Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 1 | /* |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 2 | * stream connector management functions |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 3 | * |
| 4 | * Copyright 2021 Christopher Faulet <cfaulet@haproxy.com> |
| 5 | * |
| 6 | * This program is free software; you can redistribute it and/or |
| 7 | * modify it under the terms of the GNU General Public License |
| 8 | * as published by the Free Software Foundation; either version |
| 9 | * 2 of the License, or (at your option) any later version. |
| 10 | * |
| 11 | */ |
| 12 | |
| 13 | #include <haproxy/api.h> |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 14 | #include <haproxy/applet.h> |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 15 | #include <haproxy/connection.h> |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 16 | #include <haproxy/check.h> |
| 17 | #include <haproxy/http_ana.h> |
| 18 | #include <haproxy/pipe.h> |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 19 | #include <haproxy/pool.h> |
Willy Tarreau | 5edca2f | 2022-05-27 09:25:10 +0200 | [diff] [blame] | 20 | #include <haproxy/sc_strm.h> |
Willy Tarreau | cb086c6 | 2022-05-27 09:47:12 +0200 | [diff] [blame] | 21 | #include <haproxy/stconn.h> |
Christopher Faulet | 7542fb4 | 2023-05-11 14:40:27 +0200 | [diff] [blame] | 22 | #include <haproxy/xref.h> |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 23 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 24 | DECLARE_POOL(pool_head_connstream, "stconn", sizeof(struct stconn)); |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 25 | DECLARE_POOL(pool_head_sedesc, "sedesc", sizeof(struct sedesc)); |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 26 | |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 27 | /* functions used by default on a detached stream connector */ |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 28 | static void sc_app_abort(struct stconn *sc); |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 29 | static void sc_app_shut(struct stconn *sc); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 30 | static void sc_app_chk_rcv(struct stconn *sc); |
| 31 | static void sc_app_chk_snd(struct stconn *sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 32 | |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 33 | /* functions used on a mux-based stream connector */ |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 34 | static void sc_app_abort_conn(struct stconn *sc); |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 35 | static void sc_app_shut_conn(struct stconn *sc); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 36 | static void sc_app_chk_rcv_conn(struct stconn *sc); |
| 37 | static void sc_app_chk_snd_conn(struct stconn *sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 38 | |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 39 | /* functions used on an applet-based stream connector */ |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 40 | static void sc_app_abort_applet(struct stconn *sc); |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 41 | static void sc_app_shut_applet(struct stconn *sc); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 42 | static void sc_app_chk_rcv_applet(struct stconn *sc); |
| 43 | static void sc_app_chk_snd_applet(struct stconn *sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 44 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 45 | static int sc_conn_process(struct stconn *sc); |
| 46 | static int sc_conn_recv(struct stconn *sc); |
| 47 | static int sc_conn_send(struct stconn *sc); |
| 48 | static int sc_applet_process(struct stconn *sc); |
Willy Tarreau | 2f2318d | 2022-05-18 10:17:16 +0200 | [diff] [blame] | 49 | |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 50 | /* stream connector operations for connections */ |
| 51 | struct sc_app_ops sc_app_conn_ops = { |
| 52 | .chk_rcv = sc_app_chk_rcv_conn, |
| 53 | .chk_snd = sc_app_chk_snd_conn, |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 54 | .abort = sc_app_abort_conn, |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 55 | .shutdown= sc_app_shut_conn, |
Willy Tarreau | 462b989 | 2022-05-18 18:06:53 +0200 | [diff] [blame] | 56 | .wake = sc_conn_process, |
Willy Tarreau | 2f2318d | 2022-05-18 10:17:16 +0200 | [diff] [blame] | 57 | .name = "STRM", |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 58 | }; |
| 59 | |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 60 | /* stream connector operations for embedded tasks */ |
| 61 | struct sc_app_ops sc_app_embedded_ops = { |
| 62 | .chk_rcv = sc_app_chk_rcv, |
| 63 | .chk_snd = sc_app_chk_snd, |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 64 | .abort = sc_app_abort, |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 65 | .shutdown= sc_app_shut, |
Willy Tarreau | 2f2318d | 2022-05-18 10:17:16 +0200 | [diff] [blame] | 66 | .wake = NULL, /* may never be used */ |
| 67 | .name = "NONE", /* may never be used */ |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 68 | }; |
| 69 | |
Willy Tarreau | 2f2318d | 2022-05-18 10:17:16 +0200 | [diff] [blame] | 70 | /* stream connector operations for applets */ |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 71 | struct sc_app_ops sc_app_applet_ops = { |
| 72 | .chk_rcv = sc_app_chk_rcv_applet, |
| 73 | .chk_snd = sc_app_chk_snd_applet, |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 74 | .abort = sc_app_abort_applet, |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 75 | .shutdown= sc_app_shut_applet, |
Willy Tarreau | 19c65a9 | 2022-05-27 08:49:24 +0200 | [diff] [blame] | 76 | .wake = sc_applet_process, |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 77 | .name = "STRM", |
| 78 | }; |
| 79 | |
Willy Tarreau | 2f2318d | 2022-05-18 10:17:16 +0200 | [diff] [blame] | 80 | /* stream connector for health checks on connections */ |
| 81 | struct sc_app_ops sc_app_check_ops = { |
| 82 | .chk_rcv = NULL, |
| 83 | .chk_snd = NULL, |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 84 | .abort = NULL, |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 85 | .shutdown= NULL, |
Willy Tarreau | 2f2318d | 2022-05-18 10:17:16 +0200 | [diff] [blame] | 86 | .wake = wake_srv_chk, |
| 87 | .name = "CHCK", |
| 88 | }; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 89 | |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 90 | /* Initializes an endpoint */ |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 91 | void sedesc_init(struct sedesc *sedesc) |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 92 | { |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 93 | sedesc->se = NULL; |
| 94 | sedesc->conn = NULL; |
Willy Tarreau | c105492 | 2022-05-18 07:43:52 +0200 | [diff] [blame] | 95 | sedesc->sc = NULL; |
Christopher Faulet | 4c13568 | 2023-02-16 11:09:31 +0100 | [diff] [blame] | 96 | sedesc->lra = TICK_ETERNITY; |
| 97 | sedesc->fsb = TICK_ETERNITY; |
Christopher Faulet | 7542fb4 | 2023-05-11 14:40:27 +0200 | [diff] [blame] | 98 | sedesc->xref.peer = NULL; |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 99 | se_fl_setall(sedesc, SE_FL_NONE); |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 100 | } |
| 101 | |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 102 | /* Tries to alloc an endpoint and initialize it. Returns NULL on failure. */ |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 103 | struct sedesc *sedesc_new() |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 104 | { |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 105 | struct sedesc *sedesc; |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 106 | |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 107 | sedesc = pool_alloc(pool_head_sedesc); |
| 108 | if (unlikely(!sedesc)) |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 109 | return NULL; |
| 110 | |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 111 | sedesc_init(sedesc); |
| 112 | return sedesc; |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 113 | } |
| 114 | |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 115 | /* Releases an endpoint. It is the caller responsibility to be sure it is safe |
| 116 | * and it is not shared with another entity |
| 117 | */ |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 118 | void sedesc_free(struct sedesc *sedesc) |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 119 | { |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 120 | pool_free(pool_head_sedesc, sedesc); |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 121 | } |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 122 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 123 | /* Tries to allocate a new stconn and initialize its main fields. On |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 124 | * failure, nothing is allocated and NULL is returned. It is an internal |
Willy Tarreau | b605c42 | 2022-05-17 17:04:55 +0200 | [diff] [blame] | 125 | * function. The caller must, at least, set the SE_FL_ORPHAN or SE_FL_DETACHED |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 126 | * flag. |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 127 | */ |
Willy Tarreau | a0b58b5 | 2022-05-27 08:33:53 +0200 | [diff] [blame] | 128 | static struct stconn *sc_new(struct sedesc *sedesc) |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 129 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 130 | struct stconn *sc; |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 131 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 132 | sc = pool_alloc(pool_head_connstream); |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 133 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 134 | if (unlikely(!sc)) |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 135 | goto alloc_error; |
Christopher Faulet | bb772d0 | 2022-03-22 15:28:36 +0100 | [diff] [blame] | 136 | |
Willy Tarreau | 1d2c79a | 2022-05-27 11:15:19 +0200 | [diff] [blame] | 137 | sc->obj_type = OBJ_TYPE_SC; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 138 | sc->flags = SC_FL_NONE; |
| 139 | sc->state = SC_ST_INI; |
Christopher Faulet | be5cc76 | 2023-02-20 08:41:55 +0100 | [diff] [blame] | 140 | sc->ioto = TICK_ETERNITY; |
Christopher Faulet | 9aed112 | 2023-05-05 11:25:19 +0200 | [diff] [blame] | 141 | sc->room_needed = 0; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 142 | sc->app = NULL; |
| 143 | sc->app_ops = NULL; |
| 144 | sc->src = NULL; |
| 145 | sc->dst = NULL; |
| 146 | sc->wait_event.tasklet = NULL; |
| 147 | sc->wait_event.events = 0; |
Christopher Faulet | 2f35e7b | 2022-03-31 11:09:28 +0200 | [diff] [blame] | 148 | |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 149 | /* If there is no endpoint, allocate a new one now */ |
Willy Tarreau | ea59b02 | 2022-05-17 17:53:22 +0200 | [diff] [blame] | 150 | if (!sedesc) { |
| 151 | sedesc = sedesc_new(); |
| 152 | if (unlikely(!sedesc)) |
Christopher Faulet | b669d68 | 2022-03-22 18:37:19 +0100 | [diff] [blame] | 153 | goto alloc_error; |
| 154 | } |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 155 | sc->sedesc = sedesc; |
| 156 | sedesc->sc = sc; |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 157 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 158 | return sc; |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 159 | |
| 160 | alloc_error: |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 161 | pool_free(pool_head_connstream, sc); |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 162 | return NULL; |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 163 | } |
| 164 | |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 165 | /* Creates a new stream connector and its associated stream from a mux. <sd> must |
| 166 | * be defined. It returns NULL on error. On success, the new stream connector is |
Willy Tarreau | b605c42 | 2022-05-17 17:04:55 +0200 | [diff] [blame] | 167 | * returned. In this case, SE_FL_ORPHAN flag is removed. |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 168 | */ |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 169 | struct stconn *sc_new_from_endp(struct sedesc *sd, struct session *sess, struct buffer *input) |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 170 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 171 | struct stconn *sc; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 172 | |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 173 | sc = sc_new(sd); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 174 | if (unlikely(!sc)) |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 175 | return NULL; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 176 | if (unlikely(!stream_new(sess, sc, input))) { |
Christopher Faulet | 3ab72c6 | 2022-09-27 09:18:20 +0200 | [diff] [blame] | 177 | sd->sc = NULL; |
Willy Tarreau | 7a8ca0a | 2023-03-20 19:53:14 +0100 | [diff] [blame] | 178 | if (sc->sedesc != sd) { |
| 179 | /* none was provided so sc_new() allocated one */ |
| 180 | sedesc_free(sc->sedesc); |
| 181 | } |
| 182 | pool_free(pool_head_connstream, sc); |
Christopher Faulet | 3ab72c6 | 2022-09-27 09:18:20 +0200 | [diff] [blame] | 183 | se_fl_set(sd, SE_FL_ORPHAN); |
| 184 | return NULL; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 185 | } |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 186 | se_fl_clr(sd, SE_FL_ORPHAN); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 187 | return sc; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 188 | } |
| 189 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 190 | /* Creates a new stream connector from an stream. There is no endpoint here, thus it |
Willy Tarreau | a0b58b5 | 2022-05-27 08:33:53 +0200 | [diff] [blame] | 191 | * will be created by sc_new(). So the SE_FL_DETACHED flag is set. It returns |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 192 | * NULL on error. On success, the new stream connector is returned. |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 193 | */ |
Willy Tarreau | a0b58b5 | 2022-05-27 08:33:53 +0200 | [diff] [blame] | 194 | struct stconn *sc_new_from_strm(struct stream *strm, unsigned int flags) |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 195 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 196 | struct stconn *sc; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 197 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 198 | sc = sc_new(NULL); |
| 199 | if (unlikely(!sc)) |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 200 | return NULL; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 201 | sc->flags |= flags; |
| 202 | sc_ep_set(sc, SE_FL_DETACHED); |
| 203 | sc->app = &strm->obj_type; |
| 204 | sc->app_ops = &sc_app_embedded_ops; |
| 205 | return sc; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 206 | } |
| 207 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 208 | /* Creates a new stream connector from an health-check. There is no endpoint here, |
Willy Tarreau | a0b58b5 | 2022-05-27 08:33:53 +0200 | [diff] [blame] | 209 | * thus it will be created by sc_new(). So the SE_FL_DETACHED flag is set. It |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 210 | * returns NULL on error. On success, the new stream connector is returned. |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 211 | */ |
Willy Tarreau | a0b58b5 | 2022-05-27 08:33:53 +0200 | [diff] [blame] | 212 | struct stconn *sc_new_from_check(struct check *check, unsigned int flags) |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 213 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 214 | struct stconn *sc; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 215 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 216 | sc = sc_new(NULL); |
| 217 | if (unlikely(!sc)) |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 218 | return NULL; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 219 | sc->flags |= flags; |
| 220 | sc_ep_set(sc, SE_FL_DETACHED); |
| 221 | sc->app = &check->obj_type; |
| 222 | sc->app_ops = &sc_app_check_ops; |
| 223 | return sc; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 224 | } |
