2019-11-05 13:55:54 -08:00
|
|
|
/*
|
|
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
*
|
|
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
|
|
* information regarding copyright ownership.
|
|
|
|
*/
|
|
|
|
|
2019-12-03 19:48:10 +01:00
|
|
|
#include <libgen.h>
|
2020-02-12 13:59:18 +01:00
|
|
|
#include <unistd.h>
|
2019-11-05 13:55:54 -08:00
|
|
|
#include <uv.h>
|
|
|
|
|
|
|
|
#include <isc/atomic.h>
|
|
|
|
#include <isc/buffer.h>
|
|
|
|
#include <isc/condition.h>
|
2019-11-21 18:38:04 -08:00
|
|
|
#include <isc/log.h>
|
2019-11-05 13:55:54 -08:00
|
|
|
#include <isc/magic.h>
|
|
|
|
#include <isc/mem.h>
|
|
|
|
#include <isc/netmgr.h>
|
|
|
|
#include <isc/quota.h>
|
|
|
|
#include <isc/random.h>
|
|
|
|
#include <isc/refcount.h>
|
|
|
|
#include <isc/region.h>
|
|
|
|
#include <isc/result.h>
|
|
|
|
#include <isc/sockaddr.h>
|
2020-02-28 13:58:13 +01:00
|
|
|
#include <isc/stdtime.h>
|
2019-11-05 13:55:54 -08:00
|
|
|
#include <isc/thread.h>
|
|
|
|
#include <isc/util.h>
|
|
|
|
|
|
|
|
#include "netmgr-int.h"
|
2020-02-12 13:59:18 +01:00
|
|
|
#include "uv-compat.h"
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-28 13:58:13 +01:00
|
|
|
static atomic_uint_fast32_t last_tcpquota_log = ATOMIC_VAR_INIT(0);
|
|
|
|
|
|
|
|
static bool
|
2018-08-07 16:46:53 +02:00
|
|
|
can_log_tcp_quota(void) {
|
2020-02-28 13:58:13 +01:00
|
|
|
isc_stdtime_t now, last;
|
|
|
|
|
|
|
|
isc_stdtime_get(&now);
|
|
|
|
last = atomic_exchange_relaxed(&last_tcpquota_log, now);
|
|
|
|
if (now != last) {
|
|
|
|
return (true);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (false);
|
|
|
|
}
|
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static int
|
|
|
|
tcp_connect_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_close_direct(isc_nmsocket_t *sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static isc_result_t
|
|
|
|
tcp_send_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req);
|
|
|
|
static void
|
|
|
|
tcp_connect_cb(uv_connect_t *uvreq, int status);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_connection_cb(uv_stream_t *server, int status);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
read_cb(uv_stream_t *stream, ssize_t nread, const uv_buf_t *buf);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_close_cb(uv_handle_t *uvhandle);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_listenclose_cb(uv_handle_t *handle);
|
2020-03-24 13:38:51 +01:00
|
|
|
static isc_result_t
|
|
|
|
accept_connection(isc_nmsocket_t *ssock, isc_quota_t *quota);
|
2019-11-28 10:21:34 +01:00
|
|
|
|
2020-06-10 16:19:16 +02:00
|
|
|
static void
|
|
|
|
quota_accept_cb(isc_quota_t *quota, void *sock0);
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
static int
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_connect_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req) {
|
2019-12-03 00:07:59 -08:00
|
|
|
isc__networker_t *worker = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
int r;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
|
|
|
|
|
|
|
worker = &sock->mgr->workers[isc_nm_tid()];
|
|
|
|
|
|
|
|
r = uv_tcp_init(&worker->loop, &sock->uv_handle.tcp);
|
|
|
|
if (r != 0) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_OPENFAIL]);
|
2019-11-05 13:55:54 -08:00
|
|
|
return (r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (req->local.length != 0) {
|
|
|
|
r = uv_tcp_bind(&sock->uv_handle.tcp, &req->local.type.sa, 0);
|
|
|
|
if (r != 0) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr,
|
|
|
|
sock->statsindex[STATID_BINDFAIL]);
|
2019-11-05 13:55:54 -08:00
|
|
|
tcp_close_direct(sock);
|
|
|
|
return (r);
|
|
|
|
}
|
|
|
|
}
|
2019-12-02 11:19:55 +01:00
|
|
|
uv_handle_set_data(&sock->uv_handle.handle, sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
r = uv_tcp_connect(&req->uv_req.connect, &sock->uv_handle.tcp,
|
|
|
|
&req->peer.type.sa, tcp_connect_cb);
|
|
|
|
return (r);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpconnect(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__netievent_tcpconnect_t *ievent =
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_tcpconnect_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nm_uvreq_t *req = ievent->req;
|
2020-02-13 14:44:37 -08:00
|
|
|
int r;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
|
|
|
REQUIRE(worker->id == ievent->req->sock->mgr->workers[isc_nm_tid()].id);
|
|
|
|
|
|
|
|
r = tcp_connect_direct(sock, req);
|
|
|
|
if (r != 0) {
|
|
|
|
/* We need to issue callbacks ourselves */
|
|
|
|
tcp_connect_cb(&req->uv_req.connect, r);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_connect_cb(uv_connect_t *uvreq, int status) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__nm_uvreq_t *req = (isc__nm_uvreq_t *)uvreq->data;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = NULL;
|
2020-02-12 13:59:18 +01:00
|
|
|
sock = uv_handle_get_data((uv_handle_t *)uvreq->handle);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_UVREQ(req));
|
|
|
|
|
|
|
|
if (status == 0) {
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_result_t result;
|
|
|
|
isc_nmhandle_t *handle = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
struct sockaddr_storage ss;
|
|
|
|
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_CONNECT]);
|
2020-02-12 13:59:18 +01:00
|
|
|
uv_tcp_getpeername(&sock->uv_handle.tcp, (struct sockaddr *)&ss,
|
|
|
|
&(int){ sizeof(ss) });
|
2019-11-05 13:55:54 -08:00
|
|
|
result = isc_sockaddr_fromsockaddr(&sock->peer,
|
2020-02-12 13:59:18 +01:00
|
|
|
(struct sockaddr *)&ss);
|
2019-11-05 13:55:54 -08:00
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
|
|
|
|
|
|
|
handle = isc__nmhandle_get(sock, NULL, NULL);
|
|
|
|
req->cb.connect(handle, ISC_R_SUCCESS, req->cbarg);
|
|
|
|
} else {
|
2019-11-15 13:22:13 -08:00
|
|
|
/*
|
|
|
|
* TODO:
|
|
|
|
* Handle the connect error properly and free the socket.
