blob: da81d27a9ee83cc418f4d3759b0c06f88af302e6 [file] [log] [blame]
Christopher Faulet1329f2a2021-12-16 17:32:56 +01001/*
2 * Conn-stream management functions
3 *
4 * Copyright 2021 Christopher Faulet <cfaulet@haproxy.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
13#include <haproxy/api.h>
Christopher Faulet37046632022-04-01 11:36:58 +020014#include <haproxy/applet.h>
Christopher Faulet1329f2a2021-12-16 17:32:56 +010015#include <haproxy/connection.h>
16#include <haproxy/conn_stream.h>
Christopher Faulet19bd7282022-04-01 13:58:09 +020017#include <haproxy/cs_utils.h>
Christopher Faulet5e29b762022-04-04 08:58:34 +020018#include <haproxy/check.h>
19#include <haproxy/http_ana.h>
20#include <haproxy/pipe.h>
Christopher Faulet1329f2a2021-12-16 17:32:56 +010021#include <haproxy/pool.h>
Christopher Faulet1329f2a2021-12-16 17:32:56 +010022
23DECLARE_POOL(pool_head_connstream, "conn_stream", sizeof(struct conn_stream));
Willy Tarreauea59b022022-05-17 17:53:22 +020024DECLARE_POOL(pool_head_sedesc, "sedesc", sizeof(struct sedesc));
Christopher Faulet1329f2a2021-12-16 17:32:56 +010025
Christopher Faulet9ffddd52022-04-01 14:04:29 +020026/* functions used by default on a detached conn-stream */
27static void cs_app_shutr(struct conn_stream *cs);
28static void cs_app_shutw(struct conn_stream *cs);
29static void cs_app_chk_rcv(struct conn_stream *cs);
30static void cs_app_chk_snd(struct conn_stream *cs);
31
32/* functions used on a mux-based conn-stream */
33static void cs_app_shutr_conn(struct conn_stream *cs);
34static void cs_app_shutw_conn(struct conn_stream *cs);
35static void cs_app_chk_rcv_conn(struct conn_stream *cs);
36static void cs_app_chk_snd_conn(struct conn_stream *cs);
37
38/* functions used on an applet-based conn-stream */
39static void cs_app_shutr_applet(struct conn_stream *cs);
40static void cs_app_shutw_applet(struct conn_stream *cs);
41static void cs_app_chk_rcv_applet(struct conn_stream *cs);
42static void cs_app_chk_snd_applet(struct conn_stream *cs);
43
44/* conn-stream operations for connections */
45struct cs_app_ops cs_app_conn_ops = {
46 .chk_rcv = cs_app_chk_rcv_conn,
47 .chk_snd = cs_app_chk_snd_conn,
48 .shutr = cs_app_shutr_conn,
49 .shutw = cs_app_shutw_conn,
50};
51
52/* conn-stream operations for embedded tasks */
53struct cs_app_ops cs_app_embedded_ops = {
54 .chk_rcv = cs_app_chk_rcv,
55 .chk_snd = cs_app_chk_snd,
56 .shutr = cs_app_shutr,
57 .shutw = cs_app_shutw,
58};
59
60/* conn-stream operations for connections */
61struct cs_app_ops cs_app_applet_ops = {
62 .chk_rcv = cs_app_chk_rcv_applet,
63 .chk_snd = cs_app_chk_snd_applet,
64 .shutr = cs_app_shutr_applet,
65 .shutw = cs_app_shutw_applet,
66};
67
Christopher Faulet5e29b762022-04-04 08:58:34 +020068static int cs_conn_process(struct conn_stream *cs);
69static int cs_conn_recv(struct conn_stream *cs);
70static int cs_conn_send(struct conn_stream *cs);
71static int cs_applet_process(struct conn_stream *cs);
72
73struct data_cb cs_data_conn_cb = {
74 .wake = cs_conn_process,
75 .name = "STRM",
76};
77
78struct data_cb cs_data_applet_cb = {
79 .wake = cs_applet_process,
80 .name = "STRM",
81};
82
83
Christopher Faulet9ed77422022-04-12 08:51:15 +020084/* Initializes an endpoint */
Willy Tarreauea59b022022-05-17 17:53:22 +020085void sedesc_init(struct sedesc *sedesc)
Christopher Fauletdb90f2a2022-03-22 16:06:25 +010086{
Willy Tarreauea59b022022-05-17 17:53:22 +020087 sedesc->se = NULL;
88 sedesc->conn = NULL;
89 sedesc->cs = NULL;
90 se_fl_setall(sedesc, SE_FL_NONE);
Christopher Fauletdb90f2a2022-03-22 16:06:25 +010091}
92
Christopher Faulet9ed77422022-04-12 08:51:15 +020093/* Tries to alloc an endpoint and initialize it. Returns NULL on failure. */
Willy Tarreauea59b022022-05-17 17:53:22 +020094struct sedesc *sedesc_new()
Christopher Fauletdb90f2a2022-03-22 16:06:25 +010095{
Willy Tarreauea59b022022-05-17 17:53:22 +020096 struct sedesc *sedesc;
Christopher Fauletdb90f2a2022-03-22 16:06:25 +010097
Willy Tarreauea59b022022-05-17 17:53:22 +020098 sedesc = pool_alloc(pool_head_sedesc);
99 if (unlikely(!sedesc))
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100100 return NULL;
101
Willy Tarreauea59b022022-05-17 17:53:22 +0200102 sedesc_init(sedesc);
103 return sedesc;
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100104}
105
Christopher Faulet9ed77422022-04-12 08:51:15 +0200106/* Releases an endpoint. It is the caller responsibility to be sure it is safe
107 * and it is not shared with another entity
108 */
Willy Tarreauea59b022022-05-17 17:53:22 +0200109void sedesc_free(struct sedesc *sedesc)
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100110{
Willy Tarreauea59b022022-05-17 17:53:22 +0200111 pool_free(pool_head_sedesc, sedesc);
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100112}
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100113
Christopher Fauletdd2d0d82021-12-20 09:34:32 +0100114/* Tries to allocate a new conn_stream and initialize its main fields. On
Christopher Faulet9ed77422022-04-12 08:51:15 +0200115 * failure, nothing is allocated and NULL is returned. It is an internal
Willy Tarreaub605c422022-05-17 17:04:55 +0200116 * function. The caller must, at least, set the SE_FL_ORPHAN or SE_FL_DETACHED
Christopher Faulet9ed77422022-04-12 08:51:15 +0200117 * flag.
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100118 */
Willy Tarreauea59b022022-05-17 17:53:22 +0200119static struct conn_stream *cs_new(struct sedesc *sedesc)
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100120{
121 struct conn_stream *cs;
122
123 cs = pool_alloc(pool_head_connstream);
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100124
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100125 if (unlikely(!cs))
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100126 goto alloc_error;
Christopher Fauletbb772d02022-03-22 15:28:36 +0100127
128 cs->obj_type = OBJ_TYPE_CS;
129 cs->flags = CS_FL_NONE;
Christopher Faulet62e75742022-03-31 09:16:34 +0200130 cs->state = CS_ST_INI;
Christopher Faulet1d987772022-03-29 18:03:35 +0200131 cs->hcto = TICK_ETERNITY;
Christopher Fauletbb772d02022-03-22 15:28:36 +0100132 cs->app = NULL;
Christopher Fauletbb772d02022-03-22 15:28:36 +0100133 cs->data_cb = NULL;
Christopher Faulet8da67aa2022-03-29 17:53:09 +0200134 cs->src = NULL;
135 cs->dst = NULL;
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200136 cs->wait_event.tasklet = NULL;
137 cs->wait_event.events = 0;
138
Christopher Faulet9ed77422022-04-12 08:51:15 +0200139 /* If there is no endpoint, allocate a new one now */
Willy Tarreauea59b022022-05-17 17:53:22 +0200140 if (!sedesc) {
141 sedesc = sedesc_new();
142 if (unlikely(!sedesc))
Christopher Fauletb669d682022-03-22 18:37:19 +0100143 goto alloc_error;
144 }
Willy Tarreauea59b022022-05-17 17:53:22 +0200145 cs->endp = sedesc;
146 sedesc->cs = cs;
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100147
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100148 return cs;
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100149
150 alloc_error:
151 pool_free(pool_head_connstream, cs);
152 return NULL;
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100153}
154
Christopher Faulet9ed77422022-04-12 08:51:15 +0200155/* Creates a new conn-stream and its associated stream from a mux. <endp> must be
156 * defined. It returns NULL on error. On success, the new conn-stream is
Willy Tarreaub605c422022-05-17 17:04:55 +0200157 * returned. In this case, SE_FL_ORPHAN flag is removed.
Christopher Faulet9ed77422022-04-12 08:51:15 +0200158 */
Willy Tarreauea59b022022-05-17 17:53:22 +0200159struct conn_stream *cs_new_from_endp(struct sedesc *sedesc, struct session *sess, struct buffer *input)
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100160{
161 struct conn_stream *cs;
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100162
Willy Tarreauea59b022022-05-17 17:53:22 +0200163 cs = cs_new(sedesc);
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100164 if (unlikely(!cs))
165 return NULL;
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100166 if (unlikely(!stream_new(sess, cs, input))) {
167 pool_free(pool_head_connstream, cs);
168 cs = NULL;
169 }
Willy Tarreauea59b022022-05-17 17:53:22 +0200170 se_fl_clr(sedesc, SE_FL_ORPHAN);
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100171 return cs;
172}
173
Christopher Faulet9ed77422022-04-12 08:51:15 +0200174/* Creates a new conn-stream from an stream. There is no endpoint here, thus it
Willy Tarreaub605c422022-05-17 17:04:55 +0200175 * will be created by cs_new(). So the SE_FL_DETACHED flag is set. It returns
Christopher Faulet9ed77422022-04-12 08:51:15 +0200176 * NULL on error. On success, the new conn-stream is returned.
177 */
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100178struct conn_stream *cs_new_from_strm(struct stream *strm, unsigned int flags)
179{
180 struct conn_stream *cs;
181
182 cs = cs_new(NULL);
183 if (unlikely(!cs))
184 return NULL;
185 cs->flags |= flags;
Willy Tarreaub605c422022-05-17 17:04:55 +0200186 sc_ep_set(cs, SE_FL_DETACHED);
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100187 cs->app = &strm->obj_type;
Christopher Faulet0c6a64c2022-04-01 08:58:29 +0200188 cs->ops = &cs_app_embedded_ops;
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100189 cs->data_cb = NULL;
190 return cs;
191}
192
Christopher Faulet9ed77422022-04-12 08:51:15 +0200193/* Creates a new conn-stream from an health-check. There is no endpoint here,
Willy Tarreaub605c422022-05-17 17:04:55 +0200194 * thus it will be created by cs_new(). So the SE_FL_DETACHED flag is set. It
Christopher Faulet9ed77422022-04-12 08:51:15 +0200195 * returns NULL on error. On success, the new conn-stream is returned.
196 */
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100197struct conn_stream *cs_new_from_check(struct check *check, unsigned int flags)
198{
199 struct conn_stream *cs;
200
201 cs = cs_new(NULL);
202 if (unlikely(!cs))
203 return NULL;
204 cs->flags |= flags;
Willy Tarreaub605c422022-05-17 17:04:55 +0200205 sc_ep_set(cs, SE_FL_DETACHED);
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100206 cs->app = &check->obj_type;
207 cs->data_cb = &check_conn_cb;
208 return cs;
209}
210
Christopher Faulet9ed77422022-04-12 08:51:15 +0200211/* Releases a conn_stream previously allocated by cs_new(), as well as its
212 * endpoint, if it exists. This function is called internally or on error path.
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100213 */
214void cs_free(struct conn_stream *cs)
215{
Christopher Faulet8da67aa2022-03-29 17:53:09 +0200216 sockaddr_free(&cs->src);
217 sockaddr_free(&cs->dst);
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100218 if (cs->endp) {
Willy Tarreaub605c422022-05-17 17:04:55 +0200219 BUG_ON(!sc_ep_test(cs, SE_FL_DETACHED));
Willy Tarreauea59b022022-05-17 17:53:22 +0200220 sedesc_free(cs->endp);
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100221 }
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200222 if (cs->wait_event.tasklet)
223 tasklet_free(cs->wait_event.tasklet);
Christopher Faulet1329f2a2021-12-16 17:32:56 +0100224 pool_free(pool_head_connstream, cs);
225}
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100226
Christopher Fauleteb50c012022-04-21 14:22:53 +0200227/* Conditionally removes a conn-stream if it is detached and if there is no app
228 * layer defined. Except on error path, this one must be used. if release, the
229 * pointer on the CS is set to NULL.
