blob: b398394a919eb908cf55e7a086d291bbf41a6da9 [file] [log] [blame]
Jens Axboe2b188cc2019-01-07 10:46:33 -07001// SPDX-License-Identifier: GPL-2.0
2/*
3 * Shared application/kernel submission and completion ring pairs, for
4 * supporting fast/efficient IO.
5 *
6 * A note on the read/write ordering memory barriers that are matched between
Stefan Bühler1e84b972019-04-24 23:54:16 +02007 * the application and kernel side.
8 *
9 * After the application reads the CQ ring tail, it must use an
10 * appropriate smp_rmb() to pair with the smp_wmb() the kernel uses
11 * before writing the tail (using smp_load_acquire to read the tail will
12 * do). It also needs a smp_mb() before updating CQ head (ordering the
13 * entry load(s) with the head store), pairing with an implicit barrier
14 * through a control-dependency in io_get_cqring (smp_store_release to
15 * store head will do). Failure to do so could lead to reading invalid
16 * CQ entries.
17 *
18 * Likewise, the application must use an appropriate smp_wmb() before
19 * writing the SQ tail (ordering SQ entry stores with the tail store),
20 * which pairs with smp_load_acquire in io_get_sqring (smp_store_release
21 * to store the tail will do). And it needs a barrier ordering the SQ
22 * head load before writing new SQ entries (smp_load_acquire to read
23 * head will do).
24 *
25 * When using the SQ poll thread (IORING_SETUP_SQPOLL), the application
26 * needs to check the SQ flags for IORING_SQ_NEED_WAKEUP *after*
27 * updating the SQ tail; a full memory barrier smp_mb() is needed
28 * between.
Jens Axboe2b188cc2019-01-07 10:46:33 -070029 *
30 * Also see the examples in the liburing library:
31 *
32 * git://git.kernel.dk/liburing
33 *
34 * io_uring also uses READ/WRITE_ONCE() for _any_ store or load that happens
35 * from data shared between the kernel and application. This is done both
36 * for ordering purposes, but also to ensure that once a value is loaded from
37 * data that the application could potentially modify, it remains stable.
38 *
39 * Copyright (C) 2018-2019 Jens Axboe
Christoph Hellwigc992fe22019-01-11 09:43:02 -070040 * Copyright (c) 2018-2019 Christoph Hellwig
Jens Axboe2b188cc2019-01-07 10:46:33 -070041 */
42#include <linux/kernel.h>
43#include <linux/init.h>
44#include <linux/errno.h>
45#include <linux/syscalls.h>
46#include <linux/compat.h>
Jens Axboe52de1fe2020-02-27 10:15:42 -070047#include <net/compat.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070048#include <linux/refcount.h>
49#include <linux/uio.h>
Pavel Begunkov6b47ee62020-01-18 20:22:41 +030050#include <linux/bits.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070051
52#include <linux/sched/signal.h>
53#include <linux/fs.h>
54#include <linux/file.h>
55#include <linux/fdtable.h>
56#include <linux/mm.h>
57#include <linux/mman.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070058#include <linux/percpu.h>
59#include <linux/slab.h>
Jens Axboe6c271ce2019-01-10 11:22:30 -070060#include <linux/kthread.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070061#include <linux/blkdev.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070062#include <linux/bvec.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070063#include <linux/net.h>
64#include <net/sock.h>
65#include <net/af_unix.h>
Jens Axboe6b063142019-01-10 22:13:58 -070066#include <net/scm.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070067#include <linux/anon_inodes.h>
68#include <linux/sched/mm.h>
69#include <linux/uaccess.h>
70#include <linux/nospec.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070071#include <linux/sizes.h>
72#include <linux/hugetlb.h>
Jens Axboeaa4c3962019-11-29 10:14:00 -070073#include <linux/highmem.h>
Jens Axboe15b71ab2019-12-11 11:20:36 -070074#include <linux/namei.h>
75#include <linux/fsnotify.h>
Jens Axboe4840e412019-12-25 22:03:45 -070076#include <linux/fadvise.h>
Jens Axboe3e4827b2020-01-08 15:18:09 -070077#include <linux/eventpoll.h>
Jens Axboeff002b32020-02-07 16:05:21 -070078#include <linux/fs_struct.h>
Pavel Begunkov7d67af22020-02-24 11:32:45 +030079#include <linux/splice.h>
Jens Axboeb41e9852020-02-17 09:52:41 -070080#include <linux/task_work.h>
Jens Axboebcf5a062020-05-22 09:24:42 -060081#include <linux/pagemap.h>
Jens Axboe0f212202020-09-13 13:09:39 -060082#include <linux/io_uring.h>
Dennis Zhou91d8f512020-09-16 13:41:05 -070083#include <linux/blk-cgroup.h>
Jens Axboe4ea33a92020-10-15 13:46:44 -060084#include <linux/audit.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070085
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020086#define CREATE_TRACE_POINTS
87#include <trace/events/io_uring.h>
88
Jens Axboe2b188cc2019-01-07 10:46:33 -070089#include <uapi/linux/io_uring.h>
90
91#include "internal.h"
Jens Axboe561fb042019-10-24 07:25:42 -060092#include "io-wq.h"
Jens Axboe2b188cc2019-01-07 10:46:33 -070093
Daniel Xu5277dea2019-09-14 14:23:45 -070094#define IORING_MAX_ENTRIES 32768
Jens Axboe33a107f2019-10-04 12:10:03 -060095#define IORING_MAX_CQ_ENTRIES (2 * IORING_MAX_ENTRIES)
Jens Axboe65e19f52019-10-26 07:20:21 -060096
97/*
98 * Shift of 9 is 512 entries, or exactly one page on 64-bit archs
99 */
100#define IORING_FILE_TABLE_SHIFT 9
101#define IORING_MAX_FILES_TABLE (1U << IORING_FILE_TABLE_SHIFT)
102#define IORING_FILE_TABLE_MASK (IORING_MAX_FILES_TABLE - 1)
103#define IORING_MAX_FIXED_FILES (64 * IORING_MAX_FILES_TABLE)
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200104#define IORING_MAX_RESTRICTIONS (IORING_RESTRICTION_LAST + \
105 IORING_REGISTER_LAST + IORING_OP_LAST)
Jens Axboe2b188cc2019-01-07 10:46:33 -0700106
107struct io_uring {
108 u32 head ____cacheline_aligned_in_smp;
109 u32 tail ____cacheline_aligned_in_smp;
110};
111
Stefan Bühler1e84b972019-04-24 23:54:16 +0200112/*
Hristo Venev75b28af2019-08-26 17:23:46 +0000113 * This data is shared with the application through the mmap at offsets
114 * IORING_OFF_SQ_RING and IORING_OFF_CQ_RING.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200115 *
116 * The offsets to the member fields are published through struct
117 * io_sqring_offsets when calling io_uring_setup.
118 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000119struct io_rings {
Stefan Bühler1e84b972019-04-24 23:54:16 +0200120 /*
121 * Head and tail offsets into the ring; the offsets need to be
122 * masked to get valid indices.
123 *
Hristo Venev75b28af2019-08-26 17:23:46 +0000124 * The kernel controls head of the sq ring and the tail of the cq ring,
125 * and the application controls tail of the sq ring and the head of the
126 * cq ring.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200127 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000128 struct io_uring sq, cq;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200129 /*
Hristo Venev75b28af2019-08-26 17:23:46 +0000130 * Bitmasks to apply to head and tail offsets (constant, equals
Stefan Bühler1e84b972019-04-24 23:54:16 +0200131 * ring_entries - 1)
132 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000133 u32 sq_ring_mask, cq_ring_mask;
134 /* Ring sizes (constant, power of 2) */
135 u32 sq_ring_entries, cq_ring_entries;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200136 /*
137 * Number of invalid entries dropped by the kernel due to
138 * invalid index stored in array
139 *
140 * Written by the kernel, shouldn't be modified by the
141 * application (i.e. get number of "new events" by comparing to
142 * cached value).
143 *
144 * After a new SQ head value was read by the application this
145 * counter includes all submissions that were dropped reaching
146 * the new SQ head (and possibly more).
147 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000148 u32 sq_dropped;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200149 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200150 * Runtime SQ flags
Stefan Bühler1e84b972019-04-24 23:54:16 +0200151 *
152 * Written by the kernel, shouldn't be modified by the
153 * application.
154 *
155 * The application needs a full memory barrier before checking
156 * for IORING_SQ_NEED_WAKEUP after updating the sq tail.
157 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000158 u32 sq_flags;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200159 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200160 * Runtime CQ flags
161 *
162 * Written by the application, shouldn't be modified by the
163 * kernel.
164 */
165 u32 cq_flags;
166 /*
Stefan Bühler1e84b972019-04-24 23:54:16 +0200167 * Number of completion events lost because the queue was full;
168 * this should be avoided by the application by making sure
LimingWu0b4295b2019-12-05 20:18:18 +0800169 * there are not more requests pending than there is space in
Stefan Bühler1e84b972019-04-24 23:54:16 +0200170 * the completion queue.
171 *
172 * Written by the kernel, shouldn't be modified by the
173 * application (i.e. get number of "new events" by comparing to
174 * cached value).
175 *
176 * As completion events come in out of order this counter is not
177 * ordered with any other data.
178 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000179 u32 cq_overflow;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200180 /*
181 * Ring buffer of completion events.
182 *
183 * The kernel writes completion events fresh every time they are
184 * produced, so the application is allowed to modify pending
185 * entries.
186 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000187 struct io_uring_cqe cqes[] ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700188};
189
Jens Axboeedafcce2019-01-09 09:16:05 -0700190struct io_mapped_ubuf {
191 u64 ubuf;
192 size_t len;
193 struct bio_vec *bvec;
194 unsigned int nr_bvecs;
Jens Axboede293932020-09-17 16:19:16 -0600195 unsigned long acct_pages;
Jens Axboeedafcce2019-01-09 09:16:05 -0700196};
197
Jens Axboe65e19f52019-10-26 07:20:21 -0600198struct fixed_file_table {
199 struct file **files;
Jens Axboe31b51512019-01-18 22:56:34 -0700200};
201
Xiaoguang Wang05589552020-03-31 14:05:18 +0800202struct fixed_file_ref_node {
203 struct percpu_ref refs;
204 struct list_head node;
205 struct list_head file_list;
206 struct fixed_file_data *file_data;
Jens Axboe4a38aed22020-05-14 17:21:15 -0600207 struct llist_node llist;
Xiaoguang Wang05589552020-03-31 14:05:18 +0800208};
209
Jens Axboe05f3fb32019-12-09 11:22:50 -0700210struct fixed_file_data {
211 struct fixed_file_table *table;
212 struct io_ring_ctx *ctx;
213
Pavel Begunkovb2e96852020-10-10 18:34:16 +0100214 struct fixed_file_ref_node *node;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700215 struct percpu_ref refs;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700216 struct completion done;
Xiaoguang Wang05589552020-03-31 14:05:18 +0800217 struct list_head ref_list;
218 spinlock_t lock;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700219};
220
Jens Axboe5a2e7452020-02-23 16:23:11 -0700221struct io_buffer {
222 struct list_head list;
223 __u64 addr;
224 __s32 len;
225 __u16 bid;
226};
227
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200228struct io_restriction {
229 DECLARE_BITMAP(register_op, IORING_REGISTER_LAST);
230 DECLARE_BITMAP(sqe_op, IORING_OP_LAST);
231 u8 sqe_flags_allowed;
232 u8 sqe_flags_required;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +0200233 bool registered;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200234};
235
Jens Axboe534ca6d2020-09-02 13:52:19 -0600236struct io_sq_data {
237 refcount_t refs;
Jens Axboe69fb2132020-09-14 11:16:23 -0600238 struct mutex lock;
239
240 /* ctx's that are using this sqd */
241 struct list_head ctx_list;
242 struct list_head ctx_new_list;
243 struct mutex ctx_lock;
244
Jens Axboe534ca6d2020-09-02 13:52:19 -0600245 struct task_struct *thread;
246 struct wait_queue_head wait;
247};
248
Jens Axboe2b188cc2019-01-07 10:46:33 -0700249struct io_ring_ctx {
250 struct {
251 struct percpu_ref refs;
252 } ____cacheline_aligned_in_smp;
253
254 struct {
255 unsigned int flags;
Randy Dunlape1d85332020-02-05 20:57:10 -0800256 unsigned int compat: 1;
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -0700257 unsigned int limit_mem: 1;
Randy Dunlape1d85332020-02-05 20:57:10 -0800258 unsigned int cq_overflow_flushed: 1;
259 unsigned int drain_next: 1;
260 unsigned int eventfd_async: 1;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200261 unsigned int restricted: 1;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700262
Hristo Venev75b28af2019-08-26 17:23:46 +0000263 /*
264 * Ring buffer of indices into array of io_uring_sqe, which is
265 * mmapped by the application using the IORING_OFF_SQES offset.
266 *
267 * This indirection could e.g. be used to assign fixed
268 * io_uring_sqe entries to operations and only submit them to
269 * the queue when needed.
270 *
271 * The kernel modifies neither the indices array nor the entries
272 * array.
273 */
274 u32 *sq_array;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700275 unsigned cached_sq_head;
276 unsigned sq_entries;
277 unsigned sq_mask;
Jens Axboe6c271ce2019-01-10 11:22:30 -0700278 unsigned sq_thread_idle;
Jens Axboe498ccd92019-10-25 10:04:25 -0600279 unsigned cached_sq_dropped;
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +0100280 unsigned cached_cq_overflow;
Jens Axboead3eb2c2019-12-18 17:12:20 -0700281 unsigned long sq_check_overflow;
Jens Axboede0617e2019-04-06 21:51:27 -0600282
283 struct list_head defer_list;
Jens Axboe5262f562019-09-17 12:26:57 -0600284 struct list_head timeout_list;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -0700285 struct list_head cq_overflow_list;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700286
Jens Axboefcb323c2019-10-24 12:39:47 -0600287 wait_queue_head_t inflight_wait;
Jens Axboead3eb2c2019-12-18 17:12:20 -0700288 struct io_uring_sqe *sq_sqes;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700289 } ____cacheline_aligned_in_smp;
290
Hristo Venev75b28af2019-08-26 17:23:46 +0000291 struct io_rings *rings;
292
Jens Axboe2b188cc2019-01-07 10:46:33 -0700293 /* IO offload */
Jens Axboe561fb042019-10-24 07:25:42 -0600294 struct io_wq *io_wq;
Jens Axboe2aede0e2020-09-14 10:45:53 -0600295
296 /*
297 * For SQPOLL usage - we hold a reference to the parent task, so we
298 * have access to the ->files
299 */
300 struct task_struct *sqo_task;
301
302 /* Only used for accounting purposes */
303 struct mm_struct *mm_account;
304
Dennis Zhou91d8f512020-09-16 13:41:05 -0700305#ifdef CONFIG_BLK_CGROUP
306 struct cgroup_subsys_state *sqo_blkcg_css;
307#endif
308
Jens Axboe534ca6d2020-09-02 13:52:19 -0600309 struct io_sq_data *sq_data; /* if using sq thread polling */
310
Jens Axboe90554202020-09-03 12:12:41 -0600311 struct wait_queue_head sqo_sq_wait;
Jens Axboe6a779382020-09-02 12:21:41 -0600312 struct wait_queue_entry sqo_wait_entry;
Jens Axboe69fb2132020-09-14 11:16:23 -0600313 struct list_head sqd_list;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700314
Jens Axboe6b063142019-01-10 22:13:58 -0700315 /*
316 * If used, fixed file set. Writers must ensure that ->refs is dead,
317 * readers must ensure that ->refs is alive as long as the file* is
318 * used. Only updated through io_uring_register(2).
319 */
Jens Axboe05f3fb32019-12-09 11:22:50 -0700320 struct fixed_file_data *file_data;
Jens Axboe6b063142019-01-10 22:13:58 -0700321 unsigned nr_user_files;
322
Jens Axboeedafcce2019-01-09 09:16:05 -0700323 /* if used, fixed mapped user buffers */
324 unsigned nr_user_bufs;
325 struct io_mapped_ubuf *user_bufs;
326
Jens Axboe2b188cc2019-01-07 10:46:33 -0700327 struct user_struct *user;
328
Jens Axboe0b8c0ec2019-12-02 08:50:00 -0700329 const struct cred *creds;
Jens Axboe181e4482019-11-25 08:52:30 -0700330
Jens Axboe4ea33a92020-10-15 13:46:44 -0600331#ifdef CONFIG_AUDIT
332 kuid_t loginuid;
333 unsigned int sessionid;
334#endif
335
Jens Axboe0f158b42020-05-14 17:18:39 -0600336 struct completion ref_comp;
337 struct completion sq_thread_comp;
Jens Axboe206aefd2019-11-07 18:27:42 -0700338
Jens Axboe0ddf92e2019-11-08 08:52:53 -0700339 /* if all else fails... */
340 struct io_kiocb *fallback_req;
341
Jens Axboe206aefd2019-11-07 18:27:42 -0700342#if defined(CONFIG_UNIX)
343 struct socket *ring_sock;
344#endif
345
Jens Axboe5a2e7452020-02-23 16:23:11 -0700346 struct idr io_buffer_idr;
347
Jens Axboe071698e2020-01-28 10:04:42 -0700348 struct idr personality_idr;
349
Jens Axboe206aefd2019-11-07 18:27:42 -0700350 struct {
351 unsigned cached_cq_tail;
352 unsigned cq_entries;
353 unsigned cq_mask;
354 atomic_t cq_timeouts;
Jens Axboead3eb2c2019-12-18 17:12:20 -0700355 unsigned long cq_check_overflow;
Jens Axboe206aefd2019-11-07 18:27:42 -0700356 struct wait_queue_head cq_wait;
357 struct fasync_struct *cq_fasync;
358 struct eventfd_ctx *cq_ev_fd;
359 } ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700360
361 struct {
362 struct mutex uring_lock;
363 wait_queue_head_t wait;
364 } ____cacheline_aligned_in_smp;
365
366 struct {
367 spinlock_t completion_lock;
Jens Axboee94f1412019-12-19 12:06:02 -0700368
Jens Axboedef596e2019-01-09 08:59:42 -0700369 /*
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300370 * ->iopoll_list is protected by the ctx->uring_lock for
Jens Axboedef596e2019-01-09 08:59:42 -0700371 * io_uring instances that don't use IORING_SETUP_SQPOLL.
372 * For SQPOLL, only the single threaded io_sq_thread() will
373 * manipulate the list, hence no extra locking is needed there.
374 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300375 struct list_head iopoll_list;
Jens Axboe78076bb2019-12-04 19:56:40 -0700376 struct hlist_head *cancel_hash;
377 unsigned cancel_hash_bits;
Jens Axboee94f1412019-12-19 12:06:02 -0700378 bool poll_multi_file;
Jens Axboefcb323c2019-10-24 12:39:47 -0600379
380 spinlock_t inflight_lock;
381 struct list_head inflight_list;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700382 } ____cacheline_aligned_in_smp;
Jens Axboe85faa7b2020-04-09 18:14:00 -0600383
Jens Axboe4a38aed22020-05-14 17:21:15 -0600384 struct delayed_work file_put_work;
385 struct llist_head file_put_llist;
386
Jens Axboe85faa7b2020-04-09 18:14:00 -0600387 struct work_struct exit_work;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200388 struct io_restriction restrictions;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700389};
390
Jens Axboe09bb8392019-03-13 12:39:28 -0600391/*
392 * First field must be the file pointer in all the
393 * iocb unions! See also 'struct kiocb' in <linux/fs.h>
394 */
Jens Axboe221c5eb2019-01-17 09:41:58 -0700395struct io_poll_iocb {
396 struct file *file;
Jens Axboe0969e782019-12-17 18:40:57 -0700397 union {
398 struct wait_queue_head *head;
399 u64 addr;
400 };
Jens Axboe221c5eb2019-01-17 09:41:58 -0700401 __poll_t events;
Jens Axboe8c838782019-03-12 15:48:16 -0600402 bool done;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700403 bool canceled;
Jens Axboe392edb42019-12-09 17:52:20 -0700404 struct wait_queue_entry wait;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700405};
406
Jens Axboeb5dba592019-12-11 14:02:38 -0700407struct io_close {
408 struct file *file;
409 struct file *put_file;
410 int fd;
411};
412
Jens Axboead8a48a2019-11-15 08:49:11 -0700413struct io_timeout_data {
414 struct io_kiocb *req;
415 struct hrtimer timer;
416 struct timespec64 ts;
417 enum hrtimer_mode mode;
418};
419
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700420struct io_accept {
421 struct file *file;
422 struct sockaddr __user *addr;
423 int __user *addr_len;
424 int flags;
Jens Axboe09952e32020-03-19 20:16:56 -0600425 unsigned long nofile;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700426};
427
428struct io_sync {
429 struct file *file;
430 loff_t len;
431 loff_t off;
432 int flags;
Jens Axboed63d1b52019-12-10 10:38:56 -0700433 int mode;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700434};
435
Jens Axboefbf23842019-12-17 18:45:56 -0700436struct io_cancel {
437 struct file *file;
438 u64 addr;
439};
440
Jens Axboeb29472e2019-12-17 18:50:29 -0700441struct io_timeout {
442 struct file *file;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +0300443 u32 off;
444 u32 target_seq;
Pavel Begunkov135fcde2020-07-13 23:37:12 +0300445 struct list_head list;
Jens Axboeb29472e2019-12-17 18:50:29 -0700446};
447
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100448struct io_timeout_rem {
449 struct file *file;
450 u64 addr;
451};
452
Jens Axboe9adbd452019-12-20 08:45:55 -0700453struct io_rw {
454 /* NOTE: kiocb has the file as the first member, so don't do it here */
455 struct kiocb kiocb;
456 u64 addr;
457 u64 len;
458};
459
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700460struct io_connect {
461 struct file *file;
462 struct sockaddr __user *addr;
463 int addr_len;
464};
465
Jens Axboee47293f2019-12-20 08:58:21 -0700466struct io_sr_msg {
467 struct file *file;
Jens Axboefddafac2020-01-04 20:19:44 -0700468 union {
Pavel Begunkov270a5942020-07-12 20:41:04 +0300469 struct user_msghdr __user *umsg;
Jens Axboefddafac2020-01-04 20:19:44 -0700470 void __user *buf;
471 };
Jens Axboee47293f2019-12-20 08:58:21 -0700472 int msg_flags;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700473 int bgid;
Jens Axboefddafac2020-01-04 20:19:44 -0700474 size_t len;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700475 struct io_buffer *kbuf;
Jens Axboee47293f2019-12-20 08:58:21 -0700476};
477
Jens Axboe15b71ab2019-12-11 11:20:36 -0700478struct io_open {
479 struct file *file;
480 int dfd;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700481 struct filename *filename;
Jens Axboec12cedf2020-01-08 17:41:21 -0700482 struct open_how how;
Jens Axboe4022e7a2020-03-19 19:23:18 -0600483 unsigned long nofile;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700484};
485
Jens Axboe05f3fb32019-12-09 11:22:50 -0700486struct io_files_update {
487 struct file *file;
488 u64 arg;
489 u32 nr_args;
490 u32 offset;
491};
492
Jens Axboe4840e412019-12-25 22:03:45 -0700493struct io_fadvise {
494 struct file *file;
495 u64 offset;
496 u32 len;
497 u32 advice;
498};
499
Jens Axboec1ca7572019-12-25 22:18:28 -0700500struct io_madvise {
501 struct file *file;
502 u64 addr;
503 u32 len;
504 u32 advice;
505};
506
Jens Axboe3e4827b2020-01-08 15:18:09 -0700507struct io_epoll {
508 struct file *file;
509 int epfd;
510 int op;
511 int fd;
512 struct epoll_event event;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700513};
514
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300515struct io_splice {
516 struct file *file_out;
517 struct file *file_in;
518 loff_t off_out;
519 loff_t off_in;
520 u64 len;
521 unsigned int flags;
522};
523
Jens Axboeddf0322d2020-02-23 16:41:33 -0700524struct io_provide_buf {
525 struct file *file;
526 __u64 addr;
527 __s32 len;
528 __u32 bgid;
529 __u16 nbufs;
530 __u16 bid;
531};
532
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700533struct io_statx {
534 struct file *file;
535 int dfd;
536 unsigned int mask;
537 unsigned int flags;
Bijan Mottahedehe62753e2020-05-22 21:31:18 -0700538 const char __user *filename;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700539 struct statx __user *buffer;
540};
541
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300542struct io_completion {
543 struct file *file;
544 struct list_head list;
Pavel Begunkov0f7e4662020-07-13 23:37:16 +0300545 int cflags;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300546};
547
Jens Axboef499a022019-12-02 16:28:46 -0700548struct io_async_connect {
549 struct sockaddr_storage address;
550};
551
Jens Axboe03b12302019-12-02 18:50:25 -0700552struct io_async_msghdr {
553 struct iovec fast_iov[UIO_FASTIOV];
554 struct iovec *iov;
555 struct sockaddr __user *uaddr;
556 struct msghdr msg;
Jens Axboeb5379162020-02-09 11:29:15 -0700557 struct sockaddr_storage addr;
Jens Axboe03b12302019-12-02 18:50:25 -0700558};
559
Jens Axboef67676d2019-12-02 11:03:47 -0700560struct io_async_rw {
561 struct iovec fast_iov[UIO_FASTIOV];
Jens Axboeff6165b2020-08-13 09:47:43 -0600562 const struct iovec *free_iovec;
563 struct iov_iter iter;
Jens Axboe227c0c92020-08-13 11:51:40 -0600564 size_t bytes_done;
Jens Axboebcf5a062020-05-22 09:24:42 -0600565 struct wait_page_queue wpq;
Jens Axboef67676d2019-12-02 11:03:47 -0700566};
567
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300568enum {
569 REQ_F_FIXED_FILE_BIT = IOSQE_FIXED_FILE_BIT,
570 REQ_F_IO_DRAIN_BIT = IOSQE_IO_DRAIN_BIT,
571 REQ_F_LINK_BIT = IOSQE_IO_LINK_BIT,
572 REQ_F_HARDLINK_BIT = IOSQE_IO_HARDLINK_BIT,
573 REQ_F_FORCE_ASYNC_BIT = IOSQE_ASYNC_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700574 REQ_F_BUFFER_SELECT_BIT = IOSQE_BUFFER_SELECT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300575
Pavel Begunkovdea3b492020-04-12 02:05:04 +0300576 REQ_F_LINK_HEAD_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300577 REQ_F_FAIL_LINK_BIT,
578 REQ_F_INFLIGHT_BIT,
579 REQ_F_CUR_POS_BIT,
580 REQ_F_NOWAIT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300581 REQ_F_LINK_TIMEOUT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300582 REQ_F_ISREG_BIT,
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300583 REQ_F_NEED_CLEANUP_BIT,
Jens Axboed7718a92020-02-14 22:23:12 -0700584 REQ_F_POLLED_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700585 REQ_F_BUFFER_SELECTED_BIT,
Jens Axboe5b0bbee2020-04-27 10:41:22 -0600586 REQ_F_NO_FILE_TABLE_BIT,
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +0800587 REQ_F_WORK_INITIALIZED_BIT,
Pavel Begunkov900fad42020-10-19 16:39:16 +0100588 REQ_F_LTIMEOUT_ACTIVE_BIT,
Jens Axboe84557872020-03-03 15:28:17 -0700589
590 /* not a real bit, just to check we're not overflowing the space */
591 __REQ_F_LAST_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300592};
593
594enum {
595 /* ctx owns file */
596 REQ_F_FIXED_FILE = BIT(REQ_F_FIXED_FILE_BIT),
597 /* drain existing IO first */
598 REQ_F_IO_DRAIN = BIT(REQ_F_IO_DRAIN_BIT),
599 /* linked sqes */
600 REQ_F_LINK = BIT(REQ_F_LINK_BIT),
601 /* doesn't sever on completion < 0 */
602 REQ_F_HARDLINK = BIT(REQ_F_HARDLINK_BIT),
603 /* IOSQE_ASYNC */
604 REQ_F_FORCE_ASYNC = BIT(REQ_F_FORCE_ASYNC_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700605 /* IOSQE_BUFFER_SELECT */
606 REQ_F_BUFFER_SELECT = BIT(REQ_F_BUFFER_SELECT_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300607
Pavel Begunkovdea3b492020-04-12 02:05:04 +0300608 /* head of a link */
609 REQ_F_LINK_HEAD = BIT(REQ_F_LINK_HEAD_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300610 /* fail rest of links */
611 REQ_F_FAIL_LINK = BIT(REQ_F_FAIL_LINK_BIT),
612 /* on inflight list */
613 REQ_F_INFLIGHT = BIT(REQ_F_INFLIGHT_BIT),
614 /* read/write uses file position */
615 REQ_F_CUR_POS = BIT(REQ_F_CUR_POS_BIT),
616 /* must not punt to workers */
617 REQ_F_NOWAIT = BIT(REQ_F_NOWAIT_BIT),
Pavel Begunkov900fad42020-10-19 16:39:16 +0100618 /* has or had linked timeout */
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300619 REQ_F_LINK_TIMEOUT = BIT(REQ_F_LINK_TIMEOUT_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300620 /* regular file */
621 REQ_F_ISREG = BIT(REQ_F_ISREG_BIT),
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300622 /* needs cleanup */
623 REQ_F_NEED_CLEANUP = BIT(REQ_F_NEED_CLEANUP_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700624 /* already went through poll handler */
625 REQ_F_POLLED = BIT(REQ_F_POLLED_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700626 /* buffer already selected */
627 REQ_F_BUFFER_SELECTED = BIT(REQ_F_BUFFER_SELECTED_BIT),
Jens Axboe5b0bbee2020-04-27 10:41:22 -0600628 /* doesn't need file table for this request */
629 REQ_F_NO_FILE_TABLE = BIT(REQ_F_NO_FILE_TABLE_BIT),
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +0800630 /* io_wq_work is initialized */
631 REQ_F_WORK_INITIALIZED = BIT(REQ_F_WORK_INITIALIZED_BIT),
Pavel Begunkov900fad42020-10-19 16:39:16 +0100632 /* linked timeout is active, i.e. prepared by link's head */
633 REQ_F_LTIMEOUT_ACTIVE = BIT(REQ_F_LTIMEOUT_ACTIVE_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700634};
635
636struct async_poll {
637 struct io_poll_iocb poll;
Jens Axboe807abcb2020-07-17 17:09:27 -0600638 struct io_poll_iocb *double_poll;
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300639};
640
Jens Axboe09bb8392019-03-13 12:39:28 -0600641/*
642 * NOTE! Each of the iocb union members has the file pointer
643 * as the first entry in their struct definition. So you can
644 * access the file pointer through any of the sub-structs,
645 * or directly as just 'ki_filp' in this struct.
646 */
Jens Axboe2b188cc2019-01-07 10:46:33 -0700647struct io_kiocb {
Jens Axboe221c5eb2019-01-17 09:41:58 -0700648 union {
Jens Axboe09bb8392019-03-13 12:39:28 -0600649 struct file *file;
Jens Axboe9adbd452019-12-20 08:45:55 -0700650 struct io_rw rw;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700651 struct io_poll_iocb poll;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700652 struct io_accept accept;
653 struct io_sync sync;
Jens Axboefbf23842019-12-17 18:45:56 -0700654 struct io_cancel cancel;
Jens Axboeb29472e2019-12-17 18:50:29 -0700655 struct io_timeout timeout;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100656 struct io_timeout_rem timeout_rem;
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700657 struct io_connect connect;
Jens Axboee47293f2019-12-20 08:58:21 -0700658 struct io_sr_msg sr_msg;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700659 struct io_open open;
Jens Axboeb5dba592019-12-11 14:02:38 -0700660 struct io_close close;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700661 struct io_files_update files_update;
Jens Axboe4840e412019-12-25 22:03:45 -0700662 struct io_fadvise fadvise;
Jens Axboec1ca7572019-12-25 22:18:28 -0700663 struct io_madvise madvise;
Jens Axboe3e4827b2020-01-08 15:18:09 -0700664 struct io_epoll epoll;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300665 struct io_splice splice;
Jens Axboeddf0322d2020-02-23 16:41:33 -0700666 struct io_provide_buf pbuf;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700667 struct io_statx statx;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300668 /* use only after cleaning per-op data, see io_clean_op() */
669 struct io_completion compl;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700670 };
Jens Axboe2b188cc2019-01-07 10:46:33 -0700671
Jens Axboee8c2bc12020-08-15 18:44:09 -0700672 /* opcode allocated if it needs to store data for async defer */
673 void *async_data;
Jens Axboed625c6e2019-12-17 19:53:05 -0700674 u8 opcode;
Xiaoguang Wang65a65432020-06-11 23:39:36 +0800675 /* polled IO has completed */
676 u8 iopoll_completed;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700677
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700678 u16 buf_index;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300679 u32 result;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700680
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300681 struct io_ring_ctx *ctx;
682 unsigned int flags;
683 refcount_t refs;
684 struct task_struct *task;
685 u64 user_data;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700686
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300687 struct list_head link_list;
Jens Axboed7718a92020-02-14 22:23:12 -0700688
Pavel Begunkovd21ffe72020-07-13 23:37:10 +0300689 /*
690 * 1. used with ctx->iopoll_list with reads/writes
691 * 2. to track reqs with ->files (see io_op_def::file_table)
692 */
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300693 struct list_head inflight_entry;
Jens Axboefcb323c2019-10-24 12:39:47 -0600694
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300695 struct percpu_ref *fixed_file_refs;
696 struct callback_head task_work;
697 /* for polled requests, i.e. IORING_OP_POLL_ADD and async armed poll */
698 struct hlist_node hash_node;
699 struct async_poll *apoll;
700 struct io_wq_work work;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700701};
702
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300703struct io_defer_entry {
704 struct list_head list;
705 struct io_kiocb *req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300706 u32 seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300707};
708
Jens Axboedef596e2019-01-09 08:59:42 -0700709#define IO_IOPOLL_BATCH 8
Jens Axboe2b188cc2019-01-07 10:46:33 -0700710
Jens Axboe013538b2020-06-22 09:29:15 -0600711struct io_comp_state {
712 unsigned int nr;
713 struct list_head list;
714 struct io_ring_ctx *ctx;
715};
716
Jens Axboe9a56a232019-01-09 09:06:50 -0700717struct io_submit_state {
718 struct blk_plug plug;
719
720 /*
Jens Axboe2579f912019-01-09 09:10:43 -0700721 * io_kiocb alloc cache
722 */
723 void *reqs[IO_IOPOLL_BATCH];
Pavel Begunkov6c8a3132020-02-01 03:58:00 +0300724 unsigned int free_reqs;
Jens Axboe2579f912019-01-09 09:10:43 -0700725
726 /*
Jens Axboe013538b2020-06-22 09:29:15 -0600727 * Batch completion logic
728 */
729 struct io_comp_state comp;
730
731 /*
Jens Axboe9a56a232019-01-09 09:06:50 -0700732 * File reference cache
733 */
734 struct file *file;
735 unsigned int fd;
736 unsigned int has_refs;
Jens Axboe9a56a232019-01-09 09:06:50 -0700737 unsigned int ios_left;
738};
739
Jens Axboed3656342019-12-18 09:50:26 -0700740struct io_op_def {
Jens Axboed3656342019-12-18 09:50:26 -0700741 /* needs req->file assigned */
742 unsigned needs_file : 1;
Jens Axboefd2206e2020-06-02 16:40:47 -0600743 /* don't fail if file grab fails */
744 unsigned needs_file_no_error : 1;
Jens Axboed3656342019-12-18 09:50:26 -0700745 /* hash wq insertion if file is a regular file */
746 unsigned hash_reg_file : 1;
747 /* unbound wq insertion if file is a non-regular file */
748 unsigned unbound_nonreg_file : 1;
Jens Axboe66f4af92020-01-16 15:36:52 -0700749 /* opcode is not supported by this kernel */
750 unsigned not_supported : 1;
Jens Axboe8a727582020-02-20 09:59:44 -0700751 /* set if opcode supports polled "wait" */
752 unsigned pollin : 1;
753 unsigned pollout : 1;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700754 /* op supports buffer selection */
755 unsigned buffer_select : 1;
Jens Axboee8c2bc12020-08-15 18:44:09 -0700756 /* must always have async data allocated */
757 unsigned needs_async_data : 1;
758 /* size of async data needed, if any */
759 unsigned short async_size;
Jens Axboe0f203762020-10-14 09:23:55 -0600760 unsigned work_flags;
Jens Axboed3656342019-12-18 09:50:26 -0700761};
762
Jens Axboe09186822020-10-13 15:01:40 -0600763static const struct io_op_def io_op_defs[] = {
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300764 [IORING_OP_NOP] = {},
765 [IORING_OP_READV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700766 .needs_file = 1,
767 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700768 .pollin = 1,
Jens Axboe4d954c22020-02-27 07:31:19 -0700769 .buffer_select = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700770 .needs_async_data = 1,
771 .async_size = sizeof(struct io_async_rw),
Jens Axboe0f203762020-10-14 09:23:55 -0600772 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700773 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300774 [IORING_OP_WRITEV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700775 .needs_file = 1,
776 .hash_reg_file = 1,
777 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700778 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700779 .needs_async_data = 1,
780 .async_size = sizeof(struct io_async_rw),
Jens Axboe69228332020-10-20 14:28:41 -0600781 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
782 IO_WQ_WORK_FSIZE,
Jens Axboed3656342019-12-18 09:50:26 -0700783 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300784 [IORING_OP_FSYNC] = {
Jens Axboed3656342019-12-18 09:50:26 -0700785 .needs_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600786 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700787 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300788 [IORING_OP_READ_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700789 .needs_file = 1,
790 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700791 .pollin = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700792 .async_size = sizeof(struct io_async_rw),
Jens Axboe4017eb92020-10-22 14:14:12 -0600793 .work_flags = IO_WQ_WORK_BLKCG | IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700794 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300795 [IORING_OP_WRITE_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700796 .needs_file = 1,
797 .hash_reg_file = 1,
798 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700799 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700800 .async_size = sizeof(struct io_async_rw),
Jens Axboe4017eb92020-10-22 14:14:12 -0600801 .work_flags = IO_WQ_WORK_BLKCG | IO_WQ_WORK_FSIZE |
802 IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700803 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300804 [IORING_OP_POLL_ADD] = {
Jens Axboed3656342019-12-18 09:50:26 -0700805 .needs_file = 1,
806 .unbound_nonreg_file = 1,
807 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300808 [IORING_OP_POLL_REMOVE] = {},
809 [IORING_OP_SYNC_FILE_RANGE] = {
Jens Axboed3656342019-12-18 09:50:26 -0700810 .needs_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600811 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700812 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300813 [IORING_OP_SENDMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700814 .needs_file = 1,
815 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700816 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700817 .needs_async_data = 1,
818 .async_size = sizeof(struct io_async_msghdr),
Jens Axboe0f203762020-10-14 09:23:55 -0600819 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
820 IO_WQ_WORK_FS,
Jens Axboed3656342019-12-18 09:50:26 -0700821 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300822 [IORING_OP_RECVMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700823 .needs_file = 1,
824 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700825 .pollin = 1,
Jens Axboe52de1fe2020-02-27 10:15:42 -0700826 .buffer_select = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700827 .needs_async_data = 1,
828 .async_size = sizeof(struct io_async_msghdr),
Jens Axboe0f203762020-10-14 09:23:55 -0600829 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
830 IO_WQ_WORK_FS,
Jens Axboed3656342019-12-18 09:50:26 -0700831 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300832 [IORING_OP_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -0700833 .needs_async_data = 1,
834 .async_size = sizeof(struct io_timeout_data),
Jens Axboe0f203762020-10-14 09:23:55 -0600835 .work_flags = IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700836 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300837 [IORING_OP_TIMEOUT_REMOVE] = {},
838 [IORING_OP_ACCEPT] = {
Jens Axboed3656342019-12-18 09:50:26 -0700839 .needs_file = 1,
840 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700841 .pollin = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600842 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_FILES,
Jens Axboed3656342019-12-18 09:50:26 -0700843 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300844 [IORING_OP_ASYNC_CANCEL] = {},
845 [IORING_OP_LINK_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -0700846 .needs_async_data = 1,
847 .async_size = sizeof(struct io_timeout_data),
Jens Axboe0f203762020-10-14 09:23:55 -0600848 .work_flags = IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700849 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300850 [IORING_OP_CONNECT] = {
Jens Axboed3656342019-12-18 09:50:26 -0700851 .needs_file = 1,
852 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700853 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700854 .needs_async_data = 1,
855 .async_size = sizeof(struct io_async_connect),
Jens Axboe0f203762020-10-14 09:23:55 -0600856 .work_flags = IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700857 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300858 [IORING_OP_FALLOCATE] = {
Jens Axboed3656342019-12-18 09:50:26 -0700859 .needs_file = 1,
Jens Axboe69228332020-10-20 14:28:41 -0600860 .work_flags = IO_WQ_WORK_BLKCG | IO_WQ_WORK_FSIZE,
Jens Axboed3656342019-12-18 09:50:26 -0700861 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300862 [IORING_OP_OPENAT] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600863 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_BLKCG |
864 IO_WQ_WORK_FS,
Jens Axboed3656342019-12-18 09:50:26 -0700865 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300866 [IORING_OP_CLOSE] = {
Jens Axboefd2206e2020-06-02 16:40:47 -0600867 .needs_file = 1,
868 .needs_file_no_error = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600869 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700870 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300871 [IORING_OP_FILES_UPDATE] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600872 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_MM,
Jens Axboed3656342019-12-18 09:50:26 -0700873 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300874 [IORING_OP_STATX] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600875 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_MM |
876 IO_WQ_WORK_FS | IO_WQ_WORK_BLKCG,
Jens Axboed3656342019-12-18 09:50:26 -0700877 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300878 [IORING_OP_READ] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -0700879 .needs_file = 1,
880 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700881 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700882 .buffer_select = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700883 .async_size = sizeof(struct io_async_rw),
Jens Axboe0f203762020-10-14 09:23:55 -0600884 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboe3a6820f2019-12-22 15:19:35 -0700885 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300886 [IORING_OP_WRITE] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -0700887 .needs_file = 1,
888 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700889 .pollout = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700890 .async_size = sizeof(struct io_async_rw),
Jens Axboe69228332020-10-20 14:28:41 -0600891 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG |
892 IO_WQ_WORK_FSIZE,
Jens Axboe3a6820f2019-12-22 15:19:35 -0700893 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300894 [IORING_OP_FADVISE] = {
Jens Axboe4840e412019-12-25 22:03:45 -0700895 .needs_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600896 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboe4840e412019-12-25 22:03:45 -0700897 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300898 [IORING_OP_MADVISE] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600899 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboec1ca7572019-12-25 22:18:28 -0700900 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300901 [IORING_OP_SEND] = {
Jens Axboefddafac2020-01-04 20:19:44 -0700902 .needs_file = 1,
903 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700904 .pollout = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600905 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboefddafac2020-01-04 20:19:44 -0700906 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300907 [IORING_OP_RECV] = {
Jens Axboefddafac2020-01-04 20:19:44 -0700908 .needs_file = 1,
909 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700910 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700911 .buffer_select = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600912 .work_flags = IO_WQ_WORK_MM | IO_WQ_WORK_BLKCG,
Jens Axboefddafac2020-01-04 20:19:44 -0700913 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300914 [IORING_OP_OPENAT2] = {
Jens Axboe0f203762020-10-14 09:23:55 -0600915 .work_flags = IO_WQ_WORK_FILES | IO_WQ_WORK_FS |
916 IO_WQ_WORK_BLKCG,
Jens Axboecebdb982020-01-08 17:59:24 -0700917 },
Jens Axboe3e4827b2020-01-08 15:18:09 -0700918 [IORING_OP_EPOLL_CTL] = {
919 .unbound_nonreg_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600920 .work_flags = IO_WQ_WORK_FILES,
Jens Axboe3e4827b2020-01-08 15:18:09 -0700921 },
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300922 [IORING_OP_SPLICE] = {
923 .needs_file = 1,
924 .hash_reg_file = 1,
925 .unbound_nonreg_file = 1,
Jens Axboe0f203762020-10-14 09:23:55 -0600926 .work_flags = IO_WQ_WORK_BLKCG,
Jens Axboeddf0322d2020-02-23 16:41:33 -0700927 },
928 [IORING_OP_PROVIDE_BUFFERS] = {},
Jens Axboe067524e2020-03-02 16:32:28 -0700929 [IORING_OP_REMOVE_BUFFERS] = {},
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +0300930 [IORING_OP_TEE] = {
931 .needs_file = 1,
932 .hash_reg_file = 1,
933 .unbound_nonreg_file = 1,
934 },
Jens Axboed3656342019-12-18 09:50:26 -0700935};
936
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -0700937enum io_mem_account {
938 ACCT_LOCKED,
939 ACCT_PINNED,
940};
941
Pavel Begunkov81b68a52020-07-30 18:43:46 +0300942static void __io_complete_rw(struct io_kiocb *req, long res, long res2,
943 struct io_comp_state *cs);
Jens Axboe78e19bb2019-11-06 15:21:34 -0700944static void io_cqring_fill_event(struct io_kiocb *req, long res);
Jackie Liuec9c02a2019-11-08 23:50:36 +0800945static void io_put_req(struct io_kiocb *req);
Pavel Begunkov216578e2020-10-13 09:44:00 +0100946static void io_put_req_deferred(struct io_kiocb *req, int nr);
Jens Axboec40f6372020-06-25 15:39:59 -0600947static void io_double_put_req(struct io_kiocb *req);
Jens Axboe94ae5e72019-11-14 19:39:52 -0700948static struct io_kiocb *io_prep_linked_timeout(struct io_kiocb *req);
Jens Axboe7271ef32020-08-10 09:55:22 -0600949static void __io_queue_linked_timeout(struct io_kiocb *req);
Jens Axboe94ae5e72019-11-14 19:39:52 -0700950static void io_queue_linked_timeout(struct io_kiocb *req);
Jens Axboe05f3fb32019-12-09 11:22:50 -0700951static int __io_sqe_files_update(struct io_ring_ctx *ctx,
952 struct io_uring_files_update *ip,
953 unsigned nr_args);
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300954static void __io_clean_op(struct io_kiocb *req);
Pavel Begunkov8371adf2020-10-10 18:34:08 +0100955static struct file *io_file_get(struct io_submit_state *state,
956 struct io_kiocb *req, int fd, bool fixed);
Pavel Begunkovc1379e22020-09-30 22:57:56 +0300957static void __io_queue_sqe(struct io_kiocb *req, struct io_comp_state *cs);
Jens Axboe4349f302020-07-09 15:07:01 -0600958static void io_file_put_work(struct work_struct *work);
Jens Axboede0617e2019-04-06 21:51:27 -0600959
Jens Axboeb63534c2020-06-04 11:28:00 -0600960static ssize_t io_import_iovec(int rw, struct io_kiocb *req,
961 struct iovec **iovec, struct iov_iter *iter,
962 bool needs_lock);
Jens Axboeff6165b2020-08-13 09:47:43 -0600963static int io_setup_async_rw(struct io_kiocb *req, const struct iovec *iovec,
964 const struct iovec *fast_iov,
Jens Axboe227c0c92020-08-13 11:51:40 -0600965 struct iov_iter *iter, bool force);
Jens Axboe2b188cc2019-01-07 10:46:33 -0700966
967static struct kmem_cache *req_cachep;
968
Jens Axboe09186822020-10-13 15:01:40 -0600969static const struct file_operations io_uring_fops;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700970
971struct sock *io_uring_get_socket(struct file *file)
972{
973#if defined(CONFIG_UNIX)
974 if (file->f_op == &io_uring_fops) {
975 struct io_ring_ctx *ctx = file->private_data;
976
977 return ctx->ring_sock->sk;
978 }
979#endif
980 return NULL;
981}
982EXPORT_SYMBOL(io_uring_get_socket);
983
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300984static inline void io_clean_op(struct io_kiocb *req)
985{
Pavel Begunkovbb175342020-08-20 11:33:35 +0300986 if (req->flags & (REQ_F_NEED_CLEANUP | REQ_F_BUFFER_SELECTED |
987 REQ_F_INFLIGHT))
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300988 __io_clean_op(req);
989}
990
Jens Axboe4349f302020-07-09 15:07:01 -0600991static void io_sq_thread_drop_mm(void)
Jens Axboec40f6372020-06-25 15:39:59 -0600992{
993 struct mm_struct *mm = current->mm;
994
995 if (mm) {
996 kthread_unuse_mm(mm);
997 mmput(mm);
998 }
999}
1000
1001static int __io_sq_thread_acquire_mm(struct io_ring_ctx *ctx)
1002{
1003 if (!current->mm) {
Pavel Begunkovcbcf7212020-07-18 11:31:21 +03001004 if (unlikely(!(ctx->flags & IORING_SETUP_SQPOLL) ||
Jens Axboe2aede0e2020-09-14 10:45:53 -06001005 !ctx->sqo_task->mm ||
1006 !mmget_not_zero(ctx->sqo_task->mm)))
Jens Axboec40f6372020-06-25 15:39:59 -06001007 return -EFAULT;
Jens Axboe2aede0e2020-09-14 10:45:53 -06001008 kthread_use_mm(ctx->sqo_task->mm);
Jens Axboec40f6372020-06-25 15:39:59 -06001009 }
1010
1011 return 0;
1012}
1013
1014static int io_sq_thread_acquire_mm(struct io_ring_ctx *ctx,
1015 struct io_kiocb *req)
1016{
Jens Axboe0f203762020-10-14 09:23:55 -06001017 if (!(io_op_defs[req->opcode].work_flags & IO_WQ_WORK_MM))
Jens Axboec40f6372020-06-25 15:39:59 -06001018 return 0;
1019 return __io_sq_thread_acquire_mm(ctx);
1020}
1021
Dennis Zhou91d8f512020-09-16 13:41:05 -07001022static void io_sq_thread_associate_blkcg(struct io_ring_ctx *ctx,
1023 struct cgroup_subsys_state **cur_css)
1024
1025{
1026#ifdef CONFIG_BLK_CGROUP
1027 /* puts the old one when swapping */
1028 if (*cur_css != ctx->sqo_blkcg_css) {
1029 kthread_associate_blkcg(ctx->sqo_blkcg_css);
1030 *cur_css = ctx->sqo_blkcg_css;
1031 }
1032#endif
1033}
1034
1035static void io_sq_thread_unassociate_blkcg(void)
1036{
1037#ifdef CONFIG_BLK_CGROUP
1038 kthread_associate_blkcg(NULL);
1039#endif
1040}
1041
Jens Axboec40f6372020-06-25 15:39:59 -06001042static inline void req_set_fail_links(struct io_kiocb *req)
1043{
1044 if ((req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) == REQ_F_LINK)
1045 req->flags |= REQ_F_FAIL_LINK;
1046}
Jens Axboe4a38aed22020-05-14 17:21:15 -06001047
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001048/*
Jens Axboe1e6fa522020-10-15 08:46:24 -06001049 * None of these are dereferenced, they are simply used to check if any of
1050 * them have changed. If we're under current and check they are still the
1051 * same, we're fine to grab references to them for actual out-of-line use.
1052 */
1053static void io_init_identity(struct io_identity *id)
1054{
1055 id->files = current->files;
1056 id->mm = current->mm;
1057#ifdef CONFIG_BLK_CGROUP
1058 rcu_read_lock();
1059 id->blkcg_css = blkcg_css();
1060 rcu_read_unlock();
1061#endif
1062 id->creds = current_cred();
1063 id->nsproxy = current->nsproxy;
1064 id->fs = current->fs;
1065 id->fsize = rlimit(RLIMIT_FSIZE);
Jens Axboe4ea33a92020-10-15 13:46:44 -06001066#ifdef CONFIG_AUDIT
1067 id->loginuid = current->loginuid;
1068 id->sessionid = current->sessionid;
1069#endif
Jens Axboe1e6fa522020-10-15 08:46:24 -06001070 refcount_set(&id->count, 1);
1071}
1072
Pavel Begunkovec99ca62020-10-18 10:17:38 +01001073static inline void __io_req_init_async(struct io_kiocb *req)
1074{
1075 memset(&req->work, 0, sizeof(req->work));
1076 req->flags |= REQ_F_WORK_INITIALIZED;
1077}
1078
Jens Axboe1e6fa522020-10-15 08:46:24 -06001079/*
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001080 * Note: must call io_req_init_async() for the first time you
1081 * touch any members of io_wq_work.
1082 */
1083static inline void io_req_init_async(struct io_kiocb *req)
1084{
Jens Axboe500a3732020-10-15 17:38:03 -06001085 struct io_uring_task *tctx = current->io_uring;
1086
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001087 if (req->flags & REQ_F_WORK_INITIALIZED)
1088 return;
1089
Pavel Begunkovec99ca62020-10-18 10:17:38 +01001090 __io_req_init_async(req);
Jens Axboe500a3732020-10-15 17:38:03 -06001091
1092 /* Grab a ref if this isn't our static identity */
1093 req->work.identity = tctx->identity;
1094 if (tctx->identity != &tctx->__identity)
1095 refcount_inc(&req->work.identity->count);
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001096}
1097
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03001098static inline bool io_async_submit(struct io_ring_ctx *ctx)
1099{
1100 return ctx->flags & IORING_SETUP_SQPOLL;
1101}
1102
Jens Axboe2b188cc2019-01-07 10:46:33 -07001103static void io_ring_ctx_ref_free(struct percpu_ref *ref)
1104{
1105 struct io_ring_ctx *ctx = container_of(ref, struct io_ring_ctx, refs);
1106
Jens Axboe0f158b42020-05-14 17:18:39 -06001107 complete(&ctx->ref_comp);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001108}
1109
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001110static inline bool io_is_timeout_noseq(struct io_kiocb *req)
1111{
1112 return !req->timeout.off;
1113}
1114
Jens Axboe2b188cc2019-01-07 10:46:33 -07001115static struct io_ring_ctx *io_ring_ctx_alloc(struct io_uring_params *p)
1116{
1117 struct io_ring_ctx *ctx;
Jens Axboe78076bb2019-12-04 19:56:40 -07001118 int hash_bits;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001119
1120 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
1121 if (!ctx)
1122 return NULL;
1123
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001124 ctx->fallback_req = kmem_cache_alloc(req_cachep, GFP_KERNEL);
1125 if (!ctx->fallback_req)
1126 goto err;
1127
Jens Axboe78076bb2019-12-04 19:56:40 -07001128 /*
1129 * Use 5 bits less than the max cq entries, that should give us around
1130 * 32 entries per hash list if totally full and uniformly spread.
1131 */
1132 hash_bits = ilog2(p->cq_entries);
1133 hash_bits -= 5;
1134 if (hash_bits <= 0)
1135 hash_bits = 1;
1136 ctx->cancel_hash_bits = hash_bits;
1137 ctx->cancel_hash = kmalloc((1U << hash_bits) * sizeof(struct hlist_head),
1138 GFP_KERNEL);
1139 if (!ctx->cancel_hash)
1140 goto err;
1141 __hash_init(ctx->cancel_hash, 1U << hash_bits);
1142
Roman Gushchin21482892019-05-07 10:01:48 -07001143 if (percpu_ref_init(&ctx->refs, io_ring_ctx_ref_free,
Jens Axboe206aefd2019-11-07 18:27:42 -07001144 PERCPU_REF_ALLOW_REINIT, GFP_KERNEL))
1145 goto err;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001146
1147 ctx->flags = p->flags;
Jens Axboe90554202020-09-03 12:12:41 -06001148 init_waitqueue_head(&ctx->sqo_sq_wait);
Jens Axboe69fb2132020-09-14 11:16:23 -06001149 INIT_LIST_HEAD(&ctx->sqd_list);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001150 init_waitqueue_head(&ctx->cq_wait);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001151 INIT_LIST_HEAD(&ctx->cq_overflow_list);
Jens Axboe0f158b42020-05-14 17:18:39 -06001152 init_completion(&ctx->ref_comp);
1153 init_completion(&ctx->sq_thread_comp);
Jens Axboe5a2e7452020-02-23 16:23:11 -07001154 idr_init(&ctx->io_buffer_idr);
Jens Axboe071698e2020-01-28 10:04:42 -07001155 idr_init(&ctx->personality_idr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001156 mutex_init(&ctx->uring_lock);
1157 init_waitqueue_head(&ctx->wait);
1158 spin_lock_init(&ctx->completion_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03001159 INIT_LIST_HEAD(&ctx->iopoll_list);
Jens Axboede0617e2019-04-06 21:51:27 -06001160 INIT_LIST_HEAD(&ctx->defer_list);
Jens Axboe5262f562019-09-17 12:26:57 -06001161 INIT_LIST_HEAD(&ctx->timeout_list);
Jens Axboefcb323c2019-10-24 12:39:47 -06001162 init_waitqueue_head(&ctx->inflight_wait);
1163 spin_lock_init(&ctx->inflight_lock);
1164 INIT_LIST_HEAD(&ctx->inflight_list);
Jens Axboe4a38aed22020-05-14 17:21:15 -06001165 INIT_DELAYED_WORK(&ctx->file_put_work, io_file_put_work);
1166 init_llist_head(&ctx->file_put_llist);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001167 return ctx;
Jens Axboe206aefd2019-11-07 18:27:42 -07001168err:
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001169 if (ctx->fallback_req)
1170 kmem_cache_free(req_cachep, ctx->fallback_req);
Jens Axboe78076bb2019-12-04 19:56:40 -07001171 kfree(ctx->cancel_hash);
Jens Axboe206aefd2019-11-07 18:27:42 -07001172 kfree(ctx);
1173 return NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001174}
1175
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001176static bool req_need_defer(struct io_kiocb *req, u32 seq)
Jens Axboede0617e2019-04-06 21:51:27 -06001177{
Jens Axboe2bc99302020-07-09 09:43:27 -06001178 if (unlikely(req->flags & REQ_F_IO_DRAIN)) {
1179 struct io_ring_ctx *ctx = req->ctx;
Jackie Liua197f662019-11-08 08:09:12 -07001180
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001181 return seq != ctx->cached_cq_tail
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001182 + READ_ONCE(ctx->cached_cq_overflow);
Jens Axboe2bc99302020-07-09 09:43:27 -06001183 }
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001184
Bob Liu9d858b22019-11-13 18:06:25 +08001185 return false;
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001186}
1187
Jens Axboede0617e2019-04-06 21:51:27 -06001188static void __io_commit_cqring(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001189{
Hristo Venev75b28af2019-08-26 17:23:46 +00001190 struct io_rings *rings = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001191
Pavel Begunkov07910152020-01-17 03:52:46 +03001192 /* order cqe stores with ring update */
1193 smp_store_release(&rings->cq.tail, ctx->cached_cq_tail);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001194
Pavel Begunkov07910152020-01-17 03:52:46 +03001195 if (wq_has_sleeper(&ctx->cq_wait)) {
1196 wake_up_interruptible(&ctx->cq_wait);
1197 kill_fasync(&ctx->cq_fasync, SIGIO, POLL_IN);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001198 }
1199}
1200
Jens Axboe5c3462c2020-10-15 09:02:33 -06001201static void io_put_identity(struct io_uring_task *tctx, struct io_kiocb *req)
Jens Axboe1e6fa522020-10-15 08:46:24 -06001202{
Jens Axboe500a3732020-10-15 17:38:03 -06001203 if (req->work.identity == &tctx->__identity)
Jens Axboe1e6fa522020-10-15 08:46:24 -06001204 return;
1205 if (refcount_dec_and_test(&req->work.identity->count))
1206 kfree(req->work.identity);
1207}
1208
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001209static void io_req_clean_work(struct io_kiocb *req)
Jens Axboecccf0ee2020-01-27 16:34:48 -07001210{
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001211 if (!(req->flags & REQ_F_WORK_INITIALIZED))
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001212 return;
Jens Axboe51a4cc12020-08-10 10:55:56 -06001213
1214 req->flags &= ~REQ_F_WORK_INITIALIZED;
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08001215
Jens Axboedfead8a2020-10-14 10:12:37 -06001216 if (req->work.flags & IO_WQ_WORK_MM) {
Jens Axboe98447d62020-10-14 10:48:51 -06001217 mmdrop(req->work.identity->mm);
Jens Axboedfead8a2020-10-14 10:12:37 -06001218 req->work.flags &= ~IO_WQ_WORK_MM;
Jens Axboecccf0ee2020-01-27 16:34:48 -07001219 }
Dennis Zhou91d8f512020-09-16 13:41:05 -07001220#ifdef CONFIG_BLK_CGROUP
Jens Axboedfead8a2020-10-14 10:12:37 -06001221 if (req->work.flags & IO_WQ_WORK_BLKCG) {
Jens Axboe98447d62020-10-14 10:48:51 -06001222 css_put(req->work.identity->blkcg_css);
Jens Axboedfead8a2020-10-14 10:12:37 -06001223 req->work.flags &= ~IO_WQ_WORK_BLKCG;
Jens Axboecccf0ee2020-01-27 16:34:48 -07001224 }
Jens Axboedfead8a2020-10-14 10:12:37 -06001225#endif
1226 if (req->work.flags & IO_WQ_WORK_CREDS) {
Jens Axboe98447d62020-10-14 10:48:51 -06001227 put_cred(req->work.identity->creds);
Jens Axboedfead8a2020-10-14 10:12:37 -06001228 req->work.flags &= ~IO_WQ_WORK_CREDS;
1229 }
1230 if (req->work.flags & IO_WQ_WORK_FS) {
Jens Axboe98447d62020-10-14 10:48:51 -06001231 struct fs_struct *fs = req->work.identity->fs;
Jens Axboeff002b32020-02-07 16:05:21 -07001232
Jens Axboe98447d62020-10-14 10:48:51 -06001233 spin_lock(&req->work.identity->fs->lock);
Jens Axboeff002b32020-02-07 16:05:21 -07001234 if (--fs->users)
1235 fs = NULL;
Jens Axboe98447d62020-10-14 10:48:51 -06001236 spin_unlock(&req->work.identity->fs->lock);
Jens Axboeff002b32020-02-07 16:05:21 -07001237 if (fs)
1238 free_fs_struct(fs);
Jens Axboedfead8a2020-10-14 10:12:37 -06001239 req->work.flags &= ~IO_WQ_WORK_FS;
Jens Axboeff002b32020-02-07 16:05:21 -07001240 }
Jens Axboe51a4cc12020-08-10 10:55:56 -06001241
Jens Axboe5c3462c2020-10-15 09:02:33 -06001242 io_put_identity(req->task->io_uring, req);
Jens Axboe1e6fa522020-10-15 08:46:24 -06001243}
1244
1245/*
1246 * Create a private copy of io_identity, since some fields don't match
1247 * the current context.
