2 * Copyright (C) 2004-2012 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 1998-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
24 #include <sys/param.h>
25 #include <sys/types.h>
26 #include <sys/socket.h>
38 #include <isc/buffer.h>
39 #include <isc/bufferlist.h>
40 #include <isc/condition.h>
41 #include <isc/formatcheck.h>
46 #include <isc/mutex.h>
49 #include <isc/platform.h>
50 #include <isc/print.h>
51 #include <isc/region.h>
52 #include <isc/socket.h>
53 #include <isc/stats.h>
54 #include <isc/strerror.h>
56 #include <isc/thread.h>
60 #ifdef ISC_PLATFORM_HAVESYSUNH
63 #ifdef ISC_PLATFORM_HAVEKQUEUE
64 #include <sys/event.h>
66 #ifdef ISC_PLATFORM_HAVEEPOLL
67 #include <sys/epoll.h>
69 #ifdef ISC_PLATFORM_HAVEDEVPOLL
70 #if defined(HAVE_SYS_DEVPOLL_H)
71 #include <sys/devpoll.h>
72 #elif defined(HAVE_DEVPOLL_H)
77 #include "errno2result.h"
79 /* See task.c about the following definition: */
81 #ifdef ISC_PLATFORM_USETHREADS
82 #define USE_WATCHER_THREAD
84 #define USE_SHARED_MANAGER
85 #endif /* ISC_PLATFORM_USETHREADS */
88 #ifndef USE_WATCHER_THREAD
90 #include "../task_p.h"
91 #endif /* USE_WATCHER_THREAD */
93 #if defined(SO_BSDCOMPAT) && defined(__linux__)
94 #include <sys/utsname.h>
98 * Choose the most preferable multiplex method.
100 #ifdef ISC_PLATFORM_HAVEKQUEUE
102 #elif defined (ISC_PLATFORM_HAVEEPOLL)
104 #elif defined (ISC_PLATFORM_HAVEDEVPOLL)
107 unsigned int want_read : 1,
112 #endif /* ISC_PLATFORM_HAVEKQUEUE */
114 #ifndef USE_WATCHER_THREAD
115 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
116 struct isc_socketwait {
119 #elif defined (USE_SELECT)
120 struct isc_socketwait {
126 #endif /* USE_KQUEUE */
127 #endif /* !USE_WATCHER_THREAD */
130 * Maximum number of allowable open sockets. This is also the maximum
131 * allowable socket file descriptor.
133 * Care should be taken before modifying this value for select():
134 * The API standard doesn't ensure select() accept more than (the system default
135 * of) FD_SETSIZE descriptors, and the default size should in fact be fine in
136 * the vast majority of cases. This constant should therefore be increased only
137 * when absolutely necessary and possible, i.e., the server is exhausting all
138 * available file descriptors (up to FD_SETSIZE) and the select() function
139 * and FD_xxx macros support larger values than FD_SETSIZE (which may not
140 * always by true, but we keep using some of them to ensure as much
141 * portability as possible). Note also that overall server performance
142 * may be rather worsened with a larger value of this constant due to
143 * inherent scalability problems of select().
145 * As a special note, this value shouldn't have to be touched if
146 * this is a build for an authoritative only DNS server.
148 #ifndef ISC_SOCKET_MAXSOCKETS
149 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
150 #define ISC_SOCKET_MAXSOCKETS 4096
151 #elif defined(USE_SELECT)
152 #define ISC_SOCKET_MAXSOCKETS FD_SETSIZE
153 #endif /* USE_KQUEUE... */
154 #endif /* ISC_SOCKET_MAXSOCKETS */
158 * Mac OS X needs a special definition to support larger values in select().
159 * We always define this because a larger value can be specified run-time.
162 #define _DARWIN_UNLIMITED_SELECT
163 #endif /* __APPLE__ */
164 #endif /* USE_SELECT */
166 #ifdef ISC_SOCKET_USE_POLLWATCH
168 * If this macro is defined, enable workaround for a Solaris /dev/poll kernel
169 * bug: DP_POLL ioctl could keep sleeping even if socket I/O is possible for
170 * some of the specified FD. The idea is based on the observation that it's
171 * likely for a busy server to keep receiving packets. It specifically works
172 * as follows: the socket watcher is first initialized with the state of
173 * "poll_idle". While it's in the idle state it keeps sleeping until a socket
174 * event occurs. When it wakes up for a socket I/O event, it moves to the
175 * poll_active state, and sets the poll timeout to a short period
176 * (ISC_SOCKET_POLLWATCH_TIMEOUT msec). If timeout occurs in this state, the
177 * watcher goes to the poll_checking state with the same timeout period.
178 * In this state, the watcher tries to detect whether this is a break
179 * during intermittent events or the kernel bug is triggered. If the next
180 * polling reports an event within the short period, the previous timeout is
181 * likely to be a kernel bug, and so the watcher goes back to the active state.
182 * Otherwise, it moves to the idle state again.
184 * It's not clear whether this is a thread-related bug, but since we've only
185 * seen this with threads, this workaround is used only when enabling threads.
188 typedef enum { poll_idle, poll_active, poll_checking } pollstate_t;
190 #ifndef ISC_SOCKET_POLLWATCH_TIMEOUT
191 #define ISC_SOCKET_POLLWATCH_TIMEOUT 10
192 #endif /* ISC_SOCKET_POLLWATCH_TIMEOUT */
193 #endif /* ISC_SOCKET_USE_POLLWATCH */
196 * Size of per-FD lock buckets.
198 #ifdef ISC_PLATFORM_USETHREADS
199 #define FDLOCK_COUNT 1024
200 #define FDLOCK_ID(fd) ((fd) % FDLOCK_COUNT)
202 #define FDLOCK_COUNT 1
203 #define FDLOCK_ID(fd) 0
204 #endif /* ISC_PLATFORM_USETHREADS */
207 * Maximum number of events communicated with the kernel. There should normally
208 * be no need for having a large number.
210 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
211 #ifndef ISC_SOCKET_MAXEVENTS
212 #define ISC_SOCKET_MAXEVENTS 64
217 * Some systems define the socket length argument as an int, some as size_t,
218 * some as socklen_t. This is here so it can be easily changed if needed.
220 #ifndef ISC_SOCKADDR_LEN_T
221 #define ISC_SOCKADDR_LEN_T unsigned int
225 * Define what the possible "soft" errors can be. These are non-fatal returns
226 * of various network related functions, like recv() and so on.
228 * For some reason, BSDI (and perhaps others) will sometimes return <0
229 * from recv() but will have errno==0. This is broken, but we have to
230 * work around it here.
232 #define SOFT_ERROR(e) ((e) == EAGAIN || \
233 (e) == EWOULDBLOCK || \
237 #define DLVL(x) ISC_LOGCATEGORY_GENERAL, ISC_LOGMODULE_SOCKET, ISC_LOG_DEBUG(x)
240 * DLVL(90) -- Function entry/exit and other tracing.
241 * DLVL(70) -- Socket "correctness" -- including returning of events, etc.
242 * DLVL(60) -- Socket data send/receive
243 * DLVL(50) -- Event tracing, including receiving/sending completion events.
244 * DLVL(20) -- Socket creation/destruction.
246 #define TRACE_LEVEL 90
247 #define CORRECTNESS_LEVEL 70
248 #define IOEVENT_LEVEL 60
249 #define EVENT_LEVEL 50
250 #define CREATION_LEVEL 20
252 #define TRACE DLVL(TRACE_LEVEL)
253 #define CORRECTNESS DLVL(CORRECTNESS_LEVEL)
254 #define IOEVENT DLVL(IOEVENT_LEVEL)
255 #define EVENT DLVL(EVENT_LEVEL)
256 #define CREATION DLVL(CREATION_LEVEL)
258 typedef isc_event_t intev_t;
260 #define SOCKET_MAGIC ISC_MAGIC('I', 'O', 'i', 'o')
261 #define VALID_SOCKET(s) ISC_MAGIC_VALID(s, SOCKET_MAGIC)
264 * IPv6 control information. If the socket is an IPv6 socket we want
265 * to collect the destination address and interface so the client can
266 * set them on outgoing packets.
268 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
275 * NetBSD and FreeBSD can timestamp packets. XXXMLG Should we have
276 * a setsockopt() like interface to request timestamps, and if the OS
277 * doesn't do it for us, call gettimeofday() on every UDP receive?
286 * The size to raise the receive buffer to (from BIND 8).
288 #define RCVBUFSIZE (32*1024)
291 * The number of times a send operation is repeated if the result is EINTR.
295 typedef struct isc__socket isc__socket_t;
296 typedef struct isc__socketmgr isc__socketmgr_t;
298 #define NEWCONNSOCK(ev) ((isc__socket_t *)(ev)->newsocket)
303 isc__socketmgr_t *manager;
305 isc_sockettype_t type;
306 const isc_statscounter_t *statsindex;
308 /* Locked by socket lock. */
309 ISC_LINK(isc__socket_t) link;
310 unsigned int references;
316 ISC_LIST(isc_socketevent_t) send_list;
317 ISC_LIST(isc_socketevent_t) recv_list;
318 ISC_LIST(isc_socket_newconnev_t) accept_list;
319 isc_socket_connev_t *connect_ev;
322 * Internal events. Posted when a descriptor is readable or
323 * writable. These are statically allocated and never freed.
324 * They will be set to non-purgable before use.
329 isc_sockaddr_t peer_address; /* remote address */
331 unsigned int pending_recv : 1,
334 listener : 1, /* listener socket */
336 connecting : 1, /* connect pending */
337 bound : 1, /* bound to local addr */
340 #ifdef ISC_NET_RECVOVERFLOW
341 unsigned char overflow; /* used for MSG_TRUNC fake */
345 ISC_SOCKADDR_LEN_T recvcmsgbuflen;
347 ISC_SOCKADDR_LEN_T sendcmsgbuflen;
350 isc_sockfdwatch_t fdwatchcb;
352 isc_task_t *fdwatchtask;
355 #define SOCKET_MANAGER_MAGIC ISC_MAGIC('I', 'O', 'm', 'g')
356 #define VALID_MANAGER(m) ISC_MAGIC_VALID(m, SOCKET_MANAGER_MAGIC)
358 struct isc__socketmgr {
360 isc_socketmgr_t common;
368 struct kevent *events;
369 #endif /* USE_KQUEUE */
373 struct epoll_event *events;
374 #endif /* USE_EPOLL */
378 struct pollfd *events;
379 #endif /* USE_DEVPOLL */
382 #endif /* USE_SELECT */
383 unsigned int maxsocks;
384 #ifdef ISC_PLATFORM_USETHREADS
388 /* Locked by fdlock. */
392 pollinfo_t *fdpollinfo;
395 /* Locked by manager lock. */
396 ISC_LIST(isc__socket_t) socklist;
399 fd_set *read_fds_copy;
401 fd_set *write_fds_copy;
403 #endif /* USE_SELECT */
404 int reserved; /* unlocked */
405 #ifdef USE_WATCHER_THREAD
406 isc_thread_t watcher;
407 isc_condition_t shutdown_ok;
408 #else /* USE_WATCHER_THREAD */
410 #endif /* USE_WATCHER_THREAD */
414 #ifdef USE_SHARED_MANAGER
415 static isc__socketmgr_t *socketmgr = NULL;
416 #endif /* USE_SHARED_MANAGER */
418 #define CLOSED 0 /* this one must be zero */
420 #define CLOSE_PENDING 2
423 * send() and recv() iovec counts
425 #define MAXSCATTERGATHER_SEND (ISC_SOCKET_MAXSCATTERGATHER)
426 #ifdef ISC_NET_RECVOVERFLOW
427 # define MAXSCATTERGATHER_RECV (ISC_SOCKET_MAXSCATTERGATHER + 1)
429 # define MAXSCATTERGATHER_RECV (ISC_SOCKET_MAXSCATTERGATHER)
432 static isc_result_t socket_create(isc_socketmgr_t *manager0, int pf,
433 isc_sockettype_t type,
434 isc_socket_t **socketp,
435 isc_socket_t *dup_socket);
436 static void send_recvdone_event(isc__socket_t *, isc_socketevent_t **);
437 static void send_senddone_event(isc__socket_t *, isc_socketevent_t **);
438 static void free_socket(isc__socket_t **);
439 static isc_result_t allocate_socket(isc__socketmgr_t *, isc_sockettype_t,
441 static void destroy(isc__socket_t **);
442 static void internal_accept(isc_task_t *, isc_event_t *);
443 static void internal_connect(isc_task_t *, isc_event_t *);
444 static void internal_recv(isc_task_t *, isc_event_t *);
445 static void internal_send(isc_task_t *, isc_event_t *);
446 static void internal_fdwatch_write(isc_task_t *, isc_event_t *);
447 static void internal_fdwatch_read(isc_task_t *, isc_event_t *);
448 static void process_cmsg(isc__socket_t *, struct msghdr *, isc_socketevent_t *);
449 static void build_msghdr_send(isc__socket_t *, isc_socketevent_t *,
450 struct msghdr *, struct iovec *, size_t *);
451 static void build_msghdr_recv(isc__socket_t *, isc_socketevent_t *,
452 struct msghdr *, struct iovec *, size_t *);
453 #ifdef USE_WATCHER_THREAD
454 static isc_boolean_t process_ctlfd(isc__socketmgr_t *manager);
458 * The following can be either static or public, depending on build environment.
462 #define ISC_SOCKETFUNC_SCOPE
464 #define ISC_SOCKETFUNC_SCOPE static
467 ISC_SOCKETFUNC_SCOPE isc_result_t
468 isc__socket_create(isc_socketmgr_t *manager, int pf, isc_sockettype_t type,
469 isc_socket_t **socketp);
470 ISC_SOCKETFUNC_SCOPE void
471 isc__socket_attach(isc_socket_t *sock, isc_socket_t **socketp);
472 ISC_SOCKETFUNC_SCOPE void
473 isc__socket_detach(isc_socket_t **socketp);
474 ISC_SOCKETFUNC_SCOPE isc_result_t
475 isc__socketmgr_create(isc_mem_t *mctx, isc_socketmgr_t **managerp);
476 ISC_SOCKETFUNC_SCOPE isc_result_t
477 isc__socketmgr_create2(isc_mem_t *mctx, isc_socketmgr_t **managerp,
478 unsigned int maxsocks);
479 ISC_SOCKETFUNC_SCOPE void
480 isc__socketmgr_destroy(isc_socketmgr_t **managerp);
481 ISC_SOCKETFUNC_SCOPE isc_result_t
482 isc__socket_recvv(isc_socket_t *sock, isc_bufferlist_t *buflist,
483 unsigned int minimum, isc_task_t *task,
484 isc_taskaction_t action, const void *arg);
485 ISC_SOCKETFUNC_SCOPE isc_result_t
486 isc__socket_recv(isc_socket_t *sock, isc_region_t *region,
487 unsigned int minimum, isc_task_t *task,
488 isc_taskaction_t action, const void *arg);
489 ISC_SOCKETFUNC_SCOPE isc_result_t
490 isc__socket_recv2(isc_socket_t *sock, isc_region_t *region,
491 unsigned int minimum, isc_task_t *task,
492 isc_socketevent_t *event, unsigned int flags);
493 ISC_SOCKETFUNC_SCOPE isc_result_t
494 isc__socket_send(isc_socket_t *sock, isc_region_t *region,
495 isc_task_t *task, isc_taskaction_t action, const void *arg);
496 ISC_SOCKETFUNC_SCOPE isc_result_t
497 isc__socket_sendto(isc_socket_t *sock, isc_region_t *region,
498 isc_task_t *task, isc_taskaction_t action, const void *arg,
499 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo);
500 ISC_SOCKETFUNC_SCOPE isc_result_t
501 isc__socket_sendv(isc_socket_t *sock, isc_bufferlist_t *buflist,
502 isc_task_t *task, isc_taskaction_t action, const void *arg);
503 ISC_SOCKETFUNC_SCOPE isc_result_t
504 isc__socket_sendtov(isc_socket_t *sock, isc_bufferlist_t *buflist,
505 isc_task_t *task, isc_taskaction_t action, const void *arg,
506 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo);
507 ISC_SOCKETFUNC_SCOPE isc_result_t
508 isc__socket_sendto2(isc_socket_t *sock, isc_region_t *region,
510 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo,
511 isc_socketevent_t *event, unsigned int flags);
512 ISC_SOCKETFUNC_SCOPE void
513 isc__socket_cleanunix(isc_sockaddr_t *sockaddr, isc_boolean_t active);
514 ISC_SOCKETFUNC_SCOPE isc_result_t
515 isc__socket_permunix(isc_sockaddr_t *sockaddr, isc_uint32_t perm,
516 isc_uint32_t owner, isc_uint32_t group);
517 ISC_SOCKETFUNC_SCOPE isc_result_t
518 isc__socket_bind(isc_socket_t *sock, isc_sockaddr_t *sockaddr,
519 unsigned int options);
520 ISC_SOCKETFUNC_SCOPE isc_result_t
521 isc__socket_filter(isc_socket_t *sock, const char *filter);
522 ISC_SOCKETFUNC_SCOPE isc_result_t
523 isc__socket_listen(isc_socket_t *sock, unsigned int backlog);
524 ISC_SOCKETFUNC_SCOPE isc_result_t
525 isc__socket_accept(isc_socket_t *sock,
526 isc_task_t *task, isc_taskaction_t action, const void *arg);
527 ISC_SOCKETFUNC_SCOPE isc_result_t
528 isc__socket_connect(isc_socket_t *sock, isc_sockaddr_t *addr,
529 isc_task_t *task, isc_taskaction_t action,
531 ISC_SOCKETFUNC_SCOPE isc_result_t
532 isc__socket_getpeername(isc_socket_t *sock, isc_sockaddr_t *addressp);
533 ISC_SOCKETFUNC_SCOPE isc_result_t
534 isc__socket_getsockname(isc_socket_t *sock, isc_sockaddr_t *addressp);
535 ISC_SOCKETFUNC_SCOPE void
536 isc__socket_cancel(isc_socket_t *sock, isc_task_t *task, unsigned int how);
537 ISC_SOCKETFUNC_SCOPE isc_sockettype_t
538 isc__socket_gettype(isc_socket_t *sock);
539 ISC_SOCKETFUNC_SCOPE isc_boolean_t
540 isc__socket_isbound(isc_socket_t *sock);
541 ISC_SOCKETFUNC_SCOPE void
542 isc__socket_ipv6only(isc_socket_t *sock, isc_boolean_t yes);
543 #if defined(HAVE_LIBXML2) && defined(BIND9)
544 ISC_SOCKETFUNC_SCOPE void
545 isc__socketmgr_renderxml(isc_socketmgr_t *mgr0, xmlTextWriterPtr writer);
548 ISC_SOCKETFUNC_SCOPE isc_result_t
549 isc__socket_fdwatchcreate(isc_socketmgr_t *manager, int fd, int flags,
550 isc_sockfdwatch_t callback, void *cbarg,
551 isc_task_t *task, isc_socket_t **socketp);
552 ISC_SOCKETFUNC_SCOPE isc_result_t
553 isc__socket_fdwatchpoke(isc_socket_t *sock, int flags);
554 ISC_SOCKETFUNC_SCOPE isc_result_t
555 isc__socket_dup(isc_socket_t *sock, isc_socket_t **socketp);
556 ISC_SOCKETFUNC_SCOPE int
557 isc__socket_getfd(isc_socket_t *sock);
560 isc_socketmethods_t methods;
563 * The following are defined just for avoiding unused static functions.
566 void *recvv, *send, *sendv, *sendto2, *cleanunix, *permunix, *filter,
567 *listen, *accept, *getpeername, *isbound;
578 isc__socket_getsockname,
580 isc__socket_ipv6only,
581 isc__socket_fdwatchpoke,
587 (void *)isc__socket_recvv, (void *)isc__socket_send,
588 (void *)isc__socket_sendv, (void *)isc__socket_sendto2,
589 (void *)isc__socket_cleanunix, (void *)isc__socket_permunix,
590 (void *)isc__socket_filter, (void *)isc__socket_listen,
591 (void *)isc__socket_accept, (void *)isc__socket_getpeername,
592 (void *)isc__socket_isbound
596 static isc_socketmgrmethods_t socketmgrmethods = {
597 isc__socketmgr_destroy,
599 isc__socket_fdwatchcreate
602 #define SELECT_POKE_SHUTDOWN (-1)
603 #define SELECT_POKE_NOTHING (-2)
604 #define SELECT_POKE_READ (-3)
605 #define SELECT_POKE_ACCEPT (-3) /*%< Same as _READ */
606 #define SELECT_POKE_WRITE (-4)
607 #define SELECT_POKE_CONNECT (-4) /*%< Same as _WRITE */
608 #define SELECT_POKE_CLOSE (-5)
610 #define SOCK_DEAD(s) ((s)->references == 0)
613 * Shortcut index arrays to get access to statistics counters.
620 STATID_CONNECTFAIL = 4,
622 STATID_ACCEPTFAIL = 6,
627 static const isc_statscounter_t upd4statsindex[] = {
628 isc_sockstatscounter_udp4open,
629 isc_sockstatscounter_udp4openfail,
630 isc_sockstatscounter_udp4close,
631 isc_sockstatscounter_udp4bindfail,
632 isc_sockstatscounter_udp4connectfail,
633 isc_sockstatscounter_udp4connect,
636 isc_sockstatscounter_udp4sendfail,
637 isc_sockstatscounter_udp4recvfail
639 static const isc_statscounter_t upd6statsindex[] = {
640 isc_sockstatscounter_udp6open,
641 isc_sockstatscounter_udp6openfail,
642 isc_sockstatscounter_udp6close,
643 isc_sockstatscounter_udp6bindfail,
644 isc_sockstatscounter_udp6connectfail,
645 isc_sockstatscounter_udp6connect,
648 isc_sockstatscounter_udp6sendfail,
649 isc_sockstatscounter_udp6recvfail
651 static const isc_statscounter_t tcp4statsindex[] = {
652 isc_sockstatscounter_tcp4open,
653 isc_sockstatscounter_tcp4openfail,
654 isc_sockstatscounter_tcp4close,
655 isc_sockstatscounter_tcp4bindfail,
656 isc_sockstatscounter_tcp4connectfail,
657 isc_sockstatscounter_tcp4connect,
658 isc_sockstatscounter_tcp4acceptfail,
659 isc_sockstatscounter_tcp4accept,
660 isc_sockstatscounter_tcp4sendfail,
661 isc_sockstatscounter_tcp4recvfail
663 static const isc_statscounter_t tcp6statsindex[] = {
664 isc_sockstatscounter_tcp6open,
665 isc_sockstatscounter_tcp6openfail,
666 isc_sockstatscounter_tcp6close,
667 isc_sockstatscounter_tcp6bindfail,
668 isc_sockstatscounter_tcp6connectfail,
669 isc_sockstatscounter_tcp6connect,
670 isc_sockstatscounter_tcp6acceptfail,
671 isc_sockstatscounter_tcp6accept,
672 isc_sockstatscounter_tcp6sendfail,
673 isc_sockstatscounter_tcp6recvfail
675 static const isc_statscounter_t unixstatsindex[] = {
676 isc_sockstatscounter_unixopen,
677 isc_sockstatscounter_unixopenfail,
678 isc_sockstatscounter_unixclose,
679 isc_sockstatscounter_unixbindfail,
680 isc_sockstatscounter_unixconnectfail,
681 isc_sockstatscounter_unixconnect,
682 isc_sockstatscounter_unixacceptfail,
683 isc_sockstatscounter_unixaccept,
684 isc_sockstatscounter_unixsendfail,
685 isc_sockstatscounter_unixrecvfail
687 static const isc_statscounter_t fdwatchstatsindex[] = {
690 isc_sockstatscounter_fdwatchclose,
691 isc_sockstatscounter_fdwatchbindfail,
692 isc_sockstatscounter_fdwatchconnectfail,
693 isc_sockstatscounter_fdwatchconnect,
696 isc_sockstatscounter_fdwatchsendfail,
697 isc_sockstatscounter_fdwatchrecvfail
700 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL) || \
701 defined(USE_WATCHER_THREAD)
703 manager_log(isc__socketmgr_t *sockmgr,
704 isc_logcategory_t *category, isc_logmodule_t *module, int level,
705 const char *fmt, ...) ISC_FORMAT_PRINTF(5, 6);
707 manager_log(isc__socketmgr_t *sockmgr,
708 isc_logcategory_t *category, isc_logmodule_t *module, int level,
709 const char *fmt, ...)