Christopher Fauletaa69d8f2022-04-12 18:09:48 +0200230 */
Christopher Fauleteb50c012022-04-21 14:22:53 +0200231static void cs_free_cond(struct conn_stream **csp)
Christopher Fauletaa69d8f2022-04-12 18:09:48 +0200232{
Christopher Fauleteb50c012022-04-21 14:22:53 +0200233 struct conn_stream *cs = *csp;
234
Willy Tarreaub605c422022-05-17 17:04:55 +0200235 if (!cs->app && (!cs->endp || sc_ep_test(cs, SE_FL_DETACHED))) {
Christopher Fauletaa69d8f2022-04-12 18:09:48 +0200236 cs_free(cs);
Christopher Fauleteb50c012022-04-21 14:22:53 +0200237 *csp = NULL;
238 }
Christopher Fauletaa69d8f2022-04-12 18:09:48 +0200239}
240
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100241
Christopher Faulet9ed77422022-04-12 08:51:15 +0200242/* Attaches a conn_stream to a mux endpoint and sets the endpoint ctx. Returns
Willy Tarreaub605c422022-05-17 17:04:55 +0200243 * -1 on error and 0 on sucess. SE_FL_DETACHED flag is removed. This function is
Christopher Faulet9ed77422022-04-12 08:51:15 +0200244 * called from a mux when it is attached to a stream or a health-check.
245 */
Willy Tarreau65d05972022-05-16 17:29:42 +0200246int cs_attach_mux(struct conn_stream *cs, void *endp, void *ctx)
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100247{
Christopher Faulet93882042022-01-19 14:56:50 +0100248 struct connection *conn = ctx;
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100249
Willy Tarreau65d05972022-05-16 17:29:42 +0200250 cs->endp->se = endp;
Willy Tarreau24d15b12022-05-16 17:17:16 +0200251 cs->endp->conn = ctx;
Willy Tarreaub605c422022-05-17 17:04:55 +0200252 sc_ep_set(cs, SE_FL_T_MUX);
253 sc_ep_clr(cs, SE_FL_DETACHED);
Christopher Faulet93882042022-01-19 14:56:50 +0100254 if (!conn->ctx)
255 conn->ctx = cs;
256 if (cs_strm(cs)) {
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200257 if (!cs->wait_event.tasklet) {
258 cs->wait_event.tasklet = tasklet_new();
259 if (!cs->wait_event.tasklet)
260 return -1;
Christopher Faulet4a7764a2022-04-01 16:58:52 +0200261 cs->wait_event.tasklet->process = cs_conn_io_cb;
262 cs->wait_event.tasklet->context = cs;
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200263 cs->wait_event.events = 0;
264 }
265
Christopher Faulet0c6a64c2022-04-01 08:58:29 +0200266 cs->ops = &cs_app_conn_ops;
Christopher Faulet000ba3e2022-04-01 17:06:32 +0200267 cs->data_cb = &cs_data_conn_cb;
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100268 }
Christopher Fauletc95eaef2022-05-18 15:57:15 +0200269 else if (cs_check(cs)) {
270 if (!cs->wait_event.tasklet) {
271 cs->wait_event.tasklet = tasklet_new();
272 if (!cs->wait_event.tasklet)
273 return -1;
274 cs->wait_event.tasklet->process = srv_chk_io_cb;
275 cs->wait_event.tasklet->context = cs;
276 cs->wait_event.events = 0;
277 }
278
Christopher Faulet93882042022-01-19 14:56:50 +0100279 cs->data_cb = &check_conn_cb;
Christopher Fauletc95eaef2022-05-18 15:57:15 +0200280 }
Christopher Faulet070b91b2022-03-31 19:27:18 +0200281 return 0;
Christopher Faulet93882042022-01-19 14:56:50 +0100282}
283
Christopher Faulet9ed77422022-04-12 08:51:15 +0200284/* Attaches a conn_stream to an applet endpoint and sets the endpoint
Willy Tarreaub605c422022-05-17 17:04:55 +0200285 * ctx. Returns -1 on error and 0 on sucess. SE_FL_DETACHED flag is
Christopher Faulet9ed77422022-04-12 08:51:15 +0200286 * removed. This function is called by a stream when a backend applet is
287 * registered.
288 */
Willy Tarreau65d05972022-05-16 17:29:42 +0200289static void cs_attach_applet(struct conn_stream *cs, void *endp)
Christopher Faulet93882042022-01-19 14:56:50 +0100290{
Willy Tarreau65d05972022-05-16 17:29:42 +0200291 cs->endp->se = endp;
Willy Tarreaub605c422022-05-17 17:04:55 +0200292 sc_ep_set(cs, SE_FL_T_APPLET);
293 sc_ep_clr(cs, SE_FL_DETACHED);
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100294 if (cs_strm(cs)) {
Christopher Faulet0c6a64c2022-04-01 08:58:29 +0200295 cs->ops = &cs_app_applet_ops;
Christopher Faulet6059ba42022-04-01 16:34:53 +0200296 cs->data_cb = &cs_data_applet_cb;
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100297 }
298}
299
Christopher Faulet9ed77422022-04-12 08:51:15 +0200300/* Attaches a conn_stream to a app layer and sets the relevant
Willy Tarreaub605c422022-05-17 17:04:55 +0200301 * callbacks. Returns -1 on error and 0 on success. SE_FL_ORPHAN flag is
Christopher Faulet9ed77422022-04-12 08:51:15 +0200302 * removed. This function is called by a stream when it is created to attach it
303 * on the conn-stream on the client side.
304 */
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100305int cs_attach_strm(struct conn_stream *cs, struct stream *strm)
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100306{
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100307 cs->app = &strm->obj_type;
Willy Tarreaub605c422022-05-17 17:04:55 +0200308 sc_ep_clr(cs, SE_FL_ORPHAN);
309 if (sc_ep_test(cs, SE_FL_T_MUX)) {
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200310 cs->wait_event.tasklet = tasklet_new();
Christopher Faulet582a2262022-04-04 11:25:59 +0200311 if (!cs->wait_event.tasklet)
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200312 return -1;
Christopher Faulet4a7764a2022-04-01 16:58:52 +0200313 cs->wait_event.tasklet->process = cs_conn_io_cb;
314 cs->wait_event.tasklet->context = cs;
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200315 cs->wait_event.events = 0;
316
Christopher Faulet0c6a64c2022-04-01 08:58:29 +0200317 cs->ops = &cs_app_conn_ops;
Christopher Faulet000ba3e2022-04-01 17:06:32 +0200318 cs->data_cb = &cs_data_conn_cb;
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100319 }
Willy Tarreaub605c422022-05-17 17:04:55 +0200320 else if (sc_ep_test(cs, SE_FL_T_APPLET)) {
Christopher Faulet0c6a64c2022-04-01 08:58:29 +0200321 cs->ops = &cs_app_applet_ops;
Christopher Faulet6059ba42022-04-01 16:34:53 +0200322 cs->data_cb = &cs_data_applet_cb;
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100323 }
324 else {
Christopher Faulet0c6a64c2022-04-01 08:58:29 +0200325 cs->ops = &cs_app_embedded_ops;
Christopher Fauleta9e8b392022-03-23 11:01:09 +0100326 cs->data_cb = NULL;
327 }
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100328 return 0;
329}
330
Christopher Faulet9ed77422022-04-12 08:51:15 +0200331/* Detaches the conn_stream from the endpoint, if any. For a connecrion, if a
332 * mux owns the connection ->detach() callback is called. Otherwise, it means
333 * the conn-stream owns the connection. In this case the connection is closed
334 * and released. For an applet, the appctx is released. If still allocated, the
335 * endpoint is reset and flag as detached. If the app layer is also detached,
336 * the conn-stream is released.
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100337 */
Christopher Fauleteb50c012022-04-21 14:22:53 +0200338static void cs_detach_endp(struct conn_stream **csp)
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100339{
Christopher Fauleteb50c012022-04-21 14:22:53 +0200340 struct conn_stream *cs = *csp;
341
342 if (!cs)
343 return;
344
Christopher Fauletb041b232022-03-24 10:27:02 +0100345 if (!cs->endp)
346 goto reset_cs;
347
Willy Tarreaub605c422022-05-17 17:04:55 +0200348 if (sc_ep_test(cs, SE_FL_T_MUX)) {
Christopher Fauletcea05432022-04-14 11:40:12 +0200349 struct connection *conn = __cs_conn(cs);
Willy Tarreauea59b022022-05-17 17:53:22 +0200350 struct sedesc *endp = cs->endp;
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100351
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100352 if (conn->mux) {
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200353 if (cs->wait_event.events != 0)
354 conn->mux->unsubscribe(cs, cs->wait_event.events, &cs->wait_event);
Willy Tarreaub605c422022-05-17 17:04:55 +0200355 se_fl_set(endp, SE_FL_ORPHAN);
Willy Tarreau4201ab72022-05-10 19:18:52 +0200356 endp->cs = NULL;
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100357 cs->endp = NULL;
Willy Tarreau4201ab72022-05-10 19:18:52 +0200358 conn->mux->detach(endp);
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100359 }
360 else {
361 /* It's too early to have a mux, let's just destroy
362 * the connection
363 */
364 conn_stop_tracking(conn);
365 conn_full_close(conn);
366 if (conn->destroy_cb)
367 conn->destroy_cb(conn);
368 conn_free(conn);
369 }
370 }
Willy Tarreaub605c422022-05-17 17:04:55 +0200371 else if (sc_ep_test(cs, SE_FL_T_APPLET)) {
Christopher Fauletcea05432022-04-14 11:40:12 +0200372 struct appctx *appctx = __cs_appctx(cs);
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100373
Willy Tarreaub605c422022-05-17 17:04:55 +0200374 sc_ep_set(cs, SE_FL_ORPHAN);
Willy Tarreauefb46182022-05-10 09:04:18 +0200375 cs->endp->cs = NULL;
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100376 cs->endp = NULL;
Willy Tarreau1c3ead42022-05-10 19:42:22 +0200377 appctx_shut(appctx);
378 appctx_free(appctx);
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100379 }
380
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100381 if (cs->endp) {
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100382 /* the cs is the only one one the endpoint */
Willy Tarreau65d05972022-05-16 17:29:42 +0200383 cs->endp->se = NULL;
Willy Tarreau24d15b12022-05-16 17:17:16 +0200384 cs->endp->conn = NULL;
Willy Tarreaub605c422022-05-17 17:04:55 +0200385 sc_ep_clr(cs, ~SE_FL_APP_MASK);
386 sc_ep_set(cs, SE_FL_DETACHED);
Christopher Fauletdb90f2a2022-03-22 16:06:25 +0100387 }
388
Christopher Fauletb041b232022-03-24 10:27:02 +0100389 reset_cs:
Christopher Fauletc36de9d2022-01-06 08:44:58 +0100390 /* FIXME: Rest CS for now but must be reviewed. CS flags are only
391 * connection related for now but this will evolved
392 */
Christopher Faulet30995112022-03-25 15:32:38 +0100393 cs->flags &= CS_FL_ISBACK;
Christopher Faulet582a2262022-04-04 11:25:59 +0200394 if (cs_strm(cs))
Christopher Faulet0c6a64c2022-04-01 08:58:29 +0200395 cs->ops = &cs_app_embedded_ops;
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100396 cs->data_cb = NULL;
Christopher Fauleteb50c012022-04-21 14:22:53 +0200397 cs_free_cond(csp);
Christopher Fauletc36de9d2022-01-06 08:44:58 +0100398}
399
Christopher Faulet9ed77422022-04-12 08:51:15 +0200400/* Detaches the conn_stream from the app layer. If there is no endpoint attached
401 * to the conn_stream
402 */
Christopher Fauleteb50c012022-04-21 14:22:53 +0200403static void cs_detach_app(struct conn_stream **csp)
Christopher Fauletc36de9d2022-01-06 08:44:58 +0100404{
Christopher Fauleteb50c012022-04-21 14:22:53 +0200405 struct conn_stream *cs = *csp;
406
407 if (!cs)
408 return;
409
Christopher Fauletc36de9d2022-01-06 08:44:58 +0100410 cs->app = NULL;
Christopher Fauletc36de9d2022-01-06 08:44:58 +0100411 cs->data_cb = NULL;
Christopher Faulet8da67aa2022-03-29 17:53:09 +0200412 sockaddr_free(&cs->src);
413 sockaddr_free(&cs->dst);
Christopher Faulet2f35e7b2022-03-31 11:09:28 +0200414
415 if (cs->wait_event.tasklet)
416 tasklet_free(cs->wait_event.tasklet);
417 cs->wait_event.tasklet = NULL;
418 cs->wait_event.events = 0;
Christopher Fauleteb50c012022-04-21 14:22:53 +0200419 cs_free_cond(csp);
420}
421
422/* Destroy the conn_stream. It is detached from its endpoint and its
423 * application. After this call, the conn_stream must be considered as released.
