/*************************************************************************** * _ _ ____ _ * Project ___| | | | _ \| | * / __| | | | |_) | | * | (__| |_| | _ <| |___ * \___|\___/|_| \_\_____| * * Copyright (C) 2013, Linus Nielsen Feltzing, <linus@haxx.se> * Copyright (C) 2013-2015, Daniel Stenberg, <daniel@haxx.se>, et al. * * This software is licensed as described in the file COPYING, which * you should have received as part of this distribution. The terms * are also available at https://curl.haxx.se/docs/copyright.html. * * You may opt to use, copy, modify, merge, publish, distribute and/or sell * copies of the Software, and permit persons to whom the Software is * furnished to do so, under the terms of the COPYING file. * * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY * KIND, either express or implied. * ***************************************************************************/ #include "curl_setup.h" #include <curl/curl.h> #include "urldata.h" #include "url.h" #include "progress.h" #include "multiif.h" #include "pipeline.h" #include "sendf.h" #include "rawstr.h" #include "curl_memory.h" /* The last #include file should be: */ #include "memdebug.h" struct site_blacklist_entry { char *hostname; unsigned short port; }; static void site_blacklist_llist_dtor(void *user, void *element) { struct site_blacklist_entry *entry = element; (void)user; Curl_safefree(entry->hostname); free(entry); } static void server_blacklist_llist_dtor(void *user, void *element) { (void)user; free(element); } bool Curl_pipeline_penalized(struct SessionHandle *data, struct connectdata *conn) { if(data) { bool penalized = FALSE; curl_off_t penalty_size = Curl_multi_content_length_penalty_size(data->multi); curl_off_t chunk_penalty_size = Curl_multi_chunk_length_penalty_size(data->multi); curl_off_t recv_size = -2; /* Make it easy to spot in the log */ /* Find the head of the recv pipe, if any */ if(conn->recv_pipe && conn->recv_pipe->head) { struct SessionHandle *recv_handle = conn->recv_pipe->head->ptr; recv_size = recv_handle->req.size; if(penalty_size > 0 && recv_size > penalty_size) penalized = TRUE; } if(chunk_penalty_size > 0 && (curl_off_t)conn->chunk.datasize > chunk_penalty_size) penalized = TRUE; infof(data, "Conn: %ld (%p) Receive pipe weight: (%" CURL_FORMAT_CURL_OFF_T "/%zu), penalized: %s\n", conn->connection_id, (void *)conn, recv_size, conn->chunk.datasize, penalized?"TRUE":"FALSE"); return penalized; } return FALSE; } static CURLcode addHandleToPipeline(struct SessionHandle *data, struct curl_llist *pipeline) { if(!Curl_llist_insert_next(pipeline, pipeline->tail, data)) return CURLE_OUT_OF_MEMORY; return CURLE_OK; } CURLcode Curl_add_handle_to_pipeline(struct SessionHandle *handle, struct connectdata *conn) { struct curl_llist_element *sendhead = conn->send_pipe->head; struct curl_llist *pipeline; CURLcode result; pipeline = conn->send_pipe; result = addHandleToPipeline(handle, pipeline); if(pipeline == conn->send_pipe && sendhead != conn->send_pipe->head) { /* this is a new one as head, expire it */ Curl_pipeline_leave_write(conn); /* not in use yet */ Curl_expire(conn->send_pipe->head->ptr, 1); } #if 0 /* enable for pipeline debugging */ print_pipeline(conn); #endif return result; } /* Move this transfer from the sending list to the receiving list. Pay special attention to the new sending list "leader" as it needs to get checked to update what sockets it acts on. */ void Curl_move_handle_from_send_to_recv_pipe(struct SessionHandle *handle, struct connectdata *conn) { struct curl_llist_element *curr; curr = conn->send_pipe->head; while(curr) { if(curr->ptr == handle) { Curl_llist_move(conn->send_pipe, curr, conn->recv_pipe, conn->recv_pipe->tail); if(conn->send_pipe->head) { /* Since there's a new easy handle at the start of the send pipeline, set its timeout value to 1ms to make it trigger instantly */ Curl_pipeline_leave_write(conn); /* not used now */ #ifdef DEBUGBUILD infof(conn->data, "%p is at send pipe head B!\n", (void *)conn->send_pipe->head->ptr); #endif Curl_expire(conn->send_pipe->head->ptr, 1); } /* The receiver's list is not really interesting here since either this handle is now first in the list and we'll deal with it soon, or another handle is already first and thus is already taken care of */ break; /* we're done! */ } curr = curr->next; } } bool Curl_pipeline_site_blacklisted(struct SessionHandle *handle, struct connectdata *conn) { if(handle->multi) { struct curl_llist *blacklist = Curl_multi_pipelining_site_bl(handle->multi); if(blacklist) { struct curl_llist_element *curr; curr = blacklist->head; while(curr) { struct site_blacklist_entry *site; site = curr->ptr; if(Curl_raw_equal(site->hostname, conn->host.name) && site->port == conn->remote_port) { infof(handle, "Site %s:%d is pipeline blacklisted\n", conn->host.name, conn->remote_port); return TRUE; } curr = curr->next; } } } return FALSE; } CURLMcode