108 lines
3.0 KiB
C
108 lines
3.0 KiB
C
/**
|
|
* Copyright (c) 2021 OceanBase
|
|
* OceanBase CE is licensed under Mulan PubL v2.
|
|
* You can use this software according to the terms and conditions of the Mulan PubL v2.
|
|
* You may obtain a copy of Mulan PubL v2 at:
|
|
* http://license.coscl.org.cn/MulanPubL-2.0
|
|
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
|
|
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
|
|
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
|
|
* See the Mulan PubL v2 for more details.
|
|
*/
|
|
|
|
int64_t ob_update_loop_ts();
|
|
struct epoll_event *ussl_make_epoll_event(struct epoll_event *event, uint32_t event_flag, void *val)
|
|
{
|
|
event->events = event_flag;
|
|
event->data.ptr = val;
|
|
return event;
|
|
}
|
|
|
|
int ussl_eloop_init(ussl_eloop_t *ep)
|
|
{
|
|
ep->fd = epoll_create1(EPOLL_CLOEXEC);
|
|
ussl_dlink_init(&ep->ready_link);
|
|
return (ep->fd < 0) ? errno : 0;
|
|
}
|
|
|
|
int ussl_eloop_regist(ussl_eloop_t *ep, ussl_sock_t *s, uint32_t eflag)
|
|
{
|
|
int err = 0;
|
|
struct epoll_event event;
|
|
uint32_t flag = eflag | EPOLLERR;
|
|
s->mask = 0;
|
|
s->ready_link.next = NULL;
|
|
if (0 != libc_epoll_ctl(ep->fd, EPOLL_CTL_ADD, s->fd, ussl_make_epoll_event(&event, flag, s))) {
|
|
err = -EIO;
|
|
ussl_log_error("epoll_ctl add failed, epfd:%d, fd:%d, errno:%d", ep->fd, s->fd, errno);
|
|
} else {
|
|
ussl_log_info("sock regist: %p fd=%d", s, s->fd);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
static void ussl_eloop_fire(ussl_eloop_t *ep, ussl_sock_t *s)
|
|
{
|
|
if (!s->ready_link.next) {
|
|
ussl_dlink_insert(&ep->ready_link, &s->ready_link);
|
|
} else {
|
|
ussl_sks(s, PENDING);
|
|
}
|
|
}
|
|
|
|
static void ussl_eloop_refire(ussl_eloop_t *ep, int64_t epoll_timeout)
|
|
{
|
|
const int maxevents = 512;
|
|
struct epoll_event events[maxevents];
|
|
int cnt = ob_epoll_wait(ep->fd, events, maxevents, epoll_timeout);
|
|
for (int i = 0; i < cnt; i++) {
|
|
ussl_sock_t *s = (ussl_sock_t *)events[i].data.ptr;
|
|
s->mask |= events[i].events;
|
|
ussl_eloop_fire(ep, s);
|
|
}
|
|
}
|
|
|
|
static void ussl_sock_destroy(ussl_sock_t *s)
|
|
{
|
|
ussl_dlink_delete(&s->ready_link);
|
|
if (s->fty) {
|
|
s->fty->destroy(s->fty, s);
|
|
}
|
|
}
|
|
|
|
static void ussl_eloop_handle_sock_event(ussl_sock_t *s)
|
|
{
|
|
int err = 0;
|
|
if (ussl_skt(s, ERR) || ussl_skt(s, HUP)) {
|
|
ussl_log_info("sock has error: sock:%p, fd:%d, mask:0x%x", s, s->fd, s->mask);
|
|
s->has_error = 1;
|
|
ussl_sock_destroy(s);
|
|
} else if (0 == (err = s->handle_event(s))) {
|
|
// yield
|
|
} else if (EAGAIN == err) {
|
|
if (ussl_skt(s, PENDING)) {
|
|
ussl_skc(s, PENDING);
|
|
} else {
|
|
ussl_dlink_delete(&s->ready_link);
|
|
}
|
|
} else {
|
|
ussl_sock_destroy(s);
|
|
}
|
|
}
|
|
|
|
int ussl_eloop_run(ussl_eloop_t *ep)
|
|
{
|
|
while (!ussl_is_stop()) {
|
|
ob_update_loop_ts();
|
|
int64_t epoll_timeout = 1000;
|
|
if (ep->ready_link.next != &(ep->ready_link)) {
|
|
epoll_timeout = 0;
|
|
}
|
|
ussl_eloop_refire(ep, epoll_timeout);
|
|
ussl_dlink_for(&ep->ready_link, p) { ussl_eloop_handle_sock_event(ussl_structof(p, ussl_sock_t, ready_link)); }
|
|
check_and_handle_timeout_event();
|
|
}
|
|
close(ep->fd);
|
|
return 0;
|
|
}
|