net.c 46 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860
  1. // SPDX-License-Identifier: GPL-2.0
  2. #include <linux/kernel.h>
  3. #include <linux/errno.h>
  4. #include <linux/file.h>
  5. #include <linux/slab.h>
  6. #include <linux/net.h>
  7. #include <linux/compat.h>
  8. #include <net/compat.h>
  9. #include <linux/io_uring.h>
  10. #include <uapi/linux/io_uring.h>
  11. #include "io_uring.h"
  12. #include "kbuf.h"
  13. #include "alloc_cache.h"
  14. #include "net.h"
  15. #include "notif.h"
  16. #include "rsrc.h"
  17. #if defined(CONFIG_NET)
  18. struct io_shutdown {
  19. struct file *file;
  20. int how;
  21. };
  22. struct io_accept {
  23. struct file *file;
  24. struct sockaddr __user *addr;
  25. int __user *addr_len;
  26. int flags;
  27. int iou_flags;
  28. u32 file_slot;
  29. unsigned long nofile;
  30. };
  31. struct io_socket {
  32. struct file *file;
  33. int domain;
  34. int type;
  35. int protocol;
  36. int flags;
  37. u32 file_slot;
  38. unsigned long nofile;
  39. };
  40. struct io_connect {
  41. struct file *file;
  42. struct sockaddr __user *addr;
  43. int addr_len;
  44. bool in_progress;
  45. bool seen_econnaborted;
  46. };
  47. struct io_bind {
  48. struct file *file;
  49. int addr_len;
  50. };
  51. struct io_listen {
  52. struct file *file;
  53. int backlog;
  54. };
  55. struct io_sr_msg {
  56. struct file *file;
  57. union {
  58. struct compat_msghdr __user *umsg_compat;
  59. struct user_msghdr __user *umsg;
  60. void __user *buf;
  61. };
  62. int len;
  63. unsigned done_io;
  64. unsigned msg_flags;
  65. unsigned nr_multishot_loops;
  66. u16 flags;
  67. /* initialised and used only by !msg send variants */
  68. u16 addr_len;
  69. u16 buf_group;
  70. unsigned short retry_flags;
  71. void __user *addr;
  72. void __user *msg_control;
  73. /* used only for send zerocopy */
  74. struct io_kiocb *notif;
  75. };
  76. enum sr_retry_flags {
  77. IO_SR_MSG_RETRY = 1,
  78. IO_SR_MSG_PARTIAL_MAP = 2,
  79. };
  80. /*
  81. * Number of times we'll try and do receives if there's more data. If we
  82. * exceed this limit, then add us to the back of the queue and retry from
  83. * there. This helps fairness between flooding clients.
  84. */
  85. #define MULTISHOT_MAX_RETRY 32
  86. int io_shutdown_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  87. {
  88. struct io_shutdown *shutdown = io_kiocb_to_cmd(req, struct io_shutdown);
  89. if (unlikely(sqe->off || sqe->addr || sqe->rw_flags ||
  90. sqe->buf_index || sqe->splice_fd_in))
  91. return -EINVAL;
  92. shutdown->how = READ_ONCE(sqe->len);
  93. req->flags |= REQ_F_FORCE_ASYNC;
  94. return 0;
  95. }
  96. int io_shutdown(struct io_kiocb *req, unsigned int issue_flags)
  97. {
  98. struct io_shutdown *shutdown = io_kiocb_to_cmd(req, struct io_shutdown);
  99. struct socket *sock;
  100. int ret;
  101. WARN_ON_ONCE(issue_flags & IO_URING_F_NONBLOCK);
  102. sock = sock_from_file(req->file);
  103. if (unlikely(!sock))
  104. return -ENOTSOCK;
  105. ret = __sys_shutdown_sock(sock, shutdown->how);
  106. io_req_set_res(req, ret, 0);
  107. return IOU_OK;
  108. }
  109. static bool io_net_retry(struct socket *sock, int flags)
  110. {
  111. if (!(flags & MSG_WAITALL))
  112. return false;
  113. return sock->type == SOCK_STREAM || sock->type == SOCK_SEQPACKET;
  114. }
  115. static void io_netmsg_iovec_free(struct io_async_msghdr *kmsg)
  116. {
  117. if (kmsg->free_iov) {
  118. kfree(kmsg->free_iov);
  119. kmsg->free_iov_nr = 0;
  120. kmsg->free_iov = NULL;
  121. }
  122. }
  123. static void io_netmsg_recycle(struct io_kiocb *req, unsigned int issue_flags)
  124. {
  125. struct io_async_msghdr *hdr = req->async_data;
  126. struct iovec *iov;
  127. /* can't recycle, ensure we free the iovec if we have one */
  128. if (unlikely(issue_flags & IO_URING_F_UNLOCKED)) {
  129. io_netmsg_iovec_free(hdr);
  130. return;
  131. }
  132. /* Let normal cleanup path reap it if we fail adding to the cache */
  133. iov = hdr->free_iov;
  134. if (io_alloc_cache_put(&req->ctx->netmsg_cache, hdr)) {
  135. if (iov)
  136. kasan_mempool_poison_object(iov);
  137. req->async_data = NULL;
  138. req->flags &= ~(REQ_F_ASYNC_DATA|REQ_F_NEED_CLEANUP);
  139. }
  140. }
  141. static struct io_async_msghdr *io_msg_alloc_async(struct io_kiocb *req)
  142. {
  143. struct io_ring_ctx *ctx = req->ctx;
  144. struct io_async_msghdr *hdr;
  145. hdr = io_alloc_cache_get(&ctx->netmsg_cache);
  146. if (hdr) {
  147. if (hdr->free_iov) {
  148. kasan_mempool_unpoison_object(hdr->free_iov,
  149. hdr->free_iov_nr * sizeof(struct iovec));
  150. req->flags |= REQ_F_NEED_CLEANUP;
  151. }
  152. req->flags |= REQ_F_ASYNC_DATA;
  153. req->async_data = hdr;
  154. return hdr;
  155. }
  156. if (!io_alloc_async_data(req)) {
  157. hdr = req->async_data;
  158. hdr->free_iov_nr = 0;
  159. hdr->free_iov = NULL;
  160. return hdr;
  161. }
  162. return NULL;
  163. }
  164. /* assign new iovec to kmsg, if we need to */
  165. static int io_net_vec_assign(struct io_kiocb *req, struct io_async_msghdr *kmsg,
  166. struct iovec *iov)
  167. {
  168. if (iov) {
  169. req->flags |= REQ_F_NEED_CLEANUP;
  170. kmsg->free_iov_nr = kmsg->msg.msg_iter.nr_segs;
  171. if (kmsg->free_iov)
  172. kfree(kmsg->free_iov);
  173. kmsg->free_iov = iov;
  174. }
  175. return 0;
  176. }
  177. static inline void io_mshot_prep_retry(struct io_kiocb *req,
  178. struct io_async_msghdr *kmsg)
  179. {
  180. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  181. req->flags &= ~REQ_F_BL_EMPTY;
  182. sr->done_io = 0;
  183. sr->retry_flags = 0;
  184. sr->len = 0; /* get from the provided buffer */
  185. req->buf_index = sr->buf_group;
  186. }
  187. #ifdef CONFIG_COMPAT
  188. static int io_compat_msg_copy_hdr(struct io_kiocb *req,
  189. struct io_async_msghdr *iomsg,
  190. struct compat_msghdr *msg, int ddir)
  191. {
  192. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  193. struct compat_iovec __user *uiov;
  194. struct iovec *iov;
  195. int ret, nr_segs;
  196. if (iomsg->free_iov) {
  197. nr_segs = iomsg->free_iov_nr;
  198. iov = iomsg->free_iov;
  199. } else {
  200. iov = &iomsg->fast_iov;
  201. nr_segs = 1;
  202. }
  203. if (copy_from_user(msg, sr->umsg_compat, sizeof(*msg)))
  204. return -EFAULT;
  205. uiov = compat_ptr(msg->msg_iov);
  206. if (req->flags & REQ_F_BUFFER_SELECT) {
  207. compat_ssize_t clen;
  208. if (msg->msg_iovlen == 0) {
  209. sr->len = iov->iov_len = 0;
  210. iov->iov_base = NULL;
  211. } else if (msg->msg_iovlen > 1) {
  212. return -EINVAL;
  213. } else {
  214. if (!access_ok(uiov, sizeof(*uiov)))
