xref: /linux/io_uring/rsrc.c (revision 41e0d49104dbff888ef6446ea46842fde66c0a76)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <linux/kernel.h>
3 #include <linux/errno.h>
4 #include <linux/fs.h>
5 #include <linux/file.h>
6 #include <linux/mm.h>
7 #include <linux/slab.h>
8 #include <linux/nospec.h>
9 #include <linux/hugetlb.h>
10 #include <linux/compat.h>
11 #include <linux/io_uring.h>
12 
13 #include <uapi/linux/io_uring.h>
14 
15 #include "io_uring.h"
16 #include "openclose.h"
17 #include "rsrc.h"
18 
19 struct io_rsrc_update {
20 	struct file			*file;
21 	u64				arg;
22 	u32				nr_args;
23 	u32				offset;
24 };
25 
26 static int io_sqe_buffer_register(struct io_ring_ctx *ctx, struct iovec *iov,
27 				  struct io_mapped_ubuf **pimu,
28 				  struct page **last_hpage);
29 
30 #define IO_RSRC_REF_BATCH	100
31 
32 /* only define max */
33 #define IORING_MAX_FIXED_FILES	(1U << 20)
34 #define IORING_MAX_REG_BUFFERS	(1U << 14)
35 
36 void io_rsrc_refs_drop(struct io_ring_ctx *ctx)
37 	__must_hold(&ctx->uring_lock)
38 {
39 	if (ctx->rsrc_cached_refs) {
40 		io_rsrc_put_node(ctx->rsrc_node, ctx->rsrc_cached_refs);
41 		ctx->rsrc_cached_refs = 0;
42 	}
43 }
44 
45 int __io_account_mem(struct user_struct *user, unsigned long nr_pages)
46 {
47 	unsigned long page_limit, cur_pages, new_pages;
48 
49 	if (!nr_pages)
50 		return 0;
51 
52 	/* Don't allow more pages than we can safely lock */
53 	page_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
54 
55 	cur_pages = atomic_long_read(&user->locked_vm);
56 	do {
57 		new_pages = cur_pages + nr_pages;
58 		if (new_pages > page_limit)
59 			return -ENOMEM;
60 	} while (!atomic_long_try_cmpxchg(&user->locked_vm,
61 					  &cur_pages, new_pages));
62 	return 0;
63 }
64 
65 static void io_unaccount_mem(struct io_ring_ctx *ctx, unsigned long nr_pages)
66 {
67 	if (ctx->user)
68 		__io_unaccount_mem(ctx->user, nr_pages);
69 
70 	if (ctx->mm_account)
71 		atomic64_sub(nr_pages, &ctx->mm_account->pinned_vm);
72 }
73 
74 static int io_account_mem(struct io_ring_ctx *ctx, unsigned long nr_pages)
75 {
76 	int ret;
77 
78 	if (ctx->user) {
79 		ret = __io_account_mem(ctx->user, nr_pages);
80 		if (ret)
81 			return ret;
82 	}
83 
84 	if (ctx->mm_account)
85 		atomic64_add(nr_pages, &ctx->mm_account->pinned_vm);
86 
87 	return 0;
88 }
89 
90 static int io_copy_iov(struct io_ring_ctx *ctx, struct iovec *dst,
91 		       void __user *arg, unsigned index)
92 {
93 	struct iovec __user *src;
94 
95 #ifdef CONFIG_COMPAT
96 	if (ctx->compat) {
97 		struct compat_iovec __user *ciovs;
98 		struct compat_iovec ciov;
99 
100 		ciovs = (struct compat_iovec __user *) arg;
101 		if (copy_from_user(&ciov, &ciovs[index], sizeof(ciov)))
102 			return -EFAULT;
103 
104 		dst->iov_base = u64_to_user_ptr((u64)ciov.iov_base);
105 		dst->iov_len = ciov.iov_len;
106 		return 0;
107 	}
108 #endif
109 	src = (struct iovec __user *) arg;
110 	if (copy_from_user(dst, &src[index], sizeof(*dst)))
111 		return -EFAULT;
112 	return 0;
113 }
114 
115 static int io_buffer_validate(struct iovec *iov)
116 {
117 	unsigned long tmp, acct_len = iov->iov_len + (PAGE_SIZE - 1);
118 
119 	/*
120 	 * Don't impose further limits on the size and buffer
121 	 * constraints here, we'll -EINVAL later when IO is
122 	 * submitted if they are wrong.
123 	 */
124 	if (!iov->iov_base)
125 		return iov->iov_len ? -EFAULT : 0;
126 	if (!iov->iov_len)
127 		return -EFAULT;
128 
129 	/* arbitrary limit, but we need something */
130 	if (iov->iov_len > SZ_1G)
131 		return -EFAULT;
132 
133 	if (check_add_overflow((unsigned long)iov->iov_base, acct_len, &tmp))
134 		return -EOVERFLOW;
135 
136 	return 0;
137 }
138 
139 static void io_buffer_unmap(struct io_ring_ctx *ctx, struct io_mapped_ubuf **slot)
140 {
141 	struct io_mapped_ubuf *imu = *slot;
142 	unsigned int i;
143 
144 	if (imu != ctx->dummy_ubuf) {
145 		for (i = 0; i < imu->nr_bvecs; i++)
146 			unpin_user_page(imu->bvec[i].bv_page);
147 		if (imu->acct_pages)
148 			io_unaccount_mem(ctx, imu->acct_pages);
149 		kvfree(imu);
150 	}
151 	*slot = NULL;
152 }
153 
154 void io_rsrc_refs_refill(struct io_ring_ctx *ctx)
155 	__must_hold(&ctx->uring_lock)
156 {
157 	ctx->rsrc_cached_refs += IO_RSRC_REF_BATCH;
158 	percpu_ref_get_many(&ctx->rsrc_node->refs, IO_RSRC_REF_BATCH);
159 }
160 
161 static void __io_rsrc_put_work(struct io_rsrc_node *ref_node)
162 {
163 	struct io_rsrc_data *rsrc_data = ref_node->rsrc_data;
164 	struct io_ring_ctx *ctx = rsrc_data->ctx;
165 	struct io_rsrc_put *prsrc, *tmp;
166 
167 	list_for_each_entry_safe(prsrc, tmp, &ref_node->rsrc_list, list) {
168 		list_del(&prsrc->list);
169 
170 		if (prsrc->tag) {
171 			if (ctx->flags & IORING_SETUP_IOPOLL) {
