[164] | 1 | /***************************************************************************
|
---|
| 2 | * _ _ ____ _
|
---|
| 3 | * Project ___| | | | _ \| |
|
---|
| 4 | * / __| | | | |_) | |
|
---|
| 5 | * | (__| |_| | _ <| |___
|
---|
| 6 | * \___|\___/|_| \_\_____|
|
---|
| 7 | *
|
---|
| 8 | * Copyright (C) 2013, Linus Nielsen Feltzing, <linus@haxx.se>
|
---|
| 9 | * Copyright (C) 2013-2015, Daniel Stenberg, <daniel@haxx.se>, et al.
|
---|
| 10 | *
|
---|
| 11 | * This software is licensed as described in the file COPYING, which
|
---|
| 12 | * you should have received as part of this distribution. The terms
|
---|
| 13 | * are also available at https://curl.haxx.se/docs/copyright.html.
|
---|
| 14 | *
|
---|
| 15 | * You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
---|
| 16 | * copies of the Software, and permit persons to whom the Software is
|
---|
| 17 | * furnished to do so, under the terms of the COPYING file.
|
---|
| 18 | *
|
---|
| 19 | * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
---|
| 20 | * KIND, either express or implied.
|
---|
| 21 | *
|
---|
| 22 | ***************************************************************************/
|
---|
| 23 |
|
---|
| 24 | #include "curl_setup.h"
|
---|
| 25 |
|
---|
| 26 | #include <curl/curl.h>
|
---|
| 27 |
|
---|
| 28 | #include "urldata.h"
|
---|
| 29 | #include "url.h"
|
---|
| 30 | #include "progress.h"
|
---|
| 31 | #include "multiif.h"
|
---|
| 32 | #include "pipeline.h"
|
---|
| 33 | #include "sendf.h"
|
---|
| 34 | #include "rawstr.h"
|
---|
| 35 |
|
---|
| 36 | #include "curl_memory.h"
|
---|
| 37 | /* The last #include file should be: */
|
---|
| 38 | #include "memdebug.h"
|
---|
| 39 |
|
---|
| 40 | struct site_blacklist_entry {
|
---|
| 41 | char *hostname;
|
---|
| 42 | unsigned short port;
|
---|
| 43 | };
|
---|
| 44 |
|
---|
| 45 | static void site_blacklist_llist_dtor(void *user, void *element)
|
---|
| 46 | {
|
---|
| 47 | struct site_blacklist_entry *entry = element;
|
---|
| 48 | (void)user;
|
---|
| 49 |
|
---|
| 50 | Curl_safefree(entry->hostname);
|
---|
| 51 | free(entry);
|
---|
| 52 | }
|
---|
| 53 |
|
---|
| 54 | static void server_blacklist_llist_dtor(void *user, void *element)
|
---|
| 55 | {
|
---|
| 56 | (void)user;
|
---|
| 57 | free(element);
|
---|
| 58 | }
|
---|
| 59 |
|
---|
| 60 | bool Curl_pipeline_penalized(struct SessionHandle *data,
|
---|
| 61 | struct connectdata *conn)
|
---|
| 62 | {
|
---|
| 63 | if(data) {
|
---|
| 64 | bool penalized = FALSE;
|
---|
| 65 | curl_off_t penalty_size =
|
---|
| 66 | Curl_multi_content_length_penalty_size(data->multi);
|
---|
| 67 | curl_off_t chunk_penalty_size =
|
---|
| 68 | Curl_multi_chunk_length_penalty_size(data->multi);
|
---|
| 69 | curl_off_t recv_size = -2; /* Make it easy to spot in the log */
|
---|
| 70 |
|
---|
| 71 | /* Find the head of the recv pipe, if any */
|
---|
| 72 | if(conn->recv_pipe && conn->recv_pipe->head) {
|
---|
| 73 | struct SessionHandle *recv_handle = conn->recv_pipe->head->ptr;
|
---|
| 74 |
|
---|
| 75 | recv_size = recv_handle->req.size;
|
---|
| 76 |
|
---|
| 77 | if(penalty_size > 0 && recv_size > penalty_size)
|
---|
| 78 | penalized = TRUE;
|
---|
| 79 | }
|
---|
| 80 |
|
---|
| 81 | if(chunk_penalty_size > 0 &&
|
---|
| 82 | (curl_off_t)conn->chunk.datasize > chunk_penalty_size)