  215. return -EFAULT;
  216. if (__get_user(clen, &uiov->iov_len))
  217. return -EFAULT;
  218. if (clen < 0)
  219. return -EINVAL;
  220. sr->len = clen;
  221. }
  222. return 0;
  223. }
  224. ret = __import_iovec(ddir, (struct iovec __user *)uiov, msg->msg_iovlen,
  225. nr_segs, &iov, &iomsg->msg.msg_iter, true);
  226. if (unlikely(ret < 0))
  227. return ret;
  228. return io_net_vec_assign(req, iomsg, iov);
  229. }
  230. #endif
  231. static int io_msg_copy_hdr(struct io_kiocb *req, struct io_async_msghdr *iomsg,
  232. struct user_msghdr *msg, int ddir)
  233. {
  234. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  235. struct iovec *iov;
  236. int ret, nr_segs;
  237. if (iomsg->free_iov) {
  238. nr_segs = iomsg->free_iov_nr;
  239. iov = iomsg->free_iov;
  240. } else {
  241. iov = &iomsg->fast_iov;
  242. nr_segs = 1;
  243. }
  244. if (!user_access_begin(sr->umsg, sizeof(*sr->umsg)))
  245. return -EFAULT;
  246. ret = -EFAULT;
  247. unsafe_get_user(msg->msg_name, &sr->umsg->msg_name, ua_end);
  248. unsafe_get_user(msg->msg_namelen, &sr->umsg->msg_namelen, ua_end);
  249. unsafe_get_user(msg->msg_iov, &sr->umsg->msg_iov, ua_end);
  250. unsafe_get_user(msg->msg_iovlen, &sr->umsg->msg_iovlen, ua_end);
  251. unsafe_get_user(msg->msg_control, &sr->umsg->msg_control, ua_end);
  252. unsafe_get_user(msg->msg_controllen, &sr->umsg->msg_controllen, ua_end);
  253. msg->msg_flags = 0;
  254. if (req->flags & REQ_F_BUFFER_SELECT) {
  255. if (msg->msg_iovlen == 0) {
  256. sr->len = iov->iov_len = 0;
  257. iov->iov_base = NULL;
  258. } else if (msg->msg_iovlen > 1) {
  259. ret = -EINVAL;
  260. goto ua_end;
  261. } else {
  262. /* we only need the length for provided buffers */
  263. if (!access_ok(&msg->msg_iov[0].iov_len, sizeof(__kernel_size_t)))
  264. goto ua_end;
  265. unsafe_get_user(iov->iov_len, &msg->msg_iov[0].iov_len,
  266. ua_end);
  267. sr->len = iov->iov_len;
  268. }
  269. ret = 0;
  270. ua_end:
  271. user_access_end();
  272. return ret;
  273. }
  274. user_access_end();
  275. ret = __import_iovec(ddir, msg->msg_iov, msg->msg_iovlen, nr_segs,
  276. &iov, &iomsg->msg.msg_iter, false);
  277. if (unlikely(ret < 0))
  278. return ret;
  279. return io_net_vec_assign(req, iomsg, iov);
  280. }
  281. static int io_sendmsg_copy_hdr(struct io_kiocb *req,
  282. struct io_async_msghdr *iomsg)
  283. {
  284. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  285. struct user_msghdr msg;
  286. int ret;
  287. iomsg->msg.msg_name = &iomsg->addr;
  288. iomsg->msg.msg_iter.nr_segs = 0;
  289. #ifdef CONFIG_COMPAT
  290. if (unlikely(req->ctx->compat)) {
  291. struct compat_msghdr cmsg;
  292. ret = io_compat_msg_copy_hdr(req, iomsg, &cmsg, ITER_SOURCE);
  293. if (unlikely(ret))
  294. return ret;
  295. ret = __get_compat_msghdr(&iomsg->msg, &cmsg, NULL);
  296. sr->msg_control = iomsg->msg.msg_control_user;
  297. return ret;
  298. }
  299. #endif
  300. ret = io_msg_copy_hdr(req, iomsg, &msg, ITER_SOURCE);
  301. if (unlikely(ret))
  302. return ret;
  303. ret = __copy_msghdr(&iomsg->msg, &msg, NULL);
  304. /* save msg_control as sys_sendmsg() overwrites it */
  305. sr->msg_control = iomsg->msg.msg_control_user;
  306. return ret;
  307. }
  308. void io_sendmsg_recvmsg_cleanup(struct io_kiocb *req)
  309. {
  310. struct io_async_msghdr *io = req->async_data;
  311. io_netmsg_iovec_free(io);
  312. }
  313. static int io_send_setup(struct io_kiocb *req)
  314. {
  315. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  316. struct io_async_msghdr *kmsg = req->async_data;
  317. int ret;
  318. kmsg->msg.msg_name = NULL;
  319. kmsg->msg.msg_namelen = 0;
  320. kmsg->msg.msg_control = NULL;
  321. kmsg->msg.msg_controllen = 0;
  322. kmsg->msg.msg_ubuf = NULL;
  323. if (sr->addr) {
  324. ret = move_addr_to_kernel(sr->addr, sr->addr_len, &kmsg->addr);
  325. if (unlikely(ret < 0))
  326. return ret;
  327. kmsg->msg.msg_name = &kmsg->addr;
  328. kmsg->msg.msg_namelen = sr->addr_len;
  329. }
  330. if (!io_do_buffer_select(req)) {
  331. ret = import_ubuf(ITER_SOURCE, sr->buf, sr->len,
  332. &kmsg->msg.msg_iter);
  333. if (unlikely(ret < 0))
  334. return ret;
  335. }
  336. return 0;
  337. }
  338. static int io_sendmsg_prep_setup(struct io_kiocb *req, int is_msg)
  339. {
  340. struct io_async_msghdr *kmsg;
  341. int ret;
  342. kmsg = io_msg_alloc_async(req);
  343. if (unlikely(!kmsg))
  344. return -ENOMEM;
  345. if (!is_msg)
  346. return io_send_setup(req);
  347. ret = io_sendmsg_copy_hdr(req, kmsg);
  348. if (!ret)
  349. req->flags |= REQ_F_NEED_CLEANUP;
  350. return ret;
  351. }
  352. #define SENDMSG_FLAGS (IORING_RECVSEND_POLL_FIRST | IORING_RECVSEND_BUNDLE)
  353. int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  354. {
  355. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  356. sr->done_io = 0;
  357. sr->retry_flags = 0;
  358. if (req->opcode == IORING_OP_SEND) {
  359. if (READ_ONCE(sqe->__pad3[0]))
  360. return -EINVAL;
  361. sr->addr = u64_to_user_ptr(READ_ONCE(sqe->addr2));
  362. sr->addr_len = READ_ONCE(sqe->addr_len);
  363. } else if (sqe->addr2 || sqe->file_index) {
  364. return -EINVAL;
  365. }
  366. sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
  367. sr->len = READ_ONCE(sqe->len);
  368. sr->flags = READ_ONCE(sqe->ioprio);
  369. if (sr->flags & ~SENDMSG_FLAGS)
  370. return -EINVAL;
  371. sr->msg_flags = READ_ONCE(sqe->msg_flags) | MSG_NOSIGNAL;
  372. if (sr->msg_flags & MSG_DONTWAIT)
  373. req->flags |= REQ_F_NOWAIT;
  374. if (sr->flags & IORING_RECVSEND_BUNDLE) {
  375. if (req->opcode == IORING_OP_SENDMSG)
  376. return -EINVAL;
  377. if (!(req->flags & REQ_F_BUFFER_SELECT))
  378. return -EINVAL;
  379. sr->msg_flags |= MSG_WAITALL;
  380. sr->buf_group = req->buf_index;
  381. req->buf_list = NULL;
  382. req->flags |= REQ_F_MULTISHOT;
  383. }
  384. #ifdef CONFIG_COMPAT
  385. if (req->ctx->compat)
  386. sr->msg_flags |= MSG_CMSG_COMPAT;
  387. #endif
  388. return io_sendmsg_prep_setup(req, req->opcode == IORING_OP_SENDMSG);
  389. }
  390. static void io_req_msg_cleanup(struct io_kiocb *req,
  391. unsigned int issue_flags)
  392. {
  393. io_netmsg_recycle(req, issue_flags);
  394. }
  395. /*
  396. * For bundle completions, we need to figure out how many segments we consumed.
  397. * A bundle could be using a single ITER_UBUF if that's all we mapped, or it
  398. * could be using an ITER_IOVEC. If the latter, then if we consumed all of
  399. * the segments, then it's a trivial questiont o answer. If we have residual
  400. * data in the iter, then loop the segments to figure out how much we
  401. * transferred.
