2 * DEBUG: section 5 Socket Functions
3 * AUTHOR: Harvest Derived
5 * SQUID Web Proxy Cache http://www.squid-cache.org/
6 * ----------------------------------------------------------
8 * Squid is the result of efforts by numerous individuals from
9 * the Internet community; see the CONTRIBUTORS file for full
10 * details. Many organizations have provided support for Squid's
11 * development; see the SPONSORS file for full details. Squid is
12 * Copyrighted (C) 2001 by the Regents of the University of
13 * California; see the COPYRIGHT file for full details. Squid
14 * incorporates software developed and/or copyrighted by other
15 * sources; see the CREDITS file for full details.
17 * This program is free software; you can redistribute it and/or modify
18 * it under the terms of the GNU General Public License as published by
19 * the Free Software Foundation; either version 2 of the License, or
20 * (at your option) any later version.
22 * This program is distributed in the hope that it will be useful,
23 * but WITHOUT ANY WARRANTY; without even the implied warranty of
24 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
25 * GNU General Public License for more details.
27 * You should have received a copy of the GNU General Public License
28 * along with this program; if not, write to the Free Software
29 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA.
32 * Copyright (c) 2003, Robert Collins <robertc@squid-cache.org>
36 #include "StoreIOBuffer.h"
42 #include "ConnectionDetail.h"
45 #include "SquidTime.h"
46 #include "CommCalls.h"
47 #include "DescriptorSet.h"
48 #include "icmp/net_db.h"
49 #include "ip/IpAddress.h"
50 #include "ip/IpIntercept.h"
52 #if defined(_SQUID_CYGWIN_)
53 #include <sys/ioctl.h>
55 #ifdef HAVE_NETINET_TCP_H
56 #include <netinet/tcp.h>
60 * New C-like simple comm code. This stuff is a mess and doesn't really buy us anything.
69 static void commStopHalfClosedMonitor(int fd
);
70 static IOCB commHalfClosedReader
;
73 struct comm_io_callback_t
{
76 AsyncCall::Pointer callback
;
84 bool active() const { return callback
!= NULL
; }
89 comm_io_callback_t readcb
;
90 comm_io_callback_t writecb
;
92 typedef struct _comm_fd comm_fd_t
;
93 comm_fd_t
*commfd_table
;
95 // TODO: make this a comm_io_callback_t method?
97 commio_has_callback(int fd
, iocb_type type
, comm_io_callback_t
*ccb
)
99 assert(ccb
->fd
== fd
);
100 assert(ccb
->type
== type
);
101 return ccb
->active();
105 * Configure comm_io_callback_t for I/O
107 * @param fd filedescriptor
108 * @param ccb comm io callback
110 * @param cbdata callback data (must be cbdata'ed)
111 * @param buf buffer, if applicable
112 * @param freefunc freefunc, if applicable
113 * @param size buffer size
116 commio_set_callback(int fd
, iocb_type type
, comm_io_callback_t
*ccb
,
117 AsyncCall::Pointer
&cb
, char *buf
, FREE
*freefunc
, int size
)
119 assert(!ccb
->active());
120 assert(ccb
->type
== type
);
125 ccb
->freefunc
= freefunc
;
131 // Schedule the callback call and clear the callback
133 commio_finish_callback(int fd
, comm_io_callback_t
*ccb
, comm_err_t code
, int xerrno
)
135 debugs(5, 3, "commio_finish_callback: called for FD " << fd
<< " (" <<
136 code
<< ", " << xerrno
<< ")");
137 assert(ccb
->active());
138 assert(ccb
->fd
== fd
);
140 ccb
->xerrno
= xerrno
;
142 comm_io_callback_t cb
= *ccb
;
144 /* We've got a copy; blow away the real one */
145 /* XXX duplicate code from commio_cancel_callback! */
147 ccb
->callback
= NULL
; // cb has it
155 if (cb
.callback
!= NULL
) {
156 typedef CommIoCbParams Params
;
157 Params
¶ms
= GetCommParams
<Params
>(cb
.callback
);
160 params
.size
= cb
.offset
;
161 params
.flag
= cb
.errcode
;
162 params
.xerrno
= cb
.xerrno
;
163 ScheduleCallHere(cb
.callback
);
169 * Cancel the given callback
171 * Remember that the data is cbdataRef'ed.
173 // TODO: make this a comm_io_callback_t method
175 commio_cancel_callback(int fd
, comm_io_callback_t
*ccb
)
177 debugs(5, 3, "commio_cancel_callback: called for FD " << fd
);
178 assert(ccb
->fd
== fd
);
179 assert(ccb
->active());
182 ccb
->callback
= NULL
;
186 * Call the given comm callback; assumes the callback is valid.
188 * @param ccb io completion callback
191 commio_call_callback(comm_io_callback_t
*ccb
)
195 class ConnectStateData
199 void *operator new (size_t);
200 void operator delete (void *);
201 static void Connect (int fd
, void *me
);
203 void callCallback(comm_err_t status
, int xerrno
);
206 // defaults given by client
208 u_short default_port
;
209 IpAddress default_addr
;
210 // NP: CANNOT store the default addr:port together as it gets set/reset differently.
212 DnsLookupDetails dns
; ///< host lookup details
214 AsyncCall::Pointer callback
;
223 int commRetryConnect();
224 CBDATA_CLASS(ConnectStateData
);
229 static DescriptorSet
*TheHalfClosed
= NULL
; /// the set of half-closed FDs
230 static bool WillCheckHalfClosed
= false; /// true if check is scheduled
231 static EVH commHalfClosedCheck
;
232 static void commPlanHalfClosedCheck();
234 static comm_err_t
commBind(int s
, struct addrinfo
&);
235 static void commSetReuseAddr(int);
236 static void commSetNoLinger(int);
238 static void commSetTcpNoDelay(int);
240 static void commSetTcpRcvbuf(int, int);
241 static PF commConnectFree
;
242 static PF commHandleWrite
;
243 static IPH commConnectDnsHandle
;
245 static PF comm_accept_try
;
251 AcceptFD(int aFd
= -1): fd(aFd
), theCallback(0), mayAcceptMore(false) {}
253 void subscribe(AsyncCall::Pointer
&call
);
255 void notify(int newfd
, comm_err_t
, int xerrno
, const ConnectionDetail
&);
262 AsyncCall::Pointer theCallback
;
272 char const *close_file
;
276 typedef struct _fd_debug_t fd_debug_t
;
278 static MemAllocator
*conn_close_pool
= NULL
;
279 AcceptFD
*fdc_table
= NULL
; // TODO: rename. And use Vector<>?
280 fd_debug_t
*fdd_table
= NULL
;
285 return fd_table
[fd
].flags
.open
!= 0;
291 * If the read attempt succeeds or fails, call the callback.
292 * Else, wait for another IO notification.
295 commHandleRead(int fd
, void *data
)
297 comm_io_callback_t
*ccb
= (comm_io_callback_t
*) data
;
299 assert(data
== COMMIO_FD_READCB(fd
));
300 assert(commio_has_callback(fd
, IOCB_READ
, ccb
));
302 statCounter
.syscalls
.sock
.reads
++;
305 retval
= FD_READ_METHOD(fd
, ccb
->buf
, ccb
->size
);
306 debugs(5, 3, "comm_read_try: FD " << fd
<< ", size " << ccb
->size
<< ", retval " << retval
<< ", errno " << errno
);
308 if (retval
< 0 && !ignoreErrno(errno
)) {
309 debugs(5, 3, "comm_read_try: scheduling COMM_ERROR");
311 commio_finish_callback(fd
, ccb
, COMM_ERROR
, errno
);
315 /* See if we read anything */
316 /* Note - read 0 == socket EOF, which is a valid read */
318 fd_bytes(fd
, retval
, FD_READ
);
319 ccb
->offset
= retval
;
320 commio_finish_callback(fd
, ccb
, COMM_OK
, errno
);
324 /* Nope, register for some more IO */
325 commSetSelect(fd
, COMM_SELECT_READ
, commHandleRead
, data
, 0);
329 * Queue a read. handler/handler_data are called when the read
330 * completes, on error, or on file descriptor close.
333 comm_read(int fd
, char *buf
, int size
, IOCB
*handler
, void *handler_data
)
335 AsyncCall::Pointer call
= commCbCall(5,4, "SomeCommReadHandler",
336 CommIoCbPtrFun(handler
, handler_data
));
337 comm_read(fd
, buf
, size
, call
);
341 comm_read(int fd
, char *buf
, int size
, AsyncCall::Pointer
&callback
)
343 debugs(5, 5, "comm_read, queueing read for FD " << fd
<< "; asynCall " << callback
);
345 /* Make sure we are open and not closing */
347 assert(!fd_table
[fd
].closing());
348 comm_io_callback_t
*ccb
= COMMIO_FD_READCB(fd
);
350 // Make sure we are either not reading or just passively monitoring.
351 // Active/passive conflicts are OK and simply cancel passive monitoring.
353 // if the assertion below fails, we have an active comm_read conflict
354 assert(fd_table
[fd
].halfClosedReader
!= NULL
);
355 commStopHalfClosedMonitor(fd
);
356 assert(!ccb
->active());
360 commio_set_callback(fd
, IOCB_READ
, ccb
, callback
, (char *)buf
, NULL
, size
);
361 commSetSelect(fd
, COMM_SELECT_READ
, commHandleRead
, ccb
, 0);
365 * Empty the read buffers
367 * This is a magical routine that empties the read buffers.
368 * Under some platforms (Linux) if a buffer has data in it before
369 * you call close(), the socket will hang and take quite a while
373 comm_empty_os_read_buffers(int fd
)
376 /* prevent those nasty RST packets */
377 char buf
[SQUID_TCP_SO_RCVBUF
];
379 if (fd_table
[fd
].flags
.nonblocking
== 1) {
380 while (FD_READ_METHOD(fd
, buf
, SQUID_TCP_SO_RCVBUF
) > 0) {};
387 * Return whether the FD has a pending completed callback.
