blob: 95e7ce84fa2ac13718e1c4317d6562331440e48b [file] [log] [blame]
Jens Axboe2b188cc2019-01-07 10:46:33 -07001// SPDX-License-Identifier: GPL-2.0
2/*
3 * Shared application/kernel submission and completion ring pairs, for
4 * supporting fast/efficient IO.
5 *
6 * A note on the read/write ordering memory barriers that are matched between
Stefan Bühler1e84b972019-04-24 23:54:16 +02007 * the application and kernel side.
8 *
9 * After the application reads the CQ ring tail, it must use an
10 * appropriate smp_rmb() to pair with the smp_wmb() the kernel uses
11 * before writing the tail (using smp_load_acquire to read the tail will
12 * do). It also needs a smp_mb() before updating CQ head (ordering the
13 * entry load(s) with the head store), pairing with an implicit barrier
Pavel Begunkovd068b502021-05-16 22:58:11 +010014 * through a control-dependency in io_get_cqe (smp_store_release to
Stefan Bühler1e84b972019-04-24 23:54:16 +020015 * store head will do). Failure to do so could lead to reading invalid
16 * CQ entries.
17 *
18 * Likewise, the application must use an appropriate smp_wmb() before
19 * writing the SQ tail (ordering SQ entry stores with the tail store),
20 * which pairs with smp_load_acquire in io_get_sqring (smp_store_release
21 * to store the tail will do). And it needs a barrier ordering the SQ
22 * head load before writing new SQ entries (smp_load_acquire to read
23 * head will do).
24 *
25 * When using the SQ poll thread (IORING_SETUP_SQPOLL), the application
26 * needs to check the SQ flags for IORING_SQ_NEED_WAKEUP *after*
27 * updating the SQ tail; a full memory barrier smp_mb() is needed
28 * between.
Jens Axboe2b188cc2019-01-07 10:46:33 -070029 *
30 * Also see the examples in the liburing library:
31 *
32 * git://git.kernel.dk/liburing
33 *
34 * io_uring also uses READ/WRITE_ONCE() for _any_ store or load that happens
35 * from data shared between the kernel and application. This is done both
36 * for ordering purposes, but also to ensure that once a value is loaded from
37 * data that the application could potentially modify, it remains stable.
38 *
39 * Copyright (C) 2018-2019 Jens Axboe
Christoph Hellwigc992fe22019-01-11 09:43:02 -070040 * Copyright (c) 2018-2019 Christoph Hellwig
Jens Axboe2b188cc2019-01-07 10:46:33 -070041 */
42#include <linux/kernel.h>
43#include <linux/init.h>
44#include <linux/errno.h>
45#include <linux/syscalls.h>
46#include <linux/compat.h>
Jens Axboe52de1fe2020-02-27 10:15:42 -070047#include <net/compat.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070048#include <linux/refcount.h>
49#include <linux/uio.h>
Pavel Begunkov6b47ee62020-01-18 20:22:41 +030050#include <linux/bits.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070051
52#include <linux/sched/signal.h>
53#include <linux/fs.h>
54#include <linux/file.h>
55#include <linux/fdtable.h>
56#include <linux/mm.h>
57#include <linux/mman.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070058#include <linux/percpu.h>
59#include <linux/slab.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070060#include <linux/blkdev.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070061#include <linux/bvec.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070062#include <linux/net.h>
63#include <net/sock.h>
64#include <net/af_unix.h>
Jens Axboe6b063142019-01-10 22:13:58 -070065#include <net/scm.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070066#include <linux/anon_inodes.h>
67#include <linux/sched/mm.h>
68#include <linux/uaccess.h>
69#include <linux/nospec.h>
Jens Axboeedafcce2019-01-09 09:16:05 -070070#include <linux/sizes.h>
71#include <linux/hugetlb.h>
Jens Axboeaa4c3962019-11-29 10:14:00 -070072#include <linux/highmem.h>
Jens Axboe15b71ab2019-12-11 11:20:36 -070073#include <linux/namei.h>
74#include <linux/fsnotify.h>
Jens Axboe4840e412019-12-25 22:03:45 -070075#include <linux/fadvise.h>
Jens Axboe3e4827b2020-01-08 15:18:09 -070076#include <linux/eventpoll.h>
Pavel Begunkov7d67af22020-02-24 11:32:45 +030077#include <linux/splice.h>
Jens Axboeb41e9852020-02-17 09:52:41 -070078#include <linux/task_work.h>
Jens Axboebcf5a062020-05-22 09:24:42 -060079#include <linux/pagemap.h>
Jens Axboe0f212202020-09-13 13:09:39 -060080#include <linux/io_uring.h>
Nadav Amitef98eb02021-08-07 17:13:41 -070081#include <linux/tracehook.h>
Jens Axboe2b188cc2019-01-07 10:46:33 -070082
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020083#define CREATE_TRACE_POINTS
84#include <trace/events/io_uring.h>
85
Jens Axboe2b188cc2019-01-07 10:46:33 -070086#include <uapi/linux/io_uring.h>
87
Jens Axboef435c662022-05-23 17:05:03 -060088#include "../fs/internal.h"
Jens Axboe561fb042019-10-24 07:25:42 -060089#include "io-wq.h"
Jens Axboe2b188cc2019-01-07 10:46:33 -070090
Daniel Xu5277dea2019-09-14 14:23:45 -070091#define IORING_MAX_ENTRIES 32768
Jens Axboe33a107f2019-10-04 12:10:03 -060092#define IORING_MAX_CQ_ENTRIES (2 * IORING_MAX_ENTRIES)
Olivier Langlois4ce8ad92021-06-23 11:50:18 -070093#define IORING_SQPOLL_CAP_ENTRIES_VALUE 8
Jens Axboe65e19f52019-10-26 07:20:21 -060094
wangyangbo187f08c2021-08-19 13:56:57 +080095/* only define max */
Pavel Begunkov042b0d82021-08-09 13:04:01 +010096#define IORING_MAX_FIXED_FILES (1U << 15)
Stefano Garzarella21b55db2020-08-27 16:58:30 +020097#define IORING_MAX_RESTRICTIONS (IORING_RESTRICTION_LAST + \
98 IORING_REGISTER_LAST + IORING_OP_LAST)
Jens Axboe2b188cc2019-01-07 10:46:33 -070099
wangyangbo187f08c2021-08-19 13:56:57 +0800100#define IO_RSRC_TAG_TABLE_SHIFT (PAGE_SHIFT - 3)
Pavel Begunkov2d091d62021-06-14 02:36:21 +0100101#define IO_RSRC_TAG_TABLE_MAX (1U << IO_RSRC_TAG_TABLE_SHIFT)
102#define IO_RSRC_TAG_TABLE_MASK (IO_RSRC_TAG_TABLE_MAX - 1)
103
Pavel Begunkov489809e2021-05-14 12:06:44 +0100104#define IORING_MAX_REG_BUFFERS (1U << 14)
105
Pavel Begunkovb16fed662021-02-18 18:29:40 +0000106#define SQE_VALID_FLAGS (IOSQE_FIXED_FILE|IOSQE_IO_DRAIN|IOSQE_IO_LINK| \
107 IOSQE_IO_HARDLINK | IOSQE_ASYNC | \
108 IOSQE_BUFFER_SELECT)
Pavel Begunkovc8543572021-06-17 18:14:04 +0100109#define IO_REQ_CLEAN_FLAGS (REQ_F_BUFFER_SELECTED | REQ_F_NEED_CLEANUP | \
110 REQ_F_POLLED | REQ_F_INFLIGHT | REQ_F_CREDS)
Pavel Begunkovb16fed662021-02-18 18:29:40 +0000111
Pavel Begunkov09899b12021-06-14 02:36:22 +0100112#define IO_TCTX_REFS_CACHE_NR (1U << 10)
113
Jens Axboe2b188cc2019-01-07 10:46:33 -0700114struct io_uring {
115 u32 head ____cacheline_aligned_in_smp;
116 u32 tail ____cacheline_aligned_in_smp;
117};
118
Stefan Bühler1e84b972019-04-24 23:54:16 +0200119/*
Hristo Venev75b28af2019-08-26 17:23:46 +0000120 * This data is shared with the application through the mmap at offsets
121 * IORING_OFF_SQ_RING and IORING_OFF_CQ_RING.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200122 *
123 * The offsets to the member fields are published through struct
124 * io_sqring_offsets when calling io_uring_setup.
125 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000126struct io_rings {
Stefan Bühler1e84b972019-04-24 23:54:16 +0200127 /*
128 * Head and tail offsets into the ring; the offsets need to be
129 * masked to get valid indices.
130 *
Hristo Venev75b28af2019-08-26 17:23:46 +0000131 * The kernel controls head of the sq ring and the tail of the cq ring,
132 * and the application controls tail of the sq ring and the head of the
133 * cq ring.
Stefan Bühler1e84b972019-04-24 23:54:16 +0200134 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000135 struct io_uring sq, cq;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200136 /*
Hristo Venev75b28af2019-08-26 17:23:46 +0000137 * Bitmasks to apply to head and tail offsets (constant, equals
Stefan Bühler1e84b972019-04-24 23:54:16 +0200138 * ring_entries - 1)
139 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000140 u32 sq_ring_mask, cq_ring_mask;
141 /* Ring sizes (constant, power of 2) */
142 u32 sq_ring_entries, cq_ring_entries;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200143 /*
144 * Number of invalid entries dropped by the kernel due to
145 * invalid index stored in array
146 *
147 * Written by the kernel, shouldn't be modified by the
148 * application (i.e. get number of "new events" by comparing to
149 * cached value).
150 *
151 * After a new SQ head value was read by the application this
152 * counter includes all submissions that were dropped reaching
153 * the new SQ head (and possibly more).
154 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000155 u32 sq_dropped;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200156 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200157 * Runtime SQ flags
Stefan Bühler1e84b972019-04-24 23:54:16 +0200158 *
159 * Written by the kernel, shouldn't be modified by the
160 * application.
161 *
162 * The application needs a full memory barrier before checking
163 * for IORING_SQ_NEED_WAKEUP after updating the sq tail.
164 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000165 u32 sq_flags;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200166 /*
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200167 * Runtime CQ flags
168 *
169 * Written by the application, shouldn't be modified by the
170 * kernel.
171 */
Pavel Begunkovfe7e3252021-06-24 15:09:57 +0100172 u32 cq_flags;
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +0200173 /*
Stefan Bühler1e84b972019-04-24 23:54:16 +0200174 * Number of completion events lost because the queue was full;
175 * this should be avoided by the application by making sure
LimingWu0b4295b2019-12-05 20:18:18 +0800176 * there are not more requests pending than there is space in
Stefan Bühler1e84b972019-04-24 23:54:16 +0200177 * the completion queue.
178 *
179 * Written by the kernel, shouldn't be modified by the
180 * application (i.e. get number of "new events" by comparing to
181 * cached value).
182 *
183 * As completion events come in out of order this counter is not
184 * ordered with any other data.
185 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000186 u32 cq_overflow;
Stefan Bühler1e84b972019-04-24 23:54:16 +0200187 /*
188 * Ring buffer of completion events.
189 *
190 * The kernel writes completion events fresh every time they are
191 * produced, so the application is allowed to modify pending
192 * entries.
193 */
Hristo Venev75b28af2019-08-26 17:23:46 +0000194 struct io_uring_cqe cqes[] ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700195};
196
Pavel Begunkov45d189c2021-02-10 00:03:07 +0000197enum io_uring_cmd_flags {
198 IO_URING_F_NONBLOCK = 1,
Pavel Begunkov889fca72021-02-10 00:03:09 +0000199 IO_URING_F_COMPLETE_DEFER = 2,
Pavel Begunkov45d189c2021-02-10 00:03:07 +0000200};
201
Jens Axboeedafcce2019-01-09 09:16:05 -0700202struct io_mapped_ubuf {
203 u64 ubuf;
Pavel Begunkov4751f532021-04-01 15:43:55 +0100204 u64 ubuf_end;
Jens Axboeedafcce2019-01-09 09:16:05 -0700205 unsigned int nr_bvecs;
Jens Axboede293932020-09-17 16:19:16 -0600206 unsigned long acct_pages;
Pavel Begunkov41edf1a2021-04-25 14:32:23 +0100207 struct bio_vec bvec[];
Jens Axboeedafcce2019-01-09 09:16:05 -0700208};
209
Bijan Mottahedeh50238532021-01-15 17:37:45 +0000210struct io_ring_ctx;
211
Pavel Begunkov6c2450a2021-02-23 12:40:22 +0000212struct io_overflow_cqe {
213 struct io_uring_cqe cqe;
214 struct list_head list;
215};
216
Pavel Begunkova04b0ac2021-04-01 15:44:04 +0100217struct io_fixed_file {
218 /* file * with additional FFS_* flags */
219 unsigned long file_ptr;
220};
221
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000222struct io_rsrc_put {
223 struct list_head list;
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +0100224 u64 tag;
Bijan Mottahedeh50238532021-01-15 17:37:45 +0000225 union {
226 void *rsrc;
227 struct file *file;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +0100228 struct io_mapped_ubuf *buf;
Bijan Mottahedeh50238532021-01-15 17:37:45 +0000229 };
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000230};
231
Pavel Begunkovaeca2412021-04-11 01:46:37 +0100232struct io_file_table {
Pavel Begunkov042b0d82021-08-09 13:04:01 +0100233 struct io_fixed_file *files;
Jens Axboe31b51512019-01-18 22:56:34 -0700234};
235
Pavel Begunkovb895c9a2021-04-01 15:43:40 +0100236struct io_rsrc_node {
Xiaoguang Wang05589552020-03-31 14:05:18 +0800237 struct percpu_ref refs;
238 struct list_head node;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000239 struct list_head rsrc_list;
Pavel Begunkovb895c9a2021-04-01 15:43:40 +0100240 struct io_rsrc_data *rsrc_data;
Jens Axboe4a38aed22020-05-14 17:21:15 -0600241 struct llist_node llist;
Pavel Begunkove2978222020-11-18 14:56:26 +0000242 bool done;
Xiaoguang Wang05589552020-03-31 14:05:18 +0800243};
244
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +0100245typedef void (rsrc_put_fn)(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc);
246
Pavel Begunkovb895c9a2021-04-01 15:43:40 +0100247struct io_rsrc_data {
Jens Axboe05f3fb32019-12-09 11:22:50 -0700248 struct io_ring_ctx *ctx;
249
Pavel Begunkov2d091d62021-06-14 02:36:21 +0100250 u64 **tags;
251 unsigned int nr;
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +0100252 rsrc_put_fn *do_put;
Pavel Begunkov3e942492021-04-11 01:46:34 +0100253 atomic_t refs;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700254 struct completion done;
Hao Xu8bad28d2021-02-19 17:19:36 +0800255 bool quiesce;
Jens Axboe05f3fb32019-12-09 11:22:50 -0700256};
257
Jens Axboe5a2e7452020-02-23 16:23:11 -0700258struct io_buffer {
259 struct list_head list;
260 __u64 addr;
Thadeu Lima de Souza Cascardod1f82802021-05-05 09:47:06 -0300261 __u32 len;
Jens Axboe5a2e7452020-02-23 16:23:11 -0700262 __u16 bid;
263};
264
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200265struct io_restriction {
266 DECLARE_BITMAP(register_op, IORING_REGISTER_LAST);
267 DECLARE_BITMAP(sqe_op, IORING_OP_LAST);
268 u8 sqe_flags_allowed;
269 u8 sqe_flags_required;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +0200270 bool registered;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200271};
272
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700273enum {
274 IO_SQ_THREAD_SHOULD_STOP = 0,
275 IO_SQ_THREAD_SHOULD_PARK,
276};
277
Jens Axboe534ca6d2020-09-02 13:52:19 -0600278struct io_sq_data {
279 refcount_t refs;
Pavel Begunkov9e138a42021-03-14 20:57:12 +0000280 atomic_t park_pending;
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +0000281 struct mutex lock;
Jens Axboe69fb2132020-09-14 11:16:23 -0600282
283 /* ctx's that are using this sqd */
284 struct list_head ctx_list;
Jens Axboe69fb2132020-09-14 11:16:23 -0600285
Jens Axboe534ca6d2020-09-02 13:52:19 -0600286 struct task_struct *thread;
287 struct wait_queue_head wait;
Xiaoguang Wang08369242020-11-03 14:15:59 +0800288
289 unsigned sq_thread_idle;
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700290 int sq_cpu;
291 pid_t task_pid;
Jens Axboe5c2469e2021-03-11 10:17:56 -0700292 pid_t task_tgid;
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700293
294 unsigned long state;
Jens Axboe37d1e2e2021-02-17 21:03:43 -0700295 struct completion exited;
Jens Axboe534ca6d2020-09-02 13:52:19 -0600296};
297
Pavel Begunkov6dd0be12021-02-10 00:03:13 +0000298#define IO_COMPL_BATCH 32
Pavel Begunkov6ff119a2021-02-10 00:03:18 +0000299#define IO_REQ_CACHE_SIZE 32
Pavel Begunkovbf019da2021-02-10 00:03:17 +0000300#define IO_REQ_ALLOC_BATCH 8
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000301
Pavel Begunkova1ab7b32021-02-18 18:29:42 +0000302struct io_submit_link {
303 struct io_kiocb *head;
304 struct io_kiocb *last;
305};
306
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000307struct io_submit_state {
308 struct blk_plug plug;
Pavel Begunkova1ab7b32021-02-18 18:29:42 +0000309 struct io_submit_link link;
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000310
311 /*
312 * io_kiocb alloc cache
313 */
Pavel Begunkovbf019da2021-02-10 00:03:17 +0000314 void *reqs[IO_REQ_CACHE_SIZE];
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000315 unsigned int free_reqs;
316
317 bool plug_started;
318
319 /*
320 * Batch completion logic
321 */
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +0100322 struct io_kiocb *compl_reqs[IO_COMPL_BATCH];
323 unsigned int compl_nr;
324 /* inline/task_work completion list, under ->uring_lock */
325 struct list_head free_list;
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000326
Pavel Begunkov258b29a2021-02-10 00:03:10 +0000327 unsigned int ios_left;
328};
329
Jens Axboe2b188cc2019-01-07 10:46:33 -0700330struct io_ring_ctx {
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100331 /* const or read-mostly hot data */
Jens Axboe2b188cc2019-01-07 10:46:33 -0700332 struct {
333 struct percpu_ref refs;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700334
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100335 struct io_rings *rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700336 unsigned int flags;
Randy Dunlape1d85332020-02-05 20:57:10 -0800337 unsigned int compat: 1;
Randy Dunlape1d85332020-02-05 20:57:10 -0800338 unsigned int drain_next: 1;
339 unsigned int eventfd_async: 1;
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200340 unsigned int restricted: 1;
Pavel Begunkovf18ee4c2021-06-14 23:37:25 +0100341 unsigned int off_timeout_used: 1;
Pavel Begunkov10c66902021-06-15 16:47:56 +0100342 unsigned int drain_active: 1;
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100343 } ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700344
Pavel Begunkov7f1129d2021-06-14 23:37:22 +0100345 /* submission data */
Pavel Begunkovb52ecf82021-06-14 23:37:21 +0100346 struct {
Pavel Begunkov0499e582021-06-14 23:37:29 +0100347 struct mutex uring_lock;
348
Hristo Venev75b28af2019-08-26 17:23:46 +0000349 /*
350 * Ring buffer of indices into array of io_uring_sqe, which is
351 * mmapped by the application using the IORING_OFF_SQES offset.
352 *
353 * This indirection could e.g. be used to assign fixed
354 * io_uring_sqe entries to operations and only submit them to
355 * the queue when needed.
356 *
357 * The kernel modifies neither the indices array nor the entries
358 * array.
359 */
360 u32 *sq_array;
Pavel Begunkovc7af47c2021-06-14 23:37:20 +0100361 struct io_uring_sqe *sq_sqes;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700362 unsigned cached_sq_head;
363 unsigned sq_entries;
Jens Axboede0617e2019-04-06 21:51:27 -0600364 struct list_head defer_list;
Pavel Begunkov7f1129d2021-06-14 23:37:22 +0100365
366 /*
367 * Fixed resources fast path, should be accessed only under
368 * uring_lock, and updated through io_uring_register(2)
369 */
370 struct io_rsrc_node *rsrc_node;
371 struct io_file_table file_table;
372 unsigned nr_user_files;
373 unsigned nr_user_bufs;
374 struct io_mapped_ubuf **user_bufs;
375
376 struct io_submit_state submit_state;
Jens Axboe5262f562019-09-17 12:26:57 -0600377 struct list_head timeout_list;
Pavel Begunkovef9dd632021-08-28 19:54:38 -0600378 struct list_head ltimeout_list;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -0700379 struct list_head cq_overflow_list;
Pavel Begunkov7f1129d2021-06-14 23:37:22 +0100380 struct xarray io_buffers;
381 struct xarray personalities;
382 u32 pers_next;
383 unsigned sq_thread_idle;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700384 } ____cacheline_aligned_in_smp;
385
Pavel Begunkovd0acdee2021-05-16 22:58:12 +0100386 /* IRQ completion list, under ->completion_lock */
387 struct list_head locked_free_list;
388 unsigned int locked_free_nr;
Jens Axboe3c1a2ea2021-02-11 10:48:03 -0700389
Stefan Metzmacher7c30f36a2021-03-07 11:54:28 +0100390 const struct cred *sq_creds; /* cred used for __io_sq_thread() */
Jens Axboe534ca6d2020-09-02 13:52:19 -0600391 struct io_sq_data *sq_data; /* if using sq thread polling */
392
Jens Axboe90554202020-09-03 12:12:41 -0600393 struct wait_queue_head sqo_sq_wait;
Jens Axboe69fb2132020-09-14 11:16:23 -0600394 struct list_head sqd_list;
Hristo Venev75b28af2019-08-26 17:23:46 +0000395
Pavel Begunkov5ed7a372021-06-14 23:37:27 +0100396 unsigned long check_cq_overflow;
397
Jens Axboe206aefd2019-11-07 18:27:42 -0700398 struct {
399 unsigned cached_cq_tail;
400 unsigned cq_entries;
Jens Axboe206aefd2019-11-07 18:27:42 -0700401 struct eventfd_ctx *cq_ev_fd;
Pavel Begunkov0499e582021-06-14 23:37:29 +0100402 struct wait_queue_head poll_wait;
403 struct wait_queue_head cq_wait;
404 unsigned cq_extra;
405 atomic_t cq_timeouts;
Pavel Begunkov0499e582021-06-14 23:37:29 +0100406 unsigned cq_last_tm_flush;
Jens Axboe206aefd2019-11-07 18:27:42 -0700407 } ____cacheline_aligned_in_smp;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700408
409 struct {
Jens Axboe2b188cc2019-01-07 10:46:33 -0700410 spinlock_t completion_lock;
Jens Axboee94f1412019-12-19 12:06:02 -0700411
Jens Axboe89850fc2021-08-10 15:11:51 -0600412 spinlock_t timeout_lock;
413
Jens Axboedef596e2019-01-09 08:59:42 -0700414 /*
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300415 * ->iopoll_list is protected by the ctx->uring_lock for
Jens Axboedef596e2019-01-09 08:59:42 -0700416 * io_uring instances that don't use IORING_SETUP_SQPOLL.
417 * For SQPOLL, only the single threaded io_sq_thread() will
418 * manipulate the list, hence no extra locking is needed there.
419 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +0300420 struct list_head iopoll_list;
Jens Axboe78076bb2019-12-04 19:56:40 -0700421 struct hlist_head *cancel_hash;
422 unsigned cancel_hash_bits;
Hao Xu915b3dd2021-06-28 05:37:30 +0800423 bool poll_multi_queue;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700424 } ____cacheline_aligned_in_smp;
Jens Axboe85faa7b2020-04-09 18:14:00 -0600425
Stefano Garzarella21b55db2020-08-27 16:58:30 +0200426 struct io_restriction restrictions;
Jens Axboe3c1a2ea2021-02-11 10:48:03 -0700427
Pavel Begunkovb13a8912021-05-16 22:58:07 +0100428 /* slow path rsrc auxilary data, used by update/register */
429 struct {
430 struct io_rsrc_node *rsrc_backup_node;
431 struct io_mapped_ubuf *dummy_ubuf;
432 struct io_rsrc_data *file_data;
433 struct io_rsrc_data *buf_data;
434
435 struct delayed_work rsrc_put_work;
436 struct llist_head rsrc_put_llist;
437 struct list_head rsrc_ref_list;
438 spinlock_t rsrc_ref_lock;
439 };
440
Jens Axboe3c1a2ea2021-02-11 10:48:03 -0700441 /* Keep this last, we don't need it for the fast path */
Pavel Begunkovb986af72021-05-16 22:58:06 +0100442 struct {
443 #if defined(CONFIG_UNIX)
444 struct socket *ring_sock;
445 #endif
446 /* hashed buffered write serialization */
447 struct io_wq_hash *hash_map;
448
449 /* Only used for accounting purposes */
450 struct user_struct *user;
451 struct mm_struct *mm_account;
452
453 /* ctx exit and cancelation */
Pavel Begunkov9011bf92021-06-30 21:54:03 +0100454 struct llist_head fallback_llist;
455 struct delayed_work fallback_work;
Pavel Begunkovb986af72021-05-16 22:58:06 +0100456 struct work_struct exit_work;
457 struct list_head tctx_list;
458 struct completion ref_comp;
Pavel Begunkove139a1e2021-10-19 23:43:46 +0100459 u32 iowq_limits[2];
460 bool iowq_limits_set;
Pavel Begunkovb986af72021-05-16 22:58:06 +0100461 };
Jens Axboe2b188cc2019-01-07 10:46:33 -0700462};
463
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100464struct io_uring_task {
465 /* submission side */
Pavel Begunkov09899b12021-06-14 02:36:22 +0100466 int cached_refs;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100467 struct xarray xa;
468 struct wait_queue_head wait;
Stefan Metzmacheree53fb22021-03-15 12:56:57 +0100469 const struct io_ring_ctx *last;
470 struct io_wq *io_wq;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100471 struct percpu_counter inflight;
Pavel Begunkovb303fe22021-04-11 01:46:26 +0100472 atomic_t inflight_tracked;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100473 atomic_t in_idle;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100474
475 spinlock_t task_lock;
476 struct io_wq_work_list task_list;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100477 struct callback_head task_work;
Pavel Begunkov6294f362021-08-10 17:53:55 +0100478 bool task_running;
Stefan Metzmacher53e043b2021-03-15 12:56:56 +0100479};
480
Jens Axboe09bb8392019-03-13 12:39:28 -0600481/*
482 * First field must be the file pointer in all the
483 * iocb unions! See also 'struct kiocb' in <linux/fs.h>
484 */
Jens Axboe221c5eb2019-01-17 09:41:58 -0700485struct io_poll_iocb {
486 struct file *file;
Pavel Begunkov018043b2020-10-27 23:17:18 +0000487 struct wait_queue_head *head;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700488 __poll_t events;
Jens Axboe345fb362023-03-06 13:28:57 -0700489 int retries;
Jens Axboe392edb42019-12-09 17:52:20 -0700490 struct wait_queue_entry wait;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700491};
492
Pavel Begunkov9d805892021-04-13 02:58:40 +0100493struct io_poll_update {
Pavel Begunkov018043b2020-10-27 23:17:18 +0000494 struct file *file;
Pavel Begunkov9d805892021-04-13 02:58:40 +0100495 u64 old_user_data;
496 u64 new_user_data;
497 __poll_t events;
Jens Axboeb69de282021-03-17 08:37:41 -0600498 bool update_events;
499 bool update_user_data;
Pavel Begunkov018043b2020-10-27 23:17:18 +0000500};
501
Jens Axboeb5dba592019-12-11 14:02:38 -0700502struct io_close {
503 struct file *file;
Jens Axboeb5dba592019-12-11 14:02:38 -0700504 int fd;
Pavel Begunkov7df778b2021-09-24 20:04:29 +0100505 u32 file_slot;
Jens Axboeb5dba592019-12-11 14:02:38 -0700506};
507
Jens Axboead8a48a2019-11-15 08:49:11 -0700508struct io_timeout_data {
509 struct io_kiocb *req;
510 struct hrtimer timer;
511 struct timespec64 ts;
512 enum hrtimer_mode mode;
Jens Axboe50c1df22021-08-27 17:11:06 -0600513 u32 flags;
Jens Axboead8a48a2019-11-15 08:49:11 -0700514};
515
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700516struct io_accept {
517 struct file *file;
518 struct sockaddr __user *addr;
519 int __user *addr_len;
520 int flags;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +0100521 u32 file_slot;
Jens Axboe09952e32020-03-19 20:16:56 -0600522 unsigned long nofile;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700523};
524
525struct io_sync {
526 struct file *file;
527 loff_t len;
528 loff_t off;
529 int flags;
Jens Axboed63d1b52019-12-10 10:38:56 -0700530 int mode;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700531};
532
Jens Axboefbf23842019-12-17 18:45:56 -0700533struct io_cancel {
534 struct file *file;
535 u64 addr;
536};
537
Jens Axboeb29472e2019-12-17 18:50:29 -0700538struct io_timeout {
539 struct file *file;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +0300540 u32 off;
541 u32 target_seq;
Pavel Begunkov135fcde2020-07-13 23:37:12 +0300542 struct list_head list;
Pavel Begunkov90cd7e42020-10-27 23:25:36 +0000543 /* head of the link, used by linked timeouts only */
544 struct io_kiocb *head;
Jens Axboe89b263f2021-08-10 15:14:18 -0600545 /* for linked completions */
546 struct io_kiocb *prev;
Jens Axboeb29472e2019-12-17 18:50:29 -0700547};
548
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100549struct io_timeout_rem {
550 struct file *file;
551 u64 addr;
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +0000552
553 /* timeout update */
554 struct timespec64 ts;
555 u32 flags;
Pavel Begunkovf1042b62021-08-28 19:54:39 -0600556 bool ltimeout;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100557};
558
Jens Axboe9adbd452019-12-20 08:45:55 -0700559struct io_rw {
560 /* NOTE: kiocb has the file as the first member, so don't do it here */
561 struct kiocb kiocb;
562 u64 addr;
563 u64 len;
564};
565
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700566struct io_connect {
567 struct file *file;
568 struct sockaddr __user *addr;
569 int addr_len;
570};
571
Jens Axboee47293f2019-12-20 08:58:21 -0700572struct io_sr_msg {
573 struct file *file;
Jens Axboefddafac2020-01-04 20:19:44 -0700574 union {
Pavel Begunkov4af34172021-04-11 01:46:30 +0100575 struct compat_msghdr __user *umsg_compat;
576 struct user_msghdr __user *umsg;
577 void __user *buf;
Jens Axboefddafac2020-01-04 20:19:44 -0700578 };
Jens Axboee47293f2019-12-20 08:58:21 -0700579 int msg_flags;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700580 int bgid;
Jens Axboefddafac2020-01-04 20:19:44 -0700581 size_t len;
Jens Axboe9b7b0f22023-01-21 10:21:22 -0700582 size_t done_io;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700583 struct io_buffer *kbuf;
Jens Axboe34a7e502023-06-23 07:38:14 -0600584 void __user *msg_control;
Jens Axboee47293f2019-12-20 08:58:21 -0700585};
586
Jens Axboe15b71ab2019-12-11 11:20:36 -0700587struct io_open {
588 struct file *file;
589 int dfd;
Pavel Begunkovb9445592021-08-25 12:25:45 +0100590 u32 file_slot;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700591 struct filename *filename;
Jens Axboec12cedf2020-01-08 17:41:21 -0700592 struct open_how how;
Jens Axboe4022e7a2020-03-19 19:23:18 -0600593 unsigned long nofile;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700594};
595
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000596struct io_rsrc_update {
Jens Axboe05f3fb32019-12-09 11:22:50 -0700597 struct file *file;
598 u64 arg;
599 u32 nr_args;
600 u32 offset;
601};
602
Jens Axboe4840e412019-12-25 22:03:45 -0700603struct io_fadvise {
604 struct file *file;
605 u64 offset;
606 u32 len;
607 u32 advice;
608};
609
Jens Axboec1ca7572019-12-25 22:18:28 -0700610struct io_madvise {
611 struct file *file;
612 u64 addr;
613 u32 len;
614 u32 advice;
615};
616
Jens Axboe3e4827b2020-01-08 15:18:09 -0700617struct io_epoll {
618 struct file *file;
619 int epfd;
620 int op;
621 int fd;
622 struct epoll_event event;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700623};
624
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300625struct io_splice {
626 struct file *file_out;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300627 loff_t off_out;
628 loff_t off_in;
629 u64 len;
Jens Axboeae6cba32022-03-29 10:59:20 -0600630 int splice_fd_in;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300631 unsigned int flags;
632};
633
Jens Axboeddf0322d2020-02-23 16:41:33 -0700634struct io_provide_buf {
635 struct file *file;
636 __u64 addr;
Pavel Begunkov38134ad2021-04-15 13:07:39 +0100637 __u32 len;
Jens Axboeddf0322d2020-02-23 16:41:33 -0700638 __u32 bgid;
639 __u16 nbufs;
640 __u16 bid;
641};
642
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700643struct io_statx {
644 struct file *file;
645 int dfd;
646 unsigned int mask;
647 unsigned int flags;
Bijan Mottahedehe62753e2020-05-22 21:31:18 -0700648 const char __user *filename;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700649 struct statx __user *buffer;
650};
651
Jens Axboe36f4fa62020-09-05 11:14:22 -0600652struct io_shutdown {
653 struct file *file;
654 int how;
655};
656
Jens Axboe80a261f2020-09-28 14:23:58 -0600657struct io_rename {
658 struct file *file;
659 int old_dfd;
660 int new_dfd;
661 struct filename *oldpath;
662 struct filename *newpath;
663 int flags;
664};
665
Jens Axboe14a11432020-09-28 14:27:37 -0600666struct io_unlink {
667 struct file *file;
668 int dfd;
669 int flags;
670 struct filename *filename;
671};
672
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +0700673struct io_mkdir {
674 struct file *file;
675 int dfd;
676 umode_t mode;
677 struct filename *filename;
678};
679
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +0700680struct io_symlink {
681 struct file *file;
682 int new_dfd;
683 struct filename *oldpath;
684 struct filename *newpath;
685};
686
Dmitry Kadashevcf30da92021-07-08 13:34:47 +0700687struct io_hardlink {
688 struct file *file;
689 int old_dfd;
690 int new_dfd;
691 struct filename *oldpath;
692 struct filename *newpath;
693 int flags;
694};
695
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300696struct io_completion {
697 struct file *file;
Pavel Begunkov8c3f9cd2021-02-28 22:35:15 +0000698 u32 cflags;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300699};
700
Jens Axboef499a022019-12-02 16:28:46 -0700701struct io_async_connect {
702 struct sockaddr_storage address;
703};
704
Jens Axboe03b12302019-12-02 18:50:25 -0700705struct io_async_msghdr {
706 struct iovec fast_iov[UIO_FASTIOV];
Pavel Begunkov257e84a2021-02-05 00:58:00 +0000707 /* points to an allocated iov, if NULL we use fast_iov instead */
708 struct iovec *free_iov;
Jens Axboe03b12302019-12-02 18:50:25 -0700709 struct sockaddr __user *uaddr;
710 struct msghdr msg;
Jens Axboeb5379162020-02-09 11:29:15 -0700711 struct sockaddr_storage addr;
Jens Axboe03b12302019-12-02 18:50:25 -0700712};
713
Jens Axboef67676d2019-12-02 11:03:47 -0700714struct io_async_rw {
715 struct iovec fast_iov[UIO_FASTIOV];
Jens Axboeff6165b2020-08-13 09:47:43 -0600716 const struct iovec *free_iovec;
717 struct iov_iter iter;
Jens Axboecd658692021-09-10 11:19:14 -0600718 struct iov_iter_state iter_state;
Jens Axboe227c0c92020-08-13 11:51:40 -0600719 size_t bytes_done;
Jens Axboebcf5a062020-05-22 09:24:42 -0600720 struct wait_page_queue wpq;
Jens Axboef67676d2019-12-02 11:03:47 -0700721};
722
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300723enum {
724 REQ_F_FIXED_FILE_BIT = IOSQE_FIXED_FILE_BIT,
725 REQ_F_IO_DRAIN_BIT = IOSQE_IO_DRAIN_BIT,
726 REQ_F_LINK_BIT = IOSQE_IO_LINK_BIT,
727 REQ_F_HARDLINK_BIT = IOSQE_IO_HARDLINK_BIT,
728 REQ_F_FORCE_ASYNC_BIT = IOSQE_ASYNC_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700729 REQ_F_BUFFER_SELECT_BIT = IOSQE_BUFFER_SELECT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300730
Pavel Begunkovdddca222021-04-27 16:13:52 +0100731 /* first byte is taken by user flags, shift it to not overlap */
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +0100732 REQ_F_FAIL_BIT = 8,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300733 REQ_F_INFLIGHT_BIT,
734 REQ_F_CUR_POS_BIT,
735 REQ_F_NOWAIT_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300736 REQ_F_LINK_TIMEOUT_BIT,
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300737 REQ_F_NEED_CLEANUP_BIT,
Jens Axboed7718a92020-02-14 22:23:12 -0700738 REQ_F_POLLED_BIT,
Jens Axboebcda7ba2020-02-23 16:42:51 -0700739 REQ_F_BUFFER_SELECTED_BIT,
Pavel Begunkove342c802021-01-19 13:32:47 +0000740 REQ_F_COMPLETE_INLINE_BIT,
Jens Axboe230d50d2021-04-01 20:41:15 -0600741 REQ_F_REISSUE_BIT,
Pavel Begunkovb8e64b52021-06-17 18:14:02 +0100742 REQ_F_CREDS_BIT,
Pavel Begunkov20e60a32021-08-11 19:28:30 +0100743 REQ_F_REFCOUNT_BIT,
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +0100744 REQ_F_ARM_LTIMEOUT_BIT,
Jens Axboe390b8812022-03-23 09:30:05 -0600745 REQ_F_PARTIAL_IO_BIT,
Jens Axboe7b29f922021-03-12 08:30:14 -0700746 /* keep async read/write and isreg together and in order */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +0100747 REQ_F_NOWAIT_READ_BIT,
748 REQ_F_NOWAIT_WRITE_BIT,
Jens Axboe7b29f922021-03-12 08:30:14 -0700749 REQ_F_ISREG_BIT,
Jens Axboe84557872020-03-03 15:28:17 -0700750
751 /* not a real bit, just to check we're not overflowing the space */
752 __REQ_F_LAST_BIT,
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300753};
754
755enum {
756 /* ctx owns file */
757 REQ_F_FIXED_FILE = BIT(REQ_F_FIXED_FILE_BIT),
758 /* drain existing IO first */
759 REQ_F_IO_DRAIN = BIT(REQ_F_IO_DRAIN_BIT),
760 /* linked sqes */
761 REQ_F_LINK = BIT(REQ_F_LINK_BIT),
762 /* doesn't sever on completion < 0 */
763 REQ_F_HARDLINK = BIT(REQ_F_HARDLINK_BIT),
764 /* IOSQE_ASYNC */
765 REQ_F_FORCE_ASYNC = BIT(REQ_F_FORCE_ASYNC_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700766 /* IOSQE_BUFFER_SELECT */
767 REQ_F_BUFFER_SELECT = BIT(REQ_F_BUFFER_SELECT_BIT),
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300768
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300769 /* fail rest of links */
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +0100770 REQ_F_FAIL = BIT(REQ_F_FAIL_BIT),
Pavel Begunkovb05a1bc2021-03-04 13:59:24 +0000771 /* on inflight list, should be cancelled and waited on exit reliably */
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300772 REQ_F_INFLIGHT = BIT(REQ_F_INFLIGHT_BIT),
773 /* read/write uses file position */
774 REQ_F_CUR_POS = BIT(REQ_F_CUR_POS_BIT),
775 /* must not punt to workers */
776 REQ_F_NOWAIT = BIT(REQ_F_NOWAIT_BIT),
Pavel Begunkov900fad42020-10-19 16:39:16 +0100777 /* has or had linked timeout */
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300778 REQ_F_LINK_TIMEOUT = BIT(REQ_F_LINK_TIMEOUT_BIT),
Pavel Begunkov99bc4c32020-02-07 22:04:45 +0300779 /* needs cleanup */
780 REQ_F_NEED_CLEANUP = BIT(REQ_F_NEED_CLEANUP_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700781 /* already went through poll handler */
782 REQ_F_POLLED = BIT(REQ_F_POLLED_BIT),
Jens Axboebcda7ba2020-02-23 16:42:51 -0700783 /* buffer already selected */
784 REQ_F_BUFFER_SELECTED = BIT(REQ_F_BUFFER_SELECTED_BIT),
Pavel Begunkove342c802021-01-19 13:32:47 +0000785 /* completion is deferred through io_comp_state */
786 REQ_F_COMPLETE_INLINE = BIT(REQ_F_COMPLETE_INLINE_BIT),
Jens Axboe230d50d2021-04-01 20:41:15 -0600787 /* caller should reissue async */
788 REQ_F_REISSUE = BIT(REQ_F_REISSUE_BIT),
Jens Axboe7b29f922021-03-12 08:30:14 -0700789 /* supports async reads */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +0100790 REQ_F_NOWAIT_READ = BIT(REQ_F_NOWAIT_READ_BIT),
Jens Axboe7b29f922021-03-12 08:30:14 -0700791 /* supports async writes */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +0100792 REQ_F_NOWAIT_WRITE = BIT(REQ_F_NOWAIT_WRITE_BIT),
Jens Axboe7b29f922021-03-12 08:30:14 -0700793 /* regular file */
794 REQ_F_ISREG = BIT(REQ_F_ISREG_BIT),
Pavel Begunkovb8e64b52021-06-17 18:14:02 +0100795 /* has creds assigned */
796 REQ_F_CREDS = BIT(REQ_F_CREDS_BIT),
Pavel Begunkov20e60a32021-08-11 19:28:30 +0100797 /* skip refcounting if not set */
798 REQ_F_REFCOUNT = BIT(REQ_F_REFCOUNT_BIT),
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +0100799 /* there is a linked timeout that has to be armed */
800 REQ_F_ARM_LTIMEOUT = BIT(REQ_F_ARM_LTIMEOUT_BIT),
Jens Axboe390b8812022-03-23 09:30:05 -0600801 /* request has already done partial IO */
802 REQ_F_PARTIAL_IO = BIT(REQ_F_PARTIAL_IO_BIT),
Jens Axboed7718a92020-02-14 22:23:12 -0700803};
804
805struct async_poll {
806 struct io_poll_iocb poll;
Jens Axboe807abcb2020-07-17 17:09:27 -0600807 struct io_poll_iocb *double_poll;
Pavel Begunkov6b47ee62020-01-18 20:22:41 +0300808};
809
Pavel Begunkovf237c302021-08-18 12:42:46 +0100810typedef void (*io_req_tw_func_t)(struct io_kiocb *req, bool *locked);
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +0100811
Jens Axboe7cbf1722021-02-10 00:03:20 +0000812struct io_task_work {
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +0100813 union {
814 struct io_wq_work_node node;
815 struct llist_node fallback_node;
816 };
817 io_req_tw_func_t func;
Jens Axboe7cbf1722021-02-10 00:03:20 +0000818};
819
Pavel Begunkov992da012021-06-10 16:37:37 +0100820enum {
821 IORING_RSRC_FILE = 0,
822 IORING_RSRC_BUFFER = 1,
823};
824
Jens Axboe09bb8392019-03-13 12:39:28 -0600825/*
826 * NOTE! Each of the iocb union members has the file pointer
827 * as the first entry in their struct definition. So you can
828 * access the file pointer through any of the sub-structs,
829 * or directly as just 'ki_filp' in this struct.
830 */
Jens Axboe2b188cc2019-01-07 10:46:33 -0700831struct io_kiocb {
Jens Axboe221c5eb2019-01-17 09:41:58 -0700832 union {
Jens Axboe09bb8392019-03-13 12:39:28 -0600833 struct file *file;
Jens Axboe9adbd452019-12-20 08:45:55 -0700834 struct io_rw rw;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700835 struct io_poll_iocb poll;
Pavel Begunkov9d805892021-04-13 02:58:40 +0100836 struct io_poll_update poll_update;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -0700837 struct io_accept accept;
838 struct io_sync sync;
Jens Axboefbf23842019-12-17 18:45:56 -0700839 struct io_cancel cancel;
Jens Axboeb29472e2019-12-17 18:50:29 -0700840 struct io_timeout timeout;
Pavel Begunkov0bdf7a22020-10-10 18:34:10 +0100841 struct io_timeout_rem timeout_rem;
Jens Axboe3fbb51c2019-12-20 08:51:52 -0700842 struct io_connect connect;
Jens Axboee47293f2019-12-20 08:58:21 -0700843 struct io_sr_msg sr_msg;
Jens Axboe15b71ab2019-12-11 11:20:36 -0700844 struct io_open open;
Jens Axboeb5dba592019-12-11 14:02:38 -0700845 struct io_close close;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000846 struct io_rsrc_update rsrc_update;
Jens Axboe4840e412019-12-25 22:03:45 -0700847 struct io_fadvise fadvise;
Jens Axboec1ca7572019-12-25 22:18:28 -0700848 struct io_madvise madvise;
Jens Axboe3e4827b2020-01-08 15:18:09 -0700849 struct io_epoll epoll;
Pavel Begunkov7d67af22020-02-24 11:32:45 +0300850 struct io_splice splice;
Jens Axboeddf0322d2020-02-23 16:41:33 -0700851 struct io_provide_buf pbuf;
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -0700852 struct io_statx statx;
Jens Axboe36f4fa62020-09-05 11:14:22 -0600853 struct io_shutdown shutdown;
Jens Axboe80a261f2020-09-28 14:23:58 -0600854 struct io_rename rename;
Jens Axboe14a11432020-09-28 14:27:37 -0600855 struct io_unlink unlink;
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +0700856 struct io_mkdir mkdir;
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +0700857 struct io_symlink symlink;
Dmitry Kadashevcf30da92021-07-08 13:34:47 +0700858 struct io_hardlink hardlink;
Pavel Begunkov3ca405e2020-07-13 23:37:08 +0300859 /* use only after cleaning per-op data, see io_clean_op() */
860 struct io_completion compl;
Jens Axboe221c5eb2019-01-17 09:41:58 -0700861 };
Jens Axboe2b188cc2019-01-07 10:46:33 -0700862
Jens Axboee8c2bc12020-08-15 18:44:09 -0700863 /* opcode allocated if it needs to store data for async defer */
864 void *async_data;
Jens Axboed625c6e2019-12-17 19:53:05 -0700865 u8 opcode;
Xiaoguang Wang65a65432020-06-11 23:39:36 +0800866 /* polled IO has completed */
867 u8 iopoll_completed;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700868
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700869 u16 buf_index;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300870 u32 result;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -0700871
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300872 struct io_ring_ctx *ctx;
873 unsigned int flags;
Jens Axboeabc54d62021-02-24 13:32:30 -0700874 atomic_t refs;
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300875 struct task_struct *task;
876 u64 user_data;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700877
Pavel Begunkovf2f87372020-10-27 23:25:37 +0000878 struct io_kiocb *link;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +0000879 struct percpu_ref *fixed_rsrc_refs;
Jens Axboed7718a92020-02-14 22:23:12 -0700880
Pavel Begunkovb303fe22021-04-11 01:46:26 +0100881 /* used with ctx->iopoll_list with reads/writes */
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300882 struct list_head inflight_entry;
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +0100883 struct io_task_work io_task_work;
Pavel Begunkov010e8e62020-07-30 18:43:45 +0300884 /* for polled requests, i.e. IORING_OP_POLL_ADD and async armed poll */
885 struct hlist_node hash_node;
886 struct async_poll *apoll;
887 struct io_wq_work work;
Pavel Begunkovfe7e3252021-06-24 15:09:57 +0100888 const struct cred *creds;
Pavel Begunkovc10d1f92021-06-17 18:14:01 +0100889
Pavel Begunkoveae071c2021-04-25 14:32:24 +0100890 /* store used ubuf, so we can prevent reloading */
891 struct io_mapped_ubuf *imu;
Pavel Begunkovf770fba2022-08-29 14:30:18 +0100892 /* stores selected buf, valid IFF REQ_F_BUFFER_SELECTED is set */
893 struct io_buffer *kbuf;
894 atomic_t poll_refs;
Jens Axboe2b188cc2019-01-07 10:46:33 -0700895};
896
Pavel Begunkov13bf43f2021-03-06 11:02:12 +0000897struct io_tctx_node {
898 struct list_head ctx_node;
899 struct task_struct *task;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +0000900 struct io_ring_ctx *ctx;
901};
902
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300903struct io_defer_entry {
904 struct list_head list;
905 struct io_kiocb *req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +0300906 u32 seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +0300907};
908
Jens Axboed3656342019-12-18 09:50:26 -0700909struct io_op_def {
Jens Axboed3656342019-12-18 09:50:26 -0700910 /* needs req->file assigned */
911 unsigned needs_file : 1;
Jens Axboed3656342019-12-18 09:50:26 -0700912 /* hash wq insertion if file is a regular file */
913 unsigned hash_reg_file : 1;
914 /* unbound wq insertion if file is a non-regular file */
915 unsigned unbound_nonreg_file : 1;
Jens Axboe66f4af92020-01-16 15:36:52 -0700916 /* opcode is not supported by this kernel */
917 unsigned not_supported : 1;
Jens Axboe8a727582020-02-20 09:59:44 -0700918 /* set if opcode supports polled "wait" */
919 unsigned pollin : 1;
920 unsigned pollout : 1;
Jens Axboebcda7ba2020-02-23 16:42:51 -0700921 /* op supports buffer selection */
922 unsigned buffer_select : 1;
Pavel Begunkov26f05052021-02-28 22:35:18 +0000923 /* do prep async if is going to be punted */
924 unsigned needs_async_setup : 1;
Jens Axboe27926b62020-10-28 09:33:23 -0600925 /* should block plug */
926 unsigned plug : 1;
Jens Axboee8c2bc12020-08-15 18:44:09 -0700927 /* size of async data needed, if any */
928 unsigned short async_size;
Jens Axboed3656342019-12-18 09:50:26 -0700929};
930
Jens Axboe09186822020-10-13 15:01:40 -0600931static const struct io_op_def io_op_defs[] = {
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300932 [IORING_OP_NOP] = {},
933 [IORING_OP_READV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700934 .needs_file = 1,
935 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700936 .pollin = 1,
Jens Axboe4d954c22020-02-27 07:31:19 -0700937 .buffer_select = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000938 .needs_async_setup = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600939 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700940 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700941 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300942 [IORING_OP_WRITEV] = {
Jens Axboed3656342019-12-18 09:50:26 -0700943 .needs_file = 1,
944 .hash_reg_file = 1,
945 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700946 .pollout = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000947 .needs_async_setup = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600948 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700949 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700950 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300951 [IORING_OP_FSYNC] = {
Jens Axboed3656342019-12-18 09:50:26 -0700952 .needs_file = 1,
953 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300954 [IORING_OP_READ_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700955 .needs_file = 1,
956 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700957 .pollin = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600958 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700959 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700960 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300961 [IORING_OP_WRITE_FIXED] = {
Jens Axboed3656342019-12-18 09:50:26 -0700962 .needs_file = 1,
963 .hash_reg_file = 1,
964 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700965 .pollout = 1,
Jens Axboe27926b62020-10-28 09:33:23 -0600966 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700967 .async_size = sizeof(struct io_async_rw),
Jens Axboed3656342019-12-18 09:50:26 -0700968 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300969 [IORING_OP_POLL_ADD] = {
Jens Axboed3656342019-12-18 09:50:26 -0700970 .needs_file = 1,
971 .unbound_nonreg_file = 1,
972 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300973 [IORING_OP_POLL_REMOVE] = {},
974 [IORING_OP_SYNC_FILE_RANGE] = {
Jens Axboed3656342019-12-18 09:50:26 -0700975 .needs_file = 1,
976 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300977 [IORING_OP_SENDMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700978 .needs_file = 1,
979 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700980 .pollout = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000981 .needs_async_setup = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700982 .async_size = sizeof(struct io_async_msghdr),
Jens Axboed3656342019-12-18 09:50:26 -0700983 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300984 [IORING_OP_RECVMSG] = {
Jens Axboed3656342019-12-18 09:50:26 -0700985 .needs_file = 1,
986 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -0700987 .pollin = 1,
Jens Axboe52de1fe2020-02-27 10:15:42 -0700988 .buffer_select = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +0000989 .needs_async_setup = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -0700990 .async_size = sizeof(struct io_async_msghdr),
Jens Axboed3656342019-12-18 09:50:26 -0700991 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300992 [IORING_OP_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -0700993 .async_size = sizeof(struct io_timeout_data),
Jens Axboed3656342019-12-18 09:50:26 -0700994 },
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +0000995 [IORING_OP_TIMEOUT_REMOVE] = {
996 /* used by timeout updates' prep() */
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +0000997 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +0300998 [IORING_OP_ACCEPT] = {
Jens Axboed3656342019-12-18 09:50:26 -0700999 .needs_file = 1,
1000 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001001 .pollin = 1,
Jens Axboed3656342019-12-18 09:50:26 -07001002 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001003 [IORING_OP_ASYNC_CANCEL] = {},
1004 [IORING_OP_LINK_TIMEOUT] = {
Jens Axboee8c2bc12020-08-15 18:44:09 -07001005 .async_size = sizeof(struct io_timeout_data),
Jens Axboed3656342019-12-18 09:50:26 -07001006 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001007 [IORING_OP_CONNECT] = {
Jens Axboed3656342019-12-18 09:50:26 -07001008 .needs_file = 1,
1009 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001010 .pollout = 1,
Pavel Begunkov26f05052021-02-28 22:35:18 +00001011 .needs_async_setup = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -07001012 .async_size = sizeof(struct io_async_connect),
Jens Axboed3656342019-12-18 09:50:26 -07001013 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001014 [IORING_OP_FALLOCATE] = {
Jens Axboed3656342019-12-18 09:50:26 -07001015 .needs_file = 1,
1016 },
Jens Axboe44526be2021-02-15 13:32:18 -07001017 [IORING_OP_OPENAT] = {},
1018 [IORING_OP_CLOSE] = {},
1019 [IORING_OP_FILES_UPDATE] = {},
1020 [IORING_OP_STATX] = {},
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001021 [IORING_OP_READ] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -07001022 .needs_file = 1,
1023 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001024 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -07001025 .buffer_select = 1,
Jens Axboe27926b62020-10-28 09:33:23 -06001026 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -07001027 .async_size = sizeof(struct io_async_rw),
Jens Axboe3a6820f2019-12-22 15:19:35 -07001028 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001029 [IORING_OP_WRITE] = {
Jens Axboe3a6820f2019-12-22 15:19:35 -07001030 .needs_file = 1,
Jens Axboe7b3188e2021-08-30 19:37:41 -06001031 .hash_reg_file = 1,
Jens Axboe3a6820f2019-12-22 15:19:35 -07001032 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001033 .pollout = 1,
Jens Axboe27926b62020-10-28 09:33:23 -06001034 .plug = 1,
Jens Axboee8c2bc12020-08-15 18:44:09 -07001035 .async_size = sizeof(struct io_async_rw),
Jens Axboe3a6820f2019-12-22 15:19:35 -07001036 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001037 [IORING_OP_FADVISE] = {
Jens Axboe4840e412019-12-25 22:03:45 -07001038 .needs_file = 1,
1039 },
Jens Axboe44526be2021-02-15 13:32:18 -07001040 [IORING_OP_MADVISE] = {},
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001041 [IORING_OP_SEND] = {
Jens Axboefddafac2020-01-04 20:19:44 -07001042 .needs_file = 1,
1043 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001044 .pollout = 1,
Jens Axboefddafac2020-01-04 20:19:44 -07001045 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001046 [IORING_OP_RECV] = {
Jens Axboefddafac2020-01-04 20:19:44 -07001047 .needs_file = 1,
1048 .unbound_nonreg_file = 1,
Jens Axboe8a727582020-02-20 09:59:44 -07001049 .pollin = 1,
Jens Axboebcda7ba2020-02-23 16:42:51 -07001050 .buffer_select = 1,
Jens Axboefddafac2020-01-04 20:19:44 -07001051 },
Pavel Begunkov0463b6c2020-01-18 21:35:38 +03001052 [IORING_OP_OPENAT2] = {
Jens Axboecebdb982020-01-08 17:59:24 -07001053 },
Jens Axboe3e4827b2020-01-08 15:18:09 -07001054 [IORING_OP_EPOLL_CTL] = {
1055 .unbound_nonreg_file = 1,
Jens Axboe3e4827b2020-01-08 15:18:09 -07001056 },
Pavel Begunkov7d67af22020-02-24 11:32:45 +03001057 [IORING_OP_SPLICE] = {
1058 .needs_file = 1,
1059 .hash_reg_file = 1,
1060 .unbound_nonreg_file = 1,
Jens Axboeddf0322d2020-02-23 16:41:33 -07001061 },
1062 [IORING_OP_PROVIDE_BUFFERS] = {},
Jens Axboe067524e2020-03-02 16:32:28 -07001063 [IORING_OP_REMOVE_BUFFERS] = {},
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03001064 [IORING_OP_TEE] = {
1065 .needs_file = 1,
1066 .hash_reg_file = 1,
1067 .unbound_nonreg_file = 1,
1068 },
Jens Axboe36f4fa62020-09-05 11:14:22 -06001069 [IORING_OP_SHUTDOWN] = {
1070 .needs_file = 1,
1071 },
Jens Axboe44526be2021-02-15 13:32:18 -07001072 [IORING_OP_RENAMEAT] = {},
1073 [IORING_OP_UNLINKAT] = {},
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07001074 [IORING_OP_MKDIRAT] = {},
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07001075 [IORING_OP_SYMLINKAT] = {},
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07001076 [IORING_OP_LINKAT] = {},
Jens Axboed3656342019-12-18 09:50:26 -07001077};
1078
Pavel Begunkov0756a862021-08-15 10:40:25 +01001079/* requests with any of those set should undergo io_disarm_next() */
1080#define IO_DISARM_MASK (REQ_F_ARM_LTIMEOUT | REQ_F_LINK_TIMEOUT | REQ_F_FAIL)
1081
Pavel Begunkov7a612352021-03-09 00:37:59 +00001082static bool io_disarm_next(struct io_kiocb *req);
Pavel Begunkoveef51da2021-06-14 02:36:15 +01001083static void io_uring_del_tctx_node(unsigned long index);
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00001084static void io_uring_try_cancel_requests(struct io_ring_ctx *ctx,
1085 struct task_struct *task,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01001086 bool cancel_all);
Pavel Begunkov78cc6872021-06-14 02:36:23 +01001087static void io_uring_cancel_generic(bool cancel_all, struct io_sq_data *sqd);
Pavel Begunkov1ffc5422020-12-30 21:34:15 +00001088
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001089static void io_fill_cqe_req(struct io_kiocb *req, s32 res, u32 cflags);
1090
Jackie Liuec9c02a2019-11-08 23:50:36 +08001091static void io_put_req(struct io_kiocb *req);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01001092static void io_put_req_deferred(struct io_kiocb *req);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001093static void io_dismantle_req(struct io_kiocb *req);
Jens Axboe94ae5e72019-11-14 19:39:52 -07001094static void io_queue_linked_timeout(struct io_kiocb *req);
Pavel Begunkovfdecb662021-04-25 14:32:20 +01001095static int __io_register_rsrc_update(struct io_ring_ctx *ctx, unsigned type,
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01001096 struct io_uring_rsrc_update2 *up,
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01001097 unsigned nr_args);
Pavel Begunkov68fb8972021-03-19 17:22:41 +00001098static void io_clean_op(struct io_kiocb *req);
Pavel Begunkovac177052021-08-09 13:04:02 +01001099static struct file *io_file_get(struct io_ring_ctx *ctx,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08001100 struct io_kiocb *req, int fd, bool fixed,
1101 unsigned int issue_flags);
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00001102static void __io_queue_sqe(struct io_kiocb *req);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001103static void io_rsrc_put_work(struct work_struct *work);
Jens Axboede0617e2019-04-06 21:51:27 -06001104
Pavel Begunkov907d1df2021-01-26 23:35:10 +00001105static void io_req_task_queue(struct io_kiocb *req);
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01001106static void io_submit_flush_completions(struct io_ring_ctx *ctx);
Pavel Begunkov179ae0d2021-02-28 22:35:20 +00001107static int io_req_prep_async(struct io_kiocb *req);
Jens Axboe9a56a232019-01-09 09:06:50 -07001108
Pavel Begunkovb9445592021-08-25 12:25:45 +01001109static int io_install_fixed_file(struct io_kiocb *req, struct file *file,
1110 unsigned int issue_flags, u32 slot_index);
Pavel Begunkov7df778b2021-09-24 20:04:29 +01001111static int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags);
1112
Pavel Begunkovf1042b62021-08-28 19:54:39 -06001113static enum hrtimer_restart io_link_timeout_fn(struct hrtimer *timer);
Pavel Begunkovb9445592021-08-25 12:25:45 +01001114
Jens Axboe2b188cc2019-01-07 10:46:33 -07001115static struct kmem_cache *req_cachep;
1116
Jens Axboe09186822020-10-13 15:01:40 -06001117static const struct file_operations io_uring_fops;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001118
1119struct sock *io_uring_get_socket(struct file *file)
1120{
1121#if defined(CONFIG_UNIX)
1122 if (file->f_op == &io_uring_fops) {
1123 struct io_ring_ctx *ctx = file->private_data;
1124
1125 return ctx->ring_sock->sk;
1126 }
1127#endif
1128 return NULL;
1129}
1130EXPORT_SYMBOL(io_uring_get_socket);
1131
Pavel Begunkovf237c302021-08-18 12:42:46 +01001132static inline void io_tw_lock(struct io_ring_ctx *ctx, bool *locked)
1133{
1134 if (!*locked) {
1135 mutex_lock(&ctx->uring_lock);
1136 *locked = true;
1137 }
1138}
1139
Pavel Begunkovf2f87372020-10-27 23:25:37 +00001140#define io_for_each_link(pos, head) \
1141 for (pos = (head); pos; pos = pos->link)
1142
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001143/*
1144 * Shamelessly stolen from the mm implementation of page reference checking,
1145 * see commit f958d7b528b1 for details.
1146 */
1147#define req_ref_zero_or_close_to_overflow(req) \
1148 ((unsigned int) atomic_read(&(req->refs)) + 127u <= 127u)
1149
1150static inline bool req_ref_inc_not_zero(struct io_kiocb *req)
1151{
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001152 WARN_ON_ONCE(!(req->flags & REQ_F_REFCOUNT));
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001153 return atomic_inc_not_zero(&req->refs);
1154}
1155
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001156static inline bool req_ref_put_and_test(struct io_kiocb *req)
1157{
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001158 if (likely(!(req->flags & REQ_F_REFCOUNT)))
1159 return true;
1160
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001161 WARN_ON_ONCE(req_ref_zero_or_close_to_overflow(req));
1162 return atomic_dec_and_test(&req->refs);
1163}
1164
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001165static inline void req_ref_get(struct io_kiocb *req)
1166{
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001167 WARN_ON_ONCE(!(req->flags & REQ_F_REFCOUNT));
Pavel Begunkov21c843d2021-08-11 19:28:27 +01001168 WARN_ON_ONCE(req_ref_zero_or_close_to_overflow(req));
1169 atomic_inc(&req->refs);
1170}
1171
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001172static inline void __io_req_set_refcount(struct io_kiocb *req, int nr)
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001173{
1174 if (!(req->flags & REQ_F_REFCOUNT)) {
1175 req->flags |= REQ_F_REFCOUNT;
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001176 atomic_set(&req->refs, nr);
Pavel Begunkov20e60a32021-08-11 19:28:30 +01001177 }
1178}
1179
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001180static inline void io_req_set_refcount(struct io_kiocb *req)
1181{
1182 __io_req_set_refcount(req, 1);
1183}
1184
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01001185static inline void io_req_set_rsrc_node(struct io_kiocb *req)
Jens Axboec40f6372020-06-25 15:39:59 -06001186{
Pavel Begunkov36f72fe2020-11-18 19:57:26 +00001187 struct io_ring_ctx *ctx = req->ctx;
1188
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001189 if (!req->fixed_rsrc_refs) {
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01001190 req->fixed_rsrc_refs = &ctx->rsrc_node->refs;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001191 percpu_ref_get(req->fixed_rsrc_refs);
Pavel Begunkov36f72fe2020-11-18 19:57:26 +00001192 }
1193}
1194
Pavel Begunkovf70865d2021-04-11 01:46:40 +01001195static void io_refs_resurrect(struct percpu_ref *ref, struct completion *compl)
1196{
1197 bool got = percpu_ref_tryget(ref);
1198
1199 /* already at zero, wait for ->release() */
1200 if (!got)
1201 wait_for_completion(compl);
1202 percpu_ref_resurrect(ref);
1203 if (got)
1204 percpu_ref_put(ref);
1205}
1206
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01001207static bool io_match_task(struct io_kiocb *head, struct task_struct *task,
1208 bool cancel_all)
Pavel Begunkov1c939a52021-11-26 14:38:15 +00001209 __must_hold(&req->ctx->timeout_lock)
Pavel Begunkov08d23632020-11-06 13:00:22 +00001210{
1211 struct io_kiocb *req;
1212
Pavel Begunkov68207682021-03-22 01:58:25 +00001213 if (task && head->task != task)
Pavel Begunkov08d23632020-11-06 13:00:22 +00001214 return false;
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01001215 if (cancel_all)
Pavel Begunkov08d23632020-11-06 13:00:22 +00001216 return true;
1217
1218 io_for_each_link(req, head) {
Pavel Begunkovb05a1bc2021-03-04 13:59:24 +00001219 if (req->flags & REQ_F_INFLIGHT)
Jens Axboe02a13672021-01-23 15:49:31 -07001220 return true;
Pavel Begunkov08d23632020-11-06 13:00:22 +00001221 }
1222 return false;
1223}
1224
Pavel Begunkov1c939a52021-11-26 14:38:15 +00001225static bool io_match_linked(struct io_kiocb *head)
1226{
1227 struct io_kiocb *req;
1228
1229 io_for_each_link(req, head) {
1230 if (req->flags & REQ_F_INFLIGHT)
1231 return true;
1232 }
1233 return false;
1234}
1235
1236/*
1237 * As io_match_task() but protected against racing with linked timeouts.
1238 * User must not hold timeout_lock.
1239 */
1240static bool io_match_task_safe(struct io_kiocb *head, struct task_struct *task,
1241 bool cancel_all)
1242{
1243 bool matched;
1244
1245 if (task && head->task != task)
1246 return false;
1247 if (cancel_all)
1248 return true;
1249
1250 if (head->flags & REQ_F_LINK_TIMEOUT) {
1251 struct io_ring_ctx *ctx = head->ctx;
1252
1253 /* protect against races with linked timeouts */
1254 spin_lock_irq(&ctx->timeout_lock);
1255 matched = io_match_linked(head);
1256 spin_unlock_irq(&ctx->timeout_lock);
1257 } else {
1258 matched = io_match_linked(head);
1259 }
1260 return matched;
1261}
1262
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01001263static inline void req_set_fail(struct io_kiocb *req)
Jens Axboec40f6372020-06-25 15:39:59 -06001264{
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01001265 req->flags |= REQ_F_FAIL;
Jens Axboec40f6372020-06-25 15:39:59 -06001266}
Jens Axboe4a38aed22020-05-14 17:21:15 -06001267
Hao Xua8295b92021-08-27 17:46:09 +08001268static inline void req_fail_link_node(struct io_kiocb *req, int res)
1269{
1270 req_set_fail(req);
1271 req->result = res;
1272}
1273
Jens Axboe2b188cc2019-01-07 10:46:33 -07001274static void io_ring_ctx_ref_free(struct percpu_ref *ref)
1275{
1276 struct io_ring_ctx *ctx = container_of(ref, struct io_ring_ctx, refs);
1277
Jens Axboe0f158b42020-05-14 17:18:39 -06001278 complete(&ctx->ref_comp);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001279}
1280
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001281static inline bool io_is_timeout_noseq(struct io_kiocb *req)
1282{
1283 return !req->timeout.off;
1284}
1285
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001286static void io_fallback_req_func(struct work_struct *work)
1287{
1288 struct io_ring_ctx *ctx = container_of(work, struct io_ring_ctx,
1289 fallback_work.work);
1290 struct llist_node *node = llist_del_all(&ctx->fallback_llist);
1291 struct io_kiocb *req, *tmp;
Pavel Begunkovf237c302021-08-18 12:42:46 +01001292 bool locked = false;
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001293
1294 percpu_ref_get(&ctx->refs);
1295 llist_for_each_entry_safe(req, tmp, node, io_task_work.fallback_node)
Pavel Begunkovf237c302021-08-18 12:42:46 +01001296 req->io_task_work.func(req, &locked);
Pavel Begunkov5636c002021-08-18 12:42:45 +01001297
Pavel Begunkovf237c302021-08-18 12:42:46 +01001298 if (locked) {
1299 if (ctx->submit_state.compl_nr)
1300 io_submit_flush_completions(ctx);
1301 mutex_unlock(&ctx->uring_lock);
1302 }
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001303 percpu_ref_put(&ctx->refs);
Pavel Begunkovf237c302021-08-18 12:42:46 +01001304
Pavel Begunkovf56165e2021-08-09 20:18:07 +01001305}
1306
Jens Axboe2b188cc2019-01-07 10:46:33 -07001307static struct io_ring_ctx *io_ring_ctx_alloc(struct io_uring_params *p)
1308{
1309 struct io_ring_ctx *ctx;
Jens Axboe78076bb2019-12-04 19:56:40 -07001310 int hash_bits;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001311
1312 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
1313 if (!ctx)
1314 return NULL;
1315
Jens Axboe78076bb2019-12-04 19:56:40 -07001316 /*
1317 * Use 5 bits less than the max cq entries, that should give us around
1318 * 32 entries per hash list if totally full and uniformly spread.
1319 */
1320 hash_bits = ilog2(p->cq_entries);
1321 hash_bits -= 5;
1322 if (hash_bits <= 0)
1323 hash_bits = 1;
1324 ctx->cancel_hash_bits = hash_bits;
1325 ctx->cancel_hash = kmalloc((1U << hash_bits) * sizeof(struct hlist_head),
1326 GFP_KERNEL);
1327 if (!ctx->cancel_hash)
1328 goto err;
1329 __hash_init(ctx->cancel_hash, 1U << hash_bits);
1330
Pavel Begunkov62248432021-04-28 13:11:29 +01001331 ctx->dummy_ubuf = kzalloc(sizeof(*ctx->dummy_ubuf), GFP_KERNEL);
1332 if (!ctx->dummy_ubuf)
1333 goto err;
1334 /* set invalid range, so io_import_fixed() fails meeting it */
1335 ctx->dummy_ubuf->ubuf = -1UL;
1336
Roman Gushchin21482892019-05-07 10:01:48 -07001337 if (percpu_ref_init(&ctx->refs, io_ring_ctx_ref_free,
Jens Axboe206aefd2019-11-07 18:27:42 -07001338 PERCPU_REF_ALLOW_REINIT, GFP_KERNEL))
1339 goto err;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001340
1341 ctx->flags = p->flags;
Jens Axboe90554202020-09-03 12:12:41 -06001342 init_waitqueue_head(&ctx->sqo_sq_wait);
Jens Axboe69fb2132020-09-14 11:16:23 -06001343 INIT_LIST_HEAD(&ctx->sqd_list);
Pavel Begunkov311997b2021-06-14 23:37:28 +01001344 init_waitqueue_head(&ctx->poll_wait);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001345 INIT_LIST_HEAD(&ctx->cq_overflow_list);
Jens Axboe0f158b42020-05-14 17:18:39 -06001346 init_completion(&ctx->ref_comp);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07001347 xa_init_flags(&ctx->io_buffers, XA_FLAGS_ALLOC1);
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00001348 xa_init_flags(&ctx->personalities, XA_FLAGS_ALLOC1);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001349 mutex_init(&ctx->uring_lock);
Pavel Begunkov311997b2021-06-14 23:37:28 +01001350 init_waitqueue_head(&ctx->cq_wait);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001351 spin_lock_init(&ctx->completion_lock);
Jens Axboe89850fc2021-08-10 15:11:51 -06001352 spin_lock_init(&ctx->timeout_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03001353 INIT_LIST_HEAD(&ctx->iopoll_list);
Jens Axboede0617e2019-04-06 21:51:27 -06001354 INIT_LIST_HEAD(&ctx->defer_list);
Jens Axboe5262f562019-09-17 12:26:57 -06001355 INIT_LIST_HEAD(&ctx->timeout_list);
Pavel Begunkovef9dd632021-08-28 19:54:38 -06001356 INIT_LIST_HEAD(&ctx->ltimeout_list);
Bijan Mottahedehd67d2262021-01-15 17:37:46 +00001357 spin_lock_init(&ctx->rsrc_ref_lock);
1358 INIT_LIST_HEAD(&ctx->rsrc_ref_list);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00001359 INIT_DELAYED_WORK(&ctx->rsrc_put_work, io_rsrc_put_work);
1360 init_llist_head(&ctx->rsrc_put_llist);
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00001361 INIT_LIST_HEAD(&ctx->tctx_list);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001362 INIT_LIST_HEAD(&ctx->submit_state.free_list);
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001363 INIT_LIST_HEAD(&ctx->locked_free_list);
Pavel Begunkov9011bf92021-06-30 21:54:03 +01001364 INIT_DELAYED_WORK(&ctx->fallback_work, io_fallback_req_func);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001365 return ctx;
Jens Axboe206aefd2019-11-07 18:27:42 -07001366err:
Pavel Begunkov62248432021-04-28 13:11:29 +01001367 kfree(ctx->dummy_ubuf);
Jens Axboe78076bb2019-12-04 19:56:40 -07001368 kfree(ctx->cancel_hash);
Jens Axboe206aefd2019-11-07 18:27:42 -07001369 kfree(ctx);
1370 return NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001371}
1372
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001373static void io_account_cq_overflow(struct io_ring_ctx *ctx)
1374{
1375 struct io_rings *r = ctx->rings;
1376
1377 WRITE_ONCE(r->cq_overflow, READ_ONCE(r->cq_overflow) + 1);
1378 ctx->cq_extra--;
1379}
1380
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001381static bool req_need_defer(struct io_kiocb *req, u32 seq)
Jens Axboede0617e2019-04-06 21:51:27 -06001382{
Jens Axboe2bc99302020-07-09 09:43:27 -06001383 if (unlikely(req->flags & REQ_F_IO_DRAIN)) {
1384 struct io_ring_ctx *ctx = req->ctx;
Jackie Liua197f662019-11-08 08:09:12 -07001385
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001386 return seq + READ_ONCE(ctx->cq_extra) != ctx->cached_cq_tail;
Jens Axboe2bc99302020-07-09 09:43:27 -06001387 }
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001388
Bob Liu9d858b22019-11-13 18:06:25 +08001389 return false;
Jens Axboe7adf4ea2019-10-10 21:42:58 -06001390}
1391
Pavel Begunkovc97d8a02021-08-09 13:04:04 +01001392#define FFS_ASYNC_READ 0x1UL
1393#define FFS_ASYNC_WRITE 0x2UL
1394#ifdef CONFIG_64BIT
1395#define FFS_ISREG 0x4UL
1396#else
1397#define FFS_ISREG 0x0UL
1398#endif
1399#define FFS_MASK ~(FFS_ASYNC_READ|FFS_ASYNC_WRITE|FFS_ISREG)
1400
1401static inline bool io_req_ffs_set(struct io_kiocb *req)
1402{
1403 return IS_ENABLED(CONFIG_64BIT) && (req->flags & REQ_F_FIXED_FILE);
1404}
1405
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001406static void io_req_track_inflight(struct io_kiocb *req)
1407{
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001408 if (!(req->flags & REQ_F_INFLIGHT)) {
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001409 req->flags |= REQ_F_INFLIGHT;
Jens Axboe3746d622022-06-23 11:06:43 -06001410 atomic_inc(&req->task->io_uring->inflight_tracked);
Pavel Begunkovce3d5aa2021-02-01 18:59:55 +00001411 }
1412}
1413
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001414static struct io_kiocb *__io_prep_linked_timeout(struct io_kiocb *req)
1415{
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01001416 if (WARN_ON_ONCE(!req->link))
1417 return NULL;
1418
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01001419 req->flags &= ~REQ_F_ARM_LTIMEOUT;
1420 req->flags |= REQ_F_LINK_TIMEOUT;
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001421
1422 /* linked timeouts should have two refs once prep'ed */
Pavel Begunkov48dcd382021-08-15 10:40:18 +01001423 io_req_set_refcount(req);
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01001424 __io_req_set_refcount(req->link, 2);
1425 return req->link;
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001426}
1427
1428static inline struct io_kiocb *io_prep_linked_timeout(struct io_kiocb *req)
1429{
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01001430 if (likely(!(req->flags & REQ_F_ARM_LTIMEOUT)))
Pavel Begunkovfd08e532021-08-11 19:28:31 +01001431 return NULL;
1432 return __io_prep_linked_timeout(req);
1433}
1434
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001435static void io_prep_async_work(struct io_kiocb *req)
Jens Axboe561fb042019-10-24 07:25:42 -06001436{
Jens Axboed3656342019-12-18 09:50:26 -07001437 const struct io_op_def *def = &io_op_defs[req->opcode];
Pavel Begunkov23329512020-10-10 18:34:06 +01001438 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe54a91f32019-09-10 09:15:04 -06001439
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01001440 if (!(req->flags & REQ_F_CREDS)) {
1441 req->flags |= REQ_F_CREDS;
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01001442 req->creds = get_current_cred();
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01001443 }
Jens Axboe003e8dc2021-03-06 09:22:27 -07001444
Pavel Begunkove1d675d2021-03-22 01:58:29 +00001445 req->work.list.next = NULL;
1446 req->work.flags = 0;
Pavel Begunkovfeaadc42020-10-22 16:47:16 +01001447 if (req->flags & REQ_F_FORCE_ASYNC)
1448 req->work.flags |= IO_WQ_WORK_CONCURRENT;
1449
Jens Axboed3656342019-12-18 09:50:26 -07001450 if (req->flags & REQ_F_ISREG) {
Pavel Begunkov23329512020-10-10 18:34:06 +01001451 if (def->hash_reg_file || (ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov8766dd52020-03-14 00:31:04 +03001452 io_wq_hash_work(&req->work, file_inode(req->file));
Jens Axboe4b982bd2021-04-01 08:38:34 -06001453 } else if (!req->file || !S_ISBLK(file_inode(req->file)->i_mode)) {
Jens Axboed3656342019-12-18 09:50:26 -07001454 if (def->unbound_nonreg_file)
Jens Axboe3529d8c2019-12-19 18:24:38 -07001455 req->work.flags |= IO_WQ_WORK_UNBOUND;
Jens Axboe54a91f32019-09-10 09:15:04 -06001456 }
Jens Axboe561fb042019-10-24 07:25:42 -06001457}
1458
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001459static void io_prep_async_link(struct io_kiocb *req)
1460{
1461 struct io_kiocb *cur;
1462
Pavel Begunkov44eff402021-07-26 14:14:31 +01001463 if (req->flags & REQ_F_LINK_TIMEOUT) {
1464 struct io_ring_ctx *ctx = req->ctx;
1465
Pavel Begunkov09eb40f2021-11-23 01:45:35 +00001466 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov44eff402021-07-26 14:14:31 +01001467 io_for_each_link(cur, req)
1468 io_prep_async_work(cur);
Pavel Begunkov09eb40f2021-11-23 01:45:35 +00001469 spin_unlock_irq(&ctx->timeout_lock);
Pavel Begunkov44eff402021-07-26 14:14:31 +01001470 } else {
1471 io_for_each_link(cur, req)
1472 io_prep_async_work(cur);
1473 }
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001474}
1475
Pavel Begunkovf237c302021-08-18 12:42:46 +01001476static void io_queue_async_work(struct io_kiocb *req, bool *locked)
Jens Axboe561fb042019-10-24 07:25:42 -06001477{
Jackie Liua197f662019-11-08 08:09:12 -07001478 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001479 struct io_kiocb *link = io_prep_linked_timeout(req);
Jens Axboe5aa75ed2021-02-16 12:56:50 -07001480 struct io_uring_task *tctx = req->task->io_uring;
Jens Axboe561fb042019-10-24 07:25:42 -06001481
Pavel Begunkovf237c302021-08-18 12:42:46 +01001482 /* must not take the lock, NULL it as a precaution */
1483 locked = NULL;
1484
Jens Axboe3bfe6102021-02-16 14:15:30 -07001485 BUG_ON(!tctx);
1486 BUG_ON(!tctx->io_wq);
Jens Axboe561fb042019-10-24 07:25:42 -06001487
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001488 /* init ->work of the whole link before punting */
1489 io_prep_async_link(req);
Jens Axboe991468d2021-07-23 11:53:54 -06001490
1491 /*
1492 * Not expected to happen, but if we do have a bug where this _can_
1493 * happen, catch it here and ensure the request is marked as
1494 * canceled. That will make io-wq go through the usual work cancel
1495 * procedure rather than attempt to run this request (or create a new
1496 * worker for it).
