blob: fa02b4adb036890693331b48854a23616c46ccf9 [file] [log] [blame]
Willy Tarreaubaaee002006-06-26 02:48:02 +02001/*
2 * Queue management functions.
3 *
Willy Tarreauac68c5d2009-10-04 23:12:44 +02004 * Copyright 2000-2009 Willy Tarreau <w@1wt.eu>
Willy Tarreaubaaee002006-06-26 02:48:02 +02005 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020013/* Short explanation on the locking, which is far from being trivial : a
14 * pendconn is a list element which necessarily is associated with an existing
15 * stream. It has pendconn->strm always valid. A pendconn may only be in one of
16 * these three states :
17 * - unlinked : in this case it is an empty list head ;
18 * - linked into the server's queue ;
19 * - linked into the proxy's queue.
20 *
21 * A stream does not necessarily have such a pendconn. Thus the pendconn is
22 * designated by the stream->pend_pos pointer. This results in some properties :
23 * - pendconn->strm->pend_pos is never NULL for any valid pendconn
Patrick Hemmer0355dab2018-05-11 12:52:31 -040024 * - if p->node.node.leaf_p is NULL, the element is unlinked,
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020025 * otherwise it necessarily belongs to one of the other lists ; this may
26 * not be atomically checked under threads though ;
27 * - pendconn->px is never NULL if pendconn->list is not empty
Willy Tarreau88930dd2018-07-26 07:38:54 +020028 * - pendconn->srv is never NULL if pendconn->list is in the server's queue,
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020029 * and is always NULL if pendconn->list is in the backend's queue or empty.
Willy Tarreau88930dd2018-07-26 07:38:54 +020030 * - pendconn->target is NULL while the element is queued, and points to the
31 * assigned server when the pendconn is picked.
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020032 *
33 * Threads complicate the design a little bit but rules remain simple :
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020034 * - the server's queue lock must be held at least when manipulating the
35 * server's queue, which is when adding a pendconn to the queue and when
36 * removing a pendconn from the queue. It protects the queue's integrity.
37 *
38 * - the proxy's queue lock must be held at least when manipulating the
39 * proxy's queue, which is when adding a pendconn to the queue and when
40 * removing a pendconn from the queue. It protects the queue's integrity.
41 *
Willy Tarreau3201e4e2018-07-26 08:23:24 +020042 * - both locks are compatible and may be held at the same time.
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020043 *
44 * - a pendconn_add() is only performed by the stream which will own the
45 * pendconn ; the pendconn is allocated at this moment and returned ; it is
46 * added to either the server or the proxy's queue while holding this
Willy Tarreau3201e4e2018-07-26 08:23:24 +020047 * queue's lock.
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020048 *
49 * - the pendconn is then met by a thread walking over the proxy or server's
50 * queue with the respective lock held. This lock is exclusive and the
51 * pendconn can only appear in one queue so by definition a single thread
52 * may find this pendconn at a time.
53 *
54 * - the pendconn is unlinked either by its own stream upon success/abort/
55 * free, or by another one offering it its server slot. This is achieved by
56 * pendconn_process_next_strm() under either the server or proxy's lock,
57 * pendconn_redistribute() under the server's lock, pendconn_grab_from_px()
58 * under the proxy's lock, or pendconn_unlink() under either the proxy's or
59 * the server's lock depending on the queue the pendconn is attached to.
60 *
61 * - no single operation except the pendconn initialisation prior to the
Willy Tarreau3201e4e2018-07-26 08:23:24 +020062 * insertion are performed without eithre a queue lock held or the element
63 * being unlinked and visible exclusively to its stream.
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020064 *
Willy Tarreau88930dd2018-07-26 07:38:54 +020065 * - pendconn_grab_from_px() and pendconn_process_next_strm() assign ->target
66 * so that the stream knows what server to work with (via
67 * pendconn_dequeue() which sets it on strm->target).
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020068 *
69 * - a pendconn doesn't switch between queues, it stays where it is.
