Annotation of embedaddon/ntp/lib/isc/unix/socket.c, revision 1.1.1.1
1.1 misho 1: /*
2: * Copyright (C) 2004-2009 Internet Systems Consortium, Inc. ("ISC")
3: * Copyright (C) 1998-2003 Internet Software Consortium.
4: *
5: * Permission to use, copy, modify, and/or distribute this software for any
6: * purpose with or without fee is hereby granted, provided that the above
7: * copyright notice and this permission notice appear in all copies.
8: *
9: * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10: * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11: * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12: * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13: * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14: * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15: * PERFORMANCE OF THIS SOFTWARE.
16: */
17:
18: /* $Id: socket.c,v 1.308.12.8 2009/04/18 01:29:26 jinmei Exp $ */
19:
20: /*! \file */
21:
22: #include <config.h>
23:
24: #include <sys/param.h>
25: #include <sys/types.h>
26: #include <sys/socket.h>
27: #include <sys/stat.h>
28: #include <sys/time.h>
29: #include <sys/uio.h>
30:
31: #include <errno.h>
32: #include <fcntl.h>
33: #include <stddef.h>
34: #include <stdlib.h>
35: #include <string.h>
36: #include <unistd.h>
37:
38: #include <isc/buffer.h>
39: #include <isc/bufferlist.h>
40: #include <isc/condition.h>
41: #include <isc/formatcheck.h>
42: #include <isc/list.h>
43: #include <isc/log.h>
44: #include <isc/mem.h>
45: #include <isc/msgs.h>
46: #include <isc/mutex.h>
47: #include <isc/net.h>
48: #include <isc/once.h>
49: #include <isc/platform.h>
50: #include <isc/print.h>
51: #include <isc/region.h>
52: #include <isc/socket.h>
53: #include <isc/stats.h>
54: #include <isc/strerror.h>
55: #include <isc/task.h>
56: #include <isc/thread.h>
57: #include <isc/util.h>
58: #include <isc/xml.h>
59:
60: #ifdef ISC_PLATFORM_HAVESYSUNH
61: #include <sys/un.h>
62: #endif
63: #ifdef ISC_PLATFORM_HAVEKQUEUE
64: #include <sys/event.h>
65: #endif
66: #ifdef ISC_PLATFORM_HAVEEPOLL
67: #include <sys/epoll.h>
68: #endif
69: #ifdef ISC_PLATFORM_HAVEDEVPOLL
70: #include <sys/devpoll.h>
71: #endif
72:
73: #include "errno2result.h"
74:
75: #ifndef ISC_PLATFORM_USETHREADS
76: #include "socket_p.h"
77: #endif /* ISC_PLATFORM_USETHREADS */
78:
79: #if defined(SO_BSDCOMPAT) && defined(__linux__)
80: #include <sys/utsname.h>
81: #endif
82:
83: /*%
84: * Choose the most preferable multiplex method.
85: */
86: #ifdef ISC_PLATFORM_HAVEKQUEUE
87: #define USE_KQUEUE
88: #elif defined (ISC_PLATFORM_HAVEEPOLL)
89: #define USE_EPOLL
90: #elif defined (ISC_PLATFORM_HAVEDEVPOLL)
91: #define USE_DEVPOLL
92: typedef struct {
93: unsigned int want_read : 1,
94: want_write : 1;
95: } pollinfo_t;
96: #else
97: #define USE_SELECT
98: #endif /* ISC_PLATFORM_HAVEKQUEUE */
99:
100: #ifndef ISC_PLATFORM_USETHREADS
101: #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
102: struct isc_socketwait {
103: int nevents;
104: };
105: #elif defined (USE_SELECT)
106: struct isc_socketwait {
107: fd_set *readset;
108: fd_set *writeset;
109: int nfds;
110: int maxfd;
111: };
112: #endif /* USE_KQUEUE */
113: #endif /* !ISC_PLATFORM_USETHREADS */
114:
115: /*%
116: * Maximum number of allowable open sockets. This is also the maximum
117: * allowable socket file descriptor.
118: *
119: * Care should be taken before modifying this value for select():
120: * The API standard doesn't ensure select() accept more than (the system default
121: * of) FD_SETSIZE descriptors, and the default size should in fact be fine in
122: * the vast majority of cases. This constant should therefore be increased only
123: * when absolutely necessary and possible, i.e., the server is exhausting all
124: * available file descriptors (up to FD_SETSIZE) and the select() function
125: * and FD_xxx macros support larger values than FD_SETSIZE (which may not
126: * always by true, but we keep using some of them to ensure as much
127: * portability as possible). Note also that overall server performance
128: * may be rather worsened with a larger value of this constant due to
129: * inherent scalability problems of select().
130: *
131: * As a special note, this value shouldn't have to be touched if
132: * this is a build for an authoritative only DNS server.
133: */
134: #ifndef ISC_SOCKET_MAXSOCKETS
135: #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
136: #define ISC_SOCKET_MAXSOCKETS 4096
137: #elif defined(USE_SELECT)
138: #define ISC_SOCKET_MAXSOCKETS FD_SETSIZE
139: #endif /* USE_KQUEUE... */
140: #endif /* ISC_SOCKET_MAXSOCKETS */
141:
142: #ifdef USE_SELECT
143: /*%
144: * Mac OS X needs a special definition to support larger values in select().
145: * We always define this because a larger value can be specified run-time.
146: */
147: #ifdef __APPLE__
148: #define _DARWIN_UNLIMITED_SELECT
149: #endif /* __APPLE__ */
150: #endif /* USE_SELECT */
151:
152: #ifdef ISC_SOCKET_USE_POLLWATCH
153: /*%
154: * If this macro is defined, enable workaround for a Solaris /dev/poll kernel
155: * bug: DP_POLL ioctl could keep sleeping even if socket I/O is possible for
156: * some of the specified FD. The idea is based on the observation that it's
157: * likely for a busy server to keep receiving packets. It specifically works
158: * as follows: the socket watcher is first initialized with the state of
159: * "poll_idle". While it's in the idle state it keeps sleeping until a socket
160: * event occurs. When it wakes up for a socket I/O event, it moves to the
161: * poll_active state, and sets the poll timeout to a short period
162: * (ISC_SOCKET_POLLWATCH_TIMEOUT msec). If timeout occurs in this state, the
163: * watcher goes to the poll_checking state with the same timeout period.
164: * In this state, the watcher tries to detect whether this is a break
165: * during intermittent events or the kernel bug is triggered. If the next
166: * polling reports an event within the short period, the previous timeout is
167: * likely to be a kernel bug, and so the watcher goes back to the active state.
168: * Otherwise, it moves to the idle state again.
169: *
170: * It's not clear whether this is a thread-related bug, but since we've only
171: * seen this with threads, this workaround is used only when enabling threads.
172: */
173:
174: typedef enum { poll_idle, poll_active, poll_checking } pollstate_t;
175:
176: #ifndef ISC_SOCKET_POLLWATCH_TIMEOUT
177: #define ISC_SOCKET_POLLWATCH_TIMEOUT 10
178: #endif /* ISC_SOCKET_POLLWATCH_TIMEOUT */
179: #endif /* ISC_SOCKET_USE_POLLWATCH */
180:
181: /*%
182: * Size of per-FD lock buckets.
183: */
184: #ifdef ISC_PLATFORM_USETHREADS
185: #define FDLOCK_COUNT 1024
186: #define FDLOCK_ID(fd) ((fd) % FDLOCK_COUNT)
187: #else
188: #define FDLOCK_COUNT 1
189: #define FDLOCK_ID(fd) 0
190: #endif /* ISC_PLATFORM_USETHREADS */
191:
192: /*%
193: * Maximum number of events communicated with the kernel. There should normally
194: * be no need for having a large number.
195: */
196: #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
197: #ifndef ISC_SOCKET_MAXEVENTS
198: #define ISC_SOCKET_MAXEVENTS 64
199: #endif
200: #endif
201:
202: /*%
203: * Some systems define the socket length argument as an int, some as size_t,
204: * some as socklen_t. This is here so it can be easily changed if needed.
205: */
206: #ifndef ISC_SOCKADDR_LEN_T
207: #define ISC_SOCKADDR_LEN_T unsigned int
208: #endif
209:
210: /*%
211: * Define what the possible "soft" errors can be. These are non-fatal returns
212: * of various network related functions, like recv() and so on.
213: *
214: * For some reason, BSDI (and perhaps others) will sometimes return <0
215: * from recv() but will have errno==0. This is broken, but we have to
216: * work around it here.
217: */
218: #define SOFT_ERROR(e) ((e) == EAGAIN || \
219: (e) == EWOULDBLOCK || \
220: (e) == EINTR || \
221: (e) == 0)
222:
223: #define DLVL(x) ISC_LOGCATEGORY_GENERAL, ISC_LOGMODULE_SOCKET, ISC_LOG_DEBUG(x)
224:
225: /*!<
226: * DLVL(90) -- Function entry/exit and other tracing.
227: * DLVL(70) -- Socket "correctness" -- including returning of events, etc.
228: * DLVL(60) -- Socket data send/receive
229: * DLVL(50) -- Event tracing, including receiving/sending completion events.
230: * DLVL(20) -- Socket creation/destruction.
231: */
232: #define TRACE_LEVEL 90
233: #define CORRECTNESS_LEVEL 70
234: #define IOEVENT_LEVEL 60
235: #define EVENT_LEVEL 50
236: #define CREATION_LEVEL 20
237:
238: #define TRACE DLVL(TRACE_LEVEL)
239: #define CORRECTNESS DLVL(CORRECTNESS_LEVEL)
240: #define IOEVENT DLVL(IOEVENT_LEVEL)
241: #define EVENT DLVL(EVENT_LEVEL)
242: #define CREATION DLVL(CREATION_LEVEL)
243:
244: typedef isc_event_t intev_t;
245:
246: #define SOCKET_MAGIC ISC_MAGIC('I', 'O', 'i', 'o')
247: #define VALID_SOCKET(t) ISC_MAGIC_VALID(t, SOCKET_MAGIC)
248:
249: /*!
250: * IPv6 control information. If the socket is an IPv6 socket we want
251: * to collect the destination address and interface so the client can
252: * set them on outgoing packets.
253: */
254: #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
255: #ifndef USE_CMSG
256: #define USE_CMSG 1
257: #endif
258: #endif
259:
260: /*%
261: * NetBSD and FreeBSD can timestamp packets. XXXMLG Should we have
262: * a setsockopt() like interface to request timestamps, and if the OS
263: * doesn't do it for us, call gettimeofday() on every UDP receive?
264: */
265: #ifdef SO_TIMESTAMP
266: #ifndef USE_CMSG
267: #define USE_CMSG 1
268: #endif
269: #endif
270:
271: /*%
272: * The size to raise the receive buffer to (from BIND 8).
273: */
274: #define RCVBUFSIZE (32*1024)
275:
276: /*%
277: * The number of times a send operation is repeated if the result is EINTR.
278: */
279: #define NRETRIES 10
280:
281: struct isc_socket {
282: /* Not locked. */
283: unsigned int magic;
284: isc_socketmgr_t *manager;
285: isc_mutex_t lock;
286: isc_sockettype_t type;
287: const isc_statscounter_t *statsindex;
288:
289: /* Locked by socket lock. */
290: ISC_LINK(isc_socket_t) link;
291: unsigned int references;
292: int fd;
293: int pf;
294: char name[16];
295: void * tag;
296:
297: ISC_LIST(isc_socketevent_t) send_list;
298: ISC_LIST(isc_socketevent_t) recv_list;
299: ISC_LIST(isc_socket_newconnev_t) accept_list;
300: isc_socket_connev_t *connect_ev;
301:
302: /*
303: * Internal events. Posted when a descriptor is readable or
304: * writable. These are statically allocated and never freed.
305: * They will be set to non-purgable before use.
306: */
307: intev_t readable_ev;
308: intev_t writable_ev;
309:
310: isc_sockaddr_t peer_address; /* remote address */
311:
312: unsigned int pending_recv : 1,
313: pending_send : 1,
314: pending_accept : 1,
315: listener : 1, /* listener socket */
316: connected : 1,
317: connecting : 1, /* connect pending */
318: bound : 1; /* bound to local addr */
319:
320: #ifdef ISC_NET_RECVOVERFLOW
321: unsigned char overflow; /* used for MSG_TRUNC fake */
322: #endif
323:
324: char *recvcmsgbuf;
325: ISC_SOCKADDR_LEN_T recvcmsgbuflen;
326: char *sendcmsgbuf;
327: ISC_SOCKADDR_LEN_T sendcmsgbuflen;
328:
329: void *fdwatcharg;
330: isc_sockfdwatch_t fdwatchcb;
331: int fdwatchflags;
332: isc_task_t *fdwatchtask;
333: };
334:
335: #define SOCKET_MANAGER_MAGIC ISC_MAGIC('I', 'O', 'm', 'g')
336: #define VALID_MANAGER(m) ISC_MAGIC_VALID(m, SOCKET_MANAGER_MAGIC)
337:
338: struct isc_socketmgr {
339: /* Not locked. */
340: unsigned int magic;
341: isc_mem_t *mctx;
342: isc_mutex_t lock;
343: isc_mutex_t *fdlock;
344: isc_stats_t *stats;
345: #ifdef USE_KQUEUE
346: int kqueue_fd;
347: int nevents;
348: struct kevent *events;
349: #endif /* USE_KQUEUE */
350: #ifdef USE_EPOLL
351: int epoll_fd;
352: int nevents;
353: struct epoll_event *events;
354: #endif /* USE_EPOLL */
355: #ifdef USE_DEVPOLL
356: int devpoll_fd;
357: int nevents;
358: struct pollfd *events;
359: #endif /* USE_DEVPOLL */
360: #ifdef USE_SELECT
361: int fd_bufsize;
362: #endif /* USE_SELECT */
363: unsigned int maxsocks;
364: #ifdef ISC_PLATFORM_USETHREADS
365: int pipe_fds[2];
366: #endif
367:
368: /* Locked by fdlock. */
369: isc_socket_t **fds;
370: int *fdstate;
371: #ifdef USE_DEVPOLL
372: pollinfo_t *fdpollinfo;
373: #endif
374:
375: /* Locked by manager lock. */
376: ISC_LIST(isc_socket_t) socklist;
377: #ifdef USE_SELECT
378: fd_set *read_fds;
379: fd_set *read_fds_copy;
380: fd_set *write_fds;
381: fd_set *write_fds_copy;
382: int maxfd;
383: #endif /* USE_SELECT */
384: int reserved; /* unlocked */
385: #ifdef ISC_PLATFORM_USETHREADS
386: isc_thread_t watcher;
387: isc_condition_t shutdown_ok;
388: #else /* ISC_PLATFORM_USETHREADS */
389: unsigned int refs;
390: #endif /* ISC_PLATFORM_USETHREADS */
391: };
392:
393: #ifndef ISC_PLATFORM_USETHREADS
394: static isc_socketmgr_t *socketmgr = NULL;
395: #endif /* ISC_PLATFORM_USETHREADS */
396:
397: #define CLOSED 0 /* this one must be zero */
398: #define MANAGED 1
399: #define CLOSE_PENDING 2
400:
401: /*
402: * send() and recv() iovec counts
403: */
404: #define MAXSCATTERGATHER_SEND (ISC_SOCKET_MAXSCATTERGATHER)
405: #ifdef ISC_NET_RECVOVERFLOW
406: # define MAXSCATTERGATHER_RECV (ISC_SOCKET_MAXSCATTERGATHER + 1)
407: #else
408: # define MAXSCATTERGATHER_RECV (ISC_SOCKET_MAXSCATTERGATHER)
409: #endif
410:
411: static void send_recvdone_event(isc_socket_t *, isc_socketevent_t **);
412: static void send_senddone_event(isc_socket_t *, isc_socketevent_t **);
413: static void free_socket(isc_socket_t **);
414: static isc_result_t allocate_socket(isc_socketmgr_t *, isc_sockettype_t,
415: isc_socket_t **);
416: static void destroy(isc_socket_t **);
417: static void internal_accept(isc_task_t *, isc_event_t *);
418: static void internal_connect(isc_task_t *, isc_event_t *);
419: static void internal_recv(isc_task_t *, isc_event_t *);
420: static void internal_send(isc_task_t *, isc_event_t *);
421: static void internal_fdwatch_write(isc_task_t *, isc_event_t *);
422: static void internal_fdwatch_read(isc_task_t *, isc_event_t *);
423: static void process_cmsg(isc_socket_t *, struct msghdr *, isc_socketevent_t *);
424: static void build_msghdr_send(isc_socket_t *, isc_socketevent_t *,
425: struct msghdr *, struct iovec *, size_t *);
426: static void build_msghdr_recv(isc_socket_t *, isc_socketevent_t *,
427: struct msghdr *, struct iovec *, size_t *);
428: #ifdef ISC_PLATFORM_USETHREADS
429: static isc_boolean_t process_ctlfd(isc_socketmgr_t *manager);
430: #endif
431:
432: #define SELECT_POKE_SHUTDOWN (-1)
433: #define SELECT_POKE_NOTHING (-2)
434: #define SELECT_POKE_READ (-3)
435: #define SELECT_POKE_ACCEPT (-3) /*%< Same as _READ */
436: #define SELECT_POKE_WRITE (-4)
437: #define SELECT_POKE_CONNECT (-4) /*%< Same as _WRITE */
438: #define SELECT_POKE_CLOSE (-5)
439:
440: #define SOCK_DEAD(s) ((s)->references == 0)
441:
442: /*%
443: * Shortcut index arrays to get access to statistics counters.
444: */
445: enum {
446: STATID_OPEN = 0,
447: STATID_OPENFAIL = 1,
448: STATID_CLOSE = 2,
449: STATID_BINDFAIL = 3,
450: STATID_CONNECTFAIL = 4,
451: STATID_CONNECT = 5,
452: STATID_ACCEPTFAIL = 6,
453: STATID_ACCEPT = 7,
454: STATID_SENDFAIL = 8,
455: STATID_RECVFAIL = 9
456: };
457: static const isc_statscounter_t upd4statsindex[] = {
458: isc_sockstatscounter_udp4open,
459: isc_sockstatscounter_udp4openfail,
460: isc_sockstatscounter_udp4close,
461: isc_sockstatscounter_udp4bindfail,
462: isc_sockstatscounter_udp4connectfail,
463: isc_sockstatscounter_udp4connect,
464: -1,
465: -1,
466: isc_sockstatscounter_udp4sendfail,
467: isc_sockstatscounter_udp4recvfail
468: };
469: static const isc_statscounter_t upd6statsindex[] = {
470: isc_sockstatscounter_udp6open,
471: isc_sockstatscounter_udp6openfail,
472: isc_sockstatscounter_udp6close,
473: isc_sockstatscounter_udp6bindfail,
474: isc_sockstatscounter_udp6connectfail,
475: isc_sockstatscounter_udp6connect,
476: -1,
477: -1,
478: isc_sockstatscounter_udp6sendfail,
479: isc_sockstatscounter_udp6recvfail
480: };
481: static const isc_statscounter_t tcp4statsindex[] = {
482: isc_sockstatscounter_tcp4open,
483: isc_sockstatscounter_tcp4openfail,
484: isc_sockstatscounter_tcp4close,
485: isc_sockstatscounter_tcp4bindfail,
486: isc_sockstatscounter_tcp4connectfail,
487: isc_sockstatscounter_tcp4connect,
488: isc_sockstatscounter_tcp4acceptfail,
489: isc_sockstatscounter_tcp4accept,
490: isc_sockstatscounter_tcp4sendfail,
491: isc_sockstatscounter_tcp4recvfail
492: };
493: static const isc_statscounter_t tcp6statsindex[] = {
494: isc_sockstatscounter_tcp6open,
495: isc_sockstatscounter_tcp6openfail,
496: isc_sockstatscounter_tcp6close,
497: isc_sockstatscounter_tcp6bindfail,
498: isc_sockstatscounter_tcp6connectfail,
499: isc_sockstatscounter_tcp6connect,
500: isc_sockstatscounter_tcp6acceptfail,
501: isc_sockstatscounter_tcp6accept,
502: isc_sockstatscounter_tcp6sendfail,
503: isc_sockstatscounter_tcp6recvfail
504: };
505: static const isc_statscounter_t unixstatsindex[] = {
506: isc_sockstatscounter_unixopen,
507: isc_sockstatscounter_unixopenfail,
508: isc_sockstatscounter_unixclose,
509: isc_sockstatscounter_unixbindfail,
510: isc_sockstatscounter_unixconnectfail,
511: isc_sockstatscounter_unixconnect,
512: isc_sockstatscounter_unixacceptfail,
513: isc_sockstatscounter_unixaccept,
514: isc_sockstatscounter_unixsendfail,
515: isc_sockstatscounter_unixrecvfail
516: };
517: static const isc_statscounter_t fdwatchstatsindex[] = {
518: -1,
519: -1,
520: isc_sockstatscounter_fdwatchclose,
521: isc_sockstatscounter_fdwatchbindfail,
522: isc_sockstatscounter_fdwatchconnectfail,
523: isc_sockstatscounter_fdwatchconnect,
524: -1,
525: -1,
526: isc_sockstatscounter_fdwatchsendfail,
527: isc_sockstatscounter_fdwatchrecvfail
528: };
529:
530: static void
531: manager_log(isc_socketmgr_t *sockmgr,
532: isc_logcategory_t *category, isc_logmodule_t *module, int level,
533: const char *fmt, ...) ISC_FORMAT_PRINTF(5, 6);
534: static void
535: manager_log(isc_socketmgr_t *sockmgr,
536: isc_logcategory_t *category, isc_logmodule_t *module, int level,
537: const char *fmt, ...)
538: {
539: char msgbuf[2048];
540: va_list ap;
541:
542: if (! isc_log_wouldlog(isc_lctx, level))
543: return;
544:
545: va_start(ap, fmt);
546: vsnprintf(msgbuf, sizeof(msgbuf), fmt, ap);
547: va_end(ap);
548:
549: isc_log_write(isc_lctx, category, module, level,
550: "sockmgr %p: %s", sockmgr, msgbuf);
551: }
552:
553: static void
554: socket_log(isc_socket_t *sock, isc_sockaddr_t *address,
555: isc_logcategory_t *category, isc_logmodule_t *module, int level,
556: isc_msgcat_t *msgcat, int msgset, int message,
557: const char *fmt, ...) ISC_FORMAT_PRINTF(9, 10);
558: static void
559: socket_log(isc_socket_t *sock, isc_sockaddr_t *address,
560: isc_logcategory_t *category, isc_logmodule_t *module, int level,
561: isc_msgcat_t *msgcat, int msgset, int message,
562: const char *fmt, ...)
563: {
564: char msgbuf[2048];
565: char peerbuf[ISC_SOCKADDR_FORMATSIZE];
566: va_list ap;
567:
568: if (! isc_log_wouldlog(isc_lctx, level))
569: return;
570:
571: va_start(ap, fmt);
572: vsnprintf(msgbuf, sizeof(msgbuf), fmt, ap);
573: va_end(ap);
574:
575: if (address == NULL) {
576: isc_log_iwrite(isc_lctx, category, module, level,
577: msgcat, msgset, message,
578: "socket %p: %s", sock, msgbuf);
579: } else {
580: isc_sockaddr_format(address, peerbuf, sizeof(peerbuf));
581: isc_log_iwrite(isc_lctx, category, module, level,
582: msgcat, msgset, message,
583: "socket %p %s: %s", sock, peerbuf, msgbuf);
584: }
585: }
586:
587: #if defined(_AIX) && defined(ISC_NET_BSD44MSGHDR) && \
588: defined(USE_CMSG) && defined(IPV6_RECVPKTINFO)
589: /*
590: * AIX has a kernel bug where IPV6_RECVPKTINFO gets cleared by
591: * setting IPV6_V6ONLY.
592: */
593: static void
594: FIX_IPV6_RECVPKTINFO(isc_socket_t *sock)
595: {
596: char strbuf[ISC_STRERRORSIZE];
597: int on = 1;
598:
599: if (sock->pf != AF_INET6 || sock->type != isc_sockettype_udp)
600: return;
601:
602: if (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_RECVPKTINFO,
603: (void *)&on, sizeof(on)) < 0) {
604:
605: UNEXPECTED_ERROR(__FILE__, __LINE__,
606: "setsockopt(%d, IPV6_RECVPKTINFO) "
607: "%s: %s", sock->fd,
608: isc_msgcat_get(isc_msgcat,
609: ISC_MSGSET_GENERAL,
610: ISC_MSG_FAILED,
611: "failed"),
612: strbuf);
613: }
614: }
615: #else
616: #define FIX_IPV6_RECVPKTINFO(sock) (void)0
617: #endif
618:
619: /*%
620: * Increment socket-related statistics counters.