1248 */
1249static bool io_identity_cow(struct io_kiocb *req)
1250{
Jens Axboe5c3462c2020-10-15 09:02:33 -06001251 struct io_uring_task *tctx = current->io_uring;
Jens Axboe1e6fa522020-10-15 08:46:24 -06001252 const struct cred *creds = NULL;
1253 struct io_identity *id;
1254
1255 if (req->work.flags & IO_WQ_WORK_CREDS)
1256 creds = req->work.identity->creds;
1257
1258 id = kmemdup(req->work.identity, sizeof(*id), GFP_KERNEL);
1259 if (unlikely(!id)) {
1260 req->work.flags |= IO_WQ_WORK_CANCEL;
1261 return false;
1262 }
1263
1264 /*
1265 * We can safely just re-init the creds we copied Either the field
1266 * matches the current one, or we haven't grabbed it yet. The only
1267 * exception is ->creds, through registered personalities, so handle
1268 * that one separately.
1269 */
1270 io_init_identity(id);
1271 if (creds)
1272 req->work.identity->creds = creds;
1273
1274 /* add one for this request */
1275 refcount_inc(&id->count);
1276
1277 /* drop old identity, assign new one. one ref for req, one for tctx */
Jens Axboe500a3732020-10-15 17:38:03 -06001278 if (req->work.identity != tctx->identity &&
Jens Axboe1e6fa522020-10-15 08:46:24 -06001279 refcount_sub_and_test(2, &req->work.identity->count))
1280 kfree(req->work.identity);
1281
1282 req->work.identity = id;
Jens Axboe500a3732020-10-15 17:38:03 -06001283 tctx->identity = id;
Jens Axboe1e6fa522020-10-15 08:46:24 -06001284 return true;
1285}
1286
1287static bool io_grab_identity(struct io_kiocb *req)
1288{
1289 const struct io_op_def *def = &io_op_defs[req->opcode];
Jens Axboe5c3462c2020-10-15 09:02:33 -06001290 struct io_identity *id = req->work.identity;
Jens Axboe1e6fa522020-10-15 08:46:24 -06001291 struct io_ring_ctx *ctx = req->ctx;
1292
Jens Axboe69228332020-10-20 14:28:41 -06001293 if (def->work_flags & IO_WQ_WORK_FSIZE) {
1294 if (id->fsize != rlimit(RLIMIT_FSIZE))
1295 return false;
1296 req->work.flags |= IO_WQ_WORK_FSIZE;
1297 }
Jens Axboe1e6fa522020-10-15 08:46:24 -06001298
1299 if (!(req->work.flags & IO_WQ_WORK_FILES) &&
1300 (def->work_flags & IO_WQ_WORK_FILES) &&
1301 !(req->flags & REQ_F_NO_FILE_TABLE)) {
1302 if (id->files != current->files ||
1303 id->nsproxy != current->nsproxy)
1304 return false;
1305 atomic_inc(&id->files->count);
1306 get_nsproxy(id->nsproxy);
1307 req->flags |= REQ_F_INFLIGHT;
1308
1309 spin_lock_irq(&ctx->inflight_lock);
1310 list_add(&req->inflight_entry, &ctx->inflight_list);
1311 spin_unlock_irq(&ctx->inflight_lock);
1312 req->work.flags |= IO_WQ_WORK_FILES;
1313 }
1314#ifdef CONFIG_BLK_CGROUP
1315 if (!(req->work.flags & IO_WQ_WORK_BLKCG) &&
1316 (def->work_flags & IO_WQ_WORK_BLKCG)) {
1317 rcu_read_lock();
1318 if (id->blkcg_css != blkcg_css()) {
1319 rcu_read_unlock();
1320 return false;
1321 }
1322 /*
1323 * This should be rare, either the cgroup is dying or the task
1324 * is moving cgroups. Just punt to root for the handful of ios.
1325 */
1326 if (css_tryget_online(id->blkcg_css))
1327 req->work.flags |= IO_WQ_WORK_BLKCG;
1328 rcu_read_unlock();
1329 }
1330#endif
1331 if (!(req->work.flags & IO_WQ_WORK_CREDS)) {
1332 if (id->creds != current_cred())
1333 return false;
1334 get_cred(id->creds);
1335 req->work.flags |= IO_WQ_WORK_CREDS;
1336 }
Jens Axboe4ea33a92020-10-15 13:46:44 -06001337#ifdef CONFIG_AUDIT
1338 if (!uid_eq(current->loginuid, id->loginuid) ||
1339 current->sessionid != id->sessionid)
1340 return false;
1341#endif
Jens Axboe1e6fa522020-10-15 08:46:24 -06001342 if (!(req->work.flags & IO_WQ_WORK_FS) &&
1343 (def->work_flags & IO_WQ_WORK_FS)) {
1344 if (current->fs != id->fs)
1345 return false;
1346 spin_lock(&id->fs->lock);
1347 if (!id->fs->in_exec) {
1348 id->fs->users++;
1349 req->work.flags |= IO_WQ_WORK_FS;
1350 } else {
1351 req->work.flags |= IO_WQ_WORK_CANCEL;
1352 }
1353 spin_unlock(&current->fs->lock);
1354 }
1355
1356 return true;
Jens Axboe561fb042019-10-24 07:25:42 -06001357}
1358
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001359static void io_prep_async_work(struct io_kiocb *req)
Jens Axboe561fb042019-10-24 07:25:42 -06001360{
Jens Axboed3656342019-12-18 09:50:26 -07001361 const struct io_op_def *def = &io_op_defs[req->opcode];
Pavel Begunkov23329512020-10-10 18:34:06 +01001362 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5c3462c2020-10-15 09:02:33 -06001363 struct io_identity *id;
Jens Axboe54a91f32019-09-10 09:15:04 -06001364
Pavel Begunkov16d59802020-07-12 16:16:47 +03001365 io_req_init_async(req);
Jens Axboe5c3462c2020-10-15 09:02:33 -06001366 id = req->work.identity;
Pavel Begunkov16d59802020-07-12 16:16:47 +03001367
Pavel Begunkovfeaadc42020-10-22 16:47:16 +01001368 if (req->flags & REQ_F_FORCE_ASYNC)
1369 req->work.flags |= IO_WQ_WORK_CONCURRENT;
1370
Jens Axboed3656342019-12-18 09:50:26 -07001371 if (req->flags & REQ_F_ISREG) {
Pavel Begunkov23329512020-10-10 18:34:06 +01001372 if (def->hash_reg_file || (ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov8766dd52020-03-14 00:31:04 +03001373 io_wq_hash_work(&req->work, file_inode(req->file));
Jens Axboed3656342019-12-18 09:50:26 -07001374 } else {
1375 if (def->unbound_nonreg_file)
Jens Axboe3529d8c2019-12-19 18:24:38 -07001376 req->work.flags |= IO_WQ_WORK_UNBOUND;
Jens Axboe54a91f32019-09-10 09:15:04 -06001377 }
Pavel Begunkov23329512020-10-10 18:34:06 +01001378
Jens Axboe1e6fa522020-10-15 08:46:24 -06001379 /* ->mm can never change on us */
Jens Axboedfead8a2020-10-14 10:12:37 -06001380 if (!(req->work.flags & IO_WQ_WORK_MM) &&
1381 (def->work_flags & IO_WQ_WORK_MM)) {
Jens Axboe1e6fa522020-10-15 08:46:24 -06001382 mmgrab(id->mm);
Jens Axboedfead8a2020-10-14 10:12:37 -06001383 req->work.flags |= IO_WQ_WORK_MM;
Pavel Begunkov23329512020-10-10 18:34:06 +01001384 }
Jens Axboe1e6fa522020-10-15 08:46:24 -06001385
1386 /* if we fail grabbing identity, we must COW, regrab, and retry */
1387 if (io_grab_identity(req))
1388 return;
1389
1390 if (!io_identity_cow(req))
1391 return;
1392
1393 /* can't fail at this point */
1394 if (!io_grab_identity(req))
1395 WARN_ON(1);
Jens Axboe561fb042019-10-24 07:25:42 -06001396}
1397
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001398static void io_prep_async_link(struct io_kiocb *req)
1399{
1400 struct io_kiocb *cur;
1401
1402 io_prep_async_work(req);
1403 if (req->flags & REQ_F_LINK_HEAD)
1404 list_for_each_entry(cur, &req->link_list, link_list)
1405 io_prep_async_work(cur);
1406}
1407
Jens Axboe7271ef32020-08-10 09:55:22 -06001408static struct io_kiocb *__io_queue_async_work(struct io_kiocb *req)
Jens Axboe561fb042019-10-24 07:25:42 -06001409{
Jackie Liua197f662019-11-08 08:09:12 -07001410 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001411 struct io_kiocb *link = io_prep_linked_timeout(req);
Jens Axboe561fb042019-10-24 07:25:42 -06001412
Pavel Begunkov8766dd52020-03-14 00:31:04 +03001413 trace_io_uring_queue_async_work(ctx, io_wq_is_hashed(&req->work), req,
1414 &req->work, req->flags);
1415 io_wq_enqueue(ctx->io_wq, &req->work);
Jens Axboe7271ef32020-08-10 09:55:22 -06001416 return link;
Jens Axboe18d9be12019-09-10 09:13:05 -06001417}
1418
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001419static void io_queue_async_work(struct io_kiocb *req)
1420{
Jens Axboe7271ef32020-08-10 09:55:22 -06001421 struct io_kiocb *link;
1422
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001423 /* init ->work of the whole link before punting */
1424 io_prep_async_link(req);
Jens Axboe7271ef32020-08-10 09:55:22 -06001425 link = __io_queue_async_work(req);
1426
1427 if (link)
1428 io_queue_linked_timeout(link);
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001429}
1430
Jens Axboe5262f562019-09-17 12:26:57 -06001431static void io_kill_timeout(struct io_kiocb *req)
1432{
Jens Axboee8c2bc12020-08-15 18:44:09 -07001433 struct io_timeout_data *io = req->async_data;
Jens Axboe5262f562019-09-17 12:26:57 -06001434 int ret;
1435
Jens Axboee8c2bc12020-08-15 18:44:09 -07001436 ret = hrtimer_try_to_cancel(&io->timer);
Jens Axboe5262f562019-09-17 12:26:57 -06001437 if (ret != -1) {
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03001438 atomic_set(&req->ctx->cq_timeouts,
1439 atomic_read(&req->ctx->cq_timeouts) + 1);
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001440 list_del_init(&req->timeout.list);
Jens Axboe78e19bb2019-11-06 15:21:34 -07001441 io_cqring_fill_event(req, 0);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001442 io_put_req_deferred(req, 1);
Jens Axboe5262f562019-09-17 12:26:57 -06001443 }
1444}
1445
Jens Axboef3606e32020-09-22 08:18:24 -06001446static bool io_task_match(struct io_kiocb *req, struct task_struct *tsk)
1447{
1448 struct io_ring_ctx *ctx = req->ctx;
1449
1450 if (!tsk || req->task == tsk)
1451 return true;
Jens Axboe534ca6d2020-09-02 13:52:19 -06001452 if (ctx->flags & IORING_SETUP_SQPOLL) {
1453 if (ctx->sq_data && req->task == ctx->sq_data->thread)
1454 return true;
1455 }
Jens Axboef3606e32020-09-22 08:18:24 -06001456 return false;
1457}
1458
Jens Axboe76e1b642020-09-26 15:05:03 -06001459/*
1460 * Returns true if we found and killed one or more timeouts
1461 */
1462static bool io_kill_timeouts(struct io_ring_ctx *ctx, struct task_struct *tsk)
Jens Axboe5262f562019-09-17 12:26:57 -06001463{
1464 struct io_kiocb *req, *tmp;
Jens Axboe76e1b642020-09-26 15:05:03 -06001465 int canceled = 0;
Jens Axboe5262f562019-09-17 12:26:57 -06001466
1467 spin_lock_irq(&ctx->completion_lock);
Jens Axboef3606e32020-09-22 08:18:24 -06001468 list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
Jens Axboe76e1b642020-09-26 15:05:03 -06001469 if (io_task_match(req, tsk)) {
Jens Axboef3606e32020-09-22 08:18:24 -06001470 io_kill_timeout(req);
Jens Axboe76e1b642020-09-26 15:05:03 -06001471 canceled++;
1472 }
Jens Axboef3606e32020-09-22 08:18:24 -06001473 }
Jens Axboe5262f562019-09-17 12:26:57 -06001474 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe76e1b642020-09-26 15:05:03 -06001475 return canceled != 0;
Jens Axboe5262f562019-09-17 12:26:57 -06001476}
1477
Pavel Begunkov04518942020-05-26 20:34:05 +03001478static void __io_queue_deferred(struct io_ring_ctx *ctx)
1479{
1480 do {
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001481 struct io_defer_entry *de = list_first_entry(&ctx->defer_list,
1482 struct io_defer_entry, list);
Jens Axboe7271ef32020-08-10 09:55:22 -06001483 struct io_kiocb *link;
Pavel Begunkov04518942020-05-26 20:34:05 +03001484
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001485 if (req_need_defer(de->req, de->seq))
Pavel Begunkov04518942020-05-26 20:34:05 +03001486 break;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001487 list_del_init(&de->list);
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001488 /* punt-init is done before queueing for defer */
Jens Axboe7271ef32020-08-10 09:55:22 -06001489 link = __io_queue_async_work(de->req);
1490 if (link) {
1491 __io_queue_linked_timeout(link);
1492 /* drop submission reference */
Pavel Begunkov216578e2020-10-13 09:44:00 +01001493 io_put_req_deferred(link, 1);
Jens Axboe7271ef32020-08-10 09:55:22 -06001494 }
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001495 kfree(de);
Pavel Begunkov04518942020-05-26 20:34:05 +03001496 } while (!list_empty(&ctx->defer_list));
1497}
1498
Pavel Begunkov360428f2020-05-30 14:54:17 +03001499static void io_flush_timeouts(struct io_ring_ctx *ctx)
1500{
1501 while (!list_empty(&ctx->timeout_list)) {
1502 struct io_kiocb *req = list_first_entry(&ctx->timeout_list,
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001503 struct io_kiocb, timeout.list);
Pavel Begunkov360428f2020-05-30 14:54:17 +03001504
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001505 if (io_is_timeout_noseq(req))
Pavel Begunkov360428f2020-05-30 14:54:17 +03001506 break;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03001507 if (req->timeout.target_seq != ctx->cached_cq_tail
1508 - atomic_read(&ctx->cq_timeouts))
Pavel Begunkov360428f2020-05-30 14:54:17 +03001509 break;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03001510
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001511 list_del_init(&req->timeout.list);
Pavel Begunkov360428f2020-05-30 14:54:17 +03001512 io_kill_timeout(req);
1513 }
1514}
1515
Jens Axboede0617e2019-04-06 21:51:27 -06001516static void io_commit_cqring(struct io_ring_ctx *ctx)
1517{
Pavel Begunkov360428f2020-05-30 14:54:17 +03001518 io_flush_timeouts(ctx);
Jens Axboede0617e2019-04-06 21:51:27 -06001519 __io_commit_cqring(ctx);
1520
Pavel Begunkov04518942020-05-26 20:34:05 +03001521 if (unlikely(!list_empty(&ctx->defer_list)))
1522 __io_queue_deferred(ctx);
Jens Axboede0617e2019-04-06 21:51:27 -06001523}
1524
Jens Axboe90554202020-09-03 12:12:41 -06001525static inline bool io_sqring_full(struct io_ring_ctx *ctx)
1526{
1527 struct io_rings *r = ctx->rings;
1528
1529 return READ_ONCE(r->sq.tail) - ctx->cached_sq_head == r->sq_ring_entries;
1530}
1531
Jens Axboe2b188cc2019-01-07 10:46:33 -07001532static struct io_uring_cqe *io_get_cqring(struct io_ring_ctx *ctx)
1533{
Hristo Venev75b28af2019-08-26 17:23:46 +00001534 struct io_rings *rings = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001535 unsigned tail;
1536
1537 tail = ctx->cached_cq_tail;
Stefan Bühler115e12e2019-04-24 23:54:18 +02001538 /*
1539 * writes to the cq entry need to come after reading head; the
1540 * control dependency is enough as we're using WRITE_ONCE to
1541 * fill the cq entry
1542 */
Hristo Venev75b28af2019-08-26 17:23:46 +00001543 if (tail - READ_ONCE(rings->cq.head) == rings->cq_ring_entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001544 return NULL;
1545
1546 ctx->cached_cq_tail++;
Hristo Venev75b28af2019-08-26 17:23:46 +00001547 return &rings->cqes[tail & ctx->cq_mask];
Jens Axboe2b188cc2019-01-07 10:46:33 -07001548}
1549
Jens Axboef2842ab2020-01-08 11:04:00 -07001550static inline bool io_should_trigger_evfd(struct io_ring_ctx *ctx)
1551{
Jens Axboef0b493e2020-02-01 21:30:11 -07001552 if (!ctx->cq_ev_fd)
1553 return false;
Stefano Garzarella7e55a192020-05-15 18:38:05 +02001554 if (READ_ONCE(ctx->rings->cq_flags) & IORING_CQ_EVENTFD_DISABLED)
1555 return false;
Jens Axboef2842ab2020-01-08 11:04:00 -07001556 if (!ctx->eventfd_async)
1557 return true;
Jens Axboeb41e9852020-02-17 09:52:41 -07001558 return io_wq_current_is_worker();
Jens Axboef2842ab2020-01-08 11:04:00 -07001559}
1560
Jens Axboeb41e9852020-02-17 09:52:41 -07001561static void io_cqring_ev_posted(struct io_ring_ctx *ctx)
Jens Axboe8c838782019-03-12 15:48:16 -06001562{
1563 if (waitqueue_active(&ctx->wait))
1564 wake_up(&ctx->wait);
Jens Axboe534ca6d2020-09-02 13:52:19 -06001565 if (ctx->sq_data && waitqueue_active(&ctx->sq_data->wait))
1566 wake_up(&ctx->sq_data->wait);
Jens Axboeb41e9852020-02-17 09:52:41 -07001567 if (io_should_trigger_evfd(ctx))
Jens Axboe9b402842019-04-11 11:45:41 -06001568 eventfd_signal(ctx->cq_ev_fd, 1);
Jens Axboe8c838782019-03-12 15:48:16 -06001569}
1570
Pavel Begunkov46930142020-07-30 18:43:49 +03001571static void io_cqring_mark_overflow(struct io_ring_ctx *ctx)
1572{
1573 if (list_empty(&ctx->cq_overflow_list)) {
1574 clear_bit(0, &ctx->sq_check_overflow);
1575 clear_bit(0, &ctx->cq_check_overflow);
1576 ctx->rings->sq_flags &= ~IORING_SQ_CQ_OVERFLOW;
1577 }
1578}
1579
Jens Axboee6c8aa92020-09-28 13:10:13 -06001580static inline bool io_match_files(struct io_kiocb *req,
1581 struct files_struct *files)
1582{
1583 if (!files)
1584 return true;
Jens Axboedfead8a2020-10-14 10:12:37 -06001585 if ((req->flags & REQ_F_WORK_INITIALIZED) &&
1586 (req->work.flags & IO_WQ_WORK_FILES))
Jens Axboe98447d62020-10-14 10:48:51 -06001587 return req->work.identity->files == files;
Jens Axboee6c8aa92020-09-28 13:10:13 -06001588 return false;
1589}
1590
Jens Axboec4a2ed72019-11-21 21:01:26 -07001591/* Returns true if there are no backlogged entries after the flush */
Jens Axboee6c8aa92020-09-28 13:10:13 -06001592static bool io_cqring_overflow_flush(struct io_ring_ctx *ctx, bool force,
1593 struct task_struct *tsk,
1594 struct files_struct *files)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001595{
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001596 struct io_rings *rings = ctx->rings;
Jens Axboee6c8aa92020-09-28 13:10:13 -06001597 struct io_kiocb *req, *tmp;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001598 struct io_uring_cqe *cqe;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001599 unsigned long flags;
1600 LIST_HEAD(list);
1601
1602 if (!force) {
1603 if (list_empty_careful(&ctx->cq_overflow_list))
Jens Axboec4a2ed72019-11-21 21:01:26 -07001604 return true;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001605 if ((ctx->cached_cq_tail - READ_ONCE(rings->cq.head) ==
1606 rings->cq_ring_entries))
Jens Axboec4a2ed72019-11-21 21:01:26 -07001607 return false;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001608 }
1609
1610 spin_lock_irqsave(&ctx->completion_lock, flags);
1611
1612 /* if force is set, the ring is going away. always drop after that */
1613 if (force)
Jens Axboe69b3e542020-01-08 11:01:46 -07001614 ctx->cq_overflow_flushed = 1;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001615
Jens Axboec4a2ed72019-11-21 21:01:26 -07001616 cqe = NULL;
Jens Axboee6c8aa92020-09-28 13:10:13 -06001617 list_for_each_entry_safe(req, tmp, &ctx->cq_overflow_list, compl.list) {
1618 if (tsk && req->task != tsk)
1619 continue;
1620 if (!io_match_files(req, files))
1621 continue;
1622
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001623 cqe = io_get_cqring(ctx);
1624 if (!cqe && !force)
1625 break;
1626
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001627 list_move(&req->compl.list, &list);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001628 if (cqe) {
1629 WRITE_ONCE(cqe->user_data, req->user_data);
1630 WRITE_ONCE(cqe->res, req->result);
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001631 WRITE_ONCE(cqe->flags, req->compl.cflags);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001632 } else {
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001633 ctx->cached_cq_overflow++;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001634 WRITE_ONCE(ctx->rings->cq_overflow,
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001635 ctx->cached_cq_overflow);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001636 }
1637 }
1638
1639 io_commit_cqring(ctx);
Pavel Begunkov46930142020-07-30 18:43:49 +03001640 io_cqring_mark_overflow(ctx);
1641
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001642 spin_unlock_irqrestore(&ctx->completion_lock, flags);
1643 io_cqring_ev_posted(ctx);
1644
1645 while (!list_empty(&list)) {
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001646 req = list_first_entry(&list, struct io_kiocb, compl.list);
1647 list_del(&req->compl.list);
Jackie Liuec9c02a2019-11-08 23:50:36 +08001648 io_put_req(req);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001649 }
Jens Axboec4a2ed72019-11-21 21:01:26 -07001650
1651 return cqe != NULL;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001652}
1653
Jens Axboebcda7ba2020-02-23 16:42:51 -07001654static void __io_cqring_fill_event(struct io_kiocb *req, long res, long cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001655{
Jens Axboe78e19bb2019-11-06 15:21:34 -07001656 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001657 struct io_uring_cqe *cqe;
1658
Jens Axboe78e19bb2019-11-06 15:21:34 -07001659 trace_io_uring_complete(ctx, req->user_data, res);
Jens Axboe51c3ff62019-11-03 06:52:50 -07001660
Jens Axboe2b188cc2019-01-07 10:46:33 -07001661 /*
1662 * If we can't get a cq entry, userspace overflowed the
1663 * submission (by quite a lot). Increment the overflow count in
1664 * the ring.
1665 */
1666 cqe = io_get_cqring(ctx);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001667 if (likely(cqe)) {
Jens Axboe78e19bb2019-11-06 15:21:34 -07001668 WRITE_ONCE(cqe->user_data, req->user_data);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001669 WRITE_ONCE(cqe->res, res);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001670 WRITE_ONCE(cqe->flags, cflags);
Jens Axboefdaf0832020-10-30 09:37:30 -06001671 } else if (ctx->cq_overflow_flushed ||
1672 atomic_read(&req->task->io_uring->in_idle)) {
Jens Axboe0f212202020-09-13 13:09:39 -06001673 /*
1674 * If we're in ring overflow flush mode, or in task cancel mode,
1675 * then we cannot store the request for later flushing, we need
1676 * to drop it on the floor.
1677 */
Pavel Begunkov2c3bac6d2020-10-18 10:17:40 +01001678 ctx->cached_cq_overflow++;
1679 WRITE_ONCE(ctx->rings->cq_overflow, ctx->cached_cq_overflow);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001680 } else {
Jens Axboead3eb2c2019-12-18 17:12:20 -07001681 if (list_empty(&ctx->cq_overflow_list)) {
1682 set_bit(0, &ctx->sq_check_overflow);
1683 set_bit(0, &ctx->cq_check_overflow);
Xiaoguang Wang6d5f9042020-07-09 09:15:29 +08001684 ctx->rings->sq_flags |= IORING_SQ_CQ_OVERFLOW;
Jens Axboead3eb2c2019-12-18 17:12:20 -07001685 }
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001686 io_clean_op(req);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001687 req->result = res;
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001688 req->compl.cflags = cflags;
Pavel Begunkov40d8ddd2020-07-13 23:37:11 +03001689 refcount_inc(&req->refs);
1690 list_add_tail(&req->compl.list, &ctx->cq_overflow_list);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001691 }
1692}
1693
Jens Axboebcda7ba2020-02-23 16:42:51 -07001694static void io_cqring_fill_event(struct io_kiocb *req, long res)
1695{
1696 __io_cqring_fill_event(req, res, 0);
1697}
1698
Jens Axboee1e16092020-06-22 09:17:17 -06001699static void io_cqring_add_event(struct io_kiocb *req, long res, long cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001700{
Jens Axboe78e19bb2019-11-06 15:21:34 -07001701 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001702 unsigned long flags;
1703
1704 spin_lock_irqsave(&ctx->completion_lock, flags);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001705 __io_cqring_fill_event(req, res, cflags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001706 io_commit_cqring(ctx);
1707 spin_unlock_irqrestore(&ctx->completion_lock, flags);
1708
Jens Axboe8c838782019-03-12 15:48:16 -06001709 io_cqring_ev_posted(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001710}
1711
Jens Axboe229a7b62020-06-22 10:13:11 -06001712static void io_submit_flush_completions(struct io_comp_state *cs)
Jens Axboebcda7ba2020-02-23 16:42:51 -07001713{
Jens Axboe229a7b62020-06-22 10:13:11 -06001714 struct io_ring_ctx *ctx = cs->ctx;
1715
1716 spin_lock_irq(&ctx->completion_lock);
1717 while (!list_empty(&cs->list)) {
1718 struct io_kiocb *req;
1719
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001720 req = list_first_entry(&cs->list, struct io_kiocb, compl.list);
1721 list_del(&req->compl.list);
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001722 __io_cqring_fill_event(req, req->result, req->compl.cflags);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001723
1724 /*
1725 * io_free_req() doesn't care about completion_lock unless one
1726 * of these flags is set. REQ_F_WORK_INITIALIZED is in the list
1727 * because of a potential deadlock with req->work.fs->lock
1728 */
1729 if (req->flags & (REQ_F_FAIL_LINK|REQ_F_LINK_TIMEOUT
1730 |REQ_F_WORK_INITIALIZED)) {
Jens Axboe229a7b62020-06-22 10:13:11 -06001731 spin_unlock_irq(&ctx->completion_lock);
1732 io_put_req(req);
1733 spin_lock_irq(&ctx->completion_lock);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001734 } else {
1735 io_put_req(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06001736 }
1737 }
1738 io_commit_cqring(ctx);
1739 spin_unlock_irq(&ctx->completion_lock);
1740
1741 io_cqring_ev_posted(ctx);
1742 cs->nr = 0;
1743}
1744
1745static void __io_req_complete(struct io_kiocb *req, long res, unsigned cflags,
1746 struct io_comp_state *cs)
1747{
1748 if (!cs) {
1749 io_cqring_add_event(req, res, cflags);
1750 io_put_req(req);
1751 } else {
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001752 io_clean_op(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06001753 req->result = res;
Pavel Begunkov0f7e4662020-07-13 23:37:16 +03001754 req->compl.cflags = cflags;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001755 list_add_tail(&req->compl.list, &cs->list);
Jens Axboe229a7b62020-06-22 10:13:11 -06001756 if (++cs->nr >= 32)
1757 io_submit_flush_completions(cs);
1758 }
Jens Axboee1e16092020-06-22 09:17:17 -06001759}
1760
1761static void io_req_complete(struct io_kiocb *req, long res)
1762{
Jens Axboe229a7b62020-06-22 10:13:11 -06001763 __io_req_complete(req, res, 0, NULL);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001764}
1765
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001766static inline bool io_is_fallback_req(struct io_kiocb *req)
1767{
1768 return req == (struct io_kiocb *)
1769 ((unsigned long) req->ctx->fallback_req & ~1UL);
1770}
1771
1772static struct io_kiocb *io_get_fallback_req(struct io_ring_ctx *ctx)
1773{
1774 struct io_kiocb *req;
1775
1776 req = ctx->fallback_req;
Bijan Mottahedehdd461af2020-04-29 17:47:50 -07001777 if (!test_and_set_bit_lock(0, (unsigned long *) &ctx->fallback_req))
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001778 return req;
1779
1780 return NULL;
1781}
1782
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03001783static struct io_kiocb *io_alloc_req(struct io_ring_ctx *ctx,
1784 struct io_submit_state *state)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001785{
Pavel Begunkovf6b6c7d2020-06-21 13:09:53 +03001786 if (!state->free_reqs) {
Pavel Begunkov291b2822020-09-30 22:57:01 +03001787 gfp_t gfp = GFP_KERNEL | __GFP_NOWARN;
Jens Axboe2579f912019-01-09 09:10:43 -07001788 size_t sz;
1789 int ret;
1790
1791 sz = min_t(size_t, state->ios_left, ARRAY_SIZE(state->reqs));
Jens Axboefd6fab22019-03-14 16:30:06 -06001792 ret = kmem_cache_alloc_bulk(req_cachep, gfp, sz, state->reqs);
1793
1794 /*
1795 * Bulk alloc is all-or-nothing. If we fail to get a batch,
1796 * retry single alloc to be on the safe side.
1797 */
1798 if (unlikely(ret <= 0)) {
1799 state->reqs[0] = kmem_cache_alloc(req_cachep, gfp);
1800 if (!state->reqs[0])
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001801 goto fallback;
Jens Axboefd6fab22019-03-14 16:30:06 -06001802 ret = 1;
1803 }
Pavel Begunkov291b2822020-09-30 22:57:01 +03001804 state->free_reqs = ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001805 }
1806
Pavel Begunkov291b2822020-09-30 22:57:01 +03001807 state->free_reqs--;
1808 return state->reqs[state->free_reqs];
Jens Axboe0ddf92e2019-11-08 08:52:53 -07001809fallback:
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03001810 return io_get_fallback_req(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001811}
1812
Pavel Begunkov8da11c12020-02-24 11:32:44 +03001813static inline void io_put_file(struct io_kiocb *req, struct file *file,
1814 bool fixed)
1815{
1816 if (fixed)
Xiaoguang Wang05589552020-03-31 14:05:18 +08001817 percpu_ref_put(req->fixed_file_refs);
Pavel Begunkov8da11c12020-02-24 11:32:44 +03001818 else
1819 fput(file);
1820}
1821
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001822static void io_dismantle_req(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001823{
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03001824 io_clean_op(req);
Pavel Begunkov929a3af2020-02-19 00:19:09 +03001825
Jens Axboee8c2bc12020-08-15 18:44:09 -07001826 if (req->async_data)
1827 kfree(req->async_data);
Pavel Begunkov8da11c12020-02-24 11:32:44 +03001828 if (req->file)
1829 io_put_file(req, req->file, (req->flags & REQ_F_FIXED_FILE));
Jens Axboefcb323c2019-10-24 12:39:47 -06001830
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01001831 io_req_clean_work(req);
Pavel Begunkove6543a82020-06-28 12:52:30 +03001832}
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03001833
Pavel Begunkov216578e2020-10-13 09:44:00 +01001834static void __io_free_req(struct io_kiocb *req)
Pavel Begunkove6543a82020-06-28 12:52:30 +03001835{
Jens Axboe0f212202020-09-13 13:09:39 -06001836 struct io_uring_task *tctx = req->task->io_uring;
Jens Axboe51a4cc12020-08-10 10:55:56 -06001837 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovecfc5172020-06-29 13:13:03 +03001838
Pavel Begunkov216578e2020-10-13 09:44:00 +01001839 io_dismantle_req(req);
Pavel Begunkove6543a82020-06-28 12:52:30 +03001840
Jens Axboed8a6df12020-10-15 16:24:45 -06001841 percpu_counter_dec(&tctx->inflight);
Jens Axboefdaf0832020-10-30 09:37:30 -06001842 if (atomic_read(&tctx->in_idle))
Jens Axboe0f212202020-09-13 13:09:39 -06001843 wake_up(&tctx->wait);
Jens Axboee3bc8e92020-09-24 08:45:57 -06001844 put_task_struct(req->task);
1845
Pavel Begunkovb1e50e52020-04-08 08:58:44 +03001846 if (likely(!io_is_fallback_req(req)))
1847 kmem_cache_free(req_cachep, req);
1848 else
Pavel Begunkovecfc5172020-06-29 13:13:03 +03001849 clear_bit_unlock(0, (unsigned long *) &ctx->fallback_req);
1850 percpu_ref_put(&ctx->refs);
Jens Axboee65ef562019-03-12 10:16:44 -06001851}
1852
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001853static void io_kill_linked_timeout(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06001854{
Jackie Liua197f662019-11-08 08:09:12 -07001855 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001856 struct io_kiocb *link;
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001857 bool cancelled = false;
1858 unsigned long flags;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001859
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001860 spin_lock_irqsave(&ctx->completion_lock, flags);
1861 link = list_first_entry_or_null(&req->link_list, struct io_kiocb,
1862 link_list);
Pavel Begunkov900fad42020-10-19 16:39:16 +01001863 /*
1864 * Can happen if a linked timeout fired and link had been like
1865 * req -> link t-out -> link t-out [-> ...]
1866 */
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001867 if (link && (link->flags & REQ_F_LTIMEOUT_ACTIVE)) {
1868 struct io_timeout_data *io = link->async_data;
1869 int ret;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001870
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001871 list_del_init(&link->link_list);
1872 ret = hrtimer_try_to_cancel(&io->timer);
1873 if (ret != -1) {
1874 io_cqring_fill_event(link, -ECANCELED);
1875 io_commit_cqring(ctx);
1876 cancelled = true;
1877 }
1878 }
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001879 req->flags &= ~REQ_F_LINK_TIMEOUT;
Pavel Begunkov216578e2020-10-13 09:44:00 +01001880 spin_unlock_irqrestore(&ctx->completion_lock, flags);
Jens Axboeab0b6452020-06-30 08:43:15 -06001881
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001882 if (cancelled) {
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001883 io_cqring_ev_posted(ctx);
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01001884 io_put_req(link);
1885 }
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001886}
1887
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001888static struct io_kiocb *io_req_link_next(struct io_kiocb *req)
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001889{
1890 struct io_kiocb *nxt;
Jens Axboe4d7dd462019-11-20 13:03:52 -07001891
Jens Axboe9e645e112019-05-10 16:07:28 -06001892 /*
1893 * The list should never be empty when we are called here. But could
1894 * potentially happen if the chain is messed up, check to be on the
1895 * safe side.
1896 */
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001897 if (unlikely(list_empty(&req->link_list)))
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001898 return NULL;
Jens Axboe94ae5e72019-11-14 19:39:52 -07001899
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001900 nxt = list_first_entry(&req->link_list, struct io_kiocb, link_list);
1901 list_del_init(&req->link_list);
1902 if (!list_empty(&nxt->link_list))
1903 nxt->flags |= REQ_F_LINK_HEAD;
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001904 return nxt;
Jens Axboe9e645e112019-05-10 16:07:28 -06001905}
1906
1907/*
Pavel Begunkovdea3b492020-04-12 02:05:04 +03001908 * Called if REQ_F_LINK_HEAD is set, and we fail the head request
Jens Axboe9e645e112019-05-10 16:07:28 -06001909 */
Pavel Begunkovd148ca42020-10-18 10:17:39 +01001910static void io_fail_links(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06001911{
Jens Axboe2665abf2019-11-05 12:40:47 -07001912 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovd148ca42020-10-18 10:17:39 +01001913 unsigned long flags;
Jens Axboe9e645e112019-05-10 16:07:28 -06001914
Pavel Begunkovd148ca42020-10-18 10:17:39 +01001915 spin_lock_irqsave(&ctx->completion_lock, flags);
Jens Axboe9e645e112019-05-10 16:07:28 -06001916 while (!list_empty(&req->link_list)) {
Pavel Begunkov44932332019-12-05 16:16:35 +03001917 struct io_kiocb *link = list_first_entry(&req->link_list,
1918 struct io_kiocb, link_list);
Jens Axboe9e645e112019-05-10 16:07:28 -06001919
Pavel Begunkov44932332019-12-05 16:16:35 +03001920 list_del_init(&link->link_list);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02001921 trace_io_uring_fail_link(req, link);
Jens Axboe2665abf2019-11-05 12:40:47 -07001922
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001923 io_cqring_fill_event(link, -ECANCELED);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001924
1925 /*
1926 * It's ok to free under spinlock as they're not linked anymore,
1927 * but avoid REQ_F_WORK_INITIALIZED because it may deadlock on
1928 * work.fs->lock.
1929 */
1930 if (link->flags & REQ_F_WORK_INITIALIZED)
1931 io_put_req_deferred(link, 2);
1932 else
1933 io_double_put_req(link);
Jens Axboe9e645e112019-05-10 16:07:28 -06001934 }
Jens Axboe2665abf2019-11-05 12:40:47 -07001935
1936 io_commit_cqring(ctx);
Pavel Begunkov216578e2020-10-13 09:44:00 +01001937 spin_unlock_irqrestore(&ctx->completion_lock, flags);
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001938
Jens Axboe2665abf2019-11-05 12:40:47 -07001939 io_cqring_ev_posted(ctx);
Jens Axboe9e645e112019-05-10 16:07:28 -06001940}
1941
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03001942static struct io_kiocb *__io_req_find_next(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06001943{
Pavel Begunkov9b0d9112020-06-28 12:52:34 +03001944 req->flags &= ~REQ_F_LINK_HEAD;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03001945 if (req->flags & REQ_F_LINK_TIMEOUT)
1946 io_kill_linked_timeout(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07001947
Jens Axboe9e645e112019-05-10 16:07:28 -06001948 /*
1949 * If LINK is set, we have dependent requests in this chain. If we
1950 * didn't fail this request, queue the first one up, moving any other
1951 * dependencies to the next request. In case of failure, fail the rest
1952 * of the chain.
1953 */
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03001954 if (likely(!(req->flags & REQ_F_FAIL_LINK)))
1955 return io_req_link_next(req);
1956 io_fail_links(req);
1957 return NULL;
Jens Axboe4d7dd462019-11-20 13:03:52 -07001958}
Jens Axboe2665abf2019-11-05 12:40:47 -07001959
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03001960static struct io_kiocb *io_req_find_next(struct io_kiocb *req)
1961{
1962 if (likely(!(req->flags & REQ_F_LINK_HEAD)))
1963 return NULL;
1964 return __io_req_find_next(req);
1965}
1966
Jens Axboe87c43112020-09-30 21:00:14 -06001967static int io_req_task_work_add(struct io_kiocb *req, bool twa_signal_ok)
Jens Axboec2c4c832020-07-01 15:37:11 -06001968{
1969 struct task_struct *tsk = req->task;
1970 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe91989c72020-10-16 09:02:26 -06001971 enum task_work_notify_mode notify;
1972 int ret;
Jens Axboec2c4c832020-07-01 15:37:11 -06001973
Jens Axboe6200b0a2020-09-13 14:38:30 -06001974 if (tsk->flags & PF_EXITING)
1975 return -ESRCH;
1976
Jens Axboec2c4c832020-07-01 15:37:11 -06001977 /*
Jens Axboe0ba9c9e2020-08-06 19:41:50 -06001978 * SQPOLL kernel thread doesn't need notification, just a wakeup. For
1979 * all other cases, use TWA_SIGNAL unconditionally to ensure we're
1980 * processing task_work. There's no reliable way to tell if TWA_RESUME
1981 * will do the job.
Jens Axboec2c4c832020-07-01 15:37:11 -06001982 */
Jens Axboe91989c72020-10-16 09:02:26 -06001983 notify = TWA_NONE;
Jens Axboefd7d6de2020-08-23 11:00:37 -06001984 if (!(ctx->flags & IORING_SETUP_SQPOLL) && twa_signal_ok)
Jens Axboec2c4c832020-07-01 15:37:11 -06001985 notify = TWA_SIGNAL;
1986
Jens Axboe87c43112020-09-30 21:00:14 -06001987 ret = task_work_add(tsk, &req->task_work, notify);
Jens Axboec2c4c832020-07-01 15:37:11 -06001988 if (!ret)
1989 wake_up_process(tsk);
Jens Axboe0ba9c9e2020-08-06 19:41:50 -06001990
Jens Axboec2c4c832020-07-01 15:37:11 -06001991 return ret;
1992}
1993
Jens Axboec40f6372020-06-25 15:39:59 -06001994static void __io_req_task_cancel(struct io_kiocb *req, int error)
1995{
1996 struct io_ring_ctx *ctx = req->ctx;
1997
1998 spin_lock_irq(&ctx->completion_lock);
1999 io_cqring_fill_event(req, error);
2000 io_commit_cqring(ctx);
2001 spin_unlock_irq(&ctx->completion_lock);
2002
2003 io_cqring_ev_posted(ctx);
2004 req_set_fail_links(req);
2005 io_double_put_req(req);
2006}
2007
2008static void io_req_task_cancel(struct callback_head *cb)
2009{
2010 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
Jens Axboe87ceb6a2020-09-14 08:20:12 -06002011 struct io_ring_ctx *ctx = req->ctx;
Jens Axboec40f6372020-06-25 15:39:59 -06002012
2013 __io_req_task_cancel(req, -ECANCELED);
Jens Axboe87ceb6a2020-09-14 08:20:12 -06002014 percpu_ref_put(&ctx->refs);
Jens Axboec40f6372020-06-25 15:39:59 -06002015}
2016
2017static void __io_req_task_submit(struct io_kiocb *req)
2018{
2019 struct io_ring_ctx *ctx = req->ctx;
2020
Jens Axboec40f6372020-06-25 15:39:59 -06002021 if (!__io_sq_thread_acquire_mm(ctx)) {
2022 mutex_lock(&ctx->uring_lock);
Pavel Begunkovc1379e22020-09-30 22:57:56 +03002023 __io_queue_sqe(req, NULL);
Jens Axboec40f6372020-06-25 15:39:59 -06002024 mutex_unlock(&ctx->uring_lock);
Jens Axboe2665abf2019-11-05 12:40:47 -07002025 } else {
Jens Axboec40f6372020-06-25 15:39:59 -06002026 __io_req_task_cancel(req, -EFAULT);
Jens Axboe2665abf2019-11-05 12:40:47 -07002027 }
Jens Axboe9e645e112019-05-10 16:07:28 -06002028}
2029
Jens Axboec40f6372020-06-25 15:39:59 -06002030static void io_req_task_submit(struct callback_head *cb)
2031{
2032 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
Jens Axboe6d816e02020-08-11 08:04:14 -06002033 struct io_ring_ctx *ctx = req->ctx;
Jens Axboec40f6372020-06-25 15:39:59 -06002034
2035 __io_req_task_submit(req);
Jens Axboe6d816e02020-08-11 08:04:14 -06002036 percpu_ref_put(&ctx->refs);
Jens Axboec40f6372020-06-25 15:39:59 -06002037}
2038
2039static void io_req_task_queue(struct io_kiocb *req)
2040{
Jens Axboec40f6372020-06-25 15:39:59 -06002041 int ret;
2042
2043 init_task_work(&req->task_work, io_req_task_submit);
Jens Axboe6d816e02020-08-11 08:04:14 -06002044 percpu_ref_get(&req->ctx->refs);
Jens Axboec40f6372020-06-25 15:39:59 -06002045
Jens Axboe87c43112020-09-30 21:00:14 -06002046 ret = io_req_task_work_add(req, true);
Jens Axboec40f6372020-06-25 15:39:59 -06002047 if (unlikely(ret)) {
Jens Axboec2c4c832020-07-01 15:37:11 -06002048 struct task_struct *tsk;
2049
Jens Axboec40f6372020-06-25 15:39:59 -06002050 init_task_work(&req->task_work, io_req_task_cancel);
2051 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06002052 task_work_add(tsk, &req->task_work, TWA_NONE);
Jens Axboec2c4c832020-07-01 15:37:11 -06002053 wake_up_process(tsk);
Jens Axboec40f6372020-06-25 15:39:59 -06002054 }
Jens Axboec40f6372020-06-25 15:39:59 -06002055}
2056
Pavel Begunkovc3524382020-06-28 12:52:32 +03002057static void io_queue_next(struct io_kiocb *req)
Jackie Liuc69f8db2019-11-09 11:00:08 +08002058{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002059 struct io_kiocb *nxt = io_req_find_next(req);
Pavel Begunkov944e58b2019-11-21 23:21:01 +03002060
Pavel Begunkov906a8c32020-06-27 14:04:55 +03002061 if (nxt)
2062 io_req_task_queue(nxt);
Jackie Liuc69f8db2019-11-09 11:00:08 +08002063}
2064
Jens Axboe9e645e112019-05-10 16:07:28 -06002065static void io_free_req(struct io_kiocb *req)
2066{
Pavel Begunkovc3524382020-06-28 12:52:32 +03002067 io_queue_next(req);
Jens Axboe9e645e112019-05-10 16:07:28 -06002068 __io_free_req(req);
Jens Axboee65ef562019-03-12 10:16:44 -06002069}
2070
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002071struct req_batch {
2072 void *reqs[IO_IOPOLL_BATCH];
2073 int to_free;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002074
2075 struct task_struct *task;
2076 int task_refs;
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002077};
2078
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002079static inline void io_init_req_batch(struct req_batch *rb)
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002080{
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002081 rb->to_free = 0;
2082 rb->task_refs = 0;
2083 rb->task = NULL;
2084}
Pavel Begunkov8766dd52020-03-14 00:31:04 +03002085
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002086static void __io_req_free_batch_flush(struct io_ring_ctx *ctx,
2087 struct req_batch *rb)
2088{
2089 kmem_cache_free_bulk(req_cachep, rb->to_free, rb->reqs);
2090 percpu_ref_put_many(&ctx->refs, rb->to_free);
2091 rb->to_free = 0;
2092}
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002093
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002094static void io_req_free_batch_finish(struct io_ring_ctx *ctx,
2095 struct req_batch *rb)
2096{
2097 if (rb->to_free)
2098 __io_req_free_batch_flush(ctx, rb);
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002099 if (rb->task) {
Jens Axboed8a6df12020-10-15 16:24:45 -06002100 struct io_uring_task *tctx = rb->task->io_uring;
2101
2102 percpu_counter_sub(&tctx->inflight, rb->task_refs);
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002103 put_task_struct_many(rb->task, rb->task_refs);
2104 rb->task = NULL;
2105 }
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002106}
2107
2108static void io_req_free_batch(struct req_batch *rb, struct io_kiocb *req)
2109{
2110 if (unlikely(io_is_fallback_req(req))) {
2111 io_free_req(req);
2112 return;
2113 }
2114 if (req->flags & REQ_F_LINK_HEAD)
2115 io_queue_next(req);
2116
Jens Axboee3bc8e92020-09-24 08:45:57 -06002117 if (req->task != rb->task) {
Jens Axboe0f212202020-09-13 13:09:39 -06002118 if (rb->task) {
Jens Axboed8a6df12020-10-15 16:24:45 -06002119 struct io_uring_task *tctx = rb->task->io_uring;
2120
2121 percpu_counter_sub(&tctx->inflight, rb->task_refs);
Jens Axboee3bc8e92020-09-24 08:45:57 -06002122 put_task_struct_many(rb->task, rb->task_refs);
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002123 }
Jens Axboee3bc8e92020-09-24 08:45:57 -06002124 rb->task = req->task;
2125 rb->task_refs = 0;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002126 }
Jens Axboee3bc8e92020-09-24 08:45:57 -06002127 rb->task_refs++;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002128
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01002129 io_dismantle_req(req);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002130 rb->reqs[rb->to_free++] = req;
2131 if (unlikely(rb->to_free == ARRAY_SIZE(rb->reqs)))
2132 __io_req_free_batch_flush(req->ctx, rb);
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002133}
2134
Jens Axboeba816ad2019-09-28 11:36:45 -06002135/*
2136 * Drop reference to request, return next in chain (if there is one) if this
2137 * was the last reference to this request.
2138 */
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002139static struct io_kiocb *io_put_req_find_next(struct io_kiocb *req)
Jens Axboee65ef562019-03-12 10:16:44 -06002140{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002141 struct io_kiocb *nxt = NULL;
2142
Jens Axboe2a44f462020-02-25 13:25:41 -07002143 if (refcount_dec_and_test(&req->refs)) {
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002144 nxt = io_req_find_next(req);
Jens Axboe4d7dd462019-11-20 13:03:52 -07002145 __io_free_req(req);
Jens Axboe2a44f462020-02-25 13:25:41 -07002146 }
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002147 return nxt;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002148}
2149
Jens Axboe2b188cc2019-01-07 10:46:33 -07002150static void io_put_req(struct io_kiocb *req)
2151{
Jens Axboedef596e2019-01-09 08:59:42 -07002152 if (refcount_dec_and_test(&req->refs))
2153 io_free_req(req);
2154}
2155
Pavel Begunkov216578e2020-10-13 09:44:00 +01002156static void io_put_req_deferred_cb(struct callback_head *cb)
2157{
2158 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
2159
2160 io_free_req(req);
2161}
2162
2163static void io_free_req_deferred(struct io_kiocb *req)
2164{
2165 int ret;
2166
2167 init_task_work(&req->task_work, io_put_req_deferred_cb);
2168 ret = io_req_task_work_add(req, true);
2169 if (unlikely(ret)) {
2170 struct task_struct *tsk;
2171
2172 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06002173 task_work_add(tsk, &req->task_work, TWA_NONE);
Pavel Begunkov216578e2020-10-13 09:44:00 +01002174 wake_up_process(tsk);
2175 }
2176}
2177
2178static inline void io_put_req_deferred(struct io_kiocb *req, int refs)
2179{
2180 if (refcount_sub_and_test(refs, &req->refs))
2181 io_free_req_deferred(req);
2182}
2183
Pavel Begunkovf4db7182020-06-25 18:20:54 +03002184static struct io_wq_work *io_steal_work(struct io_kiocb *req)
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002185{
Pavel Begunkov6df1db62020-07-03 22:15:06 +03002186 struct io_kiocb *nxt;
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002187
Pavel Begunkovf4db7182020-06-25 18:20:54 +03002188 /*
2189 * A ref is owned by io-wq in which context we're. So, if that's the
2190 * last one, it's safe to steal next work. False negatives are Ok,
2191 * it just will be re-punted async in io_put_work()
2192 */
2193 if (refcount_read(&req->refs) != 1)
2194 return NULL;
2195
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002196 nxt = io_req_find_next(req);
Pavel Begunkov6df1db62020-07-03 22:15:06 +03002197 return nxt ? &nxt->work : NULL;
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002198}
2199
Jens Axboe978db572019-11-14 22:39:04 -07002200static void io_double_put_req(struct io_kiocb *req)
2201{
2202 /* drop both submit and complete references */
2203 if (refcount_sub_and_test(2, &req->refs))
2204 io_free_req(req);
2205}
2206
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002207static unsigned io_cqring_events(struct io_ring_ctx *ctx, bool noflush)
Jens Axboea3a0e432019-08-20 11:03:11 -06002208{
Jens Axboe84f97dc2019-11-06 11:27:53 -07002209 struct io_rings *rings = ctx->rings;
2210
Jens Axboead3eb2c2019-12-18 17:12:20 -07002211 if (test_bit(0, &ctx->cq_check_overflow)) {
2212 /*
2213 * noflush == true is from the waitqueue handler, just ensure
2214 * we wake up the task, and the next invocation will flush the
2215 * entries. We cannot safely to it from here.
2216 */
2217 if (noflush && !list_empty(&ctx->cq_overflow_list))
2218 return -1U;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002219
Jens Axboee6c8aa92020-09-28 13:10:13 -06002220 io_cqring_overflow_flush(ctx, false, NULL, NULL);
Jens Axboead3eb2c2019-12-18 17:12:20 -07002221 }
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002222
Jens Axboea3a0e432019-08-20 11:03:11 -06002223 /* See comment at the top of this file */
2224 smp_rmb();
Jens Axboead3eb2c2019-12-18 17:12:20 -07002225 return ctx->cached_cq_tail - READ_ONCE(rings->cq.head);
Jens Axboea3a0e432019-08-20 11:03:11 -06002226}
2227
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03002228static inline unsigned int io_sqring_entries(struct io_ring_ctx *ctx)
2229{
2230 struct io_rings *rings = ctx->rings;
2231
2232 /* make sure SQ entry isn't read before tail */
2233 return smp_load_acquire(&rings->sq.tail) - ctx->cached_sq_head;
2234}
2235
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002236static unsigned int io_put_kbuf(struct io_kiocb *req, struct io_buffer *kbuf)
Jens Axboee94f1412019-12-19 12:06:02 -07002237{
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002238 unsigned int cflags;
Jens Axboee94f1412019-12-19 12:06:02 -07002239
Jens Axboebcda7ba2020-02-23 16:42:51 -07002240 cflags = kbuf->bid << IORING_CQE_BUFFER_SHIFT;
2241 cflags |= IORING_CQE_F_BUFFER;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03002242 req->flags &= ~REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07002243 kfree(kbuf);
2244 return cflags;
2245}
2246
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002247static inline unsigned int io_put_rw_kbuf(struct io_kiocb *req)
2248{
2249 struct io_buffer *kbuf;
2250
2251 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
2252 return io_put_kbuf(req, kbuf);
2253}
2254
Jens Axboe4c6e2772020-07-01 11:29:10 -06002255static inline bool io_run_task_work(void)
2256{
Jens Axboe6200b0a2020-09-13 14:38:30 -06002257 /*
2258 * Not safe to run on exiting task, and the task_work handling will
2259 * not add work to such a task.
2260 */
2261 if (unlikely(current->flags & PF_EXITING))
2262 return false;
Jens Axboe4c6e2772020-07-01 11:29:10 -06002263 if (current->task_works) {
2264 __set_current_state(TASK_RUNNING);
2265 task_work_run();
2266 return true;
2267 }
2268
2269 return false;
2270}
2271
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002272static void io_iopoll_queue(struct list_head *again)
2273{
2274 struct io_kiocb *req;
2275
2276 do {
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002277 req = list_first_entry(again, struct io_kiocb, inflight_entry);
2278 list_del(&req->inflight_entry);
Pavel Begunkov81b68a52020-07-30 18:43:46 +03002279 __io_complete_rw(req, -EAGAIN, 0, NULL);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002280 } while (!list_empty(again));
2281}
2282
Jens Axboedef596e2019-01-09 08:59:42 -07002283/*
2284 * Find and free completed poll iocbs
2285 */
2286static void io_iopoll_complete(struct io_ring_ctx *ctx, unsigned int *nr_events,
2287 struct list_head *done)
2288{
Jens Axboe8237e042019-12-28 10:48:22 -07002289 struct req_batch rb;
Jens Axboedef596e2019-01-09 08:59:42 -07002290 struct io_kiocb *req;
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002291 LIST_HEAD(again);
2292
2293 /* order with ->result store in io_complete_rw_iopoll() */
2294 smp_rmb();
Jens Axboedef596e2019-01-09 08:59:42 -07002295
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002296 io_init_req_batch(&rb);
Jens Axboedef596e2019-01-09 08:59:42 -07002297 while (!list_empty(done)) {
Jens Axboebcda7ba2020-02-23 16:42:51 -07002298 int cflags = 0;
2299
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002300 req = list_first_entry(done, struct io_kiocb, inflight_entry);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002301 if (READ_ONCE(req->result) == -EAGAIN) {
Jens Axboe56450c22020-08-26 18:58:26 -06002302 req->result = 0;
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002303 req->iopoll_completed = 0;
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002304 list_move_tail(&req->inflight_entry, &again);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002305 continue;
2306 }
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002307 list_del(&req->inflight_entry);
Jens Axboedef596e2019-01-09 08:59:42 -07002308
Jens Axboebcda7ba2020-02-23 16:42:51 -07002309 if (req->flags & REQ_F_BUFFER_SELECTED)
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002310 cflags = io_put_rw_kbuf(req);
Jens Axboebcda7ba2020-02-23 16:42:51 -07002311
2312 __io_cqring_fill_event(req, req->result, cflags);
Jens Axboedef596e2019-01-09 08:59:42 -07002313 (*nr_events)++;
2314
Pavel Begunkovc3524382020-06-28 12:52:32 +03002315 if (refcount_dec_and_test(&req->refs))
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002316 io_req_free_batch(&rb, req);
Jens Axboedef596e2019-01-09 08:59:42 -07002317 }
Jens Axboedef596e2019-01-09 08:59:42 -07002318
Jens Axboe09bb8392019-03-13 12:39:28 -06002319 io_commit_cqring(ctx);
Xiaoguang Wang32b22442020-03-11 09:26:09 +08002320 if (ctx->flags & IORING_SETUP_SQPOLL)
2321 io_cqring_ev_posted(ctx);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002322 io_req_free_batch_finish(ctx, &rb);
Jens Axboedef596e2019-01-09 08:59:42 -07002323
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002324 if (!list_empty(&again))
2325 io_iopoll_queue(&again);
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002326}
2327
Jens Axboedef596e2019-01-09 08:59:42 -07002328static int io_do_iopoll(struct io_ring_ctx *ctx, unsigned int *nr_events,
2329 long min)
2330{
2331 struct io_kiocb *req, *tmp;
2332 LIST_HEAD(done);
2333 bool spin;
2334 int ret;
2335
2336 /*
2337 * Only spin for completions if we don't have multiple devices hanging
2338 * off our complete list, and we're under the requested amount.
2339 */
2340 spin = !ctx->poll_multi_file && *nr_events < min;
2341
2342 ret = 0;
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002343 list_for_each_entry_safe(req, tmp, &ctx->iopoll_list, inflight_entry) {
Jens Axboe9adbd452019-12-20 08:45:55 -07002344 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboedef596e2019-01-09 08:59:42 -07002345
2346 /*
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002347 * Move completed and retryable entries to our local lists.
2348 * If we find a request that requires polling, break out
2349 * and complete those lists first, if we have entries there.
Jens Axboedef596e2019-01-09 08:59:42 -07002350 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002351 if (READ_ONCE(req->iopoll_completed)) {
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002352 list_move_tail(&req->inflight_entry, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002353 continue;
2354 }
2355 if (!list_empty(&done))
2356 break;
2357
2358 ret = kiocb->ki_filp->f_op->iopoll(kiocb, spin);
2359 if (ret < 0)
2360 break;
2361
Pavel Begunkov3aadc232020-07-06 17:59:29 +03002362 /* iopoll may have completed current req */
2363 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002364 list_move_tail(&req->inflight_entry, &done);
Pavel Begunkov3aadc232020-07-06 17:59:29 +03002365
Jens Axboedef596e2019-01-09 08:59:42 -07002366 if (ret && spin)
2367 spin = false;
2368 ret = 0;
2369 }
2370
2371 if (!list_empty(&done))
2372 io_iopoll_complete(ctx, nr_events, &done);
2373
2374 return ret;
2375}
2376
2377/*
Brian Gianforcarod195a662019-12-13 03:09:50 -08002378 * Poll for a minimum of 'min' events. Note that if min == 0 we consider that a
Jens Axboedef596e2019-01-09 08:59:42 -07002379 * non-spinning poll check - we'll still enter the driver poll loop, but only
2380 * as a non-spinning completion check.
2381 */
2382static int io_iopoll_getevents(struct io_ring_ctx *ctx, unsigned int *nr_events,
2383 long min)
2384{
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002385 while (!list_empty(&ctx->iopoll_list) && !need_resched()) {
Jens Axboedef596e2019-01-09 08:59:42 -07002386 int ret;
2387
2388 ret = io_do_iopoll(ctx, nr_events, min);
2389 if (ret < 0)
2390 return ret;
Pavel Begunkoveba0a4d2020-07-06 17:59:30 +03002391 if (*nr_events >= min)
Jens Axboedef596e2019-01-09 08:59:42 -07002392 return 0;
2393 }
2394
2395 return 1;
2396}
2397
2398/*
2399 * We can't just wait for polled events to come to us, we have to actively
2400 * find and complete them.
2401 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002402static void io_iopoll_try_reap_events(struct io_ring_ctx *ctx)
Jens Axboedef596e2019-01-09 08:59:42 -07002403{
2404 if (!(ctx->flags & IORING_SETUP_IOPOLL))
2405 return;
2406
2407 mutex_lock(&ctx->uring_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002408 while (!list_empty(&ctx->iopoll_list)) {
Jens Axboedef596e2019-01-09 08:59:42 -07002409 unsigned int nr_events = 0;
2410
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002411 io_do_iopoll(ctx, &nr_events, 0);
Jens Axboe08f54392019-08-21 22:19:11 -06002412
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002413 /* let it sleep and repeat later if can't complete a request */
2414 if (nr_events == 0)
2415 break;
Jens Axboe08f54392019-08-21 22:19:11 -06002416 /*
2417 * Ensure we allow local-to-the-cpu processing to take place,
2418 * in this case we need to ensure that we reap all events.