Willy Tarreau6bdd05c2018-07-25 15:21:00 +020070 */
71
Willy Tarreaue3ba5f02006-06-29 18:54:54 +020072#include <common/config.h>
Willy Tarreau0108d902018-11-25 19:14:37 +010073#include <common/initcall.h>
Willy Tarreaue4d7e552007-05-13 20:19:55 +020074#include <common/memory.h>
Willy Tarreau2dd0d472006-06-29 17:53:05 +020075#include <common/time.h>
Christopher Faulet8ba59142017-06-27 15:43:53 +020076#include <common/hathreads.h>
Patrick Hemmer0355dab2018-05-11 12:52:31 -040077#include <eb32tree.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020078
Willy Tarreau61c112a2018-10-02 16:43:32 +020079#include <proto/http_rules.h>
Patrick Hemmer268a7072018-05-11 12:52:31 -040080#include <proto/proto_http.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020081#include <proto/queue.h>
Patrick Hemmer268a7072018-05-11 12:52:31 -040082#include <proto/sample.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020083#include <proto/server.h>
Willy Tarreau87b09662015-04-03 00:22:06 +020084#include <proto/stream.h>
Willy Tarreau9e000c62011-03-10 14:03:36 +010085#include <proto/stream_interface.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020086#include <proto/task.h>
Patrick Hemmer268a7072018-05-11 12:52:31 -040087#include <proto/tcp_rules.h>
Willy Tarreaubaaee002006-06-26 02:48:02 +020088
89
Patrick Hemmer248cb4c2018-05-11 12:52:31 -040090#define NOW_OFFSET_BOUNDARY() ((now_ms - (TIMER_LOOK_BACK >> 12)) & 0xfffff)
91#define KEY_CLASS(key) ((u32)key & 0xfff00000)
92#define KEY_OFFSET(key) ((u32)key & 0x000fffff)
93#define KEY_CLASS_OFFSET_BOUNDARY(key) (KEY_CLASS(key) | NOW_OFFSET_BOUNDARY())
94#define MAKE_KEY(class, offset) (((u32)(class + 0x7ff) << 20) | ((u32)(now_ms + offset) & 0xfffff))
95
Willy Tarreaubafbe012017-11-24 17:34:44 +010096struct pool_head *pool_head_pendconn;
Willy Tarreaue4d7e552007-05-13 20:19:55 +020097
98/* perform minimal intializations, report 0 in case of error, 1 if OK. */
99int init_pendconn()
100{
Willy Tarreaubafbe012017-11-24 17:34:44 +0100101 pool_head_pendconn = create_pool("pendconn", sizeof(struct pendconn), MEM_F_SHARED);
102 return pool_head_pendconn != NULL;
Willy Tarreaue4d7e552007-05-13 20:19:55 +0200103}
Willy Tarreaubaaee002006-06-26 02:48:02 +0200104
105/* returns the effective dynamic maxconn for a server, considering the minconn
Willy Tarreau86034312006-12-29 00:10:33 +0100106 * and the proxy's usage relative to its dynamic connections limit. It is
Willy Tarreau9909fc12007-11-30 17:42:05 +0100107 * expected that 0 < s->minconn <= s->maxconn when this is called. If the
108 * server is currently warming up, the slowstart is also applied to the
109 * resulting value, which can be lower than minconn in this case, but never
110 * less than 1.
Willy Tarreaubaaee002006-06-26 02:48:02 +0200111 */
Willy Tarreaub17916e2006-10-15 15:17:57 +0200112unsigned int srv_dynamic_maxconn(const struct server *s)
Willy Tarreaubaaee002006-06-26 02:48:02 +0200113{
Willy Tarreau9909fc12007-11-30 17:42:05 +0100114 unsigned int max;
115
Willy Tarreau86034312006-12-29 00:10:33 +0100116 if (s->proxy->beconn >= s->proxy->fullconn)
117 /* no fullconn or proxy is full */
Willy Tarreau9909fc12007-11-30 17:42:05 +0100118 max = s->maxconn;
119 else if (s->minconn == s->maxconn)
Willy Tarreau86034312006-12-29 00:10:33 +0100120 /* static limit */
Willy Tarreau9909fc12007-11-30 17:42:05 +0100121 max = s->maxconn;
122 else max = MAX(s->minconn,
123 s->proxy->beconn * s->maxconn / s->proxy->fullconn);
Willy Tarreau86034312006-12-29 00:10:33 +0100124
Emeric Brun52a91d32017-08-31 14:41:55 +0200125 if ((s->cur_state == SRV_ST_STARTING) &&
Willy Tarreau9909fc12007-11-30 17:42:05 +0100126 now.tv_sec < s->last_change + s->slowstart &&
127 now.tv_sec >= s->last_change) {
128 unsigned int ratio;
Willy Tarreau28a9e522008-09-14 17:43:27 +0200129 ratio = 100 * (now.tv_sec - s->last_change) / s->slowstart;
130 max = MAX(1, max * ratio / 100);
Willy Tarreau9909fc12007-11-30 17:42:05 +0100131 }
132 return max;
Willy Tarreaubaaee002006-06-26 02:48:02 +0200133}
134
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100135/* Remove the pendconn from the server/proxy queue. At this stage, the
136 * connection is not really dequeued. It will be done during the
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200137 * process_stream. It also decreases the pending count.
