36 #include <sys/types.h>
39 #if defined(__linux__) || defined(__GNU__)
40 #include <netinet/tcp.h>
41 #if !defined(TCP_CORK)
48 #if defined(__solaris__) || defined(__linux__) || defined(__GNU__)
49 #include <sys/sendfile.h>
68 #define TRACE_IDENT ID
116 strcpy(
Lname,
"somewhere");
159 if (nbsz <= 0)
return 0;
161 if ((ulen +
HNlen) >= nbsz) ulen = 0;
162 else {strncpy(nbuf,
ID, ulen);
175 int csec, fd, rc = 0;
282 if (fd >= 2) {
if (
KeepFD) rc = 0;
283 else rc = (
close(fd) < 0 ? errno : 0);
285 if (rc)
Log.
Emsg(
"Link", rc,
"close",
ID);
306 else {
Log.
Emsg(
"Link",
"Dispatch on closed link",
ID);
316 else if (rc != -EINPROGRESS) doCl =
true;
343 struct pollfd polltab = {
PollInfo.
FD, POLLIN|POLLRDNORM, 0};
354 do {retc = poll(&polltab, 1, timeout);}
while(retc < 0 && errno == EINTR);
356 {
if (retc == 0)
return 0;
357 return Log.
Emsg(
"Link", -errno,
"poll",
ID);
362 if (!(polltab.revents & (POLLIN|POLLRDNORM)))
369 do {mlen = recv(
LinkInfo.
FD, Buff, Blen, MSG_PEEK);}
370 while(mlen < 0 && errno == EINTR);
374 if (mlen >= 0)
return int(mlen);
392 do {rlen =
read(
LinkInfo.
FD, Buff, Blen);}
while(rlen < 0 && errno == EINTR);
396 if (rlen >= 0)
return int(rlen);
406 struct pollfd polltab = {
PollInfo.
FD, POLLIN|POLLRDNORM, 0};
407 ssize_t rlen, totlen = 0;
418 {
do {retc = poll(&polltab,1,timeout);}
while(retc < 0 && errno == EINTR);
433 if (!(polltab.revents & (POLLIN|POLLRDNORM)))
443 while(rlen < 0 && errno == EINTR);
445 {
if (!rlen)
return -ENOMSG;
449 totlen += rlen; Blen -= rlen; Buff += rlen;
461 struct pollfd polltab = {
PollInfo.
FD, POLLIN|POLLRDNORM, 0};
471 do {retc = poll(&polltab,1,timeout);}
while(retc < 0 && errno == EINTR);
482 if (!(polltab.revents & (POLLIN|POLLRDNORM)))
498 int seglen, segcnt =
maxIOV, totlen = 0;
500 for (
int i = 0; i < segcnt; i++) seglen +=
iov[i].iov_len;
501 if ((rlen =
RecvIOV(
iov, segcnt)) < 0)
return rlen;
503 if (rlen < seglen)
break;
506 if (iocnt <=
maxIOV) segcnt = iocnt;
521 struct pollfd polltab = {
PollInfo.
FD, POLLIN|POLLRDNORM, 0};
529 {
do {retc = poll(&polltab,1,timeout);}
while(retc < 0 && errno == EINTR);
531 {
if (!retc)
return -ETIMEDOUT;
535 if (!(polltab.revents & (POLLIN|POLLRDNORM)))
545 do {rlen = recv(
LinkInfo.
FD, Buff, Blen, MSG_WAITALL);}
546 while(rlen < 0 && errno == EINTR);
550 if (
int(rlen) == Blen)
return Blen;
551 if (!rlen) {
TRACEI(
DEBUG,
"No RecvAll() data; errno=" <<errno);}
552 else if (rlen > 0)
Log.
Emsg(
"RecvAll",
"Premature end from",
ID);
571 while(retc < 0 && errno == EINTR);
575 if (retc < 0)
Log.