1497 */
1498 if (WARN_ON_ONCE(!same_thread_group(req->task, current)))
1499 req->work.flags |= IO_WQ_WORK_CANCEL;
1500
Pavel Begunkovd07f1e8a2021-03-22 01:45:58 +00001501 trace_io_uring_queue_async_work(ctx, io_wq_is_hashed(&req->work), req,
1502 &req->work, req->flags);
Pavel Begunkovebf93662021-03-01 18:20:47 +00001503 io_wq_enqueue(tctx->io_wq, &req->work);
Jens Axboe7271ef32020-08-10 09:55:22 -06001504 if (link)
1505 io_queue_linked_timeout(link);
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03001506}
1507
Pavel Begunkov1ee41602021-03-25 18:32:42 +00001508static void io_kill_timeout(struct io_kiocb *req, int status)
Pavel Begunkov8c855882021-04-13 02:58:41 +01001509 __must_hold(&req->ctx->completion_lock)
Jens Axboe89850fc2021-08-10 15:11:51 -06001510 __must_hold(&req->ctx->timeout_lock)
Jens Axboe5262f562019-09-17 12:26:57 -06001511{
Jens Axboee8c2bc12020-08-15 18:44:09 -07001512 struct io_timeout_data *io = req->async_data;
Jens Axboe5262f562019-09-17 12:26:57 -06001513
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01001514 if (hrtimer_try_to_cancel(&io->timer) != -1) {
Pavel Begunkov2ae2eb92021-09-09 13:56:27 +01001515 if (status)
1516 req_set_fail(req);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03001517 atomic_set(&req->ctx->cq_timeouts,
1518 atomic_read(&req->ctx->cq_timeouts) + 1);
Pavel Begunkov135fcde2020-07-13 23:37:12 +03001519 list_del_init(&req->timeout.list);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001520 io_fill_cqe_req(req, status, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01001521 io_put_req_deferred(req);
Jens Axboe5262f562019-09-17 12:26:57 -06001522 }
1523}
1524
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001525static void io_queue_deferred(struct io_ring_ctx *ctx)
Pavel Begunkov04518942020-05-26 20:34:05 +03001526{
Jens Axboefb348852023-07-11 09:35:30 -06001527 lockdep_assert_held(&ctx->completion_lock);
1528
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001529 while (!list_empty(&ctx->defer_list)) {
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001530 struct io_defer_entry *de = list_first_entry(&ctx->defer_list,
1531 struct io_defer_entry, list);
Pavel Begunkov04518942020-05-26 20:34:05 +03001532
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03001533 if (req_need_defer(de->req, de->seq))
Pavel Begunkov04518942020-05-26 20:34:05 +03001534 break;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001535 list_del_init(&de->list);
Pavel Begunkov907d1df2021-01-26 23:35:10 +00001536 io_req_task_queue(de->req);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03001537 kfree(de);
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001538 }
Pavel Begunkov04518942020-05-26 20:34:05 +03001539}
1540
Pavel Begunkov360428f2020-05-30 14:54:17 +03001541static void io_flush_timeouts(struct io_ring_ctx *ctx)
Jens Axboe89850fc2021-08-10 15:11:51 -06001542 __must_hold(&ctx->completion_lock)
Pavel Begunkov360428f2020-05-30 14:54:17 +03001543{
Pavel Begunkov441b8a72021-06-14 23:37:31 +01001544 u32 seq = ctx->cached_cq_tail - atomic_read(&ctx->cq_timeouts);
Jens Axboeba7261a2022-04-08 11:08:58 -06001545 struct io_kiocb *req, *tmp;
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001546
Jens Axboe79ebeae2021-08-10 15:18:27 -06001547 spin_lock_irq(&ctx->timeout_lock);
Jens Axboeba7261a2022-04-08 11:08:58 -06001548 list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001549 u32 events_needed, events_got;
Pavel Begunkov360428f2020-05-30 14:54:17 +03001550
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03001551 if (io_is_timeout_noseq(req))
Pavel Begunkov360428f2020-05-30 14:54:17 +03001552 break;
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001553
1554 /*
1555 * Since seq can easily wrap around over time, subtract
1556 * the last seq at which timeouts were flushed before comparing.
1557 * Assuming not more than 2^31-1 events have happened since,
1558 * these subtractions won't have wrapped, so we can check if
1559 * target is in [last_seq, current_seq] by comparing the two.
1560 */
1561 events_needed = req->timeout.target_seq - ctx->cq_last_tm_flush;
1562 events_got = seq - ctx->cq_last_tm_flush;
1563 if (events_got < events_needed)
Pavel Begunkov360428f2020-05-30 14:54:17 +03001564 break;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03001565
Pavel Begunkov1ee41602021-03-25 18:32:42 +00001566 io_kill_timeout(req, 0);
Pavel Begunkovf18ee4c2021-06-14 23:37:25 +01001567 }
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05001568 ctx->cq_last_tm_flush = seq;
Jens Axboe79ebeae2021-08-10 15:18:27 -06001569 spin_unlock_irq(&ctx->timeout_lock);
Pavel Begunkov360428f2020-05-30 14:54:17 +03001570}
1571
Pavel Begunkov2335f6f2021-06-15 16:47:58 +01001572static void __io_commit_cqring_flush(struct io_ring_ctx *ctx)
Jens Axboede0617e2019-04-06 21:51:27 -06001573{
Pavel Begunkov2335f6f2021-06-15 16:47:58 +01001574 if (ctx->off_timeout_used)
1575 io_flush_timeouts(ctx);
1576 if (ctx->drain_active)
1577 io_queue_deferred(ctx);
1578}
1579
Jens Axboefb348852023-07-11 09:35:30 -06001580static inline bool io_commit_needs_flush(struct io_ring_ctx *ctx)
Pavel Begunkov2335f6f2021-06-15 16:47:58 +01001581{
Jens Axboefb348852023-07-11 09:35:30 -06001582 return ctx->off_timeout_used || ctx->drain_active;
1583}
1584
1585static inline void __io_commit_cqring(struct io_ring_ctx *ctx)
1586{
Pavel Begunkovec30e042021-01-19 13:32:38 +00001587 /* order cqe stores with ring update */
1588 smp_store_release(&ctx->rings->cq.tail, ctx->cached_cq_tail);
Jens Axboede0617e2019-04-06 21:51:27 -06001589}
1590
Jens Axboefb348852023-07-11 09:35:30 -06001591static inline void io_commit_cqring(struct io_ring_ctx *ctx)
1592{
1593 if (unlikely(io_commit_needs_flush(ctx)))
1594 __io_commit_cqring_flush(ctx);
1595 __io_commit_cqring(ctx);
1596}
1597
Jens Axboe90554202020-09-03 12:12:41 -06001598static inline bool io_sqring_full(struct io_ring_ctx *ctx)
1599{
1600 struct io_rings *r = ctx->rings;
1601
Pavel Begunkova566c552021-05-16 22:58:08 +01001602 return READ_ONCE(r->sq.tail) - ctx->cached_sq_head == ctx->sq_entries;
Jens Axboe90554202020-09-03 12:12:41 -06001603}
1604
Pavel Begunkov888aae22021-01-19 13:32:39 +00001605static inline unsigned int __io_cqring_events(struct io_ring_ctx *ctx)
1606{
1607 return ctx->cached_cq_tail - READ_ONCE(ctx->rings->cq.head);
1608}
1609
Pavel Begunkovd068b502021-05-16 22:58:11 +01001610static inline struct io_uring_cqe *io_get_cqe(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001611{
Hristo Venev75b28af2019-08-26 17:23:46 +00001612 struct io_rings *rings = ctx->rings;
Pavel Begunkovea5ab3b2021-05-16 22:58:09 +01001613 unsigned tail, mask = ctx->cq_entries - 1;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001614
Stefan Bühler115e12e2019-04-24 23:54:18 +02001615 /*
1616 * writes to the cq entry need to come after reading head; the
1617 * control dependency is enough as we're using WRITE_ONCE to
1618 * fill the cq entry
1619 */
Pavel Begunkova566c552021-05-16 22:58:08 +01001620 if (__io_cqring_events(ctx) == ctx->cq_entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001621 return NULL;
1622
Pavel Begunkov888aae22021-01-19 13:32:39 +00001623 tail = ctx->cached_cq_tail++;
Pavel Begunkovea5ab3b2021-05-16 22:58:09 +01001624 return &rings->cqes[tail & mask];
Jens Axboe2b188cc2019-01-07 10:46:33 -07001625}
1626
Jens Axboef2842ab2020-01-08 11:04:00 -07001627static inline bool io_should_trigger_evfd(struct io_ring_ctx *ctx)
1628{
Pavel Begunkov44c769d2021-04-11 01:46:31 +01001629 if (likely(!ctx->cq_ev_fd))
Jens Axboef0b493e2020-02-01 21:30:11 -07001630 return false;
Stefano Garzarella7e55a192020-05-15 18:38:05 +02001631 if (READ_ONCE(ctx->rings->cq_flags) & IORING_CQ_EVENTFD_DISABLED)
1632 return false;
Pavel Begunkov44c769d2021-04-11 01:46:31 +01001633 return !ctx->eventfd_async || io_wq_current_is_worker();
Jens Axboef2842ab2020-01-08 11:04:00 -07001634}
1635
Jens Axboe2c5d7632021-08-21 07:21:19 -06001636/*
1637 * This should only get called when at least one event has been posted.
1638 * Some applications rely on the eventfd notification count only changing
1639 * IFF a new CQE has been added to the CQ ring. There's no depedency on
1640 * 1:1 relationship between how many times this function is called (and
1641 * hence the eventfd count) and number of CQEs posted to the CQ ring.
1642 */
Jens Axboeb41e9852020-02-17 09:52:41 -07001643static void io_cqring_ev_posted(struct io_ring_ctx *ctx)
Jens Axboe8c838782019-03-12 15:48:16 -06001644{
Jens Axboe5fd46172021-08-06 14:04:31 -06001645 /*
1646 * wake_up_all() may seem excessive, but io_wake_function() and
1647 * io_should_wake() handle the termination of the loop and only
1648 * wake as many waiters as we need to.
1649 */
1650 if (wq_has_sleeper(&ctx->cq_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001651 __wake_up(&ctx->cq_wait, TASK_NORMAL, 0,
1652 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Jens Axboe534ca6d2020-09-02 13:52:19 -06001653 if (ctx->sq_data && waitqueue_active(&ctx->sq_data->wait))
1654 wake_up(&ctx->sq_data->wait);
Jens Axboeb41e9852020-02-17 09:52:41 -07001655 if (io_should_trigger_evfd(ctx))
Jens Axboeccf06b52022-12-23 07:04:49 -07001656 eventfd_signal_mask(ctx->cq_ev_fd, 1, EPOLL_URING_WAKE);
Pavel Begunkov3f008382021-10-01 10:39:33 +01001657 if (waitqueue_active(&ctx->poll_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001658 __wake_up(&ctx->poll_wait, TASK_INTERRUPTIBLE, 0,
1659 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Jens Axboe8c838782019-03-12 15:48:16 -06001660}
1661
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001662static void io_cqring_ev_posted_iopoll(struct io_ring_ctx *ctx)
1663{
Pavel Begunkovc57a91fb2021-09-08 20:49:17 +01001664 /* see waitqueue_active() comment */
1665 smp_mb();
1666
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001667 if (ctx->flags & IORING_SETUP_SQPOLL) {
Pavel Begunkovc57a91fb2021-09-08 20:49:17 +01001668 if (waitqueue_active(&ctx->cq_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001669 __wake_up(&ctx->cq_wait, TASK_NORMAL, 0,
1670 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001671 }
1672 if (io_should_trigger_evfd(ctx))
Jens Axboeccf06b52022-12-23 07:04:49 -07001673 eventfd_signal_mask(ctx->cq_ev_fd, 1, EPOLL_URING_WAKE);
Pavel Begunkov3f008382021-10-01 10:39:33 +01001674 if (waitqueue_active(&ctx->poll_wait))
Jens Axboeccf06b52022-12-23 07:04:49 -07001675 __wake_up(&ctx->poll_wait, TASK_INTERRUPTIBLE, 0,
1676 poll_to_key(EPOLL_URING_WAKE | EPOLLIN));
Pavel Begunkov80c18e42021-01-07 03:15:41 +00001677}
1678
Jens Axboec4a2ed72019-11-21 21:01:26 -07001679/* Returns true if there are no backlogged entries after the flush */
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001680static bool __io_cqring_overflow_flush(struct io_ring_ctx *ctx, bool force)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001681{
Jens Axboeb18032b2021-01-24 16:58:56 -07001682 bool all_flushed, posted;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001683
Pavel Begunkova566c552021-05-16 22:58:08 +01001684 if (!force && __io_cqring_events(ctx) == ctx->cq_entries)
Pavel Begunkove23de152020-12-17 00:24:37 +00001685 return false;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001686
Jens Axboeb18032b2021-01-24 16:58:56 -07001687 posted = false;
Jens Axboe79ebeae2021-08-10 15:18:27 -06001688 spin_lock(&ctx->completion_lock);
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001689 while (!list_empty(&ctx->cq_overflow_list)) {
Pavel Begunkovd068b502021-05-16 22:58:11 +01001690 struct io_uring_cqe *cqe = io_get_cqe(ctx);
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001691 struct io_overflow_cqe *ocqe;
Jens Axboee6c8aa92020-09-28 13:10:13 -06001692
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001693 if (!cqe && !force)
1694 break;
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001695 ocqe = list_first_entry(&ctx->cq_overflow_list,
1696 struct io_overflow_cqe, list);
1697 if (cqe)
1698 memcpy(cqe, &ocqe->cqe, sizeof(*cqe));
1699 else
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001700 io_account_cq_overflow(ctx);
1701
Jens Axboeb18032b2021-01-24 16:58:56 -07001702 posted = true;
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00001703 list_del(&ocqe->list);
1704 kfree(ocqe);
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001705 }
1706
Pavel Begunkov09e88402020-12-17 00:24:38 +00001707 all_flushed = list_empty(&ctx->cq_overflow_list);
1708 if (all_flushed) {
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01001709 clear_bit(0, &ctx->check_cq_overflow);
Nadav Amit20c0b382021-08-07 17:13:42 -07001710 WRITE_ONCE(ctx->rings->sq_flags,
1711 ctx->rings->sq_flags & ~IORING_SQ_CQ_OVERFLOW);
Pavel Begunkov09e88402020-12-17 00:24:38 +00001712 }
Pavel Begunkov46930142020-07-30 18:43:49 +03001713
Jens Axboeb18032b2021-01-24 16:58:56 -07001714 if (posted)
1715 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06001716 spin_unlock(&ctx->completion_lock);
Jens Axboeb18032b2021-01-24 16:58:56 -07001717 if (posted)
1718 io_cqring_ev_posted(ctx);
Pavel Begunkov09e88402020-12-17 00:24:38 +00001719 return all_flushed;
Jens Axboe1d7bb1d2019-11-06 11:31:17 -07001720}
1721
Pavel Begunkov90f67362021-08-09 20:18:12 +01001722static bool io_cqring_overflow_flush(struct io_ring_ctx *ctx)
Pavel Begunkov6c503152021-01-04 20:36:36 +00001723{
Jens Axboeca0a2652021-03-04 17:15:48 -07001724 bool ret = true;
1725
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01001726 if (test_bit(0, &ctx->check_cq_overflow)) {
Pavel Begunkov6c503152021-01-04 20:36:36 +00001727 /* iopoll syncs against uring_lock, not completion_lock */
1728 if (ctx->flags & IORING_SETUP_IOPOLL)
1729 mutex_lock(&ctx->uring_lock);
Pavel Begunkov90f67362021-08-09 20:18:12 +01001730 ret = __io_cqring_overflow_flush(ctx, false);
Pavel Begunkov6c503152021-01-04 20:36:36 +00001731 if (ctx->flags & IORING_SETUP_IOPOLL)
1732 mutex_unlock(&ctx->uring_lock);
1733 }
Jens Axboeca0a2652021-03-04 17:15:48 -07001734
1735 return ret;
Pavel Begunkov6c503152021-01-04 20:36:36 +00001736}
1737
Pavel Begunkov6a290a12021-08-09 13:04:13 +01001738/* must to be called somewhat shortly after putting a request */
1739static inline void io_put_task(struct task_struct *task, int nr)
1740{
1741 struct io_uring_task *tctx = task->io_uring;
1742
Pavel Begunkove98e49b2021-08-18 17:01:43 +01001743 if (likely(task == current)) {
1744 tctx->cached_refs += nr;
1745 } else {
1746 percpu_counter_sub(&tctx->inflight, nr);
1747 if (unlikely(atomic_read(&tctx->in_idle)))
1748 wake_up(&tctx->wait);
1749 put_task_struct_many(task, nr);
1750 }
Pavel Begunkov6a290a12021-08-09 13:04:13 +01001751}
1752
Pavel Begunkov9a108672021-08-27 11:55:01 +01001753static void io_task_refs_refill(struct io_uring_task *tctx)
1754{
1755 unsigned int refill = -tctx->cached_refs + IO_TCTX_REFS_CACHE_NR;
1756
1757 percpu_counter_add(&tctx->inflight, refill);
1758 refcount_add(refill, &current->usage);
1759 tctx->cached_refs += refill;
1760}
1761
1762static inline void io_get_task_refs(int nr)
1763{
1764 struct io_uring_task *tctx = current->io_uring;
1765
1766 tctx->cached_refs -= nr;
1767 if (unlikely(tctx->cached_refs < 0))
1768 io_task_refs_refill(tctx);
1769}
1770
Pavel Begunkovb168b1a2022-01-09 00:53:22 +00001771static __cold void io_uring_drop_tctx_refs(struct task_struct *task)
1772{
1773 struct io_uring_task *tctx = task->io_uring;
1774 unsigned int refs = tctx->cached_refs;
1775
1776 if (refs) {
1777 tctx->cached_refs = 0;
1778 percpu_counter_sub(&tctx->inflight, refs);
1779 put_task_struct_many(task, refs);
1780 }
1781}
1782
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001783static bool io_cqring_event_overflow(struct io_ring_ctx *ctx, u64 user_data,
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001784 s32 res, u32 cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001785{
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001786 struct io_overflow_cqe *ocqe;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001787
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001788 ocqe = kmalloc(sizeof(*ocqe), GFP_ATOMIC | __GFP_ACCOUNT);
1789 if (!ocqe) {
1790 /*
1791 * If we're in ring overflow flush mode, or in task cancel mode,
1792 * or cannot allocate an overflow entry, then we need to drop it
1793 * on the floor.
1794 */
Pavel Begunkov8f6ed492021-05-16 22:58:10 +01001795 io_account_cq_overflow(ctx);
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001796 return false;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001797 }
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001798 if (list_empty(&ctx->cq_overflow_list)) {
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01001799 set_bit(0, &ctx->check_cq_overflow);
Nadav Amit20c0b382021-08-07 17:13:42 -07001800 WRITE_ONCE(ctx->rings->sq_flags,
1801 ctx->rings->sq_flags | IORING_SQ_CQ_OVERFLOW);
1802
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001803 }
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001804 ocqe->cqe.user_data = user_data;
Pavel Begunkovcce4b8b2021-04-13 02:58:44 +01001805 ocqe->cqe.res = res;
1806 ocqe->cqe.flags = cflags;
1807 list_add_tail(&ocqe->list, &ctx->cq_overflow_list);
1808 return true;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001809}
1810
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001811static inline bool __io_fill_cqe(struct io_ring_ctx *ctx, u64 user_data,
1812 s32 res, u32 cflags)
Pavel Begunkov8d133262021-04-11 01:46:33 +01001813{
Jens Axboe2b188cc2019-01-07 10:46:33 -07001814 struct io_uring_cqe *cqe;
1815
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001816 trace_io_uring_complete(ctx, user_data, res, cflags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001817
1818 /*
1819 * If we can't get a cq entry, userspace overflowed the
1820 * submission (by quite a lot). Increment the overflow count in
1821 * the ring.
1822 */
Pavel Begunkovd068b502021-05-16 22:58:11 +01001823 cqe = io_get_cqe(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001824 if (likely(cqe)) {
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001825 WRITE_ONCE(cqe->user_data, user_data);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001826 WRITE_ONCE(cqe->res, res);
1827 WRITE_ONCE(cqe->flags, cflags);
Pavel Begunkov8d133262021-04-11 01:46:33 +01001828 return true;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001829 }
Pavel Begunkovd4d19c12021-04-25 14:32:17 +01001830 return io_cqring_event_overflow(ctx, user_data, res, cflags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001831}
1832
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001833static noinline void io_fill_cqe_req(struct io_kiocb *req, s32 res, u32 cflags)
Jens Axboebcda7ba2020-02-23 16:42:51 -07001834{
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001835 __io_fill_cqe(req->ctx, req->user_data, res, cflags);
1836}
1837
1838static noinline bool io_fill_cqe_aux(struct io_ring_ctx *ctx, u64 user_data,
1839 s32 res, u32 cflags)
1840{
1841 ctx->cq_extra++;
1842 return __io_fill_cqe(ctx, user_data, res, cflags);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001843}
1844
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001845static void io_req_complete_post(struct io_kiocb *req, s32 res,
1846 u32 cflags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001847{
Jens Axboe78e19bb2019-11-06 15:21:34 -07001848 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001849
Jens Axboe79ebeae2021-08-10 15:18:27 -06001850 spin_lock(&ctx->completion_lock);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01001851 __io_fill_cqe(ctx, req->user_data, res, cflags);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001852 /*
1853 * If we're the last reference to this request, add to our locked
1854 * free_list cache.
1855 */
Jens Axboede9b4cc2021-02-24 13:28:27 -07001856 if (req_ref_put_and_test(req)) {
Pavel Begunkov7a612352021-03-09 00:37:59 +00001857 if (req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) {
Pavel Begunkov0756a862021-08-15 10:40:25 +01001858 if (req->flags & IO_DISARM_MASK)
Pavel Begunkov7a612352021-03-09 00:37:59 +00001859 io_disarm_next(req);
1860 if (req->link) {
1861 io_req_task_queue(req->link);
1862 req->link = NULL;
1863 }
1864 }
Jens Axboec7dae4b2021-02-09 19:53:37 -07001865 io_dismantle_req(req);
1866 io_put_task(req->task, 1);
Pavel Begunkovbb943b82021-08-09 20:18:10 +01001867 list_add(&req->inflight_entry, &ctx->locked_free_list);
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001868 ctx->locked_free_nr++;
Pavel Begunkov180f8292021-03-14 20:57:09 +00001869 } else {
1870 if (!percpu_ref_tryget(&ctx->refs))
1871 req = NULL;
1872 }
Pavel Begunkov7a612352021-03-09 00:37:59 +00001873 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06001874 spin_unlock(&ctx->completion_lock);
Pavel Begunkov7a612352021-03-09 00:37:59 +00001875
Pavel Begunkov180f8292021-03-14 20:57:09 +00001876 if (req) {
1877 io_cqring_ev_posted(ctx);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001878 percpu_ref_put(&ctx->refs);
Pavel Begunkov180f8292021-03-14 20:57:09 +00001879 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07001880}
1881
Jens Axboe4e3d9ff2021-04-15 17:44:34 -06001882static inline bool io_req_needs_clean(struct io_kiocb *req)
1883{
Pavel Begunkovc8543572021-06-17 18:14:04 +01001884 return req->flags & IO_REQ_CLEAN_FLAGS;
Jens Axboe4e3d9ff2021-04-15 17:44:34 -06001885}
1886
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001887static inline void io_req_complete_state(struct io_kiocb *req, s32 res,
1888 u32 cflags)
Jens Axboebcda7ba2020-02-23 16:42:51 -07001889{
Jens Axboe4e3d9ff2021-04-15 17:44:34 -06001890 if (io_req_needs_clean(req))
Pavel Begunkov68fb8972021-03-19 17:22:41 +00001891 io_clean_op(req);
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001892 req->result = res;
1893 req->compl.cflags = cflags;
Pavel Begunkove342c802021-01-19 13:32:47 +00001894 req->flags |= REQ_F_COMPLETE_INLINE;
Jens Axboee1e16092020-06-22 09:17:17 -06001895}
Jens Axboe2b188cc2019-01-07 10:46:33 -07001896
Pavel Begunkov889fca72021-02-10 00:03:09 +00001897static inline void __io_req_complete(struct io_kiocb *req, unsigned issue_flags,
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001898 s32 res, u32 cflags)
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001899{
Pavel Begunkov889fca72021-02-10 00:03:09 +00001900 if (issue_flags & IO_URING_F_COMPLETE_DEFER)
1901 io_req_complete_state(req, res, cflags);
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001902 else
Jens Axboec7dae4b2021-02-09 19:53:37 -07001903 io_req_complete_post(req, res, cflags);
Pavel Begunkova38d68d2021-01-19 13:32:45 +00001904}
Jens Axboebcda7ba2020-02-23 16:42:51 -07001905
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001906static inline void io_req_complete(struct io_kiocb *req, s32 res)
Jens Axboee1e16092020-06-22 09:17:17 -06001907{
Pavel Begunkov889fca72021-02-10 00:03:09 +00001908 __io_req_complete(req, 0, res, 0);
Jens Axboebcda7ba2020-02-23 16:42:51 -07001909}
1910
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01001911static void io_req_complete_failed(struct io_kiocb *req, s32 res)
Pavel Begunkovf41db2732021-02-28 22:35:12 +00001912{
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01001913 req_set_fail(req);
Pavel Begunkovf41db2732021-02-28 22:35:12 +00001914 io_req_complete_post(req, res, 0);
1915}
1916
Pavel Begunkovc6d3d9c2021-08-31 14:13:10 +01001917static void io_req_complete_fail_submit(struct io_kiocb *req)
1918{
1919 /*
1920 * We don't submit, fail them all, for that replace hardlinks with
1921 * normal links. Extra REQ_F_LINK is tolerated.
1922 */
1923 req->flags &= ~REQ_F_HARDLINK;
1924 req->flags |= REQ_F_LINK;
1925 io_req_complete_failed(req, req->result);
1926}
1927
Pavel Begunkov864ea922021-08-09 13:04:08 +01001928/*
1929 * Don't initialise the fields below on every allocation, but do that in
1930 * advance and keep them valid across allocations.
1931 */
1932static void io_preinit_req(struct io_kiocb *req, struct io_ring_ctx *ctx)
1933{
1934 req->ctx = ctx;
1935 req->link = NULL;
1936 req->async_data = NULL;
1937 /* not necessary, but safer to zero */
1938 req->result = 0;
1939}
1940
Pavel Begunkovdac7a092021-03-19 17:22:39 +00001941static void io_flush_cached_locked_reqs(struct io_ring_ctx *ctx,
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001942 struct io_submit_state *state)
Pavel Begunkovdac7a092021-03-19 17:22:39 +00001943{
Jens Axboe79ebeae2021-08-10 15:18:27 -06001944 spin_lock(&ctx->completion_lock);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001945 list_splice_init(&ctx->locked_free_list, &state->free_list);
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001946 ctx->locked_free_nr = 0;
Jens Axboe79ebeae2021-08-10 15:18:27 -06001947 spin_unlock(&ctx->completion_lock);
Pavel Begunkovdac7a092021-03-19 17:22:39 +00001948}
1949
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001950/* Returns true IFF there are requests in the cache */
Jens Axboec7dae4b2021-02-09 19:53:37 -07001951static bool io_flush_cached_reqs(struct io_ring_ctx *ctx)
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001952{
Jens Axboec7dae4b2021-02-09 19:53:37 -07001953 struct io_submit_state *state = &ctx->submit_state;
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001954 int nr;
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001955
Jens Axboec7dae4b2021-02-09 19:53:37 -07001956 /*
1957 * If we have more than a batch's worth of requests in our IRQ side
1958 * locked cache, grab the lock and move them over to our submission
1959 * side cache.
1960 */
Pavel Begunkovd0acdee2021-05-16 22:58:12 +01001961 if (READ_ONCE(ctx->locked_free_nr) > IO_COMPL_BATCH)
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001962 io_flush_cached_locked_reqs(ctx, state);
Jens Axboec7dae4b2021-02-09 19:53:37 -07001963
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001964 nr = state->free_reqs;
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01001965 while (!list_empty(&state->free_list)) {
1966 struct io_kiocb *req = list_first_entry(&state->free_list,
Pavel Begunkovbb943b82021-08-09 20:18:10 +01001967 struct io_kiocb, inflight_entry);
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001968
Pavel Begunkovbb943b82021-08-09 20:18:10 +01001969 list_del(&req->inflight_entry);
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001970 state->reqs[nr++] = req;
1971 if (nr == ARRAY_SIZE(state->reqs))
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001972 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001973 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07001974
Pavel Begunkovdd78f492021-03-19 17:22:35 +00001975 state->free_reqs = nr;
1976 return nr != 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001977}
1978
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01001979/*
1980 * A request might get retired back into the request caches even before opcode
1981 * handlers and io_issue_sqe() are done with it, e.g. inline completion path.
1982 * Because of that, io_alloc_req() should be called only under ->uring_lock
1983 * and with extra caution to not get a request that is still worked on.
1984 */
Pavel Begunkov258b29a2021-02-10 00:03:10 +00001985static struct io_kiocb *io_alloc_req(struct io_ring_ctx *ctx)
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01001986 __must_hold(&ctx->uring_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07001987{
Pavel Begunkov258b29a2021-02-10 00:03:10 +00001988 struct io_submit_state *state = &ctx->submit_state;
Pavel Begunkov864ea922021-08-09 13:04:08 +01001989 gfp_t gfp = GFP_KERNEL | __GFP_NOWARN;
1990 int ret, i;
Jens Axboe2b188cc2019-01-07 10:46:33 -07001991
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01001992 BUILD_BUG_ON(ARRAY_SIZE(state->reqs) < IO_REQ_ALLOC_BATCH);
Jens Axboe2b188cc2019-01-07 10:46:33 -07001993
Pavel Begunkov864ea922021-08-09 13:04:08 +01001994 if (likely(state->free_reqs || io_flush_cached_reqs(ctx)))
1995 goto got_req;
Jens Axboe2579f912019-01-09 09:10:43 -07001996
Pavel Begunkov864ea922021-08-09 13:04:08 +01001997 ret = kmem_cache_alloc_bulk(req_cachep, gfp, IO_REQ_ALLOC_BATCH,
1998 state->reqs);
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00001999
Pavel Begunkov864ea922021-08-09 13:04:08 +01002000 /*
2001 * Bulk alloc is all-or-nothing. If we fail to get a batch,
2002 * retry single alloc to be on the safe side.
2003 */
2004 if (unlikely(ret <= 0)) {
2005 state->reqs[0] = kmem_cache_alloc(req_cachep, gfp);
2006 if (!state->reqs[0])
2007 return NULL;
2008 ret = 1;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002009 }
Pavel Begunkov864ea922021-08-09 13:04:08 +01002010
2011 for (i = 0; i < ret; i++)
2012 io_preinit_req(state->reqs[i], ctx);
2013 state->free_reqs = ret;
Pavel Begunkove5d1bc02021-02-10 00:03:23 +00002014got_req:
Pavel Begunkov291b2822020-09-30 22:57:01 +03002015 state->free_reqs--;
2016 return state->reqs[state->free_reqs];
Jens Axboe2b188cc2019-01-07 10:46:33 -07002017}
2018
Pavel Begunkove1d767f2021-03-19 17:22:43 +00002019static inline void io_put_file(struct file *file)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03002020{
Pavel Begunkove1d767f2021-03-19 17:22:43 +00002021 if (file)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03002022 fput(file);
2023}
2024
Pavel Begunkov4edf20f2020-10-13 09:43:59 +01002025static void io_dismantle_req(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002026{
Pavel Begunkov094bae42021-03-19 17:22:42 +00002027 unsigned int flags = req->flags;
Pavel Begunkov929a3af2020-02-19 00:19:09 +03002028
Pavel Begunkov3a0a6902021-04-20 12:03:31 +01002029 if (io_req_needs_clean(req))
2030 io_clean_op(req);
Pavel Begunkove1d767f2021-03-19 17:22:43 +00002031 if (!(flags & REQ_F_FIXED_FILE))
2032 io_put_file(req->file);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00002033 if (req->fixed_rsrc_refs)
2034 percpu_ref_put(req->fixed_rsrc_refs);
Pavel Begunkov99ebe4e2021-06-26 21:40:49 +01002035 if (req->async_data) {
Pavel Begunkov094bae42021-03-19 17:22:42 +00002036 kfree(req->async_data);
Pavel Begunkov99ebe4e2021-06-26 21:40:49 +01002037 req->async_data = NULL;
2038 }
Pavel Begunkove6543a82020-06-28 12:52:30 +03002039}
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03002040
Pavel Begunkov216578e2020-10-13 09:44:00 +01002041static void __io_free_req(struct io_kiocb *req)
Pavel Begunkove6543a82020-06-28 12:52:30 +03002042{
Jens Axboe51a4cc12020-08-10 10:55:56 -06002043 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovecfc5172020-06-29 13:13:03 +03002044
Pavel Begunkov216578e2020-10-13 09:44:00 +01002045 io_dismantle_req(req);
Pavel Begunkov7c660732021-01-25 11:42:21 +00002046 io_put_task(req->task, 1);
Pavel Begunkove6543a82020-06-28 12:52:30 +03002047
Jens Axboe79ebeae2021-08-10 15:18:27 -06002048 spin_lock(&ctx->completion_lock);
Pavel Begunkovbb943b82021-08-09 20:18:10 +01002049 list_add(&req->inflight_entry, &ctx->locked_free_list);
Pavel Begunkovc34b0252021-08-09 20:18:08 +01002050 ctx->locked_free_nr++;
Jens Axboe79ebeae2021-08-10 15:18:27 -06002051 spin_unlock(&ctx->completion_lock);
Pavel Begunkovc34b0252021-08-09 20:18:08 +01002052
Pavel Begunkovecfc5172020-06-29 13:13:03 +03002053 percpu_ref_put(&ctx->refs);
Jens Axboee65ef562019-03-12 10:16:44 -06002054}
2055
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002056static inline void io_remove_next_linked(struct io_kiocb *req)
2057{
2058 struct io_kiocb *nxt = req->link;
2059
2060 req->link = nxt->link;
2061 nxt->link = NULL;
2062}
2063
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002064static bool io_kill_linked_timeout(struct io_kiocb *req)
2065 __must_hold(&req->ctx->completion_lock)
Jens Axboe89b263f2021-08-10 15:14:18 -06002066 __must_hold(&req->ctx->timeout_lock)
Jens Axboe9e645e112019-05-10 16:07:28 -06002067{
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002068 struct io_kiocb *link = req->link;
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002069
Pavel Begunkovb97e7362021-08-15 10:40:23 +01002070 if (link && link->opcode == IORING_OP_LINK_TIMEOUT) {
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01002071 struct io_timeout_data *io = link->async_data;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03002072
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002073 io_remove_next_linked(req);
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00002074 link->timeout.head = NULL;
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01002075 if (hrtimer_try_to_cancel(&io->timer) != -1) {
Pavel Begunkovef9dd632021-08-28 19:54:38 -06002076 list_del(&link->timeout.list);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002077 io_fill_cqe_req(link, -ECANCELED, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002078 io_put_req_deferred(link);
Pavel Begunkovd4729fb2021-03-22 01:58:24 +00002079 return true;
Pavel Begunkovc9abd7a2020-10-22 16:43:11 +01002080 }
2081 }
Pavel Begunkovd4729fb2021-03-22 01:58:24 +00002082 return false;
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03002083}
2084
Pavel Begunkovd148ca42020-10-18 10:17:39 +01002085static void io_fail_links(struct io_kiocb *req)
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002086 __must_hold(&req->ctx->completion_lock)
Jens Axboe9e645e112019-05-10 16:07:28 -06002087{
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002088 struct io_kiocb *nxt, *link = req->link;
Jens Axboe9e645e112019-05-10 16:07:28 -06002089
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002090 req->link = NULL;
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002091 while (link) {
Hao Xua8295b92021-08-27 17:46:09 +08002092 long res = -ECANCELED;
2093
2094 if (link->flags & REQ_F_FAIL)
2095 res = link->result;
2096
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002097 nxt = link->link;
2098 link->link = NULL;
2099
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02002100 trace_io_uring_fail_link(req, link);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002101 io_fill_cqe_req(link, res, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002102 io_put_req_deferred(link);
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002103 link = nxt;
Jens Axboe9e645e112019-05-10 16:07:28 -06002104 }
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002105}
Pavel Begunkov7c86ffe2020-06-29 13:12:59 +03002106
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002107static bool io_disarm_next(struct io_kiocb *req)
2108 __must_hold(&req->ctx->completion_lock)
2109{
2110 bool posted = false;
2111
Pavel Begunkov0756a862021-08-15 10:40:25 +01002112 if (req->flags & REQ_F_ARM_LTIMEOUT) {
2113 struct io_kiocb *link = req->link;
2114
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01002115 req->flags &= ~REQ_F_ARM_LTIMEOUT;
Pavel Begunkov0756a862021-08-15 10:40:25 +01002116 if (link && link->opcode == IORING_OP_LINK_TIMEOUT) {
2117 io_remove_next_linked(req);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002118 io_fill_cqe_req(link, -ECANCELED, 0);
Pavel Begunkov0756a862021-08-15 10:40:25 +01002119 io_put_req_deferred(link);
2120 posted = true;
2121 }
2122 } else if (req->flags & REQ_F_LINK_TIMEOUT) {
Jens Axboe89b263f2021-08-10 15:14:18 -06002123 struct io_ring_ctx *ctx = req->ctx;
2124
2125 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002126 posted = io_kill_linked_timeout(req);
Jens Axboe89b263f2021-08-10 15:14:18 -06002127 spin_unlock_irq(&ctx->timeout_lock);
2128 }
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01002129 if (unlikely((req->flags & REQ_F_FAIL) &&
Pavel Begunkove4335ed2021-04-11 01:46:39 +01002130 !(req->flags & REQ_F_HARDLINK))) {
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002131 posted |= (req->link != NULL);
2132 io_fail_links(req);
2133 }
2134 return posted;
Jens Axboe9e645e112019-05-10 16:07:28 -06002135}
2136
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03002137static struct io_kiocb *__io_req_find_next(struct io_kiocb *req)
Jens Axboe9e645e112019-05-10 16:07:28 -06002138{
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002139 struct io_kiocb *nxt;
Jens Axboe2665abf2019-11-05 12:40:47 -07002140
Jens Axboe9e645e112019-05-10 16:07:28 -06002141 /*
2142 * If LINK is set, we have dependent requests in this chain. If we
2143 * didn't fail this request, queue the first one up, moving any other
2144 * dependencies to the next request. In case of failure, fail the rest
2145 * of the chain.
2146 */
Pavel Begunkov0756a862021-08-15 10:40:25 +01002147 if (req->flags & IO_DISARM_MASK) {
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002148 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002149 bool posted;
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002150
Jens Axboe79ebeae2021-08-10 15:18:27 -06002151 spin_lock(&ctx->completion_lock);
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002152 posted = io_disarm_next(req);
2153 if (posted)
2154 io_commit_cqring(req->ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06002155 spin_unlock(&ctx->completion_lock);
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002156 if (posted)
2157 io_cqring_ev_posted(ctx);
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002158 }
Pavel Begunkov33cc89a2021-03-09 00:37:58 +00002159 nxt = req->link;
2160 req->link = NULL;
2161 return nxt;
Jens Axboe4d7dd462019-11-20 13:03:52 -07002162}
Jens Axboe2665abf2019-11-05 12:40:47 -07002163
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002164static inline struct io_kiocb *io_req_find_next(struct io_kiocb *req)
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03002165{
Pavel Begunkovcdbff982021-02-12 18:41:16 +00002166 if (likely(!(req->flags & (REQ_F_LINK|REQ_F_HARDLINK))))
Pavel Begunkov3fa5e0f2020-06-30 15:20:43 +03002167 return NULL;
2168 return __io_req_find_next(req);
2169}
2170
Pavel Begunkovf237c302021-08-18 12:42:46 +01002171static void ctx_flush_and_put(struct io_ring_ctx *ctx, bool *locked)
Pavel Begunkov2c323952021-02-28 22:04:53 +00002172{
2173 if (!ctx)
2174 return;
Pavel Begunkovf237c302021-08-18 12:42:46 +01002175 if (*locked) {
Hao Xu99c8bc52021-08-21 06:19:54 +08002176 if (ctx->submit_state.compl_nr)
2177 io_submit_flush_completions(ctx);
Pavel Begunkov2c323952021-02-28 22:04:53 +00002178 mutex_unlock(&ctx->uring_lock);
Pavel Begunkovf237c302021-08-18 12:42:46 +01002179 *locked = false;
Pavel Begunkov2c323952021-02-28 22:04:53 +00002180 }
2181 percpu_ref_put(&ctx->refs);
2182}
2183
Jens Axboe7cbf1722021-02-10 00:03:20 +00002184static void tctx_task_work(struct callback_head *cb)
2185{
Pavel Begunkovf237c302021-08-18 12:42:46 +01002186 bool locked = false;
Pavel Begunkovebd0df22021-06-17 18:14:07 +01002187 struct io_ring_ctx *ctx = NULL;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002188 struct io_uring_task *tctx = container_of(cb, struct io_uring_task,
2189 task_work);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002190
Pavel Begunkov16f72072021-06-17 18:14:09 +01002191 while (1) {
Pavel Begunkov3f184072021-06-17 18:14:06 +01002192 struct io_wq_work_node *node;
2193
Pavel Begunkov8d4ad412021-09-02 00:38:23 +01002194 if (!tctx->task_list.first && locked && ctx->submit_state.compl_nr)
2195 io_submit_flush_completions(ctx);
2196
Pavel Begunkov3f184072021-06-17 18:14:06 +01002197 spin_lock_irq(&tctx->task_lock);
Pavel Begunkovc6538be2021-06-17 18:14:08 +01002198 node = tctx->task_list.first;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002199 INIT_WQ_LIST(&tctx->task_list);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002200 if (!node)
2201 tctx->task_running = false;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002202 spin_unlock_irq(&tctx->task_lock);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002203 if (!node)
2204 break;
Pavel Begunkov3f184072021-06-17 18:14:06 +01002205
Pavel Begunkov6294f362021-08-10 17:53:55 +01002206 do {
Pavel Begunkov3f184072021-06-17 18:14:06 +01002207 struct io_wq_work_node *next = node->next;
2208 struct io_kiocb *req = container_of(node, struct io_kiocb,
2209 io_task_work.node);
2210
2211 if (req->ctx != ctx) {
Pavel Begunkovf237c302021-08-18 12:42:46 +01002212 ctx_flush_and_put(ctx, &locked);
Pavel Begunkov3f184072021-06-17 18:14:06 +01002213 ctx = req->ctx;
Pavel Begunkov126180b2021-08-18 12:42:47 +01002214 /* if not contended, grab and improve batching */
2215 locked = mutex_trylock(&ctx->uring_lock);
Pavel Begunkov3f184072021-06-17 18:14:06 +01002216 percpu_ref_get(&ctx->refs);
2217 }
Pavel Begunkovf237c302021-08-18 12:42:46 +01002218 req->io_task_work.func(req, &locked);
Pavel Begunkov3f184072021-06-17 18:14:06 +01002219 node = next;
Jens Axboed9e1cfa2023-07-17 10:27:20 -06002220 if (unlikely(need_resched())) {
2221 ctx_flush_and_put(ctx, &locked);
2222 ctx = NULL;
2223 cond_resched();
2224 }
Pavel Begunkov6294f362021-08-10 17:53:55 +01002225 } while (node);
Pavel Begunkov3f184072021-06-17 18:14:06 +01002226 }
Pavel Begunkovebd0df22021-06-17 18:14:07 +01002227
Pavel Begunkovf237c302021-08-18 12:42:46 +01002228 ctx_flush_and_put(ctx, &locked);
Pavel Begunkovb168b1a2022-01-09 00:53:22 +00002229
2230 /* relaxed read is enough as only the task itself sets ->in_idle */
2231 if (unlikely(atomic_read(&tctx->in_idle)))
2232 io_uring_drop_tctx_refs(current);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002233}
2234
Pavel Begunkove09ee512021-07-01 13:26:05 +01002235static void io_req_task_work_add(struct io_kiocb *req)
Jens Axboe7cbf1722021-02-10 00:03:20 +00002236{
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002237 struct task_struct *tsk = req->task;
Jens Axboe7cbf1722021-02-10 00:03:20 +00002238 struct io_uring_task *tctx = tsk->io_uring;
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002239 enum task_work_notify_mode notify;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002240 struct io_wq_work_node *node;
Jens Axboe0b81e802021-02-16 10:33:53 -07002241 unsigned long flags;
Pavel Begunkov6294f362021-08-10 17:53:55 +01002242 bool running;
Jens Axboe7cbf1722021-02-10 00:03:20 +00002243
2244 WARN_ON_ONCE(!tctx);
2245
Jens Axboe0b81e802021-02-16 10:33:53 -07002246 spin_lock_irqsave(&tctx->task_lock, flags);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002247 wq_list_add_tail(&req->io_task_work.node, &tctx->task_list);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002248 running = tctx->task_running;
2249 if (!running)
2250 tctx->task_running = true;
Jens Axboe0b81e802021-02-16 10:33:53 -07002251 spin_unlock_irqrestore(&tctx->task_lock, flags);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002252
2253 /* task_work already pending, we're done */
Pavel Begunkov6294f362021-08-10 17:53:55 +01002254 if (running)
Pavel Begunkove09ee512021-07-01 13:26:05 +01002255 return;
Jens Axboe7cbf1722021-02-10 00:03:20 +00002256
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002257 /*
2258 * SQPOLL kernel thread doesn't need notification, just a wakeup. For
2259 * all other cases, use TWA_SIGNAL unconditionally to ensure we're
2260 * processing task_work. There's no reliable way to tell if TWA_RESUME
2261 * will do the job.
2262 */
2263 notify = (req->ctx->flags & IORING_SETUP_SQPOLL) ? TWA_NONE : TWA_SIGNAL;
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002264 if (!task_work_add(tsk, &tctx->task_work, notify)) {
2265 wake_up_process(tsk);
Pavel Begunkove09ee512021-07-01 13:26:05 +01002266 return;
Pavel Begunkovc15b79d2021-03-19 17:22:44 +00002267 }
Pavel Begunkov2215bed2021-08-09 13:04:06 +01002268
Pavel Begunkove09ee512021-07-01 13:26:05 +01002269 spin_lock_irqsave(&tctx->task_lock, flags);
Pavel Begunkov6294f362021-08-10 17:53:55 +01002270 tctx->task_running = false;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002271 node = tctx->task_list.first;
2272 INIT_WQ_LIST(&tctx->task_list);
2273 spin_unlock_irqrestore(&tctx->task_lock, flags);
Jens Axboe7cbf1722021-02-10 00:03:20 +00002274
Pavel Begunkove09ee512021-07-01 13:26:05 +01002275 while (node) {
2276 req = container_of(node, struct io_kiocb, io_task_work.node);
2277 node = node->next;
2278 if (llist_add(&req->io_task_work.fallback_node,
2279 &req->ctx->fallback_llist))
2280 schedule_delayed_work(&req->ctx->fallback_work, 1);
2281 }
Pavel Begunkoveab30c42021-01-19 13:32:42 +00002282}
2283
Pavel Begunkovf237c302021-08-18 12:42:46 +01002284static void io_req_task_cancel(struct io_kiocb *req, bool *locked)
Jens Axboec40f6372020-06-25 15:39:59 -06002285{
Jens Axboe87ceb6a2020-09-14 08:20:12 -06002286 struct io_ring_ctx *ctx = req->ctx;
Jens Axboec40f6372020-06-25 15:39:59 -06002287
Pavel Begunkovb18a1a42021-08-25 20:51:39 +01002288 /* not needed for normal modes, but SQPOLL depends on it */
Pavel Begunkovf237c302021-08-18 12:42:46 +01002289 io_tw_lock(ctx, locked);
Pavel Begunkov25935532021-03-19 17:22:40 +00002290 io_req_complete_failed(req, req->result);
Jens Axboec40f6372020-06-25 15:39:59 -06002291}
2292
Pavel Begunkovf237c302021-08-18 12:42:46 +01002293static void io_req_task_submit(struct io_kiocb *req, bool *locked)
Jens Axboec40f6372020-06-25 15:39:59 -06002294{
2295 struct io_ring_ctx *ctx = req->ctx;
2296
Pavel Begunkovf237c302021-08-18 12:42:46 +01002297 io_tw_lock(ctx, locked);
Jens Axboe316319e2021-08-19 09:41:42 -06002298 /* req->task == current here, checking PF_EXITING is safe */
Pavel Begunkovaf066f32021-08-09 13:04:19 +01002299 if (likely(!(req->task->flags & PF_EXITING)))
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00002300 __io_queue_sqe(req);
Pavel Begunkov81b6d052021-01-04 20:36:35 +00002301 else
Pavel Begunkov25935532021-03-19 17:22:40 +00002302 io_req_complete_failed(req, -EFAULT);
Jens Axboe9e645e112019-05-10 16:07:28 -06002303}
2304
Pavel Begunkova3df76982021-02-18 22:32:52 +00002305static void io_req_task_queue_fail(struct io_kiocb *req, int ret)
2306{
Pavel Begunkova3df76982021-02-18 22:32:52 +00002307 req->result = ret;
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +01002308 req->io_task_work.func = io_req_task_cancel;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002309 io_req_task_work_add(req);
Pavel Begunkova3df76982021-02-18 22:32:52 +00002310}
2311
Pavel Begunkov2c4b8eb2021-02-28 22:35:10 +00002312static void io_req_task_queue(struct io_kiocb *req)
2313{
Pavel Begunkov5b0a6ac2021-06-30 21:54:04 +01002314 req->io_task_work.func = io_req_task_submit;
Pavel Begunkove09ee512021-07-01 13:26:05 +01002315 io_req_task_work_add(req);
Pavel Begunkov2c4b8eb2021-02-28 22:35:10 +00002316}
2317
Jens Axboe773af692021-07-27 10:25:55 -06002318static void io_req_task_queue_reissue(struct io_kiocb *req)
2319{
2320 req->io_task_work.func = io_queue_async_work;
2321 io_req_task_work_add(req);
2322}
2323
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002324static inline void io_queue_next(struct io_kiocb *req)
Jackie Liuc69f8db2019-11-09 11:00:08 +08002325{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002326 struct io_kiocb *nxt = io_req_find_next(req);
Pavel Begunkov944e58b2019-11-21 23:21:01 +03002327
Pavel Begunkov906a8c32020-06-27 14:04:55 +03002328 if (nxt)
2329 io_req_task_queue(nxt);
Jackie Liuc69f8db2019-11-09 11:00:08 +08002330}
2331
Jens Axboe9e645e112019-05-10 16:07:28 -06002332static void io_free_req(struct io_kiocb *req)
2333{
Pavel Begunkovc3524382020-06-28 12:52:32 +03002334 io_queue_next(req);
Jens Axboe9e645e112019-05-10 16:07:28 -06002335 __io_free_req(req);
Jens Axboee65ef562019-03-12 10:16:44 -06002336}
2337
Pavel Begunkovf237c302021-08-18 12:42:46 +01002338static void io_free_req_work(struct io_kiocb *req, bool *locked)
2339{
2340 io_free_req(req);
2341}
2342
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002343struct req_batch {
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002344 struct task_struct *task;
2345 int task_refs;
Jens Axboe1b4c3512021-02-10 00:03:19 +00002346 int ctx_refs;
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002347};
2348
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002349static inline void io_init_req_batch(struct req_batch *rb)
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002350{
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002351 rb->task_refs = 0;
Pavel Begunkov9ae72462021-02-10 00:03:16 +00002352 rb->ctx_refs = 0;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002353 rb->task = NULL;
2354}
Pavel Begunkov8766dd52020-03-14 00:31:04 +03002355
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002356static void io_req_free_batch_finish(struct io_ring_ctx *ctx,
2357 struct req_batch *rb)
2358{
Pavel Begunkov9ae72462021-02-10 00:03:16 +00002359 if (rb->ctx_refs)
2360 percpu_ref_put_many(&ctx->refs, rb->ctx_refs);
Pavel Begunkove98e49b2021-08-18 17:01:43 +01002361 if (rb->task)
Pavel Begunkove9dbe222021-08-09 13:04:20 +01002362 io_put_task(rb->task, rb->task_refs);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002363}
2364
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002365static void io_req_free_batch(struct req_batch *rb, struct io_kiocb *req,
2366 struct io_submit_state *state)
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002367{
Pavel Begunkovf2f87372020-10-27 23:25:37 +00002368 io_queue_next(req);
Pavel Begunkov96670652021-03-19 17:22:32 +00002369 io_dismantle_req(req);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002370
Jens Axboee3bc8e92020-09-24 08:45:57 -06002371 if (req->task != rb->task) {
Pavel Begunkov7c660732021-01-25 11:42:21 +00002372 if (rb->task)
2373 io_put_task(rb->task, rb->task_refs);
Jens Axboee3bc8e92020-09-24 08:45:57 -06002374 rb->task = req->task;
2375 rb->task_refs = 0;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002376 }
Jens Axboee3bc8e92020-09-24 08:45:57 -06002377 rb->task_refs++;
Pavel Begunkov9ae72462021-02-10 00:03:16 +00002378 rb->ctx_refs++;
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002379
Pavel Begunkovbd759042021-02-12 03:23:50 +00002380 if (state->free_reqs != ARRAY_SIZE(state->reqs))
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002381 state->reqs[state->free_reqs++] = req;
Pavel Begunkovbd759042021-02-12 03:23:50 +00002382 else
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002383 list_add(&req->inflight_entry, &state->free_list);
Pavel Begunkov7a743e22020-03-03 21:33:13 +03002384}
2385
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01002386static void io_submit_flush_completions(struct io_ring_ctx *ctx)
Jens Axboea141dd82021-08-12 12:48:34 -06002387 __must_hold(&ctx->uring_lock)
Pavel Begunkov905c1722021-02-10 00:03:14 +00002388{
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002389 struct io_submit_state *state = &ctx->submit_state;
2390 int i, nr = state->compl_nr;
Pavel Begunkov905c1722021-02-10 00:03:14 +00002391 struct req_batch rb;
2392
Jens Axboe79ebeae2021-08-10 15:18:27 -06002393 spin_lock(&ctx->completion_lock);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002394 for (i = 0; i < nr; i++) {
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002395 struct io_kiocb *req = state->compl_reqs[i];
Pavel Begunkov5182ed22021-06-26 21:40:48 +01002396
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01002397 __io_fill_cqe(ctx, req->user_data, req->result,
2398 req->compl.cflags);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002399 }
2400 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06002401 spin_unlock(&ctx->completion_lock);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002402 io_cqring_ev_posted(ctx);
Pavel Begunkov5182ed22021-06-26 21:40:48 +01002403
2404 io_init_req_batch(&rb);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002405 for (i = 0; i < nr; i++) {
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002406 struct io_kiocb *req = state->compl_reqs[i];
Pavel Begunkov905c1722021-02-10 00:03:14 +00002407
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002408 if (req_ref_put_and_test(req))
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002409 io_req_free_batch(&rb, req, &ctx->submit_state);
Pavel Begunkov905c1722021-02-10 00:03:14 +00002410 }
2411
2412 io_req_free_batch_finish(ctx, &rb);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01002413 state->compl_nr = 0;
Jens Axboee65ef562019-03-12 10:16:44 -06002414}
2415
Jens Axboeba816ad2019-09-28 11:36:45 -06002416/*
2417 * Drop reference to request, return next in chain (if there is one) if this
2418 * was the last reference to this request.
2419 */
Pavel Begunkov0d850352021-03-19 17:22:37 +00002420static inline struct io_kiocb *io_put_req_find_next(struct io_kiocb *req)
Jens Axboee65ef562019-03-12 10:16:44 -06002421{
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002422 struct io_kiocb *nxt = NULL;
2423
Jens Axboede9b4cc2021-02-24 13:28:27 -07002424 if (req_ref_put_and_test(req)) {
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002425 nxt = io_req_find_next(req);
Jens Axboe4d7dd462019-11-20 13:03:52 -07002426 __io_free_req(req);
Jens Axboe2a44f462020-02-25 13:25:41 -07002427 }
Pavel Begunkov9b5f7bd2020-06-29 13:13:00 +03002428 return nxt;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002429}
2430
Pavel Begunkov0d850352021-03-19 17:22:37 +00002431static inline void io_put_req(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002432{
Jens Axboede9b4cc2021-02-24 13:28:27 -07002433 if (req_ref_put_and_test(req))
Jens Axboedef596e2019-01-09 08:59:42 -07002434 io_free_req(req);
2435}
2436
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002437static inline void io_put_req_deferred(struct io_kiocb *req)
Pavel Begunkov216578e2020-10-13 09:44:00 +01002438{
Pavel Begunkov91c2f692021-08-11 19:28:28 +01002439 if (req_ref_put_and_test(req)) {
Pavel Begunkovf237c302021-08-18 12:42:46 +01002440 req->io_task_work.func = io_free_req_work;
Pavel Begunkov543af3a2021-08-09 13:04:15 +01002441 io_req_task_work_add(req);
2442 }
Pavel Begunkov216578e2020-10-13 09:44:00 +01002443}
2444
Pavel Begunkov6c503152021-01-04 20:36:36 +00002445static unsigned io_cqring_events(struct io_ring_ctx *ctx)
Jens Axboea3a0e432019-08-20 11:03:11 -06002446{
2447 /* See comment at the top of this file */
2448 smp_rmb();
Pavel Begunkove23de152020-12-17 00:24:37 +00002449 return __io_cqring_events(ctx);
Jens Axboea3a0e432019-08-20 11:03:11 -06002450}
2451
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03002452static inline unsigned int io_sqring_entries(struct io_ring_ctx *ctx)
2453{
2454 struct io_rings *rings = ctx->rings;
2455
2456 /* make sure SQ entry isn't read before tail */
2457 return smp_load_acquire(&rings->sq.tail) - ctx->cached_sq_head;
2458}
2459
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002460static unsigned int io_put_kbuf(struct io_kiocb *req, struct io_buffer *kbuf)
Jens Axboee94f1412019-12-19 12:06:02 -07002461{
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002462 unsigned int cflags;
Jens Axboee94f1412019-12-19 12:06:02 -07002463
Jens Axboebcda7ba2020-02-23 16:42:51 -07002464 cflags = kbuf->bid << IORING_CQE_BUFFER_SHIFT;
2465 cflags |= IORING_CQE_F_BUFFER;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03002466 req->flags &= ~REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07002467 kfree(kbuf);
2468 return cflags;
2469}
2470
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002471static inline unsigned int io_put_rw_kbuf(struct io_kiocb *req)
2472{
2473 struct io_buffer *kbuf;
2474
Pavel Begunkovae421d92021-08-17 20:28:08 +01002475 if (likely(!(req->flags & REQ_F_BUFFER_SELECTED)))
2476 return 0;
Pavel Begunkov8ff069b2020-07-16 23:28:04 +03002477 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
2478 return io_put_kbuf(req, kbuf);
2479}
2480
Jens Axboe4c6e2772020-07-01 11:29:10 -06002481static inline bool io_run_task_work(void)
2482{
Jens Axboe54df6c52023-03-06 13:15:06 -07002483 /*
2484 * PF_IO_WORKER never returns to userspace, so check here if we have
2485 * notify work that needs processing.
2486 */
2487 if (current->flags & PF_IO_WORKER &&
Jens Axboe337eb882023-03-06 13:16:38 -07002488 test_thread_flag(TIF_NOTIFY_RESUME)) {
2489 __set_current_state(TASK_RUNNING);
Jens Axboe54df6c52023-03-06 13:15:06 -07002490 tracehook_notify_resume(NULL);
Jens Axboe337eb882023-03-06 13:16:38 -07002491 }
Nadav Amitef98eb02021-08-07 17:13:41 -07002492 if (test_thread_flag(TIF_NOTIFY_SIGNAL) || current->task_works) {
Jens Axboe4c6e2772020-07-01 11:29:10 -06002493 __set_current_state(TASK_RUNNING);
Nadav Amitef98eb02021-08-07 17:13:41 -07002494 tracehook_notify_signal();
Jens Axboe4c6e2772020-07-01 11:29:10 -06002495 return true;
2496 }
2497
2498 return false;
2499}
2500
Jens Axboedef596e2019-01-09 08:59:42 -07002501/*
2502 * Find and free completed poll iocbs
2503 */
2504static void io_iopoll_complete(struct io_ring_ctx *ctx, unsigned int *nr_events,
Pavel Begunkova8576af2021-08-15 10:40:21 +01002505 struct list_head *done)
Jens Axboedef596e2019-01-09 08:59:42 -07002506{
Jens Axboe8237e042019-12-28 10:48:22 -07002507 struct req_batch rb;
Jens Axboedef596e2019-01-09 08:59:42 -07002508 struct io_kiocb *req;
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002509
2510 /* order with ->result store in io_complete_rw_iopoll() */
2511 smp_rmb();
Jens Axboedef596e2019-01-09 08:59:42 -07002512
Pavel Begunkov5af1d132020-07-18 11:32:52 +03002513 io_init_req_batch(&rb);
Jens Axboedef596e2019-01-09 08:59:42 -07002514 while (!list_empty(done)) {
Pavel Begunkoved4629d2023-01-14 09:14:03 -07002515 struct io_uring_cqe *cqe;
2516 unsigned cflags;
2517
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002518 req = list_first_entry(done, struct io_kiocb, inflight_entry);
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002519 list_del(&req->inflight_entry);
Pavel Begunkoved4629d2023-01-14 09:14:03 -07002520 cflags = io_put_rw_kbuf(req);
Jens Axboedef596e2019-01-09 08:59:42 -07002521 (*nr_events)++;
2522
Pavel Begunkoved4629d2023-01-14 09:14:03 -07002523 cqe = io_get_cqe(ctx);
2524 if (cqe) {
2525 WRITE_ONCE(cqe->user_data, req->user_data);
2526 WRITE_ONCE(cqe->res, req->result);
2527 WRITE_ONCE(cqe->flags, cflags);
2528 } else {
2529 spin_lock(&ctx->completion_lock);
2530 io_cqring_event_overflow(ctx, req->user_data,
2531 req->result, cflags);
2532 spin_unlock(&ctx->completion_lock);
2533 }
2534
Jens Axboede9b4cc2021-02-24 13:28:27 -07002535 if (req_ref_put_and_test(req))
Pavel Begunkov6ff119a2021-02-10 00:03:18 +00002536 io_req_free_batch(&rb, req, &ctx->submit_state);
Jens Axboedef596e2019-01-09 08:59:42 -07002537 }
Jens Axboedef596e2019-01-09 08:59:42 -07002538
Jens Axboefb348852023-07-11 09:35:30 -06002539 if (io_commit_needs_flush(ctx)) {
2540 spin_lock(&ctx->completion_lock);
2541 __io_commit_cqring_flush(ctx);
2542 spin_unlock(&ctx->completion_lock);
2543 }
2544 __io_commit_cqring(ctx);
Pavel Begunkov80c18e42021-01-07 03:15:41 +00002545 io_cqring_ev_posted_iopoll(ctx);
Pavel Begunkov2d6500d2020-06-28 12:52:33 +03002546 io_req_free_batch_finish(ctx, &rb);
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002547}
2548
Jens Axboedef596e2019-01-09 08:59:42 -07002549static int io_do_iopoll(struct io_ring_ctx *ctx, unsigned int *nr_events,
Pavel Begunkova8576af2021-08-15 10:40:21 +01002550 long min)
Jens Axboedef596e2019-01-09 08:59:42 -07002551{
2552 struct io_kiocb *req, *tmp;
2553 LIST_HEAD(done);
2554 bool spin;
Jens Axboedef596e2019-01-09 08:59:42 -07002555
2556 /*
2557 * Only spin for completions if we don't have multiple devices hanging
2558 * off our complete list, and we're under the requested amount.
2559 */
Hao Xu915b3dd2021-06-28 05:37:30 +08002560 spin = !ctx->poll_multi_queue && *nr_events < min;
Jens Axboedef596e2019-01-09 08:59:42 -07002561
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002562 list_for_each_entry_safe(req, tmp, &ctx->iopoll_list, inflight_entry) {
Jens Axboe9adbd452019-12-20 08:45:55 -07002563 struct kiocb *kiocb = &req->rw.kiocb;
Pavel Begunkova2416e12021-08-09 13:04:09 +01002564 int ret;
Jens Axboedef596e2019-01-09 08:59:42 -07002565
2566 /*
Bijan Mottahedeh581f9812020-04-03 13:51:33 -07002567 * Move completed and retryable entries to our local lists.
2568 * If we find a request that requires polling, break out
2569 * and complete those lists first, if we have entries there.
Jens Axboedef596e2019-01-09 08:59:42 -07002570 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002571 if (READ_ONCE(req->iopoll_completed)) {
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002572 list_move_tail(&req->inflight_entry, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002573 continue;
2574 }
2575 if (!list_empty(&done))
2576 break;
2577
2578 ret = kiocb->ki_filp->f_op->iopoll(kiocb, spin);
Pavel Begunkova2416e12021-08-09 13:04:09 +01002579 if (unlikely(ret < 0))
2580 return ret;
2581 else if (ret)
2582 spin = false;
Jens Axboedef596e2019-01-09 08:59:42 -07002583
Pavel Begunkov3aadc232020-07-06 17:59:29 +03002584 /* iopoll may have completed current req */
2585 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002586 list_move_tail(&req->inflight_entry, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002587 }
2588
2589 if (!list_empty(&done))
Pavel Begunkova8576af2021-08-15 10:40:21 +01002590 io_iopoll_complete(ctx, nr_events, &done);
Jens Axboedef596e2019-01-09 08:59:42 -07002591
Pavel Begunkova2416e12021-08-09 13:04:09 +01002592 return 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002593}
2594
2595/*
Jens Axboedef596e2019-01-09 08:59:42 -07002596 * We can't just wait for polled events to come to us, we have to actively
2597 * find and complete them.
2598 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002599static void io_iopoll_try_reap_events(struct io_ring_ctx *ctx)
Jens Axboedef596e2019-01-09 08:59:42 -07002600{
2601 if (!(ctx->flags & IORING_SETUP_IOPOLL))
2602 return;
2603
Pavel Begunkovea3291c2023-12-03 15:37:53 +00002604 percpu_ref_get(&ctx->refs);
Jens Axboedef596e2019-01-09 08:59:42 -07002605 mutex_lock(&ctx->uring_lock);
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002606 while (!list_empty(&ctx->iopoll_list)) {
Jens Axboedef596e2019-01-09 08:59:42 -07002607 unsigned int nr_events = 0;
2608
Pavel Begunkova8576af2021-08-15 10:40:21 +01002609 io_do_iopoll(ctx, &nr_events, 0);
Jens Axboe08f54392019-08-21 22:19:11 -06002610
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03002611 /* let it sleep and repeat later if can't complete a request */
2612 if (nr_events == 0)
2613 break;
Jens Axboe08f54392019-08-21 22:19:11 -06002614 /*
2615 * Ensure we allow local-to-the-cpu processing to take place,
2616 * in this case we need to ensure that we reap all events.
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002617 * Also let task_work, etc. to progress by releasing the mutex
Jens Axboe08f54392019-08-21 22:19:11 -06002618 */
Pavel Begunkov3fcee5a2020-07-06 17:59:31 +03002619 if (need_resched()) {
2620 mutex_unlock(&ctx->uring_lock);
2621 cond_resched();
2622 mutex_lock(&ctx->uring_lock);
2623 }
Jens Axboedef596e2019-01-09 08:59:42 -07002624 }
2625 mutex_unlock(&ctx->uring_lock);
Pavel Begunkovea3291c2023-12-03 15:37:53 +00002626 percpu_ref_put(&ctx->refs);
Jens Axboedef596e2019-01-09 08:59:42 -07002627}
2628
Pavel Begunkov7668b922020-07-07 16:36:21 +03002629static int io_iopoll_check(struct io_ring_ctx *ctx, long min)
Jens Axboedef596e2019-01-09 08:59:42 -07002630{
Pavel Begunkov7668b922020-07-07 16:36:21 +03002631 unsigned int nr_events = 0;
Pavel Begunkove9979b32021-04-13 02:58:45 +01002632 int ret = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07002633
Xiaoguang Wangc7849be2020-02-22 14:46:05 +08002634 /*
2635 * We disallow the app entering submit/complete with polling, but we
2636 * still need to lock the ring to prevent racing with polled issue
2637 * that got punted to a workqueue.
2638 */
2639 mutex_lock(&ctx->uring_lock);
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002640 /*
2641 * Don't enter poll loop if we already have events pending.
2642 * If we do, we can potentially be spinning for commands that
2643 * already triggered a CQE (eg in error).
2644 */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01002645 if (test_bit(0, &ctx->check_cq_overflow))
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002646 __io_cqring_overflow_flush(ctx, false);
2647 if (io_cqring_events(ctx))
2648 goto out;
Jens Axboedef596e2019-01-09 08:59:42 -07002649 do {
Jens Axboe500f9fb2019-08-19 12:15:59 -06002650 /*
2651 * If a submit got punted to a workqueue, we can have the
2652 * application entering polling for a command before it gets
2653 * issued. That app will hold the uring_lock for the duration
2654 * of the poll right here, so we need to take a breather every
2655 * now and then to ensure that the issue has a chance to add
2656 * the poll to the issued list. Otherwise we can spin here
2657 * forever, while the workqueue is stuck trying to acquire the
2658 * very same mutex.
2659 */
Pavel Begunkove9979b32021-04-13 02:58:45 +01002660 if (list_empty(&ctx->iopoll_list)) {
Pavel Begunkov8f487ef2021-07-08 13:37:06 +01002661 u32 tail = ctx->cached_cq_tail;
2662
Jens Axboe500f9fb2019-08-19 12:15:59 -06002663 mutex_unlock(&ctx->uring_lock);
Jens Axboe4c6e2772020-07-01 11:29:10 -06002664 io_run_task_work();
Jens Axboe500f9fb2019-08-19 12:15:59 -06002665 mutex_lock(&ctx->uring_lock);
Pavel Begunkove9979b32021-04-13 02:58:45 +01002666
Pavel Begunkov8f487ef2021-07-08 13:37:06 +01002667 /* some requests don't go through iopoll_list */
2668 if (tail != ctx->cached_cq_tail ||
2669 list_empty(&ctx->iopoll_list))
Pavel Begunkove9979b32021-04-13 02:58:45 +01002670 break;
Jens Axboe500f9fb2019-08-19 12:15:59 -06002671 }
Pavel Begunkova8576af2021-08-15 10:40:21 +01002672 ret = io_do_iopoll(ctx, &nr_events, min);
Pavel Begunkovc2984822023-09-12 15:02:01 +01002673
2674 if (task_sigpending(current)) {
2675 ret = -EINTR;
2676 goto out;
2677 }
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002678 } while (!ret && nr_events < min && !need_resched());
2679out:
Jens Axboe500f9fb2019-08-19 12:15:59 -06002680 mutex_unlock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002681 return ret;
2682}
2683
Jens Axboe491381ce2019-10-17 09:20:46 -06002684static void kiocb_end_write(struct io_kiocb *req)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002685{
Jens Axboe491381ce2019-10-17 09:20:46 -06002686 /*
2687 * Tell lockdep we inherited freeze protection from submission
2688 * thread.
2689 */
2690 if (req->flags & REQ_F_ISREG) {
Pavel Begunkov1c986792021-03-22 01:58:31 +00002691 struct super_block *sb = file_inode(req->file)->i_sb;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002692
Pavel Begunkov1c986792021-03-22 01:58:31 +00002693 __sb_writers_acquired(sb, SB_FREEZE_WRITE);
2694 sb_end_write(sb);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002695 }
2696}
2697
Jens Axboeb63534c2020-06-04 11:28:00 -06002698#ifdef CONFIG_BLOCK
Pavel Begunkovdc2a6e92021-01-19 13:32:35 +00002699static bool io_resubmit_prep(struct io_kiocb *req)
Jens Axboeb63534c2020-06-04 11:28:00 -06002700{
Pavel Begunkovab454432021-03-22 01:58:33 +00002701 struct io_async_rw *rw = req->async_data;
Jens Axboeb63534c2020-06-04 11:28:00 -06002702
Pavel Begunkovab454432021-03-22 01:58:33 +00002703 if (!rw)
2704 return !io_req_prep_async(req);
Jens Axboecd658692021-09-10 11:19:14 -06002705 iov_iter_restore(&rw->iter, &rw->iter_state);
Pavel Begunkovab454432021-03-22 01:58:33 +00002706 return true;
Jens Axboeb63534c2020-06-04 11:28:00 -06002707}
Jens Axboeb63534c2020-06-04 11:28:00 -06002708
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002709static bool io_rw_should_reissue(struct io_kiocb *req)
Jens Axboeb63534c2020-06-04 11:28:00 -06002710{
Jens Axboe355afae2020-09-02 09:30:31 -06002711 umode_t mode = file_inode(req->file)->i_mode;
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002712 struct io_ring_ctx *ctx = req->ctx;
Jens Axboeb63534c2020-06-04 11:28:00 -06002713
Jens Axboe355afae2020-09-02 09:30:31 -06002714 if (!S_ISBLK(mode) && !S_ISREG(mode))
2715 return false;
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002716 if ((req->flags & REQ_F_NOWAIT) || (io_wq_current_is_worker() &&
2717 !(ctx->flags & IORING_SETUP_IOPOLL)))
Jens Axboeb63534c2020-06-04 11:28:00 -06002718 return false;
Jens Axboe7c977a52021-02-23 19:17:35 -07002719 /*
2720 * If ref is dying, we might be running poll reap from the exit work.
2721 * Don't attempt to reissue from that path, just let it fail with
2722 * -EAGAIN.
2723 */
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002724 if (percpu_ref_is_dying(&ctx->refs))
2725 return false;
Jens Axboeef046882021-07-27 10:50:31 -06002726 /*
2727 * Play it safe and assume not safe to re-import and reissue if we're
2728 * not in the original thread group (or in task context).