| 225 | |
Willy Tarreau | a0b58b5 | 2022-05-27 08:33:53 +0200 | [diff] [blame] | 226 | /* Releases a stconn previously allocated by sc_new(), as well as its |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 227 | * endpoint, if it exists. This function is called internally or on error path. |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 228 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 229 | void sc_free(struct stconn *sc) |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 230 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 231 | sockaddr_free(&sc->src); |
| 232 | sockaddr_free(&sc->dst); |
| 233 | if (sc->sedesc) { |
| 234 | BUG_ON(!sc_ep_test(sc, SE_FL_DETACHED)); |
| 235 | sedesc_free(sc->sedesc); |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 236 | } |
Tim Duesterhus | b1ec21d | 2023-04-22 17:47:32 +0200 | [diff] [blame] | 237 | tasklet_free(sc->wait_event.tasklet); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 238 | pool_free(pool_head_connstream, sc); |
Christopher Faulet | 1329f2a | 2021-12-16 17:32:56 +0100 | [diff] [blame] | 239 | } |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 240 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 241 | /* Conditionally removes a stream connector if it is detached and if there is no app |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 242 | * layer defined. Except on error path, this one must be used. if release, the |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 243 | * pointer on the SC is set to NULL. |
Christopher Faulet | aa69d8f | 2022-04-12 18:09:48 +0200 | [diff] [blame] | 244 | */ |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 245 | static void sc_free_cond(struct stconn **scp) |
Christopher Faulet | aa69d8f | 2022-04-12 18:09:48 +0200 | [diff] [blame] | 246 | { |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 247 | struct stconn *sc = *scp; |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 248 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 249 | if (!sc->app && (!sc->sedesc || sc_ep_test(sc, SE_FL_DETACHED))) { |
| 250 | sc_free(sc); |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 251 | *scp = NULL; |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 252 | } |
Christopher Faulet | aa69d8f | 2022-04-12 18:09:48 +0200 | [diff] [blame] | 253 | } |
| 254 | |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 255 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 256 | /* Attaches a stconn to a mux endpoint and sets the endpoint ctx. Returns |
Ilya Shipitsin | 3b64a28 | 2022-07-29 22:26:53 +0500 | [diff] [blame] | 257 | * -1 on error and 0 on success. SE_FL_DETACHED flag is removed. This function is |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 258 | * called from a mux when it is attached to a stream or a health-check. |
| 259 | */ |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 260 | int sc_attach_mux(struct stconn *sc, void *sd, void *ctx) |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 261 | { |
Christopher Faulet | 9388204 | 2022-01-19 14:56:50 +0100 | [diff] [blame] | 262 | struct connection *conn = ctx; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 263 | struct sedesc *sedesc = sc->sedesc; |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 264 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 265 | if (sc_strm(sc)) { |
| 266 | if (!sc->wait_event.tasklet) { |
| 267 | sc->wait_event.tasklet = tasklet_new(); |
| 268 | if (!sc->wait_event.tasklet) |
Christopher Faulet | 2f35e7b | 2022-03-31 11:09:28 +0200 | [diff] [blame] | 269 | return -1; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 270 | sc->wait_event.tasklet->process = sc_conn_io_cb; |
| 271 | sc->wait_event.tasklet->context = sc; |
| 272 | sc->wait_event.events = 0; |
Christopher Faulet | 2f35e7b | 2022-03-31 11:09:28 +0200 | [diff] [blame] | 273 | } |
| 274 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 275 | sc->app_ops = &sc_app_conn_ops; |
Christopher Faulet | 7542fb4 | 2023-05-11 14:40:27 +0200 | [diff] [blame] | 276 | xref_create(&sc->sedesc->xref, &sc_opposite(sc)->sedesc->xref); |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 277 | } |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 278 | else if (sc_check(sc)) { |
| 279 | if (!sc->wait_event.tasklet) { |
| 280 | sc->wait_event.tasklet = tasklet_new(); |
| 281 | if (!sc->wait_event.tasklet) |
Christopher Faulet | c95eaef | 2022-05-18 15:57:15 +0200 | [diff] [blame] | 282 | return -1; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 283 | sc->wait_event.tasklet->process = srv_chk_io_cb; |
| 284 | sc->wait_event.tasklet->context = sc; |
| 285 | sc->wait_event.events = 0; |
Christopher Faulet | c95eaef | 2022-05-18 15:57:15 +0200 | [diff] [blame] | 286 | } |
| 287 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 288 | sc->app_ops = &sc_app_check_ops; |
Christopher Faulet | c95eaef | 2022-05-18 15:57:15 +0200 | [diff] [blame] | 289 | } |
Willy Tarreau | e2f7946 | 2023-03-20 19:45:41 +0100 | [diff] [blame] | 290 | |
| 291 | sedesc->se = sd; |
| 292 | sedesc->conn = ctx; |
| 293 | se_fl_set(sedesc, SE_FL_T_MUX); |
| 294 | se_fl_clr(sedesc, SE_FL_DETACHED); |
| 295 | if (!conn->ctx) |
| 296 | conn->ctx = sc; |
Christopher Faulet | 070b91b | 2022-03-31 19:27:18 +0200 | [diff] [blame] | 297 | return 0; |
Christopher Faulet | 9388204 | 2022-01-19 14:56:50 +0100 | [diff] [blame] | 298 | } |
| 299 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 300 | /* Attaches a stconn to an applet endpoint and sets the endpoint |
Ilya Shipitsin | 3b64a28 | 2022-07-29 22:26:53 +0500 | [diff] [blame] | 301 | * ctx. Returns -1 on error and 0 on success. SE_FL_DETACHED flag is |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 302 | * removed. This function is called by a stream when a backend applet is |
| 303 | * registered. |
| 304 | */ |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 305 | static void sc_attach_applet(struct stconn *sc, void *sd) |
Christopher Faulet | 9388204 | 2022-01-19 14:56:50 +0100 | [diff] [blame] | 306 | { |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 307 | sc->sedesc->se = sd; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 308 | sc_ep_set(sc, SE_FL_T_APPLET); |
| 309 | sc_ep_clr(sc, SE_FL_DETACHED); |
Christopher Faulet | 7542fb4 | 2023-05-11 14:40:27 +0200 | [diff] [blame] | 310 | if (sc_strm(sc)) { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 311 | sc->app_ops = &sc_app_applet_ops; |
Christopher Faulet | 7542fb4 | 2023-05-11 14:40:27 +0200 | [diff] [blame] | 312 | xref_create(&sc->sedesc->xref, &sc_opposite(sc)->sedesc->xref); |
| 313 | } |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 314 | } |
| 315 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 316 | /* Attaches a stconn to a app layer and sets the relevant |
Willy Tarreau | b605c42 | 2022-05-17 17:04:55 +0200 | [diff] [blame] | 317 | * callbacks. Returns -1 on error and 0 on success. SE_FL_ORPHAN flag is |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 318 | * removed. This function is called by a stream when it is created to attach it |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 319 | * on the stream connector on the client side. |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 320 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 321 | int sc_attach_strm(struct stconn *sc, struct stream *strm) |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 322 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 323 | sc->app = &strm->obj_type; |
| 324 | sc_ep_clr(sc, SE_FL_ORPHAN); |
| 325 | if (sc_ep_test(sc, SE_FL_T_MUX)) { |
| 326 | sc->wait_event.tasklet = tasklet_new(); |
| 327 | if (!sc->wait_event.tasklet) |
Christopher Faulet | 2f35e7b | 2022-03-31 11:09:28 +0200 | [diff] [blame] | 328 | return -1; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 329 | sc->wait_event.tasklet->process = sc_conn_io_cb; |
| 330 | sc->wait_event.tasklet->context = sc; |
| 331 | sc->wait_event.events = 0; |
Christopher Faulet | 2f35e7b | 2022-03-31 11:09:28 +0200 | [diff] [blame] | 332 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 333 | sc->app_ops = &sc_app_conn_ops; |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 334 | } |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 335 | else if (sc_ep_test(sc, SE_FL_T_APPLET)) { |
| 336 | sc->app_ops = &sc_app_applet_ops; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 337 | } |
| 338 | else { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 339 | sc->app_ops = &sc_app_embedded_ops; |
Christopher Faulet | a9e8b39 | 2022-03-23 11:01:09 +0100 | [diff] [blame] | 340 | } |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 341 | return 0; |
| 342 | } |
| 343 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 344 | /* Detaches the stconn from the endpoint, if any. For a connecrion, if a |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 345 | * mux owns the connection ->detach() callback is called. Otherwise, it means |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 346 | * the stream connector owns the connection. In this case the connection is closed |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 347 | * and released. For an applet, the appctx is released. If still allocated, the |
| 348 | * endpoint is reset and flag as detached. If the app layer is also detached, |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 349 | * the stream connector is released. |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 350 | */ |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 351 | static void sc_detach_endp(struct stconn **scp) |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 352 | { |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 353 | struct stconn *sc = *scp; |
Christopher Faulet | 6eb53b1 | 2023-05-15 09:53:29 +0200 | [diff] [blame] | 354 | struct xref *peer; |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 355 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 356 | if (!sc) |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 357 | return; |
| 358 | |
Christopher Faulet | 7542fb4 | 2023-05-11 14:40:27 +0200 | [diff] [blame] | 359 | |
Christopher Faulet | 6eb53b1 | 2023-05-15 09:53:29 +0200 | [diff] [blame] | 360 | /* Remove my link in the original objects. */ |
| 361 | peer = xref_get_peer_and_lock(&sc->sedesc->xref); |
| 362 | if (peer) |
| 363 | xref_disconnect(&sc->sedesc->xref, peer); |
Christopher Faulet | 7542fb4 | 2023-05-11 14:40:27 +0200 | [diff] [blame] | 364 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 365 | if (sc_ep_test(sc, SE_FL_T_MUX)) { |
| 366 | struct connection *conn = __sc_conn(sc); |
| 367 | struct sedesc *sedesc = sc->sedesc; |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 368 | |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 369 | if (conn->mux) { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 370 | if (sc->wait_event.events != 0) |
| 371 | conn->mux->unsubscribe(sc, sc->wait_event.events, &sc->wait_event); |
Willy Tarreau | 798465b | 2022-05-17 18:20:02 +0200 | [diff] [blame] | 372 | se_fl_set(sedesc, SE_FL_ORPHAN); |
Willy Tarreau | c105492 | 2022-05-18 07:43:52 +0200 | [diff] [blame] | 373 | sedesc->sc = NULL; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 374 | sc->sedesc = NULL; |
Willy Tarreau | 798465b | 2022-05-17 18:20:02 +0200 | [diff] [blame] | 375 | conn->mux->detach(sedesc); |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 376 | } |
| 377 | else { |
| 378 | /* It's too early to have a mux, let's just destroy |
| 379 | * the connection |
| 380 | */ |
| 381 | conn_stop_tracking(conn); |
| 382 | conn_full_close(conn); |
| 383 | if (conn->destroy_cb) |
| 384 | conn->destroy_cb(conn); |
| 385 | conn_free(conn); |
| 386 | } |
| 387 | } |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 388 | else if (sc_ep_test(sc, SE_FL_T_APPLET)) { |
| 389 | struct appctx *appctx = __sc_appctx(sc); |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 390 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 391 | sc_ep_set(sc, SE_FL_ORPHAN); |
| 392 | sc->sedesc->sc = NULL; |
| 393 | sc->sedesc = NULL; |
Willy Tarreau | 1c3ead4 | 2022-05-10 19:42:22 +0200 | [diff] [blame] | 394 | appctx_shut(appctx); |
| 395 | appctx_free(appctx); |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 396 | } |
| 397 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 398 | if (sc->sedesc) { |
Willy Tarreau | da59c89 | 2022-05-27 17:03:34 +0200 | [diff] [blame] | 399 | /* the SD wasn't used and can be recycled */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 400 | sc->sedesc->se = NULL; |
| 401 | sc->sedesc->conn = NULL; |
Willy Tarreau | da59c89 | 2022-05-27 17:03:34 +0200 | [diff] [blame] | 402 | sc->sedesc->flags = 0; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 403 | sc_ep_set(sc, SE_FL_DETACHED); |
Christopher Faulet | db90f2a | 2022-03-22 16:06:25 +0100 | [diff] [blame] | 404 | } |
| 405 | |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 406 | /* FIXME: Rest SC for now but must be reviewed. SC flags are only |
Christopher Faulet | c36de9d | 2022-01-06 08:44:58 +0100 | [diff] [blame] | 407 | * connection related for now but this will evolved |
| 408 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 409 | sc->flags &= SC_FL_ISBACK; |
| 410 | if (sc_strm(sc)) |
| 411 | sc->app_ops = &sc_app_embedded_ops; |
Willy Tarreau | 2f2318d | 2022-05-18 10:17:16 +0200 | [diff] [blame] | 412 | else |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 413 | sc->app_ops = NULL; |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 414 | sc_free_cond(scp); |
Christopher Faulet | c36de9d | 2022-01-06 08:44:58 +0100 | [diff] [blame] | 415 | } |
| 416 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 417 | /* Detaches the stconn from the app layer. If there is no endpoint attached |
| 418 | * to the stconn |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 419 | */ |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 420 | static void sc_detach_app(struct stconn **scp) |
Christopher Faulet | c36de9d | 2022-01-06 08:44:58 +0100 | [diff] [blame] | 421 | { |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 422 | struct stconn *sc = *scp; |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 423 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 424 | if (!sc) |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 425 | return; |
| 426 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 427 | sc->app = NULL; |
| 428 | sc->app_ops = NULL; |
| 429 | sockaddr_free(&sc->src); |
| 430 | sockaddr_free(&sc->dst); |
Christopher Faulet | 2f35e7b | 2022-03-31 11:09:28 +0200 | [diff] [blame] | 431 | |
Tim Duesterhus | b1ec21d | 2023-04-22 17:47:32 +0200 | [diff] [blame] | 432 | tasklet_free(sc->wait_event.tasklet); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 433 | sc->wait_event.tasklet = NULL; |
| 434 | sc->wait_event.events = 0; |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 435 | sc_free_cond(scp); |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 436 | } |
| 437 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 438 | /* Destroy the stconn. It is detached from its endpoint and its |
| 439 | * application. After this call, the stconn must be considered as released. |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 440 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 441 | void sc_destroy(struct stconn *sc) |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 442 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 443 | sc_detach_endp(&sc); |
| 444 | sc_detach_app(&sc); |
| 445 | BUG_ON_HOT(sc); |
Christopher Faulet | cda94ac | 2021-12-23 17:28:17 +0100 | [diff] [blame] | 446 | } |
Christopher Faulet | 9ec2f4d | 2022-03-23 15:15:29 +0100 | [diff] [blame] | 447 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 448 | /* Resets the stream connector endpoint. It happens when the app layer want to renew |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 449 | * its endpoint. For a connection retry for instance. If a mux or an applet is |