424 */
425void cs_destroy(struct conn_stream *cs)
426{
427 cs_detach_endp(&cs);
428 cs_detach_app(&cs);
429 BUG_ON_HOT(cs);
Christopher Fauletcda94ac2021-12-23 17:28:17 +0100430}
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100431
Christopher Faulet9ed77422022-04-12 08:51:15 +0200432/* Resets the conn-stream endpoint. It happens when the app layer want to renew
433 * its endpoint. For a connection retry for instance. If a mux or an applet is
434 * attached, a new endpoint is created. Returns -1 on error and 0 on sucess.
Christopher Fauleta6c4a482022-04-28 18:25:24 +0200435 *
Willy Tarreaub605c422022-05-17 17:04:55 +0200436 * Only SE_FL_ERROR flag is removed on the endpoint. Orther flags are preserved.
Christopher Fauleta6c4a482022-04-28 18:25:24 +0200437 * It is the caller responsibility to remove other flags if needed.
Christopher Faulet9ed77422022-04-12 08:51:15 +0200438 */
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100439int cs_reset_endp(struct conn_stream *cs)
440{
Willy Tarreauea59b022022-05-17 17:53:22 +0200441 struct sedesc *new_endp;
Christopher Fauletb041b232022-03-24 10:27:02 +0100442
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100443 BUG_ON(!cs->app);
Christopher Fauleta6c4a482022-04-28 18:25:24 +0200444
Willy Tarreaub605c422022-05-17 17:04:55 +0200445 sc_ep_clr(cs, SE_FL_ERROR);
Christopher Fauletb041b232022-03-24 10:27:02 +0100446 if (!__cs_endp_target(cs)) {
447 /* endpoint not attached or attached to a mux with no
448 * target. Thus the endpoint will not be release but just
Christopher Fauleteb50c012022-04-21 14:22:53 +0200449 * reset. The app is still attached, the cs will not be
450 * released.
Christopher Fauletb041b232022-03-24 10:27:02 +0100451 */
Christopher Fauleteb50c012022-04-21 14:22:53 +0200452 cs_detach_endp(&cs);
Christopher Fauletb041b232022-03-24 10:27:02 +0100453 return 0;
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100454 }
Christopher Fauletb041b232022-03-24 10:27:02 +0100455
456 /* allocate the new endpoint first to be able to set error if it
457 * fails */
Willy Tarreauea59b022022-05-17 17:53:22 +0200458 new_endp = sedesc_new();
Christopher Fauletb041b232022-03-24 10:27:02 +0100459 if (!unlikely(new_endp)) {
Willy Tarreaub605c422022-05-17 17:04:55 +0200460 sc_ep_set(cs, SE_FL_ERROR);
Christopher Fauletb041b232022-03-24 10:27:02 +0100461 return -1;
462 }
Willy Tarreaub605c422022-05-17 17:04:55 +0200463 se_fl_setall(new_endp, sc_ep_get(cs) & SE_FL_APP_MASK);
Christopher Fauletb041b232022-03-24 10:27:02 +0100464
Christopher Fauleteb50c012022-04-21 14:22:53 +0200465 /* The app is still attached, the cs will not be released */
466 cs_detach_endp(&cs);
Christopher Fauletb041b232022-03-24 10:27:02 +0100467 BUG_ON(cs->endp);
468 cs->endp = new_endp;
Willy Tarreauefb46182022-05-10 09:04:18 +0200469 cs->endp->cs = cs;
Willy Tarreaub605c422022-05-17 17:04:55 +0200470 sc_ep_set(cs, SE_FL_DETACHED);
Christopher Faulet9ec2f4d2022-03-23 15:15:29 +0100471 return 0;
472}
Christopher Faulet37046632022-04-01 11:36:58 +0200473
474
Christopher Faulet1336ccf2022-04-12 18:15:16 +0200475/* Create an applet to handle a conn-stream as a new appctx. The CS will
Christopher Faulet37046632022-04-01 11:36:58 +0200476 * wake it up every time it is solicited. The appctx must be deleted by the task
477 * handler using cs_detach_endp(), possibly from within the function itself.
478 * It also pre-initializes the applet's context and returns it (or NULL in case
479 * it could not be allocated).
480 */
Christopher Faulet1336ccf2022-04-12 18:15:16 +0200481struct appctx *cs_applet_create(struct conn_stream *cs, struct applet *app)
Christopher Faulet37046632022-04-01 11:36:58 +0200482{
483 struct appctx *appctx;
484
485 DPRINTF(stderr, "registering handler %p for cs %p (was %p)\n", app, cs, cs_strm_task(cs));
486
Christopher Faulet6095d572022-05-16 17:09:48 +0200487 appctx = appctx_new_here(app, cs->endp);
Christopher Faulet37046632022-04-01 11:36:58 +0200488 if (!appctx)
489 return NULL;
Christopher Faulet2d9cc852022-05-16 17:29:37 +0200490 cs_attach_applet(cs, appctx);
Christopher Faulet37046632022-04-01 11:36:58 +0200491 appctx->t->nice = __cs_strm(cs)->task->nice;
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200492 cs_cant_get(cs);
Christopher Faulet37046632022-04-01 11:36:58 +0200493 appctx_wakeup(appctx);
Christopher Fauleta33ff7a2022-04-21 11:52:07 +0200494
495 cs->state = CS_ST_RDY;
Christopher Faulet37046632022-04-01 11:36:58 +0200496 return appctx;
497}
498
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200499/*
500 * This function performs a shutdown-read on a detached conn-stream in a
501 * connected or init state (it does nothing for other states). It either shuts
502 * the read side or marks itself as closed. The buffer flags are updated to
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +0200503 * reflect the new state. If the conn-stream has CS_FL_NOHALF, we also
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200504 * forward the close to the write side. The owner task is woken up if it exists.
505 */
506static void cs_app_shutr(struct conn_stream *cs)
507{
508 struct channel *ic = cs_ic(cs);
509
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200510 cs_rx_shut_blk(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200511 if (ic->flags & CF_SHUTR)
512 return;
513 ic->flags |= CF_SHUTR;
514 ic->rex = TICK_ETERNITY;
515
516 if (!cs_state_in(cs->state, CS_SB_CON|CS_SB_RDY|CS_SB_EST))
517 return;
518
519 if (cs_oc(cs)->flags & CF_SHUTW) {
520 cs->state = CS_ST_DIS;
521 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
522 }
523 else if (cs->flags & CS_FL_NOHALF) {
524 /* we want to immediately forward this close to the write side */
525 return cs_app_shutw(cs);
526 }
527
528 /* note that if the task exists, it must unregister itself once it runs */
529 if (!(cs->flags & CS_FL_DONT_WAKE))
530 task_wakeup(cs_strm_task(cs), TASK_WOKEN_IO);
531}
532
533/*
534 * This function performs a shutdown-write on a detached conn-stream in a
535 * connected or init state (it does nothing for other states). It either shuts
536 * the write side or marks itself as closed. The buffer flags are updated to
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +0200537 * reflect the new state. It does also close everything if the CS was marked as
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200538 * being in error state. The owner task is woken up if it exists.
539 */
540static void cs_app_shutw(struct conn_stream *cs)
541{
542 struct channel *ic = cs_ic(cs);
543 struct channel *oc = cs_oc(cs);
544
545 oc->flags &= ~CF_SHUTW_NOW;
546 if (oc->flags & CF_SHUTW)
547 return;
548 oc->flags |= CF_SHUTW;
549 oc->wex = TICK_ETERNITY;
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200550 cs_done_get(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200551
552 if (tick_isset(cs->hcto)) {
553 ic->rto = cs->hcto;
554 ic->rex = tick_add(now_ms, ic->rto);
555 }
556
557 switch (cs->state) {
558 case CS_ST_RDY:
559 case CS_ST_EST:
560 /* we have to shut before closing, otherwise some short messages
561 * may never leave the system, especially when there are remaining
562 * unread data in the socket input buffer, or when nolinger is set.
563 * However, if CS_FL_NOLINGER is explicitly set, we know there is
564 * no risk so we close both sides immediately.
565 */
Willy Tarreaub605c422022-05-17 17:04:55 +0200566 if (!sc_ep_test(cs, SE_FL_ERROR) && !(cs->flags & CS_FL_NOLINGER) &&
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200567 !(ic->flags & (CF_SHUTR|CF_DONT_READ)))
568 return;
569
570 /* fall through */
571 case CS_ST_CON:
572 case CS_ST_CER:
573 case CS_ST_QUE:
574 case CS_ST_TAR:
575 /* Note that none of these states may happen with applets */
576 cs->state = CS_ST_DIS;
577 /* fall through */
578 default:
579 cs->flags &= ~CS_FL_NOLINGER;
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200580 cs_rx_shut_blk(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200581 ic->flags |= CF_SHUTR;
582 ic->rex = TICK_ETERNITY;
583 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
584 }
585
586 /* note that if the task exists, it must unregister itself once it runs */
587 if (!(cs->flags & CS_FL_DONT_WAKE))
588 task_wakeup(cs_strm_task(cs), TASK_WOKEN_IO);
589}
590
591/* default chk_rcv function for scheduled tasks */
592static void cs_app_chk_rcv(struct conn_stream *cs)
593{
594 struct channel *ic = cs_ic(cs);
595
596 DPRINTF(stderr, "%s: cs=%p, cs->state=%d ic->flags=%08x oc->flags=%08x\n",
597 __FUNCTION__,
598 cs, cs->state, ic->flags, cs_oc(cs)->flags);
599
600 if (ic->pipe) {
601 /* stop reading */
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200602 cs_rx_room_blk(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200603 }
604 else {
605 /* (re)start reading */
606 if (!(cs->flags & CS_FL_DONT_WAKE))
607 task_wakeup(cs_strm_task(cs), TASK_WOKEN_IO);
608 }
609}
610
611/* default chk_snd function for scheduled tasks */
612static void cs_app_chk_snd(struct conn_stream *cs)
613{
614 struct channel *oc = cs_oc(cs);
615
616 DPRINTF(stderr, "%s: cs=%p, cs->state=%d ic->flags=%08x oc->flags=%08x\n",
617 __FUNCTION__,
618 cs, cs->state, cs_ic(cs)->flags, oc->flags);
619
620 if (unlikely(cs->state != CS_ST_EST || (oc->flags & CF_SHUTW)))
621 return;
622
Willy Tarreaub605c422022-05-17 17:04:55 +0200623 if (!sc_ep_test(cs, SE_FL_WAIT_DATA) || /* not waiting for data */
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200624 channel_is_empty(oc)) /* called with nothing to send ! */
625 return;
626
627 /* Otherwise there are remaining data to be sent in the buffer,
628 * so we tell the handler.
629 */
Willy Tarreaub605c422022-05-17 17:04:55 +0200630 sc_ep_clr(cs, SE_FL_WAIT_DATA);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200631 if (!tick_isset(oc->wex))
632 oc->wex = tick_add_ifset(now_ms, oc->wto);
633
634 if (!(cs->flags & CS_FL_DONT_WAKE))
635 task_wakeup(cs_strm_task(cs), TASK_WOKEN_IO);
636}
637
638/*
639 * This function performs a shutdown-read on a conn-stream attached to
640 * a connection in a connected or init state (it does nothing for other
641 * states). It either shuts the read side or marks itself as closed. The buffer
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +0200642 * flags are updated to reflect the new state. If the conn-stream has
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200643 * CS_FL_NOHALF, we also forward the close to the write side. If a control
644 * layer is defined, then it is supposed to be a socket layer and file
645 * descriptors are then shutdown or closed accordingly. The function
646 * automatically disables polling if needed.