  402. */
  403. static int io_bundle_nbufs(struct io_async_msghdr *kmsg, int ret)
  404. {
  405. struct iovec *iov;
  406. int nbufs;
  407. /* no data is always zero segments, and a ubuf is always 1 segment */
  408. if (ret <= 0)
  409. return 0;
  410. if (iter_is_ubuf(&kmsg->msg.msg_iter))
  411. return 1;
  412. iov = kmsg->free_iov;
  413. if (!iov)
  414. iov = &kmsg->fast_iov;
  415. /* if all data was transferred, it's basic pointer math */
  416. if (!iov_iter_count(&kmsg->msg.msg_iter))
  417. return iter_iov(&kmsg->msg.msg_iter) - iov;
  418. /* short transfer, count segments */
  419. nbufs = 0;
  420. do {
  421. int this_len = min_t(int, iov[nbufs].iov_len, ret);
  422. nbufs++;
  423. ret -= this_len;
  424. } while (ret);
  425. return nbufs;
  426. }
  427. static int io_net_kbuf_recyle(struct io_kiocb *req,
  428. struct io_async_msghdr *kmsg, int len)
  429. {
  430. req->flags |= REQ_F_BL_NO_RECYCLE;
  431. if (req->flags & REQ_F_BUFFERS_COMMIT)
  432. io_kbuf_commit(req, req->buf_list, len, io_bundle_nbufs(kmsg, len));
  433. return -EAGAIN;
  434. }
  435. static inline bool io_send_finish(struct io_kiocb *req, int *ret,
  436. struct io_async_msghdr *kmsg,
  437. unsigned issue_flags)
  438. {
  439. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  440. bool bundle_finished = *ret <= 0;
  441. unsigned int cflags;
  442. if (!(sr->flags & IORING_RECVSEND_BUNDLE)) {
  443. cflags = io_put_kbuf(req, *ret, issue_flags);
  444. goto finish;
  445. }
  446. cflags = io_put_kbufs(req, *ret, io_bundle_nbufs(kmsg, *ret), issue_flags);
  447. if (bundle_finished || req->flags & REQ_F_BL_EMPTY)
  448. goto finish;
  449. /*
  450. * Fill CQE for this receive and see if we should keep trying to
  451. * receive from this socket.
  452. */
  453. if (io_req_post_cqe(req, *ret, cflags | IORING_CQE_F_MORE)) {
  454. io_mshot_prep_retry(req, kmsg);
  455. return false;
  456. }
  457. /* Otherwise stop bundle and use the current result. */
  458. finish:
  459. io_req_set_res(req, *ret, cflags);
  460. *ret = IOU_OK;
  461. return true;
  462. }
  463. int io_sendmsg(struct io_kiocb *req, unsigned int issue_flags)
  464. {
  465. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  466. struct io_async_msghdr *kmsg = req->async_data;
  467. struct socket *sock;
  468. unsigned flags;
  469. int min_ret = 0;
  470. int ret;
  471. sock = sock_from_file(req->file);
  472. if (unlikely(!sock))
  473. return -ENOTSOCK;
  474. if (!(req->flags & REQ_F_POLLED) &&
  475. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  476. return -EAGAIN;
  477. flags = sr->msg_flags;
  478. if (issue_flags & IO_URING_F_NONBLOCK)
  479. flags |= MSG_DONTWAIT;
  480. if (flags & MSG_WAITALL)
  481. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  482. kmsg->msg.msg_control_user = sr->msg_control;
  483. ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
  484. if (ret < min_ret) {
  485. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  486. return -EAGAIN;
  487. if (ret > 0 && io_net_retry(sock, flags)) {
  488. kmsg->msg.msg_controllen = 0;
  489. kmsg->msg.msg_control = NULL;
  490. sr->done_io += ret;
  491. return io_net_kbuf_recyle(req, kmsg, ret);
  492. }
  493. if (ret == -ERESTARTSYS)
  494. ret = -EINTR;
  495. req_set_fail(req);
  496. }
  497. io_req_msg_cleanup(req, issue_flags);
  498. if (ret >= 0)
  499. ret += sr->done_io;
  500. else if (sr->done_io)
  501. ret = sr->done_io;
  502. io_req_set_res(req, ret, 0);
  503. return IOU_OK;
  504. }
  505. int io_send(struct io_kiocb *req, unsigned int issue_flags)
  506. {
  507. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  508. struct io_async_msghdr *kmsg = req->async_data;
  509. struct socket *sock;
  510. unsigned flags;
  511. int min_ret = 0;
  512. int ret;
  513. sock = sock_from_file(req->file);
  514. if (unlikely(!sock))
  515. return -ENOTSOCK;
  516. if (!(req->flags & REQ_F_POLLED) &&
  517. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  518. return -EAGAIN;
  519. flags = sr->msg_flags;
  520. if (issue_flags & IO_URING_F_NONBLOCK)
  521. flags |= MSG_DONTWAIT;
  522. retry_bundle:
  523. if (io_do_buffer_select(req)) {
  524. struct buf_sel_arg arg = {
  525. .iovs = &kmsg->fast_iov,
  526. .max_len = min_not_zero(sr->len, INT_MAX),
  527. .nr_iovs = 1,
  528. };
  529. if (kmsg->free_iov) {
  530. arg.nr_iovs = kmsg->free_iov_nr;
  531. arg.iovs = kmsg->free_iov;
  532. arg.mode = KBUF_MODE_FREE;
  533. }
  534. if (!(sr->flags & IORING_RECVSEND_BUNDLE))
  535. arg.nr_iovs = 1;
  536. else
  537. arg.mode |= KBUF_MODE_EXPAND;
  538. ret = io_buffers_select(req, &arg, issue_flags);
  539. if (unlikely(ret < 0))
  540. return ret;
  541. if (arg.iovs != &kmsg->fast_iov && arg.iovs != kmsg->free_iov) {
  542. kmsg->free_iov_nr = ret;
  543. kmsg->free_iov = arg.iovs;
  544. req->flags |= REQ_F_NEED_CLEANUP;
  545. }
  546. sr->len = arg.out_len;
  547. if (ret == 1) {
  548. sr->buf = arg.iovs[0].iov_base;
  549. ret = import_ubuf(ITER_SOURCE, sr->buf, sr->len,
  550. &kmsg->msg.msg_iter);
  551. if (unlikely(ret))
  552. return ret;
  553. } else {
  554. iov_iter_init(&kmsg->msg.msg_iter, ITER_SOURCE,
  555. arg.iovs, ret, arg.out_len);
  556. }
  557. }
  558. /*
  559. * If MSG_WAITALL is set, or this is a bundle send, then we need
  560. * the full amount. If just bundle is set, if we do a short send
  561. * then we complete the bundle sequence rather than continue on.
  562. */
  563. if (flags & MSG_WAITALL || sr->flags & IORING_RECVSEND_BUNDLE)
  564. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  565. flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
  566. kmsg->msg.msg_flags = flags;
  567. ret = sock_sendmsg(sock, &kmsg->msg);
  568. if (ret < min_ret) {
  569. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  570. return -EAGAIN;
  571. if (ret > 0 && io_net_retry(sock, flags)) {
  572. sr->len -= ret;
  573. sr->buf += ret;
  574. sr->done_io += ret;
  575. return io_net_kbuf_recyle(req, kmsg, ret);
  576. }
  577. if (ret == -ERESTARTSYS)
  578. ret = -EINTR;
  579. req_set_fail(req);
  580. }
  581. if (ret >= 0)
  582. ret += sr->done_io;
  583. else if (sr->done_io)
  584. ret = sr->done_io;
  585. if (!io_send_finish(req, &ret, kmsg, issue_flags))
  586. goto retry_bundle;
  587. io_req_msg_cleanup(req, issue_flags);
  588. return ret;
  589. }
  590. static int io_recvmsg_mshot_prep(struct io_kiocb *req,
  591. struct io_async_msghdr *iomsg,
  592. int namelen, size_t controllen)
  593. {
  594. if ((req->flags & (REQ_F_APOLL_MULTISHOT|REQ_F_BUFFER_SELECT)) ==
  595. (REQ_F_APOLL_MULTISHOT|REQ_F_BUFFER_SELECT)) {
  596. int hdr;
  597. if (unlikely(namelen < 0))
  598. return -EOVERFLOW;
  599. if (check_add_overflow(sizeof(struct io_uring_recvmsg_out),
  600. namelen, &hdr))
  601. return -EOVERFLOW;
  602. if (check_add_overflow(hdr, controllen, &hdr))
  603. return -EOVERFLOW;
  604. iomsg->namelen = namelen;
  605. iomsg->controllen = controllen;
  606. return 0;
  607. }
  608. return 0;
  609. }
  610. static int io_recvmsg_copy_hdr(struct io_kiocb *req,
  611. struct io_async_msghdr *iomsg)
  612. {
  613. struct user_msghdr msg;
  614. int ret;
  615. iomsg->msg.msg_name = &iomsg->addr;
  616. iomsg->msg.msg_iter.nr_segs = 0;
  617. #ifdef CONFIG_COMPAT
  618. if (unlikely(req->ctx->compat)) {
  619. struct compat_msghdr cmsg;
  620. ret = io_compat_msg_copy_hdr(req, iomsg, &cmsg, ITER_DEST);
  621. if (unlikely(ret))
  622. return ret;
  623. ret = __get_compat_msghdr(&iomsg->msg, &cmsg, &iomsg->uaddr);
  624. if (unlikely(ret))
  625. return ret;
  626. return io_recvmsg_mshot_prep(req, iomsg, cmsg.msg_namelen,
  627. cmsg.msg_controllen);
  628. }
  629. #endif
  630. ret = io_msg_copy_hdr(req, iomsg, &msg, ITER_DEST);
  631. if (unlikely(ret))