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002419 * Also let task_work, etc. to progress by releasing the mutex
Jens Axboe08f54392019-08-21 22:19:11 -06002420 */
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002421 if (need_resched()) {
2422 mutex_unlock(&ctx->uring_lock);
2423 cond_resched();
2424 mutex_lock(&ctx->uring_lock);
2425 }
Jens Axboedef596e2019-01-09 08:59:42 -07002426 }
2427 mutex_unlock(&ctx->uring_lock);
2428}
2429
Pavel Begunkov7668b922020-07-07 16:36:21 +03002430static int io_iopoll_check(struct io_ring_ctx *ctx, long min)
Jens Axboedef596e2019-01-09 08:59:42 -07002431{
Pavel Begunkov7668b922020-07-07 16:36:21 +03002432 unsigned int nr_events = 0;
Jens Axboe2b2ed972019-10-25 10:06:15 -06002433 int iters = 0, ret = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002434
Xiaoguang Wangc7849be2020-02-22 14:46:05 +08002435 /*
2436 * We disallow the app entering submit/complete with polling, but we
2437 * still need to lock the ring to prevent racing with polled issue
2438 * that got punted to a workqueue.
2439 */
2440 mutex_lock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002441 do {
Jens Axboe500f9fb2019-08-19 12:15:59 -06002442 /*
Jens Axboea3a0e432019-08-20 11:03:11 -06002443 * Don't enter poll loop if we already have events pending.
2444 * If we do, we can potentially be spinning for commands that
2445 * already triggered a CQE (eg in error).
2446 */
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07002447 if (io_cqring_events(ctx, false))
Jens Axboea3a0e432019-08-20 11:03:11 -06002448 break;
2449
2450 /*
Jens Axboe500f9fb2019-08-19 12:15:59 -06002451 * If a submit got punted to a workqueue, we can have the
2452 * application entering polling for a command before it gets
2453 * issued. That app will hold the uring_lock for the duration
2454 * of the poll right here, so we need to take a breather every
2455 * now and then to ensure that the issue has a chance to add
2456 * the poll to the issued list. Otherwise we can spin here
2457 * forever, while the workqueue is stuck trying to acquire the
2458 * very same mutex.
2459 */
2460 if (!(++iters & 7)) {
2461 mutex_unlock(&ctx->uring_lock);
Jens Axboe4c6e2772020-07-01 11:29:10 -06002462 io_run_task_work();
Jens Axboe500f9fb2019-08-19 12:15:59 -06002463 mutex_lock(&ctx->uring_lock);
2464 }
2465
Pavel Begunkov7668b922020-07-07 16:36:21 +03002466 ret = io_iopoll_getevents(ctx, &nr_events, min);
Jens Axboedef596e2019-01-09 08:59:42 -07002467 if (ret <= 0)
2468 break;
2469 ret = 0;
Pavel Begunkov7668b922020-07-07 16:36:21 +03002470 } while (min && !nr_events && !need_resched());
Jens Axboedef596e2019-01-09 08:59:42 -07002471
Jens Axboe500f9fb2019-08-19 12:15:59 -06002472 mutex_unlock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002473 return ret;
2474}
2475
Jens Axboe491381ce2019-10-17 09:20:46 -06002476static void kiocb_end_write(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002477{
Jens Axboe491381ce2019-10-17 09:20:46 -06002478 /*
2479 * Tell lockdep we inherited freeze protection from submission
2480 * thread.
2481 */
2482 if (req->flags & REQ_F_ISREG) {
2483 struct inode *inode = file_inode(req->file);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002484
Jens Axboe491381ce2019-10-17 09:20:46 -06002485 __sb_writers_acquired(inode->i_sb, SB_FREEZE_WRITE);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002486 }
Jens Axboe491381ce2019-10-17 09:20:46 -06002487 file_end_write(req->file);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002488}
2489
Jens Axboea1d7c392020-06-22 11:09:46 -06002490static void io_complete_rw_common(struct kiocb *kiocb, long res,
2491 struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002492{
Jens Axboe9adbd452019-12-20 08:45:55 -07002493 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboebcda7ba2020-02-23 16:42:51 -07002494 int cflags = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002495
Jens Axboe491381ce2019-10-17 09:20:46 -06002496 if (kiocb->ki_flags & IOCB_WRITE)
2497 kiocb_end_write(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002498
Jens Axboe4e88d6e2019-12-07 20:59:47 -07002499 if (res != req->result)
2500 req_set_fail_links(req);
Jens Axboebcda7ba2020-02-23 16:42:51 -07002501 if (req->flags & REQ_F_BUFFER_SELECTED)
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002502 cflags = io_put_rw_kbuf(req);
Jens Axboea1d7c392020-06-22 11:09:46 -06002503 __io_req_complete(req, res, cflags, cs);
Jens Axboeba816ad2019-09-28 11:36:45 -06002504}
2505
Jens Axboeb63534c2020-06-04 11:28:00 -06002506#ifdef CONFIG_BLOCK
2507static bool io_resubmit_prep(struct io_kiocb *req, int error)
2508{
2509 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
2510 ssize_t ret = -ECANCELED;
2511 struct iov_iter iter;
2512 int rw;
2513
2514 if (error) {
2515 ret = error;
2516 goto end_req;
2517 }
2518
2519 switch (req->opcode) {
2520 case IORING_OP_READV:
2521 case IORING_OP_READ_FIXED:
2522 case IORING_OP_READ:
2523 rw = READ;
2524 break;
2525 case IORING_OP_WRITEV:
2526 case IORING_OP_WRITE_FIXED:
2527 case IORING_OP_WRITE:
2528 rw = WRITE;
2529 break;
2530 default:
2531 printk_once(KERN_WARNING "io_uring: bad opcode in resubmit %d\n",
2532 req->opcode);
2533 goto end_req;
2534 }
2535
Jens Axboee8c2bc12020-08-15 18:44:09 -07002536 if (!req->async_data) {
Jens Axboe8f3d7492020-09-14 09:28:14 -06002537 ret = io_import_iovec(rw, req, &iovec, &iter, false);
2538 if (ret < 0)
2539 goto end_req;
2540 ret = io_setup_async_rw(req, iovec, inline_vecs, &iter, false);
2541 if (!ret)
2542 return true;
2543 kfree(iovec);
2544 } else {
Jens Axboeb63534c2020-06-04 11:28:00 -06002545 return true;
Jens Axboe8f3d7492020-09-14 09:28:14 -06002546 }
Jens Axboeb63534c2020-06-04 11:28:00 -06002547end_req:
Jens Axboeb63534c2020-06-04 11:28:00 -06002548 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06002549 io_req_complete(req, ret);
Jens Axboeb63534c2020-06-04 11:28:00 -06002550 return false;
2551}
Jens Axboeb63534c2020-06-04 11:28:00 -06002552#endif
2553
2554static bool io_rw_reissue(struct io_kiocb *req, long res)
2555{
2556#ifdef CONFIG_BLOCK
Jens Axboe355afae2020-09-02 09:30:31 -06002557 umode_t mode = file_inode(req->file)->i_mode;
Jens Axboeb63534c2020-06-04 11:28:00 -06002558 int ret;
2559
Jens Axboe355afae2020-09-02 09:30:31 -06002560 if (!S_ISBLK(mode) && !S_ISREG(mode))
2561 return false;
Jens Axboeb63534c2020-06-04 11:28:00 -06002562 if ((res != -EAGAIN && res != -EOPNOTSUPP) || io_wq_current_is_worker())
2563 return false;
2564
Jens Axboefdee9462020-08-27 16:46:24 -06002565 ret = io_sq_thread_acquire_mm(req->ctx, req);
Jens Axboe6d816e02020-08-11 08:04:14 -06002566
Jens Axboefdee9462020-08-27 16:46:24 -06002567 if (io_resubmit_prep(req, ret)) {
2568 refcount_inc(&req->refs);
2569 io_queue_async_work(req);
Jens Axboeb63534c2020-06-04 11:28:00 -06002570 return true;
Jens Axboefdee9462020-08-27 16:46:24 -06002571 }
2572
Jens Axboeb63534c2020-06-04 11:28:00 -06002573#endif
2574 return false;
2575}
2576
Jens Axboea1d7c392020-06-22 11:09:46 -06002577static void __io_complete_rw(struct io_kiocb *req, long res, long res2,
2578 struct io_comp_state *cs)
2579{
2580 if (!io_rw_reissue(req, res))
2581 io_complete_rw_common(&req->rw.kiocb, res, cs);
Jens Axboeba816ad2019-09-28 11:36:45 -06002582}
2583
2584static void io_complete_rw(struct kiocb *kiocb, long res, long res2)
2585{
Jens Axboe9adbd452019-12-20 08:45:55 -07002586 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboeba816ad2019-09-28 11:36:45 -06002587
Jens Axboea1d7c392020-06-22 11:09:46 -06002588 __io_complete_rw(req, res, res2, NULL);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002589}
2590
Jens Axboedef596e2019-01-09 08:59:42 -07002591static void io_complete_rw_iopoll(struct kiocb *kiocb, long res, long res2)
2592{
Jens Axboe9adbd452019-12-20 08:45:55 -07002593 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboedef596e2019-01-09 08:59:42 -07002594
Jens Axboe491381ce2019-10-17 09:20:46 -06002595 if (kiocb->ki_flags & IOCB_WRITE)
2596 kiocb_end_write(req);
Jens Axboedef596e2019-01-09 08:59:42 -07002597
Xiaoguang Wang2d7d6792020-06-16 02:06:37 +08002598 if (res != -EAGAIN && res != req->result)
Jens Axboe4e88d6e2019-12-07 20:59:47 -07002599 req_set_fail_links(req);
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002600
2601 WRITE_ONCE(req->result, res);
2602 /* order with io_poll_complete() checking ->result */
Pavel Begunkovcd664b02020-06-25 12:37:10 +03002603 smp_wmb();
2604 WRITE_ONCE(req->iopoll_completed, 1);
Jens Axboedef596e2019-01-09 08:59:42 -07002605}
2606
2607/*
2608 * After the iocb has been issued, it's safe to be found on the poll list.
2609 * Adding the kiocb to the list AFTER submission ensures that we don't
2610 * find it from a io_iopoll_getevents() thread before the issuer is done
2611 * accessing the kiocb cookie.
2612 */
2613static void io_iopoll_req_issued(struct io_kiocb *req)
2614{
2615 struct io_ring_ctx *ctx = req->ctx;
2616
2617 /*
2618 * Track whether we have multiple files in our lists. This will impact
2619 * how we do polling eventually, not spinning if we're on potentially
2620 * different devices.
2621 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002622 if (list_empty(&ctx->iopoll_list)) {
Jens Axboedef596e2019-01-09 08:59:42 -07002623 ctx->poll_multi_file = false;
2624 } else if (!ctx->poll_multi_file) {
2625 struct io_kiocb *list_req;
2626
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002627 list_req = list_first_entry(&ctx->iopoll_list, struct io_kiocb,
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002628 inflight_entry);
Jens Axboe9adbd452019-12-20 08:45:55 -07002629 if (list_req->file != req->file)
Jens Axboedef596e2019-01-09 08:59:42 -07002630 ctx->poll_multi_file = true;
2631 }
2632
2633 /*
2634 * For fast devices, IO may have already completed. If it has, add
2635 * it to the front so we find it first.
2636 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002637 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002638 list_add(&req->inflight_entry, &ctx->iopoll_list);
Jens Axboedef596e2019-01-09 08:59:42 -07002639 else
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002640 list_add_tail(&req->inflight_entry, &ctx->iopoll_list);
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08002641
2642 if ((ctx->flags & IORING_SETUP_SQPOLL) &&
Jens Axboe534ca6d2020-09-02 13:52:19 -06002643 wq_has_sleeper(&ctx->sq_data->wait))
2644 wake_up(&ctx->sq_data->wait);
Jens Axboedef596e2019-01-09 08:59:42 -07002645}
2646
Pavel Begunkov9f13c352020-05-17 14:13:41 +03002647static void __io_state_file_put(struct io_submit_state *state)
Jens Axboe9a56a232019-01-09 09:06:50 -07002648{
Pavel Begunkov06ef3602020-07-16 23:28:33 +03002649 if (state->has_refs)
2650 fput_many(state->file, state->has_refs);
Pavel Begunkov9f13c352020-05-17 14:13:41 +03002651 state->file = NULL;
2652}
2653
2654static inline void io_state_file_put(struct io_submit_state *state)
2655{
2656 if (state->file)
2657 __io_state_file_put(state);
Jens Axboe9a56a232019-01-09 09:06:50 -07002658}
2659
2660/*
2661 * Get as many references to a file as we have IOs left in this submission,
2662 * assuming most submissions are for one file, or at least that each file
2663 * has more than one submission.
2664 */
Pavel Begunkov8da11c12020-02-24 11:32:44 +03002665static struct file *__io_file_get(struct io_submit_state *state, int fd)
Jens Axboe9a56a232019-01-09 09:06:50 -07002666{
2667 if (!state)
2668 return fget(fd);
2669
2670 if (state->file) {
2671 if (state->fd == fd) {
Pavel Begunkov06ef3602020-07-16 23:28:33 +03002672 state->has_refs--;
Jens Axboe9a56a232019-01-09 09:06:50 -07002673 return state->file;
2674 }
Pavel Begunkov9f13c352020-05-17 14:13:41 +03002675 __io_state_file_put(state);
Jens Axboe9a56a232019-01-09 09:06:50 -07002676 }
2677 state->file = fget_many(fd, state->ios_left);
2678 if (!state->file)
2679 return NULL;
2680
2681 state->fd = fd;
Pavel Begunkov71b547c2020-10-10 18:34:09 +01002682 state->has_refs = state->ios_left - 1;
Jens Axboe9a56a232019-01-09 09:06:50 -07002683 return state->file;
2684}
2685
Jens Axboe4503b762020-06-01 10:00:27 -06002686static bool io_bdev_nowait(struct block_device *bdev)
2687{
2688#ifdef CONFIG_BLOCK
Jeffle Xu9ba0d0c2020-10-19 16:59:42 +08002689 return !bdev || blk_queue_nowait(bdev_get_queue(bdev));
Jens Axboe4503b762020-06-01 10:00:27 -06002690#else
2691 return true;
2692#endif
2693}
2694
Jens Axboe2b188cc2019-01-07 10:46:33 -07002695/*
2696 * If we tracked the file through the SCM inflight mechanism, we could support
2697 * any file. For now, just ensure that anything potentially problematic is done
2698 * inline.
2699 */
Jens Axboeaf197f52020-04-28 13:15:06 -06002700static bool io_file_supports_async(struct file *file, int rw)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002701{
2702 umode_t mode = file_inode(file)->i_mode;
2703
Jens Axboe4503b762020-06-01 10:00:27 -06002704 if (S_ISBLK(mode)) {
2705 if (io_bdev_nowait(file->f_inode->i_bdev))
2706 return true;
2707 return false;
2708 }
2709 if (S_ISCHR(mode) || S_ISSOCK(mode))
Jens Axboe2b188cc2019-01-07 10:46:33 -07002710 return true;
Jens Axboe4503b762020-06-01 10:00:27 -06002711 if (S_ISREG(mode)) {
2712 if (io_bdev_nowait(file->f_inode->i_sb->s_bdev) &&
2713 file->f_op != &io_uring_fops)
2714 return true;
2715 return false;
2716 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07002717
Jens Axboec5b85622020-06-09 19:23:05 -06002718 /* any ->read/write should understand O_NONBLOCK */
2719 if (file->f_flags & O_NONBLOCK)
2720 return true;
2721
Jens Axboeaf197f52020-04-28 13:15:06 -06002722 if (!(file->f_mode & FMODE_NOWAIT))
2723 return false;
2724
2725 if (rw == READ)
2726 return file->f_op->read_iter != NULL;
2727
2728 return file->f_op->write_iter != NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002729}
2730
Pavel Begunkova88fc402020-09-30 22:57:53 +03002731static int io_prep_rw(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002732{
Jens Axboedef596e2019-01-09 08:59:42 -07002733 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe9adbd452019-12-20 08:45:55 -07002734 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboe09bb8392019-03-13 12:39:28 -06002735 unsigned ioprio;
2736 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002737
Jens Axboe491381ce2019-10-17 09:20:46 -06002738 if (S_ISREG(file_inode(req->file)->i_mode))
2739 req->flags |= REQ_F_ISREG;
2740
Jens Axboe2b188cc2019-01-07 10:46:33 -07002741 kiocb->ki_pos = READ_ONCE(sqe->off);
Jens Axboeba042912019-12-25 16:33:42 -07002742 if (kiocb->ki_pos == -1 && !(req->file->f_mode & FMODE_STREAM)) {
2743 req->flags |= REQ_F_CUR_POS;
2744 kiocb->ki_pos = req->file->f_pos;
2745 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07002746 kiocb->ki_hint = ki_hint_validate(file_write_hint(kiocb->ki_filp));
Pavel Begunkov3e577dc2020-02-01 03:58:42 +03002747 kiocb->ki_flags = iocb_flags(kiocb->ki_filp);
2748 ret = kiocb_set_rw_flags(kiocb, READ_ONCE(sqe->rw_flags));
2749 if (unlikely(ret))
2750 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002751
2752 ioprio = READ_ONCE(sqe->ioprio);
2753 if (ioprio) {
2754 ret = ioprio_check_cap(ioprio);
2755 if (ret)
Jens Axboe09bb8392019-03-13 12:39:28 -06002756 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002757
2758 kiocb->ki_ioprio = ioprio;
2759 } else
2760 kiocb->ki_ioprio = get_current_ioprio();
2761
Stefan Bühler8449eed2019-04-27 20:34:19 +02002762 /* don't allow async punt if RWF_NOWAIT was requested */
Jens Axboec5b85622020-06-09 19:23:05 -06002763 if (kiocb->ki_flags & IOCB_NOWAIT)
Stefan Bühler8449eed2019-04-27 20:34:19 +02002764 req->flags |= REQ_F_NOWAIT;
2765
Jens Axboedef596e2019-01-09 08:59:42 -07002766 if (ctx->flags & IORING_SETUP_IOPOLL) {
Jens Axboedef596e2019-01-09 08:59:42 -07002767 if (!(kiocb->ki_flags & IOCB_DIRECT) ||
2768 !kiocb->ki_filp->f_op->iopoll)
Jens Axboe09bb8392019-03-13 12:39:28 -06002769 return -EOPNOTSUPP;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002770
Jens Axboedef596e2019-01-09 08:59:42 -07002771 kiocb->ki_flags |= IOCB_HIPRI;
2772 kiocb->ki_complete = io_complete_rw_iopoll;
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002773 req->iopoll_completed = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002774 } else {
Jens Axboe09bb8392019-03-13 12:39:28 -06002775 if (kiocb->ki_flags & IOCB_HIPRI)
2776 return -EINVAL;
Jens Axboedef596e2019-01-09 08:59:42 -07002777 kiocb->ki_complete = io_complete_rw;
2778 }
Jens Axboe9adbd452019-12-20 08:45:55 -07002779
Jens Axboe3529d8c2019-12-19 18:24:38 -07002780 req->rw.addr = READ_ONCE(sqe->addr);
2781 req->rw.len = READ_ONCE(sqe->len);
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07002782 req->buf_index = READ_ONCE(sqe->buf_index);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002783 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002784}
2785
2786static inline void io_rw_done(struct kiocb *kiocb, ssize_t ret)
2787{
2788 switch (ret) {
2789 case -EIOCBQUEUED:
2790 break;
2791 case -ERESTARTSYS:
2792 case -ERESTARTNOINTR:
2793 case -ERESTARTNOHAND:
2794 case -ERESTART_RESTARTBLOCK:
2795 /*
2796 * We can't just restart the syscall, since previously
2797 * submitted sqes may already be in progress. Just fail this
2798 * IO with EINTR.
2799 */
2800 ret = -EINTR;
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -05002801 fallthrough;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002802 default:
2803 kiocb->ki_complete(kiocb, ret, 0);
2804 }
2805}
2806
Jens Axboea1d7c392020-06-22 11:09:46 -06002807static void kiocb_done(struct kiocb *kiocb, ssize_t ret,
2808 struct io_comp_state *cs)
Jens Axboeba816ad2019-09-28 11:36:45 -06002809{
Jens Axboeba042912019-12-25 16:33:42 -07002810 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboee8c2bc12020-08-15 18:44:09 -07002811 struct io_async_rw *io = req->async_data;
Jens Axboeba042912019-12-25 16:33:42 -07002812
Jens Axboe227c0c92020-08-13 11:51:40 -06002813 /* add previously done IO, if any */
Jens Axboee8c2bc12020-08-15 18:44:09 -07002814 if (io && io->bytes_done > 0) {
Jens Axboe227c0c92020-08-13 11:51:40 -06002815 if (ret < 0)
Jens Axboee8c2bc12020-08-15 18:44:09 -07002816 ret = io->bytes_done;
Jens Axboe227c0c92020-08-13 11:51:40 -06002817 else
Jens Axboee8c2bc12020-08-15 18:44:09 -07002818 ret += io->bytes_done;
Jens Axboe227c0c92020-08-13 11:51:40 -06002819 }
2820
Jens Axboeba042912019-12-25 16:33:42 -07002821 if (req->flags & REQ_F_CUR_POS)
2822 req->file->f_pos = kiocb->ki_pos;
Pavel Begunkovbcaec082020-02-24 11:30:18 +03002823 if (ret >= 0 && kiocb->ki_complete == io_complete_rw)
Jens Axboea1d7c392020-06-22 11:09:46 -06002824 __io_complete_rw(req, ret, 0, cs);
Jens Axboeba816ad2019-09-28 11:36:45 -06002825 else
2826 io_rw_done(kiocb, ret);
2827}
2828
Jens Axboe9adbd452019-12-20 08:45:55 -07002829static ssize_t io_import_fixed(struct io_kiocb *req, int rw,
Pavel Begunkov7d009162019-11-25 23:14:40 +03002830 struct iov_iter *iter)
Jens Axboeedafcce2019-01-09 09:16:05 -07002831{
Jens Axboe9adbd452019-12-20 08:45:55 -07002832 struct io_ring_ctx *ctx = req->ctx;
2833 size_t len = req->rw.len;
Jens Axboeedafcce2019-01-09 09:16:05 -07002834 struct io_mapped_ubuf *imu;
Pavel Begunkov4be1c612020-09-06 00:45:48 +03002835 u16 index, buf_index = req->buf_index;
Jens Axboeedafcce2019-01-09 09:16:05 -07002836 size_t offset;
2837 u64 buf_addr;
2838
Jens Axboeedafcce2019-01-09 09:16:05 -07002839 if (unlikely(buf_index >= ctx->nr_user_bufs))
2840 return -EFAULT;
Jens Axboeedafcce2019-01-09 09:16:05 -07002841 index = array_index_nospec(buf_index, ctx->nr_user_bufs);
2842 imu = &ctx->user_bufs[index];
Jens Axboe9adbd452019-12-20 08:45:55 -07002843 buf_addr = req->rw.addr;
Jens Axboeedafcce2019-01-09 09:16:05 -07002844
2845 /* overflow */
2846 if (buf_addr + len < buf_addr)
2847 return -EFAULT;
2848 /* not inside the mapped region */
2849 if (buf_addr < imu->ubuf || buf_addr + len > imu->ubuf + imu->len)
2850 return -EFAULT;
2851
2852 /*
2853 * May not be a start of buffer, set size appropriately
2854 * and advance us to the beginning.
2855 */
2856 offset = buf_addr - imu->ubuf;
2857 iov_iter_bvec(iter, rw, imu->bvec, imu->nr_bvecs, offset + len);
Jens Axboebd11b3a2019-07-20 08:37:31 -06002858
2859 if (offset) {
2860 /*
2861 * Don't use iov_iter_advance() here, as it's really slow for
2862 * using the latter parts of a big fixed buffer - it iterates
2863 * over each segment manually. We can cheat a bit here, because
2864 * we know that:
2865 *
2866 * 1) it's a BVEC iter, we set it up
2867 * 2) all bvecs are PAGE_SIZE in size, except potentially the
2868 * first and last bvec
2869 *
2870 * So just find our index, and adjust the iterator afterwards.
2871 * If the offset is within the first bvec (or the whole first
2872 * bvec, just use iov_iter_advance(). This makes it easier
2873 * since we can just skip the first segment, which may not
2874 * be PAGE_SIZE aligned.
2875 */
2876 const struct bio_vec *bvec = imu->bvec;
2877
2878 if (offset <= bvec->bv_len) {
2879 iov_iter_advance(iter, offset);
2880 } else {
2881 unsigned long seg_skip;
2882
2883 /* skip first vec */
2884 offset -= bvec->bv_len;
2885 seg_skip = 1 + (offset >> PAGE_SHIFT);
2886
2887 iter->bvec = bvec + seg_skip;
2888 iter->nr_segs -= seg_skip;
Aleix Roca Nonell99c79f62019-08-15 14:03:22 +02002889 iter->count -= bvec->bv_len + offset;
Jens Axboebd11b3a2019-07-20 08:37:31 -06002890 iter->iov_offset = offset & ~PAGE_MASK;
Jens Axboebd11b3a2019-07-20 08:37:31 -06002891 }
2892 }
2893
Jens Axboe5e559562019-11-13 16:12:46 -07002894 return len;
Jens Axboeedafcce2019-01-09 09:16:05 -07002895}
2896
Jens Axboebcda7ba2020-02-23 16:42:51 -07002897static void io_ring_submit_unlock(struct io_ring_ctx *ctx, bool needs_lock)
2898{
2899 if (needs_lock)
2900 mutex_unlock(&ctx->uring_lock);
2901}
2902
2903static void io_ring_submit_lock(struct io_ring_ctx *ctx, bool needs_lock)
2904{
2905 /*
2906 * "Normal" inline submissions always hold the uring_lock, since we
2907 * grab it from the system call. Same is true for the SQPOLL offload.
2908 * The only exception is when we've detached the request and issue it
2909 * from an async worker thread, grab the lock for that case.
2910 */
2911 if (needs_lock)
2912 mutex_lock(&ctx->uring_lock);
2913}
2914
2915static struct io_buffer *io_buffer_select(struct io_kiocb *req, size_t *len,
2916 int bgid, struct io_buffer *kbuf,
2917 bool needs_lock)
2918{
2919 struct io_buffer *head;
2920
2921 if (req->flags & REQ_F_BUFFER_SELECTED)
2922 return kbuf;
2923
2924 io_ring_submit_lock(req->ctx, needs_lock);
2925
2926 lockdep_assert_held(&req->ctx->uring_lock);
2927
2928 head = idr_find(&req->ctx->io_buffer_idr, bgid);
2929 if (head) {
2930 if (!list_empty(&head->list)) {
2931 kbuf = list_last_entry(&head->list, struct io_buffer,
2932 list);
2933 list_del(&kbuf->list);
2934 } else {
2935 kbuf = head;
2936 idr_remove(&req->ctx->io_buffer_idr, bgid);
2937 }
2938 if (*len > kbuf->len)
2939 *len = kbuf->len;
2940 } else {
2941 kbuf = ERR_PTR(-ENOBUFS);
2942 }
2943
2944 io_ring_submit_unlock(req->ctx, needs_lock);
2945
2946 return kbuf;
2947}
2948
Jens Axboe4d954c22020-02-27 07:31:19 -07002949static void __user *io_rw_buffer_select(struct io_kiocb *req, size_t *len,
2950 bool needs_lock)
2951{
2952 struct io_buffer *kbuf;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07002953 u16 bgid;
Jens Axboe4d954c22020-02-27 07:31:19 -07002954
2955 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07002956 bgid = req->buf_index;
Jens Axboe4d954c22020-02-27 07:31:19 -07002957 kbuf = io_buffer_select(req, len, bgid, kbuf, needs_lock);
2958 if (IS_ERR(kbuf))
2959 return kbuf;
2960 req->rw.addr = (u64) (unsigned long) kbuf;
2961 req->flags |= REQ_F_BUFFER_SELECTED;
2962 return u64_to_user_ptr(kbuf->addr);
2963}
2964
2965#ifdef CONFIG_COMPAT
2966static ssize_t io_compat_import(struct io_kiocb *req, struct iovec *iov,
2967 bool needs_lock)
2968{
2969 struct compat_iovec __user *uiov;
2970 compat_ssize_t clen;
2971 void __user *buf;
2972 ssize_t len;
2973
2974 uiov = u64_to_user_ptr(req->rw.addr);
2975 if (!access_ok(uiov, sizeof(*uiov)))
2976 return -EFAULT;
2977 if (__get_user(clen, &uiov->iov_len))
2978 return -EFAULT;
2979 if (clen < 0)
2980 return -EINVAL;
2981
2982 len = clen;
2983 buf = io_rw_buffer_select(req, &len, needs_lock);
2984 if (IS_ERR(buf))
2985 return PTR_ERR(buf);
2986 iov[0].iov_base = buf;
2987 iov[0].iov_len = (compat_size_t) len;
2988 return 0;
2989}
2990#endif
2991
2992static ssize_t __io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
2993 bool needs_lock)
2994{
2995 struct iovec __user *uiov = u64_to_user_ptr(req->rw.addr);
2996 void __user *buf;
2997 ssize_t len;
2998
2999 if (copy_from_user(iov, uiov, sizeof(*uiov)))
3000 return -EFAULT;
3001
3002 len = iov[0].iov_len;
3003 if (len < 0)
3004 return -EINVAL;
3005 buf = io_rw_buffer_select(req, &len, needs_lock);
3006 if (IS_ERR(buf))
3007 return PTR_ERR(buf);
3008 iov[0].iov_base = buf;
3009 iov[0].iov_len = len;
3010 return 0;
3011}
3012
3013static ssize_t io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
3014 bool needs_lock)
3015{
Jens Axboedddb3e22020-06-04 11:27:01 -06003016 if (req->flags & REQ_F_BUFFER_SELECTED) {
3017 struct io_buffer *kbuf;
3018
3019 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
3020 iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
3021 iov[0].iov_len = kbuf->len;
Jens Axboe4d954c22020-02-27 07:31:19 -07003022 return 0;
Jens Axboedddb3e22020-06-04 11:27:01 -06003023 }
Jens Axboe4d954c22020-02-27 07:31:19 -07003024 if (!req->rw.len)
3025 return 0;
3026 else if (req->rw.len > 1)
3027 return -EINVAL;
3028
3029#ifdef CONFIG_COMPAT
3030 if (req->ctx->compat)
3031 return io_compat_import(req, iov, needs_lock);
3032#endif
3033
3034 return __io_iov_buffer_select(req, iov, needs_lock);
3035}
3036
Jens Axboe8452fd02020-08-18 13:58:33 -07003037static ssize_t __io_import_iovec(int rw, struct io_kiocb *req,
3038 struct iovec **iovec, struct iov_iter *iter,
3039 bool needs_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003040{
Jens Axboe9adbd452019-12-20 08:45:55 -07003041 void __user *buf = u64_to_user_ptr(req->rw.addr);
3042 size_t sqe_len = req->rw.len;
Jens Axboe4d954c22020-02-27 07:31:19 -07003043 ssize_t ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07003044 u8 opcode;
3045
Jens Axboed625c6e2019-12-17 19:53:05 -07003046 opcode = req->opcode;
Pavel Begunkov7d009162019-11-25 23:14:40 +03003047 if (opcode == IORING_OP_READ_FIXED || opcode == IORING_OP_WRITE_FIXED) {
Jens Axboeedafcce2019-01-09 09:16:05 -07003048 *iovec = NULL;
Jens Axboe9adbd452019-12-20 08:45:55 -07003049 return io_import_fixed(req, rw, iter);
Jens Axboeedafcce2019-01-09 09:16:05 -07003050 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07003051
Jens Axboebcda7ba2020-02-23 16:42:51 -07003052 /* buffer index only valid with fixed read/write, or buffer select */
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003053 if (req->buf_index && !(req->flags & REQ_F_BUFFER_SELECT))
Jens Axboe9adbd452019-12-20 08:45:55 -07003054 return -EINVAL;
3055
Jens Axboe3a6820f2019-12-22 15:19:35 -07003056 if (opcode == IORING_OP_READ || opcode == IORING_OP_WRITE) {
Jens Axboebcda7ba2020-02-23 16:42:51 -07003057 if (req->flags & REQ_F_BUFFER_SELECT) {
Jens Axboe4d954c22020-02-27 07:31:19 -07003058 buf = io_rw_buffer_select(req, &sqe_len, needs_lock);
Pavel Begunkov867a23e2020-08-20 11:34:39 +03003059 if (IS_ERR(buf))
Jens Axboe4d954c22020-02-27 07:31:19 -07003060 return PTR_ERR(buf);
Jens Axboe3f9d6442020-03-11 12:27:04 -06003061 req->rw.len = sqe_len;
Jens Axboebcda7ba2020-02-23 16:42:51 -07003062 }
3063
Jens Axboe3a6820f2019-12-22 15:19:35 -07003064 ret = import_single_range(rw, buf, sqe_len, *iovec, iter);
3065 *iovec = NULL;
Jens Axboe3a901592020-02-25 17:48:55 -07003066 return ret < 0 ? ret : sqe_len;
Jens Axboe3a6820f2019-12-22 15:19:35 -07003067 }
3068
Jens Axboe4d954c22020-02-27 07:31:19 -07003069 if (req->flags & REQ_F_BUFFER_SELECT) {
3070 ret = io_iov_buffer_select(req, *iovec, needs_lock);
Jens Axboe3f9d6442020-03-11 12:27:04 -06003071 if (!ret) {
3072 ret = (*iovec)->iov_len;
3073 iov_iter_init(iter, rw, *iovec, 1, ret);
3074 }
Jens Axboe4d954c22020-02-27 07:31:19 -07003075 *iovec = NULL;
3076 return ret;
3077 }
3078
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02003079 return __import_iovec(rw, buf, sqe_len, UIO_FASTIOV, iovec, iter,
3080 req->ctx->compat);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003081}
3082
Jens Axboe8452fd02020-08-18 13:58:33 -07003083static ssize_t io_import_iovec(int rw, struct io_kiocb *req,
3084 struct iovec **iovec, struct iov_iter *iter,
3085 bool needs_lock)
3086{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003087 struct io_async_rw *iorw = req->async_data;
3088
3089 if (!iorw)
Jens Axboe8452fd02020-08-18 13:58:33 -07003090 return __io_import_iovec(rw, req, iovec, iter, needs_lock);
3091 *iovec = NULL;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003092 return iov_iter_count(&iorw->iter);
Jens Axboe8452fd02020-08-18 13:58:33 -07003093}
3094
Jens Axboe0fef9482020-08-26 10:36:20 -06003095static inline loff_t *io_kiocb_ppos(struct kiocb *kiocb)
3096{
Pavel Begunkov5b09e372020-09-30 22:57:15 +03003097 return (kiocb->ki_filp->f_mode & FMODE_STREAM) ? NULL : &kiocb->ki_pos;
Jens Axboe0fef9482020-08-26 10:36:20 -06003098}
3099
Jens Axboe32960612019-09-23 11:05:34 -06003100/*
3101 * For files that don't have ->read_iter() and ->write_iter(), handle them
3102 * by looping over ->read() or ->write() manually.
3103 */
Jens Axboe4017eb92020-10-22 14:14:12 -06003104static ssize_t loop_rw_iter(int rw, struct io_kiocb *req, struct iov_iter *iter)
Jens Axboe32960612019-09-23 11:05:34 -06003105{
Jens Axboe4017eb92020-10-22 14:14:12 -06003106 struct kiocb *kiocb = &req->rw.kiocb;
3107 struct file *file = req->file;
Jens Axboe32960612019-09-23 11:05:34 -06003108 ssize_t ret = 0;
3109
3110 /*
3111 * Don't support polled IO through this interface, and we can't
3112 * support non-blocking either. For the latter, this just causes
3113 * the kiocb to be handled from an async context.
3114 */
3115 if (kiocb->ki_flags & IOCB_HIPRI)
3116 return -EOPNOTSUPP;
3117 if (kiocb->ki_flags & IOCB_NOWAIT)
3118 return -EAGAIN;
3119
3120 while (iov_iter_count(iter)) {
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003121 struct iovec iovec;
Jens Axboe32960612019-09-23 11:05:34 -06003122 ssize_t nr;
3123
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003124 if (!iov_iter_is_bvec(iter)) {
3125 iovec = iov_iter_iovec(iter);
3126 } else {
Jens Axboe4017eb92020-10-22 14:14:12 -06003127 iovec.iov_base = u64_to_user_ptr(req->rw.addr);
3128 iovec.iov_len = req->rw.len;
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003129 }
3130
Jens Axboe32960612019-09-23 11:05:34 -06003131 if (rw == READ) {
3132 nr = file->f_op->read(file, iovec.iov_base,
Jens Axboe0fef9482020-08-26 10:36:20 -06003133 iovec.iov_len, io_kiocb_ppos(kiocb));
Jens Axboe32960612019-09-23 11:05:34 -06003134 } else {
3135 nr = file->f_op->write(file, iovec.iov_base,
Jens Axboe0fef9482020-08-26 10:36:20 -06003136 iovec.iov_len, io_kiocb_ppos(kiocb));
Jens Axboe32960612019-09-23 11:05:34 -06003137 }
3138
3139 if (nr < 0) {
3140 if (!ret)
3141 ret = nr;
3142 break;
3143 }
3144 ret += nr;
3145 if (nr != iovec.iov_len)
3146 break;
Jens Axboe4017eb92020-10-22 14:14:12 -06003147 req->rw.len -= nr;
3148 req->rw.addr += nr;
Jens Axboe32960612019-09-23 11:05:34 -06003149 iov_iter_advance(iter, nr);
3150 }
3151
3152 return ret;
3153}
3154
Jens Axboeff6165b2020-08-13 09:47:43 -06003155static void io_req_map_rw(struct io_kiocb *req, const struct iovec *iovec,
3156 const struct iovec *fast_iov, struct iov_iter *iter)
Jens Axboef67676d2019-12-02 11:03:47 -07003157{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003158 struct io_async_rw *rw = req->async_data;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003159
Jens Axboeff6165b2020-08-13 09:47:43 -06003160 memcpy(&rw->iter, iter, sizeof(*iter));
Pavel Begunkovafb87652020-09-06 00:45:46 +03003161 rw->free_iovec = iovec;
Jens Axboe227c0c92020-08-13 11:51:40 -06003162 rw->bytes_done = 0;
Jens Axboeff6165b2020-08-13 09:47:43 -06003163 /* can only be fixed buffers, no need to do anything */
3164 if (iter->type == ITER_BVEC)
3165 return;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003166 if (!iovec) {
Jens Axboeff6165b2020-08-13 09:47:43 -06003167 unsigned iov_off = 0;
3168
3169 rw->iter.iov = rw->fast_iov;
3170 if (iter->iov != fast_iov) {
3171 iov_off = iter->iov - fast_iov;
3172 rw->iter.iov += iov_off;
3173 }
3174 if (rw->fast_iov != fast_iov)
3175 memcpy(rw->fast_iov + iov_off, fast_iov + iov_off,
Xiaoguang Wang45097da2020-04-08 22:29:58 +08003176 sizeof(struct iovec) * iter->nr_segs);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03003177 } else {
3178 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboef67676d2019-12-02 11:03:47 -07003179 }
3180}
3181
Jens Axboee8c2bc12020-08-15 18:44:09 -07003182static inline int __io_alloc_async_data(struct io_kiocb *req)
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003183{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003184 WARN_ON_ONCE(!io_op_defs[req->opcode].async_size);
3185 req->async_data = kmalloc(io_op_defs[req->opcode].async_size, GFP_KERNEL);
3186 return req->async_data == NULL;
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003187}
3188
Jens Axboee8c2bc12020-08-15 18:44:09 -07003189static int io_alloc_async_data(struct io_kiocb *req)
Jens Axboef67676d2019-12-02 11:03:47 -07003190{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003191 if (!io_op_defs[req->opcode].needs_async_data)
Jens Axboed3656342019-12-18 09:50:26 -07003192 return 0;
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003193
Jens Axboee8c2bc12020-08-15 18:44:09 -07003194 return __io_alloc_async_data(req);
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003195}
3196
Jens Axboeff6165b2020-08-13 09:47:43 -06003197static int io_setup_async_rw(struct io_kiocb *req, const struct iovec *iovec,
3198 const struct iovec *fast_iov,
Jens Axboe227c0c92020-08-13 11:51:40 -06003199 struct iov_iter *iter, bool force)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003200{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003201 if (!force && !io_op_defs[req->opcode].needs_async_data)
Jens Axboe74566df2020-01-13 19:23:24 -07003202 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003203 if (!req->async_data) {
3204 if (__io_alloc_async_data(req))
Jens Axboe5d204bc2020-01-31 12:06:52 -07003205 return -ENOMEM;
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003206
Jens Axboeff6165b2020-08-13 09:47:43 -06003207 io_req_map_rw(req, iovec, fast_iov, iter);
Jens Axboe5d204bc2020-01-31 12:06:52 -07003208 }
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003209 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07003210}
3211
Pavel Begunkov73debe62020-09-30 22:57:54 +03003212static inline int io_rw_prep_async(struct io_kiocb *req, int rw)
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003213{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003214 struct io_async_rw *iorw = req->async_data;
Pavel Begunkovf4bff102020-09-06 00:45:45 +03003215 struct iovec *iov = iorw->fast_iov;
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003216 ssize_t ret;
3217
Pavel Begunkov73debe62020-09-30 22:57:54 +03003218 ret = __io_import_iovec(rw, req, &iov, &iorw->iter, false);
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003219 if (unlikely(ret < 0))
3220 return ret;
3221
Pavel Begunkovab0b1962020-09-06 00:45:47 +03003222 iorw->bytes_done = 0;
3223 iorw->free_iovec = iov;
3224 if (iov)
3225 req->flags |= REQ_F_NEED_CLEANUP;
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003226 return 0;
3227}
3228
Pavel Begunkov73debe62020-09-30 22:57:54 +03003229static int io_read_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003230{
3231 ssize_t ret;
3232
Pavel Begunkova88fc402020-09-30 22:57:53 +03003233 ret = io_prep_rw(req, sqe);
Jens Axboe3529d8c2019-12-19 18:24:38 -07003234 if (ret)
3235 return ret;
Jens Axboef67676d2019-12-02 11:03:47 -07003236
Jens Axboe3529d8c2019-12-19 18:24:38 -07003237 if (unlikely(!(req->file->f_mode & FMODE_READ)))
3238 return -EBADF;
Jens Axboef67676d2019-12-02 11:03:47 -07003239
Pavel Begunkov5f798be2020-02-08 13:28:02 +03003240 /* either don't need iovec imported or already have it */
Pavel Begunkov2d199892020-09-30 22:57:35 +03003241 if (!req->async_data)
Jens Axboe3529d8c2019-12-19 18:24:38 -07003242 return 0;
Pavel Begunkov73debe62020-09-30 22:57:54 +03003243 return io_rw_prep_async(req, READ);
Jens Axboef67676d2019-12-02 11:03:47 -07003244}
3245
Jens Axboec1dd91d2020-08-03 16:43:59 -06003246/*
3247 * This is our waitqueue callback handler, registered through lock_page_async()
3248 * when we initially tried to do the IO with the iocb armed our waitqueue.
3249 * This gets called when the page is unlocked, and we generally expect that to
3250 * happen when the page IO is completed and the page is now uptodate. This will
3251 * queue a task_work based retry of the operation, attempting to copy the data
3252 * again. If the latter fails because the page was NOT uptodate, then we will
3253 * do a thread based blocking retry of the operation. That's the unexpected
3254 * slow path.
3255 */
Jens Axboebcf5a062020-05-22 09:24:42 -06003256static int io_async_buf_func(struct wait_queue_entry *wait, unsigned mode,
3257 int sync, void *arg)
3258{
3259 struct wait_page_queue *wpq;
3260 struct io_kiocb *req = wait->private;
Jens Axboebcf5a062020-05-22 09:24:42 -06003261 struct wait_page_key *key = arg;
Jens Axboebcf5a062020-05-22 09:24:42 -06003262 int ret;
3263
3264 wpq = container_of(wait, struct wait_page_queue, wait);
3265
Linus Torvaldscdc8fcb2020-08-03 13:01:22 -07003266 if (!wake_page_match(wpq, key))
3267 return 0;
3268
Hao Xuc8d317a2020-09-29 20:00:45 +08003269 req->rw.kiocb.ki_flags &= ~IOCB_WAITQ;
Jens Axboebcf5a062020-05-22 09:24:42 -06003270 list_del_init(&wait->entry);
3271
Pavel Begunkove7375122020-07-12 20:42:04 +03003272 init_task_work(&req->task_work, io_req_task_submit);
Jens Axboe6d816e02020-08-11 08:04:14 -06003273 percpu_ref_get(&req->ctx->refs);
3274
Jens Axboebcf5a062020-05-22 09:24:42 -06003275 /* submit ref gets dropped, acquire a new one */
3276 refcount_inc(&req->refs);
Jens Axboe87c43112020-09-30 21:00:14 -06003277 ret = io_req_task_work_add(req, true);
Jens Axboebcf5a062020-05-22 09:24:42 -06003278 if (unlikely(ret)) {
Jens Axboec2c4c832020-07-01 15:37:11 -06003279 struct task_struct *tsk;
3280
Jens Axboebcf5a062020-05-22 09:24:42 -06003281 /* queue just for cancelation */
Pavel Begunkove7375122020-07-12 20:42:04 +03003282 init_task_work(&req->task_work, io_req_task_cancel);
Jens Axboebcf5a062020-05-22 09:24:42 -06003283 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06003284 task_work_add(tsk, &req->task_work, TWA_NONE);
Jens Axboec2c4c832020-07-01 15:37:11 -06003285 wake_up_process(tsk);
Jens Axboebcf5a062020-05-22 09:24:42 -06003286 }
Jens Axboebcf5a062020-05-22 09:24:42 -06003287 return 1;
3288}
3289
Jens Axboec1dd91d2020-08-03 16:43:59 -06003290/*
3291 * This controls whether a given IO request should be armed for async page
3292 * based retry. If we return false here, the request is handed to the async
3293 * worker threads for retry. If we're doing buffered reads on a regular file,
3294 * we prepare a private wait_page_queue entry and retry the operation. This
3295 * will either succeed because the page is now uptodate and unlocked, or it
3296 * will register a callback when the page is unlocked at IO completion. Through
3297 * that callback, io_uring uses task_work to setup a retry of the operation.
3298 * That retry will attempt the buffered read again. The retry will generally
3299 * succeed, or in rare cases where it fails, we then fall back to using the
3300 * async worker threads for a blocking retry.
3301 */
Jens Axboe227c0c92020-08-13 11:51:40 -06003302static bool io_rw_should_retry(struct io_kiocb *req)
Jens Axboebcf5a062020-05-22 09:24:42 -06003303{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003304 struct io_async_rw *rw = req->async_data;
3305 struct wait_page_queue *wait = &rw->wpq;
Jens Axboebcf5a062020-05-22 09:24:42 -06003306 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboebcf5a062020-05-22 09:24:42 -06003307
3308 /* never retry for NOWAIT, we just complete with -EAGAIN */
3309 if (req->flags & REQ_F_NOWAIT)
3310 return false;
3311
Jens Axboe227c0c92020-08-13 11:51:40 -06003312 /* Only for buffered IO */
Jens Axboe3b2a4432020-08-16 10:58:43 -07003313 if (kiocb->ki_flags & (IOCB_DIRECT | IOCB_HIPRI))
Jens Axboebcf5a062020-05-22 09:24:42 -06003314 return false;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003315
Jens Axboebcf5a062020-05-22 09:24:42 -06003316 /*
3317 * just use poll if we can, and don't attempt if the fs doesn't
3318 * support callback based unlocks
3319 */
3320 if (file_can_poll(req->file) || !(req->file->f_mode & FMODE_BUF_RASYNC))
3321 return false;
3322
Jens Axboe3b2a4432020-08-16 10:58:43 -07003323 wait->wait.func = io_async_buf_func;
3324 wait->wait.private = req;
3325 wait->wait.flags = 0;
3326 INIT_LIST_HEAD(&wait->wait.entry);
3327 kiocb->ki_flags |= IOCB_WAITQ;
Hao Xuc8d317a2020-09-29 20:00:45 +08003328 kiocb->ki_flags &= ~IOCB_NOWAIT;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003329 kiocb->ki_waitq = wait;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003330 return true;
Jens Axboebcf5a062020-05-22 09:24:42 -06003331}
3332
3333static int io_iter_do_read(struct io_kiocb *req, struct iov_iter *iter)
3334{
3335 if (req->file->f_op->read_iter)
3336 return call_read_iter(req->file, &req->rw.kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003337 else if (req->file->f_op->read)
Jens Axboe4017eb92020-10-22 14:14:12 -06003338 return loop_rw_iter(READ, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003339 else
3340 return -EINVAL;
Jens Axboebcf5a062020-05-22 09:24:42 -06003341}
3342
Jens Axboea1d7c392020-06-22 11:09:46 -06003343static int io_read(struct io_kiocb *req, bool force_nonblock,
3344 struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003345{
3346 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003347 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003348 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003349 struct io_async_rw *rw = req->async_data;
Jens Axboe227c0c92020-08-13 11:51:40 -06003350 ssize_t io_size, ret, ret2;
Jens Axboe31b51512019-01-18 22:56:34 -07003351 size_t iov_count;
Jens Axboef5cac8b2020-09-14 09:30:38 -06003352 bool no_async;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003353
Jens Axboee8c2bc12020-08-15 18:44:09 -07003354 if (rw)
3355 iter = &rw->iter;
Jens Axboeff6165b2020-08-13 09:47:43 -06003356
3357 ret = io_import_iovec(READ, req, &iovec, iter, !force_nonblock);
Jens Axboe06b76d42019-12-19 14:44:26 -07003358 if (ret < 0)
3359 return ret;
Jens Axboeeefdf302020-08-27 16:40:19 -06003360 iov_count = iov_iter_count(iter);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003361 io_size = ret;
3362 req->result = io_size;
Jens Axboe227c0c92020-08-13 11:51:40 -06003363 ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003364
Jens Axboefd6c2e42019-12-18 12:19:41 -07003365 /* Ensure we clear previously set non-block flag */
3366 if (!force_nonblock)
Jens Axboe29de5f62020-02-20 09:56:08 -07003367 kiocb->ki_flags &= ~IOCB_NOWAIT;
Pavel Begunkova88fc402020-09-30 22:57:53 +03003368 else
3369 kiocb->ki_flags |= IOCB_NOWAIT;
3370
Jens Axboefd6c2e42019-12-18 12:19:41 -07003371
Pavel Begunkov24c74672020-06-21 13:09:51 +03003372 /* If the file doesn't support async, just async punt */
Jens Axboef5cac8b2020-09-14 09:30:38 -06003373 no_async = force_nonblock && !io_file_supports_async(req->file, READ);
3374 if (no_async)
Jens Axboef67676d2019-12-02 11:03:47 -07003375 goto copy_iov;
Jens Axboe9e645e112019-05-10 16:07:28 -06003376
Jens Axboe0fef9482020-08-26 10:36:20 -06003377 ret = rw_verify_area(READ, req->file, io_kiocb_ppos(kiocb), iov_count);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003378 if (unlikely(ret))
3379 goto out_free;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003380
Jens Axboe227c0c92020-08-13 11:51:40 -06003381 ret = io_iter_do_read(req, iter);
Jens Axboe32960612019-09-23 11:05:34 -06003382
Jens Axboe227c0c92020-08-13 11:51:40 -06003383 if (!ret) {
3384 goto done;
3385 } else if (ret == -EIOCBQUEUED) {
3386 ret = 0;
3387 goto out_free;
3388 } else if (ret == -EAGAIN) {
Jens Axboeeefdf302020-08-27 16:40:19 -06003389 /* IOPOLL retry should happen for io-wq threads */
3390 if (!force_nonblock && !(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboef91daf52020-08-15 15:58:42 -07003391 goto done;
Jens Axboe355afae2020-09-02 09:30:31 -06003392 /* no retry on NONBLOCK marked file */
3393 if (req->file->f_flags & O_NONBLOCK)
3394 goto done;
Jens Axboe84216312020-08-24 11:45:26 -06003395 /* some cases will consume bytes even on error returns */
3396 iov_iter_revert(iter, iov_count - iov_iter_count(iter));
Jens Axboef38c7e32020-09-25 15:23:43 -06003397 ret = 0;
3398 goto copy_iov;
Jens Axboe227c0c92020-08-13 11:51:40 -06003399 } else if (ret < 0) {
Jens Axboe00d23d52020-08-25 12:59:22 -06003400 /* make sure -ERESTARTSYS -> -EINTR is done */
3401 goto done;
Jens Axboe227c0c92020-08-13 11:51:40 -06003402 }
3403
3404 /* read it all, or we did blocking attempt. no retry. */
Jens Axboef91daf52020-08-15 15:58:42 -07003405 if (!iov_iter_count(iter) || !force_nonblock ||
3406 (req->file->f_flags & O_NONBLOCK))
Jens Axboe227c0c92020-08-13 11:51:40 -06003407 goto done;
3408
3409 io_size -= ret;
3410copy_iov:
3411 ret2 = io_setup_async_rw(req, iovec, inline_vecs, iter, true);
3412 if (ret2) {
3413 ret = ret2;
3414 goto out_free;
3415 }
Jens Axboef5cac8b2020-09-14 09:30:38 -06003416 if (no_async)
3417 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003418 rw = req->async_data;
Jens Axboe227c0c92020-08-13 11:51:40 -06003419 /* it's copied and will be cleaned with ->io */
3420 iovec = NULL;
3421 /* now use our persistent iterator, if we aren't already */
Jens Axboee8c2bc12020-08-15 18:44:09 -07003422 iter = &rw->iter;
Jens Axboe227c0c92020-08-13 11:51:40 -06003423retry:
Jens Axboee8c2bc12020-08-15 18:44:09 -07003424 rw->bytes_done += ret;
Jens Axboe227c0c92020-08-13 11:51:40 -06003425 /* if we can retry, do so with the callbacks armed */
3426 if (!io_rw_should_retry(req)) {
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003427 kiocb->ki_flags &= ~IOCB_WAITQ;
3428 return -EAGAIN;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003429 }
Jens Axboe227c0c92020-08-13 11:51:40 -06003430
3431 /*
3432 * Now retry read with the IOCB_WAITQ parts set in the iocb. If we
3433 * get -EIOCBQUEUED, then we'll get a notification when the desired
3434 * page gets unlocked. We can also get a partial read here, and if we
3435 * do, then just retry at the new offset.
3436 */
3437 ret = io_iter_do_read(req, iter);
3438 if (ret == -EIOCBQUEUED) {
3439 ret = 0;
3440 goto out_free;
3441 } else if (ret > 0 && ret < io_size) {
3442 /* we got some bytes, but not all. retry. */
3443 goto retry;
3444 }
3445done:
3446 kiocb_done(kiocb, ret, cs);
3447 ret = 0;
Jens Axboef67676d2019-12-02 11:03:47 -07003448out_free:
Pavel Begunkovf261c162020-08-20 11:34:10 +03003449 /* it's reportedly faster than delegating the null check to kfree() */
Pavel Begunkov252917c2020-07-13 22:59:20 +03003450 if (iovec)
Xiaoguang Wang6f2cc162020-06-18 15:01:56 +08003451 kfree(iovec);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003452 return ret;
3453}
3454
Pavel Begunkov73debe62020-09-30 22:57:54 +03003455static int io_write_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003456{
3457 ssize_t ret;
3458
Pavel Begunkova88fc402020-09-30 22:57:53 +03003459 ret = io_prep_rw(req, sqe);
Jens Axboe3529d8c2019-12-19 18:24:38 -07003460 if (ret)
3461 return ret;
Jens Axboef67676d2019-12-02 11:03:47 -07003462
Jens Axboe3529d8c2019-12-19 18:24:38 -07003463 if (unlikely(!(req->file->f_mode & FMODE_WRITE)))
3464 return -EBADF;
Jens Axboef67676d2019-12-02 11:03:47 -07003465
Pavel Begunkov5f798be2020-02-08 13:28:02 +03003466 /* either don't need iovec imported or already have it */
Pavel Begunkov2d199892020-09-30 22:57:35 +03003467 if (!req->async_data)
Jens Axboe3529d8c2019-12-19 18:24:38 -07003468 return 0;
Pavel Begunkov73debe62020-09-30 22:57:54 +03003469 return io_rw_prep_async(req, WRITE);
Jens Axboef67676d2019-12-02 11:03:47 -07003470}
3471
Jens Axboea1d7c392020-06-22 11:09:46 -06003472static int io_write(struct io_kiocb *req, bool force_nonblock,
3473 struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003474{
3475 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003476 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003477 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003478 struct io_async_rw *rw = req->async_data;
Jens Axboe31b51512019-01-18 22:56:34 -07003479 size_t iov_count;
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003480 ssize_t ret, ret2, io_size;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003481
Jens Axboee8c2bc12020-08-15 18:44:09 -07003482 if (rw)
3483 iter = &rw->iter;
Jens Axboeff6165b2020-08-13 09:47:43 -06003484
3485 ret = io_import_iovec(WRITE, req, &iovec, iter, !force_nonblock);
Jens Axboe06b76d42019-12-19 14:44:26 -07003486 if (ret < 0)
3487 return ret;
Jens Axboeeefdf302020-08-27 16:40:19 -06003488 iov_count = iov_iter_count(iter);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003489 io_size = ret;
3490 req->result = io_size;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003491
Jens Axboefd6c2e42019-12-18 12:19:41 -07003492 /* Ensure we clear previously set non-block flag */
3493 if (!force_nonblock)
Pavel Begunkova88fc402020-09-30 22:57:53 +03003494 kiocb->ki_flags &= ~IOCB_NOWAIT;
3495 else
3496 kiocb->ki_flags |= IOCB_NOWAIT;
Jens Axboefd6c2e42019-12-18 12:19:41 -07003497
Pavel Begunkov24c74672020-06-21 13:09:51 +03003498 /* If the file doesn't support async, just async punt */
Jens Axboeaf197f52020-04-28 13:15:06 -06003499 if (force_nonblock && !io_file_supports_async(req->file, WRITE))
Jens Axboef67676d2019-12-02 11:03:47 -07003500 goto copy_iov;
Jens Axboef67676d2019-12-02 11:03:47 -07003501
Jens Axboe10d59342019-12-09 20:16:22 -07003502 /* file path doesn't support NOWAIT for non-direct_IO */
3503 if (force_nonblock && !(kiocb->ki_flags & IOCB_DIRECT) &&
3504 (req->flags & REQ_F_ISREG))
Jens Axboef67676d2019-12-02 11:03:47 -07003505 goto copy_iov;
Jens Axboe9e645e112019-05-10 16:07:28 -06003506
Jens Axboe0fef9482020-08-26 10:36:20 -06003507 ret = rw_verify_area(WRITE, req->file, io_kiocb_ppos(kiocb), iov_count);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003508 if (unlikely(ret))
3509 goto out_free;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003510
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003511 /*
3512 * Open-code file_start_write here to grab freeze protection,
3513 * which will be released by another thread in
3514 * io_complete_rw(). Fool lockdep by telling it the lock got
3515 * released so that it doesn't complain about the held lock when
3516 * we return to userspace.
3517 */
3518 if (req->flags & REQ_F_ISREG) {
3519 __sb_start_write(file_inode(req->file)->i_sb,
3520 SB_FREEZE_WRITE, true);
3521 __sb_writers_release(file_inode(req->file)->i_sb,
3522 SB_FREEZE_WRITE);
3523 }
3524 kiocb->ki_flags |= IOCB_WRITE;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003525
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003526 if (req->file->f_op->write_iter)
Jens Axboeff6165b2020-08-13 09:47:43 -06003527 ret2 = call_write_iter(req->file, kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003528 else if (req->file->f_op->write)
Jens Axboe4017eb92020-10-22 14:14:12 -06003529 ret2 = loop_rw_iter(WRITE, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003530 else
3531 ret2 = -EINVAL;
Jens Axboe4ed734b2020-03-20 11:23:41 -06003532
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003533 /*
3534 * Raw bdev writes will return -EOPNOTSUPP for IOCB_NOWAIT. Just
3535 * retry them without IOCB_NOWAIT.
