blob: 0e8902be6b9679a74c5d29b8f8aa4f1df8bfb881 [file] [log] [blame]
Jens Axboe2b188cc2019-01-07 10:46:33 -07001// SPDX-License-Identifier: GPL-2.0
2/*
3 * Shared application/kernel submission and completion ring pairs, for
4 * supporting fast/efficient IO.
5 *
6 * A note on the read/write ordering memory barriers that are matched between
Stefan Bühler1e84b972019-04-24 23:54:16 +02007 * the application and kernel side.
8 *
9 * After the application reads the CQ ring tail, it must use an
10 * appropriate smp_rmb() to pair with the smp_wmb() the kernel uses
11 * before writing the tail (using smp_load_acquire to read the tail will
12 * do). It also needs a smp_mb() before updating CQ head (ordering the
13 * entry load(s) with the head store), pairing with an implicit barrier
14 * through a control-dependency in io_get_cqring (smp_store_release to
15 * store head will do). Failure to do so could lead to reading invalid
16 * CQ entries.
17 *
18 * Likewise, the application must use an appropriate smp_wmb() before
19 * writing the SQ tail (ordering SQ entry stores with the tail store),
20 * which pairs with smp_load_acquire in io_get_sqring (smp_store_release
21 * to store the tail will do). And it needs a barrier ordering the SQ
22 * head load before writing new SQ entries (smp_load_acquire to read
23 * head will do).
24 *
25 * When using the SQ poll thread (IORING_SETUP_SQPOLL), the application
26 * needs to check the SQ flags for IORING_SQ_NEED_WAKEUP *after*
27 * updating the SQ tail; a full memory barrier smp_mb() is needed
28 * between.
Jens Axboe2b188cc2019-01-07 10:46:33 -070029 *
30 * Also see the examples in the liburing library:
31 *
32 * git://git.kernel.dk/liburing
33 *
34 * io_uring also uses READ/WRITE_ONCE() for _any_ store or load that happens
35 * from data shared between the kernel and application. This is done both
36 * for ordering purposes, but also to ensure that once a value is loaded from
37 * data that the application could potentially modify, it remains stable.
38 *
39 * Copyright (C) 2018-2019 Jens Axboe
Christoph Hellwigc992fe22019-01-11 09:43:02 -070040 * Copyright (c) 2018-2019 Christoph Hellwig
Jens Axboe2b188cc2019-01-07 10:46:33 -070041 */
42#include <linux/kernel.h>
43#include <linux/init.h>
44#include <linux/errno.h>
45#include <linux/syscalls.h>
46#include <linux/compat.h>
Jens Axboe52de1fe2020-02-27 10:15:42 -070047#include <net/compat.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070048#include <linux/refcount.h>
49#include <linux/uio.h>
Pavel Begunkov6b47ee62020-01-18 20:22:41 +030050#include <linux/bits.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070051
52#include <linux/sched/signal.h>
53#include <linux/fs.h>
54#include <linux/file.h>
55#include <linux/fdtable.h>
56#include <linux/mm.h>
57#include <linux/mman.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070058#include <linux/percpu.h>
59#include <linux/slab.h>
Jens Axboe6c271ce2019-01-10 11:22:30 -070060#include <linux/kthread.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070061#include <linux/blkdev.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070062#include <linux/bvec.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070063#include <linux/net.h>
64#include <net/sock.h>
65#include <net/af_unix.h>
Jens Axboe6b063142019-01-10 22:13:58 -070066#include <net/scm.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070067#include <linux/anon_inodes.h>
68#include <linux/sched/mm.h>
69#include <linux/uaccess.h>
70#include <linux/nospec.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070071#include <linux/sizes.h>
72#include <linux/hugetlb.h>
Jens Axboeaa4c3962019-11-29 10:14:00 -070073#include <linux/highmem.h>
Jens Axboe15b71ab2019-12-11 11:20:36 -070074#include <linux/namei.h>
75#include <linux/fsnotify.h>
Jens Axboe4840e412019-12-25 22:03:45 -070076#include <linux/fadvise.h>
Jens Axboe3e4827b2020-01-08 15:18:09 -070077#include <linux/eventpoll.h>
Jens Axboeff002b32020-02-07 16:05:21 -070078#include <linux/fs_struct.h>
Pavel Begunkov7d67af22020-02-24 11:32:45 +030079#include <linux/splice.h>
Jens Axboeb41e9852020-02-17 09:52:41 -070080#include <linux/task_work.h>
Jens Axboebcf5a062020-05-22 09:24:42 -060081#include <linux/pagemap.h>
Jens Axboe0f212202020-09-13 13:09:39 -060082#include <linux/io_uring.h>
Dennis Zhou91d8f512020-09-16 13:41:05 -070083#include <linux/blk-cgroup.h>
Jens Axboe4ea33a92020-10-15 13:46:44 -060084#include <linux/audit.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070085
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020086#define CREATE_TRACE_POINTS
87#include <trace/events/io_uring.h>
88
Jens Axboe2b188cc2019-01-07 10:46:33 -070089#include <uapi/linux/io_uring.h>
90
91#include "internal.h"
Jens Axboe561fb042019-10-24 07:25:42 -060092#include "io-wq.h"
Jens Axboe2b188cc2019-01-07 10:46:33 -070093
Daniel Xu5277dea2019-09-14 14:23:45 -070094#define IORING_MAX_ENTRIES 32768
Jens Axboe33a107f2019-10-04 12:10:03 -060095#define IORING_MAX_CQ_ENTRIES (2 * IORING_MAX_ENTRIES)
Jens Axboe65e19f52019-10-26 07:20:21 -060096
97/*
98 * Shift of 9 is 512 entries, or exactly one page on 64-bit archs
99 */
100#define IORING_FILE_TABLE_SHIFT 9
101#define IORING_MAX_FILES_TABLE (1U << IORING_FILE_TABLE_SHIFT)
102#define IORING_FILE_TABLE_MASK (IORING_MAX_FILES_TABLE - 1)
103#define IORING_MAX_FIXED_FILES (64 * IORING_MAX_FILES_TABLE)
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200104#define IORING_MAX_RESTRICTIONS (IORING_RESTRICTION_LAST + \
105 IORING_REGISTER_LAST + IORING_OP_LAST)
Jens Axboe2b188cc2019-01-07 10:46:33 -0700106
107struct io_uring {
108 u32 head ____cacheline_aligned_in_smp;
109 u32 tail ____cacheline_aligned_in_smp;
110};
111
Stefan Bühler1e84b972019-04-24 23:54:16 +0200112/*
Hristo Venev75b28af2019-08-26 17:23:46 +0000113 * This data is shared with the application through the mmap at offsets
114 * IORING_OFF_SQ_RING and IORING_OFF_CQ_RING.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200115 *
116 * The offsets to the member fields are published through struct
117 * io_sqring_offsets when calling io_uring_setup.
118 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000119struct io_rings {
Stefan Bühler1e84b972019-04-24 23:54:16 +0200120 /*
121 * Head and tail offsets into the ring; the offsets need to be
122 * masked to get valid indices.
123 *
Hristo Venev75b28af2019-08-26 17:23:46 +0000124 * The kernel controls head of the sq ring and the tail of the cq ring,
125 * and the application controls tail of the sq ring and the head of the
126 * cq ring.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200127 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000128 struct io_uring sq, cq;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200129 /*
Hristo Venev75b28af2019-08-26 17:23:46 +0000130 * Bitmasks to apply to head and tail offsets (constant, equals
Stefan Bühler1e84b972019-04-24 23:54:16 +0200131 * ring_entries - 1)
132 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000133 u32 sq_ring_mask, cq_ring_mask;
134 /* Ring sizes (constant, power of 2) */
135 u32 sq_ring_entries, cq_ring_entries;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200136 /*
137 * Number of invalid entries dropped by the kernel due to
138 * invalid index stored in array
139 *
140 * Written by the kernel, shouldn't be modified by the
141 * application (i.e. get number of "new events" by comparing to
142 * cached value).
143 *
144 * After a new SQ head value was read by the application this
145 * counter includes all submissions that were dropped reaching
146 * the new SQ head (and possibly more).
147 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000148 u32 sq_dropped;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200149 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200150 * Runtime SQ flags
Stefan Bühler1e84b972019-04-24 23:54:16 +0200151 *
152 * Written by the kernel, shouldn't be modified by the
153 * application.
154 *
155 * The application needs a full memory barrier before checking
156 * for IORING_SQ_NEED_WAKEUP after updating the sq tail.
157 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000158 u32 sq_flags;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200159 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200160 * Runtime CQ flags
161 *
162 * Written by the application, shouldn't be modified by the
163 * kernel.
164 */
165 u32 cq_flags;
166 /*
Stefan Bühler1e84b972019-04-24 23:54:16 +0200167 * Number of completion events lost because the queue was full;
168 * this should be avoided by the application by making sure
LimingWu0b4295b2019-12-05 20:18:18 +0800169 * there are not more requests pending than there is space in
Stefan Bühler1e84b972019-04-24 23:54:16 +0200170 * the completion queue.
171 *
172 * Written by the kernel, shouldn't be modified by the
173 * application (i.e. get number of "new events" by comparing to
174 * cached value).
175 *
176 * As completion events come in out of order this counter is not
177 * ordered with any other data.
178 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000179 u32 cq_overflow;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200180 /*
181 * Ring buffer of completion events.
182 *
183 * The kernel writes completion events fresh every time they are
184 * produced, so the application is allowed to modify pending
185 * entries.
186 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000187 struct io_uring_cqe cqes[] ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700188};
189
Jens Axboeedafcce2019-01-09 09:16:05 -0700190struct io_mapped_ubuf {
191 u64 ubuf;
192 size_t len;
193 struct bio_vec *bvec;
194 unsigned int nr_bvecs;
Jens Axboede293932020-09-17 16:19:16 -0600195 unsigned long acct_pages;
Jens Axboeedafcce2019-01-09 09:16:05 -0700196};
197
Jens Axboe65e19f52019-10-26 07:20:21 -0600198struct fixed_file_table {
199 struct file **files;
Jens Axboe31b51512019-01-18 22:56:34 -0700200};
201
Xiaoguang Wang05589552020-03-31 14:05:18 +0800202struct fixed_file_ref_node {
203 struct percpu_ref refs;
204 struct list_head node;
205 struct list_head file_list;
206 struct fixed_file_data *file_data;
Jens Axboe4a38aed22020-05-14 17:21:15 -0600207 struct llist_node llist;
Pavel Begunkove2978222020-11-18 14:56:26 +0000208 bool done;
Xiaoguang Wang05589552020-03-31 14:05:18 +0800209};
210
Jens Axboe05f3fb32019-12-09 11:22:50 -0700211struct fixed_file_data {
212 struct fixed_file_table *table;
213 struct io_ring_ctx *ctx;
214
Pavel Begunkovb2e96852020-10-10 18:34:16 +0100215 struct fixed_file_ref_node *node;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700216 struct percpu_ref refs;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700217 struct completion done;
Xiaoguang Wang05589552020-03-31 14:05:18 +0800218 struct list_head ref_list;
219 spinlock_t lock;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700220};
221
Jens Axboe5a2e7452020-02-23 16:23:11 -0700222struct io_buffer {
223 struct list_head list;
224 __u64 addr;
225 __s32 len;
226 __u16 bid;
227};
228
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200229struct io_restriction {
230 DECLARE_BITMAP(register_op, IORING_REGISTER_LAST);
231 DECLARE_BITMAP(sqe_op, IORING_OP_LAST);
232 u8 sqe_flags_allowed;
233 u8 sqe_flags_required;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +0200234 bool registered;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200235};
236
Jens Axboe534ca6d2020-09-02 13:52:19 -0600237struct io_sq_data {
238 refcount_t refs;
Jens Axboe69fb2132020-09-14 11:16:23 -0600239 struct mutex lock;
240
241 /* ctx's that are using this sqd */
242 struct list_head ctx_list;
243 struct list_head ctx_new_list;
244 struct mutex ctx_lock;
245
Jens Axboe534ca6d2020-09-02 13:52:19 -0600246 struct task_struct *thread;
247 struct wait_queue_head wait;
248};
249
Jens Axboe2b188cc2019-01-07 10:46:33 -0700250struct io_ring_ctx {
251 struct {
252 struct percpu_ref refs;
253 } ____cacheline_aligned_in_smp;
254
255 struct {
256 unsigned int flags;
Randy Dunlape1d85332020-02-05 20:57:10 -0800257 unsigned int compat: 1;
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -0700258 unsigned int limit_mem: 1;
Randy Dunlape1d85332020-02-05 20:57:10 -0800259 unsigned int cq_overflow_flushed: 1;
260 unsigned int drain_next: 1;
261 unsigned int eventfd_async: 1;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200262 unsigned int restricted: 1;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700263
Hristo Venev75b28af2019-08-26 17:23:46 +0000264 /*
265 * Ring buffer of indices into array of io_uring_sqe, which is
266 * mmapped by the application using the IORING_OFF_SQES offset.
267 *
268 * This indirection could e.g. be used to assign fixed
269 * io_uring_sqe entries to operations and only submit them to
270 * the queue when needed.
271 *
272 * The kernel modifies neither the indices array nor the entries
273 * array.
274 */
275 u32 *sq_array;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700276 unsigned cached_sq_head;
277 unsigned sq_entries;
278 unsigned sq_mask;
Jens Axboe6c271ce2019-01-10 11:22:30 -0700279 unsigned sq_thread_idle;
Jens Axboe498ccd92019-10-25 10:04:25 -0600280 unsigned cached_sq_dropped;
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +0100281 unsigned cached_cq_overflow;
Jens Axboead3eb2c2019-12-18 17:12:20 -0700282 unsigned long sq_check_overflow;
Jens Axboede0617e2019-04-06 21:51:27 -0600283
284 struct list_head defer_list;
Jens Axboe5262f562019-09-17 12:26:57 -0600285 struct list_head timeout_list;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -0700286 struct list_head cq_overflow_list;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700287
Jens Axboefcb323c2019-10-24 12:39:47 -0600288 wait_queue_head_t inflight_wait;
Jens Axboead3eb2c2019-12-18 17:12:20 -0700289 struct io_uring_sqe *sq_sqes;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700290 } ____cacheline_aligned_in_smp;
291
Hristo Venev75b28af2019-08-26 17:23:46 +0000292 struct io_rings *rings;
293
Jens Axboe2b188cc2019-01-07 10:46:33 -0700294 /* IO offload */
Jens Axboe561fb042019-10-24 07:25:42 -0600295 struct io_wq *io_wq;
Jens Axboe2aede0e2020-09-14 10:45:53 -0600296
297 /*
298 * For SQPOLL usage - we hold a reference to the parent task, so we
299 * have access to the ->files
300 */
301 struct task_struct *sqo_task;
302
303 /* Only used for accounting purposes */
304 struct mm_struct *mm_account;
305
Dennis Zhou91d8f512020-09-16 13:41:05 -0700306#ifdef CONFIG_BLK_CGROUP
307 struct cgroup_subsys_state *sqo_blkcg_css;
308#endif
309
Jens Axboe534ca6d2020-09-02 13:52:19 -0600310 struct io_sq_data *sq_data; /* if using sq thread polling */
311
Jens Axboe90554202020-09-03 12:12:41 -0600312 struct wait_queue_head sqo_sq_wait;
Jens Axboe6a779382020-09-02 12:21:41 -0600313 struct wait_queue_entry sqo_wait_entry;
Jens Axboe69fb2132020-09-14 11:16:23 -0600314 struct list_head sqd_list;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700315
Jens Axboe6b063142019-01-10 22:13:58 -0700316 /*
317 * If used, fixed file set. Writers must ensure that ->refs is dead,
318 * readers must ensure that ->refs is alive as long as the file* is
319 * used. Only updated through io_uring_register(2).
320 */
Jens Axboe05f3fb32019-12-09 11:22:50 -0700321 struct fixed_file_data *file_data;
Jens Axboe6b063142019-01-10 22:13:58 -0700322 unsigned nr_user_files;
323
Jens Axboeedafcce2019-01-09 09:16:05 -0700324 /* if used, fixed mapped user buffers */
325 unsigned nr_user_bufs;
326 struct io_mapped_ubuf *user_bufs;
327
Jens Axboe2b188cc2019-01-07 10:46:33 -0700328 struct user_struct *user;
329
Jens Axboe0b8c0ec2019-12-02 08:50:00 -0700330 const struct cred *creds;
Jens Axboe181e4482019-11-25 08:52:30 -0700331
Jens Axboe4ea33a92020-10-15 13:46:44 -0600332#ifdef CONFIG_AUDIT
333 kuid_t loginuid;
334 unsigned int sessionid;
335#endif
336
Jens Axboe0f158b42020-05-14 17:18:39 -0600337 struct completion ref_comp;
338 struct completion sq_thread_comp;
Jens Axboe206aefd2019-11-07 18:27:42 -0700339
Jens Axboe0ddf92e2019-11-08 08:52:53 -0700340 /* if all else fails... */
341 struct io_kiocb *fallback_req;
342
Jens Axboe206aefd2019-11-07 18:27:42 -0700343#if defined(CONFIG_UNIX)
344 struct socket *ring_sock;
345#endif
346
Jens Axboe5a2e7452020-02-23 16:23:11 -0700347 struct idr io_buffer_idr;
348
Jens Axboe071698e2020-01-28 10:04:42 -0700349 struct idr personality_idr;
350
Jens Axboe206aefd2019-11-07 18:27:42 -0700351 struct {
352 unsigned cached_cq_tail;
353 unsigned cq_entries;
354 unsigned cq_mask;
355 atomic_t cq_timeouts;
Jens Axboead3eb2c2019-12-18 17:12:20 -0700356 unsigned long cq_check_overflow;
Jens Axboe206aefd2019-11-07 18:27:42 -0700357 struct wait_queue_head cq_wait;
358 struct fasync_struct *cq_fasync;
359 struct eventfd_ctx *cq_ev_fd;
360 } ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700361
362 struct {
363 struct mutex uring_lock;
364 wait_queue_head_t wait;
365 } ____cacheline_aligned_in_smp;
366
367 struct {
368 spinlock_t completion_lock;
Jens Axboee94f1412019-12-19 12:06:02 -0700369
Jens Axboedef596e2019-01-09 08:59:42 -0700370 /*
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300371 * ->iopoll_list is protected by the ctx->uring_lock for
Jens Axboedef596e2019-01-09 08:59:42 -0700372 * io_uring instances that don't use IORING_SETUP_SQPOLL.
373 * For SQPOLL, only the single threaded io_sq_thread() will
374 * manipulate the list, hence no extra locking is needed there.
375 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300376 struct list_head iopoll_list;
Jens Axboe78076bb2019-12-04 19:56:40 -0700377 struct hlist_head *cancel_hash;
378 unsigned cancel_hash_bits;
Jens Axboee94f1412019-12-19 12:06:02 -0700379 bool poll_multi_file;
Jens Axboefcb323c2019-10-24 12:39:47 -0600380
381 spinlock_t inflight_lock;
382 struct list_head inflight_list;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700383 } ____cacheline_aligned_in_smp;
Jens Axboe85faa7b2020-04-09 18:14:00 -0600384
Jens Axboe4a38aed22020-05-14 17:21:15 -0600385 struct delayed_work file_put_work;
386 struct llist_head file_put_llist;
387
Jens Axboe85faa7b2020-04-09 18:14:00 -0600388 struct work_struct exit_work;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200389 struct io_restriction restrictions;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700390};
391
Jens Axboe09bb8392019-03-13 12:39:28 -0600392/*
393 * First field must be the file pointer in all the
394 * iocb unions! See also 'struct kiocb' in <linux/fs.h>
395 */
Jens Axboe221c5eb2019-01-17 09:41:58 -0700396struct io_poll_iocb {
397 struct file *file;
Jens Axboe0969e782019-12-17 18:40:57 -0700398 union {
399 struct wait_queue_head *head;
400 u64 addr;
401 };
Jens Axboe221c5eb2019-01-17 09:41:58 -0700402 __poll_t events;
Jens Axboe8c838782019-03-12 15:48:16 -0600403 bool done;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700404 bool canceled;
Jens Axboe392edb42019-12-09 17:52:20 -0700405 struct wait_queue_entry wait;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700406};
407
Jens Axboeb5dba592019-12-11 14:02:38 -0700408struct io_close {
409 struct file *file;
410 struct file *put_file;
411 int fd;
412};
413
Jens Axboead8a48a2019-11-15 08:49:11 -0700414struct io_timeout_data {
415 struct io_kiocb *req;
416 struct hrtimer timer;
417 struct timespec64 ts;
418 enum hrtimer_mode mode;
419};
420
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700421struct io_accept {
422 struct file *file;
423 struct sockaddr __user *addr;
424 int __user *addr_len;
425 int flags;
Jens Axboe09952e32020-03-19 20:16:56 -0600426 unsigned long nofile;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700427};
428
429struct io_sync {
430 struct file *file;
431 loff_t len;
432 loff_t off;
433 int flags;
Jens Axboed63d1b52019-12-10 10:38:56 -0700434 int mode;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700435};
436
Jens Axboefbf23842019-12-17 18:45:56 -0700437struct io_cancel {
438 struct file *file;
439 u64 addr;
440};
441
Jens Axboeb29472e2019-12-17 18:50:29 -0700442struct io_timeout {
443 struct file *file;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +0300444 u32 off;
445 u32 target_seq;
Pavel Begunkov135fcde2020-07-13 23:37:12 +0300446 struct list_head list;
Jens Axboeb29472e2019-12-17 18:50:29 -0700447};
448
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100449struct io_timeout_rem {
450 struct file *file;
451 u64 addr;
452};
453
Jens Axboe9adbd452019-12-20 08:45:55 -0700454struct io_rw {
455 /* NOTE: kiocb has the file as the first member, so don't do it here */
456 struct kiocb kiocb;
457 u64 addr;
458 u64 len;
459};
460
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700461struct io_connect {
462 struct file *file;
463 struct sockaddr __user *addr;
464 int addr_len;
465};
466
Jens Axboee47293f2019-12-20 08:58:21 -0700467struct io_sr_msg {
468 struct file *file;
Jens Axboefddafac2020-01-04 20:19:44 -0700469 union {
Pavel Begunkov270a5942020-07-12 20:41:04 +0300470 struct user_msghdr __user *umsg;
Jens Axboefddafac2020-01-04 20:19:44 -0700471 void __user *buf;
472 };
Jens Axboee47293f2019-12-20 08:58:21 -0700473 int msg_flags;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700474 int bgid;
Jens Axboefddafac2020-01-04 20:19:44 -0700475 size_t len;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700476 struct io_buffer *kbuf;
Jens Axboee47293f2019-12-20 08:58:21 -0700477};
478
Jens Axboe15b71ab2019-12-11 11:20:36 -0700479struct io_open {
480 struct file *file;
481 int dfd;
Jens Axboe944d1442020-11-13 16:48:44 -0700482 bool ignore_nonblock;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700483 struct filename *filename;
Jens Axboec12cedf2020-01-08 17:41:21 -0700484 struct open_how how;
Jens Axboe4022e7a2020-03-19 19:23:18 -0600485 unsigned long nofile;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700486};
487
Jens Axboe05f3fb32019-12-09 11:22:50 -0700488struct io_files_update {
489 struct file *file;
490 u64 arg;
491 u32 nr_args;
492 u32 offset;
493};
494
Jens Axboe4840e412019-12-25 22:03:45 -0700495struct io_fadvise {
496 struct file *file;
497 u64 offset;
498 u32 len;
499 u32 advice;
500};
501
Jens Axboec1ca7572019-12-25 22:18:28 -0700502struct io_madvise {
503 struct file *file;
504 u64 addr;
505 u32 len;
506 u32 advice;
507};
508
Jens Axboe3e4827b2020-01-08 15:18:09 -0700509struct io_epoll {
510 struct file *file;
511 int epfd;
512 int op;
513 int fd;
514 struct epoll_event event;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700515};
516
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300517struct io_splice {
518 struct file *file_out;
519 struct file *file_in;
520 loff_t off_out;
521 loff_t off_in;
522 u64 len;
523 unsigned int flags;
524};
525
Jens Axboeddf0322d2020-02-23 16:41:33 -0700526struct io_provide_buf {
527 struct file *file;
528 __u64 addr;
529 __s32 len;
530 __u32 bgid;
531 __u16 nbufs;
532 __u16 bid;
533};
534
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700535struct io_statx {
536 struct file *file;
537 int dfd;
538 unsigned int mask;
539 unsigned int flags;
Bijan Mottahedehe62753e2020-05-22 21:31:18 -0700540 const char __user *filename;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700541 struct statx __user *buffer;
542};
543
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300544struct io_completion {
545 struct file *file;
546 struct list_head list;
Pavel Begunkov0f7e4662020-07-13 23:37:16 +0300547 int cflags;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300548};
549
Jens Axboef499a022019-12-02 16:28:46 -0700550struct io_async_connect {
551 struct sockaddr_storage address;
552};
553
Jens Axboe03b12302019-12-02 18:50:25 -0700554struct io_async_msghdr {
555 struct iovec fast_iov[UIO_FASTIOV];
556 struct iovec *iov;
557 struct sockaddr __user *uaddr;
558 struct msghdr msg;
Jens Axboeb5379162020-02-09 11:29:15 -0700559 struct sockaddr_storage addr;
Jens Axboe03b12302019-12-02 18:50:25 -0700560};
561
Jens Axboef67676d2019-12-02 11:03:47 -0700562struct io_async_rw {
563 struct iovec fast_iov[UIO_FASTIOV];
Jens Axboeff6165b2020-08-13 09:47:43 -0600564 const struct iovec *free_iovec;
565 struct iov_iter iter;
Jens Axboe227c0c92020-08-13 11:51:40 -0600566 size_t bytes_done;
Jens Axboebcf5a062020-05-22 09:24:42 -0600567 struct wait_page_queue wpq;
Jens Axboef67676d2019-12-02 11:03:47 -0700568};
569
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300570enum {
571 REQ_F_FIXED_FILE_BIT = IOSQE_FIXED_FILE_BIT,
572 REQ_F_IO_DRAIN_BIT = IOSQE_IO_DRAIN_BIT,
573 REQ_F_LINK_BIT = IOSQE_IO_LINK_BIT,
574 REQ_F_HARDLINK_BIT = IOSQE_IO_HARDLINK_BIT,
575 REQ_F_FORCE_ASYNC_BIT = IOSQE_ASYNC_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700576 REQ_F_BUFFER_SELECT_BIT = IOSQE_BUFFER_SELECT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300577
Pavel Begunkovdea3b492020-04-12 02:05:04 +0300578 REQ_F_LINK_HEAD_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300579 REQ_F_FAIL_LINK_BIT,
580 REQ_F_INFLIGHT_BIT,
581 REQ_F_CUR_POS_BIT,
582 REQ_F_NOWAIT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300583 REQ_F_LINK_TIMEOUT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300584 REQ_F_ISREG_BIT,
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300585 REQ_F_NEED_CLEANUP_BIT,
Jens Axboed7718a92020-02-14 22:23:12 -0700586 REQ_F_POLLED_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700587 REQ_F_BUFFER_SELECTED_BIT,
Jens Axboe5b0bbee2020-04-27 10:41:22 -0600588 REQ_F_NO_FILE_TABLE_BIT,
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +0800589 REQ_F_WORK_INITIALIZED_BIT,
Pavel Begunkov900fad42020-10-19 16:39:16 +0100590 REQ_F_LTIMEOUT_ACTIVE_BIT,
Jens Axboe84557872020-03-03 15:28:17 -0700591
592 /* not a real bit, just to check we're not overflowing the space */
593 __REQ_F_LAST_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300594};
595
596enum {
597 /* ctx owns file */
598 REQ_F_FIXED_FILE = BIT(REQ_F_FIXED_FILE_BIT),
599 /* drain existing IO first */
600 REQ_F_IO_DRAIN = BIT(REQ_F_IO_DRAIN_BIT),
601 /* linked sqes */
602 REQ_F_LINK = BIT(REQ_F_LINK_BIT),
603 /* doesn't sever on completion < 0 */
604 REQ_F_HARDLINK = BIT(REQ_F_HARDLINK_BIT),
605 /* IOSQE_ASYNC */
606 REQ_F_FORCE_ASYNC = BIT(REQ_F_FORCE_ASYNC_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700607 /* IOSQE_BUFFER_SELECT */
608 REQ_F_BUFFER_SELECT = BIT(REQ_F_BUFFER_SELECT_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300609
Pavel Begunkovdea3b492020-04-12 02:05:04 +0300610 /* head of a link */
611 REQ_F_LINK_HEAD = BIT(REQ_F_LINK_HEAD_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300612 /* fail rest of links */
613 REQ_F_FAIL_LINK = BIT(REQ_F_FAIL_LINK_BIT),
614 /* on inflight list */
615 REQ_F_INFLIGHT = BIT(REQ_F_INFLIGHT_BIT),
616 /* read/write uses file position */
617 REQ_F_CUR_POS = BIT(REQ_F_CUR_POS_BIT),
618 /* must not punt to workers */
619 REQ_F_NOWAIT = BIT(REQ_F_NOWAIT_BIT),
Pavel Begunkov900fad42020-10-19 16:39:16 +0100620 /* has or had linked timeout */
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300621 REQ_F_LINK_TIMEOUT = BIT(REQ_F_LINK_TIMEOUT_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300622 /* regular file */
623 REQ_F_ISREG = BIT(REQ_F_ISREG_BIT),
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300624 /* needs cleanup */
625 REQ_F_NEED_CLEANUP = BIT(REQ_F_NEED_CLEANUP_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700626 /* already went through poll handler */
627 REQ_F_POLLED = BIT(REQ_F_POLLED_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700628 /* buffer already selected */
629 REQ_F_BUFFER_SELECTED = BIT(REQ_F_BUFFER_SELECTED_BIT),
Jens Axboe5b0bbee2020-04-27 10:41:22 -0600630 /* doesn't need file table for this request */
631 REQ_F_NO_FILE_TABLE = BIT(REQ_F_NO_FILE_TABLE_BIT),
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +0800632 /* io_wq_work is initialized */
633 REQ_F_WORK_INITIALIZED = BIT(REQ_F_WORK_INITIALIZED_BIT),
Pavel Begunkov900fad42020-10-19 16:39:16 +0100634 /* linked timeout is active, i.e. prepared by link's head */
635 REQ_F_LTIMEOUT_ACTIVE = BIT(REQ_F_LTIMEOUT_ACTIVE_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700636};
637
638struct async_poll {
639 struct io_poll_iocb poll;
Jens Axboe807abcb2020-07-17 17:09:27 -0600640 struct io_poll_iocb *double_poll;
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300641};
642
Jens Axboe09bb8392019-03-13 12:39:28 -0600643/*
644 * NOTE! Each of the iocb union members has the file pointer
645 * as the first entry in their struct definition. So you can
646 * access the file pointer through any of the sub-structs,
647 * or directly as just 'ki_filp' in this struct.
648 */
Jens Axboe2b188cc2019-01-07 10:46:33 -0700649struct io_kiocb {
Jens Axboe221c5eb2019-01-17 09:41:58 -0700650 union {
Jens Axboe09bb8392019-03-13 12:39:28 -0600651 struct file *file;
Jens Axboe9adbd452019-12-20 08:45:55 -0700652 struct io_rw rw;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700653 struct io_poll_iocb poll;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700654 struct io_accept accept;
655 struct io_sync sync;
Jens Axboefbf23842019-12-17 18:45:56 -0700656 struct io_cancel cancel;
Jens Axboeb29472e2019-12-17 18:50:29 -0700657 struct io_timeout timeout;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100658 struct io_timeout_rem timeout_rem;
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700659 struct io_connect connect;
Jens Axboee47293f2019-12-20 08:58:21 -0700660 struct io_sr_msg sr_msg;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700661 struct io_open open;
Jens Axboeb5dba592019-12-11 14:02:38 -0700662 struct io_close close;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700663 struct io_files_update files_update;
Jens Axboe4840e412019-12-25 22:03:45 -0700664 struct io_fadvise fadvise;
Jens Axboec1ca7572019-12-25 22:18:28 -0700665 struct io_madvise madvise;
Jens Axboe3e4827b2020-01-08 15:18:09 -0700666 struct io_epoll epoll;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300667 struct io_splice splice;
Jens Axboeddf0322d2020-02-23 16:41:33 -0700668 struct io_provide_buf pbuf;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700669 struct io_statx statx;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300670 /* use only after cleaning per-op data, see io_clean_op() */
671 struct io_completion compl;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700672 };
Jens Axboe2b188cc2019-01-07 10:46:33 -0700673
Jens Axboee8c2bc12020-08-15 18:44:09 -0700674 /* opcode allocated if it needs to store data for async defer */
675 void *async_data;
Jens Axboed625c6e2019-12-17 19:53:05 -0700676 u8 opcode;
Xiaoguang Wang65a65432020-06-11 23:39:36 +0800677 /* polled IO has completed */
678 u8 iopoll_completed;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700679
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700680 u16 buf_index;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300681 u32 result;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700682
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300683 struct io_ring_ctx *ctx;
684 unsigned int flags;
685 refcount_t refs;
686 struct task_struct *task;
687 u64 user_data;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700688
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300689 struct list_head link_list;
Jens Axboed7718a92020-02-14 22:23:12 -0700690
Pavel Begunkovd21ffe72020-07-13 23:37:10 +0300691 /*
692 * 1. used with ctx->iopoll_list with reads/writes
693 * 2. to track reqs with ->files (see io_op_def::file_table)
694 */
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300695 struct list_head inflight_entry;
Jens Axboefcb323c2019-10-24 12:39:47 -0600696
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300697 struct percpu_ref *fixed_file_refs;
698 struct callback_head task_work;
699 /* for polled requests, i.e. IORING_OP_POLL_ADD and async armed poll */
700 struct hlist_node hash_node;
701 struct async_poll *apoll;
702 struct io_wq_work work;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700703};
704
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300705struct io_defer_entry {
706 struct list_head list;
707 struct io_kiocb *req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300708 u32 seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300709};
710
Jens Axboedef596e2019-01-09 08:59:42 -0700711#define IO_IOPOLL_BATCH 8
Jens Axboe2b188cc2019-01-07 10:46:33 -0700712
Jens Axboe013538b2020-06-22 09:29:15 -0600713struct io_comp_state {
714 unsigned int nr;
715 struct list_head list;
716 struct io_ring_ctx *ctx;
717};
718
Jens Axboe9a56a232019-01-09 09:06:50 -0700719struct io_submit_state {
720 struct blk_plug plug;
721
722 /*
Jens Axboe2579f912019-01-09 09:10:43 -0700723 * io_kiocb alloc cache
724 */
725 void *reqs[IO_IOPOLL_BATCH];
Pavel Begunkov6c8a3132020-02-01 03:58:00 +0300726 unsigned int free_reqs;
Jens Axboe2579f912019-01-09 09:10:43 -0700727
728 /*
Jens Axboe013538b2020-06-22 09:29:15 -0600729 * Batch completion logic
730 */
731 struct io_comp_state comp;
732
733 /*
Jens Axboe9a56a232019-01-09 09:06:50 -0700734 * File reference cache
735 */
736 struct file *file;
737 unsigned int fd;
738 unsigned int has_refs;
Jens Axboe9a56a232019-01-09 09:06:50 -0700739 unsigned int ios_left;
740};
741
Jens Axboed3656342019-12-18 09:50:26 -0700742struct io_op_def {
Jens Axboed3656342019-12-18 09:50:26 -0700743 /* needs req->file assigned */
744 unsigned needs_file : 1;
Jens Axboefd2206e2020-06-02 16:40:47 -0600745 /* don't fail if file grab fails */
746 unsigned needs_file_no_error : 1;
Jens Axboed3656342019-12-18 09:50:26 -0700747 /* hash wq insertion if file is a regular file */
748 unsigned hash_reg_file : 1;
749 /* unbound wq insertion if file is a non-regular file */
750 unsigned unbound_nonreg_file : 1;
Jens Axboe66f4af92020-01-16 15:36:52 -0700751 /* opcode is not supported by this kernel */
752 unsigned not_supported : 1;
Jens Axboe8a727582020-02-20 09:59:44 -0700753 /* set if opcode supports polled "wait" */
754 unsigned pollin : 1;
755 unsigned pollout : 1;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700756 /* op supports buffer selection */
757 unsigned buffer_select : 1;
Jens Axboee8c2bc12020-08-15 18:44:09 -0700758 /* must always have async data allocated */
759 unsigned needs_async_data : 1;
760 /* size of async data needed, if any */
761 unsigned short async_size;
Jens Axboe0f203762020-10-14 09:23:55 -0600762 unsigned work_flags;
Jens Axboed3656342019-12-18 09:50:26 -0700763};
764
Jens Axboe09186822020-10-13 15:01:40 -0600765static const struct io_op_def io_op_defs[] = {
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300766 [IORING_OP_NOP] = {},
767 [IORING_OP_READV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700768 .needs_file = 1,
769 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700770 .pollin = 1,
Jens Axboe4d954c22020-02-27 07:31:19 -0700771 .buffer_select = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700772 .needs_async_data = 1,
773 .async_size = sizeof(struct io_async_rw),
Jens Axboe0f203762020-10-14 09:23:55 -0600774 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700775 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300776 [IORING_OP_WRITEV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700777 .needs_file = 1,
778 .hash_reg_file = 1,
779 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700780 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700781 .needs_async_data = 1,
782 .async_size = sizeof(struct io_async_rw),
Jens Axboe69228332020-10-20 14:28:41 -0600783 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
784 IO_WQ_WORK_FSIZE,
Jens Axboed3656342019-12-18 09:50:26 -0700785 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300786 [IORING_OP_FSYNC] = {
Jens Axboed3656342019-12-18 09:50:26 -0700787 .needs_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600788 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700789 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300790 [IORING_OP_READ_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700791 .needs_file = 1,
792 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700793 .pollin = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700794 .async_size = sizeof(struct io_async_rw),
Jens Axboe4017eb92020-10-22 14:14:12 -0600795 .work_flags = IO_WQ_WORK_BLKCG | IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700796 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300797 [IORING_OP_WRITE_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700798 .needs_file = 1,
799 .hash_reg_file = 1,
800 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700801 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700802 .async_size = sizeof(struct io_async_rw),
Jens Axboe4017eb92020-10-22 14:14:12 -0600803 .work_flags = IO_WQ_WORK_BLKCG | IO_WQ_WORK_FSIZE |
804 IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700805 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300806 [IORING_OP_POLL_ADD] = {
Jens Axboed3656342019-12-18 09:50:26 -0700807 .needs_file = 1,
808 .unbound_nonreg_file = 1,
809 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300810 [IORING_OP_POLL_REMOVE] = {},
811 [IORING_OP_SYNC_FILE_RANGE] = {
Jens Axboed3656342019-12-18 09:50:26 -0700812 .needs_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600813 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700814 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300815 [IORING_OP_SENDMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700816 .needs_file = 1,
817 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700818 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700819 .needs_async_data = 1,
820 .async_size = sizeof(struct io_async_msghdr),
Jens Axboe0f203762020-10-14 09:23:55 -0600821 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
822 IO_WQ_WORK_FS,
Jens Axboed3656342019-12-18 09:50:26 -0700823 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300824 [IORING_OP_RECVMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700825 .needs_file = 1,
826 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700827 .pollin = 1,
Jens Axboe52de1fe2020-02-27 10:15:42 -0700828 .buffer_select = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700829 .needs_async_data = 1,
830 .async_size = sizeof(struct io_async_msghdr),
Jens Axboe0f203762020-10-14 09:23:55 -0600831 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
832 IO_WQ_WORK_FS,
Jens Axboed3656342019-12-18 09:50:26 -0700833 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300834 [IORING_OP_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -0700835 .needs_async_data = 1,
836 .async_size = sizeof(struct io_timeout_data),
Jens Axboe0f203762020-10-14 09:23:55 -0600837 .work_flags = IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700838 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300839 [IORING_OP_TIMEOUT_REMOVE] = {},
840 [IORING_OP_ACCEPT] = {
Jens Axboed3656342019-12-18 09:50:26 -0700841 .needs_file = 1,
842 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700843 .pollin = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600844 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_FILES,
Jens Axboed3656342019-12-18 09:50:26 -0700845 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300846 [IORING_OP_ASYNC_CANCEL] = {},
847 [IORING_OP_LINK_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -0700848 .needs_async_data = 1,
849 .async_size = sizeof(struct io_timeout_data),
Jens Axboe0f203762020-10-14 09:23:55 -0600850 .work_flags = IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700851 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300852 [IORING_OP_CONNECT] = {
Jens Axboed3656342019-12-18 09:50:26 -0700853 .needs_file = 1,
854 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700855 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700856 .needs_async_data = 1,
857 .async_size = sizeof(struct io_async_connect),
Jens Axboe0f203762020-10-14 09:23:55 -0600858 .work_flags = IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700859 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300860 [IORING_OP_FALLOCATE] = {
Jens Axboed3656342019-12-18 09:50:26 -0700861 .needs_file = 1,
Jens Axboe69228332020-10-20 14:28:41 -0600862 .work_flags = IO_WQ_WORK_BLKCG | IO_WQ_WORK_FSIZE,
Jens Axboed3656342019-12-18 09:50:26 -0700863 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300864 [IORING_OP_OPENAT] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600865 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_BLKCG |
866 IO_WQ_WORK_FS,
Jens Axboed3656342019-12-18 09:50:26 -0700867 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300868 [IORING_OP_CLOSE] = {
Jens Axboefd2206e2020-06-02 16:40:47 -0600869 .needs_file = 1,
870 .needs_file_no_error = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600871 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700872 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300873 [IORING_OP_FILES_UPDATE] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600874 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700875 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300876 [IORING_OP_STATX] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600877 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_MM |
878 IO_WQ_WORK_FS | IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700879 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300880 [IORING_OP_READ] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -0700881 .needs_file = 1,
882 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700883 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700884 .buffer_select = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700885 .async_size = sizeof(struct io_async_rw),
Jens Axboe0f203762020-10-14 09:23:55 -0600886 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboe3a6820f2019-12-22 15:19:35 -0700887 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300888 [IORING_OP_WRITE] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -0700889 .needs_file = 1,
890 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700891 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700892 .async_size = sizeof(struct io_async_rw),
Jens Axboe69228332020-10-20 14:28:41 -0600893 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
894 IO_WQ_WORK_FSIZE,
Jens Axboe3a6820f2019-12-22 15:19:35 -0700895 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300896 [IORING_OP_FADVISE] = {
Jens Axboe4840e412019-12-25 22:03:45 -0700897 .needs_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600898 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboe4840e412019-12-25 22:03:45 -0700899 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300900 [IORING_OP_MADVISE] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600901 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboec1ca7572019-12-25 22:18:28 -0700902 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300903 [IORING_OP_SEND] = {
Jens Axboefddafac2020-01-04 20:19:44 -0700904 .needs_file = 1,
905 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700906 .pollout = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600907 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboefddafac2020-01-04 20:19:44 -0700908 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300909 [IORING_OP_RECV] = {
Jens Axboefddafac2020-01-04 20:19:44 -0700910 .needs_file = 1,
911 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700912 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700913 .buffer_select = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600914 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboefddafac2020-01-04 20:19:44 -0700915 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300916 [IORING_OP_OPENAT2] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600917 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_FS |
918 IO_WQ_WORK_BLKCG,
Jens Axboecebdb982020-01-08 17:59:24 -0700919 },
Jens Axboe3e4827b2020-01-08 15:18:09 -0700920 [IORING_OP_EPOLL_CTL] = {
921 .unbound_nonreg_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600922 .work_flags = IO_WQ_WORK_FILES,
Jens Axboe3e4827b2020-01-08 15:18:09 -0700923 },
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300924 [IORING_OP_SPLICE] = {
925 .needs_file = 1,
926 .hash_reg_file = 1,
927 .unbound_nonreg_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600928 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboeddf0322d2020-02-23 16:41:33 -0700929 },
930 [IORING_OP_PROVIDE_BUFFERS] = {},
Jens Axboe067524e2020-03-02 16:32:28 -0700931 [IORING_OP_REMOVE_BUFFERS] = {},
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +0300932 [IORING_OP_TEE] = {
933 .needs_file = 1,
934 .hash_reg_file = 1,
935 .unbound_nonreg_file = 1,
936 },
Jens Axboed3656342019-12-18 09:50:26 -0700937};
938
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -0700939enum io_mem_account {
940 ACCT_LOCKED,
941 ACCT_PINNED,
942};
943
Pavel Begunkov81b68a52020-07-30 18:43:46 +0300944static void __io_complete_rw(struct io_kiocb *req, long res, long res2,
945 struct io_comp_state *cs);
Jens Axboe78e19bb2019-11-06 15:21:34 -0700946static void io_cqring_fill_event(struct io_kiocb *req, long res);
Jackie Liuec9c02a2019-11-08 23:50:36 +0800947static void io_put_req(struct io_kiocb *req);
Pavel Begunkov216578e2020-10-13 09:44:00 +0100948static void io_put_req_deferred(struct io_kiocb *req, int nr);
Jens Axboec40f6372020-06-25 15:39:59 -0600949static void io_double_put_req(struct io_kiocb *req);
Jens Axboe94ae5e72019-11-14 19:39:52 -0700950static struct io_kiocb *io_prep_linked_timeout(struct io_kiocb *req);
Jens Axboe7271ef32020-08-10 09:55:22 -0600951static void __io_queue_linked_timeout(struct io_kiocb *req);
Jens Axboe94ae5e72019-11-14 19:39:52 -0700952static void io_queue_linked_timeout(struct io_kiocb *req);
Jens Axboe05f3fb32019-12-09 11:22:50 -0700953static int __io_sqe_files_update(struct io_ring_ctx *ctx,
954 struct io_uring_files_update *ip,
955 unsigned nr_args);
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300956static void __io_clean_op(struct io_kiocb *req);
Pavel Begunkov8371adf2020-10-10 18:34:08 +0100957static struct file *io_file_get(struct io_submit_state *state,
958 struct io_kiocb *req, int fd, bool fixed);
Pavel Begunkovc1379e22020-09-30 22:57:56 +0300959static void __io_queue_sqe(struct io_kiocb *req, struct io_comp_state *cs);
Jens Axboe4349f302020-07-09 15:07:01 -0600960static void io_file_put_work(struct work_struct *work);
Jens Axboede0617e2019-04-06 21:51:27 -0600961
Jens Axboeb63534c2020-06-04 11:28:00 -0600962static ssize_t io_import_iovec(int rw, struct io_kiocb *req,
963 struct iovec **iovec, struct iov_iter *iter,
964 bool needs_lock);
Jens Axboeff6165b2020-08-13 09:47:43 -0600965static int io_setup_async_rw(struct io_kiocb *req, const struct iovec *iovec,
966 const struct iovec *fast_iov,
Jens Axboe227c0c92020-08-13 11:51:40 -0600967 struct iov_iter *iter, bool force);
Jens Axboe2b188cc2019-01-07 10:46:33 -0700968
969static struct kmem_cache *req_cachep;
970
Jens Axboe09186822020-10-13 15:01:40 -0600971static const struct file_operations io_uring_fops;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700972
973struct sock *io_uring_get_socket(struct file *file)
974{
975#if defined(CONFIG_UNIX)
976 if (file->f_op == &io_uring_fops) {
977 struct io_ring_ctx *ctx = file->private_data;
978
979 return ctx->ring_sock->sk;
980 }
981#endif
982 return NULL;
983}
984EXPORT_SYMBOL(io_uring_get_socket);
985
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300986static inline void io_clean_op(struct io_kiocb *req)
987{
Pavel Begunkovbb175342020-08-20 11:33:35 +0300988 if (req->flags & (REQ_F_NEED_CLEANUP | REQ_F_BUFFER_SELECTED |
989 REQ_F_INFLIGHT))
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300990 __io_clean_op(req);
991}
992
Jens Axboe4349f302020-07-09 15:07:01 -0600993static void io_sq_thread_drop_mm(void)
Jens Axboec40f6372020-06-25 15:39:59 -0600994{
995 struct mm_struct *mm = current->mm;
996
997 if (mm) {
998 kthread_unuse_mm(mm);
999 mmput(mm);
Jens Axboe4b70cf92020-11-02 10:39:05 -07001000 current->mm = NULL;
Jens Axboec40f6372020-06-25 15:39:59 -06001001 }
1002}
1003
1004static int __io_sq_thread_acquire_mm(struct io_ring_ctx *ctx)
1005{
Jens Axboe4b70cf92020-11-02 10:39:05 -07001006 struct mm_struct *mm;
1007
1008 if (current->mm)
1009 return 0;
1010
1011 /* Should never happen */
1012 if (unlikely(!(ctx->flags & IORING_SETUP_SQPOLL)))
1013 return -EFAULT;
1014
1015 task_lock(ctx->sqo_task);
1016 mm = ctx->sqo_task->mm;
1017 if (unlikely(!mm || !mmget_not_zero(mm)))
1018 mm = NULL;
1019 task_unlock(ctx->sqo_task);
1020
1021 if (mm) {
1022 kthread_use_mm(mm);
1023 return 0;
Jens Axboec40f6372020-06-25 15:39:59 -06001024 }
1025
Jens Axboe4b70cf92020-11-02 10:39:05 -07001026 return -EFAULT;
Jens Axboec40f6372020-06-25 15:39:59 -06001027}
1028
1029static int io_sq_thread_acquire_mm(struct io_ring_ctx *ctx,
1030 struct io_kiocb *req)
1031{
Jens Axboe0f203762020-10-14 09:23:55 -06001032 if (!(io_op_defs[req->opcode].work_flags & IO_WQ_WORK_MM))
Jens Axboec40f6372020-06-25 15:39:59 -06001033 return 0;
1034 return __io_sq_thread_acquire_mm(ctx);
1035}
1036
Dennis Zhou91d8f512020-09-16 13:41:05 -07001037static void io_sq_thread_associate_blkcg(struct io_ring_ctx *ctx,
1038 struct cgroup_subsys_state **cur_css)
1039
1040{
1041#ifdef CONFIG_BLK_CGROUP
1042 /* puts the old one when swapping */
1043 if (*cur_css != ctx->sqo_blkcg_css) {
1044 kthread_associate_blkcg(ctx->sqo_blkcg_css);
1045 *cur_css = ctx->sqo_blkcg_css;
1046 }
1047#endif
1048}
1049
1050static void io_sq_thread_unassociate_blkcg(void)
1051{
1052#ifdef CONFIG_BLK_CGROUP
1053 kthread_associate_blkcg(NULL);
1054#endif
1055}
1056
Jens Axboec40f6372020-06-25 15:39:59 -06001057static inline void req_set_fail_links(struct io_kiocb *req)
1058{
1059 if ((req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) == REQ_F_LINK)
1060 req->flags |= REQ_F_FAIL_LINK;
1061}
Jens Axboe4a38aed22020-05-14 17:21:15 -06001062
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001063/*
Jens Axboe1e6fa522020-10-15 08:46:24 -06001064 * None of these are dereferenced, they are simply used to check if any of
1065 * them have changed. If we're under current and check they are still the
1066 * same, we're fine to grab references to them for actual out-of-line use.
1067 */
1068static void io_init_identity(struct io_identity *id)
1069{
1070 id->files = current->files;
1071 id->mm = current->mm;
1072#ifdef CONFIG_BLK_CGROUP
1073 rcu_read_lock();
1074 id->blkcg_css = blkcg_css();
1075 rcu_read_unlock();
1076#endif
1077 id->creds = current_cred();
1078 id->nsproxy = current->nsproxy;
1079 id->fs = current->fs;
1080 id->fsize = rlimit(RLIMIT_FSIZE);
Jens Axboe4ea33a92020-10-15 13:46:44 -06001081#ifdef CONFIG_AUDIT
1082 id->loginuid = current->loginuid;
1083 id->sessionid = current->sessionid;
1084#endif
Jens Axboe1e6fa522020-10-15 08:46:24 -06001085 refcount_set(&id->count, 1);
1086}
1087
Pavel Begunkovec99ca62020-10-18 10:17:38 +01001088static inline void __io_req_init_async(struct io_kiocb *req)
1089{
1090 memset(&req->work, 0, sizeof(req->work));
1091 req->flags |= REQ_F_WORK_INITIALIZED;
1092}
1093
Jens Axboe1e6fa522020-10-15 08:46:24 -06001094/*
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001095 * Note: must call io_req_init_async() for the first time you
1096 * touch any members of io_wq_work.
1097 */
1098static inline void io_req_init_async(struct io_kiocb *req)
1099{
Jens Axboe500a3732020-10-15 17:38:03 -06001100 struct io_uring_task *tctx = current->io_uring;
1101
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001102 if (req->flags & REQ_F_WORK_INITIALIZED)
1103 return;
1104
Pavel Begunkovec99ca62020-10-18 10:17:38 +01001105 __io_req_init_async(req);
Jens Axboe500a3732020-10-15 17:38:03 -06001106
1107 /* Grab a ref if this isn't our static identity */
1108 req->work.identity = tctx->identity;
1109 if (tctx->identity != &tctx->__identity)
1110 refcount_inc(&req->work.identity->count);
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001111}
1112
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03001113static inline bool io_async_submit(struct io_ring_ctx *ctx)
1114{
1115 return ctx->flags & IORING_SETUP_SQPOLL;
1116}
1117
Jens Axboe2b188cc2019-01-07 10:46:33 -07001118static void io_ring_ctx_ref_free(struct percpu_ref *ref)
1119{
1120 struct io_ring_ctx *ctx = container_of(ref, struct io_ring_ctx, refs);
1121
Jens Axboe0f158b42020-05-14 17:18:39 -06001122 complete(&ctx->ref_comp);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001123}
1124
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001125static inline bool io_is_timeout_noseq(struct io_kiocb *req)
1126{
1127 return !req->timeout.off;
1128}
1129
Jens Axboe2b188cc2019-01-07 10:46:33 -07001130static struct io_ring_ctx *io_ring_ctx_alloc(struct io_uring_params *p)
1131{
1132 struct io_ring_ctx *ctx;
Jens Axboe78076bb2019-12-04 19:56:40 -07001133 int hash_bits;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001134
1135 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
1136 if (!ctx)
1137 return NULL;
1138
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001139 ctx->fallback_req = kmem_cache_alloc(req_cachep, GFP_KERNEL);
1140 if (!ctx->fallback_req)
1141 goto err;
1142
Jens Axboe78076bb2019-12-04 19:56:40 -07001143 /*
1144 * Use 5 bits less than the max cq entries, that should give us around
1145 * 32 entries per hash list if totally full and uniformly spread.
1146 */
1147 hash_bits = ilog2(p->cq_entries);
1148 hash_bits -= 5;
1149 if (hash_bits <= 0)
1150 hash_bits = 1;
1151 ctx->cancel_hash_bits = hash_bits;
1152 ctx->cancel_hash = kmalloc((1U << hash_bits) * sizeof(struct hlist_head),
1153 GFP_KERNEL);
1154 if (!ctx->cancel_hash)
1155 goto err;
1156 __hash_init(ctx->cancel_hash, 1U << hash_bits);
1157
Roman Gushchin21482892019-05-07 10:01:48 -07001158 if (percpu_ref_init(&ctx->refs, io_ring_ctx_ref_free,
Jens Axboe206aefd2019-11-07 18:27:42 -07001159 PERCPU_REF_ALLOW_REINIT, GFP_KERNEL))
1160 goto err;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001161
1162 ctx->flags = p->flags;
Jens Axboe90554202020-09-03 12:12:41 -06001163 init_waitqueue_head(&ctx->sqo_sq_wait);
Jens Axboe69fb2132020-09-14 11:16:23 -06001164 INIT_LIST_HEAD(&ctx->sqd_list);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001165 init_waitqueue_head(&ctx->cq_wait);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001166 INIT_LIST_HEAD(&ctx->cq_overflow_list);
Jens Axboe0f158b42020-05-14 17:18:39 -06001167 init_completion(&ctx->ref_comp);
1168 init_completion(&ctx->sq_thread_comp);
Jens Axboe5a2e7452020-02-23 16:23:11 -07001169 idr_init(&ctx->io_buffer_idr);
Jens Axboe071698e2020-01-28 10:04:42 -07001170 idr_init(&ctx->personality_idr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001171 mutex_init(&ctx->uring_lock);
1172 init_waitqueue_head(&ctx->wait);
1173 spin_lock_init(&ctx->completion_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03001174 INIT_LIST_HEAD(&ctx->iopoll_list);
Jens Axboede0617e2019-04-06 21:51:27 -06001175 INIT_LIST_HEAD(&ctx->defer_list);
Jens Axboe5262f562019-09-17 12:26:57 -06001176 INIT_LIST_HEAD(&ctx->timeout_list);
Jens Axboefcb323c2019-10-24 12:39:47 -06001177 init_waitqueue_head(&ctx->inflight_wait);
1178 spin_lock_init(&ctx->inflight_lock);
1179 INIT_LIST_HEAD(&ctx->inflight_list);
Jens Axboe4a38aed22020-05-14 17:21:15 -06001180 INIT_DELAYED_WORK(&ctx->file_put_work, io_file_put_work);
1181 init_llist_head(&ctx->file_put_llist);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001182 return ctx;
Jens Axboe206aefd2019-11-07 18:27:42 -07001183err:
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001184 if (ctx->fallback_req)
1185 kmem_cache_free(req_cachep, ctx->fallback_req);
Jens Axboe78076bb2019-12-04 19:56:40 -07001186 kfree(ctx->cancel_hash);
Jens Axboe206aefd2019-11-07 18:27:42 -07001187 kfree(ctx);
1188 return NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001189}
1190
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001191static bool req_need_defer(struct io_kiocb *req, u32 seq)
Jens Axboede0617e2019-04-06 21:51:27 -06001192{
Jens Axboe2bc99302020-07-09 09:43:27 -06001193 if (unlikely(req->flags & REQ_F_IO_DRAIN)) {
1194 struct io_ring_ctx *ctx = req->ctx;
Jackie Liua197f662019-11-08 08:09:12 -07001195
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001196 return seq != ctx->cached_cq_tail
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001197 + READ_ONCE(ctx->cached_cq_overflow);
Jens Axboe2bc99302020-07-09 09:43:27 -06001198 }
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001199
Bob Liu9d858b22019-11-13 18:06:25 +08001200 return false;
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001201}
1202
Jens Axboede0617e2019-04-06 21:51:27 -06001203static void __io_commit_cqring(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001204{
Hristo Venev75b28af2019-08-26 17:23:46 +00001205 struct io_rings *rings = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001206
Pavel Begunkov07910152020-01-17 03:52:46 +03001207 /* order cqe stores with ring update */
1208 smp_store_release(&rings->cq.tail, ctx->cached_cq_tail);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001209
Pavel Begunkov07910152020-01-17 03:52:46 +03001210 if (wq_has_sleeper(&ctx->cq_wait)) {
1211 wake_up_interruptible(&ctx->cq_wait);
1212 kill_fasync(&ctx->cq_fasync, SIGIO, POLL_IN);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001213 }
1214}
1215
Jens Axboe5c3462c2020-10-15 09:02:33 -06001216static void io_put_identity(struct io_uring_task *tctx, struct io_kiocb *req)
Jens Axboe1e6fa522020-10-15 08:46:24 -06001217{
Jens Axboe500a3732020-10-15 17:38:03 -06001218 if (req->work.identity == &tctx->__identity)
Jens Axboe1e6fa522020-10-15 08:46:24 -06001219 return;
1220 if (refcount_dec_and_test(&req->work.identity->count))
1221 kfree(req->work.identity);
1222}
1223
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001224static void io_req_clean_work(struct io_kiocb *req)
Jens Axboecccf0ee2020-01-27 16:34:48 -07001225{
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001226 if (!(req->flags & REQ_F_WORK_INITIALIZED))
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001227 return;
Jens Axboe51a4cc12020-08-10 10:55:56 -06001228
1229 req->flags &= ~REQ_F_WORK_INITIALIZED;
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001230
Jens Axboedfead8a2020-10-14 10:12:37 -06001231 if (req->work.flags & IO_WQ_WORK_MM) {
Jens Axboe98447d62020-10-14 10:48:51 -06001232 mmdrop(req->work.identity->mm);
Jens Axboedfead8a2020-10-14 10:12:37 -06001233 req->work.flags &= ~IO_WQ_WORK_MM;
Jens Axboecccf0ee2020-01-27 16:34:48 -07001234 }
Dennis Zhou91d8f512020-09-16 13:41:05 -07001235#ifdef CONFIG_BLK_CGROUP
Jens Axboedfead8a2020-10-14 10:12:37 -06001236 if (req->work.flags & IO_WQ_WORK_BLKCG) {
Jens Axboe98447d62020-10-14 10:48:51 -06001237 css_put(req->work.identity->blkcg_css);
Jens Axboedfead8a2020-10-14 10:12:37 -06001238 req->work.flags &= ~IO_WQ_WORK_BLKCG;
Jens Axboecccf0ee2020-01-27 16:34:48 -07001239 }
Jens Axboedfead8a2020-10-14 10:12:37 -06001240#endif
1241 if (req->work.flags & IO_WQ_WORK_CREDS) {
Jens Axboe98447d62020-10-14 10:48:51 -06001242 put_cred(req->work.identity->creds);
Jens Axboedfead8a2020-10-14 10:12:37 -06001243 req->work.flags &= ~IO_WQ_WORK_CREDS;
1244 }
1245 if (req->work.flags & IO_WQ_WORK_FS) {
Jens Axboe98447d62020-10-14 10:48:51 -06001246 struct fs_struct *fs = req->work.identity->fs;
Jens Axboeff002b32020-02-07 16:05:21 -07001247
Jens Axboe98447d62020-10-14 10:48:51 -06001248 spin_lock(&req->work.identity->fs->lock);
Jens Axboeff002b32020-02-07 16:05:21 -07001249 if (--fs->users)
1250 fs = NULL;
Jens Axboe98447d62020-10-14 10:48:51 -06001251 spin_unlock(&req->work.identity->fs->lock);
Jens Axboeff002b32020-02-07 16:05:21 -07001252 if (fs)
1253 free_fs_struct(fs);
Jens Axboedfead8a2020-10-14 10:12:37 -06001254 req->work.flags &= ~IO_WQ_WORK_FS;
Jens Axboeff002b32020-02-07 16:05:21 -07001255 }
Jens Axboe51a4cc12020-08-10 10:55:56 -06001256
Jens Axboe5c3462c2020-10-15 09:02:33 -06001257 io_put_identity(req->task->io_uring, req);
Jens Axboe1e6fa522020-10-15 08:46:24 -06001258}
1259
1260/*
1261 * Create a private copy of io_identity, since some fields don't match
1262 * the current context.
