq(&ctx->timeout_lock);
Pavel Begunkov44eff402021-07-26 14:14:31 +01001469 } else {
1470 io_for_each_link(cur, req)
1471 io_prep_async_work(cur);
1472 }
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001473}
1474
Pavel Begunkovf237c302021-08-18 12:42:46 +01001475static void io_queue_async_work(struct io_kiocb *req, bool *locked)
Jens Axboe561fb042019-10-24 07:25:42 -06001476{
Jackie Liua197f662019-11-08 08:09:12 -07001477 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001478 struct io_kiocb *link = io_prep_linked_timeout(req);
Jens Axboe5aa75ed2021-02-16 12:56:50 -07001479 struct io_uring_task *tctx = req->task->io_uring;
Jens Axboe561fb042019-10-24 07:25:42 -06001480
Pavel Begunkovf237c302021-08-18 12:42:46 +01001481 /* must not take the lock, NULL it as a precaution */
1482 locked = NULL;
1483
Jens Axboe3bfe6102021-02-16 14:15:30 -07001484 BUG_ON(!tctx);
1485 BUG_ON(!tctx->io_wq);
Jens Axboe561fb042019-10-24 07:25:42 -06001486
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001487 /* init ->work of the whole link before punting */
1488 io_prep_async_link(req);
Jens Axboe991468d2021-07-23 11:53:54 -06001489
1490 /*
1491 * Not expected to happen, but if we do have a bug where this _can_
1492 * happen, catch it here and ensure the request is marked as
1493 * canceled. That will make io-wq go through the usual work cancel
1494 * procedure rather than attempt to run this request (or create a new
1495 * worker for it).
1496 */
1497 if (WARN_ON_ONCE(!same_thread_group(req->task, current)))
1498 req->work.flags |= IO_WQ_WORK_CANCEL;
1499
Pavel Begunkovd07f1e8a2021-03-22 01:45:58 +00001500 trace_io_uring_queue_async_work(ctx, io_wq_is_hashed(&req->work), req,
1501 &req->work, req->flags);
Pavel Begunkovebf93662021-03-01 18:20:47 +00001502 io_wq_enqueue(tctx->io_wq, &req->work);
Jens Axboe7271ef32020-08-10 09:55:22 -06001503 if (link)
1504 io_queue_linked_timeout(link);
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001505}
1506
Pavel Begunkov1ee41602021-03-25 18:32:42 +00001507static void io_kill_timeout(struct io_kiocb *req, int status)
Pavel Begunkov8c855882021-04-13 02:58:41 +01001508 __must_hold(&req->ctx->completion_lock)
Jens Axboe89850fc2021-08-10 15:11:51 -06001509 __must_hold(&req->ctx->timeout_lock)
Jens Axboe5262f562019-09-17 12:26:57 -06001510{
Jens Axboee8c2bc12020-08-15 18:44:09 -07001511 struct io_timeout_data *io = req->async_data;
Jens Axboe5262f562019-09-17 12:26:57 -06001512
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01001513 if (hrtimer_try_to_cancel(&io->timer) != -1) {
Pavel Begunkov2ae2eb92021-09-09 13:56:27 +01001514 if (status)
1515 req_set_fail(req);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03001516 atomic_set(&req->ctx->cq_timeouts,
1517 atomic_read(&req->ctx->cq_timeouts) + 1);
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001518 list_del_init(&req->timeout.list);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001519 io_fill_cqe_req(req, status, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01001520 io_put_req_deferred(req);
Jens Axboe5262f562019-09-17 12:26:57 -06001521 }
1522}
1523
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001524static void io_queue_deferred(struct io_ring_ctx *ctx)
Pavel Begunkov04518942020-05-26 20:34:05 +03001525{
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001526 while (!list_empty(&ctx->defer_list)) {
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001527 struct io_defer_entry *de = list_first_entry(&ctx->defer_list,
1528 struct io_defer_entry, list);
Pavel Begunkov04518942020-05-26 20:34:05 +03001529
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001530 if (req_need_defer(de->req, de->seq))
Pavel Begunkov04518942020-05-26 20:34:05 +03001531 break;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001532 list_del_init(&de->list);
Pavel Begunkov907d1df2021-01-26 23:35:10 +00001533 io_req_task_queue(de->req);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001534 kfree(de);
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001535 }
Pavel Begunkov04518942020-05-26 20:34:05 +03001536}
1537
Pavel Begunkov360428f2020-05-30 14:54:17 +03001538static void io_flush_timeouts(struct io_ring_ctx *ctx)
Jens Axboe89850fc2021-08-10 15:11:51 -06001539 __must_hold(&ctx->completion_lock)
Pavel Begunkov360428f2020-05-30 14:54:17 +03001540{
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001541 u32 seq = ctx->cached_cq_tail - atomic_read(&ctx->cq_timeouts);
Jens Axboeba7261a2022-04-08 11:08:58 -06001542 struct io_kiocb *req, *tmp;
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001543
Jens Axboe79ebeae2021-08-10 15:18:27 -06001544 spin_lock_irq(&ctx->timeout_lock);
Jens Axboeba7261a2022-04-08 11:08:58 -06001545 list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001546 u32 events_needed, events_got;
Pavel Begunkov360428f2020-05-30 14:54:17 +03001547
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001548 if (io_is_timeout_noseq(req))
Pavel Begunkov360428f2020-05-30 14:54:17 +03001549 break;
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001550
1551 /*
1552 * Since seq can easily wrap around over time, subtract
1553 * the last seq at which timeouts were flushed before comparing.
1554 * Assuming not more than 2^31-1 events have happened since,
1555 * these subtractions won't have wrapped, so we can check if
1556 * target is in [last_seq, current_seq] by comparing the two.
1557 */
1558 events_needed = req->timeout.target_seq - ctx->cq_last_tm_flush;
1559 events_got = seq - ctx->cq_last_tm_flush;
1560 if (events_got < events_needed)
Pavel Begunkov360428f2020-05-30 14:54:17 +03001561 break;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03001562
Pavel Begunkov1ee41602021-03-25 18:32:42 +00001563 io_kill_timeout(req, 0);
Pavel Begunkovf18ee4c2021-06-14 23:37:25 +01001564 }
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001565 ctx->cq_last_tm_flush = seq;
Jens Axboe79ebeae2021-08-10 15:18:27 -06001566 spin_unlock_irq(&ctx->timeout_lock);
Pavel Begunkov360428f2020-05-30 14:54:17 +03001567}
1568
Pavel Begunkov2335f6f2021-06-15 16:47:58 +01001569static void __io_commit_cqring_flush(struct io_ring_ctx *ctx)
Jens Axboede0617e2019-04-06 21:51:27 -06001570{
Pavel Begunkov2335f6f2021-06-15 16:47:58 +01001571 if (ctx->off_timeout_used)
1572 io_flush_timeouts(ctx);
1573 if (ctx->drain_active)
1574 io_queue_deferred(ctx);
1575}
1576
1577static inline void io_commit_cqring(struct io_ring_ctx *ctx)
1578{
1579 if (unlikely(ctx->off_timeout_used || ctx->drain_active))
1580 __io_commit_cqring_flush(ctx);
Pavel Begunkovec30e042021-01-19 13:32:38 +00001581 /* order cqe stores with ring update */
1582 smp_store_release(&ctx->rings->cq.tail, ctx->cached_cq_tail);
Jens Axboede0617e2019-04-06 21:51:27 -06001583}
1584
Jens Axboe90554202020-09-03 12:12:41 -06001585static inline bool io_sqring_full(struct io_ring_ctx *ctx)
1586{
1587 struct io_rings *r = ctx->rings;
1588
Pavel Begunkova566c552021-05-16 22:58:08 +01001589 return READ_ONCE(r->sq.tail) - ctx->cached_sq_head == ctx->sq_entries;
Jens Axboe90554202020-09-03 12:12:41 -06001590}
1591
Pavel Begunkov888aae22021-01-19 13:32:39 +00001592static inline unsigned int __io_cqring_events(struct io_ring_ctx *ctx)
1593{
1594 return ctx->cached_cq_tail - READ_ONCE(ctx->rings->cq.head);
1595}
1596
Pavel Begunkovd068b502021-05-16 22:58:11 +01001597static inline struct io_uring_cqe *io_get_cqe(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001598{
Hristo Venev75b28af2019-08-26 17:23:46 +00001599 struct io_rings *rings = ctx->rings;
Pavel Begunkovea5ab3b2021-05-16 22:58:09 +01001600 unsigned tail, mask = ctx->cq_entries - 1;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001601
Stefan Bühler115e12e2019-04-24 23:54:18 +02001602 /*
1603 * writes to the cq entry need to come after reading head; the
1604 * control dependency is enough as we're using WRITE_ONCE to
1605 * fill the cq entry
1606 */
Pavel Begunkova566c552021-05-16 22:58:08 +01001607 if (__io_cqring_events(ctx) == ctx->cq_entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001608 return NULL;
1609
Pavel Begunkov888aae22021-01-19 13:32:39 +00001610 tail = ctx->cached_cq_tail++;
Pavel Begunkovea5ab3b2021-05-16 22:58:09 +01001611 return &rings->cqes[tail & mask];
Jens Axboe2b188cc2019-01-07 10:46:33 -07001612}
1613
Jens Axboef2842ab2020-01-08 11:04:00 -07001614static inline bool io_should_trigger_evfd(struct io_ring_ctx *ctx)
1615{
Pavel Begunkov44c769d2021-04-11 01:46:31 +01001616 if (likely(!ctx->cq_ev_fd))
Jens Axboef0b493e2020-02-01 21:30:11 -07001617 return false;
Stefano Garzarella7e55a192020-05-15 18:38:05 +02001618 if (READ_ONCE(ctx->rings->cq_flags) & IORING_CQ_EVENTFD_DISABLED)
1619 return false;
Pavel Begunkov44c769d2021-04-11 01:46:31 +01001620 return !ctx->eventfd_async || io_wq_current_is_worker();
Jens Axboef2842ab2020-01-08 11:04:00 -07001621}
1622
Jens Axboe2c5d7632021-08-21 07:21:19 -06001623/*
1624 * This should only get called when at least one event has been posted.
1625 * Some applications rely on the eventfd notification count only changing
1626 * IFF a new CQE has been added to the CQ ring. There's no depedency on
1627 * 1:1 relationship between how many times this function is called (and
1628 * hence the eventfd count) and number of CQEs posted to the CQ ring.
1629 */
Jens Axboeb41e9852020-02-17 09:52:41 -07001630static void io_cqring_ev_posted(struct io_ring_ctx *ctx)
Jens Axboe8c838782019-03-12 15:48:16 -06001631{
Jens Axboe5fd46172021-08-06 14:04:31 -06001632 /*
1633 * wake_up_all() may seem excessive, but io_wake_function() and
1634 * io_should_wake() handle the termination of the loop and only
1635 * wake as many waiters as we need to.
1636 */
1637 if (wq_has_sleeper(&ctx->cq_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001638 __wake_up(&ctx->cq_wait, TASK_NORMAL, 0,
1639 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Jens Axboe534ca6d2020-09-02 13:52:19 -06001640 if (ctx->sq_data && waitqueue_active(&ctx->sq_data->wait))
1641 wake_up(&ctx->sq_data->wait);
Jens Axboeb41e9852020-02-17 09:52:41 -07001642 if (io_should_trigger_evfd(ctx))
Jens Axboeccf06b52022-12-23 07:04:49 -07001643 eventfd_signal_mask(ctx->cq_ev_fd, 1, EPOLL_URING_WAKE);
Pavel Begunkov3f008382021-10-01 10:39:33 +01001644 if (waitqueue_active(&ctx->poll_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001645 __wake_up(&ctx->poll_wait, TASK_INTERRUPTIBLE, 0,
1646 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Jens Axboe8c838782019-03-12 15:48:16 -06001647}
1648
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001649static void io_cqring_ev_posted_iopoll(struct io_ring_ctx *ctx)
1650{
Pavel Begunkovc57a91fb2021-09-08 20:49:17 +01001651 /* see waitqueue_active() comment */
1652 smp_mb();
1653
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001654 if (ctx->flags & IORING_SETUP_SQPOLL) {
Pavel Begunkovc57a91fb2021-09-08 20:49:17 +01001655 if (waitqueue_active(&ctx->cq_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001656 __wake_up(&ctx->cq_wait, TASK_NORMAL, 0,
1657 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001658 }
1659 if (io_should_trigger_evfd(ctx))
Jens Axboeccf06b52022-12-23 07:04:49 -07001660 eventfd_signal_mask(ctx->cq_ev_fd, 1, EPOLL_URING_WAKE);
Pavel Begunkov3f008382021-10-01 10:39:33 +01001661 if (waitqueue_active(&ctx->poll_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001662 __wake_up(&ctx->poll_wait, TASK_INTERRUPTIBLE, 0,
1663 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001664}
1665
Jens Axboec4a2ed72019-11-21 21:01:26 -07001666/* Returns true if there are no backlogged entries after the flush */
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001667static bool __io_cqring_overflow_flush(struct io_ring_ctx *ctx, bool force)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001668{
Jens Axboeb18032b2021-01-24 16:58:56 -07001669 bool all_flushed, posted;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001670
Pavel Begunkova566c552021-05-16 22:58:08 +01001671 if (!force && __io_cqring_events(ctx) == ctx->cq_entries)
Pavel Begunkove23de152020-12-17 00:24:37 +00001672 return false;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001673
Jens Axboeb18032b2021-01-24 16:58:56 -07001674 posted = false;
Jens Axboe79ebeae2021-08-10 15:18:27 -06001675 spin_lock(&ctx->completion_lock);
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001676 while (!list_empty(&ctx->cq_overflow_list)) {
Pavel Begunkovd068b502021-05-16 22:58:11 +01001677 struct io_uring_cqe *cqe = io_get_cqe(ctx);
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001678 struct io_overflow_cqe *ocqe;
Jens Axboee6c8aa92020-09-28 13:10:13 -06001679
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001680 if (!cqe && !force)
1681 break;
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001682 ocqe = list_first_entry(&ctx->cq_overflow_list,
1683 struct io_overflow_cqe, list);
1684 if (cqe)
1685 memcpy(cqe, &ocqe->cqe, sizeof(*cqe));
1686 else
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001687 io_account_cq_overflow(ctx);
1688
Jens Axboeb18032b2021-01-24 16:58:56 -07001689 posted = true;
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001690 list_del(&ocqe->list);
1691 kfree(ocqe);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001692 }
1693
Pavel Begunkov09e88402020-12-17 00:24:38 +00001694 all_flushed = list_empty(&ctx->cq_overflow_list);
1695 if (all_flushed) {
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01001696 clear_bit(0, &ctx->check_cq_overflow);
Nadav Amit20c0b382021-08-07 17:13:42 -07001697 WRITE_ONCE(ctx->rings->sq_flags,
1698 ctx->rings->sq_flags & ~IORING_SQ_CQ_OVERFLOW);
Pavel Begunkov09e88402020-12-17 00:24:38 +00001699 }
Pavel Begunkov46930142020-07-30 18:43:49 +03001700
Jens Axboeb18032b2021-01-24 16:58:56 -07001701 if (posted)
1702 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06001703 spin_unlock(&ctx->completion_lock);
Jens Axboeb18032b2021-01-24 16:58:56 -07001704 if (posted)
1705 io_cqring_ev_posted(ctx);
Pavel Begunkov09e88402020-12-17 00:24:38 +00001706 return all_flushed;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001707}
1708
Pavel Begunkov90f67362021-08-09 20:18:12 +01001709static bool io_cqring_overflow_flush(struct io_ring_ctx *ctx)
Pavel Begunkov6c503152021-01-04 20:36:36 +00001710{
Jens Axboeca0a2652021-03-04 17:15:48 -07001711 bool ret = true;
1712
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01001713 if (test_bit(0, &ctx->check_cq_overflow)) {
Pavel Begunkov6c503152021-01-04 20:36:36 +00001714 /* iopoll syncs against uring_lock, not completion_lock */
1715 if (ctx->flags & IORING_SETUP_IOPOLL)
1716 mutex_lock(&ctx->uring_lock);
Pavel Begunkov90f67362021-08-09 20:18:12 +01001717 ret = __io_cqring_overflow_flush(ctx, false);
Pavel Begunkov6c503152021-01-04 20:36:36 +00001718 if (ctx->flags & IORING_SETUP_IOPOLL)
1719 mutex_unlock(&ctx->uring_lock);
1720 }
Jens Axboeca0a2652021-03-04 17:15:48 -07001721
1722 return ret;
Pavel Begunkov6c503152021-01-04 20:36:36 +00001723}
1724
Pavel Begunkov6a290a12021-08-09 13:04:13 +01001725/* must to be called somewhat shortly after putting a request */
1726static inline void io_put_task(struct task_struct *task, int nr)
1727{
1728 struct io_uring_task *tctx = task->io_uring;
1729
Pavel Begunkove98e49b2021-08-18 17:01:43 +01001730 if (likely(task == current)) {
1731 tctx->cached_refs += nr;
1732 } else {
1733 percpu_counter_sub(&tctx->inflight, nr);
1734 if (unlikely(atomic_read(&tctx->in_idle)))
1735 wake_up(&tctx->wait);
1736 put_task_struct_many(task, nr);
1737 }
Pavel Begunkov6a290a12021-08-09 13:04:13 +01001738}
1739
Pavel Begunkov9a108672021-08-27 11:55:01 +01001740static void io_task_refs_refill(struct io_uring_task *tctx)
1741{
1742 unsigned int refill = -tctx->cached_refs + IO_TCTX_REFS_CACHE_NR;
1743
1744 percpu_counter_add(&tctx->inflight, refill);
1745 refcount_add(refill, &current->usage);
1746 tctx->cached_refs += refill;
1747}
1748
1749static inline void io_get_task_refs(int nr)
1750{
1751 struct io_uring_task *tctx = current->io_uring;
1752
1753 tctx->cached_refs -= nr;
1754 if (unlikely(tctx->cached_refs < 0))
1755 io_task_refs_refill(tctx);
1756}
1757
Pavel Begunkovb168b1a2022-01-09 00:53:22 +00001758static __cold void io_uring_drop_tctx_refs(struct task_struct *task)
1759{
1760 struct io_uring_task *tctx = task->io_uring;
1761 unsigned int refs = tctx->cached_refs;
1762
1763 if (refs) {
1764 tctx->cached_refs = 0;
1765 percpu_counter_sub(&tctx->inflight, refs);
1766 put_task_struct_many(task, refs);
1767 }
1768}
1769
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001770static bool io_cqring_event_overflow(struct io_ring_ctx *ctx, u64 user_data,
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001771 s32 res, u32 cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001772{
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001773 struct io_overflow_cqe *ocqe;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001774
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001775 ocqe = kmalloc(sizeof(*ocqe), GFP_ATOMIC | __GFP_ACCOUNT);
1776 if (!ocqe) {
1777 /*
1778 * If we're in ring overflow flush mode, or in task cancel mode,
1779 * or cannot allocate an overflow entry, then we need to drop it
1780 * on the floor.
1781 */
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001782 io_account_cq_overflow(ctx);
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001783 return false;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001784 }
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001785 if (list_empty(&ctx->cq_overflow_list)) {
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01001786 set_bit(0, &ctx->check_cq_overflow);
Nadav Amit20c0b382021-08-07 17:13:42 -07001787 WRITE_ONCE(ctx->rings->sq_flags,
1788 ctx->rings->sq_flags | IORING_SQ_CQ_OVERFLOW);
1789
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001790 }
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001791 ocqe->cqe.user_data = user_data;
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001792 ocqe->cqe.res = res;
1793 ocqe->cqe.flags = cflags;
1794 list_add_tail(&ocqe->list, &ctx->cq_overflow_list);
1795 return true;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001796}
1797
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001798static inline bool __io_fill_cqe(struct io_ring_ctx *ctx, u64 user_data,
1799 s32 res, u32 cflags)
Pavel Begunkov8d133262021-04-11 01:46:33 +01001800{
Jens Axboe2b188cc2019-01-07 10:46:33 -07001801 struct io_uring_cqe *cqe;
1802
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001803 trace_io_uring_complete(ctx, user_data, res, cflags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001804
1805 /*
1806 * If we can't get a cq entry, userspace overflowed the
1807 * submission (by quite a lot). Increment the overflow count in
1808 * the ring.
1809 */
Pavel Begunkovd068b502021-05-16 22:58:11 +01001810 cqe = io_get_cqe(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001811 if (likely(cqe)) {
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001812 WRITE_ONCE(cqe->user_data, user_data);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001813 WRITE_ONCE(cqe->res, res);
1814 WRITE_ONCE(cqe->flags, cflags);
Pavel Begunkov8d133262021-04-11 01:46:33 +01001815 return true;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001816 }
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001817 return io_cqring_event_overflow(ctx, user_data, res, cflags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001818}
1819
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001820static noinline void io_fill_cqe_req(struct io_kiocb *req, s32 res, u32 cflags)
Jens Axboebcda7ba2020-02-23 16:42:51 -07001821{
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001822 __io_fill_cqe(req->ctx, req->user_data, res, cflags);
1823}
1824
1825static noinline bool io_fill_cqe_aux(struct io_ring_ctx *ctx, u64 user_data,
1826 s32 res, u32 cflags)
1827{
1828 ctx->cq_extra++;
1829 return __io_fill_cqe(ctx, user_data, res, cflags);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001830}
1831
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001832static void io_req_complete_post(struct io_kiocb *req, s32 res,
1833 u32 cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001834{
Jens Axboe78e19bb2019-11-06 15:21:34 -07001835 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001836
Jens Axboe79ebeae2021-08-10 15:18:27 -06001837 spin_lock(&ctx->completion_lock);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001838 __io_fill_cqe(ctx, req->user_data, res, cflags);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001839 /*
1840 * If we're the last reference to this request, add to our locked
1841 * free_list cache.
1842 */
Jens Axboede9b4cc2021-02-24 13:28:27 -07001843 if (req_ref_put_and_test(req)) {
Pavel Begunkov7a612352021-03-09 00:37:59 +00001844 if (req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) {
Pavel Begunkov0756a862021-08-15 10:40:25 +01001845 if (req->flags & IO_DISARM_MASK)
Pavel Begunkov7a612352021-03-09 00:37:59 +00001846 io_disarm_next(req);
1847 if (req->link) {
1848 io_req_task_queue(req->link);
1849 req->link = NULL;
1850 }
1851 }
Jens Axboec7dae4b2021-02-09 19:53:37 -07001852 io_dismantle_req(req);
1853 io_put_task(req->task, 1);
Pavel Begunkovbb943b82021-08-09 20:18:10 +01001854 list_add(&req->inflight_entry, &ctx->locked_free_list);
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001855 ctx->locked_free_nr++;
Pavel Begunkov180f8292021-03-14 20:57:09 +00001856 } else {
1857 if (!percpu_ref_tryget(&ctx->refs))
1858 req = NULL;
1859 }
Pavel Begunkov7a612352021-03-09 00:37:59 +00001860 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06001861 spin_unlock(&ctx->completion_lock);
Pavel Begunkov7a612352021-03-09 00:37:59 +00001862
Pavel Begunkov180f8292021-03-14 20:57:09 +00001863 if (req) {
1864 io_cqring_ev_posted(ctx);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001865 percpu_ref_put(&ctx->refs);
Pavel Begunkov180f8292021-03-14 20:57:09 +00001866 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07001867}
1868
Jens Axboe4e3d9ff2021-04-15 17:44:34 -06001869static inline bool io_req_needs_clean(struct io_kiocb *req)
1870{
Pavel Begunkovc8543572021-06-17 18:14:04 +01001871 return req->flags & IO_REQ_CLEAN_FLAGS;
Jens Axboe4e3d9ff2021-04-15 17:44:34 -06001872}
1873
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001874static inline void io_req_complete_state(struct io_kiocb *req, s32 res,
1875 u32 cflags)
Jens Axboebcda7ba2020-02-23 16:42:51 -07001876{
Jens Axboe4e3d9ff2021-04-15 17:44:34 -06001877 if (io_req_needs_clean(req))
Pavel Begunkov68fb8972021-03-19 17:22:41 +00001878 io_clean_op(req);
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001879 req->result = res;
1880 req->compl.cflags = cflags;
Pavel Begunkove342c802021-01-19 13:32:47 +00001881 req->flags |= REQ_F_COMPLETE_INLINE;
Jens Axboee1e16092020-06-22 09:17:17 -06001882}
Jens Axboe2b188cc2019-01-07 10:46:33 -07001883
Pavel Begunkov889fca72021-02-10 00:03:09 +00001884static inline void __io_req_complete(struct io_kiocb *req, unsigned issue_flags,
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001885 s32 res, u32 cflags)
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001886{
Pavel Begunkov889fca72021-02-10 00:03:09 +00001887 if (issue_flags & IO_URING_F_COMPLETE_DEFER)
1888 io_req_complete_state(req, res, cflags);
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001889 else
Jens Axboec7dae4b2021-02-09 19:53:37 -07001890 io_req_complete_post(req, res, cflags);
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001891}
Jens Axboebcda7ba2020-02-23 16:42:51 -07001892
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001893static inline void io_req_complete(struct io_kiocb *req, s32 res)
Jens Axboee1e16092020-06-22 09:17:17 -06001894{
Pavel Begunkov889fca72021-02-10 00:03:09 +00001895 __io_req_complete(req, 0, res, 0);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001896}
1897
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001898static void io_req_complete_failed(struct io_kiocb *req, s32 res)
Pavel Begunkovf41db2732021-02-28 22:35:12 +00001899{
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01001900 req_set_fail(req);
Pavel Begunkovf41db2732021-02-28 22:35:12 +00001901 io_req_complete_post(req, res, 0);
1902}
1903
Pavel Begunkovc6d3d9c2021-08-31 14:13:10 +01001904static void io_req_complete_fail_submit(struct io_kiocb *req)
1905{
1906 /*
1907 * We don't submit, fail them all, for that replace hardlinks with
1908 * normal links. Extra REQ_F_LINK is tolerated.
1909 */
1910 req->flags &= ~REQ_F_HARDLINK;
1911 req->flags |= REQ_F_LINK;
1912 io_req_complete_failed(req, req->result);
1913}
1914
Pavel Begunkov864ea922021-08-09 13:04:08 +01001915/*
1916 * Don't initialise the fields below on every allocation, but do that in
1917 * advance and keep them valid across allocations.
1918 */
1919static void io_preinit_req(struct io_kiocb *req, struct io_ring_ctx *ctx)
1920{
1921 req->ctx = ctx;
1922 req->link = NULL;
1923 req->async_data = NULL;
1924 /* not necessary, but safer to zero */
1925 req->result = 0;
1926}
1927
Pavel Begunkovdac7a092021-03-19 17:22:39 +00001928static void io_flush_cached_locked_reqs(struct io_ring_ctx *ctx,
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001929 struct io_submit_state *state)
Pavel Begunkovdac7a092021-03-19 17:22:39 +00001930{
Jens Axboe79ebeae2021-08-10 15:18:27 -06001931 spin_lock(&ctx->completion_lock);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001932 list_splice_init(&ctx->locked_free_list, &state->free_list);
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001933 ctx->locked_free_nr = 0;
Jens Axboe79ebeae2021-08-10 15:18:27 -06001934 spin_unlock(&ctx->completion_lock);
Pavel Begunkovdac7a092021-03-19 17:22:39 +00001935}
1936
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001937/* Returns true IFF there are requests in the cache */
Jens Axboec7dae4b2021-02-09 19:53:37 -07001938static bool io_flush_cached_reqs(struct io_ring_ctx *ctx)
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001939{
Jens Axboec7dae4b2021-02-09 19:53:37 -07001940 struct io_submit_state *state = &ctx->submit_state;
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001941 int nr;
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001942
Jens Axboec7dae4b2021-02-09 19:53:37 -07001943 /*
1944 * If we have more than a batch's worth of requests in our IRQ side
1945 * locked cache, grab the lock and move them over to our submission
1946 * side cache.
1947 */
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001948 if (READ_ONCE(ctx->locked_free_nr) > IO_COMPL_BATCH)
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001949 io_flush_cached_locked_reqs(ctx, state);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001950
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001951 nr = state->free_reqs;
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001952 while (!list_empty(&state->free_list)) {
1953 struct io_kiocb *req = list_first_entry(&state->free_list,
Pavel Begunkovbb943b82021-08-09 20:18:10 +01001954 struct io_kiocb, inflight_entry);
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001955
Pavel Begunkovbb943b82021-08-09 20:18:10 +01001956 list_del(&req->inflight_entry);
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001957 state->reqs[nr++] = req;
1958 if (nr == ARRAY_SIZE(state->reqs))
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001959 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001960 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07001961
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001962 state->free_reqs = nr;
1963 return nr != 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001964}
1965
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01001966/*
1967 * A request might get retired back into the request caches even before opcode
1968 * handlers and io_issue_sqe() are done with it, e.g. inline completion path.
1969 * Because of that, io_alloc_req() should be called only under ->uring_lock
1970 * and with extra caution to not get a request that is still worked on.
1971 */
Pavel Begunkov258b29a2021-02-10 00:03:10 +00001972static struct io_kiocb *io_alloc_req(struct io_ring_ctx *ctx)
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01001973 __must_hold(&ctx->uring_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001974{
Pavel Begunkov258b29a2021-02-10 00:03:10 +00001975 struct io_submit_state *state = &ctx->submit_state;
Pavel Begunkov864ea922021-08-09 13:04:08 +01001976 gfp_t gfp = GFP_KERNEL | __GFP_NOWARN;
1977 int ret, i;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001978
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01001979 BUILD_BUG_ON(ARRAY_SIZE(state->reqs) < IO_REQ_ALLOC_BATCH);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001980
Pavel Begunkov864ea922021-08-09 13:04:08 +01001981 if (likely(state->free_reqs || io_flush_cached_reqs(ctx)))
1982 goto got_req;
Jens Axboe2579f912019-01-09 09:10:43 -07001983
Pavel Begunkov864ea922021-08-09 13:04:08 +01001984 ret = kmem_cache_alloc_bulk(req_cachep, gfp, IO_REQ_ALLOC_BATCH,
1985 state->reqs);
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001986
Pavel Begunkov864ea922021-08-09 13:04:08 +01001987 /*
1988 * Bulk alloc is all-or-nothing. If we fail to get a batch,
1989 * retry single alloc to be on the safe side.
1990 */
1991 if (unlikely(ret <= 0)) {
1992 state->reqs[0] = kmem_cache_alloc(req_cachep, gfp);
1993 if (!state->reqs[0])
1994 return NULL;
1995 ret = 1;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001996 }
Pavel Begunkov864ea922021-08-09 13:04:08 +01001997
1998 for (i = 0; i < ret; i++)
1999 io_preinit_req(state->reqs[i], ctx);
2000 state->free_reqs = ret;
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00002001got_req:
Pavel Begunkov291b2822020-09-30 22:57:01 +03002002 state->free_reqs--;
2003 return state->reqs[state->free_reqs];
Jens Axboe2b188cc2019-01-07 10:46:33 -07002004}
2005
Pavel Begunkove1d767f2021-03-19 17:22:43 +00002006static inline void io_put_file(struct file *file)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03002007{
Pavel Begunkove1d767f2021-03-19 17:22:43 +00002008 if (file)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03002009 fput(file);
2010}
2011
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01002012static void io_dismantle_req(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002013{
Pavel Begunkov094bae42021-03-19 17:22:42 +00002014 unsigned int flags = req->flags;
Pavel Begunkov929a3af2020-02-19 00:19:09 +03002015
Pavel Begunkov3a0a6902021-04-20 12:03:31 +01002016 if (io_req_needs_clean(req))
2017 io_clean_op(req);
Pavel Begunkove1d767f2021-03-19 17:22:43 +00002018 if (!(flags & REQ_F_FIXED_FILE))
2019 io_put_file(req->file);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00002020 if (req->fixed_rsrc_refs)
2021 percpu_ref_put(req->fixed_rsrc_refs);
Pavel Begunkov99ebe4e2021-06-26 21:40:49 +01002022 if (req->async_data) {
Pavel Begunkov094bae42021-03-19 17:22:42 +00002023 kfree(req->async_data);
Pavel Begunkov99ebe4e2021-06-26 21:40:49 +01002024 req->async_data = NULL;
2025 }
Pavel Begunkove6543a82020-06-28 12:52:30 +03002026}
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03002027
Pavel Begunkov216578e2020-10-13 09:44:00 +01002028static void __io_free_req(struct io_kiocb *req)
Pavel Begunkove6543a82020-06-28 12:52:30 +03002029{
Jens Axboe51a4cc12020-08-10 10:55:56 -06002030 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovecfc5172020-06-29 13:13:03 +03002031
Pavel Begunkov216578e2020-10-13 09:44:00 +01002032 io_dismantle_req(req);
Pavel Begunkov7c660732021-01-25 11:42:21 +00002033 io_put_task(req->task, 1);
Pavel Begunkove6543a82020-06-28 12:52:30 +03002034
Jens Axboe79ebeae2021-08-10 15:18:27 -06002035 spin_lock(&ctx->completion_lock);
Pavel Begunkovbb943b82021-08-09 20:18:10 +01002036 list_add(&req->inflight_entry, &ctx->locked_free_list);
Pavel Begunkovc34b0252021-08-09 20:18:08 +01002037 ctx->locked_free_nr++;
Jens Axboe79ebeae2021-08-10 15:18:27 -06002038 spin_unlock(&ctx->completion_lock);
Pavel Begunkovc34b0252021-08-09 20:18:08 +01002039
Pavel Begunkovecfc5172020-06-29 13:13:03 +03002040 percpu_ref_put(&ctx->refs);
Jens Axboee65ef562019-03-12 10:16:44 -06002041}
2042
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002043static inline void io_remove_next_linked(struct io_kiocb *req)
2044{
2045 struct io_kiocb *nxt = req->link;
2046
2047 req->link = nxt->link;
2048 nxt->link = NULL;
2049}
2050
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002051static bool io_kill_linked_timeout(struct io_kiocb *req)
2052 __must_hold(&req->ctx->completion_lock)
Jens Axboe89b263f2021-08-10 15:14:18 -06002053 __must_hold(&req->ctx->timeout_lock)
Jens Axboe9e645e112019-05-10 16:07:28 -06002054{
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002055 struct io_kiocb *link = req->link;
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002056
Pavel Begunkovb97e7362021-08-15 10:40:23 +01002057 if (link && link->opcode == IORING_OP_LINK_TIMEOUT) {
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01002058 struct io_timeout_data *io = link->async_data;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03002059
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002060 io_remove_next_linked(req);
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00002061 link->timeout.head = NULL;
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01002062 if (hrtimer_try_to_cancel(&io->timer) != -1) {
Pavel Begunkovef9dd632021-08-28 19:54:38 -06002063 list_del(&link->timeout.list);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002064 io_fill_cqe_req(link, -ECANCELED, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002065 io_put_req_deferred(link);
Pavel Begunkovd4729fb2021-03-22 01:58:24 +00002066 return true;
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01002067 }
2068 }
Pavel Begunkovd4729fb2021-03-22 01:58:24 +00002069 return false;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03002070}
2071
Pavel Begunkovd148ca42020-10-18 10:17:39 +01002072static void io_fail_links(struct io_kiocb *req)
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002073 __must_hold(&req->ctx->completion_lock)
Jens Axboe9e645e112019-05-10 16:07:28 -06002074{
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002075 struct io_kiocb *nxt, *link = req->link;
Jens Axboe9e645e112019-05-10 16:07:28 -06002076
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002077 req->link = NULL;
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002078 while (link) {
Hao Xua8295b92021-08-27 17:46:09 +08002079 long res = -ECANCELED;
2080
2081 if (link->flags & REQ_F_FAIL)
2082 res = link->result;
2083
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002084 nxt = link->link;
2085 link->link = NULL;
2086
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02002087 trace_io_uring_fail_link(req, link);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002088 io_fill_cqe_req(link, res, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002089 io_put_req_deferred(link);
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002090 link = nxt;
Jens Axboe9e645e112019-05-10 16:07:28 -06002091 }
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002092}
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03002093
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002094static bool io_disarm_next(struct io_kiocb *req)
2095 __must_hold(&req->ctx->completion_lock)
2096{
2097 bool posted = false;
2098
Pavel Begunkov0756a862021-08-15 10:40:25 +01002099 if (req->flags & REQ_F_ARM_LTIMEOUT) {
2100 struct io_kiocb *link = req->link;
2101
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01002102 req->flags &= ~REQ_F_ARM_LTIMEOUT;
Pavel Begunkov0756a862021-08-15 10:40:25 +01002103 if (link && link->opcode == IORING_OP_LINK_TIMEOUT) {
2104 io_remove_next_linked(req);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002105 io_fill_cqe_req(link, -ECANCELED, 0);
Pavel Begunkov0756a862021-08-15 10:40:25 +01002106 io_put_req_deferred(link);
2107 posted = true;
2108 }
2109 } else if (req->flags & REQ_F_LINK_TIMEOUT) {
Jens Axboe89b263f2021-08-10 15:14:18 -06002110 struct io_ring_ctx *ctx = req->ctx;
2111
2112 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002113 posted = io_kill_linked_timeout(req);
Jens Axboe89b263f2021-08-10 15:14:18 -06002114 spin_unlock_irq(&ctx->timeout_lock);
2115 }
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01002116 if (unlikely((req->flags & REQ_F_FAIL) &&
Pavel Begunkove4335ed2021-04-11 01:46:39 +01002117 !(req->flags & REQ_F_HARDLINK))) {
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002118 posted |= (req->link != NULL);
2119 io_fail_links(req);
2120 }
2121 return posted;
Jens Axboe9e645e112019-05-10 16:07:28 -06002122}
2123
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03002124static struct io_kiocb *__io_req_find_next(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06002125{
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002126 struct io_kiocb *nxt;
Jens Axboe2665abf2019-11-05 12:40:47 -07002127
Jens Axboe9e645e112019-05-10 16:07:28 -06002128 /*
2129 * If LINK is set, we have dependent requests in this chain. If we
2130 * didn't fail this request, queue the first one up, moving any other
2131 * dependencies to the next request. In case of failure, fail the rest
2132 * of the chain.
2133 */
Pavel Begunkov0756a862021-08-15 10:40:25 +01002134 if (req->flags & IO_DISARM_MASK) {
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002135 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002136 bool posted;
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002137
Jens Axboe79ebeae2021-08-10 15:18:27 -06002138 spin_lock(&ctx->completion_lock);
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002139 posted = io_disarm_next(req);
2140 if (posted)
2141 io_commit_cqring(req->ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06002142 spin_unlock(&ctx->completion_lock);
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002143 if (posted)
2144 io_cqring_ev_posted(ctx);
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002145 }
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002146 nxt = req->link;
2147 req->link = NULL;
2148 return nxt;
Jens Axboe4d7dd462019-11-20 13:03:52 -07002149}
Jens Axboe2665abf2019-11-05 12:40:47 -07002150
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002151static inline struct io_kiocb *io_req_find_next(struct io_kiocb *req)
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03002152{
Pavel Begunkovcdbff982021-02-12 18:41:16 +00002153 if (likely(!(req->flags & (REQ_F_LINK|REQ_F_HARDLINK))))
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03002154 return NULL;
2155 return __io_req_find_next(req);
2156}
2157
Pavel Begunkovf237c302021-08-18 12:42:46 +01002158static void ctx_flush_and_put(struct io_ring_ctx *ctx, bool *locked)
Pavel Begunkov2c323952021-02-28 22:04:53 +00002159{
2160 if (!ctx)
2161 return;
Pavel Begunkovf237c302021-08-18 12:42:46 +01002162 if (*locked) {
Hao Xu99c8bc52021-08-21 06:19:54 +08002163 if (ctx->submit_state.compl_nr)
2164 io_submit_flush_completions(ctx);
Pavel Begunkov2c323952021-02-28 22:04:53 +00002165 mutex_unlock(&ctx->uring_lock);
Pavel Begunkovf237c302021-08-18 12:42:46 +01002166 *locked = false;
Pavel Begunkov2c323952021-02-28 22:04:53 +00002167 }
2168 percpu_ref_put(&ctx->refs);
2169}
2170
Jens Axboe7cbf1722021-02-10 00:03:20 +00002171static void tctx_task_work(struct callback_head *cb)
2172{
Pavel Begunkovf237c302021-08-18 12:42:46 +01002173 bool locked = false;
Pavel Begunkovebd0df22021-06-17 18:14:07 +01002174 struct io_ring_ctx *ctx = NULL;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002175 struct io_uring_task *tctx = container_of(cb, struct io_uring_task,
2176 task_work);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002177
Pavel Begunkov16f72072021-06-17 18:14:09 +01002178 while (1) {
Pavel Begunkov3f184072021-06-17 18:14:06 +01002179 struct io_wq_work_node *node;
2180
Pavel Begunkov8d4ad412021-09-02 00:38:23 +01002181 if (!tctx->task_list.first && locked && ctx->submit_state.compl_nr)
2182 io_submit_flush_completions(ctx);
2183
Pavel Begunkov3f184072021-06-17 18:14:06 +01002184 spin_lock_irq(&tctx->task_lock);
Pavel Begunkovc6538be2021-06-17 18:14:08 +01002185 node = tctx->task_list.first;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002186 INIT_WQ_LIST(&tctx->task_list);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002187 if (!node)
2188 tctx->task_running = false;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002189 spin_unlock_irq(&tctx->task_lock);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002190 if (!node)
2191 break;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002192
Pavel Begunkov6294f362021-08-10 17:53:55 +01002193 do {
Pavel Begunkov3f184072021-06-17 18:14:06 +01002194 struct io_wq_work_node *next = node->next;
2195 struct io_kiocb *req = container_of(node, struct io_kiocb,
2196 io_task_work.node);
2197
2198 if (req->ctx != ctx) {
Pavel Begunkovf237c302021-08-18 12:42:46 +01002199 ctx_flush_and_put(ctx, &locked);
Pavel Begunkov3f184072021-06-17 18:14:06 +01002200 ctx = req->ctx;
Pavel Begunkov126180b2021-08-18 12:42:47 +01002201 /* if not contended, grab and improve batching */
2202 locked = mutex_trylock(&ctx->uring_lock);
Pavel Begunkov3f184072021-06-17 18:14:06 +01002203 percpu_ref_get(&ctx->refs);
2204 }
Pavel Begunkovf237c302021-08-18 12:42:46 +01002205 req->io_task_work.func(req, &locked);
Pavel Begunkov3f184072021-06-17 18:14:06 +01002206 node = next;
Pavel Begunkov6294f362021-08-10 17:53:55 +01002207 } while (node);
2208
Jens Axboe7cbf1722021-02-10 00:03:20 +00002209 cond_resched();
Pavel Begunkov3f184072021-06-17 18:14:06 +01002210 }
Pavel Begunkovebd0df22021-06-17 18:14:07 +01002211
Pavel Begunkovf237c302021-08-18 12:42:46 +01002212 ctx_flush_and_put(ctx, &locked);
Pavel Begunkovb168b1a2022-01-09 00:53:22 +00002213
2214 /* relaxed read is enough as only the task itself sets ->in_idle */
2215 if (unlikely(atomic_read(&tctx->in_idle)))
2216 io_uring_drop_tctx_refs(current);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002217}
2218
Pavel Begunkove09ee512021-07-01 13:26:05 +01002219static void io_req_task_work_add(struct io_kiocb *req)
Jens Axboe7cbf1722021-02-10 00:03:20 +00002220{
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002221 struct task_struct *tsk = req->task;
Jens Axboe7cbf1722021-02-10 00:03:20 +00002222 struct io_uring_task *tctx = tsk->io_uring;
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002223 enum task_work_notify_mode notify;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002224 struct io_wq_work_node *node;
Jens Axboe0b81e802021-02-16 10:33:53 -07002225 unsigned long flags;
Pavel Begunkov6294f362021-08-10 17:53:55 +01002226 bool running;
Jens Axboe7cbf1722021-02-10 00:03:20 +00002227
2228 WARN_ON_ONCE(!tctx);
2229
Jens Axboe0b81e802021-02-16 10:33:53 -07002230 spin_lock_irqsave(&tctx->task_lock, flags);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002231 wq_list_add_tail(&req->io_task_work.node, &tctx->task_list);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002232 running = tctx->task_running;
2233 if (!running)
2234 tctx->task_running = true;
Jens Axboe0b81e802021-02-16 10:33:53 -07002235 spin_unlock_irqrestore(&tctx->task_lock, flags);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002236
2237 /* task_work already pending, we're done */
Pavel Begunkov6294f362021-08-10 17:53:55 +01002238 if (running)
Pavel Begunkove09ee512021-07-01 13:26:05 +01002239 return;
Jens Axboe7cbf1722021-02-10 00:03:20 +00002240
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002241 /*
2242 * SQPOLL kernel thread doesn't need notification, just a wakeup. For
2243 * all other cases, use TWA_SIGNAL unconditionally to ensure we're
2244 * processing task_work. There's no reliable way to tell if TWA_RESUME
2245 * will do the job.
2246 */
2247 notify = (req->ctx->flags & IORING_SETUP_SQPOLL) ? TWA_NONE : TWA_SIGNAL;
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002248 if (!task_work_add(tsk, &tctx->task_work, notify)) {
2249 wake_up_process(tsk);
Pavel Begunkove09ee512021-07-01 13:26:05 +01002250 return;
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002251 }
Pavel Begunkov2215bed2021-08-09 13:04:06 +01002252
Pavel Begunkove09ee512021-07-01 13:26:05 +01002253 spin_lock_irqsave(&tctx->task_lock, flags);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002254 tctx->task_running = false;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002255 node = tctx->task_list.first;
2256 INIT_WQ_LIST(&tctx->task_list);
2257 spin_unlock_irqrestore(&tctx->task_lock, flags);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002258
Pavel Begunkove09ee512021-07-01 13:26:05 +01002259 while (node) {
2260 req = container_of(node, struct io_kiocb, io_task_work.node);
2261 node = node->next;
2262 if (llist_add(&req->io_task_work.fallback_node,
2263 &req->ctx->fallback_llist))
2264 schedule_delayed_work(&req->ctx->fallback_work, 1);
2265 }
Pavel Begunkoveab30c42021-01-19 13:32:42 +00002266}
2267
Pavel Begunkovf237c302021-08-18 12:42:46 +01002268static void io_req_task_cancel(struct io_kiocb *req, bool *locked)
Jens Axboec40f6372020-06-25 15:39:59 -06002269{
Jens Axboe87ceb6a2020-09-14 08:20:12 -06002270 struct io_ring_ctx *ctx = req->ctx;
Jens Axboec40f6372020-06-25 15:39:59 -06002271
Pavel Begunkovb18a1a42021-08-25 20:51:39 +01002272 /* not needed for normal modes, but SQPOLL depends on it */
Pavel Begunkovf237c302021-08-18 12:42:46 +01002273 io_tw_lock(ctx, locked);
Pavel Begunkov25935532021-03-19 17:22:40 +00002274 io_req_complete_failed(req, req->result);
Jens Axboec40f6372020-06-25 15:39:59 -06002275}
2276
Pavel Begunkovf237c302021-08-18 12:42:46 +01002277static void io_req_task_submit(struct io_kiocb *req, bool *locked)
Jens Axboec40f6372020-06-25 15:39:59 -06002278{
2279 struct io_ring_ctx *ctx = req->ctx;
2280
Pavel Begunkovf237c302021-08-18 12:42:46 +01002281 io_tw_lock(ctx, locked);
Jens Axboe316319e2021-08-19 09:41:42 -06002282 /* req->task == current here, checking PF_EXITING is safe */
Pavel Begunkovaf066f32021-08-09 13:04:19 +01002283 if (likely(!(req->task->flags & PF_EXITING)))
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00002284 __io_queue_sqe(req);
Pavel Begunkov81b6d052021-01-04 20:36:35 +00002285 else
Pavel Begunkov25935532021-03-19 17:22:40 +00002286 io_req_complete_failed(req, -EFAULT);
Jens Axboe9e645e112019-05-10 16:07:28 -06002287}
2288
Pavel Begunkova3df76982021-02-18 22:32:52 +00002289static void io_req_task_queue_fail(struct io_kiocb *req, int ret)
2290{
Pavel Begunkova3df76982021-02-18 22:32:52 +00002291 req->result = ret;
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +01002292 req->io_task_work.func = io_req_task_cancel;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002293 io_req_task_work_add(req);
Pavel Begunkova3df76982021-02-18 22:32:52 +00002294}
2295
Pavel Begunkov2c4b8eb2021-02-28 22:35:10 +00002296static void io_req_task_queue(struct io_kiocb *req)
2297{
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +01002298 req->io_task_work.func = io_req_task_submit;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002299 io_req_task_work_add(req);
Pavel Begunkov2c4b8eb2021-02-28 22:35:10 +00002300}
2301
Jens Axboe773af692021-07-27 10:25:55 -06002302static void io_req_task_queue_reissue(struct io_kiocb *req)
2303{
2304 req->io_task_work.func = io_queue_async_work;
2305 io_req_task_work_add(req);
2306}
2307
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002308static inline void io_queue_next(struct io_kiocb *req)
Jackie Liuc69f8db2019-11-09 11:00:08 +08002309{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002310 struct io_kiocb *nxt = io_req_find_next(req);
Pavel Begunkov944e58b2019-11-21 23:21:01 +03002311
Pavel Begunkov906a8c32020-06-27 14:04:55 +03002312 if (nxt)
2313 io_req_task_queue(nxt);
Jackie Liuc69f8db2019-11-09 11:00:08 +08002314}
2315
Jens Axboe9e645e112019-05-10 16:07:28 -06002316static void io_free_req(struct io_kiocb *req)
2317{
Pavel Begunkovc3524382020-06-28 12:52:32 +03002318 io_queue_next(req);
Jens Axboe9e645e112019-05-10 16:07:28 -06002319 __io_free_req(req);
Jens Axboee65ef562019-03-12 10:16:44 -06002320}
2321
Pavel Begunkovf237c302021-08-18 12:42:46 +01002322static void io_free_req_work(struct io_kiocb *req, bool *locked)
2323{
2324 io_free_req(req);
2325}
2326
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002327struct req_batch {
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002328 struct task_struct *task;
2329 int task_refs;
Jens Axboe1b4c3512021-02-10 00:03:19 +00002330 int ctx_refs;
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002331};
2332
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002333static inline void io_init_req_batch(struct req_batch *rb)
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002334{
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002335 rb->task_refs = 0;
Pavel Begunkov9ae72462021-02-10 00:03:16 +00002336 rb->ctx_refs = 0;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002337 rb->task = NULL;
2338}
Pavel Begunkov8766dd52020-03-14 00:31:04 +03002339
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002340static void io_req_free_batch_finish(struct io_ring_ctx *ctx,
2341 struct req_batch *rb)
2342{
Pavel Begunkov9ae72462021-02-10 00:03:16 +00002343 if (rb->ctx_refs)
2344 percpu_ref_put_many(&ctx->refs, rb->ctx_refs);
Pavel Begunkove98e49b2021-08-18 17:01:43 +01002345 if (rb->task)
Pavel Begunkove9dbe222021-08-09 13:04:20 +01002346 io_put_task(rb->task, rb->task_refs);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002347}
2348
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002349static void io_req_free_batch(struct req_batch *rb, struct io_kiocb *req,
2350 struct io_submit_state *state)
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002351{
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002352 io_queue_next(req);
Pavel Begunkov96670652021-03-19 17:22:32 +00002353 io_dismantle_req(req);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002354
Jens Axboee3bc8e92020-09-24 08:45:57 -06002355 if (req->task != rb->task) {
Pavel Begunkov7c660732021-01-25 11:42:21 +00002356 if (rb->task)
2357 io_put_task(rb->task, rb->task_refs);
Jens Axboee3bc8e92020-09-24 08:45:57 -06002358 rb->task = req->task;
2359 rb->task_refs = 0;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002360 }
Jens Axboee3bc8e92020-09-24 08:45:57 -06002361 rb->task_refs++;
Pavel Begunkov9ae72462021-02-10 00:03:16 +00002362 rb->ctx_refs++;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002363
Pavel Begunkovbd759042021-02-12 03:23:50 +00002364 if (state->free_reqs != ARRAY_SIZE(state->reqs))
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002365 state->reqs[state->free_reqs++] = req;
Pavel Begunkovbd759042021-02-12 03:23:50 +00002366 else
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002367 list_add(&req->inflight_entry, &state->free_list);
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002368}
2369
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01002370static void io_submit_flush_completions(struct io_ring_ctx *ctx)
Jens Axboea141dd82021-08-12 12:48:34 -06002371 __must_hold(&ctx->uring_lock)
Pavel Begunkov905c1722021-02-10 00:03:14 +00002372{
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002373 struct io_submit_state *state = &ctx->submit_state;
2374 int i, nr = state->compl_nr;
Pavel Begunkov905c1722021-02-10 00:03:14 +00002375 struct req_batch rb;
2376
Jens Axboe79ebeae2021-08-10 15:18:27 -06002377 spin_lock(&ctx->completion_lock);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002378 for (i = 0; i < nr; i++) {
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002379 struct io_kiocb *req = state->compl_reqs[i];
Pavel Begunkov5182ed22021-06-26 21:40:48 +01002380
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002381 __io_fill_cqe(ctx, req->user_data, req->result,
2382 req->compl.cflags);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002383 }
2384 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06002385 spin_unlock(&ctx->completion_lock);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002386 io_cqring_ev_posted(ctx);
Pavel Begunkov5182ed22021-06-26 21:40:48 +01002387
2388 io_init_req_batch(&rb);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002389 for (i = 0; i < nr; i++) {
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002390 struct io_kiocb *req = state->compl_reqs[i];
Pavel Begunkov905c1722021-02-10 00:03:14 +00002391
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002392 if (req_ref_put_and_test(req))
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002393 io_req_free_batch(&rb, req, &ctx->submit_state);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002394 }
2395
2396 io_req_free_batch_finish(ctx, &rb);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002397 state->compl_nr = 0;
Jens Axboee65ef562019-03-12 10:16:44 -06002398}
2399
Jens Axboeba816ad2019-09-28 11:36:45 -06002400/*
2401 * Drop reference to request, return next in chain (if there is one) if this
2402 * was the last reference to this request.
2403 */
Pavel Begunkov0d850352021-03-19 17:22:37 +00002404static inline struct io_kiocb *io_put_req_find_next(struct io_kiocb *req)
Jens Axboee65ef562019-03-12 10:16:44 -06002405{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002406 struct io_kiocb *nxt = NULL;
2407
Jens Axboede9b4cc2021-02-24 13:28:27 -07002408 if (req_ref_put_and_test(req)) {
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002409 nxt = io_req_find_next(req);
Jens Axboe4d7dd462019-11-20 13:03:52 -07002410 __io_free_req(req);
Jens Axboe2a44f462020-02-25 13:25:41 -07002411 }
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002412 return nxt;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002413}
2414
Pavel Begunkov0d850352021-03-19 17:22:37 +00002415static inline void io_put_req(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002416{
Jens Axboede9b4cc2021-02-24 13:28:27 -07002417 if (req_ref_put_and_test(req))
Jens Axboedef596e2019-01-09 08:59:42 -07002418 io_free_req(req);
2419}
2420
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002421static inline void io_put_req_deferred(struct io_kiocb *req)
Pavel Begunkov216578e2020-10-13 09:44:00 +01002422{
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002423 if (req_ref_put_and_test(req)) {
Pavel Begunkovf237c302021-08-18 12:42:46 +01002424 req->io_task_work.func = io_free_req_work;
Pavel Begunkov543af3a2021-08-09 13:04:15 +01002425 io_req_task_work_add(req);
2426 }
Pavel Begunkov216578e2020-10-13 09:44:00 +01002427}
2428
Pavel Begunkov6c503152021-01-04 20:36:36 +00002429static unsigned io_cqring_events(struct io_ring_ctx *ctx)
Jens Axboea3a0e432019-08-20 11:03:11 -06002430{
2431 /* See comment at the top of this file */
2432 smp_rmb();
Pavel Begunkove23de152020-12-17 00:24:37 +00002433 return __io_cqring_events(ctx);
Jens Axboea3a0e432019-08-20 11:03:11 -06002434}
2435
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03002436static inline unsigned int io_sqring_entries(struct io_ring_ctx *ctx)
2437{
2438 struct io_rings *rings = ctx->rings;
2439
2440 /* make sure SQ entry isn't read before tail */
2441 return smp_load_acquire(&rings->sq.tail) - ctx->cached_sq_head;
2442}
2443
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002444static unsigned int io_put_kbuf(struct io_kiocb *req, struct io_buffer *kbuf)
Jens Axboee94f1412019-12-19 12:06:02 -07002445{
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002446 unsigned int cflags;
Jens Axboee94f1412019-12-19 12:06:02 -07002447
Jens Axboebcda7ba2020-02-23 16:42:51 -07002448 cflags = kbuf->bid << IORING_CQE_BUFFER_SHIFT;
2449 cflags |= IORING_CQE_F_BUFFER;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03002450 req->flags &= ~REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07002451 kfree(kbuf);
2452 return cflags;
2453}
2454
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002455static inline unsigned int io_put_rw_kbuf(struct io_kiocb *req)
2456{
2457 struct io_buffer *kbuf;
2458
Pavel Begunkovae421d92021-08-17 20:28:08 +01002459 if (likely(!(req->flags & REQ_F_BUFFER_SELECTED)))
2460 return 0;
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002461 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
2462 return io_put_kbuf(req, kbuf);
2463}
2464
Jens Axboe4c6e2772020-07-01 11:29:10 -06002465static inline bool io_run_task_work(void)
2466{
Jens Axboe54df6c52023-03-06 13:15:06 -07002467 /*
2468 * PF_IO_WORKER never returns to userspace, so check here if we have
2469 * notify work that needs processing.
2470 */
2471 if (current->flags & PF_IO_WORKER &&
Jens Axboe337eb882023-03-06 13:16:38 -07002472 test_thread_flag(TIF_NOTIFY_RESUME)) {
2473 __set_current_state(TASK_RUNNING);
Jens Axboe54df6c52023-03-06 13:15:06 -07002474 tracehook_notify_resume(NULL);
Jens Axboe337eb882023-03-06 13:16:38 -07002475 }
Nadav Amitef98eb02021-08-07 17:13:41 -07002476 if (test_thread_flag(TIF_NOTIFY_SIGNAL) || current->task_works) {
Jens Axboe4c6e2772020-07-01 11:29:10 -06002477 __set_current_state(TASK_RUNNING);
Nadav Amitef98eb02021-08-07 17:13:41 -07002478 tracehook_notify_signal();
Jens Axboe4c6e2772020-07-01 11:29:10 -06002479 return true;
2480 }
2481
2482 return false;
2483}
2484
Jens Axboedef596e2019-01-09 08:59:42 -07002485/*
2486 * Find and free completed poll iocbs
2487 */
2488static void io_iopoll_complete(struct io_ring_ctx *ctx, unsigned int *nr_events,
Pavel Begunkova8576af2021-08-15 10:40:21 +01002489 struct list_head *done)
Jens Axboedef596e2019-01-09 08:59:42 -07002490{
Jens Axboe8237e042019-12-28 10:48:22 -07002491 struct req_batch rb;
Jens Axboedef596e2019-01-09 08:59:42 -07002492 struct io_kiocb *req;
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002493
2494 /* order with ->result store in io_complete_rw_iopoll() */
2495 smp_rmb();
Jens Axboedef596e2019-01-09 08:59:42 -07002496
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002497 io_init_req_batch(&rb);
Jens Axboedef596e2019-01-09 08:59:42 -07002498 while (!list_empty(done)) {
Pavel Begunkoved4629d2023-01-14 09:14:03 -07002499 struct io_uring_cqe *cqe;
2500 unsigned cflags;
2501
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002502 req = list_first_entry(done, struct io_kiocb, inflight_entry);
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002503 list_del(&req->inflight_entry);
Pavel Begunkoved4629d2023-01-14 09:14:03 -07002504 cflags = io_put_rw_kbuf(req);
Jens Axboedef596e2019-01-09 08:59:42 -07002505 (*nr_events)++;
2506
Pavel Begunkoved4629d2023-01-14 09:14:03 -07002507 cqe = io_get_cqe(ctx);
2508 if (cqe) {
2509 WRITE_ONCE(cqe->user_data, req->user_data);
2510 WRITE_ONCE(cqe->res, req->result);
2511 WRITE_ONCE(cqe->flags, cflags);
2512 } else {
2513 spin_lock(&ctx->completion_lock);
2514 io_cqring_event_overflow(ctx, req->user_data,
2515 req->result, cflags);
2516 spin_unlock(&ctx->completion_lock);
2517 }
2518
Jens Axboede9b4cc2021-02-24 13:28:27 -07002519 if (req_ref_put_and_test(req))
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002520 io_req_free_batch(&rb, req, &ctx->submit_state);
Jens Axboedef596e2019-01-09 08:59:42 -07002521 }
Jens Axboedef596e2019-01-09 08:59:42 -07002522
Jens Axboe09bb8392019-03-13 12:39:28 -06002523 io_commit_cqring(ctx);
Pavel Begunkov80c18e42021-01-07 03:15:41 +00002524 io_cqring_ev_posted_iopoll(ctx);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002525 io_req_free_batch_finish(ctx, &rb);
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002526}
2527
Jens Axboedef596e2019-01-09 08:59:42 -07002528static int io_do_iopoll(struct io_ring_ctx *ctx, unsigned int *nr_events,
Pavel Begunkova8576af2021-08-15 10:40:21 +01002529 long min)
Jens Axboedef596e2019-01-09 08:59:42 -07002530{
2531 struct io_kiocb *req, *tmp;
2532 LIST_HEAD(done);
2533 bool spin;
Jens Axboedef596e2019-01-09 08:59:42 -07002534
2535 /*
2536 * Only spin for completions if we don't have multiple devices hanging
2537 * off our complete list, and we're under the requested amount.
2538 */
Hao Xu915b3dd2021-06-28 05:37:30 +08002539 spin = !ctx->poll_multi_queue && *nr_events < min;
Jens Axboedef596e2019-01-09 08:59:42 -07002540
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002541 list_for_each_entry_safe(req, tmp, &ctx->iopoll_list, inflight_entry) {
Jens Axboe9adbd452019-12-20 08:45:55 -07002542 struct kiocb *kiocb = &req->rw.kiocb;
Pavel Begunkova2416e12021-08-09 13:04:09 +01002543 int ret;
Jens Axboedef596e2019-01-09 08:59:42 -07002544
2545 /*
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002546 * Move completed and retryable entries to our local lists.
2547 * If we find a request that requires polling, break out
2548 * and complete those lists first, if we have entries there.
Jens Axboedef596e2019-01-09 08:59:42 -07002549 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002550 if (READ_ONCE(req->iopoll_completed)) {
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002551 list_move_tail(&req->inflight_entry, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002552 continue;
2553 }
2554 if (!list_empty(&done))
2555 break;
2556
2557 ret = kiocb->ki_filp->f_op->iopoll(kiocb, spin);
Pavel Begunkova2416e12021-08-09 13:04:09 +01002558 if (unlikely(ret < 0))
2559 return ret;
2560 else if (ret)
2561 spin = false;
Jens Axboedef596e2019-01-09 08:59:42 -07002562
Pavel Begunkov3aadc232020-07-06 17:59:29 +03002563 /* iopoll may have completed current req */
2564 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002565 list_move_tail(&req->inflight_entry, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002566 }
2567
2568 if (!list_empty(&done))
Pavel Begunkova8576af2021-08-15 10:40:21 +01002569 io_iopoll_complete(ctx, nr_events, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002570
Pavel Begunkova2416e12021-08-09 13:04:09 +01002571 return 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002572}
2573
2574/*
Jens Axboedef596e2019-01-09 08:59:42 -07002575 * We can't just wait for polled events to come to us, we have to actively
2576 * find and complete them.