621: */
622: static inline void
623: inc_stats(isc_stats_t *stats, isc_statscounter_t counterid) {
624: REQUIRE(counterid != -1);
625:
626: if (stats != NULL)
627: isc_stats_increment(stats, counterid);
628: }
629:
630: static inline isc_result_t
631: watch_fd(isc_socketmgr_t *manager, int fd, int msg) {
632: isc_result_t result = ISC_R_SUCCESS;
633:
634: #ifdef USE_KQUEUE
635: struct kevent evchange;
636:
637: memset(&evchange, 0, sizeof(evchange));
638: if (msg == SELECT_POKE_READ)
639: evchange.filter = EVFILT_READ;
640: else
641: evchange.filter = EVFILT_WRITE;
642: evchange.flags = EV_ADD;
643: evchange.ident = fd;
644: if (kevent(manager->kqueue_fd, &evchange, 1, NULL, 0, NULL) != 0)
645: result = isc__errno2result(errno);
646:
647: return (result);
648: #elif defined(USE_EPOLL)
649: struct epoll_event event;
650:
651: if (msg == SELECT_POKE_READ)
652: event.events = EPOLLIN;
653: else
654: event.events = EPOLLOUT;
655: event.data.fd = fd;
656: if (epoll_ctl(manager->epoll_fd, EPOLL_CTL_ADD, fd, &event) == -1 &&
657: errno != EEXIST) {
658: result = isc__errno2result(errno);
659: }
660:
661: return (result);
662: #elif defined(USE_DEVPOLL)
663: struct pollfd pfd;
664: int lockid = FDLOCK_ID(fd);
665:
666: memset(&pfd, 0, sizeof(pfd));
667: if (msg == SELECT_POKE_READ)
668: pfd.events = POLLIN;
669: else
670: pfd.events = POLLOUT;
671: pfd.fd = fd;
672: pfd.revents = 0;
673: LOCK(&manager->fdlock[lockid]);
674: if (write(manager->devpoll_fd, &pfd, sizeof(pfd)) == -1)
675: result = isc__errno2result(errno);
676: else {
677: if (msg == SELECT_POKE_READ)
678: manager->fdpollinfo[fd].want_read = 1;
679: else
680: manager->fdpollinfo[fd].want_write = 1;
681: }
682: UNLOCK(&manager->fdlock[lockid]);
683:
684: return (result);
685: #elif defined(USE_SELECT)
686: LOCK(&manager->lock);
687: if (msg == SELECT_POKE_READ)
688: FD_SET(fd, manager->read_fds);
689: if (msg == SELECT_POKE_WRITE)
690: FD_SET(fd, manager->write_fds);
691: UNLOCK(&manager->lock);
692:
693: return (result);
694: #endif
695: }
696:
697: static inline isc_result_t
698: unwatch_fd(isc_socketmgr_t *manager, int fd, int msg) {
699: isc_result_t result = ISC_R_SUCCESS;
700:
701: #ifdef USE_KQUEUE
702: struct kevent evchange;
703:
704: memset(&evchange, 0, sizeof(evchange));
705: if (msg == SELECT_POKE_READ)
706: evchange.filter = EVFILT_READ;
707: else
708: evchange.filter = EVFILT_WRITE;
709: evchange.flags = EV_DELETE;
710: evchange.ident = fd;
711: if (kevent(manager->kqueue_fd, &evchange, 1, NULL, 0, NULL) != 0)
712: result = isc__errno2result(errno);
713:
714: return (result);
715: #elif defined(USE_EPOLL)
716: struct epoll_event event;
717:
718: if (msg == SELECT_POKE_READ)
719: event.events = EPOLLIN;
720: else
721: event.events = EPOLLOUT;
722: event.data.fd = fd;
723: if (epoll_ctl(manager->epoll_fd, EPOLL_CTL_DEL, fd, &event) == -1 &&
724: errno != ENOENT) {
725: char strbuf[ISC_STRERRORSIZE];
726: isc__strerror(errno, strbuf, sizeof(strbuf));
727: UNEXPECTED_ERROR(__FILE__, __LINE__,
728: "epoll_ctl(DEL), %d: %s", fd, strbuf);
729: result = ISC_R_UNEXPECTED;
730: }
731: return (result);
732: #elif defined(USE_DEVPOLL)
733: struct pollfd pfds[2];
734: size_t writelen = sizeof(pfds[0]);
735: int lockid = FDLOCK_ID(fd);
736:
737: memset(pfds, 0, sizeof(pfds));
738: pfds[0].events = POLLREMOVE;
739: pfds[0].fd = fd;
740:
741: /*
742: * Canceling read or write polling via /dev/poll is tricky. Since it
743: * only provides a way of canceling per FD, we may need to re-poll the
744: * socket for the other operation.
745: */
746: LOCK(&manager->fdlock[lockid]);
747: if (msg == SELECT_POKE_READ &&
748: manager->fdpollinfo[fd].want_write == 1) {
749: pfds[1].events = POLLOUT;
750: pfds[1].fd = fd;
751: writelen += sizeof(pfds[1]);
752: }
753: if (msg == SELECT_POKE_WRITE &&
754: manager->fdpollinfo[fd].want_read == 1) {
755: pfds[1].events = POLLIN;
756: pfds[1].fd = fd;
757: writelen += sizeof(pfds[1]);
758: }
759:
760: if (write(manager->devpoll_fd, pfds, writelen) == -1)
761: result = isc__errno2result(errno);
762: else {
763: if (msg == SELECT_POKE_READ)
764: manager->fdpollinfo[fd].want_read = 0;
765: else
766: manager->fdpollinfo[fd].want_write = 0;
767: }
768: UNLOCK(&manager->fdlock[lockid]);
769:
770: return (result);
771: #elif defined(USE_SELECT)
772: LOCK(&manager->lock);
773: if (msg == SELECT_POKE_READ)
774: FD_CLR(fd, manager->read_fds);
775: else if (msg == SELECT_POKE_WRITE)
776: FD_CLR(fd, manager->write_fds);
777: UNLOCK(&manager->lock);
778:
779: return (result);
780: #endif
781: }
782:
783: static void
784: wakeup_socket(isc_socketmgr_t *manager, int fd, int msg) {
785: isc_result_t result;
786: int lockid = FDLOCK_ID(fd);
787:
788: /*
789: * This is a wakeup on a socket. If the socket is not in the
790: * process of being closed, start watching it for either reads
791: * or writes.
792: */
793:
794: INSIST(fd >= 0 && fd < (int)manager->maxsocks);
795:
796: if (msg == SELECT_POKE_CLOSE) {
797: /* No one should be updating fdstate, so no need to lock it */
798: INSIST(manager->fdstate[fd] == CLOSE_PENDING);
799: manager->fdstate[fd] = CLOSED;
800: (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
801: (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
802: (void)close(fd);
803: return;
804: }
805:
806: LOCK(&manager->fdlock[lockid]);
807: if (manager->fdstate[fd] == CLOSE_PENDING) {
808: UNLOCK(&manager->fdlock[lockid]);
809:
810: /*
811: * We accept (and ignore) any error from unwatch_fd() as we are
812: * closing the socket, hoping it doesn't leave dangling state in
813: * the kernel.
814: * Note that unwatch_fd() must be called after releasing the
815: * fdlock; otherwise it could cause deadlock due to a lock order
816: * reversal.
817: */
818: (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
819: (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
820: return;
821: }
822: if (manager->fdstate[fd] != MANAGED) {
823: UNLOCK(&manager->fdlock[lockid]);
824: return;
825: }
826: UNLOCK(&manager->fdlock[lockid]);
827:
828: /*
829: * Set requested bit.
830: */
831: result = watch_fd(manager, fd, msg);
832: if (result != ISC_R_SUCCESS) {
833: /*
834: * XXXJT: what should we do? Ignoring the failure of watching
835: * a socket will make the application dysfunctional, but there
836: * seems to be no reasonable recovery process.
837: */
838: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
839: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
840: "failed to start watching FD (%d): %s",
841: fd, isc_result_totext(result));
842: }
843: }
844:
845: #ifdef ISC_PLATFORM_USETHREADS
846: /*
847: * Poke the select loop when there is something for us to do.
848: * The write is required (by POSIX) to complete. That is, we
849: * will not get partial writes.
850: */
851: static void
852: select_poke(isc_socketmgr_t *mgr, int fd, int msg) {
853: int cc;
854: int buf[2];
855: char strbuf[ISC_STRERRORSIZE];
856:
857: buf[0] = fd;
858: buf[1] = msg;
859:
860: do {
861: cc = write(mgr->pipe_fds[1], buf, sizeof(buf));
862: #ifdef ENOSR
863: /*
864: * Treat ENOSR as EAGAIN but loop slowly as it is
865: * unlikely to clear fast.
866: */
867: if (cc < 0 && errno == ENOSR) {
868: sleep(1);
869: errno = EAGAIN;
870: }
871: #endif
872: } while (cc < 0 && SOFT_ERROR(errno));
873:
874: if (cc < 0) {
875: isc__strerror(errno, strbuf, sizeof(strbuf));
876: FATAL_ERROR(__FILE__, __LINE__,
877: isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
878: ISC_MSG_WRITEFAILED,
879: "write() failed "
880: "during watcher poke: %s"),
881: strbuf);
882: }
883:
884: INSIST(cc == sizeof(buf));
885: }
886:
887: /*
888: * Read a message on the internal fd.
889: */
890: static void
891: select_readmsg(isc_socketmgr_t *mgr, int *fd, int *msg) {
892: int buf[2];
893: int cc;
894: char strbuf[ISC_STRERRORSIZE];
895:
896: cc = read(mgr->pipe_fds[0], buf, sizeof(buf));
897: if (cc < 0) {
898: *msg = SELECT_POKE_NOTHING;
899: *fd = -1; /* Silence compiler. */
900: if (SOFT_ERROR(errno))
901: return;
902:
903: isc__strerror(errno, strbuf, sizeof(strbuf));
904: FATAL_ERROR(__FILE__, __LINE__,
905: isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
906: ISC_MSG_READFAILED,
907: "read() failed "
908: "during watcher poke: %s"),
909: strbuf);
910:
911: return;
912: }
913: INSIST(cc == sizeof(buf));
914:
915: *fd = buf[0];
916: *msg = buf[1];
917: }
918: #else /* ISC_PLATFORM_USETHREADS */
919: /*
920: * Update the state of the socketmgr when something changes.
921: */
922: static void
923: select_poke(isc_socketmgr_t *manager, int fd, int msg) {
924: if (msg == SELECT_POKE_SHUTDOWN)
925: return;
926: else if (fd >= 0)
927: wakeup_socket(manager, fd, msg);
928: return;
929: }
930: #endif /* ISC_PLATFORM_USETHREADS */
931:
932: /*
933: * Make a fd non-blocking.
934: */
935: static isc_result_t
936: make_nonblock(int fd) {
937: int ret;
938: int flags;
939: char strbuf[ISC_STRERRORSIZE];
940: #ifdef USE_FIONBIO_IOCTL
941: int on = 1;
942:
943: ret = ioctl(fd, FIONBIO, (char *)&on);
944: #else
945: flags = fcntl(fd, F_GETFL, 0);
946: flags |= PORT_NONBLOCK;
947: ret = fcntl(fd, F_SETFL, flags);
948: #endif
949:
950: if (ret == -1) {
951: isc__strerror(errno, strbuf, sizeof(strbuf));
952: UNEXPECTED_ERROR(__FILE__, __LINE__,
953: #ifdef USE_FIONBIO_IOCTL
954: "ioctl(%d, FIONBIO, &on): %s", fd,
955: #else
956: "fcntl(%d, F_SETFL, %d): %s", fd, flags,
957: #endif
958: strbuf);
959:
960: return (ISC_R_UNEXPECTED);
961: }
962:
963: return (ISC_R_SUCCESS);
964: }
965:
966: #ifdef USE_CMSG
967: /*
968: * Not all OSes support advanced CMSG macros: CMSG_LEN and CMSG_SPACE.
969: * In order to ensure as much portability as possible, we provide wrapper
970: * functions of these macros.
971: * Note that cmsg_space() could run slow on OSes that do not have
972: * CMSG_SPACE.
973: */
974: static inline ISC_SOCKADDR_LEN_T
975: cmsg_len(ISC_SOCKADDR_LEN_T len) {
976: #ifdef CMSG_LEN
977: return (CMSG_LEN(len));
978: #else
979: ISC_SOCKADDR_LEN_T hdrlen;
980:
981: /*
982: * Cast NULL so that any pointer arithmetic performed by CMSG_DATA
983: * is correct.
984: */
985: hdrlen = (ISC_SOCKADDR_LEN_T)CMSG_DATA(((struct cmsghdr *)NULL));
986: return (hdrlen + len);
987: #endif
988: }
989:
990: static inline ISC_SOCKADDR_LEN_T
991: cmsg_space(ISC_SOCKADDR_LEN_T len) {
992: #ifdef CMSG_SPACE
993: return (CMSG_SPACE(len));
994: #else
995: struct msghdr msg;
996: struct cmsghdr *cmsgp;
997: /*
998: * XXX: The buffer length is an ad-hoc value, but should be enough
999: * in a practical sense.
1000: */
1001: char dummybuf[sizeof(struct cmsghdr) + 1024];
1002:
1003: memset(&msg, 0, sizeof(msg));
1004: msg.msg_control = dummybuf;
1005: msg.msg_controllen = sizeof(dummybuf);
1006:
1007: cmsgp = (struct cmsghdr *)dummybuf;
1008: cmsgp->cmsg_len = cmsg_len(len);
1009:
1010: cmsgp = CMSG_NXTHDR(&msg, cmsgp);
1011: if (cmsgp != NULL)
1012: return ((char *)cmsgp - (char *)msg.msg_control);
1013: else
1014: return (0);
1015: #endif
1016: }
1017: #endif /* USE_CMSG */
1018:
1019: /*
1020: * Process control messages received on a socket.
1021: */
1022: static void
1023: process_cmsg(isc_socket_t *sock, struct msghdr *msg, isc_socketevent_t *dev) {
1024: #ifdef USE_CMSG
1025: struct cmsghdr *cmsgp;
1026: #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1027: struct in6_pktinfo *pktinfop;
1028: #endif
1029: #ifdef SO_TIMESTAMP
1030: struct timeval *timevalp;
1031: #endif
1032: #endif
1033:
1034: /*
1035: * sock is used only when ISC_NET_BSD44MSGHDR and USE_CMSG are defined.
1036: * msg and dev are used only when ISC_NET_BSD44MSGHDR is defined.
1037: * They are all here, outside of the CPP tests, because it is
1038: * more consistent with the usual ISC coding style.
1039: */
1040: UNUSED(sock);
1041: UNUSED(msg);
1042: UNUSED(dev);
1043:
1044: #ifdef ISC_NET_BSD44MSGHDR
1045:
1046: #ifdef MSG_TRUNC
1047: if ((msg->msg_flags & MSG_TRUNC) == MSG_TRUNC)
1048: dev->attributes |= ISC_SOCKEVENTATTR_TRUNC;
1049: #endif
1050:
1051: #ifdef MSG_CTRUNC
1052: if ((msg->msg_flags & MSG_CTRUNC) == MSG_CTRUNC)
1053: dev->attributes |= ISC_SOCKEVENTATTR_CTRUNC;
1054: #endif
1055:
1056: #ifndef USE_CMSG
1057: return;
1058: #else
1059: if (msg->msg_controllen == 0U || msg->msg_control == NULL)
1060: return;
1061:
1062: #ifdef SO_TIMESTAMP
1063: timevalp = NULL;
1064: #endif
1065: #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1066: pktinfop = NULL;
1067: #endif
1068:
1069: cmsgp = CMSG_FIRSTHDR(msg);
1070: while (cmsgp != NULL) {
1071: socket_log(sock, NULL, TRACE,
1072: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_PROCESSCMSG,
1073: "processing cmsg %p", cmsgp);
1074:
1075: #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1076: if (cmsgp->cmsg_level == IPPROTO_IPV6
1077: && cmsgp->cmsg_type == IPV6_PKTINFO) {
1078:
1079: pktinfop = (struct in6_pktinfo *)CMSG_DATA(cmsgp);
1080: memcpy(&dev->pktinfo, pktinfop,
1081: sizeof(struct in6_pktinfo));
1082: dev->attributes |= ISC_SOCKEVENTATTR_PKTINFO;
1083: socket_log(sock, NULL, TRACE,
1084: isc_msgcat, ISC_MSGSET_SOCKET,
1085: ISC_MSG_IFRECEIVED,
1086: "interface received on ifindex %u",
1087: dev->pktinfo.ipi6_ifindex);
1088: if (IN6_IS_ADDR_MULTICAST(&pktinfop->ipi6_addr))
1089: dev->attributes |= ISC_SOCKEVENTATTR_MULTICAST;
1090: goto next;
1091: }
1092: #endif
1093:
1094: #ifdef SO_TIMESTAMP
1095: if (cmsgp->cmsg_level == SOL_SOCKET
1096: && cmsgp->cmsg_type == SCM_TIMESTAMP) {
1097: timevalp = (struct timeval *)CMSG_DATA(cmsgp);
1098: dev->timestamp.seconds = timevalp->tv_sec;
1099: dev->timestamp.nanoseconds = timevalp->tv_usec * 1000;
1100: dev->attributes |= ISC_SOCKEVENTATTR_TIMESTAMP;
1101: goto next;
1102: }
1103: #endif
1104:
1105: next:
1106: cmsgp = CMSG_NXTHDR(msg, cmsgp);
1107: }
1108: #endif /* USE_CMSG */
1109:
1110: #endif /* ISC_NET_BSD44MSGHDR */
1111: }
1112:
1113: /*
1114: * Construct an iov array and attach it to the msghdr passed in. This is
1115: * the SEND constructor, which will use the used region of the buffer
1116: * (if using a buffer list) or will use the internal region (if a single
1117: * buffer I/O is requested).
1118: *
1119: * Nothing can be NULL, and the done event must list at least one buffer
1120: * on the buffer linked list for this function to be meaningful.
1121: *
1122: * If write_countp != NULL, *write_countp will hold the number of bytes
1123: * this transaction can send.
1124: */
1125: static void
1126: build_msghdr_send(isc_socket_t *sock, isc_socketevent_t *dev,
1127: struct msghdr *msg, struct iovec *iov, size_t *write_countp)
1128: {
1129: unsigned int iovcount;
1130: isc_buffer_t *buffer;
1131: isc_region_t used;
1132: size_t write_count;
1133: size_t skip_count;
1134:
1135: memset(msg, 0, sizeof(*msg));
1136:
1137: if (!sock->connected) {
1138: msg->msg_name = (void *)&dev->address.type.sa;
1139: msg->msg_namelen = dev->address.length;
1140: } else {
1141: msg->msg_name = NULL;
1142: msg->msg_namelen = 0;
1143: }
1144:
1145: buffer = ISC_LIST_HEAD(dev->bufferlist);
1146: write_count = 0;
1147: iovcount = 0;
1148:
1149: /*
1150: * Single buffer I/O? Skip what we've done so far in this region.
1151: */
1152: if (buffer == NULL) {
1153: write_count = dev->region.length - dev->n;
1154: iov[0].iov_base = (void *)(dev->region.base + dev->n);
1155: iov[0].iov_len = write_count;
1156: iovcount = 1;
1157:
1158: goto config;
1159: }
1160:
1161: /*
1162: * Multibuffer I/O.
1163: * Skip the data in the buffer list that we have already written.
1164: */
1165: skip_count = dev->n;
1166: while (buffer != NULL) {
1167: REQUIRE(ISC_BUFFER_VALID(buffer));
1168: if (skip_count < isc_buffer_usedlength(buffer))
1169: break;
1170: skip_count -= isc_buffer_usedlength(buffer);
1171: buffer = ISC_LIST_NEXT(buffer, link);
1172: }
1173:
1174: while (buffer != NULL) {
1175: INSIST(iovcount < MAXSCATTERGATHER_SEND);
1176:
1177: isc_buffer_usedregion(buffer, &used);
1178:
1179: if (used.length > 0) {
1180: iov[iovcount].iov_base = (void *)(used.base
1181: + skip_count);
1182: iov[iovcount].iov_len = used.length - skip_count;
1183: write_count += (used.length - skip_count);
1184: skip_count = 0;
1185: iovcount++;
1186: }
1187: buffer = ISC_LIST_NEXT(buffer, link);
1188: }
1189:
1190: INSIST(skip_count == 0U);
1191:
1192: config:
1193: msg->msg_iov = iov;
1194: msg->msg_iovlen = iovcount;
1195:
1196: #ifdef ISC_NET_BSD44MSGHDR
1197: msg->msg_control = NULL;
1198: msg->msg_controllen = 0;
1199: msg->msg_flags = 0;
1200: #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
1201: if ((sock->type == isc_sockettype_udp)
1202: && ((dev->attributes & ISC_SOCKEVENTATTR_PKTINFO) != 0)) {
1203: struct cmsghdr *cmsgp;
1204: struct in6_pktinfo *pktinfop;
1205:
1206: socket_log(sock, NULL, TRACE,
1207: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_SENDTODATA,
1208: "sendto pktinfo data, ifindex %u",
1209: dev->pktinfo.ipi6_ifindex);
1210:
1211: msg->msg_controllen = cmsg_space(sizeof(struct in6_pktinfo));
1212: INSIST(msg->msg_controllen <= sock->sendcmsgbuflen);
1213: msg->msg_control = (void *)sock->sendcmsgbuf;
1214:
1215: cmsgp = (struct cmsghdr *)sock->sendcmsgbuf;
1216: cmsgp->cmsg_level = IPPROTO_IPV6;
1217: cmsgp->cmsg_type = IPV6_PKTINFO;
1218: cmsgp->cmsg_len = cmsg_len(sizeof(struct in6_pktinfo));
1219: pktinfop = (struct in6_pktinfo *)CMSG_DATA(cmsgp);
1220: memcpy(pktinfop, &dev->pktinfo, sizeof(struct in6_pktinfo));
1221: }
1222: #endif /* USE_CMSG && ISC_PLATFORM_HAVEIPV6 */
1223: #else /* ISC_NET_BSD44MSGHDR */
1224: msg->msg_accrights = NULL;
1225: msg->msg_accrightslen = 0;
1226: #endif /* ISC_NET_BSD44MSGHDR */
1227:
1228: if (write_countp != NULL)
1229: *write_countp = write_count;
1230: }
1231:
1232: /*
1233: * Construct an iov array and attach it to the msghdr passed in. This is
1234: * the RECV constructor, which will use the available region of the buffer
1235: * (if using a buffer list) or will use the internal region (if a single
1236: * buffer I/O is requested).
1237: *
1238: * Nothing can be NULL, and the done event must list at least one buffer
1239: * on the buffer linked list for this function to be meaningful.
1240: *
1241: * If read_countp != NULL, *read_countp will hold the number of bytes
1242: * this transaction can receive.
1243: */
1244: static void
1245: build_msghdr_recv(isc_socket_t *sock, isc_socketevent_t *dev,
1246: struct msghdr *msg, struct iovec *iov, size_t *read_countp)
1247: {
1248: unsigned int iovcount;
1249: isc_buffer_t *buffer;
1250: isc_region_t available;
1251: size_t read_count;
1252:
1253: memset(msg, 0, sizeof(struct msghdr));
1254:
1255: if (sock->type == isc_sockettype_udp) {
1256: memset(&dev->address, 0, sizeof(dev->address));
1257: #ifdef BROKEN_RECVMSG
1258: if (sock->pf == AF_INET) {
1259: msg->msg_name = (void *)&dev->address.type.sin;
1260: msg->msg_namelen = sizeof(dev->address.type.sin6);
1261: } else if (sock->pf == AF_INET6) {
1262: msg->msg_name = (void *)&dev->address.type.sin6;
1263: msg->msg_namelen = sizeof(dev->address.type.sin6);
1264: #ifdef ISC_PLATFORM_HAVESYSUNH
1265: } else if (sock->pf == AF_UNIX) {
1266: msg->msg_name = (void *)&dev->address.type.sunix;
1267: msg->msg_namelen = sizeof(dev->address.type.sunix);
1268: #endif
1269: } else {
1270: msg->msg_name = (void *)&dev->address.type.sa;
1271: msg->msg_namelen = sizeof(dev->address.type);
1272: }
1273: #else
1274: msg->msg_name = (void *)&dev->address.type.sa;
1275: msg->msg_namelen = sizeof(dev->address.type);
1276: #endif
1277: #ifdef ISC_NET_RECVOVERFLOW
1278: /* If needed, steal one iovec for overflow detection. */
1279: maxiov--;
1280: #endif
1281: } else { /* TCP */
1282: msg->msg_name = NULL;
1283: msg->msg_namelen = 0;
1284: dev->address = sock->peer_address;
1285: }
1286:
1287: buffer = ISC_LIST_HEAD(dev->bufferlist);
1288: read_count = 0;
1289:
1290: /*
1291: * Single buffer I/O? Skip what we've done so far in this region.
1292: */
1293: if (buffer == NULL) {
1294: read_count = dev->region.length - dev->n;
1295: iov[0].iov_base = (void *)(dev->region.base + dev->n);
1296: iov[0].iov_len = read_count;
1297: iovcount = 1;
1298:
1299: goto config;
1300: }
1301:
1302: /*
1303: * Multibuffer I/O.
1304: * Skip empty buffers.
1305: */
1306: while (buffer != NULL) {
1307: REQUIRE(ISC_BUFFER_VALID(buffer));
1308: if (isc_buffer_availablelength(buffer) != 0)
1309: break;
1310: buffer = ISC_LIST_NEXT(buffer, link);
1311: }
1312:
1313: iovcount = 0;
1314: while (buffer != NULL) {
1315: INSIST(iovcount < MAXSCATTERGATHER_RECV);
1316:
1317: isc_buffer_availableregion(buffer, &available);
1318:
1319: if (available.length > 0) {
1320: iov[iovcount].iov_base = (void *)(available.base);
1321: iov[iovcount].iov_len = available.length;
1322: read_count += available.length;
1323: iovcount++;
1324: }
1325: buffer = ISC_LIST_NEXT(buffer, link);
1326: }
1327:
1328: config:
1329:
1330: /*
1331: * If needed, set up to receive that one extra byte. Note that
1332: * we know there is at least one iov left, since we stole it
1333: * at the top of this function.