|
---|
| 83 | penalized = TRUE;
|
---|
| 84 |
|
---|
| 85 | infof(data, "Conn: %ld (%p) Receive pipe weight: (%"
|
---|
| 86 | CURL_FORMAT_CURL_OFF_T "/%zu), penalized: %s\n",
|
---|
| 87 | conn->connection_id, (void *)conn, recv_size,
|
---|
| 88 | conn->chunk.datasize, penalized?"TRUE":"FALSE");
|
---|
| 89 | return penalized;
|
---|
| 90 | }
|
---|
| 91 | return FALSE;
|
---|
| 92 | }
|
---|
| 93 |
|
---|
| 94 | static CURLcode addHandleToPipeline(struct SessionHandle *data,
|
---|
| 95 | struct curl_llist *pipeline)
|
---|
| 96 | {
|
---|
| 97 | if(!Curl_llist_insert_next(pipeline, pipeline->tail, data))
|
---|
| 98 | return CURLE_OUT_OF_MEMORY;
|
---|
| 99 | return CURLE_OK;
|
---|
| 100 | }
|
---|
| 101 |
|
---|
| 102 |
|
---|
| 103 | CURLcode Curl_add_handle_to_pipeline(struct SessionHandle *handle,
|
---|
| 104 | struct connectdata *conn)
|
---|
| 105 | {
|
---|
| 106 | struct curl_llist_element *sendhead = conn->send_pipe->head;
|
---|
| 107 | struct curl_llist *pipeline;
|
---|
| 108 | CURLcode result;
|
---|
| 109 |
|
---|
| 110 | pipeline = conn->send_pipe;
|
---|
| 111 |
|
---|
| 112 | result = addHandleToPipeline(handle, pipeline);
|
---|
| 113 |
|
---|
| 114 | if(pipeline == conn->send_pipe && sendhead != conn->send_pipe->head) {
|
---|
| 115 | /* this is a new one as head, expire it */
|
---|
| 116 | Curl_pipeline_leave_write(conn); /* not in use yet */
|
---|
| 117 | Curl_expire(conn->send_pipe->head->ptr, 1);
|
---|
| 118 | }
|
---|
| 119 |
|
---|
| 120 | #if 0 /* enable for pipeline debugging */
|
---|
| 121 | print_pipeline(conn);
|
---|
| 122 | #endif
|
---|
| 123 |
|
---|
| 124 | return result;
|
---|
| 125 | }
|
---|
| 126 |
|
---|
| 127 | /* Move this transfer from the sending list to the receiving list.
|
---|
| 128 |
|
---|
| 129 | Pay special attention to the new sending list "leader" as it needs to get
|
---|
| 130 | checked to update what sockets it acts on.
|
---|
| 131 |
|
---|
| 132 | */
|
---|
| 133 | void Curl_move_handle_from_send_to_recv_pipe(struct SessionHandle *handle,
|
---|
| 134 | struct connectdata *conn)
|
---|
| 135 | {
|
---|
| 136 | struct curl_llist_element *curr;
|
---|
| 137 |
|
---|
| 138 | curr = conn->send_pipe->head;
|
---|
| 139 | while(curr) {
|
---|
| 140 | if(curr->ptr == handle) {
|
---|
| 141 | Curl_llist_move(conn->send_pipe, curr,
|
---|
| 142 | conn->recv_pipe, conn->recv_pipe->tail);
|
---|
| 143 |
|
---|
| 144 | if(conn->send_pipe->head) {
|
---|
| 145 | /* Since there's a new easy handle at the start of the send pipeline,
|
---|
| 146 | set its timeout value to 1ms to make it trigger instantly */
|
---|
| 147 | Curl_pipeline_leave_write(conn); /* not used now */
|
---|
| 148 | #ifdef DEBUGBUILD
|
---|
| 149 | infof(conn->data, "%p is at send pipe head B!\n",
|
---|
| 150 | (void *)conn->send_pipe->head->ptr);
|
---|
| 151 | #endif
|
---|
| 152 | Curl_expire(conn->send_pipe->head->ptr, 1);
|
---|
| 153 | }
|
---|
| 154 |
|
---|
| 155 | /* The receiver's list is not really interesting here since either this
|
---|
| 156 | handle is now first in the list and we'll deal with it soon, or
|
---|
| 157 | another handle is already first and thus is already taken care of */
|
---|
| 158 |
|
---|
| 159 | break; /* we're done! */
|
---|
| 160 | }
|
---|
| 161 | curr = curr->next;
|
---|
| 162 | }
|
---|