  632. return ret;
  633. ret = __copy_msghdr(&iomsg->msg, &msg, &iomsg->uaddr);
  634. if (unlikely(ret))
  635. return ret;
  636. return io_recvmsg_mshot_prep(req, iomsg, msg.msg_namelen,
  637. msg.msg_controllen);
  638. }
  639. static int io_recvmsg_prep_setup(struct io_kiocb *req)
  640. {
  641. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  642. struct io_async_msghdr *kmsg;
  643. int ret;
  644. kmsg = io_msg_alloc_async(req);
  645. if (unlikely(!kmsg))
  646. return -ENOMEM;
  647. if (req->opcode == IORING_OP_RECV) {
  648. kmsg->msg.msg_name = NULL;
  649. kmsg->msg.msg_namelen = 0;
  650. kmsg->msg.msg_inq = 0;
  651. kmsg->msg.msg_control = NULL;
  652. kmsg->msg.msg_get_inq = 1;
  653. kmsg->msg.msg_controllen = 0;
  654. kmsg->msg.msg_iocb = NULL;
  655. kmsg->msg.msg_ubuf = NULL;
  656. if (!io_do_buffer_select(req)) {
  657. ret = import_ubuf(ITER_DEST, sr->buf, sr->len,
  658. &kmsg->msg.msg_iter);
  659. if (unlikely(ret))
  660. return ret;
  661. }
  662. return 0;
  663. }
  664. ret = io_recvmsg_copy_hdr(req, kmsg);
  665. if (!ret)
  666. req->flags |= REQ_F_NEED_CLEANUP;
  667. return ret;
  668. }
  669. #define RECVMSG_FLAGS (IORING_RECVSEND_POLL_FIRST | IORING_RECV_MULTISHOT | \
  670. IORING_RECVSEND_BUNDLE)
  671. int io_recvmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  672. {
  673. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  674. sr->done_io = 0;
  675. sr->retry_flags = 0;
  676. if (unlikely(sqe->file_index || sqe->addr2))
  677. return -EINVAL;
  678. sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
  679. sr->len = READ_ONCE(sqe->len);
  680. sr->flags = READ_ONCE(sqe->ioprio);
  681. if (sr->flags & ~RECVMSG_FLAGS)
  682. return -EINVAL;
  683. sr->msg_flags = READ_ONCE(sqe->msg_flags);
  684. if (sr->msg_flags & MSG_DONTWAIT)
  685. req->flags |= REQ_F_NOWAIT;
  686. if (sr->msg_flags & MSG_ERRQUEUE)
  687. req->flags |= REQ_F_CLEAR_POLLIN;
  688. if (req->flags & REQ_F_BUFFER_SELECT) {
  689. /*
  690. * Store the buffer group for this multishot receive separately,
  691. * as if we end up doing an io-wq based issue that selects a
  692. * buffer, it has to be committed immediately and that will
  693. * clear ->buf_list. This means we lose the link to the buffer
  694. * list, and the eventual buffer put on completion then cannot
  695. * restore it.
  696. */
  697. sr->buf_group = req->buf_index;
  698. req->buf_list = NULL;
  699. }
  700. if (sr->flags & IORING_RECV_MULTISHOT) {
  701. if (!(req->flags & REQ_F_BUFFER_SELECT))
  702. return -EINVAL;
  703. if (sr->msg_flags & MSG_WAITALL)
  704. return -EINVAL;
  705. if (req->opcode == IORING_OP_RECV && sr->len)
  706. return -EINVAL;
  707. req->flags |= REQ_F_APOLL_MULTISHOT;
  708. }
  709. if (sr->flags & IORING_RECVSEND_BUNDLE) {
  710. if (req->opcode == IORING_OP_RECVMSG)
  711. return -EINVAL;
  712. }
  713. #ifdef CONFIG_COMPAT
  714. if (req->ctx->compat)
  715. sr->msg_flags |= MSG_CMSG_COMPAT;
  716. #endif
  717. sr->nr_multishot_loops = 0;
  718. return io_recvmsg_prep_setup(req);
  719. }
  720. /* bits to clear in old and inherit in new cflags on bundle retry */
  721. #define CQE_F_MASK (IORING_CQE_F_SOCK_NONEMPTY|IORING_CQE_F_MORE)
  722. /*
  723. * Finishes io_recv and io_recvmsg.
  724. *
  725. * Returns true if it is actually finished, or false if it should run
  726. * again (for multishot).
  727. */
  728. static inline bool io_recv_finish(struct io_kiocb *req, int *ret,
  729. struct io_async_msghdr *kmsg,
  730. bool mshot_finished, unsigned issue_flags)
  731. {
  732. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  733. unsigned int cflags = 0;
  734. if (kmsg->msg.msg_inq > 0)
  735. cflags |= IORING_CQE_F_SOCK_NONEMPTY;
  736. if (sr->flags & IORING_RECVSEND_BUNDLE) {
  737. size_t this_ret = *ret - sr->done_io;
  738. cflags |= io_put_kbufs(req, this_ret, io_bundle_nbufs(kmsg, this_ret),
  739. issue_flags);
  740. if (sr->retry_flags & IO_SR_MSG_RETRY)
  741. cflags = req->cqe.flags | (cflags & CQE_F_MASK);
  742. /* bundle with no more immediate buffers, we're done */
  743. if (req->flags & REQ_F_BL_EMPTY)
  744. goto finish;
  745. /*
  746. * If more is available AND it was a full transfer, retry and
  747. * append to this one
  748. */
  749. if (!sr->retry_flags && kmsg->msg.msg_inq > 1 && this_ret > 0 &&
  750. !iov_iter_count(&kmsg->msg.msg_iter)) {
  751. req->cqe.flags = cflags & ~CQE_F_MASK;
  752. sr->len = kmsg->msg.msg_inq;
  753. sr->done_io += this_ret;
  754. sr->retry_flags |= IO_SR_MSG_RETRY;
  755. return false;
  756. }
  757. } else {
  758. cflags |= io_put_kbuf(req, *ret, issue_flags);
  759. }
  760. /*
  761. * Fill CQE for this receive and see if we should keep trying to
  762. * receive from this socket.
  763. */
  764. if ((req->flags & REQ_F_APOLL_MULTISHOT) && !mshot_finished &&
  765. io_req_post_cqe(req, *ret, cflags | IORING_CQE_F_MORE)) {
  766. int mshot_retry_ret = IOU_ISSUE_SKIP_COMPLETE;
  767. io_mshot_prep_retry(req, kmsg);
  768. /* Known not-empty or unknown state, retry */
  769. if (cflags & IORING_CQE_F_SOCK_NONEMPTY || kmsg->msg.msg_inq < 0) {
  770. if (sr->nr_multishot_loops++ < MULTISHOT_MAX_RETRY)
  771. return false;
  772. /* mshot retries exceeded, force a requeue */
  773. sr->nr_multishot_loops = 0;
  774. mshot_retry_ret = IOU_REQUEUE;
  775. }
  776. if (issue_flags & IO_URING_F_MULTISHOT)
  777. *ret = mshot_retry_ret;
  778. else
  779. *ret = -EAGAIN;
  780. return true;
  781. }
  782. /* Finish the request / stop multishot. */
  783. finish:
  784. io_req_set_res(req, *ret, cflags);
  785. if (issue_flags & IO_URING_F_MULTISHOT)
  786. *ret = IOU_STOP_MULTISHOT;
  787. else
  788. *ret = IOU_OK;
  789. io_req_msg_cleanup(req, issue_flags);
  790. return true;
  791. }
  792. static int io_recvmsg_prep_multishot(struct io_async_msghdr *kmsg,
  793. struct io_sr_msg *sr, void __user **buf,
  794. size_t *len)
  795. {
  796. unsigned long ubuf = (unsigned long) *buf;
  797. unsigned long hdr;
  798. hdr = sizeof(struct io_uring_recvmsg_out) + kmsg->namelen +
  799. kmsg->controllen;
  800. if (*len < hdr)
  801. return -EFAULT;
  802. if (kmsg->controllen) {
  803. unsigned long control = ubuf + hdr - kmsg->controllen;
  804. kmsg->msg.msg_control_user = (void __user *) control;
  805. kmsg->msg.msg_controllen = kmsg->controllen;
  806. }
  807. sr->buf = *buf; /* stash for later copy */
  808. *buf = (void __user *) (ubuf + hdr);
  809. kmsg->payloadlen = *len = *len - hdr;
  810. return 0;
  811. }
  812. struct io_recvmsg_multishot_hdr {
  813. struct io_uring_recvmsg_out msg;
  814. struct sockaddr_storage addr;
  815. };
  816. static int io_recvmsg_multishot(struct socket *sock, struct io_sr_msg *io,
  817. struct io_async_msghdr *kmsg,
  818. unsigned int flags, bool *finished)
  819. {
  820. int err;
  821. int copy_len;
  822. struct io_recvmsg_multishot_hdr hdr;
  823. if (kmsg->namelen)
  824. kmsg->msg.msg_name = &hdr.addr;
  825. kmsg->msg.msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
  826. kmsg->msg.msg_namelen = 0;
  827. if (sock->file->f_flags & O_NONBLOCK)
  828. flags |= MSG_DONTWAIT;
  829. err = sock_recvmsg(sock, &kmsg->msg, flags);
  830. *finished = err <= 0;
  831. if (err < 0)
  832. return err;
  833. hdr.msg = (struct io_uring_recvmsg_out) {
  834. .controllen = kmsg->controllen - kmsg->msg.msg_controllen,
  835. .flags = kmsg->msg.msg_flags & ~MSG_CMSG_COMPAT
  836. };
  837. hdr.msg.payloadlen = err;
  838. if (err > kmsg->payloadlen)
  839. err = kmsg->payloadlen;
  840. copy_len = sizeof(struct io_uring_recvmsg_out);
  841. if (kmsg->msg.msg_namelen > kmsg->namelen)
  842. copy_len += kmsg->namelen;
  843. else
  844. copy_len += kmsg->msg.msg_namelen;
  845. /*
  846. * "fromlen shall refer to the value before truncation.."
