eloop.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856
  1. /*
  2. * Event loop based on select() loop
  3. * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "trace.h"
  11. #include "list.h"
  12. #include "eloop.h"
  13. #ifdef CONFIG_ELOOP_POLL
  14. #include <assert.h>
  15. #include <poll.h>
  16. #endif /* CONFIG_ELOOP_POLL */
  17. struct eloop_sock {
  18. int sock;
  19. void *eloop_data;
  20. void *user_data;
  21. eloop_sock_handler handler;
  22. WPA_TRACE_REF(eloop);
  23. WPA_TRACE_REF(user);
  24. WPA_TRACE_INFO
  25. };
  26. struct eloop_timeout {
  27. struct dl_list list;
  28. struct os_time time;
  29. void *eloop_data;
  30. void *user_data;
  31. eloop_timeout_handler handler;
  32. WPA_TRACE_REF(eloop);
  33. WPA_TRACE_REF(user);
  34. WPA_TRACE_INFO
  35. };
  36. struct eloop_signal {
  37. int sig;
  38. void *user_data;
  39. eloop_signal_handler handler;
  40. int signaled;
  41. };
  42. struct eloop_sock_table {
  43. int count;
  44. struct eloop_sock *table;
  45. int changed;
  46. };
  47. struct eloop_data {
  48. int max_sock;
  49. int count; /* sum of all table counts */
  50. #ifdef CONFIG_ELOOP_POLL
  51. int max_pollfd_map; /* number of pollfds_map currently allocated */
  52. int max_poll_fds; /* number of pollfds currently allocated */
  53. struct pollfd *pollfds;
  54. struct pollfd **pollfds_map;
  55. #endif /* CONFIG_ELOOP_POLL */
  56. struct eloop_sock_table readers;
  57. struct eloop_sock_table writers;
  58. struct eloop_sock_table exceptions;
  59. struct dl_list timeout;
  60. int signal_count;
  61. struct eloop_signal *signals;
  62. int signaled;
  63. int pending_terminate;
  64. int terminate;
  65. int reader_table_changed;
  66. };
  67. static struct eloop_data eloop;
  68. #ifdef WPA_TRACE
  69. static void eloop_sigsegv_handler(int sig)
  70. {
  71. wpa_trace_show("eloop SIGSEGV");
  72. abort();
  73. }
  74. static void eloop_trace_sock_add_ref(struct eloop_sock_table *table)
  75. {
  76. int i;
  77. if (table == NULL || table->table == NULL)
  78. return;
  79. for (i = 0; i < table->count; i++) {
  80. wpa_trace_add_ref(&table->table[i], eloop,
  81. table->table[i].eloop_data);
  82. wpa_trace_add_ref(&table->table[i], user,
  83. table->table[i].user_data);
  84. }
  85. }
  86. static void eloop_trace_sock_remove_ref(struct eloop_sock_table *table)
  87. {
  88. int i;
  89. if (table == NULL || table->table == NULL)
  90. return;
  91. for (i = 0; i < table->count; i++) {
  92. wpa_trace_remove_ref(&table->table[i], eloop,
  93. table->table[i].eloop_data);
  94. wpa_trace_remove_ref(&table->table[i], user,
  95. table->table[i].user_data);
  96. }
  97. }
  98. #else /* WPA_TRACE */
  99. #define eloop_trace_sock_add_ref(table) do { } while (0)
  100. #define eloop_trace_sock_remove_ref(table) do { } while (0)
  101. #endif /* WPA_TRACE */
  102. int eloop_init(void)
  103. {
  104. os_memset(&eloop, 0, sizeof(eloop));
  105. dl_list_init(&eloop.timeout);
  106. #ifdef WPA_TRACE
  107. signal(SIGSEGV, eloop_sigsegv_handler);
  108. #endif /* WPA_TRACE */
  109. return 0;
  110. }
  111. static int eloop_sock_table_add_sock(struct eloop_sock_table *table,
  112. int sock, eloop_sock_handler handler,
  113. void *eloop_data, void *user_data)
  114. {
  115. struct eloop_sock *tmp;
  116. int new_max_sock;