1334: */
1335: #ifdef ISC_NET_RECVOVERFLOW
1336: if (sock->type == isc_sockettype_udp) {
1337: iov[iovcount].iov_base = (void *)(&sock->overflow);
1338: iov[iovcount].iov_len = 1;
1339: iovcount++;
1340: }
1341: #endif
1342:
1343: msg->msg_iov = iov;
1344: msg->msg_iovlen = iovcount;
1345:
1346: #ifdef ISC_NET_BSD44MSGHDR
1347: msg->msg_control = NULL;
1348: msg->msg_controllen = 0;
1349: msg->msg_flags = 0;
1350: #if defined(USE_CMSG)
1351: if (sock->type == isc_sockettype_udp) {
1352: msg->msg_control = sock->recvcmsgbuf;
1353: msg->msg_controllen = sock->recvcmsgbuflen;
1354: }
1355: #endif /* USE_CMSG */
1356: #else /* ISC_NET_BSD44MSGHDR */
1357: msg->msg_accrights = NULL;
1358: msg->msg_accrightslen = 0;
1359: #endif /* ISC_NET_BSD44MSGHDR */
1360:
1361: if (read_countp != NULL)
1362: *read_countp = read_count;
1363: }
1364:
1365: static void
1366: set_dev_address(isc_sockaddr_t *address, isc_socket_t *sock,
1367: isc_socketevent_t *dev)
1368: {
1369: if (sock->type == isc_sockettype_udp) {
1370: if (address != NULL)
1371: dev->address = *address;
1372: else
1373: dev->address = sock->peer_address;
1374: } else if (sock->type == isc_sockettype_tcp) {
1375: INSIST(address == NULL);
1376: dev->address = sock->peer_address;
1377: }
1378: }
1379:
1380: static void
1381: destroy_socketevent(isc_event_t *event) {
1382: isc_socketevent_t *ev = (isc_socketevent_t *)event;
1383:
1384: INSIST(ISC_LIST_EMPTY(ev->bufferlist));
1385:
1386: (ev->destroy)(event);
1387: }
1388:
1389: static isc_socketevent_t *
1390: allocate_socketevent(isc_socket_t *sock, isc_eventtype_t eventtype,
1391: isc_taskaction_t action, const void *arg)
1392: {
1393: isc_socketevent_t *ev;
1394:
1395: ev = (isc_socketevent_t *)isc_event_allocate(sock->manager->mctx,
1396: sock, eventtype,
1397: action, arg,
1398: sizeof(*ev));
1399:
1400: if (ev == NULL)
1401: return (NULL);
1402:
1403: ev->result = ISC_R_UNEXPECTED;
1404: ISC_LINK_INIT(ev, ev_link);
1405: ISC_LIST_INIT(ev->bufferlist);
1406: ev->region.base = NULL;
1407: ev->n = 0;
1408: ev->offset = 0;
1409: ev->attributes = 0;
1410: ev->destroy = ev->ev_destroy;
1411: ev->ev_destroy = destroy_socketevent;
1412:
1413: return (ev);
1414: }
1415:
1416: #if defined(ISC_SOCKET_DEBUG)
1417: static void
1418: dump_msg(struct msghdr *msg) {
1419: unsigned int i;
1420:
1421: printf("MSGHDR %p\n", msg);
1422: printf("\tname %p, namelen %ld\n", msg->msg_name,
1423: (long) msg->msg_namelen);
1424: printf("\tiov %p, iovlen %ld\n", msg->msg_iov,
1425: (long) msg->msg_iovlen);
1426: for (i = 0; i < (unsigned int)msg->msg_iovlen; i++)
1427: printf("\t\t%d\tbase %p, len %ld\n", i,
1428: msg->msg_iov[i].iov_base,
1429: (long) msg->msg_iov[i].iov_len);
1430: #ifdef ISC_NET_BSD44MSGHDR
1431: printf("\tcontrol %p, controllen %ld\n", msg->msg_control,
1432: (long) msg->msg_controllen);
1433: #endif
1434: }
1435: #endif
1436:
1437: #define DOIO_SUCCESS 0 /* i/o ok, event sent */
1438: #define DOIO_SOFT 1 /* i/o ok, soft error, no event sent */
1439: #define DOIO_HARD 2 /* i/o error, event sent */
1440: #define DOIO_EOF 3 /* EOF, no event sent */
1441:
1442: static int
1443: doio_recv(isc_socket_t *sock, isc_socketevent_t *dev) {
1444: int cc;
1445: struct iovec iov[MAXSCATTERGATHER_RECV];
1446: size_t read_count;
1447: size_t actual_count;
1448: struct msghdr msghdr;
1449: isc_buffer_t *buffer;
1450: int recv_errno;
1451: char strbuf[ISC_STRERRORSIZE];
1452:
1453: build_msghdr_recv(sock, dev, &msghdr, iov, &read_count);
1454:
1455: #if defined(ISC_SOCKET_DEBUG)
1456: dump_msg(&msghdr);
1457: #endif
1458:
1459: cc = recvmsg(sock->fd, &msghdr, 0);
1460: recv_errno = errno;
1461:
1462: #if defined(ISC_SOCKET_DEBUG)
1463: dump_msg(&msghdr);
1464: #endif
1465:
1466: if (cc < 0) {
1467: if (SOFT_ERROR(recv_errno))
1468: return (DOIO_SOFT);
1469:
1470: if (isc_log_wouldlog(isc_lctx, IOEVENT_LEVEL)) {
1471: isc__strerror(recv_errno, strbuf, sizeof(strbuf));
1472: socket_log(sock, NULL, IOEVENT,
1473: isc_msgcat, ISC_MSGSET_SOCKET,
1474: ISC_MSG_DOIORECV,
1475: "doio_recv: recvmsg(%d) %d bytes, err %d/%s",
1476: sock->fd, cc, recv_errno, strbuf);
1477: }
1478:
1479: #define SOFT_OR_HARD(_system, _isc) \
1480: if (recv_errno == _system) { \
1481: if (sock->connected) { \
1482: dev->result = _isc; \
1483: inc_stats(sock->manager->stats, \
1484: sock->statsindex[STATID_RECVFAIL]); \
1485: return (DOIO_HARD); \
1486: } \
1487: return (DOIO_SOFT); \
1488: }
1489: #define ALWAYS_HARD(_system, _isc) \
1490: if (recv_errno == _system) { \
1491: dev->result = _isc; \
1492: inc_stats(sock->manager->stats, \
1493: sock->statsindex[STATID_RECVFAIL]); \
1494: return (DOIO_HARD); \
1495: }
1496:
1497: SOFT_OR_HARD(ECONNREFUSED, ISC_R_CONNREFUSED);
1498: SOFT_OR_HARD(ENETUNREACH, ISC_R_NETUNREACH);
1499: SOFT_OR_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH);
1500: SOFT_OR_HARD(EHOSTDOWN, ISC_R_HOSTDOWN);
1501: /* HPUX 11.11 can return EADDRNOTAVAIL. */
1502: SOFT_OR_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
1503: ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES);
1504: /*
1505: * HPUX returns EPROTO and EINVAL on receiving some ICMP/ICMPv6
1506: * errors.
1507: */
1508: #ifdef EPROTO
1509: SOFT_OR_HARD(EPROTO, ISC_R_HOSTUNREACH);
1510: #endif
1511: SOFT_OR_HARD(EINVAL, ISC_R_HOSTUNREACH);
1512:
1513: #undef SOFT_OR_HARD
1514: #undef ALWAYS_HARD
1515:
1516: dev->result = isc__errno2result(recv_errno);
1517: inc_stats(sock->manager->stats,
1518: sock->statsindex[STATID_RECVFAIL]);
1519: return (DOIO_HARD);
1520: }
1521:
1522: /*
1523: * On TCP, zero length reads indicate EOF, while on
1524: * UDP, zero length reads are perfectly valid, although
1525: * strange.
1526: */
1527: if ((sock->type == isc_sockettype_tcp) && (cc == 0))
1528: return (DOIO_EOF);
1529:
1530: if (sock->type == isc_sockettype_udp) {
1531: dev->address.length = msghdr.msg_namelen;
1532: if (isc_sockaddr_getport(&dev->address) == 0) {
1533: if (isc_log_wouldlog(isc_lctx, IOEVENT_LEVEL)) {
1534: socket_log(sock, &dev->address, IOEVENT,
1535: isc_msgcat, ISC_MSGSET_SOCKET,
1536: ISC_MSG_ZEROPORT,
1537: "dropping source port zero packet");
1538: }
1539: return (DOIO_SOFT);
1540: }
1541: }
1542:
1543: socket_log(sock, &dev->address, IOEVENT,
1544: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_PKTRECV,
1545: "packet received correctly");
1546:
1547: /*
1548: * Overflow bit detection. If we received MORE bytes than we should,
1549: * this indicates an overflow situation. Set the flag in the
1550: * dev entry and adjust how much we read by one.
1551: */
1552: #ifdef ISC_NET_RECVOVERFLOW
1553: if ((sock->type == isc_sockettype_udp) && ((size_t)cc > read_count)) {
1554: dev->attributes |= ISC_SOCKEVENTATTR_TRUNC;
1555: cc--;
1556: }
1557: #endif
1558:
1559: /*
1560: * If there are control messages attached, run through them and pull
1561: * out the interesting bits.
1562: */
1563: if (sock->type == isc_sockettype_udp)
1564: process_cmsg(sock, &msghdr, dev);
1565:
1566: /*
1567: * update the buffers (if any) and the i/o count
1568: */
1569: dev->n += cc;
1570: actual_count = cc;
1571: buffer = ISC_LIST_HEAD(dev->bufferlist);
1572: while (buffer != NULL && actual_count > 0U) {
1573: REQUIRE(ISC_BUFFER_VALID(buffer));
1574: if (isc_buffer_availablelength(buffer) <= actual_count) {
1575: actual_count -= isc_buffer_availablelength(buffer);
1576: isc_buffer_add(buffer,
1577: isc_buffer_availablelength(buffer));
1578: } else {
1579: isc_buffer_add(buffer, actual_count);
1580: actual_count = 0;
1581: break;
1582: }
1583: buffer = ISC_LIST_NEXT(buffer, link);
1584: if (buffer == NULL) {
1585: INSIST(actual_count == 0U);
1586: }
1587: }
1588:
1589: /*
1590: * If we read less than we expected, update counters,
1591: * and let the upper layer poke the descriptor.
1592: */
1593: if (((size_t)cc != read_count) && (dev->n < dev->minimum))
1594: return (DOIO_SOFT);
1595:
1596: /*
1597: * Full reads are posted, or partials if partials are ok.
1598: */
1599: dev->result = ISC_R_SUCCESS;
1600: return (DOIO_SUCCESS);
1601: }
1602:
1603: /*
1604: * Returns:
1605: * DOIO_SUCCESS The operation succeeded. dev->result contains
1606: * ISC_R_SUCCESS.
1607: *
1608: * DOIO_HARD A hard or unexpected I/O error was encountered.
1609: * dev->result contains the appropriate error.
1610: *
1611: * DOIO_SOFT A soft I/O error was encountered. No senddone
1612: * event was sent. The operation should be retried.
1613: *
1614: * No other return values are possible.
1615: */
1616: static int
1617: doio_send(isc_socket_t *sock, isc_socketevent_t *dev) {
1618: int cc;
1619: struct iovec iov[MAXSCATTERGATHER_SEND];
1620: size_t write_count;
1621: struct msghdr msghdr;
1622: char addrbuf[ISC_SOCKADDR_FORMATSIZE];
1623: int attempts = 0;
1624: int send_errno;
1625: char strbuf[ISC_STRERRORSIZE];
1626:
1627: build_msghdr_send(sock, dev, &msghdr, iov, &write_count);
1628:
1629: resend:
1630: cc = sendmsg(sock->fd, &msghdr, 0);
1631: send_errno = errno;
1632:
1633: /*
1634: * Check for error or block condition.
1635: */
1636: if (cc < 0) {
1637: if (send_errno == EINTR && ++attempts < NRETRIES)
1638: goto resend;
1639:
1640: if (SOFT_ERROR(send_errno))
1641: return (DOIO_SOFT);
1642:
1643: #define SOFT_OR_HARD(_system, _isc) \
1644: if (send_errno == _system) { \
1645: if (sock->connected) { \
1646: dev->result = _isc; \
1647: inc_stats(sock->manager->stats, \
1648: sock->statsindex[STATID_SENDFAIL]); \
1649: return (DOIO_HARD); \
1650: } \
1651: return (DOIO_SOFT); \
1652: }
1653: #define ALWAYS_HARD(_system, _isc) \
1654: if (send_errno == _system) { \
1655: dev->result = _isc; \
1656: inc_stats(sock->manager->stats, \
1657: sock->statsindex[STATID_SENDFAIL]); \
1658: return (DOIO_HARD); \
1659: }
1660:
1661: SOFT_OR_HARD(ECONNREFUSED, ISC_R_CONNREFUSED);
1662: ALWAYS_HARD(EACCES, ISC_R_NOPERM);
1663: ALWAYS_HARD(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
1664: ALWAYS_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
1665: ALWAYS_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH);
1666: #ifdef EHOSTDOWN
1667: ALWAYS_HARD(EHOSTDOWN, ISC_R_HOSTUNREACH);
1668: #endif
1669: ALWAYS_HARD(ENETUNREACH, ISC_R_NETUNREACH);
1670: ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES);
1671: ALWAYS_HARD(EPERM, ISC_R_HOSTUNREACH);
1672: ALWAYS_HARD(EPIPE, ISC_R_NOTCONNECTED);
1673: ALWAYS_HARD(ECONNRESET, ISC_R_CONNECTIONRESET);
1674:
1675: #undef SOFT_OR_HARD
1676: #undef ALWAYS_HARD
1677:
1678: /*
1679: * The other error types depend on whether or not the
1680: * socket is UDP or TCP. If it is UDP, some errors
1681: * that we expect to be fatal under TCP are merely
1682: * annoying, and are really soft errors.
1683: *
1684: * However, these soft errors are still returned as
1685: * a status.
1686: */
1687: isc_sockaddr_format(&dev->address, addrbuf, sizeof(addrbuf));
1688: isc__strerror(send_errno, strbuf, sizeof(strbuf));
1689: UNEXPECTED_ERROR(__FILE__, __LINE__, "internal_send: %s: %s",
1690: addrbuf, strbuf);
1691: dev->result = isc__errno2result(send_errno);
1692: inc_stats(sock->manager->stats,
1693: sock->statsindex[STATID_SENDFAIL]);
1694: return (DOIO_HARD);
1695: }
1696:
1697: if (cc == 0) {
1698: inc_stats(sock->manager->stats,
1699: sock->statsindex[STATID_SENDFAIL]);
1700: UNEXPECTED_ERROR(__FILE__, __LINE__,
1701: "doio_send: send() %s 0",
1702: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
1703: ISC_MSG_RETURNED, "returned"));
1704: }
1705:
1706: /*
1707: * If we write less than we expected, update counters, poke.
1708: */
1709: dev->n += cc;
1710: if ((size_t)cc != write_count)
1711: return (DOIO_SOFT);
1712:
1713: /*
1714: * Exactly what we wanted to write. We're done with this
1715: * entry. Post its completion event.
1716: */
1717: dev->result = ISC_R_SUCCESS;
1718: return (DOIO_SUCCESS);
1719: }
1720:
1721: /*
1722: * Kill.
1723: *
1724: * Caller must ensure that the socket is not locked and no external
1725: * references exist.
1726: */
1727: static void
1728: closesocket(isc_socketmgr_t *manager, isc_socket_t *sock, int fd) {
1729: isc_sockettype_t type = sock->type;
1730: int lockid = FDLOCK_ID(fd);
1731:
1732: /*
1733: * No one has this socket open, so the watcher doesn't have to be
1734: * poked, and the socket doesn't have to be locked.
1735: */
1736: LOCK(&manager->fdlock[lockid]);
1737: manager->fds[fd] = NULL;
1738: if (type == isc_sockettype_fdwatch)
1739: manager->fdstate[fd] = CLOSED;
1740: else
1741: manager->fdstate[fd] = CLOSE_PENDING;
1742: UNLOCK(&manager->fdlock[lockid]);
1743: if (type == isc_sockettype_fdwatch) {
1744: /*
1745: * The caller may close the socket once this function returns,
1746: * and `fd' may be reassigned for a new socket. So we do
1747: * unwatch_fd() here, rather than defer it via select_poke().
1748: * Note: this may complicate data protection among threads and
1749: * may reduce performance due to additional locks. One way to
1750: * solve this would be to dup() the watched descriptor, but we
1751: * take a simpler approach at this moment.
1752: */
1753: (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
1754: (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
1755: } else
1756: select_poke(manager, fd, SELECT_POKE_CLOSE);
1757:
1758: inc_stats(manager->stats, sock->statsindex[STATID_CLOSE]);
1759:
1760: /*
1761: * update manager->maxfd here (XXX: this should be implemented more
1762: * efficiently)
1763: */
1764: #ifdef USE_SELECT
1765: LOCK(&manager->lock);
1766: if (manager->maxfd == fd) {
1767: int i;
1768:
1769: manager->maxfd = 0;
1770: for (i = fd - 1; i >= 0; i--) {
1771: lockid = FDLOCK_ID(i);
1772:
1773: LOCK(&manager->fdlock[lockid]);
1774: if (manager->fdstate[i] == MANAGED) {
1775: manager->maxfd = i;
1776: UNLOCK(&manager->fdlock[lockid]);
1777: break;
1778: }
1779: UNLOCK(&manager->fdlock[lockid]);
1780: }
1781: #ifdef ISC_PLATFORM_USETHREADS
1782: if (manager->maxfd < manager->pipe_fds[0])
1783: manager->maxfd = manager->pipe_fds[0];
1784: #endif
1785: }
1786: UNLOCK(&manager->lock);
1787: #endif /* USE_SELECT */
1788: }
1789:
1790: static void
1791: destroy(isc_socket_t **sockp) {
1792: int fd;
1793: isc_socket_t *sock = *sockp;
1794: isc_socketmgr_t *manager = sock->manager;
1795:
1796: socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
1797: ISC_MSG_DESTROYING, "destroying");
1798:
1799: INSIST(ISC_LIST_EMPTY(sock->accept_list));
1800: INSIST(ISC_LIST_EMPTY(sock->recv_list));
1801: INSIST(ISC_LIST_EMPTY(sock->send_list));
1802: INSIST(sock->connect_ev == NULL);
1803: REQUIRE(sock->fd == -1 || sock->fd < (int)manager->maxsocks);
1804:
1805: if (sock->fd >= 0) {
1806: fd = sock->fd;
1807: sock->fd = -1;
1808: closesocket(manager, sock, fd);
1809: }
1810:
1811: LOCK(&manager->lock);
1812:
1813: ISC_LIST_UNLINK(manager->socklist, sock, link);
1814:
1815: #ifdef ISC_PLATFORM_USETHREADS
1816: if (ISC_LIST_EMPTY(manager->socklist))
1817: SIGNAL(&manager->shutdown_ok);
1818: #endif /* ISC_PLATFORM_USETHREADS */
1819:
1820: UNLOCK(&manager->lock);
1821:
1822: free_socket(sockp);
1823: }
1824:
1825: static isc_result_t
1826: allocate_socket(isc_socketmgr_t *manager, isc_sockettype_t type,
1827: isc_socket_t **socketp)
1828: {
1829: isc_socket_t *sock;
1830: isc_result_t result;
1831: ISC_SOCKADDR_LEN_T cmsgbuflen;
1832:
1833: sock = isc_mem_get(manager->mctx, sizeof(*sock));
1834:
1835: if (sock == NULL)
1836: return (ISC_R_NOMEMORY);
1837:
1838: result = ISC_R_UNEXPECTED;
1839:
1840: sock->magic = 0;
1841: sock->references = 0;
1842:
1843: sock->manager = manager;
1844: sock->type = type;
1845: sock->fd = -1;
1846: sock->statsindex = NULL;
1847:
1848: ISC_LINK_INIT(sock, link);
1849:
1850: sock->recvcmsgbuf = NULL;
1851: sock->sendcmsgbuf = NULL;
1852:
1853: /*
1854: * set up cmsg buffers
1855: */
1856: cmsgbuflen = 0;
1857: #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
1858: cmsgbuflen = cmsg_space(sizeof(struct in6_pktinfo));
1859: #endif
1860: #if defined(USE_CMSG) && defined(SO_TIMESTAMP)
1861: cmsgbuflen += cmsg_space(sizeof(struct timeval));
1862: #endif
1863: sock->recvcmsgbuflen = cmsgbuflen;
1864: if (sock->recvcmsgbuflen != 0U) {
1865: sock->recvcmsgbuf = isc_mem_get(manager->mctx, cmsgbuflen);
1866: if (sock->recvcmsgbuf == NULL)
1867: goto error;
1868: }
1869:
1870: cmsgbuflen = 0;
1871: #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
1872: cmsgbuflen = cmsg_space(sizeof(struct in6_pktinfo));
1873: #endif
1874: sock->sendcmsgbuflen = cmsgbuflen;
1875: if (sock->sendcmsgbuflen != 0U) {
1876: sock->sendcmsgbuf = isc_mem_get(manager->mctx, cmsgbuflen);
1877: if (sock->sendcmsgbuf == NULL)
1878: goto error;
1879: }
1880:
1881: memset(sock->name, 0, sizeof(sock->name));
1882: sock->tag = NULL;
1883:
1884: /*
1885: * set up list of readers and writers to be initially empty
1886: */
1887: ISC_LIST_INIT(sock->recv_list);
1888: ISC_LIST_INIT(sock->send_list);
1889: ISC_LIST_INIT(sock->accept_list);
1890: sock->connect_ev = NULL;
1891: sock->pending_recv = 0;
1892: sock->pending_send = 0;
1893: sock->pending_accept = 0;
1894: sock->listener = 0;
1895: sock->connected = 0;
1896: sock->connecting = 0;
1897: sock->bound = 0;
1898:
1899: /*
1900: * initialize the lock
1901: */
1902: result = isc_mutex_init(&sock->lock);
1903: if (result != ISC_R_SUCCESS) {
1904: sock->magic = 0;
1905: goto error;
1906: }
1907:
1908: /*
1909: * Initialize readable and writable events
1910: */
1911: ISC_EVENT_INIT(&sock->readable_ev, sizeof(intev_t),
1912: ISC_EVENTATTR_NOPURGE, NULL, ISC_SOCKEVENT_INTR,
1913: NULL, sock, sock, NULL, NULL);
1914: ISC_EVENT_INIT(&sock->writable_ev, sizeof(intev_t),
1915: ISC_EVENTATTR_NOPURGE, NULL, ISC_SOCKEVENT_INTW,
1916: NULL, sock, sock, NULL, NULL);
1917:
1918: sock->magic = SOCKET_MAGIC;
1919: *socketp = sock;
1920:
1921: return (ISC_R_SUCCESS);
1922:
1923: error:
1924: if (sock->recvcmsgbuf != NULL)
1925: isc_mem_put(manager->mctx, sock->recvcmsgbuf,
1926: sock->recvcmsgbuflen);
1927: if (sock->sendcmsgbuf != NULL)
1928: isc_mem_put(manager->mctx, sock->sendcmsgbuf,
1929: sock->sendcmsgbuflen);
1930: isc_mem_put(manager->mctx, sock, sizeof(*sock));
1931:
1932: return (result);
1933: }
1934:
1935: /*
1936: * This event requires that the various lists be empty, that the reference
1937: * count be 1, and that the magic number is valid. The other socket bits,
1938: * like the lock, must be initialized as well. The fd associated must be
1939: * marked as closed, by setting it to -1 on close, or this routine will
1940: * also close the socket.
1941: */
1942: static void
1943: free_socket(isc_socket_t **socketp) {
1944: isc_socket_t *sock = *socketp;
1945:
1946: INSIST(sock->references == 0);
1947: INSIST(VALID_SOCKET(sock));
1948: INSIST(!sock->connecting);
1949: INSIST(!sock->pending_recv);
1950: INSIST(!sock->pending_send);
1951: INSIST(!sock->pending_accept);
1952: INSIST(ISC_LIST_EMPTY(sock->recv_list));
1953: INSIST(ISC_LIST_EMPTY(sock->send_list));
1954: INSIST(ISC_LIST_EMPTY(sock->accept_list));
1955: INSIST(!ISC_LINK_LINKED(sock, link));
1956:
1957: if (sock->recvcmsgbuf != NULL)
1958: isc_mem_put(sock->manager->mctx, sock->recvcmsgbuf,
1959: sock->recvcmsgbuflen);
1960: if (sock->sendcmsgbuf != NULL)
1961: isc_mem_put(sock->manager->mctx, sock->sendcmsgbuf,
1962: sock->sendcmsgbuflen);
1963:
1964: sock->magic = 0;
1965:
1966: DESTROYLOCK(&sock->lock);
1967:
1968: isc_mem_put(sock->manager->mctx, sock, sizeof(*sock));
1969:
1970: *socketp = NULL;
1971: }
1972:
1973: #ifdef SO_BSDCOMPAT
1974: /*
1975: * This really should not be necessary to do. Having to workout
1976: * which kernel version we are on at run time so that we don't cause
1977: * the kernel to issue a warning about us using a deprecated socket option.
1978: * Such warnings should *never* be on by default in production kernels.
1979: *
1980: * We can't do this a build time because executables are moved between
1981: * machines and hence kernels.
1982: *
1983: * We can't just not set SO_BSDCOMAT because some kernels require it.
1984: */
1985:
1986: static isc_once_t bsdcompat_once = ISC_ONCE_INIT;
1987: isc_boolean_t bsdcompat = ISC_TRUE;
1988:
1989: static void
1990: clear_bsdcompat(void) {
1991: #ifdef __linux__
1992: struct utsname buf;
1993: char *endp;
1994: long int major;
1995: long int minor;
1996:
1997: uname(&buf); /* Can only fail if buf is bad in Linux. */
1998:
1999: /* Paranoia in parsing can be increased, but we trust uname(). */
2000: major = strtol(buf.release, &endp, 10);
2001: if (*endp == '.') {
2002: minor = strtol(endp+1, &endp, 10);
2003: if ((major > 2) || ((major == 2) && (minor >= 4))) {
2004: bsdcompat = ISC_FALSE;
2005: }
2006: }
2007: #endif /* __linux __ */
2008: }
2009: #endif
2010:
2011: static isc_result_t
2012: opensocket(isc_socketmgr_t *manager, isc_socket_t *sock) {
2013: char strbuf[ISC_STRERRORSIZE];
2014: const char *err = "socket";
2015: int tries = 0;
2016: #if defined(USE_CMSG) || defined(SO_BSDCOMPAT)
2017: int on = 1;
2018: #endif
2019: #if defined(SO_RCVBUF)
2020: ISC_SOCKADDR_LEN_T optlen;
2021: int size;
2022: #endif
2023:
2024: again:
2025: switch (sock->type) {
2026: case isc_sockettype_udp:
2027: sock->fd = socket(sock->pf, SOCK_DGRAM, IPPROTO_UDP);
2028: break;
2029: case isc_sockettype_tcp:
2030: sock->fd = socket(sock->pf, SOCK_STREAM, IPPROTO_TCP);
2031: break;
2032: case isc_sockettype_unix:
2033: sock->fd = socket(sock->pf, SOCK_STREAM, 0);
2034: break;
2035: case isc_sockettype_fdwatch:
2036: /*
2037: * We should not be called for isc_sockettype_fdwatch sockets.
2038: */
2039: INSIST(0);
2040: break;
2041: }
2042: if (sock->fd == -1 && errno == EINTR && tries++ < 42)
2043: goto again;
2044:
2045: #ifdef F_DUPFD
2046: /*
2047: * Leave a space for stdio and TCP to work in.