|
|
|
|
*/
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr,
|
|
|
|
sock->statsindex[STATID_CONNECTFAIL]);
|
2019-11-15 13:22:13 -08:00
|
|
|
req->cb.connect(NULL, isc__nm_uverr2result(status), req->cbarg);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
isc__nm_uvreq_put(&req, sock);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
isc_nm_listentcp(isc_nm_t *mgr, isc_nmiface_t *iface, isc_nm_cb_t cb,
|
|
|
|
void *cbarg, size_t extrahandlesize, int backlog,
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_quota_t *quota, isc_nmsocket_t **sockp) {
|
|
|
|
isc_nmsocket_t *nsock = NULL;
|
2019-12-03 00:07:59 -08:00
|
|
|
isc__netievent_tcplisten_t *ievent = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NM(mgr));
|
|
|
|
|
|
|
|
nsock = isc_mem_get(mgr->mctx, sizeof(*nsock));
|
2020-01-05 01:02:12 -08:00
|
|
|
isc__nmsocket_init(nsock, mgr, isc_nm_tcplistener, iface);
|
2019-11-05 13:55:54 -08:00
|
|
|
nsock->rcb.accept = cb;
|
|
|
|
nsock->rcbarg = cbarg;
|
|
|
|
nsock->extrahandlesize = extrahandlesize;
|
2019-11-22 13:19:45 +01:00
|
|
|
nsock->backlog = backlog;
|
2019-12-02 13:54:44 +01:00
|
|
|
nsock->result = ISC_R_SUCCESS;
|
2019-11-05 13:55:54 -08:00
|
|
|
if (quota != NULL) {
|
|
|
|
/*
|
2019-11-22 13:19:45 +01:00
|
|
|
* We don't attach to quota, just assign - to avoid
|
2020-02-20 14:49:36 -08:00
|
|
|
* increasing quota unnecessarily.
|
2019-11-05 13:55:54 -08:00
|
|
|
*/
|
2019-11-22 13:19:45 +01:00
|
|
|
nsock->pquota = quota;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2020-06-10 16:19:16 +02:00
|
|
|
isc_quota_cb_init(&nsock->quotacb, quota_accept_cb, nsock);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2019-12-02 13:54:44 +01:00
|
|
|
ievent = isc__nm_get_ievent(mgr, netievent_tcplisten);
|
2019-11-05 13:55:54 -08:00
|
|
|
ievent->sock = nsock;
|
2019-12-02 13:54:44 +01:00
|
|
|
if (isc__nm_in_netthread()) {
|
|
|
|
nsock->tid = isc_nm_tid();
|
|
|
|
isc__nm_async_tcplisten(&mgr->workers[nsock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-12-02 13:54:44 +01:00
|
|
|
isc__nm_put_ievent(mgr, ievent);
|
|
|
|
} else {
|
|
|
|
nsock->tid = isc_random_uniform(mgr->nworkers);
|
|
|
|
isc__nm_enqueue_ievent(&mgr->workers[nsock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-12-10 10:05:15 +01:00
|
|
|
|
|
|
|
LOCK(&nsock->lock);
|
2020-01-10 14:25:30 -08:00
|
|
|
while (!atomic_load(&nsock->listening) &&
|
|
|
|
!atomic_load(&nsock->listen_error)) {
|
2019-12-10 10:05:15 +01:00
|
|
|
WAIT(&nsock->cond, &nsock->lock);
|
|
|
|
}
|
2019-12-02 13:54:44 +01:00
|
|
|
UNLOCK(&nsock->lock);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2019-12-02 13:54:44 +01:00
|
|
|
if (nsock->result == ISC_R_SUCCESS) {
|
|
|
|
*sockp = nsock;
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
} else {
|
|
|
|
isc_result_t result = nsock->result;
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&nsock);
|
2019-12-02 13:54:44 +01:00
|
|
|
return (result);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* For multi-threaded TCP listening, we create a single socket,
|
|
|
|
* bind to it, and start listening. On an incoming connection we accept
|
|
|
|
* it, and then pass the accepted socket using the uv_export/uv_import
|
|
|
|
* mechanism to a child thread.