390 comm_has_pending_read_callback(int fd
)
393 // XXX: We do not know whether there is a read callback scheduled.
394 // This is used for pconn management that should probably be more
395 // tightly integrated into comm to minimize the chance that a
396 // closing pconn socket will be used for a new transaction.
400 // Does comm check this fd for read readiness?
401 // Note that when comm is not monitoring, there can be a pending callback
402 // call, which may resume comm monitoring once fired.
404 comm_monitors_read(int fd
)
407 // Being active is usually the same as monitoring because we always
408 // start monitoring the FD when we configure comm_io_callback_t for I/O
409 // and we usually configure comm_io_callback_t for I/O when we starting
410 // monitoring a FD for reading. TODO: replace with commio_has_callback
411 return COMMIO_FD_READCB(fd
)->active();
415 * Cancel a pending read. Assert that we have the right parameters,
416 * and that there are no pending read events!
418 * XXX: We do not assert that there are no pending read events and
419 * with async calls it becomes even more difficult.
420 * The whole interface should be reworked to do callback->cancel()
421 * instead of searching for places where the callback may be stored and
422 * updating the state of those places.
424 * AHC Don't call the comm handlers?
427 comm_read_cancel(int fd
, IOCB
*callback
, void *data
)
430 debugs(5, 4, "comm_read_cancel fails: FD " << fd
<< " closed");
434 comm_io_callback_t
*cb
= COMMIO_FD_READCB(fd
);
435 // TODO: is "active" == "monitors FD"?
437 debugs(5, 4, "comm_read_cancel fails: FD " << fd
<< " inactive");
441 typedef CommCbFunPtrCallT
<CommIoCbPtrFun
> Call
;
442 Call
*call
= dynamic_cast<Call
*>(cb
->callback
.getRaw());
444 debugs(5, 4, "comm_read_cancel fails: FD " << fd
<< " lacks callback");
448 call
->cancel("old comm_read_cancel");
450 typedef CommIoCbParams Params
;
451 const Params
¶ms
= GetCommParams
<Params
>(cb
->callback
);
453 /* Ok, we can be reasonably sure we won't lose any data here! */
454 assert(call
->dialer
.handler
== callback
);
455 assert(params
.data
== data
);
457 /* Delete the callback */
458 commio_cancel_callback(fd
, cb
);
460 /* And the IO event */
461 commSetSelect(fd
, COMM_SELECT_READ
, NULL
, NULL
, 0);
465 comm_read_cancel(int fd
, AsyncCall::Pointer
&callback
)
467 callback
->cancel("comm_read_cancel");
470 debugs(5, 4, "comm_read_cancel fails: FD " << fd
<< " closed");
474 comm_io_callback_t
*cb
= COMMIO_FD_READCB(fd
);
477 debugs(5, 4, "comm_read_cancel fails: FD " << fd
<< " inactive");
481 AsyncCall::Pointer call
= cb
->callback
;
482 assert(call
!= NULL
); // XXX: should never fail (active() checks for callback==NULL)
484 /* Ok, we can be reasonably sure we won't lose any data here! */
485 assert(call
== callback
);
487 /* Delete the callback */
488 commio_cancel_callback(fd
, cb
);
490 /* And the IO event */
491 commSetSelect(fd
, COMM_SELECT_READ
, NULL
, NULL
, 0);
496 * synchronous wrapper around udp socket functions
499 comm_udp_recvfrom(int fd
, void *buf
, size_t len
, int flags
, IpAddress
&from
)
501 statCounter
.syscalls
.sock
.recvfroms
++;
503 struct addrinfo
*AI
= NULL
;
505 debugs(5,8, "comm_udp_recvfrom: FD " << fd
<< " from " << from
);
507 assert( NULL
== AI
);
509 from
.InitAddrInfo(AI
);
511 x
= recvfrom(fd
, buf
, len
, flags
, AI
->ai_addr
, &AI
->ai_addrlen
);
515 from
.FreeAddrInfo(AI
);
521 comm_udp_recv(int fd
, void *buf
, size_t len
, int flags
)
524 return comm_udp_recvfrom(fd
, buf
, len
, flags
, nul
);
528 comm_udp_send(int s
, const void *buf
, size_t len
, int flags
)
530 return send(s
, buf
, len
, flags
);
535 comm_has_incomplete_write(int fd
)
538 return COMMIO_FD_WRITECB(fd
)->active();
542 * Queue a write. handler/handler_data are called when the write fully
543 * completes, on error, or on file descriptor close.
546 /* Return the local port associated with fd. */
548 comm_local_port(int fd
)
551 struct addrinfo
*addr
= NULL
;
552 fde
*F
= &fd_table
[fd
];
554 /* If the fd is closed already, just return */
556 if (!F
->flags
.open
) {
557 debugs(5, 0, "comm_local_port: FD " << fd
<< " has been closed.");
561 if (F
->local_addr
.GetPort())
562 return F
->local_addr
.GetPort();
564 temp
.InitAddrInfo(addr
);
566 if (getsockname(fd
, addr
->ai_addr
, &(addr
->ai_addrlen
)) ) {
567 debugs(50, 1, "comm_local_port: Failed to retrieve TCP/UDP port number for socket: FD " << fd
<< ": " << xstrerror());
568 temp
.FreeAddrInfo(addr
);
573 temp
.FreeAddrInfo(addr
);
575 F
->local_addr
.SetPort(temp
.GetPort());
577 // grab default socket information for this address
578 temp
.GetAddrInfo(addr
);
580 F
->sock_family
= addr
->ai_family
;
582 temp
.FreeAddrInfo(addr
);
584 debugs(5, 6, "comm_local_port: FD " << fd
<< ": port " << F
->local_addr
.GetPort());
585 return F
->local_addr
.GetPort();
589 commBind(int s
, struct addrinfo
&inaddr
)
591 statCounter
.syscalls
.sock
.binds
++;
593 if (bind(s
, inaddr
.ai_addr
, inaddr
.ai_addrlen
) == 0)
596 debugs(50, 0, "commBind: Cannot bind socket FD " << s
<< " to " << fd_table
[s
].local_addr
<< ": " << xstrerror());
602 * Create a socket. Default is blocking, stream (TCP) socket. IO_TYPE
603 * is OR of flags specified in comm.h. Defaults TOS
606 comm_open(int sock_type
,
612 return comm_openex(sock_type
, proto
, addr
, flags
, 0, note
);
616 comm_open_listener(int sock_type
,
624 /* attempt native enabled port. */
625 sock
= comm_openex(sock_type
, proto
, addr
, flags
, 0, note
);
628 /* under IPv6 there is the possibility IPv6 is present but disabled. */
629 /* try again as IPv4-native */
630 if ( sock
< 0 && addr
.IsIPv6() && addr
.SetIPv4() ) {
631 /* attempt to open this IPv4-only. */
632 sock
= comm_openex(sock_type
, proto
, addr
, flags
, 0, note
);
633 debugs(50, 2, HERE
<< "attempt open " << note
<< " socket on: " << addr
);
641 limitError(int const anErrno
)
643 return anErrno
== ENFILE
|| anErrno
== EMFILE
;
647 comm_set_tos(int fd
, int tos
)
650 int x
= setsockopt(fd
, IPPROTO_IP
, IP_TOS
, (char *) &tos
, sizeof(int));
652 debugs(50, 1, "comm_set_tos: setsockopt(IP_TOS) on FD " << fd
<< ": " << xstrerror());
655 debugs(50, 0, "WARNING: setsockopt(IP_TOS) not supported on this platform");
661 comm_set_v6only(int fd
, int tos
)
664 if (setsockopt(fd
, IPPROTO_IPV6
, IPV6_V6ONLY
, (char *) &tos
, sizeof(int)) < 0) {
665 debugs(50, 1, "comm_open: setsockopt(IPV6_V6ONLY) " << (tos
?"ON":"OFF") << " for FD " << fd
<< ": " << xstrerror());
668 debugs(50, 0, "WARNING: comm_open: setsockopt(IPV6_V6ONLY) not supported on this platform");
673 * Set the socket IP_TRANSPARENT option for Linux TPROXY v4 support.
