2019-11-05 13:55:54 -08:00
|
|
|
/*
|
|
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
2020-09-14 16:20:40 -07:00
|
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
2019-11-05 13:55:54 -08:00
|
|
|
*
|
|
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
|
|
* information regarding copyright ownership.
|
|
|
|
*/
|
|
|
|
|
2019-12-03 19:48:10 +01:00
|
|
|
#include <libgen.h>
|
2020-02-12 13:59:18 +01:00
|
|
|
#include <unistd.h>
|
2019-11-05 13:55:54 -08:00
|
|
|
#include <uv.h>
|
|
|
|
|
|
|
|
#include <isc/atomic.h>
|
|
|
|
#include <isc/buffer.h>
|
|
|
|
#include <isc/condition.h>
|
2020-10-20 12:55:58 +02:00
|
|
|
#include <isc/errno.h>
|
2019-11-21 18:38:04 -08:00
|
|
|
#include <isc/log.h>
|
2019-11-05 13:55:54 -08:00
|
|
|
#include <isc/magic.h>
|
|
|
|
#include <isc/mem.h>
|
|
|
|
#include <isc/netmgr.h>
|
|
|
|
#include <isc/quota.h>
|
|
|
|
#include <isc/random.h>
|
|
|
|
#include <isc/refcount.h>
|
|
|
|
#include <isc/region.h>
|
|
|
|
#include <isc/result.h>
|
|
|
|
#include <isc/sockaddr.h>
|
2020-02-28 13:58:13 +01:00
|
|
|
#include <isc/stdtime.h>
|
2019-11-05 13:55:54 -08:00
|
|
|
#include <isc/thread.h>
|
|
|
|
#include <isc/util.h>
|
|
|
|
|
|
|
|
#include "netmgr-int.h"
|
2020-02-12 13:59:18 +01:00
|
|
|
#include "uv-compat.h"
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-28 13:58:13 +01:00
|
|
|
static atomic_uint_fast32_t last_tcpquota_log = ATOMIC_VAR_INIT(0);
|
|
|
|
|
|
|
|
static bool
|
2018-08-07 16:46:53 +02:00
|
|
|
can_log_tcp_quota(void) {
|
2020-02-28 13:58:13 +01:00
|
|
|
isc_stdtime_t now, last;
|
|
|
|
|
|
|
|
isc_stdtime_get(&now);
|
|
|
|
last = atomic_exchange_relaxed(&last_tcpquota_log, now);
|
|
|
|
if (now != last) {
|
|
|
|
return (true);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (false);
|
|
|
|
}
|
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static int
|
|
|
|
tcp_connect_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_close_direct(isc_nmsocket_t *sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static isc_result_t
|
|
|
|
tcp_send_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req);
|
|
|
|
static void
|
|
|
|
tcp_connect_cb(uv_connect_t *uvreq, int status);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_connection_cb(uv_stream_t *server, int status);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
read_cb(uv_stream_t *stream, ssize_t nread, const uv_buf_t *buf);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_close_cb(uv_handle_t *uvhandle);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
static void
|
|
|
|
tcp_listenclose_cb(uv_handle_t *handle);
|
2020-03-24 13:38:51 +01:00
|
|
|
static isc_result_t
|
|
|
|
accept_connection(isc_nmsocket_t *ssock, isc_quota_t *quota);
|
2019-11-28 10:21:34 +01:00
|
|
|
|
2020-06-10 16:19:16 +02:00
|
|
|
static void
|
|
|
|
quota_accept_cb(isc_quota_t *quota, void *sock0);
|
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
static void
|
|
|
|
failed_accept_cb(isc_nmsocket_t *sock, isc_result_t eresult);
|
|
|
|
|
|
|
|
static void
|
|
|
|
failed_accept_cb(isc_nmsocket_t *sock, isc_result_t eresult) {
|
|
|
|
/*
|
|
|
|
* Detach the quota early to make room for other connections;
|
|
|
|
* otherwise it'd be detached later asynchronously, and clog
|
|
|
|
* the quota unnecessarily.
|
|
|
|
*/
|
|
|
|
if (sock->quota != NULL) {
|
|
|
|
isc_quota_detach(&sock->quota);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!sock->accepting) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
sock->accepting = false;
|
|
|
|
|
|
|
|
switch (eresult) {
|
|
|
|
case ISC_R_NOTCONNECTED:
|
|
|
|
/* IGNORE: The client disconnected before we could accept */
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"Accepting TCP connection failed: %s",
|
|
|
|
isc_result_totext(eresult));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Detach the socket properly to make sure uv_close() is called.
|
|
|
|
*/
|
|
|
|
isc__nmsocket_detach(&sock);
|
|
|
|
}
|
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
static void
|
2020-10-29 12:04:00 +01:00
|
|
|
failed_connect_cb(isc_nmsocket_t *sock, isc__nm_uvreq_t *req,
|
|
|
|
isc_result_t eresult) {
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(VALID_UVREQ(req));
|
2020-10-26 14:19:37 +01:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
|
|
|
|
if (sock->timer_running) {
|
|
|
|
uv_timer_stop(&sock->timer);
|
|
|
|
sock->timer_running = false;
|
|
|
|
}
|
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (!atomic_load(&sock->connecting)) {
|
2020-10-26 14:19:37 +01:00
|
|
|
return;
|
|
|
|
}
|
2020-10-27 20:00:08 +01:00
|
|
|
|
|
|
|
atomic_store(&sock->connecting, false);
|
2020-09-05 11:07:40 -07:00
|
|
|
|
2020-10-26 14:19:37 +01:00
|
|
|
isc__nmsocket_clearcb(sock);
|
2020-09-05 11:07:40 -07:00
|
|
|
if (req->cb.connect != NULL) {
|
2020-10-26 14:19:37 +01:00
|
|
|
req->cb.connect(NULL, eresult, req->cbarg);
|
2020-09-05 11:07:40 -07:00
|
|
|
}
|
2020-10-26 14:19:37 +01:00
|
|
|
req->cb.connect = NULL;
|
|
|
|
req->cbarg = NULL;
|
2020-09-05 11:07:40 -07:00
|
|
|
|
|
|
|
isc__nm_uvreq_put(&req, sock);
|
|
|
|
isc__nmsocket_detach(&sock);
|
|
|
|
}
|
|
|
|
|
2020-10-26 14:19:37 +01:00
|
|
|
static void
|
|
|
|
connecttimeout_cb(uv_timer_t *handle) {
|
|
|
|
isc__nm_uvreq_t *req = uv_handle_get_data((uv_handle_t *)handle);
|
|
|
|
isc_nmsocket_t *sock = req->sock;
|
|
|
|
|
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
failed_connect_cb(sock, req, ISC_R_TIMEDOUT);
|
2020-10-26 14:19:37 +01:00
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
static int
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_connect_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req) {
|
2019-12-03 00:07:59 -08:00
|
|
|
isc__networker_t *worker = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
int r;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
2020-10-26 14:19:37 +01:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-26 14:19:37 +01:00
|
|
|
worker = &sock->mgr->workers[sock->tid];
|
2020-09-05 11:07:40 -07:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
atomic_store(&sock->connecting, true);
|
2020-09-05 11:07:40 -07:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
r = uv_tcp_init(&worker->loop, &sock->uv_handle.tcp);
|
|
|
|
if (r != 0) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_OPENFAIL]);
|
2020-10-29 12:04:00 +01:00
|
|
|
atomic_store(&sock->closing, true);
|
2019-12-16 18:24:55 -08:00
|
|
|
atomic_store(&sock->closed, true);
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
2019-12-16 18:24:55 -08:00
|
|
|
atomic_store(&sock->connect_error, true);
|
2020-10-29 12:04:00 +01:00
|
|
|
failed_connect_cb(sock, req, isc__nm_uverr2result(r));
|
|
|
|
atomic_store(&sock->active, false);
|
2019-11-05 13:55:54 -08:00
|
|
|
return (r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (req->local.length != 0) {
|
|
|
|
r = uv_tcp_bind(&sock->uv_handle.tcp, &req->local.type.sa, 0);
|
|
|
|
if (r != 0) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr,
|
|
|
|
sock->statsindex[STATID_BINDFAIL]);