1263 */
1264static bool io_identity_cow(struct io_kiocb *req)
1265{
Jens Axboe5c3462c2020-10-15 09:02:33 -06001266 struct io_uring_task *tctx = current->io_uring;
Jens Axboe1e6fa522020-10-15 08:46:24 -06001267 const struct cred *creds = NULL;
1268 struct io_identity *id;
1269
1270 if (req->work.flags & IO_WQ_WORK_CREDS)
1271 creds = req->work.identity->creds;
1272
1273 id = kmemdup(req->work.identity, sizeof(*id), GFP_KERNEL);
1274 if (unlikely(!id)) {
1275 req->work.flags |= IO_WQ_WORK_CANCEL;
1276 return false;
1277 }
1278
1279 /*
1280 * We can safely just re-init the creds we copied Either the field
1281 * matches the current one, or we haven't grabbed it yet. The only
1282 * exception is ->creds, through registered personalities, so handle
1283 * that one separately.
1284 */
1285 io_init_identity(id);
1286 if (creds)
Pavel Begunkove8c954d2020-12-06 22:22:46 +00001287 id->creds = creds;
Jens Axboe1e6fa522020-10-15 08:46:24 -06001288
1289 /* add one for this request */
1290 refcount_inc(&id->count);
1291
Jens Axboecb8a8ae2020-11-03 12:19:07 -07001292 /* drop tctx and req identity references, if needed */
1293 if (tctx->identity != &tctx->__identity &&
1294 refcount_dec_and_test(&tctx->identity->count))
1295 kfree(tctx->identity);
1296 if (req->work.identity != &tctx->__identity &&
1297 refcount_dec_and_test(&req->work.identity->count))
Jens Axboe1e6fa522020-10-15 08:46:24 -06001298 kfree(req->work.identity);
1299
1300 req->work.identity = id;
Jens Axboe500a3732020-10-15 17:38:03 -06001301 tctx->identity = id;
Jens Axboe1e6fa522020-10-15 08:46:24 -06001302 return true;
1303}
1304
1305static bool io_grab_identity(struct io_kiocb *req)
1306{
1307 const struct io_op_def *def = &io_op_defs[req->opcode];
Jens Axboe5c3462c2020-10-15 09:02:33 -06001308 struct io_identity *id = req->work.identity;
Jens Axboe1e6fa522020-10-15 08:46:24 -06001309 struct io_ring_ctx *ctx = req->ctx;
1310
Jens Axboe69228332020-10-20 14:28:41 -06001311 if (def->work_flags & IO_WQ_WORK_FSIZE) {
1312 if (id->fsize != rlimit(RLIMIT_FSIZE))
1313 return false;
1314 req->work.flags |= IO_WQ_WORK_FSIZE;
1315 }
Jens Axboe1e6fa522020-10-15 08:46:24 -06001316#ifdef CONFIG_BLK_CGROUP
1317 if (!(req->work.flags & IO_WQ_WORK_BLKCG) &&
1318 (def->work_flags & IO_WQ_WORK_BLKCG)) {
1319 rcu_read_lock();
1320 if (id->blkcg_css != blkcg_css()) {
1321 rcu_read_unlock();
1322 return false;
1323 }
1324 /*
1325 * This should be rare, either the cgroup is dying or the task
1326 * is moving cgroups. Just punt to root for the handful of ios.
1327 */
1328 if (css_tryget_online(id->blkcg_css))
1329 req->work.flags |= IO_WQ_WORK_BLKCG;
1330 rcu_read_unlock();
1331 }
1332#endif
1333 if (!(req->work.flags & IO_WQ_WORK_CREDS)) {
1334 if (id->creds != current_cred())
1335 return false;
1336 get_cred(id->creds);
1337 req->work.flags |= IO_WQ_WORK_CREDS;
1338 }
Jens Axboe4ea33a92020-10-15 13:46:44 -06001339#ifdef CONFIG_AUDIT
1340 if (!uid_eq(current->loginuid, id->loginuid) ||
1341 current->sessionid != id->sessionid)
1342 return false;
1343#endif
Jens Axboe1e6fa522020-10-15 08:46:24 -06001344 if (!(req->work.flags & IO_WQ_WORK_FS) &&
1345 (def->work_flags & IO_WQ_WORK_FS)) {
1346 if (current->fs != id->fs)
1347 return false;
1348 spin_lock(&id->fs->lock);
1349 if (!id->fs->in_exec) {
1350 id->fs->users++;
1351 req->work.flags |= IO_WQ_WORK_FS;
1352 } else {
1353 req->work.flags |= IO_WQ_WORK_CANCEL;
1354 }
1355 spin_unlock(&current->fs->lock);
1356 }
Pavel Begunkovaf604702020-11-25 18:41:28 +00001357 if (!(req->work.flags & IO_WQ_WORK_FILES) &&
1358 (def->work_flags & IO_WQ_WORK_FILES) &&
1359 !(req->flags & REQ_F_NO_FILE_TABLE)) {
1360 if (id->files != current->files ||
1361 id->nsproxy != current->nsproxy)
1362 return false;
1363 atomic_inc(&id->files->count);
1364 get_nsproxy(id->nsproxy);
1365 req->flags |= REQ_F_INFLIGHT;
1366
1367 spin_lock_irq(&ctx->inflight_lock);
1368 list_add(&req->inflight_entry, &ctx->inflight_list);
1369 spin_unlock_irq(&ctx->inflight_lock);
1370 req->work.flags |= IO_WQ_WORK_FILES;
1371 }
Jens Axboe1e6fa522020-10-15 08:46:24 -06001372
1373 return true;
Jens Axboe561fb042019-10-24 07:25:42 -06001374}
1375
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001376static void io_prep_async_work(struct io_kiocb *req)
Jens Axboe561fb042019-10-24 07:25:42 -06001377{
Jens Axboed3656342019-12-18 09:50:26 -07001378 const struct io_op_def *def = &io_op_defs[req->opcode];
Pavel Begunkov23329512020-10-10 18:34:06 +01001379 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5c3462c2020-10-15 09:02:33 -06001380 struct io_identity *id;
Jens Axboe54a91f32019-09-10 09:15:04 -06001381
Pavel Begunkov16d59802020-07-12 16:16:47 +03001382 io_req_init_async(req);
Jens Axboe5c3462c2020-10-15 09:02:33 -06001383 id = req->work.identity;
Pavel Begunkov16d59802020-07-12 16:16:47 +03001384
Pavel Begunkovfeaadc42020-10-22 16:47:16 +01001385 if (req->flags & REQ_F_FORCE_ASYNC)
1386 req->work.flags |= IO_WQ_WORK_CONCURRENT;
1387
Jens Axboed3656342019-12-18 09:50:26 -07001388 if (req->flags & REQ_F_ISREG) {
Pavel Begunkov23329512020-10-10 18:34:06 +01001389 if (def->hash_reg_file || (ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov8766dd52020-03-14 00:31:04 +03001390 io_wq_hash_work(&req->work, file_inode(req->file));
Jens Axboed3656342019-12-18 09:50:26 -07001391 } else {
1392 if (def->unbound_nonreg_file)
Jens Axboe3529d8c2019-12-19 18:24:38 -07001393 req->work.flags |= IO_WQ_WORK_UNBOUND;
Jens Axboe54a91f32019-09-10 09:15:04 -06001394 }
Pavel Begunkov23329512020-10-10 18:34:06 +01001395
Jens Axboe1e6fa522020-10-15 08:46:24 -06001396 /* ->mm can never change on us */
Jens Axboedfead8a2020-10-14 10:12:37 -06001397 if (!(req->work.flags & IO_WQ_WORK_MM) &&
1398 (def->work_flags & IO_WQ_WORK_MM)) {
Jens Axboe1e6fa522020-10-15 08:46:24 -06001399 mmgrab(id->mm);
Jens Axboedfead8a2020-10-14 10:12:37 -06001400 req->work.flags |= IO_WQ_WORK_MM;
Pavel Begunkov23329512020-10-10 18:34:06 +01001401 }
Jens Axboe1e6fa522020-10-15 08:46:24 -06001402
1403 /* if we fail grabbing identity, we must COW, regrab, and retry */
1404 if (io_grab_identity(req))
1405 return;
1406
1407 if (!io_identity_cow(req))
1408 return;
1409
1410 /* can't fail at this point */
1411 if (!io_grab_identity(req))
1412 WARN_ON(1);
Jens Axboe561fb042019-10-24 07:25:42 -06001413}
1414
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001415static void io_prep_async_link(struct io_kiocb *req)
1416{
1417 struct io_kiocb *cur;
1418
1419 io_prep_async_work(req);
1420 if (req->flags & REQ_F_LINK_HEAD)
1421 list_for_each_entry(cur, &req->link_list, link_list)
1422 io_prep_async_work(cur);
1423}
1424
Jens Axboe7271ef32020-08-10 09:55:22 -06001425static struct io_kiocb *__io_queue_async_work(struct io_kiocb *req)
Jens Axboe561fb042019-10-24 07:25:42 -06001426{
Jackie Liua197f662019-11-08 08:09:12 -07001427 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001428 struct io_kiocb *link = io_prep_linked_timeout(req);
Jens Axboe561fb042019-10-24 07:25:42 -06001429
Pavel Begunkov8766dd52020-03-14 00:31:04 +03001430 trace_io_uring_queue_async_work(ctx, io_wq_is_hashed(&req->work), req,
1431 &req->work, req->flags);
1432 io_wq_enqueue(ctx->io_wq, &req->work);
Jens Axboe7271ef32020-08-10 09:55:22 -06001433 return link;
Jens Axboe18d9be12019-09-10 09:13:05 -06001434}
1435
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001436static void io_queue_async_work(struct io_kiocb *req)
1437{
Jens Axboe7271ef32020-08-10 09:55:22 -06001438 struct io_kiocb *link;
1439
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001440 /* init ->work of the whole link before punting */
1441 io_prep_async_link(req);
Jens Axboe7271ef32020-08-10 09:55:22 -06001442 link = __io_queue_async_work(req);
1443
1444 if (link)
1445 io_queue_linked_timeout(link);
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001446}
1447
Jens Axboe5262f562019-09-17 12:26:57 -06001448static void io_kill_timeout(struct io_kiocb *req)
1449{
Jens Axboee8c2bc12020-08-15 18:44:09 -07001450 struct io_timeout_data *io = req->async_data;
Jens Axboe5262f562019-09-17 12:26:57 -06001451 int ret;
1452
Jens Axboee8c2bc12020-08-15 18:44:09 -07001453 ret = hrtimer_try_to_cancel(&io->timer);
Jens Axboe5262f562019-09-17 12:26:57 -06001454 if (ret != -1) {
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03001455 atomic_set(&req->ctx->cq_timeouts,
1456 atomic_read(&req->ctx->cq_timeouts) + 1);
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001457 list_del_init(&req->timeout.list);
Jens Axboe78e19bb2019-11-06 15:21:34 -07001458 io_cqring_fill_event(req, 0);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001459 io_put_req_deferred(req, 1);
Jens Axboe5262f562019-09-17 12:26:57 -06001460 }
1461}
1462
Jens Axboef3606e32020-09-22 08:18:24 -06001463static bool io_task_match(struct io_kiocb *req, struct task_struct *tsk)
1464{
1465 struct io_ring_ctx *ctx = req->ctx;
1466
1467 if (!tsk || req->task == tsk)
1468 return true;
Jens Axboe534ca6d2020-09-02 13:52:19 -06001469 if (ctx->flags & IORING_SETUP_SQPOLL) {
1470 if (ctx->sq_data && req->task == ctx->sq_data->thread)
1471 return true;
1472 }
Jens Axboef3606e32020-09-22 08:18:24 -06001473 return false;
1474}
1475
Jens Axboe76e1b642020-09-26 15:05:03 -06001476/*
1477 * Returns true if we found and killed one or more timeouts
1478 */
1479static bool io_kill_timeouts(struct io_ring_ctx *ctx, struct task_struct *tsk)
Jens Axboe5262f562019-09-17 12:26:57 -06001480{
1481 struct io_kiocb *req, *tmp;
Jens Axboe76e1b642020-09-26 15:05:03 -06001482 int canceled = 0;
Jens Axboe5262f562019-09-17 12:26:57 -06001483
1484 spin_lock_irq(&ctx->completion_lock);
Jens Axboef3606e32020-09-22 08:18:24 -06001485 list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
Jens Axboe76e1b642020-09-26 15:05:03 -06001486 if (io_task_match(req, tsk)) {
Jens Axboef3606e32020-09-22 08:18:24 -06001487 io_kill_timeout(req);
Jens Axboe76e1b642020-09-26 15:05:03 -06001488 canceled++;
1489 }
Jens Axboef3606e32020-09-22 08:18:24 -06001490 }
Jens Axboe5262f562019-09-17 12:26:57 -06001491 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe76e1b642020-09-26 15:05:03 -06001492 return canceled != 0;
Jens Axboe5262f562019-09-17 12:26:57 -06001493}
1494
Pavel Begunkov04518942020-05-26 20:34:05 +03001495static void __io_queue_deferred(struct io_ring_ctx *ctx)
1496{
1497 do {
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001498 struct io_defer_entry *de = list_first_entry(&ctx->defer_list,
1499 struct io_defer_entry, list);
Jens Axboe7271ef32020-08-10 09:55:22 -06001500 struct io_kiocb *link;
Pavel Begunkov04518942020-05-26 20:34:05 +03001501
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001502 if (req_need_defer(de->req, de->seq))
Pavel Begunkov04518942020-05-26 20:34:05 +03001503 break;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001504 list_del_init(&de->list);
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001505 /* punt-init is done before queueing for defer */
Jens Axboe7271ef32020-08-10 09:55:22 -06001506 link = __io_queue_async_work(de->req);
1507 if (link) {
1508 __io_queue_linked_timeout(link);
1509 /* drop submission reference */
Pavel Begunkov216578e2020-10-13 09:44:00 +01001510 io_put_req_deferred(link, 1);
Jens Axboe7271ef32020-08-10 09:55:22 -06001511 }
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001512 kfree(de);
Pavel Begunkov04518942020-05-26 20:34:05 +03001513 } while (!list_empty(&ctx->defer_list));
1514}
1515
Pavel Begunkov360428f2020-05-30 14:54:17 +03001516static void io_flush_timeouts(struct io_ring_ctx *ctx)
1517{
1518 while (!list_empty(&ctx->timeout_list)) {
1519 struct io_kiocb *req = list_first_entry(&ctx->timeout_list,
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001520 struct io_kiocb, timeout.list);
Pavel Begunkov360428f2020-05-30 14:54:17 +03001521
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001522 if (io_is_timeout_noseq(req))
Pavel Begunkov360428f2020-05-30 14:54:17 +03001523 break;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03001524 if (req->timeout.target_seq != ctx->cached_cq_tail
1525 - atomic_read(&ctx->cq_timeouts))
Pavel Begunkov360428f2020-05-30 14:54:17 +03001526 break;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03001527
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001528 list_del_init(&req->timeout.list);
Pavel Begunkov360428f2020-05-30 14:54:17 +03001529 io_kill_timeout(req);
1530 }
1531}
1532
Jens Axboede0617e2019-04-06 21:51:27 -06001533static void io_commit_cqring(struct io_ring_ctx *ctx)
1534{
Pavel Begunkov360428f2020-05-30 14:54:17 +03001535 io_flush_timeouts(ctx);
Jens Axboede0617e2019-04-06 21:51:27 -06001536 __io_commit_cqring(ctx);
1537
Pavel Begunkov04518942020-05-26 20:34:05 +03001538 if (unlikely(!list_empty(&ctx->defer_list)))
1539 __io_queue_deferred(ctx);
Jens Axboede0617e2019-04-06 21:51:27 -06001540}
1541
Jens Axboe90554202020-09-03 12:12:41 -06001542static inline bool io_sqring_full(struct io_ring_ctx *ctx)
1543{
1544 struct io_rings *r = ctx->rings;
1545
1546 return READ_ONCE(r->sq.tail) - ctx->cached_sq_head == r->sq_ring_entries;
1547}
1548
Jens Axboe2b188cc2019-01-07 10:46:33 -07001549static struct io_uring_cqe *io_get_cqring(struct io_ring_ctx *ctx)
1550{
Hristo Venev75b28af2019-08-26 17:23:46 +00001551 struct io_rings *rings = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001552 unsigned tail;
1553
1554 tail = ctx->cached_cq_tail;
Stefan Bühler115e12e2019-04-24 23:54:18 +02001555 /*
1556 * writes to the cq entry need to come after reading head; the
1557 * control dependency is enough as we're using WRITE_ONCE to
1558 * fill the cq entry
1559 */
Hristo Venev75b28af2019-08-26 17:23:46 +00001560 if (tail - READ_ONCE(rings->cq.head) == rings->cq_ring_entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001561 return NULL;
1562
1563 ctx->cached_cq_tail++;
Hristo Venev75b28af2019-08-26 17:23:46 +00001564 return &rings->cqes[tail & ctx->cq_mask];
Jens Axboe2b188cc2019-01-07 10:46:33 -07001565}
1566
Jens Axboef2842ab2020-01-08 11:04:00 -07001567static inline bool io_should_trigger_evfd(struct io_ring_ctx *ctx)
1568{
Jens Axboef0b493e2020-02-01 21:30:11 -07001569 if (!ctx->cq_ev_fd)
1570 return false;
Stefano Garzarella7e55a192020-05-15 18:38:05 +02001571 if (READ_ONCE(ctx->rings->cq_flags) & IORING_CQ_EVENTFD_DISABLED)
1572 return false;
Jens Axboef2842ab2020-01-08 11:04:00 -07001573 if (!ctx->eventfd_async)
1574 return true;
Jens Axboeb41e9852020-02-17 09:52:41 -07001575 return io_wq_current_is_worker();
Jens Axboef2842ab2020-01-08 11:04:00 -07001576}
1577
Jens Axboeb41e9852020-02-17 09:52:41 -07001578static void io_cqring_ev_posted(struct io_ring_ctx *ctx)
Jens Axboe8c838782019-03-12 15:48:16 -06001579{
1580 if (waitqueue_active(&ctx->wait))
1581 wake_up(&ctx->wait);
Jens Axboe534ca6d2020-09-02 13:52:19 -06001582 if (ctx->sq_data && waitqueue_active(&ctx->sq_data->wait))
1583 wake_up(&ctx->sq_data->wait);
Jens Axboeb41e9852020-02-17 09:52:41 -07001584 if (io_should_trigger_evfd(ctx))
Jens Axboe9b402842019-04-11 11:45:41 -06001585 eventfd_signal(ctx->cq_ev_fd, 1);
Jens Axboe8c838782019-03-12 15:48:16 -06001586}
1587
Pavel Begunkov46930142020-07-30 18:43:49 +03001588static void io_cqring_mark_overflow(struct io_ring_ctx *ctx)
1589{
1590 if (list_empty(&ctx->cq_overflow_list)) {
1591 clear_bit(0, &ctx->sq_check_overflow);
1592 clear_bit(0, &ctx->cq_check_overflow);
1593 ctx->rings->sq_flags &= ~IORING_SQ_CQ_OVERFLOW;
1594 }
1595}
1596
Pavel Begunkov99b32802020-11-04 13:39:31 +00001597static inline bool __io_match_files(struct io_kiocb *req,
1598 struct files_struct *files)
Jens Axboee6c8aa92020-09-28 13:10:13 -06001599{
Pavel Begunkov99b32802020-11-04 13:39:31 +00001600 return ((req->flags & REQ_F_WORK_INITIALIZED) &&
1601 (req->work.flags & IO_WQ_WORK_FILES)) &&
1602 req->work.identity->files == files;
1603}
1604
1605static bool io_match_files(struct io_kiocb *req,
1606 struct files_struct *files)
1607{
1608 struct io_kiocb *link;
1609
Jens Axboee6c8aa92020-09-28 13:10:13 -06001610 if (!files)
1611 return true;
Pavel Begunkov99b32802020-11-04 13:39:31 +00001612 if (__io_match_files(req, files))
1613 return true;
1614 if (req->flags & REQ_F_LINK_HEAD) {
1615 list_for_each_entry(link, &req->link_list, link_list) {
1616 if (__io_match_files(link, files))
1617 return true;
1618 }
1619 }
Jens Axboee6c8aa92020-09-28 13:10:13 -06001620 return false;
1621}
1622
Jens Axboec4a2ed72019-11-21 21:01:26 -07001623/* Returns true if there are no backlogged entries after the flush */
Jens Axboee6c8aa92020-09-28 13:10:13 -06001624static bool io_cqring_overflow_flush(struct io_ring_ctx *ctx, bool force,
1625 struct task_struct *tsk,
1626 struct files_struct *files)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001627{
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001628 struct io_rings *rings = ctx->rings;
Jens Axboee6c8aa92020-09-28 13:10:13 -06001629 struct io_kiocb *req, *tmp;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001630 struct io_uring_cqe *cqe;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001631 unsigned long flags;
1632 LIST_HEAD(list);
1633
1634 if (!force) {
1635 if (list_empty_careful(&ctx->cq_overflow_list))
Jens Axboec4a2ed72019-11-21 21:01:26 -07001636 return true;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001637 if ((ctx->cached_cq_tail - READ_ONCE(rings->cq.head) ==
1638 rings->cq_ring_entries))
Jens Axboec4a2ed72019-11-21 21:01:26 -07001639 return false;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001640 }
1641
1642 spin_lock_irqsave(&ctx->completion_lock, flags);
1643
1644 /* if force is set, the ring is going away. always drop after that */
1645 if (force)
Jens Axboe69b3e542020-01-08 11:01:46 -07001646 ctx->cq_overflow_flushed = 1;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001647
Jens Axboec4a2ed72019-11-21 21:01:26 -07001648 cqe = NULL;
Jens Axboee6c8aa92020-09-28 13:10:13 -06001649 list_for_each_entry_safe(req, tmp, &ctx->cq_overflow_list, compl.list) {
1650 if (tsk && req->task != tsk)
1651 continue;
1652 if (!io_match_files(req, files))
1653 continue;
1654
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001655 cqe = io_get_cqring(ctx);
1656 if (!cqe && !force)
1657 break;
1658
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001659 list_move(&req->compl.list, &list);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001660 if (cqe) {
1661 WRITE_ONCE(cqe->user_data, req->user_data);
1662 WRITE_ONCE(cqe->res, req->result);
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001663 WRITE_ONCE(cqe->flags, req->compl.cflags);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001664 } else {
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001665 ctx->cached_cq_overflow++;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001666 WRITE_ONCE(ctx->rings->cq_overflow,
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001667 ctx->cached_cq_overflow);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001668 }
1669 }
1670
1671 io_commit_cqring(ctx);
Pavel Begunkov46930142020-07-30 18:43:49 +03001672 io_cqring_mark_overflow(ctx);
1673
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001674 spin_unlock_irqrestore(&ctx->completion_lock, flags);
1675 io_cqring_ev_posted(ctx);
1676
1677 while (!list_empty(&list)) {
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001678 req = list_first_entry(&list, struct io_kiocb, compl.list);
1679 list_del(&req->compl.list);
Jackie Liuec9c02a2019-11-08 23:50:36 +08001680 io_put_req(req);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001681 }
Jens Axboec4a2ed72019-11-21 21:01:26 -07001682
1683 return cqe != NULL;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001684}
1685
Jens Axboebcda7ba2020-02-23 16:42:51 -07001686static void __io_cqring_fill_event(struct io_kiocb *req, long res, long cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001687{
Jens Axboe78e19bb2019-11-06 15:21:34 -07001688 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001689 struct io_uring_cqe *cqe;
1690
Jens Axboe78e19bb2019-11-06 15:21:34 -07001691 trace_io_uring_complete(ctx, req->user_data, res);
Jens Axboe51c3ff62019-11-03 06:52:50 -07001692
Jens Axboe2b188cc2019-01-07 10:46:33 -07001693 /*
1694 * If we can't get a cq entry, userspace overflowed the
1695 * submission (by quite a lot). Increment the overflow count in
1696 * the ring.
1697 */
1698 cqe = io_get_cqring(ctx);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001699 if (likely(cqe)) {
Jens Axboe78e19bb2019-11-06 15:21:34 -07001700 WRITE_ONCE(cqe->user_data, req->user_data);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001701 WRITE_ONCE(cqe->res, res);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001702 WRITE_ONCE(cqe->flags, cflags);
Jens Axboefdaf0832020-10-30 09:37:30 -06001703 } else if (ctx->cq_overflow_flushed ||
1704 atomic_read(&req->task->io_uring->in_idle)) {
Jens Axboe0f212202020-09-13 13:09:39 -06001705 /*
1706 * If we're in ring overflow flush mode, or in task cancel mode,
1707 * then we cannot store the request for later flushing, we need
1708 * to drop it on the floor.
1709 */
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001710 ctx->cached_cq_overflow++;
1711 WRITE_ONCE(ctx->rings->cq_overflow, ctx->cached_cq_overflow);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001712 } else {
Jens Axboead3eb2c2019-12-18 17:12:20 -07001713 if (list_empty(&ctx->cq_overflow_list)) {
1714 set_bit(0, &ctx->sq_check_overflow);
1715 set_bit(0, &ctx->cq_check_overflow);
Xiaoguang Wang6d5f9042020-07-09 09:15:29 +08001716 ctx->rings->sq_flags |= IORING_SQ_CQ_OVERFLOW;
Jens Axboead3eb2c2019-12-18 17:12:20 -07001717 }
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001718 io_clean_op(req);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001719 req->result = res;
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001720 req->compl.cflags = cflags;
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001721 refcount_inc(&req->refs);
1722 list_add_tail(&req->compl.list, &ctx->cq_overflow_list);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001723 }
1724}
1725
Jens Axboebcda7ba2020-02-23 16:42:51 -07001726static void io_cqring_fill_event(struct io_kiocb *req, long res)
1727{
1728 __io_cqring_fill_event(req, res, 0);
1729}
1730
Jens Axboee1e16092020-06-22 09:17:17 -06001731static void io_cqring_add_event(struct io_kiocb *req, long res, long cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001732{
Jens Axboe78e19bb2019-11-06 15:21:34 -07001733 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001734 unsigned long flags;
1735
1736 spin_lock_irqsave(&ctx->completion_lock, flags);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001737 __io_cqring_fill_event(req, res, cflags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001738 io_commit_cqring(ctx);
1739 spin_unlock_irqrestore(&ctx->completion_lock, flags);
1740
Jens Axboe8c838782019-03-12 15:48:16 -06001741 io_cqring_ev_posted(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001742}
1743
Jens Axboe229a7b62020-06-22 10:13:11 -06001744static void io_submit_flush_completions(struct io_comp_state *cs)
Jens Axboebcda7ba2020-02-23 16:42:51 -07001745{
Jens Axboe229a7b62020-06-22 10:13:11 -06001746 struct io_ring_ctx *ctx = cs->ctx;
1747
1748 spin_lock_irq(&ctx->completion_lock);
1749 while (!list_empty(&cs->list)) {
1750 struct io_kiocb *req;
1751
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001752 req = list_first_entry(&cs->list, struct io_kiocb, compl.list);
1753 list_del(&req->compl.list);
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001754 __io_cqring_fill_event(req, req->result, req->compl.cflags);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001755
1756 /*
1757 * io_free_req() doesn't care about completion_lock unless one
1758 * of these flags is set. REQ_F_WORK_INITIALIZED is in the list
1759 * because of a potential deadlock with req->work.fs->lock
1760 */
1761 if (req->flags & (REQ_F_FAIL_LINK|REQ_F_LINK_TIMEOUT
1762 |REQ_F_WORK_INITIALIZED)) {
Jens Axboe229a7b62020-06-22 10:13:11 -06001763 spin_unlock_irq(&ctx->completion_lock);
1764 io_put_req(req);
1765 spin_lock_irq(&ctx->completion_lock);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001766 } else {
1767 io_put_req(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06001768 }
1769 }
1770 io_commit_cqring(ctx);
1771 spin_unlock_irq(&ctx->completion_lock);
1772
1773 io_cqring_ev_posted(ctx);
1774 cs->nr = 0;
1775}
1776
1777static void __io_req_complete(struct io_kiocb *req, long res, unsigned cflags,
1778 struct io_comp_state *cs)
1779{
1780 if (!cs) {
1781 io_cqring_add_event(req, res, cflags);
1782 io_put_req(req);
1783 } else {
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001784 io_clean_op(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06001785 req->result = res;
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001786 req->compl.cflags = cflags;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001787 list_add_tail(&req->compl.list, &cs->list);
Jens Axboe229a7b62020-06-22 10:13:11 -06001788 if (++cs->nr >= 32)
1789 io_submit_flush_completions(cs);
1790 }
Jens Axboee1e16092020-06-22 09:17:17 -06001791}
1792
1793static void io_req_complete(struct io_kiocb *req, long res)
1794{
Jens Axboe229a7b62020-06-22 10:13:11 -06001795 __io_req_complete(req, res, 0, NULL);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001796}
1797
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001798static inline bool io_is_fallback_req(struct io_kiocb *req)
1799{
1800 return req == (struct io_kiocb *)
1801 ((unsigned long) req->ctx->fallback_req & ~1UL);
1802}
1803
1804static struct io_kiocb *io_get_fallback_req(struct io_ring_ctx *ctx)
1805{
1806 struct io_kiocb *req;
1807
1808 req = ctx->fallback_req;
Bijan Mottahedehdd461af2020-04-29 17:47:50 -07001809 if (!test_and_set_bit_lock(0, (unsigned long *) &ctx->fallback_req))
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001810 return req;
1811
1812 return NULL;
1813}
1814
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03001815static struct io_kiocb *io_alloc_req(struct io_ring_ctx *ctx,
1816 struct io_submit_state *state)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001817{
Pavel Begunkovf6b6c7d2020-06-21 13:09:53 +03001818 if (!state->free_reqs) {
Pavel Begunkov291b2822020-09-30 22:57:01 +03001819 gfp_t gfp = GFP_KERNEL | __GFP_NOWARN;
Jens Axboe2579f912019-01-09 09:10:43 -07001820 size_t sz;
1821 int ret;
1822
1823 sz = min_t(size_t, state->ios_left, ARRAY_SIZE(state->reqs));
Jens Axboefd6fab22019-03-14 16:30:06 -06001824 ret = kmem_cache_alloc_bulk(req_cachep, gfp, sz, state->reqs);
1825
1826 /*
1827 * Bulk alloc is all-or-nothing. If we fail to get a batch,
1828 * retry single alloc to be on the safe side.
1829 */
1830 if (unlikely(ret <= 0)) {
1831 state->reqs[0] = kmem_cache_alloc(req_cachep, gfp);
1832 if (!state->reqs[0])
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001833 goto fallback;
Jens Axboefd6fab22019-03-14 16:30:06 -06001834 ret = 1;
1835 }
Pavel Begunkov291b2822020-09-30 22:57:01 +03001836 state->free_reqs = ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001837 }
1838
Pavel Begunkov291b2822020-09-30 22:57:01 +03001839 state->free_reqs--;
1840 return state->reqs[state->free_reqs];
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001841fallback:
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03001842 return io_get_fallback_req(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001843}
1844
Pavel Begunkov8da11c12020-02-24 11:32:44 +03001845static inline void io_put_file(struct io_kiocb *req, struct file *file,
1846 bool fixed)
1847{
1848 if (fixed)
Xiaoguang Wang05589552020-03-31 14:05:18 +08001849 percpu_ref_put(req->fixed_file_refs);
Pavel Begunkov8da11c12020-02-24 11:32:44 +03001850 else
1851 fput(file);
1852}
1853
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001854static void io_dismantle_req(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001855{
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001856 io_clean_op(req);
Pavel Begunkov929a3af2020-02-19 00:19:09 +03001857
Jens Axboee8c2bc12020-08-15 18:44:09 -07001858 if (req->async_data)
1859 kfree(req->async_data);
Pavel Begunkov8da11c12020-02-24 11:32:44 +03001860 if (req->file)
1861 io_put_file(req, req->file, (req->flags & REQ_F_FIXED_FILE));
Jens Axboefcb323c2019-10-24 12:39:47 -06001862
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001863 io_req_clean_work(req);
Pavel Begunkove6543a82020-06-28 12:52:30 +03001864}
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03001865
Pavel Begunkov216578e2020-10-13 09:44:00 +01001866static void __io_free_req(struct io_kiocb *req)
Pavel Begunkove6543a82020-06-28 12:52:30 +03001867{
Jens Axboe0f212202020-09-13 13:09:39 -06001868 struct io_uring_task *tctx = req->task->io_uring;
Jens Axboe51a4cc12020-08-10 10:55:56 -06001869 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovecfc5172020-06-29 13:13:03 +03001870
Pavel Begunkov216578e2020-10-13 09:44:00 +01001871 io_dismantle_req(req);
Pavel Begunkove6543a82020-06-28 12:52:30 +03001872
Jens Axboed8a6df12020-10-15 16:24:45 -06001873 percpu_counter_dec(&tctx->inflight);
Jens Axboefdaf0832020-10-30 09:37:30 -06001874 if (atomic_read(&tctx->in_idle))
Jens Axboe0f212202020-09-13 13:09:39 -06001875 wake_up(&tctx->wait);
Jens Axboee3bc8e92020-09-24 08:45:57 -06001876 put_task_struct(req->task);
1877
Pavel Begunkovb1e50e52020-04-08 08:58:44 +03001878 if (likely(!io_is_fallback_req(req)))
1879 kmem_cache_free(req_cachep, req);
1880 else
Pavel Begunkovecfc5172020-06-29 13:13:03 +03001881 clear_bit_unlock(0, (unsigned long *) &ctx->fallback_req);
1882 percpu_ref_put(&ctx->refs);
Jens Axboee65ef562019-03-12 10:16:44 -06001883}
1884
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001885static void io_kill_linked_timeout(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06001886{
Jackie Liua197f662019-11-08 08:09:12 -07001887 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001888 struct io_kiocb *link;
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001889 bool cancelled = false;
1890 unsigned long flags;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001891
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001892 spin_lock_irqsave(&ctx->completion_lock, flags);
1893 link = list_first_entry_or_null(&req->link_list, struct io_kiocb,
1894 link_list);
Pavel Begunkov900fad42020-10-19 16:39:16 +01001895 /*
1896 * Can happen if a linked timeout fired and link had been like
1897 * req -> link t-out -> link t-out [-> ...]
1898 */
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001899 if (link && (link->flags & REQ_F_LTIMEOUT_ACTIVE)) {
1900 struct io_timeout_data *io = link->async_data;
1901 int ret;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001902
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001903 list_del_init(&link->link_list);
1904 ret = hrtimer_try_to_cancel(&io->timer);
1905 if (ret != -1) {
1906 io_cqring_fill_event(link, -ECANCELED);
1907 io_commit_cqring(ctx);
1908 cancelled = true;
1909 }
1910 }
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001911 req->flags &= ~REQ_F_LINK_TIMEOUT;
Pavel Begunkov216578e2020-10-13 09:44:00 +01001912 spin_unlock_irqrestore(&ctx->completion_lock, flags);
Jens Axboeab0b6452020-06-30 08:43:15 -06001913
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001914 if (cancelled) {
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001915 io_cqring_ev_posted(ctx);
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001916 io_put_req(link);
1917 }
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001918}
1919
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001920static struct io_kiocb *io_req_link_next(struct io_kiocb *req)
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001921{
1922 struct io_kiocb *nxt;
Jens Axboe4d7dd462019-11-20 13:03:52 -07001923
Jens Axboe9e645e112019-05-10 16:07:28 -06001924 /*
1925 * The list should never be empty when we are called here. But could
1926 * potentially happen if the chain is messed up, check to be on the
1927 * safe side.
1928 */
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001929 if (unlikely(list_empty(&req->link_list)))
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001930 return NULL;
Jens Axboe94ae5e72019-11-14 19:39:52 -07001931
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001932 nxt = list_first_entry(&req->link_list, struct io_kiocb, link_list);
1933 list_del_init(&req->link_list);
1934 if (!list_empty(&nxt->link_list))
1935 nxt->flags |= REQ_F_LINK_HEAD;
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001936 return nxt;
Jens Axboe9e645e112019-05-10 16:07:28 -06001937}
1938
1939/*
Pavel Begunkovdea3b492020-04-12 02:05:04 +03001940 * Called if REQ_F_LINK_HEAD is set, and we fail the head request
Jens Axboe9e645e112019-05-10 16:07:28 -06001941 */
Pavel Begunkovd148ca42020-10-18 10:17:39 +01001942static void io_fail_links(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06001943{
Jens Axboe2665abf2019-11-05 12:40:47 -07001944 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovd148ca42020-10-18 10:17:39 +01001945 unsigned long flags;
Jens Axboe9e645e112019-05-10 16:07:28 -06001946
Pavel Begunkovd148ca42020-10-18 10:17:39 +01001947 spin_lock_irqsave(&ctx->completion_lock, flags);
Jens Axboe9e645e112019-05-10 16:07:28 -06001948 while (!list_empty(&req->link_list)) {
Pavel Begunkov44932332019-12-05 16:16:35 +03001949 struct io_kiocb *link = list_first_entry(&req->link_list,
1950 struct io_kiocb, link_list);
Jens Axboe9e645e112019-05-10 16:07:28 -06001951
Pavel Begunkov44932332019-12-05 16:16:35 +03001952 list_del_init(&link->link_list);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02001953 trace_io_uring_fail_link(req, link);
Jens Axboe2665abf2019-11-05 12:40:47 -07001954
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001955 io_cqring_fill_event(link, -ECANCELED);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001956
1957 /*
1958 * It's ok to free under spinlock as they're not linked anymore,
1959 * but avoid REQ_F_WORK_INITIALIZED because it may deadlock on
1960 * work.fs->lock.
1961 */
1962 if (link->flags & REQ_F_WORK_INITIALIZED)
1963 io_put_req_deferred(link, 2);
1964 else
1965 io_double_put_req(link);
Jens Axboe9e645e112019-05-10 16:07:28 -06001966 }
Jens Axboe2665abf2019-11-05 12:40:47 -07001967
1968 io_commit_cqring(ctx);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001969 spin_unlock_irqrestore(&ctx->completion_lock, flags);
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001970
Jens Axboe2665abf2019-11-05 12:40:47 -07001971 io_cqring_ev_posted(ctx);
Jens Axboe9e645e112019-05-10 16:07:28 -06001972}
1973
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03001974static struct io_kiocb *__io_req_find_next(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06001975{
Pavel Begunkov9b0d9112020-06-28 12:52:34 +03001976 req->flags &= ~REQ_F_LINK_HEAD;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001977 if (req->flags & REQ_F_LINK_TIMEOUT)
1978 io_kill_linked_timeout(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07001979
Jens Axboe9e645e112019-05-10 16:07:28 -06001980 /*
1981 * If LINK is set, we have dependent requests in this chain. If we
1982 * didn't fail this request, queue the first one up, moving any other
1983 * dependencies to the next request. In case of failure, fail the rest
1984 * of the chain.
1985 */
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001986 if (likely(!(req->flags & REQ_F_FAIL_LINK)))
1987 return io_req_link_next(req);
1988 io_fail_links(req);
1989 return NULL;
Jens Axboe4d7dd462019-11-20 13:03:52 -07001990}
Jens Axboe2665abf2019-11-05 12:40:47 -07001991
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03001992static struct io_kiocb *io_req_find_next(struct io_kiocb *req)
1993{
1994 if (likely(!(req->flags & REQ_F_LINK_HEAD)))
1995 return NULL;
1996 return __io_req_find_next(req);
1997}
1998
Jens Axboe355fb9e2020-10-22 20:19:35 -06001999static int io_req_task_work_add(struct io_kiocb *req)
Jens Axboec2c4c832020-07-01 15:37:11 -06002000{
2001 struct task_struct *tsk = req->task;
2002 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe91989c72020-10-16 09:02:26 -06002003 enum task_work_notify_mode notify;
2004 int ret;
Jens Axboec2c4c832020-07-01 15:37:11 -06002005
Jens Axboe6200b0a2020-09-13 14:38:30 -06002006 if (tsk->flags & PF_EXITING)
2007 return -ESRCH;
2008
Jens Axboec2c4c832020-07-01 15:37:11 -06002009 /*
Jens Axboe0ba9c9e2020-08-06 19:41:50 -06002010 * SQPOLL kernel thread doesn't need notification, just a wakeup. For
2011 * all other cases, use TWA_SIGNAL unconditionally to ensure we're
2012 * processing task_work. There's no reliable way to tell if TWA_RESUME
2013 * will do the job.
Jens Axboec2c4c832020-07-01 15:37:11 -06002014 */
Jens Axboe91989c72020-10-16 09:02:26 -06002015 notify = TWA_NONE;
Jens Axboe355fb9e2020-10-22 20:19:35 -06002016 if (!(ctx->flags & IORING_SETUP_SQPOLL))
Jens Axboec2c4c832020-07-01 15:37:11 -06002017 notify = TWA_SIGNAL;
2018
Jens Axboe87c43112020-09-30 21:00:14 -06002019 ret = task_work_add(tsk, &req->task_work, notify);
Jens Axboec2c4c832020-07-01 15:37:11 -06002020 if (!ret)
2021 wake_up_process(tsk);
Jens Axboe0ba9c9e2020-08-06 19:41:50 -06002022
Jens Axboec2c4c832020-07-01 15:37:11 -06002023 return ret;
2024}
2025
Jens Axboec40f6372020-06-25 15:39:59 -06002026static void __io_req_task_cancel(struct io_kiocb *req, int error)
2027{
2028 struct io_ring_ctx *ctx = req->ctx;
2029
2030 spin_lock_irq(&ctx->completion_lock);
2031 io_cqring_fill_event(req, error);
2032 io_commit_cqring(ctx);
2033 spin_unlock_irq(&ctx->completion_lock);
2034
2035 io_cqring_ev_posted(ctx);
2036 req_set_fail_links(req);
2037 io_double_put_req(req);
2038}
2039
2040static void io_req_task_cancel(struct callback_head *cb)
2041{
2042 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
Jens Axboe87ceb6a2020-09-14 08:20:12 -06002043 struct io_ring_ctx *ctx = req->ctx;
Jens Axboec40f6372020-06-25 15:39:59 -06002044
2045 __io_req_task_cancel(req, -ECANCELED);
Jens Axboe87ceb6a2020-09-14 08:20:12 -06002046 percpu_ref_put(&ctx->refs);
Jens Axboec40f6372020-06-25 15:39:59 -06002047}
2048
2049static void __io_req_task_submit(struct io_kiocb *req)
2050{
2051 struct io_ring_ctx *ctx = req->ctx;
2052
Jens Axboec40f6372020-06-25 15:39:59 -06002053 if (!__io_sq_thread_acquire_mm(ctx)) {
2054 mutex_lock(&ctx->uring_lock);
Pavel Begunkovc1379e22020-09-30 22:57:56 +03002055 __io_queue_sqe(req, NULL);
Jens Axboec40f6372020-06-25 15:39:59 -06002056 mutex_unlock(&ctx->uring_lock);
Jens Axboe2665abf2019-11-05 12:40:47 -07002057 } else {
Jens Axboec40f6372020-06-25 15:39:59 -06002058 __io_req_task_cancel(req, -EFAULT);
Jens Axboe2665abf2019-11-05 12:40:47 -07002059 }
Jens Axboe9e645e112019-05-10 16:07:28 -06002060}
2061
Jens Axboec40f6372020-06-25 15:39:59 -06002062static void io_req_task_submit(struct callback_head *cb)
2063{
2064 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
Jens Axboe6d816e02020-08-11 08:04:14 -06002065 struct io_ring_ctx *ctx = req->ctx;
Jens Axboec40f6372020-06-25 15:39:59 -06002066
2067 __io_req_task_submit(req);
Jens Axboe6d816e02020-08-11 08:04:14 -06002068 percpu_ref_put(&ctx->refs);
Jens Axboec40f6372020-06-25 15:39:59 -06002069}
2070
2071static void io_req_task_queue(struct io_kiocb *req)
2072{
Jens Axboec40f6372020-06-25 15:39:59 -06002073 int ret;
2074
2075 init_task_work(&req->task_work, io_req_task_submit);
Jens Axboe6d816e02020-08-11 08:04:14 -06002076 percpu_ref_get(&req->ctx->refs);
Jens Axboec40f6372020-06-25 15:39:59 -06002077
Jens Axboe355fb9e2020-10-22 20:19:35 -06002078 ret = io_req_task_work_add(req);
Jens Axboec40f6372020-06-25 15:39:59 -06002079 if (unlikely(ret)) {
Jens Axboec2c4c832020-07-01 15:37:11 -06002080 struct task_struct *tsk;
2081
Jens Axboec40f6372020-06-25 15:39:59 -06002082 init_task_work(&req->task_work, io_req_task_cancel);
2083 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06002084 task_work_add(tsk, &req->task_work, TWA_NONE);
Jens Axboec2c4c832020-07-01 15:37:11 -06002085 wake_up_process(tsk);
Jens Axboec40f6372020-06-25 15:39:59 -06002086 }
Jens Axboec40f6372020-06-25 15:39:59 -06002087}
2088
Pavel Begunkovc3524382020-06-28 12:52:32 +03002089static void io_queue_next(struct io_kiocb *req)
Jackie Liuc69f8db2019-11-09 11:00:08 +08002090{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002091 struct io_kiocb *nxt = io_req_find_next(req);
Pavel Begunkov944e58b2019-11-21 23:21:01 +03002092
Pavel Begunkov906a8c32020-06-27 14:04:55 +03002093 if (nxt)
2094 io_req_task_queue(nxt);
Jackie Liuc69f8db2019-11-09 11:00:08 +08002095}
2096
Jens Axboe9e645e112019-05-10 16:07:28 -06002097static void io_free_req(struct io_kiocb *req)
2098{
Pavel Begunkovc3524382020-06-28 12:52:32 +03002099 io_queue_next(req);
Jens Axboe9e645e112019-05-10 16:07:28 -06002100 __io_free_req(req);
Jens Axboee65ef562019-03-12 10:16:44 -06002101}
2102
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002103struct req_batch {
2104 void *reqs[IO_IOPOLL_BATCH];
2105 int to_free;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002106
2107 struct task_struct *task;
2108 int task_refs;
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002109};
2110
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002111static inline void io_init_req_batch(struct req_batch *rb)
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002112{
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002113 rb->to_free = 0;
2114 rb->task_refs = 0;
2115 rb->task = NULL;
2116}
Pavel Begunkov8766dd52020-03-14 00:31:04 +03002117
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002118static void __io_req_free_batch_flush(struct io_ring_ctx *ctx,
2119 struct req_batch *rb)
2120{
2121 kmem_cache_free_bulk(req_cachep, rb->to_free, rb->reqs);
2122 percpu_ref_put_many(&ctx->refs, rb->to_free);
2123 rb->to_free = 0;
2124}
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002125
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002126static void io_req_free_batch_finish(struct io_ring_ctx *ctx,
2127 struct req_batch *rb)
2128{
2129 if (rb->to_free)
2130 __io_req_free_batch_flush(ctx, rb);
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002131 if (rb->task) {
Jens Axboed8a6df12020-10-15 16:24:45 -06002132 struct io_uring_task *tctx = rb->task->io_uring;
2133
2134 percpu_counter_sub(&tctx->inflight, rb->task_refs);
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002135 put_task_struct_many(rb->task, rb->task_refs);
2136 rb->task = NULL;
2137 }
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002138}
2139
2140static void io_req_free_batch(struct req_batch *rb, struct io_kiocb *req)
2141{
2142 if (unlikely(io_is_fallback_req(req))) {
2143 io_free_req(req);
2144 return;
2145 }
2146 if (req->flags & REQ_F_LINK_HEAD)
2147 io_queue_next(req);
2148
Jens Axboee3bc8e92020-09-24 08:45:57 -06002149 if (req->task != rb->task) {
Jens Axboe0f212202020-09-13 13:09:39 -06002150 if (rb->task) {
Jens Axboed8a6df12020-10-15 16:24:45 -06002151 struct io_uring_task *tctx = rb->task->io_uring;
2152
2153 percpu_counter_sub(&tctx->inflight, rb->task_refs);
Jens Axboee3bc8e92020-09-24 08:45:57 -06002154 put_task_struct_many(rb->task, rb->task_refs);
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002155 }
Jens Axboee3bc8e92020-09-24 08:45:57 -06002156 rb->task = req->task;
2157 rb->task_refs = 0;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002158 }
Jens Axboee3bc8e92020-09-24 08:45:57 -06002159 rb->task_refs++;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002160
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01002161 io_dismantle_req(req);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002162 rb->reqs[rb->to_free++] = req;
2163 if (unlikely(rb->to_free == ARRAY_SIZE(rb->reqs)))
2164 __io_req_free_batch_flush(req->ctx, rb);
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002165}
2166
Jens Axboeba816ad2019-09-28 11:36:45 -06002167/*
2168 * Drop reference to request, return next in chain (if there is one) if this
2169 * was the last reference to this request.
2170 */
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002171static struct io_kiocb *io_put_req_find_next(struct io_kiocb *req)
Jens Axboee65ef562019-03-12 10:16:44 -06002172{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002173 struct io_kiocb *nxt = NULL;
2174
Jens Axboe2a44f462020-02-25 13:25:41 -07002175 if (refcount_dec_and_test(&req->refs)) {
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002176 nxt = io_req_find_next(req);
Jens Axboe4d7dd462019-11-20 13:03:52 -07002177 __io_free_req(req);
Jens Axboe2a44f462020-02-25 13:25:41 -07002178 }
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002179 return nxt;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002180}
2181
Jens Axboe2b188cc2019-01-07 10:46:33 -07002182static void io_put_req(struct io_kiocb *req)
2183{
Jens Axboedef596e2019-01-09 08:59:42 -07002184 if (refcount_dec_and_test(&req->refs))
2185 io_free_req(req);
2186}
2187
Pavel Begunkov216578e2020-10-13 09:44:00 +01002188static void io_put_req_deferred_cb(struct callback_head *cb)
2189{
2190 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
2191
2192 io_free_req(req);
2193}
2194
2195static void io_free_req_deferred(struct io_kiocb *req)
2196{
2197 int ret;
2198
2199 init_task_work(&req->task_work, io_put_req_deferred_cb);
Jens Axboe355fb9e2020-10-22 20:19:35 -06002200 ret = io_req_task_work_add(req);
Pavel Begunkov216578e2020-10-13 09:44:00 +01002201 if (unlikely(ret)) {
2202 struct task_struct *tsk;
2203
2204 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06002205 task_work_add(tsk, &req->task_work, TWA_NONE);
Pavel Begunkov216578e2020-10-13 09:44:00 +01002206 wake_up_process(tsk);
2207 }
2208}
2209
2210static inline void io_put_req_deferred(struct io_kiocb *req, int refs)
2211{
2212 if (refcount_sub_and_test(refs, &req->refs))
2213 io_free_req_deferred(req);
2214}
2215
Pavel Begunkovf4db7182020-06-25 18:20:54 +03002216static struct io_wq_work *io_steal_work(struct io_kiocb *req)
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002217{
Pavel Begunkov6df1db62020-07-03 22:15:06 +03002218 struct io_kiocb *nxt;
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002219
Pavel Begunkovf4db7182020-06-25 18:20:54 +03002220 /*
2221 * A ref is owned by io-wq in which context we're. So, if that's the
2222 * last one, it's safe to steal next work. False negatives are Ok,
2223 * it just will be re-punted async in io_put_work()
2224 */
2225 if (refcount_read(&req->refs) != 1)
2226 return NULL;
2227
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002228 nxt = io_req_find_next(req);
Pavel Begunkov6df1db62020-07-03 22:15:06 +03002229 return nxt ? &nxt->work : NULL;
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002230}
2231
Jens Axboe978db572019-11-14 22:39:04 -07002232static void io_double_put_req(struct io_kiocb *req)
2233{
2234 /* drop both submit and complete references */
2235 if (refcount_sub_and_test(2, &req->refs))
2236 io_free_req(req);
2237}
2238
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002239static unsigned io_cqring_events(struct io_ring_ctx *ctx, bool noflush)
Jens Axboea3a0e432019-08-20 11:03:11 -06002240{
Jens Axboe84f97dc2019-11-06 11:27:53 -07002241 struct io_rings *rings = ctx->rings;
2242
Jens Axboead3eb2c2019-12-18 17:12:20 -07002243 if (test_bit(0, &ctx->cq_check_overflow)) {
2244 /*
2245 * noflush == true is from the waitqueue handler, just ensure
2246 * we wake up the task, and the next invocation will flush the
2247 * entries. We cannot safely to it from here.
2248 */
2249 if (noflush && !list_empty(&ctx->cq_overflow_list))
2250 return -1U;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002251
Jens Axboee6c8aa92020-09-28 13:10:13 -06002252 io_cqring_overflow_flush(ctx, false, NULL, NULL);
Jens Axboead3eb2c2019-12-18 17:12:20 -07002253 }
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002254
Jens Axboea3a0e432019-08-20 11:03:11 -06002255 /* See comment at the top of this file */
2256 smp_rmb();
Jens Axboead3eb2c2019-12-18 17:12:20 -07002257 return ctx->cached_cq_tail - READ_ONCE(rings->cq.head);
Jens Axboea3a0e432019-08-20 11:03:11 -06002258}
2259
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03002260static inline unsigned int io_sqring_entries(struct io_ring_ctx *ctx)
2261{
2262 struct io_rings *rings = ctx->rings;
2263
2264 /* make sure SQ entry isn't read before tail */
2265 return smp_load_acquire(&rings->sq.tail) - ctx->cached_sq_head;
2266}
2267
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002268static unsigned int io_put_kbuf(struct io_kiocb *req, struct io_buffer *kbuf)
Jens Axboee94f1412019-12-19 12:06:02 -07002269{
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002270 unsigned int cflags;
Jens Axboee94f1412019-12-19 12:06:02 -07002271
Jens Axboebcda7ba2020-02-23 16:42:51 -07002272 cflags = kbuf->bid << IORING_CQE_BUFFER_SHIFT;
2273 cflags |= IORING_CQE_F_BUFFER;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03002274 req->flags &= ~REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07002275 kfree(kbuf);
2276 return cflags;
2277}
2278
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002279static inline unsigned int io_put_rw_kbuf(struct io_kiocb *req)
2280{
2281 struct io_buffer *kbuf;
2282
2283 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
2284 return io_put_kbuf(req, kbuf);
2285}
2286
Jens Axboe4c6e2772020-07-01 11:29:10 -06002287static inline bool io_run_task_work(void)
2288{
Jens Axboe6200b0a2020-09-13 14:38:30 -06002289 /*
2290 * Not safe to run on exiting task, and the task_work handling will
2291 * not add work to such a task.
2292 */
2293 if (unlikely(current->flags & PF_EXITING))
2294 return false;
Jens Axboe4c6e2772020-07-01 11:29:10 -06002295 if (current->task_works) {
2296 __set_current_state(TASK_RUNNING);
2297 task_work_run();
2298 return true;
2299 }
2300
2301 return false;
2302}
2303
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002304static void io_iopoll_queue(struct list_head *again)
2305{
2306 struct io_kiocb *req;
2307
2308 do {
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002309 req = list_first_entry(again, struct io_kiocb, inflight_entry);
2310 list_del(&req->inflight_entry);
Pavel Begunkov81b68a52020-07-30 18:43:46 +03002311 __io_complete_rw(req, -EAGAIN, 0, NULL);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002312 } while (!list_empty(again));
2313}
2314
Jens Axboedef596e2019-01-09 08:59:42 -07002315/*
2316 * Find and free completed poll iocbs
2317 */
2318static void io_iopoll_complete(struct io_ring_ctx *ctx, unsigned int *nr_events,
2319 struct list_head *done)
2320{
Jens Axboe8237e042019-12-28 10:48:22 -07002321 struct req_batch rb;
Jens Axboedef596e2019-01-09 08:59:42 -07002322 struct io_kiocb *req;
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002323 LIST_HEAD(again);
2324
2325 /* order with ->result store in io_complete_rw_iopoll() */
2326 smp_rmb();
Jens Axboedef596e2019-01-09 08:59:42 -07002327
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002328 io_init_req_batch(&rb);
Jens Axboedef596e2019-01-09 08:59:42 -07002329 while (!list_empty(done)) {
Jens Axboebcda7ba2020-02-23 16:42:51 -07002330 int cflags = 0;
2331
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002332 req = list_first_entry(done, struct io_kiocb, inflight_entry);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002333 if (READ_ONCE(req->result) == -EAGAIN) {
Jens Axboe56450c22020-08-26 18:58:26 -06002334 req->result = 0;
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002335 req->iopoll_completed = 0;
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002336 list_move_tail(&req->inflight_entry, &again);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002337 continue;
2338 }
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002339 list_del(&req->inflight_entry);
Jens Axboedef596e2019-01-09 08:59:42 -07002340
Jens Axboebcda7ba2020-02-23 16:42:51 -07002341 if (req->flags & REQ_F_BUFFER_SELECTED)
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002342 cflags = io_put_rw_kbuf(req);
Jens Axboebcda7ba2020-02-23 16:42:51 -07002343
2344 __io_cqring_fill_event(req, req->result, cflags);
Jens Axboedef596e2019-01-09 08:59:42 -07002345 (*nr_events)++;
2346
Pavel Begunkovc3524382020-06-28 12:52:32 +03002347 if (refcount_dec_and_test(&req->refs))
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002348 io_req_free_batch(&rb, req);
Jens Axboedef596e2019-01-09 08:59:42 -07002349 }
Jens Axboedef596e2019-01-09 08:59:42 -07002350
Jens Axboe09bb8392019-03-13 12:39:28 -06002351 io_commit_cqring(ctx);
Xiaoguang Wang32b22442020-03-11 09:26:09 +08002352 if (ctx->flags & IORING_SETUP_SQPOLL)
2353 io_cqring_ev_posted(ctx);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002354 io_req_free_batch_finish(ctx, &rb);
Jens Axboedef596e2019-01-09 08:59:42 -07002355
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002356 if (!list_empty(&again))
2357 io_iopoll_queue(&again);
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002358}
2359
Jens Axboedef596e2019-01-09 08:59:42 -07002360static int io_do_iopoll(struct io_ring_ctx *ctx, unsigned int *nr_events,
2361 long min)
2362{
2363 struct io_kiocb *req, *tmp;
2364 LIST_HEAD(done);
2365 bool spin;
2366 int ret;
2367
2368 /*
2369 * Only spin for completions if we don't have multiple devices hanging
2370 * off our complete list, and we're under the requested amount.
2371 */
2372 spin = !ctx->poll_multi_file && *nr_events < min;
2373
2374 ret = 0;
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002375 list_for_each_entry_safe(req, tmp, &ctx->iopoll_list, inflight_entry) {
Jens Axboe9adbd452019-12-20 08:45:55 -07002376 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboedef596e2019-01-09 08:59:42 -07002377
2378 /*
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002379 * Move completed and retryable entries to our local lists.
2380 * If we find a request that requires polling, break out
2381 * and complete those lists first, if we have entries there.
Jens Axboedef596e2019-01-09 08:59:42 -07002382 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002383 if (READ_ONCE(req->iopoll_completed)) {
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002384 list_move_tail(&req->inflight_entry, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002385 continue;
2386 }
2387 if (!list_empty(&done))
2388 break;
2389
2390 ret = kiocb->ki_filp->f_op->iopoll(kiocb, spin);
2391 if (ret < 0)
2392 break;
2393
Pavel Begunkov3aadc232020-07-06 17:59:29 +03002394 /* iopoll may have completed current req */
2395 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002396 list_move_tail(&req->inflight_entry, &done);
Pavel Begunkov3aadc232020-07-06 17:59:29 +03002397
Jens Axboedef596e2019-01-09 08:59:42 -07002398 if (ret && spin)
2399 spin = false;
2400 ret = 0;
2401 }
2402
2403 if (!list_empty(&done))
2404 io_iopoll_complete(ctx, nr_events, &done);
2405
2406 return ret;
2407}
2408
2409/*
Brian Gianforcarod195a662019-12-13 03:09:50 -08002410 * Poll for a minimum of 'min' events. Note that if min == 0 we consider that a
Jens Axboedef596e2019-01-09 08:59:42 -07002411 * non-spinning poll check - we'll still enter the driver poll loop, but only
2412 * as a non-spinning completion check.
2413 */
2414static int io_iopoll_getevents(struct io_ring_ctx *ctx, unsigned int *nr_events,
2415 long min)
2416{
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002417 while (!list_empty(&ctx->iopoll_list) && !need_resched()) {
Jens Axboedef596e2019-01-09 08:59:42 -07002418 int ret;
2419
2420 ret = io_do_iopoll(ctx, nr_events, min);
2421 if (ret < 0)
2422 return ret;
Pavel Begunkoveba0a4d2020-07-06 17:59:30 +03002423 if (*nr_events >= min)
Jens Axboedef596e2019-01-09 08:59:42 -07002424 return 0;
2425 }
2426
2427 return 1;
2428}
2429
2430/*
2431 * We can't just wait for polled events to come to us, we have to actively
2432 * find and complete them.
