2 * Copyright (C) 2004-2010 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 1998-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
18 /* $Id: socket.c,v 1.308.12.17 2010-12-22 03:28:13 marka Exp $ */
24 #include <sys/param.h>
25 #include <sys/types.h>
26 #include <sys/socket.h>
38 #include <isc/buffer.h>
39 #include <isc/bufferlist.h>
40 #include <isc/condition.h>
41 #include <isc/formatcheck.h>
46 #include <isc/mutex.h>
49 #include <isc/platform.h>
50 #include <isc/print.h>
51 #include <isc/region.h>
52 #include <isc/socket.h>
53 #include <isc/stats.h>
54 #include <isc/strerror.h>
56 #include <isc/thread.h>
60 #ifdef ISC_PLATFORM_HAVESYSUNH
63 #ifdef ISC_PLATFORM_HAVEKQUEUE
64 #include <sys/event.h>
66 #ifdef ISC_PLATFORM_HAVEEPOLL
67 #include <sys/epoll.h>
69 #ifdef ISC_PLATFORM_HAVEDEVPOLL
70 #if defined(HAVE_SYS_DEVPOLL_H)
71 #include <sys/devpoll.h>
72 #elif defined(HAVE_DEVPOLL_H)
77 #include "errno2result.h"
79 #ifndef ISC_PLATFORM_USETHREADS
81 #endif /* ISC_PLATFORM_USETHREADS */
83 #if defined(SO_BSDCOMPAT) && defined(__linux__)
84 #include <sys/utsname.h>
88 * Choose the most preferable multiplex method.
90 #ifdef ISC_PLATFORM_HAVEKQUEUE
92 #elif defined (ISC_PLATFORM_HAVEEPOLL)
94 #elif defined (ISC_PLATFORM_HAVEDEVPOLL)
97 unsigned int want_read : 1,
102 #endif /* ISC_PLATFORM_HAVEKQUEUE */
104 #ifndef ISC_PLATFORM_USETHREADS
105 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
106 struct isc_socketwait {
109 #elif defined (USE_SELECT)
110 struct isc_socketwait {
116 #endif /* USE_KQUEUE */
117 #endif /* !ISC_PLATFORM_USETHREADS */
120 * Maximum number of allowable open sockets. This is also the maximum
121 * allowable socket file descriptor.
123 * Care should be taken before modifying this value for select():
124 * The API standard doesn't ensure select() accept more than (the system default
125 * of) FD_SETSIZE descriptors, and the default size should in fact be fine in
126 * the vast majority of cases. This constant should therefore be increased only
127 * when absolutely necessary and possible, i.e., the server is exhausting all
128 * available file descriptors (up to FD_SETSIZE) and the select() function
129 * and FD_xxx macros support larger values than FD_SETSIZE (which may not
130 * always by true, but we keep using some of them to ensure as much
131 * portability as possible). Note also that overall server performance
132 * may be rather worsened with a larger value of this constant due to
133 * inherent scalability problems of select().
135 * As a special note, this value shouldn't have to be touched if
136 * this is a build for an authoritative only DNS server.
138 #ifndef ISC_SOCKET_MAXSOCKETS
139 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
140 #define ISC_SOCKET_MAXSOCKETS 4096
141 #elif defined(USE_SELECT)
142 #define ISC_SOCKET_MAXSOCKETS FD_SETSIZE
143 #endif /* USE_KQUEUE... */
144 #endif /* ISC_SOCKET_MAXSOCKETS */
148 * Mac OS X needs a special definition to support larger values in select().
149 * We always define this because a larger value can be specified run-time.
152 #define _DARWIN_UNLIMITED_SELECT
153 #endif /* __APPLE__ */
154 #endif /* USE_SELECT */
156 #ifdef ISC_SOCKET_USE_POLLWATCH
158 * If this macro is defined, enable workaround for a Solaris /dev/poll kernel
159 * bug: DP_POLL ioctl could keep sleeping even if socket I/O is possible for
160 * some of the specified FD. The idea is based on the observation that it's
161 * likely for a busy server to keep receiving packets. It specifically works
162 * as follows: the socket watcher is first initialized with the state of
163 * "poll_idle". While it's in the idle state it keeps sleeping until a socket
164 * event occurs. When it wakes up for a socket I/O event, it moves to the
165 * poll_active state, and sets the poll timeout to a short period
166 * (ISC_SOCKET_POLLWATCH_TIMEOUT msec). If timeout occurs in this state, the
167 * watcher goes to the poll_checking state with the same timeout period.
168 * In this state, the watcher tries to detect whether this is a break
169 * during intermittent events or the kernel bug is triggered. If the next
170 * polling reports an event within the short period, the previous timeout is
171 * likely to be a kernel bug, and so the watcher goes back to the active state.
172 * Otherwise, it moves to the idle state again.
174 * It's not clear whether this is a thread-related bug, but since we've only
175 * seen this with threads, this workaround is used only when enabling threads.
178 typedef enum { poll_idle, poll_active, poll_checking } pollstate_t;
180 #ifndef ISC_SOCKET_POLLWATCH_TIMEOUT
181 #define ISC_SOCKET_POLLWATCH_TIMEOUT 10
182 #endif /* ISC_SOCKET_POLLWATCH_TIMEOUT */
183 #endif /* ISC_SOCKET_USE_POLLWATCH */
186 * Size of per-FD lock buckets.
188 #ifdef ISC_PLATFORM_USETHREADS
189 #define FDLOCK_COUNT 1024
190 #define FDLOCK_ID(fd) ((fd) % FDLOCK_COUNT)
192 #define FDLOCK_COUNT 1
193 #define FDLOCK_ID(fd) 0
194 #endif /* ISC_PLATFORM_USETHREADS */
197 * Maximum number of events communicated with the kernel. There should normally
198 * be no need for having a large number.
200 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
201 #ifndef ISC_SOCKET_MAXEVENTS
202 #define ISC_SOCKET_MAXEVENTS 64
207 * Some systems define the socket length argument as an int, some as size_t,
208 * some as socklen_t. This is here so it can be easily changed if needed.
210 #ifndef ISC_SOCKADDR_LEN_T
211 #define ISC_SOCKADDR_LEN_T unsigned int
215 * Define what the possible "soft" errors can be. These are non-fatal returns
216 * of various network related functions, like recv() and so on.
218 * For some reason, BSDI (and perhaps others) will sometimes return <0
219 * from recv() but will have errno==0. This is broken, but we have to
220 * work around it here.
222 #define SOFT_ERROR(e) ((e) == EAGAIN || \
223 (e) == EWOULDBLOCK || \
227 #define DLVL(x) ISC_LOGCATEGORY_GENERAL, ISC_LOGMODULE_SOCKET, ISC_LOG_DEBUG(x)
230 * DLVL(90) -- Function entry/exit and other tracing.
231 * DLVL(70) -- Socket "correctness" -- including returning of events, etc.
232 * DLVL(60) -- Socket data send/receive
233 * DLVL(50) -- Event tracing, including receiving/sending completion events.
234 * DLVL(20) -- Socket creation/destruction.
236 #define TRACE_LEVEL 90
237 #define CORRECTNESS_LEVEL 70
238 #define IOEVENT_LEVEL 60
239 #define EVENT_LEVEL 50
240 #define CREATION_LEVEL 20
242 #define TRACE DLVL(TRACE_LEVEL)
243 #define CORRECTNESS DLVL(CORRECTNESS_LEVEL)
244 #define IOEVENT DLVL(IOEVENT_LEVEL)
245 #define EVENT DLVL(EVENT_LEVEL)
246 #define CREATION DLVL(CREATION_LEVEL)
248 typedef isc_event_t intev_t;
250 #define SOCKET_MAGIC ISC_MAGIC('I', 'O', 'i', 'o')
251 #define VALID_SOCKET(t) ISC_MAGIC_VALID(t, SOCKET_MAGIC)
254 * IPv6 control information. If the socket is an IPv6 socket we want
255 * to collect the destination address and interface so the client can
256 * set them on outgoing packets.
258 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
265 * NetBSD and FreeBSD can timestamp packets. XXXMLG Should we have
266 * a setsockopt() like interface to request timestamps, and if the OS
267 * doesn't do it for us, call gettimeofday() on every UDP receive?
276 * The size to raise the receive buffer to (from BIND 8).
278 #define RCVBUFSIZE (32*1024)
281 * The number of times a send operation is repeated if the result is EINTR.
288 isc_socketmgr_t *manager;
290 isc_sockettype_t type;
291 const isc_statscounter_t *statsindex;
293 /* Locked by socket lock. */
294 ISC_LINK(isc_socket_t) link;
295 unsigned int references;
301 ISC_LIST(isc_socketevent_t) send_list;
302 ISC_LIST(isc_socketevent_t) recv_list;
303 ISC_LIST(isc_socket_newconnev_t) accept_list;
304 isc_socket_connev_t *connect_ev;
307 * Internal events. Posted when a descriptor is readable or
308 * writable. These are statically allocated and never freed.
309 * They will be set to non-purgable before use.
314 isc_sockaddr_t peer_address; /* remote address */
316 unsigned int pending_recv : 1,
319 listener : 1, /* listener socket */
321 connecting : 1, /* connect pending */
322 bound : 1; /* bound to local addr */
324 #ifdef ISC_NET_RECVOVERFLOW
325 unsigned char overflow; /* used for MSG_TRUNC fake */
329 ISC_SOCKADDR_LEN_T recvcmsgbuflen;
331 ISC_SOCKADDR_LEN_T sendcmsgbuflen;
334 isc_sockfdwatch_t fdwatchcb;
336 isc_task_t *fdwatchtask;
339 #define SOCKET_MANAGER_MAGIC ISC_MAGIC('I', 'O', 'm', 'g')
340 #define VALID_MANAGER(m) ISC_MAGIC_VALID(m, SOCKET_MANAGER_MAGIC)
342 struct isc_socketmgr {
352 struct kevent *events;
353 #endif /* USE_KQUEUE */
357 struct epoll_event *events;
358 #endif /* USE_EPOLL */
362 struct pollfd *events;
363 #endif /* USE_DEVPOLL */
366 #endif /* USE_SELECT */
367 unsigned int maxsocks;
368 #ifdef ISC_PLATFORM_USETHREADS
372 /* Locked by fdlock. */
376 pollinfo_t *fdpollinfo;
379 /* Locked by manager lock. */
380 ISC_LIST(isc_socket_t) socklist;
383 fd_set *read_fds_copy;
385 fd_set *write_fds_copy;
387 #endif /* USE_SELECT */
388 int reserved; /* unlocked */
389 #ifdef ISC_PLATFORM_USETHREADS
390 isc_thread_t watcher;
391 isc_condition_t shutdown_ok;
392 #else /* ISC_PLATFORM_USETHREADS */
394 #endif /* ISC_PLATFORM_USETHREADS */
397 #ifndef ISC_PLATFORM_USETHREADS
398 static isc_socketmgr_t *socketmgr = NULL;
399 #endif /* ISC_PLATFORM_USETHREADS */
401 #define CLOSED 0 /* this one must be zero */
403 #define CLOSE_PENDING 2
406 * send() and recv() iovec counts
408 #define MAXSCATTERGATHER_SEND (ISC_SOCKET_MAXSCATTERGATHER)
409 #ifdef ISC_NET_RECVOVERFLOW
410 # define MAXSCATTERGATHER_RECV (ISC_SOCKET_MAXSCATTERGATHER + 1)
412 # define MAXSCATTERGATHER_RECV (ISC_SOCKET_MAXSCATTERGATHER)
415 static void send_recvdone_event(isc_socket_t *, isc_socketevent_t **);
416 static void send_senddone_event(isc_socket_t *, isc_socketevent_t **);
417 static void free_socket(isc_socket_t **);
418 static isc_result_t allocate_socket(isc_socketmgr_t *, isc_sockettype_t,
420 static void destroy(isc_socket_t **);
421 static void internal_accept(isc_task_t *, isc_event_t *);
422 static void internal_connect(isc_task_t *, isc_event_t *);
423 static void internal_recv(isc_task_t *, isc_event_t *);
424 static void internal_send(isc_task_t *, isc_event_t *);
425 static void internal_fdwatch_write(isc_task_t *, isc_event_t *);
426 static void internal_fdwatch_read(isc_task_t *, isc_event_t *);
427 static void process_cmsg(isc_socket_t *, struct msghdr *, isc_socketevent_t *);
428 static void build_msghdr_send(isc_socket_t *, isc_socketevent_t *,
429 struct msghdr *, struct iovec *, size_t *);
430 static void build_msghdr_recv(isc_socket_t *, isc_socketevent_t *,
431 struct msghdr *, struct iovec *, size_t *);
432 #ifdef ISC_PLATFORM_USETHREADS
433 static isc_boolean_t process_ctlfd(isc_socketmgr_t *manager);
436 #define SELECT_POKE_SHUTDOWN (-1)
437 #define SELECT_POKE_NOTHING (-2)
438 #define SELECT_POKE_READ (-3)
439 #define SELECT_POKE_ACCEPT (-3) /*%< Same as _READ */
440 #define SELECT_POKE_WRITE (-4)
441 #define SELECT_POKE_CONNECT (-4) /*%< Same as _WRITE */
442 #define SELECT_POKE_CLOSE (-5)
444 #define SOCK_DEAD(s) ((s)->references == 0)
447 * Shortcut index arrays to get access to statistics counters.
454 STATID_CONNECTFAIL = 4,
456 STATID_ACCEPTFAIL = 6,
461 static const isc_statscounter_t upd4statsindex[] = {
462 isc_sockstatscounter_udp4open,
463 isc_sockstatscounter_udp4openfail,
464 isc_sockstatscounter_udp4close,
465 isc_sockstatscounter_udp4bindfail,
466 isc_sockstatscounter_udp4connectfail,
467 isc_sockstatscounter_udp4connect,
470 isc_sockstatscounter_udp4sendfail,
471 isc_sockstatscounter_udp4recvfail
473 static const isc_statscounter_t upd6statsindex[] = {
474 isc_sockstatscounter_udp6open,
475 isc_sockstatscounter_udp6openfail,
476 isc_sockstatscounter_udp6close,
477 isc_sockstatscounter_udp6bindfail,
478 isc_sockstatscounter_udp6connectfail,
479 isc_sockstatscounter_udp6connect,
482 isc_sockstatscounter_udp6sendfail,
483 isc_sockstatscounter_udp6recvfail
485 static const isc_statscounter_t tcp4statsindex[] = {
486 isc_sockstatscounter_tcp4open,
487 isc_sockstatscounter_tcp4openfail,
488 isc_sockstatscounter_tcp4close,
489 isc_sockstatscounter_tcp4bindfail,
490 isc_sockstatscounter_tcp4connectfail,
491 isc_sockstatscounter_tcp4connect,
492 isc_sockstatscounter_tcp4acceptfail,
493 isc_sockstatscounter_tcp4accept,
494 isc_sockstatscounter_tcp4sendfail,
495 isc_sockstatscounter_tcp4recvfail
497 static const isc_statscounter_t tcp6statsindex[] = {
498 isc_sockstatscounter_tcp6open,
499 isc_sockstatscounter_tcp6openfail,
500 isc_sockstatscounter_tcp6close,
501 isc_sockstatscounter_tcp6bindfail,
502 isc_sockstatscounter_tcp6connectfail,
503 isc_sockstatscounter_tcp6connect,
504 isc_sockstatscounter_tcp6acceptfail,
505 isc_sockstatscounter_tcp6accept,
506 isc_sockstatscounter_tcp6sendfail,
507 isc_sockstatscounter_tcp6recvfail
509 static const isc_statscounter_t unixstatsindex[] = {
510 isc_sockstatscounter_unixopen,
511 isc_sockstatscounter_unixopenfail,
512 isc_sockstatscounter_unixclose,
513 isc_sockstatscounter_unixbindfail,
514 isc_sockstatscounter_unixconnectfail,
515 isc_sockstatscounter_unixconnect,
516 isc_sockstatscounter_unixacceptfail,
517 isc_sockstatscounter_unixaccept,
518 isc_sockstatscounter_unixsendfail,
519 isc_sockstatscounter_unixrecvfail
521 static const isc_statscounter_t fdwatchstatsindex[] = {
524 isc_sockstatscounter_fdwatchclose,
525 isc_sockstatscounter_fdwatchbindfail,
526 isc_sockstatscounter_fdwatchconnectfail,
527 isc_sockstatscounter_fdwatchconnect,
530 isc_sockstatscounter_fdwatchsendfail,
531 isc_sockstatscounter_fdwatchrecvfail
535 manager_log(isc_socketmgr_t *sockmgr,
536 isc_logcategory_t *category, isc_logmodule_t *module, int level,
537 const char *fmt, ...) ISC_FORMAT_PRINTF(5, 6);
539 manager_log(isc_socketmgr_t *sockmgr,
540 isc_logcategory_t *category, isc_logmodule_t *module, int level,
541 const char *fmt, ...)
546 if (! isc_log_wouldlog(isc_lctx, level))
550 vsnprintf(msgbuf, sizeof(msgbuf), fmt, ap);
553 isc_log_write(isc_lctx, category, module, level,
554 "sockmgr %p: %s", sockmgr, msgbuf);
558 socket_log(isc_socket_t *sock, isc_sockaddr_t *address,
559 isc_logcategory_t *category, isc_logmodule_t *module, int level,
560 isc_msgcat_t *msgcat, int msgset, int message,
561 const char *fmt, ...) ISC_FORMAT_PRINTF(9, 10);
563 socket_log(isc_socket_t *sock, isc_sockaddr_t *address,
564 isc_logcategory_t *category, isc_logmodule_t *module, int level,
565 isc_msgcat_t *msgcat, int msgset, int message,
566 const char *fmt, ...)
569 char peerbuf[ISC_SOCKADDR_FORMATSIZE];
572 if (! isc_log_wouldlog(isc_lctx, level))
576 vsnprintf(msgbuf, sizeof(msgbuf), fmt, ap);
579 if (address == NULL) {
580 isc_log_iwrite(isc_lctx, category, module, level,
581 msgcat, msgset, message,
582 "socket %p: %s", sock, msgbuf);
584 isc_sockaddr_format(address, peerbuf, sizeof(peerbuf));
585 isc_log_iwrite(isc_lctx, category, module, level,
586 msgcat, msgset, message,
587 "socket %p %s: %s", sock, peerbuf, msgbuf);
591 #if defined(_AIX) && defined(ISC_NET_BSD44MSGHDR) && \
592 defined(USE_CMSG) && defined(IPV6_RECVPKTINFO)
594 * AIX has a kernel bug where IPV6_RECVPKTINFO gets cleared by
595 * setting IPV6_V6ONLY.
598 FIX_IPV6_RECVPKTINFO(isc_socket_t *sock)
600 char strbuf[ISC_STRERRORSIZE];
603 if (sock->pf != AF_INET6 || sock->type != isc_sockettype_udp)
606 if (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_RECVPKTINFO,
607 (void *)&on, sizeof(on)) < 0) {
609 UNEXPECTED_ERROR(__FILE__, __LINE__,
610 "setsockopt(%d, IPV6_RECVPKTINFO) "
612 isc_msgcat_get(isc_msgcat,
620 #define FIX_IPV6_RECVPKTINFO(sock) (void)0
624 * Increment socket-related statistics counters.
