1 /* SPDX-License-Identifier: BSD-3-Clause 2 * Copyright (C) 2019 Intel Corporation. 3 * All rights reserved. 4 */ 5 6 #include "spdk/stdinc.h" 7 #include "spdk/config.h" 8 9 #include <linux/errqueue.h> 10 #include <sys/epoll.h> 11 #include <liburing.h> 12 13 #include "spdk/barrier.h" 14 #include "spdk/env.h" 15 #include "spdk/log.h" 16 #include "spdk/pipe.h" 17 #include "spdk/sock.h" 18 #include "spdk/string.h" 19 #include "spdk/util.h" 20 21 #include "spdk_internal/sock.h" 22 #include "spdk_internal/assert.h" 23 #include "../sock_kernel.h" 24 25 #define MAX_TMPBUF 1024 26 #define PORTNUMLEN 32 27 #define SPDK_SOCK_GROUP_QUEUE_DEPTH 4096 28 #define SPDK_SOCK_CMG_INFO_SIZE (sizeof(struct cmsghdr) + sizeof(struct sock_extended_err)) 29 30 enum uring_task_type { 31 URING_TASK_READ = 0, 32 URING_TASK_ERRQUEUE, 33 URING_TASK_WRITE, 34 URING_TASK_CANCEL, 35 }; 36 37 #if defined(SO_ZEROCOPY) && defined(MSG_ZEROCOPY) 38 #define SPDK_ZEROCOPY 39 #endif 40 41 /* We don't know how big the buffers that the user posts will be, but this 42 * is the maximum we'll ever allow it to receive in a single command. 43 * If the user buffers are smaller, it will just receive less. */ 44 #define URING_MAX_RECV_SIZE (128 * 1024) 45 46 /* We don't know how many buffers the user will post, but this is the 47 * maximum number we'll take from the pool to post per group. */ 48 #define URING_BUF_POOL_SIZE 128 49 50 /* We use 1 just so it's not zero and we can validate it's right. */ 51 #define URING_BUF_GROUP_ID 1 52 53 enum spdk_uring_sock_task_status { 54 SPDK_URING_SOCK_TASK_NOT_IN_USE = 0, 55 SPDK_URING_SOCK_TASK_IN_PROCESS, 56 }; 57 58 struct spdk_uring_task { 59 enum spdk_uring_sock_task_status status; 60 enum uring_task_type type; 61 struct spdk_uring_sock *sock; 62 struct msghdr msg; 63 struct iovec iovs[IOV_BATCH_SIZE]; 64 int iov_cnt; 65 struct spdk_sock_request *last_req; 66 bool is_zcopy; 67 STAILQ_ENTRY(spdk_uring_task) link; 68 }; 69 70 struct spdk_uring_sock { 71 struct spdk_sock base; 72 int fd; 73 uint32_t sendmsg_idx; 74 struct spdk_uring_sock_group_impl *group; 75 STAILQ_HEAD(, spdk_uring_buf_tracker) recv_stream; 76 size_t recv_offset; 77 struct spdk_uring_task write_task; 78 struct spdk_uring_task errqueue_task; 79 struct spdk_uring_task read_task; 80 struct spdk_uring_task cancel_task; 81 struct spdk_pipe *recv_pipe; 82 void *recv_buf; 83 int recv_buf_sz; 84 bool zcopy; 85 bool pending_recv; 86 bool pending_group_remove; 87 int zcopy_send_flags; 88 int connection_status; 89 int placement_id; 90 uint8_t reserved[4]; 91 uint8_t buf[SPDK_SOCK_CMG_INFO_SIZE]; 92 TAILQ_ENTRY(spdk_uring_sock) link; 93 }; 94 /* 'struct cmsghdr' is mapped to the buffer 'buf', and while first element 95 * of this control message header has a size of 8 bytes, 'buf' 96 * must be 8-byte aligned. 97 */ 98 SPDK_STATIC_ASSERT(offsetof(struct spdk_uring_sock, buf) % 8 == 0, 99 "Incorrect alignment: `buf` must be aligned to 8 bytes"); 100 101 TAILQ_HEAD(pending_recv_list, spdk_uring_sock); 102 103 struct spdk_uring_buf_tracker { 104 void *buf; 105 size_t buflen; 106 size_t len; 107 void *ctx; 108 int id; 109 STAILQ_ENTRY(spdk_uring_buf_tracker) link; 110 }; 111 112 struct spdk_uring_sock_group_impl { 113 struct spdk_sock_group_impl base; 114 struct io_uring uring; 115 uint32_t io_inflight; 116 uint32_t io_queued; 117 uint32_t io_avail; 118 struct pending_recv_list pending_recv; 119 120 struct io_uring_buf_ring *buf_ring; 121 uint32_t buf_ring_count; 122 struct spdk_uring_buf_tracker *trackers; 123 STAILQ_HEAD(, spdk_uring_buf_tracker) free_trackers; 124 }; 125 126 static struct spdk_sock_impl_opts g_spdk_uring_sock_impl_opts = { 127 .recv_buf_size = DEFAULT_SO_RCVBUF_SIZE, 128 .send_buf_size = DEFAULT_SO_SNDBUF_SIZE, 129 .enable_recv_pipe = true, 130 .enable_quickack = false, 131 .enable_placement_id = PLACEMENT_NONE, 132 .enable_zerocopy_send_server = false, 133 .enable_zerocopy_send_client = false, 134 .zerocopy_threshold = 0, 135 .tls_version = 0, 136 .enable_ktls = false, 137 .psk_key = NULL, 138 .psk_identity = NULL 139 }; 140 141 static struct spdk_sock_map g_map = { 142 .entries = STAILQ_HEAD_INITIALIZER(g_map.entries), 143 .mtx = PTHREAD_MUTEX_INITIALIZER 144 }; 145 146 __attribute((destructor)) static void 147 uring_sock_map_cleanup(void) 148 { 149 spdk_sock_map_cleanup(&g_map); 150 } 151 152 #define SPDK_URING_SOCK_REQUEST_IOV(req) ((struct iovec *)((uint8_t *)req + sizeof(struct spdk_sock_request))) 153 154 #define __uring_sock(sock) (struct spdk_uring_sock *)sock 155 #define __uring_group_impl(group) (struct spdk_uring_sock_group_impl *)group 156 157 static void 158 uring_sock_copy_impl_opts(struct spdk_sock_impl_opts *dest, const struct spdk_sock_impl_opts *src, 159 size_t len) 160 { 161 #define FIELD_OK(field) \ 162 offsetof(struct spdk_sock_impl_opts, field) + sizeof(src->field) <= len 163 164 #define SET_FIELD(field) \ 165 if (FIELD_OK(field)) { \ 166 dest->field = src->field; \ 167 } 168 169 SET_FIELD(recv_buf_size); 170 SET_FIELD(send_buf_size); 171 SET_FIELD(enable_recv_pipe); 172 SET_FIELD(enable_quickack); 173 SET_FIELD(enable_placement_id); 174 SET_FIELD(enable_zerocopy_send_server); 175 SET_FIELD(enable_zerocopy_send_client); 176 SET_FIELD(zerocopy_threshold); 177 SET_FIELD(tls_version); 178 SET_FIELD(enable_ktls); 179 SET_FIELD(psk_key); 180 SET_FIELD(psk_identity); 181 182 #undef SET_FIELD 183 #undef FIELD_OK 184 } 185 186 static int 187 uring_sock_impl_get_opts(struct spdk_sock_impl_opts *opts, size_t *len) 188 { 189 if (!opts || !len) { 190 errno = EINVAL; 191 return -1; 192 } 193 194 assert(sizeof(*opts) >= *len); 195 memset(opts, 0, *len); 196 197 uring_sock_copy_impl_opts(opts, &g_spdk_uring_sock_impl_opts, *len); 198 *len = spdk_min(*len, sizeof(g_spdk_uring_sock_impl_opts)); 199 200 return 0; 201 } 202 203 static int 204 uring_sock_impl_set_opts(const struct spdk_sock_impl_opts *opts, size_t len) 205 { 206 if (!opts) { 207 errno = EINVAL; 208 return -1; 209 } 210 211 assert(sizeof(*opts) >= len); 212 uring_sock_copy_impl_opts(&g_spdk_uring_sock_impl_opts, opts, len); 213 214 return 0; 215 } 216 217 static void 218 uring_opts_get_impl_opts(const struct spdk_sock_opts *opts, struct spdk_sock_impl_opts *dest) 219 { 220 /* Copy the default impl_opts first to cover cases when user's impl_opts is smaller */ 221 memcpy(dest, &g_spdk_uring_sock_impl_opts, sizeof(*dest)); 222 223 if (opts->impl_opts != NULL) { 224 assert(sizeof(*dest) >= opts->impl_opts_size); 225 uring_sock_copy_impl_opts(dest, opts->impl_opts, opts->impl_opts_size); 226 } 227 } 228 229 static int 230 uring_sock_getaddr(struct spdk_sock *_sock, char *saddr, int slen, uint16_t *sport, 231 char *caddr, int clen, uint16_t *cport) 232 { 233 struct spdk_uring_sock *sock = __uring_sock(_sock); 234 struct sockaddr_storage sa; 235 socklen_t salen; 236 int rc; 237 238 assert(sock != NULL); 239 240 memset(&sa, 0, sizeof sa); 241 salen = sizeof sa; 242 rc = getsockname(sock->fd, (struct sockaddr *) &sa, &salen); 243 if (rc != 0) { 244 SPDK_ERRLOG("getsockname() failed (errno=%d)\n", errno); 245 return -1; 246 } 247 248 switch (sa.ss_family) { 249 case AF_UNIX: 250 /* Acceptable connection