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100138 *
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200139 * The caller must own the lock on the queue containing the pendconn. The
140 * pendconn must still be queued.
Christopher Fauletf3a55db2017-06-09 14:26:38 +0200141 */
Willy Tarreau9624fae2018-07-25 08:04:20 +0200142static void __pendconn_unlink(struct pendconn *p)
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100143{
Patrick Hemmerda282f42018-05-11 12:52:31 -0400144 if (p->srv) {
145 p->strm->logs.srv_queue_pos += p->srv->queue_idx - p->queue_idx;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100146 p->srv->nbpend--;
Patrick Hemmerda282f42018-05-11 12:52:31 -0400147 } else {
148 p->strm->logs.prx_queue_pos += p->px->queue_idx - p->queue_idx;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100149 p->px->nbpend--;
Patrick Hemmerda282f42018-05-11 12:52:31 -0400150 }
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100151 HA_ATOMIC_SUB(&p->px->totpend, 1);
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400152 eb32_delete(&p->node);
Christopher Fauletf3a55db2017-06-09 14:26:38 +0200153}
154
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200155/* Locks the queue the pendconn element belongs to. This relies on both p->px
156 * and p->srv to be properly initialized (which is always the case once the
157 * element has been added).
158 */
159static inline void pendconn_queue_lock(struct pendconn *p)
160{
161 if (p->srv)
162 HA_SPIN_LOCK(SERVER_LOCK, &p->srv->lock);
163 else
164 HA_SPIN_LOCK(PROXY_LOCK, &p->px->lock);
165}
166
167/* Unlocks the queue the pendconn element belongs to. This relies on both p->px
168 * and p->srv to be properly initialized (which is always the case once the
169 * element has been added).
170 */
171static inline void pendconn_queue_unlock(struct pendconn *p)
172{
173 if (p->srv)
174 HA_SPIN_UNLOCK(SERVER_LOCK, &p->srv->lock);
175 else
176 HA_SPIN_UNLOCK(PROXY_LOCK, &p->px->lock);
177}
178
Willy Tarreau9624fae2018-07-25 08:04:20 +0200179/* Removes the pendconn from the server/proxy queue. At this stage, the
180 * connection is not really dequeued. It will be done during process_stream().
181 * This function takes all the required locks for the operation. The caller is
182 * responsible for ensuring that <p> is valid and still in the queue. Use
183 * pendconn_cond_unlink() if unsure. When the locks are already held, please
184 * use __pendconn_unlink() instead.
185 */
186void pendconn_unlink(struct pendconn *p)
187{
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200188 pendconn_queue_lock(p);
Willy Tarreau9624fae2018-07-25 08:04:20 +0200189
190 __pendconn_unlink(p);
191
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200192 pendconn_queue_unlock(p);
Willy Tarreau9624fae2018-07-25 08:04:20 +0200193}
194
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400195/* Retrieve the first pendconn from tree <pendconns>. Classes are always
196 * considered first, then the time offset. The time does wrap, so the
197 * lookup is performed twice, one to retrieve the first class and a second
198 * time to retrieve the earliest time in this class.
