• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /***************************************************************************
2  *                                  _   _ ____  _
3  *  Project                     ___| | | |  _ \| |
4  *                             / __| | | | |_) | |
5  *                            | (__| |_| |  _ <| |___
6  *                             \___|\___/|_| \_\_____|
7  *
8  * Copyright (C) 2013, Linus Nielsen Feltzing, <linus@haxx.se>
9  * Copyright (C) 2013-2015, Daniel Stenberg, <daniel@haxx.se>, et al.
10  *
11  * This software is licensed as described in the file COPYING, which
12  * you should have received as part of this distribution. The terms
13  * are also available at http://curl.haxx.se/docs/copyright.html.
14  *
15  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
16  * copies of the Software, and permit persons to whom the Software is
17  * furnished to do so, under the terms of the COPYING file.
18  *
19  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
20  * KIND, either express or implied.
21  *
22  ***************************************************************************/
23 
24 #include "curl_setup.h"
25 
26 #include <curl/curl.h>
27 
28 #include "urldata.h"
29 #include "url.h"
30 #include "progress.h"
31 #include "multiif.h"
32 #include "pipeline.h"
33 #include "sendf.h"
34 #include "rawstr.h"
35 
36 #include "curl_memory.h"
37 /* The last #include file should be: */
38 #include "memdebug.h"
39 
40 struct site_blacklist_entry {
41   char *hostname;
42   unsigned short port;
43 };
44 
site_blacklist_llist_dtor(void * user,void * element)45 static void site_blacklist_llist_dtor(void *user, void *element)
46 {
47   struct site_blacklist_entry *entry = element;
48   (void)user;
49 
50   Curl_safefree(entry->hostname);
51   free(entry);
52 }
53 
server_blacklist_llist_dtor(void * user,void * element)54 static void server_blacklist_llist_dtor(void *user, void *element)
55 {
56   (void)user;
57   free(element);
58 }
59 
Curl_pipeline_penalized(struct SessionHandle * data,struct connectdata * conn)60 bool Curl_pipeline_penalized(struct SessionHandle *data,
61                              struct connectdata *conn)
62 {
63   if(data) {
64     bool penalized = FALSE;
65     curl_off_t penalty_size =
66       Curl_multi_content_length_penalty_size(data->multi);
67     curl_off_t chunk_penalty_size =
68       Curl_multi_chunk_length_penalty_size(data->multi);
69     curl_off_t recv_size = -2; /* Make it easy to spot in the log */
70 
71     /* Find the head of the recv pipe, if any */
72     if(conn->recv_pipe && conn->recv_pipe->head) {
73       struct SessionHandle *recv_handle = conn->recv_pipe->head->ptr;
74 
75       recv_size = recv_handle->req.size;
76 
77       if(penalty_size > 0 && recv_size > penalty_size)
78         penalized = TRUE;
79     }
80 
81     if(chunk_penalty_size > 0 &&
82        (curl_off_t)conn->chunk.datasize > chunk_penalty_size)
83       penalized = TRUE;
84 
85     infof(data, "Conn: %ld (%p) Receive pipe weight: (%"
86           CURL_FORMAT_CURL_OFF_T "/%zu), penalized: %s\n",
87           conn->connection_id, (void *)conn, recv_size,
88           conn->chunk.datasize, penalized?"TRUE":"FALSE");
89     return penalized;
90   }
91   return FALSE;
92 }
93 
addHandleToPipeline(struct SessionHandle * data,struct curl_llist * pipeline)94 static CURLcode addHandleToPipeline(struct SessionHandle *data,
95                                     struct curl_llist *pipeline)
96 {
97   if(!Curl_llist_insert_next(pipeline, pipeline->tail, data))
98     return CURLE_OUT_OF_MEMORY;
99   return CURLE_OK;
100 }
101 
102 
Curl_add_handle_to_pipeline(struct SessionHandle * handle,struct connectdata * conn)103 CURLcode Curl_add_handle_to_pipeline(struct SessionHandle *handle,
104                                      struct connectdata *conn)
105 {
106   struct curl_llist_element *sendhead = conn->send_pipe->head;
107   struct curl_llist *pipeline;
108   CURLcode result;
109 
110   pipeline = conn->send_pipe;
111 
112   result = addHandleToPipeline(handle, pipeline);
113 
114   if(pipeline == conn->send_pipe && sendhead != conn->send_pipe->head) {
115     /* this is a new one as head, expire it */
116     Curl_pipeline_leave_write(conn); /* not in use yet */
117     Curl_expire(conn->send_pipe->head->ptr, 1);
118   }
119 
120 #if 0 /* enable for pipeline debugging */
121   print_pipeline(conn);
122 #endif
123 
124   return result;
125 }
126 
127 /* Move this transfer from the sending list to the receiving list.
128 
129    Pay special attention to the new sending list "leader" as it needs to get
130    checked to update what sockets it acts on.