  847. * 1003.1g
  848. */
  849. hdr.msg.namelen = kmsg->msg.msg_namelen;
  850. /* ensure that there is no gap between hdr and sockaddr_storage */
  851. BUILD_BUG_ON(offsetof(struct io_recvmsg_multishot_hdr, addr) !=
  852. sizeof(struct io_uring_recvmsg_out));
  853. if (copy_to_user(io->buf, &hdr, copy_len)) {
  854. *finished = true;
  855. return -EFAULT;
  856. }
  857. return sizeof(struct io_uring_recvmsg_out) + kmsg->namelen +
  858. kmsg->controllen + err;
  859. }
  860. int io_recvmsg(struct io_kiocb *req, unsigned int issue_flags)
  861. {
  862. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  863. struct io_async_msghdr *kmsg = req->async_data;
  864. struct socket *sock;
  865. unsigned flags;
  866. int ret, min_ret = 0;
  867. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  868. bool mshot_finished = true;
  869. sock = sock_from_file(req->file);
  870. if (unlikely(!sock))
  871. return -ENOTSOCK;
  872. if (!(req->flags & REQ_F_POLLED) &&
  873. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  874. return -EAGAIN;
  875. flags = sr->msg_flags;
  876. if (force_nonblock)
  877. flags |= MSG_DONTWAIT;
  878. retry_multishot:
  879. if (io_do_buffer_select(req)) {
  880. void __user *buf;
  881. size_t len = sr->len;
  882. buf = io_buffer_select(req, &len, issue_flags);
  883. if (!buf)
  884. return -ENOBUFS;
  885. if (req->flags & REQ_F_APOLL_MULTISHOT) {
  886. ret = io_recvmsg_prep_multishot(kmsg, sr, &buf, &len);
  887. if (ret) {
  888. io_kbuf_recycle(req, issue_flags);
  889. return ret;
  890. }
  891. }
  892. iov_iter_ubuf(&kmsg->msg.msg_iter, ITER_DEST, buf, len);
  893. }
  894. kmsg->msg.msg_get_inq = 1;
  895. kmsg->msg.msg_inq = -1;
  896. if (req->flags & REQ_F_APOLL_MULTISHOT) {
  897. ret = io_recvmsg_multishot(sock, sr, kmsg, flags,
  898. &mshot_finished);
  899. } else {
  900. /* disable partial retry for recvmsg with cmsg attached */
  901. if (flags & MSG_WAITALL && !kmsg->msg.msg_controllen)
  902. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  903. ret = __sys_recvmsg_sock(sock, &kmsg->msg, sr->umsg,
  904. kmsg->uaddr, flags);
  905. }
  906. if (ret < min_ret) {
  907. if (ret == -EAGAIN && force_nonblock) {
  908. if (issue_flags & IO_URING_F_MULTISHOT) {
  909. io_kbuf_recycle(req, issue_flags);
  910. return IOU_ISSUE_SKIP_COMPLETE;
  911. }
  912. return -EAGAIN;
  913. }
  914. if (ret > 0 && io_net_retry(sock, flags)) {
  915. sr->done_io += ret;
  916. return io_net_kbuf_recyle(req, kmsg, ret);
  917. }
  918. if (ret == -ERESTARTSYS)
  919. ret = -EINTR;
  920. req_set_fail(req);
  921. } else if ((flags & MSG_WAITALL) && (kmsg->msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
  922. req_set_fail(req);
  923. }
  924. if (ret > 0)
  925. ret += sr->done_io;
  926. else if (sr->done_io)
  927. ret = sr->done_io;
  928. else
  929. io_kbuf_recycle(req, issue_flags);
  930. if (!io_recv_finish(req, &ret, kmsg, mshot_finished, issue_flags))
  931. goto retry_multishot;
  932. return ret;
  933. }
  934. static int io_recv_buf_select(struct io_kiocb *req, struct io_async_msghdr *kmsg,
  935. size_t *len, unsigned int issue_flags)
  936. {
  937. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  938. int ret;
  939. /*
  940. * If the ring isn't locked, then don't use the peek interface
  941. * to grab multiple buffers as we will lock/unlock between
  942. * this selection and posting the buffers.
  943. */
  944. if (!(issue_flags & IO_URING_F_UNLOCKED) &&
  945. sr->flags & IORING_RECVSEND_BUNDLE) {
  946. struct buf_sel_arg arg = {
  947. .iovs = &kmsg->fast_iov,
  948. .nr_iovs = 1,
  949. .mode = KBUF_MODE_EXPAND,
  950. };
  951. if (kmsg->free_iov) {
  952. arg.nr_iovs = kmsg->free_iov_nr;
  953. arg.iovs = kmsg->free_iov;
  954. arg.mode |= KBUF_MODE_FREE;
  955. }
  956. if (kmsg->msg.msg_inq > 1)
  957. arg.max_len = min_not_zero(sr->len, kmsg->msg.msg_inq);
  958. ret = io_buffers_peek(req, &arg);
  959. if (unlikely(ret < 0))
  960. return ret;
  961. if (arg.iovs != &kmsg->fast_iov && arg.iovs != kmsg->free_iov) {
  962. kmsg->free_iov_nr = ret;
  963. kmsg->free_iov = arg.iovs;
  964. req->flags |= REQ_F_NEED_CLEANUP;
  965. }
  966. if (arg.partial_map)
  967. sr->retry_flags |= IO_SR_MSG_PARTIAL_MAP;
  968. /* special case 1 vec, can be a fast path */
  969. if (ret == 1) {
  970. sr->buf = arg.iovs[0].iov_base;
  971. sr->len = arg.iovs[0].iov_len;
  972. goto map_ubuf;
  973. }
  974. iov_iter_init(&kmsg->msg.msg_iter, ITER_DEST, arg.iovs, ret,
  975. arg.out_len);
  976. } else {
  977. void __user *buf;
  978. *len = sr->len;
  979. buf = io_buffer_select(req, len, issue_flags);
  980. if (!buf)
  981. return -ENOBUFS;
  982. sr->buf = buf;
  983. sr->len = *len;
  984. map_ubuf:
  985. ret = import_ubuf(ITER_DEST, sr->buf, sr->len,
  986. &kmsg->msg.msg_iter);
  987. if (unlikely(ret))
  988. return ret;
  989. }
  990. return 0;
  991. }
  992. int io_recv(struct io_kiocb *req, unsigned int issue_flags)
  993. {
  994. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  995. struct io_async_msghdr *kmsg = req->async_data;
  996. struct socket *sock;
  997. unsigned flags;
  998. int ret, min_ret = 0;
  999. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  1000. size_t len = sr->len;
  1001. bool mshot_finished;
  1002. if (!(req->flags & REQ_F_POLLED) &&
  1003. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  1004. return -EAGAIN;
  1005. sock = sock_from_file(req->file);
  1006. if (unlikely(!sock))
  1007. return -ENOTSOCK;
  1008. flags = sr->msg_flags;
  1009. if (force_nonblock)
  1010. flags |= MSG_DONTWAIT;
  1011. retry_multishot:
  1012. if (io_do_buffer_select(req)) {
  1013. ret = io_recv_buf_select(req, kmsg, &len, issue_flags);
  1014. if (unlikely(ret)) {
  1015. kmsg->msg.msg_inq = -1;
  1016. goto out_free;
  1017. }
  1018. sr->buf = NULL;
  1019. }
  1020. kmsg->msg.msg_flags = 0;
  1021. kmsg->msg.msg_inq = -1;
  1022. if (flags & MSG_WAITALL)
  1023. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  1024. ret = sock_recvmsg(sock, &kmsg->msg, flags);
  1025. if (ret < min_ret) {
  1026. if (ret == -EAGAIN && force_nonblock) {
  1027. if (issue_flags & IO_URING_F_MULTISHOT) {
  1028. io_kbuf_recycle(req, issue_flags);
  1029. return IOU_ISSUE_SKIP_COMPLETE;
  1030. }
  1031. return -EAGAIN;
  1032. }
  1033. if (ret > 0 && io_net_retry(sock, flags)) {
  1034. sr->len -= ret;
  1035. sr->buf += ret;
  1036. sr->done_io += ret;
  1037. return io_net_kbuf_recyle(req, kmsg, ret);
  1038. }
  1039. if (ret == -ERESTARTSYS)
  1040. ret = -EINTR;
  1041. req_set_fail(req);
  1042. } else if ((flags & MSG_WAITALL) && (kmsg->msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