types that don't have IPs */ 251 return 0; 252 case AF_INET: 253 case AF_INET6: 254 /* Code below will get IP addresses */ 255 break; 256 default: 257 /* Unsupported socket family */ 258 return -1; 259 } 260 261 rc = get_addr_str((struct sockaddr *)&sa, saddr, slen); 262 if (rc != 0) { 263 SPDK_ERRLOG("getnameinfo() failed (errno=%d)\n", errno); 264 return -1; 265 } 266 267 if (sport) { 268 if (sa.ss_family == AF_INET) { 269 *sport = ntohs(((struct sockaddr_in *) &sa)->sin_port); 270 } else if (sa.ss_family == AF_INET6) { 271 *sport = ntohs(((struct sockaddr_in6 *) &sa)->sin6_port); 272 } 273 } 274 275 memset(&sa, 0, sizeof sa); 276 salen = sizeof sa; 277 rc = getpeername(sock->fd, (struct sockaddr *) &sa, &salen); 278 if (rc != 0) { 279 SPDK_ERRLOG("getpeername() failed (errno=%d)\n", errno); 280 return -1; 281 } 282 283 rc = get_addr_str((struct sockaddr *)&sa, caddr, clen); 284 if (rc != 0) { 285 SPDK_ERRLOG("getnameinfo() failed (errno=%d)\n", errno); 286 return -1; 287 } 288 289 if (cport) { 290 if (sa.ss_family == AF_INET) { 291 *cport = ntohs(((struct sockaddr_in *) &sa)->sin_port); 292 } else if (sa.ss_family == AF_INET6) { 293 *cport = ntohs(((struct sockaddr_in6 *) &sa)->sin6_port); 294 } 295 } 296 297 return 0; 298 } 299 300 enum uring_sock_create_type { 301 SPDK_SOCK_CREATE_LISTEN, 302 SPDK_SOCK_CREATE_CONNECT, 303 }; 304 305 static int 306 uring_sock_alloc_pipe(struct spdk_uring_sock *sock, int sz) 307 { 308 uint8_t *new_buf; 309 struct spdk_pipe *new_pipe; 310 struct iovec siov[2]; 311 struct iovec diov[2]; 312 int sbytes; 313 ssize_t bytes; 314 int rc; 315 316 if (sock->recv_buf_sz == sz) { 317 return 0; 318 } 319 320 /* If the new size is 0, just free the pipe */ 321 if (sz == 0) { 322 spdk_pipe_destroy(sock->recv_pipe); 323 free(sock->recv_buf); 324 sock->recv_pipe = NULL; 325 sock->recv_buf = NULL; 326 return 0; 327 } else if (sz < MIN_SOCK_PIPE_SIZE) { 328 SPDK_ERRLOG("The size of the pipe must be larger than %d\n", MIN_SOCK_PIPE_SIZE); 329 return -1; 330 } 331 332 /* Round up to next 64 byte multiple */ 333 rc = posix_memalign((void **)&new_buf, 64, sz); 334 if (rc != 0) { 335 SPDK_ERRLOG("socket recv buf allocation failed\n"); 336 return -ENOMEM; 337 } 338 memset(new_buf, 0, sz); 339 340 new_pipe = spdk_pipe_create(new_buf, sz); 341 if (new_pipe == NULL) { 342 SPDK_ERRLOG("socket pipe allocation failed\n"); 343 free(new_buf); 344 return -ENOMEM; 345 } 346 347 if (sock->recv_pipe != NULL) { 348 /* Pull all of the data out of the old pipe */ 349 sbytes = spdk_pipe_reader_get_buffer(sock->recv_pipe, sock->recv_buf_sz, siov); 350 if (sbytes > sz) { 351 /* Too much data to fit into the new pipe size */ 352 spdk_pipe_destroy(new_pipe); 353 free(new_buf); 354 return -EINVAL; 355 } 356 357 sbytes = spdk_pipe_writer_get_buffer(new_pipe, sz, diov); 358 assert(sbytes == sz); 359 360 bytes = spdk_iovcpy(siov, 2, diov, 2); 361 spdk_pipe_writer_advance(new_pipe, bytes); 362 363 spdk_pipe_destroy(sock->recv_pipe); 364 free(sock->recv_buf); 365 } 366 367 sock->recv_buf_sz = sz; 368 sock->recv_buf = new_buf; 369 sock->recv_pipe = new_pipe; 370 371 return 0; 372 } 373 374 static int 375 uring_sock_set_recvbuf(struct spdk_sock *_sock, int sz) 376 { 377 struct spdk_uring_sock *sock = __uring_sock(_sock); 378 int min_size; 379 int rc; 380 381 assert(sock != NULL); 382 383 if (_sock->impl_opts.enable_recv_pipe) { 384 rc = uring_sock_alloc_pipe(sock, sz); 385 if (rc) { 386 SPDK_ERRLOG("unable to allocate sufficient recvbuf with sz=%d on sock=%p\n", sz, _sock); 387 return rc; 388 } 389 } 390 391 /* Set kernel buffer size to be at least MIN_SO_RCVBUF_SIZE and 392 * g_spdk_uring_sock_impl_opts.recv_buf_size. */ 393 min_size = spdk_max(MIN_SO_RCVBUF_SIZE, g_spdk_uring_sock_impl_opts.recv_buf_size); 394 395 if (sz < min_size) { 396 sz = min_size; 397 } 398 399 rc = setsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF, &sz, sizeof(sz)); 400 if (rc < 0) { 401 return rc; 402 } 403 404 _sock->impl_opts.recv_buf_size = sz; 405 406 return 0; 407 } 408 409 static int 410 uring_sock_set_sendbuf(struct spdk_sock *_sock, int sz) 411 { 412 struct spdk_uring_sock *sock = __uring_sock(_sock); 413 int min_size; 414 int rc; 415 416 assert(sock != NULL); 417 418 /* Set kernel buffer size to be at least MIN_SO_SNDBUF_SIZE and 419 * g_spdk_uring_sock_impl_opts.seend_buf_size. */ 420 min_size = spdk_max(MIN_SO_SNDBUF_SIZE, g_spdk_uring_sock_impl_opts.send_buf_size); 421 422 if (sz < min_size) { 423 sz = min_size; 424 } 425 426 rc = setsockopt(sock->fd, SOL_SOCKET, SO_SNDBUF, &sz, sizeof(sz)); 427 if (rc < 0) { 428 return rc; 429 } 430 431 _sock->impl_opts.send_buf_size = sz; 432 433 return 0; 434 } 435 436 static struct spdk_uring_sock * 437 uring_sock_alloc(int fd, struct spdk_sock_impl_opts *impl_opts, bool enable_zero_copy) 438 { 439 struct spdk_uring_sock *sock; 440 #if defined(__linux__) 441 int flag; 442 int rc; 443 #endif 444 445 sock = calloc(1, sizeof(*sock)); 446 if (sock == NULL) { 447 SPDK_ERRLOG("sock allocation failed\n"); 448 return NULL; 449 } 450 451 sock->fd = fd; 452 memcpy(&sock->base.impl_opts, impl_opts, sizeof(*impl_opts)); 453 454 STAILQ_INIT(&sock->recv_stream); 455 456 #if defined(__linux__) 457 flag = 1; 458 459 if (sock->base.impl_opts.enable_quickack) { 460 rc = setsockopt(sock->fd, IPPROTO_TCP, TCP_QUICKACK, &flag, sizeof(flag)); 461 if (rc != 0) { 462 SPDK_ERRLOG("quickack was failed to set\n"); 463 } 464 } 465 466 spdk_sock_get_placement_id(sock->fd, sock->base.impl_opts.enable_placement_id, 467 &sock->placement_id); 468 #ifdef SPDK_ZEROCOPY 469 /* Try to turn on zero copy sends */ 470 flag = 1; 471 472 if (enable_zero_copy) { 473 rc = setsockopt(sock->fd, SOL_SOCKET, SO_ZEROCOPY, &flag, sizeof(flag)); 474 if (rc == 0) { 475 sock->zcopy = true; 476 sock->zcopy_send_flags = MSG_ZEROCOPY; 477 } 478 } 479 #endif 480 #endif 481 482 return sock; 483 } 484 485 static struct spdk_sock * 486 uring_sock_create(const char *ip, int port, 487 enum uring_sock_create_type type, 488 struct spdk_sock_opts *opts) 489 { 490 struct spdk_uring_sock *sock; 491 struct spdk_sock_impl_opts impl_opts; 492 char buf[MAX_TMPBUF]; 493 char portnum[PORTNUMLEN]; 494 char *p; 495 struct addrinfo hints, *res, *res0; 496 int fd, flag; 497 int val = 1; 498 int rc; 499 bool enable_zcopy_impl_opts = false; 500 bool enable_zcopy_user_opts = true; 501 502 assert(opts != NULL); 503 uring_opts_get_impl_opts(opts, &impl_opts); 504 505 if (ip == NULL) { 506 return NULL; 507 } 508 if (ip[0] == '[') { 509 snprintf(buf, sizeof(buf), "%s", ip + 1); 510 p = strchr(buf, ']'); 511 if (p != NULL) { 512 *p = '\0'; 513 } 514 ip = (const char *) &buf[0]; 515 } 516 517 snprintf(portnum, sizeof portnum, "%d", port); 518 memset(&hints, 0, sizeof hints); 519 hints.ai_family = PF_UNSPEC; 520 hints.ai_socktype = SOCK_STREAM; 521 hints.ai_flags = AI_NUMERICSERV; 522 hints.ai_flags |= AI_PASSIVE; 523 hints.ai_flags |= AI_NUMERICHOST; 524 rc = getaddrinfo(ip, portnum, &hints, &res0); 525 if (rc != 0) { 526 SPDK_ERRLOG("getaddrinfo() failed %s (%d)\n", gai_strerror(rc), rc); 527 return NULL; 528 } 529 530 /* try listen */ 531 fd = -1; 532 for (res = res0; res != NULL; res = res->ai_next) { 533 retry: 534 fd = socket(res->ai_family, res->ai_socktype, res->ai_protocol); 535 if (fd < 0) { 536 /* error */ 537 continue; 538 } 539 540 val = impl_opts.recv_buf_size; 541 rc = setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &val, sizeof val); 542 if (rc) { 543 /* Not fatal */ 544 } 545 546 val = impl_opts.send_buf_size; 547 rc = setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &val, sizeof val); 548 if (rc) { 549 /* Not fatal */ 550 } 551 552 rc = setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof val); 553 if (rc != 0) { 554 close(fd); 555 fd = -1; 556 /* error */ 557 continue; 558 } 559 rc = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &val, sizeof val); 560 if (rc != 0) { 561 close(fd); 562 fd = -1; 563 /* error */ 564 continue; 565 } 566 567 if (opts->ack_timeout) { 568 #if defined(__linux__) 569 val = opts->ack_timeout; 570 rc = setsockopt(fd, IPPROTO_TCP, TCP_USER_TIMEOUT, &val, sizeof val); 571 if (rc != 0) { 572 close(fd); 573 fd = -1; 574 /* error */ 575 continue; 576 } 577 #else 578 SPDK_WARNLOG("TCP_USER_TIMEOUT is not supported.\n"); 579 #endif 580 } 581 582 583 584 #if defined(SO_PRIORITY) 585 if (opts != NULL && opts->priority) { 586 rc = setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &opts->priority, sizeof val); 587 if (rc != 0) { 588 close(fd); 589 fd = -1; 590 /* error */ 591 continue; 592 } 593 } 594 #endif 595 if (res->ai_family == AF_INET6) { 596 rc = setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &val, sizeof val); 597 if (rc != 0) { 598 close(fd); 599 fd = -1; 600 /* error */ 601 continue; 602 } 603 } 604 605 if (type == SPDK_SOCK_CREATE_LISTEN) { 606 rc = bind(fd, res->ai_addr, res->ai_addrlen); 607 if (rc != 0) { 608 SPDK_ERRLOG("bind() failed at port %d, errno = %d\n", port, errno); 609 switch (errno) { 610 case EINTR: 611 /* interrupted? */ 612 close(fd); 613 goto retry; 614 case EADDRNOTAVAIL: 615 SPDK_ERRLOG("IP address %s not available. " 616 "Verify IP address in config file " 617 "and make sure setup script is " 618 "run before starting spdk app.\n", ip); 619 /* FALLTHROUGH */ 620 default: 621 /* try next family */ 622 close(fd); 623 fd = -1; 624 continue; 625 } 626 } 627 /* bind OK */ 628 rc = listen(fd, 512); 629 if (rc != 0) { 630 SPDK_ERRLOG("listen() failed, errno = %d\n", errno); 631 close(fd); 632 fd = -1; 633 break; 634 } 635 636 flag = fcntl(fd, F_GETFL); 637 if (fcntl(fd, F_SETFL, flag | O_NONBLOCK) < 0) { 638 SPDK_ERRLOG("fcntl can't set nonblocking mode for socket, fd: %d (%d)\n", fd, errno); 639 close(fd); 640 fd = -1; 641 break; 642 } 643 644 enable_zcopy_impl_opts = impl_opts.enable_zerocopy_send_server; 645 } else if (type == SPDK_SOCK_CREATE_CONNECT) { 646 rc = connect(fd, res->ai_addr, res->ai_addrlen); 647 if (rc != 0) { 648 SPDK_ERRLOG("connect() failed, errno = %d\n", errno); 649 /* try next family */ 650 close(fd); 651 fd = -1; 652 continue; 653 } 654 655 flag = fcntl(fd, F_GETFL); 656 if (fcntl(fd, F_SETFL, flag & ~O_NONBLOCK) < 0) { 657 SPDK_ERRLOG("fcntl can't set blocking mode for socket, fd: %d (%d)\n", fd, errno); 658 close(fd); 659 fd = -1; 660 break; 661 } 662 663 enable_zcopy_impl_opts = impl_opts.enable_zerocopy_send_client; 664 } 665 break; 666 } 667 freeaddrinfo(res0); 668 669 if (fd < 0) { 670 return NULL; 671 } 672 673 enable_zcopy_user_opts = opts->zcopy && !sock_is_loopback(fd); 674 sock = uring_sock_alloc(fd, &impl_opts, enable_zcopy_user_opts && enable_zcopy_impl_opts); 675 if (sock == NULL) { 676 SPDK_ERRLOG("sock allocation failed\n"); 677 close(fd); 678 return NULL; 679 } 680 681 return &sock->base; 682 } 683 684 static struct spdk_sock * 685 uring_sock_listen(const char *ip, int port, struct spdk_sock_opts *opts) 686 { 687 return uring_sock_create(ip, port, SPDK_SOCK_CREATE_LISTEN, opts); 688 } 689 690 static struct spdk_sock * 691 uring_sock_connect(const char *ip, int port, struct spdk_sock_opts *opts) 692 { 693 return uring_sock_create(ip, port, SPDK_SOCK_CREATE_CONNECT, opts); 694 } 695 696 static struct spdk_sock * 697 uring_sock_accept(struct spdk_sock *_sock) 698 { 699 struct spdk_uring_sock *sock = __uring_sock(_sock); 700 struct sockaddr_storage sa; 701 socklen_t salen; 702 int rc, fd; 703 struct spdk_uring_sock *new_sock; 704 int flag; 705 706 memset(&sa, 0, sizeof(sa)); 707 salen = sizeof(sa); 708 709 assert(sock != NULL); 710 711 rc = accept(sock->fd, (struct sockaddr *)&sa, &salen); 712 713 if (rc == -1) { 714 return NULL; 715 } 716 717 fd = rc; 718 719 flag = fcntl(fd, F_GETFL); 720 if ((flag & O_NONBLOCK) && (fcntl(fd, F_SETFL, flag & ~O_NONBLOCK) < 0)) { 721 SPDK_ERRLOG("fcntl can't set blocking mode for socket, fd: %d (%d)\n", fd, errno); 722 close(fd); 723 return NULL; 724 } 725 726 #if defined(SO_PRIORITY) 727 /* The priority is not inherited, so call this function again */ 728 if (sock->base.opts.priority) { 729 rc = setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &sock->base.opts.priority, sizeof(int)); 730 if (rc != 0) { 731 close(fd); 732 return NULL; 733 } 734 } 735 #endif 736 737 new_sock = uring_sock_alloc(fd, &sock->base.impl_opts, sock->zcopy); 738 if (new_sock == NULL) { 739 close(fd); 740 return NULL; 741 } 742 743 return &new_sock->base; 744 } 745 746 static int 747 uring_sock_close(struct spdk_sock *_sock) 748 { 749 struct spdk_uring_sock *sock = __uring_sock(_sock); 750 751 assert(TAILQ_EMPTY(&_sock->pending_reqs)); 752 assert(sock->group == NULL); 753 754 /* If the socket fails to close, the best choice is to 755 * leak the fd but continue to free the rest of the sock 756 * memory. */ 757 close(sock->fd); 758 759 spdk_pipe_destroy(sock->recv_pipe); 760 free(sock->recv_buf); 761 free(sock); 762 763 return 0; 764 } 765 766 static ssize_t 767 uring_sock_recv_from_pipe(struct spdk_uring_sock *sock, struct iovec *diov, int diovcnt) 768 { 769 struct iovec siov[2]; 770 int sbytes; 771 ssize_t bytes; 772 struct spdk_uring_sock_group_impl *group; 773 774 sbytes = spdk_pipe_reader_get_buffer(sock->recv_pipe, sock->recv_buf_sz, siov); 775 if (sbytes < 0) { 776 errno = EINVAL; 777 return -1; 778 } else if (sbytes == 0) { 779 errno = EAGAIN; 780 return -1; 781 } 782 783 bytes = spdk_iovcpy(siov, 2, diov, diovcnt); 784 785 if (bytes == 0) { 786 /* The only way this happens is if diov is 0 length */ 787 errno = EINVAL; 788 return -1; 789 } 790 791 spdk_pipe_reader_advance(sock->recv_pipe, bytes); 792 793 /* If we drained the pipe, take it off the level-triggered list */ 794 if (sock->base.group_impl && spdk_pipe_reader_bytes_available(sock->recv_pipe) == 0) { 795 group = __uring_group_impl(sock->base.group_impl); 796 TAILQ_REMOVE(&group->pending_recv, sock, link); 797 sock->pending_recv = false; 798 } 799 800 return bytes; 801 } 802 803 static inline ssize_t 804 sock_readv(int fd, struct iovec *iov, int iovcnt) 805 { 806 struct msghdr msg = { 807 .msg_iov = iov, 808 .msg_iovlen = iovcnt, 809 }; 810 811 return recvmsg(fd, &msg, MSG_DONTWAIT); 812 } 813 814 static inline ssize_t 815 uring_sock_read(struct spdk_uring_sock *sock) 816 { 817 struct iovec iov[2]; 818 int bytes; 819 struct spdk_uring_sock_group_impl *group; 820 821 bytes = spdk_pipe_writer_get_buffer(sock->recv_pipe, sock->recv_buf_sz, iov); 822 823 if (bytes > 0) { 824 bytes = sock_readv(sock->fd, iov, 2); 825 if (bytes > 0) { 826 spdk_pipe_writer_advance(sock->recv_pipe, bytes); 827 if (sock->base.group_impl && !sock->pending_recv) { 828 group = __uring_group_impl(sock->base.group_impl); 829 TAILQ_INSERT_TAIL(&group->pending_recv, sock, link); 830 sock->pending_recv = true; 831 } 832 } 833 } 834 835 return bytes; 836 } 837 838 static int 839 uring_sock_recv_next(struct spdk_sock *_sock, void **_buf, void **ctx) 840 { 841 struct spdk_uring_sock *sock = __uring_sock(_sock); 842 struct spdk_uring_sock_group_impl *group; 843 struct spdk_uring_buf_tracker *tr; 844 845 if (sock->connection_status < 0) { 846 errno = -sock->connection_status; 847 return -1; 848 } 849 850 if (sock->recv_pipe != NULL) { 851 errno = ENOTSUP; 852 return -1; 853 } 854 855 group = __uring_group_impl(_sock->group_impl); 856 857 tr = STAILQ_FIRST(&sock->recv_stream); 858 if (tr == NULL) { 859 if (sock->group->buf_ring_count > 0) { 860 /* There are buffers posted, but data hasn't arrived. */ 861 errno = EAGAIN; 862 } else { 863 /* There are no buffers posted, so this won't ever 864 * make forward progress. */ 865 errno = ENOBUFS; 866 } 867 return -1; 868 } 869 assert(sock->pending_recv == true); 870 assert(tr->buf != NULL); 871 872 *_buf = tr->buf + sock->recv_offset; 873 *ctx = tr->ctx; 874 875 STAILQ_REMOVE_HEAD(&sock->recv_stream, link); 876 STAILQ_INSERT_HEAD(&group->free_trackers, tr, link); 877 878 if (STAILQ_EMPTY(&sock->recv_stream)) { 879 sock->pending_recv = false; 880 TAILQ_REMOVE(&group->pending_recv, sock, link); 881 } 882 883 return tr->len - sock->recv_offset; 884 } 885 886 static ssize_t 887 uring_sock_readv_no_pipe(struct spdk_sock *_sock, struct iovec *iovs, int iovcnt) 888 { 889 struct spdk_uring_sock *sock = __uring_sock(_sock); 890 struct spdk_uring_buf_tracker *tr; 891 struct iovec iov; 892 ssize_t total, len; 893 int i; 894 895 if (sock->connection_status < 0) { 896 errno = -sock->connection_status; 897 return -1; 898 } 899 900 if (_sock->group_impl == NULL) { 901 /* If not in a group just read from the socket the regular way. */ 902 return sock_readv(sock->fd, iovs, iovcnt); 903 } 904 905 if (STAILQ_EMPTY(&sock->recv_stream)) { 906 if (sock->group->buf_ring_count == 0) { 907 /* If the user hasn't posted any buffers, read from the socket 908 * directly. */ 909 910 if (sock->pending_recv) { 911 sock->pending_recv = false; 912 TAILQ_REMOVE(&(__uring_group_impl(_sock->group_impl))->pending_recv, sock, link); 913 } 914 915 return sock_readv(sock->fd, iovs, iovcnt); 916 } 917 918 errno = EAGAIN; 919 return -1; 920 } 921 922 total = 0; 923 for (i = 0; i < iovcnt; i++) { 924 /* Copy to stack so we can change it */ 925 iov = iovs[i]; 926 927 tr = STAILQ_FIRST(&sock->recv_stream); 928 while (tr != NULL) { 929 len = spdk_min(iov.iov_len, tr->len - sock->recv_offset); 930 memcpy(iov.iov_base, tr->buf + sock->recv_offset, len); 931 932 total += len; 933 sock->recv_offset += len; 934 iov.iov_base += len; 935 iov.iov_len -= len; 936 937 if (sock->recv_offset == tr->len) { 938 sock->recv_offset = 0; 939 STAILQ_REMOVE_HEAD(&sock->recv_stream, link); 940 STAILQ_INSERT_HEAD(&sock->group->free_trackers, tr, link); 941 spdk_sock_group_provide_buf(sock->group->base.group, tr->buf, tr->buflen, tr->ctx); 942 tr = STAILQ_FIRST(&sock->recv_stream); 943 } 944 945 if (iov.iov_len == 0) { 946 break; 947 } 948 } 949 } 950 951 if (STAILQ_EMPTY(&sock->recv_stream)) { 952 struct spdk_uring_sock_group_impl *group; 953 954 group = __uring_group_impl(_sock->group_impl); 955 sock->pending_recv = false; 956 TAILQ_REMOVE(&group->pending_recv, sock, link); 957 } 958 959 assert(total > 0); 960 return total; 961 } 962 963 static ssize_t 964 uring_sock_readv(struct spdk_sock *_sock, struct iovec *iov, int iovcnt) 965 { 966 struct spdk_uring_sock *sock = __uring_sock(_sock); 967 int rc, i; 968 size_t len; 969 970 if (sock->connection_status < 0) { 971 errno = -sock->connection_status; 972 return -1; 973 } 974 975 if (sock->recv_pipe == NULL) { 976 return uring_sock_readv_no_pipe(_sock, iov, iovcnt); 977 } 978 979 len = 0; 980 for (i = 0; i < iovcnt; i++) { 981 len += iov[i].iov_len; 982 } 983 984 if (spdk_pipe_reader_bytes_available(sock->recv_pipe) == 0) { 985 /* If the user is receiving a sufficiently large amount of data, 986 * receive directly to their buffers. */ 987 if (len >= MIN_SOCK_PIPE_SIZE) { 988 return sock_readv(sock->fd, iov, iovcnt); 989 } 990 991 /* Otherwise, do a big read into our pipe */ 992 rc = uring_sock_read(sock); 993 if (rc <= 0) { 994 return rc; 995 } 996 } 997 998 return uring_sock_recv_from_pipe(sock, iov, iovcnt); 999 } 1000 1001 static ssize_t 1002 uring_sock_recv(struct spdk_sock *sock, void *buf, size_t len) 1003 { 1004 struct iovec iov[1]; 1005 1006 iov[0].iov_base = buf; 1007 iov[0].iov_len = len; 1008 1009 return uring_sock_readv(sock, iov, 1); 1010 } 1011 1012 static ssize_t 1013 uring_sock_writev(struct spdk_sock *_sock, struct iovec *iov, int iovcnt) 1014 { 1015 struct spdk_uring_sock *sock = __uring_sock(_sock); 1016 struct msghdr msg = { 1017 .msg_iov = iov, 1018 .msg_iovlen = iovcnt, 1019 }; 1020 1021 if (sock->write_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) { 1022 errno = EAGAIN; 1023 return -1; 1024 } 1025 1026 return sendmsg(sock->fd, &msg, MSG_DONTWAIT); 1027 } 1028 1029 static ssize_t 1030 sock_request_advance_offset(struct spdk_sock_request *req, ssize_t rc) 1031 { 1032 unsigned int offset; 1033 size_t len; 1034 int i; 1035 1036 offset = req->internal.offset; 1037 for (i = 0; i < req->iovcnt; i++) { 1038 /* Advance by the offset first */ 1039 if (offset >= SPDK_SOCK_REQUEST_IOV(req, i)->iov_len) { 1040 offset -= SPDK_SOCK_REQUEST_IOV(req, i)->iov_len; 1041 continue; 1042 } 1043 1044 /* Calculate the remaining length of this element */ 1045 len = SPDK_SOCK_REQUEST_IOV(req, i)->iov_len - offset; 1046 1047 if (len > (size_t)rc) { 1048 req->internal.offset += rc; 1049 return -1; 1050 } 1051 1052 offset = 0; 1053 req->internal.offset += len; 1054 rc -= len; 1055 } 1056 1057 return rc; 1058 } 1059 1060 static int 1061 sock_complete_write_reqs(struct spdk_sock *_sock, ssize_t rc, bool is_zcopy) 1062 { 1063 struct spdk_uring_sock *sock = __uring_sock(_sock); 1064 struct spdk_sock_request *req; 1065 int retval; 1066 1067 if (is_zcopy) { 1068 /* Handling overflow case, because we use psock->sendmsg_idx - 1 for the 1069 * req->internal.offset, so sendmsg_idx should not be zero */ 1070 if (spdk_unlikely(sock->sendmsg_idx == UINT32_MAX)) { 1071 sock->sendmsg_idx = 1; 1072 } else { 1073 sock->sendmsg_idx++; 1074 } 1075 } 1076 1077 /* Consume the requests that were actually written */ 1078 req = TAILQ_FIRST(&_sock->queued_reqs); 1079 while (req) { 1080 /* req->internal.is_zcopy is true when the whole req or part of it is sent with zerocopy */ 1081 req->internal.is_zcopy = is_zcopy; 1082 1083 rc = sock_request_advance_offset(req, rc); 1084 if (rc < 0) { 1085 /* This element was partially sent. */ 1086 return 0; 1087 } 1088 1089 /* Handled a full request. */ 1090 spdk_sock_request_pend(_sock, req); 1091 1092 if (!req->internal.is_zcopy && req == TAILQ_FIRST(&_sock->pending_reqs)) { 1093 retval = spdk_sock_request_put(_sock, req, 0); 1094 if (retval) { 1095 return retval; 1096 } 1097 } else { 1098 /* Re-use the offset field to hold the sendmsg call index. The 1099 * index is 0 based, so subtract one here because we've already 1100 * incremented above. */ 1101 req->internal.offset = sock->sendmsg_idx - 1; 1102 } 1103 1104 if (rc == 0) { 1105 break; 1106 } 1107 1108 req = TAILQ_FIRST(&_sock->queued_reqs); 1109 } 1110 1111 return 0; 1112 } 1113 1114 #ifdef SPDK_ZEROCOPY 1115 static int 1116 _sock_check_zcopy(struct spdk_sock *_sock, int status) 1117 { 1118 struct spdk_uring_sock *sock = __uring_sock(_sock); 1119 ssize_t rc; 1120 struct sock_extended_err *serr; 1121 struct cmsghdr *cm; 1122 uint32_t idx; 1123 struct spdk_sock_request *req, *treq; 1124 bool found; 1125 1126 assert(sock->zcopy == true); 1127 if (spdk_unlikely(status) < 0) { 1128 if (!TAILQ_EMPTY(&_sock->pending_reqs)) { 1129 SPDK_ERRLOG("Attempting to receive from ERRQUEUE yielded error, but pending list still has orphaned entries, status =%d\n", 1130 status); 1131 } else { 1132 SPDK_WARNLOG("Recvmsg yielded an error!\n"); 1133 } 1134 return 0; 1135 } 1136 1137 cm = CMSG_FIRSTHDR(&sock->errqueue_task.msg); 1138 if (!((cm->cmsg_level == SOL_IP && cm->cmsg_type == IP_RECVERR) || 1139 (cm->cmsg_level == SOL_IPV6 && cm->cmsg_type == IPV6_RECVERR))) { 1140 SPDK_WARNLOG("Unexpected cmsg level or type!\n"); 1141 return 0; 1142 } 1143 1144 serr = (struct sock_extended_err *)CMSG_DATA(cm); 1145 if (serr->ee_errno != 0 || serr->ee_origin != SO_EE_ORIGIN_ZEROCOPY) { 1146 SPDK_WARNLOG("Unexpected extended error origin\n"); 1147 return 0; 1148 } 1149 1150 /* Most of the time, the pending_reqs array is in the exact 1151 * order we need such that all of the requests to complete are 1152 * in order, in the front. It is guaranteed that all requests 1153 * belonging to the same sendmsg call are sequential, so once 1154 * we encounter one match we can stop looping as soon as a 1155 * non-match is found. 1156 */ 1157 for (idx = serr->ee_info; idx <= serr->ee_data; idx++) { 1158 found = false; 1159 TAILQ_FOREACH_SAFE(req, &_sock->pending_reqs, internal.link, treq) { 1160 if (!req->internal.is_zcopy) { 1161 /* This wasn't a zcopy request. It was just waiting in line to complete */ 1162 rc = spdk_sock_request_put(_sock, req, 0); 1163 if (rc < 0) { 1164 return rc; 1165 } 1166 } else if (req->internal.offset == idx) { 1167 found = true; 1168 rc = spdk_sock_request_put(_sock, req, 0); 1169 if (rc < 0) { 1170 return rc; 1171 } 1172 } else if (found) { 1173 break; 1174 } 1175 } 1176 } 1177 1178 return 0; 1179 } 1180 1181 static void 1182 _sock_prep_errqueue(struct spdk_sock *_sock) 1183 { 1184 struct spdk_uring_sock *sock = __uring_sock(_sock); 1185 struct spdk_uring_task *task = &sock->errqueue_task; 1186 struct io_uring_sqe *sqe; 1187 1188 if (task->status == SPDK_URING_SOCK_TASK_IN_PROCESS) { 1189 return; 1190 } 1191 1192 if (sock->pending_group_remove) { 1193 return; 1194 } 1195 1196 assert(sock->group != NULL); 1197 sock->group->io_queued++; 1198 1199 sqe = io_uring_get_sqe(&sock->group->uring); 1200 io_uring_prep_recvmsg(sqe, sock->fd, &task->msg, MSG_ERRQUEUE); 1201 io_uring_sqe_set_data(sqe, task); 1202 task->status = SPDK_URING_SOCK_TASK_IN_PROCESS; 1203 } 1204 1205 #endif 1206 1207 static void 1208 _sock_flush(struct spdk_sock *_sock) 1209 { 1210 struct spdk_uring_sock *sock = __uring_sock(_sock); 1211 struct spdk_uring_task *task = &sock->write_task; 1212 uint32_t iovcnt; 1213 struct io_uring_sqe *sqe; 1214 int flags; 1215 1216 if (task->status == SPDK_URING_SOCK_TASK_IN_PROCESS) { 1217 return; 1218 } 1219 1220 #ifdef SPDK_ZEROCOPY 1221 if (sock->zcopy) { 1222 flags = MSG_DONTWAIT | sock->zcopy_send_flags; 1223 } else 1224 #endif 1225 { 1226 flags = MSG_DONTWAIT; 1227 } 1228 1229 iovcnt = spdk_sock_prep_reqs(&sock->base, task->iovs, task->iov_cnt, &task->last_req, &flags); 1230 if (!iovcnt) { 1231 return; 1232 } 1233 1234 task->iov_cnt = iovcnt; 1235 assert(sock->group != NULL); 1236 task->msg.msg_iov = task->iovs; 1237 task->msg.msg_iovlen = task->iov_cnt; 1238 #ifdef SPDK_ZEROCOPY 1239 task->is_zcopy = (flags & MSG_ZEROCOPY) ? true : false; 1240 #endif 1241 sock->group->io_queued++; 1242 1243 sqe = io_uring_get_sqe(&sock->group->uring); 1244 io_uring_prep_sendmsg(sqe, sock->fd, &sock->write_task.msg, flags); 1245 io_uring_sqe_set_data(sqe, task); 1246 task->status = SPDK_URING_SOCK_TASK_IN_PROCESS; 1247 } 1248 1249 static void 1250 _sock_prep_read(struct spdk_sock *_sock) 1251 { 1252 struct spdk_uring_sock *sock = __uring_sock(_sock); 1253 struct spdk_uring_task *task = &sock->read_task; 1254 struct io_uring_sqe *sqe; 1255 1256 /* Do not prepare read event */ 1257 if (task->status == SPDK_URING_SOCK_TASK_IN_PROCESS) { 1258 return; 1259 } 1260 1261 if (sock->pending_group_remove) { 1262 return; 1263 } 1264 1265 assert(sock->group != NULL); 1266 sock->group->io_queued++; 1267 1268 sqe = io_uring_get_sqe(&sock->group->uring); 1269 io_uring_prep_recv(sqe, sock->fd, NULL, URING_MAX_RECV_SIZE, 0); 1270 sqe->buf_group = URING_BUF_GROUP_ID; 1271 sqe->flags |= IOSQE_BUFFER_SELECT; 1272 io_uring_sqe_set_data(sqe, task); 1273 task->status = SPDK_URING_SOCK_TASK_IN_PROCESS; 1274 } 1275 1276 static void 1277 _sock_prep_cancel_task(struct spdk_sock *_sock, void *user_data) 1278 { 1279 struct spdk_uring_sock *sock = __uring_sock(_sock); 1280 struct spdk_uring_task *task = &sock->cancel_task; 1281 struct io_uring_sqe *sqe; 1282 1283 if (task->status == SPDK_URING_SOCK_TASK_IN_PROCESS) { 1284 return; 1285 } 1286 1287 assert(sock->group != NULL); 1288 sock->group->io_queued++; 1289 1290 sqe = io_uring_get_sqe(&sock->group->uring); 1291 io_uring_prep_cancel(sqe, user_data, 0); 1292 io_uring_sqe_set_data(sqe, task); 1293 task->status = SPDK_URING_SOCK_TASK_IN_PROCESS; 1294 } 1295 1296 static void 1297 uring_sock_fail(struct spdk_uring_sock *sock, int status) 1298 { 1299 struct spdk_uring_sock_group_impl *group = sock->group; 1300 int rc; 1301 1302 sock->connection_status = status; 1303 rc = spdk_sock_abort_requests(&sock->base); 1304 1305 /* The user needs to be notified that this socket is dead. */ 1306 if (rc == 0 && sock->base.cb_fn != NULL && 1307 sock->pending_recv == false) { 1308 sock->pending_recv = true; 1309 TAILQ_INSERT_TAIL(&group->pending_recv, sock, link); 1310 } 1311 } 1312 1313 static int 1314 sock_uring_group_reap(struct spdk_uring_sock_group_impl *group, int max, int max_read_events, 1315 struct spdk_sock **socks) 1316 { 1317 int i, count, ret; 1318 struct io_uring_cqe *cqe; 1319 struct spdk_uring_sock *sock, *tmp; 1320 struct spdk_uring_task *task; 1321 int status, bid, flags; 1322 bool is_zcopy; 1323 1324 for (i = 0; i < max; i++) { 1325 ret = io_uring_peek_cqe(&group->uring, &cqe); 1326 if (ret != 0) { 1327 break; 1328 } 1329 1330 if (cqe == NULL) { 1331 break; 1332 } 1333 1334 task = (struct spdk_uring_task *)cqe->user_data; 1335 assert(task != NULL); 1336 sock = task->sock; 1337 assert(sock != NULL); 1338 assert(sock->group != NULL); 1339 assert(sock->group == group); 1340 sock->group->io_inflight--; 1341 sock->group->io_avail++; 1342 status = cqe->res; 1343 flags = cqe->flags; 1344 io_uring_cqe_seen(&group->uring, cqe); 1345 1346 task->status = SPDK_URING_SOCK_TASK_NOT_IN_USE; 1347 1348 switch (task->type) { 1349 case URING_TASK_READ: 1350 if (status == -EAGAIN || status == -EWOULDBLOCK) { 1351 /* This likely shouldn't happen, but would indicate that the 1352 * kernel didn't have enough resources to queue a task internally. */ 1353 _sock_prep_read(&sock->base); 1354 } else if (status == -ECANCELED) { 1355 continue; 1356 } else if (status == -ENOBUFS) { 1357 /* There's data in the socket but the user hasn't provided any buffers. 