199 */
200static struct pendconn *pendconn_first(struct eb_root *pendconns)
201{
202 struct eb32_node *node, *node2 = NULL;
203 u32 key;
204
205 node = eb32_first(pendconns);
206 if (!node)
207 return NULL;
208
209 key = KEY_CLASS_OFFSET_BOUNDARY(node->key);
210 node2 = eb32_lookup_ge(pendconns, key);
211
212 if (!node2 ||
213 KEY_CLASS(node2->key) != KEY_CLASS(node->key)) {
214 /* no other key in the tree, or in this class */
215 return eb32_entry(node, struct pendconn, node);
216 }
217
218 /* found a better key */
219 return eb32_entry(node2, struct pendconn, node);
220}
221
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100222/* Process the next pending connection from either a server or a proxy, and
Christopher Fauletfd83f0b2018-03-19 15:22:09 +0100223 * returns a strictly positive value on success (see below). If no pending
224 * connection is found, 0 is returned. Note that neither <srv> nor <px> may be
225 * NULL. Priority is given to the oldest request in the queue if both <srv> and
226 * <px> have pending requests. This ensures that no request will be left
227 * unserved. The <px> queue is not considered if the server (or a tracked
228 * server) is not RUNNING, is disabled, or has a null weight (server going
229 * down). The <srv> queue is still considered in this case, because if some
230 * connections remain there, it means that some requests have been forced there
231 * after it was seen down (eg: due to option persist). The stream is
232 * immediately marked as "assigned", and both its <srv> and <srv_conn> are set
233 * to <srv>.
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100234 *
235 * This function must only be called if the server queue _AND_ the proxy queue
Christopher Fauletfd83f0b2018-03-19 15:22:09 +0100236 * are locked. Today it is only called by process_srv_queue. When a pending
237 * connection is dequeued, this function returns 1 if the pending connection can
238 * be handled by the current thread, else it returns 2.
Willy Tarreaubaaee002006-06-26 02:48:02 +0200239 */
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100240static int pendconn_process_next_strm(struct server *srv, struct proxy *px)
Willy Tarreaubaaee002006-06-26 02:48:02 +0200241{
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100242 struct pendconn *p = NULL;
Patrick Hemmerda282f42018-05-11 12:52:31 -0400243 struct pendconn *pp = NULL;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100244 struct server *rsrv;
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400245 u32 pkey, ppkey;
Willy Tarreaud132f742010-08-06 10:08:23 +0200246
Willy Tarreau44267702011-10-28 15:35:33 +0200247 rsrv = srv->track;
Willy Tarreaud132f742010-08-06 10:08:23 +0200248 if (!rsrv)
249 rsrv = srv;
Willy Tarreaubaaee002006-06-26 02:48:02 +0200250
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200251 p = NULL;
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400252 if (srv->nbpend)
253 p = pendconn_first(&srv->pendconns);
Willy Tarreau7c669d72008-06-20 15:04:11 +0200254
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400255 pp = NULL;
Willy Tarreaua8694652018-08-07 10:44:58 +0200256 if (srv_currently_usable(rsrv) && px->nbpend &&
257 (!(srv->flags & SRV_F_BACKUP) ||
258 (!px->srv_act &&
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400259 (srv == px->lbprm.fbck || (px->options & PR_O_USE_ALL_BK)))))
260 pp = pendconn_first(&px->pendconns);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100261
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400262 if (!p && !pp)
263 return 0;
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200264
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400265 if (p && !pp)
266 goto use_p;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100267
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400268 if (pp && !p)
269 goto use_pp;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100270
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400271 if (KEY_CLASS(p->node.key) < KEY_CLASS(pp->node.key))
272 goto use_p;
273
274 if (KEY_CLASS(pp->node.key) < KEY_CLASS(p->node.key))
275 goto use_pp;
276
277 pkey = KEY_OFFSET(p->node.key);
278 ppkey = KEY_OFFSET(pp->node.key);
279
280 if (pkey < NOW_OFFSET_BOUNDARY())
281 pkey += 0x100000; // key in the future
282
283 if (ppkey < NOW_OFFSET_BOUNDARY())
284 ppkey += 0x100000; // key in the future
285
286 if (pkey <= ppkey)
287 goto use_p;
288
289 use_pp:
290 /* Let's switch from the server pendconn to the proxy pendconn */
291 p = pp;
292 use_p:
Willy Tarreau9624fae2018-07-25 08:04:20 +0200293 __pendconn_unlink(p);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100294 p->strm_flags |= SF_ASSIGNED;
Willy Tarreau88930dd2018-07-26 07:38:54 +0200295 p->target = srv;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100296
Patrick Hemmerda282f42018-05-11 12:52:31 -0400297 if (p != pp)
298 srv->queue_idx++;
299 else
300 px->queue_idx++;
301
Christopher Faulet29f77e82017-06-08 14:04:45 +0200302 HA_ATOMIC_ADD(&srv->served, 1);
Christopher Fauletff8abcd2017-06-02 15:33:24 +0200303 HA_ATOMIC_ADD(&srv->proxy->served, 1);
Willy Tarreau7c669d72008-06-20 15:04:11 +0200304 if (px->lbprm.server_take_conn)
305 px->lbprm.server_take_conn(srv);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100306 __stream_add_srv_conn(p->strm, srv);
Willy Tarreau7c669d72008-06-20 15:04:11 +0200307
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100308 task_wakeup(p->strm->task, TASK_WOKEN_RES);
Christopher Fauletfd83f0b2018-03-19 15:22:09 +0100309
Olivier Houchardecfe6732018-07-26 18:47:27 +0200310 return 1;
Willy Tarreaubaaee002006-06-26 02:48:02 +0200311}
312
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100313/* Manages a server's connection queue. This function will try to dequeue as
Christopher Faulet87566c92017-06-06 10:34:51 +0200314 * many pending streams as possible, and wake them up.