Ilya Shipitsin | 3b64a28 | 2022-07-29 22:26:53 +0500 | [diff] [blame] | 450 | * attached, a new endpoint is created. Returns -1 on error and 0 on success. |
Christopher Faulet | 9ed7742 | 2022-04-12 08:51:15 +0200 | [diff] [blame] | 451 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 452 | int sc_reset_endp(struct stconn *sc) |
Christopher Faulet | 9ec2f4d | 2022-03-23 15:15:29 +0100 | [diff] [blame] | 453 | { |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 454 | struct sedesc *new_sd; |
Christopher Faulet | b041b23 | 2022-03-24 10:27:02 +0100 | [diff] [blame] | 455 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 456 | BUG_ON(!sc->app); |
Christopher Faulet | a6c4a48 | 2022-04-28 18:25:24 +0200 | [diff] [blame] | 457 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 458 | if (!__sc_endp(sc)) { |
Christopher Faulet | b041b23 | 2022-03-24 10:27:02 +0100 | [diff] [blame] | 459 | /* endpoint not attached or attached to a mux with no |
| 460 | * target. Thus the endpoint will not be release but just |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 461 | * reset. The app is still attached, the sc will not be |
Christopher Faulet | eb50c01 | 2022-04-21 14:22:53 +0200 | [diff] [blame] | 462 | * released. |
Christopher Faulet | b041b23 | 2022-03-24 10:27:02 +0100 | [diff] [blame] | 463 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 464 | sc_detach_endp(&sc); |
Christopher Faulet | b041b23 | 2022-03-24 10:27:02 +0100 | [diff] [blame] | 465 | return 0; |
Christopher Faulet | 9ec2f4d | 2022-03-23 15:15:29 +0100 | [diff] [blame] | 466 | } |
Christopher Faulet | b041b23 | 2022-03-24 10:27:02 +0100 | [diff] [blame] | 467 | |
| 468 | /* allocate the new endpoint first to be able to set error if it |
| 469 | * fails */ |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 470 | new_sd = sedesc_new(); |
Christopher Faulet | 638fe6a | 2023-04-14 10:28:28 +0200 | [diff] [blame] | 471 | if (!unlikely(new_sd)) |
Christopher Faulet | b041b23 | 2022-03-24 10:27:02 +0100 | [diff] [blame] | 472 | return -1; |
Christopher Faulet | b041b23 | 2022-03-24 10:27:02 +0100 | [diff] [blame] | 473 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 474 | /* The app is still attached, the sc will not be released */ |
| 475 | sc_detach_endp(&sc); |
Willy Tarreau | 6a378d1 | 2022-08-11 13:56:42 +0200 | [diff] [blame] | 476 | BUG_ON(!sc); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 477 | BUG_ON(sc->sedesc); |
Willy Tarreau | 3121928 | 2022-05-27 16:21:33 +0200 | [diff] [blame] | 478 | sc->sedesc = new_sd; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 479 | sc->sedesc->sc = sc; |
| 480 | sc_ep_set(sc, SE_FL_DETACHED); |
Christopher Faulet | 9ec2f4d | 2022-03-23 15:15:29 +0100 | [diff] [blame] | 481 | return 0; |
| 482 | } |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 483 | |
| 484 | |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 485 | /* Create an applet to handle a stream connector as a new appctx. The SC will |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 486 | * wake it up every time it is solicited. The appctx must be deleted by the task |
Willy Tarreau | 19c65a9 | 2022-05-27 08:49:24 +0200 | [diff] [blame] | 487 | * handler using sc_detach_endp(), possibly from within the function itself. |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 488 | * It also pre-initializes the applet's context and returns it (or NULL in case |
| 489 | * it could not be allocated). |
| 490 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 491 | struct appctx *sc_applet_create(struct stconn *sc, struct applet *app) |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 492 | { |
| 493 | struct appctx *appctx; |
| 494 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 495 | appctx = appctx_new_here(app, sc->sedesc); |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 496 | if (!appctx) |
| 497 | return NULL; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 498 | sc_attach_applet(sc, appctx); |
| 499 | appctx->t->nice = __sc_strm(sc)->task->nice; |
Willy Tarreau | 90e8b45 | 2022-05-25 18:21:43 +0200 | [diff] [blame] | 500 | applet_need_more_data(appctx); |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 501 | appctx_wakeup(appctx); |
Christopher Faulet | a33ff7a | 2022-04-21 11:52:07 +0200 | [diff] [blame] | 502 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 503 | sc->state = SC_ST_RDY; |
Christopher Faulet | 3704663 | 2022-04-01 11:36:58 +0200 | [diff] [blame] | 504 | return appctx; |
| 505 | } |
| 506 | |
Ilya Shipitsin | 07be66d | 2023-04-01 12:26:42 +0200 | [diff] [blame] | 507 | /* Conditionally forward the close to the write side. It return 1 if it can be |
Christopher Faulet | eb3f26d | 2023-02-08 16:18:48 +0100 | [diff] [blame] | 508 | * forwarded. It is the caller responsibility to forward the close to the write |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 509 | * side. Otherwise, 0 is returned. In this case, SC_FL_SHUT_WANTED flag may be set on |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 510 | * the consumer SC if we are only waiting for the outgoing data to be flushed. |
Christopher Faulet | eb3f26d | 2023-02-08 16:18:48 +0100 | [diff] [blame] | 511 | */ |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 512 | static inline int sc_cond_forward_shut(struct stconn *sc) |
Christopher Faulet | eb3f26d | 2023-02-08 16:18:48 +0100 | [diff] [blame] | 513 | { |
| 514 | /* The close must not be forwarded */ |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 515 | if (!(sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) || !(sc->flags & SC_FL_NOHALF)) |
Christopher Faulet | eb3f26d | 2023-02-08 16:18:48 +0100 | [diff] [blame] | 516 | return 0; |
| 517 | |
| 518 | if (!channel_is_empty(sc_ic(sc))) { |
Christopher Faulet | df7cd71 | 2023-04-13 15:56:26 +0200 | [diff] [blame] | 519 | /* the shutdown cannot be forwarded now because |
Christopher Faulet | eb3f26d | 2023-02-08 16:18:48 +0100 | [diff] [blame] | 520 | * we should flush outgoing data first. But instruct the output |
| 521 | * channel it should be done ASAP. |
| 522 | */ |
Christopher Faulet | df7cd71 | 2023-04-13 15:56:26 +0200 | [diff] [blame] | 523 | sc_schedule_shutdown(sc); |
Christopher Faulet | eb3f26d | 2023-02-08 16:18:48 +0100 | [diff] [blame] | 524 | return 0; |
| 525 | } |
| 526 | |
| 527 | /* the close can be immediately forwarded to the write side */ |
| 528 | return 1; |
| 529 | } |
| 530 | |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 531 | /* |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 532 | * This function performs a shutdown-read on a detached stream connector in a |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 533 | * connected or init state (it does nothing for other states). It either shuts |
| 534 | * the read side or marks itself as closed. The buffer flags are updated to |
Willy Tarreau | cb04166 | 2022-05-17 19:44:42 +0200 | [diff] [blame] | 535 | * reflect the new state. If the stream connector has SC_FL_NOHALF, we also |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 536 | * forward the close to the write side. The owner task is woken up if it exists. |
| 537 | */ |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 538 | static void sc_app_abort(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 539 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 540 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 541 | |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 542 | if (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) |
Christopher Faulet | c665bb5 | 2023-04-04 10:06:57 +0200 | [diff] [blame] | 543 | return; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 544 | |
Christopher Faulet | 0c370ee | 2023-04-13 16:05:13 +0200 | [diff] [blame] | 545 | sc->flags |= SC_FL_ABRT_DONE; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 546 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 4c13568 | 2023-02-16 11:09:31 +0100 | [diff] [blame] | 547 | sc_ep_report_read_activity(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 548 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 549 | if (!sc_state_in(sc->state, SC_SB_CON|SC_SB_RDY|SC_SB_EST)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 550 | return; |
| 551 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 552 | if (sc->flags & SC_FL_SHUT_DONE) { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 553 | sc->state = SC_ST_DIS; |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 554 | if (sc->flags & SC_FL_ISBACK) |
| 555 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 556 | } |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 557 | else if (sc_cond_forward_shut(sc)) |
| 558 | return sc_app_shut(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 559 | |
| 560 | /* note that if the task exists, it must unregister itself once it runs */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 561 | if (!(sc->flags & SC_FL_DONT_WAKE)) |
| 562 | task_wakeup(sc_strm_task(sc), TASK_WOKEN_IO); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 563 | } |
| 564 | |
| 565 | /* |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 566 | * This function performs a shutdown-write on a detached stream connector in a |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 567 | * connected or init state (it does nothing for other states). It either shuts |
| 568 | * the write side or marks itself as closed. The buffer flags are updated to |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 569 | * reflect the new state. It does also close everything if the SC was marked as |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 570 | * being in error state. The owner task is woken up if it exists. |
| 571 | */ |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 572 | static void sc_app_shut(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 573 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 574 | struct channel *ic = sc_ic(sc); |
| 575 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 576 | |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 577 | sc->flags &= ~SC_FL_SHUT_WANTED; |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 578 | if (sc->flags & SC_FL_SHUT_DONE) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 579 | return; |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 580 | sc->flags |= SC_FL_SHUT_DONE; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 581 | oc->flags |= CF_WRITE_EVENT; |
Christopher Faulet | bcdcfad | 2023-02-20 08:36:53 +0100 | [diff] [blame] | 582 | sc_set_hcto(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 583 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 584 | switch (sc->state) { |
Willy Tarreau | 026e8fb | 2022-05-17 19:47:17 +0200 | [diff] [blame] | 585 | case SC_ST_RDY: |
| 586 | case SC_ST_EST: |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 587 | /* we have to shut before closing, otherwise some short messages |
| 588 | * may never leave the system, especially when there are remaining |
| 589 | * unread data in the socket input buffer, or when nolinger is set. |
Willy Tarreau | cb04166 | 2022-05-17 19:44:42 +0200 | [diff] [blame] | 590 | * However, if SC_FL_NOLINGER is explicitly set, we know there is |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 591 | * no risk so we close both sides immediately. |
| 592 | */ |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 593 | if (!(sc->flags & (SC_FL_ERROR|SC_FL_NOLINGER|SC_FL_EOS|SC_FL_ABRT_DONE)) && |
Christopher Faulet | ad46e52 | 2023-04-14 11:59:15 +0200 | [diff] [blame] | 594 | !(ic->flags & CF_DONT_READ)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 595 | return; |
| 596 | |
Willy Tarreau | 476c280 | 2022-11-14 07:36:42 +0100 | [diff] [blame] | 597 | __fallthrough; |
Willy Tarreau | 026e8fb | 2022-05-17 19:47:17 +0200 | [diff] [blame] | 598 | case SC_ST_CON: |
| 599 | case SC_ST_CER: |
| 600 | case SC_ST_QUE: |
| 601 | case SC_ST_TAR: |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 602 | /* Note that none of these states may happen with applets */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 603 | sc->state = SC_ST_DIS; |
Willy Tarreau | 476c280 | 2022-11-14 07:36:42 +0100 | [diff] [blame] | 604 | __fallthrough; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 605 | default: |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 606 | sc->flags &= ~SC_FL_NOLINGER; |
Christopher Faulet | 0c370ee | 2023-04-13 16:05:13 +0200 | [diff] [blame] | 607 | sc->flags |= SC_FL_ABRT_DONE; |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 608 | if (sc->flags & SC_FL_ISBACK) |
| 609 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 610 | } |
| 611 | |
| 612 | /* note that if the task exists, it must unregister itself once it runs */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 613 | if (!(sc->flags & SC_FL_DONT_WAKE)) |
| 614 | task_wakeup(sc_strm_task(sc), TASK_WOKEN_IO); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 615 | } |
| 616 | |
| 617 | /* default chk_rcv function for scheduled tasks */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 618 | static void sc_app_chk_rcv(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 619 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 620 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 621 | |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 622 | if (ic->pipe) { |
| 623 | /* stop reading */ |
Christopher Faulet | 7b3d38a | 2023-05-05 11:28:45 +0200 | [diff] [blame] | 624 | sc_need_room(sc, -1); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 625 | } |
| 626 | else { |
| 627 | /* (re)start reading */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 628 | if (!(sc->flags & SC_FL_DONT_WAKE)) |
| 629 | task_wakeup(sc_strm_task(sc), TASK_WOKEN_IO); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 630 | } |
| 631 | } |
| 632 | |
| 633 | /* default chk_snd function for scheduled tasks */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 634 | static void sc_app_chk_snd(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 635 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 636 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 637 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 638 | if (unlikely(sc->state != SC_ST_EST || (sc->flags & SC_FL_SHUT_DONE))) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 639 | return; |
| 640 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 641 | if (!sc_ep_test(sc, SE_FL_WAIT_DATA) || /* not waiting for data */ |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 642 | channel_is_empty(oc)) /* called with nothing to send ! */ |
| 643 | return; |
| 644 | |
| 645 | /* Otherwise there are remaining data to be sent in the buffer, |
| 646 | * so we tell the handler. |
| 647 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 648 | sc_ep_clr(sc, SE_FL_WAIT_DATA); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 649 | if (!(sc->flags & SC_FL_DONT_WAKE)) |
| 650 | task_wakeup(sc_strm_task(sc), TASK_WOKEN_IO); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 651 | } |
| 652 | |
| 653 | /* |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 654 | * This function performs a shutdown-read on a stream connector attached to |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 655 | * a connection in a connected or init state (it does nothing for other |
| 656 | * states). It either shuts the read side or marks itself as closed. The buffer |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 657 | * flags are updated to reflect the new state. If the stream connector has |
Willy Tarreau | cb04166 | 2022-05-17 19:44:42 +0200 | [diff] [blame] | 658 | * SC_FL_NOHALF, we also forward the close to the write side. If a control |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 659 | * layer is defined, then it is supposed to be a socket layer and file |
| 660 | * descriptors are then shutdown or closed accordingly. The function |
| 661 | * automatically disables polling if needed. |