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
2019-11-05 13:55:54 -08:00
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcplisten(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcplisten_t *ievent = (isc__netievent_tcplisten_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
|
|
|
struct sockaddr_storage sname;
|
|
|
|
int r, flags = 0, snamelen = sizeof(sname);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
|
|
|
REQUIRE(sock->type == isc_nm_tcplistener);
|
|
|
|
|
|
|
|
r = uv_tcp_init(&worker->loop, &sock->uv_handle.tcp);
|
|
|
|
if (r != 0) {
|
2019-12-02 13:54:44 +01:00
|
|
|
/* It was never opened */
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_OPENFAIL]);
|
2019-12-02 13:54:44 +01:00
|
|
|
atomic_store(&sock->closed, true);
|
|
|
|
sock->result = isc__nm_uverr2result(r);
|
2020-01-10 14:25:30 -08:00
|
|
|
atomic_store(&sock->listen_error, true);
|
2019-12-03 00:07:59 -08:00
|
|
|
goto done;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2020-01-07 10:13:30 -08:00
|
|
|
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_OPEN]);
|
|
|
|
|
2020-01-10 14:25:30 -08:00
|
|
|
if (sock->iface->addr.type.sa.sa_family == AF_INET6) {
|
|
|
|
flags = UV_TCP_IPV6ONLY;
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
r = uv_tcp_bind(&sock->uv_handle.tcp, &sock->iface->addr.type.sa,
|
|
|
|
flags);
|
2019-12-02 11:19:55 +01:00
|
|
|
if (r != 0) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_BINDFAIL]);
|
2019-12-02 13:54:44 +01:00
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
|
|
|
sock->result = isc__nm_uverr2result(r);
|
2020-01-10 14:25:30 -08:00
|
|
|
atomic_store(&sock->listen_error, true);
|
2019-12-03 00:07:59 -08:00
|
|
|
goto done;
|
2019-12-02 11:19:55 +01:00
|
|
|
}
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
/*
|
2020-01-07 12:02:41 +01:00
|
|
|
* By doing this now, we can find out immediately whether bind()
|
|
|
|
* failed, and quit if so. (uv_bind() uses a delayed error,
|
|
|
|
* initially returning success even if bind() fails, and this
|
|
|
|
* could cause a deadlock later if we didn't check first.)
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
2020-02-12 13:59:18 +01:00
|
|
|
r = uv_tcp_getsockname(&sock->uv_handle.tcp, (struct sockaddr *)&sname,
|
|
|
|
&snamelen);
|
2020-01-07 12:02:41 +01:00
|
|
|
if (r != 0) {
|
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
|
|
|
sock->result = isc__nm_uverr2result(r);
|
2020-01-10 14:25:30 -08:00
|
|
|
atomic_store(&sock->listen_error, true);
|
2020-01-07 12:02:41 +01:00
|
|
|
goto done;
|
|
|
|
}
|
2019-12-07 01:48:11 +01:00
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* The callback will run in the same thread uv_listen() was called
|
|
|
|
* from, so a race with tcp_connection_cb() isn't possible.
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
2020-03-24 13:38:51 +01:00
|
|
|
r = uv_listen((uv_stream_t *)&sock->uv_handle.tcp, sock->backlog,
|
|
|
|
tcp_connection_cb);
|
|
|
|
if (r != 0) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"uv_listen failed: %s",
|
|
|
|
isc_result_totext(isc__nm_uverr2result(r)));
|
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
|
|
|
sock->result = isc__nm_uverr2result(r);
|
|
|
|
atomic_store(&sock->listen_error, true);
|
|
|
|
goto done;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_handle_set_data(&sock->uv_handle.handle, sock);
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
atomic_store(&sock->listening, true);
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
done:
|
2019-12-02 13:54:44 +01:00
|
|
|
LOCK(&sock->lock);
|
|
|
|
SIGNAL(&sock->cond);
|
|
|
|
UNLOCK(&sock->lock);
|
2019-11-05 13:55:54 -08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
static void
|
|
|
|
tcp_connection_cb(uv_stream_t *server, int status) {
|
|
|
|
isc_nmsocket_t *psock = uv_handle_get_data((uv_handle_t *)server);
|
|
|
|
isc_result_t result;
|
|
|
|
|
|
|
|
UNUSED(status);
|
|
|
|
|
|
|
|
result = accept_connection(psock, NULL);
|
|
|
|
if (result != ISC_R_SUCCESS && result != ISC_R_NOCONN) {
|
|
|
|
if ((result != ISC_R_QUOTA && result != ISC_R_SOFTQUOTA) ||
|
|
|
|
can_log_tcp_quota()) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"TCP connection failed: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
void
|
2020-03-24 13:38:51 +01:00
|
|
|
isc__nm_async_tcpchildaccept(isc__networker_t *worker, isc__netievent_t *ev0) {
|
|
|
|
isc__netievent_tcpchildaccept_t *ievent =
|
|
|
|
(isc__netievent_tcpchildaccept_t *)ev0;
|
|
|
|
isc_nmsocket_t *ssock = ievent->sock;
|
|
|
|
isc_nmsocket_t *csock = NULL;
|
|
|
|
isc_nmhandle_t *handle;
|
|
|
|
isc_result_t result;
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
isc_sockaddr_t local;
|
2020-02-13 14:44:37 -08:00
|
|
|
int r;
|