| 163 | }
|
---|
| 164 |
|
---|
| 165 | bool Curl_pipeline_site_blacklisted(struct SessionHandle *handle,
|
---|
| 166 | struct connectdata *conn)
|
---|
| 167 | {
|
---|
| 168 | if(handle->multi) {
|
---|
| 169 | struct curl_llist *blacklist =
|
---|
| 170 | Curl_multi_pipelining_site_bl(handle->multi);
|
---|
| 171 |
|
---|
| 172 | if(blacklist) {
|
---|
| 173 | struct curl_llist_element *curr;
|
---|
| 174 |
|
---|
| 175 | curr = blacklist->head;
|
---|
| 176 | while(curr) {
|
---|
| 177 | struct site_blacklist_entry *site;
|
---|
| 178 |
|
---|
| 179 | site = curr->ptr;
|
---|
| 180 | if(Curl_raw_equal(site->hostname, conn->host.name) &&
|
---|
| 181 | site->port == conn->remote_port) {
|
---|
| 182 | infof(handle, "Site %s:%d is pipeline blacklisted\n",
|
---|
| 183 | conn->host.name, conn->remote_port);
|
---|
| 184 | return TRUE;
|
---|
| 185 | }
|
---|
| 186 | curr = curr->next;
|
---|
| 187 | }
|
---|
| 188 | }
|
---|
| 189 | }
|
---|
| 190 | return FALSE;
|
---|
| 191 | }
|
---|
| 192 |
|
---|
| 193 | CURLMcode Curl_pipeline_set_site_blacklist(char **sites,
|
---|
| 194 | struct curl_llist **list_ptr)
|
---|
| 195 | {
|
---|
| 196 | struct curl_llist *old_list = *list_ptr;
|
---|
| 197 | struct curl_llist *new_list = NULL;
|
---|
| 198 |
|
---|
| 199 | if(sites) {
|
---|
| 200 | new_list = Curl_llist_alloc((curl_llist_dtor) site_blacklist_llist_dtor);
|
---|
| 201 | if(!new_list)
|
---|
| 202 | return CURLM_OUT_OF_MEMORY;
|
---|
| 203 |
|
---|
| 204 | /* Parse the URLs and populate the list */
|
---|
| 205 | while(*sites) {
|
---|
| 206 | char *hostname;
|
---|
| 207 | char *port;
|
---|
| 208 | struct site_blacklist_entry *entry;
|
---|
| 209 |
|
---|
| 210 | hostname = strdup(*sites);
|
---|
| 211 | if(!hostname) {
|
---|
| 212 | Curl_llist_destroy(new_list, NULL);
|
---|
| 213 | return CURLM_OUT_OF_MEMORY;
|
---|
| 214 | }
|
---|
| 215 |
|
---|
| 216 | entry = malloc(sizeof(struct site_blacklist_entry));
|
---|
| 217 | if(!entry) {
|
---|
| 218 | free(hostname);
|
---|
| 219 | Curl_llist_destroy(new_list, NULL);
|
---|
| 220 | return CURLM_OUT_OF_MEMORY;
|
---|
| 221 | }
|
---|
| 222 |
|
---|
| 223 | port = strchr(hostname, ':');
|
---|
| 224 | if(port) {
|
---|
| 225 | *port = '\0';
|
---|
| 226 | port++;
|
---|
| 227 | entry->port = (unsigned short)strtol(port, NULL, 10);
|
---|
| 228 | }
|
---|
| 229 | else {
|
---|
| 230 | /* Default port number for HTTP */
|
---|
| 231 | entry->port = 80;
|
---|
| 232 | }
|
---|
| 233 |
|
---|
| 234 | entry->hostname = hostname;
|
---|
| 235 |
|
---|
| 236 | if(!Curl_llist_insert_next(new_list, new_list->tail, entry)) {
|
---|
| 237 | site_blacklist_llist_dtor(NULL, entry);
|
---|
| 238 | Curl_llist_destroy(new_list, NULL);
|
---|
| 239 | return CURLM_OUT_OF_MEMORY;
|
---|
| 240 | }
|
---|
| 241 |
|
---|
| 242 | sites++;
|
---|
| 243 | }
|
---|
| 244 | }
|
---|
| 245 |
|
---|
| 246 | /* Free the old list */
|
---|
| 247 | if(old_list) {
|
---|
| 248 | Curl_llist_destroy(old_list, NULL);
|
---|
| 249 | }
|
---|
| 250 |
|
---|
| 251 | /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
|
---|
| 252 | *list_ptr = new_list;
|
---|
| 253 |
|
---|
| 254 | return CURLM_OK;
|
---|
| 255 | }
|
---|
| 256 |
|
---|
| 257 | bool Curl_pipeline_server_blacklisted(struct SessionHandle *handle,
|
---|
| 258 | char *server_name)