  117. if (sock > eloop.max_sock)
  118. new_max_sock = sock;
  119. else
  120. new_max_sock = eloop.max_sock;
  121. if (table == NULL)
  122. return -1;
  123. #ifdef CONFIG_ELOOP_POLL
  124. if (new_max_sock >= eloop.max_pollfd_map) {
  125. struct pollfd **nmap;
  126. nmap = os_realloc_array(eloop.pollfds_map, new_max_sock + 50,
  127. sizeof(struct pollfd *));
  128. if (nmap == NULL)
  129. return -1;
  130. eloop.max_pollfd_map = new_max_sock + 50;
  131. eloop.pollfds_map = nmap;
  132. }
  133. if (eloop.count + 1 > eloop.max_poll_fds) {
  134. struct pollfd *n;
  135. int nmax = eloop.count + 1 + 50;
  136. n = os_realloc_array(eloop.pollfds, nmax,
  137. sizeof(struct pollfd));
  138. if (n == NULL)
  139. return -1;
  140. eloop.max_poll_fds = nmax;
  141. eloop.pollfds = n;
  142. }
  143. #endif /* CONFIG_ELOOP_POLL */
  144. eloop_trace_sock_remove_ref(table);
  145. tmp = os_realloc_array(table->table, table->count + 1,
  146. sizeof(struct eloop_sock));
  147. if (tmp == NULL)
  148. return -1;
  149. tmp[table->count].sock = sock;
  150. tmp[table->count].eloop_data = eloop_data;
  151. tmp[table->count].user_data = user_data;
  152. tmp[table->count].handler = handler;
  153. wpa_trace_record(&tmp[table->count]);
  154. table->count++;
  155. table->table = tmp;
  156. eloop.max_sock = new_max_sock;
  157. eloop.count++;
  158. table->changed = 1;
  159. eloop_trace_sock_add_ref(table);
  160. return 0;
  161. }
  162. static void eloop_sock_table_remove_sock(struct eloop_sock_table *table,
  163. int sock)
  164. {
  165. int i;
  166. if (table == NULL || table->table == NULL || table->count == 0)
  167. return;
  168. for (i = 0; i < table->count; i++) {
  169. if (table->table[i].sock == sock)
  170. break;
  171. }
  172. if (i == table->count)
  173. return;
  174. eloop_trace_sock_remove_ref(table);
  175. if (i != table->count - 1) {
  176. os_memmove(&table->table[i], &table->table[i + 1],
  177. (table->count - i - 1) *
  178. sizeof(struct eloop_sock));
  179. }
  180. table->count--;
  181. eloop.count--;
  182. table->changed = 1;
  183. eloop_trace_sock_add_ref(table);
  184. }
  185. #ifdef CONFIG_ELOOP_POLL
  186. static struct pollfd * find_pollfd(struct pollfd **pollfds_map, int fd, int mx)
  187. {
  188. if (fd < mx && fd >= 0)
  189. return pollfds_map[fd];
  190. return NULL;
  191. }
  192. static int eloop_sock_table_set_fds(struct eloop_sock_table *readers,
  193. struct eloop_sock_table *writers,
  194. struct eloop_sock_table *exceptions,
  195. struct pollfd *pollfds,
  196. struct pollfd **pollfds_map,
  197. int max_pollfd_map)
  198. {
  199. int i;
  200. int nxt = 0;
  201. int fd;
  202. struct pollfd *pfd;
  203. /* Clear pollfd lookup map. It will be re-populated below. */
  204. os_memset(pollfds_map, 0, sizeof(struct pollfd *) * max_pollfd_map);
  205. if (readers && readers->table) {
  206. for (i = 0; i < readers->count; i++) {
  207. fd = readers->table[i].sock;
  208. assert(fd >= 0 && fd < max_pollfd_map);
  209. pollfds[nxt].fd = fd;
  210. pollfds[nxt].events = POLLIN;
  211. pollfds[nxt].revents = 0;
  212. pollfds_map[fd] = &(pollfds[nxt]);
  213. nxt++;
  214. }
  215. }
  216. if (writers && writers->table) {
  217. for (i = 0; i < writers->count; i++) {
  218. /*
  219. * See if we already added this descriptor, update it
  220. * if so.