  1043. out_free:
  1044. req_set_fail(req);
  1045. }
  1046. mshot_finished = ret <= 0;
  1047. if (ret > 0)
  1048. ret += sr->done_io;
  1049. else if (sr->done_io)
  1050. ret = sr->done_io;
  1051. else
  1052. io_kbuf_recycle(req, issue_flags);
  1053. if (!io_recv_finish(req, &ret, kmsg, mshot_finished, issue_flags))
  1054. goto retry_multishot;
  1055. return ret;
  1056. }
  1057. void io_send_zc_cleanup(struct io_kiocb *req)
  1058. {
  1059. struct io_sr_msg *zc = io_kiocb_to_cmd(req, struct io_sr_msg);
  1060. struct io_async_msghdr *io = req->async_data;
  1061. if (req_has_async_data(req))
  1062. io_netmsg_iovec_free(io);
  1063. if (zc->notif) {
  1064. io_notif_flush(zc->notif);
  1065. zc->notif = NULL;
  1066. }
  1067. }
  1068. #define IO_ZC_FLAGS_COMMON (IORING_RECVSEND_POLL_FIRST | IORING_RECVSEND_FIXED_BUF)
  1069. #define IO_ZC_FLAGS_VALID (IO_ZC_FLAGS_COMMON | IORING_SEND_ZC_REPORT_USAGE)
  1070. int io_send_zc_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1071. {
  1072. struct io_sr_msg *zc = io_kiocb_to_cmd(req, struct io_sr_msg);
  1073. struct io_ring_ctx *ctx = req->ctx;
  1074. struct io_kiocb *notif;
  1075. zc->done_io = 0;
  1076. zc->retry_flags = 0;
  1077. req->flags |= REQ_F_POLL_NO_LAZY;
  1078. if (unlikely(READ_ONCE(sqe->__pad2[0]) || READ_ONCE(sqe->addr3)))
  1079. return -EINVAL;
  1080. /* we don't support IOSQE_CQE_SKIP_SUCCESS just yet */
  1081. if (req->flags & REQ_F_CQE_SKIP)
  1082. return -EINVAL;
  1083. notif = zc->notif = io_alloc_notif(ctx);
  1084. if (!notif)
  1085. return -ENOMEM;
  1086. notif->cqe.user_data = req->cqe.user_data;
  1087. notif->cqe.res = 0;
  1088. notif->cqe.flags = IORING_CQE_F_NOTIF;
  1089. req->flags |= REQ_F_NEED_CLEANUP;
  1090. zc->flags = READ_ONCE(sqe->ioprio);
  1091. if (unlikely(zc->flags & ~IO_ZC_FLAGS_COMMON)) {
  1092. if (zc->flags & ~IO_ZC_FLAGS_VALID)
  1093. return -EINVAL;
  1094. if (zc->flags & IORING_SEND_ZC_REPORT_USAGE) {
  1095. struct io_notif_data *nd = io_notif_to_data(notif);
  1096. nd->zc_report = true;
  1097. nd->zc_used = false;
  1098. nd->zc_copied = false;
  1099. }
  1100. }
  1101. if (zc->flags & IORING_RECVSEND_FIXED_BUF) {
  1102. unsigned idx = READ_ONCE(sqe->buf_index);
  1103. if (unlikely(idx >= ctx->nr_user_bufs))
  1104. return -EFAULT;
  1105. idx = array_index_nospec(idx, ctx->nr_user_bufs);
  1106. req->imu = READ_ONCE(ctx->user_bufs[idx]);
  1107. io_req_set_rsrc_node(notif, ctx, 0);
  1108. }
  1109. if (req->opcode == IORING_OP_SEND_ZC) {
  1110. if (READ_ONCE(sqe->__pad3[0]))
  1111. return -EINVAL;
  1112. zc->addr = u64_to_user_ptr(READ_ONCE(sqe->addr2));
  1113. zc->addr_len = READ_ONCE(sqe->addr_len);
  1114. } else {
  1115. if (unlikely(sqe->addr2 || sqe->file_index))
  1116. return -EINVAL;
  1117. if (unlikely(zc->flags & IORING_RECVSEND_FIXED_BUF))
  1118. return -EINVAL;
  1119. }
  1120. zc->buf = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1121. zc->len = READ_ONCE(sqe->len);
  1122. zc->msg_flags = READ_ONCE(sqe->msg_flags) | MSG_NOSIGNAL | MSG_ZEROCOPY;
  1123. if (zc->msg_flags & MSG_DONTWAIT)
  1124. req->flags |= REQ_F_NOWAIT;
  1125. #ifdef CONFIG_COMPAT
  1126. if (req->ctx->compat)
  1127. zc->msg_flags |= MSG_CMSG_COMPAT;
  1128. #endif
  1129. return io_sendmsg_prep_setup(req, req->opcode == IORING_OP_SENDMSG_ZC);
  1130. }
  1131. static int io_sg_from_iter_iovec(struct sk_buff *skb,
  1132. struct iov_iter *from, size_t length)
  1133. {
  1134. skb_zcopy_downgrade_managed(skb);
  1135. return zerocopy_fill_skb_from_iter(skb, from, length);
  1136. }
  1137. static int io_sg_from_iter(struct sk_buff *skb,
  1138. struct iov_iter *from, size_t length)
  1139. {
  1140. struct skb_shared_info *shinfo = skb_shinfo(skb);
  1141. int frag = shinfo->nr_frags;
  1142. int ret = 0;
  1143. struct bvec_iter bi;
  1144. ssize_t copied = 0;
  1145. unsigned long truesize = 0;
  1146. if (!frag)
  1147. shinfo->flags |= SKBFL_MANAGED_FRAG_REFS;
  1148. else if (unlikely(!skb_zcopy_managed(skb)))
  1149. return zerocopy_fill_skb_from_iter(skb, from, length);
  1150. bi.bi_size = min(from->count, length);
  1151. bi.bi_bvec_done = from->iov_offset;
  1152. bi.bi_idx = 0;
  1153. while (bi.bi_size && frag < MAX_SKB_FRAGS) {
  1154. struct bio_vec v = mp_bvec_iter_bvec(from->bvec, bi);
  1155. copied += v.bv_len;
  1156. truesize += PAGE_ALIGN(v.bv_len + v.bv_offset);
  1157. __skb_fill_page_desc_noacc(shinfo, frag++, v.bv_page,
  1158. v.bv_offset, v.bv_len);
  1159. bvec_iter_advance_single(from->bvec, &bi, v.bv_len);
  1160. }
  1161. if (bi.bi_size)
  1162. ret = -EMSGSIZE;
  1163. shinfo->nr_frags = frag;
  1164. from->bvec += bi.bi_idx;
  1165. from->nr_segs -= bi.bi_idx;
  1166. from->count -= copied;
  1167. from->iov_offset = bi.bi_bvec_done;
  1168. skb->data_len += copied;
  1169. skb->len += copied;
  1170. skb->truesize += truesize;
  1171. return ret;
  1172. }
  1173. static int io_send_zc_import(struct io_kiocb *req, struct io_async_msghdr *kmsg)
  1174. {
  1175. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  1176. int ret;
  1177. if (sr->flags & IORING_RECVSEND_FIXED_BUF) {
  1178. ret = io_import_fixed(ITER_SOURCE, &kmsg->msg.msg_iter, req->imu,
  1179. (u64)(uintptr_t)sr->buf, sr->len);
  1180. if (unlikely(ret))
  1181. return ret;
  1182. kmsg->msg.sg_from_iter = io_sg_from_iter;
  1183. } else {
  1184. ret = import_ubuf(ITER_SOURCE, sr->buf, sr->len, &kmsg->msg.msg_iter);
  1185. if (unlikely(ret))
  1186. return ret;
  1187. ret = io_notif_account_mem(sr->notif, sr->len);
  1188. if (unlikely(ret))
  1189. return ret;
  1190. kmsg->msg.sg_from_iter = io_sg_from_iter_iovec;
  1191. }
  1192. return ret;
  1193. }
  1194. int io_send_zc(struct io_kiocb *req, unsigned int issue_flags)
  1195. {
  1196. struct io_sr_msg *zc = io_kiocb_to_cmd(req, struct io_sr_msg);
  1197. struct io_async_msghdr *kmsg = req->async_data;
  1198. struct socket *sock;
  1199. unsigned msg_flags;
  1200. int ret, min_ret = 0;
  1201. sock = sock_from_file(req->file);
  1202. if (unlikely(!sock))
  1203. return -ENOTSOCK;
  1204. if (!test_bit(SOCK_SUPPORT_ZC, &sock->flags))
  1205. return -EOPNOTSUPP;
  1206. if (!(req->flags & REQ_F_POLLED) &&
  1207. (zc->flags & IORING_RECVSEND_POLL_FIRST))
  1208. return -EAGAIN;
  1209. if (!zc->done_io) {
  1210. ret = io_send_zc_import(req, kmsg);
  1211. if (unlikely(ret))
  1212. return ret;
  1213. }
  1214. msg_flags = zc->msg_flags;
  1215. if (issue_flags & IO_URING_F_NONBLOCK)
  1216. msg_flags |= MSG_DONTWAIT;
  1217. if (msg_flags & MSG_WAITALL)
  1218. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  1219. msg_flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
  1220. kmsg->msg.msg_flags = msg_flags;