315 */
316void process_srv_queue(struct server *s)
317{
318 struct proxy *p = s->proxy;
Olivier Houchardecfe6732018-07-26 18:47:27 +0200319 int maxconn;
Christopher Faulet87566c92017-06-06 10:34:51 +0200320
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100321 HA_SPIN_LOCK(PROXY_LOCK, &p->lock);
322 HA_SPIN_LOCK(SERVER_LOCK, &s->lock);
Christopher Faulet87566c92017-06-06 10:34:51 +0200323 maxconn = srv_dynamic_maxconn(s);
324 while (s->served < maxconn) {
Christopher Fauletfd83f0b2018-03-19 15:22:09 +0100325 int ret = pendconn_process_next_strm(s, p);
326 if (!ret)
Christopher Faulet87566c92017-06-06 10:34:51 +0200327 break;
Christopher Faulet87566c92017-06-06 10:34:51 +0200328 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100329 HA_SPIN_UNLOCK(SERVER_LOCK, &s->lock);
330 HA_SPIN_UNLOCK(PROXY_LOCK, &p->lock);
Christopher Faulet87566c92017-06-06 10:34:51 +0200331}
332
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400333/* Adds the stream <strm> to the pending connection queue of server <strm>->srv
Willy Tarreau87b09662015-04-03 00:22:06 +0200334 * or to the one of <strm>->proxy if srv is NULL. All counters and back pointers
Willy Tarreaubaaee002006-06-26 02:48:02 +0200335 * are updated accordingly. Returns NULL if no memory is available, otherwise the
Willy Tarreau87b09662015-04-03 00:22:06 +0200336 * pendconn itself. If the stream was already marked as served, its flag is
337 * cleared. It is illegal to call this function with a non-NULL strm->srv_conn.
Patrick Hemmerda282f42018-05-11 12:52:31 -0400338 * The stream's queue position is counted with an offset of -1 because we want
339 * to make sure that being at the first position in the queue reports 1.
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100340 *
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400341 * The queue is sorted by the composition of the priority_class, and the current
342 * timestamp offset by strm->priority_offset. The timestamp is in milliseconds
343 * and truncated to 20 bits, so will wrap every 17m28s575ms.
344 * The offset can be positive or negative, and an offset of 0 puts it in the
345 * middle of this range (~ 8 min). Note that this also means if the adjusted
346 * timestamp wraps around, the request will be misinterpreted as being of
347 * the higest priority for that priority class.
348 *
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100349 * This function must be called by the stream itself, so in the context of
350 * process_stream.