2577 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002578static void io_iopoll_try_reap_events(struct io_ring_ctx *ctx)
Jens Axboedef596e2019-01-09 08:59:42 -07002579{
2580 if (!(ctx->flags & IORING_SETUP_IOPOLL))
2581 return;
2582
2583 mutex_lock(&ctx->uring_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002584 while (!list_empty(&ctx->iopoll_list)) {
Jens Axboedef596e2019-01-09 08:59:42 -07002585 unsigned int nr_events = 0;
2586
Pavel Begunkova8576af2021-08-15 10:40:21 +01002587 io_do_iopoll(ctx, &nr_events, 0);
Jens Axboe08f54392019-08-21 22:19:11 -06002588
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002589 /* let it sleep and repeat later if can't complete a request */
2590 if (nr_events == 0)
2591 break;
Jens Axboe08f54392019-08-21 22:19:11 -06002592 /*
2593 * Ensure we allow local-to-the-cpu processing to take place,
2594 * in this case we need to ensure that we reap all events.
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002595 * Also let task_work, etc. to progress by releasing the mutex
Jens Axboe08f54392019-08-21 22:19:11 -06002596 */
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002597 if (need_resched()) {
2598 mutex_unlock(&ctx->uring_lock);
2599 cond_resched();
2600 mutex_lock(&ctx->uring_lock);
2601 }
Jens Axboedef596e2019-01-09 08:59:42 -07002602 }
2603 mutex_unlock(&ctx->uring_lock);
2604}
2605
Pavel Begunkov7668b922020-07-07 16:36:21 +03002606static int io_iopoll_check(struct io_ring_ctx *ctx, long min)
Jens Axboedef596e2019-01-09 08:59:42 -07002607{
Pavel Begunkov7668b922020-07-07 16:36:21 +03002608 unsigned int nr_events = 0;
Pavel Begunkove9979b32021-04-13 02:58:45 +01002609 int ret = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002610
Xiaoguang Wangc7849be2020-02-22 14:46:05 +08002611 /*
2612 * We disallow the app entering submit/complete with polling, but we
2613 * still need to lock the ring to prevent racing with polled issue
2614 * that got punted to a workqueue.
2615 */
2616 mutex_lock(&ctx->uring_lock);
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002617 /*
2618 * Don't enter poll loop if we already have events pending.
2619 * If we do, we can potentially be spinning for commands that
2620 * already triggered a CQE (eg in error).
2621 */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01002622 if (test_bit(0, &ctx->check_cq_overflow))
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002623 __io_cqring_overflow_flush(ctx, false);
2624 if (io_cqring_events(ctx))
2625 goto out;
Jens Axboedef596e2019-01-09 08:59:42 -07002626 do {
Jens Axboe500f9fb2019-08-19 12:15:59 -06002627 /*
2628 * If a submit got punted to a workqueue, we can have the
2629 * application entering polling for a command before it gets
2630 * issued. That app will hold the uring_lock for the duration
2631 * of the poll right here, so we need to take a breather every
2632 * now and then to ensure that the issue has a chance to add
2633 * the poll to the issued list. Otherwise we can spin here
2634 * forever, while the workqueue is stuck trying to acquire the
2635 * very same mutex.
2636 */
Pavel Begunkove9979b32021-04-13 02:58:45 +01002637 if (list_empty(&ctx->iopoll_list)) {
Pavel Begunkov8f487ef2021-07-08 13:37:06 +01002638 u32 tail = ctx->cached_cq_tail;
2639
Jens Axboe500f9fb2019-08-19 12:15:59 -06002640 mutex_unlock(&ctx->uring_lock);
Jens Axboe4c6e2772020-07-01 11:29:10 -06002641 io_run_task_work();
Jens Axboe500f9fb2019-08-19 12:15:59 -06002642 mutex_lock(&ctx->uring_lock);
Pavel Begunkove9979b32021-04-13 02:58:45 +01002643
Pavel Begunkov8f487ef2021-07-08 13:37:06 +01002644 /* some requests don't go through iopoll_list */
2645 if (tail != ctx->cached_cq_tail ||
2646 list_empty(&ctx->iopoll_list))
Pavel Begunkove9979b32021-04-13 02:58:45 +01002647 break;
Jens Axboe500f9fb2019-08-19 12:15:59 -06002648 }
Pavel Begunkova8576af2021-08-15 10:40:21 +01002649 ret = io_do_iopoll(ctx, &nr_events, min);
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002650 } while (!ret && nr_events < min && !need_resched());
2651out:
Jens Axboe500f9fb2019-08-19 12:15:59 -06002652 mutex_unlock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002653 return ret;
2654}
2655
Jens Axboe491381ce2019-10-17 09:20:46 -06002656static void kiocb_end_write(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002657{
Jens Axboe491381ce2019-10-17 09:20:46 -06002658 /*
2659 * Tell lockdep we inherited freeze protection from submission
2660 * thread.
2661 */
2662 if (req->flags & REQ_F_ISREG) {
Pavel Begunkov1c986792021-03-22 01:58:31 +00002663 struct super_block *sb = file_inode(req->file)->i_sb;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002664
Pavel Begunkov1c986792021-03-22 01:58:31 +00002665 __sb_writers_acquired(sb, SB_FREEZE_WRITE);
2666 sb_end_write(sb);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002667 }
2668}
2669
Jens Axboeb63534c2020-06-04 11:28:00 -06002670#ifdef CONFIG_BLOCK
Pavel Begunkovdc2a6e92021-01-19 13:32:35 +00002671static bool io_resubmit_prep(struct io_kiocb *req)
Jens Axboeb63534c2020-06-04 11:28:00 -06002672{
Pavel Begunkovab454432021-03-22 01:58:33 +00002673 struct io_async_rw *rw = req->async_data;
Jens Axboeb63534c2020-06-04 11:28:00 -06002674
Pavel Begunkovab454432021-03-22 01:58:33 +00002675 if (!rw)
2676 return !io_req_prep_async(req);
Jens Axboecd658692021-09-10 11:19:14 -06002677 iov_iter_restore(&rw->iter, &rw->iter_state);
Pavel Begunkovab454432021-03-22 01:58:33 +00002678 return true;
Jens Axboeb63534c2020-06-04 11:28:00 -06002679}
Jens Axboeb63534c2020-06-04 11:28:00 -06002680
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002681static bool io_rw_should_reissue(struct io_kiocb *req)
Jens Axboeb63534c2020-06-04 11:28:00 -06002682{
Jens Axboe355afae2020-09-02 09:30:31 -06002683 umode_t mode = file_inode(req->file)->i_mode;
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002684 struct io_ring_ctx *ctx = req->ctx;
Jens Axboeb63534c2020-06-04 11:28:00 -06002685
Jens Axboe355afae2020-09-02 09:30:31 -06002686 if (!S_ISBLK(mode) && !S_ISREG(mode))
2687 return false;
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002688 if ((req->flags & REQ_F_NOWAIT) || (io_wq_current_is_worker() &&
2689 !(ctx->flags & IORING_SETUP_IOPOLL)))
Jens Axboeb63534c2020-06-04 11:28:00 -06002690 return false;
Jens Axboe7c977a52021-02-23 19:17:35 -07002691 /*
2692 * If ref is dying, we might be running poll reap from the exit work.
2693 * Don't attempt to reissue from that path, just let it fail with
2694 * -EAGAIN.
2695 */
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002696 if (percpu_ref_is_dying(&ctx->refs))
2697 return false;
Jens Axboeef046882021-07-27 10:50:31 -06002698 /*
2699 * Play it safe and assume not safe to re-import and reissue if we're
2700 * not in the original thread group (or in task context).
2701 */
2702 if (!same_thread_group(req->task, current) || !in_task())
2703 return false;
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002704 return true;
2705}
Jens Axboee82ad482021-04-02 19:45:34 -06002706#else
Jens Axboea1ff1e32021-04-12 06:40:02 -06002707static bool io_resubmit_prep(struct io_kiocb *req)
2708{
2709 return false;
2710}
Jens Axboee82ad482021-04-02 19:45:34 -06002711static bool io_rw_should_reissue(struct io_kiocb *req)
2712{
2713 return false;
2714}
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002715#endif
2716
Jens Axboeb10acfc2023-01-22 10:36:37 -07002717/*
2718 * Trigger the notifications after having done some IO, and finish the write
2719 * accounting, if any.
2720 */
2721static void io_req_io_end(struct io_kiocb *req)
2722{
2723 struct io_rw *rw = &req->rw;
2724
Jens Axboeb10acfc2023-01-22 10:36:37 -07002725 if (rw->kiocb.ki_flags & IOCB_WRITE) {
2726 kiocb_end_write(req);
2727 fsnotify_modify(req->file);
2728 } else {
2729 fsnotify_access(req->file);
2730 }
2731}
2732
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002733static bool __io_complete_rw_common(struct io_kiocb *req, long res)
Jens Axboea1d7c392020-06-22 11:09:46 -06002734{
Pavel Begunkov9532b992021-03-22 01:58:34 +00002735 if (res != req->result) {
2736 if ((res == -EAGAIN || res == -EOPNOTSUPP) &&
2737 io_rw_should_reissue(req)) {
Jens Axboeb10acfc2023-01-22 10:36:37 -07002738 /*
2739 * Reissue will start accounting again, finish the
2740 * current cycle.
2741 */
2742 io_req_io_end(req);
Pavel Begunkov9532b992021-03-22 01:58:34 +00002743 req->flags |= REQ_F_REISSUE;
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002744 return true;
Pavel Begunkov9532b992021-03-22 01:58:34 +00002745 }
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01002746 req_set_fail(req);
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002747 req->result = res;
Pavel Begunkov9532b992021-03-22 01:58:34 +00002748 }
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002749 return false;
2750}
2751
Harshit Mogalapallie326ee02023-01-10 08:46:47 -08002752static inline int io_fixup_rw_res(struct io_kiocb *req, long res)
Pavel Begunkove8574572022-10-16 22:42:56 +01002753{
2754 struct io_async_rw *io = req->async_data;
2755
2756 /* add previously done IO, if any */
2757 if (io && io->bytes_done > 0) {
2758 if (res < 0)
2759 res = io->bytes_done;
2760 else
2761 res += io->bytes_done;
2762 }
2763 return res;
2764}
2765
Pavel Begunkovf237c302021-08-18 12:42:46 +01002766static void io_req_task_complete(struct io_kiocb *req, bool *locked)
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002767{
Pavel Begunkov126180b2021-08-18 12:42:47 +01002768 unsigned int cflags = io_put_rw_kbuf(req);
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01002769 int res = req->result;
Pavel Begunkov126180b2021-08-18 12:42:47 +01002770
2771 if (*locked) {
2772 struct io_ring_ctx *ctx = req->ctx;
2773 struct io_submit_state *state = &ctx->submit_state;
2774
2775 io_req_complete_state(req, res, cflags);
2776 state->compl_reqs[state->compl_nr++] = req;
2777 if (state->compl_nr == ARRAY_SIZE(state->compl_reqs))
2778 io_submit_flush_completions(ctx);
2779 } else {
2780 io_req_complete_post(req, res, cflags);
2781 }
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002782}
2783
Jens Axboe89a410d2023-01-21 13:38:51 -07002784static void io_req_rw_complete(struct io_kiocb *req, bool *locked)
2785{
Jens Axboeb10acfc2023-01-22 10:36:37 -07002786 io_req_io_end(req);
Jens Axboe89a410d2023-01-21 13:38:51 -07002787 io_req_task_complete(req, locked);
2788}
2789
Jens Axboeba816ad2019-09-28 11:36:45 -06002790static void io_complete_rw(struct kiocb *kiocb, long res, long res2)
2791{
Jens Axboe9adbd452019-12-20 08:45:55 -07002792 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboeba816ad2019-09-28 11:36:45 -06002793
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002794 if (__io_complete_rw_common(req, res))
2795 return;
Pavel Begunkove8574572022-10-16 22:42:56 +01002796 req->result = io_fixup_rw_res(req, res);
Jens Axboe89a410d2023-01-21 13:38:51 -07002797 req->io_task_work.func = io_req_rw_complete;
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002798 io_req_task_work_add(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002799}
2800
Jens Axboedef596e2019-01-09 08:59:42 -07002801static void io_complete_rw_iopoll(struct kiocb *kiocb, long res, long res2)
2802{
Jens Axboe9adbd452019-12-20 08:45:55 -07002803 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboedef596e2019-01-09 08:59:42 -07002804
Jens Axboe491381ce2019-10-17 09:20:46 -06002805 if (kiocb->ki_flags & IOCB_WRITE)
2806 kiocb_end_write(req);
Pavel Begunkov9532b992021-03-22 01:58:34 +00002807 if (unlikely(res != req->result)) {
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01002808 if (res == -EAGAIN && io_rw_should_reissue(req)) {
2809 req->flags |= REQ_F_REISSUE;
2810 return;
Pavel Begunkov9532b992021-03-22 01:58:34 +00002811 }
Pavel Begunkov8c130822021-03-22 01:58:32 +00002812 }
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002813
2814 WRITE_ONCE(req->result, res);
Jens Axboeb9b0e0d2021-02-23 08:18:36 -07002815 /* order with io_iopoll_complete() checking ->result */
Pavel Begunkovcd664b02020-06-25 12:37:10 +03002816 smp_wmb();
2817 WRITE_ONCE(req->iopoll_completed, 1);
Jens Axboedef596e2019-01-09 08:59:42 -07002818}
2819
2820/*
2821 * After the iocb has been issued, it's safe to be found on the poll list.
2822 * Adding the kiocb to the list AFTER submission ensures that we don't
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002823 * find it from a io_do_iopoll() thread before the issuer is done
Jens Axboedef596e2019-01-09 08:59:42 -07002824 * accessing the kiocb cookie.
2825 */
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01002826static void io_iopoll_req_issued(struct io_kiocb *req)
Jens Axboedef596e2019-01-09 08:59:42 -07002827{
2828 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01002829 const bool in_async = io_wq_current_is_worker();
2830
2831 /* workqueue context doesn't hold uring_lock, grab it now */
2832 if (unlikely(in_async))
2833 mutex_lock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002834
2835 /*
2836 * Track whether we have multiple files in our lists. This will impact
2837 * how we do polling eventually, not spinning if we're on potentially
2838 * different devices.
2839 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002840 if (list_empty(&ctx->iopoll_list)) {
Hao Xu915b3dd2021-06-28 05:37:30 +08002841 ctx->poll_multi_queue = false;
2842 } else if (!ctx->poll_multi_queue) {
Jens Axboedef596e2019-01-09 08:59:42 -07002843 struct io_kiocb *list_req;
Hao Xu915b3dd2021-06-28 05:37:30 +08002844 unsigned int queue_num0, queue_num1;
Jens Axboedef596e2019-01-09 08:59:42 -07002845
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002846 list_req = list_first_entry(&ctx->iopoll_list, struct io_kiocb,
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002847 inflight_entry);
Hao Xu915b3dd2021-06-28 05:37:30 +08002848
2849 if (list_req->file != req->file) {
2850 ctx->poll_multi_queue = true;
2851 } else {
2852 queue_num0 = blk_qc_t_to_queue_num(list_req->rw.kiocb.ki_cookie);
2853 queue_num1 = blk_qc_t_to_queue_num(req->rw.kiocb.ki_cookie);
2854 if (queue_num0 != queue_num1)
2855 ctx->poll_multi_queue = true;
2856 }
Jens Axboedef596e2019-01-09 08:59:42 -07002857 }
2858
2859 /*
2860 * For fast devices, IO may have already completed. If it has, add
2861 * it to the front so we find it first.
2862 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002863 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002864 list_add(&req->inflight_entry, &ctx->iopoll_list);
Jens Axboedef596e2019-01-09 08:59:42 -07002865 else
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002866 list_add_tail(&req->inflight_entry, &ctx->iopoll_list);
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08002867
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01002868 if (unlikely(in_async)) {
2869 /*
2870 * If IORING_SETUP_SQPOLL is enabled, sqes are either handle
2871 * in sq thread task context or in io worker task context. If
2872 * current task context is sq thread, we don't need to check
2873 * whether should wake up sq thread.
2874 */
2875 if ((ctx->flags & IORING_SETUP_SQPOLL) &&
2876 wq_has_sleeper(&ctx->sq_data->wait))
2877 wake_up(&ctx->sq_data->wait);
2878
2879 mutex_unlock(&ctx->uring_lock);
2880 }
Jens Axboedef596e2019-01-09 08:59:42 -07002881}
2882
Jens Axboe4503b762020-06-01 10:00:27 -06002883static bool io_bdev_nowait(struct block_device *bdev)
2884{
Jeffle Xu9ba0d0c2020-10-19 16:59:42 +08002885 return !bdev || blk_queue_nowait(bdev_get_queue(bdev));
Jens Axboe4503b762020-06-01 10:00:27 -06002886}
2887
Jens Axboe2b188cc2019-01-07 10:46:33 -07002888/*
2889 * If we tracked the file through the SCM inflight mechanism, we could support
2890 * any file. For now, just ensure that anything potentially problematic is done
2891 * inline.
2892 */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002893static bool __io_file_supports_nowait(struct file *file, int rw)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002894{
2895 umode_t mode = file_inode(file)->i_mode;
2896
Jens Axboe4503b762020-06-01 10:00:27 -06002897 if (S_ISBLK(mode)) {
Christoph Hellwig4e7b5672020-11-23 13:38:40 +01002898 if (IS_ENABLED(CONFIG_BLOCK) &&
2899 io_bdev_nowait(I_BDEV(file->f_mapping->host)))
Jens Axboe4503b762020-06-01 10:00:27 -06002900 return true;
2901 return false;
2902 }
Pavel Begunkov976517f2021-06-09 12:07:25 +01002903 if (S_ISSOCK(mode))
Jens Axboe2b188cc2019-01-07 10:46:33 -07002904 return true;
Jens Axboe4503b762020-06-01 10:00:27 -06002905 if (S_ISREG(mode)) {
Christoph Hellwig4e7b5672020-11-23 13:38:40 +01002906 if (IS_ENABLED(CONFIG_BLOCK) &&
2907 io_bdev_nowait(file->f_inode->i_sb->s_bdev) &&
Jens Axboe4503b762020-06-01 10:00:27 -06002908 file->f_op != &io_uring_fops)
2909 return true;
2910 return false;
2911 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07002912
Jens Axboec5b85622020-06-09 19:23:05 -06002913 /* any ->read/write should understand O_NONBLOCK */
2914 if (file->f_flags & O_NONBLOCK)
2915 return true;
2916
Jens Axboeaf197f52020-04-28 13:15:06 -06002917 if (!(file->f_mode & FMODE_NOWAIT))
2918 return false;
2919
2920 if (rw == READ)
2921 return file->f_op->read_iter != NULL;
2922
2923 return file->f_op->write_iter != NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002924}
2925
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002926static bool io_file_supports_nowait(struct io_kiocb *req, int rw)
Jens Axboe7b29f922021-03-12 08:30:14 -07002927{
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002928 if (rw == READ && (req->flags & REQ_F_NOWAIT_READ))
Jens Axboe7b29f922021-03-12 08:30:14 -07002929 return true;
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002930 else if (rw == WRITE && (req->flags & REQ_F_NOWAIT_WRITE))
Jens Axboe7b29f922021-03-12 08:30:14 -07002931 return true;
2932
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002933 return __io_file_supports_nowait(req->file, rw);
Jens Axboe7b29f922021-03-12 08:30:14 -07002934}
2935
Jens Axboe5d329e12021-09-14 11:08:37 -06002936static int io_prep_rw(struct io_kiocb *req, const struct io_uring_sqe *sqe,
2937 int rw)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002938{
Jens Axboedef596e2019-01-09 08:59:42 -07002939 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe9adbd452019-12-20 08:45:55 -07002940 struct kiocb *kiocb = &req->rw.kiocb;
Pavel Begunkov75c668c2021-02-04 13:52:05 +00002941 struct file *file = req->file;
Jens Axboe09bb8392019-03-13 12:39:28 -06002942 unsigned ioprio;
2943 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002944
Pavel Begunkovc97d8a02021-08-09 13:04:04 +01002945 if (!io_req_ffs_set(req) && S_ISREG(file_inode(file)->i_mode))
Jens Axboe491381ce2019-10-17 09:20:46 -06002946 req->flags |= REQ_F_ISREG;
2947
Jens Axboe2b188cc2019-01-07 10:46:33 -07002948 kiocb->ki_pos = READ_ONCE(sqe->off);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002949 kiocb->ki_hint = ki_hint_validate(file_write_hint(kiocb->ki_filp));
Pavel Begunkov3e577dc2020-02-01 03:58:42 +03002950 kiocb->ki_flags = iocb_flags(kiocb->ki_filp);
2951 ret = kiocb_set_rw_flags(kiocb, READ_ONCE(sqe->rw_flags));
2952 if (unlikely(ret))
2953 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002954
Jens Axboe5d329e12021-09-14 11:08:37 -06002955 /*
2956 * If the file is marked O_NONBLOCK, still allow retry for it if it
2957 * supports async. Otherwise it's impossible to use O_NONBLOCK files
2958 * reliably. If not, or it IOCB_NOWAIT is set, don't retry.
2959 */
2960 if ((kiocb->ki_flags & IOCB_NOWAIT) ||
2961 ((file->f_flags & O_NONBLOCK) && !io_file_supports_nowait(req, rw)))
Pavel Begunkov75c668c2021-02-04 13:52:05 +00002962 req->flags |= REQ_F_NOWAIT;
2963
Jens Axboe2b188cc2019-01-07 10:46:33 -07002964 ioprio = READ_ONCE(sqe->ioprio);
2965 if (ioprio) {
2966 ret = ioprio_check_cap(ioprio);
2967 if (ret)
Jens Axboe09bb8392019-03-13 12:39:28 -06002968 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002969
2970 kiocb->ki_ioprio = ioprio;
2971 } else
2972 kiocb->ki_ioprio = get_current_ioprio();
2973
Jens Axboedef596e2019-01-09 08:59:42 -07002974 if (ctx->flags & IORING_SETUP_IOPOLL) {
Jens Axboedef596e2019-01-09 08:59:42 -07002975 if (!(kiocb->ki_flags & IOCB_DIRECT) ||
2976 !kiocb->ki_filp->f_op->iopoll)
Jens Axboe09bb8392019-03-13 12:39:28 -06002977 return -EOPNOTSUPP;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002978
Jens Axboe394918e2021-03-08 11:40:23 -07002979 kiocb->ki_flags |= IOCB_HIPRI | IOCB_ALLOC_CACHE;
Jens Axboedef596e2019-01-09 08:59:42 -07002980 kiocb->ki_complete = io_complete_rw_iopoll;
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002981 req->iopoll_completed = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002982 } else {
Jens Axboe09bb8392019-03-13 12:39:28 -06002983 if (kiocb->ki_flags & IOCB_HIPRI)
2984 return -EINVAL;
Jens Axboedef596e2019-01-09 08:59:42 -07002985 kiocb->ki_complete = io_complete_rw;
2986 }
Jens Axboe9adbd452019-12-20 08:45:55 -07002987
Pavel Begunkovea512d52022-06-09 08:34:35 +01002988 /* used for fixed read/write too - just read unconditionally */
2989 req->buf_index = READ_ONCE(sqe->buf_index);
2990 req->imu = NULL;
2991
Pavel Begunkoveae071c2021-04-25 14:32:24 +01002992 if (req->opcode == IORING_OP_READ_FIXED ||
2993 req->opcode == IORING_OP_WRITE_FIXED) {
Pavel Begunkovea512d52022-06-09 08:34:35 +01002994 struct io_ring_ctx *ctx = req->ctx;
2995 u16 index;
2996
2997 if (unlikely(req->buf_index >= ctx->nr_user_bufs))
2998 return -EFAULT;
2999 index = array_index_nospec(req->buf_index, ctx->nr_user_bufs);
3000 req->imu = ctx->user_bufs[index];
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003001 io_req_set_rsrc_node(req);
3002 }
3003
Jens Axboe3529d8c2019-12-19 18:24:38 -07003004 req->rw.addr = READ_ONCE(sqe->addr);
3005 req->rw.len = READ_ONCE(sqe->len);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003006 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003007}
3008
3009static inline void io_rw_done(struct kiocb *kiocb, ssize_t ret)
3010{
3011 switch (ret) {
3012 case -EIOCBQUEUED:
3013 break;
3014 case -ERESTARTSYS:
3015 case -ERESTARTNOINTR:
3016 case -ERESTARTNOHAND:
3017 case -ERESTART_RESTARTBLOCK:
3018 /*
3019 * We can't just restart the syscall, since previously
3020 * submitted sqes may already be in progress. Just fail this
3021 * IO with EINTR.
3022 */
3023 ret = -EINTR;
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -05003024 fallthrough;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003025 default:
3026 kiocb->ki_complete(kiocb, ret, 0);
3027 }
3028}
3029
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003030static inline loff_t *io_kiocb_update_pos(struct io_kiocb *req)
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003031{
3032 struct kiocb *kiocb = &req->rw.kiocb;
3033
Jens Axboe311b2982022-04-11 09:48:30 -06003034 if (kiocb->ki_pos != -1)
3035 return &kiocb->ki_pos;
3036
3037 if (!(req->file->f_mode & FMODE_STREAM)) {
3038 req->flags |= REQ_F_CUR_POS;
3039 kiocb->ki_pos = req->file->f_pos;
3040 return &kiocb->ki_pos;
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003041 }
Jens Axboe311b2982022-04-11 09:48:30 -06003042
3043 kiocb->ki_pos = 0;
3044 return NULL;
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003045}
3046
Jens Axboea1d7c392020-06-22 11:09:46 -06003047static void kiocb_done(struct kiocb *kiocb, ssize_t ret,
Pavel Begunkov889fca72021-02-10 00:03:09 +00003048 unsigned int issue_flags)
Jens Axboeba816ad2019-09-28 11:36:45 -06003049{
Jens Axboeba042912019-12-25 16:33:42 -07003050 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboe227c0c92020-08-13 11:51:40 -06003051
Jens Axboeba042912019-12-25 16:33:42 -07003052 if (req->flags & REQ_F_CUR_POS)
3053 req->file->f_pos = kiocb->ki_pos;
Jens Axboeb10acfc2023-01-22 10:36:37 -07003054 if (ret >= 0 && (kiocb->ki_complete == io_complete_rw)) {
3055 if (!__io_complete_rw_common(req, ret)) {
3056 /*
3057 * Safe to call io_end from here as we're inline
3058 * from the submission path.
3059 */
3060 io_req_io_end(req);
3061 __io_req_complete(req, issue_flags,
3062 io_fixup_rw_res(req, ret),
3063 io_put_rw_kbuf(req));
3064 }
3065 } else {
Jens Axboeba816ad2019-09-28 11:36:45 -06003066 io_rw_done(kiocb, ret);
Jens Axboeb10acfc2023-01-22 10:36:37 -07003067 }
Pavel Begunkov97284632021-04-08 19:28:03 +01003068
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01003069 if (req->flags & REQ_F_REISSUE) {
Pavel Begunkov97284632021-04-08 19:28:03 +01003070 req->flags &= ~REQ_F_REISSUE;
Jens Axboea7be7c22021-04-15 11:31:14 -06003071 if (io_resubmit_prep(req)) {
Jens Axboe773af692021-07-27 10:25:55 -06003072 io_req_task_queue_reissue(req);
Pavel Begunkov8c130822021-03-22 01:58:32 +00003073 } else {
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01003074 unsigned int cflags = io_put_rw_kbuf(req);
3075 struct io_ring_ctx *ctx = req->ctx;
3076
Pavel Begunkove8574572022-10-16 22:42:56 +01003077 ret = io_fixup_rw_res(req, ret);
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01003078 req_set_fail(req);
Hao Xu14cfbb72021-10-14 22:04:00 +08003079 if (!(issue_flags & IO_URING_F_NONBLOCK)) {
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01003080 mutex_lock(&ctx->uring_lock);
3081 __io_req_complete(req, issue_flags, ret, cflags);
3082 mutex_unlock(&ctx->uring_lock);
3083 } else {
3084 __io_req_complete(req, issue_flags, ret, cflags);
3085 }
Pavel Begunkov97284632021-04-08 19:28:03 +01003086 }
3087 }
Jens Axboeba816ad2019-09-28 11:36:45 -06003088}
3089
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003090static int __io_import_fixed(struct io_kiocb *req, int rw, struct iov_iter *iter,
3091 struct io_mapped_ubuf *imu)
Jens Axboeedafcce2019-01-09 09:16:05 -07003092{
Jens Axboe9adbd452019-12-20 08:45:55 -07003093 size_t len = req->rw.len;
Pavel Begunkov75769e32021-04-01 15:43:54 +01003094 u64 buf_end, buf_addr = req->rw.addr;
Jens Axboeedafcce2019-01-09 09:16:05 -07003095 size_t offset;
Jens Axboeedafcce2019-01-09 09:16:05 -07003096
Pavel Begunkov75769e32021-04-01 15:43:54 +01003097 if (unlikely(check_add_overflow(buf_addr, (u64)len, &buf_end)))
Jens Axboeedafcce2019-01-09 09:16:05 -07003098 return -EFAULT;
3099 /* not inside the mapped region */
Pavel Begunkov4751f532021-04-01 15:43:55 +01003100 if (unlikely(buf_addr < imu->ubuf || buf_end > imu->ubuf_end))
Jens Axboeedafcce2019-01-09 09:16:05 -07003101 return -EFAULT;
3102
3103 /*
3104 * May not be a start of buffer, set size appropriately
3105 * and advance us to the beginning.
3106 */
3107 offset = buf_addr - imu->ubuf;
3108 iov_iter_bvec(iter, rw, imu->bvec, imu->nr_bvecs, offset + len);
Jens Axboebd11b3a2019-07-20 08:37:31 -06003109
3110 if (offset) {
3111 /*
3112 * Don't use iov_iter_advance() here, as it's really slow for
3113 * using the latter parts of a big fixed buffer - it iterates
3114 * over each segment manually. We can cheat a bit here, because
3115 * we know that:
3116 *
3117 * 1) it's a BVEC iter, we set it up
3118 * 2) all bvecs are PAGE_SIZE in size, except potentially the
3119 * first and last bvec
3120 *
3121 * So just find our index, and adjust the iterator afterwards.
3122 * If the offset is within the first bvec (or the whole first
3123 * bvec, just use iov_iter_advance(). This makes it easier
3124 * since we can just skip the first segment, which may not
3125 * be PAGE_SIZE aligned.
3126 */
3127 const struct bio_vec *bvec = imu->bvec;
3128
3129 if (offset <= bvec->bv_len) {
3130 iov_iter_advance(iter, offset);
3131 } else {
3132 unsigned long seg_skip;
3133
3134 /* skip first vec */
3135 offset -= bvec->bv_len;
3136 seg_skip = 1 + (offset >> PAGE_SHIFT);
3137
3138 iter->bvec = bvec + seg_skip;
3139 iter->nr_segs -= seg_skip;
Aleix Roca Nonell99c79f62019-08-15 14:03:22 +02003140 iter->count -= bvec->bv_len + offset;
Jens Axboebd11b3a2019-07-20 08:37:31 -06003141 iter->iov_offset = offset & ~PAGE_MASK;
Jens Axboebd11b3a2019-07-20 08:37:31 -06003142 }
3143 }
3144
Pavel Begunkov847595d2021-02-04 13:52:06 +00003145 return 0;
Jens Axboeedafcce2019-01-09 09:16:05 -07003146}
3147
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003148static int io_import_fixed(struct io_kiocb *req, int rw, struct iov_iter *iter)
3149{
Pavel Begunkovea512d52022-06-09 08:34:35 +01003150 if (WARN_ON_ONCE(!req->imu))
3151 return -EFAULT;
3152 return __io_import_fixed(req, rw, iter, req->imu);
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003153}
3154
Jens Axboebcda7ba2020-02-23 16:42:51 -07003155static void io_ring_submit_unlock(struct io_ring_ctx *ctx, bool needs_lock)
3156{
3157 if (needs_lock)
3158 mutex_unlock(&ctx->uring_lock);
3159}
3160
3161static void io_ring_submit_lock(struct io_ring_ctx *ctx, bool needs_lock)
3162{
3163 /*
3164 * "Normal" inline submissions always hold the uring_lock, since we
3165 * grab it from the system call. Same is true for the SQPOLL offload.
3166 * The only exception is when we've detached the request and issue it
3167 * from an async worker thread, grab the lock for that case.
3168 */
3169 if (needs_lock)
3170 mutex_lock(&ctx->uring_lock);
3171}
3172
3173static struct io_buffer *io_buffer_select(struct io_kiocb *req, size_t *len,
3174 int bgid, struct io_buffer *kbuf,
3175 bool needs_lock)
3176{
3177 struct io_buffer *head;
3178
3179 if (req->flags & REQ_F_BUFFER_SELECTED)
3180 return kbuf;
3181
3182 io_ring_submit_lock(req->ctx, needs_lock);
3183
3184 lockdep_assert_held(&req->ctx->uring_lock);
3185
Jens Axboe9e15c3a2021-03-13 12:29:43 -07003186 head = xa_load(&req->ctx->io_buffers, bgid);
Jens Axboebcda7ba2020-02-23 16:42:51 -07003187 if (head) {
3188 if (!list_empty(&head->list)) {
3189 kbuf = list_last_entry(&head->list, struct io_buffer,
3190 list);
3191 list_del(&kbuf->list);
3192 } else {
3193 kbuf = head;
Jens Axboe9e15c3a2021-03-13 12:29:43 -07003194 xa_erase(&req->ctx->io_buffers, bgid);
Jens Axboebcda7ba2020-02-23 16:42:51 -07003195 }
3196 if (*len > kbuf->len)
3197 *len = kbuf->len;
3198 } else {
3199 kbuf = ERR_PTR(-ENOBUFS);
3200 }
3201
3202 io_ring_submit_unlock(req->ctx, needs_lock);
3203
3204 return kbuf;
3205}
3206
Jens Axboe4d954c22020-02-27 07:31:19 -07003207static void __user *io_rw_buffer_select(struct io_kiocb *req, size_t *len,
3208 bool needs_lock)
3209{
3210 struct io_buffer *kbuf;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003211 u16 bgid;
Jens Axboe4d954c22020-02-27 07:31:19 -07003212
3213 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003214 bgid = req->buf_index;
Jens Axboe4d954c22020-02-27 07:31:19 -07003215 kbuf = io_buffer_select(req, len, bgid, kbuf, needs_lock);
3216 if (IS_ERR(kbuf))
3217 return kbuf;
3218 req->rw.addr = (u64) (unsigned long) kbuf;
3219 req->flags |= REQ_F_BUFFER_SELECTED;
3220 return u64_to_user_ptr(kbuf->addr);
3221}
3222
3223#ifdef CONFIG_COMPAT
3224static ssize_t io_compat_import(struct io_kiocb *req, struct iovec *iov,
3225 bool needs_lock)
3226{
3227 struct compat_iovec __user *uiov;
3228 compat_ssize_t clen;
3229 void __user *buf;
3230 ssize_t len;
3231
3232 uiov = u64_to_user_ptr(req->rw.addr);
3233 if (!access_ok(uiov, sizeof(*uiov)))
3234 return -EFAULT;
3235 if (__get_user(clen, &uiov->iov_len))
3236 return -EFAULT;
3237 if (clen < 0)
3238 return -EINVAL;
3239
3240 len = clen;
3241 buf = io_rw_buffer_select(req, &len, needs_lock);
3242 if (IS_ERR(buf))
3243 return PTR_ERR(buf);
3244 iov[0].iov_base = buf;
3245 iov[0].iov_len = (compat_size_t) len;
3246 return 0;
3247}
3248#endif
3249
3250static ssize_t __io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
3251 bool needs_lock)
3252{
3253 struct iovec __user *uiov = u64_to_user_ptr(req->rw.addr);
3254 void __user *buf;
3255 ssize_t len;
3256
3257 if (copy_from_user(iov, uiov, sizeof(*uiov)))
3258 return -EFAULT;
3259
3260 len = iov[0].iov_len;
3261 if (len < 0)
3262 return -EINVAL;
3263 buf = io_rw_buffer_select(req, &len, needs_lock);
3264 if (IS_ERR(buf))
3265 return PTR_ERR(buf);
3266 iov[0].iov_base = buf;
3267 iov[0].iov_len = len;
3268 return 0;
3269}
3270
3271static ssize_t io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
3272 bool needs_lock)
3273{
Jens Axboedddb3e22020-06-04 11:27:01 -06003274 if (req->flags & REQ_F_BUFFER_SELECTED) {
3275 struct io_buffer *kbuf;
3276
3277 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
3278 iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
3279 iov[0].iov_len = kbuf->len;
Jens Axboe4d954c22020-02-27 07:31:19 -07003280 return 0;
Jens Axboedddb3e22020-06-04 11:27:01 -06003281 }
Pavel Begunkovdd201662020-12-19 03:15:43 +00003282 if (req->rw.len != 1)
Jens Axboe4d954c22020-02-27 07:31:19 -07003283 return -EINVAL;
3284
3285#ifdef CONFIG_COMPAT
3286 if (req->ctx->compat)
3287 return io_compat_import(req, iov, needs_lock);
3288#endif
3289
3290 return __io_iov_buffer_select(req, iov, needs_lock);
3291}
3292
Pavel Begunkov847595d2021-02-04 13:52:06 +00003293static int io_import_iovec(int rw, struct io_kiocb *req, struct iovec **iovec,
3294 struct iov_iter *iter, bool needs_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003295{
Jens Axboe9adbd452019-12-20 08:45:55 -07003296 void __user *buf = u64_to_user_ptr(req->rw.addr);
3297 size_t sqe_len = req->rw.len;
Pavel Begunkov847595d2021-02-04 13:52:06 +00003298 u8 opcode = req->opcode;
Jens Axboe4d954c22020-02-27 07:31:19 -07003299 ssize_t ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07003300
Pavel Begunkov7d009162019-11-25 23:14:40 +03003301 if (opcode == IORING_OP_READ_FIXED || opcode == IORING_OP_WRITE_FIXED) {
Jens Axboeedafcce2019-01-09 09:16:05 -07003302 *iovec = NULL;
Jens Axboe9adbd452019-12-20 08:45:55 -07003303 return io_import_fixed(req, rw, iter);
Jens Axboeedafcce2019-01-09 09:16:05 -07003304 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07003305
Jens Axboebcda7ba2020-02-23 16:42:51 -07003306 /* buffer index only valid with fixed read/write, or buffer select */
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003307 if (req->buf_index && !(req->flags & REQ_F_BUFFER_SELECT))
Jens Axboe9adbd452019-12-20 08:45:55 -07003308 return -EINVAL;
3309
Jens Axboe3a6820f2019-12-22 15:19:35 -07003310 if (opcode == IORING_OP_READ || opcode == IORING_OP_WRITE) {
Jens Axboebcda7ba2020-02-23 16:42:51 -07003311 if (req->flags & REQ_F_BUFFER_SELECT) {
Jens Axboe4d954c22020-02-27 07:31:19 -07003312 buf = io_rw_buffer_select(req, &sqe_len, needs_lock);
Pavel Begunkov867a23e2020-08-20 11:34:39 +03003313 if (IS_ERR(buf))
Jens Axboe4d954c22020-02-27 07:31:19 -07003314 return PTR_ERR(buf);
Jens Axboe3f9d6442020-03-11 12:27:04 -06003315 req->rw.len = sqe_len;
Jens Axboebcda7ba2020-02-23 16:42:51 -07003316 }
3317
Jens Axboe3a6820f2019-12-22 15:19:35 -07003318 ret = import_single_range(rw, buf, sqe_len, *iovec, iter);
3319 *iovec = NULL;
David Laight10fc72e2020-11-07 13:16:25 +00003320 return ret;
Jens Axboe3a6820f2019-12-22 15:19:35 -07003321 }
3322
Jens Axboe4d954c22020-02-27 07:31:19 -07003323 if (req->flags & REQ_F_BUFFER_SELECT) {
3324 ret = io_iov_buffer_select(req, *iovec, needs_lock);
Pavel Begunkov847595d2021-02-04 13:52:06 +00003325 if (!ret)
3326 iov_iter_init(iter, rw, *iovec, 1, (*iovec)->iov_len);
Jens Axboe4d954c22020-02-27 07:31:19 -07003327 *iovec = NULL;
3328 return ret;
3329 }
3330
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02003331 return __import_iovec(rw, buf, sqe_len, UIO_FASTIOV, iovec, iter,
3332 req->ctx->compat);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003333}
3334
Jens Axboe0fef9482020-08-26 10:36:20 -06003335static inline loff_t *io_kiocb_ppos(struct kiocb *kiocb)
3336{
Pavel Begunkov5b09e372020-09-30 22:57:15 +03003337 return (kiocb->ki_filp->f_mode & FMODE_STREAM) ? NULL : &kiocb->ki_pos;
Jens Axboe0fef9482020-08-26 10:36:20 -06003338}
3339
Jens Axboe32960612019-09-23 11:05:34 -06003340/*
3341 * For files that don't have ->read_iter() and ->write_iter(), handle them
3342 * by looping over ->read() or ->write() manually.
3343 */
Jens Axboe4017eb92020-10-22 14:14:12 -06003344static ssize_t loop_rw_iter(int rw, struct io_kiocb *req, struct iov_iter *iter)
Jens Axboe32960612019-09-23 11:05:34 -06003345{
Jens Axboe4017eb92020-10-22 14:14:12 -06003346 struct kiocb *kiocb = &req->rw.kiocb;
3347 struct file *file = req->file;
Jens Axboe32960612019-09-23 11:05:34 -06003348 ssize_t ret = 0;
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003349 loff_t *ppos;
Jens Axboe32960612019-09-23 11:05:34 -06003350
3351 /*
3352 * Don't support polled IO through this interface, and we can't
3353 * support non-blocking either. For the latter, this just causes
3354 * the kiocb to be handled from an async context.
3355 */
3356 if (kiocb->ki_flags & IOCB_HIPRI)
3357 return -EOPNOTSUPP;
3358 if (kiocb->ki_flags & IOCB_NOWAIT)
3359 return -EAGAIN;
3360
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003361 ppos = io_kiocb_ppos(kiocb);
3362
Jens Axboe32960612019-09-23 11:05:34 -06003363 while (iov_iter_count(iter)) {
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003364 struct iovec iovec;
Jens Axboe32960612019-09-23 11:05:34 -06003365 ssize_t nr;
3366
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003367 if (!iov_iter_is_bvec(iter)) {
3368 iovec = iov_iter_iovec(iter);
3369 } else {
Jens Axboe4017eb92020-10-22 14:14:12 -06003370 iovec.iov_base = u64_to_user_ptr(req->rw.addr);
3371 iovec.iov_len = req->rw.len;
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003372 }
3373
Jens Axboe32960612019-09-23 11:05:34 -06003374 if (rw == READ) {
3375 nr = file->f_op->read(file, iovec.iov_base,
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003376 iovec.iov_len, ppos);
Jens Axboe32960612019-09-23 11:05:34 -06003377 } else {
3378 nr = file->f_op->write(file, iovec.iov_base,
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003379 iovec.iov_len, ppos);
Jens Axboe32960612019-09-23 11:05:34 -06003380 }
3381
3382 if (nr < 0) {
3383 if (!ret)
3384 ret = nr;
3385 break;
3386 }
Jens Axboe109dda42022-03-18 11:28:13 -06003387 ret += nr;
Jens Axboe16c8d2d2021-09-12 06:45:07 -06003388 if (!iov_iter_is_bvec(iter)) {
3389 iov_iter_advance(iter, nr);
3390 } else {
Jens Axboe16c8d2d2021-09-12 06:45:07 -06003391 req->rw.addr += nr;
Jens Axboe109dda42022-03-18 11:28:13 -06003392 req->rw.len -= nr;
3393 if (!req->rw.len)
3394 break;
Jens Axboe16c8d2d2021-09-12 06:45:07 -06003395 }
Jens Axboe32960612019-09-23 11:05:34 -06003396 if (nr != iovec.iov_len)
3397 break;
Jens Axboe32960612019-09-23 11:05:34 -06003398 }
3399
3400 return ret;
3401}
3402
Jens Axboeff6165b2020-08-13 09:47:43 -06003403static void io_req_map_rw(struct io_kiocb *req, const struct iovec *iovec,
3404 const struct iovec *fast_iov, struct iov_iter *iter)
Jens Axboef67676d2019-12-02 11:03:47 -07003405{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003406 struct io_async_rw *rw = req->async_data;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003407
Jens Axboeff6165b2020-08-13 09:47:43 -06003408 memcpy(&rw->iter, iter, sizeof(*iter));
Pavel Begunkovafb87652020-09-06 00:45:46 +03003409 rw->free_iovec = iovec;
Jens Axboe227c0c92020-08-13 11:51:40 -06003410 rw->bytes_done = 0;
Jens Axboeff6165b2020-08-13 09:47:43 -06003411 /* can only be fixed buffers, no need to do anything */
Pavel Begunkov9c3a2052020-11-23 23:20:27 +00003412 if (iov_iter_is_bvec(iter))
Jens Axboeff6165b2020-08-13 09:47:43 -06003413 return;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003414 if (!iovec) {
Jens Axboeff6165b2020-08-13 09:47:43 -06003415 unsigned iov_off = 0;
3416
3417 rw->iter.iov = rw->fast_iov;
3418 if (iter->iov != fast_iov) {
3419 iov_off = iter->iov - fast_iov;
3420 rw->iter.iov += iov_off;
3421 }
3422 if (rw->fast_iov != fast_iov)
3423 memcpy(rw->fast_iov + iov_off, fast_iov + iov_off,
Xiaoguang Wang45097da2020-04-08 22:29:58 +08003424 sizeof(struct iovec) * iter->nr_segs);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03003425 } else {
3426 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboef67676d2019-12-02 11:03:47 -07003427 }
3428}
3429
Pavel Begunkov6cb78682021-02-28 22:35:17 +00003430static inline int io_alloc_async_data(struct io_kiocb *req)
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003431{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003432 WARN_ON_ONCE(!io_op_defs[req->opcode].async_size);
3433 req->async_data = kmalloc(io_op_defs[req->opcode].async_size, GFP_KERNEL);
3434 return req->async_data == NULL;
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003435}
3436
Jens Axboeff6165b2020-08-13 09:47:43 -06003437static int io_setup_async_rw(struct io_kiocb *req, const struct iovec *iovec,
3438 const struct iovec *fast_iov,
Jens Axboe227c0c92020-08-13 11:51:40 -06003439 struct iov_iter *iter, bool force)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003440{
Pavel Begunkov26f05052021-02-28 22:35:18 +00003441 if (!force && !io_op_defs[req->opcode].needs_async_setup)
Jens Axboe74566df2020-01-13 19:23:24 -07003442 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003443 if (!req->async_data) {
Jens Axboecd658692021-09-10 11:19:14 -06003444 struct io_async_rw *iorw;
3445
Pavel Begunkov6cb78682021-02-28 22:35:17 +00003446 if (io_alloc_async_data(req)) {
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003447 kfree(iovec);
Jens Axboe5d204bc2020-01-31 12:06:52 -07003448 return -ENOMEM;
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003449 }
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003450
Jens Axboeff6165b2020-08-13 09:47:43 -06003451 io_req_map_rw(req, iovec, fast_iov, iter);
Jens Axboecd658692021-09-10 11:19:14 -06003452 iorw = req->async_data;
3453 /* we've copied and mapped the iter, ensure state is saved */
3454 iov_iter_save_state(&iorw->iter, &iorw->iter_state);
Jens Axboe5d204bc2020-01-31 12:06:52 -07003455 }
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003456 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07003457}
3458
Pavel Begunkov73debe62020-09-30 22:57:54 +03003459static inline int io_rw_prep_async(struct io_kiocb *req, int rw)
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003460{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003461 struct io_async_rw *iorw = req->async_data;
Pavel Begunkovf4bff102020-09-06 00:45:45 +03003462 struct iovec *iov = iorw->fast_iov;
Pavel Begunkov847595d2021-02-04 13:52:06 +00003463 int ret;
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003464
Pavel Begunkov2846c482020-11-07 13:16:27 +00003465 ret = io_import_iovec(rw, req, &iov, &iorw->iter, false);
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003466 if (unlikely(ret < 0))
3467 return ret;
3468
Pavel Begunkovab0b1962020-09-06 00:45:47 +03003469 iorw->bytes_done = 0;
3470 iorw->free_iovec = iov;
3471 if (iov)
3472 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboecd658692021-09-10 11:19:14 -06003473 iov_iter_save_state(&iorw->iter, &iorw->iter_state);
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003474 return 0;
3475}
3476
Pavel Begunkov73debe62020-09-30 22:57:54 +03003477static int io_read_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003478{
Jens Axboe3529d8c2019-12-19 18:24:38 -07003479 if (unlikely(!(req->file->f_mode & FMODE_READ)))
3480 return -EBADF;
Jens Axboe5d329e12021-09-14 11:08:37 -06003481 return io_prep_rw(req, sqe, READ);
Jens Axboef67676d2019-12-02 11:03:47 -07003482}
3483
Jens Axboec1dd91d2020-08-03 16:43:59 -06003484/*
3485 * This is our waitqueue callback handler, registered through lock_page_async()
3486 * when we initially tried to do the IO with the iocb armed our waitqueue.
3487 * This gets called when the page is unlocked, and we generally expect that to
3488 * happen when the page IO is completed and the page is now uptodate. This will
3489 * queue a task_work based retry of the operation, attempting to copy the data
3490 * again. If the latter fails because the page was NOT uptodate, then we will
3491 * do a thread based blocking retry of the operation. That's the unexpected
3492 * slow path.
3493 */
Jens Axboebcf5a062020-05-22 09:24:42 -06003494static int io_async_buf_func(struct wait_queue_entry *wait, unsigned mode,
3495 int sync, void *arg)
3496{
3497 struct wait_page_queue *wpq;
3498 struct io_kiocb *req = wait->private;
Jens Axboebcf5a062020-05-22 09:24:42 -06003499 struct wait_page_key *key = arg;
Jens Axboebcf5a062020-05-22 09:24:42 -06003500
3501 wpq = container_of(wait, struct wait_page_queue, wait);
3502
Linus Torvaldscdc8fcb2020-08-03 13:01:22 -07003503 if (!wake_page_match(wpq, key))
3504 return 0;
3505
Hao Xuc8d317a2020-09-29 20:00:45 +08003506 req->rw.kiocb.ki_flags &= ~IOCB_WAITQ;
Jens Axboebcf5a062020-05-22 09:24:42 -06003507 list_del_init(&wait->entry);
Pavel Begunkov921b9052021-02-12 03:23:53 +00003508 io_req_task_queue(req);
Jens Axboebcf5a062020-05-22 09:24:42 -06003509 return 1;
3510}
3511
Jens Axboec1dd91d2020-08-03 16:43:59 -06003512/*
3513 * This controls whether a given IO request should be armed for async page
3514 * based retry. If we return false here, the request is handed to the async
3515 * worker threads for retry. If we're doing buffered reads on a regular file,
3516 * we prepare a private wait_page_queue entry and retry the operation. This
3517 * will either succeed because the page is now uptodate and unlocked, or it
3518 * will register a callback when the page is unlocked at IO completion. Through
3519 * that callback, io_uring uses task_work to setup a retry of the operation.
3520 * That retry will attempt the buffered read again. The retry will generally
3521 * succeed, or in rare cases where it fails, we then fall back to using the
3522 * async worker threads for a blocking retry.
3523 */
Jens Axboe227c0c92020-08-13 11:51:40 -06003524static bool io_rw_should_retry(struct io_kiocb *req)
Jens Axboebcf5a062020-05-22 09:24:42 -06003525{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003526 struct io_async_rw *rw = req->async_data;
3527 struct wait_page_queue *wait = &rw->wpq;
Jens Axboebcf5a062020-05-22 09:24:42 -06003528 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboebcf5a062020-05-22 09:24:42 -06003529
3530 /* never retry for NOWAIT, we just complete with -EAGAIN */
3531 if (req->flags & REQ_F_NOWAIT)
3532 return false;
3533
Jens Axboe227c0c92020-08-13 11:51:40 -06003534 /* Only for buffered IO */
Jens Axboe3b2a4432020-08-16 10:58:43 -07003535 if (kiocb->ki_flags & (IOCB_DIRECT | IOCB_HIPRI))
Jens Axboebcf5a062020-05-22 09:24:42 -06003536 return false;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003537
Jens Axboebcf5a062020-05-22 09:24:42 -06003538 /*
3539 * just use poll if we can, and don't attempt if the fs doesn't
3540 * support callback based unlocks
3541 */
3542 if (file_can_poll(req->file) || !(req->file->f_mode & FMODE_BUF_RASYNC))
3543 return false;
3544
Jens Axboe3b2a4432020-08-16 10:58:43 -07003545 wait->wait.func = io_async_buf_func;
3546 wait->wait.private = req;
3547 wait->wait.flags = 0;
3548 INIT_LIST_HEAD(&wait->wait.entry);
3549 kiocb->ki_flags |= IOCB_WAITQ;
Hao Xuc8d317a2020-09-29 20:00:45 +08003550 kiocb->ki_flags &= ~IOCB_NOWAIT;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003551 kiocb->ki_waitq = wait;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003552 return true;
Jens Axboebcf5a062020-05-22 09:24:42 -06003553}
3554
Pavel Begunkovaeab9502021-06-14 02:36:24 +01003555static inline int io_iter_do_read(struct io_kiocb *req, struct iov_iter *iter)
Jens Axboebcf5a062020-05-22 09:24:42 -06003556{
3557 if (req->file->f_op->read_iter)
3558 return call_read_iter(req->file, &req->rw.kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003559 else if (req->file->f_op->read)
Jens Axboe4017eb92020-10-22 14:14:12 -06003560 return loop_rw_iter(READ, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003561 else
3562 return -EINVAL;
Jens Axboebcf5a062020-05-22 09:24:42 -06003563}
3564
Ming Lei7db30432021-08-21 23:07:51 +08003565static bool need_read_all(struct io_kiocb *req)
3566{
3567 return req->flags & REQ_F_ISREG ||
3568 S_ISBLK(file_inode(req->file)->i_mode);
3569}
3570
Pavel Begunkov889fca72021-02-10 00:03:09 +00003571static int io_read(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003572{
3573 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003574 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003575 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003576 struct io_async_rw *rw = req->async_data;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003577 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboecd658692021-09-10 11:19:14 -06003578 struct iov_iter_state __state, *state;
3579 ssize_t ret, ret2;
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003580 loff_t *ppos;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003581
Pavel Begunkov2846c482020-11-07 13:16:27 +00003582 if (rw) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07003583 iter = &rw->iter;
Jens Axboecd658692021-09-10 11:19:14 -06003584 state = &rw->iter_state;
3585 /*
3586 * We come here from an earlier attempt, restore our state to
3587 * match in case it doesn't. It's cheap enough that we don't
3588 * need to make this conditional.
3589 */
3590 iov_iter_restore(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003591 iovec = NULL;
3592 } else {
3593 ret = io_import_iovec(READ, req, &iovec, iter, !force_nonblock);
3594 if (ret < 0)
3595 return ret;
Jens Axboecd658692021-09-10 11:19:14 -06003596 state = &__state;
3597 iov_iter_save_state(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003598 }
Jens Axboecd658692021-09-10 11:19:14 -06003599 req->result = iov_iter_count(iter);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003600
Jens Axboefd6c2e42019-12-18 12:19:41 -07003601 /* Ensure we clear previously set non-block flag */
3602 if (!force_nonblock)
Jens Axboe29de5f62020-02-20 09:56:08 -07003603 kiocb->ki_flags &= ~IOCB_NOWAIT;
Pavel Begunkova88fc402020-09-30 22:57:53 +03003604 else
3605 kiocb->ki_flags |= IOCB_NOWAIT;
3606
Pavel Begunkov24c74672020-06-21 13:09:51 +03003607 /* If the file doesn't support async, just async punt */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01003608 if (force_nonblock && !io_file_supports_nowait(req, READ)) {
Pavel Begunkov6713e7a2021-02-04 13:51:59 +00003609 ret = io_setup_async_rw(req, iovec, inline_vecs, iter, true);
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003610 return ret ?: -EAGAIN;
Pavel Begunkov6713e7a2021-02-04 13:51:59 +00003611 }
Jens Axboe9e645e112019-05-10 16:07:28 -06003612
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003613 ppos = io_kiocb_update_pos(req);
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003614
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003615 ret = rw_verify_area(READ, req->file, ppos, req->result);
Pavel Begunkov5ea5dd42021-02-04 13:52:03 +00003616 if (unlikely(ret)) {
3617 kfree(iovec);
3618 return ret;
3619 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07003620
Jens Axboe227c0c92020-08-13 11:51:40 -06003621 ret = io_iter_do_read(req, iter);
Jens Axboe32960612019-09-23 11:05:34 -06003622
Jens Axboe230d50d2021-04-01 20:41:15 -06003623 if (ret == -EAGAIN || (req->flags & REQ_F_REISSUE)) {
Pavel Begunkov6ad7f232021-04-08 01:54:39 +01003624 req->flags &= ~REQ_F_REISSUE;
Jens Axboeeefdf302020-08-27 16:40:19 -06003625 /* IOPOLL retry should happen for io-wq threads */
3626 if (!force_nonblock && !(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboef91daf52020-08-15 15:58:42 -07003627 goto done;
Pavel Begunkov75c668c2021-02-04 13:52:05 +00003628 /* no retry on NONBLOCK nor RWF_NOWAIT */
3629 if (req->flags & REQ_F_NOWAIT)
Jens Axboe355afae2020-09-02 09:30:31 -06003630 goto done;
Jens Axboef38c7e32020-09-25 15:23:43 -06003631 ret = 0;
Jens Axboe230d50d2021-04-01 20:41:15 -06003632 } else if (ret == -EIOCBQUEUED) {
3633 goto out_free;
Jens Axboecd658692021-09-10 11:19:14 -06003634 } else if (ret <= 0 || ret == req->result || !force_nonblock ||
Ming Lei7db30432021-08-21 23:07:51 +08003635 (req->flags & REQ_F_NOWAIT) || !need_read_all(req)) {
Pavel Begunkov7335e3b2021-02-04 13:52:02 +00003636 /* read all, failed, already did sync or don't want to retry */
Jens Axboe00d23d52020-08-25 12:59:22 -06003637 goto done;
Jens Axboe227c0c92020-08-13 11:51:40 -06003638 }
3639
Jens Axboecd658692021-09-10 11:19:14 -06003640 /*
3641 * Don't depend on the iter state matching what was consumed, or being
3642 * untouched in case of error. Restore it and we'll advance it
3643 * manually if we need to.
3644 */
3645 iov_iter_restore(iter, state);
3646
Jens Axboe227c0c92020-08-13 11:51:40 -06003647 ret2 = io_setup_async_rw(req, iovec, inline_vecs, iter, true);
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003648 if (ret2)
3649 return ret2;
3650
Pavel Begunkovfe1cdd52021-02-17 21:02:36 +00003651 iovec = NULL;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003652 rw = req->async_data;
Jens Axboecd658692021-09-10 11:19:14 -06003653 /*
3654 * Now use our persistent iterator and state, if we aren't already.
3655 * We've restored and mapped the iter to match.
3656 */
3657 if (iter != &rw->iter) {
3658 iter = &rw->iter;
3659 state = &rw->iter_state;
3660 }
Jens Axboe227c0c92020-08-13 11:51:40 -06003661
Pavel Begunkovb23df912021-02-04 13:52:04 +00003662 do {
Jens Axboecd658692021-09-10 11:19:14 -06003663 /*
3664 * We end up here because of a partial read, either from
3665 * above or inside this loop. Advance the iter by the bytes
3666 * that were consumed.
3667 */
3668 iov_iter_advance(iter, ret);
3669 if (!iov_iter_count(iter))
3670 break;
Pavel Begunkovb23df912021-02-04 13:52:04 +00003671 rw->bytes_done += ret;
Jens Axboecd658692021-09-10 11:19:14 -06003672 iov_iter_save_state(iter, state);
3673
Pavel Begunkovb23df912021-02-04 13:52:04 +00003674 /* if we can retry, do so with the callbacks armed */
3675 if (!io_rw_should_retry(req)) {
3676 kiocb->ki_flags &= ~IOCB_WAITQ;
3677 return -EAGAIN;
3678 }
3679
Pavel Begunkov98aada62022-10-16 22:42:58 +01003680 req->result = iov_iter_count(iter);
Pavel Begunkovb23df912021-02-04 13:52:04 +00003681 /*
3682 * Now retry read with the IOCB_WAITQ parts set in the iocb. If
3683 * we get -EIOCBQUEUED, then we'll get a notification when the
3684 * desired page gets unlocked. We can also get a partial read
3685 * here, and if we do, then just retry at the new offset.
3686 */
3687 ret = io_iter_do_read(req, iter);
3688 if (ret == -EIOCBQUEUED)
3689 return 0;
Jens Axboe227c0c92020-08-13 11:51:40 -06003690 /* we got some bytes, but not all. retry. */
Jens Axboeb5b0ecb2021-03-04 21:02:58 -07003691 kiocb->ki_flags &= ~IOCB_WAITQ;
Jens Axboecd658692021-09-10 11:19:14 -06003692 iov_iter_restore(iter, state);
3693 } while (ret > 0);
Jens Axboe227c0c92020-08-13 11:51:40 -06003694done:
Pavel Begunkov889fca72021-02-10 00:03:09 +00003695 kiocb_done(kiocb, ret, issue_flags);
Pavel Begunkovfe1cdd52021-02-17 21:02:36 +00003696out_free:
3697 /* it's faster to check here then delegate to kfree */
3698 if (iovec)
3699 kfree(iovec);
Pavel Begunkov5ea5dd42021-02-04 13:52:03 +00003700 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003701}
3702
Pavel Begunkov73debe62020-09-30 22:57:54 +03003703static int io_write_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003704{
Jens Axboe3529d8c2019-12-19 18:24:38 -07003705 if (unlikely(!(req->file->f_mode & FMODE_WRITE)))
3706 return -EBADF;
Jens Axboe5d329e12021-09-14 11:08:37 -06003707 return io_prep_rw(req, sqe, WRITE);
Jens Axboef67676d2019-12-02 11:03:47 -07003708}
3709
Pavel Begunkov889fca72021-02-10 00:03:09 +00003710static int io_write(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003711{
3712 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003713 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003714 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003715 struct io_async_rw *rw = req->async_data;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003716 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboecd658692021-09-10 11:19:14 -06003717 struct iov_iter_state __state, *state;
3718 ssize_t ret, ret2;
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003719 loff_t *ppos;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003720
Pavel Begunkov2846c482020-11-07 13:16:27 +00003721 if (rw) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07003722 iter = &rw->iter;
Jens Axboecd658692021-09-10 11:19:14 -06003723 state = &rw->iter_state;
3724 iov_iter_restore(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003725 iovec = NULL;
3726 } else {
3727 ret = io_import_iovec(WRITE, req, &iovec, iter, !force_nonblock);
3728 if (ret < 0)
3729 return ret;
Jens Axboecd658692021-09-10 11:19:14 -06003730 state = &__state;
3731 iov_iter_save_state(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003732 }
Jens Axboecd658692021-09-10 11:19:14 -06003733 req->result = iov_iter_count(iter);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003734
Jens Axboefd6c2e42019-12-18 12:19:41 -07003735 /* Ensure we clear previously set non-block flag */
3736 if (!force_nonblock)
Pavel Begunkova88fc402020-09-30 22:57:53 +03003737 kiocb->ki_flags &= ~IOCB_NOWAIT;
3738 else
3739 kiocb->ki_flags |= IOCB_NOWAIT;
Jens Axboefd6c2e42019-12-18 12:19:41 -07003740
Pavel Begunkov24c74672020-06-21 13:09:51 +03003741 /* If the file doesn't support async, just async punt */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01003742 if (force_nonblock && !io_file_supports_nowait(req, WRITE))
Jens Axboef67676d2019-12-02 11:03:47 -07003743 goto copy_iov;
Jens Axboef67676d2019-12-02 11:03:47 -07003744
Jens Axboe10d59342019-12-09 20:16:22 -07003745 /* file path doesn't support NOWAIT for non-direct_IO */
3746 if (force_nonblock && !(kiocb->ki_flags & IOCB_DIRECT) &&
3747 (req->flags & REQ_F_ISREG))
Jens Axboef67676d2019-12-02 11:03:47 -07003748 goto copy_iov;
Jens Axboe9e645e112019-05-10 16:07:28 -06003749
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003750 ppos = io_kiocb_update_pos(req);
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003751
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003752 ret = rw_verify_area(WRITE, req->file, ppos, req->result);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003753 if (unlikely(ret))
3754 goto out_free;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003755
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003756 /*
3757 * Open-code file_start_write here to grab freeze protection,
3758 * which will be released by another thread in
3759 * io_complete_rw(). Fool lockdep by telling it the lock got
3760 * released so that it doesn't complain about the held lock when
3761 * we return to userspace.
