2 * Copyright (c) 2016 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
22 #include <sys/resource.h>
23 #include <netinet/tcp.h>
25 #include <vcl/ldp_socket_wrapper.h>
29 #include <vcl/vcl_locked.h>
30 #include <vppinfra/time.h>
31 #include <vppinfra/bitmap.h>
32 #include <vppinfra/lock.h>
33 #include <vppinfra/pool.h>
34 #include <vppinfra/hash.h>
36 #define HAVE_CONSTRUCTOR_ATTRIBUTE
37 #ifdef HAVE_CONSTRUCTOR_ATTRIBUTE
38 #define CONSTRUCTOR_ATTRIBUTE \
39 __attribute__ ((constructor))
41 #define CONSTRUCTOR_ATTRIBUTE
42 #endif /* HAVE_CONSTRUCTOR_ATTRIBUTE */
44 #define HAVE_DESTRUCTOR_ATTRIBUTE
45 #ifdef HAVE_DESTRUCTOR_ATTRIBUTE
46 #define DESTRUCTOR_ATTRIBUTE \
47 __attribute__ ((destructor))
49 #define DESTRUCTOR_ATTRIBUTE
52 #define LDP_MAX_NWORKERS 32
54 typedef struct ldp_worker_ctx_
57 clib_time_t clib_time;
62 clib_bitmap_t *rd_bitmap;
63 clib_bitmap_t *wr_bitmap;
64 clib_bitmap_t *ex_bitmap;
65 clib_bitmap_t *si_rd_bitmap;
66 clib_bitmap_t *si_wr_bitmap;
67 clib_bitmap_t *si_ex_bitmap;
68 clib_bitmap_t *libc_rd_bitmap;
69 clib_bitmap_t *libc_wr_bitmap;
70 clib_bitmap_t *libc_ex_bitmap;
76 struct pollfd *libc_poll;
87 /* clib_bitmap_t, fd_mask and vcl_si_set are used interchangeably. Make sure
88 * they are the same size */
89 STATIC_ASSERT (sizeof (clib_bitmap_t) == sizeof (fd_mask),
90 "ldp bitmap size mismatch");
91 STATIC_ASSERT (sizeof (vcl_si_set) == sizeof (fd_mask),
92 "ldp bitmap size mismatch");
96 ldp_worker_ctx_t *workers;
98 char app_name[LDP_APP_NAME_MAX];
103 /** vcl needs next epoll_create to go to libc_epoll */
104 u8 vcl_needs_real_epoll;
107 #define LDP_DEBUG ldp->debug
109 #define LDBG(_lvl, _fmt, _args...) \
110 if (ldp->debug > _lvl) \
111 clib_warning ("ldp<%d>: " _fmt, getpid(), ##_args)
113 static ldp_main_t ldp_main = {
114 .vlsh_bit_val = (1 << LDP_SID_BIT_MIN),
115 .vlsh_bit_mask = (1 << LDP_SID_BIT_MIN) - 1,
116 .debug = LDP_DEBUG_INIT,
119 static ldp_main_t *ldp = &ldp_main;
121 static inline ldp_worker_ctx_t *
122 ldp_worker_get_current (void)
124 return (ldp->workers + vppcom_worker_index ());
128 * RETURN: 0 on success or -1 on error.
131 ldp_set_app_name (char *app_name)
133 int rv = snprintf (ldp->app_name, LDP_APP_NAME_MAX,
134 "ldp-%d-%s", getpid (), app_name);
136 if (rv >= LDP_APP_NAME_MAX)
137 app_name[LDP_APP_NAME_MAX - 1] = 0;
143 if (ldp->app_name[0] == '\0')
144 ldp_set_app_name ("app");
146 return ldp->app_name;
150 ldp_vlsh_to_fd (vls_handle_t vlsh)
152 return (vlsh + ldp->vlsh_bit_val);
155 static inline vls_handle_t
156 ldp_fd_to_vlsh (int fd)
158 if (fd < ldp->vlsh_bit_val)
159 return VLS_INVALID_HANDLE;
161 return (fd - ldp->vlsh_bit_val);
167 ldp_worker_ctx_t *ldpw;
170 if (PREDICT_TRUE (ldp->init))
174 ldp->vcl_needs_real_epoll = 1;
175 rv = vls_app_create (ldp_get_app_name ());
178 ldp->vcl_needs_real_epoll = 0;
179 if (rv == VPPCOM_EEXIST)
181 LDBG (2, "\nERROR: ldp_init: vppcom_app_create()"
182 " failed! rv = %d (%s)\n", rv, vppcom_retval_str (rv));
186 ldp->vcl_needs_real_epoll = 0;
187 pool_alloc (ldp->workers, LDP_MAX_NWORKERS);
188 ldpw = ldp_worker_get_current ();
190 char *env_var_str = getenv (LDP_ENV_DEBUG);
194 if (sscanf (env_var_str, "%u", &tmp) != 1)
195 clib_warning ("LDP<%d>: WARNING: Invalid LDP debug level specified in"
196 " the env var " LDP_ENV_DEBUG " (%s)!", getpid (),
201 LDBG (0, "configured LDP debug level (%u) from env var "
202 LDP_ENV_DEBUG "!", ldp->debug);
206 env_var_str = getenv (LDP_ENV_APP_NAME);
209 ldp_set_app_name (env_var_str);
210 LDBG (0, "configured LDP app name (%s) from the env var "
211 LDP_ENV_APP_NAME "!", ldp->app_name);
214 env_var_str = getenv (LDP_ENV_SID_BIT);
218 if (sscanf (env_var_str, "%u", &sb) != 1)
220 LDBG (0, "WARNING: Invalid LDP sid bit specified in the env var "
221 LDP_ENV_SID_BIT " (%s)! sid bit value %d (0x%x)", env_var_str,
222 ldp->vlsh_bit_val, ldp->vlsh_bit_val);
224 else if (sb < LDP_SID_BIT_MIN)
226 ldp->vlsh_bit_val = (1 << LDP_SID_BIT_MIN);
227 ldp->vlsh_bit_mask = ldp->vlsh_bit_val - 1;
229 LDBG (0, "WARNING: LDP sid bit (%u) specified in the env var "
230 LDP_ENV_SID_BIT " (%s) is too small. Using LDP_SID_BIT_MIN"
231 " (%d)! sid bit value %d (0x%x)", sb, env_var_str,
232 LDP_SID_BIT_MIN, ldp->vlsh_bit_val, ldp->vlsh_bit_val);
234 else if (sb > LDP_SID_BIT_MAX)
236 ldp->vlsh_bit_val = (1 << LDP_SID_BIT_MAX);
237 ldp->vlsh_bit_mask = ldp->vlsh_bit_val - 1;
239 LDBG (0, "WARNING: LDP sid bit (%u) specified in the env var "
240 LDP_ENV_SID_BIT " (%s) is too big. Using LDP_SID_BIT_MAX"
241 " (%d)! sid bit value %d (0x%x)", sb, env_var_str,
242 LDP_SID_BIT_MAX, ldp->vlsh_bit_val, ldp->vlsh_bit_val);
246 ldp->vlsh_bit_val = (1 << sb);
247 ldp->vlsh_bit_mask = ldp->vlsh_bit_val - 1;
249 LDBG (0, "configured LDP sid bit (%u) from "
250 LDP_ENV_SID_BIT "! sid bit value %d (0x%x)", sb,
251 ldp->vlsh_bit_val, ldp->vlsh_bit_val);
254 /* Make sure there are enough bits in the fd set for vcl sessions */
255 if (ldp->vlsh_bit_val > FD_SETSIZE / 2)
257 LDBG (0, "ERROR: LDP vlsh bit value %d > FD_SETSIZE/2 %d!",