172 				mutex_lock(&ctx->uring_lock);
173 				io_post_aux_cqe(ctx, prsrc->tag, 0, 0);
174 				mutex_unlock(&ctx->uring_lock);
175 			} else {
176 				io_post_aux_cqe(ctx, prsrc->tag, 0, 0);
177 			}
178 		}
179 
180 		rsrc_data->do_put(ctx, prsrc);
181 		kfree(prsrc);
182 	}
183 
184 	io_rsrc_node_destroy(ref_node);
185 	if (atomic_dec_and_test(&rsrc_data->refs))
186 		complete(&rsrc_data->done);
187 }
188 
189 void io_rsrc_put_work(struct work_struct *work)
190 {
191 	struct io_ring_ctx *ctx;
192 	struct llist_node *node;
193 
194 	ctx = container_of(work, struct io_ring_ctx, rsrc_put_work.work);
195 	node = llist_del_all(&ctx->rsrc_put_llist);
196 
197 	while (node) {
198 		struct io_rsrc_node *ref_node;
199 		struct llist_node *next = node->next;
200 
201 		ref_node = llist_entry(node, struct io_rsrc_node, llist);
202 		__io_rsrc_put_work(ref_node);
203 		node = next;
204 	}
205 }
206 
207 void io_rsrc_put_tw(struct callback_head *cb)
208 {
209 	struct io_ring_ctx *ctx = container_of(cb, struct io_ring_ctx,
210 					       rsrc_put_tw);
211 
212 	io_rsrc_put_work(&ctx->rsrc_put_work.work);
213 }
214 
215 void io_wait_rsrc_data(struct io_rsrc_data *data)
216 {
217 	if (data && !atomic_dec_and_test(&data->refs))
218 		wait_for_completion(&data->done);
219 }
220 
221 void io_rsrc_node_destroy(struct io_rsrc_node *ref_node)
222 {
223 	percpu_ref_exit(&ref_node->refs);
224 	kfree(ref_node);
225 }
226 
227 static __cold void io_rsrc_node_ref_zero(struct percpu_ref *ref)
228 {
229 	struct io_rsrc_node *node = container_of(ref, struct io_rsrc_node, refs);
230 	struct io_ring_ctx *ctx = node->rsrc_data->ctx;
231 	unsigned long flags;
232 	bool first_add = false;
233 	unsigned long delay = HZ;
234 
235 	spin_lock_irqsave(&ctx->rsrc_ref_lock, flags);
236 	node->done = true;
237 
238 	/* if we are mid-quiesce then do not delay */
239 	if (node->rsrc_data->quiesce)
240 		delay = 0;
241 
242 	while (!list_empty(&ctx->rsrc_ref_list)) {
243 		node = list_first_entry(&ctx->rsrc_ref_list,
244 					    struct io_rsrc_node, node);
245 		/* recycle ref nodes in order */
246 		if (!node->done)
247 			break;
248 		list_del(&node->node);
249 		first_add |= llist_add(&node->llist, &ctx->rsrc_put_llist);
250 	}
251 	spin_unlock_irqrestore(&ctx->rsrc_ref_lock, flags);
252 
253 	if (!first_add)
254 		return;
255 
256 	if (ctx->submitter_task) {
257 		if (!task_work_add(ctx->submitter_task, &ctx->rsrc_put_tw,
258 				   ctx->notify_method))
259 			return;
260 	}
261 	mod_delayed_work(system_wq, &ctx->rsrc_put_work, delay);
262 }
263 
264 static struct io_rsrc_node *io_rsrc_node_alloc(void)
265 {
266 	struct io_rsrc_node *ref_node;
267 
268 	ref_node = kzalloc(sizeof(*ref_node), GFP_KERNEL);
269 	if (!ref_node)
270 		return NULL;
271 
272 	if (percpu_ref_init(&ref_node->refs, io_rsrc_node_ref_zero,
273 			    0, GFP_KERNEL)) {
274 		kfree(ref_node);
275 		return NULL;
276 	}
277 	INIT_LIST_HEAD(&ref_node->node);
278 	INIT_LIST_HEAD(&ref_node->rsrc_list);
279 	ref_node->done = false;
280 	return ref_node;
281 }
282 
283 void io_rsrc_node_switch(struct io_ring_ctx *ctx,
284 			 struct io_rsrc_data *data_to_kill)
285 	__must_hold(&ctx->uring_lock)
286 {
287 	WARN_ON_ONCE(!ctx->rsrc_backup_node);
288 	WARN_ON_ONCE(data_to_kill && !ctx->rsrc_node);
289 
290 	io_rsrc_refs_drop(ctx);
291 
292 	if (data_to_kill) {
293 		struct io_rsrc_node *rsrc_node = ctx->rsrc_node;
294 
295 		rsrc_node->rsrc_data = data_to_kill;
296 		spin_lock_irq(&ctx->rsrc_ref_lock);
297 		list_add_tail(&rsrc_node->node, &ctx->rsrc_ref_list);
298 		spin_unlock_irq(&ctx->rsrc_ref_lock);
299 
300 		atomic_inc(&data_to_kill->refs);
301 		percpu_ref_kill(&rsrc_node->refs);
302 		ctx->rsrc_node = NULL;
303 	}
304 
305 	if (!ctx->rsrc_node) {
306 		ctx->rsrc_node = ctx->rsrc_backup_node;
307 		ctx->rsrc_backup_node = NULL;
308 	}
309 }
310 
311 int io_rsrc_node_switch_start(struct io_ring_ctx *ctx)
312 {
313 	if (ctx->rsrc_backup_node)
314 		return 0;
315 	ctx->rsrc_backup_node = io_rsrc_node_alloc();
316 	return ctx->rsrc_backup_node ? 0 : -ENOMEM;
317 }
318 
319 __cold static int io_rsrc_ref_quiesce(struct io_rsrc_data *data,
320 				      struct io_ring_ctx *ctx)
321 {
322 	int ret;
323 
324 	/* As we may drop ->uring_lock, other task may have started quiesce */
325 	if (data->quiesce)
326 		return -ENXIO;
327 	ret = io_rsrc_node_switch_start(ctx);
328 	if (ret)
329 		return ret;
330 	io_rsrc_node_switch(ctx, data);
331 
332 	/* kill initial ref, already quiesced if zero */
333 	if (atomic_dec_and_test(&data->refs))
334 		return 0;
335 
336 	data->quiesce = true;
337 	mutex_unlock(&ctx->uring_lock);
338 	do {
339 		ret = io_run_task_work_sig(ctx);