1358 * We need to notify the user that the socket has data pending. */ 1359 if (sock->base.cb_fn != NULL && 1360 sock->pending_recv == false) { 1361 sock->pending_recv = true; 1362 TAILQ_INSERT_TAIL(&group->pending_recv, sock, link); 1363 } 1364 1365 _sock_prep_read(&sock->base); 1366 } else if (spdk_unlikely(status <= 0)) { 1367 uring_sock_fail(sock, status < 0 ? status : -ECONNRESET); 1368 } else { 1369 struct spdk_uring_buf_tracker *tracker; 1370 1371 assert((flags & IORING_CQE_F_BUFFER) != 0); 1372 1373 bid = flags >> IORING_CQE_BUFFER_SHIFT; 1374 tracker = &group->trackers[bid]; 1375 1376 assert(tracker->buf != NULL); 1377 assert(tracker->len != 0); 1378 1379 /* Append this data to the stream */ 1380 tracker->len = status; 1381 STAILQ_INSERT_TAIL(&sock->recv_stream, tracker, link); 1382 assert(group->buf_ring_count > 0); 1383 group->buf_ring_count--; 1384 1385 if (sock->base.cb_fn != NULL && 1386 sock->pending_recv == false) { 1387 sock->pending_recv = true; 1388 TAILQ_INSERT_TAIL(&group->pending_recv, sock, link); 1389 } 1390 1391 _sock_prep_read(&sock->base); 1392 } 1393 break; 1394 case URING_TASK_WRITE: 1395 if (status == -EAGAIN || status == -EWOULDBLOCK || 1396 (status == -ENOBUFS && sock->zcopy) || 1397 status == -ECANCELED) { 1398 continue; 1399 } else if (spdk_unlikely(status) < 0) { 1400 uring_sock_fail(sock, status); 1401 } else { 1402 task->last_req = NULL; 1403 task->iov_cnt = 0; 1404 is_zcopy = task->is_zcopy; 1405 task->is_zcopy = false; 1406 sock_complete_write_reqs(&sock->base, status, is_zcopy); 1407 } 1408 1409 break; 1410 #ifdef SPDK_ZEROCOPY 1411 case URING_TASK_ERRQUEUE: 1412 if (status == -EAGAIN || status == -EWOULDBLOCK) { 1413 _sock_prep_errqueue(&sock->base); 1414 } else if (status == -ECANCELED) { 1415 continue; 1416 } else if (spdk_unlikely(status < 0)) { 1417 uring_sock_fail(sock, status); 1418 } else { 1419 _sock_check_zcopy(&sock->base, status); 1420 _sock_prep_errqueue(&sock->base); 1421 } 1422 break; 1423 #endif 1424 case URING_TASK_CANCEL: 1425 /* Do nothing */ 1426 break; 1427 default: 1428 SPDK_UNREACHABLE(); 1429 } 1430 } 1431 1432 if (!socks) { 1433 return 0; 1434 } 1435 count = 0; 1436 TAILQ_FOREACH_SAFE(sock, &group->pending_recv, link, tmp) { 1437 if (count == max_read_events) { 1438 break; 1439 } 1440 1441 /* If the socket's cb_fn is NULL, do not add it to socks array */ 1442 if (spdk_unlikely(sock->base.cb_fn == NULL)) { 1443 assert(sock->pending_recv == true); 1444 sock->pending_recv = false; 1445 TAILQ_REMOVE(&group->pending_recv, sock, link); 1446 continue; 1447 } 1448 1449 socks[count++] = &sock->base; 1450 } 1451 1452 1453 /* Cycle the pending_recv list so that each time we poll things aren't 1454 * in the same order. Say we have 6 sockets in the list, named as follows: 1455 * A B C D E F 1456 * And all 6 sockets had the poll events, but max_events is only 3. That means 1457 * psock currently points at D. We want to rearrange the list to the following: 1458 * D E F A B C 1459 * 1460 * The variables below are named according to this example to make it easier to 1461 * follow the swaps. 1462 */ 1463 if (sock != NULL) { 1464 struct spdk_uring_sock *ua, *uc, *ud, *uf; 1465 1466 /* Capture pointers to the elements we need */ 1467 ud = sock; 1468 1469 ua = TAILQ_FIRST(&group->pending_recv); 1470 if (ua == ud) { 1471 goto end; 1472 } 1473 1474 uf = TAILQ_LAST(&group->pending_recv, pending_recv_list); 1475 if (uf == ud) { 1476 TAILQ_REMOVE(&group->pending_recv, ud, link); 1477 TAILQ_INSERT_HEAD(&group->pending_recv, ud, link); 1478 goto end; 1479 } 1480 1481 uc = TAILQ_PREV(ud, pending_recv_list, link); 1482 assert(uc != NULL); 1483 1484 /* Break the link between C and D */ 1485 uc->link.tqe_next = NULL; 1486 1487 /* Connect F to A */ 1488 uf->link.tqe_next = ua; 1489 ua->link.tqe_prev = &uf->link.tqe_next; 1490 1491 /* Fix up the list first/last pointers */ 1492 group->pending_recv.tqh_first = ud; 1493 group->pending_recv.tqh_last = &uc->link.tqe_next; 1494 1495 /* D is in front of the list, make tqe prev pointer point to the head of list */ 1496 ud->link.tqe_prev = &group->pending_recv.tqh_first; 1497 } 1498 1499 end: 1500 return count; 1501 } 1502 1503 static int uring_sock_flush(struct spdk_sock *_sock); 1504 1505 static void 1506 uring_sock_writev_async(struct spdk_sock *_sock, struct spdk_sock_request *req) 1507 { 1508 struct spdk_uring_sock *sock = __uring_sock(_sock); 1509 int rc; 1510 1511 if (spdk_unlikely(sock->connection_status)) { 1512 req->cb_fn(req->cb_arg, sock->connection_status); 1513 return; 1514 } 1515 1516 spdk_sock_request_queue(_sock, req); 1517 1518 if (!sock->group) { 1519 if (_sock->queued_iovcnt >= IOV_BATCH_SIZE) { 1520 rc = uring_sock_flush(_sock); 1521 if (rc < 0 && errno != EAGAIN) { 1522 spdk_sock_abort_requests(_sock); 1523 } 1524 } 1525 } 1526 } 1527 1528 static int 1529 uring_sock_set_recvlowat(struct spdk_sock *_sock, int nbytes) 1530 { 1531 struct spdk_uring_sock *sock = __uring_sock(_sock); 1532 int val; 1533 int rc; 1534 1535 assert(sock != NULL); 1536 1537 val = nbytes; 1538 rc = setsockopt(sock->fd, SOL_SOCKET, SO_RCVLOWAT, &val, sizeof val); 1539 if (rc != 0) { 1540 return -1; 1541 } 1542 return 0; 1543 } 1544 1545 static bool 1546 uring_sock_is_ipv6(struct spdk_sock *_sock) 1547 { 1548 struct spdk_uring_sock *sock = __uring_sock(_sock); 1549 struct sockaddr_storage sa; 1550 socklen_t salen; 1551 int rc; 1552 1553 assert(sock != NULL); 1554 1555 memset(&sa, 0, sizeof sa); 1556 salen = sizeof sa; 1557 rc = getsockname(sock->fd, (struct sockaddr *) &sa, &salen); 1558 if (rc != 0) { 1559 SPDK_ERRLOG("getsockname() failed (errno=%d)\n", errno); 1560 return false; 1561 } 1562 1563 return (sa.ss_family == AF_INET6); 1564 } 1565 1566 static bool 1567 uring_sock_is_ipv4(struct spdk_sock *_sock) 1568 { 1569 struct spdk_uring_sock *sock = __uring_sock(_sock); 1570 struct sockaddr_storage sa; 1571 socklen_t salen; 1572 int rc; 1573 1574 assert(sock != NULL); 1575 1576 memset(&sa, 0, sizeof sa); 1577 salen = sizeof sa; 1578 rc = getsockname(sock->fd, (struct sockaddr *) &sa, &salen); 1579 if (rc != 0) { 1580 SPDK_ERRLOG("getsockname() failed (errno=%d)\n", errno); 1581 return false; 1582 } 1583 1584 return (sa.ss_family == AF_INET); 1585 } 1586 1587 static bool 1588 uring_sock_is_connected(struct spdk_sock *_sock) 1589 { 1590 struct spdk_uring_sock *sock = __uring_sock(_sock); 1591 uint8_t byte; 1592 int rc; 1593 1594 rc = recv(sock->fd, &byte, 1, MSG_PEEK | MSG_DONTWAIT); 1595 if (rc == 0) { 1596 return false; 1597 } 1598 1599 