source: UsbWattMeter/trunk/curl-7.47.1/lib/pipeline.c@ 167

Last change on this file since 167 was 167, checked in by coas-nagasima, 8 years ago

MIMEにSJISを設定

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
  • Property svn:mime-type set to text/x-csrc; charset=SHIFT_JIS
File size: 11.4 KB
RevLine 
[164]1/***************************************************************************
2 * _ _ ____ _
3 * Project ___| | | | _ \| |
4 * / __| | | | |_) | |
5 * | (__| |_| | _ <| |___
6 * \___|\___/|_| \_\_____|
7 *
8 * Copyright (C) 2013, Linus Nielsen Feltzing, <linus@haxx.se>
9 * Copyright (C) 2013-2015, Daniel Stenberg, <daniel@haxx.se>, et al.
10 *
11 * This software is licensed as described in the file COPYING, which
12 * you should have received as part of this distribution. The terms
13 * are also available at https://curl.haxx.se/docs/copyright.html.
14 *
15 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
16 * copies of the Software, and permit persons to whom the Software is
17 * furnished to do so, under the terms of the COPYING file.
18 *
19 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
20 * KIND, either express or implied.
21 *
22 ***************************************************************************/
23
24#include "curl_setup.h"
25
26#include <curl/curl.h>
27
28#include "urldata.h"
29#include "url.h"
30#include "progress.h"
31#include "multiif.h"
32#include "pipeline.h"
33#include "sendf.h"
34#include "rawstr.h"
35
36#include "curl_memory.h"
37/* The last #include file should be: */
38#include "memdebug.h"
39
40struct site_blacklist_entry {
41 char *hostname;
42 unsigned short port;
43};
44
45static void site_blacklist_llist_dtor(void *user, void *element)
46{
47 struct site_blacklist_entry *entry = element;
48 (void)user;
49
50 Curl_safefree(entry->hostname);
51 free(entry);
52}
53
54static void server_blacklist_llist_dtor(void *user, void *element)
55{
56 (void)user;
57 free(element);
58}
59
60bool Curl_pipeline_penalized(struct SessionHandle *data,
61 struct connectdata *conn)
62{
63 if(data) {
64 bool penalized = FALSE;
65 curl_off_t penalty_size =
66 Curl_multi_content_length_penalty_size(data->multi);
67 curl_off_t chunk_penalty_size =
68 Curl_multi_chunk_length_penalty_size(data->multi);
69 curl_off_t recv_size = -2; /* Make it easy to spot in the log */
70
71 /* Find the head of the recv pipe, if any */
72 if(conn->recv_pipe && conn->recv_pipe->head) {
73 struct SessionHandle *recv_handle = conn->recv_pipe->head->ptr;
74
75 recv_size = recv_handle->req.size;
76
77 if(penalty_size > 0 && recv_size > penalty_size)
78 penalized = TRUE;
79 }
80
81 if(chunk_penalty_size > 0 &&
82 (curl_off_t)conn->chunk.datasize > chunk_penalty_size)
83 penalized = TRUE;
84
85 infof(data, "Conn: %ld (%p) Receive pipe weight: (%"
86 CURL_FORMAT_CURL_OFF_T "/%zu), penalized: %s\n",
87 conn->connection_id, (void *)conn, recv_size,
88 conn->chunk.datasize, penalized?"TRUE":"FALSE");
89 return penalized;
90 }
91 return FALSE;
92}
93
94static CURLcode addHandleToPipeline(struct SessionHandle *data,
95 struct curl_llist *pipeline)
96{
97 if(!Curl_llist_insert_next(pipeline, pipeline->tail, data))
98 return CURLE_OUT_OF_MEMORY;
99 return CURLE_OK;
100}
101
102
103CURLcode Curl_add_handle_to_pipeline(struct SessionHandle *handle,
104 struct connectdata *conn)
105{
106 struct curl_llist_element *sendhead = conn->send_pipe->head;
107 struct curl_llist *pipeline;
108 CURLcode result;
109
110 pipeline = conn->send_pipe;
111
112 result = addHandleToPipeline(handle, pipeline);
113
114 if(pipeline == conn->send_pipe && sendhead != conn->send_pipe->head) {
115 /* this is a new one as head, expire it */
116 Curl_pipeline_leave_write(conn); /* not in use yet */
117 Curl_expire(conn->send_pipe->head->ptr, 1);
118 }
119
120#if 0 /* enable for pipeline debugging */
121 print_pipeline(conn);
122#endif
123
124 return result;
125}
126
127/* Move this transfer from the sending list to the receiving list.