340 		if (ret < 0) {
341 			atomic_inc(&data->refs);
342 			/* wait for all works potentially completing data->done */
343 			flush_delayed_work(&ctx->rsrc_put_work);
344 			reinit_completion(&data->done);
345 			mutex_lock(&ctx->uring_lock);
346 			break;
347 		}
348 
349 		flush_delayed_work(&ctx->rsrc_put_work);
350 		ret = wait_for_completion_interruptible(&data->done);
351 		if (!ret) {
352 			mutex_lock(&ctx->uring_lock);
353 			if (atomic_read(&data->refs) <= 0)
354 				break;
355 			/*
356 			 * it has been revived by another thread while
357 			 * we were unlocked
358 			 */
359 			mutex_unlock(&ctx->uring_lock);
360 		}
361 	} while (1);
362 	data->quiesce = false;
363 
364 	return ret;
365 }
366 
367 static void io_free_page_table(void **table, size_t size)
368 {
369 	unsigned i, nr_tables = DIV_ROUND_UP(size, PAGE_SIZE);
370 
371 	for (i = 0; i < nr_tables; i++)
372 		kfree(table[i]);
373 	kfree(table);
374 }
375 
376 static void io_rsrc_data_free(struct io_rsrc_data *data)
377 {
378 	size_t size = data->nr * sizeof(data->tags[0][0]);
379 
380 	if (data->tags)
381 		io_free_page_table((void **)data->tags, size);
382 	kfree(data);
383 }
384 
385 static __cold void **io_alloc_page_table(size_t size)
386 {
387 	unsigned i, nr_tables = DIV_ROUND_UP(size, PAGE_SIZE);
388 	size_t init_size = size;
389 	void **table;
390 
391 	table = kcalloc(nr_tables, sizeof(*table), GFP_KERNEL_ACCOUNT);
392 	if (!table)
393 		return NULL;
394 
395 	for (i = 0; i < nr_tables; i++) {
396 		unsigned int this_size = min_t(size_t, size, PAGE_SIZE);
397 
398 		table[i] = kzalloc(this_size, GFP_KERNEL_ACCOUNT);
399 		if (!table[i]) {
400 			io_free_page_table(table, init_size);
401 			return NULL;
402 		}
403 		size -= this_size;
404 	}
405 	return table;
406 }
407 
408 __cold static int io_rsrc_data_alloc(struct io_ring_ctx *ctx,
409 				     rsrc_put_fn *do_put, u64 __user *utags,
410 				     unsigned nr, struct io_rsrc_data **pdata)
411 {
412 	struct io_rsrc_data *data;
413 	int ret = -ENOMEM;
414 	unsigned i;
415 
416 	data = kzalloc(sizeof(*data), GFP_KERNEL);
417 	if (!data)
418 		return -ENOMEM;
419 	data->tags = (u64 **)io_alloc_page_table(nr * sizeof(data->tags[0][0]));
420 	if (!data->tags) {
421 		kfree(data);
422 		return -ENOMEM;
423 	}
424 
425 	data->nr = nr;
426 	data->ctx = ctx;
427 	data->do_put = do_put;
428 	if (utags) {
429 		ret = -EFAULT;
430 		for (i = 0; i < nr; i++) {
431 			u64 *tag_slot = io_get_tag_slot(data, i);
432 
433 			if (copy_from_user(tag_slot, &utags[i],
434 					   sizeof(*tag_slot)))
435 				goto fail;
436 		}
437 	}
438 
439 	atomic_set(&data->refs, 1);
440 	init_completion(&data->done);
441 	*pdata = data;
442 	return 0;
443 fail:
444 	io_rsrc_data_free(data);
445 	return ret;
446 }
447 
448 static int __io_sqe_files_update(struct io_ring_ctx *ctx,
449 				 struct io_uring_rsrc_update2 *up,
450 				 unsigned nr_args)
451 {
452 	u64 __user *tags = u64_to_user_ptr(up->tags);
453 	__s32 __user *fds = u64_to_user_ptr(up->data);
454 	struct io_rsrc_data *data = ctx->file_data;
455 	struct io_fixed_file *file_slot;
456 	struct file *file;
457 	int fd, i, err = 0;
458 	unsigned int done;
459 	bool needs_switch = false;
460 
461 	if (!ctx->file_data)
462 		return -ENXIO;
463 	if (up->offset + nr_args > ctx->nr_user_files)
464 		return -EINVAL;
465 
466 	for (done = 0; done < nr_args; done++) {
467 		u64 tag = 0;
468 
469 		if ((tags && copy_from_user(&tag, &tags[done], sizeof(tag))) ||
470 		    copy_from_user(&fd, &fds[done], sizeof(fd))) {
471 			err = -EFAULT;
472 			break;
473 		}
474 		if ((fd == IORING_REGISTER_FILES_SKIP || fd == -1) && tag) {
475 			err = -EINVAL;
476 			break;
477 		}
478 		if (fd == IORING_REGISTER_FILES_SKIP)
479 			continue;
480 
481 		i = array_index_nospec(up->offset + done, ctx->nr_user_files);
482 		file_slot = io_fixed_file_slot(&ctx->file_table, i);
483 
484 		if (file_slot->file_ptr) {
485 			file = (struct file *)(file_slot->file_ptr & FFS_MASK);
486 			err = io_queue_rsrc_removal(data, i, ctx->rsrc_node, file);
487 			if (err)
488 				break;
489 			file_slot->file_ptr = 0;
490 			io_file_bitmap_clear(&ctx->file_table, i);
491 			needs_switch = true;
492 		}
493 		if (fd != -1) {
494 			file = fget(fd);
495 			if (!file) {
496 				err = -EBADF;
497 				break;
498 			}
499 			/*
500 			 * Don't allow io_uring instances to be registered. If
501 			 * UNIX isn't enabled, then this causes a reference
502 			 * cycle and this instance can never get freed. If UNIX
503 			 * is enabled we'll handle it just fine, but there's
504 			 * still no point in allowing a ring fd as it doesn't
505 			 * support regular read/write anyway.
