From 68826376ee5f47783c644c6604f4411ec747cd7e Mon Sep 17 00:00:00 2001
From: guowenxue <guowenxue@gmail.com>
Date: Fri, 14 Nov 2025 23:52:16 +0800
Subject: [PATCH] Add UDP DNS client source code

---
 project/2.socketd/booster/socket.c |  658 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 files changed, 658 insertions(+), 0 deletions(-)

diff --git a/project/2.socketd/booster/socket.c b/project/2.socketd/booster/socket.c
new file mode 100644
index 0000000..de82a00
--- /dev/null
+++ b/project/2.socketd/booster/socket.c
@@ -0,0 +1,658 @@
+/********************************************************************************
+ *      Copyright:  (C) 2022 LingYun IoT System Studio
+ *                  All rights reserved.
+ *
+ *       Filename:  socket.c
+ *    Description:  This file is for socket API functions
+ *
+ *        Version:  1.0.0(18/04/22)
+ *         Author:  Guo Wenxue <guowenxue@gmail.com>
+ *      ChangeLog:  1, Release initial version on "18/04/22 17:09:59"
+ *
+ ********************************************************************************/
+#include <stdio.h>
+#include <unistd.h>
+#include <string.h>
+#include <errno.h>
+#include <fcntl.h>
+
+#include "socket.h"
+#include "logger.h"
+
+/*  description: initial socket context
+ *   input args:
+ *               $sock:  socket context pointer
+ *               $host:  connect server hostname for client mode, unused for server mode
+ *               $port:  connect server port for client mode or listen port for server mode
+ * return value: <0: failure   0:ok
+ */
+int socket_init(socket_t *sock, char *host, int port)
+{
+    if( !sock || port<=0 )
+        return -1;
+
+    memset( sock, 0, sizeof(*sock) );
+    sock->fd = -1;
+    sock->port = port;
+    if( host ) /* server no need it */
+    {
+        strncpy(sock->host, host, HOSTNAME_LEN);
+    }
+
+    return 0;
+}
+
+/*  description: close socket
+ *   input args:
+ *               $sock:  socket context pointer
+ * return value: <0: failure   0:ok
+ */
+int socket_term(socket_t *sock)
+{
+    if( !sock )
+        return -1;
+
+    if( sock->fd > 0)
+    {
+        close(sock->fd);
+        sock->fd = -1;
+        sock->connected = 0;
+    }
+
+    return 0;
+}
+
+/*  description: socket server start listen
+ *   input args:
+ *               $sock:  socket context pointer
+ *               $port:  socket listen port
+ * return value: <0: failure   0:ok
+ */
+int socket_listen(socket_t *sock, int port)
+{
+    int                     listen_fd;
+    int                     reuse = 1;
+    struct sockaddr_in      serv_addr;
+
+    if( !sock )
+        return -1;
+
+    /* set open file description number to max */
+    set_socket_rlimit();
+
+    /* create TCP socket */
+    listen_fd = socket(AF_INET, SOCK_STREAM, 0);
+    if(listen_fd < 0 )
+    {
+        log_error("create socket failure: %s\n", strerror(errno));
+        return -1;
+    }
+
+    /* resolve the "Address already in use" error when using bind() */
+    setsockopt(listen_fd, SOL_SOCKET, SO_REUSEADDR, &reuse, sizeof(reuse));
+
+    /* bind socket server information */
+    memset(&serv_addr, 0, sizeof(serv_addr));
+    serv_addr.sin_family = AF_INET;
+    serv_addr.sin_port = htons(port);
+    serv_addr.sin_addr.s_addr = htonl(INADDR_ANY);
+    if( bind(listen_fd, (struct sockaddr *)&serv_addr, sizeof(serv_addr)) < 0 )
+    {
+        log_error("bind socket failure: %s\n", strerror(errno));
+        return -2;
+    }
+    log_info("socket[%d] bind on port[%d] for all IP address ok\n", listen_fd, port);
+
+    /* start listen socket */
+    listen(listen_fd, 13);
+
+    sock->port = port;
+    sock->fd = listen_fd;
+
+    return listen_fd;
+}
+
+/*  description: create epoll for socket server and add listenfd into it
+ *   input args: $max_evts:  max events for epoll_create()
+ *               $listenfd:  listen socket fd
+ * return value: <0: failure  >=0: epollfd
+ */
+int epoll_init(int max_evts, int listenfd)
+{
+    int                       epollfd;
+
+    if( max_evts<=0 || listenfd<0 )
+    {
+        log_error("Invalid input arguments\n");
+        return -1;
+    }
+
+    if( (epollfd=epoll_create(max_evts)) < 0 )
+    {
+        log_error("epoll_create() failure: %s\n", strerror(errno));
+        return -2;
+    }
+
+    if( epoll_add(epollfd, listenfd) < 0 )
+    {
+        log_error("epoll add listen socket[%d] failure: %s\n", listenfd, strerror(errno));