  221. */
  222. fd = writers->table[i].sock;
  223. assert(fd >= 0 && fd < max_pollfd_map);
  224. pfd = pollfds_map[fd];
  225. if (!pfd) {
  226. pfd = &(pollfds[nxt]);
  227. pfd->events = 0;
  228. pfd->fd = fd;
  229. pollfds[i].revents = 0;
  230. pollfds_map[fd] = pfd;
  231. nxt++;
  232. }
  233. pfd->events |= POLLOUT;
  234. }
  235. }
  236. /*
  237. * Exceptions are always checked when using poll, but I suppose it's
  238. * possible that someone registered a socket *only* for exception
  239. * handling. Set the POLLIN bit in this case.
  240. */
  241. if (exceptions && exceptions->table) {
  242. for (i = 0; i < exceptions->count; i++) {
  243. /*
  244. * See if we already added this descriptor, just use it
  245. * if so.
  246. */
  247. fd = exceptions->table[i].sock;
  248. assert(fd >= 0 && fd < max_pollfd_map);
  249. pfd = pollfds_map[fd];
  250. if (!pfd) {
  251. pfd = &(pollfds[nxt]);
  252. pfd->events = POLLIN;
  253. pfd->fd = fd;
  254. pollfds[i].revents = 0;
  255. pollfds_map[fd] = pfd;
  256. nxt++;
  257. }
  258. }
  259. }
  260. return nxt;
  261. }
  262. static int eloop_sock_table_dispatch_table(struct eloop_sock_table *table,
  263. struct pollfd **pollfds_map,
  264. int max_pollfd_map,
  265. short int revents)
  266. {
  267. int i;
  268. struct pollfd *pfd;
  269. if (!table || !table->table)
  270. return 0;
  271. table->changed = 0;
  272. for (i = 0; i < table->count; i++) {
  273. pfd = find_pollfd(pollfds_map, table->table[i].sock,
  274. max_pollfd_map);
  275. if (!pfd)
  276. continue;
  277. if (!(pfd->revents & revents))
  278. continue;
  279. table->table[i].handler(table->table[i].sock,
  280. table->table[i].eloop_data,
  281. table->table[i].user_data);
  282. if (table->changed)
  283. return 1;
  284. }
  285. return 0;
  286. }
  287. static void eloop_sock_table_dispatch(struct eloop_sock_table *readers,
  288. struct eloop_sock_table *writers,
  289. struct eloop_sock_table *exceptions,
  290. struct pollfd **pollfds_map,
  291. int max_pollfd_map)
  292. {
  293. if (eloop_sock_table_dispatch_table(readers, pollfds_map,
  294. max_pollfd_map, POLLIN | POLLERR |
  295. POLLHUP))
  296. return; /* pollfds may be invalid at this point */
  297. if (eloop_sock_table_dispatch_table(writers, pollfds_map,
  298. max_pollfd_map, POLLOUT))
  299. return; /* pollfds may be invalid at this point */
  300. eloop_sock_table_dispatch_table(exceptions, pollfds_map,
  301. max_pollfd_map, POLLERR | POLLHUP);
  302. }
  303. #else /* CONFIG_ELOOP_POLL */
  304. static void eloop_sock_table_set_fds(struct eloop_sock_table *table,
  305. fd_set *fds)
  306. {
  307. int i;
  308. FD_ZERO(fds);
  309. if (table->table == NULL)
  310. return;
  311. for (i = 0; i < table->count; i++)
  312. FD_SET(table->table[i].sock, fds);
  313. }
  314. static void eloop_sock_table_dispatch(struct eloop_sock_table *table,
  315. fd_set *fds)
  316. {
  317. int i;