Emsg(
"Link", errno,
"receive from",
ID);
604 ssize_t retc = 0, bytesleft = Blen;
624 {
if (errno == EINTR)
continue;
627 bytesleft -= retc; Buff += retc;
633 if (retc >= 0)
return Blen;
668 int seglen, segcnt =
maxIOV, iolen = 0;
670 for (
int i = 0; i < segcnt; i++) seglen +=
iov[i].iov_len;
671 if ((retc =
SendIOV(
iov, segcnt, seglen)) < 0)
678 if (iocnt <=
maxIOV) segcnt = iocnt;
691 #if !defined(HAVE_SENDFILE)
695 #elif defined(__solaris__)
698 size_t xframt, totamt, bytes = 0;
704 for (i = 0; i < sfN; sfP++, i++)
706 {vecSF[i].sfv_fd = SFV_FD_SELF;
707 vecSF[i].sfv_off = (off_t)sfP->buffer;
709 vecSF[i].sfv_fd = sfP->
fdnum;
710 vecSF[i].sfv_off = sfP->offset;
712 vecSF[i].sfv_flag = 0;
713 vecSF[i].sfv_len = sfP->
sendsz;
724 do{retc = sendfilev(
LinkInfo.
FD, vecSFP, sfN, &xframt);
736 if (retc < 0 && errno != EINTR)
break;
742 while(xframt > 0 && sfN)
743 {
if ((ssize_t)xframt < (ssize_t)vecSFP->sfv_len)
744 {vecSFP->sfv_off += xframt; vecSFP->sfv_len -= xframt;
break;}
745 xframt -= vecSFP->sfv_len; vecSFP++; sfN--;
752 retc = (retc < 0 ? errno : ECANCELED);
754 Log.
Emsg(
"Link", retc,
"send file to",
ID);
757 #elif defined(__linux__) || defined(__GNU__)
759 static const int setON = 1, setOFF = 0;
760 ssize_t retc = 0, bytesleft;
762 int i, xfrbytes = 0, uncork = 1, xIntr = 0;
772 if (setsockopt(
PollInfo.
FD, SOL_TCP, TCP_CORK, &setON,
sizeof(setON)) < 0)
773 {
Log.
Emsg(
"Link", errno,
"cork socket for",
ID);
774 uncork = 0;
sfOK = 0;
779 for (i = 0; i < sfN; sfP++, i++)
781 else {myOffset = sfP->offset; bytesleft = sfP->
sendsz;
784 {bytesleft -= retc; xIntr++;}
786 if (retc < 0 && errno == EINTR)
continue;
787 if (retc <= 0)
break;
794 {
if (retc == 0) errno = ECANCELED;
796 Log.
Emsg(
"Link", errno,
"send file to",
ID);
803 && setsockopt(
PollInfo.
FD, SOL_TCP, TCP_CORK, &setOFF,
sizeof(setOFF)) < 0)
804 Log.
Emsg(
"Link", errno,
"uncork socket for",
ID);
808 if (xIntr > sfN)
SfIntr += (xIntr - sfN);
826 ssize_t retc = 0, bytesleft = Blen;
832 {
if (errno == EINTR)
continue;
835 bytesleft -= retc; Buff += retc;
849 ssize_t bytesleft, n, retc = 0;
859 bytesleft =
static_cast<ssize_t
>(bytes);
862 while(retc < 0 && errno == EINTR);
863 if (retc >= bytesleft || retc < 0)
break;
865 while(retc >= (n =
static_cast<ssize_t
>(
iov->iov_len)))
866 {retc -= n;
iov++; iocnt--;}
867 Buff = (
const char *)
iov->iov_base + retc; n -= retc;
iov++; iocnt--;
869 {
if (errno == EINTR)
continue;
872 n -= retc; Buff += retc; bytesleft -= retc;
874 if (retc < 0 || iocnt < 1)
break;
879 if (retc >= 0)
return bytes;
890 char buff[
sizeof(
Uname)], *bp, *sp;
893 snprintf(buff,
sizeof(buff),
"%s.%d:%d", userid, procid,
PollInfo.