2433 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002434static void io_iopoll_try_reap_events(struct io_ring_ctx *ctx)
Jens Axboedef596e2019-01-09 08:59:42 -07002435{
2436 if (!(ctx->flags & IORING_SETUP_IOPOLL))
2437 return;
2438
2439 mutex_lock(&ctx->uring_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002440 while (!list_empty(&ctx->iopoll_list)) {
Jens Axboedef596e2019-01-09 08:59:42 -07002441 unsigned int nr_events = 0;
2442
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002443 io_do_iopoll(ctx, &nr_events, 0);
Jens Axboe08f54392019-08-21 22:19:11 -06002444
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002445 /* let it sleep and repeat later if can't complete a request */
2446 if (nr_events == 0)
2447 break;
Jens Axboe08f54392019-08-21 22:19:11 -06002448 /*
2449 * Ensure we allow local-to-the-cpu processing to take place,
2450 * in this case we need to ensure that we reap all events.
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002451 * Also let task_work, etc. to progress by releasing the mutex
Jens Axboe08f54392019-08-21 22:19:11 -06002452 */
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002453 if (need_resched()) {
2454 mutex_unlock(&ctx->uring_lock);
2455 cond_resched();
2456 mutex_lock(&ctx->uring_lock);
2457 }
Jens Axboedef596e2019-01-09 08:59:42 -07002458 }
2459 mutex_unlock(&ctx->uring_lock);
2460}
2461
Pavel Begunkov7668b922020-07-07 16:36:21 +03002462static int io_iopoll_check(struct io_ring_ctx *ctx, long min)
Jens Axboedef596e2019-01-09 08:59:42 -07002463{
Pavel Begunkov7668b922020-07-07 16:36:21 +03002464 unsigned int nr_events = 0;
Jens Axboe2b2ed972019-10-25 10:06:15 -06002465 int iters = 0, ret = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002466
Xiaoguang Wangc7849be2020-02-22 14:46:05 +08002467 /*
2468 * We disallow the app entering submit/complete with polling, but we
2469 * still need to lock the ring to prevent racing with polled issue
2470 * that got punted to a workqueue.
2471 */
2472 mutex_lock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002473 do {
Jens Axboe500f9fb2019-08-19 12:15:59 -06002474 /*
Jens Axboea3a0e432019-08-20 11:03:11 -06002475 * Don't enter poll loop if we already have events pending.
2476 * If we do, we can potentially be spinning for commands that
2477 * already triggered a CQE (eg in error).
2478 */
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002479 if (io_cqring_events(ctx, false))
Jens Axboea3a0e432019-08-20 11:03:11 -06002480 break;
2481
2482 /*
Jens Axboe500f9fb2019-08-19 12:15:59 -06002483 * If a submit got punted to a workqueue, we can have the
2484 * application entering polling for a command before it gets
2485 * issued. That app will hold the uring_lock for the duration
2486 * of the poll right here, so we need to take a breather every
2487 * now and then to ensure that the issue has a chance to add
2488 * the poll to the issued list. Otherwise we can spin here
2489 * forever, while the workqueue is stuck trying to acquire the
2490 * very same mutex.
2491 */
2492 if (!(++iters & 7)) {
2493 mutex_unlock(&ctx->uring_lock);
Jens Axboe4c6e2772020-07-01 11:29:10 -06002494 io_run_task_work();
Jens Axboe500f9fb2019-08-19 12:15:59 -06002495 mutex_lock(&ctx->uring_lock);
2496 }
2497
Pavel Begunkov7668b922020-07-07 16:36:21 +03002498 ret = io_iopoll_getevents(ctx, &nr_events, min);
Jens Axboedef596e2019-01-09 08:59:42 -07002499 if (ret <= 0)
2500 break;
2501 ret = 0;
Pavel Begunkov7668b922020-07-07 16:36:21 +03002502 } while (min && !nr_events && !need_resched());
Jens Axboedef596e2019-01-09 08:59:42 -07002503
Jens Axboe500f9fb2019-08-19 12:15:59 -06002504 mutex_unlock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002505 return ret;
2506}
2507
Jens Axboe491381ce2019-10-17 09:20:46 -06002508static void kiocb_end_write(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002509{
Jens Axboe491381ce2019-10-17 09:20:46 -06002510 /*
2511 * Tell lockdep we inherited freeze protection from submission
2512 * thread.
2513 */
2514 if (req->flags & REQ_F_ISREG) {
2515 struct inode *inode = file_inode(req->file);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002516
Jens Axboe491381ce2019-10-17 09:20:46 -06002517 __sb_writers_acquired(inode->i_sb, SB_FREEZE_WRITE);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002518 }
Jens Axboe491381ce2019-10-17 09:20:46 -06002519 file_end_write(req->file);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002520}
2521
Jens Axboea1d7c392020-06-22 11:09:46 -06002522static void io_complete_rw_common(struct kiocb *kiocb, long res,
2523 struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002524{
Jens Axboe9adbd452019-12-20 08:45:55 -07002525 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboebcda7ba2020-02-23 16:42:51 -07002526 int cflags = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002527
Jens Axboe491381ce2019-10-17 09:20:46 -06002528 if (kiocb->ki_flags & IOCB_WRITE)
2529 kiocb_end_write(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002530
Jens Axboe4e88d6e2019-12-07 20:59:47 -07002531 if (res != req->result)
2532 req_set_fail_links(req);
Jens Axboebcda7ba2020-02-23 16:42:51 -07002533 if (req->flags & REQ_F_BUFFER_SELECTED)
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002534 cflags = io_put_rw_kbuf(req);
Jens Axboea1d7c392020-06-22 11:09:46 -06002535 __io_req_complete(req, res, cflags, cs);
Jens Axboeba816ad2019-09-28 11:36:45 -06002536}
2537
Jens Axboeb63534c2020-06-04 11:28:00 -06002538#ifdef CONFIG_BLOCK
2539static bool io_resubmit_prep(struct io_kiocb *req, int error)
2540{
2541 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
2542 ssize_t ret = -ECANCELED;
2543 struct iov_iter iter;
2544 int rw;
2545
2546 if (error) {
2547 ret = error;
2548 goto end_req;
2549 }
2550
2551 switch (req->opcode) {
2552 case IORING_OP_READV:
2553 case IORING_OP_READ_FIXED:
2554 case IORING_OP_READ:
2555 rw = READ;
2556 break;
2557 case IORING_OP_WRITEV:
2558 case IORING_OP_WRITE_FIXED:
2559 case IORING_OP_WRITE:
2560 rw = WRITE;
2561 break;
2562 default:
2563 printk_once(KERN_WARNING "io_uring: bad opcode in resubmit %d\n",
2564 req->opcode);
2565 goto end_req;
2566 }
2567
Jens Axboee8c2bc12020-08-15 18:44:09 -07002568 if (!req->async_data) {
Jens Axboe8f3d7492020-09-14 09:28:14 -06002569 ret = io_import_iovec(rw, req, &iovec, &iter, false);
2570 if (ret < 0)
2571 goto end_req;
2572 ret = io_setup_async_rw(req, iovec, inline_vecs, &iter, false);
2573 if (!ret)
2574 return true;
2575 kfree(iovec);
2576 } else {
Jens Axboeb63534c2020-06-04 11:28:00 -06002577 return true;
Jens Axboe8f3d7492020-09-14 09:28:14 -06002578 }
Jens Axboeb63534c2020-06-04 11:28:00 -06002579end_req:
Jens Axboeb63534c2020-06-04 11:28:00 -06002580 req_set_fail_links(req);
Jens Axboeb63534c2020-06-04 11:28:00 -06002581 return false;
2582}
Jens Axboeb63534c2020-06-04 11:28:00 -06002583#endif
2584
2585static bool io_rw_reissue(struct io_kiocb *req, long res)
2586{
2587#ifdef CONFIG_BLOCK
Jens Axboe355afae2020-09-02 09:30:31 -06002588 umode_t mode = file_inode(req->file)->i_mode;
Jens Axboeb63534c2020-06-04 11:28:00 -06002589 int ret;
2590
Jens Axboe355afae2020-09-02 09:30:31 -06002591 if (!S_ISBLK(mode) && !S_ISREG(mode))
2592 return false;
Jens Axboeb63534c2020-06-04 11:28:00 -06002593 if ((res != -EAGAIN && res != -EOPNOTSUPP) || io_wq_current_is_worker())
2594 return false;
2595
Jens Axboefdee9462020-08-27 16:46:24 -06002596 ret = io_sq_thread_acquire_mm(req->ctx, req);
Jens Axboe6d816e02020-08-11 08:04:14 -06002597
Jens Axboefdee9462020-08-27 16:46:24 -06002598 if (io_resubmit_prep(req, ret)) {
2599 refcount_inc(&req->refs);
2600 io_queue_async_work(req);
Jens Axboeb63534c2020-06-04 11:28:00 -06002601 return true;
Jens Axboefdee9462020-08-27 16:46:24 -06002602 }
2603
Jens Axboeb63534c2020-06-04 11:28:00 -06002604#endif
2605 return false;
2606}
2607
Jens Axboea1d7c392020-06-22 11:09:46 -06002608static void __io_complete_rw(struct io_kiocb *req, long res, long res2,
2609 struct io_comp_state *cs)
2610{
2611 if (!io_rw_reissue(req, res))
2612 io_complete_rw_common(&req->rw.kiocb, res, cs);
Jens Axboeba816ad2019-09-28 11:36:45 -06002613}
2614
2615static void io_complete_rw(struct kiocb *kiocb, long res, long res2)
2616{
Jens Axboe9adbd452019-12-20 08:45:55 -07002617 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboeba816ad2019-09-28 11:36:45 -06002618
Jens Axboea1d7c392020-06-22 11:09:46 -06002619 __io_complete_rw(req, res, res2, NULL);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002620}
2621
Jens Axboedef596e2019-01-09 08:59:42 -07002622static void io_complete_rw_iopoll(struct kiocb *kiocb, long res, long res2)
2623{
Jens Axboe9adbd452019-12-20 08:45:55 -07002624 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboedef596e2019-01-09 08:59:42 -07002625
Jens Axboe491381ce2019-10-17 09:20:46 -06002626 if (kiocb->ki_flags & IOCB_WRITE)
2627 kiocb_end_write(req);
Jens Axboedef596e2019-01-09 08:59:42 -07002628
Xiaoguang Wang2d7d6792020-06-16 02:06:37 +08002629 if (res != -EAGAIN && res != req->result)
Jens Axboe4e88d6e2019-12-07 20:59:47 -07002630 req_set_fail_links(req);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002631
2632 WRITE_ONCE(req->result, res);
2633 /* order with io_poll_complete() checking ->result */
Pavel Begunkovcd664b02020-06-25 12:37:10 +03002634 smp_wmb();
2635 WRITE_ONCE(req->iopoll_completed, 1);
Jens Axboedef596e2019-01-09 08:59:42 -07002636}
2637
2638/*
2639 * After the iocb has been issued, it's safe to be found on the poll list.
2640 * Adding the kiocb to the list AFTER submission ensures that we don't
2641 * find it from a io_iopoll_getevents() thread before the issuer is done
2642 * accessing the kiocb cookie.
2643 */
2644static void io_iopoll_req_issued(struct io_kiocb *req)
2645{
2646 struct io_ring_ctx *ctx = req->ctx;
2647
2648 /*
2649 * Track whether we have multiple files in our lists. This will impact
2650 * how we do polling eventually, not spinning if we're on potentially
2651 * different devices.
2652 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002653 if (list_empty(&ctx->iopoll_list)) {
Jens Axboedef596e2019-01-09 08:59:42 -07002654 ctx->poll_multi_file = false;
2655 } else if (!ctx->poll_multi_file) {
2656 struct io_kiocb *list_req;
2657
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002658 list_req = list_first_entry(&ctx->iopoll_list, struct io_kiocb,
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002659 inflight_entry);
Jens Axboe9adbd452019-12-20 08:45:55 -07002660 if (list_req->file != req->file)
Jens Axboedef596e2019-01-09 08:59:42 -07002661 ctx->poll_multi_file = true;
2662 }
2663
2664 /*
2665 * For fast devices, IO may have already completed. If it has, add
2666 * it to the front so we find it first.
2667 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002668 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002669 list_add(&req->inflight_entry, &ctx->iopoll_list);
Jens Axboedef596e2019-01-09 08:59:42 -07002670 else
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002671 list_add_tail(&req->inflight_entry, &ctx->iopoll_list);
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08002672
2673 if ((ctx->flags & IORING_SETUP_SQPOLL) &&
Jens Axboe534ca6d2020-09-02 13:52:19 -06002674 wq_has_sleeper(&ctx->sq_data->wait))
2675 wake_up(&ctx->sq_data->wait);
Jens Axboedef596e2019-01-09 08:59:42 -07002676}
2677
Pavel Begunkov9f13c352020-05-17 14:13:41 +03002678static void __io_state_file_put(struct io_submit_state *state)
Jens Axboe9a56a232019-01-09 09:06:50 -07002679{
Pavel Begunkov06ef3602020-07-16 23:28:33 +03002680 if (state->has_refs)
2681 fput_many(state->file, state->has_refs);
Pavel Begunkov9f13c352020-05-17 14:13:41 +03002682 state->file = NULL;
2683}
2684
2685static inline void io_state_file_put(struct io_submit_state *state)
2686{
2687 if (state->file)
2688 __io_state_file_put(state);
Jens Axboe9a56a232019-01-09 09:06:50 -07002689}
2690
2691/*
2692 * Get as many references to a file as we have IOs left in this submission,
2693 * assuming most submissions are for one file, or at least that each file
2694 * has more than one submission.
2695 */
Pavel Begunkov8da11c12020-02-24 11:32:44 +03002696static struct file *__io_file_get(struct io_submit_state *state, int fd)
Jens Axboe9a56a232019-01-09 09:06:50 -07002697{
2698 if (!state)
2699 return fget(fd);
2700
2701 if (state->file) {
2702 if (state->fd == fd) {
Pavel Begunkov06ef3602020-07-16 23:28:33 +03002703 state->has_refs--;
Jens Axboe9a56a232019-01-09 09:06:50 -07002704 return state->file;
2705 }
Pavel Begunkov9f13c352020-05-17 14:13:41 +03002706 __io_state_file_put(state);
Jens Axboe9a56a232019-01-09 09:06:50 -07002707 }
2708 state->file = fget_many(fd, state->ios_left);
2709 if (!state->file)
2710 return NULL;
2711
2712 state->fd = fd;
Pavel Begunkov71b547c2020-10-10 18:34:09 +01002713 state->has_refs = state->ios_left - 1;
Jens Axboe9a56a232019-01-09 09:06:50 -07002714 return state->file;
2715}
2716
Jens Axboe4503b762020-06-01 10:00:27 -06002717static bool io_bdev_nowait(struct block_device *bdev)
2718{
2719#ifdef CONFIG_BLOCK
Jeffle Xu9ba0d0c2020-10-19 16:59:42 +08002720 return !bdev || blk_queue_nowait(bdev_get_queue(bdev));
Jens Axboe4503b762020-06-01 10:00:27 -06002721#else
2722 return true;
2723#endif
2724}
2725
Jens Axboe2b188cc2019-01-07 10:46:33 -07002726/*
2727 * If we tracked the file through the SCM inflight mechanism, we could support
2728 * any file. For now, just ensure that anything potentially problematic is done
2729 * inline.
2730 */
Jens Axboeaf197f52020-04-28 13:15:06 -06002731static bool io_file_supports_async(struct file *file, int rw)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002732{
2733 umode_t mode = file_inode(file)->i_mode;
2734
Jens Axboe4503b762020-06-01 10:00:27 -06002735 if (S_ISBLK(mode)) {
2736 if (io_bdev_nowait(file->f_inode->i_bdev))
2737 return true;
2738 return false;
2739 }
2740 if (S_ISCHR(mode) || S_ISSOCK(mode))
Jens Axboe2b188cc2019-01-07 10:46:33 -07002741 return true;
Jens Axboe4503b762020-06-01 10:00:27 -06002742 if (S_ISREG(mode)) {
2743 if (io_bdev_nowait(file->f_inode->i_sb->s_bdev) &&
2744 file->f_op != &io_uring_fops)
2745 return true;
2746 return false;
2747 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07002748
Jens Axboec5b85622020-06-09 19:23:05 -06002749 /* any ->read/write should understand O_NONBLOCK */
2750 if (file->f_flags & O_NONBLOCK)
2751 return true;
2752
Jens Axboeaf197f52020-04-28 13:15:06 -06002753 if (!(file->f_mode & FMODE_NOWAIT))
2754 return false;
2755
2756 if (rw == READ)
2757 return file->f_op->read_iter != NULL;
2758
2759 return file->f_op->write_iter != NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002760}
2761
Pavel Begunkova88fc402020-09-30 22:57:53 +03002762static int io_prep_rw(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002763{
Jens Axboedef596e2019-01-09 08:59:42 -07002764 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe9adbd452019-12-20 08:45:55 -07002765 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboe09bb8392019-03-13 12:39:28 -06002766 unsigned ioprio;
2767 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002768
Jens Axboe491381ce2019-10-17 09:20:46 -06002769 if (S_ISREG(file_inode(req->file)->i_mode))
2770 req->flags |= REQ_F_ISREG;
2771
Jens Axboe2b188cc2019-01-07 10:46:33 -07002772 kiocb->ki_pos = READ_ONCE(sqe->off);
Jens Axboeba042912019-12-25 16:33:42 -07002773 if (kiocb->ki_pos == -1 && !(req->file->f_mode & FMODE_STREAM)) {
2774 req->flags |= REQ_F_CUR_POS;
2775 kiocb->ki_pos = req->file->f_pos;
2776 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07002777 kiocb->ki_hint = ki_hint_validate(file_write_hint(kiocb->ki_filp));
Pavel Begunkov3e577dc2020-02-01 03:58:42 +03002778 kiocb->ki_flags = iocb_flags(kiocb->ki_filp);
2779 ret = kiocb_set_rw_flags(kiocb, READ_ONCE(sqe->rw_flags));
2780 if (unlikely(ret))
2781 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002782
2783 ioprio = READ_ONCE(sqe->ioprio);
2784 if (ioprio) {
2785 ret = ioprio_check_cap(ioprio);
2786 if (ret)
Jens Axboe09bb8392019-03-13 12:39:28 -06002787 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002788
2789 kiocb->ki_ioprio = ioprio;
2790 } else
2791 kiocb->ki_ioprio = get_current_ioprio();
2792
Stefan Bühler8449eed2019-04-27 20:34:19 +02002793 /* don't allow async punt if RWF_NOWAIT was requested */
Jens Axboec5b85622020-06-09 19:23:05 -06002794 if (kiocb->ki_flags & IOCB_NOWAIT)
Stefan Bühler8449eed2019-04-27 20:34:19 +02002795 req->flags |= REQ_F_NOWAIT;
2796
Jens Axboedef596e2019-01-09 08:59:42 -07002797 if (ctx->flags & IORING_SETUP_IOPOLL) {
Jens Axboedef596e2019-01-09 08:59:42 -07002798 if (!(kiocb->ki_flags & IOCB_DIRECT) ||
2799 !kiocb->ki_filp->f_op->iopoll)
Jens Axboe09bb8392019-03-13 12:39:28 -06002800 return -EOPNOTSUPP;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002801
Jens Axboedef596e2019-01-09 08:59:42 -07002802 kiocb->ki_flags |= IOCB_HIPRI;
2803 kiocb->ki_complete = io_complete_rw_iopoll;
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002804 req->iopoll_completed = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002805 } else {
Jens Axboe09bb8392019-03-13 12:39:28 -06002806 if (kiocb->ki_flags & IOCB_HIPRI)
2807 return -EINVAL;
Jens Axboedef596e2019-01-09 08:59:42 -07002808 kiocb->ki_complete = io_complete_rw;
2809 }
Jens Axboe9adbd452019-12-20 08:45:55 -07002810
Jens Axboe3529d8c2019-12-19 18:24:38 -07002811 req->rw.addr = READ_ONCE(sqe->addr);
2812 req->rw.len = READ_ONCE(sqe->len);
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07002813 req->buf_index = READ_ONCE(sqe->buf_index);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002814 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002815}
2816
2817static inline void io_rw_done(struct kiocb *kiocb, ssize_t ret)
2818{
2819 switch (ret) {
2820 case -EIOCBQUEUED:
2821 break;
2822 case -ERESTARTSYS:
2823 case -ERESTARTNOINTR:
2824 case -ERESTARTNOHAND:
2825 case -ERESTART_RESTARTBLOCK:
2826 /*
2827 * We can't just restart the syscall, since previously
2828 * submitted sqes may already be in progress. Just fail this
2829 * IO with EINTR.
2830 */
2831 ret = -EINTR;
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -05002832 fallthrough;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002833 default:
2834 kiocb->ki_complete(kiocb, ret, 0);
2835 }
2836}
2837
Jens Axboea1d7c392020-06-22 11:09:46 -06002838static void kiocb_done(struct kiocb *kiocb, ssize_t ret,
2839 struct io_comp_state *cs)
Jens Axboeba816ad2019-09-28 11:36:45 -06002840{
Jens Axboeba042912019-12-25 16:33:42 -07002841 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboee8c2bc12020-08-15 18:44:09 -07002842 struct io_async_rw *io = req->async_data;
Jens Axboeba042912019-12-25 16:33:42 -07002843
Jens Axboe227c0c92020-08-13 11:51:40 -06002844 /* add previously done IO, if any */
Jens Axboee8c2bc12020-08-15 18:44:09 -07002845 if (io && io->bytes_done > 0) {
Jens Axboe227c0c92020-08-13 11:51:40 -06002846 if (ret < 0)
Jens Axboee8c2bc12020-08-15 18:44:09 -07002847 ret = io->bytes_done;
Jens Axboe227c0c92020-08-13 11:51:40 -06002848 else
Jens Axboee8c2bc12020-08-15 18:44:09 -07002849 ret += io->bytes_done;
Jens Axboe227c0c92020-08-13 11:51:40 -06002850 }
2851
Jens Axboeba042912019-12-25 16:33:42 -07002852 if (req->flags & REQ_F_CUR_POS)
2853 req->file->f_pos = kiocb->ki_pos;
Pavel Begunkovbcaec082020-02-24 11:30:18 +03002854 if (ret >= 0 && kiocb->ki_complete == io_complete_rw)
Jens Axboea1d7c392020-06-22 11:09:46 -06002855 __io_complete_rw(req, ret, 0, cs);
Jens Axboeba816ad2019-09-28 11:36:45 -06002856 else
2857 io_rw_done(kiocb, ret);
2858}
2859
Jens Axboe9adbd452019-12-20 08:45:55 -07002860static ssize_t io_import_fixed(struct io_kiocb *req, int rw,
Pavel Begunkov7d009162019-11-25 23:14:40 +03002861 struct iov_iter *iter)
Jens Axboeedafcce2019-01-09 09:16:05 -07002862{
Jens Axboe9adbd452019-12-20 08:45:55 -07002863 struct io_ring_ctx *ctx = req->ctx;
2864 size_t len = req->rw.len;
Jens Axboeedafcce2019-01-09 09:16:05 -07002865 struct io_mapped_ubuf *imu;
Pavel Begunkov4be1c612020-09-06 00:45:48 +03002866 u16 index, buf_index = req->buf_index;
Jens Axboeedafcce2019-01-09 09:16:05 -07002867 size_t offset;
2868 u64 buf_addr;
2869
Jens Axboeedafcce2019-01-09 09:16:05 -07002870 if (unlikely(buf_index >= ctx->nr_user_bufs))
2871 return -EFAULT;
Jens Axboeedafcce2019-01-09 09:16:05 -07002872 index = array_index_nospec(buf_index, ctx->nr_user_bufs);
2873 imu = &ctx->user_bufs[index];
Jens Axboe9adbd452019-12-20 08:45:55 -07002874 buf_addr = req->rw.addr;
Jens Axboeedafcce2019-01-09 09:16:05 -07002875
2876 /* overflow */
2877 if (buf_addr + len < buf_addr)
2878 return -EFAULT;
2879 /* not inside the mapped region */
2880 if (buf_addr < imu->ubuf || buf_addr + len > imu->ubuf + imu->len)
2881 return -EFAULT;
2882
2883 /*
2884 * May not be a start of buffer, set size appropriately
2885 * and advance us to the beginning.
2886 */
2887 offset = buf_addr - imu->ubuf;
2888 iov_iter_bvec(iter, rw, imu->bvec, imu->nr_bvecs, offset + len);
Jens Axboebd11b3a2019-07-20 08:37:31 -06002889
2890 if (offset) {
2891 /*
2892 * Don't use iov_iter_advance() here, as it's really slow for
2893 * using the latter parts of a big fixed buffer - it iterates
2894 * over each segment manually. We can cheat a bit here, because
2895 * we know that:
2896 *
2897 * 1) it's a BVEC iter, we set it up
2898 * 2) all bvecs are PAGE_SIZE in size, except potentially the
2899 * first and last bvec
2900 *
2901 * So just find our index, and adjust the iterator afterwards.
2902 * If the offset is within the first bvec (or the whole first
2903 * bvec, just use iov_iter_advance(). This makes it easier
2904 * since we can just skip the first segment, which may not
2905 * be PAGE_SIZE aligned.
2906 */
2907 const struct bio_vec *bvec = imu->bvec;
2908
2909 if (offset <= bvec->bv_len) {
2910 iov_iter_advance(iter, offset);
2911 } else {
2912 unsigned long seg_skip;
2913
2914 /* skip first vec */
2915 offset -= bvec->bv_len;
2916 seg_skip = 1 + (offset >> PAGE_SHIFT);
2917
2918 iter->bvec = bvec + seg_skip;
2919 iter->nr_segs -= seg_skip;
Aleix Roca Nonell99c79f62019-08-15 14:03:22 +02002920 iter->count -= bvec->bv_len + offset;
Jens Axboebd11b3a2019-07-20 08:37:31 -06002921 iter->iov_offset = offset & ~PAGE_MASK;
Jens Axboebd11b3a2019-07-20 08:37:31 -06002922 }
2923 }
2924
Jens Axboe5e559562019-11-13 16:12:46 -07002925 return len;
Jens Axboeedafcce2019-01-09 09:16:05 -07002926}
2927
Jens Axboebcda7ba2020-02-23 16:42:51 -07002928static void io_ring_submit_unlock(struct io_ring_ctx *ctx, bool needs_lock)
2929{
2930 if (needs_lock)
2931 mutex_unlock(&ctx->uring_lock);
2932}
2933
2934static void io_ring_submit_lock(struct io_ring_ctx *ctx, bool needs_lock)
2935{
2936 /*
2937 * "Normal" inline submissions always hold the uring_lock, since we
2938 * grab it from the system call. Same is true for the SQPOLL offload.
2939 * The only exception is when we've detached the request and issue it
2940 * from an async worker thread, grab the lock for that case.
2941 */
2942 if (needs_lock)
2943 mutex_lock(&ctx->uring_lock);
2944}
2945
2946static struct io_buffer *io_buffer_select(struct io_kiocb *req, size_t *len,
2947 int bgid, struct io_buffer *kbuf,
2948 bool needs_lock)
2949{
2950 struct io_buffer *head;
2951
2952 if (req->flags & REQ_F_BUFFER_SELECTED)
2953 return kbuf;
2954
2955 io_ring_submit_lock(req->ctx, needs_lock);
2956
2957 lockdep_assert_held(&req->ctx->uring_lock);
2958
2959 head = idr_find(&req->ctx->io_buffer_idr, bgid);
2960 if (head) {
2961 if (!list_empty(&head->list)) {
2962 kbuf = list_last_entry(&head->list, struct io_buffer,
2963 list);
2964 list_del(&kbuf->list);
2965 } else {
2966 kbuf = head;
2967 idr_remove(&req->ctx->io_buffer_idr, bgid);
2968 }
2969 if (*len > kbuf->len)
2970 *len = kbuf->len;
2971 } else {
2972 kbuf = ERR_PTR(-ENOBUFS);
2973 }
2974
2975 io_ring_submit_unlock(req->ctx, needs_lock);
2976
2977 return kbuf;
2978}
2979
Jens Axboe4d954c22020-02-27 07:31:19 -07002980static void __user *io_rw_buffer_select(struct io_kiocb *req, size_t *len,
2981 bool needs_lock)
2982{
2983 struct io_buffer *kbuf;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07002984 u16 bgid;
Jens Axboe4d954c22020-02-27 07:31:19 -07002985
2986 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07002987 bgid = req->buf_index;
Jens Axboe4d954c22020-02-27 07:31:19 -07002988 kbuf = io_buffer_select(req, len, bgid, kbuf, needs_lock);
2989 if (IS_ERR(kbuf))
2990 return kbuf;
2991 req->rw.addr = (u64) (unsigned long) kbuf;
2992 req->flags |= REQ_F_BUFFER_SELECTED;
2993 return u64_to_user_ptr(kbuf->addr);
2994}
2995
2996#ifdef CONFIG_COMPAT
2997static ssize_t io_compat_import(struct io_kiocb *req, struct iovec *iov,
2998 bool needs_lock)
2999{
3000 struct compat_iovec __user *uiov;
3001 compat_ssize_t clen;
3002 void __user *buf;
3003 ssize_t len;
3004
3005 uiov = u64_to_user_ptr(req->rw.addr);
3006 if (!access_ok(uiov, sizeof(*uiov)))
3007 return -EFAULT;
3008 if (__get_user(clen, &uiov->iov_len))
3009 return -EFAULT;
3010 if (clen < 0)
3011 return -EINVAL;
3012
3013 len = clen;
3014 buf = io_rw_buffer_select(req, &len, needs_lock);
3015 if (IS_ERR(buf))
3016 return PTR_ERR(buf);
3017 iov[0].iov_base = buf;
3018 iov[0].iov_len = (compat_size_t) len;
3019 return 0;
3020}
3021#endif
3022
3023static ssize_t __io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
3024 bool needs_lock)
3025{
3026 struct iovec __user *uiov = u64_to_user_ptr(req->rw.addr);
3027 void __user *buf;
3028 ssize_t len;
3029
3030 if (copy_from_user(iov, uiov, sizeof(*uiov)))
3031 return -EFAULT;
3032
3033 len = iov[0].iov_len;
3034 if (len < 0)
3035 return -EINVAL;
3036 buf = io_rw_buffer_select(req, &len, needs_lock);
3037 if (IS_ERR(buf))
3038 return PTR_ERR(buf);
3039 iov[0].iov_base = buf;
3040 iov[0].iov_len = len;
3041 return 0;
3042}
3043
3044static ssize_t io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
3045 bool needs_lock)
3046{
Jens Axboedddb3e22020-06-04 11:27:01 -06003047 if (req->flags & REQ_F_BUFFER_SELECTED) {
3048 struct io_buffer *kbuf;
3049
3050 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
3051 iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
3052 iov[0].iov_len = kbuf->len;
Jens Axboe4d954c22020-02-27 07:31:19 -07003053 return 0;
Jens Axboedddb3e22020-06-04 11:27:01 -06003054 }
Jens Axboe4d954c22020-02-27 07:31:19 -07003055 if (!req->rw.len)
3056 return 0;
3057 else if (req->rw.len > 1)
3058 return -EINVAL;
3059
3060#ifdef CONFIG_COMPAT
3061 if (req->ctx->compat)
3062 return io_compat_import(req, iov, needs_lock);
3063#endif
3064
3065 return __io_iov_buffer_select(req, iov, needs_lock);
3066}
3067
Jens Axboe8452fd02020-08-18 13:58:33 -07003068static ssize_t __io_import_iovec(int rw, struct io_kiocb *req,
3069 struct iovec **iovec, struct iov_iter *iter,
3070 bool needs_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003071{
Jens Axboe9adbd452019-12-20 08:45:55 -07003072 void __user *buf = u64_to_user_ptr(req->rw.addr);
3073 size_t sqe_len = req->rw.len;
Jens Axboe4d954c22020-02-27 07:31:19 -07003074 ssize_t ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07003075 u8 opcode;
3076
Jens Axboed625c6e2019-12-17 19:53:05 -07003077 opcode = req->opcode;
Pavel Begunkov7d009162019-11-25 23:14:40 +03003078 if (opcode == IORING_OP_READ_FIXED || opcode == IORING_OP_WRITE_FIXED) {
Jens Axboeedafcce2019-01-09 09:16:05 -07003079 *iovec = NULL;
Jens Axboe9adbd452019-12-20 08:45:55 -07003080 return io_import_fixed(req, rw, iter);
Jens Axboeedafcce2019-01-09 09:16:05 -07003081 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07003082
Jens Axboebcda7ba2020-02-23 16:42:51 -07003083 /* buffer index only valid with fixed read/write, or buffer select */
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003084 if (req->buf_index && !(req->flags & REQ_F_BUFFER_SELECT))
Jens Axboe9adbd452019-12-20 08:45:55 -07003085 return -EINVAL;
3086
Jens Axboe3a6820f2019-12-22 15:19:35 -07003087 if (opcode == IORING_OP_READ || opcode == IORING_OP_WRITE) {
Jens Axboebcda7ba2020-02-23 16:42:51 -07003088 if (req->flags & REQ_F_BUFFER_SELECT) {
Jens Axboe4d954c22020-02-27 07:31:19 -07003089 buf = io_rw_buffer_select(req, &sqe_len, needs_lock);
Pavel Begunkov867a23e2020-08-20 11:34:39 +03003090 if (IS_ERR(buf))
Jens Axboe4d954c22020-02-27 07:31:19 -07003091 return PTR_ERR(buf);
Jens Axboe3f9d6442020-03-11 12:27:04 -06003092 req->rw.len = sqe_len;
Jens Axboebcda7ba2020-02-23 16:42:51 -07003093 }
3094
Jens Axboe3a6820f2019-12-22 15:19:35 -07003095 ret = import_single_range(rw, buf, sqe_len, *iovec, iter);
3096 *iovec = NULL;
Jens Axboe3a901592020-02-25 17:48:55 -07003097 return ret < 0 ? ret : sqe_len;
Jens Axboe3a6820f2019-12-22 15:19:35 -07003098 }
3099
Jens Axboe4d954c22020-02-27 07:31:19 -07003100 if (req->flags & REQ_F_BUFFER_SELECT) {
3101 ret = io_iov_buffer_select(req, *iovec, needs_lock);
Jens Axboe3f9d6442020-03-11 12:27:04 -06003102 if (!ret) {
3103 ret = (*iovec)->iov_len;
3104 iov_iter_init(iter, rw, *iovec, 1, ret);
3105 }
Jens Axboe4d954c22020-02-27 07:31:19 -07003106 *iovec = NULL;
3107 return ret;
3108 }
3109
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02003110 return __import_iovec(rw, buf, sqe_len, UIO_FASTIOV, iovec, iter,
3111 req->ctx->compat);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003112}
3113
Jens Axboe8452fd02020-08-18 13:58:33 -07003114static ssize_t io_import_iovec(int rw, struct io_kiocb *req,
3115 struct iovec **iovec, struct iov_iter *iter,
3116 bool needs_lock)
3117{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003118 struct io_async_rw *iorw = req->async_data;
3119
3120 if (!iorw)
Jens Axboe8452fd02020-08-18 13:58:33 -07003121 return __io_import_iovec(rw, req, iovec, iter, needs_lock);
3122 *iovec = NULL;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003123 return iov_iter_count(&iorw->iter);
Jens Axboe8452fd02020-08-18 13:58:33 -07003124}
3125
Jens Axboe0fef9482020-08-26 10:36:20 -06003126static inline loff_t *io_kiocb_ppos(struct kiocb *kiocb)
3127{
Pavel Begunkov5b09e372020-09-30 22:57:15 +03003128 return (kiocb->ki_filp->f_mode & FMODE_STREAM) ? NULL : &kiocb->ki_pos;
Jens Axboe0fef9482020-08-26 10:36:20 -06003129}
3130
Jens Axboe32960612019-09-23 11:05:34 -06003131/*
3132 * For files that don't have ->read_iter() and ->write_iter(), handle them
3133 * by looping over ->read() or ->write() manually.
3134 */
Jens Axboe4017eb92020-10-22 14:14:12 -06003135static ssize_t loop_rw_iter(int rw, struct io_kiocb *req, struct iov_iter *iter)
Jens Axboe32960612019-09-23 11:05:34 -06003136{
Jens Axboe4017eb92020-10-22 14:14:12 -06003137 struct kiocb *kiocb = &req->rw.kiocb;
3138 struct file *file = req->file;
Jens Axboe32960612019-09-23 11:05:34 -06003139 ssize_t ret = 0;
3140
3141 /*
3142 * Don't support polled IO through this interface, and we can't
3143 * support non-blocking either. For the latter, this just causes
3144 * the kiocb to be handled from an async context.
3145 */
3146 if (kiocb->ki_flags & IOCB_HIPRI)
3147 return -EOPNOTSUPP;
3148 if (kiocb->ki_flags & IOCB_NOWAIT)
3149 return -EAGAIN;
3150
3151 while (iov_iter_count(iter)) {
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003152 struct iovec iovec;
Jens Axboe32960612019-09-23 11:05:34 -06003153 ssize_t nr;
3154
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003155 if (!iov_iter_is_bvec(iter)) {
3156 iovec = iov_iter_iovec(iter);
3157 } else {
Jens Axboe4017eb92020-10-22 14:14:12 -06003158 iovec.iov_base = u64_to_user_ptr(req->rw.addr);
3159 iovec.iov_len = req->rw.len;
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003160 }
3161
Jens Axboe32960612019-09-23 11:05:34 -06003162 if (rw == READ) {
3163 nr = file->f_op->read(file, iovec.iov_base,
Jens Axboe0fef9482020-08-26 10:36:20 -06003164 iovec.iov_len, io_kiocb_ppos(kiocb));
Jens Axboe32960612019-09-23 11:05:34 -06003165 } else {
3166 nr = file->f_op->write(file, iovec.iov_base,
Jens Axboe0fef9482020-08-26 10:36:20 -06003167 iovec.iov_len, io_kiocb_ppos(kiocb));
Jens Axboe32960612019-09-23 11:05:34 -06003168 }
3169
3170 if (nr < 0) {
3171 if (!ret)
3172 ret = nr;
3173 break;
3174 }
3175 ret += nr;
3176 if (nr != iovec.iov_len)
3177 break;
Jens Axboe4017eb92020-10-22 14:14:12 -06003178 req->rw.len -= nr;
3179 req->rw.addr += nr;
Jens Axboe32960612019-09-23 11:05:34 -06003180 iov_iter_advance(iter, nr);
3181 }
3182
3183 return ret;
3184}
3185
Jens Axboeff6165b2020-08-13 09:47:43 -06003186static void io_req_map_rw(struct io_kiocb *req, const struct iovec *iovec,
3187 const struct iovec *fast_iov, struct iov_iter *iter)
Jens Axboef67676d2019-12-02 11:03:47 -07003188{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003189 struct io_async_rw *rw = req->async_data;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003190
Jens Axboeff6165b2020-08-13 09:47:43 -06003191 memcpy(&rw->iter, iter, sizeof(*iter));
Pavel Begunkovafb87652020-09-06 00:45:46 +03003192 rw->free_iovec = iovec;
Jens Axboe227c0c92020-08-13 11:51:40 -06003193 rw->bytes_done = 0;
Jens Axboeff6165b2020-08-13 09:47:43 -06003194 /* can only be fixed buffers, no need to do anything */
Pavel Begunkov9c3a2052020-11-23 23:20:27 +00003195 if (iov_iter_is_bvec(iter))
Jens Axboeff6165b2020-08-13 09:47:43 -06003196 return;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003197 if (!iovec) {
Jens Axboeff6165b2020-08-13 09:47:43 -06003198 unsigned iov_off = 0;
3199
3200 rw->iter.iov = rw->fast_iov;
3201 if (iter->iov != fast_iov) {
3202 iov_off = iter->iov - fast_iov;
3203 rw->iter.iov += iov_off;
3204 }
3205 if (rw->fast_iov != fast_iov)
3206 memcpy(rw->fast_iov + iov_off, fast_iov + iov_off,
Xiaoguang Wang45097da2020-04-08 22:29:58 +08003207 sizeof(struct iovec) * iter->nr_segs);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03003208 } else {
3209 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboef67676d2019-12-02 11:03:47 -07003210 }
3211}
3212
Jens Axboee8c2bc12020-08-15 18:44:09 -07003213static inline int __io_alloc_async_data(struct io_kiocb *req)
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003214{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003215 WARN_ON_ONCE(!io_op_defs[req->opcode].async_size);
3216 req->async_data = kmalloc(io_op_defs[req->opcode].async_size, GFP_KERNEL);
3217 return req->async_data == NULL;
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003218}
3219
Jens Axboee8c2bc12020-08-15 18:44:09 -07003220static int io_alloc_async_data(struct io_kiocb *req)
Jens Axboef67676d2019-12-02 11:03:47 -07003221{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003222 if (!io_op_defs[req->opcode].needs_async_data)
Jens Axboed3656342019-12-18 09:50:26 -07003223 return 0;
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003224
Jens Axboee8c2bc12020-08-15 18:44:09 -07003225 return __io_alloc_async_data(req);
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003226}
3227
Jens Axboeff6165b2020-08-13 09:47:43 -06003228static int io_setup_async_rw(struct io_kiocb *req, const struct iovec *iovec,
3229 const struct iovec *fast_iov,
Jens Axboe227c0c92020-08-13 11:51:40 -06003230 struct iov_iter *iter, bool force)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003231{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003232 if (!force && !io_op_defs[req->opcode].needs_async_data)
Jens Axboe74566df2020-01-13 19:23:24 -07003233 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003234 if (!req->async_data) {
3235 if (__io_alloc_async_data(req))
Jens Axboe5d204bc2020-01-31 12:06:52 -07003236 return -ENOMEM;
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003237
Jens Axboeff6165b2020-08-13 09:47:43 -06003238 io_req_map_rw(req, iovec, fast_iov, iter);
Jens Axboe5d204bc2020-01-31 12:06:52 -07003239 }
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003240 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07003241}
3242
Pavel Begunkov73debe62020-09-30 22:57:54 +03003243static inline int io_rw_prep_async(struct io_kiocb *req, int rw)
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003244{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003245 struct io_async_rw *iorw = req->async_data;
Pavel Begunkovf4bff102020-09-06 00:45:45 +03003246 struct iovec *iov = iorw->fast_iov;
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003247 ssize_t ret;
3248
Pavel Begunkov73debe62020-09-30 22:57:54 +03003249 ret = __io_import_iovec(rw, req, &iov, &iorw->iter, false);
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003250 if (unlikely(ret < 0))
3251 return ret;
3252
Pavel Begunkovab0b1962020-09-06 00:45:47 +03003253 iorw->bytes_done = 0;
3254 iorw->free_iovec = iov;
3255 if (iov)
3256 req->flags |= REQ_F_NEED_CLEANUP;
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003257 return 0;
3258}
3259
Pavel Begunkov73debe62020-09-30 22:57:54 +03003260static int io_read_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003261{
3262 ssize_t ret;
3263
Pavel Begunkova88fc402020-09-30 22:57:53 +03003264 ret = io_prep_rw(req, sqe);
Jens Axboe3529d8c2019-12-19 18:24:38 -07003265 if (ret)
3266 return ret;
Jens Axboef67676d2019-12-02 11:03:47 -07003267
Jens Axboe3529d8c2019-12-19 18:24:38 -07003268 if (unlikely(!(req->file->f_mode & FMODE_READ)))
3269 return -EBADF;
Jens Axboef67676d2019-12-02 11:03:47 -07003270
Pavel Begunkov5f798be2020-02-08 13:28:02 +03003271 /* either don't need iovec imported or already have it */
Pavel Begunkov2d199892020-09-30 22:57:35 +03003272 if (!req->async_data)
Jens Axboe3529d8c2019-12-19 18:24:38 -07003273 return 0;
Pavel Begunkov73debe62020-09-30 22:57:54 +03003274 return io_rw_prep_async(req, READ);
Jens Axboef67676d2019-12-02 11:03:47 -07003275}
3276
Jens Axboec1dd91d2020-08-03 16:43:59 -06003277/*
3278 * This is our waitqueue callback handler, registered through lock_page_async()
3279 * when we initially tried to do the IO with the iocb armed our waitqueue.
3280 * This gets called when the page is unlocked, and we generally expect that to
3281 * happen when the page IO is completed and the page is now uptodate. This will
3282 * queue a task_work based retry of the operation, attempting to copy the data
3283 * again. If the latter fails because the page was NOT uptodate, then we will
3284 * do a thread based blocking retry of the operation. That's the unexpected
3285 * slow path.
3286 */
Jens Axboebcf5a062020-05-22 09:24:42 -06003287static int io_async_buf_func(struct wait_queue_entry *wait, unsigned mode,
3288 int sync, void *arg)
3289{
3290 struct wait_page_queue *wpq;
3291 struct io_kiocb *req = wait->private;
Jens Axboebcf5a062020-05-22 09:24:42 -06003292 struct wait_page_key *key = arg;
Jens Axboebcf5a062020-05-22 09:24:42 -06003293 int ret;
3294
3295 wpq = container_of(wait, struct wait_page_queue, wait);
3296
Linus Torvaldscdc8fcb2020-08-03 13:01:22 -07003297 if (!wake_page_match(wpq, key))
3298 return 0;
3299
Hao Xuc8d317a2020-09-29 20:00:45 +08003300 req->rw.kiocb.ki_flags &= ~IOCB_WAITQ;
Jens Axboebcf5a062020-05-22 09:24:42 -06003301 list_del_init(&wait->entry);
3302
Pavel Begunkove7375122020-07-12 20:42:04 +03003303 init_task_work(&req->task_work, io_req_task_submit);
Jens Axboe6d816e02020-08-11 08:04:14 -06003304 percpu_ref_get(&req->ctx->refs);
3305
Jens Axboebcf5a062020-05-22 09:24:42 -06003306 /* submit ref gets dropped, acquire a new one */
3307 refcount_inc(&req->refs);
Jens Axboe355fb9e2020-10-22 20:19:35 -06003308 ret = io_req_task_work_add(req);
Jens Axboebcf5a062020-05-22 09:24:42 -06003309 if (unlikely(ret)) {
Jens Axboec2c4c832020-07-01 15:37:11 -06003310 struct task_struct *tsk;
3311
Jens Axboebcf5a062020-05-22 09:24:42 -06003312 /* queue just for cancelation */
Pavel Begunkove7375122020-07-12 20:42:04 +03003313 init_task_work(&req->task_work, io_req_task_cancel);
Jens Axboebcf5a062020-05-22 09:24:42 -06003314 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06003315 task_work_add(tsk, &req->task_work, TWA_NONE);
Jens Axboec2c4c832020-07-01 15:37:11 -06003316 wake_up_process(tsk);
Jens Axboebcf5a062020-05-22 09:24:42 -06003317 }
Jens Axboebcf5a062020-05-22 09:24:42 -06003318 return 1;
3319}
3320
Jens Axboec1dd91d2020-08-03 16:43:59 -06003321/*
3322 * This controls whether a given IO request should be armed for async page
3323 * based retry. If we return false here, the request is handed to the async
3324 * worker threads for retry. If we're doing buffered reads on a regular file,
3325 * we prepare a private wait_page_queue entry and retry the operation. This
3326 * will either succeed because the page is now uptodate and unlocked, or it
3327 * will register a callback when the page is unlocked at IO completion. Through
3328 * that callback, io_uring uses task_work to setup a retry of the operation.
3329 * That retry will attempt the buffered read again. The retry will generally
3330 * succeed, or in rare cases where it fails, we then fall back to using the
3331 * async worker threads for a blocking retry.
3332 */
Jens Axboe227c0c92020-08-13 11:51:40 -06003333static bool io_rw_should_retry(struct io_kiocb *req)
Jens Axboebcf5a062020-05-22 09:24:42 -06003334{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003335 struct io_async_rw *rw = req->async_data;
3336 struct wait_page_queue *wait = &rw->wpq;
Jens Axboebcf5a062020-05-22 09:24:42 -06003337 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboebcf5a062020-05-22 09:24:42 -06003338
3339 /* never retry for NOWAIT, we just complete with -EAGAIN */
3340 if (req->flags & REQ_F_NOWAIT)
3341 return false;
3342
Jens Axboe227c0c92020-08-13 11:51:40 -06003343 /* Only for buffered IO */
Jens Axboe3b2a4432020-08-16 10:58:43 -07003344 if (kiocb->ki_flags & (IOCB_DIRECT | IOCB_HIPRI))
Jens Axboebcf5a062020-05-22 09:24:42 -06003345 return false;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003346
Jens Axboebcf5a062020-05-22 09:24:42 -06003347 /*
3348 * just use poll if we can, and don't attempt if the fs doesn't
3349 * support callback based unlocks
3350 */
3351 if (file_can_poll(req->file) || !(req->file->f_mode & FMODE_BUF_RASYNC))
3352 return false;
3353
Jens Axboe3b2a4432020-08-16 10:58:43 -07003354 wait->wait.func = io_async_buf_func;
3355 wait->wait.private = req;
3356 wait->wait.flags = 0;
3357 INIT_LIST_HEAD(&wait->wait.entry);
3358 kiocb->ki_flags |= IOCB_WAITQ;
Hao Xuc8d317a2020-09-29 20:00:45 +08003359 kiocb->ki_flags &= ~IOCB_NOWAIT;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003360 kiocb->ki_waitq = wait;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003361 return true;
Jens Axboebcf5a062020-05-22 09:24:42 -06003362}
3363
3364static int io_iter_do_read(struct io_kiocb *req, struct iov_iter *iter)
3365{
3366 if (req->file->f_op->read_iter)
3367 return call_read_iter(req->file, &req->rw.kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003368 else if (req->file->f_op->read)
Jens Axboe4017eb92020-10-22 14:14:12 -06003369 return loop_rw_iter(READ, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003370 else
3371 return -EINVAL;
Jens Axboebcf5a062020-05-22 09:24:42 -06003372}
3373
Jens Axboea1d7c392020-06-22 11:09:46 -06003374static int io_read(struct io_kiocb *req, bool force_nonblock,
3375 struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003376{
3377 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003378 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003379 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003380 struct io_async_rw *rw = req->async_data;
Jens Axboe227c0c92020-08-13 11:51:40 -06003381 ssize_t io_size, ret, ret2;
Jens Axboe31b51512019-01-18 22:56:34 -07003382 size_t iov_count;
Jens Axboef5cac8b2020-09-14 09:30:38 -06003383 bool no_async;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003384
Jens Axboee8c2bc12020-08-15 18:44:09 -07003385 if (rw)
3386 iter = &rw->iter;
Jens Axboeff6165b2020-08-13 09:47:43 -06003387
3388 ret = io_import_iovec(READ, req, &iovec, iter, !force_nonblock);
Jens Axboe06b76d42019-12-19 14:44:26 -07003389 if (ret < 0)
3390 return ret;
Jens Axboeeefdf302020-08-27 16:40:19 -06003391 iov_count = iov_iter_count(iter);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003392 io_size = ret;
3393 req->result = io_size;
Jens Axboe227c0c92020-08-13 11:51:40 -06003394 ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003395
Jens Axboefd6c2e42019-12-18 12:19:41 -07003396 /* Ensure we clear previously set non-block flag */
3397 if (!force_nonblock)
Jens Axboe29de5f62020-02-20 09:56:08 -07003398 kiocb->ki_flags &= ~IOCB_NOWAIT;
Pavel Begunkova88fc402020-09-30 22:57:53 +03003399 else
3400 kiocb->ki_flags |= IOCB_NOWAIT;
3401
Jens Axboefd6c2e42019-12-18 12:19:41 -07003402
Pavel Begunkov24c74672020-06-21 13:09:51 +03003403 /* If the file doesn't support async, just async punt */
Jens Axboef5cac8b2020-09-14 09:30:38 -06003404 no_async = force_nonblock && !io_file_supports_async(req->file, READ);
3405 if (no_async)
Jens Axboef67676d2019-12-02 11:03:47 -07003406 goto copy_iov;
Jens Axboe9e645e112019-05-10 16:07:28 -06003407
Jens Axboe0fef9482020-08-26 10:36:20 -06003408 ret = rw_verify_area(READ, req->file, io_kiocb_ppos(kiocb), iov_count);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003409 if (unlikely(ret))
3410 goto out_free;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003411
Jens Axboe227c0c92020-08-13 11:51:40 -06003412 ret = io_iter_do_read(req, iter);
Jens Axboe32960612019-09-23 11:05:34 -06003413
Jens Axboe227c0c92020-08-13 11:51:40 -06003414 if (!ret) {
3415 goto done;
3416 } else if (ret == -EIOCBQUEUED) {
3417 ret = 0;
3418 goto out_free;
3419 } else if (ret == -EAGAIN) {
Jens Axboeeefdf302020-08-27 16:40:19 -06003420 /* IOPOLL retry should happen for io-wq threads */
3421 if (!force_nonblock && !(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboef91daf52020-08-15 15:58:42 -07003422 goto done;
Jens Axboe355afae2020-09-02 09:30:31 -06003423 /* no retry on NONBLOCK marked file */
3424 if (req->file->f_flags & O_NONBLOCK)
3425 goto done;
Jens Axboe84216312020-08-24 11:45:26 -06003426 /* some cases will consume bytes even on error returns */
3427 iov_iter_revert(iter, iov_count - iov_iter_count(iter));
Jens Axboef38c7e32020-09-25 15:23:43 -06003428 ret = 0;
3429 goto copy_iov;
Jens Axboe227c0c92020-08-13 11:51:40 -06003430 } else if (ret < 0) {
Jens Axboe00d23d52020-08-25 12:59:22 -06003431 /* make sure -ERESTARTSYS -> -EINTR is done */
3432 goto done;
Jens Axboe227c0c92020-08-13 11:51:40 -06003433 }
3434
3435 /* read it all, or we did blocking attempt. no retry. */
Jens Axboef91daf52020-08-15 15:58:42 -07003436 if (!iov_iter_count(iter) || !force_nonblock ||
3437 (req->file->f_flags & O_NONBLOCK))
Jens Axboe227c0c92020-08-13 11:51:40 -06003438 goto done;
3439
3440 io_size -= ret;
3441copy_iov:
3442 ret2 = io_setup_async_rw(req, iovec, inline_vecs, iter, true);
3443 if (ret2) {
3444 ret = ret2;
3445 goto out_free;
3446 }
Jens Axboef5cac8b2020-09-14 09:30:38 -06003447 if (no_async)
3448 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003449 rw = req->async_data;
Jens Axboe227c0c92020-08-13 11:51:40 -06003450 /* it's copied and will be cleaned with ->io */
3451 iovec = NULL;
3452 /* now use our persistent iterator, if we aren't already */
Jens Axboee8c2bc12020-08-15 18:44:09 -07003453 iter = &rw->iter;
Jens Axboe227c0c92020-08-13 11:51:40 -06003454retry:
Jens Axboee8c2bc12020-08-15 18:44:09 -07003455 rw->bytes_done += ret;
Jens Axboe227c0c92020-08-13 11:51:40 -06003456 /* if we can retry, do so with the callbacks armed */
3457 if (!io_rw_should_retry(req)) {
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003458 kiocb->ki_flags &= ~IOCB_WAITQ;
3459 return -EAGAIN;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003460 }
Jens Axboe227c0c92020-08-13 11:51:40 -06003461
3462 /*
3463 * Now retry read with the IOCB_WAITQ parts set in the iocb. If we
3464 * get -EIOCBQUEUED, then we'll get a notification when the desired
3465 * page gets unlocked. We can also get a partial read here, and if we
3466 * do, then just retry at the new offset.
3467 */
3468 ret = io_iter_do_read(req, iter);
3469 if (ret == -EIOCBQUEUED) {
3470 ret = 0;
3471 goto out_free;
3472 } else if (ret > 0 && ret < io_size) {
3473 /* we got some bytes, but not all. retry. */
3474 goto retry;
3475 }
3476done:
3477 kiocb_done(kiocb, ret, cs);
3478 ret = 0;
Jens Axboef67676d2019-12-02 11:03:47 -07003479out_free:
Pavel Begunkovf261c162020-08-20 11:34:10 +03003480 /* it's reportedly faster than delegating the null check to kfree() */
Pavel Begunkov252917c2020-07-13 22:59:20 +03003481 if (iovec)
Xiaoguang Wang6f2cc162020-06-18 15:01:56 +08003482 kfree(iovec);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003483 return ret;
3484}
3485
Pavel Begunkov73debe62020-09-30 22:57:54 +03003486static int io_write_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003487{
3488 ssize_t ret;
3489
Pavel Begunkova88fc402020-09-30 22:57:53 +03003490 ret = io_prep_rw(req, sqe);
Jens Axboe3529d8c2019-12-19 18:24:38 -07003491 if (ret)
3492 return ret;
Jens Axboef67676d2019-12-02 11:03:47 -07003493
Jens Axboe3529d8c2019-12-19 18:24:38 -07003494 if (unlikely(!(req->file->f_mode & FMODE_WRITE)))
3495 return -EBADF;
Jens Axboef67676d2019-12-02 11:03:47 -07003496
Pavel Begunkov5f798be2020-02-08 13:28:02 +03003497 /* either don't need iovec imported or already have it */
Pavel Begunkov2d199892020-09-30 22:57:35 +03003498 if (!req->async_data)
Jens Axboe3529d8c2019-12-19 18:24:38 -07003499 return 0;
Pavel Begunkov73debe62020-09-30 22:57:54 +03003500 return io_rw_prep_async(req, WRITE);
Jens Axboef67676d2019-12-02 11:03:47 -07003501}
3502
Jens Axboea1d7c392020-06-22 11:09:46 -06003503static int io_write(struct io_kiocb *req, bool force_nonblock,
3504 struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003505{
3506 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003507 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003508 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003509 struct io_async_rw *rw = req->async_data;
Jens Axboe31b51512019-01-18 22:56:34 -07003510 size_t iov_count;
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003511 ssize_t ret, ret2, io_size;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003512
Jens Axboee8c2bc12020-08-15 18:44:09 -07003513 if (rw)
3514 iter = &rw->iter;
Jens Axboeff6165b2020-08-13 09:47:43 -06003515
3516 ret = io_import_iovec(WRITE, req, &iovec, iter, !force_nonblock);
Jens Axboe06b76d42019-12-19 14:44:26 -07003517 if (ret < 0)
3518 return ret;
Jens Axboeeefdf302020-08-27 16:40:19 -06003519 iov_count = iov_iter_count(iter);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003520 io_size = ret;
3521 req->result = io_size;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003522
Jens Axboefd6c2e42019-12-18 12:19:41 -07003523 /* Ensure we clear previously set non-block flag */
3524 if (!force_nonblock)
Pavel Begunkova88fc402020-09-30 22:57:53 +03003525 kiocb->ki_flags &= ~IOCB_NOWAIT;
3526 else
3527 kiocb->ki_flags |= IOCB_NOWAIT;
Jens Axboefd6c2e42019-12-18 12:19:41 -07003528
Pavel Begunkov24c74672020-06-21 13:09:51 +03003529 /* If the file doesn't support async, just async punt */
Jens Axboeaf197f52020-04-28 13:15:06 -06003530 if (force_nonblock && !io_file_supports_async(req->file, WRITE))
Jens Axboef67676d2019-12-02 11:03:47 -07003531 goto copy_iov;
Jens Axboef67676d2019-12-02 11:03:47 -07003532
Jens Axboe10d59342019-12-09 20:16:22 -07003533 /* file path doesn't support NOWAIT for non-direct_IO */
3534 if (force_nonblock && !(kiocb->ki_flags & IOCB_DIRECT) &&
3535 (req->flags & REQ_F_ISREG))
Jens Axboef67676d2019-12-02 11:03:47 -07003536 goto copy_iov;
Jens Axboe9e645e112019-05-10 16:07:28 -06003537
Jens Axboe0fef9482020-08-26 10:36:20 -06003538 ret = rw_verify_area(WRITE, req->file, io_kiocb_ppos(kiocb), iov_count);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003539 if (unlikely(ret))
3540 goto out_free;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003541
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003542 /*
3543 * Open-code file_start_write here to grab freeze protection,
3544 * which will be released by another thread in
3545 * io_complete_rw(). Fool lockdep by telling it the lock got
3546 * released so that it doesn't complain about the held lock when
3547 * we return to userspace.
3548 */
3549 if (req->flags & REQ_F_ISREG) {
Darrick J. Wong8a3c84b2020-11-10 16:50:21 -08003550 sb_start_write(file_inode(req->file)->i_sb);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003551 __sb_writers_release(file_inode(req->file)->i_sb,
3552 SB_FREEZE_WRITE);
3553 }
3554 kiocb->ki_flags |= IOCB_WRITE;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003555
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003556 if (req->file->f_op->write_iter)
Jens Axboeff6165b2020-08-13 09:47:43 -06003557 ret2 = call_write_iter(req->file, kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003558 else if (req->file->f_op->write)
Jens Axboe4017eb92020-10-22 14:14:12 -06003559 ret2 = loop_rw_iter(WRITE, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003560 else
3561 ret2 = -EINVAL;
Jens Axboe4ed734b2020-03-20 11:23:41 -06003562
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003563 /*
3564 * Raw bdev writes will return -EOPNOTSUPP for IOCB_NOWAIT. Just
3565 * retry them without IOCB_NOWAIT.