627 inc_stats(isc_stats_t *stats, isc_statscounter_t counterid) {
628 REQUIRE(counterid != -1);
631 isc_stats_increment(stats, counterid);
634 static inline isc_result_t
635 watch_fd(isc_socketmgr_t *manager, int fd, int msg) {
636 isc_result_t result = ISC_R_SUCCESS;
639 struct kevent evchange;
641 memset(&evchange, 0, sizeof(evchange));
642 if (msg == SELECT_POKE_READ)
643 evchange.filter = EVFILT_READ;
645 evchange.filter = EVFILT_WRITE;
646 evchange.flags = EV_ADD;
648 if (kevent(manager->kqueue_fd, &evchange, 1, NULL, 0, NULL) != 0)
649 result = isc__errno2result(errno);
652 #elif defined(USE_EPOLL)
653 struct epoll_event event;
655 if (msg == SELECT_POKE_READ)
656 event.events = EPOLLIN;
658 event.events = EPOLLOUT;
659 memset(&event.data, 0, sizeof(event.data));
661 if (epoll_ctl(manager->epoll_fd, EPOLL_CTL_ADD, fd, &event) == -1 &&
663 result = isc__errno2result(errno);
667 #elif defined(USE_DEVPOLL)
669 int lockid = FDLOCK_ID(fd);
671 memset(&pfd, 0, sizeof(pfd));
672 if (msg == SELECT_POKE_READ)
675 pfd.events = POLLOUT;
678 LOCK(&manager->fdlock[lockid]);
679 if (write(manager->devpoll_fd, &pfd, sizeof(pfd)) == -1)
680 result = isc__errno2result(errno);
682 if (msg == SELECT_POKE_READ)
683 manager->fdpollinfo[fd].want_read = 1;
685 manager->fdpollinfo[fd].want_write = 1;
687 UNLOCK(&manager->fdlock[lockid]);
690 #elif defined(USE_SELECT)
691 LOCK(&manager->lock);
692 if (msg == SELECT_POKE_READ)
693 FD_SET(fd, manager->read_fds);
694 if (msg == SELECT_POKE_WRITE)
695 FD_SET(fd, manager->write_fds);
696 UNLOCK(&manager->lock);
702 static inline isc_result_t
703 unwatch_fd(isc_socketmgr_t *manager, int fd, int msg) {
704 isc_result_t result = ISC_R_SUCCESS;
707 struct kevent evchange;
709 memset(&evchange, 0, sizeof(evchange));
710 if (msg == SELECT_POKE_READ)
711 evchange.filter = EVFILT_READ;
713 evchange.filter = EVFILT_WRITE;
714 evchange.flags = EV_DELETE;
716 if (kevent(manager->kqueue_fd, &evchange, 1, NULL, 0, NULL) != 0)
717 result = isc__errno2result(errno);
720 #elif defined(USE_EPOLL)
721 struct epoll_event event;
723 if (msg == SELECT_POKE_READ)
724 event.events = EPOLLIN;
726 event.events = EPOLLOUT;
727 memset(&event.data, 0, sizeof(event.data));
729 if (epoll_ctl(manager->epoll_fd, EPOLL_CTL_DEL, fd, &event) == -1 &&
731 char strbuf[ISC_STRERRORSIZE];
732 isc__strerror(errno, strbuf, sizeof(strbuf));
733 UNEXPECTED_ERROR(__FILE__, __LINE__,
734 "epoll_ctl(DEL), %d: %s", fd, strbuf);
735 result = ISC_R_UNEXPECTED;
738 #elif defined(USE_DEVPOLL)
739 struct pollfd pfds[2];
740 size_t writelen = sizeof(pfds[0]);
741 int lockid = FDLOCK_ID(fd);
743 memset(pfds, 0, sizeof(pfds));
744 pfds[0].events = POLLREMOVE;
748 * Canceling read or write polling via /dev/poll is tricky. Since it
749 * only provides a way of canceling per FD, we may need to re-poll the
750 * socket for the other operation.
752 LOCK(&manager->fdlock[lockid]);
753 if (msg == SELECT_POKE_READ &&
754 manager->fdpollinfo[fd].want_write == 1) {
755 pfds[1].events = POLLOUT;
757 writelen += sizeof(pfds[1]);
759 if (msg == SELECT_POKE_WRITE &&
760 manager->fdpollinfo[fd].want_read == 1) {
761 pfds[1].events = POLLIN;
763 writelen += sizeof(pfds[1]);
766 if (write(manager->devpoll_fd, pfds, writelen) == -1)
767 result = isc__errno2result(errno);
769 if (msg == SELECT_POKE_READ)
770 manager->fdpollinfo[fd].want_read = 0;
772 manager->fdpollinfo[fd].want_write = 0;
774 UNLOCK(&manager->fdlock[lockid]);
777 #elif defined(USE_SELECT)
778 LOCK(&manager->lock);
779 if (msg == SELECT_POKE_READ)
780 FD_CLR(fd, manager->read_fds);
781 else if (msg == SELECT_POKE_WRITE)
782 FD_CLR(fd, manager->write_fds);
783 UNLOCK(&manager->lock);
790 wakeup_socket(isc_socketmgr_t *manager, int fd, int msg) {
792 int lockid = FDLOCK_ID(fd);
795 * This is a wakeup on a socket. If the socket is not in the
796 * process of being closed, start watching it for either reads
800 INSIST(fd >= 0 && fd < (int)manager->maxsocks);
802 if (msg == SELECT_POKE_CLOSE) {
803 /* No one should be updating fdstate, so no need to lock it */
804 INSIST(manager->fdstate[fd] == CLOSE_PENDING);
805 manager->fdstate[fd] = CLOSED;
806 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
807 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
812 LOCK(&manager->fdlock[lockid]);
813 if (manager->fdstate[fd] == CLOSE_PENDING) {
814 UNLOCK(&manager->fdlock[lockid]);
817 * We accept (and ignore) any error from unwatch_fd() as we are
818 * closing the socket, hoping it doesn't leave dangling state in
820 * Note that unwatch_fd() must be called after releasing the
821 * fdlock; otherwise it could cause deadlock due to a lock order
824 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
825 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
828 if (manager->fdstate[fd] != MANAGED) {
829 UNLOCK(&manager->fdlock[lockid]);
832 UNLOCK(&manager->fdlock[lockid]);
837 result = watch_fd(manager, fd, msg);
838 if (result != ISC_R_SUCCESS) {
840 * XXXJT: what should we do? Ignoring the failure of watching
841 * a socket will make the application dysfunctional, but there
842 * seems to be no reasonable recovery process.
844 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
845 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
846 "failed to start watching FD (%d): %s",
847 fd, isc_result_totext(result));
851 #ifdef ISC_PLATFORM_USETHREADS
853 * Poke the select loop when there is something for us to do.
854 * The write is required (by POSIX) to complete. That is, we
855 * will not get partial writes.
858 select_poke(isc_socketmgr_t *mgr, int fd, int msg) {
861 char strbuf[ISC_STRERRORSIZE];
867 cc = write(mgr->pipe_fds[1], buf, sizeof(buf));
870 * Treat ENOSR as EAGAIN but loop slowly as it is
871 * unlikely to clear fast.
873 if (cc < 0 && errno == ENOSR) {
878 } while (cc < 0 && SOFT_ERROR(errno));
881 isc__strerror(errno, strbuf, sizeof(strbuf));
882 FATAL_ERROR(__FILE__, __LINE__,
883 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
886 "during watcher poke: %s"),
890 INSIST(cc == sizeof(buf));
894 * Read a message on the internal fd.
897 select_readmsg(isc_socketmgr_t *mgr, int *fd, int *msg) {
900 char strbuf[ISC_STRERRORSIZE];
902 cc = read(mgr->pipe_fds[0], buf, sizeof(buf));
904 *msg = SELECT_POKE_NOTHING;
905 *fd = -1; /* Silence compiler. */
906 if (SOFT_ERROR(errno))
909 isc__strerror(errno, strbuf, sizeof(strbuf));
910 FATAL_ERROR(__FILE__, __LINE__,
911 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
914 "during watcher poke: %s"),
919 INSIST(cc == sizeof(buf));
924 #else /* ISC_PLATFORM_USETHREADS */
926 * Update the state of the socketmgr when something changes.
929 select_poke(isc_socketmgr_t *manager, int fd, int msg) {
930 if (msg == SELECT_POKE_SHUTDOWN)
933 wakeup_socket(manager, fd, msg);
936 #endif /* ISC_PLATFORM_USETHREADS */
939 * Make a fd non-blocking.
942 make_nonblock(int fd) {
945 char strbuf[ISC_STRERRORSIZE];
946 #ifdef USE_FIONBIO_IOCTL
949 ret = ioctl(fd, FIONBIO, (char *)&on);
951 flags = fcntl(fd, F_GETFL, 0);
952 flags |= PORT_NONBLOCK;
953 ret = fcntl(fd, F_SETFL, flags);
957 isc__strerror(errno, strbuf, sizeof(strbuf));
958 UNEXPECTED_ERROR(__FILE__, __LINE__,
959 #ifdef USE_FIONBIO_IOCTL
960 "ioctl(%d, FIONBIO, &on): %s", fd,
962 "fcntl(%d, F_SETFL, %d): %s", fd, flags,
966 return (ISC_R_UNEXPECTED);
969 return (ISC_R_SUCCESS);
974 * Not all OSes support advanced CMSG macros: CMSG_LEN and CMSG_SPACE.
975 * In order to ensure as much portability as possible, we provide wrapper
976 * functions of these macros.
977 * Note that cmsg_space() could run slow on OSes that do not have
980 static inline ISC_SOCKADDR_LEN_T
981 cmsg_len(ISC_SOCKADDR_LEN_T len) {
983 return (CMSG_LEN(len));
985 ISC_SOCKADDR_LEN_T hdrlen;
988 * Cast NULL so that any pointer arithmetic performed by CMSG_DATA
991 hdrlen = (ISC_SOCKADDR_LEN_T)CMSG_DATA(((struct cmsghdr *)NULL));
992 return (hdrlen + len);
996 static inline ISC_SOCKADDR_LEN_T
997 cmsg_space(ISC_SOCKADDR_LEN_T len) {
999 return (CMSG_SPACE(len));
1002 struct cmsghdr *cmsgp;
1004 * XXX: The buffer length is an ad-hoc value, but should be enough
1005 * in a practical sense.
1007 char dummybuf[sizeof(struct cmsghdr) + 1024];
1009 memset(&msg, 0, sizeof(msg));
1010 msg.msg_control = dummybuf;
1011 msg.msg_controllen = sizeof(dummybuf);
1013 cmsgp = (struct cmsghdr *)dummybuf;
1014 cmsgp->cmsg_len = cmsg_len(len);
1016 cmsgp = CMSG_NXTHDR(&msg, cmsgp);
1018 return ((char *)cmsgp - (char *)msg.msg_control);
1023 #endif /* USE_CMSG */
1026 * Process control messages received on a socket.
1029 process_cmsg(isc_socket_t *sock, struct msghdr *msg, isc_socketevent_t *dev) {
1031 struct cmsghdr *cmsgp;
1032 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1033 struct in6_pktinfo *pktinfop;
1036 struct timeval *timevalp;
1041 * sock is used only when ISC_NET_BSD44MSGHDR and USE_CMSG are defined.
1042 * msg and dev are used only when ISC_NET_BSD44MSGHDR is defined.
1043 * They are all here, outside of the CPP tests, because it is
1044 * more consistent with the usual ISC coding style.
1050 #ifdef ISC_NET_BSD44MSGHDR
1053 if ((msg->msg_flags & MSG_TRUNC) == MSG_TRUNC)
1054 dev->attributes |= ISC_SOCKEVENTATTR_TRUNC;
1058 if ((msg->msg_flags & MSG_CTRUNC) == MSG_CTRUNC)
1059 dev->attributes |= ISC_SOCKEVENTATTR_CTRUNC;
1065 if (msg->msg_controllen == 0U || msg->msg_control == NULL)
1071 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1075 cmsgp = CMSG_FIRSTHDR(msg);
1076 while (cmsgp != NULL) {
1077 socket_log(sock, NULL, TRACE,
1078 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_PROCESSCMSG,
1079 "processing cmsg %p", cmsgp);
1081 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1082 if (cmsgp->cmsg_level == IPPROTO_IPV6
1083 && cmsgp->cmsg_type == IPV6_PKTINFO) {
1085 pktinfop = (struct in6_pktinfo *)CMSG_DATA(cmsgp);
1086 memcpy(&dev->pktinfo, pktinfop,
1087 sizeof(struct in6_pktinfo));
1088 dev->attributes |= ISC_SOCKEVENTATTR_PKTINFO;
1089 socket_log(sock, NULL, TRACE,
1090 isc_msgcat, ISC_MSGSET_SOCKET,
1092 "interface received on ifindex %u",
1093 dev->pktinfo.ipi6_ifindex);
1094 if (IN6_IS_ADDR_MULTICAST(&pktinfop->ipi6_addr))
1095 dev->attributes |= ISC_SOCKEVENTATTR_MULTICAST;
1101 if (cmsgp->cmsg_level == SOL_SOCKET
1102 && cmsgp->cmsg_type == SCM_TIMESTAMP) {
1103 timevalp = (struct timeval *)CMSG_DATA(cmsgp);
1104 dev->timestamp.seconds = timevalp->tv_sec;
1105 dev->timestamp.nanoseconds = timevalp->tv_usec * 1000;
1106 dev->attributes |= ISC_SOCKEVENTATTR_TIMESTAMP;
1112 cmsgp = CMSG_NXTHDR(msg, cmsgp);
1114 #endif /* USE_CMSG */
1116 #endif /* ISC_NET_BSD44MSGHDR */
1120 * Construct an iov array and attach it to the msghdr passed in. This is
1121 * the SEND constructor, which will use the used region of the buffer
1122 * (if using a buffer list) or will use the internal region (if a single
1123 * buffer I/O is requested).
1125 * Nothing can be NULL, and the done event must list at least one buffer
1126 * on the buffer linked list for this function to be meaningful.
1128 * If write_countp != NULL, *write_countp will hold the number of bytes
1129 * this transaction can send.
1132 build_msghdr_send(isc_socket_t *sock, isc_socketevent_t *dev,
1133 struct msghdr *msg, struct iovec *iov, size_t *write_countp)
1135 unsigned int iovcount;
1136 isc_buffer_t *buffer;
1141 memset(msg, 0, sizeof(*msg));
1143 if (!sock->connected) {
1144 msg->msg_name = (void *)&dev->address.type.sa;
1145 msg->msg_namelen = dev->address.length;
1147 msg->msg_name = NULL;
1148 msg->msg_namelen = 0;
1151 buffer = ISC_LIST_HEAD(dev->bufferlist);
1156 * Single buffer I/O? Skip what we've done so far in this region.
1158 if (buffer == NULL) {
1159 write_count = dev->region.length - dev->n;
1160 iov[0].iov_base = (void *)(dev->region.base + dev->n);
1161 iov[0].iov_len = write_count;
1169 * Skip the data in the buffer list that we have already written.
1171 skip_count = dev->n;
1172 while (buffer != NULL) {
1173 REQUIRE(ISC_BUFFER_VALID(buffer));
1174 if (skip_count < isc_buffer_usedlength(buffer))
1176 skip_count -= isc_buffer_usedlength(buffer);
1177 buffer = ISC_LIST_NEXT(buffer, link);
1180 while (buffer != NULL) {
1181 INSIST(iovcount < MAXSCATTERGATHER_SEND);
1183 isc_buffer_usedregion(buffer, &used);
1185 if (used.length > 0) {
1186 iov[iovcount].iov_base = (void *)(used.base
1188 iov[iovcount].iov_len = used.length - skip_count;
1189 write_count += (used.length - skip_count);
1193 buffer = ISC_LIST_NEXT(buffer, link);
1196 INSIST(skip_count == 0U);
1200 msg->msg_iovlen = iovcount;
1202 #ifdef ISC_NET_BSD44MSGHDR
1203 msg->msg_control = NULL;
1204 msg->msg_controllen = 0;
1206 #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
1207 if ((sock->type == isc_sockettype_udp)
1208 && ((dev->attributes & ISC_SOCKEVENTATTR_PKTINFO) != 0)) {
1209 struct cmsghdr *cmsgp;
1210 struct in6_pktinfo *pktinfop;
1212 socket_log(sock, NULL, TRACE,
1213 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_SENDTODATA,
1214 "sendto pktinfo data, ifindex %u",
1215 dev->pktinfo.ipi6_ifindex);
1217 msg->msg_controllen = cmsg_space(sizeof(struct in6_pktinfo));
1218 INSIST(msg->msg_controllen <= sock->sendcmsgbuflen);
1219 msg->msg_control = (void *)sock->sendcmsgbuf;
1221 cmsgp = (struct cmsghdr *)sock->sendcmsgbuf;
1222 cmsgp->cmsg_level = IPPROTO_IPV6;
1223 cmsgp->cmsg_type = IPV6_PKTINFO;
1224 cmsgp->cmsg_len = cmsg_len(sizeof(struct in6_pktinfo));
1225 pktinfop = (struct in6_pktinfo *)CMSG_DATA(cmsgp);
1226 memcpy(pktinfop, &dev->pktinfo, sizeof(struct in6_pktinfo));
1228 #endif /* USE_CMSG && ISC_PLATFORM_HAVEIPV6 */
1229 #else /* ISC_NET_BSD44MSGHDR */
1230 msg->msg_accrights = NULL;
1231 msg->msg_accrightslen = 0;
1232 #endif /* ISC_NET_BSD44MSGHDR */
1234 if (write_countp != NULL)
1235 *write_countp = write_count;
1239 * Construct an iov array and attach it to the msghdr passed in. This is
1240 * the RECV constructor, which will use the available region of the buffer
1241 * (if using a buffer list) or will use the internal region (if a single
1242 * buffer I/O is requested).
1244 * Nothing can be NULL, and the done event must list at least one buffer
1245 * on the buffer linked list for this function to be meaningful.
1247 * If read_countp != NULL, *read_countp will hold the number of bytes
1248 * this transaction can receive.
1251 build_msghdr_recv(isc_socket_t *sock, isc_socketevent_t *dev,
1252 struct msghdr *msg, struct iovec *iov, size_t *read_countp)
1254 unsigned int iovcount;
1255 isc_buffer_t *buffer;
1256 isc_region_t available;
1259 memset(msg, 0, sizeof(struct msghdr));
1261 if (sock->type == isc_sockettype_udp) {
1262 memset(&dev->address, 0, sizeof(dev->address));
1263 #ifdef BROKEN_RECVMSG
1264 if (sock->pf == AF_INET) {
1265 msg->msg_name = (void *)&dev->address.type.sin;
1266 msg->msg_namelen = sizeof(dev->address.type.sin6);
1267 } else if (sock->pf == AF_INET6) {
1268 msg->msg_name = (void *)&dev->address.type.sin6;
1269 msg->msg_namelen = sizeof(dev->address.type.sin6);
1270 #ifdef ISC_PLATFORM_HAVESYSUNH
1271 } else if (sock->pf == AF_UNIX) {
1272 msg->msg_name = (void *)&dev->address.type.sunix;
1273 msg->msg_namelen = sizeof(dev->address.type.sunix);
1276 msg->msg_name = (void *)&dev->address.type.sa;
1277 msg->msg_namelen = sizeof(dev->address.type);
1280 msg->msg_name = (void *)&dev->address.type.sa;
1281 msg->msg_namelen = sizeof(dev->address.type);
1283 #ifdef ISC_NET_RECVOVERFLOW
1284 /* If needed, steal one iovec for overflow detection. */
1288 msg->msg_name = NULL;
1289 msg->msg_namelen = 0;
1290 dev->address = sock->peer_address;
1293 buffer = ISC_LIST_HEAD(dev->bufferlist);
1297 * Single buffer I/O? Skip what we've done so far in this region.
1299 if (buffer == NULL) {
1300 read_count = dev->region.length - dev->n;
1301 iov[0].iov_base = (void *)(dev->region.base + dev->n);
1302 iov[0].iov_len = read_count;
1310 * Skip empty buffers.
1312 while (buffer != NULL) {
1313 REQUIRE(ISC_BUFFER_VALID(buffer));
1314 if (isc_buffer_availablelength(buffer) != 0)
1316 buffer = ISC_LIST_NEXT(buffer, link);
1320 while (buffer != NULL) {
1321 INSIST(iovcount < MAXSCATTERGATHER_RECV);
1323 isc_buffer_availableregion(buffer, &available);
1325 if (available.length > 0) {
1326 iov[iovcount].iov_base = (void *)(available.base);
1327 iov[iovcount].iov_len = available.length;
1328 read_count += available.length;
1331 buffer = ISC_LIST_NEXT(buffer, link);
1337 * If needed, set up to receive that one extra byte. Note that
1338 * we know there is at least one iov left, since we stole it
1339 * at the top of this function.