714 if (! isc_log_wouldlog(isc_lctx, level))
718 vsnprintf(msgbuf, sizeof(msgbuf), fmt, ap);
721 isc_log_write(isc_lctx, category, module, level,
722 "sockmgr %p: %s", sockmgr, msgbuf);
727 socket_log(isc__socket_t *sock, isc_sockaddr_t *address,
728 isc_logcategory_t *category, isc_logmodule_t *module, int level,
729 isc_msgcat_t *msgcat, int msgset, int message,
730 const char *fmt, ...) ISC_FORMAT_PRINTF(9, 10);
732 socket_log(isc__socket_t *sock, isc_sockaddr_t *address,
733 isc_logcategory_t *category, isc_logmodule_t *module, int level,
734 isc_msgcat_t *msgcat, int msgset, int message,
735 const char *fmt, ...)
738 char peerbuf[ISC_SOCKADDR_FORMATSIZE];
741 if (! isc_log_wouldlog(isc_lctx, level))
745 vsnprintf(msgbuf, sizeof(msgbuf), fmt, ap);
748 if (address == NULL) {
749 isc_log_iwrite(isc_lctx, category, module, level,
750 msgcat, msgset, message,
751 "socket %p: %s", sock, msgbuf);
753 isc_sockaddr_format(address, peerbuf, sizeof(peerbuf));
754 isc_log_iwrite(isc_lctx, category, module, level,
755 msgcat, msgset, message,
756 "socket %p %s: %s", sock, peerbuf, msgbuf);
760 #if defined(_AIX) && defined(ISC_NET_BSD44MSGHDR) && \
761 defined(USE_CMSG) && defined(IPV6_RECVPKTINFO)
763 * AIX has a kernel bug where IPV6_RECVPKTINFO gets cleared by
764 * setting IPV6_V6ONLY.
767 FIX_IPV6_RECVPKTINFO(isc__socket_t *sock)
769 char strbuf[ISC_STRERRORSIZE];
772 if (sock->pf != AF_INET6 || sock->type != isc_sockettype_udp)
775 if (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_RECVPKTINFO,
776 (void *)&on, sizeof(on)) < 0) {
778 isc__strerror(errno, strbuf, sizeof(strbuf));
779 UNEXPECTED_ERROR(__FILE__, __LINE__,
780 "setsockopt(%d, IPV6_RECVPKTINFO) "
782 isc_msgcat_get(isc_msgcat,
790 #define FIX_IPV6_RECVPKTINFO(sock) (void)0
794 * Increment socket-related statistics counters.
797 inc_stats(isc_stats_t *stats, isc_statscounter_t counterid) {
798 REQUIRE(counterid != -1);
801 isc_stats_increment(stats, counterid);
804 static inline isc_result_t
805 watch_fd(isc__socketmgr_t *manager, int fd, int msg) {
806 isc_result_t result = ISC_R_SUCCESS;
809 struct kevent evchange;
811 memset(&evchange, 0, sizeof(evchange));
812 if (msg == SELECT_POKE_READ)
813 evchange.filter = EVFILT_READ;
815 evchange.filter = EVFILT_WRITE;
816 evchange.flags = EV_ADD;
818 if (kevent(manager->kqueue_fd, &evchange, 1, NULL, 0, NULL) != 0)
819 result = isc__errno2result(errno);
822 #elif defined(USE_EPOLL)
823 struct epoll_event event;
825 if (msg == SELECT_POKE_READ)
826 event.events = EPOLLIN;
828 event.events = EPOLLOUT;
829 memset(&event.data, 0, sizeof(event.data));
831 if (epoll_ctl(manager->epoll_fd, EPOLL_CTL_ADD, fd, &event) == -1 &&
833 result = isc__errno2result(errno);
837 #elif defined(USE_DEVPOLL)
839 int lockid = FDLOCK_ID(fd);
841 memset(&pfd, 0, sizeof(pfd));
842 if (msg == SELECT_POKE_READ)
845 pfd.events = POLLOUT;
848 LOCK(&manager->fdlock[lockid]);
849 if (write(manager->devpoll_fd, &pfd, sizeof(pfd)) == -1)
850 result = isc__errno2result(errno);
852 if (msg == SELECT_POKE_READ)
853 manager->fdpollinfo[fd].want_read = 1;
855 manager->fdpollinfo[fd].want_write = 1;
857 UNLOCK(&manager->fdlock[lockid]);
860 #elif defined(USE_SELECT)
861 LOCK(&manager->lock);
862 if (msg == SELECT_POKE_READ)
863 FD_SET(fd, manager->read_fds);
864 if (msg == SELECT_POKE_WRITE)
865 FD_SET(fd, manager->write_fds);
866 UNLOCK(&manager->lock);
872 static inline isc_result_t
873 unwatch_fd(isc__socketmgr_t *manager, int fd, int msg) {
874 isc_result_t result = ISC_R_SUCCESS;
877 struct kevent evchange;
879 memset(&evchange, 0, sizeof(evchange));
880 if (msg == SELECT_POKE_READ)
881 evchange.filter = EVFILT_READ;
883 evchange.filter = EVFILT_WRITE;
884 evchange.flags = EV_DELETE;
886 if (kevent(manager->kqueue_fd, &evchange, 1, NULL, 0, NULL) != 0)
887 result = isc__errno2result(errno);
890 #elif defined(USE_EPOLL)
891 struct epoll_event event;
893 if (msg == SELECT_POKE_READ)
894 event.events = EPOLLIN;
896 event.events = EPOLLOUT;
897 memset(&event.data, 0, sizeof(event.data));
899 if (epoll_ctl(manager->epoll_fd, EPOLL_CTL_DEL, fd, &event) == -1 &&
901 char strbuf[ISC_STRERRORSIZE];
902 isc__strerror(errno, strbuf, sizeof(strbuf));
903 UNEXPECTED_ERROR(__FILE__, __LINE__,
904 "epoll_ctl(DEL), %d: %s", fd, strbuf);
905 result = ISC_R_UNEXPECTED;
908 #elif defined(USE_DEVPOLL)
909 struct pollfd pfds[2];
910 size_t writelen = sizeof(pfds[0]);
911 int lockid = FDLOCK_ID(fd);
913 memset(pfds, 0, sizeof(pfds));
914 pfds[0].events = POLLREMOVE;
918 * Canceling read or write polling via /dev/poll is tricky. Since it
919 * only provides a way of canceling per FD, we may need to re-poll the
920 * socket for the other operation.
922 LOCK(&manager->fdlock[lockid]);
923 if (msg == SELECT_POKE_READ &&
924 manager->fdpollinfo[fd].want_write == 1) {
925 pfds[1].events = POLLOUT;
927 writelen += sizeof(pfds[1]);
929 if (msg == SELECT_POKE_WRITE &&
930 manager->fdpollinfo[fd].want_read == 1) {
931 pfds[1].events = POLLIN;
933 writelen += sizeof(pfds[1]);
936 if (write(manager->devpoll_fd, pfds, writelen) == -1)
937 result = isc__errno2result(errno);
939 if (msg == SELECT_POKE_READ)
940 manager->fdpollinfo[fd].want_read = 0;
942 manager->fdpollinfo[fd].want_write = 0;
944 UNLOCK(&manager->fdlock[lockid]);
947 #elif defined(USE_SELECT)
948 LOCK(&manager->lock);
949 if (msg == SELECT_POKE_READ)
950 FD_CLR(fd, manager->read_fds);
951 else if (msg == SELECT_POKE_WRITE)
952 FD_CLR(fd, manager->write_fds);
953 UNLOCK(&manager->lock);
960 wakeup_socket(isc__socketmgr_t *manager, int fd, int msg) {
962 int lockid = FDLOCK_ID(fd);
965 * This is a wakeup on a socket. If the socket is not in the
966 * process of being closed, start watching it for either reads
970 INSIST(fd >= 0 && fd < (int)manager->maxsocks);
972 if (msg == SELECT_POKE_CLOSE) {
973 /* No one should be updating fdstate, so no need to lock it */
974 INSIST(manager->fdstate[fd] == CLOSE_PENDING);
975 manager->fdstate[fd] = CLOSED;
976 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
977 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
982 LOCK(&manager->fdlock[lockid]);
983 if (manager->fdstate[fd] == CLOSE_PENDING) {
984 UNLOCK(&manager->fdlock[lockid]);
987 * We accept (and ignore) any error from unwatch_fd() as we are
988 * closing the socket, hoping it doesn't leave dangling state in
990 * Note that unwatch_fd() must be called after releasing the
991 * fdlock; otherwise it could cause deadlock due to a lock order
994 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
995 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
998 if (manager->fdstate[fd] != MANAGED) {
999 UNLOCK(&manager->fdlock[lockid]);
1002 UNLOCK(&manager->fdlock[lockid]);
1005 * Set requested bit.
1007 result = watch_fd(manager, fd, msg);
1008 if (result != ISC_R_SUCCESS) {
1010 * XXXJT: what should we do? Ignoring the failure of watching
1011 * a socket will make the application dysfunctional, but there
1012 * seems to be no reasonable recovery process.
1014 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
1015 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
1016 "failed to start watching FD (%d): %s",
1017 fd, isc_result_totext(result));
1021 #ifdef USE_WATCHER_THREAD
1023 * Poke the select loop when there is something for us to do.
1024 * The write is required (by POSIX) to complete. That is, we
1025 * will not get partial writes.
1028 select_poke(isc__socketmgr_t *mgr, int fd, int msg) {
1031 char strbuf[ISC_STRERRORSIZE];
1037 cc = write(mgr->pipe_fds[1], buf, sizeof(buf));
1040 * Treat ENOSR as EAGAIN but loop slowly as it is
1041 * unlikely to clear fast.
1043 if (cc < 0 && errno == ENOSR) {
1048 } while (cc < 0 && SOFT_ERROR(errno));
1051 isc__strerror(errno, strbuf, sizeof(strbuf));
1052 FATAL_ERROR(__FILE__, __LINE__,
1053 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
1054 ISC_MSG_WRITEFAILED,
1056 "during watcher poke: %s"),
1060 INSIST(cc == sizeof(buf));
1064 * Read a message on the internal fd.
1067 select_readmsg(isc__socketmgr_t *mgr, int *fd, int *msg) {
1070 char strbuf[ISC_STRERRORSIZE];
1072 cc = read(mgr->pipe_fds[0], buf, sizeof(buf));
1074 *msg = SELECT_POKE_NOTHING;
1075 *fd = -1; /* Silence compiler. */
1076 if (SOFT_ERROR(errno))
1079 isc__strerror(errno, strbuf, sizeof(strbuf));
1080 FATAL_ERROR(__FILE__, __LINE__,
1081 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
1084 "during watcher poke: %s"),
1089 INSIST(cc == sizeof(buf));
1094 #else /* USE_WATCHER_THREAD */
1096 * Update the state of the socketmgr when something changes.
1099 select_poke(isc__socketmgr_t *manager, int fd, int msg) {
1100 if (msg == SELECT_POKE_SHUTDOWN)
1103 wakeup_socket(manager, fd, msg);
1106 #endif /* USE_WATCHER_THREAD */
1109 * Make a fd non-blocking.
1112 make_nonblock(int fd) {
1115 char strbuf[ISC_STRERRORSIZE];
1116 #ifdef USE_FIONBIO_IOCTL
1119 ret = ioctl(fd, FIONBIO, (char *)&on);
1121 flags = fcntl(fd, F_GETFL, 0);
1122 flags |= PORT_NONBLOCK;
1123 ret = fcntl(fd, F_SETFL, flags);
1127 isc__strerror(errno, strbuf, sizeof(strbuf));
1128 UNEXPECTED_ERROR(__FILE__, __LINE__,
1129 #ifdef USE_FIONBIO_IOCTL
1130 "ioctl(%d, FIONBIO, &on): %s", fd,
1132 "fcntl(%d, F_SETFL, %d): %s", fd, flags,
1136 return (ISC_R_UNEXPECTED);
1139 return (ISC_R_SUCCESS);
1144 * Not all OSes support advanced CMSG macros: CMSG_LEN and CMSG_SPACE.
1145 * In order to ensure as much portability as possible, we provide wrapper
1146 * functions of these macros.
1147 * Note that cmsg_space() could run slow on OSes that do not have
1150 static inline ISC_SOCKADDR_LEN_T
1151 cmsg_len(ISC_SOCKADDR_LEN_T len) {
1153 return (CMSG_LEN(len));
1155 ISC_SOCKADDR_LEN_T hdrlen;
1158 * Cast NULL so that any pointer arithmetic performed by CMSG_DATA
1161 hdrlen = (ISC_SOCKADDR_LEN_T)CMSG_DATA(((struct cmsghdr *)NULL));
1162 return (hdrlen + len);
1166 static inline ISC_SOCKADDR_LEN_T
1167 cmsg_space(ISC_SOCKADDR_LEN_T len) {
1169 return (CMSG_SPACE(len));
1172 struct cmsghdr *cmsgp;
1174 * XXX: The buffer length is an ad-hoc value, but should be enough
1175 * in a practical sense.
1177 char dummybuf[sizeof(struct cmsghdr) + 1024];
1179 memset(&msg, 0, sizeof(msg));
1180 msg.msg_control = dummybuf;
1181 msg.msg_controllen = sizeof(dummybuf);
1183 cmsgp = (struct cmsghdr *)dummybuf;
1184 cmsgp->cmsg_len = cmsg_len(len);
1186 cmsgp = CMSG_NXTHDR(&msg, cmsgp);
1188 return ((char *)cmsgp - (char *)msg.msg_control);
1193 #endif /* USE_CMSG */
1196 * Process control messages received on a socket.
1199 process_cmsg(isc__socket_t *sock, struct msghdr *msg, isc_socketevent_t *dev) {
1201 struct cmsghdr *cmsgp;
1202 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1203 struct in6_pktinfo *pktinfop;
1206 struct timeval *timevalp;
1211 * sock is used only when ISC_NET_BSD44MSGHDR and USE_CMSG are defined.
1212 * msg and dev are used only when ISC_NET_BSD44MSGHDR is defined.
1213 * They are all here, outside of the CPP tests, because it is
1214 * more consistent with the usual ISC coding style.
1220 #ifdef ISC_NET_BSD44MSGHDR
1223 if ((msg->msg_flags & MSG_TRUNC) == MSG_TRUNC)
1224 dev->attributes |= ISC_SOCKEVENTATTR_TRUNC;
1228 if ((msg->msg_flags & MSG_CTRUNC) == MSG_CTRUNC)
1229 dev->attributes |= ISC_SOCKEVENTATTR_CTRUNC;
1235 if (msg->msg_controllen == 0U || msg->msg_control == NULL)
1241 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1245 cmsgp = CMSG_FIRSTHDR(msg);
1246 while (cmsgp != NULL) {
1247 socket_log(sock, NULL, TRACE,
1248 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_PROCESSCMSG,
1249 "processing cmsg %p", cmsgp);
1251 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
1252 if (cmsgp->cmsg_level == IPPROTO_IPV6
1253 && cmsgp->cmsg_type == IPV6_PKTINFO) {
1255 pktinfop = (struct in6_pktinfo *)CMSG_DATA(cmsgp);
1256 memcpy(&dev->pktinfo, pktinfop,
1257 sizeof(struct in6_pktinfo));
1258 dev->attributes |= ISC_SOCKEVENTATTR_PKTINFO;
1259 socket_log(sock, NULL, TRACE,
1260 isc_msgcat, ISC_MSGSET_SOCKET,
1262 "interface received on ifindex %u",
1263 dev->pktinfo.ipi6_ifindex);
1264 if (IN6_IS_ADDR_MULTICAST(&pktinfop->ipi6_addr))
1265 dev->attributes |= ISC_SOCKEVENTATTR_MULTICAST;
1271 if (cmsgp->cmsg_level == SOL_SOCKET
1272 && cmsgp->cmsg_type == SCM_TIMESTAMP) {
1273 timevalp = (struct timeval *)CMSG_DATA(cmsgp);
1274 dev->timestamp.seconds = timevalp->tv_sec;
1275 dev->timestamp.nanoseconds = timevalp->tv_usec * 1000;
1276 dev->attributes |= ISC_SOCKEVENTATTR_TIMESTAMP;
1282 cmsgp = CMSG_NXTHDR(msg, cmsgp);
1284 #endif /* USE_CMSG */
1286 #endif /* ISC_NET_BSD44MSGHDR */
1290 * Construct an iov array and attach it to the msghdr passed in. This is
1291 * the SEND constructor, which will use the used region of the buffer
1292 * (if using a buffer list) or will use the internal region (if a single
1293 * buffer I/O is requested).
1295 * Nothing can be NULL, and the done event must list at least one buffer
1296 * on the buffer linked list for this function to be meaningful.
1298 * If write_countp != NULL, *write_countp will hold the number of bytes
1299 * this transaction can send.
1302 build_msghdr_send(isc__socket_t *sock, isc_socketevent_t *dev,
1303 struct msghdr *msg, struct iovec *iov, size_t *write_countp)
1305 unsigned int iovcount;
1306 isc_buffer_t *buffer;
1311 memset(msg, 0, sizeof(*msg));
1313 if (!sock->connected) {
1314 msg->msg_name = (void *)&dev->address.type.sa;
1315 msg->msg_namelen = dev->address.length;
1317 msg->msg_name = NULL;
1318 msg->msg_namelen = 0;
1321 buffer = ISC_LIST_HEAD(dev->bufferlist);
1326 * Single buffer I/O? Skip what we've done so far in this region.
1328 if (buffer == NULL) {
1329 write_count = dev->region.length - dev->n;
1330 iov[0].iov_base = (void *)(dev->region.base + dev->n);
1331 iov[0].iov_len = write_count;
1339 * Skip the data in the buffer list that we have already written.
1341 skip_count = dev->n;
1342 while (buffer != NULL) {
1343 REQUIRE(ISC_BUFFER_VALID(buffer));
1344 if (skip_count < isc_buffer_usedlength(buffer))
1346 skip_count -= isc_buffer_usedlength(buffer);
1347 buffer = ISC_LIST_NEXT(buffer, link);
1350 while (buffer != NULL) {
1351 INSIST(iovcount < MAXSCATTERGATHER_SEND);
1353 isc_buffer_usedregion(buffer, &used);
1355 if (used.length > 0) {
1356 iov[iovcount].iov_base = (void *)(used.base
1358 iov[iovcount].iov_len = used.length - skip_count;
1359 write_count += (used.length - skip_count);
1363 buffer = ISC_LIST_NEXT(buffer, link);
1366 INSIST(skip_count == 0U);
1370 msg->msg_iovlen = iovcount;
1372 #ifdef ISC_NET_BSD44MSGHDR
1373 msg->msg_control = NULL;
1374 msg->msg_controllen = 0;
1376 #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
1377 if ((sock->type == isc_sockettype_udp)
1378 && ((dev->attributes & ISC_SOCKEVENTATTR_PKTINFO) != 0)) {
1379 #if defined(IPV6_USE_MIN_MTU)
1380 int use_min_mtu = 1; /* -1, 0, 1 */
1382 struct cmsghdr *cmsgp;
1383 struct in6_pktinfo *pktinfop;
1385 socket_log(sock, NULL, TRACE,
1386 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_SENDTODATA,
1387 "sendto pktinfo data, ifindex %u",
1388 dev->pktinfo.ipi6_ifindex);
1390 msg->msg_controllen = cmsg_space(sizeof(struct in6_pktinfo));
1391 INSIST(msg->msg_controllen <= sock->sendcmsgbuflen);
1392 msg->msg_control = (void *)sock->sendcmsgbuf;
1394 cmsgp = (struct cmsghdr *)sock->sendcmsgbuf;
1395 cmsgp->cmsg_level = IPPROTO_IPV6;
1396 cmsgp->cmsg_type = IPV6_PKTINFO;
1397 cmsgp->cmsg_len = cmsg_len(sizeof(struct in6_pktinfo));
1398 pktinfop = (struct in6_pktinfo *)CMSG_DATA(cmsgp);
1399 memcpy(pktinfop, &dev->pktinfo, sizeof(struct in6_pktinfo));
1400 #if defined(IPV6_USE_MIN_MTU)
1402 * Set IPV6_USE_MIN_MTU as a per packet option as FreeBSD
1403 * ignores setsockopt(IPV6_USE_MIN_MTU) when IPV6_PKTINFO
1406 cmsgp = (struct cmsghdr *)(sock->sendcmsgbuf +
1407 msg->msg_controllen);
1408 msg->msg_controllen += cmsg_space(sizeof(use_min_mtu));
1409 INSIST(msg->msg_controllen <= sock->sendcmsgbuflen);
1411 cmsgp->cmsg_level = IPPROTO_IPV6;
1412 cmsgp->cmsg_type = IPV6_USE_MIN_MTU;
1413 cmsgp->cmsg_len = cmsg_len(sizeof(use_min_mtu));
1414 memcpy(CMSG_DATA(cmsgp), &use_min_mtu, sizeof(use_min_mtu));
1417 #endif /* USE_CMSG && ISC_PLATFORM_HAVEIPV6 */
1418 #else /* ISC_NET_BSD44MSGHDR */
1419 msg->msg_accrights = NULL;
1420 msg->msg_accrightslen = 0;
1421 #endif /* ISC_NET_BSD44MSGHDR */
1423 if (write_countp != NULL)
1424 *write_countp = write_count;
1428 * Construct an iov array and attach it to the msghdr passed in. This is
1429 * the RECV constructor, which will use the available region of the buffer
1430 * (if using a buffer list) or will use the internal region (if a single
1431 * buffer I/O is requested).
1433 * Nothing can be NULL, and the done event must list at least one buffer
1434 * on the buffer linked list for this function to be meaningful.
1436 * If read_countp != NULL, *read_countp will hold the number of bytes
1437 * this transaction can receive.
