2 * Copyright (c) 2016 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
19 #define __need_IOV_MAX
20 #include <bits/stdio_lim.h>
21 #include <netinet/tcp.h>
23 #include <vppinfra/types.h>
24 #include <vppinfra/hash.h>
25 #include <vppinfra/pool.h>
27 #include <libvcl-ldpreload/vcom_socket.h>
28 #include <libvcl-ldpreload/vcom_socket_wrapper.h>
29 #include <libvcl-ldpreload/vcom.h>
31 #include <uri/vppcom.h>
35 * VCOM_SOCKET Private definitions and functions.
38 typedef struct vcom_socket_main_t_
42 /* vcom_socket pool */
43 vcom_socket_t *vsockets;
45 /* Hash table for socketidx to fd mapping */
49 vcom_epoll_t *vepolls;
51 /* Hash table for epollidx to epfd mapping */
52 uword *epollidx_by_epfd;
55 /* common epitem poll for all epfd */
56 /* TBD: epitem poll per epfd */
57 /* vcom_epitem pool */
58 vcom_epitem_t *vepitems;
60 /* Hash table for epitemidx to epfdfd mapping */
61 uword *epitemidx_by_epfdfd;
63 /* Hash table - key:epfd, value:vec of epitemidx */
64 uword *epitemidxs_by_epfd;
65 /* Hash table - key:fd, value:vec of epitemidx */
66 uword *epitemidxs_by_fd;
70 vcom_socket_main_t vcom_socket_main;
74 vcom_socket_open_socket (int domain, int type, int protocol)
78 /* handle domains implemented by vpp */
83 /* get socket type and
84 * handle the socket types supported by vpp */
85 switch (type & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
89 /* the type argument serves a second purpose,
90 * in addition to specifying a socket type,
91 * it may include the bitwise OR of any of
92 * SOCK_NONBLOCK and SOCK_CLOEXEC, to modify
93 * the behavior of socket. */
94 rv = libc_socket (domain, type, protocol);
113 vcom_socket_open_epoll (int flags)
121 if (flags && (flags & ~EPOLL_CLOEXEC))
126 /* flags can be either zero or EPOLL_CLOEXEC */
127 rv = libc_epoll_create1 (flags);
135 vcom_socket_close_socket (int fd)
139 rv = libc_close (fd);
147 vcom_socket_close_epoll (int epfd)
151 rv = libc_close (epfd);
159 * Public API functions
164 vcom_socket_is_vcom_fd (int fd)
166 vcom_socket_main_t *vsm = &vcom_socket_main;
168 vcom_socket_t *vsock;
170 p = hash_get (vsm->sockidx_by_fd, fd);
174 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
175 if (vsock && vsock->type == SOCKET_TYPE_VPPCOM_BOUND)
182 vcom_socket_is_vcom_epfd (int epfd)
184 vcom_socket_main_t *vsm = &vcom_socket_main;
186 vcom_epoll_t *vepoll;
188 p = hash_get (vsm->epollidx_by_epfd, epfd);
192 vepoll = pool_elt_at_index (vsm->vepolls, p[0]);
193 if (vepoll && vepoll->type == EPOLL_TYPE_VPPCOM_BOUND)
200 vcom_socket_get_sid (int fd)
202 vcom_socket_main_t *vsm = &vcom_socket_main;
204 vcom_socket_t *vsock;
206 p = hash_get (vsm->sockidx_by_fd, fd);
210 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
211 if (vsock && vsock->type == SOCKET_TYPE_VPPCOM_BOUND)
214 return INVALID_SESSION_ID;
218 vcom_socket_get_vep_idx (int epfd)
220 vcom_socket_main_t *vsm = &vcom_socket_main;
222 vcom_epoll_t *vepoll;
224 p = hash_get (vsm->epollidx_by_epfd, epfd);
228 vepoll = pool_elt_at_index (vsm->vepolls, p[0]);
229 if (vepoll && vepoll->type == EPOLL_TYPE_VPPCOM_BOUND)
230 return vepoll->vep_idx;
232 return INVALID_VEP_IDX;
236 vcom_socket_get_sid_and_vsock (int fd, vcom_socket_t ** vsockp)
238 vcom_socket_main_t *vsm = &vcom_socket_main;
240 vcom_socket_t *vsock;
242 p = hash_get (vsm->sockidx_by_fd, fd);
246 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
247 if (vsock && vsock->type == SOCKET_TYPE_VPPCOM_BOUND)
253 return INVALID_SESSION_ID;
257 vcom_socket_get_vep_idx_and_vepoll (int epfd, vcom_epoll_t ** vepollp)
259 vcom_socket_main_t *vsm = &vcom_socket_main;
261 vcom_epoll_t *vepoll;
263 p = hash_get (vsm->epollidx_by_epfd, epfd);
267 vepoll = pool_elt_at_index (vsm->vepolls, p[0]);
268 if (vepoll && vepoll->type == EPOLL_TYPE_VPPCOM_BOUND)
271 return vepoll->vep_idx;
274 return INVALID_VEP_IDX;
279 vcom_socket_close_vepoll (int epfd)
282 vcom_socket_main_t *vsm = &vcom_socket_main;
284 vcom_epoll_t *vepoll;
286 p = hash_get (vsm->epollidx_by_epfd, epfd);
290 vepoll = pool_elt_at_index (vsm->vepolls, p[0]);
294 if (vepoll->type != EPOLL_TYPE_VPPCOM_BOUND)
311 rv = vppcom_session_close (vepoll->vep_idx);
312 rv = vcom_socket_close_epoll (vepoll->epfd);
314 vepoll_init (vepoll);
315 hash_unset (vsm->epollidx_by_epfd, epfd);
316 pool_put (vsm->vepolls, vepoll);
322 vcom_socket_close_vsock (int fd)
325 vcom_socket_main_t *vsm = &vcom_socket_main;
327 vcom_socket_t *vsock;
329 vcom_epitem_t *vepitem;
331 i32 *vepitemidxs = 0;
332 i32 *vepitemidxs_var = 0;
334 p = hash_get (vsm->sockidx_by_fd, fd);
338 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
342 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
345 rv = vppcom_session_close (vsock->sid);
346 rv = vcom_socket_close_socket (vsock->fd);
348 vsocket_init (vsock);
349 hash_unset (vsm->sockidx_by_fd, fd);
350 pool_put (vsm->vsockets, vsock);
354 * Before calling close(), user should remove
355 * this fd from the epoll-set of all epoll instances,
356 * otherwise resource(epitems) leaks ensues.
360 * 00. close all epoll instances that are marked as "close"
361 * of which this fd is the "last" remaining member.
362 * 01. epitems associated with this fd are intentionally
363 * not removed, see NOTE: above.
