mirror of
				https://github.com/dolphin-emu/dolphin.git
				synced 2025-10-27 10:29:07 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			434 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			434 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /***************************************************************************
 | |
|  *                                  _   _ ____  _
 | |
|  *  Project                     ___| | | |  _ \| |
 | |
|  *                             / __| | | | |_) | |
 | |
|  *                            | (__| |_| |  _ <| |___
 | |
|  *                             \___|\___/|_| \_\_____|
 | |
|  *
 | |
|  * Copyright (C) 2013, Linus Nielsen Feltzing, <linus@haxx.se>
 | |
|  * Copyright (C) 2013-2015, Daniel Stenberg, <daniel@haxx.se>, et al.
 | |
|  *
 | |
|  * This software is licensed as described in the file COPYING, which
 | |
|  * you should have received as part of this distribution. The terms
 | |
|  * are also available at https://curl.haxx.se/docs/copyright.html.
 | |
|  *
 | |
|  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
 | |
|  * copies of the Software, and permit persons to whom the Software is
 | |
|  * furnished to do so, under the terms of the COPYING file.
 | |
|  *
 | |
|  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
 | |
|  * KIND, either express or implied.
 | |
|  *
 | |
|  ***************************************************************************/
 | |
| 
 | |
| #include "curl_setup.h"
 | |
| 
 | |
| #include <curl/curl.h>
 | |
| 
 | |
| #include "urldata.h"
 | |
| #include "url.h"
 | |
| #include "progress.h"
 | |
| #include "multiif.h"
 | |
| #include "pipeline.h"
 | |
| #include "sendf.h"
 | |
| #include "rawstr.h"
 | |
| 
 | |
| #include "curl_memory.h"
 | |
| /* The last #include file should be: */
 | |
| #include "memdebug.h"
 | |
| 
 | |
| struct site_blacklist_entry {
 | |
|   char *hostname;
 | |
|   unsigned short port;
 | |
| };
 | |
| 
 | |
| static void site_blacklist_llist_dtor(void *user, void *element)
 | |
| {
 | |
|   struct site_blacklist_entry *entry = element;
 | |
|   (void)user;
 | |
| 
 | |
|   Curl_safefree(entry->hostname);
 | |
|   free(entry);
 | |
| }
 | |
| 
 | |
| static void server_blacklist_llist_dtor(void *user, void *element)
 | |
| {
 | |
|   (void)user;
 | |
|   free(element);
 | |
| }
 | |
| 
 | |
| bool Curl_pipeline_penalized(struct SessionHandle *data,
 | |
|                              struct connectdata *conn)
 | |
| {
 | |
|   if(data) {
 | |
|     bool penalized = FALSE;
 | |
|     curl_off_t penalty_size =
 | |
|       Curl_multi_content_length_penalty_size(data->multi);
 | |
|     curl_off_t chunk_penalty_size =
 | |
|       Curl_multi_chunk_length_penalty_size(data->multi);
 | |
|     curl_off_t recv_size = -2; /* Make it easy to spot in the log */
 | |
| 
 | |
|     /* Find the head of the recv pipe, if any */
 | |
|     if(conn->recv_pipe && conn->recv_pipe->head) {
 | |
|       struct SessionHandle *recv_handle = conn->recv_pipe->head->ptr;
 | |
| 
 | |
|       recv_size = recv_handle->req.size;
 | |
| 
 | |
|       if(penalty_size > 0 && recv_size > penalty_size)
 | |
|         penalized = TRUE;
 | |
|     }
 | |
| 
 | |
|     if(chunk_penalty_size > 0 &&
 | |
|        (curl_off_t)conn->chunk.datasize > chunk_penalty_size)
 | |
|       penalized = TRUE;
 | |
| 
 | |
|     infof(data, "Conn: %ld (%p) Receive pipe weight: (%"
 | |
|           CURL_FORMAT_CURL_OFF_T "/%zu), penalized: %s\n",
 | |
|           conn->connection_id, (void *)conn, recv_size,
 | |
|           conn->chunk.datasize, penalized?"TRUE":"FALSE");
 | |
|     return penalized;
 | |
|   }
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| static CURLcode addHandleToPipeline(struct SessionHandle *data,