3536 */
3537 if (ret2 == -EOPNOTSUPP && (kiocb->ki_flags & IOCB_NOWAIT))
3538 ret2 = -EAGAIN;
Jens Axboe355afae2020-09-02 09:30:31 -06003539 /* no retry on NONBLOCK marked file */
3540 if (ret2 == -EAGAIN && (req->file->f_flags & O_NONBLOCK))
3541 goto done;
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003542 if (!force_nonblock || ret2 != -EAGAIN) {
Jens Axboeeefdf302020-08-27 16:40:19 -06003543 /* IOPOLL retry should happen for io-wq threads */
3544 if ((req->ctx->flags & IORING_SETUP_IOPOLL) && ret2 == -EAGAIN)
3545 goto copy_iov;
Jens Axboe355afae2020-09-02 09:30:31 -06003546done:
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003547 kiocb_done(kiocb, ret2, cs);
3548 } else {
Jens Axboef67676d2019-12-02 11:03:47 -07003549copy_iov:
Jens Axboe84216312020-08-24 11:45:26 -06003550 /* some cases will consume bytes even on error returns */
3551 iov_iter_revert(iter, iov_count - iov_iter_count(iter));
Jens Axboe227c0c92020-08-13 11:51:40 -06003552 ret = io_setup_async_rw(req, iovec, inline_vecs, iter, false);
Jens Axboeff6165b2020-08-13 09:47:43 -06003553 if (!ret)
3554 return -EAGAIN;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003555 }
Jens Axboe31b51512019-01-18 22:56:34 -07003556out_free:
Pavel Begunkovf261c162020-08-20 11:34:10 +03003557 /* it's reportedly faster than delegating the null check to kfree() */
Pavel Begunkov252917c2020-07-13 22:59:20 +03003558 if (iovec)
Xiaoguang Wang6f2cc162020-06-18 15:01:56 +08003559 kfree(iovec);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003560 return ret;
3561}
3562
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003563static int __io_splice_prep(struct io_kiocb *req,
3564 const struct io_uring_sqe *sqe)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003565{
3566 struct io_splice* sp = &req->splice;
3567 unsigned int valid_flags = SPLICE_F_FD_IN_FIXED | SPLICE_F_ALL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003568
Pavel Begunkov3232dd02020-06-03 18:03:22 +03003569 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3570 return -EINVAL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003571
3572 sp->file_in = NULL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003573 sp->len = READ_ONCE(sqe->len);
3574 sp->flags = READ_ONCE(sqe->splice_flags);
3575
3576 if (unlikely(sp->flags & ~valid_flags))
3577 return -EINVAL;
3578
Pavel Begunkov8371adf2020-10-10 18:34:08 +01003579 sp->file_in = io_file_get(NULL, req, READ_ONCE(sqe->splice_fd_in),
3580 (sp->flags & SPLICE_F_FD_IN_FIXED));
3581 if (!sp->file_in)
3582 return -EBADF;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003583 req->flags |= REQ_F_NEED_CLEANUP;
3584
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08003585 if (!S_ISREG(file_inode(sp->file_in)->i_mode)) {
3586 /*
3587 * Splice operation will be punted aync, and here need to
3588 * modify io_wq_work.flags, so initialize io_wq_work firstly.
3589 */
3590 io_req_init_async(req);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003591 req->work.flags |= IO_WQ_WORK_UNBOUND;
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08003592 }
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003593
3594 return 0;
3595}
3596
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003597static int io_tee_prep(struct io_kiocb *req,
3598 const struct io_uring_sqe *sqe)
3599{
3600 if (READ_ONCE(sqe->splice_off_in) || READ_ONCE(sqe->off))
3601 return -EINVAL;
3602 return __io_splice_prep(req, sqe);
3603}
3604
3605static int io_tee(struct io_kiocb *req, bool force_nonblock)
3606{
3607 struct io_splice *sp = &req->splice;
3608 struct file *in = sp->file_in;
3609 struct file *out = sp->file_out;
3610 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
3611 long ret = 0;
3612
3613 if (force_nonblock)
3614 return -EAGAIN;
3615 if (sp->len)
3616 ret = do_tee(in, out, sp->len, flags);
3617
3618 io_put_file(req, in, (sp->flags & SPLICE_F_FD_IN_FIXED));
3619 req->flags &= ~REQ_F_NEED_CLEANUP;
3620
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003621 if (ret != sp->len)
3622 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003623 io_req_complete(req, ret);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03003624 return 0;
3625}
3626
3627static int io_splice_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
3628{
3629 struct io_splice* sp = &req->splice;
3630
3631 sp->off_in = READ_ONCE(sqe->splice_off_in);
3632 sp->off_out = READ_ONCE(sqe->off);
3633 return __io_splice_prep(req, sqe);
3634}
3635
Pavel Begunkov014db002020-03-03 21:33:12 +03003636static int io_splice(struct io_kiocb *req, bool force_nonblock)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003637{
3638 struct io_splice *sp = &req->splice;
3639 struct file *in = sp->file_in;
3640 struct file *out = sp->file_out;
3641 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
3642 loff_t *poff_in, *poff_out;
Pavel Begunkovc9687422020-05-04 23:00:54 +03003643 long ret = 0;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003644
Pavel Begunkov2fb3e822020-05-01 17:09:38 +03003645 if (force_nonblock)
3646 return -EAGAIN;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003647
3648 poff_in = (sp->off_in == -1) ? NULL : &sp->off_in;
3649 poff_out = (sp->off_out == -1) ? NULL : &sp->off_out;
Pavel Begunkovc9687422020-05-04 23:00:54 +03003650
Jens Axboe948a7742020-05-17 14:21:38 -06003651 if (sp->len)
Pavel Begunkovc9687422020-05-04 23:00:54 +03003652 ret = do_splice(in, poff_in, out, poff_out, sp->len, flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003653
3654 io_put_file(req, in, (sp->flags & SPLICE_F_FD_IN_FIXED));
3655 req->flags &= ~REQ_F_NEED_CLEANUP;
3656
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003657 if (ret != sp->len)
3658 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003659 io_req_complete(req, ret);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03003660 return 0;
3661}
3662
Jens Axboe2b188cc2019-01-07 10:46:33 -07003663/*
3664 * IORING_OP_NOP just posts a completion event, nothing else.
3665 */
Jens Axboe229a7b62020-06-22 10:13:11 -06003666static int io_nop(struct io_kiocb *req, struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003667{
3668 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003669
Jens Axboedef596e2019-01-09 08:59:42 -07003670 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
3671 return -EINVAL;
3672
Jens Axboe229a7b62020-06-22 10:13:11 -06003673 __io_req_complete(req, 0, 0, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003674 return 0;
3675}
3676
Jens Axboe3529d8c2019-12-19 18:24:38 -07003677static int io_prep_fsync(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003678{
Jens Axboe6b063142019-01-10 22:13:58 -07003679 struct io_ring_ctx *ctx = req->ctx;
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003680
Jens Axboe09bb8392019-03-13 12:39:28 -06003681 if (!req->file)
3682 return -EBADF;
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003683
Jens Axboe6b063142019-01-10 22:13:58 -07003684 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboedef596e2019-01-09 08:59:42 -07003685 return -EINVAL;
Jens Axboeedafcce2019-01-09 09:16:05 -07003686 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index))
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003687 return -EINVAL;
3688
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003689 req->sync.flags = READ_ONCE(sqe->fsync_flags);
3690 if (unlikely(req->sync.flags & ~IORING_FSYNC_DATASYNC))
3691 return -EINVAL;
3692
3693 req->sync.off = READ_ONCE(sqe->off);
3694 req->sync.len = READ_ONCE(sqe->len);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003695 return 0;
3696}
3697
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003698static int io_fsync(struct io_kiocb *req, bool force_nonblock)
Jens Axboe78912932020-01-14 22:09:06 -07003699{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003700 loff_t end = req->sync.off + req->sync.len;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003701 int ret;
3702
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003703 /* fsync always requires a blocking context */
3704 if (force_nonblock)
3705 return -EAGAIN;
3706
Jens Axboe9adbd452019-12-20 08:45:55 -07003707 ret = vfs_fsync_range(req->file, req->sync.off,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07003708 end > 0 ? end : LLONG_MAX,
3709 req->sync.flags & IORING_FSYNC_DATASYNC);
3710 if (ret < 0)
3711 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003712 io_req_complete(req, ret);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07003713 return 0;
3714}
3715
Jens Axboed63d1b52019-12-10 10:38:56 -07003716static int io_fallocate_prep(struct io_kiocb *req,
3717 const struct io_uring_sqe *sqe)
3718{
3719 if (sqe->ioprio || sqe->buf_index || sqe->rw_flags)
3720 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03003721 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3722 return -EINVAL;
Jens Axboed63d1b52019-12-10 10:38:56 -07003723
3724 req->sync.off = READ_ONCE(sqe->off);
3725 req->sync.len = READ_ONCE(sqe->addr);
3726 req->sync.mode = READ_ONCE(sqe->len);
3727 return 0;
3728}
3729
Pavel Begunkov014db002020-03-03 21:33:12 +03003730static int io_fallocate(struct io_kiocb *req, bool force_nonblock)
Jens Axboed63d1b52019-12-10 10:38:56 -07003731{
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003732 int ret;
Jens Axboed63d1b52019-12-10 10:38:56 -07003733
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003734 /* fallocate always requiring blocking context */
3735 if (force_nonblock)
3736 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003737 ret = vfs_fallocate(req->file, req->sync.mode, req->sync.off,
3738 req->sync.len);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03003739 if (ret < 0)
3740 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003741 io_req_complete(req, ret);
Jens Axboed63d1b52019-12-10 10:38:56 -07003742 return 0;
3743}
3744
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003745static int __io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe15b71ab2019-12-11 11:20:36 -07003746{
Jens Axboef8748882020-01-08 17:47:02 -07003747 const char __user *fname;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003748 int ret;
3749
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003750 if (unlikely(sqe->ioprio || sqe->buf_index))
Jens Axboe15b71ab2019-12-11 11:20:36 -07003751 return -EINVAL;
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003752 if (unlikely(req->flags & REQ_F_FIXED_FILE))
Jens Axboecf3040c2020-02-06 21:31:40 -07003753 return -EBADF;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003754
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003755 /* open.how should be already initialised */
3756 if (!(req->open.how.flags & O_PATH) && force_o_largefile())
Jens Axboe08a1d26eb2020-04-08 09:20:54 -06003757 req->open.how.flags |= O_LARGEFILE;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003758
Pavel Begunkov25e72d12020-06-03 18:03:23 +03003759 req->open.dfd = READ_ONCE(sqe->fd);
3760 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboef8748882020-01-08 17:47:02 -07003761 req->open.filename = getname(fname);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003762 if (IS_ERR(req->open.filename)) {
3763 ret = PTR_ERR(req->open.filename);
3764 req->open.filename = NULL;
3765 return ret;
3766 }
Jens Axboe4022e7a2020-03-19 19:23:18 -06003767 req->open.nofile = rlimit(RLIMIT_NOFILE);
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03003768 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003769 return 0;
3770}
3771
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003772static int io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
3773{
3774 u64 flags, mode;
3775
Jens Axboe4eb8dde2020-09-18 19:36:24 -06003776 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
3777 return -EINVAL;
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003778 mode = READ_ONCE(sqe->len);
3779 flags = READ_ONCE(sqe->open_flags);
3780 req->open.how = build_open_how(flags, mode);
3781 return __io_openat_prep(req, sqe);
3782}
3783
Jens Axboecebdb982020-01-08 17:59:24 -07003784static int io_openat2_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
3785{
3786 struct open_how __user *how;
Jens Axboecebdb982020-01-08 17:59:24 -07003787 size_t len;
3788 int ret;
3789
Jens Axboe4eb8dde2020-09-18 19:36:24 -06003790 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
3791 return -EINVAL;
Jens Axboecebdb982020-01-08 17:59:24 -07003792 how = u64_to_user_ptr(READ_ONCE(sqe->addr2));
3793 len = READ_ONCE(sqe->len);
Jens Axboecebdb982020-01-08 17:59:24 -07003794 if (len < OPEN_HOW_SIZE_VER0)
3795 return -EINVAL;
3796
3797 ret = copy_struct_from_user(&req->open.how, sizeof(req->open.how), how,
3798 len);
3799 if (ret)
3800 return ret;
3801
Pavel Begunkovec65fea2020-06-03 18:03:24 +03003802 return __io_openat_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07003803}
3804
Pavel Begunkov014db002020-03-03 21:33:12 +03003805static int io_openat2(struct io_kiocb *req, bool force_nonblock)
Jens Axboe15b71ab2019-12-11 11:20:36 -07003806{
3807 struct open_flags op;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003808 struct file *file;
3809 int ret;
3810
Jens Axboef86cd202020-01-29 13:46:44 -07003811 if (force_nonblock)
Jens Axboe15b71ab2019-12-11 11:20:36 -07003812 return -EAGAIN;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003813
Jens Axboecebdb982020-01-08 17:59:24 -07003814 ret = build_open_flags(&req->open.how, &op);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003815 if (ret)
3816 goto err;
3817
Jens Axboe4022e7a2020-03-19 19:23:18 -06003818 ret = __get_unused_fd_flags(req->open.how.flags, req->open.nofile);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003819 if (ret < 0)
3820 goto err;
3821
3822 file = do_filp_open(req->open.dfd, req->open.filename, &op);
3823 if (IS_ERR(file)) {
3824 put_unused_fd(ret);
3825 ret = PTR_ERR(file);
3826 } else {
3827 fsnotify_open(file);
3828 fd_install(ret, file);
3829 }
3830err:
3831 putname(req->open.filename);
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03003832 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07003833 if (ret < 0)
3834 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06003835 io_req_complete(req, ret);
Jens Axboe15b71ab2019-12-11 11:20:36 -07003836 return 0;
3837}
3838
Pavel Begunkov014db002020-03-03 21:33:12 +03003839static int io_openat(struct io_kiocb *req, bool force_nonblock)
Jens Axboecebdb982020-01-08 17:59:24 -07003840{
Pavel Begunkov014db002020-03-03 21:33:12 +03003841 return io_openat2(req, force_nonblock);
Jens Axboecebdb982020-01-08 17:59:24 -07003842}
3843
Jens Axboe067524e2020-03-02 16:32:28 -07003844static int io_remove_buffers_prep(struct io_kiocb *req,
3845 const struct io_uring_sqe *sqe)
3846{
3847 struct io_provide_buf *p = &req->pbuf;
3848 u64 tmp;
3849
3850 if (sqe->ioprio || sqe->rw_flags || sqe->addr || sqe->len || sqe->off)
3851 return -EINVAL;
3852
3853 tmp = READ_ONCE(sqe->fd);
3854 if (!tmp || tmp > USHRT_MAX)
3855 return -EINVAL;
3856
3857 memset(p, 0, sizeof(*p));
3858 p->nbufs = tmp;
3859 p->bgid = READ_ONCE(sqe->buf_group);
3860 return 0;
3861}
3862
3863static int __io_remove_buffers(struct io_ring_ctx *ctx, struct io_buffer *buf,
3864 int bgid, unsigned nbufs)
3865{
3866 unsigned i = 0;
3867
3868 /* shouldn't happen */
3869 if (!nbufs)
3870 return 0;
3871
3872 /* the head kbuf is the list itself */
3873 while (!list_empty(&buf->list)) {
3874 struct io_buffer *nxt;
3875
3876 nxt = list_first_entry(&buf->list, struct io_buffer, list);
3877 list_del(&nxt->list);
3878 kfree(nxt);
3879 if (++i == nbufs)
3880 return i;
3881 }
3882 i++;
3883 kfree(buf);
3884 idr_remove(&ctx->io_buffer_idr, bgid);
3885
3886 return i;
3887}
3888
Jens Axboe229a7b62020-06-22 10:13:11 -06003889static int io_remove_buffers(struct io_kiocb *req, bool force_nonblock,
3890 struct io_comp_state *cs)
Jens Axboe067524e2020-03-02 16:32:28 -07003891{
3892 struct io_provide_buf *p = &req->pbuf;
3893 struct io_ring_ctx *ctx = req->ctx;
3894 struct io_buffer *head;
3895 int ret = 0;
3896
3897 io_ring_submit_lock(ctx, !force_nonblock);
3898
3899 lockdep_assert_held(&ctx->uring_lock);
3900
3901 ret = -ENOENT;
3902 head = idr_find(&ctx->io_buffer_idr, p->bgid);
3903 if (head)
3904 ret = __io_remove_buffers(ctx, head, p->bgid, p->nbufs);
3905
3906 io_ring_submit_lock(ctx, !force_nonblock);
3907 if (ret < 0)
3908 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06003909 __io_req_complete(req, ret, 0, cs);
Jens Axboe067524e2020-03-02 16:32:28 -07003910 return 0;
3911}
3912
Jens Axboeddf0322d2020-02-23 16:41:33 -07003913static int io_provide_buffers_prep(struct io_kiocb *req,
3914 const struct io_uring_sqe *sqe)
3915{
3916 struct io_provide_buf *p = &req->pbuf;
3917 u64 tmp;
3918
3919 if (sqe->ioprio || sqe->rw_flags)
3920 return -EINVAL;
3921
3922 tmp = READ_ONCE(sqe->fd);
3923 if (!tmp || tmp > USHRT_MAX)
3924 return -E2BIG;
3925 p->nbufs = tmp;
3926 p->addr = READ_ONCE(sqe->addr);
3927 p->len = READ_ONCE(sqe->len);
3928
Bijan Mottahedehefe68c12020-06-04 18:01:52 -07003929 if (!access_ok(u64_to_user_ptr(p->addr), (p->len * p->nbufs)))
Jens Axboeddf0322d2020-02-23 16:41:33 -07003930 return -EFAULT;
3931
3932 p->bgid = READ_ONCE(sqe->buf_group);
3933 tmp = READ_ONCE(sqe->off);
3934 if (tmp > USHRT_MAX)
3935 return -E2BIG;
3936 p->bid = tmp;
3937 return 0;
3938}
3939
3940static int io_add_buffers(struct io_provide_buf *pbuf, struct io_buffer **head)
3941{
3942 struct io_buffer *buf;
3943 u64 addr = pbuf->addr;
3944 int i, bid = pbuf->bid;
3945
3946 for (i = 0; i < pbuf->nbufs; i++) {
3947 buf = kmalloc(sizeof(*buf), GFP_KERNEL);
3948 if (!buf)
3949 break;
3950
3951 buf->addr = addr;
3952 buf->len = pbuf->len;
3953 buf->bid = bid;
3954 addr += pbuf->len;
3955 bid++;
3956 if (!*head) {
3957 INIT_LIST_HEAD(&buf->list);
3958 *head = buf;
3959 } else {
3960 list_add_tail(&buf->list, &(*head)->list);
3961 }
3962 }
3963
3964 return i ? i : -ENOMEM;
3965}
3966
Jens Axboe229a7b62020-06-22 10:13:11 -06003967static int io_provide_buffers(struct io_kiocb *req, bool force_nonblock,
3968 struct io_comp_state *cs)
Jens Axboeddf0322d2020-02-23 16:41:33 -07003969{
3970 struct io_provide_buf *p = &req->pbuf;
3971 struct io_ring_ctx *ctx = req->ctx;
3972 struct io_buffer *head, *list;
3973 int ret = 0;
3974
3975 io_ring_submit_lock(ctx, !force_nonblock);
3976
3977 lockdep_assert_held(&ctx->uring_lock);
3978
3979 list = head = idr_find(&ctx->io_buffer_idr, p->bgid);
3980
3981 ret = io_add_buffers(p, &head);
3982 if (ret < 0)
3983 goto out;
3984
3985 if (!list) {
3986 ret = idr_alloc(&ctx->io_buffer_idr, head, p->bgid, p->bgid + 1,
3987 GFP_KERNEL);
3988 if (ret < 0) {
Jens Axboe067524e2020-03-02 16:32:28 -07003989 __io_remove_buffers(ctx, head, p->bgid, -1U);
Jens Axboeddf0322d2020-02-23 16:41:33 -07003990 goto out;
3991 }
3992 }
3993out:
3994 io_ring_submit_unlock(ctx, !force_nonblock);
3995 if (ret < 0)
3996 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06003997 __io_req_complete(req, ret, 0, cs);
Jens Axboeddf0322d2020-02-23 16:41:33 -07003998 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003999}
4000
Jens Axboe3e4827b2020-01-08 15:18:09 -07004001static int io_epoll_ctl_prep(struct io_kiocb *req,
4002 const struct io_uring_sqe *sqe)
4003{
4004#if defined(CONFIG_EPOLL)
4005 if (sqe->ioprio || sqe->buf_index)
4006 return -EINVAL;
Jens Axboe6ca56f82020-09-18 16:51:19 -06004007 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL)))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004008 return -EINVAL;
Jens Axboe3e4827b2020-01-08 15:18:09 -07004009
4010 req->epoll.epfd = READ_ONCE(sqe->fd);
4011 req->epoll.op = READ_ONCE(sqe->len);
4012 req->epoll.fd = READ_ONCE(sqe->off);
4013
4014 if (ep_op_has_event(req->epoll.op)) {
4015 struct epoll_event __user *ev;
4016
4017 ev = u64_to_user_ptr(READ_ONCE(sqe->addr));
4018 if (copy_from_user(&req->epoll.event, ev, sizeof(*ev)))
4019 return -EFAULT;
4020 }
4021
4022 return 0;
4023#else
4024 return -EOPNOTSUPP;
4025#endif
4026}
4027
Jens Axboe229a7b62020-06-22 10:13:11 -06004028static int io_epoll_ctl(struct io_kiocb *req, bool force_nonblock,
4029 struct io_comp_state *cs)
Jens Axboe3e4827b2020-01-08 15:18:09 -07004030{
4031#if defined(CONFIG_EPOLL)
4032 struct io_epoll *ie = &req->epoll;
4033 int ret;
4034
4035 ret = do_epoll_ctl(ie->epfd, ie->op, ie->fd, &ie->event, force_nonblock);
4036 if (force_nonblock && ret == -EAGAIN)
4037 return -EAGAIN;
4038
4039 if (ret < 0)
4040 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004041 __io_req_complete(req, ret, 0, cs);
Jens Axboe3e4827b2020-01-08 15:18:09 -07004042 return 0;
4043#else
4044 return -EOPNOTSUPP;
4045#endif
4046}
4047
Jens Axboec1ca7572019-12-25 22:18:28 -07004048static int io_madvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4049{
4050#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
4051 if (sqe->ioprio || sqe->buf_index || sqe->off)
4052 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004053 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4054 return -EINVAL;
Jens Axboec1ca7572019-12-25 22:18:28 -07004055
4056 req->madvise.addr = READ_ONCE(sqe->addr);
4057 req->madvise.len = READ_ONCE(sqe->len);
4058 req->madvise.advice = READ_ONCE(sqe->fadvise_advice);
4059 return 0;
4060#else
4061 return -EOPNOTSUPP;
4062#endif
4063}
4064
Pavel Begunkov014db002020-03-03 21:33:12 +03004065static int io_madvise(struct io_kiocb *req, bool force_nonblock)
Jens Axboec1ca7572019-12-25 22:18:28 -07004066{
4067#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
4068 struct io_madvise *ma = &req->madvise;
4069 int ret;
4070
4071 if (force_nonblock)
4072 return -EAGAIN;
4073
Minchan Kim0726b012020-10-17 16:14:50 -07004074 ret = do_madvise(current->mm, ma->addr, ma->len, ma->advice);
Jens Axboec1ca7572019-12-25 22:18:28 -07004075 if (ret < 0)
4076 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004077 io_req_complete(req, ret);
Jens Axboec1ca7572019-12-25 22:18:28 -07004078 return 0;
4079#else
4080 return -EOPNOTSUPP;
4081#endif
4082}
4083
Jens Axboe4840e412019-12-25 22:03:45 -07004084static int io_fadvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4085{
4086 if (sqe->ioprio || sqe->buf_index || sqe->addr)
4087 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004088 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4089 return -EINVAL;
Jens Axboe4840e412019-12-25 22:03:45 -07004090
4091 req->fadvise.offset = READ_ONCE(sqe->off);
4092 req->fadvise.len = READ_ONCE(sqe->len);
4093 req->fadvise.advice = READ_ONCE(sqe->fadvise_advice);
4094 return 0;
4095}
4096
Pavel Begunkov014db002020-03-03 21:33:12 +03004097static int io_fadvise(struct io_kiocb *req, bool force_nonblock)
Jens Axboe4840e412019-12-25 22:03:45 -07004098{
4099 struct io_fadvise *fa = &req->fadvise;
4100 int ret;
4101
Jens Axboe3e694262020-02-01 09:22:49 -07004102 if (force_nonblock) {
4103 switch (fa->advice) {
4104 case POSIX_FADV_NORMAL:
4105 case POSIX_FADV_RANDOM:
4106 case POSIX_FADV_SEQUENTIAL:
4107 break;
4108 default:
4109 return -EAGAIN;
4110 }
4111 }
Jens Axboe4840e412019-12-25 22:03:45 -07004112
4113 ret = vfs_fadvise(req->file, fa->offset, fa->len, fa->advice);
4114 if (ret < 0)
4115 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004116 io_req_complete(req, ret);
Jens Axboe4840e412019-12-25 22:03:45 -07004117 return 0;
4118}
4119
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004120static int io_statx_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4121{
Jens Axboe6ca56f82020-09-18 16:51:19 -06004122 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL)))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004123 return -EINVAL;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004124 if (sqe->ioprio || sqe->buf_index)
4125 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004126 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004127 return -EBADF;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004128
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004129 req->statx.dfd = READ_ONCE(sqe->fd);
4130 req->statx.mask = READ_ONCE(sqe->len);
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004131 req->statx.filename = u64_to_user_ptr(READ_ONCE(sqe->addr));
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004132 req->statx.buffer = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4133 req->statx.flags = READ_ONCE(sqe->statx_flags);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004134
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004135 return 0;
4136}
4137
Pavel Begunkov014db002020-03-03 21:33:12 +03004138static int io_statx(struct io_kiocb *req, bool force_nonblock)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004139{
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004140 struct io_statx *ctx = &req->statx;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004141 int ret;
4142
Jens Axboe5b0bbee2020-04-27 10:41:22 -06004143 if (force_nonblock) {
4144 /* only need file table for an actual valid fd */
4145 if (ctx->dfd == -1 || ctx->dfd == AT_FDCWD)
4146 req->flags |= REQ_F_NO_FILE_TABLE;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004147 return -EAGAIN;
Jens Axboe5b0bbee2020-04-27 10:41:22 -06004148 }
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004149
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004150 ret = do_statx(ctx->dfd, ctx->filename, ctx->flags, ctx->mask,
4151 ctx->buffer);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004152
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004153 if (ret < 0)
4154 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004155 io_req_complete(req, ret);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004156 return 0;
4157}
4158
Jens Axboeb5dba592019-12-11 14:02:38 -07004159static int io_close_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4160{
4161 /*
4162 * If we queue this for async, it must not be cancellable. That would
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08004163 * leave the 'file' in an undeterminate state, and here need to modify
4164 * io_wq_work.flags, so initialize io_wq_work firstly.
Jens Axboeb5dba592019-12-11 14:02:38 -07004165 */
Xiaoguang Wang7cdaf582020-06-10 19:41:19 +08004166 io_req_init_async(req);
Jens Axboeb5dba592019-12-11 14:02:38 -07004167 req->work.flags |= IO_WQ_WORK_NO_CANCEL;
4168
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004169 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
4170 return -EINVAL;
Jens Axboeb5dba592019-12-11 14:02:38 -07004171 if (sqe->ioprio || sqe->off || sqe->addr || sqe->len ||
4172 sqe->rw_flags || sqe->buf_index)
4173 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004174 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004175 return -EBADF;
Jens Axboeb5dba592019-12-11 14:02:38 -07004176
4177 req->close.fd = READ_ONCE(sqe->fd);
Jens Axboe0f212202020-09-13 13:09:39 -06004178 if ((req->file && req->file->f_op == &io_uring_fops))
Jens Axboefd2206e2020-06-02 16:40:47 -06004179 return -EBADF;
4180
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004181 req->close.put_file = NULL;
Jens Axboeb5dba592019-12-11 14:02:38 -07004182 return 0;
4183}
4184
Jens Axboe229a7b62020-06-22 10:13:11 -06004185static int io_close(struct io_kiocb *req, bool force_nonblock,
4186 struct io_comp_state *cs)
Jens Axboeb5dba592019-12-11 14:02:38 -07004187{
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004188 struct io_close *close = &req->close;
Jens Axboeb5dba592019-12-11 14:02:38 -07004189 int ret;
4190
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004191 /* might be already done during nonblock submission */
4192 if (!close->put_file) {
4193 ret = __close_fd_get_file(close->fd, &close->put_file);
4194 if (ret < 0)
4195 return (ret == -ENOENT) ? -EBADF : ret;
4196 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004197
4198 /* if the file has a flush method, be safe and punt to async */
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004199 if (close->put_file->f_op->flush && force_nonblock) {
Pavel Begunkov24c74672020-06-21 13:09:51 +03004200 /* was never set, but play safe */
4201 req->flags &= ~REQ_F_NOWAIT;
Pavel Begunkov0bf0eef2020-05-26 20:34:06 +03004202 /* avoid grabbing files - we don't need the files */
Pavel Begunkov24c74672020-06-21 13:09:51 +03004203 req->flags |= REQ_F_NO_FILE_TABLE;
Pavel Begunkov0bf0eef2020-05-26 20:34:06 +03004204 return -EAGAIN;
Pavel Begunkova2100672020-03-02 23:45:16 +03004205 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004206
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004207 /* No ->flush() or already async, safely close from here */
Jens Axboe98447d62020-10-14 10:48:51 -06004208 ret = filp_close(close->put_file, req->work.identity->files);
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004209 if (ret < 0)
4210 req_set_fail_links(req);
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004211 fput(close->put_file);
4212 close->put_file = NULL;
Jens Axboe229a7b62020-06-22 10:13:11 -06004213 __io_req_complete(req, ret, 0, cs);
Jens Axboe1a417f42020-01-31 17:16:48 -07004214 return 0;
Jens Axboeb5dba592019-12-11 14:02:38 -07004215}
4216
Jens Axboe3529d8c2019-12-19 18:24:38 -07004217static int io_prep_sfr(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004218{
4219 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004220
4221 if (!req->file)
4222 return -EBADF;
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004223
4224 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
4225 return -EINVAL;
4226 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index))
4227 return -EINVAL;
4228
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004229 req->sync.off = READ_ONCE(sqe->off);
4230 req->sync.len = READ_ONCE(sqe->len);
4231 req->sync.flags = READ_ONCE(sqe->sync_range_flags);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004232 return 0;
4233}
4234
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004235static int io_sync_file_range(struct io_kiocb *req, bool force_nonblock)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004236{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004237 int ret;
4238
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004239 /* sync_file_range always requires a blocking context */
4240 if (force_nonblock)
4241 return -EAGAIN;
4242
Jens Axboe9adbd452019-12-20 08:45:55 -07004243 ret = sync_file_range(req->file, req->sync.off, req->sync.len,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004244 req->sync.flags);
4245 if (ret < 0)
4246 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004247 io_req_complete(req, ret);
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004248 return 0;
4249}
4250
YueHaibing469956e2020-03-04 15:53:52 +08004251#if defined(CONFIG_NET)
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004252static int io_setup_async_msg(struct io_kiocb *req,
4253 struct io_async_msghdr *kmsg)
4254{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004255 struct io_async_msghdr *async_msg = req->async_data;
4256
4257 if (async_msg)
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004258 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004259 if (io_alloc_async_data(req)) {
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004260 if (kmsg->iov != kmsg->fast_iov)
4261 kfree(kmsg->iov);
4262 return -ENOMEM;
4263 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07004264 async_msg = req->async_data;
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004265 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004266 memcpy(async_msg, kmsg, sizeof(*kmsg));
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004267 return -EAGAIN;
4268}
4269
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004270static int io_sendmsg_copy_hdr(struct io_kiocb *req,
4271 struct io_async_msghdr *iomsg)
4272{
4273 iomsg->iov = iomsg->fast_iov;
4274 iomsg->msg.msg_name = &iomsg->addr;
4275 return sendmsg_copy_msghdr(&iomsg->msg, req->sr_msg.umsg,
4276 req->sr_msg.msg_flags, &iomsg->iov);
4277}
4278
Jens Axboe3529d8c2019-12-19 18:24:38 -07004279static int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboeaa1fa282019-04-19 13:38:09 -06004280{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004281 struct io_async_msghdr *async_msg = req->async_data;
Jens Axboee47293f2019-12-20 08:58:21 -07004282 struct io_sr_msg *sr = &req->sr_msg;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004283 int ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004284
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004285 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4286 return -EINVAL;
4287
Jens Axboee47293f2019-12-20 08:58:21 -07004288 sr->msg_flags = READ_ONCE(sqe->msg_flags);
Pavel Begunkov270a5942020-07-12 20:41:04 +03004289 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboefddafac2020-01-04 20:19:44 -07004290 sr->len = READ_ONCE(sqe->len);
Jens Axboe3529d8c2019-12-19 18:24:38 -07004291
Jens Axboed8768362020-02-27 14:17:49 -07004292#ifdef CONFIG_COMPAT
4293 if (req->ctx->compat)
4294 sr->msg_flags |= MSG_CMSG_COMPAT;
4295#endif
4296
Jens Axboee8c2bc12020-08-15 18:44:09 -07004297 if (!async_msg || !io_op_defs[req->opcode].needs_async_data)
Jens Axboe3529d8c2019-12-19 18:24:38 -07004298 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004299 ret = io_sendmsg_copy_hdr(req, async_msg);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004300 if (!ret)
4301 req->flags |= REQ_F_NEED_CLEANUP;
4302 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004303}
4304
Jens Axboe229a7b62020-06-22 10:13:11 -06004305static int io_sendmsg(struct io_kiocb *req, bool force_nonblock,
4306 struct io_comp_state *cs)
Jens Axboe03b12302019-12-02 18:50:25 -07004307{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004308 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe03b12302019-12-02 18:50:25 -07004309 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004310 unsigned flags;
Jens Axboe03b12302019-12-02 18:50:25 -07004311 int ret;
4312
Jens Axboe03b12302019-12-02 18:50:25 -07004313 sock = sock_from_file(req->file, &ret);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004314 if (unlikely(!sock))
4315 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004316
Jens Axboee8c2bc12020-08-15 18:44:09 -07004317 if (req->async_data) {
4318 kmsg = req->async_data;
4319 kmsg->msg.msg_name = &kmsg->addr;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004320 /* if iov is set, it's allocated already */
4321 if (!kmsg->iov)
4322 kmsg->iov = kmsg->fast_iov;
4323 kmsg->msg.msg_iter.iov = kmsg->iov;
4324 } else {
4325 ret = io_sendmsg_copy_hdr(req, &iomsg);
Jens Axboefddafac2020-01-04 20:19:44 -07004326 if (ret)
4327 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004328 kmsg = &iomsg;
Jens Axboefddafac2020-01-04 20:19:44 -07004329 }
4330
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004331 flags = req->sr_msg.msg_flags;
4332 if (flags & MSG_DONTWAIT)
4333 req->flags |= REQ_F_NOWAIT;
4334 else if (force_nonblock)
4335 flags |= MSG_DONTWAIT;
4336
4337 ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
4338 if (force_nonblock && ret == -EAGAIN)
4339 return io_setup_async_msg(req, kmsg);
4340 if (ret == -ERESTARTSYS)
4341 ret = -EINTR;
4342
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004343 if (kmsg->iov != kmsg->fast_iov)
Jens Axboe03b12302019-12-02 18:50:25 -07004344 kfree(kmsg->iov);
4345 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboefddafac2020-01-04 20:19:44 -07004346 if (ret < 0)
4347 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004348 __io_req_complete(req, ret, 0, cs);
Jens Axboefddafac2020-01-04 20:19:44 -07004349 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004350}
4351
Jens Axboe229a7b62020-06-22 10:13:11 -06004352static int io_send(struct io_kiocb *req, bool force_nonblock,
4353 struct io_comp_state *cs)
Jens Axboe03b12302019-12-02 18:50:25 -07004354{
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004355 struct io_sr_msg *sr = &req->sr_msg;
4356 struct msghdr msg;
4357 struct iovec iov;
Jens Axboe03b12302019-12-02 18:50:25 -07004358 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004359 unsigned flags;
Jens Axboe03b12302019-12-02 18:50:25 -07004360 int ret;
4361
4362 sock = sock_from_file(req->file, &ret);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004363 if (unlikely(!sock))
4364 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004365
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004366 ret = import_single_range(WRITE, sr->buf, sr->len, &iov, &msg.msg_iter);
4367 if (unlikely(ret))
Zheng Bin14db8412020-09-09 20:12:37 +08004368 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004369
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004370 msg.msg_name = NULL;
4371 msg.msg_control = NULL;
4372 msg.msg_controllen = 0;
4373 msg.msg_namelen = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004374
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004375 flags = req->sr_msg.msg_flags;
4376 if (flags & MSG_DONTWAIT)
4377 req->flags |= REQ_F_NOWAIT;
4378 else if (force_nonblock)
4379 flags |= MSG_DONTWAIT;
Jens Axboe03b12302019-12-02 18:50:25 -07004380
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004381 msg.msg_flags = flags;
4382 ret = sock_sendmsg(sock, &msg);
4383 if (force_nonblock && ret == -EAGAIN)
4384 return -EAGAIN;
4385 if (ret == -ERESTARTSYS)
4386 ret = -EINTR;
Jens Axboe03b12302019-12-02 18:50:25 -07004387
Jens Axboe03b12302019-12-02 18:50:25 -07004388 if (ret < 0)
4389 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004390 __io_req_complete(req, ret, 0, cs);
Jens Axboe03b12302019-12-02 18:50:25 -07004391 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004392}
4393
Pavel Begunkov1400e692020-07-12 20:41:05 +03004394static int __io_recvmsg_copy_hdr(struct io_kiocb *req,
4395 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07004396{
4397 struct io_sr_msg *sr = &req->sr_msg;
4398 struct iovec __user *uiov;
4399 size_t iov_len;
4400 int ret;
4401
Pavel Begunkov1400e692020-07-12 20:41:05 +03004402 ret = __copy_msghdr_from_user(&iomsg->msg, sr->umsg,
4403 &iomsg->uaddr, &uiov, &iov_len);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004404 if (ret)
4405 return ret;
4406
4407 if (req->flags & REQ_F_BUFFER_SELECT) {
4408 if (iov_len > 1)
4409 return -EINVAL;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004410 if (copy_from_user(iomsg->iov, uiov, sizeof(*uiov)))
Jens Axboe52de1fe2020-02-27 10:15:42 -07004411 return -EFAULT;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004412 sr->len = iomsg->iov[0].iov_len;
4413 iov_iter_init(&iomsg->msg.msg_iter, READ, iomsg->iov, 1,
Jens Axboe52de1fe2020-02-27 10:15:42 -07004414 sr->len);
Pavel Begunkov1400e692020-07-12 20:41:05 +03004415 iomsg->iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004416 } else {
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02004417 ret = __import_iovec(READ, uiov, iov_len, UIO_FASTIOV,
4418 &iomsg->iov, &iomsg->msg.msg_iter,
4419 false);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004420 if (ret > 0)
4421 ret = 0;
4422 }
4423
4424 return ret;
4425}
4426
4427#ifdef CONFIG_COMPAT
4428static int __io_compat_recvmsg_copy_hdr(struct io_kiocb *req,
Pavel Begunkov1400e692020-07-12 20:41:05 +03004429 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07004430{
4431 struct compat_msghdr __user *msg_compat;
4432 struct io_sr_msg *sr = &req->sr_msg;
4433 struct compat_iovec __user *uiov;
4434 compat_uptr_t ptr;
4435 compat_size_t len;
4436 int ret;
4437
Pavel Begunkov270a5942020-07-12 20:41:04 +03004438 msg_compat = (struct compat_msghdr __user *) sr->umsg;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004439 ret = __get_compat_msghdr(&iomsg->msg, msg_compat, &iomsg->uaddr,
Jens Axboe52de1fe2020-02-27 10:15:42 -07004440 &ptr, &len);
4441 if (ret)
4442 return ret;
4443
4444 uiov = compat_ptr(ptr);
4445 if (req->flags & REQ_F_BUFFER_SELECT) {
4446 compat_ssize_t clen;
4447
4448 if (len > 1)
4449 return -EINVAL;
4450 if (!access_ok(uiov, sizeof(*uiov)))
4451 return -EFAULT;
4452 if (__get_user(clen, &uiov->iov_len))
4453 return -EFAULT;
4454 if (clen < 0)
4455 return -EINVAL;
Pavel Begunkov1400e692020-07-12 20:41:05 +03004456 sr->len = iomsg->iov[0].iov_len;
4457 iomsg->iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004458 } else {
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02004459 ret = __import_iovec(READ, (struct iovec __user *)uiov, len,
4460 UIO_FASTIOV, &iomsg->iov,
4461 &iomsg->msg.msg_iter, true);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004462 if (ret < 0)
4463 return ret;
4464 }
4465
4466 return 0;
4467}
Jens Axboe03b12302019-12-02 18:50:25 -07004468#endif
Jens Axboe52de1fe2020-02-27 10:15:42 -07004469
Pavel Begunkov1400e692020-07-12 20:41:05 +03004470static int io_recvmsg_copy_hdr(struct io_kiocb *req,
4471 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07004472{
Pavel Begunkov1400e692020-07-12 20:41:05 +03004473 iomsg->msg.msg_name = &iomsg->addr;
4474 iomsg->iov = iomsg->fast_iov;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004475
4476#ifdef CONFIG_COMPAT
4477 if (req->ctx->compat)
Pavel Begunkov1400e692020-07-12 20:41:05 +03004478 return __io_compat_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004479#endif
4480
Pavel Begunkov1400e692020-07-12 20:41:05 +03004481 return __io_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07004482}
4483
Jens Axboebcda7ba2020-02-23 16:42:51 -07004484static struct io_buffer *io_recv_buffer_select(struct io_kiocb *req,
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004485 bool needs_lock)
Jens Axboebcda7ba2020-02-23 16:42:51 -07004486{
4487 struct io_sr_msg *sr = &req->sr_msg;
4488 struct io_buffer *kbuf;
4489
Jens Axboebcda7ba2020-02-23 16:42:51 -07004490 kbuf = io_buffer_select(req, &sr->len, sr->bgid, sr->kbuf, needs_lock);
4491 if (IS_ERR(kbuf))
4492 return kbuf;
4493
4494 sr->kbuf = kbuf;
4495 req->flags |= REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07004496 return kbuf;
Jens Axboe03b12302019-12-02 18:50:25 -07004497}
4498
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004499static inline unsigned int io_put_recv_kbuf(struct io_kiocb *req)
4500{
4501 return io_put_kbuf(req, req->sr_msg.kbuf);
4502}
4503
Jens Axboe3529d8c2019-12-19 18:24:38 -07004504static int io_recvmsg_prep(struct io_kiocb *req,
4505 const struct io_uring_sqe *sqe)
Jens Axboe03b12302019-12-02 18:50:25 -07004506{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004507 struct io_async_msghdr *async_msg = req->async_data;
Jens Axboee47293f2019-12-20 08:58:21 -07004508 struct io_sr_msg *sr = &req->sr_msg;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004509 int ret;
Jens Axboe06b76d42019-12-19 14:44:26 -07004510
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004511 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4512 return -EINVAL;
4513
Jens Axboe3529d8c2019-12-19 18:24:38 -07004514 sr->msg_flags = READ_ONCE(sqe->msg_flags);
Pavel Begunkov270a5942020-07-12 20:41:04 +03004515 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboe0b7b21e2020-01-31 08:34:59 -07004516 sr->len = READ_ONCE(sqe->len);
Jens Axboebcda7ba2020-02-23 16:42:51 -07004517 sr->bgid = READ_ONCE(sqe->buf_group);
Jens Axboe3529d8c2019-12-19 18:24:38 -07004518
Jens Axboed8768362020-02-27 14:17:49 -07004519#ifdef CONFIG_COMPAT
4520 if (req->ctx->compat)
4521 sr->msg_flags |= MSG_CMSG_COMPAT;
4522#endif
4523
Jens Axboee8c2bc12020-08-15 18:44:09 -07004524 if (!async_msg || !io_op_defs[req->opcode].needs_async_data)
Jens Axboe06b76d42019-12-19 14:44:26 -07004525 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004526 ret = io_recvmsg_copy_hdr(req, async_msg);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004527 if (!ret)
4528 req->flags |= REQ_F_NEED_CLEANUP;
4529 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07004530}
4531
Jens Axboe229a7b62020-06-22 10:13:11 -06004532static int io_recvmsg(struct io_kiocb *req, bool force_nonblock,
4533 struct io_comp_state *cs)
Jens Axboe03b12302019-12-02 18:50:25 -07004534{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004535 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004536 struct socket *sock;
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004537 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004538 unsigned flags;
Jens Axboe52de1fe2020-02-27 10:15:42 -07004539 int ret, cflags = 0;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004540
Jens Axboe0fa03c62019-04-19 13:34:07 -06004541 sock = sock_from_file(req->file, &ret);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004542 if (unlikely(!sock))
4543 return ret;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004544
Jens Axboee8c2bc12020-08-15 18:44:09 -07004545 if (req->async_data) {
4546 kmsg = req->async_data;
4547 kmsg->msg.msg_name = &kmsg->addr;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004548 /* if iov is set, it's allocated already */
4549 if (!kmsg->iov)
4550 kmsg->iov = kmsg->fast_iov;
4551 kmsg->msg.msg_iter.iov = kmsg->iov;
4552 } else {
4553 ret = io_recvmsg_copy_hdr(req, &iomsg);
4554 if (ret)
Pavel Begunkov681fda82020-07-15 22:20:45 +03004555 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004556 kmsg = &iomsg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004557 }
4558
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03004559 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004560 kbuf = io_recv_buffer_select(req, !force_nonblock);
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03004561 if (IS_ERR(kbuf))
4562 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004563 kmsg->fast_iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
4564 iov_iter_init(&kmsg->msg.msg_iter, READ, kmsg->iov,
4565 1, req->sr_msg.len);
4566 }
4567
4568 flags = req->sr_msg.msg_flags;
4569 if (flags & MSG_DONTWAIT)
4570 req->flags |= REQ_F_NOWAIT;
4571 else if (force_nonblock)
4572 flags |= MSG_DONTWAIT;
4573
4574 ret = __sys_recvmsg_sock(sock, &kmsg->msg, req->sr_msg.umsg,
4575 kmsg->uaddr, flags);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03004576 if (force_nonblock && ret == -EAGAIN)
4577 return io_setup_async_msg(req, kmsg);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004578 if (ret == -ERESTARTSYS)
4579 ret = -EINTR;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03004580
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004581 if (req->flags & REQ_F_BUFFER_SELECTED)
4582 cflags = io_put_recv_kbuf(req);
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004583 if (kmsg->iov != kmsg->fast_iov)
Jens Axboe0b416c32019-12-15 10:57:46 -07004584 kfree(kmsg->iov);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03004585 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe4e88d6e2019-12-07 20:59:47 -07004586 if (ret < 0)
4587 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004588 __io_req_complete(req, ret, cflags, cs);
Jens Axboe0fa03c62019-04-19 13:34:07 -06004589 return 0;
Jens Axboe0fa03c62019-04-19 13:34:07 -06004590}
4591
Jens Axboe229a7b62020-06-22 10:13:11 -06004592static int io_recv(struct io_kiocb *req, bool force_nonblock,
4593 struct io_comp_state *cs)
Jens Axboefddafac2020-01-04 20:19:44 -07004594{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004595 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004596 struct io_sr_msg *sr = &req->sr_msg;
4597 struct msghdr msg;
4598 void __user *buf = sr->buf;
Jens Axboefddafac2020-01-04 20:19:44 -07004599 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004600 struct iovec iov;
4601 unsigned flags;
Jens Axboebcda7ba2020-02-23 16:42:51 -07004602 int ret, cflags = 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004603
Jens Axboefddafac2020-01-04 20:19:44 -07004604 sock = sock_from_file(req->file, &ret);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004605 if (unlikely(!sock))
4606 return ret;
Jens Axboefddafac2020-01-04 20:19:44 -07004607
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03004608 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004609 kbuf = io_recv_buffer_select(req, !force_nonblock);
Jens Axboebcda7ba2020-02-23 16:42:51 -07004610 if (IS_ERR(kbuf))
4611 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004612 buf = u64_to_user_ptr(kbuf->addr);
Jens Axboefddafac2020-01-04 20:19:44 -07004613 }
4614
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004615 ret = import_single_range(READ, buf, sr->len, &iov, &msg.msg_iter);
Pavel Begunkov14c32ee2020-07-16 23:28:01 +03004616 if (unlikely(ret))
4617 goto out_free;
Jens Axboefddafac2020-01-04 20:19:44 -07004618
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004619 msg.msg_name = NULL;
4620 msg.msg_control = NULL;
4621 msg.msg_controllen = 0;
4622 msg.msg_namelen = 0;
4623 msg.msg_iocb = NULL;
4624 msg.msg_flags = 0;
4625
4626 flags = req->sr_msg.msg_flags;
4627 if (flags & MSG_DONTWAIT)
4628 req->flags |= REQ_F_NOWAIT;
4629 else if (force_nonblock)
4630 flags |= MSG_DONTWAIT;
4631
4632 ret = sock_recvmsg(sock, &msg, flags);
4633 if (force_nonblock && ret == -EAGAIN)
4634 return -EAGAIN;
4635 if (ret == -ERESTARTSYS)
4636 ret = -EINTR;
Pavel Begunkov14c32ee2020-07-16 23:28:01 +03004637out_free:
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03004638 if (req->flags & REQ_F_BUFFER_SELECTED)
4639 cflags = io_put_recv_kbuf(req);
Jens Axboefddafac2020-01-04 20:19:44 -07004640 if (ret < 0)
4641 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004642 __io_req_complete(req, ret, cflags, cs);
Jens Axboefddafac2020-01-04 20:19:44 -07004643 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004644}
4645
Jens Axboe3529d8c2019-12-19 18:24:38 -07004646static int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe17f2fe32019-10-17 14:42:58 -06004647{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004648 struct io_accept *accept = &req->accept;
4649
Jens Axboe17f2fe32019-10-17 14:42:58 -06004650 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
4651 return -EINVAL;
Hrvoje Zeba8042d6c2019-11-25 14:40:22 -05004652 if (sqe->ioprio || sqe->len || sqe->buf_index)
Jens Axboe17f2fe32019-10-17 14:42:58 -06004653 return -EINVAL;
4654
Jens Axboed55e5f52019-12-11 16:12:15 -07004655 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
4656 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004657 accept->flags = READ_ONCE(sqe->accept_flags);
Jens Axboe09952e32020-03-19 20:16:56 -06004658 accept->nofile = rlimit(RLIMIT_NOFILE);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004659 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004660}
Jens Axboe17f2fe32019-10-17 14:42:58 -06004661
Jens Axboe229a7b62020-06-22 10:13:11 -06004662static int io_accept(struct io_kiocb *req, bool force_nonblock,
4663 struct io_comp_state *cs)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004664{
4665 struct io_accept *accept = &req->accept;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004666 unsigned int file_flags = force_nonblock ? O_NONBLOCK : 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004667 int ret;
4668
Jiufei Xuee697dee2020-06-10 13:41:59 +08004669 if (req->file->f_flags & O_NONBLOCK)
4670 req->flags |= REQ_F_NOWAIT;
4671
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004672 ret = __sys_accept4_file(req->file, file_flags, accept->addr,
Jens Axboe09952e32020-03-19 20:16:56 -06004673 accept->addr_len, accept->flags,
4674 accept->nofile);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004675 if (ret == -EAGAIN && force_nonblock)
Jens Axboe17f2fe32019-10-17 14:42:58 -06004676 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004677 if (ret < 0) {
4678 if (ret == -ERESTARTSYS)
4679 ret = -EINTR;
Jens Axboe4e88d6e2019-12-07 20:59:47 -07004680 req_set_fail_links(req);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004681 }
Jens Axboe229a7b62020-06-22 10:13:11 -06004682 __io_req_complete(req, ret, 0, cs);
Jens Axboe17f2fe32019-10-17 14:42:58 -06004683 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004684}
4685
Jens Axboe3529d8c2019-12-19 18:24:38 -07004686static int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef499a022019-12-02 16:28:46 -07004687{
Jens Axboe3529d8c2019-12-19 18:24:38 -07004688 struct io_connect *conn = &req->connect;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004689 struct io_async_connect *io = req->async_data;
Jens Axboef499a022019-12-02 16:28:46 -07004690
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004691 if (unlikely(req->ctx->flags & (IORING_SETUP_IOPOLL|IORING_SETUP_SQPOLL)))
4692 return -EINVAL;
4693 if (sqe->ioprio || sqe->len || sqe->buf_index || sqe->rw_flags)
4694 return -EINVAL;
4695
Jens Axboe3529d8c2019-12-19 18:24:38 -07004696 conn->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
4697 conn->addr_len = READ_ONCE(sqe->addr2);
4698
4699 if (!io)
4700 return 0;
4701
4702 return move_addr_to_kernel(conn->addr, conn->addr_len,
Jens Axboee8c2bc12020-08-15 18:44:09 -07004703 &io->address);
Jens Axboef499a022019-12-02 16:28:46 -07004704}
4705
Jens Axboe229a7b62020-06-22 10:13:11 -06004706static int io_connect(struct io_kiocb *req, bool force_nonblock,
4707 struct io_comp_state *cs)
Jens Axboef8e85cf2019-11-23 14:24:24 -07004708{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004709 struct io_async_connect __io, *io;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004710 unsigned file_flags;
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004711 int ret;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004712
Jens Axboee8c2bc12020-08-15 18:44:09 -07004713 if (req->async_data) {
4714 io = req->async_data;
Jens Axboef499a022019-12-02 16:28:46 -07004715 } else {
Jens Axboe3529d8c2019-12-19 18:24:38 -07004716 ret = move_addr_to_kernel(req->connect.addr,
4717 req->connect.addr_len,
Jens Axboee8c2bc12020-08-15 18:44:09 -07004718 &__io.address);
Jens Axboef499a022019-12-02 16:28:46 -07004719 if (ret)
4720 goto out;
4721 io = &__io;
4722 }
4723
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004724 file_flags = force_nonblock ? O_NONBLOCK : 0;
4725
Jens Axboee8c2bc12020-08-15 18:44:09 -07004726 ret = __sys_connect_file(req->file, &io->address,
Jens Axboe3fbb51c2019-12-20 08:51:52 -07004727 req->connect.addr_len, file_flags);
Jens Axboe87f80d62019-12-03 11:23:54 -07004728 if ((ret == -EAGAIN || ret == -EINPROGRESS) && force_nonblock) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07004729 if (req->async_data)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07004730 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004731 if (io_alloc_async_data(req)) {
Jens Axboef499a022019-12-02 16:28:46 -07004732 ret = -ENOMEM;
4733 goto out;
4734 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07004735 io = req->async_data;
4736 memcpy(req->async_data, &__io, sizeof(__io));
Jens Axboef8e85cf2019-11-23 14:24:24 -07004737 return -EAGAIN;
Jens Axboef499a022019-12-02 16:28:46 -07004738 }
Jens Axboef8e85cf2019-11-23 14:24:24 -07004739 if (ret == -ERESTARTSYS)
4740 ret = -EINTR;
Jens Axboef499a022019-12-02 16:28:46 -07004741out:
Jens Axboe4e88d6e2019-12-07 20:59:47 -07004742 if (ret < 0)
4743 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06004744 __io_req_complete(req, ret, 0, cs);
Jens Axboef8e85cf2019-11-23 14:24:24 -07004745 return 0;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004746}
YueHaibing469956e2020-03-04 15:53:52 +08004747#else /* !CONFIG_NET */
4748static int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4749{
Jens Axboef8e85cf2019-11-23 14:24:24 -07004750 return -EOPNOTSUPP;
Jens Axboef8e85cf2019-11-23 14:24:24 -07004751}
4752
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004753static int io_sendmsg(struct io_kiocb *req, bool force_nonblock,
4754 struct io_comp_state *cs)
Jens Axboe221c5eb2019-01-17 09:41:58 -07004755{
YueHaibing469956e2020-03-04 15:53:52 +08004756 return -EOPNOTSUPP;
4757}
4758
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004759static int io_send(struct io_kiocb *req, bool force_nonblock,
4760 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004761{
4762 return -EOPNOTSUPP;
4763}
4764
4765static int io_recvmsg_prep(struct io_kiocb *req,
4766 const struct io_uring_sqe *sqe)
4767{
4768 return -EOPNOTSUPP;
4769}
4770
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004771static int io_recvmsg(struct io_kiocb *req, bool force_nonblock,
4772 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004773{
4774 return -EOPNOTSUPP;
4775}
4776
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004777static int io_recv(struct io_kiocb *req, bool force_nonblock,
4778 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004779{
4780 return -EOPNOTSUPP;
4781}
4782
4783static int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4784{
4785 return -EOPNOTSUPP;
4786}
4787
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004788static int io_accept(struct io_kiocb *req, bool force_nonblock,
4789 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004790{
4791 return -EOPNOTSUPP;
4792}
4793
4794static int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4795{
4796 return -EOPNOTSUPP;
4797}
4798
Randy Dunlap1e16c2f2020-06-26 16:32:50 -07004799static int io_connect(struct io_kiocb *req, bool force_nonblock,
4800 struct io_comp_state *cs)
YueHaibing469956e2020-03-04 15:53:52 +08004801{
4802 return -EOPNOTSUPP;
4803}
4804#endif /* CONFIG_NET */
Jens Axboe2b188cc2019-01-07 10:46:33 -07004805
Jens Axboed7718a92020-02-14 22:23:12 -07004806struct io_poll_table {
4807 struct poll_table_struct pt;
4808 struct io_kiocb *req;
4809 int error;
4810};
4811
Jens Axboed7718a92020-02-14 22:23:12 -07004812static int __io_async_wake(struct io_kiocb *req, struct io_poll_iocb *poll,
4813 __poll_t mask, task_work_func_t func)
4814{
Jens Axboefd7d6de2020-08-23 11:00:37 -06004815 bool twa_signal_ok;
Jens Axboeaa96bf82020-04-03 11:26:26 -06004816 int ret;
Jens Axboed7718a92020-02-14 22:23:12 -07004817
4818 /* for instances that support it check for an event match first: */
4819 if (mask && !(mask & poll->events))
4820 return 0;
4821
4822 trace_io_uring_task_add(req->ctx, req->opcode, req->user_data, mask);
4823
4824 list_del_init(&poll->wait.entry);
4825
Jens Axboed7718a92020-02-14 22:23:12 -07004826 req->result = mask;
4827 init_task_work(&req->task_work, func);
Jens Axboe6d816e02020-08-11 08:04:14 -06004828 percpu_ref_get(&req->ctx->refs);
4829
Jens Axboed7718a92020-02-14 22:23:12 -07004830 /*
Jens Axboefd7d6de2020-08-23 11:00:37 -06004831 * If we using the signalfd wait_queue_head for this wakeup, then
4832 * it's not safe to use TWA_SIGNAL as we could be recursing on the
4833 * tsk->sighand->siglock on doing the wakeup. Should not be needed
4834 * either, as the normal wakeup will suffice.
4835 */
4836 twa_signal_ok = (poll->head != &req->task->sighand->signalfd_wqh);
4837
4838 /*
Jens Axboee3aabf92020-05-18 11:04:17 -06004839 * If this fails, then the task is exiting. When a task exits, the
4840 * work gets canceled, so just cancel this request as well instead
4841 * of executing it. We can't safely execute it anyway, as we may not
4842 * have the needed state needed for it anyway.