+        close(epollfd);
+        return -2;
+    }
+
+    log_info("epoll add listen socket[%d] ok\n", listenfd);
+    return epollfd;
+}
+
+/*  description: close epoll
+ *   input args: $epollfd:  epoll fd
+ * return value: void
+ */
+void epoll_term(int epollfd)
+{
+    if(epollfd > 0 )
+        close(epollfd);
+}
+
+/*  description: add new fd into epoll to monitor
+ *   input args: $epollfd:  epoll fd
+ *               $fd:       socket fd need added into epoll
+ * return value: <0: failure  0: successfully
+ */
+int epoll_add(int epollfd, int fd)
+{
+    struct epoll_event        event;
+
+    if( epollfd<0 || fd<0 )
+    {
+        log_error("Invalid input arguments\n");
+        return -1;
+    }
+
+    //event.events = EPOLLIN | EPOLLET;  /* Edge Triggered  */
+    event.events = EPOLLIN; /* default Level Triggered */
+    event.data.fd = fd;
+
+    if( epoll_ctl(epollfd, EPOLL_CTL_ADD, fd, &event) < 0)
+    {
+        log_error("epoll add fd[%d] failure: %s\n", fd, strerror(errno));
+        return -2;
+    }
+
+    return 0;
+}
+
+/*  description: delete fd from epoll to monitor
+ *   input args: $epollfd:  epoll fd
+ *               $fd:       socket fd need added into epoll
+ * return value: <0: failure  0: successfully
+ */
+int epoll_del(int epollfd, int fd)
+{
+    if( epollfd<0 || fd<0 )
+    {
+        log_error("Invalid input arguments\n");
+        return -1;
+    }
+
+    if( epoll_ctl(epollfd, EPOLL_CTL_DEL, fd, NULL) < 0)
+    {
+        log_error("epoll del fd[%d] failure: %s\n", fd, strerror(errno));
+        return -2;
+    }
+
+    return 0;
+}
+
+
+/*  description: check socket connect status
+ *   input args:
+ *               $sock:  socket context pointer
+ * return value: 1: connected   0:disconnected
+ */
+int socket_connected(socket_t *sock)
+{
+    struct tcp_info   info;
+    int               len=sizeof(info);
+    int               changed = 0;
+
+    if( !sock )
+    {
+        return 0;
+    }
+
+    if( sock->fd < 0 )
+    {
+        /* socket is connected before but got disconnected now */
+        changed = sock->connected ? 1 : 0;
+        sock->connected = 0;
+        goto out;
+    }
+
+    getsockopt(sock->fd, IPPROTO_TCP, TCP_INFO, &info, (socklen_t *)&len);
+    if( TCP_ESTABLISHED==info.tcpi_state )
+    {
+        /* socket is disconnected before but got connected now */
+        changed = !sock->connected ? 1 : 0;
+        sock->connected = 1;
+    }
+    else
+    {
+        /* socket is connected before but got disconnected now */
+        changed = sock->connected ? 1 : 0;
+        sock->connected = 0;
+    }
+
+out:
+    if( changed )
+    {
+        log_info("socket status got %s\n", sock->connected?"connected":"disconnected");
+    }
+    return sock->connected;
+}
+
+/*  description: socket connect to server in block mode
+ *   input args:
+ *               $sock:  socket context pointer
+ * return value: <0: failure   0:ok
+ */
+int socket_connect(socket_t *sock)
+{
+    int                 rv = 0;
+    int                 sockfd = 0;
+    char                service[20];
+    struct addrinfo     hints, *rp;
+    struct addrinfo    *res = NULL;
+    struct in_addr      inaddr;
+    struct sockaddr_in  addr;
+    int                 len = sizeof(addr);
+
+    if( !sock )
+        return -1;
+
+    socket_term(sock);
+
+    /*+--------------------------------------------------+
+     *| use getaddrinfo() to do domain name translation  |
+     *+--------------------------------------------------+*/
+
+    memset(&hints, 0, sizeof(struct addrinfo));
+    hints.ai_family = AF_INET; /* Only support IPv4 */
+    hints.ai_socktype = SOCK_STREAM;
+    hints.ai_protocol = IPPROTO_TCP; /* TCP protocol */
+
+    /* If $host is a valid IP address, then don't use name resolution */
+    if( inet_aton(sock->host, &inaddr) )
+    {
+        //log_info("%s is a valid IP address, don't use domain name resolution.\n", sock->host);
+        hints.ai_flags |= AI_NUMERICHOST;
+    }
+
+    /* Obtain address(es) matching host/port */
+    snprintf(service, sizeof(service), "%d", sock->port);
+    if( (rv=getaddrinfo(sock->host, service, &hints, &res)) )
+    {
+        log_error("getaddrinfo() parser [%s:%s] failed: %s\n", sock->host, service, gai_strerror(rv));
+        return -3;
+    }
+
+    /* getaddrinfo() returns a list of address structures. Try each