| 662 | */ |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 663 | static void sc_app_abort_conn(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 664 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 665 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 666 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 667 | BUG_ON(!sc_conn(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 668 | |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 669 | if (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 670 | return; |
Christopher Faulet | 0c370ee | 2023-04-13 16:05:13 +0200 | [diff] [blame] | 671 | sc->flags |= SC_FL_ABRT_DONE; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 672 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 673 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 674 | if (!sc_state_in(sc->state, SC_SB_CON|SC_SB_RDY|SC_SB_EST)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 675 | return; |
| 676 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 677 | if (sc->flags & SC_FL_SHUT_DONE) { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 678 | sc_conn_shut(sc); |
| 679 | sc->state = SC_ST_DIS; |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 680 | if (sc->flags & SC_FL_ISBACK) |
| 681 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 682 | } |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 683 | else if (sc_cond_forward_shut(sc)) |
| 684 | return sc_app_shut_conn(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 685 | } |
| 686 | |
| 687 | /* |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 688 | * This function performs a shutdown-write on a stream connector attached to |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 689 | * a connection in a connected or init state (it does nothing for other |
| 690 | * states). It either shuts the write side or marks itself as closed. The |
| 691 | * buffer flags are updated to reflect the new state. It does also close |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 692 | * everything if the SC was marked as being in error state. If there is a |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 693 | * data-layer shutdown, it is called. |
| 694 | */ |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 695 | static void sc_app_shut_conn(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 696 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 697 | struct channel *ic = sc_ic(sc); |
| 698 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 699 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 700 | BUG_ON(!sc_conn(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 701 | |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 702 | sc->flags &= ~SC_FL_SHUT_WANTED; |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 703 | if (sc->flags & SC_FL_SHUT_DONE) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 704 | return; |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 705 | sc->flags |= SC_FL_SHUT_DONE; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 706 | oc->flags |= CF_WRITE_EVENT; |
Christopher Faulet | bcdcfad | 2023-02-20 08:36:53 +0100 | [diff] [blame] | 707 | sc_set_hcto(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 708 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 709 | switch (sc->state) { |
Willy Tarreau | 026e8fb | 2022-05-17 19:47:17 +0200 | [diff] [blame] | 710 | case SC_ST_RDY: |
| 711 | case SC_ST_EST: |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 712 | /* we have to shut before closing, otherwise some short messages |
| 713 | * may never leave the system, especially when there are remaining |
| 714 | * unread data in the socket input buffer, or when nolinger is set. |
Willy Tarreau | cb04166 | 2022-05-17 19:44:42 +0200 | [diff] [blame] | 715 | * However, if SC_FL_NOLINGER is explicitly set, we know there is |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 716 | * no risk so we close both sides immediately. |
| 717 | */ |
| 718 | |
Christopher Faulet | 25d9fe5 | 2023-04-14 12:09:35 +0200 | [diff] [blame] | 719 | if (sc->flags & SC_FL_ERROR) { |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 720 | /* quick close, the socket is already shut anyway */ |
| 721 | } |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 722 | else if (sc->flags & SC_FL_NOLINGER) { |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 723 | /* unclean data-layer shutdown, typically an aborted request |
| 724 | * or a forwarded shutdown from a client to a server due to |
| 725 | * option abortonclose. No need for the TLS layer to try to |
| 726 | * emit a shutdown message. |
| 727 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 728 | sc_conn_shutw(sc, CO_SHW_SILENT); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 729 | } |
| 730 | else { |
| 731 | /* clean data-layer shutdown. This only happens on the |
| 732 | * frontend side, or on the backend side when forwarding |
| 733 | * a client close in TCP mode or in HTTP TUNNEL mode |
| 734 | * while option abortonclose is set. We want the TLS |
| 735 | * layer to try to signal it to the peer before we close. |
| 736 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 737 | sc_conn_shutw(sc, CO_SHW_NORMAL); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 738 | |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 739 | if (!(sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) && !(ic->flags & CF_DONT_READ)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 740 | return; |
| 741 | } |
| 742 | |
Willy Tarreau | 476c280 | 2022-11-14 07:36:42 +0100 | [diff] [blame] | 743 | __fallthrough; |
Willy Tarreau | 026e8fb | 2022-05-17 19:47:17 +0200 | [diff] [blame] | 744 | case SC_ST_CON: |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 745 | /* we may have to close a pending connection, and mark the |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 746 | * response buffer as abort |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 747 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 748 | sc_conn_shut(sc); |
Willy Tarreau | 476c280 | 2022-11-14 07:36:42 +0100 | [diff] [blame] | 749 | __fallthrough; |
Willy Tarreau | 026e8fb | 2022-05-17 19:47:17 +0200 | [diff] [blame] | 750 | case SC_ST_CER: |
| 751 | case SC_ST_QUE: |
| 752 | case SC_ST_TAR: |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 753 | sc->state = SC_ST_DIS; |
Willy Tarreau | 476c280 | 2022-11-14 07:36:42 +0100 | [diff] [blame] | 754 | __fallthrough; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 755 | default: |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 756 | sc->flags &= ~SC_FL_NOLINGER; |
Christopher Faulet | 0c370ee | 2023-04-13 16:05:13 +0200 | [diff] [blame] | 757 | sc->flags |= SC_FL_ABRT_DONE; |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 758 | if (sc->flags & SC_FL_ISBACK) |
| 759 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 760 | } |
| 761 | } |
| 762 | |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 763 | /* This function is used for inter-stream connector calls. It is called by the |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 764 | * consumer to inform the producer side that it may be interested in checking |
| 765 | * for free space in the buffer. Note that it intentionally does not update |
| 766 | * timeouts, so that we can still check them later at wake-up. This function is |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 767 | * dedicated to connection-based stream connectors. |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 768 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 769 | static void sc_app_chk_rcv_conn(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 770 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 771 | BUG_ON(!sc_conn(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 772 | |
| 773 | /* (re)start reading */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 774 | if (sc_state_in(sc->state, SC_SB_CON|SC_SB_RDY|SC_SB_EST)) |
| 775 | tasklet_wakeup(sc->wait_event.tasklet); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 776 | } |
| 777 | |
| 778 | |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 779 | /* This function is used for inter-stream connector calls. It is called by the |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 780 | * producer to inform the consumer side that it may be interested in checking |
| 781 | * for data in the buffer. Note that it intentionally does not update timeouts, |
| 782 | * so that we can still check them later at wake-up. |
| 783 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 784 | static void sc_app_chk_snd_conn(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 785 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 786 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 787 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 788 | BUG_ON(!sc_conn(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 789 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 790 | if (unlikely(!sc_state_in(sc->state, SC_SB_RDY|SC_SB_EST) || |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 791 | (sc->flags & SC_FL_SHUT_DONE))) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 792 | return; |
| 793 | |
| 794 | if (unlikely(channel_is_empty(oc))) /* called with nothing to send ! */ |
| 795 | return; |
| 796 | |
| 797 | if (!oc->pipe && /* spliced data wants to be forwarded ASAP */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 798 | !sc_ep_test(sc, SE_FL_WAIT_DATA)) /* not waiting for data */ |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 799 | return; |
| 800 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 801 | if (!(sc->wait_event.events & SUB_RETRY_SEND) && !channel_is_empty(sc_oc(sc))) |
| 802 | sc_conn_send(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 803 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 804 | if (sc_ep_test(sc, SE_FL_ERROR | SE_FL_ERR_PENDING) || sc_is_conn_error(sc)) { |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 805 | /* Write error on the file descriptor */ |
Christopher Faulet | 56a2b60 | 2023-04-14 09:42:59 +0200 | [diff] [blame] | 806 | BUG_ON(sc_ep_test(sc, SE_FL_EOS|SE_FL_ERROR|SE_FL_ERR_PENDING) == (SE_FL_EOS|SE_FL_ERR_PENDING)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 807 | goto out_wakeup; |
| 808 | } |
| 809 | |
| 810 | /* OK, so now we know that some data might have been sent, and that we may |
| 811 | * have to poll first. We have to do that too if the buffer is not empty. |
| 812 | */ |
| 813 | if (channel_is_empty(oc)) { |
| 814 | /* the connection is established but we can't write. Either the |
| 815 | * buffer is empty, or we just refrain from sending because the |
| 816 | * ->o limit was reached. Maybe we just wrote the last |
| 817 | * chunk and need to close. |
| 818 | */ |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 819 | if ((oc->flags & CF_AUTO_CLOSE) && |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 820 | ((sc->flags & (SC_FL_SHUT_DONE|SC_FL_SHUT_WANTED)) == SC_FL_SHUT_WANTED) && |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 821 | sc_state_in(sc->state, SC_SB_RDY|SC_SB_EST)) { |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 822 | sc_shutdown(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 823 | goto out_wakeup; |
| 824 | } |
| 825 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 826 | if ((sc->flags & (SC_FL_SHUT_DONE|SC_FL_SHUT_WANTED)) == 0) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 827 | sc_ep_set(sc, SE_FL_WAIT_DATA); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 828 | } |
| 829 | else { |
| 830 | /* Otherwise there are remaining data to be sent in the buffer, |
| 831 | * which means we have to poll before doing so. |
| 832 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 833 | sc_ep_clr(sc, SE_FL_WAIT_DATA); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 834 | } |
| 835 | |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 836 | /* in case of special condition (error, shutdown, end of write...), we |
| 837 | * have to notify the task. |
| 838 | */ |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 839 | if (likely((sc->flags & SC_FL_SHUT_DONE) || |
Christopher Faulet | 71c486b | 2023-02-09 14:14:38 +0100 | [diff] [blame] | 840 | ((oc->flags & CF_WRITE_EVENT) && sc->state < SC_ST_EST) || |
| 841 | ((oc->flags & CF_WAKE_WRITE) && |
| 842 | ((channel_is_empty(oc) && !oc->to_forward) || |
| 843 | !sc_state_in(sc->state, SC_SB_EST))))) { |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 844 | out_wakeup: |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 845 | if (!(sc->flags & SC_FL_DONT_WAKE)) |
| 846 | task_wakeup(sc_strm_task(sc), TASK_WOKEN_IO); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 847 | } |
| 848 | } |
| 849 | |
| 850 | /* |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 851 | * This function performs a shutdown-read on a stream connector attached to an |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 852 | * applet in a connected or init state (it does nothing for other states). It |
| 853 | * either shuts the read side or marks itself as closed. The buffer flags are |
Willy Tarreau | cb04166 | 2022-05-17 19:44:42 +0200 | [diff] [blame] | 854 | * updated to reflect the new state. If the stream connector has SC_FL_NOHALF, |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 855 | * we also forward the close to the write side. The owner task is woken up if |
| 856 | * it exists. |
| 857 | */ |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 858 | static void sc_app_abort_applet(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 859 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 860 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 861 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 862 | BUG_ON(!sc_appctx(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 863 | |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 864 | if (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 865 | return; |
Christopher Faulet | 0c370ee | 2023-04-13 16:05:13 +0200 | [diff] [blame] | 866 | sc->flags |= SC_FL_ABRT_DONE; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 867 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 868 | |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 869 | /* Note: on abort, we don't call the applet */ |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 870 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 871 | if (!sc_state_in(sc->state, SC_SB_CON|SC_SB_RDY|SC_SB_EST)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 872 | return; |
| 873 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 874 | if (sc->flags & SC_FL_SHUT_DONE) { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 875 | appctx_shut(__sc_appctx(sc)); |
| 876 | sc->state = SC_ST_DIS; |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 877 | if (sc->flags & SC_FL_ISBACK) |
| 878 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 879 | } |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 880 | else if (sc_cond_forward_shut(sc)) |
| 881 | return sc_app_shut_applet(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 882 | } |
| 883 | |
| 884 | /* |
Willy Tarreau | 3a3f480 | 2022-05-17 18:28:19 +0200 | [diff] [blame] | 885 | * This function performs a shutdown-write on a stream connector attached to an |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 886 | * applet in a connected or init state (it does nothing for other states). It |
| 887 | * either shuts the write side or marks itself as closed. The buffer flags are |
| 888 | * updated to reflect the new state. It does also close everything if the SI |
| 889 | * was marked as being in error state. The owner task is woken up if it exists. |
| 890 | */ |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 891 | static void sc_app_shut_applet(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 892 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 893 | struct channel *ic = sc_ic(sc); |