  1221. kmsg->msg.msg_ubuf = &io_notif_to_data(zc->notif)->uarg;
  1222. ret = sock_sendmsg(sock, &kmsg->msg);
  1223. if (unlikely(ret < min_ret)) {
  1224. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  1225. return -EAGAIN;
  1226. if (ret > 0 && io_net_retry(sock, kmsg->msg.msg_flags)) {
  1227. zc->len -= ret;
  1228. zc->buf += ret;
  1229. zc->done_io += ret;
  1230. return io_net_kbuf_recyle(req, kmsg, ret);
  1231. }
  1232. if (ret == -ERESTARTSYS)
  1233. ret = -EINTR;
  1234. req_set_fail(req);
  1235. }
  1236. if (ret >= 0)
  1237. ret += zc->done_io;
  1238. else if (zc->done_io)
  1239. ret = zc->done_io;
  1240. /*
  1241. * If we're in io-wq we can't rely on tw ordering guarantees, defer
  1242. * flushing notif to io_send_zc_cleanup()
  1243. */
  1244. if (!(issue_flags & IO_URING_F_UNLOCKED)) {
  1245. io_notif_flush(zc->notif);
  1246. zc->notif = NULL;
  1247. io_req_msg_cleanup(req, 0);
  1248. }
  1249. io_req_set_res(req, ret, IORING_CQE_F_MORE);
  1250. return IOU_OK;
  1251. }
  1252. int io_sendmsg_zc(struct io_kiocb *req, unsigned int issue_flags)
  1253. {
  1254. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  1255. struct io_async_msghdr *kmsg = req->async_data;
  1256. struct socket *sock;
  1257. unsigned flags;
  1258. int ret, min_ret = 0;
  1259. sock = sock_from_file(req->file);
  1260. if (unlikely(!sock))
  1261. return -ENOTSOCK;
  1262. if (!test_bit(SOCK_SUPPORT_ZC, &sock->flags))
  1263. return -EOPNOTSUPP;
  1264. if (!(req->flags & REQ_F_POLLED) &&
  1265. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  1266. return -EAGAIN;
  1267. flags = sr->msg_flags;
  1268. if (issue_flags & IO_URING_F_NONBLOCK)
  1269. flags |= MSG_DONTWAIT;
  1270. if (flags & MSG_WAITALL)
  1271. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  1272. kmsg->msg.msg_control_user = sr->msg_control;
  1273. kmsg->msg.msg_ubuf = &io_notif_to_data(sr->notif)->uarg;
  1274. kmsg->msg.sg_from_iter = io_sg_from_iter_iovec;
  1275. ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
  1276. if (unlikely(ret < min_ret)) {
  1277. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  1278. return -EAGAIN;
  1279. if (ret > 0 && io_net_retry(sock, flags)) {
  1280. sr->done_io += ret;
  1281. return io_net_kbuf_recyle(req, kmsg, ret);
  1282. }
  1283. if (ret == -ERESTARTSYS)
  1284. ret = -EINTR;
  1285. req_set_fail(req);
  1286. }
  1287. if (ret >= 0)
  1288. ret += sr->done_io;
  1289. else if (sr->done_io)
  1290. ret = sr->done_io;
  1291. /*
  1292. * If we're in io-wq we can't rely on tw ordering guarantees, defer
  1293. * flushing notif to io_send_zc_cleanup()
  1294. */
  1295. if (!(issue_flags & IO_URING_F_UNLOCKED)) {
  1296. io_notif_flush(sr->notif);
  1297. sr->notif = NULL;
  1298. io_req_msg_cleanup(req, 0);
  1299. }
  1300. io_req_set_res(req, ret, IORING_CQE_F_MORE);
  1301. return IOU_OK;
  1302. }
  1303. void io_sendrecv_fail(struct io_kiocb *req)
  1304. {
  1305. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  1306. if (sr->done_io)
  1307. req->cqe.res = sr->done_io;
  1308. if ((req->flags & REQ_F_NEED_CLEANUP) &&
  1309. (req->opcode == IORING_OP_SEND_ZC || req->opcode == IORING_OP_SENDMSG_ZC))
  1310. req->cqe.flags |= IORING_CQE_F_MORE;
  1311. }
  1312. #define ACCEPT_FLAGS (IORING_ACCEPT_MULTISHOT | IORING_ACCEPT_DONTWAIT | \
  1313. IORING_ACCEPT_POLL_FIRST)
  1314. int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1315. {
  1316. struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept);
  1317. if (sqe->len || sqe->buf_index)
  1318. return -EINVAL;
  1319. accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1320. accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
  1321. accept->flags = READ_ONCE(sqe->accept_flags);
  1322. accept->nofile = rlimit(RLIMIT_NOFILE);
  1323. accept->iou_flags = READ_ONCE(sqe->ioprio);
  1324. if (accept->iou_flags & ~ACCEPT_FLAGS)
  1325. return -EINVAL;
  1326. accept->file_slot = READ_ONCE(sqe->file_index);
  1327. if (accept->file_slot) {
  1328. if (accept->flags & SOCK_CLOEXEC)
  1329. return -EINVAL;
  1330. if (accept->iou_flags & IORING_ACCEPT_MULTISHOT &&
  1331. accept->file_slot != IORING_FILE_INDEX_ALLOC)
  1332. return -EINVAL;
  1333. }
  1334. if (accept->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
  1335. return -EINVAL;
  1336. if (SOCK_NONBLOCK != O_NONBLOCK && (accept->flags & SOCK_NONBLOCK))
  1337. accept->flags = (accept->flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
  1338. if (accept->iou_flags & IORING_ACCEPT_MULTISHOT)
  1339. req->flags |= REQ_F_APOLL_MULTISHOT;
  1340. if (accept->iou_flags & IORING_ACCEPT_DONTWAIT)
  1341. req->flags |= REQ_F_NOWAIT;
  1342. return 0;
  1343. }
  1344. int io_accept(struct io_kiocb *req, unsigned int issue_flags)
  1345. {
  1346. struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept);
  1347. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  1348. bool fixed = !!accept->file_slot;
  1349. struct proto_accept_arg arg = {
  1350. .flags = force_nonblock ? O_NONBLOCK : 0,
  1351. };
  1352. struct file *file;
  1353. unsigned cflags;
  1354. int ret, fd;
  1355. if (!(req->flags & REQ_F_POLLED) &&
  1356. accept->iou_flags & IORING_ACCEPT_POLL_FIRST)
  1357. return -EAGAIN;
  1358. retry:
  1359. if (!fixed) {
  1360. fd = __get_unused_fd_flags(accept->flags, accept->nofile);
  1361. if (unlikely(fd < 0))
  1362. return fd;
  1363. }
  1364. arg.err = 0;
  1365. arg.is_empty = -1;
  1366. file = do_accept(req->file, &arg, accept->addr, accept->addr_len,
  1367. accept->flags);
  1368. if (IS_ERR(file)) {
  1369. if (!fixed)
  1370. put_unused_fd(fd);
  1371. ret = PTR_ERR(file);
  1372. if (ret == -EAGAIN && force_nonblock &&
  1373. !(accept->iou_flags & IORING_ACCEPT_DONTWAIT)) {
  1374. /*
  1375. * if it's multishot and polled, we don't need to
  1376. * return EAGAIN to arm the poll infra since it
  1377. * has already been done
  1378. */
  1379. if (issue_flags & IO_URING_F_MULTISHOT)
  1380. return IOU_ISSUE_SKIP_COMPLETE;
  1381. return ret;
  1382. }
  1383. if (ret == -ERESTARTSYS)
  1384. ret = -EINTR;
  1385. req_set_fail(req);
  1386. } else if (!fixed) {
  1387. fd_install(fd, file);
  1388. ret = fd;
  1389. } else {
  1390. ret = io_fixed_fd_install(req, issue_flags, file,
  1391. accept->file_slot);
  1392. }
  1393. cflags = 0;
  1394. if (!arg.is_empty)
  1395. cflags |= IORING_CQE_F_SOCK_NONEMPTY;
  1396. if (!(req->flags & REQ_F_APOLL_MULTISHOT)) {
  1397. io_req_set_res(req, ret, cflags);
  1398. return IOU_OK;
  1399. }
  1400. if (ret < 0)
  1401. return ret;
  1402. if (io_req_post_cqe(req, ret, cflags | IORING_CQE_F_MORE)) {