2048: */
2049: if (manager->reserved != 0 && sock->type == isc_sockettype_udp &&
2050: sock->fd >= 0 && sock->fd < manager->reserved) {
2051: int new, tmp;
2052: new = fcntl(sock->fd, F_DUPFD, manager->reserved);
2053: tmp = errno;
2054: (void)close(sock->fd);
2055: errno = tmp;
2056: sock->fd = new;
2057: err = "isc_socket_create: fcntl/reserved";
2058: } else if (sock->fd >= 0 && sock->fd < 20) {
2059: int new, tmp;
2060: new = fcntl(sock->fd, F_DUPFD, 20);
2061: tmp = errno;
2062: (void)close(sock->fd);
2063: errno = tmp;
2064: sock->fd = new;
2065: err = "isc_socket_create: fcntl";
2066: }
2067: #endif
2068:
2069: if (sock->fd >= (int)manager->maxsocks) {
2070: (void)close(sock->fd);
2071: isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2072: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2073: isc_msgcat, ISC_MSGSET_SOCKET,
2074: ISC_MSG_TOOMANYFDS,
2075: "socket: file descriptor exceeds limit (%d/%u)",
2076: sock->fd, manager->maxsocks);
2077: return (ISC_R_NORESOURCES);
2078: }
2079:
2080: if (sock->fd < 0) {
2081: switch (errno) {
2082: case EMFILE:
2083: case ENFILE:
2084: isc__strerror(errno, strbuf, sizeof(strbuf));
2085: isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2086: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2087: isc_msgcat, ISC_MSGSET_SOCKET,
2088: ISC_MSG_TOOMANYFDS,
2089: "%s: %s", err, strbuf);
2090: /* fallthrough */
2091: case ENOBUFS:
2092: return (ISC_R_NORESOURCES);
2093:
2094: case EPROTONOSUPPORT:
2095: case EPFNOSUPPORT:
2096: case EAFNOSUPPORT:
2097: /*
2098: * Linux 2.2 (and maybe others) return EINVAL instead of
2099: * EAFNOSUPPORT.
2100: */
2101: case EINVAL:
2102: return (ISC_R_FAMILYNOSUPPORT);
2103:
2104: default:
2105: isc__strerror(errno, strbuf, sizeof(strbuf));
2106: UNEXPECTED_ERROR(__FILE__, __LINE__,
2107: "%s() %s: %s", err,
2108: isc_msgcat_get(isc_msgcat,
2109: ISC_MSGSET_GENERAL,
2110: ISC_MSG_FAILED,
2111: "failed"),
2112: strbuf);
2113: return (ISC_R_UNEXPECTED);
2114: }
2115: }
2116:
2117: if (make_nonblock(sock->fd) != ISC_R_SUCCESS) {
2118: (void)close(sock->fd);
2119: return (ISC_R_UNEXPECTED);
2120: }
2121:
2122: #ifdef SO_BSDCOMPAT
2123: RUNTIME_CHECK(isc_once_do(&bsdcompat_once,
2124: clear_bsdcompat) == ISC_R_SUCCESS);
2125: if (sock->type != isc_sockettype_unix && bsdcompat &&
2126: setsockopt(sock->fd, SOL_SOCKET, SO_BSDCOMPAT,
2127: (void *)&on, sizeof(on)) < 0) {
2128: isc__strerror(errno, strbuf, sizeof(strbuf));
2129: UNEXPECTED_ERROR(__FILE__, __LINE__,
2130: "setsockopt(%d, SO_BSDCOMPAT) %s: %s",
2131: sock->fd,
2132: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
2133: ISC_MSG_FAILED, "failed"),
2134: strbuf);
2135: /* Press on... */
2136: }
2137: #endif
2138:
2139: #ifdef SO_NOSIGPIPE
2140: if (setsockopt(sock->fd, SOL_SOCKET, SO_NOSIGPIPE,
2141: (void *)&on, sizeof(on)) < 0) {
2142: isc__strerror(errno, strbuf, sizeof(strbuf));
2143: UNEXPECTED_ERROR(__FILE__, __LINE__,
2144: "setsockopt(%d, SO_NOSIGPIPE) %s: %s",
2145: sock->fd,
2146: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
2147: ISC_MSG_FAILED, "failed"),
2148: strbuf);
2149: /* Press on... */
2150: }
2151: #endif
2152:
2153: #if defined(USE_CMSG) || defined(SO_RCVBUF)
2154: if (sock->type == isc_sockettype_udp) {
2155:
2156: #if defined(USE_CMSG)
2157: #if defined(SO_TIMESTAMP)
2158: if (setsockopt(sock->fd, SOL_SOCKET, SO_TIMESTAMP,
2159: (void *)&on, sizeof(on)) < 0
2160: && errno != ENOPROTOOPT) {
2161: isc__strerror(errno, strbuf, sizeof(strbuf));
2162: UNEXPECTED_ERROR(__FILE__, __LINE__,
2163: "setsockopt(%d, SO_TIMESTAMP) %s: %s",
2164: sock->fd,
2165: isc_msgcat_get(isc_msgcat,
2166: ISC_MSGSET_GENERAL,
2167: ISC_MSG_FAILED,
2168: "failed"),
2169: strbuf);
2170: /* Press on... */
2171: }
2172: #endif /* SO_TIMESTAMP */
2173:
2174: #if defined(ISC_PLATFORM_HAVEIPV6)
2175: if (sock->pf == AF_INET6 && sock->recvcmsgbuflen == 0U) {
2176: /*
2177: * Warn explicitly because this anomaly can be hidden
2178: * in usual operation (and unexpectedly appear later).
2179: */
2180: UNEXPECTED_ERROR(__FILE__, __LINE__,
2181: "No buffer available to receive "
2182: "IPv6 destination");
2183: }
2184: #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
2185: #ifdef IPV6_RECVPKTINFO
2186: /* RFC 3542 */
2187: if ((sock->pf == AF_INET6)
2188: && (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_RECVPKTINFO,
2189: (void *)&on, sizeof(on)) < 0)) {
2190: isc__strerror(errno, strbuf, sizeof(strbuf));
2191: UNEXPECTED_ERROR(__FILE__, __LINE__,
2192: "setsockopt(%d, IPV6_RECVPKTINFO) "
2193: "%s: %s", sock->fd,
2194: isc_msgcat_get(isc_msgcat,
2195: ISC_MSGSET_GENERAL,
2196: ISC_MSG_FAILED,
2197: "failed"),
2198: strbuf);
2199: }
2200: #else
2201: /* RFC 2292 */
2202: if ((sock->pf == AF_INET6)
2203: && (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_PKTINFO,
2204: (void *)&on, sizeof(on)) < 0)) {
2205: isc__strerror(errno, strbuf, sizeof(strbuf));
2206: UNEXPECTED_ERROR(__FILE__, __LINE__,
2207: "setsockopt(%d, IPV6_PKTINFO) %s: %s",
2208: sock->fd,
2209: isc_msgcat_get(isc_msgcat,
2210: ISC_MSGSET_GENERAL,
2211: ISC_MSG_FAILED,
2212: "failed"),
2213: strbuf);
2214: }
2215: #endif /* IPV6_RECVPKTINFO */
2216: #endif /* ISC_PLATFORM_HAVEIN6PKTINFO */
2217: #ifdef IPV6_USE_MIN_MTU /* RFC 3542, not too common yet*/
2218: /* use minimum MTU */
2219: if (sock->pf == AF_INET6) {
2220: (void)setsockopt(sock->fd, IPPROTO_IPV6,
2221: IPV6_USE_MIN_MTU,
2222: (void *)&on, sizeof(on));
2223: }
2224: #endif
2225: #endif /* ISC_PLATFORM_HAVEIPV6 */
2226: #endif /* defined(USE_CMSG) */
2227:
2228: #if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
2229: /*
2230: * Turn off Path MTU discovery on IPv4/UDP sockets.
2231: */
2232: if (sock->pf == AF_INET) {
2233: int action = IP_PMTUDISC_DONT;
2234: (void)setsockopt(sock->fd, IPPROTO_IP, IP_MTU_DISCOVER,
2235: &action, sizeof(action));
2236: }
2237: #endif
2238: #if defined(IP_DONTFRAG)
2239: /*
2240: * Turn off Path MTU discovery on IPv4/UDP sockets.
2241: */
2242: if (sock->pf == AF_INET) {
2243: int off = 0;
2244: (void)setsockopt(sock->fd, IPPROTO_IP, IP_DONTFRAG,
2245: &off, sizeof(off));
2246: }
2247: #endif
2248:
2249: #if defined(SO_RCVBUF)
2250: optlen = sizeof(size);
2251: if (getsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF,
2252: (void *)&size, &optlen) >= 0 &&
2253: size < RCVBUFSIZE) {
2254: size = RCVBUFSIZE;
2255: if (setsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF,
2256: (void *)&size, sizeof(size)) == -1) {
2257: isc__strerror(errno, strbuf, sizeof(strbuf));
2258: UNEXPECTED_ERROR(__FILE__, __LINE__,
2259: "setsockopt(%d, SO_RCVBUF, %d) %s: %s",
2260: sock->fd, size,
2261: isc_msgcat_get(isc_msgcat,
2262: ISC_MSGSET_GENERAL,
2263: ISC_MSG_FAILED,
2264: "failed"),
2265: strbuf);
2266: }
2267: }
2268: #endif
2269: }
2270: #endif /* defined(USE_CMSG) || defined(SO_RCVBUF) */
2271:
2272: inc_stats(manager->stats, sock->statsindex[STATID_OPEN]);
2273:
2274: return (ISC_R_SUCCESS);
2275: }
2276:
2277: /*%
2278: * Create a new 'type' socket managed by 'manager'. Events
2279: * will be posted to 'task' and when dispatched 'action' will be
2280: * called with 'arg' as the arg value. The new socket is returned
2281: * in 'socketp'.
2282: */
2283: isc_result_t
2284: isc_socket_create(isc_socketmgr_t *manager, int pf, isc_sockettype_t type,
2285: isc_socket_t **socketp)
2286: {
2287: isc_socket_t *sock = NULL;
2288: isc_result_t result;
2289: int lockid;
2290:
2291: REQUIRE(VALID_MANAGER(manager));
2292: REQUIRE(socketp != NULL && *socketp == NULL);
2293: REQUIRE(type != isc_sockettype_fdwatch);
2294:
2295: result = allocate_socket(manager, type, &sock);
2296: if (result != ISC_R_SUCCESS)
2297: return (result);
2298:
2299: switch (sock->type) {
2300: case isc_sockettype_udp:
2301: sock->statsindex =
2302: (pf == AF_INET) ? upd4statsindex : upd6statsindex;
2303: break;
2304: case isc_sockettype_tcp:
2305: sock->statsindex =
2306: (pf == AF_INET) ? tcp4statsindex : tcp6statsindex;
2307: break;
2308: case isc_sockettype_unix:
2309: sock->statsindex = unixstatsindex;
2310: break;
2311: default:
2312: INSIST(0);
2313: }
2314:
2315: sock->pf = pf;
2316: result = opensocket(manager, sock);
2317: if (result != ISC_R_SUCCESS) {
2318: inc_stats(manager->stats, sock->statsindex[STATID_OPENFAIL]);
2319: free_socket(&sock);
2320: return (result);
2321: }
2322:
2323: sock->references = 1;
2324: *socketp = sock;
2325:
2326: /*
2327: * Note we don't have to lock the socket like we normally would because
2328: * there are no external references to it yet.
2329: */
2330:
2331: lockid = FDLOCK_ID(sock->fd);
2332: LOCK(&manager->fdlock[lockid]);
2333: manager->fds[sock->fd] = sock;
2334: manager->fdstate[sock->fd] = MANAGED;
2335: #ifdef USE_DEVPOLL
2336: INSIST(sock->manager->fdpollinfo[sock->fd].want_read == 0 &&
2337: sock->manager->fdpollinfo[sock->fd].want_write == 0);
2338: #endif
2339: UNLOCK(&manager->fdlock[lockid]);
2340:
2341: LOCK(&manager->lock);
2342: ISC_LIST_APPEND(manager->socklist, sock, link);
2343: #ifdef USE_SELECT
2344: if (manager->maxfd < sock->fd)
2345: manager->maxfd = sock->fd;
2346: #endif
2347: UNLOCK(&manager->lock);
2348:
2349: socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
2350: ISC_MSG_CREATED, "created");
2351:
2352: return (ISC_R_SUCCESS);
2353: }
2354:
2355: isc_result_t
2356: isc_socket_open(isc_socket_t *sock) {
2357: isc_result_t result;
2358:
2359: REQUIRE(VALID_SOCKET(sock));
2360:
2361: LOCK(&sock->lock);
2362: REQUIRE(sock->references == 1);
2363: REQUIRE(sock->type != isc_sockettype_fdwatch);
2364: UNLOCK(&sock->lock);
2365: /*
2366: * We don't need to retain the lock hereafter, since no one else has
2367: * this socket.
2368: */
2369: REQUIRE(sock->fd == -1);
2370:
2371: result = opensocket(sock->manager, sock);
2372: if (result != ISC_R_SUCCESS)
2373: sock->fd = -1;
2374:
2375: if (result == ISC_R_SUCCESS) {
2376: int lockid = FDLOCK_ID(sock->fd);
2377:
2378: LOCK(&sock->manager->fdlock[lockid]);
2379: sock->manager->fds[sock->fd] = sock;
2380: sock->manager->fdstate[sock->fd] = MANAGED;
2381: #ifdef USE_DEVPOLL
2382: INSIST(sock->manager->fdpollinfo[sock->fd].want_read == 0 &&
2383: sock->manager->fdpollinfo[sock->fd].want_write == 0);
2384: #endif
2385: UNLOCK(&sock->manager->fdlock[lockid]);
2386:
2387: #ifdef USE_SELECT
2388: LOCK(&sock->manager->lock);
2389: if (sock->manager->maxfd < sock->fd)
2390: sock->manager->maxfd = sock->fd;
2391: UNLOCK(&sock->manager->lock);
2392: #endif
2393: }
2394:
2395: return (result);
2396: }
2397:
2398: /*
2399: * Create a new 'type' socket managed by 'manager'. Events
2400: * will be posted to 'task' and when dispatched 'action' will be
2401: * called with 'arg' as the arg value. The new socket is returned
2402: * in 'socketp'.
2403: */
2404: isc_result_t
2405: isc_socket_fdwatchcreate(isc_socketmgr_t *manager, int fd, int flags,
2406: isc_sockfdwatch_t callback, void *cbarg,
2407: isc_task_t *task, isc_socket_t **socketp)
2408: {
2409: isc_socket_t *sock = NULL;
2410: isc_result_t result;
2411: int lockid;
2412:
2413: REQUIRE(VALID_MANAGER(manager));
2414: REQUIRE(socketp != NULL && *socketp == NULL);
2415:
2416: result = allocate_socket(manager, isc_sockettype_fdwatch, &sock);
2417: if (result != ISC_R_SUCCESS)
2418: return (result);
2419:
2420: sock->fd = fd;
2421: sock->fdwatcharg = cbarg;
2422: sock->fdwatchcb = callback;
2423: sock->fdwatchflags = flags;
2424: sock->fdwatchtask = task;
2425: sock->statsindex = fdwatchstatsindex;
2426:
2427: sock->references = 1;
2428: *socketp = sock;
2429:
2430: /*
2431: * Note we don't have to lock the socket like we normally would because
2432: * there are no external references to it yet.
2433: */
2434:
2435: lockid = FDLOCK_ID(sock->fd);
2436: LOCK(&manager->fdlock[lockid]);
2437: manager->fds[sock->fd] = sock;
2438: manager->fdstate[sock->fd] = MANAGED;
2439: UNLOCK(&manager->fdlock[lockid]);
2440:
2441: LOCK(&manager->lock);
2442: ISC_LIST_APPEND(manager->socklist, sock, link);
2443: #ifdef USE_SELECT
2444: if (manager->maxfd < sock->fd)
2445: manager->maxfd = sock->fd;
2446: #endif
2447: UNLOCK(&manager->lock);
2448:
2449: if (flags & ISC_SOCKFDWATCH_READ)
2450: select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
2451: if (flags & ISC_SOCKFDWATCH_WRITE)
2452: select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
2453:
2454: socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
2455: ISC_MSG_CREATED, "fdwatch-created");
2456:
2457: return (ISC_R_SUCCESS);
2458: }
2459:
2460: /*
2461: * Attach to a socket. Caller must explicitly detach when it is done.
2462: */
2463: void
2464: isc_socket_attach(isc_socket_t *sock, isc_socket_t **socketp) {
2465: REQUIRE(VALID_SOCKET(sock));
2466: REQUIRE(socketp != NULL && *socketp == NULL);
2467:
2468: LOCK(&sock->lock);
2469: sock->references++;
2470: UNLOCK(&sock->lock);
2471:
2472: *socketp = sock;
2473: }
2474:
2475: /*
2476: * Dereference a socket. If this is the last reference to it, clean things
2477: * up by destroying the socket.
2478: */
2479: void
2480: isc_socket_detach(isc_socket_t **socketp) {
2481: isc_socket_t *sock;
2482: isc_boolean_t kill_socket = ISC_FALSE;
2483:
2484: REQUIRE(socketp != NULL);
2485: sock = *socketp;
2486: REQUIRE(VALID_SOCKET(sock));
2487:
2488: LOCK(&sock->lock);
2489: REQUIRE(sock->references > 0);
2490: sock->references--;
2491: if (sock->references == 0)
2492: kill_socket = ISC_TRUE;
2493: UNLOCK(&sock->lock);
2494:
2495: if (kill_socket)
2496: destroy(&sock);
2497:
2498: *socketp = NULL;
2499: }
2500:
2501: isc_result_t
2502: isc_socket_close(isc_socket_t *sock) {
2503: int fd;
2504: isc_socketmgr_t *manager;
2505: isc_sockettype_t type;
2506:
2507: REQUIRE(VALID_SOCKET(sock));
2508:
2509: LOCK(&sock->lock);
2510:
2511: REQUIRE(sock->references == 1);
2512: REQUIRE(sock->type != isc_sockettype_fdwatch);
2513: REQUIRE(sock->fd >= 0 && sock->fd < (int)sock->manager->maxsocks);
2514:
2515: INSIST(!sock->connecting);
2516: INSIST(!sock->pending_recv);
2517: INSIST(!sock->pending_send);
2518: INSIST(!sock->pending_accept);
2519: INSIST(ISC_LIST_EMPTY(sock->recv_list));
2520: INSIST(ISC_LIST_EMPTY(sock->send_list));
2521: INSIST(ISC_LIST_EMPTY(sock->accept_list));
2522: INSIST(sock->connect_ev == NULL);
2523:
2524: manager = sock->manager;
2525: type = sock->type;
2526: fd = sock->fd;
2527: sock->fd = -1;
2528: memset(sock->name, 0, sizeof(sock->name));
2529: sock->tag = NULL;
2530: sock->listener = 0;
2531: sock->connected = 0;
2532: sock->connecting = 0;
2533: sock->bound = 0;
2534: isc_sockaddr_any(&sock->peer_address);
2535:
2536: UNLOCK(&sock->lock);
2537:
2538: closesocket(manager, sock, fd);
2539:
2540: return (ISC_R_SUCCESS);
2541: }
2542:
2543: /*
2544: * I/O is possible on a given socket. Schedule an event to this task that
2545: * will call an internal function to do the I/O. This will charge the
2546: * task with the I/O operation and let our select loop handler get back
2547: * to doing something real as fast as possible.
2548: *
2549: * The socket and manager must be locked before calling this function.
2550: */
2551: static void
2552: dispatch_recv(isc_socket_t *sock) {
2553: intev_t *iev;
2554: isc_socketevent_t *ev;
2555: isc_task_t *sender;
2556:
2557: INSIST(!sock->pending_recv);
2558:
2559: if (sock->type != isc_sockettype_fdwatch) {
2560: ev = ISC_LIST_HEAD(sock->recv_list);
2561: if (ev == NULL)
2562: return;
2563: socket_log(sock, NULL, EVENT, NULL, 0, 0,
2564: "dispatch_recv: event %p -> task %p",
2565: ev, ev->ev_sender);
2566: sender = ev->ev_sender;
2567: } else {
2568: sender = sock->fdwatchtask;
2569: }
2570:
2571: sock->pending_recv = 1;
2572: iev = &sock->readable_ev;
2573:
2574: sock->references++;
2575: iev->ev_sender = sock;
2576: if (sock->type == isc_sockettype_fdwatch)
2577: iev->ev_action = internal_fdwatch_read;
2578: else
2579: iev->ev_action = internal_recv;
2580: iev->ev_arg = sock;
2581:
2582: isc_task_send(sender, (isc_event_t **)&iev);
2583: }
2584:
2585: static void
2586: dispatch_send(isc_socket_t *sock) {
2587: intev_t *iev;
2588: isc_socketevent_t *ev;
2589: isc_task_t *sender;
2590:
2591: INSIST(!sock->pending_send);
2592:
2593: if (sock->type != isc_sockettype_fdwatch) {
2594: ev = ISC_LIST_HEAD(sock->send_list);
2595: if (ev == NULL)
2596: return;
2597: socket_log(sock, NULL, EVENT, NULL, 0, 0,
2598: "dispatch_send: event %p -> task %p",
2599: ev, ev->ev_sender);
2600: sender = ev->ev_sender;
2601: } else {
2602: sender = sock->fdwatchtask;
2603: }
2604:
2605: sock->pending_send = 1;
2606: iev = &sock->writable_ev;
2607:
2608: sock->references++;
2609: iev->ev_sender = sock;
2610: if (sock->type == isc_sockettype_fdwatch)
2611: iev->ev_action = internal_fdwatch_write;
2612: else
2613: iev->ev_action = internal_send;
2614: iev->ev_arg = sock;
2615:
2616: isc_task_send(sender, (isc_event_t **)&iev);
2617: }
2618:
2619: /*
2620: * Dispatch an internal accept event.
2621: */
2622: static void
2623: dispatch_accept(isc_socket_t *sock) {
2624: intev_t *iev;
2625: isc_socket_newconnev_t *ev;
2626:
2627: INSIST(!sock->pending_accept);
2628:
2629: /*
2630: * Are there any done events left, or were they all canceled
2631: * before the manager got the socket lock?
2632: */
2633: ev = ISC_LIST_HEAD(sock->accept_list);
2634: if (ev == NULL)
2635: return;
2636:
2637: sock->pending_accept = 1;
2638: iev = &sock->readable_ev;
2639:
2640: sock->references++; /* keep socket around for this internal event */
2641: iev->ev_sender = sock;
2642: iev->ev_action = internal_accept;
2643: iev->ev_arg = sock;
2644:
2645: isc_task_send(ev->ev_sender, (isc_event_t **)&iev);
2646: }
2647:
2648: static void
2649: dispatch_connect(isc_socket_t *sock) {
2650: intev_t *iev;
2651: isc_socket_connev_t *ev;
2652:
2653: iev = &sock->writable_ev;
2654:
2655: ev = sock->connect_ev;
2656: INSIST(ev != NULL); /* XXX */
2657:
2658: INSIST(sock->connecting);
2659:
2660: sock->references++; /* keep socket around for this internal event */
2661: iev->ev_sender = sock;
2662: iev->ev_action = internal_connect;
2663: iev->ev_arg = sock;
2664:
2665: isc_task_send(ev->ev_sender, (isc_event_t **)&iev);
2666: }
2667:
2668: /*
2669: * Dequeue an item off the given socket's read queue, set the result code
2670: * in the done event to the one provided, and send it to the task it was
2671: * destined for.
2672: *
2673: * If the event to be sent is on a list, remove it before sending. If
2674: * asked to, send and detach from the socket as well.
2675: *
2676: * Caller must have the socket locked if the event is attached to the socket.
2677: */
2678: static void
2679: send_recvdone_event(isc_socket_t *sock, isc_socketevent_t **dev) {
2680: isc_task_t *task;
2681:
2682: task = (*dev)->ev_sender;
2683:
2684: (*dev)->ev_sender = sock;
2685:
2686: if (ISC_LINK_LINKED(*dev, ev_link))
2687: ISC_LIST_DEQUEUE(sock->recv_list, *dev, ev_link);
2688:
2689: if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
2690: == ISC_SOCKEVENTATTR_ATTACHED)
2691: isc_task_sendanddetach(&task, (isc_event_t **)dev);
2692: else
2693: isc_task_send(task, (isc_event_t **)dev);
2694: }
2695:
2696: /*
2697: * See comments for send_recvdone_event() above.
2698: *
2699: * Caller must have the socket locked if the event is attached to the socket.
2700: */
2701: static void
2702: send_senddone_event(isc_socket_t *sock, isc_socketevent_t **dev) {
2703: isc_task_t *task;
2704:
2705: INSIST(dev != NULL && *dev != NULL);
2706:
2707: task = (*dev)->ev_sender;
2708: (*dev)->ev_sender = sock;
2709:
2710: if (ISC_LINK_LINKED(*dev, ev_link))
2711: ISC_LIST_DEQUEUE(sock->send_list, *dev, ev_link);
2712:
2713: if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
2714: == ISC_SOCKEVENTATTR_ATTACHED)
2715: isc_task_sendanddetach(&task, (isc_event_t **)dev);
2716: else
2717: isc_task_send(task, (isc_event_t **)dev);
2718: }
2719:
2720: /*
2721: * Call accept() on a socket, to get the new file descriptor. The listen
2722: * socket is used as a prototype to create a new isc_socket_t. The new
2723: * socket has one outstanding reference. The task receiving the event
2724: * will be detached from just after the event is delivered.
2725: *
2726: * On entry to this function, the event delivered is the internal
2727: * readable event, and the first item on the accept_list should be
2728: * the done event we want to send. If the list is empty, this is a no-op,
2729: * so just unlock and return.
2730: */
2731: static void
2732: internal_accept(isc_task_t *me, isc_event_t *ev) {
2733: isc_socket_t *sock;
2734: isc_socketmgr_t *manager;
2735: isc_socket_newconnev_t *dev;
2736: isc_task_t *task;
2737: ISC_SOCKADDR_LEN_T addrlen;
2738: int fd;
2739: isc_result_t result = ISC_R_SUCCESS;
2740: char strbuf[ISC_STRERRORSIZE];
2741: const char *err = "accept";
2742:
2743: UNUSED(me);
2744:
2745: sock = ev->ev_sender;
2746: INSIST(VALID_SOCKET(sock));
2747:
2748: LOCK(&sock->lock);
2749: socket_log(sock, NULL, TRACE,
2750: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_ACCEPTLOCK,
2751: "internal_accept called, locked socket");
2752:
2753: manager = sock->manager;
2754: INSIST(VALID_MANAGER(manager));
2755:
2756: INSIST(sock->listener);
2757: INSIST(sock->pending_accept == 1);
2758: sock->pending_accept = 0;
2759:
2760: INSIST(sock->references > 0);
2761: sock->references--; /* the internal event is done with this socket */
2762: if (sock->references == 0) {
2763: UNLOCK(&sock->lock);
2764: destroy(&sock);
2765: return;
2766: }
2767:
2768: /*
2769: * Get the first item off the accept list.