  318. if (table == NULL || table->table == NULL)
  319. return;
  320. table->changed = 0;
  321. for (i = 0; i < table->count; i++) {
  322. if (FD_ISSET(table->table[i].sock, fds)) {
  323. table->table[i].handler(table->table[i].sock,
  324. table->table[i].eloop_data,
  325. table->table[i].user_data);
  326. if (table->changed)
  327. break;
  328. }
  329. }
  330. }
  331. #endif /* CONFIG_ELOOP_POLL */
  332. static void eloop_sock_table_destroy(struct eloop_sock_table *table)
  333. {
  334. if (table) {
  335. int i;
  336. for (i = 0; i < table->count && table->table; i++) {
  337. wpa_printf(MSG_INFO, "ELOOP: remaining socket: "
  338. "sock=%d eloop_data=%p user_data=%p "
  339. "handler=%p",
  340. table->table[i].sock,
  341. table->table[i].eloop_data,
  342. table->table[i].user_data,
  343. table->table[i].handler);
  344. wpa_trace_dump_funcname("eloop unregistered socket "
  345. "handler",
  346. table->table[i].handler);
  347. wpa_trace_dump("eloop sock", &table->table[i]);
  348. }
  349. os_free(table->table);
  350. }
  351. }
  352. int eloop_register_read_sock(int sock, eloop_sock_handler handler,
  353. void *eloop_data, void *user_data)
  354. {
  355. return eloop_register_sock(sock, EVENT_TYPE_READ, handler,
  356. eloop_data, user_data);
  357. }
  358. void eloop_unregister_read_sock(int sock)
  359. {
  360. eloop_unregister_sock(sock, EVENT_TYPE_READ);
  361. }
  362. static struct eloop_sock_table *eloop_get_sock_table(eloop_event_type type)
  363. {
  364. switch (type) {
  365. case EVENT_TYPE_READ:
  366. return &eloop.readers;
  367. case EVENT_TYPE_WRITE:
  368. return &eloop.writers;
  369. case EVENT_TYPE_EXCEPTION:
  370. return &eloop.exceptions;
  371. }
  372. return NULL;
  373. }
  374. int eloop_register_sock(int sock, eloop_event_type type,
  375. eloop_sock_handler handler,
  376. void *eloop_data, void *user_data)
  377. {
  378. struct eloop_sock_table *table;
  379. table = eloop_get_sock_table(type);
  380. return eloop_sock_table_add_sock(table, sock, handler,
  381. eloop_data, user_data);
  382. }
  383. void eloop_unregister_sock(int sock, eloop_event_type type)
  384. {
  385. struct eloop_sock_table *table;
  386. table = eloop_get_sock_table(type);
  387. eloop_sock_table_remove_sock(table, sock);
  388. }
  389. int eloop_register_timeout(unsigned int secs, unsigned int usecs,
  390. eloop_timeout_handler handler,
  391. void *eloop_data, void *user_data)
  392. {
  393. struct eloop_timeout *timeout, *tmp;
  394. os_time_t now_sec;
  395. timeout = os_zalloc(sizeof(*timeout));
  396. if (timeout == NULL)
  397. return -1;
  398. if (os_get_time(&timeout->time) < 0) {
  399. os_free(timeout);
  400. return -1;
  401. }
  402. now_sec = timeout->time.sec;
  403. timeout->time.sec += secs;
  404. if (timeout->time.sec < now_sec) {
  405. /*
  406. * Integer overflow - assume long enough timeout to be assumed
  407. * to be infinite, i.e., the timeout would never happen.