3566 */
3567 if (ret2 == -EOPNOTSUPP && (kiocb->ki_flags & IOCB_NOWAIT))
3568 ret2 = -EAGAIN;
Jens Axboe355afae2020-09-02 09:30:31 -06003569 /* no retry on NONBLOCK marked file */
3570 if (ret2 == -EAGAIN && (req->file->f_flags & O_NONBLOCK))
3571 goto done;
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003572 if (!force_nonblock || ret2 != -EAGAIN) {
Jens Axboeeefdf302020-08-27 16:40:19 -06003573 /* IOPOLL retry should happen for io-wq threads */
3574 if ((req->ctx->flags & IORING_SETUP_IOPOLL) && ret2 == -EAGAIN)
3575 goto copy_iov;
Jens Axboe355afae2020-09-02 09:30:31 -06003576done:
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003577 kiocb_done(kiocb, ret2, cs);
3578 } else {
Jens Axboef67676d2019-12-02 11:03:47 -07003579copy_iov:
Jens Axboe84216312020-08-24 11:45:26 -06003580 /* some cases will consume bytes even on error returns */
3581 iov_iter_revert(iter, iov_count - iov_iter_count(iter));
Jens Axboe227c0c92020-08-13 11:51:40 -06003582 ret = io_setup_async_rw(req, iovec, inline_vecs, iter, false);
Jens Axboeff6165b2020-08-13 09:47:43 -06003583 if (!ret)
3584 return -EAGAIN;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003585 }
Jens Axboe31b51512019-01-18 22:56:34 -07003586out_free:
Pavel Begunkovf261c162020-08-20 11:34:10 +03003587 /* it's reportedly faster than delegating the null check to kfree() */
Pavel Begunkov252917c2020-07-13 22:59:20 +03003588 if (iovec)
Xiaoguang Wang6f2cc162020-06-18 15:01:56 +08003589 kfree(iovec);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003590 return ret;
3591}
3592
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003593static int __io_splice_prep(struct io_kiocb *req,
3594 const struct io_uring_sqe *sqe)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003595{
3596 struct io_splice* sp = &req->splice;
3597 unsigned int valid_flags = SPLICE_F_FD_IN_FIXED | SPLICE_F_ALL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003598
Pavel Begunkov3232dd02020-06-03 18:03:22 +03003599 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3600 return -EINVAL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003601
3602 sp->file_in = NULL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003603 sp->len = READ_ONCE(sqe->len);
3604 sp->flags = READ_ONCE(sqe->splice_flags);
3605
3606 if (unlikely(sp->flags & ~valid_flags))
3607 return -EINVAL;
3608
Pavel Begunkov8371adf2020-10-10 18:34:08 +01003609 sp->file_in = io_file_get(NULL, req, READ_ONCE(sqe->splice_fd_in),
3610 (sp->flags & SPLICE_F_FD_IN_FIXED));
3611 if (!sp->file_in)
3612 return -EBADF;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003613 req->flags |= REQ_F_NEED_CLEANUP;
3614
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08003615 if (!S_ISREG(file_inode(sp->file_in)->i_mode)) {
3616 /*
3617 * Splice operation will be punted aync, and here need to
3618 * modify io_wq_work.flags, so initialize io_wq_work firstly.
3619 */
3620 io_req_init_async(req);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003621 req->work.flags |= IO_WQ_WORK_UNBOUND;
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08003622 }
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003623
3624 return 0;
3625}
3626
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003627static int io_tee_prep(struct io_kiocb *req,
3628 const struct io_uring_sqe *sqe)
3629{
3630 if (READ_ONCE(sqe->splice_off_in) || READ_ONCE(sqe->off))
3631 return -EINVAL;
3632 return __io_splice_prep(req, sqe);
3633}
3634
3635static int io_tee(struct io_kiocb *req, bool force_nonblock)
3636{
3637 struct io_splice *sp = &req->splice;
3638 struct file *in = sp->file_in;
3639 struct file *out = sp->file_out;
3640 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
3641 long ret = 0;
3642
3643 if (force_nonblock)
3644 return -EAGAIN;
3645 if (sp->len)
3646 ret = do_tee(in, out, sp->len, flags);
3647
3648 io_put_file(req, in, (sp->flags & SPLICE_F_FD_IN_FIXED));
3649 req->flags &= ~REQ_F_NEED_CLEANUP;
3650
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003651 if (ret != sp->len)
3652 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003653 io_req_complete(req, ret);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003654 return 0;
3655}
3656
3657static int io_splice_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
3658{
3659 struct io_splice* sp = &req->splice;
3660
3661 sp->off_in = READ_ONCE(sqe->splice_off_in);
3662 sp->off_out = READ_ONCE(sqe->off);
3663 return __io_splice_prep(req, sqe);
3664}
3665
Pavel Begunkov014db002020-03-03 21:33:12 +03003666static int io_splice(struct io_kiocb *req, bool force_nonblock)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003667{
3668 struct io_splice *sp = &req->splice;
3669 struct file *in = sp->file_in;
3670 struct file *out = sp->file_out;
3671 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
3672 loff_t *poff_in, *poff_out;
Pavel Begunkovc9687422020-05-04 23:00:54 +03003673 long ret = 0;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003674
Pavel Begunkov2fb3e822020-05-01 17:09:38 +03003675 if (force_nonblock)
3676 return -EAGAIN;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003677
3678 poff_in = (sp->off_in == -1) ? NULL : &sp->off_in;
3679 poff_out = (sp->off_out == -1) ? NULL : &sp->off_out;
Pavel Begunkovc9687422020-05-04 23:00:54 +03003680
Jens Axboe948a7742020-05-17 14:21:38 -06003681 if (sp->len)
Pavel Begunkovc9687422020-05-04 23:00:54 +03003682 ret = do_splice(in, poff_in, out, poff_out, sp->len, flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003683
3684 io_put_file(req, in, (sp->flags & SPLICE_F_FD_IN_FIXED));
3685 req->flags &= ~REQ_F_NEED_CLEANUP;
3686
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003687 if (ret != sp->len)
3688 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003689 io_req_complete(req, ret);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003690 return 0;
3691}
3692
Jens Axboe2b188cc2019-01-07 10:46:33 -07003693/*
3694 * IORING_OP_NOP just posts a completion event, nothing else.
3695 */
Jens Axboe229a7b62020-06-22 10:13:11 -06003696static int io_nop(struct io_kiocb *req, struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003697{
3698 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003699
Jens Axboedef596e2019-01-09 08:59:42 -07003700 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
3701 return -EINVAL;
3702
Jens Axboe229a7b62020-06-22 10:13:11 -06003703 __io_req_complete(req, 0, 0, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003704 return 0;
3705}
3706
Jens Axboe3529d8c2019-12-19 18:24:38 -07003707static int io_prep_fsync(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003708{
Jens Axboe6b063142019-01-10 22:13:58 -07003709 struct io_ring_ctx *ctx = req->ctx;
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003710
Jens Axboe09bb8392019-03-13 12:39:28 -06003711 if (!req->file)
3712 return -EBADF;
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003713
Jens Axboe6b063142019-01-10 22:13:58 -07003714 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboedef596e2019-01-09 08:59:42 -07003715 return -EINVAL;
Jens Axboeedafcce2019-01-09 09:16:05 -07003716 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index))
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003717 return -EINVAL;
3718
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003719 req->sync.flags = READ_ONCE(sqe->fsync_flags);
3720 if (unlikely(req->sync.flags & ~IORING_FSYNC_DATASYNC))
3721 return -EINVAL;
3722
3723 req->sync.off = READ_ONCE(sqe->off);
3724 req->sync.len = READ_ONCE(sqe->len);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003725 return 0;
3726}
3727
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003728static int io_fsync(struct io_kiocb *req, bool force_nonblock)
Jens Axboe78912932020-01-14 22:09:06 -07003729{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003730 loff_t end = req->sync.off + req->sync.len;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003731 int ret;
3732
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003733 /* fsync always requires a blocking context */
3734 if (force_nonblock)
3735 return -EAGAIN;
3736
Jens Axboe9adbd452019-12-20 08:45:55 -07003737 ret = vfs_fsync_range(req->file, req->sync.off,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003738 end > 0 ? end : LLONG_MAX,
3739 req->sync.flags & IORING_FSYNC_DATASYNC);
3740 if (ret < 0)
3741 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003742 io_req_complete(req, ret);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003743 return 0;
3744}
3745
Jens Axboed63d1b52019-12-10 10:38:56 -07003746static int io_fallocate_prep(struct io_kiocb *req,
3747 const struct io_uring_sqe *sqe)
3748{
3749 if (sqe->ioprio || sqe->buf_index || sqe->rw_flags)
3750 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03003751 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3752 return -EINVAL;
Jens Axboed63d1b52019-12-10 10:38:56 -07003753
3754 req->sync.off = READ_ONCE(sqe->off);
3755 req->sync.len = READ_ONCE(sqe->addr);
3756 req->sync.mode = READ_ONCE(sqe->len);
3757 return 0;
3758}
3759
Pavel Begunkov014db002020-03-03 21:33:12 +03003760static int io_fallocate(struct io_kiocb *req, bool force_nonblock)
Jens Axboed63d1b52019-12-10 10:38:56 -07003761{
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003762 int ret;
Jens Axboed63d1b52019-12-10 10:38:56 -07003763
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003764 /* fallocate always requiring blocking context */
3765 if (force_nonblock)
3766 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003767 ret = vfs_fallocate(req->file, req->sync.mode, req->sync.off,
3768 req->sync.len);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003769 if (ret < 0)
3770 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003771 io_req_complete(req, ret);
Jens Axboed63d1b52019-12-10 10:38:56 -07003772 return 0;
3773}
3774
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003775static int __io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe15b71ab2019-12-11 11:20:36 -07003776{
Jens Axboef8748882020-01-08 17:47:02 -07003777 const char __user *fname;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003778 int ret;
3779
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003780 if (unlikely(sqe->ioprio || sqe->buf_index))
Jens Axboe15b71ab2019-12-11 11:20:36 -07003781 return -EINVAL;
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003782 if (unlikely(req->flags & REQ_F_FIXED_FILE))
Jens Axboecf3040c2020-02-06 21:31:40 -07003783 return -EBADF;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003784
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003785 /* open.how should be already initialised */
3786 if (!(req->open.how.flags & O_PATH) && force_o_largefile())
Jens Axboe08a1d26eb2020-04-08 09:20:54 -06003787 req->open.how.flags |= O_LARGEFILE;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003788
Pavel Begunkov25e72d12020-06-03 18:03:23 +03003789 req->open.dfd = READ_ONCE(sqe->fd);
3790 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboef8748882020-01-08 17:47:02 -07003791 req->open.filename = getname(fname);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003792 if (IS_ERR(req->open.filename)) {
3793 ret = PTR_ERR(req->open.filename);
3794 req->open.filename = NULL;
3795 return ret;
3796 }
Jens Axboe4022e7a2020-03-19 19:23:18 -06003797 req->open.nofile = rlimit(RLIMIT_NOFILE);
Jens Axboe944d1442020-11-13 16:48:44 -07003798 req->open.ignore_nonblock = false;
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03003799 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003800 return 0;
3801}
3802
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003803static int io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
3804{
3805 u64 flags, mode;
3806
Jens Axboe4eb8dde2020-09-18 19:36:24 -06003807 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
3808 return -EINVAL;
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003809 mode = READ_ONCE(sqe->len);
3810 flags = READ_ONCE(sqe->open_flags);
3811 req->open.how = build_open_how(flags, mode);
3812 return __io_openat_prep(req, sqe);
3813}
3814
Jens Axboecebdb982020-01-08 17:59:24 -07003815static int io_openat2_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
3816{
3817 struct open_how __user *how;
Jens Axboecebdb982020-01-08 17:59:24 -07003818 size_t len;
3819 int ret;
3820
Jens Axboe4eb8dde2020-09-18 19:36:24 -06003821 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
3822 return -EINVAL;
Jens Axboecebdb982020-01-08 17:59:24 -07003823 how = u64_to_user_ptr(READ_ONCE(sqe->addr2));
3824 len = READ_ONCE(sqe->len);
Jens Axboecebdb982020-01-08 17:59:24 -07003825 if (len < OPEN_HOW_SIZE_VER0)
3826 return -EINVAL;
3827
3828 ret = copy_struct_from_user(&req->open.how, sizeof(req->open.how), how,
3829 len);
3830 if (ret)
3831 return ret;
3832
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003833 return __io_openat_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07003834}
3835
Pavel Begunkov014db002020-03-03 21:33:12 +03003836static int io_openat2(struct io_kiocb *req, bool force_nonblock)
Jens Axboe15b71ab2019-12-11 11:20:36 -07003837{
3838 struct open_flags op;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003839 struct file *file;
3840 int ret;
3841
Jens Axboe944d1442020-11-13 16:48:44 -07003842 if (force_nonblock && !req->open.ignore_nonblock)
Jens Axboe15b71ab2019-12-11 11:20:36 -07003843 return -EAGAIN;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003844
Jens Axboecebdb982020-01-08 17:59:24 -07003845 ret = build_open_flags(&req->open.how, &op);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003846 if (ret)
3847 goto err;
3848
Jens Axboe4022e7a2020-03-19 19:23:18 -06003849 ret = __get_unused_fd_flags(req->open.how.flags, req->open.nofile);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003850 if (ret < 0)
3851 goto err;
3852
3853 file = do_filp_open(req->open.dfd, req->open.filename, &op);
3854 if (IS_ERR(file)) {
3855 put_unused_fd(ret);
3856 ret = PTR_ERR(file);
Jens Axboe944d1442020-11-13 16:48:44 -07003857 /*
3858 * A work-around to ensure that /proc/self works that way
3859 * that it should - if we get -EOPNOTSUPP back, then assume
3860 * that proc_self_get_link() failed us because we're in async
3861 * context. We should be safe to retry this from the task
3862 * itself with force_nonblock == false set, as it should not
3863 * block on lookup. Would be nice to know this upfront and
3864 * avoid the async dance, but doesn't seem feasible.
3865 */
3866 if (ret == -EOPNOTSUPP && io_wq_current_is_worker()) {
3867 req->open.ignore_nonblock = true;
3868 refcount_inc(&req->refs);
3869 io_req_task_queue(req);
3870 return 0;
3871 }
Jens Axboe15b71ab2019-12-11 11:20:36 -07003872 } else {
3873 fsnotify_open(file);
3874 fd_install(ret, file);
3875 }
3876err:
3877 putname(req->open.filename);
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03003878 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003879 if (ret < 0)
3880 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003881 io_req_complete(req, ret);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003882 return 0;
3883}
3884
Pavel Begunkov014db002020-03-03 21:33:12 +03003885static int io_openat(struct io_kiocb *req, bool force_nonblock)
Jens Axboecebdb982020-01-08 17:59:24 -07003886{
Pavel Begunkov014db002020-03-03 21:33:12 +03003887 return io_openat2(req, force_nonblock);
Jens Axboecebdb982020-01-08 17:59:24 -07003888}
3889
Jens Axboe067524e2020-03-02 16:32:28 -07003890static int io_remove_buffers_prep(struct io_kiocb *req,
3891 const struct io_uring_sqe *sqe)
3892{
3893 struct io_provide_buf *p = &req->pbuf;
3894 u64 tmp;
3895
3896 if (sqe->ioprio || sqe->rw_flags || sqe->addr || sqe->len || sqe->off)
3897 return -EINVAL;
3898
3899 tmp = READ_ONCE(sqe->fd);
3900 if (!tmp || tmp > USHRT_MAX)
3901 return -EINVAL;
3902
3903 memset(p, 0, sizeof(*p));
3904 p->nbufs = tmp;
3905 p->bgid = READ_ONCE(sqe->buf_group);
3906 return 0;
3907}
3908
3909static int __io_remove_buffers(struct io_ring_ctx *ctx, struct io_buffer *buf,
3910 int bgid, unsigned nbufs)
3911{
3912 unsigned i = 0;
3913
3914 /* shouldn't happen */
3915 if (!nbufs)
3916 return 0;
3917
3918 /* the head kbuf is the list itself */
3919 while (!list_empty(&buf->list)) {
3920 struct io_buffer *nxt;
3921
3922 nxt = list_first_entry(&buf->list, struct io_buffer, list);
3923 list_del(&nxt->list);
3924 kfree(nxt);
3925 if (++i == nbufs)
3926 return i;
3927 }
3928 i++;
3929 kfree(buf);
3930 idr_remove(&ctx->io_buffer_idr, bgid);
3931
3932 return i;
3933}
3934
Jens Axboe229a7b62020-06-22 10:13:11 -06003935static int io_remove_buffers(struct io_kiocb *req, bool force_nonblock,
3936 struct io_comp_state *cs)
Jens Axboe067524e2020-03-02 16:32:28 -07003937{
3938 struct io_provide_buf *p = &req->pbuf;
3939 struct io_ring_ctx *ctx = req->ctx;
3940 struct io_buffer *head;
3941 int ret = 0;
3942
3943 io_ring_submit_lock(ctx, !force_nonblock);
3944
3945 lockdep_assert_held(&ctx->uring_lock);
3946
3947 ret = -ENOENT;
3948 head = idr_find(&ctx->io_buffer_idr, p->bgid);
3949 if (head)
3950 ret = __io_remove_buffers(ctx, head, p->bgid, p->nbufs);
3951
3952 io_ring_submit_lock(ctx, !force_nonblock);
3953 if (ret < 0)
3954 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06003955 __io_req_complete(req, ret, 0, cs);
Jens Axboe067524e2020-03-02 16:32:28 -07003956 return 0;
3957}
3958
Jens Axboeddf0322d2020-02-23 16:41:33 -07003959static int io_provide_buffers_prep(struct io_kiocb *req,
3960 const struct io_uring_sqe *sqe)
3961{
3962 struct io_provide_buf *p = &req->pbuf;
3963 u64 tmp;
3964
3965 if (sqe->ioprio || sqe->rw_flags)
3966 return -EINVAL;
3967
3968 tmp = READ_ONCE(sqe->fd);
3969 if (!tmp || tmp > USHRT_MAX)
3970 return -E2BIG;
3971 p->nbufs = tmp;
3972 p->addr = READ_ONCE(sqe->addr);
3973 p->len = READ_ONCE(sqe->len);
3974
Bijan Mottahedehefe68c12020-06-04 18:01:52 -07003975 if (!access_ok(u64_to_user_ptr(p->addr), (p->len * p->nbufs)))
Jens Axboeddf0322d2020-02-23 16:41:33 -07003976 return -EFAULT;
3977
3978 p->bgid = READ_ONCE(sqe->buf_group);
3979 tmp = READ_ONCE(sqe->off);
3980 if (tmp > USHRT_MAX)
3981 return -E2BIG;
3982 p->bid = tmp;
3983 return 0;
3984}
3985
3986static int io_add_buffers(struct io_provide_buf *pbuf, struct io_buffer **head)
3987{
3988 struct io_buffer *buf;
3989 u64 addr = pbuf->addr;
3990 int i, bid = pbuf->bid;
3991
3992 for (i = 0; i < pbuf->nbufs; i++) {
3993 buf = kmalloc(sizeof(*buf), GFP_KERNEL);
3994 if (!buf)
3995 break;
3996
3997 buf->addr = addr;
3998 buf->len = pbuf->len;
3999 buf->bid = bid;
4000 addr += pbuf->len;
4001 bid++;
4002 if (!*head) {
4003 INIT_LIST_HEAD(&buf->list);
4004 *head = buf;
4005 } else {
4006 list_add_tail(&buf->list, &(*head)->list);
4007 }
4008 }
4009
4010 return i ? i : -ENOMEM;
4011}
4012
Jens Axboe229a7b62020-06-22 10:13:11 -06004013static int io_provide_buffers(struct io_kiocb *req, bool force_nonblock,
4014 struct io_comp_state *cs)
Jens Axboeddf0322d2020-02-23 16:41:33 -07004015{
4016 struct io_provide_buf *p = &req->pbuf;
4017 struct io_ring_ctx *ctx = req->ctx;
4018 struct io_buffer *head, *list;
4019 int ret = 0;
4020
4021 io_ring_submit_lock(ctx, !force_nonblock);
4022
4023 lockdep_assert_held(&ctx->uring_lock);
4024
4025 list = head = idr_find(&ctx->io_buffer_idr, p->bgid);
4026
4027 ret = io_add_buffers(p, &head);
4028 if (ret < 0)
4029 goto out;
4030
4031 if (!list) {
4032 ret = idr_alloc(&ctx->io_buffer_idr, head, p->bgid, p->bgid + 1,
4033 GFP_KERNEL);
4034 if (ret < 0) {
Jens Axboe067524e2020-03-02 16:32:28 -07004035 __io_remove_buffers(ctx, head, p->bgid, -1U);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004036 goto out;
4037 }
4038 }
4039out:
4040 io_ring_submit_unlock(ctx, !force_nonblock);
4041 if (ret < 0)
4042 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004043 __io_req_complete(req, ret, 0, cs);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004044 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07004045}
4046
Jens Axboe3e4827b2020-01-08 15:18:09 -07004047static int io_epoll_ctl_prep(struct io_kiocb *req,
4048 const struct io_uring_sqe *sqe)
4049{
4050#if defined(CONFIG_EPOLL)
4051 if (sqe->ioprio || sqe->buf_index)
4052 return -EINVAL;
Jens Axboe6ca56f82020-09-18 16:51:19 -06004053 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL)))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004054 return -EINVAL;
Jens Axboe3e4827b2020-01-08 15:18:09 -07004055
4056 req->epoll.epfd = READ_ONCE(sqe->fd);
4057 req->epoll.op = READ_ONCE(sqe->len);
4058 req->epoll.fd = READ_ONCE(sqe->off);
4059
4060 if (ep_op_has_event(req->epoll.op)) {
4061 struct epoll_event __user *ev;
4062
4063 ev = u64_to_user_ptr(READ_ONCE(sqe->addr));
4064 if (copy_from_user(&req->epoll.event, ev, sizeof(*ev)))
4065 return -EFAULT;
4066 }
4067
4068 return 0;
4069#else
4070 return -EOPNOTSUPP;
4071#endif
4072}
4073
Jens Axboe229a7b62020-06-22 10:13:11 -06004074static int io_epoll_ctl(struct io_kiocb *req, bool force_nonblock,
4075 struct io_comp_state *cs)
Jens Axboe3e4827b2020-01-08 15:18:09 -07004076{
4077#if defined(CONFIG_EPOLL)
4078 struct io_epoll *ie = &req->epoll;
4079 int ret;
4080
4081 ret = do_epoll_ctl(ie->epfd, ie->op, ie->fd, &ie->event, force_nonblock);
4082 if (force_nonblock && ret == -EAGAIN)
4083 return -EAGAIN;
4084
4085 if (ret < 0)
4086 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004087 __io_req_complete(req, ret, 0, cs);
Jens Axboe3e4827b2020-01-08 15:18:09 -07004088 return 0;
4089#else
4090 return -EOPNOTSUPP;
4091#endif
4092}
4093
Jens Axboec1ca7572019-12-25 22:18:28 -07004094static int io_madvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4095{
4096#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
4097 if (sqe->ioprio || sqe->buf_index || sqe->off)
4098 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004099 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4100 return -EINVAL;
Jens Axboec1ca7572019-12-25 22:18:28 -07004101
4102 req->madvise.addr = READ_ONCE(sqe->addr);
4103 req->madvise.len = READ_ONCE(sqe->len);
4104 req->madvise.advice = READ_ONCE(sqe->fadvise_advice);
4105 return 0;
4106#else
4107 return -EOPNOTSUPP;
4108#endif
4109}
4110
Pavel Begunkov014db002020-03-03 21:33:12 +03004111static int io_madvise(struct io_kiocb *req, bool force_nonblock)
Jens Axboec1ca7572019-12-25 22:18:28 -07004112{
4113#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
4114 struct io_madvise *ma = &req->madvise;
4115 int ret;
4116
4117 if (force_nonblock)
4118 return -EAGAIN;
4119
Minchan Kim0726b012020-10-17 16:14:50 -07004120 ret = do_madvise(current->mm, ma->addr, ma->len, ma->advice);
Jens Axboec1ca7572019-12-25 22:18:28 -07004121 if (ret < 0)
4122 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004123 io_req_complete(req, ret);
Jens Axboec1ca7572019-12-25 22:18:28 -07004124 return 0;
4125#else
4126 return -EOPNOTSUPP;
4127#endif
4128}
4129
Jens Axboe4840e412019-12-25 22:03:45 -07004130static int io_fadvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4131{
4132 if (sqe->ioprio || sqe->buf_index || sqe->addr)
4133 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004134 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4135 return -EINVAL;
Jens Axboe4840e412019-12-25 22:03:45 -07004136
4137 req->fadvise.offset = READ_ONCE(sqe->off);
4138 req->fadvise.len = READ_ONCE(sqe->len);
4139 req->fadvise.advice = READ_ONCE(sqe->fadvise_advice);
4140 return 0;
4141}
4142
Pavel Begunkov014db002020-03-03 21:33:12 +03004143static int io_fadvise(struct io_kiocb *req, bool force_nonblock)
Jens Axboe4840e412019-12-25 22:03:45 -07004144{
4145 struct io_fadvise *fa = &req->fadvise;
4146 int ret;
4147
Jens Axboe3e694262020-02-01 09:22:49 -07004148 if (force_nonblock) {
4149 switch (fa->advice) {
4150 case POSIX_FADV_NORMAL:
4151 case POSIX_FADV_RANDOM:
4152 case POSIX_FADV_SEQUENTIAL:
4153 break;
4154 default:
4155 return -EAGAIN;
4156 }
4157 }
Jens Axboe4840e412019-12-25 22:03:45 -07004158
4159 ret = vfs_fadvise(req->file, fa->offset, fa->len, fa->advice);
4160 if (ret < 0)
4161 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004162 io_req_complete(req, ret);
Jens Axboe4840e412019-12-25 22:03:45 -07004163 return 0;
4164}
4165
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004166static int io_statx_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4167{
Jens Axboe6ca56f82020-09-18 16:51:19 -06004168 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL)))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004169 return -EINVAL;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004170 if (sqe->ioprio || sqe->buf_index)
4171 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004172 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004173 return -EBADF;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004174
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004175 req->statx.dfd = READ_ONCE(sqe->fd);
4176 req->statx.mask = READ_ONCE(sqe->len);
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004177 req->statx.filename = u64_to_user_ptr(READ_ONCE(sqe->addr));
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004178 req->statx.buffer = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4179 req->statx.flags = READ_ONCE(sqe->statx_flags);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004180
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004181 return 0;
4182}
4183
Pavel Begunkov014db002020-03-03 21:33:12 +03004184static int io_statx(struct io_kiocb *req, bool force_nonblock)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004185{
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004186 struct io_statx *ctx = &req->statx;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004187 int ret;
4188
Jens Axboe5b0bbee2020-04-27 10:41:22 -06004189 if (force_nonblock) {
4190 /* only need file table for an actual valid fd */
4191 if (ctx->dfd == -1 || ctx->dfd == AT_FDCWD)
4192 req->flags |= REQ_F_NO_FILE_TABLE;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004193 return -EAGAIN;
Jens Axboe5b0bbee2020-04-27 10:41:22 -06004194 }
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004195
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004196 ret = do_statx(ctx->dfd, ctx->filename, ctx->flags, ctx->mask,
4197 ctx->buffer);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004198
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004199 if (ret < 0)
4200 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004201 io_req_complete(req, ret);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004202 return 0;
4203}
4204
Jens Axboeb5dba592019-12-11 14:02:38 -07004205static int io_close_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4206{
4207 /*
4208 * If we queue this for async, it must not be cancellable. That would
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08004209 * leave the 'file' in an undeterminate state, and here need to modify
4210 * io_wq_work.flags, so initialize io_wq_work firstly.
Jens Axboeb5dba592019-12-11 14:02:38 -07004211 */
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08004212 io_req_init_async(req);
Jens Axboeb5dba592019-12-11 14:02:38 -07004213 req->work.flags |= IO_WQ_WORK_NO_CANCEL;
4214
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004215 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
4216 return -EINVAL;
Jens Axboeb5dba592019-12-11 14:02:38 -07004217 if (sqe->ioprio || sqe->off || sqe->addr || sqe->len ||
4218 sqe->rw_flags || sqe->buf_index)
4219 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004220 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004221 return -EBADF;
Jens Axboeb5dba592019-12-11 14:02:38 -07004222
4223 req->close.fd = READ_ONCE(sqe->fd);
Jens Axboe0f212202020-09-13 13:09:39 -06004224 if ((req->file && req->file->f_op == &io_uring_fops))
Jens Axboefd2206e2020-06-02 16:40:47 -06004225 return -EBADF;
4226
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004227 req->close.put_file = NULL;
Jens Axboeb5dba592019-12-11 14:02:38 -07004228 return 0;
4229}
4230
Jens Axboe229a7b62020-06-22 10:13:11 -06004231static int io_close(struct io_kiocb *req, bool force_nonblock,
4232 struct io_comp_state *cs)
Jens Axboeb5dba592019-12-11 14:02:38 -07004233{
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004234 struct io_close *close = &req->close;
Jens Axboeb5dba592019-12-11 14:02:38 -07004235 int ret;
4236
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004237 /* might be already done during nonblock submission */
4238 if (!close->put_file) {
Eric W. Biederman9fe83c42020-11-20 17:14:40 -06004239 ret = close_fd_get_file(close->fd, &close->put_file);
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004240 if (ret < 0)
4241 return (ret == -ENOENT) ? -EBADF : ret;
4242 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004243
4244 /* if the file has a flush method, be safe and punt to async */
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004245 if (close->put_file->f_op->flush && force_nonblock) {
Pavel Begunkov24c74672020-06-21 13:09:51 +03004246 /* was never set, but play safe */
4247 req->flags &= ~REQ_F_NOWAIT;
Pavel Begunkov0bf0eef2020-05-26 20:34:06 +03004248 /* avoid grabbing files - we don't need the files */
Pavel Begunkov24c74672020-06-21 13:09:51 +03004249 req->flags |= REQ_F_NO_FILE_TABLE;
Pavel Begunkov0bf0eef2020-05-26 20:34:06 +03004250 return -EAGAIN;
Pavel Begunkova2100672020-03-02 23:45:16 +03004251 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004252
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004253 /* No ->flush() or already async, safely close from here */
Jens Axboe98447d62020-10-14 10:48:51 -06004254 ret = filp_close(close->put_file, req->work.identity->files);
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004255 if (ret < 0)
4256 req_set_fail_links(req);
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004257 fput(close->put_file);
4258 close->put_file = NULL;
Jens Axboe229a7b62020-06-22 10:13:11 -06004259 __io_req_complete(req, ret, 0, cs);
Jens Axboe1a417f42020-01-31 17:16:48 -07004260 return 0;
Jens Axboeb5dba592019-12-11 14:02:38 -07004261}
4262
Jens Axboe3529d8c2019-12-19 18:24:38 -07004263static int io_prep_sfr(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004264{
4265 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004266
4267 if (!req->file)
4268 return -EBADF;
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004269
4270 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
4271 return -EINVAL;
4272 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index))
4273 return -EINVAL;
4274
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004275 req->sync.off = READ_ONCE(sqe->off);
4276 req->sync.len = READ_ONCE(sqe->len);
4277 req->sync.flags = READ_ONCE(sqe->sync_range_flags);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004278 return 0;
4279}
4280
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004281static int io_sync_file_range(struct io_kiocb *req, bool force_nonblock)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004282{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004283 int ret;
4284
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004285 /* sync_file_range always requires a blocking context */
4286 if (force_nonblock)
4287 return -EAGAIN;
4288
Jens Axboe9adbd452019-12-20 08:45:55 -07004289 ret = sync_file_range(req->file, req->sync.off, req->sync.len,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004290 req->sync.flags);
4291 if (ret < 0)
4292 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004293 io_req_complete(req, ret);
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004294 return 0;
4295}
4296
YueHaibing469956e2020-03-04 15:53:52 +08004297#if defined(CONFIG_NET)
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004298static int io_setup_async_msg(struct io_kiocb *req,
4299 struct io_async_msghdr *kmsg)
4300{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004301 struct io_async_msghdr *async_msg = req->async_data;
4302
4303 if (async_msg)
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004304 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004305 if (io_alloc_async_data(req)) {
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004306 if (kmsg->iov != kmsg->fast_iov)
4307 kfree(kmsg->iov);
4308 return -ENOMEM;
4309 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07004310 async_msg = req->async_data;
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004311 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004312 memcpy(async_msg, kmsg, sizeof(*kmsg));
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004313 return -EAGAIN;
4314}
4315
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004316static int io_sendmsg_copy_hdr(struct io_kiocb *req,
4317 struct io_async_msghdr *iomsg)
4318{
4319 iomsg->iov = iomsg->fast_iov;
4320 iomsg->msg.msg_name = &iomsg->addr;
4321 return sendmsg_copy_msghdr(&iomsg->msg, req->sr_msg.umsg,
4322 req->sr_msg.msg_flags, &iomsg->iov);
4323}
4324
Jens Axboe3529d8c2019-12-19 18:24:38 -07004325static int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboeaa1fa282019-04-19 13:38:09 -06004326{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004327 struct io_async_msghdr *async_msg = req->async_data;
Jens Axboee47293f2019-12-20 08:58:21 -07004328 struct io_sr_msg *sr = &req->sr_msg;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004329 int ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004330
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004331 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4332 return -EINVAL;
4333
Jens Axboee47293f2019-12-20 08:58:21 -07004334 sr->msg_flags = READ_ONCE(sqe->msg_flags);
Pavel Begunkov270a5942020-07-12 20:41:04 +03004335 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboefddafac2020-01-04 20:19:44 -07004336 sr->len = READ_ONCE(sqe->len);
Jens Axboe3529d8c2019-12-19 18:24:38 -07004337
Jens Axboed8768362020-02-27 14:17:49 -07004338#ifdef CONFIG_COMPAT
4339 if (req->ctx->compat)
4340 sr->msg_flags |= MSG_CMSG_COMPAT;
4341#endif
4342
Jens Axboee8c2bc12020-08-15 18:44:09 -07004343 if (!async_msg || !io_op_defs[req->opcode].needs_async_data)
Jens Axboe3529d8c2019-12-19 18:24:38 -07004344 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004345 ret = io_sendmsg_copy_hdr(req, async_msg);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004346 if (!ret)
4347 req->flags |= REQ_F_NEED_CLEANUP;
4348 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004349}
4350
Jens Axboe229a7b62020-06-22 10:13:11 -06004351static int io_sendmsg(struct io_kiocb *req, bool force_nonblock,
4352 struct io_comp_state *cs)
Jens Axboe03b12302019-12-02 18:50:25 -07004353{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004354 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe03b12302019-12-02 18:50:25 -07004355 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004356 unsigned flags;
Jens Axboe03b12302019-12-02 18:50:25 -07004357 int ret;
4358
Florent Revestdba4a922020-12-04 12:36:04 +01004359 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004360 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01004361 return -ENOTSOCK;
Jens Axboe03b12302019-12-02 18:50:25 -07004362
Jens Axboee8c2bc12020-08-15 18:44:09 -07004363 if (req->async_data) {
4364 kmsg = req->async_data;
4365 kmsg->msg.msg_name = &kmsg->addr;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004366 /* if iov is set, it's allocated already */
4367 if (!kmsg->iov)
4368 kmsg->iov = kmsg->fast_iov;
4369 kmsg->msg.msg_iter.iov = kmsg->iov;
4370 } else {
4371 ret = io_sendmsg_copy_hdr(req, &iomsg);
Jens Axboefddafac2020-01-04 20:19:44 -07004372 if (ret)
4373 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004374 kmsg = &iomsg;
Jens Axboefddafac2020-01-04 20:19:44 -07004375 }
4376
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004377 flags = req->sr_msg.msg_flags;
4378 if (flags & MSG_DONTWAIT)
4379 req->flags |= REQ_F_NOWAIT;
4380 else if (force_nonblock)
4381 flags |= MSG_DONTWAIT;
4382
4383 ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
4384 if (force_nonblock && ret == -EAGAIN)
4385 return io_setup_async_msg(req, kmsg);
4386 if (ret == -ERESTARTSYS)
4387 ret = -EINTR;
4388
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004389 if (kmsg->iov != kmsg->fast_iov)
Jens Axboe03b12302019-12-02 18:50:25 -07004390 kfree(kmsg->iov);
4391 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboefddafac2020-01-04 20:19:44 -07004392 if (ret < 0)
4393 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004394 __io_req_complete(req, ret, 0, cs);
Jens Axboefddafac2020-01-04 20:19:44 -07004395 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004396}
4397
Jens Axboe229a7b62020-06-22 10:13:11 -06004398static int io_send(struct io_kiocb *req, bool force_nonblock,
4399 struct io_comp_state *cs)
Jens Axboe03b12302019-12-02 18:50:25 -07004400{
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004401 struct io_sr_msg *sr = &req->sr_msg;
4402 struct msghdr msg;
4403 struct iovec iov;
Jens Axboe03b12302019-12-02 18:50:25 -07004404 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004405 unsigned flags;
Jens Axboe03b12302019-12-02 18:50:25 -07004406 int ret;
4407
Florent Revestdba4a922020-12-04 12:36:04 +01004408 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004409 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01004410 return -ENOTSOCK;
Jens Axboe03b12302019-12-02 18:50:25 -07004411
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004412 ret = import_single_range(WRITE, sr->buf, sr->len, &iov, &msg.msg_iter);
4413 if (unlikely(ret))
Zheng Bin14db8412020-09-09 20:12:37 +08004414 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004415
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004416 msg.msg_name = NULL;
4417 msg.msg_control = NULL;
4418 msg.msg_controllen = 0;
4419 msg.msg_namelen = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004420
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004421 flags = req->sr_msg.msg_flags;
4422 if (flags & MSG_DONTWAIT)
4423 req->flags |= REQ_F_NOWAIT;
4424 else if (force_nonblock)
4425 flags |= MSG_DONTWAIT;
Jens Axboe03b12302019-12-02 18:50:25 -07004426
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004427 msg.msg_flags = flags;
4428 ret = sock_sendmsg(sock, &msg);
4429 if (force_nonblock && ret == -EAGAIN)
4430 return -EAGAIN;
4431 if (ret == -ERESTARTSYS)
4432 ret = -EINTR;
Jens Axboe03b12302019-12-02 18:50:25 -07004433
Jens Axboe03b12302019-12-02 18:50:25 -07004434 if (ret < 0)
4435 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004436 __io_req_complete(req, ret, 0, cs);
Jens Axboe03b12302019-12-02 18:50:25 -07004437 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004438}
4439
Pavel Begunkov1400e692020-07-12 20:41:05 +03004440static int __io_recvmsg_copy_hdr(struct io_kiocb *req,
4441 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07004442{
4443 struct io_sr_msg *sr = &req->sr_msg;
4444 struct iovec __user *uiov;
4445 size_t iov_len;
4446 int ret;
4447
Pavel Begunkov1400e692020-07-12 20:41:05 +03004448 ret = __copy_msghdr_from_user(&iomsg->msg, sr->umsg,
4449 &iomsg->uaddr, &uiov, &iov_len);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004450 if (ret)
4451 return ret;
4452
4453 if (req->flags & REQ_F_BUFFER_SELECT) {
4454 if (iov_len > 1)
4455 return -EINVAL;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004456 if (copy_from_user(iomsg->iov, uiov, sizeof(*uiov)))
Jens Axboe52de1fe2020-02-27 10:15:42 -07004457 return -EFAULT;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004458 sr->len = iomsg->iov[0].iov_len;
4459 iov_iter_init(&iomsg->msg.msg_iter, READ, iomsg->iov, 1,
Jens Axboe52de1fe2020-02-27 10:15:42 -07004460 sr->len);
Pavel Begunkov1400e692020-07-12 20:41:05 +03004461 iomsg->iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004462 } else {
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02004463 ret = __import_iovec(READ, uiov, iov_len, UIO_FASTIOV,
4464 &iomsg->iov, &iomsg->msg.msg_iter,
4465 false);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004466 if (ret > 0)
4467 ret = 0;
4468 }
4469
4470 return ret;
4471}
4472
4473#ifdef CONFIG_COMPAT
4474static int __io_compat_recvmsg_copy_hdr(struct io_kiocb *req,
Pavel Begunkov1400e692020-07-12 20:41:05 +03004475 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07004476{
4477 struct compat_msghdr __user *msg_compat;
4478 struct io_sr_msg *sr = &req->sr_msg;
4479 struct compat_iovec __user *uiov;
4480 compat_uptr_t ptr;
4481 compat_size_t len;
4482 int ret;
4483
Pavel Begunkov270a5942020-07-12 20:41:04 +03004484 msg_compat = (struct compat_msghdr __user *) sr->umsg;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004485 ret = __get_compat_msghdr(&iomsg->msg, msg_compat, &iomsg->uaddr,
Jens Axboe52de1fe2020-02-27 10:15:42 -07004486 &ptr, &len);
4487 if (ret)
4488 return ret;
4489
4490 uiov = compat_ptr(ptr);
4491 if (req->flags & REQ_F_BUFFER_SELECT) {
4492 compat_ssize_t clen;
4493
4494 if (len > 1)
4495 return -EINVAL;
4496 if (!access_ok(uiov, sizeof(*uiov)))
4497 return -EFAULT;
4498 if (__get_user(clen, &uiov->iov_len))
4499 return -EFAULT;
4500 if (clen < 0)
4501 return -EINVAL;
Pavel Begunkov2d280bc2020-11-29 18:33:32 +00004502 sr->len = clen;
4503 iomsg->iov[0].iov_len = clen;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004504 iomsg->iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004505 } else {
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02004506 ret = __import_iovec(READ, (struct iovec __user *)uiov, len,
4507 UIO_FASTIOV, &iomsg->iov,
4508 &iomsg->msg.msg_iter, true);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004509 if (ret < 0)
4510 return ret;
4511 }
4512
4513 return 0;
4514}
Jens Axboe03b12302019-12-02 18:50:25 -07004515#endif
Jens Axboe52de1fe2020-02-27 10:15:42 -07004516
Pavel Begunkov1400e692020-07-12 20:41:05 +03004517static int io_recvmsg_copy_hdr(struct io_kiocb *req,
4518 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07004519{
Pavel Begunkov1400e692020-07-12 20:41:05 +03004520 iomsg->msg.msg_name = &iomsg->addr;
4521 iomsg->iov = iomsg->fast_iov;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004522
4523#ifdef CONFIG_COMPAT
4524 if (req->ctx->compat)
Pavel Begunkov1400e692020-07-12 20:41:05 +03004525 return __io_compat_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004526#endif
4527
Pavel Begunkov1400e692020-07-12 20:41:05 +03004528 return __io_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004529}
4530
Jens Axboebcda7ba2020-02-23 16:42:51 -07004531static struct io_buffer *io_recv_buffer_select(struct io_kiocb *req,
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004532 bool needs_lock)
Jens Axboebcda7ba2020-02-23 16:42:51 -07004533{
4534 struct io_sr_msg *sr = &req->sr_msg;
4535 struct io_buffer *kbuf;
4536
Jens Axboebcda7ba2020-02-23 16:42:51 -07004537 kbuf = io_buffer_select(req, &sr->len, sr->bgid, sr->kbuf, needs_lock);
4538 if (IS_ERR(kbuf))
4539 return kbuf;
4540
4541 sr->kbuf = kbuf;
4542 req->flags |= REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07004543 return kbuf;
Jens Axboe03b12302019-12-02 18:50:25 -07004544}
4545
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004546static inline unsigned int io_put_recv_kbuf(struct io_kiocb *req)
4547{
4548 return io_put_kbuf(req, req->sr_msg.kbuf);
4549}
4550
Jens Axboe3529d8c2019-12-19 18:24:38 -07004551static int io_recvmsg_prep(struct io_kiocb *req,
4552 const struct io_uring_sqe *sqe)
Jens Axboe03b12302019-12-02 18:50:25 -07004553{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004554 struct io_async_msghdr *async_msg = req->async_data;
Jens Axboee47293f2019-12-20 08:58:21 -07004555 struct io_sr_msg *sr = &req->sr_msg;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004556 int ret;
Jens Axboe06b76d42019-12-19 14:44:26 -07004557
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004558 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4559 return -EINVAL;
4560
Jens Axboe3529d8c2019-12-19 18:24:38 -07004561 sr->msg_flags = READ_ONCE(sqe->msg_flags);
Pavel Begunkov270a5942020-07-12 20:41:04 +03004562 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboe0b7b21e2020-01-31 08:34:59 -07004563 sr->len = READ_ONCE(sqe->len);
Jens Axboebcda7ba2020-02-23 16:42:51 -07004564 sr->bgid = READ_ONCE(sqe->buf_group);
Jens Axboe3529d8c2019-12-19 18:24:38 -07004565
Jens Axboed8768362020-02-27 14:17:49 -07004566#ifdef CONFIG_COMPAT
4567 if (req->ctx->compat)
4568 sr->msg_flags |= MSG_CMSG_COMPAT;
4569#endif
4570
Jens Axboee8c2bc12020-08-15 18:44:09 -07004571 if (!async_msg || !io_op_defs[req->opcode].needs_async_data)
Jens Axboe06b76d42019-12-19 14:44:26 -07004572 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004573 ret = io_recvmsg_copy_hdr(req, async_msg);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004574 if (!ret)
4575 req->flags |= REQ_F_NEED_CLEANUP;
4576 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004577}
4578
Jens Axboe229a7b62020-06-22 10:13:11 -06004579static int io_recvmsg(struct io_kiocb *req, bool force_nonblock,
4580 struct io_comp_state *cs)
Jens Axboe03b12302019-12-02 18:50:25 -07004581{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004582 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004583 struct socket *sock;
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004584 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004585 unsigned flags;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004586 int ret, cflags = 0;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004587
Florent Revestdba4a922020-12-04 12:36:04 +01004588 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004589 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01004590 return -ENOTSOCK;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004591
Jens Axboee8c2bc12020-08-15 18:44:09 -07004592 if (req->async_data) {
4593 kmsg = req->async_data;
4594 kmsg->msg.msg_name = &kmsg->addr;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004595 /* if iov is set, it's allocated already */
4596 if (!kmsg->iov)
4597 kmsg->iov = kmsg->fast_iov;
4598 kmsg->msg.msg_iter.iov = kmsg->iov;
4599 } else {
4600 ret = io_recvmsg_copy_hdr(req, &iomsg);
4601 if (ret)
Pavel Begunkov681fda82020-07-15 22:20:45 +03004602 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004603 kmsg = &iomsg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004604 }
4605
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03004606 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004607 kbuf = io_recv_buffer_select(req, !force_nonblock);
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03004608 if (IS_ERR(kbuf))
4609 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004610 kmsg->fast_iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
4611 iov_iter_init(&kmsg->msg.msg_iter, READ, kmsg->iov,
4612 1, req->sr_msg.len);
4613 }
4614
4615 flags = req->sr_msg.msg_flags;
4616 if (flags & MSG_DONTWAIT)
4617 req->flags |= REQ_F_NOWAIT;
4618 else if (force_nonblock)
4619 flags |= MSG_DONTWAIT;
4620
4621 ret = __sys_recvmsg_sock(sock, &kmsg->msg, req->sr_msg.umsg,
4622 kmsg->uaddr, flags);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03004623 if (force_nonblock && ret == -EAGAIN)
4624 return io_setup_async_msg(req, kmsg);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004625 if (ret == -ERESTARTSYS)
4626 ret = -EINTR;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03004627
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004628 if (req->flags & REQ_F_BUFFER_SELECTED)
4629 cflags = io_put_recv_kbuf(req);
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004630 if (kmsg->iov != kmsg->fast_iov)
Jens Axboe0b416c32019-12-15 10:57:46 -07004631 kfree(kmsg->iov);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004632 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe4e88d6e2019-12-07 20:59:47 -07004633 if (ret < 0)
4634 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004635 __io_req_complete(req, ret, cflags, cs);
Jens Axboe0fa03c62019-04-19 13:34:07 -06004636 return 0;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004637}
4638
Jens Axboe229a7b62020-06-22 10:13:11 -06004639static int io_recv(struct io_kiocb *req, bool force_nonblock,
4640 struct io_comp_state *cs)
Jens Axboefddafac2020-01-04 20:19:44 -07004641{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004642 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004643 struct io_sr_msg *sr = &req->sr_msg;
4644 struct msghdr msg;
4645 void __user *buf = sr->buf;
Jens Axboefddafac2020-01-04 20:19:44 -07004646 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004647 struct iovec iov;
4648 unsigned flags;
Jens Axboebcda7ba2020-02-23 16:42:51 -07004649 int ret, cflags = 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004650
Florent Revestdba4a922020-12-04 12:36:04 +01004651 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004652 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01004653 return -ENOTSOCK;
Jens Axboefddafac2020-01-04 20:19:44 -07004654
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03004655 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004656 kbuf = io_recv_buffer_select(req, !force_nonblock);
Jens Axboebcda7ba2020-02-23 16:42:51 -07004657 if (IS_ERR(kbuf))
4658 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004659 buf = u64_to_user_ptr(kbuf->addr);
Jens Axboefddafac2020-01-04 20:19:44 -07004660 }
4661
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004662 ret = import_single_range(READ, buf, sr->len, &iov, &msg.msg_iter);
Pavel Begunkov14c32ee2020-07-16 23:28:01 +03004663 if (unlikely(ret))
4664 goto out_free;
Jens Axboefddafac2020-01-04 20:19:44 -07004665
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004666 msg.msg_name = NULL;
4667 msg.msg_control = NULL;
4668 msg.msg_controllen = 0;
4669 msg.msg_namelen = 0;
4670 msg.msg_iocb = NULL;
4671 msg.msg_flags = 0;
4672
4673 flags = req->sr_msg.msg_flags;
4674 if (flags & MSG_DONTWAIT)
4675 req->flags |= REQ_F_NOWAIT;
4676 else if (force_nonblock)
4677 flags |= MSG_DONTWAIT;
4678
4679 ret = sock_recvmsg(sock, &msg, flags);
4680 if (force_nonblock && ret == -EAGAIN)
4681 return -EAGAIN;
4682 if (ret == -ERESTARTSYS)
4683 ret = -EINTR;
Pavel Begunkov14c32ee2020-07-16 23:28:01 +03004684out_free:
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004685 if (req->flags & REQ_F_BUFFER_SELECTED)
4686 cflags = io_put_recv_kbuf(req);
Jens Axboefddafac2020-01-04 20:19:44 -07004687 if (ret < 0)
4688 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004689 __io_req_complete(req, ret, cflags, cs);
Jens Axboefddafac2020-01-04 20:19:44 -07004690 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004691}
4692
Jens Axboe3529d8c2019-12-19 18:24:38 -07004693static int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe17f2fe32019-10-17 14:42:58 -06004694{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004695 struct io_accept *accept = &req->accept;
4696
Jens Axboe17f2fe32019-10-17 14:42:58 -06004697 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
4698 return -EINVAL;
Hrvoje Zeba8042d6c2019-11-25 14:40:22 -05004699 if (sqe->ioprio || sqe->len || sqe->buf_index)
Jens Axboe17f2fe32019-10-17 14:42:58 -06004700 return -EINVAL;
4701
Jens Axboed55e5f52019-12-11 16:12:15 -07004702 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
4703 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004704 accept->flags = READ_ONCE(sqe->accept_flags);
Jens Axboe09952e32020-03-19 20:16:56 -06004705 accept->nofile = rlimit(RLIMIT_NOFILE);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004706 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004707}
Jens Axboe17f2fe32019-10-17 14:42:58 -06004708
Jens Axboe229a7b62020-06-22 10:13:11 -06004709static int io_accept(struct io_kiocb *req, bool force_nonblock,
4710 struct io_comp_state *cs)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004711{
4712 struct io_accept *accept = &req->accept;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004713 unsigned int file_flags = force_nonblock ? O_NONBLOCK : 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004714 int ret;
4715
Jiufei Xuee697dee2020-06-10 13:41:59 +08004716 if (req->file->f_flags & O_NONBLOCK)
4717 req->flags |= REQ_F_NOWAIT;
4718
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004719 ret = __sys_accept4_file(req->file, file_flags, accept->addr,
Jens Axboe09952e32020-03-19 20:16:56 -06004720 accept->addr_len, accept->flags,
4721 accept->nofile);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004722 if (ret == -EAGAIN && force_nonblock)
Jens Axboe17f2fe32019-10-17 14:42:58 -06004723 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004724 if (ret < 0) {
4725 if (ret == -ERESTARTSYS)
4726 ret = -EINTR;
Jens Axboe4e88d6e2019-12-07 20:59:47 -07004727 req_set_fail_links(req);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004728 }
Jens Axboe229a7b62020-06-22 10:13:11 -06004729 __io_req_complete(req, ret, 0, cs);
Jens Axboe17f2fe32019-10-17 14:42:58 -06004730 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004731}
4732
Jens Axboe3529d8c2019-12-19 18:24:38 -07004733static int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef499a022019-12-02 16:28:46 -07004734{
Jens Axboe3529d8c2019-12-19 18:24:38 -07004735 struct io_connect *conn = &req->connect;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004736 struct io_async_connect *io = req->async_data;
Jens Axboef499a022019-12-02 16:28:46 -07004737
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004738 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
4739 return -EINVAL;
4740 if (sqe->ioprio || sqe->len || sqe->buf_index || sqe->rw_flags)
4741 return -EINVAL;
4742
Jens Axboe3529d8c2019-12-19 18:24:38 -07004743 conn->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
4744 conn->addr_len = READ_ONCE(sqe->addr2);
4745
4746 if (!io)
4747 return 0;
4748
4749 return move_addr_to_kernel(conn->addr, conn->addr_len,
Jens Axboee8c2bc12020-08-15 18:44:09 -07004750 &io->address);
Jens Axboef499a022019-12-02 16:28:46 -07004751}
4752
Jens Axboe229a7b62020-06-22 10:13:11 -06004753static int io_connect(struct io_kiocb *req, bool force_nonblock,
4754 struct io_comp_state *cs)
Jens Axboef8e85cf2019-11-23 14:24:24 -07004755{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004756 struct io_async_connect __io, *io;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004757 unsigned file_flags;
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004758 int ret;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004759
Jens Axboee8c2bc12020-08-15 18:44:09 -07004760 if (req->async_data) {
4761 io = req->async_data;
Jens Axboef499a022019-12-02 16:28:46 -07004762 } else {
Jens Axboe3529d8c2019-12-19 18:24:38 -07004763 ret = move_addr_to_kernel(req->connect.addr,
4764 req->connect.addr_len,
Jens Axboee8c2bc12020-08-15 18:44:09 -07004765 &__io.address);
Jens Axboef499a022019-12-02 16:28:46 -07004766 if (ret)
4767 goto out;
4768 io = &__io;
4769 }
4770
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004771 file_flags = force_nonblock ? O_NONBLOCK : 0;
4772
Jens Axboee8c2bc12020-08-15 18:44:09 -07004773 ret = __sys_connect_file(req->file, &io->address,
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004774 req->connect.addr_len, file_flags);
Jens Axboe87f80d62019-12-03 11:23:54 -07004775 if ((ret == -EAGAIN || ret == -EINPROGRESS) && force_nonblock) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07004776 if (req->async_data)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07004777 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004778 if (io_alloc_async_data(req)) {
Jens Axboef499a022019-12-02 16:28:46 -07004779 ret = -ENOMEM;
4780 goto out;
4781 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07004782 io = req->async_data;
4783 memcpy(req->async_data, &__io, sizeof(__io));
Jens Axboef8e85cf2019-11-23 14:24:24 -07004784 return -EAGAIN;
Jens Axboef499a022019-12-02 16:28:46 -07004785 }
Jens Axboef8e85cf2019-11-23 14:24:24 -07004786 if (ret == -ERESTARTSYS)
4787 ret = -EINTR;
Jens Axboef499a022019-12-02 16:28:46 -07004788out:
Jens Axboe4e88d6e2019-12-07 20:59:47 -07004789 if (ret < 0)
4790 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004791 __io_req_complete(req, ret, 0, cs);
Jens Axboef8e85cf2019-11-23 14:24:24 -07004792 return 0;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004793}
YueHaibing469956e2020-03-04 15:53:52 +08004794#else /* !CONFIG_NET */
4795static int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4796{
Jens Axboef8e85cf2019-11-23 14:24:24 -07004797 return -EOPNOTSUPP;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004798}
4799
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004800static int io_sendmsg(struct io_kiocb *req, bool force_nonblock,
4801 struct io_comp_state *cs)
Jens Axboe221c5eb2019-01-17 09:41:58 -07004802{
YueHaibing469956e2020-03-04 15:53:52 +08004803 return -EOPNOTSUPP;
4804}
4805
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004806static int io_send(struct io_kiocb *req, bool force_nonblock,
4807 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004808{
4809 return -EOPNOTSUPP;
4810}
4811
4812static int io_recvmsg_prep(struct io_kiocb *req,
4813 const struct io_uring_sqe *sqe)
4814{
4815 return -EOPNOTSUPP;
4816}
4817
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004818static int io_recvmsg(struct io_kiocb *req, bool force_nonblock,
4819 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004820{
4821 return -EOPNOTSUPP;
4822}
4823
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004824static int io_recv(struct io_kiocb *req, bool force_nonblock,
4825 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004826{
4827 return -EOPNOTSUPP;
4828}
4829
4830static int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4831{
4832 return -EOPNOTSUPP;
4833}
4834
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004835static int io_accept(struct io_kiocb *req, bool force_nonblock,
4836 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004837{
4838 return -EOPNOTSUPP;
4839}
4840
4841static int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4842{
4843 return -EOPNOTSUPP;
4844}
4845
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004846static int io_connect(struct io_kiocb *req, bool force_nonblock,
4847 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004848{
4849 return -EOPNOTSUPP;
4850}
4851#endif /* CONFIG_NET */
Jens Axboe2b188cc2019-01-07 10:46:33 -07004852
Jens Axboed7718a92020-02-14 22:23:12 -07004853struct io_poll_table {
4854 struct poll_table_struct pt;
4855 struct io_kiocb *req;
4856 int error;
4857};
4858
Jens Axboed7718a92020-02-14 22:23:12 -07004859static int __io_async_wake(struct io_kiocb *req, struct io_poll_iocb *poll,
4860 __poll_t mask, task_work_func_t func)
4861{
Jens Axboeaa96bf82020-04-03 11:26:26 -06004862 int ret;
Jens Axboed7718a92020-02-14 22:23:12 -07004863
4864 /* for instances that support it check for an event match first: */
4865 if (mask && !(mask & poll->events))
4866 return 0;
4867
4868 trace_io_uring_task_add(req->ctx, req->opcode, req->user_data, mask);
4869
4870 list_del_init(&poll->wait.entry);
4871
Jens Axboed7718a92020-02-14 22:23:12 -07004872 req->result = mask;
4873 init_task_work(&req->task_work, func);
Jens Axboe6d816e02020-08-11 08:04:14 -06004874 percpu_ref_get(&req->ctx->refs);
4875
Jens Axboed7718a92020-02-14 22:23:12 -07004876 /*
Jens Axboee3aabf92020-05-18 11:04:17 -06004877 * If this fails, then the task is exiting. When a task exits, the
4878 * work gets canceled, so just cancel this request as well instead
4879 * of executing it. We can't safely execute it anyway, as we may not
4880 * have the needed state needed for it anyway.