2770: * If it is empty, unlock the socket and return.
2771: */
2772: dev = ISC_LIST_HEAD(sock->accept_list);
2773: if (dev == NULL) {
2774: UNLOCK(&sock->lock);
2775: return;
2776: }
2777:
2778: /*
2779: * Try to accept the new connection. If the accept fails with
2780: * EAGAIN or EINTR, simply poke the watcher to watch this socket
2781: * again. Also ignore ECONNRESET, which has been reported to
2782: * be spuriously returned on Linux 2.2.19 although it is not
2783: * a documented error for accept(). ECONNABORTED has been
2784: * reported for Solaris 8. The rest are thrown in not because
2785: * we have seen them but because they are ignored by other
2786: * daemons such as BIND 8 and Apache.
2787: */
2788:
2789: addrlen = sizeof(dev->newsocket->peer_address.type);
2790: memset(&dev->newsocket->peer_address.type, 0, addrlen);
2791: fd = accept(sock->fd, &dev->newsocket->peer_address.type.sa,
2792: (void *)&addrlen);
2793:
2794: #ifdef F_DUPFD
2795: /*
2796: * Leave a space for stdio to work in.
2797: */
2798: if (fd >= 0 && fd < 20) {
2799: int new, tmp;
2800: new = fcntl(fd, F_DUPFD, 20);
2801: tmp = errno;
2802: (void)close(fd);
2803: errno = tmp;
2804: fd = new;
2805: err = "accept/fcntl";
2806: }
2807: #endif
2808:
2809: if (fd < 0) {
2810: if (SOFT_ERROR(errno))
2811: goto soft_error;
2812: switch (errno) {
2813: case ENFILE:
2814: case EMFILE:
2815: isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2816: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2817: isc_msgcat, ISC_MSGSET_SOCKET,
2818: ISC_MSG_TOOMANYFDS,
2819: "%s: too many open file descriptors",
2820: err);
2821: goto soft_error;
2822:
2823: case ENOBUFS:
2824: case ENOMEM:
2825: case ECONNRESET:
2826: case ECONNABORTED:
2827: case EHOSTUNREACH:
2828: case EHOSTDOWN:
2829: case ENETUNREACH:
2830: case ENETDOWN:
2831: case ECONNREFUSED:
2832: #ifdef EPROTO
2833: case EPROTO:
2834: #endif
2835: #ifdef ENONET
2836: case ENONET:
2837: #endif
2838: goto soft_error;
2839: default:
2840: break;
2841: }
2842: isc__strerror(errno, strbuf, sizeof(strbuf));
2843: UNEXPECTED_ERROR(__FILE__, __LINE__,
2844: "internal_accept: %s() %s: %s", err,
2845: isc_msgcat_get(isc_msgcat,
2846: ISC_MSGSET_GENERAL,
2847: ISC_MSG_FAILED,
2848: "failed"),
2849: strbuf);
2850: fd = -1;
2851: result = ISC_R_UNEXPECTED;
2852: } else {
2853: if (addrlen == 0U) {
2854: UNEXPECTED_ERROR(__FILE__, __LINE__,
2855: "internal_accept(): "
2856: "accept() failed to return "
2857: "remote address");
2858:
2859: (void)close(fd);
2860: goto soft_error;
2861: } else if (dev->newsocket->peer_address.type.sa.sa_family !=
2862: sock->pf)
2863: {
2864: UNEXPECTED_ERROR(__FILE__, __LINE__,
2865: "internal_accept(): "
2866: "accept() returned peer address "
2867: "family %u (expected %u)",
2868: dev->newsocket->peer_address.
2869: type.sa.sa_family,
2870: sock->pf);
2871: (void)close(fd);
2872: goto soft_error;
2873: } else if (fd >= (int)manager->maxsocks) {
2874: isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2875: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2876: isc_msgcat, ISC_MSGSET_SOCKET,
2877: ISC_MSG_TOOMANYFDS,
2878: "accept: "
2879: "file descriptor exceeds limit (%d/%u)",
2880: fd, manager->maxsocks);
2881: (void)close(fd);
2882: goto soft_error;
2883: }
2884: }
2885:
2886: if (fd != -1) {
2887: dev->newsocket->peer_address.length = addrlen;
2888: dev->newsocket->pf = sock->pf;
2889: }
2890:
2891: /*
2892: * Pull off the done event.
2893: */
2894: ISC_LIST_UNLINK(sock->accept_list, dev, ev_link);
2895:
2896: /*
2897: * Poke watcher if there are more pending accepts.
2898: */
2899: if (!ISC_LIST_EMPTY(sock->accept_list))
2900: select_poke(sock->manager, sock->fd, SELECT_POKE_ACCEPT);
2901:
2902: UNLOCK(&sock->lock);
2903:
2904: if (fd != -1 && (make_nonblock(fd) != ISC_R_SUCCESS)) {
2905: (void)close(fd);
2906: fd = -1;
2907: result = ISC_R_UNEXPECTED;
2908: }
2909:
2910: /*
2911: * -1 means the new socket didn't happen.
2912: */
2913: if (fd != -1) {
2914: int lockid = FDLOCK_ID(fd);
2915:
2916: LOCK(&manager->fdlock[lockid]);
2917: manager->fds[fd] = dev->newsocket;
2918: manager->fdstate[fd] = MANAGED;
2919: UNLOCK(&manager->fdlock[lockid]);
2920:
2921: LOCK(&manager->lock);
2922: ISC_LIST_APPEND(manager->socklist, dev->newsocket, link);
2923:
2924: dev->newsocket->fd = fd;
2925: dev->newsocket->bound = 1;
2926: dev->newsocket->connected = 1;
2927:
2928: /*
2929: * Save away the remote address
2930: */
2931: dev->address = dev->newsocket->peer_address;
2932:
2933: #ifdef USE_SELECT
2934: if (manager->maxfd < fd)
2935: manager->maxfd = fd;
2936: #endif
2937:
2938: socket_log(sock, &dev->newsocket->peer_address, CREATION,
2939: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_ACCEPTEDCXN,
2940: "accepted connection, new socket %p",
2941: dev->newsocket);
2942:
2943: UNLOCK(&manager->lock);
2944:
2945: inc_stats(manager->stats, sock->statsindex[STATID_ACCEPT]);
2946: } else {
2947: inc_stats(manager->stats, sock->statsindex[STATID_ACCEPTFAIL]);
2948: dev->newsocket->references--;
2949: free_socket(&dev->newsocket);
2950: }
2951:
2952: /*
2953: * Fill in the done event details and send it off.
2954: */
2955: dev->result = result;
2956: task = dev->ev_sender;
2957: dev->ev_sender = sock;
2958:
2959: isc_task_sendanddetach(&task, ISC_EVENT_PTR(&dev));
2960: return;
2961:
2962: soft_error:
2963: select_poke(sock->manager, sock->fd, SELECT_POKE_ACCEPT);
2964: UNLOCK(&sock->lock);
2965:
2966: inc_stats(manager->stats, sock->statsindex[STATID_ACCEPTFAIL]);
2967: return;
2968: }
2969:
2970: static void
2971: internal_recv(isc_task_t *me, isc_event_t *ev) {
2972: isc_socketevent_t *dev;
2973: isc_socket_t *sock;
2974:
2975: INSIST(ev->ev_type == ISC_SOCKEVENT_INTR);
2976:
2977: sock = ev->ev_sender;
2978: INSIST(VALID_SOCKET(sock));
2979:
2980: LOCK(&sock->lock);
2981: socket_log(sock, NULL, IOEVENT,
2982: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALRECV,
2983: "internal_recv: task %p got event %p", me, ev);
2984:
2985: INSIST(sock->pending_recv == 1);
2986: sock->pending_recv = 0;
2987:
2988: INSIST(sock->references > 0);
2989: sock->references--; /* the internal event is done with this socket */
2990: if (sock->references == 0) {
2991: UNLOCK(&sock->lock);
2992: destroy(&sock);
2993: return;
2994: }
2995:
2996: /*
2997: * Try to do as much I/O as possible on this socket. There are no
2998: * limits here, currently.
2999: */
3000: dev = ISC_LIST_HEAD(sock->recv_list);
3001: while (dev != NULL) {
3002: switch (doio_recv(sock, dev)) {
3003: case DOIO_SOFT:
3004: goto poke;
3005:
3006: case DOIO_EOF:
3007: /*
3008: * read of 0 means the remote end was closed.
3009: * Run through the event queue and dispatch all
3010: * the events with an EOF result code.
3011: */
3012: do {
3013: dev->result = ISC_R_EOF;
3014: send_recvdone_event(sock, &dev);
3015: dev = ISC_LIST_HEAD(sock->recv_list);
3016: } while (dev != NULL);
3017: goto poke;
3018:
3019: case DOIO_SUCCESS:
3020: case DOIO_HARD:
3021: send_recvdone_event(sock, &dev);
3022: break;
3023: }
3024:
3025: dev = ISC_LIST_HEAD(sock->recv_list);
3026: }
3027:
3028: poke:
3029: if (!ISC_LIST_EMPTY(sock->recv_list))
3030: select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
3031:
3032: UNLOCK(&sock->lock);
3033: }
3034:
3035: static void
3036: internal_send(isc_task_t *me, isc_event_t *ev) {
3037: isc_socketevent_t *dev;
3038: isc_socket_t *sock;
3039:
3040: INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
3041:
3042: /*
3043: * Find out what socket this is and lock it.
3044: */
3045: sock = (isc_socket_t *)ev->ev_sender;
3046: INSIST(VALID_SOCKET(sock));
3047:
3048: LOCK(&sock->lock);
3049: socket_log(sock, NULL, IOEVENT,
3050: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALSEND,
3051: "internal_send: task %p got event %p", me, ev);
3052:
3053: INSIST(sock->pending_send == 1);
3054: sock->pending_send = 0;
3055:
3056: INSIST(sock->references > 0);
3057: sock->references--; /* the internal event is done with this socket */
3058: if (sock->references == 0) {
3059: UNLOCK(&sock->lock);
3060: destroy(&sock);
3061: return;
3062: }
3063:
3064: /*
3065: * Try to do as much I/O as possible on this socket. There are no
3066: * limits here, currently.
3067: */
3068: dev = ISC_LIST_HEAD(sock->send_list);
3069: while (dev != NULL) {
3070: switch (doio_send(sock, dev)) {
3071: case DOIO_SOFT:
3072: goto poke;
3073:
3074: case DOIO_HARD:
3075: case DOIO_SUCCESS:
3076: send_senddone_event(sock, &dev);
3077: break;
3078: }
3079:
3080: dev = ISC_LIST_HEAD(sock->send_list);
3081: }
3082:
3083: poke:
3084: if (!ISC_LIST_EMPTY(sock->send_list))
3085: select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
3086:
3087: UNLOCK(&sock->lock);
3088: }
3089:
3090: static void
3091: internal_fdwatch_write(isc_task_t *me, isc_event_t *ev) {
3092: isc_socket_t *sock;
3093: int more_data;
3094:
3095: INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
3096:
3097: /*
3098: * Find out what socket this is and lock it.
3099: */
3100: sock = (isc_socket_t *)ev->ev_sender;
3101: INSIST(VALID_SOCKET(sock));
3102:
3103: LOCK(&sock->lock);
3104: socket_log(sock, NULL, IOEVENT,
3105: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALSEND,
3106: "internal_fdwatch_write: task %p got event %p", me, ev);
3107:
3108: INSIST(sock->pending_send == 1);
3109:
3110: UNLOCK(&sock->lock);
3111: more_data = (sock->fdwatchcb)(me, sock, sock->fdwatcharg);
3112: LOCK(&sock->lock);
3113:
3114: sock->pending_send = 0;
3115:
3116: INSIST(sock->references > 0);
3117: sock->references--; /* the internal event is done with this socket */
3118: if (sock->references == 0) {
3119: UNLOCK(&sock->lock);
3120: destroy(&sock);
3121: return;
3122: }
3123:
3124: if (more_data)
3125: select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
3126:
3127: UNLOCK(&sock->lock);
3128: }
3129:
3130: static void
3131: internal_fdwatch_read(isc_task_t *me, isc_event_t *ev) {
3132: isc_socket_t *sock;
3133: int more_data;
3134:
3135: INSIST(ev->ev_type == ISC_SOCKEVENT_INTR);
3136:
3137: /*
3138: * Find out what socket this is and lock it.
3139: */
3140: sock = (isc_socket_t *)ev->ev_sender;
3141: INSIST(VALID_SOCKET(sock));
3142:
3143: LOCK(&sock->lock);
3144: socket_log(sock, NULL, IOEVENT,
3145: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALRECV,
3146: "internal_fdwatch_read: task %p got event %p", me, ev);
3147:
3148: INSIST(sock->pending_recv == 1);
3149:
3150: UNLOCK(&sock->lock);
3151: more_data = (sock->fdwatchcb)(me, sock, sock->fdwatcharg);
3152: LOCK(&sock->lock);
3153:
3154: sock->pending_recv = 0;
3155:
3156: INSIST(sock->references > 0);
3157: sock->references--; /* the internal event is done with this socket */
3158: if (sock->references == 0) {
3159: UNLOCK(&sock->lock);
3160: destroy(&sock);
3161: return;
3162: }
3163:
3164: if (more_data)
3165: select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
3166:
3167: UNLOCK(&sock->lock);
3168: }
3169:
3170: /*
3171: * Process read/writes on each fd here. Avoid locking
3172: * and unlocking twice if both reads and writes are possible.
3173: */
3174: static void
3175: process_fd(isc_socketmgr_t *manager, int fd, isc_boolean_t readable,
3176: isc_boolean_t writeable)
3177: {
3178: isc_socket_t *sock;
3179: isc_boolean_t unlock_sock;
3180: isc_boolean_t unwatch_read = ISC_FALSE, unwatch_write = ISC_FALSE;
3181: int lockid = FDLOCK_ID(fd);
3182:
3183: /*
3184: * If the socket is going to be closed, don't do more I/O.
3185: */
3186: LOCK(&manager->fdlock[lockid]);
3187: if (manager->fdstate[fd] == CLOSE_PENDING) {
3188: UNLOCK(&manager->fdlock[lockid]);
3189:
3190: (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
3191: (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
3192: return;
3193: }
3194:
3195: sock = manager->fds[fd];
3196: unlock_sock = ISC_FALSE;
3197: if (readable) {
3198: if (sock == NULL) {
3199: unwatch_read = ISC_TRUE;
3200: goto check_write;
3201: }
3202: unlock_sock = ISC_TRUE;
3203: LOCK(&sock->lock);
3204: if (!SOCK_DEAD(sock)) {
3205: if (sock->listener)
3206: dispatch_accept(sock);
3207: else
3208: dispatch_recv(sock);
3209: }
3210: unwatch_read = ISC_TRUE;
3211: }
3212: check_write:
3213: if (writeable) {
3214: if (sock == NULL) {
3215: unwatch_write = ISC_TRUE;
3216: goto unlock_fd;
3217: }
3218: if (!unlock_sock) {
3219: unlock_sock = ISC_TRUE;
3220: LOCK(&sock->lock);
3221: }
3222: if (!SOCK_DEAD(sock)) {
3223: if (sock->connecting)
3224: dispatch_connect(sock);
3225: else
3226: dispatch_send(sock);
3227: }
3228: unwatch_write = ISC_TRUE;
3229: }
3230: if (unlock_sock)
3231: UNLOCK(&sock->lock);
3232:
3233: unlock_fd:
3234: UNLOCK(&manager->fdlock[lockid]);
3235: if (unwatch_read)
3236: (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
3237: if (unwatch_write)
3238: (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
3239:
3240: }
3241:
3242: #ifdef USE_KQUEUE
3243: static isc_boolean_t
3244: process_fds(isc_socketmgr_t *manager, struct kevent *events, int nevents) {
3245: int i;
3246: isc_boolean_t readable, writable;
3247: isc_boolean_t done = ISC_FALSE;
3248: #ifdef ISC_PLATFORM_USETHREADS
3249: isc_boolean_t have_ctlevent = ISC_FALSE;
3250: #endif
3251:
3252: if (nevents == manager->nevents) {
3253: /*
3254: * This is not an error, but something unexpected. If this
3255: * happens, it may indicate the need for increasing
3256: * ISC_SOCKET_MAXEVENTS.
3257: */
3258: manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3259: ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3260: "maximum number of FD events (%d) received",
3261: nevents);
3262: }
3263:
3264: for (i = 0; i < nevents; i++) {
3265: REQUIRE(events[i].ident < manager->maxsocks);
3266: #ifdef ISC_PLATFORM_USETHREADS
3267: if (events[i].ident == (uintptr_t)manager->pipe_fds[0]) {
3268: have_ctlevent = ISC_TRUE;
3269: continue;
3270: }
3271: #endif
3272: readable = ISC_TF(events[i].filter == EVFILT_READ);
3273: writable = ISC_TF(events[i].filter == EVFILT_WRITE);
3274: process_fd(manager, events[i].ident, readable, writable);
3275: }
3276:
3277: #ifdef ISC_PLATFORM_USETHREADS
3278: if (have_ctlevent)
3279: done = process_ctlfd(manager);
3280: #endif
3281:
3282: return (done);
3283: }
3284: #elif defined(USE_EPOLL)
3285: static isc_boolean_t
3286: process_fds(isc_socketmgr_t *manager, struct epoll_event *events, int nevents) {
3287: int i;
3288: isc_boolean_t done = ISC_FALSE;
3289: #ifdef ISC_PLATFORM_USETHREADS
3290: isc_boolean_t have_ctlevent = ISC_FALSE;
3291: #endif
3292:
3293: if (nevents == manager->nevents) {
3294: manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3295: ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3296: "maximum number of FD events (%d) received",
3297: nevents);
3298: }
3299:
3300: for (i = 0; i < nevents; i++) {
3301: REQUIRE(events[i].data.fd < (int)manager->maxsocks);
3302: #ifdef ISC_PLATFORM_USETHREADS
3303: if (events[i].data.fd == manager->pipe_fds[0]) {
3304: have_ctlevent = ISC_TRUE;
3305: continue;
3306: }
3307: #endif
3308: if ((events[i].events & EPOLLERR) != 0 ||
3309: (events[i].events & EPOLLHUP) != 0) {
3310: /*
3311: * epoll does not set IN/OUT bits on an erroneous
3312: * condition, so we need to try both anyway. This is a
3313: * bit inefficient, but should be okay for such rare
3314: * events. Note also that the read or write attempt
3315: * won't block because we use non-blocking sockets.
3316: */
3317: events[i].events |= (EPOLLIN | EPOLLOUT);
3318: }
3319: process_fd(manager, events[i].data.fd,
3320: (events[i].events & EPOLLIN) != 0,
3321: (events[i].events & EPOLLOUT) != 0);
3322: }
3323:
3324: #ifdef ISC_PLATFORM_USETHREADS
3325: if (have_ctlevent)
3326: done = process_ctlfd(manager);
3327: #endif
3328:
3329: return (done);
3330: }
3331: #elif defined(USE_DEVPOLL)
3332: static isc_boolean_t
3333: process_fds(isc_socketmgr_t *manager, struct pollfd *events, int nevents) {
3334: int i;
3335: isc_boolean_t done = ISC_FALSE;
3336: #ifdef ISC_PLATFORM_USETHREADS
3337: isc_boolean_t have_ctlevent = ISC_FALSE;
3338: #endif
3339:
3340: if (nevents == manager->nevents) {
3341: manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3342: ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3343: "maximum number of FD events (%d) received",
3344: nevents);
3345: }
3346:
3347: for (i = 0; i < nevents; i++) {
3348: REQUIRE(events[i].fd < (int)manager->maxsocks);
3349: #ifdef ISC_PLATFORM_USETHREADS
3350: if (events[i].fd == manager->pipe_fds[0]) {
3351: have_ctlevent = ISC_TRUE;
3352: continue;
3353: }
3354: #endif
3355: process_fd(manager, events[i].fd,
3356: (events[i].events & POLLIN) != 0,
3357: (events[i].events & POLLOUT) != 0);
3358: }
3359:
3360: #ifdef ISC_PLATFORM_USETHREADS
3361: if (have_ctlevent)
3362: done = process_ctlfd(manager);
3363: #endif
3364:
3365: return (done);
3366: }
3367: #elif defined(USE_SELECT)
3368: static void
3369: process_fds(isc_socketmgr_t *manager, int maxfd,
3370: fd_set *readfds, fd_set *writefds)
3371: {
3372: int i;
3373:
3374: REQUIRE(maxfd <= (int)manager->maxsocks);
3375:
3376: for (i = 0; i < maxfd; i++) {
3377: #ifdef ISC_PLATFORM_USETHREADS
3378: if (i == manager->pipe_fds[0] || i == manager->pipe_fds[1])
3379: continue;
3380: #endif /* ISC_PLATFORM_USETHREADS */
3381: process_fd(manager, i, FD_ISSET(i, readfds),
3382: FD_ISSET(i, writefds));
3383: }
3384: }
3385: #endif
3386:
3387: #ifdef ISC_PLATFORM_USETHREADS
3388: static isc_boolean_t
3389: process_ctlfd(isc_socketmgr_t *manager) {
3390: int msg, fd;
3391:
3392: for (;;) {
3393: select_readmsg(manager, &fd, &msg);
3394:
3395: manager_log(manager, IOEVENT,
3396: isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
3397: ISC_MSG_WATCHERMSG,
3398: "watcher got message %d "
3399: "for socket %d"), msg, fd);
3400:
3401: /*
3402: * Nothing to read?
3403: */
3404: if (msg == SELECT_POKE_NOTHING)
3405: break;
3406:
3407: /*
3408: * Handle shutdown message. We really should
3409: * jump out of this loop right away, but
3410: * it doesn't matter if we have to do a little
3411: * more work first.
3412: */
3413: if (msg == SELECT_POKE_SHUTDOWN)
3414: return (ISC_TRUE);
3415:
3416: /*
3417: * This is a wakeup on a socket. Look
3418: * at the event queue for both read and write,
3419: * and decide if we need to watch on it now
3420: * or not.
3421: */
3422: wakeup_socket(manager, fd, msg);
3423: }
3424:
3425: return (ISC_FALSE);
3426: }
3427:
3428: /*
3429: * This is the thread that will loop forever, always in a select or poll
3430: * call.
3431: *
3432: * When select returns something to do, track down what thread gets to do
3433: * this I/O and post the event to it.
3434: */
3435: static isc_threadresult_t
3436: watcher(void *uap) {
3437: isc_socketmgr_t *manager = uap;
3438: isc_boolean_t done;
3439: int ctlfd;
3440: int cc;
3441: #ifdef USE_KQUEUE
3442: const char *fnname = "kevent()";
3443: #elif defined (USE_EPOLL)
3444: const char *fnname = "epoll_wait()";
3445: #elif defined(USE_DEVPOLL)
3446: const char *fnname = "ioctl(DP_POLL)";
3447: struct dvpoll dvp;
3448: #elif defined (USE_SELECT)
3449: const char *fnname = "select()";
3450: int maxfd;
3451: #endif
3452: char strbuf[ISC_STRERRORSIZE];
3453: #ifdef ISC_SOCKET_USE_POLLWATCH
3454: pollstate_t pollstate = poll_idle;
3455: #endif
3456:
3457: /*
3458: * Get the control fd here. This will never change.
3459: */
3460: ctlfd = manager->pipe_fds[0];
3461: done = ISC_FALSE;
3462: while (!done) {
3463: do {
3464: #ifdef USE_KQUEUE
3465: cc = kevent(manager->kqueue_fd, NULL, 0,
3466: manager->events, manager->nevents, NULL);
3467: #elif defined(USE_EPOLL)
3468: cc = epoll_wait(manager->epoll_fd, manager->events,
3469: manager->nevents, -1);
3470: #elif defined(USE_DEVPOLL)
3471: dvp.dp_fds = manager->events;
3472: dvp.dp_nfds = manager->nevents;
3473: #ifndef ISC_SOCKET_USE_POLLWATCH
3474: dvp.dp_timeout = -1;
3475: #else
3476: if (pollstate == poll_idle)
3477: dvp.dp_timeout = -1;
3478: else
3479: dvp.dp_timeout = ISC_SOCKET_POLLWATCH_TIMEOUT;
3480: #endif /* ISC_SOCKET_USE_POLLWATCH */
3481: cc = ioctl(manager->devpoll_fd, DP_POLL, &dvp);
3482: #elif defined(USE_SELECT)
3483: LOCK(&manager->lock);
3484: memcpy(manager->read_fds_copy, manager->read_fds,
3485: manager->fd_bufsize);
3486: memcpy(manager->write_fds_copy, manager->write_fds,
3487: manager->fd_bufsize);
3488: maxfd = manager->maxfd + 1;
3489: UNLOCK(&manager->lock);
3490:
3491: cc = select(maxfd, manager->read_fds_copy,
3492: manager->write_fds_copy, NULL, NULL);
3493: #endif /* USE_KQUEUE */
3494:
3495: if (cc < 0 && !SOFT_ERROR(errno)) {
3496: isc__strerror(errno, strbuf, sizeof(strbuf));
3497: FATAL_ERROR(__FILE__, __LINE__,
3498: "%s %s: %s", fnname,
3499: isc_msgcat_get(isc_msgcat,
3500: ISC_MSGSET_GENERAL,
3501: ISC_MSG_FAILED,
3502: "failed"), strbuf);
3503: }
3504:
3505: #if defined(USE_DEVPOLL) && defined(ISC_SOCKET_USE_POLLWATCH)
3506: if (cc == 0) {
3507: if (pollstate == poll_active)
3508: pollstate = poll_checking;
3509: else if (pollstate == poll_checking)
3510: pollstate = poll_idle;
3511: } else if (cc > 0) {
3512: if (pollstate == poll_checking) {
3513: /*
3514: * XXX: We'd like to use a more
3515: * verbose log level as it's actually an
3516: * unexpected event, but the kernel bug
3517: * reportedly happens pretty frequently
3518: * (and it can also be a false positive)
3519: * so it would be just too noisy.
