net.c 45 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815
  1. // SPDX-License-Identifier: GPL-2.0
  2. #include <linux/kernel.h>
  3. #include <linux/errno.h>
  4. #include <linux/file.h>
  5. #include <linux/slab.h>
  6. #include <linux/net.h>
  7. #include <linux/compat.h>
  8. #include <net/compat.h>
  9. #include <linux/io_uring.h>
  10. #include <uapi/linux/io_uring.h>
  11. #include "io_uring.h"
  12. #include "kbuf.h"
  13. #include "alloc_cache.h"
  14. #include "net.h"
  15. #include "notif.h"
  16. #include "rsrc.h"
  17. #if defined(CONFIG_NET)
  18. struct io_shutdown {
  19. struct file *file;
  20. int how;
  21. };
  22. struct io_accept {
  23. struct file *file;
  24. struct sockaddr __user *addr;
  25. int __user *addr_len;
  26. int flags;
  27. int iou_flags;
  28. u32 file_slot;
  29. unsigned long nofile;
  30. };
  31. struct io_socket {
  32. struct file *file;
  33. int domain;
  34. int type;
  35. int protocol;
  36. int flags;
  37. u32 file_slot;
  38. unsigned long nofile;
  39. };
  40. struct io_connect {
  41. struct file *file;
  42. struct sockaddr __user *addr;
  43. int addr_len;
  44. bool in_progress;
  45. bool seen_econnaborted;
  46. };
  47. struct io_bind {
  48. struct file *file;
  49. int addr_len;
  50. };
  51. struct io_listen {
  52. struct file *file;
  53. int backlog;
  54. };
  55. struct io_sr_msg {
  56. struct file *file;
  57. union {
  58. struct compat_msghdr __user *umsg_compat;
  59. struct user_msghdr __user *umsg;
  60. void __user *buf;
  61. };
  62. int len;
  63. unsigned done_io;
  64. unsigned msg_flags;
  65. unsigned nr_multishot_loops;
  66. u16 flags;
  67. /* initialised and used only by !msg send variants */
  68. u16 addr_len;
  69. u16 buf_group;
  70. void __user *addr;
  71. void __user *msg_control;
  72. /* used only for send zerocopy */
  73. struct io_kiocb *notif;
  74. };
  75. /*
  76. * Number of times we'll try and do receives if there's more data. If we
  77. * exceed this limit, then add us to the back of the queue and retry from
  78. * there. This helps fairness between flooding clients.
  79. */
  80. #define MULTISHOT_MAX_RETRY 32
  81. int io_shutdown_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  82. {
  83. struct io_shutdown *shutdown = io_kiocb_to_cmd(req, struct io_shutdown);
  84. if (unlikely(sqe->off || sqe->addr || sqe->rw_flags ||
  85. sqe->buf_index || sqe->splice_fd_in))
  86. return -EINVAL;
  87. shutdown->how = READ_ONCE(sqe->len);
  88. req->flags |= REQ_F_FORCE_ASYNC;
  89. return 0;
  90. }
  91. int io_shutdown(struct io_kiocb *req, unsigned int issue_flags)
  92. {
  93. struct io_shutdown *shutdown = io_kiocb_to_cmd(req, struct io_shutdown);
  94. struct socket *sock;
  95. int ret;
  96. WARN_ON_ONCE(issue_flags & IO_URING_F_NONBLOCK);
  97. sock = sock_from_file(req->file);
  98. if (unlikely(!sock))
  99. return -ENOTSOCK;
  100. ret = __sys_shutdown_sock(sock, shutdown->how);
  101. io_req_set_res(req, ret, 0);
  102. return IOU_OK;
  103. }
  104. static bool io_net_retry(struct socket *sock, int flags)
  105. {
  106. if (!(flags & MSG_WAITALL))
  107. return false;
  108. return sock->type == SOCK_STREAM || sock->type == SOCK_SEQPACKET;
  109. }
  110. static void io_netmsg_iovec_free(struct io_async_msghdr *kmsg)
  111. {
  112. if (kmsg->free_iov) {
  113. kfree(kmsg->free_iov);
  114. kmsg->free_iov_nr = 0;
  115. kmsg->free_iov = NULL;
  116. }
  117. }
  118. static void io_netmsg_recycle(struct io_kiocb *req, unsigned int issue_flags)
  119. {
  120. struct io_async_msghdr *hdr = req->async_data;
  121. struct iovec *iov;
  122. /* can't recycle, ensure we free the iovec if we have one */
  123. if (unlikely(issue_flags & IO_URING_F_UNLOCKED)) {
  124. io_netmsg_iovec_free(hdr);
  125. return;
  126. }
  127. /* Let normal cleanup path reap it if we fail adding to the cache */
  128. iov = hdr->free_iov;
  129. if (io_alloc_cache_put(&req->ctx->netmsg_cache, hdr)) {
  130. if (iov)
  131. kasan_mempool_poison_object(iov);
  132. req->async_data = NULL;
  133. req->flags &= ~REQ_F_ASYNC_DATA;
  134. }
  135. }
  136. static struct io_async_msghdr *io_msg_alloc_async(struct io_kiocb *req)
  137. {
  138. struct io_ring_ctx *ctx = req->ctx;
  139. struct io_async_msghdr *hdr;
  140. hdr = io_alloc_cache_get(&ctx->netmsg_cache);
  141. if (hdr) {
  142. if (hdr->free_iov) {
  143. kasan_mempool_unpoison_object(hdr->free_iov,
  144. hdr->free_iov_nr * sizeof(struct iovec));
  145. req->flags |= REQ_F_NEED_CLEANUP;
  146. }
  147. req->flags |= REQ_F_ASYNC_DATA;
  148. req->async_data = hdr;
  149. return hdr;
  150. }
  151. if (!io_alloc_async_data(req)) {
  152. hdr = req->async_data;
  153. hdr->free_iov_nr = 0;
  154. hdr->free_iov = NULL;
  155. return hdr;
  156. }
  157. return NULL;
  158. }
  159. /* assign new iovec to kmsg, if we need to */
  160. static int io_net_vec_assign(struct io_kiocb *req, struct io_async_msghdr *kmsg,
  161. struct iovec *iov)
  162. {
  163. if (iov) {
  164. req->flags |= REQ_F_NEED_CLEANUP;
  165. kmsg->free_iov_nr = kmsg->msg.msg_iter.nr_segs;
  166. if (kmsg->free_iov)
  167. kfree(kmsg->free_iov);
  168. kmsg->free_iov = iov;
  169. }
  170. return 0;
  171. }
  172. static inline void io_mshot_prep_retry(struct io_kiocb *req,
  173. struct io_async_msghdr *kmsg)
  174. {
  175. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  176. req->flags &= ~REQ_F_BL_EMPTY;
  177. sr->done_io = 0;
  178. sr->len = 0; /* get from the provided buffer */
  179. req->buf_index = sr->buf_group;
  180. }
  181. #ifdef CONFIG_COMPAT
  182. static int io_compat_msg_copy_hdr(struct io_kiocb *req,
  183. struct io_async_msghdr *iomsg,
  184. struct compat_msghdr *msg, int ddir)
  185. {
  186. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  187. struct compat_iovec __user *uiov;
  188. struct iovec *iov;
  189. int ret, nr_segs;
  190. if (iomsg->free_iov) {
  191. nr_segs = iomsg->free_iov_nr;
  192. iov = iomsg->free_iov;
  193. } else {
  194. iov = &iomsg->fast_iov;
  195. nr_segs = 1;
  196. }
  197. if (copy_from_user(msg, sr->umsg_compat, sizeof(*msg)))
  198. return -EFAULT;
  199. uiov = compat_ptr(msg->msg_iov);
  200. if (req->flags & REQ_F_BUFFER_SELECT) {
  201. compat_ssize_t clen;
  202. if (msg->msg_iovlen == 0) {
  203. sr->len = iov->iov_len = 0;
  204. iov->iov_base = NULL;
  205. } else if (msg->msg_iovlen > 1) {
  206. return -EINVAL;
  207. } else {
  208. if (!access_ok(uiov, sizeof(*uiov)))
  209. return -EFAULT;