  408. */
  409. wpa_printf(MSG_DEBUG, "ELOOP: Too long timeout (secs=%u) to "
  410. "ever happen - ignore it", secs);
  411. os_free(timeout);
  412. return 0;
  413. }
  414. timeout->time.usec += usecs;
  415. while (timeout->time.usec >= 1000000) {
  416. timeout->time.sec++;
  417. timeout->time.usec -= 1000000;
  418. }
  419. timeout->eloop_data = eloop_data;
  420. timeout->user_data = user_data;
  421. timeout->handler = handler;
  422. wpa_trace_add_ref(timeout, eloop, eloop_data);
  423. wpa_trace_add_ref(timeout, user, user_data);
  424. wpa_trace_record(timeout);
  425. /* Maintain timeouts in order of increasing time */
  426. dl_list_for_each(tmp, &eloop.timeout, struct eloop_timeout, list) {
  427. if (os_time_before(&timeout->time, &tmp->time)) {
  428. dl_list_add(tmp->list.prev, &timeout->list);
  429. return 0;
  430. }
  431. }
  432. dl_list_add_tail(&eloop.timeout, &timeout->list);
  433. return 0;
  434. }
  435. static void eloop_remove_timeout(struct eloop_timeout *timeout)
  436. {
  437. dl_list_del(&timeout->list);
  438. wpa_trace_remove_ref(timeout, eloop, timeout->eloop_data);
  439. wpa_trace_remove_ref(timeout, user, timeout->user_data);
  440. os_free(timeout);
  441. }
  442. int eloop_cancel_timeout(eloop_timeout_handler handler,
  443. void *eloop_data, void *user_data)
  444. {
  445. struct eloop_timeout *timeout, *prev;
  446. int removed = 0;
  447. dl_list_for_each_safe(timeout, prev, &eloop.timeout,
  448. struct eloop_timeout, list) {
  449. if (timeout->handler == handler &&
  450. (timeout->eloop_data == eloop_data ||
  451. eloop_data == ELOOP_ALL_CTX) &&
  452. (timeout->user_data == user_data ||
  453. user_data == ELOOP_ALL_CTX)) {
  454. eloop_remove_timeout(timeout);
  455. removed++;
  456. }
  457. }
  458. return removed;
  459. }
  460. int eloop_is_timeout_registered(eloop_timeout_handler handler,
  461. void *eloop_data, void *user_data)
  462. {
  463. struct eloop_timeout *tmp;
  464. dl_list_for_each(tmp, &eloop.timeout, struct eloop_timeout, list) {
  465. if (tmp->handler == handler &&
  466. tmp->eloop_data == eloop_data &&
  467. tmp->user_data == user_data)
  468. return 1;
  469. }
  470. return 0;
  471. }
  472. #ifndef CONFIG_NATIVE_WINDOWS
  473. static void eloop_handle_alarm(int sig)
  474. {
  475. wpa_printf(MSG_ERROR, "eloop: could not process SIGINT or SIGTERM in "
  476. "two seconds. Looks like there\n"
  477. "is a bug that ends up in a busy loop that "
  478. "prevents clean shutdown.\n"
  479. "Killing program forcefully.\n");
  480. exit(1);
  481. }
  482. #endif /* CONFIG_NATIVE_WINDOWS */
  483. static void eloop_handle_signal(int sig)
  484. {
  485. int i;
  486. #ifndef CONFIG_NATIVE_WINDOWS
  487. if ((sig == SIGINT || sig == SIGTERM) && !eloop.pending_terminate) {
  488. /* Use SIGALRM to break out from potential busy loops that
  489. * would not allow the program to be killed. */
  490. eloop.pending_terminate = 1;
  491. signal(SIGALRM, eloop_handle_alarm);
  492. alarm(2);
  493. }
  494. #endif /* CONFIG_NATIVE_WINDOWS */
  495. eloop.signaled++;
  496. for (i = 0; i < eloop.signal_count; i++) {
  497. if (eloop.signals[i].sig == sig) {
  498. eloop.signals[i].signaled++;
  499. break;
  500. }
  501. }
  502. }
  503. static void eloop_process_pending_signals(void)
  504. {
  505. int i;
  506. if (eloop.signaled == 0)