3520: */
3521: manager_log(manager,
3522: ISC_LOGCATEGORY_GENERAL,
3523: ISC_LOGMODULE_SOCKET,
3524: ISC_LOG_DEBUG(1),
3525: "unexpected POLL timeout");
3526: }
3527: pollstate = poll_active;
3528: }
3529: #endif
3530: } while (cc < 0);
3531:
3532: #if defined(USE_KQUEUE) || defined (USE_EPOLL) || defined (USE_DEVPOLL)
3533: done = process_fds(manager, manager->events, cc);
3534: #elif defined(USE_SELECT)
3535: process_fds(manager, maxfd, manager->read_fds_copy,
3536: manager->write_fds_copy);
3537:
3538: /*
3539: * Process reads on internal, control fd.
3540: */
3541: if (FD_ISSET(ctlfd, manager->read_fds_copy))
3542: done = process_ctlfd(manager);
3543: #endif
3544: }
3545:
3546: manager_log(manager, TRACE, "%s",
3547: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3548: ISC_MSG_EXITING, "watcher exiting"));
3549:
3550: return ((isc_threadresult_t)0);
3551: }
3552: #endif /* ISC_PLATFORM_USETHREADS */
3553:
3554: void
3555: isc__socketmgr_setreserved(isc_socketmgr_t *manager, isc_uint32_t reserved) {
3556:
3557: REQUIRE(VALID_MANAGER(manager));
3558:
3559: manager->reserved = reserved;
3560: }
3561:
3562: /*
3563: * Create a new socket manager.
3564: */
3565:
3566: static isc_result_t
3567: setup_watcher(isc_mem_t *mctx, isc_socketmgr_t *manager) {
3568: isc_result_t result;
3569: #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
3570: char strbuf[ISC_STRERRORSIZE];
3571: #endif
3572:
3573: #ifdef USE_KQUEUE
3574: manager->nevents = ISC_SOCKET_MAXEVENTS;
3575: manager->events = isc_mem_get(mctx, sizeof(struct kevent) *
3576: manager->nevents);
3577: if (manager->events == NULL)
3578: return (ISC_R_NOMEMORY);
3579: manager->kqueue_fd = kqueue();
3580: if (manager->kqueue_fd == -1) {
3581: result = isc__errno2result(errno);
3582: isc__strerror(errno, strbuf, sizeof(strbuf));
3583: UNEXPECTED_ERROR(__FILE__, __LINE__,
3584: "kqueue %s: %s",
3585: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3586: ISC_MSG_FAILED, "failed"),
3587: strbuf);
3588: isc_mem_put(mctx, manager->events,
3589: sizeof(struct kevent) * manager->nevents);
3590: return (result);
3591: }
3592:
3593: #ifdef ISC_PLATFORM_USETHREADS
3594: result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3595: if (result != ISC_R_SUCCESS) {
3596: close(manager->kqueue_fd);
3597: isc_mem_put(mctx, manager->events,
3598: sizeof(struct kevent) * manager->nevents);
3599: return (result);
3600: }
3601: #endif /* ISC_PLATFORM_USETHREADS */
3602: #elif defined(USE_EPOLL)
3603: manager->nevents = ISC_SOCKET_MAXEVENTS;
3604: manager->events = isc_mem_get(mctx, sizeof(struct epoll_event) *
3605: manager->nevents);
3606: if (manager->events == NULL)
3607: return (ISC_R_NOMEMORY);
3608: manager->epoll_fd = epoll_create(manager->nevents);
3609: if (manager->epoll_fd == -1) {
3610: result = isc__errno2result(errno);
3611: isc__strerror(errno, strbuf, sizeof(strbuf));
3612: UNEXPECTED_ERROR(__FILE__, __LINE__,
3613: "epoll_create %s: %s",
3614: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3615: ISC_MSG_FAILED, "failed"),
3616: strbuf);
3617: isc_mem_put(mctx, manager->events,
3618: sizeof(struct epoll_event) * manager->nevents);
3619: return (result);
3620: }
3621: #ifdef ISC_PLATFORM_USETHREADS
3622: result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3623: if (result != ISC_R_SUCCESS) {
3624: close(manager->epoll_fd);
3625: isc_mem_put(mctx, manager->events,
3626: sizeof(struct epoll_event) * manager->nevents);
3627: return (result);
3628: }
3629: #endif /* ISC_PLATFORM_USETHREADS */
3630: #elif defined(USE_DEVPOLL)
3631: /*
3632: * XXXJT: /dev/poll seems to reject large numbers of events,
3633: * so we should be careful about redefining ISC_SOCKET_MAXEVENTS.
3634: */
3635: manager->nevents = ISC_SOCKET_MAXEVENTS;
3636: manager->events = isc_mem_get(mctx, sizeof(struct pollfd) *
3637: manager->nevents);
3638: if (manager->events == NULL)
3639: return (ISC_R_NOMEMORY);
3640: /*
3641: * Note: fdpollinfo should be able to support all possible FDs, so
3642: * it must have maxsocks entries (not nevents).
3643: */
3644: manager->fdpollinfo = isc_mem_get(mctx, sizeof(pollinfo_t) *
3645: manager->maxsocks);
3646: if (manager->fdpollinfo == NULL) {
3647: isc_mem_put(mctx, manager->events,
3648: sizeof(pollinfo_t) * manager->maxsocks);
3649: return (ISC_R_NOMEMORY);
3650: }
3651: memset(manager->fdpollinfo, 0, sizeof(pollinfo_t) * manager->maxsocks);
3652: manager->devpoll_fd = open("/dev/poll", O_RDWR);
3653: if (manager->devpoll_fd == -1) {
3654: result = isc__errno2result(errno);
3655: isc__strerror(errno, strbuf, sizeof(strbuf));
3656: UNEXPECTED_ERROR(__FILE__, __LINE__,
3657: "open(/dev/poll) %s: %s",
3658: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3659: ISC_MSG_FAILED, "failed"),
3660: strbuf);
3661: isc_mem_put(mctx, manager->events,
3662: sizeof(struct pollfd) * manager->nevents);
3663: isc_mem_put(mctx, manager->fdpollinfo,
3664: sizeof(pollinfo_t) * manager->maxsocks);
3665: return (result);
3666: }
3667: #ifdef ISC_PLATFORM_USETHREADS
3668: result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3669: if (result != ISC_R_SUCCESS) {
3670: close(manager->devpoll_fd);
3671: isc_mem_put(mctx, manager->events,
3672: sizeof(struct pollfd) * manager->nevents);
3673: isc_mem_put(mctx, manager->fdpollinfo,
3674: sizeof(pollinfo_t) * manager->maxsocks);
3675: return (result);
3676: }
3677: #endif /* ISC_PLATFORM_USETHREADS */
3678: #elif defined(USE_SELECT)
3679: UNUSED(result);
3680:
3681: #if ISC_SOCKET_MAXSOCKETS > FD_SETSIZE
3682: /*
3683: * Note: this code should also cover the case of MAXSOCKETS <=
3684: * FD_SETSIZE, but we separate the cases to avoid possible portability
3685: * issues regarding howmany() and the actual representation of fd_set.
3686: */
3687: manager->fd_bufsize = howmany(manager->maxsocks, NFDBITS) *
3688: sizeof(fd_mask);
3689: #else
3690: manager->fd_bufsize = sizeof(fd_set);
3691: #endif
3692:
3693: manager->read_fds = NULL;
3694: manager->read_fds_copy = NULL;
3695: manager->write_fds = NULL;
3696: manager->write_fds_copy = NULL;
3697:
3698: manager->read_fds = isc_mem_get(mctx, manager->fd_bufsize);
3699: if (manager->read_fds != NULL)
3700: manager->read_fds_copy = isc_mem_get(mctx, manager->fd_bufsize);
3701: if (manager->read_fds_copy != NULL)
3702: manager->write_fds = isc_mem_get(mctx, manager->fd_bufsize);
3703: if (manager->write_fds != NULL) {
3704: manager->write_fds_copy = isc_mem_get(mctx,
3705: manager->fd_bufsize);
3706: }
3707: if (manager->write_fds_copy == NULL) {
3708: if (manager->write_fds != NULL) {
3709: isc_mem_put(mctx, manager->write_fds,
3710: manager->fd_bufsize);
3711: }
3712: if (manager->read_fds_copy != NULL) {
3713: isc_mem_put(mctx, manager->read_fds_copy,
3714: manager->fd_bufsize);
3715: }
3716: if (manager->read_fds != NULL) {
3717: isc_mem_put(mctx, manager->read_fds,
3718: manager->fd_bufsize);
3719: }
3720: return (ISC_R_NOMEMORY);
3721: }
3722: memset(manager->read_fds, 0, manager->fd_bufsize);
3723: memset(manager->write_fds, 0, manager->fd_bufsize);
3724:
3725: #ifdef ISC_PLATFORM_USETHREADS
3726: (void)watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3727: manager->maxfd = manager->pipe_fds[0];
3728: #else /* ISC_PLATFORM_USETHREADS */
3729: manager->maxfd = 0;
3730: #endif /* ISC_PLATFORM_USETHREADS */
3731: #endif /* USE_KQUEUE */
3732:
3733: return (ISC_R_SUCCESS);
3734: }
3735:
3736: static void
3737: cleanup_watcher(isc_mem_t *mctx, isc_socketmgr_t *manager) {
3738: #ifdef ISC_PLATFORM_USETHREADS
3739: isc_result_t result;
3740:
3741: result = unwatch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3742: if (result != ISC_R_SUCCESS) {
3743: UNEXPECTED_ERROR(__FILE__, __LINE__,
3744: "epoll_ctl(DEL) %s",
3745: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3746: ISC_MSG_FAILED, "failed"));
3747: }
3748: #endif /* ISC_PLATFORM_USETHREADS */
3749:
3750: #ifdef USE_KQUEUE
3751: close(manager->kqueue_fd);
3752: isc_mem_put(mctx, manager->events,
3753: sizeof(struct kevent) * manager->nevents);
3754: #elif defined(USE_EPOLL)
3755: close(manager->epoll_fd);
3756: isc_mem_put(mctx, manager->events,
3757: sizeof(struct epoll_event) * manager->nevents);
3758: #elif defined(USE_DEVPOLL)
3759: close(manager->devpoll_fd);
3760: isc_mem_put(mctx, manager->events,
3761: sizeof(struct pollfd) * manager->nevents);
3762: isc_mem_put(mctx, manager->fdpollinfo,
3763: sizeof(pollinfo_t) * manager->maxsocks);
3764: #elif defined(USE_SELECT)
3765: if (manager->read_fds != NULL)
3766: isc_mem_put(mctx, manager->read_fds, manager->fd_bufsize);
3767: if (manager->read_fds_copy != NULL)
3768: isc_mem_put(mctx, manager->read_fds_copy, manager->fd_bufsize);
3769: if (manager->write_fds != NULL)
3770: isc_mem_put(mctx, manager->write_fds, manager->fd_bufsize);
3771: if (manager->write_fds_copy != NULL)
3772: isc_mem_put(mctx, manager->write_fds_copy, manager->fd_bufsize);
3773: #endif /* USE_KQUEUE */
3774: }
3775:
3776: isc_result_t
3777: isc_socketmgr_create(isc_mem_t *mctx, isc_socketmgr_t **managerp) {
3778: return (isc_socketmgr_create2(mctx, managerp, 0));
3779: }
3780:
3781: isc_result_t
3782: isc_socketmgr_create2(isc_mem_t *mctx, isc_socketmgr_t **managerp,
3783: unsigned int maxsocks)
3784: {
3785: int i;
3786: isc_socketmgr_t *manager;
3787: #ifdef ISC_PLATFORM_USETHREADS
3788: char strbuf[ISC_STRERRORSIZE];
3789: #endif
3790: isc_result_t result;
3791:
3792: REQUIRE(managerp != NULL && *managerp == NULL);
3793:
3794: #ifndef ISC_PLATFORM_USETHREADS
3795: if (socketmgr != NULL) {
3796: /* Don't allow maxsocks to be updated */
3797: if (maxsocks > 0 && socketmgr->maxsocks != maxsocks)
3798: return (ISC_R_EXISTS);
3799:
3800: socketmgr->refs++;
3801: *managerp = socketmgr;
3802: return (ISC_R_SUCCESS);
3803: }
3804: #endif /* ISC_PLATFORM_USETHREADS */
3805:
3806: if (maxsocks == 0)
3807: maxsocks = ISC_SOCKET_MAXSOCKETS;
3808:
3809: manager = isc_mem_get(mctx, sizeof(*manager));
3810: if (manager == NULL)
3811: return (ISC_R_NOMEMORY);
3812:
3813: /* zero-clear so that necessary cleanup on failure will be easy */
3814: memset(manager, 0, sizeof(*manager));
3815: manager->maxsocks = maxsocks;
3816: manager->reserved = 0;
3817: manager->fds = isc_mem_get(mctx,
3818: manager->maxsocks * sizeof(isc_socket_t *));
3819: if (manager->fds == NULL) {
3820: result = ISC_R_NOMEMORY;
3821: goto free_manager;
3822: }
3823: manager->fdstate = isc_mem_get(mctx, manager->maxsocks * sizeof(int));
3824: if (manager->fdstate == NULL) {
3825: result = ISC_R_NOMEMORY;
3826: goto free_manager;
3827: }
3828: manager->stats = NULL;
3829:
3830: manager->magic = SOCKET_MANAGER_MAGIC;
3831: manager->mctx = NULL;
3832: memset(manager->fds, 0, manager->maxsocks * sizeof(isc_socket_t *));
3833: ISC_LIST_INIT(manager->socklist);
3834: result = isc_mutex_init(&manager->lock);
3835: if (result != ISC_R_SUCCESS)
3836: goto free_manager;
3837: manager->fdlock = isc_mem_get(mctx, FDLOCK_COUNT * sizeof(isc_mutex_t));
3838: if (manager->fdlock == NULL) {
3839: result = ISC_R_NOMEMORY;
3840: goto cleanup_lock;
3841: }
3842: for (i = 0; i < FDLOCK_COUNT; i++) {
3843: result = isc_mutex_init(&manager->fdlock[i]);
3844: if (result != ISC_R_SUCCESS) {
3845: while (--i >= 0)
3846: DESTROYLOCK(&manager->fdlock[i]);
3847: isc_mem_put(mctx, manager->fdlock,
3848: FDLOCK_COUNT * sizeof(isc_mutex_t));
3849: manager->fdlock = NULL;
3850: goto cleanup_lock;
3851: }
3852: }
3853:
3854: #ifdef ISC_PLATFORM_USETHREADS
3855: if (isc_condition_init(&manager->shutdown_ok) != ISC_R_SUCCESS) {
3856: UNEXPECTED_ERROR(__FILE__, __LINE__,
3857: "isc_condition_init() %s",
3858: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3859: ISC_MSG_FAILED, "failed"));
3860: result = ISC_R_UNEXPECTED;
3861: goto cleanup_lock;
3862: }
3863:
3864: /*
3865: * Create the special fds that will be used to wake up the
3866: * select/poll loop when something internal needs to be done.
3867: */
3868: if (pipe(manager->pipe_fds) != 0) {
3869: isc__strerror(errno, strbuf, sizeof(strbuf));
3870: UNEXPECTED_ERROR(__FILE__, __LINE__,
3871: "pipe() %s: %s",
3872: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3873: ISC_MSG_FAILED, "failed"),
3874: strbuf);
3875: result = ISC_R_UNEXPECTED;
3876: goto cleanup_condition;
3877: }
3878:
3879: RUNTIME_CHECK(make_nonblock(manager->pipe_fds[0]) == ISC_R_SUCCESS);
3880: #if 0
3881: RUNTIME_CHECK(make_nonblock(manager->pipe_fds[1]) == ISC_R_SUCCESS);
3882: #endif
3883: #else /* ISC_PLATFORM_USETHREADS */
3884: manager->refs = 1;
3885: #endif /* ISC_PLATFORM_USETHREADS */
3886:
3887: /*
3888: * Set up initial state for the select loop
3889: */
3890: result = setup_watcher(mctx, manager);
3891: if (result != ISC_R_SUCCESS)
3892: goto cleanup;
3893: memset(manager->fdstate, 0, manager->maxsocks * sizeof(int));
3894: #ifdef ISC_PLATFORM_USETHREADS
3895: /*
3896: * Start up the select/poll thread.
3897: */
3898: if (isc_thread_create(watcher, manager, &manager->watcher) !=
3899: ISC_R_SUCCESS) {
3900: UNEXPECTED_ERROR(__FILE__, __LINE__,
3901: "isc_thread_create() %s",
3902: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3903: ISC_MSG_FAILED, "failed"));
3904: cleanup_watcher(mctx, manager);
3905: result = ISC_R_UNEXPECTED;
3906: goto cleanup;
3907: }
3908: #endif /* ISC_PLATFORM_USETHREADS */
3909: isc_mem_attach(mctx, &manager->mctx);
3910:
3911: #ifndef ISC_PLATFORM_USETHREADS
3912: socketmgr = manager;
3913: #endif /* ISC_PLATFORM_USETHREADS */
3914: *managerp = manager;
3915:
3916: return (ISC_R_SUCCESS);
3917:
3918: cleanup:
3919: #ifdef ISC_PLATFORM_USETHREADS
3920: (void)close(manager->pipe_fds[0]);
3921: (void)close(manager->pipe_fds[1]);
3922: #endif /* ISC_PLATFORM_USETHREADS */
3923:
3924: #ifdef ISC_PLATFORM_USETHREADS
3925: cleanup_condition:
3926: (void)isc_condition_destroy(&manager->shutdown_ok);
3927: #endif /* ISC_PLATFORM_USETHREADS */
3928:
3929:
3930: cleanup_lock:
3931: if (manager->fdlock != NULL) {
3932: for (i = 0; i < FDLOCK_COUNT; i++)
3933: DESTROYLOCK(&manager->fdlock[i]);
3934: }
3935: DESTROYLOCK(&manager->lock);
3936:
3937: free_manager:
3938: if (manager->fdlock != NULL) {
3939: isc_mem_put(mctx, manager->fdlock,
3940: FDLOCK_COUNT * sizeof(isc_mutex_t));
3941: }
3942: if (manager->fdstate != NULL) {
3943: isc_mem_put(mctx, manager->fdstate,
3944: manager->maxsocks * sizeof(int));
3945: }
3946: if (manager->fds != NULL) {
3947: isc_mem_put(mctx, manager->fds,
3948: manager->maxsocks * sizeof(isc_socket_t *));
3949: }
3950: isc_mem_put(mctx, manager, sizeof(*manager));
3951:
3952: return (result);
3953: }
3954:
3955: isc_result_t
3956: isc_socketmgr_getmaxsockets(isc_socketmgr_t *manager, unsigned int *nsockp) {
3957: REQUIRE(VALID_MANAGER(manager));
3958: REQUIRE(nsockp != NULL);
3959:
3960: *nsockp = manager->maxsocks;
3961:
3962: return (ISC_R_SUCCESS);
3963: }
3964:
3965: void
3966: isc_socketmgr_setstats(isc_socketmgr_t *manager, isc_stats_t *stats) {
3967: REQUIRE(VALID_MANAGER(manager));
3968: REQUIRE(ISC_LIST_EMPTY(manager->socklist));
3969: REQUIRE(manager->stats == NULL);
3970: REQUIRE(isc_stats_ncounters(stats) == isc_sockstatscounter_max);
3971:
3972: isc_stats_attach(stats, &manager->stats);
3973: }
3974:
3975: void
3976: isc_socketmgr_destroy(isc_socketmgr_t **managerp) {
3977: isc_socketmgr_t *manager;
3978: int i;
3979: isc_mem_t *mctx;
3980:
3981: /*
3982: * Destroy a socket manager.
3983: */
3984:
3985: REQUIRE(managerp != NULL);
3986: manager = *managerp;
3987: REQUIRE(VALID_MANAGER(manager));
3988:
3989: #ifndef ISC_PLATFORM_USETHREADS
3990: if (manager->refs > 1) {
3991: manager->refs--;
3992: *managerp = NULL;
3993: return;
3994: }
3995: #endif /* ISC_PLATFORM_USETHREADS */
3996:
3997: LOCK(&manager->lock);
3998:
3999: #ifdef ISC_PLATFORM_USETHREADS
4000: /*
4001: * Wait for all sockets to be destroyed.
4002: */
4003: while (!ISC_LIST_EMPTY(manager->socklist)) {
4004: manager_log(manager, CREATION, "%s",
4005: isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
4006: ISC_MSG_SOCKETSREMAIN,
4007: "sockets exist"));
4008: WAIT(&manager->shutdown_ok, &manager->lock);
4009: }
4010: #else /* ISC_PLATFORM_USETHREADS */
4011: /*
4012: * Hope all sockets have been destroyed.
4013: */
4014: if (!ISC_LIST_EMPTY(manager->socklist)) {
4015: manager_log(manager, CREATION, "%s",
4016: isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
4017: ISC_MSG_SOCKETSREMAIN,
4018: "sockets exist"));
4019: INSIST(0);
4020: }
4021: #endif /* ISC_PLATFORM_USETHREADS */
4022:
4023: UNLOCK(&manager->lock);
4024:
4025: /*
4026: * Here, poke our select/poll thread. Do this by closing the write
4027: * half of the pipe, which will send EOF to the read half.
4028: * This is currently a no-op in the non-threaded case.
4029: */
4030: select_poke(manager, 0, SELECT_POKE_SHUTDOWN);
4031:
4032: #ifdef ISC_PLATFORM_USETHREADS
4033: /*
4034: * Wait for thread to exit.
4035: */
4036: if (isc_thread_join(manager->watcher, NULL) != ISC_R_SUCCESS)
4037: UNEXPECTED_ERROR(__FILE__, __LINE__,
4038: "isc_thread_join() %s",
4039: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4040: ISC_MSG_FAILED, "failed"));
4041: #endif /* ISC_PLATFORM_USETHREADS */
4042:
4043: /*
4044: * Clean up.
4045: */
4046: cleanup_watcher(manager->mctx, manager);
4047:
4048: #ifdef ISC_PLATFORM_USETHREADS
4049: (void)close(manager->pipe_fds[0]);
4050: (void)close(manager->pipe_fds[1]);
4051: (void)isc_condition_destroy(&manager->shutdown_ok);
4052: #endif /* ISC_PLATFORM_USETHREADS */
4053:
4054: for (i = 0; i < (int)manager->maxsocks; i++)
4055: if (manager->fdstate[i] == CLOSE_PENDING) /* no need to lock */
4056: (void)close(i);
4057:
4058: isc_mem_put(manager->mctx, manager->fds,
4059: manager->maxsocks * sizeof(isc_socket_t *));
4060: isc_mem_put(manager->mctx, manager->fdstate,
4061: manager->maxsocks * sizeof(int));
4062:
4063: if (manager->stats != NULL)
4064: isc_stats_detach(&manager->stats);
4065:
4066: if (manager->fdlock != NULL) {
4067: for (i = 0; i < FDLOCK_COUNT; i++)
4068: DESTROYLOCK(&manager->fdlock[i]);
4069: isc_mem_put(manager->mctx, manager->fdlock,
4070: FDLOCK_COUNT * sizeof(isc_mutex_t));
4071: }
4072: DESTROYLOCK(&manager->lock);
4073: manager->magic = 0;
4074: mctx= manager->mctx;
4075: isc_mem_put(mctx, manager, sizeof(*manager));
4076:
4077: isc_mem_detach(&mctx);
4078:
4079: *managerp = NULL;
4080: }
4081:
4082: static isc_result_t
4083: socket_recv(isc_socket_t *sock, isc_socketevent_t *dev, isc_task_t *task,
4084: unsigned int flags)
4085: {
4086: int io_state;
4087: isc_boolean_t have_lock = ISC_FALSE;
4088: isc_task_t *ntask = NULL;
4089: isc_result_t result = ISC_R_SUCCESS;
4090:
4091: dev->ev_sender = task;
4092:
4093: if (sock->type == isc_sockettype_udp) {
4094: io_state = doio_recv(sock, dev);
4095: } else {
4096: LOCK(&sock->lock);
4097: have_lock = ISC_TRUE;
4098:
4099: if (ISC_LIST_EMPTY(sock->recv_list))
4100: io_state = doio_recv(sock, dev);
4101: else
4102: io_state = DOIO_SOFT;
4103: }
4104:
4105: switch (io_state) {
4106: case DOIO_SOFT:
4107: /*
4108: * We couldn't read all or part of the request right now, so
4109: * queue it.
4110: *
4111: * Attach to socket and to task
4112: */
4113: isc_task_attach(task, &ntask);
4114: dev->attributes |= ISC_SOCKEVENTATTR_ATTACHED;
4115:
4116: if (!have_lock) {
4117: LOCK(&sock->lock);
4118: have_lock = ISC_TRUE;
4119: }
4120:
4121: /*
4122: * Enqueue the request. If the socket was previously not being
4123: * watched, poke the watcher to start paying attention to it.
4124: */
4125: if (ISC_LIST_EMPTY(sock->recv_list) && !sock->pending_recv)
4126: select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
4127: ISC_LIST_ENQUEUE(sock->recv_list, dev, ev_link);
4128:
4129: socket_log(sock, NULL, EVENT, NULL, 0, 0,
4130: "socket_recv: event %p -> task %p",
4131: dev, ntask);
4132:
4133: if ((flags & ISC_SOCKFLAG_IMMEDIATE) != 0)
4134: result = ISC_R_INPROGRESS;
4135: break;
4136:
4137: case DOIO_EOF:
4138: dev->result = ISC_R_EOF;
4139: /* fallthrough */
4140:
4141: case DOIO_HARD:
4142: case DOIO_SUCCESS:
4143: if ((flags & ISC_SOCKFLAG_IMMEDIATE) == 0)
4144: send_recvdone_event(sock, &dev);
4145: break;
4146: }
4147:
4148: if (have_lock)
4149: UNLOCK(&sock->lock);
4150:
4151: return (result);
4152: }
4153:
4154: isc_result_t
4155: isc_socket_recvv(isc_socket_t *sock, isc_bufferlist_t *buflist,
4156: unsigned int minimum, isc_task_t *task,
4157: isc_taskaction_t action, const void *arg)
4158: {
4159: isc_socketevent_t *dev;
4160: isc_socketmgr_t *manager;
4161: unsigned int iocount;
4162: isc_buffer_t *buffer;
4163:
4164: REQUIRE(VALID_SOCKET(sock));
4165: REQUIRE(buflist != NULL);
4166: REQUIRE(!ISC_LIST_EMPTY(*buflist));
4167: REQUIRE(task != NULL);
4168: REQUIRE(action != NULL);
4169:
4170: manager = sock->manager;
4171: REQUIRE(VALID_MANAGER(manager));
4172:
4173: iocount = isc_bufferlist_availablecount(buflist);
4174: REQUIRE(iocount > 0);
4175:
4176: INSIST(sock->bound);
4177:
4178: dev = allocate_socketevent(sock, ISC_SOCKEVENT_RECVDONE, action, arg);
4179: if (dev == NULL) {
4180: return (ISC_R_NOMEMORY);
4181: }
4182:
4183: /*
4184: * UDP sockets are always partial read
4185: */
4186: if (sock->type == isc_sockettype_udp)
4187: dev->minimum = 1;
4188: else {
4189: if (minimum == 0)
4190: dev->minimum = iocount;
4191: else
4192: dev->minimum = minimum;
4193: }
4194:
4195: /*
4196: * Move each buffer from the passed in list to our internal one.