366 /* does this fd participate in epoll */
367 p = hash_get (vsm->epitemidxs_by_fd, fd);
370 vepitemidxs = *(i32 **) p;
371 vec_foreach (vepitemidxs_var, vepitemidxs)
373 vepitem = pool_elt_at_index (vsm->vepitems, vepitemidxs_var[0]);
374 if (vepitem && vepitem->fd == fd &&
375 vepitem->type == FD_TYPE_VCOM_SOCKET)
378 vcom_epoll_t *vepoll;
380 vcom_socket_get_vep_idx_and_vepoll (vepitem->epfd,
386 if (vepoll->count == 1)
389 * force count to zero and
390 * close this epoll instance
393 vcom_socket_close_vepoll (vepoll->epfd);
410 vcom_socket_close (int __fd)
414 if (vcom_socket_is_vcom_fd (__fd))
416 rv = vcom_socket_close_vsock (__fd);
418 else if (vcom_socket_is_vcom_epfd (__fd))
420 rv = vcom_socket_close_vepoll (__fd);
431 vcom_socket_read (int __fd, void *__buf, size_t __nbytes)
434 vcom_socket_main_t *vsm = &vcom_socket_main;
436 vcom_socket_t *vsock;
438 p = hash_get (vsm->sockidx_by_fd, __fd);
442 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
446 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
449 if (!__buf || __nbytes < 0)
454 rv = vcom_fcntl (__fd, F_GETFL, 0);
462 if (!(rv & O_NONBLOCK))
466 rv = vppcom_session_read (vsock->sid, __buf, __nbytes);
468 while (rv == -EAGAIN || rv == -EWOULDBLOCK);
471 /* The file descriptor refers to a socket and has been
472 * marked nonblocking(O_NONBLOCK) and the read would
475 /* is non blocking */
476 rv = vppcom_session_read (vsock->sid, __buf, __nbytes);
481 vcom_socket_readv (int __fd, const struct iovec * __iov, int __iovcnt)
484 vcom_socket_main_t *vsm = &vcom_socket_main;
486 vcom_socket_t *vsock;
487 ssize_t total = 0, len = 0;
489 p = hash_get (vsm->sockidx_by_fd, __fd);
493 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
497 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
500 if (__iov == 0 || __iovcnt == 0 || __iovcnt > IOV_MAX)
504 for (int i = 0; i < __iovcnt; ++i)
506 if (SSIZE_MAX - len < __iov[i].iov_len)
508 len += __iov[i].iov_len;
511 rv = vcom_fcntl (__fd, F_GETFL, 0);
518 if (!(rv & O_NONBLOCK))
522 for (int i = 0; i < __iovcnt; ++i)
524 rv = vppcom_session_read (vsock->sid, __iov[i].iov_base,
531 if (rv < __iov[i].iov_len)
532 /* Read less than buffer provided, no point to continue */
537 while ((rv == -EAGAIN || rv == -EWOULDBLOCK) && total == 0);
541 /* is non blocking */
542 for (int i = 0; i < __iovcnt; ++i)
544 rv = vppcom_session_read (vsock->sid, __iov[i].iov_base,
559 if (rv < __iov[i].iov_len)
560 /* Read less than buffer provided, no point to continue */
568 vcom_socket_write (int __fd, const void *__buf, size_t __n)
571 vcom_socket_main_t *vsm = &vcom_socket_main;
573 vcom_socket_t *vsock;
575 p = hash_get (vsm->sockidx_by_fd, __fd);
579 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
583 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
586 if (!__buf || __n < 0)
591 rv = vppcom_session_write (vsock->sid, (void *) __buf, __n);
596 vcom_socket_writev (int __fd, const struct iovec * __iov, int __iovcnt)
600 vcom_socket_main_t *vsm = &vcom_socket_main;
602 vcom_socket_t *vsock;
604 p = hash_get (vsm->sockidx_by_fd, __fd);
608 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
612 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
615 if (__iov == 0 || __iovcnt == 0 || __iovcnt > IOV_MAX)
618 for (int i = 0; i < __iovcnt; ++i)
620 rv = vppcom_session_write (vsock->sid, __iov[i].iov_base,
636 * RETURN: 0 - invalid cmd
637 * 1 - cmd not handled by vcom and vppcom
638 * 2 - cmd handled by vcom socket resource
639 * 3 - cmd handled by vppcom
641 /* TBD: incomplete list of cmd */
643 vcom_socket_check_fcntl_cmd (int __cmd)
647 /*cmd not handled by vcom and vppcom */
650 case F_DUPFD_CLOEXEC:
653 /* cmd handled by vcom socket resource */
664 /* cmd handled by vcom and vppcom */
669 /* cmd not handled by vcom and vppcom */
677 vppcom_session_fcntl_va (int __sid, int __cmd, va_list __ap)
679 int flags = va_arg (__ap, int);
680 int rv = -EOPNOTSUPP;
683 size = sizeof (flags);
684 if (__cmd == F_SETFL)
686 rv = vppcom_session_attr (__sid, VPPCOM_ATTR_SET_FLAGS, &flags, &size);
688 else if (__cmd == F_GETFL)
690 rv = vppcom_session_attr (__sid, VPPCOM_ATTR_GET_FLAGS, &flags, &size);
699 vcom_socket_fcntl_va (int __fd, int __cmd, va_list __ap)
702 vcom_socket_main_t *vsm = &vcom_socket_main;
704 vcom_socket_t *vsock;
706 p = hash_get (vsm->sockidx_by_fd, __fd);
710 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
714 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
717 switch (vcom_socket_check_fcntl_cmd (__cmd))
723 /*cmd not handled by vcom and vppcom */
725 rv = libc_vfcntl (vsock->fd, __cmd, __ap);
727 /* cmd handled by vcom socket resource */
729 rv = libc_vfcntl (vsock->fd, __cmd, __ap);
731 /* cmd handled by vppcom */
733 rv = vppcom_session_fcntl_va (vsock->sid, __cmd, __ap);
745 * RETURN: 0 - invalid cmd
746 * 1 - cmd not handled by vcom and vppcom
747 * 2 - cmd handled by vcom socket resource
748 * 3 - cmd handled by vppcom
751 vcom_socket_check_ioctl_cmd (unsigned long int __cmd)
757 /* cmd handled by vppcom */
762 /* cmd not handled by vcom and vppcom */
771 vppcom_session_ioctl_va (int __sid, int __cmd, va_list __ap)
775 if (__cmd == FIONREAD)
776 rv = vppcom_session_attr (__sid, VPPCOM_ATTR_GET_NREAD, 0, 0);
783 vcom_socket_ioctl_va (int __fd, unsigned long int __cmd, va_list __ap)
786 vcom_socket_main_t *vsm = &vcom_socket_main;
788 vcom_socket_t *vsock;
790 p = hash_get (vsm->sockidx_by_fd, __fd);
794 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
798 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
801 switch (vcom_socket_check_ioctl_cmd (__cmd))
803 /* Not supported cmd */
808 /* cmd not handled by vcom and vppcom */
810 rv = libc_vioctl (vsock->fd, __cmd, __ap);
813 /* cmd handled by vcom socket resource */
815 rv = libc_vioctl (vsock->fd, __cmd, __ap);
818 /* cmd handled by vppcom */
820 rv = vppcom_session_ioctl_va (vsock->sid, __cmd, __ap);
832 vcom_socket_fds_2_sid_fds (
835 fd_set * __restrict vcom_rd_sid_fds,
836 fd_set * __restrict vcom_wr_sid_fds,
837 fd_set * __restrict vcom_ex_sid_fds,
840 fd_set * __restrict vcom_readfds,
841 fd_set * __restrict vcom_writefds,
842 fd_set * __restrict vcom_exceptfds)
847 /* invalid max_sid is -1 */
852 * set sid in sid sets corresponding to fd's in fd sets
853 * compute nsid and vcom_nsid_fds from sid sets
856 for (fd = 0; fd < vcom_nfds; fd++)
863 if ((F) && (S) && FD_ISSET (fd, (F))) \
865 sid = vcom_socket_get_sid (fd); \
866 if (sid != INVALID_SESSION_ID) \
883 _(vcom_rd_sid_fds, vcom_readfds);
884 _(vcom_wr_sid_fds, vcom_writefds);
885 _(vcom_ex_sid_fds, vcom_exceptfds);
889 *vcom_nsid_fds = max_sid != -1 ? max_sid + 1 : 0;
897 * PRE: 00. sid sets were derived from fd sets
898 * 01. sid sets were updated with sids that actually changed
900 * 02. fd sets still has watched fds
902 * This function will modify in place fd sets to indicate which fd's
903 * actually changed status(inferred from sid sets)
906 vcom_socket_sid_fds_2_fds (
910 fd_set * __restrict vcom_readfds,
911 fd_set * __restrict vcom_writefds,
912 fd_set * __restrict vcom_exceptfds,
915 fd_set * __restrict vcom_rd_sid_fds,
916 fd_set * __restrict vcom_wr_sid_fds,
917 fd_set * __restrict vcom_ex_sid_fds)
922 /* invalid max_fd is -1 */
928 * modify in place fd sets to indicate which fd's
929 * actually changed status(inferred from sid sets)
931 for (fd = 0; fd < vcom_nfds; fd++)
938 if ((F) && (S) && FD_ISSET (fd, (F))) \
940 sid = vcom_socket_get_sid (fd); \
941 if (sid != INVALID_SESSION_ID) \
943 if (!FD_ISSET (sid, (S))) \
956 _(vcom_rd_sid_fds, vcom_readfds);
957 _(vcom_wr_sid_fds, vcom_writefds);
958 _(vcom_ex_sid_fds, vcom_exceptfds);
963 * compute nfd and new_vcom_nfds from fd sets
965 for (fd = 0; fd < vcom_nfds; fd++)
969 if ((F) && FD_ISSET (fd, (F))) \
986 *new_vcom_nfds = max_fd != -1 ? max_fd + 1 : 0;
995 * vom_socket_select is always called with
996 * timeout->tv_sec and timeout->tv_usec set to zero.