Jens Axboed7718a92020-02-14 22:23:12 -07004843 */
Jens Axboe87c43112020-09-30 21:00:14 -06004844 ret = io_req_task_work_add(req, twa_signal_ok);
Jens Axboeaa96bf82020-04-03 11:26:26 -06004845 if (unlikely(ret)) {
Jens Axboec2c4c832020-07-01 15:37:11 -06004846 struct task_struct *tsk;
4847
Jens Axboee3aabf92020-05-18 11:04:17 -06004848 WRITE_ONCE(poll->canceled, true);
Jens Axboeaa96bf82020-04-03 11:26:26 -06004849 tsk = io_wq_get_task(req->ctx->io_wq);
Jens Axboe91989c72020-10-16 09:02:26 -06004850 task_work_add(tsk, &req->task_work, TWA_NONE);
Jens Axboece593a62020-06-30 12:39:05 -06004851 wake_up_process(tsk);
Jens Axboeaa96bf82020-04-03 11:26:26 -06004852 }
Jens Axboed7718a92020-02-14 22:23:12 -07004853 return 1;
4854}
4855
Jens Axboe74ce6ce2020-04-13 11:09:12 -06004856static bool io_poll_rewait(struct io_kiocb *req, struct io_poll_iocb *poll)
4857 __acquires(&req->ctx->completion_lock)
4858{
4859 struct io_ring_ctx *ctx = req->ctx;
4860
4861 if (!req->result && !READ_ONCE(poll->canceled)) {
4862 struct poll_table_struct pt = { ._key = poll->events };
4863
4864 req->result = vfs_poll(req->file, &pt) & poll->events;
4865 }
4866
4867 spin_lock_irq(&ctx->completion_lock);
4868 if (!req->result && !READ_ONCE(poll->canceled)) {
4869 add_wait_queue(poll->head, &poll->wait);
4870 return true;
4871 }
4872
4873 return false;
4874}
4875
Jens Axboed4e7cd32020-08-15 11:44:50 -07004876static struct io_poll_iocb *io_poll_get_double(struct io_kiocb *req)
Jens Axboe18bceab2020-05-15 11:56:54 -06004877{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004878 /* pure poll stashes this in ->async_data, poll driven retry elsewhere */
Jens Axboed4e7cd32020-08-15 11:44:50 -07004879 if (req->opcode == IORING_OP_POLL_ADD)
Jens Axboee8c2bc12020-08-15 18:44:09 -07004880 return req->async_data;
Jens Axboed4e7cd32020-08-15 11:44:50 -07004881 return req->apoll->double_poll;
4882}
4883
4884static struct io_poll_iocb *io_poll_get_single(struct io_kiocb *req)
4885{
4886 if (req->opcode == IORING_OP_POLL_ADD)
4887 return &req->poll;
4888 return &req->apoll->poll;
4889}
4890
4891static void io_poll_remove_double(struct io_kiocb *req)
4892{
4893 struct io_poll_iocb *poll = io_poll_get_double(req);
Jens Axboe18bceab2020-05-15 11:56:54 -06004894
4895 lockdep_assert_held(&req->ctx->completion_lock);
4896
4897 if (poll && poll->head) {
4898 struct wait_queue_head *head = poll->head;
4899
4900 spin_lock(&head->lock);
4901 list_del_init(&poll->wait.entry);
4902 if (poll->wait.private)
4903 refcount_dec(&req->refs);
4904 poll->head = NULL;
4905 spin_unlock(&head->lock);
4906 }
4907}
4908
4909static void io_poll_complete(struct io_kiocb *req, __poll_t mask, int error)
4910{
4911 struct io_ring_ctx *ctx = req->ctx;
4912
Jens Axboed4e7cd32020-08-15 11:44:50 -07004913 io_poll_remove_double(req);
Jens Axboe18bceab2020-05-15 11:56:54 -06004914 req->poll.done = true;
4915 io_cqring_fill_event(req, error ? error : mangle_poll(mask));
4916 io_commit_cqring(ctx);
4917}
4918
Jens Axboe18bceab2020-05-15 11:56:54 -06004919static void io_poll_task_func(struct callback_head *cb)
4920{
4921 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
Jens Axboe6d816e02020-08-11 08:04:14 -06004922 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovdd221f462020-10-18 10:17:42 +01004923 struct io_kiocb *nxt;
Jens Axboe18bceab2020-05-15 11:56:54 -06004924
Pavel Begunkovdd221f462020-10-18 10:17:42 +01004925 if (io_poll_rewait(req, &req->poll)) {
4926 spin_unlock_irq(&ctx->completion_lock);
4927 } else {
4928 hash_del(&req->hash_node);
4929 io_poll_complete(req, req->result, 0);
4930 spin_unlock_irq(&ctx->completion_lock);
4931
4932 nxt = io_put_req_find_next(req);
4933 io_cqring_ev_posted(ctx);
4934 if (nxt)
4935 __io_req_task_submit(nxt);
4936 }
4937
Jens Axboe6d816e02020-08-11 08:04:14 -06004938 percpu_ref_put(&ctx->refs);
Jens Axboe18bceab2020-05-15 11:56:54 -06004939}
4940
4941static int io_poll_double_wake(struct wait_queue_entry *wait, unsigned mode,
4942 int sync, void *key)
4943{
4944 struct io_kiocb *req = wait->private;
Jens Axboed4e7cd32020-08-15 11:44:50 -07004945 struct io_poll_iocb *poll = io_poll_get_single(req);
Jens Axboe18bceab2020-05-15 11:56:54 -06004946 __poll_t mask = key_to_poll(key);
4947
4948 /* for instances that support it check for an event match first: */
4949 if (mask && !(mask & poll->events))
4950 return 0;
4951
Jens Axboe8706e042020-09-28 08:38:54 -06004952 list_del_init(&wait->entry);
4953
Jens Axboe807abcb2020-07-17 17:09:27 -06004954 if (poll && poll->head) {
Jens Axboe18bceab2020-05-15 11:56:54 -06004955 bool done;
4956
Jens Axboe807abcb2020-07-17 17:09:27 -06004957 spin_lock(&poll->head->lock);
4958 done = list_empty(&poll->wait.entry);
Jens Axboe18bceab2020-05-15 11:56:54 -06004959 if (!done)
Jens Axboe807abcb2020-07-17 17:09:27 -06004960 list_del_init(&poll->wait.entry);
Jens Axboed4e7cd32020-08-15 11:44:50 -07004961 /* make sure double remove sees this as being gone */
4962 wait->private = NULL;
Jens Axboe807abcb2020-07-17 17:09:27 -06004963 spin_unlock(&poll->head->lock);
Jens Axboec8b5e262020-10-25 13:53:26 -06004964 if (!done) {
4965 /* use wait func handler, so it matches the rq type */
4966 poll->wait.func(&poll->wait, mode, sync, key);
4967 }
Jens Axboe18bceab2020-05-15 11:56:54 -06004968 }
4969 refcount_dec(&req->refs);
4970 return 1;
4971}
4972
4973static void io_init_poll_iocb(struct io_poll_iocb *poll, __poll_t events,
4974 wait_queue_func_t wake_func)
4975{
4976 poll->head = NULL;
4977 poll->done = false;
4978 poll->canceled = false;
4979 poll->events = events;
4980 INIT_LIST_HEAD(&poll->wait.entry);
4981 init_waitqueue_func_entry(&poll->wait, wake_func);
4982}
4983
4984static void __io_queue_proc(struct io_poll_iocb *poll, struct io_poll_table *pt,
Jens Axboe807abcb2020-07-17 17:09:27 -06004985 struct wait_queue_head *head,
4986 struct io_poll_iocb **poll_ptr)
Jens Axboe18bceab2020-05-15 11:56:54 -06004987{
4988 struct io_kiocb *req = pt->req;
4989
4990 /*
4991 * If poll->head is already set, it's because the file being polled
4992 * uses multiple waitqueues for poll handling (eg one for read, one
4993 * for write). Setup a separate io_poll_iocb if this happens.
4994 */
4995 if (unlikely(poll->head)) {
Pavel Begunkov58852d42020-10-16 20:55:56 +01004996 struct io_poll_iocb *poll_one = poll;
4997
Jens Axboe18bceab2020-05-15 11:56:54 -06004998 /* already have a 2nd entry, fail a third attempt */
Jens Axboe807abcb2020-07-17 17:09:27 -06004999 if (*poll_ptr) {
Jens Axboe18bceab2020-05-15 11:56:54 -06005000 pt->error = -EINVAL;
5001 return;
5002 }
5003 poll = kmalloc(sizeof(*poll), GFP_ATOMIC);
5004 if (!poll) {
5005 pt->error = -ENOMEM;
5006 return;
5007 }
Pavel Begunkov58852d42020-10-16 20:55:56 +01005008 io_init_poll_iocb(poll, poll_one->events, io_poll_double_wake);
Jens Axboe18bceab2020-05-15 11:56:54 -06005009 refcount_inc(&req->refs);
5010 poll->wait.private = req;
Jens Axboe807abcb2020-07-17 17:09:27 -06005011 *poll_ptr = poll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005012 }
5013
5014 pt->error = 0;
5015 poll->head = head;
Jiufei Xuea31eb4a2020-06-17 17:53:56 +08005016
5017 if (poll->events & EPOLLEXCLUSIVE)
5018 add_wait_queue_exclusive(head, &poll->wait);
5019 else
5020 add_wait_queue(head, &poll->wait);
Jens Axboe18bceab2020-05-15 11:56:54 -06005021}
5022
5023static void io_async_queue_proc(struct file *file, struct wait_queue_head *head,
5024 struct poll_table_struct *p)
5025{
5026 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
Jens Axboe807abcb2020-07-17 17:09:27 -06005027 struct async_poll *apoll = pt->req->apoll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005028
Jens Axboe807abcb2020-07-17 17:09:27 -06005029 __io_queue_proc(&apoll->poll, pt, head, &apoll->double_poll);
Jens Axboe18bceab2020-05-15 11:56:54 -06005030}
5031
Jens Axboed7718a92020-02-14 22:23:12 -07005032static void io_async_task_func(struct callback_head *cb)
5033{
5034 struct io_kiocb *req = container_of(cb, struct io_kiocb, task_work);
5035 struct async_poll *apoll = req->apoll;
5036 struct io_ring_ctx *ctx = req->ctx;
5037
5038 trace_io_uring_task_run(req->ctx, req->opcode, req->user_data);
5039
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005040 if (io_poll_rewait(req, &apoll->poll)) {
Jens Axboed7718a92020-02-14 22:23:12 -07005041 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe6d816e02020-08-11 08:04:14 -06005042 percpu_ref_put(&ctx->refs);
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005043 return;
Jens Axboed7718a92020-02-14 22:23:12 -07005044 }
5045
Jens Axboe31067252020-05-17 17:43:31 -06005046 /* If req is still hashed, it cannot have been canceled. Don't check. */
Pavel Begunkov0be0b0e2020-06-30 15:20:42 +03005047 if (hash_hashed(&req->hash_node))
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005048 hash_del(&req->hash_node);
Jens Axboe2bae0472020-04-13 11:16:34 -06005049
Jens Axboed4e7cd32020-08-15 11:44:50 -07005050 io_poll_remove_double(req);
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005051 spin_unlock_irq(&ctx->completion_lock);
5052
Pavel Begunkov0be0b0e2020-06-30 15:20:42 +03005053 if (!READ_ONCE(apoll->poll.canceled))
5054 __io_req_task_submit(req);
5055 else
5056 __io_req_task_cancel(req, -ECANCELED);
Dan Carpenteraa340842020-07-08 21:47:11 +03005057
Jens Axboe6d816e02020-08-11 08:04:14 -06005058 percpu_ref_put(&ctx->refs);
Jens Axboe807abcb2020-07-17 17:09:27 -06005059 kfree(apoll->double_poll);
Jens Axboe31067252020-05-17 17:43:31 -06005060 kfree(apoll);
Jens Axboed7718a92020-02-14 22:23:12 -07005061}
5062
5063static int io_async_wake(struct wait_queue_entry *wait, unsigned mode, int sync,
5064 void *key)
5065{
5066 struct io_kiocb *req = wait->private;
5067 struct io_poll_iocb *poll = &req->apoll->poll;
5068
5069 trace_io_uring_poll_wake(req->ctx, req->opcode, req->user_data,
5070 key_to_poll(key));
5071
5072 return __io_async_wake(req, poll, key_to_poll(key), io_async_task_func);
5073}
5074
5075static void io_poll_req_insert(struct io_kiocb *req)
5076{
5077 struct io_ring_ctx *ctx = req->ctx;
5078 struct hlist_head *list;
5079
5080 list = &ctx->cancel_hash[hash_long(req->user_data, ctx->cancel_hash_bits)];
5081 hlist_add_head(&req->hash_node, list);
5082}
5083
5084static __poll_t __io_arm_poll_handler(struct io_kiocb *req,
5085 struct io_poll_iocb *poll,
5086 struct io_poll_table *ipt, __poll_t mask,
5087 wait_queue_func_t wake_func)
5088 __acquires(&ctx->completion_lock)
5089{
5090 struct io_ring_ctx *ctx = req->ctx;
5091 bool cancel = false;
5092
Pavel Begunkov4d52f332020-10-18 10:17:43 +01005093 INIT_HLIST_NODE(&req->hash_node);
Jens Axboe18bceab2020-05-15 11:56:54 -06005094 io_init_poll_iocb(poll, mask, wake_func);
Pavel Begunkovb90cd192020-06-21 13:09:52 +03005095 poll->file = req->file;
Jens Axboe18bceab2020-05-15 11:56:54 -06005096 poll->wait.private = req;
Jens Axboed7718a92020-02-14 22:23:12 -07005097
5098 ipt->pt._key = mask;
5099 ipt->req = req;
5100 ipt->error = -EINVAL;
5101
Jens Axboed7718a92020-02-14 22:23:12 -07005102 mask = vfs_poll(req->file, &ipt->pt) & poll->events;
5103
5104 spin_lock_irq(&ctx->completion_lock);
5105 if (likely(poll->head)) {
5106 spin_lock(&poll->head->lock);
5107 if (unlikely(list_empty(&poll->wait.entry))) {
5108 if (ipt->error)
5109 cancel = true;
5110 ipt->error = 0;
5111 mask = 0;
5112 }
5113 if (mask || ipt->error)
5114 list_del_init(&poll->wait.entry);
5115 else if (cancel)
5116 WRITE_ONCE(poll->canceled, true);
5117 else if (!poll->done) /* actually waiting for an event */
5118 io_poll_req_insert(req);
5119 spin_unlock(&poll->head->lock);
5120 }
5121
5122 return mask;
5123}
5124
5125static bool io_arm_poll_handler(struct io_kiocb *req)
5126{
5127 const struct io_op_def *def = &io_op_defs[req->opcode];
5128 struct io_ring_ctx *ctx = req->ctx;
5129 struct async_poll *apoll;
5130 struct io_poll_table ipt;
5131 __poll_t mask, ret;
Jens Axboe9dab14b2020-08-25 12:27:50 -06005132 int rw;
Jens Axboed7718a92020-02-14 22:23:12 -07005133
5134 if (!req->file || !file_can_poll(req->file))
5135 return false;
Pavel Begunkov24c74672020-06-21 13:09:51 +03005136 if (req->flags & REQ_F_POLLED)
Jens Axboed7718a92020-02-14 22:23:12 -07005137 return false;
Jens Axboe9dab14b2020-08-25 12:27:50 -06005138 if (def->pollin)
5139 rw = READ;
5140 else if (def->pollout)
5141 rw = WRITE;
5142 else
5143 return false;
5144 /* if we can't nonblock try, then no point in arming a poll handler */
5145 if (!io_file_supports_async(req->file, rw))
Jens Axboed7718a92020-02-14 22:23:12 -07005146 return false;
5147
5148 apoll = kmalloc(sizeof(*apoll), GFP_ATOMIC);
5149 if (unlikely(!apoll))
5150 return false;
Jens Axboe807abcb2020-07-17 17:09:27 -06005151 apoll->double_poll = NULL;
Jens Axboed7718a92020-02-14 22:23:12 -07005152
5153 req->flags |= REQ_F_POLLED;
Jens Axboed7718a92020-02-14 22:23:12 -07005154 req->apoll = apoll;
Jens Axboed7718a92020-02-14 22:23:12 -07005155
Nathan Chancellor8755d972020-03-02 16:01:19 -07005156 mask = 0;
Jens Axboed7718a92020-02-14 22:23:12 -07005157 if (def->pollin)
Nathan Chancellor8755d972020-03-02 16:01:19 -07005158 mask |= POLLIN | POLLRDNORM;
Jens Axboed7718a92020-02-14 22:23:12 -07005159 if (def->pollout)
5160 mask |= POLLOUT | POLLWRNORM;
Luke Hsiao901341b2020-08-21 21:41:05 -07005161
5162 /* If reading from MSG_ERRQUEUE using recvmsg, ignore POLLIN */
5163 if ((req->opcode == IORING_OP_RECVMSG) &&
5164 (req->sr_msg.msg_flags & MSG_ERRQUEUE))
5165 mask &= ~POLLIN;
5166
Jens Axboed7718a92020-02-14 22:23:12 -07005167 mask |= POLLERR | POLLPRI;
5168
5169 ipt.pt._qproc = io_async_queue_proc;
5170
5171 ret = __io_arm_poll_handler(req, &apoll->poll, &ipt, mask,
5172 io_async_wake);
Jens Axboea36da652020-08-11 09:50:19 -06005173 if (ret || ipt.error) {
Jens Axboed4e7cd32020-08-15 11:44:50 -07005174 io_poll_remove_double(req);
Jens Axboed7718a92020-02-14 22:23:12 -07005175 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe807abcb2020-07-17 17:09:27 -06005176 kfree(apoll->double_poll);
Jens Axboed7718a92020-02-14 22:23:12 -07005177 kfree(apoll);
5178 return false;
5179 }
5180 spin_unlock_irq(&ctx->completion_lock);
5181 trace_io_uring_poll_arm(ctx, req->opcode, req->user_data, mask,
5182 apoll->poll.events);
5183 return true;
5184}
5185
5186static bool __io_poll_remove_one(struct io_kiocb *req,
5187 struct io_poll_iocb *poll)
5188{
Jens Axboeb41e9852020-02-17 09:52:41 -07005189 bool do_complete = false;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005190
5191 spin_lock(&poll->head->lock);
5192 WRITE_ONCE(poll->canceled, true);
Jens Axboe392edb42019-12-09 17:52:20 -07005193 if (!list_empty(&poll->wait.entry)) {
5194 list_del_init(&poll->wait.entry);
Jens Axboeb41e9852020-02-17 09:52:41 -07005195 do_complete = true;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005196 }
5197 spin_unlock(&poll->head->lock);
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005198 hash_del(&req->hash_node);
Jens Axboed7718a92020-02-14 22:23:12 -07005199 return do_complete;
5200}
5201
5202static bool io_poll_remove_one(struct io_kiocb *req)
5203{
5204 bool do_complete;
5205
Jens Axboed4e7cd32020-08-15 11:44:50 -07005206 io_poll_remove_double(req);
5207
Jens Axboed7718a92020-02-14 22:23:12 -07005208 if (req->opcode == IORING_OP_POLL_ADD) {
5209 do_complete = __io_poll_remove_one(req, &req->poll);
5210 } else {
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005211 struct async_poll *apoll = req->apoll;
5212
Jens Axboed7718a92020-02-14 22:23:12 -07005213 /* non-poll requests have submit ref still */
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005214 do_complete = __io_poll_remove_one(req, &apoll->poll);
5215 if (do_complete) {
Jens Axboed7718a92020-02-14 22:23:12 -07005216 io_put_req(req);
Jens Axboe807abcb2020-07-17 17:09:27 -06005217 kfree(apoll->double_poll);
Jens Axboe3bfa5bc2020-05-17 13:54:12 -06005218 kfree(apoll);
5219 }
Xiaoguang Wangb1f573b2020-04-12 14:50:54 +08005220 }
5221
Jens Axboeb41e9852020-02-17 09:52:41 -07005222 if (do_complete) {
5223 io_cqring_fill_event(req, -ECANCELED);
5224 io_commit_cqring(req->ctx);
Jens Axboef254ac02020-08-12 17:33:30 -06005225 req_set_fail_links(req);
Pavel Begunkov216578e2020-10-13 09:44:00 +01005226 io_put_req_deferred(req, 1);
Jens Axboeb41e9852020-02-17 09:52:41 -07005227 }
5228
5229 return do_complete;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005230}
5231
Jens Axboe76e1b642020-09-26 15:05:03 -06005232/*
5233 * Returns true if we found and killed one or more poll requests
5234 */
5235static bool io_poll_remove_all(struct io_ring_ctx *ctx, struct task_struct *tsk)
Jens Axboe221c5eb2019-01-17 09:41:58 -07005236{
Jens Axboe78076bb2019-12-04 19:56:40 -07005237 struct hlist_node *tmp;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005238 struct io_kiocb *req;
Jens Axboe8e2e1fa2020-04-13 17:05:14 -06005239 int posted = 0, i;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005240
5241 spin_lock_irq(&ctx->completion_lock);
Jens Axboe78076bb2019-12-04 19:56:40 -07005242 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
5243 struct hlist_head *list;
5244
5245 list = &ctx->cancel_hash[i];
Jens Axboef3606e32020-09-22 08:18:24 -06005246 hlist_for_each_entry_safe(req, tmp, list, hash_node) {
5247 if (io_task_match(req, tsk))
5248 posted += io_poll_remove_one(req);
5249 }
Jens Axboe221c5eb2019-01-17 09:41:58 -07005250 }
5251 spin_unlock_irq(&ctx->completion_lock);
Jens Axboeb41e9852020-02-17 09:52:41 -07005252
Jens Axboe8e2e1fa2020-04-13 17:05:14 -06005253 if (posted)
5254 io_cqring_ev_posted(ctx);
Jens Axboe76e1b642020-09-26 15:05:03 -06005255
5256 return posted != 0;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005257}
5258
Jens Axboe47f46762019-11-09 17:43:02 -07005259static int io_poll_cancel(struct io_ring_ctx *ctx, __u64 sqe_addr)
5260{
Jens Axboe78076bb2019-12-04 19:56:40 -07005261 struct hlist_head *list;
Jens Axboe47f46762019-11-09 17:43:02 -07005262 struct io_kiocb *req;
5263
Jens Axboe78076bb2019-12-04 19:56:40 -07005264 list = &ctx->cancel_hash[hash_long(sqe_addr, ctx->cancel_hash_bits)];
5265 hlist_for_each_entry(req, list, hash_node) {
Jens Axboeb41e9852020-02-17 09:52:41 -07005266 if (sqe_addr != req->user_data)
5267 continue;
5268 if (io_poll_remove_one(req))
Jens Axboeeac406c2019-11-14 12:09:58 -07005269 return 0;
Jens Axboeb41e9852020-02-17 09:52:41 -07005270 return -EALREADY;
Jens Axboe47f46762019-11-09 17:43:02 -07005271 }
5272
5273 return -ENOENT;
5274}
5275
Jens Axboe3529d8c2019-12-19 18:24:38 -07005276static int io_poll_remove_prep(struct io_kiocb *req,
5277 const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07005278{
Jens Axboe221c5eb2019-01-17 09:41:58 -07005279 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5280 return -EINVAL;
5281 if (sqe->ioprio || sqe->off || sqe->len || sqe->buf_index ||
5282 sqe->poll_events)
5283 return -EINVAL;
5284
Jens Axboe0969e782019-12-17 18:40:57 -07005285 req->poll.addr = READ_ONCE(sqe->addr);
Jens Axboe0969e782019-12-17 18:40:57 -07005286 return 0;
5287}
5288
5289/*
5290 * Find a running poll command that matches one specified in sqe->addr,
5291 * and remove it if found.
5292 */
5293static int io_poll_remove(struct io_kiocb *req)
5294{
5295 struct io_ring_ctx *ctx = req->ctx;
5296 u64 addr;
5297 int ret;
5298
Jens Axboe0969e782019-12-17 18:40:57 -07005299 addr = req->poll.addr;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005300 spin_lock_irq(&ctx->completion_lock);
Jens Axboe0969e782019-12-17 18:40:57 -07005301 ret = io_poll_cancel(ctx, addr);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005302 spin_unlock_irq(&ctx->completion_lock);
5303
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005304 if (ret < 0)
5305 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06005306 io_req_complete(req, ret);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005307 return 0;
5308}
5309
Jens Axboe221c5eb2019-01-17 09:41:58 -07005310static int io_poll_wake(struct wait_queue_entry *wait, unsigned mode, int sync,
5311 void *key)
5312{
Jens Axboec2f2eb72020-02-10 09:07:05 -07005313 struct io_kiocb *req = wait->private;
5314 struct io_poll_iocb *poll = &req->poll;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005315
Jens Axboed7718a92020-02-14 22:23:12 -07005316 return __io_async_wake(req, poll, key_to_poll(key), io_poll_task_func);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005317}
5318
Jens Axboe221c5eb2019-01-17 09:41:58 -07005319static void io_poll_queue_proc(struct file *file, struct wait_queue_head *head,
5320 struct poll_table_struct *p)
5321{
5322 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
5323
Jens Axboee8c2bc12020-08-15 18:44:09 -07005324 __io_queue_proc(&pt->req->poll, pt, head, (struct io_poll_iocb **) &pt->req->async_data);
Jens Axboeeac406c2019-11-14 12:09:58 -07005325}
5326
Jens Axboe3529d8c2019-12-19 18:24:38 -07005327static int io_poll_add_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07005328{
5329 struct io_poll_iocb *poll = &req->poll;
Jiufei Xue5769a352020-06-17 17:53:55 +08005330 u32 events;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005331
5332 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5333 return -EINVAL;
5334 if (sqe->addr || sqe->ioprio || sqe->off || sqe->len || sqe->buf_index)
5335 return -EINVAL;
5336
Jiufei Xue5769a352020-06-17 17:53:55 +08005337 events = READ_ONCE(sqe->poll32_events);
5338#ifdef __BIG_ENDIAN
5339 events = swahw32(events);
5340#endif
Jiufei Xuea31eb4a2020-06-17 17:53:56 +08005341 poll->events = demangle_poll(events) | EPOLLERR | EPOLLHUP |
5342 (events & EPOLLEXCLUSIVE);
Jens Axboe0969e782019-12-17 18:40:57 -07005343 return 0;
5344}
5345
Pavel Begunkov014db002020-03-03 21:33:12 +03005346static int io_poll_add(struct io_kiocb *req)
Jens Axboe0969e782019-12-17 18:40:57 -07005347{
5348 struct io_poll_iocb *poll = &req->poll;
5349 struct io_ring_ctx *ctx = req->ctx;
5350 struct io_poll_table ipt;
Jens Axboe0969e782019-12-17 18:40:57 -07005351 __poll_t mask;
Jens Axboe0969e782019-12-17 18:40:57 -07005352
Jens Axboed7718a92020-02-14 22:23:12 -07005353 ipt.pt._qproc = io_poll_queue_proc;
Jens Axboe36703242019-07-25 10:20:18 -06005354
Jens Axboed7718a92020-02-14 22:23:12 -07005355 mask = __io_arm_poll_handler(req, &req->poll, &ipt, poll->events,
5356 io_poll_wake);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005357
Jens Axboe8c838782019-03-12 15:48:16 -06005358 if (mask) { /* no async, we'd stolen it */
Jens Axboe8c838782019-03-12 15:48:16 -06005359 ipt.error = 0;
Jens Axboeb0dd8a42019-11-18 12:14:54 -07005360 io_poll_complete(req, mask, 0);
Jens Axboe8c838782019-03-12 15:48:16 -06005361 }
Jens Axboe221c5eb2019-01-17 09:41:58 -07005362 spin_unlock_irq(&ctx->completion_lock);
5363
Jens Axboe8c838782019-03-12 15:48:16 -06005364 if (mask) {
5365 io_cqring_ev_posted(ctx);
Pavel Begunkov014db002020-03-03 21:33:12 +03005366 io_put_req(req);
Jens Axboe221c5eb2019-01-17 09:41:58 -07005367 }
Jens Axboe8c838782019-03-12 15:48:16 -06005368 return ipt.error;
Jens Axboe221c5eb2019-01-17 09:41:58 -07005369}
5370
Jens Axboe5262f562019-09-17 12:26:57 -06005371static enum hrtimer_restart io_timeout_fn(struct hrtimer *timer)
5372{
Jens Axboead8a48a2019-11-15 08:49:11 -07005373 struct io_timeout_data *data = container_of(timer,
5374 struct io_timeout_data, timer);
5375 struct io_kiocb *req = data->req;
5376 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5262f562019-09-17 12:26:57 -06005377 unsigned long flags;
5378
Jens Axboe5262f562019-09-17 12:26:57 -06005379 spin_lock_irqsave(&ctx->completion_lock, flags);
Pavel Begunkova71976f2020-10-10 18:34:11 +01005380 list_del_init(&req->timeout.list);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03005381 atomic_set(&req->ctx->cq_timeouts,
5382 atomic_read(&req->ctx->cq_timeouts) + 1);
5383
Jens Axboe78e19bb2019-11-06 15:21:34 -07005384 io_cqring_fill_event(req, -ETIME);
Jens Axboe5262f562019-09-17 12:26:57 -06005385 io_commit_cqring(ctx);
5386 spin_unlock_irqrestore(&ctx->completion_lock, flags);
5387
5388 io_cqring_ev_posted(ctx);
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005389 req_set_fail_links(req);
Jens Axboe5262f562019-09-17 12:26:57 -06005390 io_put_req(req);
5391 return HRTIMER_NORESTART;
5392}
5393
Jens Axboef254ac02020-08-12 17:33:30 -06005394static int __io_timeout_cancel(struct io_kiocb *req)
Jens Axboe47f46762019-11-09 17:43:02 -07005395{
Jens Axboee8c2bc12020-08-15 18:44:09 -07005396 struct io_timeout_data *io = req->async_data;
Jens Axboef254ac02020-08-12 17:33:30 -06005397 int ret;
Jens Axboe47f46762019-11-09 17:43:02 -07005398
Jens Axboee8c2bc12020-08-15 18:44:09 -07005399 ret = hrtimer_try_to_cancel(&io->timer);
Jens Axboe47f46762019-11-09 17:43:02 -07005400 if (ret == -1)
5401 return -EALREADY;
Pavel Begunkova71976f2020-10-10 18:34:11 +01005402 list_del_init(&req->timeout.list);
Jens Axboe47f46762019-11-09 17:43:02 -07005403
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005404 req_set_fail_links(req);
Jens Axboe47f46762019-11-09 17:43:02 -07005405 io_cqring_fill_event(req, -ECANCELED);
Pavel Begunkov216578e2020-10-13 09:44:00 +01005406 io_put_req_deferred(req, 1);
Jens Axboe47f46762019-11-09 17:43:02 -07005407 return 0;
5408}
5409
Jens Axboef254ac02020-08-12 17:33:30 -06005410static int io_timeout_cancel(struct io_ring_ctx *ctx, __u64 user_data)
5411{
5412 struct io_kiocb *req;
5413 int ret = -ENOENT;
5414
5415 list_for_each_entry(req, &ctx->timeout_list, timeout.list) {
5416 if (user_data == req->user_data) {
5417 ret = 0;
5418 break;
5419 }
5420 }
5421
5422 if (ret == -ENOENT)
5423 return ret;
5424
5425 return __io_timeout_cancel(req);
5426}
5427
Jens Axboe3529d8c2019-12-19 18:24:38 -07005428static int io_timeout_remove_prep(struct io_kiocb *req,
5429 const struct io_uring_sqe *sqe)
Jens Axboeb29472e2019-12-17 18:50:29 -07005430{
Jens Axboeb29472e2019-12-17 18:50:29 -07005431 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5432 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06005433 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
5434 return -EINVAL;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +01005435 if (sqe->ioprio || sqe->buf_index || sqe->len || sqe->timeout_flags)
Jens Axboeb29472e2019-12-17 18:50:29 -07005436 return -EINVAL;
5437
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +01005438 req->timeout_rem.addr = READ_ONCE(sqe->addr);
Jens Axboeb29472e2019-12-17 18:50:29 -07005439 return 0;
5440}
5441
Jens Axboe11365042019-10-16 09:08:32 -06005442/*
5443 * Remove or update an existing timeout command
5444 */
Jens Axboefc4df992019-12-10 14:38:45 -07005445static int io_timeout_remove(struct io_kiocb *req)
Jens Axboe11365042019-10-16 09:08:32 -06005446{
5447 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe47f46762019-11-09 17:43:02 -07005448 int ret;
Jens Axboe11365042019-10-16 09:08:32 -06005449
Jens Axboe11365042019-10-16 09:08:32 -06005450 spin_lock_irq(&ctx->completion_lock);
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +01005451 ret = io_timeout_cancel(ctx, req->timeout_rem.addr);
Jens Axboe11365042019-10-16 09:08:32 -06005452
Jens Axboe47f46762019-11-09 17:43:02 -07005453 io_cqring_fill_event(req, ret);
Jens Axboe11365042019-10-16 09:08:32 -06005454 io_commit_cqring(ctx);
5455 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe5262f562019-09-17 12:26:57 -06005456 io_cqring_ev_posted(ctx);
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005457 if (ret < 0)
5458 req_set_fail_links(req);
Jackie Liuec9c02a2019-11-08 23:50:36 +08005459 io_put_req(req);
Jens Axboe11365042019-10-16 09:08:32 -06005460 return 0;
Jens Axboe5262f562019-09-17 12:26:57 -06005461}
5462
Jens Axboe3529d8c2019-12-19 18:24:38 -07005463static int io_timeout_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe,
Jens Axboe2d283902019-12-04 11:08:05 -07005464 bool is_timeout_link)
Jens Axboe5262f562019-09-17 12:26:57 -06005465{
Jens Axboead8a48a2019-11-15 08:49:11 -07005466 struct io_timeout_data *data;
Jens Axboea41525a2019-10-15 16:48:15 -06005467 unsigned flags;
Pavel Begunkov56080b02020-05-26 20:34:04 +03005468 u32 off = READ_ONCE(sqe->off);
Jens Axboe5262f562019-09-17 12:26:57 -06005469
Jens Axboead8a48a2019-11-15 08:49:11 -07005470 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe5262f562019-09-17 12:26:57 -06005471 return -EINVAL;
Jens Axboead8a48a2019-11-15 08:49:11 -07005472 if (sqe->ioprio || sqe->buf_index || sqe->len != 1)
Jens Axboea41525a2019-10-15 16:48:15 -06005473 return -EINVAL;
Pavel Begunkov56080b02020-05-26 20:34:04 +03005474 if (off && is_timeout_link)
Jens Axboe2d283902019-12-04 11:08:05 -07005475 return -EINVAL;
Jens Axboea41525a2019-10-15 16:48:15 -06005476 flags = READ_ONCE(sqe->timeout_flags);
5477 if (flags & ~IORING_TIMEOUT_ABS)
Jens Axboe5262f562019-09-17 12:26:57 -06005478 return -EINVAL;
Arnd Bergmannbdf20072019-10-01 09:53:29 -06005479
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005480 req->timeout.off = off;
Jens Axboe26a61672019-12-20 09:02:01 -07005481
Jens Axboee8c2bc12020-08-15 18:44:09 -07005482 if (!req->async_data && io_alloc_async_data(req))
Jens Axboe26a61672019-12-20 09:02:01 -07005483 return -ENOMEM;
5484
Jens Axboee8c2bc12020-08-15 18:44:09 -07005485 data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07005486 data->req = req;
Jens Axboead8a48a2019-11-15 08:49:11 -07005487
5488 if (get_timespec64(&data->ts, u64_to_user_ptr(sqe->addr)))
Jens Axboe5262f562019-09-17 12:26:57 -06005489 return -EFAULT;
5490
Jens Axboe11365042019-10-16 09:08:32 -06005491 if (flags & IORING_TIMEOUT_ABS)
Jens Axboead8a48a2019-11-15 08:49:11 -07005492 data->mode = HRTIMER_MODE_ABS;
Jens Axboe11365042019-10-16 09:08:32 -06005493 else
Jens Axboead8a48a2019-11-15 08:49:11 -07005494 data->mode = HRTIMER_MODE_REL;
Jens Axboe11365042019-10-16 09:08:32 -06005495
Jens Axboead8a48a2019-11-15 08:49:11 -07005496 hrtimer_init(&data->timer, CLOCK_MONOTONIC, data->mode);
5497 return 0;
5498}
5499
Jens Axboefc4df992019-12-10 14:38:45 -07005500static int io_timeout(struct io_kiocb *req)
Jens Axboead8a48a2019-11-15 08:49:11 -07005501{
Jens Axboead8a48a2019-11-15 08:49:11 -07005502 struct io_ring_ctx *ctx = req->ctx;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005503 struct io_timeout_data *data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07005504 struct list_head *entry;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005505 u32 tail, off = req->timeout.off;
Jens Axboead8a48a2019-11-15 08:49:11 -07005506
Pavel Begunkov733f5c92020-05-26 20:34:03 +03005507 spin_lock_irq(&ctx->completion_lock);
Jens Axboe93bd25b2019-11-11 23:34:31 -07005508
Jens Axboe5262f562019-09-17 12:26:57 -06005509 /*
5510 * sqe->off holds how many events that need to occur for this
Jens Axboe93bd25b2019-11-11 23:34:31 -07005511 * timeout event to be satisfied. If it isn't set, then this is
5512 * a pure timeout request, sequence isn't used.
Jens Axboe5262f562019-09-17 12:26:57 -06005513 */
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03005514 if (io_is_timeout_noseq(req)) {
Jens Axboe93bd25b2019-11-11 23:34:31 -07005515 entry = ctx->timeout_list.prev;
5516 goto add;
5517 }
Jens Axboe5262f562019-09-17 12:26:57 -06005518
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005519 tail = ctx->cached_cq_tail - atomic_read(&ctx->cq_timeouts);
5520 req->timeout.target_seq = tail + off;
Jens Axboe5262f562019-09-17 12:26:57 -06005521
5522 /*
5523 * Insertion sort, ensuring the first entry in the list is always
5524 * the one we need first.
5525 */
Jens Axboe5262f562019-09-17 12:26:57 -06005526 list_for_each_prev(entry, &ctx->timeout_list) {
Pavel Begunkov135fcde2020-07-13 23:37:12 +03005527 struct io_kiocb *nxt = list_entry(entry, struct io_kiocb,
5528 timeout.list);
Jens Axboe5262f562019-09-17 12:26:57 -06005529
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03005530 if (io_is_timeout_noseq(nxt))
Jens Axboe93bd25b2019-11-11 23:34:31 -07005531 continue;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03005532 /* nxt.seq is behind @tail, otherwise would've been completed */
5533 if (off >= nxt->timeout.target_seq - tail)
Jens Axboe5262f562019-09-17 12:26:57 -06005534 break;
5535 }
Jens Axboe93bd25b2019-11-11 23:34:31 -07005536add:
Pavel Begunkov135fcde2020-07-13 23:37:12 +03005537 list_add(&req->timeout.list, entry);
Jens Axboead8a48a2019-11-15 08:49:11 -07005538 data->timer.function = io_timeout_fn;
5539 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts), data->mode);
Jens Axboe842f9612019-10-29 12:34:10 -06005540 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe5262f562019-09-17 12:26:57 -06005541 return 0;
5542}
5543
Jens Axboe62755e32019-10-28 21:49:21 -06005544static bool io_cancel_cb(struct io_wq_work *work, void *data)
Jens Axboede0617e2019-04-06 21:51:27 -06005545{
Jens Axboe62755e32019-10-28 21:49:21 -06005546 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Jens Axboede0617e2019-04-06 21:51:27 -06005547
Jens Axboe62755e32019-10-28 21:49:21 -06005548 return req->user_data == (unsigned long) data;
5549}
5550
Jens Axboee977d6d2019-11-05 12:39:45 -07005551static int io_async_cancel_one(struct io_ring_ctx *ctx, void *sqe_addr)
Jens Axboe62755e32019-10-28 21:49:21 -06005552{
Jens Axboe62755e32019-10-28 21:49:21 -06005553 enum io_wq_cancel cancel_ret;
Jens Axboe62755e32019-10-28 21:49:21 -06005554 int ret = 0;
5555
Pavel Begunkov4f26bda2020-06-15 10:24:03 +03005556 cancel_ret = io_wq_cancel_cb(ctx->io_wq, io_cancel_cb, sqe_addr, false);
Jens Axboe62755e32019-10-28 21:49:21 -06005557 switch (cancel_ret) {
5558 case IO_WQ_CANCEL_OK:
5559 ret = 0;
5560 break;
5561 case IO_WQ_CANCEL_RUNNING:
5562 ret = -EALREADY;
5563 break;
5564 case IO_WQ_CANCEL_NOTFOUND:
5565 ret = -ENOENT;
5566 break;
5567 }
5568
Jens Axboee977d6d2019-11-05 12:39:45 -07005569 return ret;
5570}
5571
Jens Axboe47f46762019-11-09 17:43:02 -07005572static void io_async_find_and_cancel(struct io_ring_ctx *ctx,
5573 struct io_kiocb *req, __u64 sqe_addr,
Pavel Begunkov014db002020-03-03 21:33:12 +03005574 int success_ret)
Jens Axboe47f46762019-11-09 17:43:02 -07005575{
5576 unsigned long flags;
5577 int ret;
5578
5579 ret = io_async_cancel_one(ctx, (void *) (unsigned long) sqe_addr);
5580 if (ret != -ENOENT) {
5581 spin_lock_irqsave(&ctx->completion_lock, flags);
5582 goto done;
5583 }
5584
5585 spin_lock_irqsave(&ctx->completion_lock, flags);
5586 ret = io_timeout_cancel(ctx, sqe_addr);
5587 if (ret != -ENOENT)
5588 goto done;
5589 ret = io_poll_cancel(ctx, sqe_addr);
5590done:
Jens Axboeb0dd8a42019-11-18 12:14:54 -07005591 if (!ret)
5592 ret = success_ret;
Jens Axboe47f46762019-11-09 17:43:02 -07005593 io_cqring_fill_event(req, ret);
5594 io_commit_cqring(ctx);
5595 spin_unlock_irqrestore(&ctx->completion_lock, flags);
5596 io_cqring_ev_posted(ctx);
5597
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005598 if (ret < 0)
5599 req_set_fail_links(req);
Pavel Begunkov014db002020-03-03 21:33:12 +03005600 io_put_req(req);
Jens Axboe47f46762019-11-09 17:43:02 -07005601}
5602
Jens Axboe3529d8c2019-12-19 18:24:38 -07005603static int io_async_cancel_prep(struct io_kiocb *req,
5604 const struct io_uring_sqe *sqe)
Jens Axboee977d6d2019-11-05 12:39:45 -07005605{
Jens Axboefbf23842019-12-17 18:45:56 -07005606 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboee977d6d2019-11-05 12:39:45 -07005607 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06005608 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
5609 return -EINVAL;
5610 if (sqe->ioprio || sqe->off || sqe->len || sqe->cancel_flags)
Jens Axboee977d6d2019-11-05 12:39:45 -07005611 return -EINVAL;
5612
Jens Axboefbf23842019-12-17 18:45:56 -07005613 req->cancel.addr = READ_ONCE(sqe->addr);
5614 return 0;
5615}
5616
Pavel Begunkov014db002020-03-03 21:33:12 +03005617static int io_async_cancel(struct io_kiocb *req)
Jens Axboefbf23842019-12-17 18:45:56 -07005618{
5619 struct io_ring_ctx *ctx = req->ctx;
Jens Axboefbf23842019-12-17 18:45:56 -07005620
Pavel Begunkov014db002020-03-03 21:33:12 +03005621 io_async_find_and_cancel(ctx, req, req->cancel.addr, 0);
Jens Axboe62755e32019-10-28 21:49:21 -06005622 return 0;
5623}
5624
Jens Axboe05f3fb32019-12-09 11:22:50 -07005625static int io_files_update_prep(struct io_kiocb *req,
5626 const struct io_uring_sqe *sqe)
5627{
Jens Axboe6ca56f82020-09-18 16:51:19 -06005628 if (unlikely(req->ctx->flags & IORING_SETUP_SQPOLL))
5629 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06005630 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
5631 return -EINVAL;
5632 if (sqe->ioprio || sqe->rw_flags)
Jens Axboe05f3fb32019-12-09 11:22:50 -07005633 return -EINVAL;
5634
5635 req->files_update.offset = READ_ONCE(sqe->off);
5636 req->files_update.nr_args = READ_ONCE(sqe->len);
5637 if (!req->files_update.nr_args)
5638 return -EINVAL;
5639 req->files_update.arg = READ_ONCE(sqe->addr);
5640 return 0;
5641}
5642
Jens Axboe229a7b62020-06-22 10:13:11 -06005643static int io_files_update(struct io_kiocb *req, bool force_nonblock,
5644 struct io_comp_state *cs)
Jens Axboe05f3fb32019-12-09 11:22:50 -07005645{
5646 struct io_ring_ctx *ctx = req->ctx;
5647 struct io_uring_files_update up;
5648 int ret;
5649
Jens Axboef86cd202020-01-29 13:46:44 -07005650 if (force_nonblock)
Jens Axboe05f3fb32019-12-09 11:22:50 -07005651 return -EAGAIN;
Jens Axboe05f3fb32019-12-09 11:22:50 -07005652
5653 up.offset = req->files_update.offset;
5654 up.fds = req->files_update.arg;
5655
5656 mutex_lock(&ctx->uring_lock);
5657 ret = __io_sqe_files_update(ctx, &up, req->files_update.nr_args);
5658 mutex_unlock(&ctx->uring_lock);
5659
5660 if (ret < 0)
5661 req_set_fail_links(req);
Jens Axboe229a7b62020-06-22 10:13:11 -06005662 __io_req_complete(req, ret, 0, cs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07005663 return 0;
5664}
5665
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005666static int io_req_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07005667{
Jens Axboed625c6e2019-12-17 19:53:05 -07005668 switch (req->opcode) {
Jens Axboee7815732019-12-17 19:45:06 -07005669 case IORING_OP_NOP:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005670 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07005671 case IORING_OP_READV:
5672 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005673 case IORING_OP_READ:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005674 return io_read_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07005675 case IORING_OP_WRITEV:
5676 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005677 case IORING_OP_WRITE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005678 return io_write_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07005679 case IORING_OP_POLL_ADD:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005680 return io_poll_add_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07005681 case IORING_OP_POLL_REMOVE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005682 return io_poll_remove_prep(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005683 case IORING_OP_FSYNC:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005684 return io_prep_fsync(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005685 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005686 return io_prep_sfr(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07005687 case IORING_OP_SENDMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07005688 case IORING_OP_SEND:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005689 return io_sendmsg_prep(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07005690 case IORING_OP_RECVMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07005691 case IORING_OP_RECV:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005692 return io_recvmsg_prep(req, sqe);
Jens Axboef499a022019-12-02 16:28:46 -07005693 case IORING_OP_CONNECT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005694 return io_connect_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07005695 case IORING_OP_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005696 return io_timeout_prep(req, sqe, false);
Jens Axboeb29472e2019-12-17 18:50:29 -07005697 case IORING_OP_TIMEOUT_REMOVE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005698 return io_timeout_remove_prep(req, sqe);
Jens Axboefbf23842019-12-17 18:45:56 -07005699 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005700 return io_async_cancel_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07005701 case IORING_OP_LINK_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005702 return io_timeout_prep(req, sqe, true);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005703 case IORING_OP_ACCEPT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005704 return io_accept_prep(req, sqe);
Jens Axboed63d1b52019-12-10 10:38:56 -07005705 case IORING_OP_FALLOCATE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005706 return io_fallocate_prep(req, sqe);
Jens Axboe15b71ab2019-12-11 11:20:36 -07005707 case IORING_OP_OPENAT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005708 return io_openat_prep(req, sqe);
Jens Axboeb5dba592019-12-11 14:02:38 -07005709 case IORING_OP_CLOSE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005710 return io_close_prep(req, sqe);
Jens Axboe05f3fb32019-12-09 11:22:50 -07005711 case IORING_OP_FILES_UPDATE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005712 return io_files_update_prep(req, sqe);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07005713 case IORING_OP_STATX:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005714 return io_statx_prep(req, sqe);
Jens Axboe4840e412019-12-25 22:03:45 -07005715 case IORING_OP_FADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005716 return io_fadvise_prep(req, sqe);
Jens Axboec1ca7572019-12-25 22:18:28 -07005717 case IORING_OP_MADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005718 return io_madvise_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07005719 case IORING_OP_OPENAT2:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005720 return io_openat2_prep(req, sqe);
Jens Axboe3e4827b2020-01-08 15:18:09 -07005721 case IORING_OP_EPOLL_CTL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005722 return io_epoll_ctl_prep(req, sqe);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03005723 case IORING_OP_SPLICE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005724 return io_splice_prep(req, sqe);
Jens Axboeddf0322d2020-02-23 16:41:33 -07005725 case IORING_OP_PROVIDE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005726 return io_provide_buffers_prep(req, sqe);
Jens Axboe067524e2020-03-02 16:32:28 -07005727 case IORING_OP_REMOVE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005728 return io_remove_buffers_prep(req, sqe);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03005729 case IORING_OP_TEE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005730 return io_tee_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07005731 }
5732
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005733 printk_once(KERN_WARNING "io_uring: unhandled opcode %d\n",
5734 req->opcode);
5735 return-EINVAL;
5736}
5737
Jens Axboedef596e2019-01-09 08:59:42 -07005738static int io_req_defer_prep(struct io_kiocb *req,
5739 const struct io_uring_sqe *sqe)
Jens Axboedef596e2019-01-09 08:59:42 -07005740{
Jens Axboedef596e2019-01-09 08:59:42 -07005741 if (!sqe)
Jens Axboe2b188cc2019-01-07 10:46:33 -07005742 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005743 if (io_alloc_async_data(req))
Jens Axboeb76da702019-11-20 13:05:32 -07005744 return -EAGAIN;
Pavel Begunkovbfe76552020-09-30 22:57:55 +03005745 return io_req_prep(req, sqe);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005746}
5747
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005748static u32 io_get_sequence(struct io_kiocb *req)
5749{
5750 struct io_kiocb *pos;
5751 struct io_ring_ctx *ctx = req->ctx;
5752 u32 total_submitted, nr_reqs = 1;
5753
5754 if (req->flags & REQ_F_LINK_HEAD)
5755 list_for_each_entry(pos, &req->link_list, link_list)
5756 nr_reqs++;
5757
5758 total_submitted = ctx->cached_sq_head - ctx->cached_sq_dropped;
5759 return total_submitted - nr_reqs;
5760}
5761
Jens Axboe3529d8c2019-12-19 18:24:38 -07005762static int io_req_defer(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe2b188cc2019-01-07 10:46:33 -07005763{
5764 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005765 struct io_defer_entry *de;
Jens Axboe2b188cc2019-01-07 10:46:33 -07005766 int ret;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005767 u32 seq;
Jens Axboe2b188cc2019-01-07 10:46:33 -07005768
5769 /* Still need defer if there is pending req in defer list. */
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005770 if (likely(list_empty_careful(&ctx->defer_list) &&
5771 !(req->flags & REQ_F_IO_DRAIN)))
5772 return 0;
5773
5774 seq = io_get_sequence(req);
5775 /* Still a chance to pass the sequence check */
5776 if (!req_need_defer(req, seq) && list_empty_careful(&ctx->defer_list))
Jens Axboe2b188cc2019-01-07 10:46:33 -07005777 return 0;
5778
Jens Axboee8c2bc12020-08-15 18:44:09 -07005779 if (!req->async_data) {
Pavel Begunkov650b5482020-05-17 14:02:11 +03005780 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03005781 if (ret)
Pavel Begunkov650b5482020-05-17 14:02:11 +03005782 return ret;
5783 }
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03005784 io_prep_async_link(req);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005785 de = kmalloc(sizeof(*de), GFP_KERNEL);
5786 if (!de)
5787 return -ENOMEM;
Jens Axboe31b51512019-01-18 22:56:34 -07005788
5789 spin_lock_irq(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005790 if (!req_need_defer(req, seq) && list_empty(&ctx->defer_list)) {
Jens Axboe31b51512019-01-18 22:56:34 -07005791 spin_unlock_irq(&ctx->completion_lock);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005792 kfree(de);
Pavel Begunkovae348172020-07-23 20:25:20 +03005793 io_queue_async_work(req);
5794 return -EIOCBQUEUED;
Jens Axboe31b51512019-01-18 22:56:34 -07005795 }
5796
5797 trace_io_uring_defer(ctx, req, req->user_data);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005798 de->req = req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03005799 de->seq = seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03005800 list_add_tail(&de->list, &ctx->defer_list);
Jens Axboe31b51512019-01-18 22:56:34 -07005801 spin_unlock_irq(&ctx->completion_lock);
5802 return -EIOCBQUEUED;
5803}
Jens Axboeedafcce2019-01-09 09:16:05 -07005804
Jens Axboef573d382020-09-22 10:19:24 -06005805static void io_req_drop_files(struct io_kiocb *req)
5806{
5807 struct io_ring_ctx *ctx = req->ctx;
5808 unsigned long flags;
5809
5810 spin_lock_irqsave(&ctx->inflight_lock, flags);
5811 list_del(&req->inflight_entry);
5812 if (waitqueue_active(&ctx->inflight_wait))
5813 wake_up(&ctx->inflight_wait);
5814 spin_unlock_irqrestore(&ctx->inflight_lock, flags);
5815 req->flags &= ~REQ_F_INFLIGHT;
Jens Axboe98447d62020-10-14 10:48:51 -06005816 put_files_struct(req->work.identity->files);
5817 put_nsproxy(req->work.identity->nsproxy);
Jens Axboedfead8a2020-10-14 10:12:37 -06005818 req->work.flags &= ~IO_WQ_WORK_FILES;
Jens Axboef573d382020-09-22 10:19:24 -06005819}
5820
Pavel Begunkov3ca405e2020-07-13 23:37:08 +03005821static void __io_clean_op(struct io_kiocb *req)
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005822{
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005823 if (req->flags & REQ_F_BUFFER_SELECTED) {
5824 switch (req->opcode) {
5825 case IORING_OP_READV:
5826 case IORING_OP_READ_FIXED:
5827 case IORING_OP_READ:
Jens Axboebcda7ba2020-02-23 16:42:51 -07005828 kfree((void *)(unsigned long)req->rw.addr);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005829 break;
5830 case IORING_OP_RECVMSG:
5831 case IORING_OP_RECV:
Jens Axboe52de1fe2020-02-27 10:15:42 -07005832 kfree(req->sr_msg.kbuf);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005833 break;
5834 }
5835 req->flags &= ~REQ_F_BUFFER_SELECTED;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005836 }
5837
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005838 if (req->flags & REQ_F_NEED_CLEANUP) {
5839 switch (req->opcode) {
5840 case IORING_OP_READV:
5841 case IORING_OP_READ_FIXED:
5842 case IORING_OP_READ:
5843 case IORING_OP_WRITEV:
5844 case IORING_OP_WRITE_FIXED:
Jens Axboee8c2bc12020-08-15 18:44:09 -07005845 case IORING_OP_WRITE: {
5846 struct io_async_rw *io = req->async_data;
5847 if (io->free_iovec)
5848 kfree(io->free_iovec);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005849 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005850 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005851 case IORING_OP_RECVMSG:
Jens Axboee8c2bc12020-08-15 18:44:09 -07005852 case IORING_OP_SENDMSG: {
5853 struct io_async_msghdr *io = req->async_data;
5854 if (io->iov != io->fast_iov)
5855 kfree(io->iov);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005856 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005857 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005858 case IORING_OP_SPLICE:
5859 case IORING_OP_TEE:
5860 io_put_file(req, req->splice.file_in,
5861 (req->splice.flags & SPLICE_F_FD_IN_FIXED));
5862 break;
Jens Axboef3cd48502020-09-24 14:55:54 -06005863 case IORING_OP_OPENAT:
5864 case IORING_OP_OPENAT2:
5865 if (req->open.filename)
5866 putname(req->open.filename);
5867 break;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005868 }
5869 req->flags &= ~REQ_F_NEED_CLEANUP;
5870 }
Pavel Begunkovbb175342020-08-20 11:33:35 +03005871
Jens Axboef573d382020-09-22 10:19:24 -06005872 if (req->flags & REQ_F_INFLIGHT)
5873 io_req_drop_files(req);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005874}
5875
Pavel Begunkovc1379e22020-09-30 22:57:56 +03005876static int io_issue_sqe(struct io_kiocb *req, bool force_nonblock,
5877 struct io_comp_state *cs)
Jens Axboeedafcce2019-01-09 09:16:05 -07005878{
Jens Axboeedafcce2019-01-09 09:16:05 -07005879 struct io_ring_ctx *ctx = req->ctx;
Jens Axboed625c6e2019-12-17 19:53:05 -07005880 int ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07005881
Jens Axboed625c6e2019-12-17 19:53:05 -07005882 switch (req->opcode) {
Jens Axboe2b188cc2019-01-07 10:46:33 -07005883 case IORING_OP_NOP:
Jens Axboe229a7b62020-06-22 10:13:11 -06005884 ret = io_nop(req, cs);
Jens Axboe31b51512019-01-18 22:56:34 -07005885 break;
5886 case IORING_OP_READV:
Jens Axboe3529d8c2019-12-19 18:24:38 -07005887 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005888 case IORING_OP_READ:
Jens Axboea1d7c392020-06-22 11:09:46 -06005889 ret = io_read(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005890 break;
5891 case IORING_OP_WRITEV:
Jens Axboe2b188cc2019-01-07 10:46:33 -07005892 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07005893 case IORING_OP_WRITE:
Jens Axboea1d7c392020-06-22 11:09:46 -06005894 ret = io_write(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005895 break;
5896 case IORING_OP_FSYNC:
Pavel Begunkov014db002020-03-03 21:33:12 +03005897 ret = io_fsync(req, force_nonblock);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005898 break;
5899 case IORING_OP_POLL_ADD:
Pavel Begunkov014db002020-03-03 21:33:12 +03005900 ret = io_poll_add(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005901 break;
5902 case IORING_OP_POLL_REMOVE:
Jens Axboeb76da702019-11-20 13:05:32 -07005903 ret = io_poll_remove(req);
5904 break;
5905 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005906 ret = io_sync_file_range(req, force_nonblock);
Jens Axboeb76da702019-11-20 13:05:32 -07005907 break;
5908 case IORING_OP_SENDMSG:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005909 ret = io_sendmsg(req, force_nonblock, cs);
5910 break;
Jens Axboefddafac2020-01-04 20:19:44 -07005911 case IORING_OP_SEND:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005912 ret = io_send(req, force_nonblock, cs);
Jens Axboeb76da702019-11-20 13:05:32 -07005913 break;
5914 case IORING_OP_RECVMSG:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005915 ret = io_recvmsg(req, force_nonblock, cs);
5916 break;
Jens Axboefddafac2020-01-04 20:19:44 -07005917 case IORING_OP_RECV:
Pavel Begunkov062d04d2020-10-10 18:34:12 +01005918 ret = io_recv(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005919 break;
5920 case IORING_OP_TIMEOUT:
5921 ret = io_timeout(req);
5922 break;
5923 case IORING_OP_TIMEOUT_REMOVE:
5924 ret = io_timeout_remove(req);
5925 break;
5926 case IORING_OP_ACCEPT:
Jens Axboe229a7b62020-06-22 10:13:11 -06005927 ret = io_accept(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005928 break;
5929 case IORING_OP_CONNECT:
Jens Axboe229a7b62020-06-22 10:13:11 -06005930 ret = io_connect(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005931 break;
5932 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkov014db002020-03-03 21:33:12 +03005933 ret = io_async_cancel(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005934 break;
Jens Axboed63d1b52019-12-10 10:38:56 -07005935 case IORING_OP_FALLOCATE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005936 ret = io_fallocate(req, force_nonblock);
Jens Axboed63d1b52019-12-10 10:38:56 -07005937 break;
Jens Axboe15b71ab2019-12-11 11:20:36 -07005938 case IORING_OP_OPENAT:
Pavel Begunkov014db002020-03-03 21:33:12 +03005939 ret = io_openat(req, force_nonblock);
Jens Axboe15b71ab2019-12-11 11:20:36 -07005940 break;
Jens Axboeb5dba592019-12-11 14:02:38 -07005941 case IORING_OP_CLOSE:
Jens Axboe229a7b62020-06-22 10:13:11 -06005942 ret = io_close(req, force_nonblock, cs);
Jens Axboeb5dba592019-12-11 14:02:38 -07005943 break;
Jens Axboe05f3fb32019-12-09 11:22:50 -07005944 case IORING_OP_FILES_UPDATE:
Jens Axboe229a7b62020-06-22 10:13:11 -06005945 ret = io_files_update(req, force_nonblock, cs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07005946 break;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07005947 case IORING_OP_STATX:
Pavel Begunkov014db002020-03-03 21:33:12 +03005948 ret = io_statx(req, force_nonblock);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07005949 break;
Jens Axboe4840e412019-12-25 22:03:45 -07005950 case IORING_OP_FADVISE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005951 ret = io_fadvise(req, force_nonblock);
Jens Axboe4840e412019-12-25 22:03:45 -07005952 break;
Jens Axboec1ca7572019-12-25 22:18:28 -07005953 case IORING_OP_MADVISE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005954 ret = io_madvise(req, force_nonblock);
Jens Axboec1ca7572019-12-25 22:18:28 -07005955 break;
Jens Axboecebdb982020-01-08 17:59:24 -07005956 case IORING_OP_OPENAT2:
Pavel Begunkov014db002020-03-03 21:33:12 +03005957 ret = io_openat2(req, force_nonblock);
Jens Axboecebdb982020-01-08 17:59:24 -07005958 break;
Jens Axboe3e4827b2020-01-08 15:18:09 -07005959 case IORING_OP_EPOLL_CTL:
Jens Axboe229a7b62020-06-22 10:13:11 -06005960 ret = io_epoll_ctl(req, force_nonblock, cs);
Jens Axboe3e4827b2020-01-08 15:18:09 -07005961 break;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03005962 case IORING_OP_SPLICE:
Pavel Begunkov014db002020-03-03 21:33:12 +03005963 ret = io_splice(req, force_nonblock);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03005964 break;
Jens Axboeddf0322d2020-02-23 16:41:33 -07005965 case IORING_OP_PROVIDE_BUFFERS:
Jens Axboe229a7b62020-06-22 10:13:11 -06005966 ret = io_provide_buffers(req, force_nonblock, cs);
Jens Axboeddf0322d2020-02-23 16:41:33 -07005967 break;
Jens Axboe067524e2020-03-02 16:32:28 -07005968 case IORING_OP_REMOVE_BUFFERS:
Jens Axboe229a7b62020-06-22 10:13:11 -06005969 ret = io_remove_buffers(req, force_nonblock, cs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005970 break;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03005971 case IORING_OP_TEE:
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03005972 ret = io_tee(req, force_nonblock);
5973 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07005974 default:
5975 ret = -EINVAL;
5976 break;
Jens Axboe31b51512019-01-18 22:56:34 -07005977 }
5978
5979 if (ret)
Jens Axboeedafcce2019-01-09 09:16:05 -07005980 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07005981
Jens Axboeb5325762020-05-19 21:20:27 -06005982 /* If the op doesn't have a file, we're not polling for it */
5983 if ((ctx->flags & IORING_SETUP_IOPOLL) && req->file) {
Jens Axboe11ba8202020-01-15 21:51:17 -07005984 const bool in_async = io_wq_current_is_worker();
5985
Jens Axboe11ba8202020-01-15 21:51:17 -07005986 /* workqueue context doesn't hold uring_lock, grab it now */
5987 if (in_async)
5988 mutex_lock(&ctx->uring_lock);
5989
Jens Axboe2b188cc2019-01-07 10:46:33 -07005990 io_iopoll_req_issued(req);
Jens Axboe11ba8202020-01-15 21:51:17 -07005991
5992 if (in_async)
5993 mutex_unlock(&ctx->uring_lock);
Jens Axboe2b188cc2019-01-07 10:46:33 -07005994 }
5995
5996 return 0;
5997}
5998
Pavel Begunkovf4db7182020-06-25 18:20:54 +03005999static struct io_wq_work *io_wq_submit_work(struct io_wq_work *work)
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03006000{
Jens Axboe2b188cc2019-01-07 10:46:33 -07006001 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkov6df1db62020-07-03 22:15:06 +03006002 struct io_kiocb *timeout;
Jens Axboe561fb042019-10-24 07:25:42 -06006003 int ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006004
Pavel Begunkov6df1db62020-07-03 22:15:06 +03006005 timeout = io_prep_linked_timeout(req);
6006 if (timeout)
6007 io_queue_linked_timeout(timeout);
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03006008
Jens Axboe0c9d5cc2019-12-11 19:29:43 -07006009 /* if NO_CANCEL is set, we must still run the work */
6010 if ((work->flags & (IO_WQ_WORK_CANCEL|IO_WQ_WORK_NO_CANCEL)) ==
6011 IO_WQ_WORK_CANCEL) {
Jens Axboe561fb042019-10-24 07:25:42 -06006012 ret = -ECANCELED;
Jens Axboe0c9d5cc2019-12-11 19:29:43 -07006013 }
Jens Axboe31b51512019-01-18 22:56:34 -07006014
Jens Axboe561fb042019-10-24 07:25:42 -06006015 if (!ret) {
Jens Axboe561fb042019-10-24 07:25:42 -06006016 do {
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006017 ret = io_issue_sqe(req, false, NULL);
Jens Axboe561fb042019-10-24 07:25:42 -06006018 /*
6019 * We can get EAGAIN for polled IO even though we're
6020 * forcing a sync submission from here, since we can't
6021 * wait for request slots on the block side.