131 
132 */
Curl_move_handle_from_send_to_recv_pipe(struct SessionHandle * handle,struct connectdata * conn)133 void Curl_move_handle_from_send_to_recv_pipe(struct SessionHandle *handle,
134                                              struct connectdata *conn)
135 {
136   struct curl_llist_element *curr;
137 
138   curr = conn->send_pipe->head;
139   while(curr) {
140     if(curr->ptr == handle) {
141       Curl_llist_move(conn->send_pipe, curr,
142                       conn->recv_pipe, conn->recv_pipe->tail);
143 
144       if(conn->send_pipe->head) {
145         /* Since there's a new easy handle at the start of the send pipeline,
146            set its timeout value to 1ms to make it trigger instantly */
147         Curl_pipeline_leave_write(conn); /* not used now */
148 #ifdef DEBUGBUILD
149         infof(conn->data, "%p is at send pipe head B!\n",
150               (void *)conn->send_pipe->head->ptr);
151 #endif
152         Curl_expire(conn->send_pipe->head->ptr, 1);
153       }
154 
155       /* The receiver's list is not really interesting here since either this
156          handle is now first in the list and we'll deal with it soon, or
157          another handle is already first and thus is already taken care of */
158 
159       break; /* we're done! */
160     }
161     curr = curr->next;
162   }
163 }
164 
Curl_pipeline_site_blacklisted(struct SessionHandle * handle,struct connectdata * conn)165 bool Curl_pipeline_site_blacklisted(struct SessionHandle *handle,
166                                     struct connectdata *conn)
167 {
168   if(handle->multi) {
169     struct curl_llist *blacklist =
170       Curl_multi_pipelining_site_bl(handle->multi);
171 
172     if(blacklist) {
173       struct curl_llist_element *curr;
174 
175       curr = blacklist->head;
176       while(curr) {
177         struct site_blacklist_entry *site;
178 
179         site = curr->ptr;
180         if(Curl_raw_equal(site->hostname, conn->host.name) &&
181            site->port == conn->remote_port) {
182           infof(handle, "Site %s:%d is pipeline blacklisted\n",
183                 conn->host.name, conn->remote_port);
184           return TRUE;
185         }
186         curr = curr->next;
187       }
188     }
189   }
190   return FALSE;
191 }
192 
Curl_pipeline_set_site_blacklist(char ** sites,struct curl_llist ** list_ptr)193 CURLMcode Curl_pipeline_set_site_blacklist(char **sites,
194                                            struct curl_llist **list_ptr)
195 {
196   struct curl_llist *old_list = *list_ptr;
197   struct curl_llist *new_list = NULL;
198 
199   if(sites) {
200     new_list = Curl_llist_alloc((curl_llist_dtor) site_blacklist_llist_dtor);
201     if(!new_list)
202       return CURLM_OUT_OF_MEMORY;
203 
204     /* Parse the URLs and populate the list */
205     while(*sites) {
206       char *hostname;
207       char *port;
208       struct site_blacklist_entry *entry;
209 
210       hostname = strdup(*sites);
211       if(!hostname) {
212         Curl_llist_destroy(new_list, NULL);
213         return CURLM_OUT_OF_MEMORY;
214       }
215 
216       entry = malloc(sizeof(struct site_blacklist_entry));
217       if(!entry) {
218         free(hostname);
219         Curl_llist_destroy(new_list, NULL);
220         return CURLM_OUT_OF_MEMORY;
221       }
222 
223       port = strchr(hostname, ':');
224       if(port) {
225         *port = '\0';
226         port++;
227         entry->port = (unsigned short)strtol(port, NULL, 10);
228       }
229       else {
230         /* Default port number for HTTP */
231         entry->port = 80;
232       }
233 
234       entry->hostname = hostname;
235 
236       if(!Curl_llist_insert_next(new_list, new_list->tail, entry)) {
237         site_blacklist_llist_dtor(NULL, entry);
238         Curl_llist_destroy(new_list, NULL);
239         return CURLM_OUT_OF_MEMORY;
240       }
241 
242       sites++;
243     }
244   }
245 
246   /* Free the old list */
247   if(old_list) {
248     Curl_llist_destroy(old_list, NULL);
249   }
250 
251   /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
252   *list_ptr = new_list;
253 
254   return CURLM_OK;
255 }
256 
Curl_pipeline_server_blacklisted(struct SessionHandle * handle,char * server_name)257 bool Curl_pipeline_server_blacklisted(struct SessionHandle *handle,
258                                       char *server_name)
259 {
260   if(handle->multi && server_name) {
261     struct curl_llist *blacklist =
262       Curl_multi_pipelining_server_bl(handle->multi);
263 
264     if(blacklist) {
265       struct curl_llist_element *curr;
266 
267       curr = blacklist->head;
268       while(curr) {
269         char *bl_server_name;
270 
271         bl_server_name = curr->ptr;
272         if(Curl_raw_nequal(bl_server_name, server_name,
273                            strlen(bl_server_name))) {
274           infof(handle, "Server %s is blacklisted\n", server_name);