  210. if (__get_user(clen, &uiov->iov_len))
  211. return -EFAULT;
  212. if (clen < 0)
  213. return -EINVAL;
  214. sr->len = clen;
  215. }
  216. return 0;
  217. }
  218. ret = __import_iovec(ddir, (struct iovec __user *)uiov, msg->msg_iovlen,
  219. nr_segs, &iov, &iomsg->msg.msg_iter, true);
  220. if (unlikely(ret < 0))
  221. return ret;
  222. return io_net_vec_assign(req, iomsg, iov);
  223. }
  224. #endif
  225. static int io_msg_copy_hdr(struct io_kiocb *req, struct io_async_msghdr *iomsg,
  226. struct user_msghdr *msg, int ddir)
  227. {
  228. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  229. struct iovec *iov;
  230. int ret, nr_segs;
  231. if (iomsg->free_iov) {
  232. nr_segs = iomsg->free_iov_nr;
  233. iov = iomsg->free_iov;
  234. } else {
  235. iov = &iomsg->fast_iov;
  236. nr_segs = 1;
  237. }
  238. if (!user_access_begin(sr->umsg, sizeof(*sr->umsg)))
  239. return -EFAULT;
  240. ret = -EFAULT;
  241. unsafe_get_user(msg->msg_name, &sr->umsg->msg_name, ua_end);
  242. unsafe_get_user(msg->msg_namelen, &sr->umsg->msg_namelen, ua_end);
  243. unsafe_get_user(msg->msg_iov, &sr->umsg->msg_iov, ua_end);
  244. unsafe_get_user(msg->msg_iovlen, &sr->umsg->msg_iovlen, ua_end);
  245. unsafe_get_user(msg->msg_control, &sr->umsg->msg_control, ua_end);
  246. unsafe_get_user(msg->msg_controllen, &sr->umsg->msg_controllen, ua_end);
  247. msg->msg_flags = 0;
  248. if (req->flags & REQ_F_BUFFER_SELECT) {
  249. if (msg->msg_iovlen == 0) {
  250. sr->len = iov->iov_len = 0;
  251. iov->iov_base = NULL;
  252. } else if (msg->msg_iovlen > 1) {
  253. ret = -EINVAL;
  254. goto ua_end;
  255. } else {
  256. /* we only need the length for provided buffers */
  257. if (!access_ok(&msg->msg_iov[0].iov_len, sizeof(__kernel_size_t)))
  258. goto ua_end;
  259. unsafe_get_user(iov->iov_len, &msg->msg_iov[0].iov_len,
  260. ua_end);
  261. sr->len = iov->iov_len;
  262. }
  263. ret = 0;
  264. ua_end:
  265. user_access_end();
  266. return ret;
  267. }
  268. user_access_end();
  269. ret = __import_iovec(ddir, msg->msg_iov, msg->msg_iovlen, nr_segs,
  270. &iov, &iomsg->msg.msg_iter, false);
  271. if (unlikely(ret < 0))
  272. return ret;
  273. return io_net_vec_assign(req, iomsg, iov);
  274. }
  275. static int io_sendmsg_copy_hdr(struct io_kiocb *req,
  276. struct io_async_msghdr *iomsg)
  277. {
  278. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  279. struct user_msghdr msg;
  280. int ret;
  281. iomsg->msg.msg_name = &iomsg->addr;
  282. iomsg->msg.msg_iter.nr_segs = 0;
  283. #ifdef CONFIG_COMPAT
  284. if (unlikely(req->ctx->compat)) {
  285. struct compat_msghdr cmsg;
  286. ret = io_compat_msg_copy_hdr(req, iomsg, &cmsg, ITER_SOURCE);
  287. if (unlikely(ret))
  288. return ret;
  289. return __get_compat_msghdr(&iomsg->msg, &cmsg, NULL);
  290. }
  291. #endif
  292. ret = io_msg_copy_hdr(req, iomsg, &msg, ITER_SOURCE);
  293. if (unlikely(ret))
  294. return ret;
  295. ret = __copy_msghdr(&iomsg->msg, &msg, NULL);
  296. /* save msg_control as sys_sendmsg() overwrites it */
  297. sr->msg_control = iomsg->msg.msg_control_user;
  298. return ret;
  299. }
  300. void io_sendmsg_recvmsg_cleanup(struct io_kiocb *req)
  301. {
  302. struct io_async_msghdr *io = req->async_data;
  303. io_netmsg_iovec_free(io);
  304. }
  305. static int io_send_setup(struct io_kiocb *req)
  306. {
  307. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  308. struct io_async_msghdr *kmsg = req->async_data;
  309. int ret;
  310. kmsg->msg.msg_name = NULL;
  311. kmsg->msg.msg_namelen = 0;
  312. kmsg->msg.msg_control = NULL;
  313. kmsg->msg.msg_controllen = 0;
  314. kmsg->msg.msg_ubuf = NULL;
  315. if (sr->addr) {
  316. ret = move_addr_to_kernel(sr->addr, sr->addr_len, &kmsg->addr);
  317. if (unlikely(ret < 0))
  318. return ret;
  319. kmsg->msg.msg_name = &kmsg->addr;
  320. kmsg->msg.msg_namelen = sr->addr_len;
  321. }
  322. if (!io_do_buffer_select(req)) {
  323. ret = import_ubuf(ITER_SOURCE, sr->buf, sr->len,
  324. &kmsg->msg.msg_iter);
  325. if (unlikely(ret < 0))
  326. return ret;
  327. }
  328. return 0;
  329. }
  330. static int io_sendmsg_prep_setup(struct io_kiocb *req, int is_msg)
  331. {
  332. struct io_async_msghdr *kmsg;
  333. int ret;
  334. kmsg = io_msg_alloc_async(req);
  335. if (unlikely(!kmsg))
  336. return -ENOMEM;
  337. if (!is_msg)
  338. return io_send_setup(req);
  339. ret = io_sendmsg_copy_hdr(req, kmsg);
  340. if (!ret)
  341. req->flags |= REQ_F_NEED_CLEANUP;
  342. return ret;
  343. }
  344. #define SENDMSG_FLAGS (IORING_RECVSEND_POLL_FIRST | IORING_RECVSEND_BUNDLE)
  345. int io_sendmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  346. {
  347. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  348. sr->done_io = 0;
  349. if (req->opcode == IORING_OP_SEND) {
  350. if (READ_ONCE(sqe->__pad3[0]))
  351. return -EINVAL;
  352. sr->addr = u64_to_user_ptr(READ_ONCE(sqe->addr2));
  353. sr->addr_len = READ_ONCE(sqe->addr_len);
  354. } else if (sqe->addr2 || sqe->file_index) {
  355. return -EINVAL;
  356. }
  357. sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
  358. sr->len = READ_ONCE(sqe->len);
  359. sr->flags = READ_ONCE(sqe->ioprio);
  360. if (sr->flags & ~SENDMSG_FLAGS)
  361. return -EINVAL;
  362. sr->msg_flags = READ_ONCE(sqe->msg_flags) | MSG_NOSIGNAL;
  363. if (sr->msg_flags & MSG_DONTWAIT)
  364. req->flags |= REQ_F_NOWAIT;
  365. if (sr->flags & IORING_RECVSEND_BUNDLE) {
  366. if (req->opcode == IORING_OP_SENDMSG)
  367. return -EINVAL;
  368. if (!(req->flags & REQ_F_BUFFER_SELECT))
  369. return -EINVAL;
  370. sr->msg_flags |= MSG_WAITALL;
  371. sr->buf_group = req->buf_index;
  372. req->buf_list = NULL;
  373. }
  374. #ifdef CONFIG_COMPAT
  375. if (req->ctx->compat)
  376. sr->msg_flags |= MSG_CMSG_COMPAT;
  377. #endif
  378. return io_sendmsg_prep_setup(req, req->opcode == IORING_OP_SENDMSG);
  379. }
  380. static void io_req_msg_cleanup(struct io_kiocb *req,
  381. unsigned int issue_flags)
  382. {
  383. req->flags &= ~REQ_F_NEED_CLEANUP;
  384. io_netmsg_recycle(req, issue_flags);
  385. }
  386. /*
  387. * For bundle completions, we need to figure out how many segments we consumed.
  388. * A bundle could be using a single ITER_UBUF if that's all we mapped, or it
  389. * could be using an ITER_IOVEC. If the latter, then if we consumed all of
  390. * the segments, then it's a trivial questiont o answer. If we have residual
  391. * data in the iter, then loop the segments to figure out how much we
  392. * transferred.