647 */
648static void cs_app_shutr_conn(struct conn_stream *cs)
649{
650 struct channel *ic = cs_ic(cs);
651
652 BUG_ON(!cs_conn(cs));
653
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200654 cs_rx_shut_blk(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200655 if (ic->flags & CF_SHUTR)
656 return;
657 ic->flags |= CF_SHUTR;
658 ic->rex = TICK_ETERNITY;
659
660 if (!cs_state_in(cs->state, CS_SB_CON|CS_SB_RDY|CS_SB_EST))
661 return;
662
663 if (cs_oc(cs)->flags & CF_SHUTW) {
Christopher Fauletff022a22022-04-21 08:38:54 +0200664 cs_conn_shut(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200665 cs->state = CS_ST_DIS;
666 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
667 }
668 else if (cs->flags & CS_FL_NOHALF) {
669 /* we want to immediately forward this close to the write side */
670 return cs_app_shutw_conn(cs);
671 }
672}
673
674/*
675 * This function performs a shutdown-write on a conn-stream attached to
676 * a connection in a connected or init state (it does nothing for other
677 * states). It either shuts the write side or marks itself as closed. The
678 * buffer flags are updated to reflect the new state. It does also close
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +0200679 * everything if the CS was marked as being in error state. If there is a
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200680 * data-layer shutdown, it is called.
681 */
682static void cs_app_shutw_conn(struct conn_stream *cs)
683{
684 struct channel *ic = cs_ic(cs);
685 struct channel *oc = cs_oc(cs);
686
687 BUG_ON(!cs_conn(cs));
688
689 oc->flags &= ~CF_SHUTW_NOW;
690 if (oc->flags & CF_SHUTW)
691 return;
692 oc->flags |= CF_SHUTW;
693 oc->wex = TICK_ETERNITY;
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200694 cs_done_get(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200695
696 if (tick_isset(cs->hcto)) {
697 ic->rto = cs->hcto;
698 ic->rex = tick_add(now_ms, ic->rto);
699 }
700
701 switch (cs->state) {
702 case CS_ST_RDY:
703 case CS_ST_EST:
704 /* we have to shut before closing, otherwise some short messages
705 * may never leave the system, especially when there are remaining
706 * unread data in the socket input buffer, or when nolinger is set.
707 * However, if CS_FL_NOLINGER is explicitly set, we know there is
708 * no risk so we close both sides immediately.
709 */
710
Willy Tarreaub605c422022-05-17 17:04:55 +0200711 if (sc_ep_test(cs, SE_FL_ERROR)) {
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200712 /* quick close, the socket is already shut anyway */
713 }
714 else if (cs->flags & CS_FL_NOLINGER) {
715 /* unclean data-layer shutdown, typically an aborted request
716 * or a forwarded shutdown from a client to a server due to
717 * option abortonclose. No need for the TLS layer to try to
718 * emit a shutdown message.
719 */
720 cs_conn_shutw(cs, CO_SHW_SILENT);
721 }
722 else {
723 /* clean data-layer shutdown. This only happens on the
724 * frontend side, or on the backend side when forwarding
725 * a client close in TCP mode or in HTTP TUNNEL mode
726 * while option abortonclose is set. We want the TLS
727 * layer to try to signal it to the peer before we close.
728 */
729 cs_conn_shutw(cs, CO_SHW_NORMAL);
730
731 if (!(ic->flags & (CF_SHUTR|CF_DONT_READ)))
732 return;
733 }
734
735 /* fall through */
736 case CS_ST_CON:
737 /* we may have to close a pending connection, and mark the
738 * response buffer as shutr
739 */
Christopher Fauletff022a22022-04-21 08:38:54 +0200740 cs_conn_shut(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200741 /* fall through */
742 case CS_ST_CER:
743 case CS_ST_QUE:
744 case CS_ST_TAR:
745 cs->state = CS_ST_DIS;
746 /* fall through */
747 default:
748 cs->flags &= ~CS_FL_NOLINGER;
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200749 cs_rx_shut_blk(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200750 ic->flags |= CF_SHUTR;
751 ic->rex = TICK_ETERNITY;
752 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
753 }
754}
755
756/* This function is used for inter-conn-stream calls. It is called by the
757 * consumer to inform the producer side that it may be interested in checking
758 * for free space in the buffer. Note that it intentionally does not update
759 * timeouts, so that we can still check them later at wake-up. This function is
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +0200760 * dedicated to connection-based conn-streams.
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200761 */
762static void cs_app_chk_rcv_conn(struct conn_stream *cs)
763{
764 BUG_ON(!cs_conn(cs));
765
766 /* (re)start reading */
767 if (cs_state_in(cs->state, CS_SB_CON|CS_SB_RDY|CS_SB_EST))
768 tasklet_wakeup(cs->wait_event.tasklet);
769}
770
771
772/* This function is used for inter-conn-stream calls. It is called by the
773 * producer to inform the consumer side that it may be interested in checking
774 * for data in the buffer. Note that it intentionally does not update timeouts,
775 * so that we can still check them later at wake-up.
776 */
777static void cs_app_chk_snd_conn(struct conn_stream *cs)
778{
779 struct channel *oc = cs_oc(cs);
780
781 BUG_ON(!cs_conn(cs));
782
Willy Tarreau4173f4e2022-04-29 15:04:41 +0200783 if (unlikely(!cs_state_in(cs->state, CS_SB_RDY|CS_SB_EST) ||
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200784 (oc->flags & CF_SHUTW)))
785 return;
786
787 if (unlikely(channel_is_empty(oc))) /* called with nothing to send ! */
788 return;
789
790 if (!oc->pipe && /* spliced data wants to be forwarded ASAP */
Willy Tarreaub605c422022-05-17 17:04:55 +0200791 !sc_ep_test(cs, SE_FL_WAIT_DATA)) /* not waiting for data */
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200792 return;
793
794 if (!(cs->wait_event.events & SUB_RETRY_SEND) && !channel_is_empty(cs_oc(cs)))
Christopher Faulet000ba3e2022-04-01 17:06:32 +0200795 cs_conn_send(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200796
Willy Tarreaub605c422022-05-17 17:04:55 +0200797 if (sc_ep_test(cs, SE_FL_ERROR | SE_FL_ERR_PENDING) || cs_is_conn_error(cs)) {
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200798 /* Write error on the file descriptor */
799 if (cs->state >= CS_ST_CON)
Willy Tarreaub605c422022-05-17 17:04:55 +0200800 sc_ep_set(cs, SE_FL_ERROR);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200801 goto out_wakeup;
802 }
803
804 /* OK, so now we know that some data might have been sent, and that we may
805 * have to poll first. We have to do that too if the buffer is not empty.
806 */
807 if (channel_is_empty(oc)) {
808 /* the connection is established but we can't write. Either the
809 * buffer is empty, or we just refrain from sending because the
810 * ->o limit was reached. Maybe we just wrote the last
811 * chunk and need to close.
812 */
813 if (((oc->flags & (CF_SHUTW|CF_AUTO_CLOSE|CF_SHUTW_NOW)) ==
814 (CF_AUTO_CLOSE|CF_SHUTW_NOW)) &&
815 cs_state_in(cs->state, CS_SB_RDY|CS_SB_EST)) {
816 cs_shutw(cs);
817 goto out_wakeup;
818 }
819
820 if ((oc->flags & (CF_SHUTW|CF_SHUTW_NOW)) == 0)
Willy Tarreaub605c422022-05-17 17:04:55 +0200821 sc_ep_set(cs, SE_FL_WAIT_DATA);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200822 oc->wex = TICK_ETERNITY;
823 }
824 else {
825 /* Otherwise there are remaining data to be sent in the buffer,
826 * which means we have to poll before doing so.
827 */
Willy Tarreaub605c422022-05-17 17:04:55 +0200828 sc_ep_clr(cs, SE_FL_WAIT_DATA);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200829 if (!tick_isset(oc->wex))
830 oc->wex = tick_add_ifset(now_ms, oc->wto);
831 }
832
833 if (likely(oc->flags & CF_WRITE_ACTIVITY)) {
834 struct channel *ic = cs_ic(cs);
835
836 /* update timeout if we have written something */
837 if ((oc->flags & (CF_SHUTW|CF_WRITE_PARTIAL)) == CF_WRITE_PARTIAL &&
838 !channel_is_empty(oc))
839 oc->wex = tick_add_ifset(now_ms, oc->wto);
840
841 if (tick_isset(ic->rex) && !(cs->flags & CS_FL_INDEP_STR)) {
842 /* Note: to prevent the client from expiring read timeouts
843 * during writes, we refresh it. We only do this if the
844 * interface is not configured for "independent streams",
845 * because for some applications it's better not to do this,
846 * for instance when continuously exchanging small amounts
847 * of data which can full the socket buffers long before a
848 * write timeout is detected.
849 */
850 ic->rex = tick_add_ifset(now_ms, ic->rto);
851 }
852 }
853
854 /* in case of special condition (error, shutdown, end of write...), we
855 * have to notify the task.
856 */
857 if (likely((oc->flags & (CF_WRITE_NULL|CF_WRITE_ERROR|CF_SHUTW)) ||
858 ((oc->flags & CF_WAKE_WRITE) &&
859 ((channel_is_empty(oc) && !oc->to_forward) ||
860 !cs_state_in(cs->state, CS_SB_EST))))) {
861 out_wakeup:
862 if (!(cs->flags & CS_FL_DONT_WAKE))
863 task_wakeup(cs_strm_task(cs), TASK_WOKEN_IO);
864 }
865}
866
867/*
868 * This function performs a shutdown-read on a conn-stream attached to an
869 * applet in a connected or init state (it does nothing for other states). It
870 * either shuts the read side or marks itself as closed. The buffer flags are
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +0200871 * updated to reflect the new state. If the conn-stream has CS_FL_NOHALF,
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200872 * we also forward the close to the write side. The owner task is woken up if
873 * it exists.
874 */
875static void cs_app_shutr_applet(struct conn_stream *cs)
876{
877 struct channel *ic = cs_ic(cs);
878
879 BUG_ON(!cs_appctx(cs));
880
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200881 cs_rx_shut_blk(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200882 if (ic->flags & CF_SHUTR)
883 return;
884 ic->flags |= CF_SHUTR;
885 ic->rex = TICK_ETERNITY;
886
887 /* Note: on shutr, we don't call the applet */
888
889 if (!cs_state_in(cs->state, CS_SB_CON|CS_SB_RDY|CS_SB_EST))
890 return;
891
892 if (cs_oc(cs)->flags & CF_SHUTW) {
Willy Tarreau1c3ead42022-05-10 19:42:22 +0200893 appctx_shut(__cs_appctx(cs));
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200894 cs->state = CS_ST_DIS;
895 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
896 }
897 else if (cs->flags & CS_FL_NOHALF) {
898 /* we want to immediately forward this close to the write side */
899 return cs_app_shutw_applet(cs);
900 }
901}
902
903/*
904 * This function performs a shutdown-write on a conn-stream attached to an
905 * applet in a connected or init state (it does nothing for other states). It
906 * either shuts the write side or marks itself as closed. The buffer flags are
907 * updated to reflect the new state. It does also close everything if the SI
908 * was marked as being in error state. The owner task is woken up if it exists.
909 */
910static void cs_app_shutw_applet(struct conn_stream *cs)
911{
912 struct channel *ic = cs_ic(cs);
913 struct channel *oc = cs_oc(cs);
914
915 BUG_ON(!cs_appctx(cs));
916
917 oc->flags &= ~CF_SHUTW_NOW;
918 if (oc->flags & CF_SHUTW)
919 return;
920 oc->flags |= CF_SHUTW;
921 oc->wex = TICK_ETERNITY;
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200922 cs_done_get(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200923
924 if (tick_isset(cs->hcto)) {
925 ic->rto = cs->hcto;
926 ic->rex = tick_add(now_ms, ic->rto);
927 }
928
929 /* on shutw we always wake the applet up */
930 appctx_wakeup(__cs_appctx(cs));
931
932 switch (cs->state) {
933 case CS_ST_RDY:
934 case CS_ST_EST:
935 /* we have to shut before closing, otherwise some short messages
936 * may never leave the system, especially when there are remaining
937 * unread data in the socket input buffer, or when nolinger is set.