275           return TRUE;
276         }
277         curr = curr->next;
278       }
279     }
280 
281     DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name));
282   }
283   return FALSE;
284 }
285 
Curl_pipeline_set_server_blacklist(char ** servers,struct curl_llist ** list_ptr)286 CURLMcode Curl_pipeline_set_server_blacklist(char **servers,
287                                              struct curl_llist **list_ptr)
288 {
289   struct curl_llist *old_list = *list_ptr;
290   struct curl_llist *new_list = NULL;
291 
292   if(servers) {
293     new_list = Curl_llist_alloc((curl_llist_dtor) server_blacklist_llist_dtor);
294     if(!new_list)
295       return CURLM_OUT_OF_MEMORY;
296 
297     /* Parse the URLs and populate the list */
298     while(*servers) {
299       char *server_name;
300 
301       server_name = strdup(*servers);
302       if(!server_name)
303         return CURLM_OUT_OF_MEMORY;
304 
305       if(!Curl_llist_insert_next(new_list, new_list->tail, server_name))
306         return CURLM_OUT_OF_MEMORY;
307 
308       servers++;
309     }
310   }
311 
312   /* Free the old list */
313   if(old_list) {
314     Curl_llist_destroy(old_list, NULL);
315   }
316 
317   /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
318   *list_ptr = new_list;
319 
320   return CURLM_OK;
321 }
322 
pipe_head(struct SessionHandle * data,struct curl_llist * pipeline)323 static bool pipe_head(struct SessionHandle *data,
324                       struct curl_llist *pipeline)
325 {
326   struct curl_llist_element *curr = pipeline->head;
327   if(curr)
328     return (curr->ptr == data) ? TRUE : FALSE;
329 
330   return FALSE;
331 }
332 
333 /* returns TRUE if the given handle is head of the recv pipe */
Curl_recvpipe_head(struct SessionHandle * data,struct connectdata * conn)334 bool Curl_recvpipe_head(struct SessionHandle *data,
335                         struct connectdata *conn)
336 {
337   return pipe_head(data, conn->recv_pipe);
338 }
339 
340 /* returns TRUE if the given handle is head of the send pipe */
Curl_sendpipe_head(struct SessionHandle * data,struct connectdata * conn)341 bool Curl_sendpipe_head(struct SessionHandle *data,
342                         struct connectdata *conn)
343 {
344   return pipe_head(data, conn->send_pipe);
345 }
346 
347 
348 /*
349  * Check if the write channel is available and this handle as at the head,
350  * then grab the channel and return TRUE.
351  *
352  * If not available, return FALSE.
353  */
354 
Curl_pipeline_checkget_write(struct SessionHandle * data,struct connectdata * conn)355 bool Curl_pipeline_checkget_write(struct SessionHandle *data,
356                                   struct connectdata *conn)
357 {
358   if(conn->bits.multiplex)
359     /* when multiplexing, we can use it at once */
360     return TRUE;
361 
362   if(!conn->writechannel_inuse && Curl_sendpipe_head(data, conn)) {
363     /* Grab the channel */
364     conn->writechannel_inuse = TRUE;
365     return TRUE;
366   }
367   return FALSE;
368 }
369 
370 
371 /*
372  * Check if the read channel is available and this handle as at the head, then
373  * grab the channel and return TRUE.
374  *
375  * If not available, return FALSE.
376  */
377 
Curl_pipeline_checkget_read(struct SessionHandle * data,struct connectdata * conn)378 bool Curl_pipeline_checkget_read(struct SessionHandle *data,
379                                  struct connectdata *conn)
380 {
381   if(conn->bits.multiplex)
382     /* when multiplexing, we can use it at once */
383     return TRUE;
384 
385   if(!conn->readchannel_inuse && Curl_recvpipe_head(data, conn)) {
386     /* Grab the channel */
387     conn->readchannel_inuse = TRUE;
388     return TRUE;
389   }
390   return FALSE;
391 }
392 
393 /*
394  * The current user of the pipeline write channel gives it up.
395  */
Curl_pipeline_leave_write(struct connectdata * conn)396 void Curl_pipeline_leave_write(struct connectdata *conn)
397 {
398   conn->writechannel_inuse = FALSE;
399 }
400 
401 /*
402  * The current user of the pipeline read channel gives it up.
403  */
Curl_pipeline_leave_read(struct connectdata * conn)404 void Curl_pipeline_leave_read(struct connectdata *conn)
405 {
406   conn->readchannel_inuse = FALSE;
407 }
408 
409 
410 #if 0
411 void print_pipeline(struct connectdata *conn)
412 {
413   struct curl_llist_element *curr;
414   struct connectbundle *cb_ptr;
415   struct SessionHandle *data = conn->data;
416 
417   cb_ptr = conn->bundle;
418 
419   if(cb_ptr) {
420     curr = cb_ptr->conn_list->head;
421     while(curr) {
422       conn = curr->ptr;
423       infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
424             conn->connection_id,
425             (void *)conn,
426             conn->send_pipe->size,
427             conn->recv_pipe->size);
428       curr = curr->next;
429     }
430   }
431 }
432 
433 #endif
434