Willy Tarreaubaaee002006-06-26 02:48:02 +0200351 */
Willy Tarreau87b09662015-04-03 00:22:06 +0200352struct pendconn *pendconn_add(struct stream *strm)
Willy Tarreaubaaee002006-06-26 02:48:02 +0200353{
354 struct pendconn *p;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100355 struct proxy *px;
356 struct server *srv;
Willy Tarreaubaaee002006-06-26 02:48:02 +0200357
Willy Tarreaubafbe012017-11-24 17:34:44 +0100358 p = pool_alloc(pool_head_pendconn);
Willy Tarreaubaaee002006-06-26 02:48:02 +0200359 if (!p)
360 return NULL;
361
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200362 if (strm->flags & SF_ASSIGNED)
363 srv = objt_server(strm->target);
364 else
365 srv = NULL;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100366
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200367 px = strm->be;
Willy Tarreau88930dd2018-07-26 07:38:54 +0200368 p->target = NULL;
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200369 p->srv = srv;
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400370 p->node.key = MAKE_KEY(strm->priority_class, strm->priority_offset);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100371 p->px = px;
372 p->strm = strm;
373 p->strm_flags = strm->flags;
Willy Tarreau7c669d72008-06-20 15:04:11 +0200374
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200375 pendconn_queue_lock(p);
376
377 if (srv) {
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100378 srv->nbpend++;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100379 if (srv->nbpend > srv->counters.nbpend_max)
380 srv->counters.nbpend_max = srv->nbpend;
Patrick Hemmerda282f42018-05-11 12:52:31 -0400381 p->queue_idx = srv->queue_idx - 1; // for increment
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400382 eb32_insert(&srv->pendconns, &p->node);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100383 }
384 else {
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100385 px->nbpend++;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100386 if (px->nbpend > px->be_counters.nbpend_max)
387 px->be_counters.nbpend_max = px->nbpend;
Patrick Hemmerda282f42018-05-11 12:52:31 -0400388 p->queue_idx = px->queue_idx - 1; // for increment
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400389 eb32_insert(&px->pendconns, &p->node);
Willy Tarreaubaaee002006-06-26 02:48:02 +0200390 }
Willy Tarreau7c6f8a22018-07-26 08:03:14 +0200391 strm->pend_pos = p;
392
393 pendconn_queue_unlock(p);
394
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100395 HA_ATOMIC_ADD(&px->totpend, 1);
Willy Tarreaubaaee002006-06-26 02:48:02 +0200396 return p;
397}
398
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200399/* Redistribute pending connections when a server goes down. The number of
Willy Tarreaudeca26c2018-08-21 18:11:03 +0200400 * connections redistributed is returned. It must be called with the server
401 * lock held.
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200402 */
403int pendconn_redistribute(struct server *s)
404{
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400405 struct pendconn *p;
406 struct eb32_node *node;
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200407 int xferred = 0;
408
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100409 /* The REDISP option was specified. We will ignore cookie and force to
410 * balance or use the dispatcher. */
411 if ((s->proxy->options & (PR_O_REDISP|PR_O_PERSIST)) != PR_O_REDISP)
412 return 0;
413
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400414 for (node = eb32_first(&s->pendconns); node; node = eb32_next(node)) {
415 p = eb32_entry(&node, struct pendconn, node);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100416 if (p->strm_flags & SF_FORCE_PRST)
417 continue;
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200418
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100419 /* it's left to the dispatcher to choose a server */
Willy Tarreau9624fae2018-07-25 08:04:20 +0200420 __pendconn_unlink(p);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100421 p->strm_flags &= ~(SF_DIRECT | SF_ASSIGNED | SF_ADDR_SET);
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200422
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100423 task_wakeup(p->strm->task, TASK_WOKEN_RES);
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200424 }
425 return xferred;
426}
427
428/* Check for pending connections at the backend, and assign some of them to
429 * the server coming up. The server's weight is checked before being assigned
430 * connections it may not be able to handle. The total number of transferred
431 * connections is returned.
432 */
433int pendconn_grab_from_px(struct server *s)
434{
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400435 struct pendconn *p;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100436 int maxconn, xferred = 0;
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200437
Emeric Brun52a91d32017-08-31 14:41:55 +0200438 if (!srv_currently_usable(s))
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200439 return 0;
440
Willy Tarreaua8694652018-08-07 10:44:58 +0200441 /* if this is a backup server and there are active servers or at
442 * least another backup server was elected, then this one must
443 * not dequeue requests from the proxy.
444 */
445 if ((s->flags & SRV_F_BACKUP) &&
446 (s->proxy->srv_act ||
447 ((s != s->proxy->lbprm.fbck) && !(s->proxy->options & PR_O_USE_ALL_BK))))
448 return 0;
449
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100450 HA_SPIN_LOCK(PROXY_LOCK, &s->proxy->lock);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100451 maxconn = srv_dynamic_maxconn(s);
Patrick Hemmer248cb4c2018-05-11 12:52:31 -0400452 while ((p = pendconn_first(&s->proxy->pendconns))) {
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100453 if (s->maxconn && s->served + xferred >= maxconn)
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200454 break;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100455
Willy Tarreau9624fae2018-07-25 08:04:20 +0200456 __pendconn_unlink(p);
Willy Tarreau88930dd2018-07-26 07:38:54 +0200457 p->target = s;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100458
459 task_wakeup(p->strm->task, TASK_WOKEN_RES);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100460 xferred++;
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200461 }
Christopher Faulet2a944ee2017-11-07 10:42:54 +0100462 HA_SPIN_UNLOCK(PROXY_LOCK, &s->proxy->lock);
Willy Tarreau4aac7db2014-05-16 11:48:10 +0200463 return xferred;
464}
465
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100466/* Try to dequeue pending connection attached to the stream <strm>. It must
467 * always exists here. If the pendconn is still linked to the server or the
468 * proxy queue, nothing is done and the function returns 1. Otherwise,
469 * <strm>->flags and <strm>->target are updated, the pendconn is released and 0
470 * is returned.