938 * However, if CS_FL_NOLINGER is explicitly set, we know there is
939 * no risk so we close both sides immediately.
940 */
Willy Tarreaub605c422022-05-17 17:04:55 +0200941 if (!sc_ep_test(cs, SE_FL_ERROR) && !(cs->flags & CS_FL_NOLINGER) &&
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200942 !(ic->flags & (CF_SHUTR|CF_DONT_READ)))
943 return;
944
945 /* fall through */
946 case CS_ST_CON:
947 case CS_ST_CER:
948 case CS_ST_QUE:
949 case CS_ST_TAR:
950 /* Note that none of these states may happen with applets */
Willy Tarreau1c3ead42022-05-10 19:42:22 +0200951 appctx_shut(__cs_appctx(cs));
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200952 cs->state = CS_ST_DIS;
953 /* fall through */
954 default:
955 cs->flags &= ~CS_FL_NOLINGER;
Christopher Fauleta0bdec32022-04-04 07:51:21 +0200956 cs_rx_shut_blk(cs);
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200957 ic->flags |= CF_SHUTR;
958 ic->rex = TICK_ETERNITY;
959 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
960 }
961}
962
963/* chk_rcv function for applets */
964static void cs_app_chk_rcv_applet(struct conn_stream *cs)
965{
966 struct channel *ic = cs_ic(cs);
967
968 BUG_ON(!cs_appctx(cs));
969
970 DPRINTF(stderr, "%s: cs=%p, cs->state=%d ic->flags=%08x oc->flags=%08x\n",
971 __FUNCTION__,
972 cs, cs->state, ic->flags, cs_oc(cs)->flags);
973
974 if (!ic->pipe) {
975 /* (re)start reading */
976 appctx_wakeup(__cs_appctx(cs));
977 }
978}
979
980/* chk_snd function for applets */
981static void cs_app_chk_snd_applet(struct conn_stream *cs)
982{
983 struct channel *oc = cs_oc(cs);
984
985 BUG_ON(!cs_appctx(cs));
986
987 DPRINTF(stderr, "%s: cs=%p, cs->state=%d ic->flags=%08x oc->flags=%08x\n",
988 __FUNCTION__,
989 cs, cs->state, cs_ic(cs)->flags, oc->flags);
990
991 if (unlikely(cs->state != CS_ST_EST || (oc->flags & CF_SHUTW)))
992 return;
993
994 /* we only wake the applet up if it was waiting for some data */
995
Willy Tarreaub605c422022-05-17 17:04:55 +0200996 if (!sc_ep_test(cs, SE_FL_WAIT_DATA))
Christopher Faulet9ffddd52022-04-01 14:04:29 +0200997 return;
998
999 if (!tick_isset(oc->wex))
1000 oc->wex = tick_add_ifset(now_ms, oc->wto);
1001
1002 if (!channel_is_empty(oc)) {
1003 /* (re)start sending */
1004 appctx_wakeup(__cs_appctx(cs));
1005 }
1006}
Christopher Faulet13045f02022-04-01 14:23:38 +02001007
1008
1009/* This function is designed to be called from within the stream handler to
1010 * update the input channel's expiration timer and the conn-stream's
1011 * Rx flags based on the channel's flags. It needs to be called only once
1012 * after the channel's flags have settled down, and before they are cleared,
1013 * though it doesn't harm to call it as often as desired (it just slightly
1014 * hurts performance). It must not be called from outside of the stream
1015 * handler, as what it does will be used to compute the stream task's
1016 * expiration.
1017 */
1018void cs_update_rx(struct conn_stream *cs)
1019{
1020 struct channel *ic = cs_ic(cs);
1021
1022 if (ic->flags & CF_SHUTR) {
Christopher Fauleta0bdec32022-04-04 07:51:21 +02001023 cs_rx_shut_blk(cs);
Christopher Faulet13045f02022-04-01 14:23:38 +02001024 return;
1025 }
1026
1027 /* Read not closed, update FD status and timeout for reads */
1028 if (ic->flags & CF_DONT_READ)
Christopher Fauleta0bdec32022-04-04 07:51:21 +02001029 cs_rx_chan_blk(cs);
Christopher Faulet13045f02022-04-01 14:23:38 +02001030 else
Christopher Fauleta0bdec32022-04-04 07:51:21 +02001031 cs_rx_chan_rdy(cs);
Christopher Faulet13045f02022-04-01 14:23:38 +02001032
1033 if (!channel_is_empty(ic) || !channel_may_recv(ic)) {
1034 /* stop reading, imposed by channel's policy or contents */
Christopher Fauleta0bdec32022-04-04 07:51:21 +02001035 cs_rx_room_blk(cs);
Christopher Faulet13045f02022-04-01 14:23:38 +02001036 }
1037 else {
1038 /* (re)start reading and update timeout. Note: we don't recompute the timeout
1039 * every time we get here, otherwise it would risk never to expire. We only
1040 * update it if is was not yet set. The stream socket handler will already
1041 * have updated it if there has been a completed I/O.
1042 */
Christopher Fauleta0bdec32022-04-04 07:51:21 +02001043 cs_rx_room_rdy(cs);
Christopher Faulet13045f02022-04-01 14:23:38 +02001044 }
Willy Tarreaub605c422022-05-17 17:04:55 +02001045 if (sc_ep_test(cs, SE_FL_RXBLK_ANY))
Christopher Faulet13045f02022-04-01 14:23:38 +02001046 ic->rex = TICK_ETERNITY;
1047 else if (!(ic->flags & CF_READ_NOEXP) && !tick_isset(ic->rex))
1048 ic->rex = tick_add_ifset(now_ms, ic->rto);
1049
1050 cs_chk_rcv(cs);
1051}
1052
1053/* This function is designed to be called from within the stream handler to
1054 * update the output channel's expiration timer and the conn-stream's
1055 * Tx flags based on the channel's flags. It needs to be called only once
1056 * after the channel's flags have settled down, and before they are cleared,
1057 * though it doesn't harm to call it as often as desired (it just slightly
1058 * hurts performance). It must not be called from outside of the stream
1059 * handler, as what it does will be used to compute the stream task's
1060 * expiration.
1061 */
1062void cs_update_tx(struct conn_stream *cs)
1063{
1064 struct channel *oc = cs_oc(cs);
1065 struct channel *ic = cs_ic(cs);
1066
1067 if (oc->flags & CF_SHUTW)
1068 return;
1069
1070 /* Write not closed, update FD status and timeout for writes */
1071 if (channel_is_empty(oc)) {
1072 /* stop writing */
Willy Tarreaub605c422022-05-17 17:04:55 +02001073 if (!sc_ep_test(cs, SE_FL_WAIT_DATA)) {
Christopher Faulet13045f02022-04-01 14:23:38 +02001074 if ((oc->flags & CF_SHUTW_NOW) == 0)
Willy Tarreaub605c422022-05-17 17:04:55 +02001075 sc_ep_set(cs, SE_FL_WAIT_DATA);
Christopher Faulet13045f02022-04-01 14:23:38 +02001076 oc->wex = TICK_ETERNITY;
1077 }
1078 return;
1079 }
1080
1081 /* (re)start writing and update timeout. Note: we don't recompute the timeout
1082 * every time we get here, otherwise it would risk never to expire. We only
1083 * update it if is was not yet set. The stream socket handler will already
1084 * have updated it if there has been a completed I/O.
1085 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001086 sc_ep_clr(cs, SE_FL_WAIT_DATA);
Christopher Faulet13045f02022-04-01 14:23:38 +02001087 if (!tick_isset(oc->wex)) {
1088 oc->wex = tick_add_ifset(now_ms, oc->wto);
1089 if (tick_isset(ic->rex) && !(cs->flags & CS_FL_INDEP_STR)) {
1090 /* Note: depending on the protocol, we don't know if we're waiting
1091 * for incoming data or not. So in order to prevent the socket from
1092 * expiring read timeouts during writes, we refresh the read timeout,
1093 * except if it was already infinite or if we have explicitly setup
1094 * independent streams.
1095 */
1096 ic->rex = tick_add_ifset(now_ms, ic->rto);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001097 }
1098 }
1099}
1100
1101/* This function is the equivalent to cs_update() except that it's
1102 * designed to be called from outside the stream handlers, typically the lower
1103 * layers (applets, connections) after I/O completion. After updating the stream
1104 * interface and timeouts, it will try to forward what can be forwarded, then to
1105 * wake the associated task up if an important event requires special handling.
Willy Tarreaub605c422022-05-17 17:04:55 +02001106 * It may update SE_FL_WAIT_DATA and/or SE_FL_RXBLK_ROOM, that the callers are
Christopher Faulet5e29b762022-04-04 08:58:34 +02001107 * encouraged to watch to take appropriate action.
1108 * It should not be called from within the stream itself, cs_update()
1109 * is designed for this.
1110 */
1111static void cs_notify(struct conn_stream *cs)
1112{
1113 struct channel *ic = cs_ic(cs);
1114 struct channel *oc = cs_oc(cs);
1115 struct conn_stream *cso = cs_opposite(cs);
1116 struct task *task = cs_strm_task(cs);
1117
1118 /* process consumer side */
1119 if (channel_is_empty(oc)) {
1120 struct connection *conn = cs_conn(cs);
1121
1122 if (((oc->flags & (CF_SHUTW|CF_SHUTW_NOW)) == CF_SHUTW_NOW) &&
1123 (cs->state == CS_ST_EST) && (!conn || !(conn->flags & (CO_FL_WAIT_XPRT | CO_FL_EARLY_SSL_HS))))
1124 cs_shutw(cs);
1125 oc->wex = TICK_ETERNITY;
1126 }
1127
1128 /* indicate that we may be waiting for data from the output channel or
1129 * we're about to close and can't expect more data if SHUTW_NOW is there.
1130 */
1131 if (!(oc->flags & (CF_SHUTW|CF_SHUTW_NOW)))
Willy Tarreaub605c422022-05-17 17:04:55 +02001132 sc_ep_set(cs, SE_FL_WAIT_DATA);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001133 else if ((oc->flags & (CF_SHUTW|CF_SHUTW_NOW)) == CF_SHUTW_NOW)
Willy Tarreaub605c422022-05-17 17:04:55 +02001134 sc_ep_clr(cs, SE_FL_WAIT_DATA);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001135
1136 /* update OC timeouts and wake the other side up if it's waiting for room */
1137 if (oc->flags & CF_WRITE_ACTIVITY) {
1138 if ((oc->flags & (CF_SHUTW|CF_WRITE_PARTIAL)) == CF_WRITE_PARTIAL &&
1139 !channel_is_empty(oc))
1140 if (tick_isset(oc->wex))
1141 oc->wex = tick_add_ifset(now_ms, oc->wto);
1142
1143 if (!(cs->flags & CS_FL_INDEP_STR))
1144 if (tick_isset(ic->rex))
1145 ic->rex = tick_add_ifset(now_ms, ic->rto);
1146 }
1147
1148 if (oc->flags & CF_DONT_READ)
1149 cs_rx_chan_blk(cso);
1150 else
1151 cs_rx_chan_rdy(cso);
1152
1153 /* Notify the other side when we've injected data into the IC that
1154 * needs to be forwarded. We can do fast-forwarding as soon as there
1155 * are output data, but we avoid doing this if some of the data are
1156 * not yet scheduled for being forwarded, because it is very likely
1157 * that it will be done again immediately afterwards once the following
Willy Tarreaub605c422022-05-17 17:04:55 +02001158 * data are parsed (eg: HTTP chunking). We only SE_FL_RXBLK_ROOM once
Christopher Faulet5e29b762022-04-04 08:58:34 +02001159 * we've emptied *some* of the output buffer, and not just when there
1160 * is available room, because applets are often forced to stop before
1161 * the buffer is full. We must not stop based on input data alone because
1162 * an HTTP parser might need more data to complete the parsing.