+       address until we successfully connect or bind */
+    for (rp=res; rp!=NULL; rp=rp->ai_next)
+    {
+#if 0
+        char                  ipaddr[INET_ADDRSTRLEN];
+        struct sockaddr_in   *sp = (struct sockaddr_in *) rp->ai_addr;
+
+        /* print domain name translation result */
+        memset( ipaddr, 0, sizeof(ipaddr) );
+        if( inet_ntop(AF_INET, &sp->sin_addr, ipaddr, sizeof(ipaddr)) )
+        {
+            log_info("domain name resolution [%s->%s]\n", sock->host, ipaddr);
+        }
+#endif
+
+        /*  Create the socket */
+        sockfd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
+        if( sockfd < 0)
+        {
+            log_error("socket() create failed: %s\n", strerror(errno));
+            rv = -3;
+            continue;
+        }
+
+        /* connect to server */
+        rv = connect(sockfd, rp->ai_addr, len);
+        if( 0 == rv )
+        {
+            sock->fd = sockfd;
+            log_info("Connect to server[%s:%d] on fd[%d] successfully!\n", sock->host, sock->port, sockfd);
+            break;
+        }
+        else
+        {
+            /* socket connect get error, try another IP address */
+            close(sockfd);
+            continue;
+        }
+    }
+
+    freeaddrinfo(res);
+    return rv;
+}
+
+/*  description: send data from the socket
+ *   input args:
+ *               $sock :  socket context pointer
+ *               $data :  socket send data
+ *               $bytes:  socket send data bytes
+ * return value: <0: failure   0:ok
+ */
+int socket_send(socket_t *sock, char *data, int bytes)
+{
+    int            rv = 0;
+    int            i = 0;
+    int            left_bytes = bytes;
+
+    if( !sock || !data || bytes<= 0 )
+        return -1;
+
+    while( left_bytes > 0 )
+    {
+        rv=write(sock->fd, &data[i], left_bytes);
+        if( rv < 0 )
+        {
+            log_info("socket[%d] write() failure: %s, close socket now\n", sock->fd, strerror(errno));
+            socket_term(sock);
+            return -2;
+        }
+        else if( rv == left_bytes )
+        {
+            log_info("socket send %d bytes data over\n", bytes);
+            return 0;
+        }
+        else
+        {
+            /* not send over this time, continue to send left data  */
+            i += rv;
+            left_bytes -= rv;
+            continue;
+        }
+    }
+
+    return 0;
+}
+
+/*  description: receive data from the socket
+ *   input args:
+ *               $sock :  socket context pointer
+ *               $buf  :  socket receive data buffer
+ *               $size :  socket receive data buffer size
+ *               $timeout: receive data time, <=0 will don't timeout
+ * return value: <0: failure   0:ok
+ */
+int socket_recv(socket_t *sock, char *buf, int size, int timeout)
+{
+    int               rv = 0;
+    fd_set            rdset;
+    int               maxfd;
+
+    if( !sock || !buf || size<= 0 )
+        return -1;
+
+    memset(buf, 0, size);
+
+    maxfd = sock->fd;
+    FD_ZERO(&rdset);
+    FD_SET(sock->fd, &rdset);
+
+    if( timeout <= 0 ) /* no timeout  */
+    {
+        rv=select(maxfd+1, &rdset, NULL, NULL, NULL);
+    }
+    else
+    {
+        struct timeval    tv;
+        tv.tv_sec = timeout;
+        tv.tv_usec = 0;
+        rv=select(maxfd+1, &rdset, NULL, NULL, &tv);
+    }
+
+    if( rv < 0 )
+    {
+        log_error("select() on socket[%d] got error: %s\n", sock->fd, strerror(errno));
+        return -2;
+    }
+    else if( rv == 0 )
+    {
+        log_error("select() on socket[%d] get timeout\n", sock->fd);
+        return 0;
+    }
+    else
+    {
+        rv = read(sock->fd, buf, size);
+        if( rv <= 0 )
+        {
+            log_error("socket[%d] read() failure or got disconnected: %s, close socket now\n", sock->fd, strerror(errno));
+            socket_term(sock);
+            return -2;
+        }
+        else
+        {
+            log_debug("socket[%d] receive %d bytes data\n", sock->fd, rv);
+            return rv;
+        }
+    }
+}
+
+
+/*+-------------------------------------------------------------------+
+ *|                socket utils function                              |
+ *+-------------------------------------------------------------------+*/
+
+/* description: set socket listen port as reusable, fix port already used bug  */
+int socket_set_reuseaddr(int sockfd)