258 ldp->vlsh_bit_val, FD_SETSIZE / 2);
265 pool_foreach (ldpw, ldp->workers, ({
266 clib_memset (&ldpw->clib_time, 0, sizeof (ldpw->clib_time));
270 LDBG (0, "LDP initialization: done!");
281 if ((errno = -ldp_init ()))
284 vlsh = ldp_fd_to_vlsh (fd);
285 if (vlsh != VLS_INVALID_HANDLE)
287 epfd = vls_attr (vlsh, VPPCOM_ATTR_GET_LIBC_EPFD, 0, 0);
290 LDBG (0, "fd %d: calling libc_close: epfd %u", fd, epfd);
292 rv = libc_close (epfd);
295 u32 size = sizeof (epfd);
298 (void) vls_attr (vlsh, VPPCOM_ATTR_SET_LIBC_EPFD, &epfd, &size);
301 else if (PREDICT_FALSE (epfd < 0))
308 LDBG (0, "fd %d: calling vls_close: vlsh %u", fd, vlsh);
310 rv = vls_close (vlsh);
319 LDBG (0, "fd %d: calling libc_close", fd);
320 rv = libc_close (fd);
328 read (int fd, void *buf, size_t nbytes)
333 if ((errno = -ldp_init ()))
336 vlsh = ldp_fd_to_vlsh (fd);
337 if (vlsh != VLS_INVALID_HANDLE)
339 size = vls_read (vlsh, buf, nbytes);
348 size = libc_read (fd, buf, nbytes);
355 readv (int fd, const struct iovec * iov, int iovcnt)
357 int rv = 0, i, total = 0;
361 if ((errno = -ldp_init ()))
364 vlsh = ldp_fd_to_vlsh (fd);
365 if (vlsh != VLS_INVALID_HANDLE)
369 for (i = 0; i < iovcnt; ++i)
371 rv = vls_read (vlsh, iov[i].iov_base, iov[i].iov_len);
377 if (rv < iov[i].iov_len)
382 while ((rv >= 0) && (total == 0));
394 size = libc_readv (fd, iov, iovcnt);
401 write (int fd, const void *buf, size_t nbytes)
406 if ((errno = -ldp_init ()))
409 vlsh = ldp_fd_to_vlsh (fd);
410 if (vlsh != VLS_INVALID_HANDLE)
412 size = vls_write_msg (vlsh, (void *) buf, nbytes);
421 size = libc_write (fd, buf, nbytes);
428 writev (int fd, const struct iovec * iov, int iovcnt)
430 ssize_t size = 0, total = 0;
434 if ((errno = -ldp_init ()))
437 vlsh = ldp_fd_to_vlsh (fd);
438 if (vlsh != VLS_INVALID_HANDLE)
442 for (i = 0; i < iovcnt; ++i)
444 rv = vls_write_msg (vlsh, iov[i].iov_base, iov[i].iov_len);
450 if (rv < iov[i].iov_len)
455 while ((rv >= 0) && (total == 0));
467 size = libc_writev (fd, iov, iovcnt);
474 fcntl (int fd, int cmd, ...)
480 if ((errno = -ldp_init ()))
485 vlsh = ldp_fd_to_vlsh (fd);
486 LDBG (0, "fd %u vlsh %d, cmd %u", fd, vlsh, cmd);
487 if (vlsh != VLS_INVALID_HANDLE)
489 int flags = va_arg (ap, int);
492 size = sizeof (flags);
497 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_FLAGS, &flags, &size);
501 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_FLAGS, &flags, &size);
506 /* TODO handle this */
507 LDBG (0, "F_SETFD ignored flags %u", flags);
522 rv = libc_vfcntl (fd, cmd, ap);
531 ioctl (int fd, unsigned long int cmd, ...)
537 if ((errno = -ldp_init ()))
542 vlsh = ldp_fd_to_vlsh (fd);
543 if (vlsh != VLS_INVALID_HANDLE)
548 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_NREAD, 0, 0);
553 u32 flags = va_arg (ap, int) ? O_NONBLOCK : 0;
554 u32 size = sizeof (flags);
556 /* TBD: When VPPCOM_ATTR_[GS]ET_FLAGS supports flags other than
557 * non-blocking, the flags should be read here and merged
560 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_FLAGS, &flags, &size);
576 rv = libc_vioctl (fd, cmd, ap);
584 ldp_select_init_maps (fd_set * __restrict original,
585 clib_bitmap_t ** resultb, clib_bitmap_t ** libcb,
586 clib_bitmap_t ** vclb, int nfds, u32 minbits,
587 u32 n_bytes, uword * si_bits, uword * libc_bits)
589 uword si_bits_set, libc_bits_set;
593 clib_bitmap_validate (*vclb, minbits);
594 clib_bitmap_validate (*libcb, minbits);
595 clib_bitmap_validate (*resultb, minbits);
596 clib_memcpy_fast (*resultb, original, n_bytes);
597 memset (original, 0, n_bytes);
600 clib_bitmap_foreach (fd, *resultb, ({
603 vlsh = ldp_fd_to_vlsh (fd);
604 if (vlsh == VLS_INVALID_HANDLE)
605 clib_bitmap_set_no_check (*libcb, fd, 1);
607 clib_bitmap_set_no_check (*vclb, vlsh_to_session_index (vlsh), 1);
611 si_bits_set = clib_bitmap_last_set (*vclb) + 1;
612 *si_bits = (si_bits_set > *si_bits) ? si_bits_set : *si_bits;
614 libc_bits_set = clib_bitmap_last_set (*libcb) + 1;
615 *libc_bits = (libc_bits_set > *libc_bits) ? libc_bits_set : *libc_bits;
619 ldp_select_vcl_map_to_libc (clib_bitmap_t * vclb, fd_set * __restrict libcb)
629 clib_bitmap_foreach (si, vclb, ({
630 vlsh = vls_session_index_to_vlsh (si);
631 fd = ldp_vlsh_to_fd (vlsh);
632 if (PREDICT_FALSE (fd < 0))
645 ldp_select_libc_map_merge (clib_bitmap_t * result, fd_set * __restrict libcb)
650 clib_bitmap_foreach (fd, result, ({
651 FD_SET ((int)fd, libcb);
657 ldp_pselect (int nfds, fd_set * __restrict readfds,
658 fd_set * __restrict writefds,
659 fd_set * __restrict exceptfds,
660 const struct timespec *__restrict timeout,
661 const __sigset_t * __restrict sigmask)
663 u32 minbits = clib_max (nfds, BITS (uword)), n_bytes;
664 ldp_worker_ctx_t *ldpw = ldp_worker_get_current ();
665 struct timespec libc_tspec = { 0 };
666 f64 time_out, vcl_timeout = 0;
667 uword si_bits, libc_bits;
668 int rv, bits_set = 0;
676 if (PREDICT_FALSE (ldpw->clib_time.init_cpu_time == 0))
677 clib_time_init (&ldpw->clib_time);
681 time_out = (timeout->tv_sec == 0 && timeout->tv_nsec == 0) ?