3762 */
3763 if (req->flags & REQ_F_ISREG) {
Darrick J. Wong8a3c84b2020-11-10 16:50:21 -08003764 sb_start_write(file_inode(req->file)->i_sb);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003765 __sb_writers_release(file_inode(req->file)->i_sb,
3766 SB_FREEZE_WRITE);
3767 }
3768 kiocb->ki_flags |= IOCB_WRITE;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003769
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003770 if (req->file->f_op->write_iter)
Jens Axboeff6165b2020-08-13 09:47:43 -06003771 ret2 = call_write_iter(req->file, kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003772 else if (req->file->f_op->write)
Jens Axboe4017eb92020-10-22 14:14:12 -06003773 ret2 = loop_rw_iter(WRITE, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003774 else
3775 ret2 = -EINVAL;
Jens Axboe4ed734b2020-03-20 11:23:41 -06003776
Pavel Begunkov6ad7f232021-04-08 01:54:39 +01003777 if (req->flags & REQ_F_REISSUE) {
3778 req->flags &= ~REQ_F_REISSUE;
Jens Axboe230d50d2021-04-01 20:41:15 -06003779 ret2 = -EAGAIN;
Pavel Begunkov6ad7f232021-04-08 01:54:39 +01003780 }
Jens Axboe230d50d2021-04-01 20:41:15 -06003781
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003782 /*
3783 * Raw bdev writes will return -EOPNOTSUPP for IOCB_NOWAIT. Just
3784 * retry them without IOCB_NOWAIT.
3785 */
3786 if (ret2 == -EOPNOTSUPP && (kiocb->ki_flags & IOCB_NOWAIT))
3787 ret2 = -EAGAIN;
Pavel Begunkov75c668c2021-02-04 13:52:05 +00003788 /* no retry on NONBLOCK nor RWF_NOWAIT */
3789 if (ret2 == -EAGAIN && (req->flags & REQ_F_NOWAIT))
Jens Axboe355afae2020-09-02 09:30:31 -06003790 goto done;
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003791 if (!force_nonblock || ret2 != -EAGAIN) {
Jens Axboeeefdf302020-08-27 16:40:19 -06003792 /* IOPOLL retry should happen for io-wq threads */
3793 if ((req->ctx->flags & IORING_SETUP_IOPOLL) && ret2 == -EAGAIN)
3794 goto copy_iov;
Jens Axboe355afae2020-09-02 09:30:31 -06003795done:
Pavel Begunkov889fca72021-02-10 00:03:09 +00003796 kiocb_done(kiocb, ret2, issue_flags);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003797 } else {
Jens Axboef67676d2019-12-02 11:03:47 -07003798copy_iov:
Jens Axboecd658692021-09-10 11:19:14 -06003799 iov_iter_restore(iter, state);
Jens Axboe227c0c92020-08-13 11:51:40 -06003800 ret = io_setup_async_rw(req, iovec, inline_vecs, iter, false);
Jens Axboe295219a2022-08-25 10:19:08 -06003801 if (!ret) {
3802 if (kiocb->ki_flags & IOCB_WRITE)
3803 kiocb_end_write(req);
3804 return -EAGAIN;
3805 }
3806 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003807 }
Jens Axboe31b51512019-01-18 22:56:34 -07003808out_free:
Pavel Begunkovf261c162020-08-20 11:34:10 +03003809 /* it's reportedly faster than delegating the null check to kfree() */
Pavel Begunkov252917c2020-07-13 22:59:20 +03003810 if (iovec)
Xiaoguang Wang6f2cc162020-06-18 15:01:56 +08003811 kfree(iovec);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003812 return ret;
3813}
3814
Jens Axboe80a261f2020-09-28 14:23:58 -06003815static int io_renameat_prep(struct io_kiocb *req,
3816 const struct io_uring_sqe *sqe)
3817{
3818 struct io_rename *ren = &req->rename;
3819 const char __user *oldf, *newf;
3820
Jens Axboeed7eb252021-06-23 09:04:13 -06003821 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3822 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01003823 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Jens Axboeed7eb252021-06-23 09:04:13 -06003824 return -EINVAL;
Jens Axboe80a261f2020-09-28 14:23:58 -06003825 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3826 return -EBADF;
3827
3828 ren->old_dfd = READ_ONCE(sqe->fd);
3829 oldf = u64_to_user_ptr(READ_ONCE(sqe->addr));
3830 newf = u64_to_user_ptr(READ_ONCE(sqe->addr2));
3831 ren->new_dfd = READ_ONCE(sqe->len);
3832 ren->flags = READ_ONCE(sqe->rename_flags);
3833
3834 ren->oldpath = getname(oldf);
3835 if (IS_ERR(ren->oldpath))
3836 return PTR_ERR(ren->oldpath);
3837
3838 ren->newpath = getname(newf);
3839 if (IS_ERR(ren->newpath)) {
3840 putname(ren->oldpath);
3841 return PTR_ERR(ren->newpath);
3842 }
3843
3844 req->flags |= REQ_F_NEED_CLEANUP;
3845 return 0;
3846}
3847
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003848static int io_renameat(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe80a261f2020-09-28 14:23:58 -06003849{
3850 struct io_rename *ren = &req->rename;
3851 int ret;
3852
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003853 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboe80a261f2020-09-28 14:23:58 -06003854 return -EAGAIN;
3855
3856 ret = do_renameat2(ren->old_dfd, ren->oldpath, ren->new_dfd,
3857 ren->newpath, ren->flags);
3858
3859 req->flags &= ~REQ_F_NEED_CLEANUP;
3860 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01003861 req_set_fail(req);
Jens Axboe80a261f2020-09-28 14:23:58 -06003862 io_req_complete(req, ret);
3863 return 0;
3864}
3865
Jens Axboe14a11432020-09-28 14:27:37 -06003866static int io_unlinkat_prep(struct io_kiocb *req,
3867 const struct io_uring_sqe *sqe)
3868{
3869 struct io_unlink *un = &req->unlink;
3870 const char __user *fname;
3871
Jens Axboe22634bc2021-06-23 09:07:45 -06003872 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3873 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01003874 if (sqe->ioprio || sqe->off || sqe->len || sqe->buf_index ||
3875 sqe->splice_fd_in)
Jens Axboe22634bc2021-06-23 09:07:45 -06003876 return -EINVAL;
Jens Axboe14a11432020-09-28 14:27:37 -06003877 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3878 return -EBADF;
3879
3880 un->dfd = READ_ONCE(sqe->fd);
3881
3882 un->flags = READ_ONCE(sqe->unlink_flags);
3883 if (un->flags & ~AT_REMOVEDIR)
3884 return -EINVAL;
3885
3886 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
3887 un->filename = getname(fname);
3888 if (IS_ERR(un->filename))
3889 return PTR_ERR(un->filename);
3890
3891 req->flags |= REQ_F_NEED_CLEANUP;
3892 return 0;
3893}
3894
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003895static int io_unlinkat(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe14a11432020-09-28 14:27:37 -06003896{
3897 struct io_unlink *un = &req->unlink;
3898 int ret;
3899
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003900 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboe14a11432020-09-28 14:27:37 -06003901 return -EAGAIN;
3902
3903 if (un->flags & AT_REMOVEDIR)
3904 ret = do_rmdir(un->dfd, un->filename);
3905 else
3906 ret = do_unlinkat(un->dfd, un->filename);
3907
3908 req->flags &= ~REQ_F_NEED_CLEANUP;
3909 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01003910 req_set_fail(req);
Jens Axboe14a11432020-09-28 14:27:37 -06003911 io_req_complete(req, ret);
3912 return 0;
3913}
3914
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07003915static int io_mkdirat_prep(struct io_kiocb *req,
3916 const struct io_uring_sqe *sqe)
3917{
3918 struct io_mkdir *mkd = &req->mkdir;
3919 const char __user *fname;
3920
3921 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3922 return -EINVAL;
3923 if (sqe->ioprio || sqe->off || sqe->rw_flags || sqe->buf_index ||
3924 sqe->splice_fd_in)
3925 return -EINVAL;
3926 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3927 return -EBADF;
3928
3929 mkd->dfd = READ_ONCE(sqe->fd);
3930 mkd->mode = READ_ONCE(sqe->len);
3931
3932 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
3933 mkd->filename = getname(fname);
3934 if (IS_ERR(mkd->filename))
3935 return PTR_ERR(mkd->filename);
3936
3937 req->flags |= REQ_F_NEED_CLEANUP;
3938 return 0;
3939}
3940
3941static int io_mkdirat(struct io_kiocb *req, int issue_flags)
3942{
3943 struct io_mkdir *mkd = &req->mkdir;
3944 int ret;
3945
3946 if (issue_flags & IO_URING_F_NONBLOCK)
3947 return -EAGAIN;
3948
3949 ret = do_mkdirat(mkd->dfd, mkd->filename, mkd->mode);
3950
3951 req->flags &= ~REQ_F_NEED_CLEANUP;
3952 if (ret < 0)
3953 req_set_fail(req);
3954 io_req_complete(req, ret);
3955 return 0;
3956}
3957
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07003958static int io_symlinkat_prep(struct io_kiocb *req,
3959 const struct io_uring_sqe *sqe)
3960{
3961 struct io_symlink *sl = &req->symlink;
3962 const char __user *oldpath, *newpath;
3963
3964 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3965 return -EINVAL;
3966 if (sqe->ioprio || sqe->len || sqe->rw_flags || sqe->buf_index ||
3967 sqe->splice_fd_in)
3968 return -EINVAL;
3969 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3970 return -EBADF;
3971
3972 sl->new_dfd = READ_ONCE(sqe->fd);
3973 oldpath = u64_to_user_ptr(READ_ONCE(sqe->addr));
3974 newpath = u64_to_user_ptr(READ_ONCE(sqe->addr2));
3975
3976 sl->oldpath = getname(oldpath);
3977 if (IS_ERR(sl->oldpath))
3978 return PTR_ERR(sl->oldpath);
3979
3980 sl->newpath = getname(newpath);
3981 if (IS_ERR(sl->newpath)) {
3982 putname(sl->oldpath);
3983 return PTR_ERR(sl->newpath);
3984 }
3985
3986 req->flags |= REQ_F_NEED_CLEANUP;
3987 return 0;
3988}
3989
3990static int io_symlinkat(struct io_kiocb *req, int issue_flags)
3991{
3992 struct io_symlink *sl = &req->symlink;
3993 int ret;
3994
3995 if (issue_flags & IO_URING_F_NONBLOCK)
3996 return -EAGAIN;
3997
3998 ret = do_symlinkat(sl->oldpath, sl->new_dfd, sl->newpath);
3999
4000 req->flags &= ~REQ_F_NEED_CLEANUP;
4001 if (ret < 0)
4002 req_set_fail(req);
4003 io_req_complete(req, ret);
4004 return 0;
4005}
4006
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07004007static int io_linkat_prep(struct io_kiocb *req,
4008 const struct io_uring_sqe *sqe)
4009{
4010 struct io_hardlink *lnk = &req->hardlink;
4011 const char __user *oldf, *newf;
4012
4013 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4014 return -EINVAL;
4015 if (sqe->ioprio || sqe->rw_flags || sqe->buf_index || sqe->splice_fd_in)
4016 return -EINVAL;
4017 if (unlikely(req->flags & REQ_F_FIXED_FILE))
4018 return -EBADF;
4019
4020 lnk->old_dfd = READ_ONCE(sqe->fd);
4021 lnk->new_dfd = READ_ONCE(sqe->len);
4022 oldf = u64_to_user_ptr(READ_ONCE(sqe->addr));
4023 newf = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4024 lnk->flags = READ_ONCE(sqe->hardlink_flags);
4025
4026 lnk->oldpath = getname(oldf);
4027 if (IS_ERR(lnk->oldpath))
4028 return PTR_ERR(lnk->oldpath);
4029
4030 lnk->newpath = getname(newf);
4031 if (IS_ERR(lnk->newpath)) {
4032 putname(lnk->oldpath);
4033 return PTR_ERR(lnk->newpath);
4034 }
4035
4036 req->flags |= REQ_F_NEED_CLEANUP;
4037 return 0;
4038}
4039
4040static int io_linkat(struct io_kiocb *req, int issue_flags)
4041{
4042 struct io_hardlink *lnk = &req->hardlink;
4043 int ret;
4044
4045 if (issue_flags & IO_URING_F_NONBLOCK)
4046 return -EAGAIN;
4047
4048 ret = do_linkat(lnk->old_dfd, lnk->oldpath, lnk->new_dfd,
4049 lnk->newpath, lnk->flags);
4050
4051 req->flags &= ~REQ_F_NEED_CLEANUP;
4052 if (ret < 0)
4053 req_set_fail(req);
4054 io_req_complete(req, ret);
4055 return 0;
4056}
4057
Jens Axboe36f4fa62020-09-05 11:14:22 -06004058static int io_shutdown_prep(struct io_kiocb *req,
4059 const struct io_uring_sqe *sqe)
4060{
4061#if defined(CONFIG_NET)
4062 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4063 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004064 if (unlikely(sqe->ioprio || sqe->off || sqe->addr || sqe->rw_flags ||
4065 sqe->buf_index || sqe->splice_fd_in))
Jens Axboe36f4fa62020-09-05 11:14:22 -06004066 return -EINVAL;
4067
4068 req->shutdown.how = READ_ONCE(sqe->len);
4069 return 0;
4070#else
4071 return -EOPNOTSUPP;
4072#endif
4073}
4074
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004075static int io_shutdown(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe36f4fa62020-09-05 11:14:22 -06004076{
4077#if defined(CONFIG_NET)
4078 struct socket *sock;
4079 int ret;
4080
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004081 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboe36f4fa62020-09-05 11:14:22 -06004082 return -EAGAIN;
4083
Linus Torvalds48aba792020-12-16 12:44:05 -08004084 sock = sock_from_file(req->file);
Jens Axboe36f4fa62020-09-05 11:14:22 -06004085 if (unlikely(!sock))
Linus Torvalds48aba792020-12-16 12:44:05 -08004086 return -ENOTSOCK;
Jens Axboe36f4fa62020-09-05 11:14:22 -06004087
4088 ret = __sys_shutdown_sock(sock, req->shutdown.how);
Jens Axboea1464682020-12-14 20:57:27 -07004089 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004090 req_set_fail(req);
Jens Axboe36f4fa62020-09-05 11:14:22 -06004091 io_req_complete(req, ret);
4092 return 0;
4093#else
4094 return -EOPNOTSUPP;
4095#endif
4096}
4097
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004098static int __io_splice_prep(struct io_kiocb *req,
4099 const struct io_uring_sqe *sqe)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004100{
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01004101 struct io_splice *sp = &req->splice;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004102 unsigned int valid_flags = SPLICE_F_FD_IN_FIXED | SPLICE_F_ALL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004103
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004104 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4105 return -EINVAL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004106
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004107 sp->len = READ_ONCE(sqe->len);
4108 sp->flags = READ_ONCE(sqe->splice_flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004109 if (unlikely(sp->flags & ~valid_flags))
4110 return -EINVAL;
Jens Axboeae6cba32022-03-29 10:59:20 -06004111 sp->splice_fd_in = READ_ONCE(sqe->splice_fd_in);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004112 return 0;
4113}
4114
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004115static int io_tee_prep(struct io_kiocb *req,
4116 const struct io_uring_sqe *sqe)
4117{
4118 if (READ_ONCE(sqe->splice_off_in) || READ_ONCE(sqe->off))
4119 return -EINVAL;
4120 return __io_splice_prep(req, sqe);
4121}
4122
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004123static int io_tee(struct io_kiocb *req, unsigned int issue_flags)
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004124{
4125 struct io_splice *sp = &req->splice;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004126 struct file *out = sp->file_out;
4127 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
Jens Axboeae6cba32022-03-29 10:59:20 -06004128 struct file *in;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004129 long ret = 0;
4130
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004131 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004132 return -EAGAIN;
Jens Axboeae6cba32022-03-29 10:59:20 -06004133
4134 in = io_file_get(req->ctx, req, sp->splice_fd_in,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08004135 (sp->flags & SPLICE_F_FD_IN_FIXED), issue_flags);
Jens Axboeae6cba32022-03-29 10:59:20 -06004136 if (!in) {
4137 ret = -EBADF;
4138 goto done;
4139 }
4140
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004141 if (sp->len)
4142 ret = do_tee(in, out, sp->len, flags);
4143
Pavel Begunkove1d767f2021-03-19 17:22:43 +00004144 if (!(sp->flags & SPLICE_F_FD_IN_FIXED))
4145 io_put_file(in);
Jens Axboeae6cba32022-03-29 10:59:20 -06004146done:
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004147 if (ret != sp->len)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004148 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004149 io_req_complete(req, ret);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004150 return 0;
4151}
4152
4153static int io_splice_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4154{
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01004155 struct io_splice *sp = &req->splice;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004156
4157 sp->off_in = READ_ONCE(sqe->splice_off_in);
4158 sp->off_out = READ_ONCE(sqe->off);
4159 return __io_splice_prep(req, sqe);
4160}
4161
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004162static int io_splice(struct io_kiocb *req, unsigned int issue_flags)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004163{
4164 struct io_splice *sp = &req->splice;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004165 struct file *out = sp->file_out;
4166 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
4167 loff_t *poff_in, *poff_out;
Jens Axboeae6cba32022-03-29 10:59:20 -06004168 struct file *in;
Pavel Begunkovc9687422020-05-04 23:00:54 +03004169 long ret = 0;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004170
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004171 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkov2fb3e822020-05-01 17:09:38 +03004172 return -EAGAIN;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004173
Jens Axboeae6cba32022-03-29 10:59:20 -06004174 in = io_file_get(req->ctx, req, sp->splice_fd_in,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08004175 (sp->flags & SPLICE_F_FD_IN_FIXED), issue_flags);
Jens Axboeae6cba32022-03-29 10:59:20 -06004176 if (!in) {
4177 ret = -EBADF;
4178 goto done;
4179 }
4180
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004181 poff_in = (sp->off_in == -1) ? NULL : &sp->off_in;
4182 poff_out = (sp->off_out == -1) ? NULL : &sp->off_out;
Pavel Begunkovc9687422020-05-04 23:00:54 +03004183
Jens Axboe948a7742020-05-17 14:21:38 -06004184 if (sp->len)
Pavel Begunkovc9687422020-05-04 23:00:54 +03004185 ret = do_splice(in, poff_in, out, poff_out, sp->len, flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004186
Pavel Begunkove1d767f2021-03-19 17:22:43 +00004187 if (!(sp->flags & SPLICE_F_FD_IN_FIXED))
4188 io_put_file(in);
Jens Axboeae6cba32022-03-29 10:59:20 -06004189done:
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004190 if (ret != sp->len)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004191 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004192 io_req_complete(req, ret);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004193 return 0;
4194}
4195
Jens Axboe2b188cc2019-01-07 10:46:33 -07004196/*
4197 * IORING_OP_NOP just posts a completion event, nothing else.
4198 */
Pavel Begunkov889fca72021-02-10 00:03:09 +00004199static int io_nop(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07004200{
4201 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07004202
Jens Axboedef596e2019-01-09 08:59:42 -07004203 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
4204 return -EINVAL;
4205
Pavel Begunkov889fca72021-02-10 00:03:09 +00004206 __io_req_complete(req, issue_flags, 0, 0);
Jens Axboe2b188cc2019-01-07 10:46:33 -07004207 return 0;
4208}
4209
Pavel Begunkov1155c762021-02-18 18:29:38 +00004210static int io_fsync_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004211{
Jens Axboe6b063142019-01-10 22:13:58 -07004212 struct io_ring_ctx *ctx = req->ctx;
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004213
Jens Axboe6b063142019-01-10 22:13:58 -07004214 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboedef596e2019-01-09 08:59:42 -07004215 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004216 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index ||
4217 sqe->splice_fd_in))
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004218 return -EINVAL;
4219
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004220 req->sync.flags = READ_ONCE(sqe->fsync_flags);
4221 if (unlikely(req->sync.flags & ~IORING_FSYNC_DATASYNC))
4222 return -EINVAL;
4223
4224 req->sync.off = READ_ONCE(sqe->off);
4225 req->sync.len = READ_ONCE(sqe->len);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004226 return 0;
4227}
4228
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004229static int io_fsync(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe78912932020-01-14 22:09:06 -07004230{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004231 loff_t end = req->sync.off + req->sync.len;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004232 int ret;
4233
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004234 /* fsync always requires a blocking context */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004235 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004236 return -EAGAIN;
4237
Jens Axboe9adbd452019-12-20 08:45:55 -07004238 ret = vfs_fsync_range(req->file, req->sync.off,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004239 end > 0 ? end : LLONG_MAX,
4240 req->sync.flags & IORING_FSYNC_DATASYNC);
4241 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004242 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004243 io_req_complete(req, ret);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004244 return 0;
4245}
4246
Jens Axboed63d1b52019-12-10 10:38:56 -07004247static int io_fallocate_prep(struct io_kiocb *req,
4248 const struct io_uring_sqe *sqe)
4249{
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004250 if (sqe->ioprio || sqe->buf_index || sqe->rw_flags ||
4251 sqe->splice_fd_in)
Jens Axboed63d1b52019-12-10 10:38:56 -07004252 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004253 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4254 return -EINVAL;
Jens Axboed63d1b52019-12-10 10:38:56 -07004255
4256 req->sync.off = READ_ONCE(sqe->off);
4257 req->sync.len = READ_ONCE(sqe->addr);
4258 req->sync.mode = READ_ONCE(sqe->len);
4259 return 0;
4260}
4261
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004262static int io_fallocate(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboed63d1b52019-12-10 10:38:56 -07004263{
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004264 int ret;
Jens Axboed63d1b52019-12-10 10:38:56 -07004265
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004266 /* fallocate always requiring blocking context */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004267 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004268 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004269 ret = vfs_fallocate(req->file, req->sync.mode, req->sync.off,
4270 req->sync.len);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004271 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004272 req_set_fail(req);
Jens Axboedf1ec532022-03-20 13:08:38 -06004273 else
4274 fsnotify_modify(req->file);
Jens Axboee1e16092020-06-22 09:17:17 -06004275 io_req_complete(req, ret);
Jens Axboed63d1b52019-12-10 10:38:56 -07004276 return 0;
4277}
4278
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004279static int __io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe15b71ab2019-12-11 11:20:36 -07004280{
Jens Axboef8748882020-01-08 17:47:02 -07004281 const char __user *fname;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004282 int ret;
4283
Pavel Begunkovd3fddf62021-08-09 13:04:16 +01004284 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4285 return -EINVAL;
Pavel Begunkovb9445592021-08-25 12:25:45 +01004286 if (unlikely(sqe->ioprio || sqe->buf_index))
Jens Axboe15b71ab2019-12-11 11:20:36 -07004287 return -EINVAL;
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004288 if (unlikely(req->flags & REQ_F_FIXED_FILE))
Jens Axboecf3040c2020-02-06 21:31:40 -07004289 return -EBADF;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004290
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004291 /* open.how should be already initialised */
4292 if (!(req->open.how.flags & O_PATH) && force_o_largefile())
Jens Axboe08a1d26eb2020-04-08 09:20:54 -06004293 req->open.how.flags |= O_LARGEFILE;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004294
Pavel Begunkov25e72d12020-06-03 18:03:23 +03004295 req->open.dfd = READ_ONCE(sqe->fd);
4296 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboef8748882020-01-08 17:47:02 -07004297 req->open.filename = getname(fname);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004298 if (IS_ERR(req->open.filename)) {
4299 ret = PTR_ERR(req->open.filename);
4300 req->open.filename = NULL;
4301 return ret;
4302 }
Pavel Begunkovb9445592021-08-25 12:25:45 +01004303
4304 req->open.file_slot = READ_ONCE(sqe->file_index);
4305 if (req->open.file_slot && (req->open.how.flags & O_CLOEXEC))
4306 return -EINVAL;
4307
Jens Axboe4022e7a2020-03-19 19:23:18 -06004308 req->open.nofile = rlimit(RLIMIT_NOFILE);
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03004309 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004310 return 0;
4311}
4312
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004313static int io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4314{
Pavel Begunkovd3fddf62021-08-09 13:04:16 +01004315 u64 mode = READ_ONCE(sqe->len);
4316 u64 flags = READ_ONCE(sqe->open_flags);
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004317
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004318 req->open.how = build_open_how(flags, mode);
4319 return __io_openat_prep(req, sqe);
4320}
4321
Jens Axboecebdb982020-01-08 17:59:24 -07004322static int io_openat2_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4323{
4324 struct open_how __user *how;
Jens Axboecebdb982020-01-08 17:59:24 -07004325 size_t len;
4326 int ret;
4327
Jens Axboecebdb982020-01-08 17:59:24 -07004328 how = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4329 len = READ_ONCE(sqe->len);
Jens Axboecebdb982020-01-08 17:59:24 -07004330 if (len < OPEN_HOW_SIZE_VER0)
4331 return -EINVAL;
4332
4333 ret = copy_struct_from_user(&req->open.how, sizeof(req->open.how), how,
4334 len);
4335 if (ret)
4336 return ret;
4337
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004338 return __io_openat_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07004339}
4340
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004341static int io_openat2(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe15b71ab2019-12-11 11:20:36 -07004342{
4343 struct open_flags op;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004344 struct file *file;
Pavel Begunkovb9445592021-08-25 12:25:45 +01004345 bool resolve_nonblock, nonblock_set;
4346 bool fixed = !!req->open.file_slot;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004347 int ret;
4348
Jens Axboecebdb982020-01-08 17:59:24 -07004349 ret = build_open_flags(&req->open.how, &op);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004350 if (ret)
4351 goto err;
Jens Axboe3a81fd02020-12-10 12:25:36 -07004352 nonblock_set = op.open_flag & O_NONBLOCK;
4353 resolve_nonblock = req->open.how.resolve & RESOLVE_CACHED;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004354 if (issue_flags & IO_URING_F_NONBLOCK) {
Jens Axboe3a81fd02020-12-10 12:25:36 -07004355 /*
4356 * Don't bother trying for O_TRUNC, O_CREAT, or O_TMPFILE open,
4357 * it'll always -EAGAIN
4358 */
4359 if (req->open.how.flags & (O_TRUNC | O_CREAT | O_TMPFILE))
4360 return -EAGAIN;
4361 op.lookup_flags |= LOOKUP_CACHED;
4362 op.open_flag |= O_NONBLOCK;
4363 }
Jens Axboe15b71ab2019-12-11 11:20:36 -07004364
Pavel Begunkovb9445592021-08-25 12:25:45 +01004365 if (!fixed) {
4366 ret = __get_unused_fd_flags(req->open.how.flags, req->open.nofile);
4367 if (ret < 0)
4368 goto err;
4369 }
Jens Axboe15b71ab2019-12-11 11:20:36 -07004370
4371 file = do_filp_open(req->open.dfd, req->open.filename, &op);
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004372 if (IS_ERR(file)) {
Jens Axboe3a81fd02020-12-10 12:25:36 -07004373 /*
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004374 * We could hang on to this 'fd' on retrying, but seems like
4375 * marginal gain for something that is now known to be a slower
4376 * path. So just put it, and we'll get a new one when we retry.
Jens Axboe3a81fd02020-12-10 12:25:36 -07004377 */
Pavel Begunkovb9445592021-08-25 12:25:45 +01004378 if (!fixed)
4379 put_unused_fd(ret);
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004380
4381 ret = PTR_ERR(file);
4382 /* only retry if RESOLVE_CACHED wasn't already set by application */
4383 if (ret == -EAGAIN &&
4384 (!resolve_nonblock && (issue_flags & IO_URING_F_NONBLOCK)))
4385 return -EAGAIN;
4386 goto err;
Jens Axboe3a81fd02020-12-10 12:25:36 -07004387 }
4388
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004389 if ((issue_flags & IO_URING_F_NONBLOCK) && !nonblock_set)
4390 file->f_flags &= ~O_NONBLOCK;
4391 fsnotify_open(file);
Pavel Begunkovb9445592021-08-25 12:25:45 +01004392
4393 if (!fixed)
4394 fd_install(ret, file);
4395 else
4396 ret = io_install_fixed_file(req, file, issue_flags,
4397 req->open.file_slot - 1);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004398err:
4399 putname(req->open.filename);
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03004400 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004401 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004402 req_set_fail(req);
Pavel Begunkov0bdf3392021-04-11 01:46:29 +01004403 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004404 return 0;
4405}
4406
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004407static int io_openat(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboecebdb982020-01-08 17:59:24 -07004408{
Pavel Begunkove45cff52021-02-28 22:35:14 +00004409 return io_openat2(req, issue_flags);
Jens Axboecebdb982020-01-08 17:59:24 -07004410}
4411
Jens Axboe067524e2020-03-02 16:32:28 -07004412static int io_remove_buffers_prep(struct io_kiocb *req,
4413 const struct io_uring_sqe *sqe)
4414{
4415 struct io_provide_buf *p = &req->pbuf;
4416 u64 tmp;
4417
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004418 if (sqe->ioprio || sqe->rw_flags || sqe->addr || sqe->len || sqe->off ||
4419 sqe->splice_fd_in)
Jens Axboe067524e2020-03-02 16:32:28 -07004420 return -EINVAL;
4421
4422 tmp = READ_ONCE(sqe->fd);
4423 if (!tmp || tmp > USHRT_MAX)
4424 return -EINVAL;
4425
4426 memset(p, 0, sizeof(*p));
4427 p->nbufs = tmp;
4428 p->bgid = READ_ONCE(sqe->buf_group);
4429 return 0;
4430}
4431
4432static int __io_remove_buffers(struct io_ring_ctx *ctx, struct io_buffer *buf,
4433 int bgid, unsigned nbufs)
4434{
4435 unsigned i = 0;
4436
4437 /* shouldn't happen */
4438 if (!nbufs)
4439 return 0;
4440
4441 /* the head kbuf is the list itself */
4442 while (!list_empty(&buf->list)) {
4443 struct io_buffer *nxt;
4444
4445 nxt = list_first_entry(&buf->list, struct io_buffer, list);
4446 list_del(&nxt->list);
4447 kfree(nxt);
4448 if (++i == nbufs)
4449 return i;
Ye Bin2d447d32021-11-22 10:47:37 +08004450 cond_resched();
Jens Axboe067524e2020-03-02 16:32:28 -07004451 }
4452 i++;
4453 kfree(buf);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004454 xa_erase(&ctx->io_buffers, bgid);
Jens Axboe067524e2020-03-02 16:32:28 -07004455
4456 return i;
4457}
4458
Pavel Begunkov889fca72021-02-10 00:03:09 +00004459static int io_remove_buffers(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe067524e2020-03-02 16:32:28 -07004460{
4461 struct io_provide_buf *p = &req->pbuf;
4462 struct io_ring_ctx *ctx = req->ctx;
4463 struct io_buffer *head;
4464 int ret = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004465 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboe067524e2020-03-02 16:32:28 -07004466
4467 io_ring_submit_lock(ctx, !force_nonblock);
4468
4469 lockdep_assert_held(&ctx->uring_lock);
4470
4471 ret = -ENOENT;
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004472 head = xa_load(&ctx->io_buffers, p->bgid);
Jens Axboe067524e2020-03-02 16:32:28 -07004473 if (head)
4474 ret = __io_remove_buffers(ctx, head, p->bgid, p->nbufs);
Jens Axboe067524e2020-03-02 16:32:28 -07004475 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004476 req_set_fail(req);
Pavel Begunkov31bff9a2020-12-06 22:22:43 +00004477
Pavel Begunkov9fb8cb42021-02-28 22:35:13 +00004478 /* complete before unlock, IOPOLL may need the lock */
4479 __io_req_complete(req, issue_flags, ret, 0);
4480 io_ring_submit_unlock(ctx, !force_nonblock);
Jens Axboe067524e2020-03-02 16:32:28 -07004481 return 0;
4482}
4483
Jens Axboeddf0322d2020-02-23 16:41:33 -07004484static int io_provide_buffers_prep(struct io_kiocb *req,
4485 const struct io_uring_sqe *sqe)
4486{
Pavel Begunkov38134ad2021-04-15 13:07:39 +01004487 unsigned long size, tmp_check;
Jens Axboeddf0322d2020-02-23 16:41:33 -07004488 struct io_provide_buf *p = &req->pbuf;
4489 u64 tmp;
4490
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004491 if (sqe->ioprio || sqe->rw_flags || sqe->splice_fd_in)
Jens Axboeddf0322d2020-02-23 16:41:33 -07004492 return -EINVAL;
4493
4494 tmp = READ_ONCE(sqe->fd);
4495 if (!tmp || tmp > USHRT_MAX)
4496 return -E2BIG;
4497 p->nbufs = tmp;
4498 p->addr = READ_ONCE(sqe->addr);
4499 p->len = READ_ONCE(sqe->len);
4500
Pavel Begunkov38134ad2021-04-15 13:07:39 +01004501 if (check_mul_overflow((unsigned long)p->len, (unsigned long)p->nbufs,
4502 &size))
4503 return -EOVERFLOW;
4504 if (check_add_overflow((unsigned long)p->addr, size, &tmp_check))
4505 return -EOVERFLOW;
4506
Pavel Begunkovd81269f2021-03-19 10:21:19 +00004507 size = (unsigned long)p->len * p->nbufs;
4508 if (!access_ok(u64_to_user_ptr(p->addr), size))
Jens Axboeddf0322d2020-02-23 16:41:33 -07004509 return -EFAULT;
4510
4511 p->bgid = READ_ONCE(sqe->buf_group);
4512 tmp = READ_ONCE(sqe->off);
4513 if (tmp > USHRT_MAX)
4514 return -E2BIG;
4515 p->bid = tmp;
4516 return 0;
4517}
4518
4519static int io_add_buffers(struct io_provide_buf *pbuf, struct io_buffer **head)
4520{
4521 struct io_buffer *buf;
4522 u64 addr = pbuf->addr;
4523 int i, bid = pbuf->bid;
4524
4525 for (i = 0; i < pbuf->nbufs; i++) {
Jens Axboe9990da92021-09-24 07:39:08 -06004526 buf = kmalloc(sizeof(*buf), GFP_KERNEL_ACCOUNT);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004527 if (!buf)
4528 break;
4529
4530 buf->addr = addr;
Thadeu Lima de Souza Cascardod1f82802021-05-05 09:47:06 -03004531 buf->len = min_t(__u32, pbuf->len, MAX_RW_COUNT);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004532 buf->bid = bid;
4533 addr += pbuf->len;
4534 bid++;
4535 if (!*head) {
4536 INIT_LIST_HEAD(&buf->list);
4537 *head = buf;
4538 } else {
4539 list_add_tail(&buf->list, &(*head)->list);
4540 }
Eric Dumazetc718ea42022-02-14 20:10:03 -08004541 cond_resched();
Jens Axboeddf0322d2020-02-23 16:41:33 -07004542 }
4543
4544 return i ? i : -ENOMEM;
4545}
4546
Pavel Begunkov889fca72021-02-10 00:03:09 +00004547static int io_provide_buffers(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeddf0322d2020-02-23 16:41:33 -07004548{
4549 struct io_provide_buf *p = &req->pbuf;
4550 struct io_ring_ctx *ctx = req->ctx;
4551 struct io_buffer *head, *list;
4552 int ret = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004553 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboeddf0322d2020-02-23 16:41:33 -07004554
4555 io_ring_submit_lock(ctx, !force_nonblock);
4556
4557 lockdep_assert_held(&ctx->uring_lock);
4558
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004559 list = head = xa_load(&ctx->io_buffers, p->bgid);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004560
4561 ret = io_add_buffers(p, &head);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004562 if (ret >= 0 && !list) {
Pavel Begunkovfa304062022-08-04 15:13:46 +01004563 ret = xa_insert(&ctx->io_buffers, p->bgid, head,
4564 GFP_KERNEL_ACCOUNT);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004565 if (ret < 0)
Jens Axboe067524e2020-03-02 16:32:28 -07004566 __io_remove_buffers(ctx, head, p->bgid, -1U);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004567 }
Jens Axboeddf0322d2020-02-23 16:41:33 -07004568 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004569 req_set_fail(req);
Pavel Begunkov9fb8cb42021-02-28 22:35:13 +00004570 /* complete before unlock, IOPOLL may need the lock */
4571 __io_req_complete(req, issue_flags, ret, 0);
4572 io_ring_submit_unlock(ctx, !force_nonblock);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004573 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07004574}
4575
Jens Axboe3e4827b2020-01-08 15:18:09 -07004576static int io_epoll_ctl_prep(struct io_kiocb *req,
4577 const struct io_uring_sqe *sqe)
4578{
4579#if defined(CONFIG_EPOLL)
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004580 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Jens Axboe3e4827b2020-01-08 15:18:09 -07004581 return -EINVAL;
Pavel Begunkov2d74d042021-05-14 12:05:46 +01004582 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004583 return -EINVAL;
Jens Axboe3e4827b2020-01-08 15:18:09 -07004584
4585 req->epoll.epfd = READ_ONCE(sqe->fd);
4586 req->epoll.op = READ_ONCE(sqe->len);
4587 req->epoll.fd = READ_ONCE(sqe->off);
4588
4589 if (ep_op_has_event(req->epoll.op)) {
4590 struct epoll_event __user *ev;
4591
4592 ev = u64_to_user_ptr(READ_ONCE(sqe->addr));
4593 if (copy_from_user(&req->epoll.event, ev, sizeof(*ev)))
4594 return -EFAULT;
4595 }
4596
4597 return 0;
4598#else
4599 return -EOPNOTSUPP;
4600#endif
4601}
4602
Pavel Begunkov889fca72021-02-10 00:03:09 +00004603static int io_epoll_ctl(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe3e4827b2020-01-08 15:18:09 -07004604{
4605#if defined(CONFIG_EPOLL)
4606 struct io_epoll *ie = &req->epoll;
4607 int ret;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004608 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboe3e4827b2020-01-08 15:18:09 -07004609
4610 ret = do_epoll_ctl(ie->epfd, ie->op, ie->fd, &ie->event, force_nonblock);
4611 if (force_nonblock && ret == -EAGAIN)
4612 return -EAGAIN;
4613
4614 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004615 req_set_fail(req);
Pavel Begunkov889fca72021-02-10 00:03:09 +00004616 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe3e4827b2020-01-08 15:18:09 -07004617 return 0;
4618#else
4619 return -EOPNOTSUPP;
4620#endif
4621}
4622
Jens Axboec1ca7572019-12-25 22:18:28 -07004623static int io_madvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4624{
4625#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004626 if (sqe->ioprio || sqe->buf_index || sqe->off || sqe->splice_fd_in)
Jens Axboec1ca7572019-12-25 22:18:28 -07004627 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004628 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4629 return -EINVAL;
Jens Axboec1ca7572019-12-25 22:18:28 -07004630
4631 req->madvise.addr = READ_ONCE(sqe->addr);
4632 req->madvise.len = READ_ONCE(sqe->len);
4633 req->madvise.advice = READ_ONCE(sqe->fadvise_advice);
4634 return 0;
4635#else
4636 return -EOPNOTSUPP;
4637#endif
4638}
4639
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004640static int io_madvise(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboec1ca7572019-12-25 22:18:28 -07004641{
4642#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
4643 struct io_madvise *ma = &req->madvise;
4644 int ret;
4645
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004646 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboec1ca7572019-12-25 22:18:28 -07004647 return -EAGAIN;
4648
Minchan Kim0726b012020-10-17 16:14:50 -07004649 ret = do_madvise(current->mm, ma->addr, ma->len, ma->advice);
Jens Axboec1ca7572019-12-25 22:18:28 -07004650 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004651 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004652 io_req_complete(req, ret);
Jens Axboec1ca7572019-12-25 22:18:28 -07004653 return 0;
4654#else
4655 return -EOPNOTSUPP;
4656#endif
4657}
4658
Jens Axboe4840e412019-12-25 22:03:45 -07004659static int io_fadvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4660{
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004661 if (sqe->ioprio || sqe->buf_index || sqe->addr || sqe->splice_fd_in)
Jens Axboe4840e412019-12-25 22:03:45 -07004662 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004663 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4664 return -EINVAL;
Jens Axboe4840e412019-12-25 22:03:45 -07004665
4666 req->fadvise.offset = READ_ONCE(sqe->off);
4667 req->fadvise.len = READ_ONCE(sqe->len);
4668 req->fadvise.advice = READ_ONCE(sqe->fadvise_advice);
4669 return 0;
4670}
4671
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004672static int io_fadvise(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe4840e412019-12-25 22:03:45 -07004673{
4674 struct io_fadvise *fa = &req->fadvise;
4675 int ret;
4676
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004677 if (issue_flags & IO_URING_F_NONBLOCK) {
Jens Axboe3e694262020-02-01 09:22:49 -07004678 switch (fa->advice) {
4679 case POSIX_FADV_NORMAL:
4680 case POSIX_FADV_RANDOM:
4681 case POSIX_FADV_SEQUENTIAL:
4682 break;
4683 default:
4684 return -EAGAIN;
4685 }
4686 }
Jens Axboe4840e412019-12-25 22:03:45 -07004687
4688 ret = vfs_fadvise(req->file, fa->offset, fa->len, fa->advice);
4689 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004690 req_set_fail(req);
Pavel Begunkov0bdf3392021-04-11 01:46:29 +01004691 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe4840e412019-12-25 22:03:45 -07004692 return 0;
4693}
4694
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004695static int io_statx_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4696{
Pavel Begunkov2d74d042021-05-14 12:05:46 +01004697 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004698 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004699 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004700 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004701 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004702 return -EBADF;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004703
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004704 req->statx.dfd = READ_ONCE(sqe->fd);
4705 req->statx.mask = READ_ONCE(sqe->len);
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004706 req->statx.filename = u64_to_user_ptr(READ_ONCE(sqe->addr));
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004707 req->statx.buffer = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4708 req->statx.flags = READ_ONCE(sqe->statx_flags);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004709
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004710 return 0;
4711}
4712
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004713static int io_statx(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004714{
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004715 struct io_statx *ctx = &req->statx;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004716 int ret;
4717
Pavel Begunkov59d70012021-03-22 01:58:30 +00004718 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004719 return -EAGAIN;
4720
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004721 ret = do_statx(ctx->dfd, ctx->filename, ctx->flags, ctx->mask,
4722 ctx->buffer);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004723
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004724 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004725 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004726 io_req_complete(req, ret);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004727 return 0;
4728}
4729
Jens Axboeb5dba592019-12-11 14:02:38 -07004730static int io_close_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4731{
Jens Axboe14587a462020-09-05 11:36:08 -06004732 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004733 return -EINVAL;
Jens Axboeb5dba592019-12-11 14:02:38 -07004734 if (sqe->ioprio || sqe->off || sqe->addr || sqe->len ||
Pavel Begunkov7df778b2021-09-24 20:04:29 +01004735 sqe->rw_flags || sqe->buf_index)
Jens Axboeb5dba592019-12-11 14:02:38 -07004736 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004737 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004738 return -EBADF;
Jens Axboeb5dba592019-12-11 14:02:38 -07004739
4740 req->close.fd = READ_ONCE(sqe->fd);
Pavel Begunkov7df778b2021-09-24 20:04:29 +01004741 req->close.file_slot = READ_ONCE(sqe->file_index);
4742 if (req->close.file_slot && req->close.fd)
4743 return -EINVAL;
4744
Jens Axboeb5dba592019-12-11 14:02:38 -07004745 return 0;
4746}
4747
Pavel Begunkov889fca72021-02-10 00:03:09 +00004748static int io_close(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeb5dba592019-12-11 14:02:38 -07004749{
Jens Axboe9eac1902021-01-19 15:50:37 -07004750 struct files_struct *files = current->files;
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004751 struct io_close *close = &req->close;
Jens Axboe9eac1902021-01-19 15:50:37 -07004752 struct fdtable *fdt;
Pavel Begunkova1fde922021-04-11 01:46:28 +01004753 struct file *file = NULL;
4754 int ret = -EBADF;
Jens Axboeb5dba592019-12-11 14:02:38 -07004755
Pavel Begunkov7df778b2021-09-24 20:04:29 +01004756 if (req->close.file_slot) {
4757 ret = io_close_fixed(req, issue_flags);
4758 goto err;
4759 }
4760
Jens Axboe9eac1902021-01-19 15:50:37 -07004761 spin_lock(&files->file_lock);
4762 fdt = files_fdtable(files);
4763 if (close->fd >= fdt->max_fds) {
4764 spin_unlock(&files->file_lock);
4765 goto err;
4766 }
4767 file = fdt->fd[close->fd];
Pavel Begunkova1fde922021-04-11 01:46:28 +01004768 if (!file || file->f_op == &io_uring_fops) {
Jens Axboe9eac1902021-01-19 15:50:37 -07004769 spin_unlock(&files->file_lock);
4770 file = NULL;
4771 goto err;
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004772 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004773
4774 /* if the file has a flush method, be safe and punt to async */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004775 if (file->f_op->flush && (issue_flags & IO_URING_F_NONBLOCK)) {
Jens Axboe9eac1902021-01-19 15:50:37 -07004776 spin_unlock(&files->file_lock);
Pavel Begunkov0bf0eef2020-05-26 20:34:06 +03004777 return -EAGAIN;
Pavel Begunkova2100672020-03-02 23:45:16 +03004778 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004779
Jens Axboe9eac1902021-01-19 15:50:37 -07004780 ret = __close_fd_get_file(close->fd, &file);
4781 spin_unlock(&files->file_lock);
4782 if (ret < 0) {
4783 if (ret == -ENOENT)
4784 ret = -EBADF;
4785 goto err;
4786 }
4787
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004788 /* No ->flush() or already async, safely close from here */
Jens Axboe9eac1902021-01-19 15:50:37 -07004789 ret = filp_close(file, current->files);
4790err:
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004791 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004792 req_set_fail(req);
Jens Axboe9eac1902021-01-19 15:50:37 -07004793 if (file)
4794 fput(file);
Pavel Begunkov889fca72021-02-10 00:03:09 +00004795 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe1a417f42020-01-31 17:16:48 -07004796 return 0;
Jens Axboeb5dba592019-12-11 14:02:38 -07004797}
4798
Pavel Begunkov1155c762021-02-18 18:29:38 +00004799static int io_sfr_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004800{
4801 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004802
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004803 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
4804 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004805 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index ||
4806 sqe->splice_fd_in))
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004807 return -EINVAL;
4808
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004809 req->sync.off = READ_ONCE(sqe->off);
4810 req->sync.len = READ_ONCE(sqe->len);
4811 req->sync.flags = READ_ONCE(sqe->sync_range_flags);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004812 return 0;
4813}
4814
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004815static int io_sync_file_range(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004816{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004817 int ret;
4818
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004819 /* sync_file_range always requires a blocking context */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004820 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004821 return -EAGAIN;
4822
Jens Axboe9adbd452019-12-20 08:45:55 -07004823 ret = sync_file_range(req->file, req->sync.off, req->sync.len,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004824 req->sync.flags);
4825 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004826 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004827 io_req_complete(req, ret);
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004828 return 0;
4829}
4830
YueHaibing469956e2020-03-04 15:53:52 +08004831#if defined(CONFIG_NET)
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004832static bool io_net_retry(struct socket *sock, int flags)
4833{
4834 if (!(flags & MSG_WAITALL))
4835 return false;
4836 return sock->type == SOCK_STREAM || sock->type == SOCK_SEQPACKET;
4837}
4838
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004839static int io_setup_async_msg(struct io_kiocb *req,
4840 struct io_async_msghdr *kmsg)
4841{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004842 struct io_async_msghdr *async_msg = req->async_data;
4843
4844 if (async_msg)
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004845 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004846 if (io_alloc_async_data(req)) {
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004847 kfree(kmsg->free_iov);
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004848 return -ENOMEM;
4849 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07004850 async_msg = req->async_data;
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004851 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004852 memcpy(async_msg, kmsg, sizeof(*kmsg));
Pavel Begunkovf9dc33f2022-09-29 22:23:18 +01004853 if (async_msg->msg.msg_name)
4854 async_msg->msg.msg_name = &async_msg->addr;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004855 /* if were using fast_iov, set it to the new one */
Stefan Metzmacher2e4c95a2022-09-29 09:39:10 +02004856 if (!kmsg->free_iov) {
4857 size_t fast_idx = kmsg->msg.msg_iter.iov - kmsg->fast_iov;
4858 async_msg->msg.msg_iter.iov = &async_msg->fast_iov[fast_idx];
4859 }
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004860
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004861 return -EAGAIN;
4862}
4863
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004864static int io_sendmsg_copy_hdr(struct io_kiocb *req,
4865 struct io_async_msghdr *iomsg)
4866{
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004867 iomsg->msg.msg_name = &iomsg->addr;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004868 iomsg->free_iov = iomsg->fast_iov;
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004869 return sendmsg_copy_msghdr(&iomsg->msg, req->sr_msg.umsg,
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004870 req->sr_msg.msg_flags, &iomsg->free_iov);
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004871}
4872
Pavel Begunkov93642ef2021-02-18 18:29:44 +00004873static int io_sendmsg_prep_async(struct io_kiocb *req)
4874{
4875 int ret;
4876
Pavel Begunkov93642ef2021-02-18 18:29:44 +00004877 ret = io_sendmsg_copy_hdr(req, req->async_data);
4878 if (!ret)
4879 req->flags |= REQ_F_NEED_CLEANUP;
4880 return ret;
4881}
4882
Jens Axboe3529d8c2019-12-19 18:24:38 -07004883static int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboeaa1fa282019-04-19 13:38:09 -06004884{
Jens Axboee47293f2019-12-20 08:58:21 -07004885 struct io_sr_msg *sr = &req->sr_msg;
Jens Axboe03b12302019-12-02 18:50:25 -07004886
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004887 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4888 return -EINVAL;
Jens Axboe79c10cb2022-04-26 19:34:11 -06004889 if (unlikely(sqe->addr2 || sqe->file_index))
4890 return -EINVAL;
Jens Axboe50fefe52022-06-30 14:42:05 -06004891 if (unlikely(sqe->addr2 || sqe->file_index || sqe->ioprio))
4892 return -EINVAL;
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004893
Pavel Begunkov270a5942020-07-12 20:41:04 +03004894 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboefddafac2020-01-04 20:19:44 -07004895 sr->len = READ_ONCE(sqe->len);
Pavel Begunkov04411802021-04-01 15:44:00 +01004896 sr->msg_flags = READ_ONCE(sqe->msg_flags) | MSG_NOSIGNAL;
4897 if (sr->msg_flags & MSG_DONTWAIT)
4898 req->flags |= REQ_F_NOWAIT;
Jens Axboe3529d8c2019-12-19 18:24:38 -07004899
Jens Axboed8768362020-02-27 14:17:49 -07004900#ifdef CONFIG_COMPAT
4901 if (req->ctx->compat)
4902 sr->msg_flags |= MSG_CMSG_COMPAT;
4903#endif
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004904 sr->done_io = 0;
Pavel Begunkov93642ef2021-02-18 18:29:44 +00004905 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004906}
4907
Pavel Begunkov889fca72021-02-10 00:03:09 +00004908static int io_sendmsg(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe03b12302019-12-02 18:50:25 -07004909{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004910 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004911 struct io_sr_msg *sr = &req->sr_msg;
Jens Axboe03b12302019-12-02 18:50:25 -07004912 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004913 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01004914 int min_ret = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004915 int ret;
4916
Florent Revestdba4a922020-12-04 12:36:04 +01004917 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004918 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01004919 return -ENOTSOCK;
Jens Axboe03b12302019-12-02 18:50:25 -07004920
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004921 kmsg = req->async_data;
4922 if (!kmsg) {
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004923 ret = io_sendmsg_copy_hdr(req, &iomsg);
Jens Axboefddafac2020-01-04 20:19:44 -07004924 if (ret)
4925 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004926 kmsg = &iomsg;
Jens Axboefddafac2020-01-04 20:19:44 -07004927 }
4928
Pavel Begunkov04411802021-04-01 15:44:00 +01004929 flags = req->sr_msg.msg_flags;
4930 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004931 flags |= MSG_DONTWAIT;
Stefan Metzmacher00312752021-03-20 20:33:36 +01004932 if (flags & MSG_WAITALL)
4933 min_ret = iov_iter_count(&kmsg->msg.msg_iter);
4934
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004935 ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004936
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00004937 if (ret < min_ret) {
4938 if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
4939 return io_setup_async_msg(req, kmsg);
4940 if (ret == -ERESTARTSYS)
4941 ret = -EINTR;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004942 if (ret > 0 && io_net_retry(sock, flags)) {
4943 sr->done_io += ret;
4944 req->flags |= REQ_F_PARTIAL_IO;
4945 return io_setup_async_msg(req, kmsg);
4946 }
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00004947 req_set_fail(req);
4948 }
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004949 /* fast path, check for non-NULL to avoid function call */
4950 if (kmsg->free_iov)
4951 kfree(kmsg->free_iov);
Jens Axboe03b12302019-12-02 18:50:25 -07004952 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004953 if (ret >= 0)
4954 ret += sr->done_io;
4955 else if (sr->done_io)
4956 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00004957 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboefddafac2020-01-04 20:19:44 -07004958 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004959}
4960
Pavel Begunkov889fca72021-02-10 00:03:09 +00004961static int io_send(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe03b12302019-12-02 18:50:25 -07004962{
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004963 struct io_sr_msg *sr = &req->sr_msg;
4964 struct msghdr msg;
4965 struct iovec iov;
Jens Axboe03b12302019-12-02 18:50:25 -07004966 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004967 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01004968 int min_ret = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004969 int ret;
4970
Florent Revestdba4a922020-12-04 12:36:04 +01004971 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004972 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01004973 return -ENOTSOCK;
Jens Axboe03b12302019-12-02 18:50:25 -07004974
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004975 ret = import_single_range(WRITE, sr->buf, sr->len, &iov, &msg.msg_iter);
4976 if (unlikely(ret))
Zheng Bin14db8412020-09-09 20:12:37 +08004977 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004978
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004979 msg.msg_name = NULL;
4980 msg.msg_control = NULL;
4981 msg.msg_controllen = 0;
4982 msg.msg_namelen = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004983
Pavel Begunkov04411802021-04-01 15:44:00 +01004984 flags = req->sr_msg.msg_flags;
4985 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004986 flags |= MSG_DONTWAIT;
Stefan Metzmacher00312752021-03-20 20:33:36 +01004987 if (flags & MSG_WAITALL)
4988 min_ret = iov_iter_count(&msg.msg_iter);
4989
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004990 msg.msg_flags = flags;
4991 ret = sock_sendmsg(sock, &msg);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00004992 if (ret < min_ret) {
4993 if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
4994 return -EAGAIN;
4995 if (ret == -ERESTARTSYS)
4996 ret = -EINTR;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004997 if (ret > 0 && io_net_retry(sock, flags)) {
4998 sr->len -= ret;
4999 sr->buf += ret;
5000 sr->done_io += ret;
5001 req->flags |= REQ_F_PARTIAL_IO;
5002 return -EAGAIN;
5003 }
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01005004 req_set_fail(req);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005005 }
Jens Axboe3c1a3d02022-04-20 19:21:36 -06005006 if (ret >= 0)
5007 ret += sr->done_io;
5008 else if (sr->done_io)
5009 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00005010 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe03b12302019-12-02 18:50:25 -07005011 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07005012}
5013
Pavel Begunkov1400e692020-07-12 20:41:05 +03005014static int __io_recvmsg_copy_hdr(struct io_kiocb *req,
5015 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07005016{
5017 struct io_sr_msg *sr = &req->sr_msg;
5018 struct iovec __user *uiov;
5019 size_t iov_len;
5020 int ret;
5021
Pavel Begunkov1400e692020-07-12 20:41:05 +03005022 ret = __copy_msghdr_from_user(&iomsg->msg, sr->umsg,
5023 &iomsg->uaddr, &uiov, &iov_len);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005024 if (ret)
5025 return ret;
5026
5027 if (req->flags & REQ_F_BUFFER_SELECT) {
5028 if (iov_len > 1)
5029 return -EINVAL;
Pavel Begunkov5476dfe2021-02-05 00:57:59 +00005030 if (copy_from_user(iomsg->fast_iov, uiov, sizeof(*uiov)))
Jens Axboe52de1fe2020-02-27 10:15:42 -07005031 return -EFAULT;
Pavel Begunkov5476dfe2021-02-05 00:57:59 +00005032 sr->len = iomsg->fast_iov[0].iov_len;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005033 iomsg->free_iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005034 } else {
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005035 iomsg->free_iov = iomsg->fast_iov;
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005036 ret = __import_iovec(READ, uiov, iov_len, UIO_FASTIOV,
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005037 &iomsg->free_iov, &iomsg->msg.msg_iter,
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005038 false);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005039 if (ret > 0)
5040 ret = 0;
5041 }
5042
5043 return ret;
5044}
5045
5046#ifdef CONFIG_COMPAT
5047static int __io_compat_recvmsg_copy_hdr(struct io_kiocb *req,
Pavel Begunkov1400e692020-07-12 20:41:05 +03005048 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07005049{
Jens Axboe52de1fe2020-02-27 10:15:42 -07005050 struct io_sr_msg *sr = &req->sr_msg;
5051 struct compat_iovec __user *uiov;
5052 compat_uptr_t ptr;
5053 compat_size_t len;
5054 int ret;
5055
Pavel Begunkov4af34172021-04-11 01:46:30 +01005056 ret = __get_compat_msghdr(&iomsg->msg, sr->umsg_compat, &iomsg->uaddr,
5057 &ptr, &len);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005058 if (ret)
5059 return ret;
5060
5061 uiov = compat_ptr(ptr);
5062 if (req->flags & REQ_F_BUFFER_SELECT) {
5063 compat_ssize_t clen;
5064
5065 if (len > 1)
5066 return -EINVAL;
5067 if (!access_ok(uiov, sizeof(*uiov)))
5068 return -EFAULT;
5069 if (__get_user(clen, &uiov->iov_len))
5070 return -EFAULT;
5071 if (clen < 0)
5072 return -EINVAL;
Pavel Begunkov2d280bc2020-11-29 18:33:32 +00005073 sr->len = clen;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005074 iomsg->free_iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005075 } else {
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005076 iomsg->free_iov = iomsg->fast_iov;
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005077 ret = __import_iovec(READ, (struct iovec __user *)uiov, len,
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005078 UIO_FASTIOV, &iomsg->free_iov,
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005079 &iomsg->msg.msg_iter, true);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005080 if (ret < 0)
5081 return ret;
5082 }
5083
5084 return 0;
5085}
Jens Axboe03b12302019-12-02 18:50:25 -07005086#endif
Jens Axboe52de1fe2020-02-27 10:15:42 -07005087
Pavel Begunkov1400e692020-07-12 20:41:05 +03005088static int io_recvmsg_copy_hdr(struct io_kiocb *req,
5089 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07005090{
Pavel Begunkov1400e692020-07-12 20:41:05 +03005091 iomsg->msg.msg_name = &iomsg->addr;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005092
5093#ifdef CONFIG_COMPAT
5094 if (req->ctx->compat)
Pavel Begunkov1400e692020-07-12 20:41:05 +03005095 return __io_compat_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005096#endif
5097
Pavel Begunkov1400e692020-07-12 20:41:05 +03005098 return __io_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005099}
5100
Jens Axboebcda7ba2020-02-23 16:42:51 -07005101static struct io_buffer *io_recv_buffer_select(struct io_kiocb *req,
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005102 bool needs_lock)
Jens Axboebcda7ba2020-02-23 16:42:51 -07005103{
5104 struct io_sr_msg *sr = &req->sr_msg;
5105 struct io_buffer *kbuf;
5106
Jens Axboebcda7ba2020-02-23 16:42:51 -07005107 kbuf = io_buffer_select(req, &sr->len, sr->bgid, sr->kbuf, needs_lock);
5108 if (IS_ERR(kbuf))
5109 return kbuf;
5110
5111 sr->kbuf = kbuf;
5112 req->flags |= REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07005113 return kbuf;
Jens Axboe03b12302019-12-02 18:50:25 -07005114}
5115
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005116static inline unsigned int io_put_recv_kbuf(struct io_kiocb *req)
5117{
5118 return io_put_kbuf(req, req->sr_msg.kbuf);
5119}
5120
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005121static int io_recvmsg_prep_async(struct io_kiocb *req)
Jens Axboe03b12302019-12-02 18:50:25 -07005122{
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005123 int ret;
Jens Axboe06b76d42019-12-19 14:44:26 -07005124
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005125 ret = io_recvmsg_copy_hdr(req, req->async_data);
5126 if (!ret)
5127 req->flags |= REQ_F_NEED_CLEANUP;
5128 return ret;
5129}
5130
5131static int io_recvmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
5132{
5133 struct io_sr_msg *sr = &req->sr_msg;
5134
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03005135 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5136 return -EINVAL;
Jens Axboe37811e42022-04-26 19:34:57 -06005137 if (unlikely(sqe->addr2 || sqe->file_index))
5138 return -EINVAL;
Jens Axboe50fefe52022-06-30 14:42:05 -06005139 if (unlikely(sqe->addr2 || sqe->file_index || sqe->ioprio))
5140 return -EINVAL;
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03005141
Pavel Begunkov270a5942020-07-12 20:41:04 +03005142 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboe0b7b21e2020-01-31 08:34:59 -07005143 sr->len = READ_ONCE(sqe->len);
Jens Axboebcda7ba2020-02-23 16:42:51 -07005144 sr->bgid = READ_ONCE(sqe->buf_group);
David Lamparter7e8cd202023-03-06 13:23:06 -07005145 sr->msg_flags = READ_ONCE(sqe->msg_flags);
Pavel Begunkov04411802021-04-01 15:44:00 +01005146 if (sr->msg_flags & MSG_DONTWAIT)
5147 req->flags |= REQ_F_NOWAIT;
Jens Axboe3529d8c2019-12-19 18:24:38 -07005148
Jens Axboed8768362020-02-27 14:17:49 -07005149#ifdef CONFIG_COMPAT
5150 if (req->ctx->compat)
5151 sr->msg_flags |= MSG_CMSG_COMPAT;
5152#endif
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005153 sr->done_io = 0;
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005154 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07005155}
5156
Pavel Begunkov889fca72021-02-10 00:03:09 +00005157static int io_recvmsg(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe03b12302019-12-02 18:50:25 -07005158{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03005159 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005160 struct io_sr_msg *sr = &req->sr_msg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005161 struct socket *sock;
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005162 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005163 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005164 int min_ret = 0;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005165 int ret, cflags = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005166 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005167
Florent Revestdba4a922020-12-04 12:36:04 +01005168 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005169 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01005170 return -ENOTSOCK;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005171
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005172 kmsg = req->async_data;
5173 if (!kmsg) {
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005174 ret = io_recvmsg_copy_hdr(req, &iomsg);
5175 if (ret)
Pavel Begunkov681fda82020-07-15 22:20:45 +03005176 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005177 kmsg = &iomsg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005178 }
5179
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03005180 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005181 kbuf = io_recv_buffer_select(req, !force_nonblock);
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03005182 if (IS_ERR(kbuf))
5183 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005184 kmsg->fast_iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
Pavel Begunkov5476dfe2021-02-05 00:57:59 +00005185 kmsg->fast_iov[0].iov_len = req->sr_msg.len;
5186 iov_iter_init(&kmsg->msg.msg_iter, READ, kmsg->fast_iov,
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005187 1, req->sr_msg.len);
5188 }
5189
Pavel Begunkov04411802021-04-01 15:44:00 +01005190 flags = req->sr_msg.msg_flags;
5191 if (force_nonblock)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005192 flags |= MSG_DONTWAIT;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005193 if (flags & MSG_WAITALL)
5194 min_ret = iov_iter_count(&kmsg->msg.msg_iter);
5195
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005196 ret = __sys_recvmsg_sock(sock, &kmsg->msg, req->sr_msg.umsg,
5197 kmsg->uaddr, flags);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005198 if (ret < min_ret) {
5199 if (ret == -EAGAIN && force_nonblock)
5200 return io_setup_async_msg(req, kmsg);
5201 if (ret == -ERESTARTSYS)
5202 ret = -EINTR;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005203 if (ret > 0 && io_net_retry(sock, flags)) {
5204 sr->done_io += ret;
Jens Axboe390b8812022-03-23 09:30:05 -06005205 req->flags |= REQ_F_PARTIAL_IO;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005206 return io_setup_async_msg(req, kmsg);
5207 }
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005208 req_set_fail(req);
5209 } else if ((flags & MSG_WAITALL) && (kmsg->msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
5210 req_set_fail(req);
5211 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005212
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005213 if (req->flags & REQ_F_BUFFER_SELECTED)
5214 cflags = io_put_recv_kbuf(req);
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005215 /* fast path, check for non-NULL to avoid function call */
5216 if (kmsg->free_iov)
5217 kfree(kmsg->free_iov);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005218 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005219 if (ret >= 0)
5220 ret += sr->done_io;
5221 else if (sr->done_io)
5222 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00005223 __io_req_complete(req, issue_flags, ret, cflags);
Jens Axboe0fa03c62019-04-19 13:34:07 -06005224 return 0;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005225}
5226
Pavel Begunkov889fca72021-02-10 00:03:09 +00005227static int io_recv(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboefddafac2020-01-04 20:19:44 -07005228{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03005229 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005230 struct io_sr_msg *sr = &req->sr_msg;
5231 struct msghdr msg;
5232 void __user *buf = sr->buf;
Jens Axboefddafac2020-01-04 20:19:44 -07005233 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005234 struct iovec iov;
5235 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005236 int min_ret = 0;
Jens Axboebcda7ba2020-02-23 16:42:51 -07005237 int ret, cflags = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005238 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboefddafac2020-01-04 20:19:44 -07005239
Florent Revestdba4a922020-12-04 12:36:04 +01005240 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005241 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01005242 return -ENOTSOCK;
Jens Axboefddafac2020-01-04 20:19:44 -07005243
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03005244 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005245 kbuf = io_recv_buffer_select(req, !force_nonblock);
Jens Axboebcda7ba2020-02-23 16:42:51 -07005246 if (IS_ERR(kbuf))
5247 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005248 buf = u64_to_user_ptr(kbuf->addr);
Jens Axboefddafac2020-01-04 20:19:44 -07005249 }
5250
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005251 ret = import_single_range(READ, buf, sr->len, &iov, &msg.msg_iter);
Pavel Begunkov14c32ee2020-07-16 23:28:01 +03005252 if (unlikely(ret))
5253 goto out_free;
Jens Axboefddafac2020-01-04 20:19:44 -07005254
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005255 msg.msg_name = NULL;
5256 msg.msg_control = NULL;
5257 msg.msg_controllen = 0;
5258 msg.msg_namelen = 0;
5259 msg.msg_iocb = NULL;
5260 msg.msg_flags = 0;
5261
Pavel Begunkov04411802021-04-01 15:44:00 +01005262 flags = req->sr_msg.msg_flags;
5263 if (force_nonblock)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005264 flags |= MSG_DONTWAIT;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005265 if (flags & MSG_WAITALL)
5266 min_ret = iov_iter_count(&msg.msg_iter);
5267
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005268 ret = sock_recvmsg(sock, &msg, flags);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005269 if (ret < min_ret) {
5270 if (ret == -EAGAIN && force_nonblock)
5271 return -EAGAIN;
5272 if (ret == -ERESTARTSYS)
5273 ret = -EINTR;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005274 if (ret > 0 && io_net_retry(sock, flags)) {
5275 sr->len -= ret;
5276 sr->buf += ret;
5277 sr->done_io += ret;
Jens Axboe390b8812022-03-23 09:30:05 -06005278 req->flags |= REQ_F_PARTIAL_IO;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005279 return -EAGAIN;
5280 }
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005281 req_set_fail(req);
5282 } else if ((flags & MSG_WAITALL) && (msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
Alviro Iskandar Setiawane944f1e2022-02-07 21:05:33 +07005283out_free:
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005284 req_set_fail(req);
5285 }
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005286 if (req->flags & REQ_F_BUFFER_SELECTED)
5287 cflags = io_put_recv_kbuf(req);
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005288 if (ret >= 0)
5289 ret += sr->done_io;
5290 else if (sr->done_io)
5291 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00005292 __io_req_complete(req, issue_flags, ret, cflags);
Jens Axboefddafac2020-01-04 20:19:44 -07005293 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07005294}
5295
Jens Axboe3529d8c2019-12-19 18:24:38 -07005296static int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe17f2fe32019-10-17 14:42:58 -06005297{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005298 struct io_accept *accept = &req->accept;
5299
Jens Axboe14587a462020-09-05 11:36:08 -06005300 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe17f2fe32019-10-17 14:42:58 -06005301 return -EINVAL;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005302 if (sqe->ioprio || sqe->len || sqe->buf_index)
Jens Axboe17f2fe32019-10-17 14:42:58 -06005303 return -EINVAL;
5304
Jens Axboed55e5f52019-12-11 16:12:15 -07005305 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
5306 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005307 accept->flags = READ_ONCE(sqe->accept_flags);
Jens Axboe09952e32020-03-19 20:16:56 -06005308 accept->nofile = rlimit(RLIMIT_NOFILE);
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005309
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005310 accept->file_slot = READ_ONCE(sqe->file_index);
Jens Axboe13239762022-03-14 17:26:19 -06005311 if (accept->file_slot && (accept->flags & SOCK_CLOEXEC))
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005312 return -EINVAL;
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005313 if (accept->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
5314 return -EINVAL;
5315 if (SOCK_NONBLOCK != O_NONBLOCK && (accept->flags & SOCK_NONBLOCK))
5316 accept->flags = (accept->flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005317 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005318}
Jens Axboe17f2fe32019-10-17 14:42:58 -06005319
Pavel Begunkov889fca72021-02-10 00:03:09 +00005320static int io_accept(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005321{
5322 struct io_accept *accept = &req->accept;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005323 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03005324 unsigned int file_flags = force_nonblock ? O_NONBLOCK : 0;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005325 bool fixed = !!accept->file_slot;
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005326 struct file *file;
5327 int ret, fd;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005328
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005329 if (!fixed) {
5330 fd = __get_unused_fd_flags(accept->flags, accept->nofile);
5331 if (unlikely(fd < 0))
5332 return fd;
5333 }
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005334 file = do_accept(req->file, file_flags, accept->addr, accept->addr_len,
5335 accept->flags);
5336 if (IS_ERR(file)) {
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005337 if (!fixed)
5338 put_unused_fd(fd);
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005339 ret = PTR_ERR(file);
Dylan Yudaken30b90682023-01-21 09:13:12 -07005340 /* safe to retry */
5341 req->flags |= REQ_F_PARTIAL_IO;
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005342 if (ret == -EAGAIN && force_nonblock)
5343 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03005344 if (ret == -ERESTARTSYS)
5345 ret = -EINTR;
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01005346 req_set_fail(req);
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005347 } else if (!fixed) {
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005348 fd_install(fd, file);
5349 ret = fd;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005350 } else {
5351 ret = io_install_fixed_file(req, file, issue_flags,
5352 accept->file_slot - 1);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03005353 }
Pavel Begunkov889fca72021-02-10 00:03:09 +00005354 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe17f2fe32019-10-17 14:42:58 -06005355 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005356}
5357
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005358static int io_connect_prep_async(struct io_kiocb *req)
5359{
5360 struct io_async_connect *io = req->async_data;
5361 struct io_connect *conn = &req->connect;
5362
5363 return move_addr_to_kernel(conn->addr, conn->addr_len, &io->address);
5364}
5365
Jens Axboe3529d8c2019-12-19 18:24:38 -07005366static int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef499a022019-12-02 16:28:46 -07005367{
Jens Axboe3529d8c2019-12-19 18:24:38 -07005368 struct io_connect *conn = &req->connect;
Jens Axboef499a022019-12-02 16:28:46 -07005369
Jens Axboe14587a462020-09-05 11:36:08 -06005370 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005371 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01005372 if (sqe->ioprio || sqe->len || sqe->buf_index || sqe->rw_flags ||
5373 sqe->splice_fd_in)
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005374 return -EINVAL;
5375
Jens Axboe3529d8c2019-12-19 18:24:38 -07005376 conn->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
5377 conn->addr_len = READ_ONCE(sqe->addr2);
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005378 return 0;
Jens Axboef499a022019-12-02 16:28:46 -07005379}
5380
Pavel Begunkov889fca72021-02-10 00:03:09 +00005381static int io_connect(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboef8e85cf2019-11-23 14:24:24 -07005382{
Jens Axboee8c2bc12020-08-15 18:44:09 -07005383 struct io_async_connect __io, *io;
Jens Axboef8e85cf2019-11-23 14:24:24 -07005384 unsigned file_flags;
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005385 int ret;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005386 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboef8e85cf2019-11-23 14:24:24 -07005387
Jens Axboee8c2bc12020-08-15 18:44:09 -07005388 if (req->async_data) {
5389 io = req->async_data;
Jens Axboef499a022019-12-02 16:28:46 -07005390 } else {
Jens Axboe3529d8c2019-12-19 18:24:38 -07005391 ret = move_addr_to_kernel(req->connect.addr,
5392 req->connect.addr_len,
Jens Axboee8c2bc12020-08-15 18:44:09 -07005393 &__io.address);
Jens Axboef499a022019-12-02 16:28:46 -07005394 if (ret)
5395 goto out;
5396 io = &__io;
5397 }
5398
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005399 file_flags = force_nonblock ? O_NONBLOCK : 0;
5400
Jens Axboee8c2bc12020-08-15 18:44:09 -07005401 ret = __sys_connect_file(req->file, &io->address,
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005402 req->connect.addr_len, file_flags);
Jens Axboe87f80d62019-12-03 11:23:54 -07005403 if ((ret == -EAGAIN || ret == -EINPROGRESS) && force_nonblock) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07005404 if (req->async_data)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07005405 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005406 if (io_alloc_async_data(req)) {
Jens Axboef499a022019-12-02 16:28:46 -07005407 ret = -ENOMEM;
5408 goto out;
5409 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07005410 memcpy(req->async_data, &__io, sizeof(__io));
Jens Axboef8e85cf2019-11-23 14:24:24 -07005411 return -EAGAIN;
Jens Axboef499a022019-12-02 16:28:46 -07005412 }
Jens Axboef8e85cf2019-11-23 14:24:24 -07005413 if (ret == -ERESTARTSYS)
5414 ret = -EINTR;
Jens Axboef499a022019-12-02 16:28:46 -07005415out:
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005416 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01005417 req_set_fail(req);
Pavel Begunkov889fca72021-02-10 00:03:09 +00005418 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboef8e85cf2019-11-23 14:24:24 -07005419 return 0;
Jens Axboef8e85cf2019-11-23 14:24:24 -07005420}
YueHaibing469956e2020-03-04 15:53:52 +08005421#else /* !CONFIG_NET */
Jens Axboe99a10082021-02-19 09:35:19 -07005422#define IO_NETOP_FN(op) \
5423static int io_##op(struct io_kiocb *req, unsigned int issue_flags) \
5424{ \
5425 return -EOPNOTSUPP; \
Jens Axboef8e85cf2019-11-23 14:24:24 -07005426}
5427
Jens Axboe99a10082021-02-19 09:35:19 -07005428#define IO_NETOP_PREP(op) \
5429IO_NETOP_FN(op) \
5430static int io_##op##_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe) \
5431{ \
5432 return -EOPNOTSUPP; \
5433} \
5434
5435#define IO_NETOP_PREP_ASYNC(op) \
5436IO_NETOP_PREP(op) \
5437static int io_##op##_prep_async(struct io_kiocb *req) \
5438{ \
5439 return -EOPNOTSUPP; \
YueHaibing469956e2020-03-04 15:53:52 +08005440}
5441
Jens Axboe99a10082021-02-19 09:35:19 -07005442IO_NETOP_PREP_ASYNC(sendmsg);
5443IO_NETOP_PREP_ASYNC(recvmsg);
5444IO_NETOP_PREP_ASYNC(connect);
5445IO_NETOP_PREP(accept);
5446IO_NETOP_FN(send);
5447IO_NETOP_FN(recv);
YueHaibing469956e2020-03-04 15:53:52 +08005448#endif /* CONFIG_NET */
Jens Axboe17f2fe32019-10-17 14:42:58 -06005449
Jens Axboed7718a92020-02-14 22:23:12 -07005450struct io_poll_table {
5451 struct poll_table_struct pt;
5452 struct io_kiocb *req;
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005453 int nr_entries;
Jens Axboed7718a92020-02-14 22:23:12 -07005454 int error;
5455};
5456
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005457#define IO_POLL_CANCEL_FLAG BIT(31)
Pavel Begunkov4b702b72022-12-02 14:27:14 +00005458#define IO_POLL_RETRY_FLAG BIT(30)
5459#define IO_POLL_REF_MASK GENMASK(29, 0)
5460
5461/*
5462 * We usually have 1-2 refs taken, 128 is more than enough and we want to
5463 * maximise the margin between this amount and the moment when it overflows.