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
2019-12-16 18:24:55 -08:00
|
|
|
atomic_store(&sock->connect_error, true);
|
2020-10-29 12:04:00 +01:00
|
|
|
failed_connect_cb(sock, req, isc__nm_uverr2result(r));
|
|
|
|
atomic_store(&sock->active, false);
|
|
|
|
isc__nm_tcp_close(sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
return (r);
|
|
|
|
}
|
|
|
|
}
|
2019-12-16 18:24:55 -08:00
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
if (!sock->timer_initialized) {
|
|
|
|
uv_timer_init(&worker->loop, &sock->timer);
|
|
|
|
uv_handle_set_data((uv_handle_t *)&sock->timer, req);
|
|
|
|
sock->timer_initialized = true;
|
|
|
|
}
|
2020-10-26 14:19:37 +01:00
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
uv_handle_set_data(&sock->uv_handle.handle, sock);
|
|
|
|
uv_handle_set_data(&req->uv_req.handle, req);
|
2019-11-05 13:55:54 -08:00
|
|
|
r = uv_tcp_connect(&req->uv_req.connect, &sock->uv_handle.tcp,
|
|
|
|
&req->peer.type.sa, tcp_connect_cb);
|
2019-12-16 18:24:55 -08:00
|
|
|
if (r != 0) {
|
|
|
|
isc__nm_incstats(sock->mgr,
|
|
|
|
sock->statsindex[STATID_CONNECTFAIL]);
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
2019-12-16 18:24:55 -08:00
|
|
|
atomic_store(&sock->connect_error, true);
|
2020-10-29 12:04:00 +01:00
|
|
|
failed_connect_cb(sock, req, isc__nm_uverr2result(r));
|
|
|
|
atomic_store(&sock->active, false);
|
|
|
|
isc__nm_tcp_close(sock);
|
2020-09-05 11:07:40 -07:00
|
|
|
return (r);
|
2019-12-16 18:24:55 -08:00
|
|
|
}
|
2020-09-05 11:07:40 -07:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_CONNECT]);
|
|
|
|
|
2020-10-26 14:19:37 +01:00
|
|
|
uv_timer_start(&sock->timer, connecttimeout_cb, sock->connect_timeout,
|
|
|
|
0);
|
|
|
|
sock->timer_running = true;
|
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
return (0);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpconnect(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__netievent_tcpconnect_t *ievent =
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_tcpconnect_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nm_uvreq_t *req = ievent->req;
|
2020-02-13 14:44:37 -08:00
|
|
|
int r;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-26 14:19:37 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
|
2019-12-16 18:24:55 -08:00
|
|
|
UNUSED(worker);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
r = tcp_connect_direct(sock, req);
|
|
|
|
if (r != 0) {
|
2020-10-20 16:06:54 +02:00
|
|
|
LOCK(&sock->lock);
|
|
|
|
SIGNAL(&sock->cond);
|
|
|
|
UNLOCK(&sock->lock);
|
|
|
|
return;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2019-12-16 18:24:55 -08:00
|
|
|
|
|
|
|
atomic_store(&sock->connected, true);
|
|
|
|
|
|
|
|
LOCK(&sock->lock);
|
|
|
|
SIGNAL(&sock->cond);
|
|
|
|
UNLOCK(&sock->lock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_connect_cb(uv_connect_t *uvreq, int status) {
|
2020-06-10 11:32:39 +02:00
|
|
|
isc_result_t result;
|
2020-10-29 12:04:00 +01:00
|
|
|
isc__nm_uvreq_t *req = uv_handle_get_data((uv_handle_t *)uvreq);
|
2020-10-26 14:19:37 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data((uv_handle_t *)uvreq->handle);
|
2020-06-10 11:32:39 +02:00
|
|
|
struct sockaddr_storage ss;
|
|
|
|
isc_nmhandle_t *handle = NULL;
|
2020-10-29 15:42:09 -07:00
|
|
|
int r;
|
2020-06-04 23:13:54 -07:00
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2020-10-26 14:19:37 +01:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2020-09-05 11:07:40 -07:00
|
|
|
|
2020-10-26 14:19:37 +01:00
|
|
|
if (sock->timer_running) {
|
|
|
|
uv_timer_stop(&sock->timer);
|
|
|
|
sock->timer_running = false;
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (!atomic_load(&sock->connecting)) {
|
2020-06-10 11:32:39 +02:00
|
|
|
return;
|
|
|
|
}
|
2020-10-27 20:00:08 +01:00
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
REQUIRE(VALID_UVREQ(req));
|
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
if (status != 0) {
|
|
|
|
failed_connect_cb(sock, req, isc__nm_uverr2result(status));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-10-29 15:42:09 -07:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_CONNECT]);
|
|
|
|
r = uv_tcp_getpeername(&sock->uv_handle.tcp, (struct sockaddr *)&ss,
|
|
|
|
&(int){ sizeof(ss) });
|
|
|
|
if (r != 0) {
|
2020-11-04 15:20:13 +11:00
|
|
|
failed_connect_cb(sock, req, isc__nm_uverr2result(r));
|
2020-10-29 15:42:09 -07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
atomic_store(&sock->connecting, false);
|
2020-10-26 14:19:37 +01:00
|
|
|
|
2020-06-10 11:32:39 +02:00
|
|
|
result = isc_sockaddr_fromsockaddr(&sock->peer, (struct sockaddr *)&ss);
|
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-06-10 11:32:39 +02:00
|
|
|
handle = isc__nmhandle_get(sock, NULL, NULL);
|
|
|
|
req->cb.connect(handle, ISC_R_SUCCESS, req->cbarg);
|
2020-06-04 23:13:54 -07:00
|
|
|
|
2020-06-10 11:32:39 +02:00
|
|
|
isc__nm_uvreq_put(&req, sock);
|
2020-06-04 23:13:54 -07:00
|
|
|
|
2020-06-10 11:32:39 +02:00
|
|
|
/*
|
|
|
|
* The sock is now attached to the handle.
|
|
|
|
*/
|
|
|
|
isc__nmsocket_detach(&sock);
|
|
|
|
|
|
|
|
/*
|
2020-09-03 13:31:27 -07:00
|
|
|
* The connect callback should have attached to the handle.
|
|
|
|
* If it didn't, the socket will be closed now.
|
2020-06-10 11:32:39 +02:00
|
|
|
*/
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_detach(&handle);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2019-12-16 18:24:55 -08:00
|
|
|
isc_result_t
|
|
|
|
isc_nm_tcpconnect(isc_nm_t *mgr, isc_nmiface_t *local, isc_nmiface_t *peer,
|
2020-09-05 11:07:40 -07:00
|
|
|
isc_nm_cb_t cb, void *cbarg, unsigned int timeout,
|
|
|
|
size_t extrahandlesize) {
|
|
|
|
isc_result_t result = ISC_R_SUCCESS;
|
2020-06-29 08:43:54 +02:00
|
|
|
isc_nmsocket_t *nsock = NULL, *tmp = NULL;
|
2019-12-16 18:24:55 -08:00
|
|
|
isc__netievent_tcpconnect_t *ievent = NULL;
|
|
|
|
isc__nm_uvreq_t *req = NULL;
|
|
|
|
|
|
|
|
REQUIRE(VALID_NM(mgr));
|
2020-06-10 11:32:39 +02:00
|
|
|
REQUIRE(local != NULL);
|
|
|
|
REQUIRE(peer != NULL);
|
2019-12-16 18:24:55 -08:00
|
|
|
|
|
|
|
nsock = isc_mem_get(mgr->mctx, sizeof(*nsock));
|
|
|
|
isc__nmsocket_init(nsock, mgr, isc_nm_tcpsocket, local);
|
2020-10-26 14:19:37 +01:00
|
|
|
|
2019-12-16 18:24:55 -08:00
|
|
|
nsock->extrahandlesize = extrahandlesize;
|
2020-09-05 11:07:40 -07:00
|
|
|
nsock->connect_timeout = timeout;
|
2020-10-26 14:19:37 +01:00
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_init(&nsock->result, ISC_R_SUCCESS);
|
|
|
|
atomic_init(&nsock->client, true);
|
2019-12-16 18:24:55 -08:00
|
|
|
|
|
|
|
req = isc__nm_uvreq_get(mgr, nsock);
|
|
|
|
req->cb.connect = cb;
|
|
|
|
req->cbarg = cbarg;
|
|
|
|
req->peer = peer->addr;
|
2020-06-10 11:32:39 +02:00
|
|
|
req->local = local->addr;
|
2019-12-16 18:24:55 -08:00
|
|
|
|
|
|
|
ievent = isc__nm_get_ievent(mgr, netievent_tcpconnect);
|
|
|
|
ievent->sock = nsock;
|
|
|
|
ievent->req = req;
|
|
|
|
|
2020-06-29 08:43:54 +02:00
|
|
|
/*
|
|
|
|
* Async callbacks can dereference the socket in the meantime,
|
|
|
|
* we need to hold an additional reference to it.