1341 #ifdef ISC_NET_RECVOVERFLOW
1342 if (sock->type == isc_sockettype_udp) {
1343 iov[iovcount].iov_base = (void *)(&sock->overflow);
1344 iov[iovcount].iov_len = 1;
1350 msg->msg_iovlen = iovcount;
1352 #ifdef ISC_NET_BSD44MSGHDR
1353 msg->msg_control = NULL;
1354 msg->msg_controllen = 0;
1356 #if defined(USE_CMSG)
1357 if (sock->type == isc_sockettype_udp) {
1358 msg->msg_control = sock->recvcmsgbuf;
1359 msg->msg_controllen = sock->recvcmsgbuflen;
1361 #endif /* USE_CMSG */
1362 #else /* ISC_NET_BSD44MSGHDR */
1363 msg->msg_accrights = NULL;
1364 msg->msg_accrightslen = 0;
1365 #endif /* ISC_NET_BSD44MSGHDR */
1367 if (read_countp != NULL)
1368 *read_countp = read_count;
1372 set_dev_address(isc_sockaddr_t *address, isc_socket_t *sock,
1373 isc_socketevent_t *dev)
1375 if (sock->type == isc_sockettype_udp) {
1376 if (address != NULL)
1377 dev->address = *address;
1379 dev->address = sock->peer_address;
1380 } else if (sock->type == isc_sockettype_tcp) {
1381 INSIST(address == NULL);
1382 dev->address = sock->peer_address;
1387 destroy_socketevent(isc_event_t *event) {
1388 isc_socketevent_t *ev = (isc_socketevent_t *)event;
1390 INSIST(ISC_LIST_EMPTY(ev->bufferlist));
1392 (ev->destroy)(event);
1395 static isc_socketevent_t *
1396 allocate_socketevent(isc_socket_t *sock, isc_eventtype_t eventtype,
1397 isc_taskaction_t action, const void *arg)
1399 isc_socketevent_t *ev;
1401 ev = (isc_socketevent_t *)isc_event_allocate(sock->manager->mctx,
1409 ev->result = ISC_R_UNEXPECTED;
1410 ISC_LINK_INIT(ev, ev_link);
1411 ISC_LIST_INIT(ev->bufferlist);
1412 ev->region.base = NULL;
1416 ev->destroy = ev->ev_destroy;
1417 ev->ev_destroy = destroy_socketevent;
1422 #if defined(ISC_SOCKET_DEBUG)
1424 dump_msg(struct msghdr *msg) {
1427 printf("MSGHDR %p\n", msg);
1428 printf("\tname %p, namelen %ld\n", msg->msg_name,
1429 (long) msg->msg_namelen);
1430 printf("\tiov %p, iovlen %ld\n", msg->msg_iov,
1431 (long) msg->msg_iovlen);
1432 for (i = 0; i < (unsigned int)msg->msg_iovlen; i++)
1433 printf("\t\t%d\tbase %p, len %ld\n", i,
1434 msg->msg_iov[i].iov_base,
1435 (long) msg->msg_iov[i].iov_len);
1436 #ifdef ISC_NET_BSD44MSGHDR
1437 printf("\tcontrol %p, controllen %ld\n", msg->msg_control,
1438 (long) msg->msg_controllen);
1443 #define DOIO_SUCCESS 0 /* i/o ok, event sent */
1444 #define DOIO_SOFT 1 /* i/o ok, soft error, no event sent */
1445 #define DOIO_HARD 2 /* i/o error, event sent */
1446 #define DOIO_EOF 3 /* EOF, no event sent */
1449 doio_recv(isc_socket_t *sock, isc_socketevent_t *dev) {
1451 struct iovec iov[MAXSCATTERGATHER_RECV];
1453 size_t actual_count;
1454 struct msghdr msghdr;
1455 isc_buffer_t *buffer;
1457 char strbuf[ISC_STRERRORSIZE];
1459 build_msghdr_recv(sock, dev, &msghdr, iov, &read_count);
1461 #if defined(ISC_SOCKET_DEBUG)
1465 cc = recvmsg(sock->fd, &msghdr, 0);
1468 #if defined(ISC_SOCKET_DEBUG)
1473 if (SOFT_ERROR(recv_errno))
1476 if (isc_log_wouldlog(isc_lctx, IOEVENT_LEVEL)) {
1477 isc__strerror(recv_errno, strbuf, sizeof(strbuf));
1478 socket_log(sock, NULL, IOEVENT,
1479 isc_msgcat, ISC_MSGSET_SOCKET,
1481 "doio_recv: recvmsg(%d) %d bytes, err %d/%s",
1482 sock->fd, cc, recv_errno, strbuf);
1485 #define SOFT_OR_HARD(_system, _isc) \
1486 if (recv_errno == _system) { \
1487 if (sock->connected) { \
1488 dev->result = _isc; \
1489 inc_stats(sock->manager->stats, \
1490 sock->statsindex[STATID_RECVFAIL]); \
1491 return (DOIO_HARD); \
1493 return (DOIO_SOFT); \
1495 #define ALWAYS_HARD(_system, _isc) \
1496 if (recv_errno == _system) { \
1497 dev->result = _isc; \
1498 inc_stats(sock->manager->stats, \
1499 sock->statsindex[STATID_RECVFAIL]); \
1500 return (DOIO_HARD); \
1503 SOFT_OR_HARD(ECONNREFUSED, ISC_R_CONNREFUSED);
1504 SOFT_OR_HARD(ENETUNREACH, ISC_R_NETUNREACH);
1505 SOFT_OR_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH);
1506 SOFT_OR_HARD(EHOSTDOWN, ISC_R_HOSTDOWN);
1507 /* HPUX 11.11 can return EADDRNOTAVAIL. */
1508 SOFT_OR_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
1509 ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES);
1511 * HPUX returns EPROTO and EINVAL on receiving some ICMP/ICMPv6
1515 SOFT_OR_HARD(EPROTO, ISC_R_HOSTUNREACH);
1517 SOFT_OR_HARD(EINVAL, ISC_R_HOSTUNREACH);
1522 dev->result = isc__errno2result(recv_errno);
1523 inc_stats(sock->manager->stats,
1524 sock->statsindex[STATID_RECVFAIL]);
1529 * On TCP and UNIX sockets, zero length reads indicate EOF,
1530 * while on UDP sockets, zero length reads are perfectly valid,
1533 switch (sock->type) {
1534 case isc_sockettype_tcp:
1535 case isc_sockettype_unix:
1539 case isc_sockettype_udp:
1541 case isc_sockettype_fdwatch:
1546 if (sock->type == isc_sockettype_udp) {
1547 dev->address.length = msghdr.msg_namelen;
1548 if (isc_sockaddr_getport(&dev->address) == 0) {
1549 if (isc_log_wouldlog(isc_lctx, IOEVENT_LEVEL)) {
1550 socket_log(sock, &dev->address, IOEVENT,
1551 isc_msgcat, ISC_MSGSET_SOCKET,
1553 "dropping source port zero packet");
1559 socket_log(sock, &dev->address, IOEVENT,
1560 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_PKTRECV,
1561 "packet received correctly");
1564 * Overflow bit detection. If we received MORE bytes than we should,
1565 * this indicates an overflow situation. Set the flag in the
1566 * dev entry and adjust how much we read by one.
1568 #ifdef ISC_NET_RECVOVERFLOW
1569 if ((sock->type == isc_sockettype_udp) && ((size_t)cc > read_count)) {
1570 dev->attributes |= ISC_SOCKEVENTATTR_TRUNC;
1576 * If there are control messages attached, run through them and pull
1577 * out the interesting bits.
1579 if (sock->type == isc_sockettype_udp)
1580 process_cmsg(sock, &msghdr, dev);
1583 * update the buffers (if any) and the i/o count
1587 buffer = ISC_LIST_HEAD(dev->bufferlist);
1588 while (buffer != NULL && actual_count > 0U) {
1589 REQUIRE(ISC_BUFFER_VALID(buffer));
1590 if (isc_buffer_availablelength(buffer) <= actual_count) {
1591 actual_count -= isc_buffer_availablelength(buffer);
1592 isc_buffer_add(buffer,
1593 isc_buffer_availablelength(buffer));
1595 isc_buffer_add(buffer, actual_count);
1599 buffer = ISC_LIST_NEXT(buffer, link);
1600 if (buffer == NULL) {
1601 INSIST(actual_count == 0U);
1606 * If we read less than we expected, update counters,
1607 * and let the upper layer poke the descriptor.
1609 if (((size_t)cc != read_count) && (dev->n < dev->minimum))
1613 * Full reads are posted, or partials if partials are ok.
1615 dev->result = ISC_R_SUCCESS;
1616 return (DOIO_SUCCESS);
1621 * DOIO_SUCCESS The operation succeeded. dev->result contains
1624 * DOIO_HARD A hard or unexpected I/O error was encountered.
1625 * dev->result contains the appropriate error.
1627 * DOIO_SOFT A soft I/O error was encountered. No senddone
1628 * event was sent. The operation should be retried.
1630 * No other return values are possible.
1633 doio_send(isc_socket_t *sock, isc_socketevent_t *dev) {
1635 struct iovec iov[MAXSCATTERGATHER_SEND];
1637 struct msghdr msghdr;
1638 char addrbuf[ISC_SOCKADDR_FORMATSIZE];
1641 char strbuf[ISC_STRERRORSIZE];
1643 build_msghdr_send(sock, dev, &msghdr, iov, &write_count);
1646 cc = sendmsg(sock->fd, &msghdr, 0);
1650 * Check for error or block condition.
1653 if (send_errno == EINTR && ++attempts < NRETRIES)
1656 if (SOFT_ERROR(send_errno))
1659 #define SOFT_OR_HARD(_system, _isc) \
1660 if (send_errno == _system) { \
1661 if (sock->connected) { \
1662 dev->result = _isc; \
1663 inc_stats(sock->manager->stats, \
1664 sock->statsindex[STATID_SENDFAIL]); \
1665 return (DOIO_HARD); \
1667 return (DOIO_SOFT); \
1669 #define ALWAYS_HARD(_system, _isc) \
1670 if (send_errno == _system) { \
1671 dev->result = _isc; \
1672 inc_stats(sock->manager->stats, \
1673 sock->statsindex[STATID_SENDFAIL]); \
1674 return (DOIO_HARD); \
1677 SOFT_OR_HARD(ECONNREFUSED, ISC_R_CONNREFUSED);
1678 ALWAYS_HARD(EACCES, ISC_R_NOPERM);
1679 ALWAYS_HARD(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
1680 ALWAYS_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
1681 ALWAYS_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH);
1683 ALWAYS_HARD(EHOSTDOWN, ISC_R_HOSTUNREACH);
1685 ALWAYS_HARD(ENETUNREACH, ISC_R_NETUNREACH);
1686 ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES);
1687 ALWAYS_HARD(EPERM, ISC_R_HOSTUNREACH);
1688 ALWAYS_HARD(EPIPE, ISC_R_NOTCONNECTED);
1689 ALWAYS_HARD(ECONNRESET, ISC_R_CONNECTIONRESET);
1695 * The other error types depend on whether or not the
1696 * socket is UDP or TCP. If it is UDP, some errors
1697 * that we expect to be fatal under TCP are merely
1698 * annoying, and are really soft errors.
1700 * However, these soft errors are still returned as
1703 isc_sockaddr_format(&dev->address, addrbuf, sizeof(addrbuf));
1704 isc__strerror(send_errno, strbuf, sizeof(strbuf));
1705 UNEXPECTED_ERROR(__FILE__, __LINE__, "internal_send: %s: %s",
1707 dev->result = isc__errno2result(send_errno);
1708 inc_stats(sock->manager->stats,
1709 sock->statsindex[STATID_SENDFAIL]);
1714 inc_stats(sock->manager->stats,
1715 sock->statsindex[STATID_SENDFAIL]);
1716 UNEXPECTED_ERROR(__FILE__, __LINE__,
1717 "doio_send: send() %s 0",
1718 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
1719 ISC_MSG_RETURNED, "returned"));
1723 * If we write less than we expected, update counters, poke.
1726 if ((size_t)cc != write_count)
1730 * Exactly what we wanted to write. We're done with this
1731 * entry. Post its completion event.
1733 dev->result = ISC_R_SUCCESS;
1734 return (DOIO_SUCCESS);
1740 * Caller must ensure that the socket is not locked and no external
1744 closesocket(isc_socketmgr_t *manager, isc_socket_t *sock, int fd) {
1745 isc_sockettype_t type = sock->type;
1746 int lockid = FDLOCK_ID(fd);
1749 * No one has this socket open, so the watcher doesn't have to be
1750 * poked, and the socket doesn't have to be locked.
1752 LOCK(&manager->fdlock[lockid]);
1753 manager->fds[fd] = NULL;
1754 if (type == isc_sockettype_fdwatch)
1755 manager->fdstate[fd] = CLOSED;
1757 manager->fdstate[fd] = CLOSE_PENDING;
1758 UNLOCK(&manager->fdlock[lockid]);
1759 if (type == isc_sockettype_fdwatch) {
1761 * The caller may close the socket once this function returns,
1762 * and `fd' may be reassigned for a new socket. So we do
1763 * unwatch_fd() here, rather than defer it via select_poke().
1764 * Note: this may complicate data protection among threads and
1765 * may reduce performance due to additional locks. One way to
1766 * solve this would be to dup() the watched descriptor, but we
1767 * take a simpler approach at this moment.
1769 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
1770 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
1772 select_poke(manager, fd, SELECT_POKE_CLOSE);
1774 inc_stats(manager->stats, sock->statsindex[STATID_CLOSE]);
1777 * update manager->maxfd here (XXX: this should be implemented more
1781 LOCK(&manager->lock);
1782 if (manager->maxfd == fd) {
1786 for (i = fd - 1; i >= 0; i--) {
1787 lockid = FDLOCK_ID(i);
1789 LOCK(&manager->fdlock[lockid]);
1790 if (manager->fdstate[i] == MANAGED) {
1792 UNLOCK(&manager->fdlock[lockid]);
1795 UNLOCK(&manager->fdlock[lockid]);
1797 #ifdef ISC_PLATFORM_USETHREADS
1798 if (manager->maxfd < manager->pipe_fds[0])
1799 manager->maxfd = manager->pipe_fds[0];
1802 UNLOCK(&manager->lock);
1803 #endif /* USE_SELECT */
1807 destroy(isc_socket_t **sockp) {
1809 isc_socket_t *sock = *sockp;
1810 isc_socketmgr_t *manager = sock->manager;
1812 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
1813 ISC_MSG_DESTROYING, "destroying");
1815 INSIST(ISC_LIST_EMPTY(sock->accept_list));
1816 INSIST(ISC_LIST_EMPTY(sock->recv_list));
1817 INSIST(ISC_LIST_EMPTY(sock->send_list));
1818 INSIST(sock->connect_ev == NULL);
1819 REQUIRE(sock->fd == -1 || sock->fd < (int)manager->maxsocks);
1821 if (sock->fd >= 0) {
1824 closesocket(manager, sock, fd);
1827 LOCK(&manager->lock);
1829 ISC_LIST_UNLINK(manager->socklist, sock, link);
1831 #ifdef ISC_PLATFORM_USETHREADS
1832 if (ISC_LIST_EMPTY(manager->socklist))
1833 SIGNAL(&manager->shutdown_ok);
1834 #endif /* ISC_PLATFORM_USETHREADS */
1836 UNLOCK(&manager->lock);
1842 allocate_socket(isc_socketmgr_t *manager, isc_sockettype_t type,
1843 isc_socket_t **socketp)
1846 isc_result_t result;
1847 ISC_SOCKADDR_LEN_T cmsgbuflen;
1849 sock = isc_mem_get(manager->mctx, sizeof(*sock));
1852 return (ISC_R_NOMEMORY);
1854 result = ISC_R_UNEXPECTED;
1857 sock->references = 0;
1859 sock->manager = manager;
1862 sock->statsindex = NULL;
1864 ISC_LINK_INIT(sock, link);
1866 sock->recvcmsgbuf = NULL;
1867 sock->sendcmsgbuf = NULL;
1870 * set up cmsg buffers
1873 #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
1874 cmsgbuflen = cmsg_space(sizeof(struct in6_pktinfo));
1876 #if defined(USE_CMSG) && defined(SO_TIMESTAMP)
1877 cmsgbuflen += cmsg_space(sizeof(struct timeval));
1879 sock->recvcmsgbuflen = cmsgbuflen;
1880 if (sock->recvcmsgbuflen != 0U) {
1881 sock->recvcmsgbuf = isc_mem_get(manager->mctx, cmsgbuflen);
1882 if (sock->recvcmsgbuf == NULL)
1887 #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
1888 cmsgbuflen = cmsg_space(sizeof(struct in6_pktinfo));
1890 sock->sendcmsgbuflen = cmsgbuflen;
1891 if (sock->sendcmsgbuflen != 0U) {
1892 sock->sendcmsgbuf = isc_mem_get(manager->mctx, cmsgbuflen);
1893 if (sock->sendcmsgbuf == NULL)
1897 memset(sock->name, 0, sizeof(sock->name));
1901 * set up list of readers and writers to be initially empty
1903 ISC_LIST_INIT(sock->recv_list);
1904 ISC_LIST_INIT(sock->send_list);
1905 ISC_LIST_INIT(sock->accept_list);
1906 sock->connect_ev = NULL;
1907 sock->pending_recv = 0;
1908 sock->pending_send = 0;
1909 sock->pending_accept = 0;
1911 sock->connected = 0;
1912 sock->connecting = 0;
1916 * initialize the lock
1918 result = isc_mutex_init(&sock->lock);
1919 if (result != ISC_R_SUCCESS) {
1925 * Initialize readable and writable events
1927 ISC_EVENT_INIT(&sock->readable_ev, sizeof(intev_t),
1928 ISC_EVENTATTR_NOPURGE, NULL, ISC_SOCKEVENT_INTR,
1929 NULL, sock, sock, NULL, NULL);
1930 ISC_EVENT_INIT(&sock->writable_ev, sizeof(intev_t),
1931 ISC_EVENTATTR_NOPURGE, NULL, ISC_SOCKEVENT_INTW,
1932 NULL, sock, sock, NULL, NULL);
1934 sock->magic = SOCKET_MAGIC;
1937 return (ISC_R_SUCCESS);
1940 if (sock->recvcmsgbuf != NULL)
1941 isc_mem_put(manager->mctx, sock->recvcmsgbuf,
1942 sock->recvcmsgbuflen);
1943 if (sock->sendcmsgbuf != NULL)
1944 isc_mem_put(manager->mctx, sock->sendcmsgbuf,
1945 sock->sendcmsgbuflen);
1946 isc_mem_put(manager->mctx, sock, sizeof(*sock));
1952 * This event requires that the various lists be empty, that the reference
1953 * count be 1, and that the magic number is valid. The other socket bits,
1954 * like the lock, must be initialized as well. The fd associated must be
1955 * marked as closed, by setting it to -1 on close, or this routine will
1956 * also close the socket.
1959 free_socket(isc_socket_t **socketp) {
1960 isc_socket_t *sock = *socketp;
1962 INSIST(sock->references == 0);
1963 INSIST(VALID_SOCKET(sock));
1964 INSIST(!sock->connecting);
1965 INSIST(!sock->pending_recv);
1966 INSIST(!sock->pending_send);
1967 INSIST(!sock->pending_accept);
1968 INSIST(ISC_LIST_EMPTY(sock->recv_list));
1969 INSIST(ISC_LIST_EMPTY(sock->send_list));
1970 INSIST(ISC_LIST_EMPTY(sock->accept_list));
1971 INSIST(!ISC_LINK_LINKED(sock, link));
1973 if (sock->recvcmsgbuf != NULL)
1974 isc_mem_put(sock->manager->mctx, sock->recvcmsgbuf,
1975 sock->recvcmsgbuflen);
1976 if (sock->sendcmsgbuf != NULL)
1977 isc_mem_put(sock->manager->mctx, sock->sendcmsgbuf,
1978 sock->sendcmsgbuflen);
1982 DESTROYLOCK(&sock->lock);
1984 isc_mem_put(sock->manager->mctx, sock, sizeof(*sock));
1991 * This really should not be necessary to do. Having to workout
1992 * which kernel version we are on at run time so that we don't cause
1993 * the kernel to issue a warning about us using a deprecated socket option.
1994 * Such warnings should *never* be on by default in production kernels.
1996 * We can't do this a build time because executables are moved between
1997 * machines and hence kernels.
1999 * We can't just not set SO_BSDCOMAT because some kernels require it.
2002 static isc_once_t bsdcompat_once = ISC_ONCE_INIT;
2003 isc_boolean_t bsdcompat = ISC_TRUE;
2006 clear_bsdcompat(void) {
2013 uname(&buf); /* Can only fail if buf is bad in Linux. */
2015 /* Paranoia in parsing can be increased, but we trust uname(). */
2016 major = strtol(buf.release, &endp, 10);
2018 minor = strtol(endp+1, &endp, 10);
2019 if ((major > 2) || ((major == 2) && (minor >= 4))) {
2020 bsdcompat = ISC_FALSE;
2023 #endif /* __linux __ */
2028 opensocket(isc_socketmgr_t *manager, isc_socket_t *sock) {
2029 char strbuf[ISC_STRERRORSIZE];
2030 const char *err = "socket";
2032 #if defined(USE_CMSG) || defined(SO_BSDCOMPAT)
2035 #if defined(SO_RCVBUF)
2036 ISC_SOCKADDR_LEN_T optlen;
2041 switch (sock->type) {
2042 case isc_sockettype_udp:
2043 sock->fd = socket(sock->pf, SOCK_DGRAM, IPPROTO_UDP);
2045 case isc_sockettype_tcp:
2046 sock->fd = socket(sock->pf, SOCK_STREAM, IPPROTO_TCP);
2048 case isc_sockettype_unix:
2049 sock->fd = socket(sock->pf, SOCK_STREAM, 0);
2051 case isc_sockettype_fdwatch:
2053 * We should not be called for isc_sockettype_fdwatch sockets.
2058 if (sock->fd == -1 && errno == EINTR && tries++ < 42)
2063 * Leave a space for stdio and TCP to work in.