|
---|
| 259 | {
|
---|
| 260 | if(handle->multi && server_name) {
|
---|
| 261 | struct curl_llist *blacklist =
|
---|
| 262 | Curl_multi_pipelining_server_bl(handle->multi);
|
---|
| 263 |
|
---|
| 264 | if(blacklist) {
|
---|
| 265 | struct curl_llist_element *curr;
|
---|
| 266 |
|
---|
| 267 | curr = blacklist->head;
|
---|
| 268 | while(curr) {
|
---|
| 269 | char *bl_server_name;
|
---|
| 270 |
|
---|
| 271 | bl_server_name = curr->ptr;
|
---|
| 272 | if(Curl_raw_nequal(bl_server_name, server_name,
|
---|
| 273 | strlen(bl_server_name))) {
|
---|
| 274 | infof(handle, "Server %s is blacklisted\n", server_name);
|
---|
| 275 | return TRUE;
|
---|
| 276 | }
|
---|
| 277 | curr = curr->next;
|
---|
| 278 | }
|
---|
| 279 | }
|
---|
| 280 |
|
---|
| 281 | DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name));
|
---|
| 282 | }
|
---|
| 283 | return FALSE;
|
---|
| 284 | }
|
---|
| 285 |
|
---|
| 286 | CURLMcode Curl_pipeline_set_server_blacklist(char **servers,
|
---|
| 287 | struct curl_llist **list_ptr)
|
---|
| 288 | {
|
---|
| 289 | struct curl_llist *old_list = *list_ptr;
|
---|
| 290 | struct curl_llist *new_list = NULL;
|
---|
| 291 |
|
---|
| 292 | if(servers) {
|
---|
| 293 | new_list = Curl_llist_alloc((curl_llist_dtor) server_blacklist_llist_dtor);
|
---|
| 294 | if(!new_list)
|
---|
| 295 | return CURLM_OUT_OF_MEMORY;
|
---|
| 296 |
|
---|
| 297 | /* Parse the URLs and populate the list */
|
---|
| 298 | while(*servers) {
|
---|
| 299 | char *server_name;
|
---|
| 300 |
|
---|
| 301 | server_name = strdup(*servers);
|
---|
| 302 | if(!server_name)
|
---|
| 303 | return CURLM_OUT_OF_MEMORY;
|
---|
| 304 |
|
---|
| 305 | if(!Curl_llist_insert_next(new_list, new_list->tail, server_name))
|
---|
| 306 | return CURLM_OUT_OF_MEMORY;
|
---|
| 307 |
|
---|
| 308 | servers++;
|
---|
| 309 | }
|
---|
| 310 | }
|
---|
| 311 |
|
---|
| 312 | /* Free the old list */
|
---|
| 313 | if(old_list) {
|
---|
| 314 | Curl_llist_destroy(old_list, NULL);
|
---|
| 315 | }
|
---|
| 316 |
|
---|
| 317 | /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
|
---|
| 318 | *list_ptr = new_list;
|
---|
| 319 |
|
---|
| 320 | return CURLM_OK;
|
---|
| 321 | }
|
---|
| 322 |
|
---|
| 323 | static bool pipe_head(struct SessionHandle *data,
|
---|
| 324 | struct curl_llist *pipeline)
|
---|
| 325 | {
|
---|
| 326 | struct curl_llist_element *curr = pipeline->head;
|
---|
| 327 | if(curr)
|
---|
| 328 | return (curr->ptr == data) ? TRUE : FALSE;
|
---|
| 329 |
|
---|
| 330 | return FALSE;
|
---|
| 331 | }
|
---|
| 332 |
|
---|
| 333 | /* returns TRUE if the given handle is head of the recv pipe */
|
---|
| 334 | bool Curl_recvpipe_head(struct SessionHandle *data,
|
---|
| 335 | struct connectdata *conn)
|
---|
| 336 | {
|
---|
| 337 | return pipe_head(data, conn->recv_pipe);
|
---|
| 338 | }
|
---|
| 339 |
|
---|
| 340 | /* returns TRUE if the given handle is head of the send pipe */
|
---|
| 341 | bool Curl_sendpipe_head(struct SessionHandle *data,
|
---|
| 342 | struct connectdata *conn)
|
---|
| 343 | {
|
---|
| 344 | return pipe_head(data, conn->send_pipe);
|
---|
| 345 | }
|
---|
| 346 |
|
---|
| 347 |
|
---|
| 348 | /*
|
---|
| 349 | * Check if the write channel is available and this handle as at the head,
|
---|
| 350 | * then grab the channel and return TRUE.