+{
+    int opt = 1;
+    int len = sizeof (int);
+
+    if (setsockopt (sockfd, SOL_SOCKET, SO_REUSEADDR, (void *) &opt, len))
+    {
+        log_error("Set socket[%d] option SO_REUSEADDR failed:%s\n", sockfd, strerror(errno));
+        return -1;
+    }
+    log_debug("Set socket[%d] option SO_REUSEADDR ok\n", sockfd);
+
+    return 0;
+}
+
+/* set socket as non-block mode, common socket default work as block mode */
+int socket_set_nonblock(int sockfd)
+{
+    int opts;
+    /*
+     * fcntl may set:
+     *
+     * EACCES, EAGAIN: Operation is prohibited by locks held by other
+     *          processes. Or, operation is prohibited because the file has
+     *          been memory-mapped by another process.
+     * EBADF:   fd is not an open file descriptor, or the command was F_SETLK
+     *          or F_SETLKW and the file descriptor open mode doesn't match
+     *          with the type of lock requested.
+     * EDEADLK: It was detected that the specified F_SETLKW command would
+     *          cause a deadlock.
+     * EFAULT:  lock is outside your accessible address space.
+     * EINTR:   For F_SETLKW, the command was interrupted by a signal. For
+     *          F_GETLK and F_SETLK, the command was interrupted by a signal
+     *          before the lock was checked or acquired. Most likely when
+     *          locking a remote file (e.g. locking over NFS), but can
+     *          sometimes happen locally.
+     * EINVAL:  For F_DUPFD, arg is negative or is greater than the maximum
+     *          allowable value. For F_SETSIG, arg is not an allowable signal
+     *          number.
+     * EMFILE:  For F_DUPFD, the process already has the maximum number of
+     *          file descriptors open.
+     * ENOLCK:  Too many segment locks open, lock table is full, or a remote
+     *          locking protocol failed (e.g. locking over NFS).
+     * EPERM:   Attempted to clear the O_APPEND flag on a file that has the
+     *          append-only attribute set.
+     */
+    opts = fcntl(sockfd, F_GETFL);
+    if (opts < 0)
+    {
+        log_warn("fcntl() get socket options failure: %s\n", strerror(errno));
+        return -1;
+    }
+
+    opts |= O_NONBLOCK;
+
+    if (fcntl(sockfd, F_SETFL, opts) < 0)
+    {
+        log_warn("fcntl() set socket options failure: %s\n", strerror(errno));
+        return -1;
+    }
+
+    log_debug("Set socket[%d] none blocking\n", sockfd);
+    return opts;
+}
+
+
+/* set socket receive and send buffer size in linux kernel space */
+int socket_set_buffer(int sockfd, int rsize, int ssize)
+{
+    int        opt;
+    socklen_t  optlen = sizeof(opt);
+
+    if(sockfd < 0)
+        return -1;
+
+    /* Get system default receive buffer size, Linux X86: 85K */
+    if (getsockopt (sockfd, SOL_SOCKET, SO_RCVBUF, (char *) &opt, &optlen))
+    {
+        log_warn("getsockopt() get receive buffer failure: %s\n", strerror(errno));
+        return -2;
+    }
+
+    /* Only when current receive buffer size larger than the default one will change it  */
+    if(rsize > opt)
+    {
+        opt = (int) rsize;
+        if (setsockopt (sockfd, SOL_SOCKET, SO_RCVBUF, (char *) &opt, optlen))
+        {
+            log_warn("setsockopt() set receive buffer to %d failure: %s\n", opt, strerror(errno));
+            return -2;
+        }
+    }
+
+    /* Get system default send buffer size, Linux X86: 16K */
+    if (getsockopt (sockfd, SOL_SOCKET, SO_SNDBUF, (char *) &opt, &optlen))
+    {
+        log_warn("getsockopt() get send buffer failure: %s\n", strerror(errno));
+        return -3;
+    }
+
+    /* Only when current receive buffer size larger than the default one will change it  */
+    if(ssize > opt)
+    {
+        opt = (int) ssize;
+        if (setsockopt (sockfd, SOL_SOCKET, SO_SNDBUF, (char *) &opt, optlen))
+        {
+            log_warn("setsockopt() set send buffer to %d failure: %s\n", opt, strerror(errno));
+            return -3;
+        }
+    }
+
+    log_info("Set socket[%d] RCVBUF size:%d  SNDBUF size:%d\n", sockfd, rsize, ssize);
+    return 0;
+}
+
+/*
+ * Enable socket SO_KEEPALIVE, if the connection disconnected, any system call on socket
+ * will return immediately and errno will be set to "WSAENOTCONN"
+ *
+ * keepalive is not program related, but socket related, * so if you have multiple sockets,
+ * you can handle keepalive for each of them separately.