1440 build_msghdr_recv(isc__socket_t *sock, isc_socketevent_t *dev,
1441 struct msghdr *msg, struct iovec *iov, size_t *read_countp)
1443 unsigned int iovcount;
1444 isc_buffer_t *buffer;
1445 isc_region_t available;
1448 memset(msg, 0, sizeof(struct msghdr));
1450 if (sock->type == isc_sockettype_udp) {
1451 memset(&dev->address, 0, sizeof(dev->address));
1452 #ifdef BROKEN_RECVMSG
1453 if (sock->pf == AF_INET) {
1454 msg->msg_name = (void *)&dev->address.type.sin;
1455 msg->msg_namelen = sizeof(dev->address.type.sin6);
1456 } else if (sock->pf == AF_INET6) {
1457 msg->msg_name = (void *)&dev->address.type.sin6;
1458 msg->msg_namelen = sizeof(dev->address.type.sin6);
1459 #ifdef ISC_PLATFORM_HAVESYSUNH
1460 } else if (sock->pf == AF_UNIX) {
1461 msg->msg_name = (void *)&dev->address.type.sunix;
1462 msg->msg_namelen = sizeof(dev->address.type.sunix);
1465 msg->msg_name = (void *)&dev->address.type.sa;
1466 msg->msg_namelen = sizeof(dev->address.type);
1469 msg->msg_name = (void *)&dev->address.type.sa;
1470 msg->msg_namelen = sizeof(dev->address.type);
1472 #ifdef ISC_NET_RECVOVERFLOW
1473 /* If needed, steal one iovec for overflow detection. */
1477 msg->msg_name = NULL;
1478 msg->msg_namelen = 0;
1479 dev->address = sock->peer_address;
1482 buffer = ISC_LIST_HEAD(dev->bufferlist);
1486 * Single buffer I/O? Skip what we've done so far in this region.
1488 if (buffer == NULL) {
1489 read_count = dev->region.length - dev->n;
1490 iov[0].iov_base = (void *)(dev->region.base + dev->n);
1491 iov[0].iov_len = read_count;
1499 * Skip empty buffers.
1501 while (buffer != NULL) {
1502 REQUIRE(ISC_BUFFER_VALID(buffer));
1503 if (isc_buffer_availablelength(buffer) != 0)
1505 buffer = ISC_LIST_NEXT(buffer, link);
1509 while (buffer != NULL) {
1510 INSIST(iovcount < MAXSCATTERGATHER_RECV);
1512 isc_buffer_availableregion(buffer, &available);
1514 if (available.length > 0) {
1515 iov[iovcount].iov_base = (void *)(available.base);
1516 iov[iovcount].iov_len = available.length;
1517 read_count += available.length;
1520 buffer = ISC_LIST_NEXT(buffer, link);
1526 * If needed, set up to receive that one extra byte. Note that
1527 * we know there is at least one iov left, since we stole it
1528 * at the top of this function.
1530 #ifdef ISC_NET_RECVOVERFLOW
1531 if (sock->type == isc_sockettype_udp) {
1532 iov[iovcount].iov_base = (void *)(&sock->overflow);
1533 iov[iovcount].iov_len = 1;
1539 msg->msg_iovlen = iovcount;
1541 #ifdef ISC_NET_BSD44MSGHDR
1542 msg->msg_control = NULL;
1543 msg->msg_controllen = 0;
1545 #if defined(USE_CMSG)
1546 if (sock->type == isc_sockettype_udp) {
1547 msg->msg_control = sock->recvcmsgbuf;
1548 msg->msg_controllen = sock->recvcmsgbuflen;
1550 #endif /* USE_CMSG */
1551 #else /* ISC_NET_BSD44MSGHDR */
1552 msg->msg_accrights = NULL;
1553 msg->msg_accrightslen = 0;
1554 #endif /* ISC_NET_BSD44MSGHDR */
1556 if (read_countp != NULL)
1557 *read_countp = read_count;
1561 set_dev_address(isc_sockaddr_t *address, isc__socket_t *sock,
1562 isc_socketevent_t *dev)
1564 if (sock->type == isc_sockettype_udp) {
1565 if (address != NULL)
1566 dev->address = *address;
1568 dev->address = sock->peer_address;
1569 } else if (sock->type == isc_sockettype_tcp) {
1570 INSIST(address == NULL);
1571 dev->address = sock->peer_address;
1576 destroy_socketevent(isc_event_t *event) {
1577 isc_socketevent_t *ev = (isc_socketevent_t *)event;
1579 INSIST(ISC_LIST_EMPTY(ev->bufferlist));
1581 (ev->destroy)(event);
1584 static isc_socketevent_t *
1585 allocate_socketevent(isc__socket_t *sock, isc_eventtype_t eventtype,
1586 isc_taskaction_t action, const void *arg)
1588 isc_socketevent_t *ev;
1590 ev = (isc_socketevent_t *)isc_event_allocate(sock->manager->mctx,
1598 ev->result = ISC_R_UNSET;
1599 ISC_LINK_INIT(ev, ev_link);
1600 ISC_LIST_INIT(ev->bufferlist);
1601 ev->region.base = NULL;
1605 ev->destroy = ev->ev_destroy;
1606 ev->ev_destroy = destroy_socketevent;
1611 #if defined(ISC_SOCKET_DEBUG)
1613 dump_msg(struct msghdr *msg) {
1616 printf("MSGHDR %p\n", msg);
1617 printf("\tname %p, namelen %ld\n", msg->msg_name,
1618 (long) msg->msg_namelen);
1619 printf("\tiov %p, iovlen %ld\n", msg->msg_iov,
1620 (long) msg->msg_iovlen);
1621 for (i = 0; i < (unsigned int)msg->msg_iovlen; i++)
1622 printf("\t\t%d\tbase %p, len %ld\n", i,
1623 msg->msg_iov[i].iov_base,
1624 (long) msg->msg_iov[i].iov_len);
1625 #ifdef ISC_NET_BSD44MSGHDR
1626 printf("\tcontrol %p, controllen %ld\n", msg->msg_control,
1627 (long) msg->msg_controllen);
1632 #define DOIO_SUCCESS 0 /* i/o ok, event sent */
1633 #define DOIO_SOFT 1 /* i/o ok, soft error, no event sent */
1634 #define DOIO_HARD 2 /* i/o error, event sent */
1635 #define DOIO_EOF 3 /* EOF, no event sent */
1638 doio_recv(isc__socket_t *sock, isc_socketevent_t *dev) {
1640 struct iovec iov[MAXSCATTERGATHER_RECV];
1642 size_t actual_count;
1643 struct msghdr msghdr;
1644 isc_buffer_t *buffer;
1646 char strbuf[ISC_STRERRORSIZE];
1648 build_msghdr_recv(sock, dev, &msghdr, iov, &read_count);
1650 #if defined(ISC_SOCKET_DEBUG)
1654 cc = recvmsg(sock->fd, &msghdr, 0);
1657 #if defined(ISC_SOCKET_DEBUG)
1662 if (SOFT_ERROR(recv_errno))
1665 if (isc_log_wouldlog(isc_lctx, IOEVENT_LEVEL)) {
1666 isc__strerror(recv_errno, strbuf, sizeof(strbuf));
1667 socket_log(sock, NULL, IOEVENT,
1668 isc_msgcat, ISC_MSGSET_SOCKET,
1670 "doio_recv: recvmsg(%d) %d bytes, err %d/%s",
1671 sock->fd, cc, recv_errno, strbuf);
1674 #define SOFT_OR_HARD(_system, _isc) \
1675 if (recv_errno == _system) { \
1676 if (sock->connected) { \
1677 dev->result = _isc; \
1678 inc_stats(sock->manager->stats, \
1679 sock->statsindex[STATID_RECVFAIL]); \
1680 return (DOIO_HARD); \
1682 return (DOIO_SOFT); \
1684 #define ALWAYS_HARD(_system, _isc) \
1685 if (recv_errno == _system) { \
1686 dev->result = _isc; \
1687 inc_stats(sock->manager->stats, \
1688 sock->statsindex[STATID_RECVFAIL]); \
1689 return (DOIO_HARD); \
1692 SOFT_OR_HARD(ECONNREFUSED, ISC_R_CONNREFUSED);
1693 SOFT_OR_HARD(ENETUNREACH, ISC_R_NETUNREACH);
1694 SOFT_OR_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH);
1695 SOFT_OR_HARD(EHOSTDOWN, ISC_R_HOSTDOWN);
1696 /* HPUX 11.11 can return EADDRNOTAVAIL. */
1697 SOFT_OR_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
1698 ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES);
1700 * HPUX returns EPROTO and EINVAL on receiving some ICMP/ICMPv6
1704 SOFT_OR_HARD(EPROTO, ISC_R_HOSTUNREACH);
1706 SOFT_OR_HARD(EINVAL, ISC_R_HOSTUNREACH);
1711 dev->result = isc__errno2result(recv_errno);
1712 inc_stats(sock->manager->stats,
1713 sock->statsindex[STATID_RECVFAIL]);
1718 * On TCP and UNIX sockets, zero length reads indicate EOF,
1719 * while on UDP sockets, zero length reads are perfectly valid,
1722 switch (sock->type) {
1723 case isc_sockettype_tcp:
1724 case isc_sockettype_unix:
1728 case isc_sockettype_udp:
1730 case isc_sockettype_fdwatch:
1735 if (sock->type == isc_sockettype_udp) {
1736 dev->address.length = msghdr.msg_namelen;
1737 if (isc_sockaddr_getport(&dev->address) == 0) {
1738 if (isc_log_wouldlog(isc_lctx, IOEVENT_LEVEL)) {
1739 socket_log(sock, &dev->address, IOEVENT,
1740 isc_msgcat, ISC_MSGSET_SOCKET,
1742 "dropping source port zero packet");
1747 * Simulate a firewall blocking UDP responses bigger than
1750 if (sock->manager->maxudp != 0 && cc > sock->manager->maxudp)
1754 socket_log(sock, &dev->address, IOEVENT,
1755 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_PKTRECV,
1756 "packet received correctly");
1759 * Overflow bit detection. If we received MORE bytes than we should,
1760 * this indicates an overflow situation. Set the flag in the
1761 * dev entry and adjust how much we read by one.
1763 #ifdef ISC_NET_RECVOVERFLOW
1764 if ((sock->type == isc_sockettype_udp) && ((size_t)cc > read_count)) {
1765 dev->attributes |= ISC_SOCKEVENTATTR_TRUNC;
1771 * If there are control messages attached, run through them and pull
1772 * out the interesting bits.
1774 if (sock->type == isc_sockettype_udp)
1775 process_cmsg(sock, &msghdr, dev);
1778 * update the buffers (if any) and the i/o count
1782 buffer = ISC_LIST_HEAD(dev->bufferlist);
1783 while (buffer != NULL && actual_count > 0U) {
1784 REQUIRE(ISC_BUFFER_VALID(buffer));
1785 if (isc_buffer_availablelength(buffer) <= actual_count) {
1786 actual_count -= isc_buffer_availablelength(buffer);
1787 isc_buffer_add(buffer,
1788 isc_buffer_availablelength(buffer));
1790 isc_buffer_add(buffer, actual_count);
1795 buffer = ISC_LIST_NEXT(buffer, link);
1796 if (buffer == NULL) {
1797 INSIST(actual_count == 0U);
1802 * If we read less than we expected, update counters,
1803 * and let the upper layer poke the descriptor.
1805 if (((size_t)cc != read_count) && (dev->n < dev->minimum))
1809 * Full reads are posted, or partials if partials are ok.
1811 dev->result = ISC_R_SUCCESS;
1812 return (DOIO_SUCCESS);
1817 * DOIO_SUCCESS The operation succeeded. dev->result contains
1820 * DOIO_HARD A hard or unexpected I/O error was encountered.
1821 * dev->result contains the appropriate error.
1823 * DOIO_SOFT A soft I/O error was encountered. No senddone
1824 * event was sent. The operation should be retried.
1826 * No other return values are possible.
1829 doio_send(isc__socket_t *sock, isc_socketevent_t *dev) {
1831 struct iovec iov[MAXSCATTERGATHER_SEND];
1833 struct msghdr msghdr;
1834 char addrbuf[ISC_SOCKADDR_FORMATSIZE];
1837 char strbuf[ISC_STRERRORSIZE];
1839 build_msghdr_send(sock, dev, &msghdr, iov, &write_count);
1842 cc = sendmsg(sock->fd, &msghdr, 0);
1846 * Check for error or block condition.
1849 if (send_errno == EINTR && ++attempts < NRETRIES)
1852 if (SOFT_ERROR(send_errno))
1855 #define SOFT_OR_HARD(_system, _isc) \
1856 if (send_errno == _system) { \
1857 if (sock->connected) { \
1858 dev->result = _isc; \
1859 inc_stats(sock->manager->stats, \
1860 sock->statsindex[STATID_SENDFAIL]); \
1861 return (DOIO_HARD); \
1863 return (DOIO_SOFT); \
1865 #define ALWAYS_HARD(_system, _isc) \
1866 if (send_errno == _system) { \
1867 dev->result = _isc; \
1868 inc_stats(sock->manager->stats, \
1869 sock->statsindex[STATID_SENDFAIL]); \
1870 return (DOIO_HARD); \
1873 SOFT_OR_HARD(ECONNREFUSED, ISC_R_CONNREFUSED);
1874 ALWAYS_HARD(EACCES, ISC_R_NOPERM);
1875 ALWAYS_HARD(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
1876 ALWAYS_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
1877 ALWAYS_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH);
1879 ALWAYS_HARD(EHOSTDOWN, ISC_R_HOSTUNREACH);
1881 ALWAYS_HARD(ENETUNREACH, ISC_R_NETUNREACH);
1882 ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES);
1883 ALWAYS_HARD(EPERM, ISC_R_HOSTUNREACH);
1884 ALWAYS_HARD(EPIPE, ISC_R_NOTCONNECTED);
1885 ALWAYS_HARD(ECONNRESET, ISC_R_CONNECTIONRESET);
1891 * The other error types depend on whether or not the
1892 * socket is UDP or TCP. If it is UDP, some errors
1893 * that we expect to be fatal under TCP are merely
1894 * annoying, and are really soft errors.
1896 * However, these soft errors are still returned as
1899 isc_sockaddr_format(&dev->address, addrbuf, sizeof(addrbuf));
1900 isc__strerror(send_errno, strbuf, sizeof(strbuf));
1901 UNEXPECTED_ERROR(__FILE__, __LINE__, "internal_send: %s: %s",
1903 dev->result = isc__errno2result(send_errno);
1904 inc_stats(sock->manager->stats,
1905 sock->statsindex[STATID_SENDFAIL]);
1910 inc_stats(sock->manager->stats,
1911 sock->statsindex[STATID_SENDFAIL]);
1912 UNEXPECTED_ERROR(__FILE__, __LINE__,
1913 "doio_send: send() %s 0",
1914 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
1915 ISC_MSG_RETURNED, "returned"));
1919 * If we write less than we expected, update counters, poke.
1922 if ((size_t)cc != write_count)
1926 * Exactly what we wanted to write. We're done with this
1927 * entry. Post its completion event.
1929 dev->result = ISC_R_SUCCESS;
1930 return (DOIO_SUCCESS);
1936 * Caller must ensure that the socket is not locked and no external
1940 closesocket(isc__socketmgr_t *manager, isc__socket_t *sock, int fd) {
1941 isc_sockettype_t type = sock->type;
1942 int lockid = FDLOCK_ID(fd);
1945 * No one has this socket open, so the watcher doesn't have to be
1946 * poked, and the socket doesn't have to be locked.
1948 LOCK(&manager->fdlock[lockid]);
1949 manager->fds[fd] = NULL;
1950 if (type == isc_sockettype_fdwatch)
1951 manager->fdstate[fd] = CLOSED;
1953 manager->fdstate[fd] = CLOSE_PENDING;
1954 UNLOCK(&manager->fdlock[lockid]);
1955 if (type == isc_sockettype_fdwatch) {
1957 * The caller may close the socket once this function returns,
1958 * and `fd' may be reassigned for a new socket. So we do
1959 * unwatch_fd() here, rather than defer it via select_poke().
1960 * Note: this may complicate data protection among threads and
1961 * may reduce performance due to additional locks. One way to
1962 * solve this would be to dup() the watched descriptor, but we
1963 * take a simpler approach at this moment.
1965 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
1966 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
1968 select_poke(manager, fd, SELECT_POKE_CLOSE);
1970 inc_stats(manager->stats, sock->statsindex[STATID_CLOSE]);
1973 * update manager->maxfd here (XXX: this should be implemented more
1977 LOCK(&manager->lock);
1978 if (manager->maxfd == fd) {
1982 for (i = fd - 1; i >= 0; i--) {
1983 lockid = FDLOCK_ID(i);
1985 LOCK(&manager->fdlock[lockid]);
1986 if (manager->fdstate[i] == MANAGED) {
1988 UNLOCK(&manager->fdlock[lockid]);
1991 UNLOCK(&manager->fdlock[lockid]);
1993 #ifdef ISC_PLATFORM_USETHREADS
1994 if (manager->maxfd < manager->pipe_fds[0])
1995 manager->maxfd = manager->pipe_fds[0];
1998 UNLOCK(&manager->lock);
1999 #endif /* USE_SELECT */
2003 destroy(isc__socket_t **sockp) {
2005 isc__socket_t *sock = *sockp;
2006 isc__socketmgr_t *manager = sock->manager;
2008 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
2009 ISC_MSG_DESTROYING, "destroying");
2011 INSIST(ISC_LIST_EMPTY(sock->accept_list));
2012 INSIST(ISC_LIST_EMPTY(sock->recv_list));
2013 INSIST(ISC_LIST_EMPTY(sock->send_list));
2014 INSIST(sock->connect_ev == NULL);
2015 REQUIRE(sock->fd == -1 || sock->fd < (int)manager->maxsocks);
2017 if (sock->fd >= 0) {
2020 closesocket(manager, sock, fd);
2023 LOCK(&manager->lock);
2025 ISC_LIST_UNLINK(manager->socklist, sock, link);
2027 #ifdef USE_WATCHER_THREAD
2028 if (ISC_LIST_EMPTY(manager->socklist))
2029 SIGNAL(&manager->shutdown_ok);
2030 #endif /* USE_WATCHER_THREAD */
2032 /* can't unlock manager as its memory context is still used */
2035 UNLOCK(&manager->lock);
2039 allocate_socket(isc__socketmgr_t *manager, isc_sockettype_t type,
2040 isc__socket_t **socketp)
2042 isc__socket_t *sock;
2043 isc_result_t result;
2044 ISC_SOCKADDR_LEN_T cmsgbuflen;
2046 sock = isc_mem_get(manager->mctx, sizeof(*sock));
2049 return (ISC_R_NOMEMORY);
2051 sock->common.magic = 0;
2052 sock->common.impmagic = 0;
2053 sock->references = 0;
2055 sock->manager = manager;
2059 sock->statsindex = NULL;
2061 ISC_LINK_INIT(sock, link);
2063 sock->recvcmsgbuf = NULL;
2064 sock->sendcmsgbuf = NULL;
2067 * set up cmsg buffers
2070 #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
2071 cmsgbuflen += cmsg_space(sizeof(struct in6_pktinfo));
2073 #if defined(USE_CMSG) && defined(SO_TIMESTAMP)
2074 cmsgbuflen += cmsg_space(sizeof(struct timeval));
2076 sock->recvcmsgbuflen = cmsgbuflen;
2077 if (sock->recvcmsgbuflen != 0U) {
2078 sock->recvcmsgbuf = isc_mem_get(manager->mctx, cmsgbuflen);
2079 if (sock->recvcmsgbuf == NULL) {
2080 result = ISC_R_NOMEMORY;
2086 #if defined(USE_CMSG) && defined(ISC_PLATFORM_HAVEIN6PKTINFO)
2087 cmsgbuflen += cmsg_space(sizeof(struct in6_pktinfo));
2088 #if defined(IPV6_USE_MIN_MTU)
2090 * Provide space for working around FreeBSD's broken IPV6_USE_MIN_MTU
2093 cmsgbuflen += cmsg_space(sizeof(int));
2096 sock->sendcmsgbuflen = cmsgbuflen;
2097 if (sock->sendcmsgbuflen != 0U) {
2098 sock->sendcmsgbuf = isc_mem_get(manager->mctx, cmsgbuflen);
2099 if (sock->sendcmsgbuf == NULL) {
2100 result = ISC_R_NOMEMORY;
2105 memset(sock->name, 0, sizeof(sock->name));
2109 * set up list of readers and writers to be initially empty
2111 ISC_LIST_INIT(sock->recv_list);
2112 ISC_LIST_INIT(sock->send_list);
2113 ISC_LIST_INIT(sock->accept_list);
2114 sock->connect_ev = NULL;
2115 sock->pending_recv = 0;
2116 sock->pending_send = 0;
2117 sock->pending_accept = 0;
2119 sock->connected = 0;
2120 sock->connecting = 0;
2124 * initialize the lock
2126 result = isc_mutex_init(&sock->lock);
2127 if (result != ISC_R_SUCCESS) {
2128 sock->common.magic = 0;
2129 sock->common.impmagic = 0;
2134 * Initialize readable and writable events
2136 ISC_EVENT_INIT(&sock->readable_ev, sizeof(intev_t),
2137 ISC_EVENTATTR_NOPURGE, NULL, ISC_SOCKEVENT_INTR,
2138 NULL, sock, sock, NULL, NULL);
2139 ISC_EVENT_INIT(&sock->writable_ev, sizeof(intev_t),
2140 ISC_EVENTATTR_NOPURGE, NULL, ISC_SOCKEVENT_INTW,
2141 NULL, sock, sock, NULL, NULL);
2143 sock->common.magic = ISCAPI_SOCKET_MAGIC;
2144 sock->common.impmagic = SOCKET_MAGIC;
2147 return (ISC_R_SUCCESS);
2150 if (sock->recvcmsgbuf != NULL)
2151 isc_mem_put(manager->mctx, sock->recvcmsgbuf,
2152 sock->recvcmsgbuflen);
2153 if (sock->sendcmsgbuf != NULL)
2154 isc_mem_put(manager->mctx, sock->sendcmsgbuf,
2155 sock->sendcmsgbuflen);
2156 isc_mem_put(manager->mctx, sock, sizeof(*sock));
2162 * This event requires that the various lists be empty, that the reference
2163 * count be 1, and that the magic number is valid. The other socket bits,
2164 * like the lock, must be initialized as well. The fd associated must be
2165 * marked as closed, by setting it to -1 on close, or this routine will
2166 * also close the socket.
2169 free_socket(isc__socket_t **socketp) {
2170 isc__socket_t *sock = *socketp;
2172 INSIST(sock->references == 0);
2173 INSIST(VALID_SOCKET(sock));
2174 INSIST(!sock->connecting);
2175 INSIST(!sock->pending_recv);
2176 INSIST(!sock->pending_send);
2177 INSIST(!sock->pending_accept);
2178 INSIST(ISC_LIST_EMPTY(sock->recv_list));
2179 INSIST(ISC_LIST_EMPTY(sock->send_list));
2180 INSIST(ISC_LIST_EMPTY(sock->accept_list));
2181 INSIST(!ISC_LINK_LINKED(sock, link));
2183 if (sock->recvcmsgbuf != NULL)
2184 isc_mem_put(sock->manager->mctx, sock->recvcmsgbuf,
2185 sock->recvcmsgbuflen);
2186 if (sock->sendcmsgbuf != NULL)
2187 isc_mem_put(sock->manager->mctx, sock->sendcmsgbuf,
2188 sock->sendcmsgbuflen);
2190 sock->common.magic = 0;
2191 sock->common.impmagic = 0;
2193 DESTROYLOCK(&sock->lock);
2195 isc_mem_put(sock->manager->mctx, sock, sizeof(*sock));
2202 * This really should not be necessary to do. Having to workout
2203 * which kernel version we are on at run time so that we don't cause
2204 * the kernel to issue a warning about us using a deprecated socket option.