506 			 */
507 			if (io_is_uring_fops(file)) {
508 				fput(file);
509 				err = -EBADF;
510 				break;
511 			}
512 			err = io_scm_file_account(ctx, file);
513 			if (err) {
514 				fput(file);
515 				break;
516 			}
517 			*io_get_tag_slot(data, i) = tag;
518 			io_fixed_file_set(file_slot, file);
519 			io_file_bitmap_set(&ctx->file_table, i);
520 		}
521 	}
522 
523 	if (needs_switch)
524 		io_rsrc_node_switch(ctx, data);
525 	return done ? done : err;
526 }
527 
528 static int __io_sqe_buffers_update(struct io_ring_ctx *ctx,
529 				   struct io_uring_rsrc_update2 *up,
530 				   unsigned int nr_args)
531 {
532 	u64 __user *tags = u64_to_user_ptr(up->tags);
533 	struct iovec iov, __user *iovs = u64_to_user_ptr(up->data);
534 	struct page *last_hpage = NULL;
535 	bool needs_switch = false;
536 	__u32 done;
537 	int i, err;
538 
539 	if (!ctx->buf_data)
540 		return -ENXIO;
541 	if (up->offset + nr_args > ctx->nr_user_bufs)
542 		return -EINVAL;
543 
544 	for (done = 0; done < nr_args; done++) {
545 		struct io_mapped_ubuf *imu;
546 		int offset = up->offset + done;
547 		u64 tag = 0;
548 
549 		err = io_copy_iov(ctx, &iov, iovs, done);
550 		if (err)
551 			break;
552 		if (tags && copy_from_user(&tag, &tags[done], sizeof(tag))) {
553 			err = -EFAULT;
554 			break;
555 		}
556 		err = io_buffer_validate(&iov);
557 		if (err)
558 			break;
559 		if (!iov.iov_base && tag) {
560 			err = -EINVAL;
561 			break;
562 		}
563 		err = io_sqe_buffer_register(ctx, &iov, &imu, &last_hpage);
564 		if (err)
565 			break;
566 
567 		i = array_index_nospec(offset, ctx->nr_user_bufs);
568 		if (ctx->user_bufs[i] != ctx->dummy_ubuf) {
569 			err = io_queue_rsrc_removal(ctx->buf_data, i,
570 						    ctx->rsrc_node, ctx->user_bufs[i]);
571 			if (unlikely(err)) {
572 				io_buffer_unmap(ctx, &imu);
573 				break;
574 			}
575 			ctx->user_bufs[i] = ctx->dummy_ubuf;
576 			needs_switch = true;
577 		}
578 
579 		ctx->user_bufs[i] = imu;
580 		*io_get_tag_slot(ctx->buf_data, offset) = tag;
581 	}
582 
583 	if (needs_switch)
584 		io_rsrc_node_switch(ctx, ctx->buf_data);
585 	return done ? done : err;
586 }
587 
588 static int __io_register_rsrc_update(struct io_ring_ctx *ctx, unsigned type,
589 				     struct io_uring_rsrc_update2 *up,
590 				     unsigned nr_args)
591 {
592 	__u32 tmp;
593 	int err;
594 
595 	if (check_add_overflow(up->offset, nr_args, &tmp))
596 		return -EOVERFLOW;
597 	err = io_rsrc_node_switch_start(ctx);
598 	if (err)
599 		return err;
600 
601 	switch (type) {
602 	case IORING_RSRC_FILE:
603 		return __io_sqe_files_update(ctx, up, nr_args);
604 	case IORING_RSRC_BUFFER:
605 		return __io_sqe_buffers_update(ctx, up, nr_args);
606 	}
607 	return -EINVAL;
608 }
609 
610 int io_register_files_update(struct io_ring_ctx *ctx, void __user *arg,
611 			     unsigned nr_args)
612 {
613 	struct io_uring_rsrc_update2 up;
614 
615 	if (!nr_args)
616 		return -EINVAL;
617 	memset(&up, 0, sizeof(up));
618 	if (copy_from_user(&up, arg, sizeof(struct io_uring_rsrc_update)))
619 		return -EFAULT;
620 	if (up.resv || up.resv2)
621 		return -EINVAL;
622 	return __io_register_rsrc_update(ctx, IORING_RSRC_FILE, &up, nr_args);
623 }
624 
625 int io_register_rsrc_update(struct io_ring_ctx *ctx, void __user *arg,
626 			    unsigned size, unsigned type)
627 {
628 	struct io_uring_rsrc_update2 up;
629 
630 	if (size != sizeof(up))
631 		return -EINVAL;
632 	if (copy_from_user(&up, arg, sizeof(up)))
633 		return -EFAULT;
634 	if (!up.nr || up.resv || up.resv2)
635 		return -EINVAL;
636 	return __io_register_rsrc_update(ctx, type, &up, up.nr);
637 }
638 
639 __cold int io_register_rsrc(struct io_ring_ctx *ctx, void __user *arg,
640 			    unsigned int size, unsigned int type)
641 {
642 	struct io_uring_rsrc_register rr;
643 
644 	/* keep it extendible */
645 	if (size != sizeof(rr))
646 		return -EINVAL;
647 
648 	memset(&rr, 0, sizeof(rr));
649 	if (copy_from_user(&rr, arg, size))
650 		return -EFAULT;
651 	if (!rr.nr || rr.resv2)
652 		return -EINVAL;
653 	if (rr.flags & ~IORING_RSRC_REGISTER_SPARSE)
654 		return -EINVAL;
655 
656 	switch (type) {
657 	case IORING_RSRC_FILE:
658 		if (rr.flags & IORING_RSRC_REGISTER_SPARSE && rr.data)
659 			break;
660 		return io_sqe_files_register(ctx, u64_to_user_ptr(rr.data),
661 					     rr.nr, u64_to_user_ptr(rr.tags));
662 	case IORING_RSRC_BUFFER:
663 		if (rr.flags & IORING_RSRC_REGISTER_SPARSE && rr.data)
664 			break;
665 		return io_sqe_buffers_register(ctx, u64_to_user_ptr(rr.data),
666 					       rr.nr, u64_to_user_ptr(rr.tags));
667 	}
668 	return -EINVAL;
669 }
670 
671 int io_files_update_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe)
672 {
673 	struct io_rsrc_update *up = io_kiocb_to_cmd(req, struct io_rsrc_update);