6022 */
6023 if (ret != -EAGAIN)
6024 break;
6025 cond_resched();
6026 } while (1);
6027 }
Jens Axboe31b51512019-01-18 22:56:34 -07006028
Jens Axboe561fb042019-10-24 07:25:42 -06006029 if (ret) {
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006030 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06006031 io_req_complete(req, ret);
Jens Axboeedafcce2019-01-09 09:16:05 -07006032 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07006033
Pavel Begunkovf4db7182020-06-25 18:20:54 +03006034 return io_steal_work(req);
Jens Axboe31b51512019-01-18 22:56:34 -07006035}
Jens Axboe2b188cc2019-01-07 10:46:33 -07006036
Jens Axboe65e19f52019-10-26 07:20:21 -06006037static inline struct file *io_file_from_index(struct io_ring_ctx *ctx,
6038 int index)
Jens Axboe09bb8392019-03-13 12:39:28 -06006039{
Jens Axboe65e19f52019-10-26 07:20:21 -06006040 struct fixed_file_table *table;
6041
Jens Axboe05f3fb32019-12-09 11:22:50 -07006042 table = &ctx->file_data->table[index >> IORING_FILE_TABLE_SHIFT];
Xiaoming Ni84695082020-05-11 19:25:43 +08006043 return table->files[index & IORING_FILE_TABLE_MASK];
Jens Axboe65e19f52019-10-26 07:20:21 -06006044}
6045
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006046static struct file *io_file_get(struct io_submit_state *state,
6047 struct io_kiocb *req, int fd, bool fixed)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006048{
6049 struct io_ring_ctx *ctx = req->ctx;
6050 struct file *file;
6051
6052 if (fixed) {
Pavel Begunkov479f5172020-10-10 18:34:07 +01006053 if (unlikely((unsigned int)fd >= ctx->nr_user_files))
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006054 return NULL;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006055 fd = array_index_nospec(fd, ctx->nr_user_files);
6056 file = io_file_from_index(ctx, fd);
Jens Axboefd2206e2020-06-02 16:40:47 -06006057 if (file) {
Pavel Begunkovb2e96852020-10-10 18:34:16 +01006058 req->fixed_file_refs = &ctx->file_data->node->refs;
Jens Axboefd2206e2020-06-02 16:40:47 -06006059 percpu_ref_get(req->fixed_file_refs);
6060 }
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006061 } else {
6062 trace_io_uring_file_get(ctx, fd);
6063 file = __io_file_get(state, fd);
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006064 }
6065
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006066 return file;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006067}
6068
Jens Axboe3529d8c2019-12-19 18:24:38 -07006069static int io_req_set_file(struct io_submit_state *state, struct io_kiocb *req,
Jens Axboe63ff8222020-05-07 14:56:15 -06006070 int fd)
Jens Axboe09bb8392019-03-13 12:39:28 -06006071{
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006072 bool fixed;
Jens Axboe09bb8392019-03-13 12:39:28 -06006073
Jens Axboe63ff8222020-05-07 14:56:15 -06006074 fixed = (req->flags & REQ_F_FIXED_FILE) != 0;
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03006075 if (unlikely(!fixed && io_async_submit(req->ctx)))
Pavel Begunkov8da11c12020-02-24 11:32:44 +03006076 return -EBADF;
Jens Axboe09bb8392019-03-13 12:39:28 -06006077
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006078 req->file = io_file_get(state, req, fd, fixed);
6079 if (req->file || io_op_defs[req->opcode].needs_file_no_error)
Jens Axboef86cd202020-01-29 13:46:44 -07006080 return 0;
Pavel Begunkov8371adf2020-10-10 18:34:08 +01006081 return -EBADF;
Pavel Begunkovf56040b2020-07-23 20:25:21 +03006082}
6083
Jens Axboe2665abf2019-11-05 12:40:47 -07006084static enum hrtimer_restart io_link_timeout_fn(struct hrtimer *timer)
6085{
Jens Axboead8a48a2019-11-15 08:49:11 -07006086 struct io_timeout_data *data = container_of(timer,
6087 struct io_timeout_data, timer);
6088 struct io_kiocb *req = data->req;
Jens Axboe2665abf2019-11-05 12:40:47 -07006089 struct io_ring_ctx *ctx = req->ctx;
6090 struct io_kiocb *prev = NULL;
6091 unsigned long flags;
Jens Axboe2665abf2019-11-05 12:40:47 -07006092
6093 spin_lock_irqsave(&ctx->completion_lock, flags);
6094
6095 /*
6096 * We don't expect the list to be empty, that will only happen if we
6097 * race with the completion of the linked work.
6098 */
Pavel Begunkov44932332019-12-05 16:16:35 +03006099 if (!list_empty(&req->link_list)) {
6100 prev = list_entry(req->link_list.prev, struct io_kiocb,
6101 link_list);
Pavel Begunkov900fad42020-10-19 16:39:16 +01006102 if (refcount_inc_not_zero(&prev->refs))
Pavel Begunkov44932332019-12-05 16:16:35 +03006103 list_del_init(&req->link_list);
Pavel Begunkov900fad42020-10-19 16:39:16 +01006104 else
Jens Axboe76a46e02019-11-10 23:34:16 -07006105 prev = NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07006106 }
6107
6108 spin_unlock_irqrestore(&ctx->completion_lock, flags);
6109
6110 if (prev) {
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006111 req_set_fail_links(prev);
Pavel Begunkov014db002020-03-03 21:33:12 +03006112 io_async_find_and_cancel(ctx, req, prev->user_data, -ETIME);
Jens Axboe76a46e02019-11-10 23:34:16 -07006113 io_put_req(prev);
Jens Axboe47f46762019-11-09 17:43:02 -07006114 } else {
Jens Axboee1e16092020-06-22 09:17:17 -06006115 io_req_complete(req, -ETIME);
Jens Axboe2665abf2019-11-05 12:40:47 -07006116 }
Jens Axboe2665abf2019-11-05 12:40:47 -07006117 return HRTIMER_NORESTART;
6118}
6119
Jens Axboe7271ef32020-08-10 09:55:22 -06006120static void __io_queue_linked_timeout(struct io_kiocb *req)
Jens Axboe2665abf2019-11-05 12:40:47 -07006121{
Jens Axboe76a46e02019-11-10 23:34:16 -07006122 /*
6123 * If the list is now empty, then our linked request finished before
6124 * we got a chance to setup the timer
6125 */
Pavel Begunkov44932332019-12-05 16:16:35 +03006126 if (!list_empty(&req->link_list)) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07006127 struct io_timeout_data *data = req->async_data;
Jens Axboe94ae5e72019-11-14 19:39:52 -07006128
Jens Axboead8a48a2019-11-15 08:49:11 -07006129 data->timer.function = io_link_timeout_fn;
6130 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts),
6131 data->mode);
Jens Axboe2665abf2019-11-05 12:40:47 -07006132 }
Jens Axboe7271ef32020-08-10 09:55:22 -06006133}
6134
6135static void io_queue_linked_timeout(struct io_kiocb *req)
6136{
6137 struct io_ring_ctx *ctx = req->ctx;
6138
6139 spin_lock_irq(&ctx->completion_lock);
6140 __io_queue_linked_timeout(req);
Jens Axboe76a46e02019-11-10 23:34:16 -07006141 spin_unlock_irq(&ctx->completion_lock);
Jens Axboe2665abf2019-11-05 12:40:47 -07006142
Jens Axboe2665abf2019-11-05 12:40:47 -07006143 /* drop submission reference */
Jens Axboe76a46e02019-11-10 23:34:16 -07006144 io_put_req(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07006145}
6146
Jens Axboead8a48a2019-11-15 08:49:11 -07006147static struct io_kiocb *io_prep_linked_timeout(struct io_kiocb *req)
Jens Axboe2665abf2019-11-05 12:40:47 -07006148{
6149 struct io_kiocb *nxt;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006150
Pavel Begunkovdea3b492020-04-12 02:05:04 +03006151 if (!(req->flags & REQ_F_LINK_HEAD))
Jens Axboe2665abf2019-11-05 12:40:47 -07006152 return NULL;
Pavel Begunkov6df1db62020-07-03 22:15:06 +03006153 if (req->flags & REQ_F_LINK_TIMEOUT)
Jens Axboed7718a92020-02-14 22:23:12 -07006154 return NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07006155
Pavel Begunkov44932332019-12-05 16:16:35 +03006156 nxt = list_first_entry_or_null(&req->link_list, struct io_kiocb,
6157 link_list);
Jens Axboed625c6e2019-12-17 19:53:05 -07006158 if (!nxt || nxt->opcode != IORING_OP_LINK_TIMEOUT)
Jens Axboe76a46e02019-11-10 23:34:16 -07006159 return NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07006160
Pavel Begunkov900fad42020-10-19 16:39:16 +01006161 nxt->flags |= REQ_F_LTIMEOUT_ACTIVE;
Jens Axboe76a46e02019-11-10 23:34:16 -07006162 req->flags |= REQ_F_LINK_TIMEOUT;
Jens Axboe76a46e02019-11-10 23:34:16 -07006163 return nxt;
Jens Axboe2665abf2019-11-05 12:40:47 -07006164}
6165
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006166static void __io_queue_sqe(struct io_kiocb *req, struct io_comp_state *cs)
Jens Axboe2b188cc2019-01-07 10:46:33 -07006167{
Jens Axboe4a0a7a12019-12-09 20:01:01 -07006168 struct io_kiocb *linked_timeout;
Jens Axboe193155c2020-02-22 23:22:19 -07006169 const struct cred *old_creds = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006170 int ret;
6171
Jens Axboe4a0a7a12019-12-09 20:01:01 -07006172again:
6173 linked_timeout = io_prep_linked_timeout(req);
6174
Pavel Begunkov2e5aa6c2020-10-18 10:17:37 +01006175 if ((req->flags & REQ_F_WORK_INITIALIZED) &&
6176 (req->work.flags & IO_WQ_WORK_CREDS) &&
Jens Axboe98447d62020-10-14 10:48:51 -06006177 req->work.identity->creds != current_cred()) {
Jens Axboe193155c2020-02-22 23:22:19 -07006178 if (old_creds)
6179 revert_creds(old_creds);
Jens Axboe98447d62020-10-14 10:48:51 -06006180 if (old_creds == req->work.identity->creds)
Jens Axboe193155c2020-02-22 23:22:19 -07006181 old_creds = NULL; /* restored original creds */
6182 else
Jens Axboe98447d62020-10-14 10:48:51 -06006183 old_creds = override_creds(req->work.identity->creds);
Jens Axboe193155c2020-02-22 23:22:19 -07006184 }
6185
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006186 ret = io_issue_sqe(req, true, cs);
Jens Axboe491381ce2019-10-17 09:20:46 -06006187
6188 /*
6189 * We async punt it if the file wasn't marked NOWAIT, or if the file
6190 * doesn't support non-blocking read/write attempts
6191 */
Pavel Begunkov24c74672020-06-21 13:09:51 +03006192 if (ret == -EAGAIN && !(req->flags & REQ_F_NOWAIT)) {
Pavel Begunkovf063c542020-07-25 14:41:59 +03006193 if (!io_arm_poll_handler(req)) {
Pavel Begunkovf063c542020-07-25 14:41:59 +03006194 /*
6195 * Queued up for async execution, worker will release
6196 * submit reference when the iocb is actually submitted.
6197 */
6198 io_queue_async_work(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006199 }
Pavel Begunkovbbad27b2019-11-19 23:32:47 +03006200
Pavel Begunkovf063c542020-07-25 14:41:59 +03006201 if (linked_timeout)
6202 io_queue_linked_timeout(linked_timeout);
Pavel Begunkov0d63c142020-10-22 16:47:18 +01006203 } else if (likely(!ret)) {
6204 /* drop submission reference */
6205 req = io_put_req_find_next(req);
6206 if (linked_timeout)
6207 io_queue_linked_timeout(linked_timeout);
Jens Axboee65ef562019-03-12 10:16:44 -06006208
Pavel Begunkov0d63c142020-10-22 16:47:18 +01006209 if (req) {
6210 if (!(req->flags & REQ_F_FORCE_ASYNC))
6211 goto again;
6212 io_queue_async_work(req);
6213 }
6214 } else {
Pavel Begunkov652532a2020-07-03 22:15:07 +03006215 /* un-prep timeout, so it'll be killed as any other linked */
6216 req->flags &= ~REQ_F_LINK_TIMEOUT;
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006217 req_set_fail_links(req);
Jens Axboee65ef562019-03-12 10:16:44 -06006218 io_put_req(req);
Pavel Begunkov652532a2020-07-03 22:15:07 +03006219 io_req_complete(req, ret);
Jens Axboe9e645e112019-05-10 16:07:28 -06006220 }
Pavel Begunkov652532a2020-07-03 22:15:07 +03006221
Jens Axboe193155c2020-02-22 23:22:19 -07006222 if (old_creds)
6223 revert_creds(old_creds);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006224}
6225
Jens Axboef13fad72020-06-22 09:34:30 -06006226static void io_queue_sqe(struct io_kiocb *req, const struct io_uring_sqe *sqe,
6227 struct io_comp_state *cs)
Jackie Liu4fe2c962019-09-09 20:50:40 +08006228{
6229 int ret;
6230
Jens Axboe3529d8c2019-12-19 18:24:38 -07006231 ret = io_req_defer(req, sqe);
Jackie Liu4fe2c962019-09-09 20:50:40 +08006232 if (ret) {
6233 if (ret != -EIOCBQUEUED) {
Pavel Begunkov11185912020-01-22 23:09:35 +03006234fail_req:
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006235 req_set_fail_links(req);
Jens Axboee1e16092020-06-22 09:17:17 -06006236 io_put_req(req);
6237 io_req_complete(req, ret);
Jackie Liu4fe2c962019-09-09 20:50:40 +08006238 }
Pavel Begunkov25508782019-12-30 21:24:47 +03006239 } else if (req->flags & REQ_F_FORCE_ASYNC) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07006240 if (!req->async_data) {
Pavel Begunkovbd2ab182020-05-17 14:02:12 +03006241 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03006242 if (unlikely(ret))
Pavel Begunkovbd2ab182020-05-17 14:02:12 +03006243 goto fail_req;
6244 }
Jens Axboece35a472019-12-17 08:04:44 -07006245 io_queue_async_work(req);
6246 } else {
Pavel Begunkovc1379e22020-09-30 22:57:56 +03006247 if (sqe) {
6248 ret = io_req_prep(req, sqe);
6249 if (unlikely(ret))
6250 goto fail_req;
6251 }
6252 __io_queue_sqe(req, cs);
Jens Axboece35a472019-12-17 08:04:44 -07006253 }
Jackie Liu4fe2c962019-09-09 20:50:40 +08006254}
6255
Jens Axboef13fad72020-06-22 09:34:30 -06006256static inline void io_queue_link_head(struct io_kiocb *req,
6257 struct io_comp_state *cs)
Jackie Liu4fe2c962019-09-09 20:50:40 +08006258{
Jens Axboe94ae5e72019-11-14 19:39:52 -07006259 if (unlikely(req->flags & REQ_F_FAIL_LINK)) {
Jens Axboee1e16092020-06-22 09:17:17 -06006260 io_put_req(req);
6261 io_req_complete(req, -ECANCELED);
Pavel Begunkov1b4a51b2019-11-21 11:54:28 +03006262 } else
Jens Axboef13fad72020-06-22 09:34:30 -06006263 io_queue_sqe(req, NULL, cs);
Jackie Liu4fe2c962019-09-09 20:50:40 +08006264}
6265
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006266static int io_submit_sqe(struct io_kiocb *req, const struct io_uring_sqe *sqe,
Jens Axboef13fad72020-06-22 09:34:30 -06006267 struct io_kiocb **link, struct io_comp_state *cs)
Jens Axboe9e645e112019-05-10 16:07:28 -06006268{
Jackie Liua197f662019-11-08 08:09:12 -07006269 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006270 int ret;
Jens Axboe9e645e112019-05-10 16:07:28 -06006271
Jens Axboe9e645e112019-05-10 16:07:28 -06006272 /*
6273 * If we already have a head request, queue this one for async
6274 * submittal once the head completes. If we don't have a head but
6275 * IOSQE_IO_LINK is set in the sqe, start a new head. This one will be
6276 * submitted sync once the chain is complete. If none of those
6277 * conditions are true (normal request), then just queue it.
6278 */
6279 if (*link) {
Pavel Begunkov9d763772019-12-17 02:22:07 +03006280 struct io_kiocb *head = *link;
Jens Axboe9e645e112019-05-10 16:07:28 -06006281
Pavel Begunkov8cdf2192020-01-25 00:40:24 +03006282 /*
6283 * Taking sequential execution of a link, draining both sides
6284 * of the link also fullfils IOSQE_IO_DRAIN semantics for all
6285 * requests in the link. So, it drains the head and the
6286 * next after the link request. The last one is done via
6287 * drain_next flag to persist the effect across calls.
6288 */
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006289 if (req->flags & REQ_F_IO_DRAIN) {
Pavel Begunkov711be032020-01-17 03:57:59 +03006290 head->flags |= REQ_F_IO_DRAIN;
6291 ctx->drain_next = 1;
6292 }
Jens Axboe3529d8c2019-12-19 18:24:38 -07006293 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03006294 if (unlikely(ret)) {
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006295 /* fail even hard links since we don't submit */
Pavel Begunkov9d763772019-12-17 02:22:07 +03006296 head->flags |= REQ_F_FAIL_LINK;
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006297 return ret;
Jens Axboe2d283902019-12-04 11:08:05 -07006298 }
Pavel Begunkov9d763772019-12-17 02:22:07 +03006299 trace_io_uring_link(ctx, req, head);
6300 list_add_tail(&req->link_list, &head->link_list);
Jens Axboe9e645e112019-05-10 16:07:28 -06006301
Pavel Begunkov32fe5252019-12-17 22:26:58 +03006302 /* last request of a link, enqueue the link */
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006303 if (!(req->flags & (REQ_F_LINK | REQ_F_HARDLINK))) {
Jens Axboef13fad72020-06-22 09:34:30 -06006304 io_queue_link_head(head, cs);
Pavel Begunkov32fe5252019-12-17 22:26:58 +03006305 *link = NULL;
6306 }
Jens Axboe9e645e112019-05-10 16:07:28 -06006307 } else {
Pavel Begunkov711be032020-01-17 03:57:59 +03006308 if (unlikely(ctx->drain_next)) {
6309 req->flags |= REQ_F_IO_DRAIN;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006310 ctx->drain_next = 0;
Pavel Begunkov711be032020-01-17 03:57:59 +03006311 }
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006312 if (req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) {
Pavel Begunkovdea3b492020-04-12 02:05:04 +03006313 req->flags |= REQ_F_LINK_HEAD;
Pavel Begunkov711be032020-01-17 03:57:59 +03006314 INIT_LIST_HEAD(&req->link_list);
Pavel Begunkovf1d96a82020-03-13 22:29:14 +03006315
Pavel Begunkov711be032020-01-17 03:57:59 +03006316 ret = io_req_defer_prep(req, sqe);
Pavel Begunkov327d6d92020-07-15 12:46:51 +03006317 if (unlikely(ret))
Pavel Begunkov711be032020-01-17 03:57:59 +03006318 req->flags |= REQ_F_FAIL_LINK;
6319 *link = req;
6320 } else {
Jens Axboef13fad72020-06-22 09:34:30 -06006321 io_queue_sqe(req, sqe, cs);
Pavel Begunkov711be032020-01-17 03:57:59 +03006322 }
Jens Axboe9e645e112019-05-10 16:07:28 -06006323 }
Pavel Begunkov2e6e1fd2019-12-05 16:15:45 +03006324
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006325 return 0;
Jens Axboe9e645e112019-05-10 16:07:28 -06006326}
6327
Jens Axboe9a56a232019-01-09 09:06:50 -07006328/*
6329 * Batched submission is done, ensure local IO is flushed out.
6330 */
6331static void io_submit_state_end(struct io_submit_state *state)
6332{
Jens Axboef13fad72020-06-22 09:34:30 -06006333 if (!list_empty(&state->comp.list))
6334 io_submit_flush_completions(&state->comp);
Jens Axboe9a56a232019-01-09 09:06:50 -07006335 blk_finish_plug(&state->plug);
Pavel Begunkov9f13c352020-05-17 14:13:41 +03006336 io_state_file_put(state);
Jens Axboe2579f912019-01-09 09:10:43 -07006337 if (state->free_reqs)
Pavel Begunkov6c8a3132020-02-01 03:58:00 +03006338 kmem_cache_free_bulk(req_cachep, state->free_reqs, state->reqs);
Jens Axboe9a56a232019-01-09 09:06:50 -07006339}
6340
6341/*
6342 * Start submission side cache.
6343 */
6344static void io_submit_state_start(struct io_submit_state *state,
Jens Axboe013538b2020-06-22 09:29:15 -06006345 struct io_ring_ctx *ctx, unsigned int max_ios)
Jens Axboe9a56a232019-01-09 09:06:50 -07006346{
6347 blk_start_plug(&state->plug);
Jens Axboe013538b2020-06-22 09:29:15 -06006348 state->comp.nr = 0;
6349 INIT_LIST_HEAD(&state->comp.list);
6350 state->comp.ctx = ctx;
Jens Axboe2579f912019-01-09 09:10:43 -07006351 state->free_reqs = 0;
Jens Axboe9a56a232019-01-09 09:06:50 -07006352 state->file = NULL;
6353 state->ios_left = max_ios;
6354}
6355
Jens Axboe2b188cc2019-01-07 10:46:33 -07006356static void io_commit_sqring(struct io_ring_ctx *ctx)
6357{
Hristo Venev75b28af2019-08-26 17:23:46 +00006358 struct io_rings *rings = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006359
Pavel Begunkovcaf582c2019-12-30 21:24:46 +03006360 /*
6361 * Ensure any loads from the SQEs are done at this point,
6362 * since once we write the new head, the application could
6363 * write new data to them.
6364 */
6365 smp_store_release(&rings->sq.head, ctx->cached_sq_head);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006366}
6367
6368/*
Jens Axboe3529d8c2019-12-19 18:24:38 -07006369 * Fetch an sqe, if one is available. Note that sqe_ptr will point to memory
Jens Axboe2b188cc2019-01-07 10:46:33 -07006370 * that is mapped by userspace. This means that care needs to be taken to
6371 * ensure that reads are stable, as we cannot rely on userspace always
6372 * being a good citizen. If members of the sqe are validated and then later
6373 * used, it's important that those reads are done through READ_ONCE() to
6374 * prevent a re-load down the line.
6375 */
Pavel Begunkov709b3022020-04-08 08:58:43 +03006376static const struct io_uring_sqe *io_get_sqe(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07006377{
Hristo Venev75b28af2019-08-26 17:23:46 +00006378 u32 *sq_array = ctx->sq_array;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006379 unsigned head;
6380
6381 /*
6382 * The cached sq head (or cq tail) serves two purposes:
6383 *
6384 * 1) allows us to batch the cost of updating the user visible
6385 * head updates.
6386 * 2) allows the kernel side to track the head on its own, even
6387 * though the application is the one updating it.
6388 */
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03006389 head = READ_ONCE(sq_array[ctx->cached_sq_head & ctx->sq_mask]);
Pavel Begunkov709b3022020-04-08 08:58:43 +03006390 if (likely(head < ctx->sq_entries))
6391 return &ctx->sq_sqes[head];
Jens Axboe2b188cc2019-01-07 10:46:33 -07006392
6393 /* drop invalid entries */
Jens Axboe498ccd92019-10-25 10:04:25 -06006394 ctx->cached_sq_dropped++;
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03006395 WRITE_ONCE(ctx->rings->sq_dropped, ctx->cached_sq_dropped);
Pavel Begunkov709b3022020-04-08 08:58:43 +03006396 return NULL;
6397}
6398
6399static inline void io_consume_sqe(struct io_ring_ctx *ctx)
6400{
6401 ctx->cached_sq_head++;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006402}
6403
Stefano Garzarella21b55db2020-08-27 16:58:30 +02006404/*
6405 * Check SQE restrictions (opcode and flags).
6406 *
6407 * Returns 'true' if SQE is allowed, 'false' otherwise.
6408 */
6409static inline bool io_check_restriction(struct io_ring_ctx *ctx,
6410 struct io_kiocb *req,
6411 unsigned int sqe_flags)
6412{
6413 if (!ctx->restricted)
6414 return true;
6415
6416 if (!test_bit(req->opcode, ctx->restrictions.sqe_op))
6417 return false;
6418
6419 if ((sqe_flags & ctx->restrictions.sqe_flags_required) !=
6420 ctx->restrictions.sqe_flags_required)
6421 return false;
6422
6423 if (sqe_flags & ~(ctx->restrictions.sqe_flags_allowed |
6424 ctx->restrictions.sqe_flags_required))
6425 return false;
6426
6427 return true;
6428}
6429
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006430#define SQE_VALID_FLAGS (IOSQE_FIXED_FILE|IOSQE_IO_DRAIN|IOSQE_IO_LINK| \
6431 IOSQE_IO_HARDLINK | IOSQE_ASYNC | \
6432 IOSQE_BUFFER_SELECT)
6433
6434static int io_init_req(struct io_ring_ctx *ctx, struct io_kiocb *req,
6435 const struct io_uring_sqe *sqe,
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03006436 struct io_submit_state *state)
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006437{
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006438 unsigned int sqe_flags;
Pavel Begunkov71b547c2020-10-10 18:34:09 +01006439 int id, ret;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006440
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006441 req->opcode = READ_ONCE(sqe->opcode);
6442 req->user_data = READ_ONCE(sqe->user_data);
Jens Axboee8c2bc12020-08-15 18:44:09 -07006443 req->async_data = NULL;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006444 req->file = NULL;
6445 req->ctx = ctx;
6446 req->flags = 0;
6447 /* one is dropped after submission, the other at completion */
6448 refcount_set(&req->refs, 2);
Pavel Begunkov4dd28242020-06-15 10:33:13 +03006449 req->task = current;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006450 req->result = 0;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006451
6452 if (unlikely(req->opcode >= IORING_OP_LAST))
6453 return -EINVAL;
6454
Jens Axboe9d8426a2020-06-16 18:42:49 -06006455 if (unlikely(io_sq_thread_acquire_mm(ctx, req)))
6456 return -EFAULT;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006457
6458 sqe_flags = READ_ONCE(sqe->flags);
6459 /* enforce forwards compatibility on users */
6460 if (unlikely(sqe_flags & ~SQE_VALID_FLAGS))
6461 return -EINVAL;
6462
Stefano Garzarella21b55db2020-08-27 16:58:30 +02006463 if (unlikely(!io_check_restriction(ctx, req, sqe_flags)))
6464 return -EACCES;
6465
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006466 if ((sqe_flags & IOSQE_BUFFER_SELECT) &&
6467 !io_op_defs[req->opcode].buffer_select)
6468 return -EOPNOTSUPP;
6469
6470 id = READ_ONCE(sqe->personality);
6471 if (id) {
Jens Axboe1e6fa522020-10-15 08:46:24 -06006472 struct io_identity *iod;
6473
Jens Axboe1e6fa522020-10-15 08:46:24 -06006474 iod = idr_find(&ctx->personality_idr, id);
6475 if (unlikely(!iod))
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006476 return -EINVAL;
Jens Axboe1e6fa522020-10-15 08:46:24 -06006477 refcount_inc(&iod->count);
Pavel Begunkovec99ca62020-10-18 10:17:38 +01006478
6479 __io_req_init_async(req);
Jens Axboe1e6fa522020-10-15 08:46:24 -06006480 get_cred(iod->creds);
6481 req->work.identity = iod;
Jens Axboedfead8a2020-10-14 10:12:37 -06006482 req->work.flags |= IO_WQ_WORK_CREDS;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006483 }
6484
6485 /* same numerical values with corresponding REQ_F_*, safe to copy */
Pavel Begunkovc11368a52020-05-17 14:13:42 +03006486 req->flags |= sqe_flags;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006487
Jens Axboe63ff8222020-05-07 14:56:15 -06006488 if (!io_op_defs[req->opcode].needs_file)
6489 return 0;
6490
Pavel Begunkov71b547c2020-10-10 18:34:09 +01006491 ret = io_req_set_file(state, req, READ_ONCE(sqe->fd));
6492 state->ios_left--;
6493 return ret;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03006494}
6495
Jens Axboe0f212202020-09-13 13:09:39 -06006496static int io_submit_sqes(struct io_ring_ctx *ctx, unsigned int nr)
Jens Axboe6c271ce2019-01-10 11:22:30 -07006497{
Jens Axboeac8691c2020-06-01 08:30:41 -06006498 struct io_submit_state state;
Jens Axboe9e645e112019-05-10 16:07:28 -06006499 struct io_kiocb *link = NULL;
Jens Axboe9e645e112019-05-10 16:07:28 -06006500 int i, submitted = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006501
Jens Axboec4a2ed72019-11-21 21:01:26 -07006502 /* if we have a backlog and couldn't flush it all, return BUSY */
Jens Axboead3eb2c2019-12-18 17:12:20 -07006503 if (test_bit(0, &ctx->sq_check_overflow)) {
6504 if (!list_empty(&ctx->cq_overflow_list) &&
Jens Axboee6c8aa92020-09-28 13:10:13 -06006505 !io_cqring_overflow_flush(ctx, false, NULL, NULL))
Jens Axboead3eb2c2019-12-18 17:12:20 -07006506 return -EBUSY;
6507 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07006508
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03006509 /* make sure SQ entry isn't read before tail */
6510 nr = min3(nr, ctx->sq_entries, io_sqring_entries(ctx));
Pavel Begunkov9ef4f122019-12-30 21:24:44 +03006511
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03006512 if (!percpu_ref_tryget_many(&ctx->refs, nr))
6513 return -EAGAIN;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006514
Jens Axboed8a6df12020-10-15 16:24:45 -06006515 percpu_counter_add(&current->io_uring->inflight, nr);
Jens Axboefaf7b512020-10-07 12:48:53 -06006516 refcount_add(nr, &current->usage);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006517
Jens Axboe6c271ce2019-01-10 11:22:30 -07006518 io_submit_state_start(&state, ctx, nr);
Pavel Begunkovb14cca02020-01-17 04:45:59 +03006519
Jens Axboe6c271ce2019-01-10 11:22:30 -07006520 for (i = 0; i < nr; i++) {
Jens Axboe3529d8c2019-12-19 18:24:38 -07006521 const struct io_uring_sqe *sqe;
Pavel Begunkov196be952019-11-07 01:41:06 +03006522 struct io_kiocb *req;
Pavel Begunkov1cb1edb2020-02-06 21:16:09 +03006523 int err;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03006524
Pavel Begunkovb1e50e52020-04-08 08:58:44 +03006525 sqe = io_get_sqe(ctx);
6526 if (unlikely(!sqe)) {
6527 io_consume_sqe(ctx);
6528 break;
6529 }
Jens Axboeac8691c2020-06-01 08:30:41 -06006530 req = io_alloc_req(ctx, &state);
Pavel Begunkov196be952019-11-07 01:41:06 +03006531 if (unlikely(!req)) {
6532 if (!submitted)
6533 submitted = -EAGAIN;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03006534 break;
Jens Axboe9e645e112019-05-10 16:07:28 -06006535 }
Pavel Begunkov709b3022020-04-08 08:58:43 +03006536 io_consume_sqe(ctx);
Jens Axboed3656342019-12-18 09:50:26 -07006537 /* will complete beyond this point, count as submitted */
6538 submitted++;
6539
Pavel Begunkov692d8362020-10-10 18:34:13 +01006540 err = io_init_req(ctx, req, sqe, &state);
Pavel Begunkovef4ff582020-04-12 02:05:05 +03006541 if (unlikely(err)) {
Pavel Begunkov1cb1edb2020-02-06 21:16:09 +03006542fail_req:
Jens Axboee1e16092020-06-22 09:17:17 -06006543 io_put_req(req);
6544 io_req_complete(req, err);
Jens Axboed3656342019-12-18 09:50:26 -07006545 break;
6546 }
6547
Jens Axboe354420f2020-01-08 18:55:15 -07006548 trace_io_uring_submit_sqe(ctx, req->opcode, req->user_data,
Pavel Begunkov0cdaf762020-05-17 14:13:40 +03006549 true, io_async_submit(ctx));
Jens Axboef13fad72020-06-22 09:34:30 -06006550 err = io_submit_sqe(req, sqe, &link, &state.comp);
Pavel Begunkov1d4240c2020-04-12 02:05:03 +03006551 if (err)
6552 goto fail_req;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006553 }
6554
Pavel Begunkov9466f432020-01-25 22:34:01 +03006555 if (unlikely(submitted != nr)) {
6556 int ref_used = (submitted == -EAGAIN) ? 0 : submitted;
Jens Axboed8a6df12020-10-15 16:24:45 -06006557 struct io_uring_task *tctx = current->io_uring;
6558 int unused = nr - ref_used;
Pavel Begunkov9466f432020-01-25 22:34:01 +03006559
Jens Axboed8a6df12020-10-15 16:24:45 -06006560 percpu_ref_put_many(&ctx->refs, unused);
6561 percpu_counter_sub(&tctx->inflight, unused);
6562 put_task_struct_many(current, unused);
Pavel Begunkov9466f432020-01-25 22:34:01 +03006563 }
Jens Axboe9e645e112019-05-10 16:07:28 -06006564 if (link)
Jens Axboef13fad72020-06-22 09:34:30 -06006565 io_queue_link_head(link, &state.comp);
Jens Axboeac8691c2020-06-01 08:30:41 -06006566 io_submit_state_end(&state);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006567
Pavel Begunkovae9428c2019-11-06 00:22:14 +03006568 /* Commit SQ ring head once we've consumed and submitted all SQEs */
6569 io_commit_sqring(ctx);
6570
Jens Axboe6c271ce2019-01-10 11:22:30 -07006571 return submitted;
6572}
6573
Xiaoguang Wang23b36282020-07-23 20:57:24 +08006574static inline void io_ring_set_wakeup_flag(struct io_ring_ctx *ctx)
6575{
6576 /* Tell userspace we may need a wakeup call */
6577 spin_lock_irq(&ctx->completion_lock);
6578 ctx->rings->sq_flags |= IORING_SQ_NEED_WAKEUP;
6579 spin_unlock_irq(&ctx->completion_lock);
6580}
6581
6582static inline void io_ring_clear_wakeup_flag(struct io_ring_ctx *ctx)
6583{
6584 spin_lock_irq(&ctx->completion_lock);
6585 ctx->rings->sq_flags &= ~IORING_SQ_NEED_WAKEUP;
6586 spin_unlock_irq(&ctx->completion_lock);
6587}
6588
Jens Axboe3f0e64d2020-09-02 12:42:47 -06006589static int io_sq_wake_function(struct wait_queue_entry *wqe, unsigned mode,
6590 int sync, void *key)
Jens Axboe6c271ce2019-01-10 11:22:30 -07006591{
Jens Axboe3f0e64d2020-09-02 12:42:47 -06006592 struct io_ring_ctx *ctx = container_of(wqe, struct io_ring_ctx, sqo_wait_entry);
6593 int ret;
6594
6595 ret = autoremove_wake_function(wqe, mode, sync, key);
6596 if (ret) {
6597 unsigned long flags;
6598
6599 spin_lock_irqsave(&ctx->completion_lock, flags);
6600 ctx->rings->sq_flags &= ~IORING_SQ_NEED_WAKEUP;
6601 spin_unlock_irqrestore(&ctx->completion_lock, flags);
6602 }
6603 return ret;
6604}
6605
Jens Axboec8d1ba52020-09-14 11:07:26 -06006606enum sq_ret {
6607 SQT_IDLE = 1,
6608 SQT_SPIN = 2,
6609 SQT_DID_WORK = 4,
6610};
6611
6612static enum sq_ret __io_sq_thread(struct io_ring_ctx *ctx,
Jens Axboee95eee22020-09-08 09:11:32 -06006613 unsigned long start_jiffies, bool cap_entries)
Jens Axboec8d1ba52020-09-14 11:07:26 -06006614{
6615 unsigned long timeout = start_jiffies + ctx->sq_thread_idle;
Jens Axboe534ca6d2020-09-02 13:52:19 -06006616 struct io_sq_data *sqd = ctx->sq_data;
Jens Axboec8d1ba52020-09-14 11:07:26 -06006617 unsigned int to_submit;
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08006618 int ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006619
Jens Axboec8d1ba52020-09-14 11:07:26 -06006620again:
6621 if (!list_empty(&ctx->iopoll_list)) {
6622 unsigned nr_events = 0;
Jackie Liua4c0b3d2019-07-08 13:41:12 +08006623
Jens Axboec8d1ba52020-09-14 11:07:26 -06006624 mutex_lock(&ctx->uring_lock);
6625 if (!list_empty(&ctx->iopoll_list) && !need_resched())
6626 io_do_iopoll(ctx, &nr_events, 0);
6627 mutex_unlock(&ctx->uring_lock);
6628 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07006629
Jens Axboec8d1ba52020-09-14 11:07:26 -06006630 to_submit = io_sqring_entries(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006631
Jens Axboec8d1ba52020-09-14 11:07:26 -06006632 /*
6633 * If submit got -EBUSY, flag us as needing the application
6634 * to enter the kernel to reap and flush events.
6635 */
6636 if (!to_submit || ret == -EBUSY || need_resched()) {
6637 /*
6638 * Drop cur_mm before scheduling, we can't hold it for
6639 * long periods (or over schedule()). Do this before
6640 * adding ourselves to the waitqueue, as the unuse/drop
6641 * may sleep.
6642 */
6643 io_sq_thread_drop_mm();
Jens Axboe6c271ce2019-01-10 11:22:30 -07006644
Jens Axboec8d1ba52020-09-14 11:07:26 -06006645 /*
6646 * We're polling. If we're within the defined idle
6647 * period, then let us spin without work before going
6648 * to sleep. The exception is if we got EBUSY doing
6649 * more IO, we should wait for the application to
6650 * reap events and wake us up.
6651 */
6652 if (!list_empty(&ctx->iopoll_list) || need_resched() ||
6653 (!time_after(jiffies, timeout) && ret != -EBUSY &&
6654 !percpu_ref_is_dying(&ctx->refs)))
6655 return SQT_SPIN;
6656
Jens Axboe534ca6d2020-09-02 13:52:19 -06006657 prepare_to_wait(&sqd->wait, &ctx->sqo_wait_entry,
Jens Axboec8d1ba52020-09-14 11:07:26 -06006658 TASK_INTERRUPTIBLE);
6659
6660 /*
6661 * While doing polled IO, before going to sleep, we need
6662 * to check if there are new reqs added to iopoll_list,
6663 * it is because reqs may have been punted to io worker
6664 * and will be added to iopoll_list later, hence check
6665 * the iopoll_list again.
6666 */
6667 if ((ctx->flags & IORING_SETUP_IOPOLL) &&
6668 !list_empty_careful(&ctx->iopoll_list)) {
Jens Axboe534ca6d2020-09-02 13:52:19 -06006669 finish_wait(&sqd->wait, &ctx->sqo_wait_entry);
Jens Axboec8d1ba52020-09-14 11:07:26 -06006670 goto again;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006671 }
6672
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03006673 to_submit = io_sqring_entries(ctx);
Jens Axboec8d1ba52020-09-14 11:07:26 -06006674 if (!to_submit || ret == -EBUSY)
6675 return SQT_IDLE;
6676 }
6677
Jens Axboe534ca6d2020-09-02 13:52:19 -06006678 finish_wait(&sqd->wait, &ctx->sqo_wait_entry);
Jens Axboec8d1ba52020-09-14 11:07:26 -06006679 io_ring_clear_wakeup_flag(ctx);
6680
Jens Axboee95eee22020-09-08 09:11:32 -06006681 /* if we're handling multiple rings, cap submit size for fairness */
6682 if (cap_entries && to_submit > 8)
6683 to_submit = 8;
6684
Jens Axboec8d1ba52020-09-14 11:07:26 -06006685 mutex_lock(&ctx->uring_lock);
6686 if (likely(!percpu_ref_is_dying(&ctx->refs)))
6687 ret = io_submit_sqes(ctx, to_submit);
6688 mutex_unlock(&ctx->uring_lock);
Jens Axboe90554202020-09-03 12:12:41 -06006689
6690 if (!io_sqring_full(ctx) && wq_has_sleeper(&ctx->sqo_sq_wait))
6691 wake_up(&ctx->sqo_sq_wait);
6692
Jens Axboec8d1ba52020-09-14 11:07:26 -06006693 return SQT_DID_WORK;
6694}
6695
Jens Axboe69fb2132020-09-14 11:16:23 -06006696static void io_sqd_init_new(struct io_sq_data *sqd)
6697{
6698 struct io_ring_ctx *ctx;
6699
6700 while (!list_empty(&sqd->ctx_new_list)) {
6701 ctx = list_first_entry(&sqd->ctx_new_list, struct io_ring_ctx, sqd_list);
6702 init_wait(&ctx->sqo_wait_entry);
6703 ctx->sqo_wait_entry.func = io_sq_wake_function;
6704 list_move_tail(&ctx->sqd_list, &sqd->ctx_list);
6705 complete(&ctx->sq_thread_comp);
6706 }
6707}
6708
Jens Axboe6c271ce2019-01-10 11:22:30 -07006709static int io_sq_thread(void *data)
6710{
Dennis Zhou91d8f512020-09-16 13:41:05 -07006711 struct cgroup_subsys_state *cur_css = NULL;
Jens Axboe69fb2132020-09-14 11:16:23 -06006712 const struct cred *old_cred = NULL;
6713 struct io_sq_data *sqd = data;
6714 struct io_ring_ctx *ctx;
Jens Axboec8d1ba52020-09-14 11:07:26 -06006715 unsigned long start_jiffies;
Jens Axboe6c271ce2019-01-10 11:22:30 -07006716
Jens Axboec8d1ba52020-09-14 11:07:26 -06006717 start_jiffies = jiffies;
Jens Axboe69fb2132020-09-14 11:16:23 -06006718 while (!kthread_should_stop()) {
6719 enum sq_ret ret = 0;
Jens Axboee95eee22020-09-08 09:11:32 -06006720 bool cap_entries;
Jens Axboec1edbf52019-11-10 16:56:04 -07006721
6722 /*
Jens Axboe69fb2132020-09-14 11:16:23 -06006723 * Any changes to the sqd lists are synchronized through the
6724 * kthread parking. This synchronizes the thread vs users,
6725 * the users are synchronized on the sqd->ctx_lock.
Jens Axboec1edbf52019-11-10 16:56:04 -07006726 */
Jens Axboe69fb2132020-09-14 11:16:23 -06006727 if (kthread_should_park())
6728 kthread_parkme();
6729
6730 if (unlikely(!list_empty(&sqd->ctx_new_list)))
6731 io_sqd_init_new(sqd);
6732
Jens Axboee95eee22020-09-08 09:11:32 -06006733 cap_entries = !list_is_singular(&sqd->ctx_list);
6734
Jens Axboe69fb2132020-09-14 11:16:23 -06006735 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list) {
6736 if (current->cred != ctx->creds) {
6737 if (old_cred)
6738 revert_creds(old_cred);
6739 old_cred = override_creds(ctx->creds);
6740 }
Dennis Zhou91d8f512020-09-16 13:41:05 -07006741 io_sq_thread_associate_blkcg(ctx, &cur_css);
Jens Axboe4ea33a92020-10-15 13:46:44 -06006742#ifdef CONFIG_AUDIT
6743 current->loginuid = ctx->loginuid;
6744 current->sessionid = ctx->sessionid;
6745#endif
Jens Axboe69fb2132020-09-14 11:16:23 -06006746
Jens Axboee95eee22020-09-08 09:11:32 -06006747 ret |= __io_sq_thread(ctx, start_jiffies, cap_entries);
Jens Axboe69fb2132020-09-14 11:16:23 -06006748
Jens Axboe4349f302020-07-09 15:07:01 -06006749 io_sq_thread_drop_mm();
Jens Axboe6c271ce2019-01-10 11:22:30 -07006750 }
6751
Jens Axboe69fb2132020-09-14 11:16:23 -06006752 if (ret & SQT_SPIN) {
Jens Axboec8d1ba52020-09-14 11:07:26 -06006753 io_run_task_work();
6754 cond_resched();
Jens Axboe69fb2132020-09-14 11:16:23 -06006755 } else if (ret == SQT_IDLE) {
6756 if (kthread_should_park())
6757 continue;
6758 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
6759 io_ring_set_wakeup_flag(ctx);
6760 schedule();
6761 start_jiffies = jiffies;
6762 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
6763 io_ring_clear_wakeup_flag(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07006764 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07006765 }
6766
Jens Axboe4c6e2772020-07-01 11:29:10 -06006767 io_run_task_work();
Jens Axboeb41e9852020-02-17 09:52:41 -07006768
Dennis Zhou91d8f512020-09-16 13:41:05 -07006769 if (cur_css)
6770 io_sq_thread_unassociate_blkcg();
Jens Axboe69fb2132020-09-14 11:16:23 -06006771 if (old_cred)
6772 revert_creds(old_cred);
Jens Axboe06058632019-04-13 09:26:03 -06006773
Roman Penyaev2bbcd6d2019-05-16 10:53:57 +02006774 kthread_parkme();
Jens Axboe06058632019-04-13 09:26:03 -06006775
Jens Axboe6c271ce2019-01-10 11:22:30 -07006776 return 0;
6777}
6778
Jens Axboebda52162019-09-24 13:47:15 -06006779struct io_wait_queue {
6780 struct wait_queue_entry wq;
6781 struct io_ring_ctx *ctx;
6782 unsigned to_wait;
6783 unsigned nr_timeouts;
6784};
6785
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006786static inline bool io_should_wake(struct io_wait_queue *iowq, bool noflush)
Jens Axboebda52162019-09-24 13:47:15 -06006787{
6788 struct io_ring_ctx *ctx = iowq->ctx;
6789
6790 /*
Brian Gianforcarod195a662019-12-13 03:09:50 -08006791 * Wake up if we have enough events, or if a timeout occurred since we
Jens Axboebda52162019-09-24 13:47:15 -06006792 * started waiting. For timeouts, we always want to return to userspace,
6793 * regardless of event count.
6794 */
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006795 return io_cqring_events(ctx, noflush) >= iowq->to_wait ||
Jens Axboebda52162019-09-24 13:47:15 -06006796 atomic_read(&ctx->cq_timeouts) != iowq->nr_timeouts;
6797}
6798
6799static int io_wake_function(struct wait_queue_entry *curr, unsigned int mode,
6800 int wake_flags, void *key)
6801{
6802 struct io_wait_queue *iowq = container_of(curr, struct io_wait_queue,
6803 wq);
6804
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006805 /* use noflush == true, as we can't safely rely on locking context */
6806 if (!io_should_wake(iowq, true))
Jens Axboebda52162019-09-24 13:47:15 -06006807 return -1;
6808
6809 return autoremove_wake_function(curr, mode, wake_flags, key);
6810}
6811
Jens Axboeaf9c1a42020-09-24 13:32:18 -06006812static int io_run_task_work_sig(void)
6813{
6814 if (io_run_task_work())
6815 return 1;
6816 if (!signal_pending(current))
6817 return 0;
6818 if (current->jobctl & JOBCTL_TASK_WORK) {
6819 spin_lock_irq(&current->sighand->siglock);
6820 current->jobctl &= ~JOBCTL_TASK_WORK;
6821 recalc_sigpending();
6822 spin_unlock_irq(&current->sighand->siglock);
6823 return 1;
6824 }
6825 return -EINTR;
6826}
6827
Jens Axboe2b188cc2019-01-07 10:46:33 -07006828/*
6829 * Wait until events become available, if we don't already have some. The
6830 * application must reap them itself, as they reside on the shared cq ring.
6831 */
6832static int io_cqring_wait(struct io_ring_ctx *ctx, int min_events,
6833 const sigset_t __user *sig, size_t sigsz)
6834{
Jens Axboebda52162019-09-24 13:47:15 -06006835 struct io_wait_queue iowq = {
6836 .wq = {
6837 .private = current,
6838 .func = io_wake_function,
6839 .entry = LIST_HEAD_INIT(iowq.wq.entry),
6840 },
6841 .ctx = ctx,
6842 .to_wait = min_events,
6843 };
Hristo Venev75b28af2019-08-26 17:23:46 +00006844 struct io_rings *rings = ctx->rings;
Jackie Liue9ffa5c2019-10-29 11:16:42 +08006845 int ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006846
Jens Axboeb41e9852020-02-17 09:52:41 -07006847 do {
6848 if (io_cqring_events(ctx, false) >= min_events)
6849 return 0;
Jens Axboe4c6e2772020-07-01 11:29:10 -06006850 if (!io_run_task_work())
Jens Axboeb41e9852020-02-17 09:52:41 -07006851 break;
Jens Axboeb41e9852020-02-17 09:52:41 -07006852 } while (1);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006853
6854 if (sig) {
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01006855#ifdef CONFIG_COMPAT
6856 if (in_compat_syscall())
6857 ret = set_compat_user_sigmask((const compat_sigset_t __user *)sig,
Oleg Nesterovb7724342019-07-16 16:29:53 -07006858 sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01006859 else
6860#endif
Oleg Nesterovb7724342019-07-16 16:29:53 -07006861 ret = set_user_sigmask(sig, sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01006862
Jens Axboe2b188cc2019-01-07 10:46:33 -07006863 if (ret)
6864 return ret;
6865 }
6866
Jens Axboebda52162019-09-24 13:47:15 -06006867 iowq.nr_timeouts = atomic_read(&ctx->cq_timeouts);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02006868 trace_io_uring_cqring_wait(ctx, min_events);
Jens Axboebda52162019-09-24 13:47:15 -06006869 do {
6870 prepare_to_wait_exclusive(&ctx->wait, &iowq.wq,
6871 TASK_INTERRUPTIBLE);
Jens Axboece593a62020-06-30 12:39:05 -06006872 /* make sure we run task_work before checking for signals */
Jens Axboeaf9c1a42020-09-24 13:32:18 -06006873 ret = io_run_task_work_sig();
6874 if (ret > 0)
Jens Axboe4c6e2772020-07-01 11:29:10 -06006875 continue;
Jens Axboeaf9c1a42020-09-24 13:32:18 -06006876 else if (ret < 0)
Jens Axboece593a62020-06-30 12:39:05 -06006877 break;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07006878 if (io_should_wake(&iowq, false))
Jens Axboebda52162019-09-24 13:47:15 -06006879 break;
6880 schedule();
Jens Axboebda52162019-09-24 13:47:15 -06006881 } while (1);
6882 finish_wait(&ctx->wait, &iowq.wq);
6883
Jens Axboeb7db41c2020-07-04 08:55:50 -06006884 restore_saved_sigmask_unless(ret == -EINTR);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006885
Hristo Venev75b28af2019-08-26 17:23:46 +00006886 return READ_ONCE(rings->cq.head) == READ_ONCE(rings->cq.tail) ? ret : 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006887}
6888
Jens Axboe6b063142019-01-10 22:13:58 -07006889static void __io_sqe_files_unregister(struct io_ring_ctx *ctx)
6890{
6891#if defined(CONFIG_UNIX)
6892 if (ctx->ring_sock) {
6893 struct sock *sock = ctx->ring_sock->sk;
6894 struct sk_buff *skb;
6895
6896 while ((skb = skb_dequeue(&sock->sk_receive_queue)) != NULL)
6897 kfree_skb(skb);
6898 }
6899#else
6900 int i;
6901
Jens Axboe65e19f52019-10-26 07:20:21 -06006902 for (i = 0; i < ctx->nr_user_files; i++) {
6903 struct file *file;
6904
6905 file = io_file_from_index(ctx, i);
6906 if (file)
6907 fput(file);
6908 }
Jens Axboe6b063142019-01-10 22:13:58 -07006909#endif
6910}
6911
Jens Axboe05f3fb32019-12-09 11:22:50 -07006912static void io_file_ref_kill(struct percpu_ref *ref)
6913{
6914 struct fixed_file_data *data;
6915
6916 data = container_of(ref, struct fixed_file_data, refs);
6917 complete(&data->done);
6918}
6919
Jens Axboe6b063142019-01-10 22:13:58 -07006920static int io_sqe_files_unregister(struct io_ring_ctx *ctx)
6921{
Jens Axboe05f3fb32019-12-09 11:22:50 -07006922 struct fixed_file_data *data = ctx->file_data;
Xiaoguang Wang05589552020-03-31 14:05:18 +08006923 struct fixed_file_ref_node *ref_node = NULL;
Jens Axboe65e19f52019-10-26 07:20:21 -06006924 unsigned nr_tables, i;
6925
Jens Axboe05f3fb32019-12-09 11:22:50 -07006926 if (!data)
Jens Axboe6b063142019-01-10 22:13:58 -07006927 return -ENXIO;
6928
Jens Axboe6a4d07c2020-05-15 14:30:38 -06006929 spin_lock(&data->lock);
Xiaoguang Wang05589552020-03-31 14:05:18 +08006930 if (!list_empty(&data->ref_list))
6931 ref_node = list_first_entry(&data->ref_list,
6932 struct fixed_file_ref_node, node);
Jens Axboe6a4d07c2020-05-15 14:30:38 -06006933 spin_unlock(&data->lock);
Xiaoguang Wang05589552020-03-31 14:05:18 +08006934 if (ref_node)
6935 percpu_ref_kill(&ref_node->refs);
6936
6937 percpu_ref_kill(&data->refs);
6938
6939 /* wait for all refs nodes to complete */
Jens Axboe4a38aed22020-05-14 17:21:15 -06006940 flush_delayed_work(&ctx->file_put_work);
Jens Axboe2faf8522020-02-04 19:54:55 -07006941 wait_for_completion(&data->done);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006942
Jens Axboe6b063142019-01-10 22:13:58 -07006943 __io_sqe_files_unregister(ctx);
Jens Axboe65e19f52019-10-26 07:20:21 -06006944 nr_tables = DIV_ROUND_UP(ctx->nr_user_files, IORING_MAX_FILES_TABLE);
6945 for (i = 0; i < nr_tables; i++)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006946 kfree(data->table[i].files);
6947 kfree(data->table);
Xiaoguang Wang05589552020-03-31 14:05:18 +08006948 percpu_ref_exit(&data->refs);
6949 kfree(data);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006950 ctx->file_data = NULL;
Jens Axboe6b063142019-01-10 22:13:58 -07006951 ctx->nr_user_files = 0;
6952 return 0;
6953}
6954
Jens Axboe534ca6d2020-09-02 13:52:19 -06006955static void io_put_sq_data(struct io_sq_data *sqd)
Jens Axboe6c271ce2019-01-10 11:22:30 -07006956{
Jens Axboe534ca6d2020-09-02 13:52:19 -06006957 if (refcount_dec_and_test(&sqd->refs)) {
Roman Penyaev2bbcd6d2019-05-16 10:53:57 +02006958 /*
6959 * The park is a bit of a work-around, without it we get
6960 * warning spews on shutdown with SQPOLL set and affinity
6961 * set to a single CPU.
6962 */
Jens Axboe534ca6d2020-09-02 13:52:19 -06006963 if (sqd->thread) {
6964 kthread_park(sqd->thread);
6965 kthread_stop(sqd->thread);
6966 }
6967
6968 kfree(sqd);
6969 }
6970}
6971
Jens Axboeaa061652020-09-02 14:50:27 -06006972static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
6973{
6974 struct io_ring_ctx *ctx_attach;
6975 struct io_sq_data *sqd;
6976 struct fd f;
6977
6978 f = fdget(p->wq_fd);
6979 if (!f.file)
6980 return ERR_PTR(-ENXIO);
6981 if (f.file->f_op != &io_uring_fops) {
6982 fdput(f);
6983 return ERR_PTR(-EINVAL);
6984 }
6985
6986 ctx_attach = f.file->private_data;
6987 sqd = ctx_attach->sq_data;
6988 if (!sqd) {
6989 fdput(f);
6990 return ERR_PTR(-EINVAL);
6991 }
6992
6993 refcount_inc(&sqd->refs);
6994 fdput(f);
6995 return sqd;
6996}
6997
Jens Axboe534ca6d2020-09-02 13:52:19 -06006998static struct io_sq_data *io_get_sq_data(struct io_uring_params *p)
6999{
7000 struct io_sq_data *sqd;
7001
Jens Axboeaa061652020-09-02 14:50:27 -06007002 if (p->flags & IORING_SETUP_ATTACH_WQ)
7003 return io_attach_sq_data(p);
7004
Jens Axboe534ca6d2020-09-02 13:52:19 -06007005 sqd = kzalloc(sizeof(*sqd), GFP_KERNEL);
7006 if (!sqd)
7007 return ERR_PTR(-ENOMEM);
7008
7009 refcount_set(&sqd->refs, 1);
Jens Axboe69fb2132020-09-14 11:16:23 -06007010 INIT_LIST_HEAD(&sqd->ctx_list);
7011 INIT_LIST_HEAD(&sqd->ctx_new_list);
7012 mutex_init(&sqd->ctx_lock);
7013 mutex_init(&sqd->lock);
Jens Axboe534ca6d2020-09-02 13:52:19 -06007014 init_waitqueue_head(&sqd->wait);
7015 return sqd;
7016}
7017
Jens Axboe69fb2132020-09-14 11:16:23 -06007018static void io_sq_thread_unpark(struct io_sq_data *sqd)
7019 __releases(&sqd->lock)
7020{
7021 if (!sqd->thread)
7022 return;
7023 kthread_unpark(sqd->thread);
7024 mutex_unlock(&sqd->lock);
7025}
7026
7027static void io_sq_thread_park(struct io_sq_data *sqd)
7028 __acquires(&sqd->lock)
7029{
7030 if (!sqd->thread)
7031 return;
7032 mutex_lock(&sqd->lock);
7033 kthread_park(sqd->thread);
7034}
7035
Jens Axboe534ca6d2020-09-02 13:52:19 -06007036static void io_sq_thread_stop(struct io_ring_ctx *ctx)
7037{
7038 struct io_sq_data *sqd = ctx->sq_data;
7039
7040 if (sqd) {
7041 if (sqd->thread) {
7042 /*
7043 * We may arrive here from the error branch in
7044 * io_sq_offload_create() where the kthread is created
7045 * without being waked up, thus wake it up now to make
7046 * sure the wait will complete.
7047 */
7048 wake_up_process(sqd->thread);
7049 wait_for_completion(&ctx->sq_thread_comp);
Jens Axboe69fb2132020-09-14 11:16:23 -06007050
7051 io_sq_thread_park(sqd);
7052 }
7053
7054 mutex_lock(&sqd->ctx_lock);
7055 list_del(&ctx->sqd_list);
7056 mutex_unlock(&sqd->ctx_lock);
7057
7058 if (sqd->thread) {
7059 finish_wait(&sqd->wait, &ctx->sqo_wait_entry);
7060 io_sq_thread_unpark(sqd);
Jens Axboe534ca6d2020-09-02 13:52:19 -06007061 }
7062
7063 io_put_sq_data(sqd);
7064 ctx->sq_data = NULL;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007065 }
7066}
7067
Jens Axboe6b063142019-01-10 22:13:58 -07007068static void io_finish_async(struct io_ring_ctx *ctx)
7069{
Jens Axboe6c271ce2019-01-10 11:22:30 -07007070 io_sq_thread_stop(ctx);
7071
Jens Axboe561fb042019-10-24 07:25:42 -06007072 if (ctx->io_wq) {
7073 io_wq_destroy(ctx->io_wq);
7074 ctx->io_wq = NULL;
Jens Axboe6b063142019-01-10 22:13:58 -07007075 }
7076}
7077
7078#if defined(CONFIG_UNIX)
Jens Axboe6b063142019-01-10 22:13:58 -07007079/*
7080 * Ensure the UNIX gc is aware of our file set, so we are certain that
7081 * the io_uring can be safely unregistered on process exit, even if we have
7082 * loops in the file referencing.