Jens Axboed7718a92020-02-14 22:23:12 -07004881 */
Jens Axboe355fb9e2020-10-22 20:19:35 -06004882 ret = io_req_task_work_add(req);
Jens Axboeaa96bf82020-04-03 11:26:26 -06004883 if (unlikely(ret)) {
Jens Axboec2c4c832020-07-01 15:37:11 -06004884 struct task_struct *tsk;
4885
Jens Axboee3aabf92020-05-18 11:04:17 -06004886 WRITE_ONCE(poll->canceled, true);
Jens Axboeaa96bf82020-04-03 11:26:26 -06004887 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06004888 task_work_add(tsk, &req->task_work, TWA_NONE);
Jens Axboece593a62020-06-30 12:39:05 -06004889 wake_up_process(tsk);
Jens Axboeaa96bf82020-04-03 11:26:26 -06004890 }
Jens Axboed7718a92020-02-14 22:23:12 -07004891 return 1;
4892}
4893
Jens Axboe74ce6ce2020-04-13 11:09:12 -06004894static bool io_poll_rewait(struct io_kiocb *req, struct io_poll_iocb *poll)
4895 __acquires(&req->ctx->completion_lock)
4896{
4897 struct io_ring_ctx *ctx = req->ctx;
4898
4899 if (!req->result && !READ_ONCE(poll->canceled)) {
4900 struct poll_table_struct pt = { ._key = poll->events };
4901
4902 req->result = vfs_poll(req->file, &pt) & poll->events;
4903 }
4904
4905 spin_lock_irq(&ctx->completion_lock);
4906 if (!req->result && !READ_ONCE(poll->canceled)) {
4907 add_wait_queue(poll->head, &poll->wait);
4908 return true;
4909 }
4910
4911 return false;
4912}
4913
Jens Axboed4e7cd32020-08-15 11:44:50 -07004914static struct io_poll_iocb *io_poll_get_double(struct io_kiocb *req)
Jens Axboe18bceab2020-05-15 11:56:54 -06004915{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004916 /* pure poll stashes this in ->async_data, poll driven retry elsewhere */
Jens Axboed4e7cd32020-08-15 11:44:50 -07004917 if (req->opcode == IORING_OP_POLL_ADD)
Jens Axboee8c2bc12020-08-15 18:44:09 -07004918 return req->async_data;
Jens Axboed4e7cd32020-08-15 11:44:50 -07004919 return req->apoll->double_poll;
4920}
4921
4922static struct io_poll_iocb *io_poll_get_single(struct io_kiocb *req)
4923{
4924 if (req->opcode == IORING_OP_POLL_ADD)
4925 return &req->poll;
4926 return &req->apoll->poll;
4927}
4928
4929static void io_poll_remove_double(struct io_kiocb *req)
4930{
4931 struct io_poll_iocb *poll = io_poll_get_double(req);
Jens Axboe18bceab2020-05-15 11:56:54 -06004932
4933 lockdep_assert_held(&req->ctx->completion_lock);
4934
4935 if (poll && poll->head) {
4936 struct wait_queue_head *head = poll->head;
4937
4938 spin_lock(&head->lock);
4939 list_del_init(&poll->wait.entry);
4940 if (poll->wait.private)
4941 refcount_dec(&req->refs);
4942 poll->head = NULL;
4943 spin_unlock(&head->lock);
4944 }
4945}
4946
4947static void io_poll_complete(struct io_kiocb *req, __poll_t mask, int error)
4948{
4949 struct io_ring_ctx *ctx = req->ctx;
4950
Jens Axboed4e7cd32020-08-15 11:44:50 -07004951 io_poll_remove_double(req);
Jens Axboe18bceab2020-05-15 11:56:54 -06004952 req->poll.done = true;
4953 io_cqring_fill_event(req, error ? error : mangle_poll(mask));
4954 io_commit_cqring(ctx);
4955}
4956
Jens Axboe18bceab2020-05-15 11:56:54 -06004957static void io_poll_task_func(struct callback_head *cb)
4958{
4959 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
Jens Axboe6d816e02020-08-11 08:04:14 -06004960 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovdd221f462020-10-18 10:17:42 +01004961 struct io_kiocb *nxt;
Jens Axboe18bceab2020-05-15 11:56:54 -06004962
Pavel Begunkovdd221f462020-10-18 10:17:42 +01004963 if (io_poll_rewait(req, &req->poll)) {
4964 spin_unlock_irq(&ctx->completion_lock);
4965 } else {
4966 hash_del(&req->hash_node);
4967 io_poll_complete(req, req->result, 0);
4968 spin_unlock_irq(&ctx->completion_lock);
4969
4970 nxt = io_put_req_find_next(req);
4971 io_cqring_ev_posted(ctx);
4972 if (nxt)
4973 __io_req_task_submit(nxt);
4974 }
4975
Jens Axboe6d816e02020-08-11 08:04:14 -06004976 percpu_ref_put(&ctx->refs);
Jens Axboe18bceab2020-05-15 11:56:54 -06004977}
4978
4979static int io_poll_double_wake(struct wait_queue_entry *wait, unsigned mode,
4980 int sync, void *key)
4981{
4982 struct io_kiocb *req = wait->private;
Jens Axboed4e7cd32020-08-15 11:44:50 -07004983 struct io_poll_iocb *poll = io_poll_get_single(req);
Jens Axboe18bceab2020-05-15 11:56:54 -06004984 __poll_t mask = key_to_poll(key);
4985
4986 /* for instances that support it check for an event match first: */
4987 if (mask && !(mask & poll->events))
4988 return 0;
4989
Jens Axboe8706e042020-09-28 08:38:54 -06004990 list_del_init(&wait->entry);
4991
Jens Axboe807abcb2020-07-17 17:09:27 -06004992 if (poll && poll->head) {
Jens Axboe18bceab2020-05-15 11:56:54 -06004993 bool done;
4994
Jens Axboe807abcb2020-07-17 17:09:27 -06004995 spin_lock(&poll->head->lock);
4996 done = list_empty(&poll->wait.entry);
Jens Axboe18bceab2020-05-15 11:56:54 -06004997 if (!done)
Jens Axboe807abcb2020-07-17 17:09:27 -06004998 list_del_init(&poll->wait.entry);
Jens Axboed4e7cd32020-08-15 11:44:50 -07004999 /* make sure double remove sees this as being gone */
5000 wait->private = NULL;
Jens Axboe807abcb2020-07-17 17:09:27 -06005001 spin_unlock(&poll->head->lock);
Jens Axboec8b5e262020-10-25 13:53:26 -06005002 if (!done) {
5003 /* use wait func handler, so it matches the rq type */
5004 poll->wait.func(&poll->wait, mode, sync, key);
5005 }
Jens Axboe18bceab2020-05-15 11:56:54 -06005006 }
5007 refcount_dec(&req->refs);
5008 return 1;
5009}
5010
5011static void io_init_poll_iocb(struct io_poll_iocb *poll, __poll_t events,
5012 wait_queue_func_t wake_func)
5013{
5014 poll->head = NULL;
5015 poll->done = false;
5016 poll->canceled = false;
5017 poll->events = events;
5018 INIT_LIST_HEAD(&poll->wait.entry);
5019 init_waitqueue_func_entry(&poll->wait, wake_func);
5020}
5021
5022static void __io_queue_proc(struct io_poll_iocb *poll, struct io_poll_table *pt,
Jens Axboe807abcb2020-07-17 17:09:27 -06005023 struct wait_queue_head *head,
5024 struct io_poll_iocb **poll_ptr)
Jens Axboe18bceab2020-05-15 11:56:54 -06005025{
5026 struct io_kiocb *req = pt->req;
5027
5028 /*
5029 * If poll->head is already set, it's because the file being polled
5030 * uses multiple waitqueues for poll handling (eg one for read, one
5031 * for write). Setup a separate io_poll_iocb if this happens.
5032 */
5033 if (unlikely(poll->head)) {
Pavel Begunkov58852d42020-10-16 20:55:56 +01005034 struct io_poll_iocb *poll_one = poll;
5035
Jens Axboe18bceab2020-05-15 11:56:54 -06005036 /* already have a 2nd entry, fail a third attempt */
Jens Axboe807abcb2020-07-17 17:09:27 -06005037 if (*poll_ptr) {
Jens Axboe18bceab2020-05-15 11:56:54 -06005038 pt->error = -EINVAL;
5039 return;
5040 }
5041 poll = kmalloc(sizeof(*poll), GFP_ATOMIC);
5042 if (!poll) {
5043 pt->error = -ENOMEM;
5044 return;
5045 }
Pavel Begunkov58852d42020-10-16 20:55:56 +01005046 io_init_poll_iocb(poll, poll_one->events, io_poll_double_wake);
Jens Axboe18bceab2020-05-15 11:56:54 -06005047 refcount_inc(&req->refs);
5048 poll->wait.private = req;
Jens Axboe807abcb2020-07-17 17:09:27 -06005049 *poll_ptr = poll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005050 }
5051
5052 pt->error = 0;
5053 poll->head = head;
Jiufei Xuea31eb4a2020-06-17 17:53:56 +08005054
5055 if (poll->events & EPOLLEXCLUSIVE)
5056 add_wait_queue_exclusive(head, &poll->wait);
5057 else
5058 add_wait_queue(head, &poll->wait);
Jens Axboe18bceab2020-05-15 11:56:54 -06005059}
5060
5061static void io_async_queue_proc(struct file *file, struct wait_queue_head *head,
5062 struct poll_table_struct *p)
5063{
5064 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
Jens Axboe807abcb2020-07-17 17:09:27 -06005065 struct async_poll *apoll = pt->req->apoll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005066
Jens Axboe807abcb2020-07-17 17:09:27 -06005067 __io_queue_proc(&apoll->poll, pt, head, &apoll->double_poll);
Jens Axboe18bceab2020-05-15 11:56:54 -06005068}
5069
Jens Axboed7718a92020-02-14 22:23:12 -07005070static void io_async_task_func(struct callback_head *cb)
5071{
5072 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
5073 struct async_poll *apoll = req->apoll;
5074 struct io_ring_ctx *ctx = req->ctx;
5075
5076 trace_io_uring_task_run(req->ctx, req->opcode, req->user_data);
5077
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005078 if (io_poll_rewait(req, &apoll->poll)) {
Jens Axboed7718a92020-02-14 22:23:12 -07005079 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe6d816e02020-08-11 08:04:14 -06005080 percpu_ref_put(&ctx->refs);
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005081 return;
Jens Axboed7718a92020-02-14 22:23:12 -07005082 }
5083
Jens Axboe31067252020-05-17 17:43:31 -06005084 /* If req is still hashed, it cannot have been canceled. Don't check. */
Pavel Begunkov0be0b0e2020-06-30 15:20:42 +03005085 if (hash_hashed(&req->hash_node))
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005086 hash_del(&req->hash_node);
Jens Axboe2bae0472020-04-13 11:16:34 -06005087
Jens Axboed4e7cd32020-08-15 11:44:50 -07005088 io_poll_remove_double(req);
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005089 spin_unlock_irq(&ctx->completion_lock);
5090
Pavel Begunkov0be0b0e2020-06-30 15:20:42 +03005091 if (!READ_ONCE(apoll->poll.canceled))
5092 __io_req_task_submit(req);
5093 else
5094 __io_req_task_cancel(req, -ECANCELED);
Dan Carpenteraa340842020-07-08 21:47:11 +03005095
Jens Axboe6d816e02020-08-11 08:04:14 -06005096 percpu_ref_put(&ctx->refs);
Jens Axboe807abcb2020-07-17 17:09:27 -06005097 kfree(apoll->double_poll);
Jens Axboe31067252020-05-17 17:43:31 -06005098 kfree(apoll);
Jens Axboed7718a92020-02-14 22:23:12 -07005099}
5100
5101static int io_async_wake(struct wait_queue_entry *wait, unsigned mode, int sync,
5102 void *key)
5103{
5104 struct io_kiocb *req = wait->private;
5105 struct io_poll_iocb *poll = &req->apoll->poll;
5106
5107 trace_io_uring_poll_wake(req->ctx, req->opcode, req->user_data,
5108 key_to_poll(key));
5109
5110 return __io_async_wake(req, poll, key_to_poll(key), io_async_task_func);
5111}
5112
5113static void io_poll_req_insert(struct io_kiocb *req)
5114{
5115 struct io_ring_ctx *ctx = req->ctx;
5116 struct hlist_head *list;
5117
5118 list = &ctx->cancel_hash[hash_long(req->user_data, ctx->cancel_hash_bits)];
5119 hlist_add_head(&req->hash_node, list);
5120}
5121
5122static __poll_t __io_arm_poll_handler(struct io_kiocb *req,
5123 struct io_poll_iocb *poll,
5124 struct io_poll_table *ipt, __poll_t mask,
5125 wait_queue_func_t wake_func)
5126 __acquires(&ctx->completion_lock)
5127{
5128 struct io_ring_ctx *ctx = req->ctx;
5129 bool cancel = false;
5130
Pavel Begunkov4d52f332020-10-18 10:17:43 +01005131 INIT_HLIST_NODE(&req->hash_node);
Jens Axboe18bceab2020-05-15 11:56:54 -06005132 io_init_poll_iocb(poll, mask, wake_func);
Pavel Begunkovb90cd192020-06-21 13:09:52 +03005133 poll->file = req->file;
Jens Axboe18bceab2020-05-15 11:56:54 -06005134 poll->wait.private = req;
Jens Axboed7718a92020-02-14 22:23:12 -07005135
5136 ipt->pt._key = mask;
5137 ipt->req = req;
5138 ipt->error = -EINVAL;
5139
Jens Axboed7718a92020-02-14 22:23:12 -07005140 mask = vfs_poll(req->file, &ipt->pt) & poll->events;
5141
5142 spin_lock_irq(&ctx->completion_lock);
5143 if (likely(poll->head)) {
5144 spin_lock(&poll->head->lock);
5145 if (unlikely(list_empty(&poll->wait.entry))) {
5146 if (ipt->error)
5147 cancel = true;
5148 ipt->error = 0;
5149 mask = 0;
5150 }
5151 if (mask || ipt->error)
5152 list_del_init(&poll->wait.entry);
5153 else if (cancel)
5154 WRITE_ONCE(poll->canceled, true);
5155 else if (!poll->done) /* actually waiting for an event */
5156 io_poll_req_insert(req);
5157 spin_unlock(&poll->head->lock);
5158 }
5159
5160 return mask;
5161}
5162
5163static bool io_arm_poll_handler(struct io_kiocb *req)
5164{
5165 const struct io_op_def *def = &io_op_defs[req->opcode];
5166 struct io_ring_ctx *ctx = req->ctx;
5167 struct async_poll *apoll;
5168 struct io_poll_table ipt;
5169 __poll_t mask, ret;
Jens Axboe9dab14b2020-08-25 12:27:50 -06005170 int rw;
Jens Axboed7718a92020-02-14 22:23:12 -07005171
5172 if (!req->file || !file_can_poll(req->file))
5173 return false;
Pavel Begunkov24c74672020-06-21 13:09:51 +03005174 if (req->flags & REQ_F_POLLED)
Jens Axboed7718a92020-02-14 22:23:12 -07005175 return false;
Jens Axboe9dab14b2020-08-25 12:27:50 -06005176 if (def->pollin)
5177 rw = READ;
5178 else if (def->pollout)
5179 rw = WRITE;
5180 else
5181 return false;
5182 /* if we can't nonblock try, then no point in arming a poll handler */
5183 if (!io_file_supports_async(req->file, rw))
Jens Axboed7718a92020-02-14 22:23:12 -07005184 return false;
5185
5186 apoll = kmalloc(sizeof(*apoll), GFP_ATOMIC);
5187 if (unlikely(!apoll))
5188 return false;
Jens Axboe807abcb2020-07-17 17:09:27 -06005189 apoll->double_poll = NULL;
Jens Axboed7718a92020-02-14 22:23:12 -07005190
5191 req->flags |= REQ_F_POLLED;
Jens Axboed7718a92020-02-14 22:23:12 -07005192 req->apoll = apoll;
Jens Axboed7718a92020-02-14 22:23:12 -07005193
Nathan Chancellor8755d972020-03-02 16:01:19 -07005194 mask = 0;
Jens Axboed7718a92020-02-14 22:23:12 -07005195 if (def->pollin)
Nathan Chancellor8755d972020-03-02 16:01:19 -07005196 mask |= POLLIN | POLLRDNORM;
Jens Axboed7718a92020-02-14 22:23:12 -07005197 if (def->pollout)
5198 mask |= POLLOUT | POLLWRNORM;
Luke Hsiao901341b2020-08-21 21:41:05 -07005199
5200 /* If reading from MSG_ERRQUEUE using recvmsg, ignore POLLIN */
5201 if ((req->opcode == IORING_OP_RECVMSG) &&
5202 (req->sr_msg.msg_flags & MSG_ERRQUEUE))
5203 mask &= ~POLLIN;
5204
Jens Axboed7718a92020-02-14 22:23:12 -07005205 mask |= POLLERR | POLLPRI;
5206
5207 ipt.pt._qproc = io_async_queue_proc;
5208
5209 ret = __io_arm_poll_handler(req, &apoll->poll, &ipt, mask,
5210 io_async_wake);
Jens Axboea36da652020-08-11 09:50:19 -06005211 if (ret || ipt.error) {
Jens Axboed4e7cd32020-08-15 11:44:50 -07005212 io_poll_remove_double(req);
Jens Axboed7718a92020-02-14 22:23:12 -07005213 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe807abcb2020-07-17 17:09:27 -06005214 kfree(apoll->double_poll);
Jens Axboed7718a92020-02-14 22:23:12 -07005215 kfree(apoll);
5216 return false;
5217 }
5218 spin_unlock_irq(&ctx->completion_lock);
5219 trace_io_uring_poll_arm(ctx, req->opcode, req->user_data, mask,
5220 apoll->poll.events);
5221 return true;
5222}
5223
5224static bool __io_poll_remove_one(struct io_kiocb *req,
5225 struct io_poll_iocb *poll)
5226{
Jens Axboeb41e9852020-02-17 09:52:41 -07005227 bool do_complete = false;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005228
5229 spin_lock(&poll->head->lock);
5230 WRITE_ONCE(poll->canceled, true);
Jens Axboe392edb42019-12-09 17:52:20 -07005231 if (!list_empty(&poll->wait.entry)) {
5232 list_del_init(&poll->wait.entry);
Jens Axboeb41e9852020-02-17 09:52:41 -07005233 do_complete = true;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005234 }
5235 spin_unlock(&poll->head->lock);
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005236 hash_del(&req->hash_node);
Jens Axboed7718a92020-02-14 22:23:12 -07005237 return do_complete;
5238}
5239
5240static bool io_poll_remove_one(struct io_kiocb *req)
5241{
5242 bool do_complete;
5243
Jens Axboed4e7cd32020-08-15 11:44:50 -07005244 io_poll_remove_double(req);
5245
Jens Axboed7718a92020-02-14 22:23:12 -07005246 if (req->opcode == IORING_OP_POLL_ADD) {
5247 do_complete = __io_poll_remove_one(req, &req->poll);
5248 } else {
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005249 struct async_poll *apoll = req->apoll;
5250
Jens Axboed7718a92020-02-14 22:23:12 -07005251 /* non-poll requests have submit ref still */
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005252 do_complete = __io_poll_remove_one(req, &apoll->poll);
5253 if (do_complete) {
Jens Axboed7718a92020-02-14 22:23:12 -07005254 io_put_req(req);
Jens Axboe807abcb2020-07-17 17:09:27 -06005255 kfree(apoll->double_poll);
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005256 kfree(apoll);
5257 }
Xiaoguang Wangb1f573b2020-04-12 14:50:54 +08005258 }
5259
Jens Axboeb41e9852020-02-17 09:52:41 -07005260 if (do_complete) {
5261 io_cqring_fill_event(req, -ECANCELED);
5262 io_commit_cqring(req->ctx);
Jens Axboef254ac02020-08-12 17:33:30 -06005263 req_set_fail_links(req);
Pavel Begunkov216578e2020-10-13 09:44:00 +01005264 io_put_req_deferred(req, 1);
Jens Axboeb41e9852020-02-17 09:52:41 -07005265 }
5266
5267 return do_complete;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005268}
5269
Jens Axboe76e1b642020-09-26 15:05:03 -06005270/*
5271 * Returns true if we found and killed one or more poll requests
5272 */
5273static bool io_poll_remove_all(struct io_ring_ctx *ctx, struct task_struct *tsk)
Jens Axboe221c5eb2019-01-17 09:41:58 -07005274{
Jens Axboe78076bb2019-12-04 19:56:40 -07005275 struct hlist_node *tmp;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005276 struct io_kiocb *req;
Jens Axboe8e2e1fa2020-04-13 17:05:14 -06005277 int posted = 0, i;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005278
5279 spin_lock_irq(&ctx->completion_lock);
Jens Axboe78076bb2019-12-04 19:56:40 -07005280 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
5281 struct hlist_head *list;
5282
5283 list = &ctx->cancel_hash[i];
Jens Axboef3606e32020-09-22 08:18:24 -06005284 hlist_for_each_entry_safe(req, tmp, list, hash_node) {
5285 if (io_task_match(req, tsk))
5286 posted += io_poll_remove_one(req);
5287 }
Jens Axboe221c5eb2019-01-17 09:41:58 -07005288 }
5289 spin_unlock_irq(&ctx->completion_lock);
Jens Axboeb41e9852020-02-17 09:52:41 -07005290
Jens Axboe8e2e1fa2020-04-13 17:05:14 -06005291 if (posted)
5292 io_cqring_ev_posted(ctx);
Jens Axboe76e1b642020-09-26 15:05:03 -06005293
5294 return posted != 0;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005295}
5296
Jens Axboe47f46762019-11-09 17:43:02 -07005297static int io_poll_cancel(struct io_ring_ctx *ctx, __u64 sqe_addr)
5298{
Jens Axboe78076bb2019-12-04 19:56:40 -07005299 struct hlist_head *list;
Jens Axboe47f46762019-11-09 17:43:02 -07005300 struct io_kiocb *req;
5301
Jens Axboe78076bb2019-12-04 19:56:40 -07005302 list = &ctx->cancel_hash[hash_long(sqe_addr, ctx->cancel_hash_bits)];
5303 hlist_for_each_entry(req, list, hash_node) {
Jens Axboeb41e9852020-02-17 09:52:41 -07005304 if (sqe_addr != req->user_data)
5305 continue;
5306 if (io_poll_remove_one(req))
Jens Axboeeac406c2019-11-14 12:09:58 -07005307 return 0;
Jens Axboeb41e9852020-02-17 09:52:41 -07005308 return -EALREADY;
Jens Axboe47f46762019-11-09 17:43:02 -07005309 }
5310
5311 return -ENOENT;
5312}
5313
Jens Axboe3529d8c2019-12-19 18:24:38 -07005314static int io_poll_remove_prep(struct io_kiocb *req,
5315 const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07005316{
Jens Axboe221c5eb2019-01-17 09:41:58 -07005317 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5318 return -EINVAL;
5319 if (sqe->ioprio || sqe->off || sqe->len || sqe->buf_index ||
5320 sqe->poll_events)
5321 return -EINVAL;
5322
Jens Axboe0969e782019-12-17 18:40:57 -07005323 req->poll.addr = READ_ONCE(sqe->addr);
Jens Axboe0969e782019-12-17 18:40:57 -07005324 return 0;
5325}
5326
5327/*
5328 * Find a running poll command that matches one specified in sqe->addr,
5329 * and remove it if found.
5330 */
5331static int io_poll_remove(struct io_kiocb *req)
5332{
5333 struct io_ring_ctx *ctx = req->ctx;
5334 u64 addr;
5335 int ret;
5336
Jens Axboe0969e782019-12-17 18:40:57 -07005337 addr = req->poll.addr;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005338 spin_lock_irq(&ctx->completion_lock);
Jens Axboe0969e782019-12-17 18:40:57 -07005339 ret = io_poll_cancel(ctx, addr);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005340 spin_unlock_irq(&ctx->completion_lock);
5341
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005342 if (ret < 0)
5343 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06005344 io_req_complete(req, ret);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005345 return 0;
5346}
5347
Jens Axboe221c5eb2019-01-17 09:41:58 -07005348static int io_poll_wake(struct wait_queue_entry *wait, unsigned mode, int sync,
5349 void *key)
5350{
Jens Axboec2f2eb72020-02-10 09:07:05 -07005351 struct io_kiocb *req = wait->private;
5352 struct io_poll_iocb *poll = &req->poll;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005353
Jens Axboed7718a92020-02-14 22:23:12 -07005354 return __io_async_wake(req, poll, key_to_poll(key), io_poll_task_func);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005355}
5356
Jens Axboe221c5eb2019-01-17 09:41:58 -07005357static void io_poll_queue_proc(struct file *file, struct wait_queue_head *head,
5358 struct poll_table_struct *p)
5359{
5360 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
5361
Jens Axboee8c2bc12020-08-15 18:44:09 -07005362 __io_queue_proc(&pt->req->poll, pt, head, (struct io_poll_iocb **) &pt->req->async_data);
Jens Axboeeac406c2019-11-14 12:09:58 -07005363}
5364
Jens Axboe3529d8c2019-12-19 18:24:38 -07005365static int io_poll_add_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07005366{
5367 struct io_poll_iocb *poll = &req->poll;
Jiufei Xue5769a352020-06-17 17:53:55 +08005368 u32 events;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005369
5370 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5371 return -EINVAL;
5372 if (sqe->addr || sqe->ioprio || sqe->off || sqe->len || sqe->buf_index)
5373 return -EINVAL;
5374
Jiufei Xue5769a352020-06-17 17:53:55 +08005375 events = READ_ONCE(sqe->poll32_events);
5376#ifdef __BIG_ENDIAN
5377 events = swahw32(events);
5378#endif
Jiufei Xuea31eb4a2020-06-17 17:53:56 +08005379 poll->events = demangle_poll(events) | EPOLLERR | EPOLLHUP |
5380 (events & EPOLLEXCLUSIVE);
Jens Axboe0969e782019-12-17 18:40:57 -07005381 return 0;
5382}
5383
Pavel Begunkov014db002020-03-03 21:33:12 +03005384static int io_poll_add(struct io_kiocb *req)
Jens Axboe0969e782019-12-17 18:40:57 -07005385{
5386 struct io_poll_iocb *poll = &req->poll;
5387 struct io_ring_ctx *ctx = req->ctx;
5388 struct io_poll_table ipt;
Jens Axboe0969e782019-12-17 18:40:57 -07005389 __poll_t mask;
Jens Axboe0969e782019-12-17 18:40:57 -07005390
Jens Axboed7718a92020-02-14 22:23:12 -07005391 ipt.pt._qproc = io_poll_queue_proc;
Jens Axboe36703242019-07-25 10:20:18 -06005392
Jens Axboed7718a92020-02-14 22:23:12 -07005393 mask = __io_arm_poll_handler(req, &req->poll, &ipt, poll->events,
5394 io_poll_wake);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005395
Jens Axboe8c838782019-03-12 15:48:16 -06005396 if (mask) { /* no async, we'd stolen it */
Jens Axboe8c838782019-03-12 15:48:16 -06005397 ipt.error = 0;
Jens Axboeb0dd8a42019-11-18 12:14:54 -07005398 io_poll_complete(req, mask, 0);
Jens Axboe8c838782019-03-12 15:48:16 -06005399 }
Jens Axboe221c5eb2019-01-17 09:41:58 -07005400 spin_unlock_irq(&ctx->completion_lock);
5401
Jens Axboe8c838782019-03-12 15:48:16 -06005402 if (mask) {
5403 io_cqring_ev_posted(ctx);
Pavel Begunkov014db002020-03-03 21:33:12 +03005404 io_put_req(req);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005405 }
Jens Axboe8c838782019-03-12 15:48:16 -06005406 return ipt.error;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005407}
5408
Jens Axboe5262f562019-09-17 12:26:57 -06005409static enum hrtimer_restart io_timeout_fn(struct hrtimer *timer)
5410{
Jens Axboead8a48a2019-11-15 08:49:11 -07005411 struct io_timeout_data *data = container_of(timer,
5412 struct io_timeout_data, timer);
5413 struct io_kiocb *req = data->req;
5414 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5262f562019-09-17 12:26:57 -06005415 unsigned long flags;
5416
Jens Axboe5262f562019-09-17 12:26:57 -06005417 spin_lock_irqsave(&ctx->completion_lock, flags);
Pavel Begunkova71976f2020-10-10 18:34:11 +01005418 list_del_init(&req->timeout.list);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03005419 atomic_set(&req->ctx->cq_timeouts,
5420 atomic_read(&req->ctx->cq_timeouts) + 1);
5421
Jens Axboe78e19bb2019-11-06 15:21:34 -07005422 io_cqring_fill_event(req, -ETIME);
Jens Axboe5262f562019-09-17 12:26:57 -06005423 io_commit_cqring(ctx);
5424 spin_unlock_irqrestore(&ctx->completion_lock, flags);
5425
5426 io_cqring_ev_posted(ctx);
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005427 req_set_fail_links(req);
Jens Axboe5262f562019-09-17 12:26:57 -06005428 io_put_req(req);
5429 return HRTIMER_NORESTART;
5430}
5431
Jens Axboef254ac02020-08-12 17:33:30 -06005432static int __io_timeout_cancel(struct io_kiocb *req)
Jens Axboe47f46762019-11-09 17:43:02 -07005433{
Jens Axboee8c2bc12020-08-15 18:44:09 -07005434 struct io_timeout_data *io = req->async_data;
Jens Axboef254ac02020-08-12 17:33:30 -06005435 int ret;
Jens Axboe47f46762019-11-09 17:43:02 -07005436
Jens Axboee8c2bc12020-08-15 18:44:09 -07005437 ret = hrtimer_try_to_cancel(&io->timer);
Jens Axboe47f46762019-11-09 17:43:02 -07005438 if (ret == -1)
5439 return -EALREADY;
Pavel Begunkova71976f2020-10-10 18:34:11 +01005440 list_del_init(&req->timeout.list);
Jens Axboe47f46762019-11-09 17:43:02 -07005441
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005442 req_set_fail_links(req);
Jens Axboe47f46762019-11-09 17:43:02 -07005443 io_cqring_fill_event(req, -ECANCELED);
Pavel Begunkov216578e2020-10-13 09:44:00 +01005444 io_put_req_deferred(req, 1);
Jens Axboe47f46762019-11-09 17:43:02 -07005445 return 0;
5446}
5447
Jens Axboef254ac02020-08-12 17:33:30 -06005448static int io_timeout_cancel(struct io_ring_ctx *ctx, __u64 user_data)
5449{
5450 struct io_kiocb *req;
5451 int ret = -ENOENT;
5452
5453 list_for_each_entry(req, &ctx->timeout_list, timeout.list) {
5454 if (user_data == req->user_data) {
5455 ret = 0;
5456 break;
5457 }
5458 }
5459
5460 if (ret == -ENOENT)
5461 return ret;
5462
5463 return __io_timeout_cancel(req);
5464}
5465
Jens Axboe3529d8c2019-12-19 18:24:38 -07005466static int io_timeout_remove_prep(struct io_kiocb *req,
5467 const struct io_uring_sqe *sqe)
Jens Axboeb29472e2019-12-17 18:50:29 -07005468{
Jens Axboeb29472e2019-12-17 18:50:29 -07005469 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5470 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06005471 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
5472 return -EINVAL;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +01005473 if (sqe->ioprio || sqe->buf_index || sqe->len || sqe->timeout_flags)
Jens Axboeb29472e2019-12-17 18:50:29 -07005474 return -EINVAL;
5475
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +01005476 req->timeout_rem.addr = READ_ONCE(sqe->addr);
Jens Axboeb29472e2019-12-17 18:50:29 -07005477 return 0;
5478}
5479
Jens Axboe11365042019-10-16 09:08:32 -06005480/*
5481 * Remove or update an existing timeout command
5482 */
Jens Axboefc4df992019-12-10 14:38:45 -07005483static int io_timeout_remove(struct io_kiocb *req)
Jens Axboe11365042019-10-16 09:08:32 -06005484{
5485 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe47f46762019-11-09 17:43:02 -07005486 int ret;
Jens Axboe11365042019-10-16 09:08:32 -06005487
Jens Axboe11365042019-10-16 09:08:32 -06005488 spin_lock_irq(&ctx->completion_lock);
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +01005489 ret = io_timeout_cancel(ctx, req->timeout_rem.addr);
Jens Axboe11365042019-10-16 09:08:32 -06005490
Jens Axboe47f46762019-11-09 17:43:02 -07005491 io_cqring_fill_event(req, ret);
Jens Axboe11365042019-10-16 09:08:32 -06005492 io_commit_cqring(ctx);
5493 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe5262f562019-09-17 12:26:57 -06005494 io_cqring_ev_posted(ctx);
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005495 if (ret < 0)
5496 req_set_fail_links(req);
Jackie Liuec9c02a2019-11-08 23:50:36 +08005497 io_put_req(req);
Jens Axboe11365042019-10-16 09:08:32 -06005498 return 0;
Jens Axboe5262f562019-09-17 12:26:57 -06005499}
5500
Jens Axboe3529d8c2019-12-19 18:24:38 -07005501static int io_timeout_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe,
Jens Axboe2d283902019-12-04 11:08:05 -07005502 bool is_timeout_link)
Jens Axboe5262f562019-09-17 12:26:57 -06005503{
Jens Axboead8a48a2019-11-15 08:49:11 -07005504 struct io_timeout_data *data;
Jens Axboea41525a2019-10-15 16:48:15 -06005505 unsigned flags;
Pavel Begunkov56080b02020-05-26 20:34:04 +03005506 u32 off = READ_ONCE(sqe->off);
Jens Axboe5262f562019-09-17 12:26:57 -06005507
Jens Axboead8a48a2019-11-15 08:49:11 -07005508 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe5262f562019-09-17 12:26:57 -06005509 return -EINVAL;
Jens Axboead8a48a2019-11-15 08:49:11 -07005510 if (sqe->ioprio || sqe->buf_index || sqe->len != 1)
Jens Axboea41525a2019-10-15 16:48:15 -06005511 return -EINVAL;
Pavel Begunkov56080b02020-05-26 20:34:04 +03005512 if (off && is_timeout_link)
Jens Axboe2d283902019-12-04 11:08:05 -07005513 return -EINVAL;
Jens Axboea41525a2019-10-15 16:48:15 -06005514 flags = READ_ONCE(sqe->timeout_flags);
5515 if (flags & ~IORING_TIMEOUT_ABS)
Jens Axboe5262f562019-09-17 12:26:57 -06005516 return -EINVAL;
Arnd Bergmannbdf20072019-10-01 09:53:29 -06005517
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005518 req->timeout.off = off;
Jens Axboe26a61672019-12-20 09:02:01 -07005519
Jens Axboee8c2bc12020-08-15 18:44:09 -07005520 if (!req->async_data && io_alloc_async_data(req))
Jens Axboe26a61672019-12-20 09:02:01 -07005521 return -ENOMEM;
5522
Jens Axboee8c2bc12020-08-15 18:44:09 -07005523 data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07005524 data->req = req;
Jens Axboead8a48a2019-11-15 08:49:11 -07005525
5526 if (get_timespec64(&data->ts, u64_to_user_ptr(sqe->addr)))
Jens Axboe5262f562019-09-17 12:26:57 -06005527 return -EFAULT;
5528
Jens Axboe11365042019-10-16 09:08:32 -06005529 if (flags & IORING_TIMEOUT_ABS)
Jens Axboead8a48a2019-11-15 08:49:11 -07005530 data->mode = HRTIMER_MODE_ABS;
Jens Axboe11365042019-10-16 09:08:32 -06005531 else
Jens Axboead8a48a2019-11-15 08:49:11 -07005532 data->mode = HRTIMER_MODE_REL;
Jens Axboe11365042019-10-16 09:08:32 -06005533
Jens Axboead8a48a2019-11-15 08:49:11 -07005534 hrtimer_init(&data->timer, CLOCK_MONOTONIC, data->mode);
5535 return 0;
5536}
5537
Jens Axboefc4df992019-12-10 14:38:45 -07005538static int io_timeout(struct io_kiocb *req)
Jens Axboead8a48a2019-11-15 08:49:11 -07005539{
Jens Axboead8a48a2019-11-15 08:49:11 -07005540 struct io_ring_ctx *ctx = req->ctx;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005541 struct io_timeout_data *data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07005542 struct list_head *entry;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005543 u32 tail, off = req->timeout.off;
Jens Axboead8a48a2019-11-15 08:49:11 -07005544
Pavel Begunkov733f5c92020-05-26 20:34:03 +03005545 spin_lock_irq(&ctx->completion_lock);
Jens Axboe93bd25b2019-11-11 23:34:31 -07005546
Jens Axboe5262f562019-09-17 12:26:57 -06005547 /*
5548 * sqe->off holds how many events that need to occur for this
Jens Axboe93bd25b2019-11-11 23:34:31 -07005549 * timeout event to be satisfied. If it isn't set, then this is
5550 * a pure timeout request, sequence isn't used.
Jens Axboe5262f562019-09-17 12:26:57 -06005551 */
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03005552 if (io_is_timeout_noseq(req)) {
Jens Axboe93bd25b2019-11-11 23:34:31 -07005553 entry = ctx->timeout_list.prev;
5554 goto add;
5555 }
Jens Axboe5262f562019-09-17 12:26:57 -06005556
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005557 tail = ctx->cached_cq_tail - atomic_read(&ctx->cq_timeouts);
5558 req->timeout.target_seq = tail + off;
Jens Axboe5262f562019-09-17 12:26:57 -06005559
5560 /*
5561 * Insertion sort, ensuring the first entry in the list is always
5562 * the one we need first.
5563 */
Jens Axboe5262f562019-09-17 12:26:57 -06005564 list_for_each_prev(entry, &ctx->timeout_list) {
Pavel Begunkov135fcde2020-07-13 23:37:12 +03005565 struct io_kiocb *nxt = list_entry(entry, struct io_kiocb,
5566 timeout.list);
Jens Axboe5262f562019-09-17 12:26:57 -06005567
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03005568 if (io_is_timeout_noseq(nxt))
Jens Axboe93bd25b2019-11-11 23:34:31 -07005569 continue;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005570 /* nxt.seq is behind @tail, otherwise would've been completed */
5571 if (off >= nxt->timeout.target_seq - tail)
Jens Axboe5262f562019-09-17 12:26:57 -06005572 break;
5573 }
Jens Axboe93bd25b2019-11-11 23:34:31 -07005574add:
Pavel Begunkov135fcde2020-07-13 23:37:12 +03005575 list_add(&req->timeout.list, entry);
Jens Axboead8a48a2019-11-15 08:49:11 -07005576 data->timer.function = io_timeout_fn;
5577 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts), data->mode);
Jens Axboe842f9612019-10-29 12:34:10 -06005578 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe5262f562019-09-17 12:26:57 -06005579 return 0;
5580}
5581
Jens Axboe62755e32019-10-28 21:49:21 -06005582static bool io_cancel_cb(struct io_wq_work *work, void *data)
Jens Axboede0617e2019-04-06 21:51:27 -06005583{
Jens Axboe62755e32019-10-28 21:49:21 -06005584 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Jens Axboede0617e2019-04-06 21:51:27 -06005585
Jens Axboe62755e32019-10-28 21:49:21 -06005586 return req->user_data == (unsigned long) data;
5587}
5588
Jens Axboee977d6d2019-11-05 12:39:45 -07005589static int io_async_cancel_one(struct io_ring_ctx *ctx, void *sqe_addr)
Jens Axboe62755e32019-10-28 21:49:21 -06005590{
Jens Axboe62755e32019-10-28 21:49:21 -06005591 enum io_wq_cancel cancel_ret;
Jens Axboe62755e32019-10-28 21:49:21 -06005592 int ret = 0;
5593
Pavel Begunkov4f26bda2020-06-15 10:24:03 +03005594 cancel_ret = io_wq_cancel_cb(ctx->io_wq, io_cancel_cb, sqe_addr, false);
Jens Axboe62755e32019-10-28 21:49:21 -06005595 switch (cancel_ret) {
5596 case IO_WQ_CANCEL_OK:
5597 ret = 0;
5598 break;
5599 case IO_WQ_CANCEL_RUNNING:
5600 ret = -EALREADY;
5601 break;
5602 case IO_WQ_CANCEL_NOTFOUND:
5603 ret = -ENOENT;
5604 break;
5605 }
5606
Jens Axboee977d6d2019-11-05 12:39:45 -07005607 return ret;
5608}
5609
Jens Axboe47f46762019-11-09 17:43:02 -07005610static void io_async_find_and_cancel(struct io_ring_ctx *ctx,
5611 struct io_kiocb *req, __u64 sqe_addr,
Pavel Begunkov014db002020-03-03 21:33:12 +03005612 int success_ret)
Jens Axboe47f46762019-11-09 17:43:02 -07005613{
5614 unsigned long flags;
5615 int ret;
5616
5617 ret = io_async_cancel_one(ctx, (void *) (unsigned long) sqe_addr);
5618 if (ret != -ENOENT) {
5619 spin_lock_irqsave(&ctx->completion_lock, flags);
5620 goto done;
5621 }
5622
5623 spin_lock_irqsave(&ctx->completion_lock, flags);
5624 ret = io_timeout_cancel(ctx, sqe_addr);
5625 if (ret != -ENOENT)
5626 goto done;
5627 ret = io_poll_cancel(ctx, sqe_addr);
5628done:
Jens Axboeb0dd8a42019-11-18 12:14:54 -07005629 if (!ret)
5630 ret = success_ret;
Jens Axboe47f46762019-11-09 17:43:02 -07005631 io_cqring_fill_event(req, ret);
5632 io_commit_cqring(ctx);
5633 spin_unlock_irqrestore(&ctx->completion_lock, flags);
5634 io_cqring_ev_posted(ctx);
5635
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005636 if (ret < 0)
5637 req_set_fail_links(req);
Pavel Begunkov014db002020-03-03 21:33:12 +03005638 io_put_req(req);
Jens Axboe47f46762019-11-09 17:43:02 -07005639}
5640
Jens Axboe3529d8c2019-12-19 18:24:38 -07005641static int io_async_cancel_prep(struct io_kiocb *req,
5642 const struct io_uring_sqe *sqe)
Jens Axboee977d6d2019-11-05 12:39:45 -07005643{
Jens Axboefbf23842019-12-17 18:45:56 -07005644 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboee977d6d2019-11-05 12:39:45 -07005645 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06005646 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
5647 return -EINVAL;
5648 if (sqe->ioprio || sqe->off || sqe->len || sqe->cancel_flags)
Jens Axboee977d6d2019-11-05 12:39:45 -07005649 return -EINVAL;
5650
Jens Axboefbf23842019-12-17 18:45:56 -07005651 req->cancel.addr = READ_ONCE(sqe->addr);
5652 return 0;
5653}
5654
Pavel Begunkov014db002020-03-03 21:33:12 +03005655static int io_async_cancel(struct io_kiocb *req)
Jens Axboefbf23842019-12-17 18:45:56 -07005656{
5657 struct io_ring_ctx *ctx = req->ctx;
Jens Axboefbf23842019-12-17 18:45:56 -07005658
Pavel Begunkov014db002020-03-03 21:33:12 +03005659 io_async_find_and_cancel(ctx, req, req->cancel.addr, 0);
Jens Axboe62755e32019-10-28 21:49:21 -06005660 return 0;
5661}
5662
Jens Axboe05f3fb32019-12-09 11:22:50 -07005663static int io_files_update_prep(struct io_kiocb *req,
5664 const struct io_uring_sqe *sqe)
5665{
Jens Axboe6ca56f82020-09-18 16:51:19 -06005666 if (unlikely(req->ctx->flags & IORING_SETUP_SQPOLL))
5667 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06005668 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
5669 return -EINVAL;
5670 if (sqe->ioprio || sqe->rw_flags)
Jens Axboe05f3fb32019-12-09 11:22:50 -07005671 return -EINVAL;
5672
5673 req->files_update.offset = READ_ONCE(sqe->off);
5674 req->files_update.nr_args = READ_ONCE(sqe->len);
5675 if (!req->files_update.nr_args)
5676 return -EINVAL;
5677 req->files_update.arg = READ_ONCE(sqe->addr);
5678 return 0;
5679}
5680
Jens Axboe229a7b62020-06-22 10:13:11 -06005681static int io_files_update(struct io_kiocb *req, bool force_nonblock,
5682 struct io_comp_state *cs)
Jens Axboe05f3fb32019-12-09 11:22:50 -07005683{
5684 struct io_ring_ctx *ctx = req->ctx;
5685 struct io_uring_files_update up;
5686 int ret;
5687
Jens Axboef86cd202020-01-29 13:46:44 -07005688 if (force_nonblock)
Jens Axboe05f3fb32019-12-09 11:22:50 -07005689 return -EAGAIN;
Jens Axboe05f3fb32019-12-09 11:22:50 -07005690
5691 up.offset = req->files_update.offset;
5692 up.fds = req->files_update.arg;
5693
5694 mutex_lock(&ctx->uring_lock);
5695 ret = __io_sqe_files_update(ctx, &up, req->files_update.nr_args);
5696 mutex_unlock(&ctx->uring_lock);
5697
5698 if (ret < 0)
5699 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06005700 __io_req_complete(req, ret, 0, cs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07005701 return 0;
5702}
5703
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005704static int io_req_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07005705{
Jens Axboed625c6e2019-12-17 19:53:05 -07005706 switch (req->opcode) {
Jens Axboee7815732019-12-17 19:45:06 -07005707 case IORING_OP_NOP:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005708 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07005709 case IORING_OP_READV:
5710 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005711 case IORING_OP_READ:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005712 return io_read_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07005713 case IORING_OP_WRITEV:
5714 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005715 case IORING_OP_WRITE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005716 return io_write_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07005717 case IORING_OP_POLL_ADD:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005718 return io_poll_add_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07005719 case IORING_OP_POLL_REMOVE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005720 return io_poll_remove_prep(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005721 case IORING_OP_FSYNC:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005722 return io_prep_fsync(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005723 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005724 return io_prep_sfr(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07005725 case IORING_OP_SENDMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07005726 case IORING_OP_SEND:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005727 return io_sendmsg_prep(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07005728 case IORING_OP_RECVMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07005729 case IORING_OP_RECV:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005730 return io_recvmsg_prep(req, sqe);
Jens Axboef499a022019-12-02 16:28:46 -07005731 case IORING_OP_CONNECT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005732 return io_connect_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07005733 case IORING_OP_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005734 return io_timeout_prep(req, sqe, false);
Jens Axboeb29472e2019-12-17 18:50:29 -07005735 case IORING_OP_TIMEOUT_REMOVE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005736 return io_timeout_remove_prep(req, sqe);
Jens Axboefbf23842019-12-17 18:45:56 -07005737 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005738 return io_async_cancel_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07005739 case IORING_OP_LINK_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005740 return io_timeout_prep(req, sqe, true);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005741 case IORING_OP_ACCEPT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005742 return io_accept_prep(req, sqe);
Jens Axboed63d1b52019-12-10 10:38:56 -07005743 case IORING_OP_FALLOCATE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005744 return io_fallocate_prep(req, sqe);
Jens Axboe15b71ab2019-12-11 11:20:36 -07005745 case IORING_OP_OPENAT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005746 return io_openat_prep(req, sqe);
Jens Axboeb5dba592019-12-11 14:02:38 -07005747 case IORING_OP_CLOSE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005748 return io_close_prep(req, sqe);
Jens Axboe05f3fb32019-12-09 11:22:50 -07005749 case IORING_OP_FILES_UPDATE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005750 return io_files_update_prep(req, sqe);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07005751 case IORING_OP_STATX:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005752 return io_statx_prep(req, sqe);
Jens Axboe4840e412019-12-25 22:03:45 -07005753 case IORING_OP_FADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005754 return io_fadvise_prep(req, sqe);
Jens Axboec1ca7572019-12-25 22:18:28 -07005755 case IORING_OP_MADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005756 return io_madvise_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07005757 case IORING_OP_OPENAT2:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005758 return io_openat2_prep(req, sqe);
Jens Axboe3e4827b2020-01-08 15:18:09 -07005759 case IORING_OP_EPOLL_CTL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005760 return io_epoll_ctl_prep(req, sqe);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03005761 case IORING_OP_SPLICE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005762 return io_splice_prep(req, sqe);
Jens Axboeddf0322d2020-02-23 16:41:33 -07005763 case IORING_OP_PROVIDE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005764 return io_provide_buffers_prep(req, sqe);
Jens Axboe067524e2020-03-02 16:32:28 -07005765 case IORING_OP_REMOVE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005766 return io_remove_buffers_prep(req, sqe);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03005767 case IORING_OP_TEE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005768 return io_tee_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07005769 }
5770
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005771 printk_once(KERN_WARNING "io_uring: unhandled opcode %d\n",
5772 req->opcode);
5773 return-EINVAL;
5774}
5775
Jens Axboedef596e2019-01-09 08:59:42 -07005776static int io_req_defer_prep(struct io_kiocb *req,
5777 const struct io_uring_sqe *sqe)
Jens Axboedef596e2019-01-09 08:59:42 -07005778{
Jens Axboedef596e2019-01-09 08:59:42 -07005779 if (!sqe)
Jens Axboe2b188cc2019-01-07 10:46:33 -07005780 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005781 if (io_alloc_async_data(req))
Jens Axboeb76da702019-11-20 13:05:32 -07005782 return -EAGAIN;
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005783 return io_req_prep(req, sqe);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005784}
5785
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005786static u32 io_get_sequence(struct io_kiocb *req)
5787{
5788 struct io_kiocb *pos;
5789 struct io_ring_ctx *ctx = req->ctx;
5790 u32 total_submitted, nr_reqs = 1;
5791
5792 if (req->flags & REQ_F_LINK_HEAD)
5793 list_for_each_entry(pos, &req->link_list, link_list)
5794 nr_reqs++;
5795
5796 total_submitted = ctx->cached_sq_head - ctx->cached_sq_dropped;
5797 return total_submitted - nr_reqs;
5798}
5799
Jens Axboe3529d8c2019-12-19 18:24:38 -07005800static int io_req_defer(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe2b188cc2019-01-07 10:46:33 -07005801{
5802 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005803 struct io_defer_entry *de;
Jens Axboe2b188cc2019-01-07 10:46:33 -07005804 int ret;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005805 u32 seq;
Jens Axboe2b188cc2019-01-07 10:46:33 -07005806
5807 /* Still need defer if there is pending req in defer list. */
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005808 if (likely(list_empty_careful(&ctx->defer_list) &&
5809 !(req->flags & REQ_F_IO_DRAIN)))
5810 return 0;
5811
5812 seq = io_get_sequence(req);
5813 /* Still a chance to pass the sequence check */
5814 if (!req_need_defer(req, seq) && list_empty_careful(&ctx->defer_list))
Jens Axboe2b188cc2019-01-07 10:46:33 -07005815 return 0;
5816
Jens Axboee8c2bc12020-08-15 18:44:09 -07005817 if (!req->async_data) {
Pavel Begunkov650b5482020-05-17 14:02:11 +03005818 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03005819 if (ret)
Pavel Begunkov650b5482020-05-17 14:02:11 +03005820 return ret;
5821 }
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03005822 io_prep_async_link(req);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005823 de = kmalloc(sizeof(*de), GFP_KERNEL);
5824 if (!de)
5825 return -ENOMEM;
Jens Axboe31b51512019-01-18 22:56:34 -07005826
5827 spin_lock_irq(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005828 if (!req_need_defer(req, seq) && list_empty(&ctx->defer_list)) {
Jens Axboe31b51512019-01-18 22:56:34 -07005829 spin_unlock_irq(&ctx->completion_lock);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005830 kfree(de);
Pavel Begunkovae348172020-07-23 20:25:20 +03005831 io_queue_async_work(req);
5832 return -EIOCBQUEUED;
Jens Axboe31b51512019-01-18 22:56:34 -07005833 }
5834
5835 trace_io_uring_defer(ctx, req, req->user_data);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005836 de->req = req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005837 de->seq = seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005838 list_add_tail(&de->list, &ctx->defer_list);
Jens Axboe31b51512019-01-18 22:56:34 -07005839 spin_unlock_irq(&ctx->completion_lock);
5840 return -EIOCBQUEUED;
5841}
Jens Axboeedafcce2019-01-09 09:16:05 -07005842
Jens Axboef573d382020-09-22 10:19:24 -06005843static void io_req_drop_files(struct io_kiocb *req)
5844{
5845 struct io_ring_ctx *ctx = req->ctx;
5846 unsigned long flags;
5847
5848 spin_lock_irqsave(&ctx->inflight_lock, flags);
5849 list_del(&req->inflight_entry);
5850 if (waitqueue_active(&ctx->inflight_wait))
5851 wake_up(&ctx->inflight_wait);
5852 spin_unlock_irqrestore(&ctx->inflight_lock, flags);
5853 req->flags &= ~REQ_F_INFLIGHT;
Jens Axboe98447d62020-10-14 10:48:51 -06005854 put_files_struct(req->work.identity->files);
5855 put_nsproxy(req->work.identity->nsproxy);
Jens Axboedfead8a2020-10-14 10:12:37 -06005856 req->work.flags &= ~IO_WQ_WORK_FILES;
Jens Axboef573d382020-09-22 10:19:24 -06005857}
5858
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03005859static void __io_clean_op(struct io_kiocb *req)
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005860{
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005861 if (req->flags & REQ_F_BUFFER_SELECTED) {
5862 switch (req->opcode) {
5863 case IORING_OP_READV:
5864 case IORING_OP_READ_FIXED:
5865 case IORING_OP_READ:
Jens Axboebcda7ba2020-02-23 16:42:51 -07005866 kfree((void *)(unsigned long)req->rw.addr);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005867 break;
5868 case IORING_OP_RECVMSG:
5869 case IORING_OP_RECV:
Jens Axboe52de1fe2020-02-27 10:15:42 -07005870 kfree(req->sr_msg.kbuf);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005871 break;
5872 }
5873 req->flags &= ~REQ_F_BUFFER_SELECTED;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005874 }
5875
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005876 if (req->flags & REQ_F_NEED_CLEANUP) {
5877 switch (req->opcode) {
5878 case IORING_OP_READV:
5879 case IORING_OP_READ_FIXED:
5880 case IORING_OP_READ:
5881 case IORING_OP_WRITEV:
5882 case IORING_OP_WRITE_FIXED:
Jens Axboee8c2bc12020-08-15 18:44:09 -07005883 case IORING_OP_WRITE: {
5884 struct io_async_rw *io = req->async_data;
5885 if (io->free_iovec)
5886 kfree(io->free_iovec);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005887 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005888 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005889 case IORING_OP_RECVMSG:
Jens Axboee8c2bc12020-08-15 18:44:09 -07005890 case IORING_OP_SENDMSG: {
5891 struct io_async_msghdr *io = req->async_data;
5892 if (io->iov != io->fast_iov)
5893 kfree(io->iov);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005894 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005895 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005896 case IORING_OP_SPLICE:
5897 case IORING_OP_TEE:
5898 io_put_file(req, req->splice.file_in,
5899 (req->splice.flags & SPLICE_F_FD_IN_FIXED));
5900 break;
Jens Axboef3cd48502020-09-24 14:55:54 -06005901 case IORING_OP_OPENAT:
5902 case IORING_OP_OPENAT2:
5903 if (req->open.filename)
5904 putname(req->open.filename);
5905 break;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005906 }
5907 req->flags &= ~REQ_F_NEED_CLEANUP;
5908 }
Pavel Begunkovbb175342020-08-20 11:33:35 +03005909
Jens Axboef573d382020-09-22 10:19:24 -06005910 if (req->flags & REQ_F_INFLIGHT)
5911 io_req_drop_files(req);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005912}
5913
Pavel Begunkovc1379e22020-09-30 22:57:56 +03005914static int io_issue_sqe(struct io_kiocb *req, bool force_nonblock,
5915 struct io_comp_state *cs)
Jens Axboeedafcce2019-01-09 09:16:05 -07005916{
Jens Axboeedafcce2019-01-09 09:16:05 -07005917 struct io_ring_ctx *ctx = req->ctx;
Jens Axboed625c6e2019-12-17 19:53:05 -07005918 int ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07005919
Jens Axboed625c6e2019-12-17 19:53:05 -07005920 switch (req->opcode) {
Jens Axboe2b188cc2019-01-07 10:46:33 -07005921 case IORING_OP_NOP:
Jens Axboe229a7b62020-06-22 10:13:11 -06005922 ret = io_nop(req, cs);
Jens Axboe31b51512019-01-18 22:56:34 -07005923 break;
5924 case IORING_OP_READV:
Jens Axboe3529d8c2019-12-19 18:24:38 -07005925 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005926 case IORING_OP_READ:
Jens Axboea1d7c392020-06-22 11:09:46 -06005927 ret = io_read(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005928 break;
5929 case IORING_OP_WRITEV:
Jens Axboe2b188cc2019-01-07 10:46:33 -07005930 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005931 case IORING_OP_WRITE:
Jens Axboea1d7c392020-06-22 11:09:46 -06005932 ret = io_write(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005933 break;
5934 case IORING_OP_FSYNC:
Pavel Begunkov014db002020-03-03 21:33:12 +03005935 ret = io_fsync(req, force_nonblock);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005936 break;
5937 case IORING_OP_POLL_ADD:
Pavel Begunkov014db002020-03-03 21:33:12 +03005938 ret = io_poll_add(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005939 break;
5940 case IORING_OP_POLL_REMOVE:
Jens Axboeb76da702019-11-20 13:05:32 -07005941 ret = io_poll_remove(req);
5942 break;
5943 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005944 ret = io_sync_file_range(req, force_nonblock);
Jens Axboeb76da702019-11-20 13:05:32 -07005945 break;
5946 case IORING_OP_SENDMSG:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005947 ret = io_sendmsg(req, force_nonblock, cs);
5948 break;
Jens Axboefddafac2020-01-04 20:19:44 -07005949 case IORING_OP_SEND:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005950 ret = io_send(req, force_nonblock, cs);
Jens Axboeb76da702019-11-20 13:05:32 -07005951 break;
5952 case IORING_OP_RECVMSG:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005953 ret = io_recvmsg(req, force_nonblock, cs);
5954 break;
Jens Axboefddafac2020-01-04 20:19:44 -07005955 case IORING_OP_RECV:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005956 ret = io_recv(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005957 break;
5958 case IORING_OP_TIMEOUT:
5959 ret = io_timeout(req);
5960 break;
5961 case IORING_OP_TIMEOUT_REMOVE:
5962 ret = io_timeout_remove(req);
5963 break;
5964 case IORING_OP_ACCEPT:
Jens Axboe229a7b62020-06-22 10:13:11 -06005965 ret = io_accept(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005966 break;
5967 case IORING_OP_CONNECT:
Jens Axboe229a7b62020-06-22 10:13:11 -06005968 ret = io_connect(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005969 break;
5970 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkov014db002020-03-03 21:33:12 +03005971 ret = io_async_cancel(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005972 break;
Jens Axboed63d1b52019-12-10 10:38:56 -07005973 case IORING_OP_FALLOCATE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005974 ret = io_fallocate(req, force_nonblock);
Jens Axboed63d1b52019-12-10 10:38:56 -07005975 break;
Jens Axboe15b71ab2019-12-11 11:20:36 -07005976 case IORING_OP_OPENAT:
Pavel Begunkov014db002020-03-03 21:33:12 +03005977 ret = io_openat(req, force_nonblock);
Jens Axboe15b71ab2019-12-11 11:20:36 -07005978 break;
Jens Axboeb5dba592019-12-11 14:02:38 -07005979 case IORING_OP_CLOSE:
Jens Axboe229a7b62020-06-22 10:13:11 -06005980 ret = io_close(req, force_nonblock, cs);
Jens Axboeb5dba592019-12-11 14:02:38 -07005981 break;
Jens Axboe05f3fb32019-12-09 11:22:50 -07005982 case IORING_OP_FILES_UPDATE:
Jens Axboe229a7b62020-06-22 10:13:11 -06005983 ret = io_files_update(req, force_nonblock, cs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07005984 break;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07005985 case IORING_OP_STATX:
Pavel Begunkov014db002020-03-03 21:33:12 +03005986 ret = io_statx(req, force_nonblock);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07005987 break;
Jens Axboe4840e412019-12-25 22:03:45 -07005988 case IORING_OP_FADVISE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005989 ret = io_fadvise(req, force_nonblock);
Jens Axboe4840e412019-12-25 22:03:45 -07005990 break;
Jens Axboec1ca7572019-12-25 22:18:28 -07005991 case IORING_OP_MADVISE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005992 ret = io_madvise(req, force_nonblock);
Jens Axboec1ca7572019-12-25 22:18:28 -07005993 break;
Jens Axboecebdb982020-01-08 17:59:24 -07005994 case IORING_OP_OPENAT2:
Pavel Begunkov014db002020-03-03 21:33:12 +03005995 ret = io_openat2(req, force_nonblock);
Jens Axboecebdb982020-01-08 17:59:24 -07005996 break;
Jens Axboe3e4827b2020-01-08 15:18:09 -07005997 case IORING_OP_EPOLL_CTL:
Jens Axboe229a7b62020-06-22 10:13:11 -06005998 ret = io_epoll_ctl(req, force_nonblock, cs);
Jens Axboe3e4827b2020-01-08 15:18:09 -07005999 break;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006000 case IORING_OP_SPLICE:
Pavel Begunkov014db002020-03-03 21:33:12 +03006001 ret = io_splice(req, force_nonblock);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006002 break;
Jens Axboeddf0322d2020-02-23 16:41:33 -07006003 case IORING_OP_PROVIDE_BUFFERS:
Jens Axboe229a7b62020-06-22 10:13:11 -06006004 ret = io_provide_buffers(req, force_nonblock, cs);
Jens Axboeddf0322d2020-02-23 16:41:33 -07006005 break;
Jens Axboe067524e2020-03-02 16:32:28 -07006006 case IORING_OP_REMOVE_BUFFERS:
Jens Axboe229a7b62020-06-22 10:13:11 -06006007 ret = io_remove_buffers(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006008 break;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03006009 case IORING_OP_TEE:
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03006010 ret = io_tee(req, force_nonblock);
6011 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006012 default:
6013 ret = -EINVAL;
6014 break;
Jens Axboe31b51512019-01-18 22:56:34 -07006015 }
6016
6017 if (ret)
Jens Axboeedafcce2019-01-09 09:16:05 -07006018 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006019
Jens Axboeb5325762020-05-19 21:20:27 -06006020 /* If the op doesn't have a file, we're not polling for it */
6021 if ((ctx->flags & IORING_SETUP_IOPOLL) && req->file) {
Jens Axboe11ba8202020-01-15 21:51:17 -07006022 const bool in_async = io_wq_current_is_worker();
6023
Jens Axboe11ba8202020-01-15 21:51:17 -07006024 /* workqueue context doesn't hold uring_lock, grab it now */
6025 if (in_async)
6026 mutex_lock(&ctx->uring_lock);
6027
Jens Axboe2b188cc2019-01-07 10:46:33 -07006028 io_iopoll_req_issued(req);
Jens Axboe11ba8202020-01-15 21:51:17 -07006029
6030 if (in_async)
6031 mutex_unlock(&ctx->uring_lock);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006032 }
6033
6034 return 0;
6035}
6036
Pavel Begunkovf4db7182020-06-25 18:20:54 +03006037static struct io_wq_work *io_wq_submit_work(struct io_wq_work *work)
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03006038{
Jens Axboe2b188cc2019-01-07 10:46:33 -07006039 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkov6df1db62020-07-03 22:15:06 +03006040 struct io_kiocb *timeout;
Jens Axboe561fb042019-10-24 07:25:42 -06006041 int ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006042
Pavel Begunkov6df1db62020-07-03 22:15:06 +03006043 timeout = io_prep_linked_timeout(req);
6044 if (timeout)
6045 io_queue_linked_timeout(timeout);
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03006046
Jens Axboe0c9d5cc2019-12-11 19:29:43 -07006047 /* if NO_CANCEL is set, we must still run the work */
6048 if ((work->flags & (IO_WQ_WORK_CANCEL|IO_WQ_WORK_NO_CANCEL)) ==
6049 IO_WQ_WORK_CANCEL) {
Jens Axboe561fb042019-10-24 07:25:42 -06006050 ret = -ECANCELED;
Jens Axboe0c9d5cc2019-12-11 19:29:43 -07006051 }
Jens Axboe31b51512019-01-18 22:56:34 -07006052
Jens Axboe561fb042019-10-24 07:25:42 -06006053 if (!ret) {
Jens Axboe561fb042019-10-24 07:25:42 -06006054 do {
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006055 ret = io_issue_sqe(req, false, NULL);
Jens Axboe561fb042019-10-24 07:25:42 -06006056 /*
6057 * We can get EAGAIN for polled IO even though we're
6058 * forcing a sync submission from here, since we can't
6059 * wait for request slots on the block side.