  393. */
  394. static int io_bundle_nbufs(struct io_async_msghdr *kmsg, int ret)
  395. {
  396. struct iovec *iov;
  397. int nbufs;
  398. /* no data is always zero segments, and a ubuf is always 1 segment */
  399. if (ret <= 0)
  400. return 0;
  401. if (iter_is_ubuf(&kmsg->msg.msg_iter))
  402. return 1;
  403. iov = kmsg->free_iov;
  404. if (!iov)
  405. iov = &kmsg->fast_iov;
  406. /* if all data was transferred, it's basic pointer math */
  407. if (!iov_iter_count(&kmsg->msg.msg_iter))
  408. return iter_iov(&kmsg->msg.msg_iter) - iov;
  409. /* short transfer, count segments */
  410. nbufs = 0;
  411. do {
  412. int this_len = min_t(int, iov[nbufs].iov_len, ret);
  413. nbufs++;
  414. ret -= this_len;
  415. } while (ret);
  416. return nbufs;
  417. }
  418. static inline bool io_send_finish(struct io_kiocb *req, int *ret,
  419. struct io_async_msghdr *kmsg,
  420. unsigned issue_flags)
  421. {
  422. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  423. bool bundle_finished = *ret <= 0;
  424. unsigned int cflags;
  425. if (!(sr->flags & IORING_RECVSEND_BUNDLE)) {
  426. cflags = io_put_kbuf(req, *ret, issue_flags);
  427. goto finish;
  428. }
  429. cflags = io_put_kbufs(req, *ret, io_bundle_nbufs(kmsg, *ret), issue_flags);
  430. if (bundle_finished || req->flags & REQ_F_BL_EMPTY)
  431. goto finish;
  432. /*
  433. * Fill CQE for this receive and see if we should keep trying to
  434. * receive from this socket.
  435. */
  436. if (io_req_post_cqe(req, *ret, cflags | IORING_CQE_F_MORE)) {
  437. io_mshot_prep_retry(req, kmsg);
  438. return false;
  439. }
  440. /* Otherwise stop bundle and use the current result. */
  441. finish:
  442. io_req_set_res(req, *ret, cflags);
  443. *ret = IOU_OK;
  444. return true;
  445. }
  446. int io_sendmsg(struct io_kiocb *req, unsigned int issue_flags)
  447. {
  448. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  449. struct io_async_msghdr *kmsg = req->async_data;
  450. struct socket *sock;
  451. unsigned flags;
  452. int min_ret = 0;
  453. int ret;
  454. sock = sock_from_file(req->file);
  455. if (unlikely(!sock))
  456. return -ENOTSOCK;
  457. if (!(req->flags & REQ_F_POLLED) &&
  458. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  459. return -EAGAIN;
  460. flags = sr->msg_flags;
  461. if (issue_flags & IO_URING_F_NONBLOCK)
  462. flags |= MSG_DONTWAIT;
  463. if (flags & MSG_WAITALL)
  464. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  465. kmsg->msg.msg_control_user = sr->msg_control;
  466. ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
  467. if (ret < min_ret) {
  468. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  469. return -EAGAIN;
  470. if (ret > 0 && io_net_retry(sock, flags)) {
  471. kmsg->msg.msg_controllen = 0;
  472. kmsg->msg.msg_control = NULL;
  473. sr->done_io += ret;
  474. req->flags |= REQ_F_BL_NO_RECYCLE;
  475. return -EAGAIN;
  476. }
  477. if (ret == -ERESTARTSYS)
  478. ret = -EINTR;
  479. req_set_fail(req);
  480. }
  481. io_req_msg_cleanup(req, issue_flags);
  482. if (ret >= 0)
  483. ret += sr->done_io;
  484. else if (sr->done_io)
  485. ret = sr->done_io;
  486. io_req_set_res(req, ret, 0);
  487. return IOU_OK;
  488. }
  489. int io_send(struct io_kiocb *req, unsigned int issue_flags)
  490. {
  491. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  492. struct io_async_msghdr *kmsg = req->async_data;
  493. struct socket *sock;
  494. unsigned flags;
  495. int min_ret = 0;
  496. int ret;
  497. sock = sock_from_file(req->file);
  498. if (unlikely(!sock))
  499. return -ENOTSOCK;
  500. if (!(req->flags & REQ_F_POLLED) &&
  501. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  502. return -EAGAIN;
  503. flags = sr->msg_flags;
  504. if (issue_flags & IO_URING_F_NONBLOCK)
  505. flags |= MSG_DONTWAIT;
  506. retry_bundle:
  507. if (io_do_buffer_select(req)) {
  508. struct buf_sel_arg arg = {
  509. .iovs = &kmsg->fast_iov,
  510. .max_len = min_not_zero(sr->len, INT_MAX),
  511. .nr_iovs = 1,
  512. };
  513. if (kmsg->free_iov) {
  514. arg.nr_iovs = kmsg->free_iov_nr;
  515. arg.iovs = kmsg->free_iov;
  516. arg.mode = KBUF_MODE_FREE;
  517. }
  518. if (!(sr->flags & IORING_RECVSEND_BUNDLE))
  519. arg.nr_iovs = 1;
  520. else
  521. arg.mode |= KBUF_MODE_EXPAND;
  522. ret = io_buffers_select(req, &arg, issue_flags);
  523. if (unlikely(ret < 0))
  524. return ret;
  525. if (arg.iovs != &kmsg->fast_iov && arg.iovs != kmsg->free_iov) {
  526. kmsg->free_iov_nr = ret;
  527. kmsg->free_iov = arg.iovs;
  528. req->flags |= REQ_F_NEED_CLEANUP;
  529. }
  530. sr->len = arg.out_len;
  531. if (ret == 1) {
  532. sr->buf = arg.iovs[0].iov_base;
  533. ret = import_ubuf(ITER_SOURCE, sr->buf, sr->len,
  534. &kmsg->msg.msg_iter);
  535. if (unlikely(ret))
  536. return ret;
  537. } else {
  538. iov_iter_init(&kmsg->msg.msg_iter, ITER_SOURCE,
  539. arg.iovs, ret, arg.out_len);
  540. }
  541. }
  542. /*
  543. * If MSG_WAITALL is set, or this is a bundle send, then we need
  544. * the full amount. If just bundle is set, if we do a short send
  545. * then we complete the bundle sequence rather than continue on.
  546. */
  547. if (flags & MSG_WAITALL || sr->flags & IORING_RECVSEND_BUNDLE)
  548. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  549. flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
  550. kmsg->msg.msg_flags = flags;
  551. ret = sock_sendmsg(sock, &kmsg->msg);
  552. if (ret < min_ret) {
  553. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  554. return -EAGAIN;
  555. if (ret > 0 && io_net_retry(sock, flags)) {
  556. sr->len -= ret;
  557. sr->buf += ret;
  558. sr->done_io += ret;
  559. req->flags |= REQ_F_BL_NO_RECYCLE;
  560. return -EAGAIN;
  561. }
  562. if (ret == -ERESTARTSYS)
  563. ret = -EINTR;
  564. req_set_fail(req);
  565. }
  566. if (ret >= 0)
  567. ret += sr->done_io;
  568. else if (sr->done_io)
  569. ret = sr->done_io;
  570. if (!io_send_finish(req, &ret, kmsg, issue_flags))
  571. goto retry_bundle;
  572. io_req_msg_cleanup(req, issue_flags);
  573. return ret;
  574. }
  575. static int io_recvmsg_mshot_prep(struct io_kiocb *req,
  576. struct io_async_msghdr *iomsg,
  577. int namelen, size_t controllen)
  578. {
  579. if ((req->flags & (REQ_F_APOLL_MULTISHOT|REQ_F_BUFFER_SELECT)) ==
  580. (REQ_F_APOLL_MULTISHOT|REQ_F_BUFFER_SELECT)) {
  581. int hdr;
  582. if (unlikely(namelen < 0))
  583. return -EOVERFLOW;
  584. if (check_add_overflow(sizeof(struct io_uring_recvmsg_out),
  585. namelen, &hdr))
  586. return -EOVERFLOW;
  587. if (check_add_overflow(hdr, controllen, &hdr))
  588. return -EOVERFLOW;
  589. iomsg->namelen = namelen;
  590. iomsg->controllen = controllen;
  591. return 0;
  592. }
  593. return 0;
  594. }
  595. static int io_recvmsg_copy_hdr(struct io_kiocb *req,
  596. struct io_async_msghdr *iomsg)
  597. {
  598. struct user_msghdr msg;
  599. int ret;
  600. iomsg->msg.msg_name = &iomsg->addr;
  601. iomsg->msg.msg_iter.nr_segs = 0;
  602. #ifdef CONFIG_COMPAT
  603. if (unlikely(req->ctx->compat)) {
  604. struct compat_msghdr cmsg;
  605. ret = io_compat_msg_copy_hdr(req, iomsg, &cmsg, ITER_DEST);
  606. if (unlikely(ret))
  607. return ret;
  608. ret = __get_compat_msghdr(&iomsg->msg, &cmsg, &iomsg->uaddr);