2019-11-28 10:21:34 +01:00
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
2020-03-24 13:38:51 +01:00
|
|
|
REQUIRE(ssock->type == isc_nm_tcplistener);
|
2019-11-28 10:21:34 +01:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
csock = isc_mem_get(ssock->mgr->mctx, sizeof(isc_nmsocket_t));
|
|
|
|
isc__nmsocket_init(csock, ssock->mgr, isc_nm_tcpsocket, ssock->iface);
|
|
|
|
csock->tid = isc_nm_tid();
|
|
|
|
csock->extrahandlesize = ssock->extrahandlesize;
|
2020-01-07 12:02:41 +01:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
csock->quota = ievent->quota;
|
|
|
|
ievent->quota = NULL;
|
|
|
|
|
|
|
|
worker = &ssock->mgr->workers[isc_nm_tid()];
|
|
|
|
uv_tcp_init(&worker->loop, &csock->uv_handle.tcp);
|
|
|
|
|
|
|
|
r = isc_uv_import(&csock->uv_handle.stream, &ievent->streaminfo);
|
2020-01-15 12:29:41 +01:00
|
|
|
if (r != 0) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"uv_import failed: %s",
|
|
|
|
isc_result_totext(isc__nm_uverr2result(r)));
|
2020-03-24 13:38:51 +01:00
|
|
|
result = isc__nm_uverr2result(r);
|
|
|
|
goto error;
|
2020-01-15 12:29:41 +01:00
|
|
|
}
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
r = uv_tcp_getpeername(&csock->uv_handle.tcp, (struct sockaddr *)&ss,
|
|
|
|
&(int){ sizeof(ss) });
|
|
|
|
if (r != 0) {
|
|
|
|
result = isc__nm_uverr2result(r);
|
|
|
|
goto error;
|
|
|
|
}
|
2020-01-07 12:02:41 +01:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
result = isc_sockaddr_fromsockaddr(&csock->peer,
|
|
|
|
(struct sockaddr *)&ss);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = uv_tcp_getsockname(&csock->uv_handle.tcp, (struct sockaddr *)&ss,
|
|
|
|
&(int){ sizeof(ss) });
|
2019-11-28 10:21:34 +01:00
|
|
|
if (r != 0) {
|
2020-03-24 13:38:51 +01:00
|
|
|
result = isc__nm_uverr2result(r);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
result = isc_sockaddr_fromsockaddr(&local, (struct sockaddr *)&ss);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto error;
|
2019-11-28 10:21:34 +01:00
|
|
|
}
|
2020-03-24 13:38:51 +01:00
|
|
|
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_attach(ssock, &csock->server);
|
2020-03-24 13:38:51 +01:00
|
|
|
|
|
|
|
handle = isc__nmhandle_get(csock, NULL, &local);
|
|
|
|
|
|
|
|
INSIST(ssock->rcb.accept != NULL);
|
|
|
|
csock->read_timeout = ssock->mgr->init;
|
|
|
|
ssock->rcb.accept(handle, ISC_R_SUCCESS, ssock->rcbarg);
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&csock);
|
2020-03-24 13:38:51 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
error:
|
|
|
|
/*
|
|
|
|
* Detach the quota early to make room for other connections;
|
|
|
|
* otherwise it'd be detached later asynchronously, and clog
|
|
|
|
* the quota unnecessarily.
|
|
|
|
*/
|
|
|
|
if (csock->quota != NULL) {
|
|
|
|
isc_quota_detach(&csock->quota);
|
|
|
|
}
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL, ISC_LOGMODULE_NETMGR,
|
|
|
|
ISC_LOG_ERROR, "Accepting TCP connection failed: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Detach the socket properly to make sure uv_close() is called.
|
|
|
|
*/
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&csock);
|
2019-11-28 10:21:34 +01:00
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_stoplistening(isc_nmsocket_t *sock) {
|
2019-12-09 12:24:46 -08:00
|
|
|
isc__netievent_tcpstop_t *ievent = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(!isc__nm_in_netthread());
|
|
|
|
|
2019-12-09 12:24:46 -08:00
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpstop);
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_attach(sock, &ievent->sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpstop(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcpstop_t *ievent = (isc__netievent_tcpstop_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2019-11-28 10:21:34 +01:00
|
|
|
|
|
|
|
UNUSED(worker);
|
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->type == isc_nm_tcplistener);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If network manager is interlocked, re-enqueue the event for later.
|
|
|
|
*/
|
|
|
|
if (!isc__nm_acquire_interlocked(sock->mgr)) {
|
2019-12-09 12:24:46 -08:00
|
|
|
isc__netievent_tcpstop_t *event = NULL;
|
2019-11-28 10:21:34 +01:00
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
event = isc__nm_get_ievent(sock->mgr, netievent_tcpstop);
|
2019-11-28 10:21:34 +01:00
|
|
|
event->sock = sock;
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)event);
|
2019-11-28 10:21:34 +01:00
|
|
|
} else {
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_close((uv_handle_t *)&sock->uv_handle.tcp,
|
|
|
|
tcp_listenclose_cb);
|
2019-11-28 10:21:34 +01:00
|
|
|
isc__nm_drop_interlocked(sock->mgr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* This callback is used for closing listening sockets.