Curl_pipeline_set_site_blacklist(char **sites, struct curl_llist **list_ptr) { struct curl_llist *old_list = *list_ptr; struct curl_llist *new_list = NULL; if(sites) { new_list = Curl_llist_alloc((curl_llist_dtor) site_blacklist_llist_dtor); if(!new_list) return CURLM_OUT_OF_MEMORY; /* Parse the URLs and populate the list */ while(*sites) { char *hostname; char *port; struct site_blacklist_entry *entry; hostname = strdup(*sites); if(!hostname) { Curl_llist_destroy(new_list, NULL); return CURLM_OUT_OF_MEMORY; } entry = malloc(sizeof(struct site_blacklist_entry)); if(!entry) { free(hostname); Curl_llist_destroy(new_list, NULL); return CURLM_OUT_OF_MEMORY; } port = strchr(hostname, ':'); if(port) { *port = '\0'; port++; entry->port = (unsigned short)strtol(port, NULL, 10); } else { /* Default port number for HTTP */ entry->port = 80; } entry->hostname = hostname; if(!Curl_llist_insert_next(new_list, new_list->tail, entry)) { site_blacklist_llist_dtor(NULL, entry); Curl_llist_destroy(new_list, NULL); return CURLM_OUT_OF_MEMORY; } sites++; } } /* Free the old list */ if(old_list) { Curl_llist_destroy(old_list, NULL); } /* This might be NULL if sites == NULL, i.e the blacklist is cleared */ *list_ptr = new_list; return CURLM_OK; } bool Curl_pipeline_server_blacklisted(struct SessionHandle *handle, char *server_name) { if(handle->multi && server_name) { struct curl_llist *blacklist = Curl_multi_pipelining_server_bl(handle->multi); if(blacklist) { struct curl_llist_element *curr; curr = blacklist->head; while(curr) { char *bl_server_name; bl_server_name = curr->ptr; if(Curl_raw_nequal(bl_server_name, server_name, strlen(bl_server_name))) { infof(handle, "Server %s is blacklisted\n", server_name); return TRUE; } curr = curr->next; } } DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name)); } return FALSE; } CURLMcode Curl_pipeline_set_server_blacklist(char **servers, struct curl_llist **list_ptr) { struct curl_llist *old_list = *list_ptr; struct curl_llist *new_list = NULL; if(servers) { new_list = Curl_llist_alloc((curl_llist_dtor) server_blacklist_llist_dtor); if(!new_list) return CURLM_OUT_OF_MEMORY; /* Parse the URLs and populate the list */ while(*servers) { char *server_name; server_name = strdup(*servers); if(!server_name) return CURLM_OUT_OF_MEMORY; if(!Curl_llist_insert_next(new_list, new_list->tail, server_name)) return CURLM_OUT_OF_MEMORY; servers++; } } /* Free the old list */ if(old_list) { Curl_llist_destroy(old_list, NULL); } /* This might be NULL if sites == NULL, i.e the blacklist is cleared */ *list_ptr = new_list; return CURLM_OK; } static bool pipe_head(struct SessionHandle *data, struct curl_llist *pipeline) { if(pipeline) { struct curl_llist_element *curr = pipeline->head; if(curr) return (curr->ptr == data) ? TRUE : FALSE; } return FALSE; } /* returns TRUE if the given handle is head of the recv pipe */ bool Curl_recvpipe_head(struct SessionHandle *data, struct connectdata *conn) { return pipe_head(data, conn->recv_pipe); } /* returns TRUE if the given handle is head of the send pipe */ bool Curl_sendpipe_head(struct SessionHandle *data, struct connectdata *conn) { return pipe_head(data, conn->send_pipe); } /* * Check if the write channel is available and this handle as at the head, * then grab the channel and return TRUE. * * If not available, return FALSE. */ bool Curl_pipeline_checkget_write(struct SessionHandle *data, struct connectdata *conn) { if(conn->bits.multiplex) /* when multiplexing, we can use it at once */ return TRUE; if(!conn->writechannel_inuse && Curl_sendpipe_head(data, conn)) { /* Grab the channel */ conn->writechannel_inuse = TRUE; return TRUE; } return FALSE; } /* * Check if the read channel is available and this handle as at the head, then * grab the channel and return TRUE. * * If not available, return FALSE. */ bool Curl_pipeline_checkget_read(struct SessionHandle *data, struct connectdata *conn) { if(conn->bits.multiplex) /* when multiplexing, we can use it at once */ return TRUE; if(!conn->readchannel_inuse && Curl_recvpipe_head(data, conn)) { /* Grab the channel */ conn->readchannel_inuse = TRUE; return TRUE; } return FALSE; } /* * The current user of the pipeline write channel gives it up. */ void Curl_pipeline_leave_write(struct connectdata *conn) { conn->writechannel_inuse = FALSE; } /* * The current user of the pipeline read channel gives it up. */ void Curl_pipeline_leave_read(struct connectdata *conn) { conn->readchannel_inuse = FALSE; } #if 0 void print_pipeline(struct connectdata *conn) { struct curl_llist_element *curr; struct connectbundle *cb_ptr; struct SessionHandle *data = conn->data; cb_ptr = conn->bundle; if(cb_ptr) { curr = cb_ptr->conn_list->head; while(curr) { conn = curr->ptr; infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n", conn->connection_id, (void *)conn, conn->send_pipe->size, conn->recv_pipe->size); curr = curr->next; } } } #endif