2729 */
2730 if (!same_thread_group(req->task, current) || !in_task())
2731 return false;
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002732 return true;
2733}
Jens Axboee82ad482021-04-02 19:45:34 -06002734#else
Jens Axboea1ff1e32021-04-12 06:40:02 -06002735static bool io_resubmit_prep(struct io_kiocb *req)
2736{
2737 return false;
2738}
Jens Axboee82ad482021-04-02 19:45:34 -06002739static bool io_rw_should_reissue(struct io_kiocb *req)
2740{
2741 return false;
2742}
Jens Axboe3e6a0d32021-03-01 13:56:00 -07002743#endif
2744
Jens Axboeb10acfc2023-01-22 10:36:37 -07002745/*
2746 * Trigger the notifications after having done some IO, and finish the write
2747 * accounting, if any.
2748 */
2749static void io_req_io_end(struct io_kiocb *req)
2750{
2751 struct io_rw *rw = &req->rw;
2752
Jens Axboeb10acfc2023-01-22 10:36:37 -07002753 if (rw->kiocb.ki_flags & IOCB_WRITE) {
2754 kiocb_end_write(req);
2755 fsnotify_modify(req->file);
2756 } else {
2757 fsnotify_access(req->file);
2758 }
2759}
2760
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002761static bool __io_complete_rw_common(struct io_kiocb *req, long res)
Jens Axboea1d7c392020-06-22 11:09:46 -06002762{
Pavel Begunkov9532b992021-03-22 01:58:34 +00002763 if (res != req->result) {
2764 if ((res == -EAGAIN || res == -EOPNOTSUPP) &&
2765 io_rw_should_reissue(req)) {
Jens Axboeb10acfc2023-01-22 10:36:37 -07002766 /*
2767 * Reissue will start accounting again, finish the
2768 * current cycle.
2769 */
2770 io_req_io_end(req);
Pavel Begunkov9532b992021-03-22 01:58:34 +00002771 req->flags |= REQ_F_REISSUE;
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002772 return true;
Pavel Begunkov9532b992021-03-22 01:58:34 +00002773 }
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01002774 req_set_fail(req);
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002775 req->result = res;
Pavel Begunkov9532b992021-03-22 01:58:34 +00002776 }
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002777 return false;
2778}
2779
Harshit Mogalapallie326ee02023-01-10 08:46:47 -08002780static inline int io_fixup_rw_res(struct io_kiocb *req, long res)
Pavel Begunkove8574572022-10-16 22:42:56 +01002781{
2782 struct io_async_rw *io = req->async_data;
2783
2784 /* add previously done IO, if any */
2785 if (io && io->bytes_done > 0) {
2786 if (res < 0)
2787 res = io->bytes_done;
2788 else
2789 res += io->bytes_done;
2790 }
2791 return res;
2792}
2793
Pavel Begunkovf237c302021-08-18 12:42:46 +01002794static void io_req_task_complete(struct io_kiocb *req, bool *locked)
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002795{
Pavel Begunkov126180b2021-08-18 12:42:47 +01002796 unsigned int cflags = io_put_rw_kbuf(req);
Pavel Begunkov5c0ea4c2022-08-29 14:30:12 +01002797 int res = req->result;
Pavel Begunkov126180b2021-08-18 12:42:47 +01002798
2799 if (*locked) {
2800 struct io_ring_ctx *ctx = req->ctx;
2801 struct io_submit_state *state = &ctx->submit_state;
2802
2803 io_req_complete_state(req, res, cflags);
2804 state->compl_reqs[state->compl_nr++] = req;
2805 if (state->compl_nr == ARRAY_SIZE(state->compl_reqs))
2806 io_submit_flush_completions(ctx);
2807 } else {
2808 io_req_complete_post(req, res, cflags);
2809 }
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002810}
2811
Jens Axboe89a410d2023-01-21 13:38:51 -07002812static void io_req_rw_complete(struct io_kiocb *req, bool *locked)
2813{
Jens Axboeb10acfc2023-01-22 10:36:37 -07002814 io_req_io_end(req);
Jens Axboe89a410d2023-01-21 13:38:51 -07002815 io_req_task_complete(req, locked);
2816}
2817
Jens Axboeba816ad2019-09-28 11:36:45 -06002818static void io_complete_rw(struct kiocb *kiocb, long res, long res2)
2819{
Jens Axboe9adbd452019-12-20 08:45:55 -07002820 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboeba816ad2019-09-28 11:36:45 -06002821
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002822 if (__io_complete_rw_common(req, res))
2823 return;
Pavel Begunkove8574572022-10-16 22:42:56 +01002824 req->result = io_fixup_rw_res(req, res);
Jens Axboe89a410d2023-01-21 13:38:51 -07002825 req->io_task_work.func = io_req_rw_complete;
Jens Axboe8ef12ef2021-08-10 15:15:25 -06002826 io_req_task_work_add(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002827}
2828
Jens Axboedef596e2019-01-09 08:59:42 -07002829static void io_complete_rw_iopoll(struct kiocb *kiocb, long res, long res2)
2830{
Jens Axboe9adbd452019-12-20 08:45:55 -07002831 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboedef596e2019-01-09 08:59:42 -07002832
Jens Axboe491381ce2019-10-17 09:20:46 -06002833 if (kiocb->ki_flags & IOCB_WRITE)
2834 kiocb_end_write(req);
Pavel Begunkov9532b992021-03-22 01:58:34 +00002835 if (unlikely(res != req->result)) {
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01002836 if (res == -EAGAIN && io_rw_should_reissue(req)) {
2837 req->flags |= REQ_F_REISSUE;
2838 return;
Pavel Begunkov9532b992021-03-22 01:58:34 +00002839 }
Pavel Begunkov8c130822021-03-22 01:58:32 +00002840 }
Xiaoguang Wangbbde0172020-06-16 02:06:38 +08002841
2842 WRITE_ONCE(req->result, res);
Jens Axboeb9b0e0d2021-02-23 08:18:36 -07002843 /* order with io_iopoll_complete() checking ->result */
Pavel Begunkovcd664b02020-06-25 12:37:10 +03002844 smp_wmb();
2845 WRITE_ONCE(req->iopoll_completed, 1);
Jens Axboedef596e2019-01-09 08:59:42 -07002846}
2847
2848/*
2849 * After the iocb has been issued, it's safe to be found on the poll list.
2850 * Adding the kiocb to the list AFTER submission ensures that we don't
Pavel Begunkovf39c8a52021-04-13 02:58:46 +01002851 * find it from a io_do_iopoll() thread before the issuer is done
Jens Axboedef596e2019-01-09 08:59:42 -07002852 * accessing the kiocb cookie.
2853 */
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01002854static void io_iopoll_req_issued(struct io_kiocb *req)
Jens Axboedef596e2019-01-09 08:59:42 -07002855{
2856 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01002857 const bool in_async = io_wq_current_is_worker();
2858
2859 /* workqueue context doesn't hold uring_lock, grab it now */
2860 if (unlikely(in_async))
2861 mutex_lock(&ctx->uring_lock);
Jens Axboedef596e2019-01-09 08:59:42 -07002862
2863 /*
2864 * Track whether we have multiple files in our lists. This will impact
2865 * how we do polling eventually, not spinning if we're on potentially
2866 * different devices.
2867 */
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002868 if (list_empty(&ctx->iopoll_list)) {
Hao Xu915b3dd2021-06-28 05:37:30 +08002869 ctx->poll_multi_queue = false;
2870 } else if (!ctx->poll_multi_queue) {
Jens Axboedef596e2019-01-09 08:59:42 -07002871 struct io_kiocb *list_req;
Hao Xu915b3dd2021-06-28 05:37:30 +08002872 unsigned int queue_num0, queue_num1;
Jens Axboedef596e2019-01-09 08:59:42 -07002873
Pavel Begunkov540e32a2020-07-13 23:37:09 +03002874 list_req = list_first_entry(&ctx->iopoll_list, struct io_kiocb,
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002875 inflight_entry);
Hao Xu915b3dd2021-06-28 05:37:30 +08002876
2877 if (list_req->file != req->file) {
2878 ctx->poll_multi_queue = true;
2879 } else {
2880 queue_num0 = blk_qc_t_to_queue_num(list_req->rw.kiocb.ki_cookie);
2881 queue_num1 = blk_qc_t_to_queue_num(req->rw.kiocb.ki_cookie);
2882 if (queue_num0 != queue_num1)
2883 ctx->poll_multi_queue = true;
2884 }
Jens Axboedef596e2019-01-09 08:59:42 -07002885 }
2886
2887 /*
2888 * For fast devices, IO may have already completed. If it has, add
2889 * it to the front so we find it first.
2890 */
Xiaoguang Wang65a65432020-06-11 23:39:36 +08002891 if (READ_ONCE(req->iopoll_completed))
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002892 list_add(&req->inflight_entry, &ctx->iopoll_list);
Jens Axboedef596e2019-01-09 08:59:42 -07002893 else
Pavel Begunkovd21ffe72020-07-13 23:37:10 +03002894 list_add_tail(&req->inflight_entry, &ctx->iopoll_list);
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08002895
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01002896 if (unlikely(in_async)) {
2897 /*
2898 * If IORING_SETUP_SQPOLL is enabled, sqes are either handle
2899 * in sq thread task context or in io worker task context. If
2900 * current task context is sq thread, we don't need to check
2901 * whether should wake up sq thread.
2902 */
2903 if ((ctx->flags & IORING_SETUP_SQPOLL) &&
2904 wq_has_sleeper(&ctx->sq_data->wait))
2905 wake_up(&ctx->sq_data->wait);
2906
2907 mutex_unlock(&ctx->uring_lock);
2908 }
Jens Axboedef596e2019-01-09 08:59:42 -07002909}
2910
Jens Axboe4503b762020-06-01 10:00:27 -06002911static bool io_bdev_nowait(struct block_device *bdev)
2912{
Jeffle Xu9ba0d0c2020-10-19 16:59:42 +08002913 return !bdev || blk_queue_nowait(bdev_get_queue(bdev));
Jens Axboe4503b762020-06-01 10:00:27 -06002914}
2915
Jens Axboe2b188cc2019-01-07 10:46:33 -07002916/*
2917 * If we tracked the file through the SCM inflight mechanism, we could support
2918 * any file. For now, just ensure that anything potentially problematic is done
2919 * inline.
2920 */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002921static bool __io_file_supports_nowait(struct file *file, int rw)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002922{
2923 umode_t mode = file_inode(file)->i_mode;
2924
Jens Axboe4503b762020-06-01 10:00:27 -06002925 if (S_ISBLK(mode)) {
Christoph Hellwig4e7b5672020-11-23 13:38:40 +01002926 if (IS_ENABLED(CONFIG_BLOCK) &&
2927 io_bdev_nowait(I_BDEV(file->f_mapping->host)))
Jens Axboe4503b762020-06-01 10:00:27 -06002928 return true;
2929 return false;
2930 }
Pavel Begunkov976517f2021-06-09 12:07:25 +01002931 if (S_ISSOCK(mode))
Jens Axboe2b188cc2019-01-07 10:46:33 -07002932 return true;
Jens Axboe4503b762020-06-01 10:00:27 -06002933 if (S_ISREG(mode)) {
Christoph Hellwig4e7b5672020-11-23 13:38:40 +01002934 if (IS_ENABLED(CONFIG_BLOCK) &&
2935 io_bdev_nowait(file->f_inode->i_sb->s_bdev) &&
Jens Axboe4503b762020-06-01 10:00:27 -06002936 file->f_op != &io_uring_fops)
2937 return true;
2938 return false;
2939 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07002940
Jens Axboec5b85622020-06-09 19:23:05 -06002941 /* any ->read/write should understand O_NONBLOCK */
2942 if (file->f_flags & O_NONBLOCK)
2943 return true;
2944
Jens Axboeaf197f52020-04-28 13:15:06 -06002945 if (!(file->f_mode & FMODE_NOWAIT))
2946 return false;
2947
2948 if (rw == READ)
2949 return file->f_op->read_iter != NULL;
2950
2951 return file->f_op->write_iter != NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002952}
2953
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002954static bool io_file_supports_nowait(struct io_kiocb *req, int rw)
Jens Axboe7b29f922021-03-12 08:30:14 -07002955{
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002956 if (rw == READ && (req->flags & REQ_F_NOWAIT_READ))
Jens Axboe7b29f922021-03-12 08:30:14 -07002957 return true;
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002958 else if (rw == WRITE && (req->flags & REQ_F_NOWAIT_WRITE))
Jens Axboe7b29f922021-03-12 08:30:14 -07002959 return true;
2960
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01002961 return __io_file_supports_nowait(req->file, rw);
Jens Axboe7b29f922021-03-12 08:30:14 -07002962}
2963
Jens Axboe5d329e12021-09-14 11:08:37 -06002964static int io_prep_rw(struct io_kiocb *req, const struct io_uring_sqe *sqe,
2965 int rw)
Jens Axboe2b188cc2019-01-07 10:46:33 -07002966{
Jens Axboedef596e2019-01-09 08:59:42 -07002967 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe9adbd452019-12-20 08:45:55 -07002968 struct kiocb *kiocb = &req->rw.kiocb;
Pavel Begunkov75c668c2021-02-04 13:52:05 +00002969 struct file *file = req->file;
Jens Axboe09bb8392019-03-13 12:39:28 -06002970 unsigned ioprio;
2971 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002972
Pavel Begunkovc97d8a02021-08-09 13:04:04 +01002973 if (!io_req_ffs_set(req) && S_ISREG(file_inode(file)->i_mode))
Jens Axboe491381ce2019-10-17 09:20:46 -06002974 req->flags |= REQ_F_ISREG;
2975
Jens Axboe2b188cc2019-01-07 10:46:33 -07002976 kiocb->ki_pos = READ_ONCE(sqe->off);
Jens Axboe2b188cc2019-01-07 10:46:33 -07002977 kiocb->ki_hint = ki_hint_validate(file_write_hint(kiocb->ki_filp));
Pavel Begunkov3e577dc2020-02-01 03:58:42 +03002978 kiocb->ki_flags = iocb_flags(kiocb->ki_filp);
2979 ret = kiocb_set_rw_flags(kiocb, READ_ONCE(sqe->rw_flags));
2980 if (unlikely(ret))
2981 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002982
Jens Axboe5d329e12021-09-14 11:08:37 -06002983 /*
2984 * If the file is marked O_NONBLOCK, still allow retry for it if it
2985 * supports async. Otherwise it's impossible to use O_NONBLOCK files
2986 * reliably. If not, or it IOCB_NOWAIT is set, don't retry.
2987 */
2988 if ((kiocb->ki_flags & IOCB_NOWAIT) ||
2989 ((file->f_flags & O_NONBLOCK) && !io_file_supports_nowait(req, rw)))
Pavel Begunkov75c668c2021-02-04 13:52:05 +00002990 req->flags |= REQ_F_NOWAIT;
2991
Jens Axboe2b188cc2019-01-07 10:46:33 -07002992 ioprio = READ_ONCE(sqe->ioprio);
2993 if (ioprio) {
2994 ret = ioprio_check_cap(ioprio);
2995 if (ret)
Jens Axboe09bb8392019-03-13 12:39:28 -06002996 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07002997
2998 kiocb->ki_ioprio = ioprio;
2999 } else
3000 kiocb->ki_ioprio = get_current_ioprio();
3001
Jens Axboedef596e2019-01-09 08:59:42 -07003002 if (ctx->flags & IORING_SETUP_IOPOLL) {
Jens Axboedef596e2019-01-09 08:59:42 -07003003 if (!(kiocb->ki_flags & IOCB_DIRECT) ||
3004 !kiocb->ki_filp->f_op->iopoll)
Jens Axboe09bb8392019-03-13 12:39:28 -06003005 return -EOPNOTSUPP;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003006
Jens Axboe394918e2021-03-08 11:40:23 -07003007 kiocb->ki_flags |= IOCB_HIPRI | IOCB_ALLOC_CACHE;
Jens Axboedef596e2019-01-09 08:59:42 -07003008 kiocb->ki_complete = io_complete_rw_iopoll;
Xiaoguang Wang65a65432020-06-11 23:39:36 +08003009 req->iopoll_completed = 0;
Jens Axboedef596e2019-01-09 08:59:42 -07003010 } else {
Jens Axboe09bb8392019-03-13 12:39:28 -06003011 if (kiocb->ki_flags & IOCB_HIPRI)
3012 return -EINVAL;
Jens Axboedef596e2019-01-09 08:59:42 -07003013 kiocb->ki_complete = io_complete_rw;
3014 }
Jens Axboe9adbd452019-12-20 08:45:55 -07003015
Pavel Begunkovea512d52022-06-09 08:34:35 +01003016 /* used for fixed read/write too - just read unconditionally */
3017 req->buf_index = READ_ONCE(sqe->buf_index);
3018 req->imu = NULL;
3019
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003020 if (req->opcode == IORING_OP_READ_FIXED ||
3021 req->opcode == IORING_OP_WRITE_FIXED) {
Pavel Begunkovea512d52022-06-09 08:34:35 +01003022 struct io_ring_ctx *ctx = req->ctx;
3023 u16 index;
3024
3025 if (unlikely(req->buf_index >= ctx->nr_user_bufs))
3026 return -EFAULT;
3027 index = array_index_nospec(req->buf_index, ctx->nr_user_bufs);
3028 req->imu = ctx->user_bufs[index];
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003029 io_req_set_rsrc_node(req);
3030 }
3031
Jens Axboe3529d8c2019-12-19 18:24:38 -07003032 req->rw.addr = READ_ONCE(sqe->addr);
3033 req->rw.len = READ_ONCE(sqe->len);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003034 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003035}
3036
3037static inline void io_rw_done(struct kiocb *kiocb, ssize_t ret)
3038{
3039 switch (ret) {
3040 case -EIOCBQUEUED:
3041 break;
3042 case -ERESTARTSYS:
3043 case -ERESTARTNOINTR:
3044 case -ERESTARTNOHAND:
3045 case -ERESTART_RESTARTBLOCK:
3046 /*
3047 * We can't just restart the syscall, since previously
3048 * submitted sqes may already be in progress. Just fail this
3049 * IO with EINTR.
3050 */
3051 ret = -EINTR;
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -05003052 fallthrough;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003053 default:
3054 kiocb->ki_complete(kiocb, ret, 0);
3055 }
3056}
3057
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003058static inline loff_t *io_kiocb_update_pos(struct io_kiocb *req)
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003059{
3060 struct kiocb *kiocb = &req->rw.kiocb;
3061
Jens Axboe311b2982022-04-11 09:48:30 -06003062 if (kiocb->ki_pos != -1)
3063 return &kiocb->ki_pos;
3064
3065 if (!(req->file->f_mode & FMODE_STREAM)) {
3066 req->flags |= REQ_F_CUR_POS;
3067 kiocb->ki_pos = req->file->f_pos;
3068 return &kiocb->ki_pos;
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003069 }
Jens Axboe311b2982022-04-11 09:48:30 -06003070
3071 kiocb->ki_pos = 0;
3072 return NULL;
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003073}
3074
Jens Axboea1d7c392020-06-22 11:09:46 -06003075static void kiocb_done(struct kiocb *kiocb, ssize_t ret,
Pavel Begunkov889fca72021-02-10 00:03:09 +00003076 unsigned int issue_flags)
Jens Axboeba816ad2019-09-28 11:36:45 -06003077{
Jens Axboeba042912019-12-25 16:33:42 -07003078 struct io_kiocb *req = container_of(kiocb, struct io_kiocb, rw.kiocb);
Jens Axboe227c0c92020-08-13 11:51:40 -06003079
Jens Axboeba042912019-12-25 16:33:42 -07003080 if (req->flags & REQ_F_CUR_POS)
3081 req->file->f_pos = kiocb->ki_pos;
Jens Axboeb10acfc2023-01-22 10:36:37 -07003082 if (ret >= 0 && (kiocb->ki_complete == io_complete_rw)) {
3083 if (!__io_complete_rw_common(req, ret)) {
3084 /*
3085 * Safe to call io_end from here as we're inline
3086 * from the submission path.
3087 */
3088 io_req_io_end(req);
3089 __io_req_complete(req, issue_flags,
3090 io_fixup_rw_res(req, ret),
3091 io_put_rw_kbuf(req));
3092 }
3093 } else {
Jens Axboeba816ad2019-09-28 11:36:45 -06003094 io_rw_done(kiocb, ret);
Jens Axboeb10acfc2023-01-22 10:36:37 -07003095 }
Pavel Begunkov97284632021-04-08 19:28:03 +01003096
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01003097 if (req->flags & REQ_F_REISSUE) {
Pavel Begunkov97284632021-04-08 19:28:03 +01003098 req->flags &= ~REQ_F_REISSUE;
Jens Axboea7be7c22021-04-15 11:31:14 -06003099 if (io_resubmit_prep(req)) {
Jens Axboe773af692021-07-27 10:25:55 -06003100 io_req_task_queue_reissue(req);
Pavel Begunkov8c130822021-03-22 01:58:32 +00003101 } else {
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01003102 unsigned int cflags = io_put_rw_kbuf(req);
3103 struct io_ring_ctx *ctx = req->ctx;
3104
Pavel Begunkove8574572022-10-16 22:42:56 +01003105 ret = io_fixup_rw_res(req, ret);
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01003106 req_set_fail(req);
Hao Xu14cfbb72021-10-14 22:04:00 +08003107 if (!(issue_flags & IO_URING_F_NONBLOCK)) {
Pavel Begunkovb66ceaf2021-09-15 11:00:05 +01003108 mutex_lock(&ctx->uring_lock);
3109 __io_req_complete(req, issue_flags, ret, cflags);
3110 mutex_unlock(&ctx->uring_lock);
3111 } else {
3112 __io_req_complete(req, issue_flags, ret, cflags);
3113 }
Pavel Begunkov97284632021-04-08 19:28:03 +01003114 }
3115 }
Jens Axboeba816ad2019-09-28 11:36:45 -06003116}
3117
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003118static int __io_import_fixed(struct io_kiocb *req, int rw, struct iov_iter *iter,
3119 struct io_mapped_ubuf *imu)
Jens Axboeedafcce2019-01-09 09:16:05 -07003120{
Jens Axboe9adbd452019-12-20 08:45:55 -07003121 size_t len = req->rw.len;
Pavel Begunkov75769e32021-04-01 15:43:54 +01003122 u64 buf_end, buf_addr = req->rw.addr;
Jens Axboeedafcce2019-01-09 09:16:05 -07003123 size_t offset;
Jens Axboeedafcce2019-01-09 09:16:05 -07003124
Pavel Begunkov75769e32021-04-01 15:43:54 +01003125 if (unlikely(check_add_overflow(buf_addr, (u64)len, &buf_end)))
Jens Axboeedafcce2019-01-09 09:16:05 -07003126 return -EFAULT;
3127 /* not inside the mapped region */
Pavel Begunkov4751f532021-04-01 15:43:55 +01003128 if (unlikely(buf_addr < imu->ubuf || buf_end > imu->ubuf_end))
Jens Axboeedafcce2019-01-09 09:16:05 -07003129 return -EFAULT;
3130
3131 /*
3132 * May not be a start of buffer, set size appropriately
3133 * and advance us to the beginning.
3134 */
3135 offset = buf_addr - imu->ubuf;
3136 iov_iter_bvec(iter, rw, imu->bvec, imu->nr_bvecs, offset + len);
Jens Axboebd11b3a2019-07-20 08:37:31 -06003137
3138 if (offset) {
3139 /*
3140 * Don't use iov_iter_advance() here, as it's really slow for
3141 * using the latter parts of a big fixed buffer - it iterates
3142 * over each segment manually. We can cheat a bit here, because
3143 * we know that:
3144 *
3145 * 1) it's a BVEC iter, we set it up
3146 * 2) all bvecs are PAGE_SIZE in size, except potentially the
3147 * first and last bvec
3148 *
3149 * So just find our index, and adjust the iterator afterwards.
3150 * If the offset is within the first bvec (or the whole first
3151 * bvec, just use iov_iter_advance(). This makes it easier
3152 * since we can just skip the first segment, which may not
3153 * be PAGE_SIZE aligned.
3154 */
3155 const struct bio_vec *bvec = imu->bvec;
3156
Keith Busch313a34d2023-11-20 14:18:31 -08003157 if (offset < bvec->bv_len) {
Jens Axboebd11b3a2019-07-20 08:37:31 -06003158 iov_iter_advance(iter, offset);
3159 } else {
3160 unsigned long seg_skip;
3161
3162 /* skip first vec */
3163 offset -= bvec->bv_len;
3164 seg_skip = 1 + (offset >> PAGE_SHIFT);
3165
3166 iter->bvec = bvec + seg_skip;
3167 iter->nr_segs -= seg_skip;
Aleix Roca Nonell99c79f62019-08-15 14:03:22 +02003168 iter->count -= bvec->bv_len + offset;
Jens Axboebd11b3a2019-07-20 08:37:31 -06003169 iter->iov_offset = offset & ~PAGE_MASK;
Jens Axboebd11b3a2019-07-20 08:37:31 -06003170 }
3171 }
3172
Pavel Begunkov847595d2021-02-04 13:52:06 +00003173 return 0;
Jens Axboeedafcce2019-01-09 09:16:05 -07003174}
3175
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003176static int io_import_fixed(struct io_kiocb *req, int rw, struct iov_iter *iter)
3177{
Pavel Begunkovea512d52022-06-09 08:34:35 +01003178 if (WARN_ON_ONCE(!req->imu))
3179 return -EFAULT;
3180 return __io_import_fixed(req, rw, iter, req->imu);
Pavel Begunkoveae071c2021-04-25 14:32:24 +01003181}
3182
Jens Axboebcda7ba2020-02-23 16:42:51 -07003183static void io_ring_submit_unlock(struct io_ring_ctx *ctx, bool needs_lock)
3184{
3185 if (needs_lock)
3186 mutex_unlock(&ctx->uring_lock);
3187}
3188
3189static void io_ring_submit_lock(struct io_ring_ctx *ctx, bool needs_lock)
3190{
3191 /*
3192 * "Normal" inline submissions always hold the uring_lock, since we
3193 * grab it from the system call. Same is true for the SQPOLL offload.
3194 * The only exception is when we've detached the request and issue it
3195 * from an async worker thread, grab the lock for that case.
3196 */
3197 if (needs_lock)
3198 mutex_lock(&ctx->uring_lock);
3199}
3200
3201static struct io_buffer *io_buffer_select(struct io_kiocb *req, size_t *len,
3202 int bgid, struct io_buffer *kbuf,
3203 bool needs_lock)
3204{
3205 struct io_buffer *head;
3206
3207 if (req->flags & REQ_F_BUFFER_SELECTED)
3208 return kbuf;
3209
3210 io_ring_submit_lock(req->ctx, needs_lock);
3211
3212 lockdep_assert_held(&req->ctx->uring_lock);
3213
Jens Axboe9e15c3a2021-03-13 12:29:43 -07003214 head = xa_load(&req->ctx->io_buffers, bgid);
Jens Axboebcda7ba2020-02-23 16:42:51 -07003215 if (head) {
3216 if (!list_empty(&head->list)) {
3217 kbuf = list_last_entry(&head->list, struct io_buffer,
3218 list);
3219 list_del(&kbuf->list);
3220 } else {
3221 kbuf = head;
Jens Axboe9e15c3a2021-03-13 12:29:43 -07003222 xa_erase(&req->ctx->io_buffers, bgid);
Jens Axboebcda7ba2020-02-23 16:42:51 -07003223 }
3224 if (*len > kbuf->len)
3225 *len = kbuf->len;
3226 } else {
3227 kbuf = ERR_PTR(-ENOBUFS);
3228 }
3229
3230 io_ring_submit_unlock(req->ctx, needs_lock);
3231
3232 return kbuf;
3233}
3234
Jens Axboe4d954c22020-02-27 07:31:19 -07003235static void __user *io_rw_buffer_select(struct io_kiocb *req, size_t *len,
3236 bool needs_lock)
3237{
3238 struct io_buffer *kbuf;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003239 u16 bgid;
Jens Axboe4d954c22020-02-27 07:31:19 -07003240
3241 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003242 bgid = req->buf_index;
Jens Axboe4d954c22020-02-27 07:31:19 -07003243 kbuf = io_buffer_select(req, len, bgid, kbuf, needs_lock);
3244 if (IS_ERR(kbuf))
3245 return kbuf;
3246 req->rw.addr = (u64) (unsigned long) kbuf;
3247 req->flags |= REQ_F_BUFFER_SELECTED;
3248 return u64_to_user_ptr(kbuf->addr);
3249}
3250
3251#ifdef CONFIG_COMPAT
3252static ssize_t io_compat_import(struct io_kiocb *req, struct iovec *iov,
3253 bool needs_lock)
3254{
3255 struct compat_iovec __user *uiov;
3256 compat_ssize_t clen;
3257 void __user *buf;
3258 ssize_t len;
3259
3260 uiov = u64_to_user_ptr(req->rw.addr);
3261 if (!access_ok(uiov, sizeof(*uiov)))
3262 return -EFAULT;
3263 if (__get_user(clen, &uiov->iov_len))
3264 return -EFAULT;
3265 if (clen < 0)
3266 return -EINVAL;
3267
3268 len = clen;
3269 buf = io_rw_buffer_select(req, &len, needs_lock);
3270 if (IS_ERR(buf))
3271 return PTR_ERR(buf);
3272 iov[0].iov_base = buf;
3273 iov[0].iov_len = (compat_size_t) len;
3274 return 0;
3275}
3276#endif
3277
3278static ssize_t __io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
3279 bool needs_lock)
3280{
3281 struct iovec __user *uiov = u64_to_user_ptr(req->rw.addr);
3282 void __user *buf;
3283 ssize_t len;
3284
3285 if (copy_from_user(iov, uiov, sizeof(*uiov)))
3286 return -EFAULT;
3287
3288 len = iov[0].iov_len;
3289 if (len < 0)
3290 return -EINVAL;
3291 buf = io_rw_buffer_select(req, &len, needs_lock);
3292 if (IS_ERR(buf))
3293 return PTR_ERR(buf);
3294 iov[0].iov_base = buf;
3295 iov[0].iov_len = len;
3296 return 0;
3297}
3298
3299static ssize_t io_iov_buffer_select(struct io_kiocb *req, struct iovec *iov,
3300 bool needs_lock)
3301{
Jens Axboedddb3e22020-06-04 11:27:01 -06003302 if (req->flags & REQ_F_BUFFER_SELECTED) {
3303 struct io_buffer *kbuf;
3304
3305 kbuf = (struct io_buffer *) (unsigned long) req->rw.addr;
3306 iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
3307 iov[0].iov_len = kbuf->len;
Jens Axboe4d954c22020-02-27 07:31:19 -07003308 return 0;
Jens Axboedddb3e22020-06-04 11:27:01 -06003309 }
Pavel Begunkovdd201662020-12-19 03:15:43 +00003310 if (req->rw.len != 1)
Jens Axboe4d954c22020-02-27 07:31:19 -07003311 return -EINVAL;
3312
3313#ifdef CONFIG_COMPAT
3314 if (req->ctx->compat)
3315 return io_compat_import(req, iov, needs_lock);
3316#endif
3317
3318 return __io_iov_buffer_select(req, iov, needs_lock);
3319}
3320
Pavel Begunkov847595d2021-02-04 13:52:06 +00003321static int io_import_iovec(int rw, struct io_kiocb *req, struct iovec **iovec,
3322 struct iov_iter *iter, bool needs_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003323{
Jens Axboe9adbd452019-12-20 08:45:55 -07003324 void __user *buf = u64_to_user_ptr(req->rw.addr);
3325 size_t sqe_len = req->rw.len;
Pavel Begunkov847595d2021-02-04 13:52:06 +00003326 u8 opcode = req->opcode;
Jens Axboe4d954c22020-02-27 07:31:19 -07003327 ssize_t ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07003328
Pavel Begunkov7d009162019-11-25 23:14:40 +03003329 if (opcode == IORING_OP_READ_FIXED || opcode == IORING_OP_WRITE_FIXED) {
Jens Axboeedafcce2019-01-09 09:16:05 -07003330 *iovec = NULL;
Jens Axboe9adbd452019-12-20 08:45:55 -07003331 return io_import_fixed(req, rw, iter);
Jens Axboeedafcce2019-01-09 09:16:05 -07003332 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07003333
Jens Axboebcda7ba2020-02-23 16:42:51 -07003334 /* buffer index only valid with fixed read/write, or buffer select */
Bijan Mottahedeh4f4eeba2020-05-19 14:52:49 -07003335 if (req->buf_index && !(req->flags & REQ_F_BUFFER_SELECT))
Jens Axboe9adbd452019-12-20 08:45:55 -07003336 return -EINVAL;
3337
Jens Axboe3a6820f2019-12-22 15:19:35 -07003338 if (opcode == IORING_OP_READ || opcode == IORING_OP_WRITE) {
Jens Axboebcda7ba2020-02-23 16:42:51 -07003339 if (req->flags & REQ_F_BUFFER_SELECT) {
Jens Axboe4d954c22020-02-27 07:31:19 -07003340 buf = io_rw_buffer_select(req, &sqe_len, needs_lock);
Pavel Begunkov867a23e2020-08-20 11:34:39 +03003341 if (IS_ERR(buf))
Jens Axboe4d954c22020-02-27 07:31:19 -07003342 return PTR_ERR(buf);
Jens Axboe3f9d6442020-03-11 12:27:04 -06003343 req->rw.len = sqe_len;
Jens Axboebcda7ba2020-02-23 16:42:51 -07003344 }
3345
Jens Axboe3a6820f2019-12-22 15:19:35 -07003346 ret = import_single_range(rw, buf, sqe_len, *iovec, iter);
3347 *iovec = NULL;
David Laight10fc72e2020-11-07 13:16:25 +00003348 return ret;
Jens Axboe3a6820f2019-12-22 15:19:35 -07003349 }
3350
Jens Axboe4d954c22020-02-27 07:31:19 -07003351 if (req->flags & REQ_F_BUFFER_SELECT) {
3352 ret = io_iov_buffer_select(req, *iovec, needs_lock);
Pavel Begunkov847595d2021-02-04 13:52:06 +00003353 if (!ret)
3354 iov_iter_init(iter, rw, *iovec, 1, (*iovec)->iov_len);
Jens Axboe4d954c22020-02-27 07:31:19 -07003355 *iovec = NULL;
3356 return ret;
3357 }
3358
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02003359 return __import_iovec(rw, buf, sqe_len, UIO_FASTIOV, iovec, iter,
3360 req->ctx->compat);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003361}
3362
Jens Axboe0fef9482020-08-26 10:36:20 -06003363static inline loff_t *io_kiocb_ppos(struct kiocb *kiocb)
3364{
Pavel Begunkov5b09e372020-09-30 22:57:15 +03003365 return (kiocb->ki_filp->f_mode & FMODE_STREAM) ? NULL : &kiocb->ki_pos;
Jens Axboe0fef9482020-08-26 10:36:20 -06003366}
3367
Jens Axboe32960612019-09-23 11:05:34 -06003368/*
3369 * For files that don't have ->read_iter() and ->write_iter(), handle them
3370 * by looping over ->read() or ->write() manually.
3371 */
Jens Axboe4017eb92020-10-22 14:14:12 -06003372static ssize_t loop_rw_iter(int rw, struct io_kiocb *req, struct iov_iter *iter)
Jens Axboe32960612019-09-23 11:05:34 -06003373{
Jens Axboe4017eb92020-10-22 14:14:12 -06003374 struct kiocb *kiocb = &req->rw.kiocb;
3375 struct file *file = req->file;
Jens Axboe32960612019-09-23 11:05:34 -06003376 ssize_t ret = 0;
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003377 loff_t *ppos;
Jens Axboe32960612019-09-23 11:05:34 -06003378
3379 /*
3380 * Don't support polled IO through this interface, and we can't
3381 * support non-blocking either. For the latter, this just causes
3382 * the kiocb to be handled from an async context.
3383 */
3384 if (kiocb->ki_flags & IOCB_HIPRI)
3385 return -EOPNOTSUPP;
3386 if (kiocb->ki_flags & IOCB_NOWAIT)
3387 return -EAGAIN;
3388
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003389 ppos = io_kiocb_ppos(kiocb);
3390
Jens Axboe32960612019-09-23 11:05:34 -06003391 while (iov_iter_count(iter)) {
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003392 struct iovec iovec;
Jens Axboe32960612019-09-23 11:05:34 -06003393 ssize_t nr;
3394
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003395 if (!iov_iter_is_bvec(iter)) {
3396 iovec = iov_iter_iovec(iter);
3397 } else {
Jens Axboe4017eb92020-10-22 14:14:12 -06003398 iovec.iov_base = u64_to_user_ptr(req->rw.addr);
3399 iovec.iov_len = req->rw.len;
Pavel Begunkov311ae9e2019-11-24 11:58:24 +03003400 }
3401
Jens Axboe32960612019-09-23 11:05:34 -06003402 if (rw == READ) {
3403 nr = file->f_op->read(file, iovec.iov_base,
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003404 iovec.iov_len, ppos);
Jens Axboe32960612019-09-23 11:05:34 -06003405 } else {
3406 nr = file->f_op->write(file, iovec.iov_base,
Dylan Yudakenb7958ca2022-02-22 02:55:01 -08003407 iovec.iov_len, ppos);
Jens Axboe32960612019-09-23 11:05:34 -06003408 }
3409
3410 if (nr < 0) {
3411 if (!ret)
3412 ret = nr;
3413 break;
3414 }
Jens Axboe109dda42022-03-18 11:28:13 -06003415 ret += nr;
Jens Axboe16c8d2d2021-09-12 06:45:07 -06003416 if (!iov_iter_is_bvec(iter)) {
3417 iov_iter_advance(iter, nr);
3418 } else {
Jens Axboe16c8d2d2021-09-12 06:45:07 -06003419 req->rw.addr += nr;
Jens Axboe109dda42022-03-18 11:28:13 -06003420 req->rw.len -= nr;
3421 if (!req->rw.len)
3422 break;
Jens Axboe16c8d2d2021-09-12 06:45:07 -06003423 }
Jens Axboe32960612019-09-23 11:05:34 -06003424 if (nr != iovec.iov_len)
3425 break;
Jens Axboe32960612019-09-23 11:05:34 -06003426 }
3427
3428 return ret;
3429}
3430
Jens Axboeff6165b2020-08-13 09:47:43 -06003431static void io_req_map_rw(struct io_kiocb *req, const struct iovec *iovec,
3432 const struct iovec *fast_iov, struct iov_iter *iter)
Jens Axboef67676d2019-12-02 11:03:47 -07003433{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003434 struct io_async_rw *rw = req->async_data;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003435
Jens Axboeff6165b2020-08-13 09:47:43 -06003436 memcpy(&rw->iter, iter, sizeof(*iter));
Pavel Begunkovafb87652020-09-06 00:45:46 +03003437 rw->free_iovec = iovec;
Jens Axboe227c0c92020-08-13 11:51:40 -06003438 rw->bytes_done = 0;
Jens Axboeff6165b2020-08-13 09:47:43 -06003439 /* can only be fixed buffers, no need to do anything */
Pavel Begunkov9c3a2052020-11-23 23:20:27 +00003440 if (iov_iter_is_bvec(iter))
Jens Axboeff6165b2020-08-13 09:47:43 -06003441 return;
Pavel Begunkovb64e3442020-07-13 22:59:18 +03003442 if (!iovec) {
Jens Axboeff6165b2020-08-13 09:47:43 -06003443 unsigned iov_off = 0;
3444
3445 rw->iter.iov = rw->fast_iov;
3446 if (iter->iov != fast_iov) {
3447 iov_off = iter->iov - fast_iov;
3448 rw->iter.iov += iov_off;
3449 }
3450 if (rw->fast_iov != fast_iov)
3451 memcpy(rw->fast_iov + iov_off, fast_iov + iov_off,
Xiaoguang Wang45097da2020-04-08 22:29:58 +08003452 sizeof(struct iovec) * iter->nr_segs);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03003453 } else {
3454 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboef67676d2019-12-02 11:03:47 -07003455 }
3456}
3457
Pavel Begunkov6cb78682021-02-28 22:35:17 +00003458static inline int io_alloc_async_data(struct io_kiocb *req)
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003459{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003460 WARN_ON_ONCE(!io_op_defs[req->opcode].async_size);
3461 req->async_data = kmalloc(io_op_defs[req->opcode].async_size, GFP_KERNEL);
3462 return req->async_data == NULL;
Xiaoguang Wang3d9932a2020-03-27 15:36:52 +08003463}
3464
Jens Axboeff6165b2020-08-13 09:47:43 -06003465static int io_setup_async_rw(struct io_kiocb *req, const struct iovec *iovec,
3466 const struct iovec *fast_iov,
Jens Axboe227c0c92020-08-13 11:51:40 -06003467 struct iov_iter *iter, bool force)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003468{
Pavel Begunkov26f05052021-02-28 22:35:18 +00003469 if (!force && !io_op_defs[req->opcode].needs_async_setup)
Jens Axboe74566df2020-01-13 19:23:24 -07003470 return 0;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003471 if (!req->async_data) {
Jens Axboecd658692021-09-10 11:19:14 -06003472 struct io_async_rw *iorw;
3473
Pavel Begunkov6cb78682021-02-28 22:35:17 +00003474 if (io_alloc_async_data(req)) {
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003475 kfree(iovec);
Jens Axboe5d204bc2020-01-31 12:06:52 -07003476 return -ENOMEM;
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003477 }
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003478
Jens Axboeff6165b2020-08-13 09:47:43 -06003479 io_req_map_rw(req, iovec, fast_iov, iter);
Jens Axboecd658692021-09-10 11:19:14 -06003480 iorw = req->async_data;
3481 /* we've copied and mapped the iter, ensure state is saved */
3482 iov_iter_save_state(&iorw->iter, &iorw->iter_state);
Jens Axboe5d204bc2020-01-31 12:06:52 -07003483 }
Jens Axboeb7bb4f72019-12-15 22:13:43 -07003484 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07003485}
3486
Pavel Begunkov73debe62020-09-30 22:57:54 +03003487static inline int io_rw_prep_async(struct io_kiocb *req, int rw)
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003488{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003489 struct io_async_rw *iorw = req->async_data;
Pavel Begunkovf4bff102020-09-06 00:45:45 +03003490 struct iovec *iov = iorw->fast_iov;
Pavel Begunkov847595d2021-02-04 13:52:06 +00003491 int ret;
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003492
Pavel Begunkov2846c482020-11-07 13:16:27 +00003493 ret = io_import_iovec(rw, req, &iov, &iorw->iter, false);
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003494 if (unlikely(ret < 0))
3495 return ret;
3496
Pavel Begunkovab0b1962020-09-06 00:45:47 +03003497 iorw->bytes_done = 0;
3498 iorw->free_iovec = iov;
3499 if (iov)
3500 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboecd658692021-09-10 11:19:14 -06003501 iov_iter_save_state(&iorw->iter, &iorw->iter_state);
Pavel Begunkovc3e330a2020-07-13 22:59:19 +03003502 return 0;
3503}
3504
Pavel Begunkov73debe62020-09-30 22:57:54 +03003505static int io_read_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003506{
Jens Axboe3529d8c2019-12-19 18:24:38 -07003507 if (unlikely(!(req->file->f_mode & FMODE_READ)))
3508 return -EBADF;
Jens Axboe5d329e12021-09-14 11:08:37 -06003509 return io_prep_rw(req, sqe, READ);
Jens Axboef67676d2019-12-02 11:03:47 -07003510}
3511
Jens Axboec1dd91d2020-08-03 16:43:59 -06003512/*
3513 * This is our waitqueue callback handler, registered through lock_page_async()
3514 * when we initially tried to do the IO with the iocb armed our waitqueue.
3515 * This gets called when the page is unlocked, and we generally expect that to
3516 * happen when the page IO is completed and the page is now uptodate. This will
3517 * queue a task_work based retry of the operation, attempting to copy the data
3518 * again. If the latter fails because the page was NOT uptodate, then we will
3519 * do a thread based blocking retry of the operation. That's the unexpected
3520 * slow path.
3521 */
Jens Axboebcf5a062020-05-22 09:24:42 -06003522static int io_async_buf_func(struct wait_queue_entry *wait, unsigned mode,
3523 int sync, void *arg)
3524{
3525 struct wait_page_queue *wpq;
3526 struct io_kiocb *req = wait->private;
Jens Axboebcf5a062020-05-22 09:24:42 -06003527 struct wait_page_key *key = arg;
Jens Axboebcf5a062020-05-22 09:24:42 -06003528
3529 wpq = container_of(wait, struct wait_page_queue, wait);
3530
Linus Torvaldscdc8fcb2020-08-03 13:01:22 -07003531 if (!wake_page_match(wpq, key))
3532 return 0;
3533
Hao Xuc8d317a2020-09-29 20:00:45 +08003534 req->rw.kiocb.ki_flags &= ~IOCB_WAITQ;
Jens Axboebcf5a062020-05-22 09:24:42 -06003535 list_del_init(&wait->entry);
Pavel Begunkov921b9052021-02-12 03:23:53 +00003536 io_req_task_queue(req);
Jens Axboebcf5a062020-05-22 09:24:42 -06003537 return 1;
3538}
3539
Jens Axboec1dd91d2020-08-03 16:43:59 -06003540/*
3541 * This controls whether a given IO request should be armed for async page
3542 * based retry. If we return false here, the request is handed to the async
3543 * worker threads for retry. If we're doing buffered reads on a regular file,
3544 * we prepare a private wait_page_queue entry and retry the operation. This
3545 * will either succeed because the page is now uptodate and unlocked, or it
3546 * will register a callback when the page is unlocked at IO completion. Through
3547 * that callback, io_uring uses task_work to setup a retry of the operation.
3548 * That retry will attempt the buffered read again. The retry will generally
3549 * succeed, or in rare cases where it fails, we then fall back to using the
3550 * async worker threads for a blocking retry.
3551 */
Jens Axboe227c0c92020-08-13 11:51:40 -06003552static bool io_rw_should_retry(struct io_kiocb *req)
Jens Axboebcf5a062020-05-22 09:24:42 -06003553{
Jens Axboee8c2bc12020-08-15 18:44:09 -07003554 struct io_async_rw *rw = req->async_data;
3555 struct wait_page_queue *wait = &rw->wpq;
Jens Axboebcf5a062020-05-22 09:24:42 -06003556 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboebcf5a062020-05-22 09:24:42 -06003557
3558 /* never retry for NOWAIT, we just complete with -EAGAIN */
3559 if (req->flags & REQ_F_NOWAIT)
3560 return false;
3561
Jens Axboe227c0c92020-08-13 11:51:40 -06003562 /* Only for buffered IO */
Jens Axboe3b2a4432020-08-16 10:58:43 -07003563 if (kiocb->ki_flags & (IOCB_DIRECT | IOCB_HIPRI))
Jens Axboebcf5a062020-05-22 09:24:42 -06003564 return false;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003565
Jens Axboebcf5a062020-05-22 09:24:42 -06003566 /*
3567 * just use poll if we can, and don't attempt if the fs doesn't
3568 * support callback based unlocks
3569 */
3570 if (file_can_poll(req->file) || !(req->file->f_mode & FMODE_BUF_RASYNC))
3571 return false;
3572
Jens Axboe3b2a4432020-08-16 10:58:43 -07003573 wait->wait.func = io_async_buf_func;
3574 wait->wait.private = req;
3575 wait->wait.flags = 0;
3576 INIT_LIST_HEAD(&wait->wait.entry);
3577 kiocb->ki_flags |= IOCB_WAITQ;
Hao Xuc8d317a2020-09-29 20:00:45 +08003578 kiocb->ki_flags &= ~IOCB_NOWAIT;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003579 kiocb->ki_waitq = wait;
Jens Axboe3b2a4432020-08-16 10:58:43 -07003580 return true;
Jens Axboebcf5a062020-05-22 09:24:42 -06003581}
3582
Pavel Begunkovaeab9502021-06-14 02:36:24 +01003583static inline int io_iter_do_read(struct io_kiocb *req, struct iov_iter *iter)
Jens Axboebcf5a062020-05-22 09:24:42 -06003584{
3585 if (req->file->f_op->read_iter)
3586 return call_read_iter(req->file, &req->rw.kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003587 else if (req->file->f_op->read)
Jens Axboe4017eb92020-10-22 14:14:12 -06003588 return loop_rw_iter(READ, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003589 else
3590 return -EINVAL;
Jens Axboebcf5a062020-05-22 09:24:42 -06003591}
3592
Ming Lei7db30432021-08-21 23:07:51 +08003593static bool need_read_all(struct io_kiocb *req)
3594{
3595 return req->flags & REQ_F_ISREG ||
3596 S_ISBLK(file_inode(req->file)->i_mode);
3597}
3598
Pavel Begunkov889fca72021-02-10 00:03:09 +00003599static int io_read(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003600{
3601 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003602 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003603 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003604 struct io_async_rw *rw = req->async_data;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003605 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboecd658692021-09-10 11:19:14 -06003606 struct iov_iter_state __state, *state;
3607 ssize_t ret, ret2;
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003608 loff_t *ppos;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003609
Pavel Begunkov2846c482020-11-07 13:16:27 +00003610 if (rw) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07003611 iter = &rw->iter;
Jens Axboecd658692021-09-10 11:19:14 -06003612 state = &rw->iter_state;
3613 /*
3614 * We come here from an earlier attempt, restore our state to
3615 * match in case it doesn't. It's cheap enough that we don't
3616 * need to make this conditional.
3617 */
3618 iov_iter_restore(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003619 iovec = NULL;
3620 } else {
3621 ret = io_import_iovec(READ, req, &iovec, iter, !force_nonblock);
3622 if (ret < 0)
3623 return ret;
Jens Axboecd658692021-09-10 11:19:14 -06003624 state = &__state;
3625 iov_iter_save_state(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003626 }
Jens Axboecd658692021-09-10 11:19:14 -06003627 req->result = iov_iter_count(iter);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003628
Jens Axboefd6c2e42019-12-18 12:19:41 -07003629 /* Ensure we clear previously set non-block flag */
3630 if (!force_nonblock)
Jens Axboe29de5f62020-02-20 09:56:08 -07003631 kiocb->ki_flags &= ~IOCB_NOWAIT;
Pavel Begunkova88fc402020-09-30 22:57:53 +03003632 else
3633 kiocb->ki_flags |= IOCB_NOWAIT;
3634
Pavel Begunkov24c74672020-06-21 13:09:51 +03003635 /* If the file doesn't support async, just async punt */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01003636 if (force_nonblock && !io_file_supports_nowait(req, READ)) {
Pavel Begunkov6713e7a2021-02-04 13:51:59 +00003637 ret = io_setup_async_rw(req, iovec, inline_vecs, iter, true);
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003638 return ret ?: -EAGAIN;
Pavel Begunkov6713e7a2021-02-04 13:51:59 +00003639 }
Jens Axboe9e645e112019-05-10 16:07:28 -06003640
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003641 ppos = io_kiocb_update_pos(req);
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003642
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003643 ret = rw_verify_area(READ, req->file, ppos, req->result);
Pavel Begunkov5ea5dd42021-02-04 13:52:03 +00003644 if (unlikely(ret)) {
3645 kfree(iovec);
3646 return ret;
3647 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07003648
Jens Axboe227c0c92020-08-13 11:51:40 -06003649 ret = io_iter_do_read(req, iter);
Jens Axboe32960612019-09-23 11:05:34 -06003650
Jens Axboe230d50d2021-04-01 20:41:15 -06003651 if (ret == -EAGAIN || (req->flags & REQ_F_REISSUE)) {
Pavel Begunkov6ad7f232021-04-08 01:54:39 +01003652 req->flags &= ~REQ_F_REISSUE;
Jens Axboeeefdf302020-08-27 16:40:19 -06003653 /* IOPOLL retry should happen for io-wq threads */
3654 if (!force_nonblock && !(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboef91daf52020-08-15 15:58:42 -07003655 goto done;
Pavel Begunkov75c668c2021-02-04 13:52:05 +00003656 /* no retry on NONBLOCK nor RWF_NOWAIT */
3657 if (req->flags & REQ_F_NOWAIT)
Jens Axboe355afae2020-09-02 09:30:31 -06003658 goto done;
Jens Axboef38c7e32020-09-25 15:23:43 -06003659 ret = 0;
Jens Axboe230d50d2021-04-01 20:41:15 -06003660 } else if (ret == -EIOCBQUEUED) {
3661 goto out_free;
Jens Axboecd658692021-09-10 11:19:14 -06003662 } else if (ret <= 0 || ret == req->result || !force_nonblock ||
Ming Lei7db30432021-08-21 23:07:51 +08003663 (req->flags & REQ_F_NOWAIT) || !need_read_all(req)) {
Pavel Begunkov7335e3b2021-02-04 13:52:02 +00003664 /* read all, failed, already did sync or don't want to retry */
Jens Axboe00d23d52020-08-25 12:59:22 -06003665 goto done;
Jens Axboe227c0c92020-08-13 11:51:40 -06003666 }
3667
Jens Axboecd658692021-09-10 11:19:14 -06003668 /*
3669 * Don't depend on the iter state matching what was consumed, or being
3670 * untouched in case of error. Restore it and we'll advance it
3671 * manually if we need to.
3672 */
3673 iov_iter_restore(iter, state);
3674
Jens Axboe227c0c92020-08-13 11:51:40 -06003675 ret2 = io_setup_async_rw(req, iovec, inline_vecs, iter, true);
Pavel Begunkov6bf985d2021-02-04 13:52:01 +00003676 if (ret2)
3677 return ret2;
3678
Pavel Begunkovfe1cdd52021-02-17 21:02:36 +00003679 iovec = NULL;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003680 rw = req->async_data;
Jens Axboecd658692021-09-10 11:19:14 -06003681 /*
3682 * Now use our persistent iterator and state, if we aren't already.
3683 * We've restored and mapped the iter to match.
3684 */
3685 if (iter != &rw->iter) {
3686 iter = &rw->iter;
3687 state = &rw->iter_state;
3688 }
Jens Axboe227c0c92020-08-13 11:51:40 -06003689
Pavel Begunkovb23df912021-02-04 13:52:04 +00003690 do {
Jens Axboecd658692021-09-10 11:19:14 -06003691 /*
3692 * We end up here because of a partial read, either from
3693 * above or inside this loop. Advance the iter by the bytes
3694 * that were consumed.
3695 */
3696 iov_iter_advance(iter, ret);
3697 if (!iov_iter_count(iter))
3698 break;
Pavel Begunkovb23df912021-02-04 13:52:04 +00003699 rw->bytes_done += ret;
Jens Axboecd658692021-09-10 11:19:14 -06003700 iov_iter_save_state(iter, state);
3701
Pavel Begunkovb23df912021-02-04 13:52:04 +00003702 /* if we can retry, do so with the callbacks armed */
3703 if (!io_rw_should_retry(req)) {
3704 kiocb->ki_flags &= ~IOCB_WAITQ;
3705 return -EAGAIN;
3706 }
3707
Pavel Begunkov98aada62022-10-16 22:42:58 +01003708 req->result = iov_iter_count(iter);
Pavel Begunkovb23df912021-02-04 13:52:04 +00003709 /*
3710 * Now retry read with the IOCB_WAITQ parts set in the iocb. If
3711 * we get -EIOCBQUEUED, then we'll get a notification when the
3712 * desired page gets unlocked. We can also get a partial read
3713 * here, and if we do, then just retry at the new offset.
3714 */
3715 ret = io_iter_do_read(req, iter);
3716 if (ret == -EIOCBQUEUED)
3717 return 0;
Jens Axboe227c0c92020-08-13 11:51:40 -06003718 /* we got some bytes, but not all. retry. */
Jens Axboeb5b0ecb2021-03-04 21:02:58 -07003719 kiocb->ki_flags &= ~IOCB_WAITQ;
Jens Axboecd658692021-09-10 11:19:14 -06003720 iov_iter_restore(iter, state);
3721 } while (ret > 0);
Jens Axboe227c0c92020-08-13 11:51:40 -06003722done:
Pavel Begunkov889fca72021-02-10 00:03:09 +00003723 kiocb_done(kiocb, ret, issue_flags);
Pavel Begunkovfe1cdd52021-02-17 21:02:36 +00003724out_free:
3725 /* it's faster to check here then delegate to kfree */
3726 if (iovec)
3727 kfree(iovec);
Pavel Begunkov5ea5dd42021-02-04 13:52:03 +00003728 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003729}
3730
Pavel Begunkov73debe62020-09-30 22:57:54 +03003731static int io_write_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07003732{
Jens Axboe3529d8c2019-12-19 18:24:38 -07003733 if (unlikely(!(req->file->f_mode & FMODE_WRITE)))
3734 return -EBADF;
Jens Axboe5d329e12021-09-14 11:08:37 -06003735 return io_prep_rw(req, sqe, WRITE);
Jens Axboef67676d2019-12-02 11:03:47 -07003736}
3737
Pavel Begunkov889fca72021-02-10 00:03:09 +00003738static int io_write(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07003739{
3740 struct iovec inline_vecs[UIO_FASTIOV], *iovec = inline_vecs;
Jens Axboe9adbd452019-12-20 08:45:55 -07003741 struct kiocb *kiocb = &req->rw.kiocb;
Jens Axboeff6165b2020-08-13 09:47:43 -06003742 struct iov_iter __iter, *iter = &__iter;
Jens Axboee8c2bc12020-08-15 18:44:09 -07003743 struct io_async_rw *rw = req->async_data;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003744 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboecd658692021-09-10 11:19:14 -06003745 struct iov_iter_state __state, *state;
3746 ssize_t ret, ret2;
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003747 loff_t *ppos;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003748
Pavel Begunkov2846c482020-11-07 13:16:27 +00003749 if (rw) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07003750 iter = &rw->iter;
Jens Axboecd658692021-09-10 11:19:14 -06003751 state = &rw->iter_state;
3752 iov_iter_restore(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003753 iovec = NULL;
3754 } else {
3755 ret = io_import_iovec(WRITE, req, &iovec, iter, !force_nonblock);
3756 if (ret < 0)
3757 return ret;
Jens Axboecd658692021-09-10 11:19:14 -06003758 state = &__state;
3759 iov_iter_save_state(iter, state);
Pavel Begunkov2846c482020-11-07 13:16:27 +00003760 }
Jens Axboecd658692021-09-10 11:19:14 -06003761 req->result = iov_iter_count(iter);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003762
Jens Axboefd6c2e42019-12-18 12:19:41 -07003763 /* Ensure we clear previously set non-block flag */
3764 if (!force_nonblock)
Pavel Begunkova88fc402020-09-30 22:57:53 +03003765 kiocb->ki_flags &= ~IOCB_NOWAIT;
3766 else
3767 kiocb->ki_flags |= IOCB_NOWAIT;
Jens Axboefd6c2e42019-12-18 12:19:41 -07003768
Pavel Begunkov24c74672020-06-21 13:09:51 +03003769 /* If the file doesn't support async, just async punt */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01003770 if (force_nonblock && !io_file_supports_nowait(req, WRITE))
Jens Axboef67676d2019-12-02 11:03:47 -07003771 goto copy_iov;
Jens Axboef67676d2019-12-02 11:03:47 -07003772
Jens Axboe10d59342019-12-09 20:16:22 -07003773 /* file path doesn't support NOWAIT for non-direct_IO */
3774 if (force_nonblock && !(kiocb->ki_flags & IOCB_DIRECT) &&
3775 (req->flags & REQ_F_ISREG))
Jens Axboef67676d2019-12-02 11:03:47 -07003776 goto copy_iov;
Jens Axboe9e645e112019-05-10 16:07:28 -06003777
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003778 ppos = io_kiocb_update_pos(req);
Dylan Yudakenff8a0702022-02-22 02:55:02 -08003779
Dylan Yudaken05d69b32022-02-22 02:55:03 -08003780 ret = rw_verify_area(WRITE, req->file, ppos, req->result);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003781 if (unlikely(ret))
3782 goto out_free;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003783
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003784 /*
3785 * Open-code file_start_write here to grab freeze protection,
3786 * which will be released by another thread in
3787 * io_complete_rw(). Fool lockdep by telling it the lock got
3788 * released so that it doesn't complain about the held lock when
3789 * we return to userspace.
3790 */
3791 if (req->flags & REQ_F_ISREG) {
Darrick J. Wong8a3c84b2020-11-10 16:50:21 -08003792 sb_start_write(file_inode(req->file)->i_sb);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003793 __sb_writers_release(file_inode(req->file)->i_sb,
3794 SB_FREEZE_WRITE);
3795 }
3796 kiocb->ki_flags |= IOCB_WRITE;
Roman Penyaev9bf79332019-03-25 20:09:24 +01003797
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003798 if (req->file->f_op->write_iter)
Jens Axboeff6165b2020-08-13 09:47:43 -06003799 ret2 = call_write_iter(req->file, kiocb, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003800 else if (req->file->f_op->write)
Jens Axboe4017eb92020-10-22 14:14:12 -06003801 ret2 = loop_rw_iter(WRITE, req, iter);
Guoyu Huang2dd21112020-08-05 03:53:50 -07003802 else
3803 ret2 = -EINVAL;
Jens Axboe4ed734b2020-03-20 11:23:41 -06003804
Pavel Begunkov6ad7f232021-04-08 01:54:39 +01003805 if (req->flags & REQ_F_REISSUE) {
3806 req->flags &= ~REQ_F_REISSUE;
Jens Axboe230d50d2021-04-01 20:41:15 -06003807 ret2 = -EAGAIN;
Pavel Begunkov6ad7f232021-04-08 01:54:39 +01003808 }
Jens Axboe230d50d2021-04-01 20:41:15 -06003809
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003810 /*
3811 * Raw bdev writes will return -EOPNOTSUPP for IOCB_NOWAIT. Just
3812 * retry them without IOCB_NOWAIT.
3813 */
3814 if (ret2 == -EOPNOTSUPP && (kiocb->ki_flags & IOCB_NOWAIT))
3815 ret2 = -EAGAIN;
Pavel Begunkov75c668c2021-02-04 13:52:05 +00003816 /* no retry on NONBLOCK nor RWF_NOWAIT */
3817 if (ret2 == -EAGAIN && (req->flags & REQ_F_NOWAIT))
Jens Axboe355afae2020-09-02 09:30:31 -06003818 goto done;
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003819 if (!force_nonblock || ret2 != -EAGAIN) {
Jens Axboeeefdf302020-08-27 16:40:19 -06003820 /* IOPOLL retry should happen for io-wq threads */
3821 if ((req->ctx->flags & IORING_SETUP_IOPOLL) && ret2 == -EAGAIN)
3822 goto copy_iov;
Jens Axboe355afae2020-09-02 09:30:31 -06003823done:
Pavel Begunkov889fca72021-02-10 00:03:09 +00003824 kiocb_done(kiocb, ret2, issue_flags);
Pavel Begunkovfa15baf2020-08-01 13:50:02 +03003825 } else {
Jens Axboef67676d2019-12-02 11:03:47 -07003826copy_iov:
Jens Axboecd658692021-09-10 11:19:14 -06003827 iov_iter_restore(iter, state);
Jens Axboe227c0c92020-08-13 11:51:40 -06003828 ret = io_setup_async_rw(req, iovec, inline_vecs, iter, false);
Jens Axboe295219a2022-08-25 10:19:08 -06003829 if (!ret) {
3830 if (kiocb->ki_flags & IOCB_WRITE)
3831 kiocb_end_write(req);
3832 return -EAGAIN;
3833 }
3834 return ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07003835 }
Jens Axboe31b51512019-01-18 22:56:34 -07003836out_free:
Pavel Begunkovf261c162020-08-20 11:34:10 +03003837 /* it's reportedly faster than delegating the null check to kfree() */
Pavel Begunkov252917c2020-07-13 22:59:20 +03003838 if (iovec)
Xiaoguang Wang6f2cc162020-06-18 15:01:56 +08003839 kfree(iovec);
Jens Axboe2b188cc2019-01-07 10:46:33 -07003840 return ret;
3841}
3842
Jens Axboe80a261f2020-09-28 14:23:58 -06003843static int io_renameat_prep(struct io_kiocb *req,
3844 const struct io_uring_sqe *sqe)
3845{
3846 struct io_rename *ren = &req->rename;
3847 const char __user *oldf, *newf;
3848
Jens Axboeed7eb252021-06-23 09:04:13 -06003849 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3850 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01003851 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Jens Axboeed7eb252021-06-23 09:04:13 -06003852 return -EINVAL;
Jens Axboe80a261f2020-09-28 14:23:58 -06003853 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3854 return -EBADF;
3855
3856 ren->old_dfd = READ_ONCE(sqe->fd);
3857 oldf = u64_to_user_ptr(READ_ONCE(sqe->addr));
3858 newf = u64_to_user_ptr(READ_ONCE(sqe->addr2));
3859 ren->new_dfd = READ_ONCE(sqe->len);
3860 ren->flags = READ_ONCE(sqe->rename_flags);
3861
3862 ren->oldpath = getname(oldf);
3863 if (IS_ERR(ren->oldpath))
3864 return PTR_ERR(ren->oldpath);
3865
3866 ren->newpath = getname(newf);
3867 if (IS_ERR(ren->newpath)) {
3868 putname(ren->oldpath);
3869 return PTR_ERR(ren->newpath);
3870 }
3871
3872 req->flags |= REQ_F_NEED_CLEANUP;
3873 return 0;
3874}
3875
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003876static int io_renameat(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe80a261f2020-09-28 14:23:58 -06003877{
3878 struct io_rename *ren = &req->rename;
3879 int ret;
3880
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003881 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboe80a261f2020-09-28 14:23:58 -06003882 return -EAGAIN;
3883
3884 ret = do_renameat2(ren->old_dfd, ren->oldpath, ren->new_dfd,
3885 ren->newpath, ren->flags);
3886
3887 req->flags &= ~REQ_F_NEED_CLEANUP;
3888 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01003889 req_set_fail(req);
Jens Axboe80a261f2020-09-28 14:23:58 -06003890 io_req_complete(req, ret);
3891 return 0;
3892}
3893
Jens Axboe14a11432020-09-28 14:27:37 -06003894static int io_unlinkat_prep(struct io_kiocb *req,
3895 const struct io_uring_sqe *sqe)
3896{
3897 struct io_unlink *un = &req->unlink;
3898 const char __user *fname;
3899
Jens Axboe22634bc2021-06-23 09:07:45 -06003900 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3901 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01003902 if (sqe->ioprio || sqe->off || sqe->len || sqe->buf_index ||
3903 sqe->splice_fd_in)
Jens Axboe22634bc2021-06-23 09:07:45 -06003904 return -EINVAL;
Jens Axboe14a11432020-09-28 14:27:37 -06003905 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3906 return -EBADF;
3907
3908 un->dfd = READ_ONCE(sqe->fd);
3909
3910 un->flags = READ_ONCE(sqe->unlink_flags);
3911 if (un->flags & ~AT_REMOVEDIR)
3912 return -EINVAL;
3913
3914 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
3915 un->filename = getname(fname);
3916 if (IS_ERR(un->filename))
3917 return PTR_ERR(un->filename);
3918
3919 req->flags |= REQ_F_NEED_CLEANUP;
3920 return 0;
3921}
3922
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003923static int io_unlinkat(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe14a11432020-09-28 14:27:37 -06003924{
3925 struct io_unlink *un = &req->unlink;
3926 int ret;
3927
Pavel Begunkov45d189c2021-02-10 00:03:07 +00003928 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboe14a11432020-09-28 14:27:37 -06003929 return -EAGAIN;
3930
3931 if (un->flags & AT_REMOVEDIR)
3932 ret = do_rmdir(un->dfd, un->filename);
3933 else
3934 ret = do_unlinkat(un->dfd, un->filename);
3935
3936 req->flags &= ~REQ_F_NEED_CLEANUP;
3937 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01003938 req_set_fail(req);
Jens Axboe14a11432020-09-28 14:27:37 -06003939 io_req_complete(req, ret);
3940 return 0;
3941}
3942
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07003943static int io_mkdirat_prep(struct io_kiocb *req,
3944 const struct io_uring_sqe *sqe)
3945{
3946 struct io_mkdir *mkd = &req->mkdir;
3947 const char __user *fname;
3948
3949 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3950 return -EINVAL;
3951 if (sqe->ioprio || sqe->off || sqe->rw_flags || sqe->buf_index ||
3952 sqe->splice_fd_in)
3953 return -EINVAL;
3954 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3955 return -EBADF;
3956
3957 mkd->dfd = READ_ONCE(sqe->fd);
3958 mkd->mode = READ_ONCE(sqe->len);
3959
3960 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
3961 mkd->filename = getname(fname);
3962 if (IS_ERR(mkd->filename))
3963 return PTR_ERR(mkd->filename);
3964
3965 req->flags |= REQ_F_NEED_CLEANUP;
3966 return 0;
3967}
3968
3969static int io_mkdirat(struct io_kiocb *req, int issue_flags)
3970{
3971 struct io_mkdir *mkd = &req->mkdir;
3972 int ret;
3973
3974 if (issue_flags & IO_URING_F_NONBLOCK)
3975 return -EAGAIN;
3976
3977 ret = do_mkdirat(mkd->dfd, mkd->filename, mkd->mode);
3978
3979 req->flags &= ~REQ_F_NEED_CLEANUP;
3980 if (ret < 0)
3981 req_set_fail(req);
3982 io_req_complete(req, ret);
3983 return 0;
3984}
3985
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07003986static int io_symlinkat_prep(struct io_kiocb *req,
3987 const struct io_uring_sqe *sqe)
3988{
3989 struct io_symlink *sl = &req->symlink;
3990 const char __user *oldpath, *newpath;
3991
3992 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
3993 return -EINVAL;
3994 if (sqe->ioprio || sqe->len || sqe->rw_flags || sqe->buf_index ||
3995 sqe->splice_fd_in)
3996 return -EINVAL;
3997 if (unlikely(req->flags & REQ_F_FIXED_FILE))
3998 return -EBADF;
3999
4000 sl->new_dfd = READ_ONCE(sqe->fd);
4001 oldpath = u64_to_user_ptr(READ_ONCE(sqe->addr));
4002 newpath = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4003
4004 sl->oldpath = getname(oldpath);
4005 if (IS_ERR(sl->oldpath))
4006 return PTR_ERR(sl->oldpath);
4007
4008 sl->newpath = getname(newpath);
4009 if (IS_ERR(sl->newpath)) {
4010 putname(sl->oldpath);
4011 return PTR_ERR(sl->newpath);
4012 }
4013
4014 req->flags |= REQ_F_NEED_CLEANUP;
4015 return 0;
4016}
4017
4018static int io_symlinkat(struct io_kiocb *req, int issue_flags)
4019{
4020 struct io_symlink *sl = &req->symlink;
4021 int ret;
4022
4023 if (issue_flags & IO_URING_F_NONBLOCK)
4024 return -EAGAIN;
4025
4026 ret = do_symlinkat(sl->oldpath, sl->new_dfd, sl->newpath);
4027
4028 req->flags &= ~REQ_F_NEED_CLEANUP;
4029 if (ret < 0)
4030 req_set_fail(req);
4031 io_req_complete(req, ret);
4032 return 0;
4033}
4034
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07004035static int io_linkat_prep(struct io_kiocb *req,
4036 const struct io_uring_sqe *sqe)
4037{
4038 struct io_hardlink *lnk = &req->hardlink;
4039 const char __user *oldf, *newf;
4040
4041 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4042 return -EINVAL;
Jens Axboea2b1d482023-10-04 08:43:13 -06004043 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07004044 return -EINVAL;
4045 if (unlikely(req->flags & REQ_F_FIXED_FILE))
4046 return -EBADF;
4047
4048 lnk->old_dfd = READ_ONCE(sqe->fd);
4049 lnk->new_dfd = READ_ONCE(sqe->len);
4050 oldf = u64_to_user_ptr(READ_ONCE(sqe->addr));
4051 newf = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4052 lnk->flags = READ_ONCE(sqe->hardlink_flags);
4053
Charles Mirabile35b5d862023-11-20 05:55:45 -05004054 lnk->oldpath = getname_uflags(oldf, lnk->flags);
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07004055 if (IS_ERR(lnk->oldpath))
4056 return PTR_ERR(lnk->oldpath);
4057
4058 lnk->newpath = getname(newf);
4059 if (IS_ERR(lnk->newpath)) {
4060 putname(lnk->oldpath);
4061 return PTR_ERR(lnk->newpath);
4062 }
4063
4064 req->flags |= REQ_F_NEED_CLEANUP;
4065 return 0;
4066}
4067
4068static int io_linkat(struct io_kiocb *req, int issue_flags)
4069{
4070 struct io_hardlink *lnk = &req->hardlink;
4071 int ret;
4072
4073 if (issue_flags & IO_URING_F_NONBLOCK)
4074 return -EAGAIN;
4075
4076 ret = do_linkat(lnk->old_dfd, lnk->oldpath, lnk->new_dfd,
4077 lnk->newpath, lnk->flags);
4078
4079 req->flags &= ~REQ_F_NEED_CLEANUP;
4080 if (ret < 0)
4081 req_set_fail(req);
4082 io_req_complete(req, ret);
4083 return 0;
4084}
4085
Jens Axboe36f4fa62020-09-05 11:14:22 -06004086static int io_shutdown_prep(struct io_kiocb *req,
4087 const struct io_uring_sqe *sqe)
4088{
4089#if defined(CONFIG_NET)
4090 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4091 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004092 if (unlikely(sqe->ioprio || sqe->off || sqe->addr || sqe->rw_flags ||
4093 sqe->buf_index || sqe->splice_fd_in))
Jens Axboe36f4fa62020-09-05 11:14:22 -06004094 return -EINVAL;
4095
4096 req->shutdown.how = READ_ONCE(sqe->len);
4097 return 0;
4098#else
4099 return -EOPNOTSUPP;
4100#endif
4101}
4102
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004103static int io_shutdown(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe36f4fa62020-09-05 11:14:22 -06004104{
4105#if defined(CONFIG_NET)
4106 struct socket *sock;
4107 int ret;
4108
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004109 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboe36f4fa62020-09-05 11:14:22 -06004110 return -EAGAIN;
4111
Linus Torvalds48aba792020-12-16 12:44:05 -08004112 sock = sock_from_file(req->file);
Jens Axboe36f4fa62020-09-05 11:14:22 -06004113 if (unlikely(!sock))
Linus Torvalds48aba792020-12-16 12:44:05 -08004114 return -ENOTSOCK;
Jens Axboe36f4fa62020-09-05 11:14:22 -06004115
4116 ret = __sys_shutdown_sock(sock, req->shutdown.how);
Jens Axboea1464682020-12-14 20:57:27 -07004117 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004118 req_set_fail(req);
Jens Axboe36f4fa62020-09-05 11:14:22 -06004119 io_req_complete(req, ret);
4120 return 0;
4121#else
4122 return -EOPNOTSUPP;
4123#endif
4124}
4125
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004126static int __io_splice_prep(struct io_kiocb *req,
4127 const struct io_uring_sqe *sqe)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004128{
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01004129 struct io_splice *sp = &req->splice;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004130 unsigned int valid_flags = SPLICE_F_FD_IN_FIXED | SPLICE_F_ALL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004131
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004132 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4133 return -EINVAL;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004134
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004135 sp->len = READ_ONCE(sqe->len);
4136 sp->flags = READ_ONCE(sqe->splice_flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004137 if (unlikely(sp->flags & ~valid_flags))
4138 return -EINVAL;
Jens Axboeae6cba32022-03-29 10:59:20 -06004139 sp->splice_fd_in = READ_ONCE(sqe->splice_fd_in);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004140 return 0;
4141}
4142
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004143static int io_tee_prep(struct io_kiocb *req,
4144 const struct io_uring_sqe *sqe)
4145{
4146 if (READ_ONCE(sqe->splice_off_in) || READ_ONCE(sqe->off))
4147 return -EINVAL;
4148 return __io_splice_prep(req, sqe);
4149}
4150
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004151static int io_tee(struct io_kiocb *req, unsigned int issue_flags)
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004152{
4153 struct io_splice *sp = &req->splice;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004154 struct file *out = sp->file_out;
4155 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
Jens Axboeae6cba32022-03-29 10:59:20 -06004156 struct file *in;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004157 long ret = 0;
4158
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004159 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004160 return -EAGAIN;
Jens Axboeae6cba32022-03-29 10:59:20 -06004161
4162 in = io_file_get(req->ctx, req, sp->splice_fd_in,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08004163 (sp->flags & SPLICE_F_FD_IN_FIXED), issue_flags);
Jens Axboeae6cba32022-03-29 10:59:20 -06004164 if (!in) {
4165 ret = -EBADF;
4166 goto done;
4167 }
4168
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004169 if (sp->len)
4170 ret = do_tee(in, out, sp->len, flags);
4171
Pavel Begunkove1d767f2021-03-19 17:22:43 +00004172 if (!(sp->flags & SPLICE_F_FD_IN_FIXED))
4173 io_put_file(in);
Jens Axboeae6cba32022-03-29 10:59:20 -06004174done:
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004175 if (ret != sp->len)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004176 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004177 io_req_complete(req, ret);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004178 return 0;
4179}
4180
4181static int io_splice_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4182{
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01004183 struct io_splice *sp = &req->splice;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03004184
4185 sp->off_in = READ_ONCE(sqe->splice_off_in);
4186 sp->off_out = READ_ONCE(sqe->off);
4187 return __io_splice_prep(req, sqe);
4188}
4189
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004190static int io_splice(struct io_kiocb *req, unsigned int issue_flags)
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004191{
4192 struct io_splice *sp = &req->splice;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004193 struct file *out = sp->file_out;
4194 unsigned int flags = sp->flags & ~SPLICE_F_FD_IN_FIXED;
4195 loff_t *poff_in, *poff_out;
Jens Axboeae6cba32022-03-29 10:59:20 -06004196 struct file *in;
Pavel Begunkovc9687422020-05-04 23:00:54 +03004197 long ret = 0;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004198
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004199 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkov2fb3e822020-05-01 17:09:38 +03004200 return -EAGAIN;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004201
Jens Axboeae6cba32022-03-29 10:59:20 -06004202 in = io_file_get(req->ctx, req, sp->splice_fd_in,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08004203 (sp->flags & SPLICE_F_FD_IN_FIXED), issue_flags);
Jens Axboeae6cba32022-03-29 10:59:20 -06004204 if (!in) {
4205 ret = -EBADF;
4206 goto done;
4207 }
4208
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004209 poff_in = (sp->off_in == -1) ? NULL : &sp->off_in;
4210 poff_out = (sp->off_out == -1) ? NULL : &sp->off_out;
Pavel Begunkovc9687422020-05-04 23:00:54 +03004211
Jens Axboe948a7742020-05-17 14:21:38 -06004212 if (sp->len)
Pavel Begunkovc9687422020-05-04 23:00:54 +03004213 ret = do_splice(in, poff_in, out, poff_out, sp->len, flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004214
Pavel Begunkove1d767f2021-03-19 17:22:43 +00004215 if (!(sp->flags & SPLICE_F_FD_IN_FIXED))
4216 io_put_file(in);
Jens Axboeae6cba32022-03-29 10:59:20 -06004217done:
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004218 if (ret != sp->len)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004219 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004220 io_req_complete(req, ret);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03004221 return 0;
4222}
4223
Jens Axboe2b188cc2019-01-07 10:46:33 -07004224/*
4225 * IORING_OP_NOP just posts a completion event, nothing else.
