Various improvements and more code; post-crash.
[adns] / src / event.c
CommitLineData
656b2da9 1/**/
2
37e28fde 3#include "adns-internal.h"
4
656b2da9 5static void autosys(adns_state ads, struct timeval now) {
6 if (ads->iflags & adns_if_noautosys) return;
7 adns_callback(ads,-1,0,0,0);
8}
9
10static int callb_checkfd(int maxfd, const fd_set *fds, int fd) {
11 return maxfd<0 || !fds ? 1 :
12 fd<maxfd && FD_ISSET(fd,fds);
13}
14
8402e34c 15void adns__tcp_broken(adns_state ads, const char *what, const char *why) {
16 int serv;
17
18 assert(ads->tcpstate == server_connecting || ads->tcpstate == server_ok);
37e28fde 19 warn("nameserver %s TCP connection lost: %s: %s",
20 inet_ntoa(ads->servers[tcpserver].addr,what,why));
21 close(ads->tcpsocket);
22 ads->tcpstate= server_disconnected;
8402e34c 23 serv= ads->tcpserver;
37e28fde 24
8402e34c 25 for (qu= ads->timew; qu; qu= nqu) {
26 nqu= qu->next;
27 if (qu->senttcpserver == -1) continue;
28 assert(qu->senttcpserver == serv);
29 DLIST_UNLINK(ads->timew,qu);
30 adns__query_fail(ads,qu,adns_s_connlost); /* wishlist: send to other servers ? */
31 }
32
33 ads->tcpbuf.used= 0;
34 ads->tcpserver= (serv+1)%ads->nservers;
35}
36
37void adns__tcp_tryconnect(adns_state ads) {
38 int r, fd, tries;
39 sockaddr_in addr;
40
41 for (tries=0; tries<ads->nservers; tries++) {
42 if (ads->tcpstate == server_connecting || ads->tcpstate == server_ok) return;
43 assert(ads->tcpstate == server_disconnected);
44 assert(!ads->tcpbuf.used);
45
46 proto= getprotobyname("tcp");
47 if (!proto) { diag(ads,"unable to find protocol number for TCP !",-1); return; }
48 fd= socket(AF_INET,SOCK_STREAM,proto->p_proto);
49 if (fd<0) { diag(ads,"cannot create TCP socket: %s",-1,strerror(errno)); return; }
50 if (!adns__setnonblock(fd)) return;
51 memset(&addr,0,sizeof(addr));
52 addr.sin_family= AF_INET;
53 addr.sin_port= htons(NSPORT);
54 addr.sin_addr= ads->servers[ads->tcpserver].addr;
55 r= connect(fd,&addr,sizeof(addr));
56 ads->tcpsocket= fd;
57 ads->tcpstate= server_connecting;
58 if (r==0) { ads->tcpstate= server_ok; return; }
59 if (errno == EWOULDBLOCK || errno == EINPROGRESS) return;
60 tcpserver_broken(ads,"connect",strerror(errno));
61 }
62}
63
656b2da9 64int adns_callback(adns_state ads, int maxfd,
65 const fd_set *readfds, const fd_set *writefds,
66 const fd_set *exceptfds) {
37e28fde 67 int skip, dgramlen, count, udpaddrlen;
656b2da9 68 enum adns__tcpstate oldtcpstate;
37e28fde 69 unsigned char udpbuf[UDPMAXDGRAM];
70 struct sockaddr_in udpaddr;
656b2da9 71
72 count= 0;
73 oldtcpstate= ads->tcpstate;
74
75 if (ads->tcpstate == server_connecting) {
76 if (callb_checkfd(maxfd,writefds,ads->tcpsocket)) {
77 count++;
78 assert(ads->tcprecv.used==0);
79 vbuf_ensure(&ads->tcprecv,1);
80 if (ads->tcprecv.buf) {
81 r= read(ads->tcpsocket,&ads->tcprecv.buf,1);
82 if (r==0 || (r<0 && (errno==EAGAIN || errno==EWOULDBLOCK))) {
37e28fde 83 debug("nameserver %s TCP connected",
84 inet_ntoa(ads->servers[ads->tcpserver].addr));
656b2da9 85 ads->tcpstate= server_connected;
86 } else if (r>0) {
87 tcpserver_broken(ads,"connect/read","sent data before first request");
88 } else if (errno!=EINTR) {
8402e34c 89 tcpserver_broken(ads,"connect/read",strerror(errno));
656b2da9 90 }
91 }
92 }
93 }
94 if (ads->tcpstate == server_connected) {
95 if (oldtcpstate == server_connected)
96 count+= callb_checkfd(maxfd,readfds,ads->tcpsocket) +