|
|
|
|
*/
|
|
|
|
isc__nmsocket_attach(nsock, &tmp);
|
|
|
|
|
2019-12-16 18:24:55 -08:00
|
|
|
if (isc__nm_in_netthread()) {
|
|
|
|
nsock->tid = isc_nm_tid();
|
|
|
|
isc__nm_async_tcpconnect(&mgr->workers[nsock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
|
|
|
isc__nm_put_ievent(mgr, ievent);
|
|
|
|
} else {
|
|
|
|
nsock->tid = isc_random_uniform(mgr->nworkers);
|
|
|
|
isc__nm_enqueue_ievent(&mgr->workers[nsock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
|
|
|
|
|
|
|
LOCK(&nsock->lock);
|
|
|
|
while (!atomic_load(&nsock->connected) &&
|
|
|
|
!atomic_load(&nsock->connect_error)) {
|
|
|
|
WAIT(&nsock->cond, &nsock->lock);
|
|
|
|
}
|
|
|
|
UNLOCK(&nsock->lock);
|
|
|
|
}
|
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
result = atomic_load(&nsock->result);
|
2019-12-16 18:24:55 -08:00
|
|
|
|
2020-06-29 08:43:54 +02:00
|
|
|
isc__nmsocket_detach(&tmp);
|
|
|
|
|
|
|
|
return (result);
|
2019-12-16 18:24:55 -08:00
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
isc_result_t
|
2020-06-17 12:09:10 -07:00
|
|
|
isc_nm_listentcp(isc_nm_t *mgr, isc_nmiface_t *iface,
|
|
|
|
isc_nm_accept_cb_t accept_cb, void *accept_cbarg,
|
|
|
|
size_t extrahandlesize, int backlog, isc_quota_t *quota,
|
|
|
|
isc_nmsocket_t **sockp) {
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *nsock = NULL;
|
2019-12-03 00:07:59 -08:00
|
|
|
isc__netievent_tcplisten_t *ievent = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NM(mgr));
|
|
|
|
|
|
|
|
nsock = isc_mem_get(mgr->mctx, sizeof(*nsock));
|
2020-01-05 01:02:12 -08:00
|
|
|
isc__nmsocket_init(nsock, mgr, isc_nm_tcplistener, iface);
|
2020-09-05 11:07:40 -07:00
|
|
|
|
2020-09-11 10:53:31 +02:00
|
|
|
nsock->accept_cb = accept_cb;
|
2020-06-17 12:09:10 -07:00
|
|
|
nsock->accept_cbarg = accept_cbarg;
|
2019-11-05 13:55:54 -08:00
|
|
|
nsock->extrahandlesize = extrahandlesize;
|
2019-11-22 13:19:45 +01:00
|
|
|
nsock->backlog = backlog;
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_init(&nsock->result, ISC_R_SUCCESS);
|
2019-11-05 13:55:54 -08:00
|
|
|
if (quota != NULL) {
|
|
|
|
/*
|
2019-11-22 13:19:45 +01:00
|
|
|
* We don't attach to quota, just assign - to avoid
|
2020-02-20 14:49:36 -08:00
|
|
|
* increasing quota unnecessarily.
|
2019-11-05 13:55:54 -08:00
|
|
|
*/
|
2019-11-22 13:19:45 +01:00
|
|
|
nsock->pquota = quota;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2020-06-10 16:19:16 +02:00
|
|
|
isc_quota_cb_init(&nsock->quotacb, quota_accept_cb, nsock);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2019-12-02 13:54:44 +01:00
|
|
|
ievent = isc__nm_get_ievent(mgr, netievent_tcplisten);
|
2019-11-05 13:55:54 -08:00
|
|
|
ievent->sock = nsock;
|
2019-12-02 13:54:44 +01:00
|
|
|
if (isc__nm_in_netthread()) {
|
|
|
|
nsock->tid = isc_nm_tid();
|
|
|
|
isc__nm_async_tcplisten(&mgr->workers[nsock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-12-02 13:54:44 +01:00
|
|
|
isc__nm_put_ievent(mgr, ievent);
|
|
|
|
} else {
|
|
|
|
nsock->tid = isc_random_uniform(mgr->nworkers);
|
|
|
|
isc__nm_enqueue_ievent(&mgr->workers[nsock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-12-10 10:05:15 +01:00
|
|
|
|
|
|
|
LOCK(&nsock->lock);
|
2020-01-10 14:25:30 -08:00
|
|
|
while (!atomic_load(&nsock->listening) &&
|
|
|
|
!atomic_load(&nsock->listen_error)) {
|
2019-12-10 10:05:15 +01:00
|
|
|
WAIT(&nsock->cond, &nsock->lock);
|
|
|
|
}
|
2019-12-02 13:54:44 +01:00
|
|
|
UNLOCK(&nsock->lock);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
if (atomic_load(&nsock->result) == ISC_R_SUCCESS) {
|
2019-12-02 13:54:44 +01:00
|
|
|
*sockp = nsock;
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
} else {
|
2020-09-05 11:07:40 -07:00
|
|
|
isc_result_t result = atomic_load(&nsock->result);
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&nsock);
|
2019-12-02 13:54:44 +01:00
|
|
|
return (result);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* For multi-threaded TCP listening, we create a single socket,
|
|
|
|
* bind to it, and start listening. On an incoming connection we accept
|
|
|
|
* it, and then pass the accepted socket using the uv_export/uv_import
|
|
|
|
* mechanism to a child thread.
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
2019-11-05 13:55:54 -08:00
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcplisten(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcplisten_t *ievent = (isc__netievent_tcplisten_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
|
|
|
struct sockaddr_storage sname;
|
|
|
|
int r, flags = 0, snamelen = sizeof(sname);
|
2020-10-05 11:17:52 +02:00
|
|
|
sa_family_t sa_family;
|
2020-10-05 12:25:19 +02:00
|
|
|
uv_os_sock_t fd;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
|
|
|
REQUIRE(sock->type == isc_nm_tcplistener);
|
|
|
|
|
|
|
|
r = uv_tcp_init(&worker->loop, &sock->uv_handle.tcp);
|
|
|
|
if (r != 0) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_OPENFAIL]);
|
2019-12-16 18:24:55 -08:00
|
|
|
/* The socket was never opened, so no need for uv_close() */
|
2019-12-02 13:54:44 +01:00
|
|
|
atomic_store(&sock->closed, true);
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
2020-01-10 14:25:30 -08:00
|
|
|
atomic_store(&sock->listen_error, true);
|
2019-12-03 00:07:59 -08:00
|
|
|
goto done;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2020-01-07 10:13:30 -08:00
|
|
|
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_OPEN]);
|
|
|
|
|
2020-10-05 11:17:52 +02:00
|
|
|
sa_family = sock->iface->addr.type.sa.sa_family;
|
|
|
|
if (sa_family == AF_INET6) {
|
2020-01-10 14:25:30 -08:00
|
|
|
flags = UV_TCP_IPV6ONLY;
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-29 11:15:26 -07:00
|
|
|
uv_tcp_bind(&sock->uv_handle.tcp, &sock->iface->addr.type.sa, flags);
|
|
|
|
r = uv_fileno(&sock->uv_handle.handle, (uv_os_fd_t *)&fd);
|
|
|
|
if (r != 0) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_BINDFAIL]);
|
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
|
|
|
atomic_store(&sock->listen_error, true);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* uv_tcp_bind() uses a delayed error, initially returning
|
|
|
|
* success even if bind() fails. By calling uv_tcp_getsockname()
|
|
|
|
* here we can find out whether the bind() call was successful.
|
|
|
|
*/
|
|
|
|
r = uv_tcp_getsockname(&sock->uv_handle.tcp, (struct sockaddr *)&sname,
|
|
|
|
&snamelen);
|
|
|
|
|
|
|
|
if (r == UV_EADDRINUSE && isc__nm_socket_reuse(fd) == ISC_R_SUCCESS &&
|
|
|
|
isc__nm_socket_reuse_lb(fd) == ISC_R_SUCCESS)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Retry bind() with REUSEADDR/REUSEPORT if the address
|
|
|
|
* was in use.
|
|
|
|
*/
|
|
|
|
uv_tcp_bind(&sock->uv_handle.tcp, &sock->iface->addr.type.sa,
|
|
|
|
flags);
|
|
|
|
r = uv_tcp_getsockname(&sock->uv_handle.tcp,
|
|
|
|
(struct sockaddr *)&sname, &snamelen);
|
|
|
|
}
|
|
|
|
|
2020-07-21 13:29:14 +02:00
|
|
|
if (r == UV_EADDRNOTAVAIL &&
|
2020-10-05 11:17:52 +02:00
|
|
|
isc__nm_socket_freebind(fd, sa_family) == ISC_R_SUCCESS)
|
2020-07-21 13:29:14 +02:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Retry binding with IP_FREEBIND (or equivalent option) if the
|
|
|
|
* address is not available. This helps with IPv6 tentative
|
|
|
|
* addresses which are reported by the route socket, although
|
|
|
|
* named is not yet able to properly bind to them.
|
|
|
|
*/
|
2020-10-29 11:15:26 -07:00
|
|
|
uv_tcp_bind(&sock->uv_handle.tcp, &sock->iface->addr.type.sa,
|
|
|
|
flags);
|
|
|
|
r = uv_tcp_getsockname(&sock->uv_handle.tcp,
|
|
|
|
(struct sockaddr *)&sname, &snamelen);
|
2020-07-21 13:29:14 +02:00
|
|
|
}
|
|
|
|
|
2019-12-02 11:19:55 +01:00
|
|
|
if (r != 0) {
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_BINDFAIL]);
|
2019-12-02 13:54:44 +01:00
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
2020-01-10 14:25:30 -08:00
|
|
|
atomic_store(&sock->listen_error, true);
|
2019-12-03 00:07:59 -08:00
|
|
|
goto done;
|
2019-12-02 11:19:55 +01:00
|
|
|
}
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
/*
|
2020-01-07 12:02:41 +01:00
|
|
|
* By doing this now, we can find out immediately whether bind()
|
|
|
|
* failed, and quit if so. (uv_bind() uses a delayed error,
|
|
|
|
* initially returning success even if bind() fails, and this
|
|
|
|
* could cause a deadlock later if we didn't check first.)