  609. if (unlikely(ret))
  610. return ret;
  611. return io_recvmsg_mshot_prep(req, iomsg, cmsg.msg_namelen,
  612. cmsg.msg_controllen);
  613. }
  614. #endif
  615. ret = io_msg_copy_hdr(req, iomsg, &msg, ITER_DEST);
  616. if (unlikely(ret))
  617. return ret;
  618. ret = __copy_msghdr(&iomsg->msg, &msg, &iomsg->uaddr);
  619. if (unlikely(ret))
  620. return ret;
  621. return io_recvmsg_mshot_prep(req, iomsg, msg.msg_namelen,
  622. msg.msg_controllen);
  623. }
  624. static int io_recvmsg_prep_setup(struct io_kiocb *req)
  625. {
  626. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  627. struct io_async_msghdr *kmsg;
  628. int ret;
  629. kmsg = io_msg_alloc_async(req);
  630. if (unlikely(!kmsg))
  631. return -ENOMEM;
  632. if (req->opcode == IORING_OP_RECV) {
  633. kmsg->msg.msg_name = NULL;
  634. kmsg->msg.msg_namelen = 0;
  635. kmsg->msg.msg_inq = 0;
  636. kmsg->msg.msg_control = NULL;
  637. kmsg->msg.msg_get_inq = 1;
  638. kmsg->msg.msg_controllen = 0;
  639. kmsg->msg.msg_iocb = NULL;
  640. kmsg->msg.msg_ubuf = NULL;
  641. if (!io_do_buffer_select(req)) {
  642. ret = import_ubuf(ITER_DEST, sr->buf, sr->len,
  643. &kmsg->msg.msg_iter);
  644. if (unlikely(ret))
  645. return ret;
  646. }
  647. return 0;
  648. }
  649. ret = io_recvmsg_copy_hdr(req, kmsg);
  650. if (!ret)
  651. req->flags |= REQ_F_NEED_CLEANUP;
  652. return ret;
  653. }
  654. #define RECVMSG_FLAGS (IORING_RECVSEND_POLL_FIRST | IORING_RECV_MULTISHOT | \
  655. IORING_RECVSEND_BUNDLE)
  656. int io_recvmsg_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  657. {
  658. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  659. sr->done_io = 0;
  660. if (unlikely(sqe->file_index || sqe->addr2))
  661. return -EINVAL;
  662. sr->umsg = u64_to_user_ptr(READ_ONCE(sqe->addr));
  663. sr->len = READ_ONCE(sqe->len);
  664. sr->flags = READ_ONCE(sqe->ioprio);
  665. if (sr->flags & ~RECVMSG_FLAGS)
  666. return -EINVAL;
  667. sr->msg_flags = READ_ONCE(sqe->msg_flags);
  668. if (sr->msg_flags & MSG_DONTWAIT)
  669. req->flags |= REQ_F_NOWAIT;
  670. if (sr->msg_flags & MSG_ERRQUEUE)
  671. req->flags |= REQ_F_CLEAR_POLLIN;
  672. if (req->flags & REQ_F_BUFFER_SELECT) {
  673. /*
  674. * Store the buffer group for this multishot receive separately,
  675. * as if we end up doing an io-wq based issue that selects a
  676. * buffer, it has to be committed immediately and that will
  677. * clear ->buf_list. This means we lose the link to the buffer
  678. * list, and the eventual buffer put on completion then cannot
  679. * restore it.
  680. */
  681. sr->buf_group = req->buf_index;
  682. req->buf_list = NULL;
  683. }
  684. if (sr->flags & IORING_RECV_MULTISHOT) {
  685. if (!(req->flags & REQ_F_BUFFER_SELECT))
  686. return -EINVAL;
  687. if (sr->msg_flags & MSG_WAITALL)
  688. return -EINVAL;
  689. if (req->opcode == IORING_OP_RECV && sr->len)
  690. return -EINVAL;
  691. req->flags |= REQ_F_APOLL_MULTISHOT;
  692. }
  693. if (sr->flags & IORING_RECVSEND_BUNDLE) {
  694. if (req->opcode == IORING_OP_RECVMSG)
  695. return -EINVAL;
  696. }
  697. #ifdef CONFIG_COMPAT
  698. if (req->ctx->compat)
  699. sr->msg_flags |= MSG_CMSG_COMPAT;
  700. #endif
  701. sr->nr_multishot_loops = 0;
  702. return io_recvmsg_prep_setup(req);
  703. }
  704. /*
  705. * Finishes io_recv and io_recvmsg.
  706. *
  707. * Returns true if it is actually finished, or false if it should run
  708. * again (for multishot).
  709. */
  710. static inline bool io_recv_finish(struct io_kiocb *req, int *ret,
  711. struct io_async_msghdr *kmsg,
  712. bool mshot_finished, unsigned issue_flags)
  713. {
  714. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  715. unsigned int cflags = 0;
  716. if (kmsg->msg.msg_inq > 0)
  717. cflags |= IORING_CQE_F_SOCK_NONEMPTY;
  718. if (sr->flags & IORING_RECVSEND_BUNDLE) {
  719. cflags |= io_put_kbufs(req, *ret, io_bundle_nbufs(kmsg, *ret),
  720. issue_flags);
  721. /* bundle with no more immediate buffers, we're done */
  722. if (req->flags & REQ_F_BL_EMPTY)
  723. goto finish;
  724. } else {
  725. cflags |= io_put_kbuf(req, *ret, issue_flags);
  726. }
  727. /*
  728. * Fill CQE for this receive and see if we should keep trying to
  729. * receive from this socket.
  730. */
  731. if ((req->flags & REQ_F_APOLL_MULTISHOT) && !mshot_finished &&
  732. io_req_post_cqe(req, *ret, cflags | IORING_CQE_F_MORE)) {
  733. int mshot_retry_ret = IOU_ISSUE_SKIP_COMPLETE;
  734. io_mshot_prep_retry(req, kmsg);
  735. /* Known not-empty or unknown state, retry */
  736. if (cflags & IORING_CQE_F_SOCK_NONEMPTY || kmsg->msg.msg_inq < 0) {
  737. if (sr->nr_multishot_loops++ < MULTISHOT_MAX_RETRY)
  738. return false;
  739. /* mshot retries exceeded, force a requeue */
  740. sr->nr_multishot_loops = 0;
  741. mshot_retry_ret = IOU_REQUEUE;
  742. }
  743. if (issue_flags & IO_URING_F_MULTISHOT)
  744. *ret = mshot_retry_ret;
  745. else
  746. *ret = -EAGAIN;
  747. return true;
  748. }
  749. /* Finish the request / stop multishot. */
  750. finish:
  751. io_req_set_res(req, *ret, cflags);
  752. if (issue_flags & IO_URING_F_MULTISHOT)
  753. *ret = IOU_STOP_MULTISHOT;
  754. else
  755. *ret = IOU_OK;
  756. io_req_msg_cleanup(req, issue_flags);
  757. return true;
  758. }
  759. static int io_recvmsg_prep_multishot(struct io_async_msghdr *kmsg,
  760. struct io_sr_msg *sr, void __user **buf,
  761. size_t *len)
  762. {
  763. unsigned long ubuf = (unsigned long) *buf;
  764. unsigned long hdr;
  765. hdr = sizeof(struct io_uring_recvmsg_out) + kmsg->namelen +
  766. kmsg->controllen;
  767. if (*len < hdr)
  768. return -EFAULT;
  769. if (kmsg->controllen) {
  770. unsigned long control = ubuf + hdr - kmsg->controllen;
  771. kmsg->msg.msg_control_user = (void __user *) control;
  772. kmsg->msg.msg_controllen = kmsg->controllen;
  773. }
  774. sr->buf = *buf; /* stash for later copy */
  775. *buf = (void __user *) (ubuf + hdr);
  776. kmsg->payloadlen = *len = *len - hdr;
  777. return 0;
  778. }
  779. struct io_recvmsg_multishot_hdr {
  780. struct io_uring_recvmsg_out msg;
  781. struct sockaddr_storage addr;
  782. };
  783. static int io_recvmsg_multishot(struct socket *sock, struct io_sr_msg *io,
  784. struct io_async_msghdr *kmsg,
  785. unsigned int flags, bool *finished)
  786. {
  787. int err;
  788. int copy_len;
  789. struct io_recvmsg_multishot_hdr hdr;
  790. if (kmsg->namelen)
  791. kmsg->msg.msg_name = &hdr.addr;
  792. kmsg->msg.msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
  793. kmsg->msg.msg_namelen = 0;
  794. if (sock->file->f_flags & O_NONBLOCK)
  795. flags |= MSG_DONTWAIT;
  796. err = sock_recvmsg(sock, &kmsg->msg, flags);
  797. *finished = err <= 0;
  798. if (err < 0)
  799. return err;
  800. hdr.msg = (struct io_uring_recvmsg_out) {
  801. .controllen = kmsg->controllen - kmsg->msg.msg_controllen,
  802. .flags = kmsg->msg.msg_flags & ~MSG_CMSG_COMPAT
  803. };
  804. hdr.msg.payloadlen = err;
  805. if (err > kmsg->payloadlen)
  806. err = kmsg->payloadlen;
  807. copy_len = sizeof(struct io_uring_recvmsg_out);
  808. if (kmsg->msg.msg_namelen > kmsg->namelen)
  809. copy_len += kmsg->namelen;
  810. else
  811. copy_len += kmsg->msg.msg_namelen;
  812. /*
  813. * "fromlen shall refer to the value before truncation.."