674 
675 	if (unlikely(req->flags & (REQ_F_FIXED_FILE | REQ_F_BUFFER_SELECT)))
676 		return -EINVAL;
677 	if (sqe->rw_flags || sqe->splice_fd_in)
678 		return -EINVAL;
679 
680 	up->offset = READ_ONCE(sqe->off);
681 	up->nr_args = READ_ONCE(sqe->len);
682 	if (!up->nr_args)
683 		return -EINVAL;
684 	up->arg = READ_ONCE(sqe->addr);
685 	return 0;
686 }
687 
688 static int io_files_update_with_index_alloc(struct io_kiocb *req,
689 					    unsigned int issue_flags)
690 {
691 	struct io_rsrc_update *up = io_kiocb_to_cmd(req, struct io_rsrc_update);
692 	__s32 __user *fds = u64_to_user_ptr(up->arg);
693 	unsigned int done;
694 	struct file *file;
695 	int ret, fd;
696 
697 	if (!req->ctx->file_data)
698 		return -ENXIO;
699 
700 	for (done = 0; done < up->nr_args; done++) {
701 		if (copy_from_user(&fd, &fds[done], sizeof(fd))) {
702 			ret = -EFAULT;
703 			break;
704 		}
705 
706 		file = fget(fd);
707 		if (!file) {
708 			ret = -EBADF;
709 			break;
710 		}
711 		ret = io_fixed_fd_install(req, issue_flags, file,
712 					  IORING_FILE_INDEX_ALLOC);
713 		if (ret < 0)
714 			break;
715 		if (copy_to_user(&fds[done], &ret, sizeof(ret))) {
716 			__io_close_fixed(req->ctx, issue_flags, ret);
717 			ret = -EFAULT;
718 			break;
719 		}
720 	}
721 
722 	if (done)
723 		return done;
724 	return ret;
725 }
726 
727 int io_files_update(struct io_kiocb *req, unsigned int issue_flags)
728 {
729 	struct io_rsrc_update *up = io_kiocb_to_cmd(req, struct io_rsrc_update);
730 	struct io_ring_ctx *ctx = req->ctx;
731 	struct io_uring_rsrc_update2 up2;
732 	int ret;
733 
734 	up2.offset = up->offset;
735 	up2.data = up->arg;
736 	up2.nr = 0;
737 	up2.tags = 0;
738 	up2.resv = 0;
739 	up2.resv2 = 0;
740 
741 	if (up->offset == IORING_FILE_INDEX_ALLOC) {
742 		ret = io_files_update_with_index_alloc(req, issue_flags);
743 	} else {
744 		io_ring_submit_lock(ctx, issue_flags);
745 		ret = __io_register_rsrc_update(ctx, IORING_RSRC_FILE,
746 						&up2, up->nr_args);
747 		io_ring_submit_unlock(ctx, issue_flags);
748 	}
749 
750 	if (ret < 0)
751 		req_set_fail(req);
752 	io_req_set_res(req, ret, 0);
753 	return IOU_OK;
754 }
755 
756 int io_queue_rsrc_removal(struct io_rsrc_data *data, unsigned idx,
757 			  struct io_rsrc_node *node, void *rsrc)
758 {
759 	u64 *tag_slot = io_get_tag_slot(data, idx);
760 	struct io_rsrc_put *prsrc;
761 
762 	prsrc = kzalloc(sizeof(*prsrc), GFP_KERNEL);
763 	if (!prsrc)
764 		return -ENOMEM;
765 
766 	prsrc->tag = *tag_slot;
767 	*tag_slot = 0;
768 	prsrc->rsrc = rsrc;
769 	list_add(&prsrc->list, &node->rsrc_list);
770 	return 0;
771 }
772 
773 void __io_sqe_files_unregister(struct io_ring_ctx *ctx)
774 {
775 	int i;
776 
777 	for (i = 0; i < ctx->nr_user_files; i++) {
778 		struct file *file = io_file_from_index(&ctx->file_table, i);
779 
780 		/* skip scm accounted files, they'll be freed by ->ring_sock */
781 		if (!file || io_file_need_scm(file))
782 			continue;
783 		io_file_bitmap_clear(&ctx->file_table, i);
784 		fput(file);
785 	}
786 
787 #if defined(CONFIG_UNIX)
788 	if (ctx->ring_sock) {
789 		struct sock *sock = ctx->ring_sock->sk;
790 		struct sk_buff *skb;
791 
792 		while ((skb = skb_dequeue(&sock->sk_receive_queue)) != NULL)
793 			kfree_skb(skb);
794 	}
795 #endif
796 	io_free_file_tables(&ctx->file_table);
797 	io_rsrc_data_free(ctx->file_data);
798 	ctx->file_data = NULL;
799 	ctx->nr_user_files = 0;
800 }
801 
802 int io_sqe_files_unregister(struct io_ring_ctx *ctx)
803 {
804 	unsigned nr = ctx->nr_user_files;
805 	int ret;
806 
807 	if (!ctx->file_data)
808 		return -ENXIO;
809 
810 	/*
811 	 * Quiesce may unlock ->uring_lock, and while it's not held
812 	 * prevent new requests using the table.
813 	 */
814 	ctx->nr_user_files = 0;
815 	ret = io_rsrc_ref_quiesce(ctx->file_data, ctx);
816 	ctx->nr_user_files = nr;
817 	if (!ret)
818 		__io_sqe_files_unregister(ctx);
819 	return ret;
820 }
821 
822 /*
823  * Ensure the UNIX gc is aware of our file set, so we are certain that
824  * the io_uring can be safely unregistered on process exit, even if we have
825  * loops in the file referencing. We account only files that can hold other
826  * files because otherwise they can't form a loop and so are not interesting
827  * for GC.
828  */
829 int __io_scm_file_account(struct io_ring_ctx *ctx, struct file *file)
830 {
831 #if defined(CONFIG_UNIX)
832 	struct sock *sk = ctx->ring_sock->sk;
833 	struct sk_buff_head *head = &sk->sk_receive_queue;
834 	struct scm_fp_list *fpl;
835 	struct sk_buff *skb;
836 
837 	if (likely(!io_file_need_scm(file)))
838 		return 0;
839 
840 	/*
841 	 * See if we can merge this file into an existing skb SCM_RIGHTS
842 	 * file set. If there's no room, fall back to allocating a new skb
843 	 * and filling it in.