2065 if (manager->reserved != 0 && sock->type == isc_sockettype_udp &&
2066 sock->fd >= 0 && sock->fd < manager->reserved) {
2068 new = fcntl(sock->fd, F_DUPFD, manager->reserved);
2070 (void)close(sock->fd);
2073 err = "isc_socket_create: fcntl/reserved";
2074 } else if (sock->fd >= 0 && sock->fd < 20) {
2076 new = fcntl(sock->fd, F_DUPFD, 20);
2078 (void)close(sock->fd);
2081 err = "isc_socket_create: fcntl";
2085 if (sock->fd >= (int)manager->maxsocks) {
2086 (void)close(sock->fd);
2087 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2088 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2089 isc_msgcat, ISC_MSGSET_SOCKET,
2091 "socket: file descriptor exceeds limit (%d/%u)",
2092 sock->fd, manager->maxsocks);
2093 return (ISC_R_NORESOURCES);
2100 isc__strerror(errno, strbuf, sizeof(strbuf));
2101 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2102 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2103 isc_msgcat, ISC_MSGSET_SOCKET,
2105 "%s: %s", err, strbuf);
2108 return (ISC_R_NORESOURCES);
2110 case EPROTONOSUPPORT:
2114 * Linux 2.2 (and maybe others) return EINVAL instead of
2118 return (ISC_R_FAMILYNOSUPPORT);
2121 isc__strerror(errno, strbuf, sizeof(strbuf));
2122 UNEXPECTED_ERROR(__FILE__, __LINE__,
2124 isc_msgcat_get(isc_msgcat,
2129 return (ISC_R_UNEXPECTED);
2133 if (make_nonblock(sock->fd) != ISC_R_SUCCESS) {
2134 (void)close(sock->fd);
2135 return (ISC_R_UNEXPECTED);
2139 RUNTIME_CHECK(isc_once_do(&bsdcompat_once,
2140 clear_bsdcompat) == ISC_R_SUCCESS);
2141 if (sock->type != isc_sockettype_unix && bsdcompat &&
2142 setsockopt(sock->fd, SOL_SOCKET, SO_BSDCOMPAT,
2143 (void *)&on, sizeof(on)) < 0) {
2144 isc__strerror(errno, strbuf, sizeof(strbuf));
2145 UNEXPECTED_ERROR(__FILE__, __LINE__,
2146 "setsockopt(%d, SO_BSDCOMPAT) %s: %s",
2148 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
2149 ISC_MSG_FAILED, "failed"),
2156 if (setsockopt(sock->fd, SOL_SOCKET, SO_NOSIGPIPE,
2157 (void *)&on, sizeof(on)) < 0) {
2158 isc__strerror(errno, strbuf, sizeof(strbuf));
2159 UNEXPECTED_ERROR(__FILE__, __LINE__,
2160 "setsockopt(%d, SO_NOSIGPIPE) %s: %s",
2162 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
2163 ISC_MSG_FAILED, "failed"),
2169 #if defined(USE_CMSG) || defined(SO_RCVBUF)
2170 if (sock->type == isc_sockettype_udp) {
2172 #if defined(USE_CMSG)
2173 #if defined(SO_TIMESTAMP)
2174 if (setsockopt(sock->fd, SOL_SOCKET, SO_TIMESTAMP,
2175 (void *)&on, sizeof(on)) < 0
2176 && errno != ENOPROTOOPT) {
2177 isc__strerror(errno, strbuf, sizeof(strbuf));
2178 UNEXPECTED_ERROR(__FILE__, __LINE__,
2179 "setsockopt(%d, SO_TIMESTAMP) %s: %s",
2181 isc_msgcat_get(isc_msgcat,
2188 #endif /* SO_TIMESTAMP */
2190 #if defined(ISC_PLATFORM_HAVEIPV6)
2191 if (sock->pf == AF_INET6 && sock->recvcmsgbuflen == 0U) {
2193 * Warn explicitly because this anomaly can be hidden
2194 * in usual operation (and unexpectedly appear later).
2196 UNEXPECTED_ERROR(__FILE__, __LINE__,
2197 "No buffer available to receive "
2198 "IPv6 destination");
2200 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
2201 #ifdef IPV6_RECVPKTINFO
2203 if ((sock->pf == AF_INET6)
2204 && (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_RECVPKTINFO,
2205 (void *)&on, sizeof(on)) < 0)) {
2206 isc__strerror(errno, strbuf, sizeof(strbuf));
2207 UNEXPECTED_ERROR(__FILE__, __LINE__,
2208 "setsockopt(%d, IPV6_RECVPKTINFO) "
2210 isc_msgcat_get(isc_msgcat,
2218 if ((sock->pf == AF_INET6)
2219 && (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_PKTINFO,
2220 (void *)&on, sizeof(on)) < 0)) {
2221 isc__strerror(errno, strbuf, sizeof(strbuf));
2222 UNEXPECTED_ERROR(__FILE__, __LINE__,
2223 "setsockopt(%d, IPV6_PKTINFO) %s: %s",
2225 isc_msgcat_get(isc_msgcat,
2231 #endif /* IPV6_RECVPKTINFO */
2232 #endif /* ISC_PLATFORM_HAVEIN6PKTINFO */
2233 #ifdef IPV6_USE_MIN_MTU /* RFC 3542, not too common yet*/
2234 /* use minimum MTU */
2235 if (sock->pf == AF_INET6) {
2236 (void)setsockopt(sock->fd, IPPROTO_IPV6,
2238 (void *)&on, sizeof(on));
2241 #if defined(IPV6_MTU)
2243 * Use minimum MTU on IPv6 sockets.
2245 if (sock->pf == AF_INET6) {
2247 (void)setsockopt(sock->fd, IPPROTO_IPV6, IPV6_MTU,
2251 #if defined(IPV6_MTU_DISCOVER) && defined(IPV6_PMTUDISC_DONT)
2253 * Turn off Path MTU discovery on IPv6/UDP sockets.
2255 if (sock->pf == AF_INET6) {
2256 int action = IPV6_PMTUDISC_DONT;
2257 (void)setsockopt(sock->fd, IPPROTO_IPV6, IPV6_MTU_DISCOVER,
2258 &action, sizeof(action));
2261 #endif /* ISC_PLATFORM_HAVEIPV6 */
2262 #endif /* defined(USE_CMSG) */
2264 #if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
2266 * Turn off Path MTU discovery on IPv4/UDP sockets.
2268 if (sock->pf == AF_INET) {
2269 int action = IP_PMTUDISC_DONT;
2270 (void)setsockopt(sock->fd, IPPROTO_IP, IP_MTU_DISCOVER,
2271 &action, sizeof(action));
2274 #if defined(IP_DONTFRAG)
2276 * Turn off Path MTU discovery on IPv4/UDP sockets.
2278 if (sock->pf == AF_INET) {
2280 (void)setsockopt(sock->fd, IPPROTO_IP, IP_DONTFRAG,
2285 #if defined(SO_RCVBUF)
2286 optlen = sizeof(size);
2287 if (getsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF,
2288 (void *)&size, &optlen) >= 0 &&
2289 size < RCVBUFSIZE) {
2291 if (setsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF,
2292 (void *)&size, sizeof(size)) == -1) {
2293 isc__strerror(errno, strbuf, sizeof(strbuf));
2294 UNEXPECTED_ERROR(__FILE__, __LINE__,
2295 "setsockopt(%d, SO_RCVBUF, %d) %s: %s",
2297 isc_msgcat_get(isc_msgcat,
2306 #endif /* defined(USE_CMSG) || defined(SO_RCVBUF) */
2308 inc_stats(manager->stats, sock->statsindex[STATID_OPEN]);
2310 return (ISC_R_SUCCESS);
2314 * Create a new 'type' socket managed by 'manager'. Events
2315 * will be posted to 'task' and when dispatched 'action' will be
2316 * called with 'arg' as the arg value. The new socket is returned
2320 isc_socket_create(isc_socketmgr_t *manager, int pf, isc_sockettype_t type,
2321 isc_socket_t **socketp)
2323 isc_socket_t *sock = NULL;
2324 isc_result_t result;
2327 REQUIRE(VALID_MANAGER(manager));
2328 REQUIRE(socketp != NULL && *socketp == NULL);
2329 REQUIRE(type != isc_sockettype_fdwatch);
2331 result = allocate_socket(manager, type, &sock);
2332 if (result != ISC_R_SUCCESS)
2335 switch (sock->type) {
2336 case isc_sockettype_udp:
2338 (pf == AF_INET) ? upd4statsindex : upd6statsindex;
2340 case isc_sockettype_tcp:
2342 (pf == AF_INET) ? tcp4statsindex : tcp6statsindex;
2344 case isc_sockettype_unix:
2345 sock->statsindex = unixstatsindex;
2352 result = opensocket(manager, sock);
2353 if (result != ISC_R_SUCCESS) {
2354 inc_stats(manager->stats, sock->statsindex[STATID_OPENFAIL]);
2359 sock->references = 1;
2363 * Note we don't have to lock the socket like we normally would because
2364 * there are no external references to it yet.
2367 lockid = FDLOCK_ID(sock->fd);
2368 LOCK(&manager->fdlock[lockid]);
2369 manager->fds[sock->fd] = sock;
2370 manager->fdstate[sock->fd] = MANAGED;
2372 INSIST(sock->manager->fdpollinfo[sock->fd].want_read == 0 &&
2373 sock->manager->fdpollinfo[sock->fd].want_write == 0);
2375 UNLOCK(&manager->fdlock[lockid]);
2377 LOCK(&manager->lock);
2378 ISC_LIST_APPEND(manager->socklist, sock, link);
2380 if (manager->maxfd < sock->fd)
2381 manager->maxfd = sock->fd;
2383 UNLOCK(&manager->lock);
2385 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
2386 ISC_MSG_CREATED, "created");
2388 return (ISC_R_SUCCESS);
2392 isc_socket_open(isc_socket_t *sock) {
2393 isc_result_t result;
2395 REQUIRE(VALID_SOCKET(sock));
2398 REQUIRE(sock->references == 1);
2399 REQUIRE(sock->type != isc_sockettype_fdwatch);
2400 UNLOCK(&sock->lock);
2402 * We don't need to retain the lock hereafter, since no one else has
2405 REQUIRE(sock->fd == -1);
2407 result = opensocket(sock->manager, sock);
2408 if (result != ISC_R_SUCCESS)
2411 if (result == ISC_R_SUCCESS) {
2412 int lockid = FDLOCK_ID(sock->fd);
2414 LOCK(&sock->manager->fdlock[lockid]);
2415 sock->manager->fds[sock->fd] = sock;
2416 sock->manager->fdstate[sock->fd] = MANAGED;
2418 INSIST(sock->manager->fdpollinfo[sock->fd].want_read == 0 &&
2419 sock->manager->fdpollinfo[sock->fd].want_write == 0);
2421 UNLOCK(&sock->manager->fdlock[lockid]);
2424 LOCK(&sock->manager->lock);
2425 if (sock->manager->maxfd < sock->fd)
2426 sock->manager->maxfd = sock->fd;
2427 UNLOCK(&sock->manager->lock);
2435 * Create a new 'type' socket managed by 'manager'. Events
2436 * will be posted to 'task' and when dispatched 'action' will be
2437 * called with 'arg' as the arg value. The new socket is returned
2441 isc_socket_fdwatchcreate(isc_socketmgr_t *manager, int fd, int flags,
2442 isc_sockfdwatch_t callback, void *cbarg,
2443 isc_task_t *task, isc_socket_t **socketp)
2445 isc_socket_t *sock = NULL;
2446 isc_result_t result;
2449 REQUIRE(VALID_MANAGER(manager));
2450 REQUIRE(socketp != NULL && *socketp == NULL);
2452 result = allocate_socket(manager, isc_sockettype_fdwatch, &sock);
2453 if (result != ISC_R_SUCCESS)
2457 sock->fdwatcharg = cbarg;
2458 sock->fdwatchcb = callback;
2459 sock->fdwatchflags = flags;
2460 sock->fdwatchtask = task;
2461 sock->statsindex = fdwatchstatsindex;
2463 sock->references = 1;
2467 * Note we don't have to lock the socket like we normally would because
2468 * there are no external references to it yet.
2471 lockid = FDLOCK_ID(sock->fd);
2472 LOCK(&manager->fdlock[lockid]);
2473 manager->fds[sock->fd] = sock;
2474 manager->fdstate[sock->fd] = MANAGED;
2475 UNLOCK(&manager->fdlock[lockid]);
2477 LOCK(&manager->lock);
2478 ISC_LIST_APPEND(manager->socklist, sock, link);
2480 if (manager->maxfd < sock->fd)
2481 manager->maxfd = sock->fd;
2483 UNLOCK(&manager->lock);
2485 if (flags & ISC_SOCKFDWATCH_READ)
2486 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
2487 if (flags & ISC_SOCKFDWATCH_WRITE)
2488 select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
2490 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
2491 ISC_MSG_CREATED, "fdwatch-created");
2493 return (ISC_R_SUCCESS);
2497 * Attach to a socket. Caller must explicitly detach when it is done.
2500 isc_socket_attach(isc_socket_t *sock, isc_socket_t **socketp) {
2501 REQUIRE(VALID_SOCKET(sock));
2502 REQUIRE(socketp != NULL && *socketp == NULL);
2506 UNLOCK(&sock->lock);
2512 * Dereference a socket. If this is the last reference to it, clean things
2513 * up by destroying the socket.
2516 isc_socket_detach(isc_socket_t **socketp) {
2518 isc_boolean_t kill_socket = ISC_FALSE;
2520 REQUIRE(socketp != NULL);
2522 REQUIRE(VALID_SOCKET(sock));
2525 REQUIRE(sock->references > 0);
2527 if (sock->references == 0)
2528 kill_socket = ISC_TRUE;
2529 UNLOCK(&sock->lock);
2538 isc_socket_close(isc_socket_t *sock) {
2540 isc_socketmgr_t *manager;
2541 isc_sockettype_t type;
2543 REQUIRE(VALID_SOCKET(sock));
2547 REQUIRE(sock->references == 1);
2548 REQUIRE(sock->type != isc_sockettype_fdwatch);
2549 REQUIRE(sock->fd >= 0 && sock->fd < (int)sock->manager->maxsocks);
2551 INSIST(!sock->connecting);
2552 INSIST(!sock->pending_recv);
2553 INSIST(!sock->pending_send);
2554 INSIST(!sock->pending_accept);
2555 INSIST(ISC_LIST_EMPTY(sock->recv_list));
2556 INSIST(ISC_LIST_EMPTY(sock->send_list));
2557 INSIST(ISC_LIST_EMPTY(sock->accept_list));
2558 INSIST(sock->connect_ev == NULL);
2560 manager = sock->manager;
2564 memset(sock->name, 0, sizeof(sock->name));
2567 sock->connected = 0;
2568 sock->connecting = 0;
2570 isc_sockaddr_any(&sock->peer_address);
2572 UNLOCK(&sock->lock);
2574 closesocket(manager, sock, fd);
2576 return (ISC_R_SUCCESS);
2580 * I/O is possible on a given socket. Schedule an event to this task that
2581 * will call an internal function to do the I/O. This will charge the
2582 * task with the I/O operation and let our select loop handler get back
2583 * to doing something real as fast as possible.
2585 * The socket and manager must be locked before calling this function.
2588 dispatch_recv(isc_socket_t *sock) {
2590 isc_socketevent_t *ev;
2593 INSIST(!sock->pending_recv);
2595 if (sock->type != isc_sockettype_fdwatch) {
2596 ev = ISC_LIST_HEAD(sock->recv_list);
2599 socket_log(sock, NULL, EVENT, NULL, 0, 0,
2600 "dispatch_recv: event %p -> task %p",
2602 sender = ev->ev_sender;
2604 sender = sock->fdwatchtask;
2607 sock->pending_recv = 1;
2608 iev = &sock->readable_ev;
2611 iev->ev_sender = sock;
2612 if (sock->type == isc_sockettype_fdwatch)
2613 iev->ev_action = internal_fdwatch_read;
2615 iev->ev_action = internal_recv;
2618 isc_task_send(sender, (isc_event_t **)&iev);
2622 dispatch_send(isc_socket_t *sock) {
2624 isc_socketevent_t *ev;
2627 INSIST(!sock->pending_send);
2629 if (sock->type != isc_sockettype_fdwatch) {
2630 ev = ISC_LIST_HEAD(sock->send_list);
2633 socket_log(sock, NULL, EVENT, NULL, 0, 0,
2634 "dispatch_send: event %p -> task %p",
2636 sender = ev->ev_sender;
2638 sender = sock->fdwatchtask;
2641 sock->pending_send = 1;
2642 iev = &sock->writable_ev;
2645 iev->ev_sender = sock;
2646 if (sock->type == isc_sockettype_fdwatch)
2647 iev->ev_action = internal_fdwatch_write;
2649 iev->ev_action = internal_send;
2652 isc_task_send(sender, (isc_event_t **)&iev);
2656 * Dispatch an internal accept event.
2659 dispatch_accept(isc_socket_t *sock) {
2661 isc_socket_newconnev_t *ev;
2663 INSIST(!sock->pending_accept);
2666 * Are there any done events left, or were they all canceled
2667 * before the manager got the socket lock?
2669 ev = ISC_LIST_HEAD(sock->accept_list);
2673 sock->pending_accept = 1;
2674 iev = &sock->readable_ev;
2676 sock->references++; /* keep socket around for this internal event */
2677 iev->ev_sender = sock;
2678 iev->ev_action = internal_accept;
2681 isc_task_send(ev->ev_sender, (isc_event_t **)&iev);
2685 dispatch_connect(isc_socket_t *sock) {
2687 isc_socket_connev_t *ev;
2689 iev = &sock->writable_ev;
2691 ev = sock->connect_ev;
2692 INSIST(ev != NULL); /* XXX */
2694 INSIST(sock->connecting);
2696 sock->references++; /* keep socket around for this internal event */
2697 iev->ev_sender = sock;
2698 iev->ev_action = internal_connect;
2701 isc_task_send(ev->ev_sender, (isc_event_t **)&iev);
2705 * Dequeue an item off the given socket's read queue, set the result code
2706 * in the done event to the one provided, and send it to the task it was
2709 * If the event to be sent is on a list, remove it before sending. If
2710 * asked to, send and detach from the socket as well.
2712 * Caller must have the socket locked if the event is attached to the socket.
2715 send_recvdone_event(isc_socket_t *sock, isc_socketevent_t **dev) {
2718 task = (*dev)->ev_sender;
2720 (*dev)->ev_sender = sock;
2722 if (ISC_LINK_LINKED(*dev, ev_link))
2723 ISC_LIST_DEQUEUE(sock->recv_list, *dev, ev_link);
2725 if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
2726 == ISC_SOCKEVENTATTR_ATTACHED)
2727 isc_task_sendanddetach(&task, (isc_event_t **)dev);
2729 isc_task_send(task, (isc_event_t **)dev);
2733 * See comments for send_recvdone_event() above.
2735 * Caller must have the socket locked if the event is attached to the socket.
2738 send_senddone_event(isc_socket_t *sock, isc_socketevent_t **dev) {
2741 INSIST(dev != NULL && *dev != NULL);
2743 task = (*dev)->ev_sender;
2744 (*dev)->ev_sender = sock;
2746 if (ISC_LINK_LINKED(*dev, ev_link))
2747 ISC_LIST_DEQUEUE(sock->send_list, *dev, ev_link);
2749 if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
2750 == ISC_SOCKEVENTATTR_ATTACHED)
2751 isc_task_sendanddetach(&task, (isc_event_t **)dev);
2753 isc_task_send(task, (isc_event_t **)dev);
2757 * Call accept() on a socket, to get the new file descriptor. The listen
2758 * socket is used as a prototype to create a new isc_socket_t. The new
2759 * socket has one outstanding reference. The task receiving the event
2760 * will be detached from just after the event is delivered.
2762 * On entry to this function, the event delivered is the internal
2763 * readable event, and the first item on the accept_list should be
2764 * the done event we want to send. If the list is empty, this is a no-op,
2765 * so just unlock and return.
2768 internal_accept(isc_task_t *me, isc_event_t *ev) {
2770 isc_socketmgr_t *manager;
2771 isc_socket_newconnev_t *dev;
2773 ISC_SOCKADDR_LEN_T addrlen;
2775 isc_result_t result = ISC_R_SUCCESS;
2776 char strbuf[ISC_STRERRORSIZE];
2777 const char *err = "accept";
2781 sock = ev->ev_sender;
2782 INSIST(VALID_SOCKET(sock));
2785 socket_log(sock, NULL, TRACE,
2786 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_ACCEPTLOCK,
2787 "internal_accept called, locked socket");
2789 manager = sock->manager;
2790 INSIST(VALID_MANAGER(manager));
2792 INSIST(sock->listener);
2793 INSIST(sock->pending_accept == 1);
2794 sock->pending_accept = 0;
2796 INSIST(sock->references > 0);
2797 sock->references--; /* the internal event is done with this socket */
2798 if (sock->references == 0) {
2799 UNLOCK(&sock->lock);
2805 * Get the first item off the accept list.