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
2020-02-12 13:59:18 +01:00
|
|
|
r = uv_tcp_getsockname(&sock->uv_handle.tcp, (struct sockaddr *)&sname,
|
|
|
|
&snamelen);
|
2020-01-07 12:02:41 +01:00
|
|
|
if (r != 0) {
|
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
2020-01-10 14:25:30 -08:00
|
|
|
atomic_store(&sock->listen_error, true);
|
2020-01-07 12:02:41 +01:00
|
|
|
goto done;
|
|
|
|
}
|
2019-12-07 01:48:11 +01:00
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* The callback will run in the same thread uv_listen() was called
|
|
|
|
* from, so a race with tcp_connection_cb() isn't possible.
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
2020-03-24 13:38:51 +01:00
|
|
|
r = uv_listen((uv_stream_t *)&sock->uv_handle.tcp, sock->backlog,
|
|
|
|
tcp_connection_cb);
|
|
|
|
if (r != 0) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"uv_listen failed: %s",
|
|
|
|
isc_result_totext(isc__nm_uverr2result(r)));
|
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
2020-09-05 11:07:40 -07:00
|
|
|
atomic_store(&sock->result, isc__nm_uverr2result(r));
|
2020-03-24 13:38:51 +01:00
|
|
|
atomic_store(&sock->listen_error, true);
|
|
|
|
goto done;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_handle_set_data(&sock->uv_handle.handle, sock);
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
atomic_store(&sock->listening, true);
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
done:
|
2019-12-02 13:54:44 +01:00
|
|
|
LOCK(&sock->lock);
|
|
|
|
SIGNAL(&sock->cond);
|
|
|
|
UNLOCK(&sock->lock);
|
2019-11-05 13:55:54 -08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
static void
|
|
|
|
tcp_connection_cb(uv_stream_t *server, int status) {
|
|
|
|
isc_nmsocket_t *psock = uv_handle_get_data((uv_handle_t *)server);
|
|
|
|
isc_result_t result;
|
|
|
|
|
|
|
|
UNUSED(status);
|
|
|
|
|
|
|
|
result = accept_connection(psock, NULL);
|
|
|
|
if (result != ISC_R_SUCCESS && result != ISC_R_NOCONN) {
|
|
|
|
if ((result != ISC_R_QUOTA && result != ISC_R_SOFTQUOTA) ||
|
|
|
|
can_log_tcp_quota()) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"TCP connection failed: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
void
|
2020-03-24 13:38:51 +01:00
|
|
|
isc__nm_async_tcpchildaccept(isc__networker_t *worker, isc__netievent_t *ev0) {
|
|
|
|
isc__netievent_tcpchildaccept_t *ievent =
|
|
|
|
(isc__netievent_tcpchildaccept_t *)ev0;
|
2020-09-18 12:27:40 +02:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2020-03-24 13:38:51 +01:00
|
|
|
isc_nmhandle_t *handle;
|
|
|
|
isc_result_t result;
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
isc_sockaddr_t local;
|
2020-02-13 14:44:37 -08:00
|
|
|
int r;
|
2020-09-11 10:53:31 +02:00
|
|
|
isc_nm_accept_cb_t accept_cb;
|
|
|
|
void *accept_cbarg;
|
2019-11-28 10:21:34 +01:00
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
2020-09-18 12:27:40 +02:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2020-01-07 12:02:41 +01:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (!sock->accepting) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Socket was closed midflight by isc__nm_tcp_shutdown() */
|
|
|
|
if (!isc__nmsocket_active(sock)) {
|
|
|
|
failed_accept_cb(sock, ISC_R_CANCELED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
INSIST(sock->server != NULL);
|
|
|
|
|
|
|
|
if (!isc__nmsocket_active(sock->server)) {
|
|
|
|
failed_accept_cb(sock, ISC_R_CANCELED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
sock->quota = ievent->quota;
|
2020-03-24 13:38:51 +01:00
|
|
|
ievent->quota = NULL;
|
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
worker = &sock->mgr->workers[isc_nm_tid()];
|
|
|
|
uv_tcp_init(&worker->loop, &sock->uv_handle.tcp);
|
2020-03-24 13:38:51 +01:00
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
r = isc_uv_import(&sock->uv_handle.stream, &ievent->streaminfo);
|
2020-01-15 12:29:41 +01:00
|
|
|
if (r != 0) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"uv_import failed: %s",
|
|
|
|
isc_result_totext(isc__nm_uverr2result(r)));
|
2020-03-24 13:38:51 +01:00
|
|
|
result = isc__nm_uverr2result(r);
|
|
|
|
goto error;
|
2020-01-15 12:29:41 +01:00
|
|
|
}
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
r = uv_tcp_getpeername(&sock->uv_handle.tcp, (struct sockaddr *)&ss,
|
2020-03-24 13:38:51 +01:00
|
|
|
&(int){ sizeof(ss) });
|
|
|
|
if (r != 0) {
|
|
|
|
result = isc__nm_uverr2result(r);
|
|
|
|
goto error;
|
|
|
|
}
|
2020-01-07 12:02:41 +01:00
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
result = isc_sockaddr_fromsockaddr(&sock->peer, (struct sockaddr *)&ss);
|
2020-03-24 13:38:51 +01:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
r = uv_tcp_getsockname(&sock->uv_handle.tcp, (struct sockaddr *)&ss,
|
2020-03-24 13:38:51 +01:00
|
|
|
&(int){ sizeof(ss) });
|
2019-11-28 10:21:34 +01:00
|
|
|
if (r != 0) {
|
2020-03-24 13:38:51 +01:00
|
|
|
result = isc__nm_uverr2result(r);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
result = isc_sockaddr_fromsockaddr(&local, (struct sockaddr *)&ss);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto error;
|
2019-11-28 10:21:34 +01:00
|
|
|
}
|
2020-10-27 20:00:08 +01:00
|
|
|
sock->accepting = false;
|
2020-03-24 13:38:51 +01:00
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
handle = isc__nmhandle_get(sock, NULL, &local);
|
2020-03-24 13:38:51 +01:00
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
INSIST(sock->accept_cb != NULL);
|
|
|
|
accept_cb = sock->accept_cb;
|
|
|
|
accept_cbarg = sock->accept_cbarg;
|
2020-03-24 13:38:51 +01:00
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
sock->read_timeout = sock->mgr->init;
|
2020-09-11 10:53:31 +02:00
|
|
|
accept_cb(handle, ISC_R_SUCCESS, accept_cbarg);
|
2020-06-04 23:13:54 -07:00
|
|
|
|
|
|
|
/*
|
2020-09-18 12:27:40 +02:00
|
|
|
* sock is now attached to the handle.
|
2020-06-04 23:13:54 -07:00
|
|
|
*/
|
2020-09-18 12:27:40 +02:00
|
|
|
isc__nmsocket_detach(&sock);
|
2020-06-04 23:13:54 -07:00
|
|
|
|
|
|
|
/*
|
2020-09-03 13:31:27 -07:00
|
|
|
* The accept callback should have attached to the handle.
|
|
|
|
* If it didn't, the socket will be closed now.
|
2020-06-04 23:13:54 -07:00
|
|
|
*/
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_detach(&handle);
|
2020-03-24 13:38:51 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
error:
|
2020-10-27 20:00:08 +01:00
|
|
|
failed_accept_cb(sock, result);
|
2019-11-28 10:21:34 +01:00
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_stoplistening(isc_nmsocket_t *sock) {
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2020-10-02 09:28:29 +02:00
|
|
|
REQUIRE(sock->type == isc_nm_tcplistener);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-02 09:28:29 +02:00
|
|
|
isc__netievent_tcpstop_t *ievent =
|
|
|
|
isc__nm_get_ievent(sock->mgr, netievent_tcpstop);
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_attach(sock, &ievent->sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2019-11-28 10:21:34 +01:00
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpstop(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcpstop_t *ievent = (isc__netievent_tcpstop_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2019-11-28 10:21:34 +01:00
|
|
|
|
|
|
|
UNUSED(worker);
|
|
|
|
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->type == isc_nm_tcplistener);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If network manager is interlocked, re-enqueue the event for later.