844 	 */
845 	spin_lock_irq(&head->lock);
846 	skb = skb_peek(head);
847 	if (skb && UNIXCB(skb).fp->count < SCM_MAX_FD)
848 		__skb_unlink(skb, head);
849 	else
850 		skb = NULL;
851 	spin_unlock_irq(&head->lock);
852 
853 	if (!skb) {
854 		fpl = kzalloc(sizeof(*fpl), GFP_KERNEL);
855 		if (!fpl)
856 			return -ENOMEM;
857 
858 		skb = alloc_skb(0, GFP_KERNEL);
859 		if (!skb) {
860 			kfree(fpl);
861 			return -ENOMEM;
862 		}
863 
864 		fpl->user = get_uid(current_user());
865 		fpl->max = SCM_MAX_FD;
866 		fpl->count = 0;
867 
868 		UNIXCB(skb).fp = fpl;
869 		skb->sk = sk;
870 		skb->scm_io_uring = 1;
871 		skb->destructor = unix_destruct_scm;
872 		refcount_add(skb->truesize, &sk->sk_wmem_alloc);
873 	}
874 
875 	fpl = UNIXCB(skb).fp;
876 	fpl->fp[fpl->count++] = get_file(file);
877 	unix_inflight(fpl->user, file);
878 	skb_queue_head(head, skb);
879 	fput(file);
880 #endif
881 	return 0;
882 }
883 
884 static void io_rsrc_file_put(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc)
885 {
886 	struct file *file = prsrc->file;
887 #if defined(CONFIG_UNIX)
888 	struct sock *sock = ctx->ring_sock->sk;
889 	struct sk_buff_head list, *head = &sock->sk_receive_queue;
890 	struct sk_buff *skb;
891 	int i;
892 
893 	if (!io_file_need_scm(file)) {
894 		fput(file);
895 		return;
896 	}
897 
898 	__skb_queue_head_init(&list);
899 
900 	/*
901 	 * Find the skb that holds this file in its SCM_RIGHTS. When found,
902 	 * remove this entry and rearrange the file array.
903 	 */
904 	skb = skb_dequeue(head);
905 	while (skb) {
906 		struct scm_fp_list *fp;
907 
908 		fp = UNIXCB(skb).fp;
909 		for (i = 0; i < fp->count; i++) {
910 			int left;
911 
912 			if (fp->fp[i] != file)
913 				continue;
914 
915 			unix_notinflight(fp->user, fp->fp[i]);
916 			left = fp->count - 1 - i;
917 			if (left) {
918 				memmove(&fp->fp[i], &fp->fp[i + 1],
919 						left * sizeof(struct file *));
920 			}
921 			fp->count--;
922 			if (!fp->count) {
923 				kfree_skb(skb);
924 				skb = NULL;
925 			} else {
926 				__skb_queue_tail(&list, skb);
927 			}
928 			fput(file);
929 			file = NULL;
930 			break;
931 		}
932 
933 		if (!file)
934 			break;
935 
936 		__skb_queue_tail(&list, skb);
937 
938 		skb = skb_dequeue(head);
939 	}
940 
941 	if (skb_peek(&list)) {
942 		spin_lock_irq(&head->lock);
943 		while ((skb = __skb_dequeue(&list)) != NULL)
944 			__skb_queue_tail(head, skb);
945 		spin_unlock_irq(&head->lock);
946 	}
947 #else
948 	fput(file);
949 #endif
950 }
951 
952 int io_sqe_files_register(struct io_ring_ctx *ctx, void __user *arg,
953 			  unsigned nr_args, u64 __user *tags)
954 {
955 	__s32 __user *fds = (__s32 __user *) arg;
956 	struct file *file;
957 	int fd, ret;
958 	unsigned i;
959 
960 	if (ctx->file_data)
961 		return -EBUSY;
962 	if (!nr_args)
963 		return -EINVAL;
964 	if (nr_args > IORING_MAX_FIXED_FILES)
965 		return -EMFILE;
966 	if (nr_args > rlimit(RLIMIT_NOFILE))
967 		return -EMFILE;
968 	ret = io_rsrc_node_switch_start(ctx);
969 	if (ret)
970 		return ret;
971 	ret = io_rsrc_data_alloc(ctx, io_rsrc_file_put, tags, nr_args,
972 				 &ctx->file_data);
973 	if (ret)
974 		return ret;
975 
976 	if (!io_alloc_file_tables(&ctx->file_table, nr_args)) {
977 		io_rsrc_data_free(ctx->file_data);
978 		ctx->file_data = NULL;
979 		return -ENOMEM;
980 	}
981 
982 	for (i = 0; i < nr_args; i++, ctx->nr_user_files++) {
983 		struct io_fixed_file *file_slot;
984 
985 		if (fds && copy_from_user(&fd, &fds[i], sizeof(fd))) {
986 			ret = -EFAULT;
987 			goto fail;
988 		}
989 		/* allow sparse sets */
990 		if (!fds || fd == -1) {
991 			ret = -EINVAL;
992 			if (unlikely(*io_get_tag_slot(ctx->file_data, i)))
993 				goto fail;
994 			continue;
995 		}
996 
997 		file = fget(fd);
998 		ret = -EBADF;
999 		if (unlikely(!file))
1000 			goto fail;
1001 
1002 		/*
1003 		 * Don't allow io_uring instances to be registered. If UNIX
1004 		 * isn't enabled, then this causes a reference cycle and this
1005 		 * instance can never get freed. If UNIX is enabled we'll
1006 		 * handle it just fine, but there's still no point in allowing
1007 		 * a ring fd as it doesn't support regular read/write anyway.
1008 		 */
1009 		if (io_is_uring_fops(file)) {
1010 			fput(file);
1011 			goto fail;
1012 		}
1013 		ret = io_scm_file_account(ctx, file);
1014 		if (ret) {
1015 			fput(file);
1016 			goto fail;
1017 		}
1018 		file_slot = io_fixed_file_slot(&ctx->file_table, i);
1019 		io_fixed_file_set(file_slot, file);
1020 		io_file_bitmap_set(&ctx->file_table, i);
1021 	}
1022 
1023 	/* default it to the whole table */
1024 	io_file_table_set_alloc_range(ctx, 0, ctx->nr_user_files);
1025 	io_rsrc_node_switch(ctx, NULL);
1026 	return 0;
1027 fail:
1028 	__io_sqe_files_unregister(ctx);
1029 	return ret;
1030 }
1031 
1032 static void io_rsrc_buf_put(struct io_ring_ctx *ctx, struct io_rsrc_put *prsrc)
1033 {
1034 	io_buffer_unmap(ctx, &prsrc->buf);
1035 	prsrc->buf = NULL;
1036 }
1037 
1038 void __io_sqe_buffers_unregister(struct io_ring_ctx *ctx)
1039 {
1040 	unsigned int i;
1041 
1042 	for (i = 0; i < ctx->nr_user_bufs; i++)
1043 		io_buffer_unmap(ctx, &ctx->user_bufs[i]);
1044 	kfree(ctx->user_bufs);
1045 	io_rsrc_data_free(ctx->buf_data);
1046 	ctx->user_bufs = NULL;
1047 	ctx->buf_data = NULL;
1048 	ctx->nr_user_bufs = 0;
1049 }
1050 
1051 int io_sqe_buffers_unregister(struct io_ring_ctx *ctx)
1052 {
1053 	unsigned nr = ctx->nr_user_bufs;
1054 	int ret;
1055 
1056 	if (!ctx->buf_data)
1057 		return -ENXIO;
1058 
1059 	/*
1060 	 * Quiesce may unlock ->uring_lock, and while it's not held
1061 	 * prevent new requests using the table.