2806 * If it is empty, unlock the socket and return.
2808 dev = ISC_LIST_HEAD(sock->accept_list);
2810 UNLOCK(&sock->lock);
2815 * Try to accept the new connection. If the accept fails with
2816 * EAGAIN or EINTR, simply poke the watcher to watch this socket
2817 * again. Also ignore ECONNRESET, which has been reported to
2818 * be spuriously returned on Linux 2.2.19 although it is not
2819 * a documented error for accept(). ECONNABORTED has been
2820 * reported for Solaris 8. The rest are thrown in not because
2821 * we have seen them but because they are ignored by other
2822 * daemons such as BIND 8 and Apache.
2825 addrlen = sizeof(dev->newsocket->peer_address.type);
2826 memset(&dev->newsocket->peer_address.type, 0, addrlen);
2827 fd = accept(sock->fd, &dev->newsocket->peer_address.type.sa,
2832 * Leave a space for stdio to work in.
2834 if (fd >= 0 && fd < 20) {
2836 new = fcntl(fd, F_DUPFD, 20);
2841 err = "accept/fcntl";
2846 if (SOFT_ERROR(errno))
2851 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2852 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2853 isc_msgcat, ISC_MSGSET_SOCKET,
2855 "%s: too many open file descriptors",
2878 isc__strerror(errno, strbuf, sizeof(strbuf));
2879 UNEXPECTED_ERROR(__FILE__, __LINE__,
2880 "internal_accept: %s() %s: %s", err,
2881 isc_msgcat_get(isc_msgcat,
2887 result = ISC_R_UNEXPECTED;
2889 if (addrlen == 0U) {
2890 UNEXPECTED_ERROR(__FILE__, __LINE__,
2891 "internal_accept(): "
2892 "accept() failed to return "
2897 } else if (dev->newsocket->peer_address.type.sa.sa_family !=
2900 UNEXPECTED_ERROR(__FILE__, __LINE__,
2901 "internal_accept(): "
2902 "accept() returned peer address "
2903 "family %u (expected %u)",
2904 dev->newsocket->peer_address.
2909 } else if (fd >= (int)manager->maxsocks) {
2910 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2911 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2912 isc_msgcat, ISC_MSGSET_SOCKET,
2915 "file descriptor exceeds limit (%d/%u)",
2916 fd, manager->maxsocks);
2923 dev->newsocket->peer_address.length = addrlen;
2924 dev->newsocket->pf = sock->pf;
2928 * Pull off the done event.
2930 ISC_LIST_UNLINK(sock->accept_list, dev, ev_link);
2933 * Poke watcher if there are more pending accepts.
2935 if (!ISC_LIST_EMPTY(sock->accept_list))
2936 select_poke(sock->manager, sock->fd, SELECT_POKE_ACCEPT);
2938 UNLOCK(&sock->lock);
2940 if (fd != -1 && (make_nonblock(fd) != ISC_R_SUCCESS)) {
2943 result = ISC_R_UNEXPECTED;
2947 * -1 means the new socket didn't happen.
2950 int lockid = FDLOCK_ID(fd);
2952 LOCK(&manager->fdlock[lockid]);
2953 manager->fds[fd] = dev->newsocket;
2954 manager->fdstate[fd] = MANAGED;
2955 UNLOCK(&manager->fdlock[lockid]);
2957 LOCK(&manager->lock);
2958 ISC_LIST_APPEND(manager->socklist, dev->newsocket, link);
2960 dev->newsocket->fd = fd;
2961 dev->newsocket->bound = 1;
2962 dev->newsocket->connected = 1;
2965 * Save away the remote address
2967 dev->address = dev->newsocket->peer_address;
2970 if (manager->maxfd < fd)
2971 manager->maxfd = fd;
2974 socket_log(sock, &dev->newsocket->peer_address, CREATION,
2975 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_ACCEPTEDCXN,
2976 "accepted connection, new socket %p",
2979 UNLOCK(&manager->lock);
2981 inc_stats(manager->stats, sock->statsindex[STATID_ACCEPT]);
2983 inc_stats(manager->stats, sock->statsindex[STATID_ACCEPTFAIL]);
2984 dev->newsocket->references--;
2985 free_socket(&dev->newsocket);
2989 * Fill in the done event details and send it off.
2991 dev->result = result;
2992 task = dev->ev_sender;
2993 dev->ev_sender = sock;
2995 isc_task_sendanddetach(&task, ISC_EVENT_PTR(&dev));
2999 select_poke(sock->manager, sock->fd, SELECT_POKE_ACCEPT);
3000 UNLOCK(&sock->lock);
3002 inc_stats(manager->stats, sock->statsindex[STATID_ACCEPTFAIL]);
3007 internal_recv(isc_task_t *me, isc_event_t *ev) {
3008 isc_socketevent_t *dev;
3011 INSIST(ev->ev_type == ISC_SOCKEVENT_INTR);
3013 sock = ev->ev_sender;
3014 INSIST(VALID_SOCKET(sock));
3017 socket_log(sock, NULL, IOEVENT,
3018 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALRECV,
3019 "internal_recv: task %p got event %p", me, ev);
3021 INSIST(sock->pending_recv == 1);
3022 sock->pending_recv = 0;
3024 INSIST(sock->references > 0);
3025 sock->references--; /* the internal event is done with this socket */
3026 if (sock->references == 0) {
3027 UNLOCK(&sock->lock);
3033 * Try to do as much I/O as possible on this socket. There are no
3034 * limits here, currently.
3036 dev = ISC_LIST_HEAD(sock->recv_list);
3037 while (dev != NULL) {
3038 switch (doio_recv(sock, dev)) {
3044 * read of 0 means the remote end was closed.
3045 * Run through the event queue and dispatch all
3046 * the events with an EOF result code.
3049 dev->result = ISC_R_EOF;
3050 send_recvdone_event(sock, &dev);
3051 dev = ISC_LIST_HEAD(sock->recv_list);
3052 } while (dev != NULL);
3057 send_recvdone_event(sock, &dev);
3061 dev = ISC_LIST_HEAD(sock->recv_list);
3065 if (!ISC_LIST_EMPTY(sock->recv_list))
3066 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
3068 UNLOCK(&sock->lock);
3072 internal_send(isc_task_t *me, isc_event_t *ev) {
3073 isc_socketevent_t *dev;
3076 INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
3079 * Find out what socket this is and lock it.
3081 sock = (isc_socket_t *)ev->ev_sender;
3082 INSIST(VALID_SOCKET(sock));
3085 socket_log(sock, NULL, IOEVENT,
3086 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALSEND,
3087 "internal_send: task %p got event %p", me, ev);
3089 INSIST(sock->pending_send == 1);
3090 sock->pending_send = 0;
3092 INSIST(sock->references > 0);
3093 sock->references--; /* the internal event is done with this socket */
3094 if (sock->references == 0) {
3095 UNLOCK(&sock->lock);
3101 * Try to do as much I/O as possible on this socket. There are no
3102 * limits here, currently.
3104 dev = ISC_LIST_HEAD(sock->send_list);
3105 while (dev != NULL) {
3106 switch (doio_send(sock, dev)) {
3112 send_senddone_event(sock, &dev);
3116 dev = ISC_LIST_HEAD(sock->send_list);
3120 if (!ISC_LIST_EMPTY(sock->send_list))
3121 select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
3123 UNLOCK(&sock->lock);
3127 internal_fdwatch_write(isc_task_t *me, isc_event_t *ev) {
3131 INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
3134 * Find out what socket this is and lock it.
3136 sock = (isc_socket_t *)ev->ev_sender;
3137 INSIST(VALID_SOCKET(sock));
3140 socket_log(sock, NULL, IOEVENT,
3141 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALSEND,
3142 "internal_fdwatch_write: task %p got event %p", me, ev);
3144 INSIST(sock->pending_send == 1);
3146 UNLOCK(&sock->lock);
3147 more_data = (sock->fdwatchcb)(me, sock, sock->fdwatcharg);
3150 sock->pending_send = 0;
3152 INSIST(sock->references > 0);
3153 sock->references--; /* the internal event is done with this socket */
3154 if (sock->references == 0) {
3155 UNLOCK(&sock->lock);
3161 select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
3163 UNLOCK(&sock->lock);
3167 internal_fdwatch_read(isc_task_t *me, isc_event_t *ev) {
3171 INSIST(ev->ev_type == ISC_SOCKEVENT_INTR);
3174 * Find out what socket this is and lock it.
3176 sock = (isc_socket_t *)ev->ev_sender;
3177 INSIST(VALID_SOCKET(sock));
3180 socket_log(sock, NULL, IOEVENT,
3181 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALRECV,
3182 "internal_fdwatch_read: task %p got event %p", me, ev);
3184 INSIST(sock->pending_recv == 1);
3186 UNLOCK(&sock->lock);
3187 more_data = (sock->fdwatchcb)(me, sock, sock->fdwatcharg);
3190 sock->pending_recv = 0;
3192 INSIST(sock->references > 0);
3193 sock->references--; /* the internal event is done with this socket */
3194 if (sock->references == 0) {
3195 UNLOCK(&sock->lock);
3201 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
3203 UNLOCK(&sock->lock);
3207 * Process read/writes on each fd here. Avoid locking
3208 * and unlocking twice if both reads and writes are possible.
3211 process_fd(isc_socketmgr_t *manager, int fd, isc_boolean_t readable,
3212 isc_boolean_t writeable)
3215 isc_boolean_t unlock_sock;
3216 isc_boolean_t unwatch_read = ISC_FALSE, unwatch_write = ISC_FALSE;
3217 int lockid = FDLOCK_ID(fd);
3220 * If the socket is going to be closed, don't do more I/O.
3222 LOCK(&manager->fdlock[lockid]);
3223 if (manager->fdstate[fd] == CLOSE_PENDING) {
3224 UNLOCK(&manager->fdlock[lockid]);
3226 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
3227 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
3231 sock = manager->fds[fd];
3232 unlock_sock = ISC_FALSE;
3235 unwatch_read = ISC_TRUE;
3238 unlock_sock = ISC_TRUE;
3240 if (!SOCK_DEAD(sock)) {
3242 dispatch_accept(sock);
3244 dispatch_recv(sock);
3246 unwatch_read = ISC_TRUE;
3251 unwatch_write = ISC_TRUE;
3255 unlock_sock = ISC_TRUE;
3258 if (!SOCK_DEAD(sock)) {
3259 if (sock->connecting)
3260 dispatch_connect(sock);
3262 dispatch_send(sock);
3264 unwatch_write = ISC_TRUE;
3267 UNLOCK(&sock->lock);
3270 UNLOCK(&manager->fdlock[lockid]);
3272 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
3274 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
3279 static isc_boolean_t
3280 process_fds(isc_socketmgr_t *manager, struct kevent *events, int nevents) {
3282 isc_boolean_t readable, writable;
3283 isc_boolean_t done = ISC_FALSE;
3284 #ifdef ISC_PLATFORM_USETHREADS
3285 isc_boolean_t have_ctlevent = ISC_FALSE;
3288 if (nevents == manager->nevents) {
3290 * This is not an error, but something unexpected. If this
3291 * happens, it may indicate the need for increasing
3292 * ISC_SOCKET_MAXEVENTS.
3294 manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3295 ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3296 "maximum number of FD events (%d) received",
3300 for (i = 0; i < nevents; i++) {
3301 REQUIRE(events[i].ident < manager->maxsocks);
3302 #ifdef ISC_PLATFORM_USETHREADS
3303 if (events[i].ident == (uintptr_t)manager->pipe_fds[0]) {
3304 have_ctlevent = ISC_TRUE;
3308 readable = ISC_TF(events[i].filter == EVFILT_READ);
3309 writable = ISC_TF(events[i].filter == EVFILT_WRITE);
3310 process_fd(manager, events[i].ident, readable, writable);
3313 #ifdef ISC_PLATFORM_USETHREADS
3315 done = process_ctlfd(manager);
3320 #elif defined(USE_EPOLL)
3321 static isc_boolean_t
3322 process_fds(isc_socketmgr_t *manager, struct epoll_event *events, int nevents) {
3324 isc_boolean_t done = ISC_FALSE;
3325 #ifdef ISC_PLATFORM_USETHREADS
3326 isc_boolean_t have_ctlevent = ISC_FALSE;
3329 if (nevents == manager->nevents) {
3330 manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3331 ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3332 "maximum number of FD events (%d) received",
3336 for (i = 0; i < nevents; i++) {
3337 REQUIRE(events[i].data.fd < (int)manager->maxsocks);
3338 #ifdef ISC_PLATFORM_USETHREADS
3339 if (events[i].data.fd == manager->pipe_fds[0]) {
3340 have_ctlevent = ISC_TRUE;
3344 if ((events[i].events & EPOLLERR) != 0 ||
3345 (events[i].events & EPOLLHUP) != 0) {
3347 * epoll does not set IN/OUT bits on an erroneous
3348 * condition, so we need to try both anyway. This is a
3349 * bit inefficient, but should be okay for such rare
3350 * events. Note also that the read or write attempt
3351 * won't block because we use non-blocking sockets.
3353 events[i].events |= (EPOLLIN | EPOLLOUT);
3355 process_fd(manager, events[i].data.fd,
3356 (events[i].events & EPOLLIN) != 0,
3357 (events[i].events & EPOLLOUT) != 0);
3360 #ifdef ISC_PLATFORM_USETHREADS
3362 done = process_ctlfd(manager);
3367 #elif defined(USE_DEVPOLL)
3368 static isc_boolean_t
3369 process_fds(isc_socketmgr_t *manager, struct pollfd *events, int nevents) {
3371 isc_boolean_t done = ISC_FALSE;
3372 #ifdef ISC_PLATFORM_USETHREADS
3373 isc_boolean_t have_ctlevent = ISC_FALSE;
3376 if (nevents == manager->nevents) {
3377 manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3378 ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3379 "maximum number of FD events (%d) received",
3383 for (i = 0; i < nevents; i++) {
3384 REQUIRE(events[i].fd < (int)manager->maxsocks);
3385 #ifdef ISC_PLATFORM_USETHREADS
3386 if (events[i].fd == manager->pipe_fds[0]) {
3387 have_ctlevent = ISC_TRUE;
3391 process_fd(manager, events[i].fd,
3392 (events[i].events & POLLIN) != 0,
3393 (events[i].events & POLLOUT) != 0);
3396 #ifdef ISC_PLATFORM_USETHREADS
3398 done = process_ctlfd(manager);
3403 #elif defined(USE_SELECT)
3405 process_fds(isc_socketmgr_t *manager, int maxfd,
3406 fd_set *readfds, fd_set *writefds)
3410 REQUIRE(maxfd <= (int)manager->maxsocks);
3412 for (i = 0; i < maxfd; i++) {
3413 #ifdef ISC_PLATFORM_USETHREADS
3414 if (i == manager->pipe_fds[0] || i == manager->pipe_fds[1])
3416 #endif /* ISC_PLATFORM_USETHREADS */
3417 process_fd(manager, i, FD_ISSET(i, readfds),
3418 FD_ISSET(i, writefds));
3423 #ifdef ISC_PLATFORM_USETHREADS
3424 static isc_boolean_t
3425 process_ctlfd(isc_socketmgr_t *manager) {
3429 select_readmsg(manager, &fd, &msg);
3431 manager_log(manager, IOEVENT,
3432 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
3434 "watcher got message %d "
3435 "for socket %d"), msg, fd);
3440 if (msg == SELECT_POKE_NOTHING)
3444 * Handle shutdown message. We really should
3445 * jump out of this loop right away, but
3446 * it doesn't matter if we have to do a little
3449 if (msg == SELECT_POKE_SHUTDOWN)
3453 * This is a wakeup on a socket. Look
3454 * at the event queue for both read and write,
3455 * and decide if we need to watch on it now
3458 wakeup_socket(manager, fd, msg);
3465 * This is the thread that will loop forever, always in a select or poll
3468 * When select returns something to do, track down what thread gets to do
3469 * this I/O and post the event to it.
3471 static isc_threadresult_t
3472 watcher(void *uap) {
3473 isc_socketmgr_t *manager = uap;
3478 const char *fnname = "kevent()";
3479 #elif defined (USE_EPOLL)
3480 const char *fnname = "epoll_wait()";
3481 #elif defined(USE_DEVPOLL)
3482 const char *fnname = "ioctl(DP_POLL)";
3484 #elif defined (USE_SELECT)
3485 const char *fnname = "select()";
3488 char strbuf[ISC_STRERRORSIZE];
3489 #ifdef ISC_SOCKET_USE_POLLWATCH
3490 pollstate_t pollstate = poll_idle;
3494 * Get the control fd here. This will never change.
3496 ctlfd = manager->pipe_fds[0];
3501 cc = kevent(manager->kqueue_fd, NULL, 0,
3502 manager->events, manager->nevents, NULL);
3503 #elif defined(USE_EPOLL)
3504 cc = epoll_wait(manager->epoll_fd, manager->events,
3505 manager->nevents, -1);
3506 #elif defined(USE_DEVPOLL)
3507 dvp.dp_fds = manager->events;
3508 dvp.dp_nfds = manager->nevents;
3509 #ifndef ISC_SOCKET_USE_POLLWATCH
3510 dvp.dp_timeout = -1;
3512 if (pollstate == poll_idle)
3513 dvp.dp_timeout = -1;
3515 dvp.dp_timeout = ISC_SOCKET_POLLWATCH_TIMEOUT;
3516 #endif /* ISC_SOCKET_USE_POLLWATCH */
3517 cc = ioctl(manager->devpoll_fd, DP_POLL, &dvp);
3518 #elif defined(USE_SELECT)
3519 LOCK(&manager->lock);
3520 memcpy(manager->read_fds_copy, manager->read_fds,
3521 manager->fd_bufsize);
3522 memcpy(manager->write_fds_copy, manager->write_fds,
3523 manager->fd_bufsize);
3524 maxfd = manager->maxfd + 1;
3525 UNLOCK(&manager->lock);
3527 cc = select(maxfd, manager->read_fds_copy,
3528 manager->write_fds_copy, NULL, NULL);
3529 #endif /* USE_KQUEUE */
3531 if (cc < 0 && !SOFT_ERROR(errno)) {
3532 isc__strerror(errno, strbuf, sizeof(strbuf));
3533 FATAL_ERROR(__FILE__, __LINE__,
3534 "%s %s: %s", fnname,
3535 isc_msgcat_get(isc_msgcat,
3541 #if defined(USE_DEVPOLL) && defined(ISC_SOCKET_USE_POLLWATCH)
3543 if (pollstate == poll_active)
3544 pollstate = poll_checking;
3545 else if (pollstate == poll_checking)
3546 pollstate = poll_idle;
3547 } else if (cc > 0) {
3548 if (pollstate == poll_checking) {
3550 * XXX: We'd like to use a more
3551 * verbose log level as it's actually an
3552 * unexpected event, but the kernel bug
3553 * reportedly happens pretty frequently
3554 * (and it can also be a false positive)
3555 * so it would be just too noisy.
3557 manager_log(manager,
3558 ISC_LOGCATEGORY_GENERAL,
3559 ISC_LOGMODULE_SOCKET,
3561 "unexpected POLL timeout");
3563 pollstate = poll_active;
3568 #if defined(USE_KQUEUE) || defined (USE_EPOLL) || defined (USE_DEVPOLL)
3569 done = process_fds(manager, manager->events, cc);
3570 #elif defined(USE_SELECT)
3571 process_fds(manager, maxfd, manager->read_fds_copy,
3572 manager->write_fds_copy);
3575 * Process reads on internal, control fd.
3577 if (FD_ISSET(ctlfd, manager->read_fds_copy))
3578 done = process_ctlfd(manager);
3582 manager_log(manager, TRACE, "%s",
3583 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3584 ISC_MSG_EXITING, "watcher exiting"));
3586 return ((isc_threadresult_t)0);
3588 #endif /* ISC_PLATFORM_USETHREADS */
3591 isc__socketmgr_setreserved(isc_socketmgr_t *manager, isc_uint32_t reserved) {
3593 REQUIRE(VALID_MANAGER(manager));
3595 manager->reserved = reserved;
3599 * Create a new socket manager.
