////////////////////////////////////////////////////////////////////////////////////////// // A multi-platform support c++11 library with focus on asynchronous socket I/O for any // client application. ////////////////////////////////////////////////////////////////////////////////////////// /* The MIT License (MIT) Copyright (c) 2012-2023 HALX99 HAL: Hardware Abstraction Layer X99: Intel X99 Mainboard Platform Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ #ifndef YASIO__CORE_CPP #define YASIO__CORE_CPP #if !defined(YASIO_HEADER_ONLY) # include "yasio/yasio.hpp" #endif #include #include #include #include #include #include "yasio/detail/thread_name.hpp" #if defined(YASIO_SSL_BACKEND) # include "yasio/detail/ssl.hpp" #endif #if defined(YASIO_HAVE_KCP) # include "kcp/ikcp.h" #endif #if defined(YASIO_HAVE_CARES) # include "yasio/detail/ares.hpp" #endif // clang-format off #define YASIO_KLOG_CP(level, format, ...) \ do \ { \ auto& __cprint = __get_cprint(); \ auto __msg = ::yasio::strfmt(127, "[yasio][%lld]" format "\n", ::yasio::clock(), ##__VA_ARGS__); \ if (__cprint) \ __cprint(level, __msg.c_str()); \ else \ YASIO_LOG_TAG("", "%s", __msg.c_str()); \ } while (false) // clang-format on #define YASIO_KLOGD(format, ...) YASIO_KLOG_CP(YLOG_D, format, ##__VA_ARGS__) #define YASIO_KLOGI(format, ...) YASIO_KLOG_CP(YLOG_I, format, ##__VA_ARGS__) #define YASIO_KLOGW(format, ...) YASIO_KLOG_CP(YLOG_W, format, ##__VA_ARGS__) #define YASIO_KLOGE(format, ...) YASIO_KLOG_CP(YLOG_E, format, ##__VA_ARGS__) #if !defined(YASIO_VERBOSE_LOG) # define YASIO_KLOGV(fmt, ...) (void)0 #else # define YASIO_KLOGV(format, ...) YASIO_KLOG_CP(YLOG_V, format, ##__VA_ARGS__) #endif #if defined(_MSC_VER) # pragma warning(push) # pragma warning(disable : 6320 6322 4996) #endif namespace yasio { YASIO__NS_INLINE namespace inet { namespace { enum : uint8_t { // op masks and stop flags YOPM_OPEN = 1, YOPM_CLOSE = 1 << 1, YSTF_STOP = 1 << 2, YSTF_FINALIZE = 1 << 3 }; enum { /* whether udp server enable multicast service */ YCPF_MCAST = 1 << 17, /* whether multicast loopback, if 1, local machine can recv self multicast packet */ YCPF_MCAST_LOOPBACK = 1 << 18, /* whether host dirty */ YCPF_HOST_DIRTY = 1 << 19, /* whether port dirty */ YCPF_PORT_DIRTY = 1 << 20, /* host is domain name, needs query via internet */ YCPF_NEEDS_QUERY = 1 << 21, /// below is byte2 of private flags (25~32) are mutable, and will be cleared automatically when connect flow done, see clear_mutable_flags. }; namespace { // the minimal wait duration for select static highp_time_t yasio__min_wait_usec = 0LL; // By default we will wait no longer than 5 minutes. This will ensure that // any changes to the system clock are detected after no longer than this. static const highp_time_t yasio__max_wait_usec = 5 * 60 * 1000 * 1000LL; // the max transport alloc size static const size_t yasio__max_tsize = (std::max)({sizeof(io_transport_tcp), sizeof(io_transport_udp), sizeof(io_transport_ssl), sizeof(io_transport_kcp)}); } // namespace struct yasio__global_state { enum { INITF_SSL = 1, INITF_CARES = 2, }; yasio__global_state(const print_fn2_t& custom_print) { auto __get_cprint = [&]() -> const print_fn2_t& { return custom_print; }; // for single core CPU, we set minimal wait duration to 10us by default yasio__min_wait_usec = std::thread::hardware_concurrency() > 1 ? 0LL : 10LL; #if defined(YASIO_SSL_BACKEND) && YASIO_SSL_BACKEND == 1 # if OPENSSL_VERSION_NUMBER >= 0x10100000 && !defined(LIBRESSL_VERSION_NUMBER) if (OPENSSL_init_ssl(0, nullptr) == 1) { yasio__setbits(this->init_flags_, INITF_SSL); ERR_clear_error(); } # endif #endif #if defined(YASIO_HAVE_CARES) int ares_status = ::ares_library_init(ARES_LIB_INIT_ALL); if (ares_status == 0) yasio__setbits(init_flags_, INITF_CARES); else YASIO_KLOGI("[global] c-ares library init failed, status=%d, detail:%s", ares_status, ::ares_strerror(ares_status)); # if defined(__ANDROID__) ares_status = ::yasio__ares_init_android(); if (ares_status != 0) YASIO_KLOGI("[global] c-ares library init android failed, status=%d, detail:%s", ares_status, ::ares_strerror(ares_status)); # endif #endif // print version & transport alloc size YASIO_KLOGI("[global] the yasio-%x.%x.%x is initialized, the size of per transport is %d when object_pool enabled.", (YASIO_VERSION_NUM >> 16) & 0xff, (YASIO_VERSION_NUM >> 8) & 0xff, YASIO_VERSION_NUM & 0xff, yasio__max_tsize); YASIO_KLOGI("[global] sizeof(io_event)=%d", sizeof(io_event)); } ~yasio__global_state() { #if defined(YASIO_HAVE_CARES) if (yasio__testbits(this->init_flags_, INITF_CARES)) ::ares_library_cleanup(); #endif } int init_flags_ = 0; print_fn2_t cprint_; }; static yasio__global_state& yasio__shared_globals(const print_fn2_t& prt = nullptr) { static yasio__global_state __global_state(prt); return __global_state; } } // namespace /// highp_timer void highp_timer::async_wait(io_service& service, timer_cb_t cb) { service.schedule_timer(this, std::move(cb)); } void highp_timer::cancel(io_service& service) { if (!expired()) service.remove_timer(this); } /// io_send_op int io_send_op::perform(io_transport* transport, const void* buf, int n, int& error) { return transport->write_cb_(buf, n, nullptr, error); } /// io_sendto_op int io_sendto_op::perform(io_transport* transport, const void* buf, int n, int& error) { return transport->write_cb_(buf, n, std::addressof(destination_), error); } /// io_channel io_channel::io_channel(io_service& service, int index) : io_base(), service_(service) { socket_ = std::make_shared(); state_ = io_base::state::CLOSED; index_ = index; decode_len_ = [this](void* ptr, int len) { return this->__builtin_decode_len(ptr, len); }; } #if defined(YASIO_SSL_BACKEND) SSL_CTX* io_channel::get_ssl_context(bool client) const { if (client) return service_.ssl_roles_[YSSL_CLIENT]; auto& ctx = service_.ssl_roles_[YSSL_SERVER]; return (ctx) ? ctx : service_.init_ssl_context(YSSL_SERVER); } #endif const print_fn2_t& io_channel::__get_cprint() const { return get_service().options_.print_; } std::string io_channel::format_destination() const { if (yasio__testbits(properties_, YCPF_NEEDS_QUERY)) return yasio::strfmt(127, "%s(%s):%u", remote_host_.c_str(), !remote_eps_.empty() ? remote_eps_[0].ip().c_str() : "undefined", remote_port_); return yasio::strfmt(127, "%s:%u", remote_host_.c_str(), remote_port_); } void io_channel::enable_multicast(const char* addr, int loopback) { yasio__setbits(properties_, YCPF_MCAST); if (loopback) yasio__setbits(properties_, YCPF_MCAST_LOOPBACK); if (addr) multiaddr_.as_in(addr, (u_short)0); } void io_channel::join_multicast_group() { if (socket_->is_open()) { // interface switch (multiif_.af()) { case AF_INET: socket_->set_optval(IPPROTO_IP, IP_MULTICAST_IF, multiif_.in4_.sin_addr); break; case AF_INET6: socket_->set_optval(IPPROTO_IPV6, IP_MULTICAST_IF, multiif_.in6_.sin6_scope_id); break; } int loopback = yasio__testbits(properties_, YCPF_MCAST_LOOPBACK) ? 1 : 0; socket_->set_optval(multiaddr_.af() == AF_INET ? IPPROTO_IP : IPPROTO_IPV6, multiaddr_.af() == AF_INET ? IP_MULTICAST_LOOP : IPV6_MULTICAST_LOOP, loopback); // ttl socket_->set_optval(multiaddr_.af() == AF_INET ? IPPROTO_IP : IPPROTO_IPV6, multiaddr_.af() == AF_INET ? IP_MULTICAST_TTL : IPV6_MULTICAST_HOPS, YASIO_DEFAULT_MULTICAST_TTL); if (configure_multicast_group(true) != 0) { int ec = xxsocket::get_last_errno(); YASIO_KLOGE("[index: %d] join to multicast group %s failed, ec=%d, detail:%s", this->index_, multiaddr_.to_string().c_str(), ec, xxsocket::strerror(ec)); } } } void io_channel::disable_multicast() { yasio__clearbits(properties_, YCPF_MCAST); yasio__clearbits(properties_, YCPF_MCAST_LOOPBACK); if (socket_->is_open()) configure_multicast_group(false); } int io_channel::configure_multicast_group(bool onoff) { if (multiaddr_.af() == AF_INET) { // ipv4 struct ip_mreq mreq; mreq.imr_interface.s_addr = multiif_.in4_.sin_addr.s_addr; mreq.imr_multiaddr = multiaddr_.in4_.sin_addr; return socket_->set_optval(IPPROTO_IP, onoff ? IP_ADD_MEMBERSHIP : IP_DROP_MEMBERSHIP, &mreq, (int)sizeof(mreq)); } else { // ipv6 struct ipv6_mreq mreq_v6; mreq_v6.ipv6mr_interface = multiif_.in6_.sin6_scope_id; mreq_v6.ipv6mr_multiaddr = multiaddr_.in6_.sin6_addr; return socket_->set_optval(IPPROTO_IPV6, onoff ? IPV6_JOIN_GROUP : IPV6_LEAVE_GROUP, &mreq_v6, (int)sizeof(mreq_v6)); } } void io_channel::set_host(cxx17::string_view host) { if (this->remote_host_ != host) { cxx17::assign(this->remote_host_, host); yasio__setbits(properties_, YCPF_HOST_DIRTY); } } void io_channel::set_port(u_short port) { if (port == 0) return; if (this->remote_port_ != port) { this->remote_port_ = port; yasio__setbits(properties_, YCPF_PORT_DIRTY); } } int io_channel::__builtin_decode_len(void* d, int n) { int loffset = uparams_.length_field_offset; int lsize = uparams_.length_field_length; if (loffset >= 0) { assert(lsize >= 1 && lsize <= YASIO_SSIZEOF(int)); int len = 0; if (n >= (loffset + lsize)) { ::memcpy(&len, (uint8_t*)d + loffset, lsize); if (!uparams_.no_bswap) len = yasio::network_to_host(len, lsize); len += uparams_.length_adjustment; if (len > uparams_.max_frame_length) len = -1; } return len; } return n; } // -------------------- io_transport --------------------- io_transport::io_transport(io_channel* ctx, xxsocket_ptr&& s) : ctx_(ctx) { this->state_ = io_base::state::OPENED; this->socket_ = std::move(s); #if !defined(YASIO_MINIFY_EVENT) this->ud_.ptr = nullptr; #endif } const print_fn2_t& io_transport::__get_cprint() const { return ctx_->get_service().options_.print_; } int io_transport::write(sbyte_buffer&& buffer, completion_cb_t&& handler) { int n = static_cast(buffer.size()); send_queue_.emplace(cxx14::make_unique(std::move(buffer), std::move(handler))); get_service().interrupt(); return n; } int io_transport::do_read(int revent, int& error, highp_time_t&) { return this->call_read(buffer_ + offset_, sizeof(buffer_) - offset_, revent, error); } bool io_transport::do_write(highp_time_t& wait_duration) { bool ret = false; do { if (!socket_->is_open()) break; int error = 0; auto wrap = send_queue_.peek(); if (wrap) { auto& v = *wrap; if (call_write(v.get(), error) < 0) { this->set_last_errno(error, yasio::io_base::error_stage::WRITE); break; } } bool no_wevent = send_queue_.empty(); if (yasio__unlikely(!no_wevent)) { // still have work to do no_wevent = (error != EWOULDBLOCK && error != EAGAIN && error != ENOBUFS); if (!no_wevent) { // system kernel buffer full if (!pollout_registerred_) { get_service().register_descriptor(socket_->native_handle(), socket_event::write); pollout_registerred_ = true; } } else wait_duration = yasio__min_wait_usec; } if (no_wevent && pollout_registerred_) { get_service().deregister_descriptor(socket_->native_handle(), socket_event::write); pollout_registerred_ = false; } ret = true; } while (false); return ret; } int io_transport::call_read(void* data, int size, int revent, int& error) { int n = read_cb_(data, size, revent, error); if (n > 0) { ctx_->bytes_transferred_ += n; return n; } if (n < 0) { if (xxsocket::not_recv_error(error)) return (error = 0); // status ok, clear error return n; } if (yasio__testbits(ctx_->properties_, YCM_TCP)) { error = yasio::errc::eof; return -1; } return 0; } int io_transport::call_write(io_send_op* op, int& error) { int n = op->perform(this, op->buffer_.data() + op->offset_, static_cast(op->buffer_.size() - op->offset_), error); if (n > 0) { // #performance: change offset only, remain data will be send at next frame. op->offset_ += n; if (op->offset_ == op->buffer_.size()) this->complete_op(op, 0); } else if (n < 0) { if (xxsocket::not_send_error(error)) n = 0; else if (yasio__testbits(ctx_->properties_, YCM_UDP)) { // !!! For udp, simply drop the op instead trigger handle close, // on android device, the error will be 'EPERM' when app in background. this->complete_op(op, error); n = 0; } } return n; } void io_transport::complete_op(io_send_op* op, int error) { YASIO_KLOGV("[index: %d] write complete, bytes transferred: %d/%d", this->cindex(), static_cast(op->offset_), static_cast(op->buffer_.size())); if (op->handler_) op->handler_(error, op->offset_); send_queue_.pop(); } void io_transport::set_primitives() { this->write_cb_ = [this](const void* data, int len, const ip::endpoint*, int& error) { int n = socket_->send(data, len); if (n < 0) error = xxsocket::get_last_errno(); return n; }; this->read_cb_ = [this](void* data, int len, int revent, int& error) { if (revent) { int n = socket_->recv(data, len); if (n < 0) error = xxsocket::get_last_errno(); return n; } error = EWOULDBLOCK; return -1; }; } // -------------------- io_transport_tcp --------------------- inline io_transport_tcp::io_transport_tcp(io_channel* ctx, xxsocket_ptr&& s) : io_transport(ctx, std::forward(s)) {} // ----------------------- io_transport_ssl ---------------- #if defined(YASIO_SSL_BACKEND) io_transport_ssl::io_transport_ssl(io_channel* ctx, xxsocket_ptr&& sock) : io_transport_tcp(ctx, std::forward(sock)) { this->state_ = io_base::state::CONNECTING; // for ssl, inital state shoud be connecing for ssl handshake bool client = yasio__testbits(ctx->properties_, YCM_CLIENT); this->ssl_ = yssl_new(ctx->get_ssl_context(client), static_cast(this->socket_->native_handle()), ctx->remote_host_.c_str(), client); } int io_transport_ssl::do_ssl_handshake(int& error) { int ret = yssl_do_handshake(ssl_, error); if (ret == 0) // handshake succeed { // because we invoke handshake in call_read, so we emit EWOULDBLOCK to mark ssl transport status `ok` this->state_ = io_base::state::OPENED; this->read_cb_ = [this](void* data, int len, int revent, int& error) { if (revent) return yssl_read(ssl_, data, len, error); error = EWOULDBLOCK; return -1; }; this->write_cb_ = [this](const void* data, int len, const ip::endpoint*, int& error) { return yssl_write(ssl_, data, len, error); }; YASIO_KLOGD("[index: %d] the connection #%u <%s> --> <%s> is established.", ctx_->index_, this->id_, this->local_endpoint().to_string().c_str(), this->remote_endpoint().to_string().c_str()); get_service().fire_event(ctx_->index_, YEK_ON_OPEN, 0, this); error = EWOULDBLOCK; } else { if (error == EWOULDBLOCK) get_service().interrupt(); else { // handshake failed, print reason char buf[256] = {0}; YASIO_KLOGE("[index: %d] do_ssl_handshake fail with %s", ctx_->index_, yssl_strerror(ssl_, ret, buf, sizeof(buf))); if (yasio__testbits(ctx_->properties_, YCM_CLIENT)) { YASIO_KLOGE("[index: %d] connect server %s failed, ec=%d, detail:%s", ctx_->index_, ctx_->format_destination().c_str(), error, io_service::strerror(error)); get_service().fire_event(ctx_->index(), YEK_ON_OPEN, error, ctx_); } } } return -1; } void io_transport_ssl::do_ssl_shutdown() { if (ssl_) yssl_shutdown(ssl_); } void io_transport_ssl::set_primitives() { this->read_cb_ = [this](void* /*data*/, int /*len*/, int /*revent*/, int& error) { return do_ssl_handshake(error); }; } #endif // ----------------------- io_transport_udp ---------------- io_transport_udp::io_transport_udp(io_channel* ctx, xxsocket_ptr&& s) : io_transport(ctx, std::forward(s)) {} io_transport_udp::~io_transport_udp() {} ip::endpoint io_transport_udp::remote_endpoint() const { return !connected_ ? this->peer_ : socket_->peer_endpoint(); } const ip::endpoint& io_transport_udp::ensure_destination() const { if (this->destination_.af() != AF_UNSPEC) return this->destination_; return (this->destination_ = this->peer_); } void io_transport_udp::confgure_remote(const ip::endpoint& peer) { if (connected_) // connected, update peer is pointless and useless return; this->peer_ = peer; if (!yasio__testbits(ctx_->properties_, YCPF_MCAST) || !yasio__testbits(ctx_->properties_, YCM_CLIENT)) this->connect(); // multicast client, don't bind multicast address for we can recvfrom non-multicast address } void io_transport_udp::connect() { if (connected_) return; if (this->peer_.af() == AF_UNSPEC) { if (ctx_->remote_eps_.empty()) return; this->peer_ = ctx_->remote_eps_[0]; } int retval = this->socket_->connect_n(this->peer_); connected_ = (retval == 0); set_primitives(); } void io_transport_udp::disconnect() { #if defined(__linux__) auto ifaddr = this->socket_->local_endpoint(); #endif int retval = this->socket_->disconnect(); #if defined(__linux__) if (retval == 0) { // Because some of linux will unbind when disconnect succeed, so try to rebind ifaddr.ip(ctx_->local_host_.empty() ? YASIO_ADDR_ANY(ifaddr.af()) : ctx_->local_host_.c_str()); this->socket_->bind(ifaddr); } #else YASIO__UNUSED_PARAM(retval); #endif connected_ = false; set_primitives(); } int