1062 	 */
1063 	ctx->nr_user_bufs = 0;
1064 	ret = io_rsrc_ref_quiesce(ctx->buf_data, ctx);
1065 	ctx->nr_user_bufs = nr;
1066 	if (!ret)
1067 		__io_sqe_buffers_unregister(ctx);
1068 	return ret;
1069 }
1070 
1071 /*
1072  * Not super efficient, but this is just a registration time. And we do cache
1073  * the last compound head, so generally we'll only do a full search if we don't
1074  * match that one.
1075  *
1076  * We check if the given compound head page has already been accounted, to
1077  * avoid double accounting it. This allows us to account the full size of the
1078  * page, not just the constituent pages of a huge page.
1079  */
1080 static bool headpage_already_acct(struct io_ring_ctx *ctx, struct page **pages,
1081 				  int nr_pages, struct page *hpage)
1082 {
1083 	int i, j;
1084 
1085 	/* check current page array */
1086 	for (i = 0; i < nr_pages; i++) {
1087 		if (!PageCompound(pages[i]))
1088 			continue;
1089 		if (compound_head(pages[i]) == hpage)
1090 			return true;
1091 	}
1092 
1093 	/* check previously registered pages */
1094 	for (i = 0; i < ctx->nr_user_bufs; i++) {
1095 		struct io_mapped_ubuf *imu = ctx->user_bufs[i];
1096 
1097 		for (j = 0; j < imu->nr_bvecs; j++) {
1098 			if (!PageCompound(imu->bvec[j].bv_page))
1099 				continue;
1100 			if (compound_head(imu->bvec[j].bv_page) == hpage)
1101 				return true;
1102 		}
1103 	}
1104 
1105 	return false;
1106 }
1107 
1108 static int io_buffer_account_pin(struct io_ring_ctx *ctx, struct page **pages,
1109 				 int nr_pages, struct io_mapped_ubuf *imu,
1110 				 struct page **last_hpage)
1111 {
1112 	int i, ret;
1113 
1114 	imu->acct_pages = 0;
1115 	for (i = 0; i < nr_pages; i++) {
1116 		if (!PageCompound(pages[i])) {
1117 			imu->acct_pages++;
1118 		} else {
1119 			struct page *hpage;
1120 
1121 			hpage = compound_head(pages[i]);
1122 			if (hpage == *last_hpage)
1123 				continue;
1124 			*last_hpage = hpage;
1125 			if (headpage_already_acct(ctx, pages, i, hpage))
1126 				continue;
1127 			imu->acct_pages += page_size(hpage) >> PAGE_SHIFT;
1128 		}
1129 	}
1130 
1131 	if (!imu->acct_pages)
1132 		return 0;
1133 
1134 	ret = io_account_mem(ctx, imu->acct_pages);
1135 	if (ret)
1136 		imu->acct_pages = 0;
1137 	return ret;
1138 }
1139 
1140 struct page **io_pin_pages(unsigned long ubuf, unsigned long len, int *npages)
1141 {
1142 	unsigned long start, end, nr_pages;
1143 	struct vm_area_struct **vmas = NULL;
1144 	struct page **pages = NULL;
1145 	int i, pret, ret = -ENOMEM;
1146 
1147 	end = (ubuf + len + PAGE_SIZE - 1) >> PAGE_SHIFT;
1148 	start = ubuf >> PAGE_SHIFT;
1149 	nr_pages = end - start;
1150 
1151 	pages = kvmalloc_array(nr_pages, sizeof(struct page *), GFP_KERNEL);
1152 	if (!pages)
1153 		goto done;
1154 
1155 	vmas = kvmalloc_array(nr_pages, sizeof(struct vm_area_struct *),
1156 			      GFP_KERNEL);
1157 	if (!vmas)
1158 		goto done;
1159 
1160 	ret = 0;
1161 	mmap_read_lock(current->mm);
1162 	pret = pin_user_pages(ubuf, nr_pages, FOLL_WRITE | FOLL_LONGTERM,
1163 			      pages, vmas);
1164 	if (pret == nr_pages) {
1165 		/* don't support file backed memory */
1166 		for (i = 0; i < nr_pages; i++) {
1167 			struct vm_area_struct *vma = vmas[i];
1168 
1169 			if (vma_is_shmem(vma))
1170 				continue;
1171 			if (vma->vm_file &&
1172 			    !is_file_hugepages(vma->vm_file)) {
1173 				ret = -EOPNOTSUPP;
1174 				break;
1175 			}
1176 		}
1177 		*npages = nr_pages;
1178 	} else {
1179 		ret = pret < 0 ? pret : -EFAULT;
1180 	}
1181 	mmap_read_unlock(current->mm);
1182 	if (ret) {
1183 		/*
1184 		 * if we did partial map, or found file backed vmas,
1185 		 * release any pages we did get
1186 		 */
1187 		if (pret > 0)
1188 			unpin_user_pages(pages, pret);
1189 		goto done;
1190 	}
1191 	ret = 0;
1192 done:
1193 	kvfree(vmas);
1194 	if (ret < 0) {
1195 		kvfree(pages);
1196 		pages = ERR_PTR(ret);
1197 	}
1198 	return pages;
1199 }
1200 
1201 static int io_sqe_buffer_register(struct io_ring_ctx *ctx, struct iovec *iov,
1202 				  struct io_mapped_ubuf **pimu,
1203 				  struct page **last_hpage)
1204 {
1205 	struct io_mapped_ubuf *imu = NULL;
1206 	struct page **pages = NULL;
1207 	unsigned long off;
1208 	size_t size;
1209 	int ret, nr_pages, i;
1210 
1211 	*pimu = ctx->dummy_ubuf;
1212 	if (!iov->iov_base)
1213 		return 0;
1214 
1215 	ret = -ENOMEM;
1216 	pages = io_pin_pages((unsigned long) iov->iov_base, iov->iov_len,
1217 				&nr_pages);
1218 	if (IS_ERR(pages)) {
1219 		ret = PTR_ERR(pages);
1220 		pages = NULL;
1221 		goto done;
1222 	}
1223 
1224 	imu = kvmalloc(struct_size(imu, bvec, nr_pages), GFP_KERNEL);