3603 setup_watcher(isc_mem_t *mctx, isc_socketmgr_t *manager) {
3604 isc_result_t result;
3605 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
3606 char strbuf[ISC_STRERRORSIZE];
3610 manager->nevents = ISC_SOCKET_MAXEVENTS;
3611 manager->events = isc_mem_get(mctx, sizeof(struct kevent) *
3613 if (manager->events == NULL)
3614 return (ISC_R_NOMEMORY);
3615 manager->kqueue_fd = kqueue();
3616 if (manager->kqueue_fd == -1) {
3617 result = isc__errno2result(errno);
3618 isc__strerror(errno, strbuf, sizeof(strbuf));
3619 UNEXPECTED_ERROR(__FILE__, __LINE__,
3621 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3622 ISC_MSG_FAILED, "failed"),
3624 isc_mem_put(mctx, manager->events,
3625 sizeof(struct kevent) * manager->nevents);
3629 #ifdef ISC_PLATFORM_USETHREADS
3630 result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3631 if (result != ISC_R_SUCCESS) {
3632 close(manager->kqueue_fd);
3633 isc_mem_put(mctx, manager->events,
3634 sizeof(struct kevent) * manager->nevents);
3637 #endif /* ISC_PLATFORM_USETHREADS */
3638 #elif defined(USE_EPOLL)
3639 manager->nevents = ISC_SOCKET_MAXEVENTS;
3640 manager->events = isc_mem_get(mctx, sizeof(struct epoll_event) *
3642 if (manager->events == NULL)
3643 return (ISC_R_NOMEMORY);
3644 manager->epoll_fd = epoll_create(manager->nevents);
3645 if (manager->epoll_fd == -1) {
3646 result = isc__errno2result(errno);
3647 isc__strerror(errno, strbuf, sizeof(strbuf));
3648 UNEXPECTED_ERROR(__FILE__, __LINE__,
3649 "epoll_create %s: %s",
3650 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3651 ISC_MSG_FAILED, "failed"),
3653 isc_mem_put(mctx, manager->events,
3654 sizeof(struct epoll_event) * manager->nevents);
3657 #ifdef ISC_PLATFORM_USETHREADS
3658 result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3659 if (result != ISC_R_SUCCESS) {
3660 close(manager->epoll_fd);
3661 isc_mem_put(mctx, manager->events,
3662 sizeof(struct epoll_event) * manager->nevents);
3665 #endif /* ISC_PLATFORM_USETHREADS */
3666 #elif defined(USE_DEVPOLL)
3668 * XXXJT: /dev/poll seems to reject large numbers of events,
3669 * so we should be careful about redefining ISC_SOCKET_MAXEVENTS.
3671 manager->nevents = ISC_SOCKET_MAXEVENTS;
3672 manager->events = isc_mem_get(mctx, sizeof(struct pollfd) *
3674 if (manager->events == NULL)
3675 return (ISC_R_NOMEMORY);
3677 * Note: fdpollinfo should be able to support all possible FDs, so
3678 * it must have maxsocks entries (not nevents).
3680 manager->fdpollinfo = isc_mem_get(mctx, sizeof(pollinfo_t) *
3682 if (manager->fdpollinfo == NULL) {
3683 isc_mem_put(mctx, manager->events,
3684 sizeof(struct pollfd) * manager->nevents);
3685 return (ISC_R_NOMEMORY);
3687 memset(manager->fdpollinfo, 0, sizeof(pollinfo_t) * manager->maxsocks);
3688 manager->devpoll_fd = open("/dev/poll", O_RDWR);
3689 if (manager->devpoll_fd == -1) {
3690 result = isc__errno2result(errno);
3691 isc__strerror(errno, strbuf, sizeof(strbuf));
3692 UNEXPECTED_ERROR(__FILE__, __LINE__,
3693 "open(/dev/poll) %s: %s",
3694 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3695 ISC_MSG_FAILED, "failed"),
3697 isc_mem_put(mctx, manager->events,
3698 sizeof(struct pollfd) * manager->nevents);
3699 isc_mem_put(mctx, manager->fdpollinfo,
3700 sizeof(pollinfo_t) * manager->maxsocks);
3703 #ifdef ISC_PLATFORM_USETHREADS
3704 result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3705 if (result != ISC_R_SUCCESS) {
3706 close(manager->devpoll_fd);
3707 isc_mem_put(mctx, manager->events,
3708 sizeof(struct pollfd) * manager->nevents);
3709 isc_mem_put(mctx, manager->fdpollinfo,
3710 sizeof(pollinfo_t) * manager->maxsocks);
3713 #endif /* ISC_PLATFORM_USETHREADS */
3714 #elif defined(USE_SELECT)
3717 #if ISC_SOCKET_MAXSOCKETS > FD_SETSIZE
3719 * Note: this code should also cover the case of MAXSOCKETS <=
3720 * FD_SETSIZE, but we separate the cases to avoid possible portability
3721 * issues regarding howmany() and the actual representation of fd_set.
3723 manager->fd_bufsize = howmany(manager->maxsocks, NFDBITS) *
3726 manager->fd_bufsize = sizeof(fd_set);
3729 manager->read_fds = NULL;
3730 manager->read_fds_copy = NULL;
3731 manager->write_fds = NULL;
3732 manager->write_fds_copy = NULL;
3734 manager->read_fds = isc_mem_get(mctx, manager->fd_bufsize);
3735 if (manager->read_fds != NULL)
3736 manager->read_fds_copy = isc_mem_get(mctx, manager->fd_bufsize);
3737 if (manager->read_fds_copy != NULL)
3738 manager->write_fds = isc_mem_get(mctx, manager->fd_bufsize);
3739 if (manager->write_fds != NULL) {
3740 manager->write_fds_copy = isc_mem_get(mctx,
3741 manager->fd_bufsize);
3743 if (manager->write_fds_copy == NULL) {
3744 if (manager->write_fds != NULL) {
3745 isc_mem_put(mctx, manager->write_fds,
3746 manager->fd_bufsize);
3748 if (manager->read_fds_copy != NULL) {
3749 isc_mem_put(mctx, manager->read_fds_copy,
3750 manager->fd_bufsize);
3752 if (manager->read_fds != NULL) {
3753 isc_mem_put(mctx, manager->read_fds,
3754 manager->fd_bufsize);
3756 return (ISC_R_NOMEMORY);
3758 memset(manager->read_fds, 0, manager->fd_bufsize);
3759 memset(manager->write_fds, 0, manager->fd_bufsize);
3761 #ifdef ISC_PLATFORM_USETHREADS
3762 (void)watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3763 manager->maxfd = manager->pipe_fds[0];
3764 #else /* ISC_PLATFORM_USETHREADS */
3766 #endif /* ISC_PLATFORM_USETHREADS */
3767 #endif /* USE_KQUEUE */
3769 return (ISC_R_SUCCESS);
3773 cleanup_watcher(isc_mem_t *mctx, isc_socketmgr_t *manager) {
3774 #ifdef ISC_PLATFORM_USETHREADS
3775 isc_result_t result;
3777 result = unwatch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3778 if (result != ISC_R_SUCCESS) {
3779 UNEXPECTED_ERROR(__FILE__, __LINE__,
3780 "epoll_ctl(DEL) %s",
3781 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3782 ISC_MSG_FAILED, "failed"));
3784 #endif /* ISC_PLATFORM_USETHREADS */
3787 close(manager->kqueue_fd);
3788 isc_mem_put(mctx, manager->events,
3789 sizeof(struct kevent) * manager->nevents);
3790 #elif defined(USE_EPOLL)
3791 close(manager->epoll_fd);
3792 isc_mem_put(mctx, manager->events,
3793 sizeof(struct epoll_event) * manager->nevents);
3794 #elif defined(USE_DEVPOLL)
3795 close(manager->devpoll_fd);
3796 isc_mem_put(mctx, manager->events,
3797 sizeof(struct pollfd) * manager->nevents);
3798 isc_mem_put(mctx, manager->fdpollinfo,
3799 sizeof(pollinfo_t) * manager->maxsocks);
3800 #elif defined(USE_SELECT)
3801 if (manager->read_fds != NULL)
3802 isc_mem_put(mctx, manager->read_fds, manager->fd_bufsize);
3803 if (manager->read_fds_copy != NULL)
3804 isc_mem_put(mctx, manager->read_fds_copy, manager->fd_bufsize);
3805 if (manager->write_fds != NULL)
3806 isc_mem_put(mctx, manager->write_fds, manager->fd_bufsize);
3807 if (manager->write_fds_copy != NULL)
3808 isc_mem_put(mctx, manager->write_fds_copy, manager->fd_bufsize);
3809 #endif /* USE_KQUEUE */
3813 isc_socketmgr_create(isc_mem_t *mctx, isc_socketmgr_t **managerp) {
3814 return (isc_socketmgr_create2(mctx, managerp, 0));
3818 isc_socketmgr_create2(isc_mem_t *mctx, isc_socketmgr_t **managerp,
3819 unsigned int maxsocks)
3822 isc_socketmgr_t *manager;
3823 #ifdef ISC_PLATFORM_USETHREADS
3824 char strbuf[ISC_STRERRORSIZE];
3826 isc_result_t result;
3828 REQUIRE(managerp != NULL && *managerp == NULL);
3830 #ifndef ISC_PLATFORM_USETHREADS
3831 if (socketmgr != NULL) {
3832 /* Don't allow maxsocks to be updated */
3833 if (maxsocks > 0 && socketmgr->maxsocks != maxsocks)
3834 return (ISC_R_EXISTS);
3837 *managerp = socketmgr;
3838 return (ISC_R_SUCCESS);
3840 #endif /* ISC_PLATFORM_USETHREADS */
3843 maxsocks = ISC_SOCKET_MAXSOCKETS;
3845 manager = isc_mem_get(mctx, sizeof(*manager));
3846 if (manager == NULL)
3847 return (ISC_R_NOMEMORY);
3849 /* zero-clear so that necessary cleanup on failure will be easy */
3850 memset(manager, 0, sizeof(*manager));
3851 manager->maxsocks = maxsocks;
3852 manager->reserved = 0;
3853 manager->fds = isc_mem_get(mctx,
3854 manager->maxsocks * sizeof(isc_socket_t *));
3855 if (manager->fds == NULL) {
3856 result = ISC_R_NOMEMORY;
3859 manager->fdstate = isc_mem_get(mctx, manager->maxsocks * sizeof(int));
3860 if (manager->fdstate == NULL) {
3861 result = ISC_R_NOMEMORY;
3864 manager->stats = NULL;
3866 manager->magic = SOCKET_MANAGER_MAGIC;
3867 manager->mctx = NULL;
3868 memset(manager->fds, 0, manager->maxsocks * sizeof(isc_socket_t *));
3869 ISC_LIST_INIT(manager->socklist);
3870 result = isc_mutex_init(&manager->lock);
3871 if (result != ISC_R_SUCCESS)
3873 manager->fdlock = isc_mem_get(mctx, FDLOCK_COUNT * sizeof(isc_mutex_t));
3874 if (manager->fdlock == NULL) {
3875 result = ISC_R_NOMEMORY;
3878 for (i = 0; i < FDLOCK_COUNT; i++) {
3879 result = isc_mutex_init(&manager->fdlock[i]);
3880 if (result != ISC_R_SUCCESS) {
3882 DESTROYLOCK(&manager->fdlock[i]);
3883 isc_mem_put(mctx, manager->fdlock,
3884 FDLOCK_COUNT * sizeof(isc_mutex_t));
3885 manager->fdlock = NULL;
3890 #ifdef ISC_PLATFORM_USETHREADS
3891 if (isc_condition_init(&manager->shutdown_ok) != ISC_R_SUCCESS) {
3892 UNEXPECTED_ERROR(__FILE__, __LINE__,
3893 "isc_condition_init() %s",
3894 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3895 ISC_MSG_FAILED, "failed"));
3896 result = ISC_R_UNEXPECTED;
3901 * Create the special fds that will be used to wake up the
3902 * select/poll loop when something internal needs to be done.
3904 if (pipe(manager->pipe_fds) != 0) {
3905 isc__strerror(errno, strbuf, sizeof(strbuf));
3906 UNEXPECTED_ERROR(__FILE__, __LINE__,
3908 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3909 ISC_MSG_FAILED, "failed"),
3911 result = ISC_R_UNEXPECTED;
3912 goto cleanup_condition;
3915 RUNTIME_CHECK(make_nonblock(manager->pipe_fds[0]) == ISC_R_SUCCESS);
3917 RUNTIME_CHECK(make_nonblock(manager->pipe_fds[1]) == ISC_R_SUCCESS);
3919 #else /* ISC_PLATFORM_USETHREADS */
3921 #endif /* ISC_PLATFORM_USETHREADS */
3924 * Set up initial state for the select loop
3926 result = setup_watcher(mctx, manager);
3927 if (result != ISC_R_SUCCESS)
3929 memset(manager->fdstate, 0, manager->maxsocks * sizeof(int));
3930 #ifdef ISC_PLATFORM_USETHREADS
3932 * Start up the select/poll thread.
3934 if (isc_thread_create(watcher, manager, &manager->watcher) !=
3936 UNEXPECTED_ERROR(__FILE__, __LINE__,
3937 "isc_thread_create() %s",
3938 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3939 ISC_MSG_FAILED, "failed"));
3940 cleanup_watcher(mctx, manager);
3941 result = ISC_R_UNEXPECTED;
3944 #endif /* ISC_PLATFORM_USETHREADS */
3945 isc_mem_attach(mctx, &manager->mctx);
3947 #ifndef ISC_PLATFORM_USETHREADS
3948 socketmgr = manager;
3949 #endif /* ISC_PLATFORM_USETHREADS */
3950 *managerp = manager;
3952 return (ISC_R_SUCCESS);
3955 #ifdef ISC_PLATFORM_USETHREADS
3956 (void)close(manager->pipe_fds[0]);
3957 (void)close(manager->pipe_fds[1]);
3958 #endif /* ISC_PLATFORM_USETHREADS */
3960 #ifdef ISC_PLATFORM_USETHREADS
3962 (void)isc_condition_destroy(&manager->shutdown_ok);
3963 #endif /* ISC_PLATFORM_USETHREADS */
3967 if (manager->fdlock != NULL) {
3968 for (i = 0; i < FDLOCK_COUNT; i++)
3969 DESTROYLOCK(&manager->fdlock[i]);
3971 DESTROYLOCK(&manager->lock);
3974 if (manager->fdlock != NULL) {
3975 isc_mem_put(mctx, manager->fdlock,
3976 FDLOCK_COUNT * sizeof(isc_mutex_t));
3978 if (manager->fdstate != NULL) {
3979 isc_mem_put(mctx, manager->fdstate,
3980 manager->maxsocks * sizeof(int));
3982 if (manager->fds != NULL) {
3983 isc_mem_put(mctx, manager->fds,
3984 manager->maxsocks * sizeof(isc_socket_t *));
3986 isc_mem_put(mctx, manager, sizeof(*manager));
3992 isc_socketmgr_getmaxsockets(isc_socketmgr_t *manager, unsigned int *nsockp) {
3993 REQUIRE(VALID_MANAGER(manager));
3994 REQUIRE(nsockp != NULL);
3996 *nsockp = manager->maxsocks;
3998 return (ISC_R_SUCCESS);
4002 isc_socketmgr_setstats(isc_socketmgr_t *manager, isc_stats_t *stats) {
4003 REQUIRE(VALID_MANAGER(manager));
4004 REQUIRE(ISC_LIST_EMPTY(manager->socklist));
4005 REQUIRE(manager->stats == NULL);
4006 REQUIRE(isc_stats_ncounters(stats) == isc_sockstatscounter_max);
4008 isc_stats_attach(stats, &manager->stats);
4012 isc_socketmgr_destroy(isc_socketmgr_t **managerp) {
4013 isc_socketmgr_t *manager;
4018 * Destroy a socket manager.
4021 REQUIRE(managerp != NULL);
4022 manager = *managerp;
4023 REQUIRE(VALID_MANAGER(manager));
4025 #ifndef ISC_PLATFORM_USETHREADS
4026 if (manager->refs > 1) {
4031 #endif /* ISC_PLATFORM_USETHREADS */
4033 LOCK(&manager->lock);
4035 #ifdef ISC_PLATFORM_USETHREADS
4037 * Wait for all sockets to be destroyed.
4039 while (!ISC_LIST_EMPTY(manager->socklist)) {
4040 manager_log(manager, CREATION, "%s",
4041 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
4042 ISC_MSG_SOCKETSREMAIN,
4044 WAIT(&manager->shutdown_ok, &manager->lock);
4046 #else /* ISC_PLATFORM_USETHREADS */
4048 * Hope all sockets have been destroyed.
4050 if (!ISC_LIST_EMPTY(manager->socklist)) {
4051 manager_log(manager, CREATION, "%s",
4052 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
4053 ISC_MSG_SOCKETSREMAIN,
4057 #endif /* ISC_PLATFORM_USETHREADS */
4059 UNLOCK(&manager->lock);
4062 * Here, poke our select/poll thread. Do this by closing the write
4063 * half of the pipe, which will send EOF to the read half.
4064 * This is currently a no-op in the non-threaded case.
4066 select_poke(manager, 0, SELECT_POKE_SHUTDOWN);
4068 #ifdef ISC_PLATFORM_USETHREADS
4070 * Wait for thread to exit.
4072 if (isc_thread_join(manager->watcher, NULL) != ISC_R_SUCCESS)
4073 UNEXPECTED_ERROR(__FILE__, __LINE__,
4074 "isc_thread_join() %s",
4075 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4076 ISC_MSG_FAILED, "failed"));
4077 #endif /* ISC_PLATFORM_USETHREADS */
4082 cleanup_watcher(manager->mctx, manager);
4084 #ifdef ISC_PLATFORM_USETHREADS
4085 (void)close(manager->pipe_fds[0]);
4086 (void)close(manager->pipe_fds[1]);
4087 (void)isc_condition_destroy(&manager->shutdown_ok);
4088 #endif /* ISC_PLATFORM_USETHREADS */
4090 for (i = 0; i < (int)manager->maxsocks; i++)
4091 if (manager->fdstate[i] == CLOSE_PENDING) /* no need to lock */
4094 isc_mem_put(manager->mctx, manager->fds,
4095 manager->maxsocks * sizeof(isc_socket_t *));
4096 isc_mem_put(manager->mctx, manager->fdstate,
4097 manager->maxsocks * sizeof(int));
4099 if (manager->stats != NULL)
4100 isc_stats_detach(&manager->stats);
4102 if (manager->fdlock != NULL) {
4103 for (i = 0; i < FDLOCK_COUNT; i++)
4104 DESTROYLOCK(&manager->fdlock[i]);
4105 isc_mem_put(manager->mctx, manager->fdlock,
4106 FDLOCK_COUNT * sizeof(isc_mutex_t));
4108 DESTROYLOCK(&manager->lock);
4110 mctx= manager->mctx;
4111 isc_mem_put(mctx, manager, sizeof(*manager));
4113 isc_mem_detach(&mctx);
4119 socket_recv(isc_socket_t *sock, isc_socketevent_t *dev, isc_task_t *task,
4123 isc_boolean_t have_lock = ISC_FALSE;
4124 isc_task_t *ntask = NULL;
4125 isc_result_t result = ISC_R_SUCCESS;
4127 dev->ev_sender = task;
4129 if (sock->type == isc_sockettype_udp) {
4130 io_state = doio_recv(sock, dev);
4133 have_lock = ISC_TRUE;
4135 if (ISC_LIST_EMPTY(sock->recv_list))
4136 io_state = doio_recv(sock, dev);
4138 io_state = DOIO_SOFT;
4144 * We couldn't read all or part of the request right now, so
4147 * Attach to socket and to task
4149 isc_task_attach(task, &ntask);
4150 dev->attributes |= ISC_SOCKEVENTATTR_ATTACHED;
4154 have_lock = ISC_TRUE;
4158 * Enqueue the request. If the socket was previously not being
4159 * watched, poke the watcher to start paying attention to it.
4161 if (ISC_LIST_EMPTY(sock->recv_list) && !sock->pending_recv)
4162 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
4163 ISC_LIST_ENQUEUE(sock->recv_list, dev, ev_link);
4165 socket_log(sock, NULL, EVENT, NULL, 0, 0,
4166 "socket_recv: event %p -> task %p",
4169 if ((flags & ISC_SOCKFLAG_IMMEDIATE) != 0)
4170 result = ISC_R_INPROGRESS;
4174 dev->result = ISC_R_EOF;
4179 if ((flags & ISC_SOCKFLAG_IMMEDIATE) == 0)
4180 send_recvdone_event(sock, &dev);
4185 UNLOCK(&sock->lock);
4191 isc_socket_recvv(isc_socket_t *sock, isc_bufferlist_t *buflist,
4192 unsigned int minimum, isc_task_t *task,
4193 isc_taskaction_t action, const void *arg)
4195 isc_socketevent_t *dev;
4196 isc_socketmgr_t *manager;
4197 unsigned int iocount;
4198 isc_buffer_t *buffer;
4200 REQUIRE(VALID_SOCKET(sock));
4201 REQUIRE(buflist != NULL);
4202 REQUIRE(!ISC_LIST_EMPTY(*buflist));
4203 REQUIRE(task != NULL);
4204 REQUIRE(action != NULL);
4206 manager = sock->manager;
4207 REQUIRE(VALID_MANAGER(manager));
4209 iocount = isc_bufferlist_availablecount(buflist);
4210 REQUIRE(iocount > 0);
4212 INSIST(sock->bound);
4214 dev = allocate_socketevent(sock, ISC_SOCKEVENT_RECVDONE, action, arg);
4216 return (ISC_R_NOMEMORY);
4220 * UDP sockets are always partial read
4222 if (sock->type == isc_sockettype_udp)
4226 dev->minimum = iocount;
4228 dev->minimum = minimum;
4232 * Move each buffer from the passed in list to our internal one.