676 comm_set_transparent(int fd
)
678 #if defined(IP_TRANSPARENT)
680 if (setsockopt(fd
, SOL_IP
, IP_TRANSPARENT
, (char *) &tos
, sizeof(int)) < 0) {
681 debugs(50, DBG_IMPORTANT
, "comm_open: setsockopt(IP_TRANSPARENT) on FD " << fd
<< ": " << xstrerror());
683 /* mark the socket as having transparent options */
684 fd_table
[fd
].flags
.transparent
= 1;
687 debugs(50, DBG_CRITICAL
, "WARNING: comm_open: setsockopt(IP_TRANSPARENT) not supported on this platform");
692 * Create a socket. Default is blocking, stream (TCP) socket. IO_TYPE
693 * is OR of flags specified in defines.h:COMM_*
696 comm_openex(int sock_type
,
706 struct addrinfo
*AI
= NULL
;
708 PROF_start(comm_open
);
709 /* Create socket for accepting new connections. */
710 statCounter
.syscalls
.sock
.sockets
++;
712 /* Setup the socket addrinfo details for use */
713 addr
.GetAddrInfo(AI
);
714 AI
->ai_socktype
= sock_type
;
715 AI
->ai_protocol
= proto
;
717 debugs(50, 3, "comm_openex: Attempt open socket for: " << addr
);
719 if ((new_socket
= socket(AI
->ai_family
, AI
->ai_socktype
, AI
->ai_protocol
)) < 0) {
720 /* Increase the number of reserved fd's if calls to socket()
721 * are failing because the open file table is full. This
722 * limits the number of simultaneous clients */
724 if (limitError(errno
)) {
725 debugs(50, DBG_IMPORTANT
, "comm_open: socket failure: " << xstrerror());
728 debugs(50, DBG_CRITICAL
, "comm_open: socket failure: " << xstrerror());
731 addr
.FreeAddrInfo(AI
);
733 PROF_stop(comm_open
);
737 debugs(50, 3, "comm_openex: Opened socket FD " << new_socket
<< " : family=" << AI
->ai_family
<< ", type=" << AI
->ai_socktype
<< ", protocol=" << AI
->ai_protocol
);
739 /* set TOS if needed */
740 if (TOS
&& comm_set_tos(new_socket
, TOS
) ) {
744 #if IPV6_SPECIAL_SPLITSTACK
747 comm_set_v6only(new_socket
, 1);
751 #if IPV6_SPECIAL_V4MAPPED
753 /* Windows Vista supports Dual-Sockets. BUT defaults them to V6ONLY. Turn it OFF. */
754 /* Other OS may have this administratively disabled for general use. Same deal. */
756 comm_set_v6only(new_socket
, 0);
761 debugs(5, 5, "comm_open: FD " << new_socket
<< " is a new socket");
763 assert(!isOpen(new_socket
));
764 fd_open(new_socket
, FD_SOCKET
, note
);
766 fdd_table
[new_socket
].close_file
= NULL
;
768 fdd_table
[new_socket
].close_line
= 0;
770 F
= &fd_table
[new_socket
];
772 F
->local_addr
= addr
;
776 F
->sock_family
= AI
->ai_family
;
778 if (!(flags
& COMM_NOCLOEXEC
))
779 commSetCloseOnExec(new_socket
);
781 if ((flags
& COMM_REUSEADDR
))
782 commSetReuseAddr(new_socket
);
784 if (addr
.GetPort() > (u_short
) 0) {
787 if (sock_type
!= SOCK_DGRAM
)
790 commSetNoLinger(new_socket
);
793 commSetReuseAddr(new_socket
);
796 /* MUST be done before binding or face OS Error: "(99) Cannot assign requested address"... */
797 if ((flags
& COMM_TRANSPARENT
)) {
798 comm_set_transparent(new_socket
);
801 if (!addr
.IsNoAddr()) {
802 if (commBind(new_socket
, *AI
) != COMM_OK
) {
803 comm_close(new_socket
);
804 addr
.FreeAddrInfo(AI
);
806 PROF_stop(comm_open
);
810 addr
.FreeAddrInfo(AI
);
812 if (flags
& COMM_NONBLOCKING
)
813 if (commSetNonBlocking(new_socket
) == COMM_ERROR
) {
815 PROF_stop(comm_open
);
819 if (sock_type
== SOCK_STREAM
)
820 commSetTcpNoDelay(new_socket
);
824 if (Config
.tcpRcvBufsz
> 0 && sock_type
== SOCK_STREAM
)
825 commSetTcpRcvbuf(new_socket
, Config
.tcpRcvBufsz
);
827 PROF_stop(comm_open
);
832 CBDATA_CLASS_INIT(ConnectStateData
);
835 ConnectStateData::operator new (size_t size
)
837 CBDATA_INIT_TYPE(ConnectStateData
);
838 return cbdataAlloc(ConnectStateData
);
842 ConnectStateData::operator delete (void *address
)
850 commConnectStart(int fd
, const char *host
, u_short port
, AsyncCall::Pointer
&cb
)
852 debugs(cb
->debugSection
, cb
->debugLevel
, "commConnectStart: FD " << fd
<<
853 ", cb " << cb
<< ", " << host
<< ":" << port
); // TODO: just print *cb
855 ConnectStateData
*cs
;
856 cs
= new ConnectStateData
;
858 cs
->host
= xstrdup(host
);
859 cs
->default_port
= port
;
862 comm_add_close_handler(fd
, commConnectFree
, cs
);
863 ipcache_nbgethostbyname(host
, commConnectDnsHandle
, cs
);
866 // TODO: Remove this and similar callback registration functions by replacing
867 // (callback,data) parameters with an AsyncCall so that we do not have to use
868 // a generic call name and debug level when creating an AsyncCall. This will
869 // also cut the number of callback registration routines in half.
871 commConnectStart(int fd
, const char *host
, u_short port
, CNCB
* callback
, void *data
)
873 debugs(5, 5, "commConnectStart: FD " << fd
<< ", data " << data
<< ", " << host
<< ":" << port
);
874 AsyncCall::Pointer call
= commCbCall(5,3,
875 "SomeCommConnectHandler", CommConnectCbPtrFun(callback
, data
));
876 commConnectStart(fd
, host
, port
, call
);
880 commConnectDnsHandle(const ipcache_addrs
*ia
, const DnsLookupDetails
&details
, void *data
)
882 ConnectStateData
*cs
= (ConnectStateData
*)data
;
886 debugs(5, 3, "commConnectDnsHandle: Unknown host: " << cs
->host
);
887 cs
->callCallback(COMM_ERR_DNS
, 0);
891 assert(ia
->cur
< ia
->count
);
893 cs
->default_addr
= ia
->in_addrs
[ia
->cur
];
895 if (Config
.onoff
.balance_on_multiple_ip
)
896 ipcacheCycleAddr(cs
->host
, NULL
);
898 cs
->addrcount
= ia
->count
;
900 cs
->connstart
= squid_curtime
;
906 ConnectStateData::callCallback(comm_err_t status
, int xerrno
)
908 debugs(5, 3, "commConnectCallback: FD " << fd
);
910 comm_remove_close_handler(fd
, commConnectFree
, this);
911 commSetTimeout(fd
, -1, NULL
, NULL
);
913 typedef CommConnectCbParams Params
;
914 Params
¶ms
= GetCommParams
<Params
>(callback
);
917 params
.flag
= status
;
918 params
.xerrno
= xerrno
;
919 ScheduleCallHere(callback
);
922 commConnectFree(fd
, this);
926 commConnectFree(int fd
, void *data
)
928 ConnectStateData
*cs
= (ConnectStateData
*)data
;
929 debugs(5, 3, "commConnectFree: FD " << fd
);
930 // delete cs->callback;
937 copyFDFlags(int to
, fde
*F
)
939 if (F
->flags
.close_on_exec
)
940 commSetCloseOnExec(to
);
942 if (F
->flags
.nonblocking
)
943 commSetNonBlocking(to
);
947 if (F
->flags
.nodelay
)
948 commSetTcpNoDelay(to
);
952 if (Config
.tcpRcvBufsz
> 0)
953 commSetTcpRcvbuf(to
, Config
.tcpRcvBufsz
);
956 /* Reset FD so that we can connect() again */
958 ConnectStateData::commResetFD()
960 struct addrinfo
*AI
= NULL
;
962 int new_family
= AF_UNSPEC
;
964 // XXX: do we have to check this?
966 // if (!cbdataReferenceValid(callback.data))
969 statCounter
.syscalls
.sock
.sockets
++;
971 /* setup a bare-bones addrinfo */
972 /* TODO INET6: for WinXP we may need to check the local_addr type and setup the family properly. */
974 new_family
= AI
->ai_family
;
976 int fd2
= socket(AI
->ai_family
, AI
->ai_socktype
, AI
->ai_protocol
);
978 nul
.FreeAddrInfo(AI
);
981 debugs(5, DBG_CRITICAL
, HERE
<< "WARNING: FD " << fd2
<< " socket failed to allocate: " << xstrerror());
983 if (ENFILE
== errno
|| EMFILE
== errno
)
991 /* On Windows dup2() can't work correctly on Sockets, the */
992 /* workaround is to close the destination Socket before call them. */
997 if (dup2(fd2
, fd
) < 0) {
998 debugs(5, DBG_CRITICAL
, HERE
<< "WARNING: dup2(FD " << fd2
<< ", FD " << fd
<< ") failed: " << xstrerror());
1000 if (ENFILE
== errno
|| EMFILE
== errno
)
1007 commResetSelect(fd
);
1010 fde
*F
= &fd_table
[fd
];
1012 /* INET6: copy the new sockets family type to the FDE table */
1013 fd_table
[fd
].sock_family
= new_family
;
1015 fd_table
[fd
].flags
.called_connect
= 0;
1017 * yuck, this has assumptions about comm_open() arguments for
1018 * the original socket
1021 /* MUST be done before binding or face OS Error: "(99) Cannot assign requested address"... */
1022 if ( F
->flags
.transparent
) {
1023 comm_set_transparent(fd
);
1027 F
->local_addr
.GetAddrInfo(AI
);
1029 if (commBind(fd
, *AI
) != COMM_OK
) {
1030 debugs(5, DBG_CRITICAL
, "WARNING: Reset of FD " << fd
<< " for " << F
->local_addr
<< " failed to bind: " << xstrerror());
1031 F
->local_addr
.FreeAddrInfo(AI
);
1034 F
->local_addr
.FreeAddrInfo(AI
);
1037 comm_set_tos(fd
, F
->tos
);
1039 #if IPV6_SPECIAL_SPLITSTACK
1040 if ( F
->local_addr
.IsIPv6() )
1041 comm_set_v6only(fd
, 1);
1050 ConnectStateData::commRetryConnect()
1052 assert(addrcount
> 0);
1054 if (addrcount
== 1) {
1055 if (tries
>= Config
.retry
.maxtries
)
1058 if (squid_curtime
- connstart
> Config
.Timeout
.connect
)
1061 if (tries
> addrcount
)
1065 return commResetFD();
1069 commReconnect(void *data
)
1071 ConnectStateData
*cs
= (ConnectStateData
*)data
;
1072 ipcache_nbgethostbyname(cs
->host
, commConnectDnsHandle
, cs
);
1075 /** Connect SOCK to specified DEST_PORT at DEST_HOST. */
1077 ConnectStateData::Connect(int fd
, void *me
)
1079 ConnectStateData
*cs
= (ConnectStateData
*)me
;
1080 assert (cs
->fd
== fd
);
1085 ConnectStateData::defaults()
1088 S
.SetPort(default_port
);
1092 ConnectStateData::connect()
1097 debugs(5,5, HERE
<< "to " << S
);
1099 switch (comm_connect_addr(fd
, S
) ) {
1101 case COMM_INPROGRESS
:
1102 debugs(5, 5, HERE
<< "FD " << fd
<< ": COMM_INPROGRESS");
1103 commSetSelect(fd
, COMM_SELECT_WRITE
, ConnectStateData::Connect
, this, 0);
1107 debugs(5, 5, HERE
<< "FD " << fd
<< ": COMM_OK - connected");
1108 ipcacheMarkGoodAddr(host
, S
);
1109 callCallback(COMM_OK
, 0);
1113 case COMM_ERR_PROTOCOL
:
1114 /* problem using the desired protocol over this socket.