5464 */
5465#define IO_POLL_REF_BIAS 128
5466
5467static bool io_poll_get_ownership_slowpath(struct io_kiocb *req)
5468{
5469 int v;
5470
5471 /*
5472 * poll_refs are already elevated and we don't have much hope for
5473 * grabbing the ownership. Instead of incrementing set a retry flag
5474 * to notify the loop that there might have been some change.
5475 */
5476 v = atomic_fetch_or(IO_POLL_RETRY_FLAG, &req->poll_refs);
5477 if (v & IO_POLL_REF_MASK)
5478 return false;
5479 return !(atomic_fetch_inc(&req->poll_refs) & IO_POLL_REF_MASK);
5480}
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005481
5482/*
5483 * If refs part of ->poll_refs (see IO_POLL_REF_MASK) is 0, it's free. We can
5484 * bump it and acquire ownership. It's disallowed to modify requests while not
5485 * owning it, that prevents from races for enqueueing task_work's and b/w
5486 * arming poll and wakeups.
5487 */
5488static inline bool io_poll_get_ownership(struct io_kiocb *req)
5489{
Pavel Begunkov4b702b72022-12-02 14:27:14 +00005490 if (unlikely(atomic_read(&req->poll_refs) >= IO_POLL_REF_BIAS))
5491 return io_poll_get_ownership_slowpath(req);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005492 return !(atomic_fetch_inc(&req->poll_refs) & IO_POLL_REF_MASK);
5493}
5494
5495static void io_poll_mark_cancelled(struct io_kiocb *req)
5496{
5497 atomic_or(IO_POLL_CANCEL_FLAG, &req->poll_refs);
5498}
5499
Pavel Begunkova85d7ac2022-08-29 14:30:15 +01005500static struct io_poll_iocb *io_poll_get_double(struct io_kiocb *req)
5501{
5502 /* pure poll stashes this in ->async_data, poll driven retry elsewhere */
5503 if (req->opcode == IORING_OP_POLL_ADD)
5504 return req->async_data;
5505 return req->apoll->double_poll;
5506}
5507
5508static struct io_poll_iocb *io_poll_get_single(struct io_kiocb *req)
5509{
5510 if (req->opcode == IORING_OP_POLL_ADD)
5511 return &req->poll;
5512 return &req->apoll->poll;
5513}
5514
5515static void io_poll_req_insert(struct io_kiocb *req)
5516{
5517 struct io_ring_ctx *ctx = req->ctx;
5518 struct hlist_head *list;
5519
5520 list = &ctx->cancel_hash[hash_long(req->user_data, ctx->cancel_hash_bits)];
5521 hlist_add_head(&req->hash_node, list);
5522}
5523
5524static void io_init_poll_iocb(struct io_poll_iocb *poll, __poll_t events,
5525 wait_queue_func_t wake_func)
5526{
5527 poll->head = NULL;
Pavel Begunkova85d7ac2022-08-29 14:30:15 +01005528#define IO_POLL_UNMASK (EPOLLERR|EPOLLHUP|EPOLLNVAL|EPOLLRDHUP)
5529 /* mask in events that we always want/need */
5530 poll->events = events | IO_POLL_UNMASK;
5531 INIT_LIST_HEAD(&poll->wait.entry);
5532 init_waitqueue_func_entry(&poll->wait, wake_func);
5533}
5534
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005535static inline void io_poll_remove_entry(struct io_poll_iocb *poll)
Jens Axboed7718a92020-02-14 22:23:12 -07005536{
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005537 struct wait_queue_head *head = smp_load_acquire(&poll->head);
Jens Axboed7718a92020-02-14 22:23:12 -07005538
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005539 if (head) {
5540 spin_lock_irq(&head->lock);
5541 list_del_init(&poll->wait.entry);
5542 poll->head = NULL;
5543 spin_unlock_irq(&head->lock);
5544 }
Jens Axboed7718a92020-02-14 22:23:12 -07005545}
5546
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005547static void io_poll_remove_entries(struct io_kiocb *req)
5548{
5549 struct io_poll_iocb *poll = io_poll_get_single(req);
5550 struct io_poll_iocb *poll_double = io_poll_get_double(req);
5551
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005552 /*
5553 * While we hold the waitqueue lock and the waitqueue is nonempty,
5554 * wake_up_pollfree() will wait for us. However, taking the waitqueue
5555 * lock in the first place can race with the waitqueue being freed.
5556 *
5557 * We solve this as eventpoll does: by taking advantage of the fact that
5558 * all users of wake_up_pollfree() will RCU-delay the actual free. If
5559 * we enter rcu_read_lock() and see that the pointer to the queue is
5560 * non-NULL, we can then lock it without the memory being freed out from
5561 * under us.
5562 *
5563 * Keep holding rcu_read_lock() as long as we hold the queue lock, in
5564 * case the caller deletes the entry from the queue, leaving it empty.
5565 * In that case, only RCU prevents the queue memory from being freed.
5566 */
5567 rcu_read_lock();
5568 io_poll_remove_entry(poll);
5569 if (poll_double)
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005570 io_poll_remove_entry(poll_double);
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005571 rcu_read_unlock();
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005572}
5573
5574/*
5575 * All poll tw should go through this. Checks for poll events, manages
5576 * references, does rewait, etc.
5577 *
5578 * Returns a negative error on failure. >0 when no action require, which is
5579 * either spurious wakeup or multishot CQE is served. 0 when it's done with
5580 * the request, then the mask is stored in req->result.
5581 */
5582static int io_poll_check_events(struct io_kiocb *req)
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005583{
5584 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005585 struct io_poll_iocb *poll = io_poll_get_single(req);
5586 int v;
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005587
Jens Axboe316319e2021-08-19 09:41:42 -06005588 /* req->task == current here, checking PF_EXITING is safe */
Pavel Begunkove09ee512021-07-01 13:26:05 +01005589 if (unlikely(req->task->flags & PF_EXITING))
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005590 io_poll_mark_cancelled(req);
Pavel Begunkove09ee512021-07-01 13:26:05 +01005591
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005592 do {
5593 v = atomic_read(&req->poll_refs);
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005594
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005595 /* tw handler should be the owner, and so have some references */
5596 if (WARN_ON_ONCE(!(v & IO_POLL_REF_MASK)))
5597 return 0;
5598 if (v & IO_POLL_CANCEL_FLAG)
5599 return -ECANCELED;
Pavel Begunkovcd1981a2022-12-02 14:27:12 +00005600 /*
5601 * cqe.res contains only events of the first wake up
5602 * and all others are be lost. Redo vfs_poll() to get
5603 * up to date state.
5604 */
5605 if ((v & IO_POLL_REF_MASK) != 1)
5606 req->result = 0;
Pavel Begunkov4b702b72022-12-02 14:27:14 +00005607 if (v & IO_POLL_RETRY_FLAG) {
5608 req->result = 0;
5609 /*
5610 * We won't find new events that came in between
5611 * vfs_poll and the ref put unless we clear the
5612 * flag in advance.
5613 */
5614 atomic_andnot(IO_POLL_RETRY_FLAG, &req->poll_refs);
5615 v &= ~IO_POLL_RETRY_FLAG;
5616 }
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005617
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005618 if (!req->result) {
5619 struct poll_table_struct pt = { ._key = poll->events };
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005620
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005621 req->result = vfs_poll(req->file, &pt) & poll->events;
5622 }
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005623
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005624 /* multishot, just fill an CQE and proceed */
5625 if (req->result && !(poll->events & EPOLLONESHOT)) {
5626 __poll_t mask = mangle_poll(req->result & poll->events);
5627 bool filled;
Jens Axboe18bceab2020-05-15 11:56:54 -06005628
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005629 spin_lock(&ctx->completion_lock);
5630 filled = io_fill_cqe_aux(ctx, req->user_data, mask,
5631 IORING_CQE_F_MORE);
5632 io_commit_cqring(ctx);
5633 spin_unlock(&ctx->completion_lock);
5634 if (unlikely(!filled))
5635 return -ECANCELED;
5636 io_cqring_ev_posted(ctx);
5637 } else if (req->result) {
5638 return 0;
5639 }
Jens Axboe18bceab2020-05-15 11:56:54 -06005640
Pavel Begunkov62321dc2022-12-02 14:27:11 +00005641 /* force the next iteration to vfs_poll() */
5642 req->result = 0;
5643
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005644 /*
5645 * Release all references, retry if someone tried to restart
5646 * task_work while we were executing it.
5647 */
Lin Madf4b1772022-12-02 14:27:15 +00005648 } while (atomic_sub_return(v & IO_POLL_REF_MASK, &req->poll_refs) &
5649 IO_POLL_REF_MASK);
Jens Axboe18bceab2020-05-15 11:56:54 -06005650
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005651 return 1;
Jens Axboe18bceab2020-05-15 11:56:54 -06005652}
5653
Pavel Begunkovf237c302021-08-18 12:42:46 +01005654static void io_poll_task_func(struct io_kiocb *req, bool *locked)
Jens Axboe18bceab2020-05-15 11:56:54 -06005655{
Jens Axboe6d816e02020-08-11 08:04:14 -06005656 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005657 int ret;
Jens Axboe18bceab2020-05-15 11:56:54 -06005658
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005659 ret = io_poll_check_events(req);
5660 if (ret > 0)
5661 return;
5662
5663 if (!ret) {
5664 req->result = mangle_poll(req->result & req->poll.events);
Pavel Begunkovdd221f462020-10-18 10:17:42 +01005665 } else {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005666 req->result = ret;
5667 req_set_fail(req);
Pavel Begunkovdd221f462020-10-18 10:17:42 +01005668 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005669
5670 io_poll_remove_entries(req);
5671 spin_lock(&ctx->completion_lock);
5672 hash_del(&req->hash_node);
5673 spin_unlock(&ctx->completion_lock);
5674 io_req_complete_post(req, req->result, 0);
Jens Axboe18bceab2020-05-15 11:56:54 -06005675}
5676
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005677static void io_apoll_task_func(struct io_kiocb *req, bool *locked)
5678{
5679 struct io_ring_ctx *ctx = req->ctx;
5680 int ret;
5681
5682 ret = io_poll_check_events(req);
5683 if (ret > 0)
5684 return;
5685
5686 io_poll_remove_entries(req);
5687 spin_lock(&ctx->completion_lock);
5688 hash_del(&req->hash_node);
5689 spin_unlock(&ctx->completion_lock);
5690
5691 if (!ret)
5692 io_req_task_submit(req, locked);
5693 else
5694 io_req_complete_failed(req, ret);
5695}
5696
5697static void __io_poll_execute(struct io_kiocb *req, int mask)
5698{
5699 req->result = mask;
5700 if (req->opcode == IORING_OP_POLL_ADD)
5701 req->io_task_work.func = io_poll_task_func;
5702 else
5703 req->io_task_work.func = io_apoll_task_func;
5704
5705 trace_io_uring_task_add(req->ctx, req->opcode, req->user_data, mask);
5706 io_req_task_work_add(req);
5707}
5708
5709static inline void io_poll_execute(struct io_kiocb *req, int res)
5710{
5711 if (io_poll_get_ownership(req))
5712 __io_poll_execute(req, res);
5713}
5714
5715static void io_poll_cancel_req(struct io_kiocb *req)
5716{
5717 io_poll_mark_cancelled(req);
5718 /* kick tw, which should complete the request */
5719 io_poll_execute(req, 0);
5720}
5721
5722static int io_poll_wake(struct wait_queue_entry *wait, unsigned mode, int sync,
5723 void *key)
Jens Axboe18bceab2020-05-15 11:56:54 -06005724{
5725 struct io_kiocb *req = wait->private;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005726 struct io_poll_iocb *poll = container_of(wait, struct io_poll_iocb,
5727 wait);
Jens Axboe18bceab2020-05-15 11:56:54 -06005728 __poll_t mask = key_to_poll(key);
5729
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005730 if (unlikely(mask & POLLFREE)) {
5731 io_poll_mark_cancelled(req);
5732 /* we have to kick tw in case it's not already */
5733 io_poll_execute(req, 0);
5734
5735 /*
5736 * If the waitqueue is being freed early but someone is already
5737 * holds ownership over it, we have to tear down the request as
5738 * best we can. That means immediately removing the request from
5739 * its waitqueue and preventing all further accesses to the
5740 * waitqueue via the request.
5741 */
5742 list_del_init(&poll->wait.entry);
5743
5744 /*
5745 * Careful: this *must* be the last step, since as soon
5746 * as req->head is NULL'ed out, the request can be
5747 * completed and freed, since aio_poll_complete_work()
5748 * will no longer need to take the waitqueue lock.
5749 */
5750 smp_store_release(&poll->head, NULL);
5751 return 1;
5752 }
5753
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005754 /* for instances that support it check for an event match first */
Jens Axboe18bceab2020-05-15 11:56:54 -06005755 if (mask && !(mask & poll->events))
5756 return 0;
5757
Jens Axboeccf06b52022-12-23 07:04:49 -07005758 if (io_poll_get_ownership(req)) {
5759 /*
5760 * If we trigger a multishot poll off our own wakeup path,
5761 * disable multishot as there is a circular dependency between
5762 * CQ posting and triggering the event.
5763 */
5764 if (mask & EPOLL_URING_WAKE)
5765 poll->events |= EPOLLONESHOT;
5766
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005767 __io_poll_execute(req, mask);
Jens Axboeccf06b52022-12-23 07:04:49 -07005768 }
Jens Axboe18bceab2020-05-15 11:56:54 -06005769 return 1;
5770}
5771
Jens Axboe18bceab2020-05-15 11:56:54 -06005772static void __io_queue_proc(struct io_poll_iocb *poll, struct io_poll_table *pt,
Jens Axboe807abcb2020-07-17 17:09:27 -06005773 struct wait_queue_head *head,
5774 struct io_poll_iocb **poll_ptr)
Jens Axboe18bceab2020-05-15 11:56:54 -06005775{
5776 struct io_kiocb *req = pt->req;
5777
5778 /*
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005779 * The file being polled uses multiple waitqueues for poll handling
5780 * (e.g. one for read, one for write). Setup a separate io_poll_iocb
5781 * if this happens.
Jens Axboe18bceab2020-05-15 11:56:54 -06005782 */
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005783 if (unlikely(pt->nr_entries)) {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005784 struct io_poll_iocb *first = poll;
Pavel Begunkov58852d42020-10-16 20:55:56 +01005785
Pavel Begunkov23a65db2021-08-17 20:28:11 +01005786 /* double add on the same waitqueue head, ignore */
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005787 if (first->head == head)
Pavel Begunkov23a65db2021-08-17 20:28:11 +01005788 return;
Jens Axboe18bceab2020-05-15 11:56:54 -06005789 /* already have a 2nd entry, fail a third attempt */
Jens Axboe807abcb2020-07-17 17:09:27 -06005790 if (*poll_ptr) {
Pavel Begunkov23a65db2021-08-17 20:28:11 +01005791 if ((*poll_ptr)->head == head)
5792 return;
Jens Axboe18bceab2020-05-15 11:56:54 -06005793 pt->error = -EINVAL;
5794 return;
5795 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005796
Jens Axboe18bceab2020-05-15 11:56:54 -06005797 poll = kmalloc(sizeof(*poll), GFP_ATOMIC);
5798 if (!poll) {
5799 pt->error = -ENOMEM;
5800 return;
5801 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005802 io_init_poll_iocb(poll, first->events, first->wait.func);
Jens Axboe807abcb2020-07-17 17:09:27 -06005803 *poll_ptr = poll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005804 }
5805
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005806 pt->nr_entries++;
Jens Axboe18bceab2020-05-15 11:56:54 -06005807 poll->head = head;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005808 poll->wait.private = req;
Jiufei Xuea31eb4a2020-06-17 17:53:56 +08005809
5810 if (poll->events & EPOLLEXCLUSIVE)
5811 add_wait_queue_exclusive(head, &poll->wait);
5812 else
5813 add_wait_queue(head, &poll->wait);
Jens Axboe18bceab2020-05-15 11:56:54 -06005814}
5815
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005816static void io_poll_queue_proc(struct file *file, struct wait_queue_head *head,
5817 struct poll_table_struct *p)
5818{
5819 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
5820
5821 __io_queue_proc(&pt->req->poll, pt, head,
5822 (struct io_poll_iocb **) &pt->req->async_data);
5823}
5824
5825static int __io_arm_poll_handler(struct io_kiocb *req,
5826 struct io_poll_iocb *poll,
5827 struct io_poll_table *ipt, __poll_t mask)
5828{
5829 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005830
5831 INIT_HLIST_NODE(&req->hash_node);
5832 io_init_poll_iocb(poll, mask, io_poll_wake);
5833 poll->file = req->file;
5834 poll->wait.private = req;
5835
5836 ipt->pt._key = mask;
5837 ipt->req = req;
5838 ipt->error = 0;
5839 ipt->nr_entries = 0;
5840
5841 /*
5842 * Take the ownership to delay any tw execution up until we're done
5843 * with poll arming. see io_poll_get_ownership().
5844 */
5845 atomic_set(&req->poll_refs, 1);
5846 mask = vfs_poll(req->file, &ipt->pt) & poll->events;
5847
5848 if (mask && (poll->events & EPOLLONESHOT)) {
5849 io_poll_remove_entries(req);
5850 /* no one else has access to the req, forget about the ref */
5851 return mask;
5852 }
5853 if (!mask && unlikely(ipt->error || !ipt->nr_entries)) {
5854 io_poll_remove_entries(req);
5855 if (!ipt->error)
5856 ipt->error = -EINVAL;
5857 return 0;
5858 }
5859
5860 spin_lock(&ctx->completion_lock);
5861 io_poll_req_insert(req);
5862 spin_unlock(&ctx->completion_lock);
5863
5864 if (mask) {
5865 /* can't multishot if failed, just queue the event we've got */
Pavel Begunkov182dc3a2022-08-29 14:30:23 +01005866 if (unlikely(ipt->error || !ipt->nr_entries)) {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005867 poll->events |= EPOLLONESHOT;
Pavel Begunkov182dc3a2022-08-29 14:30:23 +01005868 ipt->error = 0;
5869 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005870 __io_poll_execute(req, mask);
5871 return 0;
5872 }
5873
5874 /*
Pavel Begunkov1d588492022-12-02 14:27:13 +00005875 * Try to release ownership. If we see a change of state, e.g.
5876 * poll was waken up, queue up a tw, it'll deal with it.
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005877 */
Pavel Begunkov1d588492022-12-02 14:27:13 +00005878 if (atomic_cmpxchg(&req->poll_refs, 1, 0) != 1)
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005879 __io_poll_execute(req, 0);
5880 return 0;
5881}
5882
Jens Axboe18bceab2020-05-15 11:56:54 -06005883static void io_async_queue_proc(struct file *file, struct wait_queue_head *head,
5884 struct poll_table_struct *p)
5885{
5886 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
Jens Axboe807abcb2020-07-17 17:09:27 -06005887 struct async_poll *apoll = pt->req->apoll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005888
Jens Axboe807abcb2020-07-17 17:09:27 -06005889 __io_queue_proc(&apoll->poll, pt, head, &apoll->double_poll);
Jens Axboe18bceab2020-05-15 11:56:54 -06005890}
5891
Olivier Langlois59b735a2021-06-22 05:17:39 -07005892enum {
5893 IO_APOLL_OK,
5894 IO_APOLL_ABORTED,
5895 IO_APOLL_READY
5896};
5897
Jens Axboe345fb362023-03-06 13:28:57 -07005898/*
5899 * We can't reliably detect loops in repeated poll triggers and issue
5900 * subsequently failing. But rather than fail these immediately, allow a
5901 * certain amount of retries before we give up. Given that this condition
5902 * should _rarely_ trigger even once, we should be fine with a larger value.
5903 */
5904#define APOLL_MAX_RETRY 128
5905
Olivier Langlois59b735a2021-06-22 05:17:39 -07005906static int io_arm_poll_handler(struct io_kiocb *req)
Jens Axboed7718a92020-02-14 22:23:12 -07005907{
5908 const struct io_op_def *def = &io_op_defs[req->opcode];
5909 struct io_ring_ctx *ctx = req->ctx;
5910 struct async_poll *apoll;
5911 struct io_poll_table ipt;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005912 __poll_t mask = EPOLLONESHOT | POLLERR | POLLPRI;
5913 int ret;
Jens Axboed7718a92020-02-14 22:23:12 -07005914
5915 if (!req->file || !file_can_poll(req->file))
Olivier Langlois59b735a2021-06-22 05:17:39 -07005916 return IO_APOLL_ABORTED;
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005917 if (!def->pollin && !def->pollout)
Olivier Langlois59b735a2021-06-22 05:17:39 -07005918 return IO_APOLL_ABORTED;
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005919
5920 if (def->pollin) {
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005921 mask |= POLLIN | POLLRDNORM;
5922
5923 /* If reading from MSG_ERRQUEUE using recvmsg, ignore POLLIN */
5924 if ((req->opcode == IORING_OP_RECVMSG) &&
5925 (req->sr_msg.msg_flags & MSG_ERRQUEUE))
5926 mask &= ~POLLIN;
5927 } else {
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005928 mask |= POLLOUT | POLLWRNORM;
5929 }
5930
Pavel Begunkov124fb132023-01-22 10:24:20 -07005931 if (req->flags & REQ_F_POLLED) {
Jens Axboea79b13f2023-01-21 10:39:22 -07005932 apoll = req->apoll;
Pavel Begunkov124fb132023-01-22 10:24:20 -07005933 kfree(apoll->double_poll);
Jens Axboe345fb362023-03-06 13:28:57 -07005934 if (unlikely(!--apoll->poll.retries)) {
5935 apoll->double_poll = NULL;
5936 return IO_APOLL_ABORTED;
5937 }
Pavel Begunkov124fb132023-01-22 10:24:20 -07005938 } else {
Jens Axboea79b13f2023-01-21 10:39:22 -07005939 apoll = kmalloc(sizeof(*apoll), GFP_ATOMIC);
Fedor Pchelkinf4ba5542023-03-16 21:56:16 +03005940 if (unlikely(!apoll))
5941 return IO_APOLL_ABORTED;
Jens Axboe345fb362023-03-06 13:28:57 -07005942 apoll->poll.retries = APOLL_MAX_RETRY;
Pavel Begunkov124fb132023-01-22 10:24:20 -07005943 }
Jens Axboe807abcb2020-07-17 17:09:27 -06005944 apoll->double_poll = NULL;
Jens Axboed7718a92020-02-14 22:23:12 -07005945 req->apoll = apoll;
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005946 req->flags |= REQ_F_POLLED;
Jens Axboed7718a92020-02-14 22:23:12 -07005947 ipt.pt._qproc = io_async_queue_proc;
5948
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005949 ret = __io_arm_poll_handler(req, &apoll->poll, &ipt, mask);
Hao Xu41a51692021-08-12 15:47:02 +08005950 if (ret || ipt.error)
5951 return ret ? IO_APOLL_READY : IO_APOLL_ABORTED;
5952
Olivier Langlois236daeae2021-05-31 02:36:37 -04005953 trace_io_uring_poll_arm(ctx, req, req->opcode, req->user_data,
5954 mask, apoll->poll.events);
Olivier Langlois59b735a2021-06-22 05:17:39 -07005955 return IO_APOLL_OK;
Jens Axboed7718a92020-02-14 22:23:12 -07005956}
5957
Jens Axboe76e1b642020-09-26 15:05:03 -06005958/*
5959 * Returns true if we found and killed one or more poll requests
5960 */
Pavel Begunkov6b819282020-11-06 13:00:25 +00005961static bool io_poll_remove_all(struct io_ring_ctx *ctx, struct task_struct *tsk,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01005962 bool cancel_all)
Jens Axboe221c5eb2019-01-17 09:41:58 -07005963{
Jens Axboe78076bb2019-12-04 19:56:40 -07005964 struct hlist_node *tmp;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005965 struct io_kiocb *req;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005966 bool found = false;
5967 int i;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005968
Jens Axboe79ebeae2021-08-10 15:18:27 -06005969 spin_lock(&ctx->completion_lock);
Jens Axboe78076bb2019-12-04 19:56:40 -07005970 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
5971 struct hlist_head *list;
5972
5973 list = &ctx->cancel_hash[i];
Jens Axboef3606e32020-09-22 08:18:24 -06005974 hlist_for_each_entry_safe(req, tmp, list, hash_node) {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005975 if (io_match_task_safe(req, tsk, cancel_all)) {
Jens Axboe7524ec52022-08-29 14:30:20 +01005976 hlist_del_init(&req->hash_node);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005977 io_poll_cancel_req(req);
5978 found = true;
5979 }
Jens Axboef3606e32020-09-22 08:18:24 -06005980 }
Jens Axboe221c5eb2019-01-17 09:41:58 -07005981 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06005982 spin_unlock(&ctx->completion_lock);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005983 return found;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005984}
5985
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01005986static struct io_kiocb *io_poll_find(struct io_ring_ctx *ctx, __u64 sqe_addr,
5987 bool poll_only)
Pavel Begunkove07785b2021-04-01 15:43:57 +01005988 __must_hold(&ctx->completion_lock)
Jens Axboe47f46762019-11-09 17:43:02 -07005989{
Jens Axboe78076bb2019-12-04 19:56:40 -07005990 struct hlist_head *list;
Jens Axboe47f46762019-11-09 17:43:02 -07005991 struct io_kiocb *req;
5992
Jens Axboe78076bb2019-12-04 19:56:40 -07005993 list = &ctx->cancel_hash[hash_long(sqe_addr, ctx->cancel_hash_bits)];
5994 hlist_for_each_entry(req, list, hash_node) {
Jens Axboeb41e9852020-02-17 09:52:41 -07005995 if (sqe_addr != req->user_data)
5996 continue;
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01005997 if (poll_only && req->opcode != IORING_OP_POLL_ADD)
5998 continue;
Jens Axboeb2cb8052021-03-17 08:17:19 -06005999 return req;
Jens Axboe47f46762019-11-09 17:43:02 -07006000 }
Jens Axboeb2cb8052021-03-17 08:17:19 -06006001 return NULL;
Jens Axboe47f46762019-11-09 17:43:02 -07006002}
6003
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006004static bool io_poll_disarm(struct io_kiocb *req)
6005 __must_hold(&ctx->completion_lock)
6006{
6007 if (!io_poll_get_ownership(req))
6008 return false;
6009 io_poll_remove_entries(req);
6010 hash_del(&req->hash_node);
6011 return true;
6012}
6013
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01006014static int io_poll_cancel(struct io_ring_ctx *ctx, __u64 sqe_addr,
6015 bool poll_only)
Pavel Begunkove07785b2021-04-01 15:43:57 +01006016 __must_hold(&ctx->completion_lock)
Jens Axboeb2cb8052021-03-17 08:17:19 -06006017{
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006018 struct io_kiocb *req = io_poll_find(ctx, sqe_addr, poll_only);
Jens Axboeb2cb8052021-03-17 08:17:19 -06006019
Jens Axboeb2cb8052021-03-17 08:17:19 -06006020 if (!req)
6021 return -ENOENT;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006022 io_poll_cancel_req(req);
6023 return 0;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006024}
6025
Pavel Begunkov9096af32021-04-14 13:38:36 +01006026static __poll_t io_poll_parse_events(const struct io_uring_sqe *sqe,
6027 unsigned int flags)
6028{
6029 u32 events;
6030
6031 events = READ_ONCE(sqe->poll32_events);
6032#ifdef __BIG_ENDIAN
6033 events = swahw32(events);
6034#endif
6035 if (!(flags & IORING_POLL_ADD_MULTI))
6036 events |= EPOLLONESHOT;
6037 return demangle_poll(events) | (events & (EPOLLEXCLUSIVE|EPOLLONESHOT));
6038}
6039
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006040static int io_poll_update_prep(struct io_kiocb *req,
Jens Axboe3529d8c2019-12-19 18:24:38 -07006041 const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006042{
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006043 struct io_poll_update *upd = &req->poll_update;
6044 u32 flags;
6045
Jens Axboe221c5eb2019-01-17 09:41:58 -07006046 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
6047 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006048 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006049 return -EINVAL;
6050 flags = READ_ONCE(sqe->len);
6051 if (flags & ~(IORING_POLL_UPDATE_EVENTS | IORING_POLL_UPDATE_USER_DATA |
6052 IORING_POLL_ADD_MULTI))
6053 return -EINVAL;
6054 /* meaningless without update */
6055 if (flags == IORING_POLL_ADD_MULTI)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006056 return -EINVAL;
6057
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006058 upd->old_user_data = READ_ONCE(sqe->addr);
6059 upd->update_events = flags & IORING_POLL_UPDATE_EVENTS;
6060 upd->update_user_data = flags & IORING_POLL_UPDATE_USER_DATA;
Jens Axboe0969e782019-12-17 18:40:57 -07006061
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006062 upd->new_user_data = READ_ONCE(sqe->off);
6063 if (!upd->update_user_data && upd->new_user_data)
6064 return -EINVAL;
6065 if (upd->update_events)
6066 upd->events = io_poll_parse_events(sqe, flags);
6067 else if (sqe->poll32_events)
6068 return -EINVAL;
Jens Axboe0969e782019-12-17 18:40:57 -07006069
Jens Axboe221c5eb2019-01-17 09:41:58 -07006070 return 0;
6071}
6072
Jens Axboe3529d8c2019-12-19 18:24:38 -07006073static int io_poll_add_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006074{
6075 struct io_poll_iocb *poll = &req->poll;
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006076 u32 flags;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006077
6078 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
6079 return -EINVAL;
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006080 if (sqe->ioprio || sqe->buf_index || sqe->off || sqe->addr)
Jens Axboe88e41cf2021-02-22 22:08:01 -07006081 return -EINVAL;
6082 flags = READ_ONCE(sqe->len);
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006083 if (flags & ~IORING_POLL_ADD_MULTI)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006084 return -EINVAL;
6085
Pavel Begunkov48dcd382021-08-15 10:40:18 +01006086 io_req_set_refcount(req);
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006087 poll->events = io_poll_parse_events(sqe, flags);
Jens Axboe0969e782019-12-17 18:40:57 -07006088 return 0;
6089}
6090
Pavel Begunkov61e98202021-02-10 00:03:08 +00006091static int io_poll_add(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe0969e782019-12-17 18:40:57 -07006092{
6093 struct io_poll_iocb *poll = &req->poll;
Jens Axboe0969e782019-12-17 18:40:57 -07006094 struct io_poll_table ipt;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006095 int ret;
Jens Axboe0969e782019-12-17 18:40:57 -07006096
Jens Axboed7718a92020-02-14 22:23:12 -07006097 ipt.pt._qproc = io_poll_queue_proc;
Jens Axboe36703242019-07-25 10:20:18 -06006098
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006099 ret = __io_arm_poll_handler(req, &req->poll, &ipt, poll->events);
Pavel Begunkov6c7259c2022-08-29 14:30:22 +01006100 if (!ret && ipt.error)
6101 req_set_fail(req);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006102 ret = ret ?: ipt.error;
6103 if (ret)
6104 __io_req_complete(req, issue_flags, ret, 0);
6105 return 0;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006106}
6107
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006108static int io_poll_update(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeb69de282021-03-17 08:37:41 -06006109{
6110 struct io_ring_ctx *ctx = req->ctx;
6111 struct io_kiocb *preq;
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006112 int ret2, ret = 0;
Jens Axboeb69de282021-03-17 08:37:41 -06006113
Jens Axboe0e388fc2023-06-16 21:12:06 -06006114 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
6115
Jens Axboe79ebeae2021-08-10 15:18:27 -06006116 spin_lock(&ctx->completion_lock);
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01006117 preq = io_poll_find(ctx, req->poll_update.old_user_data, true);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006118 if (!preq || !io_poll_disarm(preq)) {
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006119 spin_unlock(&ctx->completion_lock);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006120 ret = preq ? -EALREADY : -ENOENT;
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006121 goto out;
Jens Axboeb69de282021-03-17 08:37:41 -06006122 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06006123 spin_unlock(&ctx->completion_lock);
Jens Axboecb3b200e2021-04-06 09:49:31 -06006124
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006125 if (req->poll_update.update_events || req->poll_update.update_user_data) {
6126 /* only mask one event flags, keep behavior flags */
6127 if (req->poll_update.update_events) {
6128 preq->poll.events &= ~0xffff;
6129 preq->poll.events |= req->poll_update.events & 0xffff;
6130 preq->poll.events |= IO_POLL_UNMASK;
6131 }
6132 if (req->poll_update.update_user_data)
6133 preq->user_data = req->poll_update.new_user_data;
6134
6135 ret2 = io_poll_add(preq, issue_flags);
6136 /* successfully updated, don't complete poll request */
6137 if (!ret2)
6138 goto out;
6139 }
6140 req_set_fail(preq);
6141 io_req_complete(preq, -ECANCELED);
6142out:
6143 if (ret < 0)
6144 req_set_fail(req);
Jens Axboeb69de282021-03-17 08:37:41 -06006145 /* complete update request, we're done with it */
6146 io_req_complete(req, ret);
Jens Axboe0e388fc2023-06-16 21:12:06 -06006147 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Jens Axboeb69de282021-03-17 08:37:41 -06006148 return 0;
6149}
6150
Pavel Begunkovf237c302021-08-18 12:42:46 +01006151static void io_req_task_timeout(struct io_kiocb *req, bool *locked)
Jens Axboe89850fc2021-08-10 15:11:51 -06006152{
Jens Axboe89850fc2021-08-10 15:11:51 -06006153 req_set_fail(req);
Pavel Begunkov505657b2021-08-17 20:28:09 +01006154 io_req_complete_post(req, -ETIME, 0);
Jens Axboe89850fc2021-08-10 15:11:51 -06006155}
6156
Jens Axboe5262f562019-09-17 12:26:57 -06006157static enum hrtimer_restart io_timeout_fn(struct hrtimer *timer)
6158{
Jens Axboead8a48a2019-11-15 08:49:11 -07006159 struct io_timeout_data *data = container_of(timer,
6160 struct io_timeout_data, timer);
6161 struct io_kiocb *req = data->req;
6162 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5262f562019-09-17 12:26:57 -06006163 unsigned long flags;
6164
Jens Axboe89850fc2021-08-10 15:11:51 -06006165 spin_lock_irqsave(&ctx->timeout_lock, flags);
Pavel Begunkova71976f2020-10-10 18:34:11 +01006166 list_del_init(&req->timeout.list);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03006167 atomic_set(&req->ctx->cq_timeouts,
6168 atomic_read(&req->ctx->cq_timeouts) + 1);
Jens Axboe89850fc2021-08-10 15:11:51 -06006169 spin_unlock_irqrestore(&ctx->timeout_lock, flags);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03006170
Jens Axboe89850fc2021-08-10 15:11:51 -06006171 req->io_task_work.func = io_req_task_timeout;
6172 io_req_task_work_add(req);
Jens Axboe5262f562019-09-17 12:26:57 -06006173 return HRTIMER_NORESTART;
6174}
6175
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006176static struct io_kiocb *io_timeout_extract(struct io_ring_ctx *ctx,
6177 __u64 user_data)
Jens Axboe89850fc2021-08-10 15:11:51 -06006178 __must_hold(&ctx->timeout_lock)
Jens Axboe47f46762019-11-09 17:43:02 -07006179{
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006180 struct io_timeout_data *io;
Jens Axboef254ac02020-08-12 17:33:30 -06006181 struct io_kiocb *req;
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006182 bool found = false;
Jens Axboef254ac02020-08-12 17:33:30 -06006183
6184 list_for_each_entry(req, &ctx->timeout_list, timeout.list) {
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006185 found = user_data == req->user_data;
6186 if (found)
Jens Axboef254ac02020-08-12 17:33:30 -06006187 break;
Jens Axboef254ac02020-08-12 17:33:30 -06006188 }
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006189 if (!found)
6190 return ERR_PTR(-ENOENT);
Jens Axboef254ac02020-08-12 17:33:30 -06006191
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006192 io = req->async_data;
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006193 if (hrtimer_try_to_cancel(&io->timer) == -1)
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006194 return ERR_PTR(-EALREADY);
6195 list_del_init(&req->timeout.list);
6196 return req;
6197}
6198
6199static int io_timeout_cancel(struct io_ring_ctx *ctx, __u64 user_data)
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006200 __must_hold(&ctx->completion_lock)
Jens Axboe89850fc2021-08-10 15:11:51 -06006201 __must_hold(&ctx->timeout_lock)
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006202{
6203 struct io_kiocb *req = io_timeout_extract(ctx, user_data);
6204
6205 if (IS_ERR(req))
6206 return PTR_ERR(req);
6207
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006208 req_set_fail(req);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01006209 io_fill_cqe_req(req, -ECANCELED, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01006210 io_put_req_deferred(req);
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006211 return 0;
Jens Axboef254ac02020-08-12 17:33:30 -06006212}
6213
Jens Axboe50c1df22021-08-27 17:11:06 -06006214static clockid_t io_timeout_get_clock(struct io_timeout_data *data)
6215{
6216 switch (data->flags & IORING_TIMEOUT_CLOCK_MASK) {
6217 case IORING_TIMEOUT_BOOTTIME:
6218 return CLOCK_BOOTTIME;
6219 case IORING_TIMEOUT_REALTIME:
6220 return CLOCK_REALTIME;
6221 default:
6222 /* can't happen, vetted at prep time */
6223 WARN_ON_ONCE(1);
6224 fallthrough;
6225 case 0:
6226 return CLOCK_MONOTONIC;
6227 }
6228}
6229
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006230static int io_linked_timeout_update(struct io_ring_ctx *ctx, __u64 user_data,
6231 struct timespec64 *ts, enum hrtimer_mode mode)
6232 __must_hold(&ctx->timeout_lock)
6233{
6234 struct io_timeout_data *io;
6235 struct io_kiocb *req;
6236 bool found = false;
6237
6238 list_for_each_entry(req, &ctx->ltimeout_list, timeout.list) {
6239 found = user_data == req->user_data;
6240 if (found)
6241 break;
6242 }
6243 if (!found)
6244 return -ENOENT;
6245
6246 io = req->async_data;
6247 if (hrtimer_try_to_cancel(&io->timer) == -1)
6248 return -EALREADY;
6249 hrtimer_init(&io->timer, io_timeout_get_clock(io), mode);
6250 io->timer.function = io_link_timeout_fn;
6251 hrtimer_start(&io->timer, timespec64_to_ktime(*ts), mode);
6252 return 0;
6253}
6254
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006255static int io_timeout_update(struct io_ring_ctx *ctx, __u64 user_data,
6256 struct timespec64 *ts, enum hrtimer_mode mode)
Jens Axboe89850fc2021-08-10 15:11:51 -06006257 __must_hold(&ctx->timeout_lock)
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006258{
6259 struct io_kiocb *req = io_timeout_extract(ctx, user_data);
6260 struct io_timeout_data *data;
6261
6262 if (IS_ERR(req))
6263 return PTR_ERR(req);
6264
6265 req->timeout.off = 0; /* noseq */
6266 data = req->async_data;
6267 list_add_tail(&req->timeout.list, &ctx->timeout_list);
Jens Axboe50c1df22021-08-27 17:11:06 -06006268 hrtimer_init(&data->timer, io_timeout_get_clock(data), mode);
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006269 data->timer.function = io_timeout_fn;
6270 hrtimer_start(&data->timer, timespec64_to_ktime(*ts), mode);
6271 return 0;
Jens Axboe47f46762019-11-09 17:43:02 -07006272}
6273
Jens Axboe3529d8c2019-12-19 18:24:38 -07006274static int io_timeout_remove_prep(struct io_kiocb *req,
6275 const struct io_uring_sqe *sqe)
Jens Axboeb29472e2019-12-17 18:50:29 -07006276{
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006277 struct io_timeout_rem *tr = &req->timeout_rem;
6278
Jens Axboeb29472e2019-12-17 18:50:29 -07006279 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
6280 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06006281 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
6282 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006283 if (sqe->ioprio || sqe->buf_index || sqe->len || sqe->splice_fd_in)
Jens Axboeb29472e2019-12-17 18:50:29 -07006284 return -EINVAL;
6285
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006286 tr->ltimeout = false;
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006287 tr->addr = READ_ONCE(sqe->addr);
6288 tr->flags = READ_ONCE(sqe->timeout_flags);
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006289 if (tr->flags & IORING_TIMEOUT_UPDATE_MASK) {
6290 if (hweight32(tr->flags & IORING_TIMEOUT_CLOCK_MASK) > 1)
6291 return -EINVAL;
6292 if (tr->flags & IORING_LINK_TIMEOUT_UPDATE)
6293 tr->ltimeout = true;
6294 if (tr->flags & ~(IORING_TIMEOUT_UPDATE_MASK|IORING_TIMEOUT_ABS))
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006295 return -EINVAL;
6296 if (get_timespec64(&tr->ts, u64_to_user_ptr(sqe->addr2)))
6297 return -EFAULT;
6298 } else if (tr->flags) {
6299 /* timeout removal doesn't support flags */
6300 return -EINVAL;
6301 }
6302
Jens Axboeb29472e2019-12-17 18:50:29 -07006303 return 0;
6304}
6305
Pavel Begunkov8662dae2021-01-19 13:32:44 +00006306static inline enum hrtimer_mode io_translate_timeout_mode(unsigned int flags)
6307{
6308 return (flags & IORING_TIMEOUT_ABS) ? HRTIMER_MODE_ABS
6309 : HRTIMER_MODE_REL;
6310}
6311
Jens Axboe11365042019-10-16 09:08:32 -06006312/*
6313 * Remove or update an existing timeout command
6314 */
Pavel Begunkov61e98202021-02-10 00:03:08 +00006315static int io_timeout_remove(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe11365042019-10-16 09:08:32 -06006316{
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006317 struct io_timeout_rem *tr = &req->timeout_rem;
Jens Axboe11365042019-10-16 09:08:32 -06006318 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe47f46762019-11-09 17:43:02 -07006319 int ret;
Jens Axboe11365042019-10-16 09:08:32 -06006320
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006321 if (!(req->timeout_rem.flags & IORING_TIMEOUT_UPDATE)) {
6322 spin_lock(&ctx->completion_lock);
6323 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006324 ret = io_timeout_cancel(ctx, tr->addr);
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006325 spin_unlock_irq(&ctx->timeout_lock);
6326 spin_unlock(&ctx->completion_lock);
6327 } else {
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006328 enum hrtimer_mode mode = io_translate_timeout_mode(tr->flags);
6329
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006330 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006331 if (tr->ltimeout)
6332 ret = io_linked_timeout_update(ctx, tr->addr, &tr->ts, mode);
6333 else
6334 ret = io_timeout_update(ctx, tr->addr, &tr->ts, mode);
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006335 spin_unlock_irq(&ctx->timeout_lock);
6336 }
Jens Axboe11365042019-10-16 09:08:32 -06006337
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006338 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006339 req_set_fail(req);
Pavel Begunkov505657b2021-08-17 20:28:09 +01006340 io_req_complete_post(req, ret, 0);
Jens Axboe11365042019-10-16 09:08:32 -06006341 return 0;
Jens Axboe5262f562019-09-17 12:26:57 -06006342}
6343
Jens Axboe3529d8c2019-12-19 18:24:38 -07006344static int io_timeout_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe,
Jens Axboe2d283902019-12-04 11:08:05 -07006345 bool is_timeout_link)
Jens Axboe5262f562019-09-17 12:26:57 -06006346{
Jens Axboead8a48a2019-11-15 08:49:11 -07006347 struct io_timeout_data *data;
Jens Axboea41525a2019-10-15 16:48:15 -06006348 unsigned flags;
Pavel Begunkov56080b02020-05-26 20:34:04 +03006349 u32 off = READ_ONCE(sqe->off);
Jens Axboe5262f562019-09-17 12:26:57 -06006350
Jens Axboead8a48a2019-11-15 08:49:11 -07006351 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe5262f562019-09-17 12:26:57 -06006352 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006353 if (sqe->ioprio || sqe->buf_index || sqe->len != 1 ||
6354 sqe->splice_fd_in)
Jens Axboea41525a2019-10-15 16:48:15 -06006355 return -EINVAL;
Pavel Begunkov56080b02020-05-26 20:34:04 +03006356 if (off && is_timeout_link)
Jens Axboe2d283902019-12-04 11:08:05 -07006357 return -EINVAL;
Jens Axboea41525a2019-10-15 16:48:15 -06006358 flags = READ_ONCE(sqe->timeout_flags);
Jens Axboe50c1df22021-08-27 17:11:06 -06006359 if (flags & ~(IORING_TIMEOUT_ABS | IORING_TIMEOUT_CLOCK_MASK))
6360 return -EINVAL;
6361 /* more than one clock specified is invalid, obviously */
6362 if (hweight32(flags & IORING_TIMEOUT_CLOCK_MASK) > 1)
Jens Axboe5262f562019-09-17 12:26:57 -06006363 return -EINVAL;
Arnd Bergmannbdf20072019-10-01 09:53:29 -06006364
Pavel Begunkovef9dd632021-08-28 19:54:38 -06006365 INIT_LIST_HEAD(&req->timeout.list);
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006366 req->timeout.off = off;
Pavel Begunkovf18ee4c2021-06-14 23:37:25 +01006367 if (unlikely(off && !req->ctx->off_timeout_used))
6368 req->ctx->off_timeout_used = true;
Jens Axboe26a61672019-12-20 09:02:01 -07006369
Jens Axboee8c2bc12020-08-15 18:44:09 -07006370 if (!req->async_data && io_alloc_async_data(req))
Jens Axboe26a61672019-12-20 09:02:01 -07006371 return -ENOMEM;
6372
Jens Axboee8c2bc12020-08-15 18:44:09 -07006373 data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07006374 data->req = req;
Jens Axboe50c1df22021-08-27 17:11:06 -06006375 data->flags = flags;
Jens Axboead8a48a2019-11-15 08:49:11 -07006376
6377 if (get_timespec64(&data->ts, u64_to_user_ptr(sqe->addr)))
Jens Axboe5262f562019-09-17 12:26:57 -06006378 return -EFAULT;
6379
Jens Axboeba7261a2022-04-08 11:08:58 -06006380 INIT_LIST_HEAD(&req->timeout.list);
Pavel Begunkov8662dae2021-01-19 13:32:44 +00006381 data->mode = io_translate_timeout_mode(flags);
Jens Axboe50c1df22021-08-27 17:11:06 -06006382 hrtimer_init(&data->timer, io_timeout_get_clock(data), data->mode);
Pavel Begunkovb97e7362021-08-15 10:40:23 +01006383
6384 if (is_timeout_link) {
6385 struct io_submit_link *link = &req->ctx->submit_state.link;
6386
6387 if (!link->head)
6388 return -EINVAL;
6389 if (link->last->opcode == IORING_OP_LINK_TIMEOUT)
6390 return -EINVAL;
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01006391 req->timeout.head = link->last;
6392 link->last->flags |= REQ_F_ARM_LTIMEOUT;
Pavel Begunkovb97e7362021-08-15 10:40:23 +01006393 }
Jens Axboead8a48a2019-11-15 08:49:11 -07006394 return 0;
6395}
6396
Pavel Begunkov61e98202021-02-10 00:03:08 +00006397static int io_timeout(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboead8a48a2019-11-15 08:49:11 -07006398{
Jens Axboead8a48a2019-11-15 08:49:11 -07006399 struct io_ring_ctx *ctx = req->ctx;
Jens Axboee8c2bc12020-08-15 18:44:09 -07006400 struct io_timeout_data *data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07006401 struct list_head *entry;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006402 u32 tail, off = req->timeout.off;
Jens Axboead8a48a2019-11-15 08:49:11 -07006403
Jens Axboe89850fc2021-08-10 15:11:51 -06006404 spin_lock_irq(&ctx->timeout_lock);
Jens Axboe93bd25b2019-11-11 23:34:31 -07006405
Jens Axboe5262f562019-09-17 12:26:57 -06006406 /*
6407 * sqe->off holds how many events that need to occur for this
Jens Axboe93bd25b2019-11-11 23:34:31 -07006408 * timeout event to be satisfied. If it isn't set, then this is
6409 * a pure timeout request, sequence isn't used.
Jens Axboe5262f562019-09-17 12:26:57 -06006410 */
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03006411 if (io_is_timeout_noseq(req)) {
Jens Axboe93bd25b2019-11-11 23:34:31 -07006412 entry = ctx->timeout_list.prev;
6413 goto add;
6414 }
Jens Axboe5262f562019-09-17 12:26:57 -06006415
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006416 tail = ctx->cached_cq_tail - atomic_read(&ctx->cq_timeouts);
6417 req->timeout.target_seq = tail + off;
Jens Axboe5262f562019-09-17 12:26:57 -06006418
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05006419 /* Update the last seq here in case io_flush_timeouts() hasn't.
6420 * This is safe because ->completion_lock is held, and submissions
6421 * and completions are never mixed in the same ->completion_lock section.
6422 */
6423 ctx->cq_last_tm_flush = tail;
6424
Jens Axboe5262f562019-09-17 12:26:57 -06006425 /*
6426 * Insertion sort, ensuring the first entry in the list is always
6427 * the one we need first.