4226 */
Pavel Begunkov889fca72021-02-10 00:03:09 +00004227static int io_nop(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe2b188cc2019-01-07 10:46:33 -07004228{
4229 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -07004230
Jens Axboedef596e2019-01-09 08:59:42 -07004231 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
4232 return -EINVAL;
4233
Pavel Begunkov889fca72021-02-10 00:03:09 +00004234 __io_req_complete(req, issue_flags, 0, 0);
Jens Axboe2b188cc2019-01-07 10:46:33 -07004235 return 0;
4236}
4237
Pavel Begunkov1155c762021-02-18 18:29:38 +00004238static int io_fsync_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004239{
Jens Axboe6b063142019-01-10 22:13:58 -07004240 struct io_ring_ctx *ctx = req->ctx;
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004241
Jens Axboe6b063142019-01-10 22:13:58 -07004242 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboedef596e2019-01-09 08:59:42 -07004243 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004244 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index ||
4245 sqe->splice_fd_in))
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004246 return -EINVAL;
4247
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004248 req->sync.flags = READ_ONCE(sqe->fsync_flags);
4249 if (unlikely(req->sync.flags & ~IORING_FSYNC_DATASYNC))
4250 return -EINVAL;
4251
4252 req->sync.off = READ_ONCE(sqe->off);
4253 req->sync.len = READ_ONCE(sqe->len);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004254 return 0;
4255}
4256
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004257static int io_fsync(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe78912932020-01-14 22:09:06 -07004258{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004259 loff_t end = req->sync.off + req->sync.len;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004260 int ret;
4261
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004262 /* fsync always requires a blocking context */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004263 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004264 return -EAGAIN;
4265
Jens Axboe9adbd452019-12-20 08:45:55 -07004266 ret = vfs_fsync_range(req->file, req->sync.off,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004267 end > 0 ? end : LLONG_MAX,
4268 req->sync.flags & IORING_FSYNC_DATASYNC);
4269 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004270 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004271 io_req_complete(req, ret);
Christoph Hellwigc992fe22019-01-11 09:43:02 -07004272 return 0;
4273}
4274
Jens Axboed63d1b52019-12-10 10:38:56 -07004275static int io_fallocate_prep(struct io_kiocb *req,
4276 const struct io_uring_sqe *sqe)
4277{
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004278 if (sqe->ioprio || sqe->buf_index || sqe->rw_flags ||
4279 sqe->splice_fd_in)
Jens Axboed63d1b52019-12-10 10:38:56 -07004280 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004281 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4282 return -EINVAL;
Jens Axboed63d1b52019-12-10 10:38:56 -07004283
4284 req->sync.off = READ_ONCE(sqe->off);
4285 req->sync.len = READ_ONCE(sqe->addr);
4286 req->sync.mode = READ_ONCE(sqe->len);
4287 return 0;
4288}
4289
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004290static int io_fallocate(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboed63d1b52019-12-10 10:38:56 -07004291{
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004292 int ret;
Jens Axboed63d1b52019-12-10 10:38:56 -07004293
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004294 /* fallocate always requiring blocking context */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004295 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004296 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004297 ret = vfs_fallocate(req->file, req->sync.mode, req->sync.off,
4298 req->sync.len);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004299 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004300 req_set_fail(req);
Jens Axboedf1ec532022-03-20 13:08:38 -06004301 else
4302 fsnotify_modify(req->file);
Jens Axboee1e16092020-06-22 09:17:17 -06004303 io_req_complete(req, ret);
Jens Axboed63d1b52019-12-10 10:38:56 -07004304 return 0;
4305}
4306
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004307static int __io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe15b71ab2019-12-11 11:20:36 -07004308{
Jens Axboef8748882020-01-08 17:47:02 -07004309 const char __user *fname;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004310 int ret;
4311
Pavel Begunkovd3fddf62021-08-09 13:04:16 +01004312 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4313 return -EINVAL;
Pavel Begunkovb9445592021-08-25 12:25:45 +01004314 if (unlikely(sqe->ioprio || sqe->buf_index))
Jens Axboe15b71ab2019-12-11 11:20:36 -07004315 return -EINVAL;
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004316 if (unlikely(req->flags & REQ_F_FIXED_FILE))
Jens Axboecf3040c2020-02-06 21:31:40 -07004317 return -EBADF;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004318
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004319 /* open.how should be already initialised */
4320 if (!(req->open.how.flags & O_PATH) && force_o_largefile())
Jens Axboe08a1d26eb2020-04-08 09:20:54 -06004321 req->open.how.flags |= O_LARGEFILE;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004322
Pavel Begunkov25e72d12020-06-03 18:03:23 +03004323 req->open.dfd = READ_ONCE(sqe->fd);
4324 fname = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboef8748882020-01-08 17:47:02 -07004325 req->open.filename = getname(fname);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004326 if (IS_ERR(req->open.filename)) {
4327 ret = PTR_ERR(req->open.filename);
4328 req->open.filename = NULL;
4329 return ret;
4330 }
Pavel Begunkovb9445592021-08-25 12:25:45 +01004331
4332 req->open.file_slot = READ_ONCE(sqe->file_index);
4333 if (req->open.file_slot && (req->open.how.flags & O_CLOEXEC))
4334 return -EINVAL;
4335
Jens Axboe4022e7a2020-03-19 19:23:18 -06004336 req->open.nofile = rlimit(RLIMIT_NOFILE);
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03004337 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004338 return 0;
4339}
4340
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004341static int io_openat_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4342{
Pavel Begunkovd3fddf62021-08-09 13:04:16 +01004343 u64 mode = READ_ONCE(sqe->len);
4344 u64 flags = READ_ONCE(sqe->open_flags);
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004345
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004346 req->open.how = build_open_how(flags, mode);
4347 return __io_openat_prep(req, sqe);
4348}
4349
Jens Axboecebdb982020-01-08 17:59:24 -07004350static int io_openat2_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4351{
4352 struct open_how __user *how;
Jens Axboecebdb982020-01-08 17:59:24 -07004353 size_t len;
4354 int ret;
4355
Jens Axboecebdb982020-01-08 17:59:24 -07004356 how = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4357 len = READ_ONCE(sqe->len);
Jens Axboecebdb982020-01-08 17:59:24 -07004358 if (len < OPEN_HOW_SIZE_VER0)
4359 return -EINVAL;
4360
4361 ret = copy_struct_from_user(&req->open.how, sizeof(req->open.how), how,
4362 len);
4363 if (ret)
4364 return ret;
4365
Pavel Begunkovec65fea2020-06-03 18:03:24 +03004366 return __io_openat_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07004367}
4368
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004369static int io_openat2(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe15b71ab2019-12-11 11:20:36 -07004370{
4371 struct open_flags op;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004372 struct file *file;
Pavel Begunkovb9445592021-08-25 12:25:45 +01004373 bool resolve_nonblock, nonblock_set;
4374 bool fixed = !!req->open.file_slot;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004375 int ret;
4376
Jens Axboecebdb982020-01-08 17:59:24 -07004377 ret = build_open_flags(&req->open.how, &op);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004378 if (ret)
4379 goto err;
Jens Axboe3a81fd02020-12-10 12:25:36 -07004380 nonblock_set = op.open_flag & O_NONBLOCK;
4381 resolve_nonblock = req->open.how.resolve & RESOLVE_CACHED;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004382 if (issue_flags & IO_URING_F_NONBLOCK) {
Jens Axboe3a81fd02020-12-10 12:25:36 -07004383 /*
4384 * Don't bother trying for O_TRUNC, O_CREAT, or O_TMPFILE open,
Aleksa Saraia7cedc22023-08-12 07:19:05 -06004385 * it'll always -EAGAIN. Note that we test for __O_TMPFILE
4386 * because O_TMPFILE includes O_DIRECTORY, which isn't a flag
4387 * we need to force async for.
Jens Axboe3a81fd02020-12-10 12:25:36 -07004388 */
Aleksa Saraia7cedc22023-08-12 07:19:05 -06004389 if (req->open.how.flags & (O_TRUNC | O_CREAT | __O_TMPFILE))
Jens Axboe3a81fd02020-12-10 12:25:36 -07004390 return -EAGAIN;
4391 op.lookup_flags |= LOOKUP_CACHED;
4392 op.open_flag |= O_NONBLOCK;
4393 }
Jens Axboe15b71ab2019-12-11 11:20:36 -07004394
Pavel Begunkovb9445592021-08-25 12:25:45 +01004395 if (!fixed) {
4396 ret = __get_unused_fd_flags(req->open.how.flags, req->open.nofile);
4397 if (ret < 0)
4398 goto err;
4399 }
Jens Axboe15b71ab2019-12-11 11:20:36 -07004400
4401 file = do_filp_open(req->open.dfd, req->open.filename, &op);
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004402 if (IS_ERR(file)) {
Jens Axboe3a81fd02020-12-10 12:25:36 -07004403 /*
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004404 * We could hang on to this 'fd' on retrying, but seems like
4405 * marginal gain for something that is now known to be a slower
4406 * path. So just put it, and we'll get a new one when we retry.
Jens Axboe3a81fd02020-12-10 12:25:36 -07004407 */
Pavel Begunkovb9445592021-08-25 12:25:45 +01004408 if (!fixed)
4409 put_unused_fd(ret);
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004410
4411 ret = PTR_ERR(file);
4412 /* only retry if RESOLVE_CACHED wasn't already set by application */
4413 if (ret == -EAGAIN &&
4414 (!resolve_nonblock && (issue_flags & IO_URING_F_NONBLOCK)))
4415 return -EAGAIN;
4416 goto err;
Jens Axboe3a81fd02020-12-10 12:25:36 -07004417 }
4418
Pavel Begunkov12dcb58a2021-06-24 15:10:00 +01004419 if ((issue_flags & IO_URING_F_NONBLOCK) && !nonblock_set)
4420 file->f_flags &= ~O_NONBLOCK;
4421 fsnotify_open(file);
Pavel Begunkovb9445592021-08-25 12:25:45 +01004422
4423 if (!fixed)
4424 fd_install(ret, file);
4425 else
4426 ret = io_install_fixed_file(req, file, issue_flags,
4427 req->open.file_slot - 1);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004428err:
4429 putname(req->open.filename);
Pavel Begunkov8fef80b2020-02-07 23:59:53 +03004430 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe15b71ab2019-12-11 11:20:36 -07004431 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004432 req_set_fail(req);
Pavel Begunkov0bdf3392021-04-11 01:46:29 +01004433 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe15b71ab2019-12-11 11:20:36 -07004434 return 0;
4435}
4436
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004437static int io_openat(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboecebdb982020-01-08 17:59:24 -07004438{
Pavel Begunkove45cff52021-02-28 22:35:14 +00004439 return io_openat2(req, issue_flags);
Jens Axboecebdb982020-01-08 17:59:24 -07004440}
4441
Jens Axboe067524e2020-03-02 16:32:28 -07004442static int io_remove_buffers_prep(struct io_kiocb *req,
4443 const struct io_uring_sqe *sqe)
4444{
4445 struct io_provide_buf *p = &req->pbuf;
4446 u64 tmp;
4447
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004448 if (sqe->ioprio || sqe->rw_flags || sqe->addr || sqe->len || sqe->off ||
4449 sqe->splice_fd_in)
Jens Axboe067524e2020-03-02 16:32:28 -07004450 return -EINVAL;
4451
4452 tmp = READ_ONCE(sqe->fd);
4453 if (!tmp || tmp > USHRT_MAX)
4454 return -EINVAL;
4455
4456 memset(p, 0, sizeof(*p));
4457 p->nbufs = tmp;
4458 p->bgid = READ_ONCE(sqe->buf_group);
4459 return 0;
4460}
4461
4462static int __io_remove_buffers(struct io_ring_ctx *ctx, struct io_buffer *buf,
4463 int bgid, unsigned nbufs)
4464{
4465 unsigned i = 0;
4466
4467 /* shouldn't happen */
4468 if (!nbufs)
4469 return 0;
4470
4471 /* the head kbuf is the list itself */
4472 while (!list_empty(&buf->list)) {
4473 struct io_buffer *nxt;
4474
4475 nxt = list_first_entry(&buf->list, struct io_buffer, list);
4476 list_del(&nxt->list);
4477 kfree(nxt);
4478 if (++i == nbufs)
4479 return i;
Ye Bin2d447d32021-11-22 10:47:37 +08004480 cond_resched();
Jens Axboe067524e2020-03-02 16:32:28 -07004481 }
4482 i++;
4483 kfree(buf);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004484 xa_erase(&ctx->io_buffers, bgid);
Jens Axboe067524e2020-03-02 16:32:28 -07004485
4486 return i;
4487}
4488
Pavel Begunkov889fca72021-02-10 00:03:09 +00004489static int io_remove_buffers(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe067524e2020-03-02 16:32:28 -07004490{
4491 struct io_provide_buf *p = &req->pbuf;
4492 struct io_ring_ctx *ctx = req->ctx;
4493 struct io_buffer *head;
4494 int ret = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004495 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboe067524e2020-03-02 16:32:28 -07004496
4497 io_ring_submit_lock(ctx, !force_nonblock);
4498
4499 lockdep_assert_held(&ctx->uring_lock);
4500
4501 ret = -ENOENT;
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004502 head = xa_load(&ctx->io_buffers, p->bgid);
Jens Axboe067524e2020-03-02 16:32:28 -07004503 if (head)
4504 ret = __io_remove_buffers(ctx, head, p->bgid, p->nbufs);
Jens Axboe067524e2020-03-02 16:32:28 -07004505 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004506 req_set_fail(req);
Pavel Begunkov31bff9a2020-12-06 22:22:43 +00004507
Pavel Begunkov9fb8cb42021-02-28 22:35:13 +00004508 /* complete before unlock, IOPOLL may need the lock */
4509 __io_req_complete(req, issue_flags, ret, 0);
4510 io_ring_submit_unlock(ctx, !force_nonblock);
Jens Axboe067524e2020-03-02 16:32:28 -07004511 return 0;
4512}
4513
Jens Axboeddf0322d2020-02-23 16:41:33 -07004514static int io_provide_buffers_prep(struct io_kiocb *req,
4515 const struct io_uring_sqe *sqe)
4516{
Pavel Begunkov38134ad2021-04-15 13:07:39 +01004517 unsigned long size, tmp_check;
Jens Axboeddf0322d2020-02-23 16:41:33 -07004518 struct io_provide_buf *p = &req->pbuf;
4519 u64 tmp;
4520
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004521 if (sqe->ioprio || sqe->rw_flags || sqe->splice_fd_in)
Jens Axboeddf0322d2020-02-23 16:41:33 -07004522 return -EINVAL;
4523
4524 tmp = READ_ONCE(sqe->fd);
4525 if (!tmp || tmp > USHRT_MAX)
4526 return -E2BIG;
4527 p->nbufs = tmp;
4528 p->addr = READ_ONCE(sqe->addr);
4529 p->len = READ_ONCE(sqe->len);
4530
Pavel Begunkov38134ad2021-04-15 13:07:39 +01004531 if (check_mul_overflow((unsigned long)p->len, (unsigned long)p->nbufs,
4532 &size))
4533 return -EOVERFLOW;
4534 if (check_add_overflow((unsigned long)p->addr, size, &tmp_check))
4535 return -EOVERFLOW;
4536
Pavel Begunkovd81269f2021-03-19 10:21:19 +00004537 size = (unsigned long)p->len * p->nbufs;
4538 if (!access_ok(u64_to_user_ptr(p->addr), size))
Jens Axboeddf0322d2020-02-23 16:41:33 -07004539 return -EFAULT;
4540
4541 p->bgid = READ_ONCE(sqe->buf_group);
4542 tmp = READ_ONCE(sqe->off);
4543 if (tmp > USHRT_MAX)
4544 return -E2BIG;
4545 p->bid = tmp;
4546 return 0;
4547}
4548
4549static int io_add_buffers(struct io_provide_buf *pbuf, struct io_buffer **head)
4550{
4551 struct io_buffer *buf;
4552 u64 addr = pbuf->addr;
4553 int i, bid = pbuf->bid;
4554
4555 for (i = 0; i < pbuf->nbufs; i++) {
Jens Axboe9990da92021-09-24 07:39:08 -06004556 buf = kmalloc(sizeof(*buf), GFP_KERNEL_ACCOUNT);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004557 if (!buf)
4558 break;
4559
4560 buf->addr = addr;
Thadeu Lima de Souza Cascardod1f82802021-05-05 09:47:06 -03004561 buf->len = min_t(__u32, pbuf->len, MAX_RW_COUNT);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004562 buf->bid = bid;
4563 addr += pbuf->len;
4564 bid++;
4565 if (!*head) {
4566 INIT_LIST_HEAD(&buf->list);
4567 *head = buf;
4568 } else {
4569 list_add_tail(&buf->list, &(*head)->list);
4570 }
Eric Dumazetc718ea42022-02-14 20:10:03 -08004571 cond_resched();
Jens Axboeddf0322d2020-02-23 16:41:33 -07004572 }
4573
4574 return i ? i : -ENOMEM;
4575}
4576
Pavel Begunkov889fca72021-02-10 00:03:09 +00004577static int io_provide_buffers(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeddf0322d2020-02-23 16:41:33 -07004578{
4579 struct io_provide_buf *p = &req->pbuf;
4580 struct io_ring_ctx *ctx = req->ctx;
4581 struct io_buffer *head, *list;
4582 int ret = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004583 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboeddf0322d2020-02-23 16:41:33 -07004584
4585 io_ring_submit_lock(ctx, !force_nonblock);
4586
4587 lockdep_assert_held(&ctx->uring_lock);
4588
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004589 list = head = xa_load(&ctx->io_buffers, p->bgid);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004590
4591 ret = io_add_buffers(p, &head);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004592 if (ret >= 0 && !list) {
Pavel Begunkovfa304062022-08-04 15:13:46 +01004593 ret = xa_insert(&ctx->io_buffers, p->bgid, head,
4594 GFP_KERNEL_ACCOUNT);
Jens Axboe9e15c3a2021-03-13 12:29:43 -07004595 if (ret < 0)
Jens Axboe067524e2020-03-02 16:32:28 -07004596 __io_remove_buffers(ctx, head, p->bgid, -1U);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004597 }
Jens Axboeddf0322d2020-02-23 16:41:33 -07004598 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004599 req_set_fail(req);
Pavel Begunkov9fb8cb42021-02-28 22:35:13 +00004600 /* complete before unlock, IOPOLL may need the lock */
4601 __io_req_complete(req, issue_flags, ret, 0);
4602 io_ring_submit_unlock(ctx, !force_nonblock);
Jens Axboeddf0322d2020-02-23 16:41:33 -07004603 return 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07004604}
4605
Jens Axboe3e4827b2020-01-08 15:18:09 -07004606static int io_epoll_ctl_prep(struct io_kiocb *req,
4607 const struct io_uring_sqe *sqe)
4608{
4609#if defined(CONFIG_EPOLL)
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004610 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Jens Axboe3e4827b2020-01-08 15:18:09 -07004611 return -EINVAL;
Pavel Begunkov2d74d042021-05-14 12:05:46 +01004612 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004613 return -EINVAL;
Jens Axboe3e4827b2020-01-08 15:18:09 -07004614
4615 req->epoll.epfd = READ_ONCE(sqe->fd);
4616 req->epoll.op = READ_ONCE(sqe->len);
4617 req->epoll.fd = READ_ONCE(sqe->off);
4618
4619 if (ep_op_has_event(req->epoll.op)) {
4620 struct epoll_event __user *ev;
4621
4622 ev = u64_to_user_ptr(READ_ONCE(sqe->addr));
4623 if (copy_from_user(&req->epoll.event, ev, sizeof(*ev)))
4624 return -EFAULT;
4625 }
4626
4627 return 0;
4628#else
4629 return -EOPNOTSUPP;
4630#endif
4631}
4632
Pavel Begunkov889fca72021-02-10 00:03:09 +00004633static int io_epoll_ctl(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe3e4827b2020-01-08 15:18:09 -07004634{
4635#if defined(CONFIG_EPOLL)
4636 struct io_epoll *ie = &req->epoll;
4637 int ret;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004638 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboe3e4827b2020-01-08 15:18:09 -07004639
4640 ret = do_epoll_ctl(ie->epfd, ie->op, ie->fd, &ie->event, force_nonblock);
4641 if (force_nonblock && ret == -EAGAIN)
4642 return -EAGAIN;
4643
4644 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004645 req_set_fail(req);
Pavel Begunkov889fca72021-02-10 00:03:09 +00004646 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe3e4827b2020-01-08 15:18:09 -07004647 return 0;
4648#else
4649 return -EOPNOTSUPP;
4650#endif
4651}
4652
Jens Axboec1ca7572019-12-25 22:18:28 -07004653static int io_madvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4654{
4655#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004656 if (sqe->ioprio || sqe->buf_index || sqe->off || sqe->splice_fd_in)
Jens Axboec1ca7572019-12-25 22:18:28 -07004657 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004658 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4659 return -EINVAL;
Jens Axboec1ca7572019-12-25 22:18:28 -07004660
4661 req->madvise.addr = READ_ONCE(sqe->addr);
4662 req->madvise.len = READ_ONCE(sqe->len);
4663 req->madvise.advice = READ_ONCE(sqe->fadvise_advice);
4664 return 0;
4665#else
4666 return -EOPNOTSUPP;
4667#endif
4668}
4669
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004670static int io_madvise(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboec1ca7572019-12-25 22:18:28 -07004671{
4672#if defined(CONFIG_ADVISE_SYSCALLS) && defined(CONFIG_MMU)
4673 struct io_madvise *ma = &req->madvise;
4674 int ret;
4675
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004676 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboec1ca7572019-12-25 22:18:28 -07004677 return -EAGAIN;
4678
Minchan Kim0726b012020-10-17 16:14:50 -07004679 ret = do_madvise(current->mm, ma->addr, ma->len, ma->advice);
Jens Axboec1ca7572019-12-25 22:18:28 -07004680 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004681 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004682 io_req_complete(req, ret);
Jens Axboec1ca7572019-12-25 22:18:28 -07004683 return 0;
4684#else
4685 return -EOPNOTSUPP;
4686#endif
4687}
4688
Jens Axboe4840e412019-12-25 22:03:45 -07004689static int io_fadvise_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4690{
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004691 if (sqe->ioprio || sqe->buf_index || sqe->addr || sqe->splice_fd_in)
Jens Axboe4840e412019-12-25 22:03:45 -07004692 return -EINVAL;
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004693 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4694 return -EINVAL;
Jens Axboe4840e412019-12-25 22:03:45 -07004695
4696 req->fadvise.offset = READ_ONCE(sqe->off);
4697 req->fadvise.len = READ_ONCE(sqe->len);
4698 req->fadvise.advice = READ_ONCE(sqe->fadvise_advice);
4699 return 0;
4700}
4701
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004702static int io_fadvise(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe4840e412019-12-25 22:03:45 -07004703{
4704 struct io_fadvise *fa = &req->fadvise;
4705 int ret;
4706
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004707 if (issue_flags & IO_URING_F_NONBLOCK) {
Jens Axboe3e694262020-02-01 09:22:49 -07004708 switch (fa->advice) {
4709 case POSIX_FADV_NORMAL:
4710 case POSIX_FADV_RANDOM:
4711 case POSIX_FADV_SEQUENTIAL:
4712 break;
4713 default:
4714 return -EAGAIN;
4715 }
4716 }
Jens Axboe4840e412019-12-25 22:03:45 -07004717
4718 ret = vfs_fadvise(req->file, fa->offset, fa->len, fa->advice);
4719 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004720 req_set_fail(req);
Pavel Begunkov0bdf3392021-04-11 01:46:29 +01004721 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe4840e412019-12-25 22:03:45 -07004722 return 0;
4723}
4724
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004725static int io_statx_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4726{
Pavel Begunkov2d74d042021-05-14 12:05:46 +01004727 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004728 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004729 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004730 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004731 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004732 return -EBADF;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004733
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004734 req->statx.dfd = READ_ONCE(sqe->fd);
4735 req->statx.mask = READ_ONCE(sqe->len);
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004736 req->statx.filename = u64_to_user_ptr(READ_ONCE(sqe->addr));
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004737 req->statx.buffer = u64_to_user_ptr(READ_ONCE(sqe->addr2));
4738 req->statx.flags = READ_ONCE(sqe->statx_flags);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004739
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004740 return 0;
4741}
4742
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004743static int io_statx(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004744{
Bijan Mottahedeh1d9e1282020-05-22 21:31:16 -07004745 struct io_statx *ctx = &req->statx;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004746 int ret;
4747
Pavel Begunkov59d70012021-03-22 01:58:30 +00004748 if (issue_flags & IO_URING_F_NONBLOCK)
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004749 return -EAGAIN;
4750
Bijan Mottahedehe62753e2020-05-22 21:31:18 -07004751 ret = do_statx(ctx->dfd, ctx->filename, ctx->flags, ctx->mask,
4752 ctx->buffer);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004753
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004754 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004755 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004756 io_req_complete(req, ret);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07004757 return 0;
4758}
4759
Jens Axboeb5dba592019-12-11 14:02:38 -07004760static int io_close_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
4761{
Jens Axboe14587a462020-09-05 11:36:08 -06004762 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Pavel Begunkov3232dd02020-06-03 18:03:22 +03004763 return -EINVAL;
Jens Axboeb5dba592019-12-11 14:02:38 -07004764 if (sqe->ioprio || sqe->off || sqe->addr || sqe->len ||
Pavel Begunkov7df778b2021-09-24 20:04:29 +01004765 sqe->rw_flags || sqe->buf_index)
Jens Axboeb5dba592019-12-11 14:02:38 -07004766 return -EINVAL;
Pavel Begunkov9c280f92020-04-08 08:58:46 +03004767 if (req->flags & REQ_F_FIXED_FILE)
Jens Axboecf3040c2020-02-06 21:31:40 -07004768 return -EBADF;
Jens Axboeb5dba592019-12-11 14:02:38 -07004769
4770 req->close.fd = READ_ONCE(sqe->fd);
Pavel Begunkov7df778b2021-09-24 20:04:29 +01004771 req->close.file_slot = READ_ONCE(sqe->file_index);
4772 if (req->close.file_slot && req->close.fd)
4773 return -EINVAL;
4774
Jens Axboeb5dba592019-12-11 14:02:38 -07004775 return 0;
4776}
4777
Pavel Begunkov889fca72021-02-10 00:03:09 +00004778static int io_close(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeb5dba592019-12-11 14:02:38 -07004779{
Jens Axboe9eac1902021-01-19 15:50:37 -07004780 struct files_struct *files = current->files;
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004781 struct io_close *close = &req->close;
Jens Axboe9eac1902021-01-19 15:50:37 -07004782 struct fdtable *fdt;
Pavel Begunkova1fde922021-04-11 01:46:28 +01004783 struct file *file = NULL;
4784 int ret = -EBADF;
Jens Axboeb5dba592019-12-11 14:02:38 -07004785
Pavel Begunkov7df778b2021-09-24 20:04:29 +01004786 if (req->close.file_slot) {
4787 ret = io_close_fixed(req, issue_flags);
4788 goto err;
4789 }
4790
Jens Axboe9eac1902021-01-19 15:50:37 -07004791 spin_lock(&files->file_lock);
4792 fdt = files_fdtable(files);
4793 if (close->fd >= fdt->max_fds) {
4794 spin_unlock(&files->file_lock);
4795 goto err;
4796 }
4797 file = fdt->fd[close->fd];
Pavel Begunkova1fde922021-04-11 01:46:28 +01004798 if (!file || file->f_op == &io_uring_fops) {
Jens Axboe9eac1902021-01-19 15:50:37 -07004799 spin_unlock(&files->file_lock);
4800 file = NULL;
4801 goto err;
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004802 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004803
4804 /* if the file has a flush method, be safe and punt to async */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004805 if (file->f_op->flush && (issue_flags & IO_URING_F_NONBLOCK)) {
Jens Axboe9eac1902021-01-19 15:50:37 -07004806 spin_unlock(&files->file_lock);
Pavel Begunkov0bf0eef2020-05-26 20:34:06 +03004807 return -EAGAIN;
Pavel Begunkova2100672020-03-02 23:45:16 +03004808 }
Jens Axboeb5dba592019-12-11 14:02:38 -07004809
Jens Axboe9eac1902021-01-19 15:50:37 -07004810 ret = __close_fd_get_file(close->fd, &file);
4811 spin_unlock(&files->file_lock);
4812 if (ret < 0) {
4813 if (ret == -ENOENT)
4814 ret = -EBADF;
4815 goto err;
4816 }
4817
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004818 /* No ->flush() or already async, safely close from here */
Jens Axboe9eac1902021-01-19 15:50:37 -07004819 ret = filp_close(file, current->files);
4820err:
Pavel Begunkov3af73b22020-06-08 21:08:17 +03004821 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004822 req_set_fail(req);
Jens Axboe9eac1902021-01-19 15:50:37 -07004823 if (file)
4824 fput(file);
Pavel Begunkov889fca72021-02-10 00:03:09 +00004825 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe1a417f42020-01-31 17:16:48 -07004826 return 0;
Jens Axboeb5dba592019-12-11 14:02:38 -07004827}
4828
Pavel Begunkov1155c762021-02-18 18:29:38 +00004829static int io_sfr_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004830{
4831 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004832
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004833 if (unlikely(ctx->flags & IORING_SETUP_IOPOLL))
4834 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01004835 if (unlikely(sqe->addr || sqe->ioprio || sqe->buf_index ||
4836 sqe->splice_fd_in))
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004837 return -EINVAL;
4838
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004839 req->sync.off = READ_ONCE(sqe->off);
4840 req->sync.len = READ_ONCE(sqe->len);
4841 req->sync.flags = READ_ONCE(sqe->sync_range_flags);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004842 return 0;
4843}
4844
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004845static int io_sync_file_range(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004846{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004847 int ret;
4848
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004849 /* sync_file_range always requires a blocking context */
Pavel Begunkov45d189c2021-02-10 00:03:07 +00004850 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkovac45abc2020-06-08 21:08:18 +03004851 return -EAGAIN;
4852
Jens Axboe9adbd452019-12-20 08:45:55 -07004853 ret = sync_file_range(req->file, req->sync.off, req->sync.len,
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07004854 req->sync.flags);
4855 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01004856 req_set_fail(req);
Jens Axboee1e16092020-06-22 09:17:17 -06004857 io_req_complete(req, ret);
Jens Axboe5d17b4a2019-04-09 14:56:44 -06004858 return 0;
4859}
4860
YueHaibing469956e2020-03-04 15:53:52 +08004861#if defined(CONFIG_NET)
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004862static bool io_net_retry(struct socket *sock, int flags)
4863{
4864 if (!(flags & MSG_WAITALL))
4865 return false;
4866 return sock->type == SOCK_STREAM || sock->type == SOCK_SEQPACKET;
4867}
4868
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004869static int io_setup_async_msg(struct io_kiocb *req,
4870 struct io_async_msghdr *kmsg)
4871{
Jens Axboee8c2bc12020-08-15 18:44:09 -07004872 struct io_async_msghdr *async_msg = req->async_data;
4873
4874 if (async_msg)
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004875 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004876 if (io_alloc_async_data(req)) {
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004877 kfree(kmsg->free_iov);
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004878 return -ENOMEM;
4879 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07004880 async_msg = req->async_data;
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004881 req->flags |= REQ_F_NEED_CLEANUP;
Jens Axboee8c2bc12020-08-15 18:44:09 -07004882 memcpy(async_msg, kmsg, sizeof(*kmsg));
Pavel Begunkovf9dc33f2022-09-29 22:23:18 +01004883 if (async_msg->msg.msg_name)
4884 async_msg->msg.msg_name = &async_msg->addr;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004885 /* if were using fast_iov, set it to the new one */
Stefan Metzmacher2e4c95a2022-09-29 09:39:10 +02004886 if (!kmsg->free_iov) {
4887 size_t fast_idx = kmsg->msg.msg_iter.iov - kmsg->fast_iov;
4888 async_msg->msg.msg_iter.iov = &async_msg->fast_iov[fast_idx];
4889 }
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004890
Pavel Begunkov02d27d82020-02-28 10:36:36 +03004891 return -EAGAIN;
4892}
4893
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004894static int io_sendmsg_copy_hdr(struct io_kiocb *req,
4895 struct io_async_msghdr *iomsg)
4896{
Jens Axboe34a7e502023-06-23 07:38:14 -06004897 struct io_sr_msg *sr = &req->sr_msg;
4898 int ret;
4899
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004900 iomsg->msg.msg_name = &iomsg->addr;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004901 iomsg->free_iov = iomsg->fast_iov;
Jens Axboe34a7e502023-06-23 07:38:14 -06004902 ret = sendmsg_copy_msghdr(&iomsg->msg, req->sr_msg.umsg,
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004903 req->sr_msg.msg_flags, &iomsg->free_iov);
Jens Axboe34a7e502023-06-23 07:38:14 -06004904 /* save msg_control as sys_sendmsg() overwrites it */
4905 sr->msg_control = iomsg->msg.msg_control;
4906 return ret;
Pavel Begunkov2ae523e2020-07-12 20:41:06 +03004907}
4908
Pavel Begunkov93642ef2021-02-18 18:29:44 +00004909static int io_sendmsg_prep_async(struct io_kiocb *req)
4910{
4911 int ret;
4912
Pavel Begunkov93642ef2021-02-18 18:29:44 +00004913 ret = io_sendmsg_copy_hdr(req, req->async_data);
4914 if (!ret)
4915 req->flags |= REQ_F_NEED_CLEANUP;
4916 return ret;
4917}
4918
Jens Axboe3529d8c2019-12-19 18:24:38 -07004919static int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboeaa1fa282019-04-19 13:38:09 -06004920{
Jens Axboee47293f2019-12-20 08:58:21 -07004921 struct io_sr_msg *sr = &req->sr_msg;
Jens Axboe03b12302019-12-02 18:50:25 -07004922
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004923 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
4924 return -EINVAL;
Jens Axboe79c10cb2022-04-26 19:34:11 -06004925 if (unlikely(sqe->addr2 || sqe->file_index))
4926 return -EINVAL;
Jens Axboe50fefe52022-06-30 14:42:05 -06004927 if (unlikely(sqe->addr2 || sqe->file_index || sqe->ioprio))
4928 return -EINVAL;
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03004929
Pavel Begunkov270a5942020-07-12 20:41:04 +03004930 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboefddafac2020-01-04 20:19:44 -07004931 sr->len = READ_ONCE(sqe->len);
Pavel Begunkov04411802021-04-01 15:44:00 +01004932 sr->msg_flags = READ_ONCE(sqe->msg_flags) | MSG_NOSIGNAL;
4933 if (sr->msg_flags & MSG_DONTWAIT)
4934 req->flags |= REQ_F_NOWAIT;
Jens Axboe3529d8c2019-12-19 18:24:38 -07004935
Jens Axboed8768362020-02-27 14:17:49 -07004936#ifdef CONFIG_COMPAT
4937 if (req->ctx->compat)
4938 sr->msg_flags |= MSG_CMSG_COMPAT;
4939#endif
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004940 sr->done_io = 0;
Pavel Begunkov93642ef2021-02-18 18:29:44 +00004941 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004942}
4943
Pavel Begunkov889fca72021-02-10 00:03:09 +00004944static int io_sendmsg(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe03b12302019-12-02 18:50:25 -07004945{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03004946 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004947 struct io_sr_msg *sr = &req->sr_msg;
Jens Axboe03b12302019-12-02 18:50:25 -07004948 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004949 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01004950 int min_ret = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07004951 int ret;
4952
Florent Revestdba4a922020-12-04 12:36:04 +01004953 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004954 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01004955 return -ENOTSOCK;
Jens Axboe03b12302019-12-02 18:50:25 -07004956
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004957 kmsg = req->async_data;
4958 if (!kmsg) {
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004959 ret = io_sendmsg_copy_hdr(req, &iomsg);
Jens Axboefddafac2020-01-04 20:19:44 -07004960 if (ret)
4961 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004962 kmsg = &iomsg;
Jens Axboe34a7e502023-06-23 07:38:14 -06004963 } else {
4964 kmsg->msg.msg_control = sr->msg_control;
Jens Axboefddafac2020-01-04 20:19:44 -07004965 }
4966
Pavel Begunkov04411802021-04-01 15:44:00 +01004967 flags = req->sr_msg.msg_flags;
4968 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004969 flags |= MSG_DONTWAIT;
Stefan Metzmacher00312752021-03-20 20:33:36 +01004970 if (flags & MSG_WAITALL)
4971 min_ret = iov_iter_count(&kmsg->msg.msg_iter);
4972
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004973 ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03004974
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00004975 if (ret < min_ret) {
4976 if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
4977 return io_setup_async_msg(req, kmsg);
4978 if (ret == -ERESTARTSYS)
4979 ret = -EINTR;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004980 if (ret > 0 && io_net_retry(sock, flags)) {
Jens Axboe25a543c2023-06-23 07:39:42 -06004981 kmsg->msg.msg_controllen = 0;
4982 kmsg->msg.msg_control = NULL;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004983 sr->done_io += ret;
4984 req->flags |= REQ_F_PARTIAL_IO;
4985 return io_setup_async_msg(req, kmsg);
4986 }
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00004987 req_set_fail(req);
4988 }
Pavel Begunkov257e84a2021-02-05 00:58:00 +00004989 /* fast path, check for non-NULL to avoid function call */
4990 if (kmsg->free_iov)
4991 kfree(kmsg->free_iov);
Jens Axboe03b12302019-12-02 18:50:25 -07004992 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06004993 if (ret >= 0)
4994 ret += sr->done_io;
4995 else if (sr->done_io)
4996 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00004997 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboefddafac2020-01-04 20:19:44 -07004998 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07004999}
5000
Pavel Begunkov889fca72021-02-10 00:03:09 +00005001static int io_send(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe03b12302019-12-02 18:50:25 -07005002{
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005003 struct io_sr_msg *sr = &req->sr_msg;
5004 struct msghdr msg;
5005 struct iovec iov;
Jens Axboe03b12302019-12-02 18:50:25 -07005006 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005007 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005008 int min_ret = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07005009 int ret;
5010
Florent Revestdba4a922020-12-04 12:36:04 +01005011 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005012 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01005013 return -ENOTSOCK;
Jens Axboe03b12302019-12-02 18:50:25 -07005014
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005015 ret = import_single_range(WRITE, sr->buf, sr->len, &iov, &msg.msg_iter);
5016 if (unlikely(ret))
Zheng Bin14db8412020-09-09 20:12:37 +08005017 return ret;
Jens Axboe03b12302019-12-02 18:50:25 -07005018
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005019 msg.msg_name = NULL;
5020 msg.msg_control = NULL;
5021 msg.msg_controllen = 0;
5022 msg.msg_namelen = 0;
Jens Axboe03b12302019-12-02 18:50:25 -07005023
Pavel Begunkov04411802021-04-01 15:44:00 +01005024 flags = req->sr_msg.msg_flags;
5025 if (issue_flags & IO_URING_F_NONBLOCK)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005026 flags |= MSG_DONTWAIT;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005027 if (flags & MSG_WAITALL)
5028 min_ret = iov_iter_count(&msg.msg_iter);
5029
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005030 msg.msg_flags = flags;
5031 ret = sock_sendmsg(sock, &msg);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005032 if (ret < min_ret) {
5033 if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
5034 return -EAGAIN;
5035 if (ret == -ERESTARTSYS)
5036 ret = -EINTR;
Jens Axboe3c1a3d02022-04-20 19:21:36 -06005037 if (ret > 0 && io_net_retry(sock, flags)) {
5038 sr->len -= ret;
5039 sr->buf += ret;
5040 sr->done_io += ret;
5041 req->flags |= REQ_F_PARTIAL_IO;
5042 return -EAGAIN;
5043 }
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01005044 req_set_fail(req);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005045 }
Jens Axboe3c1a3d02022-04-20 19:21:36 -06005046 if (ret >= 0)
5047 ret += sr->done_io;
5048 else if (sr->done_io)
5049 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00005050 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe03b12302019-12-02 18:50:25 -07005051 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07005052}
5053
Pavel Begunkov1400e692020-07-12 20:41:05 +03005054static int __io_recvmsg_copy_hdr(struct io_kiocb *req,
5055 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07005056{
5057 struct io_sr_msg *sr = &req->sr_msg;
5058 struct iovec __user *uiov;
5059 size_t iov_len;
5060 int ret;
5061
Pavel Begunkov1400e692020-07-12 20:41:05 +03005062 ret = __copy_msghdr_from_user(&iomsg->msg, sr->umsg,
5063 &iomsg->uaddr, &uiov, &iov_len);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005064 if (ret)
5065 return ret;
5066
5067 if (req->flags & REQ_F_BUFFER_SELECT) {
5068 if (iov_len > 1)
5069 return -EINVAL;
Pavel Begunkov5476dfe2021-02-05 00:57:59 +00005070 if (copy_from_user(iomsg->fast_iov, uiov, sizeof(*uiov)))
Jens Axboe52de1fe2020-02-27 10:15:42 -07005071 return -EFAULT;
Pavel Begunkov5476dfe2021-02-05 00:57:59 +00005072 sr->len = iomsg->fast_iov[0].iov_len;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005073 iomsg->free_iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005074 } else {
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005075 iomsg->free_iov = iomsg->fast_iov;
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005076 ret = __import_iovec(READ, uiov, iov_len, UIO_FASTIOV,
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005077 &iomsg->free_iov, &iomsg->msg.msg_iter,
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005078 false);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005079 if (ret > 0)
5080 ret = 0;
5081 }
5082
5083 return ret;
5084}
5085
5086#ifdef CONFIG_COMPAT
5087static int __io_compat_recvmsg_copy_hdr(struct io_kiocb *req,
Pavel Begunkov1400e692020-07-12 20:41:05 +03005088 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07005089{
Jens Axboe52de1fe2020-02-27 10:15:42 -07005090 struct io_sr_msg *sr = &req->sr_msg;
5091 struct compat_iovec __user *uiov;
5092 compat_uptr_t ptr;
5093 compat_size_t len;
5094 int ret;
5095
Pavel Begunkov4af34172021-04-11 01:46:30 +01005096 ret = __get_compat_msghdr(&iomsg->msg, sr->umsg_compat, &iomsg->uaddr,
5097 &ptr, &len);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005098 if (ret)
5099 return ret;
5100
5101 uiov = compat_ptr(ptr);
5102 if (req->flags & REQ_F_BUFFER_SELECT) {
5103 compat_ssize_t clen;
5104
5105 if (len > 1)
5106 return -EINVAL;
5107 if (!access_ok(uiov, sizeof(*uiov)))
5108 return -EFAULT;
5109 if (__get_user(clen, &uiov->iov_len))
5110 return -EFAULT;
5111 if (clen < 0)
5112 return -EINVAL;
Pavel Begunkov2d280bc2020-11-29 18:33:32 +00005113 sr->len = clen;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005114 iomsg->free_iov = NULL;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005115 } else {
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005116 iomsg->free_iov = iomsg->fast_iov;
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005117 ret = __import_iovec(READ, (struct iovec __user *)uiov, len,
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005118 UIO_FASTIOV, &iomsg->free_iov,
Christoph Hellwig89cd35c2020-09-25 06:51:41 +02005119 &iomsg->msg.msg_iter, true);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005120 if (ret < 0)
5121 return ret;
5122 }
5123
5124 return 0;
5125}
Jens Axboe03b12302019-12-02 18:50:25 -07005126#endif
Jens Axboe52de1fe2020-02-27 10:15:42 -07005127
Pavel Begunkov1400e692020-07-12 20:41:05 +03005128static int io_recvmsg_copy_hdr(struct io_kiocb *req,
5129 struct io_async_msghdr *iomsg)
Jens Axboe52de1fe2020-02-27 10:15:42 -07005130{
Pavel Begunkov1400e692020-07-12 20:41:05 +03005131 iomsg->msg.msg_name = &iomsg->addr;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005132
5133#ifdef CONFIG_COMPAT
5134 if (req->ctx->compat)
Pavel Begunkov1400e692020-07-12 20:41:05 +03005135 return __io_compat_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005136#endif
5137
Pavel Begunkov1400e692020-07-12 20:41:05 +03005138 return __io_recvmsg_copy_hdr(req, iomsg);
Jens Axboe52de1fe2020-02-27 10:15:42 -07005139}
5140
Jens Axboebcda7ba2020-02-23 16:42:51 -07005141static struct io_buffer *io_recv_buffer_select(struct io_kiocb *req,
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005142 bool needs_lock)
Jens Axboebcda7ba2020-02-23 16:42:51 -07005143{
5144 struct io_sr_msg *sr = &req->sr_msg;
5145 struct io_buffer *kbuf;
5146
Jens Axboebcda7ba2020-02-23 16:42:51 -07005147 kbuf = io_buffer_select(req, &sr->len, sr->bgid, sr->kbuf, needs_lock);
5148 if (IS_ERR(kbuf))
5149 return kbuf;
5150
5151 sr->kbuf = kbuf;
5152 req->flags |= REQ_F_BUFFER_SELECTED;
Jens Axboebcda7ba2020-02-23 16:42:51 -07005153 return kbuf;
Jens Axboe03b12302019-12-02 18:50:25 -07005154}
5155
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005156static inline unsigned int io_put_recv_kbuf(struct io_kiocb *req)
5157{
5158 return io_put_kbuf(req, req->sr_msg.kbuf);
5159}
5160
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005161static int io_recvmsg_prep_async(struct io_kiocb *req)
Jens Axboe03b12302019-12-02 18:50:25 -07005162{
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005163 int ret;
Jens Axboe06b76d42019-12-19 14:44:26 -07005164
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005165 ret = io_recvmsg_copy_hdr(req, req->async_data);
5166 if (!ret)
5167 req->flags |= REQ_F_NEED_CLEANUP;
5168 return ret;
5169}
5170
5171static int io_recvmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
5172{
5173 struct io_sr_msg *sr = &req->sr_msg;
5174
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03005175 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
5176 return -EINVAL;
Jens Axboe37811e42022-04-26 19:34:57 -06005177 if (unlikely(sqe->addr2 || sqe->file_index))
5178 return -EINVAL;
Jens Axboe50fefe52022-06-30 14:42:05 -06005179 if (unlikely(sqe->addr2 || sqe->file_index || sqe->ioprio))
5180 return -EINVAL;
Pavel Begunkovd2b6f482020-06-03 18:03:25 +03005181
Pavel Begunkov270a5942020-07-12 20:41:04 +03005182 sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
Jens Axboe0b7b21e2020-01-31 08:34:59 -07005183 sr->len = READ_ONCE(sqe->len);
Jens Axboebcda7ba2020-02-23 16:42:51 -07005184 sr->bgid = READ_ONCE(sqe->buf_group);
David Lamparter7e8cd202023-03-06 13:23:06 -07005185 sr->msg_flags = READ_ONCE(sqe->msg_flags);
Pavel Begunkov04411802021-04-01 15:44:00 +01005186 if (sr->msg_flags & MSG_DONTWAIT)
5187 req->flags |= REQ_F_NOWAIT;
Jens Axboe3529d8c2019-12-19 18:24:38 -07005188
Jens Axboed8768362020-02-27 14:17:49 -07005189#ifdef CONFIG_COMPAT
5190 if (req->ctx->compat)
5191 sr->msg_flags |= MSG_CMSG_COMPAT;
5192#endif
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005193 sr->done_io = 0;
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005194 return 0;
Jens Axboe03b12302019-12-02 18:50:25 -07005195}
5196
Pavel Begunkov889fca72021-02-10 00:03:09 +00005197static int io_recvmsg(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe03b12302019-12-02 18:50:25 -07005198{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03005199 struct io_async_msghdr iomsg, *kmsg;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005200 struct io_sr_msg *sr = &req->sr_msg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005201 struct socket *sock;
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005202 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005203 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005204 int min_ret = 0;
Jens Axboe52de1fe2020-02-27 10:15:42 -07005205 int ret, cflags = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005206 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005207
Florent Revestdba4a922020-12-04 12:36:04 +01005208 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005209 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01005210 return -ENOTSOCK;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005211
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005212 kmsg = req->async_data;
5213 if (!kmsg) {
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005214 ret = io_recvmsg_copy_hdr(req, &iomsg);
5215 if (ret)
Pavel Begunkov681fda82020-07-15 22:20:45 +03005216 return ret;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005217 kmsg = &iomsg;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005218 }
5219
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03005220 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005221 kbuf = io_recv_buffer_select(req, !force_nonblock);
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03005222 if (IS_ERR(kbuf))
5223 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005224 kmsg->fast_iov[0].iov_base = u64_to_user_ptr(kbuf->addr);
Pavel Begunkov5476dfe2021-02-05 00:57:59 +00005225 kmsg->fast_iov[0].iov_len = req->sr_msg.len;
5226 iov_iter_init(&kmsg->msg.msg_iter, READ, kmsg->fast_iov,
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005227 1, req->sr_msg.len);
5228 }
5229
Pavel Begunkov04411802021-04-01 15:44:00 +01005230 flags = req->sr_msg.msg_flags;
5231 if (force_nonblock)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005232 flags |= MSG_DONTWAIT;
Jens Axboe96987c32023-06-23 07:41:10 -06005233 if (flags & MSG_WAITALL && !kmsg->msg.msg_controllen)
Stefan Metzmacher00312752021-03-20 20:33:36 +01005234 min_ret = iov_iter_count(&kmsg->msg.msg_iter);
5235
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005236 ret = __sys_recvmsg_sock(sock, &kmsg->msg, req->sr_msg.umsg,
5237 kmsg->uaddr, flags);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005238 if (ret < min_ret) {
5239 if (ret == -EAGAIN && force_nonblock)
5240 return io_setup_async_msg(req, kmsg);
5241 if (ret == -ERESTARTSYS)
5242 ret = -EINTR;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005243 if (ret > 0 && io_net_retry(sock, flags)) {
5244 sr->done_io += ret;
Jens Axboe390b8812022-03-23 09:30:05 -06005245 req->flags |= REQ_F_PARTIAL_IO;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005246 return io_setup_async_msg(req, kmsg);
5247 }
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005248 req_set_fail(req);
5249 } else if ((flags & MSG_WAITALL) && (kmsg->msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
5250 req_set_fail(req);
5251 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03005252
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005253 if (req->flags & REQ_F_BUFFER_SELECTED)
5254 cflags = io_put_recv_kbuf(req);
Pavel Begunkov257e84a2021-02-05 00:58:00 +00005255 /* fast path, check for non-NULL to avoid function call */
5256 if (kmsg->free_iov)
5257 kfree(kmsg->free_iov);
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03005258 req->flags &= ~REQ_F_NEED_CLEANUP;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005259 if (ret >= 0)
5260 ret += sr->done_io;
5261 else if (sr->done_io)
5262 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00005263 __io_req_complete(req, issue_flags, ret, cflags);
Jens Axboe0fa03c62019-04-19 13:34:07 -06005264 return 0;
Jens Axboe0fa03c62019-04-19 13:34:07 -06005265}
5266
Pavel Begunkov889fca72021-02-10 00:03:09 +00005267static int io_recv(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboefddafac2020-01-04 20:19:44 -07005268{
Pavel Begunkov6b754c82020-07-16 23:28:00 +03005269 struct io_buffer *kbuf;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005270 struct io_sr_msg *sr = &req->sr_msg;
5271 struct msghdr msg;
5272 void __user *buf = sr->buf;
Jens Axboefddafac2020-01-04 20:19:44 -07005273 struct socket *sock;
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005274 struct iovec iov;
5275 unsigned flags;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005276 int min_ret = 0;
Jens Axboebcda7ba2020-02-23 16:42:51 -07005277 int ret, cflags = 0;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005278 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboefddafac2020-01-04 20:19:44 -07005279
Florent Revestdba4a922020-12-04 12:36:04 +01005280 sock = sock_from_file(req->file);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005281 if (unlikely(!sock))
Florent Revestdba4a922020-12-04 12:36:04 +01005282 return -ENOTSOCK;
Jens Axboefddafac2020-01-04 20:19:44 -07005283
Pavel Begunkovbc02ef32020-07-16 23:28:03 +03005284 if (req->flags & REQ_F_BUFFER_SELECT) {
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005285 kbuf = io_recv_buffer_select(req, !force_nonblock);
Jens Axboebcda7ba2020-02-23 16:42:51 -07005286 if (IS_ERR(kbuf))
5287 return PTR_ERR(kbuf);
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005288 buf = u64_to_user_ptr(kbuf->addr);
Jens Axboefddafac2020-01-04 20:19:44 -07005289 }
5290
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005291 ret = import_single_range(READ, buf, sr->len, &iov, &msg.msg_iter);
Pavel Begunkov14c32ee2020-07-16 23:28:01 +03005292 if (unlikely(ret))
5293 goto out_free;
Jens Axboefddafac2020-01-04 20:19:44 -07005294
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005295 msg.msg_name = NULL;
5296 msg.msg_control = NULL;
5297 msg.msg_controllen = 0;
5298 msg.msg_namelen = 0;
5299 msg.msg_iocb = NULL;
5300 msg.msg_flags = 0;
5301
Pavel Begunkov04411802021-04-01 15:44:00 +01005302 flags = req->sr_msg.msg_flags;
5303 if (force_nonblock)
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005304 flags |= MSG_DONTWAIT;
Stefan Metzmacher00312752021-03-20 20:33:36 +01005305 if (flags & MSG_WAITALL)
5306 min_ret = iov_iter_count(&msg.msg_iter);
5307
Pavel Begunkov7a7cacb2020-07-16 23:27:59 +03005308 ret = sock_recvmsg(sock, &msg, flags);
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005309 if (ret < min_ret) {
5310 if (ret == -EAGAIN && force_nonblock)
5311 return -EAGAIN;
5312 if (ret == -ERESTARTSYS)
5313 ret = -EINTR;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005314 if (ret > 0 && io_net_retry(sock, flags)) {
5315 sr->len -= ret;
5316 sr->buf += ret;
5317 sr->done_io += ret;
Jens Axboe390b8812022-03-23 09:30:05 -06005318 req->flags |= REQ_F_PARTIAL_IO;
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005319 return -EAGAIN;
5320 }
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005321 req_set_fail(req);
5322 } else if ((flags & MSG_WAITALL) && (msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
Alviro Iskandar Setiawane944f1e2022-02-07 21:05:33 +07005323out_free:
Pavel Begunkovcdc68e72021-11-23 00:07:47 +00005324 req_set_fail(req);
5325 }
Pavel Begunkov7fbb1b52020-07-16 23:28:05 +03005326 if (req->flags & REQ_F_BUFFER_SELECTED)
5327 cflags = io_put_recv_kbuf(req);
Jens Axboe9b7b0f22023-01-21 10:21:22 -07005328 if (ret >= 0)
5329 ret += sr->done_io;
5330 else if (sr->done_io)
5331 ret = sr->done_io;
Pavel Begunkov889fca72021-02-10 00:03:09 +00005332 __io_req_complete(req, issue_flags, ret, cflags);
Jens Axboefddafac2020-01-04 20:19:44 -07005333 return 0;
Jens Axboefddafac2020-01-04 20:19:44 -07005334}
5335
Jens Axboe3529d8c2019-12-19 18:24:38 -07005336static int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe17f2fe32019-10-17 14:42:58 -06005337{
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005338 struct io_accept *accept = &req->accept;
5339
Jens Axboe14587a462020-09-05 11:36:08 -06005340 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe17f2fe32019-10-17 14:42:58 -06005341 return -EINVAL;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005342 if (sqe->ioprio || sqe->len || sqe->buf_index)
Jens Axboe17f2fe32019-10-17 14:42:58 -06005343 return -EINVAL;
5344
Jens Axboed55e5f52019-12-11 16:12:15 -07005345 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
5346 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005347 accept->flags = READ_ONCE(sqe->accept_flags);
Jens Axboe09952e32020-03-19 20:16:56 -06005348 accept->nofile = rlimit(RLIMIT_NOFILE);
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005349
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005350 accept->file_slot = READ_ONCE(sqe->file_index);
Jens Axboe13239762022-03-14 17:26:19 -06005351 if (accept->file_slot && (accept->flags & SOCK_CLOEXEC))
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005352 return -EINVAL;
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005353 if (accept->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
5354 return -EINVAL;
5355 if (SOCK_NONBLOCK != O_NONBLOCK && (accept->flags & SOCK_NONBLOCK))
5356 accept->flags = (accept->flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005357 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005358}
Jens Axboe17f2fe32019-10-17 14:42:58 -06005359
Pavel Begunkov889fca72021-02-10 00:03:09 +00005360static int io_accept(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005361{
5362 struct io_accept *accept = &req->accept;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005363 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03005364 unsigned int file_flags = force_nonblock ? O_NONBLOCK : 0;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005365 bool fixed = !!accept->file_slot;
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005366 struct file *file;
5367 int ret, fd;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005368
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005369 if (!fixed) {
5370 fd = __get_unused_fd_flags(accept->flags, accept->nofile);
5371 if (unlikely(fd < 0))
5372 return fd;
5373 }
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005374 file = do_accept(req->file, file_flags, accept->addr, accept->addr_len,
5375 accept->flags);
5376 if (IS_ERR(file)) {
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005377 if (!fixed)
5378 put_unused_fd(fd);
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005379 ret = PTR_ERR(file);
Dylan Yudaken30b90682023-01-21 09:13:12 -07005380 /* safe to retry */
5381 req->flags |= REQ_F_PARTIAL_IO;
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005382 if (ret == -EAGAIN && force_nonblock)
5383 return -EAGAIN;
Pavel Begunkovac45abc2020-06-08 21:08:18 +03005384 if (ret == -ERESTARTSYS)
5385 ret = -EINTR;
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01005386 req_set_fail(req);
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005387 } else if (!fixed) {
Pavel Begunkova7083ad2021-08-25 12:25:46 +01005388 fd_install(fd, file);
5389 ret = fd;
Pavel Begunkovaaa4db12021-08-25 12:25:47 +01005390 } else {
5391 ret = io_install_fixed_file(req, file, issue_flags,
5392 accept->file_slot - 1);
Pavel Begunkovac45abc2020-06-08 21:08:18 +03005393 }
Pavel Begunkov889fca72021-02-10 00:03:09 +00005394 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe17f2fe32019-10-17 14:42:58 -06005395 return 0;
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07005396}
5397
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005398static int io_connect_prep_async(struct io_kiocb *req)
5399{
5400 struct io_async_connect *io = req->async_data;
5401 struct io_connect *conn = &req->connect;
5402
5403 return move_addr_to_kernel(conn->addr, conn->addr_len, &io->address);
5404}
5405
Jens Axboe3529d8c2019-12-19 18:24:38 -07005406static int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef499a022019-12-02 16:28:46 -07005407{
Jens Axboe3529d8c2019-12-19 18:24:38 -07005408 struct io_connect *conn = &req->connect;
Jens Axboef499a022019-12-02 16:28:46 -07005409
Jens Axboe14587a462020-09-05 11:36:08 -06005410 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005411 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01005412 if (sqe->ioprio || sqe->len || sqe->buf_index || sqe->rw_flags ||
5413 sqe->splice_fd_in)
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005414 return -EINVAL;
5415
Jens Axboe3529d8c2019-12-19 18:24:38 -07005416 conn->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
5417 conn->addr_len = READ_ONCE(sqe->addr2);
Pavel Begunkov93642ef2021-02-18 18:29:44 +00005418 return 0;
Jens Axboef499a022019-12-02 16:28:46 -07005419}
5420
Pavel Begunkov889fca72021-02-10 00:03:09 +00005421static int io_connect(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboef8e85cf2019-11-23 14:24:24 -07005422{
Jens Axboee8c2bc12020-08-15 18:44:09 -07005423 struct io_async_connect __io, *io;
Jens Axboef8e85cf2019-11-23 14:24:24 -07005424 unsigned file_flags;
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005425 int ret;
Pavel Begunkov45d189c2021-02-10 00:03:07 +00005426 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Jens Axboef8e85cf2019-11-23 14:24:24 -07005427
Jens Axboee8c2bc12020-08-15 18:44:09 -07005428 if (req->async_data) {
5429 io = req->async_data;
Jens Axboef499a022019-12-02 16:28:46 -07005430 } else {
Jens Axboe3529d8c2019-12-19 18:24:38 -07005431 ret = move_addr_to_kernel(req->connect.addr,
5432 req->connect.addr_len,
Jens Axboee8c2bc12020-08-15 18:44:09 -07005433 &__io.address);
Jens Axboef499a022019-12-02 16:28:46 -07005434 if (ret)
5435 goto out;
5436 io = &__io;
5437 }
5438
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005439 file_flags = force_nonblock ? O_NONBLOCK : 0;
5440
Jens Axboee8c2bc12020-08-15 18:44:09 -07005441 ret = __sys_connect_file(req->file, &io->address,
Jens Axboe3fbb51c2019-12-20 08:51:52 -07005442 req->connect.addr_len, file_flags);
Jens Axboe87f80d62019-12-03 11:23:54 -07005443 if ((ret == -EAGAIN || ret == -EINPROGRESS) && force_nonblock) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07005444 if (req->async_data)
Jens Axboeb7bb4f72019-12-15 22:13:43 -07005445 return -EAGAIN;
Jens Axboee8c2bc12020-08-15 18:44:09 -07005446 if (io_alloc_async_data(req)) {
Jens Axboef499a022019-12-02 16:28:46 -07005447 ret = -ENOMEM;
5448 goto out;
5449 }
Jens Axboee8c2bc12020-08-15 18:44:09 -07005450 memcpy(req->async_data, &__io, sizeof(__io));
Jens Axboef8e85cf2019-11-23 14:24:24 -07005451 return -EAGAIN;
Jens Axboef499a022019-12-02 16:28:46 -07005452 }
Jens Axboef8e85cf2019-11-23 14:24:24 -07005453 if (ret == -ERESTARTSYS)
5454 ret = -EINTR;
Jens Axboef499a022019-12-02 16:28:46 -07005455out:
Jens Axboe4e88d6e2019-12-07 20:59:47 -07005456 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01005457 req_set_fail(req);
Pavel Begunkov889fca72021-02-10 00:03:09 +00005458 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboef8e85cf2019-11-23 14:24:24 -07005459 return 0;
Jens Axboef8e85cf2019-11-23 14:24:24 -07005460}
YueHaibing469956e2020-03-04 15:53:52 +08005461#else /* !CONFIG_NET */
Jens Axboe99a10082021-02-19 09:35:19 -07005462#define IO_NETOP_FN(op) \
5463static int io_##op(struct io_kiocb *req, unsigned int issue_flags) \
5464{ \
5465 return -EOPNOTSUPP; \
Jens Axboef8e85cf2019-11-23 14:24:24 -07005466}
5467
Jens Axboe99a10082021-02-19 09:35:19 -07005468#define IO_NETOP_PREP(op) \
5469IO_NETOP_FN(op) \
5470static int io_##op##_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe) \
5471{ \
5472 return -EOPNOTSUPP; \
5473} \
5474
5475#define IO_NETOP_PREP_ASYNC(op) \
5476IO_NETOP_PREP(op) \
5477static int io_##op##_prep_async(struct io_kiocb *req) \
5478{ \
5479 return -EOPNOTSUPP; \
YueHaibing469956e2020-03-04 15:53:52 +08005480}
5481
Jens Axboe99a10082021-02-19 09:35:19 -07005482IO_NETOP_PREP_ASYNC(sendmsg);
5483IO_NETOP_PREP_ASYNC(recvmsg);
5484IO_NETOP_PREP_ASYNC(connect);
5485IO_NETOP_PREP(accept);
5486IO_NETOP_FN(send);
5487IO_NETOP_FN(recv);
YueHaibing469956e2020-03-04 15:53:52 +08005488#endif /* CONFIG_NET */
Jens Axboe17f2fe32019-10-17 14:42:58 -06005489
Jens Axboed7718a92020-02-14 22:23:12 -07005490struct io_poll_table {
5491 struct poll_table_struct pt;
5492 struct io_kiocb *req;
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005493 int nr_entries;
Jens Axboed7718a92020-02-14 22:23:12 -07005494 int error;
5495};
5496
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005497#define IO_POLL_CANCEL_FLAG BIT(31)
Pavel Begunkov4b702b72022-12-02 14:27:14 +00005498#define IO_POLL_RETRY_FLAG BIT(30)
5499#define IO_POLL_REF_MASK GENMASK(29, 0)
5500
5501/*
5502 * We usually have 1-2 refs taken, 128 is more than enough and we want to
5503 * maximise the margin between this amount and the moment when it overflows.
5504 */
5505#define IO_POLL_REF_BIAS 128
5506
5507static bool io_poll_get_ownership_slowpath(struct io_kiocb *req)
5508{
5509 int v;
5510
5511 /*
5512 * poll_refs are already elevated and we don't have much hope for
5513 * grabbing the ownership. Instead of incrementing set a retry flag
5514 * to notify the loop that there might have been some change.
5515 */
5516 v = atomic_fetch_or(IO_POLL_RETRY_FLAG, &req->poll_refs);
5517 if (v & IO_POLL_REF_MASK)
5518 return false;
5519 return !(atomic_fetch_inc(&req->poll_refs) & IO_POLL_REF_MASK);
5520}
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005521
5522/*
5523 * If refs part of ->poll_refs (see IO_POLL_REF_MASK) is 0, it's free. We can
5524 * bump it and acquire ownership. It's disallowed to modify requests while not
5525 * owning it, that prevents from races for enqueueing task_work's and b/w
5526 * arming poll and wakeups.
5527 */
5528static inline bool io_poll_get_ownership(struct io_kiocb *req)
5529{
Pavel Begunkov4b702b72022-12-02 14:27:14 +00005530 if (unlikely(atomic_read(&req->poll_refs) >= IO_POLL_REF_BIAS))
5531 return io_poll_get_ownership_slowpath(req);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005532 return !(atomic_fetch_inc(&req->poll_refs) & IO_POLL_REF_MASK);
5533}
5534
5535static void io_poll_mark_cancelled(struct io_kiocb *req)
5536{
5537 atomic_or(IO_POLL_CANCEL_FLAG, &req->poll_refs);
5538}
5539
Pavel Begunkova85d7ac2022-08-29 14:30:15 +01005540static struct io_poll_iocb *io_poll_get_double(struct io_kiocb *req)
5541{
5542 /* pure poll stashes this in ->async_data, poll driven retry elsewhere */
5543 if (req->opcode == IORING_OP_POLL_ADD)
5544 return req->async_data;
5545 return req->apoll->double_poll;
5546}
5547
5548static struct io_poll_iocb *io_poll_get_single(struct io_kiocb *req)
5549{
5550 if (req->opcode == IORING_OP_POLL_ADD)
5551 return &req->poll;
5552 return &req->apoll->poll;
5553}
5554
5555static void io_poll_req_insert(struct io_kiocb *req)
5556{
5557 struct io_ring_ctx *ctx = req->ctx;
5558 struct hlist_head *list;
5559
5560 list = &ctx->cancel_hash[hash_long(req->user_data, ctx->cancel_hash_bits)];
5561 hlist_add_head(&req->hash_node, list);
5562}
5563
5564static void io_init_poll_iocb(struct io_poll_iocb *poll, __poll_t events,
5565 wait_queue_func_t wake_func)
5566{
5567 poll->head = NULL;
Pavel Begunkova85d7ac2022-08-29 14:30:15 +01005568#define IO_POLL_UNMASK (EPOLLERR|EPOLLHUP|EPOLLNVAL|EPOLLRDHUP)
5569 /* mask in events that we always want/need */
5570 poll->events = events | IO_POLL_UNMASK;
5571 INIT_LIST_HEAD(&poll->wait.entry);
5572 init_waitqueue_func_entry(&poll->wait, wake_func);
5573}
5574
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005575static inline void io_poll_remove_entry(struct io_poll_iocb *poll)
Jens Axboed7718a92020-02-14 22:23:12 -07005576{
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005577 struct wait_queue_head *head = smp_load_acquire(&poll->head);
Jens Axboed7718a92020-02-14 22:23:12 -07005578
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005579 if (head) {
5580 spin_lock_irq(&head->lock);
5581 list_del_init(&poll->wait.entry);
5582 poll->head = NULL;
5583 spin_unlock_irq(&head->lock);
5584 }
Jens Axboed7718a92020-02-14 22:23:12 -07005585}
5586
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005587static void io_poll_remove_entries(struct io_kiocb *req)
5588{
5589 struct io_poll_iocb *poll = io_poll_get_single(req);
5590 struct io_poll_iocb *poll_double = io_poll_get_double(req);
5591
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005592 /*
5593 * While we hold the waitqueue lock and the waitqueue is nonempty,
5594 * wake_up_pollfree() will wait for us. However, taking the waitqueue
5595 * lock in the first place can race with the waitqueue being freed.
5596 *
5597 * We solve this as eventpoll does: by taking advantage of the fact that
5598 * all users of wake_up_pollfree() will RCU-delay the actual free. If
5599 * we enter rcu_read_lock() and see that the pointer to the queue is
5600 * non-NULL, we can then lock it without the memory being freed out from
5601 * under us.
5602 *
5603 * Keep holding rcu_read_lock() as long as we hold the queue lock, in
5604 * case the caller deletes the entry from the queue, leaving it empty.
5605 * In that case, only RCU prevents the queue memory from being freed.
5606 */
5607 rcu_read_lock();
5608 io_poll_remove_entry(poll);
5609 if (poll_double)
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005610 io_poll_remove_entry(poll_double);
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005611 rcu_read_unlock();
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005612}
5613
5614/*
5615 * All poll tw should go through this. Checks for poll events, manages
5616 * references, does rewait, etc.
5617 *
5618 * Returns a negative error on failure. >0 when no action require, which is
5619 * either spurious wakeup or multishot CQE is served. 0 when it's done with
5620 * the request, then the mask is stored in req->result.
5621 */
5622static int io_poll_check_events(struct io_kiocb *req)
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005623{
5624 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005625 struct io_poll_iocb *poll = io_poll_get_single(req);
5626 int v;
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005627
Jens Axboe316319e2021-08-19 09:41:42 -06005628 /* req->task == current here, checking PF_EXITING is safe */
Pavel Begunkove09ee512021-07-01 13:26:05 +01005629 if (unlikely(req->task->flags & PF_EXITING))
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005630 io_poll_mark_cancelled(req);
Pavel Begunkove09ee512021-07-01 13:26:05 +01005631
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005632 do {
5633 v = atomic_read(&req->poll_refs);
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005634
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005635 /* tw handler should be the owner, and so have some references */
5636 if (WARN_ON_ONCE(!(v & IO_POLL_REF_MASK)))
5637 return 0;
5638 if (v & IO_POLL_CANCEL_FLAG)
5639 return -ECANCELED;
Pavel Begunkovcd1981a2022-12-02 14:27:12 +00005640 /*
5641 * cqe.res contains only events of the first wake up
5642 * and all others are be lost. Redo vfs_poll() to get
5643 * up to date state.
5644 */
5645 if ((v & IO_POLL_REF_MASK) != 1)
5646 req->result = 0;
Pavel Begunkov4b702b72022-12-02 14:27:14 +00005647 if (v & IO_POLL_RETRY_FLAG) {
5648 req->result = 0;
5649 /*
5650 * We won't find new events that came in between
5651 * vfs_poll and the ref put unless we clear the
5652 * flag in advance.
5653 */
5654 atomic_andnot(IO_POLL_RETRY_FLAG, &req->poll_refs);
5655 v &= ~IO_POLL_RETRY_FLAG;
5656 }
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005657
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005658 if (!req->result) {
5659 struct poll_table_struct pt = { ._key = poll->events };
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005660
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005661 req->result = vfs_poll(req->file, &pt) & poll->events;
5662 }
Jens Axboe74ce6ce2020-04-13 11:09:12 -06005663
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005664 /* multishot, just fill an CQE and proceed */
5665 if (req->result && !(poll->events & EPOLLONESHOT)) {
5666 __poll_t mask = mangle_poll(req->result & poll->events);
5667 bool filled;
Jens Axboe18bceab2020-05-15 11:56:54 -06005668
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005669 spin_lock(&ctx->completion_lock);
5670 filled = io_fill_cqe_aux(ctx, req->user_data, mask,
5671 IORING_CQE_F_MORE);
5672 io_commit_cqring(ctx);
5673 spin_unlock(&ctx->completion_lock);
5674 if (unlikely(!filled))
5675 return -ECANCELED;
5676 io_cqring_ev_posted(ctx);
5677 } else if (req->result) {
5678 return 0;
5679 }
Jens Axboe18bceab2020-05-15 11:56:54 -06005680
Pavel Begunkov62321dc2022-12-02 14:27:11 +00005681 /* force the next iteration to vfs_poll() */
5682 req->result = 0;
5683
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005684 /*
5685 * Release all references, retry if someone tried to restart
5686 * task_work while we were executing it.
5687 */
Lin Madf4b1772022-12-02 14:27:15 +00005688 } while (atomic_sub_return(v & IO_POLL_REF_MASK, &req->poll_refs) &
5689 IO_POLL_REF_MASK);
Jens Axboe18bceab2020-05-15 11:56:54 -06005690
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005691 return 1;
Jens Axboe18bceab2020-05-15 11:56:54 -06005692}
5693
Pavel Begunkovf237c302021-08-18 12:42:46 +01005694static void io_poll_task_func(struct io_kiocb *req, bool *locked)
Jens Axboe18bceab2020-05-15 11:56:54 -06005695{
Jens Axboe6d816e02020-08-11 08:04:14 -06005696 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005697 int ret;
Jens Axboe18bceab2020-05-15 11:56:54 -06005698
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005699 ret = io_poll_check_events(req);
5700 if (ret > 0)
5701 return;
5702
5703 if (!ret) {
5704 req->result = mangle_poll(req->result & req->poll.events);
Pavel Begunkovdd221f462020-10-18 10:17:42 +01005705 } else {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005706 req->result = ret;
5707 req_set_fail(req);
Pavel Begunkovdd221f462020-10-18 10:17:42 +01005708 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005709
5710 io_poll_remove_entries(req);
5711 spin_lock(&ctx->completion_lock);
5712 hash_del(&req->hash_node);
5713 spin_unlock(&ctx->completion_lock);
5714 io_req_complete_post(req, req->result, 0);
Jens Axboe18bceab2020-05-15 11:56:54 -06005715}
5716
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005717static void io_apoll_task_func(struct io_kiocb *req, bool *locked)
5718{
5719 struct io_ring_ctx *ctx = req->ctx;
5720 int ret;
5721
5722 ret = io_poll_check_events(req);
5723 if (ret > 0)
5724 return;
5725
Pavel Begunkov1a0aba22023-09-12 15:01:59 +01005726 io_tw_lock(req->ctx, locked);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005727 io_poll_remove_entries(req);
5728 spin_lock(&ctx->completion_lock);
5729 hash_del(&req->hash_node);
5730 spin_unlock(&ctx->completion_lock);
5731
5732 if (!ret)
5733 io_req_task_submit(req, locked);
5734 else
5735 io_req_complete_failed(req, ret);
5736}
5737
5738static void __io_poll_execute(struct io_kiocb *req, int mask)
5739{
5740 req->result = mask;
5741 if (req->opcode == IORING_OP_POLL_ADD)
5742 req->io_task_work.func = io_poll_task_func;
5743 else
5744 req->io_task_work.func = io_apoll_task_func;
5745
5746 trace_io_uring_task_add(req->ctx, req->opcode, req->user_data, mask);
5747 io_req_task_work_add(req);
5748}
5749
5750static inline void io_poll_execute(struct io_kiocb *req, int res)
5751{
5752 if (io_poll_get_ownership(req))
5753 __io_poll_execute(req, res);
5754}
5755
5756static void io_poll_cancel_req(struct io_kiocb *req)
5757{
5758 io_poll_mark_cancelled(req);
5759 /* kick tw, which should complete the request */
5760 io_poll_execute(req, 0);
5761}
5762
5763static int io_poll_wake(struct wait_queue_entry *wait, unsigned mode, int sync,
5764 void *key)
Jens Axboe18bceab2020-05-15 11:56:54 -06005765{
5766 struct io_kiocb *req = wait->private;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005767 struct io_poll_iocb *poll = container_of(wait, struct io_poll_iocb,
5768 wait);
Jens Axboe18bceab2020-05-15 11:56:54 -06005769 __poll_t mask = key_to_poll(key);
5770
Pavel Begunkove9d7ca02022-08-29 14:30:24 +01005771 if (unlikely(mask & POLLFREE)) {
5772 io_poll_mark_cancelled(req);
5773 /* we have to kick tw in case it's not already */
5774 io_poll_execute(req, 0);
5775
5776 /*
5777 * If the waitqueue is being freed early but someone is already
5778 * holds ownership over it, we have to tear down the request as
5779 * best we can. That means immediately removing the request from
5780 * its waitqueue and preventing all further accesses to the
5781 * waitqueue via the request.