| 894 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 895 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 896 | BUG_ON(!sc_appctx(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 897 | |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 898 | sc->flags &= ~SC_FL_SHUT_WANTED; |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 899 | if (sc->flags & SC_FL_SHUT_DONE) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 900 | return; |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 901 | sc->flags |= SC_FL_SHUT_DONE; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 902 | oc->flags |= CF_WRITE_EVENT; |
Christopher Faulet | bcdcfad | 2023-02-20 08:36:53 +0100 | [diff] [blame] | 903 | sc_set_hcto(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 904 | |
| 905 | /* on shutw we always wake the applet up */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 906 | appctx_wakeup(__sc_appctx(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 907 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 908 | switch (sc->state) { |
Willy Tarreau | 026e8fb | 2022-05-17 19:47:17 +0200 | [diff] [blame] | 909 | case SC_ST_RDY: |
| 910 | case SC_ST_EST: |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 911 | /* we have to shut before closing, otherwise some short messages |
| 912 | * may never leave the system, especially when there are remaining |
| 913 | * unread data in the socket input buffer, or when nolinger is set. |
Willy Tarreau | cb04166 | 2022-05-17 19:44:42 +0200 | [diff] [blame] | 914 | * However, if SC_FL_NOLINGER is explicitly set, we know there is |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 915 | * no risk so we close both sides immediately. |
| 916 | */ |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 917 | if (!(sc->flags & (SC_FL_ERROR|SC_FL_NOLINGER|SC_FL_EOS|SC_FL_ABRT_DONE)) && |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 918 | !(ic->flags & CF_DONT_READ)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 919 | return; |
| 920 | |
Willy Tarreau | 476c280 | 2022-11-14 07:36:42 +0100 | [diff] [blame] | 921 | __fallthrough; |
Willy Tarreau | 026e8fb | 2022-05-17 19:47:17 +0200 | [diff] [blame] | 922 | case SC_ST_CON: |
| 923 | case SC_ST_CER: |
| 924 | case SC_ST_QUE: |
| 925 | case SC_ST_TAR: |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 926 | /* Note that none of these states may happen with applets */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 927 | appctx_shut(__sc_appctx(sc)); |
| 928 | sc->state = SC_ST_DIS; |
Willy Tarreau | 476c280 | 2022-11-14 07:36:42 +0100 | [diff] [blame] | 929 | __fallthrough; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 930 | default: |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 931 | sc->flags &= ~SC_FL_NOLINGER; |
Christopher Faulet | 0c370ee | 2023-04-13 16:05:13 +0200 | [diff] [blame] | 932 | sc->flags |= SC_FL_ABRT_DONE; |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 933 | if (sc->flags & SC_FL_ISBACK) |
| 934 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 935 | } |
| 936 | } |
| 937 | |
| 938 | /* chk_rcv function for applets */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 939 | static void sc_app_chk_rcv_applet(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 940 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 941 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 942 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 943 | BUG_ON(!sc_appctx(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 944 | |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 945 | if (!ic->pipe) { |
| 946 | /* (re)start reading */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 947 | appctx_wakeup(__sc_appctx(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 948 | } |
| 949 | } |
| 950 | |
| 951 | /* chk_snd function for applets */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 952 | static void sc_app_chk_snd_applet(struct stconn *sc) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 953 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 954 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 955 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 956 | BUG_ON(!sc_appctx(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 957 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 958 | if (unlikely(sc->state != SC_ST_EST || (sc->flags & SC_FL_SHUT_DONE))) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 959 | return; |
| 960 | |
Christopher Faulet | 04f03e1 | 2022-06-01 17:35:34 +0200 | [diff] [blame] | 961 | /* we only wake the applet up if it was waiting for some data and is ready to consume it */ |
| 962 | if (!sc_ep_test(sc, SE_FL_WAIT_DATA) || sc_ep_test(sc, SE_FL_WONT_CONSUME)) |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 963 | return; |
| 964 | |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 965 | if (!channel_is_empty(oc)) { |
| 966 | /* (re)start sending */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 967 | appctx_wakeup(__sc_appctx(sc)); |
Christopher Faulet | 9ffddd5 | 2022-04-01 14:04:29 +0200 | [diff] [blame] | 968 | } |
| 969 | } |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 970 | |
| 971 | |
| 972 | /* This function is designed to be called from within the stream handler to |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 973 | * update the input channel's expiration timer and the stream connector's |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 974 | * Rx flags based on the channel's flags. It needs to be called only once |
| 975 | * after the channel's flags have settled down, and before they are cleared, |
| 976 | * though it doesn't harm to call it as often as desired (it just slightly |
| 977 | * hurts performance). It must not be called from outside of the stream |
| 978 | * handler, as what it does will be used to compute the stream task's |
| 979 | * expiration. |
| 980 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 981 | void sc_update_rx(struct stconn *sc) |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 982 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 983 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 984 | |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 985 | if (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 986 | return; |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 987 | |
Christopher Faulet | fab82bf | 2023-05-05 11:30:16 +0200 | [diff] [blame] | 988 | /* Unblock the SC if it needs room and the free space is large enough (0 |
| 989 | * means it can always be unblocked). Do not unblock it if -1 was |
| 990 | * specified. |
| 991 | */ |
| 992 | if (!sc->room_needed || (sc->room_needed > 0 && channel_recv_max(ic) >= sc->room_needed)) |
| 993 | sc_have_room(sc); |
| 994 | |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 995 | /* Read not closed, update FD status and timeout for reads */ |
| 996 | if (ic->flags & CF_DONT_READ) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 997 | sc_wont_read(sc); |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 998 | else |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 999 | sc_will_read(sc); |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1000 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1001 | sc_chk_rcv(sc); |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1002 | } |
| 1003 | |
| 1004 | /* This function is designed to be called from within the stream handler to |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1005 | * update the output channel's expiration timer and the stream connector's |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1006 | * Tx flags based on the channel's flags. It needs to be called only once |
| 1007 | * after the channel's flags have settled down, and before they are cleared, |
| 1008 | * though it doesn't harm to call it as often as desired (it just slightly |
| 1009 | * hurts performance). It must not be called from outside of the stream |
| 1010 | * handler, as what it does will be used to compute the stream task's |
| 1011 | * expiration. |
| 1012 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1013 | void sc_update_tx(struct stconn *sc) |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1014 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1015 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1016 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1017 | if (sc->flags & SC_FL_SHUT_DONE) |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1018 | return; |
| 1019 | |
| 1020 | /* Write not closed, update FD status and timeout for writes */ |
| 1021 | if (channel_is_empty(oc)) { |
| 1022 | /* stop writing */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1023 | if (!sc_ep_test(sc, SE_FL_WAIT_DATA)) { |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 1024 | if ((sc->flags & SC_FL_SHUT_WANTED) == 0) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1025 | sc_ep_set(sc, SE_FL_WAIT_DATA); |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1026 | } |
| 1027 | return; |
| 1028 | } |
| 1029 | |
Christopher Faulet | 15315d6 | 2023-02-20 08:23:51 +0100 | [diff] [blame] | 1030 | /* (re)start writing */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1031 | sc_ep_clr(sc, SE_FL_WAIT_DATA); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1032 | } |
| 1033 | |
Willy Tarreau | 19c65a9 | 2022-05-27 08:49:24 +0200 | [diff] [blame] | 1034 | /* This function is the equivalent to sc_update() except that it's |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1035 | * designed to be called from outside the stream handlers, typically the lower |
| 1036 | * layers (applets, connections) after I/O completion. After updating the stream |
| 1037 | * interface and timeouts, it will try to forward what can be forwarded, then to |
| 1038 | * wake the associated task up if an important event requires special handling. |
Willy Tarreau | 15252cd | 2022-05-25 16:36:21 +0200 | [diff] [blame] | 1039 | * It may update SE_FL_WAIT_DATA and/or SC_FL_NEED_ROOM, that the callers are |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1040 | * encouraged to watch to take appropriate action. |
Willy Tarreau | 19c65a9 | 2022-05-27 08:49:24 +0200 | [diff] [blame] | 1041 | * It should not be called from within the stream itself, sc_update() |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1042 | * is designed for this. |
| 1043 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1044 | static void sc_notify(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1045 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1046 | struct channel *ic = sc_ic(sc); |
| 1047 | struct channel *oc = sc_oc(sc); |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1048 | struct stconn *sco = sc_opposite(sc); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1049 | struct task *task = sc_strm_task(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1050 | |
| 1051 | /* process consumer side */ |
| 1052 | if (channel_is_empty(oc)) { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1053 | struct connection *conn = sc_conn(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1054 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1055 | if (((sc->flags & (SC_FL_SHUT_DONE|SC_FL_SHUT_WANTED)) == SC_FL_SHUT_WANTED) && |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1056 | (sc->state == SC_ST_EST) && (!conn || !(conn->flags & (CO_FL_WAIT_XPRT | CO_FL_EARLY_SSL_HS)))) |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 1057 | sc_shutdown(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1058 | } |
| 1059 | |
| 1060 | /* indicate that we may be waiting for data from the output channel or |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 1061 | * we're about to close and can't expect more data if SC_FL_SHUT_WANTED is there. |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1062 | */ |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1063 | if (!(sc->flags & (SC_FL_SHUT_DONE|SC_FL_SHUT_WANTED))) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1064 | sc_ep_set(sc, SE_FL_WAIT_DATA); |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1065 | else if ((sc->flags & (SC_FL_SHUT_DONE|SC_FL_SHUT_WANTED)) == SC_FL_SHUT_WANTED) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1066 | sc_ep_clr(sc, SE_FL_WAIT_DATA); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1067 | |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1068 | if (oc->flags & CF_DONT_READ) |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1069 | sc_wont_read(sco); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1070 | else |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1071 | sc_will_read(sco); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1072 | |
| 1073 | /* Notify the other side when we've injected data into the IC that |
| 1074 | * needs to be forwarded. We can do fast-forwarding as soon as there |
| 1075 | * are output data, but we avoid doing this if some of the data are |
| 1076 | * not yet scheduled for being forwarded, because it is very likely |
| 1077 | * that it will be done again immediately afterwards once the following |
Willy Tarreau | 15252cd | 2022-05-25 16:36:21 +0200 | [diff] [blame] | 1078 | * data are parsed (eg: HTTP chunking). We only clear SC_FL_NEED_ROOM |
| 1079 | * once we've emptied *some* of the output buffer, and not just when |
| 1080 | * there is available room, because applets are often forced to stop |
| 1081 | * before the buffer is full. We must not stop based on input data |
| 1082 | * alone because an HTTP parser might need more data to complete the |
| 1083 | * parsing. |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1084 | */ |
| 1085 | if (!channel_is_empty(ic) && |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1086 | sc_ep_test(sco, SE_FL_WAIT_DATA) && |
Christopher Faulet | 84d3ef9 | 2023-03-17 15:45:58 +0100 | [diff] [blame] | 1087 | (!(sc->flags & SC_FL_SND_EXP_MORE) || c_full(ic) || ci_data(ic) == 0 || ic->pipe)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1088 | int new_len, last_len; |
| 1089 | |
| 1090 | last_len = co_data(ic); |
| 1091 | if (ic->pipe) |
| 1092 | last_len += ic->pipe->data; |
| 1093 | |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1094 | sc_chk_snd(sco); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1095 | |
| 1096 | new_len = co_data(ic); |
| 1097 | if (ic->pipe) |
| 1098 | new_len += ic->pipe->data; |
| 1099 | |
| 1100 | /* check if the consumer has freed some space either in the |
| 1101 | * buffer or in the pipe. |
| 1102 | */ |
Christopher Faulet | 18b3309 | 2023-05-05 11:40:07 +0200 | [diff] [blame] | 1103 | if (!sc->room_needed || (new_len < last_len && (sc->room_needed < 0 || channel_recv_max(ic) >= sc->room_needed))) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1104 | sc_have_room(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1105 | } |
| 1106 | |
| 1107 | if (!(ic->flags & CF_DONT_READ)) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1108 | sc_will_read(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1109 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1110 | sc_chk_rcv(sc); |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1111 | sc_chk_rcv(sco); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1112 | |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1113 | /* wake the task up only when needed */ |
Christopher Faulet | 285f761 | 2022-12-12 08:28:55 +0100 | [diff] [blame] | 1114 | if (/* changes on the production side that must be handled: |
Christopher Faulet | ad46e52 | 2023-04-14 11:59:15 +0200 | [diff] [blame] | 1115 | * - An error on receipt: SC_FL_ERROR |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1116 | * - A read event: shutdown for reads (CF_READ_EVENT + EOS/ABRT_DONE) |
Christopher Faulet | 904763f | 2023-03-22 14:53:11 +0100 | [diff] [blame] | 1117 | * end of input (CF_READ_EVENT + SC_FL_EOI) |
Christopher Faulet | 285f761 | 2022-12-12 08:28:55 +0100 | [diff] [blame] | 1118 | * data received and no fast-forwarding (CF_READ_EVENT + !to_forward) |
| 1119 | * read event while consumer side is not established (CF_READ_EVENT + sco->state != SC_ST_EST) |