128
129 Pay special attention to the new sending list "leader" as it needs to get
130 checked to update what sockets it acts on.
131
132*/
133void Curl_move_handle_from_send_to_recv_pipe(struct SessionHandle *handle,
134 struct connectdata *conn)
135{
136 struct curl_llist_element *curr;
137
138 curr = conn->send_pipe->head;
139 while(curr) {
140 if(curr->ptr == handle) {
141 Curl_llist_move(conn->send_pipe, curr,
142 conn->recv_pipe, conn->recv_pipe->tail);
143
144 if(conn->send_pipe->head) {
145 /* Since there's a new easy handle at the start of the send pipeline,
146 set its timeout value to 1ms to make it trigger instantly */
147 Curl_pipeline_leave_write(conn); /* not used now */
148#ifdef DEBUGBUILD
149 infof(conn->data, "%p is at send pipe head B!\n",
150 (void *)conn->send_pipe->head->ptr);
151#endif
152 Curl_expire(conn->send_pipe->head->ptr, 1);
153 }
154
155 /* The receiver's list is not really interesting here since either this
156 handle is now first in the list and we'll deal with it soon, or
157 another handle is already first and thus is already taken care of */
158
159 break; /* we're done! */
160 }
161 curr = curr->next;
162 }
163}
164
165bool Curl_pipeline_site_blacklisted(struct SessionHandle *handle,
166 struct connectdata *conn)
167{
168 if(handle->multi) {
169 struct curl_llist *blacklist =
170 Curl_multi_pipelining_site_bl(handle->multi);
171
172 if(blacklist) {
173 struct curl_llist_element *curr;
174
175 curr = blacklist->head;
176 while(curr) {
177 struct site_blacklist_entry *site;
178
179 site = curr->ptr;
180 if(Curl_raw_equal(site->hostname, conn->host.name) &&
181 site->port == conn->remote_port) {
182 infof(handle, "Site %s:%d is pipeline blacklisted\n",
183 conn->host.name, conn->remote_port);
184 return TRUE;
185 }
186 curr = curr->next;
187 }
188 }
189 }
190 return FALSE;
191}
192
193CURLMcode Curl_pipeline_set_site_blacklist(char **sites,
194 struct curl_llist **list_ptr)
195{
196 struct curl_llist *old_list = *list_ptr;
197 struct curl_llist *new_list = NULL;
198
199 if(sites) {
200 new_list = Curl_llist_alloc((curl_llist_dtor) site_blacklist_llist_dtor);
201 if(!new_list)
202 return CURLM_OUT_OF_MEMORY;
203
204 /* Parse the URLs and populate the list */
205 while(*sites) {
206 char *hostname;
207 char *port;
208 struct site_blacklist_entry *entry;
209
210 hostname = strdup(*sites);
211 if(!hostname) {
212 Curl_llist_destroy(new_list, NULL);
213 return CURLM_OUT_OF_MEMORY;
214 }
215
216 entry = malloc(sizeof(struct site_blacklist_entry));
217 if(!entry) {
218 free(hostname);
219 Curl_llist_destroy(new_list, NULL);
220 return CURLM_OUT_OF_MEMORY;
221 }
222
223 port = strchr(hostname, ':');
224 if(port) {
225 *port = '\0';
226 port++;
227 entry->port = (unsigned short)strtol(port, NULL, 10);
228 }
229 else {
230 /* Default port number for HTTP */
231 entry->port = 80;
232 }
233
234 entry->hostname = hostname;
235
236 if(!Curl_llist_insert_next(new_list, new_list->tail, entry)) {
237 site_blacklist_llist_dtor(NULL, entry);
238 Curl_llist_destroy(new_list, NULL);
239 return CURLM_OUT_OF_MEMORY;
240 }
241
242 sites++;
243 }
244 }
245
246 /* Free the old list */
247 if(old_list) {
248 Curl_llist_destroy(old_list, NULL);
249 }
250
251 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
252 *list_ptr = new_list;
253
254 return CURLM_OK;
255}
256
257bool Curl_pipeline_server_blacklisted(struct SessionHandle *handle,
258 char *server_name)
259{
260 if(handle->multi && server_name) {
261 struct curl_llist *blacklist =
262 Curl_multi_pipelining_server_bl(handle->multi);
263
264 if(blacklist) {
265 struct curl_llist_element *curr;
266
267 curr = blacklist->head;
268 while(curr) {
269 char *bl_server_name;
270
271 bl_server_name = curr->ptr;
272 if(Curl_raw_nequal(bl_server_name, server_name,
273 strlen(bl_server_name))) {