7083 */
7084static int __io_sqe_files_scm(struct io_ring_ctx *ctx, int nr, int offset)
7085{
7086 struct sock *sk = ctx->ring_sock->sk;
7087 struct scm_fp_list *fpl;
7088 struct sk_buff *skb;
Jens Axboe08a45172019-10-03 08:11:03 -06007089 int i, nr_files;
Jens Axboe6b063142019-01-10 22:13:58 -07007090
Jens Axboe6b063142019-01-10 22:13:58 -07007091 fpl = kzalloc(sizeof(*fpl), GFP_KERNEL);
7092 if (!fpl)
7093 return -ENOMEM;
7094
7095 skb = alloc_skb(0, GFP_KERNEL);
7096 if (!skb) {
7097 kfree(fpl);
7098 return -ENOMEM;
7099 }
7100
7101 skb->sk = sk;
Jens Axboe6b063142019-01-10 22:13:58 -07007102
Jens Axboe08a45172019-10-03 08:11:03 -06007103 nr_files = 0;
Jens Axboe6b063142019-01-10 22:13:58 -07007104 fpl->user = get_uid(ctx->user);
7105 for (i = 0; i < nr; i++) {
Jens Axboe65e19f52019-10-26 07:20:21 -06007106 struct file *file = io_file_from_index(ctx, i + offset);
7107
7108 if (!file)
Jens Axboe08a45172019-10-03 08:11:03 -06007109 continue;
Jens Axboe65e19f52019-10-26 07:20:21 -06007110 fpl->fp[nr_files] = get_file(file);
Jens Axboe08a45172019-10-03 08:11:03 -06007111 unix_inflight(fpl->user, fpl->fp[nr_files]);
7112 nr_files++;
Jens Axboe6b063142019-01-10 22:13:58 -07007113 }
7114
Jens Axboe08a45172019-10-03 08:11:03 -06007115 if (nr_files) {
7116 fpl->max = SCM_MAX_FD;
7117 fpl->count = nr_files;
7118 UNIXCB(skb).fp = fpl;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007119 skb->destructor = unix_destruct_scm;
Jens Axboe08a45172019-10-03 08:11:03 -06007120 refcount_add(skb->truesize, &sk->sk_wmem_alloc);
7121 skb_queue_head(&sk->sk_receive_queue, skb);
Jens Axboe6b063142019-01-10 22:13:58 -07007122
Jens Axboe08a45172019-10-03 08:11:03 -06007123 for (i = 0; i < nr_files; i++)
7124 fput(fpl->fp[i]);
7125 } else {
7126 kfree_skb(skb);
7127 kfree(fpl);
7128 }
Jens Axboe6b063142019-01-10 22:13:58 -07007129
7130 return 0;
7131}
7132
7133/*
7134 * If UNIX sockets are enabled, fd passing can cause a reference cycle which
7135 * causes regular reference counting to break down. We rely on the UNIX
7136 * garbage collection to take care of this problem for us.
7137 */
7138static int io_sqe_files_scm(struct io_ring_ctx *ctx)
7139{
7140 unsigned left, total;
7141 int ret = 0;
7142
7143 total = 0;
7144 left = ctx->nr_user_files;
7145 while (left) {
7146 unsigned this_files = min_t(unsigned, left, SCM_MAX_FD);
Jens Axboe6b063142019-01-10 22:13:58 -07007147
7148 ret = __io_sqe_files_scm(ctx, this_files, total);
7149 if (ret)
7150 break;
7151 left -= this_files;
7152 total += this_files;
7153 }
7154
7155 if (!ret)
7156 return 0;
7157
7158 while (total < ctx->nr_user_files) {
Jens Axboe65e19f52019-10-26 07:20:21 -06007159 struct file *file = io_file_from_index(ctx, total);
7160
7161 if (file)
7162 fput(file);
Jens Axboe6b063142019-01-10 22:13:58 -07007163 total++;
7164 }
7165
7166 return ret;
7167}
7168#else
7169static int io_sqe_files_scm(struct io_ring_ctx *ctx)
7170{
7171 return 0;
7172}
7173#endif
7174
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007175static int io_sqe_alloc_file_tables(struct fixed_file_data *file_data,
7176 unsigned nr_tables, unsigned nr_files)
Jens Axboe65e19f52019-10-26 07:20:21 -06007177{
7178 int i;
7179
7180 for (i = 0; i < nr_tables; i++) {
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007181 struct fixed_file_table *table = &file_data->table[i];
Jens Axboe65e19f52019-10-26 07:20:21 -06007182 unsigned this_files;
7183
7184 this_files = min(nr_files, IORING_MAX_FILES_TABLE);
7185 table->files = kcalloc(this_files, sizeof(struct file *),
7186 GFP_KERNEL);
7187 if (!table->files)
7188 break;
7189 nr_files -= this_files;
7190 }
7191
7192 if (i == nr_tables)
7193 return 0;
7194
7195 for (i = 0; i < nr_tables; i++) {
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007196 struct fixed_file_table *table = &file_data->table[i];
Jens Axboe65e19f52019-10-26 07:20:21 -06007197 kfree(table->files);
7198 }
7199 return 1;
7200}
7201
Jens Axboe05f3fb32019-12-09 11:22:50 -07007202static void io_ring_file_put(struct io_ring_ctx *ctx, struct file *file)
Jens Axboec3a31e62019-10-03 13:59:56 -06007203{
7204#if defined(CONFIG_UNIX)
Jens Axboec3a31e62019-10-03 13:59:56 -06007205 struct sock *sock = ctx->ring_sock->sk;
7206 struct sk_buff_head list, *head = &sock->sk_receive_queue;
7207 struct sk_buff *skb;
7208 int i;
7209
7210 __skb_queue_head_init(&list);
7211
7212 /*
7213 * Find the skb that holds this file in its SCM_RIGHTS. When found,
7214 * remove this entry and rearrange the file array.
7215 */
7216 skb = skb_dequeue(head);
7217 while (skb) {
7218 struct scm_fp_list *fp;
7219
7220 fp = UNIXCB(skb).fp;
7221 for (i = 0; i < fp->count; i++) {
7222 int left;
7223
7224 if (fp->fp[i] != file)
7225 continue;
7226
7227 unix_notinflight(fp->user, fp->fp[i]);
7228 left = fp->count - 1 - i;
7229 if (left) {
7230 memmove(&fp->fp[i], &fp->fp[i + 1],
7231 left * sizeof(struct file *));
7232 }
7233 fp->count--;
7234 if (!fp->count) {
7235 kfree_skb(skb);
7236 skb = NULL;
7237 } else {
7238 __skb_queue_tail(&list, skb);
7239 }
7240 fput(file);
7241 file = NULL;
7242 break;
7243 }
7244
7245 if (!file)
7246 break;
7247
7248 __skb_queue_tail(&list, skb);
7249
7250 skb = skb_dequeue(head);
7251 }
7252
7253 if (skb_peek(&list)) {
7254 spin_lock_irq(&head->lock);
7255 while ((skb = __skb_dequeue(&list)) != NULL)
7256 __skb_queue_tail(head, skb);
7257 spin_unlock_irq(&head->lock);
7258 }
7259#else
Jens Axboe05f3fb32019-12-09 11:22:50 -07007260 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06007261#endif
7262}
7263
Jens Axboe05f3fb32019-12-09 11:22:50 -07007264struct io_file_put {
Xiaoguang Wang05589552020-03-31 14:05:18 +08007265 struct list_head list;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007266 struct file *file;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007267};
7268
Jens Axboe4a38aed22020-05-14 17:21:15 -06007269static void __io_file_put_work(struct fixed_file_ref_node *ref_node)
Jens Axboe05f3fb32019-12-09 11:22:50 -07007270{
Jens Axboe4a38aed22020-05-14 17:21:15 -06007271 struct fixed_file_data *file_data = ref_node->file_data;
7272 struct io_ring_ctx *ctx = file_data->ctx;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007273 struct io_file_put *pfile, *tmp;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007274
7275 list_for_each_entry_safe(pfile, tmp, &ref_node->file_list, list) {
Jens Axboe6a4d07c2020-05-15 14:30:38 -06007276 list_del(&pfile->list);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007277 io_ring_file_put(ctx, pfile->file);
7278 kfree(pfile);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007279 }
7280
Jens Axboe6a4d07c2020-05-15 14:30:38 -06007281 spin_lock(&file_data->lock);
7282 list_del(&ref_node->node);
7283 spin_unlock(&file_data->lock);
Jens Axboe2faf8522020-02-04 19:54:55 -07007284
Xiaoguang Wang05589552020-03-31 14:05:18 +08007285 percpu_ref_exit(&ref_node->refs);
7286 kfree(ref_node);
7287 percpu_ref_put(&file_data->refs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007288}
7289
Jens Axboe4a38aed22020-05-14 17:21:15 -06007290static void io_file_put_work(struct work_struct *work)
7291{
7292 struct io_ring_ctx *ctx;
7293 struct llist_node *node;
7294
7295 ctx = container_of(work, struct io_ring_ctx, file_put_work.work);
7296 node = llist_del_all(&ctx->file_put_llist);
7297
7298 while (node) {
7299 struct fixed_file_ref_node *ref_node;
7300 struct llist_node *next = node->next;
7301
7302 ref_node = llist_entry(node, struct fixed_file_ref_node, llist);
7303 __io_file_put_work(ref_node);
7304 node = next;
7305 }
7306}
7307
Jens Axboe05f3fb32019-12-09 11:22:50 -07007308static void io_file_data_ref_zero(struct percpu_ref *ref)
7309{
Xiaoguang Wang05589552020-03-31 14:05:18 +08007310 struct fixed_file_ref_node *ref_node;
Jens Axboe4a38aed22020-05-14 17:21:15 -06007311 struct io_ring_ctx *ctx;
7312 bool first_add;
7313 int delay = HZ;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007314
Xiaoguang Wang05589552020-03-31 14:05:18 +08007315 ref_node = container_of(ref, struct fixed_file_ref_node, refs);
Jens Axboe4a38aed22020-05-14 17:21:15 -06007316 ctx = ref_node->file_data->ctx;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007317
Jens Axboe4a38aed22020-05-14 17:21:15 -06007318 if (percpu_ref_is_dying(&ctx->file_data->refs))
7319 delay = 0;
7320
7321 first_add = llist_add(&ref_node->llist, &ctx->file_put_llist);
7322 if (!delay)
7323 mod_delayed_work(system_wq, &ctx->file_put_work, 0);
7324 else if (first_add)
7325 queue_delayed_work(system_wq, &ctx->file_put_work, delay);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007326}
7327
7328static struct fixed_file_ref_node *alloc_fixed_file_ref_node(
7329 struct io_ring_ctx *ctx)
7330{
7331 struct fixed_file_ref_node *ref_node;
7332
7333 ref_node = kzalloc(sizeof(*ref_node), GFP_KERNEL);
7334 if (!ref_node)
7335 return ERR_PTR(-ENOMEM);
7336
7337 if (percpu_ref_init(&ref_node->refs, io_file_data_ref_zero,
7338 0, GFP_KERNEL)) {
7339 kfree(ref_node);
7340 return ERR_PTR(-ENOMEM);
7341 }
7342 INIT_LIST_HEAD(&ref_node->node);
7343 INIT_LIST_HEAD(&ref_node->file_list);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007344 ref_node->file_data = ctx->file_data;
7345 return ref_node;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007346}
7347
7348static void destroy_fixed_file_ref_node(struct fixed_file_ref_node *ref_node)
7349{
7350 percpu_ref_exit(&ref_node->refs);
7351 kfree(ref_node);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007352}
7353
7354static int io_sqe_files_register(struct io_ring_ctx *ctx, void __user *arg,
7355 unsigned nr_args)
7356{
7357 __s32 __user *fds = (__s32 __user *) arg;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007358 unsigned nr_tables, i;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007359 struct file *file;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007360 int fd, ret = -ENOMEM;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007361 struct fixed_file_ref_node *ref_node;
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007362 struct fixed_file_data *file_data;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007363
7364 if (ctx->file_data)
7365 return -EBUSY;
7366 if (!nr_args)
7367 return -EINVAL;
7368 if (nr_args > IORING_MAX_FIXED_FILES)
7369 return -EMFILE;
7370
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007371 file_data = kzalloc(sizeof(*ctx->file_data), GFP_KERNEL);
7372 if (!file_data)
Jens Axboe05f3fb32019-12-09 11:22:50 -07007373 return -ENOMEM;
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007374 file_data->ctx = ctx;
7375 init_completion(&file_data->done);
7376 INIT_LIST_HEAD(&file_data->ref_list);
7377 spin_lock_init(&file_data->lock);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007378
7379 nr_tables = DIV_ROUND_UP(nr_args, IORING_MAX_FILES_TABLE);
Colin Ian King035fbaf2020-10-12 15:03:41 +01007380 file_data->table = kcalloc(nr_tables, sizeof(*file_data->table),
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007381 GFP_KERNEL);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007382 if (!file_data->table)
7383 goto out_free;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007384
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007385 if (percpu_ref_init(&file_data->refs, io_file_ref_kill,
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007386 PERCPU_REF_ALLOW_REINIT, GFP_KERNEL))
7387 goto out_free;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007388
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007389 if (io_sqe_alloc_file_tables(file_data, nr_tables, nr_args))
7390 goto out_ref;
Jens Axboe55cbc252020-10-14 07:35:57 -06007391 ctx->file_data = file_data;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007392
7393 for (i = 0; i < nr_args; i++, ctx->nr_user_files++) {
7394 struct fixed_file_table *table;
7395 unsigned index;
7396
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007397 if (copy_from_user(&fd, &fds[i], sizeof(fd))) {
7398 ret = -EFAULT;
7399 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007400 }
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007401 /* allow sparse sets */
7402 if (fd == -1)
7403 continue;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007404
Jens Axboe05f3fb32019-12-09 11:22:50 -07007405 file = fget(fd);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007406 ret = -EBADF;
7407 if (!file)
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007408 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007409
7410 /*
7411 * Don't allow io_uring instances to be registered. If UNIX
7412 * isn't enabled, then this causes a reference cycle and this
7413 * instance can never get freed. If UNIX is enabled we'll
7414 * handle it just fine, but there's still no point in allowing
7415 * a ring fd as it doesn't support regular read/write anyway.
7416 */
7417 if (file->f_op == &io_uring_fops) {
7418 fput(file);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007419 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007420 }
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007421 table = &file_data->table[i >> IORING_FILE_TABLE_SHIFT];
7422 index = i & IORING_FILE_TABLE_MASK;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007423 table->files[index] = file;
7424 }
7425
Jens Axboe05f3fb32019-12-09 11:22:50 -07007426 ret = io_sqe_files_scm(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007427 if (ret) {
Jens Axboe05f3fb32019-12-09 11:22:50 -07007428 io_sqe_files_unregister(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007429 return ret;
7430 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07007431
Xiaoguang Wang05589552020-03-31 14:05:18 +08007432 ref_node = alloc_fixed_file_ref_node(ctx);
7433 if (IS_ERR(ref_node)) {
7434 io_sqe_files_unregister(ctx);
7435 return PTR_ERR(ref_node);
7436 }
7437
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007438 file_data->node = ref_node;
Pavel Begunkov5398ae62020-10-10 18:34:14 +01007439 spin_lock(&file_data->lock);
7440 list_add(&ref_node->node, &file_data->ref_list);
7441 spin_unlock(&file_data->lock);
7442 percpu_ref_get(&file_data->refs);
Jens Axboe05f3fb32019-12-09 11:22:50 -07007443 return ret;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01007444out_fput:
7445 for (i = 0; i < ctx->nr_user_files; i++) {
7446 file = io_file_from_index(ctx, i);
7447 if (file)
7448 fput(file);
7449 }
7450 for (i = 0; i < nr_tables; i++)
7451 kfree(file_data->table[i].files);
7452 ctx->nr_user_files = 0;
7453out_ref:
7454 percpu_ref_exit(&file_data->refs);
7455out_free:
7456 kfree(file_data->table);
7457 kfree(file_data);
Jens Axboe55cbc252020-10-14 07:35:57 -06007458 ctx->file_data = NULL;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007459 return ret;
7460}
7461
Jens Axboec3a31e62019-10-03 13:59:56 -06007462static int io_sqe_file_register(struct io_ring_ctx *ctx, struct file *file,
7463 int index)
7464{
7465#if defined(CONFIG_UNIX)
7466 struct sock *sock = ctx->ring_sock->sk;
7467 struct sk_buff_head *head = &sock->sk_receive_queue;
7468 struct sk_buff *skb;
7469
7470 /*
7471 * See if we can merge this file into an existing skb SCM_RIGHTS
7472 * file set. If there's no room, fall back to allocating a new skb
7473 * and filling it in.
7474 */
7475 spin_lock_irq(&head->lock);
7476 skb = skb_peek(head);
7477 if (skb) {
7478 struct scm_fp_list *fpl = UNIXCB(skb).fp;
7479
7480 if (fpl->count < SCM_MAX_FD) {
7481 __skb_unlink(skb, head);
7482 spin_unlock_irq(&head->lock);
7483 fpl->fp[fpl->count] = get_file(file);
7484 unix_inflight(fpl->user, fpl->fp[fpl->count]);
7485 fpl->count++;
7486 spin_lock_irq(&head->lock);
7487 __skb_queue_head(head, skb);
7488 } else {
7489 skb = NULL;
7490 }
7491 }
7492 spin_unlock_irq(&head->lock);
7493
7494 if (skb) {
7495 fput(file);
7496 return 0;
7497 }
7498
7499 return __io_sqe_files_scm(ctx, 1, index);
7500#else
7501 return 0;
7502#endif
7503}
7504
Hillf Dantona5318d32020-03-23 17:47:15 +08007505static int io_queue_file_removal(struct fixed_file_data *data,
Xiaoguang Wang05589552020-03-31 14:05:18 +08007506 struct file *file)
Jens Axboe05f3fb32019-12-09 11:22:50 -07007507{
Hillf Dantona5318d32020-03-23 17:47:15 +08007508 struct io_file_put *pfile;
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007509 struct fixed_file_ref_node *ref_node = data->node;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007510
Jens Axboe05f3fb32019-12-09 11:22:50 -07007511 pfile = kzalloc(sizeof(*pfile), GFP_KERNEL);
Hillf Dantona5318d32020-03-23 17:47:15 +08007512 if (!pfile)
7513 return -ENOMEM;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007514
7515 pfile->file = file;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007516 list_add(&pfile->list, &ref_node->file_list);
7517
Hillf Dantona5318d32020-03-23 17:47:15 +08007518 return 0;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007519}
7520
7521static int __io_sqe_files_update(struct io_ring_ctx *ctx,
7522 struct io_uring_files_update *up,
7523 unsigned nr_args)
7524{
7525 struct fixed_file_data *data = ctx->file_data;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007526 struct fixed_file_ref_node *ref_node;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007527 struct file *file;
Jens Axboec3a31e62019-10-03 13:59:56 -06007528 __s32 __user *fds;
7529 int fd, i, err;
7530 __u32 done;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007531 bool needs_switch = false;
Jens Axboec3a31e62019-10-03 13:59:56 -06007532
Jens Axboe05f3fb32019-12-09 11:22:50 -07007533 if (check_add_overflow(up->offset, nr_args, &done))
Jens Axboec3a31e62019-10-03 13:59:56 -06007534 return -EOVERFLOW;
7535 if (done > ctx->nr_user_files)
7536 return -EINVAL;
7537
Xiaoguang Wang05589552020-03-31 14:05:18 +08007538 ref_node = alloc_fixed_file_ref_node(ctx);
7539 if (IS_ERR(ref_node))
7540 return PTR_ERR(ref_node);
7541
Jens Axboec3a31e62019-10-03 13:59:56 -06007542 done = 0;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007543 fds = u64_to_user_ptr(up->fds);
Jens Axboec3a31e62019-10-03 13:59:56 -06007544 while (nr_args) {
Jens Axboe65e19f52019-10-26 07:20:21 -06007545 struct fixed_file_table *table;
7546 unsigned index;
7547
Jens Axboec3a31e62019-10-03 13:59:56 -06007548 err = 0;
7549 if (copy_from_user(&fd, &fds[done], sizeof(fd))) {
7550 err = -EFAULT;
7551 break;
7552 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07007553 i = array_index_nospec(up->offset, ctx->nr_user_files);
7554 table = &ctx->file_data->table[i >> IORING_FILE_TABLE_SHIFT];
Jens Axboe65e19f52019-10-26 07:20:21 -06007555 index = i & IORING_FILE_TABLE_MASK;
7556 if (table->files[index]) {
Jiufei Xue98dfd502020-09-01 13:35:02 +08007557 file = table->files[index];
Hillf Dantona5318d32020-03-23 17:47:15 +08007558 err = io_queue_file_removal(data, file);
7559 if (err)
7560 break;
Jens Axboe65e19f52019-10-26 07:20:21 -06007561 table->files[index] = NULL;
Xiaoguang Wang05589552020-03-31 14:05:18 +08007562 needs_switch = true;
Jens Axboec3a31e62019-10-03 13:59:56 -06007563 }
7564 if (fd != -1) {
Jens Axboec3a31e62019-10-03 13:59:56 -06007565 file = fget(fd);
7566 if (!file) {
7567 err = -EBADF;
7568 break;
7569 }
7570 /*
7571 * Don't allow io_uring instances to be registered. If
7572 * UNIX isn't enabled, then this causes a reference
7573 * cycle and this instance can never get freed. If UNIX
7574 * is enabled we'll handle it just fine, but there's
7575 * still no point in allowing a ring fd as it doesn't
7576 * support regular read/write anyway.
7577 */
7578 if (file->f_op == &io_uring_fops) {
7579 fput(file);
7580 err = -EBADF;
7581 break;
7582 }
Jens Axboe65e19f52019-10-26 07:20:21 -06007583 table->files[index] = file;
Jens Axboec3a31e62019-10-03 13:59:56 -06007584 err = io_sqe_file_register(ctx, file, i);
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00007585 if (err) {
Jiufei Xue95d1c8e2020-09-02 17:59:39 +08007586 table->files[index] = NULL;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00007587 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06007588 break;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00007589 }
Jens Axboec3a31e62019-10-03 13:59:56 -06007590 }
7591 nr_args--;
7592 done++;
Jens Axboe05f3fb32019-12-09 11:22:50 -07007593 up->offset++;
7594 }
7595
Xiaoguang Wang05589552020-03-31 14:05:18 +08007596 if (needs_switch) {
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007597 percpu_ref_kill(&data->node->refs);
Jens Axboe6a4d07c2020-05-15 14:30:38 -06007598 spin_lock(&data->lock);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007599 list_add(&ref_node->node, &data->ref_list);
Pavel Begunkovb2e96852020-10-10 18:34:16 +01007600 data->node = ref_node;
Jens Axboe6a4d07c2020-05-15 14:30:38 -06007601 spin_unlock(&data->lock);
Xiaoguang Wang05589552020-03-31 14:05:18 +08007602 percpu_ref_get(&ctx->file_data->refs);
7603 } else
7604 destroy_fixed_file_ref_node(ref_node);
Jens Axboec3a31e62019-10-03 13:59:56 -06007605
7606 return done ? done : err;
7607}
Xiaoguang Wang05589552020-03-31 14:05:18 +08007608
Jens Axboe05f3fb32019-12-09 11:22:50 -07007609static int io_sqe_files_update(struct io_ring_ctx *ctx, void __user *arg,
7610 unsigned nr_args)
7611{
7612 struct io_uring_files_update up;
7613
7614 if (!ctx->file_data)
7615 return -ENXIO;
7616 if (!nr_args)
7617 return -EINVAL;
7618 if (copy_from_user(&up, arg, sizeof(up)))
7619 return -EFAULT;
7620 if (up.resv)
7621 return -EINVAL;
7622
7623 return __io_sqe_files_update(ctx, &up, nr_args);
7624}
Jens Axboec3a31e62019-10-03 13:59:56 -06007625
Pavel Begunkove9fd9392020-03-04 16:14:12 +03007626static void io_free_work(struct io_wq_work *work)
Jens Axboe7d723062019-11-12 22:31:31 -07007627{
7628 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
7629
Pavel Begunkove9fd9392020-03-04 16:14:12 +03007630 /* Consider that io_steal_work() relies on this ref */
Jens Axboe7d723062019-11-12 22:31:31 -07007631 io_put_req(req);
7632}
7633
Pavel Begunkov24369c22020-01-28 03:15:48 +03007634static int io_init_wq_offload(struct io_ring_ctx *ctx,
7635 struct io_uring_params *p)
7636{
7637 struct io_wq_data data;
7638 struct fd f;
7639 struct io_ring_ctx *ctx_attach;
7640 unsigned int concurrency;
7641 int ret = 0;
7642
7643 data.user = ctx->user;
Pavel Begunkove9fd9392020-03-04 16:14:12 +03007644 data.free_work = io_free_work;
Pavel Begunkovf5fa38c2020-06-08 21:08:20 +03007645 data.do_work = io_wq_submit_work;
Pavel Begunkov24369c22020-01-28 03:15:48 +03007646
7647 if (!(p->flags & IORING_SETUP_ATTACH_WQ)) {
7648 /* Do QD, or 4 * CPUS, whatever is smallest */
7649 concurrency = min(ctx->sq_entries, 4 * num_online_cpus());
7650
7651 ctx->io_wq = io_wq_create(concurrency, &data);
7652 if (IS_ERR(ctx->io_wq)) {
7653 ret = PTR_ERR(ctx->io_wq);
7654 ctx->io_wq = NULL;
7655 }
7656 return ret;
7657 }
7658
7659 f = fdget(p->wq_fd);
7660 if (!f.file)
7661 return -EBADF;
7662
7663 if (f.file->f_op != &io_uring_fops) {
7664 ret = -EINVAL;
7665 goto out_fput;
7666 }
7667
7668 ctx_attach = f.file->private_data;
7669 /* @io_wq is protected by holding the fd */
7670 if (!io_wq_get(ctx_attach->io_wq, &data)) {
7671 ret = -EINVAL;
7672 goto out_fput;
7673 }
7674
7675 ctx->io_wq = ctx_attach->io_wq;
7676out_fput:
7677 fdput(f);
7678 return ret;
7679}
7680
Jens Axboe0f212202020-09-13 13:09:39 -06007681static int io_uring_alloc_task_context(struct task_struct *task)
7682{
7683 struct io_uring_task *tctx;
Jens Axboed8a6df12020-10-15 16:24:45 -06007684 int ret;
Jens Axboe0f212202020-09-13 13:09:39 -06007685
7686 tctx = kmalloc(sizeof(*tctx), GFP_KERNEL);
7687 if (unlikely(!tctx))
7688 return -ENOMEM;
7689
Jens Axboed8a6df12020-10-15 16:24:45 -06007690 ret = percpu_counter_init(&tctx->inflight, 0, GFP_KERNEL);
7691 if (unlikely(ret)) {
7692 kfree(tctx);
7693 return ret;
7694 }
7695
Jens Axboe0f212202020-09-13 13:09:39 -06007696 xa_init(&tctx->xa);
7697 init_waitqueue_head(&tctx->wait);
7698 tctx->last = NULL;
Jens Axboefdaf0832020-10-30 09:37:30 -06007699 atomic_set(&tctx->in_idle, 0);
7700 tctx->sqpoll = false;
Jens Axboe500a3732020-10-15 17:38:03 -06007701 io_init_identity(&tctx->__identity);
7702 tctx->identity = &tctx->__identity;
Jens Axboe0f212202020-09-13 13:09:39 -06007703 task->io_uring = tctx;
7704 return 0;
7705}
7706
7707void __io_uring_free(struct task_struct *tsk)
7708{
7709 struct io_uring_task *tctx = tsk->io_uring;
7710
7711 WARN_ON_ONCE(!xa_empty(&tctx->xa));
Jens Axboe500a3732020-10-15 17:38:03 -06007712 WARN_ON_ONCE(refcount_read(&tctx->identity->count) != 1);
7713 if (tctx->identity != &tctx->__identity)
7714 kfree(tctx->identity);
Jens Axboed8a6df12020-10-15 16:24:45 -06007715 percpu_counter_destroy(&tctx->inflight);
Jens Axboe0f212202020-09-13 13:09:39 -06007716 kfree(tctx);
7717 tsk->io_uring = NULL;
7718}
7719
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02007720static int io_sq_offload_create(struct io_ring_ctx *ctx,
7721 struct io_uring_params *p)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007722{
7723 int ret;
7724
Jens Axboe6c271ce2019-01-10 11:22:30 -07007725 if (ctx->flags & IORING_SETUP_SQPOLL) {
Jens Axboe534ca6d2020-09-02 13:52:19 -06007726 struct io_sq_data *sqd;
7727
Jens Axboe3ec482d2019-04-08 10:51:01 -06007728 ret = -EPERM;
7729 if (!capable(CAP_SYS_ADMIN))
7730 goto err;
7731
Jens Axboe534ca6d2020-09-02 13:52:19 -06007732 sqd = io_get_sq_data(p);
7733 if (IS_ERR(sqd)) {
7734 ret = PTR_ERR(sqd);
7735 goto err;
7736 }
Jens Axboe69fb2132020-09-14 11:16:23 -06007737
Jens Axboe534ca6d2020-09-02 13:52:19 -06007738 ctx->sq_data = sqd;
Jens Axboe69fb2132020-09-14 11:16:23 -06007739 io_sq_thread_park(sqd);
7740 mutex_lock(&sqd->ctx_lock);
7741 list_add(&ctx->sqd_list, &sqd->ctx_new_list);
7742 mutex_unlock(&sqd->ctx_lock);
7743 io_sq_thread_unpark(sqd);
Jens Axboe534ca6d2020-09-02 13:52:19 -06007744
Jens Axboe917257d2019-04-13 09:28:55 -06007745 ctx->sq_thread_idle = msecs_to_jiffies(p->sq_thread_idle);
7746 if (!ctx->sq_thread_idle)
7747 ctx->sq_thread_idle = HZ;
7748
Jens Axboeaa061652020-09-02 14:50:27 -06007749 if (sqd->thread)
7750 goto done;
7751
Jens Axboe6c271ce2019-01-10 11:22:30 -07007752 if (p->flags & IORING_SETUP_SQ_AFF) {
Jens Axboe44a9bd12019-05-14 20:00:30 -06007753 int cpu = p->sq_thread_cpu;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007754
Jens Axboe917257d2019-04-13 09:28:55 -06007755 ret = -EINVAL;
Jens Axboe44a9bd12019-05-14 20:00:30 -06007756 if (cpu >= nr_cpu_ids)
7757 goto err;
Shenghui Wang7889f442019-05-07 16:03:19 +08007758 if (!cpu_online(cpu))
Jens Axboe917257d2019-04-13 09:28:55 -06007759 goto err;
7760
Jens Axboe69fb2132020-09-14 11:16:23 -06007761 sqd->thread = kthread_create_on_cpu(io_sq_thread, sqd,
Jens Axboe534ca6d2020-09-02 13:52:19 -06007762 cpu, "io_uring-sq");
Jens Axboe6c271ce2019-01-10 11:22:30 -07007763 } else {
Jens Axboe69fb2132020-09-14 11:16:23 -06007764 sqd->thread = kthread_create(io_sq_thread, sqd,
Jens Axboe6c271ce2019-01-10 11:22:30 -07007765 "io_uring-sq");
7766 }
Jens Axboe534ca6d2020-09-02 13:52:19 -06007767 if (IS_ERR(sqd->thread)) {
7768 ret = PTR_ERR(sqd->thread);
7769 sqd->thread = NULL;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007770 goto err;
7771 }
Jens Axboe534ca6d2020-09-02 13:52:19 -06007772 ret = io_uring_alloc_task_context(sqd->thread);
Jens Axboe0f212202020-09-13 13:09:39 -06007773 if (ret)
7774 goto err;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007775 } else if (p->flags & IORING_SETUP_SQ_AFF) {
7776 /* Can't have SQ_AFF without SQPOLL */
7777 ret = -EINVAL;
7778 goto err;
7779 }
7780
Jens Axboeaa061652020-09-02 14:50:27 -06007781done:
Pavel Begunkov24369c22020-01-28 03:15:48 +03007782 ret = io_init_wq_offload(ctx, p);
7783 if (ret)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007784 goto err;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007785
7786 return 0;
7787err:
Jens Axboe54a91f32019-09-10 09:15:04 -06007788 io_finish_async(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007789 return ret;
7790}
7791
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02007792static void io_sq_offload_start(struct io_ring_ctx *ctx)
7793{
Jens Axboe534ca6d2020-09-02 13:52:19 -06007794 struct io_sq_data *sqd = ctx->sq_data;
7795
7796 if ((ctx->flags & IORING_SETUP_SQPOLL) && sqd->thread)
7797 wake_up_process(sqd->thread);
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02007798}
7799
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007800static inline void __io_unaccount_mem(struct user_struct *user,
7801 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007802{
7803 atomic_long_sub(nr_pages, &user->locked_vm);
7804}
7805
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007806static inline int __io_account_mem(struct user_struct *user,
7807 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007808{
7809 unsigned long page_limit, cur_pages, new_pages;
7810
7811 /* Don't allow more pages than we can safely lock */
7812 page_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
7813
7814 do {
7815 cur_pages = atomic_long_read(&user->locked_vm);
7816 new_pages = cur_pages + nr_pages;
7817 if (new_pages > page_limit)
7818 return -ENOMEM;
7819 } while (atomic_long_cmpxchg(&user->locked_vm, cur_pages,
7820 new_pages) != cur_pages);
7821
7822 return 0;
7823}
7824
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007825static void io_unaccount_mem(struct io_ring_ctx *ctx, unsigned long nr_pages,
7826 enum io_mem_account acct)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007827{
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07007828 if (ctx->limit_mem)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007829 __io_unaccount_mem(ctx->user, nr_pages);
Bijan Mottahedeh30975822020-06-16 16:36:09 -07007830
Jens Axboe2aede0e2020-09-14 10:45:53 -06007831 if (ctx->mm_account) {
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007832 if (acct == ACCT_LOCKED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007833 ctx->mm_account->locked_vm -= nr_pages;
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007834 else if (acct == ACCT_PINNED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007835 atomic64_sub(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007836 }
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007837}
7838
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007839static int io_account_mem(struct io_ring_ctx *ctx, unsigned long nr_pages,
7840 enum io_mem_account acct)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007841{
Bijan Mottahedeh30975822020-06-16 16:36:09 -07007842 int ret;
7843
7844 if (ctx->limit_mem) {
7845 ret = __io_account_mem(ctx->user, nr_pages);
7846 if (ret)
7847 return ret;
7848 }
7849
Jens Axboe2aede0e2020-09-14 10:45:53 -06007850 if (ctx->mm_account) {
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007851 if (acct == ACCT_LOCKED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007852 ctx->mm_account->locked_vm += nr_pages;
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007853 else if (acct == ACCT_PINNED)
Jens Axboe2aede0e2020-09-14 10:45:53 -06007854 atomic64_add(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeh2e0464d2020-06-16 16:36:10 -07007855 }
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07007856
7857 return 0;
7858}
7859
Jens Axboe2b188cc2019-01-07 10:46:33 -07007860static void io_mem_free(void *ptr)
7861{
Mark Rutland52e04ef2019-04-30 17:30:21 +01007862 struct page *page;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007863
Mark Rutland52e04ef2019-04-30 17:30:21 +01007864 if (!ptr)
7865 return;
7866
7867 page = virt_to_head_page(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007868 if (put_page_testzero(page))
7869 free_compound_page(page);
7870}
7871
7872static void *io_mem_alloc(size_t size)
7873{
7874 gfp_t gfp_flags = GFP_KERNEL | __GFP_ZERO | __GFP_NOWARN | __GFP_COMP |
7875 __GFP_NORETRY;
7876
7877 return (void *) __get_free_pages(gfp_flags, get_order(size));
7878}
7879
Hristo Venev75b28af2019-08-26 17:23:46 +00007880static unsigned long rings_size(unsigned sq_entries, unsigned cq_entries,
7881 size_t *sq_offset)
7882{
7883 struct io_rings *rings;
7884 size_t off, sq_array_size;
7885
7886 off = struct_size(rings, cqes, cq_entries);
7887 if (off == SIZE_MAX)
7888 return SIZE_MAX;
7889
7890#ifdef CONFIG_SMP
7891 off = ALIGN(off, SMP_CACHE_BYTES);
7892 if (off == 0)
7893 return SIZE_MAX;
7894#endif
7895
Dmitry Vyukovb36200f2020-07-11 11:31:11 +02007896 if (sq_offset)
7897 *sq_offset = off;
7898
Hristo Venev75b28af2019-08-26 17:23:46 +00007899 sq_array_size = array_size(sizeof(u32), sq_entries);
7900 if (sq_array_size == SIZE_MAX)
7901 return SIZE_MAX;
7902
7903 if (check_add_overflow(off, sq_array_size, &off))
7904 return SIZE_MAX;
7905
Hristo Venev75b28af2019-08-26 17:23:46 +00007906 return off;
7907}
7908
Jens Axboe2b188cc2019-01-07 10:46:33 -07007909static unsigned long ring_pages(unsigned sq_entries, unsigned cq_entries)
7910{
Hristo Venev75b28af2019-08-26 17:23:46 +00007911 size_t pages;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007912
Hristo Venev75b28af2019-08-26 17:23:46 +00007913 pages = (size_t)1 << get_order(
7914 rings_size(sq_entries, cq_entries, NULL));
7915 pages += (size_t)1 << get_order(
7916 array_size(sizeof(struct io_uring_sqe), sq_entries));
Jens Axboe2b188cc2019-01-07 10:46:33 -07007917
Hristo Venev75b28af2019-08-26 17:23:46 +00007918 return pages;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007919}
7920
Jens Axboeedafcce2019-01-09 09:16:05 -07007921static int io_sqe_buffer_unregister(struct io_ring_ctx *ctx)
7922{
7923 int i, j;
7924
7925 if (!ctx->user_bufs)
7926 return -ENXIO;
7927
7928 for (i = 0; i < ctx->nr_user_bufs; i++) {
7929 struct io_mapped_ubuf *imu = &ctx->user_bufs[i];
7930
7931 for (j = 0; j < imu->nr_bvecs; j++)
John Hubbardf1f6a7d2020-01-30 22:13:35 -08007932 unpin_user_page(imu->bvec[j].bv_page);
Jens Axboeedafcce2019-01-09 09:16:05 -07007933
Jens Axboede293932020-09-17 16:19:16 -06007934 if (imu->acct_pages)
7935 io_unaccount_mem(ctx, imu->acct_pages, ACCT_PINNED);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01007936 kvfree(imu->bvec);
Jens Axboeedafcce2019-01-09 09:16:05 -07007937 imu->nr_bvecs = 0;
7938 }
7939
7940 kfree(ctx->user_bufs);
7941 ctx->user_bufs = NULL;
7942 ctx->nr_user_bufs = 0;
7943 return 0;
7944}
7945
7946static int io_copy_iov(struct io_ring_ctx *ctx, struct iovec *dst,
7947 void __user *arg, unsigned index)
7948{
7949 struct iovec __user *src;
7950
7951#ifdef CONFIG_COMPAT
7952 if (ctx->compat) {
7953 struct compat_iovec __user *ciovs;
7954 struct compat_iovec ciov;
7955
7956 ciovs = (struct compat_iovec __user *) arg;
7957 if (copy_from_user(&ciov, &ciovs[index], sizeof(ciov)))
7958 return -EFAULT;
7959
Jens Axboed55e5f52019-12-11 16:12:15 -07007960 dst->iov_base = u64_to_user_ptr((u64)ciov.iov_base);
Jens Axboeedafcce2019-01-09 09:16:05 -07007961 dst->iov_len = ciov.iov_len;
7962 return 0;
7963 }
7964#endif
7965 src = (struct iovec __user *) arg;
7966 if (copy_from_user(dst, &src[index], sizeof(*dst)))
7967 return -EFAULT;
7968 return 0;
7969}
7970
Jens Axboede293932020-09-17 16:19:16 -06007971/*
7972 * Not super efficient, but this is just a registration time. And we do cache
7973 * the last compound head, so generally we'll only do a full search if we don't
7974 * match that one.
7975 *
7976 * We check if the given compound head page has already been accounted, to
7977 * avoid double accounting it. This allows us to account the full size of the
7978 * page, not just the constituent pages of a huge page.
7979 */
7980static bool headpage_already_acct(struct io_ring_ctx *ctx, struct page **pages,
7981 int nr_pages, struct page *hpage)
7982{
7983 int i, j;
7984
7985 /* check current page array */
7986 for (i = 0; i < nr_pages; i++) {
7987 if (!PageCompound(pages[i]))
7988 continue;
7989 if (compound_head(pages[i]) == hpage)
7990 return true;
7991 }
7992
7993 /* check previously registered pages */
7994 for (i = 0; i < ctx->nr_user_bufs; i++) {
7995 struct io_mapped_ubuf *imu = &ctx->user_bufs[i];
7996
7997 for (j = 0; j < imu->nr_bvecs; j++) {
7998 if (!PageCompound(imu->bvec[j].bv_page))
7999 continue;
8000 if (compound_head(imu->bvec[j].bv_page) == hpage)
8001 return true;
8002 }
8003 }
8004
8005 return false;
8006}
8007
8008static int io_buffer_account_pin(struct io_ring_ctx *ctx, struct page **pages,
8009 int nr_pages, struct io_mapped_ubuf *imu,
8010 struct page **last_hpage)
8011{
8012 int i, ret;
8013
8014 for (i = 0; i < nr_pages; i++) {
8015 if (!PageCompound(pages[i])) {
8016 imu->acct_pages++;
8017 } else {
8018 struct page *hpage;
8019
8020 hpage = compound_head(pages[i]);
8021 if (hpage == *last_hpage)
8022 continue;
8023 *last_hpage = hpage;
8024 if (headpage_already_acct(ctx, pages, i, hpage))
8025 continue;
8026 imu->acct_pages += page_size(hpage) >> PAGE_SHIFT;
8027 }
8028 }
8029
8030 if (!imu->acct_pages)
8031 return 0;
8032
8033 ret = io_account_mem(ctx, imu->acct_pages, ACCT_PINNED);
8034 if (ret)
8035 imu->acct_pages = 0;
8036 return ret;
8037}
8038
Jens Axboeedafcce2019-01-09 09:16:05 -07008039static int io_sqe_buffer_register(struct io_ring_ctx *ctx, void __user *arg,
8040 unsigned nr_args)
8041{
8042 struct vm_area_struct **vmas = NULL;
8043 struct page **pages = NULL;
Jens Axboede293932020-09-17 16:19:16 -06008044 struct page *last_hpage = NULL;
Jens Axboeedafcce2019-01-09 09:16:05 -07008045 int i, j, got_pages = 0;
8046 int ret = -EINVAL;
8047
8048 if (ctx->user_bufs)
8049 return -EBUSY;
8050 if (!nr_args || nr_args > UIO_MAXIOV)
8051 return -EINVAL;
8052
8053 ctx->user_bufs = kcalloc(nr_args, sizeof(struct io_mapped_ubuf),
8054 GFP_KERNEL);
8055 if (!ctx->user_bufs)
8056 return -ENOMEM;
8057
8058 for (i = 0; i < nr_args; i++) {
8059 struct io_mapped_ubuf *imu = &ctx->user_bufs[i];
8060 unsigned long off, start, end, ubuf;
8061 int pret, nr_pages;
8062 struct iovec iov;
8063 size_t size;
8064
8065 ret = io_copy_iov(ctx, &iov, arg, i);
8066 if (ret)
Pavel Begunkova2786822019-05-26 12:35:47 +03008067 goto err;
Jens Axboeedafcce2019-01-09 09:16:05 -07008068
8069 /*
8070 * Don't impose further limits on the size and buffer
8071 * constraints here, we'll -EINVAL later when IO is
8072 * submitted if they are wrong.
8073 */
8074 ret = -EFAULT;
8075 if (!iov.iov_base || !iov.iov_len)
8076 goto err;
8077
8078 /* arbitrary limit, but we need something */
8079 if (iov.iov_len > SZ_1G)
8080 goto err;
8081
8082 ubuf = (unsigned long) iov.iov_base;
8083 end = (ubuf + iov.iov_len + PAGE_SIZE - 1) >> PAGE_SHIFT;
8084 start = ubuf >> PAGE_SHIFT;
8085 nr_pages = end - start;
8086
Jens Axboeedafcce2019-01-09 09:16:05 -07008087 ret = 0;
8088 if (!pages || nr_pages > got_pages) {
Denis Efremova8c73c12020-06-05 12:32:03 +03008089 kvfree(vmas);
8090 kvfree(pages);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008091 pages = kvmalloc_array(nr_pages, sizeof(struct page *),
Jens Axboeedafcce2019-01-09 09:16:05 -07008092 GFP_KERNEL);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008093 vmas = kvmalloc_array(nr_pages,
Jens Axboeedafcce2019-01-09 09:16:05 -07008094 sizeof(struct vm_area_struct *),
8095 GFP_KERNEL);
8096 if (!pages || !vmas) {
8097 ret = -ENOMEM;
Jens Axboeedafcce2019-01-09 09:16:05 -07008098 goto err;
8099 }
8100 got_pages = nr_pages;
8101 }
8102
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008103 imu->bvec = kvmalloc_array(nr_pages, sizeof(struct bio_vec),
Jens Axboeedafcce2019-01-09 09:16:05 -07008104 GFP_KERNEL);
8105 ret = -ENOMEM;
Jens Axboede293932020-09-17 16:19:16 -06008106 if (!imu->bvec)
Jens Axboeedafcce2019-01-09 09:16:05 -07008107 goto err;
Jens Axboeedafcce2019-01-09 09:16:05 -07008108
8109 ret = 0;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -07008110 mmap_read_lock(current->mm);
John Hubbard2113b052020-01-30 22:13:13 -08008111 pret = pin_user_pages(ubuf, nr_pages,
Ira Weiny932f4a62019-05-13 17:17:03 -07008112 FOLL_WRITE | FOLL_LONGTERM,
8113 pages, vmas);
Jens Axboeedafcce2019-01-09 09:16:05 -07008114 if (pret == nr_pages) {
8115 /* don't support file backed memory */
8116 for (j = 0; j < nr_pages; j++) {
8117 struct vm_area_struct *vma = vmas[j];
8118
8119 if (vma->vm_file &&
8120 !is_file_hugepages(vma->vm_file)) {
8121 ret = -EOPNOTSUPP;
8122 break;
8123 }
8124 }
8125 } else {
8126 ret = pret < 0 ? pret : -EFAULT;
8127 }
Michel Lespinassed8ed45c2020-06-08 21:33:25 -07008128 mmap_read_unlock(current->mm);
Jens Axboeedafcce2019-01-09 09:16:05 -07008129 if (ret) {
8130 /*
8131 * if we did partial map, or found file backed vmas,
8132 * release any pages we did get
8133 */
John Hubbard27c4d3a2019-08-04 19:32:06 -07008134 if (pret > 0)
John Hubbardf1f6a7d2020-01-30 22:13:35 -08008135 unpin_user_pages(pages, pret);
Jens Axboede293932020-09-17 16:19:16 -06008136 kvfree(imu->bvec);
8137 goto err;
8138 }
8139
8140 ret = io_buffer_account_pin(ctx, pages, pret, imu, &last_hpage);
8141 if (ret) {
8142 unpin_user_pages(pages, pret);
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008143 kvfree(imu->bvec);
Jens Axboeedafcce2019-01-09 09:16:05 -07008144 goto err;
8145 }
8146
8147 off = ubuf & ~PAGE_MASK;
8148 size = iov.iov_len;
8149 for (j = 0; j < nr_pages; j++) {
8150 size_t vec_len;
8151
8152 vec_len = min_t(size_t, size, PAGE_SIZE - off);
8153 imu->bvec[j].bv_page = pages[j];
8154 imu->bvec[j].bv_len = vec_len;
8155 imu->bvec[j].bv_offset = off;
8156 off = 0;
8157 size -= vec_len;
8158 }
8159 /* store original address for later verification */
8160 imu->ubuf = ubuf;
8161 imu->len = iov.iov_len;
8162 imu->nr_bvecs = nr_pages;
8163
8164 ctx->nr_user_bufs++;
8165 }
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008166 kvfree(pages);
8167 kvfree(vmas);
Jens Axboeedafcce2019-01-09 09:16:05 -07008168 return 0;
8169err:
Mark Rutlandd4ef6472019-05-01 16:59:16 +01008170 kvfree(pages);
8171 kvfree(vmas);
Jens Axboeedafcce2019-01-09 09:16:05 -07008172 io_sqe_buffer_unregister(ctx);
8173 return ret;
8174}
8175
Jens Axboe9b402842019-04-11 11:45:41 -06008176static int io_eventfd_register(struct io_ring_ctx *ctx, void __user *arg)
8177{
8178 __s32 __user *fds = arg;
8179 int fd;
8180
8181 if (ctx->cq_ev_fd)
8182 return -EBUSY;
8183
8184 if (copy_from_user(&fd, fds, sizeof(*fds)))
8185 return -EFAULT;
8186
8187 ctx->cq_ev_fd = eventfd_ctx_fdget(fd);
8188 if (IS_ERR(ctx->cq_ev_fd)) {
8189 int ret = PTR_ERR(ctx->cq_ev_fd);
8190 ctx->cq_ev_fd = NULL;
8191 return ret;
8192 }
8193
8194 return 0;
8195}
8196
8197static int io_eventfd_unregister(struct io_ring_ctx *ctx)
8198{
8199 if (ctx->cq_ev_fd) {
8200 eventfd_ctx_put(ctx->cq_ev_fd);
8201 ctx->cq_ev_fd = NULL;
8202 return 0;
8203 }
8204
8205 return -ENXIO;
8206}
8207
Jens Axboe5a2e7452020-02-23 16:23:11 -07008208static int __io_destroy_buffers(int id, void *p, void *data)
8209{
8210 struct io_ring_ctx *ctx = data;
8211 struct io_buffer *buf = p;
8212
Jens Axboe067524e2020-03-02 16:32:28 -07008213 __io_remove_buffers(ctx, buf, id, -1U);
Jens Axboe5a2e7452020-02-23 16:23:11 -07008214 return 0;
8215}
8216
8217static void io_destroy_buffers(struct io_ring_ctx *ctx)
8218{
8219 idr_for_each(&ctx->io_buffer_idr, __io_destroy_buffers, ctx);
8220 idr_destroy(&ctx->io_buffer_idr);
8221}
8222
Jens Axboe2b188cc2019-01-07 10:46:33 -07008223static void io_ring_ctx_free(struct io_ring_ctx *ctx)
8224{
Jens Axboe6b063142019-01-10 22:13:58 -07008225 io_finish_async(ctx);
Jens Axboeedafcce2019-01-09 09:16:05 -07008226 io_sqe_buffer_unregister(ctx);
Jens Axboe2aede0e2020-09-14 10:45:53 -06008227
8228 if (ctx->sqo_task) {
8229 put_task_struct(ctx->sqo_task);
8230 ctx->sqo_task = NULL;
8231 mmdrop(ctx->mm_account);
8232 ctx->mm_account = NULL;
Bijan Mottahedeh30975822020-06-16 16:36:09 -07008233 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07008234
Dennis Zhou91d8f512020-09-16 13:41:05 -07008235#ifdef CONFIG_BLK_CGROUP
8236 if (ctx->sqo_blkcg_css)
8237 css_put(ctx->sqo_blkcg_css);
8238#endif
8239
Jens Axboe6b063142019-01-10 22:13:58 -07008240 io_sqe_files_unregister(ctx);
Jens Axboe9b402842019-04-11 11:45:41 -06008241 io_eventfd_unregister(ctx);
Jens Axboe5a2e7452020-02-23 16:23:11 -07008242 io_destroy_buffers(ctx);
Jens Axboe41726c92020-02-23 13:11:42 -07008243 idr_destroy(&ctx->personality_idr);
Jens Axboedef596e2019-01-09 08:59:42 -07008244
Jens Axboe2b188cc2019-01-07 10:46:33 -07008245#if defined(CONFIG_UNIX)
Eric Biggers355e8d22019-06-12 14:58:43 -07008246 if (ctx->ring_sock) {
8247 ctx->ring_sock->file = NULL; /* so that iput() is called */
Jens Axboe2b188cc2019-01-07 10:46:33 -07008248 sock_release(ctx->ring_sock);
Eric Biggers355e8d22019-06-12 14:58:43 -07008249 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07008250#endif
8251
Hristo Venev75b28af2019-08-26 17:23:46 +00008252 io_mem_free(ctx->rings);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008253 io_mem_free(ctx->sq_sqes);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008254
8255 percpu_ref_exit(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008256 free_uid(ctx->user);
Jens Axboe181e4482019-11-25 08:52:30 -07008257 put_cred(ctx->creds);
Jens Axboe78076bb2019-12-04 19:56:40 -07008258 kfree(ctx->cancel_hash);
Jens Axboe0ddf92e2019-11-08 08:52:53 -07008259 kmem_cache_free(req_cachep, ctx->fallback_req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008260 kfree(ctx);
8261}
8262
8263static __poll_t io_uring_poll(struct file *file, poll_table *wait)
8264{
8265 struct io_ring_ctx *ctx = file->private_data;
8266 __poll_t mask = 0;
8267
8268 poll_wait(file, &ctx->cq_wait, wait);
Stefan Bühler4f7067c2019-04-24 23:54:17 +02008269 /*
8270 * synchronizes with barrier from wq_has_sleeper call in
8271 * io_commit_cqring
8272 */
Jens Axboe2b188cc2019-01-07 10:46:33 -07008273 smp_rmb();
Jens Axboe90554202020-09-03 12:12:41 -06008274 if (!io_sqring_full(ctx))
Jens Axboe2b188cc2019-01-07 10:46:33 -07008275 mask |= EPOLLOUT | EPOLLWRNORM;
Stefano Garzarella63e5d812020-02-07 13:18:28 +01008276 if (io_cqring_events(ctx, false))
Jens Axboe2b188cc2019-01-07 10:46:33 -07008277 mask |= EPOLLIN | EPOLLRDNORM;
8278
8279 return mask;
8280}
8281
8282static int io_uring_fasync(int fd, struct file *file, int on)
8283{
8284 struct io_ring_ctx *ctx = file->private_data;
8285
8286 return fasync_helper(fd, file, on, &ctx->cq_fasync);
8287}
8288
Jens Axboe071698e2020-01-28 10:04:42 -07008289static int io_remove_personalities(int id, void *p, void *data)
8290{
8291 struct io_ring_ctx *ctx = data;
Jens Axboe1e6fa522020-10-15 08:46:24 -06008292 struct io_identity *iod;
Jens Axboe071698e2020-01-28 10:04:42 -07008293
Jens Axboe1e6fa522020-10-15 08:46:24 -06008294 iod = idr_remove(&ctx->personality_idr, id);
8295 if (iod) {
8296 put_cred(iod->creds);
8297 if (refcount_dec_and_test(&iod->count))
8298 kfree(iod);
8299 }
Jens Axboe071698e2020-01-28 10:04:42 -07008300 return 0;
8301}
8302
Jens Axboe85faa7b2020-04-09 18:14:00 -06008303static void io_ring_exit_work(struct work_struct *work)
8304{
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008305 struct io_ring_ctx *ctx = container_of(work, struct io_ring_ctx,
8306 exit_work);
Jens Axboe85faa7b2020-04-09 18:14:00 -06008307
Jens Axboe56952e92020-06-17 15:00:04 -06008308 /*
8309 * If we're doing polled IO and end up having requests being
8310 * submitted async (out-of-line), then completions can come in while
8311 * we're waiting for refs to drop. We need to reap these manually,
8312 * as nobody else will be looking for them.
8313 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008314 do {
Jens Axboe56952e92020-06-17 15:00:04 -06008315 if (ctx->rings)
Jens Axboee6c8aa92020-09-28 13:10:13 -06008316 io_cqring_overflow_flush(ctx, true, NULL, NULL);
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008317 io_iopoll_try_reap_events(ctx);
8318 } while (!wait_for_completion_timeout(&ctx->ref_comp, HZ/20));
Jens Axboe85faa7b2020-04-09 18:14:00 -06008319 io_ring_ctx_free(ctx);
8320}
8321
Jens Axboe2b188cc2019-01-07 10:46:33 -07008322static void io_ring_ctx_wait_and_kill(struct io_ring_ctx *ctx)
8323{
8324 mutex_lock(&ctx->uring_lock);
8325 percpu_ref_kill(&ctx->refs);
8326 mutex_unlock(&ctx->uring_lock);
8327
Jens Axboef3606e32020-09-22 08:18:24 -06008328 io_kill_timeouts(ctx, NULL);
8329 io_poll_remove_all(ctx, NULL);
Jens Axboe561fb042019-10-24 07:25:42 -06008330
8331 if (ctx->io_wq)
8332 io_wq_cancel_all(ctx->io_wq);
8333
Jens Axboe15dff282019-11-13 09:09:23 -07008334 /* if we failed setting up the ctx, we might not have any rings */
8335 if (ctx->rings)
Jens Axboee6c8aa92020-09-28 13:10:13 -06008336 io_cqring_overflow_flush(ctx, true, NULL, NULL);
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03008337 io_iopoll_try_reap_events(ctx);
Jens Axboe071698e2020-01-28 10:04:42 -07008338 idr_for_each(&ctx->personality_idr, io_remove_personalities, ctx);
Jens Axboe309fc032020-07-10 09:13:34 -06008339
8340 /*
8341 * Do this upfront, so we won't have a grace period where the ring
8342 * is closed but resources aren't reaped yet. This can cause
8343 * spurious failure in setting up a new ring.
8344 */
Jens Axboe760618f2020-07-24 12:53:31 -06008345 io_unaccount_mem(ctx, ring_pages(ctx->sq_entries, ctx->cq_entries),
8346 ACCT_LOCKED);
Jens Axboe309fc032020-07-10 09:13:34 -06008347
Jens Axboe85faa7b2020-04-09 18:14:00 -06008348 INIT_WORK(&ctx->exit_work, io_ring_exit_work);
Jens Axboefc666772020-08-19 11:10:51 -06008349 /*
8350 * Use system_unbound_wq to avoid spawning tons of event kworkers
8351 * if we're exiting a ton of rings at the same time. It just adds
8352 * noise and overhead, there's no discernable change in runtime
8353 * over using system_wq.
8354 */
8355 queue_work(system_unbound_wq, &ctx->exit_work);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008356}
8357
8358static int io_uring_release(struct inode *inode, struct file *file)
8359{
8360 struct io_ring_ctx *ctx = file->private_data;
8361
8362 file->private_data = NULL;
8363 io_ring_ctx_wait_and_kill(ctx);
8364 return 0;
8365}
8366
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008367static bool io_wq_files_match(struct io_wq_work *work, void *data)
8368{
8369 struct files_struct *files = data;
8370
Jens Axboedfead8a2020-10-14 10:12:37 -06008371 return !files || ((work->flags & IO_WQ_WORK_FILES) &&
Jens Axboe98447d62020-10-14 10:48:51 -06008372 work->identity->files == files);
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008373}
8374
Jens Axboef254ac02020-08-12 17:33:30 -06008375/*
8376 * Returns true if 'preq' is the link parent of 'req'
8377 */
8378static bool io_match_link(struct io_kiocb *preq, struct io_kiocb *req)
8379{
8380 struct io_kiocb *link;
8381
8382 if (!(preq->flags & REQ_F_LINK_HEAD))
8383 return false;
8384
8385 list_for_each_entry(link, &preq->link_list, link_list) {
8386 if (link == req)
8387 return true;
8388 }
8389
8390 return false;
8391}
8392
Pavel Begunkovc127a2a2020-09-06 00:45:15 +03008393static bool io_match_link_files(struct io_kiocb *req,
8394 struct files_struct *files)
8395{
8396 struct io_kiocb *link;
8397
8398 if (io_match_files(req, files))
8399 return true;
8400 if (req->flags & REQ_F_LINK_HEAD) {
8401 list_for_each_entry(link, &req->link_list, link_list) {
8402 if (io_match_files(link, files))
8403 return true;
8404 }
8405 }
8406 return false;
8407}
8408
Jens Axboef254ac02020-08-12 17:33:30 -06008409/*
8410 * We're looking to cancel 'req' because it's holding on to our files, but
8411 * 'req' could be a link to another request. See if it is, and cancel that
8412 * parent request if so.