1115 * count the connection attempt, reset the socket, and immediately try again */
1123 debugs(5, 5, HERE
"FD " << fd
<< ": * - try again");
1125 ipcacheMarkBadAddr(host
, S
);
1128 if (Config
.onoff
.test_reachability
)
1129 netdbDeleteAddrNetwork(S
);
1132 if (commRetryConnect()) {
1133 eventAdd("commReconnect", commReconnect
, this, this->addrcount
== 1 ? 0.05 : 0.0, 0);
1135 debugs(5, 5, HERE
<< "FD " << fd
<< ": * - ERR tried too many times already.");
1136 callCallback(COMM_ERR_CONNECT
, errno
);
1142 commSetTimeout_old(int fd, int timeout, PF * handler, void *data)
1144 debugs(5, 3, HERE << "FD " << fd << " timeout " << timeout);
1146 assert(fd < Squid_MaxFD);
1147 fde *F = &fd_table[fd];
1148 assert(F->flags.open);
1151 cbdataReferenceDone(F->timeout_data);
1152 F->timeout_handler = NULL;
1156 cbdataReferenceDone(F->timeout_data);
1157 F->timeout_handler = handler;
1158 F->timeout_data = cbdataReference(data);
1161 F->timeout = squid_curtime + (time_t) timeout;
1169 commSetTimeout(int fd
, int timeout
, PF
* handler
, void *data
)
1171 AsyncCall::Pointer call
;
1172 debugs(5, 3, HERE
<< "FD " << fd
<< " timeout " << timeout
);
1173 if (handler
!= NULL
)
1174 call
=commCbCall(5,4, "SomeTimeoutHandler", CommTimeoutCbPtrFun(handler
, data
));
1177 return commSetTimeout(fd
, timeout
, call
);
1181 int commSetTimeout(int fd
, int timeout
, AsyncCall::Pointer
&callback
)
1183 debugs(5, 3, HERE
<< "FD " << fd
<< " timeout " << timeout
);
1185 assert(fd
< Squid_MaxFD
);
1186 fde
*F
= &fd_table
[fd
];
1187 assert(F
->flags
.open
);
1190 F
->timeoutHandler
= NULL
;
1193 if (callback
!= NULL
) {
1194 typedef CommTimeoutCbParams Params
;
1195 Params
¶ms
= GetCommParams
<Params
>(callback
);
1197 F
->timeoutHandler
= callback
;
1200 F
->timeout
= squid_curtime
+ (time_t) timeout
;
1208 comm_connect_addr(int sock
, const IpAddress
&address
)
1210 comm_err_t status
= COMM_OK
;
1211 fde
*F
= &fd_table
[sock
];
1215 struct addrinfo
*AI
= NULL
;
1216 PROF_start(comm_connect_addr
);
1218 assert(address
.GetPort() != 0);
1220 debugs(5, 9, "comm_connect_addr: connecting socket " << sock
<< " to " << address
<< " (want family: " << F
->sock_family
<< ")");
1222 /* BUG 2222 FIX: reset the FD when its found to be IPv4 in IPv6 mode */
1223 /* inverse case of IPv4 failing to connect on IPv6 socket is handeld post-connect.
1224 * this case must presently be handled here since the GetAddrInfo asserts on bad mappings.
1225 * eventually we want it to throw a Must() that gets handled there instead of this if.
1226 * NP: because commresetFD is private to ConnStateData we have to return an error and
1227 * trust its handled properly.
1230 if (F
->sock_family
== AF_INET
&& !address
.IsIPv4()) {
1231 return COMM_ERR_PROTOCOL
;
1235 address
.GetAddrInfo(AI
, F
->sock_family
);
1237 /* Establish connection. */
1240 if (!F
->flags
.called_connect
) {
1241 F
->flags
.called_connect
= 1;
1242 statCounter
.syscalls
.sock
.connects
++;
1244 x
= connect(sock
, AI
->ai_addr
, AI
->ai_addrlen
);
1246 // XXX: ICAP code refuses callbacks during a pending comm_ call
1247 // Async calls development will fix this.
1250 errno
= EINPROGRESS
;
1254 debugs(5,5, "comm_connect_addr: sock=" << sock
<< ", addrinfo( " <<
1255 " flags=" << AI
->ai_flags
<<
1256 ", family=" << AI
->ai_family
<<
1257 ", socktype=" << AI
->ai_socktype
<<
1258 ", protocol=" << AI
->ai_protocol
<<
1259 ", &addr=" << AI
->ai_addr
<<
1260 ", addrlen=" << AI
->ai_addrlen
<<
1262 debugs(5, 9, "connect FD " << sock
<< ": (" << x
<< ") " << xstrerror());
1263 debugs(14,9, "connecting to: " << address
);
1266 #if defined(_SQUID_NEWSOS6_)
1267 /* Makoto MATSUSHITA <matusita@ics.es.osaka-u.ac.jp> */
1269 connect(sock
, AI
->ai_addr
, AI
->ai_addrlen
);
1271 if (errno
== EINVAL
) {
1272 errlen
= sizeof(err
);
1273 x
= getsockopt(sock
, SOL_SOCKET
, SO_ERROR
, &err
, &errlen
);
1280 errlen
= sizeof(err
);
1282 x
= getsockopt(sock
, SOL_SOCKET
, SO_ERROR
, &err
, &errlen
);
1287 #if defined(_SQUID_SOLARIS_)
1289 * Solaris 2.4's socket emulation doesn't allow you
1290 * to determine the error from a failed non-blocking
1291 * connect and just returns EPIPE. Create a fake
1292 * error message for connect. -- fenner@parc.xerox.com
1294 if (x
< 0 && errno
== EPIPE
)
1302 /* Squid seems to be working fine without this code. With this code,
1303 * we leak memory on many connect requests because of EINPROGRESS.
1304 * If you find that this code is needed, please file a bug report. */
1306 #ifdef _SQUID_LINUX_
1308 * Linux Debian replaces our allocated AI pointer with garbage when
1309 * connect() fails. This leads to segmentation faults deallocating
1310 * the system-allocated memory when we go to clean up our pointer.
1311 * HACK: is to leak the memory returned since we can't deallocate.
1319 address
.FreeAddrInfo(AI
);
1321 PROF_stop(comm_connect_addr
);
1323 if (errno
== 0 || errno
== EISCONN
)
1325 else if (ignoreErrno(errno
))
1326 status
= COMM_INPROGRESS
;
1329 if ( address
.IsIPv4() && F
->sock_family
== AF_INET6
) {
1331 /* failover to trying IPv4-only link if an IPv6 one fails */
1332 /* to catch the edge case of apps listening on IPv4-localhost */
1333 F
->sock_family
= AF_INET
;
1334 int res
= comm_connect_addr(sock
, address
);
1336 /* if that fails too, undo our temporary socktype hack so the repeat works properly. */
1337 if (res
== COMM_ERROR
)
1338 F
->sock_family
= AF_INET6
;
1345 address
.NtoA(F
->ipaddr
, MAX_IPSTRLEN
);
1347 F
->remote_port
= address
.GetPort(); /* remote_port is HS */
1349 if (status
== COMM_OK
) {
1350 debugs(5, 10, "comm_connect_addr: FD " << sock
<< " connected to " << address
);
1351 } else if (status
== COMM_INPROGRESS
) {
1352 debugs(5, 10, "comm_connect_addr: FD " << sock
<< " connection pending");
1358 /* Wait for an incoming connection on FD. FD should be a socket returned
1359 * from comm_listen. */
1361 comm_old_accept(int fd
, ConnectionDetail
&details
)
1363 PROF_start(comm_accept
);
1364 statCounter
.syscalls
.sock
.accepts
++;
1366 struct addrinfo
*gai
= NULL
;
1367 details
.me
.InitAddrInfo(gai
);
1369 if ((sock
= accept(fd
, gai
->ai_addr
, &gai
->ai_addrlen
)) < 0) {
1371 details
.me
.FreeAddrInfo(gai
);
1373 PROF_stop(comm_accept
);
1375 if (ignoreErrno(errno
)) {
1376 debugs(50, 5, "comm_old_accept: FD " << fd
<< ": " << xstrerror());
1377 return COMM_NOMESSAGE
;
1378 } else if (ENFILE
== errno
|| EMFILE
== errno
) {
1379 debugs(50, 3, "comm_old_accept: FD " << fd
<< ": " << xstrerror());
1382 debugs(50, 1, "comm_old_accept: FD " << fd
<< ": " << xstrerror());
1387 details
.peer
= *gai
;
1389 details
.me
.InitAddrInfo(gai
);
1391 details
.me
.SetEmpty();
1392 getsockname(sock
, gai
->ai_addr
, &gai
->ai_addrlen
);
1395 commSetCloseOnExec(sock
);
1398 fd_open(sock
, FD_SOCKET
, "HTTP Request");
1399 fdd_table
[sock
].close_file
= NULL
;
1400 fdd_table
[sock
].close_line
= 0;
1401 fde
*F
= &fd_table
[sock
];
1402 details
.peer
.NtoA(F
->ipaddr
,MAX_IPSTRLEN
);
1403 F
->remote_port
= details
.peer
.GetPort();
1404 F
->local_addr
.SetPort(details
.me
.GetPort());
1406 F
->sock_family
= AF_INET
;
1408 F
->sock_family
= details
.me
.IsIPv4()?AF_INET
:AF_INET6
;
1410 details
.me
.FreeAddrInfo(gai