6060 */
6061 if (ret != -EAGAIN)
6062 break;
6063 cond_resched();
6064 } while (1);
6065 }
Jens Axboe31b51512019-01-18 22:56:34 -07006066
Jens Axboe561fb042019-10-24 07:25:42 -06006067 if (ret) {
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006068 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06006069 io_req_complete(req, ret);
Jens Axboeedafcce2019-01-09 09:16:05 -07006070 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07006071
Pavel Begunkovf4db7182020-06-25 18:20:54 +03006072 return io_steal_work(req);
Jens Axboe31b51512019-01-18 22:56:34 -07006073}
Jens Axboe2b188cc2019-01-07 10:46:33 -07006074
Jens Axboe65e19f52019-10-26 07:20:21 -06006075static inline struct file *io_file_from_index(struct io_ring_ctx *ctx,
6076 int index)
Jens Axboe09bb8392019-03-13 12:39:28 -06006077{
Jens Axboe65e19f52019-10-26 07:20:21 -06006078 struct fixed_file_table *table;
6079
Jens Axboe05f3fb32019-12-09 11:22:50 -07006080 table = &ctx->file_data->table[index >> IORING_FILE_TABLE_SHIFT];
Xiaoming Ni84695082020-05-11 19:25:43 +08006081 return table->files[index & IORING_FILE_TABLE_MASK];
Jens Axboe65e19f52019-10-26 07:20:21 -06006082}
6083
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006084static struct file *io_file_get(struct io_submit_state *state,
6085 struct io_kiocb *req, int fd, bool fixed)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006086{
6087 struct io_ring_ctx *ctx = req->ctx;
6088 struct file *file;
6089
6090 if (fixed) {
Pavel Begunkov479f5172020-10-10 18:34:07 +01006091 if (unlikely((unsigned int)fd >= ctx->nr_user_files))
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006092 return NULL;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006093 fd = array_index_nospec(fd, ctx->nr_user_files);
6094 file = io_file_from_index(ctx, fd);
Jens Axboefd2206e2020-06-02 16:40:47 -06006095 if (file) {
Pavel Begunkovb2e96852020-10-10 18:34:16 +01006096 req->fixed_file_refs = &ctx->file_data->node->refs;
Jens Axboefd2206e2020-06-02 16:40:47 -06006097 percpu_ref_get(req->fixed_file_refs);
6098 }
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006099 } else {
6100 trace_io_uring_file_get(ctx, fd);
6101 file = __io_file_get(state, fd);
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006102 }
6103
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006104 return file;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006105}
6106
Jens Axboe3529d8c2019-12-19 18:24:38 -07006107static int io_req_set_file(struct io_submit_state *state, struct io_kiocb *req,
Jens Axboe63ff8222020-05-07 14:56:15 -06006108 int fd)
Jens Axboe09bb8392019-03-13 12:39:28 -06006109{
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006110 bool fixed;
Jens Axboe09bb8392019-03-13 12:39:28 -06006111
Jens Axboe63ff8222020-05-07 14:56:15 -06006112 fixed = (req->flags & REQ_F_FIXED_FILE) != 0;
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03006113 if (unlikely(!fixed && io_async_submit(req->ctx)))
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006114 return -EBADF;
Jens Axboe09bb8392019-03-13 12:39:28 -06006115
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006116 req->file = io_file_get(state, req, fd, fixed);
6117 if (req->file || io_op_defs[req->opcode].needs_file_no_error)
Jens Axboef86cd202020-01-29 13:46:44 -07006118 return 0;
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006119 return -EBADF;
Pavel Begunkovf56040b2020-07-23 20:25:21 +03006120}
6121
Jens Axboe2665abf2019-11-05 12:40:47 -07006122static enum hrtimer_restart io_link_timeout_fn(struct hrtimer *timer)
6123{
Jens Axboead8a48a2019-11-15 08:49:11 -07006124 struct io_timeout_data *data = container_of(timer,
6125 struct io_timeout_data, timer);
6126 struct io_kiocb *req = data->req;
Jens Axboe2665abf2019-11-05 12:40:47 -07006127 struct io_ring_ctx *ctx = req->ctx;
6128 struct io_kiocb *prev = NULL;
6129 unsigned long flags;
Jens Axboe2665abf2019-11-05 12:40:47 -07006130
6131 spin_lock_irqsave(&ctx->completion_lock, flags);
6132
6133 /*
6134 * We don't expect the list to be empty, that will only happen if we
6135 * race with the completion of the linked work.
6136 */
Pavel Begunkov44932332019-12-05 16:16:35 +03006137 if (!list_empty(&req->link_list)) {
6138 prev = list_entry(req->link_list.prev, struct io_kiocb,
6139 link_list);
Pavel Begunkov900fad42020-10-19 16:39:16 +01006140 if (refcount_inc_not_zero(&prev->refs))
Pavel Begunkov44932332019-12-05 16:16:35 +03006141 list_del_init(&req->link_list);
Pavel Begunkov900fad42020-10-19 16:39:16 +01006142 else
Jens Axboe76a46e02019-11-10 23:34:16 -07006143 prev = NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07006144 }
6145
6146 spin_unlock_irqrestore(&ctx->completion_lock, flags);
6147
6148 if (prev) {
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006149 req_set_fail_links(prev);
Pavel Begunkov014db002020-03-03 21:33:12 +03006150 io_async_find_and_cancel(ctx, req, prev->user_data, -ETIME);
Jens Axboe76a46e02019-11-10 23:34:16 -07006151 io_put_req(prev);
Jens Axboe47f46762019-11-09 17:43:02 -07006152 } else {
Jens Axboee1e16092020-06-22 09:17:17 -06006153 io_req_complete(req, -ETIME);
Jens Axboe2665abf2019-11-05 12:40:47 -07006154 }
Jens Axboe2665abf2019-11-05 12:40:47 -07006155 return HRTIMER_NORESTART;
6156}
6157
Jens Axboe7271ef32020-08-10 09:55:22 -06006158static void __io_queue_linked_timeout(struct io_kiocb *req)
Jens Axboe2665abf2019-11-05 12:40:47 -07006159{
Jens Axboe76a46e02019-11-10 23:34:16 -07006160 /*
6161 * If the list is now empty, then our linked request finished before
6162 * we got a chance to setup the timer
6163 */
Pavel Begunkov44932332019-12-05 16:16:35 +03006164 if (!list_empty(&req->link_list)) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07006165 struct io_timeout_data *data = req->async_data;
Jens Axboe94ae5e72019-11-14 19:39:52 -07006166
Jens Axboead8a48a2019-11-15 08:49:11 -07006167 data->timer.function = io_link_timeout_fn;
6168 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts),
6169 data->mode);
Jens Axboe2665abf2019-11-05 12:40:47 -07006170 }
Jens Axboe7271ef32020-08-10 09:55:22 -06006171}
6172
6173static void io_queue_linked_timeout(struct io_kiocb *req)
6174{
6175 struct io_ring_ctx *ctx = req->ctx;
6176
6177 spin_lock_irq(&ctx->completion_lock);
6178 __io_queue_linked_timeout(req);
Jens Axboe76a46e02019-11-10 23:34:16 -07006179 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe2665abf2019-11-05 12:40:47 -07006180
Jens Axboe2665abf2019-11-05 12:40:47 -07006181 /* drop submission reference */
Jens Axboe76a46e02019-11-10 23:34:16 -07006182 io_put_req(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07006183}
6184
Jens Axboead8a48a2019-11-15 08:49:11 -07006185static struct io_kiocb *io_prep_linked_timeout(struct io_kiocb *req)
Jens Axboe2665abf2019-11-05 12:40:47 -07006186{
6187 struct io_kiocb *nxt;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006188
Pavel Begunkovdea3b492020-04-12 02:05:04 +03006189 if (!(req->flags & REQ_F_LINK_HEAD))
Jens Axboe2665abf2019-11-05 12:40:47 -07006190 return NULL;
Pavel Begunkov6df1db62020-07-03 22:15:06 +03006191 if (req->flags & REQ_F_LINK_TIMEOUT)
Jens Axboed7718a92020-02-14 22:23:12 -07006192 return NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07006193
Pavel Begunkov44932332019-12-05 16:16:35 +03006194 nxt = list_first_entry_or_null(&req->link_list, struct io_kiocb,
6195 link_list);
Jens Axboed625c6e2019-12-17 19:53:05 -07006196 if (!nxt || nxt->opcode != IORING_OP_LINK_TIMEOUT)
Jens Axboe76a46e02019-11-10 23:34:16 -07006197 return NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07006198
Pavel Begunkov900fad42020-10-19 16:39:16 +01006199 nxt->flags |= REQ_F_LTIMEOUT_ACTIVE;
Jens Axboe76a46e02019-11-10 23:34:16 -07006200 req->flags |= REQ_F_LINK_TIMEOUT;
Jens Axboe76a46e02019-11-10 23:34:16 -07006201 return nxt;
Jens Axboe2665abf2019-11-05 12:40:47 -07006202}
6203
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006204static void __io_queue_sqe(struct io_kiocb *req, struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07006205{
Jens Axboe4a0a7a12019-12-09 20:01:01 -07006206 struct io_kiocb *linked_timeout;
Jens Axboe193155c2020-02-22 23:22:19 -07006207 const struct cred *old_creds = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006208 int ret;
6209
Jens Axboe4a0a7a12019-12-09 20:01:01 -07006210again:
6211 linked_timeout = io_prep_linked_timeout(req);
6212
Pavel Begunkov2e5aa6c2020-10-18 10:17:37 +01006213 if ((req->flags & REQ_F_WORK_INITIALIZED) &&
6214 (req->work.flags & IO_WQ_WORK_CREDS) &&
Jens Axboe98447d62020-10-14 10:48:51 -06006215 req->work.identity->creds != current_cred()) {
Jens Axboe193155c2020-02-22 23:22:19 -07006216 if (old_creds)
6217 revert_creds(old_creds);
Jens Axboe98447d62020-10-14 10:48:51 -06006218 if (old_creds == req->work.identity->creds)
Jens Axboe193155c2020-02-22 23:22:19 -07006219 old_creds = NULL; /* restored original creds */
6220 else
Jens Axboe98447d62020-10-14 10:48:51 -06006221 old_creds = override_creds(req->work.identity->creds);
Jens Axboe193155c2020-02-22 23:22:19 -07006222 }
6223
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006224 ret = io_issue_sqe(req, true, cs);
Jens Axboe491381ce2019-10-17 09:20:46 -06006225
6226 /*
6227 * We async punt it if the file wasn't marked NOWAIT, or if the file
6228 * doesn't support non-blocking read/write attempts
6229 */
Pavel Begunkov24c74672020-06-21 13:09:51 +03006230 if (ret == -EAGAIN && !(req->flags & REQ_F_NOWAIT)) {
Pavel Begunkovf063c542020-07-25 14:41:59 +03006231 if (!io_arm_poll_handler(req)) {
Pavel Begunkovf063c542020-07-25 14:41:59 +03006232 /*
6233 * Queued up for async execution, worker will release
6234 * submit reference when the iocb is actually submitted.
6235 */
6236 io_queue_async_work(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006237 }
Pavel Begunkovbbad27b2019-11-19 23:32:47 +03006238
Pavel Begunkovf063c542020-07-25 14:41:59 +03006239 if (linked_timeout)
6240 io_queue_linked_timeout(linked_timeout);
Pavel Begunkov0d63c142020-10-22 16:47:18 +01006241 } else if (likely(!ret)) {
6242 /* drop submission reference */
6243 req = io_put_req_find_next(req);
6244 if (linked_timeout)
6245 io_queue_linked_timeout(linked_timeout);
Jens Axboee65ef562019-03-12 10:16:44 -06006246
Pavel Begunkov0d63c142020-10-22 16:47:18 +01006247 if (req) {
6248 if (!(req->flags & REQ_F_FORCE_ASYNC))
6249 goto again;
6250 io_queue_async_work(req);
6251 }
6252 } else {
Pavel Begunkov652532a2020-07-03 22:15:07 +03006253 /* un-prep timeout, so it'll be killed as any other linked */
6254 req->flags &= ~REQ_F_LINK_TIMEOUT;
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006255 req_set_fail_links(req);
Jens Axboee65ef562019-03-12 10:16:44 -06006256 io_put_req(req);
Pavel Begunkov652532a2020-07-03 22:15:07 +03006257 io_req_complete(req, ret);
Jens Axboe9e645e112019-05-10 16:07:28 -06006258 }
Pavel Begunkov652532a2020-07-03 22:15:07 +03006259
Jens Axboe193155c2020-02-22 23:22:19 -07006260 if (old_creds)
6261 revert_creds(old_creds);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006262}
6263
Jens Axboef13fad72020-06-22 09:34:30 -06006264static void io_queue_sqe(struct io_kiocb *req, const struct io_uring_sqe *sqe,
6265 struct io_comp_state *cs)
Jackie Liu4fe2c962019-09-09 20:50:40 +08006266{
6267 int ret;
6268
Jens Axboe3529d8c2019-12-19 18:24:38 -07006269 ret = io_req_defer(req, sqe);
Jackie Liu4fe2c962019-09-09 20:50:40 +08006270 if (ret) {
6271 if (ret != -EIOCBQUEUED) {
Pavel Begunkov11185912020-01-22 23:09:35 +03006272fail_req:
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006273 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06006274 io_put_req(req);
6275 io_req_complete(req, ret);
Jackie Liu4fe2c962019-09-09 20:50:40 +08006276 }
Pavel Begunkov25508782019-12-30 21:24:47 +03006277 } else if (req->flags & REQ_F_FORCE_ASYNC) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07006278 if (!req->async_data) {
Pavel Begunkovbd2ab182020-05-17 14:02:12 +03006279 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03006280 if (unlikely(ret))
Pavel Begunkovbd2ab182020-05-17 14:02:12 +03006281 goto fail_req;
6282 }
Jens Axboece35a472019-12-17 08:04:44 -07006283 io_queue_async_work(req);
6284 } else {
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006285 if (sqe) {
6286 ret = io_req_prep(req, sqe);
6287 if (unlikely(ret))
6288 goto fail_req;
6289 }
6290 __io_queue_sqe(req, cs);
Jens Axboece35a472019-12-17 08:04:44 -07006291 }
Jackie Liu4fe2c962019-09-09 20:50:40 +08006292}
6293
Jens Axboef13fad72020-06-22 09:34:30 -06006294static inline void io_queue_link_head(struct io_kiocb *req,
6295 struct io_comp_state *cs)
Jackie Liu4fe2c962019-09-09 20:50:40 +08006296{
Jens Axboe94ae5e72019-11-14 19:39:52 -07006297 if (unlikely(req->flags & REQ_F_FAIL_LINK)) {
Jens Axboee1e16092020-06-22 09:17:17 -06006298 io_put_req(req);
6299 io_req_complete(req, -ECANCELED);
Pavel Begunkov1b4a51b2019-11-21 11:54:28 +03006300 } else
Jens Axboef13fad72020-06-22 09:34:30 -06006301 io_queue_sqe(req, NULL, cs);
Jackie Liu4fe2c962019-09-09 20:50:40 +08006302}
6303
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006304static int io_submit_sqe(struct io_kiocb *req, const struct io_uring_sqe *sqe,
Jens Axboef13fad72020-06-22 09:34:30 -06006305 struct io_kiocb **link, struct io_comp_state *cs)
Jens Axboe9e645e112019-05-10 16:07:28 -06006306{
Jackie Liua197f662019-11-08 08:09:12 -07006307 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006308 int ret;
Jens Axboe9e645e112019-05-10 16:07:28 -06006309
Jens Axboe9e645e112019-05-10 16:07:28 -06006310 /*
6311 * If we already have a head request, queue this one for async
6312 * submittal once the head completes. If we don't have a head but
6313 * IOSQE_IO_LINK is set in the sqe, start a new head. This one will be
6314 * submitted sync once the chain is complete. If none of those
6315 * conditions are true (normal request), then just queue it.
6316 */
6317 if (*link) {
Pavel Begunkov9d763772019-12-17 02:22:07 +03006318 struct io_kiocb *head = *link;
Jens Axboe9e645e112019-05-10 16:07:28 -06006319
Pavel Begunkov8cdf2192020-01-25 00:40:24 +03006320 /*
6321 * Taking sequential execution of a link, draining both sides
6322 * of the link also fullfils IOSQE_IO_DRAIN semantics for all
6323 * requests in the link. So, it drains the head and the
6324 * next after the link request. The last one is done via
6325 * drain_next flag to persist the effect across calls.
6326 */
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006327 if (req->flags & REQ_F_IO_DRAIN) {
Pavel Begunkov711be032020-01-17 03:57:59 +03006328 head->flags |= REQ_F_IO_DRAIN;
6329 ctx->drain_next = 1;
6330 }
Jens Axboe3529d8c2019-12-19 18:24:38 -07006331 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03006332 if (unlikely(ret)) {
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006333 /* fail even hard links since we don't submit */
Pavel Begunkov9d763772019-12-17 02:22:07 +03006334 head->flags |= REQ_F_FAIL_LINK;
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006335 return ret;
Jens Axboe2d283902019-12-04 11:08:05 -07006336 }
Pavel Begunkov9d763772019-12-17 02:22:07 +03006337 trace_io_uring_link(ctx, req, head);
6338 list_add_tail(&req->link_list, &head->link_list);
Jens Axboe9e645e112019-05-10 16:07:28 -06006339
Pavel Begunkov32fe5252019-12-17 22:26:58 +03006340 /* last request of a link, enqueue the link */
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006341 if (!(req->flags & (REQ_F_LINK | REQ_F_HARDLINK))) {
Jens Axboef13fad72020-06-22 09:34:30 -06006342 io_queue_link_head(head, cs);
Pavel Begunkov32fe5252019-12-17 22:26:58 +03006343 *link = NULL;
6344 }
Jens Axboe9e645e112019-05-10 16:07:28 -06006345 } else {
Pavel Begunkov711be032020-01-17 03:57:59 +03006346 if (unlikely(ctx->drain_next)) {
6347 req->flags |= REQ_F_IO_DRAIN;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006348 ctx->drain_next = 0;
Pavel Begunkov711be032020-01-17 03:57:59 +03006349 }
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006350 if (req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) {
Pavel Begunkovdea3b492020-04-12 02:05:04 +03006351 req->flags |= REQ_F_LINK_HEAD;
Pavel Begunkov711be032020-01-17 03:57:59 +03006352 INIT_LIST_HEAD(&req->link_list);
Pavel Begunkovf1d96a82020-03-13 22:29:14 +03006353
Pavel Begunkov711be032020-01-17 03:57:59 +03006354 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03006355 if (unlikely(ret))
Pavel Begunkov711be032020-01-17 03:57:59 +03006356 req->flags |= REQ_F_FAIL_LINK;
6357 *link = req;
6358 } else {
Jens Axboef13fad72020-06-22 09:34:30 -06006359 io_queue_sqe(req, sqe, cs);
Pavel Begunkov711be032020-01-17 03:57:59 +03006360 }
Jens Axboe9e645e112019-05-10 16:07:28 -06006361 }
Pavel Begunkov2e6e1fd2019-12-05 16:15:45 +03006362
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006363 return 0;
Jens Axboe9e645e112019-05-10 16:07:28 -06006364}
6365
Jens Axboe9a56a232019-01-09 09:06:50 -07006366/*
6367 * Batched submission is done, ensure local IO is flushed out.
6368 */
6369static void io_submit_state_end(struct io_submit_state *state)
6370{
Jens Axboef13fad72020-06-22 09:34:30 -06006371 if (!list_empty(&state->comp.list))
6372 io_submit_flush_completions(&state->comp);
Jens Axboe9a56a232019-01-09 09:06:50 -07006373 blk_finish_plug(&state->plug);
Pavel Begunkov9f13c352020-05-17 14:13:41 +03006374 io_state_file_put(state);
Jens Axboe2579f912019-01-09 09:10:43 -07006375 if (state->free_reqs)
Pavel Begunkov6c8a3132020-02-01 03:58:00 +03006376 kmem_cache_free_bulk(req_cachep, state->free_reqs, state->reqs);
Jens Axboe9a56a232019-01-09 09:06:50 -07006377}
6378
6379/*
6380 * Start submission side cache.
6381 */
6382static void io_submit_state_start(struct io_submit_state *state,
Jens Axboe013538b2020-06-22 09:29:15 -06006383 struct io_ring_ctx *ctx, unsigned int max_ios)
Jens Axboe9a56a232019-01-09 09:06:50 -07006384{
6385 blk_start_plug(&state->plug);
Jens Axboe013538b2020-06-22 09:29:15 -06006386 state->comp.nr = 0;
6387 INIT_LIST_HEAD(&state->comp.list);
6388 state->comp.ctx = ctx;
Jens Axboe2579f912019-01-09 09:10:43 -07006389 state->free_reqs = 0;
Jens Axboe9a56a232019-01-09 09:06:50 -07006390 state->file = NULL;
6391 state->ios_left = max_ios;
6392}
6393
Jens Axboe2b188cc2019-01-07 10:46:33 -07006394static void io_commit_sqring(struct io_ring_ctx *ctx)
6395{
Hristo Venev75b28af2019-08-26 17:23:46 +00006396 struct io_rings *rings = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006397
Pavel Begunkovcaf582c2019-12-30 21:24:46 +03006398 /*
6399 * Ensure any loads from the SQEs are done at this point,
6400 * since once we write the new head, the application could
6401 * write new data to them.
6402 */
6403 smp_store_release(&rings->sq.head, ctx->cached_sq_head);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006404}
6405
6406/*
Jens Axboe3529d8c2019-12-19 18:24:38 -07006407 * Fetch an sqe, if one is available. Note that sqe_ptr will point to memory
Jens Axboe2b188cc2019-01-07 10:46:33 -07006408 * that is mapped by userspace. This means that care needs to be taken to
6409 * ensure that reads are stable, as we cannot rely on userspace always
6410 * being a good citizen. If members of the sqe are validated and then later
6411 * used, it's important that those reads are done through READ_ONCE() to
6412 * prevent a re-load down the line.
6413 */
Pavel Begunkov709b3022020-04-08 08:58:43 +03006414static const struct io_uring_sqe *io_get_sqe(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07006415{
Hristo Venev75b28af2019-08-26 17:23:46 +00006416 u32 *sq_array = ctx->sq_array;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006417 unsigned head;
6418
6419 /*
6420 * The cached sq head (or cq tail) serves two purposes:
6421 *
6422 * 1) allows us to batch the cost of updating the user visible
6423 * head updates.
6424 * 2) allows the kernel side to track the head on its own, even
6425 * though the application is the one updating it.
6426 */
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03006427 head = READ_ONCE(sq_array[ctx->cached_sq_head & ctx->sq_mask]);
Pavel Begunkov709b3022020-04-08 08:58:43 +03006428 if (likely(head < ctx->sq_entries))
6429 return &ctx->sq_sqes[head];
Jens Axboe2b188cc2019-01-07 10:46:33 -07006430
6431 /* drop invalid entries */
Jens Axboe498ccd92019-10-25 10:04:25 -06006432 ctx->cached_sq_dropped++;
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03006433 WRITE_ONCE(ctx->rings->sq_dropped, ctx->cached_sq_dropped);
Pavel Begunkov709b3022020-04-08 08:58:43 +03006434 return NULL;
6435}
6436
6437static inline void io_consume_sqe(struct io_ring_ctx *ctx)
6438{
6439 ctx->cached_sq_head++;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006440}
6441
Stefano Garzarella21b55db2020-08-27 16:58:30 +02006442/*
6443 * Check SQE restrictions (opcode and flags).
6444 *
6445 * Returns 'true' if SQE is allowed, 'false' otherwise.
6446 */
6447static inline bool io_check_restriction(struct io_ring_ctx *ctx,
6448 struct io_kiocb *req,
6449 unsigned int sqe_flags)
6450{
6451 if (!ctx->restricted)
6452 return true;
6453
6454 if (!test_bit(req->opcode, ctx->restrictions.sqe_op))
6455 return false;
6456
6457 if ((sqe_flags & ctx->restrictions.sqe_flags_required) !=
6458 ctx->restrictions.sqe_flags_required)
6459 return false;
6460
6461 if (sqe_flags & ~(ctx->restrictions.sqe_flags_allowed |
6462 ctx->restrictions.sqe_flags_required))
6463 return false;
6464
6465 return true;
6466}
6467
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006468#define SQE_VALID_FLAGS (IOSQE_FIXED_FILE|IOSQE_IO_DRAIN|IOSQE_IO_LINK| \
6469 IOSQE_IO_HARDLINK | IOSQE_ASYNC | \
6470 IOSQE_BUFFER_SELECT)
6471
6472static int io_init_req(struct io_ring_ctx *ctx, struct io_kiocb *req,
6473 const struct io_uring_sqe *sqe,
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03006474 struct io_submit_state *state)
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006475{
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006476 unsigned int sqe_flags;
Pavel Begunkov71b547c2020-10-10 18:34:09 +01006477 int id, ret;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006478
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006479 req->opcode = READ_ONCE(sqe->opcode);
6480 req->user_data = READ_ONCE(sqe->user_data);
Jens Axboee8c2bc12020-08-15 18:44:09 -07006481 req->async_data = NULL;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006482 req->file = NULL;
6483 req->ctx = ctx;
6484 req->flags = 0;
6485 /* one is dropped after submission, the other at completion */
6486 refcount_set(&req->refs, 2);
Pavel Begunkov4dd28242020-06-15 10:33:13 +03006487 req->task = current;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006488 req->result = 0;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006489
6490 if (unlikely(req->opcode >= IORING_OP_LAST))
6491 return -EINVAL;
6492
Jens Axboe9d8426a2020-06-16 18:42:49 -06006493 if (unlikely(io_sq_thread_acquire_mm(ctx, req)))
6494 return -EFAULT;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006495
6496 sqe_flags = READ_ONCE(sqe->flags);
6497 /* enforce forwards compatibility on users */
6498 if (unlikely(sqe_flags & ~SQE_VALID_FLAGS))
6499 return -EINVAL;
6500
Stefano Garzarella21b55db2020-08-27 16:58:30 +02006501 if (unlikely(!io_check_restriction(ctx, req, sqe_flags)))
6502 return -EACCES;
6503
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006504 if ((sqe_flags & IOSQE_BUFFER_SELECT) &&
6505 !io_op_defs[req->opcode].buffer_select)
6506 return -EOPNOTSUPP;
6507
6508 id = READ_ONCE(sqe->personality);
6509 if (id) {
Jens Axboe1e6fa522020-10-15 08:46:24 -06006510 struct io_identity *iod;
6511
Jens Axboe1e6fa522020-10-15 08:46:24 -06006512 iod = idr_find(&ctx->personality_idr, id);
6513 if (unlikely(!iod))
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006514 return -EINVAL;
Jens Axboe1e6fa522020-10-15 08:46:24 -06006515 refcount_inc(&iod->count);
Pavel Begunkovec99ca62020-10-18 10:17:38 +01006516
6517 __io_req_init_async(req);
Jens Axboe1e6fa522020-10-15 08:46:24 -06006518 get_cred(iod->creds);
6519 req->work.identity = iod;
Jens Axboedfead8a2020-10-14 10:12:37 -06006520 req->work.flags |= IO_WQ_WORK_CREDS;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006521 }
6522
6523 /* same numerical values with corresponding REQ_F_*, safe to copy */
Pavel Begunkovc11368a52020-05-17 14:13:42 +03006524 req->flags |= sqe_flags;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006525
Jens Axboe63ff8222020-05-07 14:56:15 -06006526 if (!io_op_defs[req->opcode].needs_file)
6527 return 0;
6528
Pavel Begunkov71b547c2020-10-10 18:34:09 +01006529 ret = io_req_set_file(state, req, READ_ONCE(sqe->fd));
6530 state->ios_left--;
6531 return ret;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006532}
6533
Jens Axboe0f212202020-09-13 13:09:39 -06006534static int io_submit_sqes(struct io_ring_ctx *ctx, unsigned int nr)
Jens Axboe6c271ce2019-01-10 11:22:30 -07006535{
Jens Axboeac8691c2020-06-01 08:30:41 -06006536 struct io_submit_state state;
Jens Axboe9e645e112019-05-10 16:07:28 -06006537 struct io_kiocb *link = NULL;
Jens Axboe9e645e112019-05-10 16:07:28 -06006538 int i, submitted = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006539
Jens Axboec4a2ed72019-11-21 21:01:26 -07006540 /* if we have a backlog and couldn't flush it all, return BUSY */
Jens Axboead3eb2c2019-12-18 17:12:20 -07006541 if (test_bit(0, &ctx->sq_check_overflow)) {
6542 if (!list_empty(&ctx->cq_overflow_list) &&
Jens Axboee6c8aa92020-09-28 13:10:13 -06006543 !io_cqring_overflow_flush(ctx, false, NULL, NULL))
Jens Axboead3eb2c2019-12-18 17:12:20 -07006544 return -EBUSY;
6545 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07006546
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03006547 /* make sure SQ entry isn't read before tail */
6548 nr = min3(nr, ctx->sq_entries, io_sqring_entries(ctx));
Pavel Begunkov9ef4f122019-12-30 21:24:44 +03006549
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03006550 if (!percpu_ref_tryget_many(&ctx->refs, nr))
6551 return -EAGAIN;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006552
Jens Axboed8a6df12020-10-15 16:24:45 -06006553 percpu_counter_add(&current->io_uring->inflight, nr);
Jens Axboefaf7b512020-10-07 12:48:53 -06006554 refcount_add(nr, &current->usage);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006555
Jens Axboe6c271ce2019-01-10 11:22:30 -07006556 io_submit_state_start(&state, ctx, nr);
Pavel Begunkovb14cca02020-01-17 04:45:59 +03006557
Jens Axboe6c271ce2019-01-10 11:22:30 -07006558 for (i = 0; i < nr; i++) {
Jens Axboe3529d8c2019-12-19 18:24:38 -07006559 const struct io_uring_sqe *sqe;
Pavel Begunkov196be952019-11-07 01:41:06 +03006560 struct io_kiocb *req;
Pavel Begunkov1cb1edb2020-02-06 21:16:09 +03006561 int err;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03006562
Pavel Begunkovb1e50e52020-04-08 08:58:44 +03006563 sqe = io_get_sqe(ctx);
6564 if (unlikely(!sqe)) {
6565 io_consume_sqe(ctx);
6566 break;
6567 }
Jens Axboeac8691c2020-06-01 08:30:41 -06006568 req = io_alloc_req(ctx, &state);
Pavel Begunkov196be952019-11-07 01:41:06 +03006569 if (unlikely(!req)) {
6570 if (!submitted)
6571 submitted = -EAGAIN;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03006572 break;
Jens Axboe9e645e112019-05-10 16:07:28 -06006573 }
Pavel Begunkov709b3022020-04-08 08:58:43 +03006574 io_consume_sqe(ctx);
Jens Axboed3656342019-12-18 09:50:26 -07006575 /* will complete beyond this point, count as submitted */
6576 submitted++;
6577
Pavel Begunkov692d8362020-10-10 18:34:13 +01006578 err = io_init_req(ctx, req, sqe, &state);
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006579 if (unlikely(err)) {
Pavel Begunkov1cb1edb2020-02-06 21:16:09 +03006580fail_req:
Jens Axboee1e16092020-06-22 09:17:17 -06006581 io_put_req(req);
6582 io_req_complete(req, err);
Jens Axboed3656342019-12-18 09:50:26 -07006583 break;
6584 }
6585
Jens Axboe354420f2020-01-08 18:55:15 -07006586 trace_io_uring_submit_sqe(ctx, req->opcode, req->user_data,
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03006587 true, io_async_submit(ctx));
Jens Axboef13fad72020-06-22 09:34:30 -06006588 err = io_submit_sqe(req, sqe, &link, &state.comp);
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006589 if (err)
6590 goto fail_req;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006591 }
6592
Pavel Begunkov9466f432020-01-25 22:34:01 +03006593 if (unlikely(submitted != nr)) {
6594 int ref_used = (submitted == -EAGAIN) ? 0 : submitted;
Jens Axboed8a6df12020-10-15 16:24:45 -06006595 struct io_uring_task *tctx = current->io_uring;
6596 int unused = nr - ref_used;
Pavel Begunkov9466f432020-01-25 22:34:01 +03006597
Jens Axboed8a6df12020-10-15 16:24:45 -06006598 percpu_ref_put_many(&ctx->refs, unused);
6599 percpu_counter_sub(&tctx->inflight, unused);
6600 put_task_struct_many(current, unused);
Pavel Begunkov9466f432020-01-25 22:34:01 +03006601 }
Jens Axboe9e645e112019-05-10 16:07:28 -06006602 if (link)
Jens Axboef13fad72020-06-22 09:34:30 -06006603 io_queue_link_head(link, &state.comp);
Jens Axboeac8691c2020-06-01 08:30:41 -06006604 io_submit_state_end(&state);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006605
Pavel Begunkovae9428c2019-11-06 00:22:14 +03006606 /* Commit SQ ring head once we've consumed and submitted all SQEs */
6607 io_commit_sqring(ctx);
6608
Jens Axboe6c271ce2019-01-10 11:22:30 -07006609 return submitted;
6610}
6611
Xiaoguang Wang23b36282020-07-23 20:57:24 +08006612static inline void io_ring_set_wakeup_flag(struct io_ring_ctx *ctx)
6613{
6614 /* Tell userspace we may need a wakeup call */
6615 spin_lock_irq(&ctx->completion_lock);
6616 ctx->rings->sq_flags |= IORING_SQ_NEED_WAKEUP;
6617 spin_unlock_irq(&ctx->completion_lock);
6618}
6619
6620static inline void io_ring_clear_wakeup_flag(struct io_ring_ctx *ctx)
6621{
6622 spin_lock_irq(&ctx->completion_lock);
6623 ctx->rings->sq_flags &= ~IORING_SQ_NEED_WAKEUP;
6624 spin_unlock_irq(&ctx->completion_lock);
6625}
6626
Jens Axboe3f0e64d2020-09-02 12:42:47 -06006627static int io_sq_wake_function(struct wait_queue_entry *wqe, unsigned mode,
6628 int sync, void *key)
Jens Axboe6c271ce2019-01-10 11:22:30 -07006629{
Jens Axboe3f0e64d2020-09-02 12:42:47 -06006630 struct io_ring_ctx *ctx = container_of(wqe, struct io_ring_ctx, sqo_wait_entry);
6631 int ret;
6632
6633 ret = autoremove_wake_function(wqe, mode, sync, key);
6634 if (ret) {
6635 unsigned long flags;
6636
6637 spin_lock_irqsave(&ctx->completion_lock, flags);
6638 ctx->rings->sq_flags &= ~IORING_SQ_NEED_WAKEUP;
6639 spin_unlock_irqrestore(&ctx->completion_lock, flags);
6640 }
6641 return ret;
6642}
6643
Jens Axboec8d1ba52020-09-14 11:07:26 -06006644enum sq_ret {
6645 SQT_IDLE = 1,
6646 SQT_SPIN = 2,
6647 SQT_DID_WORK = 4,
6648};
6649
6650static enum sq_ret __io_sq_thread(struct io_ring_ctx *ctx,
Jens Axboee95eee22020-09-08 09:11:32 -06006651 unsigned long start_jiffies, bool cap_entries)
Jens Axboec8d1ba52020-09-14 11:07:26 -06006652{
6653 unsigned long timeout = start_jiffies + ctx->sq_thread_idle;
Jens Axboe534ca6d2020-09-02 13:52:19 -06006654 struct io_sq_data *sqd = ctx->sq_data;
Jens Axboec8d1ba52020-09-14 11:07:26 -06006655 unsigned int to_submit;
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08006656 int ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006657
Jens Axboec8d1ba52020-09-14 11:07:26 -06006658again:
6659 if (!list_empty(&ctx->iopoll_list)) {
6660 unsigned nr_events = 0;
Jackie Liua4c0b3d2019-07-08 13:41:12 +08006661
Jens Axboec8d1ba52020-09-14 11:07:26 -06006662 mutex_lock(&ctx->uring_lock);
6663 if (!list_empty(&ctx->iopoll_list) && !need_resched())
6664 io_do_iopoll(ctx, &nr_events, 0);
6665 mutex_unlock(&ctx->uring_lock);
6666 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07006667
Jens Axboec8d1ba52020-09-14 11:07:26 -06006668 to_submit = io_sqring_entries(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006669
Jens Axboec8d1ba52020-09-14 11:07:26 -06006670 /*
6671 * If submit got -EBUSY, flag us as needing the application
6672 * to enter the kernel to reap and flush events.
6673 */
6674 if (!to_submit || ret == -EBUSY || need_resched()) {
6675 /*
6676 * Drop cur_mm before scheduling, we can't hold it for
6677 * long periods (or over schedule()). Do this before
6678 * adding ourselves to the waitqueue, as the unuse/drop
6679 * may sleep.
6680 */
6681 io_sq_thread_drop_mm();
Jens Axboe6c271ce2019-01-10 11:22:30 -07006682
Jens Axboec8d1ba52020-09-14 11:07:26 -06006683 /*
6684 * We're polling. If we're within the defined idle
6685 * period, then let us spin without work before going
6686 * to sleep. The exception is if we got EBUSY doing
6687 * more IO, we should wait for the application to
6688 * reap events and wake us up.
6689 */
6690 if (!list_empty(&ctx->iopoll_list) || need_resched() ||
6691 (!time_after(jiffies, timeout) && ret != -EBUSY &&
6692 !percpu_ref_is_dying(&ctx->refs)))
6693 return SQT_SPIN;
6694
Jens Axboe534ca6d2020-09-02 13:52:19 -06006695 prepare_to_wait(&sqd->wait, &ctx->sqo_wait_entry,
Jens Axboec8d1ba52020-09-14 11:07:26 -06006696 TASK_INTERRUPTIBLE);
6697
6698 /*
6699 * While doing polled IO, before going to sleep, we need
6700 * to check if there are new reqs added to iopoll_list,
6701 * it is because reqs may have been punted to io worker
6702 * and will be added to iopoll_list later, hence check
6703 * the iopoll_list again.
6704 */
6705 if ((ctx->flags & IORING_SETUP_IOPOLL) &&
6706 !list_empty_careful(&ctx->iopoll_list)) {
Jens Axboe534ca6d2020-09-02 13:52:19 -06006707 finish_wait(&sqd->wait, &ctx->sqo_wait_entry);
Jens Axboec8d1ba52020-09-14 11:07:26 -06006708 goto again;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006709 }
6710
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03006711 to_submit = io_sqring_entries(ctx);
Jens Axboec8d1ba52020-09-14 11:07:26 -06006712 if (!to_submit || ret == -EBUSY)
6713 return SQT_IDLE;
6714 }
6715
Jens Axboe534ca6d2020-09-02 13:52:19 -06006716 finish_wait(&sqd->wait, &ctx->sqo_wait_entry);
Jens Axboec8d1ba52020-09-14 11:07:26 -06006717 io_ring_clear_wakeup_flag(ctx);
6718
Jens Axboee95eee22020-09-08 09:11:32 -06006719 /* if we're handling multiple rings, cap submit size for fairness */
6720 if (cap_entries && to_submit > 8)
6721 to_submit = 8;
6722
Jens Axboec8d1ba52020-09-14 11:07:26 -06006723 mutex_lock(&ctx->uring_lock);
6724 if (likely(!percpu_ref_is_dying(&ctx->refs)))
6725 ret = io_submit_sqes(ctx, to_submit);
6726 mutex_unlock(&ctx->uring_lock);
Jens Axboe90554202020-09-03 12:12:41 -06006727
6728 if (!io_sqring_full(ctx) && wq_has_sleeper(&ctx->sqo_sq_wait))
6729 wake_up(&ctx->sqo_sq_wait);
6730
Jens Axboec8d1ba52020-09-14 11:07:26 -06006731 return SQT_DID_WORK;
6732}
6733
Jens Axboe69fb2132020-09-14 11:16:23 -06006734static void io_sqd_init_new(struct io_sq_data *sqd)
6735{
6736 struct io_ring_ctx *ctx;
6737
6738 while (!list_empty(&sqd->ctx_new_list)) {
6739 ctx = list_first_entry(&sqd->ctx_new_list, struct io_ring_ctx, sqd_list);
6740 init_wait(&ctx->sqo_wait_entry);
6741 ctx->sqo_wait_entry.func = io_sq_wake_function;
6742 list_move_tail(&ctx->sqd_list, &sqd->ctx_list);
6743 complete(&ctx->sq_thread_comp);
6744 }
6745}
6746
Jens Axboe6c271ce2019-01-10 11:22:30 -07006747static int io_sq_thread(void *data)
6748{
Dennis Zhou91d8f512020-09-16 13:41:05 -07006749 struct cgroup_subsys_state *cur_css = NULL;
Jens Axboe69fb2132020-09-14 11:16:23 -06006750 const struct cred *old_cred = NULL;
6751 struct io_sq_data *sqd = data;
6752 struct io_ring_ctx *ctx;
Jens Axboec8d1ba52020-09-14 11:07:26 -06006753 unsigned long start_jiffies;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006754
Jens Axboec8d1ba52020-09-14 11:07:26 -06006755 start_jiffies = jiffies;
Jens Axboe69fb2132020-09-14 11:16:23 -06006756 while (!kthread_should_stop()) {
6757 enum sq_ret ret = 0;
Jens Axboee95eee22020-09-08 09:11:32 -06006758 bool cap_entries;
Jens Axboec1edbf52019-11-10 16:56:04 -07006759
6760 /*
Jens Axboe69fb2132020-09-14 11:16:23 -06006761 * Any changes to the sqd lists are synchronized through the
6762 * kthread parking. This synchronizes the thread vs users,
6763 * the users are synchronized on the sqd->ctx_lock.
Jens Axboec1edbf52019-11-10 16:56:04 -07006764 */
Jens Axboe69fb2132020-09-14 11:16:23 -06006765 if (kthread_should_park())
6766 kthread_parkme();
6767
6768 if (unlikely(!list_empty(&sqd->ctx_new_list)))
6769 io_sqd_init_new(sqd);
6770
Jens Axboee95eee22020-09-08 09:11:32 -06006771 cap_entries = !list_is_singular(&sqd->ctx_list);
6772
Jens Axboe69fb2132020-09-14 11:16:23 -06006773 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list) {
6774 if (current->cred != ctx->creds) {
6775 if (old_cred)
6776 revert_creds(old_cred);
6777 old_cred = override_creds(ctx->creds);
6778 }
Dennis Zhou91d8f512020-09-16 13:41:05 -07006779 io_sq_thread_associate_blkcg(ctx, &cur_css);
Jens Axboe4ea33a92020-10-15 13:46:44 -06006780#ifdef CONFIG_AUDIT
6781 current->loginuid = ctx->loginuid;
6782 current->sessionid = ctx->sessionid;
6783#endif
Jens Axboe69fb2132020-09-14 11:16:23 -06006784
Jens Axboee95eee22020-09-08 09:11:32 -06006785 ret |= __io_sq_thread(ctx, start_jiffies, cap_entries);
Jens Axboe69fb2132020-09-14 11:16:23 -06006786
Jens Axboe4349f302020-07-09 15:07:01 -06006787 io_sq_thread_drop_mm();
Jens Axboe6c271ce2019-01-10 11:22:30 -07006788 }
6789
Jens Axboe69fb2132020-09-14 11:16:23 -06006790 if (ret & SQT_SPIN) {
Jens Axboec8d1ba52020-09-14 11:07:26 -06006791 io_run_task_work();
6792 cond_resched();
Jens Axboe69fb2132020-09-14 11:16:23 -06006793 } else if (ret == SQT_IDLE) {
6794 if (kthread_should_park())
6795 continue;
6796 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
6797 io_ring_set_wakeup_flag(ctx);
6798 schedule();
6799 start_jiffies = jiffies;
6800 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
6801 io_ring_clear_wakeup_flag(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006802 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07006803 }
6804
Jens Axboe4c6e2772020-07-01 11:29:10 -06006805 io_run_task_work();
Jens Axboeb41e9852020-02-17 09:52:41 -07006806
Dennis Zhou91d8f512020-09-16 13:41:05 -07006807 if (cur_css)
6808 io_sq_thread_unassociate_blkcg();
Jens Axboe69fb2132020-09-14 11:16:23 -06006809 if (old_cred)
6810 revert_creds(old_cred);
Jens Axboe06058632019-04-13 09:26:03 -06006811
Roman Penyaev2bbcd6d2019-05-16 10:53:57 +02006812 kthread_parkme();
Jens Axboe06058632019-04-13 09:26:03 -06006813
Jens Axboe6c271ce2019-01-10 11:22:30 -07006814 return 0;
6815}
6816
Jens Axboebda52162019-09-24 13:47:15 -06006817struct io_wait_queue {
6818 struct wait_queue_entry wq;
6819 struct io_ring_ctx *ctx;
6820 unsigned to_wait;
6821 unsigned nr_timeouts;
6822};
6823
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006824static inline bool io_should_wake(struct io_wait_queue *iowq, bool noflush)
Jens Axboebda52162019-09-24 13:47:15 -06006825{
6826 struct io_ring_ctx *ctx = iowq->ctx;
6827
6828 /*
Brian Gianforcarod195a662019-12-13 03:09:50 -08006829 * Wake up if we have enough events, or if a timeout occurred since we
Jens Axboebda52162019-09-24 13:47:15 -06006830 * started waiting. For timeouts, we always want to return to userspace,
6831 * regardless of event count.
6832 */
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006833 return io_cqring_events(ctx, noflush) >= iowq->to_wait ||
Jens Axboebda52162019-09-24 13:47:15 -06006834 atomic_read(&ctx->cq_timeouts) != iowq->nr_timeouts;
6835}
6836
6837static int io_wake_function(struct wait_queue_entry *curr, unsigned int mode,
6838 int wake_flags, void *key)
6839{
6840 struct io_wait_queue *iowq = container_of(curr, struct io_wait_queue,
6841 wq);
6842
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006843 /* use noflush == true, as we can't safely rely on locking context */
6844 if (!io_should_wake(iowq, true))
Jens Axboebda52162019-09-24 13:47:15 -06006845 return -1;
6846
6847 return autoremove_wake_function(curr, mode, wake_flags, key);
6848}
6849
Jens Axboeaf9c1a42020-09-24 13:32:18 -06006850static int io_run_task_work_sig(void)
6851{
6852 if (io_run_task_work())
6853 return 1;
6854 if (!signal_pending(current))
6855 return 0;
Jens Axboe792ee0f62020-10-22 20:17:18 -06006856 if (test_tsk_thread_flag(current, TIF_NOTIFY_SIGNAL))
6857 return -ERESTARTSYS;
Jens Axboeaf9c1a42020-09-24 13:32:18 -06006858 return -EINTR;
6859}
6860
Jens Axboe2b188cc2019-01-07 10:46:33 -07006861/*
6862 * Wait until events become available, if we don't already have some. The
6863 * application must reap them itself, as they reside on the shared cq ring.
6864 */
6865static int io_cqring_wait(struct io_ring_ctx *ctx, int min_events,
6866 const sigset_t __user *sig, size_t sigsz)
6867{
Jens Axboebda52162019-09-24 13:47:15 -06006868 struct io_wait_queue iowq = {
6869 .wq = {
6870 .private = current,
6871 .func = io_wake_function,
6872 .entry = LIST_HEAD_INIT(iowq.wq.entry),
6873 },
6874 .ctx = ctx,
6875 .to_wait = min_events,
6876 };
Hristo Venev75b28af2019-08-26 17:23:46 +00006877 struct io_rings *rings = ctx->rings;
Jackie Liue9ffa5c2019-10-29 11:16:42 +08006878 int ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006879
Jens Axboeb41e9852020-02-17 09:52:41 -07006880 do {
6881 if (io_cqring_events(ctx, false) >= min_events)
6882 return 0;
Jens Axboe4c6e2772020-07-01 11:29:10 -06006883 if (!io_run_task_work())
Jens Axboeb41e9852020-02-17 09:52:41 -07006884 break;
Jens Axboeb41e9852020-02-17 09:52:41 -07006885 } while (1);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006886
6887 if (sig) {
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01006888#ifdef CONFIG_COMPAT
6889 if (in_compat_syscall())
6890 ret = set_compat_user_sigmask((const compat_sigset_t __user *)sig,
Oleg Nesterovb7724342019-07-16 16:29:53 -07006891 sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01006892 else
6893#endif
Oleg Nesterovb7724342019-07-16 16:29:53 -07006894 ret = set_user_sigmask(sig, sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01006895
Jens Axboe2b188cc2019-01-07 10:46:33 -07006896 if (ret)
6897 return ret;
6898 }
6899
Jens Axboebda52162019-09-24 13:47:15 -06006900 iowq.nr_timeouts = atomic_read(&ctx->cq_timeouts);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02006901 trace_io_uring_cqring_wait(ctx, min_events);
Jens Axboebda52162019-09-24 13:47:15 -06006902 do {
6903 prepare_to_wait_exclusive(&ctx->wait, &iowq.wq,
6904 TASK_INTERRUPTIBLE);
Jens Axboece593a62020-06-30 12:39:05 -06006905 /* make sure we run task_work before checking for signals */
Jens Axboeaf9c1a42020-09-24 13:32:18 -06006906 ret = io_run_task_work_sig();
6907 if (ret > 0)
Jens Axboe4c6e2772020-07-01 11:29:10 -06006908 continue;
Jens Axboeaf9c1a42020-09-24 13:32:18 -06006909 else if (ret < 0)
Jens Axboece593a62020-06-30 12:39:05 -06006910 break;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006911 if (io_should_wake(&iowq, false))
Jens Axboebda52162019-09-24 13:47:15 -06006912 break;
6913 schedule();
Jens Axboebda52162019-09-24 13:47:15 -06006914 } while (1);
6915 finish_wait(&ctx->wait, &iowq.wq);
6916
Jens Axboeb7db41c2020-07-04 08:55:50 -06006917 restore_saved_sigmask_unless(ret == -EINTR);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006918
Hristo Venev75b28af2019-08-26 17:23:46 +00006919 return READ_ONCE(rings->cq.head) == READ_ONCE(rings->cq.tail) ? ret : 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006920}
6921
Jens Axboe6b063142019-01-10 22:13:58 -07006922static void __io_sqe_files_unregister(struct io_ring_ctx *ctx)
6923{
6924#if defined(CONFIG_UNIX)
6925 if (ctx->ring_sock) {
6926 struct sock *sock = ctx->ring_sock->sk;
6927 struct sk_buff *skb;
6928
6929 while ((skb = skb_dequeue(&sock->sk_receive_queue)) != NULL)
6930 kfree_skb(skb);
6931 }
6932#else
6933 int i;
6934
Jens Axboe65e19f52019-10-26 07:20:21 -06006935 for (i = 0; i < ctx->nr_user_files; i++) {
6936 struct file *file;
6937
6938 file = io_file_from_index(ctx, i);
6939 if (file)
6940 fput(file);
6941 }
Jens Axboe6b063142019-01-10 22:13:58 -07006942#endif
6943}
6944
Jens Axboe05f3fb32019-12-09 11:22:50 -07006945static void io_file_ref_kill(struct percpu_ref *ref)
6946{
6947 struct fixed_file_data *data;
6948
6949 data = container_of(ref, struct fixed_file_data, refs);
6950 complete(&data->done);
6951}
6952
Jens Axboe6b063142019-01-10 22:13:58 -07006953static int io_sqe_files_unregister(struct io_ring_ctx *ctx)
6954{
Jens Axboe05f3fb32019-12-09 11:22:50 -07006955 struct fixed_file_data *data = ctx->file_data;
Xiaoguang Wang05589552020-03-31 14:05:18 +08006956 struct fixed_file_ref_node *ref_node = NULL;
Jens Axboe65e19f52019-10-26 07:20:21 -06006957 unsigned nr_tables, i;
6958
Jens Axboe05f3fb32019-12-09 11:22:50 -07006959 if (!data)
Jens Axboe6b063142019-01-10 22:13:58 -07006960 return -ENXIO;
6961
Jens Axboe6a4d07c2020-05-15 14:30:38 -06006962 spin_lock(&data->lock);
Pavel Begunkov1e5d7702020-11-18 14:56:25 +00006963 ref_node = data->node;
Jens Axboe6a4d07c2020-05-15 14:30:38 -06006964 spin_unlock(&data->lock);
Xiaoguang Wang05589552020-03-31 14:05:18 +08006965 if (ref_node)
6966 percpu_ref_kill(&ref_node->refs);
6967
6968 percpu_ref_kill(&data->refs);
6969
6970 /* wait for all refs nodes to complete */
Jens Axboe4a38aed22020-05-14 17:21:15 -06006971 flush_delayed_work(&ctx->file_put_work);
Jens Axboe2faf8522020-02-04 19:54:55 -07006972 wait_for_completion(&data->done);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006973
Jens Axboe6b063142019-01-10 22:13:58 -07006974 __io_sqe_files_unregister(ctx);
Jens Axboe65e19f52019-10-26 07:20:21 -06006975 nr_tables = DIV_ROUND_UP(ctx->nr_user_files, IORING_MAX_FILES_TABLE);
6976 for (i = 0; i < nr_tables; i++)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006977 kfree(data->table[i].files);
6978 kfree(data->table);
Xiaoguang Wang05589552020-03-31 14:05:18 +08006979 percpu_ref_exit(&data->refs);
6980 kfree(data);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006981 ctx->file_data = NULL;
Jens Axboe6b063142019-01-10 22:13:58 -07006982 ctx->nr_user_files = 0;
6983 return 0;
6984}
6985
Jens Axboe534ca6d2020-09-02 13:52:19 -06006986static void io_put_sq_data(struct io_sq_data *sqd)
Jens Axboe6c271ce2019-01-10 11:22:30 -07006987{
Jens Axboe534ca6d2020-09-02 13:52:19 -06006988 if (refcount_dec_and_test(&sqd->refs)) {
Roman Penyaev2bbcd6d2019-05-16 10:53:57 +02006989 /*
6990 * The park is a bit of a work-around, without it we get
6991 * warning spews on shutdown with SQPOLL set and affinity
6992 * set to a single CPU.
6993 */
Jens Axboe534ca6d2020-09-02 13:52:19 -06006994 if (sqd->thread) {
6995 kthread_park(sqd->thread);
6996 kthread_stop(sqd->thread);
6997 }
6998
6999 kfree(sqd);
7000 }
7001}
7002
Jens Axboeaa061652020-09-02 14:50:27 -06007003static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
7004{
7005 struct io_ring_ctx *ctx_attach;
7006 struct io_sq_data *sqd;
7007 struct fd f;
7008
7009 f = fdget(p->wq_fd);
7010 if (!f.file)
7011 return ERR_PTR(-ENXIO);
7012 if (f.file->f_op != &io_uring_fops) {
7013 fdput(f);
7014 return ERR_PTR(-EINVAL);
7015 }
7016
7017 ctx_attach = f.file->private_data;
7018 sqd = ctx_attach->sq_data;
7019 if (!sqd) {
7020 fdput(f);
7021 return ERR_PTR(-EINVAL);
7022 }
7023
7024 refcount_inc(&sqd->refs);
7025 fdput(f);
7026 return sqd;
7027}
7028
Jens Axboe534ca6d2020-09-02 13:52:19 -06007029static struct io_sq_data *io_get_sq_data(struct io_uring_params *p)
7030{
7031 struct io_sq_data *sqd;
7032
Jens Axboeaa061652020-09-02 14:50:27 -06007033 if (p->flags & IORING_SETUP_ATTACH_WQ)
7034 return io_attach_sq_data(p);
7035
Jens Axboe534ca6d2020-09-02 13:52:19 -06007036 sqd = kzalloc(sizeof(*sqd), GFP_KERNEL);
7037 if (!sqd)
7038 return ERR_PTR(-ENOMEM);
7039
7040 refcount_set(&sqd->refs, 1);
Jens Axboe69fb2132020-09-14 11:16:23 -06007041 INIT_LIST_HEAD(&sqd->ctx_list);
7042 INIT_LIST_HEAD(&sqd->ctx_new_list);
7043 mutex_init(&sqd->ctx_lock);
7044 mutex_init(&sqd->lock);
Jens Axboe534ca6d2020-09-02 13:52:19 -06007045 init_waitqueue_head(&sqd->wait);
7046 return sqd;
7047}
7048
Jens Axboe69fb2132020-09-14 11:16:23 -06007049static void io_sq_thread_unpark(struct io_sq_data *sqd)
7050 __releases(&sqd->lock)
7051{
7052 if (!sqd->thread)
7053 return;
7054 kthread_unpark(sqd->thread);
7055 mutex_unlock(&sqd->lock);
7056}
7057
7058static void io_sq_thread_park(struct io_sq_data *sqd)
7059 __acquires(&sqd->lock)
7060{
7061 if (!sqd->thread)
7062 return;
7063 mutex_lock(&sqd->lock);
7064 kthread_park(sqd->thread);
7065}
7066
Jens Axboe534ca6d2020-09-02 13:52:19 -06007067static void io_sq_thread_stop(struct io_ring_ctx *ctx)
7068{
7069 struct io_sq_data *sqd = ctx->sq_data;
7070
7071 if (sqd) {
7072 if (sqd->thread) {
7073 /*
7074 * We may arrive here from the error branch in
7075 * io_sq_offload_create() where the kthread is created
7076 * without being waked up, thus wake it up now to make
7077 * sure the wait will complete.
7078 */
7079 wake_up_process(sqd->thread);
7080 wait_for_completion(&ctx->sq_thread_comp);
Jens Axboe69fb2132020-09-14 11:16:23 -06007081
7082 io_sq_thread_park(sqd);
7083 }
7084
7085 mutex_lock(&sqd->ctx_lock);
7086 list_del(&ctx->sqd_list);
7087 mutex_unlock(&sqd->ctx_lock);
7088
7089 if (sqd->thread) {
7090 finish_wait(&sqd->wait, &ctx->sqo_wait_entry);
7091 io_sq_thread_unpark(sqd);
Jens Axboe534ca6d2020-09-02 13:52:19 -06007092 }
7093
7094 io_put_sq_data(sqd);
7095 ctx->sq_data = NULL;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007096 }
7097}
7098
Jens Axboe6b063142019-01-10 22:13:58 -07007099static void io_finish_async(struct io_ring_ctx *ctx)
7100{
Jens Axboe6c271ce2019-01-10 11:22:30 -07007101 io_sq_thread_stop(ctx);
7102
Jens Axboe561fb042019-10-24 07:25:42 -06007103 if (ctx->io_wq) {
7104 io_wq_destroy(ctx->io_wq);
7105 ctx->io_wq = NULL;
Jens Axboe6b063142019-01-10 22:13:58 -07007106 }
7107}
7108
7109#if defined(CONFIG_UNIX)
Jens Axboe6b063142019-01-10 22:13:58 -07007110/*
7111 * Ensure the UNIX gc is aware of our file set, so we are certain that
7112 * the io_uring can be safely unregistered on process exit, even if we have
7113 * loops in the file referencing.
7114 */
7115static int __io_sqe_files_scm(struct io_ring_ctx *ctx, int nr, int offset)
7116{
7117 struct sock *sk = ctx->ring_sock->sk;
7118 struct scm_fp_list *fpl;
7119 struct sk_buff *skb;
Jens Axboe08a45172019-10-03 08:11:03 -06007120 int i, nr_files;
Jens Axboe6b063142019-01-10 22:13:58 -07007121
Jens Axboe6b063142019-01-10 22:13:58 -07007122 fpl = kzalloc(sizeof(*fpl), GFP_KERNEL);
7123 if (!fpl)
7124 return -ENOMEM;
7125
7126 skb = alloc_skb(0, GFP_KERNEL);
7127 if (!skb) {
7128 kfree(fpl);
7129 return -ENOMEM;
7130 }
7131
7132 skb->sk = sk;
Jens Axboe6b063142019-01-10 22:13:58 -07007133
Jens Axboe08a45172019-10-03 08:11:03 -06007134 nr_files = 0;
Jens Axboe6b063142019-01-10 22:13:58 -07007135 fpl->user = get_uid(ctx->user);
7136 for (i = 0; i < nr; i++) {
Jens Axboe65e19f52019-10-26 07:20:21 -06007137 struct file *file = io_file_from_index(ctx, i + offset);
7138
7139 if (!file)
Jens Axboe08a45172019-10-03 08:11:03 -06007140 continue;
Jens Axboe65e19f52019-10-26 07:20:21 -06007141 fpl->fp[nr_files] = get_file(file);
Jens Axboe08a45172019-10-03 08:11:03 -06007142 unix_inflight(fpl->user, fpl->fp[nr_files]);
7143 nr_files++;
Jens Axboe6b063142019-01-10 22:13:58 -07007144 }
7145
Jens Axboe08a45172019-10-03 08:11:03 -06007146 if (nr_files) {
7147 fpl->max = SCM_MAX_FD;
7148 fpl->count = nr_files;
7149 UNIXCB(skb).fp = fpl;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007150 skb->destructor = unix_destruct_scm;
Jens Axboe08a45172019-10-03 08:11:03 -06007151 refcount_add(skb->truesize, &sk->sk_wmem_alloc);
7152 skb_queue_head(&sk->sk_receive_queue, skb);
Jens Axboe6b063142019-01-10 22:13:58 -07007153
Jens Axboe08a45172019-10-03 08:11:03 -06007154 for (i = 0; i < nr_files; i++)
7155 fput(fpl->fp[i]);
7156 } else {
7157 kfree_skb(skb);
7158 kfree(fpl);
7159 }
Jens Axboe6b063142019-01-10 22:13:58 -07007160
7161 return 0;
7162}
7163
7164/*
7165 * If UNIX sockets are enabled, fd passing can cause a reference cycle which
7166 * causes regular reference counting to break down. We rely on the UNIX
7167 * garbage collection to take care of this problem for us.