682 (f64) 0 : (f64) timeout->tv_sec + (f64) timeout->tv_nsec / (f64) 1e9;
684 /* select as fine grained sleep */
687 time_out += clib_time_now (&ldpw->clib_time);
688 while (clib_time_now (&ldpw->clib_time) < time_out)
701 if (nfds <= ldp->vlsh_bit_val)
703 rv = libc_pselect (nfds, readfds, writefds, exceptfds,
708 si_bits = libc_bits = 0;
709 n_bytes = nfds / 8 + ((nfds % 8) ? 1 : 0);
712 ldp_select_init_maps (readfds, &ldpw->rd_bitmap, &ldpw->libc_rd_bitmap,
713 &ldpw->si_rd_bitmap, nfds, minbits, n_bytes,
714 &si_bits, &libc_bits);
716 ldp_select_init_maps (writefds, &ldpw->wr_bitmap,
717 &ldpw->libc_wr_bitmap, &ldpw->si_wr_bitmap, nfds,
718 minbits, n_bytes, &si_bits, &libc_bits);
720 ldp_select_init_maps (exceptfds, &ldpw->ex_bitmap,
721 &ldpw->libc_ex_bitmap, &ldpw->si_ex_bitmap, nfds,
722 minbits, n_bytes, &si_bits, &libc_bits);
724 if (PREDICT_FALSE (!si_bits && !libc_bits))
731 libc_tspec = si_bits ? libc_tspec : *timeout;
738 clib_memcpy_fast (ldpw->rd_bitmap, ldpw->si_rd_bitmap,
739 vec_len (ldpw->rd_bitmap) *
740 sizeof (clib_bitmap_t));
742 clib_memcpy_fast (ldpw->wr_bitmap, ldpw->si_wr_bitmap,
743 vec_len (ldpw->wr_bitmap) *
744 sizeof (clib_bitmap_t));
746 clib_memcpy_fast (ldpw->ex_bitmap, ldpw->si_ex_bitmap,
747 vec_len (ldpw->ex_bitmap) *
748 sizeof (clib_bitmap_t));
750 rv = vls_select (si_bits, readfds ? ldpw->rd_bitmap : NULL,
751 writefds ? ldpw->wr_bitmap : NULL,
752 exceptfds ? ldpw->ex_bitmap : NULL, vcl_timeout);
760 if (ldp_select_vcl_map_to_libc (ldpw->rd_bitmap, readfds))
766 if (ldp_select_vcl_map_to_libc (ldpw->wr_bitmap, writefds))
772 if (ldp_select_vcl_map_to_libc (ldpw->ex_bitmap, exceptfds))
783 clib_memcpy_fast (ldpw->rd_bitmap, ldpw->libc_rd_bitmap,
784 vec_len (ldpw->libc_rd_bitmap) *
785 sizeof (clib_bitmap_t));
787 clib_memcpy_fast (ldpw->wr_bitmap, ldpw->libc_wr_bitmap,
788 vec_len (ldpw->libc_wr_bitmap) *
789 sizeof (clib_bitmap_t));
791 clib_memcpy_fast (ldpw->ex_bitmap, ldpw->libc_ex_bitmap,
792 vec_len (ldpw->libc_ex_bitmap) *
793 sizeof (clib_bitmap_t));
795 rv = libc_pselect (libc_bits,
796 readfds ? (fd_set *) ldpw->rd_bitmap : NULL,
797 writefds ? (fd_set *) ldpw->wr_bitmap : NULL,
798 exceptfds ? (fd_set *) ldpw->ex_bitmap : NULL,
799 &libc_tspec, sigmask);
802 ldp_select_libc_map_merge (ldpw->rd_bitmap, readfds);
803 ldp_select_libc_map_merge (ldpw->wr_bitmap, writefds);
804 ldp_select_libc_map_merge (ldpw->ex_bitmap, exceptfds);
815 while ((time_out == -1) || (clib_time_now (&ldpw->clib_time) < time_out));
819 /* TBD: set timeout to amount of time left */
820 clib_bitmap_zero (ldpw->rd_bitmap);
821 clib_bitmap_zero (ldpw->si_rd_bitmap);
822 clib_bitmap_zero (ldpw->libc_rd_bitmap);
823 clib_bitmap_zero (ldpw->wr_bitmap);
824 clib_bitmap_zero (ldpw->si_wr_bitmap);
825 clib_bitmap_zero (ldpw->libc_wr_bitmap);
826 clib_bitmap_zero (ldpw->ex_bitmap);
827 clib_bitmap_zero (ldpw->si_ex_bitmap);
828 clib_bitmap_zero (ldpw->libc_ex_bitmap);
834 select (int nfds, fd_set * __restrict readfds,
835 fd_set * __restrict writefds,
836 fd_set * __restrict exceptfds, struct timeval *__restrict timeout)
838 struct timespec tspec;
842 tspec.tv_sec = timeout->tv_sec;
843 tspec.tv_nsec = timeout->tv_usec * 1000;
845 return ldp_pselect (nfds, readfds, writefds, exceptfds,
846 timeout ? &tspec : NULL, NULL);
851 pselect (int nfds, fd_set * __restrict readfds,
852 fd_set * __restrict writefds,
853 fd_set * __restrict exceptfds,
854 const struct timespec *__restrict timeout,
855 const __sigset_t * __restrict sigmask)
857 return ldp_pselect (nfds, readfds, writefds, exceptfds, timeout, 0);
862 socket (int domain, int type, int protocol)
864 int rv, sock_type = type & ~(SOCK_CLOEXEC | SOCK_NONBLOCK);
865 u8 is_nonblocking = type & SOCK_NONBLOCK ? 1 : 0;
868 if ((errno = -ldp_init ()))
871 if (((domain == AF_INET) || (domain == AF_INET6)) &&
872 ((sock_type == SOCK_STREAM) || (sock_type == SOCK_DGRAM)))
874 u8 proto = ((sock_type == SOCK_DGRAM) ?
