2 * Event loop based on select() loop
3 * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
27 eloop_sock_handler handler;
33 struct eloop_timeout {
38 eloop_timeout_handler handler;
47 eloop_signal_handler handler;
51 struct eloop_sock_table {
53 struct eloop_sock *table;
60 struct eloop_sock_table readers;
61 struct eloop_sock_table writers;
62 struct eloop_sock_table exceptions;
64 struct dl_list timeout;
67 struct eloop_signal *signals;
69 int pending_terminate;
72 int reader_table_changed;
75 static struct eloop_data eloop;
80 static void eloop_sigsegv_handler(int sig)
82 wpa_trace_show("eloop SIGSEGV");
86 static void eloop_trace_sock_add_ref(struct eloop_sock_table *table)
89 if (table == NULL || table->table == NULL)
91 for (i = 0; i < table->count; i++) {
92 wpa_trace_add_ref(&table->table[i], eloop,
93 table->table[i].eloop_data);
94 wpa_trace_add_ref(&table->table[i], user,
95 table->table[i].user_data);
100 static void eloop_trace_sock_remove_ref(struct eloop_sock_table *table)
103 if (table == NULL || table->table == NULL)
105 for (i = 0; i < table->count; i++) {
106 wpa_trace_remove_ref(&table->table[i], eloop,
107 table->table[i].eloop_data);
108 wpa_trace_remove_ref(&table->table[i], user,
109 table->table[i].user_data);
113 #else /* WPA_TRACE */
115 #define eloop_trace_sock_add_ref(table) do { } while (0)
116 #define eloop_trace_sock_remove_ref(table) do { } while (0)
118 #endif /* WPA_TRACE */
123 os_memset(&eloop, 0, sizeof(eloop));
124 dl_list_init(&eloop.timeout);
126 signal(SIGSEGV, eloop_sigsegv_handler);
127 #endif /* WPA_TRACE */
132 static int eloop_sock_table_add_sock(struct eloop_sock_table *table,
133 int sock, eloop_sock_handler handler,
134 void *eloop_data, void *user_data)
136 struct eloop_sock *tmp;
141 eloop_trace_sock_remove_ref(table);
142 tmp = (struct eloop_sock *)
143 os_realloc(table->table,
144 (table->count + 1) * sizeof(struct eloop_sock));
148 tmp[table->count].sock = sock;
149 tmp[table->count].eloop_data = eloop_data;
150 tmp[table->count].user_data = user_data;
151 tmp[table->count].handler = handler;
152 wpa_trace_record(&tmp[table->count]);
155 if (sock > eloop.max_sock)
156 eloop.max_sock = sock;
158 eloop_trace_sock_add_ref(table);
164 static void eloop_sock_table_remove_sock(struct eloop_sock_table *table,
169 if (table == NULL || table->table == NULL || table->count == 0)
172 for (i = 0; i < table->count; i++) {
173 if (table->table[i].sock == sock)
176 if (i == table->count)
178 eloop_trace_sock_remove_ref(table);
179 if (i != table->count - 1) {
180 os_memmove(&table->table[i], &table->table[i + 1],
181 (table->count - i - 1) *
182 sizeof(struct eloop_sock));
186 eloop_trace_sock_add_ref(table);
190 static void eloop_sock_table_set_fds(struct eloop_sock_table *table,
197 if (table->table == NULL)
200 for (i = 0; i < table->count; i++)
201 FD_SET(table->table[i].sock, fds);
205 static void eloop_sock_table_dispatch(struct eloop_sock_table *table,
210 if (table == NULL || table->table == NULL)
214 for (i = 0; i < table->count; i++) {
215 if (FD_ISSET(table->table[i].sock, fds)) {
216 table->table[i].handler(table->table[i].sock,
217 table->table[i].eloop_data,
218 table->table[i].user_data);
226 static void eloop_sock_table_destroy(struct eloop_sock_table *table)
230 for (i = 0; i < table->count && table->table; i++) {
231 wpa_printf(MSG_INFO, "ELOOP: remaining socket: "
232 "sock=%d eloop_data=%p user_data=%p "
234 table->table[i].sock,
235 table->table[i].eloop_data,
236 table->table[i].user_data,
237 table->table[i].handler);
238 wpa_trace_dump("eloop sock", &table->table[i]);
240 os_free(table->table);
245 int eloop_register_read_sock(int sock, eloop_sock_handler handler,