7168 */
7169static int io_sqe_files_scm(struct io_ring_ctx *ctx)
7170{
7171 unsigned left, total;
7172 int ret = 0;
7173
7174 total = 0;
7175 left = ctx->nr_user_files;
7176 while (left) {
7177 unsigned this_files = min_t(unsigned, left, SCM_MAX_FD);
Jens Axboe6b063142019-01-10 22:13:58 -07007178
7179 ret = __io_sqe_files_scm(ctx, this_files, total);
7180 if (ret)
7181 break;
7182 left -= this_files;
7183 total += this_files;
7184 }
7185
7186 if (!ret)
7187 return 0;
7188
7189 while (total < ctx->nr_user_files) {
Jens Axboe65e19f52019-10-26 07:20:21 -06007190 struct file *file = io_file_from_index(ctx, total);
7191
7192 if (file)
7193 fput(file);
Jens Axboe6b063142019-01-10 22:13:58 -07007194 total++;
7195 }
7196
7197 return ret;
7198}
7199#else
7200static int io_sqe_files_scm(struct io_ring_ctx *ctx)
7201{
7202 return 0;
7203}
7204#endif
7205
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007206static int io_sqe_alloc_file_tables(struct fixed_file_data *file_data,
7207 unsigned nr_tables, unsigned nr_files)
Jens Axboe65e19f52019-10-26 07:20:21 -06007208{
7209 int i;
7210
7211 for (i = 0; i < nr_tables; i++) {
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007212 struct fixed_file_table *table = &file_data->table[i];
Jens Axboe65e19f52019-10-26 07:20:21 -06007213 unsigned this_files;
7214
7215 this_files = min(nr_files, IORING_MAX_FILES_TABLE);
7216 table->files = kcalloc(this_files, sizeof(struct file *),
7217 GFP_KERNEL);
7218 if (!table->files)
7219 break;
7220 nr_files -= this_files;
7221 }
7222
7223 if (i == nr_tables)
7224 return 0;
7225
7226 for (i = 0; i < nr_tables; i++) {
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007227 struct fixed_file_table *table = &file_data->table[i];
Jens Axboe65e19f52019-10-26 07:20:21 -06007228 kfree(table->files);
7229 }
7230 return 1;
7231}
7232
Jens Axboe05f3fb32019-12-09 11:22:50 -07007233static void io_ring_file_put(struct io_ring_ctx *ctx, struct file *file)
Jens Axboec3a31e62019-10-03 13:59:56 -06007234{
7235#if defined(CONFIG_UNIX)
Jens Axboec3a31e62019-10-03 13:59:56 -06007236 struct sock *sock = ctx->ring_sock->sk;
7237 struct sk_buff_head list, *head = &sock->sk_receive_queue;
7238 struct sk_buff *skb;
7239 int i;
7240
7241 __skb_queue_head_init(&list);
7242
7243 /*
7244 * Find the skb that holds this file in its SCM_RIGHTS. When found,
7245 * remove this entry and rearrange the file array.
7246 */
7247 skb = skb_dequeue(head);
7248 while (skb) {
7249 struct scm_fp_list *fp;
7250
7251 fp = UNIXCB(skb).fp;
7252 for (i = 0; i < fp->count; i++) {
7253 int left;
7254
7255 if (fp->fp[i] != file)
7256 continue;
7257
7258 unix_notinflight(fp->user, fp->fp[i]);
7259 left = fp->count - 1 - i;
7260 if (left) {
7261 memmove(&fp->fp[i], &fp->fp[i + 1],
7262 left * sizeof(struct file *));
7263 }
7264 fp->count--;
7265 if (!fp->count) {
7266 kfree_skb(skb);
7267 skb = NULL;
7268 } else {
7269 __skb_queue_tail(&list, skb);
7270 }
7271 fput(file);
7272 file = NULL;
7273 break;
7274 }
7275
7276 if (!file)
7277 break;
7278
7279 __skb_queue_tail(&list, skb);
7280
7281 skb = skb_dequeue(head);
7282 }
7283
7284 if (skb_peek(&list)) {
7285 spin_lock_irq(&head->lock);
7286 while ((skb = __skb_dequeue(&list)) != NULL)
7287 __skb_queue_tail(head, skb);
7288 spin_unlock_irq(&head->lock);
7289 }
7290#else
Jens Axboe05f3fb32019-12-09 11:22:50 -07007291 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06007292#endif
7293}
7294
Jens Axboe05f3fb32019-12-09 11:22:50 -07007295struct io_file_put {
Xiaoguang Wang05589552020-03-31 14:05:18 +08007296 struct list_head list;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007297 struct file *file;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007298};
7299
Jens Axboe4a38aed22020-05-14 17:21:15 -06007300static void __io_file_put_work(struct fixed_file_ref_node *ref_node)
Jens Axboe05f3fb32019-12-09 11:22:50 -07007301{
Jens Axboe4a38aed22020-05-14 17:21:15 -06007302 struct fixed_file_data *file_data = ref_node->file_data;
7303 struct io_ring_ctx *ctx = file_data->ctx;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007304 struct io_file_put *pfile, *tmp;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007305
7306 list_for_each_entry_safe(pfile, tmp, &ref_node->file_list, list) {
Jens Axboe6a4d07c2020-05-15 14:30:38 -06007307 list_del(&pfile->list);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007308 io_ring_file_put(ctx, pfile->file);
7309 kfree(pfile);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007310 }
7311
Xiaoguang Wang05589552020-03-31 14:05:18 +08007312 percpu_ref_exit(&ref_node->refs);
7313 kfree(ref_node);
7314 percpu_ref_put(&file_data->refs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007315}
7316
Jens Axboe4a38aed22020-05-14 17:21:15 -06007317static void io_file_put_work(struct work_struct *work)
7318{
7319 struct io_ring_ctx *ctx;
7320 struct llist_node *node;
7321
7322 ctx = container_of(work, struct io_ring_ctx, file_put_work.work);
7323 node = llist_del_all(&ctx->file_put_llist);
7324
7325 while (node) {
7326 struct fixed_file_ref_node *ref_node;
7327 struct llist_node *next = node->next;
7328
7329 ref_node = llist_entry(node, struct fixed_file_ref_node, llist);
7330 __io_file_put_work(ref_node);
7331 node = next;
7332 }
7333}
7334
Jens Axboe05f3fb32019-12-09 11:22:50 -07007335static void io_file_data_ref_zero(struct percpu_ref *ref)
7336{
Xiaoguang Wang05589552020-03-31 14:05:18 +08007337 struct fixed_file_ref_node *ref_node;
Pavel Begunkove2978222020-11-18 14:56:26 +00007338 struct fixed_file_data *data;
Jens Axboe4a38aed22020-05-14 17:21:15 -06007339 struct io_ring_ctx *ctx;
Pavel Begunkove2978222020-11-18 14:56:26 +00007340 bool first_add = false;
Jens Axboe4a38aed22020-05-14 17:21:15 -06007341 int delay = HZ;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007342
Xiaoguang Wang05589552020-03-31 14:05:18 +08007343 ref_node = container_of(ref, struct fixed_file_ref_node, refs);
Pavel Begunkove2978222020-11-18 14:56:26 +00007344 data = ref_node->file_data;
7345 ctx = data->ctx;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007346
Pavel Begunkove2978222020-11-18 14:56:26 +00007347 spin_lock(&data->lock);
7348 ref_node->done = true;
7349
7350 while (!list_empty(&data->ref_list)) {
7351 ref_node = list_first_entry(&data->ref_list,
7352 struct fixed_file_ref_node, node);
7353 /* recycle ref nodes in order */
7354 if (!ref_node->done)
7355 break;
7356 list_del(&ref_node->node);
7357 first_add |= llist_add(&ref_node->llist, &ctx->file_put_llist);
7358 }
7359 spin_unlock(&data->lock);
7360
7361 if (percpu_ref_is_dying(&data->refs))
Jens Axboe4a38aed22020-05-14 17:21:15 -06007362 delay = 0;
7363
Jens Axboe4a38aed22020-05-14 17:21:15 -06007364 if (!delay)
7365 mod_delayed_work(system_wq, &ctx->file_put_work, 0);
7366 else if (first_add)
7367 queue_delayed_work(system_wq, &ctx->file_put_work, delay);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007368}
7369
7370static struct fixed_file_ref_node *alloc_fixed_file_ref_node(
7371 struct io_ring_ctx *ctx)
7372{
7373 struct fixed_file_ref_node *ref_node;
7374
7375 ref_node = kzalloc(sizeof(*ref_node), GFP_KERNEL);
7376 if (!ref_node)
7377 return ERR_PTR(-ENOMEM);
7378
7379 if (percpu_ref_init(&ref_node->refs, io_file_data_ref_zero,
7380 0, GFP_KERNEL)) {
7381 kfree(ref_node);
7382 return ERR_PTR(-ENOMEM);
7383 }
7384 INIT_LIST_HEAD(&ref_node->node);
7385 INIT_LIST_HEAD(&ref_node->file_list);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007386 ref_node->file_data = ctx->file_data;
Pavel Begunkove2978222020-11-18 14:56:26 +00007387 ref_node->done = false;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007388 return ref_node;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007389}
7390
7391static void destroy_fixed_file_ref_node(struct fixed_file_ref_node *ref_node)
7392{
7393 percpu_ref_exit(&ref_node->refs);
7394 kfree(ref_node);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007395}
7396
7397static int io_sqe_files_register(struct io_ring_ctx *ctx, void __user *arg,
7398 unsigned nr_args)
7399{
7400 __s32 __user *fds = (__s32 __user *) arg;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007401 unsigned nr_tables, i;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007402 struct file *file;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007403 int fd, ret = -ENOMEM;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007404 struct fixed_file_ref_node *ref_node;
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007405 struct fixed_file_data *file_data;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007406
7407 if (ctx->file_data)
7408 return -EBUSY;
7409 if (!nr_args)
7410 return -EINVAL;
7411 if (nr_args > IORING_MAX_FIXED_FILES)
7412 return -EMFILE;
7413
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007414 file_data = kzalloc(sizeof(*ctx->file_data), GFP_KERNEL);
7415 if (!file_data)
Jens Axboe05f3fb32019-12-09 11:22:50 -07007416 return -ENOMEM;
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007417 file_data->ctx = ctx;
7418 init_completion(&file_data->done);
7419 INIT_LIST_HEAD(&file_data->ref_list);
7420 spin_lock_init(&file_data->lock);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007421
7422 nr_tables = DIV_ROUND_UP(nr_args, IORING_MAX_FILES_TABLE);
Colin Ian King035fbaf2020-10-12 15:03:41 +01007423 file_data->table = kcalloc(nr_tables, sizeof(*file_data->table),
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007424 GFP_KERNEL);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007425 if (!file_data->table)
7426 goto out_free;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007427
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007428 if (percpu_ref_init(&file_data->refs, io_file_ref_kill,
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007429 PERCPU_REF_ALLOW_REINIT, GFP_KERNEL))
7430 goto out_free;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007431
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007432 if (io_sqe_alloc_file_tables(file_data, nr_tables, nr_args))
7433 goto out_ref;
Jens Axboe55cbc252020-10-14 07:35:57 -06007434 ctx->file_data = file_data;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007435
7436 for (i = 0; i < nr_args; i++, ctx->nr_user_files++) {
7437 struct fixed_file_table *table;
7438 unsigned index;
7439
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007440 if (copy_from_user(&fd, &fds[i], sizeof(fd))) {
7441 ret = -EFAULT;
7442 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007443 }
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007444 /* allow sparse sets */
7445 if (fd == -1)
7446 continue;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007447
Jens Axboe05f3fb32019-12-09 11:22:50 -07007448 file = fget(fd);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007449 ret = -EBADF;
7450 if (!file)
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007451 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007452
7453 /*
7454 * Don't allow io_uring instances to be registered. If UNIX
7455 * isn't enabled, then this causes a reference cycle and this
7456 * instance can never get freed. If UNIX is enabled we'll
7457 * handle it just fine, but there's still no point in allowing
7458 * a ring fd as it doesn't support regular read/write anyway.
7459 */
7460 if (file->f_op == &io_uring_fops) {
7461 fput(file);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007462 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007463 }
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007464 table = &file_data->table[i >> IORING_FILE_TABLE_SHIFT];
7465 index = i & IORING_FILE_TABLE_MASK;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007466 table->files[index] = file;
7467 }
7468
Jens Axboe05f3fb32019-12-09 11:22:50 -07007469 ret = io_sqe_files_scm(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007470 if (ret) {
Jens Axboe05f3fb32019-12-09 11:22:50 -07007471 io_sqe_files_unregister(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007472 return ret;
7473 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07007474
Xiaoguang Wang05589552020-03-31 14:05:18 +08007475 ref_node = alloc_fixed_file_ref_node(ctx);
7476 if (IS_ERR(ref_node)) {
7477 io_sqe_files_unregister(ctx);
7478 return PTR_ERR(ref_node);
7479 }
7480
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007481 file_data->node = ref_node;
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007482 spin_lock(&file_data->lock);
Pavel Begunkove2978222020-11-18 14:56:26 +00007483 list_add_tail(&ref_node->node, &file_data->ref_list);
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007484 spin_unlock(&file_data->lock);
7485 percpu_ref_get(&file_data->refs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007486 return ret;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007487out_fput:
7488 for (i = 0; i < ctx->nr_user_files; i++) {
7489 file = io_file_from_index(ctx, i);
7490 if (file)
7491 fput(file);
7492 }
7493 for (i = 0; i < nr_tables; i++)
7494 kfree(file_data->table[i].files);
7495 ctx->nr_user_files = 0;
7496out_ref:
7497 percpu_ref_exit(&file_data->refs);
7498out_free:
7499 kfree(file_data->table);
7500 kfree(file_data);
Jens Axboe55cbc252020-10-14 07:35:57 -06007501 ctx->file_data = NULL;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007502 return ret;
7503}
7504
Jens Axboec3a31e62019-10-03 13:59:56 -06007505static int io_sqe_file_register(struct io_ring_ctx *ctx, struct file *file,
7506 int index)
7507{
7508#if defined(CONFIG_UNIX)
7509 struct sock *sock = ctx->ring_sock->sk;
7510 struct sk_buff_head *head = &sock->sk_receive_queue;
7511 struct sk_buff *skb;
7512
7513 /*
7514 * See if we can merge this file into an existing skb SCM_RIGHTS
7515 * file set. If there's no room, fall back to allocating a new skb
7516 * and filling it in.
7517 */
7518 spin_lock_irq(&head->lock);
7519 skb = skb_peek(head);
7520 if (skb) {
7521 struct scm_fp_list *fpl = UNIXCB(skb).fp;
7522
7523 if (fpl->count < SCM_MAX_FD) {
7524 __skb_unlink(skb, head);
7525 spin_unlock_irq(&head->lock);
7526 fpl->fp[fpl->count] = get_file(file);
7527 unix_inflight(fpl->user, fpl->fp[fpl->count]);
7528 fpl->count++;
7529 spin_lock_irq(&head->lock);
7530 __skb_queue_head(head, skb);
7531 } else {
7532 skb = NULL;
7533 }
7534 }
7535 spin_unlock_irq(&head->lock);
7536
7537 if (skb) {
7538 fput(file);
7539 return 0;
7540 }
7541
7542 return __io_sqe_files_scm(ctx, 1, index);
7543#else
7544 return 0;
7545#endif
7546}
7547
Hillf Dantona5318d32020-03-23 17:47:15 +08007548static int io_queue_file_removal(struct fixed_file_data *data,
Xiaoguang Wang05589552020-03-31 14:05:18 +08007549 struct file *file)
Jens Axboe05f3fb32019-12-09 11:22:50 -07007550{
Hillf Dantona5318d32020-03-23 17:47:15 +08007551 struct io_file_put *pfile;
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007552 struct fixed_file_ref_node *ref_node = data->node;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007553
Jens Axboe05f3fb32019-12-09 11:22:50 -07007554 pfile = kzalloc(sizeof(*pfile), GFP_KERNEL);
Hillf Dantona5318d32020-03-23 17:47:15 +08007555 if (!pfile)
7556 return -ENOMEM;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007557
7558 pfile->file = file;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007559 list_add(&pfile->list, &ref_node->file_list);
7560
Hillf Dantona5318d32020-03-23 17:47:15 +08007561 return 0;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007562}
7563
7564static int __io_sqe_files_update(struct io_ring_ctx *ctx,
7565 struct io_uring_files_update *up,
7566 unsigned nr_args)
7567{
7568 struct fixed_file_data *data = ctx->file_data;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007569 struct fixed_file_ref_node *ref_node;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007570 struct file *file;
Jens Axboec3a31e62019-10-03 13:59:56 -06007571 __s32 __user *fds;
7572 int fd, i, err;
7573 __u32 done;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007574 bool needs_switch = false;
Jens Axboec3a31e62019-10-03 13:59:56 -06007575
Jens Axboe05f3fb32019-12-09 11:22:50 -07007576 if (check_add_overflow(up->offset, nr_args, &done))
Jens Axboec3a31e62019-10-03 13:59:56 -06007577 return -EOVERFLOW;
7578 if (done > ctx->nr_user_files)
7579 return -EINVAL;
7580
Xiaoguang Wang05589552020-03-31 14:05:18 +08007581 ref_node = alloc_fixed_file_ref_node(ctx);
7582 if (IS_ERR(ref_node))
7583 return PTR_ERR(ref_node);
7584
Jens Axboec3a31e62019-10-03 13:59:56 -06007585 done = 0;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007586 fds = u64_to_user_ptr(up->fds);
Jens Axboec3a31e62019-10-03 13:59:56 -06007587 while (nr_args) {
Jens Axboe65e19f52019-10-26 07:20:21 -06007588 struct fixed_file_table *table;
7589 unsigned index;
7590
Jens Axboec3a31e62019-10-03 13:59:56 -06007591 err = 0;
7592 if (copy_from_user(&fd, &fds[done], sizeof(fd))) {
7593 err = -EFAULT;
7594 break;
7595 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07007596 i = array_index_nospec(up->offset, ctx->nr_user_files);
7597 table = &ctx->file_data->table[i >> IORING_FILE_TABLE_SHIFT];
Jens Axboe65e19f52019-10-26 07:20:21 -06007598 index = i & IORING_FILE_TABLE_MASK;
7599 if (table->files[index]) {
Jiufei Xue98dfd502020-09-01 13:35:02 +08007600 file = table->files[index];
Hillf Dantona5318d32020-03-23 17:47:15 +08007601 err = io_queue_file_removal(data, file);
7602 if (err)
7603 break;
Jens Axboe65e19f52019-10-26 07:20:21 -06007604 table->files[index] = NULL;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007605 needs_switch = true;
Jens Axboec3a31e62019-10-03 13:59:56 -06007606 }
7607 if (fd != -1) {
Jens Axboec3a31e62019-10-03 13:59:56 -06007608 file = fget(fd);
7609 if (!file) {
7610 err = -EBADF;
7611 break;
7612 }
7613 /*
7614 * Don't allow io_uring instances to be registered. If
7615 * UNIX isn't enabled, then this causes a reference
7616 * cycle and this instance can never get freed. If UNIX
7617 * is enabled we'll handle it just fine, but there's
7618 * still no point in allowing a ring fd as it doesn't
7619 * support regular read/write anyway.
7620 */
7621 if (file->f_op == &io_uring_fops) {
7622 fput(file);
7623 err = -EBADF;
7624 break;
7625 }
Jens Axboe65e19f52019-10-26 07:20:21 -06007626 table->files[index] = file;
Jens Axboec3a31e62019-10-03 13:59:56 -06007627 err = io_sqe_file_register(ctx, file, i);
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00007628 if (err) {
Jiufei Xue95d1c8e2020-09-02 17:59:39 +08007629 table->files[index] = NULL;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00007630 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06007631 break;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00007632 }
Jens Axboec3a31e62019-10-03 13:59:56 -06007633 }
7634 nr_args--;
7635 done++;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007636 up->offset++;
7637 }
7638
Xiaoguang Wang05589552020-03-31 14:05:18 +08007639 if (needs_switch) {
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007640 percpu_ref_kill(&data->node->refs);
Jens Axboe6a4d07c2020-05-15 14:30:38 -06007641 spin_lock(&data->lock);
Pavel Begunkove2978222020-11-18 14:56:26 +00007642 list_add_tail(&ref_node->node, &data->ref_list);
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007643 data->node = ref_node;
Jens Axboe6a4d07c2020-05-15 14:30:38 -06007644 spin_unlock(&data->lock);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007645 percpu_ref_get(&ctx->file_data->refs);
7646 } else
7647 destroy_fixed_file_ref_node(ref_node);
Jens Axboec3a31e62019-10-03 13:59:56 -06007648
7649 return done ? done : err;
7650}
Xiaoguang Wang05589552020-03-31 14:05:18 +08007651
Jens Axboe05f3fb32019-12-09 11:22:50 -07007652static int io_sqe_files_update(struct io_ring_ctx *ctx, void __user *arg,
7653 unsigned nr_args)
7654{
7655 struct io_uring_files_update up;
7656
7657 if (!ctx->file_data)
7658 return -ENXIO;
7659 if (!nr_args)
7660 return -EINVAL;
7661 if (copy_from_user(&up, arg, sizeof(up)))
7662 return -EFAULT;
7663 if (up.resv)
7664 return -EINVAL;
7665
7666 return __io_sqe_files_update(ctx, &up, nr_args);
7667}
Jens Axboec3a31e62019-10-03 13:59:56 -06007668
Pavel Begunkove9fd9392020-03-04 16:14:12 +03007669static void io_free_work(struct io_wq_work *work)
Jens Axboe7d723062019-11-12 22:31:31 -07007670{
7671 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
7672
Pavel Begunkove9fd9392020-03-04 16:14:12 +03007673 /* Consider that io_steal_work() relies on this ref */
Jens Axboe7d723062019-11-12 22:31:31 -07007674 io_put_req(req);
7675}
7676
Pavel Begunkov24369c22020-01-28 03:15:48 +03007677static int io_init_wq_offload(struct io_ring_ctx *ctx,
7678 struct io_uring_params *p)
7679{
7680 struct io_wq_data data;
7681 struct fd f;
7682 struct io_ring_ctx *ctx_attach;
7683 unsigned int concurrency;
7684 int ret = 0;
7685
7686 data.user = ctx->user;
Pavel Begunkove9fd9392020-03-04 16:14:12 +03007687 data.free_work = io_free_work;
Pavel Begunkovf5fa38c2020-06-08 21:08:20 +03007688 data.do_work = io_wq_submit_work;
Pavel Begunkov24369c22020-01-28 03:15:48 +03007689
7690 if (!(p->flags & IORING_SETUP_ATTACH_WQ)) {
7691 /* Do QD, or 4 * CPUS, whatever is smallest */
7692 concurrency = min(ctx->sq_entries, 4 * num_online_cpus());
7693
7694 ctx->io_wq = io_wq_create(concurrency, &data);
7695 if (IS_ERR(ctx->io_wq)) {
7696 ret = PTR_ERR(ctx->io_wq);
7697 ctx->io_wq = NULL;
7698 }
7699 return ret;
7700 }
7701
7702 f = fdget(p->wq_fd);
7703 if (!f.file)
7704 return -EBADF;
7705
7706 if (f.file->f_op != &io_uring_fops) {
7707 ret = -EINVAL;
7708 goto out_fput;
7709 }
7710
7711 ctx_attach = f.file->private_data;
7712 /* @io_wq is protected by holding the fd */
7713 if (!io_wq_get(ctx_attach->io_wq, &data)) {
7714 ret = -EINVAL;
7715 goto out_fput;
7716 }
7717
7718 ctx->io_wq = ctx_attach->io_wq;
7719out_fput:
7720 fdput(f);
7721 return ret;
7722}
7723
Jens Axboe0f212202020-09-13 13:09:39 -06007724static int io_uring_alloc_task_context(struct task_struct *task)
7725{
7726 struct io_uring_task *tctx;
Jens Axboed8a6df12020-10-15 16:24:45 -06007727 int ret;
Jens Axboe0f212202020-09-13 13:09:39 -06007728
7729 tctx = kmalloc(sizeof(*tctx), GFP_KERNEL);
7730 if (unlikely(!tctx))
7731 return -ENOMEM;
7732
Jens Axboed8a6df12020-10-15 16:24:45 -06007733 ret = percpu_counter_init(&tctx->inflight, 0, GFP_KERNEL);
7734 if (unlikely(ret)) {
7735 kfree(tctx);
7736 return ret;
7737 }
7738
Jens Axboe0f212202020-09-13 13:09:39 -06007739 xa_init(&tctx->xa);
7740 init_waitqueue_head(&tctx->wait);
7741 tctx->last = NULL;
Jens Axboefdaf0832020-10-30 09:37:30 -06007742 atomic_set(&tctx->in_idle, 0);
7743 tctx->sqpoll = false;
Jens Axboe500a3732020-10-15 17:38:03 -06007744 io_init_identity(&tctx->__identity);
7745 tctx->identity = &tctx->__identity;
Jens Axboe0f212202020-09-13 13:09:39 -06007746 task->io_uring = tctx;
7747 return 0;
7748}
7749
7750void __io_uring_free(struct task_struct *tsk)
7751{
7752 struct io_uring_task *tctx = tsk->io_uring;
7753
7754 WARN_ON_ONCE(!xa_empty(&tctx->xa));
Jens Axboe500a3732020-10-15 17:38:03 -06007755 WARN_ON_ONCE(refcount_read(&tctx->identity->count) != 1);
7756 if (tctx->identity != &tctx->__identity)
7757 kfree(tctx->identity);
Jens Axboed8a6df12020-10-15 16:24:45 -06007758 percpu_counter_destroy(&tctx->inflight);
Jens Axboe0f212202020-09-13 13:09:39 -06007759 kfree(tctx);
7760 tsk->io_uring = NULL;
7761}
7762
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02007763static int io_sq_offload_create(struct io_ring_ctx *ctx,
7764 struct io_uring_params *p)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007765{
7766 int ret;
7767
Jens Axboe6c271ce2019-01-10 11:22:30 -07007768 if (ctx->flags & IORING_SETUP_SQPOLL) {
Jens Axboe534ca6d2020-09-02 13:52:19 -06007769 struct io_sq_data *sqd;
7770
Jens Axboe3ec482d2019-04-08 10:51:01 -06007771 ret = -EPERM;
7772 if (!capable(CAP_SYS_ADMIN))
7773 goto err;
7774
Jens Axboe534ca6d2020-09-02 13:52:19 -06007775 sqd = io_get_sq_data(p);
7776 if (IS_ERR(sqd)) {
7777 ret = PTR_ERR(sqd);
7778 goto err;
7779 }
Jens Axboe69fb2132020-09-14 11:16:23 -06007780
Jens Axboe534ca6d2020-09-02 13:52:19 -06007781 ctx->sq_data = sqd;
Jens Axboe69fb2132020-09-14 11:16:23 -06007782 io_sq_thread_park(sqd);
7783 mutex_lock(&sqd->ctx_lock);
7784 list_add(&ctx->sqd_list, &sqd->ctx_new_list);
7785 mutex_unlock(&sqd->ctx_lock);
7786 io_sq_thread_unpark(sqd);
Jens Axboe534ca6d2020-09-02 13:52:19 -06007787
Jens Axboe917257d2019-04-13 09:28:55 -06007788 ctx->sq_thread_idle = msecs_to_jiffies(p->sq_thread_idle);
7789 if (!ctx->sq_thread_idle)
7790 ctx->sq_thread_idle = HZ;
7791
Jens Axboeaa061652020-09-02 14:50:27 -06007792 if (sqd->thread)
7793 goto done;
7794
Jens Axboe6c271ce2019-01-10 11:22:30 -07007795 if (p->flags & IORING_SETUP_SQ_AFF) {
Jens Axboe44a9bd12019-05-14 20:00:30 -06007796 int cpu = p->sq_thread_cpu;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007797
Jens Axboe917257d2019-04-13 09:28:55 -06007798 ret = -EINVAL;
Jens Axboe44a9bd12019-05-14 20:00:30 -06007799 if (cpu >= nr_cpu_ids)
7800 goto err;
Shenghui Wang7889f442019-05-07 16:03:19 +08007801 if (!cpu_online(cpu))
Jens Axboe917257d2019-04-13 09:28:55 -06007802 goto err;
7803
Jens Axboe69fb2132020-09-14 11:16:23 -06007804 sqd->thread = kthread_create_on_cpu(io_sq_thread, sqd,
Jens Axboe534ca6d2020-09-02 13:52:19 -06007805 cpu, "io_uring-sq");
Jens Axboe6c271ce2019-01-10 11:22:30 -07007806 } else {
Jens Axboe69fb2132020-09-14 11:16:23 -06007807 sqd->thread = kthread_create(io_sq_thread, sqd,
Jens Axboe6c271ce2019-01-10 11:22:30 -07007808 "io_uring-sq");
7809 }
Jens Axboe534ca6d2020-09-02 13:52:19 -06007810 if (IS_ERR(sqd->thread)) {
7811 ret = PTR_ERR(sqd->thread);
7812 sqd->thread = NULL;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007813 goto err;
7814 }
Jens Axboe534ca6d2020-09-02 13:52:19 -06007815 ret = io_uring_alloc_task_context(sqd->thread);
Jens Axboe0f212202020-09-13 13:09:39 -06007816 if (ret)
7817 goto err;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007818 } else if (p->flags & IORING_SETUP_SQ_AFF) {
7819 /* Can't have SQ_AFF without SQPOLL */
7820 ret = -EINVAL;
7821 goto err;
7822 }
7823
Jens Axboeaa061652020-09-02 14:50:27 -06007824done:
Pavel Begunkov24369c22020-01-28 03:15:48 +03007825 ret = io_init_wq_offload(ctx, p);
7826 if (ret)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007827 goto err;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007828
7829 return 0;
7830err:
Jens Axboe54a91f32019-09-10 09:15:04 -06007831 io_finish_async(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007832 return ret;
7833}
7834
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02007835static void io_sq_offload_start(struct io_ring_ctx *ctx)
7836{
Jens Axboe534ca6d2020-09-02 13:52:19 -06007837 struct io_sq_data *sqd = ctx->sq_data;
7838
7839 if ((ctx->flags & IORING_SETUP_SQPOLL) && sqd->thread)
7840 wake_up_process(sqd->thread);
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02007841}
7842
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007843static inline void __io_unaccount_mem(struct user_struct *user,
7844 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007845{
7846 atomic_long_sub(nr_pages, &user->locked_vm);
7847}
7848
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007849static inline int __io_account_mem(struct user_struct *user,
7850 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007851{
7852 unsigned long page_limit, cur_pages, new_pages;
7853
7854 /* Don't allow more pages than we can safely lock */
7855 page_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
7856
7857 do {
7858 cur_pages = atomic_long_read(&user->locked_vm);
7859 new_pages = cur_pages + nr_pages;
7860 if (new_pages > page_limit)
7861 return -ENOMEM;
7862 } while (atomic_long_cmpxchg(&user->locked_vm, cur_pages,
7863 new_pages) != cur_pages);
7864
7865 return 0;
7866}
7867
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007868static void io_unaccount_mem(struct io_ring_ctx *ctx, unsigned long nr_pages,
7869 enum io_mem_account acct)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007870{
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07007871 if (ctx->limit_mem)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007872 __io_unaccount_mem(ctx->user, nr_pages);
Bijan Mottahedeh30975822020-06-16 16:36:09 -07007873
Jens Axboe2aede0e2020-09-14 10:45:53 -06007874 if (ctx->mm_account) {
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007875 if (acct == ACCT_LOCKED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007876 ctx->mm_account->locked_vm -= nr_pages;
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007877 else if (acct == ACCT_PINNED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007878 atomic64_sub(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007879 }
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007880}
7881
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007882static int io_account_mem(struct io_ring_ctx *ctx, unsigned long nr_pages,
7883 enum io_mem_account acct)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007884{
Bijan Mottahedeh30975822020-06-16 16:36:09 -07007885 int ret;
7886
7887 if (ctx->limit_mem) {
7888 ret = __io_account_mem(ctx->user, nr_pages);
7889 if (ret)
7890 return ret;
7891 }
7892
Jens Axboe2aede0e2020-09-14 10:45:53 -06007893 if (ctx->mm_account) {
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007894 if (acct == ACCT_LOCKED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007895 ctx->mm_account->locked_vm += nr_pages;
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007896 else if (acct == ACCT_PINNED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007897 atomic64_add(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007898 }
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007899
7900 return 0;
7901}
7902
Jens Axboe2b188cc2019-01-07 10:46:33 -07007903static void io_mem_free(void *ptr)
7904{
Mark Rutland52e04ef2019-04-30 17:30:21 +01007905 struct page *page;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007906
Mark Rutland52e04ef2019-04-30 17:30:21 +01007907 if (!ptr)
7908 return;
7909
7910 page = virt_to_head_page(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007911 if (put_page_testzero(page))
7912 free_compound_page(page);
7913}
7914
7915static void *io_mem_alloc(size_t size)
7916{
7917 gfp_t gfp_flags = GFP_KERNEL | __GFP_ZERO | __GFP_NOWARN | __GFP_COMP |
7918 __GFP_NORETRY;
7919
7920 return (void *) __get_free_pages(gfp_flags, get_order(size));
7921}
7922
Hristo Venev75b28af2019-08-26 17:23:46 +00007923static unsigned long rings_size(unsigned sq_entries, unsigned cq_entries,
7924 size_t *sq_offset)
7925{
7926 struct io_rings *rings;
7927 size_t off, sq_array_size;
7928
7929 off = struct_size(rings, cqes, cq_entries);
7930 if (off == SIZE_MAX)
7931 return SIZE_MAX;
7932
7933#ifdef CONFIG_SMP
7934 off = ALIGN(off, SMP_CACHE_BYTES);
7935 if (off == 0)
7936 return SIZE_MAX;
7937#endif
7938
Dmitry Vyukovb36200f2020-07-11 11:31:11 +02007939 if (sq_offset)
7940 *sq_offset = off;
7941
Hristo Venev75b28af2019-08-26 17:23:46 +00007942 sq_array_size = array_size(sizeof(u32), sq_entries);
7943 if (sq_array_size == SIZE_MAX)
7944 return SIZE_MAX;
7945
7946 if (check_add_overflow(off, sq_array_size, &off))
7947 return SIZE_MAX;
7948
Hristo Venev75b28af2019-08-26 17:23:46 +00007949 return off;
7950}
7951
Jens Axboe2b188cc2019-01-07 10:46:33 -07007952static unsigned long ring_pages(unsigned sq_entries, unsigned cq_entries)
7953{
Hristo Venev75b28af2019-08-26 17:23:46 +00007954 size_t pages;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007955
Hristo Venev75b28af2019-08-26 17:23:46 +00007956 pages = (size_t)1 << get_order(
7957 rings_size(sq_entries, cq_entries, NULL));
7958 pages += (size_t)1 << get_order(
7959 array_size(sizeof(struct io_uring_sqe), sq_entries));
Jens Axboe2b188cc2019-01-07 10:46:33 -07007960
Hristo Venev75b28af2019-08-26 17:23:46 +00007961 return pages;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007962}
7963
Jens Axboeedafcce2019-01-09 09:16:05 -07007964static int io_sqe_buffer_unregister(struct io_ring_ctx *ctx)
7965{
7966 int i, j;
7967
7968 if (!ctx->user_bufs)
7969 return -ENXIO;
7970
7971 for (i = 0; i < ctx->nr_user_bufs; i++) {
7972 struct io_mapped_ubuf *imu = &ctx->user_bufs[i];
7973
7974 for (j = 0; j < imu->nr_bvecs; j++)
John Hubbardf1f6a7d2020-01-30 22:13:35 -08007975 unpin_user_page(imu->bvec[j].bv_page);
Jens Axboeedafcce2019-01-09 09:16:05 -07007976
Jens Axboede293932020-09-17 16:19:16 -06007977 if (imu->acct_pages)
7978 io_unaccount_mem(ctx, imu->acct_pages, ACCT_PINNED);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01007979 kvfree(imu->bvec);
Jens Axboeedafcce2019-01-09 09:16:05 -07007980 imu->nr_bvecs = 0;
7981 }
7982
7983 kfree(ctx->user_bufs);
7984 ctx->user_bufs = NULL;
7985 ctx->nr_user_bufs = 0;
7986 return 0;
7987}
7988
7989static int io_copy_iov(struct io_ring_ctx *ctx, struct iovec *dst,
7990 void __user *arg, unsigned index)
7991{
7992 struct iovec __user *src;
7993
7994#ifdef CONFIG_COMPAT
7995 if (ctx->compat) {
7996 struct compat_iovec __user *ciovs;
7997 struct compat_iovec ciov;
7998
7999 ciovs = (struct compat_iovec __user *) arg;
8000 if (copy_from_user(&ciov, &ciovs[index], sizeof(ciov)))
8001 return -EFAULT;
8002
Jens Axboed55e5f52019-12-11 16:12:15 -07008003 dst->iov_base = u64_to_user_ptr((u64)ciov.iov_base);
Jens Axboeedafcce2019-01-09 09:16:05 -07008004 dst->iov_len = ciov.iov_len;
8005 return 0;
8006 }
8007#endif
8008 src = (struct iovec __user *) arg;
8009 if (copy_from_user(dst, &src[index], sizeof(*dst)))
8010 return -EFAULT;
8011 return 0;
8012}
8013
Jens Axboede293932020-09-17 16:19:16 -06008014/*
8015 * Not super efficient, but this is just a registration time. And we do cache
8016 * the last compound head, so generally we'll only do a full search if we don't
8017 * match that one.
8018 *
8019 * We check if the given compound head page has already been accounted, to
8020 * avoid double accounting it. This allows us to account the full size of the
8021 * page, not just the constituent pages of a huge page.
8022 */
8023static bool headpage_already_acct(struct io_ring_ctx *ctx, struct page **pages,
8024 int nr_pages, struct page *hpage)
8025{
8026 int i, j;
8027
8028 /* check current page array */
8029 for (i = 0; i < nr_pages; i++) {
8030 if (!PageCompound(pages[i]))
8031 continue;
8032 if (compound_head(pages[i]) == hpage)
8033 return true;
8034 }
8035
8036 /* check previously registered pages */
8037 for (i = 0; i < ctx->nr_user_bufs; i++) {
8038 struct io_mapped_ubuf *imu = &ctx->user_bufs[i];
8039
8040 for (j = 0; j < imu->nr_bvecs; j++) {
8041 if (!PageCompound(imu->bvec[j].bv_page))
8042 continue;
8043 if (compound_head(imu->bvec[j].bv_page) == hpage)
8044 return true;
8045 }
8046 }
8047
8048 return false;
8049}
8050
8051static int io_buffer_account_pin(struct io_ring_ctx *ctx, struct page **pages,
8052 int nr_pages, struct io_mapped_ubuf *imu,
8053 struct page **last_hpage)
8054{
8055 int i, ret;
8056
8057 for (i = 0; i < nr_pages; i++) {
8058 if (!PageCompound(pages[i])) {
8059 imu->acct_pages++;
8060 } else {
8061 struct page *hpage;
8062
8063 hpage = compound_head(pages[i]);
8064 if (hpage == *last_hpage)
8065 continue;
8066 *last_hpage = hpage;
8067 if (headpage_already_acct(ctx, pages, i, hpage))
8068 continue;
8069 imu->acct_pages += page_size(hpage) >> PAGE_SHIFT;
8070 }
8071 }
8072
8073 if (!imu->acct_pages)
8074 return 0;
8075
8076 ret = io_account_mem(ctx, imu->acct_pages, ACCT_PINNED);
8077 if (ret)
8078 imu->acct_pages = 0;
8079 return ret;
8080}
8081
Jens Axboeedafcce2019-01-09 09:16:05 -07008082static int io_sqe_buffer_register(struct io_ring_ctx *ctx, void __user *arg,
8083 unsigned nr_args)
8084{
8085 struct vm_area_struct **vmas = NULL;
8086 struct page **pages = NULL;
Jens Axboede293932020-09-17 16:19:16 -06008087 struct page *last_hpage = NULL;
Jens Axboeedafcce2019-01-09 09:16:05 -07008088 int i, j, got_pages = 0;
8089 int ret = -EINVAL;
8090
8091 if (ctx->user_bufs)
8092 return -EBUSY;
8093 if (!nr_args || nr_args > UIO_MAXIOV)
8094 return -EINVAL;
8095
8096 ctx->user_bufs = kcalloc(nr_args, sizeof(struct io_mapped_ubuf),
8097 GFP_KERNEL);
8098 if (!ctx->user_bufs)
8099 return -ENOMEM;
8100
8101 for (i = 0; i < nr_args; i++) {
8102 struct io_mapped_ubuf *imu = &ctx->user_bufs[i];
8103 unsigned long off, start, end, ubuf;
8104 int pret, nr_pages;
8105 struct iovec iov;
8106 size_t size;
8107
8108 ret = io_copy_iov(ctx, &iov, arg, i);
8109 if (ret)
Pavel Begunkova2786822019-05-26 12:35:47 +03008110 goto err;
Jens Axboeedafcce2019-01-09 09:16:05 -07008111
8112 /*
8113 * Don't impose further limits on the size and buffer
8114 * constraints here, we'll -EINVAL later when IO is
8115 * submitted if they are wrong.
8116 */
8117 ret = -EFAULT;
8118 if (!iov.iov_base || !iov.iov_len)
8119 goto err;
8120
8121 /* arbitrary limit, but we need something */
8122 if (iov.iov_len > SZ_1G)
8123 goto err;
8124
8125 ubuf = (unsigned long) iov.iov_base;
8126 end = (ubuf + iov.iov_len + PAGE_SIZE - 1) >> PAGE_SHIFT;
8127 start = ubuf >> PAGE_SHIFT;
8128 nr_pages = end - start;
8129
Jens Axboeedafcce2019-01-09 09:16:05 -07008130 ret = 0;
8131 if (!pages || nr_pages > got_pages) {
Denis Efremova8c73c12020-06-05 12:32:03 +03008132 kvfree(vmas);
8133 kvfree(pages);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008134 pages = kvmalloc_array(nr_pages, sizeof(struct page *),
Jens Axboeedafcce2019-01-09 09:16:05 -07008135 GFP_KERNEL);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008136 vmas = kvmalloc_array(nr_pages,
Jens Axboeedafcce2019-01-09 09:16:05 -07008137 sizeof(struct vm_area_struct *),
8138 GFP_KERNEL);
8139 if (!pages || !vmas) {
8140 ret = -ENOMEM;
Jens Axboeedafcce2019-01-09 09:16:05 -07008141 goto err;
8142 }
8143 got_pages = nr_pages;
8144 }
8145
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008146 imu->bvec = kvmalloc_array(nr_pages, sizeof(struct bio_vec),
Jens Axboeedafcce2019-01-09 09:16:05 -07008147 GFP_KERNEL);
8148 ret = -ENOMEM;
Jens Axboede293932020-09-17 16:19:16 -06008149 if (!imu->bvec)
Jens Axboeedafcce2019-01-09 09:16:05 -07008150 goto err;
Jens Axboeedafcce2019-01-09 09:16:05 -07008151
8152 ret = 0;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -07008153 mmap_read_lock(current->mm);
John Hubbard2113b052020-01-30 22:13:13 -08008154 pret = pin_user_pages(ubuf, nr_pages,
Ira Weiny932f4a62019-05-13 17:17:03 -07008155 FOLL_WRITE | FOLL_LONGTERM,
8156 pages, vmas);
Jens Axboeedafcce2019-01-09 09:16:05 -07008157 if (pret == nr_pages) {
8158 /* don't support file backed memory */
8159 for (j = 0; j < nr_pages; j++) {
8160 struct vm_area_struct *vma = vmas[j];
8161
8162 if (vma->vm_file &&
8163 !is_file_hugepages(vma->vm_file)) {
8164 ret = -EOPNOTSUPP;
8165 break;
8166 }
8167 }
8168 } else {
8169 ret = pret < 0 ? pret : -EFAULT;
8170 }
Michel Lespinassed8ed45c2020-06-08 21:33:25 -07008171 mmap_read_unlock(current->mm);
Jens Axboeedafcce2019-01-09 09:16:05 -07008172 if (ret) {
8173 /*
8174 * if we did partial map, or found file backed vmas,
8175 * release any pages we did get
8176 */
John Hubbard27c4d3a2019-08-04 19:32:06 -07008177 if (pret > 0)
John Hubbardf1f6a7d2020-01-30 22:13:35 -08008178 unpin_user_pages(pages, pret);
Jens Axboede293932020-09-17 16:19:16 -06008179 kvfree(imu->bvec);
8180 goto err;
8181 }
8182
8183 ret = io_buffer_account_pin(ctx, pages, pret, imu, &last_hpage);
8184 if (ret) {
8185 unpin_user_pages(pages, pret);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008186 kvfree(imu->bvec);
Jens Axboeedafcce2019-01-09 09:16:05 -07008187 goto err;
8188 }
8189
8190 off = ubuf & ~PAGE_MASK;
8191 size = iov.iov_len;
8192 for (j = 0; j < nr_pages; j++) {
8193 size_t vec_len;
8194
8195 vec_len = min_t(size_t, size, PAGE_SIZE - off);
8196 imu->bvec[j].bv_page = pages[j];
8197 imu->bvec[j].bv_len = vec_len;
8198 imu->bvec[j].bv_offset = off;
8199 off = 0;
8200 size -= vec_len;
8201 }
8202 /* store original address for later verification */
8203 imu->ubuf = ubuf;
8204 imu->len = iov.iov_len;
8205 imu->nr_bvecs = nr_pages;
8206
8207 ctx->nr_user_bufs++;
8208 }
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008209 kvfree(pages);
8210 kvfree(vmas);
Jens Axboeedafcce2019-01-09 09:16:05 -07008211 return 0;
8212err:
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008213 kvfree(pages);
8214 kvfree(vmas);
Jens Axboeedafcce2019-01-09 09:16:05 -07008215 io_sqe_buffer_unregister(ctx);
8216 return ret;
8217}
8218
Jens Axboe9b402842019-04-11 11:45:41 -06008219static int io_eventfd_register(struct io_ring_ctx *ctx, void __user *arg)
8220{
8221 __s32 __user *fds = arg;
8222 int fd;
8223
8224 if (ctx->cq_ev_fd)
8225 return -EBUSY;
8226
8227 if (copy_from_user(&fd, fds, sizeof(*fds)))
8228 return -EFAULT;
8229
8230 ctx->cq_ev_fd = eventfd_ctx_fdget(fd);
8231 if (IS_ERR(ctx->cq_ev_fd)) {
8232 int ret = PTR_ERR(ctx->cq_ev_fd);
8233 ctx->cq_ev_fd = NULL;
8234 return ret;
8235 }
8236
8237 return 0;
8238}
8239
8240static int io_eventfd_unregister(struct io_ring_ctx *ctx)
8241{
8242 if (ctx->cq_ev_fd) {
8243 eventfd_ctx_put(ctx->cq_ev_fd);
8244 ctx->cq_ev_fd = NULL;
8245 return 0;
8246 }
8247
8248 return -ENXIO;
8249}
8250
Jens Axboe5a2e7452020-02-23 16:23:11 -07008251static int __io_destroy_buffers(int id, void *p, void *data)
8252{
8253 struct io_ring_ctx *ctx = data;
8254 struct io_buffer *buf = p;
8255
Jens Axboe067524e2020-03-02 16:32:28 -07008256 __io_remove_buffers(ctx, buf, id, -1U);
Jens Axboe5a2e7452020-02-23 16:23:11 -07008257 return 0;
8258}
8259
8260static void io_destroy_buffers(struct io_ring_ctx *ctx)
8261{
8262 idr_for_each(&ctx->io_buffer_idr, __io_destroy_buffers, ctx);
8263 idr_destroy(&ctx->io_buffer_idr);
8264}
8265
Jens Axboe2b188cc2019-01-07 10:46:33 -07008266static void io_ring_ctx_free(struct io_ring_ctx *ctx)
8267{
Jens Axboe6b063142019-01-10 22:13:58 -07008268 io_finish_async(ctx);
Jens Axboeedafcce2019-01-09 09:16:05 -07008269 io_sqe_buffer_unregister(ctx);
Jens Axboe2aede0e2020-09-14 10:45:53 -06008270
8271 if (ctx->sqo_task) {
8272 put_task_struct(ctx->sqo_task);
8273 ctx->sqo_task = NULL;
8274 mmdrop(ctx->mm_account);
8275 ctx->mm_account = NULL;
Bijan Mottahedeh30975822020-06-16 16:36:09 -07008276 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07008277
Dennis Zhou91d8f512020-09-16 13:41:05 -07008278#ifdef CONFIG_BLK_CGROUP
8279 if (ctx->sqo_blkcg_css)
8280 css_put(ctx->sqo_blkcg_css);
8281#endif
8282
Jens Axboe6b063142019-01-10 22:13:58 -07008283 io_sqe_files_unregister(ctx);
Jens Axboe9b402842019-04-11 11:45:41 -06008284 io_eventfd_unregister(ctx);
Jens Axboe5a2e7452020-02-23 16:23:11 -07008285 io_destroy_buffers(ctx);
Jens Axboe41726c92020-02-23 13:11:42 -07008286 idr_destroy(&ctx->personality_idr);
Jens Axboedef596e2019-01-09 08:59:42 -07008287
Jens Axboe2b188cc2019-01-07 10:46:33 -07008288#if defined(CONFIG_UNIX)
Eric Biggers355e8d22019-06-12 14:58:43 -07008289 if (ctx->ring_sock) {
8290 ctx->ring_sock->file = NULL; /* so that iput() is called */
Jens Axboe2b188cc2019-01-07 10:46:33 -07008291 sock_release(ctx->ring_sock);
Eric Biggers355e8d22019-06-12 14:58:43 -07008292 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07008293#endif
8294
Hristo Venev75b28af2019-08-26 17:23:46 +00008295 io_mem_free(ctx->rings);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008296 io_mem_free(ctx->sq_sqes);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008297
8298 percpu_ref_exit(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008299 free_uid(ctx->user);
Jens Axboe181e4482019-11-25 08:52:30 -07008300 put_cred(ctx->creds);
Jens Axboe78076bb2019-12-04 19:56:40 -07008301 kfree(ctx->cancel_hash);
Jens Axboe0ddf92e2019-11-08 08:52:53 -07008302 kmem_cache_free(req_cachep, ctx->fallback_req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008303 kfree(ctx);
8304}
8305
8306static __poll_t io_uring_poll(struct file *file, poll_table *wait)
8307{
8308 struct io_ring_ctx *ctx = file->private_data;
8309 __poll_t mask = 0;
8310
8311 poll_wait(file, &ctx->cq_wait, wait);
Stefan Bühler4f7067c2019-04-24 23:54:17 +02008312 /*
8313 * synchronizes with barrier from wq_has_sleeper call in
8314 * io_commit_cqring
8315 */
Jens Axboe2b188cc2019-01-07 10:46:33 -07008316 smp_rmb();
Jens Axboe90554202020-09-03 12:12:41 -06008317 if (!io_sqring_full(ctx))
Jens Axboe2b188cc2019-01-07 10:46:33 -07008318 mask |= EPOLLOUT | EPOLLWRNORM;
Stefano Garzarella63e5d812020-02-07 13:18:28 +01008319 if (io_cqring_events(ctx, false))
Jens Axboe2b188cc2019-01-07 10:46:33 -07008320 mask |= EPOLLIN | EPOLLRDNORM;
8321
8322 return mask;
8323}
8324
8325static int io_uring_fasync(int fd, struct file *file, int on)
8326{
8327 struct io_ring_ctx *ctx = file->private_data;
8328
8329 return fasync_helper(fd, file, on, &ctx->cq_fasync);
8330}
8331
Jens Axboe071698e2020-01-28 10:04:42 -07008332static int io_remove_personalities(int id, void *p, void *data)
8333{
8334 struct io_ring_ctx *ctx = data;
Jens Axboe1e6fa522020-10-15 08:46:24 -06008335 struct io_identity *iod;
Jens Axboe071698e2020-01-28 10:04:42 -07008336
Jens Axboe1e6fa522020-10-15 08:46:24 -06008337 iod = idr_remove(&ctx->personality_idr, id);
8338 if (iod) {
8339 put_cred(iod->creds);
8340 if (refcount_dec_and_test(&iod->count))
8341 kfree(iod);
8342 }
Jens Axboe071698e2020-01-28 10:04:42 -07008343 return 0;
8344}
8345
Jens Axboe85faa7b2020-04-09 18:14:00 -06008346static void io_ring_exit_work(struct work_struct *work)
8347{
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008348 struct io_ring_ctx *ctx = container_of(work, struct io_ring_ctx,
8349 exit_work);
Jens Axboe85faa7b2020-04-09 18:14:00 -06008350
Jens Axboe56952e92020-06-17 15:00:04 -06008351 /*
8352 * If we're doing polled IO and end up having requests being
8353 * submitted async (out-of-line), then completions can come in while
8354 * we're waiting for refs to drop. We need to reap these manually,
8355 * as nobody else will be looking for them.
8356 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008357 do {
Jens Axboe56952e92020-06-17 15:00:04 -06008358 if (ctx->rings)
Jens Axboee6c8aa92020-09-28 13:10:13 -06008359 io_cqring_overflow_flush(ctx, true, NULL, NULL);
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008360 io_iopoll_try_reap_events(ctx);
8361 } while (!wait_for_completion_timeout(&ctx->ref_comp, HZ/20));
Jens Axboe85faa7b2020-04-09 18:14:00 -06008362 io_ring_ctx_free(ctx);
8363}
8364
Jens Axboe2b188cc2019-01-07 10:46:33 -07008365static void io_ring_ctx_wait_and_kill(struct io_ring_ctx *ctx)
8366{
8367 mutex_lock(&ctx->uring_lock);
8368 percpu_ref_kill(&ctx->refs);
8369 mutex_unlock(&ctx->uring_lock);
8370
Jens Axboef3606e32020-09-22 08:18:24 -06008371 io_kill_timeouts(ctx, NULL);
8372 io_poll_remove_all(ctx, NULL);
Jens Axboe561fb042019-10-24 07:25:42 -06008373
8374 if (ctx->io_wq)
8375 io_wq_cancel_all(ctx->io_wq);
8376
Jens Axboe15dff282019-11-13 09:09:23 -07008377 /* if we failed setting up the ctx, we might not have any rings */
8378 if (ctx->rings)
Jens Axboee6c8aa92020-09-28 13:10:13 -06008379 io_cqring_overflow_flush(ctx, true, NULL, NULL);
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008380 io_iopoll_try_reap_events(ctx);
Jens Axboe071698e2020-01-28 10:04:42 -07008381 idr_for_each(&ctx->personality_idr, io_remove_personalities, ctx);
Jens Axboe309fc032020-07-10 09:13:34 -06008382
8383 /*
8384 * Do this upfront, so we won't have a grace period where the ring
8385 * is closed but resources aren't reaped yet. This can cause
8386 * spurious failure in setting up a new ring.
8387 */
Jens Axboe760618f2020-07-24 12:53:31 -06008388 io_unaccount_mem(ctx, ring_pages(ctx->sq_entries, ctx->cq_entries),
8389 ACCT_LOCKED);
Jens Axboe309fc032020-07-10 09:13:34 -06008390
Jens Axboe85faa7b2020-04-09 18:14:00 -06008391 INIT_WORK(&ctx->exit_work, io_ring_exit_work);
Jens Axboefc666772020-08-19 11:10:51 -06008392 /*
8393 * Use system_unbound_wq to avoid spawning tons of event kworkers
8394 * if we're exiting a ton of rings at the same time. It just adds
8395 * noise and overhead, there's no discernable change in runtime
8396 * over using system_wq.
8397 */
8398 queue_work(system_unbound_wq, &ctx->exit_work);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008399}
8400
8401static int io_uring_release(struct inode *inode, struct file *file)
8402{
8403 struct io_ring_ctx *ctx = file->private_data;
8404
8405 file->private_data = NULL;
8406 io_ring_ctx_wait_and_kill(ctx);
8407 return 0;
8408}
8409
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008410static bool io_wq_files_match(struct io_wq_work *work, void *data)
8411{
8412 struct files_struct *files = data;
8413
Jens Axboedfead8a2020-10-14 10:12:37 -06008414 return !files || ((work->flags & IO_WQ_WORK_FILES) &&
Jens Axboe98447d62020-10-14 10:48:51 -06008415 work->identity->files == files);
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008416}
8417
Jens Axboef254ac02020-08-12 17:33:30 -06008418/*
8419 * Returns true if 'preq' is the link parent of 'req'
8420 */
8421static bool io_match_link(struct io_kiocb *preq, struct io_kiocb *req)
8422{
8423 struct io_kiocb *link;
8424
8425 if (!(preq->flags & REQ_F_LINK_HEAD))
8426 return false;
8427
8428 list_for_each_entry(link, &preq->link_list, link_list) {
8429 if (link == req)
8430 return true;
8431 }
8432
8433 return false;
8434}
8435
8436/*
8437 * We're looking to cancel 'req' because it's holding on to our files, but
8438 * 'req' could be a link to another request. See if it is, and cancel that
8439 * parent request if so.