875 VPPCOM_PROTO_UDP : VPPCOM_PROTO_TCP);
877 LDBG (0, "calling vls_create: proto %u (%s), is_nonblocking %u",
878 proto, vppcom_proto_str (proto), is_nonblocking);
880 vlsh = vls_create (proto, is_nonblocking);
888 rv = ldp_vlsh_to_fd (vlsh);
893 LDBG (0, "calling libc_socket");
894 rv = libc_socket (domain, type, protocol);
901 * Create two new sockets, of type TYPE in domain DOMAIN and using
902 * protocol PROTOCOL, which are connected to each other, and put file
903 * descriptors for them in FDS[0] and FDS[1]. If PROTOCOL is zero,
904 * one will be chosen automatically.
905 * Returns 0 on success, -1 for errors.
908 socketpair (int domain, int type, int protocol, int fds[2])
910 int rv, sock_type = type & ~(SOCK_CLOEXEC | SOCK_NONBLOCK);
912 if ((errno = -ldp_init ()))
915 if (((domain == AF_INET) || (domain == AF_INET6)) &&
916 ((sock_type == SOCK_STREAM) || (sock_type == SOCK_DGRAM)))
924 LDBG (1, "calling libc_socketpair");
925 rv = libc_socketpair (domain, type, protocol, fds);
932 bind (int fd, __CONST_SOCKADDR_ARG addr, socklen_t len)
937 if ((errno = -ldp_init ()))
940 vlsh = ldp_fd_to_vlsh (fd);
941 if (vlsh != VLS_INVALID_HANDLE)
945 switch (addr->sa_family)
948 if (len != sizeof (struct sockaddr_in))
950 LDBG (0, "ERROR: fd %d: vlsh %u: Invalid AF_INET addr len %u!",
956 ep.is_ip4 = VPPCOM_IS_IP4;
957 ep.ip = (u8 *) & ((const struct sockaddr_in *) addr)->sin_addr;
958 ep.port = (u16) ((const struct sockaddr_in *) addr)->sin_port;
962 if (len != sizeof (struct sockaddr_in6))
964 LDBG (0, "ERROR: fd %d: vlsh %u: Invalid AF_INET6 addr len %u!",
970 ep.is_ip4 = VPPCOM_IS_IP6;
971 ep.ip = (u8 *) & ((const struct sockaddr_in6 *) addr)->sin6_addr;
972 ep.port = (u16) ((const struct sockaddr_in6 *) addr)->sin6_port;
976 LDBG (0, "ERROR: fd %d: vlsh %u: Unsupported address family %u!",
977 fd, vlsh, addr->sa_family);
978 errno = EAFNOSUPPORT;
982 LDBG (0, "fd %d: calling vls_bind: vlsh %u, addr %p, len %u", fd, vlsh,
985 rv = vls_bind (vlsh, &ep);
994 LDBG (0, "fd %d: calling libc_bind: addr %p, len %u", fd, addr, len);
995 rv = libc_bind (fd, addr, len);
999 LDBG (1, "fd %d: returning %d", fd, rv);
1005 ldp_copy_ep_to_sockaddr (__SOCKADDR_ARG addr, socklen_t * __restrict len,
1006 vppcom_endpt_t * ep)
1009 int sa_len, copy_len;
1011 if ((errno = -ldp_init ()))
1014 if (addr && len && ep)
1016 addr->sa_family = (ep->is_ip4 == VPPCOM_IS_IP4) ? AF_INET : AF_INET6;
1017 switch (addr->sa_family)
1020 ((struct sockaddr_in *) addr)->sin_port = ep->port;
1021 if (*len > sizeof (struct sockaddr_in))
1022 *len = sizeof (struct sockaddr_in);
1023 sa_len = sizeof (struct sockaddr_in) - sizeof (struct in_addr);
1024 copy_len = *len - sa_len;
1026 memcpy (&((struct sockaddr_in *) addr)->sin_addr, ep->ip,
1031 ((struct sockaddr_in6 *) addr)->sin6_port = ep->port;
1032 if (*len > sizeof (struct sockaddr_in6))
1033 *len = sizeof (struct sockaddr_in6);
1034 sa_len = sizeof (struct sockaddr_in6) - sizeof (struct in6_addr);
1035 copy_len = *len - sa_len;
1037 memcpy (((struct sockaddr_in6 *) addr)->sin6_addr.