5782 */
5783 list_del_init(&poll->wait.entry);
5784
5785 /*
5786 * Careful: this *must* be the last step, since as soon
5787 * as req->head is NULL'ed out, the request can be
5788 * completed and freed, since aio_poll_complete_work()
5789 * will no longer need to take the waitqueue lock.
5790 */
5791 smp_store_release(&poll->head, NULL);
5792 return 1;
5793 }
5794
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005795 /* for instances that support it check for an event match first */
Jens Axboe18bceab2020-05-15 11:56:54 -06005796 if (mask && !(mask & poll->events))
5797 return 0;
5798
Jens Axboeccf06b52022-12-23 07:04:49 -07005799 if (io_poll_get_ownership(req)) {
5800 /*
5801 * If we trigger a multishot poll off our own wakeup path,
5802 * disable multishot as there is a circular dependency between
5803 * CQ posting and triggering the event.
5804 */
5805 if (mask & EPOLL_URING_WAKE)
5806 poll->events |= EPOLLONESHOT;
5807
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005808 __io_poll_execute(req, mask);
Jens Axboeccf06b52022-12-23 07:04:49 -07005809 }
Jens Axboe18bceab2020-05-15 11:56:54 -06005810 return 1;
5811}
5812
Jens Axboe18bceab2020-05-15 11:56:54 -06005813static void __io_queue_proc(struct io_poll_iocb *poll, struct io_poll_table *pt,
Jens Axboe807abcb2020-07-17 17:09:27 -06005814 struct wait_queue_head *head,
5815 struct io_poll_iocb **poll_ptr)
Jens Axboe18bceab2020-05-15 11:56:54 -06005816{
5817 struct io_kiocb *req = pt->req;
5818
5819 /*
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005820 * The file being polled uses multiple waitqueues for poll handling
5821 * (e.g. one for read, one for write). Setup a separate io_poll_iocb
5822 * if this happens.
Jens Axboe18bceab2020-05-15 11:56:54 -06005823 */
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005824 if (unlikely(pt->nr_entries)) {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005825 struct io_poll_iocb *first = poll;
Pavel Begunkov58852d42020-10-16 20:55:56 +01005826
Pavel Begunkov23a65db2021-08-17 20:28:11 +01005827 /* double add on the same waitqueue head, ignore */
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005828 if (first->head == head)
Pavel Begunkov23a65db2021-08-17 20:28:11 +01005829 return;
Jens Axboe18bceab2020-05-15 11:56:54 -06005830 /* already have a 2nd entry, fail a third attempt */
Jens Axboe807abcb2020-07-17 17:09:27 -06005831 if (*poll_ptr) {
Pavel Begunkov23a65db2021-08-17 20:28:11 +01005832 if ((*poll_ptr)->head == head)
5833 return;
Jens Axboe18bceab2020-05-15 11:56:54 -06005834 pt->error = -EINVAL;
5835 return;
5836 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005837
Jens Axboe18bceab2020-05-15 11:56:54 -06005838 poll = kmalloc(sizeof(*poll), GFP_ATOMIC);
5839 if (!poll) {
5840 pt->error = -ENOMEM;
5841 return;
5842 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005843 io_init_poll_iocb(poll, first->events, first->wait.func);
Jens Axboe807abcb2020-07-17 17:09:27 -06005844 *poll_ptr = poll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005845 }
5846
Pavel Begunkov68b11e82021-07-20 10:50:43 +01005847 pt->nr_entries++;
Jens Axboe18bceab2020-05-15 11:56:54 -06005848 poll->head = head;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005849 poll->wait.private = req;
Jiufei Xuea31eb4a2020-06-17 17:53:56 +08005850
5851 if (poll->events & EPOLLEXCLUSIVE)
5852 add_wait_queue_exclusive(head, &poll->wait);
5853 else
5854 add_wait_queue(head, &poll->wait);
Jens Axboe18bceab2020-05-15 11:56:54 -06005855}
5856
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005857static void io_poll_queue_proc(struct file *file, struct wait_queue_head *head,
5858 struct poll_table_struct *p)
5859{
5860 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
5861
5862 __io_queue_proc(&pt->req->poll, pt, head,
5863 (struct io_poll_iocb **) &pt->req->async_data);
5864}
5865
5866static int __io_arm_poll_handler(struct io_kiocb *req,
5867 struct io_poll_iocb *poll,
5868 struct io_poll_table *ipt, __poll_t mask)
5869{
5870 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005871
5872 INIT_HLIST_NODE(&req->hash_node);
5873 io_init_poll_iocb(poll, mask, io_poll_wake);
5874 poll->file = req->file;
5875 poll->wait.private = req;
5876
5877 ipt->pt._key = mask;
5878 ipt->req = req;
5879 ipt->error = 0;
5880 ipt->nr_entries = 0;
5881
5882 /*
5883 * Take the ownership to delay any tw execution up until we're done
5884 * with poll arming. see io_poll_get_ownership().
5885 */
5886 atomic_set(&req->poll_refs, 1);
5887 mask = vfs_poll(req->file, &ipt->pt) & poll->events;
5888
5889 if (mask && (poll->events & EPOLLONESHOT)) {
5890 io_poll_remove_entries(req);
5891 /* no one else has access to the req, forget about the ref */
5892 return mask;
5893 }
5894 if (!mask && unlikely(ipt->error || !ipt->nr_entries)) {
5895 io_poll_remove_entries(req);
5896 if (!ipt->error)
5897 ipt->error = -EINVAL;
5898 return 0;
5899 }
5900
5901 spin_lock(&ctx->completion_lock);
5902 io_poll_req_insert(req);
5903 spin_unlock(&ctx->completion_lock);
5904
5905 if (mask) {
5906 /* can't multishot if failed, just queue the event we've got */
Pavel Begunkov182dc3a2022-08-29 14:30:23 +01005907 if (unlikely(ipt->error || !ipt->nr_entries)) {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005908 poll->events |= EPOLLONESHOT;
Pavel Begunkov182dc3a2022-08-29 14:30:23 +01005909 ipt->error = 0;
5910 }
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005911 __io_poll_execute(req, mask);
5912 return 0;
5913 }
5914
5915 /*
Pavel Begunkov1d588492022-12-02 14:27:13 +00005916 * Try to release ownership. If we see a change of state, e.g.
5917 * poll was waken up, queue up a tw, it'll deal with it.
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005918 */
Pavel Begunkov1d588492022-12-02 14:27:13 +00005919 if (atomic_cmpxchg(&req->poll_refs, 1, 0) != 1)
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005920 __io_poll_execute(req, 0);
5921 return 0;
5922}
5923
Jens Axboe18bceab2020-05-15 11:56:54 -06005924static void io_async_queue_proc(struct file *file, struct wait_queue_head *head,
5925 struct poll_table_struct *p)
5926{
5927 struct io_poll_table *pt = container_of(p, struct io_poll_table, pt);
Jens Axboe807abcb2020-07-17 17:09:27 -06005928 struct async_poll *apoll = pt->req->apoll;
Jens Axboe18bceab2020-05-15 11:56:54 -06005929
Jens Axboe807abcb2020-07-17 17:09:27 -06005930 __io_queue_proc(&apoll->poll, pt, head, &apoll->double_poll);
Jens Axboe18bceab2020-05-15 11:56:54 -06005931}
5932
Olivier Langlois59b735a2021-06-22 05:17:39 -07005933enum {
5934 IO_APOLL_OK,
5935 IO_APOLL_ABORTED,
5936 IO_APOLL_READY
5937};
5938
Jens Axboe345fb362023-03-06 13:28:57 -07005939/*
5940 * We can't reliably detect loops in repeated poll triggers and issue
5941 * subsequently failing. But rather than fail these immediately, allow a
5942 * certain amount of retries before we give up. Given that this condition
5943 * should _rarely_ trigger even once, we should be fine with a larger value.
5944 */
5945#define APOLL_MAX_RETRY 128
5946
Olivier Langlois59b735a2021-06-22 05:17:39 -07005947static int io_arm_poll_handler(struct io_kiocb *req)
Jens Axboed7718a92020-02-14 22:23:12 -07005948{
5949 const struct io_op_def *def = &io_op_defs[req->opcode];
5950 struct io_ring_ctx *ctx = req->ctx;
5951 struct async_poll *apoll;
5952 struct io_poll_table ipt;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005953 __poll_t mask = EPOLLONESHOT | POLLERR | POLLPRI;
5954 int ret;
Jens Axboed7718a92020-02-14 22:23:12 -07005955
5956 if (!req->file || !file_can_poll(req->file))
Olivier Langlois59b735a2021-06-22 05:17:39 -07005957 return IO_APOLL_ABORTED;
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005958 if (!def->pollin && !def->pollout)
Olivier Langlois59b735a2021-06-22 05:17:39 -07005959 return IO_APOLL_ABORTED;
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005960
5961 if (def->pollin) {
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005962 mask |= POLLIN | POLLRDNORM;
5963
5964 /* If reading from MSG_ERRQUEUE using recvmsg, ignore POLLIN */
5965 if ((req->opcode == IORING_OP_RECVMSG) &&
5966 (req->sr_msg.msg_flags & MSG_ERRQUEUE))
5967 mask &= ~POLLIN;
5968 } else {
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005969 mask |= POLLOUT | POLLWRNORM;
5970 }
5971
Pavel Begunkov124fb132023-01-22 10:24:20 -07005972 if (req->flags & REQ_F_POLLED) {
Jens Axboea79b13f2023-01-21 10:39:22 -07005973 apoll = req->apoll;
Pavel Begunkov124fb132023-01-22 10:24:20 -07005974 kfree(apoll->double_poll);
Jens Axboe345fb362023-03-06 13:28:57 -07005975 if (unlikely(!--apoll->poll.retries)) {
5976 apoll->double_poll = NULL;
5977 return IO_APOLL_ABORTED;
5978 }
Pavel Begunkov124fb132023-01-22 10:24:20 -07005979 } else {
Jens Axboea79b13f2023-01-21 10:39:22 -07005980 apoll = kmalloc(sizeof(*apoll), GFP_ATOMIC);
Fedor Pchelkinf4ba5542023-03-16 21:56:16 +03005981 if (unlikely(!apoll))
5982 return IO_APOLL_ABORTED;
Jens Axboe345fb362023-03-06 13:28:57 -07005983 apoll->poll.retries = APOLL_MAX_RETRY;
Pavel Begunkov124fb132023-01-22 10:24:20 -07005984 }
Jens Axboe807abcb2020-07-17 17:09:27 -06005985 apoll->double_poll = NULL;
Jens Axboed7718a92020-02-14 22:23:12 -07005986 req->apoll = apoll;
Pavel Begunkovb2d9c3d2021-06-26 21:40:44 +01005987 req->flags |= REQ_F_POLLED;
Jens Axboed7718a92020-02-14 22:23:12 -07005988 ipt.pt._qproc = io_async_queue_proc;
5989
Pavel Begunkovf770fba2022-08-29 14:30:18 +01005990 ret = __io_arm_poll_handler(req, &apoll->poll, &ipt, mask);
Hao Xu41a51692021-08-12 15:47:02 +08005991 if (ret || ipt.error)
5992 return ret ? IO_APOLL_READY : IO_APOLL_ABORTED;
5993
Olivier Langlois236daeae2021-05-31 02:36:37 -04005994 trace_io_uring_poll_arm(ctx, req, req->opcode, req->user_data,
5995 mask, apoll->poll.events);
Olivier Langlois59b735a2021-06-22 05:17:39 -07005996 return IO_APOLL_OK;
Jens Axboed7718a92020-02-14 22:23:12 -07005997}
5998
Jens Axboe76e1b642020-09-26 15:05:03 -06005999/*
6000 * Returns true if we found and killed one or more poll requests
6001 */
Pavel Begunkov6b819282020-11-06 13:00:25 +00006002static bool io_poll_remove_all(struct io_ring_ctx *ctx, struct task_struct *tsk,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01006003 bool cancel_all)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006004{
Jens Axboe78076bb2019-12-04 19:56:40 -07006005 struct hlist_node *tmp;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006006 struct io_kiocb *req;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006007 bool found = false;
6008 int i;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006009
Jens Axboe79ebeae2021-08-10 15:18:27 -06006010 spin_lock(&ctx->completion_lock);
Jens Axboe78076bb2019-12-04 19:56:40 -07006011 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
6012 struct hlist_head *list;
6013
6014 list = &ctx->cancel_hash[i];
Jens Axboef3606e32020-09-22 08:18:24 -06006015 hlist_for_each_entry_safe(req, tmp, list, hash_node) {
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006016 if (io_match_task_safe(req, tsk, cancel_all)) {
Jens Axboe7524ec52022-08-29 14:30:20 +01006017 hlist_del_init(&req->hash_node);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006018 io_poll_cancel_req(req);
6019 found = true;
6020 }
Jens Axboef3606e32020-09-22 08:18:24 -06006021 }
Jens Axboe221c5eb2019-01-17 09:41:58 -07006022 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06006023 spin_unlock(&ctx->completion_lock);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006024 return found;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006025}
6026
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01006027static struct io_kiocb *io_poll_find(struct io_ring_ctx *ctx, __u64 sqe_addr,
6028 bool poll_only)
Pavel Begunkove07785b2021-04-01 15:43:57 +01006029 __must_hold(&ctx->completion_lock)
Jens Axboe47f46762019-11-09 17:43:02 -07006030{
Jens Axboe78076bb2019-12-04 19:56:40 -07006031 struct hlist_head *list;
Jens Axboe47f46762019-11-09 17:43:02 -07006032 struct io_kiocb *req;
6033
Jens Axboe78076bb2019-12-04 19:56:40 -07006034 list = &ctx->cancel_hash[hash_long(sqe_addr, ctx->cancel_hash_bits)];
6035 hlist_for_each_entry(req, list, hash_node) {
Jens Axboeb41e9852020-02-17 09:52:41 -07006036 if (sqe_addr != req->user_data)
6037 continue;
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01006038 if (poll_only && req->opcode != IORING_OP_POLL_ADD)
6039 continue;
Jens Axboeb2cb8052021-03-17 08:17:19 -06006040 return req;
Jens Axboe47f46762019-11-09 17:43:02 -07006041 }
Jens Axboeb2cb8052021-03-17 08:17:19 -06006042 return NULL;
Jens Axboe47f46762019-11-09 17:43:02 -07006043}
6044
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006045static bool io_poll_disarm(struct io_kiocb *req)
6046 __must_hold(&ctx->completion_lock)
6047{
6048 if (!io_poll_get_ownership(req))
6049 return false;
6050 io_poll_remove_entries(req);
6051 hash_del(&req->hash_node);
6052 return true;
6053}
6054
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01006055static int io_poll_cancel(struct io_ring_ctx *ctx, __u64 sqe_addr,
6056 bool poll_only)
Pavel Begunkove07785b2021-04-01 15:43:57 +01006057 __must_hold(&ctx->completion_lock)
Jens Axboeb2cb8052021-03-17 08:17:19 -06006058{
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006059 struct io_kiocb *req = io_poll_find(ctx, sqe_addr, poll_only);
Jens Axboeb2cb8052021-03-17 08:17:19 -06006060
Jens Axboeb2cb8052021-03-17 08:17:19 -06006061 if (!req)
6062 return -ENOENT;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006063 io_poll_cancel_req(req);
6064 return 0;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006065}
6066
Pavel Begunkov9096af32021-04-14 13:38:36 +01006067static __poll_t io_poll_parse_events(const struct io_uring_sqe *sqe,
6068 unsigned int flags)
6069{
6070 u32 events;
6071
6072 events = READ_ONCE(sqe->poll32_events);
6073#ifdef __BIG_ENDIAN
6074 events = swahw32(events);
6075#endif
6076 if (!(flags & IORING_POLL_ADD_MULTI))
6077 events |= EPOLLONESHOT;
6078 return demangle_poll(events) | (events & (EPOLLEXCLUSIVE|EPOLLONESHOT));
6079}
6080
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006081static int io_poll_update_prep(struct io_kiocb *req,
Jens Axboe3529d8c2019-12-19 18:24:38 -07006082 const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006083{
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006084 struct io_poll_update *upd = &req->poll_update;
6085 u32 flags;
6086
Jens Axboe221c5eb2019-01-17 09:41:58 -07006087 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
6088 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006089 if (sqe->ioprio || sqe->buf_index || sqe->splice_fd_in)
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006090 return -EINVAL;
6091 flags = READ_ONCE(sqe->len);
6092 if (flags & ~(IORING_POLL_UPDATE_EVENTS | IORING_POLL_UPDATE_USER_DATA |
6093 IORING_POLL_ADD_MULTI))
6094 return -EINVAL;
6095 /* meaningless without update */
6096 if (flags == IORING_POLL_ADD_MULTI)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006097 return -EINVAL;
6098
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006099 upd->old_user_data = READ_ONCE(sqe->addr);
6100 upd->update_events = flags & IORING_POLL_UPDATE_EVENTS;
6101 upd->update_user_data = flags & IORING_POLL_UPDATE_USER_DATA;
Jens Axboe0969e782019-12-17 18:40:57 -07006102
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006103 upd->new_user_data = READ_ONCE(sqe->off);
6104 if (!upd->update_user_data && upd->new_user_data)
6105 return -EINVAL;
6106 if (upd->update_events)
6107 upd->events = io_poll_parse_events(sqe, flags);
6108 else if (sqe->poll32_events)
6109 return -EINVAL;
Jens Axboe0969e782019-12-17 18:40:57 -07006110
Jens Axboe221c5eb2019-01-17 09:41:58 -07006111 return 0;
6112}
6113
Jens Axboe3529d8c2019-12-19 18:24:38 -07006114static int io_poll_add_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006115{
6116 struct io_poll_iocb *poll = &req->poll;
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006117 u32 flags;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006118
6119 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
6120 return -EINVAL;
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006121 if (sqe->ioprio || sqe->buf_index || sqe->off || sqe->addr)
Jens Axboe88e41cf2021-02-22 22:08:01 -07006122 return -EINVAL;
6123 flags = READ_ONCE(sqe->len);
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006124 if (flags & ~IORING_POLL_ADD_MULTI)
Jens Axboe221c5eb2019-01-17 09:41:58 -07006125 return -EINVAL;
6126
Pavel Begunkov48dcd382021-08-15 10:40:18 +01006127 io_req_set_refcount(req);
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006128 poll->events = io_poll_parse_events(sqe, flags);
Jens Axboe0969e782019-12-17 18:40:57 -07006129 return 0;
6130}
6131
Pavel Begunkov61e98202021-02-10 00:03:08 +00006132static int io_poll_add(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe0969e782019-12-17 18:40:57 -07006133{
6134 struct io_poll_iocb *poll = &req->poll;
Jens Axboe0969e782019-12-17 18:40:57 -07006135 struct io_poll_table ipt;
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006136 int ret;
Jens Axboe0969e782019-12-17 18:40:57 -07006137
Jens Axboed7718a92020-02-14 22:23:12 -07006138 ipt.pt._qproc = io_poll_queue_proc;
Jens Axboe36703242019-07-25 10:20:18 -06006139
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006140 ret = __io_arm_poll_handler(req, &req->poll, &ipt, poll->events);
Pavel Begunkov6c7259c2022-08-29 14:30:22 +01006141 if (!ret && ipt.error)
6142 req_set_fail(req);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006143 ret = ret ?: ipt.error;
6144 if (ret)
6145 __io_req_complete(req, issue_flags, ret, 0);
6146 return 0;
Jens Axboe221c5eb2019-01-17 09:41:58 -07006147}
6148
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006149static int io_poll_update(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeb69de282021-03-17 08:37:41 -06006150{
6151 struct io_ring_ctx *ctx = req->ctx;
6152 struct io_kiocb *preq;
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006153 int ret2, ret = 0;
Jens Axboeb69de282021-03-17 08:37:41 -06006154
Jens Axboe0e388fc2023-06-16 21:12:06 -06006155 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
6156
Jens Axboe79ebeae2021-08-10 15:18:27 -06006157 spin_lock(&ctx->completion_lock);
Pavel Begunkov9ba5fac2021-04-14 13:38:35 +01006158 preq = io_poll_find(ctx, req->poll_update.old_user_data, true);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006159 if (!preq || !io_poll_disarm(preq)) {
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006160 spin_unlock(&ctx->completion_lock);
Pavel Begunkovf770fba2022-08-29 14:30:18 +01006161 ret = preq ? -EALREADY : -ENOENT;
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006162 goto out;
Jens Axboeb69de282021-03-17 08:37:41 -06006163 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06006164 spin_unlock(&ctx->completion_lock);
Jens Axboecb3b200e2021-04-06 09:49:31 -06006165
Pavel Begunkov040e58f2022-08-29 14:30:14 +01006166 if (req->poll_update.update_events || req->poll_update.update_user_data) {
6167 /* only mask one event flags, keep behavior flags */
6168 if (req->poll_update.update_events) {
6169 preq->poll.events &= ~0xffff;
6170 preq->poll.events |= req->poll_update.events & 0xffff;
6171 preq->poll.events |= IO_POLL_UNMASK;
6172 }
6173 if (req->poll_update.update_user_data)
6174 preq->user_data = req->poll_update.new_user_data;
6175
6176 ret2 = io_poll_add(preq, issue_flags);
6177 /* successfully updated, don't complete poll request */
6178 if (!ret2)
6179 goto out;
6180 }
6181 req_set_fail(preq);
6182 io_req_complete(preq, -ECANCELED);
6183out:
6184 if (ret < 0)
6185 req_set_fail(req);
Jens Axboeb69de282021-03-17 08:37:41 -06006186 /* complete update request, we're done with it */
6187 io_req_complete(req, ret);
Jens Axboe0e388fc2023-06-16 21:12:06 -06006188 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Jens Axboeb69de282021-03-17 08:37:41 -06006189 return 0;
6190}
6191
Pavel Begunkovf237c302021-08-18 12:42:46 +01006192static void io_req_task_timeout(struct io_kiocb *req, bool *locked)
Jens Axboe89850fc2021-08-10 15:11:51 -06006193{
Jens Axboe89850fc2021-08-10 15:11:51 -06006194 req_set_fail(req);
Pavel Begunkov505657b2021-08-17 20:28:09 +01006195 io_req_complete_post(req, -ETIME, 0);
Jens Axboe89850fc2021-08-10 15:11:51 -06006196}
6197
Jens Axboe5262f562019-09-17 12:26:57 -06006198static enum hrtimer_restart io_timeout_fn(struct hrtimer *timer)
6199{
Jens Axboead8a48a2019-11-15 08:49:11 -07006200 struct io_timeout_data *data = container_of(timer,
6201 struct io_timeout_data, timer);
6202 struct io_kiocb *req = data->req;
6203 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5262f562019-09-17 12:26:57 -06006204 unsigned long flags;
6205
Jens Axboe89850fc2021-08-10 15:11:51 -06006206 spin_lock_irqsave(&ctx->timeout_lock, flags);
Pavel Begunkova71976f2020-10-10 18:34:11 +01006207 list_del_init(&req->timeout.list);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03006208 atomic_set(&req->ctx->cq_timeouts,
6209 atomic_read(&req->ctx->cq_timeouts) + 1);
Jens Axboe89850fc2021-08-10 15:11:51 -06006210 spin_unlock_irqrestore(&ctx->timeout_lock, flags);
Pavel Begunkov01cec8c2020-07-30 18:43:50 +03006211
Jens Axboe89850fc2021-08-10 15:11:51 -06006212 req->io_task_work.func = io_req_task_timeout;
6213 io_req_task_work_add(req);
Jens Axboe5262f562019-09-17 12:26:57 -06006214 return HRTIMER_NORESTART;
6215}
6216
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006217static struct io_kiocb *io_timeout_extract(struct io_ring_ctx *ctx,
6218 __u64 user_data)
Jens Axboe89850fc2021-08-10 15:11:51 -06006219 __must_hold(&ctx->timeout_lock)
Jens Axboe47f46762019-11-09 17:43:02 -07006220{
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006221 struct io_timeout_data *io;
Jens Axboef254ac02020-08-12 17:33:30 -06006222 struct io_kiocb *req;
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006223 bool found = false;
Jens Axboef254ac02020-08-12 17:33:30 -06006224
6225 list_for_each_entry(req, &ctx->timeout_list, timeout.list) {
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006226 found = user_data == req->user_data;
6227 if (found)
Jens Axboef254ac02020-08-12 17:33:30 -06006228 break;
Jens Axboef254ac02020-08-12 17:33:30 -06006229 }
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006230 if (!found)
6231 return ERR_PTR(-ENOENT);
Jens Axboef254ac02020-08-12 17:33:30 -06006232
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006233 io = req->async_data;
Pavel Begunkovfd9c7bc2021-04-13 02:58:42 +01006234 if (hrtimer_try_to_cancel(&io->timer) == -1)
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006235 return ERR_PTR(-EALREADY);
6236 list_del_init(&req->timeout.list);
6237 return req;
6238}
6239
6240static int io_timeout_cancel(struct io_ring_ctx *ctx, __u64 user_data)
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006241 __must_hold(&ctx->completion_lock)
Jens Axboe89850fc2021-08-10 15:11:51 -06006242 __must_hold(&ctx->timeout_lock)
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006243{
6244 struct io_kiocb *req = io_timeout_extract(ctx, user_data);
6245
6246 if (IS_ERR(req))
6247 return PTR_ERR(req);
6248
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006249 req_set_fail(req);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01006250 io_fill_cqe_req(req, -ECANCELED, 0);
Pavel Begunkov91c2f692021-08-11 19:28:28 +01006251 io_put_req_deferred(req);
Pavel Begunkovfbd15842020-11-30 19:11:15 +00006252 return 0;
Jens Axboef254ac02020-08-12 17:33:30 -06006253}
6254
Jens Axboe50c1df22021-08-27 17:11:06 -06006255static clockid_t io_timeout_get_clock(struct io_timeout_data *data)
6256{
6257 switch (data->flags & IORING_TIMEOUT_CLOCK_MASK) {
6258 case IORING_TIMEOUT_BOOTTIME:
6259 return CLOCK_BOOTTIME;
6260 case IORING_TIMEOUT_REALTIME:
6261 return CLOCK_REALTIME;
6262 default:
6263 /* can't happen, vetted at prep time */
6264 WARN_ON_ONCE(1);
6265 fallthrough;
6266 case 0:
6267 return CLOCK_MONOTONIC;
6268 }
6269}
6270
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006271static int io_linked_timeout_update(struct io_ring_ctx *ctx, __u64 user_data,
6272 struct timespec64 *ts, enum hrtimer_mode mode)
6273 __must_hold(&ctx->timeout_lock)
6274{
6275 struct io_timeout_data *io;
6276 struct io_kiocb *req;
6277 bool found = false;
6278
6279 list_for_each_entry(req, &ctx->ltimeout_list, timeout.list) {
6280 found = user_data == req->user_data;
6281 if (found)
6282 break;
6283 }
6284 if (!found)
6285 return -ENOENT;
6286
6287 io = req->async_data;
6288 if (hrtimer_try_to_cancel(&io->timer) == -1)
6289 return -EALREADY;
6290 hrtimer_init(&io->timer, io_timeout_get_clock(io), mode);
6291 io->timer.function = io_link_timeout_fn;
6292 hrtimer_start(&io->timer, timespec64_to_ktime(*ts), mode);
6293 return 0;
6294}
6295
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006296static int io_timeout_update(struct io_ring_ctx *ctx, __u64 user_data,
6297 struct timespec64 *ts, enum hrtimer_mode mode)
Jens Axboe89850fc2021-08-10 15:11:51 -06006298 __must_hold(&ctx->timeout_lock)
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006299{
6300 struct io_kiocb *req = io_timeout_extract(ctx, user_data);
6301 struct io_timeout_data *data;
6302
6303 if (IS_ERR(req))
6304 return PTR_ERR(req);
6305
6306 req->timeout.off = 0; /* noseq */
6307 data = req->async_data;
6308 list_add_tail(&req->timeout.list, &ctx->timeout_list);
Jens Axboe50c1df22021-08-27 17:11:06 -06006309 hrtimer_init(&data->timer, io_timeout_get_clock(data), mode);
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006310 data->timer.function = io_timeout_fn;
6311 hrtimer_start(&data->timer, timespec64_to_ktime(*ts), mode);
6312 return 0;
Jens Axboe47f46762019-11-09 17:43:02 -07006313}
6314
Jens Axboe3529d8c2019-12-19 18:24:38 -07006315static int io_timeout_remove_prep(struct io_kiocb *req,
6316 const struct io_uring_sqe *sqe)
Jens Axboeb29472e2019-12-17 18:50:29 -07006317{
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006318 struct io_timeout_rem *tr = &req->timeout_rem;
6319
Jens Axboeb29472e2019-12-17 18:50:29 -07006320 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
6321 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06006322 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
6323 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006324 if (sqe->ioprio || sqe->buf_index || sqe->len || sqe->splice_fd_in)
Jens Axboeb29472e2019-12-17 18:50:29 -07006325 return -EINVAL;
6326
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006327 tr->ltimeout = false;
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006328 tr->addr = READ_ONCE(sqe->addr);
6329 tr->flags = READ_ONCE(sqe->timeout_flags);
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006330 if (tr->flags & IORING_TIMEOUT_UPDATE_MASK) {
6331 if (hweight32(tr->flags & IORING_TIMEOUT_CLOCK_MASK) > 1)
6332 return -EINVAL;
6333 if (tr->flags & IORING_LINK_TIMEOUT_UPDATE)
6334 tr->ltimeout = true;
6335 if (tr->flags & ~(IORING_TIMEOUT_UPDATE_MASK|IORING_TIMEOUT_ABS))
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006336 return -EINVAL;
6337 if (get_timespec64(&tr->ts, u64_to_user_ptr(sqe->addr2)))
6338 return -EFAULT;
6339 } else if (tr->flags) {
6340 /* timeout removal doesn't support flags */
6341 return -EINVAL;
6342 }
6343
Jens Axboeb29472e2019-12-17 18:50:29 -07006344 return 0;
6345}
6346
Pavel Begunkov8662dae2021-01-19 13:32:44 +00006347static inline enum hrtimer_mode io_translate_timeout_mode(unsigned int flags)
6348{
6349 return (flags & IORING_TIMEOUT_ABS) ? HRTIMER_MODE_ABS
6350 : HRTIMER_MODE_REL;
6351}
6352
Jens Axboe11365042019-10-16 09:08:32 -06006353/*
6354 * Remove or update an existing timeout command
6355 */
Pavel Begunkov61e98202021-02-10 00:03:08 +00006356static int io_timeout_remove(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe11365042019-10-16 09:08:32 -06006357{
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006358 struct io_timeout_rem *tr = &req->timeout_rem;
Jens Axboe11365042019-10-16 09:08:32 -06006359 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe47f46762019-11-09 17:43:02 -07006360 int ret;
Jens Axboe11365042019-10-16 09:08:32 -06006361
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006362 if (!(req->timeout_rem.flags & IORING_TIMEOUT_UPDATE)) {
6363 spin_lock(&ctx->completion_lock);
6364 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov9c8e11b2020-11-30 19:11:16 +00006365 ret = io_timeout_cancel(ctx, tr->addr);
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006366 spin_unlock_irq(&ctx->timeout_lock);
6367 spin_unlock(&ctx->completion_lock);
6368 } else {
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006369 enum hrtimer_mode mode = io_translate_timeout_mode(tr->flags);
6370
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006371 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkovf1042b62021-08-28 19:54:39 -06006372 if (tr->ltimeout)
6373 ret = io_linked_timeout_update(ctx, tr->addr, &tr->ts, mode);
6374 else
6375 ret = io_timeout_update(ctx, tr->addr, &tr->ts, mode);
Pavel Begunkovec3c3d02021-08-18 10:50:52 +01006376 spin_unlock_irq(&ctx->timeout_lock);
6377 }
Jens Axboe11365042019-10-16 09:08:32 -06006378
Jens Axboe4e88d6e2019-12-07 20:59:47 -07006379 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006380 req_set_fail(req);
Pavel Begunkov505657b2021-08-17 20:28:09 +01006381 io_req_complete_post(req, ret, 0);
Jens Axboe11365042019-10-16 09:08:32 -06006382 return 0;
Jens Axboe5262f562019-09-17 12:26:57 -06006383}
6384
Jens Axboe3529d8c2019-12-19 18:24:38 -07006385static int io_timeout_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe,
Jens Axboe2d283902019-12-04 11:08:05 -07006386 bool is_timeout_link)
Jens Axboe5262f562019-09-17 12:26:57 -06006387{
Jens Axboead8a48a2019-11-15 08:49:11 -07006388 struct io_timeout_data *data;
Jens Axboea41525a2019-10-15 16:48:15 -06006389 unsigned flags;
Pavel Begunkov56080b02020-05-26 20:34:04 +03006390 u32 off = READ_ONCE(sqe->off);
Jens Axboe5262f562019-09-17 12:26:57 -06006391
Jens Axboead8a48a2019-11-15 08:49:11 -07006392 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe5262f562019-09-17 12:26:57 -06006393 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006394 if (sqe->ioprio || sqe->buf_index || sqe->len != 1 ||
6395 sqe->splice_fd_in)
Jens Axboea41525a2019-10-15 16:48:15 -06006396 return -EINVAL;
Pavel Begunkov56080b02020-05-26 20:34:04 +03006397 if (off && is_timeout_link)
Jens Axboe2d283902019-12-04 11:08:05 -07006398 return -EINVAL;
Jens Axboea41525a2019-10-15 16:48:15 -06006399 flags = READ_ONCE(sqe->timeout_flags);
Jens Axboe50c1df22021-08-27 17:11:06 -06006400 if (flags & ~(IORING_TIMEOUT_ABS | IORING_TIMEOUT_CLOCK_MASK))
6401 return -EINVAL;
6402 /* more than one clock specified is invalid, obviously */
6403 if (hweight32(flags & IORING_TIMEOUT_CLOCK_MASK) > 1)
Jens Axboe5262f562019-09-17 12:26:57 -06006404 return -EINVAL;
Arnd Bergmannbdf20072019-10-01 09:53:29 -06006405
Pavel Begunkovef9dd632021-08-28 19:54:38 -06006406 INIT_LIST_HEAD(&req->timeout.list);
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006407 req->timeout.off = off;
Pavel Begunkovf18ee4c2021-06-14 23:37:25 +01006408 if (unlikely(off && !req->ctx->off_timeout_used))
6409 req->ctx->off_timeout_used = true;
Jens Axboe26a61672019-12-20 09:02:01 -07006410
Jens Axboee8c2bc12020-08-15 18:44:09 -07006411 if (!req->async_data && io_alloc_async_data(req))
Jens Axboe26a61672019-12-20 09:02:01 -07006412 return -ENOMEM;
6413
Jens Axboee8c2bc12020-08-15 18:44:09 -07006414 data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07006415 data->req = req;
Jens Axboe50c1df22021-08-27 17:11:06 -06006416 data->flags = flags;
Jens Axboead8a48a2019-11-15 08:49:11 -07006417
6418 if (get_timespec64(&data->ts, u64_to_user_ptr(sqe->addr)))
Jens Axboe5262f562019-09-17 12:26:57 -06006419 return -EFAULT;
6420
Jens Axboeba7261a2022-04-08 11:08:58 -06006421 INIT_LIST_HEAD(&req->timeout.list);
Pavel Begunkov8662dae2021-01-19 13:32:44 +00006422 data->mode = io_translate_timeout_mode(flags);
Jens Axboe50c1df22021-08-27 17:11:06 -06006423 hrtimer_init(&data->timer, io_timeout_get_clock(data), data->mode);
Pavel Begunkovb97e7362021-08-15 10:40:23 +01006424
6425 if (is_timeout_link) {
6426 struct io_submit_link *link = &req->ctx->submit_state.link;
6427
6428 if (!link->head)
6429 return -EINVAL;
6430 if (link->last->opcode == IORING_OP_LINK_TIMEOUT)
6431 return -EINVAL;
Pavel Begunkov4d13d1a2021-08-15 10:40:24 +01006432 req->timeout.head = link->last;
6433 link->last->flags |= REQ_F_ARM_LTIMEOUT;
Pavel Begunkovb97e7362021-08-15 10:40:23 +01006434 }
Jens Axboead8a48a2019-11-15 08:49:11 -07006435 return 0;
6436}
6437
Pavel Begunkov61e98202021-02-10 00:03:08 +00006438static int io_timeout(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboead8a48a2019-11-15 08:49:11 -07006439{
Jens Axboead8a48a2019-11-15 08:49:11 -07006440 struct io_ring_ctx *ctx = req->ctx;
Jens Axboee8c2bc12020-08-15 18:44:09 -07006441 struct io_timeout_data *data = req->async_data;
Jens Axboead8a48a2019-11-15 08:49:11 -07006442 struct list_head *entry;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006443 u32 tail, off = req->timeout.off;
Jens Axboead8a48a2019-11-15 08:49:11 -07006444
Jens Axboe89850fc2021-08-10 15:11:51 -06006445 spin_lock_irq(&ctx->timeout_lock);
Jens Axboe93bd25b2019-11-11 23:34:31 -07006446
Jens Axboe5262f562019-09-17 12:26:57 -06006447 /*
6448 * sqe->off holds how many events that need to occur for this
Jens Axboe93bd25b2019-11-11 23:34:31 -07006449 * timeout event to be satisfied. If it isn't set, then this is
6450 * a pure timeout request, sequence isn't used.
Jens Axboe5262f562019-09-17 12:26:57 -06006451 */
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03006452 if (io_is_timeout_noseq(req)) {
Jens Axboe93bd25b2019-11-11 23:34:31 -07006453 entry = ctx->timeout_list.prev;
6454 goto add;
6455 }
Jens Axboe5262f562019-09-17 12:26:57 -06006456
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006457 tail = ctx->cached_cq_tail - atomic_read(&ctx->cq_timeouts);
6458 req->timeout.target_seq = tail + off;
Jens Axboe5262f562019-09-17 12:26:57 -06006459
Marcelo Diop-Gonzalezf0105052021-01-15 11:54:40 -05006460 /* Update the last seq here in case io_flush_timeouts() hasn't.
6461 * This is safe because ->completion_lock is held, and submissions
6462 * and completions are never mixed in the same ->completion_lock section.
6463 */
6464 ctx->cq_last_tm_flush = tail;
6465
Jens Axboe5262f562019-09-17 12:26:57 -06006466 /*
6467 * Insertion sort, ensuring the first entry in the list is always
6468 * the one we need first.
6469 */
Jens Axboe5262f562019-09-17 12:26:57 -06006470 list_for_each_prev(entry, &ctx->timeout_list) {
Pavel Begunkov135fcde2020-07-13 23:37:12 +03006471 struct io_kiocb *nxt = list_entry(entry, struct io_kiocb,
6472 timeout.list);
Jens Axboe5262f562019-09-17 12:26:57 -06006473
Pavel Begunkov8eb7e2d2020-06-29 13:13:02 +03006474 if (io_is_timeout_noseq(nxt))
Jens Axboe93bd25b2019-11-11 23:34:31 -07006475 continue;
Pavel Begunkovbfe68a22020-05-30 14:54:18 +03006476 /* nxt.seq is behind @tail, otherwise would've been completed */
6477 if (off >= nxt->timeout.target_seq - tail)
Jens Axboe5262f562019-09-17 12:26:57 -06006478 break;
6479 }
Jens Axboe93bd25b2019-11-11 23:34:31 -07006480add:
Pavel Begunkov135fcde2020-07-13 23:37:12 +03006481 list_add(&req->timeout.list, entry);
Jens Axboead8a48a2019-11-15 08:49:11 -07006482 data->timer.function = io_timeout_fn;
6483 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts), data->mode);
Jens Axboe89850fc2021-08-10 15:11:51 -06006484 spin_unlock_irq(&ctx->timeout_lock);
Jens Axboe5262f562019-09-17 12:26:57 -06006485 return 0;
6486}
6487
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006488struct io_cancel_data {
6489 struct io_ring_ctx *ctx;
6490 u64 user_data;
6491};
6492
Jens Axboe62755e32019-10-28 21:49:21 -06006493static bool io_cancel_cb(struct io_wq_work *work, void *data)
Jens Axboede0617e2019-04-06 21:51:27 -06006494{
Jens Axboe62755e32019-10-28 21:49:21 -06006495 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006496 struct io_cancel_data *cd = data;
Jens Axboede0617e2019-04-06 21:51:27 -06006497
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006498 return req->ctx == cd->ctx && req->user_data == cd->user_data;
Jens Axboe62755e32019-10-28 21:49:21 -06006499}
6500
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006501static int io_async_cancel_one(struct io_uring_task *tctx, u64 user_data,
6502 struct io_ring_ctx *ctx)
Jens Axboe62755e32019-10-28 21:49:21 -06006503{
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006504 struct io_cancel_data data = { .ctx = ctx, .user_data = user_data, };
Jens Axboe62755e32019-10-28 21:49:21 -06006505 enum io_wq_cancel cancel_ret;
Jens Axboe62755e32019-10-28 21:49:21 -06006506 int ret = 0;
6507
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006508 if (!tctx || !tctx->io_wq)
Jens Axboe5aa75ed2021-02-16 12:56:50 -07006509 return -ENOENT;
6510
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006511 cancel_ret = io_wq_cancel_cb(tctx->io_wq, io_cancel_cb, &data, false);
Jens Axboe62755e32019-10-28 21:49:21 -06006512 switch (cancel_ret) {
6513 case IO_WQ_CANCEL_OK:
6514 ret = 0;
6515 break;
6516 case IO_WQ_CANCEL_RUNNING:
6517 ret = -EALREADY;
6518 break;
6519 case IO_WQ_CANCEL_NOTFOUND:
6520 ret = -ENOENT;
6521 break;
6522 }
6523
Jens Axboee977d6d2019-11-05 12:39:45 -07006524 return ret;
6525}
6526
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006527static int io_try_cancel_userdata(struct io_kiocb *req, u64 sqe_addr)
Jens Axboe47f46762019-11-09 17:43:02 -07006528{
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006529 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe47f46762019-11-09 17:43:02 -07006530 int ret;
6531
Pavel Begunkovdadebc32021-08-23 13:30:44 +01006532 WARN_ON_ONCE(!io_wq_current_is_worker() && req->task != current);
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006533
Pavel Begunkovf458dd842021-03-08 12:14:14 +00006534 ret = io_async_cancel_one(req->task->io_uring, sqe_addr, ctx);
Pavel Begunkovdf9727a2021-04-01 15:43:59 +01006535 if (ret != -ENOENT)
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006536 return ret;
Pavel Begunkov505657b2021-08-17 20:28:09 +01006537
6538 spin_lock(&ctx->completion_lock);
Jens Axboe79ebeae2021-08-10 15:18:27 -06006539 spin_lock_irq(&ctx->timeout_lock);
Jens Axboe47f46762019-11-09 17:43:02 -07006540 ret = io_timeout_cancel(ctx, sqe_addr);
Jens Axboe79ebeae2021-08-10 15:18:27 -06006541 spin_unlock_irq(&ctx->timeout_lock);
Jens Axboe47f46762019-11-09 17:43:02 -07006542 if (ret != -ENOENT)
Pavel Begunkov505657b2021-08-17 20:28:09 +01006543 goto out;
6544 ret = io_poll_cancel(ctx, sqe_addr, false);
6545out:
6546 spin_unlock(&ctx->completion_lock);
6547 return ret;
Jens Axboe47f46762019-11-09 17:43:02 -07006548}
6549
Jens Axboe3529d8c2019-12-19 18:24:38 -07006550static int io_async_cancel_prep(struct io_kiocb *req,
6551 const struct io_uring_sqe *sqe)
Jens Axboee977d6d2019-11-05 12:39:45 -07006552{
Jens Axboefbf23842019-12-17 18:45:56 -07006553 if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboee977d6d2019-11-05 12:39:45 -07006554 return -EINVAL;
Daniele Albano61710e42020-07-18 14:15:16 -06006555 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
6556 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006557 if (sqe->ioprio || sqe->off || sqe->len || sqe->cancel_flags ||
6558 sqe->splice_fd_in)
Jens Axboee977d6d2019-11-05 12:39:45 -07006559 return -EINVAL;
6560
Jens Axboefbf23842019-12-17 18:45:56 -07006561 req->cancel.addr = READ_ONCE(sqe->addr);
6562 return 0;
6563}
6564
Pavel Begunkov61e98202021-02-10 00:03:08 +00006565static int io_async_cancel(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboefbf23842019-12-17 18:45:56 -07006566{
6567 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov58f99372021-03-12 16:25:55 +00006568 u64 sqe_addr = req->cancel.addr;
6569 struct io_tctx_node *node;
6570 int ret;
Jens Axboefbf23842019-12-17 18:45:56 -07006571
Pavel Begunkov8cb01fa2021-08-15 10:40:22 +01006572 ret = io_try_cancel_userdata(req, sqe_addr);
Pavel Begunkov58f99372021-03-12 16:25:55 +00006573 if (ret != -ENOENT)
6574 goto done;
Pavel Begunkov58f99372021-03-12 16:25:55 +00006575
6576 /* slow path, try all io-wq's */
6577 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
6578 ret = -ENOENT;
6579 list_for_each_entry(node, &ctx->tctx_list, ctx_node) {
6580 struct io_uring_task *tctx = node->task->io_uring;
6581
Pavel Begunkov58f99372021-03-12 16:25:55 +00006582 ret = io_async_cancel_one(tctx, req->cancel.addr, ctx);
6583 if (ret != -ENOENT)
6584 break;
6585 }
6586 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Pavel Begunkov58f99372021-03-12 16:25:55 +00006587done:
Pavel Begunkov58f99372021-03-12 16:25:55 +00006588 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006589 req_set_fail(req);
Pavel Begunkov505657b2021-08-17 20:28:09 +01006590 io_req_complete_post(req, ret, 0);
Jens Axboe62755e32019-10-28 21:49:21 -06006591 return 0;
6592}
6593
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006594static int io_rsrc_update_prep(struct io_kiocb *req,
Jens Axboe05f3fb32019-12-09 11:22:50 -07006595 const struct io_uring_sqe *sqe)
6596{
Daniele Albano61710e42020-07-18 14:15:16 -06006597 if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
6598 return -EINVAL;
Pavel Begunkov26578cd2021-08-20 10:36:37 +01006599 if (sqe->ioprio || sqe->rw_flags || sqe->splice_fd_in)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006600 return -EINVAL;
6601
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006602 req->rsrc_update.offset = READ_ONCE(sqe->off);
6603 req->rsrc_update.nr_args = READ_ONCE(sqe->len);
6604 if (!req->rsrc_update.nr_args)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006605 return -EINVAL;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006606 req->rsrc_update.arg = READ_ONCE(sqe->addr);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006607 return 0;
6608}
6609
Pavel Begunkov889fca72021-02-10 00:03:09 +00006610static int io_files_update(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboe05f3fb32019-12-09 11:22:50 -07006611{
6612 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01006613 struct io_uring_rsrc_update2 up;
Jens Axboe05f3fb32019-12-09 11:22:50 -07006614 int ret;
6615
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006616 up.offset = req->rsrc_update.offset;
6617 up.data = req->rsrc_update.arg;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01006618 up.nr = 0;
6619 up.tags = 0;
Colin Ian King615cee42021-04-26 10:47:35 +01006620 up.resv = 0;
Dylan Yudaken7a7c9f92022-04-12 09:30:40 -07006621 up.resv2 = 0;
Jens Axboe05f3fb32019-12-09 11:22:50 -07006622
Jens Axboecdb31c22021-09-24 08:43:54 -06006623 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Pavel Begunkovfdecb662021-04-25 14:32:20 +01006624 ret = __io_register_rsrc_update(ctx, IORING_RSRC_FILE,
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01006625 &up, req->rsrc_update.nr_args);
Jens Axboecdb31c22021-09-24 08:43:54 -06006626 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Jens Axboe05f3fb32019-12-09 11:22:50 -07006627
6628 if (ret < 0)
Pavel Begunkov93d2bcd2021-05-16 22:58:05 +01006629 req_set_fail(req);
Pavel Begunkov889fca72021-02-10 00:03:09 +00006630 __io_req_complete(req, issue_flags, ret, 0);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006631 return 0;
6632}
6633
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006634static int io_req_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
Jens Axboef67676d2019-12-02 11:03:47 -07006635{
Jens Axboed625c6e2019-12-17 19:53:05 -07006636 switch (req->opcode) {
Jens Axboee7815732019-12-17 19:45:06 -07006637 case IORING_OP_NOP:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006638 return 0;
Jens Axboef67676d2019-12-02 11:03:47 -07006639 case IORING_OP_READV:
6640 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006641 case IORING_OP_READ:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006642 return io_read_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07006643 case IORING_OP_WRITEV:
6644 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006645 case IORING_OP_WRITE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006646 return io_write_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07006647 case IORING_OP_POLL_ADD:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006648 return io_poll_add_prep(req, sqe);
Jens Axboe0969e782019-12-17 18:40:57 -07006649 case IORING_OP_POLL_REMOVE:
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006650 return io_poll_update_prep(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07006651 case IORING_OP_FSYNC:
Pavel Begunkov1155c762021-02-18 18:29:38 +00006652 return io_fsync_prep(req, sqe);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07006653 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkov1155c762021-02-18 18:29:38 +00006654 return io_sfr_prep(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07006655 case IORING_OP_SENDMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07006656 case IORING_OP_SEND:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006657 return io_sendmsg_prep(req, sqe);
Jens Axboe03b12302019-12-02 18:50:25 -07006658 case IORING_OP_RECVMSG:
Jens Axboefddafac2020-01-04 20:19:44 -07006659 case IORING_OP_RECV:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006660 return io_recvmsg_prep(req, sqe);
Jens Axboef499a022019-12-02 16:28:46 -07006661 case IORING_OP_CONNECT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006662 return io_connect_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07006663 case IORING_OP_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006664 return io_timeout_prep(req, sqe, false);
Jens Axboeb29472e2019-12-17 18:50:29 -07006665 case IORING_OP_TIMEOUT_REMOVE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006666 return io_timeout_remove_prep(req, sqe);
Jens Axboefbf23842019-12-17 18:45:56 -07006667 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006668 return io_async_cancel_prep(req, sqe);
Jens Axboe2d283902019-12-04 11:08:05 -07006669 case IORING_OP_LINK_TIMEOUT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006670 return io_timeout_prep(req, sqe, true);
Jens Axboe8ed8d3c2019-12-16 11:55:28 -07006671 case IORING_OP_ACCEPT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006672 return io_accept_prep(req, sqe);
Jens Axboed63d1b52019-12-10 10:38:56 -07006673 case IORING_OP_FALLOCATE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006674 return io_fallocate_prep(req, sqe);
Jens Axboe15b71ab2019-12-11 11:20:36 -07006675 case IORING_OP_OPENAT:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006676 return io_openat_prep(req, sqe);
Jens Axboeb5dba592019-12-11 14:02:38 -07006677 case IORING_OP_CLOSE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006678 return io_close_prep(req, sqe);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006679 case IORING_OP_FILES_UPDATE:
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00006680 return io_rsrc_update_prep(req, sqe);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07006681 case IORING_OP_STATX:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006682 return io_statx_prep(req, sqe);
Jens Axboe4840e412019-12-25 22:03:45 -07006683 case IORING_OP_FADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006684 return io_fadvise_prep(req, sqe);
Jens Axboec1ca7572019-12-25 22:18:28 -07006685 case IORING_OP_MADVISE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006686 return io_madvise_prep(req, sqe);
Jens Axboecebdb982020-01-08 17:59:24 -07006687 case IORING_OP_OPENAT2:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006688 return io_openat2_prep(req, sqe);
Jens Axboe3e4827b2020-01-08 15:18:09 -07006689 case IORING_OP_EPOLL_CTL:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006690 return io_epoll_ctl_prep(req, sqe);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006691 case IORING_OP_SPLICE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006692 return io_splice_prep(req, sqe);
Jens Axboeddf0322d2020-02-23 16:41:33 -07006693 case IORING_OP_PROVIDE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006694 return io_provide_buffers_prep(req, sqe);
Jens Axboe067524e2020-03-02 16:32:28 -07006695 case IORING_OP_REMOVE_BUFFERS:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006696 return io_remove_buffers_prep(req, sqe);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03006697 case IORING_OP_TEE:
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006698 return io_tee_prep(req, sqe);
Jens Axboe36f4fa62020-09-05 11:14:22 -06006699 case IORING_OP_SHUTDOWN:
6700 return io_shutdown_prep(req, sqe);
Jens Axboe80a261f2020-09-28 14:23:58 -06006701 case IORING_OP_RENAMEAT:
6702 return io_renameat_prep(req, sqe);
Jens Axboe14a11432020-09-28 14:27:37 -06006703 case IORING_OP_UNLINKAT:
6704 return io_unlinkat_prep(req, sqe);
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07006705 case IORING_OP_MKDIRAT:
6706 return io_mkdirat_prep(req, sqe);
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07006707 case IORING_OP_SYMLINKAT:
6708 return io_symlinkat_prep(req, sqe);
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07006709 case IORING_OP_LINKAT:
6710 return io_linkat_prep(req, sqe);
Jens Axboef67676d2019-12-02 11:03:47 -07006711 }
6712
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006713 printk_once(KERN_WARNING "io_uring: unhandled opcode %d\n",
6714 req->opcode);
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01006715 return -EINVAL;
Pavel Begunkovbfe76552020-09-30 22:57:55 +03006716}
6717
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006718static int io_req_prep_async(struct io_kiocb *req)
Jens Axboedef596e2019-01-09 08:59:42 -07006719{
Pavel Begunkovb7e298d2021-02-28 22:35:19 +00006720 if (!io_op_defs[req->opcode].needs_async_setup)
6721 return 0;
6722 if (WARN_ON_ONCE(req->async_data))
6723 return -EFAULT;
6724 if (io_alloc_async_data(req))
6725 return -EAGAIN;
6726
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006727 switch (req->opcode) {
6728 case IORING_OP_READV:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006729 return io_rw_prep_async(req, READ);
6730 case IORING_OP_WRITEV:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006731 return io_rw_prep_async(req, WRITE);
6732 case IORING_OP_SENDMSG:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006733 return io_sendmsg_prep_async(req);
6734 case IORING_OP_RECVMSG:
Pavel Begunkov93642ef2021-02-18 18:29:44 +00006735 return io_recvmsg_prep_async(req);
6736 case IORING_OP_CONNECT:
6737 return io_connect_prep_async(req);
6738 }
Pavel Begunkovb7e298d2021-02-28 22:35:19 +00006739 printk_once(KERN_WARNING "io_uring: prep_async() bad opcode %d\n",
6740 req->opcode);
6741 return -EFAULT;
Jens Axboedef596e2019-01-09 08:59:42 -07006742}
6743
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006744static u32 io_get_sequence(struct io_kiocb *req)
6745{
Pavel Begunkova3dbdf52021-06-17 18:14:05 +01006746 u32 seq = req->ctx->cached_sq_head;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006747
Pavel Begunkova3dbdf52021-06-17 18:14:05 +01006748 /* need original cached_sq_head, but it was increased for each req */
6749 io_for_each_link(req, req)
6750 seq--;
6751 return seq;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006752}
6753
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006754static bool io_drain_req(struct io_kiocb *req)
Jens Axboedef596e2019-01-09 08:59:42 -07006755{
Pavel Begunkov3c199662021-06-15 16:47:57 +01006756 struct io_kiocb *pos;
Jens Axboedef596e2019-01-09 08:59:42 -07006757 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006758 struct io_defer_entry *de;
Jens Axboedef596e2019-01-09 08:59:42 -07006759 int ret;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006760 u32 seq;
Jens Axboedef596e2019-01-09 08:59:42 -07006761
Pavel Begunkovb8ce1b92021-08-31 14:13:11 +01006762 if (req->flags & REQ_F_FAIL) {
6763 io_req_complete_fail_submit(req);
6764 return true;
6765 }
6766
Pavel Begunkov3c199662021-06-15 16:47:57 +01006767 /*
6768 * If we need to drain a request in the middle of a link, drain the
6769 * head request and the next request/link after the current link.
6770 * Considering sequential execution of links, IOSQE_IO_DRAIN will be
6771 * maintained for every request of our link.
6772 */
6773 if (ctx->drain_next) {
6774 req->flags |= REQ_F_IO_DRAIN;
6775 ctx->drain_next = false;
6776 }
6777 /* not interested in head, start from the first linked */
6778 io_for_each_link(pos, req->link) {
6779 if (pos->flags & REQ_F_IO_DRAIN) {
6780 ctx->drain_next = true;
6781 req->flags |= REQ_F_IO_DRAIN;
6782 break;
6783 }
6784 }
6785
Jens Axboedef596e2019-01-09 08:59:42 -07006786 /* Still need defer if there is pending req in defer list. */
Hao Xu1bd12b72021-11-25 17:21:02 +08006787 spin_lock(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006788 if (likely(list_empty_careful(&ctx->defer_list) &&
Pavel Begunkov10c66902021-06-15 16:47:56 +01006789 !(req->flags & REQ_F_IO_DRAIN))) {
Hao Xu1bd12b72021-11-25 17:21:02 +08006790 spin_unlock(&ctx->completion_lock);
Pavel Begunkov10c66902021-06-15 16:47:56 +01006791 ctx->drain_active = false;
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006792 return false;
Pavel Begunkov10c66902021-06-15 16:47:56 +01006793 }
Hao Xu1bd12b72021-11-25 17:21:02 +08006794 spin_unlock(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006795
6796 seq = io_get_sequence(req);
6797 /* Still a chance to pass the sequence check */
6798 if (!req_need_defer(req, seq) && list_empty_careful(&ctx->defer_list))
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006799 return false;
Jens Axboedef596e2019-01-09 08:59:42 -07006800
Pavel Begunkovb7e298d2021-02-28 22:35:19 +00006801 ret = io_req_prep_async(req);
Pavel Begunkovbe7053b2021-02-18 18:29:45 +00006802 if (ret)
Pavel Begunkov1b487732021-07-11 22:41:13 +01006803 goto fail;
Pavel Begunkovcbdcb432020-06-29 19:18:43 +03006804 io_prep_async_link(req);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006805 de = kmalloc(sizeof(*de), GFP_KERNEL);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006806 if (!de) {
Pavel Begunkov1b487732021-07-11 22:41:13 +01006807 ret = -ENOMEM;
6808fail:
6809 io_req_complete_failed(req, ret);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006810 return true;
6811 }
Jens Axboe31b51512019-01-18 22:56:34 -07006812
Jens Axboe79ebeae2021-08-10 15:18:27 -06006813 spin_lock(&ctx->completion_lock);
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006814 if (!req_need_defer(req, seq) && list_empty(&ctx->defer_list)) {
Jens Axboe79ebeae2021-08-10 15:18:27 -06006815 spin_unlock(&ctx->completion_lock);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006816 kfree(de);
Pavel Begunkovf237c302021-08-18 12:42:46 +01006817 io_queue_async_work(req, NULL);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006818 return true;
Jens Axboe31b51512019-01-18 22:56:34 -07006819 }
6820
6821 trace_io_uring_defer(ctx, req, req->user_data);
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006822 de->req = req;
Pavel Begunkov9cf7c102020-07-13 23:37:15 +03006823 de->seq = seq;
Pavel Begunkov27dc8332020-07-13 23:37:14 +03006824 list_add_tail(&de->list, &ctx->defer_list);
Jens Axboe79ebeae2021-08-10 15:18:27 -06006825 spin_unlock(&ctx->completion_lock);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01006826 return true;
Jens Axboe31b51512019-01-18 22:56:34 -07006827}
6828
Pavel Begunkov68fb8972021-03-19 17:22:41 +00006829static void io_clean_op(struct io_kiocb *req)
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03006830{
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006831 if (req->flags & REQ_F_BUFFER_SELECTED) {
6832 switch (req->opcode) {
6833 case IORING_OP_READV:
6834 case IORING_OP_READ_FIXED:
6835 case IORING_OP_READ:
Jens Axboebcda7ba2020-02-23 16:42:51 -07006836 kfree((void *)(unsigned long)req->rw.addr);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006837 break;
6838 case IORING_OP_RECVMSG:
6839 case IORING_OP_RECV:
Jens Axboe52de1fe2020-02-27 10:15:42 -07006840 kfree(req->sr_msg.kbuf);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006841 break;
6842 }
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03006843 }
6844
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006845 if (req->flags & REQ_F_NEED_CLEANUP) {
6846 switch (req->opcode) {
6847 case IORING_OP_READV:
6848 case IORING_OP_READ_FIXED:
6849 case IORING_OP_READ:
6850 case IORING_OP_WRITEV:
6851 case IORING_OP_WRITE_FIXED:
Jens Axboee8c2bc12020-08-15 18:44:09 -07006852 case IORING_OP_WRITE: {
6853 struct io_async_rw *io = req->async_data;
Pavel Begunkov1dacb4d2021-06-17 18:14:03 +01006854
6855 kfree(io->free_iovec);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006856 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07006857 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006858 case IORING_OP_RECVMSG:
Jens Axboee8c2bc12020-08-15 18:44:09 -07006859 case IORING_OP_SENDMSG: {
6860 struct io_async_msghdr *io = req->async_data;
Pavel Begunkov257e84a2021-02-05 00:58:00 +00006861
6862 kfree(io->free_iov);
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006863 break;
Jens Axboee8c2bc12020-08-15 18:44:09 -07006864 }
Jens Axboef3cd48502020-09-24 14:55:54 -06006865 case IORING_OP_OPENAT:
6866 case IORING_OP_OPENAT2:
6867 if (req->open.filename)
6868 putname(req->open.filename);
6869 break;
Jens Axboe80a261f2020-09-28 14:23:58 -06006870 case IORING_OP_RENAMEAT:
6871 putname(req->rename.oldpath);
6872 putname(req->rename.newpath);
6873 break;
Jens Axboe14a11432020-09-28 14:27:37 -06006874 case IORING_OP_UNLINKAT:
6875 putname(req->unlink.filename);
6876 break;
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07006877 case IORING_OP_MKDIRAT:
6878 putname(req->mkdir.filename);
6879 break;
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07006880 case IORING_OP_SYMLINKAT:
6881 putname(req->symlink.oldpath);
6882 putname(req->symlink.newpath);
6883 break;
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07006884 case IORING_OP_LINKAT:
6885 putname(req->hardlink.oldpath);
6886 putname(req->hardlink.newpath);
6887 break;
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006888 }
Pavel Begunkov0e1b6fe32020-07-16 23:28:02 +03006889 }
Jens Axboe75652a302021-04-15 09:52:40 -06006890 if ((req->flags & REQ_F_POLLED) && req->apoll) {
6891 kfree(req->apoll->double_poll);
6892 kfree(req->apoll);
6893 req->apoll = NULL;
6894 }
Pavel Begunkov3a0a6902021-04-20 12:03:31 +01006895 if (req->flags & REQ_F_INFLIGHT) {
6896 struct io_uring_task *tctx = req->task->io_uring;
6897
6898 atomic_dec(&tctx->inflight_tracked);
Pavel Begunkov3a0a6902021-04-20 12:03:31 +01006899 }
Pavel Begunkovc8543572021-06-17 18:14:04 +01006900 if (req->flags & REQ_F_CREDS)
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01006901 put_cred(req->creds);
Pavel Begunkovc8543572021-06-17 18:14:04 +01006902
6903 req->flags &= ~IO_REQ_CLEAN_FLAGS;
Pavel Begunkov99bc4c32020-02-07 22:04:45 +03006904}
6905
Pavel Begunkov889fca72021-02-10 00:03:09 +00006906static int io_issue_sqe(struct io_kiocb *req, unsigned int issue_flags)
Jens Axboeedafcce2019-01-09 09:16:05 -07006907{
Jens Axboeedafcce2019-01-09 09:16:05 -07006908 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe5730b272021-02-27 15:57:30 -07006909 const struct cred *creds = NULL;
Jens Axboed625c6e2019-12-17 19:53:05 -07006910 int ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07006911
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01006912 if ((req->flags & REQ_F_CREDS) && req->creds != current_cred())
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01006913 creds = override_creds(req->creds);
Jens Axboe5730b272021-02-27 15:57:30 -07006914
Jens Axboed625c6e2019-12-17 19:53:05 -07006915 switch (req->opcode) {
Jens Axboe2b188cc2019-01-07 10:46:33 -07006916 case IORING_OP_NOP:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006917 ret = io_nop(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006918 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006919 case IORING_OP_READV:
Jens Axboe3529d8c2019-12-19 18:24:38 -07006920 case IORING_OP_READ_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006921 case IORING_OP_READ:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006922 ret = io_read(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006923 break;
6924 case IORING_OP_WRITEV:
Jens Axboe2b188cc2019-01-07 10:46:33 -07006925 case IORING_OP_WRITE_FIXED:
Jens Axboe3a6820f2019-12-22 15:19:35 -07006926 case IORING_OP_WRITE:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006927 ret = io_write(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006928 break;
6929 case IORING_OP_FSYNC:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006930 ret = io_fsync(req, issue_flags);
Jackie Liuba5290c2019-10-09 09:19:59 +08006931 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07006932 case IORING_OP_POLL_ADD:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006933 ret = io_poll_add(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006934 break;
6935 case IORING_OP_POLL_REMOVE:
Pavel Begunkovc5de0032021-04-14 13:38:37 +01006936 ret = io_poll_update(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006937 break;
Jens Axboeb76da702019-11-20 13:05:32 -07006938 case IORING_OP_SYNC_FILE_RANGE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006939 ret = io_sync_file_range(req, issue_flags);
Jens Axboeb76da702019-11-20 13:05:32 -07006940 break;
6941 case IORING_OP_SENDMSG:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006942 ret = io_sendmsg(req, issue_flags);
Pavel Begunkov062d04d2020-10-10 18:34:12 +01006943 break;
Jens Axboefddafac2020-01-04 20:19:44 -07006944 case IORING_OP_SEND:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006945 ret = io_send(req, issue_flags);
Jens Axboeb76da702019-11-20 13:05:32 -07006946 break;
6947 case IORING_OP_RECVMSG:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006948 ret = io_recvmsg(req, issue_flags);
Pavel Begunkov062d04d2020-10-10 18:34:12 +01006949 break;
Jens Axboefddafac2020-01-04 20:19:44 -07006950 case IORING_OP_RECV:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006951 ret = io_recv(req, issue_flags);
Jens Axboeb76da702019-11-20 13:05:32 -07006952 break;
Jens Axboe561fb042019-10-24 07:25:42 -06006953 case IORING_OP_TIMEOUT:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006954 ret = io_timeout(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006955 break;
6956 case IORING_OP_TIMEOUT_REMOVE:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006957 ret = io_timeout_remove(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006958 break;
6959 case IORING_OP_ACCEPT:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006960 ret = io_accept(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006961 break;
6962 case IORING_OP_CONNECT:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006963 ret = io_connect(req, issue_flags);
Jens Axboe31b51512019-01-18 22:56:34 -07006964 break;
6965 case IORING_OP_ASYNC_CANCEL:
Pavel Begunkov61e98202021-02-10 00:03:08 +00006966 ret = io_async_cancel(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07006967 break;
Jens Axboed63d1b52019-12-10 10:38:56 -07006968 case IORING_OP_FALLOCATE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006969 ret = io_fallocate(req, issue_flags);
Jens Axboed63d1b52019-12-10 10:38:56 -07006970 break;
Jens Axboe15b71ab2019-12-11 11:20:36 -07006971 case IORING_OP_OPENAT:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006972 ret = io_openat(req, issue_flags);
Jens Axboe15b71ab2019-12-11 11:20:36 -07006973 break;
Jens Axboeb5dba592019-12-11 14:02:38 -07006974 case IORING_OP_CLOSE:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006975 ret = io_close(req, issue_flags);
Jens Axboeb5dba592019-12-11 14:02:38 -07006976 break;
Jens Axboe05f3fb32019-12-09 11:22:50 -07006977 case IORING_OP_FILES_UPDATE:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006978 ret = io_files_update(req, issue_flags);
Jens Axboe05f3fb32019-12-09 11:22:50 -07006979 break;
Jens Axboeeddc7ef2019-12-13 21:18:10 -07006980 case IORING_OP_STATX:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006981 ret = io_statx(req, issue_flags);
Jens Axboeeddc7ef2019-12-13 21:18:10 -07006982 break;
Jens Axboe4840e412019-12-25 22:03:45 -07006983 case IORING_OP_FADVISE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006984 ret = io_fadvise(req, issue_flags);
Jens Axboe4840e412019-12-25 22:03:45 -07006985 break;
Jens Axboec1ca7572019-12-25 22:18:28 -07006986 case IORING_OP_MADVISE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006987 ret = io_madvise(req, issue_flags);
Jens Axboec1ca7572019-12-25 22:18:28 -07006988 break;
Jens Axboecebdb982020-01-08 17:59:24 -07006989 case IORING_OP_OPENAT2:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006990 ret = io_openat2(req, issue_flags);
Jens Axboecebdb982020-01-08 17:59:24 -07006991 break;
Jens Axboe3e4827b2020-01-08 15:18:09 -07006992 case IORING_OP_EPOLL_CTL:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006993 ret = io_epoll_ctl(req, issue_flags);
Jens Axboe3e4827b2020-01-08 15:18:09 -07006994 break;
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006995 case IORING_OP_SPLICE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00006996 ret = io_splice(req, issue_flags);
Pavel Begunkov7d67af22020-02-24 11:32:45 +03006997 break;
Jens Axboeddf0322d2020-02-23 16:41:33 -07006998 case IORING_OP_PROVIDE_BUFFERS:
Pavel Begunkov889fca72021-02-10 00:03:09 +00006999 ret = io_provide_buffers(req, issue_flags);
Jens Axboeddf0322d2020-02-23 16:41:33 -07007000 break;
Jens Axboe067524e2020-03-02 16:32:28 -07007001 case IORING_OP_REMOVE_BUFFERS:
Pavel Begunkov889fca72021-02-10 00:03:09 +00007002 ret = io_remove_buffers(req, issue_flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007003 break;
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03007004 case IORING_OP_TEE:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00007005 ret = io_tee(req, issue_flags);
Pavel Begunkovf2a8d5c2020-05-17 14:18:06 +03007006 break;
Jens Axboe36f4fa62020-09-05 11:14:22 -06007007 case IORING_OP_SHUTDOWN:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00007008 ret = io_shutdown(req, issue_flags);
Jens Axboe36f4fa62020-09-05 11:14:22 -06007009 break;
Jens Axboe80a261f2020-09-28 14:23:58 -06007010 case IORING_OP_RENAMEAT:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00007011 ret = io_renameat(req, issue_flags);
Jens Axboe80a261f2020-09-28 14:23:58 -06007012 break;
Jens Axboe14a11432020-09-28 14:27:37 -06007013 case IORING_OP_UNLINKAT:
Pavel Begunkov45d189c2021-02-10 00:03:07 +00007014 ret = io_unlinkat(req, issue_flags);
Jens Axboe14a11432020-09-28 14:27:37 -06007015 break;
Dmitry Kadasheve34a02d2021-07-08 13:34:45 +07007016 case IORING_OP_MKDIRAT:
7017 ret = io_mkdirat(req, issue_flags);
7018 break;
Dmitry Kadashev7a8721f2021-07-08 13:34:46 +07007019 case IORING_OP_SYMLINKAT:
7020 ret = io_symlinkat(req, issue_flags);
7021 break;
Dmitry Kadashevcf30da92021-07-08 13:34:47 +07007022 case IORING_OP_LINKAT:
7023 ret = io_linkat(req, issue_flags);
7024 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007025 default:
7026 ret = -EINVAL;
7027 break;
7028 }
Jens Axboe31b51512019-01-18 22:56:34 -07007029
Jens Axboe5730b272021-02-27 15:57:30 -07007030 if (creds)
7031 revert_creds(creds);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007032 if (ret)
7033 return ret;
Jens Axboeb5325762020-05-19 21:20:27 -06007034 /* If the op doesn't have a file, we're not polling for it */
Pavel Begunkovcb3d8972021-06-14 02:36:14 +01007035 if ((ctx->flags & IORING_SETUP_IOPOLL) && req->file)
7036 io_iopoll_req_issued(req);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007037
7038 return 0;
7039}
7040
Pavel Begunkovebc11b62021-08-09 13:04:05 +01007041static struct io_wq_work *io_wq_free_work(struct io_wq_work *work)
7042{
7043 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
7044
7045 req = io_put_req_find_next(req);
7046 return req ? &req->work : NULL;
7047}
7048
Pavel Begunkov5280f7e2021-02-04 13:52:08 +00007049static void io_wq_submit_work(struct io_wq_work *work)
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03007050{
Jens Axboe2b188cc2019-01-07 10:46:33 -07007051 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkov6df1db62020-07-03 22:15:06 +03007052 struct io_kiocb *timeout;
Jens Axboe561fb042019-10-24 07:25:42 -06007053 int ret = 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007054
Pavel Begunkov48dcd382021-08-15 10:40:18 +01007055 /* one will be dropped by ->io_free_work() after returning to io-wq */
7056 if (!(req->flags & REQ_F_REFCOUNT))
7057 __io_req_set_refcount(req, 2);
7058 else
7059 req_ref_get(req);
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01007060
Pavel Begunkov6df1db62020-07-03 22:15:06 +03007061 timeout = io_prep_linked_timeout(req);
7062 if (timeout)
7063 io_queue_linked_timeout(timeout);
Pavel Begunkovd4c81f32020-06-08 21:08:19 +03007064
Pavel Begunkovdadebc32021-08-23 13:30:44 +01007065 /* either cancelled or io-wq is dying, so don't touch tctx->iowq */
Jens Axboe4014d942021-01-19 15:53:54 -07007066 if (work->flags & IO_WQ_WORK_CANCEL)
Jens Axboe561fb042019-10-24 07:25:42 -06007067 ret = -ECANCELED;
Jens Axboe31b51512019-01-18 22:56:34 -07007068
Jens Axboe561fb042019-10-24 07:25:42 -06007069 if (!ret) {
Jens Axboe561fb042019-10-24 07:25:42 -06007070 do {
Pavel Begunkov889fca72021-02-10 00:03:09 +00007071 ret = io_issue_sqe(req, 0);
Jens Axboe561fb042019-10-24 07:25:42 -06007072 /*
7073 * We can get EAGAIN for polled IO even though we're
7074 * forcing a sync submission from here, since we can't
7075 * wait for request slots on the block side.
7076 */
Pavel Begunkov51ebf1b2022-05-13 11:24:56 +01007077 if (ret != -EAGAIN || !(req->ctx->flags & IORING_SETUP_IOPOLL))
Jens Axboe561fb042019-10-24 07:25:42 -06007078 break;
Pavel Begunkov0def1232023-09-12 15:02:00 +01007079 if (io_wq_worker_stopped())
7080 break;
Jens Axboe3359fdf2023-07-20 13:16:53 -06007081 /*
7082 * If REQ_F_NOWAIT is set, then don't wait or retry with
7083 * poll. -EAGAIN is final for that case.