4234 buffer = ISC_LIST_HEAD(*buflist);
4235 while (buffer != NULL) {
4236 ISC_LIST_DEQUEUE(*buflist, buffer, link);
4237 ISC_LIST_ENQUEUE(dev->bufferlist, buffer, link);
4238 buffer = ISC_LIST_HEAD(*buflist);
4241 return (socket_recv(sock, dev, task, 0));
4245 isc_socket_recv(isc_socket_t *sock, isc_region_t *region, unsigned int minimum,
4246 isc_task_t *task, isc_taskaction_t action, const void *arg)
4248 isc_socketevent_t *dev;
4249 isc_socketmgr_t *manager;
4251 REQUIRE(VALID_SOCKET(sock));
4252 REQUIRE(action != NULL);
4254 manager = sock->manager;
4255 REQUIRE(VALID_MANAGER(manager));
4257 INSIST(sock->bound);
4259 dev = allocate_socketevent(sock, ISC_SOCKEVENT_RECVDONE, action, arg);
4261 return (ISC_R_NOMEMORY);
4263 return (isc_socket_recv2(sock, region, minimum, task, dev, 0));
4267 isc_socket_recv2(isc_socket_t *sock, isc_region_t *region,
4268 unsigned int minimum, isc_task_t *task,
4269 isc_socketevent_t *event, unsigned int flags)
4271 event->ev_sender = sock;
4272 event->result = ISC_R_UNEXPECTED;
4273 ISC_LIST_INIT(event->bufferlist);
4274 event->region = *region;
4277 event->attributes = 0;
4280 * UDP sockets are always partial read.
4282 if (sock->type == isc_sockettype_udp)
4286 event->minimum = region->length;
4288 event->minimum = minimum;
4291 return (socket_recv(sock, event, task, flags));
4295 socket_send(isc_socket_t *sock, isc_socketevent_t *dev, isc_task_t *task,
4296 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo,
4300 isc_boolean_t have_lock = ISC_FALSE;
4301 isc_task_t *ntask = NULL;
4302 isc_result_t result = ISC_R_SUCCESS;
4304 dev->ev_sender = task;
4306 set_dev_address(address, sock, dev);
4307 if (pktinfo != NULL) {
4308 dev->attributes |= ISC_SOCKEVENTATTR_PKTINFO;
4309 dev->pktinfo = *pktinfo;
4311 if (!isc_sockaddr_issitelocal(&dev->address) &&
4312 !isc_sockaddr_islinklocal(&dev->address)) {
4313 socket_log(sock, NULL, TRACE, isc_msgcat,
4314 ISC_MSGSET_SOCKET, ISC_MSG_PKTINFOPROVIDED,
4315 "pktinfo structure provided, ifindex %u "
4316 "(set to 0)", pktinfo->ipi6_ifindex);
4319 * Set the pktinfo index to 0 here, to let the
4320 * kernel decide what interface it should send on.
4322 dev->pktinfo.ipi6_ifindex = 0;
4326 if (sock->type == isc_sockettype_udp)
4327 io_state = doio_send(sock, dev);
4330 have_lock = ISC_TRUE;
4332 if (ISC_LIST_EMPTY(sock->send_list))
4333 io_state = doio_send(sock, dev);
4335 io_state = DOIO_SOFT;
4341 * We couldn't send all or part of the request right now, so
4342 * queue it unless ISC_SOCKFLAG_NORETRY is set.
4344 if ((flags & ISC_SOCKFLAG_NORETRY) == 0) {
4345 isc_task_attach(task, &ntask);
4346 dev->attributes |= ISC_SOCKEVENTATTR_ATTACHED;
4350 have_lock = ISC_TRUE;
4354 * Enqueue the request. If the socket was previously
4355 * not being watched, poke the watcher to start
4356 * paying attention to it.
4358 if (ISC_LIST_EMPTY(sock->send_list) &&
4359 !sock->pending_send)
4360 select_poke(sock->manager, sock->fd,
4362 ISC_LIST_ENQUEUE(sock->send_list, dev, ev_link);
4364 socket_log(sock, NULL, EVENT, NULL, 0, 0,
4365 "socket_send: event %p -> task %p",
4368 if ((flags & ISC_SOCKFLAG_IMMEDIATE) != 0)
4369 result = ISC_R_INPROGRESS;
4375 if ((flags & ISC_SOCKFLAG_IMMEDIATE) == 0)
4376 send_senddone_event(sock, &dev);
4381 UNLOCK(&sock->lock);
4387 isc_socket_send(isc_socket_t *sock, isc_region_t *region,
4388 isc_task_t *task, isc_taskaction_t action, const void *arg)
4391 * REQUIRE() checking is performed in isc_socket_sendto().
4393 return (isc_socket_sendto(sock, region, task, action, arg, NULL,
4398 isc_socket_sendto(isc_socket_t *sock, isc_region_t *region,
4399 isc_task_t *task, isc_taskaction_t action, const void *arg,
4400 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo)
4402 isc_socketevent_t *dev;
4403 isc_socketmgr_t *manager;
4405 REQUIRE(VALID_SOCKET(sock));
4406 REQUIRE(region != NULL);
4407 REQUIRE(task != NULL);
4408 REQUIRE(action != NULL);
4410 manager = sock->manager;
4411 REQUIRE(VALID_MANAGER(manager));
4413 INSIST(sock->bound);
4415 dev = allocate_socketevent(sock, ISC_SOCKEVENT_SENDDONE, action, arg);
4417 return (ISC_R_NOMEMORY);
4420 dev->region = *region;
4422 return (socket_send(sock, dev, task, address, pktinfo, 0));
4426 isc_socket_sendv(isc_socket_t *sock, isc_bufferlist_t *buflist,
4427 isc_task_t *task, isc_taskaction_t action, const void *arg)
4429 return (isc_socket_sendtov(sock, buflist, task, action, arg, NULL,
4434 isc_socket_sendtov(isc_socket_t *sock, isc_bufferlist_t *buflist,
4435 isc_task_t *task, isc_taskaction_t action, const void *arg,
4436 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo)
4438 isc_socketevent_t *dev;
4439 isc_socketmgr_t *manager;
4440 unsigned int iocount;
4441 isc_buffer_t *buffer;
4443 REQUIRE(VALID_SOCKET(sock));
4444 REQUIRE(buflist != NULL);
4445 REQUIRE(!ISC_LIST_EMPTY(*buflist));
4446 REQUIRE(task != NULL);
4447 REQUIRE(action != NULL);
4449 manager = sock->manager;
4450 REQUIRE(VALID_MANAGER(manager));
4452 iocount = isc_bufferlist_usedcount(buflist);
4453 REQUIRE(iocount > 0);
4455 dev = allocate_socketevent(sock, ISC_SOCKEVENT_SENDDONE, action, arg);
4457 return (ISC_R_NOMEMORY);
4461 * Move each buffer from the passed in list to our internal one.
4463 buffer = ISC_LIST_HEAD(*buflist);
4464 while (buffer != NULL) {
4465 ISC_LIST_DEQUEUE(*buflist, buffer, link);
4466 ISC_LIST_ENQUEUE(dev->bufferlist, buffer, link);
4467 buffer = ISC_LIST_HEAD(*buflist);
4470 return (socket_send(sock, dev, task, address, pktinfo, 0));
4474 isc_socket_sendto2(isc_socket_t *sock, isc_region_t *region,
4476 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo,
4477 isc_socketevent_t *event, unsigned int flags)
4479 REQUIRE((flags & ~(ISC_SOCKFLAG_IMMEDIATE|ISC_SOCKFLAG_NORETRY)) == 0);
4480 if ((flags & ISC_SOCKFLAG_NORETRY) != 0)
4481 REQUIRE(sock->type == isc_sockettype_udp);
4482 event->ev_sender = sock;
4483 event->result = ISC_R_UNEXPECTED;
4484 ISC_LIST_INIT(event->bufferlist);
4485 event->region = *region;
4488 event->attributes = 0;
4490 return (socket_send(sock, event, task, address, pktinfo, flags));
4494 isc_socket_cleanunix(isc_sockaddr_t *sockaddr, isc_boolean_t active) {
4495 #ifdef ISC_PLATFORM_HAVESYSUNH
4498 char strbuf[ISC_STRERRORSIZE];
4500 if (sockaddr->type.sa.sa_family != AF_UNIX)
4504 #if defined(S_IFMT) && defined(S_IFSOCK)
4505 #define S_ISSOCK(mode) ((mode & S_IFMT)==S_IFSOCK)
4506 #elif defined(_S_IFMT) && defined(S_IFSOCK)
4507 #define S_ISSOCK(mode) ((mode & _S_IFMT)==S_IFSOCK)
4512 #if defined(S_IFMT) && defined(S_IFIFO)
4513 #define S_ISFIFO(mode) ((mode & S_IFMT)==S_IFIFO)
4514 #elif defined(_S_IFMT) && defined(S_IFIFO)
4515 #define S_ISFIFO(mode) ((mode & _S_IFMT)==S_IFIFO)
4519 #if !defined(S_ISFIFO) && !defined(S_ISSOCK)
4520 #error You need to define S_ISFIFO and S_ISSOCK as appropriate for your platform. See <sys/stat.h>.
4524 #define S_ISFIFO(mode) 0
4528 #define S_ISSOCK(mode) 0
4532 if (stat(sockaddr->type.sunix.sun_path, &sb) < 0) {
4533 isc__strerror(errno, strbuf, sizeof(strbuf));
4534 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4535 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4536 "isc_socket_cleanunix: stat(%s): %s",
4537 sockaddr->type.sunix.sun_path, strbuf);
4540 if (!(S_ISSOCK(sb.st_mode) || S_ISFIFO(sb.st_mode))) {
4541 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4542 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4543 "isc_socket_cleanunix: %s: not a socket",
4544 sockaddr->type.sunix.sun_path);
4547 if (unlink(sockaddr->type.sunix.sun_path) < 0) {
4548 isc__strerror(errno, strbuf, sizeof(strbuf));
4549 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4550 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4551 "isc_socket_cleanunix: unlink(%s): %s",
4552 sockaddr->type.sunix.sun_path, strbuf);
4557 s = socket(AF_UNIX, SOCK_STREAM, 0);
4559 isc__strerror(errno, strbuf, sizeof(strbuf));
4560 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4561 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4562 "isc_socket_cleanunix: socket(%s): %s",
4563 sockaddr->type.sunix.sun_path, strbuf);
4567 if (stat(sockaddr->type.sunix.sun_path, &sb) < 0) {
4569 case ENOENT: /* We exited cleanly last time */
4572 isc__strerror(errno, strbuf, sizeof(strbuf));
4573 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4574 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4575 "isc_socket_cleanunix: stat(%s): %s",
4576 sockaddr->type.sunix.sun_path, strbuf);
4582 if (!(S_ISSOCK(sb.st_mode) || S_ISFIFO(sb.st_mode))) {
4583 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4584 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4585 "isc_socket_cleanunix: %s: not a socket",
4586 sockaddr->type.sunix.sun_path);
4590 if (connect(s, (struct sockaddr *)&sockaddr->type.sunix,
4591 sizeof(sockaddr->type.sunix)) < 0) {
4595 if (unlink(sockaddr->type.sunix.sun_path) < 0) {
4596 isc__strerror(errno, strbuf, sizeof(strbuf));
4597 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4598 ISC_LOGMODULE_SOCKET,
4600 "isc_socket_cleanunix: "
4602 sockaddr->type.sunix.sun_path,
4607 isc__strerror(errno, strbuf, sizeof(strbuf));
4608 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4609 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4610 "isc_socket_cleanunix: connect(%s): %s",
4611 sockaddr->type.sunix.sun_path, strbuf);
4624 isc_socket_permunix(isc_sockaddr_t *sockaddr, isc_uint32_t perm,
4625 isc_uint32_t owner, isc_uint32_t group)
4627 #ifdef ISC_PLATFORM_HAVESYSUNH
4628 isc_result_t result = ISC_R_SUCCESS;
4629 char strbuf[ISC_STRERRORSIZE];
4630 char path[sizeof(sockaddr->type.sunix.sun_path)];
4631 #ifdef NEED_SECURE_DIRECTORY
4635 REQUIRE(sockaddr->type.sa.sa_family == AF_UNIX);
4636 INSIST(strlen(sockaddr->type.sunix.sun_path) < sizeof(path));
4637 strcpy(path, sockaddr->type.sunix.sun_path);
4639 #ifdef NEED_SECURE_DIRECTORY
4640 slash = strrchr(path, '/');
4641 if (slash != NULL) {
4650 if (chmod(path, perm) < 0) {
4651 isc__strerror(errno, strbuf, sizeof(strbuf));
4652 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4653 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4654 "isc_socket_permunix: chmod(%s, %d): %s",
4655 path, perm, strbuf);
4656 result = ISC_R_FAILURE;
4658 if (chown(path, owner, group) < 0) {
4659 isc__strerror(errno, strbuf, sizeof(strbuf));
4660 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4661 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4662 "isc_socket_permunix: chown(%s, %d, %d): %s",
4665 result = ISC_R_FAILURE;
4673 return (ISC_R_NOTIMPLEMENTED);
4678 isc_socket_bind(isc_socket_t *sock, isc_sockaddr_t *sockaddr,
4679 unsigned int options) {
4680 char strbuf[ISC_STRERRORSIZE];
4685 INSIST(!sock->bound);
4687 if (sock->pf != sockaddr->type.sa.sa_family) {
4688 UNLOCK(&sock->lock);
4689 return (ISC_R_FAMILYMISMATCH);
4692 * Only set SO_REUSEADDR when we want a specific port.
4695 if (sock->pf == AF_UNIX)
4698 if ((options & ISC_SOCKET_REUSEADDRESS) != 0 &&
4699 isc_sockaddr_getport(sockaddr) != (in_port_t)0 &&
4700 setsockopt(sock->fd, SOL_SOCKET, SO_REUSEADDR, (void *)&on,
4702 UNEXPECTED_ERROR(__FILE__, __LINE__,
4703 "setsockopt(%d) %s", sock->fd,
4704 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4705 ISC_MSG_FAILED, "failed"));
4711 if (bind(sock->fd, &sockaddr->type.sa, sockaddr->length) < 0) {
4712 inc_stats(sock->manager->stats,
4713 sock->statsindex[STATID_BINDFAIL]);
4715 UNLOCK(&sock->lock);
4718 return (ISC_R_NOPERM);
4720 return (ISC_R_ADDRNOTAVAIL);
4722 return (ISC_R_ADDRINUSE);
4724 return (ISC_R_BOUND);
4726 isc__strerror(errno, strbuf, sizeof(strbuf));
4727 UNEXPECTED_ERROR(__FILE__, __LINE__, "bind: %s",
4729 return (ISC_R_UNEXPECTED);
4733 socket_log(sock, sockaddr, TRACE,
4734 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_BOUND, "bound");
4737 UNLOCK(&sock->lock);
4738 return (ISC_R_SUCCESS);
4742 * Enable this only for specific OS versions, and only when they have repaired
4743 * their problems with it. Until then, this is is broken and needs to be
4744 * diabled by default. See RT22589 for details.
4746 #undef ENABLE_ACCEPTFILTER
4749 isc_socket_filter(isc_socket_t *sock, const char *filter) {
4750 #if defined(SO_ACCEPTFILTER) && defined(ENABLE_ACCEPTFILTER)
4751 char strbuf[ISC_STRERRORSIZE];
4752 struct accept_filter_arg afa;
4758 REQUIRE(VALID_SOCKET(sock));
4760 #if defined(SO_ACCEPTFILTER) && defined(ENABLE_ACCEPTFILTER)
4761 bzero(&afa, sizeof(afa));
4762 strncpy(afa.af_name, filter, sizeof(afa.af_name));
4763 if (setsockopt(sock->fd, SOL_SOCKET, SO_ACCEPTFILTER,
4764 &afa, sizeof(afa)) == -1) {
4765 isc__strerror(errno, strbuf, sizeof(strbuf));
4766 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
4767 ISC_MSG_FILTER, "setsockopt(SO_ACCEPTFILTER): %s",
4769 return (ISC_R_FAILURE);
4771 return (ISC_R_SUCCESS);
4773 return (ISC_R_NOTIMPLEMENTED);
4778 * Set up to listen on a given socket. We do this by creating an internal
4779 * event that will be dispatched when the socket has read activity. The
4780 * watcher will send the internal event to the task when there is a new
4783 * Unlike in read, we don't preallocate a done event here. Every time there
4784 * is a new connection we'll have to allocate a new one anyway, so we might
4785 * as well keep things simple rather than having to track them.
4788 isc_socket_listen(isc_socket_t *sock, unsigned int backlog) {
4789 char strbuf[ISC_STRERRORSIZE];
4791 REQUIRE(VALID_SOCKET(sock));
4795 REQUIRE(!sock->listener);
4796 REQUIRE(sock->bound);
4797 REQUIRE(sock->type == isc_sockettype_tcp ||
4798 sock->type == isc_sockettype_unix);
4801 backlog = SOMAXCONN;
4803 if (listen(sock->fd, (int)backlog) < 0) {
4804 UNLOCK(&sock->lock);
4805 isc__strerror(errno, strbuf, sizeof(strbuf));
4807 UNEXPECTED_ERROR(__FILE__, __LINE__, "listen: %s", strbuf);
4809 return (ISC_R_UNEXPECTED);
4814 UNLOCK(&sock->lock);
4815 return (ISC_R_SUCCESS);
4819 * This should try to do aggressive accept() XXXMLG
4822 isc_socket_accept(isc_socket_t *sock,
4823 isc_task_t *task, isc_taskaction_t action, const void *arg)
4825 isc_socket_newconnev_t *dev;
4826 isc_socketmgr_t *manager;
4827 isc_task_t *ntask = NULL;
4828 isc_socket_t *nsock;
4829 isc_result_t result;
4830 isc_boolean_t do_poke = ISC_FALSE;
4832 REQUIRE(VALID_SOCKET(sock));
4833 manager = sock->manager;
4834 REQUIRE(VALID_MANAGER(manager));
4838 REQUIRE(sock->listener);
4841 * Sender field is overloaded here with the task we will be sending
4842 * this event to. Just before the actual event is delivered the
4843 * actual ev_sender will be touched up to be the socket.
4845 dev = (isc_socket_newconnev_t *)
4846 isc_event_allocate(manager->mctx, task, ISC_SOCKEVENT_NEWCONN,
4847 action, arg, sizeof(*dev));
4849 UNLOCK(&sock->lock);
4850 return (ISC_R_NOMEMORY);
4852 ISC_LINK_INIT(dev, ev_link);
4854 result = allocate_socket(manager, sock->type, &nsock);
4855 if (result != ISC_R_SUCCESS) {
4856 isc_event_free(ISC_EVENT_PTR(&dev));
4857 UNLOCK(&sock->lock);
4862 * Attach to socket and to task.
4864 isc_task_attach(task, &ntask);
4865 if (isc_task_exiting(ntask)) {
4866 isc_task_detach(&ntask);
4867 isc_event_free(ISC_EVENT_PTR(&dev));
4868 UNLOCK(&sock->lock);
4869 return (ISC_R_SHUTTINGDOWN);
4871 nsock->references++;
4872 nsock->statsindex = sock->statsindex;
4874 dev->ev_sender = ntask;
4875 dev->newsocket = nsock;
4878 * Poke watcher here. We still have the socket locked, so there
4879 * is no race condition. We will keep the lock for such a short
4880 * bit of time waking it up now or later won't matter all that much.