1038 __in6_u.__u6_addr8, ep->ip, copy_len);
1051 getsockname (int fd, __SOCKADDR_ARG addr, socklen_t * __restrict len)
1056 if ((errno = -ldp_init ()))
1059 vlsh = ldp_fd_to_vlsh (fd);
1060 if (vlsh != VLS_INVALID_HANDLE)
1063 u8 addr_buf[sizeof (struct in6_addr)];
1064 u32 size = sizeof (ep);
1068 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_LCL_ADDR, &ep, &size);
1069 if (rv != VPPCOM_OK)
1076 rv = ldp_copy_ep_to_sockaddr (addr, len, &ep);
1077 if (rv != VPPCOM_OK)
1086 rv = libc_getsockname (fd, addr, len);
1093 connect (int fd, __CONST_SOCKADDR_ARG addr, socklen_t len)
1098 if ((errno = -ldp_init ()))
1103 LDBG (0, "ERROR: fd %d: NULL addr, len %u", fd, len);
1109 vlsh = ldp_fd_to_vlsh (fd);
1110 if (vlsh != VLS_INVALID_HANDLE)
1114 switch (addr->sa_family)
1117 if (len != sizeof (struct sockaddr_in))
1119 LDBG (0, "fd %d: ERROR vlsh %u: Invalid AF_INET addr len %u!",
1125 ep.is_ip4 = VPPCOM_IS_IP4;
1126 ep.ip = (u8 *) & ((const struct sockaddr_in *) addr)->sin_addr;
1127 ep.port = (u16) ((const struct sockaddr_in *) addr)->sin_port;
1131 if (len != sizeof (struct sockaddr_in6))
1133 LDBG (0, "fd %d: ERROR vlsh %u: Invalid AF_INET6 addr len %u!",
1139 ep.is_ip4 = VPPCOM_IS_IP6;
1140 ep.ip = (u8 *) & ((const struct sockaddr_in6 *) addr)->sin6_addr;
1141 ep.port = (u16) ((const struct sockaddr_in6 *) addr)->sin6_port;
1145 LDBG (0, "fd %d: ERROR vlsh %u: Unsupported address family %u!",
1146 fd, vlsh, addr->sa_family);
1147 errno = EAFNOSUPPORT;
1151 LDBG (0, "fd %d: calling vls_connect(): vlsh %u addr %p len %u", fd,
1154 rv = vls_connect (vlsh, &ep);
1155 if (rv != VPPCOM_OK)
1163 LDBG (0, "fd %d: calling libc_connect(): addr %p, len %u",
1166 rv = libc_connect (fd, addr, len);
1170 LDBG (1, "fd %d: returning %d (0x%x)", fd, rv, rv);
1175 getpeername (int fd, __SOCKADDR_ARG addr, socklen_t * __restrict len)
1180 if ((errno = -ldp_init ()))
1183 vlsh = ldp_fd_to_vlsh (fd);
1184 if (vlsh != VLS_INVALID_HANDLE)
1187 u8 addr_buf[sizeof (struct in6_addr)];
1188 u32 size = sizeof (ep);
1191 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_PEER_ADDR, &ep, &size);
1192 if (rv != VPPCOM_OK)
1199 rv = ldp_copy_ep_to_sockaddr (addr, len, &ep);
1200 if (rv != VPPCOM_OK)
1209 rv = libc_getpeername (fd, addr, len);
1216 send (int fd, const void *buf, size_t n, int flags)
1218 vls_handle_t vlsh = ldp_fd_to_vlsh (fd);
1221 if ((errno = -ldp_init ()))
1224 if (vlsh != VLS_INVALID_HANDLE)
1226 size = vls_sendto (vlsh, (void *) buf, n, flags, NULL);
1227 if (size < VPPCOM_OK)
1235 size = libc_send (fd, buf, n, flags);
1242 sendfile (int out_fd, int in_fd, off_t * offset, size_t len)
1244 ldp_worker_ctx_t *ldpw = ldp_worker_get_current ();
1248 if ((errno = -ldp_init ()))
1251 vlsh = ldp_fd_to_vlsh (out_fd);
1252 if (vlsh != VLS_INVALID_HANDLE)
1255 ssize_t results = 0;
1256 size_t n_bytes_left = len;
1257 size_t bytes_to_read;
1260 u32 flags, flags_len = sizeof (flags);
1262 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_FLAGS, &flags, &flags_len);
1263 if (PREDICT_FALSE (rv != VPPCOM_OK))
1265 LDBG (0, "ERROR: out fd %d: vls_attr: vlsh %u, returned %d (%s)!",
1266 out_fd, vlsh, rv, vppcom_retval_str (rv));
1268 vec_reset_length (ldpw->io_buffer);
1276 off_t off = lseek (in_fd, *offset, SEEK_SET);
1277 if (PREDICT_FALSE (off == -1))
1283 ASSERT (off == *offset);
1288 size = vls_attr (vlsh, VPPCOM_ATTR_GET_NWRITE, 0, 0);
1291 LDBG (0, "ERROR: fd %d: vls_attr: vlsh %u returned %d (%s)!",
1292 out_fd, vlsh, size, vppcom_retval_str (size));
1293 vec_reset_length (ldpw->io_buffer);
1299 bytes_to_read = size;
1300 if (bytes_to_read == 0)
1302 if (flags & O_NONBLOCK)
1311 bytes_to_read = clib_min (n_bytes_left, bytes_to_read);
1312 vec_validate (ldpw->io_buffer, bytes_to_read);
1313 nbytes = libc_read (in_fd, ldpw->io_buffer, bytes_to_read);
1318 vec_reset_length (ldpw->io_buffer);
1325 size = vls_write (vlsh, ldpw->io_buffer, nbytes);
1328 if (size == VPPCOM_EAGAIN)
1330 if (flags & O_NONBLOCK)
1341 vec_reset_length (ldpw->io_buffer);
1350 ASSERT (n_bytes_left >= nbytes);
1351 n_bytes_left = n_bytes_left - nbytes;
1353 while (n_bytes_left > 0);
1356 vec_reset_length (ldpw->io_buffer);
1359 off_t off = lseek (in_fd, *offset, SEEK_SET);
1360 if (PREDICT_FALSE (off == -1))
1366 ASSERT (off == *offset);
1367 *offset += results + 1;
1379 size = libc_sendfile (out_fd, in_fd, offset, len);
1387 sendfile64 (int out_fd, int in_fd, off_t * offset, size_t len)
1389 return sendfile (out_fd, in_fd, offset, len);
1393 recv (int fd, void *buf, size_t n, int flags)
1398 if ((errno = -ldp_init ()))
1401 vlsh = ldp_fd_to_vlsh (fd);
1402 if (vlsh != VLS_INVALID_HANDLE)
1404 size = vls_recvfrom (vlsh, buf, n, flags, NULL);
1410 size = libc_recv (fd, buf, n, flags);
1417 sendto (int fd, const void *buf, size_t n, int flags,
1418 __CONST_SOCKADDR_ARG addr, socklen_t addr_len)
1423 if ((errno = -ldp_init ()))
1426 vlsh = ldp_fd_to_vlsh (fd);