io_transport_udp::write(sbyte_buffer&& buffer, completion_cb_t&& handler) { return connected_ ? io_transport::write(std::move(buffer), std::move(handler)) : write_to(std::move(buffer), ensure_destination(), std::move(handler)); } int io_transport_udp::write_to(sbyte_buffer&& buffer, const ip::endpoint& to, completion_cb_t&& handler) { int n = static_cast(buffer.size()); send_queue_.emplace(cxx14::make_unique(std::move(buffer), std::move(handler), to)); get_service().interrupt(); return n; } void io_transport_udp::set_primitives() { if (connected_) io_transport::set_primitives(); else { this->write_cb_ = [this](const void* data, int len, const ip::endpoint* destination, int& error) { assert(destination); int n = socket_->sendto(data, len, *destination); if (n < 0) { error = xxsocket::get_last_errno(); if (!xxsocket::not_send_error(error)) YASIO_KLOGW("[index: %d] write udp socket failed, ec=%d, detail:%s", this->cindex(), error, io_service::strerror(error)); } return n; }; this->read_cb_ = [this](void* data, int len, int revent, int& error) { if (revent) { ip::endpoint peer; int n = socket_->recvfrom(data, len, peer); if (n > 0) this->peer_ = peer; if (n < 0) error = xxsocket::get_last_errno(); return n; } error = EWOULDBLOCK; return -1; }; } } int io_transport_udp::handle_input(const char* data, int bytes_transferred, int& /*error*/, highp_time_t&) { // pure udp, dispatch to upper layer directly get_service().fire_event(this->cindex(), io_packet{data, data + bytes_transferred}, this); return bytes_transferred; } #if defined(YASIO_HAVE_KCP) // ----------------------- io_transport_kcp ------------------ io_transport_kcp::io_transport_kcp(io_channel* ctx, xxsocket_ptr&& s) : io_transport_udp(ctx, std::forward(s)) { this->kcp_ = ::ikcp_create(static_cast(ctx->kcp_conv_), this); this->rawbuf_.resize(YASIO_INET_BUFFER_SIZE); ::ikcp_nodelay(this->kcp_, 1, 5000 /*kcp max interval is 5000(ms)*/, 2, 1); ::ikcp_setoutput(this->kcp_, [](const char* buf, int len, ::ikcpcb* /*kcp*/, void* user) { auto t = (io_transport_kcp*)user; if (yasio__min_wait_usec == 0) { int ignored_ec = 0; return t->write_cb_(buf, len, std::addressof(t->ensure_destination()), ignored_ec); } // Enqueue to transport queue return t->io_transport_udp::write(sbyte_buffer{buf, buf + len}, nullptr); }); } io_transport_kcp::~io_transport_kcp() { ::ikcp_release(this->kcp_); } int io_transport_kcp::write(sbyte_buffer&& buffer, completion_cb_t&& /*handler*/) { std::lock_guard lck(send_mtx_); int len = static_cast(buffer.size()); int retval = ::ikcp_send(kcp_, buffer.data(), len); get_service().interrupt(); return retval == 0 ? len : retval; } int io_transport_kcp::do_read(int revent, int& error, highp_time_t& wait_duration) { int n = this->call_read(&rawbuf_.front(), static_cast(rawbuf_.size()), revent, error); if (n > 0) this->handle_input(rawbuf_.data(), n, error, wait_duration); if (!error) { // !important, should always try to call ikcp_recv when no error occured. n = ::ikcp_recv(kcp_, buffer_ + offset_, sizeof(buffer_) - offset_); if (n > 0) // If got data from kcp, don't wait wait_duration = yasio__min_wait_usec; else if (n < 0) n = 0; // EAGAIN/EWOULDBLOCK } return n; } int io_transport_kcp::handle_input(const char* buf, int len, int& error, highp_time_t& wait_duration) { // ikcp in event always in service thread, so no need to lock if (0 == ::ikcp_input(kcp_, buf, len)) { this->check_timeout(wait_duration); // call ikcp_check return len; } // simply regards -1,-2,-3 as error and trigger connection lost event. error = yasio::errc::invalid_packet; return -1; } bool io_transport_kcp::do_write(highp_time_t& wait_duration) { std::lock_guard lck(send_mtx_); ::ikcp_update(kcp_, static_cast(::yasio::clock())); ::ikcp_flush(kcp_); this->check_timeout(wait_duration); // call ikcp_check if (yasio__min_wait_usec == 0) return true; // Call super do_write to perform low layer socket.send // benefit of transport queue: // a. cache udp data if kernel buffer full // b. lower packet lose, but may reduce transfer performance and large memory use return io_transport_udp::do_write(wait_duration); } void io_transport_kcp::check_timeout(highp_time_t& wait_duration) const { auto current = static_cast(::yasio::clock()); auto expire_time = ::ikcp_check(kcp_, current); highp_time_t duration = static_cast(expire_time - current) * std::milli::den; if (duration < 0) duration = yasio__min_wait_usec; if (wait_duration > duration) wait_duration = duration; } #endif // ------------------------ io_service ------------------------ void io_service::init_globals(const yasio::inet::print_fn2_t& prt) { yasio__shared_globals(prt).cprint_ = prt; } void io_service::cleanup_globals() { yasio__shared_globals().cprint_ = nullptr; } unsigned int io_service::tcp_rtt(transport_handle_t transport) { return transport->is_open() ? transport->socket_->tcp_rtt() : 0; } io_service::io_service() { this->initialize(nullptr, 1); } io_service::io_service(int channel_count) { this->initialize(nullptr, channel_count); } io_service::io_service(const io_hostent& channel_ep) { this->initialize(&channel_ep, 1); } io_service::io_service(const std::vector& channel_eps) { this->initialize(!channel_eps.empty() ? channel_eps.data() : nullptr, static_cast(channel_eps.size())); } io_service::io_service(const io_hostent* channel_eps, int channel_count) { this->initialize(channel_eps, channel_count); } io_service::~io_service() { this->do_stop(YSTF_FINALIZE); this->finalize(); } void io_service::start(event_cb_t cb) { if (state_ == io_service::state::IDLE) { auto& global_state = yasio__shared_globals(); if (!this->options_.print_) this->options_.print_ = global_state.cprint_; if (cb) options_.on_event_ = std::move(cb); this->state_ = io_service::state::RUNNING; if (!options_.no_new_thread_) { this->worker_ = std::thread(&io_service::run, this); this->worker_id_ = worker_.get_id(); } else { this->worker_id_ = std::this_thread::get_id(); this->options_.deferred_event_ = false; run(); handle_stop(); } } } void io_service::stop() { do_stop(YSTF_STOP); } void io_service::do_stop(uint8_t flags) { if (this->state_ <= io_service::state::IDLE) return; if (!this->stop_flag_) { this->stop_flag_ = flags; if (this->state_ == io_service::state::RUNNING) { for (auto c : channels_) this->close(c->index()); this->interrupt(); this->handle_stop(); } } else this->handle_stop(); } void io_service::handle_stop() { if (this->worker_.joinable()) { if (std::this_thread::get_id() == this->worker_id_) { if (yasio__testbits(this->stop_flag_, YSTF_FINALIZE)) std::terminate(); // we don't want, but... xxsocket::set_last_errno(EAGAIN); return; } this->worker_.join(); } if (this->state_ != state::AT_EXITING) return; if (this->options_.deferred_event_ && !this->events_.empty()) this->dispatch((std::numeric_limits::max)()); clear_transports(); this->timer_queue_.clear(); this->stop_flag_ = 0; this->worker_id_ = std::thread::id{}; this->state_ = io_service::state::IDLE; } void io_service::initialize(const io_hostent* channel_eps, int channel_count) { #if defined(YASIO_SSL_BACKEND) ssl_roles_[YSSL_CLIENT] = ssl_roles_[YSSL_SERVER] = nullptr; #endif this->wait_duration_ = yasio__max_wait_usec; // at least one channel if (channel_count < 1) channel_count = 1; options_.resolv_ = [this](std::vector& eps, const char* host, unsigned short port) { return this->resolve(eps, host, port); }; register_descriptor(interrupter_.read_descriptor(), socket_event::read); // create channels create_channels(channel_eps, channel_count); #if !defined(YASIO_HAVE_CARES) life_mutex_ = std::make_shared(); life_token_ = std::make_shared(); #endif this->state_ = io_service::state::IDLE; } void io_service::finalize() { if (this->state_ == io_service::state::IDLE) { #if !defined(YASIO_HAVE_CARES) std::unique_lock lck(*life_mutex_); life_token_.reset(); #endif destroy_channels(); deregister_descriptor(interrupter_.read_descriptor(), socket_event::read); options_.on_event_ = nullptr; options_.resolv_ = nullptr; for (auto o : tpool_) ::operator delete(o); tpool_.clear(); this->state_ = io_service::state::UNINITIALIZED; } } void io_service::create_channels(const io_hostent* channel_eps, int channel_count) { for (auto i = 0; i < channel_count; ++i) { auto channel = new io_channel(*this, i); if (channel_eps != nullptr) channel->set_address(channel_eps[i].host_, channel_eps[i].port_); channels_.push_back(channel); } } void io_service::destroy_channels() { this->channel_ops_.clear(); for (auto channel : channels_) { channel->timer_.cancel(*this); cleanup_io(channel); delete channel; } channels_.clear(); } void io_service::clear_transports() { for (auto transport : transports_) { cleanup_io(transport); yasio::invoke_dtor(transport); this->tpool_.push_back(transport); } transports_.clear(); } void io_service::dispatch(int max_count) { if (options_.on_event_) this->events_.consume(max_count, options_.on_event_); } void io_service::run() { yasio::set_thread_name("yasio"); #if defined(YASIO_SSL_BACKEND) init_ssl_context(YSSL_CLIENT); // by default, init ssl client context #endif #if defined(YASIO_HAVE_CARES) recreate_ares_channel(); ares_socket_t ares_socks[ARES_GETSOCK_MAXNUM] = {0}; #endif // Call once at startup this->ipsv_ = static_cast(xxsocket::getipsv()); // The core event loop fd_set_adapter fd_set; // The temp file descriptor set do { fd_set = this->fd_set_; const auto waitd_usec = get_timeout(this->wait_duration_); // Gets current wait duration #if defined(YASIO_HAVE_CARES) /** * retrieves the set of file descriptors which the calling application should poll io, * after poll_io, for ares invoke flow, refer to: * https://c-ares.org/ares_fds.html * https://c-ares.org/ares_timeout.html * https://c-ares.org/ares_process_fd.html */ timeval waitd_tv = {(decltype(timeval::tv_sec))(waitd_usec / std::micro::den), (decltype(timeval::tv_usec))(waitd_usec % std::micro::den)}; auto ares_nfds = do_ares_fds(ares_socks, fd_set, waitd_tv); const auto waitd_ms = static_cast(waitd_tv.tv_sec * std::milli::den + waitd_tv.tv_usec / std::milli::den); #else const auto waitd_ms = static_cast(waitd_usec / std::milli::den); #endif if (waitd_ms > 0) { YASIO_KLOGV("[core] poll_io max_nfds=%d, waiting... %ld milliseconds", fd_set.max_descriptor(), waitd_ms); int retval = fd_set.poll_io(waitd_ms); YASIO_KLOGV("[core] poll_io waked up, retval=%d", retval); if (retval < 0) { int ec = xxsocket::get_last_errno(); YASIO_KLOGI("[core] poll_io failed, max_fd=%d ec=%d, detail:%s\n", fd_set.max_descriptor(), ec, io_service::strerror(ec)); if (ec != EBADF) continue; // Try again. break; } if (retval == 0) YASIO_KLOGV("%s", "[core] poll_io timeout"); else if (fd_set.is_set(this->interrupter_.read_descriptor(), socket_event::read)) { // Reset the interrupter. if (!interrupter_.reset()) interrupter_.recreate(); --retval; } } #if defined(YASIO_HAVE_CARES) // process events for name resolution. do_ares_process_fds(ares_socks, ares_nfds, fd_set); #endif // process active transports process_transports(fd_set); // process active channels process_channels(fd_set); // process timeout timers process_timers(); } while (!this->stop_flag_ || !this->transports_.empty()); #if defined(YASIO_HAVE_CARES) destroy_ares_channel(); #endif #if defined(YASIO_SSL_BACKEND) cleanup_ssl_context(YSSL_CLIENT); cleanup_ssl_context(YSSL_SERVER); #endif this->state_ = io_service::state::AT_EXITING; } void io_service::process_transports(fd_set_adapter& fd_set) { // preform transports for (auto iter = transports_.begin(); iter != transports_.end();) { auto transport = *iter; bool ok = (do_read(transport, fd_set) && do_write(transport)); if (ok) { int opm = transport->opmask_ | transport->ctx_->opmask_ | this->stop_flag_; if (0 == opm) { // no open/close/stop operations request ++iter; continue; } if (transport->error_ == 0) transport->error_ = yasio::errc::shutdown_by_localhost; } handle_close(transport); iter = transports_.erase(iter); } } void io_service::process_channels(fd_set_adapter& fd_set) { if (!this->channel_ops_.empty()) { // perform active channels std::lock_guard lck(this->channel_ops_mtx_); for (auto iter = this->channel_ops_.begin(); iter != this->channel_ops_.end();) { auto ctx = *iter; bool finish = true; if (yasio__testbits(ctx->properties_, YCM_CLIENT)) { if (yasio__testbits(ctx->opmask_, YOPM_OPEN)) { yasio__clearbits(ctx->opmask_, YOPM_OPEN); ctx->state_ = io_base::state::RESOLVING; } if (ctx->state_ == io_base::state::RESOLVING) { if (do_resolve(ctx) == 0) do_connect(ctx); else if (ctx->error_ != EINPROGRESS) handle_connect_failed(ctx, ctx->error_); } else if (ctx->state_ == io_base::state::CONNECTING) do_connect_completion(ctx, fd_set); finish = ctx->error_ != EINPROGRESS; } else if (yasio__testbits(ctx->properties_, YCM_SERVER)) { auto opmask = ctx->opmask_; if (yasio__testbits(opmask, YOPM_OPEN)) do_accept(ctx); else if (yasio__testbits(opmask, YOPM_CLOSE)) cleanup_channel(ctx); finish = (ctx->state_ != io_base::state::OPENED); if (!finish) do_accept_completion(ctx, fd_set); else ctx->bytes_transferred_ = 0; } if (finish) iter = this->channel_ops_.erase(iter); else ++iter; } } } void io_service::close(int index) { // Gets channel context auto channel = channel_at(index); if (!channel) return; if (!yasio__testbits(channel->opmask_, YOPM_CLOSE)) { yasio__clearbits(channel->opmask_, YOPM_OPEN); if (channel->socket_->is_open()) { yasio__setbits(channel->opmask_, YOPM_CLOSE); this->interrupt(); } } } void io_service::close(transport_handle_t transport) { if (!yasio__testbits(transport->opmask_, YOPM_CLOSE)) { yasio__setbits(transport->opmask_, YOPM_CLOSE); this->interrupt(); } } bool io_service::is_open(transport_handle_t transport) const { return transport->is_open(); } bool io_service::is_open(int index) const { auto ctx = channel_at(index); return ctx != nullptr && ctx->state_ == io_base::state::OPENED; } bool io_service::open(size_t index, int kind) { assert((kind > 0 && kind <= 0xff) && ((kind & (kind - 1)) != 0)); auto ctx = channel_at(index); if (ctx != nullptr) { yasio__setlobyte(ctx->properties_, kind & 0xff); if (yasio__testbits(kind, YCM_TCP)) ctx->socktype_ = SOCK_STREAM; else if (yasio__testbits(kind, YCM_UDP)) ctx->socktype_ = SOCK_DGRAM; return open_internal(ctx); } return false; } io_channel* io_service::channel_at(size_t index) const { return (index < channels_.size()) ? channels_[index] : nullptr; } void io_service::handle_close(transport_handle_t thandle) { auto ctx = thandle->ctx_; auto error = thandle->error_; const bool client = yasio__testbits(ctx->properties_, YCM_CLIENT); if (thandle->state_ == io_base::state::OPENED) { // @Because we can't retrive peer endpoint when connect reset by peer, so use id to trace. YASIO_KLOGD("[index: %d] the connection #%u is lost, ec=%d, where=%d, detail:%s", ctx->index_, thandle->id_, error, (int)thandle->error_stage_, io_service::strerror(error)); this->fire_event(ctx->index(), YEK_ON_CLOSE, error, thandle); } #if defined(YASIO_SSL_BACKEND) if (yasio__testbits(ctx->properties_, YCM_SSL)) static_cast(thandle)->do_ssl_shutdown(); #endif if (yasio__testbits(ctx->properties_, YCM_TCP) && error == yasio::errc::shutdown_by_localhost) thandle->socket_->shutdown(); cleanup_io(thandle); deallocate_transport(thandle); if (client) { yasio__clearbits(ctx->opmask_, YOPM_CLOSE); cleanup_channel(ctx, false); } } void io_service::register_descriptor(const socket_native_type fd, int events) { this->fd_set_.set(fd, events); } void io_service::deregister_descriptor(const socket_native_type fd, int events) { this->fd_set_.unset(fd, events); } int io_service::write(transport_handle_t transport, sbyte_buffer buffer, completion_cb_t handler) { if (transport && transport->is_open()) return !buffer.empty() ? transport->write(std::move(buffer), std::move(handler)) : 0; else { YASIO_KLOGE("write failed, the connection not ok!"); return -1; } } int io_service::write_to(transport_handle_t transport, sbyte_buffer buffer, const ip::endpoint& to, completion_cb_t handler) { if (transport && transport->is_open()) return !buffer.empty() ? transport->write_to(std::move(buffer), to, std::move(handler)) : 0; else { YASIO_KLOGE("write_to failed, the connection not ok!"); return -1; } } void io_service::do_connect(io_channel* ctx) { assert(!ctx->remote_eps_.empty()); if (this->ipsv_ == 0) this->ipsv_ = static_cast(xxsocket::getipsv()); if (ctx->socket_->is_open()) cleanup_io(ctx); ctx->state_ = io_base::state::CONNECTING; auto& ep = ctx->remote_eps_[0]; YASIO_KLOGD("[index: %d] connecting server %s(%s):%u...", ctx->index_, ctx->remote_host_.c_str(), ep.ip().c_str(), ctx->remote_port_); if (ctx->socket_->open(ep.af(), ctx->socktype_)) { int ret = 0; if (yasio__testbits(ctx->properties_, YCF_REUSEADDR)) ctx->socket_->reuse_address(true); if (yasio__testbits(ctx->properties_, YCF_EXCLUSIVEADDRUSE)) ctx->socket_->exclusive_address(true); if (ctx->local_port_ != 0 || !ctx->local_host_.empty() || yasio__testbits(ctx->properties_, YCM_UDP)) { if (!yasio__testbits(ctx->properties_, YCM_UDS)) { auto ifaddr = ctx->local_host_.empty() ? YASIO_ADDR_ANY(ep.af()) : ctx->local_host_.c_str(); ret = ctx->socket_->bind(ifaddr, ctx->local_port_); } } if (ret == 0) { // tcp connect directly, for udp do not need to connect. if (yasio__testbits(ctx->properties_, YCM_TCP)) ret = xxsocket::connect_n(ctx->socket_->native_handle(), ep); else // udp, we should set non-blocking mode manually ctx->socket_->set_nonblocking(true); // join the multicast group for udp if (yasio__testbits(ctx->properties_, YCPF_MCAST)) ctx->join_multicast_group(); } if (ret < 0) { // setup non-blocking connect int error = xxsocket::get_last_errno(); if (error != EINPROGRESS && error != EWOULDBLOCK) this->handle_connect_failed(ctx, error); else { ctx->set_last_errno(EINPROGRESS); register_descriptor(ctx->socket_->native_handle(), socket_event::readwrite); ctx->timer_.expires_from_now(std::chrono::microseconds(options_.connect_timeout_)); ctx->timer_.async_wait_once(*this, [ctx](io_service& thiz) { if (ctx->state_ != io_base::state::OPENED) thiz.handle_connect_failed(ctx, ETIMEDOUT); }); } } else if (ret == 0) { // connect server successful immediately. register_descriptor(ctx->socket_->native_handle(), socket_event::read); handle_connect_succeed(ctx, ctx->socket_); } // !!!NEVER GO HERE } else this->handle_connect_failed(ctx, xxsocket::get_last_errno()); } void io_service::do_connect_completion(io_channel* ctx, fd_set_adapter& fd_set) { assert(ctx->state_ == io_base::state::CONNECTING); if (ctx->state_ == io_base::state::CONNECTING) { if (fd_set.is_set(ctx->socket_->native_handle(), socket_event::readwrite)) { int error = -1; if (ctx->socket_->get_optval(SOL_SOCKET, SO_ERROR, error) >= 0 && error == 0) { // The nonblocking tcp handshake complete, remove write event avoid high-CPU occupation deregister_descriptor(ctx->socket_->native_handle(), socket_event::write); handle_connect_succeed(ctx, ctx->socket_); } else handle_connect_failed(ctx, error); ctx->timer_.cancel(*this); } } } #if defined(YASIO_SSL_BACKEND) SSL_CTX* io_service::init_ssl_context(ssl_role role) { auto ctx = role == YSSL_CLIENT ? yssl_ctx_new(yssl_options{yasio__c_str(options_.cafile_), nullptr, true}) : yssl_ctx_new(yssl_options{yasio__c_str(options_.crtfile_), yasio__c_str(options_.keyfile_), false}); ssl_roles_[role] = ctx; return ctx; } void io_service::cleanup_ssl_context(ssl_role role) { auto& ctx = ssl_roles_[role]; if (ctx) yssl_ctx_free(ctx); } #endif #if defined(YASIO_HAVE_CARES) void io_service::ares_work_started() { ++ares_outstanding_work_; } void io_service::ares_work_finished() { if (ares_outstanding_work_ > 0) --ares_outstanding_work_; } void io_service::ares_getaddrinfo_cb(void* arg, int status, int /*timeouts*/, ares_addrinfo* answerlist) { auto ctx = (io_channel*)arg; auto& current_service = ctx->get_service(); current_service.ares_work_finished(); if (status == ARES_SUCCESS && answerlist != nullptr) { for (auto ai = answerlist->nodes; ai != nullptr; ai = ai->ai_next) { if (ai->ai_family == AF_INET6 || ai->ai_family == AF_INET) ctx->remote_eps_.push_back(ip::endpoint(ai->ai_addr)); } } auto __get_cprint = [&]() -> const print_fn2_t& { return current_service.options_.print_; }; if (!ctx->remote_eps_.empty()) { ctx->query_success_time_ = highp_clock(); # if defined(YASIO_ENABLE_ARES_PROFILER) YASIO_KLOGD("[index: %d] ares_getaddrinfo_cb: query %s succeed, cost:%g(ms)", ctx->index_, ctx->remote_host_.c_str(), (ctx->query_success_time_ - ctx->query_start_time_) / 1000.0); # endif } else { ctx->set_last_errno(yasio::errc::resolve_host_failed); YASIO_KLOGE("[index: %d] ares_getaddrinfo_cb: query %s failed, status=%d, detail:%s", ctx->index_, ctx->remote_host_.c_str(), status, ::ares_strerror(status)); } current_service.interrupt(); } int io_service::do_ares_fds(socket_native_type* socks, fd_set_adapter& fd_set, timeval& waitd_tv) { int nfds = 0; if (ares_outstanding_work_) { int bitmask = ::ares_getsock(this->ares_, socks, ARES_GETSOCK_MAXNUM); for (int i = 0; i < ARES_GETSOCK_MAXNUM; ++i) { int events = socket_event::null; if (ARES_GETSOCK_READABLE(bitmask, i)) events |= socket_event::read; if (ARES_GETSOCK_WRITABLE(bitmask, i)) events |= socket_event::write; if (events) { ++nfds; fd_set.set(socks[i], events); } else break; } if (nfds) ::ares_timeout(this->ares_, &waitd_tv, &waitd_tv); } return nfds; } void io_service::do_ares_process_fds(socket_native_type* socks, int nfds, fd_set_adapter& fd_set) { for (auto i = 0; i < nfds; ++i) { auto fd = socks[i]; ::ares_process_fd(this->ares_, fd_set.is_set(fd, socket_event::read) ? fd : ARES_SOCKET_BAD, fd_set.is_set(fd, socket_event::write) ? fd : ARES_SOCKET_BAD); } } void io_service::recreate_ares_channel() { if (ares_) destroy_ares_channel(); int optmask = ARES_OPT_TIMEOUTMS | ARES_OPT_TRIES /* | ARES_OPT_LOOKUPS*/; ares_options options = {}; options.timeout = static_cast(this->options_.dns_queries_timeout_ / std::milli::den); options.tries = this->options_.dns_queries_tries_; # if defined(__linux__) && !defined(__ANDROID__) if (yasio::is_regular_file(YASIO_SYSTEMD_RESOLV_PATH)) { options.resolvconf_path = strndup(YASIO_SYSTEMD_RESOLV_PATH, YASIO_SYSTEMD_RESOLV_PATH_LEN); optmask |= ARES_OPT_RESOLVCONF; } # endif int status = ::ares_init_options(&ares_, &options, optmask); if (status == ARES_SUCCESS) { YASIO_KLOGD("[c-ares] create channel succeed"); config_ares_name_servers(); } else YASIO_KLOGE("[c-ares] create channel failed, status=%d, detail:%s", status, ::ares_strerror(status)); } void io_service::config_ares_name_servers() { std::string nscsv; // list all dns servers for resov problem diagnosis ares_addr_port_node* name_servers = nullptr; const char* what = "system"; if (!options_.name_servers_.empty()) { ::ares_set_servers_ports_csv(ares_, options_.name_servers_.c_str()); what = "custom"; } int status = ::ares_get_servers_ports(ares_, &name_servers); if (status == ARES_SUCCESS) { for (auto ns = name_servers; ns != nullptr; ns = ns->next) if (endpoint{ns->family, &ns->addr, static_cast(ns->udp_port)}.format_to(nscsv, endpoint::fmt_default | endpoint::fmt_no_local)) nscsv.push_back(','); if (!nscsv.empty()) // if no valid name server, use predefined fallback dns YASIO_KLOGI("[c-ares] use %s dns: %s", what, nscsv.c_str()); else { status = ::ares_set_servers_csv(ares_, YASIO_FALLBACK_NAME_SERVERS); if (status == 0) YASIO_KLOGW("[c-ares] set fallback dns: '%s' succeed", YASIO_FALLBACK_NAME_SERVERS); else YASIO_KLOGE("[c-ares] set fallback dns: '%s' failed, detail: %s", YASIO_FALLBACK_NAME_SERVERS, ::ares_strerror(status)); } ::ares_free_data(name_servers); } } void io_service::destroy_ares_channel() { if (ares_ != nullptr) { ::ares_cancel(this->ares_); ::ares_destroy(this->ares_); this->ares_ = nullptr; } } #endif void io_service::do_accept(io_channel* ctx) { // channel is server cleanup_channel(ctx); ip::endpoint ep; if (!yasio__testbits(ctx->properties_, YCM_UDS)) { // server: don't need resolve, don't use remote_eps_ auto ifaddr = ctx->remote_host_.empty() ? YASIO_ADDR_ANY(local_address_family()) : ctx->remote_host_.c_str(); ep.as_in(ifaddr, ctx->remote_port_); } #if defined(YASIO_ENABLE_UDS) && YASIO__HAS_UDS else { ep.as_un(ctx->remote_host_.c_str()); ::unlink(ctx->remote_host_.c_str()); } #endif int error = -1; io_base::error_stage where = io_base::error_stage::NONE; do { xxsocket::set_last_errno(0); if (!ctx->socket_->open(ep.af(), ctx->socktype_)) { where = io_base::error_stage::OPEN_SOCKET; break; } if (yasio__testbits(ctx->properties_, YCF_REUSEADDR)) ctx->socket_->reuse_address(true); if (yasio__testbits(ctx->properties_, YCF_EXCLUSIVEADDRUSE)) ctx->socket_->exclusive_address(false); if (ctx->socket_->bind(ep) != 0) { where = io_base::error_stage::BIND_SOCKET; break; } if (yasio__testbits(ctx->properties_, YCM_TCP) && ctx->socket_->listen(YASIO_SOMAXCONN) != 0) { where = io_base::error_stage::LISTEN_SOCKET; break; } ctx->socket_->set_nonblocking(true); ctx->state_ = io_base::state::OPENED; if (yasio__testbits(ctx->properties_, YCM_UDP)) { if (yasio__testbits(ctx->properties_, YCPF_MCAST)) ctx->join_multicast_group(); ctx->buffer_.resize(YASIO_INET_BUFFER_SIZE); } register_descriptor(ctx->socket_->native_handle(), socket_event::read); YASIO_KLOGD("[index: %d] open server succeed, socket.fd=%d listening at %s...", ctx->index_, (int)ctx->socket_->native_handle(), ep.to_string().c_str()); error = 0; } while (false); if (error < 0) { error = xxsocket::get_last_errno(); YASIO_KLOGE("[index: %d] open server failed during stage %d, ec=%d, detail:%s", where, ctx->index_, error, io_service::strerror(error)); ctx->socket_->close(); ctx->state_ = io_base::state::CLOSED; } #if defined(YASIO_ENABLE_PASSIVE_EVENT) this->fire_event(ctx->index_, YEK_ON_OPEN, error, ctx, 1); #endif } void io_service::do_accept_completion(io_channel* ctx, fd_set_adapter& fd_set) { if (ctx->state_ == io_base::state::OPENED) { int error = 0; if (fd_set.is_set(ctx->socket_->native_handle(), socket_event::read) && ctx->socket_->get_optval(SOL_SOCKET, SO_ERROR, error) >= 0 && error == 0) { if (yasio__testbits(ctx->properties_, YCM_TCP)) { socket_native_type sockfd{invalid_socket}; error = ctx->socket_->accept_n(sockfd); if (error == 0) handle_connect_succeed(ctx, std::make_shared(sockfd)); else // The non-blocking tcp accept failed can be ignored. YASIO_KLOGV("[index: %d] socket.fd=%d, accept failed, ec=%u", ctx->index_, (int)ctx->socket_->native_handle(), error); } else // YCM_UDP { ip::endpoint peer; int n = ctx->socket_->recvfrom(&ctx->buffer_.front(), static_cast(ctx->buffer_.size()), peer); if (n > 0) { YASIO_KLOGV("[index: %d] recvfrom peer: %s succeed.", ctx->index_, peer.to_string().c_str()); auto transport = static_cast(do_dgram_accept(ctx, peer, error)); if (transport) { if (transport->handle_input(ctx->buffer_.data(), n, error, this->wait_duration_) < 0) { transport->error_ = error; close(transport); } } else YASIO_KLOGE("[index: %d] do_dgram_accept failed, ec=%d, detail:%s", ctx->index_, error, this->strerror(error)); } else if (n < 0) { error = xxsocket::get_last_errno(); if (!xxsocket::not_recv_error(error)) YASIO_KLOGE("[index: %d] recvfrom failed, ec=%d, detail:%s", ctx->index_, error, this->strerror(error)); } } } } } transport_handle_t io_service::do_dgram_accept(io_channel* ctx, const ip::endpoint& peer, int& error) { /* Because Bind() the client socket to the socket address of the listening socket. On Linux this essentially passes the responsibility for receiving data for the client session from the well-known listening socket, to the newly allocated client socket. It is important to note that this behavior is not the same on other platforms, like Windows (unfortunately), detail see: https://blog.grijjy.com/2018/08/29/creating-high-performance-udp-servers-on-windows-and-linux https://cloud.tencent.com/developer/article/1004555 So we emulate thus by ourself, don't care the performance, just a workaround implementation. Notes: a. for win32: we check exists udp clients by ourself, and only write operation can be perform on transports, the read event still routed by channel. b. for non-win32 multicast: same with win32, because the kernel can't route same udp peer as 1 transport when the peer always sendto multicast address. */ const bool user_route = !YASIO__UDP_KROUTE || yasio__testbits(ctx->properties_, YCPF_MCAST); if (user_route) { auto it = yasio__find_if(this->transports_, [&peer](const io_transport* transport) { using namespace std; return yasio__testbits(transport->ctx_->properties_, YCM_UDP) && static_cast(transport)->remote_endpoint() == peer; }); if (it != this->transports_.end()) return *it; } auto new_sock = std::make_shared(); if (new_sock->open(peer.af(), SOCK_DGRAM)) { if (yasio__testbits(ctx->properties_, YCF_REUSEADDR)) new_sock->reuse_address(true); if (yasio__testbits(ctx->properties_, YCF_EXCLUSIVEADDRUSE)) new_sock->exclusive_address(false); if (new_sock->bind(YASIO_ADDR_ANY(peer.af()), ctx->remote_port_) == 0) { new_sock->set_nonblocking(true); auto transport = static_cast(allocate_transport(ctx, std::move(new_sock))); // We always establish 4 tuple with clients transport->confgure_remote(peer); if (user_route) active_transport(transport); else handle_connect_succeed(transport); return transport; } } // unhandled, get error from system. error = xxsocket::get_last_errno(); return nullptr; } void io_service::handle_connect_succeed(transport_handle_t transport) { auto ctx = transport->ctx_; ctx->clear_mutable_flags(); ctx->error_ = 0; // clear errno, value may be EINPROGRESS auto& connection = transport->socket_; if (yasio__testbits(ctx->properties_, YCM_CLIENT)) { // Reset client channel bytes transferred when a new connection established ctx->bytes_transferred_ = 0; ctx->state_ = io_base::state::OPENED; if (yasio__testbits(ctx->properties_, YCM_UDP)) static_cast(transport)->confgure_remote(ctx->remote_eps_[0]); } else register_descriptor(connection->native_handle(), socket_event::read); if (yasio__testbits(ctx->properties_, YCM_TCP)) { #if defined(SO_NOSIGPIPE) connection->set_optval(SOL_SOCKET, SO_NOSIGPIPE, (int)1); #endif // apply tcp keepalive options if (options_.tcp_keepalive_.onoff) connection->set_keepalive(options_.tcp_keepalive_.onoff, options_.tcp_keepalive_.idle, options_.tcp_keepalive_.interval, options_.tcp_keepalive_.probs); } active_transport(transport); } void io_service::active_transport(transport_handle_t t) { auto ctx = t->ctx_; auto& s = t->socket_; this->transports_.push_back(t); if (!yasio__testbits(ctx->properties_, YCM_SSL)) { YASIO__UNUSED_PARAM(s); YASIO_KLOGV("[index: %d] sndbuf=%d, rcvbuf=%d", ctx->index_, s->get_optval(SOL_SOCKET, SO_SNDBUF), s->get_optval(SOL_SOCKET, SO_RCVBUF)); YASIO_KLOGD("[index: %d] the connection #%u <%s> --> <%s> is established.", ctx->index_, t->id_, t->local_endpoint().to_string().c_str(), t->remote_endpoint().to_string().c_str()); this->fire_event(ctx->index_, YEK_ON_OPEN, 0, t); } else if (yasio__testbits(ctx->properties_, YCM_CLIENT)) this->interrupt(); } transport_handle_t io_service::allocate_transport(io_channel* ctx, xxsocket_ptr&& s) { transport_handle_t transport; void* vp; if (!tpool_.empty()) { // allocate from pool vp = tpool_.back(); tpool_.pop_back(); } else vp = ::operator new(yasio__max_tsize); do { if (yasio__testbits(ctx->properties_, YCM_TCP)) { // tcp like transport #if defined(YASIO_SSL_BACKEND) if (yasio__testbits(ctx->properties_, YCM_SSL)) { transport = new (vp) io_transport_ssl(ctx, std::forward(s)); break; } #endif transport = new (vp) io_transport_tcp(ctx, std::forward(s)); } else // udp like transport { #if defined(YASIO_HAVE_KCP) if (yasio__testbits(ctx->properties_, YCM_KCP)) { transport = new (vp) io_transport_kcp(ctx, std::forward(s)); break; } #endif transport = new (vp) io_transport_udp(ctx, std::forward(s)); } } while (false); transport->set_primitives(); return transport; } void io_service::deallocate_transport(transport_handle_t t) { if (t->is_valid()) { yasio::invoke_dtor(t); this->tpool_.push_back(t); } } void io_service::handle_connect_failed(io_channel* ctx, int error) { cleanup_channel(ctx); YASIO_KLOGE("[index: %d] connect server %s failed, ec=%d, detail:%s", ctx->index_, ctx->format_destination().c_str(), error, io_service::strerror(error)); fire_event(ctx->index_, YEK_ON_OPEN, error, ctx); } bool io_service::do_read(transport_handle_t transport, fd_set_adapter& fd_set) { bool ret = false; do { if (!transport->socket_->is_open()) break; int error = 0; int revent = fd_set.is_set(transport->socket_->native_handle(), socket_event::read | socket_event::error); int n = transport->do_read(revent, error, this->wait_duration_); if (n >= 0) { if (!options_.forward_event_) { YASIO_KLOGV("[index: %d] do_read status ok, bytes transferred: %d, buffer used: %d", transport->cindex(), n, n + transport->offset_); if (transport->expected_size_ == -1) { // decode length int length = transport->ctx_->decode_len_(transport->buffer_, transport->offset_ + n); if (length > 0) { int bytes_to_strip = ::yasio::clamp(transport->ctx_->uparams_.initial_bytes_to_strip, 0, length - 1); transport->expected_size_ = length; transport->expected_packet_.reserve((std::min)(length - bytes_to_strip, YASIO_MAX_PDU_BUFFER_SIZE)); // #perfomance, avoid memory reallocte. unpack(transport, transport->expected_size_, n, bytes_to_strip); } else if (length == 0) // header insufficient, wait readfd ready at next event frame. transport->offset_ += n; else { transport->set_last_errno(yasio::errc::invalid_packet, yasio::io_base::error_stage::READ); break; } } else // process incompleted pdu unpack(transport, transport->expected_size_ - static_cast(transport->expected_packet_.size()), n, 0); } else if (n > 0) { // forward event, don't perform unpack, it's useful for implement streaming based protocol, like http, websocket and ... this->fire_event(transport->cindex(), io_packet_view{transport->buffer_, n}, transport); } } else { // n < 0, regard as connection should close transport->set_last_errno(error, yasio::io_base::error_stage::READ); break; } ret = true; } while (false); return ret; } void io_service::unpack(transport_handle_t transport, int bytes_expected, int bytes_transferred, int bytes_to_strip) { auto& offset = transport->offset_; auto bytes_available = bytes_transferred + offset; auto& pkt = transport->expected_packet_; pkt.insert(pkt.end(), transport->buffer_ + bytes_to_strip, transport->buffer_ + (std::min)(bytes_expected, bytes_available)); // set 'offset' to bytes of remain buffer offset = bytes_available - bytes_expected; if (offset >= 0) { /* pdu received properly */ if (offset > 0) { /* move remain data to head of buffer and hold 'offset'. */ ::memmove(transport->buffer_, transport->buffer_ + bytes_expected, offset); this->wait_duration_ = yasio__min_wait_usec; } // move properly pdu to ready queue, the other thread who care about will retrieve it. YASIO_KLOGV("[index: %d] received a properly packet from peer, packet size:%d", transport->cindex(), transport->expected_size_); this->fire_event(transport->cindex(), transport->fetch_packet(), transport); } else /* all buffer consumed, set 'offset' to ZERO, pdu incomplete, continue recv remain data. */ offset = 0; } highp_timer_ptr io_service::schedule(const std::chrono::microseconds& duration, timer_cb_t cb) { auto timer = std::make_shared(); timer->expires_from_now(duration); /*!important, hold on `timer` by lambda expression */ #if YASIO__HAS_CXX14 timer->async_wait(*this, [timer, cb = std::move(cb)](io_service& service) { return cb(service); }); #else timer->async_wait(*this, [timer, cb](io_service& service) { return cb(service); }); #endif return timer; } void io_service::schedule_timer(highp_timer* timer_ctl, timer_cb_t&& timer_cb) { if (timer_ctl == nullptr) return; std::lock_guard lck(this->timer_queue_mtx_); auto timer_it = this->find_timer(timer_ctl); if (timer_it == timer_queue_.end()) this->timer_queue_.emplace_back(timer_ctl, std::move(timer_cb)); else // always replace timer_cb timer_it->second = std::move(timer_cb); this->sort_timers(); // If the timer is earliest, wakup if (timer_ctl == this->timer_queue_.rbegin()->first) this->interrupt(); } void io_service::remove_timer(highp_timer* timer) { std::lock_guard lck(this->timer_queue_mtx_); auto iter = this->find_timer(timer); if (iter != timer_queue_.end()) { timer_queue_.erase(iter); if (!timer_queue_.empty()) { this->sort_timers(); this->interrupt(); } } } bool io_service::open_internal(io_channel* ctx) { if (ctx->state_ == io_base::state::CONNECTING || ctx->state_ == io_base::state::RESOLVING) { YASIO_KLOGD("[index: %d] the channel open operation is in progress!", ctx->index_); return false; } yasio__clearbits(ctx->opmask_, YOPM_CLOSE); yasio__setbits(ctx->opmask_, YOPM_OPEN); ++ctx->connect_id_; this->channel_ops_mtx_.lock(); if (yasio__find(this->channel_ops_, ctx) == this->channel_ops_.end()) this->channel_ops_.push_back(ctx); this->channel_ops_mtx_.unlock(); this->interrupt(); return true; } bool io_service::close_internal(io_channel* ctx) { yasio__clearbits(ctx->opmask_, YOPM_OPEN); if (ctx->socket_->is_open()) { yasio__setbits(ctx->opmask_, YOPM_CLOSE); return true; } return false; } void io_service::process_timers() { if (this->timer_queue_.empty()) return; std::lock_guard lck(this->timer_queue_mtx_); unsigned int n = 0; // the count expired loop timers while (!this->timer_queue_.empty()) { auto timer_ctl = timer_queue_.back().first; if (timer_ctl->expired()) { // fetch timer auto timer_impl = std::move(timer_queue_.back()); timer_queue_.pop_back(); if (!timer_impl.second(*this)) { // reschedule if the timer want wait again timer_ctl->expires_from_now(); timer_queue_.push_back(std::move(timer_impl)); ++n; } } else break; } if (n) sort_timers(); } highp_time_t io_service::get_timeout(highp_time_t usec) { this->wait_duration_ = yasio__max_wait_usec; // Reset next wait duration per frame if (this->timer_queue_.empty()) return usec; std::lock_guard lck(this->timer_queue_mtx_); auto earliest = timer_queue_.back().first; // microseconds auto duration = earliest->wait_duration(); if (std::chrono::microseconds(usec) > duration) return duration.count(); else return usec; } bool io_service::cleanup_channel(io_channel* ctx, bool clear_mask) { ctx->clear_mutable_flags(); bool bret = cleanup_io(ctx, clear_mask); #if defined(YAISO_ENABLE_PASSIVE_EVENT) if (bret && yasio__testbits(ctx->properties_, YCM_SERVER)) this->fire_event(ctx->index_, YEK_ON_CLOSE, 0, ctx, 1); #endif return bret; } bool io_service::cleanup_io(io_base* obj, bool clear_mask) { obj->error_ = 0; obj->state_ = io_base::state::CLOSED; if (clear_mask) obj->opmask_ = 0; if (obj->socket_->is_open()) { deregister_descriptor(obj->socket_->native_handle(), socket_event::readwrite); obj->socket_->close(); return true; } return false; } int io_service::do_resolve(io_channel* ctx) { if (yasio__testbits(ctx->properties_, YCPF_HOST_DIRTY)) { yasio__clearbits(ctx->properties_, YCPF_HOST_DIRTY | YCPF_NEEDS_QUERY); ctx->remote_eps_.clear(); ip::endpoint ep; #if defined(YASIO_ENABLE_UDS) && YASIO__HAS_UDS if (yasio__testbits(ctx->properties_, YCM_UDS)) { ep.as_un(ctx->remote_host_.c_str()); ctx->remote_eps_.push_back(ep); return 0; } #endif if (ep.as_in(ctx->remote_host_.c_str(), ctx->remote_port_)) ctx->remote_eps_.push_back(ep); else yasio__setbits(ctx->properties_, YCPF_NEEDS_QUERY); } if (yasio__testbits(ctx->properties_, YCPF_PORT_DIRTY)) { yasio__clearbits(ctx->properties_, YCPF_PORT_DIRTY); for (auto& ep : ctx->remote_eps_) ep.port(ctx->remote_port_); } if (!ctx->remote_eps_.empty()) { if (!yasio__testbits(ctx->properties_, YCPF_NEEDS_QUERY)) return 0; // remote host is IP address, no needs to query update_dns_status(); // will reset our resolved address expire time if (ctx->error_ == EINPROGRESS) return 0; // queried address not consumed by this connect flow if (!address_expired(ctx)) return 0; // queried address not exipred ctx->remote_eps_.clear(); } if (!ctx->remote_host_.empty()) { if (!ctx->error_) start_query(ctx); } else ctx->error_ = yasio::errc::no_available_address; return -1; } void io_service::start_query(io_channel* ctx) { ctx->set_last_errno(EINPROGRESS); YASIO_KLOGD("[index: %d] start query %s...", ctx->index_, ctx->remote_host_.c_str()); #if defined(YASIO_ENABLE_ARES_PROFILER) ctx->query_start_time_ = highp_clock(); #endif #if !defined(YASIO_HAVE_CARES) // init async name query thread state auto resolving_host = ctx->remote_host_; auto resolving_port = ctx->remote_port_; std::weak_ptr weak_mutex = life_mutex_; std::weak_ptr life_token = life_token_; std::thread async_resolv_thread([this, life_token, weak_mutex, resolving_host, resolving_port, ctx] { // check life token if (life_token.use_count() < 1) return; // preform blocking resolving safe std::vector remote_eps; int error = options_.resolv_(remote_eps, resolving_host.c_str(), resolving_port); // lock perform update dns state of the channel auto pmtx = weak_mutex.lock(); if (!pmtx) return; cxx17::shared_lock lck(*pmtx); // check life token again, when io_service cleanup done, life_token's use_count will be 0, // otherwise, we can safe to do follow assignments. if (life_token.use_count() < 1) return; if (error == 0) { ctx->remote_eps_ = std::move(remote_eps); ctx->query_success_time_ = highp_clock(); # if defined(YASIO_ENABLE_ARES_PROFILER) YASIO_KLOGD("[index: %d] query %s succeed, cost: %g(ms)", ctx->index_, ctx->remote_host_.c_str(), (ctx->query_success_time_ - ctx->query_start_time_) / 1000.0); # endif } else { ctx->set_last_errno(yasio::errc::resolve_host_failed); YASIO_KLOGE("[index: %d] query %s failed, ec=%d, detail:%s", ctx->index_, ctx->remote_host_.c_str(), error, xxsocket::gai_strerror(error)); } this->interrupt(); }); async_resolv_thread.detach(); #else ares_addrinfo_hints hint; memset(&hint, 0x0, sizeof(hint)); hint.ai_family = local_address_family(); char sport[sizeof "65535"] = {'\0'}; const char* service = nullptr; if (ctx->remote_port_ > 0) { sprintf(sport, "%u", ctx->remote_port_); // It's enough for unsigned short, so use sprintf ok. service = sport; } ares_work_started(); ::ares_getaddrinfo(this->ares_, ctx->remote_host_.c_str(), service, &hint, io_service::ares_getaddrinfo_cb, ctx); #endif } void io_service::update_dns_status() { if (this->options_.dns_dirty_) { this->options_.dns_dirty_ = false; #if defined(YASIO_HAVE_CARES) recreate_ares_channel(); #endif for (auto channel : this->channels_) channel->query_success_time_ = 0; } } int io_service::resolve(std::vector& endpoints, const char* hostname, unsigned short port) { if (yasio__testbits(this->ipsv_, ipsv_ipv4)) return xxsocket::resolve_v4(endpoints, hostname, port); else if (yasio__testbits(this->ipsv_, ipsv_ipv6)) // localhost is IPv6_only network return xxsocket::resolve_v6(endpoints, hostname, port) != 0 ? xxsocket::resolve_v4to6(endpoints, hostname, port) : 0; return -1; } void io_service::interrupt() { interrupter_.interrupt(); } const char* io_service::strerror(int error) { switch (error) { case 0: return "No error."; case yasio::errc::resolve_host_failed: return "Resolve host failed!"; case yasio::errc::no_available_address: return "No available address!"; case yasio::errc::shutdown_by_localhost: return "An existing connection was shutdown by local host!"; case yasio::errc::invalid_packet: return "Invalid packet!"; case yasio::errc::ssl_handshake_failed: return "SSL handshake failed!"; case yasio::errc::ssl_write_failed: return "SSL write failed!"; case yasio::errc::ssl_read_failed: return "SSL read failed!"; case yasio::errc::read_timeout: return "The remote host did not respond after a period of time."; case yasio::errc::eof: return "End of file."; case -1: return "Unknown error!"; default: return xxsocket::strerror(error); } } void io_service::set_option(int opt, ...) { va_list ap; va_start(ap, opt); set_option_internal(opt, ap); va_end(ap); } void io_service::set_option_internal(int opt, va_list ap) // lgtm [cpp/poorly-documented-function] { switch (opt) { case YOPT_S_DEFERRED_EVENT: options_.deferred_event_ = !!va_arg(ap, int); break; case YOPT_S_TCP_KEEPALIVE: options_.tcp_keepalive_.onoff = 1; options_.tcp_keepalive_.idle = va_arg(ap, int); options_.tcp_keepalive_.interval = va_arg(ap, int); options_.tcp_keepalive_.probs = va_arg(ap, int); break; case YOPT_S_RESOLV_FN: options_.resolv_ = *va_arg(ap, resolv_fn_t*); break; case YOPT_S_PRINT_FN: { auto ncb = *va_arg(ap, print_fn_t*); if (ncb) options_.print_ = [=](int, const char* msg) { ncb(msg); }; else options_.print_ = nullptr; } break; case YOPT_S_PRINT_FN2: options_.print_ = *va_arg(ap, print_fn2_t*); break; case YOPT_S_NO_NEW_THREAD: this->options_.no_new_thread_ = !!va_arg(ap, int); break; #if defined(YASIO_SSL_BACKEND) case YOPT_S_SSL_CACERT: this->options_.cafile_ = va_arg(ap, const char*); break; #endif case YOPT_S_CONNECT_TIMEOUT: options_.connect_timeout_ = static_cast(va_arg(ap, int)) * std::micro::den; break; case YOPT_S_CONNECT_TIMEOUTMS: options_.connect_timeout_ = static_cast(va_arg(ap, int)) * std::milli::den; break; case YOPT_S_DNS_CACHE_TIMEOUT: options_.dns_cache_timeout_ = static_cast(va_arg(ap, int)) * std::micro::den; break; case YOPT_S_DNS_CACHE_TIMEOUTMS: options_.dns_cache_timeout_ = static_cast(va_arg(ap, int)) * std::milli::den; break; case YOPT_S_DNS_QUERIES_TIMEOUT: options_.dns_queries_timeout_ = static_cast(va_arg(ap, int)) * std::micro::den; break; case YOPT_S_DNS_QUERIES_TIMEOUTMS: options_.dns_queries_timeout_ = static_cast(va_arg(ap, int)) * std::milli::den; break; case YOPT_S_DNS_QUERIES_TRIES: options_.dns_queries_tries_ = va_arg(ap, int); break; case YOPT_S_DNS_DIRTY: options_.dns_dirty_ = true; break; #if defined(YASIO_HAVE_CARES) case YOPT_S_DNS_LIST: options_.name_servers_ = va_arg(ap, const char*); options_.dns_dirty_ = true; break; #endif case YOPT_S_EVENT_CB: options_.on_event_ = *va_arg(ap, event_cb_t*); break; case YOPT_S_DEFER_EVENT_CB: options_.on_defer_event_ = *va_arg(ap, defer_event_cb_t*); break; case YOPT_S_FORWARD_EVENT: options_.forward_event_ = !!va_arg(ap, int); break; #if defined(YASIO_SSL_BACKEND) case YOPT_S_SSL_CERT: options_.crtfile_ = va_arg(ap, const char*); options_.keyfile_ = va_arg(ap, const char*); break; #endif case YOPT_C_UNPACK_PARAMS: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) { channel->uparams_.max_frame_length = va_arg(ap, int); channel->uparams_.length_field_offset = va_arg(ap, int); channel->uparams_.length_field_length = yasio::clamp(va_arg(ap, int), YASIO_SSIZEOF(int8_t), YASIO_SSIZEOF(int)); channel->uparams_.length_adjustment = va_arg(ap, int); } break; } case YOPT_C_UNPACK_STRIP: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->uparams_.initial_bytes_to_strip = yasio::clamp(va_arg(ap, int), 0, YASIO_UNPACK_MAX_STRIP); break; } case YOPT_C_UNPACK_NO_BSWAP: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->uparams_.no_bswap = va_arg(ap, int); break; } case YOPT_C_LFBFD_FN: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->decode_len_ = *va_arg(ap, decode_len_fn_t*); break; } case YOPT_C_LOCAL_HOST: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->local_host_ = va_arg(ap, const char*); break; } case YOPT_C_LOCAL_PORT: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->local_port_ = (u_short)va_arg(ap, int); break; } case YOPT_C_LOCAL_ENDPOINT: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) { channel->local_host_ = va_arg(ap, const char*); channel->local_port_ = ((u_short)va_arg(ap, int)); } break; } case YOPT_C_REMOTE_HOST: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->set_host(va_arg(ap, const char*)); break; } case YOPT_C_REMOTE_PORT: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->set_port((u_short)va_arg(ap, int)); break; } case YOPT_C_REMOTE_ENDPOINT: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) { channel->set_host(va_arg(ap, const char*)); channel->set_port((u_short)va_arg(ap, int)); } break; } case YOPT_C_MCAST_IF: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) { const char* ifaddr = va_arg(ap, const char*); if (ifaddr) channel->multiif_.as_in(ifaddr, (unsigned short)0); } break; } case YOPT_C_ENABLE_MCAST: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) { const char* addr = va_arg(ap, const char*); int loopback = va_arg(ap, int); channel->enable_multicast(addr, loopback); if (channel->socket_->is_open()) channel->join_multicast_group(); } break; } case YOPT_C_DISABLE_MCAST: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->disable_multicast(); break; } case YOPT_C_MOD_FLAGS: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) { yasio__setbits(channel->properties_, (uint32_t)va_arg(ap, int)); yasio__clearbits(channel->properties_, (uint32_t)va_arg(ap, int)); } break; } #if defined(YASIO_HAVE_KCP) case YOPT_C_KCP_CONV: { auto channel = channel_at(static_cast(va_arg(ap, int))); if (channel) channel->kcp_conv_ = va_arg(ap, int); break; } #endif case YOPT_T_CONNECT: { auto transport = va_arg(ap, transport_handle_t); if (transport && transport->is_open() && (transport->ctx_->properties_ & 0xff) == YCK_UDP_CLIENT) static_cast(transport)->connect(); break; } case YOPT_T_DISCONNECT: { auto transport = va_arg(ap, transport_handle_t); if (transport && transport->is_open() && (transport->ctx_->properties_ & 0xff) == YCK_UDP_CLIENT) static_cast(transport)->disconnect(); break; } case YOPT_B_SOCKOPT: { auto obj = va_arg(ap, io_base*); if (obj && obj->socket_ && obj->socket_->is_open()) { auto optlevel = va_arg(ap, int); auto optname = va_arg(ap, int); auto optval = va_arg(ap, void*); auto optlen = va_arg(ap, int); obj->socket_->set_optval(optlevel, optname, optval, optlen); } break; } } } } // namespace inet } // namespace yasio #if defined(_MSC_VER) # pragma warning(pop) #endif #endif