471 *
472 * This function must be called by the stream itself, so in the context of
473 * process_stream.
Willy Tarreaubaaee002006-06-26 02:48:02 +0200474 */
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100475int pendconn_dequeue(struct stream *strm)
Willy Tarreaubaaee002006-06-26 02:48:02 +0200476{
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100477 struct pendconn *p;
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200478 int is_unlinked;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100479
480 if (unlikely(!strm->pend_pos)) {
481 /* unexpected case because it is called by the stream itself and
482 * only the stream can release a pendconn. So it is only
483 * possible if a pendconn is released by someone else or if the
484 * stream is supposed to be queued but without its associated
485 * pendconn. In both cases it is a bug! */
486 abort();
Christopher Faulet8ba59142017-06-27 15:43:53 +0200487 }
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100488 p = strm->pend_pos;
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200489
490 /* note below : we need to grab the queue's lock to check for emptiness
491 * because we don't want a partial _grab_from_px() or _redistribute()
492 * to be called in parallel and show an empty list without having the
493 * time to finish. With this we know that if we see the element
494 * unlinked, these functions were completely done.
495 */
496 pendconn_queue_lock(p);
Patrick Hemmer0355dab2018-05-11 12:52:31 -0400497 is_unlinked = !p->node.node.leaf_p;
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200498 pendconn_queue_unlock(p);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100499
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200500 if (!is_unlinked)
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100501 return 1;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100502
Willy Tarreau3201e4e2018-07-26 08:23:24 +0200503 /* the pendconn is not queued anymore and will not be so we're safe
504 * to proceed.
505 */
Willy Tarreau88930dd2018-07-26 07:38:54 +0200506 if (p->target)
507 strm->target = &p->target->obj_type;
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100508
509 strm->flags &= ~(SF_DIRECT | SF_ASSIGNED | SF_ADDR_SET);
510 strm->flags |= p->strm_flags & (SF_DIRECT | SF_ASSIGNED | SF_ADDR_SET);
511 strm->pend_pos = NULL;
Willy Tarreaubafbe012017-11-24 17:34:44 +0100512 pool_free(pool_head_pendconn, p);
Christopher Faulet5cd4bbd2018-03-14 16:18:06 +0100513 return 0;
Willy Tarreaubaaee002006-06-26 02:48:02 +0200514}
515
Patrick Hemmer268a7072018-05-11 12:52:31 -0400516static enum act_return action_set_priority_class(struct act_rule *rule, struct proxy *px,
517 struct session *sess, struct stream *s, int flags)
518{
519 struct sample *smp;
520
521 smp = sample_fetch_as_type(px, sess, s, SMP_OPT_DIR_REQ|SMP_OPT_FINAL, rule->arg.expr, SMP_T_SINT);
522 if (!smp)
523 return ACT_RET_CONT;
524
525 s->priority_class = queue_limit_class(smp->data.u.sint);
526 return ACT_RET_CONT;
527}
528
529static enum act_return action_set_priority_offset(struct act_rule *rule, struct proxy *px,
530 struct session *sess, struct stream *s, int flags)
531{
532 struct sample *smp;
533
534 smp = sample_fetch_as_type(px, sess, s, SMP_OPT_DIR_REQ|SMP_OPT_FINAL, rule->arg.expr, SMP_T_SINT);
535 if (!smp)
536 return ACT_RET_CONT;
537
538 s->priority_offset = queue_limit_offset(smp->data.u.sint);
539
540 return ACT_RET_CONT;
541}
542
543static enum act_parse_ret parse_set_priority_class(const char **args, int *arg, struct proxy *px,