7084 */
7085 if (req->flags & REQ_F_NOWAIT)
7086 break;
7087
Jens Axboe561fb042019-10-24 07:25:42 -06007088 cond_resched();
7089 } while (1);
7090 }
Jens Axboe31b51512019-01-18 22:56:34 -07007091
Pavel Begunkova3df76982021-02-18 22:32:52 +00007092 /* avoid locking problems by failing it from a clean context */
Pavel Begunkov5d5901a2021-08-11 19:28:29 +01007093 if (ret)
Pavel Begunkova3df76982021-02-18 22:32:52 +00007094 io_req_task_queue_fail(req, ret);
Jens Axboe31b51512019-01-18 22:56:34 -07007095}
Jens Axboe2b188cc2019-01-07 10:46:33 -07007096
Pavel Begunkovaeca2412021-04-11 01:46:37 +01007097static inline struct io_fixed_file *io_fixed_file_slot(struct io_file_table *table,
Pavel Begunkov042b0d82021-08-09 13:04:01 +01007098 unsigned i)
Jens Axboe09bb8392019-03-13 12:39:28 -06007099{
Pavel Begunkov042b0d82021-08-09 13:04:01 +01007100 return &table->files[i];
Pavel Begunkovdafecf12021-02-28 22:35:11 +00007101}
7102
Jens Axboe09bb8392019-03-13 12:39:28 -06007103static inline struct file *io_file_from_index(struct io_ring_ctx *ctx,
7104 int index)
7105{
Pavel Begunkovaeca2412021-04-11 01:46:37 +01007106 struct io_fixed_file *slot = io_fixed_file_slot(&ctx->file_table, index);
Jens Axboe65e19f52019-10-26 07:20:21 -06007107
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01007108 return (struct file *) (slot->file_ptr & FFS_MASK);
Jens Axboe65e19f52019-10-26 07:20:21 -06007109}
7110
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01007111static void io_fixed_file_set(struct io_fixed_file *file_slot, struct file *file)
Pavel Begunkov9a321c92021-04-01 15:44:01 +01007112{
7113 unsigned long file_ptr = (unsigned long) file;
7114
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01007115 if (__io_file_supports_nowait(file, READ))
Pavel Begunkov9a321c92021-04-01 15:44:01 +01007116 file_ptr |= FFS_ASYNC_READ;
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01007117 if (__io_file_supports_nowait(file, WRITE))
Pavel Begunkov9a321c92021-04-01 15:44:01 +01007118 file_ptr |= FFS_ASYNC_WRITE;
7119 if (S_ISREG(file_inode(file)->i_mode))
7120 file_ptr |= FFS_ISREG;
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01007121 file_slot->file_ptr = file_ptr;
Jens Axboe09bb8392019-03-13 12:39:28 -06007122}
7123
Pavel Begunkovac177052021-08-09 13:04:02 +01007124static inline struct file *io_file_get_fixed(struct io_ring_ctx *ctx,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007125 struct io_kiocb *req, int fd,
7126 unsigned int issue_flags)
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007127{
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007128 struct file *file = NULL;
Pavel Begunkovac177052021-08-09 13:04:02 +01007129 unsigned long file_ptr;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007130
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007131 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
7132
Pavel Begunkovac177052021-08-09 13:04:02 +01007133 if (unlikely((unsigned int)fd >= ctx->nr_user_files))
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007134 goto out;
Pavel Begunkovac177052021-08-09 13:04:02 +01007135 fd = array_index_nospec(fd, ctx->nr_user_files);
7136 file_ptr = io_fixed_file_slot(&ctx->file_table, fd)->file_ptr;
7137 file = (struct file *) (file_ptr & FFS_MASK);
7138 file_ptr &= ~FFS_MASK;
7139 /* mask in overlapping REQ_F and FFS bits */
Pavel Begunkovb191e2d2021-08-09 13:04:03 +01007140 req->flags |= (file_ptr << REQ_F_NOWAIT_READ_BIT);
Pavel Begunkovac177052021-08-09 13:04:02 +01007141 io_req_set_rsrc_node(req);
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007142out:
7143 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
Pavel Begunkov8371adf2020-10-10 18:34:08 +01007144 return file;
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007145}
7146
Pavel Begunkovac177052021-08-09 13:04:02 +01007147static struct file *io_file_get_normal(struct io_ring_ctx *ctx,
Pavel Begunkovac177052021-08-09 13:04:02 +01007148 struct io_kiocb *req, int fd)
7149{
Pavel Begunkov62906e82021-08-10 14:52:47 +01007150 struct file *file = fget(fd);
Pavel Begunkovac177052021-08-09 13:04:02 +01007151
7152 trace_io_uring_file_get(ctx, fd);
7153
7154 /* we don't allow fixed io_uring files */
7155 if (file && unlikely(file->f_op == &io_uring_fops))
7156 io_req_track_inflight(req);
7157 return file;
7158}
7159
7160static inline struct file *io_file_get(struct io_ring_ctx *ctx,
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007161 struct io_kiocb *req, int fd, bool fixed,
7162 unsigned int issue_flags)
Pavel Begunkovac177052021-08-09 13:04:02 +01007163{
7164 if (fixed)
Bing-Jhong Billy Jhengcf7f9cd2023-03-02 21:00:06 +08007165 return io_file_get_fixed(ctx, req, fd, issue_flags);
Pavel Begunkovac177052021-08-09 13:04:02 +01007166 else
Pavel Begunkov62906e82021-08-10 14:52:47 +01007167 return io_file_get_normal(ctx, req, fd);
Pavel Begunkovac177052021-08-09 13:04:02 +01007168}
7169
Pavel Begunkovf237c302021-08-18 12:42:46 +01007170static void io_req_task_link_timeout(struct io_kiocb *req, bool *locked)
Jens Axboe89b263f2021-08-10 15:14:18 -06007171{
7172 struct io_kiocb *prev = req->timeout.prev;
Pavel Begunkov3d2a1e62021-11-26 14:38:14 +00007173 int ret = -ENOENT;
Jens Axboe89b263f2021-08-10 15:14:18 -06007174
7175 if (prev) {
Pavel Begunkov3d2a1e62021-11-26 14:38:14 +00007176 if (!(req->task->flags & PF_EXITING))
7177 ret = io_try_cancel_userdata(req, prev->user_data);
Pavel Begunkov505657b2021-08-17 20:28:09 +01007178 io_req_complete_post(req, ret ?: -ETIME, 0);
Jens Axboe89b263f2021-08-10 15:14:18 -06007179 io_put_req(prev);
Jens Axboe89b263f2021-08-10 15:14:18 -06007180 } else {
7181 io_req_complete_post(req, -ETIME, 0);
7182 }
7183}
7184
Jens Axboe2665abf2019-11-05 12:40:47 -07007185static enum hrtimer_restart io_link_timeout_fn(struct hrtimer *timer)
7186{
Jens Axboead8a48a2019-11-15 08:49:11 -07007187 struct io_timeout_data *data = container_of(timer,
7188 struct io_timeout_data, timer);
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00007189 struct io_kiocb *prev, *req = data->req;
Jens Axboe2665abf2019-11-05 12:40:47 -07007190 struct io_ring_ctx *ctx = req->ctx;
Jens Axboe2665abf2019-11-05 12:40:47 -07007191 unsigned long flags;
Jens Axboe2665abf2019-11-05 12:40:47 -07007192
Jens Axboe89b263f2021-08-10 15:14:18 -06007193 spin_lock_irqsave(&ctx->timeout_lock, flags);
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00007194 prev = req->timeout.head;
7195 req->timeout.head = NULL;
Jens Axboe2665abf2019-11-05 12:40:47 -07007196
7197 /*
7198 * We don't expect the list to be empty, that will only happen if we
7199 * race with the completion of the linked work.
7200 */
Pavel Begunkov447c19f2021-05-14 12:02:50 +01007201 if (prev) {
Pavel Begunkovf2f87372020-10-27 23:25:37 +00007202 io_remove_next_linked(prev);
Pavel Begunkov447c19f2021-05-14 12:02:50 +01007203 if (!req_ref_inc_not_zero(prev))
7204 prev = NULL;
7205 }
Pavel Begunkovef9dd632021-08-28 19:54:38 -06007206 list_del(&req->timeout.list);
Jens Axboe89b263f2021-08-10 15:14:18 -06007207 req->timeout.prev = prev;
7208 spin_unlock_irqrestore(&ctx->timeout_lock, flags);
Jens Axboe2665abf2019-11-05 12:40:47 -07007209
Jens Axboe89b263f2021-08-10 15:14:18 -06007210 req->io_task_work.func = io_req_task_link_timeout;
7211 io_req_task_work_add(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07007212 return HRTIMER_NORESTART;
7213}
7214
Pavel Begunkovde968c12021-03-19 17:22:33 +00007215static void io_queue_linked_timeout(struct io_kiocb *req)
Jens Axboe2665abf2019-11-05 12:40:47 -07007216{
Pavel Begunkovde968c12021-03-19 17:22:33 +00007217 struct io_ring_ctx *ctx = req->ctx;
7218
Jens Axboe89b263f2021-08-10 15:14:18 -06007219 spin_lock_irq(&ctx->timeout_lock);
Jens Axboe76a46e02019-11-10 23:34:16 -07007220 /*
Pavel Begunkovf2f87372020-10-27 23:25:37 +00007221 * If the back reference is NULL, then our linked request finished
7222 * before we got a chance to setup the timer
Jens Axboe76a46e02019-11-10 23:34:16 -07007223 */
Pavel Begunkov90cd7e42020-10-27 23:25:36 +00007224 if (req->timeout.head) {
Jens Axboee8c2bc12020-08-15 18:44:09 -07007225 struct io_timeout_data *data = req->async_data;
Jens Axboe94ae5e72019-11-14 19:39:52 -07007226
Jens Axboead8a48a2019-11-15 08:49:11 -07007227 data->timer.function = io_link_timeout_fn;
7228 hrtimer_start(&data->timer, timespec64_to_ktime(data->ts),
7229 data->mode);
Pavel Begunkovef9dd632021-08-28 19:54:38 -06007230 list_add_tail(&req->timeout.list, &ctx->ltimeout_list);
Jens Axboe2665abf2019-11-05 12:40:47 -07007231 }
Jens Axboe89b263f2021-08-10 15:14:18 -06007232 spin_unlock_irq(&ctx->timeout_lock);
Jens Axboe2665abf2019-11-05 12:40:47 -07007233 /* drop submission reference */
Jens Axboe76a46e02019-11-10 23:34:16 -07007234 io_put_req(req);
Jens Axboe2665abf2019-11-05 12:40:47 -07007235}
7236
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007237static void __io_queue_sqe(struct io_kiocb *req)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007238 __must_hold(&req->ctx->uring_lock)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007239{
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007240 struct io_kiocb *linked_timeout;
Jens Axboee0c5c572019-03-12 10:18:47 -06007241 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007242
Olivier Langlois59b735a2021-06-22 05:17:39 -07007243issue_sqe:
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007244 ret = io_issue_sqe(req, IO_URING_F_NONBLOCK|IO_URING_F_COMPLETE_DEFER);
Jens Axboe491381ce2019-10-17 09:20:46 -06007245
7246 /*
7247 * We async punt it if the file wasn't marked NOWAIT, or if the file
7248 * doesn't support non-blocking read/write attempts
7249 */
Pavel Begunkov18400382021-03-19 17:22:34 +00007250 if (likely(!ret)) {
Pavel Begunkove342c802021-01-19 13:32:47 +00007251 if (req->flags & REQ_F_COMPLETE_INLINE) {
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007252 struct io_ring_ctx *ctx = req->ctx;
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01007253 struct io_submit_state *state = &ctx->submit_state;
Jens Axboee65ef562019-03-12 10:16:44 -06007254
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01007255 state->compl_reqs[state->compl_nr++] = req;
7256 if (state->compl_nr == ARRAY_SIZE(state->compl_reqs))
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01007257 io_submit_flush_completions(ctx);
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007258 return;
Pavel Begunkov0d63c142020-10-22 16:47:18 +01007259 }
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007260
7261 linked_timeout = io_prep_linked_timeout(req);
7262 if (linked_timeout)
7263 io_queue_linked_timeout(linked_timeout);
Pavel Begunkov18400382021-03-19 17:22:34 +00007264 } else if (ret == -EAGAIN && !(req->flags & REQ_F_NOWAIT)) {
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007265 linked_timeout = io_prep_linked_timeout(req);
7266
Olivier Langlois59b735a2021-06-22 05:17:39 -07007267 switch (io_arm_poll_handler(req)) {
7268 case IO_APOLL_READY:
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007269 if (linked_timeout)
Pavel Begunkov4ea672a2021-10-20 09:53:02 +01007270 io_queue_linked_timeout(linked_timeout);
Olivier Langlois59b735a2021-06-22 05:17:39 -07007271 goto issue_sqe;
7272 case IO_APOLL_ABORTED:
Pavel Begunkov18400382021-03-19 17:22:34 +00007273 /*
7274 * Queued up for async execution, worker will release
7275 * submit reference when the iocb is actually submitted.
7276 */
Pavel Begunkovf237c302021-08-18 12:42:46 +01007277 io_queue_async_work(req, NULL);
Olivier Langlois59b735a2021-06-22 05:17:39 -07007278 break;
Pavel Begunkov18400382021-03-19 17:22:34 +00007279 }
Pavel Begunkov906c6ca2021-08-15 10:40:26 +01007280
7281 if (linked_timeout)
7282 io_queue_linked_timeout(linked_timeout);
Pavel Begunkov0d63c142020-10-22 16:47:18 +01007283 } else {
Pavel Begunkovf41db2732021-02-28 22:35:12 +00007284 io_req_complete_failed(req, ret);
Jens Axboe9e645e112019-05-10 16:07:28 -06007285 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07007286}
7287
Pavel Begunkov441b8a72021-06-14 23:37:31 +01007288static inline void io_queue_sqe(struct io_kiocb *req)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007289 __must_hold(&req->ctx->uring_lock)
Jackie Liu4fe2c962019-09-09 20:50:40 +08007290{
Pavel Begunkov10c66902021-06-15 16:47:56 +01007291 if (unlikely(req->ctx->drain_active) && io_drain_req(req))
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01007292 return;
Jackie Liu4fe2c962019-09-09 20:50:40 +08007293
Hao Xua8295b92021-08-27 17:46:09 +08007294 if (likely(!(req->flags & (REQ_F_FORCE_ASYNC | REQ_F_FAIL)))) {
Pavel Begunkovc5eef2b2021-02-10 00:03:22 +00007295 __io_queue_sqe(req);
Hao Xua8295b92021-08-27 17:46:09 +08007296 } else if (req->flags & REQ_F_FAIL) {
Pavel Begunkovc6d3d9c2021-08-31 14:13:10 +01007297 io_req_complete_fail_submit(req);
Pavel Begunkov76cc33d2021-06-14 23:37:30 +01007298 } else {
7299 int ret = io_req_prep_async(req);
7300
7301 if (unlikely(ret))
7302 io_req_complete_failed(req, ret);
7303 else
Pavel Begunkovf237c302021-08-18 12:42:46 +01007304 io_queue_async_work(req, NULL);
Jens Axboece35a472019-12-17 08:04:44 -07007305 }
Jackie Liu4fe2c962019-09-09 20:50:40 +08007306}
7307
Stefano Garzarella21b55db2020-08-27 16:58:30 +02007308/*
7309 * Check SQE restrictions (opcode and flags).
7310 *
7311 * Returns 'true' if SQE is allowed, 'false' otherwise.
7312 */
7313static inline bool io_check_restriction(struct io_ring_ctx *ctx,
7314 struct io_kiocb *req,
7315 unsigned int sqe_flags)
7316{
Pavel Begunkov4cfb25b2021-06-26 21:40:47 +01007317 if (likely(!ctx->restricted))
Stefano Garzarella21b55db2020-08-27 16:58:30 +02007318 return true;
7319
7320 if (!test_bit(req->opcode, ctx->restrictions.sqe_op))
7321 return false;
7322
7323 if ((sqe_flags & ctx->restrictions.sqe_flags_required) !=
7324 ctx->restrictions.sqe_flags_required)
7325 return false;
7326
7327 if (sqe_flags & ~(ctx->restrictions.sqe_flags_allowed |
7328 ctx->restrictions.sqe_flags_required))
7329 return false;
7330
7331 return true;
7332}
7333
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007334static int io_init_req(struct io_ring_ctx *ctx, struct io_kiocb *req,
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007335 const struct io_uring_sqe *sqe)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007336 __must_hold(&ctx->uring_lock)
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007337{
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007338 struct io_submit_state *state;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007339 unsigned int sqe_flags;
Jens Axboe003e8dc2021-03-06 09:22:27 -07007340 int personality, ret = 0;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007341
Pavel Begunkov864ea922021-08-09 13:04:08 +01007342 /* req is partially pre-initialised, see io_preinit_req() */
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007343 req->opcode = READ_ONCE(sqe->opcode);
Pavel Begunkov5be9ad12021-02-12 18:41:17 +00007344 /* same numerical values with corresponding REQ_F_*, safe to copy */
7345 req->flags = sqe_flags = READ_ONCE(sqe->flags);
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007346 req->user_data = READ_ONCE(sqe->user_data);
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007347 req->file = NULL;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00007348 req->fixed_rsrc_refs = NULL;
Pavel Begunkov4dd28242020-06-15 10:33:13 +03007349 req->task = current;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007350
Pavel Begunkov5be9ad12021-02-12 18:41:17 +00007351 /* enforce forwards compatibility on users */
Pavel Begunkovdddca222021-04-27 16:13:52 +01007352 if (unlikely(sqe_flags & ~SQE_VALID_FLAGS))
Pavel Begunkov5be9ad12021-02-12 18:41:17 +00007353 return -EINVAL;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007354 if (unlikely(req->opcode >= IORING_OP_LAST))
7355 return -EINVAL;
Pavel Begunkov4cfb25b2021-06-26 21:40:47 +01007356 if (!io_check_restriction(ctx, req, sqe_flags))
Stefano Garzarella21b55db2020-08-27 16:58:30 +02007357 return -EACCES;
7358
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007359 if ((sqe_flags & IOSQE_BUFFER_SELECT) &&
7360 !io_op_defs[req->opcode].buffer_select)
7361 return -EOPNOTSUPP;
Pavel Begunkov3c199662021-06-15 16:47:57 +01007362 if (unlikely(sqe_flags & IOSQE_IO_DRAIN))
7363 ctx->drain_active = true;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007364
Jens Axboe003e8dc2021-03-06 09:22:27 -07007365 personality = READ_ONCE(sqe->personality);
7366 if (personality) {
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01007367 req->creds = xa_load(&ctx->personalities, personality);
7368 if (!req->creds)
Jens Axboe003e8dc2021-03-06 09:22:27 -07007369 return -EINVAL;
Pavel Begunkovc10d1f92021-06-17 18:14:01 +01007370 get_cred(req->creds);
Pavel Begunkovb8e64b52021-06-17 18:14:02 +01007371 req->flags |= REQ_F_CREDS;
Jens Axboe003e8dc2021-03-06 09:22:27 -07007372 }
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007373 state = &ctx->submit_state;
Pavel Begunkovef4ff582020-04-12 02:05:05 +03007374
Jens Axboe27926b62020-10-28 09:33:23 -06007375 /*
7376 * Plug now if we have more than 1 IO left after this, and the target
7377 * is potentially a read/write to block based storage.
7378 */
7379 if (!state->plug_started && state->ios_left > 1 &&
7380 io_op_defs[req->opcode].plug) {
7381 blk_start_plug(&state->plug);
7382 state->plug_started = true;
7383 }
Jens Axboe63ff8222020-05-07 14:56:15 -06007384
Pavel Begunkovbd5bbda2020-11-20 15:50:51 +00007385 if (io_op_defs[req->opcode].needs_file) {
Pavel Begunkov62906e82021-08-10 14:52:47 +01007386 req->file = io_file_get(ctx, req, READ_ONCE(sqe->fd),
Jens Axboe937c15e2023-03-03 06:49:57 -07007387 (sqe_flags & IOSQE_FIXED_FILE),
7388 IO_URING_F_NONBLOCK);
Pavel Begunkovba13e232021-02-01 18:59:52 +00007389 if (unlikely(!req->file))
Pavel Begunkovbd5bbda2020-11-20 15:50:51 +00007390 ret = -EBADF;
7391 }
7392
Pavel Begunkov71b547c2020-10-10 18:34:09 +01007393 state->ios_left--;
7394 return ret;
Pavel Begunkov0553b8b2020-04-08 08:58:45 +03007395}
7396
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007397static int io_submit_sqe(struct io_ring_ctx *ctx, struct io_kiocb *req,
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007398 const struct io_uring_sqe *sqe)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007399 __must_hold(&ctx->uring_lock)
Jens Axboe6c271ce2019-01-10 11:22:30 -07007400{
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007401 struct io_submit_link *link = &ctx->submit_state.link;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007402 int ret;
7403
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007404 ret = io_init_req(ctx, req, sqe);
7405 if (unlikely(ret)) {
7406fail_req:
Hao Xua8295b92021-08-27 17:46:09 +08007407 /* fail even hard links since we don't submit */
Pavel Begunkovde59bc12021-02-18 18:29:47 +00007408 if (link->head) {
Hao Xua8295b92021-08-27 17:46:09 +08007409 /*
7410 * we can judge a link req is failed or cancelled by if
7411 * REQ_F_FAIL is set, but the head is an exception since
7412 * it may be set REQ_F_FAIL because of other req's failure
7413 * so let's leverage req->result to distinguish if a head
7414 * is set REQ_F_FAIL because of its failure or other req's
7415 * failure so that we can set the correct ret code for it.
7416 * init result here to avoid affecting the normal path.
7417 */
7418 if (!(link->head->flags & REQ_F_FAIL))
7419 req_fail_link_node(link->head, -ECANCELED);
7420 } else if (!(req->flags & (REQ_F_LINK | REQ_F_HARDLINK))) {
7421 /*
7422 * the current req is a normal req, we should return
7423 * error and thus break the submittion loop.
7424 */
7425 io_req_complete_failed(req, ret);
7426 return ret;
Pavel Begunkovde59bc12021-02-18 18:29:47 +00007427 }
Hao Xua8295b92021-08-27 17:46:09 +08007428 req_fail_link_node(req, ret);
7429 } else {
7430 ret = io_req_prep(req, sqe);
7431 if (unlikely(ret))
7432 goto fail_req;
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007433 }
Pavel Begunkov441b8a72021-06-14 23:37:31 +01007434
Pavel Begunkovbe7053b2021-02-18 18:29:45 +00007435 /* don't need @sqe from now on */
Olivier Langlois236daeae2021-05-31 02:36:37 -04007436 trace_io_uring_submit_sqe(ctx, req, req->opcode, req->user_data,
7437 req->flags, true,
7438 ctx->flags & IORING_SETUP_SQPOLL);
Pavel Begunkova6b8cadc2021-02-18 18:29:41 +00007439
Jens Axboe6c271ce2019-01-10 11:22:30 -07007440 /*
7441 * If we already have a head request, queue this one for async
7442 * submittal once the head completes. If we don't have a head but
7443 * IOSQE_IO_LINK is set in the sqe, start a new head. This one will be
7444 * submitted sync once the chain is complete. If none of those
7445 * conditions are true (normal request), then just queue it.
7446 */
7447 if (link->head) {
7448 struct io_kiocb *head = link->head;
7449
Hao Xua8295b92021-08-27 17:46:09 +08007450 if (!(req->flags & REQ_F_FAIL)) {
7451 ret = io_req_prep_async(req);
7452 if (unlikely(ret)) {
7453 req_fail_link_node(req, ret);
7454 if (!(head->flags & REQ_F_FAIL))
7455 req_fail_link_node(head, -ECANCELED);
7456 }
7457 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07007458 trace_io_uring_link(ctx, req, head);
7459 link->last->link = req;
7460 link->last = req;
7461
7462 /* last request of a link, enqueue the link */
7463 if (!(req->flags & (REQ_F_LINK | REQ_F_HARDLINK))) {
7464 link->head = NULL;
Pavel Begunkov5e159202021-06-14 23:37:26 +01007465 io_queue_sqe(head);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007466 }
Jackie Liu4fe2c962019-09-09 20:50:40 +08007467 } else {
Jens Axboe2b188cc2019-01-07 10:46:33 -07007468 if (req->flags & (REQ_F_LINK | REQ_F_HARDLINK)) {
Jackie Liu4fe2c962019-09-09 20:50:40 +08007469 link->head = req;
7470 link->last = req;
7471 } else {
Pavel Begunkovbe7053b2021-02-18 18:29:45 +00007472 io_queue_sqe(req);
Jackie Liu4fe2c962019-09-09 20:50:40 +08007473 }
7474 }
7475
7476 return 0;
7477}
7478
7479/*
7480 * Batched submission is done, ensure local IO is flushed out.
7481 */
7482static void io_submit_state_end(struct io_submit_state *state,
7483 struct io_ring_ctx *ctx)
Pavel Begunkov1b4a51b2019-11-21 11:54:28 +03007484{
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007485 if (state->link.head)
Pavel Begunkovde59bc12021-02-18 18:29:47 +00007486 io_queue_sqe(state->link.head);
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01007487 if (state->compl_nr)
Pavel Begunkov2a2758f2021-06-17 18:14:00 +01007488 io_submit_flush_completions(ctx);
Jackie Liua197f662019-11-08 08:09:12 -07007489 if (state->plug_started)
Pavel Begunkov32fe5252019-12-17 22:26:58 +03007490 blk_finish_plug(&state->plug);
Jens Axboe9e645e112019-05-10 16:07:28 -06007491}
Pavel Begunkov32fe5252019-12-17 22:26:58 +03007492
Jens Axboe9e645e112019-05-10 16:07:28 -06007493/*
7494 * Start submission side cache.
Pavel Begunkov32fe5252019-12-17 22:26:58 +03007495 */
Jens Axboe9e645e112019-05-10 16:07:28 -06007496static void io_submit_state_start(struct io_submit_state *state,
Pavel Begunkov196be952019-11-07 01:41:06 +03007497 unsigned int max_ios)
Jens Axboe9e645e112019-05-10 16:07:28 -06007498{
7499 state->plug_started = false;
Jens Axboebcda7ba2020-02-23 16:42:51 -07007500 state->ios_left = max_ios;
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007501 /* set only head, no need to init link_last in advance */
7502 state->link.head = NULL;
Jens Axboe75c6a032020-01-28 10:15:23 -07007503}
7504
Jens Axboe193155c2020-02-22 23:22:19 -07007505static void io_commit_sqring(struct io_ring_ctx *ctx)
7506{
Jens Axboe75c6a032020-01-28 10:15:23 -07007507 struct io_rings *rings = ctx->rings;
7508
7509 /*
Jens Axboe193155c2020-02-22 23:22:19 -07007510 * Ensure any loads from the SQEs are done at this point,
Jens Axboe75c6a032020-01-28 10:15:23 -07007511 * since once we write the new head, the application could
7512 * write new data to them.
Pavel Begunkov6b47ee62020-01-18 20:22:41 +03007513 */
Pavel Begunkov8da11c12020-02-24 11:32:44 +03007514 smp_store_release(&rings->sq.head, ctx->cached_sq_head);
Jens Axboebcda7ba2020-02-23 16:42:51 -07007515}
7516
Jens Axboe9e645e112019-05-10 16:07:28 -06007517/*
Fam Zhengdd9ae8a2021-06-04 17:42:56 +01007518 * Fetch an sqe, if one is available. Note this returns a pointer to memory
Jens Axboe9e645e112019-05-10 16:07:28 -06007519 * that is mapped by userspace. This means that care needs to be taken to
7520 * ensure that reads are stable, as we cannot rely on userspace always
Jens Axboe78e19bb2019-11-06 15:21:34 -07007521 * being a good citizen. If members of the sqe are validated and then later
7522 * used, it's important that those reads are done through READ_ONCE() to
Pavel Begunkov2e6e1fd2019-12-05 16:15:45 +03007523 * prevent a re-load down the line.
Jens Axboe9e645e112019-05-10 16:07:28 -06007524 */
7525static const struct io_uring_sqe *io_get_sqe(struct io_ring_ctx *ctx)
Jens Axboe9e645e112019-05-10 16:07:28 -06007526{
Pavel Begunkovea5ab3b2021-05-16 22:58:09 +01007527 unsigned head, mask = ctx->sq_entries - 1;
Pavel Begunkov17d3aeb2021-06-14 23:37:23 +01007528 unsigned sq_idx = ctx->cached_sq_head++ & mask;
Jens Axboe9e645e112019-05-10 16:07:28 -06007529
7530 /*
7531 * The cached sq head (or cq tail) serves two purposes:
7532 *
7533 * 1) allows us to batch the cost of updating the user visible
Pavel Begunkov9d763772019-12-17 02:22:07 +03007534 * head updates.
Jens Axboe9e645e112019-05-10 16:07:28 -06007535 * 2) allows the kernel side to track the head on its own, even
Pavel Begunkov8cdf2192020-01-25 00:40:24 +03007536 * though the application is the one updating it.
7537 */
Pavel Begunkov17d3aeb2021-06-14 23:37:23 +01007538 head = READ_ONCE(ctx->sq_array[sq_idx]);
Pavel Begunkov8cdf2192020-01-25 00:40:24 +03007539 if (likely(head < ctx->sq_entries))
7540 return &ctx->sq_sqes[head];
7541
7542 /* drop invalid entries */
Pavel Begunkovcc6b0962023-08-09 13:21:41 +01007543 spin_lock(&ctx->completion_lock);
Pavel Begunkov15641e42021-06-14 23:37:24 +01007544 ctx->cq_extra--;
Pavel Begunkovcc6b0962023-08-09 13:21:41 +01007545 spin_unlock(&ctx->completion_lock);
Pavel Begunkov15641e42021-06-14 23:37:24 +01007546 WRITE_ONCE(ctx->rings->sq_dropped,
7547 READ_ONCE(ctx->rings->sq_dropped) + 1);
Pavel Begunkov711be032020-01-17 03:57:59 +03007548 return NULL;
7549}
Jens Axboeb7bb4f72019-12-15 22:13:43 -07007550
Jens Axboe0f212202020-09-13 13:09:39 -06007551static int io_submit_sqes(struct io_ring_ctx *ctx, unsigned int nr)
Pavel Begunkov282cdc82021-08-09 13:04:10 +01007552 __must_hold(&ctx->uring_lock)
Jens Axboe6c271ce2019-01-10 11:22:30 -07007553{
Pavel Begunkov46c4e162021-02-18 18:29:37 +00007554 int submitted = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007555
Pavel Begunkovee7d46d2019-12-30 21:24:45 +03007556 /* make sure SQ entry isn't read before tail */
7557 nr = min3(nr, ctx->sq_entries, io_sqring_entries(ctx));
Pavel Begunkov2b85edf2019-12-28 14:13:03 +03007558 if (!percpu_ref_tryget_many(&ctx->refs, nr))
7559 return -EAGAIN;
Pavel Begunkov9a108672021-08-27 11:55:01 +01007560 io_get_task_refs(nr);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007561
Pavel Begunkovba88ff12021-02-10 00:03:11 +00007562 io_submit_state_start(&ctx->submit_state, nr);
Pavel Begunkov46c4e162021-02-18 18:29:37 +00007563 while (submitted < nr) {
Jens Axboe3529d8c2019-12-19 18:24:38 -07007564 const struct io_uring_sqe *sqe;
Pavel Begunkov196be952019-11-07 01:41:06 +03007565 struct io_kiocb *req;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03007566
Pavel Begunkov258b29a2021-02-10 00:03:10 +00007567 req = io_alloc_req(ctx);
Pavel Begunkov196be952019-11-07 01:41:06 +03007568 if (unlikely(!req)) {
7569 if (!submitted)
7570 submitted = -EAGAIN;
Pavel Begunkovfb5ccc92019-10-25 12:31:30 +03007571 break;
Jens Axboe9e645e112019-05-10 16:07:28 -06007572 }
Pavel Begunkov4fccfcb2021-02-12 11:55:17 +00007573 sqe = io_get_sqe(ctx);
7574 if (unlikely(!sqe)) {
Hao Xu0c6e1d72021-08-26 01:58:56 +08007575 list_add(&req->inflight_entry, &ctx->submit_state.free_list);
Pavel Begunkov4fccfcb2021-02-12 11:55:17 +00007576 break;
7577 }
Jens Axboed3656342019-12-18 09:50:26 -07007578 /* will complete beyond this point, count as submitted */
7579 submitted++;
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007580 if (io_submit_sqe(ctx, req, sqe))
Jens Axboed3656342019-12-18 09:50:26 -07007581 break;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007582 }
7583
Pavel Begunkov9466f432020-01-25 22:34:01 +03007584 if (unlikely(submitted != nr)) {
7585 int ref_used = (submitted == -EAGAIN) ? 0 : submitted;
Jens Axboed8a6df12020-10-15 16:24:45 -06007586 int unused = nr - ref_used;
Pavel Begunkov9466f432020-01-25 22:34:01 +03007587
Pavel Begunkov09899b12021-06-14 02:36:22 +01007588 current->io_uring->cached_refs += unused;
Jens Axboed8a6df12020-10-15 16:24:45 -06007589 percpu_ref_put_many(&ctx->refs, unused);
Pavel Begunkov9466f432020-01-25 22:34:01 +03007590 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07007591
Pavel Begunkova1ab7b32021-02-18 18:29:42 +00007592 io_submit_state_end(&ctx->submit_state, ctx);
Pavel Begunkovae9428c2019-11-06 00:22:14 +03007593 /* Commit SQ ring head once we've consumed and submitted all SQEs */
7594 io_commit_sqring(ctx);
7595
Jens Axboe6c271ce2019-01-10 11:22:30 -07007596 return submitted;
7597}
7598
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007599static inline bool io_sqd_events_pending(struct io_sq_data *sqd)
7600{
7601 return READ_ONCE(sqd->state);
7602}
7603
Xiaoguang Wang23b36282020-07-23 20:57:24 +08007604static inline void io_ring_set_wakeup_flag(struct io_ring_ctx *ctx)
7605{
7606 /* Tell userspace we may need a wakeup call */
Jens Axboe79ebeae2021-08-10 15:18:27 -06007607 spin_lock(&ctx->completion_lock);
Nadav Amit20c0b382021-08-07 17:13:42 -07007608 WRITE_ONCE(ctx->rings->sq_flags,
7609 ctx->rings->sq_flags | IORING_SQ_NEED_WAKEUP);
Jens Axboe79ebeae2021-08-10 15:18:27 -06007610 spin_unlock(&ctx->completion_lock);
Xiaoguang Wang23b36282020-07-23 20:57:24 +08007611}
7612
7613static inline void io_ring_clear_wakeup_flag(struct io_ring_ctx *ctx)
7614{
Jens Axboe79ebeae2021-08-10 15:18:27 -06007615 spin_lock(&ctx->completion_lock);
Nadav Amit20c0b382021-08-07 17:13:42 -07007616 WRITE_ONCE(ctx->rings->sq_flags,
7617 ctx->rings->sq_flags & ~IORING_SQ_NEED_WAKEUP);
Jens Axboe79ebeae2021-08-10 15:18:27 -06007618 spin_unlock(&ctx->completion_lock);
Xiaoguang Wang23b36282020-07-23 20:57:24 +08007619}
7620
Xiaoguang Wang08369242020-11-03 14:15:59 +08007621static int __io_sq_thread(struct io_ring_ctx *ctx, bool cap_entries)
Jens Axboe6c271ce2019-01-10 11:22:30 -07007622{
Jens Axboec8d1ba52020-09-14 11:07:26 -06007623 unsigned int to_submit;
Xiaoguang Wangbdcd3ea2020-02-25 22:12:08 +08007624 int ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007625
Jens Axboec8d1ba52020-09-14 11:07:26 -06007626 to_submit = io_sqring_entries(ctx);
Jens Axboee95eee22020-09-08 09:11:32 -06007627 /* if we're handling multiple rings, cap submit size for fairness */
Olivier Langlois4ce8ad92021-06-23 11:50:18 -07007628 if (cap_entries && to_submit > IORING_SQPOLL_CAP_ENTRIES_VALUE)
7629 to_submit = IORING_SQPOLL_CAP_ENTRIES_VALUE;
Jens Axboee95eee22020-09-08 09:11:32 -06007630
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007631 if (!list_empty(&ctx->iopoll_list) || to_submit) {
7632 unsigned nr_events = 0;
Pavel Begunkov948e1942021-06-24 15:09:55 +01007633 const struct cred *creds = NULL;
7634
7635 if (ctx->sq_creds != current_cred())
7636 creds = override_creds(ctx->sq_creds);
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007637
Xiaoguang Wang08369242020-11-03 14:15:59 +08007638 mutex_lock(&ctx->uring_lock);
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007639 if (!list_empty(&ctx->iopoll_list))
Pavel Begunkova8576af2021-08-15 10:40:21 +01007640 io_do_iopoll(ctx, &nr_events, 0);
Xiaoguang Wang906a3c62020-11-12 14:56:00 +08007641
Pavel Begunkov3b763ba2021-04-18 14:52:08 +01007642 /*
7643 * Don't submit if refs are dying, good for io_uring_register(),
7644 * but also it is relied upon by io_ring_exit_work()
7645 */
Pavel Begunkov0298ef92021-03-08 13:20:57 +00007646 if (to_submit && likely(!percpu_ref_is_dying(&ctx->refs)) &&
7647 !(ctx->flags & IORING_SETUP_R_DISABLED))
Xiaoguang Wang08369242020-11-03 14:15:59 +08007648 ret = io_submit_sqes(ctx, to_submit);
7649 mutex_unlock(&ctx->uring_lock);
Jens Axboe90554202020-09-03 12:12:41 -06007650
Pavel Begunkovacfb3812021-05-16 22:58:03 +01007651 if (to_submit && wq_has_sleeper(&ctx->sqo_sq_wait))
7652 wake_up(&ctx->sqo_sq_wait);
Pavel Begunkov948e1942021-06-24 15:09:55 +01007653 if (creds)
7654 revert_creds(creds);
Pavel Begunkovacfb3812021-05-16 22:58:03 +01007655 }
Jens Axboe90554202020-09-03 12:12:41 -06007656
Xiaoguang Wang08369242020-11-03 14:15:59 +08007657 return ret;
7658}
7659
7660static void io_sqd_update_thread_idle(struct io_sq_data *sqd)
7661{
7662 struct io_ring_ctx *ctx;
7663 unsigned sq_thread_idle = 0;
7664
Pavel Begunkovc9dca272021-03-10 13:13:55 +00007665 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
7666 sq_thread_idle = max(sq_thread_idle, ctx->sq_thread_idle);
Xiaoguang Wang08369242020-11-03 14:15:59 +08007667 sqd->sq_thread_idle = sq_thread_idle;
Jens Axboec8d1ba52020-09-14 11:07:26 -06007668}
7669
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007670static bool io_sqd_handle_event(struct io_sq_data *sqd)
7671{
7672 bool did_sig = false;
7673 struct ksignal ksig;
7674
7675 if (test_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state) ||
7676 signal_pending(current)) {
7677 mutex_unlock(&sqd->lock);
7678 if (signal_pending(current))
7679 did_sig = get_signal(&ksig);
7680 cond_resched();
7681 mutex_lock(&sqd->lock);
7682 }
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007683 return did_sig || test_bit(IO_SQ_THREAD_SHOULD_STOP, &sqd->state);
7684}
7685
Jens Axboe6c271ce2019-01-10 11:22:30 -07007686static int io_sq_thread(void *data)
7687{
Jens Axboe69fb2132020-09-14 11:16:23 -06007688 struct io_sq_data *sqd = data;
7689 struct io_ring_ctx *ctx;
Xiaoguang Wanga0d92052020-11-12 14:55:59 +08007690 unsigned long timeout = 0;
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007691 char buf[TASK_COMM_LEN];
Xiaoguang Wang08369242020-11-03 14:15:59 +08007692 DEFINE_WAIT(wait);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007693
Pavel Begunkov696ee882021-04-01 09:55:04 +01007694 snprintf(buf, sizeof(buf), "iou-sqp-%d", sqd->task_pid);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007695 set_task_comm(current, buf);
Jens Axboe28cea78a2020-09-14 10:51:17 -06007696
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007697 if (sqd->sq_cpu != -1)
7698 set_cpus_allowed_ptr(current, cpumask_of(sqd->sq_cpu));
7699 else
7700 set_cpus_allowed_ptr(current, cpu_online_mask);
7701 current->flags |= PF_NO_SETAFFINITY;
7702
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00007703 mutex_lock(&sqd->lock);
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007704 while (1) {
Pavel Begunkov1a924a82021-06-24 15:09:56 +01007705 bool cap_entries, sqt_spin = false;
Jens Axboec1edbf52019-11-10 16:56:04 -07007706
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007707 if (io_sqd_events_pending(sqd) || signal_pending(current)) {
7708 if (io_sqd_handle_event(sqd))
Pavel Begunkovc7d95612021-04-13 11:43:00 +01007709 break;
Xiaoguang Wang08369242020-11-03 14:15:59 +08007710 timeout = jiffies + sqd->sq_thread_idle;
7711 }
Pavel Begunkove4b6d902021-05-16 22:58:00 +01007712
Jens Axboee95eee22020-09-08 09:11:32 -06007713 cap_entries = !list_is_singular(&sqd->ctx_list);
Jens Axboe69fb2132020-09-14 11:16:23 -06007714 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list) {
Pavel Begunkov948e1942021-06-24 15:09:55 +01007715 int ret = __io_sq_thread(ctx, cap_entries);
Stefan Metzmacher7c30f36a2021-03-07 11:54:28 +01007716
Xiaoguang Wang08369242020-11-03 14:15:59 +08007717 if (!sqt_spin && (ret > 0 || !list_empty(&ctx->iopoll_list)))
7718 sqt_spin = true;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007719 }
Pavel Begunkovdd432ea52021-06-26 21:40:45 +01007720 if (io_run_task_work())
7721 sqt_spin = true;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007722
Xiaoguang Wang08369242020-11-03 14:15:59 +08007723 if (sqt_spin || !time_after(jiffies, timeout)) {
Jens Axboec8d1ba52020-09-14 11:07:26 -06007724 cond_resched();
Xiaoguang Wang08369242020-11-03 14:15:59 +08007725 if (sqt_spin)
7726 timeout = jiffies + sqd->sq_thread_idle;
7727 continue;
7728 }
7729
Xiaoguang Wang08369242020-11-03 14:15:59 +08007730 prepare_to_wait(&sqd->wait, &wait, TASK_INTERRUPTIBLE);
Pavel Begunkovdd432ea52021-06-26 21:40:45 +01007731 if (!io_sqd_events_pending(sqd) && !current->task_works) {
Pavel Begunkov1a924a82021-06-24 15:09:56 +01007732 bool needs_sched = true;
7733
Hao Xu724cb4f2021-04-21 23:19:11 +08007734 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list) {
Pavel Begunkovaaa9f0f2021-05-16 22:58:01 +01007735 io_ring_set_wakeup_flag(ctx);
7736
Hao Xu724cb4f2021-04-21 23:19:11 +08007737 if ((ctx->flags & IORING_SETUP_IOPOLL) &&
7738 !list_empty_careful(&ctx->iopoll_list)) {
7739 needs_sched = false;
7740 break;
7741 }
7742 if (io_sqring_entries(ctx)) {
7743 needs_sched = false;
7744 break;
7745 }
7746 }
7747
7748 if (needs_sched) {
7749 mutex_unlock(&sqd->lock);
7750 schedule();
7751 mutex_lock(&sqd->lock);
7752 }
Jens Axboe69fb2132020-09-14 11:16:23 -06007753 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
7754 io_ring_clear_wakeup_flag(ctx);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007755 }
Xiaoguang Wang08369242020-11-03 14:15:59 +08007756
7757 finish_wait(&sqd->wait, &wait);
7758 timeout = jiffies + sqd->sq_thread_idle;
Jens Axboe6c271ce2019-01-10 11:22:30 -07007759 }
7760
Pavel Begunkov78cc6872021-06-14 02:36:23 +01007761 io_uring_cancel_generic(true, sqd);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007762 sqd->thread = NULL;
Jens Axboe05962f92021-03-06 13:58:48 -07007763 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
Jens Axboe5f3f26f2021-02-25 10:17:46 -07007764 io_ring_set_wakeup_flag(ctx);
Pavel Begunkov521d6a72021-03-11 23:29:38 +00007765 io_run_task_work();
Pavel Begunkov734551d2021-04-18 14:52:09 +01007766 mutex_unlock(&sqd->lock);
7767
Jens Axboe37d1e2e2021-02-17 21:03:43 -07007768 complete(&sqd->exited);
7769 do_exit(0);
Jens Axboe6c271ce2019-01-10 11:22:30 -07007770}
7771
Jens Axboebda52162019-09-24 13:47:15 -06007772struct io_wait_queue {
7773 struct wait_queue_entry wq;
7774 struct io_ring_ctx *ctx;
Jens Axboe5fd46172021-08-06 14:04:31 -06007775 unsigned cq_tail;
Jens Axboebda52162019-09-24 13:47:15 -06007776 unsigned nr_timeouts;
7777};
7778
Pavel Begunkov6c503152021-01-04 20:36:36 +00007779static inline bool io_should_wake(struct io_wait_queue *iowq)
Jens Axboebda52162019-09-24 13:47:15 -06007780{
7781 struct io_ring_ctx *ctx = iowq->ctx;
Jens Axboe5fd46172021-08-06 14:04:31 -06007782 int dist = ctx->cached_cq_tail - (int) iowq->cq_tail;
Jens Axboebda52162019-09-24 13:47:15 -06007783
7784 /*
Brian Gianforcarod195a662019-12-13 03:09:50 -08007785 * Wake up if we have enough events, or if a timeout occurred since we
Jens Axboebda52162019-09-24 13:47:15 -06007786 * started waiting. For timeouts, we always want to return to userspace,
7787 * regardless of event count.
7788 */
Jens Axboe5fd46172021-08-06 14:04:31 -06007789 return dist >= 0 || atomic_read(&ctx->cq_timeouts) != iowq->nr_timeouts;
Jens Axboebda52162019-09-24 13:47:15 -06007790}
7791
7792static int io_wake_function(struct wait_queue_entry *curr, unsigned int mode,
7793 int wake_flags, void *key)
7794{
7795 struct io_wait_queue *iowq = container_of(curr, struct io_wait_queue,
7796 wq);
7797
Pavel Begunkov6c503152021-01-04 20:36:36 +00007798 /*
7799 * Cannot safely flush overflowed CQEs from here, ensure we wake up
7800 * the task, and the next invocation will do it.
7801 */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01007802 if (io_should_wake(iowq) || test_bit(0, &iowq->ctx->check_cq_overflow))
Pavel Begunkov6c503152021-01-04 20:36:36 +00007803 return autoremove_wake_function(curr, mode, wake_flags, key);
7804 return -1;
Jens Axboebda52162019-09-24 13:47:15 -06007805}
7806
Jens Axboeaf9c1a42020-09-24 13:32:18 -06007807static int io_run_task_work_sig(void)
7808{
7809 if (io_run_task_work())
7810 return 1;
7811 if (!signal_pending(current))
7812 return 0;
Jens Axboe0b8cfa92021-03-21 14:16:08 -06007813 if (test_thread_flag(TIF_NOTIFY_SIGNAL))
Jens Axboe792ee0f62020-10-22 20:17:18 -06007814 return -ERESTARTSYS;
Jens Axboeaf9c1a42020-09-24 13:32:18 -06007815 return -EINTR;
7816}
7817
Jens Axboec12fa4a2023-08-01 08:39:47 -06007818static bool current_pending_io(void)
7819{
7820 struct io_uring_task *tctx = current->io_uring;
7821
7822 if (!tctx)
7823 return false;
7824 return percpu_counter_read_positive(&tctx->inflight);
7825}
7826
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007827/* when returns >0, the caller should retry */
7828static inline int io_cqring_wait_schedule(struct io_ring_ctx *ctx,
7829 struct io_wait_queue *iowq,
Pavel Begunkovc3222fd2023-01-05 10:49:15 +00007830 ktime_t *timeout)
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007831{
Jens Axboec12fa4a2023-08-01 08:39:47 -06007832 int io_wait, ret;
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007833
7834 /* make sure we run task_work before checking for signals */
7835 ret = io_run_task_work_sig();
7836 if (ret || io_should_wake(iowq))
7837 return ret;
7838 /* let the caller flush overflows, retry */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01007839 if (test_bit(0, &ctx->check_cq_overflow))
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007840 return 1;
7841
Andres Freundf8307d82023-07-16 12:07:03 -06007842 /*
Jens Axboec12fa4a2023-08-01 08:39:47 -06007843 * Mark us as being in io_wait if we have pending requests, so cpufreq
7844 * can take into account that the task is waiting for IO - turns out
7845 * to be important for low QD IO.
Andres Freundf8307d82023-07-16 12:07:03 -06007846 */
Jens Axboec12fa4a2023-08-01 08:39:47 -06007847 io_wait = current->in_iowait;
7848 if (current_pending_io())
7849 current->in_iowait = 1;
Andres Freundf8307d82023-07-16 12:07:03 -06007850 ret = 1;
Pavel Begunkovc3222fd2023-01-05 10:49:15 +00007851 if (!schedule_hrtimeout(timeout, HRTIMER_MODE_ABS))
Andres Freundf8307d82023-07-16 12:07:03 -06007852 ret = -ETIME;
Jens Axboec12fa4a2023-08-01 08:39:47 -06007853 current->in_iowait = io_wait;
Andres Freundf8307d82023-07-16 12:07:03 -06007854 return ret;
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007855}
7856
Jens Axboe2b188cc2019-01-07 10:46:33 -07007857/*
7858 * Wait until events become available, if we don't already have some. The
7859 * application must reap them itself, as they reside on the shared cq ring.
7860 */
7861static int io_cqring_wait(struct io_ring_ctx *ctx, int min_events,
Hao Xuc73ebb62020-11-03 10:54:37 +08007862 const sigset_t __user *sig, size_t sigsz,
7863 struct __kernel_timespec __user *uts)
Jens Axboe2b188cc2019-01-07 10:46:33 -07007864{
Pavel Begunkov902910992021-08-09 09:07:32 -06007865 struct io_wait_queue iowq;
Hristo Venev75b28af2019-08-26 17:23:46 +00007866 struct io_rings *rings = ctx->rings;
Jens Axboe7c834372022-02-21 05:49:30 -07007867 ktime_t timeout = KTIME_MAX;
Pavel Begunkovc1d5a222021-02-04 13:51:57 +00007868 int ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007869
Jens Axboeb41e9852020-02-17 09:52:41 -07007870 do {
Pavel Begunkov90f67362021-08-09 20:18:12 +01007871 io_cqring_overflow_flush(ctx);
Pavel Begunkov6c503152021-01-04 20:36:36 +00007872 if (io_cqring_events(ctx) >= min_events)
Jens Axboeb41e9852020-02-17 09:52:41 -07007873 return 0;
Jens Axboe4c6e2772020-07-01 11:29:10 -06007874 if (!io_run_task_work())
Jens Axboeb41e9852020-02-17 09:52:41 -07007875 break;
Jens Axboeb41e9852020-02-17 09:52:41 -07007876 } while (1);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007877
Xiaoguang Wang44df58d2021-09-14 22:38:52 +08007878 if (uts) {
7879 struct timespec64 ts;
7880
7881 if (get_timespec64(&ts, uts))
7882 return -EFAULT;
Jens Axboe7c834372022-02-21 05:49:30 -07007883 timeout = ktime_add_ns(timespec64_to_ktime(ts), ktime_get_ns());
Xiaoguang Wang44df58d2021-09-14 22:38:52 +08007884 }
7885
Jens Axboe2b188cc2019-01-07 10:46:33 -07007886 if (sig) {
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01007887#ifdef CONFIG_COMPAT
7888 if (in_compat_syscall())
7889 ret = set_compat_user_sigmask((const compat_sigset_t __user *)sig,
Oleg Nesterovb7724342019-07-16 16:29:53 -07007890 sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01007891 else
7892#endif
Oleg Nesterovb7724342019-07-16 16:29:53 -07007893 ret = set_user_sigmask(sig, sigsz);
Arnd Bergmann9e75ad52019-03-25 15:34:53 +01007894
Jens Axboe2b188cc2019-01-07 10:46:33 -07007895 if (ret)
7896 return ret;
7897 }
7898
Pavel Begunkov902910992021-08-09 09:07:32 -06007899 init_waitqueue_func_entry(&iowq.wq, io_wake_function);
7900 iowq.wq.private = current;
7901 INIT_LIST_HEAD(&iowq.wq.entry);
7902 iowq.ctx = ctx;
Jens Axboebda52162019-09-24 13:47:15 -06007903 iowq.nr_timeouts = atomic_read(&ctx->cq_timeouts);
Jens Axboe5fd46172021-08-06 14:04:31 -06007904 iowq.cq_tail = READ_ONCE(ctx->rings->cq.head) + min_events;
Pavel Begunkov902910992021-08-09 09:07:32 -06007905
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +02007906 trace_io_uring_cqring_wait(ctx, min_events);
Jens Axboebda52162019-09-24 13:47:15 -06007907 do {
Jens Axboeca0a2652021-03-04 17:15:48 -07007908 /* if we can't even flush overflow, don't wait for more */
Pavel Begunkov90f67362021-08-09 20:18:12 +01007909 if (!io_cqring_overflow_flush(ctx)) {
Jens Axboeca0a2652021-03-04 17:15:48 -07007910 ret = -EBUSY;
7911 break;
7912 }
Pavel Begunkov311997b2021-06-14 23:37:28 +01007913 prepare_to_wait_exclusive(&ctx->cq_wait, &iowq.wq,
Jens Axboebda52162019-09-24 13:47:15 -06007914 TASK_INTERRUPTIBLE);
Pavel Begunkovc3222fd2023-01-05 10:49:15 +00007915 ret = io_cqring_wait_schedule(ctx, &iowq, &timeout);
Pavel Begunkov311997b2021-06-14 23:37:28 +01007916 finish_wait(&ctx->cq_wait, &iowq.wq);
Jens Axboeca0a2652021-03-04 17:15:48 -07007917 cond_resched();
Pavel Begunkoveeb60b92021-02-04 13:51:58 +00007918 } while (ret > 0);
Jens Axboebda52162019-09-24 13:47:15 -06007919
Jens Axboeb7db41c2020-07-04 08:55:50 -06007920 restore_saved_sigmask_unless(ret == -EINTR);
Jens Axboe2b188cc2019-01-07 10:46:33 -07007921
Hristo Venev75b28af2019-08-26 17:23:46 +00007922 return READ_ONCE(rings->cq.head) == READ_ONCE(rings->cq.tail) ? ret : 0;
Jens Axboe2b188cc2019-01-07 10:46:33 -07007923}
7924
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007925static void io_free_page_table(void **table, size_t size)
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01007926{
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007927 unsigned i, nr_tables = DIV_ROUND_UP(size, PAGE_SIZE);
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01007928
7929 for (i = 0; i < nr_tables; i++)
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007930 kfree(table[i]);
7931 kfree(table);
7932}
7933
7934static void **io_alloc_page_table(size_t size)
7935{
7936 unsigned i, nr_tables = DIV_ROUND_UP(size, PAGE_SIZE);
7937 size_t init_size = size;
7938 void **table;
7939
Pavel Begunkov0bea96f2021-08-20 10:36:36 +01007940 table = kcalloc(nr_tables, sizeof(*table), GFP_KERNEL_ACCOUNT);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007941 if (!table)
7942 return NULL;
7943
7944 for (i = 0; i < nr_tables; i++) {
Pavel Begunkov27f6b312021-06-15 13:20:13 +01007945 unsigned int this_size = min_t(size_t, size, PAGE_SIZE);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007946
Pavel Begunkov0bea96f2021-08-20 10:36:36 +01007947 table[i] = kzalloc(this_size, GFP_KERNEL_ACCOUNT);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01007948 if (!table[i]) {
7949 io_free_page_table(table, init_size);
7950 return NULL;
7951 }
7952 size -= this_size;
7953 }
7954 return table;
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01007955}
7956
Pavel Begunkov28a9fe22021-04-01 15:43:47 +01007957static void io_rsrc_node_destroy(struct io_rsrc_node *ref_node)
7958{
7959 percpu_ref_exit(&ref_node->refs);
7960 kfree(ref_node);
7961}
7962
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007963static void io_rsrc_node_ref_zero(struct percpu_ref *ref)
7964{
7965 struct io_rsrc_node *node = container_of(ref, struct io_rsrc_node, refs);
7966 struct io_ring_ctx *ctx = node->rsrc_data->ctx;
7967 unsigned long flags;
7968 bool first_add = false;
Dylan Yudaken82cc3382022-01-21 04:38:56 -08007969 unsigned long delay = HZ;
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007970
7971 spin_lock_irqsave(&ctx->rsrc_ref_lock, flags);
7972 node->done = true;
7973
Dylan Yudaken82cc3382022-01-21 04:38:56 -08007974 /* if we are mid-quiesce then do not delay */
7975 if (node->rsrc_data->quiesce)
7976 delay = 0;
7977
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007978 while (!list_empty(&ctx->rsrc_ref_list)) {
7979 node = list_first_entry(&ctx->rsrc_ref_list,
7980 struct io_rsrc_node, node);
7981 /* recycle ref nodes in order */
7982 if (!node->done)
7983 break;
7984 list_del(&node->node);
7985 first_add |= llist_add(&node->llist, &ctx->rsrc_put_llist);
7986 }
7987 spin_unlock_irqrestore(&ctx->rsrc_ref_lock, flags);
7988
7989 if (first_add)
Dylan Yudaken82cc3382022-01-21 04:38:56 -08007990 mod_delayed_work(system_wq, &ctx->rsrc_put_work, delay);
Pavel Begunkovb9bd2be2021-08-09 09:09:47 -06007991}
7992
7993static struct io_rsrc_node *io_rsrc_node_alloc(struct io_ring_ctx *ctx)
7994{
7995 struct io_rsrc_node *ref_node;
7996
7997 ref_node = kzalloc(sizeof(*ref_node), GFP_KERNEL);
7998 if (!ref_node)
7999 return NULL;
8000
8001 if (percpu_ref_init(&ref_node->refs, io_rsrc_node_ref_zero,
8002 0, GFP_KERNEL)) {
8003 kfree(ref_node);
8004 return NULL;
8005 }
8006 INIT_LIST_HEAD(&ref_node->node);
8007 INIT_LIST_HEAD(&ref_node->rsrc_list);
8008 ref_node->done = false;
8009 return ref_node;
8010}
8011
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008012static void io_rsrc_node_switch(struct io_ring_ctx *ctx,
8013 struct io_rsrc_data *data_to_kill)
Pavel Begunkov1642b442020-12-30 21:34:14 +00008014{
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008015 WARN_ON_ONCE(!ctx->rsrc_backup_node);
8016 WARN_ON_ONCE(data_to_kill && !ctx->rsrc_node);
Pavel Begunkov82fbcfa2021-04-01 15:43:43 +01008017
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008018 if (data_to_kill) {
8019 struct io_rsrc_node *rsrc_node = ctx->rsrc_node;
Pavel Begunkov82fbcfa2021-04-01 15:43:43 +01008020
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008021 rsrc_node->rsrc_data = data_to_kill;
Jens Axboe4956b9e2021-08-09 07:49:41 -06008022 spin_lock_irq(&ctx->rsrc_ref_lock);
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008023 list_add_tail(&rsrc_node->node, &ctx->rsrc_ref_list);
Jens Axboe4956b9e2021-08-09 07:49:41 -06008024 spin_unlock_irq(&ctx->rsrc_ref_lock);
Pavel Begunkov82fbcfa2021-04-01 15:43:43 +01008025
Pavel Begunkov3e942492021-04-11 01:46:34 +01008026 atomic_inc(&data_to_kill->refs);
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008027 percpu_ref_kill(&rsrc_node->refs);
8028 ctx->rsrc_node = NULL;
8029 }
8030
8031 if (!ctx->rsrc_node) {
8032 ctx->rsrc_node = ctx->rsrc_backup_node;
8033 ctx->rsrc_backup_node = NULL;
8034 }
Pavel Begunkov1642b442020-12-30 21:34:14 +00008035}
8036
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008037static int io_rsrc_node_switch_start(struct io_ring_ctx *ctx)
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00008038{
8039 if (ctx->rsrc_backup_node)
8040 return 0;
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008041 ctx->rsrc_backup_node = io_rsrc_node_alloc(ctx);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00008042 return ctx->rsrc_backup_node ? 0 : -ENOMEM;
8043}
8044
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +01008045static int io_rsrc_ref_quiesce(struct io_rsrc_data *data, struct io_ring_ctx *ctx)
Hao Xu8bad28d2021-02-19 17:19:36 +08008046{
8047 int ret;
Xiaoguang Wang05589552020-03-31 14:05:18 +08008048
Pavel Begunkov215c3902021-04-01 15:43:48 +01008049 /* As we may drop ->uring_lock, other task may have started quiesce */
Hao Xu8bad28d2021-02-19 17:19:36 +08008050 if (data->quiesce)
8051 return -ENXIO;
8052
8053 data->quiesce = true;
Pavel Begunkov1ffc5422020-12-30 21:34:15 +00008054 do {
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008055 ret = io_rsrc_node_switch_start(ctx);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00008056 if (ret)
Pavel Begunkovf2303b12021-02-20 18:03:49 +00008057 break;
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008058 io_rsrc_node_switch(ctx, data);
8059
Pavel Begunkov3e942492021-04-11 01:46:34 +01008060 /* kill initial ref, already quiesced if zero */
8061 if (atomic_dec_and_test(&data->refs))
8062 break;
Jens Axboec018db42021-08-09 08:15:50 -06008063 mutex_unlock(&ctx->uring_lock);
Hao Xu8bad28d2021-02-19 17:19:36 +08008064 flush_delayed_work(&ctx->rsrc_put_work);
Pavel Begunkov1ffc5422020-12-30 21:34:15 +00008065 ret = wait_for_completion_interruptible(&data->done);
Jens Axboec018db42021-08-09 08:15:50 -06008066 if (!ret) {
8067 mutex_lock(&ctx->uring_lock);
Dylan Yudaken0d773aa2022-02-22 08:17:51 -08008068 if (atomic_read(&data->refs) > 0) {
8069 /*
8070 * it has been revived by another thread while
8071 * we were unlocked
8072 */
8073 mutex_unlock(&ctx->uring_lock);
8074 } else {
8075 break;
8076 }
Jens Axboec018db42021-08-09 08:15:50 -06008077 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008078
Pavel Begunkov3e942492021-04-11 01:46:34 +01008079 atomic_inc(&data->refs);
8080 /* wait for all works potentially completing data->done */
8081 flush_delayed_work(&ctx->rsrc_put_work);
Jens Axboecb5e1b82021-02-25 07:37:35 -07008082 reinit_completion(&data->done);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00008083
Hao Xu8bad28d2021-02-19 17:19:36 +08008084 ret = io_run_task_work_sig();
8085 mutex_lock(&ctx->uring_lock);
Pavel Begunkovf2303b12021-02-20 18:03:49 +00008086 } while (ret >= 0);
Hao Xu8bad28d2021-02-19 17:19:36 +08008087 data->quiesce = false;
8088
Hao Xu8bad28d2021-02-19 17:19:36 +08008089 return ret;
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008090}
8091
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008092static u64 *io_get_tag_slot(struct io_rsrc_data *data, unsigned int idx)
8093{
8094 unsigned int off = idx & IO_RSRC_TAG_TABLE_MASK;
8095 unsigned int table_idx = idx >> IO_RSRC_TAG_TABLE_SHIFT;
8096
8097 return &data->tags[table_idx][off];
8098}
8099
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008100static void io_rsrc_data_free(struct io_rsrc_data *data)
8101{
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008102 size_t size = data->nr * sizeof(data->tags[0][0]);
8103
8104 if (data->tags)
8105 io_free_page_table((void **)data->tags, size);
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008106 kfree(data);
8107}
8108
Pavel Begunkovd878c812021-06-14 02:36:18 +01008109static int io_rsrc_data_alloc(struct io_ring_ctx *ctx, rsrc_put_fn *do_put,
8110 u64 __user *utags, unsigned nr,
8111 struct io_rsrc_data **pdata)
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008112{
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008113 struct io_rsrc_data *data;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008114 int ret = -ENOMEM;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008115 unsigned i;
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008116
8117 data = kzalloc(sizeof(*data), GFP_KERNEL);
8118 if (!data)
Pavel Begunkovd878c812021-06-14 02:36:18 +01008119 return -ENOMEM;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008120 data->tags = (u64 **)io_alloc_page_table(nr * sizeof(data->tags[0][0]));
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008121 if (!data->tags) {
8122 kfree(data);
Pavel Begunkovd878c812021-06-14 02:36:18 +01008123 return -ENOMEM;
8124 }
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008125
8126 data->nr = nr;
8127 data->ctx = ctx;
8128 data->do_put = do_put;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008129 if (utags) {
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008130 ret = -EFAULT;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008131 for (i = 0; i < nr; i++) {
Colin Ian Kingfdd1dc32021-06-15 14:00:11 +01008132 u64 *tag_slot = io_get_tag_slot(data, i);
8133
8134 if (copy_from_user(tag_slot, &utags[i],
8135 sizeof(*tag_slot)))
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008136 goto fail;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008137 }
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008138 }
8139
Pavel Begunkov3e942492021-04-11 01:46:34 +01008140 atomic_set(&data->refs, 1);
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008141 init_completion(&data->done);
Pavel Begunkovd878c812021-06-14 02:36:18 +01008142 *pdata = data;
8143 return 0;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008144fail:
8145 io_rsrc_data_free(data);
8146 return ret;
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008147}
8148
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008149static bool io_alloc_file_tables(struct io_file_table *table, unsigned nr_files)
8150{
Pavel Begunkov0bea96f2021-08-20 10:36:36 +01008151 table->files = kvcalloc(nr_files, sizeof(table->files[0]),
8152 GFP_KERNEL_ACCOUNT);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008153 return !!table->files;
8154}
8155
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008156static void io_free_file_tables(struct io_file_table *table)
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008157{
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008158 kvfree(table->files);
Pavel Begunkov9123c8f2021-06-14 02:36:20 +01008159 table->files = NULL;
8160}
8161
Jens Axboe2b188cc2019-01-07 10:46:33 -07008162static void __io_sqe_files_unregister(struct io_ring_ctx *ctx)
8163{
8164#if defined(CONFIG_UNIX)
8165 if (ctx->ring_sock) {
8166 struct sock *sock = ctx->ring_sock->sk;
8167 struct sk_buff *skb;
8168
8169 while ((skb = skb_dequeue(&sock->sk_receive_queue)) != NULL)
8170 kfree_skb(skb);
8171 }
8172#else
8173 int i;
8174
8175 for (i = 0; i < ctx->nr_user_files; i++) {
8176 struct file *file;
8177
8178 file = io_file_from_index(ctx, i);
8179 if (file)
8180 fput(file);
8181 }
8182#endif
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008183 io_free_file_tables(&ctx->file_table);
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008184 io_rsrc_data_free(ctx->file_data);
Pavel Begunkovfff4db72021-04-25 14:32:15 +01008185 ctx->file_data = NULL;
8186 ctx->nr_user_files = 0;
Bijan Mottahedeh1ad555c2021-01-15 17:37:51 +00008187}
8188
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008189static int io_sqe_files_unregister(struct io_ring_ctx *ctx)
8190{
Pavel Begunkovb1e7cad2022-06-13 06:32:44 +01008191 unsigned nr = ctx->nr_user_files;
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008192 int ret;
8193
Pavel Begunkov08480402021-04-13 02:58:38 +01008194 if (!ctx->file_data)
Bijan Mottahedehd7954b22021-01-15 17:37:50 +00008195 return -ENXIO;
Pavel Begunkovb1e7cad2022-06-13 06:32:44 +01008196
8197 /*
8198 * Quiesce may unlock ->uring_lock, and while it's not held
8199 * prevent new requests using the table.
8200 */
8201 ctx->nr_user_files = 0;
Pavel Begunkov08480402021-04-13 02:58:38 +01008202 ret = io_rsrc_ref_quiesce(ctx->file_data, ctx);
Pavel Begunkovb1e7cad2022-06-13 06:32:44 +01008203 ctx->nr_user_files = nr;
Pavel Begunkov08480402021-04-13 02:58:38 +01008204 if (!ret)
8205 __io_sqe_files_unregister(ctx);
8206 return ret;
Jens Axboe6b063142019-01-10 22:13:58 -07008207}
8208
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008209static void io_sq_thread_unpark(struct io_sq_data *sqd)
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008210 __releases(&sqd->lock)
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008211{
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008212 WARN_ON_ONCE(sqd->thread == current);
8213
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008214 /*
8215 * Do the dance but not conditional clear_bit() because it'd race with
8216 * other threads incrementing park_pending and setting the bit.
8217 */
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008218 clear_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state);
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008219 if (atomic_dec_return(&sqd->park_pending))
8220 set_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008221 mutex_unlock(&sqd->lock);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008222}
8223
Jens Axboe86e0d672021-03-05 08:44:39 -07008224static void io_sq_thread_park(struct io_sq_data *sqd)
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008225 __acquires(&sqd->lock)
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008226{
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008227 WARN_ON_ONCE(sqd->thread == current);
8228
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008229 atomic_inc(&sqd->park_pending);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008230 set_bit(IO_SQ_THREAD_SHOULD_PARK, &sqd->state);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008231 mutex_lock(&sqd->lock);
Jens Axboe05962f92021-03-06 13:58:48 -07008232 if (sqd->thread)
Jens Axboe86e0d672021-03-05 08:44:39 -07008233 wake_up_process(sqd->thread);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008234}
8235
8236static void io_sq_thread_stop(struct io_sq_data *sqd)
8237{
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008238 WARN_ON_ONCE(sqd->thread == current);
Pavel Begunkov88885f62021-04-11 01:46:38 +01008239 WARN_ON_ONCE(test_bit(IO_SQ_THREAD_SHOULD_STOP, &sqd->state));
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008240
Jens Axboe05962f92021-03-06 13:58:48 -07008241 set_bit(IO_SQ_THREAD_SHOULD_STOP, &sqd->state);
Pavel Begunkov88885f62021-04-11 01:46:38 +01008242 mutex_lock(&sqd->lock);
Jens Axboee8f98f242021-03-09 16:32:13 -07008243 if (sqd->thread)
8244 wake_up_process(sqd->thread);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008245 mutex_unlock(&sqd->lock);
Jens Axboe05962f92021-03-06 13:58:48 -07008246 wait_for_completion(&sqd->exited);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008247}
8248
Jens Axboe534ca6d2020-09-02 13:52:19 -06008249static void io_put_sq_data(struct io_sq_data *sqd)
Jens Axboe6c271ce2019-01-10 11:22:30 -07008250{
Jens Axboe534ca6d2020-09-02 13:52:19 -06008251 if (refcount_dec_and_test(&sqd->refs)) {
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008252 WARN_ON_ONCE(atomic_read(&sqd->park_pending));
8253
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008254 io_sq_thread_stop(sqd);
8255 kfree(sqd);
8256 }
8257}
8258
8259static void io_sq_thread_finish(struct io_ring_ctx *ctx)
8260{
8261 struct io_sq_data *sqd = ctx->sq_data;
8262
8263 if (sqd) {
Jens Axboe05962f92021-03-06 13:58:48 -07008264 io_sq_thread_park(sqd);
Pavel Begunkov521d6a72021-03-11 23:29:38 +00008265 list_del_init(&ctx->sqd_list);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008266 io_sqd_update_thread_idle(sqd);
Jens Axboe05962f92021-03-06 13:58:48 -07008267 io_sq_thread_unpark(sqd);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008268
8269 io_put_sq_data(sqd);
8270 ctx->sq_data = NULL;
Jens Axboe534ca6d2020-09-02 13:52:19 -06008271 }
8272}
8273
Jens Axboeaa061652020-09-02 14:50:27 -06008274static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
8275{
8276 struct io_ring_ctx *ctx_attach;
8277 struct io_sq_data *sqd;
8278 struct fd f;
8279
8280 f = fdget(p->wq_fd);
8281 if (!f.file)
8282 return ERR_PTR(-ENXIO);
8283 if (f.file->f_op != &io_uring_fops) {
8284 fdput(f);
8285 return ERR_PTR(-EINVAL);
8286 }
8287
8288 ctx_attach = f.file->private_data;
8289 sqd = ctx_attach->sq_data;
8290 if (!sqd) {
8291 fdput(f);
8292 return ERR_PTR(-EINVAL);
8293 }
Jens Axboe5c2469e2021-03-11 10:17:56 -07008294 if (sqd->task_tgid != current->tgid) {
8295 fdput(f);
8296 return ERR_PTR(-EPERM);
8297 }
Jens Axboeaa061652020-09-02 14:50:27 -06008298
8299 refcount_inc(&sqd->refs);
8300 fdput(f);
8301 return sqd;
8302}
8303
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008304static struct io_sq_data *io_get_sq_data(struct io_uring_params *p,
8305 bool *attached)
Jens Axboe534ca6d2020-09-02 13:52:19 -06008306{
8307 struct io_sq_data *sqd;
8308
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008309 *attached = false;
Jens Axboe5c2469e2021-03-11 10:17:56 -07008310 if (p->flags & IORING_SETUP_ATTACH_WQ) {
8311 sqd = io_attach_sq_data(p);
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008312 if (!IS_ERR(sqd)) {
8313 *attached = true;
Jens Axboe5c2469e2021-03-11 10:17:56 -07008314 return sqd;
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008315 }
Jens Axboe5c2469e2021-03-11 10:17:56 -07008316 /* fall through for EPERM case, setup new sqd/task */
8317 if (PTR_ERR(sqd) != -EPERM)
8318 return sqd;
8319 }
Jens Axboeaa061652020-09-02 14:50:27 -06008320
Jens Axboe534ca6d2020-09-02 13:52:19 -06008321 sqd = kzalloc(sizeof(*sqd), GFP_KERNEL);
8322 if (!sqd)
8323 return ERR_PTR(-ENOMEM);
8324
Pavel Begunkov9e138a42021-03-14 20:57:12 +00008325 atomic_set(&sqd->park_pending, 0);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008326 refcount_set(&sqd->refs, 1);
Jens Axboe69fb2132020-09-14 11:16:23 -06008327 INIT_LIST_HEAD(&sqd->ctx_list);
Pavel Begunkov09a6f4e2021-03-14 20:57:10 +00008328 mutex_init(&sqd->lock);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008329 init_waitqueue_head(&sqd->wait);
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008330 init_completion(&sqd->exited);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008331 return sqd;
8332}
8333
Jens Axboe6b063142019-01-10 22:13:58 -07008334#if defined(CONFIG_UNIX)
Jens Axboe6b063142019-01-10 22:13:58 -07008335/*
8336 * Ensure the UNIX gc is aware of our file set, so we are certain that
8337 * the io_uring can be safely unregistered on process exit, even if we have
8338 * loops in the file referencing.
8339 */
8340static int __io_sqe_files_scm(struct io_ring_ctx *ctx, int nr, int offset)
8341{
8342 struct sock *sk = ctx->ring_sock->sk;
8343 struct scm_fp_list *fpl;
8344 struct sk_buff *skb;
Jens Axboe08a45172019-10-03 08:11:03 -06008345 int i, nr_files;
Jens Axboe6b063142019-01-10 22:13:58 -07008346
Jens Axboe6b063142019-01-10 22:13:58 -07008347 fpl = kzalloc(sizeof(*fpl), GFP_KERNEL);
8348 if (!fpl)
8349 return -ENOMEM;
8350
8351 skb = alloc_skb(0, GFP_KERNEL);
8352 if (!skb) {
8353 kfree(fpl);
8354 return -ENOMEM;
8355 }
8356
8357 skb->sk = sk;
Pavel Begunkov813d8fe2022-10-16 22:42:54 +01008358 skb->scm_io_uring = 1;
Jens Axboe6b063142019-01-10 22:13:58 -07008359
Jens Axboe08a45172019-10-03 08:11:03 -06008360 nr_files = 0;
Jens Axboe62e398b2021-02-21 16:19:37 -07008361 fpl->user = get_uid(current_user());
Jens Axboe6b063142019-01-10 22:13:58 -07008362 for (i = 0; i < nr; i++) {
Jens Axboe65e19f52019-10-26 07:20:21 -06008363 struct file *file = io_file_from_index(ctx, i + offset);
8364
8365 if (!file)
Jens Axboe08a45172019-10-03 08:11:03 -06008366 continue;
Jens Axboe65e19f52019-10-26 07:20:21 -06008367 fpl->fp[nr_files] = get_file(file);
Jens Axboe08a45172019-10-03 08:11:03 -06008368 unix_inflight(fpl->user, fpl->fp[nr_files]);
8369 nr_files++;
Jens Axboe6b063142019-01-10 22:13:58 -07008370 }
8371
Jens Axboe08a45172019-10-03 08:11:03 -06008372 if (nr_files) {
8373 fpl->max = SCM_MAX_FD;
8374 fpl->count = nr_files;
8375 UNIXCB(skb).fp = fpl;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008376 skb->destructor = unix_destruct_scm;
Jens Axboe08a45172019-10-03 08:11:03 -06008377 refcount_add(skb->truesize, &sk->sk_wmem_alloc);
8378 skb_queue_head(&sk->sk_receive_queue, skb);
Jens Axboe6b063142019-01-10 22:13:58 -07008379
Pavel Begunkov285f5d72022-04-06 12:43:58 +01008380 for (i = 0; i < nr; i++) {
8381 struct file *file = io_file_from_index(ctx, i + offset);
8382
8383 if (file)
8384 fput(file);
8385 }
Jens Axboe08a45172019-10-03 08:11:03 -06008386 } else {
8387 kfree_skb(skb);
Pavel Begunkov0853bd62022-03-25 16:36:31 +00008388 free_uid(fpl->user);
Jens Axboe08a45172019-10-03 08:11:03 -06008389 kfree(fpl);
8390 }
Jens Axboe6b063142019-01-10 22:13:58 -07008391
8392 return 0;
8393}
8394
8395/*
8396 * If UNIX sockets are enabled, fd passing can cause a reference cycle which
8397 * causes regular reference counting to break down. We rely on the UNIX
8398 * garbage collection to take care of this problem for us.