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_listenclose_cb(uv_handle_t *handle) {
|
2019-12-02 11:19:55 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data(handle);
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
LOCK(&sock->lock);
|
2019-11-28 10:21:34 +01:00
|
|
|
atomic_store(&sock->closed, true);
|
|
|
|
atomic_store(&sock->listening, false);
|
|
|
|
sock->pquota = NULL;
|
2020-03-24 13:38:51 +01:00
|
|
|
UNLOCK(&sock->lock);
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
readtimeout_cb(uv_timer_t *handle) {
|
2019-12-02 11:19:55 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data((uv_handle_t *)handle);
|
2019-11-19 11:56:00 +01:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Socket is actively processing something, so restart the timer
|
|
|
|
* and return.
|
|
|
|
*/
|
|
|
|
if (atomic_load(&sock->processing)) {
|
|
|
|
uv_timer_start(handle, readtimeout_cb, sock->read_timeout, 0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Timeout; stop reading and process whatever we have.
|
|
|
|
*/
|
|
|
|
uv_read_stop(&sock->uv_handle.stream);
|
|
|
|
if (sock->quota) {
|
|
|
|
isc_quota_detach(&sock->quota);
|
|
|
|
}
|
|
|
|
sock->rcb.recv(sock->tcphandle, NULL, sock->rcbarg);
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
isc_result_t
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_read(isc_nmhandle_t *handle, isc_nm_recv_cb_t cb, void *cbarg) {
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = NULL;
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__netievent_startread_t *ievent = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMHANDLE(handle));
|
|
|
|
REQUIRE(VALID_NMSOCK(handle->sock));
|
|
|
|
|
|
|
|
sock = handle->sock;
|
|
|
|
sock->rcb.recv = cb;
|
2019-11-19 11:56:00 +01:00
|
|
|
sock->rcbarg = cbarg;
|
|
|
|
|
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpstartread);
|
|
|
|
ievent->sock = sock;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->tid == isc_nm_tid()) {
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_startread(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__nm_put_ievent(sock->mgr, ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_startread(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_startread_t *ievent = (isc__netievent_startread_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
|
|
|
int r;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(worker->id == isc_nm_tid());
|
2019-11-19 11:56:00 +01:00
|
|
|
if (sock->read_timeout != 0) {
|
|
|
|
if (!sock->timer_initialized) {
|
|
|
|
uv_timer_init(&worker->loop, &sock->timer);
|
2019-12-02 11:19:55 +01:00
|
|
|
uv_handle_set_data((uv_handle_t *)&sock->timer, sock);
|
2019-11-19 11:56:00 +01:00
|
|
|
sock->timer_initialized = true;
|
|
|
|
}
|
2020-02-12 13:59:18 +01:00
|
|
|
uv_timer_start(&sock->timer, readtimeout_cb, sock->read_timeout,
|
|
|
|
0);
|
2019-11-19 11:56:00 +01:00
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-01-07 10:13:30 -08:00
|
|
|
r = uv_read_start(&sock->uv_handle.stream, isc__nm_alloc_cb, read_cb);
|
|
|
|
if (r != 0) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_RECVFAIL]);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_pauseread(isc_nmsocket_t *sock) {
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__netievent_pauseread_t *ievent = NULL;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
2019-11-08 10:52:49 -08:00
|
|
|
if (atomic_load(&sock->readpaused)) {
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
atomic_store(&sock->readpaused, true);
|
2019-11-19 11:56:00 +01:00
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcppauseread);
|
|
|
|
ievent->sock = sock;
|
2019-11-08 10:52:49 -08:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->tid == isc_nm_tid()) {
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_pauseread(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__nm_put_ievent(sock->mgr, ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_pauseread(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_pauseread_t *ievent = (isc__netievent_pauseread_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(worker->id == isc_nm_tid());
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
if (sock->timer_initialized) {
|
|
|
|
uv_timer_stop(&sock->timer);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
uv_read_stop(&sock->uv_handle.stream);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_resumeread(isc_nmsocket_t *sock) {
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__netievent_startread_t *ievent = NULL;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->rcb.recv != NULL);
|
|
|
|
|
2019-11-08 10:52:49 -08:00
|
|
|
if (!atomic_load(&sock->readpaused)) {
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
atomic_store(&sock->readpaused, false);
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpstartread);
|
|
|
|
ievent->sock = sock;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->tid == isc_nm_tid()) {
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_startread(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__nm_put_ievent(sock->mgr, ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
read_cb(uv_stream_t *stream, ssize_t nread, const uv_buf_t *buf) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data((uv_handle_t *)stream);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(buf != NULL);
|
|
|
|
|
|
|
|
if (nread >= 0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc_region_t region = { .base = (unsigned char *)buf->base,
|
|
|
|
.length = nread };
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2019-12-08 23:09:16 +01:00
|
|
|
if (sock->rcb.recv != NULL) {
|
|
|
|
sock->rcb.recv(sock->tcphandle, ®ion, sock->rcbarg);
|
|
|
|
}
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2019-11-20 22:33:35 +01:00
|
|
|
sock->read_timeout = (atomic_load(&sock->keepalive)
|
2020-02-12 13:59:18 +01:00
|
|
|
? sock->mgr->keepalive
|
|
|
|
: sock->mgr->idle);
|
2019-11-20 22:33:35 +01:00
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
if (sock->timer_initialized && sock->read_timeout != 0) {
|
|
|
|
/* The timer will be updated */
|
|
|
|
uv_timer_start(&sock->timer, readtimeout_cb,
|
|
|
|
sock->read_timeout, 0);
|
|
|
|
}
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nm_free_uvbuf(sock, buf);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
isc__nm_free_uvbuf(sock, buf);
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2019-12-08 23:09:16 +01:00
|
|
|
/*
|
2020-01-07 10:13:30 -08:00
|
|
|
* This might happen if the inner socket is closing. It means that
|
|
|
|
* it's detached, so the socket will be closed.