274 infof(handle, "Server %s is blacklisted\n", server_name);
275 return TRUE;
276 }
277 curr = curr->next;
278 }
279 }
280
281 DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name));
282 }
283 return FALSE;
284}
285
286CURLMcode Curl_pipeline_set_server_blacklist(char **servers,
287 struct curl_llist **list_ptr)
288{
289 struct curl_llist *old_list = *list_ptr;
290 struct curl_llist *new_list = NULL;
291
292 if(servers) {
293 new_list = Curl_llist_alloc((curl_llist_dtor) server_blacklist_llist_dtor);
294 if(!new_list)
295 return CURLM_OUT_OF_MEMORY;
296
297 /* Parse the URLs and populate the list */
298 while(*servers) {
299 char *server_name;
300
301 server_name = strdup(*servers);
302 if(!server_name)
303 return CURLM_OUT_OF_MEMORY;
304
305 if(!Curl_llist_insert_next(new_list, new_list->tail, server_name))
306 return CURLM_OUT_OF_MEMORY;
307
308 servers++;
309 }
310 }
311
312 /* Free the old list */
313 if(old_list) {
314 Curl_llist_destroy(old_list, NULL);
315 }
316
317 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
318 *list_ptr = new_list;
319
320 return CURLM_OK;
321}
322
323static bool pipe_head(struct SessionHandle *data,
324 struct curl_llist *pipeline)
325{
326 struct curl_llist_element *curr = pipeline->head;
327 if(curr)
328 return (curr->ptr == data) ? TRUE : FALSE;
329
330 return FALSE;
331}
332
333/* returns TRUE if the given handle is head of the recv pipe */
334bool Curl_recvpipe_head(struct SessionHandle *data,
335 struct connectdata *conn)
336{
337 return pipe_head(data, conn->recv_pipe);
338}
339
340/* returns TRUE if the given handle is head of the send pipe */
341bool Curl_sendpipe_head(struct SessionHandle *data,
342 struct connectdata *conn)
343{
344 return pipe_head(data, conn->send_pipe);
345}
346
347
348/*
349 * Check if the write channel is available and this handle as at the head,
350 * then grab the channel and return TRUE.
351 *
352 * If not available, return FALSE.
353 */
354
355bool Curl_pipeline_checkget_write(struct SessionHandle *data,
356 struct connectdata *conn)
357{
358 if(conn->bits.multiplex)
359 /* when multiplexing, we can use it at once */
360 return TRUE;
361
362 if(!conn->writechannel_inuse && Curl_sendpipe_head(data, conn)) {
363 /* Grab the channel */
364 conn->writechannel_inuse = TRUE;
365 return TRUE;
366 }
367 return FALSE;
368}
369
370
371/*
372 * Check if the read channel is available and this handle as at the head, then
373 * grab the channel and return TRUE.
374 *
375 * If not available, return FALSE.
376 */
377
378bool Curl_pipeline_checkget_read(struct SessionHandle *data,
379 struct connectdata *conn)
380{
381 if(conn->bits.multiplex)
382 /* when multiplexing, we can use it at once */
383 return TRUE;
384
385 if(!conn->readchannel_inuse && Curl_recvpipe_head(data, conn)) {
386 /* Grab the channel */
387 conn->readchannel_inuse = TRUE;
388 return TRUE;
389 }
390 return FALSE;
391}
392
393/*
394 * The current user of the pipeline write channel gives it up.
395 */
396void Curl_pipeline_leave_write(struct connectdata *conn)
397{
398 conn->writechannel_inuse = FALSE;
399}
400
401/*
402 * The current user of the pipeline read channel gives it up.
403 */
404void Curl_pipeline_leave_read(struct connectdata *conn)
405{
406 conn->readchannel_inuse = FALSE;
407}
408
409
410#if 0
411void print_pipeline(struct connectdata *conn)
412{
413 struct curl_llist_element *curr;
414 struct connectbundle *cb_ptr;
415 struct SessionHandle *data = conn->data;
416
417 cb_ptr = conn->bundle;
418
419 if(cb_ptr) {
420 curr = cb_ptr->conn_list->head;
421 while(curr) {
422 conn = curr->ptr;
423 infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
424 conn->connection_id,
425 (void *)conn,
426 conn->send_pipe->size,
427 conn->recv_pipe->size);
428 curr = curr->next;
429 }
430 }
431}
432
433#endif
Note: See TracBrowser for help on using the repository browser.