  507. return;
  508. eloop.signaled = 0;
  509. if (eloop.pending_terminate) {
  510. #ifndef CONFIG_NATIVE_WINDOWS
  511. alarm(0);
  512. #endif /* CONFIG_NATIVE_WINDOWS */
  513. eloop.pending_terminate = 0;
  514. }
  515. for (i = 0; i < eloop.signal_count; i++) {
  516. if (eloop.signals[i].signaled) {
  517. eloop.signals[i].signaled = 0;
  518. eloop.signals[i].handler(eloop.signals[i].sig,
  519. eloop.signals[i].user_data);
  520. }
  521. }
  522. }
  523. int eloop_register_signal(int sig, eloop_signal_handler handler,
  524. void *user_data)
  525. {
  526. struct eloop_signal *tmp;
  527. tmp = os_realloc_array(eloop.signals, eloop.signal_count + 1,
  528. sizeof(struct eloop_signal));
  529. if (tmp == NULL)
  530. return -1;
  531. tmp[eloop.signal_count].sig = sig;
  532. tmp[eloop.signal_count].user_data = user_data;
  533. tmp[eloop.signal_count].handler = handler;
  534. tmp[eloop.signal_count].signaled = 0;
  535. eloop.signal_count++;
  536. eloop.signals = tmp;
  537. signal(sig, eloop_handle_signal);
  538. return 0;
  539. }
  540. int eloop_register_signal_terminate(eloop_signal_handler handler,
  541. void *user_data)
  542. {
  543. int ret = eloop_register_signal(SIGINT, handler, user_data);
  544. if (ret == 0)
  545. ret = eloop_register_signal(SIGTERM, handler, user_data);
  546. return ret;
  547. }
  548. int eloop_register_signal_reconfig(eloop_signal_handler handler,
  549. void *user_data)
  550. {
  551. #ifdef CONFIG_NATIVE_WINDOWS
  552. return 0;
  553. #else /* CONFIG_NATIVE_WINDOWS */
  554. return eloop_register_signal(SIGHUP, handler, user_data);
  555. #endif /* CONFIG_NATIVE_WINDOWS */
  556. }
  557. void eloop_run(void)
  558. {
  559. #ifdef CONFIG_ELOOP_POLL
  560. int num_poll_fds;
  561. int timeout_ms = 0;
  562. #else /* CONFIG_ELOOP_POLL */
  563. fd_set *rfds, *wfds, *efds;
  564. struct timeval _tv;
  565. #endif /* CONFIG_ELOOP_POLL */
  566. int res;
  567. struct os_time tv, now;
  568. #ifndef CONFIG_ELOOP_POLL
  569. rfds = os_malloc(sizeof(*rfds));
  570. wfds = os_malloc(sizeof(*wfds));
  571. efds = os_malloc(sizeof(*efds));
  572. if (rfds == NULL || wfds == NULL || efds == NULL)
  573. goto out;
  574. #endif /* CONFIG_ELOOP_POLL */
  575. while (!eloop.terminate &&
  576. (!dl_list_empty(&eloop.timeout) || eloop.readers.count > 0 ||
  577. eloop.writers.count > 0 || eloop.exceptions.count > 0)) {
  578. struct eloop_timeout *timeout;
  579. timeout = dl_list_first(&eloop.timeout, struct eloop_timeout,
  580. list);
  581. if (timeout) {
  582. os_get_time(&now);
  583. if (os_time_before(&now, &timeout->time))
  584. os_time_sub(&timeout->time, &now, &tv);
  585. else
  586. tv.sec = tv.usec = 0;
  587. #ifdef CONFIG_ELOOP_POLL
  588. timeout_ms = tv.sec * 1000 + tv.usec / 1000;
  589. #else /* CONFIG_ELOOP_POLL */
  590. _tv.tv_sec = tv.sec;
  591. _tv.tv_usec = tv.usec;
  592. #endif /* CONFIG_ELOOP_POLL */
  593. }
  594. #ifdef CONFIG_ELOOP_POLL
  595. num_poll_fds = eloop_sock_table_set_fds(
  596. &eloop.readers, &eloop.writers, &eloop.exceptions,
  597. eloop.pollfds, eloop.pollfds_map,
  598. eloop.max_pollfd_map);
  599. res = poll(eloop.pollfds, num_poll_fds,
  600. timeout ? timeout_ms : -1);
  601. if (res < 0 && errno != EINTR && errno != 0) {
  602. perror("poll");
  603. goto out;
  604. }
  605. #else /* CONFIG_ELOOP_POLL */