if (rc < 0) { 1600 if (errno == EAGAIN || errno == EWOULDBLOCK) { 1601 return true; 1602 } 1603 1604 return false; 1605 } 1606 1607 return true; 1608 } 1609 1610 static struct spdk_sock_group_impl * 1611 uring_sock_group_impl_get_optimal(struct spdk_sock *_sock, struct spdk_sock_group_impl *hint) 1612 { 1613 struct spdk_uring_sock *sock = __uring_sock(_sock); 1614 struct spdk_sock_group_impl *group; 1615 1616 if (sock->placement_id != -1) { 1617 spdk_sock_map_lookup(&g_map, sock->placement_id, &group, hint); 1618 return group; 1619 } 1620 1621 return NULL; 1622 } 1623 1624 static int 1625 uring_sock_group_impl_buf_pool_free(struct spdk_uring_sock_group_impl *group_impl) 1626 { 1627 if (group_impl->buf_ring) { 1628 io_uring_unregister_buf_ring(&group_impl->uring, URING_BUF_GROUP_ID); 1629 free(group_impl->buf_ring); 1630 } 1631 1632 free(group_impl->trackers); 1633 1634 return 0; 1635 } 1636 1637 static int 1638 uring_sock_group_impl_buf_pool_alloc(struct spdk_uring_sock_group_impl *group_impl) 1639 { 1640 struct io_uring_buf_reg buf_reg = {}; 1641 struct io_uring_buf_ring *buf_ring; 1642 int i, rc; 1643 1644 rc = posix_memalign((void **)&buf_ring, 0x1000, URING_BUF_POOL_SIZE * sizeof(struct io_uring_buf)); 1645 if (rc != 0) { 1646 /* posix_memalign returns positive errno values */ 1647 return -rc; 1648 } 1649 1650 buf_reg.ring_addr = (unsigned long long)buf_ring; 1651 buf_reg.ring_entries = URING_BUF_POOL_SIZE; 1652 buf_reg.bgid = URING_BUF_GROUP_ID; 1653 1654 rc = io_uring_register_buf_ring(&group_impl->uring, &buf_reg, 0); 1655 if (rc != 0) { 1656 free(buf_ring); 1657 return rc; 1658 } 1659 1660 group_impl->buf_ring = buf_ring; 1661 io_uring_buf_ring_init(group_impl->buf_ring); 1662 group_impl->buf_ring_count = 0; 1663 1664 group_impl->trackers = calloc(URING_BUF_POOL_SIZE, sizeof(struct spdk_uring_buf_tracker)); 1665 if (group_impl->trackers == NULL) { 1666 uring_sock_group_impl_buf_pool_free(group_impl); 1667 return -ENOMEM; 1668 } 1669 1670 STAILQ_INIT(&group_impl->free_trackers); 1671 1672 for (i = 0; i < URING_BUF_POOL_SIZE; i++) { 1673 struct spdk_uring_buf_tracker *tracker = &group_impl->trackers[i]; 1674 1675 tracker->buf = NULL; 1676 tracker->len = 0; 1677 tracker->ctx = NULL; 1678 tracker->id = i; 1679 1680 STAILQ_INSERT_TAIL(&group_impl->free_trackers, tracker, link); 1681 } 1682 1683 return 0; 1684 } 1685 1686 static struct spdk_sock_group_impl * 1687 uring_sock_group_impl_create(void) 1688 { 1689 struct spdk_uring_sock_group_impl *group_impl; 1690 1691 group_impl = calloc(1, sizeof(*group_impl)); 1692 if (group_impl == NULL) { 1693 SPDK_ERRLOG("group_impl allocation failed\n"); 1694 return NULL; 1695 } 1696 1697 group_impl->io_avail = SPDK_SOCK_GROUP_QUEUE_DEPTH; 1698 1699 if (io_uring_queue_init(SPDK_SOCK_GROUP_QUEUE_DEPTH, &group_impl->uring, 0) < 0) { 1700 SPDK_ERRLOG("uring I/O context setup failure\n"); 1701 free(group_impl); 1702 return NULL; 1703 } 1704 1705 TAILQ_INIT(&group_impl->pending_recv); 1706 1707 if (uring_sock_group_impl_buf_pool_alloc(group_impl) < 0) { 1708 SPDK_ERRLOG("Failed to create buffer ring. Your kernel is likely not new enough. " 1709 "Please switch to the POSIX sock implementation instead.\n"); 1710 io_uring_queue_exit(&group_impl->uring); 1711 free(group_impl); 1712 return NULL; 1713 } 1714 1715 if (g_spdk_uring_sock_impl_opts.enable_placement_id == PLACEMENT_CPU) { 1716 spdk_sock_map_insert(&g_map, spdk_env_get_current_core(), &group_impl->base); 1717 } 1718 1719 return &group_impl->base; 1720 } 1721 1722 static int 1723 uring_sock_group_impl_add_sock(struct spdk_sock_group_impl *_group, 1724 struct spdk_sock *_sock) 1725 { 1726 struct spdk_uring_sock *sock = __uring_sock(_sock); 1727 struct spdk_uring_sock_group_impl *group = __uring_group_impl(_group); 1728 int rc; 1729 1730 sock->group = group; 1731 sock->write_task.sock = sock; 1732 sock->write_task.type = URING_TASK_WRITE; 1733 1734 sock->read_task.sock = sock; 1735 sock->read_task.type = URING_TASK_READ; 1736 1737 sock->errqueue_task.sock = sock; 1738 sock->errqueue_task.type = URING_TASK_ERRQUEUE; 1739 sock->errqueue_task.msg.msg_control = sock->buf; 1740 sock->errqueue_task.msg.msg_controllen = sizeof(sock->buf); 1741 1742 sock->cancel_task.sock = sock; 1743 sock->cancel_task.type = URING_TASK_CANCEL; 1744 1745 /* switched from another polling group due to scheduling */ 1746 if (spdk_unlikely(sock->recv_pipe != NULL && 1747 (spdk_pipe_reader_bytes_available(sock->recv_pipe) > 0))) { 1748 assert(sock->pending_recv == false); 1749 sock->pending_recv = true; 1750 TAILQ_INSERT_TAIL(&group->pending_recv, sock, link); 1751 } 1752 1753 if (sock->placement_id != -1) { 1754 rc = spdk_sock_map_insert(&g_map, sock->placement_id, &group->base); 1755 if (rc != 0) { 1756 SPDK_ERRLOG("Failed to insert sock group into map: %d", rc); 1757 /* Do not treat this as an error. The system will continue running. */ 1758 } 1759 } 1760 1761 /* We get an async read going immediately */ 1762 _sock_prep_read(&sock->base); 1763 #ifdef SPDK_ZEROCOPY 1764 if (sock->zcopy) { 1765 _sock_prep_errqueue(_sock); 1766 } 1767 #endif 1768 1769 return 0; 1770 } 1771 1772 static void 1773 uring_sock_group_populate_buf_ring(struct spdk_uring_sock_group_impl *group) 1774 { 1775 struct spdk_uring_buf_tracker *tracker; 1776 int count, mask; 1777 1778 if (g_spdk_uring_sock_impl_opts.enable_recv_pipe) { 1779 /* If recv_pipe is enabled, we do not post buffers. */ 1780 return; 1781 } 1782 1783 /* Try to re-populate the io_uring's buffer pool using user-provided buffers */ 1784 tracker = STAILQ_FIRST(&group->free_trackers); 1785 count = 0; 1786 mask = io_uring_buf_ring_mask(URING_BUF_POOL_SIZE); 1787 while (tracker != NULL) { 1788 tracker->buflen = spdk_sock_group_get_buf(group->base.group, &tracker->buf, &tracker->ctx); 1789 if (tracker->buflen == 0) { 1790 break; 1791 } 1792 1793 assert(tracker->buf != NULL); 1794 STAILQ_REMOVE_HEAD(&group->free_trackers, link); 1795 assert(STAILQ_FIRST(&group->free_trackers) != tracker); 1796 1797 io_uring_buf_ring_add(group->buf_ring, tracker->buf, tracker->buflen, tracker->id, mask, count); 1798 count++; 1799 tracker = STAILQ_FIRST(&group->free_trackers); 1800 } 1801 1802 if (count > 0) { 1803 group->buf_ring_count += count; 1804 io_uring_buf_ring_advance(group->buf_ring, count); 1805 } 1806 } 1807 1808 static int 1809 uring_sock_group_impl_poll(struct spdk_sock_group_impl *_group, int max_events, 1810 struct spdk_sock **socks) 1811 { 1812 struct spdk_uring_sock_group_impl *group = __uring_group_impl(_group); 1813 int count, ret; 1814 int to_complete, to_submit; 1815 struct spdk_sock *_sock, *tmp; 1816 struct spdk_uring_sock *sock; 1817 1818 if (spdk_likely(socks)) { 1819 TAILQ_FOREACH_SAFE(_sock, &group->base.socks, link, tmp) { 1820 sock = __uring_sock(_sock); 1821 if (spdk_unlikely(sock->connection_status)) { 1822 continue; 1823 } 1824 _sock_flush(_sock); 1825 } 1826 } 1827 1828 /* Try to re-populate the io_uring's buffer pool using user-provided buffers */ 1829 uring_sock_group_populate_buf_ring(group); 1830 1831 to_submit = group->io_queued; 1832 1833 /* For network I/O, it cannot be set with O_DIRECT, so we do not need to call