64f36a58 |
1 | /* Linux epoll(2) based ae.c module |
12d090d2 |
2 | * Copyright (C) 2009-2010 Salvatore Sanfilippo - antirez@gmail.com |
64f36a58 |
3 | * Released under the BSD license. See the COPYING file for more info. */ |
4 | |
5 | #include <sys/epoll.h> |
6 | |
7 | typedef struct aeApiState { |
8 | int epfd; |
9 | struct epoll_event events[AE_SETSIZE]; |
10 | } aeApiState; |
11 | |
12 | static int aeApiCreate(aeEventLoop *eventLoop) { |
13 | aeApiState *state = zmalloc(sizeof(aeApiState)); |
14 | |
15 | if (!state) return -1; |
16 | state->epfd = epoll_create(1024); /* 1024 is just an hint for the kernel */ |
17 | if (state->epfd == -1) return -1; |
18 | eventLoop->apidata = state; |
19 | return 0; |
20 | } |
21 | |
22 | static void aeApiFree(aeEventLoop *eventLoop) { |
23 | aeApiState *state = eventLoop->apidata; |
24 | |
25 | close(state->epfd); |
26 | zfree(state); |
27 | } |
28 | |
29 | static int aeApiAddEvent(aeEventLoop *eventLoop, int fd, int mask) { |
30 | aeApiState *state = eventLoop->apidata; |
31 | struct epoll_event ee; |
67669f00 |
32 | /* If the fd was already monitored for some event, we need a MOD |
33 | * operation. Otherwise we need an ADD operation. */ |
64f36a58 |
34 | int op = eventLoop->events[fd].mask == AE_NONE ? |
35 | EPOLL_CTL_ADD : EPOLL_CTL_MOD; |
36 | |
37 | ee.events = 0; |
67669f00 |
38 | mask |= eventLoop->events[fd].mask; /* Merge old events */ |
64f36a58 |
39 | if (mask & AE_READABLE) ee.events |= EPOLLIN; |
40 | if (mask & AE_WRITABLE) ee.events |= EPOLLOUT; |
214d880b |
41 | ee.data.u64 = 0; /* avoid valgrind warning */ |
64f36a58 |
42 | ee.data.fd = fd; |
43 | if (epoll_ctl(state->epfd,op,fd,&ee) == -1) return -1; |
44 | return 0; |
45 | } |
46 | |
47 | static void aeApiDelEvent(aeEventLoop *eventLoop, int fd, int delmask) { |
48 | aeApiState *state = eventLoop->apidata; |
49 | struct epoll_event ee; |
50 | int mask = eventLoop->events[fd].mask & (~delmask); |
51 | |
52 | ee.events = 0; |
53 | if (mask & AE_READABLE) ee.events |= EPOLLIN; |
54 | if (mask & AE_WRITABLE) ee.events |= EPOLLOUT; |
214d880b |
55 | ee.data.u64 = 0; /* avoid valgrind warning */ |
64f36a58 |
56 | ee.data.fd = fd; |
57 | if (mask != AE_NONE) { |
58 | epoll_ctl(state->epfd,EPOLL_CTL_MOD,fd,&ee); |
59 | } else { |
60 | /* Note, Kernel < 2.6.9 requires a non null event pointer even for |
61 | * EPOLL_CTL_DEL. */ |
62 | epoll_ctl(state->epfd,EPOLL_CTL_DEL,fd,&ee); |
63 | } |
64 | } |
65 | |
66 | static int aeApiPoll(aeEventLoop *eventLoop, struct timeval *tvp) { |
67 | aeApiState *state = eventLoop->apidata; |
68 | int retval, numevents = 0; |
69 | |
70 | retval = epoll_wait(state->epfd,state->events,AE_SETSIZE, |
71 | tvp ? (tvp->tv_sec*1000 + tvp->tv_usec/1000) : -1); |
72 | if (retval > 0) { |
73 | int j; |
74 | |
75 | numevents = retval; |
76 | for (j = 0; j < numevents; j++) { |
77 | int mask = 0; |
78 | struct epoll_event *e = state->events+j; |
79 | |
80 | if (e->events & EPOLLIN) mask |= AE_READABLE; |
81 | if (e->events & EPOLLOUT) mask |= AE_WRITABLE; |
64f36a58 |
82 | eventLoop->fired[j].fd = e->data.fd; |
83 | eventLoop->fired[j].mask = mask; |
84 | } |
85 | } |
86 | return numevents; |
87 | } |
7a932b74 |
88 | |
89 | static char *aeApiName(void) { |
90 | return "epoll"; |
91 | } |