6428 */
Jens Axboe5262f562019-09-17 12:26:57 -06006429 list_for_each_prev(entry, &ctx->timeout_list) {
Pavel Begunkov135fcde2020-07-13 23:37:12 +03006430 struct io_kiocb *nxt = list_entry(entry, struct io_kiocb,
6431 timeout.list);
Jens Axboe5262f562019-09-17 12:26:57 -06006432
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03006433 if (io_is_timeout_noseq(nxt))
Jens Axboe93bd25b2019-11-11 23:34:31 -07006434 continue;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006435 /* nxt.seq is behind @tail, otherwise would've been completed */
6436 if (off >= nxt->timeout.target_seq - tail)
Jens Axboe5262f562019-09-17 12:26:57 -06006437 break;
6438 }
Jens Axboe93bd25b2019-11-11 23:34:31 -07006439add:
Pavel Begunkov135fcde2020-07-13 23:37:12 +03006440 list_add(&req->timeout.list, entry);
Jens Axboead8a48a2019-11-15 08:49:11 -07006441 data->timer.function = io_timeout_fn;
6442 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts), data->mode);
Jens Axboe89850fc2021-08-10 15:11:51 -06006443 spin_unlock_irq(&ctx->timeout_lock);
Jens Axboe5262f562019-09-17 12:26:57 -06006444 return 0;
6445}
6446
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006447struct io_cancel_data {
6448 struct io_ring_ctx *ctx;
6449 u64 user_data;
6450};
6451
Jens Axboe62755e32019-10-28 21:49:21 -06006452static bool io_cancel_cb(struct io_wq_work *work, void *data)
Jens Axboede0617e2019-04-06 21:51:27 -06006453{
Jens Axboe62755e32019-10-28 21:49:21 -06006454 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006455 struct io_cancel_data *cd = data;
Jens Axboede0617e2019-04-06 21:51:27 -06006456
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006457 return req->ctx == cd->ctx && req->user_data == cd->user_data;
Jens Axboe62755e32019-10-28 21:49:21 -06006458}
6459
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006460static int io_async_cancel_one(struct io_uring_task *tctx, u64 user_data,
6461 struct io_ring_ctx *ctx)
Jens Axboe62755e32019-10-28 21:49:21 -06006462{
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006463 struct io_cancel_data data = { .ctx = ctx, .user_data = user_data, };
Jens Axboe62755e32019-10-28 21:49:21 -06006464 enum io_wq_cancel cancel_ret;
Jens Axboe62755e32019-10-28 21:49:21 -06006465 int ret = 0;
6466
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006467 if (!tctx || !tctx->io_wq)
Jens Axboe5aa75ed2021-02-16 12:56:50 -07006468 return -ENOENT;
6469
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006470 cancel_ret = io_wq_cancel_cb(tctx->io_wq, io_cancel_cb, &data, false);
Jens Axboe62755e32019-10-28 21:49:21 -06006471 switch (cancel_ret) {
6472 case IO_WQ_CANCEL_OK:
6473 ret = 0;
6474 break;
6475 case IO_WQ_CANCEL_RUNNING:
6476 ret = -EALREADY;
6477 break;
6478 case IO_WQ_CANCEL_NOTFOUND:
6479 ret = -ENOENT;
6480 break;
6481 }
6482
Jens Axboee977d6d2019-11-05 12:39:45 -07006483 return ret;
6484}
6485
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006486static int io_try_cancel_userdata(struct io_kiocb *req, u64 sqe_addr)
Jens Axboe47f46762019-11-09 17:43:02 -07006487{
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006488 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe47f46762019-11-09 17:43:02 -07006489 int ret;
6490
Pavel Begunkovdadebc32021-08-23 13:30:44 +01006491 WARN_ON_ONCE(!io_wq_current_is_worker() && req->task != current);
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006492
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006493 ret = io_async_cancel_one(req->task->io_uring, sqe_addr, ctx);
Pavel Begunkovdf9727a2021-04-01 15:43:59 +01006494 if (ret != -ENOENT)
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006495 return ret;
Pavel Begunkov505657b2021-08-17 20:28:09 +01006496
6497 spin_lock(&ctx->completion_lock);
Jens Axboe79ebeae2021-08-10 15:18:27 -06006498 spin_lock_irq(&ctx->timeout_lock);
Jens Axboe47f46762019-11-09 17:43:02 -07006499 ret = io_timeout_cancel(ctx, sqe_addr);
Jens Axboe79ebeae2021-08-10 15:18:27 -06006500 spin_unlock_irq(&ctx->timeout_lock);
Jens Axboe47f46762019-11-09 17:43:02 -07006501 if (ret != -ENOENT)
Pavel Begunkov505657b2021-08-17 20:28:09 +01006502 goto out;
6503 ret = io_poll_cancel(ctx, sqe_addr, false);
6504out:
6505 spin_unlock(&ctx->completion_lock);
6506 return ret;
Jens Axboe47f46762019-11-09 17:43:02 -07006507}
6508
Jens Axboe3529d8c2019-12-19 18:24:38 -07006509static int io_async_cancel_prep(struct io_kiocb *req,
6510 const struct io_uring_sqe *sqe)
Jens Axboee977d6d2019-11-05 12:39:45 -07006511{
Jens Axboefbf23842019-12-17 18:45:56 -07006512 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboee977d6d2019-11-05 12:39:45 -07006513 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06006514 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
6515 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006516 if (sqe->ioprio || sqe->off || sqe->len || sqe->cancel_flags ||
6517 sqe->splice_fd_in)
Jens Axboee977d6d2019-11-05 12:39:45 -07006518 return -EINVAL;
6519
Jens Axboefbf23842019-12-17 18:45:56 -07006520 req->cancel.addr = READ_ONCE(sqe->addr);
6521 return 0;
6522}
6523
Pavel Begunkov61e98202021-02-10 00:03:08 +00006524static int io_async_cancel(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboefbf23842019-12-17 18:45:56 -07006525{
6526 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov58f99372021-03-12 16:25:55 +00006527 u64 sqe_addr = req->cancel.addr;
6528 struct io_tctx_node *node;
6529 int ret;
Jens Axboefbf23842019-12-17 18:45:56 -07006530
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006531 ret = io_try_cancel_userdata(req, sqe_addr);
Pavel Begunkov58f99372021-03-12 16:25:55 +00006532 if (ret != -ENOENT)
6533 goto done;
Pavel Begunkov58f99372021-03-12 16:25:55 +00006534
6535 /* slow path, try all io-wq's */
6536 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
6537 ret = -ENOENT;
6538 list_for_each_entry(node, &ctx->tctx_list, ctx_node) {
6539 struct io_uring_task *tctx = node->task->io_uring;
6540
Pavel Begunkov58f99372021-03-12 16:25:55 +00006541 ret = io_async_cancel_one(tctx, req->cancel.addr, ctx);
6542 if (ret != -ENOENT)
6543 break;
6544 }
6545 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Pavel Begunkov58f99372021-03-12 16:25:55 +00006546done:
Pavel Begunkov58f99372021-03-12 16:25:55 +00006547 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006548 req_set_fail(req);
Pavel Begunkov505657b2021-08-17 20:28:09 +01006549 io_req_complete_post(req, ret, 0);
Jens Axboe62755e32019-10-28 21:49:21 -06006550 return 0;
6551}
6552
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006553static int io_rsrc_update_prep(struct io_kiocb *req,
Jens Axboe05f3fb32019-12-09 11:22:50 -07006554 const struct io_uring_sqe *sqe)
6555{
Daniele Albano61710e42020-07-18 14:15:16 -06006556 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
6557 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006558 if (sqe->ioprio || sqe->rw_flags || sqe->splice_fd_in)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006559 return -EINVAL;
6560
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006561 req->rsrc_update.offset = READ_ONCE(sqe->off);
6562 req->rsrc_update.nr_args = READ_ONCE(sqe->len);
6563 if (!req->rsrc_update.nr_args)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006564 return -EINVAL;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006565 req->rsrc_update.arg = READ_ONCE(sqe->addr);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006566 return 0;
6567}
6568
Pavel Begunkov889fca72021-02-10 00:03:09 +00006569static int io_files_update(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006570{
6571 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01006572 struct io_uring_rsrc_update2 up;
Jens Axboe05f3fb32019-12-09 11:22:50 -07006573 int ret;
6574
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006575 up.offset = req->rsrc_update.offset;
6576 up.data = req->rsrc_update.arg;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01006577 up.nr = 0;
6578 up.tags = 0;
Colin Ian King615cee42021-04-26 10:47:35 +01006579 up.resv = 0;
Dylan Yudaken7a7c9f92022-04-12 09:30:40 -07006580 up.resv2 = 0;
Jens Axboe05f3fb32019-12-09 11:22:50 -07006581
Jens Axboecdb31c22021-09-24 08:43:54 -06006582 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Pavel Begunkovfdecb662021-04-25 14:32:20 +01006583 ret = __io_register_rsrc_update(ctx, IORING_RSRC_FILE,
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01006584 &up, req->rsrc_update.nr_args);
Jens Axboecdb31c22021-09-24 08:43:54 -06006585 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Jens Axboe05f3fb32019-12-09 11:22:50 -07006586
6587 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006588 req_set_fail(req);
Pavel Begunkov889fca72021-02-10 00:03:09 +00006589 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006590 return 0;
6591}
6592
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006593static int io_req_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07006594{
Jens Axboed625c6e2019-12-17 19:53:05 -07006595 switch (req->opcode) {
Jens Axboee7815732019-12-17 19:45:06 -07006596 case IORING_OP_NOP:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006597 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07006598 case IORING_OP_READV:
6599 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006600 case IORING_OP_READ:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006601 return io_read_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07006602 case IORING_OP_WRITEV:
6603 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006604 case IORING_OP_WRITE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006605 return io_write_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07006606 case IORING_OP_POLL_ADD:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006607 return io_poll_add_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07006608 case IORING_OP_POLL_REMOVE:
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006609 return io_poll_update_prep(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07006610 case IORING_OP_FSYNC:
Pavel Begunkov1155c762021-02-18 18:29:38 +00006611 return io_fsync_prep(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07006612 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkov1155c762021-02-18 18:29:38 +00006613 return io_sfr_prep(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07006614 case IORING_OP_SENDMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07006615 case IORING_OP_SEND:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006616 return io_sendmsg_prep(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07006617 case IORING_OP_RECVMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07006618 case IORING_OP_RECV:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006619 return io_recvmsg_prep(req, sqe);
Jens Axboef499a022019-12-02 16:28:46 -07006620 case IORING_OP_CONNECT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006621 return io_connect_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07006622 case IORING_OP_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006623 return io_timeout_prep(req, sqe, false);
Jens Axboeb29472e2019-12-17 18:50:29 -07006624 case IORING_OP_TIMEOUT_REMOVE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006625 return io_timeout_remove_prep(req, sqe);
Jens Axboefbf23842019-12-17 18:45:56 -07006626 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006627 return io_async_cancel_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07006628 case IORING_OP_LINK_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006629 return io_timeout_prep(req, sqe, true);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07006630 case IORING_OP_ACCEPT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006631 return io_accept_prep(req, sqe);
Jens Axboed63d1b52019-12-10 10:38:56 -07006632 case IORING_OP_FALLOCATE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006633 return io_fallocate_prep(req, sqe);
Jens Axboe15b71ab2019-12-11 11:20:36 -07006634 case IORING_OP_OPENAT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006635 return io_openat_prep(req, sqe);
Jens Axboeb5dba592019-12-11 14:02:38 -07006636 case IORING_OP_CLOSE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006637 return io_close_prep(req, sqe);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006638 case IORING_OP_FILES_UPDATE:
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006639 return io_rsrc_update_prep(req, sqe);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07006640 case IORING_OP_STATX:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006641 return io_statx_prep(req, sqe);
Jens Axboe4840e412019-12-25 22:03:45 -07006642 case IORING_OP_FADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006643 return io_fadvise_prep(req, sqe);
Jens Axboec1ca7572019-12-25 22:18:28 -07006644 case IORING_OP_MADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006645 return io_madvise_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07006646 case IORING_OP_OPENAT2:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006647 return io_openat2_prep(req, sqe);
Jens Axboe3e4827b2020-01-08 15:18:09 -07006648 case IORING_OP_EPOLL_CTL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006649 return io_epoll_ctl_prep(req, sqe);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006650 case IORING_OP_SPLICE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006651 return io_splice_prep(req, sqe);
Jens Axboeddf0322d2020-02-23 16:41:33 -07006652 case IORING_OP_PROVIDE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006653 return io_provide_buffers_prep(req, sqe);
Jens Axboe067524e2020-03-02 16:32:28 -07006654 case IORING_OP_REMOVE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006655 return io_remove_buffers_prep(req, sqe);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03006656 case IORING_OP_TEE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006657 return io_tee_prep(req, sqe);
Jens Axboe36f4fa62020-09-05 11:14:22 -06006658 case IORING_OP_SHUTDOWN:
6659 return io_shutdown_prep(req, sqe);
Jens Axboe80a261f2020-09-28 14:23:58 -06006660 case IORING_OP_RENAMEAT:
6661 return io_renameat_prep(req, sqe);
Jens Axboe14a11432020-09-28 14:27:37 -06006662 case IORING_OP_UNLINKAT:
6663 return io_unlinkat_prep(req, sqe);
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07006664 case IORING_OP_MKDIRAT:
6665 return io_mkdirat_prep(req, sqe);
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07006666 case IORING_OP_SYMLINKAT:
6667 return io_symlinkat_prep(req, sqe);
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07006668 case IORING_OP_LINKAT:
6669 return io_linkat_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07006670 }
6671
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006672 printk_once(KERN_WARNING "io_uring: unhandled opcode %d\n",
6673 req->opcode);
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01006674 return -EINVAL;
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006675}
6676
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006677static int io_req_prep_async(struct io_kiocb *req)
Jens Axboedef596e2019-01-09 08:59:42 -07006678{
Pavel Begunkovb7e298d2021-02-28 22:35:19 +00006679 if (!io_op_defs[req->opcode].needs_async_setup)
6680 return 0;
6681 if (WARN_ON_ONCE(req->async_data))
6682 return -EFAULT;
6683 if (io_alloc_async_data(req))
6684 return -EAGAIN;
6685
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006686 switch (req->opcode) {
6687 case IORING_OP_READV:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006688 return io_rw_prep_async(req, READ);
6689 case IORING_OP_WRITEV:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006690 return io_rw_prep_async(req, WRITE);
6691 case IORING_OP_SENDMSG:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006692 return io_sendmsg_prep_async(req);
6693 case IORING_OP_RECVMSG:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006694 return io_recvmsg_prep_async(req);
6695 case IORING_OP_CONNECT:
6696 return io_connect_prep_async(req);
6697 }
Pavel Begunkovb7e298d2021-02-28 22:35:19 +00006698 printk_once(KERN_WARNING "io_uring: prep_async() bad opcode %d\n",
6699 req->opcode);
6700 return -EFAULT;
Jens Axboedef596e2019-01-09 08:59:42 -07006701}
6702
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006703static u32 io_get_sequence(struct io_kiocb *req)
6704{
Pavel Begunkova3dbdf52021-06-17 18:14:05 +01006705 u32 seq = req->ctx->cached_sq_head;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006706
Pavel Begunkova3dbdf52021-06-17 18:14:05 +01006707 /* need original cached_sq_head, but it was increased for each req */
6708 io_for_each_link(req, req)
6709 seq--;
6710 return seq;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006711}
6712
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006713static bool io_drain_req(struct io_kiocb *req)
Jens Axboedef596e2019-01-09 08:59:42 -07006714{
Pavel Begunkov3c199662021-06-15 16:47:57 +01006715 struct io_kiocb *pos;
Jens Axboedef596e2019-01-09 08:59:42 -07006716 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006717 struct io_defer_entry *de;
Jens Axboedef596e2019-01-09 08:59:42 -07006718 int ret;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006719 u32 seq;
Jens Axboedef596e2019-01-09 08:59:42 -07006720
Pavel Begunkovb8ce1b92021-08-31 14:13:11 +01006721 if (req->flags & REQ_F_FAIL) {
6722 io_req_complete_fail_submit(req);
6723 return true;
6724 }
6725
Pavel Begunkov3c199662021-06-15 16:47:57 +01006726 /*
6727 * If we need to drain a request in the middle of a link, drain the
6728 * head request and the next request/link after the current link.
6729 * Considering sequential execution of links, IOSQE_IO_DRAIN will be
6730 * maintained for every request of our link.
6731 */
6732 if (ctx->drain_next) {
6733 req->flags |= REQ_F_IO_DRAIN;
6734 ctx->drain_next = false;
6735 }
6736 /* not interested in head, start from the first linked */
6737 io_for_each_link(pos, req->link) {
6738 if (pos->flags & REQ_F_IO_DRAIN) {
6739 ctx->drain_next = true;
6740 req->flags |= REQ_F_IO_DRAIN;
6741 break;
6742 }
6743 }
6744
Jens Axboedef596e2019-01-09 08:59:42 -07006745 /* Still need defer if there is pending req in defer list. */
Hao Xu1bd12b72021-11-25 17:21:02 +08006746 spin_lock(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006747 if (likely(list_empty_careful(&ctx->defer_list) &&
Pavel Begunkov10c66902021-06-15 16:47:56 +01006748 !(req->flags & REQ_F_IO_DRAIN))) {
Hao Xu1bd12b72021-11-25 17:21:02 +08006749 spin_unlock(&ctx->completion_lock);
Pavel Begunkov10c66902021-06-15 16:47:56 +01006750 ctx->drain_active = false;
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006751 return false;
Pavel Begunkov10c66902021-06-15 16:47:56 +01006752 }
Hao Xu1bd12b72021-11-25 17:21:02 +08006753 spin_unlock(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006754
6755 seq = io_get_sequence(req);
6756 /* Still a chance to pass the sequence check */
6757 if (!req_need_defer(req, seq) && list_empty_careful(&ctx->defer_list))
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006758 return false;
Jens Axboedef596e2019-01-09 08:59:42 -07006759
Pavel Begunkovb7e298d2021-02-28 22:35:19 +00006760 ret = io_req_prep_async(req);
Pavel Begunkovbe7053b2021-02-18 18:29:45 +00006761 if (ret)
Pavel Begunkov1b487732021-07-11 22:41:13 +01006762 goto fail;
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03006763 io_prep_async_link(req);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006764 de = kmalloc(sizeof(*de), GFP_KERNEL);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006765 if (!de) {
Pavel Begunkov1b487732021-07-11 22:41:13 +01006766 ret = -ENOMEM;
6767fail:
6768 io_req_complete_failed(req, ret);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006769 return true;
6770 }
Jens Axboe31b51512019-01-18 22:56:34 -07006771
Jens Axboe79ebeae2021-08-10 15:18:27 -06006772 spin_lock(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006773 if (!req_need_defer(req, seq) && list_empty(&ctx->defer_list)) {
Jens Axboe79ebeae2021-08-10 15:18:27 -06006774 spin_unlock(&ctx->completion_lock);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006775 kfree(de);
Pavel Begunkovf237c302021-08-18 12:42:46 +01006776 io_queue_async_work(req, NULL);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006777 return true;
Jens Axboe31b51512019-01-18 22:56:34 -07006778 }
6779
6780 trace_io_uring_defer(ctx, req, req->user_data);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006781 de->req = req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006782 de->seq = seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006783 list_add_tail(&de->list, &ctx->defer_list);
Jens Axboe79ebeae2021-08-10 15:18:27 -06006784 spin_unlock(&ctx->completion_lock);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006785 return true;
Jens Axboe31b51512019-01-18 22:56:34 -07006786}
6787
Pavel Begunkov68fb8972021-03-19 17:22:41 +00006788static void io_clean_op(struct io_kiocb *req)
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03006789{
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006790 if (req->flags & REQ_F_BUFFER_SELECTED) {
6791 switch (req->opcode) {
6792 case IORING_OP_READV:
6793 case IORING_OP_READ_FIXED:
6794 case IORING_OP_READ:
Jens Axboebcda7ba2020-02-23 16:42:51 -07006795 kfree((void *)(unsigned long)req->rw.addr);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006796 break;
6797 case IORING_OP_RECVMSG:
6798 case IORING_OP_RECV:
Jens Axboe52de1fe2020-02-27 10:15:42 -07006799 kfree(req->sr_msg.kbuf);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006800 break;
6801 }
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03006802 }
6803
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006804 if (req->flags & REQ_F_NEED_CLEANUP) {
6805 switch (req->opcode) {
6806 case IORING_OP_READV:
6807 case IORING_OP_READ_FIXED:
6808 case IORING_OP_READ:
6809 case IORING_OP_WRITEV:
6810 case IORING_OP_WRITE_FIXED:
Jens Axboee8c2bc12020-08-15 18:44:09 -07006811 case IORING_OP_WRITE: {
6812 struct io_async_rw *io = req->async_data;
Pavel Begunkov1dacb4d2021-06-17 18:14:03 +01006813
6814 kfree(io->free_iovec);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006815 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07006816 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006817 case IORING_OP_RECVMSG:
Jens Axboee8c2bc12020-08-15 18:44:09 -07006818 case IORING_OP_SENDMSG: {
6819 struct io_async_msghdr *io = req->async_data;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00006820
6821 kfree(io->free_iov);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006822 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07006823 }
Jens Axboef3cd48502020-09-24 14:55:54 -06006824 case IORING_OP_OPENAT:
6825 case IORING_OP_OPENAT2:
6826 if (req->open.filename)
6827 putname(req->open.filename);
6828 break;
Jens Axboe80a261f2020-09-28 14:23:58 -06006829 case IORING_OP_RENAMEAT:
6830 putname(req->rename.oldpath);
6831 putname(req->rename.newpath);
6832 break;
Jens Axboe14a11432020-09-28 14:27:37 -06006833 case IORING_OP_UNLINKAT:
6834 putname(req->unlink.filename);
6835 break;
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07006836 case IORING_OP_MKDIRAT:
6837 putname(req->mkdir.filename);
6838 break;
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07006839 case IORING_OP_SYMLINKAT:
6840 putname(req->symlink.oldpath);
6841 putname(req->symlink.newpath);
6842 break;
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07006843 case IORING_OP_LINKAT:
6844 putname(req->hardlink.oldpath);
6845 putname(req->hardlink.newpath);
6846 break;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006847 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006848 }
Jens Axboe75652a302021-04-15 09:52:40 -06006849 if ((req->flags & REQ_F_POLLED) && req->apoll) {
6850 kfree(req->apoll->double_poll);
6851 kfree(req->apoll);
6852 req->apoll = NULL;
6853 }
Pavel Begunkov3a0a6902021-04-20 12:03:31 +01006854 if (req->flags & REQ_F_INFLIGHT) {
6855 struct io_uring_task *tctx = req->task->io_uring;
6856
6857 atomic_dec(&tctx->inflight_tracked);
Pavel Begunkov3a0a6902021-04-20 12:03:31 +01006858 }
Pavel Begunkovc8543572021-06-17 18:14:04 +01006859 if (req->flags & REQ_F_CREDS)
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01006860 put_cred(req->creds);
Pavel Begunkovc8543572021-06-17 18:14:04 +01006861
6862 req->flags &= ~IO_REQ_CLEAN_FLAGS;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03006863}
6864
Pavel Begunkov889fca72021-02-10 00:03:09 +00006865static int io_issue_sqe(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeedafcce2019-01-09 09:16:05 -07006866{
Jens Axboeedafcce2019-01-09 09:16:05 -07006867 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5730b272021-02-27 15:57:30 -07006868 const struct cred *creds = NULL;
Jens Axboed625c6e2019-12-17 19:53:05 -07006869 int ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07006870
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01006871 if ((req->flags & REQ_F_CREDS) && req->creds != current_cred())
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01006872 creds = override_creds(req->creds);
Jens Axboe5730b272021-02-27 15:57:30 -07006873
Jens Axboed625c6e2019-12-17 19:53:05 -07006874 switch (req->opcode) {
Jens Axboe2b188cc2019-01-07 10:46:33 -07006875 case IORING_OP_NOP:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006876 ret = io_nop(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006877 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006878 case IORING_OP_READV:
Jens Axboe3529d8c2019-12-19 18:24:38 -07006879 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006880 case IORING_OP_READ:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006881 ret = io_read(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006882 break;
6883 case IORING_OP_WRITEV:
Jens Axboe2b188cc2019-01-07 10:46:33 -07006884 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006885 case IORING_OP_WRITE:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006886 ret = io_write(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006887 break;
6888 case IORING_OP_FSYNC:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006889 ret = io_fsync(req, issue_flags);
Jackie Liuba5290c2019-10-09 09:19:59 +08006890 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006891 case IORING_OP_POLL_ADD:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006892 ret = io_poll_add(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006893 break;
6894 case IORING_OP_POLL_REMOVE:
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006895 ret = io_poll_update(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006896 break;
Jens Axboeb76da702019-11-20 13:05:32 -07006897 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006898 ret = io_sync_file_range(req, issue_flags);
Jens Axboeb76da702019-11-20 13:05:32 -07006899 break;
6900 case IORING_OP_SENDMSG:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006901 ret = io_sendmsg(req, issue_flags);
Pavel Begunkov062d04d2020-10-10 18:34:12 +01006902 break;
Jens Axboefddafac2020-01-04 20:19:44 -07006903 case IORING_OP_SEND:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006904 ret = io_send(req, issue_flags);
Jens Axboeb76da702019-11-20 13:05:32 -07006905 break;
6906 case IORING_OP_RECVMSG:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006907 ret = io_recvmsg(req, issue_flags);
Pavel Begunkov062d04d2020-10-10 18:34:12 +01006908 break;
Jens Axboefddafac2020-01-04 20:19:44 -07006909 case IORING_OP_RECV:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006910 ret = io_recv(req, issue_flags);
Jens Axboeb76da702019-11-20 13:05:32 -07006911 break;
Jens Axboe561fb042019-10-24 07:25:42 -06006912 case IORING_OP_TIMEOUT:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006913 ret = io_timeout(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006914 break;
6915 case IORING_OP_TIMEOUT_REMOVE:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006916 ret = io_timeout_remove(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006917 break;
6918 case IORING_OP_ACCEPT:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006919 ret = io_accept(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006920 break;
6921 case IORING_OP_CONNECT:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006922 ret = io_connect(req, issue_flags);
Jens Axboe31b51512019-01-18 22:56:34 -07006923 break;
6924 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006925 ret = io_async_cancel(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006926 break;
Jens Axboed63d1b52019-12-10 10:38:56 -07006927 case IORING_OP_FALLOCATE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006928 ret = io_fallocate(req, issue_flags);
Jens Axboed63d1b52019-12-10 10:38:56 -07006929 break;
Jens Axboe15b71ab2019-12-11 11:20:36 -07006930 case IORING_OP_OPENAT:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006931 ret = io_openat(req, issue_flags);
Jens Axboe15b71ab2019-12-11 11:20:36 -07006932 break;
Jens Axboeb5dba592019-12-11 14:02:38 -07006933 case IORING_OP_CLOSE:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006934 ret = io_close(req, issue_flags);
Jens Axboeb5dba592019-12-11 14:02:38 -07006935 break;
Jens Axboe05f3fb32019-12-09 11:22:50 -07006936 case IORING_OP_FILES_UPDATE:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006937 ret = io_files_update(req, issue_flags);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006938 break;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07006939 case IORING_OP_STATX:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006940 ret = io_statx(req, issue_flags);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07006941 break;
Jens Axboe4840e412019-12-25 22:03:45 -07006942 case IORING_OP_FADVISE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006943 ret = io_fadvise(req, issue_flags);
Jens Axboe4840e412019-12-25 22:03:45 -07006944 break;
Jens Axboec1ca7572019-12-25 22:18:28 -07006945 case IORING_OP_MADVISE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006946 ret = io_madvise(req, issue_flags);
Jens Axboec1ca7572019-12-25 22:18:28 -07006947 break;
Jens Axboecebdb982020-01-08 17:59:24 -07006948 case IORING_OP_OPENAT2:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006949 ret = io_openat2(req, issue_flags);
Jens Axboecebdb982020-01-08 17:59:24 -07006950 break;
Jens Axboe3e4827b2020-01-08 15:18:09 -07006951 case IORING_OP_EPOLL_CTL:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006952 ret = io_epoll_ctl(req, issue_flags);
Jens Axboe3e4827b2020-01-08 15:18:09 -07006953 break;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006954 case IORING_OP_SPLICE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006955 ret = io_splice(req, issue_flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006956 break;
Jens Axboeddf0322d2020-02-23 16:41:33 -07006957 case IORING_OP_PROVIDE_BUFFERS:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006958 ret = io_provide_buffers(req, issue_flags);
Jens Axboeddf0322d2020-02-23 16:41:33 -07006959 break;
Jens Axboe067524e2020-03-02 16:32:28 -07006960 case IORING_OP_REMOVE_BUFFERS:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006961 ret = io_remove_buffers(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006962 break;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03006963 case IORING_OP_TEE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006964 ret = io_tee(req, issue_flags);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03006965 break;
Jens Axboe36f4fa62020-09-05 11:14:22 -06006966 case IORING_OP_SHUTDOWN:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006967 ret = io_shutdown(req, issue_flags);
Jens Axboe36f4fa62020-09-05 11:14:22 -06006968 break;
Jens Axboe80a261f2020-09-28 14:23:58 -06006969 case IORING_OP_RENAMEAT:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006970 ret = io_renameat(req, issue_flags);
Jens Axboe80a261f2020-09-28 14:23:58 -06006971 break;
Jens Axboe14a11432020-09-28 14:27:37 -06006972 case IORING_OP_UNLINKAT:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006973 ret = io_unlinkat(req, issue_flags);
Jens Axboe14a11432020-09-28 14:27:37 -06006974 break;
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07006975 case IORING_OP_MKDIRAT:
6976 ret = io_mkdirat(req, issue_flags);
6977 break;
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07006978 case IORING_OP_SYMLINKAT:
6979 ret = io_symlinkat(req, issue_flags);
6980 break;
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07006981 case IORING_OP_LINKAT:
6982 ret = io_linkat(req, issue_flags);
6983 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006984 default:
6985 ret = -EINVAL;
6986 break;
6987 }
Jens Axboe31b51512019-01-18 22:56:34 -07006988
Jens Axboe5730b272021-02-27 15:57:30 -07006989 if (creds)
6990 revert_creds(creds);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006991 if (ret)
6992 return ret;
Jens Axboeb5325762020-05-19 21:20:27 -06006993 /* If the op doesn't have a file, we're not polling for it */
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01006994 if ((ctx->flags & IORING_SETUP_IOPOLL) && req->file)
6995 io_iopoll_req_issued(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006996
6997 return 0;
6998}
6999
Pavel Begunkovebc11b62021-08-09 13:04:05 +01007000static struct io_wq_work *io_wq_free_work(struct io_wq_work *work)
7001{
7002 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
7003
7004 req = io_put_req_find_next(req);
7005 return req ? &req->work : NULL;
7006}
7007
Pavel Begunkov5280f7e2021-02-04 13:52:08 +00007008static void io_wq_submit_work(struct io_wq_work *work)
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03007009{
Jens Axboe2b188cc2019-01-07 10:46:33 -07007010 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkov6df1db62020-07-03 22:15:06 +03007011 struct io_kiocb *timeout;
Jens Axboe561fb042019-10-24 07:25:42 -06007012 int ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007013
Pavel Begunkov48dcd382021-08-15 10:40:18 +01007014 /* one will be dropped by ->io_free_work() after returning to io-wq */
7015 if (!(req->flags & REQ_F_REFCOUNT))
7016 __io_req_set_refcount(req, 2);
7017 else
7018 req_ref_get(req);
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01007019
Pavel Begunkov6df1db62020-07-03 22:15:06 +03007020 timeout = io_prep_linked_timeout(req);
7021 if (timeout)
7022 io_queue_linked_timeout(timeout);
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03007023
Pavel Begunkovdadebc32021-08-23 13:30:44 +01007024 /* either cancelled or io-wq is dying, so don't touch tctx->iowq */
Jens Axboe4014d942021-01-19 15:53:54 -07007025 if (work->flags & IO_WQ_WORK_CANCEL)
Jens Axboe561fb042019-10-24 07:25:42 -06007026 ret = -ECANCELED;
Jens Axboe31b51512019-01-18 22:56:34 -07007027
Jens Axboe561fb042019-10-24 07:25:42 -06007028 if (!ret) {
Jens Axboe561fb042019-10-24 07:25:42 -06007029 do {
Pavel Begunkov889fca72021-02-10 00:03:09 +00007030 ret = io_issue_sqe(req, 0);
Jens Axboe561fb042019-10-24 07:25:42 -06007031 /*
7032 * We can get EAGAIN for polled IO even though we're
7033 * forcing a sync submission from here, since we can't
7034 * wait for request slots on the block side.
7035 */
Pavel Begunkov51ebf1b2022-05-13 11:24:56 +01007036 if (ret != -EAGAIN || !(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe561fb042019-10-24 07:25:42 -06007037 break;
7038 cond_resched();
7039 } while (1);
7040 }
Jens Axboe31b51512019-01-18 22:56:34 -07007041
Pavel Begunkova3df76982021-02-18 22:32:52 +00007042 /* avoid locking problems by failing it from a clean context */
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01007043 if (ret)
Pavel Begunkova3df76982021-02-18 22:32:52 +00007044 io_req_task_queue_fail(req, ret);
Jens Axboe31b51512019-01-18 22:56:34 -07007045}
Jens Axboe2b188cc2019-01-07 10:46:33 -07007046
Pavel Begunkovaeca2412021-04-11 01:46:37 +01007047static inline struct io_fixed_file *io_fixed_file_slot(struct io_file_table *table,
Pavel Begunkov042b0d82021-08-09 13:04:01 +01007048 unsigned i)
Jens Axboe09bb8392019-03-13 12:39:28 -06007049{
Pavel Begunkov042b0d82021-08-09 13:04:01 +01007050 return &table->files[i];
Pavel Begunkovdafecf12021-02-28 22:35:11 +00007051}
7052
Jens Axboe09bb8392019-03-13 12:39:28 -06007053static inline struct file *io_file_from_index(struct io_ring_ctx *ctx,
7054 int index)
7055{
Pavel Begunkovaeca2412021-04-11 01:46:37 +01007056 struct io_fixed_file *slot = io_fixed_file_slot(&ctx->file_table, index);
Jens Axboe65e19f52019-10-26 07:20:21 -06007057
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01007058 return (struct file *) (slot->file_ptr & FFS_MASK);
Jens Axboe65e19f52019-10-26 07:20:21 -06007059}
7060
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01007061static void io_fixed_file_set(struct io_fixed_file *file_slot, struct file *file)
Pavel Begunkov9a321c92021-04-01 15:44:01 +01007062{
7063 unsigned long file_ptr = (unsigned long) file;
7064
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01007065 if (__io_file_supports_nowait(file, READ))
Pavel Begunkov9a321c92021-04-01 15:44:01 +01007066 file_ptr |= FFS_ASYNC_READ;
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01007067 if (__io_file_supports_nowait(file, WRITE))
Pavel Begunkov9a321c92021-04-01 15:44:01 +01007068 file_ptr |= FFS_ASYNC_WRITE;
7069 if (S_ISREG(file_inode(file)->i_mode))
7070 file_ptr |= FFS_ISREG;
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01007071 file_slot->file_ptr = file_ptr;
Jens Axboe09bb8392019-03-13 12:39:28 -06007072}
7073
Pavel Begunkovac177052021-08-09 13:04:02 +01007074static inline struct file *io_file_get_fixed(struct io_ring_ctx *ctx,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007075 struct io_kiocb *req, int fd,
7076 unsigned int issue_flags)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007077{
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007078 struct file *file = NULL;
Pavel Begunkovac177052021-08-09 13:04:02 +01007079 unsigned long file_ptr;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007080
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007081 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
7082
Pavel Begunkovac177052021-08-09 13:04:02 +01007083 if (unlikely((unsigned int)fd >= ctx->nr_user_files))
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007084 goto out;
Pavel Begunkovac177052021-08-09 13:04:02 +01007085 fd = array_index_nospec(fd, ctx->nr_user_files);
7086 file_ptr = io_fixed_file_slot(&ctx->file_table, fd)->file_ptr;
7087 file = (struct file *) (file_ptr & FFS_MASK);
7088 file_ptr &= ~FFS_MASK;
7089 /* mask in overlapping REQ_F and FFS bits */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01007090 req->flags |= (file_ptr << REQ_F_NOWAIT_READ_BIT);
Pavel Begunkovac177052021-08-09 13:04:02 +01007091 io_req_set_rsrc_node(req);
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007092out:
7093 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Pavel Begunkov8371adf2020-10-10 18:34:08 +01007094 return file;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007095}
7096
Pavel Begunkovac177052021-08-09 13:04:02 +01007097static struct file *io_file_get_normal(struct io_ring_ctx *ctx,
Pavel Begunkovac177052021-08-09 13:04:02 +01007098 struct io_kiocb *req, int fd)
7099{
Pavel Begunkov62906e82021-08-10 14:52:47 +01007100 struct file *file = fget(fd);
Pavel Begunkovac177052021-08-09 13:04:02 +01007101
7102 trace_io_uring_file_get(ctx, fd);
7103
7104 /* we don't allow fixed io_uring files */
7105 if (file && unlikely(file->f_op == &io_uring_fops))
7106 io_req_track_inflight(req);
7107 return file;
7108}
7109
7110static inline struct file *io_file_get(struct io_ring_ctx *ctx,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007111 struct io_kiocb *req, int fd, bool fixed,
7112 unsigned int issue_flags)
Pavel Begunkovac177052021-08-09 13:04:02 +01007113{
7114 if (fixed)
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007115 return io_file_get_fixed(ctx, req, fd, issue_flags);
Pavel Begunkovac177052021-08-09 13:04:02 +01007116 else
Pavel Begunkov62906e82021-08-10 14:52:47 +01007117 return io_file_get_normal(ctx, req, fd);
Pavel Begunkovac177052021-08-09 13:04:02 +01007118}
7119
Pavel Begunkovf237c302021-08-18 12:42:46 +01007120static void io_req_task_link_timeout(struct io_kiocb *req, bool *locked)
Jens Axboe89b263f2021-08-10 15:14:18 -06007121{
7122 struct io_kiocb *prev = req->timeout.prev;
Pavel Begunkov3d2a1e62021-11-26 14:38:14 +00007123 int ret = -ENOENT;
Jens Axboe89b263f2021-08-10 15:14:18 -06007124
7125 if (prev) {
Pavel Begunkov3d2a1e62021-11-26 14:38:14 +00007126 if (!(req->task->flags & PF_EXITING))
7127 ret = io_try_cancel_userdata(req, prev->user_data);
Pavel Begunkov505657b2021-08-17 20:28:09 +01007128 io_req_complete_post(req, ret ?: -ETIME, 0);
Jens Axboe89b263f2021-08-10 15:14:18 -06007129 io_put_req(prev);
Jens Axboe89b263f2021-08-10 15:14:18 -06007130 } else {
7131 io_req_complete_post(req, -ETIME, 0);
7132 }
7133}
7134
Jens Axboe2665abf2019-11-05 12:40:47 -07007135static enum hrtimer_restart io_link_timeout_fn(struct hrtimer *timer)
7136{
Jens Axboead8a48a2019-11-15 08:49:11 -07007137 struct io_timeout_data *data = container_of(timer,
7138 struct io_timeout_data, timer);
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00007139 struct io_kiocb *prev, *req = data->req;
Jens Axboe2665abf2019-11-05 12:40:47 -07007140 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2665abf2019-11-05 12:40:47 -07007141 unsigned long flags;
Jens Axboe2665abf2019-11-05 12:40:47 -07007142
Jens Axboe89b263f2021-08-10 15:14:18 -06007143 spin_lock_irqsave(&ctx->timeout_lock, flags);
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00007144 prev = req->timeout.head;
7145 req->timeout.head = NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07007146
7147 /*
7148 * We don't expect the list to be empty, that will only happen if we
7149 * race with the completion of the linked work.
7150 */
Pavel Begunkov447c19f2021-05-14 12:02:50 +01007151 if (prev) {
Pavel Begunkovf2f87372020-10-27 23:25:37 +00007152 io_remove_next_linked(prev);
Pavel Begunkov447c19f2021-05-14 12:02:50 +01007153 if (!req_ref_inc_not_zero(prev))
7154 prev = NULL;
7155 }
Pavel Begunkovef9dd632021-08-28 19:54:38 -06007156 list_del(&req->timeout.list);
Jens Axboe89b263f2021-08-10 15:14:18 -06007157 req->timeout.prev = prev;
7158 spin_unlock_irqrestore(&ctx->timeout_lock, flags);
Jens Axboe2665abf2019-11-05 12:40:47 -07007159
Jens Axboe89b263f2021-08-10 15:14:18 -06007160 req->io_task_work.func = io_req_task_link_timeout;
7161 io_req_task_work_add(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07007162 return HRTIMER_NORESTART;
7163}
7164
Pavel Begunkovde968c12021-03-19 17:22:33 +00007165static void io_queue_linked_timeout(struct io_kiocb *req)
Jens Axboe2665abf2019-11-05 12:40:47 -07007166{
Pavel Begunkovde968c12021-03-19 17:22:33 +00007167 struct io_ring_ctx *ctx = req->ctx;
7168
Jens Axboe89b263f2021-08-10 15:14:18 -06007169 spin_lock_irq(&ctx->timeout_lock);
Jens Axboe76a46e02019-11-10 23:34:16 -07007170 /*
Pavel Begunkovf2f87372020-10-27 23:25:37 +00007171 * If the back reference is NULL, then our linked request finished
7172 * before we got a chance to setup the timer
Jens Axboe76a46e02019-11-10 23:34:16 -07007173 */
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00007174 if (req->timeout.head) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07007175 struct io_timeout_data *data = req->async_data;
Jens Axboe94ae5e72019-11-14 19:39:52 -07007176
Jens Axboead8a48a2019-11-15 08:49:11 -07007177 data->timer.function = io_link_timeout_fn;
7178 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts),
7179 data->mode);
Pavel Begunkovef9dd632021-08-28 19:54:38 -06007180 list_add_tail(&req->timeout.list, &ctx->ltimeout_list);
Jens Axboe2665abf2019-11-05 12:40:47 -07007181 }
Jens Axboe89b263f2021-08-10 15:14:18 -06007182 spin_unlock_irq(&ctx->timeout_lock);
Jens Axboe2665abf2019-11-05 12:40:47 -07007183 /* drop submission reference */
Jens Axboe76a46e02019-11-10 23:34:16 -07007184 io_put_req(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07007185}
7186
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007187static void __io_queue_sqe(struct io_kiocb *req)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007188 __must_hold(&req->ctx->uring_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007189{
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007190 struct io_kiocb *linked_timeout;
Jens Axboee0c5c572019-03-12 10:18:47 -06007191 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007192
Olivier Langlois59b735a2021-06-22 05:17:39 -07007193issue_sqe:
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007194 ret = io_issue_sqe(req, IO_URING_F_NONBLOCK|IO_URING_F_COMPLETE_DEFER);
Jens Axboe491381ce2019-10-17 09:20:46 -06007195
7196 /*
7197 * We async punt it if the file wasn't marked NOWAIT, or if the file
7198 * doesn't support non-blocking read/write attempts
7199 */
Pavel Begunkov18400382021-03-19 17:22:34 +00007200 if (likely(!ret)) {
Pavel Begunkove342c802021-01-19 13:32:47 +00007201 if (req->flags & REQ_F_COMPLETE_INLINE) {
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007202 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01007203 struct io_submit_state *state = &ctx->submit_state;
Jens Axboee65ef562019-03-12 10:16:44 -06007204
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01007205 state->compl_reqs[state->compl_nr++] = req;
7206 if (state->compl_nr == ARRAY_SIZE(state->compl_reqs))
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01007207 io_submit_flush_completions(ctx);
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007208 return;
Pavel Begunkov0d63c142020-10-22 16:47:18 +01007209 }
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007210
7211 linked_timeout = io_prep_linked_timeout(req);
7212 if (linked_timeout)
7213 io_queue_linked_timeout(linked_timeout);
Pavel Begunkov18400382021-03-19 17:22:34 +00007214 } else if (ret == -EAGAIN && !(req->flags & REQ_F_NOWAIT)) {
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007215 linked_timeout = io_prep_linked_timeout(req);
7216
Olivier Langlois59b735a2021-06-22 05:17:39 -07007217 switch (io_arm_poll_handler(req)) {
7218 case IO_APOLL_READY:
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007219 if (linked_timeout)
Pavel Begunkov4ea672a2021-10-20 09:53:02 +01007220 io_queue_linked_timeout(linked_timeout);
Olivier Langlois59b735a2021-06-22 05:17:39 -07007221 goto issue_sqe;
7222 case IO_APOLL_ABORTED:
Pavel Begunkov18400382021-03-19 17:22:34 +00007223 /*
7224 * Queued up for async execution, worker will release
7225 * submit reference when the iocb is actually submitted.
7226 */
Pavel Begunkovf237c302021-08-18 12:42:46 +01007227 io_queue_async_work(req, NULL);
Olivier Langlois59b735a2021-06-22 05:17:39 -07007228 break;
Pavel Begunkov18400382021-03-19 17:22:34 +00007229 }
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007230
7231 if (linked_timeout)
7232 io_queue_linked_timeout(linked_timeout);
Pavel Begunkov0d63c142020-10-22 16:47:18 +01007233 } else {
Pavel Begunkovf41db2732021-02-28 22:35:12 +00007234 io_req_complete_failed(req, ret);
Jens Axboe9e645e112019-05-10 16:07:28 -06007235 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07007236}
7237
Pavel Begunkov441b8a72021-06-14 23:37:31 +01007238static inline void io_queue_sqe(struct io_kiocb *req)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007239 __must_hold(&req->ctx->uring_lock)
Jackie Liu4fe2c962019-09-09 20:50:40 +08007240{
Pavel Begunkov10c66902021-06-15 16:47:56 +01007241 if (unlikely(req->ctx->drain_active) && io_drain_req(req))
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01007242 return;
Jackie Liu4fe2c962019-09-09 20:50:40 +08007243
Hao Xua8295b92021-08-27 17:46:09 +08007244 if (likely(!(req->flags & (REQ_F_FORCE_ASYNC | REQ_F_FAIL)))) {
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007245 __io_queue_sqe(req);
Hao Xua8295b92021-08-27 17:46:09 +08007246 } else if (req->flags & REQ_F_FAIL) {
Pavel Begunkovc6d3d9c2021-08-31 14:13:10 +01007247 io_req_complete_fail_submit(req);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01007248 } else {
7249 int ret = io_req_prep_async(req);
7250
7251 if (unlikely(ret))
7252 io_req_complete_failed(req, ret);
7253 else
Pavel Begunkovf237c302021-08-18 12:42:46 +01007254 io_queue_async_work(req, NULL);
Jens Axboece35a472019-12-17 08:04:44 -07007255 }
Jackie Liu4fe2c962019-09-09 20:50:40 +08007256}
7257
Stefano Garzarella21b55db2020-08-27 16:58:30 +02007258/*
7259 * Check SQE restrictions (opcode and flags).
7260 *
7261 * Returns 'true' if SQE is allowed, 'false' otherwise.
7262 */
7263static inline bool io_check_restriction(struct io_ring_ctx *ctx,
7264 struct io_kiocb *req,
7265 unsigned int sqe_flags)
7266{
Pavel Begunkov4cfb25b2021-06-26 21:40:47 +01007267 if (likely(!ctx->restricted))
Stefano Garzarella21b55db2020-08-27 16:58:30 +02007268 return true;
7269
7270 if (!test_bit(req->opcode, ctx->restrictions.sqe_op))
7271 return false;
7272
7273 if ((sqe_flags & ctx->restrictions.sqe_flags_required) !=
7274 ctx->restrictions.sqe_flags_required)
7275 return false;
7276
7277 if (sqe_flags & ~(ctx->restrictions.sqe_flags_allowed |
7278 ctx->restrictions.sqe_flags_required))
7279 return false;
7280
7281 return true;
7282}
7283
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007284static int io_init_req(struct io_ring_ctx *ctx, struct io_kiocb *req,
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007285 const struct io_uring_sqe *sqe)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007286 __must_hold(&ctx->uring_lock)
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007287{
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007288 struct io_submit_state *state;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007289 unsigned int sqe_flags;
Jens Axboe003e8dc2021-03-06 09:22:27 -07007290 int personality, ret = 0;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007291
Pavel Begunkov864ea922021-08-09 13:04:08 +01007292 /* req is partially pre-initialised, see io_preinit_req() */
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007293 req->opcode = READ_ONCE(sqe->opcode);
Pavel Begunkov5be9ad12021-02-12 18:41:17 +00007294 /* same numerical values with corresponding REQ_F_*, safe to copy */
7295 req->flags = sqe_flags = READ_ONCE(sqe->flags);
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007296 req->user_data = READ_ONCE(sqe->user_data);
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007297 req->file = NULL;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00007298 req->fixed_rsrc_refs = NULL;
Pavel Begunkov4dd28242020-06-15 10:33:13 +03007299 req->task = current;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007300
Pavel Begunkov5be9ad12021-02-12 18:41:17 +00007301 /* enforce forwards compatibility on users */
Pavel Begunkovdddca222021-04-27 16:13:52 +01007302 if (unlikely(sqe_flags & ~SQE_VALID_FLAGS))
Pavel Begunkov5be9ad12021-02-12 18:41:17 +00007303 return -EINVAL;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007304 if (unlikely(req->opcode >= IORING_OP_LAST))
7305 return -EINVAL;
Pavel Begunkov4cfb25b2021-06-26 21:40:47 +01007306 if (!io_check_restriction(ctx, req, sqe_flags))
Stefano Garzarella21b55db2020-08-27 16:58:30 +02007307 return -EACCES;
7308
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007309 if ((sqe_flags & IOSQE_BUFFER_SELECT) &&
7310 !io_op_defs[req->opcode].buffer_select)
7311 return -EOPNOTSUPP;
Pavel Begunkov3c199662021-06-15 16:47:57 +01007312 if (unlikely(sqe_flags & IOSQE_IO_DRAIN))
7313 ctx->drain_active = true;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007314
Jens Axboe003e8dc2021-03-06 09:22:27 -07007315 personality = READ_ONCE(sqe->personality);
7316 if (personality) {
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01007317 req->creds = xa_load(&ctx->personalities, personality);
7318 if (!req->creds)
Jens Axboe003e8dc2021-03-06 09:22:27 -07007319 return -EINVAL;
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01007320 get_cred(req->creds);
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01007321 req->flags |= REQ_F_CREDS;
Jens Axboe003e8dc2021-03-06 09:22:27 -07007322 }
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007323 state = &ctx->submit_state;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007324
Jens Axboe27926b62020-10-28 09:33:23 -06007325 /*
7326 * Plug now if we have more than 1 IO left after this, and the target
7327 * is potentially a read/write to block based storage.
7328 */
7329 if (!state->plug_started && state->ios_left > 1 &&
7330 io_op_defs[req->opcode].plug) {
7331 blk_start_plug(&state->plug);
7332 state->plug_started = true;
7333 }
Jens Axboe63ff8222020-05-07 14:56:15 -06007334
Pavel Begunkovbd5bbda2020-11-20 15:50:51 +00007335 if (io_op_defs[req->opcode].needs_file) {
Pavel Begunkov62906e82021-08-10 14:52:47 +01007336 req->file = io_file_get(ctx, req, READ_ONCE(sqe->fd),
Jens Axboe937c15e2023-03-03 06:49:57 -07007337 (sqe_flags & IOSQE_FIXED_FILE),
7338 IO_URING_F_NONBLOCK);
Pavel Begunkovba13e232021-02-01 18:59:52 +00007339 if (unlikely(!req->file))
Pavel Begunkovbd5bbda2020-11-20 15:50:51 +00007340 ret = -EBADF;
7341 }
7342
Pavel Begunkov71b547c2020-10-10 18:34:09 +01007343 state->ios_left--;
7344 return ret;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007345}
7346
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007347static int io_submit_sqe(struct io_ring_ctx *ctx, struct io_kiocb *req,
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007348 const struct io_uring_sqe *sqe)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007349 __must_hold(&ctx->uring_lock)
Jens Axboe6c271ce2019-01-10 11:22:30 -07007350{
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007351 struct io_submit_link *link = &ctx->submit_state.link;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007352 int ret;
7353
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007354 ret = io_init_req(ctx, req, sqe);
7355 if (unlikely(ret)) {
7356fail_req:
Hao Xua8295b92021-08-27 17:46:09 +08007357 /* fail even hard links since we don't submit */
Pavel Begunkovde59bc12021-02-18 18:29:47 +00007358 if (link->head) {
Hao Xua8295b92021-08-27 17:46:09 +08007359 /*
7360 * we can judge a link req is failed or cancelled by if
7361 * REQ_F_FAIL is set, but the head is an exception since
7362 * it may be set REQ_F_FAIL because of other req's failure
7363 * so let's leverage req->result to distinguish if a head
7364 * is set REQ_F_FAIL because of its failure or other req's
7365 * failure so that we can set the correct ret code for it.
7366 * init result here to avoid affecting the normal path.
7367 */
7368 if (!(link->head->flags & REQ_F_FAIL))
7369 req_fail_link_node(link->head, -ECANCELED);
7370 } else if (!(req->flags & (REQ_F_LINK | REQ_F_HARDLINK))) {
7371 /*
7372 * the current req is a normal req, we should return
7373 * error and thus break the submittion loop.
7374 */
7375 io_req_complete_failed(req, ret);
7376 return ret;
Pavel Begunkovde59bc12021-02-18 18:29:47 +00007377 }
Hao Xua8295b92021-08-27 17:46:09 +08007378 req_fail_link_node(req, ret);
7379 } else {
7380 ret = io_req_prep(req, sqe);
7381 if (unlikely(ret))
7382 goto fail_req;
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007383 }
Pavel Begunkov441b8a72021-06-14 23:37:31 +01007384
Pavel Begunkovbe7053b2021-02-18 18:29:45 +00007385 /* don't need @sqe from now on */
Olivier Langlois236daeae2021-05-31 02:36:37 -04007386 trace_io_uring_submit_sqe(ctx, req, req->opcode, req->user_data,
7387 req->flags, true,
7388 ctx->flags & IORING_SETUP_SQPOLL);
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007389
Jens Axboe6c271ce2019-01-10 11:22:30 -07007390 /*
7391 * If we already have a head request, queue this one for async
7392 * submittal once the head completes. If we don't have a head but
7393 * IOSQE_IO_LINK is set in the sqe, start a new head. This one will be
7394 * submitted sync once the chain is complete. If none of those
7395 * conditions are true (normal request), then just queue it.
7396 */
7397 if (link->head) {
7398 struct io_kiocb *head = link->head;
7399
Hao Xua8295b92021-08-27 17:46:09 +08007400 if (!(req->flags & REQ_F_FAIL)) {
7401 ret = io_req_prep_async(req);
7402 if (unlikely(ret)) {
7403 req_fail_link_node(req, ret);
7404 if (!(head->flags & REQ_F_FAIL))
7405 req_fail_link_node(head, -ECANCELED);
7406 }
7407 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07007408 trace_io_uring_link(ctx, req, head);
7409 link->last->link = req;
7410 link->last = req;
7411
7412 /* last request of a link, enqueue the link */
7413 if (!(req->flags & (REQ_F_LINK | REQ_F_HARDLINK))) {
7414 link->head = NULL;
Pavel Begunkov5e159202021-06-14 23:37:26 +01007415 io_queue_sqe(head);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007416 }
Jackie Liu4fe2c962019-09-09 20:50:40 +08007417 } else {
Jens Axboe2b188cc2019-01-07 10:46:33 -07007418 if (req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) {
Jackie Liu4fe2c962019-09-09 20:50:40 +08007419 link->head = req;
7420 link->last = req;
7421 } else {
Pavel Begunkovbe7053b2021-02-18 18:29:45 +00007422 io_queue_sqe(req);
Jackie Liu4fe2c962019-09-09 20:50:40 +08007423 }
7424 }
7425
7426 return 0;
7427}
7428
7429/*
7430 * Batched submission is done, ensure local IO is flushed out.
7431 */
7432static void io_submit_state_end(struct io_submit_state *state,
7433 struct io_ring_ctx *ctx)
Pavel Begunkov1b4a51b2019-11-21 11:54:28 +03007434{
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007435 if (state->link.head)
Pavel Begunkovde59bc12021-02-18 18:29:47 +00007436 io_queue_sqe(state->link.head);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01007437 if (state->compl_nr)
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01007438 io_submit_flush_completions(ctx);
Jackie Liua197f662019-11-08 08:09:12 -07007439 if (state->plug_started)
Pavel Begunkov32fe5252019-12-17 22:26:58 +03007440 blk_finish_plug(&state->plug);
Jens Axboe9e645e112019-05-10 16:07:28 -06007441}
Pavel Begunkov32fe5252019-12-17 22:26:58 +03007442
Jens Axboe9e645e112019-05-10 16:07:28 -06007443/*
7444 * Start submission side cache.
Pavel Begunkov32fe5252019-12-17 22:26:58 +03007445 */
Jens Axboe9e645e112019-05-10 16:07:28 -06007446static void io_submit_state_start(struct io_submit_state *state,
Pavel Begunkov196be952019-11-07 01:41:06 +03007447 unsigned int max_ios)
Jens Axboe9e645e112019-05-10 16:07:28 -06007448{
7449 state->plug_started = false;
Jens Axboebcda7ba2020-02-23 16:42:51 -07007450 state->ios_left = max_ios;
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007451 /* set only head, no need to init link_last in advance */
7452 state->link.head = NULL;
Jens Axboe75c6a032020-01-28 10:15:23 -07007453}
7454
Jens Axboe193155c2020-02-22 23:22:19 -07007455static void io_commit_sqring(struct io_ring_ctx *ctx)
7456{
Jens Axboe75c6a032020-01-28 10:15:23 -07007457 struct io_rings *rings = ctx->rings;
7458
7459 /*
Jens Axboe193155c2020-02-22 23:22:19 -07007460 * Ensure any loads from the SQEs are done at this point,
Jens Axboe75c6a032020-01-28 10:15:23 -07007461 * since once we write the new head, the application could
7462 * write new data to them.
Pavel Begunkov6b47ee62020-01-18 20:22:41 +03007463 */
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007464 smp_store_release(&rings->sq.head, ctx->cached_sq_head);
Jens Axboebcda7ba2020-02-23 16:42:51 -07007465}
7466
Jens Axboe9e645e112019-05-10 16:07:28 -06007467/*
Fam Zhengdd9ae8a2021-06-04 17:42:56 +01007468 * Fetch an sqe, if one is available. Note this returns a pointer to memory
Jens Axboe9e645e112019-05-10 16:07:28 -06007469 * that is mapped by userspace. This means that care needs to be taken to
7470 * ensure that reads are stable, as we cannot rely on userspace always
Jens Axboe78e19bb2019-11-06 15:21:34 -07007471 * being a good citizen. If members of the sqe are validated and then later
7472 * used, it's important that those reads are done through READ_ONCE() to
Pavel Begunkov2e6e1fd2019-12-05 16:15:45 +03007473 * prevent a re-load down the line.
Jens Axboe9e645e112019-05-10 16:07:28 -06007474 */
7475static const struct io_uring_sqe *io_get_sqe(struct io_ring_ctx *ctx)
Jens Axboe9e645e112019-05-10 16:07:28 -06007476{
Pavel Begunkovea5ab3b2021-05-16 22:58:09 +01007477 unsigned head, mask = ctx->sq_entries - 1;
Pavel Begunkov17d3aeb2021-06-14 23:37:23 +01007478 unsigned sq_idx = ctx->cached_sq_head++ & mask;
Jens Axboe9e645e112019-05-10 16:07:28 -06007479
7480 /*
7481 * The cached sq head (or cq tail) serves two purposes:
7482 *
7483 * 1) allows us to batch the cost of updating the user visible
Pavel Begunkov9d763772019-12-17 02:22:07 +03007484 * head updates.
Jens Axboe9e645e112019-05-10 16:07:28 -06007485 * 2) allows the kernel side to track the head on its own, even
Pavel Begunkov8cdf2192020-01-25 00:40:24 +03007486 * though the application is the one updating it.