1163 */
1164 if (!channel_is_empty(ic) &&
Willy Tarreaub605c422022-05-17 17:04:55 +02001165 sc_ep_test(cso, SE_FL_WAIT_DATA) &&
Christopher Faulet5e29b762022-04-04 08:58:34 +02001166 (!(ic->flags & CF_EXPECT_MORE) || c_full(ic) || ci_data(ic) == 0 || ic->pipe)) {
1167 int new_len, last_len;
1168
1169 last_len = co_data(ic);
1170 if (ic->pipe)
1171 last_len += ic->pipe->data;
1172
1173 cs_chk_snd(cso);
1174
1175 new_len = co_data(ic);
1176 if (ic->pipe)
1177 new_len += ic->pipe->data;
1178
1179 /* check if the consumer has freed some space either in the
1180 * buffer or in the pipe.
1181 */
1182 if (new_len < last_len)
1183 cs_rx_room_rdy(cs);
1184 }
1185
1186 if (!(ic->flags & CF_DONT_READ))
1187 cs_rx_chan_rdy(cs);
1188
1189 cs_chk_rcv(cs);
1190 cs_chk_rcv(cso);
1191
1192 if (cs_rx_blocked(cs)) {
1193 ic->rex = TICK_ETERNITY;
1194 }
1195 else if ((ic->flags & (CF_SHUTR|CF_READ_PARTIAL)) == CF_READ_PARTIAL) {
1196 /* we must re-enable reading if cs_chk_snd() has freed some space */
1197 if (!(ic->flags & CF_READ_NOEXP) && tick_isset(ic->rex))
1198 ic->rex = tick_add_ifset(now_ms, ic->rto);
1199 }
1200
1201 /* wake the task up only when needed */
1202 if (/* changes on the production side */
1203 (ic->flags & (CF_READ_NULL|CF_READ_ERROR)) ||
1204 !cs_state_in(cs->state, CS_SB_CON|CS_SB_RDY|CS_SB_EST) ||
Willy Tarreaub605c422022-05-17 17:04:55 +02001205 sc_ep_test(cs, SE_FL_ERROR) ||
Christopher Faulet5e29b762022-04-04 08:58:34 +02001206 ((ic->flags & CF_READ_PARTIAL) &&
1207 ((ic->flags & CF_EOI) || !ic->to_forward || cso->state != CS_ST_EST)) ||
1208
1209 /* changes on the consumption side */
1210 (oc->flags & (CF_WRITE_NULL|CF_WRITE_ERROR)) ||
1211 ((oc->flags & CF_WRITE_ACTIVITY) &&
1212 ((oc->flags & CF_SHUTW) ||
1213 (((oc->flags & CF_WAKE_WRITE) ||
1214 !(oc->flags & (CF_AUTO_CLOSE|CF_SHUTW_NOW|CF_SHUTW))) &&
1215 (cso->state != CS_ST_EST ||
1216 (channel_is_empty(oc) && !oc->to_forward)))))) {
1217 task_wakeup(task, TASK_WOKEN_IO);
1218 }
1219 else {
1220 /* Update expiration date for the task and requeue it */
1221 task->expire = tick_first((tick_is_expired(task->expire, now_ms) ? 0 : task->expire),
1222 tick_first(tick_first(ic->rex, ic->wex),
1223 tick_first(oc->rex, oc->wex)));
1224
1225 task->expire = tick_first(task->expire, ic->analyse_exp);
1226 task->expire = tick_first(task->expire, oc->analyse_exp);
1227 task->expire = tick_first(task->expire, __cs_strm(cs)->conn_exp);
1228
1229 task_queue(task);
1230 }
1231 if (ic->flags & CF_READ_ACTIVITY)
1232 ic->flags &= ~CF_READ_DONTWAIT;
1233}
1234
1235/*
1236 * This function propagates a null read received on a socket-based connection.
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001237 * It updates the conn-stream. If the conn-stream has CS_FL_NOHALF,
Christopher Faulet5e29b762022-04-04 08:58:34 +02001238 * the close is also forwarded to the write side as an abort.
1239 */
1240static void cs_conn_read0(struct conn_stream *cs)
1241{
1242 struct channel *ic = cs_ic(cs);
1243 struct channel *oc = cs_oc(cs);
1244
1245 BUG_ON(!cs_conn(cs));
1246
1247 cs_rx_shut_blk(cs);
1248 if (ic->flags & CF_SHUTR)
1249 return;
1250 ic->flags |= CF_SHUTR;
1251 ic->rex = TICK_ETERNITY;
1252
1253 if (!cs_state_in(cs->state, CS_SB_CON|CS_SB_RDY|CS_SB_EST))
1254 return;
1255
1256 if (oc->flags & CF_SHUTW)
1257 goto do_close;
1258
1259 if (cs->flags & CS_FL_NOHALF) {
1260 /* we want to immediately forward this close to the write side */
1261 /* force flag on ssl to keep stream in cache */
1262 cs_conn_shutw(cs, CO_SHW_SILENT);
1263 goto do_close;
1264 }
1265
1266 /* otherwise that's just a normal read shutdown */
1267 return;
1268
1269 do_close:
1270 /* OK we completely close the socket here just as if we went through cs_shut[rw]() */
Christopher Fauletff022a22022-04-21 08:38:54 +02001271 cs_conn_shut(cs);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001272
1273 oc->flags &= ~CF_SHUTW_NOW;
1274 oc->flags |= CF_SHUTW;
1275 oc->wex = TICK_ETERNITY;
1276
1277 cs_done_get(cs);
1278
1279 cs->state = CS_ST_DIS;
1280 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
1281 return;
1282}
1283
1284/*
1285 * This is the callback which is called by the connection layer to receive data
1286 * into the buffer from the connection. It iterates over the mux layer's
1287 * rcv_buf function.
1288 */
1289static int cs_conn_recv(struct conn_stream *cs)
1290{
1291 struct connection *conn = __cs_conn(cs);
1292 struct channel *ic = cs_ic(cs);
1293 int ret, max, cur_read = 0;
1294 int read_poll = MAX_READ_POLL_LOOPS;
1295 int flags = 0;
1296
1297 /* If not established yet, do nothing. */
1298 if (cs->state != CS_ST_EST)
1299 return 0;
1300
1301 /* If another call to cs_conn_recv() failed, and we subscribed to
1302 * recv events already, give up now.
1303 */
1304 if (cs->wait_event.events & SUB_RETRY_RECV)
1305 return 0;
1306
1307 /* maybe we were called immediately after an asynchronous shutr */
1308 if (ic->flags & CF_SHUTR)
1309 return 1;
1310
1311 /* we must wait because the mux is not installed yet */
1312 if (!conn->mux)
1313 return 0;
1314
1315 /* stop here if we reached the end of data */
Willy Tarreaub605c422022-05-17 17:04:55 +02001316 if (sc_ep_test(cs, SE_FL_EOS))
Christopher Faulet5e29b762022-04-04 08:58:34 +02001317 goto end_recv;
1318
1319 /* stop immediately on errors. Note that we DON'T want to stop on
1320 * POLL_ERR, as the poller might report a write error while there
1321 * are still data available in the recv buffer. This typically
1322 * happens when we send too large a request to a backend server
1323 * which rejects it before reading it all.
1324 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001325 if (!sc_ep_test(cs, SE_FL_RCV_MORE)) {
Christopher Faulet5e29b762022-04-04 08:58:34 +02001326 if (!conn_xprt_ready(conn))
1327 return 0;
Willy Tarreaub605c422022-05-17 17:04:55 +02001328 if (sc_ep_test(cs, SE_FL_ERROR))
Christopher Faulet5e29b762022-04-04 08:58:34 +02001329 goto end_recv;
1330 }
1331
1332 /* prepare to detect if the mux needs more room */
Willy Tarreaub605c422022-05-17 17:04:55 +02001333 sc_ep_clr(cs, SE_FL_WANT_ROOM);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001334
1335 if ((ic->flags & (CF_STREAMER | CF_STREAMER_FAST)) && !co_data(ic) &&
1336 global.tune.idle_timer &&
1337 (unsigned short)(now_ms - ic->last_read) >= global.tune.idle_timer) {
1338 /* The buffer was empty and nothing was transferred for more
1339 * than one second. This was caused by a pause and not by
1340 * congestion. Reset any streaming mode to reduce latency.
1341 */
1342 ic->xfer_small = 0;
1343 ic->xfer_large = 0;
1344 ic->flags &= ~(CF_STREAMER | CF_STREAMER_FAST);
1345 }
1346
1347 /* First, let's see if we may splice data across the channel without
1348 * using a buffer.
1349 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001350 if (sc_ep_test(cs, SE_FL_MAY_SPLICE) &&
Christopher Faulet5e29b762022-04-04 08:58:34 +02001351 (ic->pipe || ic->to_forward >= MIN_SPLICE_FORWARD) &&
1352 ic->flags & CF_KERN_SPLICING) {
1353 if (c_data(ic)) {
1354 /* We're embarrassed, there are already data pending in
1355 * the buffer and we don't want to have them at two
1356 * locations at a time. Let's indicate we need some
1357 * place and ask the consumer to hurry.
1358 */
1359 flags |= CO_RFL_BUF_FLUSH;
1360 goto abort_splice;
1361 }
1362
1363 if (unlikely(ic->pipe == NULL)) {
1364 if (pipes_used >= global.maxpipes || !(ic->pipe = get_pipe())) {
1365 ic->flags &= ~CF_KERN_SPLICING;
1366 goto abort_splice;
1367 }
1368 }
1369
1370 ret = conn->mux->rcv_pipe(cs, ic->pipe, ic->to_forward);
1371 if (ret < 0) {
1372 /* splice not supported on this end, let's disable it */
1373 ic->flags &= ~CF_KERN_SPLICING;
1374 goto abort_splice;
1375 }
1376
1377 if (ret > 0) {
1378 if (ic->to_forward != CHN_INFINITE_FORWARD)
1379 ic->to_forward -= ret;
1380 ic->total += ret;
1381 cur_read += ret;
1382 ic->flags |= CF_READ_PARTIAL;
1383 }
1384
Willy Tarreaub605c422022-05-17 17:04:55 +02001385 if (sc_ep_test(cs, SE_FL_EOS | SE_FL_ERROR))
Christopher Faulet5e29b762022-04-04 08:58:34 +02001386 goto end_recv;
1387
1388 if (conn->flags & CO_FL_WAIT_ROOM) {
1389 /* the pipe is full or we have read enough data that it
1390 * could soon be full. Let's stop before needing to poll.
1391 */
1392 cs_rx_room_blk(cs);
1393 goto done_recv;
1394 }
1395
1396 /* splice not possible (anymore), let's go on on standard copy */
1397 }
1398
1399 abort_splice:
1400 if (ic->pipe && unlikely(!ic->pipe->data)) {
1401 put_pipe(ic->pipe);
1402 ic->pipe = NULL;
1403 }
1404
Willy Tarreaub605c422022-05-17 17:04:55 +02001405 if (ic->pipe && ic->to_forward && !(flags & CO_RFL_BUF_FLUSH) && sc_ep_test(cs, SE_FL_MAY_SPLICE)) {
Christopher Faulet5e29b762022-04-04 08:58:34 +02001406 /* don't break splicing by reading, but still call rcv_buf()
1407 * to pass the flag.
1408 */
1409 goto done_recv;
1410 }
1411
1412 /* now we'll need a input buffer for the stream */
1413 if (!cs_alloc_ibuf(cs, &(__cs_strm(cs)->buffer_wait)))
1414 goto end_recv;
1415
1416 /* For an HTX stream, if the buffer is stuck (no output data with some
1417 * input data) and if the HTX message is fragmented or if its free space
1418 * wraps, we force an HTX deframentation. It is a way to have a
1419 * contiguous free space nad to let the mux to copy as much data as
1420 * possible.
1421 *
1422 * NOTE: A possible optim may be to let the mux decides if defrag is
1423 * required or not, depending on amount of data to be xferred.