  606. eloop_sock_table_set_fds(&eloop.readers, rfds);
  607. eloop_sock_table_set_fds(&eloop.writers, wfds);
  608. eloop_sock_table_set_fds(&eloop.exceptions, efds);
  609. res = select(eloop.max_sock + 1, rfds, wfds, efds,
  610. timeout ? &_tv : NULL);
  611. if (res < 0 && errno != EINTR && errno != 0) {
  612. perror("select");
  613. goto out;
  614. }
  615. #endif /* CONFIG_ELOOP_POLL */
  616. eloop_process_pending_signals();
  617. /* check if some registered timeouts have occurred */
  618. timeout = dl_list_first(&eloop.timeout, struct eloop_timeout,
  619. list);
  620. if (timeout) {
  621. os_get_time(&now);
  622. if (!os_time_before(&now, &timeout->time)) {
  623. void *eloop_data = timeout->eloop_data;
  624. void *user_data = timeout->user_data;
  625. eloop_timeout_handler handler =
  626. timeout->handler;
  627. eloop_remove_timeout(timeout);
  628. handler(eloop_data, user_data);
  629. }
  630. }
  631. if (res <= 0)
  632. continue;
  633. #ifdef CONFIG_ELOOP_POLL
  634. eloop_sock_table_dispatch(&eloop.readers, &eloop.writers,
  635. &eloop.exceptions, eloop.pollfds_map,
  636. eloop.max_pollfd_map);
  637. #else /* CONFIG_ELOOP_POLL */
  638. eloop_sock_table_dispatch(&eloop.readers, rfds);
  639. eloop_sock_table_dispatch(&eloop.writers, wfds);
  640. eloop_sock_table_dispatch(&eloop.exceptions, efds);
  641. #endif /* CONFIG_ELOOP_POLL */
  642. }
  643. out:
  644. #ifndef CONFIG_ELOOP_POLL
  645. os_free(rfds);
  646. os_free(wfds);
  647. os_free(efds);
  648. #endif /* CONFIG_ELOOP_POLL */
  649. return;
  650. }
  651. void eloop_terminate(void)
  652. {
  653. eloop.terminate = 1;
  654. }
  655. void eloop_destroy(void)
  656. {
  657. struct eloop_timeout *timeout, *prev;
  658. struct os_time now;
  659. os_get_time(&now);
  660. dl_list_for_each_safe(timeout, prev, &eloop.timeout,
  661. struct eloop_timeout, list) {
  662. int sec, usec;
  663. sec = timeout->time.sec - now.sec;
  664. usec = timeout->time.usec - now.usec;
  665. if (timeout->time.usec < now.usec) {
  666. sec--;
  667. usec += 1000000;
  668. }
  669. wpa_printf(MSG_INFO, "ELOOP: remaining timeout: %d.%06d "
  670. "eloop_data=%p user_data=%p handler=%p",
  671. sec, usec, timeout->eloop_data, timeout->user_data,
  672. timeout->handler);
  673. wpa_trace_dump_funcname("eloop unregistered timeout handler",
  674. timeout->handler);
  675. wpa_trace_dump("eloop timeout", timeout);
  676. eloop_remove_timeout(timeout);
  677. }
  678. eloop_sock_table_destroy(&eloop.readers);
  679. eloop_sock_table_destroy(&eloop.writers);
  680. eloop_sock_table_destroy(&eloop.exceptions);
  681. os_free(eloop.signals);
  682. #ifdef CONFIG_ELOOP_POLL
  683. os_free(eloop.pollfds);
  684. os_free(eloop.pollfds_map);
  685. #endif /* CONFIG_ELOOP_POLL */
  686. }
  687. int eloop_terminated(void)
  688. {
  689. return eloop.terminate;
  690. }
  691. void eloop_wait_for_read_sock(int sock)
  692. {
  693. #ifdef CONFIG_ELOOP_POLL
  694. struct pollfd pfd;
  695. if (sock < 0)
  696. return;
  697. os_memset(&pfd, 0, sizeof(pfd));
  698. pfd.fd = sock;
  699. pfd.events = POLLIN;
  700. poll(&pfd, 1, -1);
  701. #else /* CONFIG_ELOOP_POLL */
  702. fd_set rfds;
  703. if (sock < 0)
  704. return;
  705. FD_ZERO(&rfds);
  706. FD_SET(sock, &rfds);
  707. select(sock + 1, &rfds, NULL, NULL, NULL);
  708. #endif /* CONFIG_ELOOP_POLL */
  709. }