FD);
895 sp = buff + ulen - 1;
897 if (ulen > (
int)
sizeof(
Uname)) ulen =
sizeof(
Uname);
899 while(ulen--) {*bp = *sp; bp--; sp--;}
916 #if !defined(__linux__)
983 if (
isTLS == enable)
return true;
1002 snprintf(buff,
sizeof(buff),
"Unable to enable tls for %s;",
ID);
1003 Log.
Emsg(
"LinkXeq", buff, eNote);
1015 else {
isTLS = enable;
1028 Log.
Emsg(
"TLS", rc,
"send file to",
ID);
1042 TRACEI(
DEBUG, (getLock ?
"Async" :
"Sync") <<
" link shutdown in progress");
1055 Log.
Emsg(
"Link", errno,
"shutdown FD for",
ID);
1070 static const char statfmt[] =
"<stats id=\"link\"><num>%d</num>"
1071 "<maxn>%d</maxn><tot>%lld</tot><in>%lld</in><out>%lld</out>"
1072 "<ctime>%lld</ctime><tmo>%d</tmo><stall>%d</stall>"
1073 "<sfps>%d</sfps></stats>";
1078 if (!buff)
return sizeof(statfmt)+17*6;
1166 snprintf(msg,
sizeof(msg),
"Unable to %s %s;", act,
ID);
1167 Log.
Emsg(
"TLS", msg, reason.c_str());
1190 if (rc < 1)
return rc;
1233 int pend, rlen, totlen = 0;
1246 {
if (pend < 0)
return -1;
1262 {
if (!totlen)
return -ENOMSG;
1266 if (rlen <= 0)
break;
1267 totlen += rlen; Blen -= rlen; Buff += rlen;
1280 int Blen, rlen, totlen = 0;
1289 for (
int i = 0; i < iocnt; i++)
1290 {Buff = (
char *)
iov[i].iov_base;
1291 Blen =
iov[i].iov_len;
1292 rlen =
TLS_Recv(Buff, Blen, timeout,
true);
1293 if (rlen <= 0)
break;
1295 if (rlen < Blen)
break;
1316 if (retc < 1)
return (retc ? -1 : -ETIMEDOUT);
1331 ssize_t bytesleft = Blen;
1347 {retc =
tlsIO.
Write(Buff, bytesleft, byteswritten);
1349 bytesleft -= byteswritten; Buff += byteswritten;
1377 for (
int i = 0; i < iocnt; i++)
1378 {ssize_t bytesleft =
iov[i].iov_len;
1379 char *Buff = (
char *)
iov[i].iov_base;
1381 {retc =
tlsIO.
Write(Buff, bytesleft, byteswritten);
1383 bytesleft -= byteswritten; Buff += byteswritten;
1397 int bytes, buffsz, fileFD, retc;
1406 for (
int i = 0; i < sfN; sfP++, i++)
1407 {
if (!(bytes = sfP->
sendsz))
continue;
1410 {
if (!
TLS_Write(sfP->buffer, bytes))
return -1;
1413 offset = sfP->offset;
1414 fileFD = sfP->
fdnum;
1415 buffsz = (bytes < (int)
sizeof(myBuff) ? bytes :
sizeof(myBuff));
1416 do {
do {retc =
pread(fileFD, myBuff, buffsz, offset);}
1417 while(retc < 0 && errno == EINTR);
1418 if (retc < 0)
return SFError(errno);
1420 if (!
TLS_Write(myBuff, buffsz))
return -1;
1421 offset += buffsz; bytes -= buffsz; totamt += retc;
1443 {retc =
tlsIO.