| 1120 | */ |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1121 | ((ic->flags & CF_READ_EVENT) && ((sc->flags & SC_FL_EOI) || (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) || !ic->to_forward || sco->state != SC_ST_EST)) || |
Christopher Faulet | 25d9fe5 | 2023-04-14 12:09:35 +0200 | [diff] [blame] | 1122 | (sc->flags & SC_FL_ERROR) || |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1123 | |
| 1124 | /* changes on the consumption side */ |
Christopher Faulet | 2e56a73 | 2023-01-26 16:18:09 +0100 | [diff] [blame] | 1125 | sc_ep_test(sc, SE_FL_ERR_PENDING) || |
Christopher Faulet | d898841 | 2022-12-20 18:10:04 +0100 | [diff] [blame] | 1126 | ((oc->flags & CF_WRITE_EVENT) && |
| 1127 | ((sc->state < SC_ST_EST) || |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1128 | (sc->flags & SC_FL_SHUT_DONE) || |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1129 | (((oc->flags & CF_WAKE_WRITE) || |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 1130 | (!(oc->flags & CF_AUTO_CLOSE) && |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1131 | !(sc->flags & (SC_FL_SHUT_WANTED|SC_FL_SHUT_DONE)))) && |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 1132 | (sco->state != SC_ST_EST || |
| 1133 | (channel_is_empty(oc) && !oc->to_forward)))))) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1134 | task_wakeup(task, TASK_WOKEN_IO); |
| 1135 | } |
Christopher Faulet | 2e56a73 | 2023-01-26 16:18:09 +0100 | [diff] [blame] | 1136 | if (ic->flags & CF_READ_EVENT) |
Christopher Faulet | 9a790f6 | 2023-03-16 14:40:03 +0100 | [diff] [blame] | 1137 | sc->flags &= ~SC_FL_RCV_ONCE; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1138 | } |
| 1139 | |
| 1140 | /* |
Christopher Faulet | 1aec6c9 | 2023-04-17 17:29:29 +0200 | [diff] [blame] | 1141 | * This function propagates an end-of-stream received on a socket-based connection. |
Willy Tarreau | cb04166 | 2022-05-17 19:44:42 +0200 | [diff] [blame] | 1142 | * It updates the stream connector. If the stream connector has SC_FL_NOHALF, |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1143 | * the close is also forwarded to the write side as an abort. |
| 1144 | */ |
Christopher Faulet | 1aec6c9 | 2023-04-17 17:29:29 +0200 | [diff] [blame] | 1145 | static void sc_conn_eos(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1146 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1147 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1148 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1149 | BUG_ON(!sc_conn(sc)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1150 | |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1151 | if (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1152 | return; |
Christopher Faulet | 1aec6c9 | 2023-04-17 17:29:29 +0200 | [diff] [blame] | 1153 | sc->flags |= SC_FL_EOS; |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 1154 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 4c13568 | 2023-02-16 11:09:31 +0100 | [diff] [blame] | 1155 | sc_ep_report_read_activity(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1156 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1157 | if (!sc_state_in(sc->state, SC_SB_CON|SC_SB_RDY|SC_SB_EST)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1158 | return; |
| 1159 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1160 | if (sc->flags & SC_FL_SHUT_DONE) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1161 | goto do_close; |
| 1162 | |
Christopher Faulet | b2b1c3a | 2023-04-13 16:23:48 +0200 | [diff] [blame] | 1163 | if (sc_cond_forward_shut(sc)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1164 | /* we want to immediately forward this close to the write side */ |
| 1165 | /* force flag on ssl to keep stream in cache */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1166 | sc_conn_shutw(sc, CO_SHW_SILENT); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1167 | goto do_close; |
| 1168 | } |
| 1169 | |
| 1170 | /* otherwise that's just a normal read shutdown */ |
| 1171 | return; |
| 1172 | |
| 1173 | do_close: |
Willy Tarreau | f61dd19 | 2022-05-27 09:00:19 +0200 | [diff] [blame] | 1174 | /* OK we completely close the socket here just as if we went through sc_shut[rw]() */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1175 | sc_conn_shut(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1176 | |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 1177 | sc->flags &= ~SC_FL_SHUT_WANTED; |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1178 | sc->flags |= SC_FL_SHUT_DONE; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1179 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1180 | sc->state = SC_ST_DIS; |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 1181 | if (sc->flags & SC_FL_ISBACK) |
| 1182 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1183 | return; |
| 1184 | } |
| 1185 | |
| 1186 | /* |
| 1187 | * This is the callback which is called by the connection layer to receive data |
| 1188 | * into the buffer from the connection. It iterates over the mux layer's |
| 1189 | * rcv_buf function. |
| 1190 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1191 | static int sc_conn_recv(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1192 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1193 | struct connection *conn = __sc_conn(sc); |
| 1194 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1195 | int ret, max, cur_read = 0; |
| 1196 | int read_poll = MAX_READ_POLL_LOOPS; |
| 1197 | int flags = 0; |
| 1198 | |
| 1199 | /* If not established yet, do nothing. */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1200 | if (sc->state != SC_ST_EST) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1201 | return 0; |
| 1202 | |
Willy Tarreau | 462b989 | 2022-05-18 18:06:53 +0200 | [diff] [blame] | 1203 | /* If another call to sc_conn_recv() failed, and we subscribed to |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1204 | * recv events already, give up now. |
| 1205 | */ |
Christopher Faulet | 9512588 | 2023-04-12 18:35:18 +0200 | [diff] [blame] | 1206 | if ((sc->wait_event.events & SUB_RETRY_RECV) || sc_waiting_room(sc)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1207 | return 0; |
| 1208 | |
Christopher Faulet | cfc11c0 | 2023-04-13 16:10:23 +0200 | [diff] [blame] | 1209 | /* maybe we were called immediately after an asynchronous abort */ |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1210 | if (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1211 | return 1; |
| 1212 | |
| 1213 | /* we must wait because the mux is not installed yet */ |
| 1214 | if (!conn->mux) |
| 1215 | return 0; |
| 1216 | |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1217 | /* stop immediately on errors. Note that we DON'T want to stop on |
| 1218 | * POLL_ERR, as the poller might report a write error while there |
| 1219 | * are still data available in the recv buffer. This typically |
| 1220 | * happens when we send too large a request to a backend server |
| 1221 | * which rejects it before reading it all. |
| 1222 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1223 | if (!sc_ep_test(sc, SE_FL_RCV_MORE)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1224 | if (!conn_xprt_ready(conn)) |
| 1225 | return 0; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1226 | if (sc_ep_test(sc, SE_FL_ERROR)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1227 | goto end_recv; |
| 1228 | } |
| 1229 | |
| 1230 | /* prepare to detect if the mux needs more room */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1231 | sc_ep_clr(sc, SE_FL_WANT_ROOM); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1232 | |
| 1233 | if ((ic->flags & (CF_STREAMER | CF_STREAMER_FAST)) && !co_data(ic) && |
| 1234 | global.tune.idle_timer && |
| 1235 | (unsigned short)(now_ms - ic->last_read) >= global.tune.idle_timer) { |
| 1236 | /* The buffer was empty and nothing was transferred for more |
| 1237 | * than one second. This was caused by a pause and not by |
| 1238 | * congestion. Reset any streaming mode to reduce latency. |
| 1239 | */ |
| 1240 | ic->xfer_small = 0; |
| 1241 | ic->xfer_large = 0; |
| 1242 | ic->flags &= ~(CF_STREAMER | CF_STREAMER_FAST); |
| 1243 | } |
| 1244 | |
| 1245 | /* First, let's see if we may splice data across the channel without |
| 1246 | * using a buffer. |
| 1247 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1248 | if (sc_ep_test(sc, SE_FL_MAY_SPLICE) && |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1249 | (ic->pipe || ic->to_forward >= MIN_SPLICE_FORWARD) && |
| 1250 | ic->flags & CF_KERN_SPLICING) { |
| 1251 | if (c_data(ic)) { |
| 1252 | /* We're embarrassed, there are already data pending in |
| 1253 | * the buffer and we don't want to have them at two |
| 1254 | * locations at a time. Let's indicate we need some |
| 1255 | * place and ask the consumer to hurry. |
| 1256 | */ |
| 1257 | flags |= CO_RFL_BUF_FLUSH; |
| 1258 | goto abort_splice; |
| 1259 | } |
| 1260 | |
| 1261 | if (unlikely(ic->pipe == NULL)) { |
| 1262 | if (pipes_used >= global.maxpipes || !(ic->pipe = get_pipe())) { |
| 1263 | ic->flags &= ~CF_KERN_SPLICING; |
| 1264 | goto abort_splice; |
| 1265 | } |
| 1266 | } |
| 1267 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1268 | ret = conn->mux->rcv_pipe(sc, ic->pipe, ic->to_forward); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1269 | if (ret < 0) { |
| 1270 | /* splice not supported on this end, let's disable it */ |
| 1271 | ic->flags &= ~CF_KERN_SPLICING; |
| 1272 | goto abort_splice; |
| 1273 | } |
| 1274 | |
| 1275 | if (ret > 0) { |
| 1276 | if (ic->to_forward != CHN_INFINITE_FORWARD) |
| 1277 | ic->to_forward -= ret; |
| 1278 | ic->total += ret; |
| 1279 | cur_read += ret; |
Christopher Faulet | 285f761 | 2022-12-12 08:28:55 +0100 | [diff] [blame] | 1280 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1281 | } |
| 1282 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1283 | if (sc_ep_test(sc, SE_FL_EOS | SE_FL_ERROR)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1284 | goto end_recv; |
| 1285 | |
| 1286 | if (conn->flags & CO_FL_WAIT_ROOM) { |
| 1287 | /* the pipe is full or we have read enough data that it |
| 1288 | * could soon be full. Let's stop before needing to poll. |
| 1289 | */ |
Christopher Faulet | 7b3d38a | 2023-05-05 11:28:45 +0200 | [diff] [blame] | 1290 | sc_need_room(sc, 0); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1291 | goto done_recv; |
| 1292 | } |
| 1293 | |
| 1294 | /* splice not possible (anymore), let's go on on standard copy */ |
| 1295 | } |
| 1296 | |
| 1297 | abort_splice: |
| 1298 | if (ic->pipe && unlikely(!ic->pipe->data)) { |
| 1299 | put_pipe(ic->pipe); |
| 1300 | ic->pipe = NULL; |
| 1301 | } |
| 1302 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1303 | if (ic->pipe && ic->to_forward && !(flags & CO_RFL_BUF_FLUSH) && sc_ep_test(sc, SE_FL_MAY_SPLICE)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1304 | /* don't break splicing by reading, but still call rcv_buf() |
| 1305 | * to pass the flag. |
| 1306 | */ |
| 1307 | goto done_recv; |
| 1308 | } |
| 1309 | |
| 1310 | /* now we'll need a input buffer for the stream */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1311 | if (!sc_alloc_ibuf(sc, &(__sc_strm(sc)->buffer_wait))) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1312 | goto end_recv; |
| 1313 | |
| 1314 | /* For an HTX stream, if the buffer is stuck (no output data with some |
| 1315 | * input data) and if the HTX message is fragmented or if its free space |
| 1316 | * wraps, we force an HTX deframentation. It is a way to have a |
| 1317 | * contiguous free space nad to let the mux to copy as much data as |
| 1318 | * possible. |
| 1319 | * |
| 1320 | * NOTE: A possible optim may be to let the mux decides if defrag is |
| 1321 | * required or not, depending on amount of data to be xferred. |
| 1322 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1323 | if (IS_HTX_STRM(__sc_strm(sc)) && !co_data(ic)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1324 | struct htx *htx = htxbuf(&ic->buf); |
| 1325 | |
| 1326 | if (htx_is_not_empty(htx) && ((htx->flags & HTX_FL_FRAGMENTED) || htx_space_wraps(htx))) |
| 1327 | htx_defrag(htx, NULL, 0); |
| 1328 | } |
| 1329 | |
| 1330 | /* Instruct the mux it must subscribed for read events */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1331 | flags |= ((!conn_is_back(conn) && (__sc_strm(sc)->be->options & PR_O_ABRT_CLOSE)) ? CO_RFL_KEEP_RECV : 0); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1332 | |
| 1333 | /* Important note : if we're called with POLL_IN|POLL_HUP, it means the read polling |
| 1334 | * was enabled, which implies that the recv buffer was not full. So we have a guarantee |
| 1335 | * that if such an event is not handled above in splice, it will be handled here by |
| 1336 | * recv(). |
| 1337 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1338 | while (sc_ep_test(sc, SE_FL_RCV_MORE) || |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1339 | (!(conn->flags & CO_FL_HANDSHAKE) && |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1340 | (!sc_ep_test(sc, SE_FL_ERROR | SE_FL_EOS)) && !(sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)))) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1341 | int cur_flags = flags; |
| 1342 | |
| 1343 | /* Compute transient CO_RFL_* flags */ |
| 1344 | if (co_data(ic)) { |
| 1345 | cur_flags |= (CO_RFL_BUF_WET | CO_RFL_BUF_NOT_STUCK); |
| 1346 | } |
| 1347 | |
| 1348 | /* <max> may be null. This is the mux responsibility to set |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1349 | * SE_FL_RCV_MORE on the SC if more space is needed. |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1350 | */ |
| 1351 | max = channel_recv_max(ic); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1352 | ret = conn->mux->rcv_buf(sc, &ic->buf, max, cur_flags); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1353 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1354 | if (sc_ep_test(sc, SE_FL_WANT_ROOM)) { |
Willy Tarreau | b605c42 | 2022-05-17 17:04:55 +0200 | [diff] [blame] | 1355 | /* SE_FL_WANT_ROOM must not be reported if the channel's |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1356 | * buffer is empty. |
| 1357 | */ |
| 1358 | BUG_ON(c_empty(ic)); |
| 1359 | |
Christopher Faulet | 7b3d38a | 2023-05-05 11:28:45 +0200 | [diff] [blame] | 1360 | sc_need_room(sc, channel_recv_max(ic) + 1); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1361 | /* Add READ_PARTIAL because some data are pending but |
| 1362 | * cannot be xferred to the channel |
| 1363 | */ |
Christopher Faulet | 285f761 | 2022-12-12 08:28:55 +0100 | [diff] [blame] | 1364 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1365 | } |
| 1366 | |
| 1367 | if (ret <= 0) { |
| 1368 | /* if we refrained from reading because we asked for a |
| 1369 | * flush to satisfy rcv_pipe(), we must not subscribe |
| 1370 | * and instead report that there's not enough room |
| 1371 | * here to proceed. |
| 1372 | */ |
| 1373 | if (flags & CO_RFL_BUF_FLUSH) |
Christopher Faulet | 7b3d38a | 2023-05-05 11:28:45 +0200 | [diff] [blame] | 1374 | sc_need_room(sc, -1); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1375 | break; |
| 1376 | } |
| 1377 | |
| 1378 | cur_read += ret; |
| 1379 | |
| 1380 | /* if we're allowed to directly forward data, we must update ->o */ |
Christopher Faulet | 64350bb | 2023-04-13 16:37:37 +0200 | [diff] [blame] | 1381 | if (ic->to_forward && !(sc_opposite(sc)->flags & (SC_FL_SHUT_DONE|SC_FL_SHUT_WANTED))) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1382 | unsigned long fwd = ret; |
| 1383 | if (ic->to_forward != CHN_INFINITE_FORWARD) { |
| 1384 | if (fwd > ic->to_forward) |
| 1385 | fwd = ic->to_forward; |
| 1386 | ic->to_forward -= fwd; |
| 1387 | } |
| 1388 | c_adv(ic, fwd); |
| 1389 | } |
| 1390 | |
Christopher Faulet | 285f761 | 2022-12-12 08:28:55 +0100 | [diff] [blame] | 1391 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1392 | ic->total += ret; |
| 1393 | |