1424 */
1425 if (IS_HTX_STRM(__cs_strm(cs)) && !co_data(ic)) {
1426 struct htx *htx = htxbuf(&ic->buf);
1427
1428 if (htx_is_not_empty(htx) && ((htx->flags & HTX_FL_FRAGMENTED) || htx_space_wraps(htx)))
1429 htx_defrag(htx, NULL, 0);
1430 }
1431
1432 /* Instruct the mux it must subscribed for read events */
1433 flags |= ((!conn_is_back(conn) && (__cs_strm(cs)->be->options & PR_O_ABRT_CLOSE)) ? CO_RFL_KEEP_RECV : 0);
1434
1435 /* Important note : if we're called with POLL_IN|POLL_HUP, it means the read polling
1436 * was enabled, which implies that the recv buffer was not full. So we have a guarantee
1437 * that if such an event is not handled above in splice, it will be handled here by
1438 * recv().
1439 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001440 while (sc_ep_test(cs, SE_FL_RCV_MORE) ||
Christopher Faulet5e29b762022-04-04 08:58:34 +02001441 (!(conn->flags & CO_FL_HANDSHAKE) &&
Willy Tarreaub605c422022-05-17 17:04:55 +02001442 (!sc_ep_test(cs, SE_FL_ERROR | SE_FL_EOS)) && !(ic->flags & CF_SHUTR))) {
Christopher Faulet5e29b762022-04-04 08:58:34 +02001443 int cur_flags = flags;
1444
1445 /* Compute transient CO_RFL_* flags */
1446 if (co_data(ic)) {
1447 cur_flags |= (CO_RFL_BUF_WET | CO_RFL_BUF_NOT_STUCK);
1448 }
1449
1450 /* <max> may be null. This is the mux responsibility to set
Willy Tarreaub605c422022-05-17 17:04:55 +02001451 * SE_FL_RCV_MORE on the CS if more space is needed.
Christopher Faulet5e29b762022-04-04 08:58:34 +02001452 */
1453 max = channel_recv_max(ic);
1454 ret = conn->mux->rcv_buf(cs, &ic->buf, max, cur_flags);
1455
Willy Tarreaub605c422022-05-17 17:04:55 +02001456 if (sc_ep_test(cs, SE_FL_WANT_ROOM)) {
1457 /* SE_FL_WANT_ROOM must not be reported if the channel's
Christopher Faulet5e29b762022-04-04 08:58:34 +02001458 * buffer is empty.
1459 */
1460 BUG_ON(c_empty(ic));
1461
1462 cs_rx_room_blk(cs);
1463 /* Add READ_PARTIAL because some data are pending but
1464 * cannot be xferred to the channel
1465 */
1466 ic->flags |= CF_READ_PARTIAL;
1467 }
1468
1469 if (ret <= 0) {
1470 /* if we refrained from reading because we asked for a
1471 * flush to satisfy rcv_pipe(), we must not subscribe
1472 * and instead report that there's not enough room
1473 * here to proceed.
1474 */
1475 if (flags & CO_RFL_BUF_FLUSH)
1476 cs_rx_room_blk(cs);
1477 break;
1478 }
1479
1480 cur_read += ret;
1481
1482 /* if we're allowed to directly forward data, we must update ->o */
1483 if (ic->to_forward && !(ic->flags & (CF_SHUTW|CF_SHUTW_NOW))) {
1484 unsigned long fwd = ret;
1485 if (ic->to_forward != CHN_INFINITE_FORWARD) {
1486 if (fwd > ic->to_forward)
1487 fwd = ic->to_forward;
1488 ic->to_forward -= fwd;
1489 }
1490 c_adv(ic, fwd);
1491 }
1492
1493 ic->flags |= CF_READ_PARTIAL;
1494 ic->total += ret;
1495
1496 /* End-of-input reached, we can leave. In this case, it is
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001497 * important to break the loop to not block the CS because of
Christopher Faulet5e29b762022-04-04 08:58:34 +02001498 * the channel's policies.This way, we are still able to receive
1499 * shutdowns.
1500 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001501 if (sc_ep_test(cs, SE_FL_EOI))
Christopher Faulet5e29b762022-04-04 08:58:34 +02001502 break;
1503
1504 if ((ic->flags & CF_READ_DONTWAIT) || --read_poll <= 0) {
1505 /* we're stopped by the channel's policy */
1506 cs_rx_chan_blk(cs);
1507 break;
1508 }
1509
1510 /* if too many bytes were missing from last read, it means that
1511 * it's pointless trying to read again because the system does
1512 * not have them in buffers.
1513 */
1514 if (ret < max) {
1515 /* if a streamer has read few data, it may be because we
1516 * have exhausted system buffers. It's not worth trying
1517 * again.
1518 */
1519 if (ic->flags & CF_STREAMER) {
1520 /* we're stopped by the channel's policy */
1521 cs_rx_chan_blk(cs);
1522 break;
1523 }
1524
1525 /* if we read a large block smaller than what we requested,
1526 * it's almost certain we'll never get anything more.
1527 */
1528 if (ret >= global.tune.recv_enough) {
1529 /* we're stopped by the channel's policy */
1530 cs_rx_chan_blk(cs);
1531 break;
1532 }
1533 }
1534
1535 /* if we are waiting for more space, don't try to read more data
1536 * right now.
1537 */
1538 if (cs_rx_blocked(cs))
1539 break;
1540 } /* while !flags */
1541
1542 done_recv:
1543 if (cur_read) {
1544 if ((ic->flags & (CF_STREAMER | CF_STREAMER_FAST)) &&
1545 (cur_read <= ic->buf.size / 2)) {
1546 ic->xfer_large = 0;
1547 ic->xfer_small++;
1548 if (ic->xfer_small >= 3) {
1549 /* we have read less than half of the buffer in
1550 * one pass, and this happened at least 3 times.
1551 * This is definitely not a streamer.
1552 */
1553 ic->flags &= ~(CF_STREAMER | CF_STREAMER_FAST);
1554 }
1555 else if (ic->xfer_small >= 2) {
1556 /* if the buffer has been at least half full twice,
1557 * we receive faster than we send, so at least it
1558 * is not a "fast streamer".
1559 */
1560 ic->flags &= ~CF_STREAMER_FAST;
1561 }
1562 }
1563 else if (!(ic->flags & CF_STREAMER_FAST) &&
1564 (cur_read >= ic->buf.size - global.tune.maxrewrite)) {
1565 /* we read a full buffer at once */
1566 ic->xfer_small = 0;
1567 ic->xfer_large++;
1568 if (ic->xfer_large >= 3) {
1569 /* we call this buffer a fast streamer if it manages
1570 * to be filled in one call 3 consecutive times.
1571 */
1572 ic->flags |= (CF_STREAMER | CF_STREAMER_FAST);
1573 }
1574 }
1575 else {
1576 ic->xfer_small = 0;
1577 ic->xfer_large = 0;
1578 }
1579 ic->last_read = now_ms;
1580 }
1581
1582 end_recv:
1583 ret = (cur_read != 0);
1584
1585 /* Report EOI on the channel if it was reached from the mux point of
1586 * view. */
Willy Tarreaub605c422022-05-17 17:04:55 +02001587 if (sc_ep_test(cs, SE_FL_EOI) && !(ic->flags & CF_EOI)) {
Christopher Faulet5e29b762022-04-04 08:58:34 +02001588 ic->flags |= (CF_EOI|CF_READ_PARTIAL);
1589 ret = 1;
1590 }
1591
Willy Tarreaub605c422022-05-17 17:04:55 +02001592 if (sc_ep_test(cs, SE_FL_ERROR))
Christopher Faulet5e29b762022-04-04 08:58:34 +02001593 ret = 1;
Willy Tarreaub605c422022-05-17 17:04:55 +02001594 else if (sc_ep_test(cs, SE_FL_EOS)) {
Christopher Faulet5e29b762022-04-04 08:58:34 +02001595 /* we received a shutdown */
1596 ic->flags |= CF_READ_NULL;
1597 if (ic->flags & CF_AUTO_CLOSE)
1598 channel_shutw_now(ic);
1599 cs_conn_read0(cs);
1600 ret = 1;
1601 }
1602 else if (!cs_rx_blocked(cs)) {
1603 /* Subscribe to receive events if we're blocking on I/O */
1604 conn->mux->subscribe(cs, SUB_RETRY_RECV, &cs->wait_event);
1605 cs_rx_endp_done(cs);
1606 } else {
1607 cs_rx_endp_more(cs);
1608 ret = 1;
1609 }
1610 return ret;
1611}
1612
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001613/* This tries to perform a synchronous receive on the conn-stream to
Christopher Faulet5e29b762022-04-04 08:58:34 +02001614 * try to collect last arrived data. In practice it's only implemented on
1615 * conn_streams. Returns 0 if nothing was done, non-zero if new data or a
1616 * shutdown were collected. This may result on some delayed receive calls
1617 * to be programmed and performed later, though it doesn't provide any
1618 * such guarantee.
1619 */
1620int cs_conn_sync_recv(struct conn_stream *cs)
1621{
1622 if (!cs_state_in(cs->state, CS_SB_RDY|CS_SB_EST))
1623 return 0;
1624
1625 if (!cs_conn_mux(cs))
1626 return 0; // only conn_streams are supported
1627
1628 if (cs->wait_event.events & SUB_RETRY_RECV)
1629 return 0; // already subscribed
1630
1631 if (!cs_rx_endp_ready(cs) || cs_rx_blocked(cs))
1632 return 0; // already failed
1633
1634 return cs_conn_recv(cs);
1635}
1636
1637/*
1638 * This function is called to send buffer data to a stream socket.
1639 * It calls the mux layer's snd_buf function. It relies on the
1640 * caller to commit polling changes. The caller should check conn->flags
1641 * for errors.
1642 */
1643static int cs_conn_send(struct conn_stream *cs)
1644{
1645 struct connection *conn = __cs_conn(cs);
1646 struct stream *s = __cs_strm(cs);
1647 struct channel *oc = cs_oc(cs);
1648 int ret;
1649 int did_send = 0;
1650
Willy Tarreaub605c422022-05-17 17:04:55 +02001651 if (sc_ep_test(cs, SE_FL_ERROR | SE_FL_ERR_PENDING) || cs_is_conn_error(cs)) {
Christopher Faulet5e29b762022-04-04 08:58:34 +02001652 /* We're probably there because the tasklet was woken up,
1653 * but process_stream() ran before, detected there were an
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001654 * error and put the CS back to CS_ST_TAR. There's still
Christopher Faulet5e29b762022-04-04 08:58:34 +02001655 * CO_FL_ERROR on the connection but we don't want to add
Willy Tarreaub605c422022-05-17 17:04:55 +02001656 * SE_FL_ERROR back, so give up
Christopher Faulet5e29b762022-04-04 08:58:34 +02001657 */
1658 if (cs->state < CS_ST_CON)
1659 return 0;
Willy Tarreaub605c422022-05-17 17:04:55 +02001660 sc_ep_set(cs, SE_FL_ERROR);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001661 return 1;
1662 }
1663
1664 /* We're already waiting to be able to send, give up */
1665 if (cs->wait_event.events & SUB_RETRY_SEND)
1666 return 0;
1667
1668 /* we might have been called just after an asynchronous shutw */
1669 if (oc->flags & CF_SHUTW)
1670 return 1;
1671
1672 /* we must wait because the mux is not installed yet */
1673 if (!conn->mux)
1674 return 0;
1675
1676 if (oc->pipe && conn->xprt->snd_pipe && conn->mux->snd_pipe) {
1677 ret = conn->mux->snd_pipe(cs, oc->pipe);
1678 if (ret > 0)
1679 did_send = 1;
1680
1681 if (!oc->pipe->data) {
1682 put_pipe(oc->pipe);
1683 oc->pipe = NULL;
1684 }
1685
1686 if (oc->pipe)
1687 goto end;
1688 }
1689
1690 /* At this point, the pipe is empty, but we may still have data pending
1691 * in the normal buffer.
1692 */
1693 if (co_data(oc)) {
1694 /* when we're here, we already know that there is no spliced
1695 * data left, and that there are sendable buffered data.
1696 */
1697
1698 /* check if we want to inform the kernel that we're interested in
1699 * sending more data after this call. We want this if :
1700 * - we're about to close after this last send and want to merge
1701 * the ongoing FIN with the last segment.
1702 * - we know we can't send everything at once and must get back
1703 * here because of unaligned data
1704 * - there is still a finite amount of data to forward
1705 * The test is arranged so that the most common case does only 2
1706 * tests.