  814. * 1003.1g
  815. */
  816. hdr.msg.namelen = kmsg->msg.msg_namelen;
  817. /* ensure that there is no gap between hdr and sockaddr_storage */
  818. BUILD_BUG_ON(offsetof(struct io_recvmsg_multishot_hdr, addr) !=
  819. sizeof(struct io_uring_recvmsg_out));
  820. if (copy_to_user(io->buf, &hdr, copy_len)) {
  821. *finished = true;
  822. return -EFAULT;
  823. }
  824. return sizeof(struct io_uring_recvmsg_out) + kmsg->namelen +
  825. kmsg->controllen + err;
  826. }
  827. int io_recvmsg(struct io_kiocb *req, unsigned int issue_flags)
  828. {
  829. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  830. struct io_async_msghdr *kmsg = req->async_data;
  831. struct socket *sock;
  832. unsigned flags;
  833. int ret, min_ret = 0;
  834. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  835. bool mshot_finished = true;
  836. sock = sock_from_file(req->file);
  837. if (unlikely(!sock))
  838. return -ENOTSOCK;
  839. if (!(req->flags & REQ_F_POLLED) &&
  840. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  841. return -EAGAIN;
  842. flags = sr->msg_flags;
  843. if (force_nonblock)
  844. flags |= MSG_DONTWAIT;
  845. retry_multishot:
  846. if (io_do_buffer_select(req)) {
  847. void __user *buf;
  848. size_t len = sr->len;
  849. buf = io_buffer_select(req, &len, issue_flags);
  850. if (!buf)
  851. return -ENOBUFS;
  852. if (req->flags & REQ_F_APOLL_MULTISHOT) {
  853. ret = io_recvmsg_prep_multishot(kmsg, sr, &buf, &len);
  854. if (ret) {
  855. io_kbuf_recycle(req, issue_flags);
  856. return ret;
  857. }
  858. }
  859. iov_iter_ubuf(&kmsg->msg.msg_iter, ITER_DEST, buf, len);
  860. }
  861. kmsg->msg.msg_get_inq = 1;
  862. kmsg->msg.msg_inq = -1;
  863. if (req->flags & REQ_F_APOLL_MULTISHOT) {
  864. ret = io_recvmsg_multishot(sock, sr, kmsg, flags,
  865. &mshot_finished);
  866. } else {
  867. /* disable partial retry for recvmsg with cmsg attached */
  868. if (flags & MSG_WAITALL && !kmsg->msg.msg_controllen)
  869. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  870. ret = __sys_recvmsg_sock(sock, &kmsg->msg, sr->umsg,
  871. kmsg->uaddr, flags);
  872. }
  873. if (ret < min_ret) {
  874. if (ret == -EAGAIN && force_nonblock) {
  875. if (issue_flags & IO_URING_F_MULTISHOT) {
  876. io_kbuf_recycle(req, issue_flags);
  877. return IOU_ISSUE_SKIP_COMPLETE;
  878. }
  879. return -EAGAIN;
  880. }
  881. if (ret > 0 && io_net_retry(sock, flags)) {
  882. sr->done_io += ret;
  883. req->flags |= REQ_F_BL_NO_RECYCLE;
  884. return -EAGAIN;
  885. }
  886. if (ret == -ERESTARTSYS)
  887. ret = -EINTR;
  888. req_set_fail(req);
  889. } else if ((flags & MSG_WAITALL) && (kmsg->msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
  890. req_set_fail(req);
  891. }
  892. if (ret > 0)
  893. ret += sr->done_io;
  894. else if (sr->done_io)
  895. ret = sr->done_io;
  896. else
  897. io_kbuf_recycle(req, issue_flags);
  898. if (!io_recv_finish(req, &ret, kmsg, mshot_finished, issue_flags))
  899. goto retry_multishot;
  900. return ret;
  901. }
  902. static int io_recv_buf_select(struct io_kiocb *req, struct io_async_msghdr *kmsg,
  903. size_t *len, unsigned int issue_flags)
  904. {
  905. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  906. int ret;
  907. /*
  908. * If the ring isn't locked, then don't use the peek interface
  909. * to grab multiple buffers as we will lock/unlock between
  910. * this selection and posting the buffers.
  911. */
  912. if (!(issue_flags & IO_URING_F_UNLOCKED) &&
  913. sr->flags & IORING_RECVSEND_BUNDLE) {
  914. struct buf_sel_arg arg = {
  915. .iovs = &kmsg->fast_iov,
  916. .nr_iovs = 1,
  917. .mode = KBUF_MODE_EXPAND,
  918. };
  919. if (kmsg->free_iov) {
  920. arg.nr_iovs = kmsg->free_iov_nr;
  921. arg.iovs = kmsg->free_iov;
  922. arg.mode |= KBUF_MODE_FREE;
  923. }
  924. if (kmsg->msg.msg_inq > 0)
  925. arg.max_len = min_not_zero(sr->len, kmsg->msg.msg_inq);
  926. ret = io_buffers_peek(req, &arg);
  927. if (unlikely(ret < 0))
  928. return ret;
  929. /* special case 1 vec, can be a fast path */
  930. if (ret == 1) {
  931. sr->buf = arg.iovs[0].iov_base;
  932. sr->len = arg.iovs[0].iov_len;
  933. goto map_ubuf;
  934. }
  935. iov_iter_init(&kmsg->msg.msg_iter, ITER_DEST, arg.iovs, ret,
  936. arg.out_len);
  937. if (arg.iovs != &kmsg->fast_iov && arg.iovs != kmsg->free_iov) {
  938. kmsg->free_iov_nr = ret;
  939. kmsg->free_iov = arg.iovs;
  940. req->flags |= REQ_F_NEED_CLEANUP;
  941. }
  942. } else {
  943. void __user *buf;
  944. *len = sr->len;
  945. buf = io_buffer_select(req, len, issue_flags);
  946. if (!buf)
  947. return -ENOBUFS;
  948. sr->buf = buf;
  949. sr->len = *len;
  950. map_ubuf:
  951. ret = import_ubuf(ITER_DEST, sr->buf, sr->len,
  952. &kmsg->msg.msg_iter);
  953. if (unlikely(ret))
  954. return ret;
  955. }
  956. return 0;
  957. }
  958. int io_recv(struct io_kiocb *req, unsigned int issue_flags)
  959. {
  960. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  961. struct io_async_msghdr *kmsg = req->async_data;
  962. struct socket *sock;
  963. unsigned flags;
  964. int ret, min_ret = 0;
  965. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  966. size_t len = sr->len;
  967. bool mshot_finished;
  968. if (!(req->flags & REQ_F_POLLED) &&
  969. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  970. return -EAGAIN;
  971. sock = sock_from_file(req->file);
  972. if (unlikely(!sock))
  973. return -ENOTSOCK;
  974. flags = sr->msg_flags;
  975. if (force_nonblock)
  976. flags |= MSG_DONTWAIT;
  977. retry_multishot:
  978. if (io_do_buffer_select(req)) {
  979. ret = io_recv_buf_select(req, kmsg, &len, issue_flags);
  980. if (unlikely(ret)) {
  981. kmsg->msg.msg_inq = -1;
  982. goto out_free;
  983. }
  984. sr->buf = NULL;
  985. }
  986. kmsg->msg.msg_flags = 0;
  987. kmsg->msg.msg_inq = -1;
  988. if (flags & MSG_WAITALL)
  989. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  990. ret = sock_recvmsg(sock, &kmsg->msg, flags);
  991. if (ret < min_ret) {
  992. if (ret == -EAGAIN && force_nonblock) {
  993. if (issue_flags & IO_URING_F_MULTISHOT) {
  994. io_kbuf_recycle(req, issue_flags);
  995. return IOU_ISSUE_SKIP_COMPLETE;
  996. }
  997. return -EAGAIN;
  998. }
  999. if (ret > 0 && io_net_retry(sock, flags)) {
  1000. sr->len -= ret;
  1001. sr->buf += ret;
  1002. sr->done_io += ret;
  1003. req->flags |= REQ_F_BL_NO_RECYCLE;
  1004. return -EAGAIN;
  1005. }
  1006. if (ret == -ERESTARTSYS)
  1007. ret = -EINTR;
  1008. req_set_fail(req);
  1009. } else if ((flags & MSG_WAITALL) && (kmsg->msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) {