);
1412 commSetNonBlocking(sock
);
1414 /* IFF the socket is (tproxy) transparent, pass the flag down to allow spoofing */
1415 F
->flags
.transparent
= fd_table
[fd
].flags
.transparent
;
1417 PROF_stop(comm_accept
);
1422 commCallCloseHandlers(int fd
)
1424 fde
*F
= &fd_table
[fd
];
1425 debugs(5, 5, "commCallCloseHandlers: FD " << fd
);
1427 while (F
->closeHandler
!= NULL
) {
1428 AsyncCall::Pointer call
= F
->closeHandler
;
1429 F
->closeHandler
= call
->Next();
1430 call
->setNext(NULL
);
1431 // If call is not canceled schedule it for execution else ignore it
1432 if (!call
->canceled()) {
1433 debugs(5, 5, "commCallCloseHandlers: ch->handler=" << call
);
1434 typedef CommCloseCbParams Params
;
1435 Params
¶ms
= GetCommParams
<Params
>(call
);
1437 ScheduleCallHere(call
);
1444 commLingerClose(int fd
, void *unused
)
1446 LOCAL_ARRAY(char, buf
, 1024);
1448 n
= FD_READ_METHOD(fd
, buf
, 1024);
1451 debugs(5, 3, "commLingerClose: FD " << fd
<< " read: " << xstrerror());
1457 commLingerTimeout(int fd
, void *unused
)
1459 debugs(5, 3, "commLingerTimeout: FD " << fd
);
1464 * Inspired by apache
1467 comm_lingering_close(int fd
)
1471 if (fd_table
[fd
].ssl
)
1472 ssl_shutdown_method(fd
);
1476 if (shutdown(fd
, 1) < 0) {
1481 fd_note(fd
, "lingering close");
1482 commSetTimeout(fd
, 10, commLingerTimeout
, NULL
);
1483 commSetSelect(fd
, COMM_SELECT_READ
, commLingerClose
, NULL
, 0);
1489 * enable linger with time of 0 so that when the socket is
1490 * closed, TCP generates a RESET
1493 comm_reset_close(int fd
)
1500 if (setsockopt(fd
, SOL_SOCKET
, SO_LINGER
, (char *) &L
, sizeof(L
)) < 0)
1501 debugs(50, 0, "commResetTCPClose: FD " << fd
<< ": " << xstrerror());
1507 comm_close_start(int fd
, void *data
)
1510 fde
*F
= &fd_table
[fd
];
1512 ssl_shutdown_method(fd
);
1520 comm_close_complete(int fd
, void *data
)
1523 fde
*F
= &fd_table
[fd
];
1531 fd_close(fd
); /* update fdstat */
1535 fdc_table
[fd
] = AcceptFD(fd
);
1537 statCounter
.syscalls
.sock
.closes
++;
1539 /* When an fd closes, give accept() a chance, if need be */
1541 if (fdNFree() >= RESERVED_FD
)
1542 AcceptLimiter::Instance().kick();
1547 * Close the socket fd.
1549 * + call write handlers with ERR_CLOSING
1550 * + call read handlers with ERR_CLOSING
1551 * + call closing handlers
1553 * NOTE: COMM_ERR_CLOSING will NOT be called for CommReads' sitting in a
1554 * DeferredReadManager.
1557 _comm_close(int fd
, char const *file
, int line
)
1559 debugs(5, 3, "comm_close: start closing FD " << fd
);
1561 assert(fd
< Squid_MaxFD
);
1563 fde
*F
= &fd_table
[fd
];
1564 fdd_table
[fd
].close_file
= file
;
1565 fdd_table
[fd
].close_line
= line
;
1570 /* XXX: is this obsolete behind F->closing() ? */
1571 if ( (shutting_down
|| reconfiguring
) && (!F
->flags
.open
|| F
->type
== FD_FILE
))
1574 /* The following fails because ipc.c is doing calls to pipe() to create sockets! */
1577 assert(F
->type
!= FD_FILE
);
1579 PROF_start(comm_close
);
1581 F
->flags
.close_request
= 1;
1583 AsyncCall::Pointer startCall
=commCbCall(5,4, "comm_close_start",
1584 CommCloseCbPtrFun(comm_close_start
, NULL
));
1585 typedef CommCloseCbParams Params
;
1586 Params
&startParams
= GetCommParams
<Params
>(startCall
);
1587 startParams
.fd
= fd
;
1588 ScheduleCallHere(startCall
);
1590 // a half-closed fd may lack a reader, so we stop monitoring explicitly
1591 if (commHasHalfClosedMonitor(fd
))
1592 commStopHalfClosedMonitor(fd
);
1593 commSetTimeout(fd
, -1, NULL
, NULL
);
1595 // notify read/write handlers
1596 if (commio_has_callback(fd
, IOCB_WRITE
, COMMIO_FD_WRITECB(fd
))) {
1597 commio_finish_callback(fd
, COMMIO_FD_WRITECB(fd
), COMM_ERR_CLOSING
, errno
);
1599 if (commio_has_callback(fd
, IOCB_READ
, COMMIO_FD_READCB(fd
))) {
1600 commio_finish_callback(fd
, COMMIO_FD_READCB(fd
), COMM_ERR_CLOSING
, errno
);
1603 // notify accept handlers
1604 fdc_table
[fd
].notify(-1, COMM_ERR_CLOSING
, 0, ConnectionDetail());
1606 commCallCloseHandlers(fd
);
1609 F
->pconn
.pool
->count(F
->pconn
.uses
);
1611 comm_empty_os_read_buffers(fd
);
1614 AsyncCall::Pointer completeCall
=commCbCall(5,4, "comm_close_complete",
1615 CommCloseCbPtrFun(comm_close_complete
, NULL
));
1616 Params
&completeParams
= GetCommParams
<Params
>(completeCall
);
1617 completeParams
.fd
= fd
;
1618 // must use async call to wait for all callbacks
1619 // scheduled before comm_close() to finish
1620 ScheduleCallHere(completeCall
);
1622 PROF_stop(comm_close
);
1625 /* Send a udp datagram to specified TO_ADDR. */
1627 comm_udp_sendto(int fd
,
1628 const IpAddress
&to_addr
,
1633 struct addrinfo
*AI
= NULL
;
1635 PROF_start(comm_udp_sendto
);
1636 statCounter
.syscalls
.sock
.sendtos
++;
1638 debugs(50, 3, "comm_udp_sendto: Attempt to send UDP packet to " << to_addr
<<
1639 " using FD " << fd
<< " using Port " << comm_local_port(fd
) );
1641 /* BUG: something in the above macro appears to occasionally be setting AI to garbage. */
1642 /* AYJ: 2007-08-27 : or was it because I wasn't then setting 'fd_table[fd].sock_family' to fill properly. */
1643 assert( NULL
== AI
);
1645 to_addr
.GetAddrInfo(AI
, fd_table
[fd
].sock_family
);
1647 x
= sendto(fd
, buf
, len
, 0, AI
->ai_addr
, AI
->ai_addrlen
);
1649 to_addr
.FreeAddrInfo(AI
);
1651 PROF_stop(comm_udp_sendto
);
1656 #ifdef _SQUID_LINUX_
1658 if (ECONNREFUSED
!= errno
)
1661 debugs(50, 1, "comm_udp_sendto: FD " << fd
<< ", (family=" << fd_table
[fd
].sock_family
<< ") " << to_addr
<< ": " << xstrerror());
1667 comm_add_close_handler(int fd
, PF
* handler
, void *data
)
1669 debugs(5, 5, "comm_add_close_handler: FD " << fd
<< ", handler=" <<
1670 handler
<< ", data=" << data
);
1672 AsyncCall::Pointer call
=commCbCall(5,4, "SomeCloseHandler",
1673 CommCloseCbPtrFun(handler
, data
));
1674 comm_add_close_handler(fd
, call
);
1678 comm_add_close_handler(int fd
, AsyncCall::Pointer
&call
)
1680 debugs(5, 5, "comm_add_close_handler: FD " << fd
<< ", AsyncCall=" << call
);
1682 /*TODO:Check for a similar scheduled AsyncCall*/
1683 // for (c = fd_table[fd].closeHandler; c; c = c->next)
1684 // assert(c->handler != handler || c->data != data);
1686 call
->setNext(fd_table
[fd
].closeHandler
);
1688 fd_table
[fd
].closeHandler
= call
;
1692 // remove function-based close handler
1694 comm_remove_close_handler(int fd
, PF
* handler
, void *data
)
1696 assert (isOpen(fd
));
1697 /* Find handler in list */
1698 debugs(5, 5, "comm_remove_close_handler: FD " << fd
<< ", handler=" <<
1699 handler
<< ", data=" << data
);
1701 AsyncCall::Pointer p
;
1702 for (p
= fd_table
[fd
].closeHandler
; p
!= NULL
; p
= p
->Next()) {
1703 typedef CommCbFunPtrCallT
<CommCloseCbPtrFun
> Call
;
1704 const Call
*call
= dynamic_cast<const Call
*>(p
.getRaw());
1705 if (!call
) // method callbacks have their own comm_remove_close_handler
1708 typedef CommCloseCbParams Params
;
1709 const Params
¶ms
= GetCommParams
<Params
>(p
);
1710 if (call
->dialer
.handler
== handler
&& params
.data
== data
)
1711 break; /* This is our handler */
1714 // comm_close removes all close handlers so our handler may be gone
1716 p
->cancel("comm_remove_close_handler");
1717 // TODO: should we remove the handler from the close handlers list?