|
|
|
|
*/
|
|
|
|
if (!isc__nm_acquire_interlocked(sock->mgr)) {
|
2019-12-09 12:24:46 -08:00
|
|
|
isc__netievent_tcpstop_t *event = NULL;
|
2019-11-28 10:21:34 +01:00
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
event = isc__nm_get_ievent(sock->mgr, netievent_tcpstop);
|
2019-11-28 10:21:34 +01:00
|
|
|
event->sock = sock;
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)event);
|
2019-11-28 10:21:34 +01:00
|
|
|
} else {
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_close((uv_handle_t *)&sock->uv_handle.tcp,
|
|
|
|
tcp_listenclose_cb);
|
2019-11-28 10:21:34 +01:00
|
|
|
isc__nm_drop_interlocked(sock->mgr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* This callback is used for closing listening sockets.
|
2019-11-28 10:21:34 +01:00
|
|
|
*/
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_listenclose_cb(uv_handle_t *handle) {
|
2019-12-02 11:19:55 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data(handle);
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
LOCK(&sock->lock);
|
2019-11-28 10:21:34 +01:00
|
|
|
atomic_store(&sock->closed, true);
|
|
|
|
atomic_store(&sock->listening, false);
|
|
|
|
sock->pquota = NULL;
|
2020-03-24 13:38:51 +01:00
|
|
|
UNLOCK(&sock->lock);
|
2019-12-03 00:07:59 -08:00
|
|
|
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
static void
|
|
|
|
failed_read_cb(isc_nmsocket_t *sock, isc_result_t result) {
|
|
|
|
isc_nm_recv_cb_t cb;
|
|
|
|
void *cbarg = NULL;
|
|
|
|
|
2020-10-26 14:19:37 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->statichandle != NULL);
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
if (sock->timer_initialized) {
|
|
|
|
uv_timer_stop(&sock->timer);
|
2020-09-05 11:07:40 -07:00
|
|
|
sock->timer_running = false;
|
2020-10-21 12:52:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sock->quota) {
|
|
|
|
isc_quota_detach(&sock->quota);
|
|
|
|
}
|
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
uv_read_stop(&sock->uv_handle.stream);
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
cb = sock->recv_cb;
|
|
|
|
cbarg = sock->recv_cbarg;
|
|
|
|
isc__nmsocket_clearcb(sock);
|
|
|
|
|
|
|
|
if (cb != NULL) {
|
|
|
|
cb(sock->statichandle, result, NULL, cbarg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
readtimeout_cb(uv_timer_t *handle) {
|
2019-12-02 11:19:55 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data((uv_handle_t *)handle);
|
2019-11-19 11:56:00 +01:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Socket is actively processing something, so restart the timer
|
|
|
|
* and return.
|
|
|
|
*/
|
|
|
|
if (atomic_load(&sock->processing)) {
|
|
|
|
uv_timer_start(handle, readtimeout_cb, sock->read_timeout, 0);
|
2020-10-27 20:00:08 +01:00
|
|
|
sock->timer_running = true;
|
2019-11-19 11:56:00 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Timeout; stop reading and process whatever we have.
|
|
|
|
*/
|
2020-10-21 12:52:09 +02:00
|
|
|
failed_read_cb(sock, ISC_R_TIMEDOUT);
|
2019-11-19 11:56:00 +01:00
|
|
|
}
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_read(isc_nmhandle_t *handle, isc_nm_recv_cb_t cb, void *cbarg) {
|
2020-10-21 12:52:09 +02:00
|
|
|
isc_nmsocket_t *sock = handle->sock;
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__netievent_startread_t *ievent = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMHANDLE(handle));
|
|
|
|
REQUIRE(VALID_NMSOCK(handle->sock));
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
if (!isc__nmsocket_active(sock)) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_RECVFAIL]);
|
|
|
|
cb(handle, ISC_R_CANCELED, NULL, cbarg);
|
|
|
|
return;
|
|
|
|
}
|
2020-09-11 10:53:31 +02:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (sock->server != NULL && !isc__nmsocket_active(sock->server)) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
|
|
|
cb(handle, ISC_R_CANCELED, NULL, cbarg);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (atomic_load(&sock->mgr->closing)) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
|
|
|
cb(handle, ISC_R_CANCELED, NULL, cbarg);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-09-18 12:27:40 +02:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2020-09-05 11:07:40 -07:00
|
|
|
|
2020-09-11 10:53:31 +02:00
|
|
|
sock->recv_cb = cb;
|
|
|
|
sock->recv_cbarg = cbarg;
|
2019-11-19 11:56:00 +01:00
|
|
|
|
2020-11-02 19:58:05 -08:00
|
|
|
sock->read_timeout = (atomic_load(&sock->keepalive)
|
|
|
|
? sock->mgr->keepalive
|
|
|
|
: sock->mgr->idle);
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpstartread);
|
|
|
|
ievent->sock = sock;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->tid == isc_nm_tid()) {
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_startread(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__nm_put_ievent(sock->mgr, ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
return;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-07-02 16:27:38 +02:00
|
|
|
/*%<
|
|
|
|
* Allocator for TCP read operations. Limited to size 2^16.
|
|
|
|
*
|
|
|
|
* Note this doesn't actually allocate anything, it just assigns the
|
|
|
|
* worker's receive buffer to a socket, and marks it as "in use".
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
tcp_alloc_cb(uv_handle_t *handle, size_t size, uv_buf_t *buf) {
|
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data(handle);
|
|
|
|
isc__networker_t *worker = NULL;
|
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
|
|
|
REQUIRE(isc__nm_in_netthread());
|
|
|
|
REQUIRE(size <= 65536);
|
|
|
|
|
|
|
|
worker = &sock->mgr->workers[sock->tid];
|
|
|
|
INSIST(!worker->recvbuf_inuse);
|
|
|
|
|
|
|
|
buf->base = worker->recvbuf;
|
|
|
|
buf->len = size;
|
|
|
|
worker->recvbuf_inuse = true;
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_startread(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_startread_t *ievent = (isc__netievent_startread_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
|
|
|
int r;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(worker->id == isc_nm_tid());
|
2020-10-21 12:52:09 +02:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (!isc__nmsocket_active(sock)) {
|
|
|
|
failed_read_cb(sock, ISC_R_CANCELED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sock->server != NULL && !isc__nmsocket_active(sock->server)) {
|
|
|
|
failed_read_cb(sock, ISC_R_CANCELED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (atomic_load(&sock->mgr->closing)) {
|
|
|
|
failed_read_cb(sock, ISC_R_CANCELED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
r = uv_read_start(&sock->uv_handle.stream, tcp_alloc_cb, read_cb);
|
|
|
|
if (r != 0) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_RECVFAIL]);
|
|
|
|
failed_read_cb(sock, ISC_R_CANCELED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
if (sock->read_timeout != 0) {
|
|
|
|
if (!sock->timer_initialized) {
|
|
|
|
uv_timer_init(&worker->loop, &sock->timer);
|
|
|
|
sock->timer_initialized = true;
|
|
|
|
}
|
2020-11-02 19:58:05 -08:00
|
|
|
uv_handle_set_data((uv_handle_t *)&sock->timer, sock);
|
2020-02-12 13:59:18 +01:00
|
|
|
uv_timer_start(&sock->timer, readtimeout_cb, sock->read_timeout,
|
|
|
|
0);
|
2020-09-05 11:07:40 -07:00
|
|
|
sock->timer_running = true;
|
2019-11-19 11:56:00 +01:00
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-10-22 10:07:56 +02:00
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_pauseread(isc_nmsocket_t *sock) {
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__netievent_pauseread_t *ievent = NULL;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
2020-10-22 10:07:56 +02:00
|
|
|
if (!atomic_compare_exchange_strong(&sock->readpaused, &(bool){ false },
|
|
|
|
true)) {
|
|
|
|
return;
|
2019-11-08 10:52:49 -08:00
|
|
|
}
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcppauseread);
|
|
|
|
ievent->sock = sock;
|