  1010. out_free:
  1011. req_set_fail(req);
  1012. }
  1013. mshot_finished = ret <= 0;
  1014. if (ret > 0)
  1015. ret += sr->done_io;
  1016. else if (sr->done_io)
  1017. ret = sr->done_io;
  1018. else
  1019. io_kbuf_recycle(req, issue_flags);
  1020. if (!io_recv_finish(req, &ret, kmsg, mshot_finished, issue_flags))
  1021. goto retry_multishot;
  1022. return ret;
  1023. }
  1024. void io_send_zc_cleanup(struct io_kiocb *req)
  1025. {
  1026. struct io_sr_msg *zc = io_kiocb_to_cmd(req, struct io_sr_msg);
  1027. struct io_async_msghdr *io = req->async_data;
  1028. if (req_has_async_data(req))
  1029. io_netmsg_iovec_free(io);
  1030. if (zc->notif) {
  1031. io_notif_flush(zc->notif);
  1032. zc->notif = NULL;
  1033. }
  1034. }
  1035. #define IO_ZC_FLAGS_COMMON (IORING_RECVSEND_POLL_FIRST | IORING_RECVSEND_FIXED_BUF)
  1036. #define IO_ZC_FLAGS_VALID (IO_ZC_FLAGS_COMMON | IORING_SEND_ZC_REPORT_USAGE)
  1037. int io_send_zc_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1038. {
  1039. struct io_sr_msg *zc = io_kiocb_to_cmd(req, struct io_sr_msg);
  1040. struct io_ring_ctx *ctx = req->ctx;
  1041. struct io_kiocb *notif;
  1042. zc->done_io = 0;
  1043. req->flags |= REQ_F_POLL_NO_LAZY;
  1044. if (unlikely(READ_ONCE(sqe->__pad2[0]) || READ_ONCE(sqe->addr3)))
  1045. return -EINVAL;
  1046. /* we don't support IOSQE_CQE_SKIP_SUCCESS just yet */
  1047. if (req->flags & REQ_F_CQE_SKIP)
  1048. return -EINVAL;
  1049. notif = zc->notif = io_alloc_notif(ctx);
  1050. if (!notif)
  1051. return -ENOMEM;
  1052. notif->cqe.user_data = req->cqe.user_data;
  1053. notif->cqe.res = 0;
  1054. notif->cqe.flags = IORING_CQE_F_NOTIF;
  1055. req->flags |= REQ_F_NEED_CLEANUP;
  1056. zc->flags = READ_ONCE(sqe->ioprio);
  1057. if (unlikely(zc->flags & ~IO_ZC_FLAGS_COMMON)) {
  1058. if (zc->flags & ~IO_ZC_FLAGS_VALID)
  1059. return -EINVAL;
  1060. if (zc->flags & IORING_SEND_ZC_REPORT_USAGE) {
  1061. struct io_notif_data *nd = io_notif_to_data(notif);
  1062. nd->zc_report = true;
  1063. nd->zc_used = false;
  1064. nd->zc_copied = false;
  1065. }
  1066. }
  1067. if (zc->flags & IORING_RECVSEND_FIXED_BUF) {
  1068. unsigned idx = READ_ONCE(sqe->buf_index);
  1069. if (unlikely(idx >= ctx->nr_user_bufs))
  1070. return -EFAULT;
  1071. idx = array_index_nospec(idx, ctx->nr_user_bufs);
  1072. req->imu = READ_ONCE(ctx->user_bufs[idx]);
  1073. io_req_set_rsrc_node(notif, ctx, 0);
  1074. }
  1075. if (req->opcode == IORING_OP_SEND_ZC) {
  1076. if (READ_ONCE(sqe->__pad3[0]))
  1077. return -EINVAL;
  1078. zc->addr = u64_to_user_ptr(READ_ONCE(sqe->addr2));
  1079. zc->addr_len = READ_ONCE(sqe->addr_len);
  1080. } else {
  1081. if (unlikely(sqe->addr2 || sqe->file_index))
  1082. return -EINVAL;
  1083. if (unlikely(zc->flags & IORING_RECVSEND_FIXED_BUF))
  1084. return -EINVAL;
  1085. }
  1086. zc->buf = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1087. zc->len = READ_ONCE(sqe->len);
  1088. zc->msg_flags = READ_ONCE(sqe->msg_flags) | MSG_NOSIGNAL | MSG_ZEROCOPY;
  1089. if (zc->msg_flags & MSG_DONTWAIT)
  1090. req->flags |= REQ_F_NOWAIT;
  1091. #ifdef CONFIG_COMPAT
  1092. if (req->ctx->compat)
  1093. zc->msg_flags |= MSG_CMSG_COMPAT;
  1094. #endif
  1095. return io_sendmsg_prep_setup(req, req->opcode == IORING_OP_SENDMSG_ZC);
  1096. }
  1097. static int io_sg_from_iter_iovec(struct sk_buff *skb,
  1098. struct iov_iter *from, size_t length)
  1099. {
  1100. skb_zcopy_downgrade_managed(skb);
  1101. return zerocopy_fill_skb_from_iter(skb, from, length);
  1102. }
  1103. static int io_sg_from_iter(struct sk_buff *skb,
  1104. struct iov_iter *from, size_t length)
  1105. {
  1106. struct skb_shared_info *shinfo = skb_shinfo(skb);
  1107. int frag = shinfo->nr_frags;
  1108. int ret = 0;
  1109. struct bvec_iter bi;
  1110. ssize_t copied = 0;
  1111. unsigned long truesize = 0;
  1112. if (!frag)
  1113. shinfo->flags |= SKBFL_MANAGED_FRAG_REFS;
  1114. else if (unlikely(!skb_zcopy_managed(skb)))
  1115. return zerocopy_fill_skb_from_iter(skb, from, length);
  1116. bi.bi_size = min(from->count, length);
  1117. bi.bi_bvec_done = from->iov_offset;
  1118. bi.bi_idx = 0;
  1119. while (bi.bi_size && frag < MAX_SKB_FRAGS) {
  1120. struct bio_vec v = mp_bvec_iter_bvec(from->bvec, bi);
  1121. copied += v.bv_len;
  1122. truesize += PAGE_ALIGN(v.bv_len + v.bv_offset);
  1123. __skb_fill_page_desc_noacc(shinfo, frag++, v.bv_page,
  1124. v.bv_offset, v.bv_len);
  1125. bvec_iter_advance_single(from->bvec, &bi, v.bv_len);
  1126. }
  1127. if (bi.bi_size)
  1128. ret = -EMSGSIZE;
  1129. shinfo->nr_frags = frag;
  1130. from->bvec += bi.bi_idx;
  1131. from->nr_segs -= bi.bi_idx;
  1132. from->count -= copied;
  1133. from->iov_offset = bi.bi_bvec_done;
  1134. skb->data_len += copied;
  1135. skb->len += copied;
  1136. skb->truesize += truesize;
  1137. return ret;
  1138. }
  1139. static int io_send_zc_import(struct io_kiocb *req, struct io_async_msghdr *kmsg)
  1140. {
  1141. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  1142. int ret;
  1143. if (sr->flags & IORING_RECVSEND_FIXED_BUF) {
  1144. ret = io_import_fixed(ITER_SOURCE, &kmsg->msg.msg_iter, req->imu,
  1145. (u64)(uintptr_t)sr->buf, sr->len);
  1146. if (unlikely(ret))
  1147. return ret;
  1148. kmsg->msg.sg_from_iter = io_sg_from_iter;
  1149. } else {
  1150. ret = import_ubuf(ITER_SOURCE, sr->buf, sr->len, &kmsg->msg.msg_iter);
  1151. if (unlikely(ret))
  1152. return ret;
  1153. ret = io_notif_account_mem(sr->notif, sr->len);
  1154. if (unlikely(ret))
  1155. return ret;
  1156. kmsg->msg.sg_from_iter = io_sg_from_iter_iovec;
  1157. }
  1158. return ret;
  1159. }
  1160. int io_send_zc(struct io_kiocb *req, unsigned int issue_flags)
  1161. {
  1162. struct io_sr_msg *zc = io_kiocb_to_cmd(req, struct io_sr_msg);
  1163. struct io_async_msghdr *kmsg = req->async_data;
  1164. struct socket *sock;
  1165. unsigned msg_flags;
  1166. int ret, min_ret = 0;
  1167. sock = sock_from_file(req->file);
  1168. if (unlikely(!sock))
  1169. return -ENOTSOCK;
  1170. if (!test_bit(SOCK_SUPPORT_ZC, &sock->flags))
  1171. return -EOPNOTSUPP;
  1172. if (!(req->flags & REQ_F_POLLED) &&
  1173. (zc->flags & IORING_RECVSEND_POLL_FIRST))
  1174. return -EAGAIN;
  1175. if (!zc->done_io) {
  1176. ret = io_send_zc_import(req, kmsg);
  1177. if (unlikely(ret))
  1178. return ret;
  1179. }
  1180. msg_flags = zc->msg_flags;
  1181. if (issue_flags & IO_URING_F_NONBLOCK)
  1182. msg_flags |= MSG_DONTWAIT;
  1183. if (msg_flags & MSG_WAITALL)
  1184. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  1185. msg_flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