997 * hence vppcom_select return immediately.
1000 * TBD: do{body;} while(timeout conditional); timeout loop
1003 vcom_socket_select (int vcom_nfds, fd_set * __restrict vcom_readfds,
1004 fd_set * __restrict vcom_writefds,
1005 fd_set * __restrict vcom_exceptfds,
1006 struct timeval *__restrict timeout)
1009 pid_t pid = getpid ();
1011 int new_vcom_nfds = 0;
1012 int new_vcom_nfd = 0;
1015 fd_set vcom_rd_sid_fds;
1016 fd_set vcom_wr_sid_fds;
1017 fd_set vcom_ex_sid_fds;
1018 unsigned long vcom_nsid_fds = 0;
1021 /* in seconds eg. 3.123456789 seconds */
1022 double time_to_wait = (double) 0;
1024 /* validate inputs */
1030 /* convert timeval timeout to double time_to_wait */
1033 if (timeout->tv_sec == 0 && timeout->tv_usec == 0)
1035 /* polling: vppcom_select returns immediately */
1036 time_to_wait = (double) 0;
1040 /*TBD: use timeval api */
1041 time_to_wait = (double) timeout->tv_sec +
1042 (double) timeout->tv_usec / (double) 1000000 +
1043 (double) (timeout->tv_usec % 1000000) / (double) 1000000;
1049 * no timeout: vppcom_select can block indefinitely
1050 * waiting for a file descriptor to become ready
1052 /* set to a phantom value */
1056 /* zero the sid_sets */
1068 _(&vcom_rd_sid_fds, vcom_readfds);
1069 _(&vcom_wr_sid_fds, vcom_writefds);
1070 _(&vcom_ex_sid_fds, vcom_exceptfds);
1073 /* populate read, write and except sid_sets */
1074 vcom_nsid = vcom_socket_fds_2_sid_fds (
1076 vcom_readfds || vcom_writefds
1077 || vcom_exceptfds ? (int *)
1078 &vcom_nsid_fds : NULL,
1079 vcom_readfds ? &vcom_rd_sid_fds :
1081 vcom_writefds ? &vcom_wr_sid_fds :
1083 vcom_exceptfds ? &vcom_ex_sid_fds :
1088 vcom_writefds, vcom_exceptfds);
1093 if (vcom_nsid_fds < 0)
1098 rv = vppcom_select (vcom_nsid_fds,
1099 vcom_readfds ? (unsigned long *) &vcom_rd_sid_fds :
1101 vcom_writefds ? (unsigned long *) &vcom_wr_sid_fds :
1103 vcom_exceptfds ? (unsigned long *) &vcom_ex_sid_fds :
1104 NULL, time_to_wait);
1106 fprintf (stderr, "[%d] vppcom_select: "
1107 "'%04d'='%04d'\n", pid, rv, (int) vcom_nsid_fds);
1109 /* check if any file descriptors changed status */
1113 * on exit, sets are modified in place to indicate which
1114 * file descriptors actually changed status
1118 * comply with pre-condition
1119 * do not clear vcom fd sets befor calling
1120 * vcom_socket_sid_fds_2_fds
1122 new_vcom_nfd = vcom_socket_sid_fds_2_fds (
1132 &vcom_rd_sid_fds : NULL,
1134 &vcom_wr_sid_fds : NULL,
1136 &vcom_ex_sid_fds : NULL);
1137 if (new_vcom_nfd < 0)
1139 return new_vcom_nfd;
1141 if (new_vcom_nfds < 0)
1152 vcom_socket_socket (int __domain, int __type, int __protocol)
1155 vcom_socket_main_t *vsm = &vcom_socket_main;
1156 vcom_socket_t *vsock;
1161 u8 is_nonblocking = __type & SOCK_NONBLOCK ? 1 : 0;
1162 int type = __type & ~(SOCK_NONBLOCK | SOCK_CLOEXEC);
1164 fd = vcom_socket_open_socket (__domain, __type, __protocol);
1171 sid = vppcom_session_create (VPPCOM_VRF_DEFAULT,
1172 (type == SOCK_DGRAM) ?