 | |
|                                     struct curl_llist *pipeline)
 | |
| {
 | |
|   if(!Curl_llist_insert_next(pipeline, pipeline->tail, data))
 | |
|     return CURLE_OUT_OF_MEMORY;
 | |
|   return CURLE_OK;
 | |
| }
 | |
| 
 | |
| 
 | |
| CURLcode Curl_add_handle_to_pipeline(struct SessionHandle *handle,
 | |
|                                      struct connectdata *conn)
 | |
| {
 | |
|   struct curl_llist_element *sendhead = conn->send_pipe->head;
 | |
|   struct curl_llist *pipeline;
 | |
|   CURLcode result;
 | |
| 
 | |
|   pipeline = conn->send_pipe;
 | |
| 
 | |
|   result = addHandleToPipeline(handle, pipeline);
 | |
| 
 | |
|   if(pipeline == conn->send_pipe && sendhead != conn->send_pipe->head) {
 | |
|     /* this is a new one as head, expire it */
 | |
|     Curl_pipeline_leave_write(conn); /* not in use yet */
 | |
|     Curl_expire(conn->send_pipe->head->ptr, 1);
 | |
|   }
 | |
| 
 | |
| #if 0 /* enable for pipeline debugging */
 | |
|   print_pipeline(conn);
 | |
| #endif
 | |
| 
 | |
|   return result;
 | |
| }
 | |
| 
 | |
| /* Move this transfer from the sending list to the receiving list.
 | |
| 
 | |
|    Pay special attention to the new sending list "leader" as it needs to get
 | |
|    checked to update what sockets it acts on.
 | |
| 
 | |
| */
 | |
| void Curl_move_handle_from_send_to_recv_pipe(struct SessionHandle *handle,
 | |
|                                              struct connectdata *conn)
 | |
| {
 | |
|   struct curl_llist_element *curr;
 | |
| 
 | |
|   curr = conn->send_pipe->head;
 | |
|   while(curr) {
 | |
|     if(curr->ptr == handle) {
 | |
|       Curl_llist_move(conn->send_pipe, curr,
 | |
|                       conn->recv_pipe, conn->recv_pipe->tail);
 | |
| 
 | |
|       if(conn->send_pipe->head) {
 | |
|         /* Since there's a new easy handle at the start of the send pipeline,
 | |
|            set its timeout value to 1ms to make it trigger instantly */
 | |
|         Curl_pipeline_leave_write(conn); /* not used now */
 | |
| #ifdef DEBUGBUILD
 | |
|         infof(conn->data, "%p is at send pipe head B!\n",
 | |
|               (void *)conn->send_pipe->head->ptr);
 | |
| #endif
 | |
|         Curl_expire(conn->send_pipe->head->ptr, 1);
 | |
|       }
 | |
| 
 | |
|       /* The receiver's list is not really interesting here since either this
 | |
|          handle is now first in the list and we'll deal with it soon, or
 | |
|          another handle is already first and thus is already taken care of */
 | |
| 
 | |
|       break; /* we're done! */
 | |
|     }
 | |
|     curr = curr->next;
 | |
|   }
 | |
| }
 | |
| 
 | |
| bool Curl_pipeline_site_blacklisted(struct SessionHandle *handle,
 | |
|                                     struct connectdata *conn)
 | |
| {
 | |
|   if(handle->multi) {
 | |
|     struct curl_llist *blacklist =
 | |
|       Curl_multi_pipelining_site_bl(handle->multi);
 | |
| 
 | |
|     if(blacklist) {
 | |
|       struct curl_llist_element *curr;
 | |
| 
 | |
|       curr = blacklist->head;
 | |
|       while(curr) {
 | |
|         struct site_blacklist_entry *site;
 | |
| 
 | |
|         site = curr->ptr;
 | |
|         if(Curl_raw_equal(site->hostname, conn->host.name) &&
 | |
|            site->port == conn->remote_port) {
 | |
|           infof(handle, "Site %s:%d is pipeline blacklisted\n",
 | |
|                 conn->host.name, conn->remote_port);
 | |
|           return TRUE;
 | |
|         }
 | |
|         curr = curr->next;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| CURLMcode Curl_pipeline_set_site_blacklist(char **sites,
 | |
|                                            struct curl_llist **list_ptr)