|
2019-12-08 23:09:16 +01:00
|
|
|
*/
|
|
|
|
if (sock->rcb.recv != NULL) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_RECVFAIL]);
|
2019-12-08 23:09:16 +01:00
|
|
|
sock->rcb.recv(sock->tcphandle, NULL, sock->rcbarg);
|
|
|
|
}
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
/*
|
2019-11-15 13:22:13 -08:00
|
|
|
* We don't need to clean up now; the socket will be closed and
|
|
|
|
* resources and quota reclaimed when handle is freed in
|
|
|
|
* isc__nm_tcp_close().
|
2019-11-05 13:55:54 -08:00
|
|
|
*/
|
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
static void
|
|
|
|
quota_accept_cb(isc_quota_t *quota, void *sock0) {
|
|
|
|
isc_nmsocket_t *sock = (isc_nmsocket_t *)sock0;
|
|
|
|
isc__netievent_tcpaccept_t *ievent = NULL;
|
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a tcpaccept event and pass it using the async channel.
|
|
|
|
*/
|
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpaccept);
|
|
|
|
ievent->sock = sock;
|
|
|
|
ievent->quota = quota;
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is called after we get a quota_accept_cb() callback.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
isc__nm_async_tcpaccept(isc__networker_t *worker, isc__netievent_t *ev0) {
|
|
|
|
isc_result_t result;
|
|
|
|
isc__netievent_tcpaccept_t *ievent = (isc__netievent_tcpaccept_t *)ev0;
|
|
|
|
|
|
|
|
REQUIRE(worker->id == ievent->sock->tid);
|
|
|
|
|
|
|
|
result = accept_connection(ievent->sock, ievent->quota);
|
|
|
|
if (result != ISC_R_SUCCESS && result != ISC_R_NOCONN) {
|
|
|
|
if ((result != ISC_R_QUOTA && result != ISC_R_SOFTQUOTA) ||
|
|
|
|
can_log_tcp_quota()) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"TCP connection failed: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The socket was attached just before we called isc_quota_attach_cb().
|
|
|
|
*/
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&ievent->sock);
|
2020-03-24 13:38:51 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Close callback for uv_tcp_t strutures created in accept_connection().
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
free_uvtcpt(uv_handle_t *uvs) {
|
|
|
|
isc_mem_t *mctx = (isc_mem_t *)uv_handle_get_data(uvs);
|
|
|
|
isc_mem_putanddetach(&mctx, uvs, sizeof(uv_tcp_t));
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
static isc_result_t
|
2020-03-24 13:38:51 +01:00
|
|
|
accept_connection(isc_nmsocket_t *ssock, isc_quota_t *quota) {
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_result_t result;
|
2020-03-24 13:38:51 +01:00
|
|
|
isc__netievent_tcpchildaccept_t *event = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__networker_t *worker = NULL;
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_tcp_t *uvstream = NULL;
|
|
|
|
isc_mem_t *mctx = NULL;
|
|
|
|
int r, w;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(ssock));
|
|
|
|
REQUIRE(ssock->tid == isc_nm_tid());
|
|
|
|
|
2019-11-22 15:57:42 -08:00
|
|
|
if (!atomic_load_relaxed(&ssock->active) ||
|
2020-02-13 14:44:37 -08:00
|
|
|
atomic_load_relaxed(&ssock->mgr->closing))
|
|
|
|
{
|
2019-11-05 13:55:54 -08:00
|
|
|
/* We're closing, bail */
|
2020-03-24 13:38:51 +01:00
|
|
|
if (quota != NULL) {
|
|
|
|
isc_quota_detach("a);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
return (ISC_R_CANCELED);
|
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
/* We can be called directly or as a callback from quota */
|
|
|
|
if (ssock->pquota != NULL && quota == NULL) {
|
2020-02-28 11:57:51 +01:00
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* We need to attach to ssock, because it might be queued
|
|
|
|
* waiting for a TCP quota slot. If so, then we'll detach it
|
|
|
|
* later when the connection is accepted. (XXX: This may be
|
2020-06-10 16:19:16 +02:00
|
|
|
* suboptimal, it might be better not to attach unless
|
|
|
|
* we need to - but we risk a race then.)