7487 */
Pavel Begunkov17d3aeb2021-06-14 23:37:23 +01007488 head = READ_ONCE(ctx->sq_array[sq_idx]);
Pavel Begunkov8cdf2192020-01-25 00:40:24 +03007489 if (likely(head < ctx->sq_entries))
7490 return &ctx->sq_sqes[head];
7491
7492 /* drop invalid entries */
Pavel Begunkov15641e42021-06-14 23:37:24 +01007493 ctx->cq_extra--;
7494 WRITE_ONCE(ctx->rings->sq_dropped,
7495 READ_ONCE(ctx->rings->sq_dropped) + 1);
Pavel Begunkov711be032020-01-17 03:57:59 +03007496 return NULL;
7497}
Jens Axboeb7bb4f72019-12-15 22:13:43 -07007498
Jens Axboe0f212202020-09-13 13:09:39 -06007499static int io_submit_sqes(struct io_ring_ctx *ctx, unsigned int nr)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007500 __must_hold(&ctx->uring_lock)
Jens Axboe6c271ce2019-01-10 11:22:30 -07007501{
Pavel Begunkov46c4e162021-02-18 18:29:37 +00007502 int submitted = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007503
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03007504 /* make sure SQ entry isn't read before tail */
7505 nr = min3(nr, ctx->sq_entries, io_sqring_entries(ctx));
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03007506 if (!percpu_ref_tryget_many(&ctx->refs, nr))
7507 return -EAGAIN;
Pavel Begunkov9a108672021-08-27 11:55:01 +01007508 io_get_task_refs(nr);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007509
Pavel Begunkovba88ff12021-02-10 00:03:11 +00007510 io_submit_state_start(&ctx->submit_state, nr);
Pavel Begunkov46c4e162021-02-18 18:29:37 +00007511 while (submitted < nr) {
Jens Axboe3529d8c2019-12-19 18:24:38 -07007512 const struct io_uring_sqe *sqe;
Pavel Begunkov196be952019-11-07 01:41:06 +03007513 struct io_kiocb *req;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03007514
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007515 req = io_alloc_req(ctx);
Pavel Begunkov196be952019-11-07 01:41:06 +03007516 if (unlikely(!req)) {
7517 if (!submitted)
7518 submitted = -EAGAIN;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03007519 break;
Jens Axboe9e645e112019-05-10 16:07:28 -06007520 }
Pavel Begunkov4fccfcb2021-02-12 11:55:17 +00007521 sqe = io_get_sqe(ctx);
7522 if (unlikely(!sqe)) {
Hao Xu0c6e1d72021-08-26 01:58:56 +08007523 list_add(&req->inflight_entry, &ctx->submit_state.free_list);
Pavel Begunkov4fccfcb2021-02-12 11:55:17 +00007524 break;
7525 }
Jens Axboed3656342019-12-18 09:50:26 -07007526 /* will complete beyond this point, count as submitted */
7527 submitted++;
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007528 if (io_submit_sqe(ctx, req, sqe))
Jens Axboed3656342019-12-18 09:50:26 -07007529 break;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007530 }
7531
Pavel Begunkov9466f432020-01-25 22:34:01 +03007532 if (unlikely(submitted != nr)) {
7533 int ref_used = (submitted == -EAGAIN) ? 0 : submitted;
Jens Axboed8a6df12020-10-15 16:24:45 -06007534 int unused = nr - ref_used;
Pavel Begunkov9466f432020-01-25 22:34:01 +03007535
Pavel Begunkov09899b12021-06-14 02:36:22 +01007536 current->io_uring->cached_refs += unused;
Jens Axboed8a6df12020-10-15 16:24:45 -06007537 percpu_ref_put_many(&ctx->refs, unused);
Pavel Begunkov9466f432020-01-25 22:34:01 +03007538 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07007539
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007540 io_submit_state_end(&ctx->submit_state, ctx);
Pavel Begunkovae9428c2019-11-06 00:22:14 +03007541 /* Commit SQ ring head once we've consumed and submitted all SQEs */
7542 io_commit_sqring(ctx);
7543
Jens Axboe6c271ce2019-01-10 11:22:30 -07007544 return submitted;
7545}
7546
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007547static inline bool io_sqd_events_pending(struct io_sq_data *sqd)
7548{
7549 return READ_ONCE(sqd->state);
7550}
7551
Xiaoguang Wang23b36282020-07-23 20:57:24 +08007552static inline void io_ring_set_wakeup_flag(struct io_ring_ctx *ctx)
7553{
7554 /* Tell userspace we may need a wakeup call */
Jens Axboe79ebeae2021-08-10 15:18:27 -06007555 spin_lock(&ctx->completion_lock);
Nadav Amit20c0b382021-08-07 17:13:42 -07007556 WRITE_ONCE(ctx->rings->sq_flags,
7557 ctx->rings->sq_flags | IORING_SQ_NEED_WAKEUP);
Jens Axboe79ebeae2021-08-10 15:18:27 -06007558 spin_unlock(&ctx->completion_lock);
Xiaoguang Wang23b36282020-07-23 20:57:24 +08007559}
7560
7561static inline void io_ring_clear_wakeup_flag(struct io_ring_ctx *ctx)
7562{
Jens Axboe79ebeae2021-08-10 15:18:27 -06007563 spin_lock(&ctx->completion_lock);
Nadav Amit20c0b382021-08-07 17:13:42 -07007564 WRITE_ONCE(ctx->rings->sq_flags,
7565 ctx->rings->sq_flags & ~IORING_SQ_NEED_WAKEUP);
Jens Axboe79ebeae2021-08-10 15:18:27 -06007566 spin_unlock(&ctx->completion_lock);
Xiaoguang Wang23b36282020-07-23 20:57:24 +08007567}
7568
Xiaoguang Wang08369242020-11-03 14:15:59 +08007569static int __io_sq_thread(struct io_ring_ctx *ctx, bool cap_entries)
Jens Axboe6c271ce2019-01-10 11:22:30 -07007570{
Jens Axboec8d1ba52020-09-14 11:07:26 -06007571 unsigned int to_submit;
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08007572 int ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007573
Jens Axboec8d1ba52020-09-14 11:07:26 -06007574 to_submit = io_sqring_entries(ctx);
Jens Axboee95eee22020-09-08 09:11:32 -06007575 /* if we're handling multiple rings, cap submit size for fairness */
Olivier Langlois4ce8ad92021-06-23 11:50:18 -07007576 if (cap_entries && to_submit > IORING_SQPOLL_CAP_ENTRIES_VALUE)
7577 to_submit = IORING_SQPOLL_CAP_ENTRIES_VALUE;
Jens Axboee95eee22020-09-08 09:11:32 -06007578
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007579 if (!list_empty(&ctx->iopoll_list) || to_submit) {
7580 unsigned nr_events = 0;
Pavel Begunkov948e1942021-06-24 15:09:55 +01007581 const struct cred *creds = NULL;
7582
7583 if (ctx->sq_creds != current_cred())
7584 creds = override_creds(ctx->sq_creds);
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007585
Xiaoguang Wang08369242020-11-03 14:15:59 +08007586 mutex_lock(&ctx->uring_lock);
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007587 if (!list_empty(&ctx->iopoll_list))
Pavel Begunkova8576af2021-08-15 10:40:21 +01007588 io_do_iopoll(ctx, &nr_events, 0);
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007589
Pavel Begunkov3b763ba2021-04-18 14:52:08 +01007590 /*
7591 * Don't submit if refs are dying, good for io_uring_register(),
7592 * but also it is relied upon by io_ring_exit_work()
7593 */
Pavel Begunkov0298ef92021-03-08 13:20:57 +00007594 if (to_submit && likely(!percpu_ref_is_dying(&ctx->refs)) &&
7595 !(ctx->flags & IORING_SETUP_R_DISABLED))
Xiaoguang Wang08369242020-11-03 14:15:59 +08007596 ret = io_submit_sqes(ctx, to_submit);
7597 mutex_unlock(&ctx->uring_lock);
Jens Axboe90554202020-09-03 12:12:41 -06007598
Pavel Begunkovacfb3812021-05-16 22:58:03 +01007599 if (to_submit && wq_has_sleeper(&ctx->sqo_sq_wait))
7600 wake_up(&ctx->sqo_sq_wait);
Pavel Begunkov948e1942021-06-24 15:09:55 +01007601 if (creds)
7602 revert_creds(creds);
Pavel Begunkovacfb3812021-05-16 22:58:03 +01007603 }
Jens Axboe90554202020-09-03 12:12:41 -06007604
Xiaoguang Wang08369242020-11-03 14:15:59 +08007605 return ret;
7606}
7607
7608static void io_sqd_update_thread_idle(struct io_sq_data *sqd)
7609{
7610 struct io_ring_ctx *ctx;
7611 unsigned sq_thread_idle = 0;
7612
Pavel Begunkovc9dca272021-03-10 13:13:55 +00007613 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
7614 sq_thread_idle = max(sq_thread_idle, ctx->sq_thread_idle);
Xiaoguang Wang08369242020-11-03 14:15:59 +08007615 sqd->sq_thread_idle = sq_thread_idle;
Jens Axboec8d1ba52020-09-14 11:07:26 -06007616}
7617
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007618static bool io_sqd_handle_event(struct io_sq_data *sqd)
7619{
7620 bool did_sig = false;
7621 struct ksignal ksig;
7622
7623 if (test_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state) ||
7624 signal_pending(current)) {
7625 mutex_unlock(&sqd->lock);
7626 if (signal_pending(current))
7627 did_sig = get_signal(&ksig);
7628 cond_resched();
7629 mutex_lock(&sqd->lock);
7630 }
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007631 return did_sig || test_bit(IO_SQ_THREAD_SHOULD_STOP, &sqd->state);
7632}
7633
Jens Axboe6c271ce2019-01-10 11:22:30 -07007634static int io_sq_thread(void *data)
7635{
Jens Axboe69fb2132020-09-14 11:16:23 -06007636 struct io_sq_data *sqd = data;
7637 struct io_ring_ctx *ctx;
Xiaoguang Wanga0d92052020-11-12 14:55:59 +08007638 unsigned long timeout = 0;
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007639 char buf[TASK_COMM_LEN];
Xiaoguang Wang08369242020-11-03 14:15:59 +08007640 DEFINE_WAIT(wait);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007641
Pavel Begunkov696ee882021-04-01 09:55:04 +01007642 snprintf(buf, sizeof(buf), "iou-sqp-%d", sqd->task_pid);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007643 set_task_comm(current, buf);
Jens Axboe28cea78a2020-09-14 10:51:17 -06007644
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007645 if (sqd->sq_cpu != -1)
7646 set_cpus_allowed_ptr(current, cpumask_of(sqd->sq_cpu));
7647 else
7648 set_cpus_allowed_ptr(current, cpu_online_mask);
7649 current->flags |= PF_NO_SETAFFINITY;
7650
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00007651 mutex_lock(&sqd->lock);
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007652 while (1) {
Pavel Begunkov1a924a82021-06-24 15:09:56 +01007653 bool cap_entries, sqt_spin = false;
Jens Axboec1edbf52019-11-10 16:56:04 -07007654
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007655 if (io_sqd_events_pending(sqd) || signal_pending(current)) {
7656 if (io_sqd_handle_event(sqd))
Pavel Begunkovc7d95612021-04-13 11:43:00 +01007657 break;
Xiaoguang Wang08369242020-11-03 14:15:59 +08007658 timeout = jiffies + sqd->sq_thread_idle;
7659 }
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007660
Jens Axboee95eee22020-09-08 09:11:32 -06007661 cap_entries = !list_is_singular(&sqd->ctx_list);
Jens Axboe69fb2132020-09-14 11:16:23 -06007662 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list) {
Pavel Begunkov948e1942021-06-24 15:09:55 +01007663 int ret = __io_sq_thread(ctx, cap_entries);
Stefan Metzmacher7c30f36a2021-03-07 11:54:28 +01007664
Xiaoguang Wang08369242020-11-03 14:15:59 +08007665 if (!sqt_spin && (ret > 0 || !list_empty(&ctx->iopoll_list)))
7666 sqt_spin = true;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007667 }
Pavel Begunkovdd432ea52021-06-26 21:40:45 +01007668 if (io_run_task_work())
7669 sqt_spin = true;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007670
Xiaoguang Wang08369242020-11-03 14:15:59 +08007671 if (sqt_spin || !time_after(jiffies, timeout)) {
Jens Axboec8d1ba52020-09-14 11:07:26 -06007672 cond_resched();
Xiaoguang Wang08369242020-11-03 14:15:59 +08007673 if (sqt_spin)
7674 timeout = jiffies + sqd->sq_thread_idle;
7675 continue;
7676 }
7677
Xiaoguang Wang08369242020-11-03 14:15:59 +08007678 prepare_to_wait(&sqd->wait, &wait, TASK_INTERRUPTIBLE);
Pavel Begunkovdd432ea52021-06-26 21:40:45 +01007679 if (!io_sqd_events_pending(sqd) && !current->task_works) {
Pavel Begunkov1a924a82021-06-24 15:09:56 +01007680 bool needs_sched = true;
7681
Hao Xu724cb4f2021-04-21 23:19:11 +08007682 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list) {
Pavel Begunkovaaa9f0f2021-05-16 22:58:01 +01007683 io_ring_set_wakeup_flag(ctx);
7684
Hao Xu724cb4f2021-04-21 23:19:11 +08007685 if ((ctx->flags & IORING_SETUP_IOPOLL) &&
7686 !list_empty_careful(&ctx->iopoll_list)) {
7687 needs_sched = false;
7688 break;
7689 }
7690 if (io_sqring_entries(ctx)) {
7691 needs_sched = false;
7692 break;
7693 }
7694 }
7695
7696 if (needs_sched) {
7697 mutex_unlock(&sqd->lock);
7698 schedule();
7699 mutex_lock(&sqd->lock);
7700 }
Jens Axboe69fb2132020-09-14 11:16:23 -06007701 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
7702 io_ring_clear_wakeup_flag(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007703 }
Xiaoguang Wang08369242020-11-03 14:15:59 +08007704
7705 finish_wait(&sqd->wait, &wait);
7706 timeout = jiffies + sqd->sq_thread_idle;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007707 }
7708
Pavel Begunkov78cc6872021-06-14 02:36:23 +01007709 io_uring_cancel_generic(true, sqd);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007710 sqd->thread = NULL;
Jens Axboe05962f92021-03-06 13:58:48 -07007711 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
Jens Axboe5f3f26f2021-02-25 10:17:46 -07007712 io_ring_set_wakeup_flag(ctx);
Pavel Begunkov521d6a72021-03-11 23:29:38 +00007713 io_run_task_work();
Pavel Begunkov734551d2021-04-18 14:52:09 +01007714 mutex_unlock(&sqd->lock);
7715
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007716 complete(&sqd->exited);
7717 do_exit(0);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007718}
7719
Jens Axboebda52162019-09-24 13:47:15 -06007720struct io_wait_queue {
7721 struct wait_queue_entry wq;
7722 struct io_ring_ctx *ctx;
Jens Axboe5fd46172021-08-06 14:04:31 -06007723 unsigned cq_tail;
Jens Axboebda52162019-09-24 13:47:15 -06007724 unsigned nr_timeouts;
7725};
7726
Pavel Begunkov6c503152021-01-04 20:36:36 +00007727static inline bool io_should_wake(struct io_wait_queue *iowq)
Jens Axboebda52162019-09-24 13:47:15 -06007728{
7729 struct io_ring_ctx *ctx = iowq->ctx;
Jens Axboe5fd46172021-08-06 14:04:31 -06007730 int dist = ctx->cached_cq_tail - (int) iowq->cq_tail;
Jens Axboebda52162019-09-24 13:47:15 -06007731
7732 /*
Brian Gianforcarod195a662019-12-13 03:09:50 -08007733 * Wake up if we have enough events, or if a timeout occurred since we
Jens Axboebda52162019-09-24 13:47:15 -06007734 * started waiting. For timeouts, we always want to return to userspace,
7735 * regardless of event count.
7736 */
Jens Axboe5fd46172021-08-06 14:04:31 -06007737 return dist >= 0 || atomic_read(&ctx->cq_timeouts) != iowq->nr_timeouts;
Jens Axboebda52162019-09-24 13:47:15 -06007738}
7739
7740static int io_wake_function(struct wait_queue_entry *curr, unsigned int mode,
7741 int wake_flags, void *key)
7742{
7743 struct io_wait_queue *iowq = container_of(curr, struct io_wait_queue,
7744 wq);
7745
Pavel Begunkov6c503152021-01-04 20:36:36 +00007746 /*
7747 * Cannot safely flush overflowed CQEs from here, ensure we wake up
7748 * the task, and the next invocation will do it.
7749 */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01007750 if (io_should_wake(iowq) || test_bit(0, &iowq->ctx->check_cq_overflow))
Pavel Begunkov6c503152021-01-04 20:36:36 +00007751 return autoremove_wake_function(curr, mode, wake_flags, key);
7752 return -1;
Jens Axboebda52162019-09-24 13:47:15 -06007753}
7754
Jens Axboeaf9c1a42020-09-24 13:32:18 -06007755static int io_run_task_work_sig(void)
7756{
7757 if (io_run_task_work())
7758 return 1;
7759 if (!signal_pending(current))
7760 return 0;
Jens Axboe0b8cfa92021-03-21 14:16:08 -06007761 if (test_thread_flag(TIF_NOTIFY_SIGNAL))
Jens Axboe792ee0f62020-10-22 20:17:18 -06007762 return -ERESTARTSYS;
Jens Axboeaf9c1a42020-09-24 13:32:18 -06007763 return -EINTR;
7764}
7765
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007766/* when returns >0, the caller should retry */
7767static inline int io_cqring_wait_schedule(struct io_ring_ctx *ctx,
7768 struct io_wait_queue *iowq,
Pavel Begunkovc3222fd2023-01-05 10:49:15 +00007769 ktime_t *timeout)
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007770{
7771 int ret;
7772
7773 /* make sure we run task_work before checking for signals */
7774 ret = io_run_task_work_sig();
7775 if (ret || io_should_wake(iowq))
7776 return ret;
7777 /* let the caller flush overflows, retry */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01007778 if (test_bit(0, &ctx->check_cq_overflow))
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007779 return 1;
7780
Pavel Begunkovc3222fd2023-01-05 10:49:15 +00007781 if (!schedule_hrtimeout(timeout, HRTIMER_MODE_ABS))
Jens Axboe7c834372022-02-21 05:49:30 -07007782 return -ETIME;
7783 return 1;
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007784}
7785
Jens Axboe2b188cc2019-01-07 10:46:33 -07007786/*
7787 * Wait until events become available, if we don't already have some. The
7788 * application must reap them itself, as they reside on the shared cq ring.
7789 */
7790static int io_cqring_wait(struct io_ring_ctx *ctx, int min_events,
Hao Xuc73ebb62020-11-03 10:54:37 +08007791 const sigset_t __user *sig, size_t sigsz,
7792 struct __kernel_timespec __user *uts)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007793{
Pavel Begunkov902910992021-08-09 09:07:32 -06007794 struct io_wait_queue iowq;
Hristo Venev75b28af2019-08-26 17:23:46 +00007795 struct io_rings *rings = ctx->rings;
Jens Axboe7c834372022-02-21 05:49:30 -07007796 ktime_t timeout = KTIME_MAX;
Pavel Begunkovc1d5a222021-02-04 13:51:57 +00007797 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007798
Jens Axboeb41e9852020-02-17 09:52:41 -07007799 do {
Pavel Begunkov90f67362021-08-09 20:18:12 +01007800 io_cqring_overflow_flush(ctx);
Pavel Begunkov6c503152021-01-04 20:36:36 +00007801 if (io_cqring_events(ctx) >= min_events)
Jens Axboeb41e9852020-02-17 09:52:41 -07007802 return 0;
Jens Axboe4c6e2772020-07-01 11:29:10 -06007803 if (!io_run_task_work())
Jens Axboeb41e9852020-02-17 09:52:41 -07007804 break;
Jens Axboeb41e9852020-02-17 09:52:41 -07007805 } while (1);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007806
Xiaoguang Wang44df58d2021-09-14 22:38:52 +08007807 if (uts) {
7808 struct timespec64 ts;
7809
7810 if (get_timespec64(&ts, uts))
7811 return -EFAULT;
Jens Axboe7c834372022-02-21 05:49:30 -07007812 timeout = ktime_add_ns(timespec64_to_ktime(ts), ktime_get_ns());
Xiaoguang Wang44df58d2021-09-14 22:38:52 +08007813 }
7814
Jens Axboe2b188cc2019-01-07 10:46:33 -07007815 if (sig) {
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01007816#ifdef CONFIG_COMPAT
7817 if (in_compat_syscall())
7818 ret = set_compat_user_sigmask((const compat_sigset_t __user *)sig,
Oleg Nesterovb7724342019-07-16 16:29:53 -07007819 sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01007820 else
7821#endif
Oleg Nesterovb7724342019-07-16 16:29:53 -07007822 ret = set_user_sigmask(sig, sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01007823
Jens Axboe2b188cc2019-01-07 10:46:33 -07007824 if (ret)
7825 return ret;
7826 }
7827
Pavel Begunkov902910992021-08-09 09:07:32 -06007828 init_waitqueue_func_entry(&iowq.wq, io_wake_function);
7829 iowq.wq.private = current;
7830 INIT_LIST_HEAD(&iowq.wq.entry);
7831 iowq.ctx = ctx;
Jens Axboebda52162019-09-24 13:47:15 -06007832 iowq.nr_timeouts = atomic_read(&ctx->cq_timeouts);
Jens Axboe5fd46172021-08-06 14:04:31 -06007833 iowq.cq_tail = READ_ONCE(ctx->rings->cq.head) + min_events;
Pavel Begunkov902910992021-08-09 09:07:32 -06007834
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02007835 trace_io_uring_cqring_wait(ctx, min_events);
Jens Axboebda52162019-09-24 13:47:15 -06007836 do {
Jens Axboeca0a2652021-03-04 17:15:48 -07007837 /* if we can't even flush overflow, don't wait for more */
Pavel Begunkov90f67362021-08-09 20:18:12 +01007838 if (!io_cqring_overflow_flush(ctx)) {
Jens Axboeca0a2652021-03-04 17:15:48 -07007839 ret = -EBUSY;
7840 break;
7841 }
Pavel Begunkov311997b2021-06-14 23:37:28 +01007842 prepare_to_wait_exclusive(&ctx->cq_wait, &iowq.wq,
Jens Axboebda52162019-09-24 13:47:15 -06007843 TASK_INTERRUPTIBLE);
Pavel Begunkovc3222fd2023-01-05 10:49:15 +00007844 ret = io_cqring_wait_schedule(ctx, &iowq, &timeout);
Pavel Begunkov311997b2021-06-14 23:37:28 +01007845 finish_wait(&ctx->cq_wait, &iowq.wq);
Jens Axboeca0a2652021-03-04 17:15:48 -07007846 cond_resched();
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007847 } while (ret > 0);
Jens Axboebda52162019-09-24 13:47:15 -06007848
Jens Axboeb7db41c2020-07-04 08:55:50 -06007849 restore_saved_sigmask_unless(ret == -EINTR);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007850
Hristo Venev75b28af2019-08-26 17:23:46 +00007851 return READ_ONCE(rings->cq.head) == READ_ONCE(rings->cq.tail) ? ret : 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007852}
7853
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007854static void io_free_page_table(void **table, size_t size)
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01007855{
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007856 unsigned i, nr_tables = DIV_ROUND_UP(size, PAGE_SIZE);
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01007857
7858 for (i = 0; i < nr_tables; i++)
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007859 kfree(table[i]);
7860 kfree(table);
7861}
7862
7863static void **io_alloc_page_table(size_t size)
7864{
7865 unsigned i, nr_tables = DIV_ROUND_UP(size, PAGE_SIZE);
7866 size_t init_size = size;
7867 void **table;
7868
Pavel Begunkov0bea96f2021-08-20 10:36:36 +01007869 table = kcalloc(nr_tables, sizeof(*table), GFP_KERNEL_ACCOUNT);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007870 if (!table)
7871 return NULL;
7872
7873 for (i = 0; i < nr_tables; i++) {
Pavel Begunkov27f6b312021-06-15 13:20:13 +01007874 unsigned int this_size = min_t(size_t, size, PAGE_SIZE);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007875
Pavel Begunkov0bea96f2021-08-20 10:36:36 +01007876 table[i] = kzalloc(this_size, GFP_KERNEL_ACCOUNT);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007877 if (!table[i]) {
7878 io_free_page_table(table, init_size);
7879 return NULL;
7880 }
7881 size -= this_size;
7882 }
7883 return table;
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01007884}
7885
Pavel Begunkov28a9fe22021-04-01 15:43:47 +01007886static void io_rsrc_node_destroy(struct io_rsrc_node *ref_node)
7887{
7888 percpu_ref_exit(&ref_node->refs);
7889 kfree(ref_node);
7890}
7891
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007892static void io_rsrc_node_ref_zero(struct percpu_ref *ref)
7893{
7894 struct io_rsrc_node *node = container_of(ref, struct io_rsrc_node, refs);
7895 struct io_ring_ctx *ctx = node->rsrc_data->ctx;
7896 unsigned long flags;
7897 bool first_add = false;
Dylan Yudaken82cc3382022-01-21 04:38:56 -08007898 unsigned long delay = HZ;
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007899
7900 spin_lock_irqsave(&ctx->rsrc_ref_lock, flags);
7901 node->done = true;
7902
Dylan Yudaken82cc3382022-01-21 04:38:56 -08007903 /* if we are mid-quiesce then do not delay */
7904 if (node->rsrc_data->quiesce)
7905 delay = 0;
7906
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007907 while (!list_empty(&ctx->rsrc_ref_list)) {
7908 node = list_first_entry(&ctx->rsrc_ref_list,
7909 struct io_rsrc_node, node);
7910 /* recycle ref nodes in order */
7911 if (!node->done)
7912 break;
7913 list_del(&node->node);
7914 first_add |= llist_add(&node->llist, &ctx->rsrc_put_llist);
7915 }
7916 spin_unlock_irqrestore(&ctx->rsrc_ref_lock, flags);
7917
7918 if (first_add)
Dylan Yudaken82cc3382022-01-21 04:38:56 -08007919 mod_delayed_work(system_wq, &ctx->rsrc_put_work, delay);
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007920}
7921
7922static struct io_rsrc_node *io_rsrc_node_alloc(struct io_ring_ctx *ctx)
7923{
7924 struct io_rsrc_node *ref_node;
7925
7926 ref_node = kzalloc(sizeof(*ref_node), GFP_KERNEL);
7927 if (!ref_node)
7928 return NULL;
7929
7930 if (percpu_ref_init(&ref_node->refs, io_rsrc_node_ref_zero,
7931 0, GFP_KERNEL)) {
7932 kfree(ref_node);
7933 return NULL;
7934 }
7935 INIT_LIST_HEAD(&ref_node->node);
7936 INIT_LIST_HEAD(&ref_node->rsrc_list);
7937 ref_node->done = false;
7938 return ref_node;
7939}
7940
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007941static void io_rsrc_node_switch(struct io_ring_ctx *ctx,
7942 struct io_rsrc_data *data_to_kill)
Pavel Begunkov1642b442020-12-30 21:34:14 +00007943{
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007944 WARN_ON_ONCE(!ctx->rsrc_backup_node);
7945 WARN_ON_ONCE(data_to_kill && !ctx->rsrc_node);
Pavel Begunkov82fbcfa2021-04-01 15:43:43 +01007946
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007947 if (data_to_kill) {
7948 struct io_rsrc_node *rsrc_node = ctx->rsrc_node;
Pavel Begunkov82fbcfa2021-04-01 15:43:43 +01007949
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007950 rsrc_node->rsrc_data = data_to_kill;
Jens Axboe4956b9e2021-08-09 07:49:41 -06007951 spin_lock_irq(&ctx->rsrc_ref_lock);
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007952 list_add_tail(&rsrc_node->node, &ctx->rsrc_ref_list);
Jens Axboe4956b9e2021-08-09 07:49:41 -06007953 spin_unlock_irq(&ctx->rsrc_ref_lock);
Pavel Begunkov82fbcfa2021-04-01 15:43:43 +01007954
Pavel Begunkov3e942492021-04-11 01:46:34 +01007955 atomic_inc(&data_to_kill->refs);
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007956 percpu_ref_kill(&rsrc_node->refs);
7957 ctx->rsrc_node = NULL;
7958 }
7959
7960 if (!ctx->rsrc_node) {
7961 ctx->rsrc_node = ctx->rsrc_backup_node;
7962 ctx->rsrc_backup_node = NULL;
7963 }
Pavel Begunkov1642b442020-12-30 21:34:14 +00007964}
7965
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007966static int io_rsrc_node_switch_start(struct io_ring_ctx *ctx)
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00007967{
7968 if (ctx->rsrc_backup_node)
7969 return 0;
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01007970 ctx->rsrc_backup_node = io_rsrc_node_alloc(ctx);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00007971 return ctx->rsrc_backup_node ? 0 : -ENOMEM;
7972}
7973
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +01007974static int io_rsrc_ref_quiesce(struct io_rsrc_data *data, struct io_ring_ctx *ctx)
Hao Xu8bad28d2021-02-19 17:19:36 +08007975{
7976 int ret;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007977
Pavel Begunkov215c3902021-04-01 15:43:48 +01007978 /* As we may drop ->uring_lock, other task may have started quiesce */
Hao Xu8bad28d2021-02-19 17:19:36 +08007979 if (data->quiesce)
7980 return -ENXIO;
7981
7982 data->quiesce = true;
Pavel Begunkov1ffc5422020-12-30 21:34:15 +00007983 do {
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007984 ret = io_rsrc_node_switch_start(ctx);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00007985 if (ret)
Pavel Begunkovf2303b12021-02-20 18:03:49 +00007986 break;
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01007987 io_rsrc_node_switch(ctx, data);
7988
Pavel Begunkov3e942492021-04-11 01:46:34 +01007989 /* kill initial ref, already quiesced if zero */
7990 if (atomic_dec_and_test(&data->refs))
7991 break;
Jens Axboec018db42021-08-09 08:15:50 -06007992 mutex_unlock(&ctx->uring_lock);
Hao Xu8bad28d2021-02-19 17:19:36 +08007993 flush_delayed_work(&ctx->rsrc_put_work);
Pavel Begunkov1ffc5422020-12-30 21:34:15 +00007994 ret = wait_for_completion_interruptible(&data->done);
Jens Axboec018db42021-08-09 08:15:50 -06007995 if (!ret) {
7996 mutex_lock(&ctx->uring_lock);
Dylan Yudaken0d773aa2022-02-22 08:17:51 -08007997 if (atomic_read(&data->refs) > 0) {
7998 /*
7999 * it has been revived by another thread while
8000 * we were unlocked
8001 */
8002 mutex_unlock(&ctx->uring_lock);
8003 } else {
8004 break;
8005 }
Jens Axboec018db42021-08-09 08:15:50 -06008006 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008007
Pavel Begunkov3e942492021-04-11 01:46:34 +01008008 atomic_inc(&data->refs);
8009 /* wait for all works potentially completing data->done */
8010 flush_delayed_work(&ctx->rsrc_put_work);
Jens Axboecb5e1b82021-02-25 07:37:35 -07008011 reinit_completion(&data->done);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00008012
Hao Xu8bad28d2021-02-19 17:19:36 +08008013 ret = io_run_task_work_sig();
8014 mutex_lock(&ctx->uring_lock);
Pavel Begunkovf2303b12021-02-20 18:03:49 +00008015 } while (ret >= 0);
Hao Xu8bad28d2021-02-19 17:19:36 +08008016 data->quiesce = false;
8017
Hao Xu8bad28d2021-02-19 17:19:36 +08008018 return ret;
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008019}
8020
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008021static u64 *io_get_tag_slot(struct io_rsrc_data *data, unsigned int idx)
8022{
8023 unsigned int off = idx & IO_RSRC_TAG_TABLE_MASK;
8024 unsigned int table_idx = idx >> IO_RSRC_TAG_TABLE_SHIFT;
8025
8026 return &data->tags[table_idx][off];
8027}
8028
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008029static void io_rsrc_data_free(struct io_rsrc_data *data)
8030{
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008031 size_t size = data->nr * sizeof(data->tags[0][0]);
8032
8033 if (data->tags)
8034 io_free_page_table((void **)data->tags, size);
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008035 kfree(data);
8036}
8037
Pavel Begunkovd878c812021-06-14 02:36:18 +01008038static int io_rsrc_data_alloc(struct io_ring_ctx *ctx, rsrc_put_fn *do_put,
8039 u64 __user *utags, unsigned nr,
8040 struct io_rsrc_data **pdata)
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008041{
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008042 struct io_rsrc_data *data;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008043 int ret = -ENOMEM;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008044 unsigned i;
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008045
8046 data = kzalloc(sizeof(*data), GFP_KERNEL);
8047 if (!data)
Pavel Begunkovd878c812021-06-14 02:36:18 +01008048 return -ENOMEM;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008049 data->tags = (u64 **)io_alloc_page_table(nr * sizeof(data->tags[0][0]));
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008050 if (!data->tags) {
8051 kfree(data);
Pavel Begunkovd878c812021-06-14 02:36:18 +01008052 return -ENOMEM;
8053 }
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008054
8055 data->nr = nr;
8056 data->ctx = ctx;
8057 data->do_put = do_put;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008058 if (utags) {
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008059 ret = -EFAULT;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008060 for (i = 0; i < nr; i++) {
Colin Ian Kingfdd1dc32021-06-15 14:00:11 +01008061 u64 *tag_slot = io_get_tag_slot(data, i);
8062
8063 if (copy_from_user(tag_slot, &utags[i],
8064 sizeof(*tag_slot)))
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008065 goto fail;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008066 }
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008067 }
8068
Pavel Begunkov3e942492021-04-11 01:46:34 +01008069 atomic_set(&data->refs, 1);
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008070 init_completion(&data->done);
Pavel Begunkovd878c812021-06-14 02:36:18 +01008071 *pdata = data;
8072 return 0;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008073fail:
8074 io_rsrc_data_free(data);
8075 return ret;
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008076}
8077
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008078static bool io_alloc_file_tables(struct io_file_table *table, unsigned nr_files)
8079{
Pavel Begunkov0bea96f2021-08-20 10:36:36 +01008080 table->files = kvcalloc(nr_files, sizeof(table->files[0]),
8081 GFP_KERNEL_ACCOUNT);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008082 return !!table->files;
8083}
8084
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008085static void io_free_file_tables(struct io_file_table *table)
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008086{
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008087 kvfree(table->files);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008088 table->files = NULL;
8089}
8090
Jens Axboe2b188cc2019-01-07 10:46:33 -07008091static void __io_sqe_files_unregister(struct io_ring_ctx *ctx)
8092{
8093#if defined(CONFIG_UNIX)
8094 if (ctx->ring_sock) {
8095 struct sock *sock = ctx->ring_sock->sk;
8096 struct sk_buff *skb;
8097
8098 while ((skb = skb_dequeue(&sock->sk_receive_queue)) != NULL)
8099 kfree_skb(skb);
8100 }
8101#else
8102 int i;
8103
8104 for (i = 0; i < ctx->nr_user_files; i++) {
8105 struct file *file;
8106
8107 file = io_file_from_index(ctx, i);
8108 if (file)
8109 fput(file);
8110 }
8111#endif
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008112 io_free_file_tables(&ctx->file_table);
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008113 io_rsrc_data_free(ctx->file_data);
Pavel Begunkovfff4db72021-04-25 14:32:15 +01008114 ctx->file_data = NULL;
8115 ctx->nr_user_files = 0;
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008116}
8117
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008118static int io_sqe_files_unregister(struct io_ring_ctx *ctx)
8119{
Pavel Begunkovb1e7cad2022-06-13 06:32:44 +01008120 unsigned nr = ctx->nr_user_files;
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008121 int ret;
8122
Pavel Begunkov08480402021-04-13 02:58:38 +01008123 if (!ctx->file_data)
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008124 return -ENXIO;
Pavel Begunkovb1e7cad2022-06-13 06:32:44 +01008125
8126 /*
8127 * Quiesce may unlock ->uring_lock, and while it's not held
8128 * prevent new requests using the table.
8129 */
8130 ctx->nr_user_files = 0;
Pavel Begunkov08480402021-04-13 02:58:38 +01008131 ret = io_rsrc_ref_quiesce(ctx->file_data, ctx);
Pavel Begunkovb1e7cad2022-06-13 06:32:44 +01008132 ctx->nr_user_files = nr;
Pavel Begunkov08480402021-04-13 02:58:38 +01008133 if (!ret)
8134 __io_sqe_files_unregister(ctx);
8135 return ret;
Jens Axboe6b063142019-01-10 22:13:58 -07008136}
8137
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008138static void io_sq_thread_unpark(struct io_sq_data *sqd)
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008139 __releases(&sqd->lock)
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008140{
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008141 WARN_ON_ONCE(sqd->thread == current);
8142
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008143 /*
8144 * Do the dance but not conditional clear_bit() because it'd race with
8145 * other threads incrementing park_pending and setting the bit.
8146 */
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008147 clear_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state);
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008148 if (atomic_dec_return(&sqd->park_pending))
8149 set_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008150 mutex_unlock(&sqd->lock);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008151}
8152
Jens Axboe86e0d672021-03-05 08:44:39 -07008153static void io_sq_thread_park(struct io_sq_data *sqd)
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008154 __acquires(&sqd->lock)
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008155{
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008156 WARN_ON_ONCE(sqd->thread == current);
8157
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008158 atomic_inc(&sqd->park_pending);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008159 set_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008160 mutex_lock(&sqd->lock);
Jens Axboe05962f92021-03-06 13:58:48 -07008161 if (sqd->thread)
Jens Axboe86e0d672021-03-05 08:44:39 -07008162 wake_up_process(sqd->thread);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008163}
8164
8165static void io_sq_thread_stop(struct io_sq_data *sqd)
8166{
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008167 WARN_ON_ONCE(sqd->thread == current);
Pavel Begunkov88885f62021-04-11 01:46:38 +01008168 WARN_ON_ONCE(test_bit(IO_SQ_THREAD_SHOULD_STOP, &sqd->state));
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008169
Jens Axboe05962f92021-03-06 13:58:48 -07008170 set_bit(IO_SQ_THREAD_SHOULD_STOP, &sqd->state);
Pavel Begunkov88885f62021-04-11 01:46:38 +01008171 mutex_lock(&sqd->lock);
Jens Axboee8f98f242021-03-09 16:32:13 -07008172 if (sqd->thread)
8173 wake_up_process(sqd->thread);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008174 mutex_unlock(&sqd->lock);
Jens Axboe05962f92021-03-06 13:58:48 -07008175 wait_for_completion(&sqd->exited);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008176}
8177
Jens Axboe534ca6d2020-09-02 13:52:19 -06008178static void io_put_sq_data(struct io_sq_data *sqd)
Jens Axboe6c271ce2019-01-10 11:22:30 -07008179{
Jens Axboe534ca6d2020-09-02 13:52:19 -06008180 if (refcount_dec_and_test(&sqd->refs)) {
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008181 WARN_ON_ONCE(atomic_read(&sqd->park_pending));
8182
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008183 io_sq_thread_stop(sqd);
8184 kfree(sqd);
8185 }
8186}
8187
8188static void io_sq_thread_finish(struct io_ring_ctx *ctx)
8189{
8190 struct io_sq_data *sqd = ctx->sq_data;
8191
8192 if (sqd) {
Jens Axboe05962f92021-03-06 13:58:48 -07008193 io_sq_thread_park(sqd);
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008194 list_del_init(&ctx->sqd_list);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008195 io_sqd_update_thread_idle(sqd);
Jens Axboe05962f92021-03-06 13:58:48 -07008196 io_sq_thread_unpark(sqd);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008197
8198 io_put_sq_data(sqd);
8199 ctx->sq_data = NULL;
Jens Axboe534ca6d2020-09-02 13:52:19 -06008200 }
8201}
8202
Jens Axboeaa061652020-09-02 14:50:27 -06008203static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
8204{
8205 struct io_ring_ctx *ctx_attach;
8206 struct io_sq_data *sqd;
8207 struct fd f;
8208
8209 f = fdget(p->wq_fd);
8210 if (!f.file)
8211 return ERR_PTR(-ENXIO);
8212 if (f.file->f_op != &io_uring_fops) {
8213 fdput(f);
8214 return ERR_PTR(-EINVAL);
8215 }
8216
8217 ctx_attach = f.file->private_data;
8218 sqd = ctx_attach->sq_data;
8219 if (!sqd) {
8220 fdput(f);
8221 return ERR_PTR(-EINVAL);
8222 }
Jens Axboe5c2469e2021-03-11 10:17:56 -07008223 if (sqd->task_tgid != current->tgid) {
8224 fdput(f);
8225 return ERR_PTR(-EPERM);
8226 }
Jens Axboeaa061652020-09-02 14:50:27 -06008227
8228 refcount_inc(&sqd->refs);
8229 fdput(f);
8230 return sqd;
8231}
8232
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008233static struct io_sq_data *io_get_sq_data(struct io_uring_params *p,
8234 bool *attached)
Jens Axboe534ca6d2020-09-02 13:52:19 -06008235{
8236 struct io_sq_data *sqd;
8237
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008238 *attached = false;
Jens Axboe5c2469e2021-03-11 10:17:56 -07008239 if (p->flags & IORING_SETUP_ATTACH_WQ) {
8240 sqd = io_attach_sq_data(p);
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008241 if (!IS_ERR(sqd)) {
8242 *attached = true;
Jens Axboe5c2469e2021-03-11 10:17:56 -07008243 return sqd;
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008244 }
Jens Axboe5c2469e2021-03-11 10:17:56 -07008245 /* fall through for EPERM case, setup new sqd/task */
8246 if (PTR_ERR(sqd) != -EPERM)
8247 return sqd;
8248 }
Jens Axboeaa061652020-09-02 14:50:27 -06008249
Jens Axboe534ca6d2020-09-02 13:52:19 -06008250 sqd = kzalloc(sizeof(*sqd), GFP_KERNEL);
8251 if (!sqd)
8252 return ERR_PTR(-ENOMEM);
8253
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008254 atomic_set(&sqd->park_pending, 0);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008255 refcount_set(&sqd->refs, 1);
Jens Axboe69fb2132020-09-14 11:16:23 -06008256 INIT_LIST_HEAD(&sqd->ctx_list);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008257 mutex_init(&sqd->lock);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008258 init_waitqueue_head(&sqd->wait);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008259 init_completion(&sqd->exited);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008260 return sqd;
8261}
8262
Jens Axboe6b063142019-01-10 22:13:58 -07008263#if defined(CONFIG_UNIX)
Jens Axboe6b063142019-01-10 22:13:58 -07008264/*
8265 * Ensure the UNIX gc is aware of our file set, so we are certain that
8266 * the io_uring can be safely unregistered on process exit, even if we have
8267 * loops in the file referencing.
8268 */
8269static int __io_sqe_files_scm(struct io_ring_ctx *ctx, int nr, int offset)
8270{
8271 struct sock *sk = ctx->ring_sock->sk;
8272 struct scm_fp_list *fpl;
8273 struct sk_buff *skb;
Jens Axboe08a45172019-10-03 08:11:03 -06008274 int i, nr_files;
Jens Axboe6b063142019-01-10 22:13:58 -07008275
Jens Axboe6b063142019-01-10 22:13:58 -07008276 fpl = kzalloc(sizeof(*fpl), GFP_KERNEL);
8277 if (!fpl)
8278 return -ENOMEM;
8279
8280 skb = alloc_skb(0, GFP_KERNEL);
8281 if (!skb) {
8282 kfree(fpl);
8283 return -ENOMEM;
8284 }
8285
8286 skb->sk = sk;
Pavel Begunkov813d8fe2022-10-16 22:42:54 +01008287 skb->scm_io_uring = 1;
Jens Axboe6b063142019-01-10 22:13:58 -07008288
Jens Axboe08a45172019-10-03 08:11:03 -06008289 nr_files = 0;
Jens Axboe62e398b2021-02-21 16:19:37 -07008290 fpl->user = get_uid(current_user());
Jens Axboe6b063142019-01-10 22:13:58 -07008291 for (i = 0; i < nr; i++) {
Jens Axboe65e19f52019-10-26 07:20:21 -06008292 struct file *file = io_file_from_index(ctx, i + offset);
8293
8294 if (!file)
Jens Axboe08a45172019-10-03 08:11:03 -06008295 continue;
Jens Axboe65e19f52019-10-26 07:20:21 -06008296 fpl->fp[nr_files] = get_file(file);
Jens Axboe08a45172019-10-03 08:11:03 -06008297 unix_inflight(fpl->user, fpl->fp[nr_files]);
8298 nr_files++;
Jens Axboe6b063142019-01-10 22:13:58 -07008299 }
8300
Jens Axboe08a45172019-10-03 08:11:03 -06008301 if (nr_files) {
8302 fpl->max = SCM_MAX_FD;
8303 fpl->count = nr_files;
8304 UNIXCB(skb).fp = fpl;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008305 skb->destructor = unix_destruct_scm;
Jens Axboe08a45172019-10-03 08:11:03 -06008306 refcount_add(skb->truesize, &sk->sk_wmem_alloc);
8307 skb_queue_head(&sk->sk_receive_queue, skb);
Jens Axboe6b063142019-01-10 22:13:58 -07008308
Pavel Begunkov285f5d72022-04-06 12:43:58 +01008309 for (i = 0; i < nr; i++) {
8310 struct file *file = io_file_from_index(ctx, i + offset);
8311
8312 if (file)
8313 fput(file);
8314 }
Jens Axboe08a45172019-10-03 08:11:03 -06008315 } else {
8316 kfree_skb(skb);
Pavel Begunkov0853bd62022-03-25 16:36:31 +00008317 free_uid(fpl->user);
Jens Axboe08a45172019-10-03 08:11:03 -06008318 kfree(fpl);
8319 }
Jens Axboe6b063142019-01-10 22:13:58 -07008320
8321 return 0;
8322}
8323
8324/*
8325 * If UNIX sockets are enabled, fd passing can cause a reference cycle which
8326 * causes regular reference counting to break down. We rely on the UNIX
8327 * garbage collection to take care of this problem for us.
8328 */
8329static int io_sqe_files_scm(struct io_ring_ctx *ctx)
8330{
8331 unsigned left, total;
8332 int ret = 0;
8333
8334 total = 0;
8335 left = ctx->nr_user_files;
8336 while (left) {
8337 unsigned this_files = min_t(unsigned, left, SCM_MAX_FD);
Jens Axboe6b063142019-01-10 22:13:58 -07008338
8339 ret = __io_sqe_files_scm(ctx, this_files, total);
8340 if (ret)
8341 break;
8342 left -= this_files;
8343 total += this_files;
8344 }
8345
8346 if (!ret)
8347 return 0;
8348
8349 while (total < ctx->nr_user_files) {
Jens Axboe65e19f52019-10-26 07:20:21 -06008350 struct file *file = io_file_from_index(ctx, total);
8351
8352 if (file)
8353 fput(file);
Jens Axboe6b063142019-01-10 22:13:58 -07008354 total++;
8355 }
8356
8357 return ret;
8358}
8359#else
8360static int io_sqe_files_scm(struct io_ring_ctx *ctx)
8361{
8362 return 0;
8363}
8364#endif
8365
Pavel Begunkov47e90392021-04-01 15:43:56 +01008366static void io_rsrc_file_put(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc)
Jens Axboec3a31e62019-10-03 13:59:56 -06008367{
Bijan Mottahedeh50238532021-01-15 17:37:45 +00008368 struct file *file = prsrc->file;
Jens Axboec3a31e62019-10-03 13:59:56 -06008369#if defined(CONFIG_UNIX)
Jens Axboec3a31e62019-10-03 13:59:56 -06008370 struct sock *sock = ctx->ring_sock->sk;
8371 struct sk_buff_head list, *head = &sock->sk_receive_queue;
8372 struct sk_buff *skb;
8373 int i;
8374
8375 __skb_queue_head_init(&list);
8376
8377 /*
8378 * Find the skb that holds this file in its SCM_RIGHTS. When found,
8379 * remove this entry and rearrange the file array.
8380 */
8381 skb = skb_dequeue(head);
8382 while (skb) {
8383 struct scm_fp_list *fp;
8384
8385 fp = UNIXCB(skb).fp;
8386 for (i = 0; i < fp->count; i++) {
8387 int left;
8388
8389 if (fp->fp[i] != file)
8390 continue;
8391
8392 unix_notinflight(fp->user, fp->fp[i]);
8393 left = fp->count - 1 - i;
8394 if (left) {
8395 memmove(&fp->fp[i], &fp->fp[i + 1],
8396 left * sizeof(struct file *));
8397 }
8398 fp->count--;
8399 if (!fp->count) {
8400 kfree_skb(skb);
8401 skb = NULL;
8402 } else {
8403 __skb_queue_tail(&list, skb);
8404 }
8405 fput(file);
8406 file = NULL;
8407 break;
8408 }
8409
8410 if (!file)
8411 break;
8412
8413 __skb_queue_tail(&list, skb);
8414
8415 skb = skb_dequeue(head);
8416 }
8417
8418 if (skb_peek(&list)) {
8419 spin_lock_irq(&head->lock);
8420 while ((skb = __skb_dequeue(&list)) != NULL)
8421 __skb_queue_tail(head, skb);
8422 spin_unlock_irq(&head->lock);
8423 }
8424#else
Jens Axboe05f3fb32019-12-09 11:22:50 -07008425 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06008426#endif
8427}
8428
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008429static void __io_rsrc_put_work(struct io_rsrc_node *ref_node)
Jens Axboe05f3fb32019-12-09 11:22:50 -07008430{
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008431 struct io_rsrc_data *rsrc_data = ref_node->rsrc_data;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008432 struct io_ring_ctx *ctx = rsrc_data->ctx;
8433 struct io_rsrc_put *prsrc, *tmp;
Xiaoguang Wang05589552020-03-31 14:05:18 +08008434
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008435 list_for_each_entry_safe(prsrc, tmp, &ref_node->rsrc_list, list) {
8436 list_del(&prsrc->list);
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008437
8438 if (prsrc->tag) {
8439 bool lock_ring = ctx->flags & IORING_SETUP_IOPOLL;
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008440
8441 io_ring_submit_lock(ctx, lock_ring);
Jens Axboe79ebeae2021-08-10 15:18:27 -06008442 spin_lock(&ctx->completion_lock);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01008443 io_fill_cqe_aux(ctx, prsrc->tag, 0, 0);
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008444 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06008445 spin_unlock(&ctx->completion_lock);
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008446 io_cqring_ev_posted(ctx);
8447 io_ring_submit_unlock(ctx, lock_ring);
8448 }
8449
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +01008450 rsrc_data->do_put(ctx, prsrc);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008451 kfree(prsrc);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008452 }
8453
Pavel Begunkov28a9fe22021-04-01 15:43:47 +01008454 io_rsrc_node_destroy(ref_node);
Pavel Begunkov3e942492021-04-11 01:46:34 +01008455 if (atomic_dec_and_test(&rsrc_data->refs))
8456 complete(&rsrc_data->done);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008457}
8458
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008459static void io_rsrc_put_work(struct work_struct *work)
Jens Axboe4a38aed22020-05-14 17:21:15 -06008460{
8461 struct io_ring_ctx *ctx;
8462 struct llist_node *node;
8463
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008464 ctx = container_of(work, struct io_ring_ctx, rsrc_put_work.work);
8465 node = llist_del_all(&ctx->rsrc_put_llist);
Jens Axboe4a38aed22020-05-14 17:21:15 -06008466
8467 while (node) {
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008468 struct io_rsrc_node *ref_node;
Jens Axboe4a38aed22020-05-14 17:21:15 -06008469 struct llist_node *next = node->next;
8470
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008471 ref_node = llist_entry(node, struct io_rsrc_node, llist);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008472 __io_rsrc_put_work(ref_node);
Jens Axboe4a38aed22020-05-14 17:21:15 -06008473 node = next;
8474 }
8475}
8476
Jens Axboe05f3fb32019-12-09 11:22:50 -07008477static int io_sqe_files_register(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov792e3582021-04-25 14:32:21 +01008478 unsigned nr_args, u64 __user *tags)
Jens Axboe05f3fb32019-12-09 11:22:50 -07008479{
8480 __s32 __user *fds = (__s32 __user *) arg;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008481 struct file *file;
Pavel Begunkovf3baed32021-04-01 15:43:42 +01008482 int fd, ret;
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01008483 unsigned i;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008484
8485 if (ctx->file_data)
8486 return -EBUSY;
8487 if (!nr_args)
8488 return -EINVAL;
8489 if (nr_args > IORING_MAX_FIXED_FILES)
8490 return -EMFILE;
Pavel Begunkov3a1b8a42021-08-20 10:36:35 +01008491 if (nr_args > rlimit(RLIMIT_NOFILE))
8492 return -EMFILE;
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008493 ret = io_rsrc_node_switch_start(ctx);
Pavel Begunkovf3baed32021-04-01 15:43:42 +01008494 if (ret)
8495 return ret;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008496 ret = io_rsrc_data_alloc(ctx, io_rsrc_file_put, tags, nr_args,
8497 &ctx->file_data);
8498 if (ret)
8499 return ret;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008500
Pavel Begunkovf3baed32021-04-01 15:43:42 +01008501 ret = -ENOMEM;
Pavel Begunkovaeca2412021-04-11 01:46:37 +01008502 if (!io_alloc_file_tables(&ctx->file_table, nr_args))
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008503 goto out_free;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008504
Jens Axboe05f3fb32019-12-09 11:22:50 -07008505 for (i = 0; i < nr_args; i++, ctx->nr_user_files++) {
Pavel Begunkovd878c812021-06-14 02:36:18 +01008506 if (copy_from_user(&fd, &fds[i], sizeof(fd))) {
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008507 ret = -EFAULT;
8508 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008509 }
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008510 /* allow sparse sets */
Pavel Begunkov792e3582021-04-25 14:32:21 +01008511 if (fd == -1) {
8512 ret = -EINVAL;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008513 if (unlikely(*io_get_tag_slot(ctx->file_data, i)))
Pavel Begunkov792e3582021-04-25 14:32:21 +01008514 goto out_fput;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008515 continue;
Pavel Begunkov792e3582021-04-25 14:32:21 +01008516 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008517
Jens Axboe05f3fb32019-12-09 11:22:50 -07008518 file = fget(fd);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008519 ret = -EBADF;
Pavel Begunkov792e3582021-04-25 14:32:21 +01008520 if (unlikely(!file))
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008521 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008522
8523 /*
8524 * Don't allow io_uring instances to be registered. If UNIX
8525 * isn't enabled, then this causes a reference cycle and this
8526 * instance can never get freed. If UNIX is enabled we'll
8527 * handle it just fine, but there's still no point in allowing
8528 * a ring fd as it doesn't support regular read/write anyway.
8529 */
8530 if (file->f_op == &io_uring_fops) {
8531 fput(file);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008532 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008533 }
Pavel Begunkovaeca2412021-04-11 01:46:37 +01008534 io_fixed_file_set(io_fixed_file_slot(&ctx->file_table, i), file);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008535 }
8536
Jens Axboe05f3fb32019-12-09 11:22:50 -07008537 ret = io_sqe_files_scm(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08008538 if (ret) {
Pavel Begunkov08480402021-04-13 02:58:38 +01008539 __io_sqe_files_unregister(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08008540 return ret;
8541 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008542
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008543 io_rsrc_node_switch(ctx, NULL);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008544 return ret;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008545out_fput:
8546 for (i = 0; i < ctx->nr_user_files; i++) {
8547 file = io_file_from_index(ctx, i);
8548 if (file)
8549 fput(file);
8550 }
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008551 io_free_file_tables(&ctx->file_table);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008552 ctx->nr_user_files = 0;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008553out_free:
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008554 io_rsrc_data_free(ctx->file_data);
Jens Axboe55cbc252020-10-14 07:35:57 -06008555 ctx->file_data = NULL;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008556 return ret;
8557}
8558
Jens Axboec3a31e62019-10-03 13:59:56 -06008559static int io_sqe_file_register(struct io_ring_ctx *ctx, struct file *file,
8560 int index)
8561{
8562#if defined(CONFIG_UNIX)
8563 struct sock *sock = ctx->ring_sock->sk;
8564 struct sk_buff_head *head = &sock->sk_receive_queue;
8565 struct sk_buff *skb;
8566
8567 /*
8568 * See if we can merge this file into an existing skb SCM_RIGHTS
8569 * file set. If there's no room, fall back to allocating a new skb
8570 * and filling it in.
8571 */
8572 spin_lock_irq(&head->lock);
8573 skb = skb_peek(head);
8574 if (skb) {
8575 struct scm_fp_list *fpl = UNIXCB(skb).fp;
8576
8577 if (fpl->count < SCM_MAX_FD) {
8578 __skb_unlink(skb, head);
8579 spin_unlock_irq(&head->lock);
8580 fpl->fp[fpl->count] = get_file(file);
8581 unix_inflight(fpl->user, fpl->fp[fpl->count]);
8582 fpl->count++;
8583 spin_lock_irq(&head->lock);
8584 __skb_queue_head(head, skb);
8585 } else {
8586 skb = NULL;
8587 }
8588 }
8589 spin_unlock_irq(&head->lock);
8590
8591 if (skb) {
8592 fput(file);
8593 return 0;
8594 }
8595
8596 return __io_sqe_files_scm(ctx, 1, index);
8597#else
8598 return 0;
8599#endif
8600}
8601
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008602static int io_queue_rsrc_removal(struct io_rsrc_data *data, unsigned idx,
8603 struct io_rsrc_node *node, void *rsrc)
8604{
Pavel Begunkov5218d5c2022-04-07 14:05:04 +01008605 u64 *tag_slot = io_get_tag_slot(data, idx);
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008606 struct io_rsrc_put *prsrc;
8607
8608 prsrc = kzalloc(sizeof(*prsrc), GFP_KERNEL);
8609 if (!prsrc)
8610 return -ENOMEM;
8611
Pavel Begunkov5218d5c2022-04-07 14:05:04 +01008612 prsrc->tag = *tag_slot;
8613 *tag_slot = 0;
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008614 prsrc->rsrc = rsrc;
8615 list_add(&prsrc->list, &node->rsrc_list);
8616 return 0;
8617}
8618
Pavel Begunkovb9445592021-08-25 12:25:45 +01008619static int io_install_fixed_file(struct io_kiocb *req, struct file *file,
8620 unsigned int issue_flags, u32 slot_index)
8621{
8622 struct io_ring_ctx *ctx = req->ctx;
8623 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008624 bool needs_switch = false;
Pavel Begunkovb9445592021-08-25 12:25:45 +01008625 struct io_fixed_file *file_slot;
8626 int ret = -EBADF;
8627
8628 io_ring_submit_lock(ctx, !force_nonblock);
8629 if (file->f_op == &io_uring_fops)
8630 goto err;
8631 ret = -ENXIO;
8632 if (!ctx->file_data)
8633 goto err;
8634 ret = -EINVAL;
8635 if (slot_index >= ctx->nr_user_files)
8636 goto err;
8637
8638 slot_index = array_index_nospec(slot_index, ctx->nr_user_files);
8639 file_slot = io_fixed_file_slot(&ctx->file_table, slot_index);
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008640
8641 if (file_slot->file_ptr) {
8642 struct file *old_file;
8643
8644 ret = io_rsrc_node_switch_start(ctx);
8645 if (ret)
8646 goto err;
8647
8648 old_file = (struct file *)(file_slot->file_ptr & FFS_MASK);
8649 ret = io_queue_rsrc_removal(ctx->file_data, slot_index,
8650 ctx->rsrc_node, old_file);
8651 if (ret)
8652 goto err;
8653 file_slot->file_ptr = 0;
8654 needs_switch = true;
8655 }
Pavel Begunkovb9445592021-08-25 12:25:45 +01008656
8657 *io_get_tag_slot(ctx->file_data, slot_index) = 0;
8658 io_fixed_file_set(file_slot, file);
8659 ret = io_sqe_file_register(ctx, file, slot_index);
8660 if (ret) {
8661 file_slot->file_ptr = 0;
8662 goto err;
8663 }
8664
8665 ret = 0;
8666err:
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008667 if (needs_switch)
8668 io_rsrc_node_switch(ctx, ctx->file_data);
Pavel Begunkovb9445592021-08-25 12:25:45 +01008669 io_ring_submit_unlock(ctx, !force_nonblock);
8670 if (ret)
8671 fput(file);
8672 return ret;
8673}
8674
Pavel Begunkov7df778b2021-09-24 20:04:29 +01008675static int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags)
8676{
8677 unsigned int offset = req->close.file_slot - 1;
8678 struct io_ring_ctx *ctx = req->ctx;
8679 struct io_fixed_file *file_slot;
8680 struct file *file;
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01008681 int ret;
Pavel Begunkov7df778b2021-09-24 20:04:29 +01008682
8683 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
8684 ret = -ENXIO;
8685 if (unlikely(!ctx->file_data))
8686 goto out;
8687 ret = -EINVAL;
8688 if (offset >= ctx->nr_user_files)
8689 goto out;
8690 ret = io_rsrc_node_switch_start(ctx);
8691 if (ret)
8692 goto out;
8693
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01008694 offset = array_index_nospec(offset, ctx->nr_user_files);
8695 file_slot = io_fixed_file_slot(&ctx->file_table, offset);
Pavel Begunkov7df778b2021-09-24 20:04:29 +01008696 ret = -EBADF;
8697 if (!file_slot->file_ptr)
8698 goto out;
8699
8700 file = (struct file *)(file_slot->file_ptr & FFS_MASK);
8701 ret = io_queue_rsrc_removal(ctx->file_data, offset, ctx->rsrc_node, file);
8702 if (ret)
8703 goto out;
8704
8705 file_slot->file_ptr = 0;
8706 io_rsrc_node_switch(ctx, ctx->file_data);
8707 ret = 0;
8708out:
8709 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
8710 return ret;
8711}
8712
Jens Axboe05f3fb32019-12-09 11:22:50 -07008713static int __io_sqe_files_update(struct io_ring_ctx *ctx,
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008714 struct io_uring_rsrc_update2 *up,
Jens Axboe05f3fb32019-12-09 11:22:50 -07008715 unsigned nr_args)
8716{
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008717 u64 __user *tags = u64_to_user_ptr(up->tags);
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01008718 __s32 __user *fds = u64_to_user_ptr(up->data);
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008719 struct io_rsrc_data *data = ctx->file_data;
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008720 struct io_fixed_file *file_slot;
8721 struct file *file;
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01008722 int fd, i, err = 0;
8723 unsigned int done;
Xiaoguang Wang05589552020-03-31 14:05:18 +08008724 bool needs_switch = false;
Jens Axboec3a31e62019-10-03 13:59:56 -06008725
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01008726 if (!ctx->file_data)
8727 return -ENXIO;
8728 if (up->offset + nr_args > ctx->nr_user_files)
Jens Axboec3a31e62019-10-03 13:59:56 -06008729 return -EINVAL;
8730
Pavel Begunkov67973b92021-01-26 13:51:09 +00008731 for (done = 0; done < nr_args; done++) {
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008732 u64 tag = 0;
8733
8734 if ((tags && copy_from_user(&tag, &tags[done], sizeof(tag))) ||
8735 copy_from_user(&fd, &fds[done], sizeof(fd))) {
Jens Axboec3a31e62019-10-03 13:59:56 -06008736 err = -EFAULT;
8737 break;
8738 }
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008739 if ((fd == IORING_REGISTER_FILES_SKIP || fd == -1) && tag) {
8740 err = -EINVAL;
8741 break;
8742 }
noah4e0377a2021-01-26 15:23:28 -05008743 if (fd == IORING_REGISTER_FILES_SKIP)
8744 continue;
8745
Pavel Begunkov67973b92021-01-26 13:51:09 +00008746 i = array_index_nospec(up->offset + done, ctx->nr_user_files);
Pavel Begunkovaeca2412021-04-11 01:46:37 +01008747 file_slot = io_fixed_file_slot(&ctx->file_table, i);
Pavel Begunkovea64ec022021-02-04 13:52:07 +00008748
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008749 if (file_slot->file_ptr) {
8750 file = (struct file *)(file_slot->file_ptr & FFS_MASK);
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01008751 err = io_queue_rsrc_removal(data, i, ctx->rsrc_node, file);
Hillf Dantona5318d32020-03-23 17:47:15 +08008752 if (err)
8753 break;
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008754 file_slot->file_ptr = 0;
Xiaoguang Wang05589552020-03-31 14:05:18 +08008755 needs_switch = true;
Jens Axboec3a31e62019-10-03 13:59:56 -06008756 }
8757 if (fd != -1) {
Jens Axboec3a31e62019-10-03 13:59:56 -06008758 file = fget(fd);
8759 if (!file) {
8760 err = -EBADF;
8761 break;
8762 }
8763 /*
8764 * Don't allow io_uring instances to be registered. If
8765 * UNIX isn't enabled, then this causes a reference
8766 * cycle and this instance can never get freed. If UNIX
8767 * is enabled we'll handle it just fine, but there's
8768 * still no point in allowing a ring fd as it doesn't
8769 * support regular read/write anyway.
