| /* |
| * Connection management functions |
| * |
| * Copyright 2000-2012 Willy Tarreau <w@1wt.eu> |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License |
| * as published by the Free Software Foundation; either version |
| * 2 of the License, or (at your option) any later version. |
| * |
| */ |
| |
| #include <common/compat.h> |
| #include <common/config.h> |
| |
| #include <types/connection.h> |
| |
| #include <proto/proto_tcp.h> |
| #include <proto/stream_interface.h> |
| |
| /* I/O callback for fd-based connections. It calls the read/write handlers |
| * provided by the connection's sock_ops, which must be valid. It returns 0. |
| */ |
| int conn_fd_handler(int fd) |
| { |
| struct connection *conn = fdtab[fd].owner; |
| |
| if (unlikely(!conn)) |
| goto leave; |
| |
| process_handshake: |
| /* The handshake callbacks are called in sequence. If either of them is |
| * missing something, it must enable the required polling at the socket |
| * layer of the connection. Polling state is not guaranteed when entering |
| * these handlers, so any handshake handler which does not complete its |
| * work must explicitly disable events it's not interested in. |
| */ |
| while (unlikely(conn->flags & CO_FL_HANDSHAKE)) { |
| if (unlikely(conn->flags & CO_FL_ERROR)) |
| goto leave; |
| |
| if (conn->flags & CO_FL_SI_SEND_PROXY) |
| if (!conn_si_send_proxy(conn, CO_FL_SI_SEND_PROXY)) |
| goto leave; |
| } |
| |
| /* Once we're purely in the data phase, we disable handshake polling */ |
| if (!(conn->flags & CO_FL_POLL_SOCK)) |
| __conn_sock_stop_both(conn); |
| |
| if (fdtab[fd].ev & (FD_POLL_IN | FD_POLL_HUP | FD_POLL_ERR)) |
| conn->data->read(conn); |
| |
| if (unlikely(conn->flags & CO_FL_ERROR)) |
| goto leave; |
| |
| /* It may happen during the data phase that a handshake is |
| * enabled again (eg: SSL) |
| */ |
| if (unlikely(conn->flags & CO_FL_HANDSHAKE)) |
| goto process_handshake; |
| |
| if (fdtab[fd].ev & (FD_POLL_OUT | FD_POLL_ERR)) |
| conn->data->write(conn); |
| |
| if (unlikely(conn->flags & CO_FL_ERROR)) |
| goto leave; |
| |
| /* It may happen during the data phase that a handshake is |
| * enabled again (eg: SSL) |
| */ |
| if (unlikely(conn->flags & CO_FL_HANDSHAKE)) |
| goto process_handshake; |
| |
| if (unlikely(conn->flags & CO_FL_WAIT_L4_CONN)) { |
| /* still waiting for a connection to establish and no data to |
| * send in order to probe it ? Then let's retry the connect(). |
| */ |
| if (!tcp_connect_probe(conn)) |
| goto leave; |
| } |
| |
| leave: |
| if (conn->flags & CO_FL_NOTIFY_SI) |
| conn_notify_si(conn); |
| |
| /* Last check, verify if the connection just established */ |
| if (unlikely(!(conn->flags & (CO_FL_WAIT_L4_CONN | CO_FL_WAIT_L6_CONN | CO_FL_CONNECTED)))) |
| conn->flags |= CO_FL_CONNECTED; |
| |
| /* remove the events before leaving */ |
| fdtab[fd].ev &= ~(FD_POLL_IN | FD_POLL_OUT | FD_POLL_HUP | FD_POLL_ERR); |
| |
| /* commit polling changes */ |
| conn_cond_update_polling(conn); |
| return 0; |
| } |
| |
| /* set polling depending on the change between the CURR part of the |
| * flags and the new flags in connection C. The connection flags are |
| * updated with the new flags at the end of the operation. Only the bits |
| * relevant to CO_FL_CURR_* from <flags> are considered. |
| */ |
| void conn_set_polling(struct connection *c, unsigned int new) |
| { |
| unsigned int old = c->flags; /* for CO_FL_CURR_* */ |
| |
| /* update read status if needed */ |
| if ((old & (CO_FL_CURR_RD_ENA|CO_FL_CURR_RD_POL)) != (CO_FL_CURR_RD_ENA|CO_FL_CURR_RD_POL) && |
| (new & (CO_FL_CURR_RD_ENA|CO_FL_CURR_RD_POL)) == (CO_FL_CURR_RD_ENA|CO_FL_CURR_RD_POL)) |
| fd_poll_recv(c->t.sock.fd); |
| else if (!(old & CO_FL_CURR_RD_ENA) && (new & CO_FL_CURR_RD_ENA)) |
| fd_want_recv(c->t.sock.fd); |
| else if ((old & CO_FL_CURR_RD_ENA) && !(new & CO_FL_CURR_RD_ENA)) |
| fd_stop_recv(c->t.sock.fd); |
| |
| /* update write status if needed */ |
| if ((old & (CO_FL_CURR_WR_ENA|CO_FL_CURR_WR_POL)) != (CO_FL_CURR_WR_ENA|CO_FL_CURR_WR_POL) && |
| (new & (CO_FL_CURR_WR_ENA|CO_FL_CURR_WR_POL)) == (CO_FL_CURR_WR_ENA|CO_FL_CURR_WR_POL)) |
| fd_poll_send(c->t.sock.fd); |
| else if (!(old & CO_FL_CURR_WR_ENA) && (new & CO_FL_CURR_WR_ENA)) |
| fd_want_send(c->t.sock.fd); |
| else if ((old & CO_FL_CURR_WR_ENA) && !(new & CO_FL_CURR_WR_ENA)) |
| fd_stop_send(c->t.sock.fd); |
| |
| c->flags &= ~(CO_FL_CURR_WR_POL|CO_FL_CURR_WR_ENA|CO_FL_CURR_RD_POL|CO_FL_CURR_RD_ENA); |
| c->flags |= new & (CO_FL_CURR_WR_POL|CO_FL_CURR_WR_ENA|CO_FL_CURR_RD_POL|CO_FL_CURR_RD_ENA); |
| } |