2205 * Such warnings should *never* be on by default in production kernels.
2207 * We can't do this a build time because executables are moved between
2208 * machines and hence kernels.
2210 * We can't just not set SO_BSDCOMAT because some kernels require it.
2213 static isc_once_t bsdcompat_once = ISC_ONCE_INIT;
2214 isc_boolean_t bsdcompat = ISC_TRUE;
2217 clear_bsdcompat(void) {
2224 uname(&buf); /* Can only fail if buf is bad in Linux. */
2226 /* Paranoia in parsing can be increased, but we trust uname(). */
2227 major = strtol(buf.release, &endp, 10);
2229 minor = strtol(endp+1, &endp, 10);
2230 if ((major > 2) || ((major == 2) && (minor >= 4))) {
2231 bsdcompat = ISC_FALSE;
2234 #endif /* __linux __ */
2239 opensocket(isc__socketmgr_t *manager, isc__socket_t *sock,
2240 isc__socket_t *dup_socket)
2242 isc_result_t result;
2243 char strbuf[ISC_STRERRORSIZE];
2244 const char *err = "socket";
2246 #if defined(USE_CMSG) || defined(SO_BSDCOMPAT)
2249 #if defined(SO_RCVBUF)
2250 ISC_SOCKADDR_LEN_T optlen;
2255 if (dup_socket == NULL) {
2256 switch (sock->type) {
2257 case isc_sockettype_udp:
2258 sock->fd = socket(sock->pf, SOCK_DGRAM, IPPROTO_UDP);
2260 case isc_sockettype_tcp:
2261 sock->fd = socket(sock->pf, SOCK_STREAM, IPPROTO_TCP);
2263 case isc_sockettype_unix:
2264 sock->fd = socket(sock->pf, SOCK_STREAM, 0);
2266 case isc_sockettype_fdwatch:
2268 * We should not be called for isc_sockettype_fdwatch
2275 sock->fd = dup(dup_socket->fd);
2277 sock->bound = dup_socket->bound;
2279 if (sock->fd == -1 && errno == EINTR && tries++ < 42)
2284 * Leave a space for stdio and TCP to work in.
2286 if (manager->reserved != 0 && sock->type == isc_sockettype_udp &&
2287 sock->fd >= 0 && sock->fd < manager->reserved) {
2289 new = fcntl(sock->fd, F_DUPFD, manager->reserved);
2291 (void)close(sock->fd);
2294 err = "isc_socket_create: fcntl/reserved";
2295 } else if (sock->fd >= 0 && sock->fd < 20) {
2297 new = fcntl(sock->fd, F_DUPFD, 20);
2299 (void)close(sock->fd);
2302 err = "isc_socket_create: fcntl";
2306 if (sock->fd >= (int)manager->maxsocks) {
2307 (void)close(sock->fd);
2308 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2309 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2310 isc_msgcat, ISC_MSGSET_SOCKET,
2312 "socket: file descriptor exceeds limit (%d/%u)",
2313 sock->fd, manager->maxsocks);
2314 return (ISC_R_NORESOURCES);
2321 isc__strerror(errno, strbuf, sizeof(strbuf));
2322 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
2323 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
2324 isc_msgcat, ISC_MSGSET_SOCKET,
2326 "%s: %s", err, strbuf);
2329 return (ISC_R_NORESOURCES);
2331 case EPROTONOSUPPORT:
2335 * Linux 2.2 (and maybe others) return EINVAL instead of
2339 return (ISC_R_FAMILYNOSUPPORT);
2342 isc__strerror(errno, strbuf, sizeof(strbuf));
2343 UNEXPECTED_ERROR(__FILE__, __LINE__,
2345 isc_msgcat_get(isc_msgcat,
2350 return (ISC_R_UNEXPECTED);
2354 if (dup_socket != NULL)
2357 result = make_nonblock(sock->fd);
2358 if (result != ISC_R_SUCCESS) {
2359 (void)close(sock->fd);
2364 RUNTIME_CHECK(isc_once_do(&bsdcompat_once,
2365 clear_bsdcompat) == ISC_R_SUCCESS);
2366 if (sock->type != isc_sockettype_unix && bsdcompat &&
2367 setsockopt(sock->fd, SOL_SOCKET, SO_BSDCOMPAT,
2368 (void *)&on, sizeof(on)) < 0) {
2369 isc__strerror(errno, strbuf, sizeof(strbuf));
2370 UNEXPECTED_ERROR(__FILE__, __LINE__,
2371 "setsockopt(%d, SO_BSDCOMPAT) %s: %s",
2373 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
2374 ISC_MSG_FAILED, "failed"),
2381 if (setsockopt(sock->fd, SOL_SOCKET, SO_NOSIGPIPE,
2382 (void *)&on, sizeof(on)) < 0) {
2383 isc__strerror(errno, strbuf, sizeof(strbuf));
2384 UNEXPECTED_ERROR(__FILE__, __LINE__,
2385 "setsockopt(%d, SO_NOSIGPIPE) %s: %s",
2387 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
2388 ISC_MSG_FAILED, "failed"),
2394 #if defined(USE_CMSG) || defined(SO_RCVBUF)
2395 if (sock->type == isc_sockettype_udp) {
2397 #if defined(USE_CMSG)
2398 #if defined(SO_TIMESTAMP)
2399 if (setsockopt(sock->fd, SOL_SOCKET, SO_TIMESTAMP,
2400 (void *)&on, sizeof(on)) < 0
2401 && errno != ENOPROTOOPT) {
2402 isc__strerror(errno, strbuf, sizeof(strbuf));
2403 UNEXPECTED_ERROR(__FILE__, __LINE__,
2404 "setsockopt(%d, SO_TIMESTAMP) %s: %s",
2406 isc_msgcat_get(isc_msgcat,
2413 #endif /* SO_TIMESTAMP */
2415 #if defined(ISC_PLATFORM_HAVEIPV6)
2416 if (sock->pf == AF_INET6 && sock->recvcmsgbuflen == 0U) {
2418 * Warn explicitly because this anomaly can be hidden
2419 * in usual operation (and unexpectedly appear later).
2421 UNEXPECTED_ERROR(__FILE__, __LINE__,
2422 "No buffer available to receive "
2423 "IPv6 destination");
2425 #ifdef ISC_PLATFORM_HAVEIN6PKTINFO
2426 #ifdef IPV6_RECVPKTINFO
2428 if ((sock->pf == AF_INET6)
2429 && (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_RECVPKTINFO,
2430 (void *)&on, sizeof(on)) < 0)) {
2431 isc__strerror(errno, strbuf, sizeof(strbuf));
2432 UNEXPECTED_ERROR(__FILE__, __LINE__,
2433 "setsockopt(%d, IPV6_RECVPKTINFO) "
2435 isc_msgcat_get(isc_msgcat,
2443 if ((sock->pf == AF_INET6)
2444 && (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_PKTINFO,
2445 (void *)&on, sizeof(on)) < 0)) {
2446 isc__strerror(errno, strbuf, sizeof(strbuf));
2447 UNEXPECTED_ERROR(__FILE__, __LINE__,
2448 "setsockopt(%d, IPV6_PKTINFO) %s: %s",
2450 isc_msgcat_get(isc_msgcat,
2456 #endif /* IPV6_RECVPKTINFO */
2457 #endif /* ISC_PLATFORM_HAVEIN6PKTINFO */
2458 #ifdef IPV6_USE_MIN_MTU /* RFC 3542, not too common yet*/
2459 /* use minimum MTU */
2460 if (sock->pf == AF_INET6 &&
2461 setsockopt(sock->fd, IPPROTO_IPV6, IPV6_USE_MIN_MTU,
2462 (void *)&on, sizeof(on)) < 0) {
2463 isc__strerror(errno, strbuf, sizeof(strbuf));
2464 UNEXPECTED_ERROR(__FILE__, __LINE__,
2465 "setsockopt(%d, IPV6_USE_MIN_MTU) "
2467 isc_msgcat_get(isc_msgcat,
2474 #if defined(IPV6_MTU)
2476 * Use minimum MTU on IPv6 sockets.
2478 if (sock->pf == AF_INET6) {
2480 (void)setsockopt(sock->fd, IPPROTO_IPV6, IPV6_MTU,
2484 #if defined(IPV6_MTU_DISCOVER) && defined(IPV6_PMTUDISC_DONT)
2486 * Turn off Path MTU discovery on IPv6/UDP sockets.
2488 if (sock->pf == AF_INET6) {
2489 int action = IPV6_PMTUDISC_DONT;
2490 (void)setsockopt(sock->fd, IPPROTO_IPV6,
2491 IPV6_MTU_DISCOVER, &action,
2495 #endif /* ISC_PLATFORM_HAVEIPV6 */
2496 #endif /* defined(USE_CMSG) */
2498 #if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
2500 * Turn off Path MTU discovery on IPv4/UDP sockets.
2502 if (sock->pf == AF_INET) {
2503 int action = IP_PMTUDISC_DONT;
2504 (void)setsockopt(sock->fd, IPPROTO_IP, IP_MTU_DISCOVER,
2505 &action, sizeof(action));
2508 #if defined(IP_DONTFRAG)
2510 * Turn off Path MTU discovery on IPv4/UDP sockets.
2512 if (sock->pf == AF_INET) {
2514 (void)setsockopt(sock->fd, IPPROTO_IP, IP_DONTFRAG,
2519 #if defined(SO_RCVBUF)
2520 optlen = sizeof(size);
2521 if (getsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF,
2522 (void *)&size, &optlen) >= 0 &&
2523 size < RCVBUFSIZE) {
2525 if (setsockopt(sock->fd, SOL_SOCKET, SO_RCVBUF,
2526 (void *)&size, sizeof(size)) == -1) {
2527 isc__strerror(errno, strbuf, sizeof(strbuf));
2528 UNEXPECTED_ERROR(__FILE__, __LINE__,
2529 "setsockopt(%d, SO_RCVBUF, %d) %s: %s",
2531 isc_msgcat_get(isc_msgcat,
2540 #endif /* defined(USE_CMSG) || defined(SO_RCVBUF) */
2543 inc_stats(manager->stats, sock->statsindex[STATID_OPEN]);
2545 return (ISC_R_SUCCESS);
2549 * Create a 'type' socket or duplicate an existing socket, managed
2550 * by 'manager'. Events will be posted to 'task' and when dispatched
2551 * 'action' will be called with 'arg' as the arg value. The new
2552 * socket is returned in 'socketp'.
2555 socket_create(isc_socketmgr_t *manager0, int pf, isc_sockettype_t type,
2556 isc_socket_t **socketp, isc_socket_t *dup_socket)
2558 isc__socket_t *sock = NULL;
2559 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
2560 isc_result_t result;
2563 REQUIRE(VALID_MANAGER(manager));
2564 REQUIRE(socketp != NULL && *socketp == NULL);
2565 REQUIRE(type != isc_sockettype_fdwatch);
2567 result = allocate_socket(manager, type, &sock);
2568 if (result != ISC_R_SUCCESS)
2571 switch (sock->type) {
2572 case isc_sockettype_udp:
2574 (pf == AF_INET) ? upd4statsindex : upd6statsindex;
2576 case isc_sockettype_tcp:
2578 (pf == AF_INET) ? tcp4statsindex : tcp6statsindex;
2580 case isc_sockettype_unix:
2581 sock->statsindex = unixstatsindex;
2589 result = opensocket(manager, sock, (isc__socket_t *)dup_socket);
2590 if (result != ISC_R_SUCCESS) {
2591 inc_stats(manager->stats, sock->statsindex[STATID_OPENFAIL]);
2596 sock->common.methods = (isc_socketmethods_t *)&socketmethods;
2597 sock->references = 1;
2598 *socketp = (isc_socket_t *)sock;
2601 * Note we don't have to lock the socket like we normally would because
2602 * there are no external references to it yet.
2605 lockid = FDLOCK_ID(sock->fd);
2606 LOCK(&manager->fdlock[lockid]);
2607 manager->fds[sock->fd] = sock;
2608 manager->fdstate[sock->fd] = MANAGED;
2610 INSIST(sock->manager->fdpollinfo[sock->fd].want_read == 0 &&
2611 sock->manager->fdpollinfo[sock->fd].want_write == 0);
2613 UNLOCK(&manager->fdlock[lockid]);
2615 LOCK(&manager->lock);
2616 ISC_LIST_APPEND(manager->socklist, sock, link);
2618 if (manager->maxfd < sock->fd)
2619 manager->maxfd = sock->fd;
2621 UNLOCK(&manager->lock);
2623 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
2624 ISC_MSG_CREATED, dup_socket == NULL ? "dupped" : "created");
2626 return (ISC_R_SUCCESS);
2630 * Create a new 'type' socket managed by 'manager'. Events
2631 * will be posted to 'task' and when dispatched 'action' will be
2632 * called with 'arg' as the arg value. The new socket is returned
2635 ISC_SOCKETFUNC_SCOPE isc_result_t
2636 isc__socket_create(isc_socketmgr_t *manager0, int pf, isc_sockettype_t type,
2637 isc_socket_t **socketp)
2639 return (socket_create(manager0, pf, type, socketp, NULL));
2643 * Duplicate an existing socket. The new socket is returned
2646 ISC_SOCKETFUNC_SCOPE isc_result_t
2647 isc__socket_dup(isc_socket_t *sock0, isc_socket_t **socketp) {
2648 isc__socket_t *sock = (isc__socket_t *)sock0;
2650 REQUIRE(VALID_SOCKET(sock));
2651 REQUIRE(socketp != NULL && *socketp == NULL);
2653 return (socket_create((isc_socketmgr_t *) sock->manager,
2654 sock->pf, sock->type, socketp,
2659 ISC_SOCKETFUNC_SCOPE isc_result_t
2660 isc__socket_open(isc_socket_t *sock0) {
2661 isc_result_t result;
2662 isc__socket_t *sock = (isc__socket_t *)sock0;
2664 REQUIRE(VALID_SOCKET(sock));
2667 REQUIRE(sock->references == 1);
2668 REQUIRE(sock->type != isc_sockettype_fdwatch);
2669 UNLOCK(&sock->lock);
2671 * We don't need to retain the lock hereafter, since no one else has
2674 REQUIRE(sock->fd == -1);
2676 result = opensocket(sock->manager, sock, NULL);
2677 if (result != ISC_R_SUCCESS)
2680 if (result == ISC_R_SUCCESS) {
2681 int lockid = FDLOCK_ID(sock->fd);
2683 LOCK(&sock->manager->fdlock[lockid]);
2684 sock->manager->fds[sock->fd] = sock;
2685 sock->manager->fdstate[sock->fd] = MANAGED;
2687 INSIST(sock->manager->fdpollinfo[sock->fd].want_read == 0 &&
2688 sock->manager->fdpollinfo[sock->fd].want_write == 0);
2690 UNLOCK(&sock->manager->fdlock[lockid]);
2693 LOCK(&sock->manager->lock);
2694 if (sock->manager->maxfd < sock->fd)
2695 sock->manager->maxfd = sock->fd;
2696 UNLOCK(&sock->manager->lock);
2705 * Create a new 'type' socket managed by 'manager'. Events
2706 * will be posted to 'task' and when dispatched 'action' will be
2707 * called with 'arg' as the arg value. The new socket is returned
2710 ISC_SOCKETFUNC_SCOPE isc_result_t
2711 isc__socket_fdwatchcreate(isc_socketmgr_t *manager0, int fd, int flags,
2712 isc_sockfdwatch_t callback, void *cbarg,
2713 isc_task_t *task, isc_socket_t **socketp)
2715 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
2716 isc__socket_t *sock = NULL;
2717 isc_result_t result;
2720 REQUIRE(VALID_MANAGER(manager));
2721 REQUIRE(socketp != NULL && *socketp == NULL);
2723 result = allocate_socket(manager, isc_sockettype_fdwatch, &sock);
2724 if (result != ISC_R_SUCCESS)
2728 sock->fdwatcharg = cbarg;
2729 sock->fdwatchcb = callback;
2730 sock->fdwatchflags = flags;
2731 sock->fdwatchtask = task;
2732 sock->statsindex = fdwatchstatsindex;
2734 sock->common.methods = (isc_socketmethods_t *)&socketmethods;
2735 sock->references = 1;
2736 *socketp = (isc_socket_t *)sock;
2739 * Note we don't have to lock the socket like we normally would because
2740 * there are no external references to it yet.
2743 lockid = FDLOCK_ID(sock->fd);
2744 LOCK(&manager->fdlock[lockid]);
2745 manager->fds[sock->fd] = sock;
2746 manager->fdstate[sock->fd] = MANAGED;
2747 UNLOCK(&manager->fdlock[lockid]);
2749 LOCK(&manager->lock);
2750 ISC_LIST_APPEND(manager->socklist, sock, link);
2752 if (manager->maxfd < sock->fd)
2753 manager->maxfd = sock->fd;
2755 UNLOCK(&manager->lock);
2757 if (flags & ISC_SOCKFDWATCH_READ)
2758 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
2759 if (flags & ISC_SOCKFDWATCH_WRITE)
2760 select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
2762 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
2763 ISC_MSG_CREATED, "fdwatch-created");
2765 return (ISC_R_SUCCESS);
2769 * Indicate to the manager that it should watch the socket again.
2770 * This can be used to restart watching if the previous event handler
2771 * didn't indicate there was more data to be processed. Primarily
2772 * it is for writing but could be used for reading if desired
2775 ISC_SOCKETFUNC_SCOPE isc_result_t
2776 isc__socket_fdwatchpoke(isc_socket_t *sock0, int flags)
2778 isc__socket_t *sock = (isc__socket_t *)sock0;
2780 REQUIRE(VALID_SOCKET(sock));
2783 * We check both flags first to allow us to get the lock
2784 * once but only if we need it.
2787 if ((flags & (ISC_SOCKFDWATCH_READ | ISC_SOCKFDWATCH_WRITE)) != 0) {
2789 if (((flags & ISC_SOCKFDWATCH_READ) != 0) &&
2790 !sock->pending_recv)
2791 select_poke(sock->manager, sock->fd,
2793 if (((flags & ISC_SOCKFDWATCH_WRITE) != 0) &&
2794 !sock->pending_send)
2795 select_poke(sock->manager, sock->fd,
2797 UNLOCK(&sock->lock);
2800 socket_log(sock, NULL, TRACE, isc_msgcat, ISC_MSGSET_SOCKET,
2801 ISC_MSG_POKED, "fdwatch-poked flags: %d", flags);
2803 return (ISC_R_SUCCESS);
2807 * Attach to a socket. Caller must explicitly detach when it is done.
2809 ISC_SOCKETFUNC_SCOPE void
2810 isc__socket_attach(isc_socket_t *sock0, isc_socket_t **socketp) {
2811 isc__socket_t *sock = (isc__socket_t *)sock0;
2813 REQUIRE(VALID_SOCKET(sock));
2814 REQUIRE(socketp != NULL && *socketp == NULL);
2818 UNLOCK(&sock->lock);
2820 *socketp = (isc_socket_t *)sock;
2824 * Dereference a socket. If this is the last reference to it, clean things
2825 * up by destroying the socket.
2827 ISC_SOCKETFUNC_SCOPE void
2828 isc__socket_detach(isc_socket_t **socketp) {
2829 isc__socket_t *sock;
2830 isc_boolean_t kill_socket = ISC_FALSE;
2832 REQUIRE(socketp != NULL);
2833 sock = (isc__socket_t *)*socketp;
2834 REQUIRE(VALID_SOCKET(sock));
2837 REQUIRE(sock->references > 0);
2839 if (sock->references == 0)
2840 kill_socket = ISC_TRUE;
2841 UNLOCK(&sock->lock);
2850 ISC_SOCKETFUNC_SCOPE isc_result_t
2851 isc__socket_close(isc_socket_t *sock0) {
2852 isc__socket_t *sock = (isc__socket_t *)sock0;
2854 isc__socketmgr_t *manager;
2857 REQUIRE(VALID_SOCKET(sock));
2861 REQUIRE(sock->references == 1);
2862 REQUIRE(sock->type != isc_sockettype_fdwatch);
2863 REQUIRE(sock->fd >= 0 && sock->fd < (int)sock->manager->maxsocks);
2865 INSIST(!sock->connecting);
2866 INSIST(!sock->pending_recv);
2867 INSIST(!sock->pending_send);
2868 INSIST(!sock->pending_accept);
2869 INSIST(ISC_LIST_EMPTY(sock->recv_list));
2870 INSIST(ISC_LIST_EMPTY(sock->send_list));
2871 INSIST(ISC_LIST_EMPTY(sock->accept_list));
2872 INSIST(sock->connect_ev == NULL);
2874 manager = sock->manager;
2878 memset(sock->name, 0, sizeof(sock->name));
2881 sock->connected = 0;
2882 sock->connecting = 0;
2884 isc_sockaddr_any(&sock->peer_address);
2886 UNLOCK(&sock->lock);
2888 closesocket(manager, sock, fd);
2890 return (ISC_R_SUCCESS);
2895 * I/O is possible on a given socket. Schedule an event to this task that
2896 * will call an internal function to do the I/O. This will charge the
2897 * task with the I/O operation and let our select loop handler get back
2898 * to doing something real as fast as possible.
2900 * The socket and manager must be locked before calling this function.
2903 dispatch_recv(isc__socket_t *sock) {
2905 isc_socketevent_t *ev;
2908 INSIST(!sock->pending_recv);
2910 if (sock->type != isc_sockettype_fdwatch) {
2911 ev = ISC_LIST_HEAD(sock->recv_list);
2914 socket_log(sock, NULL, EVENT, NULL, 0, 0,
2915 "dispatch_recv: event %p -> task %p",
2917 sender = ev->ev_sender;
2919 sender = sock->fdwatchtask;
2922 sock->pending_recv = 1;
2923 iev = &sock->readable_ev;
2926 iev->ev_sender = sock;
2927 if (sock->type == isc_sockettype_fdwatch)
2928 iev->ev_action = internal_fdwatch_read;
2930 iev->ev_action = internal_recv;
2933 isc_task_send(sender, (isc_event_t **)&iev);
2937 dispatch_send(isc__socket_t *sock) {
2939 isc_socketevent_t *ev;
2942 INSIST(!sock->pending_send);
2944 if (sock->type != isc_sockettype_fdwatch) {
2945 ev = ISC_LIST_HEAD(sock->send_list);
2948 socket_log(sock, NULL, EVENT, NULL, 0, 0,
2949 "dispatch_send: event %p -> task %p",
2951 sender = ev->ev_sender;
2953 sender = sock->fdwatchtask;
2956 sock->pending_send = 1;
2957 iev = &sock->writable_ev;
2960 iev->ev_sender = sock;
2961 if (sock->type == isc_sockettype_fdwatch)
2962 iev->ev_action = internal_fdwatch_write;
2964 iev->ev_action = internal_send;
2967 isc_task_send(sender, (isc_event_t **)&iev);
2971 * Dispatch an internal accept event.
2974 dispatch_accept(isc__socket_t *sock) {
2976 isc_socket_newconnev_t *ev;
2978 INSIST(!sock->pending_accept);
2981 * Are there any done events left, or were they all canceled
2982 * before the manager got the socket lock?