  1186. kmsg->msg.msg_flags = msg_flags;
  1187. kmsg->msg.msg_ubuf = &io_notif_to_data(zc->notif)->uarg;
  1188. ret = sock_sendmsg(sock, &kmsg->msg);
  1189. if (unlikely(ret < min_ret)) {
  1190. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  1191. return -EAGAIN;
  1192. if (ret > 0 && io_net_retry(sock, kmsg->msg.msg_flags)) {
  1193. zc->len -= ret;
  1194. zc->buf += ret;
  1195. zc->done_io += ret;
  1196. req->flags |= REQ_F_BL_NO_RECYCLE;
  1197. return -EAGAIN;
  1198. }
  1199. if (ret == -ERESTARTSYS)
  1200. ret = -EINTR;
  1201. req_set_fail(req);
  1202. }
  1203. if (ret >= 0)
  1204. ret += zc->done_io;
  1205. else if (zc->done_io)
  1206. ret = zc->done_io;
  1207. /*
  1208. * If we're in io-wq we can't rely on tw ordering guarantees, defer
  1209. * flushing notif to io_send_zc_cleanup()
  1210. */
  1211. if (!(issue_flags & IO_URING_F_UNLOCKED)) {
  1212. io_notif_flush(zc->notif);
  1213. io_req_msg_cleanup(req, 0);
  1214. }
  1215. io_req_set_res(req, ret, IORING_CQE_F_MORE);
  1216. return IOU_OK;
  1217. }
  1218. int io_sendmsg_zc(struct io_kiocb *req, unsigned int issue_flags)
  1219. {
  1220. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  1221. struct io_async_msghdr *kmsg = req->async_data;
  1222. struct socket *sock;
  1223. unsigned flags;
  1224. int ret, min_ret = 0;
  1225. sock = sock_from_file(req->file);
  1226. if (unlikely(!sock))
  1227. return -ENOTSOCK;
  1228. if (!test_bit(SOCK_SUPPORT_ZC, &sock->flags))
  1229. return -EOPNOTSUPP;
  1230. if (!(req->flags & REQ_F_POLLED) &&
  1231. (sr->flags & IORING_RECVSEND_POLL_FIRST))
  1232. return -EAGAIN;
  1233. flags = sr->msg_flags;
  1234. if (issue_flags & IO_URING_F_NONBLOCK)
  1235. flags |= MSG_DONTWAIT;
  1236. if (flags & MSG_WAITALL)
  1237. min_ret = iov_iter_count(&kmsg->msg.msg_iter);
  1238. kmsg->msg.msg_control_user = sr->msg_control;
  1239. kmsg->msg.msg_ubuf = &io_notif_to_data(sr->notif)->uarg;
  1240. kmsg->msg.sg_from_iter = io_sg_from_iter_iovec;
  1241. ret = __sys_sendmsg_sock(sock, &kmsg->msg, flags);
  1242. if (unlikely(ret < min_ret)) {
  1243. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  1244. return -EAGAIN;
  1245. if (ret > 0 && io_net_retry(sock, flags)) {
  1246. sr->done_io += ret;
  1247. req->flags |= REQ_F_BL_NO_RECYCLE;
  1248. return -EAGAIN;
  1249. }
  1250. if (ret == -ERESTARTSYS)
  1251. ret = -EINTR;
  1252. req_set_fail(req);
  1253. }
  1254. if (ret >= 0)
  1255. ret += sr->done_io;
  1256. else if (sr->done_io)
  1257. ret = sr->done_io;
  1258. /*
  1259. * If we're in io-wq we can't rely on tw ordering guarantees, defer
  1260. * flushing notif to io_send_zc_cleanup()
  1261. */
  1262. if (!(issue_flags & IO_URING_F_UNLOCKED)) {
  1263. io_notif_flush(sr->notif);
  1264. io_req_msg_cleanup(req, 0);
  1265. }
  1266. io_req_set_res(req, ret, IORING_CQE_F_MORE);
  1267. return IOU_OK;
  1268. }
  1269. void io_sendrecv_fail(struct io_kiocb *req)
  1270. {
  1271. struct io_sr_msg *sr = io_kiocb_to_cmd(req, struct io_sr_msg);
  1272. if (sr->done_io)
  1273. req->cqe.res = sr->done_io;
  1274. if ((req->flags & REQ_F_NEED_CLEANUP) &&
  1275. (req->opcode == IORING_OP_SEND_ZC || req->opcode == IORING_OP_SENDMSG_ZC))
  1276. req->cqe.flags |= IORING_CQE_F_MORE;
  1277. }
  1278. #define ACCEPT_FLAGS (IORING_ACCEPT_MULTISHOT | IORING_ACCEPT_DONTWAIT | \
  1279. IORING_ACCEPT_POLL_FIRST)
  1280. int io_accept_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1281. {
  1282. struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept);
  1283. if (sqe->len || sqe->buf_index)
  1284. return -EINVAL;
  1285. accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1286. accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
  1287. accept->flags = READ_ONCE(sqe->accept_flags);
  1288. accept->nofile = rlimit(RLIMIT_NOFILE);
  1289. accept->iou_flags = READ_ONCE(sqe->ioprio);
  1290. if (accept->iou_flags & ~ACCEPT_FLAGS)
  1291. return -EINVAL;
  1292. accept->file_slot = READ_ONCE(sqe->file_index);
  1293. if (accept->file_slot) {
  1294. if (accept->flags & SOCK_CLOEXEC)
  1295. return -EINVAL;
  1296. if (accept->iou_flags & IORING_ACCEPT_MULTISHOT &&
  1297. accept->file_slot != IORING_FILE_INDEX_ALLOC)
  1298. return -EINVAL;
  1299. }
  1300. if (accept->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
  1301. return -EINVAL;
  1302. if (SOCK_NONBLOCK != O_NONBLOCK && (accept->flags & SOCK_NONBLOCK))
  1303. accept->flags = (accept->flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
  1304. if (accept->iou_flags & IORING_ACCEPT_MULTISHOT)
  1305. req->flags |= REQ_F_APOLL_MULTISHOT;
  1306. if (accept->iou_flags & IORING_ACCEPT_DONTWAIT)
  1307. req->flags |= REQ_F_NOWAIT;
  1308. return 0;
  1309. }
  1310. int io_accept(struct io_kiocb *req, unsigned int issue_flags)
  1311. {
  1312. struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept);
  1313. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  1314. bool fixed = !!accept->file_slot;
  1315. struct proto_accept_arg arg = {
  1316. .flags = force_nonblock ? O_NONBLOCK : 0,
  1317. };
  1318. struct file *file;
  1319. unsigned cflags;
  1320. int ret, fd;
  1321. if (!(req->flags & REQ_F_POLLED) &&
  1322. accept->iou_flags & IORING_ACCEPT_POLL_FIRST)
  1323. return -EAGAIN;
  1324. retry:
  1325. if (!fixed) {
  1326. fd = __get_unused_fd_flags(accept->flags, accept->nofile);
  1327. if (unlikely(fd < 0))
  1328. return fd;
  1329. }
  1330. arg.err = 0;
  1331. arg.is_empty = -1;
  1332. file = do_accept(req->file, &arg, accept->addr, accept->addr_len,
  1333. accept->flags);
  1334. if (IS_ERR(file)) {
  1335. if (!fixed)
  1336. put_unused_fd(fd);
  1337. ret = PTR_ERR(file);
  1338. if (ret == -EAGAIN && force_nonblock &&
  1339. !(accept->iou_flags & IORING_ACCEPT_DONTWAIT)) {
  1340. /*
  1341. * if it's multishot and polled, we don't need to
  1342. * return EAGAIN to arm the poll infra since it
  1343. * has already been done
  1344. */
  1345. if (issue_flags & IO_URING_F_MULTISHOT)
  1346. return IOU_ISSUE_SKIP_COMPLETE;
  1347. return ret;
  1348. }
  1349. if (ret == -ERESTARTSYS)
  1350. ret = -EINTR;
  1351. req_set_fail(req);
  1352. } else if (!fixed) {
  1353. fd_install(fd, file);
  1354. ret = fd;
  1355. } else {
  1356. ret = io_fixed_fd_install(req, issue_flags, file,
  1357. accept->file_slot);
  1358. }
  1359. cflags = 0;
  1360. if (!arg.is_empty)
  1361. cflags |= IORING_CQE_F_SOCK_NONEMPTY;
  1362. if (!(req->flags & REQ_F_APOLL_MULTISHOT)) {
  1363. io_req_set_res(req, ret, cflags);
  1364. return IOU_OK;
  1365. }
  1366. if (ret < 0)
  1367. return ret;