1720 // remove method-based close handler
1722 comm_remove_close_handler(int fd
, AsyncCall::Pointer
&call
)
1724 assert (isOpen(fd
));
1725 debugs(5, 5, "comm_remove_close_handler: FD " << fd
<< ", AsyncCall=" << call
);
1727 // comm_close removes all close handlers so our handler may be gone
1728 // TODO: should we remove the handler from the close handlers list?
1730 // Check to see if really exist the given AsyncCall in comm_close handlers
1731 // TODO: optimize: this slow code is only needed for the assert() below
1732 AsyncCall::Pointer p
;
1733 for (p
= fd_table
[fd
].closeHandler
; p
!= NULL
&& p
!= call
; p
= p
->Next());
1737 call
->cancel("comm_remove_close_handler");
1741 commSetNoLinger(int fd
)
1745 L
.l_onoff
= 0; /* off */
1748 if (setsockopt(fd
, SOL_SOCKET
, SO_LINGER
, (char *) &L
, sizeof(L
)) < 0)
1749 debugs(50, 0, "commSetNoLinger: FD " << fd
<< ": " << xstrerror());
1751 fd_table
[fd
].flags
.nolinger
= 1;
1755 commSetReuseAddr(int fd
)
1759 if (setsockopt(fd
, SOL_SOCKET
, SO_REUSEADDR
, (char *) &on
, sizeof(on
)) < 0)
1760 debugs(50, 1, "commSetReuseAddr: FD " << fd
<< ": " << xstrerror());
1764 commSetTcpRcvbuf(int fd
, int size
)
1766 if (setsockopt(fd
, SOL_SOCKET
, SO_RCVBUF
, (char *) &size
, sizeof(size
)) < 0)
1767 debugs(50, 1, "commSetTcpRcvbuf: FD " << fd
<< ", SIZE " << size
<< ": " << xstrerror());
1768 if (setsockopt(fd
, SOL_SOCKET
, SO_SNDBUF
, (char *) &size
, sizeof(size
)) < 0)
1769 debugs(50, 1, "commSetTcpRcvbuf: FD " << fd
<< ", SIZE " << size
<< ": " << xstrerror());
1770 #ifdef TCP_WINDOW_CLAMP
1771 if (setsockopt(fd
, SOL_TCP
, TCP_WINDOW_CLAMP
, (char *) &size
, sizeof(size
)) < 0)
1772 debugs(50, 1, "commSetTcpRcvbuf: FD " << fd
<< ", SIZE " << size
<< ": " << xstrerror());
1777 commSetNonBlocking(int fd
)
1779 #ifndef _SQUID_MSWIN_
1783 #ifdef _SQUID_WIN32_
1785 int nonblocking
= TRUE
;
1787 #ifdef _SQUID_CYGWIN_
1789 if (fd_table
[fd
].type
!= FD_PIPE
) {
1792 if (ioctl(fd
, FIONBIO
, &nonblocking
) < 0) {
1793 debugs(50, 0, "commSetNonBlocking: FD " << fd
<< ": " << xstrerror() << " " << fd_table
[fd
].type
);
1797 #ifdef _SQUID_CYGWIN_
1802 #ifndef _SQUID_MSWIN_
1804 if ((flags
= fcntl(fd
, F_GETFL
, dummy
)) < 0) {
1805 debugs(50, 0, "FD " << fd
<< ": fcntl F_GETFL: " << xstrerror());
1809 if (fcntl(fd
, F_SETFL
, flags
| SQUID_NONBLOCK
) < 0) {
1810 debugs(50, 0, "commSetNonBlocking: FD " << fd
<< ": " << xstrerror());
1815 #ifdef _SQUID_CYGWIN_
1820 fd_table
[fd
].flags
.nonblocking
= 1;
1826 commUnsetNonBlocking(int fd
)
1828 #ifdef _SQUID_MSWIN_
1829 int nonblocking
= FALSE
;
1831 if (ioctlsocket(fd
, FIONBIO
, (unsigned long *) &nonblocking
) < 0) {
1836 if ((flags
= fcntl(fd
, F_GETFL
, dummy
)) < 0) {
1837 debugs(50, 0, "FD " << fd
<< ": fcntl F_GETFL: " << xstrerror());
1841 if (fcntl(fd
, F_SETFL
, flags
& (~SQUID_NONBLOCK
)) < 0) {
1843 debugs(50, 0, "commUnsetNonBlocking: FD " << fd
<< ": " << xstrerror());
1847 fd_table
[fd
].flags
.nonblocking
= 0;
1852 commSetCloseOnExec(int fd
) {
1857 if ((flags
= fcntl(fd
, F_GETFL
, dummy
)) < 0) {
1858 debugs(50, 0, "FD " << fd
<< ": fcntl F_GETFL: " << xstrerror());
1862 if (fcntl(fd
, F_SETFD
, flags
| FD_CLOEXEC
) < 0)
1863 debugs(50, 0, "FD " << fd
<< ": set close-on-exec failed: " << xstrerror());
1865 fd_table
[fd
].flags
.close_on_exec
= 1;
1872 commSetTcpNoDelay(int fd
) {
1875 if (setsockopt(fd
, IPPROTO_TCP
, TCP_NODELAY
, (char *) &on
, sizeof(on
)) < 0)
1876 debugs(50, 1, "commSetTcpNoDelay: FD " << fd
<< ": " << xstrerror());
1878 fd_table
[fd
].flags
.nodelay
= 1;
1884 commSetTcpKeepalive(int fd
, int idle
, int interval
, int timeout
) {
1887 if (timeout
&& interval
) {
1888 int count
= (timeout
+ interval
- 1) / interval
;
1889 if (setsockopt(fd
, IPPROTO_TCP
, TCP_KEEPCNT
, &count
, sizeof(on
)) < 0)
1890 debugs(5, 1, "commSetKeepalive: FD " << fd
<< ": " << xstrerror());
1895 if (setsockopt(fd
, IPPROTO_TCP
, TCP_KEEPIDLE
, &idle
, sizeof(on
)) < 0)
1896 debugs(5, 1, "commSetKeepalive: FD " << fd
<< ": " << xstrerror());
1899 #ifdef TCP_KEEPINTVL
1901 if (setsockopt(fd
, IPPROTO_TCP
, TCP_KEEPINTVL
, &interval
, sizeof(on
)) < 0)
1902 debugs(5, 1, "commSetKeepalive: FD " << fd
<< ": " << xstrerror());
1905 if (setsockopt(fd
, SOL_SOCKET
, SO_KEEPALIVE
, (char *) &on
, sizeof(on
)) < 0)
1906 debugs(5, 1, "commSetKeepalive: FD " << fd
<< ": " << xstrerror());
1911 fd_table
=(fde
*) xcalloc(Squid_MaxFD
, sizeof(fde
));
1912 fdd_table
= (fd_debug_t
*)xcalloc(Squid_MaxFD
, sizeof(fd_debug_t
));
1914 fdc_table
= new AcceptFD
[Squid_MaxFD
];
1915 for (int pos
= 0; pos
< Squid_MaxFD
; ++pos
) {
1916 fdc_table
[pos
] = AcceptFD(pos
);
1919 commfd_table
= (comm_fd_t
*) xcalloc(Squid_MaxFD
, sizeof(comm_fd_t
));
1920 for (int pos
= 0; pos
< Squid_MaxFD
; pos
++) {
1921 commfd_table
[pos
].fd
= pos
;
1922 commfd_table
[pos
].readcb
.fd
= pos
;
1923 commfd_table
[pos
].readcb
.type
= IOCB_READ
;
1924 commfd_table
[pos
].writecb
.fd
= pos
;
1925 commfd_table
[pos
].writecb
.type
= IOCB_WRITE
;
1928 /* XXX account fd_table */
1929 /* Keep a few file descriptors free so that we don't run out of FD's
1930 * after accepting a client but before it opens a socket or a file.
1931 * Since Squid_MaxFD can be as high as several thousand, don't waste them */
1932 RESERVED_FD
= min(100, Squid_MaxFD
/ 4);
1934 conn_close_pool
= memPoolCreate("close_handler", sizeof(close_handler
));
1936 TheHalfClosed
= new DescriptorSet
;
1941 delete TheHalfClosed
;
1942 TheHalfClosed
= NULL
;
1944 safe_free(fd_table
);
1945 safe_free(fdd_table
);
1950 safe_free(commfd_table
);
1955 commHandleWrite(int fd
, void *data
) {
1956 comm_io_callback_t
*state
= (comm_io_callback_t
*)data
;
1960 assert(state
== COMMIO_FD_WRITECB(fd
));
1962 PROF_start(commHandleWrite
);
1963 debugs(5, 5, "commHandleWrite: FD " << fd
<< ": off " <<
1964 (long int) state
->offset
<< ", sz " << (long int) state
->size
<< ".");
1966 nleft
= state
->size
- state
->offset
;
1967 len
= FD_WRITE_METHOD(fd
, state
->buf
+ state
->offset
, nleft
);
1968 debugs(5, 5, "commHandleWrite: write() returns " << len
);
1969 fd_bytes(fd
, len
, FD_WRITE
);
1970 statCounter
.syscalls
.sock
.writes
++;
1973 /* Note we even call write if nleft == 0 */
1977 debugs(5, 1, "commHandleWrite: FD " << fd
<< ": write failure: connection closed with " << nleft
<< " bytes remaining.");
1979 commio_finish_callback(fd
, COMMIO_FD_WRITECB(fd
), nleft
? COMM_ERROR
: COMM_OK
, errno
);
1980 } else if (len
< 0) {
1983 if (fd_table
[fd
].flags
.socket_eof
) {
1984 debugs(50, 2, "commHandleWrite: FD " << fd
<< ": write failure: " << xstrerror() << ".");
1985 commio_finish_callback(fd
, COMMIO_FD_WRITECB(fd
), nleft
? COMM_ERROR
: COMM_OK
, errno
);
1986 } else if (ignoreErrno(errno
)) {
1987 debugs(50, 10, "commHandleWrite: FD " << fd
<< ": write failure: " << xstrerror() << ".");
1994 debugs(50, 2, "commHandleWrite: FD " << fd
<< ": write failure: " << xstrerror() << ".");
1995 commio_finish_callback(fd
, COMMIO_FD_WRITECB(fd
), nleft
? COMM_ERROR
: COMM_OK
, errno
);
1998 /* A successful write, continue */
1999 state
->offset
+= len
;
2001 if (state
->offset
< state
->size
) {
2002 /* Not done, reinstall the write handler and write some more */
2009 commio_finish_callback(fd
, COMMIO_FD_WRITECB(fd
), nleft
? COMM_OK
: COMM_ERROR
, errno
);
2013 PROF_stop(commHandleWrite
);
2017 * Queue a write. handler/handler_data are called when the write
2018 * completes, on error, or on file descriptor close.