2984 ev = ISC_LIST_HEAD(sock->accept_list);
2988 sock->pending_accept = 1;
2989 iev = &sock->readable_ev;
2991 sock->references++; /* keep socket around for this internal event */
2992 iev->ev_sender = sock;
2993 iev->ev_action = internal_accept;
2996 isc_task_send(ev->ev_sender, (isc_event_t **)&iev);
3000 dispatch_connect(isc__socket_t *sock) {
3002 isc_socket_connev_t *ev;
3004 iev = &sock->writable_ev;
3006 ev = sock->connect_ev;
3007 INSIST(ev != NULL); /* XXX */
3009 INSIST(sock->connecting);
3011 sock->references++; /* keep socket around for this internal event */
3012 iev->ev_sender = sock;
3013 iev->ev_action = internal_connect;
3016 isc_task_send(ev->ev_sender, (isc_event_t **)&iev);
3020 * Dequeue an item off the given socket's read queue, set the result code
3021 * in the done event to the one provided, and send it to the task it was
3024 * If the event to be sent is on a list, remove it before sending. If
3025 * asked to, send and detach from the socket as well.
3027 * Caller must have the socket locked if the event is attached to the socket.
3030 send_recvdone_event(isc__socket_t *sock, isc_socketevent_t **dev) {
3033 task = (*dev)->ev_sender;
3035 (*dev)->ev_sender = sock;
3037 if (ISC_LINK_LINKED(*dev, ev_link))
3038 ISC_LIST_DEQUEUE(sock->recv_list, *dev, ev_link);
3040 if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
3041 == ISC_SOCKEVENTATTR_ATTACHED)
3042 isc_task_sendanddetach(&task, (isc_event_t **)dev);
3044 isc_task_send(task, (isc_event_t **)dev);
3048 * See comments for send_recvdone_event() above.
3050 * Caller must have the socket locked if the event is attached to the socket.
3053 send_senddone_event(isc__socket_t *sock, isc_socketevent_t **dev) {
3056 INSIST(dev != NULL && *dev != NULL);
3058 task = (*dev)->ev_sender;
3059 (*dev)->ev_sender = sock;
3061 if (ISC_LINK_LINKED(*dev, ev_link))
3062 ISC_LIST_DEQUEUE(sock->send_list, *dev, ev_link);
3064 if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
3065 == ISC_SOCKEVENTATTR_ATTACHED)
3066 isc_task_sendanddetach(&task, (isc_event_t **)dev);
3068 isc_task_send(task, (isc_event_t **)dev);
3072 * Call accept() on a socket, to get the new file descriptor. The listen
3073 * socket is used as a prototype to create a new isc_socket_t. The new
3074 * socket has one outstanding reference. The task receiving the event
3075 * will be detached from just after the event is delivered.
3077 * On entry to this function, the event delivered is the internal
3078 * readable event, and the first item on the accept_list should be
3079 * the done event we want to send. If the list is empty, this is a no-op,
3080 * so just unlock and return.
3083 internal_accept(isc_task_t *me, isc_event_t *ev) {
3084 isc__socket_t *sock;
3085 isc__socketmgr_t *manager;
3086 isc_socket_newconnev_t *dev;
3088 ISC_SOCKADDR_LEN_T addrlen;
3090 isc_result_t result = ISC_R_SUCCESS;
3091 char strbuf[ISC_STRERRORSIZE];
3092 const char *err = "accept";
3096 sock = ev->ev_sender;
3097 INSIST(VALID_SOCKET(sock));
3100 socket_log(sock, NULL, TRACE,
3101 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_ACCEPTLOCK,
3102 "internal_accept called, locked socket");
3104 manager = sock->manager;
3105 INSIST(VALID_MANAGER(manager));
3107 INSIST(sock->listener);
3108 INSIST(sock->pending_accept == 1);
3109 sock->pending_accept = 0;
3111 INSIST(sock->references > 0);
3112 sock->references--; /* the internal event is done with this socket */
3113 if (sock->references == 0) {
3114 UNLOCK(&sock->lock);
3120 * Get the first item off the accept list.
3121 * If it is empty, unlock the socket and return.
3123 dev = ISC_LIST_HEAD(sock->accept_list);
3125 UNLOCK(&sock->lock);
3130 * Try to accept the new connection. If the accept fails with
3131 * EAGAIN or EINTR, simply poke the watcher to watch this socket
3132 * again. Also ignore ECONNRESET, which has been reported to
3133 * be spuriously returned on Linux 2.2.19 although it is not
3134 * a documented error for accept(). ECONNABORTED has been
3135 * reported for Solaris 8. The rest are thrown in not because
3136 * we have seen them but because they are ignored by other
3137 * daemons such as BIND 8 and Apache.
3140 addrlen = sizeof(NEWCONNSOCK(dev)->peer_address.type);
3141 memset(&NEWCONNSOCK(dev)->peer_address.type, 0, addrlen);
3142 fd = accept(sock->fd, &NEWCONNSOCK(dev)->peer_address.type.sa,
3147 * Leave a space for stdio to work in.
3149 if (fd >= 0 && fd < 20) {
3151 new = fcntl(fd, F_DUPFD, 20);
3156 err = "accept/fcntl";
3161 if (SOFT_ERROR(errno))
3166 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
3167 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
3168 isc_msgcat, ISC_MSGSET_SOCKET,
3170 "%s: too many open file descriptors",
3193 isc__strerror(errno, strbuf, sizeof(strbuf));
3194 UNEXPECTED_ERROR(__FILE__, __LINE__,
3195 "internal_accept: %s() %s: %s", err,
3196 isc_msgcat_get(isc_msgcat,
3202 result = ISC_R_UNEXPECTED;
3204 if (addrlen == 0U) {
3205 UNEXPECTED_ERROR(__FILE__, __LINE__,
3206 "internal_accept(): "
3207 "accept() failed to return "
3212 } else if (NEWCONNSOCK(dev)->peer_address.type.sa.sa_family !=
3215 UNEXPECTED_ERROR(__FILE__, __LINE__,
3216 "internal_accept(): "
3217 "accept() returned peer address "
3218 "family %u (expected %u)",
3219 NEWCONNSOCK(dev)->peer_address.
3224 } else if (fd >= (int)manager->maxsocks) {
3225 isc_log_iwrite(isc_lctx, ISC_LOGCATEGORY_GENERAL,
3226 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
3227 isc_msgcat, ISC_MSGSET_SOCKET,
3230 "file descriptor exceeds limit (%d/%u)",
3231 fd, manager->maxsocks);
3238 NEWCONNSOCK(dev)->peer_address.length = addrlen;
3239 NEWCONNSOCK(dev)->pf = sock->pf;
3243 * Pull off the done event.
3245 ISC_LIST_UNLINK(sock->accept_list, dev, ev_link);
3248 * Poke watcher if there are more pending accepts.
3250 if (!ISC_LIST_EMPTY(sock->accept_list))
3251 select_poke(sock->manager, sock->fd, SELECT_POKE_ACCEPT);
3253 UNLOCK(&sock->lock);
3256 result = make_nonblock(fd);
3257 if (result != ISC_R_SUCCESS) {
3264 * -1 means the new socket didn't happen.
3267 int lockid = FDLOCK_ID(fd);
3269 LOCK(&manager->fdlock[lockid]);
3270 manager->fds[fd] = NEWCONNSOCK(dev);
3271 manager->fdstate[fd] = MANAGED;
3272 UNLOCK(&manager->fdlock[lockid]);
3274 LOCK(&manager->lock);
3275 ISC_LIST_APPEND(manager->socklist, NEWCONNSOCK(dev), link);
3277 NEWCONNSOCK(dev)->fd = fd;
3278 NEWCONNSOCK(dev)->bound = 1;
3279 NEWCONNSOCK(dev)->connected = 1;
3282 * Save away the remote address
3284 dev->address = NEWCONNSOCK(dev)->peer_address;
3287 if (manager->maxfd < fd)
3288 manager->maxfd = fd;
3291 socket_log(sock, &NEWCONNSOCK(dev)->peer_address, CREATION,
3292 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_ACCEPTEDCXN,
3293 "accepted connection, new socket %p",
3296 UNLOCK(&manager->lock);
3298 inc_stats(manager->stats, sock->statsindex[STATID_ACCEPT]);
3300 inc_stats(manager->stats, sock->statsindex[STATID_ACCEPTFAIL]);
3301 NEWCONNSOCK(dev)->references--;
3302 free_socket((isc__socket_t **)&dev->newsocket);
3306 * Fill in the done event details and send it off.
3308 dev->result = result;
3309 task = dev->ev_sender;
3310 dev->ev_sender = sock;
3312 isc_task_sendanddetach(&task, ISC_EVENT_PTR(&dev));
3316 select_poke(sock->manager, sock->fd, SELECT_POKE_ACCEPT);
3317 UNLOCK(&sock->lock);
3319 inc_stats(manager->stats, sock->statsindex[STATID_ACCEPTFAIL]);
3324 internal_recv(isc_task_t *me, isc_event_t *ev) {
3325 isc_socketevent_t *dev;
3326 isc__socket_t *sock;
3328 INSIST(ev->ev_type == ISC_SOCKEVENT_INTR);
3330 sock = ev->ev_sender;
3331 INSIST(VALID_SOCKET(sock));
3334 socket_log(sock, NULL, IOEVENT,
3335 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALRECV,
3336 "internal_recv: task %p got event %p", me, ev);
3338 INSIST(sock->pending_recv == 1);
3339 sock->pending_recv = 0;
3341 INSIST(sock->references > 0);
3342 sock->references--; /* the internal event is done with this socket */
3343 if (sock->references == 0) {
3344 UNLOCK(&sock->lock);
3350 * Try to do as much I/O as possible on this socket. There are no
3351 * limits here, currently.
3353 dev = ISC_LIST_HEAD(sock->recv_list);
3354 while (dev != NULL) {
3355 switch (doio_recv(sock, dev)) {
3361 * read of 0 means the remote end was closed.
3362 * Run through the event queue and dispatch all
3363 * the events with an EOF result code.
3366 dev->result = ISC_R_EOF;
3367 send_recvdone_event(sock, &dev);
3368 dev = ISC_LIST_HEAD(sock->recv_list);
3369 } while (dev != NULL);
3374 send_recvdone_event(sock, &dev);
3378 dev = ISC_LIST_HEAD(sock->recv_list);
3382 if (!ISC_LIST_EMPTY(sock->recv_list))
3383 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
3385 UNLOCK(&sock->lock);
3389 internal_send(isc_task_t *me, isc_event_t *ev) {
3390 isc_socketevent_t *dev;
3391 isc__socket_t *sock;
3393 INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
3396 * Find out what socket this is and lock it.
3398 sock = (isc__socket_t *)ev->ev_sender;
3399 INSIST(VALID_SOCKET(sock));
3402 socket_log(sock, NULL, IOEVENT,
3403 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALSEND,
3404 "internal_send: task %p got event %p", me, ev);
3406 INSIST(sock->pending_send == 1);
3407 sock->pending_send = 0;
3409 INSIST(sock->references > 0);
3410 sock->references--; /* the internal event is done with this socket */
3411 if (sock->references == 0) {
3412 UNLOCK(&sock->lock);
3418 * Try to do as much I/O as possible on this socket. There are no
3419 * limits here, currently.
3421 dev = ISC_LIST_HEAD(sock->send_list);
3422 while (dev != NULL) {
3423 switch (doio_send(sock, dev)) {
3429 send_senddone_event(sock, &dev);
3433 dev = ISC_LIST_HEAD(sock->send_list);
3437 if (!ISC_LIST_EMPTY(sock->send_list))
3438 select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
3440 UNLOCK(&sock->lock);
3444 internal_fdwatch_write(isc_task_t *me, isc_event_t *ev) {
3445 isc__socket_t *sock;
3448 INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
3451 * Find out what socket this is and lock it.
3453 sock = (isc__socket_t *)ev->ev_sender;
3454 INSIST(VALID_SOCKET(sock));
3457 socket_log(sock, NULL, IOEVENT,
3458 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALSEND,
3459 "internal_fdwatch_write: task %p got event %p", me, ev);
3461 INSIST(sock->pending_send == 1);
3463 UNLOCK(&sock->lock);
3464 more_data = (sock->fdwatchcb)(me, (isc_socket_t *)sock,
3465 sock->fdwatcharg, ISC_SOCKFDWATCH_WRITE);
3468 sock->pending_send = 0;
3470 INSIST(sock->references > 0);
3471 sock->references--; /* the internal event is done with this socket */
3472 if (sock->references == 0) {
3473 UNLOCK(&sock->lock);
3479 select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
3481 UNLOCK(&sock->lock);
3485 internal_fdwatch_read(isc_task_t *me, isc_event_t *ev) {
3486 isc__socket_t *sock;
3489 INSIST(ev->ev_type == ISC_SOCKEVENT_INTR);
3492 * Find out what socket this is and lock it.
3494 sock = (isc__socket_t *)ev->ev_sender;
3495 INSIST(VALID_SOCKET(sock));
3498 socket_log(sock, NULL, IOEVENT,
3499 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_INTERNALRECV,
3500 "internal_fdwatch_read: task %p got event %p", me, ev);
3502 INSIST(sock->pending_recv == 1);
3504 UNLOCK(&sock->lock);
3505 more_data = (sock->fdwatchcb)(me, (isc_socket_t *)sock,
3506 sock->fdwatcharg, ISC_SOCKFDWATCH_READ);
3509 sock->pending_recv = 0;
3511 INSIST(sock->references > 0);
3512 sock->references--; /* the internal event is done with this socket */
3513 if (sock->references == 0) {
3514 UNLOCK(&sock->lock);
3520 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
3522 UNLOCK(&sock->lock);
3526 * Process read/writes on each fd here. Avoid locking
3527 * and unlocking twice if both reads and writes are possible.
3530 process_fd(isc__socketmgr_t *manager, int fd, isc_boolean_t readable,
3531 isc_boolean_t writeable)
3533 isc__socket_t *sock;
3534 isc_boolean_t unlock_sock;
3535 isc_boolean_t unwatch_read = ISC_FALSE, unwatch_write = ISC_FALSE;
3536 int lockid = FDLOCK_ID(fd);
3539 * If the socket is going to be closed, don't do more I/O.
3541 LOCK(&manager->fdlock[lockid]);
3542 if (manager->fdstate[fd] == CLOSE_PENDING) {
3543 UNLOCK(&manager->fdlock[lockid]);
3545 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
3546 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
3550 sock = manager->fds[fd];
3551 unlock_sock = ISC_FALSE;
3554 unwatch_read = ISC_TRUE;
3557 unlock_sock = ISC_TRUE;
3559 if (!SOCK_DEAD(sock)) {
3561 dispatch_accept(sock);
3563 dispatch_recv(sock);
3565 unwatch_read = ISC_TRUE;
3570 unwatch_write = ISC_TRUE;
3574 unlock_sock = ISC_TRUE;
3577 if (!SOCK_DEAD(sock)) {
3578 if (sock->connecting)
3579 dispatch_connect(sock);
3581 dispatch_send(sock);
3583 unwatch_write = ISC_TRUE;
3586 UNLOCK(&sock->lock);
3589 UNLOCK(&manager->fdlock[lockid]);
3591 (void)unwatch_fd(manager, fd, SELECT_POKE_READ);
3593 (void)unwatch_fd(manager, fd, SELECT_POKE_WRITE);
3598 static isc_boolean_t
3599 process_fds(isc__socketmgr_t *manager, struct kevent *events, int nevents) {
3601 isc_boolean_t readable, writable;
3602 isc_boolean_t done = ISC_FALSE;
3603 #ifdef USE_WATCHER_THREAD
3604 isc_boolean_t have_ctlevent = ISC_FALSE;
3607 if (nevents == manager->nevents) {
3609 * This is not an error, but something unexpected. If this
3610 * happens, it may indicate the need for increasing
3611 * ISC_SOCKET_MAXEVENTS.
3613 manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3614 ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3615 "maximum number of FD events (%d) received",
3619 for (i = 0; i < nevents; i++) {
3620 REQUIRE(events[i].ident < manager->maxsocks);
3621 #ifdef USE_WATCHER_THREAD
3622 if (events[i].ident == (uintptr_t)manager->pipe_fds[0]) {
3623 have_ctlevent = ISC_TRUE;
3627 readable = ISC_TF(events[i].filter == EVFILT_READ);
3628 writable = ISC_TF(events[i].filter == EVFILT_WRITE);
3629 process_fd(manager, events[i].ident, readable, writable);
3632 #ifdef USE_WATCHER_THREAD
3634 done = process_ctlfd(manager);
3639 #elif defined(USE_EPOLL)
3640 static isc_boolean_t
3641 process_fds(isc__socketmgr_t *manager, struct epoll_event *events, int nevents)
3644 isc_boolean_t done = ISC_FALSE;
3645 #ifdef USE_WATCHER_THREAD
3646 isc_boolean_t have_ctlevent = ISC_FALSE;
3649 if (nevents == manager->nevents) {
3650 manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3651 ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3652 "maximum number of FD events (%d) received",
3656 for (i = 0; i < nevents; i++) {
3657 REQUIRE(events[i].data.fd < (int)manager->maxsocks);
3658 #ifdef USE_WATCHER_THREAD
3659 if (events[i].data.fd == manager->pipe_fds[0]) {
3660 have_ctlevent = ISC_TRUE;
3664 if ((events[i].events & EPOLLERR) != 0 ||
3665 (events[i].events & EPOLLHUP) != 0) {
3667 * epoll does not set IN/OUT bits on an erroneous
3668 * condition, so we need to try both anyway. This is a
3669 * bit inefficient, but should be okay for such rare
3670 * events. Note also that the read or write attempt
3671 * won't block because we use non-blocking sockets.
3673 events[i].events |= (EPOLLIN | EPOLLOUT);
3675 process_fd(manager, events[i].data.fd,
3676 (events[i].events & EPOLLIN) != 0,
3677 (events[i].events & EPOLLOUT) != 0);
3680 #ifdef USE_WATCHER_THREAD
3682 done = process_ctlfd(manager);
3687 #elif defined(USE_DEVPOLL)
3688 static isc_boolean_t
3689 process_fds(isc__socketmgr_t *manager, struct pollfd *events, int nevents) {
3691 isc_boolean_t done = ISC_FALSE;
3692 #ifdef USE_WATCHER_THREAD
3693 isc_boolean_t have_ctlevent = ISC_FALSE;
3696 if (nevents == manager->nevents) {
3697 manager_log(manager, ISC_LOGCATEGORY_GENERAL,
3698 ISC_LOGMODULE_SOCKET, ISC_LOG_INFO,
3699 "maximum number of FD events (%d) received",
3703 for (i = 0; i < nevents; i++) {
3704 REQUIRE(events[i].fd < (int)manager->maxsocks);
3705 #ifdef USE_WATCHER_THREAD
3706 if (events[i].fd == manager->pipe_fds[0]) {
3707 have_ctlevent = ISC_TRUE;
3711 process_fd(manager, events[i].fd,
3712 (events[i].events & POLLIN) != 0,
3713 (events[i].events & POLLOUT) != 0);
3716 #ifdef USE_WATCHER_THREAD
3718 done = process_ctlfd(manager);
3723 #elif defined(USE_SELECT)
3725 process_fds(isc__socketmgr_t *manager, int maxfd, fd_set *readfds,
3730 REQUIRE(maxfd <= (int)manager->maxsocks);
3732 for (i = 0; i < maxfd; i++) {
3733 #ifdef USE_WATCHER_THREAD
3734 if (i == manager->pipe_fds[0] || i == manager->pipe_fds[1])
3736 #endif /* USE_WATCHER_THREAD */
3737 process_fd(manager, i, FD_ISSET(i, readfds),
3738 FD_ISSET(i, writefds));
3743 #ifdef USE_WATCHER_THREAD
3744 static isc_boolean_t
3745 process_ctlfd(isc__socketmgr_t *manager) {
3749 select_readmsg(manager, &fd, &msg);
3751 manager_log(manager, IOEVENT,
3752 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
3754 "watcher got message %d "
3755 "for socket %d"), msg, fd);
3760 if (msg == SELECT_POKE_NOTHING)
3764 * Handle shutdown message. We really should
3765 * jump out of this loop right away, but
3766 * it doesn't matter if we have to do a little
3769 if (msg == SELECT_POKE_SHUTDOWN)
3773 * This is a wakeup on a socket. Look
3774 * at the event queue for both read and write,
3775 * and decide if we need to watch on it now
3778 wakeup_socket(manager, fd, msg);
3785 * This is the thread that will loop forever, always in a select or poll
3788 * When select returns something to do, track down what thread gets to do
3789 * this I/O and post the event to it.
3791 static isc_threadresult_t
3792 watcher(void *uap) {
3793 isc__socketmgr_t *manager = uap;
3797 const char *fnname = "kevent()";
3798 #elif defined (USE_EPOLL)
3799 const char *fnname = "epoll_wait()";
3800 #elif defined(USE_DEVPOLL)
3801 const char *fnname = "ioctl(DP_POLL)";
3803 #elif defined (USE_SELECT)
3804 const char *fnname = "select()";
3808 char strbuf[ISC_STRERRORSIZE];
3809 #ifdef ISC_SOCKET_USE_POLLWATCH
3810 pollstate_t pollstate = poll_idle;
3813 #if defined (USE_SELECT)
3815 * Get the control fd here. This will never change.
3817 ctlfd = manager->pipe_fds[0];
3823 cc = kevent(manager->kqueue_fd, NULL, 0,
3824 manager->events, manager->nevents, NULL);
3825 #elif defined(USE_EPOLL)
3826 cc = epoll_wait(manager->epoll_fd, manager->events,
3827 manager->nevents, -1);
3828 #elif defined(USE_DEVPOLL)
3829 dvp.dp_fds = manager->events;
3830 dvp.dp_nfds = manager->nevents;
3831 #ifndef ISC_SOCKET_USE_POLLWATCH
3832 dvp.dp_timeout = -1;
3834 if (pollstate == poll_idle)
3835 dvp.dp_timeout = -1;
3837 dvp.dp_timeout = ISC_SOCKET_POLLWATCH_TIMEOUT;
3838 #endif /* ISC_SOCKET_USE_POLLWATCH */
3839 cc = ioctl(manager->devpoll_fd, DP_POLL, &dvp);
3840 #elif defined(USE_SELECT)
3841 LOCK(&manager->lock);
3842 memcpy(manager->read_fds_copy, manager->read_fds,
3843 manager->fd_bufsize);
3844 memcpy(manager->write_fds_copy, manager->write_fds,
3845 manager->fd_bufsize);
3846 maxfd = manager->maxfd + 1;
3847 UNLOCK(&manager->lock);
3849 cc = select(maxfd, manager->read_fds_copy,
3850 manager->write_fds_copy, NULL, NULL);
3851 #endif /* USE_KQUEUE */
3853 if (cc < 0 && !SOFT_ERROR(errno)) {
3854 isc__strerror(errno, strbuf, sizeof(strbuf));
3855 FATAL_ERROR(__FILE__, __LINE__,
3856 "%s %s: %s", fnname,
3857 isc_msgcat_get(isc_msgcat,
3863 #if defined(USE_DEVPOLL) && defined(ISC_SOCKET_USE_POLLWATCH)
3865 if (pollstate == poll_active)
3866 pollstate = poll_checking;
3867 else if (pollstate == poll_checking)
3868 pollstate = poll_idle;
3869 } else if (cc > 0) {
3870 if (pollstate == poll_checking) {
3872 * XXX: We'd like to use a more
3873 * verbose log level as it's actually an
3874 * unexpected event, but the kernel bug
3875 * reportedly happens pretty frequently
3876 * (and it can also be a false positive)
3877 * so it would be just too noisy.