spdk_io_uring_enter */ 1834 if (to_submit > 0) { 1835 /* If there are I/O to submit, use io_uring_submit here. 1836 * It will automatically call io_uring_enter appropriately. */ 1837 ret = io_uring_submit(&group->uring); 1838 if (ret < 0) { 1839 return 1; 1840 } 1841 group->io_queued = 0; 1842 group->io_inflight += to_submit; 1843 group->io_avail -= to_submit; 1844 } 1845 1846 count = 0; 1847 to_complete = group->io_inflight; 1848 if (to_complete > 0 || !TAILQ_EMPTY(&group->pending_recv)) { 1849 count = sock_uring_group_reap(group, to_complete, max_events, socks); 1850 } 1851 1852 return count; 1853 } 1854 1855 static int 1856 uring_sock_group_impl_remove_sock(struct spdk_sock_group_impl *_group, 1857 struct spdk_sock *_sock) 1858 { 1859 struct spdk_uring_sock *sock = __uring_sock(_sock); 1860 struct spdk_uring_sock_group_impl *group = __uring_group_impl(_group); 1861 1862 sock->pending_group_remove = true; 1863 1864 if (sock->write_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) { 1865 _sock_prep_cancel_task(_sock, &sock->write_task); 1866 /* Since spdk_sock_group_remove_sock is not asynchronous interface, so 1867 * currently can use a while loop here. */ 1868 while ((sock->write_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) || 1869 (sock->cancel_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE)) { 1870 uring_sock_group_impl_poll(_group, 32, NULL); 1871 } 1872 } 1873 1874 if (sock->read_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) { 1875 _sock_prep_cancel_task(_sock, &sock->read_task); 1876 /* Since spdk_sock_group_remove_sock is not asynchronous interface, so 1877 * currently can use a while loop here. */ 1878 while ((sock->read_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) || 1879 (sock->cancel_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE)) { 1880 uring_sock_group_impl_poll(_group, 32, NULL); 1881 } 1882 } 1883 1884 if (sock->errqueue_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) { 1885 _sock_prep_cancel_task(_sock, &sock->errqueue_task); 1886 /* Since spdk_sock_group_remove_sock is not asynchronous interface, so 1887 * currently can use a while loop here. */ 1888 while ((sock->errqueue_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) || 1889 (sock->cancel_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE)) { 1890 uring_sock_group_impl_poll(_group, 32, NULL); 1891 } 1892 } 1893 1894 /* Make sure the cancelling the tasks above didn't cause sending new requests */ 1895 assert(sock->write_task.status == SPDK_URING_SOCK_TASK_NOT_IN_USE); 1896 assert(sock->read_task.status == SPDK_URING_SOCK_TASK_NOT_IN_USE); 1897 assert(sock->errqueue_task.status == SPDK_URING_SOCK_TASK_NOT_IN_USE); 1898 1899 if (sock->pending_recv) { 1900 TAILQ_REMOVE(&group->pending_recv, sock, link); 1901 sock->pending_recv = false; 1902 } 1903 assert(sock->pending_recv == false); 1904 1905 /* We have no way to handle this case. We could let the user read this 1906 * buffer, but the buffer came from a group and we have lost the association 1907 * to that so we couldn't release it. */ 1908 assert(STAILQ_EMPTY(&sock->recv_stream)); 1909 1910 if (sock->placement_id != -1) { 1911 spdk_sock_map_release(&g_map, sock->placement_id); 1912 } 1913 1914 sock->pending_group_remove = false; 1915 sock->group = NULL; 1916 return 0; 1917 } 1918 1919 static int 1920 uring_sock_group_impl_close(struct spdk_sock_group_impl *_group) 1921 { 1922 struct spdk_uring_sock_group_impl *group = __uring_group_impl(_group); 1923 1924 /* try to reap all the active I/O */ 1925 while (group->io_inflight) { 1926 uring_sock_group_impl_poll(_group, 32, NULL); 1927 } 1928 assert(group->io_inflight == 0); 1929 assert(group->io_avail == SPDK_SOCK_GROUP_QUEUE_DEPTH); 1930 1931 uring_sock_group_impl_buf_pool_free(group); 1932 1933 io_uring_queue_exit(&group->uring); 1934 1935 if (g_spdk_uring_sock_impl_opts.enable_placement_id == PLACEMENT_CPU) { 1936 spdk_sock_map_release(&g_map, spdk_env_get_current_core()); 1937 } 1938 1939 free(group); 1940 return 0; 1941 } 1942 1943 static int 1944 uring_sock_flush(struct spdk_sock *_sock) 1945 { 1946 struct spdk_uring_sock *sock = __uring_sock(_sock); 1947 struct msghdr msg = {}; 1948 struct iovec iovs[IOV_BATCH_SIZE]; 1949 int iovcnt; 1950 ssize_t rc; 1951 int flags = sock->zcopy_send_flags; 1952 int retval; 1953 bool is_zcopy = false; 1954 struct spdk_uring_task *task = &sock->errqueue_task; 1955 1956 /* Can't flush from within a callback or we end up with recursive calls */ 1957 if (_sock->cb_cnt > 0) { 1958 errno = EAGAIN; 1959 return -1; 1960 } 1961 1962 /* Can't flush while a write is already outstanding */ 1963 if (sock->write_task.status != SPDK_URING_SOCK_TASK_NOT_IN_USE) { 1964 errno = EAGAIN; 1965 return -1; 1966 } 1967 1968 /* Gather an iov */ 1969 iovcnt = spdk_sock_prep_reqs(_sock, iovs, 0, NULL, &flags); 1970 if (iovcnt == 0) { 1971 /* Nothing to send */ 1972 return 0; 1973 } 1974 1975 /* Perform the vectored write */ 1976 msg.msg_iov = iovs; 1977 msg.msg_iovlen = iovcnt; 1978 rc = sendmsg(sock->fd, &msg, flags | MSG_DONTWAIT); 1979 if (rc <= 0) { 1980 if (rc == 0 || errno == EAGAIN || errno == EWOULDBLOCK || (errno == ENOBUFS && sock->zcopy)) { 1981 errno = EAGAIN; 1982 } 1983 return -1; 1984 } 1985 1986 #ifdef SPDK_ZEROCOPY 1987 is_zcopy = flags & MSG_ZEROCOPY; 1988 #endif 1989 retval = sock_complete_write_reqs(_sock, rc, is_zcopy); 1990 if (retval < 0) { 1991 /* if the socket is closed, return to avoid heap-use-after-free error */ 1992 errno = ENOTCONN; 1993 return -1; 1994 } 1995 1996 #ifdef SPDK_ZEROCOPY 1997 /* At least do once to check zero copy case */ 1998 if (sock->zcopy && !TAILQ_EMPTY(&_sock->pending_reqs)) { 1999 retval = recvmsg(sock->fd, &task->msg, MSG_ERRQUEUE); 2000 if (retval < 0) { 2001 if (errno == EWOULDBLOCK || errno == EAGAIN) { 2002 return rc; 2003 } 2004 } 2005 _sock_check_zcopy(_sock, retval);; 2006 } 2007 #endif 2008 2009 return rc; 2010 } 2011 2012 static struct spdk_net_impl g_uring_net_impl = { 2013 .name = "uring", 2014 .getaddr = uring_sock_getaddr, 2015 .connect = uring_sock_connect, 2016 .listen = uring_sock_listen, 2017 .accept = uring_sock_accept, 2018 .close = uring_sock_close, 2019 .recv = uring_sock_recv, 2020 .readv = uring_sock_readv, 2021 .writev = uring_sock_writev, 2022 .recv_next = uring_sock_recv_next, 2023 .writev_async = uring_sock_writev_async, 2024 .flush = uring_sock_flush, 2025 .set_recvlowat = uring_sock_set_recvlowat, 2026 .set_recvbuf = uring_sock_set_recvbuf, 2027 .set_sendbuf = uring_sock_set_sendbuf, 2028 .is_ipv6 = uring_sock_is_ipv6, 2029 .is_ipv4 = uring_sock_is_ipv4, 2030 .is_connected = uring_sock_is_connected, 2031 .group_impl_get_optimal = uring_sock_group_impl_get_optimal, 2032 .group_impl_create = uring_sock_group_impl_create, 2033 .group_impl_add_sock = uring_sock_group_impl_add_sock, 2034 .group_impl_remove_sock = uring_sock_group_impl_remove_sock, 2035 .group_impl_poll = uring_sock_group_impl_poll, 2036 .group_impl_close = uring_sock_group_impl_close, 2037 .get_opts = uring_sock_impl_get_opts, 2038 .set_opts = uring_sock_impl_set_opts, 2039 }; 2040 2041 SPDK_NET_IMPL_REGISTER(uring, &g_uring_net_impl); 2042