 | |
| {
 | |
|   struct curl_llist *old_list = *list_ptr;
 | |
|   struct curl_llist *new_list = NULL;
 | |
| 
 | |
|   if(sites) {
 | |
|     new_list = Curl_llist_alloc((curl_llist_dtor) site_blacklist_llist_dtor);
 | |
|     if(!new_list)
 | |
|       return CURLM_OUT_OF_MEMORY;
 | |
| 
 | |
|     /* Parse the URLs and populate the list */
 | |
|     while(*sites) {
 | |
|       char *hostname;
 | |
|       char *port;
 | |
|       struct site_blacklist_entry *entry;
 | |
| 
 | |
|       hostname = strdup(*sites);
 | |
|       if(!hostname) {
 | |
|         Curl_llist_destroy(new_list, NULL);
 | |
|         return CURLM_OUT_OF_MEMORY;
 | |
|       }
 | |
| 
 | |
|       entry = malloc(sizeof(struct site_blacklist_entry));
 | |
|       if(!entry) {
 | |
|         free(hostname);
 | |
|         Curl_llist_destroy(new_list, NULL);
 | |
|         return CURLM_OUT_OF_MEMORY;
 | |
|       }
 | |
| 
 | |
|       port = strchr(hostname, ':');
 | |
|       if(port) {
 | |
|         *port = '\0';
 | |
|         port++;
 | |
|         entry->port = (unsigned short)strtol(port, NULL, 10);
 | |
|       }
 | |
|       else {
 | |
|         /* Default port number for HTTP */
 | |
|         entry->port = 80;
 | |
|       }
 | |
| 
 | |
|       entry->hostname = hostname;
 | |
| 
 | |
|       if(!Curl_llist_insert_next(new_list, new_list->tail, entry)) {
 | |
|         site_blacklist_llist_dtor(NULL, entry);
 | |
|         Curl_llist_destroy(new_list, NULL);
 | |
|         return CURLM_OUT_OF_MEMORY;
 | |
|       }
 | |
| 
 | |
|       sites++;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   /* Free the old list */
 | |
|   if(old_list) {
 | |
|     Curl_llist_destroy(old_list, NULL);
 | |
|   }
 | |
| 
 | |
|   /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
 | |
|   *list_ptr = new_list;
 | |
| 
 | |
|   return CURLM_OK;
 | |
| }
 | |
| 
 | |
| bool Curl_pipeline_server_blacklisted(struct SessionHandle *handle,
 | |
|                                       char *server_name)
 | |
| {
 | |
|   if(handle->multi && server_name) {
 | |
|     struct curl_llist *blacklist =
 | |
|       Curl_multi_pipelining_server_bl(handle->multi);
 | |
| 
 | |
|     if(blacklist) {
 | |
|       struct curl_llist_element *curr;
 | |
| 
 | |
|       curr = blacklist->head;
 | |
|       while(curr) {
 | |
|         char *bl_server_name;
 | |
| 
 | |
|         bl_server_name = curr->ptr;
 | |
|         if(Curl_raw_nequal(bl_server_name, server_name,
 | |
|                            strlen(bl_server_name))) {
 | |
|           infof(handle, "Server %s is blacklisted\n", server_name);
 | |
|           return TRUE;
 | |
|         }
 | |
|         curr = curr->next;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name));
 | |
|   }
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| CURLMcode Curl_pipeline_set_server_blacklist(char **servers,
 | |
|                                              struct curl_llist **list_ptr)
 | |
| {
 | |
|   struct curl_llist *old_list = *list_ptr;
 | |
|   struct curl_llist *new_list = NULL;
 | |
| 
 | |
|   if(servers) {
 | |
|     new_list = Curl_llist_alloc((curl_llist_dtor) server_blacklist_llist_dtor);
 | |
|     if(!new_list)
 | |
|       return CURLM_OUT_OF_MEMORY;
 | |
| 
 | |
|     /* Parse the URLs and populate the list */
 | |
|     while(*servers) {
 | |
|       char *server_name;
 | |
| 
 | |
|       server_name = strdup(*servers);
 | |
|       if(!server_name)
 | |
|         return CURLM_OUT_OF_MEMORY;
 | |
| 
 | |
|       if(!Curl_llist_insert_next(new_list, new_list->tail, server_name))
 | |
|         return CURLM_OUT_OF_MEMORY;
 | |
| 
 | |
|       servers++;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   /* Free the old list */