97 callb_checkfd(maxfd,exceptfds,ads->tcpsocket) +
98 (ads->tcpsend.used && callb_checkfd(maxfd,writefds,ads->tcpsocket));
99 if (oldtcpstate != server_connected || callb_checkfd(maxfd,readfds,ads->tcpsocket)) {
100 skip= 0;
101 for (;;) {
102 if (ads->tcprecv.used<skip+2) {
103 want= 2;
104 } else {
105 dgramlen= (ads->tcprecv.buf[skip]<<8) | ads->tcprecv.buf[skip+1];
106 if (ads->tcprecv.used<skip+2+dgramlen) {
107 want= 2+dgramlen;
108 } else {
37e28fde 109 procdgram(ads,ads->tcprecv.buf+skip+2,dgramlen,ads->tcpserver);
656b2da9 110 skip+= 2+dgramlen; continue;
111 }
112 }
37e28fde 113 ads->tcprecv.used -= skip;
656b2da9 114 memmove(ads->tcprecv.buf,ads->tcprecv.buf+skip,ads->tcprecv.used);
115 vbuf_ensure(&ads->tcprecv,want);
116 if (ads->tcprecv.used >= ads->tcprecv.avail) break;
117 r= read(ads->tcpsocket,
118 ads->tcprecv.buf+ads->tcprecv.used,
119 ads->tcprecv.avail-ads->tcprecv.used);
120 if (r>0) {
121 ads->tcprecv.used+= r;
122 } else {
123 if (r<0) {
124 if (errno==EAGAIN || errno==EWOULDBLOCK || errno==ENOMEM) break;
125 if (errno==EINTR) continue;
126 }
127 tcpserver_broken(ads->tcpserver,"read",r?strerror(errno):"closed");
128 break;
129 }
130 }
131 } else if (callb_checkfd(maxfd,exceptfds,ads->tcpsocket)) {
132 tcpserver_broken(ads->tcpserver,"select","exceptional condition detected");
133 } else if (ads->tcpsend.used && callb_checkfd(maxfd,writefds,ads->tcpsocket)) {
134 r= write(ads->tcpsocket,ads->tcpsend.buf,ads->tcpsend.used);
135 if (r<0) {
136 if (errno!=EAGAIN && errno!=EWOULDBLOCK && errno!=ENOMEM && errno!=EINTR) {
137 tcpserver_broken(ads->tcpserver,"write",strerror(errno));
138 }
139 } else if (r>0) {
140 ads->tcpsend.used -= r;
141 memmove(ads->tcpsend.buf,ads->tcpsend.buf+r,ads->tcpsend.used);
142 }
143 }
144 }
145
37e28fde 146 if (callb_checkfd(maxfd,readfds,ads->udpsocket)) {
147 count++;
148 for (;;) {
149 udpaddrlen= sizeof(udpaddr);
150 r= recvfrom(ads->udpsocket,udpbuf,sizeof(udpbuf),0,&udpaddr,&udpaddrlen);
151 if (r<0) {
152 if (!(errno == EAGAIN || errno == EWOULDBLOCK ||
153 errno == EINTR || errno == ENOMEM || errno == ENOBUFS))
154 warn("datagram receive error: %s",strerror(errno));
155 break;
156 }
157 if (udpaddrlen != sizeof(udpaddr)) {
158 diag("datagram received with wrong address length %d (expected %d)",
159 udpaddrlen,sizeof(udpaddr));
160 continue;
161 }
162 if (udpaddr.sin_family != AF_INET) {
163 diag("datagram received with wrong protocol family %u (expected %u)",
164 udpaddr.sin_family,AF_INET);
165 continue;
166 }
167 if (ntohs(udpaddr.sin_port) != NSPORT) {
168 diag("datagram received from wrong port %u (expected %u)",
169 ntohs(udpaddr.sin_port),NSPORT);
170 continue;
171 }
172 for (serv= 0;
173 serv < ads->nservers &&
174 ads->servers[serv].addr.s_addr != udpaddr.sin_addr.s_addr;
175 serv++);
176 if (serv >= ads->nservers) {
177 warn("datagram received from unknown nameserver %s",inet_ntoa(udpaddr.sin_addr));
178 continue;
179 }
180 procdgram(ads,udpbuf,r,serv);
656b2da9 181 }
37e28fde 182 }
656b2da9 183}
656b2da9 184
185static void inter_maxto(struct timeval **tv_io, struct timeval *tvbuf,
186 struct timeval maxto) {
187 struct timeval rbuf;
188
189 rbuf= *tv_io;
190 if (!rbuf) { *tvbuf= maxto; *tv_io= tvbuf; return; }
191 if (timercmp(rbuf,&maxto,>)) *rbuf= maxto;
192}
193
194static void inter_maxtoabs(struct timeval **tv_io, struct timeval *tvbuf,