3879 manager_log(manager,
3880 ISC_LOGCATEGORY_GENERAL,
3881 ISC_LOGMODULE_SOCKET,
3883 "unexpected POLL timeout");
3885 pollstate = poll_active;
3890 #if defined(USE_KQUEUE) || defined (USE_EPOLL) || defined (USE_DEVPOLL)
3891 done = process_fds(manager, manager->events, cc);
3892 #elif defined(USE_SELECT)
3893 process_fds(manager, maxfd, manager->read_fds_copy,
3894 manager->write_fds_copy);
3897 * Process reads on internal, control fd.
3899 if (FD_ISSET(ctlfd, manager->read_fds_copy))
3900 done = process_ctlfd(manager);
3904 manager_log(manager, TRACE, "%s",
3905 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3906 ISC_MSG_EXITING, "watcher exiting"));
3908 return ((isc_threadresult_t)0);
3910 #endif /* USE_WATCHER_THREAD */
3913 ISC_SOCKETFUNC_SCOPE void
3914 isc__socketmgr_setreserved(isc_socketmgr_t *manager0, isc_uint32_t reserved) {
3915 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
3917 REQUIRE(VALID_MANAGER(manager));
3919 manager->reserved = reserved;
3922 ISC_SOCKETFUNC_SCOPE void
3923 isc___socketmgr_maxudp(isc_socketmgr_t *manager0, int maxudp) {
3924 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
3926 REQUIRE(VALID_MANAGER(manager));
3928 manager->maxudp = maxudp;
3933 * Create a new socket manager.
3937 setup_watcher(isc_mem_t *mctx, isc__socketmgr_t *manager) {
3938 isc_result_t result;
3939 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
3940 char strbuf[ISC_STRERRORSIZE];
3944 manager->nevents = ISC_SOCKET_MAXEVENTS;
3945 manager->events = isc_mem_get(mctx, sizeof(struct kevent) *
3947 if (manager->events == NULL)
3948 return (ISC_R_NOMEMORY);
3949 manager->kqueue_fd = kqueue();
3950 if (manager->kqueue_fd == -1) {
3951 result = isc__errno2result(errno);
3952 isc__strerror(errno, strbuf, sizeof(strbuf));
3953 UNEXPECTED_ERROR(__FILE__, __LINE__,
3955 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3956 ISC_MSG_FAILED, "failed"),
3958 isc_mem_put(mctx, manager->events,
3959 sizeof(struct kevent) * manager->nevents);
3963 #ifdef USE_WATCHER_THREAD
3964 result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3965 if (result != ISC_R_SUCCESS) {
3966 close(manager->kqueue_fd);
3967 isc_mem_put(mctx, manager->events,
3968 sizeof(struct kevent) * manager->nevents);
3971 #endif /* USE_WATCHER_THREAD */
3972 #elif defined(USE_EPOLL)
3973 manager->nevents = ISC_SOCKET_MAXEVENTS;
3974 manager->events = isc_mem_get(mctx, sizeof(struct epoll_event) *
3976 if (manager->events == NULL)
3977 return (ISC_R_NOMEMORY);
3978 manager->epoll_fd = epoll_create(manager->nevents);
3979 if (manager->epoll_fd == -1) {
3980 result = isc__errno2result(errno);
3981 isc__strerror(errno, strbuf, sizeof(strbuf));
3982 UNEXPECTED_ERROR(__FILE__, __LINE__,
3983 "epoll_create %s: %s",
3984 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
3985 ISC_MSG_FAILED, "failed"),
3987 isc_mem_put(mctx, manager->events,
3988 sizeof(struct epoll_event) * manager->nevents);
3991 #ifdef USE_WATCHER_THREAD
3992 result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
3993 if (result != ISC_R_SUCCESS) {
3994 close(manager->epoll_fd);
3995 isc_mem_put(mctx, manager->events,
3996 sizeof(struct epoll_event) * manager->nevents);
3999 #endif /* USE_WATCHER_THREAD */
4000 #elif defined(USE_DEVPOLL)
4002 * XXXJT: /dev/poll seems to reject large numbers of events,
4003 * so we should be careful about redefining ISC_SOCKET_MAXEVENTS.
4005 manager->nevents = ISC_SOCKET_MAXEVENTS;
4006 manager->events = isc_mem_get(mctx, sizeof(struct pollfd) *
4008 if (manager->events == NULL)
4009 return (ISC_R_NOMEMORY);
4011 * Note: fdpollinfo should be able to support all possible FDs, so
4012 * it must have maxsocks entries (not nevents).
4014 manager->fdpollinfo = isc_mem_get(mctx, sizeof(pollinfo_t) *
4016 if (manager->fdpollinfo == NULL) {
4017 isc_mem_put(mctx, manager->events,
4018 sizeof(struct pollfd) * manager->nevents);
4019 return (ISC_R_NOMEMORY);
4021 memset(manager->fdpollinfo, 0, sizeof(pollinfo_t) * manager->maxsocks);
4022 manager->devpoll_fd = open("/dev/poll", O_RDWR);
4023 if (manager->devpoll_fd == -1) {
4024 result = isc__errno2result(errno);
4025 isc__strerror(errno, strbuf, sizeof(strbuf));
4026 UNEXPECTED_ERROR(__FILE__, __LINE__,
4027 "open(/dev/poll) %s: %s",
4028 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4029 ISC_MSG_FAILED, "failed"),
4031 isc_mem_put(mctx, manager->events,
4032 sizeof(struct pollfd) * manager->nevents);
4033 isc_mem_put(mctx, manager->fdpollinfo,
4034 sizeof(pollinfo_t) * manager->maxsocks);
4037 #ifdef USE_WATCHER_THREAD
4038 result = watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
4039 if (result != ISC_R_SUCCESS) {
4040 close(manager->devpoll_fd);
4041 isc_mem_put(mctx, manager->events,
4042 sizeof(struct pollfd) * manager->nevents);
4043 isc_mem_put(mctx, manager->fdpollinfo,
4044 sizeof(pollinfo_t) * manager->maxsocks);
4047 #endif /* USE_WATCHER_THREAD */
4048 #elif defined(USE_SELECT)
4051 #if ISC_SOCKET_MAXSOCKETS > FD_SETSIZE
4053 * Note: this code should also cover the case of MAXSOCKETS <=
4054 * FD_SETSIZE, but we separate the cases to avoid possible portability
4055 * issues regarding howmany() and the actual representation of fd_set.
4057 manager->fd_bufsize = howmany(manager->maxsocks, NFDBITS) *
4060 manager->fd_bufsize = sizeof(fd_set);
4063 manager->read_fds = NULL;
4064 manager->read_fds_copy = NULL;
4065 manager->write_fds = NULL;
4066 manager->write_fds_copy = NULL;
4068 manager->read_fds = isc_mem_get(mctx, manager->fd_bufsize);
4069 if (manager->read_fds != NULL)
4070 manager->read_fds_copy = isc_mem_get(mctx, manager->fd_bufsize);
4071 if (manager->read_fds_copy != NULL)
4072 manager->write_fds = isc_mem_get(mctx, manager->fd_bufsize);
4073 if (manager->write_fds != NULL) {
4074 manager->write_fds_copy = isc_mem_get(mctx,
4075 manager->fd_bufsize);
4077 if (manager->write_fds_copy == NULL) {
4078 if (manager->write_fds != NULL) {
4079 isc_mem_put(mctx, manager->write_fds,
4080 manager->fd_bufsize);
4082 if (manager->read_fds_copy != NULL) {
4083 isc_mem_put(mctx, manager->read_fds_copy,
4084 manager->fd_bufsize);
4086 if (manager->read_fds != NULL) {
4087 isc_mem_put(mctx, manager->read_fds,
4088 manager->fd_bufsize);
4090 return (ISC_R_NOMEMORY);
4092 memset(manager->read_fds, 0, manager->fd_bufsize);
4093 memset(manager->write_fds, 0, manager->fd_bufsize);
4095 #ifdef USE_WATCHER_THREAD
4096 (void)watch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
4097 manager->maxfd = manager->pipe_fds[0];
4098 #else /* USE_WATCHER_THREAD */
4100 #endif /* USE_WATCHER_THREAD */
4101 #endif /* USE_KQUEUE */
4103 return (ISC_R_SUCCESS);
4107 cleanup_watcher(isc_mem_t *mctx, isc__socketmgr_t *manager) {
4108 #ifdef USE_WATCHER_THREAD
4109 isc_result_t result;
4111 result = unwatch_fd(manager, manager->pipe_fds[0], SELECT_POKE_READ);
4112 if (result != ISC_R_SUCCESS) {
4113 UNEXPECTED_ERROR(__FILE__, __LINE__,
4114 "epoll_ctl(DEL) %s",
4115 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4116 ISC_MSG_FAILED, "failed"));
4118 #endif /* USE_WATCHER_THREAD */
4121 close(manager->kqueue_fd);
4122 isc_mem_put(mctx, manager->events,
4123 sizeof(struct kevent) * manager->nevents);
4124 #elif defined(USE_EPOLL)
4125 close(manager->epoll_fd);
4126 isc_mem_put(mctx, manager->events,
4127 sizeof(struct epoll_event) * manager->nevents);
4128 #elif defined(USE_DEVPOLL)
4129 close(manager->devpoll_fd);
4130 isc_mem_put(mctx, manager->events,
4131 sizeof(struct pollfd) * manager->nevents);
4132 isc_mem_put(mctx, manager->fdpollinfo,
4133 sizeof(pollinfo_t) * manager->maxsocks);
4134 #elif defined(USE_SELECT)
4135 if (manager->read_fds != NULL)
4136 isc_mem_put(mctx, manager->read_fds, manager->fd_bufsize);
4137 if (manager->read_fds_copy != NULL)
4138 isc_mem_put(mctx, manager->read_fds_copy, manager->fd_bufsize);
4139 if (manager->write_fds != NULL)
4140 isc_mem_put(mctx, manager->write_fds, manager->fd_bufsize);
4141 if (manager->write_fds_copy != NULL)
4142 isc_mem_put(mctx, manager->write_fds_copy, manager->fd_bufsize);
4143 #endif /* USE_KQUEUE */
4146 ISC_SOCKETFUNC_SCOPE isc_result_t
4147 isc__socketmgr_create(isc_mem_t *mctx, isc_socketmgr_t **managerp) {
4148 return (isc__socketmgr_create2(mctx, managerp, 0));
4151 ISC_SOCKETFUNC_SCOPE isc_result_t
4152 isc__socketmgr_create2(isc_mem_t *mctx, isc_socketmgr_t **managerp,
4153 unsigned int maxsocks)
4156 isc__socketmgr_t *manager;
4157 #ifdef USE_WATCHER_THREAD
4158 char strbuf[ISC_STRERRORSIZE];
4160 isc_result_t result;
4162 REQUIRE(managerp != NULL && *managerp == NULL);
4164 #ifdef USE_SHARED_MANAGER
4165 if (socketmgr != NULL) {
4166 /* Don't allow maxsocks to be updated */
4167 if (maxsocks > 0 && socketmgr->maxsocks != maxsocks)
4168 return (ISC_R_EXISTS);
4171 *managerp = (isc_socketmgr_t *)socketmgr;
4172 return (ISC_R_SUCCESS);
4174 #endif /* USE_SHARED_MANAGER */
4177 maxsocks = ISC_SOCKET_MAXSOCKETS;
4179 manager = isc_mem_get(mctx, sizeof(*manager));
4180 if (manager == NULL)
4181 return (ISC_R_NOMEMORY);
4183 /* zero-clear so that necessary cleanup on failure will be easy */
4184 memset(manager, 0, sizeof(*manager));
4185 manager->maxsocks = maxsocks;
4186 manager->reserved = 0;
4187 manager->maxudp = 0;
4188 manager->fds = isc_mem_get(mctx,
4189 manager->maxsocks * sizeof(isc__socket_t *));
4190 if (manager->fds == NULL) {
4191 result = ISC_R_NOMEMORY;
4194 manager->fdstate = isc_mem_get(mctx, manager->maxsocks * sizeof(int));
4195 if (manager->fdstate == NULL) {
4196 result = ISC_R_NOMEMORY;
4199 manager->stats = NULL;
4201 manager->common.methods = &socketmgrmethods;
4202 manager->common.magic = ISCAPI_SOCKETMGR_MAGIC;
4203 manager->common.impmagic = SOCKET_MANAGER_MAGIC;
4204 manager->mctx = NULL;
4205 memset(manager->fds, 0, manager->maxsocks * sizeof(isc_socket_t *));
4206 ISC_LIST_INIT(manager->socklist);
4207 result = isc_mutex_init(&manager->lock);
4208 if (result != ISC_R_SUCCESS)
4210 manager->fdlock = isc_mem_get(mctx, FDLOCK_COUNT * sizeof(isc_mutex_t));
4211 if (manager->fdlock == NULL) {
4212 result = ISC_R_NOMEMORY;
4215 for (i = 0; i < FDLOCK_COUNT; i++) {
4216 result = isc_mutex_init(&manager->fdlock[i]);
4217 if (result != ISC_R_SUCCESS) {
4219 DESTROYLOCK(&manager->fdlock[i]);
4220 isc_mem_put(mctx, manager->fdlock,
4221 FDLOCK_COUNT * sizeof(isc_mutex_t));
4222 manager->fdlock = NULL;
4227 #ifdef USE_WATCHER_THREAD
4228 if (isc_condition_init(&manager->shutdown_ok) != ISC_R_SUCCESS) {
4229 UNEXPECTED_ERROR(__FILE__, __LINE__,
4230 "isc_condition_init() %s",
4231 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4232 ISC_MSG_FAILED, "failed"));
4233 result = ISC_R_UNEXPECTED;
4238 * Create the special fds that will be used to wake up the
4239 * select/poll loop when something internal needs to be done.
4241 if (pipe(manager->pipe_fds) != 0) {
4242 isc__strerror(errno, strbuf, sizeof(strbuf));
4243 UNEXPECTED_ERROR(__FILE__, __LINE__,
4245 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4246 ISC_MSG_FAILED, "failed"),
4248 result = ISC_R_UNEXPECTED;
4249 goto cleanup_condition;
4252 RUNTIME_CHECK(make_nonblock(manager->pipe_fds[0]) == ISC_R_SUCCESS);
4254 RUNTIME_CHECK(make_nonblock(manager->pipe_fds[1]) == ISC_R_SUCCESS);
4256 #endif /* USE_WATCHER_THREAD */
4258 #ifdef USE_SHARED_MANAGER
4260 #endif /* USE_SHARED_MANAGER */
4263 * Set up initial state for the select loop
4265 result = setup_watcher(mctx, manager);
4266 if (result != ISC_R_SUCCESS)
4268 memset(manager->fdstate, 0, manager->maxsocks * sizeof(int));
4269 #ifdef USE_WATCHER_THREAD
4271 * Start up the select/poll thread.
4273 if (isc_thread_create(watcher, manager, &manager->watcher) !=
4275 UNEXPECTED_ERROR(__FILE__, __LINE__,
4276 "isc_thread_create() %s",
4277 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4278 ISC_MSG_FAILED, "failed"));
4279 cleanup_watcher(mctx, manager);
4280 result = ISC_R_UNEXPECTED;
4283 #endif /* USE_WATCHER_THREAD */
4284 isc_mem_attach(mctx, &manager->mctx);
4286 #ifdef USE_SHARED_MANAGER
4287 socketmgr = manager;
4288 #endif /* USE_SHARED_MANAGER */
4289 *managerp = (isc_socketmgr_t *)manager;
4291 return (ISC_R_SUCCESS);
4294 #ifdef USE_WATCHER_THREAD
4295 (void)close(manager->pipe_fds[0]);
4296 (void)close(manager->pipe_fds[1]);
4297 #endif /* USE_WATCHER_THREAD */
4299 #ifdef USE_WATCHER_THREAD
4301 (void)isc_condition_destroy(&manager->shutdown_ok);
4302 #endif /* USE_WATCHER_THREAD */
4306 if (manager->fdlock != NULL) {
4307 for (i = 0; i < FDLOCK_COUNT; i++)
4308 DESTROYLOCK(&manager->fdlock[i]);
4310 DESTROYLOCK(&manager->lock);
4313 if (manager->fdlock != NULL) {
4314 isc_mem_put(mctx, manager->fdlock,
4315 FDLOCK_COUNT * sizeof(isc_mutex_t));
4317 if (manager->fdstate != NULL) {
4318 isc_mem_put(mctx, manager->fdstate,
4319 manager->maxsocks * sizeof(int));
4321 if (manager->fds != NULL) {
4322 isc_mem_put(mctx, manager->fds,
4323 manager->maxsocks * sizeof(isc_socket_t *));
4325 isc_mem_put(mctx, manager, sizeof(*manager));
4332 isc__socketmgr_getmaxsockets(isc_socketmgr_t *manager0, unsigned int *nsockp) {
4333 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
4334 REQUIRE(VALID_MANAGER(manager));
4335 REQUIRE(nsockp != NULL);
4337 *nsockp = manager->maxsocks;
4339 return (ISC_R_SUCCESS);
4343 isc__socketmgr_setstats(isc_socketmgr_t *manager0, isc_stats_t *stats) {
4344 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
4346 REQUIRE(VALID_MANAGER(manager));
4347 REQUIRE(ISC_LIST_EMPTY(manager->socklist));
4348 REQUIRE(manager->stats == NULL);
4349 REQUIRE(isc_stats_ncounters(stats) == isc_sockstatscounter_max);
4351 isc_stats_attach(stats, &manager->stats);
4355 ISC_SOCKETFUNC_SCOPE void
4356 isc__socketmgr_destroy(isc_socketmgr_t **managerp) {
4357 isc__socketmgr_t *manager;
4362 * Destroy a socket manager.
4365 REQUIRE(managerp != NULL);
4366 manager = (isc__socketmgr_t *)*managerp;
4367 REQUIRE(VALID_MANAGER(manager));
4369 #ifdef USE_SHARED_MANAGER
4371 if (manager->refs > 0) {
4376 #endif /* USE_SHARED_MANAGER */
4378 LOCK(&manager->lock);
4381 * Wait for all sockets to be destroyed.
4383 while (!ISC_LIST_EMPTY(manager->socklist)) {
4384 #ifdef USE_WATCHER_THREAD
4385 manager_log(manager, CREATION, "%s",
4386 isc_msgcat_get(isc_msgcat, ISC_MSGSET_SOCKET,
4387 ISC_MSG_SOCKETSREMAIN,
4389 WAIT(&manager->shutdown_ok, &manager->lock);
4390 #else /* USE_WATCHER_THREAD */
4391 UNLOCK(&manager->lock);
4392 isc__taskmgr_dispatch(NULL);
4393 LOCK(&manager->lock);
4394 #endif /* USE_WATCHER_THREAD */
4397 UNLOCK(&manager->lock);
4400 * Here, poke our select/poll thread. Do this by closing the write
4401 * half of the pipe, which will send EOF to the read half.
4402 * This is currently a no-op in the non-threaded case.
4404 select_poke(manager, 0, SELECT_POKE_SHUTDOWN);
4406 #ifdef USE_WATCHER_THREAD
4408 * Wait for thread to exit.
4410 if (isc_thread_join(manager->watcher, NULL) != ISC_R_SUCCESS)
4411 UNEXPECTED_ERROR(__FILE__, __LINE__,
4412 "isc_thread_join() %s",
4413 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
4414 ISC_MSG_FAILED, "failed"));
4415 #endif /* USE_WATCHER_THREAD */
4420 cleanup_watcher(manager->mctx, manager);
4422 #ifdef USE_WATCHER_THREAD
4423 (void)close(manager->pipe_fds[0]);
4424 (void)close(manager->pipe_fds[1]);
4425 (void)isc_condition_destroy(&manager->shutdown_ok);
4426 #endif /* USE_WATCHER_THREAD */
4428 for (i = 0; i < (int)manager->maxsocks; i++)
4429 if (manager->fdstate[i] == CLOSE_PENDING) /* no need to lock */
4432 isc_mem_put(manager->mctx, manager->fds,
4433 manager->maxsocks * sizeof(isc__socket_t *));
4434 isc_mem_put(manager->mctx, manager->fdstate,
4435 manager->maxsocks * sizeof(int));
4437 if (manager->stats != NULL)
4438 isc_stats_detach(&manager->stats);
4440 if (manager->fdlock != NULL) {
4441 for (i = 0; i < FDLOCK_COUNT; i++)
4442 DESTROYLOCK(&manager->fdlock[i]);
4443 isc_mem_put(manager->mctx, manager->fdlock,
4444 FDLOCK_COUNT * sizeof(isc_mutex_t));
4446 DESTROYLOCK(&manager->lock);
4447 manager->common.magic = 0;
4448 manager->common.impmagic = 0;
4449 mctx= manager->mctx;
4450 isc_mem_put(mctx, manager, sizeof(*manager));
4452 isc_mem_detach(&mctx);
4456 #ifdef USE_SHARED_MANAGER
4462 socket_recv(isc__socket_t *sock, isc_socketevent_t *dev, isc_task_t *task,
4466 isc_boolean_t have_lock = ISC_FALSE;
4467 isc_task_t *ntask = NULL;
4468 isc_result_t result = ISC_R_SUCCESS;
4470 dev->ev_sender = task;
4472 if (sock->type == isc_sockettype_udp) {
4473 io_state = doio_recv(sock, dev);
4476 have_lock = ISC_TRUE;
4478 if (ISC_LIST_EMPTY(sock->recv_list))
4479 io_state = doio_recv(sock, dev);
4481 io_state = DOIO_SOFT;
4487 * We couldn't read all or part of the request right now, so
4490 * Attach to socket and to task
4492 isc_task_attach(task, &ntask);
4493 dev->attributes |= ISC_SOCKEVENTATTR_ATTACHED;
4497 have_lock = ISC_TRUE;
4501 * Enqueue the request. If the socket was previously not being
4502 * watched, poke the watcher to start paying attention to it.
4504 if (ISC_LIST_EMPTY(sock->recv_list) && !sock->pending_recv)
4505 select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
4506 ISC_LIST_ENQUEUE(sock->recv_list, dev, ev_link);
4508 socket_log(sock, NULL, EVENT, NULL, 0, 0,
4509 "socket_recv: event %p -> task %p",
4512 if ((flags & ISC_SOCKFLAG_IMMEDIATE) != 0)
4513 result = ISC_R_INPROGRESS;
4517 dev->result = ISC_R_EOF;
4522 if ((flags & ISC_SOCKFLAG_IMMEDIATE) == 0)
4523 send_recvdone_event(sock, &dev);
4528 UNLOCK(&sock->lock);
4533 ISC_SOCKETFUNC_SCOPE isc_result_t
4534 isc__socket_recvv(isc_socket_t *sock0, isc_bufferlist_t *buflist,
4535 unsigned int minimum, isc_task_t *task,
4536 isc_taskaction_t action, const void *arg)
4538 isc__socket_t *sock = (isc__socket_t *)sock0;
4539 isc_socketevent_t *dev;
4540 isc__socketmgr_t *manager;
4541 unsigned int iocount;
4542 isc_buffer_t *buffer;
4544 REQUIRE(VALID_SOCKET(sock));
4545 REQUIRE(buflist != NULL);
4546 REQUIRE(!ISC_LIST_EMPTY(*buflist));
4547 REQUIRE(task != NULL);
4548 REQUIRE(action != NULL);
4550 manager = sock->manager;
4551 REQUIRE(VALID_MANAGER(manager));
4553 iocount = isc_bufferlist_availablecount(buflist);
4554 REQUIRE(iocount > 0);
4556 INSIST(sock->bound);
4558 dev = allocate_socketevent(sock, ISC_SOCKEVENT_RECVDONE, action, arg);
4560 return (ISC_R_NOMEMORY);
4563 * UDP sockets are always partial read
4565 if (sock->type == isc_sockettype_udp)
4569 dev->minimum = iocount;
4571 dev->minimum = minimum;
4575 * Move each buffer from the passed in list to our internal one.