 | |
|   if(old_list) {
 | |
|     Curl_llist_destroy(old_list, NULL);
 | |
|   }
 | |
| 
 | |
|   /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
 | |
|   *list_ptr = new_list;
 | |
| 
 | |
|   return CURLM_OK;
 | |
| }
 | |
| 
 | |
| static bool pipe_head(struct SessionHandle *data,
 | |
|                       struct curl_llist *pipeline)
 | |
| {
 | |
|   if(pipeline) {
 | |
|     struct curl_llist_element *curr = pipeline->head;
 | |
|     if(curr)
 | |
|       return (curr->ptr == data) ? TRUE : FALSE;
 | |
|   }
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| /* returns TRUE if the given handle is head of the recv pipe */
 | |
| bool Curl_recvpipe_head(struct SessionHandle *data,
 | |
|                         struct connectdata *conn)
 | |
| {
 | |
|   return pipe_head(data, conn->recv_pipe);
 | |
| }
 | |
| 
 | |
| /* returns TRUE if the given handle is head of the send pipe */
 | |
| bool Curl_sendpipe_head(struct SessionHandle *data,
 | |
|                         struct connectdata *conn)
 | |
| {
 | |
|   return pipe_head(data, conn->send_pipe);
 | |
| }
 | |
| 
 | |
| 
 | |
| /*
 | |
|  * Check if the write channel is available and this handle as at the head,
 | |
|  * then grab the channel and return TRUE.
 | |
|  *
 | |
|  * If not available, return FALSE.
 | |
|  */
 | |
| 
 | |
| bool Curl_pipeline_checkget_write(struct SessionHandle *data,
 | |
|                                   struct connectdata *conn)
 | |
| {
 | |
|   if(conn->bits.multiplex)
 | |
|     /* when multiplexing, we can use it at once */
 | |
|     return TRUE;
 | |
| 
 | |
|   if(!conn->writechannel_inuse && Curl_sendpipe_head(data, conn)) {
 | |
|     /* Grab the channel */
 | |
|     conn->writechannel_inuse = TRUE;
 | |
|     return TRUE;
 | |
|   }
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| 
 | |
| /*
 | |
|  * Check if the read channel is available and this handle as at the head, then
 | |
|  * grab the channel and return TRUE.
 | |
|  *
 | |
|  * If not available, return FALSE.
 | |
|  */
 | |
| 
 | |
| bool Curl_pipeline_checkget_read(struct SessionHandle *data,
 | |
|                                  struct connectdata *conn)
 | |
| {
 | |
|   if(conn->bits.multiplex)
 | |
|     /* when multiplexing, we can use it at once */
 | |
|     return TRUE;
 | |
| 
 | |
|   if(!conn->readchannel_inuse && Curl_recvpipe_head(data, conn)) {
 | |
|     /* Grab the channel */
 | |
|     conn->readchannel_inuse = TRUE;
 | |
|     return TRUE;
 | |
|   }
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * The current user of the pipeline write channel gives it up.
 | |
|  */
 | |
| void Curl_pipeline_leave_write(struct connectdata *conn)
 | |
| {
 | |
|   conn->writechannel_inuse = FALSE;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * The current user of the pipeline read channel gives it up.
 | |
|  */
 | |
| void Curl_pipeline_leave_read(struct connectdata *conn)
 | |
| {
 | |
|   conn->readchannel_inuse = FALSE;
 | |
| }
 | |
| 
 | |
| 
 | |
| #if 0
 | |
| void print_pipeline(struct connectdata *conn)
 | |
| {
 | |
|   struct curl_llist_element *curr;
 | |
|   struct connectbundle *cb_ptr;
 | |
|   struct SessionHandle *data = conn->data;
 | |
| 
 | |
|   cb_ptr = conn->bundle;
 | |
| 
 | |
|   if(cb_ptr) {
 | |
|     curr = cb_ptr->conn_list->head;
 | |
|     while(curr) {
 | |
|       conn = curr->ptr;
 | |
|       infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
 | |
|             conn->connection_id,
 | |
|             (void *)conn,
 | |
|             conn->send_pipe->size,
 | |
|             conn->recv_pipe->size);
 | |
|       curr = curr->next;
 | |
|     }
 | |
|   }
 | |
| }
 | |
| 
 | |
| #endif
 |