2019-11-08 10:52:49 -08:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->tid == isc_nm_tid()) {
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_pauseread(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__nm_put_ievent(sock->mgr, ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-10-22 10:07:56 +02:00
|
|
|
return;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_pauseread(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_pauseread_t *ievent = (isc__netievent_pauseread_t *)ev0;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(worker->id == isc_nm_tid());
|
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
if (sock->timer_running) {
|
2019-11-19 11:56:00 +01:00
|
|
|
uv_timer_stop(&sock->timer);
|
2020-09-05 11:07:40 -07:00
|
|
|
sock->timer_running = false;
|
2019-11-19 11:56:00 +01:00
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
uv_read_stop(&sock->uv_handle.stream);
|
|
|
|
}
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
void
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_tcp_resumeread(isc_nmsocket_t *sock) {
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__netievent_startread_t *ievent = NULL;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2020-09-18 12:27:40 +02:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
|
2020-09-11 10:53:31 +02:00
|
|
|
if (sock->recv_cb == NULL) {
|
2020-10-21 12:52:09 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isc__nmsocket_active(sock)) {
|
|
|
|
failed_read_cb(sock, ISC_R_CANCELED);
|
|
|
|
return;
|
2020-06-20 15:03:05 -07:00
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-22 10:07:56 +02:00
|
|
|
if (!atomic_compare_exchange_strong(&sock->readpaused, &(bool){ true },
|
|
|
|
false)) {
|
2020-10-21 12:52:09 +02:00
|
|
|
return;
|
2019-11-08 10:52:49 -08:00
|
|
|
}
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpstartread);
|
|
|
|
ievent->sock = sock;
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->tid == isc_nm_tid()) {
|
2020-03-20 11:55:10 +01:00
|
|
|
isc__nm_async_tcp_startread(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-19 11:56:00 +01:00
|
|
|
isc__nm_put_ievent(sock->mgr, ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
read_cb(uv_stream_t *stream, ssize_t nread, const uv_buf_t *buf) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data((uv_handle_t *)stream);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2020-09-18 12:27:40 +02:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(buf != NULL);
|
|
|
|
|
|
|
|
if (nread >= 0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc_region_t region = { .base = (unsigned char *)buf->base,
|
|
|
|
.length = nread };
|
2020-10-21 12:52:09 +02:00
|
|
|
isc_nm_recv_cb_t cb = sock->recv_cb;
|
|
|
|
void *cbarg = sock->recv_cbarg;
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2020-09-11 10:53:31 +02:00
|
|
|
if (cb != NULL) {
|
|
|
|
cb(sock->statichandle, ISC_R_SUCCESS, ®ion, cbarg);
|
2019-12-08 23:09:16 +01:00
|
|
|
}
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
if (sock->timer_initialized && sock->read_timeout != 0) {
|
|
|
|
/* The timer will be updated */
|
|
|
|
uv_timer_start(&sock->timer, readtimeout_cb,
|
|
|
|
sock->read_timeout, 0);
|
2020-10-27 20:00:08 +01:00
|
|
|
sock->timer_running = true;
|
2019-11-19 11:56:00 +01:00
|
|
|
}
|
2020-10-21 12:52:09 +02:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* This might happen if the inner socket is closing. It means
|
|
|
|
* that it's detached, so the socket will be closed.
|
|
|
|
*/
|
|
|
|
if (nread != UV_EOF) {
|
|
|
|
isc__nm_incstats(sock->mgr,
|
|
|
|
sock->statsindex[STATID_RECVFAIL]);
|
|
|
|
}
|
2020-01-07 10:13:30 -08:00
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
failed_read_cb(sock, ISC_R_EOF);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
isc__nm_free_uvbuf(sock, buf);
|
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
static void
|
|
|
|
quota_accept_cb(isc_quota_t *quota, void *sock0) {
|
|
|
|
isc_nmsocket_t *sock = (isc_nmsocket_t *)sock0;
|
|
|
|
isc__netievent_tcpaccept_t *ievent = NULL;
|
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a tcpaccept event and pass it using the async channel.
|
|
|
|
*/
|
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpaccept);
|
|
|
|
ievent->sock = sock;
|
|
|
|
ievent->quota = quota;
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is called after we get a quota_accept_cb() callback.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
isc__nm_async_tcpaccept(isc__networker_t *worker, isc__netievent_t *ev0) {
|
|
|
|
isc_result_t result;
|
|
|
|
isc__netievent_tcpaccept_t *ievent = (isc__netievent_tcpaccept_t *)ev0;
|
|
|
|
|
|
|
|
REQUIRE(worker->id == ievent->sock->tid);
|
|
|
|
|
|
|
|
result = accept_connection(ievent->sock, ievent->quota);
|
|
|
|
if (result != ISC_R_SUCCESS && result != ISC_R_NOCONN) {
|
|
|
|
if ((result != ISC_R_QUOTA && result != ISC_R_SOFTQUOTA) ||
|
|
|
|
can_log_tcp_quota()) {
|
|
|
|
isc_log_write(isc_lctx, ISC_LOGCATEGORY_GENERAL,
|
|
|
|
ISC_LOGMODULE_NETMGR, ISC_LOG_ERROR,
|
|
|
|
"TCP connection failed: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The socket was attached just before we called isc_quota_attach_cb().
|
|
|
|
*/
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&ievent->sock);
|
2020-03-24 13:38:51 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Close callback for uv_tcp_t strutures created in accept_connection().
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
free_uvtcpt(uv_handle_t *uvs) {
|
|
|
|
isc_mem_t *mctx = (isc_mem_t *)uv_handle_get_data(uvs);
|
|
|
|
isc_mem_putanddetach(&mctx, uvs, sizeof(uv_tcp_t));
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
static isc_result_t
|
2020-03-24 13:38:51 +01:00
|
|
|
accept_connection(isc_nmsocket_t *ssock, isc_quota_t *quota) {
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_result_t result;
|
2020-03-24 13:38:51 +01:00
|
|
|
isc__netievent_tcpchildaccept_t *event = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__networker_t *worker = NULL;
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_tcp_t *uvstream = NULL;
|
2020-09-05 11:07:40 -07:00
|
|
|
isc_nmsocket_t *csock = NULL;
|
2020-03-24 13:38:51 +01:00
|
|
|
isc_mem_t *mctx = NULL;
|
|
|
|
int r, w;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(ssock));
|
|
|
|
|
2020-10-22 10:07:56 +02:00
|
|
|
if (!isc__nmsocket_active(ssock) || atomic_load(&ssock->mgr->closing)) {
|
2019-11-05 13:55:54 -08:00
|
|
|
/* We're closing, bail */
|
2020-03-24 13:38:51 +01:00
|
|
|
if (quota != NULL) {
|
|
|
|
isc_quota_detach("a);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
return (ISC_R_CANCELED);
|
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
/* We can be called directly or as a callback from quota */
|
|
|
|
if (ssock->pquota != NULL && quota == NULL) {
|
2020-02-28 11:57:51 +01:00
|
|
|
/*
|
2020-03-24 13:38:51 +01:00
|
|
|
* We need to attach to ssock, because it might be queued
|
|
|
|
* waiting for a TCP quota slot. If so, then we'll detach it
|
|
|
|
* later when the connection is accepted. (XXX: This may be
|
2020-06-10 16:19:16 +02:00
|
|
|
* suboptimal, it might be better not to attach unless
|
|
|
|
* we need to - but we risk a race then.)
|
2020-02-28 11:57:51 +01:00
|
|
|
*/
|
2020-03-24 13:38:51 +01:00
|
|
|
isc_nmsocket_t *tsock = NULL;
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_attach(ssock, &tsock);
|
2020-03-24 13:38:51 +01:00
|
|
|
result = isc_quota_attach_cb(ssock->pquota, "a,
|
|
|
|
&ssock->quotacb);
|
|
|
|
if (result == ISC_R_QUOTA) {
|
|
|
|
isc__nm_incstats(ssock->mgr,
|
|
|
|
ssock->statsindex[STATID_ACCEPTFAIL]);
|
|
|
|
return (result);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2020-03-24 13:38:51 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We're under quota, so there's no need to wait;
|
2020-06-10 16:19:16 +02:00
|
|
|
* Detach the socket.