1225 	if (!imu)
1226 		goto done;
1227 
1228 	ret = io_buffer_account_pin(ctx, pages, nr_pages, imu, last_hpage);
1229 	if (ret) {
1230 		unpin_user_pages(pages, nr_pages);
1231 		goto done;
1232 	}
1233 
1234 	off = (unsigned long) iov->iov_base & ~PAGE_MASK;
1235 	size = iov->iov_len;
1236 	for (i = 0; i < nr_pages; i++) {
1237 		size_t vec_len;
1238 
1239 		vec_len = min_t(size_t, size, PAGE_SIZE - off);
1240 		imu->bvec[i].bv_page = pages[i];
1241 		imu->bvec[i].bv_len = vec_len;
1242 		imu->bvec[i].bv_offset = off;
1243 		off = 0;
1244 		size -= vec_len;
1245 	}
1246 	/* store original address for later verification */
1247 	imu->ubuf = (unsigned long) iov->iov_base;
1248 	imu->ubuf_end = imu->ubuf + iov->iov_len;
1249 	imu->nr_bvecs = nr_pages;
1250 	*pimu = imu;
1251 	ret = 0;
1252 done:
1253 	if (ret)
1254 		kvfree(imu);
1255 	kvfree(pages);
1256 	return ret;
1257 }
1258 
1259 static int io_buffers_map_alloc(struct io_ring_ctx *ctx, unsigned int nr_args)
1260 {
1261 	ctx->user_bufs = kcalloc(nr_args, sizeof(*ctx->user_bufs), GFP_KERNEL);
1262 	return ctx->user_bufs ? 0 : -ENOMEM;
1263 }
1264 
1265 int io_sqe_buffers_register(struct io_ring_ctx *ctx, void __user *arg,
1266 			    unsigned int nr_args, u64 __user *tags)
1267 {
1268 	struct page *last_hpage = NULL;
1269 	struct io_rsrc_data *data;
1270 	int i, ret;
1271 	struct iovec iov;
1272 
1273 	BUILD_BUG_ON(IORING_MAX_REG_BUFFERS >= (1u << 16));
1274 
1275 	if (ctx->user_bufs)
1276 		return -EBUSY;
1277 	if (!nr_args || nr_args > IORING_MAX_REG_BUFFERS)
1278 		return -EINVAL;
1279 	ret = io_rsrc_node_switch_start(ctx);
1280 	if (ret)
1281 		return ret;
1282 	ret = io_rsrc_data_alloc(ctx, io_rsrc_buf_put, tags, nr_args, &data);
1283 	if (ret)
1284 		return ret;
1285 	ret = io_buffers_map_alloc(ctx, nr_args);
1286 	if (ret) {
1287 		io_rsrc_data_free(data);
1288 		return ret;
1289 	}
1290 
1291 	for (i = 0; i < nr_args; i++, ctx->nr_user_bufs++) {
1292 		if (arg) {
1293 			ret = io_copy_iov(ctx, &iov, arg, i);
1294 			if (ret)
1295 				break;
1296 			ret = io_buffer_validate(&iov);
1297 			if (ret)
1298 				break;
1299 		} else {
1300 			memset(&iov, 0, sizeof(iov));
1301 		}
1302 
1303 		if (!iov.iov_base && *io_get_tag_slot(data, i)) {
1304 			ret = -EINVAL;
1305 			break;
1306 		}
1307 
1308 		ret = io_sqe_buffer_register(ctx, &iov, &ctx->user_bufs[i],
1309 					     &last_hpage);
1310 		if (ret)
1311 			break;
1312 	}
1313 
1314 	WARN_ON_ONCE(ctx->buf_data);
1315 
1316 	ctx->buf_data = data;
1317 	if (ret)
1318 		__io_sqe_buffers_unregister(ctx);
1319 	else
1320 		io_rsrc_node_switch(ctx, NULL);
1321 	return ret;
1322 }
1323 
1324 int io_import_fixed(int ddir, struct iov_iter *iter,
1325 			   struct io_mapped_ubuf *imu,
1326 			   u64 buf_addr, size_t len)
1327 {
1328 	u64 buf_end;
1329 	size_t offset;
1330 
1331 	if (WARN_ON_ONCE(!imu))
1332 		return -EFAULT;
1333 	if (unlikely(check_add_overflow(buf_addr, (u64)len, &buf_end)))
1334 		return -EFAULT;
1335 	/* not inside the mapped region */
1336 	if (unlikely(buf_addr < imu->ubuf || buf_end > imu->ubuf_end))
1337 		return -EFAULT;
1338 
1339 	/*
1340 	 * May not be a start of buffer, set size appropriately
1341 	 * and advance us to the beginning.
1342 	 */
1343 	offset = buf_addr - imu->ubuf;
1344 	iov_iter_bvec(iter, ddir, imu->bvec, imu->nr_bvecs, offset + len);
1345 
1346 	if (offset) {
1347 		/*
1348 		 * Don't use iov_iter_advance() here, as it's really slow for
1349 		 * using the latter parts of a big fixed buffer - it iterates
1350 		 * over each segment manually. We can cheat a bit here, because
1351 		 * we know that:
1352 		 *
1353 		 * 1) it's a BVEC iter, we set it up
1354 		 * 2) all bvecs are PAGE_SIZE in size, except potentially the
1355 		 *    first and last bvec
1356 		 *
1357 		 * So just find our index, and adjust the iterator afterwards.
1358 		 * If the offset is within the first bvec (or the whole first
1359 		 * bvec, just use iov_iter_advance(). This makes it easier
1360 		 * since we can just skip the first segment, which may not
1361 		 * be PAGE_SIZE aligned.
1362 		 */
1363 		const struct bio_vec *bvec = imu->bvec;
1364 
1365 		if (offset <= bvec->bv_len) {
1366 			iov_iter_advance(iter, offset);
1367 		} else {
1368 			unsigned long seg_skip;
1369 
1370 			/* skip first vec */
1371 			offset -= bvec->bv_len;
1372 			seg_skip = 1 + (offset >> PAGE_SHIFT);
1373 
1374 			iter->bvec = bvec + seg_skip;
1375 			iter->nr_segs -= seg_skip;
1376 			iter->count -= bvec->bv_len + offset;
1377 			iter->iov_offset = offset & ~PAGE_MASK;
1378 		}
1379 	}
1380 
1381 	return 0;
1382 }
1383