8413 */
8414static bool io_poll_remove_link(struct io_ring_ctx *ctx, struct io_kiocb *req)
8415{
8416 struct hlist_node *tmp;
8417 struct io_kiocb *preq;
8418 bool found = false;
8419 int i;
8420
8421 spin_lock_irq(&ctx->completion_lock);
8422 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
8423 struct hlist_head *list;
8424
8425 list = &ctx->cancel_hash[i];
8426 hlist_for_each_entry_safe(preq, tmp, list, hash_node) {
8427 found = io_match_link(preq, req);
8428 if (found) {
8429 io_poll_remove_one(preq);
8430 break;
8431 }
8432 }
8433 }
8434 spin_unlock_irq(&ctx->completion_lock);
8435 return found;
8436}
8437
8438static bool io_timeout_remove_link(struct io_ring_ctx *ctx,
8439 struct io_kiocb *req)
8440{
8441 struct io_kiocb *preq;
8442 bool found = false;
8443
8444 spin_lock_irq(&ctx->completion_lock);
8445 list_for_each_entry(preq, &ctx->timeout_list, timeout.list) {
8446 found = io_match_link(preq, req);
8447 if (found) {
8448 __io_timeout_cancel(preq);
8449 break;
8450 }
8451 }
8452 spin_unlock_irq(&ctx->completion_lock);
8453 return found;
8454}
8455
Jens Axboeb711d4e2020-08-16 08:23:05 -07008456static bool io_cancel_link_cb(struct io_wq_work *work, void *data)
8457{
8458 return io_match_link(container_of(work, struct io_kiocb, work), data);
8459}
8460
8461static void io_attempt_cancel(struct io_ring_ctx *ctx, struct io_kiocb *req)
8462{
8463 enum io_wq_cancel cret;
8464
8465 /* cancel this particular work, if it's running */
8466 cret = io_wq_cancel_work(ctx->io_wq, &req->work);
8467 if (cret != IO_WQ_CANCEL_NOTFOUND)
8468 return;
8469
8470 /* find links that hold this pending, cancel those */
8471 cret = io_wq_cancel_cb(ctx->io_wq, io_cancel_link_cb, req, true);
8472 if (cret != IO_WQ_CANCEL_NOTFOUND)
8473 return;
8474
8475 /* if we have a poll link holding this pending, cancel that */
8476 if (io_poll_remove_link(ctx, req))
8477 return;
8478
8479 /* final option, timeout link is holding this req pending */
8480 io_timeout_remove_link(ctx, req);
8481}
8482
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03008483static void io_cancel_defer_files(struct io_ring_ctx *ctx,
8484 struct files_struct *files)
8485{
8486 struct io_defer_entry *de = NULL;
8487 LIST_HEAD(list);
8488
8489 spin_lock_irq(&ctx->completion_lock);
8490 list_for_each_entry_reverse(de, &ctx->defer_list, list) {
Pavel Begunkovc127a2a2020-09-06 00:45:15 +03008491 if (io_match_link_files(de->req, files)) {
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03008492 list_cut_position(&list, &ctx->defer_list, &de->list);
8493 break;
8494 }
8495 }
8496 spin_unlock_irq(&ctx->completion_lock);
8497
8498 while (!list_empty(&list)) {
8499 de = list_first_entry(&list, struct io_defer_entry, list);
8500 list_del_init(&de->list);
8501 req_set_fail_links(de->req);
8502 io_put_req(de->req);
8503 io_req_complete(de->req, -ECANCELED);
8504 kfree(de);
8505 }
8506}
8507
Jens Axboe76e1b642020-09-26 15:05:03 -06008508/*
8509 * Returns true if we found and killed one or more files pinning requests
8510 */
8511static bool io_uring_cancel_files(struct io_ring_ctx *ctx,
Jens Axboefcb323c2019-10-24 12:39:47 -06008512 struct files_struct *files)
8513{
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008514 if (list_empty_careful(&ctx->inflight_list))
Jens Axboe76e1b642020-09-26 15:05:03 -06008515 return false;
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008516
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03008517 io_cancel_defer_files(ctx, files);
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03008518 /* cancel all at once, should be faster than doing it one by one*/
8519 io_wq_cancel_cb(ctx->io_wq, io_wq_files_match, files, true);
8520
Jens Axboefcb323c2019-10-24 12:39:47 -06008521 while (!list_empty_careful(&ctx->inflight_list)) {
Xiaoguang Wangd8f1b972020-04-26 15:54:43 +08008522 struct io_kiocb *cancel_req = NULL, *req;
8523 DEFINE_WAIT(wait);
Jens Axboefcb323c2019-10-24 12:39:47 -06008524
8525 spin_lock_irq(&ctx->inflight_lock);
8526 list_for_each_entry(req, &ctx->inflight_list, inflight_entry) {
Jens Axboedfead8a2020-10-14 10:12:37 -06008527 if (files && (req->work.flags & IO_WQ_WORK_FILES) &&
Jens Axboe98447d62020-10-14 10:48:51 -06008528 req->work.identity->files != files)
Jens Axboe768134d2019-11-10 20:30:53 -07008529 continue;
8530 /* req is being completed, ignore */
8531 if (!refcount_inc_not_zero(&req->refs))
8532 continue;
8533 cancel_req = req;
8534 break;
Jens Axboefcb323c2019-10-24 12:39:47 -06008535 }
Jens Axboe768134d2019-11-10 20:30:53 -07008536 if (cancel_req)
Jens Axboefcb323c2019-10-24 12:39:47 -06008537 prepare_to_wait(&ctx->inflight_wait, &wait,
Jens Axboe768134d2019-11-10 20:30:53 -07008538 TASK_UNINTERRUPTIBLE);
Jens Axboefcb323c2019-10-24 12:39:47 -06008539 spin_unlock_irq(&ctx->inflight_lock);
8540
Jens Axboe768134d2019-11-10 20:30:53 -07008541 /* We need to keep going until we don't find a matching req */
8542 if (!cancel_req)
Jens Axboefcb323c2019-10-24 12:39:47 -06008543 break;
Pavel Begunkovbb175342020-08-20 11:33:35 +03008544 /* cancel this request, or head link requests */
8545 io_attempt_cancel(ctx, cancel_req);
8546 io_put_req(cancel_req);
Jens Axboe6200b0a2020-09-13 14:38:30 -06008547 /* cancellations _may_ trigger task work */
8548 io_run_task_work();
Jens Axboefcb323c2019-10-24 12:39:47 -06008549 schedule();
Xiaoguang Wangd8f1b972020-04-26 15:54:43 +08008550 finish_wait(&ctx->inflight_wait, &wait);
Jens Axboefcb323c2019-10-24 12:39:47 -06008551 }
Jens Axboe76e1b642020-09-26 15:05:03 -06008552
8553 return true;
Jens Axboefcb323c2019-10-24 12:39:47 -06008554}
8555
Pavel Begunkov801dd572020-06-15 10:33:14 +03008556static bool io_cancel_task_cb(struct io_wq_work *work, void *data)
Pavel Begunkov44e728b2020-06-15 10:24:04 +03008557{
Pavel Begunkov801dd572020-06-15 10:33:14 +03008558 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
8559 struct task_struct *task = data;
Pavel Begunkov44e728b2020-06-15 10:24:04 +03008560
Jens Axboef3606e32020-09-22 08:18:24 -06008561 return io_task_match(req, task);
Pavel Begunkov44e728b2020-06-15 10:24:04 +03008562}
8563
Jens Axboe0f212202020-09-13 13:09:39 -06008564static bool __io_uring_cancel_task_requests(struct io_ring_ctx *ctx,
8565 struct task_struct *task,
8566 struct files_struct *files)
8567{
8568 bool ret;
8569
8570 ret = io_uring_cancel_files(ctx, files);
8571 if (!files) {
8572 enum io_wq_cancel cret;
8573
8574 cret = io_wq_cancel_cb(ctx->io_wq, io_cancel_task_cb, task, true);
8575 if (cret != IO_WQ_CANCEL_NOTFOUND)
8576 ret = true;
8577
8578 /* SQPOLL thread does its own polling */
8579 if (!(ctx->flags & IORING_SETUP_SQPOLL)) {
8580 while (!list_empty_careful(&ctx->iopoll_list)) {
8581 io_iopoll_try_reap_events(ctx);
8582 ret = true;
8583 }
8584 }
8585
8586 ret |= io_poll_remove_all(ctx, task);
8587 ret |= io_kill_timeouts(ctx, task);
8588 }
8589
8590 return ret;
8591}
8592
8593/*
8594 * We need to iteratively cancel requests, in case a request has dependent
8595 * hard links. These persist even for failure of cancelations, hence keep
8596 * looping until none are found.
8597 */
8598static void io_uring_cancel_task_requests(struct io_ring_ctx *ctx,
8599 struct files_struct *files)
8600{
8601 struct task_struct *task = current;
8602
Jens Axboefdaf0832020-10-30 09:37:30 -06008603 if ((ctx->flags & IORING_SETUP_SQPOLL) && ctx->sq_data) {
Jens Axboe534ca6d2020-09-02 13:52:19 -06008604 task = ctx->sq_data->thread;
Jens Axboefdaf0832020-10-30 09:37:30 -06008605 atomic_inc(&task->io_uring->in_idle);
8606 io_sq_thread_park(ctx->sq_data);
8607 }
Jens Axboe0f212202020-09-13 13:09:39 -06008608
8609 io_cqring_overflow_flush(ctx, true, task, files);
8610
8611 while (__io_uring_cancel_task_requests(ctx, task, files)) {
8612 io_run_task_work();
8613 cond_resched();
8614 }
Jens Axboefdaf0832020-10-30 09:37:30 -06008615
8616 if ((ctx->flags & IORING_SETUP_SQPOLL) && ctx->sq_data) {
8617 atomic_dec(&task->io_uring->in_idle);
8618 /*
8619 * If the files that are going away are the ones in the thread
8620 * identity, clear them out.
8621 */
8622 if (task->io_uring->identity->files == files)
8623 task->io_uring->identity->files = NULL;
8624 io_sq_thread_unpark(ctx->sq_data);
8625 }
Jens Axboe0f212202020-09-13 13:09:39 -06008626}
8627
8628/*
8629 * Note that this task has used io_uring. We use it for cancelation purposes.
8630 */
Jens Axboefdaf0832020-10-30 09:37:30 -06008631static int io_uring_add_task_file(struct io_ring_ctx *ctx, struct file *file)
Jens Axboe0f212202020-09-13 13:09:39 -06008632{
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008633 struct io_uring_task *tctx = current->io_uring;
8634
8635 if (unlikely(!tctx)) {
Jens Axboe0f212202020-09-13 13:09:39 -06008636 int ret;
8637
8638 ret = io_uring_alloc_task_context(current);
8639 if (unlikely(ret))
8640 return ret;
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008641 tctx = current->io_uring;
Jens Axboe0f212202020-09-13 13:09:39 -06008642 }
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008643 if (tctx->last != file) {
8644 void *old = xa_load(&tctx->xa, (unsigned long)file);
Jens Axboe0f212202020-09-13 13:09:39 -06008645
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008646 if (!old) {
Jens Axboe0f212202020-09-13 13:09:39 -06008647 get_file(file);
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008648 xa_store(&tctx->xa, (unsigned long)file, file, GFP_KERNEL);
Jens Axboe0f212202020-09-13 13:09:39 -06008649 }
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01008650 tctx->last = file;
Jens Axboe0f212202020-09-13 13:09:39 -06008651 }
8652
Jens Axboefdaf0832020-10-30 09:37:30 -06008653 /*
8654 * This is race safe in that the task itself is doing this, hence it
8655 * cannot be going through the exit/cancel paths at the same time.
8656 * This cannot be modified while exit/cancel is running.
8657 */
8658 if (!tctx->sqpoll && (ctx->flags & IORING_SETUP_SQPOLL))
8659 tctx->sqpoll = true;
8660
Jens Axboe0f212202020-09-13 13:09:39 -06008661 return 0;
8662}
8663
8664/*
8665 * Remove this io_uring_file -> task mapping.
8666 */
8667static void io_uring_del_task_file(struct file *file)
8668{
8669 struct io_uring_task *tctx = current->io_uring;
Jens Axboe0f212202020-09-13 13:09:39 -06008670
8671 if (tctx->last == file)
8672 tctx->last = NULL;
Matthew Wilcox (Oracle)5e2ed8c2020-10-09 13:49:53 +01008673 file = xa_erase(&tctx->xa, (unsigned long)file);
Jens Axboe0f212202020-09-13 13:09:39 -06008674 if (file)
8675 fput(file);
8676}
8677
Jens Axboe0f212202020-09-13 13:09:39 -06008678/*
8679 * Drop task note for this file if we're the only ones that hold it after
8680 * pending fput()
8681 */
Pavel Begunkovc8fb20b2020-10-22 16:38:27 +01008682static void io_uring_attempt_task_drop(struct file *file)
Jens Axboe0f212202020-09-13 13:09:39 -06008683{
8684 if (!current->io_uring)
8685 return;
8686 /*
8687 * fput() is pending, will be 2 if the only other ref is our potential
8688 * task file note. If the task is exiting, drop regardless of count.
8689 */
Pavel Begunkovc8fb20b2020-10-22 16:38:27 +01008690 if (fatal_signal_pending(current) || (current->flags & PF_EXITING) ||
8691 atomic_long_read(&file->f_count) == 2)
8692 io_uring_del_task_file(file);
Jens Axboe0f212202020-09-13 13:09:39 -06008693}
8694
8695void __io_uring_files_cancel(struct files_struct *files)
8696{
8697 struct io_uring_task *tctx = current->io_uring;
Matthew Wilcox (Oracle)ce765372020-10-09 13:49:51 +01008698 struct file *file;
8699 unsigned long index;
Jens Axboe0f212202020-09-13 13:09:39 -06008700
8701 /* make sure overflow events are dropped */
Jens Axboefdaf0832020-10-30 09:37:30 -06008702 atomic_inc(&tctx->in_idle);
Jens Axboe0f212202020-09-13 13:09:39 -06008703
Matthew Wilcox (Oracle)ce765372020-10-09 13:49:51 +01008704 xa_for_each(&tctx->xa, index, file) {
8705 struct io_ring_ctx *ctx = file->private_data;
Jens Axboe0f212202020-09-13 13:09:39 -06008706
8707 io_uring_cancel_task_requests(ctx, files);
8708 if (files)
8709 io_uring_del_task_file(file);
Matthew Wilcox (Oracle)ce765372020-10-09 13:49:51 +01008710 }
Jens Axboefdaf0832020-10-30 09:37:30 -06008711
8712 atomic_dec(&tctx->in_idle);
8713}
8714
8715static s64 tctx_inflight(struct io_uring_task *tctx)
8716{
8717 unsigned long index;
8718 struct file *file;
8719 s64 inflight;
8720
8721 inflight = percpu_counter_sum(&tctx->inflight);
8722 if (!tctx->sqpoll)
8723 return inflight;
8724
8725 /*
8726 * If we have SQPOLL rings, then we need to iterate and find them, and
8727 * add the pending count for those.
8728 */
8729 xa_for_each(&tctx->xa, index, file) {
8730 struct io_ring_ctx *ctx = file->private_data;
8731
8732 if (ctx->flags & IORING_SETUP_SQPOLL) {
8733 struct io_uring_task *__tctx = ctx->sqo_task->io_uring;
8734
8735 inflight += percpu_counter_sum(&__tctx->inflight);
8736 }
8737 }
8738
8739 return inflight;
Jens Axboe0f212202020-09-13 13:09:39 -06008740}
8741
Jens Axboe0f212202020-09-13 13:09:39 -06008742/*
8743 * Find any io_uring fd that this task has registered or done IO on, and cancel
8744 * requests.
8745 */
8746void __io_uring_task_cancel(void)
8747{
8748 struct io_uring_task *tctx = current->io_uring;
8749 DEFINE_WAIT(wait);
Jens Axboed8a6df12020-10-15 16:24:45 -06008750 s64 inflight;
Jens Axboe0f212202020-09-13 13:09:39 -06008751
8752 /* make sure overflow events are dropped */
Jens Axboefdaf0832020-10-30 09:37:30 -06008753 atomic_inc(&tctx->in_idle);
Jens Axboe0f212202020-09-13 13:09:39 -06008754
Jens Axboed8a6df12020-10-15 16:24:45 -06008755 do {
Jens Axboe0f212202020-09-13 13:09:39 -06008756 /* read completions before cancelations */
Jens Axboefdaf0832020-10-30 09:37:30 -06008757 inflight = tctx_inflight(tctx);
Jens Axboed8a6df12020-10-15 16:24:45 -06008758 if (!inflight)
8759 break;
Jens Axboe0f212202020-09-13 13:09:39 -06008760 __io_uring_files_cancel(NULL);
8761
8762 prepare_to_wait(&tctx->wait, &wait, TASK_UNINTERRUPTIBLE);
8763
8764 /*
8765 * If we've seen completions, retry. This avoids a race where
8766 * a completion comes in before we did prepare_to_wait().
8767 */
Jens Axboefdaf0832020-10-30 09:37:30 -06008768 if (inflight != tctx_inflight(tctx))
Jens Axboe0f212202020-09-13 13:09:39 -06008769 continue;
Jens Axboe0f212202020-09-13 13:09:39 -06008770 schedule();
Jens Axboed8a6df12020-10-15 16:24:45 -06008771 } while (1);
Jens Axboe0f212202020-09-13 13:09:39 -06008772
8773 finish_wait(&tctx->wait, &wait);
Jens Axboefdaf0832020-10-30 09:37:30 -06008774 atomic_dec(&tctx->in_idle);
Jens Axboefcb323c2019-10-24 12:39:47 -06008775}
8776
8777static int io_uring_flush(struct file *file, void *data)
8778{
Pavel Begunkovc8fb20b2020-10-22 16:38:27 +01008779 io_uring_attempt_task_drop(file);
Jens Axboefcb323c2019-10-24 12:39:47 -06008780 return 0;
8781}
8782
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008783static void *io_uring_validate_mmap_request(struct file *file,
8784 loff_t pgoff, size_t sz)
Jens Axboe2b188cc2019-01-07 10:46:33 -07008785{
Jens Axboe2b188cc2019-01-07 10:46:33 -07008786 struct io_ring_ctx *ctx = file->private_data;
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008787 loff_t offset = pgoff << PAGE_SHIFT;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008788 struct page *page;
8789 void *ptr;
8790
8791 switch (offset) {
8792 case IORING_OFF_SQ_RING:
Hristo Venev75b28af2019-08-26 17:23:46 +00008793 case IORING_OFF_CQ_RING:
8794 ptr = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008795 break;
8796 case IORING_OFF_SQES:
8797 ptr = ctx->sq_sqes;
8798 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008799 default:
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008800 return ERR_PTR(-EINVAL);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008801 }
8802
8803 page = virt_to_head_page(ptr);
Matthew Wilcox (Oracle)a50b8542019-09-23 15:34:25 -07008804 if (sz > page_size(page))
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008805 return ERR_PTR(-EINVAL);
8806
8807 return ptr;
8808}
8809
8810#ifdef CONFIG_MMU
8811
8812static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
8813{
8814 size_t sz = vma->vm_end - vma->vm_start;
8815 unsigned long pfn;
8816 void *ptr;
8817
8818 ptr = io_uring_validate_mmap_request(file, vma->vm_pgoff, sz);
8819 if (IS_ERR(ptr))
8820 return PTR_ERR(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008821
8822 pfn = virt_to_phys(ptr) >> PAGE_SHIFT;
8823 return remap_pfn_range(vma, vma->vm_start, pfn, sz, vma->vm_page_prot);
8824}
8825
Roman Penyaev6c5c2402019-11-28 12:53:22 +01008826#else /* !CONFIG_MMU */
8827
8828static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
8829{
8830 return vma->vm_flags & (VM_SHARED | VM_MAYSHARE) ? 0 : -EINVAL;
8831}
8832
8833static unsigned int io_uring_nommu_mmap_capabilities(struct file *file)
8834{
8835 return NOMMU_MAP_DIRECT | NOMMU_MAP_READ | NOMMU_MAP_WRITE;
8836}
8837
8838static unsigned long io_uring_nommu_get_unmapped_area(struct file *file,
8839 unsigned long addr, unsigned long len,
8840 unsigned long pgoff, unsigned long flags)
8841{
8842 void *ptr;
8843
8844 ptr = io_uring_validate_mmap_request(file, pgoff, len);
8845 if (IS_ERR(ptr))
8846 return PTR_ERR(ptr);
8847
8848 return (unsigned long) ptr;
8849}
8850
8851#endif /* !CONFIG_MMU */
8852
Jens Axboe90554202020-09-03 12:12:41 -06008853static void io_sqpoll_wait_sq(struct io_ring_ctx *ctx)
8854{
8855 DEFINE_WAIT(wait);
8856
8857 do {
8858 if (!io_sqring_full(ctx))
8859 break;
8860
8861 prepare_to_wait(&ctx->sqo_sq_wait, &wait, TASK_INTERRUPTIBLE);
8862
8863 if (!io_sqring_full(ctx))
8864 break;
8865
8866 schedule();
8867 } while (!signal_pending(current));
8868
8869 finish_wait(&ctx->sqo_sq_wait, &wait);
8870}
8871
Jens Axboe2b188cc2019-01-07 10:46:33 -07008872SYSCALL_DEFINE6(io_uring_enter, unsigned int, fd, u32, to_submit,
8873 u32, min_complete, u32, flags, const sigset_t __user *, sig,
8874 size_t, sigsz)
8875{
8876 struct io_ring_ctx *ctx;
8877 long ret = -EBADF;
8878 int submitted = 0;
8879 struct fd f;
8880
Jens Axboe4c6e2772020-07-01 11:29:10 -06008881 io_run_task_work();
Jens Axboeb41e9852020-02-17 09:52:41 -07008882
Jens Axboe90554202020-09-03 12:12:41 -06008883 if (flags & ~(IORING_ENTER_GETEVENTS | IORING_ENTER_SQ_WAKEUP |
8884 IORING_ENTER_SQ_WAIT))
Jens Axboe2b188cc2019-01-07 10:46:33 -07008885 return -EINVAL;
8886
8887 f = fdget(fd);
8888 if (!f.file)
8889 return -EBADF;
8890
8891 ret = -EOPNOTSUPP;
8892 if (f.file->f_op != &io_uring_fops)
8893 goto out_fput;
8894
8895 ret = -ENXIO;
8896 ctx = f.file->private_data;
8897 if (!percpu_ref_tryget(&ctx->refs))
8898 goto out_fput;
8899
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02008900 ret = -EBADFD;
8901 if (ctx->flags & IORING_SETUP_R_DISABLED)
8902 goto out;
8903
Jens Axboe6c271ce2019-01-10 11:22:30 -07008904 /*
8905 * For SQ polling, the thread will do all submissions and completions.
8906 * Just return the requested submit count, and wake the thread if
8907 * we were asked to.
8908 */
Jens Axboeb2a9ead2019-09-12 14:19:16 -06008909 ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008910 if (ctx->flags & IORING_SETUP_SQPOLL) {
Jens Axboec1edbf52019-11-10 16:56:04 -07008911 if (!list_empty_careful(&ctx->cq_overflow_list))
Jens Axboee6c8aa92020-09-28 13:10:13 -06008912 io_cqring_overflow_flush(ctx, false, NULL, NULL);
Jens Axboe6c271ce2019-01-10 11:22:30 -07008913 if (flags & IORING_ENTER_SQ_WAKEUP)
Jens Axboe534ca6d2020-09-02 13:52:19 -06008914 wake_up(&ctx->sq_data->wait);
Jens Axboe90554202020-09-03 12:12:41 -06008915 if (flags & IORING_ENTER_SQ_WAIT)
8916 io_sqpoll_wait_sq(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07008917 submitted = to_submit;
Jens Axboeb2a9ead2019-09-12 14:19:16 -06008918 } else if (to_submit) {
Jens Axboefdaf0832020-10-30 09:37:30 -06008919 ret = io_uring_add_task_file(ctx, f.file);
Jens Axboe0f212202020-09-13 13:09:39 -06008920 if (unlikely(ret))
8921 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008922 mutex_lock(&ctx->uring_lock);
Jens Axboe0f212202020-09-13 13:09:39 -06008923 submitted = io_submit_sqes(ctx, to_submit);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008924 mutex_unlock(&ctx->uring_lock);
Pavel Begunkov7c504e652019-12-18 19:53:45 +03008925
8926 if (submitted != to_submit)
8927 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -07008928 }
8929 if (flags & IORING_ENTER_GETEVENTS) {
8930 min_complete = min(min_complete, ctx->cq_entries);
8931
Xiaoguang Wang32b22442020-03-11 09:26:09 +08008932 /*
8933 * When SETUP_IOPOLL and SETUP_SQPOLL are both enabled, user
8934 * space applications don't need to do io completion events
8935 * polling again, they can rely on io_sq_thread to do polling
8936 * work, which can reduce cpu usage and uring_lock contention.
8937 */
8938 if (ctx->flags & IORING_SETUP_IOPOLL &&
8939 !(ctx->flags & IORING_SETUP_SQPOLL)) {
Pavel Begunkov7668b922020-07-07 16:36:21 +03008940 ret = io_iopoll_check(ctx, min_complete);
Jens Axboedef596e2019-01-09 08:59:42 -07008941 } else {
8942 ret = io_cqring_wait(ctx, min_complete, sig, sigsz);
8943 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07008944 }
8945
Pavel Begunkov7c504e652019-12-18 19:53:45 +03008946out:
Pavel Begunkov6805b322019-10-08 02:18:42 +03008947 percpu_ref_put(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07008948out_fput:
8949 fdput(f);
8950 return submitted ? submitted : ret;
8951}
8952
Tobias Klauserbebdb652020-02-26 18:38:32 +01008953#ifdef CONFIG_PROC_FS
Jens Axboe87ce9552020-01-30 08:25:34 -07008954static int io_uring_show_cred(int id, void *p, void *data)
8955{
8956 const struct cred *cred = p;
8957 struct seq_file *m = data;
8958 struct user_namespace *uns = seq_user_ns(m);
8959 struct group_info *gi;
8960 kernel_cap_t cap;
8961 unsigned __capi;
8962 int g;
8963
8964 seq_printf(m, "%5d\n", id);
8965 seq_put_decimal_ull(m, "\tUid:\t", from_kuid_munged(uns, cred->uid));
8966 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->euid));
8967 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid));
8968 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->fsuid));
8969 seq_put_decimal_ull(m, "\n\tGid:\t", from_kgid_munged(uns, cred->gid));
8970 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->egid));
8971 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->sgid));
8972 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->fsgid));
8973 seq_puts(m, "\n\tGroups:\t");
8974 gi = cred->group_info;
8975 for (g = 0; g < gi->ngroups; g++) {
8976 seq_put_decimal_ull(m, g ? " " : "",
8977 from_kgid_munged(uns, gi->gid[g]));
8978 }
8979 seq_puts(m, "\n\tCapEff:\t");
8980 cap = cred->cap_effective;
8981 CAP_FOR_EACH_U32(__capi)
8982 seq_put_hex_ll(m, NULL, cap.cap[CAP_LAST_U32 - __capi], 8);
8983 seq_putc(m, '\n');
8984 return 0;
8985}
8986
8987static void __io_uring_show_fdinfo(struct io_ring_ctx *ctx, struct seq_file *m)
8988{
Joseph Qidbbe9c62020-09-29 09:01:22 -06008989 struct io_sq_data *sq = NULL;
Jens Axboefad8e0d2020-09-28 08:57:48 -06008990 bool has_lock;
Jens Axboe87ce9552020-01-30 08:25:34 -07008991 int i;
8992
Jens Axboefad8e0d2020-09-28 08:57:48 -06008993 /*
8994 * Avoid ABBA deadlock between the seq lock and the io_uring mutex,
8995 * since fdinfo case grabs it in the opposite direction of normal use
8996 * cases. If we fail to get the lock, we just don't iterate any
8997 * structures that could be going away outside the io_uring mutex.
8998 */
8999 has_lock = mutex_trylock(&ctx->uring_lock);
9000
Joseph Qidbbe9c62020-09-29 09:01:22 -06009001 if (has_lock && (ctx->flags & IORING_SETUP_SQPOLL))
9002 sq = ctx->sq_data;
9003
9004 seq_printf(m, "SqThread:\t%d\n", sq ? task_pid_nr(sq->thread) : -1);
9005 seq_printf(m, "SqThreadCpu:\t%d\n", sq ? task_cpu(sq->thread) : -1);
Jens Axboe87ce9552020-01-30 08:25:34 -07009006 seq_printf(m, "UserFiles:\t%u\n", ctx->nr_user_files);
Jens Axboefad8e0d2020-09-28 08:57:48 -06009007 for (i = 0; has_lock && i < ctx->nr_user_files; i++) {
Jens Axboe87ce9552020-01-30 08:25:34 -07009008 struct fixed_file_table *table;
9009 struct file *f;
9010
9011 table = &ctx->file_data->table[i >> IORING_FILE_TABLE_SHIFT];
9012 f = table->files[i & IORING_FILE_TABLE_MASK];
9013 if (f)
9014 seq_printf(m, "%5u: %s\n", i, file_dentry(f)->d_iname);
9015 else
9016 seq_printf(m, "%5u: <none>\n", i);
9017 }
9018 seq_printf(m, "UserBufs:\t%u\n", ctx->nr_user_bufs);
Jens Axboefad8e0d2020-09-28 08:57:48 -06009019 for (i = 0; has_lock && i < ctx->nr_user_bufs; i++) {
Jens Axboe87ce9552020-01-30 08:25:34 -07009020 struct io_mapped_ubuf *buf = &ctx->user_bufs[i];
9021
9022 seq_printf(m, "%5u: 0x%llx/%u\n", i, buf->ubuf,
9023 (unsigned int) buf->len);
9024 }
Jens Axboefad8e0d2020-09-28 08:57:48 -06009025 if (has_lock && !idr_is_empty(&ctx->personality_idr)) {
Jens Axboe87ce9552020-01-30 08:25:34 -07009026 seq_printf(m, "Personalities:\n");
9027 idr_for_each(&ctx->personality_idr, io_uring_show_cred, m);
9028 }
Jens Axboed7718a92020-02-14 22:23:12 -07009029 seq_printf(m, "PollList:\n");
9030 spin_lock_irq(&ctx->completion_lock);
9031 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
9032 struct hlist_head *list = &ctx->cancel_hash[i];
9033 struct io_kiocb *req;
9034
9035 hlist_for_each_entry(req, list, hash_node)
9036 seq_printf(m, " op=%d, task_works=%d\n", req->opcode,
9037 req->task->task_works != NULL);
9038 }
9039 spin_unlock_irq(&ctx->completion_lock);
Jens Axboefad8e0d2020-09-28 08:57:48 -06009040 if (has_lock)
9041 mutex_unlock(&ctx->uring_lock);
Jens Axboe87ce9552020-01-30 08:25:34 -07009042}
9043
9044static void io_uring_show_fdinfo(struct seq_file *m, struct file *f)
9045{
9046 struct io_ring_ctx *ctx = f->private_data;
9047
9048 if (percpu_ref_tryget(&ctx->refs)) {
9049 __io_uring_show_fdinfo(ctx, m);
9050 percpu_ref_put(&ctx->refs);
9051 }
9052}
Tobias Klauserbebdb652020-02-26 18:38:32 +01009053#endif
Jens Axboe87ce9552020-01-30 08:25:34 -07009054
Jens Axboe2b188cc2019-01-07 10:46:33 -07009055static const struct file_operations io_uring_fops = {
9056 .release = io_uring_release,
Jens Axboefcb323c2019-10-24 12:39:47 -06009057 .flush = io_uring_flush,
Jens Axboe2b188cc2019-01-07 10:46:33 -07009058 .mmap = io_uring_mmap,
Roman Penyaev6c5c2402019-11-28 12:53:22 +01009059#ifndef CONFIG_MMU
9060 .get_unmapped_area = io_uring_nommu_get_unmapped_area,
9061 .mmap_capabilities = io_uring_nommu_mmap_capabilities,
9062#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -07009063 .poll = io_uring_poll,
9064 .fasync = io_uring_fasync,
Tobias Klauserbebdb652020-02-26 18:38:32 +01009065#ifdef CONFIG_PROC_FS
Jens Axboe87ce9552020-01-30 08:25:34 -07009066 .show_fdinfo = io_uring_show_fdinfo,
Tobias Klauserbebdb652020-02-26 18:38:32 +01009067#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -07009068};
9069
9070static int io_allocate_scq_urings(struct io_ring_ctx *ctx,
9071 struct io_uring_params *p)
9072{
Hristo Venev75b28af2019-08-26 17:23:46 +00009073 struct io_rings *rings;
9074 size_t size, sq_array_offset;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009075
Jens Axboebd740482020-08-05 12:58:23 -06009076 /* make sure these are sane, as we already accounted them */
9077 ctx->sq_entries = p->sq_entries;
9078 ctx->cq_entries = p->cq_entries;
9079
Hristo Venev75b28af2019-08-26 17:23:46 +00009080 size = rings_size(p->sq_entries, p->cq_entries, &sq_array_offset);
9081 if (size == SIZE_MAX)
9082 return -EOVERFLOW;
9083
9084 rings = io_mem_alloc(size);
9085 if (!rings)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009086 return -ENOMEM;
9087
Hristo Venev75b28af2019-08-26 17:23:46 +00009088 ctx->rings = rings;
9089 ctx->sq_array = (u32 *)((char *)rings + sq_array_offset);
9090 rings->sq_ring_mask = p->sq_entries - 1;
9091 rings->cq_ring_mask = p->cq_entries - 1;
9092 rings->sq_ring_entries = p->sq_entries;
9093 rings->cq_ring_entries = p->cq_entries;
9094 ctx->sq_mask = rings->sq_ring_mask;
9095 ctx->cq_mask = rings->cq_ring_mask;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009096
9097 size = array_size(sizeof(struct io_uring_sqe), p->sq_entries);
Jens Axboeeb065d32019-11-20 09:26:29 -07009098 if (size == SIZE_MAX) {
9099 io_mem_free(ctx->rings);
9100 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009101 return -EOVERFLOW;
Jens Axboeeb065d32019-11-20 09:26:29 -07009102 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009103
9104 ctx->sq_sqes = io_mem_alloc(size);
Jens Axboeeb065d32019-11-20 09:26:29 -07009105 if (!ctx->sq_sqes) {
9106 io_mem_free(ctx->rings);
9107 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009108 return -ENOMEM;
Jens Axboeeb065d32019-11-20 09:26:29 -07009109 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009110
Jens Axboe2b188cc2019-01-07 10:46:33 -07009111 return 0;
9112}
9113
9114/*
9115 * Allocate an anonymous fd, this is what constitutes the application
9116 * visible backing of an io_uring instance. The application mmaps this
9117 * fd to gain access to the SQ/CQ ring details. If UNIX sockets are enabled,
9118 * we have to tie this fd to a socket for file garbage collection purposes.
9119 */
9120static int io_uring_get_fd(struct io_ring_ctx *ctx)
9121{
9122 struct file *file;
9123 int ret;
9124
9125#if defined(CONFIG_UNIX)
9126 ret = sock_create_kern(&init_net, PF_UNIX, SOCK_RAW, IPPROTO_IP,
9127 &ctx->ring_sock);
9128 if (ret)
9129 return ret;
9130#endif
9131
9132 ret = get_unused_fd_flags(O_RDWR | O_CLOEXEC);
9133 if (ret < 0)
9134 goto err;
9135
9136 file = anon_inode_getfile("[io_uring]", &io_uring_fops, ctx,
9137 O_RDWR | O_CLOEXEC);
9138 if (IS_ERR(file)) {
Jens Axboe0f212202020-09-13 13:09:39 -06009139err_fd:
Jens Axboe2b188cc2019-01-07 10:46:33 -07009140 put_unused_fd(ret);
9141 ret = PTR_ERR(file);
9142 goto err;
9143 }
9144
9145#if defined(CONFIG_UNIX)
9146 ctx->ring_sock->file = file;
9147#endif
Jens Axboefdaf0832020-10-30 09:37:30 -06009148 if (unlikely(io_uring_add_task_file(ctx, file))) {
Jens Axboe0f212202020-09-13 13:09:39 -06009149 file = ERR_PTR(-ENOMEM);
9150 goto err_fd;
9151 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009152 fd_install(ret, file);
9153 return ret;
9154err:
9155#if defined(CONFIG_UNIX)
9156 sock_release(ctx->ring_sock);
9157 ctx->ring_sock = NULL;
9158#endif
9159 return ret;
9160}
9161
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009162static int io_uring_create(unsigned entries, struct io_uring_params *p,
9163 struct io_uring_params __user *params)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009164{
9165 struct user_struct *user = NULL;
9166 struct io_ring_ctx *ctx;
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009167 bool limit_mem;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009168 int ret;
9169
Jens Axboe8110c1a2019-12-28 15:39:54 -07009170 if (!entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009171 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -07009172 if (entries > IORING_MAX_ENTRIES) {
9173 if (!(p->flags & IORING_SETUP_CLAMP))
9174 return -EINVAL;
9175 entries = IORING_MAX_ENTRIES;
9176 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009177
9178 /*
9179 * Use twice as many entries for the CQ ring. It's possible for the
9180 * application to drive a higher depth than the size of the SQ ring,
9181 * since the sqes are only used at submission time. This allows for
Jens Axboe33a107f2019-10-04 12:10:03 -06009182 * some flexibility in overcommitting a bit. If the application has
9183 * set IORING_SETUP_CQSIZE, it will have passed in the desired number
9184 * of CQ ring entries manually.
Jens Axboe2b188cc2019-01-07 10:46:33 -07009185 */
9186 p->sq_entries = roundup_pow_of_two(entries);
Jens Axboe33a107f2019-10-04 12:10:03 -06009187 if (p->flags & IORING_SETUP_CQSIZE) {
9188 /*
9189 * If IORING_SETUP_CQSIZE is set, we do the same roundup
9190 * to a power-of-two, if it isn't already. We do NOT impose
9191 * any cq vs sq ring sizing.
9192 */
Jens Axboe8110c1a2019-12-28 15:39:54 -07009193 if (p->cq_entries < p->sq_entries)
Jens Axboe33a107f2019-10-04 12:10:03 -06009194 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -07009195 if (p->cq_entries > IORING_MAX_CQ_ENTRIES) {
9196 if (!(p->flags & IORING_SETUP_CLAMP))
9197 return -EINVAL;
9198 p->cq_entries = IORING_MAX_CQ_ENTRIES;
9199 }
Jens Axboe33a107f2019-10-04 12:10:03 -06009200 p->cq_entries = roundup_pow_of_two(p->cq_entries);
9201 } else {
9202 p->cq_entries = 2 * p->sq_entries;
9203 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009204
9205 user = get_uid(current_user());
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009206 limit_mem = !capable(CAP_IPC_LOCK);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009207
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009208 if (limit_mem) {
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009209 ret = __io_account_mem(user,
Jens Axboe2b188cc2019-01-07 10:46:33 -07009210 ring_pages(p->sq_entries, p->cq_entries));
9211 if (ret) {
9212 free_uid(user);
9213 return ret;
9214 }
9215 }
9216
9217 ctx = io_ring_ctx_alloc(p);
9218 if (!ctx) {
Bijan Mottahedehaad5d8d2020-06-16 16:36:08 -07009219 if (limit_mem)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009220 __io_unaccount_mem(user, ring_pages(p->sq_entries,
Jens Axboe2b188cc2019-01-07 10:46:33 -07009221 p->cq_entries));
9222 free_uid(user);
9223 return -ENOMEM;
9224 }
9225 ctx->compat = in_compat_syscall();
Jens Axboe2b188cc2019-01-07 10:46:33 -07009226 ctx->user = user;
Jens Axboe0b8c0ec2019-12-02 08:50:00 -07009227 ctx->creds = get_current_cred();
Jens Axboe4ea33a92020-10-15 13:46:44 -06009228#ifdef CONFIG_AUDIT
9229 ctx->loginuid = current->loginuid;
9230 ctx->sessionid = current->sessionid;
9231#endif
Jens Axboe2aede0e2020-09-14 10:45:53 -06009232 ctx->sqo_task = get_task_struct(current);
9233
9234 /*
9235 * This is just grabbed for accounting purposes. When a process exits,
9236 * the mm is exited and dropped before the files, hence we need to hang
9237 * on to this mm purely for the purposes of being able to unaccount
9238 * memory (locked/pinned vm). It's not used for anything else.
9239 */
Jens Axboe6b7898e2020-08-25 07:58:00 -06009240 mmgrab(current->mm);
Jens Axboe2aede0e2020-09-14 10:45:53 -06009241 ctx->mm_account = current->mm;
Jens Axboe6b7898e2020-08-25 07:58:00 -06009242
Dennis Zhou91d8f512020-09-16 13:41:05 -07009243#ifdef CONFIG_BLK_CGROUP
9244 /*
9245 * The sq thread will belong to the original cgroup it was inited in.
9246 * If the cgroup goes offline (e.g. disabling the io controller), then
9247 * issued bios will be associated with the closest cgroup later in the
9248 * block layer.
9249 */
9250 rcu_read_lock();
9251 ctx->sqo_blkcg_css = blkcg_css();
9252 ret = css_tryget_online(ctx->sqo_blkcg_css);
9253 rcu_read_unlock();
9254 if (!ret) {
9255 /* don't init against a dying cgroup, have the user try again */
9256 ctx->sqo_blkcg_css = NULL;
9257 ret = -ENODEV;
9258 goto err;
9259 }
9260#endif
Jens Axboe6c271ce2019-01-10 11:22:30 -07009261
Jens Axboe2b188cc2019-01-07 10:46:33 -07009262 /*
9263 * Account memory _before_ installing the file descriptor. Once
9264 * the descriptor is installed, it can get closed at any time. Also
Jens Axboe2b188cc2019-01-07 10:46:33 -07009265 * do this before hitting the general error path, as ring freeing
Hristo Venev75b28af2019-08-26 17:23:46 +00009266 * will un-account as well.
9267 */
9268 io_account_mem(ctx, ring_pages(p->sq_entries, p->cq_entries),
9269 ACCT_LOCKED);
9270 ctx->limit_mem = limit_mem;
9271
9272 ret = io_allocate_scq_urings(ctx, p);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009273 if (ret)
9274 goto err;
Hristo Venev75b28af2019-08-26 17:23:46 +00009275
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009276 ret = io_sq_offload_create(ctx, p);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009277 if (ret)
9278 goto err;
9279
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009280 if (!(p->flags & IORING_SETUP_R_DISABLED))
9281 io_sq_offload_start(ctx);
9282
Jens Axboe2b188cc2019-01-07 10:46:33 -07009283 memset(&p->sq_off, 0, sizeof(p->sq_off));
9284 p->sq_off.head = offsetof(struct io_rings, sq.head);
9285 p->sq_off.tail = offsetof(struct io_rings, sq.tail);
9286 p->sq_off.ring_mask = offsetof(struct io_rings, sq_ring_mask);
9287 p->sq_off.ring_entries = offsetof(struct io_rings, sq_ring_entries);
9288 p->sq_off.flags = offsetof(struct io_rings, sq_flags);
9289 p->sq_off.dropped = offsetof(struct io_rings, sq_dropped);
9290 p->sq_off.array = (char *)ctx->sq_array - (char *)ctx->rings;
9291
9292 memset(&p->cq_off, 0, sizeof(p->cq_off));
Hristo Venev75b28af2019-08-26 17:23:46 +00009293 p->cq_off.head = offsetof(struct io_rings, cq.head);
9294 p->cq_off.tail = offsetof(struct io_rings, cq.tail);
9295 p->cq_off.ring_mask = offsetof(struct io_rings, cq_ring_mask);
9296 p->cq_off.ring_entries = offsetof(struct io_rings, cq_ring_entries);
9297 p->cq_off.overflow = offsetof(struct io_rings, cq_overflow);
9298 p->cq_off.cqes = offsetof(struct io_rings, cqes);
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +02009299 p->cq_off.flags = offsetof(struct io_rings, cq_flags);
Jens Axboeac90f242019-09-06 10:26:21 -06009300
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009301 p->features = IORING_FEAT_SINGLE_MMAP | IORING_FEAT_NODROP |
9302 IORING_FEAT_SUBMIT_STABLE | IORING_FEAT_RW_CUR_POS |
Jiufei Xue5769a352020-06-17 17:53:55 +08009303 IORING_FEAT_CUR_PERSONALITY | IORING_FEAT_FAST_POLL |
9304 IORING_FEAT_POLL_32BITS;
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009305
9306 if (copy_to_user(params, p, sizeof(*p))) {
9307 ret = -EFAULT;
9308 goto err;
9309 }
Jens Axboed1719f72020-07-30 13:43:53 -06009310
9311 /*
Jens Axboe044c1ab2019-10-28 09:15:33 -06009312 * Install ring fd as the very last thing, so we don't risk someone
9313 * having closed it before we finish setup
9314 */
9315 ret = io_uring_get_fd(ctx);
9316 if (ret < 0)
9317 goto err;
9318
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02009319 trace_io_uring_create(ret, ctx, p->sq_entries, p->cq_entries, p->flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009320 return ret;
9321err:
9322 io_ring_ctx_wait_and_kill(ctx);
9323 return ret;
9324}
9325
9326/*
9327 * Sets up an aio uring context, and returns the fd. Applications asks for a
9328 * ring size, we return the actual sq/cq ring sizes (among other things) in the
9329 * params structure passed in.
9330 */
9331static long io_uring_setup(u32 entries, struct io_uring_params __user *params)
9332{
9333 struct io_uring_params p;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009334 int i;
9335
9336 if (copy_from_user(&p, params, sizeof(p)))
9337 return -EFAULT;
9338 for (i = 0; i < ARRAY_SIZE(p.resv); i++) {
9339 if (p.resv[i])
9340 return -EINVAL;
9341 }
9342
Jens Axboe6c271ce2019-01-10 11:22:30 -07009343 if (p.flags & ~(IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL |
Jens Axboe8110c1a2019-12-28 15:39:54 -07009344 IORING_SETUP_SQ_AFF | IORING_SETUP_CQSIZE |
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009345 IORING_SETUP_CLAMP | IORING_SETUP_ATTACH_WQ |
9346 IORING_SETUP_R_DISABLED))
Jens Axboe2b188cc2019-01-07 10:46:33 -07009347 return -EINVAL;
9348
Xiaoguang Wang7f136572020-05-05 16:28:53 +08009349 return io_uring_create(entries, &p, params);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009350}
9351
9352SYSCALL_DEFINE2(io_uring_setup, u32, entries,
9353 struct io_uring_params __user *, params)
9354{
9355 return io_uring_setup(entries, params);
9356}
9357
Jens Axboe66f4af92020-01-16 15:36:52 -07009358static int io_probe(struct io_ring_ctx *ctx, void __user *arg, unsigned nr_args)
9359{
9360 struct io_uring_probe *p;
9361 size_t size;
9362 int i, ret;
9363
9364 size = struct_size(p, ops, nr_args);
9365 if (size == SIZE_MAX)
9366 return -EOVERFLOW;
9367 p = kzalloc(size, GFP_KERNEL);
9368 if (!p)
9369 return -ENOMEM;
9370
9371 ret = -EFAULT;
9372 if (copy_from_user(p, arg, size))
9373 goto out;
9374 ret = -EINVAL;
9375 if (memchr_inv(p, 0, size))
9376 goto out;
9377
9378 p->last_op = IORING_OP_LAST - 1;
9379 if (nr_args > IORING_OP_LAST)
9380 nr_args = IORING_OP_LAST;
9381
9382 for (i = 0; i < nr_args; i++) {
9383 p->ops[i].op = i;
9384 if (!io_op_defs[i].not_supported)
9385 p->ops[i].flags = IO_URING_OP_SUPPORTED;
9386 }
9387 p->ops_len = i;
9388
9389 ret = 0;
9390 if (copy_to_user(arg, p, size))
9391 ret = -EFAULT;
9392out:
9393 kfree(p);
9394 return ret;
9395}
9396
Jens Axboe071698e2020-01-28 10:04:42 -07009397static int io_register_personality(struct io_ring_ctx *ctx)
9398{
Jens Axboe1e6fa522020-10-15 08:46:24 -06009399 struct io_identity *id;
9400 int ret;
Jens Axboe071698e2020-01-28 10:04:42 -07009401
Jens Axboe1e6fa522020-10-15 08:46:24 -06009402 id = kmalloc(sizeof(*id), GFP_KERNEL);
9403 if (unlikely(!id))
9404 return -ENOMEM;
9405
9406 io_init_identity(id);
9407 id->creds = get_current_cred();
9408
9409 ret = idr_alloc_cyclic(&ctx->personality_idr, id, 1, USHRT_MAX, GFP_KERNEL);
9410 if (ret < 0) {
9411 put_cred(id->creds);
9412 kfree(id);
9413 }
9414 return ret;
Jens Axboe071698e2020-01-28 10:04:42 -07009415}
9416
9417static int io_unregister_personality(struct io_ring_ctx *ctx, unsigned id)
9418{
Jens Axboe1e6fa522020-10-15 08:46:24 -06009419 struct io_identity *iod;
Jens Axboe071698e2020-01-28 10:04:42 -07009420
Jens Axboe1e6fa522020-10-15 08:46:24 -06009421 iod = idr_remove(&ctx->personality_idr, id);
9422 if (iod) {
9423 put_cred(iod->creds);
9424 if (refcount_dec_and_test(&iod->count))
9425 kfree(iod);
Jens Axboe071698e2020-01-28 10:04:42 -07009426 return 0;
9427 }
9428
9429 return -EINVAL;
9430}
9431
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009432static int io_register_restrictions(struct io_ring_ctx *ctx, void __user *arg,
9433 unsigned int nr_args)
9434{
9435 struct io_uring_restriction *res;
9436 size_t size;
9437 int i, ret;
9438
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009439 /* Restrictions allowed only if rings started disabled */
9440 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
9441 return -EBADFD;
9442
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009443 /* We allow only a single restrictions registration */
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009444 if (ctx->restrictions.registered)
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009445 return -EBUSY;
9446
9447 if (!arg || nr_args > IORING_MAX_RESTRICTIONS)
9448 return -EINVAL;
9449
9450 size = array_size(nr_args, sizeof(*res));
9451 if (size == SIZE_MAX)
9452 return -EOVERFLOW;
9453
9454 res = memdup_user(arg, size);
9455 if (IS_ERR(res))
9456 return PTR_ERR(res);
9457
9458 ret = 0;
9459
9460 for (i = 0; i < nr_args; i++) {
9461 switch (res[i].opcode) {
9462 case IORING_RESTRICTION_REGISTER_OP:
9463 if (res[i].register_op >= IORING_REGISTER_LAST) {
9464 ret = -EINVAL;
9465 goto out;
9466 }
9467
9468 __set_bit(res[i].register_op,
9469 ctx->restrictions.register_op);
9470 break;
9471 case IORING_RESTRICTION_SQE_OP:
9472 if (res[i].sqe_op >= IORING_OP_LAST) {
9473 ret = -EINVAL;
9474 goto out;
9475 }
9476
9477 __set_bit(res[i].sqe_op, ctx->restrictions.sqe_op);
9478 break;
9479 case IORING_RESTRICTION_SQE_FLAGS_ALLOWED:
9480 ctx->restrictions.sqe_flags_allowed = res[i].sqe_flags;
9481 break;
9482 case IORING_RESTRICTION_SQE_FLAGS_REQUIRED:
9483 ctx->restrictions.sqe_flags_required = res[i].sqe_flags;
9484 break;
9485 default:
9486 ret = -EINVAL;
9487 goto out;
9488 }
9489 }
9490
9491out:
9492 /* Reset all restrictions if an error happened */
9493 if (ret != 0)
9494 memset(&ctx->restrictions, 0, sizeof(ctx->restrictions));
9495 else
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009496 ctx->restrictions.registered = true;
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009497
9498 kfree(res);
9499 return ret;
9500}
9501
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009502static int io_register_enable_rings(struct io_ring_ctx *ctx)
9503{
9504 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
9505 return -EBADFD;
9506
9507 if (ctx->restrictions.registered)
9508 ctx->restricted = 1;
9509
9510 ctx->flags &= ~IORING_SETUP_R_DISABLED;
9511
9512 io_sq_offload_start(ctx);
9513
9514 return 0;
9515}
9516
Jens Axboe071698e2020-01-28 10:04:42 -07009517static bool io_register_op_must_quiesce(int op)
9518{
9519 switch (op) {
9520 case IORING_UNREGISTER_FILES:
9521 case IORING_REGISTER_FILES_UPDATE:
9522 case IORING_REGISTER_PROBE:
9523 case IORING_REGISTER_PERSONALITY:
9524 case IORING_UNREGISTER_PERSONALITY:
9525 return false;
9526 default:
9527 return true;
9528 }
9529}
9530
Jens Axboeedafcce2019-01-09 09:16:05 -07009531static int __io_uring_register(struct io_ring_ctx *ctx, unsigned opcode,
9532 void __user *arg, unsigned nr_args)
Jens Axboeb19062a2019-04-15 10:49:38 -06009533 __releases(ctx->uring_lock)
9534 __acquires(ctx->uring_lock)
Jens Axboeedafcce2019-01-09 09:16:05 -07009535{
9536 int ret;
9537
Jens Axboe35fa71a2019-04-22 10:23:23 -06009538 /*
9539 * We're inside the ring mutex, if the ref is already dying, then
9540 * someone else killed the ctx or is already going through
9541 * io_uring_register().
9542 */
9543 if (percpu_ref_is_dying(&ctx->refs))
9544 return -ENXIO;
9545
Jens Axboe071698e2020-01-28 10:04:42 -07009546 if (io_register_op_must_quiesce(opcode)) {
Jens Axboe05f3fb32019-12-09 11:22:50 -07009547 percpu_ref_kill(&ctx->refs);
Jens Axboeb19062a2019-04-15 10:49:38 -06009548
Jens Axboe05f3fb32019-12-09 11:22:50 -07009549 /*
9550 * Drop uring mutex before waiting for references to exit. If
9551 * another thread is currently inside io_uring_enter() it might
9552 * need to grab the uring_lock to make progress. If we hold it
9553 * here across the drain wait, then we can deadlock. It's safe
9554 * to drop the mutex here, since no new references will come in
9555 * after we've killed the percpu ref.
9556 */
9557 mutex_unlock(&ctx->uring_lock);
Jens Axboeaf9c1a42020-09-24 13:32:18 -06009558 do {
9559 ret = wait_for_completion_interruptible(&ctx->ref_comp);
9560 if (!ret)
9561 break;
Jens Axboeed6930c2020-10-08 19:09:46 -06009562 ret = io_run_task_work_sig();
9563 if (ret < 0)
9564 break;
Jens Axboeaf9c1a42020-09-24 13:32:18 -06009565 } while (1);
9566
Jens Axboe05f3fb32019-12-09 11:22:50 -07009567 mutex_lock(&ctx->uring_lock);
Jens Axboeaf9c1a42020-09-24 13:32:18 -06009568
Jens Axboec1503682020-01-08 08:26:07 -07009569 if (ret) {
9570 percpu_ref_resurrect(&ctx->refs);
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009571 goto out_quiesce;
9572 }
9573 }
9574
9575 if (ctx->restricted) {
9576 if (opcode >= IORING_REGISTER_LAST) {
9577 ret = -EINVAL;
9578 goto out;
9579 }
9580
9581 if (!test_bit(opcode, ctx->restrictions.register_op)) {
9582 ret = -EACCES;
Jens Axboec1503682020-01-08 08:26:07 -07009583 goto out;
9584 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07009585 }
Jens Axboeedafcce2019-01-09 09:16:05 -07009586
9587 switch (opcode) {
9588 case IORING_REGISTER_BUFFERS:
9589 ret = io_sqe_buffer_register(ctx, arg, nr_args);
9590 break;
9591 case IORING_UNREGISTER_BUFFERS:
9592 ret = -EINVAL;
9593 if (arg || nr_args)
9594 break;
9595 ret = io_sqe_buffer_unregister(ctx);
9596 break;
Jens Axboe6b063142019-01-10 22:13:58 -07009597 case IORING_REGISTER_FILES:
9598 ret = io_sqe_files_register(ctx, arg, nr_args);
9599 break;
9600 case IORING_UNREGISTER_FILES:
9601 ret = -EINVAL;
9602 if (arg || nr_args)
9603 break;
9604 ret = io_sqe_files_unregister(ctx);
9605 break;
Jens Axboec3a31e62019-10-03 13:59:56 -06009606 case IORING_REGISTER_FILES_UPDATE:
9607 ret = io_sqe_files_update(ctx, arg, nr_args);
9608 break;
Jens Axboe9b402842019-04-11 11:45:41 -06009609 case IORING_REGISTER_EVENTFD:
Jens Axboef2842ab2020-01-08 11:04:00 -07009610 case IORING_REGISTER_EVENTFD_ASYNC:
Jens Axboe9b402842019-04-11 11:45:41 -06009611 ret = -EINVAL;
9612 if (nr_args != 1)
9613 break;
9614 ret = io_eventfd_register(ctx, arg);
Jens Axboef2842ab2020-01-08 11:04:00 -07009615 if (ret)
9616 break;
9617 if (opcode == IORING_REGISTER_EVENTFD_ASYNC)
9618 ctx->eventfd_async = 1;
9619 else
9620 ctx->eventfd_async = 0;
Jens Axboe9b402842019-04-11 11:45:41 -06009621 break;
9622 case IORING_UNREGISTER_EVENTFD:
9623 ret = -EINVAL;
9624 if (arg || nr_args)
9625 break;
9626 ret = io_eventfd_unregister(ctx);
9627 break;
Jens Axboe66f4af92020-01-16 15:36:52 -07009628 case IORING_REGISTER_PROBE:
9629 ret = -EINVAL;
9630 if (!arg || nr_args > 256)
9631 break;
9632 ret = io_probe(ctx, arg, nr_args);
9633 break;
Jens Axboe071698e2020-01-28 10:04:42 -07009634 case IORING_REGISTER_PERSONALITY:
9635 ret = -EINVAL;
9636 if (arg || nr_args)
9637 break;
9638 ret = io_register_personality(ctx);
9639 break;
9640 case IORING_UNREGISTER_PERSONALITY:
9641 ret = -EINVAL;
9642 if (arg)
9643 break;
9644 ret = io_unregister_personality(ctx, nr_args);
9645 break;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02009646 case IORING_REGISTER_ENABLE_RINGS:
9647 ret = -EINVAL;
9648 if (arg || nr_args)
9649 break;
9650 ret = io_register_enable_rings(ctx);
9651 break;
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009652 case IORING_REGISTER_RESTRICTIONS:
9653 ret = io_register_restrictions(ctx, arg, nr_args);
9654 break;
Jens Axboeedafcce2019-01-09 09:16:05 -07009655 default:
9656 ret = -EINVAL;
9657 break;
9658 }
9659
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009660out:
Jens Axboe071698e2020-01-28 10:04:42 -07009661 if (io_register_op_must_quiesce(opcode)) {
Jens Axboe05f3fb32019-12-09 11:22:50 -07009662 /* bring the ctx back to life */
Jens Axboe05f3fb32019-12-09 11:22:50 -07009663 percpu_ref_reinit(&ctx->refs);
Stefano Garzarella21b55db2020-08-27 16:58:30 +02009664out_quiesce:
Jens Axboe0f158b42020-05-14 17:18:39 -06009665 reinit_completion(&ctx->ref_comp);
Jens Axboe05f3fb32019-12-09 11:22:50 -07009666 }
Jens Axboeedafcce2019-01-09 09:16:05 -07009667 return ret;
9668}
9669
9670SYSCALL_DEFINE4(io_uring_register, unsigned int, fd, unsigned int, opcode,
9671 void __user *, arg, unsigned int, nr_args)
9672{
9673 struct io_ring_ctx *ctx;
9674 long ret = -EBADF;
9675 struct fd f;
9676
9677 f = fdget(fd);
9678 if (!f.file)
9679 return -EBADF;
9680
9681 ret = -EOPNOTSUPP;
9682 if (f.file->f_op != &io_uring_fops)
9683 goto out_fput;
9684
9685 ctx = f.file->private_data;
9686
9687 mutex_lock(&ctx->uring_lock);
9688 ret = __io_uring_register(ctx, opcode, arg, nr_args);
9689 mutex_unlock(&ctx->uring_lock);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02009690 trace_io_uring_register(ctx, opcode, ctx->nr_user_files, ctx->nr_user_bufs,
9691 ctx->cq_ev_fd != NULL, ret);
Jens Axboeedafcce2019-01-09 09:16:05 -07009692out_fput:
9693 fdput(f);
9694 return ret;
9695}
9696
Jens Axboe2b188cc2019-01-07 10:46:33 -07009697static int __init io_uring_init(void)
9698{
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009699#define __BUILD_BUG_VERIFY_ELEMENT(stype, eoffset, etype, ename) do { \
9700 BUILD_BUG_ON(offsetof(stype, ename) != eoffset); \
9701 BUILD_BUG_ON(sizeof(etype) != sizeof_field(stype, ename)); \
9702} while (0)
9703
9704#define BUILD_BUG_SQE_ELEM(eoffset, etype, ename) \
9705 __BUILD_BUG_VERIFY_ELEMENT(struct io_uring_sqe, eoffset, etype, ename)
9706 BUILD_BUG_ON(sizeof(struct io_uring_sqe) != 64);
9707 BUILD_BUG_SQE_ELEM(0, __u8, opcode);
9708 BUILD_BUG_SQE_ELEM(1, __u8, flags);
9709 BUILD_BUG_SQE_ELEM(2, __u16, ioprio);
9710 BUILD_BUG_SQE_ELEM(4, __s32, fd);
9711 BUILD_BUG_SQE_ELEM(8, __u64, off);
9712 BUILD_BUG_SQE_ELEM(8, __u64, addr2);
9713 BUILD_BUG_SQE_ELEM(16, __u64, addr);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03009714 BUILD_BUG_SQE_ELEM(16, __u64, splice_off_in);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009715 BUILD_BUG_SQE_ELEM(24, __u32, len);
9716 BUILD_BUG_SQE_ELEM(28, __kernel_rwf_t, rw_flags);
9717 BUILD_BUG_SQE_ELEM(28, /* compat */ int, rw_flags);
9718 BUILD_BUG_SQE_ELEM(28, /* compat */ __u32, rw_flags);
9719 BUILD_BUG_SQE_ELEM(28, __u32, fsync_flags);
Jiufei Xue5769a352020-06-17 17:53:55 +08009720 BUILD_BUG_SQE_ELEM(28, /* compat */ __u16, poll_events);
9721 BUILD_BUG_SQE_ELEM(28, __u32, poll32_events);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009722 BUILD_BUG_SQE_ELEM(28, __u32, sync_range_flags);
9723 BUILD_BUG_SQE_ELEM(28, __u32, msg_flags);
9724 BUILD_BUG_SQE_ELEM(28, __u32, timeout_flags);
9725 BUILD_BUG_SQE_ELEM(28, __u32, accept_flags);
9726 BUILD_BUG_SQE_ELEM(28, __u32, cancel_flags);
9727 BUILD_BUG_SQE_ELEM(28, __u32, open_flags);
9728 BUILD_BUG_SQE_ELEM(28, __u32, statx_flags);
9729 BUILD_BUG_SQE_ELEM(28, __u32, fadvise_advice);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03009730 BUILD_BUG_SQE_ELEM(28, __u32, splice_flags);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009731 BUILD_BUG_SQE_ELEM(32, __u64, user_data);
9732 BUILD_BUG_SQE_ELEM(40, __u16, buf_index);
9733 BUILD_BUG_SQE_ELEM(42, __u16, personality);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03009734 BUILD_BUG_SQE_ELEM(44, __s32, splice_fd_in);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +01009735
Jens Axboed3656342019-12-18 09:50:26 -07009736 BUILD_BUG_ON(ARRAY_SIZE(io_op_defs) != IORING_OP_LAST);
Jens Axboe84557872020-03-03 15:28:17 -07009737 BUILD_BUG_ON(__REQ_F_LAST_BIT >= 8 * sizeof(int));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009738 req_cachep = KMEM_CACHE(io_kiocb, SLAB_HWCACHE_ALIGN | SLAB_PANIC);
9739 return 0;
9740};
9741__initcall(io_uring_init);