|
2020-03-24 13:38:51 +01:00
|
|
|
*/
|
2020-06-04 14:54:36 -07:00
|
|
|
isc__nmsocket_detach(&tsock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(ssock->mgr, ssock->statsindex[STATID_ACCEPT]);
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
worker = &ssock->mgr->workers[isc_nm_tid()];
|
2020-03-24 13:38:51 +01:00
|
|
|
uvstream = isc_mem_get(ssock->mgr->mctx, sizeof(uv_tcp_t));
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
isc_mem_attach(ssock->mgr->mctx, &mctx);
|
|
|
|
uv_handle_set_data((uv_handle_t *)uvstream, mctx);
|
|
|
|
mctx = NULL; /* Detached later in free_uvtcpt() */
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_tcp_init(&worker->loop, uvstream);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
r = uv_accept(&ssock->uv_handle.stream, (uv_stream_t *)uvstream);
|
2020-01-14 11:00:41 +01:00
|
|
|
if (r != 0) {
|
|
|
|
result = isc__nm_uverr2result(r);
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_close((uv_handle_t *)uvstream, free_uvtcpt);
|
2020-10-20 12:55:58 +02:00
|
|
|
if (quota != NULL) {
|
|
|
|
isc_quota_detach("a);
|
|
|
|
}
|
2020-03-24 13:38:51 +01:00
|
|
|
return (result);
|
2020-01-14 11:00:41 +01:00
|
|
|
}
|
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
/* We have an accepted TCP socket, pass it to a random worker */
|
|
|
|
w = isc_random_uniform(ssock->mgr->nworkers);
|
|
|
|
event = isc__nm_get_ievent(ssock->mgr, netievent_tcpchildaccept);
|
2020-09-18 12:27:40 +02:00
|
|
|
|
|
|
|
/* Duplicate the server socket */
|
2020-10-20 12:55:58 +02:00
|
|
|
r = isc_uv_export((uv_stream_t *)uvstream, &event->streaminfo);
|
|
|
|
if (r != 0) {
|
|
|
|
result = isc_errno_toresult(errno);
|
|
|
|
uv_close((uv_handle_t *)uvstream, free_uvtcpt);
|
|
|
|
if (quota != NULL) {
|
|
|
|
isc_quota_detach("a);
|
|
|
|
}
|
|
|
|
isc__nm_put_ievent(ssock->mgr, event);
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
csock = isc_mem_get(ssock->mgr->mctx, sizeof(isc_nmsocket_t));
|
2020-09-18 12:27:40 +02:00
|
|
|
isc__nmsocket_init(csock, ssock->mgr, isc_nm_tcpsocket, ssock->iface);
|
|
|
|
csock->tid = w;
|
|
|
|
csock->extrahandlesize = ssock->extrahandlesize;
|
|
|
|
isc__nmsocket_attach(ssock, &csock->server);
|
|
|
|
csock->accept_cb = ssock->accept_cb;
|
|
|
|
csock->accept_cbarg = ssock->accept_cbarg;
|
2020-10-27 20:00:08 +01:00
|
|
|
csock->accepting = true;
|
2020-09-18 12:27:40 +02:00
|
|
|
|
|
|
|
event->sock = csock;
|
2020-03-24 13:38:51 +01:00
|
|
|
event->quota = quota;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
uv_close((uv_handle_t *)uvstream, free_uvtcpt);
|
2020-01-14 11:00:41 +01:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
if (w == isc_nm_tid()) {
|
|
|
|
isc__nm_async_tcpchildaccept(&ssock->mgr->workers[w],
|
|
|
|
(isc__netievent_t *)event);
|
|
|
|
isc__nm_put_ievent(ssock->mgr, event);
|
|
|
|
} else {
|
|
|
|
isc__nm_enqueue_ievent(&ssock->mgr->workers[w],
|
|
|
|
(isc__netievent_t *)event);
|
2020-02-28 11:57:51 +01:00
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-03-24 13:38:51 +01:00
|
|
|
return (ISC_R_SUCCESS);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
void
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__nm_tcp_send(isc_nmhandle_t *handle, isc_region_t *region, isc_nm_cb_t cb,
|
2020-02-13 14:44:37 -08:00
|
|
|
void *cbarg) {
|
|
|
|
isc_nmsocket_t *sock = handle->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__netievent_tcpsend_t *ievent = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_uvreq_t *uvreq = NULL;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
|
|
|
|
2020-10-21 12:52:09 +02:00
|
|
|
if (!isc__nmsocket_active(sock)) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
|
|
|
cb(handle, ISC_R_CANCELED, cbarg);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (sock->server != NULL && !isc__nmsocket_active(sock->server)) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
|
|
|
cb(handle, ISC_R_CANCELED, cbarg);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (atomic_load(&sock->mgr->closing)) {
|
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
|
|
|
cb(handle, ISC_R_CANCELED, cbarg);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
uvreq = isc__nm_uvreq_get(sock->mgr, sock);
|
2020-02-12 13:59:18 +01:00
|
|
|
uvreq->uvbuf.base = (char *)region->base;
|
2019-11-05 13:55:54 -08:00
|
|
|
uvreq->uvbuf.len = region->length;
|
2020-10-21 12:52:09 +02:00
|
|
|
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_attach(handle, &uvreq->handle);
|
2020-10-21 12:52:09 +02:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
uvreq->cb.send = cb;
|
|
|
|
uvreq->cbarg = cbarg;
|
|
|
|
|
|
|
|
if (sock->tid == isc_nm_tid()) {
|
|
|
|
/*
|
|
|
|
* If we're in the same thread as the socket we can send the
|
|
|
|
* data directly
|
|
|
|
*/
|
2020-10-21 08:56:21 +02:00
|
|
|
isc_result_t result = tcp_send_direct(sock, uvreq);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
isc__nm_incstats(sock->mgr,
|
|
|
|
sock->statsindex[STATID_SENDFAIL]);
|
|
|
|
uvreq->cb.send(uvreq->handle, result, uvreq->cbarg);
|
|
|
|
isc__nm_uvreq_put(&uvreq, sock);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We need to create an event and pass it using async channel
|
|
|
|
*/
|
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpsend);
|
|
|
|
ievent->sock = sock;
|
|
|
|
ievent->req = uvreq;
|
2020-10-21 08:56:21 +02:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2020-10-21 12:52:09 +02:00
|
|
|
return;
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_send_cb(uv_write_t *req, int status) {
|
|
|
|
isc_result_t result = ISC_R_SUCCESS;
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__nm_uvreq_t *uvreq = (isc__nm_uvreq_t *)req->data;
|
2020-10-21 08:56:21 +02:00
|
|
|
isc_nmsocket_t *sock = uvreq->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_UVREQ(uvreq));
|
|
|
|
REQUIRE(VALID_NMHANDLE(uvreq->handle));
|
|
|
|
|
|
|
|
if (status < 0) {
|
|
|
|
result = isc__nm_uverr2result(status);
|
2020-10-21 08:56:21 +02:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
uvreq->cb.send(uvreq->handle, result, uvreq->cbarg);
|
2019-12-16 18:24:55 -08:00
|
|
|
isc__nm_uvreq_put(&uvreq, sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle 'tcpsend' async event - send a packet on the socket
|
|
|
|
*/
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpsend(isc__networker_t *worker, isc__netievent_t *ev0) {
|
|
|
|
isc_result_t result;
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcpsend_t *ievent = (isc__netievent_tcpsend_t *)ev0;
|
2020-10-21 08:56:21 +02:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
|
|
|
isc__nm_uvreq_t *uvreq = ievent->req;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-21 08:56:21 +02:00
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(worker->id == ievent->sock->tid);
|
|
|
|
|
2020-10-21 08:56:21 +02:00
|
|
|
result = tcp_send_direct(sock, uvreq);
|
2019-11-05 13:55:54 -08:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2020-10-21 08:56:21 +02:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_SENDFAIL]);
|
|
|
|
uvreq->cb.send(uvreq->handle, result, uvreq->cbarg);
|
|
|
|
isc__nm_uvreq_put(&uvreq, sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_send_direct(isc_nmsocket_t *sock, isc__nm_uvreq_t *req) {
|
2019-11-05 13:55:54 -08:00
|
|
|
int r;
|
|
|
|
|
2020-10-21 08:56:21 +02:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(VALID_UVREQ(req));
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
2020-10-21 08:56:21 +02:00
|
|
|
|
|
|
|
if (!isc__nmsocket_active(sock)) {
|
|
|
|
return (ISC_R_CANCELED);
|
|
|
|
}
|
2020-10-27 20:00:08 +01:00
|
|
|
if (sock->server != NULL && !isc__nmsocket_active(sock->server)) {
|
|
|
|
return (ISC_R_CANCELED);
|
|
|
|
}
|
|
|
|
if (atomic_load(&sock->mgr->closing)) {
|
|
|
|
return (ISC_R_CANCELED);
|
|
|
|
}
|
2020-10-21 08:56:21 +02:00
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
r = uv_write(&req->uv_req.write, &sock->uv_handle.stream, &req->uvbuf,
|
|
|
|
1, tcp_send_cb);
|
2019-11-05 13:55:54 -08:00
|
|
|
if (r < 0) {
|
|
|
|
return (isc__nm_uverr2result(r));
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_close_cb(uv_handle_t *uvhandle) {
|
2019-12-02 11:19:55 +01:00
|
|
|
isc_nmsocket_t *sock = uv_handle_get_data(uvhandle);
|
2019-11-05 13:55:54 -08:00
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
|
2020-01-07 10:13:30 -08:00
|
|
|
isc__nm_incstats(sock->mgr, sock->statsindex[STATID_CLOSE]);
|
2019-11-05 13:55:54 -08:00
|
|
|
atomic_store(&sock->closed, true);
|
2019-12-16 18:24:55 -08:00
|
|
|
atomic_store(&sock->connected, false);
|
2020-10-20 21:03:27 +02:00
|
|
|
|
|
|
|
if (sock->server != NULL) {
|
|
|
|
isc__nmsocket_detach(&sock->server);
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
isc__nmsocket_prep_destroy(sock);
|
|
|
|
}
|
|
|
|
|
2019-11-19 11:56:00 +01:00
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
timer_close_cb(uv_handle_t *uvhandle) {
|
2020-10-29 12:04:00 +01:00
|
|
|
uv_handle_t *handle = uv_handle_get_data(uvhandle);
|
2019-11-19 11:56:00 +01:00
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
uv_close(handle, tcp_close_cb);
|
2019-11-19 11:56:00 +01:00
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
tcp_close_direct(isc_nmsocket_t *sock) {
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
2020-10-21 12:52:09 +02:00
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->quota != NULL) {
|
|
|
|
isc_quota_detach(&sock->quota);
|
2020-02-28 11:57:51 +01:00
|
|
|
}
|
2020-10-20 20:57:19 +02:00
|
|
|
|
|
|
|
uv_read_stop((uv_stream_t *)&sock->uv_handle.handle);
|
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
if (sock->timer_running) {
|
2019-12-06 22:25:52 +01:00
|
|
|
uv_timer_stop(&sock->timer);
|
2020-09-05 11:07:40 -07:00
|
|
|
sock->timer_running = false;
|
2020-10-21 12:52:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sock->timer_initialized) {
|
|
|
|
sock->timer_initialized = false;
|
2020-10-29 12:04:00 +01:00
|
|
|
/*
|
|
|
|
* The read and timer is stopped and the socket will be
|
|
|
|
* scheduled to be closed, so we can override the data that the
|
|
|
|
* timer handle holds.