195 struct timeval now, struct timeval maxtime) {
196 ldiv_t dr;
197
198 maxtime.tv_sec -= (now.tv_sec-1);
199 maxtime.tv_usec += (1000-now.tv_usec);
200 dr= ldiv(maxtime.tv_usec,1000);
201 maxtime.tv_sec += dr.quot;
202 maxtime.tv_usec -= dr.rem;
203 inter_maxto(tv_io,tvbuf,maxtime);
204}
205
206static void localresourcerr(struct timeval **tv_io, struct timeval *tvbuf,
207 const char *syscall) {
208 struct timeval tvto_lr;
209
37e28fde 210 warn(ads,"local system resources scarce (during %s): %s",syscall,strerror(errno));
656b2da9 211 timerclear(&tvto_lr); timevaladd(&tvto_lr,LOCALRESOURCEMS);
212 inter_maxto(tv_io, tvbuf, tvto_lr);
213 return;
214}
215
216static void inter_addfd(int *maxfd, fd_set *fds, int fd) {
217 if (fd>=*maxfd) *maxfd= fd+1;
218 FD_SET(fd,fds);
219}
220
221void adns_interest(adns_state ads, int *maxfd,
222 fd_set *readfds, fd_set *writefds, fd_set *exceptfds,
223 struct timeval **tv_io, struct timeval *tvbuf) {
224 struct timeval now;
225 adns_query qu;
226 int r;
227
228 r= gettimeofday(&now,0);
229 if (r) { localresourcerr(tv_io,tvbuf,"gettimeofday"); return; }
230
231 for (qu= ads->timew; qu; qu= nqu) {
232 nqu= qu->next;
233 if (timercmp(&now,qu->timeout,>)) {
234 DLIST_UNLINK(ads->timew,qu);
235 if (qu->nextudpserver == -1) {
236 query_fail(ads,qu,adns_s_notresponding);
237 } else {
238 DLIST_LINKTAIL(ads->tosend,qu);
239 }
240 } else {
241 inter_maxtoabs(tv_io,tvbuf,now,qu->timeout);
242 }
243 }
244
245 for (qu= ads->tosend; qu; qu= nqu) {
246 nqu= qu->next;
247 quproc_tosend(ads,qu,now);
248 }
249
250 inter_addfd(maxfd,readfds,ads->udpsocket);
37e28fde 251
656b2da9 252 switch (ads->tcpstate) {
253 case server_disc:
254 break;
255 case server_connecting:
256 inter_addfd(maxfd,writefds,ads->tcpsocket);
257 break;
258 case server_connected:
259 inter_addfd(maxfd,readfds,ads->tcpsocket);
260 inter_addfd(maxfd,exceptfds,ads->tcpsocket);
261 if (ads->opbufused) inter_addfd(maxfd,writefds,ads->tcpsocket);
262 default:
263 abort();
264 }
656b2da9 265}
266
267static int internal_check(adns_state ads,
268 adns_query *query_io,
269 adns_answer **answer,
270 void **context_r) {
271 adns_query qu;
272
273 qu= *query_io;
274 if (!qu) {
275 if (!ads->output.head) return EWOULDBLOCK;
276 qu= ads->output.head;
277 } else {
278 if (qu->id>=0) return EWOULDBLOCK;
279 }
280 LIST_UNLINK(ads->output,qu);
281 *answer= qu->answer;
282 if (context_r) *context_r= qu->context;
283 free(qu);
284 return 0;
285}
286
287int adns_wait(adns_state ads,
288 adns_query *query_io,
289 adns_answer **answer_r,
290 void **context_r) {
291 int r, maxfd, rsel, rcb;
292 fd_set readfds, writefds, exceptfds;
293 struct timeval tvbuf, *tvp;
294
295 for (;;) {
296 r= internal_check(ads,query_io,answer_r,context_r);
297 if (r && r != EWOULDBLOCK) return r;
656b2da9 298 maxfd= 0; tvp= 0;
37e28fde 299 FD_ZERO(&readfds); FD_ZERO(&writefds); FD_ZERO(&exceptfds);
656b2da9 300 adns_interest(ads,&maxfd,&readfds,&writefds,&exceptfds,&tvp,&tvbuf);
301 rsel= select(maxfd,&readfds,&writefds,&exceptfds,tvp);
302 if (rsel==-1) return r;
303 rcb= adns_callback(ads,maxfd,&readfds,&writefds,&exceptfds);
304 assert(rcb==rsel);
305 }
306}
307
308int adns_check(adns_state ads,
309 adns_query *query_io,
310 adns_answer **answer_r,
311 void **context_r) {
312 autosys(ads);
313 return internal_check(ads,query_io,answer_r,context_r);
314}