|
2020-02-28 11:57:51 +01:00
|
|
|
*/
|
2020-03-24 13:38:51 +01:00
|
|
|
isc_nmsocket_t *tsock = NULL;
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_attach(ssock, &tsock);
|
2020-03-24 13:38:51 +01:00
|
|
|
result = isc_quota_attach_cb(ssock->pquota, "a,
|
|
|
|
&ssock->quotacb);
|
|
|
|
if (result == ISC_R_QUOTA) {
|
|
|
|
isc__nm_incstats(ssock->mgr,
|
|
|
|
ssock->statsindex[STATID_ACCEPTFAIL]);
|
|
|
|
return (result);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2020-03-24 13:38:51 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We're under quota, so there's no need to wait;
|
2020-06-10 16:19:16 +02:00
|
|
|
* Detach the socket.
|
2020-03-24 13:38:51 +01:00
|
|
|
*/
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&tsock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(ssock->mgr, ssock->statsindex[STATID_ACCEPT]);
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
worker = &ssock->mgr->workers[isc_nm_tid()];
|
2020-03-24 13:38:51 +01:00
|
|
|
uvstream = isc_mem_get(ssock->mgr->mctx, sizeof(uv_tcp_t));
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
isc_mem_attach(ssock->mgr->mctx, &mctx);
|
|
|
|
uv_handle_set_data((uv_handle_t *)uvstream, mctx);
|
|
|
|
mctx = NULL; /* Detached later in free_uvtcpt() */
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_tcp_init(&worker->loop, uvstream);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
r = uv_accept(&ssock->uv_handle.stream, (uv_stream_t *)uvstream);
|
2020-01-14 11:00:41 +01:00
|
|
|
if (r != 0) {
|
|
|
|
result = isc__nm_uverr2result(r);
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_close((uv_handle_t *)uvstream, free_uvtcpt);
|
|
|
|
isc_quota_detach("a);
|
|
|
|
return (result);
|
2020-01-14 11:00:41 +01:00
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
/* We have an accepted TCP socket, pass it to a random worker */
|
|
|
|
w = isc_random_uniform(ssock->mgr->nworkers);
|
|
|
|
event = isc__nm_get_ievent(ssock->mgr, netievent_tcpchildaccept);
|
|
|
|
event->sock = ssock;
|
|
|
|
event->quota = quota;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
r = isc_uv_export((uv_stream_t *)uvstream, &event->streaminfo);
|
|
|
|
RUNTIME_CHECK(r == 0);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_close((uv_handle_t *)uvstream, free_uvtcpt);
|
2020-01-14 11:00:41 +01:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
if (w == isc_nm_tid()) {
|
|
|
|
isc__nm_async_tcpchildaccept(&ssock->mgr->workers[w],
|
|
|
|
(isc__netievent_t *)event);
|
|
|
|
isc__nm_put_ievent(ssock->mgr, event);
|
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&ssock->mgr->workers[w],
|
|
|
|
(isc__netievent_t *)event);
|
2020-02-28 11:57:51 +01:00
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
return (ISC_R_SUCCESS);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__nm_tcp_send(isc_nmhandle_t *handle, isc_region_t *region, isc_nm_cb_t cb,
|
2020-02-13 14:44:37 -08:00
|
|
|
void *cbarg) {
|
|
|
|
isc_nmsocket_t *sock = handle->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__netievent_tcpsend_t *ievent = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_uvreq_t *uvreq = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
|
|
|
|
|
|
|
uvreq = isc__nm_uvreq_get(sock->mgr, sock);
|
2020-02-12 13:59:18 +01:00
|
|
|
uvreq->uvbuf.base = (char *)region->base;
|
2019-11-05 13:55:54 -08:00
|
|
|
uvreq->uvbuf.len = region->length;
|
|
|
|
uvreq->handle = handle;
|
|
|
|
isc_nmhandle_ref(uvreq->handle);
|
|
|
|
uvreq->cb.send = cb;
|
|
|
|
uvreq->cbarg = cbarg;
|
|
|
|
|
|
|
|
if (sock->tid == isc_nm_tid()) {
|
|
|
|
/*
|
|
|
|
* If we're in the same thread as the socket we can send the
|
|
|
|
* data directly
|
|
|
|
*/
|
|
|
|
return (tcp_send_direct(sock, uvreq));
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We need to create an event and pass it using async channel
|
|
|
|
*/
|
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpsend);
|
|
|
|
ievent->sock = sock;
|
|
|
|
ievent->req = uvreq;
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_UNEXPECTED);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_send_cb(uv_write_t *req, int status) {
|
|
|
|
isc_result_t result = ISC_R_SUCCESS;
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__nm_uvreq_t *uvreq = (isc__nm_uvreq_t *)req->data;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_UVREQ(uvreq));
|
|
|
|
REQUIRE(VALID_NMHANDLE(uvreq->handle));
|
|
|
|
|
|
|
|
if (status < 0) {
|
|
|
|
result = isc__nm_uverr2result(status);