4197: */
4198: buffer = ISC_LIST_HEAD(*buflist);
4199: while (buffer != NULL) {
4200: ISC_LIST_DEQUEUE(*buflist, buffer, link);
4201: ISC_LIST_ENQUEUE(dev->bufferlist, buffer, link);
4202: buffer = ISC_LIST_HEAD(*buflist);
4203: }
4204:
4205: return (socket_recv(sock, dev, task, 0));
4206: }
4207:
4208: isc_result_t
4209: isc_socket_recv(isc_socket_t *sock, isc_region_t *region, unsigned int minimum,
4210: isc_task_t *task, isc_taskaction_t action, const void *arg)
4211: {
4212: isc_socketevent_t *dev;
4213: isc_socketmgr_t *manager;
4214:
4215: REQUIRE(VALID_SOCKET(sock));
4216: REQUIRE(action != NULL);
4217:
4218: manager = sock->manager;
4219: REQUIRE(VALID_MANAGER(manager));
4220:
4221: INSIST(sock->bound);
4222:
4223: dev = allocate_socketevent(sock, ISC_SOCKEVENT_RECVDONE, action, arg);
4224: if (dev == NULL)
4225: return (ISC_R_NOMEMORY);
4226:
4227: return (isc_socket_recv2(sock, region, minimum, task, dev, 0));
4228: }
4229:
4230: isc_result_t
4231: isc_socket_recv2(isc_socket_t *sock, isc_region_t *region,
4232: unsigned int minimum, isc_task_t *task,
4233: isc_socketevent_t *event, unsigned int flags)
4234: {
4235: event->ev_sender = sock;
4236: event->result = ISC_R_UNEXPECTED;
4237: ISC_LIST_INIT(event->bufferlist);
4238: event->region = *region;
4239: event->n = 0;
4240: event->offset = 0;
4241: event->attributes = 0;
4242:
4243: /*
4244: * UDP sockets are always partial read.
4245: */
4246: if (sock->type == isc_sockettype_udp)
4247: event->minimum = 1;
4248: else {
4249: if (minimum == 0)
4250: event->minimum = region->length;
4251: else
4252: event->minimum = minimum;
4253: }
4254:
4255: return (socket_recv(sock, event, task, flags));
4256: }
4257:
4258: static isc_result_t
4259: socket_send(isc_socket_t *sock, isc_socketevent_t *dev, isc_task_t *task,
4260: isc_sockaddr_t *address, struct in6_pktinfo *pktinfo,
4261: unsigned int flags)
4262: {
4263: int io_state;
4264: isc_boolean_t have_lock = ISC_FALSE;
4265: isc_task_t *ntask = NULL;
4266: isc_result_t result = ISC_R_SUCCESS;
4267:
4268: dev->ev_sender = task;
4269:
4270: set_dev_address(address, sock, dev);
4271: if (pktinfo != NULL) {
4272: dev->attributes |= ISC_SOCKEVENTATTR_PKTINFO;
4273: dev->pktinfo = *pktinfo;
4274:
4275: if (!isc_sockaddr_issitelocal(&dev->address) &&
4276: !isc_sockaddr_islinklocal(&dev->address)) {
4277: socket_log(sock, NULL, TRACE, isc_msgcat,
4278: ISC_MSGSET_SOCKET, ISC_MSG_PKTINFOPROVIDED,
4279: "pktinfo structure provided, ifindex %u "
4280: "(set to 0)", pktinfo->ipi6_ifindex);
4281:
4282: /*
4283: * Set the pktinfo index to 0 here, to let the
4284: * kernel decide what interface it should send on.
4285: */
4286: dev->pktinfo.ipi6_ifindex = 0;
4287: }
4288: }
4289:
4290: if (sock->type == isc_sockettype_udp)
4291: io_state = doio_send(sock, dev);
4292: else {
4293: LOCK(&sock->lock);
4294: have_lock = ISC_TRUE;
4295:
4296: if (ISC_LIST_EMPTY(sock->send_list))
4297: io_state = doio_send(sock, dev);
4298: else
4299: io_state = DOIO_SOFT;
4300: }
4301:
4302: switch (io_state) {
4303: case DOIO_SOFT:
4304: /*
4305: * We couldn't send all or part of the request right now, so
4306: * queue it unless ISC_SOCKFLAG_NORETRY is set.
4307: */
4308: if ((flags & ISC_SOCKFLAG_NORETRY) == 0) {
4309: isc_task_attach(task, &ntask);
4310: dev->attributes |= ISC_SOCKEVENTATTR_ATTACHED;
4311:
4312: if (!have_lock) {
4313: LOCK(&sock->lock);
4314: have_lock = ISC_TRUE;
4315: }
4316:
4317: /*
4318: * Enqueue the request. If the socket was previously
4319: * not being watched, poke the watcher to start
4320: * paying attention to it.
4321: */
4322: if (ISC_LIST_EMPTY(sock->send_list) &&
4323: !sock->pending_send)
4324: select_poke(sock->manager, sock->fd,
4325: SELECT_POKE_WRITE);
4326: ISC_LIST_ENQUEUE(sock->send_list, dev, ev_link);
4327:
4328: socket_log(sock, NULL, EVENT, NULL, 0, 0,
4329: "socket_send: event %p -> task %p",
4330: dev, ntask);
4331:
4332: if ((flags & ISC_SOCKFLAG_IMMEDIATE) != 0)
4333: result = ISC_R_INPROGRESS;
4334: break;
4335: }
4336:
4337: case DOIO_HARD:
4338: case DOIO_SUCCESS:
4339: if ((flags & ISC_SOCKFLAG_IMMEDIATE) == 0)
4340: send_senddone_event(sock, &dev);
4341: break;
4342: }
4343:
4344: if (have_lock)
4345: UNLOCK(&sock->lock);
4346:
4347: return (result);
4348: }
4349:
4350: isc_result_t
4351: isc_socket_send(isc_socket_t *sock, isc_region_t *region,
4352: isc_task_t *task, isc_taskaction_t action, const void *arg)
4353: {
4354: /*
4355: * REQUIRE() checking is performed in isc_socket_sendto().
4356: */
4357: return (isc_socket_sendto(sock, region, task, action, arg, NULL,
4358: NULL));
4359: }
4360:
4361: isc_result_t
4362: isc_socket_sendto(isc_socket_t *sock, isc_region_t *region,
4363: isc_task_t *task, isc_taskaction_t action, const void *arg,
4364: isc_sockaddr_t *address, struct in6_pktinfo *pktinfo)
4365: {
4366: isc_socketevent_t *dev;
4367: isc_socketmgr_t *manager;
4368:
4369: REQUIRE(VALID_SOCKET(sock));
4370: REQUIRE(region != NULL);
4371: REQUIRE(task != NULL);
4372: REQUIRE(action != NULL);
4373:
4374: manager = sock->manager;
4375: REQUIRE(VALID_MANAGER(manager));
4376:
4377: INSIST(sock->bound);
4378:
4379: dev = allocate_socketevent(sock, ISC_SOCKEVENT_SENDDONE, action, arg);
4380: if (dev == NULL) {
4381: return (ISC_R_NOMEMORY);
4382: }
4383:
4384: dev->region = *region;
4385:
4386: return (socket_send(sock, dev, task, address, pktinfo, 0));
4387: }
4388:
4389: isc_result_t
4390: isc_socket_sendv(isc_socket_t *sock, isc_bufferlist_t *buflist,
4391: isc_task_t *task, isc_taskaction_t action, const void *arg)
4392: {
4393: return (isc_socket_sendtov(sock, buflist, task, action, arg, NULL,
4394: NULL));
4395: }
4396:
4397: isc_result_t
4398: isc_socket_sendtov(isc_socket_t *sock, isc_bufferlist_t *buflist,
4399: isc_task_t *task, isc_taskaction_t action, const void *arg,
4400: isc_sockaddr_t *address, struct in6_pktinfo *pktinfo)
4401: {
4402: isc_socketevent_t *dev;
4403: isc_socketmgr_t *manager;
4404: unsigned int iocount;
4405: isc_buffer_t *buffer;
4406:
4407: REQUIRE(VALID_SOCKET(sock));
4408: REQUIRE(buflist != NULL);
4409: REQUIRE(!ISC_LIST_EMPTY(*buflist));
4410: REQUIRE(task != NULL);
4411: REQUIRE(action != NULL);
4412:
4413: manager = sock->manager;
4414: REQUIRE(VALID_MANAGER(manager));
4415:
4416: iocount = isc_bufferlist_usedcount(buflist);
4417: REQUIRE(iocount > 0);
4418:
4419: dev = allocate_socketevent(sock, ISC_SOCKEVENT_SENDDONE, action, arg);
4420: if (dev == NULL) {
4421: return (ISC_R_NOMEMORY);
4422: }
4423:
4424: /*
4425: * Move each buffer from the passed in list to our internal one.
4426: */
4427: buffer = ISC_LIST_HEAD(*buflist);
4428: while (buffer != NULL) {
4429: ISC_LIST_DEQUEUE(*buflist, buffer, link);
4430: ISC_LIST_ENQUEUE(dev->bufferlist, buffer, link);
4431: buffer = ISC_LIST_HEAD(*buflist);
4432: }
4433:
4434: return (socket_send(sock, dev, task, address, pktinfo, 0));
4435: }
4436:
4437: isc_result_t
4438: isc_socket_sendto2(isc_socket_t *sock, isc_region_t *region,
4439: isc_task_t *task,
4440: isc_sockaddr_t *address, struct in6_pktinfo *pktinfo,
4441: isc_socketevent_t *event, unsigned int flags)
4442: {
4443: REQUIRE((flags & ~(ISC_SOCKFLAG_IMMEDIATE|ISC_SOCKFLAG_NORETRY)) == 0);
4444: if ((flags & ISC_SOCKFLAG_NORETRY) != 0)
4445: REQUIRE(sock->type == isc_sockettype_udp);
4446: event->ev_sender = sock;
4447: event->result = ISC_R_UNEXPECTED;
4448: ISC_LIST_INIT(event->bufferlist);
4449: event->region = *region;
4450: event->n = 0;
4451: event->offset = 0;
4452: event->attributes = 0;
4453:
4454: return (socket_send(sock, event, task, address, pktinfo, flags));
4455: }
4456:
4457: void
4458: isc_socket_cleanunix(isc_sockaddr_t *sockaddr, isc_boolean_t active) {
4459: #ifdef ISC_PLATFORM_HAVESYSUNH
4460: int s;
4461: struct stat sb;
4462: char strbuf[ISC_STRERRORSIZE];
4463:
4464: if (sockaddr->type.sa.sa_family != AF_UNIX)
4465: return;
4466:
4467: #ifndef S_ISSOCK
4468: #if defined(S_IFMT) && defined(S_IFSOCK)
4469: #define S_ISSOCK(mode) ((mode & S_IFMT)==S_IFSOCK)
4470: #elif defined(_S_IFMT) && defined(S_IFSOCK)
4471: #define S_ISSOCK(mode) ((mode & _S_IFMT)==S_IFSOCK)
4472: #endif
4473: #endif
4474:
4475: #ifndef S_ISFIFO
4476: #if defined(S_IFMT) && defined(S_IFIFO)
4477: #define S_ISFIFO(mode) ((mode & S_IFMT)==S_IFIFO)
4478: #elif defined(_S_IFMT) && defined(S_IFIFO)
4479: #define S_ISFIFO(mode) ((mode & _S_IFMT)==S_IFIFO)
4480: #endif
4481: #endif
4482:
4483: #if !defined(S_ISFIFO) && !defined(S_ISSOCK)
4484: #error You need to define S_ISFIFO and S_ISSOCK as appropriate for your platform. See <sys/stat.h>.
4485: #endif
4486:
4487: #ifndef S_ISFIFO
4488: #define S_ISFIFO(mode) 0
4489: #endif
4490:
4491: #ifndef S_ISSOCK
4492: #define S_ISSOCK(mode) 0
4493: #endif
4494:
4495: if (active) {
4496: if (stat(sockaddr->type.sunix.sun_path, &sb) < 0) {
4497: isc__strerror(errno, strbuf, sizeof(strbuf));
4498: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4499: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4500: "isc_socket_cleanunix: stat(%s): %s",
4501: sockaddr->type.sunix.sun_path, strbuf);
4502: return;
4503: }
4504: if (!(S_ISSOCK(sb.st_mode) || S_ISFIFO(sb.st_mode))) {
4505: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4506: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4507: "isc_socket_cleanunix: %s: not a socket",
4508: sockaddr->type.sunix.sun_path);
4509: return;
4510: }
4511: if (unlink(sockaddr->type.sunix.sun_path) < 0) {
4512: isc__strerror(errno, strbuf, sizeof(strbuf));
4513: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4514: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4515: "isc_socket_cleanunix: unlink(%s): %s",
4516: sockaddr->type.sunix.sun_path, strbuf);
4517: }
4518: return;
4519: }
4520:
4521: s = socket(AF_UNIX, SOCK_STREAM, 0);
4522: if (s < 0) {
4523: isc__strerror(errno, strbuf, sizeof(strbuf));
4524: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4525: ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4526: "isc_socket_cleanunix: socket(%s): %s",
4527: sockaddr->type.sunix.sun_path, strbuf);
4528: return;
4529: }
4530:
4531: if (stat(sockaddr->type.sunix.sun_path, &sb) < 0) {
4532: switch (errno) {
4533: case ENOENT: /* We exited cleanly last time */
4534: break;
4535: default:
4536: isc__strerror(errno, strbuf, sizeof(strbuf));
4537: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4538: ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4539: "isc_socket_cleanunix: stat(%s): %s",
4540: sockaddr->type.sunix.sun_path, strbuf);
4541: break;
4542: }
4543: goto cleanup;
4544: }
4545:
4546: if (!(S_ISSOCK(sb.st_mode) || S_ISFIFO(sb.st_mode))) {
4547: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4548: ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4549: "isc_socket_cleanunix: %s: not a socket",
4550: sockaddr->type.sunix.sun_path);
4551: goto cleanup;
4552: }
4553:
4554: if (connect(s, (struct sockaddr *)&sockaddr->type.sunix,
4555: sizeof(sockaddr->type.sunix)) < 0) {
4556: switch (errno) {
4557: case ECONNREFUSED:
4558: case ECONNRESET:
4559: if (unlink(sockaddr->type.sunix.sun_path) < 0) {
4560: isc__strerror(errno, strbuf, sizeof(strbuf));
4561: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4562: ISC_LOGMODULE_SOCKET,
4563: ISC_LOG_WARNING,
4564: "isc_socket_cleanunix: "
4565: "unlink(%s): %s",
4566: sockaddr->type.sunix.sun_path,
4567: strbuf);
4568: }
4569: break;
4570: default:
4571: isc__strerror(errno, strbuf, sizeof(strbuf));
4572: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4573: ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4574: "isc_socket_cleanunix: connect(%s): %s",
4575: sockaddr->type.sunix.sun_path, strbuf);
4576: break;
4577: }
4578: }
4579: cleanup:
4580: close(s);
4581: #else
4582: UNUSED(sockaddr);
4583: UNUSED(active);
4584: #endif
4585: }
4586:
4587: isc_result_t
4588: isc_socket_permunix(isc_sockaddr_t *sockaddr, isc_uint32_t perm,
4589: isc_uint32_t owner, isc_uint32_t group)
4590: {
4591: #ifdef ISC_PLATFORM_HAVESYSUNH
4592: isc_result_t result = ISC_R_SUCCESS;
4593: char strbuf[ISC_STRERRORSIZE];
4594: char path[sizeof(sockaddr->type.sunix.sun_path)];
4595: #ifdef NEED_SECURE_DIRECTORY
4596: char *slash;
4597: #endif
4598:
4599: REQUIRE(sockaddr->type.sa.sa_family == AF_UNIX);
4600: INSIST(strlen(sockaddr->type.sunix.sun_path) < sizeof(path));
4601: strcpy(path, sockaddr->type.sunix.sun_path);
4602:
4603: #ifdef NEED_SECURE_DIRECTORY
4604: slash = strrchr(path, '/');
4605: if (slash != NULL) {
4606: if (slash != path)
4607: *slash = '\0';
4608: else
4609: strcpy(path, "/");
4610: } else
4611: strcpy(path, ".");
4612: #endif
4613:
4614: if (chmod(path, perm) < 0) {
4615: isc__strerror(errno, strbuf, sizeof(strbuf));
4616: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4617: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4618: "isc_socket_permunix: chmod(%s, %d): %s",
4619: path, perm, strbuf);
4620: result = ISC_R_FAILURE;
4621: }
4622: if (chown(path, owner, group) < 0) {
4623: isc__strerror(errno, strbuf, sizeof(strbuf));
4624: isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4625: ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4626: "isc_socket_permunix: chown(%s, %d, %d): %s",
4627: path, owner, group,
4628: strbuf);
4629: result = ISC_R_FAILURE;
4630: }
4631: return (result);
4632: #else
4633: UNUSED(sockaddr);
4634: UNUSED(perm);
4635: UNUSED(owner);
4636: UNUSED(group);
4637: return (ISC_R_NOTIMPLEMENTED);
4638: #endif
4639: }
4640:
4641: isc_result_t
4642: isc_socket_bind(isc_socket_t *sock, isc_sockaddr_t *sockaddr,
4643: unsigned int options) {
4644: char strbuf[ISC_STRERRORSIZE];
4645: int on = 1;
4646:
4647: LOCK(&sock->lock);
4648:
4649: INSIST(!sock->bound);
4650:
4651: if (sock->pf != sockaddr->type.sa.sa_family) {
4652: UNLOCK(&sock->lock);
4653: return (ISC_R_FAMILYMISMATCH);
4654: }
4655: /*
4656: * Only set SO_REUSEADDR when we want a specific port.
4657: */
4658: #ifdef AF_UNIX
4659: if (sock->pf == AF_UNIX)
4660: goto bind_socket;
4661: #endif
4662: if ((options & ISC_SOCKET_REUSEADDRESS) != 0 &&
4663: isc_sockaddr_getport(sockaddr) != (in_port_t)0 &&
4664: setsockopt(sock->fd, SOL_SOCKET, SO_REUSEADDR, (void *)&on,
4665: sizeof(on)) < 0) {
4666: UNEXPECTED_ERROR(__FILE__, __LINE__,
4667: "setsockopt(%d) %s", sock->fd,
4668: isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4669: ISC_MSG_FAILED, "failed"));
4670: /* Press on... */
4671: }
4672: #ifdef AF_UNIX
4673: bind_socket:
4674: #endif
4675: if (bind(sock->fd, &sockaddr->type.sa, sockaddr->length) < 0) {
4676: inc_stats(sock->manager->stats,
4677: sock->statsindex[STATID_BINDFAIL]);
4678:
4679: UNLOCK(&sock->lock);
4680: switch (errno) {
4681: case EACCES:
4682: return (ISC_R_NOPERM);
4683: case EADDRNOTAVAIL:
4684: return (ISC_R_ADDRNOTAVAIL);
4685: case EADDRINUSE:
4686: return (ISC_R_ADDRINUSE);
4687: case EINVAL:
4688: return (ISC_R_BOUND);
4689: default:
4690: isc__strerror(errno, strbuf, sizeof(strbuf));
4691: UNEXPECTED_ERROR(__FILE__, __LINE__, "bind: %s",
4692: strbuf);
4693: return (ISC_R_UNEXPECTED);
4694: }
4695: }
4696:
4697: socket_log(sock, sockaddr, TRACE,
4698: isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_BOUND, "bound");
4699: sock->bound = 1;
4700:
4701: UNLOCK(&sock->lock);
4702: return (ISC_R_SUCCESS);
4703: }
4704:
4705: isc_result_t
4706: isc_socket_filter(isc_socket_t *sock, const char *filter) {
4707: #ifdef SO_ACCEPTFILTER
4708: char strbuf[ISC_STRERRORSIZE];
4709: struct accept_filter_arg afa;
4710: #else
4711: UNUSED(sock);
4712: UNUSED(filter);
4713: #endif
4714:
4715: REQUIRE(VALID_SOCKET(sock));
4716:
4717: #ifdef SO_ACCEPTFILTER
4718: bzero(&afa, sizeof(afa));
4719: strncpy(afa.af_name, filter, sizeof(afa.af_name));
4720: if (setsockopt(sock->fd, SOL_SOCKET, SO_ACCEPTFILTER,
4721: &afa, sizeof(afa)) == -1) {
4722: isc__strerror(errno, strbuf, sizeof(strbuf));
4723: socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
4724: ISC_MSG_FILTER, "setsockopt(SO_ACCEPTFILTER): %s",
4725: strbuf);
4726: return (ISC_R_FAILURE);
4727: }
4728: return (ISC_R_SUCCESS);
4729: #else
4730: return (ISC_R_NOTIMPLEMENTED);
4731: #endif
4732: }
4733:
4734: /*
4735: * Set up to listen on a given socket. We do this by creating an internal
4736: * event that will be dispatched when the socket has read activity. The
4737: * watcher will send the internal event to the task when there is a new
4738: * connection.
4739: *
4740: * Unlike in read, we don't preallocate a done event here. Every time there
4741: * is a new connection we'll have to allocate a new one anyway, so we might
4742: * as well keep things simple rather than having to track them.
4743: */
4744: isc_result_t
4745: isc_socket_listen(isc_socket_t *sock, unsigned int backlog) {
4746: char strbuf[ISC_STRERRORSIZE];
4747:
4748: REQUIRE(VALID_SOCKET(sock));
4749:
4750: LOCK(&sock->lock);
4751:
4752: REQUIRE(!sock->listener);
4753: REQUIRE(sock->bound);
4754: REQUIRE(sock->type == isc_sockettype_tcp ||
4755: sock->type == isc_sockettype_unix);
4756:
4757: if (backlog == 0)
4758: backlog = SOMAXCONN;
4759:
4760: if (listen(sock->fd, (int)backlog) < 0) {
4761: UNLOCK(&sock->lock);
4762: isc__strerror(errno, strbuf, sizeof(strbuf));
4763:
4764: UNEXPECTED_ERROR(__FILE__, __LINE__, "listen: %s", strbuf);
4765:
4766: return (ISC_R_UNEXPECTED);
4767: }
4768:
4769: sock->listener = 1;
4770:
4771: UNLOCK(&sock->lock);
4772: return (ISC_R_SUCCESS);
4773: }
4774:
4775: /*
4776: * This should try to do aggressive accept() XXXMLG
4777: */
4778: isc_result_t
4779: isc_socket_accept(isc_socket_t *sock,
4780: isc_task_t *task, isc_taskaction_t action, const void *arg)
4781: {
4782: isc_socket_newconnev_t *dev;
4783: isc_socketmgr_t *manager;
4784: isc_task_t *ntask = NULL;
4785: isc_socket_t *nsock;
4786: isc_result_t result;
4787: isc_boolean_t do_poke = ISC_FALSE;
4788:
4789: REQUIRE(VALID_SOCKET(sock));
4790: manager = sock->manager;
4791: REQUIRE(VALID_MANAGER(manager));
4792:
4793: LOCK(&sock->lock);
4794:
4795: REQUIRE(sock->listener);
4796:
4797: /*
4798: * Sender field is overloaded here with the task we will be sending
4799: * this event to. Just before the actual event is delivered the
4800: * actual ev_sender will be touched up to be the socket.
4801: */
4802: dev = (isc_socket_newconnev_t *)
4803: isc_event_allocate(manager->mctx, task, ISC_SOCKEVENT_NEWCONN,
4804: action, arg, sizeof(*dev));
4805: if (dev == NULL) {
4806: UNLOCK(&sock->lock);
4807: return (ISC_R_NOMEMORY);
4808: }
4809: ISC_LINK_INIT(dev, ev_link);
4810:
4811: result = allocate_socket(manager, sock->type, &nsock);
4812: if (result != ISC_R_SUCCESS) {
4813: isc_event_free(ISC_EVENT_PTR(&dev));
4814: UNLOCK(&sock->lock);
4815: return (result);
4816: }
4817:
4818: /*
4819: * Attach to socket and to task.
4820: */
4821: isc_task_attach(task, &ntask);
4822: nsock->references++;
4823: nsock->statsindex = sock->statsindex;
4824:
4825: dev->ev_sender = ntask;
4826: dev->newsocket = nsock;
4827:
4828: /*
4829: * Poke watcher here. We still have the socket locked, so there
4830: * is no race condition. We will keep the lock for such a short
4831: * bit of time waking it up now or later won't matter all that much.