246 void *eloop_data, void *user_data)
248 return eloop_register_sock(sock, EVENT_TYPE_READ, handler,
249 eloop_data, user_data);
253 void eloop_unregister_read_sock(int sock)
255 eloop_unregister_sock(sock, EVENT_TYPE_READ);
259 static struct eloop_sock_table *eloop_get_sock_table(eloop_event_type type)
262 case EVENT_TYPE_READ:
263 return &eloop.readers;
264 case EVENT_TYPE_WRITE:
265 return &eloop.writers;
266 case EVENT_TYPE_EXCEPTION:
267 return &eloop.exceptions;
274 int eloop_register_sock(int sock, eloop_event_type type,
275 eloop_sock_handler handler,
276 void *eloop_data, void *user_data)
278 struct eloop_sock_table *table;
280 table = eloop_get_sock_table(type);
281 return eloop_sock_table_add_sock(table, sock, handler,
282 eloop_data, user_data);
286 void eloop_unregister_sock(int sock, eloop_event_type type)
288 struct eloop_sock_table *table;
290 table = eloop_get_sock_table(type);
291 eloop_sock_table_remove_sock(table, sock);
295 int eloop_register_timeout(unsigned int secs, unsigned int usecs,
296 eloop_timeout_handler handler,
297 void *eloop_data, void *user_data)
299 struct eloop_timeout *timeout, *tmp;
301 timeout = os_malloc(sizeof(*timeout));
304 if (os_get_time(&timeout->time) < 0) {
308 timeout->time.sec += secs;
309 timeout->time.usec += usecs;
310 while (timeout->time.usec >= 1000000) {
312 timeout->time.usec -= 1000000;
314 timeout->eloop_data = eloop_data;
315 timeout->user_data = user_data;
316 timeout->handler = handler;
317 wpa_trace_add_ref(timeout, eloop, eloop_data);
318 wpa_trace_add_ref(timeout, user, user_data);
319 wpa_trace_record(timeout);
321 /* Maintain timeouts in order of increasing time */
322 dl_list_for_each(tmp, &eloop.timeout, struct eloop_timeout, list) {
323 if (os_time_before(&timeout->time, &tmp->time)) {
324 dl_list_add(tmp->list.prev, &timeout->list);
328 dl_list_add_tail(&eloop.timeout, &timeout->list);
334 static void eloop_remove_timeout(struct eloop_timeout *timeout)
336 wpa_trace_remove_ref(timeout, eloop, timeout->eloop_data);
337 wpa_trace_remove_ref(timeout, user, timeout->user_data);
342 int eloop_cancel_timeout(eloop_timeout_handler handler,
343 void *eloop_data, void *user_data)
345 struct eloop_timeout *timeout, *prev;
348 dl_list_for_each_safe(timeout, prev, &eloop.timeout,
349 struct eloop_timeout, list) {
350 if (timeout->handler == handler &&
351 (timeout->eloop_data == eloop_data ||
352 eloop_data == ELOOP_ALL_CTX) &&
353 (timeout->user_data == user_data ||
354 user_data == ELOOP_ALL_CTX)) {
355 dl_list_del(&timeout->list);
356 eloop_remove_timeout(timeout);
365 int eloop_is_timeout_registered(eloop_timeout_handler handler,
366 void *eloop_data, void *user_data)
368 struct eloop_timeout *tmp;
370 dl_list_for_each(tmp, &eloop.timeout, struct eloop_timeout, list) {
371 if (tmp->handler == handler &&
372 tmp->eloop_data == eloop_data &&
373 tmp->user_data == user_data)
381 #ifndef CONFIG_NATIVE_WINDOWS
382 static void eloop_handle_alarm(int sig)
384 wpa_printf(MSG_ERROR, "eloop: could not process SIGINT or SIGTERM in "
385 "two seconds. Looks like there\n"
386 "is a bug that ends up in a busy loop that "
387 "prevents clean shutdown.\n"
388 "Killing program forcefully.\n");
391 #endif /* CONFIG_NATIVE_WINDOWS */
394 static void eloop_handle_signal(int sig)
398 #ifndef CONFIG_NATIVE_WINDOWS
399 if ((sig == SIGINT || sig == SIGTERM) && !eloop.pending_terminate) {
400 /* Use SIGALRM to break out from potential busy loops that
401 * would not allow the program to be killed. */
402 eloop.pending_terminate = 1;
403 signal(SIGALRM, eloop_handle_alarm);
406 #endif /* CONFIG_NATIVE_WINDOWS */
409 for (i = 0; i < eloop.signal_count; i++) {