| 1394 | /* End-of-input reached, we can leave. In this case, it is |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1395 | * important to break the loop to not block the SC because of |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1396 | * the channel's policies.This way, we are still able to receive |
| 1397 | * shutdowns. |
| 1398 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1399 | if (sc_ep_test(sc, SE_FL_EOI)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1400 | break; |
| 1401 | |
Christopher Faulet | 9a790f6 | 2023-03-16 14:40:03 +0100 | [diff] [blame] | 1402 | if ((sc->flags & SC_FL_RCV_ONCE) || --read_poll <= 0) { |
| 1403 | /* we don't expect to read more data */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1404 | sc_wont_read(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1405 | break; |
| 1406 | } |
| 1407 | |
| 1408 | /* if too many bytes were missing from last read, it means that |
| 1409 | * it's pointless trying to read again because the system does |
| 1410 | * not have them in buffers. |
| 1411 | */ |
| 1412 | if (ret < max) { |
| 1413 | /* if a streamer has read few data, it may be because we |
| 1414 | * have exhausted system buffers. It's not worth trying |
| 1415 | * again. |
| 1416 | */ |
| 1417 | if (ic->flags & CF_STREAMER) { |
| 1418 | /* we're stopped by the channel's policy */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1419 | sc_wont_read(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1420 | break; |
| 1421 | } |
| 1422 | |
| 1423 | /* if we read a large block smaller than what we requested, |
| 1424 | * it's almost certain we'll never get anything more. |
| 1425 | */ |
| 1426 | if (ret >= global.tune.recv_enough) { |
| 1427 | /* we're stopped by the channel's policy */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1428 | sc_wont_read(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1429 | break; |
| 1430 | } |
| 1431 | } |
| 1432 | |
| 1433 | /* if we are waiting for more space, don't try to read more data |
| 1434 | * right now. |
| 1435 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1436 | if (sc->flags & (SC_FL_WONT_READ|SC_FL_NEED_BUFF|SC_FL_NEED_ROOM)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1437 | break; |
| 1438 | } /* while !flags */ |
| 1439 | |
| 1440 | done_recv: |
| 1441 | if (cur_read) { |
| 1442 | if ((ic->flags & (CF_STREAMER | CF_STREAMER_FAST)) && |
| 1443 | (cur_read <= ic->buf.size / 2)) { |
| 1444 | ic->xfer_large = 0; |
| 1445 | ic->xfer_small++; |
| 1446 | if (ic->xfer_small >= 3) { |
| 1447 | /* we have read less than half of the buffer in |
| 1448 | * one pass, and this happened at least 3 times. |
| 1449 | * This is definitely not a streamer. |
| 1450 | */ |
| 1451 | ic->flags &= ~(CF_STREAMER | CF_STREAMER_FAST); |
| 1452 | } |
| 1453 | else if (ic->xfer_small >= 2) { |
| 1454 | /* if the buffer has been at least half full twice, |
| 1455 | * we receive faster than we send, so at least it |
| 1456 | * is not a "fast streamer". |
| 1457 | */ |
| 1458 | ic->flags &= ~CF_STREAMER_FAST; |
| 1459 | } |
| 1460 | } |
| 1461 | else if (!(ic->flags & CF_STREAMER_FAST) && |
| 1462 | (cur_read >= ic->buf.size - global.tune.maxrewrite)) { |
| 1463 | /* we read a full buffer at once */ |
| 1464 | ic->xfer_small = 0; |
| 1465 | ic->xfer_large++; |
| 1466 | if (ic->xfer_large >= 3) { |
| 1467 | /* we call this buffer a fast streamer if it manages |
| 1468 | * to be filled in one call 3 consecutive times. |
| 1469 | */ |
| 1470 | ic->flags |= (CF_STREAMER | CF_STREAMER_FAST); |
| 1471 | } |
| 1472 | } |
| 1473 | else { |
| 1474 | ic->xfer_small = 0; |
| 1475 | ic->xfer_large = 0; |
| 1476 | } |
| 1477 | ic->last_read = now_ms; |
Christopher Faulet | 4c13568 | 2023-02-16 11:09:31 +0100 | [diff] [blame] | 1478 | sc_ep_report_read_activity(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1479 | } |
| 1480 | |
| 1481 | end_recv: |
| 1482 | ret = (cur_read != 0); |
| 1483 | |
| 1484 | /* Report EOI on the channel if it was reached from the mux point of |
| 1485 | * view. */ |
Christopher Faulet | 904763f | 2023-03-22 14:53:11 +0100 | [diff] [blame] | 1486 | if (sc_ep_test(sc, SE_FL_EOI) && !(sc->flags & SC_FL_EOI)) { |
Christopher Faulet | 4c13568 | 2023-02-16 11:09:31 +0100 | [diff] [blame] | 1487 | sc_ep_report_read_activity(sc); |
Christopher Faulet | 904763f | 2023-03-22 14:53:11 +0100 | [diff] [blame] | 1488 | sc->flags |= SC_FL_EOI; |
| 1489 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1490 | ret = 1; |
| 1491 | } |
| 1492 | |
Christopher Faulet | b208d8c | 2023-03-21 11:25:21 +0100 | [diff] [blame] | 1493 | if (sc_ep_test(sc, SE_FL_EOS)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1494 | /* we received a shutdown */ |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1495 | if (ic->flags & CF_AUTO_CLOSE) |
Christopher Faulet | df7cd71 | 2023-04-13 15:56:26 +0200 | [diff] [blame] | 1496 | sc_schedule_shutdown(sc_opposite(sc)); |
Christopher Faulet | 1aec6c9 | 2023-04-17 17:29:29 +0200 | [diff] [blame] | 1497 | sc_conn_eos(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1498 | ret = 1; |
| 1499 | } |
Christopher Faulet | b208d8c | 2023-03-21 11:25:21 +0100 | [diff] [blame] | 1500 | |
Christopher Faulet | a1d14a7 | 2023-04-14 10:42:08 +0200 | [diff] [blame] | 1501 | if (sc_ep_test(sc, SE_FL_ERROR)) { |
| 1502 | sc->flags |= SC_FL_ERROR; |
Christopher Faulet | b208d8c | 2023-03-21 11:25:21 +0100 | [diff] [blame] | 1503 | ret = 1; |
Christopher Faulet | a1d14a7 | 2023-04-14 10:42:08 +0200 | [diff] [blame] | 1504 | } |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1505 | else if (!(sc->flags & (SC_FL_WONT_READ|SC_FL_NEED_BUFF|SC_FL_NEED_ROOM)) && |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1506 | !(sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE))) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1507 | /* Subscribe to receive events if we're blocking on I/O */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1508 | conn->mux->subscribe(sc, SUB_RETRY_RECV, &sc->wait_event); |
| 1509 | se_have_no_more_data(sc->sedesc); |
Christopher Faulet | b208d8c | 2023-03-21 11:25:21 +0100 | [diff] [blame] | 1510 | } |
| 1511 | else { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1512 | se_have_more_data(sc->sedesc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1513 | ret = 1; |
| 1514 | } |
Christopher Faulet | 8019f78 | 2023-03-23 17:30:29 +0100 | [diff] [blame] | 1515 | |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1516 | return ret; |
| 1517 | } |
| 1518 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1519 | /* This tries to perform a synchronous receive on the stream connector to |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1520 | * try to collect last arrived data. In practice it's only implemented on |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1521 | * stconns. Returns 0 if nothing was done, non-zero if new data or a |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1522 | * shutdown were collected. This may result on some delayed receive calls |
| 1523 | * to be programmed and performed later, though it doesn't provide any |
| 1524 | * such guarantee. |
| 1525 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1526 | int sc_conn_sync_recv(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1527 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1528 | if (!sc_state_in(sc->state, SC_SB_RDY|SC_SB_EST)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1529 | return 0; |
| 1530 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1531 | if (!sc_mux_ops(sc)) |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1532 | return 0; // only stconns are supported |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1533 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1534 | if (sc->wait_event.events & SUB_RETRY_RECV) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1535 | return 0; // already subscribed |
| 1536 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1537 | if (!sc_is_recv_allowed(sc)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1538 | return 0; // already failed |
| 1539 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1540 | return sc_conn_recv(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1541 | } |
| 1542 | |
| 1543 | /* |
| 1544 | * This function is called to send buffer data to a stream socket. |
| 1545 | * It calls the mux layer's snd_buf function. It relies on the |
| 1546 | * caller to commit polling changes. The caller should check conn->flags |
| 1547 | * for errors. |
| 1548 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1549 | static int sc_conn_send(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1550 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1551 | struct connection *conn = __sc_conn(sc); |
Christopher Faulet | 904763f | 2023-03-22 14:53:11 +0100 | [diff] [blame] | 1552 | struct stconn *sco = sc_opposite(sc); |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1553 | struct stream *s = __sc_strm(sc); |
| 1554 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1555 | int ret; |
| 1556 | int did_send = 0; |
| 1557 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1558 | if (sc_ep_test(sc, SE_FL_ERROR | SE_FL_ERR_PENDING) || sc_is_conn_error(sc)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1559 | /* We're probably there because the tasklet was woken up, |
| 1560 | * but process_stream() ran before, detected there were an |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1561 | * error and put the SC back to SC_ST_TAR. There's still |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1562 | * CO_FL_ERROR on the connection but we don't want to add |
Willy Tarreau | b605c42 | 2022-05-17 17:04:55 +0200 | [diff] [blame] | 1563 | * SE_FL_ERROR back, so give up |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1564 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1565 | if (sc->state < SC_ST_CON) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1566 | return 0; |
Christopher Faulet | 56a2b60 | 2023-04-14 09:42:59 +0200 | [diff] [blame] | 1567 | BUG_ON(sc_ep_test(sc, SE_FL_EOS|SE_FL_ERROR|SE_FL_ERR_PENDING) == (SE_FL_EOS|SE_FL_ERR_PENDING)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1568 | return 1; |
| 1569 | } |
| 1570 | |
| 1571 | /* We're already waiting to be able to send, give up */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1572 | if (sc->wait_event.events & SUB_RETRY_SEND) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1573 | return 0; |
| 1574 | |
| 1575 | /* we might have been called just after an asynchronous shutw */ |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1576 | if (sc->flags & SC_FL_SHUT_DONE) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1577 | return 1; |
| 1578 | |
| 1579 | /* we must wait because the mux is not installed yet */ |
| 1580 | if (!conn->mux) |
| 1581 | return 0; |
| 1582 | |
| 1583 | if (oc->pipe && conn->xprt->snd_pipe && conn->mux->snd_pipe) { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1584 | ret = conn->mux->snd_pipe(sc, oc->pipe); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1585 | if (ret > 0) |
| 1586 | did_send = 1; |
| 1587 | |
| 1588 | if (!oc->pipe->data) { |
| 1589 | put_pipe(oc->pipe); |
| 1590 | oc->pipe = NULL; |
| 1591 | } |
| 1592 | |
| 1593 | if (oc->pipe) |
| 1594 | goto end; |
| 1595 | } |
| 1596 | |
| 1597 | /* At this point, the pipe is empty, but we may still have data pending |
| 1598 | * in the normal buffer. |
| 1599 | */ |
| 1600 | if (co_data(oc)) { |
| 1601 | /* when we're here, we already know that there is no spliced |
| 1602 | * data left, and that there are sendable buffered data. |
| 1603 | */ |
| 1604 | |
| 1605 | /* check if we want to inform the kernel that we're interested in |
| 1606 | * sending more data after this call. We want this if : |
| 1607 | * - we're about to close after this last send and want to merge |
| 1608 | * the ongoing FIN with the last segment. |
| 1609 | * - we know we can't send everything at once and must get back |
| 1610 | * here because of unaligned data |
| 1611 | * - there is still a finite amount of data to forward |
| 1612 | * The test is arranged so that the most common case does only 2 |
| 1613 | * tests. |
| 1614 | */ |
| 1615 | unsigned int send_flag = 0; |
| 1616 | |
Christopher Faulet | 68ef218 | 2023-03-17 15:38:18 +0100 | [diff] [blame] | 1617 | if ((!(sc->flags & (SC_FL_SND_ASAP|SC_FL_SND_NEVERWAIT)) && |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1618 | ((oc->to_forward && oc->to_forward != CHN_INFINITE_FORWARD) || |
Christopher Faulet | 84d3ef9 | 2023-03-17 15:45:58 +0100 | [diff] [blame] | 1619 | (sc->flags & SC_FL_SND_EXP_MORE) || |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1620 | (IS_HTX_STRM(s) && |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1621 | (!(sco->flags & (SC_FL_EOI|SC_FL_EOS|SC_FL_ABRT_DONE)) && htx_expect_more(htxbuf(&oc->buf)))))) || |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1622 | ((oc->flags & CF_ISRESP) && |
Christopher Faulet | 87633c3 | 2023-04-03 18:32:50 +0200 | [diff] [blame] | 1623 | (oc->flags & CF_AUTO_CLOSE) && |
Christopher Faulet | e38534c | 2023-04-13 15:45:24 +0200 | [diff] [blame] | 1624 | (sc->flags & SC_FL_SHUT_WANTED))) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1625 | send_flag |= CO_SFL_MSG_MORE; |
| 1626 | |
| 1627 | if (oc->flags & CF_STREAMER) |
| 1628 | send_flag |= CO_SFL_STREAMER; |
| 1629 | |
| 1630 | if (s->txn && s->txn->flags & TX_L7_RETRY && !b_data(&s->txn->l7_buffer)) { |
| 1631 | /* If we want to be able to do L7 retries, copy |
| 1632 | * the data we're about to send, so that we are able |
| 1633 | * to resend them if needed |
| 1634 | */ |
| 1635 | /* Try to allocate a buffer if we had none. |
| 1636 | * If it fails, the next test will just |
| 1637 | * disable the l7 retries by setting |
| 1638 | * l7_conn_retries to 0. |
| 1639 | */ |
| 1640 | if (s->txn->req.msg_state != HTTP_MSG_DONE) |
| 1641 | s->txn->flags &= ~TX_L7_RETRY; |
| 1642 | else { |
| 1643 | if (b_alloc(&s->txn->l7_buffer) == NULL) |
| 1644 | s->txn->flags &= ~TX_L7_RETRY; |
| 1645 | else { |
| 1646 | memcpy(b_orig(&s->txn->l7_buffer), |
| 1647 | b_orig(&oc->buf), |
| 1648 | b_size(&oc->buf)); |
| 1649 | s->txn->l7_buffer.head = co_data(oc); |
| 1650 | b_add(&s->txn->l7_buffer, co_data(oc)); |
| 1651 | } |
| 1652 | |
| 1653 | } |
| 1654 | } |
| 1655 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1656 | ret = conn->mux->snd_buf(sc, &oc->buf, co_data(oc), send_flag); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1657 | if (ret > 0) { |
| 1658 | did_send = 1; |
| 1659 | c_rew(oc, ret); |
| 1660 | c_realign_if_empty(oc); |
| 1661 | |
| 1662 | if (!co_data(oc)) { |
| 1663 | /* Always clear both flags once everything has been sent, they're one-shot */ |
Christopher Faulet | 84d3ef9 | 2023-03-17 15:45:58 +0100 | [diff] [blame] | 1664 | sc->flags &= ~(SC_FL_SND_ASAP|SC_FL_SND_EXP_MORE); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1665 | } |
| 1666 | /* if some data remain in the buffer, it's only because the |
| 1667 | * system buffers are full, we will try next time. |
| 1668 | */ |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1669 | } |
| 1670 | } |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1671 | |
| 1672 | end: |
| 1673 | if (did_send) { |
Christopher Faulet | d898841 | 2022-12-20 18:10:04 +0100 | [diff] [blame] | 1674 | oc->flags |= CF_WRITE_EVENT | CF_WROTE_DATA; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1675 | if (sc->state == SC_ST_CON) |
| 1676 | sc->state = SC_ST_RDY; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1677 | } |
| 1678 | |
Christopher Faulet | e7405d4 | 2023-05-05 11:40:30 +0200 | [diff] [blame] | 1679 | if (!sco->room_needed || (did_send && (sco->room_needed < 0 || channel_recv_max(sc_oc(sc)) >= sco->room_needed))) |
| 1680 | sc_have_room(sco); |
| 1681 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1682 | if (sc_ep_test(sc, SE_FL_ERROR | SE_FL_ERR_PENDING)) { |
Christopher Faulet | 2e56a73 | 2023-01-26 16:18:09 +0100 | [diff] [blame] | 1683 | oc->flags |= CF_WRITE_EVENT; |