|
|
|
|
*/
|
|
|
|
uv_handle_set_data((uv_handle_t *)&sock->timer,
|
|
|
|
&sock->uv_handle.handle);
|
2019-12-06 22:25:52 +01:00
|
|
|
uv_close((uv_handle_t *)&sock->timer, timer_close_cb);
|
2019-11-19 11:56:00 +01:00
|
|
|
} else {
|
|
|
|
uv_close(&sock->uv_handle.handle, tcp_close_cb);
|
|
|
|
}
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_tcp_close(isc_nmsocket_t *sock) {
|
2019-11-05 13:55:54 -08:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
2020-10-26 14:19:37 +01:00
|
|
|
REQUIRE(!isc__nmsocket_active(sock));
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
if (!atomic_compare_exchange_strong(&sock->closing, &(bool){ false },
|
|
|
|
true)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-11-05 13:55:54 -08:00
|
|
|
if (sock->tid == isc_nm_tid()) {
|
|
|
|
tcp_close_direct(sock);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We need to create an event and pass it using async channel
|
|
|
|
*/
|
|
|
|
isc__netievent_tcpclose_t *ievent =
|
|
|
|
isc__nm_get_ievent(sock->mgr, netievent_tcpclose);
|
|
|
|
|
|
|
|
ievent->sock = sock;
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
2020-02-12 13:59:18 +01:00
|
|
|
(isc__netievent_t *)ievent);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_async_tcpclose(isc__networker_t *worker, isc__netievent_t *ev0) {
|
2020-02-12 13:59:18 +01:00
|
|
|
isc__netievent_tcpclose_t *ievent = (isc__netievent_tcpclose_t *)ev0;
|
2020-10-29 12:04:00 +01:00
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2020-11-02 15:55:12 +01:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2019-11-05 13:55:54 -08:00
|
|
|
|
2020-10-29 12:04:00 +01:00
|
|
|
UNUSED(worker);
|
|
|
|
|
|
|
|
tcp_close_direct(sock);
|
2019-11-05 13:55:54 -08:00
|
|
|
}
|
2019-11-22 14:13:19 +01:00
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
isc__nm_tcp_shutdown(isc_nmsocket_t *sock) {
|
2019-11-22 14:13:19 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2020-09-18 12:27:40 +02:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2019-11-22 14:13:19 +01:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (sock->type != isc_nm_tcpsocket) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (atomic_load(&sock->connecting)) {
|
2020-10-29 12:04:00 +01:00
|
|
|
if (sock->timer_initialized) {
|
|
|
|
isc__nm_uvreq_t *req =
|
|
|
|
uv_handle_get_data((uv_handle_t *)&sock->timer);
|
|
|
|
failed_connect_cb(sock, req, ISC_R_CANCELED);
|
|
|
|
}
|
2020-10-27 20:00:08 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-10-22 10:07:56 +02:00
|
|
|
/*
|
|
|
|
* If the socket is active, mark it inactive and
|
|
|
|
* continue. If it isn't active, stop now.
|
|
|
|
*/
|
|
|
|
if (!isc__nmsocket_deactivate(sock)) {
|
2020-10-21 12:52:09 +02:00
|
|
|
return;
|
|
|
|
}
|
2020-09-11 10:53:31 +02:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (sock->accepting) {
|
|
|
|
failed_accept_cb(sock, ISC_R_CANCELED);
|
2020-10-26 14:19:37 +01:00
|
|
|
return;
|
|
|
|
}
|
2020-09-05 11:07:40 -07:00
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
if (sock->statichandle != NULL) {
|
2020-10-21 12:52:09 +02:00
|
|
|
failed_read_cb(sock, ISC_R_CANCELED);
|
2019-11-22 15:57:42 -08:00
|
|
|
}
|
2019-11-22 14:13:19 +01:00
|
|
|
}
|
2020-06-05 17:32:36 -07:00
|
|
|
|
|
|
|
void
|
2020-06-10 11:32:39 +02:00
|
|
|
isc__nm_tcp_cancelread(isc_nmhandle_t *handle) {
|
|
|
|
isc_nmsocket_t *sock = NULL;
|
2020-09-05 11:07:40 -07:00
|
|
|
isc__netievent_tcpcancel_t *ievent = NULL;
|
2020-06-05 17:32:36 -07:00
|
|
|
|
2020-06-10 11:32:39 +02:00
|
|
|
REQUIRE(VALID_NMHANDLE(handle));
|
|
|
|
|
|
|
|
sock = handle->sock;
|
|
|
|
|
2020-10-27 20:00:08 +01:00
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
2020-06-10 11:32:39 +02:00
|
|
|
REQUIRE(sock->type == isc_nm_tcpsocket);
|
2020-09-05 11:07:40 -07:00
|
|
|
|
|
|
|
ievent = isc__nm_get_ievent(sock->mgr, netievent_tcpcancel);
|
|
|
|
ievent->sock = sock;
|
|
|
|
isc_nmhandle_attach(handle, &ievent->handle);
|
|
|
|
isc__nm_enqueue_ievent(&sock->mgr->workers[sock->tid],
|
|
|
|
(isc__netievent_t *)ievent);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
isc__nm_async_tcpcancel(isc__networker_t *worker, isc__netievent_t *ev0) {
|
|
|
|
isc__netievent_tcpcancel_t *ievent = (isc__netievent_tcpcancel_t *)ev0;
|
|
|
|
isc_nmsocket_t *sock = ievent->sock;
|
|
|
|
isc_nmhandle_t *handle = ievent->handle;
|
|
|
|
|
|
|
|
REQUIRE(VALID_NMSOCK(sock));
|
|
|
|
REQUIRE(worker->id == sock->tid);
|
2020-09-18 12:27:40 +02:00
|
|
|
REQUIRE(sock->tid == isc_nm_tid());
|
2020-06-10 11:32:39 +02:00
|
|
|
|
2020-09-05 11:07:40 -07:00
|
|
|
uv_read_stop(&sock->uv_handle.stream);
|
|
|
|
|
2020-09-11 10:53:31 +02:00
|
|
|
if (atomic_load(&sock->client)) {
|
2020-10-21 12:52:09 +02:00
|
|
|
failed_read_cb(sock, ISC_R_EOF);
|
2020-06-05 17:32:36 -07:00
|
|
|
}
|
2020-09-05 11:07:40 -07:00
|
|
|
|
|
|
|
isc_nmhandle_detach(&handle);
|
2020-06-05 17:32:36 -07:00
|
|
|
}
|
2020-11-02 19:58:05 -08:00
|
|
|
|
|
|
|
void
|
|
|
|
isc__nm_tcp_settimeout(isc_nmhandle_t *handle, uint32_t timeout) {
|
|
|
|
isc_nmsocket_t *sock = NULL;
|
|
|
|
|
|
|
|
REQUIRE(VALID_NMHANDLE(handle));
|
|
|
|
|
|
|
|
sock = handle->sock;
|
|
|
|
|
|
|
|
sock->read_timeout = timeout;
|
|
|
|
if (sock->timer_running) {
|
|
|
|
uv_timer_start(&sock->timer, readtimeout_cb, sock->read_timeout,
|
|
|
|
0);
|
|
|
|
}
|
|
|
|
}
|