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(uvreq->sock->mgr,
|
|
|
|
uvreq->sock->statsindex[STATID_SENDFAIL]);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
uvreq->cb.send(uvreq->handle, result, uvreq->cbarg);
|
|
|
|
isc_nmhandle_unref(uvreq->handle);
|
|
|
|
isc__nm_uvreq_put(&uvreq, uvreq->handle->sock);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle 'tcpsend' async event - send a packet on the socket
|
|
|
|
*/
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpsend(isc__networker_t *worker, isc__netievent_t *ev0) {
|
|
|
|
isc_result_t result;
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcpsend_t *ievent = (isc__netievent_tcpsend_t *)ev0;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(worker->id == ievent->sock->tid);
|
|
|
|
|
|
|
|
if (!atomic_load(&ievent->sock->active)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
result = tcp_send_direct(ievent->sock, ievent->req);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
2020-02-12 13:59:18 +01:00
|
|
|
ievent->req->cb.send(ievent->req->handle, result,
|
|
|
|
ievent->req->cbarg);
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nm_uvreq_put(&ievent->req, ievent->req->handle->sock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_send_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req) {
|
2019-11-05 13:55:54 -08:00
|
|
|
int r;
|
|
|
|
|
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
|
|
|
|
|
|
|
isc_nmhandle_ref(req->handle);
|
2020-02-12 13:59:18 +01:00
|
|
|
r = uv_write(&req->uv_req.write, &sock->uv_handle.stream, &req->uvbuf,
|
|
|
|
1, tcp_send_cb);
|
2019-11-05 13:55:54 -08:00
|
|
|
if (r < 0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
2019-11-05 13:55:54 -08:00
|
|
|
req->cb.send(NULL, isc__nm_uverr2result(r), req->cbarg);
|
|
|
|
isc__nm_uvreq_put(&req, sock);
|
|
|
|
return (isc__nm_uverr2result(r));
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_close_cb(uv_handle_t *uvhandle) {
|
2019-12-02 11:19:55 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data(uvhandle);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_CLOSE]);
|
2019-11-05 13:55:54 -08:00
|
|
|
atomic_store(&sock->closed, true);
|
|
|
|
isc__nmsocket_prep_destroy(sock);
|
|
|
|
}
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
timer_close_cb(uv_handle_t *uvhandle) {
|
2019-12-02 11:19:55 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data(uvhandle);
|
2019-11-19 11:56:00 +01:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&sock->server);
|
2019-11-19 11:56:00 +01:00
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_close_direct(isc_nmsocket_t *sock) {
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
|
|
|
if (sock->quota != NULL) {
|
|
|
|
isc_quota_detach(&sock->quota);
|
2020-02-28 11:57:51 +01:00
|
|
|
}
|
2019-11-19 11:56:00 +01:00
|
|
|
if (sock->timer_initialized) {
|
|
|
|
sock->timer_initialized = false;
|
2019-12-06 22:25:52 +01:00
|
|
|
uv_timer_stop(&sock->timer);
|
|
|
|
uv_close((uv_handle_t *)&sock->timer, timer_close_cb);
|
2019-11-19 11:56:00 +01:00
|
|
|
} else {
|
2020-01-14 11:00:41 +01:00
|
|
|
if (sock->server != NULL) {
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&sock->server);
|
2020-01-14 11:00:41 +01:00
|
|
|
}
|
2019-11-19 11:56:00 +01:00
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_tcp_close(isc_nmsocket_t *sock) {
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
|
|
|
|
|
|
|
if (sock->tid == isc_nm_tid()) {
|
|
|
|
tcp_close_direct(sock);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We need to create an event and pass it using async channel
|
|
|
|
*/
|
|
|
|
isc__netievent_tcpclose_t *ievent =
|
|
|
|
isc__nm_get_ievent(sock->mgr, netievent_tcpclose);
|
|
|
|
|
|
|
|
ievent->sock = sock;
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpclose(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcpclose_t *ievent = (isc__netievent_tcpclose_t *)ev0;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(worker->id == ievent->sock->tid);
|
|
|
|
|
|
|
|
tcp_close_direct(ievent->sock);
|
|
|
|
}
|
2019-11-22 14:13:19 +01:00
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_tcp_shutdown(isc_nmsocket_t *sock) {
|
2019-11-22 14:13:19 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
if (sock->type == isc_nm_tcpsocket && sock->tcphandle != NULL &&
|
2020-02-13 14:44:37 -08:00
|
|
|
sock->rcb.recv != NULL)
|
|
|
|
{
|
2019-11-22 15:57:42 -08:00
|
|
|
sock->rcb.recv(sock->tcphandle, NULL, sock->rcbarg);
|
|
|
|
}
|
2019-11-22 14:13:19 +01:00
|
|
|
}
|