4577 buffer = ISC_LIST_HEAD(*buflist);
4578 while (buffer != NULL) {
4579 ISC_LIST_DEQUEUE(*buflist, buffer, link);
4580 ISC_LIST_ENQUEUE(dev->bufferlist, buffer, link);
4581 buffer = ISC_LIST_HEAD(*buflist);
4584 return (socket_recv(sock, dev, task, 0));
4587 ISC_SOCKETFUNC_SCOPE isc_result_t
4588 isc__socket_recv(isc_socket_t *sock0, isc_region_t *region,
4589 unsigned int minimum, isc_task_t *task,
4590 isc_taskaction_t action, const void *arg)
4592 isc__socket_t *sock = (isc__socket_t *)sock0;
4593 isc_socketevent_t *dev;
4594 isc__socketmgr_t *manager;
4596 REQUIRE(VALID_SOCKET(sock));
4597 REQUIRE(action != NULL);
4599 manager = sock->manager;
4600 REQUIRE(VALID_MANAGER(manager));
4602 INSIST(sock->bound);
4604 dev = allocate_socketevent(sock, ISC_SOCKEVENT_RECVDONE, action, arg);
4606 return (ISC_R_NOMEMORY);
4608 return (isc__socket_recv2(sock0, region, minimum, task, dev, 0));
4611 ISC_SOCKETFUNC_SCOPE isc_result_t
4612 isc__socket_recv2(isc_socket_t *sock0, isc_region_t *region,
4613 unsigned int minimum, isc_task_t *task,
4614 isc_socketevent_t *event, unsigned int flags)
4616 isc__socket_t *sock = (isc__socket_t *)sock0;
4618 event->ev_sender = sock;
4619 event->result = ISC_R_UNSET;
4620 ISC_LIST_INIT(event->bufferlist);
4621 event->region = *region;
4624 event->attributes = 0;
4627 * UDP sockets are always partial read.
4629 if (sock->type == isc_sockettype_udp)
4633 event->minimum = region->length;
4635 event->minimum = minimum;
4638 return (socket_recv(sock, event, task, flags));
4642 socket_send(isc__socket_t *sock, isc_socketevent_t *dev, isc_task_t *task,
4643 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo,
4647 isc_boolean_t have_lock = ISC_FALSE;
4648 isc_task_t *ntask = NULL;
4649 isc_result_t result = ISC_R_SUCCESS;
4651 dev->ev_sender = task;
4653 set_dev_address(address, sock, dev);
4654 if (pktinfo != NULL) {
4655 dev->attributes |= ISC_SOCKEVENTATTR_PKTINFO;
4656 dev->pktinfo = *pktinfo;
4658 if (!isc_sockaddr_issitelocal(&dev->address) &&
4659 !isc_sockaddr_islinklocal(&dev->address)) {
4660 socket_log(sock, NULL, TRACE, isc_msgcat,
4661 ISC_MSGSET_SOCKET, ISC_MSG_PKTINFOPROVIDED,
4662 "pktinfo structure provided, ifindex %u "
4663 "(set to 0)", pktinfo->ipi6_ifindex);
4666 * Set the pktinfo index to 0 here, to let the
4667 * kernel decide what interface it should send on.
4669 dev->pktinfo.ipi6_ifindex = 0;
4673 if (sock->type == isc_sockettype_udp)
4674 io_state = doio_send(sock, dev);
4677 have_lock = ISC_TRUE;
4679 if (ISC_LIST_EMPTY(sock->send_list))
4680 io_state = doio_send(sock, dev);
4682 io_state = DOIO_SOFT;
4688 * We couldn't send all or part of the request right now, so
4689 * queue it unless ISC_SOCKFLAG_NORETRY is set.
4691 if ((flags & ISC_SOCKFLAG_NORETRY) == 0) {
4692 isc_task_attach(task, &ntask);
4693 dev->attributes |= ISC_SOCKEVENTATTR_ATTACHED;
4697 have_lock = ISC_TRUE;
4701 * Enqueue the request. If the socket was previously
4702 * not being watched, poke the watcher to start
4703 * paying attention to it.
4705 if (ISC_LIST_EMPTY(sock->send_list) &&
4706 !sock->pending_send)
4707 select_poke(sock->manager, sock->fd,
4709 ISC_LIST_ENQUEUE(sock->send_list, dev, ev_link);
4711 socket_log(sock, NULL, EVENT, NULL, 0, 0,
4712 "socket_send: event %p -> task %p",
4715 if ((flags & ISC_SOCKFLAG_IMMEDIATE) != 0)
4716 result = ISC_R_INPROGRESS;
4722 if ((flags & ISC_SOCKFLAG_IMMEDIATE) == 0)
4723 send_senddone_event(sock, &dev);
4728 UNLOCK(&sock->lock);
4733 ISC_SOCKETFUNC_SCOPE isc_result_t
4734 isc__socket_send(isc_socket_t *sock, isc_region_t *region,
4735 isc_task_t *task, isc_taskaction_t action, const void *arg)
4738 * REQUIRE() checking is performed in isc_socket_sendto().
4740 return (isc__socket_sendto(sock, region, task, action, arg, NULL,
4744 ISC_SOCKETFUNC_SCOPE isc_result_t
4745 isc__socket_sendto(isc_socket_t *sock0, isc_region_t *region,
4746 isc_task_t *task, isc_taskaction_t action, const void *arg,
4747 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo)
4749 isc__socket_t *sock = (isc__socket_t *)sock0;
4750 isc_socketevent_t *dev;
4751 isc__socketmgr_t *manager;
4753 REQUIRE(VALID_SOCKET(sock));
4754 REQUIRE(region != NULL);
4755 REQUIRE(task != NULL);
4756 REQUIRE(action != NULL);
4758 manager = sock->manager;
4759 REQUIRE(VALID_MANAGER(manager));
4761 INSIST(sock->bound);
4763 dev = allocate_socketevent(sock, ISC_SOCKEVENT_SENDDONE, action, arg);
4765 return (ISC_R_NOMEMORY);
4767 dev->region = *region;
4769 return (socket_send(sock, dev, task, address, pktinfo, 0));
4772 ISC_SOCKETFUNC_SCOPE isc_result_t
4773 isc__socket_sendv(isc_socket_t *sock, isc_bufferlist_t *buflist,
4774 isc_task_t *task, isc_taskaction_t action, const void *arg)
4776 return (isc__socket_sendtov(sock, buflist, task, action, arg, NULL,
4780 ISC_SOCKETFUNC_SCOPE isc_result_t
4781 isc__socket_sendtov(isc_socket_t *sock0, isc_bufferlist_t *buflist,
4782 isc_task_t *task, isc_taskaction_t action, const void *arg,
4783 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo)
4785 isc__socket_t *sock = (isc__socket_t *)sock0;
4786 isc_socketevent_t *dev;
4787 isc__socketmgr_t *manager;
4788 unsigned int iocount;
4789 isc_buffer_t *buffer;
4791 REQUIRE(VALID_SOCKET(sock));
4792 REQUIRE(buflist != NULL);
4793 REQUIRE(!ISC_LIST_EMPTY(*buflist));
4794 REQUIRE(task != NULL);
4795 REQUIRE(action != NULL);
4797 manager = sock->manager;
4798 REQUIRE(VALID_MANAGER(manager));
4800 iocount = isc_bufferlist_usedcount(buflist);
4801 REQUIRE(iocount > 0);
4803 dev = allocate_socketevent(sock, ISC_SOCKEVENT_SENDDONE, action, arg);
4805 return (ISC_R_NOMEMORY);
4808 * Move each buffer from the passed in list to our internal one.
4810 buffer = ISC_LIST_HEAD(*buflist);
4811 while (buffer != NULL) {
4812 ISC_LIST_DEQUEUE(*buflist, buffer, link);
4813 ISC_LIST_ENQUEUE(dev->bufferlist, buffer, link);
4814 buffer = ISC_LIST_HEAD(*buflist);
4817 return (socket_send(sock, dev, task, address, pktinfo, 0));
4820 ISC_SOCKETFUNC_SCOPE isc_result_t
4821 isc__socket_sendto2(isc_socket_t *sock0, isc_region_t *region,
4823 isc_sockaddr_t *address, struct in6_pktinfo *pktinfo,
4824 isc_socketevent_t *event, unsigned int flags)
4826 isc__socket_t *sock = (isc__socket_t *)sock0;
4828 REQUIRE(VALID_SOCKET(sock));
4829 REQUIRE((flags & ~(ISC_SOCKFLAG_IMMEDIATE|ISC_SOCKFLAG_NORETRY)) == 0);
4830 if ((flags & ISC_SOCKFLAG_NORETRY) != 0)
4831 REQUIRE(sock->type == isc_sockettype_udp);
4832 event->ev_sender = sock;
4833 event->result = ISC_R_UNSET;
4834 ISC_LIST_INIT(event->bufferlist);
4835 event->region = *region;
4838 event->attributes = 0;
4840 return (socket_send(sock, event, task, address, pktinfo, flags));
4843 ISC_SOCKETFUNC_SCOPE void
4844 isc__socket_cleanunix(isc_sockaddr_t *sockaddr, isc_boolean_t active) {
4845 #ifdef ISC_PLATFORM_HAVESYSUNH
4848 char strbuf[ISC_STRERRORSIZE];
4850 if (sockaddr->type.sa.sa_family != AF_UNIX)
4854 #if defined(S_IFMT) && defined(S_IFSOCK)
4855 #define S_ISSOCK(mode) ((mode & S_IFMT)==S_IFSOCK)
4856 #elif defined(_S_IFMT) && defined(S_IFSOCK)
4857 #define S_ISSOCK(mode) ((mode & _S_IFMT)==S_IFSOCK)
4862 #if defined(S_IFMT) && defined(S_IFIFO)
4863 #define S_ISFIFO(mode) ((mode & S_IFMT)==S_IFIFO)
4864 #elif defined(_S_IFMT) && defined(S_IFIFO)
4865 #define S_ISFIFO(mode) ((mode & _S_IFMT)==S_IFIFO)
4869 #if !defined(S_ISFIFO) && !defined(S_ISSOCK)
4870 #error You need to define S_ISFIFO and S_ISSOCK as appropriate for your platform. See <sys/stat.h>.
4874 #define S_ISFIFO(mode) 0
4878 #define S_ISSOCK(mode) 0
4882 if (stat(sockaddr->type.sunix.sun_path, &sb) < 0) {
4883 isc__strerror(errno, strbuf, sizeof(strbuf));
4884 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4885 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4886 "isc_socket_cleanunix: stat(%s): %s",
4887 sockaddr->type.sunix.sun_path, strbuf);
4890 if (!(S_ISSOCK(sb.st_mode) || S_ISFIFO(sb.st_mode))) {
4891 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4892 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4893 "isc_socket_cleanunix: %s: not a socket",
4894 sockaddr->type.sunix.sun_path);
4897 if (unlink(sockaddr->type.sunix.sun_path) < 0) {
4898 isc__strerror(errno, strbuf, sizeof(strbuf));
4899 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4900 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
4901 "isc_socket_cleanunix: unlink(%s): %s",
4902 sockaddr->type.sunix.sun_path, strbuf);
4907 s = socket(AF_UNIX, SOCK_STREAM, 0);
4909 isc__strerror(errno, strbuf, sizeof(strbuf));
4910 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4911 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4912 "isc_socket_cleanunix: socket(%s): %s",
4913 sockaddr->type.sunix.sun_path, strbuf);
4917 if (stat(sockaddr->type.sunix.sun_path, &sb) < 0) {
4919 case ENOENT: /* We exited cleanly last time */
4922 isc__strerror(errno, strbuf, sizeof(strbuf));
4923 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4924 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4925 "isc_socket_cleanunix: stat(%s): %s",
4926 sockaddr->type.sunix.sun_path, strbuf);
4932 if (!(S_ISSOCK(sb.st_mode) || S_ISFIFO(sb.st_mode))) {
4933 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4934 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4935 "isc_socket_cleanunix: %s: not a socket",
4936 sockaddr->type.sunix.sun_path);
4940 if (connect(s, (struct sockaddr *)&sockaddr->type.sunix,
4941 sizeof(sockaddr->type.sunix)) < 0) {
4945 if (unlink(sockaddr->type.sunix.sun_path) < 0) {
4946 isc__strerror(errno, strbuf, sizeof(strbuf));
4947 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4948 ISC_LOGMODULE_SOCKET,
4950 "isc_socket_cleanunix: "
4952 sockaddr->type.sunix.sun_path,
4957 isc__strerror(errno, strbuf, sizeof(strbuf));
4958 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
4959 ISC_LOGMODULE_SOCKET, ISC_LOG_WARNING,
4960 "isc_socket_cleanunix: connect(%s): %s",
4961 sockaddr->type.sunix.sun_path, strbuf);
4973 ISC_SOCKETFUNC_SCOPE isc_result_t
4974 isc__socket_permunix(isc_sockaddr_t *sockaddr, isc_uint32_t perm,
4975 isc_uint32_t owner, isc_uint32_t group)
4977 #ifdef ISC_PLATFORM_HAVESYSUNH
4978 isc_result_t result = ISC_R_SUCCESS;
4979 char strbuf[ISC_STRERRORSIZE];
4980 char path[sizeof(sockaddr->type.sunix.sun_path)];
4981 #ifdef NEED_SECURE_DIRECTORY
4985 REQUIRE(sockaddr->type.sa.sa_family == AF_UNIX);
4986 INSIST(strlen(sockaddr->type.sunix.sun_path) < sizeof(path));
4987 strcpy(path, sockaddr->type.sunix.sun_path);
4989 #ifdef NEED_SECURE_DIRECTORY
4990 slash = strrchr(path, '/');
4991 if (slash != NULL) {
5000 if (chmod(path, perm) < 0) {
5001 isc__strerror(errno, strbuf, sizeof(strbuf));
5002 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
5003 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
5004 "isc_socket_permunix: chmod(%s, %d): %s",
5005 path, perm, strbuf);
5006 result = ISC_R_FAILURE;
5008 if (chown(path, owner, group) < 0) {
5009 isc__strerror(errno, strbuf, sizeof(strbuf));
5010 isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
5011 ISC_LOGMODULE_SOCKET, ISC_LOG_ERROR,
5012 "isc_socket_permunix: chown(%s, %d, %d): %s",
5015 result = ISC_R_FAILURE;
5023 return (ISC_R_NOTIMPLEMENTED);
5027 ISC_SOCKETFUNC_SCOPE isc_result_t
5028 isc__socket_bind(isc_socket_t *sock0, isc_sockaddr_t *sockaddr,
5029 unsigned int options) {
5030 isc__socket_t *sock = (isc__socket_t *)sock0;
5031 char strbuf[ISC_STRERRORSIZE];
5034 REQUIRE(VALID_SOCKET(sock));
5038 INSIST(!sock->bound);
5039 INSIST(!sock->dupped);
5041 if (sock->pf != sockaddr->type.sa.sa_family) {
5042 UNLOCK(&sock->lock);
5043 return (ISC_R_FAMILYMISMATCH);
5047 * Only set SO_REUSEADDR when we want a specific port.
5050 if (sock->pf == AF_UNIX)
5053 if ((options & ISC_SOCKET_REUSEADDRESS) != 0 &&
5054 isc_sockaddr_getport(sockaddr) != (in_port_t)0 &&
5055 setsockopt(sock->fd, SOL_SOCKET, SO_REUSEADDR, (void *)&on,
5057 UNEXPECTED_ERROR(__FILE__, __LINE__,
5058 "setsockopt(%d) %s", sock->fd,
5059 isc_msgcat_get(isc_msgcat, ISC_MSGSET_GENERAL,
5060 ISC_MSG_FAILED, "failed"));
5066 if (bind(sock->fd, &sockaddr->type.sa, sockaddr->length) < 0) {
5067 inc_stats(sock->manager->stats,
5068 sock->statsindex[STATID_BINDFAIL]);
5070 UNLOCK(&sock->lock);
5073 return (ISC_R_NOPERM);
5075 return (ISC_R_ADDRNOTAVAIL);
5077 return (ISC_R_ADDRINUSE);
5079 return (ISC_R_BOUND);
5081 isc__strerror(errno, strbuf, sizeof(strbuf));
5082 UNEXPECTED_ERROR(__FILE__, __LINE__, "bind: %s",
5084 return (ISC_R_UNEXPECTED);
5088 socket_log(sock, sockaddr, TRACE,
5089 isc_msgcat, ISC_MSGSET_SOCKET, ISC_MSG_BOUND, "bound");
5092 UNLOCK(&sock->lock);
5093 return (ISC_R_SUCCESS);
5097 * Enable this only for specific OS versions, and only when they have repaired
5098 * their problems with it. Until then, this is is broken and needs to be
5099 * diabled by default. See RT22589 for details.
5101 #undef ENABLE_ACCEPTFILTER
5103 ISC_SOCKETFUNC_SCOPE isc_result_t
5104 isc__socket_filter(isc_socket_t *sock0, const char *filter) {
5105 isc__socket_t *sock = (isc__socket_t *)sock0;
5106 #if defined(SO_ACCEPTFILTER) && defined(ENABLE_ACCEPTFILTER)
5107 char strbuf[ISC_STRERRORSIZE];
5108 struct accept_filter_arg afa;
5114 REQUIRE(VALID_SOCKET(sock));
5116 #if defined(SO_ACCEPTFILTER) && defined(ENABLE_ACCEPTFILTER)
5117 bzero(&afa, sizeof(afa));
5118 strncpy(afa.af_name, filter, sizeof(afa.af_name));
5119 if (setsockopt(sock->fd, SOL_SOCKET, SO_ACCEPTFILTER,
5120 &afa, sizeof(afa)) == -1) {
5121 isc__strerror(errno, strbuf, sizeof(strbuf));
5122 socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
5123 ISC_MSG_FILTER, "setsockopt(SO_ACCEPTFILTER): %s",
5125 return (ISC_R_FAILURE);
5127 return (ISC_R_SUCCESS);
5129 return (ISC_R_NOTIMPLEMENTED);
5134 * Set up to listen on a given socket. We do this by creating an internal
5135 * event that will be dispatched when the socket has read activity. The
5136 * watcher will send the internal event to the task when there is a new
5139 * Unlike in read, we don't preallocate a done event here. Every time there
5140 * is a new connection we'll have to allocate a new one anyway, so we might
5141 * as well keep things simple rather than having to track them.
5143 ISC_SOCKETFUNC_SCOPE isc_result_t
5144 isc__socket_listen(isc_socket_t *sock0, unsigned int backlog) {
5145 isc__socket_t *sock = (isc__socket_t *)sock0;
5146 char strbuf[ISC_STRERRORSIZE];
5148 REQUIRE(VALID_SOCKET(sock));
5152 REQUIRE(!sock->listener);
5153 REQUIRE(sock->bound);
5154 REQUIRE(sock->type == isc_sockettype_tcp ||
5155 sock->type == isc_sockettype_unix);
5158 backlog = SOMAXCONN;
5160 if (listen(sock->fd, (int)backlog) < 0) {
5161 UNLOCK(&sock->lock);
5162 isc__strerror(errno, strbuf, sizeof(strbuf));
5164 UNEXPECTED_ERROR(__FILE__, __LINE__, "listen: %s", strbuf);
5166 return (ISC_R_UNEXPECTED);
5171 UNLOCK(&sock->lock);
5172 return (ISC_R_SUCCESS);
5176 * This should try to do aggressive accept() XXXMLG
5178 ISC_SOCKETFUNC_SCOPE isc_result_t
5179 isc__socket_accept(isc_socket_t *sock0,
5180 isc_task_t *task, isc_taskaction_t action, const void *arg)
5182 isc__socket_t *sock = (isc__socket_t *)sock0;
5183 isc_socket_newconnev_t *dev;
5184 isc__socketmgr_t *manager;
5185 isc_task_t *ntask = NULL;
5186 isc__socket_t *nsock;
5187 isc_result_t result;
5188 isc_boolean_t do_poke = ISC_FALSE;
5190 REQUIRE(VALID_SOCKET(sock));
5191 manager = sock->manager;
5192 REQUIRE(VALID_MANAGER(manager));
5196 REQUIRE(sock->listener);
5199 * Sender field is overloaded here with the task we will be sending
5200 * this event to. Just before the actual event is delivered the
5201 * actual ev_sender will be touched up to be the socket.
5203 dev = (isc_socket_newconnev_t *)
5204 isc_event_allocate(manager->mctx, task, ISC_SOCKEVENT_NEWCONN,
5205 action, arg, sizeof(*dev));
5207 UNLOCK(&sock->lock);
5208 return (ISC_R_NOMEMORY);
5210 ISC_LINK_INIT(dev, ev_link);
5212 result = allocate_socket(manager, sock->type, &nsock);
5213 if (result != ISC_R_SUCCESS) {
5214 isc_event_free(ISC_EVENT_PTR(&dev));
5215 UNLOCK(&sock->lock);
5220 * Attach to socket and to task.
5222 isc_task_attach(task, &ntask);
5223 if (isc_task_exiting(ntask)) {
5224 free_socket(&nsock);
5225 isc_task_detach(&ntask);
5226 isc_event_free(ISC_EVENT_PTR(&dev));
5227 UNLOCK(&sock->lock);
5228 return (ISC_R_SHUTTINGDOWN);
5230 nsock->references++;
5231 nsock->statsindex = sock->statsindex;
5233 dev->ev_sender = ntask;
5234 dev->newsocket = (isc_socket_t *)nsock;
5237 * Poke watcher here. We still have the socket locked, so there
5238 * is no race condition. We will keep the lock for such a short
5239 * bit of time waking it up now or later won't matter all that much.
5241 if (ISC_LIST_EMPTY(sock->accept_list))
5244 ISC_LIST_ENQUEUE(sock->accept_list, dev, ev_link);
5247 select_poke(manager, sock->fd, SELECT_POKE_ACCEPT);
5249 UNLOCK(&sock->lock);
5250 return (ISC_R_SUCCESS);
5253 ISC_SOCKETFUNC_SCOPE isc_result_t
5254 isc__socket_connect(isc_socket_t *sock0, isc_sockaddr_t *addr,
5255 isc_task_t *task, isc_taskaction_t action, const void *arg)
5257 isc__socket_t *sock = (isc__socket_t *)sock0;
5258 isc_socket_connev_t *dev;
5259 isc_task_t *ntask = NULL;
5260 isc__socketmgr_t *manager;
5262 char strbuf[ISC_STRERRORSIZE];
5263 char addrbuf[ISC_SOCKADDR_FORMATSIZE];
5265 REQUIRE(VALID_SOCKET(sock));
5266 REQUIRE(addr != NULL);
5267 REQUIRE(task != NULL);
5268 REQUIRE(action != NULL);
5270 manager = sock->manager;
5271 REQUIRE(VALID_MANAGER(manager));
5272 REQUIRE(addr != NULL);
5274 if (isc_sockaddr_ismulticast(addr))
5275 return (ISC_R_MULTICAST);
5279 REQUIRE(!sock->connecting);
5281 dev = (isc_socket_connev_t *)isc_event_allocate(manager->mctx, sock,
5282 ISC_SOCKEVENT_CONNECT,
5286 UNLOCK(&sock->lock);
5287 return (ISC_R_NOMEMORY);
5289 ISC_LINK_INIT(dev, ev_link);
5292 * Try to do the connect right away, as there can be only one
5293 * outstanding, and it might happen to complete.