4832: */
4833: if (ISC_LIST_EMPTY(sock->accept_list))
4834: do_poke = ISC_TRUE;
4835:
4836: ISC_LIST_ENQUEUE(sock->accept_list, dev, ev_link);
4837:
4838: if (do_poke)
4839: select_poke(manager, sock->fd, SELECT_POKE_ACCEPT);
4840:
4841: UNLOCK(&sock->lock);
4842: return (ISC_R_SUCCESS);
4843: }
4844:
4845: isc_result_t
4846: isc_socket_connect(isc_socket_t *sock, isc_sockaddr_t *addr,
4847: isc_task_t *task, isc_taskaction_t action, const void *arg)
4848: {
4849: isc_socket_connev_t *dev;
4850: isc_task_t *ntask = NULL;
4851: isc_socketmgr_t *manager;
4852: int cc;
4853: char strbuf[ISC_STRERRORSIZE];
4854:
4855: REQUIRE(VALID_SOCKET(sock));
4856: REQUIRE(addr != NULL);
4857: REQUIRE(task != NULL);
4858: REQUIRE(action != NULL);
4859:
4860: manager = sock->manager;
4861: REQUIRE(VALID_MANAGER(manager));
4862: REQUIRE(addr != NULL);
4863:
4864: if (isc_sockaddr_ismulticast(addr))
4865: return (ISC_R_MULTICAST);
4866:
4867: LOCK(&sock->lock);
4868:
4869: REQUIRE(!sock->connecting);
4870:
4871: dev = (isc_socket_connev_t *)isc_event_allocate(manager->mctx, sock,
4872: ISC_SOCKEVENT_CONNECT,
4873: action, arg,
4874: sizeof(*dev));
4875: if (dev == NULL) {
4876: UNLOCK(&sock->lock);
4877: return (ISC_R_NOMEMORY);
4878: }
4879: ISC_LINK_INIT(dev, ev_link);
4880:
4881: /*
4882: * Try to do the connect right away, as there can be only one
4883: * outstanding, and it might happen to complete.
4884: */
4885: sock->peer_address = *addr;
4886: cc = connect(sock->fd, &addr->type.sa, addr->length);
4887: if (cc < 0) {
4888: /*
4889: * HP-UX "fails" to connect a UDP socket and sets errno to
4890: * EINPROGRESS if it's non-blocking. We'd rather regard this as
4891: * a success and let the user detect it if it's really an error
4892: * at the time of sending a packet on the socket.
4893: */
4894: if (sock->type == isc_sockettype_udp && errno == EINPROGRESS) {
4895: cc = 0;
4896: goto success;
4897: }
4898: if (SOFT_ERROR(errno) || errno == EINPROGRESS)
4899: goto queue;
4900:
4901: switch (errno) {
4902: #define ERROR_MATCH(a, b) case a: dev->result = b; goto err_exit;
4903: ERROR_MATCH(EACCES, ISC_R_NOPERM);
4904: ERROR_MATCH(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
4905: ERROR_MATCH(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
4906: ERROR_MATCH(ECONNREFUSED, ISC_R_CONNREFUSED);
4907: ERROR_MATCH(EHOSTUNREACH, ISC_R_HOSTUNREACH);
4908: #ifdef EHOSTDOWN
4909: ERROR_MATCH(EHOSTDOWN, ISC_R_HOSTUNREACH);
4910: #endif
4911: ERROR_MATCH(ENETUNREACH, ISC_R_NETUNREACH);
4912: ERROR_MATCH(ENOBUFS, ISC_R_NORESOURCES);
4913: ERROR_MATCH(EPERM, ISC_R_HOSTUNREACH);
4914: ERROR_MATCH(EPIPE, ISC_R_NOTCONNECTED);
4915: ERROR_MATCH(ECONNRESET, ISC_R_CONNECTIONRESET);
4916: #undef ERROR_MATCH
4917: }
4918:
4919: sock->connected = 0;
4920:
4921: isc__strerror(errno, strbuf, sizeof(strbuf));
4922: UNEXPECTED_ERROR(__FILE__, __LINE__, "%d/%s", errno, strbuf);
4923:
4924: UNLOCK(&sock->lock);
4925: inc_stats(sock->manager->stats,
4926: sock->statsindex[STATID_CONNECTFAIL]);
4927: isc_event_free(ISC_EVENT_PTR(&dev));
4928: return (ISC_R_UNEXPECTED);
4929:
4930: err_exit:
4931: sock->connected = 0;
4932: isc_task_send(task, ISC_EVENT_PTR(&dev));
4933:
4934: UNLOCK(&sock->lock);
4935: inc_stats(sock->manager->stats,
4936: sock->statsindex[STATID_CONNECTFAIL]);
4937: return (ISC_R_SUCCESS);
4938: }
4939:
4940: /*
4941: * If connect completed, fire off the done event.
4942: */
4943: success:
4944: if (cc == 0) {
4945: sock->connected = 1;
4946: sock->bound = 1;
4947: dev->result = ISC_R_SUCCESS;
4948: isc_task_send(task, ISC_EVENT_PTR(&dev));
4949:
4950: UNLOCK(&sock->lock);
4951:
4952: inc_stats(sock->manager->stats,
4953: sock->statsindex[STATID_CONNECT]);
4954:
4955: return (ISC_R_SUCCESS);
4956: }
4957:
4958: queue:
4959:
4960: /*
4961: * Attach to task.
4962: */
4963: isc_task_attach(task, &ntask);
4964:
4965: sock->connecting = 1;
4966:
4967: dev->ev_sender = ntask;
4968:
4969: /*
4970: * Poke watcher here. We still have the socket locked, so there
4971: * is no race condition. We will keep the lock for such a short
4972: * bit of time waking it up now or later won't matter all that much.
4973: */
4974: if (sock->connect_ev == NULL)
4975: select_poke(manager, sock->fd, SELECT_POKE_CONNECT);
4976:
4977: sock->connect_ev = dev;
4978:
4979: UNLOCK(&sock->lock);
4980: return (ISC_R_SUCCESS);
4981: }
4982:
4983: /*
4984: * Called when a socket with a pending connect() finishes.
4985: */
4986: static void
4987: internal_connect(isc_task_t *me, isc_event_t *ev) {
4988: isc_socket_t *sock;
4989: isc_socket_connev_t *dev;
4990: isc_task_t *task;
4991: int cc;
4992: ISC_SOCKADDR_LEN_T optlen;
4993: char strbuf[ISC_STRERRORSIZE];
4994: char peerbuf[ISC_SOCKADDR_FORMATSIZE];
4995:
4996: UNUSED(me);
4997: INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
4998:
4999: sock = ev->ev_sender;
5000: INSIST(VALID_SOCKET(sock));
5001:
5002: LOCK(&sock->lock);
5003:
5004: /*
5005: * When the internal event was sent the reference count was bumped
5006: * to keep the socket around for us. Decrement the count here.
5007: */
5008: INSIST(sock->references > 0);
5009: sock->references--;
5010: if (sock->references == 0) {
5011: UNLOCK(&sock->lock);
5012: destroy(&sock);
5013: return;
5014: }
5015:
5016: /*
5017: * Has this event been canceled?
5018: */
5019: dev = sock->connect_ev;
5020: if (dev == NULL) {
5021: INSIST(!sock->connecting);
5022: UNLOCK(&sock->lock);
5023: return;
5024: }
5025:
5026: INSIST(sock->connecting);
5027: sock->connecting = 0;
5028:
5029: /*
5030: * Get any possible error status here.
5031: */
5032: optlen = sizeof(cc);
5033: if (getsockopt(sock->fd, SOL_SOCKET, SO_ERROR,
5034: (void *)&cc, (void *)&optlen) < 0)
5035: cc = errno;
5036: else
5037: errno = cc;
5038:
5039: if (errno != 0) {
5040: /*
5041: * If the error is EAGAIN, just re-select on this
5042: * fd and pretend nothing strange happened.
5043: */
5044: if (SOFT_ERROR(errno) || errno == EINPROGRESS) {
5045: sock->connecting = 1;
5046: select_poke(sock->manager, sock->fd,
5047: SELECT_POKE_CONNECT);
5048: UNLOCK(&sock->lock);
5049:
5050: return;
5051: }
5052:
5053: inc_stats(sock->manager->stats,
5054: sock->statsindex[STATID_CONNECTFAIL]);
5055:
5056: /*
5057: * Translate other errors into ISC_R_* flavors.
5058: */
5059: switch (errno) {
5060: #define ERROR_MATCH(a, b) case a: dev->result = b; break;
5061: ERROR_MATCH(EACCES, ISC_R_NOPERM);
5062: ERROR_MATCH(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
5063: ERROR_MATCH(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
5064: ERROR_MATCH(ECONNREFUSED, ISC_R_CONNREFUSED);
5065: ERROR_MATCH(EHOSTUNREACH, ISC_R_HOSTUNREACH);
5066: #ifdef EHOSTDOWN
5067: ERROR_MATCH(EHOSTDOWN, ISC_R_HOSTUNREACH);
5068: #endif
5069: ERROR_MATCH(ENETUNREACH, ISC_R_NETUNREACH);
5070: ERROR_MATCH(ENOBUFS, ISC_R_NORESOURCES);
5071: ERROR_MATCH(EPERM, ISC_R_HOSTUNREACH);
5072: ERROR_MATCH(EPIPE, ISC_R_NOTCONNECTED);
5073: ERROR_MATCH(ETIMEDOUT, ISC_R_TIMEDOUT);
5074: ERROR_MATCH(ECONNRESET, ISC_R_CONNECTIONRESET);
5075: #undef ERROR_MATCH
5076: default:
5077: dev->result = ISC_R_UNEXPECTED;
5078: isc_sockaddr_format(&sock->peer_address, peerbuf,
5079: sizeof(peerbuf));
5080: isc__strerror(errno, strbuf, sizeof(strbuf));
5081: UNEXPECTED_ERROR(__FILE__, __LINE__,
5082: "internal_connect: connect(%s) %s",
5083: peerbuf, strbuf);
5084: }
5085: } else {
5086: inc_stats(sock->manager->stats,
5087: sock->statsindex[STATID_CONNECT]);
5088: dev->result = ISC_R_SUCCESS;
5089: sock->connected = 1;
5090: sock->bound = 1;
5091: }
5092:
5093: sock->connect_ev = NULL;
5094:
5095: UNLOCK(&sock->lock);
5096:
5097: task = dev->ev_sender;
5098: dev->ev_sender = sock;
5099: isc_task_sendanddetach(&task, ISC_EVENT_PTR(&dev));
5100: }
5101:
5102: isc_result_t
5103: isc_socket_getpeername(isc_socket_t *sock, isc_sockaddr_t *addressp) {
5104: isc_result_t result;
5105:
5106: REQUIRE(VALID_SOCKET(sock));
5107: REQUIRE(addressp != NULL);
5108:
5109: LOCK(&sock->lock);
5110:
5111: if (sock->connected) {
5112: *addressp = sock->peer_address;
5113: result = ISC_R_SUCCESS;
5114: } else {
5115: result = ISC_R_NOTCONNECTED;
5116: }
5117:
5118: UNLOCK(&sock->lock);
5119:
5120: return (result);
5121: }
5122:
5123: isc_result_t
5124: isc_socket_getsockname(isc_socket_t *sock, isc_sockaddr_t *addressp) {
5125: ISC_SOCKADDR_LEN_T len;
5126: isc_result_t result;
5127: char strbuf[ISC_STRERRORSIZE];
5128:
5129: REQUIRE(VALID_SOCKET(sock));
5130: REQUIRE(addressp != NULL);
5131:
5132: LOCK(&sock->lock);
5133:
5134: if (!sock->bound) {
5135: result = ISC_R_NOTBOUND;
5136: goto out;
5137: }
5138:
5139: result = ISC_R_SUCCESS;
5140:
5141: len = sizeof(addressp->type);
5142: if (getsockname(sock->fd, &addressp->type.sa, (void *)&len) < 0) {
5143: isc__strerror(errno, strbuf, sizeof(strbuf));
5144: UNEXPECTED_ERROR(__FILE__, __LINE__, "getsockname: %s",
5145: strbuf);
5146: result = ISC_R_UNEXPECTED;
5147: goto out;
5148: }
5149: addressp->length = (unsigned int)len;
5150:
5151: out:
5152: UNLOCK(&sock->lock);
5153:
5154: return (result);
5155: }
5156:
5157: /*
5158: * Run through the list of events on this socket, and cancel the ones
5159: * queued for task "task" of type "how". "how" is a bitmask.
5160: */
5161: void
5162: isc_socket_cancel(isc_socket_t *sock, isc_task_t *task, unsigned int how) {
5163:
5164: REQUIRE(VALID_SOCKET(sock));
5165:
5166: /*
5167: * Quick exit if there is nothing to do. Don't even bother locking
5168: * in this case.
5169: */
5170: if (how == 0)
5171: return;
5172:
5173: LOCK(&sock->lock);
5174:
5175: /*
5176: * All of these do the same thing, more or less.
5177: * Each will:
5178: * o If the internal event is marked as "posted" try to
5179: * remove it from the task's queue. If this fails, mark it
5180: * as canceled instead, and let the task clean it up later.
5181: * o For each I/O request for that task of that type, post
5182: * its done event with status of "ISC_R_CANCELED".
5183: * o Reset any state needed.
5184: */
5185: if (((how & ISC_SOCKCANCEL_RECV) == ISC_SOCKCANCEL_RECV)
5186: && !ISC_LIST_EMPTY(sock->recv_list)) {
5187: isc_socketevent_t *dev;
5188: isc_socketevent_t *next;
5189: isc_task_t *current_task;
5190:
5191: dev = ISC_LIST_HEAD(sock->recv_list);
5192:
5193: while (dev != NULL) {
5194: current_task = dev->ev_sender;
5195: next = ISC_LIST_NEXT(dev, ev_link);
5196:
5197: if ((task == NULL) || (task == current_task)) {
5198: dev->result = ISC_R_CANCELED;
5199: send_recvdone_event(sock, &dev);
5200: }
5201: dev = next;
5202: }
5203: }
5204:
5205: if (((how & ISC_SOCKCANCEL_SEND) == ISC_SOCKCANCEL_SEND)
5206: && !ISC_LIST_EMPTY(sock->send_list)) {
5207: isc_socketevent_t *dev;
5208: isc_socketevent_t *next;
5209: isc_task_t *current_task;
5210:
5211: dev = ISC_LIST_HEAD(sock->send_list);
5212:
5213: while (dev != NULL) {
5214: current_task = dev->ev_sender;
5215: next = ISC_LIST_NEXT(dev, ev_link);
5216:
5217: if ((task == NULL) || (task == current_task)) {
5218: dev->result = ISC_R_CANCELED;
5219: send_senddone_event(sock, &dev);
5220: }
5221: dev = next;
5222: }
5223: }
5224:
5225: if (((how & ISC_SOCKCANCEL_ACCEPT) == ISC_SOCKCANCEL_ACCEPT)
5226: && !ISC_LIST_EMPTY(sock->accept_list)) {
5227: isc_socket_newconnev_t *dev;
5228: isc_socket_newconnev_t *next;
5229: isc_task_t *current_task;
5230:
5231: dev = ISC_LIST_HEAD(sock->accept_list);
5232: while (dev != NULL) {
5233: current_task = dev->ev_sender;
5234: next = ISC_LIST_NEXT(dev, ev_link);
5235:
5236: if ((task == NULL) || (task == current_task)) {
5237:
5238: ISC_LIST_UNLINK(sock->accept_list, dev,
5239: ev_link);
5240:
5241: dev->newsocket->references--;
5242: free_socket(&dev->newsocket);
5243:
5244: dev->result = ISC_R_CANCELED;
5245: dev->ev_sender = sock;
5246: isc_task_sendanddetach(¤t_task,
5247: ISC_EVENT_PTR(&dev));
5248: }
5249:
5250: dev = next;
5251: }
5252: }
5253:
5254: /*
5255: * Connecting is not a list.
5256: */
5257: if (((how & ISC_SOCKCANCEL_CONNECT) == ISC_SOCKCANCEL_CONNECT)
5258: && sock->connect_ev != NULL) {
5259: isc_socket_connev_t *dev;
5260: isc_task_t *current_task;
5261:
5262: INSIST(sock->connecting);
5263: sock->connecting = 0;
5264:
5265: dev = sock->connect_ev;
5266: current_task = dev->ev_sender;
5267:
5268: if ((task == NULL) || (task == current_task)) {
5269: sock->connect_ev = NULL;
5270:
5271: dev->result = ISC_R_CANCELED;
5272: dev->ev_sender = sock;
5273: isc_task_sendanddetach(¤t_task,
5274: ISC_EVENT_PTR(&dev));
5275: }
5276: }
5277:
5278: UNLOCK(&sock->lock);
5279: }
5280:
5281: isc_sockettype_t
5282: isc_socket_gettype(isc_socket_t *sock) {
5283: REQUIRE(VALID_SOCKET(sock));
5284:
5285: return (sock->type);
5286: }
5287:
5288: isc_boolean_t
5289: isc_socket_isbound(isc_socket_t *sock) {
5290: isc_boolean_t val;
5291:
5292: LOCK(&sock->lock);
5293: val = ((sock->bound) ? ISC_TRUE : ISC_FALSE);
5294: UNLOCK(&sock->lock);
5295:
5296: return (val);
5297: }
5298:
5299: void
5300: isc_socket_ipv6only(isc_socket_t *sock, isc_boolean_t yes) {
5301: #if defined(IPV6_V6ONLY)
5302: int onoff = yes ? 1 : 0;
5303: #else
5304: UNUSED(yes);
5305: UNUSED(sock);
5306: #endif
5307:
5308: REQUIRE(VALID_SOCKET(sock));
5309:
5310: #ifdef IPV6_V6ONLY
5311: if (sock->pf == AF_INET6) {
5312: if (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_V6ONLY,
5313: (void *)&onoff, sizeof(int)) < 0) {
5314: char strbuf[ISC_STRERRORSIZE];
5315:
5316: UNEXPECTED_ERROR(__FILE__, __LINE__,
5317: "setsockopt(%d, IPV6_V6ONLY) "
5318: "%s: %s", sock->fd,
5319: isc_msgcat_get(isc_msgcat,
5320: ISC_MSGSET_GENERAL,
5321: ISC_MSG_FAILED,
5322: "failed"),
5323: strbuf);
5324: }
5325: }
5326: FIX_IPV6_RECVPKTINFO(sock); /* AIX */
5327: #endif
5328: }
5329:
5330: #ifndef ISC_PLATFORM_USETHREADS
5331: /* In our assumed scenario, we can simply use a single static object. */
5332: static isc_socketwait_t swait_private;
5333:
5334: int
5335: isc__socketmgr_waitevents(struct timeval *tvp, isc_socketwait_t **swaitp) {
5336: int n;
5337: #ifdef USE_KQUEUE
5338: struct timespec ts, *tsp;
5339: #endif
5340: #ifdef USE_EPOLL
5341: int timeout;
5342: #endif
5343: #ifdef USE_DEVPOLL
5344: struct dvpoll dvp;
5345: #endif
5346:
5347: REQUIRE(swaitp != NULL && *swaitp == NULL);
5348:
5349: if (socketmgr == NULL)
5350: return (0);
5351:
5352: #ifdef USE_KQUEUE
5353: if (tvp != NULL) {
5354: ts.tv_sec = tvp->tv_sec;
5355: ts.tv_nsec = tvp->tv_usec * 1000;
5356: tsp = &ts;
5357: } else
5358: tsp = NULL;
5359: swait_private.nevents = kevent(socketmgr->kqueue_fd, NULL, 0,
5360: socketmgr->events, socketmgr->nevents,
5361: tsp);
5362: n = swait_private.nevents;
5363: #elif defined(USE_EPOLL)
5364: if (tvp != NULL)
5365: timeout = tvp->tv_sec * 1000 + (tvp->tv_usec + 999) / 1000;
5366: else
5367: timeout = -1;
5368: swait_private.nevents = epoll_wait(socketmgr->epoll_fd,
5369: socketmgr->events,
5370: socketmgr->nevents, timeout);
5371: n = swait_private.nevents;
5372: #elif defined(USE_DEVPOLL)
5373: dvp.dp_fds = socketmgr->events;
5374: dvp.dp_nfds = socketmgr->nevents;
5375: if (tvp != NULL) {
5376: dvp.dp_timeout = tvp->tv_sec * 1000 +
5377: (tvp->tv_usec + 999) / 1000;
5378: } else
5379: dvp.dp_timeout = -1;
5380: swait_private.nevents = ioctl(socketmgr->devpoll_fd, DP_POLL, &dvp);
5381: n = swait_private.nevents;
5382: #elif defined(USE_SELECT)
5383: memcpy(socketmgr->read_fds_copy, socketmgr->read_fds,
5384: socketmgr->fd_bufsize);
5385: memcpy(socketmgr->write_fds_copy, socketmgr->write_fds,
5386: socketmgr->fd_bufsize);
5387:
5388: swait_private.readset = socketmgr->read_fds_copy;
5389: swait_private.writeset = socketmgr->write_fds_copy;
5390: swait_private.maxfd = socketmgr->maxfd + 1;
5391:
5392: n = select(swait_private.maxfd, swait_private.readset,
5393: swait_private.writeset, NULL, tvp);
5394: #endif
5395:
5396: *swaitp = &swait_private;
5397: return (n);
5398: }
5399:
5400: isc_result_t
5401: isc__socketmgr_dispatch(isc_socketwait_t *swait) {
5402: REQUIRE(swait == &swait_private);
5403:
5404: if (socketmgr == NULL)
5405: return (ISC_R_NOTFOUND);
5406:
5407: #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
5408: (void)process_fds(socketmgr, socketmgr->events, swait->nevents);
5409: return (ISC_R_SUCCESS);
5410: #elif defined(USE_SELECT)
5411: process_fds(socketmgr, swait->maxfd, swait->readset, swait->writeset);
5412: return (ISC_R_SUCCESS);
5413: #endif
5414: }
5415: #endif /* ISC_PLATFORM_USETHREADS */
5416:
5417: void
5418: isc_socket_setname(isc_socket_t *socket, const char *name, void *tag) {
5419:
5420: /*
5421: * Name 'socket'.
5422: */
5423:
5424: REQUIRE(VALID_SOCKET(socket));
5425:
5426: LOCK(&socket->lock);
5427: memset(socket->name, 0, sizeof(socket->name));
5428: strncpy(socket->name, name, sizeof(socket->name) - 1);
5429: socket->tag = tag;
5430: UNLOCK(&socket->lock);
5431: }
5432:
5433: const char *
5434: isc_socket_getname(isc_socket_t *socket) {
5435: return (socket->name);
5436: }
5437:
5438: void *
5439: isc_socket_gettag(isc_socket_t *socket) {
5440: return (socket->tag);
5441: }
5442:
5443: #ifdef HAVE_LIBXML2
5444:
5445: static const char *
5446: _socktype(isc_sockettype_t type)
5447: {
5448: if (type == isc_sockettype_udp)
5449: return ("udp");
5450: else if (type == isc_sockettype_tcp)
5451: return ("tcp");
5452: else if (type == isc_sockettype_unix)
5453: return ("unix");
5454: else if (type == isc_sockettype_fdwatch)
5455: return ("fdwatch");
5456: else
5457: return ("not-initialized");
5458: }
5459:
5460: void
5461: isc_socketmgr_renderxml(isc_socketmgr_t *mgr, xmlTextWriterPtr writer)
5462: {
5463: isc_socket_t *sock;
5464: char peerbuf[ISC_SOCKADDR_FORMATSIZE];
5465: isc_sockaddr_t addr;
5466: ISC_SOCKADDR_LEN_T len;
5467:
5468: LOCK(&mgr->lock);
5469:
5470: #ifndef ISC_PLATFORM_USETHREADS
5471: xmlTextWriterStartElement(writer, ISC_XMLCHAR "references");
5472: xmlTextWriterWriteFormatString(writer, "%d", mgr->refs);
5473: xmlTextWriterEndElement(writer);
5474: #endif
5475:
5476: xmlTextWriterStartElement(writer, ISC_XMLCHAR "sockets");
5477: sock = ISC_LIST_HEAD(mgr->socklist);
5478: while (sock != NULL) {
5479: LOCK(&sock->lock);
5480: xmlTextWriterStartElement(writer, ISC_XMLCHAR "socket");
5481:
5482: xmlTextWriterStartElement(writer, ISC_XMLCHAR "id");
5483: xmlTextWriterWriteFormatString(writer, "%p", sock);
5484: xmlTextWriterEndElement(writer);
5485:
5486: if (sock->name[0] != 0) {
5487: xmlTextWriterStartElement(writer, ISC_XMLCHAR "name");
5488: xmlTextWriterWriteFormatString(writer, "%s",
5489: sock->name);
5490: xmlTextWriterEndElement(writer); /* name */
5491: }
5492:
5493: xmlTextWriterStartElement(writer, ISC_XMLCHAR "references");
5494: xmlTextWriterWriteFormatString(writer, "%d", sock->references);
5495: xmlTextWriterEndElement(writer);
5496:
5497: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "type",
5498: ISC_XMLCHAR _socktype(sock->type));
5499:
5500: if (sock->connected) {
5501: isc_sockaddr_format(&sock->peer_address, peerbuf,
5502: sizeof(peerbuf));
5503: xmlTextWriterWriteElement(writer,
5504: ISC_XMLCHAR "peer-address",
5505: ISC_XMLCHAR peerbuf);
5506: }
5507:
5508: len = sizeof(addr);
5509: if (getsockname(sock->fd, &addr.type.sa, (void *)&len) == 0) {
5510: isc_sockaddr_format(&addr, peerbuf, sizeof(peerbuf));
5511: xmlTextWriterWriteElement(writer,
5512: ISC_XMLCHAR "local-address",
5513: ISC_XMLCHAR peerbuf);
5514: }
5515:
5516: xmlTextWriterStartElement(writer, ISC_XMLCHAR "states");
5517: if (sock->pending_recv)
5518: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5519: ISC_XMLCHAR "pending-receive");
5520: if (sock->pending_send)
5521: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5522: ISC_XMLCHAR "pending-send");
5523: if (sock->pending_accept)
5524: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5525: ISC_XMLCHAR "pending_accept");
5526: if (sock->listener)
5527: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5528: ISC_XMLCHAR "listener");
5529: if (sock->connected)
5530: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5531: ISC_XMLCHAR "connected");
5532: if (sock->connecting)
5533: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5534: ISC_XMLCHAR "connecting");
5535: if (sock->bound)
5536: xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5537: ISC_XMLCHAR "bound");
5538:
5539: xmlTextWriterEndElement(writer); /* states */
5540:
5541: xmlTextWriterEndElement(writer); /* socket */
5542:
5543: UNLOCK(&sock->lock);
5544: sock = ISC_LIST_NEXT(sock, link);
5545: }
5546: xmlTextWriterEndElement(writer); /* sockets */
5547:
5548: UNLOCK(&mgr->lock);
5549: }
5550: #endif /* HAVE_LIBXML2 */
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>