8440 */
8441static bool io_poll_remove_link(struct io_ring_ctx *ctx, struct io_kiocb *req)
8442{
8443 struct hlist_node *tmp;
8444 struct io_kiocb *preq;
8445 bool found = false;
8446 int i;
8447
8448 spin_lock_irq(&ctx->completion_lock);
8449 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
8450 struct hlist_head *list;
8451
8452 list = &ctx->cancel_hash[i];
8453 hlist_for_each_entry_safe(preq, tmp, list, hash_node) {
8454 found = io_match_link(preq, req);
8455 if (found) {
8456 io_poll_remove_one(preq);
8457 break;
8458 }
8459 }
8460 }
8461 spin_unlock_irq(&ctx->completion_lock);
8462 return found;
8463}
8464
8465static bool io_timeout_remove_link(struct io_ring_ctx *ctx,
8466 struct io_kiocb *req)
8467{
8468 struct io_kiocb *preq;
8469 bool found = false;
8470
8471 spin_lock_irq(&ctx->completion_lock);
8472 list_for_each_entry(preq, &ctx->timeout_list, timeout.list) {
8473 found = io_match_link(preq, req);
8474 if (found) {
8475 __io_timeout_cancel(preq);
8476 break;
8477 }
8478 }
8479 spin_unlock_irq(&ctx->completion_lock);
8480 return found;
8481}
8482
Jens Axboeb711d4e2020-08-16 08:23:05 -07008483static bool io_cancel_link_cb(struct io_wq_work *work, void *data)
8484{
Pavel Begunkov9a472ef2020-11-05 22:31:37 +00008485 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
8486 bool ret;
8487
8488 if (req->flags & REQ_F_LINK_TIMEOUT) {
8489 unsigned long flags;
8490 struct io_ring_ctx *ctx = req->ctx;
8491
8492 /* protect against races with linked timeouts */
8493 spin_lock_irqsave(&ctx->completion_lock, flags);
8494 ret = io_match_link(req, data);
8495 spin_unlock_irqrestore(&ctx->completion_lock, flags);
8496 } else {
8497 ret = io_match_link(req, data);
8498 }
8499 return ret;
Jens Axboeb711d4e2020-08-16 08:23:05 -07008500}
8501
8502static void io_attempt_cancel(struct io_ring_ctx *ctx, struct io_kiocb *req)
8503{
8504 enum io_wq_cancel cret;
8505
8506 /* cancel this particular work, if it's running */
8507 cret = io_wq_cancel_work(ctx->io_wq, &req->work);
8508 if (cret != IO_WQ_CANCEL_NOTFOUND)
8509 return;
8510
8511 /* find links that hold this pending, cancel those */
8512 cret = io_wq_cancel_cb(ctx->io_wq, io_cancel_link_cb, req, true);
8513 if (cret != IO_WQ_CANCEL_NOTFOUND)
8514 return;
8515
8516 /* if we have a poll link holding this pending, cancel that */
8517 if (io_poll_remove_link(ctx, req))
8518 return;
8519
8520 /* final option, timeout link is holding this req pending */
8521 io_timeout_remove_link(ctx, req);
8522}
8523
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03008524static void io_cancel_defer_files(struct io_ring_ctx *ctx,
Pavel Begunkovef9865a2020-11-05 14:06:19 +00008525 struct task_struct *task,
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03008526 struct files_struct *files)
8527{
8528 struct io_defer_entry *de = NULL;
8529 LIST_HEAD(list);
8530
8531 spin_lock_irq(&ctx->completion_lock);
8532 list_for_each_entry_reverse(de, &ctx->defer_list, list) {
Pavel Begunkovef9865a2020-11-05 14:06:19 +00008533 if (io_task_match(de->req, task) &&
8534 io_match_files(de->req, files)) {
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03008535 list_cut_position(&list, &ctx->defer_list, &de->list);
8536 break;
8537 }
8538 }
8539 spin_unlock_irq(&ctx->completion_lock);
8540
8541 while (!list_empty(&list)) {
8542 de = list_first_entry(&list, struct io_defer_entry, list);
8543 list_del_init(&de->list);
8544 req_set_fail_links(de->req);
8545 io_put_req(de->req);
8546 io_req_complete(de->req, -ECANCELED);
8547 kfree(de);
8548 }
8549}
8550
Jens Axboe76e1b642020-09-26 15:05:03 -06008551/*
8552 * Returns true if we found and killed one or more files pinning requests
8553 */
8554static bool io_uring_cancel_files(struct io_ring_ctx *ctx,
Jens Axboefcb323c2019-10-24 12:39:47 -06008555 struct files_struct *files)
8556{
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008557 if (list_empty_careful(&ctx->inflight_list))
Jens Axboe76e1b642020-09-26 15:05:03 -06008558 return false;
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008559
8560 /* cancel all at once, should be faster than doing it one by one*/
8561 io_wq_cancel_cb(ctx->io_wq, io_wq_files_match, files, true);
8562
Jens Axboefcb323c2019-10-24 12:39:47 -06008563 while (!list_empty_careful(&ctx->inflight_list)) {
Xiaoguang Wangd8f1b972020-04-26 15:54:43 +08008564 struct io_kiocb *cancel_req = NULL, *req;
8565 DEFINE_WAIT(wait);
Jens Axboefcb323c2019-10-24 12:39:47 -06008566
8567 spin_lock_irq(&ctx->inflight_lock);
8568 list_for_each_entry(req, &ctx->inflight_list, inflight_entry) {
Jens Axboedfead8a2020-10-14 10:12:37 -06008569 if (files && (req->work.flags & IO_WQ_WORK_FILES) &&
Jens Axboe98447d62020-10-14 10:48:51 -06008570 req->work.identity->files != files)
Jens Axboe768134d2019-11-10 20:30:53 -07008571 continue;
8572 /* req is being completed, ignore */
8573 if (!refcount_inc_not_zero(&req->refs))
8574 continue;
8575 cancel_req = req;
8576 break;
Jens Axboefcb323c2019-10-24 12:39:47 -06008577 }
Jens Axboe768134d2019-11-10 20:30:53 -07008578 if (cancel_req)
Jens Axboefcb323c2019-10-24 12:39:47 -06008579 prepare_to_wait(&ctx->inflight_wait, &wait,
Jens Axboe768134d2019-11-10 20:30:53 -07008580 TASK_UNINTERRUPTIBLE);
Jens Axboefcb323c2019-10-24 12:39:47 -06008581 spin_unlock_irq(&ctx->inflight_lock);
8582
Jens Axboe768134d2019-11-10 20:30:53 -07008583 /* We need to keep going until we don't find a matching req */
8584 if (!cancel_req)
Jens Axboefcb323c2019-10-24 12:39:47 -06008585 break;
Pavel Begunkovbb175342020-08-20 11:33:35 +03008586 /* cancel this request, or head link requests */
8587 io_attempt_cancel(ctx, cancel_req);
8588 io_put_req(cancel_req);
Jens Axboe6200b0a2020-09-13 14:38:30 -06008589 /* cancellations _may_ trigger task work */
8590 io_run_task_work();
Jens Axboefcb323c2019-10-24 12:39:47 -06008591 schedule();
Xiaoguang Wangd8f1b972020-04-26 15:54:43 +08008592 finish_wait(&ctx->inflight_wait, &wait);
Jens Axboefcb323c2019-10-24 12:39:47 -06008593 }
Jens Axboe76e1b642020-09-26 15:05:03 -06008594
8595 return true;
Jens Axboefcb323c2019-10-24 12:39:47 -06008596}
8597
Pavel Begunkov801dd572020-06-15 10:33:14 +03008598static bool io_cancel_task_cb(struct io_wq_work *work, void *data)
Pavel Begunkov44e728b2020-06-15 10:24:04 +03008599{
Pavel Begunkov801dd572020-06-15 10:33:14 +03008600 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
8601 struct task_struct *task = data;
Pavel Begunkov44e728b2020-06-15 10:24:04 +03008602
Jens Axboef3606e32020-09-22 08:18:24 -06008603 return io_task_match(req, task);
Pavel Begunkov44e728b2020-06-15 10:24:04 +03008604}
8605
Jens Axboe0f212202020-09-13 13:09:39 -06008606static bool __io_uring_cancel_task_requests(struct io_ring_ctx *ctx,
8607 struct task_struct *task,
8608 struct files_struct *files)
8609{
8610 bool ret;
8611
8612 ret = io_uring_cancel_files(ctx, files);
8613 if (!files) {
8614 enum io_wq_cancel cret;
8615
8616 cret = io_wq_cancel_cb(ctx->io_wq, io_cancel_task_cb, task, true);
8617 if (cret != IO_WQ_CANCEL_NOTFOUND)
8618 ret = true;
8619
8620 /* SQPOLL thread does its own polling */
8621 if (!(ctx->flags & IORING_SETUP_SQPOLL)) {
8622 while (!list_empty_careful(&ctx->iopoll_list)) {
8623 io_iopoll_try_reap_events(ctx);
8624 ret = true;
8625 }
8626 }
8627
8628 ret |= io_poll_remove_all(ctx, task);
8629 ret |= io_kill_timeouts(ctx, task);
8630 }
8631
8632 return ret;
8633}
8634
8635/*
8636 * We need to iteratively cancel requests, in case a request has dependent
8637 * hard links. These persist even for failure of cancelations, hence keep
8638 * looping until none are found.
8639 */
8640static void io_uring_cancel_task_requests(struct io_ring_ctx *ctx,
8641 struct files_struct *files)
8642{
8643 struct task_struct *task = current;
8644
Jens Axboefdaf0832020-10-30 09:37:30 -06008645 if ((ctx->flags & IORING_SETUP_SQPOLL) && ctx->sq_data) {
Jens Axboe534ca6d2020-09-02 13:52:19 -06008646 task = ctx->sq_data->thread;
Jens Axboefdaf0832020-10-30 09:37:30 -06008647 atomic_inc(&task->io_uring->in_idle);
8648 io_sq_thread_park(ctx->sq_data);
8649 }
Jens Axboe0f212202020-09-13 13:09:39 -06008650
Pavel Begunkovef9865a2020-11-05 14:06:19 +00008651 if (files)
8652 io_cancel_defer_files(ctx, NULL, files);
8653 else
8654 io_cancel_defer_files(ctx, task, NULL);
8655
Jens Axboe0f212202020-09-13 13:09:39 -06008656 io_cqring_overflow_flush(ctx, true, task, files);
8657
8658 while (__io_uring_cancel_task_requests(ctx, task, files)) {
8659 io_run_task_work();
8660 cond_resched();
8661 }
Jens Axboefdaf0832020-10-30 09:37:30 -06008662
8663 if ((ctx->flags & IORING_SETUP_SQPOLL) && ctx->sq_data) {
8664 atomic_dec(&task->io_uring->in_idle);
8665 /*
8666 * If the files that are going away are the ones in the thread
8667 * identity, clear them out.
8668 */
8669 if (task->io_uring->identity->files == files)
8670 task->io_uring->identity->files = NULL;
8671 io_sq_thread_unpark(ctx->sq_data);
8672 }
Jens Axboe0f212202020-09-13 13:09:39 -06008673}
8674
8675/*
8676 * Note that this task has used io_uring. We use it for cancelation purposes.
8677 */
Jens Axboefdaf0832020-10-30 09:37:30 -06008678static int io_uring_add_task_file(struct io_ring_ctx *ctx, struct file *file)
Jens Axboe0f212202020-09-13 13:09:39 -06008679{
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008680 struct io_uring_task *tctx = current->io_uring;
8681
8682 if (unlikely(!tctx)) {
Jens Axboe0f212202020-09-13 13:09:39 -06008683 int ret;
8684
8685 ret = io_uring_alloc_task_context(current);
8686 if (unlikely(ret))
8687 return ret;
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008688 tctx = current->io_uring;
Jens Axboe0f212202020-09-13 13:09:39 -06008689 }
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008690 if (tctx->last != file) {
8691 void *old = xa_load(&tctx->xa, (unsigned long)file);
Jens Axboe0f212202020-09-13 13:09:39 -06008692
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008693 if (!old) {
Jens Axboe0f212202020-09-13 13:09:39 -06008694 get_file(file);
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008695 xa_store(&tctx->xa, (unsigned long)file, file, GFP_KERNEL);
Jens Axboe0f212202020-09-13 13:09:39 -06008696 }
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008697 tctx->last = file;
Jens Axboe0f212202020-09-13 13:09:39 -06008698 }
8699
Jens Axboefdaf0832020-10-30 09:37:30 -06008700 /*
8701 * This is race safe in that the task itself is doing this, hence it
8702 * cannot be going through the exit/cancel paths at the same time.
8703 * This cannot be modified while exit/cancel is running.
8704 */
8705 if (!tctx->sqpoll && (ctx->flags & IORING_SETUP_SQPOLL))
8706 tctx->sqpoll = true;
8707
Jens Axboe0f212202020-09-13 13:09:39 -06008708 return 0;
8709}
8710
8711/*
8712 * Remove this io_uring_file -> task mapping.
8713 */
8714static void io_uring_del_task_file(struct file *file)
8715{
8716 struct io_uring_task *tctx = current->io_uring;
Jens Axboe0f212202020-09-13 13:09:39 -06008717
8718 if (tctx->last == file)
8719 tctx->last = NULL;
Matthew Wilcox (Oracle)5e2ed8c2020-10-09 13:49:53 +01008720 file = xa_erase(&tctx->xa, (unsigned long)file);
Jens Axboe0f212202020-09-13 13:09:39 -06008721 if (file)
8722 fput(file);
8723}
8724
Jens Axboe0f212202020-09-13 13:09:39 -06008725/*
8726 * Drop task note for this file if we're the only ones that hold it after
8727 * pending fput()
8728 */
Pavel Begunkovc8fb20b2020-10-22 16:38:27 +01008729static void io_uring_attempt_task_drop(struct file *file)
Jens Axboe0f212202020-09-13 13:09:39 -06008730{
8731 if (!current->io_uring)
8732 return;
8733 /*
8734 * fput() is pending, will be 2 if the only other ref is our potential
8735 * task file note. If the task is exiting, drop regardless of count.
8736 */
Pavel Begunkovc8fb20b2020-10-22 16:38:27 +01008737 if (fatal_signal_pending(current) || (current->flags & PF_EXITING) ||
8738 atomic_long_read(&file->f_count) == 2)
8739 io_uring_del_task_file(file);
Jens Axboe0f212202020-09-13 13:09:39 -06008740}
8741
8742void __io_uring_files_cancel(struct files_struct *files)
8743{
8744 struct io_uring_task *tctx = current->io_uring;
Matthew Wilcox (Oracle)ce765372020-10-09 13:49:51 +01008745 struct file *file;
8746 unsigned long index;
Jens Axboe0f212202020-09-13 13:09:39 -06008747
8748 /* make sure overflow events are dropped */
Jens Axboefdaf0832020-10-30 09:37:30 -06008749 atomic_inc(&tctx->in_idle);
Jens Axboe0f212202020-09-13 13:09:39 -06008750
Matthew Wilcox (Oracle)ce765372020-10-09 13:49:51 +01008751 xa_for_each(&tctx->xa, index, file) {
8752 struct io_ring_ctx *ctx = file->private_data;
Jens Axboe0f212202020-09-13 13:09:39 -06008753
8754 io_uring_cancel_task_requests(ctx, files);
8755 if (files)
8756 io_uring_del_task_file(file);
Matthew Wilcox (Oracle)ce765372020-10-09 13:49:51 +01008757 }
Jens Axboefdaf0832020-10-30 09:37:30 -06008758
8759 atomic_dec(&tctx->in_idle);
8760}
8761
8762static s64 tctx_inflight(struct io_uring_task *tctx)
8763{
8764 unsigned long index;
8765 struct file *file;
8766 s64 inflight;
8767
8768 inflight = percpu_counter_sum(&tctx->inflight);
8769 if (!tctx->sqpoll)
8770 return inflight;
8771
8772 /*
8773 * If we have SQPOLL rings, then we need to iterate and find them, and
8774 * add the pending count for those.
8775 */
8776 xa_for_each(&tctx->xa, index, file) {
8777 struct io_ring_ctx *ctx = file->private_data;
8778
8779 if (ctx->flags & IORING_SETUP_SQPOLL) {
8780 struct io_uring_task *__tctx = ctx->sqo_task->io_uring;
8781
8782 inflight += percpu_counter_sum(&__tctx->inflight);
8783 }
8784 }
8785
8786 return inflight;
Jens Axboe0f212202020-09-13 13:09:39 -06008787}
8788
Jens Axboe0f212202020-09-13 13:09:39 -06008789/*
8790 * Find any io_uring fd that this task has registered or done IO on, and cancel
8791 * requests.
8792 */
8793void __io_uring_task_cancel(void)
8794{
8795 struct io_uring_task *tctx = current->io_uring;
8796 DEFINE_WAIT(wait);
Jens Axboed8a6df12020-10-15 16:24:45 -06008797 s64 inflight;
Jens Axboe0f212202020-09-13 13:09:39 -06008798
8799 /* make sure overflow events are dropped */
Jens Axboefdaf0832020-10-30 09:37:30 -06008800 atomic_inc(&tctx->in_idle);
Jens Axboe0f212202020-09-13 13:09:39 -06008801
Jens Axboed8a6df12020-10-15 16:24:45 -06008802 do {
Jens Axboe0f212202020-09-13 13:09:39 -06008803 /* read completions before cancelations */
Jens Axboefdaf0832020-10-30 09:37:30 -06008804 inflight = tctx_inflight(tctx);
Jens Axboed8a6df12020-10-15 16:24:45 -06008805 if (!inflight)
8806 break;
Jens Axboe0f212202020-09-13 13:09:39 -06008807 __io_uring_files_cancel(NULL);
8808
8809 prepare_to_wait(&tctx->wait, &wait, TASK_UNINTERRUPTIBLE);
8810
8811 /*
8812 * If we've seen completions, retry. This avoids a race where
8813 * a completion comes in before we did prepare_to_wait().
8814 */
Jens Axboefdaf0832020-10-30 09:37:30 -06008815 if (inflight != tctx_inflight(tctx))
Jens Axboe0f212202020-09-13 13:09:39 -06008816 continue;
Jens Axboe0f212202020-09-13 13:09:39 -06008817 schedule();
Jens Axboed8a6df12020-10-15 16:24:45 -06008818 } while (1);
Jens Axboe0f212202020-09-13 13:09:39 -06008819
8820 finish_wait(&tctx->wait, &wait);
Jens Axboefdaf0832020-10-30 09:37:30 -06008821 atomic_dec(&tctx->in_idle);
Jens Axboefcb323c2019-10-24 12:39:47 -06008822}
8823
8824static int io_uring_flush(struct file *file, void *data)
8825{
Pavel Begunkovc8fb20b2020-10-22 16:38:27 +01008826 io_uring_attempt_task_drop(file);
Jens Axboefcb323c2019-10-24 12:39:47 -06008827 return 0;
8828}
8829
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008830static void *io_uring_validate_mmap_request(struct file *file,
8831 loff_t pgoff, size_t sz)
Jens Axboe2b188cc2019-01-07 10:46:33 -07008832{
Jens Axboe2b188cc2019-01-07 10:46:33 -07008833 struct io_ring_ctx *ctx = file->private_data;
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008834 loff_t offset = pgoff << PAGE_SHIFT;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008835 struct page *page;
8836 void *ptr;
8837
8838 switch (offset) {
8839 case IORING_OFF_SQ_RING:
Hristo Venev75b28af2019-08-26 17:23:46 +00008840 case IORING_OFF_CQ_RING:
8841 ptr = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008842 break;
8843 case IORING_OFF_SQES:
8844 ptr = ctx->sq_sqes;
8845 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008846 default:
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008847 return ERR_PTR(-EINVAL);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008848 }
8849
8850 page = virt_to_head_page(ptr);
Matthew Wilcox (Oracle)a50b8542019-09-23 15:34:25 -07008851 if (sz > page_size(page))
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008852 return ERR_PTR(-EINVAL);
8853
8854 return ptr;
8855}
8856
8857#ifdef CONFIG_MMU
8858
8859static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
8860{
8861 size_t sz = vma->vm_end - vma->vm_start;
8862 unsigned long pfn;
8863 void *ptr;
8864
8865 ptr = io_uring_validate_mmap_request(file, vma->vm_pgoff, sz);
8866 if (IS_ERR(ptr))
8867 return PTR_ERR(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008868
8869 pfn = virt_to_phys(ptr) >> PAGE_SHIFT;
8870 return remap_pfn_range(vma, vma->vm_start, pfn, sz, vma->vm_page_prot);
8871}
8872
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008873#else /* !CONFIG_MMU */
8874
8875static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
8876{
8877 return vma->vm_flags & (VM_SHARED | VM_MAYSHARE) ? 0 : -EINVAL;
8878}
8879
8880static unsigned int io_uring_nommu_mmap_capabilities(struct file *file)
8881{
8882 return NOMMU_MAP_DIRECT | NOMMU_MAP_READ | NOMMU_MAP_WRITE;
8883}
8884
8885static unsigned long io_uring_nommu_get_unmapped_area(struct file *file,
8886 unsigned long addr, unsigned long len,
8887 unsigned long pgoff, unsigned long flags)
8888{
8889 void *ptr;
8890
8891 ptr = io_uring_validate_mmap_request(file, pgoff, len);
8892 if (IS_ERR(ptr))
8893 return PTR_ERR(ptr);
8894
8895 return (unsigned long) ptr;
8896}
8897
8898#endif /* !CONFIG_MMU */
8899
Jens Axboe90554202020-09-03 12:12:41 -06008900static void io_sqpoll_wait_sq(struct io_ring_ctx *ctx)
8901{
8902 DEFINE_WAIT(wait);
8903
8904 do {
8905 if (!io_sqring_full(ctx))
8906 break;
8907
8908 prepare_to_wait(&ctx->sqo_sq_wait, &wait, TASK_INTERRUPTIBLE);
8909
8910 if (!io_sqring_full(ctx))
8911 break;
8912
8913 schedule();
8914 } while (!signal_pending(current));
8915
8916 finish_wait(&ctx->sqo_sq_wait, &wait);
8917}
8918
Jens Axboe2b188cc2019-01-07 10:46:33 -07008919SYSCALL_DEFINE6(io_uring_enter, unsigned int, fd, u32, to_submit,
8920 u32, min_complete, u32, flags, const sigset_t __user *, sig,
8921 size_t, sigsz)
8922{
8923 struct io_ring_ctx *ctx;
8924 long ret = -EBADF;
8925 int submitted = 0;
8926 struct fd f;
8927
Jens Axboe4c6e2772020-07-01 11:29:10 -06008928 io_run_task_work();
Jens Axboeb41e9852020-02-17 09:52:41 -07008929
Jens Axboe90554202020-09-03 12:12:41 -06008930 if (flags & ~(IORING_ENTER_GETEVENTS | IORING_ENTER_SQ_WAKEUP |
8931 IORING_ENTER_SQ_WAIT))
Jens Axboe2b188cc2019-01-07 10:46:33 -07008932 return -EINVAL;
8933
8934 f = fdget(fd);
8935 if (!f.file)
8936 return -EBADF;
8937
8938 ret = -EOPNOTSUPP;
8939 if (f.file->f_op != &io_uring_fops)
8940 goto out_fput;
8941
8942 ret = -ENXIO;
8943 ctx = f.file->private_data;
8944 if (!percpu_ref_tryget(&ctx->refs))
8945 goto out_fput;
8946
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02008947 ret = -EBADFD;
8948 if (ctx->flags & IORING_SETUP_R_DISABLED)
8949 goto out;
8950
Jens Axboe6c271ce2019-01-10 11:22:30 -07008951 /*
8952 * For SQ polling, the thread will do all submissions and completions.
8953 * Just return the requested submit count, and wake the thread if
8954 * we were asked to.
8955 */
Jens Axboeb2a9ead2019-09-12 14:19:16 -06008956 ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008957 if (ctx->flags & IORING_SETUP_SQPOLL) {
Jens Axboec1edbf52019-11-10 16:56:04 -07008958 if (!list_empty_careful(&ctx->cq_overflow_list))
Jens Axboee6c8aa92020-09-28 13:10:13 -06008959 io_cqring_overflow_flush(ctx, false, NULL, NULL);
Jens Axboe6c271ce2019-01-10 11:22:30 -07008960 if (flags & IORING_ENTER_SQ_WAKEUP)
Jens Axboe534ca6d2020-09-02 13:52:19 -06008961 wake_up(&ctx->sq_data->wait);
Jens Axboe90554202020-09-03 12:12:41 -06008962 if (flags & IORING_ENTER_SQ_WAIT)
8963 io_sqpoll_wait_sq(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07008964 submitted = to_submit;
Jens Axboeb2a9ead2019-09-12 14:19:16 -06008965 } else if (to_submit) {
Jens Axboefdaf0832020-10-30 09:37:30 -06008966 ret = io_uring_add_task_file(ctx, f.file);
Jens Axboe0f212202020-09-13 13:09:39 -06008967 if (unlikely(ret))
8968 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008969 mutex_lock(&ctx->uring_lock);
Jens Axboe0f212202020-09-13 13:09:39 -06008970 submitted = io_submit_sqes(ctx, to_submit);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008971 mutex_unlock(&ctx->uring_lock);
Pavel Begunkov7c504e652019-12-18 19:53:45 +03008972
8973 if (submitted != to_submit)
8974 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008975 }
8976 if (flags & IORING_ENTER_GETEVENTS) {
8977 min_complete = min(min_complete, ctx->cq_entries);
8978
Xiaoguang Wang32b22442020-03-11 09:26:09 +08008979 /*
8980 * When SETUP_IOPOLL and SETUP_SQPOLL are both enabled, user
8981 * space applications don't need to do io completion events
8982 * polling again, they can rely on io_sq_thread to do polling
8983 * work, which can reduce cpu usage and uring_lock contention.
8984 */
8985 if (ctx->flags & IORING_SETUP_IOPOLL &&
8986 !(ctx->flags & IORING_SETUP_SQPOLL)) {
Pavel Begunkov7668b922020-07-07 16:36:21 +03008987 ret = io_iopoll_check(ctx, min_complete);
Jens Axboedef596e2019-01-09 08:59:42 -07008988 } else {
8989 ret = io_cqring_wait(ctx, min_complete, sig, sigsz);
8990 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07008991 }
8992
Pavel Begunkov7c504e652019-12-18 19:53:45 +03008993out:
Pavel Begunkov6805b322019-10-08 02:18:42 +03008994 percpu_ref_put(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008995out_fput:
8996 fdput(f);
8997 return submitted ? submitted : ret;
8998}
8999
Tobias Klauserbebdb652020-02-26 18:38:32 +01009000#ifdef CONFIG_PROC_FS
Jens Axboe87ce9552020-01-30 08:25:34 -07009001static int io_uring_show_cred(int id, void *p, void *data)
9002{
Jens Axboe6b47ab82020-11-05 09:50:16 -07009003 struct io_identity *iod = p;
9004 const struct cred *cred = iod->creds;
Jens Axboe87ce9552020-01-30 08:25:34 -07009005 struct seq_file *m = data;
9006 struct user_namespace *uns = seq_user_ns(m);
9007 struct group_info *gi;
9008 kernel_cap_t cap;
9009 unsigned __capi;
9010 int g;
9011
9012 seq_printf(m, "%5d\n", id);
9013 seq_put_decimal_ull(m, "\tUid:\t", from_kuid_munged(uns, cred->uid));
9014 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->euid));
9015 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid));
9016 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->fsuid));
9017 seq_put_decimal_ull(m, "\n\tGid:\t", from_kgid_munged(uns, cred->gid));
9018 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->egid));
9019 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->sgid));
9020 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->fsgid));
9021 seq_puts(m, "\n\tGroups:\t");
9022 gi = cred->group_info;
9023 for (g = 0; g < gi->ngroups; g++) {
9024 seq_put_decimal_ull(m, g ? " " : "",
9025 from_kgid_munged(uns, gi->gid[g]));
9026 }
9027 seq_puts(m, "\n\tCapEff:\t");
9028 cap = cred->cap_effective;
9029 CAP_FOR_EACH_U32(__capi)
9030 seq_put_hex_ll(m, NULL, cap.cap[CAP_LAST_U32 - __capi], 8);
9031 seq_putc(m, '\n');
9032 return 0;
9033}
9034
9035static void __io_uring_show_fdinfo(struct io_ring_ctx *ctx, struct seq_file *m)
9036{
Joseph Qidbbe9c62020-09-29 09:01:22 -06009037 struct io_sq_data *sq = NULL;
Jens Axboefad8e0d2020-09-28 08:57:48 -06009038 bool has_lock;
Jens Axboe87ce9552020-01-30 08:25:34 -07009039 int i;
9040
Jens Axboefad8e0d2020-09-28 08:57:48 -06009041 /*
9042 * Avoid ABBA deadlock between the seq lock and the io_uring mutex,
9043 * since fdinfo case grabs it in the opposite direction of normal use
9044 * cases. If we fail to get the lock, we just don't iterate any
9045 * structures that could be going away outside the io_uring mutex.
9046 */
9047 has_lock = mutex_trylock(&ctx->uring_lock);
9048
Joseph Qidbbe9c62020-09-29 09:01:22 -06009049 if (has_lock && (ctx->flags & IORING_SETUP_SQPOLL))
9050 sq = ctx->sq_data;
9051
9052 seq_printf(m, "SqThread:\t%d\n", sq ? task_pid_nr(sq->thread) : -1);
9053 seq_printf(m, "SqThreadCpu:\t%d\n", sq ? task_cpu(sq->thread) : -1);
Jens Axboe87ce9552020-01-30 08:25:34 -07009054 seq_printf(m, "UserFiles:\t%u\n", ctx->nr_user_files);
Jens Axboefad8e0d2020-09-28 08:57:48 -06009055 for (i = 0; has_lock && i < ctx->nr_user_files; i++) {
Jens Axboe87ce9552020-01-30 08:25:34 -07009056 struct fixed_file_table *table;
9057 struct file *f;
9058
9059 table = &ctx->file_data->table[i >> IORING_FILE_TABLE_SHIFT];
9060 f = table->files[i & IORING_FILE_TABLE_MASK];
9061 if (f)
9062 seq_printf(m, "%5u: %s\n", i, file_dentry(f)->d_iname);
9063 else
9064 seq_printf(m, "%5u: <none>\n", i);
9065 }
9066 seq_printf(m, "UserBufs:\t%u\n", ctx->nr_user_bufs);
Jens Axboefad8e0d2020-09-28 08:57:48 -06009067 for (i = 0; has_lock && i < ctx->nr_user_bufs; i++) {
Jens Axboe87ce9552020-01-30 08:25:34 -07009068 struct io_mapped_ubuf *buf = &ctx->user_bufs[i];
9069
9070 seq_printf(m, "%5u: 0x%llx/%u\n", i, buf->ubuf,
9071 (unsigned int) buf->len);
9072 }
Jens Axboefad8e0d2020-09-28 08:57:48 -06009073 if (has_lock && !idr_is_empty(&ctx->personality_idr)) {
Jens Axboe87ce9552020-01-30 08:25:34 -07009074 seq_printf(m, "Personalities:\n");
9075 idr_for_each(&ctx->personality_idr, io_uring_show_cred, m);
9076 }
Jens Axboed7718a92020-02-14 22:23:12 -07009077 seq_printf(m, "PollList:\n");
9078 spin_lock_irq(&ctx->completion_lock);
9079 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
9080 struct hlist_head *list = &ctx->cancel_hash[i];
9081 struct io_kiocb *req;
9082
9083 hlist_for_each_entry(req, list, hash_node)
9084 seq_printf(m, " op=%d, task_works=%d\n", req->opcode,
9085 req->task->task_works != NULL);
9086 }
9087 spin_unlock_irq(&ctx->completion_lock);
Jens Axboefad8e0d2020-09-28 08:57:48 -06009088 if (has_lock)
9089 mutex_unlock(&ctx->uring_lock);
Jens Axboe87ce9552020-01-30 08:25:34 -07009090}
9091
9092static void io_uring_show_fdinfo(struct seq_file *m, struct file *f)
9093{
9094 struct io_ring_ctx *ctx = f->private_data;
9095
9096 if (percpu_ref_tryget(&ctx->refs)) {
9097 __io_uring_show_fdinfo(ctx, m);
9098 percpu_ref_put(&ctx->refs);
9099 }
9100}
Tobias Klauserbebdb652020-02-26 18:38:32 +01009101#endif
Jens Axboe87ce9552020-01-30 08:25:34 -07009102
Jens Axboe2b188cc2019-01-07 10:46:33 -07009103static const struct file_operations io_uring_fops = {
9104 .release = io_uring_release,
Jens Axboefcb323c2019-10-24 12:39:47 -06009105 .flush = io_uring_flush,
Jens Axboe2b188cc2019-01-07 10:46:33 -07009106 .mmap = io_uring_mmap,
Roman Penyaev6c5c2402019-11-28 12:53:22 +01009107#ifndef CONFIG_MMU
9108 .get_unmapped_area = io_uring_nommu_get_unmapped_area,
9109 .mmap_capabilities = io_uring_nommu_mmap_capabilities,
9110#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -07009111 .poll = io_uring_poll,
9112 .fasync = io_uring_fasync,
Tobias Klauserbebdb652020-02-26 18:38:32 +01009113#ifdef CONFIG_PROC_FS
Jens Axboe87ce9552020-01-30 08:25:34 -07009114 .show_fdinfo = io_uring_show_fdinfo,
Tobias Klauserbebdb652020-02-26 18:38:32 +01009115#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -07009116};
9117
9118static int io_allocate_scq_urings(struct io_ring_ctx *ctx,
9119 struct io_uring_params *p)
9120{
Hristo Venev75b28af2019-08-26 17:23:46 +00009121 struct io_rings *rings;
9122 size_t size, sq_array_offset;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009123
Jens Axboebd740482020-08-05 12:58:23 -06009124 /* make sure these are sane, as we already accounted them */
9125 ctx->sq_entries = p->sq_entries;
9126 ctx->cq_entries = p->cq_entries;
9127
Hristo Venev75b28af2019-08-26 17:23:46 +00009128 size = rings_size(p->sq_entries, p->cq_entries, &sq_array_offset);
9129 if (size == SIZE_MAX)
9130 return -EOVERFLOW;
9131
9132 rings = io_mem_alloc(size);
9133 if (!rings)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009134 return -ENOMEM;
9135
Hristo Venev75b28af2019-08-26 17:23:46 +00009136 ctx->rings = rings;
9137 ctx->sq_array = (u32 *)((char *)rings + sq_array_offset);
9138 rings->sq_ring_mask = p->sq_entries - 1;
9139 rings->cq_ring_mask = p->cq_entries - 1;
9140 rings->sq_ring_entries = p->sq_entries;
9141 rings->cq_ring_entries = p->cq_entries;
9142 ctx->sq_mask = rings->sq_ring_mask;
9143 ctx->cq_mask = rings->cq_ring_mask;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009144
9145 size = array_size(sizeof(struct io_uring_sqe), p->sq_entries);
Jens Axboeeb065d32019-11-20 09:26:29 -07009146 if (size == SIZE_MAX) {
9147 io_mem_free(ctx->rings);
9148 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009149 return -EOVERFLOW;
Jens Axboeeb065d32019-11-20 09:26:29 -07009150 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009151
9152 ctx->sq_sqes = io_mem_alloc(size);
Jens Axboeeb065d32019-11-20 09:26:29 -07009153 if (!ctx->sq_sqes) {
9154 io_mem_free(ctx->rings);
9155 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009156 return -ENOMEM;
Jens Axboeeb065d32019-11-20 09:26:29 -07009157 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009158
Jens Axboe2b188cc2019-01-07 10:46:33 -07009159 return 0;
9160}
9161
9162/*
9163 * Allocate an anonymous fd, this is what constitutes the application
9164 * visible backing of an io_uring instance. The application mmaps this
9165 * fd to gain access to the SQ/CQ ring details. If UNIX sockets are enabled,
9166 * we have to tie this fd to a socket for file garbage collection purposes.
9167 */
9168static int io_uring_get_fd(struct io_ring_ctx *ctx)
9169{
9170 struct file *file;
9171 int ret;
Hillf Dantonf26c08b2020-12-08 08:54:26 -07009172 int fd;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009173
9174#if defined(CONFIG_UNIX)
9175 ret = sock_create_kern(&init_net, PF_UNIX, SOCK_RAW, IPPROTO_IP,
9176 &ctx->ring_sock);
9177 if (ret)
9178 return ret;
9179#endif
9180
9181 ret = get_unused_fd_flags(O_RDWR | O_CLOEXEC);
9182 if (ret < 0)
9183 goto err;
Hillf Dantonf26c08b2020-12-08 08:54:26 -07009184 fd = ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009185
9186 file = anon_inode_getfile("[io_uring]", &io_uring_fops, ctx,
9187 O_RDWR | O_CLOEXEC);
9188 if (IS_ERR(file)) {
Hillf Dantonf26c08b2020-12-08 08:54:26 -07009189 put_unused_fd(fd);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009190 ret = PTR_ERR(file);
9191 goto err;
9192 }
9193
9194#if defined(CONFIG_UNIX)
9195 ctx->ring_sock->file = file;
9196#endif
Hillf Dantonf26c08b2020-12-08 08:54:26 -07009197 ret = io_uring_add_task_file(ctx, file);
9198 if (ret) {
9199 fput(file);
9200 put_unused_fd(fd);
9201 goto err;
Jens Axboe0f212202020-09-13 13:09:39 -06009202 }
Hillf Dantonf26c08b2020-12-08 08:54:26 -07009203 fd_install(fd, file);
9204 return fd;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009205err:
9206#if defined(CONFIG_UNIX)
9207 sock_release(ctx->ring_sock);
9208 ctx->ring_sock = NULL;
9209#endif
9210 return ret;
9211}
9212
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009213static int io_uring_create(unsigned entries, struct io_uring_params *p,
9214 struct io_uring_params __user *params)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009215{
9216 struct user_struct *user = NULL;
9217 struct io_ring_ctx *ctx;
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009218 bool limit_mem;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009219 int ret;
9220
Jens Axboe8110c1a2019-12-28 15:39:54 -07009221 if (!entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009222 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -07009223 if (entries > IORING_MAX_ENTRIES) {
9224 if (!(p->flags & IORING_SETUP_CLAMP))
9225 return -EINVAL;
9226 entries = IORING_MAX_ENTRIES;
9227 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009228
9229 /*
9230 * Use twice as many entries for the CQ ring. It's possible for the
9231 * application to drive a higher depth than the size of the SQ ring,
9232 * since the sqes are only used at submission time. This allows for
Jens Axboe33a107f2019-10-04 12:10:03 -06009233 * some flexibility in overcommitting a bit. If the application has
9234 * set IORING_SETUP_CQSIZE, it will have passed in the desired number
9235 * of CQ ring entries manually.
Jens Axboe2b188cc2019-01-07 10:46:33 -07009236 */
9237 p->sq_entries = roundup_pow_of_two(entries);
Jens Axboe33a107f2019-10-04 12:10:03 -06009238 if (p->flags & IORING_SETUP_CQSIZE) {
9239 /*
9240 * If IORING_SETUP_CQSIZE is set, we do the same roundup
9241 * to a power-of-two, if it isn't already. We do NOT impose
9242 * any cq vs sq ring sizing.
9243 */
Joseph Qieb2667b32020-11-24 15:03:03 +08009244 if (!p->cq_entries)
Jens Axboe33a107f2019-10-04 12:10:03 -06009245 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -07009246 if (p->cq_entries > IORING_MAX_CQ_ENTRIES) {
9247 if (!(p->flags & IORING_SETUP_CLAMP))
9248 return -EINVAL;
9249 p->cq_entries = IORING_MAX_CQ_ENTRIES;
9250 }
Joseph Qieb2667b32020-11-24 15:03:03 +08009251 p->cq_entries = roundup_pow_of_two(p->cq_entries);
9252 if (p->cq_entries < p->sq_entries)
9253 return -EINVAL;
Jens Axboe33a107f2019-10-04 12:10:03 -06009254 } else {
9255 p->cq_entries = 2 * p->sq_entries;
9256 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009257
9258 user = get_uid(current_user());
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009259 limit_mem = !capable(CAP_IPC_LOCK);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009260
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009261 if (limit_mem) {
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009262 ret = __io_account_mem(user,
Jens Axboe2b188cc2019-01-07 10:46:33 -07009263 ring_pages(p->sq_entries, p->cq_entries));
9264 if (ret) {
9265 free_uid(user);
9266 return ret;
9267 }
9268 }
9269
9270 ctx = io_ring_ctx_alloc(p);
9271 if (!ctx) {
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009272 if (limit_mem)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009273 __io_unaccount_mem(user, ring_pages(p->sq_entries,
Jens Axboe2b188cc2019-01-07 10:46:33 -07009274 p->cq_entries));
9275 free_uid(user);
9276 return -ENOMEM;
9277 }
9278 ctx->compat = in_compat_syscall();
Jens Axboe2b188cc2019-01-07 10:46:33 -07009279 ctx->user = user;
Jens Axboe0b8c0ec2019-12-02 08:50:00 -07009280 ctx->creds = get_current_cred();
Jens Axboe4ea33a92020-10-15 13:46:44 -06009281#ifdef CONFIG_AUDIT
9282 ctx->loginuid = current->loginuid;
9283 ctx->sessionid = current->sessionid;
9284#endif
Jens Axboe2aede0e2020-09-14 10:45:53 -06009285 ctx->sqo_task = get_task_struct(current);
9286
9287 /*
9288 * This is just grabbed for accounting purposes. When a process exits,
9289 * the mm is exited and dropped before the files, hence we need to hang
9290 * on to this mm purely for the purposes of being able to unaccount
9291 * memory (locked/pinned vm). It's not used for anything else.
9292 */
Jens Axboe6b7898e2020-08-25 07:58:00 -06009293 mmgrab(current->mm);
Jens Axboe2aede0e2020-09-14 10:45:53 -06009294 ctx->mm_account = current->mm;
Jens Axboe6b7898e2020-08-25 07:58:00 -06009295
Dennis Zhou91d8f512020-09-16 13:41:05 -07009296#ifdef CONFIG_BLK_CGROUP
9297 /*
9298 * The sq thread will belong to the original cgroup it was inited in.
9299 * If the cgroup goes offline (e.g. disabling the io controller), then
9300 * issued bios will be associated with the closest cgroup later in the
9301 * block layer.
9302 */
9303 rcu_read_lock();
9304 ctx->sqo_blkcg_css = blkcg_css();
9305 ret = css_tryget_online(ctx->sqo_blkcg_css);
9306 rcu_read_unlock();
9307 if (!ret) {
9308 /* don't init against a dying cgroup, have the user try again */
9309 ctx->sqo_blkcg_css = NULL;
9310 ret = -ENODEV;
9311 goto err;
9312 }
9313#endif
Jens Axboe6c271ce2019-01-10 11:22:30 -07009314
Jens Axboe2b188cc2019-01-07 10:46:33 -07009315 /*
9316 * Account memory _before_ installing the file descriptor. Once
9317 * the descriptor is installed, it can get closed at any time. Also
Jens Axboe2b188cc2019-01-07 10:46:33 -07009318 * do this before hitting the general error path, as ring freeing
Hristo Venev75b28af2019-08-26 17:23:46 +00009319 * will un-account as well.
9320 */
9321 io_account_mem(ctx, ring_pages(p->sq_entries, p->cq_entries),
9322 ACCT_LOCKED);
9323 ctx->limit_mem = limit_mem;
9324
9325 ret = io_allocate_scq_urings(ctx, p);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009326 if (ret)
9327 goto err;
Hristo Venev75b28af2019-08-26 17:23:46 +00009328
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009329 ret = io_sq_offload_create(ctx, p);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009330 if (ret)
9331 goto err;
9332
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009333 if (!(p->flags & IORING_SETUP_R_DISABLED))
9334 io_sq_offload_start(ctx);
9335
Jens Axboe2b188cc2019-01-07 10:46:33 -07009336 memset(&p->sq_off, 0, sizeof(p->sq_off));
9337 p->sq_off.head = offsetof(struct io_rings, sq.head);
9338 p->sq_off.tail = offsetof(struct io_rings, sq.tail);
9339 p->sq_off.ring_mask = offsetof(struct io_rings, sq_ring_mask);
9340 p->sq_off.ring_entries = offsetof(struct io_rings, sq_ring_entries);
9341 p->sq_off.flags = offsetof(struct io_rings, sq_flags);
9342 p->sq_off.dropped = offsetof(struct io_rings, sq_dropped);
9343 p->sq_off.array = (char *)ctx->sq_array - (char *)ctx->rings;
9344
9345 memset(&p->cq_off, 0, sizeof(p->cq_off));
Hristo Venev75b28af2019-08-26 17:23:46 +00009346 p->cq_off.head = offsetof(struct io_rings, cq.head);
9347 p->cq_off.tail = offsetof(struct io_rings, cq.tail);
9348 p->cq_off.ring_mask = offsetof(struct io_rings, cq_ring_mask);
9349 p->cq_off.ring_entries = offsetof(struct io_rings, cq_ring_entries);
9350 p->cq_off.overflow = offsetof(struct io_rings, cq_overflow);
9351 p->cq_off.cqes = offsetof(struct io_rings, cqes);
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +02009352 p->cq_off.flags = offsetof(struct io_rings, cq_flags);
Jens Axboeac90f242019-09-06 10:26:21 -06009353
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009354 p->features = IORING_FEAT_SINGLE_MMAP | IORING_FEAT_NODROP |
9355 IORING_FEAT_SUBMIT_STABLE | IORING_FEAT_RW_CUR_POS |
Jiufei Xue5769a352020-06-17 17:53:55 +08009356 IORING_FEAT_CUR_PERSONALITY | IORING_FEAT_FAST_POLL |
9357 IORING_FEAT_POLL_32BITS;
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009358
9359 if (copy_to_user(params, p, sizeof(*p))) {
9360 ret = -EFAULT;
9361 goto err;
9362 }
Jens Axboed1719f72020-07-30 13:43:53 -06009363
9364 /*
Jens Axboe044c1ab2019-10-28 09:15:33 -06009365 * Install ring fd as the very last thing, so we don't risk someone
9366 * having closed it before we finish setup
9367 */
9368 ret = io_uring_get_fd(ctx);
9369 if (ret < 0)
9370 goto err;
9371
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02009372 trace_io_uring_create(ret, ctx, p->sq_entries, p->cq_entries, p->flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009373 return ret;
9374err:
9375 io_ring_ctx_wait_and_kill(ctx);
9376 return ret;
9377}
9378
9379/*
9380 * Sets up an aio uring context, and returns the fd. Applications asks for a
9381 * ring size, we return the actual sq/cq ring sizes (among other things) in the
9382 * params structure passed in.
9383 */
9384static long io_uring_setup(u32 entries, struct io_uring_params __user *params)
9385{
9386 struct io_uring_params p;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009387 int i;
9388
9389 if (copy_from_user(&p, params, sizeof(p)))
9390 return -EFAULT;
9391 for (i = 0; i < ARRAY_SIZE(p.resv); i++) {
9392 if (p.resv[i])
9393 return -EINVAL;
9394 }
9395
Jens Axboe6c271ce2019-01-10 11:22:30 -07009396 if (p.flags & ~(IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL |
Jens Axboe8110c1a2019-12-28 15:39:54 -07009397 IORING_SETUP_SQ_AFF | IORING_SETUP_CQSIZE |
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009398 IORING_SETUP_CLAMP | IORING_SETUP_ATTACH_WQ |
9399 IORING_SETUP_R_DISABLED))
Jens Axboe2b188cc2019-01-07 10:46:33 -07009400 return -EINVAL;
9401
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009402 return io_uring_create(entries, &p, params);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009403}
9404
9405SYSCALL_DEFINE2(io_uring_setup, u32, entries,
9406 struct io_uring_params __user *, params)
9407{
9408 return io_uring_setup(entries, params);
9409}
9410
Jens Axboe66f4af92020-01-16 15:36:52 -07009411static int io_probe(struct io_ring_ctx *ctx, void __user *arg, unsigned nr_args)
9412{
9413 struct io_uring_probe *p;
9414 size_t size;
9415 int i, ret;
9416
9417 size = struct_size(p, ops, nr_args);
9418 if (size == SIZE_MAX)
9419 return -EOVERFLOW;
9420 p = kzalloc(size, GFP_KERNEL);
9421 if (!p)
9422 return -ENOMEM;
9423
9424 ret = -EFAULT;
9425 if (copy_from_user(p, arg, size))
9426 goto out;
9427 ret = -EINVAL;
9428 if (memchr_inv(p, 0, size))
9429 goto out;
9430
9431 p->last_op = IORING_OP_LAST - 1;
9432 if (nr_args > IORING_OP_LAST)
9433 nr_args = IORING_OP_LAST;
9434
9435 for (i = 0; i < nr_args; i++) {
9436 p->ops[i].op = i;
9437 if (!io_op_defs[i].not_supported)
9438 p->ops[i].flags = IO_URING_OP_SUPPORTED;
9439 }
9440 p->ops_len = i;
9441
9442 ret = 0;
9443 if (copy_to_user(arg, p, size))
9444 ret = -EFAULT;
9445out:
9446 kfree(p);
9447 return ret;
9448}
9449
Jens Axboe071698e2020-01-28 10:04:42 -07009450static int io_register_personality(struct io_ring_ctx *ctx)
9451{
Jens Axboe1e6fa522020-10-15 08:46:24 -06009452 struct io_identity *id;
9453 int ret;
Jens Axboe071698e2020-01-28 10:04:42 -07009454
Jens Axboe1e6fa522020-10-15 08:46:24 -06009455 id = kmalloc(sizeof(*id), GFP_KERNEL);
9456 if (unlikely(!id))
9457 return -ENOMEM;
9458
9459 io_init_identity(id);
9460 id->creds = get_current_cred();
9461
9462 ret = idr_alloc_cyclic(&ctx->personality_idr, id, 1, USHRT_MAX, GFP_KERNEL);
9463 if (ret < 0) {
9464 put_cred(id->creds);
9465 kfree(id);
9466 }
9467 return ret;
Jens Axboe071698e2020-01-28 10:04:42 -07009468}
9469
9470static int io_unregister_personality(struct io_ring_ctx *ctx, unsigned id)
9471{
Jens Axboe1e6fa522020-10-15 08:46:24 -06009472 struct io_identity *iod;
Jens Axboe071698e2020-01-28 10:04:42 -07009473
Jens Axboe1e6fa522020-10-15 08:46:24 -06009474 iod = idr_remove(&ctx->personality_idr, id);
9475 if (iod) {
9476 put_cred(iod->creds);
9477 if (refcount_dec_and_test(&iod->count))
9478 kfree(iod);
Jens Axboe071698e2020-01-28 10:04:42 -07009479 return 0;
9480 }
9481
9482 return -EINVAL;
9483}
9484
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009485static int io_register_restrictions(struct io_ring_ctx *ctx, void __user *arg,
9486 unsigned int nr_args)
9487{
9488 struct io_uring_restriction *res;
9489 size_t size;
9490 int i, ret;
9491
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009492 /* Restrictions allowed only if rings started disabled */
9493 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
9494 return -EBADFD;
9495
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009496 /* We allow only a single restrictions registration */
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009497 if (ctx->restrictions.registered)
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009498 return -EBUSY;
9499
9500 if (!arg || nr_args > IORING_MAX_RESTRICTIONS)
9501 return -EINVAL;
9502
9503 size = array_size(nr_args, sizeof(*res));
9504 if (size == SIZE_MAX)
9505 return -EOVERFLOW;
9506
9507 res = memdup_user(arg, size);
9508 if (IS_ERR(res))
9509 return PTR_ERR(res);
9510
9511 ret = 0;
9512
9513 for (i = 0; i < nr_args; i++) {
9514 switch (res[i].opcode) {
9515 case IORING_RESTRICTION_REGISTER_OP:
9516 if (res[i].register_op >= IORING_REGISTER_LAST) {
9517 ret = -EINVAL;
9518 goto out;
9519 }
9520
9521 __set_bit(res[i].register_op,
9522 ctx->restrictions.register_op);
9523 break;
9524 case IORING_RESTRICTION_SQE_OP:
9525 if (res[i].sqe_op >= IORING_OP_LAST) {
9526 ret = -EINVAL;
9527 goto out;
9528 }
9529
9530 __set_bit(res[i].sqe_op, ctx->restrictions.sqe_op);
9531 break;
9532 case IORING_RESTRICTION_SQE_FLAGS_ALLOWED:
9533 ctx->restrictions.sqe_flags_allowed = res[i].sqe_flags;
9534 break;
9535 case IORING_RESTRICTION_SQE_FLAGS_REQUIRED:
9536 ctx->restrictions.sqe_flags_required = res[i].sqe_flags;
9537 break;
9538 default:
9539 ret = -EINVAL;
9540 goto out;
9541 }
9542 }
9543
9544out:
9545 /* Reset all restrictions if an error happened */
9546 if (ret != 0)
9547 memset(&ctx->restrictions, 0, sizeof(ctx->restrictions));
9548 else
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009549 ctx->restrictions.registered = true;
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009550
9551 kfree(res);
9552 return ret;
9553}
9554
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009555static int io_register_enable_rings(struct io_ring_ctx *ctx)
9556{
9557 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
9558 return -EBADFD;
9559
9560 if (ctx->restrictions.registered)
9561 ctx->restricted = 1;
9562
9563 ctx->flags &= ~IORING_SETUP_R_DISABLED;
9564
9565 io_sq_offload_start(ctx);
9566
9567 return 0;
9568}
9569
Jens Axboe071698e2020-01-28 10:04:42 -07009570static bool io_register_op_must_quiesce(int op)
9571{
9572 switch (op) {
9573 case IORING_UNREGISTER_FILES:
9574 case IORING_REGISTER_FILES_UPDATE:
9575 case IORING_REGISTER_PROBE:
9576 case IORING_REGISTER_PERSONALITY:
9577 case IORING_UNREGISTER_PERSONALITY:
9578 return false;
9579 default:
9580 return true;
9581 }
9582}
9583
Jens Axboeedafcce2019-01-09 09:16:05 -07009584static int __io_uring_register(struct io_ring_ctx *ctx, unsigned opcode,
9585 void __user *arg, unsigned nr_args)
Jens Axboeb19062a2019-04-15 10:49:38 -06009586 __releases(ctx->uring_lock)
9587 __acquires(ctx->uring_lock)
Jens Axboeedafcce2019-01-09 09:16:05 -07009588{
9589 int ret;
9590
Jens Axboe35fa71a2019-04-22 10:23:23 -06009591 /*
9592 * We're inside the ring mutex, if the ref is already dying, then
9593 * someone else killed the ctx or is already going through
9594 * io_uring_register().
9595 */
9596 if (percpu_ref_is_dying(&ctx->refs))
9597 return -ENXIO;
9598
Jens Axboe071698e2020-01-28 10:04:42 -07009599 if (io_register_op_must_quiesce(opcode)) {
Jens Axboe05f3fb32019-12-09 11:22:50 -07009600 percpu_ref_kill(&ctx->refs);
Jens Axboeb19062a2019-04-15 10:49:38 -06009601
Jens Axboe05f3fb32019-12-09 11:22:50 -07009602 /*
9603 * Drop uring mutex before waiting for references to exit. If
9604 * another thread is currently inside io_uring_enter() it might
9605 * need to grab the uring_lock to make progress. If we hold it
9606 * here across the drain wait, then we can deadlock. It's safe
9607 * to drop the mutex here, since no new references will come in
9608 * after we've killed the percpu ref.
9609 */
9610 mutex_unlock(&ctx->uring_lock);
Jens Axboeaf9c1a42020-09-24 13:32:18 -06009611 do {
9612 ret = wait_for_completion_interruptible(&ctx->ref_comp);
9613 if (!ret)
9614 break;
Jens Axboeed6930c2020-10-08 19:09:46 -06009615 ret = io_run_task_work_sig();
9616 if (ret < 0)
9617 break;
Jens Axboeaf9c1a42020-09-24 13:32:18 -06009618 } while (1);
9619
Jens Axboe05f3fb32019-12-09 11:22:50 -07009620 mutex_lock(&ctx->uring_lock);
Jens Axboeaf9c1a42020-09-24 13:32:18 -06009621
Jens Axboec1503682020-01-08 08:26:07 -07009622 if (ret) {
9623 percpu_ref_resurrect(&ctx->refs);
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009624 goto out_quiesce;
9625 }
9626 }
9627
9628 if (ctx->restricted) {
9629 if (opcode >= IORING_REGISTER_LAST) {
9630 ret = -EINVAL;
9631 goto out;
9632 }
9633
9634 if (!test_bit(opcode, ctx->restrictions.register_op)) {
9635 ret = -EACCES;
Jens Axboec1503682020-01-08 08:26:07 -07009636 goto out;
9637 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07009638 }
Jens Axboeedafcce2019-01-09 09:16:05 -07009639
9640 switch (opcode) {
9641 case IORING_REGISTER_BUFFERS:
9642 ret = io_sqe_buffer_register(ctx, arg, nr_args);
9643 break;
9644 case IORING_UNREGISTER_BUFFERS:
9645 ret = -EINVAL;
9646 if (arg || nr_args)
9647 break;
9648 ret = io_sqe_buffer_unregister(ctx);
9649 break;
Jens Axboe6b063142019-01-10 22:13:58 -07009650 case IORING_REGISTER_FILES:
9651 ret = io_sqe_files_register(ctx, arg, nr_args);
9652 break;
9653 case IORING_UNREGISTER_FILES:
9654 ret = -EINVAL;
9655 if (arg || nr_args)
9656 break;
9657 ret = io_sqe_files_unregister(ctx);
9658 break;
Jens Axboec3a31e62019-10-03 13:59:56 -06009659 case IORING_REGISTER_FILES_UPDATE:
9660 ret = io_sqe_files_update(ctx, arg, nr_args);
9661 break;
Jens Axboe9b402842019-04-11 11:45:41 -06009662 case IORING_REGISTER_EVENTFD:
Jens Axboef2842ab2020-01-08 11:04:00 -07009663 case IORING_REGISTER_EVENTFD_ASYNC:
Jens Axboe9b402842019-04-11 11:45:41 -06009664 ret = -EINVAL;
9665 if (nr_args != 1)
9666 break;
9667 ret = io_eventfd_register(ctx, arg);
Jens Axboef2842ab2020-01-08 11:04:00 -07009668 if (ret)
9669 break;
9670 if (opcode == IORING_REGISTER_EVENTFD_ASYNC)
9671 ctx->eventfd_async = 1;
9672 else
9673 ctx->eventfd_async = 0;
Jens Axboe9b402842019-04-11 11:45:41 -06009674 break;
9675 case IORING_UNREGISTER_EVENTFD:
9676 ret = -EINVAL;
9677 if (arg || nr_args)
9678 break;
9679 ret = io_eventfd_unregister(ctx);
9680 break;
Jens Axboe66f4af92020-01-16 15:36:52 -07009681 case IORING_REGISTER_PROBE:
9682 ret = -EINVAL;
9683 if (!arg || nr_args > 256)
9684 break;
9685 ret = io_probe(ctx, arg, nr_args);
9686 break;
Jens Axboe071698e2020-01-28 10:04:42 -07009687 case IORING_REGISTER_PERSONALITY:
9688 ret = -EINVAL;
9689 if (arg || nr_args)
9690 break;
9691 ret = io_register_personality(ctx);
9692 break;
9693 case IORING_UNREGISTER_PERSONALITY:
9694 ret = -EINVAL;
9695 if (arg)
9696 break;
9697 ret = io_unregister_personality(ctx, nr_args);
9698 break;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009699 case IORING_REGISTER_ENABLE_RINGS:
9700 ret = -EINVAL;
9701 if (arg || nr_args)
9702 break;
9703 ret = io_register_enable_rings(ctx);
9704 break;
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009705 case IORING_REGISTER_RESTRICTIONS:
9706 ret = io_register_restrictions(ctx, arg, nr_args);
9707 break;
Jens Axboeedafcce2019-01-09 09:16:05 -07009708 default:
9709 ret = -EINVAL;
9710 break;
9711 }
9712
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009713out:
Jens Axboe071698e2020-01-28 10:04:42 -07009714 if (io_register_op_must_quiesce(opcode)) {
Jens Axboe05f3fb32019-12-09 11:22:50 -07009715 /* bring the ctx back to life */
Jens Axboe05f3fb32019-12-09 11:22:50 -07009716 percpu_ref_reinit(&ctx->refs);
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009717out_quiesce:
Jens Axboe0f158b42020-05-14 17:18:39 -06009718 reinit_completion(&ctx->ref_comp);
Jens Axboe05f3fb32019-12-09 11:22:50 -07009719 }
Jens Axboeedafcce2019-01-09 09:16:05 -07009720 return ret;
9721}
9722
9723SYSCALL_DEFINE4(io_uring_register, unsigned int, fd, unsigned int, opcode,
9724 void __user *, arg, unsigned int, nr_args)
9725{
9726 struct io_ring_ctx *ctx;
9727 long ret = -EBADF;
9728 struct fd f;
9729
9730 f = fdget(fd);
9731 if (!f.file)
9732 return -EBADF;
9733
9734 ret = -EOPNOTSUPP;
9735 if (f.file->f_op != &io_uring_fops)
9736 goto out_fput;
9737
9738 ctx = f.file->private_data;
9739
9740 mutex_lock(&ctx->uring_lock);
9741 ret = __io_uring_register(ctx, opcode, arg, nr_args);
9742 mutex_unlock(&ctx->uring_lock);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02009743 trace_io_uring_register(ctx, opcode, ctx->nr_user_files, ctx->nr_user_bufs,
9744 ctx->cq_ev_fd != NULL, ret);
Jens Axboeedafcce2019-01-09 09:16:05 -07009745out_fput:
9746 fdput(f);
9747 return ret;
9748}
9749
Jens Axboe2b188cc2019-01-07 10:46:33 -07009750static int __init io_uring_init(void)
9751{
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009752#define __BUILD_BUG_VERIFY_ELEMENT(stype, eoffset, etype, ename) do { \
9753 BUILD_BUG_ON(offsetof(stype, ename) != eoffset); \
9754 BUILD_BUG_ON(sizeof(etype) != sizeof_field(stype, ename)); \
9755} while (0)
9756
9757#define BUILD_BUG_SQE_ELEM(eoffset, etype, ename) \
9758 __BUILD_BUG_VERIFY_ELEMENT(struct io_uring_sqe, eoffset, etype, ename)
9759 BUILD_BUG_ON(sizeof(struct io_uring_sqe) != 64);
9760 BUILD_BUG_SQE_ELEM(0, __u8, opcode);
9761 BUILD_BUG_SQE_ELEM(1, __u8, flags);
9762 BUILD_BUG_SQE_ELEM(2, __u16, ioprio);
9763 BUILD_BUG_SQE_ELEM(4, __s32, fd);
9764 BUILD_BUG_SQE_ELEM(8, __u64, off);
9765 BUILD_BUG_SQE_ELEM(8, __u64, addr2);
9766 BUILD_BUG_SQE_ELEM(16, __u64, addr);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03009767 BUILD_BUG_SQE_ELEM(16, __u64, splice_off_in);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009768 BUILD_BUG_SQE_ELEM(24, __u32, len);
9769 BUILD_BUG_SQE_ELEM(28, __kernel_rwf_t, rw_flags);
9770 BUILD_BUG_SQE_ELEM(28, /* compat */ int, rw_flags);
9771 BUILD_BUG_SQE_ELEM(28, /* compat */ __u32, rw_flags);
9772 BUILD_BUG_SQE_ELEM(28, __u32, fsync_flags);
Jiufei Xue5769a352020-06-17 17:53:55 +08009773 BUILD_BUG_SQE_ELEM(28, /* compat */ __u16, poll_events);
9774 BUILD_BUG_SQE_ELEM(28, __u32, poll32_events);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009775 BUILD_BUG_SQE_ELEM(28, __u32, sync_range_flags);
9776 BUILD_BUG_SQE_ELEM(28, __u32, msg_flags);
9777 BUILD_BUG_SQE_ELEM(28, __u32, timeout_flags);
9778 BUILD_BUG_SQE_ELEM(28, __u32, accept_flags);
9779 BUILD_BUG_SQE_ELEM(28, __u32, cancel_flags);
9780 BUILD_BUG_SQE_ELEM(28, __u32, open_flags);
9781 BUILD_BUG_SQE_ELEM(28, __u32, statx_flags);
9782 BUILD_BUG_SQE_ELEM(28, __u32, fadvise_advice);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03009783 BUILD_BUG_SQE_ELEM(28, __u32, splice_flags);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009784 BUILD_BUG_SQE_ELEM(32, __u64, user_data);
9785 BUILD_BUG_SQE_ELEM(40, __u16, buf_index);
9786 BUILD_BUG_SQE_ELEM(42, __u16, personality);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03009787 BUILD_BUG_SQE_ELEM(44, __s32, splice_fd_in);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009788
Jens Axboed3656342019-12-18 09:50:26 -07009789 BUILD_BUG_ON(ARRAY_SIZE(io_op_defs) != IORING_OP_LAST);
Jens Axboe84557872020-03-03 15:28:17 -07009790 BUILD_BUG_ON(__REQ_F_LAST_BIT >= 8 * sizeof(int));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009791 req_cachep = KMEM_CACHE(io_kiocb, SLAB_HWCACHE_ALIGN | SLAB_PANIC);
9792 return 0;
9793};
9794__initcall(io_uring_init);