5295 sock->peer_address = *addr;
5296 cc = connect(sock->fd, &addr->type.sa, addr->length);
5299 * HP-UX "fails" to connect a UDP socket and sets errno to
5300 * EINPROGRESS if it's non-blocking. We'd rather regard this as
5301 * a success and let the user detect it if it's really an error
5302 * at the time of sending a packet on the socket.
5304 if (sock->type == isc_sockettype_udp && errno == EINPROGRESS) {
5308 if (SOFT_ERROR(errno) || errno == EINPROGRESS)
5312 #define ERROR_MATCH(a, b) case a: dev->result = b; goto err_exit;
5313 ERROR_MATCH(EACCES, ISC_R_NOPERM);
5314 ERROR_MATCH(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
5315 ERROR_MATCH(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
5316 ERROR_MATCH(ECONNREFUSED, ISC_R_CONNREFUSED);
5317 ERROR_MATCH(EHOSTUNREACH, ISC_R_HOSTUNREACH);
5319 ERROR_MATCH(EHOSTDOWN, ISC_R_HOSTUNREACH);
5321 ERROR_MATCH(ENETUNREACH, ISC_R_NETUNREACH);
5322 ERROR_MATCH(ENOBUFS, ISC_R_NORESOURCES);
5323 ERROR_MATCH(EPERM, ISC_R_HOSTUNREACH);
5324 ERROR_MATCH(EPIPE, ISC_R_NOTCONNECTED);
5325 ERROR_MATCH(ECONNRESET, ISC_R_CONNECTIONRESET);
5329 sock->connected = 0;
5331 isc__strerror(errno, strbuf, sizeof(strbuf));
5332 isc_sockaddr_format(addr, addrbuf, sizeof(addrbuf));
5333 UNEXPECTED_ERROR(__FILE__, __LINE__, "connect(%s) %d/%s",
5334 addrbuf, errno, strbuf);
5336 UNLOCK(&sock->lock);
5337 inc_stats(sock->manager->stats,
5338 sock->statsindex[STATID_CONNECTFAIL]);
5339 isc_event_free(ISC_EVENT_PTR(&dev));
5340 return (ISC_R_UNEXPECTED);
5343 sock->connected = 0;
5344 isc_task_send(task, ISC_EVENT_PTR(&dev));
5346 UNLOCK(&sock->lock);
5347 inc_stats(sock->manager->stats,
5348 sock->statsindex[STATID_CONNECTFAIL]);
5349 return (ISC_R_SUCCESS);
5353 * If connect completed, fire off the done event.
5357 sock->connected = 1;
5359 dev->result = ISC_R_SUCCESS;
5360 isc_task_send(task, ISC_EVENT_PTR(&dev));
5362 UNLOCK(&sock->lock);
5364 inc_stats(sock->manager->stats,
5365 sock->statsindex[STATID_CONNECT]);
5367 return (ISC_R_SUCCESS);
5375 isc_task_attach(task, &ntask);
5377 sock->connecting = 1;
5379 dev->ev_sender = ntask;
5382 * Poke watcher here. We still have the socket locked, so there
5383 * is no race condition. We will keep the lock for such a short
5384 * bit of time waking it up now or later won't matter all that much.
5386 if (sock->connect_ev == NULL)
5387 select_poke(manager, sock->fd, SELECT_POKE_CONNECT);
5389 sock->connect_ev = dev;
5391 UNLOCK(&sock->lock);
5392 return (ISC_R_SUCCESS);
5396 * Called when a socket with a pending connect() finishes.
5399 internal_connect(isc_task_t *me, isc_event_t *ev) {
5400 isc__socket_t *sock;
5401 isc_socket_connev_t *dev;
5404 ISC_SOCKADDR_LEN_T optlen;
5405 char strbuf[ISC_STRERRORSIZE];
5406 char peerbuf[ISC_SOCKADDR_FORMATSIZE];
5409 INSIST(ev->ev_type == ISC_SOCKEVENT_INTW);
5411 sock = ev->ev_sender;
5412 INSIST(VALID_SOCKET(sock));
5417 * When the internal event was sent the reference count was bumped
5418 * to keep the socket around for us. Decrement the count here.
5420 INSIST(sock->references > 0);
5422 if (sock->references == 0) {
5423 UNLOCK(&sock->lock);
5429 * Has this event been canceled?
5431 dev = sock->connect_ev;
5433 INSIST(!sock->connecting);
5434 UNLOCK(&sock->lock);
5438 INSIST(sock->connecting);
5439 sock->connecting = 0;
5442 * Get any possible error status here.
5444 optlen = sizeof(cc);
5445 if (getsockopt(sock->fd, SOL_SOCKET, SO_ERROR,
5446 (void *)&cc, (void *)&optlen) < 0)
5453 * If the error is EAGAIN, just re-select on this
5454 * fd and pretend nothing strange happened.
5456 if (SOFT_ERROR(errno) || errno == EINPROGRESS) {
5457 sock->connecting = 1;
5458 select_poke(sock->manager, sock->fd,
5459 SELECT_POKE_CONNECT);
5460 UNLOCK(&sock->lock);
5465 inc_stats(sock->manager->stats,
5466 sock->statsindex[STATID_CONNECTFAIL]);
5469 * Translate other errors into ISC_R_* flavors.
5472 #define ERROR_MATCH(a, b) case a: dev->result = b; break;
5473 ERROR_MATCH(EACCES, ISC_R_NOPERM);
5474 ERROR_MATCH(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
5475 ERROR_MATCH(EAFNOSUPPORT, ISC_R_ADDRNOTAVAIL);
5476 ERROR_MATCH(ECONNREFUSED, ISC_R_CONNREFUSED);
5477 ERROR_MATCH(EHOSTUNREACH, ISC_R_HOSTUNREACH);
5479 ERROR_MATCH(EHOSTDOWN, ISC_R_HOSTUNREACH);
5481 ERROR_MATCH(ENETUNREACH, ISC_R_NETUNREACH);
5482 ERROR_MATCH(ENOBUFS, ISC_R_NORESOURCES);
5483 ERROR_MATCH(EPERM, ISC_R_HOSTUNREACH);
5484 ERROR_MATCH(EPIPE, ISC_R_NOTCONNECTED);
5485 ERROR_MATCH(ETIMEDOUT, ISC_R_TIMEDOUT);
5486 ERROR_MATCH(ECONNRESET, ISC_R_CONNECTIONRESET);
5489 dev->result = ISC_R_UNEXPECTED;
5490 isc_sockaddr_format(&sock->peer_address, peerbuf,
5492 isc__strerror(errno, strbuf, sizeof(strbuf));
5493 UNEXPECTED_ERROR(__FILE__, __LINE__,
5494 "internal_connect: connect(%s) %s",
5498 inc_stats(sock->manager->stats,
5499 sock->statsindex[STATID_CONNECT]);
5500 dev->result = ISC_R_SUCCESS;
5501 sock->connected = 1;
5505 sock->connect_ev = NULL;
5507 UNLOCK(&sock->lock);
5509 task = dev->ev_sender;
5510 dev->ev_sender = sock;
5511 isc_task_sendanddetach(&task, ISC_EVENT_PTR(&dev));
5514 ISC_SOCKETFUNC_SCOPE isc_result_t
5515 isc__socket_getpeername(isc_socket_t *sock0, isc_sockaddr_t *addressp) {
5516 isc__socket_t *sock = (isc__socket_t *)sock0;
5517 isc_result_t result;
5519 REQUIRE(VALID_SOCKET(sock));
5520 REQUIRE(addressp != NULL);
5524 if (sock->connected) {
5525 *addressp = sock->peer_address;
5526 result = ISC_R_SUCCESS;
5528 result = ISC_R_NOTCONNECTED;
5531 UNLOCK(&sock->lock);
5536 ISC_SOCKETFUNC_SCOPE isc_result_t
5537 isc__socket_getsockname(isc_socket_t *sock0, isc_sockaddr_t *addressp) {
5538 isc__socket_t *sock = (isc__socket_t *)sock0;
5539 ISC_SOCKADDR_LEN_T len;
5540 isc_result_t result;
5541 char strbuf[ISC_STRERRORSIZE];
5543 REQUIRE(VALID_SOCKET(sock));
5544 REQUIRE(addressp != NULL);
5549 result = ISC_R_NOTBOUND;
5553 result = ISC_R_SUCCESS;
5555 len = sizeof(addressp->type);
5556 if (getsockname(sock->fd, &addressp->type.sa, (void *)&len) < 0) {
5557 isc__strerror(errno, strbuf, sizeof(strbuf));
5558 UNEXPECTED_ERROR(__FILE__, __LINE__, "getsockname: %s",
5560 result = ISC_R_UNEXPECTED;
5563 addressp->length = (unsigned int)len;
5566 UNLOCK(&sock->lock);
5572 * Run through the list of events on this socket, and cancel the ones
5573 * queued for task "task" of type "how". "how" is a bitmask.
5575 ISC_SOCKETFUNC_SCOPE void
5576 isc__socket_cancel(isc_socket_t *sock0, isc_task_t *task, unsigned int how) {
5577 isc__socket_t *sock = (isc__socket_t *)sock0;
5579 REQUIRE(VALID_SOCKET(sock));
5582 * Quick exit if there is nothing to do. Don't even bother locking
5591 * All of these do the same thing, more or less.
5593 * o If the internal event is marked as "posted" try to
5594 * remove it from the task's queue. If this fails, mark it
5595 * as canceled instead, and let the task clean it up later.
5596 * o For each I/O request for that task of that type, post
5597 * its done event with status of "ISC_R_CANCELED".
5598 * o Reset any state needed.
5600 if (((how & ISC_SOCKCANCEL_RECV) == ISC_SOCKCANCEL_RECV)
5601 && !ISC_LIST_EMPTY(sock->recv_list)) {
5602 isc_socketevent_t *dev;
5603 isc_socketevent_t *next;
5604 isc_task_t *current_task;
5606 dev = ISC_LIST_HEAD(sock->recv_list);
5608 while (dev != NULL) {
5609 current_task = dev->ev_sender;
5610 next = ISC_LIST_NEXT(dev, ev_link);
5612 if ((task == NULL) || (task == current_task)) {
5613 dev->result = ISC_R_CANCELED;
5614 send_recvdone_event(sock, &dev);
5620 if (((how & ISC_SOCKCANCEL_SEND) == ISC_SOCKCANCEL_SEND)
5621 && !ISC_LIST_EMPTY(sock->send_list)) {
5622 isc_socketevent_t *dev;
5623 isc_socketevent_t *next;
5624 isc_task_t *current_task;
5626 dev = ISC_LIST_HEAD(sock->send_list);
5628 while (dev != NULL) {
5629 current_task = dev->ev_sender;
5630 next = ISC_LIST_NEXT(dev, ev_link);
5632 if ((task == NULL) || (task == current_task)) {
5633 dev->result = ISC_R_CANCELED;
5634 send_senddone_event(sock, &dev);
5640 if (((how & ISC_SOCKCANCEL_ACCEPT) == ISC_SOCKCANCEL_ACCEPT)
5641 && !ISC_LIST_EMPTY(sock->accept_list)) {
5642 isc_socket_newconnev_t *dev;
5643 isc_socket_newconnev_t *next;
5644 isc_task_t *current_task;
5646 dev = ISC_LIST_HEAD(sock->accept_list);
5647 while (dev != NULL) {
5648 current_task = dev->ev_sender;
5649 next = ISC_LIST_NEXT(dev, ev_link);
5651 if ((task == NULL) || (task == current_task)) {
5653 ISC_LIST_UNLINK(sock->accept_list, dev,
5656 NEWCONNSOCK(dev)->references--;
5657 free_socket((isc__socket_t **)&dev->newsocket);
5659 dev->result = ISC_R_CANCELED;
5660 dev->ev_sender = sock;
5661 isc_task_sendanddetach(¤t_task,
5662 ISC_EVENT_PTR(&dev));
5670 * Connecting is not a list.
5672 if (((how & ISC_SOCKCANCEL_CONNECT) == ISC_SOCKCANCEL_CONNECT)
5673 && sock->connect_ev != NULL) {
5674 isc_socket_connev_t *dev;
5675 isc_task_t *current_task;
5677 INSIST(sock->connecting);
5678 sock->connecting = 0;
5680 dev = sock->connect_ev;
5681 current_task = dev->ev_sender;
5683 if ((task == NULL) || (task == current_task)) {
5684 sock->connect_ev = NULL;
5686 dev->result = ISC_R_CANCELED;
5687 dev->ev_sender = sock;
5688 isc_task_sendanddetach(¤t_task,
5689 ISC_EVENT_PTR(&dev));
5693 UNLOCK(&sock->lock);
5696 ISC_SOCKETFUNC_SCOPE isc_sockettype_t
5697 isc__socket_gettype(isc_socket_t *sock0) {
5698 isc__socket_t *sock = (isc__socket_t *)sock0;
5700 REQUIRE(VALID_SOCKET(sock));
5702 return (sock->type);
5705 ISC_SOCKETFUNC_SCOPE isc_boolean_t
5706 isc__socket_isbound(isc_socket_t *sock0) {
5707 isc__socket_t *sock = (isc__socket_t *)sock0;
5710 REQUIRE(VALID_SOCKET(sock));
5713 val = ((sock->bound) ? ISC_TRUE : ISC_FALSE);
5714 UNLOCK(&sock->lock);
5719 ISC_SOCKETFUNC_SCOPE void
5720 isc__socket_ipv6only(isc_socket_t *sock0, isc_boolean_t yes) {
5721 isc__socket_t *sock = (isc__socket_t *)sock0;
5722 #if defined(IPV6_V6ONLY)
5723 int onoff = yes ? 1 : 0;
5729 REQUIRE(VALID_SOCKET(sock));
5730 INSIST(!sock->dupped);
5733 if (sock->pf == AF_INET6) {
5734 if (setsockopt(sock->fd, IPPROTO_IPV6, IPV6_V6ONLY,
5735 (void *)&onoff, sizeof(int)) < 0) {
5736 char strbuf[ISC_STRERRORSIZE];
5737 isc__strerror(errno, strbuf, sizeof(strbuf));
5738 UNEXPECTED_ERROR(__FILE__, __LINE__,
5739 "setsockopt(%d, IPV6_V6ONLY) "
5741 isc_msgcat_get(isc_msgcat,
5748 FIX_IPV6_RECVPKTINFO(sock); /* AIX */
5752 #ifndef USE_WATCHER_THREAD
5754 * In our assumed scenario, we can simply use a single static object.
5755 * XXX: this is not true if the application uses multiple threads with
5756 * 'multi-context' mode. Fixing this is a future TODO item.
5758 static isc_socketwait_t swait_private;
5761 isc__socketmgr_waitevents(isc_socketmgr_t *manager0, struct timeval *tvp,
5762 isc_socketwait_t **swaitp)
5764 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
5769 struct timespec ts, *tsp;
5778 REQUIRE(swaitp != NULL && *swaitp == NULL);
5780 #ifdef USE_SHARED_MANAGER
5781 if (manager == NULL)
5782 manager = socketmgr;
5784 if (manager == NULL)
5789 ts.tv_sec = tvp->tv_sec;
5790 ts.tv_nsec = tvp->tv_usec * 1000;
5794 swait_private.nevents = kevent(manager->kqueue_fd, NULL, 0,
5795 manager->events, manager->nevents,
5797 n = swait_private.nevents;
5798 #elif defined(USE_EPOLL)
5800 timeout = tvp->tv_sec * 1000 + (tvp->tv_usec + 999) / 1000;
5803 swait_private.nevents = epoll_wait(manager->epoll_fd,
5805 manager->nevents, timeout);
5806 n = swait_private.nevents;
5807 #elif defined(USE_DEVPOLL)
5808 dvp.dp_fds = manager->events;
5809 dvp.dp_nfds = manager->nevents;
5811 dvp.dp_timeout = tvp->tv_sec * 1000 +
5812 (tvp->tv_usec + 999) / 1000;
5814 dvp.dp_timeout = -1;
5815 swait_private.nevents = ioctl(manager->devpoll_fd, DP_POLL, &dvp);
5816 n = swait_private.nevents;
5817 #elif defined(USE_SELECT)
5818 memcpy(manager->read_fds_copy, manager->read_fds, manager->fd_bufsize);
5819 memcpy(manager->write_fds_copy, manager->write_fds,
5820 manager->fd_bufsize);
5822 swait_private.readset = manager->read_fds_copy;
5823 swait_private.writeset = manager->write_fds_copy;
5824 swait_private.maxfd = manager->maxfd + 1;
5826 n = select(swait_private.maxfd, swait_private.readset,
5827 swait_private.writeset, NULL, tvp);
5830 *swaitp = &swait_private;
5835 isc__socketmgr_dispatch(isc_socketmgr_t *manager0, isc_socketwait_t *swait) {
5836 isc__socketmgr_t *manager = (isc__socketmgr_t *)manager0;
5838 REQUIRE(swait == &swait_private);
5840 #ifdef USE_SHARED_MANAGER
5841 if (manager == NULL)
5842 manager = socketmgr;
5844 if (manager == NULL)
5845 return (ISC_R_NOTFOUND);
5847 #if defined(USE_KQUEUE) || defined(USE_EPOLL) || defined(USE_DEVPOLL)
5848 (void)process_fds(manager, manager->events, swait->nevents);
5849 return (ISC_R_SUCCESS);
5850 #elif defined(USE_SELECT)
5851 process_fds(manager, swait->maxfd, swait->readset, swait->writeset);
5852 return (ISC_R_SUCCESS);
5855 #endif /* USE_WATCHER_THREAD */
5859 isc__socket_setname(isc_socket_t *socket0, const char *name, void *tag) {
5860 isc__socket_t *socket = (isc__socket_t *)socket0;
5866 REQUIRE(VALID_SOCKET(socket));
5868 LOCK(&socket->lock);
5869 memset(socket->name, 0, sizeof(socket->name));
5870 strncpy(socket->name, name, sizeof(socket->name) - 1);
5872 UNLOCK(&socket->lock);
5875 ISC_SOCKETFUNC_SCOPE const char *
5876 isc__socket_getname(isc_socket_t *socket0) {
5877 isc__socket_t *socket = (isc__socket_t *)socket0;
5879 return (socket->name);
5883 isc__socket_gettag(isc_socket_t *socket0) {
5884 isc__socket_t *socket = (isc__socket_t *)socket0;
5886 return (socket->tag);
5890 #ifdef USE_SOCKETIMPREGISTER
5892 isc__socket_register() {
5893 return (isc_socket_register(isc__socketmgr_create));
5897 ISC_SOCKETFUNC_SCOPE int
5898 isc__socket_getfd(isc_socket_t *socket0) {
5899 isc__socket_t *socket = (isc__socket_t *)socket0;
5901 return ((short) socket->fd);
5904 #if defined(HAVE_LIBXML2) && defined(BIND9)
5907 _socktype(isc_sockettype_t type)
5909 if (type == isc_sockettype_udp)
5911 else if (type == isc_sockettype_tcp)
5913 else if (type == isc_sockettype_unix)
5915 else if (type == isc_sockettype_fdwatch)
5918 return ("not-initialized");
5921 ISC_SOCKETFUNC_SCOPE void
5922 isc_socketmgr_renderxml(isc_socketmgr_t *mgr0, xmlTextWriterPtr writer) {
5923 isc__socketmgr_t *mgr = (isc__socketmgr_t *)mgr0;
5924 isc__socket_t *sock;
5925 char peerbuf[ISC_SOCKADDR_FORMATSIZE];
5926 isc_sockaddr_t addr;
5927 ISC_SOCKADDR_LEN_T len;
5931 #ifdef USE_SHARED_MANAGER
5932 xmlTextWriterStartElement(writer, ISC_XMLCHAR "references");
5933 xmlTextWriterWriteFormatString(writer, "%d", mgr->refs);
5934 xmlTextWriterEndElement(writer);
5935 #endif /* USE_SHARED_MANAGER */
5937 xmlTextWriterStartElement(writer, ISC_XMLCHAR "sockets");
5938 sock = ISC_LIST_HEAD(mgr->socklist);
5939 while (sock != NULL) {
5941 xmlTextWriterStartElement(writer, ISC_XMLCHAR "socket");
5943 xmlTextWriterStartElement(writer, ISC_XMLCHAR "id");
5944 xmlTextWriterWriteFormatString(writer, "%p", sock);
5945 xmlTextWriterEndElement(writer);
5947 if (sock->name[0] != 0) {
5948 xmlTextWriterStartElement(writer, ISC_XMLCHAR "name");
5949 xmlTextWriterWriteFormatString(writer, "%s",
5951 xmlTextWriterEndElement(writer); /* name */
5954 xmlTextWriterStartElement(writer, ISC_XMLCHAR "references");
5955 xmlTextWriterWriteFormatString(writer, "%d", sock->references);
5956 xmlTextWriterEndElement(writer);
5958 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "type",
5959 ISC_XMLCHAR _socktype(sock->type));
5961 if (sock->connected) {
5962 isc_sockaddr_format(&sock->peer_address, peerbuf,
5964 xmlTextWriterWriteElement(writer,
5965 ISC_XMLCHAR "peer-address",
5966 ISC_XMLCHAR peerbuf);
5970 if (getsockname(sock->fd, &addr.type.sa, (void *)&len) == 0) {
5971 isc_sockaddr_format(&addr, peerbuf, sizeof(peerbuf));
5972 xmlTextWriterWriteElement(writer,
5973 ISC_XMLCHAR "local-address",
5974 ISC_XMLCHAR peerbuf);
5977 xmlTextWriterStartElement(writer, ISC_XMLCHAR "states");
5978 if (sock->pending_recv)
5979 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5980 ISC_XMLCHAR "pending-receive");
5981 if (sock->pending_send)
5982 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5983 ISC_XMLCHAR "pending-send");
5984 if (sock->pending_accept)
5985 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5986 ISC_XMLCHAR "pending_accept");
5988 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5989 ISC_XMLCHAR "listener");
5990 if (sock->connected)
5991 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5992 ISC_XMLCHAR "connected");
5993 if (sock->connecting)
5994 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5995 ISC_XMLCHAR "connecting");
5997 xmlTextWriterWriteElement(writer, ISC_XMLCHAR "state",
5998 ISC_XMLCHAR "bound");
6000 xmlTextWriterEndElement(writer); /* states */
6002 xmlTextWriterEndElement(writer); /* socket */
6004 UNLOCK(&sock->lock);
6005 sock = ISC_LIST_NEXT(sock, link);
6007 xmlTextWriterEndElement(writer); /* sockets */
6011 #endif /* HAVE_LIBXML2 */