8770 */
8771 if (file->f_op == &io_uring_fops) {
8772 fput(file);
8773 err = -EBADF;
8774 break;
8775 }
Pavel Begunkov50c981b2022-04-06 12:43:57 +01008776 *io_get_tag_slot(data, i) = tag;
Pavel Begunkov9a321c92021-04-01 15:44:01 +01008777 io_fixed_file_set(file_slot, file);
Jens Axboec3a31e62019-10-03 13:59:56 -06008778 err = io_sqe_file_register(ctx, file, i);
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00008779 if (err) {
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008780 file_slot->file_ptr = 0;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00008781 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06008782 break;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00008783 }
Jens Axboec3a31e62019-10-03 13:59:56 -06008784 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008785 }
8786
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008787 if (needs_switch)
8788 io_rsrc_node_switch(ctx, data);
Jens Axboec3a31e62019-10-03 13:59:56 -06008789 return done ? done : err;
8790}
Xiaoguang Wang05589552020-03-31 14:05:18 +08008791
Jens Axboe685fe7f2021-03-08 09:37:51 -07008792static struct io_wq *io_init_wq_offload(struct io_ring_ctx *ctx,
8793 struct task_struct *task)
Pavel Begunkov24369c22020-01-28 03:15:48 +03008794{
Jens Axboee9418942021-02-19 12:33:30 -07008795 struct io_wq_hash *hash;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008796 struct io_wq_data data;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008797 unsigned int concurrency;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008798
Yang Yingliang362a9e62021-07-20 16:38:05 +08008799 mutex_lock(&ctx->uring_lock);
Jens Axboee9418942021-02-19 12:33:30 -07008800 hash = ctx->hash_map;
8801 if (!hash) {
8802 hash = kzalloc(sizeof(*hash), GFP_KERNEL);
Yang Yingliang362a9e62021-07-20 16:38:05 +08008803 if (!hash) {
8804 mutex_unlock(&ctx->uring_lock);
Jens Axboee9418942021-02-19 12:33:30 -07008805 return ERR_PTR(-ENOMEM);
Yang Yingliang362a9e62021-07-20 16:38:05 +08008806 }
Jens Axboee9418942021-02-19 12:33:30 -07008807 refcount_set(&hash->refs, 1);
8808 init_waitqueue_head(&hash->wait);
8809 ctx->hash_map = hash;
8810 }
Yang Yingliang362a9e62021-07-20 16:38:05 +08008811 mutex_unlock(&ctx->uring_lock);
Jens Axboee9418942021-02-19 12:33:30 -07008812
8813 data.hash = hash;
Jens Axboe685fe7f2021-03-08 09:37:51 -07008814 data.task = task;
Pavel Begunkovebc11b62021-08-09 13:04:05 +01008815 data.free_work = io_wq_free_work;
Pavel Begunkovf5fa38c2020-06-08 21:08:20 +03008816 data.do_work = io_wq_submit_work;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008817
Jens Axboed25e3a32021-02-16 11:41:41 -07008818 /* Do QD, or 4 * CPUS, whatever is smallest */
8819 concurrency = min(ctx->sq_entries, 4 * num_online_cpus());
Pavel Begunkov24369c22020-01-28 03:15:48 +03008820
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008821 return io_wq_create(concurrency, &data);
Pavel Begunkov24369c22020-01-28 03:15:48 +03008822}
8823
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008824static int io_uring_alloc_task_context(struct task_struct *task,
8825 struct io_ring_ctx *ctx)
Jens Axboe0f212202020-09-13 13:09:39 -06008826{
8827 struct io_uring_task *tctx;
Jens Axboed8a6df12020-10-15 16:24:45 -06008828 int ret;
Jens Axboe0f212202020-09-13 13:09:39 -06008829
Pavel Begunkov09899b12021-06-14 02:36:22 +01008830 tctx = kzalloc(sizeof(*tctx), GFP_KERNEL);
Jens Axboe0f212202020-09-13 13:09:39 -06008831 if (unlikely(!tctx))
8832 return -ENOMEM;
8833
Jens Axboed8a6df12020-10-15 16:24:45 -06008834 ret = percpu_counter_init(&tctx->inflight, 0, GFP_KERNEL);
8835 if (unlikely(ret)) {
8836 kfree(tctx);
8837 return ret;
8838 }
8839
Jens Axboe685fe7f2021-03-08 09:37:51 -07008840 tctx->io_wq = io_init_wq_offload(ctx, task);
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008841 if (IS_ERR(tctx->io_wq)) {
8842 ret = PTR_ERR(tctx->io_wq);
8843 percpu_counter_destroy(&tctx->inflight);
8844 kfree(tctx);
8845 return ret;
8846 }
8847
Jens Axboe0f212202020-09-13 13:09:39 -06008848 xa_init(&tctx->xa);
8849 init_waitqueue_head(&tctx->wait);
Jens Axboefdaf0832020-10-30 09:37:30 -06008850 atomic_set(&tctx->in_idle, 0);
Pavel Begunkovb303fe22021-04-11 01:46:26 +01008851 atomic_set(&tctx->inflight_tracked, 0);
Jens Axboe0f212202020-09-13 13:09:39 -06008852 task->io_uring = tctx;
Jens Axboe7cbf1722021-02-10 00:03:20 +00008853 spin_lock_init(&tctx->task_lock);
8854 INIT_WQ_LIST(&tctx->task_list);
Jens Axboe7cbf1722021-02-10 00:03:20 +00008855 init_task_work(&tctx->task_work, tctx_task_work);
Jens Axboe0f212202020-09-13 13:09:39 -06008856 return 0;
8857}
8858
8859void __io_uring_free(struct task_struct *tsk)
8860{
8861 struct io_uring_task *tctx = tsk->io_uring;
8862
8863 WARN_ON_ONCE(!xa_empty(&tctx->xa));
Pavel Begunkovef8eaa42021-02-27 11:16:45 +00008864 WARN_ON_ONCE(tctx->io_wq);
Pavel Begunkov09899b12021-06-14 02:36:22 +01008865 WARN_ON_ONCE(tctx->cached_refs);
Pavel Begunkovef8eaa42021-02-27 11:16:45 +00008866
Jens Axboed8a6df12020-10-15 16:24:45 -06008867 percpu_counter_destroy(&tctx->inflight);
Jens Axboe0f212202020-09-13 13:09:39 -06008868 kfree(tctx);
8869 tsk->io_uring = NULL;
8870}
8871
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02008872static int io_sq_offload_create(struct io_ring_ctx *ctx,
8873 struct io_uring_params *p)
Jens Axboe2b188cc2019-01-07 10:46:33 -07008874{
8875 int ret;
8876
Jens Axboed25e3a32021-02-16 11:41:41 -07008877 /* Retain compatibility with failing for an invalid attach attempt */
8878 if ((ctx->flags & (IORING_SETUP_ATTACH_WQ | IORING_SETUP_SQPOLL)) ==
8879 IORING_SETUP_ATTACH_WQ) {
8880 struct fd f;
8881
8882 f = fdget(p->wq_fd);
8883 if (!f.file)
8884 return -ENXIO;
Jens Axboe0cc936f2021-07-22 17:08:07 -06008885 if (f.file->f_op != &io_uring_fops) {
8886 fdput(f);
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01008887 return -EINVAL;
Jens Axboe0cc936f2021-07-22 17:08:07 -06008888 }
8889 fdput(f);
Jens Axboed25e3a32021-02-16 11:41:41 -07008890 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07008891 if (ctx->flags & IORING_SETUP_SQPOLL) {
Jens Axboe46fe18b2021-03-04 12:39:36 -07008892 struct task_struct *tsk;
Jens Axboe534ca6d2020-09-02 13:52:19 -06008893 struct io_sq_data *sqd;
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008894 bool attached;
Jens Axboe534ca6d2020-09-02 13:52:19 -06008895
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008896 sqd = io_get_sq_data(p, &attached);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008897 if (IS_ERR(sqd)) {
8898 ret = PTR_ERR(sqd);
8899 goto err;
8900 }
Jens Axboe69fb2132020-09-14 11:16:23 -06008901
Stefan Metzmacher7c30f36a2021-03-07 11:54:28 +01008902 ctx->sq_creds = get_current_cred();
Jens Axboe534ca6d2020-09-02 13:52:19 -06008903 ctx->sq_data = sqd;
Jens Axboe917257d2019-04-13 09:28:55 -06008904 ctx->sq_thread_idle = msecs_to_jiffies(p->sq_thread_idle);
8905 if (!ctx->sq_thread_idle)
8906 ctx->sq_thread_idle = HZ;
8907
Pavel Begunkov78d7f6b2021-03-10 13:13:53 +00008908 io_sq_thread_park(sqd);
Pavel Begunkovde75a3d2021-03-18 11:54:35 +00008909 list_add(&ctx->sqd_list, &sqd->ctx_list);
8910 io_sqd_update_thread_idle(sqd);
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008911 /* don't attach to a dying SQPOLL thread, would be racy */
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01008912 ret = (attached && !sqd->thread) ? -ENXIO : 0;
Pavel Begunkov78d7f6b2021-03-10 13:13:53 +00008913 io_sq_thread_unpark(sqd);
8914
Pavel Begunkovde75a3d2021-03-18 11:54:35 +00008915 if (ret < 0)
8916 goto err;
8917 if (attached)
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008918 return 0;
Jens Axboeaa061652020-09-02 14:50:27 -06008919
Jens Axboe6c271ce2019-01-10 11:22:30 -07008920 if (p->flags & IORING_SETUP_SQ_AFF) {
Jens Axboe44a9bd12019-05-14 20:00:30 -06008921 int cpu = p->sq_thread_cpu;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008922
Jens Axboe917257d2019-04-13 09:28:55 -06008923 ret = -EINVAL;
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01008924 if (cpu >= nr_cpu_ids || !cpu_online(cpu))
Jens Axboee8f98f242021-03-09 16:32:13 -07008925 goto err_sqpoll;
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008926 sqd->sq_cpu = cpu;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008927 } else {
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008928 sqd->sq_cpu = -1;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008929 }
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008930
8931 sqd->task_pid = current->pid;
Jens Axboe5c2469e2021-03-11 10:17:56 -07008932 sqd->task_tgid = current->tgid;
Jens Axboe46fe18b2021-03-04 12:39:36 -07008933 tsk = create_io_thread(io_sq_thread, sqd, NUMA_NO_NODE);
8934 if (IS_ERR(tsk)) {
8935 ret = PTR_ERR(tsk);
Jens Axboee8f98f242021-03-09 16:32:13 -07008936 goto err_sqpoll;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008937 }
Pavel Begunkov97a73a02021-03-08 17:30:54 +00008938
Jens Axboe46fe18b2021-03-04 12:39:36 -07008939 sqd->thread = tsk;
Pavel Begunkov97a73a02021-03-08 17:30:54 +00008940 ret = io_uring_alloc_task_context(tsk, ctx);
Jens Axboe46fe18b2021-03-04 12:39:36 -07008941 wake_up_new_task(tsk);
Jens Axboe0f212202020-09-13 13:09:39 -06008942 if (ret)
8943 goto err;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008944 } else if (p->flags & IORING_SETUP_SQ_AFF) {
8945 /* Can't have SQ_AFF without SQPOLL */
8946 ret = -EINVAL;
8947 goto err;
8948 }
8949
Jens Axboe2b188cc2019-01-07 10:46:33 -07008950 return 0;
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01008951err_sqpoll:
8952 complete(&ctx->sq_data->exited);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008953err:
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008954 io_sq_thread_finish(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008955 return ret;
8956}
8957
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07008958static inline void __io_unaccount_mem(struct user_struct *user,
8959 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07008960{
8961 atomic_long_sub(nr_pages, &user->locked_vm);
8962}
8963
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07008964static inline int __io_account_mem(struct user_struct *user,
8965 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07008966{
8967 unsigned long page_limit, cur_pages, new_pages;
8968
8969 /* Don't allow more pages than we can safely lock */
8970 page_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
8971
8972 do {
8973 cur_pages = atomic_long_read(&user->locked_vm);
8974 new_pages = cur_pages + nr_pages;
8975 if (new_pages > page_limit)
8976 return -ENOMEM;
8977 } while (atomic_long_cmpxchg(&user->locked_vm, cur_pages,
8978 new_pages) != cur_pages);
8979
8980 return 0;
8981}
8982
Jens Axboe26bfa89e2021-02-09 20:14:12 -07008983static void io_unaccount_mem(struct io_ring_ctx *ctx, unsigned long nr_pages)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07008984{
Jens Axboe62e398b2021-02-21 16:19:37 -07008985 if (ctx->user)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07008986 __io_unaccount_mem(ctx->user, nr_pages);
Bijan Mottahedeh30975822020-06-16 16:36:09 -07008987
Jens Axboe26bfa89e2021-02-09 20:14:12 -07008988 if (ctx->mm_account)
8989 atomic64_sub(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07008990}
8991
Jens Axboe26bfa89e2021-02-09 20:14:12 -07008992static int io_account_mem(struct io_ring_ctx *ctx, unsigned long nr_pages)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07008993{
Bijan Mottahedeh30975822020-06-16 16:36:09 -07008994 int ret;
8995
Jens Axboe62e398b2021-02-21 16:19:37 -07008996 if (ctx->user) {
Bijan Mottahedeh30975822020-06-16 16:36:09 -07008997 ret = __io_account_mem(ctx->user, nr_pages);
8998 if (ret)
8999 return ret;
9000 }
9001
Jens Axboe26bfa89e2021-02-09 20:14:12 -07009002 if (ctx->mm_account)
9003 atomic64_add(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009004
9005 return 0;
9006}
9007
Jens Axboe2b188cc2019-01-07 10:46:33 -07009008static void io_mem_free(void *ptr)
9009{
Mark Rutland52e04ef2019-04-30 17:30:21 +01009010 struct page *page;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009011
Mark Rutland52e04ef2019-04-30 17:30:21 +01009012 if (!ptr)
9013 return;
9014
9015 page = virt_to_head_page(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009016 if (put_page_testzero(page))
9017 free_compound_page(page);
9018}
9019
9020static void *io_mem_alloc(size_t size)
9021{
Shakeel Butt246dfbc2022-01-24 21:17:36 -08009022 gfp_t gfp = GFP_KERNEL_ACCOUNT | __GFP_ZERO | __GFP_NOWARN | __GFP_COMP;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009023
Shakeel Butt246dfbc2022-01-24 21:17:36 -08009024 return (void *) __get_free_pages(gfp, get_order(size));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009025}
9026
Hristo Venev75b28af2019-08-26 17:23:46 +00009027static unsigned long rings_size(unsigned sq_entries, unsigned cq_entries,
9028 size_t *sq_offset)
9029{
9030 struct io_rings *rings;
9031 size_t off, sq_array_size;
9032
9033 off = struct_size(rings, cqes, cq_entries);
9034 if (off == SIZE_MAX)
9035 return SIZE_MAX;
9036
9037#ifdef CONFIG_SMP
9038 off = ALIGN(off, SMP_CACHE_BYTES);
9039 if (off == 0)
9040 return SIZE_MAX;
9041#endif
9042
Dmitry Vyukovb36200f2020-07-11 11:31:11 +02009043 if (sq_offset)
9044 *sq_offset = off;
9045
Hristo Venev75b28af2019-08-26 17:23:46 +00009046 sq_array_size = array_size(sizeof(u32), sq_entries);
9047 if (sq_array_size == SIZE_MAX)
9048 return SIZE_MAX;
9049
9050 if (check_add_overflow(off, sq_array_size, &off))
9051 return SIZE_MAX;
9052
Hristo Venev75b28af2019-08-26 17:23:46 +00009053 return off;
9054}
9055
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009056static void io_buffer_unmap(struct io_ring_ctx *ctx, struct io_mapped_ubuf **slot)
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009057{
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009058 struct io_mapped_ubuf *imu = *slot;
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009059 unsigned int i;
9060
Pavel Begunkov62248432021-04-28 13:11:29 +01009061 if (imu != ctx->dummy_ubuf) {
9062 for (i = 0; i < imu->nr_bvecs; i++)
9063 unpin_user_page(imu->bvec[i].bv_page);
9064 if (imu->acct_pages)
9065 io_unaccount_mem(ctx, imu->acct_pages);
9066 kvfree(imu);
9067 }
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009068 *slot = NULL;
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009069}
9070
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009071static void io_rsrc_buf_put(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc)
9072{
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009073 io_buffer_unmap(ctx, &prsrc->buf);
9074 prsrc->buf = NULL;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009075}
9076
9077static void __io_sqe_buffers_unregister(struct io_ring_ctx *ctx)
Jens Axboeedafcce2019-01-09 09:16:05 -07009078{
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009079 unsigned int i;
Jens Axboeedafcce2019-01-09 09:16:05 -07009080
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009081 for (i = 0; i < ctx->nr_user_bufs; i++)
9082 io_buffer_unmap(ctx, &ctx->user_bufs[i]);
Jens Axboeedafcce2019-01-09 09:16:05 -07009083 kfree(ctx->user_bufs);
Zqiangbb6659c2021-04-30 16:25:15 +08009084 io_rsrc_data_free(ctx->buf_data);
Jens Axboeedafcce2019-01-09 09:16:05 -07009085 ctx->user_bufs = NULL;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009086 ctx->buf_data = NULL;
Jens Axboeedafcce2019-01-09 09:16:05 -07009087 ctx->nr_user_bufs = 0;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009088}
9089
Jens Axboeedafcce2019-01-09 09:16:05 -07009090static int io_sqe_buffers_unregister(struct io_ring_ctx *ctx)
9091{
Pavel Begunkov91f5a602022-06-13 06:30:06 +01009092 unsigned nr = ctx->nr_user_bufs;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009093 int ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07009094
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009095 if (!ctx->buf_data)
Jens Axboeedafcce2019-01-09 09:16:05 -07009096 return -ENXIO;
9097
Pavel Begunkov91f5a602022-06-13 06:30:06 +01009098 /*
9099 * Quiesce may unlock ->uring_lock, and while it's not held
9100 * prevent new requests using the table.
9101 */
9102 ctx->nr_user_bufs = 0;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009103 ret = io_rsrc_ref_quiesce(ctx->buf_data, ctx);
Pavel Begunkov91f5a602022-06-13 06:30:06 +01009104 ctx->nr_user_bufs = nr;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009105 if (!ret)
9106 __io_sqe_buffers_unregister(ctx);
9107 return ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07009108}
9109
9110static int io_copy_iov(struct io_ring_ctx *ctx, struct iovec *dst,
9111 void __user *arg, unsigned index)
9112{
9113 struct iovec __user *src;
9114
9115#ifdef CONFIG_COMPAT
9116 if (ctx->compat) {
9117 struct compat_iovec __user *ciovs;
9118 struct compat_iovec ciov;
9119
9120 ciovs = (struct compat_iovec __user *) arg;
9121 if (copy_from_user(&ciov, &ciovs[index], sizeof(ciov)))
9122 return -EFAULT;
9123
Jens Axboed55e5f52019-12-11 16:12:15 -07009124 dst->iov_base = u64_to_user_ptr((u64)ciov.iov_base);
Jens Axboeedafcce2019-01-09 09:16:05 -07009125 dst->iov_len = ciov.iov_len;
9126 return 0;
9127 }
9128#endif
9129 src = (struct iovec __user *) arg;
9130 if (copy_from_user(dst, &src[index], sizeof(*dst)))
9131 return -EFAULT;
9132 return 0;
9133}
9134
Jens Axboede293932020-09-17 16:19:16 -06009135/*
9136 * Not super efficient, but this is just a registration time. And we do cache
9137 * the last compound head, so generally we'll only do a full search if we don't
9138 * match that one.
9139 *
9140 * We check if the given compound head page has already been accounted, to
9141 * avoid double accounting it. This allows us to account the full size of the
9142 * page, not just the constituent pages of a huge page.
9143 */
9144static bool headpage_already_acct(struct io_ring_ctx *ctx, struct page **pages,
9145 int nr_pages, struct page *hpage)
9146{
9147 int i, j;
9148
9149 /* check current page array */
9150 for (i = 0; i < nr_pages; i++) {
9151 if (!PageCompound(pages[i]))
9152 continue;
9153 if (compound_head(pages[i]) == hpage)
9154 return true;
9155 }
9156
9157 /* check previously registered pages */
9158 for (i = 0; i < ctx->nr_user_bufs; i++) {
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009159 struct io_mapped_ubuf *imu = ctx->user_bufs[i];
Jens Axboede293932020-09-17 16:19:16 -06009160
9161 for (j = 0; j < imu->nr_bvecs; j++) {
9162 if (!PageCompound(imu->bvec[j].bv_page))
9163 continue;
9164 if (compound_head(imu->bvec[j].bv_page) == hpage)
9165 return true;
9166 }
9167 }
9168
9169 return false;
9170}
9171
9172static int io_buffer_account_pin(struct io_ring_ctx *ctx, struct page **pages,
9173 int nr_pages, struct io_mapped_ubuf *imu,
9174 struct page **last_hpage)
9175{
9176 int i, ret;
9177
Pavel Begunkov216e5832021-05-29 12:01:02 +01009178 imu->acct_pages = 0;
Jens Axboede293932020-09-17 16:19:16 -06009179 for (i = 0; i < nr_pages; i++) {
9180 if (!PageCompound(pages[i])) {
9181 imu->acct_pages++;
9182 } else {
9183 struct page *hpage;
9184
9185 hpage = compound_head(pages[i]);
9186 if (hpage == *last_hpage)
9187 continue;
9188 *last_hpage = hpage;
9189 if (headpage_already_acct(ctx, pages, i, hpage))
9190 continue;
9191 imu->acct_pages += page_size(hpage) >> PAGE_SHIFT;
9192 }
9193 }
9194
9195 if (!imu->acct_pages)
9196 return 0;
9197
Jens Axboe26bfa89e2021-02-09 20:14:12 -07009198 ret = io_account_mem(ctx, imu->acct_pages);
Jens Axboede293932020-09-17 16:19:16 -06009199 if (ret)
9200 imu->acct_pages = 0;
9201 return ret;
9202}
9203
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009204static int io_sqe_buffer_register(struct io_ring_ctx *ctx, struct iovec *iov,
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009205 struct io_mapped_ubuf **pimu,
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009206 struct page **last_hpage)
Jens Axboeedafcce2019-01-09 09:16:05 -07009207{
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009208 struct io_mapped_ubuf *imu = NULL;
Jens Axboeedafcce2019-01-09 09:16:05 -07009209 struct vm_area_struct **vmas = NULL;
9210 struct page **pages = NULL;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009211 unsigned long off, start, end, ubuf;
9212 size_t size;
9213 int ret, pret, nr_pages, i;
Jens Axboeedafcce2019-01-09 09:16:05 -07009214
Pavel Begunkov62248432021-04-28 13:11:29 +01009215 if (!iov->iov_base) {
9216 *pimu = ctx->dummy_ubuf;
9217 return 0;
9218 }
9219
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009220 ubuf = (unsigned long) iov->iov_base;
9221 end = (ubuf + iov->iov_len + PAGE_SIZE - 1) >> PAGE_SHIFT;
9222 start = ubuf >> PAGE_SHIFT;
9223 nr_pages = end - start;
9224
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009225 *pimu = NULL;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009226 ret = -ENOMEM;
9227
9228 pages = kvmalloc_array(nr_pages, sizeof(struct page *), GFP_KERNEL);
9229 if (!pages)
9230 goto done;
9231
9232 vmas = kvmalloc_array(nr_pages, sizeof(struct vm_area_struct *),
9233 GFP_KERNEL);
9234 if (!vmas)
9235 goto done;
9236
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009237 imu = kvmalloc(struct_size(imu, bvec, nr_pages), GFP_KERNEL);
Pavel Begunkova2b41982021-04-26 00:16:31 +01009238 if (!imu)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009239 goto done;
9240
9241 ret = 0;
9242 mmap_read_lock(current->mm);
9243 pret = pin_user_pages(ubuf, nr_pages, FOLL_WRITE | FOLL_LONGTERM,
9244 pages, vmas);
9245 if (pret == nr_pages) {
Pavel Begunkovdde0d0d2023-03-06 13:21:40 -07009246 struct file *file = vmas[0]->vm_file;
9247
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009248 /* don't support file backed memory */
9249 for (i = 0; i < nr_pages; i++) {
Pavel Begunkovdde0d0d2023-03-06 13:21:40 -07009250 if (vmas[i]->vm_file != file) {
9251 ret = -EINVAL;
9252 break;
9253 }
9254 if (!file)
Pavel Begunkov40dad762021-06-09 15:26:54 +01009255 continue;
Pavel Begunkovdde0d0d2023-03-06 13:21:40 -07009256 if (!vma_is_shmem(vmas[i]) && !is_file_hugepages(file)) {
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009257 ret = -EOPNOTSUPP;
9258 break;
9259 }
9260 }
9261 } else {
9262 ret = pret < 0 ? pret : -EFAULT;
9263 }
9264 mmap_read_unlock(current->mm);
9265 if (ret) {
9266 /*
9267 * if we did partial map, or found file backed vmas,
9268 * release any pages we did get
9269 */
9270 if (pret > 0)
9271 unpin_user_pages(pages, pret);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009272 goto done;
9273 }
9274
9275 ret = io_buffer_account_pin(ctx, pages, pret, imu, last_hpage);
9276 if (ret) {
9277 unpin_user_pages(pages, pret);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009278 goto done;
9279 }
9280
9281 off = ubuf & ~PAGE_MASK;
9282 size = iov->iov_len;
9283 for (i = 0; i < nr_pages; i++) {
9284 size_t vec_len;
9285
9286 vec_len = min_t(size_t, size, PAGE_SIZE - off);
9287 imu->bvec[i].bv_page = pages[i];
9288 imu->bvec[i].bv_len = vec_len;
9289 imu->bvec[i].bv_offset = off;
9290 off = 0;
9291 size -= vec_len;
9292 }
9293 /* store original address for later verification */
9294 imu->ubuf = ubuf;
Pavel Begunkov4751f532021-04-01 15:43:55 +01009295 imu->ubuf_end = ubuf + iov->iov_len;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009296 imu->nr_bvecs = nr_pages;
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009297 *pimu = imu;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009298 ret = 0;
9299done:
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009300 if (ret)
9301 kvfree(imu);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009302 kvfree(pages);
9303 kvfree(vmas);
9304 return ret;
9305}
9306
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009307static int io_buffers_map_alloc(struct io_ring_ctx *ctx, unsigned int nr_args)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009308{
Pavel Begunkov87094462021-04-11 01:46:36 +01009309 ctx->user_bufs = kcalloc(nr_args, sizeof(*ctx->user_bufs), GFP_KERNEL);
9310 return ctx->user_bufs ? 0 : -ENOMEM;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009311}
9312
9313static int io_buffer_validate(struct iovec *iov)
9314{
Pavel Begunkov50e96982021-03-24 22:59:01 +00009315 unsigned long tmp, acct_len = iov->iov_len + (PAGE_SIZE - 1);
9316
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009317 /*
9318 * Don't impose further limits on the size and buffer
9319 * constraints here, we'll -EINVAL later when IO is
9320 * submitted if they are wrong.
9321 */
Pavel Begunkov62248432021-04-28 13:11:29 +01009322 if (!iov->iov_base)
9323 return iov->iov_len ? -EFAULT : 0;
9324 if (!iov->iov_len)
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009325 return -EFAULT;
9326
9327 /* arbitrary limit, but we need something */
9328 if (iov->iov_len > SZ_1G)
9329 return -EFAULT;
9330
Pavel Begunkov50e96982021-03-24 22:59:01 +00009331 if (check_add_overflow((unsigned long)iov->iov_base, acct_len, &tmp))
9332 return -EOVERFLOW;
9333
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009334 return 0;
9335}
9336
9337static int io_sqe_buffers_register(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009338 unsigned int nr_args, u64 __user *tags)
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009339{
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009340 struct page *last_hpage = NULL;
9341 struct io_rsrc_data *data;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009342 int i, ret;
9343 struct iovec iov;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009344
Pavel Begunkov87094462021-04-11 01:46:36 +01009345 if (ctx->user_bufs)
9346 return -EBUSY;
Pavel Begunkov489809e2021-05-14 12:06:44 +01009347 if (!nr_args || nr_args > IORING_MAX_REG_BUFFERS)
Pavel Begunkov87094462021-04-11 01:46:36 +01009348 return -EINVAL;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009349 ret = io_rsrc_node_switch_start(ctx);
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009350 if (ret)
9351 return ret;
Pavel Begunkovd878c812021-06-14 02:36:18 +01009352 ret = io_rsrc_data_alloc(ctx, io_rsrc_buf_put, tags, nr_args, &data);
9353 if (ret)
9354 return ret;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009355 ret = io_buffers_map_alloc(ctx, nr_args);
9356 if (ret) {
Zqiangbb6659c2021-04-30 16:25:15 +08009357 io_rsrc_data_free(data);
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009358 return ret;
9359 }
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009360
Pavel Begunkov87094462021-04-11 01:46:36 +01009361 for (i = 0; i < nr_args; i++, ctx->nr_user_bufs++) {
Jens Axboeedafcce2019-01-09 09:16:05 -07009362 ret = io_copy_iov(ctx, &iov, arg, i);
9363 if (ret)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009364 break;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009365 ret = io_buffer_validate(&iov);
9366 if (ret)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009367 break;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01009368 if (!iov.iov_base && *io_get_tag_slot(data, i)) {
Colin Ian Kingcf3770e2021-04-29 11:46:02 +01009369 ret = -EINVAL;
9370 break;
9371 }
Jens Axboeedafcce2019-01-09 09:16:05 -07009372
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009373 ret = io_sqe_buffer_register(ctx, &iov, &ctx->user_bufs[i],
9374 &last_hpage);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009375 if (ret)
9376 break;
Jens Axboeedafcce2019-01-09 09:16:05 -07009377 }
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009378
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009379 WARN_ON_ONCE(ctx->buf_data);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009380
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009381 ctx->buf_data = data;
9382 if (ret)
9383 __io_sqe_buffers_unregister(ctx);
9384 else
9385 io_rsrc_node_switch(ctx, NULL);
Jens Axboeedafcce2019-01-09 09:16:05 -07009386 return ret;
9387}
9388
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009389static int __io_sqe_buffers_update(struct io_ring_ctx *ctx,
9390 struct io_uring_rsrc_update2 *up,
9391 unsigned int nr_args)
9392{
9393 u64 __user *tags = u64_to_user_ptr(up->tags);
9394 struct iovec iov, __user *iovs = u64_to_user_ptr(up->data);
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009395 struct page *last_hpage = NULL;
9396 bool needs_switch = false;
9397 __u32 done;
9398 int i, err;
9399
9400 if (!ctx->buf_data)
9401 return -ENXIO;
9402 if (up->offset + nr_args > ctx->nr_user_bufs)
9403 return -EINVAL;
9404
9405 for (done = 0; done < nr_args; done++) {
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009406 struct io_mapped_ubuf *imu;
9407 int offset = up->offset + done;
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009408 u64 tag = 0;
9409
9410 err = io_copy_iov(ctx, &iov, iovs, done);
9411 if (err)
9412 break;
9413 if (tags && copy_from_user(&tag, &tags[done], sizeof(tag))) {
9414 err = -EFAULT;
9415 break;
9416 }
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009417 err = io_buffer_validate(&iov);
9418 if (err)
9419 break;
Colin Ian Kingcf3770e2021-04-29 11:46:02 +01009420 if (!iov.iov_base && tag) {
9421 err = -EINVAL;
9422 break;
9423 }
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009424 err = io_sqe_buffer_register(ctx, &iov, &imu, &last_hpage);
9425 if (err)
9426 break;
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009427
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009428 i = array_index_nospec(offset, ctx->nr_user_bufs);
Pavel Begunkov62248432021-04-28 13:11:29 +01009429 if (ctx->user_bufs[i] != ctx->dummy_ubuf) {
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01009430 err = io_queue_rsrc_removal(ctx->buf_data, i,
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009431 ctx->rsrc_node, ctx->user_bufs[i]);
9432 if (unlikely(err)) {
9433 io_buffer_unmap(ctx, &imu);
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009434 break;
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009435 }
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009436 ctx->user_bufs[i] = NULL;
9437 needs_switch = true;
9438 }
9439
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009440 ctx->user_bufs[i] = imu;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01009441 *io_get_tag_slot(ctx->buf_data, offset) = tag;
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009442 }
9443
9444 if (needs_switch)
9445 io_rsrc_node_switch(ctx, ctx->buf_data);
9446 return done ? done : err;
9447}
9448
Jens Axboe9b402842019-04-11 11:45:41 -06009449static int io_eventfd_register(struct io_ring_ctx *ctx, void __user *arg)
9450{
9451 __s32 __user *fds = arg;
9452 int fd;
9453
9454 if (ctx->cq_ev_fd)
9455 return -EBUSY;
9456
9457 if (copy_from_user(&fd, fds, sizeof(*fds)))
9458 return -EFAULT;
9459
9460 ctx->cq_ev_fd = eventfd_ctx_fdget(fd);
9461 if (IS_ERR(ctx->cq_ev_fd)) {
9462 int ret = PTR_ERR(ctx->cq_ev_fd);
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01009463
Jens Axboe9b402842019-04-11 11:45:41 -06009464 ctx->cq_ev_fd = NULL;
9465 return ret;
9466 }
9467
9468 return 0;
9469}
9470
9471static int io_eventfd_unregister(struct io_ring_ctx *ctx)
9472{
9473 if (ctx->cq_ev_fd) {
9474 eventfd_ctx_put(ctx->cq_ev_fd);
9475 ctx->cq_ev_fd = NULL;
9476 return 0;
9477 }
9478
9479 return -ENXIO;
9480}
9481
Jens Axboe5a2e7452020-02-23 16:23:11 -07009482static void io_destroy_buffers(struct io_ring_ctx *ctx)
9483{
Jens Axboe9e15c3a2021-03-13 12:29:43 -07009484 struct io_buffer *buf;
9485 unsigned long index;
9486
Ye Bin2d447d32021-11-22 10:47:37 +08009487 xa_for_each(&ctx->io_buffers, index, buf)
Jens Axboe9e15c3a2021-03-13 12:29:43 -07009488 __io_remove_buffers(ctx, buf, index, -1U);
Jens Axboe5a2e7452020-02-23 16:23:11 -07009489}
9490
Pavel Begunkov72558342021-08-09 20:18:09 +01009491static void io_req_cache_free(struct list_head *list)
Jens Axboe1b4c3512021-02-10 00:03:19 +00009492{
Jens Axboe68e68ee2021-02-13 09:00:02 -07009493 struct io_kiocb *req, *nxt;
Jens Axboe1b4c3512021-02-10 00:03:19 +00009494
Pavel Begunkovbb943b82021-08-09 20:18:10 +01009495 list_for_each_entry_safe(req, nxt, list, inflight_entry) {
9496 list_del(&req->inflight_entry);
Jens Axboe1b4c3512021-02-10 00:03:19 +00009497 kmem_cache_free(req_cachep, req);
9498 }
9499}
9500
Jens Axboe4010fec2021-02-27 15:04:18 -07009501static void io_req_caches_free(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009502{
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01009503 struct io_submit_state *state = &ctx->submit_state;
Pavel Begunkovbf019da2021-02-10 00:03:17 +00009504
Jens Axboe9a4fdbd2021-02-13 09:09:44 -07009505 mutex_lock(&ctx->uring_lock);
9506
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01009507 if (state->free_reqs) {
9508 kmem_cache_free_bulk(req_cachep, state->free_reqs, state->reqs);
9509 state->free_reqs = 0;
Pavel Begunkov8e5c66c2021-02-22 11:45:55 +00009510 }
Jens Axboe9a4fdbd2021-02-13 09:09:44 -07009511
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01009512 io_flush_cached_locked_reqs(ctx, state);
9513 io_req_cache_free(&state->free_list);
Jens Axboe9a4fdbd2021-02-13 09:09:44 -07009514 mutex_unlock(&ctx->uring_lock);
9515}
9516
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009517static void io_wait_rsrc_data(struct io_rsrc_data *data)
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009518{
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009519 if (data && !atomic_dec_and_test(&data->refs))
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009520 wait_for_completion(&data->done);
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009521}
9522
Jens Axboe2b188cc2019-01-07 10:46:33 -07009523static void io_ring_ctx_free(struct io_ring_ctx *ctx)
9524{
Jens Axboe37d1e2e2021-02-17 21:03:43 -07009525 io_sq_thread_finish(ctx);
Jens Axboe2aede0e2020-09-14 10:45:53 -06009526
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009527 /* __io_rsrc_put_work() may need uring_lock to progress, wait w/o it */
9528 io_wait_rsrc_data(ctx->buf_data);
9529 io_wait_rsrc_data(ctx->file_data);
9530
Hao Xu8bad28d2021-02-19 17:19:36 +08009531 mutex_lock(&ctx->uring_lock);
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009532 if (ctx->buf_data)
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009533 __io_sqe_buffers_unregister(ctx);
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009534 if (ctx->file_data)
Pavel Begunkov08480402021-04-13 02:58:38 +01009535 __io_sqe_files_unregister(ctx);
Pavel Begunkovc4ea0602021-04-01 15:43:58 +01009536 if (ctx->rings)
9537 __io_cqring_overflow_flush(ctx, true);
Hao Xu8bad28d2021-02-19 17:19:36 +08009538 mutex_unlock(&ctx->uring_lock);
Jens Axboe9b402842019-04-11 11:45:41 -06009539 io_eventfd_unregister(ctx);
Jens Axboe5a2e7452020-02-23 16:23:11 -07009540 io_destroy_buffers(ctx);
Pavel Begunkov07db2982021-04-20 12:03:32 +01009541 if (ctx->sq_creds)
9542 put_cred(ctx->sq_creds);
Jens Axboedef596e2019-01-09 08:59:42 -07009543
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01009544 /* there are no registered resources left, nobody uses it */
9545 if (ctx->rsrc_node)
9546 io_rsrc_node_destroy(ctx->rsrc_node);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00009547 if (ctx->rsrc_backup_node)
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01009548 io_rsrc_node_destroy(ctx->rsrc_backup_node);
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01009549 flush_delayed_work(&ctx->rsrc_put_work);
9550
9551 WARN_ON_ONCE(!list_empty(&ctx->rsrc_ref_list));
9552 WARN_ON_ONCE(!llist_empty(&ctx->rsrc_put_llist));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009553
9554#if defined(CONFIG_UNIX)
Eric Biggers355e8d22019-06-12 14:58:43 -07009555 if (ctx->ring_sock) {
9556 ctx->ring_sock->file = NULL; /* so that iput() is called */
Jens Axboe2b188cc2019-01-07 10:46:33 -07009557 sock_release(ctx->ring_sock);
Eric Biggers355e8d22019-06-12 14:58:43 -07009558 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009559#endif
Pavel Begunkovef9dd632021-08-28 19:54:38 -06009560 WARN_ON_ONCE(!list_empty(&ctx->ltimeout_list));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009561
Pavel Begunkovcd148d42022-10-16 22:42:55 +01009562 if (ctx->mm_account) {
9563 mmdrop(ctx->mm_account);
9564 ctx->mm_account = NULL;
9565 }
9566
Hristo Venev75b28af2019-08-26 17:23:46 +00009567 io_mem_free(ctx->rings);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009568 io_mem_free(ctx->sq_sqes);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009569
9570 percpu_ref_exit(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009571 free_uid(ctx->user);
Jens Axboe4010fec2021-02-27 15:04:18 -07009572 io_req_caches_free(ctx);
Jens Axboee9418942021-02-19 12:33:30 -07009573 if (ctx->hash_map)
9574 io_wq_put_hash(ctx->hash_map);
Jens Axboe78076bb2019-12-04 19:56:40 -07009575 kfree(ctx->cancel_hash);
Pavel Begunkov62248432021-04-28 13:11:29 +01009576 kfree(ctx->dummy_ubuf);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009577 kfree(ctx);
9578}
9579
9580static __poll_t io_uring_poll(struct file *file, poll_table *wait)
9581{
9582 struct io_ring_ctx *ctx = file->private_data;
9583 __poll_t mask = 0;
9584
Pavel Begunkov311997b2021-06-14 23:37:28 +01009585 poll_wait(file, &ctx->poll_wait, wait);
Stefan Bühler4f7067c2019-04-24 23:54:17 +02009586 /*
9587 * synchronizes with barrier from wq_has_sleeper call in
9588 * io_commit_cqring
9589 */
Jens Axboe2b188cc2019-01-07 10:46:33 -07009590 smp_rmb();
Jens Axboe90554202020-09-03 12:12:41 -06009591 if (!io_sqring_full(ctx))
Jens Axboe2b188cc2019-01-07 10:46:33 -07009592 mask |= EPOLLOUT | EPOLLWRNORM;
Hao Xued670c32021-02-05 16:34:21 +08009593
9594 /*
9595 * Don't flush cqring overflow list here, just do a simple check.
9596 * Otherwise there could possible be ABBA deadlock:
9597 * CPU0 CPU1
9598 * ---- ----
9599 * lock(&ctx->uring_lock);
9600 * lock(&ep->mtx);
9601 * lock(&ctx->uring_lock);
9602 * lock(&ep->mtx);
9603 *
9604 * Users may get EPOLLIN meanwhile seeing nothing in cqring, this
9605 * pushs them to do the flush.
9606 */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01009607 if (io_cqring_events(ctx) || test_bit(0, &ctx->check_cq_overflow))
Jens Axboe2b188cc2019-01-07 10:46:33 -07009608 mask |= EPOLLIN | EPOLLRDNORM;
9609
9610 return mask;
9611}
9612
Yejune Deng0bead8c2020-12-24 11:02:20 +08009613static int io_unregister_personality(struct io_ring_ctx *ctx, unsigned id)
Jens Axboe071698e2020-01-28 10:04:42 -07009614{
Jens Axboe4379bf82021-02-15 13:40:22 -07009615 const struct cred *creds;
Jens Axboe071698e2020-01-28 10:04:42 -07009616
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00009617 creds = xa_erase(&ctx->personalities, id);
Jens Axboe4379bf82021-02-15 13:40:22 -07009618 if (creds) {
9619 put_cred(creds);
Yejune Deng0bead8c2020-12-24 11:02:20 +08009620 return 0;
Jens Axboe1e6fa522020-10-15 08:46:24 -06009621 }
Yejune Deng0bead8c2020-12-24 11:02:20 +08009622
9623 return -EINVAL;
9624}
9625
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009626struct io_tctx_exit {
9627 struct callback_head task_work;
9628 struct completion completion;
Pavel Begunkovbaf186c2021-03-06 11:02:15 +00009629 struct io_ring_ctx *ctx;
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009630};
9631
9632static void io_tctx_exit_cb(struct callback_head *cb)
9633{
9634 struct io_uring_task *tctx = current->io_uring;
9635 struct io_tctx_exit *work;
9636
9637 work = container_of(cb, struct io_tctx_exit, task_work);
9638 /*
9639 * When @in_idle, we're in cancellation and it's racy to remove the
9640 * node. It'll be removed by the end of cancellation, just ignore it.
Harshit Mogalapallif8955112022-12-06 01:38:32 -08009641 * tctx can be NULL if the queueing of this task_work raced with
9642 * work cancelation off the exec path.
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009643 */
Harshit Mogalapallif8955112022-12-06 01:38:32 -08009644 if (tctx && !atomic_read(&tctx->in_idle))
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009645 io_uring_del_tctx_node((unsigned long)work->ctx);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009646 complete(&work->completion);
9647}
9648
Pavel Begunkov28090c12021-04-25 23:34:45 +01009649static bool io_cancel_ctx_cb(struct io_wq_work *work, void *data)
9650{
9651 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
9652
9653 return req->ctx == data;
9654}
9655
Jens Axboe85faa7b2020-04-09 18:14:00 -06009656static void io_ring_exit_work(struct work_struct *work)
9657{
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009658 struct io_ring_ctx *ctx = container_of(work, struct io_ring_ctx, exit_work);
Pavel Begunkovb5bb3a22021-03-06 11:02:16 +00009659 unsigned long timeout = jiffies + HZ * 60 * 5;
Pavel Begunkov58d3be22021-08-09 13:04:17 +01009660 unsigned long interval = HZ / 20;
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009661 struct io_tctx_exit exit;
9662 struct io_tctx_node *node;
9663 int ret;
Jens Axboe85faa7b2020-04-09 18:14:00 -06009664
Jens Axboe56952e92020-06-17 15:00:04 -06009665 /*
9666 * If we're doing polled IO and end up having requests being
9667 * submitted async (out-of-line), then completions can come in while
9668 * we're waiting for refs to drop. We need to reap these manually,
9669 * as nobody else will be looking for them.
9670 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03009671 do {
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009672 io_uring_try_cancel_requests(ctx, NULL, true);
Pavel Begunkov28090c12021-04-25 23:34:45 +01009673 if (ctx->sq_data) {
9674 struct io_sq_data *sqd = ctx->sq_data;
9675 struct task_struct *tsk;
9676
9677 io_sq_thread_park(sqd);
9678 tsk = sqd->thread;
9679 if (tsk && tsk->io_uring && tsk->io_uring->io_wq)
9680 io_wq_cancel_cb(tsk->io_uring->io_wq,
9681 io_cancel_ctx_cb, ctx, true);
9682 io_sq_thread_unpark(sqd);
9683 }
Pavel Begunkovb5bb3a22021-03-06 11:02:16 +00009684
Pavel Begunkov58d3be22021-08-09 13:04:17 +01009685 if (WARN_ON_ONCE(time_after(jiffies, timeout))) {
9686 /* there is little hope left, don't run it too often */
9687 interval = HZ * 60;
9688 }
9689 } while (!wait_for_completion_timeout(&ctx->ref_comp, interval));
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009690
Pavel Begunkov7f006512021-04-14 13:38:34 +01009691 init_completion(&exit.completion);
9692 init_task_work(&exit.task_work, io_tctx_exit_cb);
9693 exit.ctx = ctx;
Pavel Begunkov89b50662021-04-01 15:43:50 +01009694 /*
9695 * Some may use context even when all refs and requests have been put,
9696 * and they are free to do so while still holding uring_lock or
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +01009697 * completion_lock, see io_req_task_submit(). Apart from other work,
Pavel Begunkov89b50662021-04-01 15:43:50 +01009698 * this lock/unlock section also waits them to finish.
9699 */
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009700 mutex_lock(&ctx->uring_lock);
9701 while (!list_empty(&ctx->tctx_list)) {
Pavel Begunkovb5bb3a22021-03-06 11:02:16 +00009702 WARN_ON_ONCE(time_after(jiffies, timeout));
9703
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009704 node = list_first_entry(&ctx->tctx_list, struct io_tctx_node,
9705 ctx_node);
Pavel Begunkov7f006512021-04-14 13:38:34 +01009706 /* don't spin on a single task if cancellation failed */
9707 list_rotate_left(&ctx->tctx_list);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009708 ret = task_work_add(node->task, &exit.task_work, TWA_SIGNAL);
9709 if (WARN_ON_ONCE(ret))
9710 continue;
9711 wake_up_process(node->task);
9712
9713 mutex_unlock(&ctx->uring_lock);
9714 wait_for_completion(&exit.completion);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009715 mutex_lock(&ctx->uring_lock);
9716 }
9717 mutex_unlock(&ctx->uring_lock);
Jens Axboe79ebeae2021-08-10 15:18:27 -06009718 spin_lock(&ctx->completion_lock);
9719 spin_unlock(&ctx->completion_lock);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009720
Jens Axboe85faa7b2020-04-09 18:14:00 -06009721 io_ring_ctx_free(ctx);
9722}
9723
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009724/* Returns true if we found and killed one or more timeouts */
9725static bool io_kill_timeouts(struct io_ring_ctx *ctx, struct task_struct *tsk,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009726 bool cancel_all)
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009727{
9728 struct io_kiocb *req, *tmp;
9729 int canceled = 0;
9730
Jens Axboe79ebeae2021-08-10 15:18:27 -06009731 spin_lock(&ctx->completion_lock);
9732 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009733 list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009734 if (io_match_task(req, tsk, cancel_all)) {
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009735 io_kill_timeout(req, -ECANCELED);
9736 canceled++;
9737 }
9738 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06009739 spin_unlock_irq(&ctx->timeout_lock);
Pavel Begunkov51520422021-03-29 11:39:29 +01009740 if (canceled != 0)
9741 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06009742 spin_unlock(&ctx->completion_lock);
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009743 if (canceled != 0)
9744 io_cqring_ev_posted(ctx);
9745 return canceled != 0;
9746}
9747
Jens Axboe2b188cc2019-01-07 10:46:33 -07009748static void io_ring_ctx_wait_and_kill(struct io_ring_ctx *ctx)
9749{
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00009750 unsigned long index;
9751 struct creds *creds;
9752
Jens Axboe2b188cc2019-01-07 10:46:33 -07009753 mutex_lock(&ctx->uring_lock);
9754 percpu_ref_kill(&ctx->refs);
Pavel Begunkov634578f2020-12-06 22:22:44 +00009755 if (ctx->rings)
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00009756 __io_cqring_overflow_flush(ctx, true);
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00009757 xa_for_each(&ctx->personalities, index, creds)
9758 io_unregister_personality(ctx, index);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009759 mutex_unlock(&ctx->uring_lock);
9760
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009761 io_kill_timeouts(ctx, NULL, true);
9762 io_poll_remove_all(ctx, NULL, true);
Jens Axboe561fb042019-10-24 07:25:42 -06009763
Jens Axboe15dff282019-11-13 09:09:23 -07009764 /* if we failed setting up the ctx, we might not have any rings */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03009765 io_iopoll_try_reap_events(ctx);
Jens Axboe309fc032020-07-10 09:13:34 -06009766
Jens Axboe86e2d692023-01-21 12:36:08 -07009767 /* drop cached put refs after potentially doing completions */
9768 if (current->io_uring)
9769 io_uring_drop_tctx_refs(current);
9770
Jens Axboe85faa7b2020-04-09 18:14:00 -06009771 INIT_WORK(&ctx->exit_work, io_ring_exit_work);
Jens Axboefc666772020-08-19 11:10:51 -06009772 /*
9773 * Use system_unbound_wq to avoid spawning tons of event kworkers
9774 * if we're exiting a ton of rings at the same time. It just adds
9775 * noise and overhead, there's no discernable change in runtime
9776 * over using system_wq.
9777 */
9778 queue_work(system_unbound_wq, &ctx->exit_work);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009779}
9780
9781static int io_uring_release(struct inode *inode, struct file *file)
9782{
9783 struct io_ring_ctx *ctx = file->private_data;
9784
9785 file->private_data = NULL;
9786 io_ring_ctx_wait_and_kill(ctx);
9787 return 0;
9788}
9789
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009790struct io_task_cancel {
9791 struct task_struct *task;
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009792 bool all;
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009793};
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03009794
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009795static bool io_cancel_task_cb(struct io_wq_work *work, void *data)
Jens Axboeb711d4e2020-08-16 08:23:05 -07009796{
Pavel Begunkov9a472ef2020-11-05 22:31:37 +00009797 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009798 struct io_task_cancel *cancel = data;
Pavel Begunkov9a472ef2020-11-05 22:31:37 +00009799
Pavel Begunkov1c939a52021-11-26 14:38:15 +00009800 return io_match_task_safe(req, cancel->task, cancel->all);
Jens Axboeb711d4e2020-08-16 08:23:05 -07009801}
9802
Pavel Begunkove1915f72021-03-11 23:29:35 +00009803static bool io_cancel_defer_files(struct io_ring_ctx *ctx,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009804 struct task_struct *task, bool cancel_all)
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009805{
Pavel Begunkove1915f72021-03-11 23:29:35 +00009806 struct io_defer_entry *de;
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009807 LIST_HEAD(list);
9808
Jens Axboe79ebeae2021-08-10 15:18:27 -06009809 spin_lock(&ctx->completion_lock);
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009810 list_for_each_entry_reverse(de, &ctx->defer_list, list) {
Pavel Begunkov1c939a52021-11-26 14:38:15 +00009811 if (io_match_task_safe(de->req, task, cancel_all)) {
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009812 list_cut_position(&list, &ctx->defer_list, &de->list);
9813 break;
9814 }
9815 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06009816 spin_unlock(&ctx->completion_lock);
Pavel Begunkove1915f72021-03-11 23:29:35 +00009817 if (list_empty(&list))
9818 return false;
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009819
9820 while (!list_empty(&list)) {
9821 de = list_first_entry(&list, struct io_defer_entry, list);
9822 list_del_init(&de->list);
Pavel Begunkovf41db2732021-02-28 22:35:12 +00009823 io_req_complete_failed(de->req, -ECANCELED);
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009824 kfree(de);
9825 }
Pavel Begunkove1915f72021-03-11 23:29:35 +00009826 return true;
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009827}
9828
Pavel Begunkov1b007642021-03-06 11:02:17 +00009829static bool io_uring_try_cancel_iowq(struct io_ring_ctx *ctx)
9830{
9831 struct io_tctx_node *node;
9832 enum io_wq_cancel cret;
9833 bool ret = false;
9834
9835 mutex_lock(&ctx->uring_lock);
9836 list_for_each_entry(node, &ctx->tctx_list, ctx_node) {
9837 struct io_uring_task *tctx = node->task->io_uring;
9838
9839 /*
9840 * io_wq will stay alive while we hold uring_lock, because it's
9841 * killed after ctx nodes, which requires to take the lock.
9842 */
9843 if (!tctx || !tctx->io_wq)
9844 continue;
9845 cret = io_wq_cancel_cb(tctx->io_wq, io_cancel_ctx_cb, ctx, true);
9846 ret |= (cret != IO_WQ_CANCEL_NOTFOUND);
9847 }
9848 mutex_unlock(&ctx->uring_lock);
9849
9850 return ret;
9851}
9852
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009853static void io_uring_try_cancel_requests(struct io_ring_ctx *ctx,
9854 struct task_struct *task,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009855 bool cancel_all)
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009856{
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009857 struct io_task_cancel cancel = { .task = task, .all = cancel_all, };
Pavel Begunkov1b007642021-03-06 11:02:17 +00009858 struct io_uring_task *tctx = task ? task->io_uring : NULL;
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009859
9860 while (1) {
9861 enum io_wq_cancel cret;
9862 bool ret = false;
9863
Pavel Begunkov1b007642021-03-06 11:02:17 +00009864 if (!task) {
9865 ret |= io_uring_try_cancel_iowq(ctx);
9866 } else if (tctx && tctx->io_wq) {
9867 /*
9868 * Cancels requests of all rings, not only @ctx, but
9869 * it's fine as the task is in exit/exec.
9870 */
Jens Axboe5aa75ed2021-02-16 12:56:50 -07009871 cret = io_wq_cancel_cb(tctx->io_wq, io_cancel_task_cb,
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009872 &cancel, true);
9873 ret |= (cret != IO_WQ_CANCEL_NOTFOUND);
9874 }
9875
9876 /* SQPOLL thread does its own polling */
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009877 if ((!(ctx->flags & IORING_SETUP_SQPOLL) && cancel_all) ||
Jens Axboed052d1d2021-03-11 10:49:20 -07009878 (ctx->sq_data && ctx->sq_data->thread == current)) {
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009879 while (!list_empty_careful(&ctx->iopoll_list)) {
9880 io_iopoll_try_reap_events(ctx);
9881 ret = true;
Jens Axboeabd54d82023-03-06 13:18:27 -07009882 cond_resched();
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009883 }
9884 }
9885
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009886 ret |= io_cancel_defer_files(ctx, task, cancel_all);
9887 ret |= io_poll_remove_all(ctx, task, cancel_all);
9888 ret |= io_kill_timeouts(ctx, task, cancel_all);
Pavel Begunkove5dc4802021-06-26 21:40:46 +01009889 if (task)
9890 ret |= io_run_task_work();
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009891 if (!ret)
9892 break;
9893 cond_resched();
9894 }
9895}
9896
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009897static int __io_uring_add_tctx_node(struct io_ring_ctx *ctx)
Jens Axboe0f212202020-09-13 13:09:39 -06009898{
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01009899 struct io_uring_task *tctx = current->io_uring;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00009900 struct io_tctx_node *node;
Pavel Begunkova528b042020-12-21 18:34:04 +00009901 int ret;
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01009902
9903 if (unlikely(!tctx)) {
Jens Axboe5aa75ed2021-02-16 12:56:50 -07009904 ret = io_uring_alloc_task_context(current, ctx);
Jens Axboe0f212202020-09-13 13:09:39 -06009905 if (unlikely(ret))
9906 return ret;
Pavel Begunkove139a1e2021-10-19 23:43:46 +01009907
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01009908 tctx = current->io_uring;
Pavel Begunkove139a1e2021-10-19 23:43:46 +01009909 if (ctx->iowq_limits_set) {
9910 unsigned int limits[2] = { ctx->iowq_limits[0],
9911 ctx->iowq_limits[1], };
9912
9913 ret = io_wq_max_workers(tctx->io_wq, limits);
9914 if (ret)
9915 return ret;
9916 }
Jens Axboe0f212202020-09-13 13:09:39 -06009917 }
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +00009918 if (!xa_load(&tctx->xa, (unsigned long)ctx)) {
9919 node = kmalloc(sizeof(*node), GFP_KERNEL);
9920 if (!node)
9921 return -ENOMEM;
9922 node->ctx = ctx;
9923 node->task = current;
Jens Axboe0f212202020-09-13 13:09:39 -06009924
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +00009925 ret = xa_err(xa_store(&tctx->xa, (unsigned long)ctx,
9926 node, GFP_KERNEL));
9927 if (ret) {
9928 kfree(node);
9929 return ret;
Jens Axboe0f212202020-09-13 13:09:39 -06009930 }
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +00009931
9932 mutex_lock(&ctx->uring_lock);
9933 list_add(&node->ctx_node, &ctx->tctx_list);
9934 mutex_unlock(&ctx->uring_lock);
Jens Axboe0f212202020-09-13 13:09:39 -06009935 }
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +00009936 tctx->last = ctx;
Jens Axboe0f212202020-09-13 13:09:39 -06009937 return 0;
9938}
9939
9940/*
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +00009941 * Note that this task has used io_uring. We use it for cancelation purposes.
9942 */
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009943static inline int io_uring_add_tctx_node(struct io_ring_ctx *ctx)
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +00009944{
9945 struct io_uring_task *tctx = current->io_uring;
9946
9947 if (likely(tctx && tctx->last == ctx))
9948 return 0;
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009949 return __io_uring_add_tctx_node(ctx);
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +00009950}
9951
9952/*
Jens Axboe0f212202020-09-13 13:09:39 -06009953 * Remove this io_uring_file -> task mapping.
9954 */
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009955static void io_uring_del_tctx_node(unsigned long index)
Jens Axboe0f212202020-09-13 13:09:39 -06009956{
9957 struct io_uring_task *tctx = current->io_uring;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00009958 struct io_tctx_node *node;
Pavel Begunkov29412672021-03-06 11:02:11 +00009959
Pavel Begunkoveebd2e32021-03-06 11:02:14 +00009960 if (!tctx)
9961 return;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00009962 node = xa_erase(&tctx->xa, index);
9963 if (!node)
Pavel Begunkov29412672021-03-06 11:02:11 +00009964 return;
Jens Axboe0f212202020-09-13 13:09:39 -06009965
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00009966 WARN_ON_ONCE(current != node->task);
9967 WARN_ON_ONCE(list_empty(&node->ctx_node));
9968
9969 mutex_lock(&node->ctx->uring_lock);
9970 list_del(&node->ctx_node);
9971 mutex_unlock(&node->ctx->uring_lock);
9972
Pavel Begunkovbaf186c2021-03-06 11:02:15 +00009973 if (tctx->last == node->ctx)
Jens Axboe0f212202020-09-13 13:09:39 -06009974 tctx->last = NULL;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00009975 kfree(node);
Jens Axboe0f212202020-09-13 13:09:39 -06009976}
9977
Pavel Begunkov8452d4a2021-02-27 11:16:46 +00009978static void io_uring_clean_tctx(struct io_uring_task *tctx)
Pavel Begunkovde7f1d92021-01-04 20:43:29 +00009979{
Pavel Begunkovba5ef6d2021-05-20 13:21:20 +01009980 struct io_wq *wq = tctx->io_wq;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00009981 struct io_tctx_node *node;
Pavel Begunkovde7f1d92021-01-04 20:43:29 +00009982 unsigned long index;
9983
Jens Axboe8bab4c02021-09-24 07:12:27 -06009984 xa_for_each(&tctx->xa, index, node) {
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009985 io_uring_del_tctx_node(index);
Jens Axboe8bab4c02021-09-24 07:12:27 -06009986 cond_resched();
9987 }
Marco Elverb16ef422021-05-27 11:25:48 +02009988 if (wq) {
9989 /*
9990 * Must be after io_uring_del_task_file() (removes nodes under
9991 * uring_lock) to avoid race with io_uring_try_cancel_iowq().
9992 */
Pavel Begunkovba5ef6d2021-05-20 13:21:20 +01009993 io_wq_put_and_exit(wq);
Pavel Begunkovdadebc32021-08-23 13:30:44 +01009994 tctx->io_wq = NULL;
Marco Elverb16ef422021-05-27 11:25:48 +02009995 }
Pavel Begunkovde7f1d92021-01-04 20:43:29 +00009996}
9997
Pavel Begunkov3f48cf12021-04-11 01:46:27 +01009998static s64 tctx_inflight(struct io_uring_task *tctx, bool tracked)
Pavel Begunkov521d6a72021-03-11 23:29:38 +00009999{
Pavel Begunkov3f48cf12021-04-11 01:46:27 +010010000 if (tracked)
10001 return atomic_read(&tctx->inflight_tracked);
Pavel Begunkov521d6a72021-03-11 23:29:38 +000010002 return percpu_counter_sum(&tctx->inflight);
10003}
10004
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010005/*
10006 * Find any io_uring ctx that this task has registered or done IO on, and cancel
Jens Axboe8e129762021-12-09 08:54:29 -070010007 * requests. @sqd should be not-null IFF it's an SQPOLL thread cancellation.
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010008 */
10009static void io_uring_cancel_generic(bool cancel_all, struct io_sq_data *sqd)
Pavel Begunkov0e9ddb32021-02-07 22:34:26 +000010010{
Pavel Begunkov521d6a72021-03-11 23:29:38 +000010011 struct io_uring_task *tctx = current->io_uring;
Pavel Begunkov734551d2021-04-18 14:52:09 +010010012 struct io_ring_ctx *ctx;
Jens Axboefdaf0832020-10-30 09:37:30 -060010013 s64 inflight;
Pavel Begunkov0e9ddb32021-02-07 22:34:26 +000010014 DEFINE_WAIT(wait);
Jens Axboefdaf0832020-10-30 09:37:30 -060010015
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010016 WARN_ON_ONCE(sqd && sqd->thread != current);
10017
Palash Oswal6d042ff2021-04-27 18:21:49 +053010018 if (!current->io_uring)
10019 return;
Pavel Begunkov17a91052021-05-23 15:48:39 +010010020 if (tctx->io_wq)
10021 io_wq_exit_start(tctx->io_wq);
10022
Jens Axboefdaf0832020-10-30 09:37:30 -060010023 atomic_inc(&tctx->in_idle);
Jens Axboed8a6df12020-10-15 16:24:45 -060010024 do {
Pavel Begunkove9dbe222021-08-09 13:04:20 +010010025 io_uring_drop_tctx_refs(current);
Jens Axboe0f212202020-09-13 13:09:39 -060010026 /* read completions before cancelations */
Pavel Begunkov3dd0c972021-05-16 22:58:04 +010010027 inflight = tctx_inflight(tctx, !cancel_all);
Jens Axboed8a6df12020-10-15 16:24:45 -060010028 if (!inflight)
10029 break;
Jens Axboe0f212202020-09-13 13:09:39 -060010030
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010031 if (!sqd) {
10032 struct io_tctx_node *node;
10033 unsigned long index;
10034
10035 xa_for_each(&tctx->xa, index, node) {
10036 /* sqpoll task will cancel all its requests */
10037 if (node->ctx->sq_data)
10038 continue;
10039 io_uring_try_cancel_requests(node->ctx, current,
10040 cancel_all);
10041 }
10042 } else {
10043 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
10044 io_uring_try_cancel_requests(ctx, current,
10045 cancel_all);
10046 }
10047
Jens Axboe8e129762021-12-09 08:54:29 -070010048 prepare_to_wait(&tctx->wait, &wait, TASK_INTERRUPTIBLE);
10049 io_run_task_work();
Pavel Begunkove9dbe222021-08-09 13:04:20 +010010050 io_uring_drop_tctx_refs(current);
Jens Axboe8e129762021-12-09 08:54:29 -070010051
Jens Axboe0f212202020-09-13 13:09:39 -060010052 /*
Pavel Begunkova1bb3cd2021-01-26 15:28:26 +000010053 * If we've seen completions, retry without waiting. This
10054 * avoids a race where a completion comes in before we did
10055 * prepare_to_wait().
Jens Axboe0f212202020-09-13 13:09:39 -060010056 */
Pavel Begunkov3dd0c972021-05-16 22:58:04 +010010057 if (inflight == tctx_inflight(tctx, !cancel_all))
Pavel Begunkova1bb3cd2021-01-26 15:28:26 +000010058 schedule();
Pavel Begunkovf57555e2020-12-20 13:21:44 +000010059 finish_wait(&tctx->wait, &wait);
Jens Axboed8a6df12020-10-15 16:24:45 -060010060 } while (1);
Pavel Begunkovde7f1d92021-01-04 20:43:29 +000010061
Pavel Begunkov8452d4a2021-02-27 11:16:46 +000010062 io_uring_clean_tctx(tctx);
Pavel Begunkov3dd0c972021-05-16 22:58:04 +010010063 if (cancel_all) {
Pavel Begunkovb168b1a2022-01-09 00:53:22 +000010064 /*
10065 * We shouldn't run task_works after cancel, so just leave
10066 * ->in_idle set for normal exit.