1173 VPPCOM_PROTO_UDP : VPPCOM_PROTO_TCP,
1178 goto out_close_socket;
1181 pool_get (vsm->vsockets, vsock);
1182 vsocket_init (vsock);
1184 sockidx = vsock - vsm->vsockets;
1185 hash_set (vsm->sockidx_by_fd, fd, sockidx);
1187 vsocket_set (vsock, fd, sid, SOCKET_TYPE_VPPCOM_BOUND);
1191 vcom_socket_close_socket (fd);
1197 vcom_socket_socketpair (int __domain, int __type, int __protocol,
1205 vcom_socket_bind (int __fd, __CONST_SOCKADDR_ARG __addr, socklen_t __len)
1208 vcom_socket_main_t *vsm = &vcom_socket_main;
1210 vcom_socket_t *vsock;
1214 p = hash_get (vsm->sockidx_by_fd, __fd);
1218 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1222 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1230 ep.vrf = VPPCOM_VRF_DEFAULT;
1231 switch (__addr->sa_family)
1234 if (__len != sizeof (struct sockaddr_in))
1238 ep.is_ip4 = VPPCOM_IS_IP4;
1239 ep.ip = (u8 *) & ((const struct sockaddr_in *) __addr)->sin_addr;
1240 ep.port = (u16) ((const struct sockaddr_in *) __addr)->sin_port;
1244 if (__len != sizeof (struct sockaddr_in6))
1248 ep.is_ip4 = VPPCOM_IS_IP6;
1249 ep.ip = (u8 *) & ((const struct sockaddr_in6 *) __addr)->sin6_addr;
1250 ep.port = (u16) ((const struct sockaddr_in6 *) __addr)->sin6_port;
1258 rv = vppcom_session_bind (vsock->sid, &ep);
1263 vppcom_session_getsockname (int sid, vppcom_endpt_t * ep)
1266 uint32_t size = sizeof (*ep);
1268 rv = vppcom_session_attr (sid, VPPCOM_ATTR_GET_LCL_ADDR, ep, &size);
1273 vcom_socket_getsockname (int __fd, __SOCKADDR_ARG __addr,
1274 socklen_t * __restrict __len)
1277 vcom_socket_main_t *vsm = &vcom_socket_main;
1279 vcom_socket_t *vsock;
1282 p = hash_get (vsm->sockidx_by_fd, __fd);
1286 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1290 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1293 if (!__addr || !__len)
1302 ep.ip = (u8 *) & ((const struct sockaddr_in *) __addr)->sin_addr;
1303 rv = vppcom_session_getsockname (vsock->sid, &ep);
1306 if (ep.vrf == VPPCOM_VRF_DEFAULT)
1308 __addr->sa_family = ep.is_ip4 == VPPCOM_IS_IP4 ? AF_INET : AF_INET6;
1309 switch (__addr->sa_family)
1312 ((struct sockaddr_in *) __addr)->sin_port = ep.port;
1313 *__len = sizeof (struct sockaddr_in);
1317 ((struct sockaddr_in6 *) __addr)->sin6_port = ep.port;
1318 *__len = sizeof (struct sockaddr_in6);
1331 vcom_socket_connect (int __fd, __CONST_SOCKADDR_ARG __addr, socklen_t __len)
1334 vcom_socket_main_t *vsm = &vcom_socket_main;
1336 vcom_socket_t *vsock;
1340 p = hash_get (vsm->sockidx_by_fd, __fd);
1343 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1345 ep.vrf = VPPCOM_VRF_DEFAULT;
1346 switch (__addr->sa_family)
1349 ep.is_ip4 = VPPCOM_IS_IP4;
1351 (uint8_t *) & ((const struct sockaddr_in *) __addr)->sin_addr;
1353 (uint16_t) ((const struct sockaddr_in *) __addr)->sin_port;
1357 ep.is_ip4 = VPPCOM_IS_IP6;
1359 (uint8_t *) & ((const struct sockaddr_in6 *) __addr)->sin6_addr;
1361 (uint16_t) ((const struct sockaddr_in6 *) __addr)->sin6_port;
1369 rv = vppcom_session_connect (vsock->sid, &ep);
1375 vppcom_session_getpeername (int sid, vppcom_endpt_t * ep)
1378 uint32_t size = sizeof (*ep);
1380 rv = vppcom_session_attr (sid, VPPCOM_ATTR_GET_PEER_ADDR, ep, &size);
1385 vcom_socket_getpeername (int __fd, __SOCKADDR_ARG __addr,
1386 socklen_t * __restrict __len)
1389 vcom_socket_main_t *vsm = &vcom_socket_main;
1391 vcom_socket_t *vsock;
1394 p = hash_get (vsm->sockidx_by_fd, __fd);
1398 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1402 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1405 if (!__addr || !__len)
1414 ep.ip = (u8 *) & ((const struct sockaddr_in *) __addr)->sin_addr;
1415 rv = vppcom_session_getpeername (vsock->sid, &ep);
1418 if (ep.vrf == VPPCOM_VRF_DEFAULT)
1420 __addr->sa_family = ep.is_ip4 == VPPCOM_IS_IP4 ? AF_INET : AF_INET6;
1421 switch (__addr->sa_family)
1424 ((struct sockaddr_in *) __addr)->sin_port = ep.port;
1425 *__len = sizeof (struct sockaddr_in);
1429 ((struct sockaddr_in6 *) __addr)->sin6_port = ep.port;
1430 *__len = sizeof (struct sockaddr_in6);
1443 vcom_socket_send (int __fd, const void *__buf, size_t __n, int __flags)
1445 return vcom_socket_sendto (__fd, __buf, __n, __flags, NULL, 0);
1449 vcom_socket_recv (int __fd, void *__buf, size_t __n, int __flags)
1452 rv = vcom_socket_recvfrom (__fd, __buf, __n, __flags, NULL, 0);
1457 * RETURN 1 if __fd is (SOCK_STREAM, SOCK_SEQPACKET),
1461 vcom_socket_is_connection_mode_socket (int __fd)
1464 /* TBD define new vppcom api */
1465 vcom_socket_main_t *vsm = &vcom_socket_main;
1467 vcom_socket_t *vsock;
1472 p = hash_get (vsm->sockidx_by_fd, __fd);
1476 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1477 if (vsock && vsock->type == SOCKET_TYPE_VPPCOM_BOUND)
1479 optlen = sizeof (type);
1480 rv = libc_getsockopt (__fd, SOL_SOCKET, SO_TYPE, &type, &optlen);
1485 /* get socket type */
1486 switch (type & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1489 case SOCK_SEQPACKET:
1503 vvppcom_session_sendto (int __sid, const void *__buf, size_t __n,
1504 int __flags, __CONST_SOCKADDR_ARG __addr,
1505 socklen_t __addr_len)
1508 /* TBD add new vpp api */
1509 /* TBD add flags parameter */
1510 rv = vppcom_session_write (__sid, (void *) __buf, (int) __n);
1515 vcom_socket_sendto (int __fd, const void *__buf, size_t __n,
1516 int __flags, __CONST_SOCKADDR_ARG __addr,
1517 socklen_t __addr_len)
1520 vcom_socket_main_t *vsm = &vcom_socket_main;
1522 vcom_socket_t *vsock;
1524 p = hash_get (vsm->sockidx_by_fd, __fd);
1528 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1532 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1535 if (!__buf || __n < 0)
1540 if (vcom_socket_is_connection_mode_socket (__fd))
1542 /* ignore __addr and _addr_len */
1543 /* and EISCONN may be returned when they are not NULL and 0 */
1544 if ((__addr != NULL) || (__addr_len != 0))
1551 if (!__addr || __addr_len < 0)
1553 return -EDESTADDRREQ;
1555 /* not a vppcom supported address family */
1556 if ((__addr->sa_family != AF_INET) || (__addr->sa_family != AF_INET6))
1562 rv = vvppcom_session_sendto (vsock->sid, (void *) __buf, (int) __n,
1563 __flags, __addr, __addr_len);
1567 /* TBD: move it to vppcom */
1569 vppcom_session_recvfrom (int __sid, void *__restrict __buf, size_t __n,
1570 int __flags, __SOCKADDR_ARG __addr,
1571 socklen_t * __restrict __addr_len)
1575 /* TBD add flags parameter */
1576 rv = vppcom_session_read (__sid, __buf, __n);
1581 vcom_socket_recvfrom (int __fd, void *__restrict __buf, size_t __n,
1582 int __flags, __SOCKADDR_ARG __addr,
1583 socklen_t * __restrict __addr_len)
1586 vcom_socket_main_t *vsm = &vcom_socket_main;
1588 vcom_socket_t *vsock;
1590 p = hash_get (vsm->sockidx_by_fd, __fd);
1594 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1598 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1601 if (!__buf || __n < 0)
1606 if (__addr || __addr_len < 0)
1611 rv = vppcom_session_recvfrom (vsock->sid, __buf, __n,
1612 __flags, __addr, __addr_len);
1616 /* TBD: move it to vppcom */