1707 */
1708 unsigned int send_flag = 0;
1709
1710 if ((!(oc->flags & (CF_NEVER_WAIT|CF_SEND_DONTWAIT)) &&
1711 ((oc->to_forward && oc->to_forward != CHN_INFINITE_FORWARD) ||
1712 (oc->flags & CF_EXPECT_MORE) ||
1713 (IS_HTX_STRM(s) &&
1714 (!(oc->flags & (CF_EOI|CF_SHUTR)) && htx_expect_more(htxbuf(&oc->buf)))))) ||
1715 ((oc->flags & CF_ISRESP) &&
1716 ((oc->flags & (CF_AUTO_CLOSE|CF_SHUTW_NOW)) == (CF_AUTO_CLOSE|CF_SHUTW_NOW))))
1717 send_flag |= CO_SFL_MSG_MORE;
1718
1719 if (oc->flags & CF_STREAMER)
1720 send_flag |= CO_SFL_STREAMER;
1721
1722 if (s->txn && s->txn->flags & TX_L7_RETRY && !b_data(&s->txn->l7_buffer)) {
1723 /* If we want to be able to do L7 retries, copy
1724 * the data we're about to send, so that we are able
1725 * to resend them if needed
1726 */
1727 /* Try to allocate a buffer if we had none.
1728 * If it fails, the next test will just
1729 * disable the l7 retries by setting
1730 * l7_conn_retries to 0.
1731 */
1732 if (s->txn->req.msg_state != HTTP_MSG_DONE)
1733 s->txn->flags &= ~TX_L7_RETRY;
1734 else {
1735 if (b_alloc(&s->txn->l7_buffer) == NULL)
1736 s->txn->flags &= ~TX_L7_RETRY;
1737 else {
1738 memcpy(b_orig(&s->txn->l7_buffer),
1739 b_orig(&oc->buf),
1740 b_size(&oc->buf));
1741 s->txn->l7_buffer.head = co_data(oc);
1742 b_add(&s->txn->l7_buffer, co_data(oc));
1743 }
1744
1745 }
1746 }
1747
1748 ret = conn->mux->snd_buf(cs, &oc->buf, co_data(oc), send_flag);
1749 if (ret > 0) {
1750 did_send = 1;
1751 c_rew(oc, ret);
1752 c_realign_if_empty(oc);
1753
1754 if (!co_data(oc)) {
1755 /* Always clear both flags once everything has been sent, they're one-shot */
1756 oc->flags &= ~(CF_EXPECT_MORE | CF_SEND_DONTWAIT);
1757 }
1758 /* if some data remain in the buffer, it's only because the
1759 * system buffers are full, we will try next time.
1760 */
Christopher Faulet13045f02022-04-01 14:23:38 +02001761 }
1762 }
Christopher Faulet5e29b762022-04-04 08:58:34 +02001763
1764 end:
1765 if (did_send) {
1766 oc->flags |= CF_WRITE_PARTIAL | CF_WROTE_DATA;
1767 if (cs->state == CS_ST_CON)
1768 cs->state = CS_ST_RDY;
1769
1770 cs_rx_room_rdy(cs_opposite(cs));
1771 }
1772
Willy Tarreaub605c422022-05-17 17:04:55 +02001773 if (sc_ep_test(cs, SE_FL_ERROR | SE_FL_ERR_PENDING)) {
1774 sc_ep_set(cs, SE_FL_ERROR);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001775 return 1;
1776 }
1777
1778 /* We couldn't send all of our data, let the mux know we'd like to send more */
1779 if (!channel_is_empty(oc))
1780 conn->mux->subscribe(cs, SUB_RETRY_SEND, &cs->wait_event);
1781 return did_send;
1782}
1783
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001784/* perform a synchronous send() for the conn-stream. The CF_WRITE_NULL and
Christopher Faulet5e29b762022-04-04 08:58:34 +02001785 * CF_WRITE_PARTIAL flags are cleared prior to the attempt, and will possibly
1786 * be updated in case of success.
1787 */
1788void cs_conn_sync_send(struct conn_stream *cs)
1789{
1790 struct channel *oc = cs_oc(cs);
1791
1792 oc->flags &= ~(CF_WRITE_NULL|CF_WRITE_PARTIAL);
1793
1794 if (oc->flags & CF_SHUTW)
1795 return;
1796
1797 if (channel_is_empty(oc))
1798 return;
1799
1800 if (!cs_state_in(cs->state, CS_SB_CON|CS_SB_RDY|CS_SB_EST))
1801 return;
1802
1803 if (!cs_conn_mux(cs))
1804 return;
1805
1806 cs_conn_send(cs);
1807}
1808
1809/* Called by I/O handlers after completion.. It propagates
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001810 * connection flags to the conn-stream, updates the stream (which may or
Christopher Faulet5e29b762022-04-04 08:58:34 +02001811 * may not take this opportunity to try to forward data), then update the
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001812 * connection's polling based on the channels and conn-stream's final
Christopher Faulet5e29b762022-04-04 08:58:34 +02001813 * states. The function always returns 0.
1814 */
1815static int cs_conn_process(struct conn_stream *cs)
1816{
1817 struct connection *conn = __cs_conn(cs);
1818 struct channel *ic = cs_ic(cs);
1819 struct channel *oc = cs_oc(cs);
1820
1821 BUG_ON(!conn);
1822
1823 /* If we have data to send, try it now */
1824 if (!channel_is_empty(oc) && !(cs->wait_event.events & SUB_RETRY_SEND))
1825 cs_conn_send(cs);
1826
1827 /* First step, report to the conn-stream what was detected at the
1828 * connection layer : errors and connection establishment.
Willy Tarreaub605c422022-05-17 17:04:55 +02001829 * Only add SE_FL_ERROR if we're connected, or we're attempting to
Christopher Faulet5e29b762022-04-04 08:58:34 +02001830 * connect, we may get there because we got woken up, but only run
1831 * after process_stream() noticed there were an error, and decided
1832 * to retry to connect, the connection may still have CO_FL_ERROR,
Willy Tarreaub605c422022-05-17 17:04:55 +02001833 * and we don't want to add SE_FL_ERROR back
Christopher Faulet5e29b762022-04-04 08:58:34 +02001834 *
1835 * Note: This test is only required because cs_conn_process is also the SI
1836 * wake callback. Otherwise cs_conn_recv()/cs_conn_send() already take
1837 * care of it.
1838 */
1839
1840 if (cs->state >= CS_ST_CON) {
1841 if (cs_is_conn_error(cs))
Willy Tarreaub605c422022-05-17 17:04:55 +02001842 sc_ep_set(cs, SE_FL_ERROR);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001843 }
1844
1845 /* If we had early data, and the handshake ended, then
1846 * we can remove the flag, and attempt to wake the task up,
1847 * in the event there's an analyser waiting for the end of
1848 * the handshake.
1849 */
1850 if (!(conn->flags & (CO_FL_WAIT_XPRT | CO_FL_EARLY_SSL_HS)) &&
Willy Tarreaub605c422022-05-17 17:04:55 +02001851 sc_ep_test(cs, SE_FL_WAIT_FOR_HS)) {
1852 sc_ep_clr(cs, SE_FL_WAIT_FOR_HS);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001853 task_wakeup(cs_strm_task(cs), TASK_WOKEN_MSG);
1854 }
1855
1856 if (!cs_state_in(cs->state, CS_SB_EST|CS_SB_DIS|CS_SB_CLO) &&
1857 (conn->flags & CO_FL_WAIT_XPRT) == 0) {
1858 __cs_strm(cs)->conn_exp = TICK_ETERNITY;
1859 oc->flags |= CF_WRITE_NULL;
1860 if (cs->state == CS_ST_CON)
1861 cs->state = CS_ST_RDY;
1862 }
1863
1864 /* Report EOS on the channel if it was reached from the mux point of
1865 * view.
1866 *
1867 * Note: This test is only required because cs_conn_process is also the SI
1868 * wake callback. Otherwise cs_conn_recv()/cs_conn_send() already take
1869 * care of it.
1870 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001871 if (sc_ep_test(cs, SE_FL_EOS) && !(ic->flags & CF_SHUTR)) {
Christopher Faulet5e29b762022-04-04 08:58:34 +02001872 /* we received a shutdown */
1873 ic->flags |= CF_READ_NULL;
1874 if (ic->flags & CF_AUTO_CLOSE)
1875 channel_shutw_now(ic);
1876 cs_conn_read0(cs);
1877 }
1878
1879 /* Report EOI on the channel if it was reached from the mux point of
1880 * view.
1881 *
1882 * Note: This test is only required because cs_conn_process is also the SI
1883 * wake callback. Otherwise cs_conn_recv()/cs_conn_send() already take
1884 * care of it.
1885 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001886 if (sc_ep_test(cs, SE_FL_EOI) && !(ic->flags & CF_EOI))
Christopher Faulet5e29b762022-04-04 08:58:34 +02001887 ic->flags |= (CF_EOI|CF_READ_PARTIAL);
1888
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001889 /* Second step : update the conn-stream and channels, try to forward any
Christopher Faulet5e29b762022-04-04 08:58:34 +02001890 * pending data, then possibly wake the stream up based on the new
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001891 * conn-stream status.
Christopher Faulet5e29b762022-04-04 08:58:34 +02001892 */
1893 cs_notify(cs);
1894 stream_release_buffers(__cs_strm(cs));
1895 return 0;
1896}
1897
1898/* This is the ->process() function for any conn-stream's wait_event task.
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001899 * It's assigned during the conn-stream's initialization, for any type of
1900 * conn-stream. Thus it is always safe to perform a tasklet_wakeup() on a
1901 * conn-stream, as the presence of the CS is checked there.
Christopher Faulet5e29b762022-04-04 08:58:34 +02001902 */
1903struct task *cs_conn_io_cb(struct task *t, void *ctx, unsigned int state)
1904{
1905 struct conn_stream *cs = ctx;
1906 int ret = 0;
1907
1908 if (!cs_conn(cs))
1909 return t;
1910
1911 if (!(cs->wait_event.events & SUB_RETRY_SEND) && !channel_is_empty(cs_oc(cs)))
1912 ret = cs_conn_send(cs);
1913 if (!(cs->wait_event.events & SUB_RETRY_RECV))
1914 ret |= cs_conn_recv(cs);
1915 if (ret != 0)
1916 cs_conn_process(cs);
1917
1918 stream_release_buffers(__cs_strm(cs));
1919 return t;
1920}
1921
1922/* Callback to be used by applet handlers upon completion. It updates the stream
1923 * (which may or may not take this opportunity to try to forward data), then
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001924 * may re-enable the applet's based on the channels and conn-stream's final
Christopher Faulet5e29b762022-04-04 08:58:34 +02001925 * states.
1926 */
1927static int cs_applet_process(struct conn_stream *cs)
1928{
1929 struct channel *ic = cs_ic(cs);
1930
1931 BUG_ON(!cs_appctx(cs));
1932
1933 /* If the applet wants to write and the channel is closed, it's a
1934 * broken pipe and it must be reported.
1935 */
Willy Tarreaub605c422022-05-17 17:04:55 +02001936 if (!sc_ep_test(cs, SE_FL_RX_WAIT_EP) && (ic->flags & CF_SHUTR))
1937 sc_ep_set(cs, SE_FL_ERROR);
Christopher Faulet5e29b762022-04-04 08:58:34 +02001938
1939 /* automatically mark the applet having data available if it reported
1940 * begin blocked by the channel.
1941 */
1942 if (cs_rx_blocked(cs))
1943 cs_rx_endp_more(cs);
1944
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +02001945 /* update the conn-stream, channels, and possibly wake the stream up */
Christopher Faulet5e29b762022-04-04 08:58:34 +02001946 cs_notify(cs);
1947 stream_release_buffers(__cs_strm(cs));
1948
1949 /* cs_notify may have passed through chk_snd and released some
1950 * RXBLK flags. Process_stream will consider those flags to wake up the
1951 * appctx but in the case the task is not in runqueue we may have to
1952 * wakeup the appctx immediately.
1953 */
1954 if ((cs_rx_endp_ready(cs) && !cs_rx_blocked(cs)) ||
1955 (cs_tx_endp_ready(cs) && !cs_tx_blocked(cs)))
1956 appctx_wakeup(__cs_appctx(cs));
1957 return 0;
Christopher Faulet13045f02022-04-01 14:23:38 +02001958}