8399 */
8400static int io_sqe_files_scm(struct io_ring_ctx *ctx)
8401{
8402 unsigned left, total;
8403 int ret = 0;
8404
8405 total = 0;
8406 left = ctx->nr_user_files;
8407 while (left) {
8408 unsigned this_files = min_t(unsigned, left, SCM_MAX_FD);
Jens Axboe6b063142019-01-10 22:13:58 -07008409
8410 ret = __io_sqe_files_scm(ctx, this_files, total);
8411 if (ret)
8412 break;
8413 left -= this_files;
8414 total += this_files;
8415 }
8416
8417 if (!ret)
8418 return 0;
8419
8420 while (total < ctx->nr_user_files) {
Jens Axboe65e19f52019-10-26 07:20:21 -06008421 struct file *file = io_file_from_index(ctx, total);
8422
8423 if (file)
8424 fput(file);
Jens Axboe6b063142019-01-10 22:13:58 -07008425 total++;
8426 }
8427
8428 return ret;
8429}
8430#else
8431static int io_sqe_files_scm(struct io_ring_ctx *ctx)
8432{
8433 return 0;
8434}
8435#endif
8436
Pavel Begunkov47e90392021-04-01 15:43:56 +01008437static void io_rsrc_file_put(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc)
Jens Axboec3a31e62019-10-03 13:59:56 -06008438{
Bijan Mottahedeh50238532021-01-15 17:37:45 +00008439 struct file *file = prsrc->file;
Jens Axboec3a31e62019-10-03 13:59:56 -06008440#if defined(CONFIG_UNIX)
Jens Axboec3a31e62019-10-03 13:59:56 -06008441 struct sock *sock = ctx->ring_sock->sk;
8442 struct sk_buff_head list, *head = &sock->sk_receive_queue;
8443 struct sk_buff *skb;
8444 int i;
8445
8446 __skb_queue_head_init(&list);
8447
8448 /*
8449 * Find the skb that holds this file in its SCM_RIGHTS. When found,
8450 * remove this entry and rearrange the file array.
8451 */
8452 skb = skb_dequeue(head);
8453 while (skb) {
8454 struct scm_fp_list *fp;
8455
8456 fp = UNIXCB(skb).fp;
8457 for (i = 0; i < fp->count; i++) {
8458 int left;
8459
8460 if (fp->fp[i] != file)
8461 continue;
8462
8463 unix_notinflight(fp->user, fp->fp[i]);
8464 left = fp->count - 1 - i;
8465 if (left) {
8466 memmove(&fp->fp[i], &fp->fp[i + 1],
8467 left * sizeof(struct file *));
8468 }
8469 fp->count--;
8470 if (!fp->count) {
8471 kfree_skb(skb);
8472 skb = NULL;
8473 } else {
8474 __skb_queue_tail(&list, skb);
8475 }
8476 fput(file);
8477 file = NULL;
8478 break;
8479 }
8480
8481 if (!file)
8482 break;
8483
8484 __skb_queue_tail(&list, skb);
8485
8486 skb = skb_dequeue(head);
8487 }
8488
8489 if (skb_peek(&list)) {
8490 spin_lock_irq(&head->lock);
8491 while ((skb = __skb_dequeue(&list)) != NULL)
8492 __skb_queue_tail(head, skb);
8493 spin_unlock_irq(&head->lock);
8494 }
8495#else
Jens Axboe05f3fb32019-12-09 11:22:50 -07008496 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06008497#endif
8498}
8499
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008500static void __io_rsrc_put_work(struct io_rsrc_node *ref_node)
Jens Axboe05f3fb32019-12-09 11:22:50 -07008501{
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008502 struct io_rsrc_data *rsrc_data = ref_node->rsrc_data;
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008503 struct io_ring_ctx *ctx = rsrc_data->ctx;
8504 struct io_rsrc_put *prsrc, *tmp;
Xiaoguang Wang05589552020-03-31 14:05:18 +08008505
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008506 list_for_each_entry_safe(prsrc, tmp, &ref_node->rsrc_list, list) {
8507 list_del(&prsrc->list);
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008508
8509 if (prsrc->tag) {
8510 bool lock_ring = ctx->flags & IORING_SETUP_IOPOLL;
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008511
8512 io_ring_submit_lock(ctx, lock_ring);
Jens Axboe79ebeae2021-08-10 15:18:27 -06008513 spin_lock(&ctx->completion_lock);
Pavel Begunkovb850d6d2022-08-29 14:30:13 +01008514 io_fill_cqe_aux(ctx, prsrc->tag, 0, 0);
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008515 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06008516 spin_unlock(&ctx->completion_lock);
Pavel Begunkovb60c8dc2021-04-25 14:32:18 +01008517 io_cqring_ev_posted(ctx);
8518 io_ring_submit_unlock(ctx, lock_ring);
8519 }
8520
Pavel Begunkov40ae0ff2021-04-01 15:43:44 +01008521 rsrc_data->do_put(ctx, prsrc);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008522 kfree(prsrc);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008523 }
8524
Pavel Begunkov28a9fe22021-04-01 15:43:47 +01008525 io_rsrc_node_destroy(ref_node);
Pavel Begunkov3e942492021-04-11 01:46:34 +01008526 if (atomic_dec_and_test(&rsrc_data->refs))
8527 complete(&rsrc_data->done);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008528}
8529
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008530static void io_rsrc_put_work(struct work_struct *work)
Jens Axboe4a38aed22020-05-14 17:21:15 -06008531{
8532 struct io_ring_ctx *ctx;
8533 struct llist_node *node;
8534
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008535 ctx = container_of(work, struct io_ring_ctx, rsrc_put_work.work);
8536 node = llist_del_all(&ctx->rsrc_put_llist);
Jens Axboe4a38aed22020-05-14 17:21:15 -06008537
8538 while (node) {
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008539 struct io_rsrc_node *ref_node;
Jens Axboe4a38aed22020-05-14 17:21:15 -06008540 struct llist_node *next = node->next;
8541
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008542 ref_node = llist_entry(node, struct io_rsrc_node, llist);
Bijan Mottahedeh269bbe52021-01-15 17:37:44 +00008543 __io_rsrc_put_work(ref_node);
Jens Axboe4a38aed22020-05-14 17:21:15 -06008544 node = next;
8545 }
8546}
8547
Jens Axboe05f3fb32019-12-09 11:22:50 -07008548static int io_sqe_files_register(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov792e3582021-04-25 14:32:21 +01008549 unsigned nr_args, u64 __user *tags)
Jens Axboe05f3fb32019-12-09 11:22:50 -07008550{
8551 __s32 __user *fds = (__s32 __user *) arg;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008552 struct file *file;
Pavel Begunkovf3baed32021-04-01 15:43:42 +01008553 int fd, ret;
Pavel Begunkov846a4ef2021-04-01 15:44:03 +01008554 unsigned i;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008555
8556 if (ctx->file_data)
8557 return -EBUSY;
8558 if (!nr_args)
8559 return -EINVAL;
8560 if (nr_args > IORING_MAX_FIXED_FILES)
8561 return -EMFILE;
Pavel Begunkov3a1b8a42021-08-20 10:36:35 +01008562 if (nr_args > rlimit(RLIMIT_NOFILE))
8563 return -EMFILE;
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008564 ret = io_rsrc_node_switch_start(ctx);
Pavel Begunkovf3baed32021-04-01 15:43:42 +01008565 if (ret)
8566 return ret;
Pavel Begunkovd878c812021-06-14 02:36:18 +01008567 ret = io_rsrc_data_alloc(ctx, io_rsrc_file_put, tags, nr_args,
8568 &ctx->file_data);
8569 if (ret)
8570 return ret;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008571
Pavel Begunkovf3baed32021-04-01 15:43:42 +01008572 ret = -ENOMEM;
Pavel Begunkovaeca2412021-04-11 01:46:37 +01008573 if (!io_alloc_file_tables(&ctx->file_table, nr_args))
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008574 goto out_free;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008575
Jens Axboe05f3fb32019-12-09 11:22:50 -07008576 for (i = 0; i < nr_args; i++, ctx->nr_user_files++) {
Pavel Begunkovd878c812021-06-14 02:36:18 +01008577 if (copy_from_user(&fd, &fds[i], sizeof(fd))) {
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008578 ret = -EFAULT;
8579 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008580 }
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008581 /* allow sparse sets */
Pavel Begunkov792e3582021-04-25 14:32:21 +01008582 if (fd == -1) {
8583 ret = -EINVAL;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01008584 if (unlikely(*io_get_tag_slot(ctx->file_data, i)))
Pavel Begunkov792e3582021-04-25 14:32:21 +01008585 goto out_fput;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008586 continue;
Pavel Begunkov792e3582021-04-25 14:32:21 +01008587 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008588
Jens Axboe05f3fb32019-12-09 11:22:50 -07008589 file = fget(fd);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008590 ret = -EBADF;
Pavel Begunkov792e3582021-04-25 14:32:21 +01008591 if (unlikely(!file))
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008592 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008593
8594 /*
8595 * Don't allow io_uring instances to be registered. If UNIX
8596 * isn't enabled, then this causes a reference cycle and this
8597 * instance can never get freed. If UNIX is enabled we'll
8598 * handle it just fine, but there's still no point in allowing
8599 * a ring fd as it doesn't support regular read/write anyway.
8600 */
8601 if (file->f_op == &io_uring_fops) {
8602 fput(file);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008603 goto out_fput;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008604 }
Pavel Begunkovaeca2412021-04-11 01:46:37 +01008605 io_fixed_file_set(io_fixed_file_slot(&ctx->file_table, i), file);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008606 }
8607
Jens Axboe05f3fb32019-12-09 11:22:50 -07008608 ret = io_sqe_files_scm(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08008609 if (ret) {
Pavel Begunkov08480402021-04-13 02:58:38 +01008610 __io_sqe_files_unregister(ctx);
Xiaoguang Wang05589552020-03-31 14:05:18 +08008611 return ret;
8612 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008613
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008614 io_rsrc_node_switch(ctx, NULL);
Jens Axboe05f3fb32019-12-09 11:22:50 -07008615 return ret;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008616out_fput:
8617 for (i = 0; i < ctx->nr_user_files; i++) {
8618 file = io_file_from_index(ctx, i);
8619 if (file)
8620 fput(file);
8621 }
Pavel Begunkov042b0d82021-08-09 13:04:01 +01008622 io_free_file_tables(&ctx->file_table);
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008623 ctx->nr_user_files = 0;
Pavel Begunkov600cf3f2020-10-10 18:34:15 +01008624out_free:
Pavel Begunkov44b31f22021-04-25 14:32:16 +01008625 io_rsrc_data_free(ctx->file_data);
Jens Axboe55cbc252020-10-14 07:35:57 -06008626 ctx->file_data = NULL;
Jens Axboe05f3fb32019-12-09 11:22:50 -07008627 return ret;
8628}
8629
Jens Axboec3a31e62019-10-03 13:59:56 -06008630static int io_sqe_file_register(struct io_ring_ctx *ctx, struct file *file,
8631 int index)
8632{
8633#if defined(CONFIG_UNIX)
8634 struct sock *sock = ctx->ring_sock->sk;
8635 struct sk_buff_head *head = &sock->sk_receive_queue;
8636 struct sk_buff *skb;
8637
8638 /*
8639 * See if we can merge this file into an existing skb SCM_RIGHTS
8640 * file set. If there's no room, fall back to allocating a new skb
8641 * and filling it in.
8642 */
8643 spin_lock_irq(&head->lock);
8644 skb = skb_peek(head);
8645 if (skb) {
8646 struct scm_fp_list *fpl = UNIXCB(skb).fp;
8647
8648 if (fpl->count < SCM_MAX_FD) {
8649 __skb_unlink(skb, head);
8650 spin_unlock_irq(&head->lock);
8651 fpl->fp[fpl->count] = get_file(file);
8652 unix_inflight(fpl->user, fpl->fp[fpl->count]);
8653 fpl->count++;
8654 spin_lock_irq(&head->lock);
8655 __skb_queue_head(head, skb);
8656 } else {
8657 skb = NULL;
8658 }
8659 }
8660 spin_unlock_irq(&head->lock);
8661
8662 if (skb) {
8663 fput(file);
8664 return 0;
8665 }
8666
8667 return __io_sqe_files_scm(ctx, 1, index);
8668#else
8669 return 0;
8670#endif
8671}
8672
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008673static int io_queue_rsrc_removal(struct io_rsrc_data *data, unsigned idx,
8674 struct io_rsrc_node *node, void *rsrc)
8675{
Pavel Begunkov5218d5c2022-04-07 14:05:04 +01008676 u64 *tag_slot = io_get_tag_slot(data, idx);
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008677 struct io_rsrc_put *prsrc;
8678
8679 prsrc = kzalloc(sizeof(*prsrc), GFP_KERNEL);
8680 if (!prsrc)
8681 return -ENOMEM;
8682
Pavel Begunkov5218d5c2022-04-07 14:05:04 +01008683 prsrc->tag = *tag_slot;
8684 *tag_slot = 0;
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008685 prsrc->rsrc = rsrc;
8686 list_add(&prsrc->list, &node->rsrc_list);
8687 return 0;
8688}
8689
Pavel Begunkovb9445592021-08-25 12:25:45 +01008690static int io_install_fixed_file(struct io_kiocb *req, struct file *file,
8691 unsigned int issue_flags, u32 slot_index)
8692{
8693 struct io_ring_ctx *ctx = req->ctx;
8694 bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008695 bool needs_switch = false;
Pavel Begunkovb9445592021-08-25 12:25:45 +01008696 struct io_fixed_file *file_slot;
8697 int ret = -EBADF;
8698
8699 io_ring_submit_lock(ctx, !force_nonblock);
8700 if (file->f_op == &io_uring_fops)
8701 goto err;
8702 ret = -ENXIO;
8703 if (!ctx->file_data)
8704 goto err;
8705 ret = -EINVAL;
8706 if (slot_index >= ctx->nr_user_files)
8707 goto err;
8708
8709 slot_index = array_index_nospec(slot_index, ctx->nr_user_files);
8710 file_slot = io_fixed_file_slot(&ctx->file_table, slot_index);
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008711
8712 if (file_slot->file_ptr) {
8713 struct file *old_file;
8714
8715 ret = io_rsrc_node_switch_start(ctx);
8716 if (ret)
8717 goto err;
8718
8719 old_file = (struct file *)(file_slot->file_ptr & FFS_MASK);
8720 ret = io_queue_rsrc_removal(ctx->file_data, slot_index,
8721 ctx->rsrc_node, old_file);
8722 if (ret)
8723 goto err;
8724 file_slot->file_ptr = 0;
8725 needs_switch = true;
8726 }
Pavel Begunkovb9445592021-08-25 12:25:45 +01008727
8728 *io_get_tag_slot(ctx->file_data, slot_index) = 0;
8729 io_fixed_file_set(file_slot, file);
8730 ret = io_sqe_file_register(ctx, file, slot_index);
8731 if (ret) {
8732 file_slot->file_ptr = 0;
8733 goto err;
8734 }
8735
8736 ret = 0;
8737err:
Pavel Begunkov9c7b0ba2021-09-14 16:12:52 +01008738 if (needs_switch)
8739 io_rsrc_node_switch(ctx, ctx->file_data);
Pavel Begunkovb9445592021-08-25 12:25:45 +01008740 io_ring_submit_unlock(ctx, !force_nonblock);
8741 if (ret)
8742 fput(file);
8743 return ret;
8744}
8745
Pavel Begunkov7df778b2021-09-24 20:04:29 +01008746static int io_close_fixed(struct io_kiocb *req, unsigned int issue_flags)
8747{
8748 unsigned int offset = req->close.file_slot - 1;
8749 struct io_ring_ctx *ctx = req->ctx;
8750 struct io_fixed_file *file_slot;
8751 struct file *file;
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01008752 int ret;
Pavel Begunkov7df778b2021-09-24 20:04:29 +01008753
8754 io_ring_submit_lock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
8755 ret = -ENXIO;
8756 if (unlikely(!ctx->file_data))
8757 goto out;
8758 ret = -EINVAL;
8759 if (offset >= ctx->nr_user_files)
8760 goto out;
8761 ret = io_rsrc_node_switch_start(ctx);
8762 if (ret)
8763 goto out;
8764
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01008765 offset = array_index_nospec(offset, ctx->nr_user_files);
8766 file_slot = io_fixed_file_slot(&ctx->file_table, offset);
Pavel Begunkov7df778b2021-09-24 20:04:29 +01008767 ret = -EBADF;
8768 if (!file_slot->file_ptr)
8769 goto out;
8770
8771 file = (struct file *)(file_slot->file_ptr & FFS_MASK);
8772 ret = io_queue_rsrc_removal(ctx->file_data, offset, ctx->rsrc_node, file);
8773 if (ret)
8774 goto out;
8775
8776 file_slot->file_ptr = 0;
8777 io_rsrc_node_switch(ctx, ctx->file_data);
8778 ret = 0;
8779out:
8780 io_ring_submit_unlock(ctx, !(issue_flags & IO_URING_F_NONBLOCK));
8781 return ret;
8782}
8783
Jens Axboe05f3fb32019-12-09 11:22:50 -07008784static int __io_sqe_files_update(struct io_ring_ctx *ctx,
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008785 struct io_uring_rsrc_update2 *up,
Jens Axboe05f3fb32019-12-09 11:22:50 -07008786 unsigned nr_args)
8787{
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008788 u64 __user *tags = u64_to_user_ptr(up->tags);
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01008789 __s32 __user *fds = u64_to_user_ptr(up->data);
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01008790 struct io_rsrc_data *data = ctx->file_data;
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008791 struct io_fixed_file *file_slot;
8792 struct file *file;
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01008793 int fd, i, err = 0;
8794 unsigned int done;
Xiaoguang Wang05589552020-03-31 14:05:18 +08008795 bool needs_switch = false;
Jens Axboec3a31e62019-10-03 13:59:56 -06008796
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +01008797 if (!ctx->file_data)
8798 return -ENXIO;
8799 if (up->offset + nr_args > ctx->nr_user_files)
Jens Axboec3a31e62019-10-03 13:59:56 -06008800 return -EINVAL;
8801
Pavel Begunkov67973b92021-01-26 13:51:09 +00008802 for (done = 0; done < nr_args; done++) {
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008803 u64 tag = 0;
8804
8805 if ((tags && copy_from_user(&tag, &tags[done], sizeof(tag))) ||
8806 copy_from_user(&fd, &fds[done], sizeof(fd))) {
Jens Axboec3a31e62019-10-03 13:59:56 -06008807 err = -EFAULT;
8808 break;
8809 }
Pavel Begunkovc3bdad02021-04-25 14:32:22 +01008810 if ((fd == IORING_REGISTER_FILES_SKIP || fd == -1) && tag) {
8811 err = -EINVAL;
8812 break;
8813 }
noah4e0377a2021-01-26 15:23:28 -05008814 if (fd == IORING_REGISTER_FILES_SKIP)
8815 continue;
8816
Pavel Begunkov67973b92021-01-26 13:51:09 +00008817 i = array_index_nospec(up->offset + done, ctx->nr_user_files);
Pavel Begunkovaeca2412021-04-11 01:46:37 +01008818 file_slot = io_fixed_file_slot(&ctx->file_table, i);
Pavel Begunkovea64ec022021-02-04 13:52:07 +00008819
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008820 if (file_slot->file_ptr) {
8821 file = (struct file *)(file_slot->file_ptr & FFS_MASK);
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01008822 err = io_queue_rsrc_removal(data, i, ctx->rsrc_node, file);
Hillf Dantona5318d32020-03-23 17:47:15 +08008823 if (err)
8824 break;
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008825 file_slot->file_ptr = 0;
Xiaoguang Wang05589552020-03-31 14:05:18 +08008826 needs_switch = true;
Jens Axboec3a31e62019-10-03 13:59:56 -06008827 }
8828 if (fd != -1) {
Jens Axboec3a31e62019-10-03 13:59:56 -06008829 file = fget(fd);
8830 if (!file) {
8831 err = -EBADF;
8832 break;
8833 }
8834 /*
8835 * Don't allow io_uring instances to be registered. If
8836 * UNIX isn't enabled, then this causes a reference
8837 * cycle and this instance can never get freed. If UNIX
8838 * is enabled we'll handle it just fine, but there's
8839 * still no point in allowing a ring fd as it doesn't
8840 * support regular read/write anyway.
8841 */
8842 if (file->f_op == &io_uring_fops) {
8843 fput(file);
8844 err = -EBADF;
8845 break;
8846 }
Pavel Begunkov50c981b2022-04-06 12:43:57 +01008847 *io_get_tag_slot(data, i) = tag;
Pavel Begunkov9a321c92021-04-01 15:44:01 +01008848 io_fixed_file_set(file_slot, file);
Jens Axboec3a31e62019-10-03 13:59:56 -06008849 err = io_sqe_file_register(ctx, file, i);
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00008850 if (err) {
Pavel Begunkova04b0ac2021-04-01 15:44:04 +01008851 file_slot->file_ptr = 0;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00008852 fput(file);
Jens Axboec3a31e62019-10-03 13:59:56 -06008853 break;
Yang Yingliangf3bd9da2020-07-09 10:11:41 +00008854 }
Jens Axboec3a31e62019-10-03 13:59:56 -06008855 }
Jens Axboe05f3fb32019-12-09 11:22:50 -07008856 }
8857
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01008858 if (needs_switch)
8859 io_rsrc_node_switch(ctx, data);
Jens Axboec3a31e62019-10-03 13:59:56 -06008860 return done ? done : err;
8861}
Xiaoguang Wang05589552020-03-31 14:05:18 +08008862
Jens Axboe685fe7f2021-03-08 09:37:51 -07008863static struct io_wq *io_init_wq_offload(struct io_ring_ctx *ctx,
8864 struct task_struct *task)
Pavel Begunkov24369c22020-01-28 03:15:48 +03008865{
Jens Axboee9418942021-02-19 12:33:30 -07008866 struct io_wq_hash *hash;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008867 struct io_wq_data data;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008868 unsigned int concurrency;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008869
Yang Yingliang362a9e62021-07-20 16:38:05 +08008870 mutex_lock(&ctx->uring_lock);
Jens Axboee9418942021-02-19 12:33:30 -07008871 hash = ctx->hash_map;
8872 if (!hash) {
8873 hash = kzalloc(sizeof(*hash), GFP_KERNEL);
Yang Yingliang362a9e62021-07-20 16:38:05 +08008874 if (!hash) {
8875 mutex_unlock(&ctx->uring_lock);
Jens Axboee9418942021-02-19 12:33:30 -07008876 return ERR_PTR(-ENOMEM);
Yang Yingliang362a9e62021-07-20 16:38:05 +08008877 }
Jens Axboee9418942021-02-19 12:33:30 -07008878 refcount_set(&hash->refs, 1);
8879 init_waitqueue_head(&hash->wait);
8880 ctx->hash_map = hash;
8881 }
Yang Yingliang362a9e62021-07-20 16:38:05 +08008882 mutex_unlock(&ctx->uring_lock);
Jens Axboee9418942021-02-19 12:33:30 -07008883
8884 data.hash = hash;
Jens Axboe685fe7f2021-03-08 09:37:51 -07008885 data.task = task;
Pavel Begunkovebc11b62021-08-09 13:04:05 +01008886 data.free_work = io_wq_free_work;
Pavel Begunkovf5fa38c2020-06-08 21:08:20 +03008887 data.do_work = io_wq_submit_work;
Pavel Begunkov24369c22020-01-28 03:15:48 +03008888
Jens Axboed25e3a32021-02-16 11:41:41 -07008889 /* Do QD, or 4 * CPUS, whatever is smallest */
8890 concurrency = min(ctx->sq_entries, 4 * num_online_cpus());
Pavel Begunkov24369c22020-01-28 03:15:48 +03008891
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008892 return io_wq_create(concurrency, &data);
Pavel Begunkov24369c22020-01-28 03:15:48 +03008893}
8894
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008895static int io_uring_alloc_task_context(struct task_struct *task,
8896 struct io_ring_ctx *ctx)
Jens Axboe0f212202020-09-13 13:09:39 -06008897{
8898 struct io_uring_task *tctx;
Jens Axboed8a6df12020-10-15 16:24:45 -06008899 int ret;
Jens Axboe0f212202020-09-13 13:09:39 -06008900
Pavel Begunkov09899b12021-06-14 02:36:22 +01008901 tctx = kzalloc(sizeof(*tctx), GFP_KERNEL);
Jens Axboe0f212202020-09-13 13:09:39 -06008902 if (unlikely(!tctx))
8903 return -ENOMEM;
8904
Jens Axboed8a6df12020-10-15 16:24:45 -06008905 ret = percpu_counter_init(&tctx->inflight, 0, GFP_KERNEL);
8906 if (unlikely(ret)) {
8907 kfree(tctx);
8908 return ret;
8909 }
8910
Jens Axboe685fe7f2021-03-08 09:37:51 -07008911 tctx->io_wq = io_init_wq_offload(ctx, task);
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008912 if (IS_ERR(tctx->io_wq)) {
8913 ret = PTR_ERR(tctx->io_wq);
8914 percpu_counter_destroy(&tctx->inflight);
8915 kfree(tctx);
8916 return ret;
8917 }
8918
Jens Axboe0f212202020-09-13 13:09:39 -06008919 xa_init(&tctx->xa);
8920 init_waitqueue_head(&tctx->wait);
Jens Axboefdaf0832020-10-30 09:37:30 -06008921 atomic_set(&tctx->in_idle, 0);
Pavel Begunkovb303fe22021-04-11 01:46:26 +01008922 atomic_set(&tctx->inflight_tracked, 0);
Jens Axboe0f212202020-09-13 13:09:39 -06008923 task->io_uring = tctx;
Jens Axboe7cbf1722021-02-10 00:03:20 +00008924 spin_lock_init(&tctx->task_lock);
8925 INIT_WQ_LIST(&tctx->task_list);
Jens Axboe7cbf1722021-02-10 00:03:20 +00008926 init_task_work(&tctx->task_work, tctx_task_work);
Jens Axboe0f212202020-09-13 13:09:39 -06008927 return 0;
8928}
8929
8930void __io_uring_free(struct task_struct *tsk)
8931{
8932 struct io_uring_task *tctx = tsk->io_uring;
8933
8934 WARN_ON_ONCE(!xa_empty(&tctx->xa));
Pavel Begunkovef8eaa42021-02-27 11:16:45 +00008935 WARN_ON_ONCE(tctx->io_wq);
Pavel Begunkov09899b12021-06-14 02:36:22 +01008936 WARN_ON_ONCE(tctx->cached_refs);
Pavel Begunkovef8eaa42021-02-27 11:16:45 +00008937
Jens Axboed8a6df12020-10-15 16:24:45 -06008938 percpu_counter_destroy(&tctx->inflight);
Jens Axboe0f212202020-09-13 13:09:39 -06008939 kfree(tctx);
8940 tsk->io_uring = NULL;
8941}
8942
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +02008943static int io_sq_offload_create(struct io_ring_ctx *ctx,
8944 struct io_uring_params *p)
Jens Axboe2b188cc2019-01-07 10:46:33 -07008945{
8946 int ret;
8947
Jens Axboed25e3a32021-02-16 11:41:41 -07008948 /* Retain compatibility with failing for an invalid attach attempt */
8949 if ((ctx->flags & (IORING_SETUP_ATTACH_WQ | IORING_SETUP_SQPOLL)) ==
8950 IORING_SETUP_ATTACH_WQ) {
8951 struct fd f;
8952
8953 f = fdget(p->wq_fd);
8954 if (!f.file)
8955 return -ENXIO;
Jens Axboe0cc936f2021-07-22 17:08:07 -06008956 if (f.file->f_op != &io_uring_fops) {
8957 fdput(f);
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01008958 return -EINVAL;
Jens Axboe0cc936f2021-07-22 17:08:07 -06008959 }
8960 fdput(f);
Jens Axboed25e3a32021-02-16 11:41:41 -07008961 }
Jens Axboe6c271ce2019-01-10 11:22:30 -07008962 if (ctx->flags & IORING_SETUP_SQPOLL) {
Jens Axboe46fe18b2021-03-04 12:39:36 -07008963 struct task_struct *tsk;
Jens Axboe534ca6d2020-09-02 13:52:19 -06008964 struct io_sq_data *sqd;
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008965 bool attached;
Jens Axboe534ca6d2020-09-02 13:52:19 -06008966
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008967 sqd = io_get_sq_data(p, &attached);
Jens Axboe534ca6d2020-09-02 13:52:19 -06008968 if (IS_ERR(sqd)) {
8969 ret = PTR_ERR(sqd);
8970 goto err;
8971 }
Jens Axboe69fb2132020-09-14 11:16:23 -06008972
Stefan Metzmacher7c30f36a2021-03-07 11:54:28 +01008973 ctx->sq_creds = get_current_cred();
Jens Axboe534ca6d2020-09-02 13:52:19 -06008974 ctx->sq_data = sqd;
Jens Axboe917257d2019-04-13 09:28:55 -06008975 ctx->sq_thread_idle = msecs_to_jiffies(p->sq_thread_idle);
8976 if (!ctx->sq_thread_idle)
8977 ctx->sq_thread_idle = HZ;
8978
Pavel Begunkov78d7f6b2021-03-10 13:13:53 +00008979 io_sq_thread_park(sqd);
Pavel Begunkovde75a3d2021-03-18 11:54:35 +00008980 list_add(&ctx->sqd_list, &sqd->ctx_list);
8981 io_sqd_update_thread_idle(sqd);
Pavel Begunkov26984fb2021-03-11 23:29:37 +00008982 /* don't attach to a dying SQPOLL thread, would be racy */
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01008983 ret = (attached && !sqd->thread) ? -ENXIO : 0;
Pavel Begunkov78d7f6b2021-03-10 13:13:53 +00008984 io_sq_thread_unpark(sqd);
8985
Pavel Begunkovde75a3d2021-03-18 11:54:35 +00008986 if (ret < 0)
8987 goto err;
8988 if (attached)
Jens Axboe5aa75ed2021-02-16 12:56:50 -07008989 return 0;
Jens Axboeaa061652020-09-02 14:50:27 -06008990
Jens Axboe6c271ce2019-01-10 11:22:30 -07008991 if (p->flags & IORING_SETUP_SQ_AFF) {
Jens Axboe44a9bd12019-05-14 20:00:30 -06008992 int cpu = p->sq_thread_cpu;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008993
Jens Axboe917257d2019-04-13 09:28:55 -06008994 ret = -EINVAL;
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01008995 if (cpu >= nr_cpu_ids || !cpu_online(cpu))
Jens Axboee8f98f242021-03-09 16:32:13 -07008996 goto err_sqpoll;
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008997 sqd->sq_cpu = cpu;
Jens Axboe6c271ce2019-01-10 11:22:30 -07008998 } else {
Jens Axboe37d1e2e2021-02-17 21:03:43 -07008999 sqd->sq_cpu = -1;
Jens Axboe6c271ce2019-01-10 11:22:30 -07009000 }
Jens Axboe37d1e2e2021-02-17 21:03:43 -07009001
9002 sqd->task_pid = current->pid;
Jens Axboe5c2469e2021-03-11 10:17:56 -07009003 sqd->task_tgid = current->tgid;
Jens Axboe46fe18b2021-03-04 12:39:36 -07009004 tsk = create_io_thread(io_sq_thread, sqd, NUMA_NO_NODE);
9005 if (IS_ERR(tsk)) {
9006 ret = PTR_ERR(tsk);
Jens Axboee8f98f242021-03-09 16:32:13 -07009007 goto err_sqpoll;
Jens Axboe6c271ce2019-01-10 11:22:30 -07009008 }
Pavel Begunkov97a73a02021-03-08 17:30:54 +00009009
Jens Axboe46fe18b2021-03-04 12:39:36 -07009010 sqd->thread = tsk;
Pavel Begunkov97a73a02021-03-08 17:30:54 +00009011 ret = io_uring_alloc_task_context(tsk, ctx);
Jens Axboe46fe18b2021-03-04 12:39:36 -07009012 wake_up_new_task(tsk);
Jens Axboe0f212202020-09-13 13:09:39 -06009013 if (ret)
9014 goto err;
Jens Axboe6c271ce2019-01-10 11:22:30 -07009015 } else if (p->flags & IORING_SETUP_SQ_AFF) {
9016 /* Can't have SQ_AFF without SQPOLL */
9017 ret = -EINVAL;
9018 goto err;
9019 }
9020
Jens Axboe2b188cc2019-01-07 10:46:33 -07009021 return 0;
Pavel Begunkovf2a48dd2021-04-20 12:03:33 +01009022err_sqpoll:
9023 complete(&ctx->sq_data->exited);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009024err:
Jens Axboe37d1e2e2021-02-17 21:03:43 -07009025 io_sq_thread_finish(ctx);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009026 return ret;
9027}
9028
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009029static inline void __io_unaccount_mem(struct user_struct *user,
9030 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009031{
9032 atomic_long_sub(nr_pages, &user->locked_vm);
9033}
9034
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009035static inline int __io_account_mem(struct user_struct *user,
9036 unsigned long nr_pages)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009037{
9038 unsigned long page_limit, cur_pages, new_pages;
9039
9040 /* Don't allow more pages than we can safely lock */
9041 page_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
9042
9043 do {
9044 cur_pages = atomic_long_read(&user->locked_vm);
9045 new_pages = cur_pages + nr_pages;
9046 if (new_pages > page_limit)
9047 return -ENOMEM;
9048 } while (atomic_long_cmpxchg(&user->locked_vm, cur_pages,
9049 new_pages) != cur_pages);
9050
9051 return 0;
9052}
9053
Jens Axboe26bfa89e2021-02-09 20:14:12 -07009054static void io_unaccount_mem(struct io_ring_ctx *ctx, unsigned long nr_pages)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009055{
Jens Axboe62e398b2021-02-21 16:19:37 -07009056 if (ctx->user)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009057 __io_unaccount_mem(ctx->user, nr_pages);
Bijan Mottahedeh30975822020-06-16 16:36:09 -07009058
Jens Axboe26bfa89e2021-02-09 20:14:12 -07009059 if (ctx->mm_account)
9060 atomic64_sub(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009061}
9062
Jens Axboe26bfa89e2021-02-09 20:14:12 -07009063static int io_account_mem(struct io_ring_ctx *ctx, unsigned long nr_pages)
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009064{
Bijan Mottahedeh30975822020-06-16 16:36:09 -07009065 int ret;
9066
Jens Axboe62e398b2021-02-21 16:19:37 -07009067 if (ctx->user) {
Bijan Mottahedeh30975822020-06-16 16:36:09 -07009068 ret = __io_account_mem(ctx->user, nr_pages);
9069 if (ret)
9070 return ret;
9071 }
9072
Jens Axboe26bfa89e2021-02-09 20:14:12 -07009073 if (ctx->mm_account)
9074 atomic64_add(nr_pages, &ctx->mm_account->pinned_vm);
Bijan Mottahedeha087e2b2020-06-16 16:36:07 -07009075
9076 return 0;
9077}
9078
Jens Axboe2b188cc2019-01-07 10:46:33 -07009079static void io_mem_free(void *ptr)
9080{
Mark Rutland52e04ef2019-04-30 17:30:21 +01009081 struct page *page;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009082
Mark Rutland52e04ef2019-04-30 17:30:21 +01009083 if (!ptr)
9084 return;
9085
9086 page = virt_to_head_page(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009087 if (put_page_testzero(page))
9088 free_compound_page(page);
9089}
9090
9091static void *io_mem_alloc(size_t size)
9092{
Shakeel Butt246dfbc2022-01-24 21:17:36 -08009093 gfp_t gfp = GFP_KERNEL_ACCOUNT | __GFP_ZERO | __GFP_NOWARN | __GFP_COMP;
Jens Axboe2b188cc2019-01-07 10:46:33 -07009094
Shakeel Butt246dfbc2022-01-24 21:17:36 -08009095 return (void *) __get_free_pages(gfp, get_order(size));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009096}
9097
Hristo Venev75b28af2019-08-26 17:23:46 +00009098static unsigned long rings_size(unsigned sq_entries, unsigned cq_entries,
9099 size_t *sq_offset)
9100{
9101 struct io_rings *rings;
9102 size_t off, sq_array_size;
9103
9104 off = struct_size(rings, cqes, cq_entries);
9105 if (off == SIZE_MAX)
9106 return SIZE_MAX;
9107
9108#ifdef CONFIG_SMP
9109 off = ALIGN(off, SMP_CACHE_BYTES);
9110 if (off == 0)
9111 return SIZE_MAX;
9112#endif
9113
Dmitry Vyukovb36200f2020-07-11 11:31:11 +02009114 if (sq_offset)
9115 *sq_offset = off;
9116
Hristo Venev75b28af2019-08-26 17:23:46 +00009117 sq_array_size = array_size(sizeof(u32), sq_entries);
9118 if (sq_array_size == SIZE_MAX)
9119 return SIZE_MAX;
9120
9121 if (check_add_overflow(off, sq_array_size, &off))
9122 return SIZE_MAX;
9123
Hristo Venev75b28af2019-08-26 17:23:46 +00009124 return off;
9125}
9126
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009127static void io_buffer_unmap(struct io_ring_ctx *ctx, struct io_mapped_ubuf **slot)
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009128{
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009129 struct io_mapped_ubuf *imu = *slot;
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009130 unsigned int i;
9131
Pavel Begunkov62248432021-04-28 13:11:29 +01009132 if (imu != ctx->dummy_ubuf) {
9133 for (i = 0; i < imu->nr_bvecs; i++)
9134 unpin_user_page(imu->bvec[i].bv_page);
9135 if (imu->acct_pages)
9136 io_unaccount_mem(ctx, imu->acct_pages);
9137 kvfree(imu);
9138 }
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009139 *slot = NULL;
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009140}
9141
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009142static void io_rsrc_buf_put(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc)
9143{
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009144 io_buffer_unmap(ctx, &prsrc->buf);
9145 prsrc->buf = NULL;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009146}
9147
9148static void __io_sqe_buffers_unregister(struct io_ring_ctx *ctx)
Jens Axboeedafcce2019-01-09 09:16:05 -07009149{
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009150 unsigned int i;
Jens Axboeedafcce2019-01-09 09:16:05 -07009151
Pavel Begunkov7f61a1e2021-04-11 01:46:35 +01009152 for (i = 0; i < ctx->nr_user_bufs; i++)
9153 io_buffer_unmap(ctx, &ctx->user_bufs[i]);
Jens Axboeedafcce2019-01-09 09:16:05 -07009154 kfree(ctx->user_bufs);
Zqiangbb6659c2021-04-30 16:25:15 +08009155 io_rsrc_data_free(ctx->buf_data);
Jens Axboeedafcce2019-01-09 09:16:05 -07009156 ctx->user_bufs = NULL;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009157 ctx->buf_data = NULL;
Jens Axboeedafcce2019-01-09 09:16:05 -07009158 ctx->nr_user_bufs = 0;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009159}
9160
Jens Axboeedafcce2019-01-09 09:16:05 -07009161static int io_sqe_buffers_unregister(struct io_ring_ctx *ctx)
9162{
Pavel Begunkov91f5a602022-06-13 06:30:06 +01009163 unsigned nr = ctx->nr_user_bufs;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009164 int ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07009165
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009166 if (!ctx->buf_data)
Jens Axboeedafcce2019-01-09 09:16:05 -07009167 return -ENXIO;
9168
Pavel Begunkov91f5a602022-06-13 06:30:06 +01009169 /*
9170 * Quiesce may unlock ->uring_lock, and while it's not held
9171 * prevent new requests using the table.
9172 */
9173 ctx->nr_user_bufs = 0;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009174 ret = io_rsrc_ref_quiesce(ctx->buf_data, ctx);
Pavel Begunkov91f5a602022-06-13 06:30:06 +01009175 ctx->nr_user_bufs = nr;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009176 if (!ret)
9177 __io_sqe_buffers_unregister(ctx);
9178 return ret;
Jens Axboeedafcce2019-01-09 09:16:05 -07009179}
9180
9181static int io_copy_iov(struct io_ring_ctx *ctx, struct iovec *dst,
9182 void __user *arg, unsigned index)
9183{
9184 struct iovec __user *src;
9185
9186#ifdef CONFIG_COMPAT
9187 if (ctx->compat) {
9188 struct compat_iovec __user *ciovs;
9189 struct compat_iovec ciov;
9190
9191 ciovs = (struct compat_iovec __user *) arg;
9192 if (copy_from_user(&ciov, &ciovs[index], sizeof(ciov)))
9193 return -EFAULT;
9194
Jens Axboed55e5f52019-12-11 16:12:15 -07009195 dst->iov_base = u64_to_user_ptr((u64)ciov.iov_base);
Jens Axboeedafcce2019-01-09 09:16:05 -07009196 dst->iov_len = ciov.iov_len;
9197 return 0;
9198 }
9199#endif
9200 src = (struct iovec __user *) arg;
9201 if (copy_from_user(dst, &src[index], sizeof(*dst)))
9202 return -EFAULT;
9203 return 0;
9204}
9205
Jens Axboede293932020-09-17 16:19:16 -06009206/*
9207 * Not super efficient, but this is just a registration time. And we do cache
9208 * the last compound head, so generally we'll only do a full search if we don't
9209 * match that one.
9210 *
9211 * We check if the given compound head page has already been accounted, to
9212 * avoid double accounting it. This allows us to account the full size of the
9213 * page, not just the constituent pages of a huge page.
9214 */
9215static bool headpage_already_acct(struct io_ring_ctx *ctx, struct page **pages,
9216 int nr_pages, struct page *hpage)
9217{
9218 int i, j;
9219
9220 /* check current page array */
9221 for (i = 0; i < nr_pages; i++) {
9222 if (!PageCompound(pages[i]))
9223 continue;
9224 if (compound_head(pages[i]) == hpage)
9225 return true;
9226 }
9227
9228 /* check previously registered pages */
9229 for (i = 0; i < ctx->nr_user_bufs; i++) {
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009230 struct io_mapped_ubuf *imu = ctx->user_bufs[i];
Jens Axboede293932020-09-17 16:19:16 -06009231
9232 for (j = 0; j < imu->nr_bvecs; j++) {
9233 if (!PageCompound(imu->bvec[j].bv_page))
9234 continue;
9235 if (compound_head(imu->bvec[j].bv_page) == hpage)
9236 return true;
9237 }
9238 }
9239
9240 return false;
9241}
9242
9243static int io_buffer_account_pin(struct io_ring_ctx *ctx, struct page **pages,
9244 int nr_pages, struct io_mapped_ubuf *imu,
9245 struct page **last_hpage)
9246{
9247 int i, ret;
9248
Pavel Begunkov216e5832021-05-29 12:01:02 +01009249 imu->acct_pages = 0;
Jens Axboede293932020-09-17 16:19:16 -06009250 for (i = 0; i < nr_pages; i++) {
9251 if (!PageCompound(pages[i])) {
9252 imu->acct_pages++;
9253 } else {
9254 struct page *hpage;
9255
9256 hpage = compound_head(pages[i]);
9257 if (hpage == *last_hpage)
9258 continue;
9259 *last_hpage = hpage;
9260 if (headpage_already_acct(ctx, pages, i, hpage))
9261 continue;
9262 imu->acct_pages += page_size(hpage) >> PAGE_SHIFT;
9263 }
9264 }
9265
9266 if (!imu->acct_pages)
9267 return 0;
9268
Jens Axboe26bfa89e2021-02-09 20:14:12 -07009269 ret = io_account_mem(ctx, imu->acct_pages);
Jens Axboede293932020-09-17 16:19:16 -06009270 if (ret)
9271 imu->acct_pages = 0;
9272 return ret;
9273}
9274
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009275static int io_sqe_buffer_register(struct io_ring_ctx *ctx, struct iovec *iov,
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009276 struct io_mapped_ubuf **pimu,
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009277 struct page **last_hpage)
Jens Axboeedafcce2019-01-09 09:16:05 -07009278{
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009279 struct io_mapped_ubuf *imu = NULL;
Jens Axboeedafcce2019-01-09 09:16:05 -07009280 struct vm_area_struct **vmas = NULL;
9281 struct page **pages = NULL;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009282 unsigned long off, start, end, ubuf;
9283 size_t size;
9284 int ret, pret, nr_pages, i;
Jens Axboeedafcce2019-01-09 09:16:05 -07009285
Pavel Begunkov62248432021-04-28 13:11:29 +01009286 if (!iov->iov_base) {
9287 *pimu = ctx->dummy_ubuf;
9288 return 0;
9289 }
9290
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009291 ubuf = (unsigned long) iov->iov_base;
9292 end = (ubuf + iov->iov_len + PAGE_SIZE - 1) >> PAGE_SHIFT;
9293 start = ubuf >> PAGE_SHIFT;
9294 nr_pages = end - start;
9295
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009296 *pimu = NULL;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009297 ret = -ENOMEM;
9298
9299 pages = kvmalloc_array(nr_pages, sizeof(struct page *), GFP_KERNEL);
9300 if (!pages)
9301 goto done;
9302
9303 vmas = kvmalloc_array(nr_pages, sizeof(struct vm_area_struct *),
9304 GFP_KERNEL);
9305 if (!vmas)
9306 goto done;
9307
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009308 imu = kvmalloc(struct_size(imu, bvec, nr_pages), GFP_KERNEL);
Pavel Begunkova2b41982021-04-26 00:16:31 +01009309 if (!imu)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009310 goto done;
9311
9312 ret = 0;
9313 mmap_read_lock(current->mm);
9314 pret = pin_user_pages(ubuf, nr_pages, FOLL_WRITE | FOLL_LONGTERM,
9315 pages, vmas);
9316 if (pret == nr_pages) {
Pavel Begunkovdde0d0d2023-03-06 13:21:40 -07009317 struct file *file = vmas[0]->vm_file;
9318
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009319 /* don't support file backed memory */
9320 for (i = 0; i < nr_pages; i++) {
Pavel Begunkovdde0d0d2023-03-06 13:21:40 -07009321 if (vmas[i]->vm_file != file) {
9322 ret = -EINVAL;
9323 break;
9324 }
9325 if (!file)
Pavel Begunkov40dad762021-06-09 15:26:54 +01009326 continue;
Pavel Begunkovdde0d0d2023-03-06 13:21:40 -07009327 if (!vma_is_shmem(vmas[i]) && !is_file_hugepages(file)) {
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009328 ret = -EOPNOTSUPP;
9329 break;
9330 }
9331 }
9332 } else {
9333 ret = pret < 0 ? pret : -EFAULT;
9334 }
9335 mmap_read_unlock(current->mm);
9336 if (ret) {
9337 /*
9338 * if we did partial map, or found file backed vmas,
9339 * release any pages we did get
9340 */
9341 if (pret > 0)
9342 unpin_user_pages(pages, pret);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009343 goto done;
9344 }
9345
9346 ret = io_buffer_account_pin(ctx, pages, pret, imu, last_hpage);
9347 if (ret) {
9348 unpin_user_pages(pages, pret);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009349 goto done;
9350 }
9351
9352 off = ubuf & ~PAGE_MASK;
9353 size = iov->iov_len;
9354 for (i = 0; i < nr_pages; i++) {
9355 size_t vec_len;
9356
9357 vec_len = min_t(size_t, size, PAGE_SIZE - off);
9358 imu->bvec[i].bv_page = pages[i];
9359 imu->bvec[i].bv_len = vec_len;
9360 imu->bvec[i].bv_offset = off;
9361 off = 0;
9362 size -= vec_len;
9363 }
9364 /* store original address for later verification */
9365 imu->ubuf = ubuf;
Pavel Begunkov4751f532021-04-01 15:43:55 +01009366 imu->ubuf_end = ubuf + iov->iov_len;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009367 imu->nr_bvecs = nr_pages;
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009368 *pimu = imu;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009369 ret = 0;
9370done:
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009371 if (ret)
9372 kvfree(imu);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009373 kvfree(pages);
9374 kvfree(vmas);
9375 return ret;
9376}
9377
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009378static int io_buffers_map_alloc(struct io_ring_ctx *ctx, unsigned int nr_args)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009379{
Pavel Begunkov87094462021-04-11 01:46:36 +01009380 ctx->user_bufs = kcalloc(nr_args, sizeof(*ctx->user_bufs), GFP_KERNEL);
9381 return ctx->user_bufs ? 0 : -ENOMEM;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009382}
9383
9384static int io_buffer_validate(struct iovec *iov)
9385{
Pavel Begunkov50e96982021-03-24 22:59:01 +00009386 unsigned long tmp, acct_len = iov->iov_len + (PAGE_SIZE - 1);
9387
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009388 /*
9389 * Don't impose further limits on the size and buffer
9390 * constraints here, we'll -EINVAL later when IO is
9391 * submitted if they are wrong.
9392 */
Pavel Begunkov62248432021-04-28 13:11:29 +01009393 if (!iov->iov_base)
9394 return iov->iov_len ? -EFAULT : 0;
9395 if (!iov->iov_len)
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009396 return -EFAULT;
9397
9398 /* arbitrary limit, but we need something */
9399 if (iov->iov_len > SZ_1G)
9400 return -EFAULT;
9401
Pavel Begunkov50e96982021-03-24 22:59:01 +00009402 if (check_add_overflow((unsigned long)iov->iov_base, acct_len, &tmp))
9403 return -EOVERFLOW;
9404
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009405 return 0;
9406}
9407
9408static int io_sqe_buffers_register(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009409 unsigned int nr_args, u64 __user *tags)
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009410{
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009411 struct page *last_hpage = NULL;
9412 struct io_rsrc_data *data;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009413 int i, ret;
9414 struct iovec iov;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009415
Pavel Begunkov87094462021-04-11 01:46:36 +01009416 if (ctx->user_bufs)
9417 return -EBUSY;
Pavel Begunkov489809e2021-05-14 12:06:44 +01009418 if (!nr_args || nr_args > IORING_MAX_REG_BUFFERS)
Pavel Begunkov87094462021-04-11 01:46:36 +01009419 return -EINVAL;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009420 ret = io_rsrc_node_switch_start(ctx);
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009421 if (ret)
9422 return ret;
Pavel Begunkovd878c812021-06-14 02:36:18 +01009423 ret = io_rsrc_data_alloc(ctx, io_rsrc_buf_put, tags, nr_args, &data);
9424 if (ret)
9425 return ret;
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009426 ret = io_buffers_map_alloc(ctx, nr_args);
9427 if (ret) {
Zqiangbb6659c2021-04-30 16:25:15 +08009428 io_rsrc_data_free(data);
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009429 return ret;
9430 }
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009431
Pavel Begunkov87094462021-04-11 01:46:36 +01009432 for (i = 0; i < nr_args; i++, ctx->nr_user_bufs++) {
Jens Axboeedafcce2019-01-09 09:16:05 -07009433 ret = io_copy_iov(ctx, &iov, arg, i);
9434 if (ret)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009435 break;
Bijan Mottahedeh2b358602021-01-06 12:39:11 -08009436 ret = io_buffer_validate(&iov);
9437 if (ret)
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009438 break;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01009439 if (!iov.iov_base && *io_get_tag_slot(data, i)) {
Colin Ian Kingcf3770e2021-04-29 11:46:02 +01009440 ret = -EINVAL;
9441 break;
9442 }
Jens Axboeedafcce2019-01-09 09:16:05 -07009443
Pavel Begunkov41edf1a2021-04-25 14:32:23 +01009444 ret = io_sqe_buffer_register(ctx, &iov, &ctx->user_bufs[i],
9445 &last_hpage);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009446 if (ret)
9447 break;
Jens Axboeedafcce2019-01-09 09:16:05 -07009448 }
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009449
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009450 WARN_ON_ONCE(ctx->buf_data);
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -08009451
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009452 ctx->buf_data = data;
9453 if (ret)
9454 __io_sqe_buffers_unregister(ctx);
9455 else
9456 io_rsrc_node_switch(ctx, NULL);
Jens Axboeedafcce2019-01-09 09:16:05 -07009457 return ret;
9458}
9459
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009460static int __io_sqe_buffers_update(struct io_ring_ctx *ctx,
9461 struct io_uring_rsrc_update2 *up,
9462 unsigned int nr_args)
9463{
9464 u64 __user *tags = u64_to_user_ptr(up->tags);
9465 struct iovec iov, __user *iovs = u64_to_user_ptr(up->data);
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009466 struct page *last_hpage = NULL;
9467 bool needs_switch = false;
9468 __u32 done;
9469 int i, err;
9470
9471 if (!ctx->buf_data)
9472 return -ENXIO;
9473 if (up->offset + nr_args > ctx->nr_user_bufs)
9474 return -EINVAL;
9475
9476 for (done = 0; done < nr_args; done++) {
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009477 struct io_mapped_ubuf *imu;
9478 int offset = up->offset + done;
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009479 u64 tag = 0;
9480
9481 err = io_copy_iov(ctx, &iov, iovs, done);
9482 if (err)
9483 break;
9484 if (tags && copy_from_user(&tag, &tags[done], sizeof(tag))) {
9485 err = -EFAULT;
9486 break;
9487 }
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009488 err = io_buffer_validate(&iov);
9489 if (err)
9490 break;
Colin Ian Kingcf3770e2021-04-29 11:46:02 +01009491 if (!iov.iov_base && tag) {
9492 err = -EINVAL;
9493 break;
9494 }
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009495 err = io_sqe_buffer_register(ctx, &iov, &imu, &last_hpage);
9496 if (err)
9497 break;
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009498
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009499 i = array_index_nospec(offset, ctx->nr_user_bufs);
Pavel Begunkov62248432021-04-28 13:11:29 +01009500 if (ctx->user_bufs[i] != ctx->dummy_ubuf) {
Pavel Begunkovb8ed0f72022-04-07 14:05:05 +01009501 err = io_queue_rsrc_removal(ctx->buf_data, i,
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009502 ctx->rsrc_node, ctx->user_bufs[i]);
9503 if (unlikely(err)) {
9504 io_buffer_unmap(ctx, &imu);
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009505 break;
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009506 }
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009507 ctx->user_bufs[i] = NULL;
9508 needs_switch = true;
9509 }
9510
Pavel Begunkov0b8c0e72021-04-26 15:17:38 +01009511 ctx->user_bufs[i] = imu;
Pavel Begunkov2d091d62021-06-14 02:36:21 +01009512 *io_get_tag_slot(ctx->buf_data, offset) = tag;
Pavel Begunkov634d00d2021-04-25 14:32:26 +01009513 }
9514
9515 if (needs_switch)
9516 io_rsrc_node_switch(ctx, ctx->buf_data);
9517 return done ? done : err;
9518}
9519
Jens Axboe9b402842019-04-11 11:45:41 -06009520static int io_eventfd_register(struct io_ring_ctx *ctx, void __user *arg)
9521{
9522 __s32 __user *fds = arg;
9523 int fd;
9524
9525 if (ctx->cq_ev_fd)
9526 return -EBUSY;
9527
9528 if (copy_from_user(&fd, fds, sizeof(*fds)))
9529 return -EFAULT;
9530
9531 ctx->cq_ev_fd = eventfd_ctx_fdget(fd);
9532 if (IS_ERR(ctx->cq_ev_fd)) {
9533 int ret = PTR_ERR(ctx->cq_ev_fd);
Pavel Begunkovfe7e3252021-06-24 15:09:57 +01009534
Jens Axboe9b402842019-04-11 11:45:41 -06009535 ctx->cq_ev_fd = NULL;
9536 return ret;
9537 }
9538
9539 return 0;
9540}
9541
9542static int io_eventfd_unregister(struct io_ring_ctx *ctx)
9543{
9544 if (ctx->cq_ev_fd) {
9545 eventfd_ctx_put(ctx->cq_ev_fd);
9546 ctx->cq_ev_fd = NULL;
9547 return 0;
9548 }
9549
9550 return -ENXIO;
9551}
9552
Jens Axboe5a2e7452020-02-23 16:23:11 -07009553static void io_destroy_buffers(struct io_ring_ctx *ctx)
9554{
Jens Axboe9e15c3a2021-03-13 12:29:43 -07009555 struct io_buffer *buf;
9556 unsigned long index;
9557
Ye Bin2d447d32021-11-22 10:47:37 +08009558 xa_for_each(&ctx->io_buffers, index, buf)
Jens Axboe9e15c3a2021-03-13 12:29:43 -07009559 __io_remove_buffers(ctx, buf, index, -1U);
Jens Axboe5a2e7452020-02-23 16:23:11 -07009560}
9561
Pavel Begunkov72558342021-08-09 20:18:09 +01009562static void io_req_cache_free(struct list_head *list)
Jens Axboe1b4c3512021-02-10 00:03:19 +00009563{
Jens Axboe68e68ee2021-02-13 09:00:02 -07009564 struct io_kiocb *req, *nxt;
Jens Axboe1b4c3512021-02-10 00:03:19 +00009565
Pavel Begunkovbb943b82021-08-09 20:18:10 +01009566 list_for_each_entry_safe(req, nxt, list, inflight_entry) {
9567 list_del(&req->inflight_entry);
Jens Axboe1b4c3512021-02-10 00:03:19 +00009568 kmem_cache_free(req_cachep, req);
9569 }
9570}
9571
Jens Axboe4010fec2021-02-27 15:04:18 -07009572static void io_req_caches_free(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -07009573{
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01009574 struct io_submit_state *state = &ctx->submit_state;
Pavel Begunkovbf019da2021-02-10 00:03:17 +00009575
Jens Axboe9a4fdbd2021-02-13 09:09:44 -07009576 mutex_lock(&ctx->uring_lock);
9577
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01009578 if (state->free_reqs) {
9579 kmem_cache_free_bulk(req_cachep, state->free_reqs, state->reqs);
9580 state->free_reqs = 0;
Pavel Begunkov8e5c66c2021-02-22 11:45:55 +00009581 }
Jens Axboe9a4fdbd2021-02-13 09:09:44 -07009582
Pavel Begunkovcd0ca2e2021-08-09 20:18:11 +01009583 io_flush_cached_locked_reqs(ctx, state);
9584 io_req_cache_free(&state->free_list);
Jens Axboe9a4fdbd2021-02-13 09:09:44 -07009585 mutex_unlock(&ctx->uring_lock);
9586}
9587
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009588static void io_wait_rsrc_data(struct io_rsrc_data *data)
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009589{
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009590 if (data && !atomic_dec_and_test(&data->refs))
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009591 wait_for_completion(&data->done);
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009592}
9593
Jens Axboe2b188cc2019-01-07 10:46:33 -07009594static void io_ring_ctx_free(struct io_ring_ctx *ctx)
9595{
Jens Axboe37d1e2e2021-02-17 21:03:43 -07009596 io_sq_thread_finish(ctx);
Jens Axboe2aede0e2020-09-14 10:45:53 -06009597
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009598 /* __io_rsrc_put_work() may need uring_lock to progress, wait w/o it */
9599 io_wait_rsrc_data(ctx->buf_data);
9600 io_wait_rsrc_data(ctx->file_data);
9601
Hao Xu8bad28d2021-02-19 17:19:36 +08009602 mutex_lock(&ctx->uring_lock);
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009603 if (ctx->buf_data)
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +01009604 __io_sqe_buffers_unregister(ctx);
Pavel Begunkov43597aa2021-08-10 02:44:23 +01009605 if (ctx->file_data)
Pavel Begunkov08480402021-04-13 02:58:38 +01009606 __io_sqe_files_unregister(ctx);
Pavel Begunkovc4ea0602021-04-01 15:43:58 +01009607 if (ctx->rings)
9608 __io_cqring_overflow_flush(ctx, true);
Hao Xu8bad28d2021-02-19 17:19:36 +08009609 mutex_unlock(&ctx->uring_lock);
Jens Axboe9b402842019-04-11 11:45:41 -06009610 io_eventfd_unregister(ctx);
Jens Axboe5a2e7452020-02-23 16:23:11 -07009611 io_destroy_buffers(ctx);
Pavel Begunkov07db2982021-04-20 12:03:32 +01009612 if (ctx->sq_creds)
9613 put_cred(ctx->sq_creds);
Jens Axboedef596e2019-01-09 08:59:42 -07009614
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01009615 /* there are no registered resources left, nobody uses it */
9616 if (ctx->rsrc_node)
9617 io_rsrc_node_destroy(ctx->rsrc_node);
Pavel Begunkov8dd03af2021-03-19 17:22:36 +00009618 if (ctx->rsrc_backup_node)
Pavel Begunkovb895c9a2021-04-01 15:43:40 +01009619 io_rsrc_node_destroy(ctx->rsrc_backup_node);
Pavel Begunkova7f0ed52021-04-01 15:43:46 +01009620 flush_delayed_work(&ctx->rsrc_put_work);
9621
9622 WARN_ON_ONCE(!list_empty(&ctx->rsrc_ref_list));
9623 WARN_ON_ONCE(!llist_empty(&ctx->rsrc_put_llist));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009624
9625#if defined(CONFIG_UNIX)
Eric Biggers355e8d22019-06-12 14:58:43 -07009626 if (ctx->ring_sock) {
9627 ctx->ring_sock->file = NULL; /* so that iput() is called */
Jens Axboe2b188cc2019-01-07 10:46:33 -07009628 sock_release(ctx->ring_sock);
Eric Biggers355e8d22019-06-12 14:58:43 -07009629 }
Jens Axboe2b188cc2019-01-07 10:46:33 -07009630#endif
Pavel Begunkovef9dd632021-08-28 19:54:38 -06009631 WARN_ON_ONCE(!list_empty(&ctx->ltimeout_list));
Jens Axboe2b188cc2019-01-07 10:46:33 -07009632
Pavel Begunkovcd148d42022-10-16 22:42:55 +01009633 if (ctx->mm_account) {
9634 mmdrop(ctx->mm_account);
9635 ctx->mm_account = NULL;
9636 }
9637
Hristo Venev75b28af2019-08-26 17:23:46 +00009638 io_mem_free(ctx->rings);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009639 io_mem_free(ctx->sq_sqes);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009640
9641 percpu_ref_exit(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009642 free_uid(ctx->user);
Jens Axboe4010fec2021-02-27 15:04:18 -07009643 io_req_caches_free(ctx);
Jens Axboee9418942021-02-19 12:33:30 -07009644 if (ctx->hash_map)
9645 io_wq_put_hash(ctx->hash_map);
Jens Axboe78076bb2019-12-04 19:56:40 -07009646 kfree(ctx->cancel_hash);
Pavel Begunkov62248432021-04-28 13:11:29 +01009647 kfree(ctx->dummy_ubuf);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009648 kfree(ctx);
9649}
9650
9651static __poll_t io_uring_poll(struct file *file, poll_table *wait)
9652{
9653 struct io_ring_ctx *ctx = file->private_data;
9654 __poll_t mask = 0;
9655
Pavel Begunkov311997b2021-06-14 23:37:28 +01009656 poll_wait(file, &ctx->poll_wait, wait);
Stefan Bühler4f7067c2019-04-24 23:54:17 +02009657 /*
9658 * synchronizes with barrier from wq_has_sleeper call in
9659 * io_commit_cqring
9660 */
Jens Axboe2b188cc2019-01-07 10:46:33 -07009661 smp_rmb();
Jens Axboe90554202020-09-03 12:12:41 -06009662 if (!io_sqring_full(ctx))
Jens Axboe2b188cc2019-01-07 10:46:33 -07009663 mask |= EPOLLOUT | EPOLLWRNORM;
Hao Xued670c32021-02-05 16:34:21 +08009664
9665 /*
9666 * Don't flush cqring overflow list here, just do a simple check.
9667 * Otherwise there could possible be ABBA deadlock:
9668 * CPU0 CPU1
9669 * ---- ----
9670 * lock(&ctx->uring_lock);
9671 * lock(&ep->mtx);
9672 * lock(&ctx->uring_lock);
9673 * lock(&ep->mtx);
9674 *
9675 * Users may get EPOLLIN meanwhile seeing nothing in cqring, this
9676 * pushs them to do the flush.
9677 */
Pavel Begunkov5ed7a372021-06-14 23:37:27 +01009678 if (io_cqring_events(ctx) || test_bit(0, &ctx->check_cq_overflow))
Jens Axboe2b188cc2019-01-07 10:46:33 -07009679 mask |= EPOLLIN | EPOLLRDNORM;
9680
9681 return mask;
9682}
9683
Yejune Deng0bead8c2020-12-24 11:02:20 +08009684static int io_unregister_personality(struct io_ring_ctx *ctx, unsigned id)
Jens Axboe071698e2020-01-28 10:04:42 -07009685{
Jens Axboe4379bf82021-02-15 13:40:22 -07009686 const struct cred *creds;
Jens Axboe071698e2020-01-28 10:04:42 -07009687
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00009688 creds = xa_erase(&ctx->personalities, id);
Jens Axboe4379bf82021-02-15 13:40:22 -07009689 if (creds) {
9690 put_cred(creds);
Yejune Deng0bead8c2020-12-24 11:02:20 +08009691 return 0;
Jens Axboe1e6fa522020-10-15 08:46:24 -06009692 }
Yejune Deng0bead8c2020-12-24 11:02:20 +08009693
9694 return -EINVAL;
9695}
9696
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009697struct io_tctx_exit {
9698 struct callback_head task_work;
9699 struct completion completion;
Pavel Begunkovbaf186c2021-03-06 11:02:15 +00009700 struct io_ring_ctx *ctx;
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009701};
9702
9703static void io_tctx_exit_cb(struct callback_head *cb)
9704{
9705 struct io_uring_task *tctx = current->io_uring;
9706 struct io_tctx_exit *work;
9707
9708 work = container_of(cb, struct io_tctx_exit, task_work);
9709 /*
9710 * When @in_idle, we're in cancellation and it's racy to remove the
9711 * node. It'll be removed by the end of cancellation, just ignore it.
Harshit Mogalapallif8955112022-12-06 01:38:32 -08009712 * tctx can be NULL if the queueing of this task_work raced with
9713 * work cancelation off the exec path.
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009714 */
Harshit Mogalapallif8955112022-12-06 01:38:32 -08009715 if (tctx && !atomic_read(&tctx->in_idle))
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009716 io_uring_del_tctx_node((unsigned long)work->ctx);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009717 complete(&work->completion);
9718}
9719
Pavel Begunkov28090c12021-04-25 23:34:45 +01009720static bool io_cancel_ctx_cb(struct io_wq_work *work, void *data)
9721{
9722 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
9723
9724 return req->ctx == data;
9725}
9726
Jens Axboe85faa7b2020-04-09 18:14:00 -06009727static void io_ring_exit_work(struct work_struct *work)
9728{
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009729 struct io_ring_ctx *ctx = container_of(work, struct io_ring_ctx, exit_work);
Pavel Begunkovb5bb3a22021-03-06 11:02:16 +00009730 unsigned long timeout = jiffies + HZ * 60 * 5;
Pavel Begunkov58d3be22021-08-09 13:04:17 +01009731 unsigned long interval = HZ / 20;
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009732 struct io_tctx_exit exit;
9733 struct io_tctx_node *node;
9734 int ret;
Jens Axboe85faa7b2020-04-09 18:14:00 -06009735
Jens Axboe56952e92020-06-17 15:00:04 -06009736 /*
9737 * If we're doing polled IO and end up having requests being
9738 * submitted async (out-of-line), then completions can come in while
9739 * we're waiting for refs to drop. We need to reap these manually,
9740 * as nobody else will be looking for them.
9741 */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03009742 do {
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009743 io_uring_try_cancel_requests(ctx, NULL, true);
Pavel Begunkov28090c12021-04-25 23:34:45 +01009744 if (ctx->sq_data) {
9745 struct io_sq_data *sqd = ctx->sq_data;
9746 struct task_struct *tsk;
9747
9748 io_sq_thread_park(sqd);
9749 tsk = sqd->thread;
9750 if (tsk && tsk->io_uring && tsk->io_uring->io_wq)
9751 io_wq_cancel_cb(tsk->io_uring->io_wq,
9752 io_cancel_ctx_cb, ctx, true);
9753 io_sq_thread_unpark(sqd);
9754 }
Pavel Begunkovb5bb3a22021-03-06 11:02:16 +00009755
Pavel Begunkov58d3be22021-08-09 13:04:17 +01009756 if (WARN_ON_ONCE(time_after(jiffies, timeout))) {
9757 /* there is little hope left, don't run it too often */
9758 interval = HZ * 60;
9759 }
Jens Axboe8e298352023-06-11 21:14:09 -06009760 /*
9761 * This is really an uninterruptible wait, as it has to be
9762 * complete. But it's also run from a kworker, which doesn't
9763 * take signals, so it's fine to make it interruptible. This
9764 * avoids scenarios where we knowingly can wait much longer
9765 * on completions, for example if someone does a SIGSTOP on
9766 * a task that needs to finish task_work to make this loop
9767 * complete. That's a synthetic situation that should not
9768 * cause a stuck task backtrace, and hence a potential panic
9769 * on stuck tasks if that is enabled.
9770 */
9771 } while (!wait_for_completion_interruptible_timeout(&ctx->ref_comp, interval));
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009772
Pavel Begunkov7f006512021-04-14 13:38:34 +01009773 init_completion(&exit.completion);
9774 init_task_work(&exit.task_work, io_tctx_exit_cb);
9775 exit.ctx = ctx;
Pavel Begunkovea3291c2023-12-03 15:37:53 +00009776
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009777 mutex_lock(&ctx->uring_lock);
9778 while (!list_empty(&ctx->tctx_list)) {
Pavel Begunkovb5bb3a22021-03-06 11:02:16 +00009779 WARN_ON_ONCE(time_after(jiffies, timeout));
9780
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009781 node = list_first_entry(&ctx->tctx_list, struct io_tctx_node,
9782 ctx_node);
Pavel Begunkov7f006512021-04-14 13:38:34 +01009783 /* don't spin on a single task if cancellation failed */
9784 list_rotate_left(&ctx->tctx_list);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009785 ret = task_work_add(node->task, &exit.task_work, TWA_SIGNAL);
9786 if (WARN_ON_ONCE(ret))
9787 continue;
9788 wake_up_process(node->task);
9789
9790 mutex_unlock(&ctx->uring_lock);
Jens Axboe8e298352023-06-11 21:14:09 -06009791 /*
9792 * See comment above for
9793 * wait_for_completion_interruptible_timeout() on why this
9794 * wait is marked as interruptible.
9795 */
9796 wait_for_completion_interruptible(&exit.completion);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009797 mutex_lock(&ctx->uring_lock);
9798 }
9799 mutex_unlock(&ctx->uring_lock);
Jens Axboe79ebeae2021-08-10 15:18:27 -06009800 spin_lock(&ctx->completion_lock);
9801 spin_unlock(&ctx->completion_lock);
Pavel Begunkovd56d9382021-03-06 11:02:13 +00009802
Jens Axboe85faa7b2020-04-09 18:14:00 -06009803 io_ring_ctx_free(ctx);
9804}
9805
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009806/* Returns true if we found and killed one or more timeouts */
9807static bool io_kill_timeouts(struct io_ring_ctx *ctx, struct task_struct *tsk,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009808 bool cancel_all)
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009809{
9810 struct io_kiocb *req, *tmp;
9811 int canceled = 0;
9812
Jens Axboe79ebeae2021-08-10 15:18:27 -06009813 spin_lock(&ctx->completion_lock);
9814 spin_lock_irq(&ctx->timeout_lock);
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009815 list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009816 if (io_match_task(req, tsk, cancel_all)) {
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009817 io_kill_timeout(req, -ECANCELED);
9818 canceled++;
9819 }
9820 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06009821 spin_unlock_irq(&ctx->timeout_lock);
Pavel Begunkov51520422021-03-29 11:39:29 +01009822 if (canceled != 0)
9823 io_commit_cqring(ctx);
Jens Axboe79ebeae2021-08-10 15:18:27 -06009824 spin_unlock(&ctx->completion_lock);
Pavel Begunkov80c4cbd2021-03-25 18:32:43 +00009825 if (canceled != 0)
9826 io_cqring_ev_posted(ctx);
9827 return canceled != 0;
9828}
9829
Jens Axboe2b188cc2019-01-07 10:46:33 -07009830static void io_ring_ctx_wait_and_kill(struct io_ring_ctx *ctx)
9831{
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00009832 unsigned long index;
9833 struct creds *creds;
9834
Jens Axboe2b188cc2019-01-07 10:46:33 -07009835 mutex_lock(&ctx->uring_lock);
9836 percpu_ref_kill(&ctx->refs);
Pavel Begunkov634578f2020-12-06 22:22:44 +00009837 if (ctx->rings)
Pavel Begunkov6c2450a2021-02-23 12:40:22 +00009838 __io_cqring_overflow_flush(ctx, true);
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +00009839 xa_for_each(&ctx->personalities, index, creds)
9840 io_unregister_personality(ctx, index);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009841 mutex_unlock(&ctx->uring_lock);
9842
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009843 io_kill_timeouts(ctx, NULL, true);
9844 io_poll_remove_all(ctx, NULL, true);
Jens Axboe561fb042019-10-24 07:25:42 -06009845
Jens Axboe15dff282019-11-13 09:09:23 -07009846 /* if we failed setting up the ctx, we might not have any rings */
Pavel Begunkovb2edc0a2020-07-07 16:36:22 +03009847 io_iopoll_try_reap_events(ctx);
Jens Axboe309fc032020-07-10 09:13:34 -06009848
Jens Axboe86e2d692023-01-21 12:36:08 -07009849 /* drop cached put refs after potentially doing completions */
9850 if (current->io_uring)
9851 io_uring_drop_tctx_refs(current);
9852
Jens Axboe85faa7b2020-04-09 18:14:00 -06009853 INIT_WORK(&ctx->exit_work, io_ring_exit_work);
Jens Axboefc666772020-08-19 11:10:51 -06009854 /*
9855 * Use system_unbound_wq to avoid spawning tons of event kworkers
9856 * if we're exiting a ton of rings at the same time. It just adds
9857 * noise and overhead, there's no discernable change in runtime
9858 * over using system_wq.
9859 */
9860 queue_work(system_unbound_wq, &ctx->exit_work);
Jens Axboe2b188cc2019-01-07 10:46:33 -07009861}
9862
9863static int io_uring_release(struct inode *inode, struct file *file)
9864{
9865 struct io_ring_ctx *ctx = file->private_data;
9866
9867 file->private_data = NULL;
9868 io_ring_ctx_wait_and_kill(ctx);
9869 return 0;
9870}
9871
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009872struct io_task_cancel {
9873 struct task_struct *task;
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009874 bool all;
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009875};
Pavel Begunkov67c4d9e2020-06-15 10:24:05 +03009876
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009877static bool io_cancel_task_cb(struct io_wq_work *work, void *data)
Jens Axboeb711d4e2020-08-16 08:23:05 -07009878{
Pavel Begunkov9a472ef2020-11-05 22:31:37 +00009879 struct io_kiocb *req = container_of(work, struct io_kiocb, work);
Pavel Begunkovf6edbab2020-11-06 13:00:26 +00009880 struct io_task_cancel *cancel = data;
Pavel Begunkov9a472ef2020-11-05 22:31:37 +00009881
Pavel Begunkov1c939a52021-11-26 14:38:15 +00009882 return io_match_task_safe(req, cancel->task, cancel->all);
Jens Axboeb711d4e2020-08-16 08:23:05 -07009883}
9884
Pavel Begunkove1915f72021-03-11 23:29:35 +00009885static bool io_cancel_defer_files(struct io_ring_ctx *ctx,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009886 struct task_struct *task, bool cancel_all)
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009887{
Pavel Begunkove1915f72021-03-11 23:29:35 +00009888 struct io_defer_entry *de;
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009889 LIST_HEAD(list);
9890
Jens Axboe79ebeae2021-08-10 15:18:27 -06009891 spin_lock(&ctx->completion_lock);
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009892 list_for_each_entry_reverse(de, &ctx->defer_list, list) {
Pavel Begunkov1c939a52021-11-26 14:38:15 +00009893 if (io_match_task_safe(de->req, task, cancel_all)) {
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009894 list_cut_position(&list, &ctx->defer_list, &de->list);
9895 break;
9896 }
9897 }
Jens Axboe79ebeae2021-08-10 15:18:27 -06009898 spin_unlock(&ctx->completion_lock);
Pavel Begunkove1915f72021-03-11 23:29:35 +00009899 if (list_empty(&list))
9900 return false;
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009901
9902 while (!list_empty(&list)) {
9903 de = list_first_entry(&list, struct io_defer_entry, list);
9904 list_del_init(&de->list);
Pavel Begunkovf41db2732021-02-28 22:35:12 +00009905 io_req_complete_failed(de->req, -ECANCELED);
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009906 kfree(de);
9907 }
Pavel Begunkove1915f72021-03-11 23:29:35 +00009908 return true;
Pavel Begunkovb7ddce32020-09-06 00:45:14 +03009909}
9910
Pavel Begunkov1b007642021-03-06 11:02:17 +00009911static bool io_uring_try_cancel_iowq(struct io_ring_ctx *ctx)
9912{
9913 struct io_tctx_node *node;
9914 enum io_wq_cancel cret;
9915 bool ret = false;
9916
9917 mutex_lock(&ctx->uring_lock);
9918 list_for_each_entry(node, &ctx->tctx_list, ctx_node) {
9919 struct io_uring_task *tctx = node->task->io_uring;
9920
9921 /*
9922 * io_wq will stay alive while we hold uring_lock, because it's
9923 * killed after ctx nodes, which requires to take the lock.
9924 */
9925 if (!tctx || !tctx->io_wq)
9926 continue;
9927 cret = io_wq_cancel_cb(tctx->io_wq, io_cancel_ctx_cb, ctx, true);
9928 ret |= (cret != IO_WQ_CANCEL_NOTFOUND);
9929 }
9930 mutex_unlock(&ctx->uring_lock);
9931
9932 return ret;
9933}
9934
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009935static void io_uring_try_cancel_requests(struct io_ring_ctx *ctx,
9936 struct task_struct *task,
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009937 bool cancel_all)
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009938{
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009939 struct io_task_cancel cancel = { .task = task, .all = cancel_all, };
Pavel Begunkov1b007642021-03-06 11:02:17 +00009940 struct io_uring_task *tctx = task ? task->io_uring : NULL;
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009941
9942 while (1) {
9943 enum io_wq_cancel cret;
9944 bool ret = false;
9945
Pavel Begunkov1b007642021-03-06 11:02:17 +00009946 if (!task) {
9947 ret |= io_uring_try_cancel_iowq(ctx);
9948 } else if (tctx && tctx->io_wq) {
9949 /*
9950 * Cancels requests of all rings, not only @ctx, but
9951 * it's fine as the task is in exit/exec.
