diff options
| author | David Gibson <david@gibson.dropbear.id.au> | 2026-05-18 13:22:43 +1000 |
|---|---|---|
| committer | Stefano Brivio <sbrivio@redhat.com> | 2026-05-20 01:23:47 +0200 |
| commit | b64ef531b08a2969e26a2212499734940a0c6335 (patch) | |
| tree | e8cd2fd0f338b2eae27cf23aa28beb5d74c7d01e | |
| parent | 5ef0fc44a9a334f6b433a2c795d82b89dd9f1133 (diff) | |
| download | passt-b64ef531b08a2969e26a2212499734940a0c6335.tar passt-b64ef531b08a2969e26a2212499734940a0c6335.tar.gz passt-b64ef531b08a2969e26a2212499734940a0c6335.tar.bz2 passt-b64ef531b08a2969e26a2212499734940a0c6335.tar.lz passt-b64ef531b08a2969e26a2212499734940a0c6335.tar.xz passt-b64ef531b08a2969e26a2212499734940a0c6335.tar.zst passt-b64ef531b08a2969e26a2212499734940a0c6335.zip | |
Most of our operation is asynchronous, based on non-blocking fds handled
in our epoll loop. However, our several Unix sockets (tap client, repair
helper, control client) are all blocking fds after accept().
That is in fact correct, but for not especially obvious reasons that are
slightly different in each case. Add explanatory comments to each of them.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
[sbrivio: Fixed minor coding style detail in comment in conf_accept()]
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
| -rw-r--r-- | conf.c | 7 | ||||
| -rw-r--r-- | repair.c | 4 | ||||
| -rw-r--r-- | tap.c | 5 |
3 files changed, 16 insertions, 0 deletions
@@ -2084,6 +2084,13 @@ static void conf_accept(struct ctx *c) int fd, rc; retry: + /* Currently we perform the configuration transaction more-or-less + * synchronously, so we want the accepted socket to be blocking. + * + * FIXME: We should make the configuration update asynchronous, like + * most of our operation, so a misbehaving configuration client can't + * block the main forwarding loop. + */ fd = accept4(c->fd_control_listen, NULL, NULL, SOCK_CLOEXEC); if (fd < 0) { if (errno != EAGAIN) @@ -99,6 +99,10 @@ int repair_listen_handler(struct ctx *c, uint32_t events) return EEXIST; } + /* We want the accepted socket to be blocking; we use it during + * migration which is a synchronous interruption to our normal + * non-blocking behaviour. + */ if ((c->fd_repair = accept4(c->fd_repair_listen, NULL, NULL, SOCK_CLOEXEC)) < 0) { rc = errno; @@ -1492,6 +1492,11 @@ void tap_listen_handler(struct ctx *c, uint32_t events) return; } + /* Because we generally only access the accepted socket from epoll + * events, it usually doesn't matter if it's blocking or non-blocking. + * However, in rare cases when the socket buffer fills we need (briefly, + * we hope) blocking writes (write_remainder() in send_frames_passt()). + */ c->fd_tap = accept4(c->fd_tap_listen, NULL, NULL, SOCK_CLOEXEC); if (c->fd_tap < 0) { warn_perror("Error accepting tap client"); |