1427 if (vlsh != INVALID_SESSION_ID)
1429 vppcom_endpt_t *ep = 0;
1435 switch (addr->sa_family)
1438 ep->is_ip4 = VPPCOM_IS_IP4;
1440 (uint8_t *) & ((const struct sockaddr_in *) addr)->sin_addr;
1442 (uint16_t) ((const struct sockaddr_in *) addr)->sin_port;
1446 ep->is_ip4 = VPPCOM_IS_IP6;
1448 (uint8_t *) & ((const struct sockaddr_in6 *) addr)->sin6_addr;
1450 (uint16_t) ((const struct sockaddr_in6 *) addr)->sin6_port;
1454 errno = EAFNOSUPPORT;
1460 size = vls_sendto (vlsh, (void *) buf, n, flags, ep);
1469 size = libc_sendto (fd, buf, n, flags, addr, addr_len);
1477 recvfrom (int fd, void *__restrict buf, size_t n, int flags,
1478 __SOCKADDR_ARG addr, socklen_t * __restrict addr_len)
1483 if ((errno = -ldp_init ()))
1486 sid = ldp_fd_to_vlsh (fd);
1487 if (sid != VLS_INVALID_HANDLE)
1490 u8 src_addr[sizeof (struct sockaddr_in6)];
1495 size = vls_recvfrom (sid, buf, n, flags, &ep);
1498 size = ldp_copy_ep_to_sockaddr (addr, addr_len, &ep);
1501 size = vls_recvfrom (sid, buf, n, flags, NULL);
1511 size = libc_recvfrom (fd, buf, n, flags, addr, addr_len);
1518 sendmsg (int fd, const struct msghdr * message, int flags)
1523 if ((errno = -ldp_init ()))
1526 vlsh = ldp_fd_to_vlsh (fd);
1527 if (vlsh != VLS_INVALID_HANDLE)
1529 LDBG (0, "LDP-TBD");
1535 size = libc_sendmsg (fd, message, flags);
1543 sendmmsg (int fd, struct mmsghdr *vmessages, unsigned int vlen, int flags)
1546 const char *func_str;
1547 u32 sh = ldp_fd_to_vlsh (fd);
1549 if ((errno = -ldp_init ()))
1552 if (sh != INVALID_SESSION_ID)
1554 clib_warning ("LDP<%d>: LDP-TBD", getpid ());
1560 func_str = "libc_sendmmsg";
1563 clib_warning ("LDP<%d>: fd %d (0x%x): calling %s(): "
1564 "vmessages %p, vlen %u, flags 0x%x",
1565 getpid (), fd, fd, func_str, vmessages, vlen, flags);
1567 size = libc_sendmmsg (fd, vmessages, vlen, flags);
1574 int errno_val = errno;
1576 clib_warning ("LDP<%d>: ERROR: fd %d (0x%x): %s() failed! "
1577 "rv %d, errno = %d", getpid (), fd, fd,
1578 func_str, size, errno_val);
1582 clib_warning ("LDP<%d>: fd %d (0x%x): returning %d (0x%x)",
1583 getpid (), fd, fd, size, size);
1590 recvmsg (int fd, struct msghdr * message, int flags)
1595 if ((errno = -ldp_init ()))
1598 vlsh = ldp_fd_to_vlsh (fd);
1599 if (vlsh != VLS_INVALID_HANDLE)
1601 LDBG (0, "LDP-TBD");
1607 size = libc_recvmsg (fd, message, flags);
1615 recvmmsg (int fd, struct mmsghdr *vmessages,
1616 unsigned int vlen, int flags, struct timespec *tmo)
1619 const char *func_str;
1620 u32 sh = ldp_fd_to_vlsh (fd);
1622 if ((errno = -ldp_init ()))
1625 if (sh != INVALID_SESSION_ID)
1627 clib_warning ("LDP<%d>: LDP-TBD", getpid ());
1633 func_str = "libc_recvmmsg";
1636 clib_warning ("LDP<%d>: fd %d (0x%x): calling %s(): "
1637 "vmessages %p, vlen %u, flags 0x%x, tmo %p",
1638 getpid (), fd, fd, func_str, vmessages, vlen,
1641 size = libc_recvmmsg (fd, vmessages, vlen, flags, tmo);
1648 int errno_val = errno;
1650 clib_warning ("LDP<%d>: ERROR: fd %d (0x%x): %s() failed! "
1651 "rv %d, errno = %d", getpid (), fd, fd,
1652 func_str, size, errno_val);
1656 clib_warning ("LDP<%d>: fd %d (0x%x): returning %d (0x%x)",
1657 getpid (), fd, fd, size, size);
1664 getsockopt (int fd, int level, int optname,
1665 void *__restrict optval, socklen_t * __restrict optlen)
1670 if ((errno = -ldp_init ()))
1673 vlsh = ldp_fd_to_vlsh (fd);
1674 if (vlsh != VLS_INVALID_HANDLE)
1684 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_TCP_NODELAY,
1688 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_TCP_USER_MSS,
1692 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_TCP_KEEPIDLE,
1696 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_TCP_KEEPINTVL,
1700 if (optval && optlen && (*optlen == sizeof (struct tcp_info)))
1702 LDBG (1, "fd %d: vlsh %u SOL_TCP, TCP_INFO, optval %p, "
1703 "optlen %d: #LDP-NOP#", fd, vlsh, optval, *optlen);
1704 memset (optval, 0, *optlen);
1710 case TCP_CONGESTION:
1711 strcpy (optval, "cubic");
1712 *optlen = strlen ("cubic");
1716 LDBG (0, "ERROR: fd %d: getsockopt SOL_TCP: sid %u, "
1717 "optname %d unsupported!", fd, vlsh, optname);
1725 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_V6ONLY, optval, optlen);
1728 LDBG (0, "ERROR: fd %d: getsockopt SOL_IPV6: vlsh %u "
1729 "optname %d unsupported!", fd, vlsh, optname);
1737 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_LISTEN, optval, optlen);
1740 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_KEEPALIVE, optval, optlen);
1743 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_PROTOCOL, optval, optlen);
1744 *(int *) optval = *(int *) optval ? SOCK_DGRAM : SOCK_STREAM;
1747 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_TX_FIFO_LEN,
1751 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_RX_FIFO_LEN,
1755 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_REUSEADDR, optval, optlen);
1758 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_BROADCAST, optval, optlen);