1618 vppcom_sendmsg (int __sid, const struct msghdr *__message, int __flags)
1621 /* rv = vppcom_session_write (__sid, (void *) __message->__buf,
1627 vcom_socket_sendmsg (int __fd, const struct msghdr * __message, int __flags)
1630 vcom_socket_main_t *vsm = &vcom_socket_main;
1632 vcom_socket_t *vsock;
1634 p = hash_get (vsm->sockidx_by_fd, __fd);
1638 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1642 if (vcom_socket_is_connection_mode_socket (__fd))
1644 /* ignore __addr and _addr_len */
1645 /* and EISCONN may be returned when they are not NULL and 0 */
1646 if ((__message->msg_name != NULL) || (__message->msg_namelen != 0))
1653 /* TBD: validate __message->msg_name and __message->msg_namelen
1654 * and return -EINVAL on validation error
1659 rv = vppcom_sendmsg (vsock->sid, __message, __flags);
1666 vcom_socket_sendmmsg (int __fd, struct mmsghdr *__vmessages,
1667 unsigned int __vlen, int __flags)
1670 /* TBD: define a new vppcom api */
1675 /* TBD: move it to vppcom */
1677 vppcom_recvmsg (int __sid, struct msghdr *__message, int __flags)
1680 /* rv = vppcom_session_read (__sid, (void *) __message->__buf,
1687 vcom_socket_recvmsg (int __fd, struct msghdr * __message, int __flags)
1690 vcom_socket_main_t *vsm = &vcom_socket_main;
1692 vcom_socket_t *vsock;
1694 p = hash_get (vsm->sockidx_by_fd, __fd);
1698 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1702 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1710 /* validate __flags */
1712 rv = vppcom_recvmsg (vsock->sid, __message, __flags);
1718 vcom_socket_recvmmsg (int __fd, struct mmsghdr *__vmessages,
1719 unsigned int __vlen, int __flags,
1720 struct timespec *__tmo)
1722 /* TBD: define a new vppcom api */
1727 /* TBD: move it to vppcom */
1729 vppcom_getsockopt (int __sid, int __level, int __optname,
1730 void *__restrict __optval, socklen_t * __restrict __optlen)
1732 /* 1. for socket level options that are NOT socket attributes
1733 * and that has corresponding vpp options get from vppcom */
1738 vcom_socket_getsockopt (int __fd, int __level, int __optname,
1739 void *__restrict __optval,
1740 socklen_t * __restrict __optlen)
1743 vcom_socket_main_t *vsm = &vcom_socket_main;
1745 vcom_socket_t *vsock;
1747 p = hash_get (vsm->sockidx_by_fd, __fd);
1751 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1755 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1758 if (!__optval && !__optlen)
1768 /* handle options at socket level */
1773 * 1. for socket level options that are socket attributes,
1774 * get from libc_getsockopt.
1775 * 2. for socket level options that are NOT socket
1776 * attributes and that has corresponding vpp options
1778 * 3. for socket level options unimplemented
1779 * return -ENOPROTOOPT */
1798 case SO_TIMESTAMPNS:
1799 case SO_TIMESTAMPING:
1812 case SO_WIFI_STATUS:
1815 case SO_BINDTODEVICE:
1817 case SO_LOCK_FILTER:
1818 case SO_BPF_EXTENSIONS:
1819 case SO_SELECT_ERR_QUEUE:
1820 #ifdef CONFIG_NET_RX_BUSY_POLL
1823 case SO_MAX_PACING_RATE:
1824 case SO_INCOMING_CPU:
1825 rv = libc_getsockopt (__fd, __level, __optname, __optval, __optlen);
1834 /* We implement the SO_SNDLOWAT etc to not be settable
1837 return -ENOPROTOOPT;
1843 /* 1. handle options that are NOT socket level options,
1844 * but have corresponding vpp otions. */
1845 rv = vppcom_getsockopt (vsock->sid, __level, __optname,
1846 __optval, __optlen);
1850 /* 2. unhandled options */
1851 return -ENOPROTOOPT;
1858 /* TBD: move it to vppcom */
1860 vppcom_session_setsockopt (int __sid, int __level, int __optname,
1861 const void *__optval, socklen_t __optlen)
1863 int rv = -EOPNOTSUPP;
1872 vppcom_session_attr (__sid, VPPCOM_ATTR_SET_TCP_KEEPIDLE, 0, 0);
1876 vppcom_session_attr (__sid, VPPCOM_ATTR_SET_TCP_KEEPINTVL, 0, 0);
1886 rv = vppcom_session_attr (__sid, VPPCOM_ATTR_SET_V6ONLY, 0, 0);
1896 rv = vppcom_session_attr (__sid, VPPCOM_ATTR_SET_KEEPALIVE, 0, 0);
1899 rv = vppcom_session_attr (__sid, VPPCOM_ATTR_SET_REUSEADDR, 0, 0);
1902 rv = vppcom_session_attr (__sid, VPPCOM_ATTR_SET_BROADCAST, 0, 0);
1916 vcom_socket_setsockopt (int __fd, int __level, int __optname,
1917 const void *__optval, socklen_t __optlen)
1920 vcom_socket_main_t *vsm = &vcom_socket_main;
1922 vcom_socket_t *vsock;
1924 p = hash_get (vsm->sockidx_by_fd, __fd);
1928 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
1932 if (vsock->type != SOCKET_TYPE_VPPCOM_BOUND)
1936 * Options without arguments
1939 if (__optname == SO_BINDTODEVICE)
1941 rv = libc_setsockopt (__fd, __level, __optname, __optval, __optlen);
1952 if ((__optlen < 0) || (__optlen < sizeof (int)))
1961 rv = vppcom_session_setsockopt (vsock->sid, __level, __optname,
1962 __optval, __optlen);
1975 rv = vppcom_session_setsockopt (vsock->sid, __level, __optname,
1976 __optval, __optlen);
1982 /* handle options at socket level */
1989 rv = vppcom_session_setsockopt (vsock->sid, __level, __optname,
1990 __optval, __optlen);
1994 * 1. for socket level options that are socket attributes,
1995 * set it from libc_getsockopt
1996 * 2. for socket level options that are NOT socket
1997 * attributes and that has corresponding vpp options
1998 * set it from vppcom
1999 * 3. for socket level options unimplemented
2000 * return -ENOPROTOOPT */
2016 case SO_TIMESTAMPNS:
2017 case SO_TIMESTAMPING:
2030 case SO_WIFI_STATUS:
2034 * SO_BINDTODEVICE already handled as
2035 * "Options without arguments" */
2036 /* case SO_BINDTODEVICE: */
2038 case SO_LOCK_FILTER:
2039 case SO_BPF_EXTENSIONS:
2040 case SO_SELECT_ERR_QUEUE:
2041 #ifdef CONFIG_NET_RX_BUSY_POLL
2044 case SO_MAX_PACING_RATE:
2045 case SO_INCOMING_CPU:
2046 rv = libc_setsockopt (__fd, __level, __optname, __optval, __optlen);
2055 /* We implement the SO_SNDLOWAT etc to not be settable
2058 return -ENOPROTOOPT;
2064 return -ENOPROTOOPT;
2071 vcom_socket_listen (int __fd, int __n)
2074 vcom_socket_main_t *vsm = &vcom_socket_main;
2076 vcom_socket_t *vsock;
2078 p = hash_get (vsm->sockidx_by_fd, __fd);
2081 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
2083 /* TBD vppcom to accept __n parameter */
2084 rv = vppcom_session_listen (vsock->sid, __n);
2091 vcom_socket_connected_socket (int __fd, int __sid,
2093 int *__type, int *__protocol, int flags)
2096 vcom_socket_main_t *vsm = &vcom_socket_main;
2097 vcom_socket_t *vsock;
2104 optlen = sizeof (*__domain);
2105 rv = libc_getsockopt (__fd, SOL_SOCKET, SO_DOMAIN, __domain, &optlen);
2112 optlen = sizeof (*__type);
2113 rv = libc_getsockopt (__fd, SOL_SOCKET, SO_TYPE, __type, &optlen);
2120 optlen = sizeof (*__protocol);
2121 rv = libc_getsockopt (__fd, SOL_SOCKET, SO_PROTOCOL, __protocol, &optlen);
2128 fd = vcom_socket_open_socket (*__domain, *__type | flags, *__protocol);
2135 pool_get (vsm->vsockets, vsock);
2136 vsocket_init (vsock);
2138 sockidx = vsock - vsm->vsockets;
2139 hash_set (vsm->sockidx_by_fd, fd, sockidx);
2141 vsocket_set (vsock, fd, __sid, SOCKET_TYPE_VPPCOM_BOUND);
2148 /* If flag is 0, then accept4() is the same as accept().