4882 if (ISC_LIST_EMPTY(sock->accept_list))
4885 ISC_LIST_ENQUEUE(sock->accept_list, dev, ev_link);
4888 select_poke(manager, sock->fd, SELECT_POKE_ACCEPT);
4890 UNLOCK(&sock->lock);
4891 return (ISC_R_SUCCESS);
4895 isc_socket_connect(isc_socket_t *sock, isc_sockaddr_t *addr,
4896 isc_task_t *task, isc_taskaction_t action, const void *arg)
4898 isc_socket_connev_t *dev;
4899 isc_task_t *ntask = NULL;
4900 isc_socketmgr_t *manager;
4902 char strbuf[ISC_STRERRORSIZE];
4903 char addrbuf[ISC_SOCKADDR_FORMATSIZE];
4905 REQUIRE(VALID_SOCKET(sock));
4906 REQUIRE(addr != NULL);
4907 REQUIRE(task != NULL);
4908 REQUIRE(action != NULL);
4910 manager = sock->manager;
4911 REQUIRE(VALID_MANAGER(manager));
4912 REQUIRE(addr != NULL);
4914 if (isc_sockaddr_ismulticast(addr))
4915 return (ISC_R_MULTICAST);
4919 REQUIRE(!sock->connecting);
4921 dev = (isc_socket_connev_t *)isc_event_allocate(manager->mctx, sock,
4922 ISC_SOCKEVENT_CONNECT,
4926 UNLOCK(&sock->lock);
4927 return (ISC_R_NOMEMORY);
4929 ISC_LINK_INIT(dev, ev_link);
4932 * Try to do the connect right away, as there can be only one
4933 * outstanding, and it might happen to complete.
4935 sock->peer_address = *addr;
4936 cc = connect(sock->fd, &addr->type.sa, addr->length);
4939 * HP-UX "fails" to connect a UDP socket and sets errno to
4940 * EINPROGRESS if it's non-blocking. We'd rather regard this as
4941 * a success and let the user detect it if it's really an error
4942 * at the time of sending a packet on the socket.
4944 if (sock->type == isc_sockettype_udp && errno == EINPROGRESS) {
4948 if (SOFT_ERROR(errno) || errno == EINPROGRESS)
4952 #define ERROR_MATCH(a, b) case a: dev->result = b; goto err_exit;
4953 ERROR_MATCH(EACCES, ISC_R_NOPERM);
4954 ERROR_MATCH(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
4955 ERROR_MATCH(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
4956 ERROR_MATCH(ECONNREFUSED, ISC_R_CONNREFUSED);
4957 ERROR_MATCH(EHOSTUNREACH, ISC_R_HOSTUNREACH);
4959 ERROR_MATCH(EHOSTDOWN, ISC_R_HOSTUNREACH);
4961 ERROR_MATCH(ENETUNREACH, ISC_R_NETUNREACH);
4962 ERROR_MATCH(ENOBUFS, ISC_R_NORESOURCES);
4963 ERROR_MATCH(EPERM, ISC_R_HOSTUNREACH);
4964 ERROR_MATCH(EPIPE, ISC_R_NOTCONNECTED);
4965 ERROR_MATCH(ECONNRESET, ISC_R_CONNECTIONRESET);
4969 sock->connected = 0;
4971 isc__strerror(errno, strbuf, sizeof(strbuf));
4972 isc_sockaddr_format(addr, addrbuf, sizeof(addrbuf));
4973 UNEXPECTED_ERROR(__FILE__, __LINE__, "connect(%s) %d/%s",
4974 addrbuf, errno, strbuf);
4976 UNLOCK(&sock->lock);
4977 inc_stats(sock->manager->stats,
4978 sock->statsindex[STATID_CONNECTFAIL]);
4979 isc_event_free(ISC_EVENT_PTR(&dev));
4980 return (ISC_R_UNEXPECTED);
4983 sock->connected = 0;
4984 isc_task_send(task, ISC_EVENT_PTR(&dev));
4986 UNLOCK(&sock->lock);
4987 inc_stats(sock->manager->stats,
4988 sock->statsindex[STATID_CONNECTFAIL]);
4989 return (ISC_R_SUCCESS);
4993 * If connect completed, fire off the done event.
4997 sock->connected = 1;
4999 dev->result = ISC_R_SUCCESS;
5000 isc_task_send(task, ISC_EVENT_PTR(&dev));
5002 UNLOCK(&sock->lock);
5004 inc_stats(sock->manager->stats,
5005 sock->statsindex[STATID_CONNECT]);
5007 return (ISC_R_SUCCESS);
5015 isc_task_attach(task, &ntask);
5017 sock->connecting = 1;
5019 dev->ev_sender = ntask;
5022 * Poke watcher here. We still have the socket locked, so there
5023 * is no race condition. We will keep the lock for such a short
5024 * bit of time waking it up now or later won't matter all that much.
5026 if (sock->connect_ev == NULL)
5027 select_poke(manager, sock->fd, SELECT_POKE_CONNECT);
5029 sock->connect_ev = dev;
5031 UNLOCK(&sock->lock);
5032 return (ISC_R_SUCCESS);
5036 * Called when a socket with a pending connect() finishes.
5039 internal_connect(isc_task_t *me, isc_event_t *ev) {
5041 isc_socket_connev_t *dev;
5044 ISC_SOCKADDR_LEN_T optlen;
5045 char strbuf[ISC_STRERRORSIZE];
5046 char peerbuf[ISC_SOCKADDR_FORMATSIZE];
5049 INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
5051 sock = ev->ev_sender;
5052 INSIST(VALID_SOCKET(sock));
5057 * When the internal event was sent the reference count was bumped
5058 * to keep the socket around for us. Decrement the count here.
5060 INSIST(sock->references > 0);
5062 if (sock->references == 0) {
5063 UNLOCK(&sock->lock);
5069 * Has this event been canceled?
5071 dev = sock->connect_ev;
5073 INSIST(!sock->connecting);
5074 UNLOCK(&sock->lock);
5078 INSIST(sock->connecting);
5079 sock->connecting = 0;
5082 * Get any possible error status here.
5084 optlen = sizeof(cc);
5085 if (getsockopt(sock->fd, SOL_SOCKET, SO_ERROR,
5086 (void *)&cc, (void *)&optlen) < 0)
5093 * If the error is EAGAIN, just re-select on this
5094 * fd and pretend nothing strange happened.
5096 if (SOFT_ERROR(errno) || errno == EINPROGRESS) {
5097 sock->connecting = 1;
5098 select_poke(sock->manager, sock->fd,
5099 SELECT_POKE_CONNECT);
5100 UNLOCK(&sock->lock);
5105 inc_stats(sock->manager->stats,
5106 sock->statsindex[STATID_CONNECTFAIL]);
5109 * Translate other errors into ISC_R_* flavors.
5112 #define ERROR_MATCH(a, b) case a: dev->result = b; break;
5113 ERROR_MATCH(EACCES, ISC_R_NOPERM);
5114 ERROR_MATCH(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
5115 ERROR_MATCH(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
5116 ERROR_MATCH(ECONNREFUSED, ISC_R_CONNREFUSED);
5117 ERROR_MATCH(EHOSTUNREACH, ISC_R_HOSTUNREACH);
5119 ERROR_MATCH(EHOSTDOWN, ISC_R_HOSTUNREACH);
5121 ERROR_MATCH(ENETUNREACH, ISC_R_NETUNREACH);
5122 ERROR_MATCH(ENOBUFS, ISC_R_NORESOURCES);
5123 ERROR_MATCH(EPERM, ISC_R_HOSTUNREACH);
5124 ERROR_MATCH(EPIPE, ISC_R_NOTCONNECTED);
5125 ERROR_MATCH(ETIMEDOUT, ISC_R_TIMEDOUT);
5126 ERROR_MATCH(ECONNRESET, ISC_R_CONNECTIONRESET);
5129 dev->result = ISC_R_UNEXPECTED;
5130 isc_sockaddr_format(&sock->peer_address, peerbuf,
5132 isc__strerror(errno, strbuf, sizeof(strbuf));
5133 UNEXPECTED_ERROR(__FILE__, __LINE__,
5134 "internal_connect: connect(%s) %s",
5138 inc_stats(sock->manager->stats,
5139 sock->statsindex[STATID_CONNECT]);
5140 dev->result = ISC_R_SUCCESS;
5141 sock->connected = 1;
5145 sock->connect_ev = NULL;
5147 UNLOCK(&sock->lock);
5149 task = dev->ev_sender;
5150 dev->ev_sender = sock;
5151 isc_task_sendanddetach(&task, ISC_EVENT_PTR(&dev));
5155 isc_socket_getpeername(isc_socket_t *sock, isc_sockaddr_t *addressp) {
5156 isc_result_t result;
5158 REQUIRE(VALID_SOCKET(sock));
5159 REQUIRE(addressp != NULL);
5163 if (sock->connected) {
5164 *addressp = sock->peer_address;
5165 result = ISC_R_SUCCESS;
5167 result = ISC_R_NOTCONNECTED;
5170 UNLOCK(&sock->lock);
5176 isc_socket_getsockname(isc_socket_t *sock, isc_sockaddr_t *addressp) {
5177 ISC_SOCKADDR_LEN_T len;
5178 isc_result_t result;
5179 char strbuf[ISC_STRERRORSIZE];
5181 REQUIRE(VALID_SOCKET(sock));
5182 REQUIRE(addressp != NULL);
5187 result = ISC_R_NOTBOUND;
5191 result = ISC_R_SUCCESS;
5193 len = sizeof(addressp->type);
5194 if (getsockname(sock->fd, &addressp->type.sa, (void *)&len) < 0) {
5195 isc__strerror(errno, strbuf, sizeof(strbuf));
5196 UNEXPECTED_ERROR(__FILE__, __LINE__, "getsockname: %s",
5198 result = ISC_R_UNEXPECTED;
5201 addressp->length = (unsigned int)len;
5204 UNLOCK(&sock->lock);
5210 * Run through the list of events on this socket, and cancel the ones
5211 * queued for task "task" of type "how". "how" is a bitmask.
5214 isc_socket_cancel(isc_socket_t *sock, isc_task_t *task, unsigned int how) {
5216 REQUIRE(VALID_SOCKET(sock));
5219 * Quick exit if there is nothing to do. Don't even bother locking
5228 * All of these do the same thing, more or less.
5230 * o If the internal event is marked as "posted" try to
5231 * remove it from the task's queue. If this fails, mark it
5232 * as canceled instead, and let the task clean it up later.
5233 * o For each I/O request for that task of that type, post
5234 * its done event with status of "ISC_R_CANCELED".
5235 * o Reset any state needed.
5237 if (((how & ISC_SOCKCANCEL_RECV) == ISC_SOCKCANCEL_RECV)
5238 && !ISC_LIST_EMPTY(sock->recv_list)) {
5239 isc_socketevent_t *dev;
5240 isc_socketevent_t *next;
5241 isc_task_t *current_task;
5243 dev = ISC_LIST_HEAD(sock->recv_list);
5245 while (dev != NULL) {
5246 current_task = dev->ev_sender;
5247 next = ISC_LIST_NEXT(dev, ev_link);
5249 if ((task == NULL) || (task == current_task)) {
5250 dev->result = ISC_R_CANCELED;
5251 send_recvdone_event(sock, &dev);
5257 if (((how & ISC_SOCKCANCEL_SEND) == ISC_SOCKCANCEL_SEND)
5258 && !ISC_LIST_EMPTY(sock->send_list)) {
5259 isc_socketevent_t *dev;
5260 isc_socketevent_t *next;
5261 isc_task_t *current_task;
5263 dev = ISC_LIST_HEAD(sock->send_list);
5265 while (dev != NULL) {
5266 current_task = dev->ev_sender;
5267 next = ISC_LIST_NEXT(dev, ev_link);
5269 if ((task == NULL) || (task == current_task)) {
5270 dev->result = ISC_R_CANCELED;
5271 send_senddone_event(sock, &dev);
5277 if (((how & ISC_SOCKCANCEL_ACCEPT) == ISC_SOCKCANCEL_ACCEPT)
5278 && !ISC_LIST_EMPTY(sock->accept_list)) {
5279 isc_socket_newconnev_t *dev;
5280 isc_socket_newconnev_t *next;
5281 isc_task_t *current_task;
5283 dev = ISC_LIST_HEAD(sock->accept_list);
5284 while (dev != NULL) {
5285 current_task = dev->ev_sender;
5286 next = ISC_LIST_NEXT(dev, ev_link);
5288 if ((task == NULL) || (task == current_task)) {
5290 ISC_LIST_UNLINK(sock->accept_list, dev,
5293 dev->newsocket->references--;
5294 free_socket(&dev->newsocket);
5296 dev->result = ISC_R_CANCELED;
5297 dev->ev_sender = sock;
5298 isc_task_sendanddetach(¤t_task,
5299 ISC_EVENT_PTR(&dev));
5307 * Connecting is not a list.
5309 if (((how & ISC_SOCKCANCEL_CONNECT) == ISC_SOCKCANCEL_CONNECT)
5310 && sock->connect_ev != NULL) {
5311 isc_socket_connev_t *dev;
5312 isc_task_t *current_task;
5314 INSIST(sock->connecting);
5315 sock->connecting = 0;
5317 dev = sock->connect_ev;
5318 current_task = dev->ev_sender;
5320 if ((task == NULL) || (task == current_task)) {
5321 sock->connect_ev = NULL;
5323 dev->result = ISC_R_CANCELED;
5324 dev->ev_sender = sock;
5325 isc_task_sendanddetach(¤t_task,
5326 ISC_EVENT_PTR(&dev));
5330 UNLOCK(&sock->lock);
5334 isc_socket_gettype(isc_socket_t *sock) {
5335 REQUIRE(VALID_SOCKET(sock));
5337 return (sock->type);
5341 isc_socket_isbound(isc_socket_t *sock) {
5345 val = ((sock->bound) ? ISC_TRUE : ISC_FALSE);
5346 UNLOCK(&sock->lock);
5352 isc_socket_ipv6only(isc_socket_t *sock, isc_boolean_t yes) {
5353 #if defined(IPV6_V6ONLY)
5354 int onoff = yes ? 1 : 0;
5360 REQUIRE(VALID_SOCKET(sock));
5363 if (sock->pf == AF_INET6) {
5364 if (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_V6ONLY,
5365 (void *)&onoff, sizeof(int)) < 0) {
5366 char strbuf[ISC_STRERRORSIZE];
5368 UNEXPECTED_ERROR(__FILE__, __LINE__,
5369 "setsockopt(%d, IPV6_V6ONLY) "
5371 isc_msgcat_get(isc_msgcat,
5378 FIX_IPV6_RECVPKTINFO(sock); /* AIX */
5382 #ifndef ISC_PLATFORM_USETHREADS
5383 /* In our assumed scenario, we can simply use a single static object. */
5384 static isc_socketwait_t swait_private;
5387 isc__socketmgr_waitevents(struct timeval *tvp, isc_socketwait_t **swaitp) {
5390 struct timespec ts, *tsp;
5399 REQUIRE(swaitp != NULL && *swaitp == NULL);
5401 if (socketmgr == NULL)
5406 ts.tv_sec = tvp->tv_sec;
5407 ts.tv_nsec = tvp->tv_usec * 1000;
5411 swait_private.nevents = kevent(socketmgr->kqueue_fd, NULL, 0,
5412 socketmgr->events, socketmgr->nevents,
5414 n = swait_private.nevents;
5415 #elif defined(USE_EPOLL)
5417 timeout = tvp->tv_sec * 1000 + (tvp->tv_usec + 999) / 1000;
5420 swait_private.nevents = epoll_wait(socketmgr->epoll_fd,
5422 socketmgr->nevents, timeout);
5423 n = swait_private.nevents;
5424 #elif defined(USE_DEVPOLL)
5425 dvp.dp_fds = socketmgr->events;
5426 dvp.dp_nfds = socketmgr->nevents;
5428 dvp.dp_timeout = tvp->tv_sec * 1000 +
5429 (tvp->tv_usec + 999) / 1000;
5431 dvp.dp_timeout = -1;
5432 swait_private.nevents = ioctl(socketmgr->devpoll_fd, DP_POLL, &dvp);
5433 n = swait_private.nevents;
5434 #elif defined(USE_SELECT)
5435 memcpy(socketmgr->read_fds_copy, socketmgr->read_fds,
5436 socketmgr->fd_bufsize);
5437 memcpy(socketmgr->write_fds_copy, socketmgr->write_fds,
5438 socketmgr->fd_bufsize);
5440 swait_private.readset = socketmgr->read_fds_copy;
5441 swait_private.writeset = socketmgr->write_fds_copy;
5442 swait_private.maxfd = socketmgr->maxfd + 1;
5444 n = select(swait_private.maxfd, swait_private.readset,
5445 swait_private.writeset, NULL, tvp);
5448 *swaitp = &swait_private;
5453 isc__socketmgr_dispatch(isc_socketwait_t *swait) {
5454 REQUIRE(swait == &swait_private);
5456 if (socketmgr == NULL)
5457 return (ISC_R_NOTFOUND);
5459 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
5460 (void)process_fds(socketmgr, socketmgr->events, swait->nevents);
5461 return (ISC_R_SUCCESS);
5462 #elif defined(USE_SELECT)
5463 process_fds(socketmgr, swait->maxfd, swait->readset, swait->writeset);
5464 return (ISC_R_SUCCESS);
5467 #endif /* ISC_PLATFORM_USETHREADS */
5470 isc_socket_setname(isc_socket_t *socket, const char *name, void *tag) {
5476 REQUIRE(VALID_SOCKET(socket));
5478 LOCK(&socket->lock);
5479 memset(socket->name, 0, sizeof(socket->name));
5480 strncpy(socket->name, name, sizeof(socket->name) - 1);
5482 UNLOCK(&socket->lock);
5486 isc_socket_getname(isc_socket_t *socket) {
5487 return (socket->name);
5491 isc_socket_gettag(isc_socket_t *socket) {
5492 return (socket->tag);
5498 _socktype(isc_sockettype_t type)
5500 if (type == isc_sockettype_udp)
5502 else if (type == isc_sockettype_tcp)
5504 else if (type == isc_sockettype_unix)
5506 else if (type == isc_sockettype_fdwatch)
5509 return ("not-initialized");
5513 isc_socketmgr_renderxml(isc_socketmgr_t *mgr, xmlTextWriterPtr writer)
5516 char peerbuf[ISC_SOCKADDR_FORMATSIZE];
5517 isc_sockaddr_t addr;
5518 ISC_SOCKADDR_LEN_T len;
5522 #ifndef ISC_PLATFORM_USETHREADS
5523 xmlTextWriterStartElement(writer, ISC_XMLCHAR "references");
5524 xmlTextWriterWriteFormatString(writer, "%d", mgr->refs);
5525 xmlTextWriterEndElement(writer);
5528 xmlTextWriterStartElement(writer, ISC_XMLCHAR "sockets");
5529 sock = ISC_LIST_HEAD(mgr->socklist);
5530 while (sock != NULL) {
5532 xmlTextWriterStartElement(writer, ISC_XMLCHAR "socket");
5534 xmlTextWriterStartElement(writer, ISC_XMLCHAR "id");
5535 xmlTextWriterWriteFormatString(writer, "%p", sock);
5536 xmlTextWriterEndElement(writer);
5538 if (sock->name[0] != 0) {
5539 xmlTextWriterStartElement(writer, ISC_XMLCHAR "name");
5540 xmlTextWriterWriteFormatString(writer, "%s",
5542 xmlTextWriterEndElement(writer); /* name */
5545 xmlTextWriterStartElement(writer, ISC_XMLCHAR "references");
5546 xmlTextWriterWriteFormatString(writer, "%d", sock->references);
5547 xmlTextWriterEndElement(writer);
5549 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "type",
5550 ISC_XMLCHAR _socktype(sock->type));
5552 if (sock->connected) {
5553 isc_sockaddr_format(&sock->peer_address, peerbuf,
5555 xmlTextWriterWriteElement(writer,
5556 ISC_XMLCHAR "peer-address",
5557 ISC_XMLCHAR peerbuf);
5561 if (getsockname(sock->fd, &addr.type.sa, (void *)&len) == 0) {
5562 isc_sockaddr_format(&addr, peerbuf, sizeof(peerbuf));
5563 xmlTextWriterWriteElement(writer,
5564 ISC_XMLCHAR "local-address",
5565 ISC_XMLCHAR peerbuf);
5568 xmlTextWriterStartElement(writer, ISC_XMLCHAR "states");
5569 if (sock->pending_recv)
5570 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5571 ISC_XMLCHAR "pending-receive");
5572 if (sock->pending_send)
5573 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5574 ISC_XMLCHAR "pending-send");
5575 if (sock->pending_accept)
5576 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5577 ISC_XMLCHAR "pending_accept");
5579 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5580 ISC_XMLCHAR "listener");
5581 if (sock->connected)
5582 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5583 ISC_XMLCHAR "connected");
5584 if (sock->connecting)
5585 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5586 ISC_XMLCHAR "connecting");
5588 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5589 ISC_XMLCHAR "bound");
5591 xmlTextWriterEndElement(writer); /* states */
5593 xmlTextWriterEndElement(writer); /* socket */
5595 UNLOCK(&sock->lock);
5596 sock = ISC_LIST_NEXT(sock, link);
5598 xmlTextWriterEndElement(writer); /* sockets */
5602 #endif /* HAVE_LIBXML2 */