10067 */
10068 atomic_dec(&tctx->in_idle);
Pavel Begunkov3f48cf12021-04-11 01:46:27 +010010069 /* for exec all current's requests should be gone, kill tctx */
10070 __io_uring_free(current);
10071 }
Pavel Begunkov44e728b2020-06-15 10:24:04 +030010072}
10073
Hao Xuf552a272021-08-12 12:14:35 +080010074void __io_uring_cancel(bool cancel_all)
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010075{
Hao Xuf552a272021-08-12 12:14:35 +080010076 io_uring_cancel_generic(cancel_all, NULL);
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010077}
10078
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010079static void *io_uring_validate_mmap_request(struct file *file,
10080 loff_t pgoff, size_t sz)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010081{
Jens Axboe2b188cc2019-01-07 10:46:33 -070010082 struct io_ring_ctx *ctx = file->private_data;
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010083 loff_t offset = pgoff << PAGE_SHIFT;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010084 struct page *page;
10085 void *ptr;
10086
10087 switch (offset) {
10088 case IORING_OFF_SQ_RING:
Hristo Venev75b28af2019-08-26 17:23:46 +000010089 case IORING_OFF_CQ_RING:
10090 ptr = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010091 break;
10092 case IORING_OFF_SQES:
10093 ptr = ctx->sq_sqes;
10094 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010095 default:
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010096 return ERR_PTR(-EINVAL);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010097 }
10098
10099 page = virt_to_head_page(ptr);
Matthew Wilcox (Oracle)a50b8542019-09-23 15:34:25 -070010100 if (sz > page_size(page))
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010101 return ERR_PTR(-EINVAL);
10102
10103 return ptr;
10104}
10105
10106#ifdef CONFIG_MMU
10107
10108static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
10109{
10110 size_t sz = vma->vm_end - vma->vm_start;
10111 unsigned long pfn;
10112 void *ptr;
10113
10114 ptr = io_uring_validate_mmap_request(file, vma->vm_pgoff, sz);
10115 if (IS_ERR(ptr))
10116 return PTR_ERR(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010117
10118 pfn = virt_to_phys(ptr) >> PAGE_SHIFT;
10119 return remap_pfn_range(vma, vma->vm_start, pfn, sz, vma->vm_page_prot);
10120}
10121
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010122#else /* !CONFIG_MMU */
10123
10124static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
10125{
10126 return vma->vm_flags & (VM_SHARED | VM_MAYSHARE) ? 0 : -EINVAL;
10127}
10128
10129static unsigned int io_uring_nommu_mmap_capabilities(struct file *file)
10130{
10131 return NOMMU_MAP_DIRECT | NOMMU_MAP_READ | NOMMU_MAP_WRITE;
10132}
10133
10134static unsigned long io_uring_nommu_get_unmapped_area(struct file *file,
10135 unsigned long addr, unsigned long len,
10136 unsigned long pgoff, unsigned long flags)
10137{
10138 void *ptr;
10139
10140 ptr = io_uring_validate_mmap_request(file, pgoff, len);
10141 if (IS_ERR(ptr))
10142 return PTR_ERR(ptr);
10143
10144 return (unsigned long) ptr;
10145}
10146
10147#endif /* !CONFIG_MMU */
10148
Pavel Begunkovd9d05212021-01-08 20:57:25 +000010149static int io_sqpoll_wait_sq(struct io_ring_ctx *ctx)
Jens Axboe90554202020-09-03 12:12:41 -060010150{
10151 DEFINE_WAIT(wait);
10152
10153 do {
10154 if (!io_sqring_full(ctx))
10155 break;
Jens Axboe90554202020-09-03 12:12:41 -060010156 prepare_to_wait(&ctx->sqo_sq_wait, &wait, TASK_INTERRUPTIBLE);
10157
10158 if (!io_sqring_full(ctx))
10159 break;
Jens Axboe90554202020-09-03 12:12:41 -060010160 schedule();
10161 } while (!signal_pending(current));
10162
10163 finish_wait(&ctx->sqo_sq_wait, &wait);
Yang Li51993282021-03-09 14:30:41 +080010164 return 0;
Jens Axboe90554202020-09-03 12:12:41 -060010165}
10166
Hao Xuc73ebb62020-11-03 10:54:37 +080010167static int io_get_ext_arg(unsigned flags, const void __user *argp, size_t *argsz,
10168 struct __kernel_timespec __user **ts,
10169 const sigset_t __user **sig)
10170{
10171 struct io_uring_getevents_arg arg;
10172
10173 /*
10174 * If EXT_ARG isn't set, then we have no timespec and the argp pointer
10175 * is just a pointer to the sigset_t.
10176 */
10177 if (!(flags & IORING_ENTER_EXT_ARG)) {
10178 *sig = (const sigset_t __user *) argp;
10179 *ts = NULL;
10180 return 0;
10181 }
10182
10183 /*
10184 * EXT_ARG is set - ensure we agree on the size of it and copy in our
10185 * timespec and sigset_t pointers if good.
10186 */
10187 if (*argsz != sizeof(arg))
10188 return -EINVAL;
10189 if (copy_from_user(&arg, argp, sizeof(arg)))
10190 return -EFAULT;
Dylan Yudaken99475482022-04-12 09:30:42 -070010191 if (arg.pad)
10192 return -EINVAL;
Hao Xuc73ebb62020-11-03 10:54:37 +080010193 *sig = u64_to_user_ptr(arg.sigmask);
10194 *argsz = arg.sigmask_sz;
10195 *ts = u64_to_user_ptr(arg.ts);
10196 return 0;
10197}
10198
Jens Axboe2b188cc2019-01-07 10:46:33 -070010199SYSCALL_DEFINE6(io_uring_enter, unsigned int, fd, u32, to_submit,
Hao Xuc73ebb62020-11-03 10:54:37 +080010200 u32, min_complete, u32, flags, const void __user *, argp,
10201 size_t, argsz)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010202{
10203 struct io_ring_ctx *ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010204 int submitted = 0;
10205 struct fd f;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010206 long ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010207
Jens Axboe4c6e2772020-07-01 11:29:10 -060010208 io_run_task_work();
Jens Axboeb41e9852020-02-17 09:52:41 -070010209
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010210 if (unlikely(flags & ~(IORING_ENTER_GETEVENTS | IORING_ENTER_SQ_WAKEUP |
10211 IORING_ENTER_SQ_WAIT | IORING_ENTER_EXT_ARG)))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010212 return -EINVAL;
10213
10214 f = fdget(fd);
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010215 if (unlikely(!f.file))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010216 return -EBADF;
10217
10218 ret = -EOPNOTSUPP;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010219 if (unlikely(f.file->f_op != &io_uring_fops))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010220 goto out_fput;
10221
10222 ret = -ENXIO;
10223 ctx = f.file->private_data;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010224 if (unlikely(!percpu_ref_tryget(&ctx->refs)))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010225 goto out_fput;
10226
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010227 ret = -EBADFD;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010228 if (unlikely(ctx->flags & IORING_SETUP_R_DISABLED))
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010229 goto out;
10230
Jens Axboe6c271ce2019-01-10 11:22:30 -070010231 /*
10232 * For SQ polling, the thread will do all submissions and completions.
10233 * Just return the requested submit count, and wake the thread if
10234 * we were asked to.
10235 */
Jens Axboeb2a9ead2019-09-12 14:19:16 -060010236 ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -070010237 if (ctx->flags & IORING_SETUP_SQPOLL) {
Pavel Begunkov90f67362021-08-09 20:18:12 +010010238 io_cqring_overflow_flush(ctx);
Pavel Begunkov89448c42020-12-17 00:24:39 +000010239
Jens Axboe21f96522021-08-14 09:04:40 -060010240 if (unlikely(ctx->sq_data->thread == NULL)) {
10241 ret = -EOWNERDEAD;
Stefan Metzmacher04147482021-03-07 11:54:29 +010010242 goto out;
Jens Axboe21f96522021-08-14 09:04:40 -060010243 }
Jens Axboe6c271ce2019-01-10 11:22:30 -070010244 if (flags & IORING_ENTER_SQ_WAKEUP)
Jens Axboe534ca6d2020-09-02 13:52:19 -060010245 wake_up(&ctx->sq_data->wait);
Pavel Begunkovd9d05212021-01-08 20:57:25 +000010246 if (flags & IORING_ENTER_SQ_WAIT) {
10247 ret = io_sqpoll_wait_sq(ctx);
10248 if (ret)
10249 goto out;
10250 }
Jens Axboe6c271ce2019-01-10 11:22:30 -070010251 submitted = to_submit;
Jens Axboeb2a9ead2019-09-12 14:19:16 -060010252 } else if (to_submit) {
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010253 ret = io_uring_add_tctx_node(ctx);
Jens Axboe0f212202020-09-13 13:09:39 -060010254 if (unlikely(ret))
10255 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010256 mutex_lock(&ctx->uring_lock);
Jens Axboe0f212202020-09-13 13:09:39 -060010257 submitted = io_submit_sqes(ctx, to_submit);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010258 mutex_unlock(&ctx->uring_lock);
Pavel Begunkov7c504e652019-12-18 19:53:45 +030010259
10260 if (submitted != to_submit)
10261 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010262 }
10263 if (flags & IORING_ENTER_GETEVENTS) {
Hao Xuc73ebb62020-11-03 10:54:37 +080010264 const sigset_t __user *sig;
10265 struct __kernel_timespec __user *ts;
10266
10267 ret = io_get_ext_arg(flags, argp, &argsz, &ts, &sig);
10268 if (unlikely(ret))
10269 goto out;
10270
Jens Axboe2b188cc2019-01-07 10:46:33 -070010271 min_complete = min(min_complete, ctx->cq_entries);
10272
Xiaoguang Wang32b22442020-03-11 09:26:09 +080010273 /*
10274 * When SETUP_IOPOLL and SETUP_SQPOLL are both enabled, user
10275 * space applications don't need to do io completion events
10276 * polling again, they can rely on io_sq_thread to do polling
10277 * work, which can reduce cpu usage and uring_lock contention.
10278 */
10279 if (ctx->flags & IORING_SETUP_IOPOLL &&
10280 !(ctx->flags & IORING_SETUP_SQPOLL)) {
Pavel Begunkov7668b922020-07-07 16:36:21 +030010281 ret = io_iopoll_check(ctx, min_complete);
Jens Axboedef596e2019-01-09 08:59:42 -070010282 } else {
Hao Xuc73ebb62020-11-03 10:54:37 +080010283 ret = io_cqring_wait(ctx, min_complete, sig, argsz, ts);
Jens Axboedef596e2019-01-09 08:59:42 -070010284 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010285 }
10286
Pavel Begunkov7c504e652019-12-18 19:53:45 +030010287out:
Pavel Begunkov6805b322019-10-08 02:18:42 +030010288 percpu_ref_put(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010289out_fput:
10290 fdput(f);
10291 return submitted ? submitted : ret;
10292}
10293
Tobias Klauserbebdb652020-02-26 18:38:32 +010010294#ifdef CONFIG_PROC_FS
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010295static int io_uring_show_cred(struct seq_file *m, unsigned int id,
10296 const struct cred *cred)
Jens Axboe87ce9552020-01-30 08:25:34 -070010297{
Jens Axboe87ce9552020-01-30 08:25:34 -070010298 struct user_namespace *uns = seq_user_ns(m);
10299 struct group_info *gi;
10300 kernel_cap_t cap;
10301 unsigned __capi;
10302 int g;
10303
10304 seq_printf(m, "%5d\n", id);
10305 seq_put_decimal_ull(m, "\tUid:\t", from_kuid_munged(uns, cred->uid));
10306 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->euid));
10307 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid));
10308 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->fsuid));
10309 seq_put_decimal_ull(m, "\n\tGid:\t", from_kgid_munged(uns, cred->gid));
10310 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->egid));
10311 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->sgid));
10312 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->fsgid));
10313 seq_puts(m, "\n\tGroups:\t");
10314 gi = cred->group_info;
10315 for (g = 0; g < gi->ngroups; g++) {
10316 seq_put_decimal_ull(m, g ? " " : "",
10317 from_kgid_munged(uns, gi->gid[g]));
10318 }
10319 seq_puts(m, "\n\tCapEff:\t");
10320 cap = cred->cap_effective;
10321 CAP_FOR_EACH_U32(__capi)
10322 seq_put_hex_ll(m, NULL, cap.cap[CAP_LAST_U32 - __capi], 8);
10323 seq_putc(m, '\n');
10324 return 0;
10325}
10326
10327static void __io_uring_show_fdinfo(struct io_ring_ctx *ctx, struct seq_file *m)
10328{
Joseph Qidbbe9c62020-09-29 09:01:22 -060010329 struct io_sq_data *sq = NULL;
Jens Axboefad8e0d2020-09-28 08:57:48 -060010330 bool has_lock;
Jens Axboe87ce9552020-01-30 08:25:34 -070010331 int i;
10332
Jens Axboefad8e0d2020-09-28 08:57:48 -060010333 /*
10334 * Avoid ABBA deadlock between the seq lock and the io_uring mutex,
10335 * since fdinfo case grabs it in the opposite direction of normal use
10336 * cases. If we fail to get the lock, we just don't iterate any
10337 * structures that could be going away outside the io_uring mutex.
10338 */
10339 has_lock = mutex_trylock(&ctx->uring_lock);
10340
Jens Axboe5f3f26f2021-02-25 10:17:46 -070010341 if (has_lock && (ctx->flags & IORING_SETUP_SQPOLL)) {
Joseph Qidbbe9c62020-09-29 09:01:22 -060010342 sq = ctx->sq_data;
Jens Axboe5f3f26f2021-02-25 10:17:46 -070010343 if (!sq->thread)
10344 sq = NULL;
10345 }
Joseph Qidbbe9c62020-09-29 09:01:22 -060010346
10347 seq_printf(m, "SqThread:\t%d\n", sq ? task_pid_nr(sq->thread) : -1);
10348 seq_printf(m, "SqThreadCpu:\t%d\n", sq ? task_cpu(sq->thread) : -1);
Jens Axboe87ce9552020-01-30 08:25:34 -070010349 seq_printf(m, "UserFiles:\t%u\n", ctx->nr_user_files);
Jens Axboefad8e0d2020-09-28 08:57:48 -060010350 for (i = 0; has_lock && i < ctx->nr_user_files; i++) {
Jens Axboe7b29f922021-03-12 08:30:14 -070010351 struct file *f = io_file_from_index(ctx, i);
Jens Axboe87ce9552020-01-30 08:25:34 -070010352
Jens Axboe87ce9552020-01-30 08:25:34 -070010353 if (f)
10354 seq_printf(m, "%5u: %s\n", i, file_dentry(f)->d_iname);
10355 else
10356 seq_printf(m, "%5u: <none>\n", i);
10357 }
10358 seq_printf(m, "UserBufs:\t%u\n", ctx->nr_user_bufs);
Jens Axboefad8e0d2020-09-28 08:57:48 -060010359 for (i = 0; has_lock && i < ctx->nr_user_bufs; i++) {
Pavel Begunkov41edf1a2021-04-25 14:32:23 +010010360 struct io_mapped_ubuf *buf = ctx->user_bufs[i];
Pavel Begunkov4751f532021-04-01 15:43:55 +010010361 unsigned int len = buf->ubuf_end - buf->ubuf;
Jens Axboe87ce9552020-01-30 08:25:34 -070010362
Pavel Begunkov4751f532021-04-01 15:43:55 +010010363 seq_printf(m, "%5u: 0x%llx/%u\n", i, buf->ubuf, len);
Jens Axboe87ce9552020-01-30 08:25:34 -070010364 }
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010365 if (has_lock && !xa_empty(&ctx->personalities)) {
10366 unsigned long index;
10367 const struct cred *cred;
10368
Jens Axboe87ce9552020-01-30 08:25:34 -070010369 seq_printf(m, "Personalities:\n");
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010370 xa_for_each(&ctx->personalities, index, cred)
10371 io_uring_show_cred(m, index, cred);
Jens Axboe87ce9552020-01-30 08:25:34 -070010372 }
Jens Axboed7718a92020-02-14 22:23:12 -070010373 seq_printf(m, "PollList:\n");
Jens Axboe79ebeae2021-08-10 15:18:27 -060010374 spin_lock(&ctx->completion_lock);
Jens Axboed7718a92020-02-14 22:23:12 -070010375 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
10376 struct hlist_head *list = &ctx->cancel_hash[i];
10377 struct io_kiocb *req;
10378
10379 hlist_for_each_entry(req, list, hash_node)
10380 seq_printf(m, " op=%d, task_works=%d\n", req->opcode,
10381 req->task->task_works != NULL);
10382 }
Jens Axboe79ebeae2021-08-10 15:18:27 -060010383 spin_unlock(&ctx->completion_lock);
Jens Axboefad8e0d2020-09-28 08:57:48 -060010384 if (has_lock)
10385 mutex_unlock(&ctx->uring_lock);
Jens Axboe87ce9552020-01-30 08:25:34 -070010386}
10387
10388static void io_uring_show_fdinfo(struct seq_file *m, struct file *f)
10389{
10390 struct io_ring_ctx *ctx = f->private_data;
10391
10392 if (percpu_ref_tryget(&ctx->refs)) {
10393 __io_uring_show_fdinfo(ctx, m);
10394 percpu_ref_put(&ctx->refs);
10395 }
10396}
Tobias Klauserbebdb652020-02-26 18:38:32 +010010397#endif
Jens Axboe87ce9552020-01-30 08:25:34 -070010398
Jens Axboe2b188cc2019-01-07 10:46:33 -070010399static const struct file_operations io_uring_fops = {
10400 .release = io_uring_release,
10401 .mmap = io_uring_mmap,
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010402#ifndef CONFIG_MMU
10403 .get_unmapped_area = io_uring_nommu_get_unmapped_area,
10404 .mmap_capabilities = io_uring_nommu_mmap_capabilities,
10405#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -070010406 .poll = io_uring_poll,
Tobias Klauserbebdb652020-02-26 18:38:32 +010010407#ifdef CONFIG_PROC_FS
Jens Axboe87ce9552020-01-30 08:25:34 -070010408 .show_fdinfo = io_uring_show_fdinfo,
Tobias Klauserbebdb652020-02-26 18:38:32 +010010409#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -070010410};
10411
10412static int io_allocate_scq_urings(struct io_ring_ctx *ctx,
10413 struct io_uring_params *p)
10414{
Hristo Venev75b28af2019-08-26 17:23:46 +000010415 struct io_rings *rings;
10416 size_t size, sq_array_offset;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010417
Jens Axboebd740482020-08-05 12:58:23 -060010418 /* make sure these are sane, as we already accounted them */
10419 ctx->sq_entries = p->sq_entries;
10420 ctx->cq_entries = p->cq_entries;
10421
Hristo Venev75b28af2019-08-26 17:23:46 +000010422 size = rings_size(p->sq_entries, p->cq_entries, &sq_array_offset);
10423 if (size == SIZE_MAX)
10424 return -EOVERFLOW;
10425
10426 rings = io_mem_alloc(size);
10427 if (!rings)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010428 return -ENOMEM;
10429
Hristo Venev75b28af2019-08-26 17:23:46 +000010430 ctx->rings = rings;
10431 ctx->sq_array = (u32 *)((char *)rings + sq_array_offset);
10432 rings->sq_ring_mask = p->sq_entries - 1;
10433 rings->cq_ring_mask = p->cq_entries - 1;
10434 rings->sq_ring_entries = p->sq_entries;
10435 rings->cq_ring_entries = p->cq_entries;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010436
10437 size = array_size(sizeof(struct io_uring_sqe), p->sq_entries);
Jens Axboeeb065d32019-11-20 09:26:29 -070010438 if (size == SIZE_MAX) {
10439 io_mem_free(ctx->rings);
10440 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010441 return -EOVERFLOW;
Jens Axboeeb065d32019-11-20 09:26:29 -070010442 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010443
10444 ctx->sq_sqes = io_mem_alloc(size);
Jens Axboeeb065d32019-11-20 09:26:29 -070010445 if (!ctx->sq_sqes) {
10446 io_mem_free(ctx->rings);
10447 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010448 return -ENOMEM;
Jens Axboeeb065d32019-11-20 09:26:29 -070010449 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010450
Jens Axboe2b188cc2019-01-07 10:46:33 -070010451 return 0;
10452}
10453
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010454static int io_uring_install_fd(struct io_ring_ctx *ctx, struct file *file)
10455{
10456 int ret, fd;
10457
10458 fd = get_unused_fd_flags(O_RDWR | O_CLOEXEC);
10459 if (fd < 0)
10460 return fd;
10461
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010462 ret = io_uring_add_tctx_node(ctx);
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010463 if (ret) {
10464 put_unused_fd(fd);
10465 return ret;
10466 }
10467 fd_install(fd, file);
10468 return fd;
10469}
10470
Jens Axboe2b188cc2019-01-07 10:46:33 -070010471/*
10472 * Allocate an anonymous fd, this is what constitutes the application
10473 * visible backing of an io_uring instance. The application mmaps this
10474 * fd to gain access to the SQ/CQ ring details. If UNIX sockets are enabled,
10475 * we have to tie this fd to a socket for file garbage collection purposes.
10476 */
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010477static struct file *io_uring_get_file(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010478{
10479 struct file *file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010480#if defined(CONFIG_UNIX)
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010481 int ret;
10482
Jens Axboe2b188cc2019-01-07 10:46:33 -070010483 ret = sock_create_kern(&init_net, PF_UNIX, SOCK_RAW, IPPROTO_IP,
10484 &ctx->ring_sock);
10485 if (ret)
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010486 return ERR_PTR(ret);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010487#endif
10488
Jens Axboe2b188cc2019-01-07 10:46:33 -070010489 file = anon_inode_getfile("[io_uring]", &io_uring_fops, ctx,
10490 O_RDWR | O_CLOEXEC);
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010491#if defined(CONFIG_UNIX)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010492 if (IS_ERR(file)) {
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010493 sock_release(ctx->ring_sock);
10494 ctx->ring_sock = NULL;
10495 } else {
10496 ctx->ring_sock->file = file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010497 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010498#endif
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010499 return file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010500}
10501
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010502static int io_uring_create(unsigned entries, struct io_uring_params *p,
10503 struct io_uring_params __user *params)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010504{
Jens Axboe2b188cc2019-01-07 10:46:33 -070010505 struct io_ring_ctx *ctx;
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010506 struct file *file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010507 int ret;
10508
Jens Axboe8110c1a2019-12-28 15:39:54 -070010509 if (!entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010510 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -070010511 if (entries > IORING_MAX_ENTRIES) {
10512 if (!(p->flags & IORING_SETUP_CLAMP))
10513 return -EINVAL;
10514 entries = IORING_MAX_ENTRIES;
10515 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010516
10517 /*
10518 * Use twice as many entries for the CQ ring. It's possible for the
10519 * application to drive a higher depth than the size of the SQ ring,
10520 * since the sqes are only used at submission time. This allows for
Jens Axboe33a107f2019-10-04 12:10:03 -060010521 * some flexibility in overcommitting a bit. If the application has
10522 * set IORING_SETUP_CQSIZE, it will have passed in the desired number
10523 * of CQ ring entries manually.
Jens Axboe2b188cc2019-01-07 10:46:33 -070010524 */
10525 p->sq_entries = roundup_pow_of_two(entries);
Jens Axboe33a107f2019-10-04 12:10:03 -060010526 if (p->flags & IORING_SETUP_CQSIZE) {
10527 /*
10528 * If IORING_SETUP_CQSIZE is set, we do the same roundup
10529 * to a power-of-two, if it isn't already. We do NOT impose
10530 * any cq vs sq ring sizing.
10531 */
Joseph Qieb2667b32020-11-24 15:03:03 +080010532 if (!p->cq_entries)
Jens Axboe33a107f2019-10-04 12:10:03 -060010533 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -070010534 if (p->cq_entries > IORING_MAX_CQ_ENTRIES) {
10535 if (!(p->flags & IORING_SETUP_CLAMP))
10536 return -EINVAL;
10537 p->cq_entries = IORING_MAX_CQ_ENTRIES;
10538 }
Joseph Qieb2667b32020-11-24 15:03:03 +080010539 p->cq_entries = roundup_pow_of_two(p->cq_entries);
10540 if (p->cq_entries < p->sq_entries)
10541 return -EINVAL;
Jens Axboe33a107f2019-10-04 12:10:03 -060010542 } else {
10543 p->cq_entries = 2 * p->sq_entries;
10544 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010545
Jens Axboe2b188cc2019-01-07 10:46:33 -070010546 ctx = io_ring_ctx_alloc(p);
Jens Axboe62e398b2021-02-21 16:19:37 -070010547 if (!ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010548 return -ENOMEM;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010549 ctx->compat = in_compat_syscall();
Jens Axboe62e398b2021-02-21 16:19:37 -070010550 if (!capable(CAP_IPC_LOCK))
10551 ctx->user = get_uid(current_user());
Jens Axboe2aede0e2020-09-14 10:45:53 -060010552
10553 /*
10554 * This is just grabbed for accounting purposes. When a process exits,
10555 * the mm is exited and dropped before the files, hence we need to hang
10556 * on to this mm purely for the purposes of being able to unaccount
10557 * memory (locked/pinned vm). It's not used for anything else.
10558 */
Jens Axboe6b7898e2020-08-25 07:58:00 -060010559 mmgrab(current->mm);
Jens Axboe2aede0e2020-09-14 10:45:53 -060010560 ctx->mm_account = current->mm;
Jens Axboe6b7898e2020-08-25 07:58:00 -060010561
Jens Axboe2b188cc2019-01-07 10:46:33 -070010562 ret = io_allocate_scq_urings(ctx, p);
10563 if (ret)
10564 goto err;
10565
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010566 ret = io_sq_offload_create(ctx, p);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010567 if (ret)
10568 goto err;
Pavel Begunkoveae071c2021-04-25 14:32:24 +010010569 /* always set a rsrc node */
Pavel Begunkov47b228c2021-04-29 11:46:48 +010010570 ret = io_rsrc_node_switch_start(ctx);
10571 if (ret)
10572 goto err;
Pavel Begunkoveae071c2021-04-25 14:32:24 +010010573 io_rsrc_node_switch(ctx, NULL);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010574
Jens Axboe2b188cc2019-01-07 10:46:33 -070010575 memset(&p->sq_off, 0, sizeof(p->sq_off));
Hristo Venev75b28af2019-08-26 17:23:46 +000010576 p->sq_off.head = offsetof(struct io_rings, sq.head);
10577 p->sq_off.tail = offsetof(struct io_rings, sq.tail);
10578 p->sq_off.ring_mask = offsetof(struct io_rings, sq_ring_mask);
10579 p->sq_off.ring_entries = offsetof(struct io_rings, sq_ring_entries);
10580 p->sq_off.flags = offsetof(struct io_rings, sq_flags);
10581 p->sq_off.dropped = offsetof(struct io_rings, sq_dropped);
10582 p->sq_off.array = (char *)ctx->sq_array - (char *)ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010583
10584 memset(&p->cq_off, 0, sizeof(p->cq_off));
Hristo Venev75b28af2019-08-26 17:23:46 +000010585 p->cq_off.head = offsetof(struct io_rings, cq.head);
10586 p->cq_off.tail = offsetof(struct io_rings, cq.tail);
10587 p->cq_off.ring_mask = offsetof(struct io_rings, cq_ring_mask);
10588 p->cq_off.ring_entries = offsetof(struct io_rings, cq_ring_entries);
10589 p->cq_off.overflow = offsetof(struct io_rings, cq_overflow);
10590 p->cq_off.cqes = offsetof(struct io_rings, cqes);
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +020010591 p->cq_off.flags = offsetof(struct io_rings, cq_flags);
Jens Axboeac90f242019-09-06 10:26:21 -060010592
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010593 p->features = IORING_FEAT_SINGLE_MMAP | IORING_FEAT_NODROP |
10594 IORING_FEAT_SUBMIT_STABLE | IORING_FEAT_RW_CUR_POS |
Jiufei Xue5769a352020-06-17 17:53:55 +080010595 IORING_FEAT_CUR_PERSONALITY | IORING_FEAT_FAST_POLL |
Hao Xuc73ebb62020-11-03 10:54:37 +080010596 IORING_FEAT_POLL_32BITS | IORING_FEAT_SQPOLL_NONFIXED |
Pavel Begunkov96905572021-06-10 16:37:38 +010010597 IORING_FEAT_EXT_ARG | IORING_FEAT_NATIVE_WORKERS |
10598 IORING_FEAT_RSRC_TAGS;
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010599
10600 if (copy_to_user(params, p, sizeof(*p))) {
10601 ret = -EFAULT;
10602 goto err;
10603 }
Jens Axboed1719f72020-07-30 13:43:53 -060010604
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010605 file = io_uring_get_file(ctx);
10606 if (IS_ERR(file)) {
10607 ret = PTR_ERR(file);
10608 goto err;
10609 }
10610
Jens Axboed1719f72020-07-30 13:43:53 -060010611 /*
Jens Axboe044c1ab2019-10-28 09:15:33 -060010612 * Install ring fd as the very last thing, so we don't risk someone
10613 * having closed it before we finish setup
10614 */
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010615 ret = io_uring_install_fd(ctx, file);
10616 if (ret < 0) {
10617 /* fput will clean it up */
10618 fput(file);
10619 return ret;
10620 }
Jens Axboe044c1ab2019-10-28 09:15:33 -060010621
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020010622 trace_io_uring_create(ret, ctx, p->sq_entries, p->cq_entries, p->flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010623 return ret;
10624err:
10625 io_ring_ctx_wait_and_kill(ctx);
10626 return ret;
10627}
10628
10629/*
10630 * Sets up an aio uring context, and returns the fd. Applications asks for a
10631 * ring size, we return the actual sq/cq ring sizes (among other things) in the
10632 * params structure passed in.
10633 */
10634static long io_uring_setup(u32 entries, struct io_uring_params __user *params)
10635{
10636 struct io_uring_params p;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010637 int i;
10638
10639 if (copy_from_user(&p, params, sizeof(p)))
10640 return -EFAULT;
10641 for (i = 0; i < ARRAY_SIZE(p.resv); i++) {
10642 if (p.resv[i])
10643 return -EINVAL;
10644 }
10645
Jens Axboe6c271ce2019-01-10 11:22:30 -070010646 if (p.flags & ~(IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL |
Jens Axboe8110c1a2019-12-28 15:39:54 -070010647 IORING_SETUP_SQ_AFF | IORING_SETUP_CQSIZE |
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010648 IORING_SETUP_CLAMP | IORING_SETUP_ATTACH_WQ |
10649 IORING_SETUP_R_DISABLED))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010650 return -EINVAL;
10651
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010652 return io_uring_create(entries, &p, params);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010653}
10654
10655SYSCALL_DEFINE2(io_uring_setup, u32, entries,
10656 struct io_uring_params __user *, params)
10657{
10658 return io_uring_setup(entries, params);
10659}
10660
Jens Axboe66f4af92020-01-16 15:36:52 -070010661static int io_probe(struct io_ring_ctx *ctx, void __user *arg, unsigned nr_args)
10662{
10663 struct io_uring_probe *p;
10664 size_t size;
10665 int i, ret;
10666
10667 size = struct_size(p, ops, nr_args);
10668 if (size == SIZE_MAX)
10669 return -EOVERFLOW;
10670 p = kzalloc(size, GFP_KERNEL);
10671 if (!p)
10672 return -ENOMEM;
10673
10674 ret = -EFAULT;
10675 if (copy_from_user(p, arg, size))
10676 goto out;
10677 ret = -EINVAL;
10678 if (memchr_inv(p, 0, size))
10679 goto out;
10680
10681 p->last_op = IORING_OP_LAST - 1;
10682 if (nr_args > IORING_OP_LAST)
10683 nr_args = IORING_OP_LAST;
10684
10685 for (i = 0; i < nr_args; i++) {
10686 p->ops[i].op = i;
10687 if (!io_op_defs[i].not_supported)
10688 p->ops[i].flags = IO_URING_OP_SUPPORTED;
10689 }
10690 p->ops_len = i;
10691
10692 ret = 0;
10693 if (copy_to_user(arg, p, size))
10694 ret = -EFAULT;
10695out:
10696 kfree(p);
10697 return ret;
10698}
10699
Jens Axboe071698e2020-01-28 10:04:42 -070010700static int io_register_personality(struct io_ring_ctx *ctx)
10701{
Jens Axboe4379bf82021-02-15 13:40:22 -070010702 const struct cred *creds;
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010703 u32 id;
Jens Axboe1e6fa522020-10-15 08:46:24 -060010704 int ret;
Jens Axboe071698e2020-01-28 10:04:42 -070010705
Jens Axboe4379bf82021-02-15 13:40:22 -070010706 creds = get_current_cred();
Jens Axboe1e6fa522020-10-15 08:46:24 -060010707
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010708 ret = xa_alloc_cyclic(&ctx->personalities, &id, (void *)creds,
10709 XA_LIMIT(0, USHRT_MAX), &ctx->pers_next, GFP_KERNEL);
Jens Axboea30f8952021-08-20 14:53:59 -060010710 if (ret < 0) {
10711 put_cred(creds);
10712 return ret;
10713 }
10714 return id;
Jens Axboe071698e2020-01-28 10:04:42 -070010715}
10716
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010717static int io_register_restrictions(struct io_ring_ctx *ctx, void __user *arg,
10718 unsigned int nr_args)
10719{
10720 struct io_uring_restriction *res;
10721 size_t size;
10722 int i, ret;
10723
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010724 /* Restrictions allowed only if rings started disabled */
10725 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
10726 return -EBADFD;
10727
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010728 /* We allow only a single restrictions registration */
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010729 if (ctx->restrictions.registered)
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010730 return -EBUSY;
10731
10732 if (!arg || nr_args > IORING_MAX_RESTRICTIONS)
10733 return -EINVAL;
10734
10735 size = array_size(nr_args, sizeof(*res));
10736 if (size == SIZE_MAX)
10737 return -EOVERFLOW;
10738
10739 res = memdup_user(arg, size);
10740 if (IS_ERR(res))
10741 return PTR_ERR(res);
10742
10743 ret = 0;
10744
10745 for (i = 0; i < nr_args; i++) {
10746 switch (res[i].opcode) {
10747 case IORING_RESTRICTION_REGISTER_OP:
10748 if (res[i].register_op >= IORING_REGISTER_LAST) {
10749 ret = -EINVAL;
10750 goto out;
10751 }
10752
10753 __set_bit(res[i].register_op,
10754 ctx->restrictions.register_op);
10755 break;
10756 case IORING_RESTRICTION_SQE_OP:
10757 if (res[i].sqe_op >= IORING_OP_LAST) {
10758 ret = -EINVAL;
10759 goto out;
10760 }
10761
10762 __set_bit(res[i].sqe_op, ctx->restrictions.sqe_op);
10763 break;
10764 case IORING_RESTRICTION_SQE_FLAGS_ALLOWED:
10765 ctx->restrictions.sqe_flags_allowed = res[i].sqe_flags;
10766 break;
10767 case IORING_RESTRICTION_SQE_FLAGS_REQUIRED:
10768 ctx->restrictions.sqe_flags_required = res[i].sqe_flags;
10769 break;
10770 default:
10771 ret = -EINVAL;
10772 goto out;
10773 }
10774 }
10775
10776out:
10777 /* Reset all restrictions if an error happened */
10778 if (ret != 0)
10779 memset(&ctx->restrictions, 0, sizeof(ctx->restrictions));
10780 else
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010781 ctx->restrictions.registered = true;
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010782
10783 kfree(res);
10784 return ret;
10785}
10786
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010787static int io_register_enable_rings(struct io_ring_ctx *ctx)
10788{
10789 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
10790 return -EBADFD;
10791
10792 if (ctx->restrictions.registered)
10793 ctx->restricted = 1;
10794
Pavel Begunkov0298ef92021-03-08 13:20:57 +000010795 ctx->flags &= ~IORING_SETUP_R_DISABLED;
10796 if (ctx->sq_data && wq_has_sleeper(&ctx->sq_data->wait))
10797 wake_up(&ctx->sq_data->wait);
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010798 return 0;
10799}
10800
Pavel Begunkovfdecb662021-04-25 14:32:20 +010010801static int __io_register_rsrc_update(struct io_ring_ctx *ctx, unsigned type,
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010802 struct io_uring_rsrc_update2 *up,
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010803 unsigned nr_args)
10804{
10805 __u32 tmp;
10806 int err;
10807
10808 if (check_add_overflow(up->offset, nr_args, &tmp))
10809 return -EOVERFLOW;
10810 err = io_rsrc_node_switch_start(ctx);
10811 if (err)
10812 return err;
10813
Pavel Begunkovfdecb662021-04-25 14:32:20 +010010814 switch (type) {
10815 case IORING_RSRC_FILE:
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010816 return __io_sqe_files_update(ctx, up, nr_args);
Pavel Begunkov634d00d2021-04-25 14:32:26 +010010817 case IORING_RSRC_BUFFER:
10818 return __io_sqe_buffers_update(ctx, up, nr_args);
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010819 }
10820 return -EINVAL;
10821}
10822
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010823static int io_register_files_update(struct io_ring_ctx *ctx, void __user *arg,
10824 unsigned nr_args)
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010825{
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010826 struct io_uring_rsrc_update2 up;
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010827
10828 if (!nr_args)
10829 return -EINVAL;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010830 memset(&up, 0, sizeof(up));
10831 if (copy_from_user(&up, arg, sizeof(struct io_uring_rsrc_update)))
10832 return -EFAULT;
Dylan Yudaken7a7c9f92022-04-12 09:30:40 -070010833 if (up.resv || up.resv2)
Dylan Yudaken22aa1592022-04-12 09:30:39 -070010834 return -EINVAL;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010835 return __io_register_rsrc_update(ctx, IORING_RSRC_FILE, &up, nr_args);
10836}
10837
10838static int io_register_rsrc_update(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov992da012021-06-10 16:37:37 +010010839 unsigned size, unsigned type)
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010840{
10841 struct io_uring_rsrc_update2 up;
10842
10843 if (size != sizeof(up))
10844 return -EINVAL;
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010845 if (copy_from_user(&up, arg, sizeof(up)))
10846 return -EFAULT;
Dylan Yudaken7a7c9f92022-04-12 09:30:40 -070010847 if (!up.nr || up.resv || up.resv2)
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010848 return -EINVAL;
Pavel Begunkov992da012021-06-10 16:37:37 +010010849 return __io_register_rsrc_update(ctx, type, &up, up.nr);
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010850}
10851
Pavel Begunkov792e3582021-04-25 14:32:21 +010010852static int io_register_rsrc(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov992da012021-06-10 16:37:37 +010010853 unsigned int size, unsigned int type)
Pavel Begunkov792e3582021-04-25 14:32:21 +010010854{
10855 struct io_uring_rsrc_register rr;
10856
10857 /* keep it extendible */
10858 if (size != sizeof(rr))
10859 return -EINVAL;
10860
10861 memset(&rr, 0, sizeof(rr));
10862 if (copy_from_user(&rr, arg, size))
10863 return -EFAULT;
Pavel Begunkov992da012021-06-10 16:37:37 +010010864 if (!rr.nr || rr.resv || rr.resv2)
Pavel Begunkov792e3582021-04-25 14:32:21 +010010865 return -EINVAL;
10866
Pavel Begunkov992da012021-06-10 16:37:37 +010010867 switch (type) {
Pavel Begunkov792e3582021-04-25 14:32:21 +010010868 case IORING_RSRC_FILE:
10869 return io_sqe_files_register(ctx, u64_to_user_ptr(rr.data),
10870 rr.nr, u64_to_user_ptr(rr.tags));
Pavel Begunkov634d00d2021-04-25 14:32:26 +010010871 case IORING_RSRC_BUFFER:
10872 return io_sqe_buffers_register(ctx, u64_to_user_ptr(rr.data),
10873 rr.nr, u64_to_user_ptr(rr.tags));
Pavel Begunkov792e3582021-04-25 14:32:21 +010010874 }
10875 return -EINVAL;
10876}
10877
Jens Axboefe764212021-06-17 10:19:54 -060010878static int io_register_iowq_aff(struct io_ring_ctx *ctx, void __user *arg,
10879 unsigned len)
10880{
10881 struct io_uring_task *tctx = current->io_uring;
10882 cpumask_var_t new_mask;
10883 int ret;
10884
10885 if (!tctx || !tctx->io_wq)
10886 return -EINVAL;
10887
10888 if (!alloc_cpumask_var(&new_mask, GFP_KERNEL))
10889 return -ENOMEM;
10890
10891 cpumask_clear(new_mask);
10892 if (len > cpumask_size())
10893 len = cpumask_size();
10894
Eugene Syromiatnikovfe223dd2022-04-06 13:55:33 +020010895 if (in_compat_syscall()) {
10896 ret = compat_get_bitmap(cpumask_bits(new_mask),
10897 (const compat_ulong_t __user *)arg,
10898 len * 8 /* CHAR_BIT */);
10899 } else {
10900 ret = copy_from_user(new_mask, arg, len);
10901 }
10902
10903 if (ret) {
Jens Axboefe764212021-06-17 10:19:54 -060010904 free_cpumask_var(new_mask);
10905 return -EFAULT;
10906 }
10907
10908 ret = io_wq_cpu_affinity(tctx->io_wq, new_mask);
10909 free_cpumask_var(new_mask);
10910 return ret;
10911}
10912
10913static int io_unregister_iowq_aff(struct io_ring_ctx *ctx)
10914{
10915 struct io_uring_task *tctx = current->io_uring;
10916
10917 if (!tctx || !tctx->io_wq)
10918 return -EINVAL;
10919
10920 return io_wq_cpu_affinity(tctx->io_wq, NULL);
10921}
10922
Jens Axboe2e480052021-08-27 11:33:19 -060010923static int io_register_iowq_max_workers(struct io_ring_ctx *ctx,
10924 void __user *arg)
Pavel Begunkovb22fa622021-10-21 13:20:29 +010010925 __must_hold(&ctx->uring_lock)
Jens Axboe2e480052021-08-27 11:33:19 -060010926{
Pavel Begunkovb22fa622021-10-21 13:20:29 +010010927 struct io_tctx_node *node;
Jens Axboefa846932021-09-01 14:15:59 -060010928 struct io_uring_task *tctx = NULL;
10929 struct io_sq_data *sqd = NULL;
Jens Axboe2e480052021-08-27 11:33:19 -060010930 __u32 new_count[2];
10931 int i, ret;
10932
Jens Axboe2e480052021-08-27 11:33:19 -060010933 if (copy_from_user(new_count, arg, sizeof(new_count)))
10934 return -EFAULT;
10935 for (i = 0; i < ARRAY_SIZE(new_count); i++)
10936 if (new_count[i] > INT_MAX)
10937 return -EINVAL;
10938
Jens Axboefa846932021-09-01 14:15:59 -060010939 if (ctx->flags & IORING_SETUP_SQPOLL) {
10940 sqd = ctx->sq_data;
10941 if (sqd) {
Jens Axboe009ad9f2021-09-08 19:07:26 -060010942 /*
10943 * Observe the correct sqd->lock -> ctx->uring_lock
10944 * ordering. Fine to drop uring_lock here, we hold
10945 * a ref to the ctx.
10946 */
Jens Axboe41d3a6b2021-09-13 13:08:51 -060010947 refcount_inc(&sqd->refs);
Jens Axboe009ad9f2021-09-08 19:07:26 -060010948 mutex_unlock(&ctx->uring_lock);
Jens Axboefa846932021-09-01 14:15:59 -060010949 mutex_lock(&sqd->lock);
Jens Axboe009ad9f2021-09-08 19:07:26 -060010950 mutex_lock(&ctx->uring_lock);
Jens Axboe41d3a6b2021-09-13 13:08:51 -060010951 if (sqd->thread)
10952 tctx = sqd->thread->io_uring;
Jens Axboefa846932021-09-01 14:15:59 -060010953 }
10954 } else {
10955 tctx = current->io_uring;
10956 }
10957
Pavel Begunkove139a1e2021-10-19 23:43:46 +010010958 BUILD_BUG_ON(sizeof(new_count) != sizeof(ctx->iowq_limits));
Jens Axboefa846932021-09-01 14:15:59 -060010959
Pavel Begunkov4cac4872021-11-08 15:10:03 +000010960 for (i = 0; i < ARRAY_SIZE(new_count); i++)
10961 if (new_count[i])
10962 ctx->iowq_limits[i] = new_count[i];
Pavel Begunkove139a1e2021-10-19 23:43:46 +010010963 ctx->iowq_limits_set = true;
10964
10965 ret = -EINVAL;
10966 if (tctx && tctx->io_wq) {
10967 ret = io_wq_max_workers(tctx->io_wq, new_count);
10968 if (ret)
10969 goto err;
10970 } else {
10971 memset(new_count, 0, sizeof(new_count));
10972 }
Jens Axboefa846932021-09-01 14:15:59 -060010973
Jens Axboe41d3a6b2021-09-13 13:08:51 -060010974 if (sqd) {
Jens Axboefa846932021-09-01 14:15:59 -060010975 mutex_unlock(&sqd->lock);
Jens Axboe41d3a6b2021-09-13 13:08:51 -060010976 io_put_sq_data(sqd);
10977 }
Jens Axboe2e480052021-08-27 11:33:19 -060010978
10979 if (copy_to_user(arg, new_count, sizeof(new_count)))
10980 return -EFAULT;
10981
Pavel Begunkovb22fa622021-10-21 13:20:29 +010010982 /* that's it for SQPOLL, only the SQPOLL task creates requests */
10983 if (sqd)
10984 return 0;
10985
10986 /* now propagate the restriction to all registered users */
10987 list_for_each_entry(node, &ctx->tctx_list, ctx_node) {
10988 struct io_uring_task *tctx = node->task->io_uring;
10989
10990 if (WARN_ON_ONCE(!tctx->io_wq))
10991 continue;
10992
10993 for (i = 0; i < ARRAY_SIZE(new_count); i++)
10994 new_count[i] = ctx->iowq_limits[i];
10995 /* ignore errors, it always returns zero anyway */
10996 (void)io_wq_max_workers(tctx->io_wq, new_count);
10997 }
Jens Axboe2e480052021-08-27 11:33:19 -060010998 return 0;
Jens Axboefa846932021-09-01 14:15:59 -060010999err:
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011000 if (sqd) {
Jens Axboefa846932021-09-01 14:15:59 -060011001 mutex_unlock(&sqd->lock);
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011002 io_put_sq_data(sqd);
11003 }
Jens Axboefa846932021-09-01 14:15:59 -060011004 return ret;
Jens Axboe2e480052021-08-27 11:33:19 -060011005}
11006
Jens Axboe071698e2020-01-28 10:04:42 -070011007static bool io_register_op_must_quiesce(int op)
11008{
11009 switch (op) {
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +010011010 case IORING_REGISTER_BUFFERS:
11011 case IORING_UNREGISTER_BUFFERS:
Pavel Begunkovf4f7d212021-04-01 15:44:02 +010011012 case IORING_REGISTER_FILES:
Jens Axboe071698e2020-01-28 10:04:42 -070011013 case IORING_UNREGISTER_FILES:
11014 case IORING_REGISTER_FILES_UPDATE:
11015 case IORING_REGISTER_PROBE:
11016 case IORING_REGISTER_PERSONALITY:
11017 case IORING_UNREGISTER_PERSONALITY:
Pavel Begunkov992da012021-06-10 16:37:37 +010011018 case IORING_REGISTER_FILES2:
11019 case IORING_REGISTER_FILES_UPDATE2:
11020 case IORING_REGISTER_BUFFERS2:
11021 case IORING_REGISTER_BUFFERS_UPDATE:
Jens Axboefe764212021-06-17 10:19:54 -060011022 case IORING_REGISTER_IOWQ_AFF:
11023 case IORING_UNREGISTER_IOWQ_AFF:
Jens Axboe2e480052021-08-27 11:33:19 -060011024 case IORING_REGISTER_IOWQ_MAX_WORKERS:
Jens Axboe071698e2020-01-28 10:04:42 -070011025 return false;
11026 default:
11027 return true;
11028 }
11029}
11030
Pavel Begunkove73c5c72021-08-09 13:04:12 +010011031static int io_ctx_quiesce(struct io_ring_ctx *ctx)
11032{
11033 long ret;
11034
11035 percpu_ref_kill(&ctx->refs);
11036
11037 /*
11038 * Drop uring mutex before waiting for references to exit. If another
11039 * thread is currently inside io_uring_enter() it might need to grab the
11040 * uring_lock to make progress. If we hold it here across the drain
11041 * wait, then we can deadlock. It's safe to drop the mutex here, since
11042 * no new references will come in after we've killed the percpu ref.
11043 */
11044 mutex_unlock(&ctx->uring_lock);
11045 do {
11046 ret = wait_for_completion_interruptible(&ctx->ref_comp);
11047 if (!ret)
11048 break;
11049 ret = io_run_task_work_sig();
11050 } while (ret >= 0);
11051 mutex_lock(&ctx->uring_lock);
11052
11053 if (ret)
11054 io_refs_resurrect(&ctx->refs, &ctx->ref_comp);
11055 return ret;
11056}
11057
Jens Axboeedafcce2019-01-09 09:16:05 -070011058static int __io_uring_register(struct io_ring_ctx *ctx, unsigned opcode,
11059 void __user *arg, unsigned nr_args)
Jens Axboeb19062a2019-04-15 10:49:38 -060011060 __releases(ctx->uring_lock)
11061 __acquires(ctx->uring_lock)
Jens Axboeedafcce2019-01-09 09:16:05 -070011062{
11063 int ret;
11064
Jens Axboe35fa71a2019-04-22 10:23:23 -060011065 /*
11066 * We're inside the ring mutex, if the ref is already dying, then
11067 * someone else killed the ctx or is already going through
11068 * io_uring_register().
11069 */
11070 if (percpu_ref_is_dying(&ctx->refs))
11071 return -ENXIO;
11072
Pavel Begunkov75c40212021-04-15 13:07:40 +010011073 if (ctx->restricted) {
Pavel Begunkov75c40212021-04-15 13:07:40 +010011074 opcode = array_index_nospec(opcode, IORING_REGISTER_LAST);
11075 if (!test_bit(opcode, ctx->restrictions.register_op))
11076 return -EACCES;
11077 }
11078
Jens Axboe071698e2020-01-28 10:04:42 -070011079 if (io_register_op_must_quiesce(opcode)) {
Pavel Begunkove73c5c72021-08-09 13:04:12 +010011080 ret = io_ctx_quiesce(ctx);
11081 if (ret)
Pavel Begunkovf70865d2021-04-11 01:46:40 +010011082 return ret;
Jens Axboe05f3fb32019-12-09 11:22:50 -070011083 }
Jens Axboeedafcce2019-01-09 09:16:05 -070011084
11085 switch (opcode) {
11086 case IORING_REGISTER_BUFFERS:
Pavel Begunkov634d00d2021-04-25 14:32:26 +010011087 ret = io_sqe_buffers_register(ctx, arg, nr_args, NULL);
Jens Axboeedafcce2019-01-09 09:16:05 -070011088 break;
11089 case IORING_UNREGISTER_BUFFERS:
11090 ret = -EINVAL;
11091 if (arg || nr_args)
11092 break;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -080011093 ret = io_sqe_buffers_unregister(ctx);
Jens Axboeedafcce2019-01-09 09:16:05 -070011094 break;
Jens Axboe6b063142019-01-10 22:13:58 -070011095 case IORING_REGISTER_FILES:
Pavel Begunkov792e3582021-04-25 14:32:21 +010011096 ret = io_sqe_files_register(ctx, arg, nr_args, NULL);
Jens Axboe6b063142019-01-10 22:13:58 -070011097 break;
11098 case IORING_UNREGISTER_FILES:
11099 ret = -EINVAL;
11100 if (arg || nr_args)
11101 break;
11102 ret = io_sqe_files_unregister(ctx);
11103 break;
Jens Axboec3a31e62019-10-03 13:59:56 -060011104 case IORING_REGISTER_FILES_UPDATE:
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010011105 ret = io_register_files_update(ctx, arg, nr_args);
Jens Axboec3a31e62019-10-03 13:59:56 -060011106 break;
Jens Axboe9b402842019-04-11 11:45:41 -060011107 case IORING_REGISTER_EVENTFD:
Jens Axboef2842ab2020-01-08 11:04:00 -070011108 case IORING_REGISTER_EVENTFD_ASYNC:
Jens Axboe9b402842019-04-11 11:45:41 -060011109 ret = -EINVAL;
11110 if (nr_args != 1)
11111 break;
11112 ret = io_eventfd_register(ctx, arg);
Jens Axboef2842ab2020-01-08 11:04:00 -070011113 if (ret)
11114 break;
11115 if (opcode == IORING_REGISTER_EVENTFD_ASYNC)
11116 ctx->eventfd_async = 1;
11117 else
11118 ctx->eventfd_async = 0;
Jens Axboe9b402842019-04-11 11:45:41 -060011119 break;
11120 case IORING_UNREGISTER_EVENTFD:
11121 ret = -EINVAL;
11122 if (arg || nr_args)
11123 break;
11124 ret = io_eventfd_unregister(ctx);
11125 break;
Jens Axboe66f4af92020-01-16 15:36:52 -070011126 case IORING_REGISTER_PROBE:
11127 ret = -EINVAL;
11128 if (!arg || nr_args > 256)
11129 break;
11130 ret = io_probe(ctx, arg, nr_args);
11131 break;
Jens Axboe071698e2020-01-28 10:04:42 -070011132 case IORING_REGISTER_PERSONALITY:
11133 ret = -EINVAL;
11134 if (arg || nr_args)
11135 break;
11136 ret = io_register_personality(ctx);
11137 break;
11138 case IORING_UNREGISTER_PERSONALITY:
11139 ret = -EINVAL;
11140 if (arg)
11141 break;
11142 ret = io_unregister_personality(ctx, nr_args);
11143 break;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020011144 case IORING_REGISTER_ENABLE_RINGS:
11145 ret = -EINVAL;
11146 if (arg || nr_args)
11147 break;
11148 ret = io_register_enable_rings(ctx);
11149 break;
Stefano Garzarella21b55db2020-08-27 16:58:30 +020011150 case IORING_REGISTER_RESTRICTIONS:
11151 ret = io_register_restrictions(ctx, arg, nr_args);
11152 break;
Pavel Begunkov992da012021-06-10 16:37:37 +010011153 case IORING_REGISTER_FILES2:
11154 ret = io_register_rsrc(ctx, arg, nr_args, IORING_RSRC_FILE);
Pavel Begunkov792e3582021-04-25 14:32:21 +010011155 break;
Pavel Begunkov992da012021-06-10 16:37:37 +010011156 case IORING_REGISTER_FILES_UPDATE2:
11157 ret = io_register_rsrc_update(ctx, arg, nr_args,
11158 IORING_RSRC_FILE);
11159 break;
11160 case IORING_REGISTER_BUFFERS2:
11161 ret = io_register_rsrc(ctx, arg, nr_args, IORING_RSRC_BUFFER);
11162 break;
11163 case IORING_REGISTER_BUFFERS_UPDATE:
11164 ret = io_register_rsrc_update(ctx, arg, nr_args,
11165 IORING_RSRC_BUFFER);
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010011166 break;
Jens Axboefe764212021-06-17 10:19:54 -060011167 case IORING_REGISTER_IOWQ_AFF:
11168 ret = -EINVAL;
11169 if (!arg || !nr_args)
11170 break;
11171 ret = io_register_iowq_aff(ctx, arg, nr_args);
11172 break;
11173 case IORING_UNREGISTER_IOWQ_AFF:
11174 ret = -EINVAL;
11175 if (arg || nr_args)
11176 break;
11177 ret = io_unregister_iowq_aff(ctx);
11178 break;
Jens Axboe2e480052021-08-27 11:33:19 -060011179 case IORING_REGISTER_IOWQ_MAX_WORKERS:
11180 ret = -EINVAL;
11181 if (!arg || nr_args != 2)
11182 break;
11183 ret = io_register_iowq_max_workers(ctx, arg);
11184 break;
Jens Axboeedafcce2019-01-09 09:16:05 -070011185 default:
11186 ret = -EINVAL;
11187 break;
11188 }
11189
Jens Axboe071698e2020-01-28 10:04:42 -070011190 if (io_register_op_must_quiesce(opcode)) {
Jens Axboe05f3fb32019-12-09 11:22:50 -070011191 /* bring the ctx back to life */
Jens Axboe05f3fb32019-12-09 11:22:50 -070011192 percpu_ref_reinit(&ctx->refs);
Jens Axboe0f158b42020-05-14 17:18:39 -060011193 reinit_completion(&ctx->ref_comp);
Jens Axboe05f3fb32019-12-09 11:22:50 -070011194 }
Jens Axboeedafcce2019-01-09 09:16:05 -070011195 return ret;
11196}
11197
11198SYSCALL_DEFINE4(io_uring_register, unsigned int, fd, unsigned int, opcode,
11199 void __user *, arg, unsigned int, nr_args)
11200{
11201 struct io_ring_ctx *ctx;
11202 long ret = -EBADF;
11203 struct fd f;
11204
Jens Axboef9309dc2022-12-23 06:37:08 -070011205 if (opcode >= IORING_REGISTER_LAST)
11206 return -EINVAL;
11207
Jens Axboeedafcce2019-01-09 09:16:05 -070011208 f = fdget(fd);
11209 if (!f.file)
11210 return -EBADF;
11211
11212 ret = -EOPNOTSUPP;
11213 if (f.file->f_op != &io_uring_fops)
11214 goto out_fput;
11215
11216 ctx = f.file->private_data;
11217
Pavel Begunkovb6c23dd2021-02-20 15:17:18 +000011218 io_run_task_work();
11219
Jens Axboeedafcce2019-01-09 09:16:05 -070011220 mutex_lock(&ctx->uring_lock);
11221 ret = __io_uring_register(ctx, opcode, arg, nr_args);
11222 mutex_unlock(&ctx->uring_lock);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020011223 trace_io_uring_register(ctx, opcode, ctx->nr_user_files, ctx->nr_user_bufs,
11224 ctx->cq_ev_fd != NULL, ret);
Jens Axboeedafcce2019-01-09 09:16:05 -070011225out_fput:
11226 fdput(f);
11227 return ret;
11228}
11229
Jens Axboe2b188cc2019-01-07 10:46:33 -070011230static int __init io_uring_init(void)
11231{
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011232#define __BUILD_BUG_VERIFY_ELEMENT(stype, eoffset, etype, ename) do { \
11233 BUILD_BUG_ON(offsetof(stype, ename) != eoffset); \
11234 BUILD_BUG_ON(sizeof(etype) != sizeof_field(stype, ename)); \
11235} while (0)
11236
11237#define BUILD_BUG_SQE_ELEM(eoffset, etype, ename) \
11238 __BUILD_BUG_VERIFY_ELEMENT(struct io_uring_sqe, eoffset, etype, ename)
11239 BUILD_BUG_ON(sizeof(struct io_uring_sqe) != 64);
11240 BUILD_BUG_SQE_ELEM(0, __u8, opcode);
11241 BUILD_BUG_SQE_ELEM(1, __u8, flags);
11242 BUILD_BUG_SQE_ELEM(2, __u16, ioprio);
11243 BUILD_BUG_SQE_ELEM(4, __s32, fd);
11244 BUILD_BUG_SQE_ELEM(8, __u64, off);
11245 BUILD_BUG_SQE_ELEM(8, __u64, addr2);
11246 BUILD_BUG_SQE_ELEM(16, __u64, addr);
Pavel Begunkov7d67af22020-02-24 11:32:45 +030011247 BUILD_BUG_SQE_ELEM(16, __u64, splice_off_in);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011248 BUILD_BUG_SQE_ELEM(24, __u32, len);
11249 BUILD_BUG_SQE_ELEM(28, __kernel_rwf_t, rw_flags);
11250 BUILD_BUG_SQE_ELEM(28, /* compat */ int, rw_flags);
11251 BUILD_BUG_SQE_ELEM(28, /* compat */ __u32, rw_flags);
11252 BUILD_BUG_SQE_ELEM(28, __u32, fsync_flags);
Jiufei Xue5769a352020-06-17 17:53:55 +080011253 BUILD_BUG_SQE_ELEM(28, /* compat */ __u16, poll_events);
11254 BUILD_BUG_SQE_ELEM(28, __u32, poll32_events);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011255 BUILD_BUG_SQE_ELEM(28, __u32, sync_range_flags);
11256 BUILD_BUG_SQE_ELEM(28, __u32, msg_flags);
11257 BUILD_BUG_SQE_ELEM(28, __u32, timeout_flags);
11258 BUILD_BUG_SQE_ELEM(28, __u32, accept_flags);
11259 BUILD_BUG_SQE_ELEM(28, __u32, cancel_flags);
11260 BUILD_BUG_SQE_ELEM(28, __u32, open_flags);
11261 BUILD_BUG_SQE_ELEM(28, __u32, statx_flags);
11262 BUILD_BUG_SQE_ELEM(28, __u32, fadvise_advice);
Pavel Begunkov7d67af22020-02-24 11:32:45 +030011263 BUILD_BUG_SQE_ELEM(28, __u32, splice_flags);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011264 BUILD_BUG_SQE_ELEM(32, __u64, user_data);
11265 BUILD_BUG_SQE_ELEM(40, __u16, buf_index);
Pavel Begunkov16340ea2021-06-24 15:09:58 +010011266 BUILD_BUG_SQE_ELEM(40, __u16, buf_group);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011267 BUILD_BUG_SQE_ELEM(42, __u16, personality);
Pavel Begunkov7d67af22020-02-24 11:32:45 +030011268 BUILD_BUG_SQE_ELEM(44, __s32, splice_fd_in);
Pavel Begunkovb9445592021-08-25 12:25:45 +010011269 BUILD_BUG_SQE_ELEM(44, __u32, file_index);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011270
Pavel Begunkovb0d658ec2021-04-27 16:13:53 +010011271 BUILD_BUG_ON(sizeof(struct io_uring_files_update) !=
11272 sizeof(struct io_uring_rsrc_update));
11273 BUILD_BUG_ON(sizeof(struct io_uring_rsrc_update) >
11274 sizeof(struct io_uring_rsrc_update2));
Pavel Begunkov90499ad2021-08-25 20:51:40 +010011275
11276 /* ->buf_index is u16 */
11277 BUILD_BUG_ON(IORING_MAX_REG_BUFFERS >= (1u << 16));
11278
Pavel Begunkovb0d658ec2021-04-27 16:13:53 +010011279 /* should fit into one byte */
11280 BUILD_BUG_ON(SQE_VALID_FLAGS >= (1 << 8));
11281
Jens Axboed3656342019-12-18 09:50:26 -070011282 BUILD_BUG_ON(ARRAY_SIZE(io_op_defs) != IORING_OP_LAST);
Hao Xu32c2d332021-09-07 11:22:43 +080011283 BUILD_BUG_ON(__REQ_F_LAST_BIT > 8 * sizeof(int));
Pavel Begunkov16340ea2021-06-24 15:09:58 +010011284
Jens Axboe91f245d2021-02-09 13:48:50 -070011285 req_cachep = KMEM_CACHE(io_kiocb, SLAB_HWCACHE_ALIGN | SLAB_PANIC |
11286 SLAB_ACCOUNT);
Jens Axboe2b188cc2019-01-07 10:46:33 -070011287 return 0;
11288};
11289__initcall(io_uring_init);