2020 * free_func is used to free the passed buffer when the write has completed.
2023 comm_write(int fd
, const char *buf
, int size
, IOCB
* handler
, void *handler_data
, FREE
* free_func
) {
2024 AsyncCall::Pointer call
= commCbCall(5,5, "SomeCommWriteHander",
2025 CommIoCbPtrFun(handler
, handler_data
));
2027 comm_write(fd
, buf
, size
, call
, free_func
);
2031 comm_write(int fd
, const char *buf
, int size
, AsyncCall::Pointer
&callback
, FREE
* free_func
) {
2032 debugs(5, 5, "comm_write: FD " << fd
<< ": sz " << size
<< ": asynCall " << callback
);
2034 /* Make sure we are open, not closing, and not writing */
2036 assert(!fd_table
[fd
].closing());
2037 comm_io_callback_t
*ccb
= COMMIO_FD_WRITECB(fd
);
2038 assert(!ccb
->active());
2040 /* Queue the write */
2041 commio_set_callback(fd
, IOCB_WRITE
, ccb
, callback
,
2042 (char *)buf
, free_func
, size
);
2043 commSetSelect(fd
, COMM_SELECT_WRITE
, commHandleWrite
, ccb
, 0);
2047 /* a wrapper around comm_write to allow for MemBuf to be comm_written in a snap */
2049 comm_write_mbuf(int fd
, MemBuf
*mb
, IOCB
* handler
, void *handler_data
) {
2050 comm_write(fd
, mb
->buf
, mb
->size
, handler
, handler_data
, mb
->freeFunc());
2054 comm_write_mbuf(int fd
, MemBuf
*mb
, AsyncCall::Pointer
&callback
) {
2055 comm_write(fd
, mb
->buf
, mb
->size
, callback
, mb
->freeFunc());
2060 * hm, this might be too general-purpose for all the places we'd
2064 ignoreErrno(int ierrno
) {
2070 #if EAGAIN != EWOULDBLOCK
2093 commCloseAllSockets(void) {
2097 for (fd
= 0; fd
<= Biggest_FD
; fd
++) {
2103 if (F
->type
!= FD_SOCKET
)
2106 if (F
->flags
.ipc
) /* don't close inter-process sockets */
2109 if (F
->timeoutHandler
!= NULL
) {
2110 AsyncCall::Pointer callback
= F
->timeoutHandler
;
2111 F
->timeoutHandler
= NULL
;
2112 debugs(5, 5, "commCloseAllSockets: FD " << fd
<< ": Calling timeout handler");
2113 ScheduleCallHere(callback
);
2115 debugs(5, 5, "commCloseAllSockets: FD " << fd
<< ": calling comm_close()");
2122 AlreadyTimedOut(fde
*F
) {
2126 if (F
->timeout
== 0)
2129 if (F
->timeout
> squid_curtime
)
2136 checkTimeouts(void) {
2139 AsyncCall::Pointer callback
;
2141 for (fd
= 0; fd
<= Biggest_FD
; fd
++) {
2144 if (AlreadyTimedOut(F
))
2147 debugs(5, 5, "checkTimeouts: FD " << fd
<< " Expired");
2149 if (F
->timeoutHandler
!= NULL
) {
2150 debugs(5, 5, "checkTimeouts: FD " << fd
<< ": Call timeout handler");
2151 callback
= F
->timeoutHandler
;
2152 F
->timeoutHandler
= NULL
;
2153 ScheduleCallHere(callback
);
2155 debugs(5, 5, "checkTimeouts: FD " << fd
<< ": Forcing comm_close()");
2162 * New-style listen and accept routines
2164 * Listen simply registers our interest in an FD for listening,
2165 * and accept takes a callback to call when an FD has been
2169 comm_listen(int sock
) {
2172 if ((x
= listen(sock
, Squid_MaxFD
>> 2)) < 0) {
2173 debugs(50, 0, "comm_listen: listen(" << (Squid_MaxFD
>> 2) << ", " << sock
<< "): " << xstrerror());
2177 if (Config
.accept_filter
&& strcmp(Config
.accept_filter
, "none") != 0) {
2178 #ifdef SO_ACCEPTFILTER
2179 struct accept_filter_arg afa
;
2180 bzero(&afa
, sizeof(afa
));
2181 debugs(5, DBG_CRITICAL
, "Installing accept filter '" << Config
.accept_filter
<< "' on FD " << sock
);
2182 xstrncpy(afa
.af_name
, Config
.accept_filter
, sizeof(afa
.af_name
));
2183 x
= setsockopt(sock
, SOL_SOCKET
, SO_ACCEPTFILTER
, &afa
, sizeof(afa
));
2185 debugs(5, 0, "SO_ACCEPTFILTER '" << Config
.accept_filter
<< "': '" << xstrerror());
2186 #elif defined(TCP_DEFER_ACCEPT)
2188 if (strncmp(Config
.accept_filter
, "data=", 5) == 0)
2189 seconds
= atoi(Config
.accept_filter
+ 5);
2190 x
= setsockopt(sock
, IPPROTO_TCP
, TCP_DEFER_ACCEPT
, &seconds
, sizeof(seconds
));
2192 debugs(5, 0, "TCP_DEFER_ACCEPT '" << Config
.accept_filter
<< "': '" << xstrerror());
2194 debugs(5, 0, "accept_filter not supported on your OS");
2202 comm_accept(int fd
, IOACB
*handler
, void *handler_data
) {
2203 debugs(5, 5, "comm_accept: FD " << fd
<< " handler: " << (void*)handler
);
2206 AsyncCall::Pointer call
= commCbCall(5,5, "SomeCommAcceptHandler",
2207 CommAcceptCbPtrFun(handler
, handler_data
));
2208 fdc_table
[fd
].subscribe(call
);
2212 comm_accept(int fd
, AsyncCall::Pointer
&call
) {
2213 debugs(5, 5, "comm_accept: FD " << fd
<< " AsyncCall: " << call
);
2216 fdc_table
[fd
].subscribe(call
);
2219 // Called when somebody wants to be notified when our socket accepts new
2220 // connection. We do not probe the FD until there is such interest.
2222 AcceptFD::subscribe(AsyncCall::Pointer
&call
) {
2223 /* make sure we're not pending! */
2224 assert(!theCallback
);
2228 mayAcceptMore
= true; // even if we failed to accept last time
2234 commSetSelect(fd
, COMM_SELECT_READ
, comm_accept_try
, NULL
, 0);
2238 AcceptFD::acceptOne() {
2239 // If there is no callback and we accept, we will leak the accepted FD.
2240 // When we are running out of FDs, there is often no callback.
2242 debugs(5, 5, "AcceptFD::acceptOne orphaned: FD " << fd
);
2243 // XXX: can we remove this and similar "just in case" calls and
2244 // either listen always or listen only when there is a callback?
2245 if (!AcceptLimiter::Instance().deferring())
2246 commSetSelect(fd
, COMM_SELECT_READ
, comm_accept_try
, NULL
, 0);
2251 * We don't worry about running low on FDs here. Instead,
2252 * httpAccept() will use AcceptLimiter if we reach the limit
2256 /* Accept a new connection */
2257 ConnectionDetail connDetails
;
2258 int newfd
= comm_old_accept(fd
, connDetails
);
2260 /* Check for errors */
2263 assert(theCallback
!= NULL
);
2265 if (newfd
== COMM_NOMESSAGE
) {
2266 /* register interest again */
2267 debugs(5, 5, HERE
<< "try later: FD " << fd
<<
2268 " handler: " << *theCallback
);
2269 commSetSelect(fd
, COMM_SELECT_READ
, comm_accept_try
, NULL
, 0);
2273 // A non-recoverable error; notify the caller */
2274 notify(-1, COMM_ERROR
, errno
, connDetails
);
2278 assert(theCallback
!= NULL
);
2279 debugs(5, 5, "AcceptFD::acceptOne accepted: FD " << fd
<<
2280 " newfd: " << newfd
<< " from: " << connDetails
.peer
<<
2281 " handler: " << *theCallback
);
2282 notify(newfd
, COMM_OK
, 0, connDetails
);
2287 AcceptFD::acceptNext() {
2288 mayAcceptMore
= acceptOne();
2292 AcceptFD::notify(int newfd
, comm_err_t errcode
, int xerrno
, const ConnectionDetail
&connDetails
) {
2293 if (theCallback
!= NULL
) {
2294 typedef CommAcceptCbParams Params
;
2295 Params
¶ms
= GetCommParams
<Params
>(theCallback
);
2298 params
.details
= connDetails
;
2299 params
.flag
= errcode
;
2300 params
.xerrno
= xerrno
;
2301 ScheduleCallHere(theCallback
);
2307 * This callback is called whenever a filedescriptor is ready
2308 * to dupe itself and fob off an accept()ed connection
2311 comm_accept_try(int fd
, void *) {
2313 fdc_table
[fd
].acceptNext();
2316 void CommIO::Initialise() {
2317 /* Initialize done pipe signal */
2319 if (pipe(DonePipe
)) {}
2320 DoneFD
= DonePipe
[1];
2321 DoneReadFD
= DonePipe
[0];
2322 fd_open(DoneReadFD
, FD_PIPE
, "async-io completetion event: main");
2323 fd_open(DoneFD
, FD_PIPE
, "async-io completetion event: threads");
2324 commSetNonBlocking(DoneReadFD
);
2325 commSetNonBlocking(DoneFD
);
2326 commSetSelect(DoneReadFD
, COMM_SELECT_READ
, NULLFDHandler
, NULL
, 0);
2330 void CommIO::NotifyIOClose() {
2331 /* Close done pipe signal */
2336 fd_close(DoneReadFD
);
2337 Initialised
= false;
2340 bool CommIO::Initialised
= false;
2341 bool CommIO::DoneSignalled
= false;
2342 int CommIO::DoneFD
= -1;
2343 int CommIO::DoneReadFD
= -1;
2346 CommIO::FlushPipe() {
2348 FD_READ_METHOD(DoneReadFD
, buf
, sizeof(buf
));
2352 CommIO::NULLFDHandler(int fd
, void *data
) {
2354 commSetSelect(fd
, COMM_SELECT_READ
, NULLFDHandler
, NULL
, 0);
2358 CommIO::ResetNotifications() {
2359 if (DoneSignalled
) {
2361 DoneSignalled
= false;
2365 AcceptLimiter
AcceptLimiter::Instance_
;
2367 AcceptLimiter
&AcceptLimiter::Instance() {
2372 AcceptLimiter::deferring() const {
2373 return deferred
.size() > 0;
2377 AcceptLimiter::defer (int fd
, Acceptor::AcceptorFunction
*aFunc
, void *data
) {
2378 debugs(5, 5, "AcceptLimiter::defer: FD " << fd
<< " handler: " << (void*)aFunc
);
2380 temp
.theFunction
= aFunc
;
2382 temp
.theData
= data
;
2383 deferred
.push_back(temp
);
2387 AcceptLimiter::kick() {
2391 /* Yes, this means the first on is the last off....