9952 */
Jens Axboe5aa75ed2021-02-16 12:56:50 -07009953 cret = io_wq_cancel_cb(tctx->io_wq, io_cancel_task_cb,
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009954 &cancel, true);
9955 ret |= (cret != IO_WQ_CANCEL_NOTFOUND);
9956 }
9957
9958 /* SQPOLL thread does its own polling */
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009959 if ((!(ctx->flags & IORING_SETUP_SQPOLL) && cancel_all) ||
Jens Axboed052d1d2021-03-11 10:49:20 -07009960 (ctx->sq_data && ctx->sq_data->thread == current)) {
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009961 while (!list_empty_careful(&ctx->iopoll_list)) {
9962 io_iopoll_try_reap_events(ctx);
9963 ret = true;
Jens Axboeabd54d82023-03-06 13:18:27 -07009964 cond_resched();
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009965 }
9966 }
9967
Pavel Begunkov3dd0c972021-05-16 22:58:04 +01009968 ret |= io_cancel_defer_files(ctx, task, cancel_all);
9969 ret |= io_poll_remove_all(ctx, task, cancel_all);
9970 ret |= io_kill_timeouts(ctx, task, cancel_all);
Pavel Begunkove5dc4802021-06-26 21:40:46 +01009971 if (task)
9972 ret |= io_run_task_work();
Pavel Begunkov9936c7c2021-02-04 13:51:56 +00009973 if (!ret)
9974 break;
9975 cond_resched();
9976 }
9977}
9978
Pavel Begunkoveef51da2021-06-14 02:36:15 +01009979static int __io_uring_add_tctx_node(struct io_ring_ctx *ctx)
Jens Axboe0f212202020-09-13 13:09:39 -06009980{
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01009981 struct io_uring_task *tctx = current->io_uring;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +00009982 struct io_tctx_node *node;
Pavel Begunkova528b042020-12-21 18:34:04 +00009983 int ret;
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01009984
9985 if (unlikely(!tctx)) {
Jens Axboe5aa75ed2021-02-16 12:56:50 -07009986 ret = io_uring_alloc_task_context(current, ctx);
Jens Axboe0f212202020-09-13 13:09:39 -06009987 if (unlikely(ret))
9988 return ret;
Pavel Begunkove139a1e2021-10-19 23:43:46 +01009989
Matthew Wilcox (Oracle)236434c2020-10-09 13:49:52 +01009990 tctx = current->io_uring;
Pavel Begunkove139a1e2021-10-19 23:43:46 +01009991 if (ctx->iowq_limits_set) {
9992 unsigned int limits[2] = { ctx->iowq_limits[0],
9993 ctx->iowq_limits[1], };
9994
9995 ret = io_wq_max_workers(tctx->io_wq, limits);
9996 if (ret)
9997 return ret;
9998 }
Jens Axboe0f212202020-09-13 13:09:39 -06009999 }
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +000010000 if (!xa_load(&tctx->xa, (unsigned long)ctx)) {
10001 node = kmalloc(sizeof(*node), GFP_KERNEL);
10002 if (!node)
10003 return -ENOMEM;
10004 node->ctx = ctx;
10005 node->task = current;
Jens Axboe0f212202020-09-13 13:09:39 -060010006
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +000010007 ret = xa_err(xa_store(&tctx->xa, (unsigned long)ctx,
10008 node, GFP_KERNEL));
10009 if (ret) {
10010 kfree(node);
10011 return ret;
Jens Axboe0f212202020-09-13 13:09:39 -060010012 }
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +000010013
10014 mutex_lock(&ctx->uring_lock);
10015 list_add(&node->ctx_node, &ctx->tctx_list);
10016 mutex_unlock(&ctx->uring_lock);
Jens Axboe0f212202020-09-13 13:09:39 -060010017 }
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +000010018 tctx->last = ctx;
Jens Axboe0f212202020-09-13 13:09:39 -060010019 return 0;
10020}
10021
10022/*
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +000010023 * Note that this task has used io_uring. We use it for cancelation purposes.
10024 */
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010025static inline int io_uring_add_tctx_node(struct io_ring_ctx *ctx)
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +000010026{
10027 struct io_uring_task *tctx = current->io_uring;
10028
10029 if (likely(tctx && tctx->last == ctx))
10030 return 0;
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010031 return __io_uring_add_tctx_node(ctx);
Pavel Begunkovcf27f3b2021-03-19 17:22:31 +000010032}
10033
10034/*
Jens Axboe0f212202020-09-13 13:09:39 -060010035 * Remove this io_uring_file -> task mapping.
10036 */
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010037static void io_uring_del_tctx_node(unsigned long index)
Jens Axboe0f212202020-09-13 13:09:39 -060010038{
10039 struct io_uring_task *tctx = current->io_uring;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +000010040 struct io_tctx_node *node;
Pavel Begunkov29412672021-03-06 11:02:11 +000010041
Pavel Begunkoveebd2e32021-03-06 11:02:14 +000010042 if (!tctx)
10043 return;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +000010044 node = xa_erase(&tctx->xa, index);
10045 if (!node)
Pavel Begunkov29412672021-03-06 11:02:11 +000010046 return;
Jens Axboe0f212202020-09-13 13:09:39 -060010047
Pavel Begunkov13bf43f2021-03-06 11:02:12 +000010048 WARN_ON_ONCE(current != node->task);
10049 WARN_ON_ONCE(list_empty(&node->ctx_node));
10050
10051 mutex_lock(&node->ctx->uring_lock);
10052 list_del(&node->ctx_node);
10053 mutex_unlock(&node->ctx->uring_lock);
10054
Pavel Begunkovbaf186c2021-03-06 11:02:15 +000010055 if (tctx->last == node->ctx)
Jens Axboe0f212202020-09-13 13:09:39 -060010056 tctx->last = NULL;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +000010057 kfree(node);
Jens Axboe0f212202020-09-13 13:09:39 -060010058}
10059
Pavel Begunkov8452d4a2021-02-27 11:16:46 +000010060static void io_uring_clean_tctx(struct io_uring_task *tctx)
Pavel Begunkovde7f1d92021-01-04 20:43:29 +000010061{
Pavel Begunkovba5ef6d2021-05-20 13:21:20 +010010062 struct io_wq *wq = tctx->io_wq;
Pavel Begunkov13bf43f2021-03-06 11:02:12 +000010063 struct io_tctx_node *node;
Pavel Begunkovde7f1d92021-01-04 20:43:29 +000010064 unsigned long index;
10065
Jens Axboe8bab4c02021-09-24 07:12:27 -060010066 xa_for_each(&tctx->xa, index, node) {
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010067 io_uring_del_tctx_node(index);
Jens Axboe8bab4c02021-09-24 07:12:27 -060010068 cond_resched();
10069 }
Marco Elverb16ef422021-05-27 11:25:48 +020010070 if (wq) {
10071 /*
10072 * Must be after io_uring_del_task_file() (removes nodes under
10073 * uring_lock) to avoid race with io_uring_try_cancel_iowq().
10074 */
Pavel Begunkovba5ef6d2021-05-20 13:21:20 +010010075 io_wq_put_and_exit(wq);
Pavel Begunkovdadebc32021-08-23 13:30:44 +010010076 tctx->io_wq = NULL;
Marco Elverb16ef422021-05-27 11:25:48 +020010077 }
Pavel Begunkovde7f1d92021-01-04 20:43:29 +000010078}
10079
Pavel Begunkov3f48cf12021-04-11 01:46:27 +010010080static s64 tctx_inflight(struct io_uring_task *tctx, bool tracked)
Pavel Begunkov521d6a72021-03-11 23:29:38 +000010081{
Pavel Begunkov3f48cf12021-04-11 01:46:27 +010010082 if (tracked)
10083 return atomic_read(&tctx->inflight_tracked);
Pavel Begunkov521d6a72021-03-11 23:29:38 +000010084 return percpu_counter_sum(&tctx->inflight);
10085}
10086
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010087/*
10088 * Find any io_uring ctx that this task has registered or done IO on, and cancel
Jens Axboe8e129762021-12-09 08:54:29 -070010089 * requests. @sqd should be not-null IFF it's an SQPOLL thread cancellation.
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010090 */
10091static void io_uring_cancel_generic(bool cancel_all, struct io_sq_data *sqd)
Pavel Begunkov0e9ddb32021-02-07 22:34:26 +000010092{
Pavel Begunkov521d6a72021-03-11 23:29:38 +000010093 struct io_uring_task *tctx = current->io_uring;
Pavel Begunkov734551d2021-04-18 14:52:09 +010010094 struct io_ring_ctx *ctx;
Jens Axboefdaf0832020-10-30 09:37:30 -060010095 s64 inflight;
Pavel Begunkov0e9ddb32021-02-07 22:34:26 +000010096 DEFINE_WAIT(wait);
Jens Axboefdaf0832020-10-30 09:37:30 -060010097
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010098 WARN_ON_ONCE(sqd && sqd->thread != current);
10099
Palash Oswal6d042ff2021-04-27 18:21:49 +053010100 if (!current->io_uring)
10101 return;
Pavel Begunkov17a91052021-05-23 15:48:39 +010010102 if (tctx->io_wq)
10103 io_wq_exit_start(tctx->io_wq);
10104
Jens Axboefdaf0832020-10-30 09:37:30 -060010105 atomic_inc(&tctx->in_idle);
Jens Axboed8a6df12020-10-15 16:24:45 -060010106 do {
Pavel Begunkove9dbe222021-08-09 13:04:20 +010010107 io_uring_drop_tctx_refs(current);
Jens Axboe0f212202020-09-13 13:09:39 -060010108 /* read completions before cancelations */
Pavel Begunkov3dd0c972021-05-16 22:58:04 +010010109 inflight = tctx_inflight(tctx, !cancel_all);
Jens Axboed8a6df12020-10-15 16:24:45 -060010110 if (!inflight)
10111 break;
Jens Axboe0f212202020-09-13 13:09:39 -060010112
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010113 if (!sqd) {
10114 struct io_tctx_node *node;
10115 unsigned long index;
10116
10117 xa_for_each(&tctx->xa, index, node) {
10118 /* sqpoll task will cancel all its requests */
10119 if (node->ctx->sq_data)
10120 continue;
10121 io_uring_try_cancel_requests(node->ctx, current,
10122 cancel_all);
10123 }
10124 } else {
10125 list_for_each_entry(ctx, &sqd->ctx_list, sqd_list)
10126 io_uring_try_cancel_requests(ctx, current,
10127 cancel_all);
10128 }
10129
Jens Axboe8e129762021-12-09 08:54:29 -070010130 prepare_to_wait(&tctx->wait, &wait, TASK_INTERRUPTIBLE);
10131 io_run_task_work();
Pavel Begunkove9dbe222021-08-09 13:04:20 +010010132 io_uring_drop_tctx_refs(current);
Jens Axboe8e129762021-12-09 08:54:29 -070010133
Jens Axboe0f212202020-09-13 13:09:39 -060010134 /*
Pavel Begunkova1bb3cd2021-01-26 15:28:26 +000010135 * If we've seen completions, retry without waiting. This
10136 * avoids a race where a completion comes in before we did
10137 * prepare_to_wait().
Jens Axboe0f212202020-09-13 13:09:39 -060010138 */
Pavel Begunkov3dd0c972021-05-16 22:58:04 +010010139 if (inflight == tctx_inflight(tctx, !cancel_all))
Pavel Begunkova1bb3cd2021-01-26 15:28:26 +000010140 schedule();
Pavel Begunkovf57555e2020-12-20 13:21:44 +000010141 finish_wait(&tctx->wait, &wait);
Jens Axboed8a6df12020-10-15 16:24:45 -060010142 } while (1);
Pavel Begunkovde7f1d92021-01-04 20:43:29 +000010143
Pavel Begunkov8452d4a2021-02-27 11:16:46 +000010144 io_uring_clean_tctx(tctx);
Pavel Begunkov3dd0c972021-05-16 22:58:04 +010010145 if (cancel_all) {
Pavel Begunkovb168b1a2022-01-09 00:53:22 +000010146 /*
10147 * We shouldn't run task_works after cancel, so just leave
10148 * ->in_idle set for normal exit.
10149 */
10150 atomic_dec(&tctx->in_idle);
Pavel Begunkov3f48cf12021-04-11 01:46:27 +010010151 /* for exec all current's requests should be gone, kill tctx */
10152 __io_uring_free(current);
10153 }
Pavel Begunkov44e728b2020-06-15 10:24:04 +030010154}
10155
Hao Xuf552a272021-08-12 12:14:35 +080010156void __io_uring_cancel(bool cancel_all)
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010157{
Hao Xuf552a272021-08-12 12:14:35 +080010158 io_uring_cancel_generic(cancel_all, NULL);
Pavel Begunkov78cc6872021-06-14 02:36:23 +010010159}
10160
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010161static void *io_uring_validate_mmap_request(struct file *file,
10162 loff_t pgoff, size_t sz)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010163{
Jens Axboe2b188cc2019-01-07 10:46:33 -070010164 struct io_ring_ctx *ctx = file->private_data;
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010165 loff_t offset = pgoff << PAGE_SHIFT;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010166 struct page *page;
10167 void *ptr;
10168
10169 switch (offset) {
10170 case IORING_OFF_SQ_RING:
Hristo Venev75b28af2019-08-26 17:23:46 +000010171 case IORING_OFF_CQ_RING:
10172 ptr = ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010173 break;
10174 case IORING_OFF_SQES:
10175 ptr = ctx->sq_sqes;
10176 break;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010177 default:
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010178 return ERR_PTR(-EINVAL);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010179 }
10180
10181 page = virt_to_head_page(ptr);
Matthew Wilcox (Oracle)a50b8542019-09-23 15:34:25 -070010182 if (sz > page_size(page))
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010183 return ERR_PTR(-EINVAL);
10184
10185 return ptr;
10186}
10187
10188#ifdef CONFIG_MMU
10189
10190static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
10191{
10192 size_t sz = vma->vm_end - vma->vm_start;
10193 unsigned long pfn;
10194 void *ptr;
10195
10196 ptr = io_uring_validate_mmap_request(file, vma->vm_pgoff, sz);
10197 if (IS_ERR(ptr))
10198 return PTR_ERR(ptr);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010199
10200 pfn = virt_to_phys(ptr) >> PAGE_SHIFT;
10201 return remap_pfn_range(vma, vma->vm_start, pfn, sz, vma->vm_page_prot);
10202}
10203
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010204#else /* !CONFIG_MMU */
10205
10206static int io_uring_mmap(struct file *file, struct vm_area_struct *vma)
10207{
10208 return vma->vm_flags & (VM_SHARED | VM_MAYSHARE) ? 0 : -EINVAL;
10209}
10210
10211static unsigned int io_uring_nommu_mmap_capabilities(struct file *file)
10212{
10213 return NOMMU_MAP_DIRECT | NOMMU_MAP_READ | NOMMU_MAP_WRITE;
10214}
10215
10216static unsigned long io_uring_nommu_get_unmapped_area(struct file *file,
10217 unsigned long addr, unsigned long len,
10218 unsigned long pgoff, unsigned long flags)
10219{
10220 void *ptr;
10221
10222 ptr = io_uring_validate_mmap_request(file, pgoff, len);
10223 if (IS_ERR(ptr))
10224 return PTR_ERR(ptr);
10225
10226 return (unsigned long) ptr;
10227}
10228
10229#endif /* !CONFIG_MMU */
10230
Pavel Begunkovd9d05212021-01-08 20:57:25 +000010231static int io_sqpoll_wait_sq(struct io_ring_ctx *ctx)
Jens Axboe90554202020-09-03 12:12:41 -060010232{
10233 DEFINE_WAIT(wait);
10234
10235 do {
10236 if (!io_sqring_full(ctx))
10237 break;
Jens Axboe90554202020-09-03 12:12:41 -060010238 prepare_to_wait(&ctx->sqo_sq_wait, &wait, TASK_INTERRUPTIBLE);
10239
10240 if (!io_sqring_full(ctx))
10241 break;
Jens Axboe90554202020-09-03 12:12:41 -060010242 schedule();
10243 } while (!signal_pending(current));
10244
10245 finish_wait(&ctx->sqo_sq_wait, &wait);
Yang Li51993282021-03-09 14:30:41 +080010246 return 0;
Jens Axboe90554202020-09-03 12:12:41 -060010247}
10248
Hao Xuc73ebb62020-11-03 10:54:37 +080010249static int io_get_ext_arg(unsigned flags, const void __user *argp, size_t *argsz,
10250 struct __kernel_timespec __user **ts,
10251 const sigset_t __user **sig)
10252{
10253 struct io_uring_getevents_arg arg;
10254
10255 /*
10256 * If EXT_ARG isn't set, then we have no timespec and the argp pointer
10257 * is just a pointer to the sigset_t.
10258 */
10259 if (!(flags & IORING_ENTER_EXT_ARG)) {
10260 *sig = (const sigset_t __user *) argp;
10261 *ts = NULL;
10262 return 0;
10263 }
10264
10265 /*
10266 * EXT_ARG is set - ensure we agree on the size of it and copy in our
10267 * timespec and sigset_t pointers if good.
10268 */
10269 if (*argsz != sizeof(arg))
10270 return -EINVAL;
10271 if (copy_from_user(&arg, argp, sizeof(arg)))
10272 return -EFAULT;
Dylan Yudaken99475482022-04-12 09:30:42 -070010273 if (arg.pad)
10274 return -EINVAL;
Hao Xuc73ebb62020-11-03 10:54:37 +080010275 *sig = u64_to_user_ptr(arg.sigmask);
10276 *argsz = arg.sigmask_sz;
10277 *ts = u64_to_user_ptr(arg.ts);
10278 return 0;
10279}
10280
Jens Axboe2b188cc2019-01-07 10:46:33 -070010281SYSCALL_DEFINE6(io_uring_enter, unsigned int, fd, u32, to_submit,
Hao Xuc73ebb62020-11-03 10:54:37 +080010282 u32, min_complete, u32, flags, const void __user *, argp,
10283 size_t, argsz)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010284{
10285 struct io_ring_ctx *ctx;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010286 int submitted = 0;
10287 struct fd f;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010288 long ret;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010289
Jens Axboe4c6e2772020-07-01 11:29:10 -060010290 io_run_task_work();
Jens Axboeb41e9852020-02-17 09:52:41 -070010291
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010292 if (unlikely(flags & ~(IORING_ENTER_GETEVENTS | IORING_ENTER_SQ_WAKEUP |
10293 IORING_ENTER_SQ_WAIT | IORING_ENTER_EXT_ARG)))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010294 return -EINVAL;
10295
10296 f = fdget(fd);
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010297 if (unlikely(!f.file))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010298 return -EBADF;
10299
10300 ret = -EOPNOTSUPP;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010301 if (unlikely(f.file->f_op != &io_uring_fops))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010302 goto out_fput;
10303
10304 ret = -ENXIO;
10305 ctx = f.file->private_data;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010306 if (unlikely(!percpu_ref_tryget(&ctx->refs)))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010307 goto out_fput;
10308
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010309 ret = -EBADFD;
Pavel Begunkov33f993d2021-03-19 17:22:30 +000010310 if (unlikely(ctx->flags & IORING_SETUP_R_DISABLED))
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010311 goto out;
10312
Jens Axboe6c271ce2019-01-10 11:22:30 -070010313 /*
10314 * For SQ polling, the thread will do all submissions and completions.
10315 * Just return the requested submit count, and wake the thread if
10316 * we were asked to.
10317 */
Jens Axboeb2a9ead2019-09-12 14:19:16 -060010318 ret = 0;
Jens Axboe6c271ce2019-01-10 11:22:30 -070010319 if (ctx->flags & IORING_SETUP_SQPOLL) {
Pavel Begunkov90f67362021-08-09 20:18:12 +010010320 io_cqring_overflow_flush(ctx);
Pavel Begunkov89448c42020-12-17 00:24:39 +000010321
Jens Axboe21f96522021-08-14 09:04:40 -060010322 if (unlikely(ctx->sq_data->thread == NULL)) {
10323 ret = -EOWNERDEAD;
Stefan Metzmacher04147482021-03-07 11:54:29 +010010324 goto out;
Jens Axboe21f96522021-08-14 09:04:40 -060010325 }
Jens Axboe6c271ce2019-01-10 11:22:30 -070010326 if (flags & IORING_ENTER_SQ_WAKEUP)
Jens Axboe534ca6d2020-09-02 13:52:19 -060010327 wake_up(&ctx->sq_data->wait);
Pavel Begunkovd9d05212021-01-08 20:57:25 +000010328 if (flags & IORING_ENTER_SQ_WAIT) {
10329 ret = io_sqpoll_wait_sq(ctx);
10330 if (ret)
10331 goto out;
10332 }
Jens Axboe6c271ce2019-01-10 11:22:30 -070010333 submitted = to_submit;
Jens Axboeb2a9ead2019-09-12 14:19:16 -060010334 } else if (to_submit) {
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010335 ret = io_uring_add_tctx_node(ctx);
Jens Axboe0f212202020-09-13 13:09:39 -060010336 if (unlikely(ret))
10337 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010338 mutex_lock(&ctx->uring_lock);
Jens Axboe0f212202020-09-13 13:09:39 -060010339 submitted = io_submit_sqes(ctx, to_submit);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010340 mutex_unlock(&ctx->uring_lock);
Pavel Begunkov7c504e652019-12-18 19:53:45 +030010341
10342 if (submitted != to_submit)
10343 goto out;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010344 }
10345 if (flags & IORING_ENTER_GETEVENTS) {
Hao Xuc73ebb62020-11-03 10:54:37 +080010346 const sigset_t __user *sig;
10347 struct __kernel_timespec __user *ts;
10348
10349 ret = io_get_ext_arg(flags, argp, &argsz, &ts, &sig);
10350 if (unlikely(ret))
10351 goto out;
10352
Jens Axboe2b188cc2019-01-07 10:46:33 -070010353 min_complete = min(min_complete, ctx->cq_entries);
10354
Xiaoguang Wang32b22442020-03-11 09:26:09 +080010355 /*
10356 * When SETUP_IOPOLL and SETUP_SQPOLL are both enabled, user
10357 * space applications don't need to do io completion events
10358 * polling again, they can rely on io_sq_thread to do polling
10359 * work, which can reduce cpu usage and uring_lock contention.
10360 */
10361 if (ctx->flags & IORING_SETUP_IOPOLL &&
10362 !(ctx->flags & IORING_SETUP_SQPOLL)) {
Pavel Begunkov7668b922020-07-07 16:36:21 +030010363 ret = io_iopoll_check(ctx, min_complete);
Jens Axboedef596e2019-01-09 08:59:42 -070010364 } else {
Hao Xuc73ebb62020-11-03 10:54:37 +080010365 ret = io_cqring_wait(ctx, min_complete, sig, argsz, ts);
Jens Axboedef596e2019-01-09 08:59:42 -070010366 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010367 }
10368
Pavel Begunkov7c504e652019-12-18 19:53:45 +030010369out:
Pavel Begunkov6805b322019-10-08 02:18:42 +030010370 percpu_ref_put(&ctx->refs);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010371out_fput:
10372 fdput(f);
10373 return submitted ? submitted : ret;
10374}
10375
Tobias Klauserbebdb652020-02-26 18:38:32 +010010376#ifdef CONFIG_PROC_FS
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010377static int io_uring_show_cred(struct seq_file *m, unsigned int id,
10378 const struct cred *cred)
Jens Axboe87ce9552020-01-30 08:25:34 -070010379{
Jens Axboe87ce9552020-01-30 08:25:34 -070010380 struct user_namespace *uns = seq_user_ns(m);
10381 struct group_info *gi;
10382 kernel_cap_t cap;
10383 unsigned __capi;
10384 int g;
10385
10386 seq_printf(m, "%5d\n", id);
10387 seq_put_decimal_ull(m, "\tUid:\t", from_kuid_munged(uns, cred->uid));
10388 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->euid));
10389 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid));
10390 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->fsuid));
10391 seq_put_decimal_ull(m, "\n\tGid:\t", from_kgid_munged(uns, cred->gid));
10392 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->egid));
10393 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->sgid));
10394 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->fsgid));
10395 seq_puts(m, "\n\tGroups:\t");
10396 gi = cred->group_info;
10397 for (g = 0; g < gi->ngroups; g++) {
10398 seq_put_decimal_ull(m, g ? " " : "",
10399 from_kgid_munged(uns, gi->gid[g]));
10400 }
10401 seq_puts(m, "\n\tCapEff:\t");
10402 cap = cred->cap_effective;
10403 CAP_FOR_EACH_U32(__capi)
10404 seq_put_hex_ll(m, NULL, cap.cap[CAP_LAST_U32 - __capi], 8);
10405 seq_putc(m, '\n');
10406 return 0;
10407}
10408
10409static void __io_uring_show_fdinfo(struct io_ring_ctx *ctx, struct seq_file *m)
10410{
Jens Axboe3d791272023-10-21 12:30:29 -060010411 int sq_pid = -1, sq_cpu = -1;
Jens Axboefad8e0d2020-09-28 08:57:48 -060010412 bool has_lock;
Jens Axboe87ce9552020-01-30 08:25:34 -070010413 int i;
10414
Jens Axboefad8e0d2020-09-28 08:57:48 -060010415 /*
10416 * Avoid ABBA deadlock between the seq lock and the io_uring mutex,
10417 * since fdinfo case grabs it in the opposite direction of normal use
10418 * cases. If we fail to get the lock, we just don't iterate any
10419 * structures that could be going away outside the io_uring mutex.
10420 */
10421 has_lock = mutex_trylock(&ctx->uring_lock);
10422
Jens Axboe5f3f26f2021-02-25 10:17:46 -070010423 if (has_lock && (ctx->flags & IORING_SETUP_SQPOLL)) {
Jens Axboe3d791272023-10-21 12:30:29 -060010424 struct io_sq_data *sq = ctx->sq_data;
10425
10426 if (mutex_trylock(&sq->lock)) {
10427 if (sq->thread) {
10428 sq_pid = task_pid_nr(sq->thread);
10429 sq_cpu = task_cpu(sq->thread);
10430 }
10431 mutex_unlock(&sq->lock);
10432 }
Jens Axboe5f3f26f2021-02-25 10:17:46 -070010433 }
Joseph Qidbbe9c62020-09-29 09:01:22 -060010434
Jens Axboe3d791272023-10-21 12:30:29 -060010435 seq_printf(m, "SqThread:\t%d\n", sq_pid);
10436 seq_printf(m, "SqThreadCpu:\t%d\n", sq_cpu);
Jens Axboe87ce9552020-01-30 08:25:34 -070010437 seq_printf(m, "UserFiles:\t%u\n", ctx->nr_user_files);
Jens Axboefad8e0d2020-09-28 08:57:48 -060010438 for (i = 0; has_lock && i < ctx->nr_user_files; i++) {
Jens Axboe7b29f922021-03-12 08:30:14 -070010439 struct file *f = io_file_from_index(ctx, i);
Jens Axboe87ce9552020-01-30 08:25:34 -070010440
Jens Axboe87ce9552020-01-30 08:25:34 -070010441 if (f)
10442 seq_printf(m, "%5u: %s\n", i, file_dentry(f)->d_iname);
10443 else
10444 seq_printf(m, "%5u: <none>\n", i);
10445 }
10446 seq_printf(m, "UserBufs:\t%u\n", ctx->nr_user_bufs);
Jens Axboefad8e0d2020-09-28 08:57:48 -060010447 for (i = 0; has_lock && i < ctx->nr_user_bufs; i++) {
Pavel Begunkov41edf1a2021-04-25 14:32:23 +010010448 struct io_mapped_ubuf *buf = ctx->user_bufs[i];
Pavel Begunkov4751f532021-04-01 15:43:55 +010010449 unsigned int len = buf->ubuf_end - buf->ubuf;
Jens Axboe87ce9552020-01-30 08:25:34 -070010450
Pavel Begunkov4751f532021-04-01 15:43:55 +010010451 seq_printf(m, "%5u: 0x%llx/%u\n", i, buf->ubuf, len);
Jens Axboe87ce9552020-01-30 08:25:34 -070010452 }
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010453 if (has_lock && !xa_empty(&ctx->personalities)) {
10454 unsigned long index;
10455 const struct cred *cred;
10456
Jens Axboe87ce9552020-01-30 08:25:34 -070010457 seq_printf(m, "Personalities:\n");
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010458 xa_for_each(&ctx->personalities, index, cred)
10459 io_uring_show_cred(m, index, cred);
Jens Axboe87ce9552020-01-30 08:25:34 -070010460 }
Jens Axboed7718a92020-02-14 22:23:12 -070010461 seq_printf(m, "PollList:\n");
Jens Axboe79ebeae2021-08-10 15:18:27 -060010462 spin_lock(&ctx->completion_lock);
Jens Axboed7718a92020-02-14 22:23:12 -070010463 for (i = 0; i < (1U << ctx->cancel_hash_bits); i++) {
10464 struct hlist_head *list = &ctx->cancel_hash[i];
10465 struct io_kiocb *req;
10466
10467 hlist_for_each_entry(req, list, hash_node)
10468 seq_printf(m, " op=%d, task_works=%d\n", req->opcode,
10469 req->task->task_works != NULL);
10470 }
Jens Axboe79ebeae2021-08-10 15:18:27 -060010471 spin_unlock(&ctx->completion_lock);
Jens Axboefad8e0d2020-09-28 08:57:48 -060010472 if (has_lock)
10473 mutex_unlock(&ctx->uring_lock);
Jens Axboe87ce9552020-01-30 08:25:34 -070010474}
10475
10476static void io_uring_show_fdinfo(struct seq_file *m, struct file *f)
10477{
10478 struct io_ring_ctx *ctx = f->private_data;
10479
10480 if (percpu_ref_tryget(&ctx->refs)) {
10481 __io_uring_show_fdinfo(ctx, m);
10482 percpu_ref_put(&ctx->refs);
10483 }
10484}
Tobias Klauserbebdb652020-02-26 18:38:32 +010010485#endif
Jens Axboe87ce9552020-01-30 08:25:34 -070010486
Jens Axboe2b188cc2019-01-07 10:46:33 -070010487static const struct file_operations io_uring_fops = {
10488 .release = io_uring_release,
10489 .mmap = io_uring_mmap,
Roman Penyaev6c5c2402019-11-28 12:53:22 +010010490#ifndef CONFIG_MMU
10491 .get_unmapped_area = io_uring_nommu_get_unmapped_area,
10492 .mmap_capabilities = io_uring_nommu_mmap_capabilities,
10493#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -070010494 .poll = io_uring_poll,
Tobias Klauserbebdb652020-02-26 18:38:32 +010010495#ifdef CONFIG_PROC_FS
Jens Axboe87ce9552020-01-30 08:25:34 -070010496 .show_fdinfo = io_uring_show_fdinfo,
Tobias Klauserbebdb652020-02-26 18:38:32 +010010497#endif
Jens Axboe2b188cc2019-01-07 10:46:33 -070010498};
10499
10500static int io_allocate_scq_urings(struct io_ring_ctx *ctx,
10501 struct io_uring_params *p)
10502{
Hristo Venev75b28af2019-08-26 17:23:46 +000010503 struct io_rings *rings;
10504 size_t size, sq_array_offset;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010505
Jens Axboebd740482020-08-05 12:58:23 -060010506 /* make sure these are sane, as we already accounted them */
10507 ctx->sq_entries = p->sq_entries;
10508 ctx->cq_entries = p->cq_entries;
10509
Hristo Venev75b28af2019-08-26 17:23:46 +000010510 size = rings_size(p->sq_entries, p->cq_entries, &sq_array_offset);
10511 if (size == SIZE_MAX)
10512 return -EOVERFLOW;
10513
10514 rings = io_mem_alloc(size);
10515 if (!rings)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010516 return -ENOMEM;
10517
Hristo Venev75b28af2019-08-26 17:23:46 +000010518 ctx->rings = rings;
10519 ctx->sq_array = (u32 *)((char *)rings + sq_array_offset);
10520 rings->sq_ring_mask = p->sq_entries - 1;
10521 rings->cq_ring_mask = p->cq_entries - 1;
10522 rings->sq_ring_entries = p->sq_entries;
10523 rings->cq_ring_entries = p->cq_entries;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010524
10525 size = array_size(sizeof(struct io_uring_sqe), p->sq_entries);
Jens Axboeeb065d32019-11-20 09:26:29 -070010526 if (size == SIZE_MAX) {
10527 io_mem_free(ctx->rings);
10528 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010529 return -EOVERFLOW;
Jens Axboeeb065d32019-11-20 09:26:29 -070010530 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010531
10532 ctx->sq_sqes = io_mem_alloc(size);
Jens Axboeeb065d32019-11-20 09:26:29 -070010533 if (!ctx->sq_sqes) {
10534 io_mem_free(ctx->rings);
10535 ctx->rings = NULL;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010536 return -ENOMEM;
Jens Axboeeb065d32019-11-20 09:26:29 -070010537 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010538
Jens Axboe2b188cc2019-01-07 10:46:33 -070010539 return 0;
10540}
10541
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010542static int io_uring_install_fd(struct io_ring_ctx *ctx, struct file *file)
10543{
10544 int ret, fd;
10545
10546 fd = get_unused_fd_flags(O_RDWR | O_CLOEXEC);
10547 if (fd < 0)
10548 return fd;
10549
Pavel Begunkoveef51da2021-06-14 02:36:15 +010010550 ret = io_uring_add_tctx_node(ctx);
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010551 if (ret) {
10552 put_unused_fd(fd);
10553 return ret;
10554 }
10555 fd_install(fd, file);
10556 return fd;
10557}
10558
Jens Axboe2b188cc2019-01-07 10:46:33 -070010559/*
10560 * Allocate an anonymous fd, this is what constitutes the application
10561 * visible backing of an io_uring instance. The application mmaps this
10562 * fd to gain access to the SQ/CQ ring details. If UNIX sockets are enabled,
10563 * we have to tie this fd to a socket for file garbage collection purposes.
10564 */
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010565static struct file *io_uring_get_file(struct io_ring_ctx *ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010566{
10567 struct file *file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010568#if defined(CONFIG_UNIX)
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010569 int ret;
10570
Jens Axboe2b188cc2019-01-07 10:46:33 -070010571 ret = sock_create_kern(&init_net, PF_UNIX, SOCK_RAW, IPPROTO_IP,
10572 &ctx->ring_sock);
10573 if (ret)
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010574 return ERR_PTR(ret);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010575#endif
10576
Jens Axboe2b188cc2019-01-07 10:46:33 -070010577 file = anon_inode_getfile("[io_uring]", &io_uring_fops, ctx,
10578 O_RDWR | O_CLOEXEC);
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010579#if defined(CONFIG_UNIX)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010580 if (IS_ERR(file)) {
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010581 sock_release(ctx->ring_sock);
10582 ctx->ring_sock = NULL;
10583 } else {
10584 ctx->ring_sock->file = file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010585 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010586#endif
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010587 return file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010588}
10589
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010590static int io_uring_create(unsigned entries, struct io_uring_params *p,
10591 struct io_uring_params __user *params)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010592{
Jens Axboe2b188cc2019-01-07 10:46:33 -070010593 struct io_ring_ctx *ctx;
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010594 struct file *file;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010595 int ret;
10596
Jens Axboe8110c1a2019-12-28 15:39:54 -070010597 if (!entries)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010598 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -070010599 if (entries > IORING_MAX_ENTRIES) {
10600 if (!(p->flags & IORING_SETUP_CLAMP))
10601 return -EINVAL;
10602 entries = IORING_MAX_ENTRIES;
10603 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010604
10605 /*
10606 * Use twice as many entries for the CQ ring. It's possible for the
10607 * application to drive a higher depth than the size of the SQ ring,
10608 * since the sqes are only used at submission time. This allows for
Jens Axboe33a107f2019-10-04 12:10:03 -060010609 * some flexibility in overcommitting a bit. If the application has
10610 * set IORING_SETUP_CQSIZE, it will have passed in the desired number
10611 * of CQ ring entries manually.
Jens Axboe2b188cc2019-01-07 10:46:33 -070010612 */
10613 p->sq_entries = roundup_pow_of_two(entries);
Jens Axboe33a107f2019-10-04 12:10:03 -060010614 if (p->flags & IORING_SETUP_CQSIZE) {
10615 /*
10616 * If IORING_SETUP_CQSIZE is set, we do the same roundup
10617 * to a power-of-two, if it isn't already. We do NOT impose
10618 * any cq vs sq ring sizing.
10619 */
Joseph Qieb2667b32020-11-24 15:03:03 +080010620 if (!p->cq_entries)
Jens Axboe33a107f2019-10-04 12:10:03 -060010621 return -EINVAL;
Jens Axboe8110c1a2019-12-28 15:39:54 -070010622 if (p->cq_entries > IORING_MAX_CQ_ENTRIES) {
10623 if (!(p->flags & IORING_SETUP_CLAMP))
10624 return -EINVAL;
10625 p->cq_entries = IORING_MAX_CQ_ENTRIES;
10626 }
Joseph Qieb2667b32020-11-24 15:03:03 +080010627 p->cq_entries = roundup_pow_of_two(p->cq_entries);
10628 if (p->cq_entries < p->sq_entries)
10629 return -EINVAL;
Jens Axboe33a107f2019-10-04 12:10:03 -060010630 } else {
10631 p->cq_entries = 2 * p->sq_entries;
10632 }
Jens Axboe2b188cc2019-01-07 10:46:33 -070010633
Jens Axboe2b188cc2019-01-07 10:46:33 -070010634 ctx = io_ring_ctx_alloc(p);
Jens Axboe62e398b2021-02-21 16:19:37 -070010635 if (!ctx)
Jens Axboe2b188cc2019-01-07 10:46:33 -070010636 return -ENOMEM;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010637 ctx->compat = in_compat_syscall();
Ondrej Mosnacek21d063d2023-07-18 13:56:07 +020010638 if (!ns_capable_noaudit(&init_user_ns, CAP_IPC_LOCK))
Jens Axboe62e398b2021-02-21 16:19:37 -070010639 ctx->user = get_uid(current_user());
Jens Axboe2aede0e2020-09-14 10:45:53 -060010640
10641 /*
10642 * This is just grabbed for accounting purposes. When a process exits,
10643 * the mm is exited and dropped before the files, hence we need to hang
10644 * on to this mm purely for the purposes of being able to unaccount
10645 * memory (locked/pinned vm). It's not used for anything else.
10646 */
Jens Axboe6b7898e2020-08-25 07:58:00 -060010647 mmgrab(current->mm);
Jens Axboe2aede0e2020-09-14 10:45:53 -060010648 ctx->mm_account = current->mm;
Jens Axboe6b7898e2020-08-25 07:58:00 -060010649
Jens Axboe2b188cc2019-01-07 10:46:33 -070010650 ret = io_allocate_scq_urings(ctx, p);
10651 if (ret)
10652 goto err;
10653
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010654 ret = io_sq_offload_create(ctx, p);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010655 if (ret)
10656 goto err;
Pavel Begunkoveae071c2021-04-25 14:32:24 +010010657 /* always set a rsrc node */
Pavel Begunkov47b228c2021-04-29 11:46:48 +010010658 ret = io_rsrc_node_switch_start(ctx);
10659 if (ret)
10660 goto err;
Pavel Begunkoveae071c2021-04-25 14:32:24 +010010661 io_rsrc_node_switch(ctx, NULL);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010662
Jens Axboe2b188cc2019-01-07 10:46:33 -070010663 memset(&p->sq_off, 0, sizeof(p->sq_off));
Hristo Venev75b28af2019-08-26 17:23:46 +000010664 p->sq_off.head = offsetof(struct io_rings, sq.head);
10665 p->sq_off.tail = offsetof(struct io_rings, sq.tail);
10666 p->sq_off.ring_mask = offsetof(struct io_rings, sq_ring_mask);
10667 p->sq_off.ring_entries = offsetof(struct io_rings, sq_ring_entries);
10668 p->sq_off.flags = offsetof(struct io_rings, sq_flags);
10669 p->sq_off.dropped = offsetof(struct io_rings, sq_dropped);
10670 p->sq_off.array = (char *)ctx->sq_array - (char *)ctx->rings;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010671
10672 memset(&p->cq_off, 0, sizeof(p->cq_off));
Hristo Venev75b28af2019-08-26 17:23:46 +000010673 p->cq_off.head = offsetof(struct io_rings, cq.head);
10674 p->cq_off.tail = offsetof(struct io_rings, cq.tail);
10675 p->cq_off.ring_mask = offsetof(struct io_rings, cq_ring_mask);
10676 p->cq_off.ring_entries = offsetof(struct io_rings, cq_ring_entries);
10677 p->cq_off.overflow = offsetof(struct io_rings, cq_overflow);
10678 p->cq_off.cqes = offsetof(struct io_rings, cqes);
Stefano Garzarella0d9b5b32020-05-15 18:38:04 +020010679 p->cq_off.flags = offsetof(struct io_rings, cq_flags);
Jens Axboeac90f242019-09-06 10:26:21 -060010680
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010681 p->features = IORING_FEAT_SINGLE_MMAP | IORING_FEAT_NODROP |
10682 IORING_FEAT_SUBMIT_STABLE | IORING_FEAT_RW_CUR_POS |
Jiufei Xue5769a352020-06-17 17:53:55 +080010683 IORING_FEAT_CUR_PERSONALITY | IORING_FEAT_FAST_POLL |
Hao Xuc73ebb62020-11-03 10:54:37 +080010684 IORING_FEAT_POLL_32BITS | IORING_FEAT_SQPOLL_NONFIXED |
Pavel Begunkov96905572021-06-10 16:37:38 +010010685 IORING_FEAT_EXT_ARG | IORING_FEAT_NATIVE_WORKERS |
10686 IORING_FEAT_RSRC_TAGS;
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010687
10688 if (copy_to_user(params, p, sizeof(*p))) {
10689 ret = -EFAULT;
10690 goto err;
10691 }
Jens Axboed1719f72020-07-30 13:43:53 -060010692
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010693 file = io_uring_get_file(ctx);
10694 if (IS_ERR(file)) {
10695 ret = PTR_ERR(file);
10696 goto err;
10697 }
10698
Jens Axboed1719f72020-07-30 13:43:53 -060010699 /*
Jens Axboe044c1ab2019-10-28 09:15:33 -060010700 * Install ring fd as the very last thing, so we don't risk someone
10701 * having closed it before we finish setup
10702 */
Pavel Begunkov9faadcc2020-12-21 18:34:05 +000010703 ret = io_uring_install_fd(ctx, file);
10704 if (ret < 0) {
10705 /* fput will clean it up */
10706 fput(file);
10707 return ret;
10708 }
Jens Axboe044c1ab2019-10-28 09:15:33 -060010709
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020010710 trace_io_uring_create(ret, ctx, p->sq_entries, p->cq_entries, p->flags);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010711 return ret;
10712err:
10713 io_ring_ctx_wait_and_kill(ctx);
10714 return ret;
10715}
10716
10717/*
10718 * Sets up an aio uring context, and returns the fd. Applications asks for a
10719 * ring size, we return the actual sq/cq ring sizes (among other things) in the
10720 * params structure passed in.
10721 */
10722static long io_uring_setup(u32 entries, struct io_uring_params __user *params)
10723{
10724 struct io_uring_params p;
Jens Axboe2b188cc2019-01-07 10:46:33 -070010725 int i;
10726
10727 if (copy_from_user(&p, params, sizeof(p)))
10728 return -EFAULT;
10729 for (i = 0; i < ARRAY_SIZE(p.resv); i++) {
10730 if (p.resv[i])
10731 return -EINVAL;
10732 }
10733
Jens Axboe6c271ce2019-01-10 11:22:30 -070010734 if (p.flags & ~(IORING_SETUP_IOPOLL | IORING_SETUP_SQPOLL |
Jens Axboe8110c1a2019-12-28 15:39:54 -070010735 IORING_SETUP_SQ_AFF | IORING_SETUP_CQSIZE |
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010736 IORING_SETUP_CLAMP | IORING_SETUP_ATTACH_WQ |
10737 IORING_SETUP_R_DISABLED))
Jens Axboe2b188cc2019-01-07 10:46:33 -070010738 return -EINVAL;
10739
Xiaoguang Wang7f136572020-05-05 16:28:53 +080010740 return io_uring_create(entries, &p, params);
Jens Axboe2b188cc2019-01-07 10:46:33 -070010741}
10742
10743SYSCALL_DEFINE2(io_uring_setup, u32, entries,
10744 struct io_uring_params __user *, params)
10745{
10746 return io_uring_setup(entries, params);
10747}
10748
Jens Axboe66f4af92020-01-16 15:36:52 -070010749static int io_probe(struct io_ring_ctx *ctx, void __user *arg, unsigned nr_args)
10750{
10751 struct io_uring_probe *p;
10752 size_t size;
10753 int i, ret;
10754
10755 size = struct_size(p, ops, nr_args);
10756 if (size == SIZE_MAX)
10757 return -EOVERFLOW;
10758 p = kzalloc(size, GFP_KERNEL);
10759 if (!p)
10760 return -ENOMEM;
10761
10762 ret = -EFAULT;
10763 if (copy_from_user(p, arg, size))
10764 goto out;
10765 ret = -EINVAL;
10766 if (memchr_inv(p, 0, size))
10767 goto out;
10768
10769 p->last_op = IORING_OP_LAST - 1;
10770 if (nr_args > IORING_OP_LAST)
10771 nr_args = IORING_OP_LAST;
10772
10773 for (i = 0; i < nr_args; i++) {
10774 p->ops[i].op = i;
10775 if (!io_op_defs[i].not_supported)
10776 p->ops[i].flags = IO_URING_OP_SUPPORTED;
10777 }
10778 p->ops_len = i;
10779
10780 ret = 0;
10781 if (copy_to_user(arg, p, size))
10782 ret = -EFAULT;
10783out:
10784 kfree(p);
10785 return ret;
10786}
10787
Jens Axboe071698e2020-01-28 10:04:42 -070010788static int io_register_personality(struct io_ring_ctx *ctx)
10789{
Jens Axboe4379bf82021-02-15 13:40:22 -070010790 const struct cred *creds;
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010791 u32 id;
Jens Axboe1e6fa522020-10-15 08:46:24 -060010792 int ret;
Jens Axboe071698e2020-01-28 10:04:42 -070010793
Jens Axboe4379bf82021-02-15 13:40:22 -070010794 creds = get_current_cred();
Jens Axboe1e6fa522020-10-15 08:46:24 -060010795
Matthew Wilcox (Oracle)61cf9372021-03-08 14:16:16 +000010796 ret = xa_alloc_cyclic(&ctx->personalities, &id, (void *)creds,
10797 XA_LIMIT(0, USHRT_MAX), &ctx->pers_next, GFP_KERNEL);
Jens Axboea30f8952021-08-20 14:53:59 -060010798 if (ret < 0) {
10799 put_cred(creds);
10800 return ret;
10801 }
10802 return id;
Jens Axboe071698e2020-01-28 10:04:42 -070010803}
10804
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010805static int io_register_restrictions(struct io_ring_ctx *ctx, void __user *arg,
10806 unsigned int nr_args)
10807{
10808 struct io_uring_restriction *res;
10809 size_t size;
10810 int i, ret;
10811
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010812 /* Restrictions allowed only if rings started disabled */
10813 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
10814 return -EBADFD;
10815
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010816 /* We allow only a single restrictions registration */
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010817 if (ctx->restrictions.registered)
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010818 return -EBUSY;
10819
10820 if (!arg || nr_args > IORING_MAX_RESTRICTIONS)
10821 return -EINVAL;
10822
10823 size = array_size(nr_args, sizeof(*res));
10824 if (size == SIZE_MAX)
10825 return -EOVERFLOW;
10826
10827 res = memdup_user(arg, size);
10828 if (IS_ERR(res))
10829 return PTR_ERR(res);
10830
10831 ret = 0;
10832
10833 for (i = 0; i < nr_args; i++) {
10834 switch (res[i].opcode) {
10835 case IORING_RESTRICTION_REGISTER_OP:
10836 if (res[i].register_op >= IORING_REGISTER_LAST) {
10837 ret = -EINVAL;
10838 goto out;
10839 }
10840
10841 __set_bit(res[i].register_op,
10842 ctx->restrictions.register_op);
10843 break;
10844 case IORING_RESTRICTION_SQE_OP:
10845 if (res[i].sqe_op >= IORING_OP_LAST) {
10846 ret = -EINVAL;
10847 goto out;
10848 }
10849
10850 __set_bit(res[i].sqe_op, ctx->restrictions.sqe_op);
10851 break;
10852 case IORING_RESTRICTION_SQE_FLAGS_ALLOWED:
10853 ctx->restrictions.sqe_flags_allowed = res[i].sqe_flags;
10854 break;
10855 case IORING_RESTRICTION_SQE_FLAGS_REQUIRED:
10856 ctx->restrictions.sqe_flags_required = res[i].sqe_flags;
10857 break;
10858 default:
10859 ret = -EINVAL;
10860 goto out;
10861 }
10862 }
10863
10864out:
10865 /* Reset all restrictions if an error happened */
10866 if (ret != 0)
10867 memset(&ctx->restrictions, 0, sizeof(ctx->restrictions));
10868 else
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010869 ctx->restrictions.registered = true;
Stefano Garzarella21b55db2020-08-27 16:58:30 +020010870
10871 kfree(res);
10872 return ret;
10873}
10874
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010875static int io_register_enable_rings(struct io_ring_ctx *ctx)
10876{
10877 if (!(ctx->flags & IORING_SETUP_R_DISABLED))
10878 return -EBADFD;
10879
10880 if (ctx->restrictions.registered)
10881 ctx->restricted = 1;
10882
Pavel Begunkov0298ef92021-03-08 13:20:57 +000010883 ctx->flags &= ~IORING_SETUP_R_DISABLED;
10884 if (ctx->sq_data && wq_has_sleeper(&ctx->sq_data->wait))
10885 wake_up(&ctx->sq_data->wait);
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020010886 return 0;
10887}
10888
Pavel Begunkovfdecb662021-04-25 14:32:20 +010010889static int __io_register_rsrc_update(struct io_ring_ctx *ctx, unsigned type,
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010890 struct io_uring_rsrc_update2 *up,
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010891 unsigned nr_args)
10892{
10893 __u32 tmp;
10894 int err;
10895
10896 if (check_add_overflow(up->offset, nr_args, &tmp))
10897 return -EOVERFLOW;
10898 err = io_rsrc_node_switch_start(ctx);
10899 if (err)
10900 return err;
10901
Pavel Begunkovfdecb662021-04-25 14:32:20 +010010902 switch (type) {
10903 case IORING_RSRC_FILE:
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010904 return __io_sqe_files_update(ctx, up, nr_args);
Pavel Begunkov634d00d2021-04-25 14:32:26 +010010905 case IORING_RSRC_BUFFER:
10906 return __io_sqe_buffers_update(ctx, up, nr_args);
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010907 }
10908 return -EINVAL;
10909}
10910
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010911static int io_register_files_update(struct io_ring_ctx *ctx, void __user *arg,
10912 unsigned nr_args)
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010913{
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010914 struct io_uring_rsrc_update2 up;
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010915
10916 if (!nr_args)
10917 return -EINVAL;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010918 memset(&up, 0, sizeof(up));
10919 if (copy_from_user(&up, arg, sizeof(struct io_uring_rsrc_update)))
10920 return -EFAULT;
Dylan Yudaken7a7c9f92022-04-12 09:30:40 -070010921 if (up.resv || up.resv2)
Dylan Yudaken22aa1592022-04-12 09:30:39 -070010922 return -EINVAL;
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010923 return __io_register_rsrc_update(ctx, IORING_RSRC_FILE, &up, nr_args);
10924}
10925
10926static int io_register_rsrc_update(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov992da012021-06-10 16:37:37 +010010927 unsigned size, unsigned type)
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010010928{
10929 struct io_uring_rsrc_update2 up;
10930
10931 if (size != sizeof(up))
10932 return -EINVAL;
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010933 if (copy_from_user(&up, arg, sizeof(up)))
10934 return -EFAULT;
Dylan Yudaken7a7c9f92022-04-12 09:30:40 -070010935 if (!up.nr || up.resv || up.resv2)
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010936 return -EINVAL;
Pavel Begunkov992da012021-06-10 16:37:37 +010010937 return __io_register_rsrc_update(ctx, type, &up, up.nr);
Pavel Begunkov98f0b3b2021-04-25 14:32:19 +010010938}
10939
Pavel Begunkov792e3582021-04-25 14:32:21 +010010940static int io_register_rsrc(struct io_ring_ctx *ctx, void __user *arg,
Pavel Begunkov992da012021-06-10 16:37:37 +010010941 unsigned int size, unsigned int type)
Pavel Begunkov792e3582021-04-25 14:32:21 +010010942{
10943 struct io_uring_rsrc_register rr;
10944
10945 /* keep it extendible */
10946 if (size != sizeof(rr))
10947 return -EINVAL;
10948
10949 memset(&rr, 0, sizeof(rr));
10950 if (copy_from_user(&rr, arg, size))
10951 return -EFAULT;
Pavel Begunkov992da012021-06-10 16:37:37 +010010952 if (!rr.nr || rr.resv || rr.resv2)
Pavel Begunkov792e3582021-04-25 14:32:21 +010010953 return -EINVAL;
10954
Pavel Begunkov992da012021-06-10 16:37:37 +010010955 switch (type) {
Pavel Begunkov792e3582021-04-25 14:32:21 +010010956 case IORING_RSRC_FILE:
10957 return io_sqe_files_register(ctx, u64_to_user_ptr(rr.data),
10958 rr.nr, u64_to_user_ptr(rr.tags));
Pavel Begunkov634d00d2021-04-25 14:32:26 +010010959 case IORING_RSRC_BUFFER:
10960 return io_sqe_buffers_register(ctx, u64_to_user_ptr(rr.data),
10961 rr.nr, u64_to_user_ptr(rr.tags));
Pavel Begunkov792e3582021-04-25 14:32:21 +010010962 }
10963 return -EINVAL;
10964}
10965
Jens Axboefe764212021-06-17 10:19:54 -060010966static int io_register_iowq_aff(struct io_ring_ctx *ctx, void __user *arg,
10967 unsigned len)
10968{
10969 struct io_uring_task *tctx = current->io_uring;
10970 cpumask_var_t new_mask;
10971 int ret;
10972
10973 if (!tctx || !tctx->io_wq)
10974 return -EINVAL;
10975
10976 if (!alloc_cpumask_var(&new_mask, GFP_KERNEL))
10977 return -ENOMEM;
10978
10979 cpumask_clear(new_mask);
10980 if (len > cpumask_size())
10981 len = cpumask_size();
10982
Eugene Syromiatnikovfe223dd2022-04-06 13:55:33 +020010983 if (in_compat_syscall()) {
10984 ret = compat_get_bitmap(cpumask_bits(new_mask),
10985 (const compat_ulong_t __user *)arg,
10986 len * 8 /* CHAR_BIT */);
10987 } else {
10988 ret = copy_from_user(new_mask, arg, len);
10989 }
10990
10991 if (ret) {
Jens Axboefe764212021-06-17 10:19:54 -060010992 free_cpumask_var(new_mask);
10993 return -EFAULT;
10994 }
10995
10996 ret = io_wq_cpu_affinity(tctx->io_wq, new_mask);
10997 free_cpumask_var(new_mask);
10998 return ret;
10999}
11000
11001static int io_unregister_iowq_aff(struct io_ring_ctx *ctx)
11002{
11003 struct io_uring_task *tctx = current->io_uring;
11004
11005 if (!tctx || !tctx->io_wq)
11006 return -EINVAL;
11007
11008 return io_wq_cpu_affinity(tctx->io_wq, NULL);
11009}
11010
Jens Axboe2e480052021-08-27 11:33:19 -060011011static int io_register_iowq_max_workers(struct io_ring_ctx *ctx,
11012 void __user *arg)
Pavel Begunkovb22fa622021-10-21 13:20:29 +010011013 __must_hold(&ctx->uring_lock)
Jens Axboe2e480052021-08-27 11:33:19 -060011014{
Pavel Begunkovb22fa622021-10-21 13:20:29 +010011015 struct io_tctx_node *node;
Jens Axboefa846932021-09-01 14:15:59 -060011016 struct io_uring_task *tctx = NULL;
11017 struct io_sq_data *sqd = NULL;
Jens Axboe2e480052021-08-27 11:33:19 -060011018 __u32 new_count[2];
11019 int i, ret;
11020
Jens Axboe2e480052021-08-27 11:33:19 -060011021 if (copy_from_user(new_count, arg, sizeof(new_count)))
11022 return -EFAULT;
11023 for (i = 0; i < ARRAY_SIZE(new_count); i++)
11024 if (new_count[i] > INT_MAX)
11025 return -EINVAL;
11026
Jens Axboefa846932021-09-01 14:15:59 -060011027 if (ctx->flags & IORING_SETUP_SQPOLL) {
11028 sqd = ctx->sq_data;
11029 if (sqd) {
Jens Axboe009ad9f2021-09-08 19:07:26 -060011030 /*
11031 * Observe the correct sqd->lock -> ctx->uring_lock
11032 * ordering. Fine to drop uring_lock here, we hold
11033 * a ref to the ctx.
11034 */
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011035 refcount_inc(&sqd->refs);
Jens Axboe009ad9f2021-09-08 19:07:26 -060011036 mutex_unlock(&ctx->uring_lock);
Jens Axboefa846932021-09-01 14:15:59 -060011037 mutex_lock(&sqd->lock);
Jens Axboe009ad9f2021-09-08 19:07:26 -060011038 mutex_lock(&ctx->uring_lock);
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011039 if (sqd->thread)
11040 tctx = sqd->thread->io_uring;
Jens Axboefa846932021-09-01 14:15:59 -060011041 }
11042 } else {
11043 tctx = current->io_uring;
11044 }
11045
Pavel Begunkove139a1e2021-10-19 23:43:46 +010011046 BUILD_BUG_ON(sizeof(new_count) != sizeof(ctx->iowq_limits));
Jens Axboefa846932021-09-01 14:15:59 -060011047
Pavel Begunkov4cac4872021-11-08 15:10:03 +000011048 for (i = 0; i < ARRAY_SIZE(new_count); i++)
11049 if (new_count[i])
11050 ctx->iowq_limits[i] = new_count[i];
Pavel Begunkove139a1e2021-10-19 23:43:46 +010011051 ctx->iowq_limits_set = true;
11052
11053 ret = -EINVAL;
11054 if (tctx && tctx->io_wq) {
11055 ret = io_wq_max_workers(tctx->io_wq, new_count);
11056 if (ret)
11057 goto err;
11058 } else {
11059 memset(new_count, 0, sizeof(new_count));
11060 }
Jens Axboefa846932021-09-01 14:15:59 -060011061
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011062 if (sqd) {
Jens Axboefa846932021-09-01 14:15:59 -060011063 mutex_unlock(&sqd->lock);
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011064 io_put_sq_data(sqd);
11065 }
Jens Axboe2e480052021-08-27 11:33:19 -060011066
11067 if (copy_to_user(arg, new_count, sizeof(new_count)))
11068 return -EFAULT;
11069
Pavel Begunkovb22fa622021-10-21 13:20:29 +010011070 /* that's it for SQPOLL, only the SQPOLL task creates requests */
11071 if (sqd)
11072 return 0;
11073
11074 /* now propagate the restriction to all registered users */
11075 list_for_each_entry(node, &ctx->tctx_list, ctx_node) {
11076 struct io_uring_task *tctx = node->task->io_uring;
11077
11078 if (WARN_ON_ONCE(!tctx->io_wq))
11079 continue;
11080
11081 for (i = 0; i < ARRAY_SIZE(new_count); i++)
11082 new_count[i] = ctx->iowq_limits[i];
11083 /* ignore errors, it always returns zero anyway */
11084 (void)io_wq_max_workers(tctx->io_wq, new_count);
11085 }
Jens Axboe2e480052021-08-27 11:33:19 -060011086 return 0;
Jens Axboefa846932021-09-01 14:15:59 -060011087err:
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011088 if (sqd) {
Jens Axboefa846932021-09-01 14:15:59 -060011089 mutex_unlock(&sqd->lock);
Jens Axboe41d3a6b2021-09-13 13:08:51 -060011090 io_put_sq_data(sqd);
11091 }
Jens Axboefa846932021-09-01 14:15:59 -060011092 return ret;
Jens Axboe2e480052021-08-27 11:33:19 -060011093}
11094
Jens Axboe071698e2020-01-28 10:04:42 -070011095static bool io_register_op_must_quiesce(int op)
11096{
11097 switch (op) {
Bijan Mottahedehbd54b6f2021-04-25 14:32:25 +010011098 case IORING_REGISTER_BUFFERS:
11099 case IORING_UNREGISTER_BUFFERS:
Pavel Begunkovf4f7d212021-04-01 15:44:02 +010011100 case IORING_REGISTER_FILES:
Jens Axboe071698e2020-01-28 10:04:42 -070011101 case IORING_UNREGISTER_FILES:
11102 case IORING_REGISTER_FILES_UPDATE:
11103 case IORING_REGISTER_PROBE:
11104 case IORING_REGISTER_PERSONALITY:
11105 case IORING_UNREGISTER_PERSONALITY:
Pavel Begunkov992da012021-06-10 16:37:37 +010011106 case IORING_REGISTER_FILES2:
11107 case IORING_REGISTER_FILES_UPDATE2:
11108 case IORING_REGISTER_BUFFERS2:
11109 case IORING_REGISTER_BUFFERS_UPDATE:
Jens Axboefe764212021-06-17 10:19:54 -060011110 case IORING_REGISTER_IOWQ_AFF:
11111 case IORING_UNREGISTER_IOWQ_AFF:
Jens Axboe2e480052021-08-27 11:33:19 -060011112 case IORING_REGISTER_IOWQ_MAX_WORKERS:
Jens Axboe071698e2020-01-28 10:04:42 -070011113 return false;
11114 default:
11115 return true;
11116 }
11117}
11118
Pavel Begunkove73c5c72021-08-09 13:04:12 +010011119static int io_ctx_quiesce(struct io_ring_ctx *ctx)
11120{
11121 long ret;
11122
11123 percpu_ref_kill(&ctx->refs);
11124
11125 /*
11126 * Drop uring mutex before waiting for references to exit. If another
11127 * thread is currently inside io_uring_enter() it might need to grab the
11128 * uring_lock to make progress. If we hold it here across the drain
11129 * wait, then we can deadlock. It's safe to drop the mutex here, since
11130 * no new references will come in after we've killed the percpu ref.
11131 */
11132 mutex_unlock(&ctx->uring_lock);
11133 do {
11134 ret = wait_for_completion_interruptible(&ctx->ref_comp);
11135 if (!ret)
11136 break;
11137 ret = io_run_task_work_sig();
11138 } while (ret >= 0);
11139 mutex_lock(&ctx->uring_lock);
11140
11141 if (ret)
11142 io_refs_resurrect(&ctx->refs, &ctx->ref_comp);
11143 return ret;
11144}
11145
Jens Axboeedafcce2019-01-09 09:16:05 -070011146static int __io_uring_register(struct io_ring_ctx *ctx, unsigned opcode,
11147 void __user *arg, unsigned nr_args)
Jens Axboeb19062a2019-04-15 10:49:38 -060011148 __releases(ctx->uring_lock)
11149 __acquires(ctx->uring_lock)
Jens Axboeedafcce2019-01-09 09:16:05 -070011150{
11151 int ret;
11152
Jens Axboe35fa71a2019-04-22 10:23:23 -060011153 /*
11154 * We're inside the ring mutex, if the ref is already dying, then
11155 * someone else killed the ctx or is already going through
11156 * io_uring_register().
11157 */
11158 if (percpu_ref_is_dying(&ctx->refs))
11159 return -ENXIO;
11160
Pavel Begunkov75c40212021-04-15 13:07:40 +010011161 if (ctx->restricted) {
Pavel Begunkov75c40212021-04-15 13:07:40 +010011162 opcode = array_index_nospec(opcode, IORING_REGISTER_LAST);
11163 if (!test_bit(opcode, ctx->restrictions.register_op))
11164 return -EACCES;
11165 }
11166
Jens Axboe071698e2020-01-28 10:04:42 -070011167 if (io_register_op_must_quiesce(opcode)) {
Pavel Begunkove73c5c72021-08-09 13:04:12 +010011168 ret = io_ctx_quiesce(ctx);
11169 if (ret)
Pavel Begunkovf70865d2021-04-11 01:46:40 +010011170 return ret;
Jens Axboe05f3fb32019-12-09 11:22:50 -070011171 }
Jens Axboeedafcce2019-01-09 09:16:05 -070011172
11173 switch (opcode) {
11174 case IORING_REGISTER_BUFFERS:
Pavel Begunkov634d00d2021-04-25 14:32:26 +010011175 ret = io_sqe_buffers_register(ctx, arg, nr_args, NULL);
Jens Axboeedafcce2019-01-09 09:16:05 -070011176 break;
11177 case IORING_UNREGISTER_BUFFERS:
11178 ret = -EINVAL;
11179 if (arg || nr_args)
11180 break;
Bijan Mottahedeh0a96bbe2021-01-06 12:39:10 -080011181 ret = io_sqe_buffers_unregister(ctx);
Jens Axboeedafcce2019-01-09 09:16:05 -070011182 break;
Jens Axboe6b063142019-01-10 22:13:58 -070011183 case IORING_REGISTER_FILES:
Pavel Begunkov792e3582021-04-25 14:32:21 +010011184 ret = io_sqe_files_register(ctx, arg, nr_args, NULL);
Jens Axboe6b063142019-01-10 22:13:58 -070011185 break;
11186 case IORING_UNREGISTER_FILES:
11187 ret = -EINVAL;
11188 if (arg || nr_args)
11189 break;
11190 ret = io_sqe_files_unregister(ctx);
11191 break;
Jens Axboec3a31e62019-10-03 13:59:56 -060011192 case IORING_REGISTER_FILES_UPDATE:
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010011193 ret = io_register_files_update(ctx, arg, nr_args);
Jens Axboec3a31e62019-10-03 13:59:56 -060011194 break;
Jens Axboe9b402842019-04-11 11:45:41 -060011195 case IORING_REGISTER_EVENTFD:
Jens Axboef2842ab2020-01-08 11:04:00 -070011196 case IORING_REGISTER_EVENTFD_ASYNC:
Jens Axboe9b402842019-04-11 11:45:41 -060011197 ret = -EINVAL;
11198 if (nr_args != 1)
11199 break;
11200 ret = io_eventfd_register(ctx, arg);
Jens Axboef2842ab2020-01-08 11:04:00 -070011201 if (ret)
11202 break;
11203 if (opcode == IORING_REGISTER_EVENTFD_ASYNC)
11204 ctx->eventfd_async = 1;
11205 else
11206 ctx->eventfd_async = 0;
Jens Axboe9b402842019-04-11 11:45:41 -060011207 break;
11208 case IORING_UNREGISTER_EVENTFD:
11209 ret = -EINVAL;
11210 if (arg || nr_args)
11211 break;
11212 ret = io_eventfd_unregister(ctx);
11213 break;
Jens Axboe66f4af92020-01-16 15:36:52 -070011214 case IORING_REGISTER_PROBE:
11215 ret = -EINVAL;
11216 if (!arg || nr_args > 256)
11217 break;
11218 ret = io_probe(ctx, arg, nr_args);
11219 break;
Jens Axboe071698e2020-01-28 10:04:42 -070011220 case IORING_REGISTER_PERSONALITY:
11221 ret = -EINVAL;
11222 if (arg || nr_args)
11223 break;
11224 ret = io_register_personality(ctx);
11225 break;
11226 case IORING_UNREGISTER_PERSONALITY:
11227 ret = -EINVAL;
11228 if (arg)
11229 break;
11230 ret = io_unregister_personality(ctx, nr_args);
11231 break;
Stefano Garzarella7e84e1c2020-08-27 16:58:31 +020011232 case IORING_REGISTER_ENABLE_RINGS:
11233 ret = -EINVAL;
11234 if (arg || nr_args)
11235 break;
11236 ret = io_register_enable_rings(ctx);
11237 break;
Stefano Garzarella21b55db2020-08-27 16:58:30 +020011238 case IORING_REGISTER_RESTRICTIONS:
11239 ret = io_register_restrictions(ctx, arg, nr_args);
11240 break;
Pavel Begunkov992da012021-06-10 16:37:37 +010011241 case IORING_REGISTER_FILES2:
11242 ret = io_register_rsrc(ctx, arg, nr_args, IORING_RSRC_FILE);
Pavel Begunkov792e3582021-04-25 14:32:21 +010011243 break;
Pavel Begunkov992da012021-06-10 16:37:37 +010011244 case IORING_REGISTER_FILES_UPDATE2:
11245 ret = io_register_rsrc_update(ctx, arg, nr_args,
11246 IORING_RSRC_FILE);
11247 break;
11248 case IORING_REGISTER_BUFFERS2:
11249 ret = io_register_rsrc(ctx, arg, nr_args, IORING_RSRC_BUFFER);
11250 break;
11251 case IORING_REGISTER_BUFFERS_UPDATE:
11252 ret = io_register_rsrc_update(ctx, arg, nr_args,
11253 IORING_RSRC_BUFFER);
Pavel Begunkovc3bdad02021-04-25 14:32:22 +010011254 break;
Jens Axboefe764212021-06-17 10:19:54 -060011255 case IORING_REGISTER_IOWQ_AFF:
11256 ret = -EINVAL;
11257 if (!arg || !nr_args)
11258 break;
11259 ret = io_register_iowq_aff(ctx, arg, nr_args);
11260 break;
11261 case IORING_UNREGISTER_IOWQ_AFF:
11262 ret = -EINVAL;
11263 if (arg || nr_args)
11264 break;
11265 ret = io_unregister_iowq_aff(ctx);
11266 break;
Jens Axboe2e480052021-08-27 11:33:19 -060011267 case IORING_REGISTER_IOWQ_MAX_WORKERS:
11268 ret = -EINVAL;
11269 if (!arg || nr_args != 2)
11270 break;
11271 ret = io_register_iowq_max_workers(ctx, arg);
11272 break;
Jens Axboeedafcce2019-01-09 09:16:05 -070011273 default:
11274 ret = -EINVAL;
11275 break;
11276 }
11277
Jens Axboe071698e2020-01-28 10:04:42 -070011278 if (io_register_op_must_quiesce(opcode)) {
Jens Axboe05f3fb32019-12-09 11:22:50 -070011279 /* bring the ctx back to life */
Jens Axboe05f3fb32019-12-09 11:22:50 -070011280 percpu_ref_reinit(&ctx->refs);
Jens Axboe0f158b42020-05-14 17:18:39 -060011281 reinit_completion(&ctx->ref_comp);
Jens Axboe05f3fb32019-12-09 11:22:50 -070011282 }
Jens Axboeedafcce2019-01-09 09:16:05 -070011283 return ret;
11284}
11285
11286SYSCALL_DEFINE4(io_uring_register, unsigned int, fd, unsigned int, opcode,
11287 void __user *, arg, unsigned int, nr_args)
11288{
11289 struct io_ring_ctx *ctx;
11290 long ret = -EBADF;
11291 struct fd f;
11292
Jens Axboef9309dc2022-12-23 06:37:08 -070011293 if (opcode >= IORING_REGISTER_LAST)
11294 return -EINVAL;
11295
Jens Axboeedafcce2019-01-09 09:16:05 -070011296 f = fdget(fd);
11297 if (!f.file)
11298 return -EBADF;
11299
11300 ret = -EOPNOTSUPP;
11301 if (f.file->f_op != &io_uring_fops)
11302 goto out_fput;
11303
11304 ctx = f.file->private_data;
11305
Pavel Begunkovb6c23dd2021-02-20 15:17:18 +000011306 io_run_task_work();
11307
Jens Axboeedafcce2019-01-09 09:16:05 -070011308 mutex_lock(&ctx->uring_lock);
11309 ret = __io_uring_register(ctx, opcode, arg, nr_args);
11310 mutex_unlock(&ctx->uring_lock);
Dmitrii Dolgovc826bd72019-10-15 19:02:01 +020011311 trace_io_uring_register(ctx, opcode, ctx->nr_user_files, ctx->nr_user_bufs,
11312 ctx->cq_ev_fd != NULL, ret);
Jens Axboeedafcce2019-01-09 09:16:05 -070011313out_fput:
11314 fdput(f);
11315 return ret;
11316}
11317
Jens Axboe2b188cc2019-01-07 10:46:33 -070011318static int __init io_uring_init(void)
11319{
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011320#define __BUILD_BUG_VERIFY_ELEMENT(stype, eoffset, etype, ename) do { \
11321 BUILD_BUG_ON(offsetof(stype, ename) != eoffset); \
11322 BUILD_BUG_ON(sizeof(etype) != sizeof_field(stype, ename)); \
11323} while (0)
11324
11325#define BUILD_BUG_SQE_ELEM(eoffset, etype, ename) \
11326 __BUILD_BUG_VERIFY_ELEMENT(struct io_uring_sqe, eoffset, etype, ename)
11327 BUILD_BUG_ON(sizeof(struct io_uring_sqe) != 64);
11328 BUILD_BUG_SQE_ELEM(0, __u8, opcode);
11329 BUILD_BUG_SQE_ELEM(1, __u8, flags);
11330 BUILD_BUG_SQE_ELEM(2, __u16, ioprio);
11331 BUILD_BUG_SQE_ELEM(4, __s32, fd);
11332 BUILD_BUG_SQE_ELEM(8, __u64, off);
11333 BUILD_BUG_SQE_ELEM(8, __u64, addr2);
11334 BUILD_BUG_SQE_ELEM(16, __u64, addr);
Pavel Begunkov7d67af22020-02-24 11:32:45 +030011335 BUILD_BUG_SQE_ELEM(16, __u64, splice_off_in);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011336 BUILD_BUG_SQE_ELEM(24, __u32, len);
11337 BUILD_BUG_SQE_ELEM(28, __kernel_rwf_t, rw_flags);
11338 BUILD_BUG_SQE_ELEM(28, /* compat */ int, rw_flags);
11339 BUILD_BUG_SQE_ELEM(28, /* compat */ __u32, rw_flags);
11340 BUILD_BUG_SQE_ELEM(28, __u32, fsync_flags);
Jiufei Xue5769a352020-06-17 17:53:55 +080011341 BUILD_BUG_SQE_ELEM(28, /* compat */ __u16, poll_events);
11342 BUILD_BUG_SQE_ELEM(28, __u32, poll32_events);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011343 BUILD_BUG_SQE_ELEM(28, __u32, sync_range_flags);
11344 BUILD_BUG_SQE_ELEM(28, __u32, msg_flags);
11345 BUILD_BUG_SQE_ELEM(28, __u32, timeout_flags);
11346 BUILD_BUG_SQE_ELEM(28, __u32, accept_flags);
11347 BUILD_BUG_SQE_ELEM(28, __u32, cancel_flags);
11348 BUILD_BUG_SQE_ELEM(28, __u32, open_flags);
11349 BUILD_BUG_SQE_ELEM(28, __u32, statx_flags);
11350 BUILD_BUG_SQE_ELEM(28, __u32, fadvise_advice);
Pavel Begunkov7d67af22020-02-24 11:32:45 +030011351 BUILD_BUG_SQE_ELEM(28, __u32, splice_flags);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011352 BUILD_BUG_SQE_ELEM(32, __u64, user_data);
11353 BUILD_BUG_SQE_ELEM(40, __u16, buf_index);
Pavel Begunkov16340ea2021-06-24 15:09:58 +010011354 BUILD_BUG_SQE_ELEM(40, __u16, buf_group);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011355 BUILD_BUG_SQE_ELEM(42, __u16, personality);
Pavel Begunkov7d67af22020-02-24 11:32:45 +030011356 BUILD_BUG_SQE_ELEM(44, __s32, splice_fd_in);
Pavel Begunkovb9445592021-08-25 12:25:45 +010011357 BUILD_BUG_SQE_ELEM(44, __u32, file_index);
Stefan Metzmacherd7f62e82020-01-29 14:39:41 +010011358
Pavel Begunkovb0d658ec2021-04-27 16:13:53 +010011359 BUILD_BUG_ON(sizeof(struct io_uring_files_update) !=
11360 sizeof(struct io_uring_rsrc_update));
11361 BUILD_BUG_ON(sizeof(struct io_uring_rsrc_update) >
11362 sizeof(struct io_uring_rsrc_update2));
Pavel Begunkov90499ad2021-08-25 20:51:40 +010011363
11364 /* ->buf_index is u16 */
11365 BUILD_BUG_ON(IORING_MAX_REG_BUFFERS >= (1u << 16));
11366
Pavel Begunkovb0d658ec2021-04-27 16:13:53 +010011367 /* should fit into one byte */
11368 BUILD_BUG_ON(SQE_VALID_FLAGS >= (1 << 8));
11369
Jens Axboed3656342019-12-18 09:50:26 -070011370 BUILD_BUG_ON(ARRAY_SIZE(io_op_defs) != IORING_OP_LAST);
Hao Xu32c2d332021-09-07 11:22:43 +080011371 BUILD_BUG_ON(__REQ_F_LAST_BIT > 8 * sizeof(int));
Pavel Begunkov16340ea2021-06-24 15:09:58 +010011372
Jens Axboe91f245d2021-02-09 13:48:50 -070011373 req_cachep = KMEM_CACHE(io_kiocb, SLAB_HWCACHE_ALIGN | SLAB_PANIC |
11374 SLAB_ACCOUNT);
Jens Axboe2b188cc2019-01-07 10:46:33 -070011375 return 0;
11376};
11377__initcall(io_uring_init);