1761 rv = vls_attr (vlsh, VPPCOM_ATTR_GET_ERROR, optval, optlen);
1764 LDBG (0, "ERROR: fd %d: getsockopt SOL_SOCKET: vlsh %u "
1765 "optname %d unsupported!", fd, vlsh, optname);
1773 if (rv != VPPCOM_OK)
1781 rv = libc_getsockopt (fd, level, optname, optval, optlen);
1788 setsockopt (int fd, int level, int optname,
1789 const void *optval, socklen_t optlen)
1794 if ((errno = -ldp_init ()))
1797 vlsh = ldp_fd_to_vlsh (fd);
1798 if (vlsh != VLS_INVALID_HANDLE)
1808 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_TCP_NODELAY,
1809 (void *) optval, &optlen);
1812 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_TCP_USER_MSS,
1813 (void *) optval, &optlen);
1816 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_TCP_KEEPIDLE,
1817 (void *) optval, &optlen);
1820 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_TCP_KEEPINTVL,
1821 (void *) optval, &optlen);
1823 case TCP_CONGESTION:
1828 LDBG (0, "ERROR: fd %d: setsockopt() SOL_TCP: vlsh %u"
1829 "optname %d unsupported!", fd, vlsh, optname);
1837 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_V6ONLY,
1838 (void *) optval, &optlen);
1841 LDBG (0, "ERROR: fd %d: setsockopt SOL_IPV6: vlsh %u"
1842 "optname %d unsupported!", fd, vlsh, optname);
1850 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_KEEPALIVE,
1851 (void *) optval, &optlen);
1854 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_REUSEADDR,
1855 (void *) optval, &optlen);
1858 rv = vls_attr (vlsh, VPPCOM_ATTR_SET_BROADCAST,
1859 (void *) optval, &optlen);
1862 LDBG (0, "ERROR: fd %d: setsockopt SOL_SOCKET: vlsh %u "
1863 "optname %d unsupported!", fd, vlsh, optname);
1871 if (rv != VPPCOM_OK)
1879 rv = libc_setsockopt (fd, level, optname, optval, optlen);
1886 listen (int fd, int n)
1891 if ((errno = -ldp_init ()))
1894 vlsh = ldp_fd_to_vlsh (fd);
1895 if (vlsh != VLS_INVALID_HANDLE)
1897 LDBG (0, "fd %d: calling vls_listen: vlsh %u, n %d", fd, vlsh, n);
1899 rv = vls_listen (vlsh, n);
1900 if (rv != VPPCOM_OK)
1908 LDBG (0, "fd %d: calling libc_listen(): n %d", fd, n);
1909 rv = libc_listen (fd, n);
1912 LDBG (1, "fd %d: returning %d", fd, rv);
1917 ldp_accept4 (int listen_fd, __SOCKADDR_ARG addr,
1918 socklen_t * __restrict addr_len, int flags)
1920 vls_handle_t listen_vlsh, accept_vlsh;
1923 if ((errno = -ldp_init ()))
1926 listen_vlsh = ldp_fd_to_vlsh (listen_fd);
1927 if (listen_vlsh != VLS_INVALID_HANDLE)
1930 u8 src_addr[sizeof (struct sockaddr_in6)];
1931 memset (&ep, 0, sizeof (ep));
1934 LDBG (0, "listen fd %d: calling vppcom_session_accept: listen sid %u,"
1935 " ep %p, flags 0x%x", listen_fd, listen_vlsh, ep, flags);
1937 accept_vlsh = vls_accept (listen_vlsh, &ep, flags);
1938 if (accept_vlsh < 0)
1940 errno = -accept_vlsh;
1945 rv = ldp_copy_ep_to_sockaddr (addr, addr_len, &ep);
1946 if (rv != VPPCOM_OK)
1948 (void) vls_close (accept_vlsh);
1954 rv = ldp_vlsh_to_fd (accept_vlsh);
1960 LDBG (0, "listen fd %d: calling libc_accept4(): addr %p, addr_len %p,"
1961 " flags 0x%x", listen_fd, addr, addr_len, flags);
1963 rv = libc_accept4 (listen_fd, addr, addr_len, flags);
1966 LDBG (1, "listen fd %d: accept returning %d", listen_fd, rv);
1972 accept4 (int fd, __SOCKADDR_ARG addr, socklen_t * __restrict addr_len,
1975 return ldp_accept4 (fd, addr, addr_len, flags);
1979 accept (int fd, __SOCKADDR_ARG addr, socklen_t * __restrict addr_len)
1981 return ldp_accept4 (fd, addr, addr_len, 0);
1985 shutdown (int fd, int how)
1989 u32 flags_len = sizeof (flags);
1991 if ((errno = -ldp_init ()))
1994 vlsh = ldp_fd_to_vlsh (fd);
1995 if (vlsh != VLS_INVALID_HANDLE)
1997 LDBG (0, "called shutdown: fd %u vlsh %u how %d", fd, vlsh, how);
1999 if (vls_attr (vlsh, VPPCOM_ATTR_SET_SHUT, &how, &flags_len))
2005 if (vls_attr (vlsh, VPPCOM_ATTR_GET_SHUT, &flags, &flags_len))
2011 if (flags == SHUT_RDWR)
2016 LDBG (0, "fd %d: calling libc_shutdown: how %d", fd, how);
2017 rv = libc_shutdown (fd, how);
2024 epoll_create1 (int flags)
2026 ldp_worker_ctx_t *ldpw = ldp_worker_get_current ();
2030 if ((errno = -ldp_init ()))
2033 if (ldp->vcl_needs_real_epoll)
2035 rv = libc_epoll_create1 (flags);
2036 ldp->vcl_needs_real_epoll = 0;
2037 ldpw->vcl_mq_epfd = rv;
2038 LDBG (0, "created vcl epfd %u", rv);
2042 vlsh = vls_epoll_create ();
2043 if (PREDICT_FALSE (vlsh == VLS_INVALID_HANDLE))
2050 rv = ldp_vlsh_to_fd (vlsh);
2052 LDBG (0, "epoll_create epfd %u vlsh %u", rv, vlsh);
2057 epoll_create (int size)
2059 return epoll_create1 (0);
2063 epoll_ctl (int epfd, int op, int fd, struct epoll_event *event)
2065 vls_handle_t vep_vlsh, vlsh;
2068 if ((errno = -ldp_init ()))
2071 vep_vlsh = ldp_fd_to_vlsh (epfd);
2072 if (PREDICT_FALSE (vep_vlsh == VLS_INVALID_HANDLE))
2074 /* The LDP epoll_create1 always creates VCL epfd's.
2075 * The app should never have a kernel base epoll fd unless it
2076 * was acquired outside of the LD_PRELOAD process context.
2077 * In any case, if we get one, punt it to libc_epoll_ctl.