  1368. if (io_req_post_cqe(req, ret, cflags | IORING_CQE_F_MORE)) {
  1369. if (cflags & IORING_CQE_F_SOCK_NONEMPTY || arg.is_empty == -1)
  1370. goto retry;
  1371. if (issue_flags & IO_URING_F_MULTISHOT)
  1372. return IOU_ISSUE_SKIP_COMPLETE;
  1373. return -EAGAIN;
  1374. }
  1375. io_req_set_res(req, ret, cflags);
  1376. return IOU_STOP_MULTISHOT;
  1377. }
  1378. int io_socket_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1379. {
  1380. struct io_socket *sock = io_kiocb_to_cmd(req, struct io_socket);
  1381. if (sqe->addr || sqe->rw_flags || sqe->buf_index)
  1382. return -EINVAL;
  1383. sock->domain = READ_ONCE(sqe->fd);
  1384. sock->type = READ_ONCE(sqe->off);
  1385. sock->protocol = READ_ONCE(sqe->len);
  1386. sock->file_slot = READ_ONCE(sqe->file_index);
  1387. sock->nofile = rlimit(RLIMIT_NOFILE);
  1388. sock->flags = sock->type & ~SOCK_TYPE_MASK;
  1389. if (sock->file_slot && (sock->flags & SOCK_CLOEXEC))
  1390. return -EINVAL;
  1391. if (sock->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
  1392. return -EINVAL;
  1393. return 0;
  1394. }
  1395. int io_socket(struct io_kiocb *req, unsigned int issue_flags)
  1396. {
  1397. struct io_socket *sock = io_kiocb_to_cmd(req, struct io_socket);
  1398. bool fixed = !!sock->file_slot;
  1399. struct file *file;
  1400. int ret, fd;
  1401. if (!fixed) {
  1402. fd = __get_unused_fd_flags(sock->flags, sock->nofile);
  1403. if (unlikely(fd < 0))
  1404. return fd;
  1405. }
  1406. file = __sys_socket_file(sock->domain, sock->type, sock->protocol);
  1407. if (IS_ERR(file)) {
  1408. if (!fixed)
  1409. put_unused_fd(fd);
  1410. ret = PTR_ERR(file);
  1411. if (ret == -EAGAIN && (issue_flags & IO_URING_F_NONBLOCK))
  1412. return -EAGAIN;
  1413. if (ret == -ERESTARTSYS)
  1414. ret = -EINTR;
  1415. req_set_fail(req);
  1416. } else if (!fixed) {
  1417. fd_install(fd, file);
  1418. ret = fd;
  1419. } else {
  1420. ret = io_fixed_fd_install(req, issue_flags, file,
  1421. sock->file_slot);
  1422. }
  1423. io_req_set_res(req, ret, 0);
  1424. return IOU_OK;
  1425. }
  1426. int io_connect_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1427. {
  1428. struct io_connect *conn = io_kiocb_to_cmd(req, struct io_connect);
  1429. struct io_async_msghdr *io;
  1430. if (sqe->len || sqe->buf_index || sqe->rw_flags || sqe->splice_fd_in)
  1431. return -EINVAL;
  1432. conn->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1433. conn->addr_len = READ_ONCE(sqe->addr2);
  1434. conn->in_progress = conn->seen_econnaborted = false;
  1435. io = io_msg_alloc_async(req);
  1436. if (unlikely(!io))
  1437. return -ENOMEM;
  1438. return move_addr_to_kernel(conn->addr, conn->addr_len, &io->addr);
  1439. }
  1440. int io_connect(struct io_kiocb *req, unsigned int issue_flags)
  1441. {
  1442. struct io_connect *connect = io_kiocb_to_cmd(req, struct io_connect);
  1443. struct io_async_msghdr *io = req->async_data;
  1444. unsigned file_flags;
  1445. int ret;
  1446. bool force_nonblock = issue_flags & IO_URING_F_NONBLOCK;
  1447. if (unlikely(req->flags & REQ_F_FAIL)) {
  1448. ret = -ECONNRESET;
  1449. goto out;
  1450. }
  1451. file_flags = force_nonblock ? O_NONBLOCK : 0;
  1452. ret = __sys_connect_file(req->file, &io->addr, connect->addr_len,
  1453. file_flags);
  1454. if ((ret == -EAGAIN || ret == -EINPROGRESS || ret == -ECONNABORTED)
  1455. && force_nonblock) {
  1456. if (ret == -EINPROGRESS) {
  1457. connect->in_progress = true;
  1458. } else if (ret == -ECONNABORTED) {
  1459. if (connect->seen_econnaborted)
  1460. goto out;
  1461. connect->seen_econnaborted = true;
  1462. }
  1463. return -EAGAIN;
  1464. }
  1465. if (connect->in_progress) {
  1466. /*
  1467. * At least bluetooth will return -EBADFD on a re-connect
  1468. * attempt, and it's (supposedly) also valid to get -EISCONN
  1469. * which means the previous result is good. For both of these,
  1470. * grab the sock_error() and use that for the completion.
  1471. */
  1472. if (ret == -EBADFD || ret == -EISCONN)
  1473. ret = sock_error(sock_from_file(req->file)->sk);
  1474. }
  1475. if (ret == -ERESTARTSYS)
  1476. ret = -EINTR;
  1477. out:
  1478. if (ret < 0)
  1479. req_set_fail(req);
  1480. io_req_msg_cleanup(req, issue_flags);
  1481. io_req_set_res(req, ret, 0);
  1482. return IOU_OK;
  1483. }
  1484. int io_bind_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1485. {
  1486. struct io_bind *bind = io_kiocb_to_cmd(req, struct io_bind);
  1487. struct sockaddr __user *uaddr;
  1488. struct io_async_msghdr *io;
  1489. if (sqe->len || sqe->buf_index || sqe->rw_flags || sqe->splice_fd_in)
  1490. return -EINVAL;
  1491. uaddr = u64_to_user_ptr(READ_ONCE(sqe->addr));
  1492. bind->addr_len = READ_ONCE(sqe->addr2);
  1493. io = io_msg_alloc_async(req);
  1494. if (unlikely(!io))
  1495. return -ENOMEM;
  1496. return move_addr_to_kernel(uaddr, bind->addr_len, &io->addr);
  1497. }
  1498. int io_bind(struct io_kiocb *req, unsigned int issue_flags)
  1499. {
  1500. struct io_bind *bind = io_kiocb_to_cmd(req, struct io_bind);
  1501. struct io_async_msghdr *io = req->async_data;
  1502. struct socket *sock;
  1503. int ret;
  1504. sock = sock_from_file(req->file);
  1505. if (unlikely(!sock))
  1506. return -ENOTSOCK;
  1507. ret = __sys_bind_socket(sock, &io->addr, bind->addr_len);
  1508. if (ret < 0)
  1509. req_set_fail(req);
  1510. io_req_set_res(req, ret, 0);
  1511. return 0;
  1512. }
  1513. int io_listen_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
  1514. {
  1515. struct io_listen *listen = io_kiocb_to_cmd(req, struct io_listen);
  1516. if (sqe->addr || sqe->buf_index || sqe->rw_flags || sqe->splice_fd_in || sqe->addr2)
  1517. return -EINVAL;
  1518. listen->backlog = READ_ONCE(sqe->len);
  1519. return 0;
  1520. }
  1521. int io_listen(struct io_kiocb *req, unsigned int issue_flags)
  1522. {
  1523. struct io_listen *listen = io_kiocb_to_cmd(req, struct io_listen);
  1524. struct socket *sock;
  1525. int ret;
  1526. sock = sock_from_file(req->file);
  1527. if (unlikely(!sock))
  1528. return -ENOTSOCK;
  1529. ret = __sys_listen_socket(sock, listen->backlog);
  1530. if (ret < 0)
  1531. req_set_fail(req);
  1532. io_req_set_res(req, ret, 0);
  1533. return 0;
  1534. }
  1535. void io_netmsg_cache_free(const void *entry)
  1536. {
  1537. struct io_async_msghdr *kmsg = (struct io_async_msghdr *) entry;
  1538. if (kmsg->free_iov) {
  1539. kasan_mempool_unpoison_object(kmsg->free_iov,
  1540. kmsg->free_iov_nr * sizeof(struct iovec));
  1541. io_netmsg_iovec_free(kmsg);
  1542. }
  1543. kfree(kmsg);
  1544. }
  1545. #endif