410 if (eloop.signals[i].sig == sig) {
411 eloop.signals[i].signaled++;
418 static void eloop_process_pending_signals(void)
422 if (eloop.signaled == 0)
426 if (eloop.pending_terminate) {
427 #ifndef CONFIG_NATIVE_WINDOWS
429 #endif /* CONFIG_NATIVE_WINDOWS */
430 eloop.pending_terminate = 0;
433 for (i = 0; i < eloop.signal_count; i++) {
434 if (eloop.signals[i].signaled) {
435 eloop.signals[i].signaled = 0;
436 eloop.signals[i].handler(eloop.signals[i].sig,
437 eloop.signals[i].user_data);
443 int eloop_register_signal(int sig, eloop_signal_handler handler,
446 struct eloop_signal *tmp;
448 tmp = (struct eloop_signal *)
449 os_realloc(eloop.signals,
450 (eloop.signal_count + 1) *
451 sizeof(struct eloop_signal));
455 tmp[eloop.signal_count].sig = sig;
456 tmp[eloop.signal_count].user_data = user_data;
457 tmp[eloop.signal_count].handler = handler;
458 tmp[eloop.signal_count].signaled = 0;
459 eloop.signal_count++;
461 signal(sig, eloop_handle_signal);
467 int eloop_register_signal_terminate(eloop_signal_handler handler,
470 int ret = eloop_register_signal(SIGINT, handler, user_data);
472 ret = eloop_register_signal(SIGTERM, handler, user_data);
477 int eloop_register_signal_reconfig(eloop_signal_handler handler,
480 #ifdef CONFIG_NATIVE_WINDOWS
482 #else /* CONFIG_NATIVE_WINDOWS */
483 return eloop_register_signal(SIGHUP, handler, user_data);
484 #endif /* CONFIG_NATIVE_WINDOWS */
490 fd_set *rfds, *wfds, *efds;
493 struct os_time tv, now;
495 rfds = os_malloc(sizeof(*rfds));
496 wfds = os_malloc(sizeof(*wfds));
497 efds = os_malloc(sizeof(*efds));
498 if (rfds == NULL || wfds == NULL || efds == NULL)
501 while (!eloop.terminate &&
502 (!dl_list_empty(&eloop.timeout) || eloop.readers.count > 0 ||
503 eloop.writers.count > 0 || eloop.exceptions.count > 0)) {
504 struct eloop_timeout *timeout;
505 timeout = dl_list_first(&eloop.timeout, struct eloop_timeout,
509 if (os_time_before(&now, &timeout->time))
510 os_time_sub(&timeout->time, &now, &tv);
512 tv.sec = tv.usec = 0;
514 _tv.tv_usec = tv.usec;
517 eloop_sock_table_set_fds(&eloop.readers, rfds);
518 eloop_sock_table_set_fds(&eloop.writers, wfds);
519 eloop_sock_table_set_fds(&eloop.exceptions, efds);
520 res = select(eloop.max_sock + 1, rfds, wfds, efds,
521 timeout ? &_tv : NULL);
522 if (res < 0 && errno != EINTR && errno != 0) {
526 eloop_process_pending_signals();
528 /* check if some registered timeouts have occurred */
531 if (!os_time_before(&now, &timeout->time)) {
532 dl_list_del(&timeout->list);
533 timeout->handler(timeout->eloop_data,
535 eloop_remove_timeout(timeout);
543 eloop_sock_table_dispatch(&eloop.readers, rfds);
544 eloop_sock_table_dispatch(&eloop.writers, wfds);
545 eloop_sock_table_dispatch(&eloop.exceptions, efds);
555 void eloop_terminate(void)
561 void eloop_destroy(void)
563 struct eloop_timeout *timeout, *prev;
567 dl_list_for_each_safe(timeout, prev, &eloop.timeout,
568 struct eloop_timeout, list) {
570 sec = timeout->time.sec - now.sec;
571 usec = timeout->time.usec - now.usec;
572 if (timeout->time.usec < now.usec) {
576 wpa_printf(MSG_INFO, "ELOOP: remaining timeout: %d.%06d "
577 "eloop_data=%p user_data=%p handler=%p",
578 sec, usec, timeout->eloop_data, timeout->user_data,
580 wpa_trace_dump("eloop timeout", timeout);
581 dl_list_del(&timeout->list);
582 eloop_remove_timeout(timeout);
584 eloop_sock_table_destroy(&eloop.readers);
585 eloop_sock_table_destroy(&eloop.writers);
586 eloop_sock_table_destroy(&eloop.exceptions);
587 os_free(eloop.signals);
591 int eloop_terminated(void)
593 return eloop.terminate;
597 void eloop_wait_for_read_sock(int sock)
606 select(sock + 1, &rfds, NULL, NULL, NULL);