2149 * SOCK_NONBLOCK and SOCK_CLOEXEC can be bitwise ORed in flags
2152 vcom_socket_accept_flags (int __fd, __SOCKADDR_ARG __addr,
2153 socklen_t * __restrict __addr_len, int flags)
2156 vcom_socket_main_t *vsm = &vcom_socket_main;
2158 vcom_socket_t *vsock;
2166 uint8_t addr8[sizeof (struct in6_addr)];
2171 /* validate flags */
2178 * case SOCK_NONBLOCK:
2179 * case SOCK_CLOEXEC:
2180 * case SOCK_NONBLOCK | SOCK_CLOEXEC:
2187 /* flags can be 0 or can be bitwise OR
2188 * of any of SOCK_NONBLOCK and SOCK_CLOEXEC */
2190 if (!(!flags || (flags & (SOCK_NONBLOCK | SOCK_CLOEXEC))))
2192 /* TBD: return proper error code */
2196 /* TBD: return proper error code */
2198 if (!vcom_socket_is_connection_mode_socket (__fd))
2203 p = hash_get (vsm->sockidx_by_fd, __fd);
2206 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
2209 rv = vcom_fcntl (vsock->fd, F_GETFL, 0);
2216 if (!(rv & O_NONBLOCK))
2218 /* socket is not marked as nonblocking
2219 * and no pending connections are present
2220 * on the queue, accept () blocks the caller
2221 * until a connection is present.
2223 rv = vppcom_session_accept (vsock->sid, &ep,
2224 -1.0 /* wait forever */ );
2228 /* The file descriptor refers to a socket and has been
2229 * marked nonblocking(O_NONBLOCK) and the accept would
2232 /* is non blocking */
2233 rv = vppcom_session_accept (vsock->sid, &ep, 0);
2234 /* If the socket is marked nonblocking and
2235 * no pending connections are present on the
2236 * queue, accept fails with the error
2237 * EAGAIN or EWOULDBLOCK
2239 if (rv == VPPCOM_ETIMEDOUT)
2251 /* create a new connected socket resource and set flags
2252 * on the new file descriptor.
2253 * update vsockets and sockidx_by_fd table
2255 fd = vcom_socket_connected_socket (__fd, sid,
2256 &domain, &type, &protocol, flags);
2264 /* TBD populate __addr and __addr_len */
2265 /* TBD: The returned address is truncated if the buffer
2266 * provided is too small, in this case, __addr_len will
2267 * return a value greater than was supplied to the call.*/
2272 /* TBD populate __addr and __addr_len */
2276 ((struct sockaddr_in *) __addr)->sin_family = AF_INET;
2277 ((struct sockaddr_in *) __addr)->sin_port = ep.port;
2278 memcpy (&((struct sockaddr_in *) __addr)->sin_addr,
2279 addr8, sizeof (struct in_addr));
2280 /* TBD: populate __addr_len */
2283 *__addr_len = sizeof (struct sockaddr_in);
2288 ((struct sockaddr_in6 *) __addr)->sin6_family = AF_INET6;
2289 ((struct sockaddr_in6 *) __addr)->sin6_port = ep.port;
2290 memcpy (((struct sockaddr_in6 *) __addr)->sin6_addr.
2291 __in6_u.__u6_addr8, addr8,
2292 sizeof (struct in6_addr));
2293 /* TBD: populate __addr_len */
2296 *__addr_len = sizeof (struct sockaddr_in6);
2301 return -EAFNOSUPPORT;
2309 ((struct sockaddr_in *) __addr)->sin_family = AF_INET;
2310 ((struct sockaddr_in *) __addr)->sin_port = ep.port;
2311 memcpy (&((struct sockaddr_in *) __addr)->sin_addr,
2312 addr8, sizeof (struct in_addr));
2313 /* TBD: populate __addr_len */
2316 *__addr_len = sizeof (struct sockaddr_in);
2321 ((struct sockaddr_in6 *) __addr)->sin6_family = AF_INET6;
2322 ((struct sockaddr_in6 *) __addr)->sin6_port = ep.port;
2323 memcpy (((struct sockaddr_in6 *) __addr)->sin6_addr.