544 struct act_rule *rule, char **err)
545{
546 unsigned int where = 0;
547
548 rule->arg.expr = sample_parse_expr((char **)args, arg, px->conf.args.file,
549 px->conf.args.line, err, &px->conf.args);
550 if (!rule->arg.expr)
551 return ACT_RET_PRS_ERR;
552
553 if (px->cap & PR_CAP_FE)
554 where |= SMP_VAL_FE_HRQ_HDR;
555 if (px->cap & PR_CAP_BE)
556 where |= SMP_VAL_BE_HRQ_HDR;
557
558 if (!(rule->arg.expr->fetch->val & where)) {
559 memprintf(err,
560 "fetch method '%s' extracts information from '%s', none of which is available here",
561 args[0], sample_src_names(rule->arg.expr->fetch->use));
562 free(rule->arg.expr);
563 return ACT_RET_PRS_ERR;
564 }
565
566 rule->action = ACT_CUSTOM;
567 rule->action_ptr = action_set_priority_class;
568 return ACT_RET_PRS_OK;
569}
570
571static enum act_parse_ret parse_set_priority_offset(const char **args, int *arg, struct proxy *px,
572 struct act_rule *rule, char **err)
573{
574 unsigned int where = 0;
575
576 rule->arg.expr = sample_parse_expr((char **)args, arg, px->conf.args.file,
577 px->conf.args.line, err, &px->conf.args);
578 if (!rule->arg.expr)
579 return ACT_RET_PRS_ERR;
580
581 if (px->cap & PR_CAP_FE)
582 where |= SMP_VAL_FE_HRQ_HDR;
583 if (px->cap & PR_CAP_BE)
584 where |= SMP_VAL_BE_HRQ_HDR;
585
586 if (!(rule->arg.expr->fetch->val & where)) {
587 memprintf(err,
588 "fetch method '%s' extracts information from '%s', none of which is available here",
589 args[0], sample_src_names(rule->arg.expr->fetch->use));
590 free(rule->arg.expr);
591 return ACT_RET_PRS_ERR;
592 }
593
594 rule->action = ACT_CUSTOM;
595 rule->action_ptr = action_set_priority_offset;
596 return ACT_RET_PRS_OK;
597}
598
599static struct action_kw_list tcp_cont_kws = {ILH, {
600 { "set-priority-class", parse_set_priority_class },
601 { "set-priority-offset", parse_set_priority_offset },
602 { /* END */ }
603}};
604
Willy Tarreau0108d902018-11-25 19:14:37 +0100605INITCALL1(STG_REGISTER, tcp_req_cont_keywords_register, &tcp_cont_kws);
606
Patrick Hemmer268a7072018-05-11 12:52:31 -0400607static struct action_kw_list http_req_kws = {ILH, {
608 { "set-priority-class", parse_set_priority_class },
609 { "set-priority-offset", parse_set_priority_offset },
610 { /* END */ }
611}};
612
Willy Tarreau0108d902018-11-25 19:14:37 +0100613INITCALL1(STG_REGISTER, http_req_keywords_register, &http_req_kws);
614
Patrick Hemmer268a7072018-05-11 12:52:31 -0400615static int
616smp_fetch_priority_class(const struct arg *args, struct sample *smp, const char *kw, void *private)
617{
618 if (!smp->strm)
619 return 0;
620
621 smp->data.type = SMP_T_SINT;
622 smp->data.u.sint = smp->strm->priority_class;
623
624 return 1;
625}
626
627static int
628smp_fetch_priority_offset(const struct arg *args, struct sample *smp, const char *kw, void *private)
629{
630 if (!smp->strm)
631 return 0;
632
633 smp->data.type = SMP_T_SINT;
634 smp->data.u.sint = smp->strm->priority_offset;
635
636 return 1;
637}
638
639
640static struct sample_fetch_kw_list smp_kws = {ILH, {
641 { "prio_class", smp_fetch_priority_class, 0, NULL, SMP_T_SINT, SMP_USE_INTRN, },
642 { "prio_offset", smp_fetch_priority_offset, 0, NULL, SMP_T_SINT, SMP_USE_INTRN, },
643 { /* END */},
644}};
645
Willy Tarreau0108d902018-11-25 19:14:37 +0100646INITCALL1(STG_REGISTER, sample_register_fetches, &smp_kws);
Patrick Hemmer268a7072018-05-11 12:52:31 -0400647
Willy Tarreaubaaee002006-06-26 02:48:02 +0200648/*
649 * Local variables:
650 * c-indent-level: 8
651 * c-basic-offset: 8
652 * End:
653 */