|
---|
| 351 | *
|
---|
| 352 | * If not available, return FALSE.
|
---|
| 353 | */
|
---|
| 354 |
|
---|
| 355 | bool Curl_pipeline_checkget_write(struct SessionHandle *data,
|
---|
| 356 | struct connectdata *conn)
|
---|
| 357 | {
|
---|
| 358 | if(conn->bits.multiplex)
|
---|
| 359 | /* when multiplexing, we can use it at once */
|
---|
| 360 | return TRUE;
|
---|
| 361 |
|
---|
| 362 | if(!conn->writechannel_inuse && Curl_sendpipe_head(data, conn)) {
|
---|
| 363 | /* Grab the channel */
|
---|
| 364 | conn->writechannel_inuse = TRUE;
|
---|
| 365 | return TRUE;
|
---|
| 366 | }
|
---|
| 367 | return FALSE;
|
---|
| 368 | }
|
---|
| 369 |
|
---|
| 370 |
|
---|
| 371 | /*
|
---|
| 372 | * Check if the read channel is available and this handle as at the head, then
|
---|
| 373 | * grab the channel and return TRUE.
|
---|
| 374 | *
|
---|
| 375 | * If not available, return FALSE.
|
---|
| 376 | */
|
---|
| 377 |
|
---|
| 378 | bool Curl_pipeline_checkget_read(struct SessionHandle *data,
|
---|
| 379 | struct connectdata *conn)
|
---|
| 380 | {
|
---|
| 381 | if(conn->bits.multiplex)
|
---|
| 382 | /* when multiplexing, we can use it at once */
|
---|
| 383 | return TRUE;
|
---|
| 384 |
|
---|
| 385 | if(!conn->readchannel_inuse && Curl_recvpipe_head(data, conn)) {
|
---|
| 386 | /* Grab the channel */
|
---|
| 387 | conn->readchannel_inuse = TRUE;
|
---|
| 388 | return TRUE;
|
---|
| 389 | }
|
---|
| 390 | return FALSE;
|
---|
| 391 | }
|
---|
| 392 |
|
---|
| 393 | /*
|
---|
| 394 | * The current user of the pipeline write channel gives it up.
|
---|
| 395 | */
|
---|
| 396 | void Curl_pipeline_leave_write(struct connectdata *conn)
|
---|
| 397 | {
|
---|
| 398 | conn->writechannel_inuse = FALSE;
|
---|
| 399 | }
|
---|
| 400 |
|
---|
| 401 | /*
|
---|
| 402 | * The current user of the pipeline read channel gives it up.
|
---|
| 403 | */
|
---|
| 404 | void Curl_pipeline_leave_read(struct connectdata *conn)
|
---|
| 405 | {
|
---|
| 406 | conn->readchannel_inuse = FALSE;
|
---|
| 407 | }
|
---|
| 408 |
|
---|
| 409 |
|
---|
| 410 | #if 0
|
---|
| 411 | void print_pipeline(struct connectdata *conn)
|
---|
| 412 | {
|
---|
| 413 | struct curl_llist_element *curr;
|
---|
| 414 | struct connectbundle *cb_ptr;
|
---|
| 415 | struct SessionHandle *data = conn->data;
|
---|
| 416 |
|
---|
| 417 | cb_ptr = conn->bundle;
|
---|
| 418 |
|
---|
| 419 | if(cb_ptr) {
|
---|
| 420 | curr = cb_ptr->conn_list->head;
|
---|
| 421 | while(curr) {
|
---|
| 422 | conn = curr->ptr;
|
---|
| 423 | infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
|
---|
| 424 | conn->connection_id,
|
---|
| 425 | (void *)conn,
|
---|
| 426 | conn->send_pipe->size,
|
---|
| 427 | conn->recv_pipe->size);
|
---|
| 428 | curr = curr->next;
|
---|
| 429 | }
|
---|
| 430 | }
|
---|
| 431 | }
|
---|
| 432 |
|
---|
| 433 | #endif
|
---|