2324 __in6_u.__u6_addr8, addr8,
2325 sizeof (struct in6_addr));
2326 /* TBD: populate __addr_len */
2329 *__addr_len = sizeof (struct sockaddr_in6);
2334 return -EAFNOSUPPORT;
2340 /* when __addr is NULL, nothing is filled in,
2341 * in this case, __addr_len is not used,
2342 * and should also be null
2346 /* TBD: return proper error code */
2356 vcom_socket_accept (int __fd, __SOCKADDR_ARG __addr,
2357 socklen_t * __restrict __addr_len)
2359 /* set flags to 0 for accept() */
2360 return vcom_socket_accept_flags (__fd, __addr, __addr_len, 0);
2365 vcom_socket_accept4 (int __fd, __SOCKADDR_ARG __addr,
2366 socklen_t * __restrict __addr_len, int __flags)
2368 /* SOCK_NONBLOCK and SOCK_CLOEXEC can be bitwise ORed in flags */
2369 return vcom_socket_accept_flags (__fd, __addr, __addr_len, __flags);
2373 /* TBD: move it to vppcom */
2375 vppcom_session_shutdown (int __fd, int __how)
2381 vcom_socket_shutdown (int __fd, int __how)
2384 vcom_socket_main_t *vsm = &vcom_socket_main;
2386 vcom_socket_t *vsock;
2388 p = hash_get (vsm->sockidx_by_fd, __fd);
2391 vsock = pool_elt_at_index (vsm->vsockets, p[0]);
2397 rv = vppcom_session_shutdown (vsock->sid, __how);
2411 vcom_socket_epoll_create1 (int __flags)
2414 vcom_socket_main_t *vsm = &vcom_socket_main;
2415 vcom_epoll_t *vepoll;
2421 epfd = vcom_socket_open_epoll (__flags);
2428 vep_idx = vppcom_epoll_create ();
2432 goto out_close_epoll;
2435 pool_get (vsm->vepolls, vepoll);
2436 vepoll_init (vepoll);
2438 epollidx = vepoll - vsm->vepolls;
2439 hash_set (vsm->epollidx_by_epfd, epfd, epollidx);
2441 vepoll_set (vepoll, epfd, vep_idx, EPOLL_TYPE_VPPCOM_BOUND, __flags, 0, 0);
2446 vcom_socket_close_epoll (epfd);
2452 * PRE: vppcom_epoll_ctl() is successful
2453 * free_vepitem_on_del : 0 - no_pool_put, 1 - pool_put
2456 vcom_socket_ctl_vepitem (int __epfd, int __op, int __fd,
2457 struct epoll_event *__event,
2458 i32 vep_idx, vcom_epoll_t * vepoll,
2459 i32 vfd_id, void *vfd, vcom_fd_type_t type,
2460 int free_vepitem_on_del)
2463 vcom_socket_main_t *vsm = &vcom_socket_main;
2464 vcom_epitem_t *vepitem;
2466 vcom_epitem_key_t epfdfd = {.epfd = __epfd,.fd = __fd };
2470 i32 *vepitemidxs = 0;
2472 struct epoll_event revent = {.events = 0,.data.fd = INVALID_FD };
2476 /* perform control operations on the epoll instance */
2481 * supplied file descriptor is already
2482 * registered with this epoll instance
2484 /* vepitem exists */
2485 p = hash_get (vsm->epitemidx_by_epfdfd, epfdfd.key);
2492 /* add a new vepitem */
2493 pool_get (vsm->vepitems, vepitem);
2494 vepitem_init (vepitem);
2496 vepitemidx = vepitem - vsm->vepitems;
2497 hash_set (vsm->epitemidx_by_epfdfd, epfdfd.key, vepitemidx);
2498 vepitem_set (vepitem, __epfd, __fd, __fd, __fd, type, *__event, revent);
2500 /* update epitemidxs */
2502 p = hash_get (vsm->epitemidxs_by_epfd, __epfd);
2503 if (!p) /* not exist */
2506 vec_add1 (vepitemidxs, vepitemidx);
2507 hash_set (vsm->epitemidxs_by_epfd, __epfd, vepitemidxs);
2511 vepitemidxs = *(i32 **) p;
2512 vec_add1 (vepitemidxs, vepitemidx);
2513 hash_set3 (vsm->epitemidxs_by_epfd, __epfd, vepitemidxs, 0);
2515 /* update epitemidxs */
2517 p = hash_get (vsm->epitemidxs_by_fd, __fd);
2518 if (!p) /* not exist */
2521 vec_add1 (vepitemidxs, vepitemidx);
2522 hash_set (vsm->epitemidxs_by_fd, __fd, vepitemidxs);
2526 vepitemidxs = *(i32 **) p;
2527 vec_add1 (vepitemidxs, vepitemidx);
2528 hash_set3 (vsm->epitemidxs_by_fd, __fd, vepitemidxs, 0);
2531 /* increment vepoll fd count by 1 */
2540 * supplied file descriptor is not
2541 * registered with this epoll instance
2543 /* vepitem not exist */
2544 p = hash_get (vsm->epitemidx_by_epfdfd, epfdfd.key);
2550 vepitem = pool_elt_at_index (vsm->vepitems, p[0]);
2553 vepitem->event = *__event;
2554 vepitem->revent = revent;
2563 * supplied file descriptor is not
2564 * registered with this epoll instance
2566 /* vepitem not exist */
2567 p = hash_get (vsm->epitemidx_by_epfdfd, epfdfd.key);
2573 vepitemidx = *(i32 *) p;
2574 hash_unset (vsm->epitemidx_by_epfdfd, epfdfd.key);
2576 /* update epitemidxs */
2578 p = hash_get (vsm->epitemidxs_by_epfd, __epfd);
2579 if (!p) /* not exist */
2586 vepitemidxs = *(i32 **) p;
2587 vec_idx = vec_search (vepitemidxs, vepitemidx);
2590 vec_del1 (vepitemidxs, vec_idx);
2591 if (!vec_len (vepitemidxs))
2593 vec_free (vepitemidxs);
2594 hash_unset (vsm->epitemidxs_by_epfd, __epfd);
2599 /* update epitemidxs */
2601 p = hash_get (vsm->epitemidxs_by_fd, __fd);
2602 if (!p) /* not exist */
2609 vepitemidxs = *(i32 **) p;
2610 vec_idx = vec_search (vepitemidxs, vepitemidx);
2613 vec_del1 (vepitemidxs, vec_idx);
2614 if (!vec_len (vepitemidxs))
2616 vec_free (vepitemidxs);
2617 hash_unset (vsm->epitemidxs_by_fd, __fd);
2622 /* pool put vepitem */
2623 vepitem = pool_elt_at_index (vsm->vepitems, vepitemidx);
2624 if (free_vepitem_on_del)
2631 vepitem_init (vepitem);
2632 pool_put (vsm->vepitems, vepitem);
2638 vepitem_init (vepitem);
2642 /* decrement vepoll fd count by 1 */
2660 * PRE: 00. null pointer check on __event
2661 * 01. all other parameters are validated
2665 vcom_socket_epoll_ctl_internal (int __epfd, int __op, int __fd,
2666 struct epoll_event *__event,
2667 int free_vepitem_on_del)
2671 /* vcom_socket_main_t *vsm = &vcom_socket_main; */
2672 vcom_epoll_t *vepoll;
2674 /*__fd could could be vcom socket or vcom epoll or kernel fd */
2676 vcom_epoll_t *vfd_vepoll;
2677 vcom_socket_t *vfd_vsock;
2682 vcom_fd_type_t type = FD_TYPE_INVALID;
2684 /* validate __event */
2686 /* get vep_idx and vepoll */
2687 vep_idx = vcom_socket_get_vep_idx_and_vepoll (__epfd, &vepoll);
2688 if (vep_idx == INVALID_VEP_IDX)