Write(Buff, Blen, byteswritten);
1448 Blen -= byteswritten; Buff += byteswritten;
ssize_t readv(int fildes, const struct iovec *iov, int iovcnt)
ssize_t write(int fildes, const void *buf, size_t nbyte)
ssize_t writev(int fildes, const struct iovec *iov, int iovcnt)
ssize_t read(int fildes, void *buf, size_t nbyte)
#define pread(a, b, c, d)
static void SyncAll()
Synchronize statustics for ll links.
static void Unhook(int fd)
Unhook a link from the active table of links.
static const char * TraceID
bool(* CloseRequestCb)(void *)
int TLS_Send(const char *Buff, int Blen)
int TLS_Error(const char *act, XrdTls::RC rc)
int TLS_Peek(char *Buff, int Blen, int timeout)
int Client(char *buff, int blen)
XrdTlsPeerCerts * getPeerCerts()
int Close(bool defer=false)
int TLS_Recv(char *Buff, int Blen)
int sendData(const char *Buff, int Blen)
bool TLS_Write(const char *Buff, int Blen)
int SendIOV(const struct iovec *iov, int iocnt, int bytes)
XrdProtocol * setProtocol(XrdProtocol *pp, bool push)
static long long LinkCountTot
void Shutdown(bool getLock)
int Peek(char *buff, int blen, int timeout=-1)
static int Stats(char *buff, int blen, bool do_sync=false)
void setID(const char *userid, int procid)
int Recv(char *buff, int blen)
static long long LinkBytesIn
int TLS_RecvAll(char *Buff, int Blen, int timeout)
int Send(const char *buff, int blen)
int RecvIOV(const struct iovec *iov, int iocnt)
static long long LinkConTime
int RecvAll(char *buff, int blen, int timeout=-1)
bool Register(const char *hName)
static XrdSysMutex statsMutex
void setProtName(const char *name)
static long long LinkBytesOut
void syncStats(int *ctime=0)
bool setTLS(bool enable, XrdTlsContext *ctx=0)
bool RegisterCloseRequestCb(XrdProtocol *pp, bool(*cb)(void *), void *cbarg)
void Serialize()
Wait for all outstanding requests to be completed on the link.
int Wait4Data(int timeout)
char * ID
Pointer to the client's link identity.
void SetDialect(const char *dP)
bool Register(const char *hName)
virtual int Enable(XrdPollInfo &pInfo)=0
static char * Poll2Text(short events)
static void Detach(XrdPollInfo &pInfo)
virtual void Recycle(XrdLink *lp=0, int consec=0, const char *reason=0)=0
virtual int Stats(char *buff, int blen, int do_sync=0)=0
virtual int Process(XrdLink *lp)=0
void Terminate(XrdLink *lP=0)
int Send(const char *buff, int blen)
int Emsg(const char *esfx, int ecode, const char *text1, const char *text2=0)
void Lock(XrdSysMutex *Mutex)
int fd
Socket file descriptor.
long long bytesOut
Bytes written to the socket.
int consec
Seconds connected.
virtual void Monitor(XrdNetAddrInfo &netInfo, LinkInfo &lnkInfo, int liLen)=0
long long bytesIn
Bytes read from the socket.
const char * tident
Pointer to the client's trace identifier.
@ TLS_HS_BLOCK
Always block during handshake.
XrdTls::RC Accept(std::string *eMsg=0)
void Shutdown(SDType=sdImmed)
@ TLS_RBL_WBL
blocking read blocking write
XrdTls::RC Write(const char *buffer, size_t size, int &bytesOut)
XrdTls::RC Read(char *buffer, size_t size, int &bytesRead)
Read from the TLS connection. If necessary, a handshake will be done.
const char * Init(XrdTlsContext &ctx, int sfd, RW_Mode rwm, HS_Mode hsm, bool isClient, bool serial=true, const char *tid="")
void SetTraceID(const char *tid)
int Pending(bool any=true)
XrdTls::RC Peek(char *buffer, size_t size, int &bytesPeek)
XrdTlsPeerCerts * getCerts(bool ver=true)
static std::string RC2Text(XrdTls::RC rc, bool dbg=false)
@ TLS_AOK
All went well, will always be zero.
int fdnum
File descriptor for data.
int sendsz
Length of data at offset.