2392 * If the list container was a little more friendly, we could sensibly us it.
2394 Acceptor temp
= deferred
.pop_back();
2396 comm_accept (temp
.acceptFD
, temp
.theFunction
, temp
.theData
);
2399 /// Start waiting for a possibly half-closed connection to close
2400 // by scheduling a read callback to a monitoring handler that
2401 // will close the connection on read errors.
2403 commStartHalfClosedMonitor(int fd
) {
2404 debugs(5, 5, HERE
<< "adding FD " << fd
<< " to " << *TheHalfClosed
);
2406 assert(!commHasHalfClosedMonitor(fd
));
2407 (void)TheHalfClosed
->add(fd
); // could also assert the result
2408 commPlanHalfClosedCheck(); // may schedule check if we added the first FD
2413 commPlanHalfClosedCheck() {
2414 if (!WillCheckHalfClosed
&& !TheHalfClosed
->empty()) {
2415 eventAdd("commHalfClosedCheck", &commHalfClosedCheck
, NULL
, 1.0, 1);
2416 WillCheckHalfClosed
= true;
2420 /// iterates over all descriptors that may need half-closed tests and
2421 /// calls comm_read for those that do; re-schedules the check if needed
2424 commHalfClosedCheck(void *) {
2425 debugs(5, 5, HERE
<< "checking " << *TheHalfClosed
);
2427 typedef DescriptorSet::const_iterator DSCI
;
2428 const DSCI end
= TheHalfClosed
->end();
2429 for (DSCI i
= TheHalfClosed
->begin(); i
!= end
; ++i
) {
2431 if (!fd_table
[fd
].halfClosedReader
) { // not reading already
2432 AsyncCall::Pointer call
= commCbCall(5,4, "commHalfClosedReader",
2433 CommIoCbPtrFun(&commHalfClosedReader
, NULL
));
2434 comm_read(fd
, NULL
, 0, call
);
2435 fd_table
[fd
].halfClosedReader
= call
;
2439 WillCheckHalfClosed
= false; // as far as we know
2440 commPlanHalfClosedCheck(); // may need to check again
2443 /// checks whether we are waiting for possibly half-closed connection to close
2444 // We are monitoring if the read handler for the fd is the monitoring handler.
2446 commHasHalfClosedMonitor(int fd
) {
2447 return TheHalfClosed
->has(fd
);
2450 /// stop waiting for possibly half-closed connection to close
2452 commStopHalfClosedMonitor(int const fd
) {
2453 debugs(5, 5, HERE
<< "removing FD " << fd
<< " from " << *TheHalfClosed
);
2455 // cancel the read if one was scheduled
2456 AsyncCall::Pointer reader
= fd_table
[fd
].halfClosedReader
;
2458 comm_read_cancel(fd
, reader
);
2459 fd_table
[fd
].halfClosedReader
= NULL
;
2461 TheHalfClosed
->del(fd
);
2464 /// I/O handler for the possibly half-closed connection monitoring code
2466 commHalfClosedReader(int fd
, char *, size_t size
, comm_err_t flag
, int, void *) {
2467 // there cannot be more data coming in on half-closed connections
2469 assert(commHasHalfClosedMonitor(fd
)); // or we would have canceled the read
2471 fd_table
[fd
].halfClosedReader
= NULL
; // done reading, for now
2473 // nothing to do if fd is being closed
2474 if (flag
== COMM_ERR_CLOSING
)
2477 // if read failed, close the connection
2478 if (flag
!= COMM_OK
) {
2479 debugs(5, 3, "commHalfClosedReader: closing FD " << fd
);
2484 // continue waiting for close or error
2485 commPlanHalfClosedCheck(); // make sure this fd will be checked again
2489 CommRead::CommRead() : fd(-1), buf(NULL
), len(0), callback(NULL
) {}
2491 CommRead::CommRead(int fd_
, char *buf_
, int len_
, AsyncCall::Pointer
&callback_
)
2492 : fd(fd_
), buf(buf_
), len(len_
), callback(callback_
) {}
2494 DeferredRead::DeferredRead () : theReader(NULL
), theContext(NULL
), theRead(), cancelled(false) {}
2496 DeferredRead::DeferredRead (DeferrableRead
*aReader
, void *data
, CommRead
const &aRead
) : theReader(aReader
), theContext (data
), theRead(aRead
), cancelled(false) {}
2498 DeferredReadManager::~DeferredReadManager() {
2500 assert (deferredReads
.empty());
2503 /* explicit instantiation required for some systems */
2505 /// \cond AUTODOCS-IGNORE
2506 template cbdata_type CbDataList
<DeferredRead
>::CBDATA_CbDataList
;
2510 DeferredReadManager::delayRead(DeferredRead
const &aRead
) {
2511 debugs(5, 3, "Adding deferred read on FD " << aRead
.theRead
.fd
);
2512 CbDataList
<DeferredRead
> *temp
= deferredReads
.push_back(aRead
);
2514 // We have to use a global function as a closer and point to temp
2515 // instead of "this" because DeferredReadManager is not a job and
2516 // is not even cbdata protected
2517 AsyncCall::Pointer closer
= commCbCall(5,4,
2518 "DeferredReadManager::CloseHandler",
2519 CommCloseCbPtrFun(&CloseHandler
, temp
));
2520 comm_add_close_handler(aRead
.theRead
.fd
, closer
);
2521 temp
->element
.closer
= closer
; // remeber so that we can cancel
2525 DeferredReadManager::CloseHandler(int fd
, void *thecbdata
) {
2526 if (!cbdataReferenceValid (thecbdata
))
2529 CbDataList
<DeferredRead
> *temp
= (CbDataList
<DeferredRead
> *)thecbdata
;
2531 temp
->element
.closer
= NULL
;
2532 temp
->element
.markCancelled();
2536 DeferredReadManager::popHead(CbDataListContainer
<DeferredRead
> &deferredReads
) {
2537 assert (!deferredReads
.empty());
2539 DeferredRead
&read
= deferredReads
.head
->element
;
2540 if (!read
.cancelled
) {
2541 comm_remove_close_handler(read
.theRead
.fd
, read
.closer
);
2545 DeferredRead result
= deferredReads
.pop_front();
2551 DeferredReadManager::kickReads(int const count
) {
2552 /* if we had CbDataList::size() we could consolidate this and flushReads */
2559 size_t remaining
= count
;
2561 while (!deferredReads
.empty() && remaining
) {
2562 DeferredRead aRead
= popHead(deferredReads
);
2565 if (!aRead
.cancelled
)
2571 DeferredReadManager::flushReads() {
2572 CbDataListContainer
<DeferredRead
> reads
;
2573 reads
= deferredReads
;
2574 deferredReads
= CbDataListContainer
<DeferredRead
>();
2576 // XXX: For fairness this SHOULD randomize the order
2577 while (!reads
.empty()) {
2578 DeferredRead aRead
= popHead(reads
);
2584 DeferredReadManager::kickARead(DeferredRead
const &aRead
) {
2585 if (aRead
.cancelled
)
2588 if (aRead
.theRead
.fd
>=0 && fd_table
[aRead
.theRead
.fd
].closing())
2591 debugs(5, 3, "Kicking deferred read on FD " << aRead
.theRead
.fd
);
2593 aRead
.theReader(aRead
.theContext
, aRead
.theRead
);
2597 DeferredRead::markCancelled() {
2601 ConnectionDetail::ConnectionDetail() : me(), peer() {
2605 CommSelectEngine::checkEvents(int timeout
) {
2606 static time_t last_timeout
= 0;
2608 /* No, this shouldn't be here. But it shouldn't be in each comm handler. -adrian */
2609 if (squid_curtime
> last_timeout
) {
2610 last_timeout
= squid_curtime
;
2614 switch (comm_select(timeout
)) {
2630 fatal_dump("comm.cc: Internal error -- this should never happen.");