2079 LDBG (1, "epfd %d: calling libc_epoll_ctl: op %d, fd %d"
2080 " event %p", epfd, op, fd, event);
2082 rv = libc_epoll_ctl (epfd, op, fd, event);
2086 vlsh = ldp_fd_to_vlsh (fd);
2088 LDBG (0, "epfd %d ep_vlsh %d, fd %u vlsh %d, op %u", epfd, vep_vlsh, fd,
2091 if (vlsh != VLS_INVALID_HANDLE)
2093 LDBG (1, "epfd %d: calling vls_epoll_ctl: ep_vlsh %d op %d, vlsh %u,"
2094 " event %p", epfd, vep_vlsh, vlsh, event);
2096 rv = vls_epoll_ctl (vep_vlsh, op, vlsh, event);
2097 if (rv != VPPCOM_OK)
2106 u32 size = sizeof (epfd);
2108 libc_epfd = vls_attr (vep_vlsh, VPPCOM_ATTR_GET_LIBC_EPFD, 0, 0);
2111 LDBG (1, "epfd %d, vep_vlsh %d calling libc_epoll_create1: "
2112 "EPOLL_CLOEXEC", epfd, vep_vlsh);
2114 libc_epfd = libc_epoll_create1 (EPOLL_CLOEXEC);
2121 rv = vls_attr (vep_vlsh, VPPCOM_ATTR_SET_LIBC_EPFD, &libc_epfd,
2130 else if (PREDICT_FALSE (libc_epfd < 0))
2137 LDBG (1, "epfd %d: calling libc_epoll_ctl: libc_epfd %d, op %d, fd %d,"
2138 " event %p", epfd, libc_epfd, op, fd, event);
2140 rv = libc_epoll_ctl (libc_epfd, op, fd, event);
2148 ldp_epoll_pwait (int epfd, struct epoll_event *events, int maxevents,
2149 int timeout, const sigset_t * sigmask)
2151 ldp_worker_ctx_t *ldpw = ldp_worker_get_current ();
2152 double time_to_wait = (double) 0, max_time;
2153 int libc_epfd, rv = 0;
2154 vls_handle_t ep_vlsh;
2156 if ((errno = -ldp_init ()))
2159 if (PREDICT_FALSE (!events || (timeout < -1)))
2165 if (epfd == ldpw->vcl_mq_epfd)
2166 return libc_epoll_pwait (epfd, events, maxevents, timeout, sigmask);
2168 ep_vlsh = ldp_fd_to_vlsh (epfd);
2169 if (PREDICT_FALSE (ep_vlsh == VLS_INVALID_HANDLE))
2171 LDBG (0, "epfd %d: bad ep_vlsh %d!", epfd, ep_vlsh);
2176 if (PREDICT_FALSE (ldpw->clib_time.init_cpu_time == 0))
2177 clib_time_init (&ldpw->clib_time);
2178 time_to_wait = ((timeout >= 0) ? (double) timeout / 1000 : 0);
2179 max_time = clib_time_now (&ldpw->clib_time) + time_to_wait;
2181 libc_epfd = vls_attr (ep_vlsh, VPPCOM_ATTR_GET_LIBC_EPFD, 0, 0);
2182 if (PREDICT_FALSE (libc_epfd < 0))
2189 LDBG (2, "epfd %d: vep_idx %d, libc_epfd %d, events %p, maxevents %d, "
2190 "timeout %d, sigmask %p: time_to_wait %.02f", epfd, ep_vlsh,
2191 libc_epfd, events, maxevents, timeout, sigmask, time_to_wait);
2194 if (!ldpw->epoll_wait_vcl)
2196 rv = vls_epoll_wait (ep_vlsh, events, maxevents, 0);
2199 ldpw->epoll_wait_vcl = 1;
2210 ldpw->epoll_wait_vcl = 0;
2214 rv = libc_epoll_pwait (libc_epfd, events, maxevents, 0, sigmask);
2219 while ((timeout == -1) || (clib_time_now (&ldpw->clib_time) < max_time));
2226 epoll_pwait (int epfd, struct epoll_event *events,
2227 int maxevents, int timeout, const sigset_t * sigmask)
2229 return ldp_epoll_pwait (epfd, events, maxevents, timeout, sigmask);
2233 epoll_wait (int epfd, struct epoll_event *events, int maxevents, int timeout)
2235 return ldp_epoll_pwait (epfd, events, maxevents, timeout, NULL);
2239 poll (struct pollfd *fds, nfds_t nfds, int timeout)
2241 ldp_worker_ctx_t *ldpw = ldp_worker_get_current ();
2242 int rv, i, n_revents = 0;
2247 LDBG (3, "fds %p, nfds %d, timeout %d", fds, nfds, timeout);
2249 if (PREDICT_FALSE (ldpw->clib_time.init_cpu_time == 0))
2250 clib_time_init (&ldpw->clib_time);
2252 max_time = (timeout >= 0) ? (f64) timeout / 1000 : 0;
2253 max_time += clib_time_now (&ldpw->clib_time);
2255 for (i = 0; i < nfds; i++)
2260 vlsh = ldp_fd_to_vlsh (fds[i].fd);
2261 if (vlsh != VLS_INVALID_HANDLE)
2263 fds[i].fd = -fds[i].fd;
2264 vec_add2 (ldpw->vcl_poll, vp, 1);
2266 vp->sh = vlsh_to_sh (vlsh);
2267 vp->events = fds[i].events;
2268 #ifdef __USE_XOPEN2K
2269 if (fds[i].events & POLLRDNORM)
2270 vp->events |= POLLIN;
2271 if (fds[i].events & POLLWRNORM)
2272 vp->events |= POLLOUT;
2274 vp->revents = fds[i].revents;
2278 vec_add1 (ldpw->libc_poll, fds[i]);
2279 vec_add1 (ldpw->libc_poll_idxs, i);
2285 if (vec_len (ldpw->vcl_poll))
2287 rv = vppcom_poll (ldpw->vcl_poll, vec_len (ldpw->vcl_poll), 0);
2298 if (vec_len (ldpw->libc_poll))
2300 rv = libc_poll (ldpw->libc_poll, vec_len (ldpw->libc_poll), 0);
2313 while ((timeout < 0) || (clib_time_now (&ldpw->clib_time) < max_time));
2317 vec_foreach (vp, ldpw->vcl_poll)
2319 fds[vp->fds_ndx].fd = -fds[vp->fds_ndx].fd;
2320 fds[vp->fds_ndx].revents = vp->revents;
2321 #ifdef __USE_XOPEN2K
2322 if ((fds[vp->fds_ndx].revents & POLLIN) &&
2323 (fds[vp->fds_ndx].events & POLLRDNORM))
2324 fds[vp->fds_ndx].revents |= POLLRDNORM;
2325 if ((fds[vp->fds_ndx].revents & POLLOUT) &&
2326 (fds[vp->fds_ndx].events & POLLWRNORM))
2327 fds[vp->fds_ndx].revents |= POLLWRNORM;
2330 vec_reset_length (ldpw->vcl_poll);
2332 for (i = 0; i < vec_len (ldpw->libc_poll); i++)
2334 fds[ldpw->libc_poll_idxs[i]].revents = ldpw->libc_poll[i].revents;
2336 vec_reset_length (ldpw->libc_poll_idxs);
2337 vec_reset_length (ldpw->libc_poll);
2344 ppoll (struct pollfd *fds, nfds_t nfds,
2345 const struct timespec *timeout, const sigset_t * sigmask)
2347 if ((errno = -ldp_init ()))
2350 clib_warning ("LDP<%d>: LDP-TBD", getpid ());
2358 void CONSTRUCTOR_ATTRIBUTE ldp_constructor (void);
2360 void DESTRUCTOR_ATTRIBUTE ldp_destructor (void);
2363 * This function is called when the library is loaded
2366 ldp_constructor (void)
2368 swrap_constructor ();
2369 if (ldp_init () != 0)
2370 fprintf (stderr, "\nLDP<%d>: ERROR: ldp_constructor: failed!\n",
2372 else if (LDP_DEBUG > 0)
2373 clib_warning ("LDP<%d>: LDP constructor: done!\n", getpid ());
2377 * This function is called when the library is unloaded
2380 ldp_destructor (void)
2383 swrap_destructor ();
2388 /* Don't use clib_warning() here because that calls writev()
2389 * which will call ldp_init().
2392 fprintf (stderr, "%s:%d: LDP<%d>: LDP destructor: done!\n",
2393 __func__, __LINE__, getpid ());
2398 * fd.io coding-style-patch-verification: ON
2401 * eval: (c-set-style "gnu")