2693 /* get vcom fd type, vfd_id and vfd */
2694 vfd_id = vcom_socket_get_sid_and_vsock (__fd, &vfd_vsock);
2695 if (vfd_id != INVALID_SESSION_ID)
2697 type = FD_TYPE_VCOM_SOCKET;
2700 else if ((vfd_id = vcom_socket_get_vep_idx_and_vepoll (__fd, &vfd_vepoll))
2703 type = FD_TYPE_EPOLL;
2708 /* FD_TYPE_KERNEL not supported by epoll instance */
2709 type = FD_TYPE_INVALID;
2714 /* vepoll and vsock are now valid */
2715 rv = vppcom_epoll_ctl (vep_idx, __op, vfd_id, __event);
2721 rv = vcom_socket_ctl_vepitem (__epfd, __op, __fd,
2724 vfd_id, vfd, type, free_vepitem_on_del);
2729 vcom_socket_epoll_ctl (int __epfd, int __op, int __fd,
2730 struct epoll_event *__event)
2734 rv = vcom_socket_epoll_ctl_internal (__epfd, __op, __fd, __event, 1);
2739 vcom_socket_epoll_ctl1 (int __epfd, int __op, int __fd,
2740 struct epoll_event *__event)
2744 rv = vcom_socket_epoll_ctl_internal (__epfd, __op, __fd, __event, 0);
2749 vcom_socket_epoll_pwait (int __epfd, struct epoll_event *__events,
2750 int __maxevents, int __timeout,
2751 const __sigset_t * __ss)
2755 /* in seconds eg. 3.123456789 seconds */
2756 double time_to_wait = (double) 0;
2760 /* validate __event */
2767 /* validate __timeout */
2770 time_to_wait = (double) __timeout / (double) 1000;
2772 else if (__timeout == 0)
2774 time_to_wait = (double) 0;
2776 else if (__timeout == -1)
2787 vep_idx = vcom_socket_get_vep_idx (__epfd);
2788 if (vep_idx != INVALID_VEP_IDX)
2790 rv = vppcom_epoll_wait (vep_idx, __events, __maxevents, time_to_wait);
2797 vcom_socket_main_init (void)
2799 vcom_socket_main_t *vsm = &vcom_socket_main;
2802 printf ("vcom_socket_main_init\n");
2806 /* TBD: define FD_MAXSIZE and use it here */
2807 pool_alloc (vsm->vsockets, FD_SETSIZE);
2808 vsm->sockidx_by_fd = hash_create (0, sizeof (i32));
2810 pool_alloc (vsm->vepolls, FD_SETSIZE);
2811 vsm->epollidx_by_epfd = hash_create (0, sizeof (i32));
2813 pool_alloc (vsm->vepitems, FD_SETSIZE);
2814 vsm->epitemidx_by_epfdfd = hash_create (0, sizeof (i32));
2816 vsm->epitemidxs_by_epfd = hash_create (0, sizeof (i32 *));
2817 vsm->epitemidxs_by_fd = hash_create (0, sizeof (i32 *));
2827 vcom_socket_main_show (void)
2829 vcom_socket_main_t *vsm = &vcom_socket_main;
2830 vcom_socket_t *vsock;
2832 vcom_epoll_t *vepoll;
2834 vcom_epitem_t *vepitem;
2838 i32 *vepitemidxs, *vepitemidxs_var;
2842 /* from active list of vsockets show vsock */
2845 pool_foreach (vsock, vsm->vsockets,
2848 "fd='%04d', sid='%08x',type='%-30s'\n",
2849 vsock->fd, vsock->sid,
2850 vcom_socket_type_str (vsock->type));
2854 /* from active list of vepolls, show vepoll */
2857 pool_foreach (vepoll, vsm->vepolls,
2860 "epfd='%04d', vep_idx='%08x', "
2862 "flags='%d', count='%d', close='%d'\n",
2863 vepoll->epfd, vepoll->vep_idx,
2864 vcom_socket_epoll_type_str (vepoll->type),
2865 vepoll->flags, vepoll->count, vepoll->close);
2869 /* from active list of vepitems, show vepitem */
2872 pool_foreach (vepitem, vsm->vepitems,
2875 "epfd='%04d', fd='%04d', "
2876 "next_fd='%04d', prev_fd='%04d', "
2878 "events='%04x', revents='%04x'\n",
2879 vepitem->epfd, vepitem->fd,
2880 vepitem->next_fd, vepitem->prev_fd,
2881 vcom_socket_vcom_fd_type_str (vepitem->type),
2882 vepitem->event.events, vepitem->revent.events);
2887 /* show epitemidxs for epfd */
2889 hash_foreach (epfd, vepitemidxs,
2890 vsm->epitemidxs_by_epfd,
2892 printf("\n[ '%04d': ", epfd);
2893 vec_foreach (vepitemidxs_var,vepitemidxs)
2895 printf("'%04d' ", (int)vepitemidxs_var[0]);
2901 /* show epitemidxs for fd */
2903 hash_foreach (fd, vepitemidxs,
2904 vsm->epitemidxs_by_fd,
2906 printf("\n{ '%04d': ", fd);
2907 vec_foreach (vepitemidxs_var,vepitemidxs)
2909 printf("'%04d' ", (int)vepitemidxs_var[0]);
2919 vcom_socket_main_destroy (void)
2921 vcom_socket_main_t *vsm = &vcom_socket_main;
2922 vcom_socket_t *vsock;
2924 vcom_epoll_t *vepoll;
2926 vcom_epitem_t *vepitem;
2934 printf ("vcom_socket_main_destroy\n");
2940 * from active list of vepitems,
2941 * remove all "vepitem" elements from the pool in a safe way
2945 pool_flush (vepitem, vsm->vepitems,
2947 if (vepitem->type == FD_TYPE_EPOLL || FD_TYPE_VCOM_SOCKET)
2949 vcom_socket_epoll_ctl1 (vepitem->epfd, EPOLL_CTL_DEL,
2951 vepitem_init (vepitem);
2956 pool_free (vsm->vepitems);
2957 hash_free (vsm->epitemidx_by_epfdfd);
2959 /* free vepitemidxs for each epfd */
2961 hash_foreach (epfd, vepitemidxs,
2962 vsm->epitemidxs_by_epfd,
2964 vec_free (vepitemidxs);
2967 hash_free (vsm->epitemidxs_by_epfd);
2969 /* free vepitemidxs for each fd */
2971 hash_foreach (fd, vepitemidxs,
2972 vsm->epitemidxs_by_fd,
2974 vec_free (vepitemidxs);
2977 hash_free (vsm->epitemidxs_by_fd);
2981 * from active list of vsockets,
2982 * close socket and vppcom session
2986 pool_foreach (vsock, vsm->vsockets,
2988 if (vsock->type == SOCKET_TYPE_VPPCOM_BOUND)
2990 vppcom_session_close (vsock->sid);
2991 vcom_socket_close_socket (vsock->fd);
2992 vsocket_init (vsock);
2998 * return vsocket element to the pool
3002 pool_flush (vsock, vsm->vsockets,
3004 // vsocket_init(vsock);
3009 pool_free (vsm->vsockets);
3010 hash_free (vsm->sockidx_by_fd);
3013 * from active list of vepolls,
3014 * close epoll and vppcom_epoll
3018 pool_foreach (vepoll, vsm->vepolls,
3020 if (vepoll->type == EPOLL_TYPE_VPPCOM_BOUND)
3022 vppcom_session_close (vepoll->vep_idx);
3023 vcom_socket_close_epoll (vepoll->epfd); /* TBD: */
3024 vepoll_init (vepoll);
3030 * return vepoll element to the pool
3034 pool_flush (vepoll, vsm->vepolls,
3036 // vepoll_init(vepoll);
3041 pool_free (vsm->vepolls);
3042 hash_free (vsm->epollidx_by_epfd);
3050 * fd.io coding-style-patch-verification: ON
3053 * eval: (c-set-style "gnu")