+ *
+ * Reference: http://tldp.org/HOWTO/html_single/TCP-Keepalive-HOWTO/
+ */
+int socket_set_keepalive(int sockfd, int keepintvl, int keepcnt)
+{
+    int  opt;
+
+    if(sockfd < 0)
+        return -1;
+
+    /* Enable the KEEPALIVE flag */
+    opt = 1;
+    if (setsockopt (sockfd, SOL_SOCKET, SO_KEEPALIVE, (char *) &opt, sizeof (opt)))
+    {
+        log_warn("setsockopt() enable SO_KEEPALIVE failure: %s\n", strerror(errno));
+        return -2;
+    }
+
+    if(keepintvl || keepcnt)
+    {
+        /*
+         *  The tcp_keepidle parameter specifies the interval between the last data packet sent
+         *  (simple ACKs are not considered data) and the first keepalive probe; after the
+         *  connection is marked to need keepalive, this counter is not used any further.
+         *  ~ >: cat /proc/sys/net/ipv4/tcp_keepalive_time
+         *  7200
+         */
+        opt = 3; /* 3 seconds  */
+        if (setsockopt (sockfd, SOL_TCP, TCP_KEEPIDLE, (char *) &opt, sizeof (opt)))
+        {
+            log_error("setsockopt() set TCP_KEEPIDLE to %d seconds failure: %s\n", opt, strerror(errno));
+            return -3;
+        }
+
+        if((opt=keepintvl) > 0)
+        {
+            /*
+             * The tcp_keepintvl parameter specifies the interval between subsequential keepalive
+             * probes, regardless of what the connection has exchanged in the meantime.
+             * ~ >: cat /proc/sys/net/ipv4/tcp_keepalive_intvl
+             * 75
+             */
+            if (setsockopt (sockfd, SOL_TCP, TCP_KEEPINTVL, (char *) &opt, sizeof (opt)))
+            {
+                log_error("setsockopt() set TCP_KEEPINTVL to %d failure: %s\n", opt, strerror(errno));
+                return -4;
+            }
+        }
+
+        if((opt=keepcnt) > 0)
+        {
+            /*
+             * The TCP_KEEPCNT option specifies the maximum number of unacknowledged probes to
+             * send before considering the connection dead and notifying the application layer
+             * probes to be sent. The value of TCP_KEEPCNT is an integer value between 1 and n,
+             * where n is the value of the systemwide tcp_keepcnt parameter.
+             * ~ >: cat /proc/sys/net/ipv4/tcp_keepalive_probes
+             * 9
+             */
+            if (setsockopt (sockfd, SOL_TCP, TCP_KEEPCNT, (char *) &opt, sizeof (opt)))
+            {
+                log_error("setsockopt() set TCP_KEEPCNT to %d failure: %s\n", opt, strerror(errno));
+                return -5;
+            }
+        }
+    }
+
+    log_debug("Set socket[%d] KEEPINTVL:%d  KEEPCNT:%d\n", sockfd, keepintvl, keepcnt);
+    return 0;
+}
+
+
+/* Set open file description count to max */
+void set_socket_rlimit(void)
+{
+    struct rlimit limit = {0};
+
+    getrlimit(RLIMIT_NOFILE, &limit );
+    limit.rlim_cur  = limit.rlim_max;
+    setrlimit(RLIMIT_NOFILE, &limit );
+
+    log_info("set socket open fd max count to %d\n", limit.rlim_max);
+}
+

--
Gitblit v1.9.1