  1403. if (cflags & IORING_CQE_F_SOCK_NONEMPTY || arg.is_empty == -1)
  1404. goto retry;
  1405. if (issue_flags & IO_URING_F_MULTISHOT)
  1406. return IOU_ISSUE_SKIP_COMPLETE;
  1407. return -EAGAIN;
  1408. }
  1409. io_req_set_res(req, ret, cflags);
  1410. if (!(issue_flags & IO_URING_F_MULTISHOT))
  1411. return IOU_OK;
  1412. return IOU_STOP_MULTISHOT;
  1413. }
  1414. int io_socket_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1415. {
  1416. struct io_socket *sock = io_kiocb_to_cmd(req, struct io_socket);
  1417. if (sqe->addr || sqe->rw_flags || sqe->buf_index)
  1418. return -EINVAL;
  1419. sock->domain = READ_ONCE(sqe->fd);
  1420. sock->type = READ_ONCE(sqe->off);
  1421. sock->protocol = READ_ONCE(sqe->len);
  1422. sock->file_slot = READ_ONCE(sqe->file_index);
  1423. sock->nofile = rlimit(RLIMIT_NOFILE);
  1424. sock->flags = sock->type & ~SOCK_TYPE_MASK;
  1425. if (sock->file_slot && (sock->flags & SOCK_CLOEXEC))
  1426. return -EINVAL;
  1427. if (sock->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
  1428. return -EINVAL;
  1429. return 0;
  1430. }
  1431. int io_socket(struct io_kiocb *req, unsigned int issue_flags)
  1432. {
  1433. struct io_socket *sock = io_kiocb_to_cmd(req, struct io_socket);
  1434. bool fixed = !!sock->file_slot;
  1435. struct file *file;
  1436. int ret, fd;
  1437. if (!fixed) {
  1438. fd = __get_unused_fd_flags(sock->flags, sock->nofile);
  1439. if (unlikely(fd < 0))
  1440. return fd;
  1441. }
  1442. file = __sys_socket_file(sock->domain, sock->type, sock->protocol);
  1443. if (IS_ERR(file)) {
  1444. if (!fixed)
  1445. put_unused_fd(fd);
  1446. ret = PTR_ERR(file);
  1447. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  1448. return -EAGAIN;
  1449. if (ret == -ERESTARTSYS)
  1450. ret = -EINTR;
  1451. req_set_fail(req);
  1452. } else if (!fixed) {
  1453. fd_install(fd, file);
  1454. ret = fd;
  1455. } else {
  1456. ret = io_fixed_fd_install(req, issue_flags, file,
  1457. sock->file_slot);
  1458. }
  1459. io_req_set_res(req, ret, 0);
  1460. return IOU_OK;
  1461. }
  1462. int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1463. {
  1464. struct io_connect *conn = io_kiocb_to_cmd(req, struct io_connect);
  1465. struct io_async_msghdr *io;
  1466. if (sqe->len || sqe->buf_index || sqe->rw_flags || sqe->splice_fd_in)
  1467. return -EINVAL;
  1468. conn->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1469. conn->addr_len = READ_ONCE(sqe->addr2);
  1470. conn->in_progress = conn->seen_econnaborted = false;
  1471. io = io_msg_alloc_async(req);
  1472. if (unlikely(!io))
  1473. return -ENOMEM;
  1474. return move_addr_to_kernel(conn->addr, conn->addr_len, &io->addr);
  1475. }
  1476. int io_connect(struct io_kiocb *req, unsigned int issue_flags)
  1477. {
  1478. struct io_connect *connect = io_kiocb_to_cmd(req, struct io_connect);
  1479. struct io_async_msghdr *io = req->async_data;
  1480. unsigned file_flags;
  1481. int ret;
  1482. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  1483. if (connect->in_progress) {
  1484. struct poll_table_struct pt = { ._key = EPOLLERR };
  1485. if (vfs_poll(req->file, &pt) & EPOLLERR)
  1486. goto get_sock_err;
  1487. }
  1488. file_flags = force_nonblock ? O_NONBLOCK : 0;
  1489. ret = __sys_connect_file(req->file, &io->addr, connect->addr_len,
  1490. file_flags);
  1491. if ((ret == -EAGAIN || ret == -EINPROGRESS || ret == -ECONNABORTED)
  1492. && force_nonblock) {
  1493. if (ret == -EINPROGRESS) {
  1494. connect->in_progress = true;
  1495. } else if (ret == -ECONNABORTED) {
  1496. if (connect->seen_econnaborted)
  1497. goto out;
  1498. connect->seen_econnaborted = true;
  1499. }
  1500. return -EAGAIN;
  1501. }
  1502. if (connect->in_progress) {
  1503. /*
  1504. * At least bluetooth will return -EBADFD on a re-connect
  1505. * attempt, and it's (supposedly) also valid to get -EISCONN
  1506. * which means the previous result is good. For both of these,
  1507. * grab the sock_error() and use that for the completion.
  1508. */
  1509. if (ret == -EBADFD || ret == -EISCONN) {
  1510. get_sock_err:
  1511. ret = sock_error(sock_from_file(req->file)->sk);
  1512. }
  1513. }
  1514. if (ret == -ERESTARTSYS)
  1515. ret = -EINTR;
  1516. out:
  1517. if (ret < 0)
  1518. req_set_fail(req);
  1519. io_req_msg_cleanup(req, issue_flags);
  1520. io_req_set_res(req, ret, 0);
  1521. return IOU_OK;
  1522. }
  1523. int io_bind_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1524. {
  1525. struct io_bind *bind = io_kiocb_to_cmd(req, struct io_bind);
  1526. struct sockaddr __user *uaddr;
  1527. struct io_async_msghdr *io;
  1528. if (sqe->len || sqe->buf_index || sqe->rw_flags || sqe->splice_fd_in)
  1529. return -EINVAL;
  1530. uaddr = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1531. bind->addr_len = READ_ONCE(sqe->addr2);
  1532. io = io_msg_alloc_async(req);
  1533. if (unlikely(!io))
  1534. return -ENOMEM;
  1535. return move_addr_to_kernel(uaddr, bind->addr_len, &io->addr);
  1536. }
  1537. int io_bind(struct io_kiocb *req, unsigned int issue_flags)
  1538. {
  1539. struct io_bind *bind = io_kiocb_to_cmd(req, struct io_bind);
  1540. struct io_async_msghdr *io = req->async_data;
  1541. struct socket *sock;
  1542. int ret;
  1543. sock = sock_from_file(req->file);
  1544. if (unlikely(!sock))
  1545. return -ENOTSOCK;
  1546. ret = __sys_bind_socket(sock, &io->addr, bind->addr_len);
  1547. if (ret < 0)
  1548. req_set_fail(req);
  1549. io_req_set_res(req, ret, 0);
  1550. return 0;
  1551. }
  1552. int io_listen_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1553. {
  1554. struct io_listen *listen = io_kiocb_to_cmd(req, struct io_listen);
  1555. if (sqe->addr || sqe->buf_index || sqe->rw_flags || sqe->splice_fd_in || sqe->addr2)
  1556. return -EINVAL;
  1557. listen->backlog = READ_ONCE(sqe->len);
  1558. return 0;
  1559. }
  1560. int io_listen(struct io_kiocb *req, unsigned int issue_flags)
  1561. {
  1562. struct io_listen *listen = io_kiocb_to_cmd(req, struct io_listen);
  1563. struct socket *sock;
  1564. int ret;
  1565. sock = sock_from_file(req->file);
  1566. if (unlikely(!sock))
  1567. return -ENOTSOCK;
  1568. ret = __sys_listen_socket(sock, listen->backlog);
  1569. if (ret < 0)
  1570. req_set_fail(req);
  1571. io_req_set_res(req, ret, 0);
  1572. return 0;
  1573. }
  1574. void io_netmsg_cache_free(const void *entry)
  1575. {
  1576. struct io_async_msghdr *kmsg = (struct io_async_msghdr *) entry;
  1577. if (kmsg->free_iov) {
  1578. kasan_mempool_unpoison_object(kmsg->free_iov,
  1579. kmsg->free_iov_nr * sizeof(struct iovec));
  1580. io_netmsg_iovec_free(kmsg);
  1581. }
  1582. kfree(kmsg);
  1583. }
  1584. #endif