Christopher Faulet | 56a2b60 | 2023-04-14 09:42:59 +0200 | [diff] [blame] | 1684 | BUG_ON(sc_ep_test(sc, SE_FL_EOS|SE_FL_ERROR|SE_FL_ERR_PENDING) == (SE_FL_EOS|SE_FL_ERR_PENDING)); |
Christopher Faulet | d0c57d3 | 2023-04-18 18:38:32 +0200 | [diff] [blame] | 1685 | if (sc_ep_test(sc, SE_FL_ERROR)) |
| 1686 | sc->flags |= SC_FL_ERROR; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1687 | return 1; |
| 1688 | } |
| 1689 | |
Christopher Faulet | 59b240c | 2023-02-27 16:38:12 +0100 | [diff] [blame] | 1690 | if (channel_is_empty(oc)) |
| 1691 | sc_ep_report_send_activity(sc); |
| 1692 | else { |
| 1693 | /* We couldn't send all of our data, let the mux know we'd like to send more */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1694 | conn->mux->subscribe(sc, SUB_RETRY_SEND, &sc->wait_event); |
Christopher Faulet | 8353897 | 2023-08-30 10:56:21 +0200 | [diff] [blame^] | 1695 | if (sc_state_in(sc->state, SC_SB_EST|SC_SB_DIS|SC_SB_CLO)) { |
| 1696 | sc_ep_report_blocked_send(sc); |
| 1697 | s->task->expire = tick_first(s->task->expire, sc_ep_snd_ex(sc)); |
| 1698 | task_queue(s->task); |
| 1699 | } |
Christopher Faulet | 59b240c | 2023-02-27 16:38:12 +0100 | [diff] [blame] | 1700 | } |
| 1701 | |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1702 | return did_send; |
| 1703 | } |
| 1704 | |
Christopher Faulet | d898841 | 2022-12-20 18:10:04 +0100 | [diff] [blame] | 1705 | /* perform a synchronous send() for the stream connector. The CF_WRITE_EVENT |
| 1706 | * flag are cleared prior to the attempt, and will possibly be updated in case |
| 1707 | * of success. |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1708 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1709 | void sc_conn_sync_send(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1710 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1711 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1712 | |
Christopher Faulet | d898841 | 2022-12-20 18:10:04 +0100 | [diff] [blame] | 1713 | oc->flags &= ~CF_WRITE_EVENT; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1714 | |
Christopher Faulet | 208c712 | 2023-04-13 16:16:15 +0200 | [diff] [blame] | 1715 | if (sc->flags & SC_FL_SHUT_DONE) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1716 | return; |
| 1717 | |
| 1718 | if (channel_is_empty(oc)) |
| 1719 | return; |
| 1720 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1721 | if (!sc_state_in(sc->state, SC_SB_CON|SC_SB_RDY|SC_SB_EST)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1722 | return; |
| 1723 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1724 | if (!sc_mux_ops(sc)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1725 | return; |
| 1726 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1727 | sc_conn_send(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1728 | } |
| 1729 | |
| 1730 | /* Called by I/O handlers after completion.. It propagates |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1731 | * connection flags to the stream connector, updates the stream (which may or |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1732 | * may not take this opportunity to try to forward data), then update the |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1733 | * connection's polling based on the channels and stream connector's final |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1734 | * states. The function always returns 0. |
| 1735 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1736 | static int sc_conn_process(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1737 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1738 | struct connection *conn = __sc_conn(sc); |
| 1739 | struct channel *ic = sc_ic(sc); |
| 1740 | struct channel *oc = sc_oc(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1741 | |
| 1742 | BUG_ON(!conn); |
| 1743 | |
| 1744 | /* If we have data to send, try it now */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1745 | if (!channel_is_empty(oc) && !(sc->wait_event.events & SUB_RETRY_SEND)) |
| 1746 | sc_conn_send(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1747 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1748 | /* First step, report to the stream connector what was detected at the |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1749 | * connection layer : errors and connection establishment. |
Christopher Faulet | 88d05a0 | 2023-04-14 12:03:50 +0200 | [diff] [blame] | 1750 | * Only add SC_FL_ERROR if we're connected, or we're attempting to |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1751 | * connect, we may get there because we got woken up, but only run |
| 1752 | * after process_stream() noticed there were an error, and decided |
| 1753 | * to retry to connect, the connection may still have CO_FL_ERROR, |
Christopher Faulet | 88d05a0 | 2023-04-14 12:03:50 +0200 | [diff] [blame] | 1754 | * and we don't want to add SC_FL_ERROR back |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1755 | * |
Willy Tarreau | 462b989 | 2022-05-18 18:06:53 +0200 | [diff] [blame] | 1756 | * Note: This test is only required because sc_conn_process is also the SI |
| 1757 | * wake callback. Otherwise sc_conn_recv()/sc_conn_send() already take |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1758 | * care of it. |
| 1759 | */ |
| 1760 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1761 | if (sc->state >= SC_ST_CON) { |
Christopher Faulet | 88d05a0 | 2023-04-14 12:03:50 +0200 | [diff] [blame] | 1762 | if (sc_is_conn_error(sc)) |
Christopher Faulet | a1d14a7 | 2023-04-14 10:42:08 +0200 | [diff] [blame] | 1763 | sc->flags |= SC_FL_ERROR; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1764 | } |
| 1765 | |
| 1766 | /* If we had early data, and the handshake ended, then |
| 1767 | * we can remove the flag, and attempt to wake the task up, |
| 1768 | * in the event there's an analyser waiting for the end of |
| 1769 | * the handshake. |
| 1770 | */ |
| 1771 | if (!(conn->flags & (CO_FL_WAIT_XPRT | CO_FL_EARLY_SSL_HS)) && |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1772 | sc_ep_test(sc, SE_FL_WAIT_FOR_HS)) { |
| 1773 | sc_ep_clr(sc, SE_FL_WAIT_FOR_HS); |
| 1774 | task_wakeup(sc_strm_task(sc), TASK_WOKEN_MSG); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1775 | } |
| 1776 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1777 | if (!sc_state_in(sc->state, SC_SB_EST|SC_SB_DIS|SC_SB_CLO) && |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1778 | (conn->flags & CO_FL_WAIT_XPRT) == 0) { |
Christopher Faulet | ca67992 | 2022-07-20 13:24:04 +0200 | [diff] [blame] | 1779 | if (sc->flags & SC_FL_ISBACK) |
| 1780 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
Christopher Faulet | b96f2aa | 2022-12-12 08:11:36 +0100 | [diff] [blame] | 1781 | oc->flags |= CF_WRITE_EVENT; |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1782 | if (sc->state == SC_ST_CON) |
| 1783 | sc->state = SC_ST_RDY; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1784 | } |
| 1785 | |
| 1786 | /* Report EOS on the channel if it was reached from the mux point of |
| 1787 | * view. |
| 1788 | * |
Willy Tarreau | 462b989 | 2022-05-18 18:06:53 +0200 | [diff] [blame] | 1789 | * Note: This test is only required because sc_conn_process is also the SI |
| 1790 | * wake callback. Otherwise sc_conn_recv()/sc_conn_send() already take |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1791 | * care of it. |
| 1792 | */ |
Christopher Faulet | 1aec6c9 | 2023-04-17 17:29:29 +0200 | [diff] [blame] | 1793 | if (sc_ep_test(sc, SE_FL_EOS) && !(sc->flags & SC_FL_EOS)) { |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1794 | /* we received a shutdown */ |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1795 | if (ic->flags & CF_AUTO_CLOSE) |
Christopher Faulet | df7cd71 | 2023-04-13 15:56:26 +0200 | [diff] [blame] | 1796 | sc_schedule_shutdown(sc_opposite(sc)); |
Christopher Faulet | 1aec6c9 | 2023-04-17 17:29:29 +0200 | [diff] [blame] | 1797 | sc_conn_eos(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1798 | } |
| 1799 | |
| 1800 | /* Report EOI on the channel if it was reached from the mux point of |
| 1801 | * view. |
| 1802 | * |
Willy Tarreau | 462b989 | 2022-05-18 18:06:53 +0200 | [diff] [blame] | 1803 | * Note: This test is only required because sc_conn_process is also the SI |
| 1804 | * wake callback. Otherwise sc_conn_recv()/sc_conn_send() already take |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1805 | * care of it. |
| 1806 | */ |
Christopher Faulet | 904763f | 2023-03-22 14:53:11 +0100 | [diff] [blame] | 1807 | if (sc_ep_test(sc, SE_FL_EOI) && !(sc->flags & SC_FL_EOI)) { |
| 1808 | sc->flags |= SC_FL_EOI; |
| 1809 | ic->flags |= CF_READ_EVENT; |
| 1810 | } |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1811 | |
Christopher Faulet | a1d14a7 | 2023-04-14 10:42:08 +0200 | [diff] [blame] | 1812 | if (sc_ep_test(sc, SE_FL_ERROR)) |
| 1813 | sc->flags |= SC_FL_ERROR; |
| 1814 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1815 | /* Second step : update the stream connector and channels, try to forward any |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1816 | * pending data, then possibly wake the stream up based on the new |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1817 | * stream connector status. |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1818 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1819 | sc_notify(sc); |
| 1820 | stream_release_buffers(__sc_strm(sc)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1821 | return 0; |
| 1822 | } |
| 1823 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1824 | /* This is the ->process() function for any stream connector's wait_event task. |
| 1825 | * It's assigned during the stream connector's initialization, for any type of |
| 1826 | * stream connector. Thus it is always safe to perform a tasklet_wakeup() on a |
Willy Tarreau | e68bc61 | 2022-05-27 11:23:05 +0200 | [diff] [blame] | 1827 | * stream connector, as the presence of the SC is checked there. |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1828 | */ |
Willy Tarreau | 462b989 | 2022-05-18 18:06:53 +0200 | [diff] [blame] | 1829 | struct task *sc_conn_io_cb(struct task *t, void *ctx, unsigned int state) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1830 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1831 | struct stconn *sc = ctx; |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1832 | int ret = 0; |
| 1833 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1834 | if (!sc_conn(sc)) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1835 | return t; |
| 1836 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1837 | if (!(sc->wait_event.events & SUB_RETRY_SEND) && !channel_is_empty(sc_oc(sc))) |
| 1838 | ret = sc_conn_send(sc); |
| 1839 | if (!(sc->wait_event.events & SUB_RETRY_RECV)) |
| 1840 | ret |= sc_conn_recv(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1841 | if (ret != 0) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1842 | sc_conn_process(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1843 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1844 | stream_release_buffers(__sc_strm(sc)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1845 | return t; |
| 1846 | } |
| 1847 | |
Christopher Faulet | b36e512 | 2023-04-17 17:32:43 +0200 | [diff] [blame] | 1848 | /* |
| 1849 | * This function propagates an end-of-stream received from an applet. It |
| 1850 | * updates the stream connector. If it is is already shut, the applet is |
| 1851 | * released. Otherwise, we try to forward the shutdown, immediately or ASAP. |
| 1852 | */ |
| 1853 | static void sc_applet_eos(struct stconn *sc) |
| 1854 | { |
| 1855 | struct channel *ic = sc_ic(sc); |
| 1856 | |
| 1857 | BUG_ON(!sc_appctx(sc)); |
| 1858 | |
| 1859 | if (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE)) |
| 1860 | return; |
| 1861 | sc->flags |= SC_FL_EOS; |
| 1862 | ic->flags |= CF_READ_EVENT; |
| 1863 | |
| 1864 | /* Note: on abort, we don't call the applet */ |
| 1865 | |
| 1866 | if (!sc_state_in(sc->state, SC_SB_CON|SC_SB_RDY|SC_SB_EST)) |
| 1867 | return; |
| 1868 | |
| 1869 | if (sc->flags & SC_FL_SHUT_DONE) { |
| 1870 | appctx_shut(__sc_appctx(sc)); |
| 1871 | sc->state = SC_ST_DIS; |
| 1872 | if (sc->flags & SC_FL_ISBACK) |
| 1873 | __sc_strm(sc)->conn_exp = TICK_ETERNITY; |
| 1874 | } |
| 1875 | else if (sc_cond_forward_shut(sc)) |
| 1876 | return sc_app_shut_applet(sc); |
| 1877 | } |
| 1878 | |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1879 | /* Callback to be used by applet handlers upon completion. It updates the stream |
| 1880 | * (which may or may not take this opportunity to try to forward data), then |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1881 | * may re-enable the applet's based on the channels and stream connector's final |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1882 | * states. |
| 1883 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1884 | static int sc_applet_process(struct stconn *sc) |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1885 | { |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1886 | struct channel *ic = sc_ic(sc); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1887 | |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1888 | BUG_ON(!sc_appctx(sc)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1889 | |
Christopher Faulet | f8fbb6d | 2023-03-21 11:49:21 +0100 | [diff] [blame] | 1890 | /* Report EOI on the channel if it was reached from the applet point of |
| 1891 | * view. */ |
Christopher Faulet | 904763f | 2023-03-22 14:53:11 +0100 | [diff] [blame] | 1892 | if (sc_ep_test(sc, SE_FL_EOI) && !(sc->flags & SC_FL_EOI)) { |
Christopher Faulet | f8fbb6d | 2023-03-21 11:49:21 +0100 | [diff] [blame] | 1893 | sc_ep_report_read_activity(sc); |
Christopher Faulet | 904763f | 2023-03-22 14:53:11 +0100 | [diff] [blame] | 1894 | sc->flags |= SC_FL_EOI; |
| 1895 | ic->flags |= CF_READ_EVENT; |
Christopher Faulet | f8fbb6d | 2023-03-21 11:49:21 +0100 | [diff] [blame] | 1896 | } |
| 1897 | |
Christopher Faulet | a1d14a7 | 2023-04-14 10:42:08 +0200 | [diff] [blame] | 1898 | if (sc_ep_test(sc, SE_FL_ERROR)) |
| 1899 | sc->flags |= SC_FL_ERROR; |
| 1900 | |
Christopher Faulet | 0ffc9d7 | 2023-03-21 14:19:08 +0100 | [diff] [blame] | 1901 | if (sc_ep_test(sc, SE_FL_EOS)) { |
| 1902 | /* we received a shutdown */ |
Christopher Faulet | b36e512 | 2023-04-17 17:32:43 +0200 | [diff] [blame] | 1903 | sc_applet_eos(sc); |
Christopher Faulet | 0ffc9d7 | 2023-03-21 14:19:08 +0100 | [diff] [blame] | 1904 | } |
| 1905 | |
Christopher Faulet | e8bcef5 | 2023-04-14 09:45:41 +0200 | [diff] [blame] | 1906 | BUG_ON(sc_ep_test(sc, SE_FL_HAVE_NO_DATA|SE_FL_EOI) == SE_FL_EOI); |
| 1907 | |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1908 | /* If the applet wants to write and the channel is closed, it's a |
| 1909 | * broken pipe and it must be reported. |
| 1910 | */ |
Christopher Faulet | ca5309a | 2023-04-17 16:17:32 +0200 | [diff] [blame] | 1911 | if (!sc_ep_test(sc, SE_FL_HAVE_NO_DATA) && (sc->flags & (SC_FL_EOS|SC_FL_ABRT_DONE))) |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1912 | sc_ep_set(sc, SE_FL_ERROR); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1913 | |
| 1914 | /* automatically mark the applet having data available if it reported |
| 1915 | * begin blocked by the channel. |
| 1916 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1917 | if ((sc->flags & (SC_FL_WONT_READ|SC_FL_NEED_BUFF|SC_FL_NEED_ROOM)) || |
| 1918 | sc_ep_test(sc, SE_FL_APPLET_NEED_CONN)) |
| 1919 | applet_have_more_data(__sc_appctx(sc)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1920 | |
Willy Tarreau | 4596fe2 | 2022-05-17 19:07:51 +0200 | [diff] [blame] | 1921 | /* update the stream connector, channels, and possibly wake the stream up */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1922 | sc_notify(sc); |
| 1923 | stream_release_buffers(__sc_strm(sc)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1924 | |
Willy Tarreau | 19c65a9 | 2022-05-27 08:49:24 +0200 | [diff] [blame] | 1925 | /* sc_notify may have passed through chk_snd and released some blocking |
Willy Tarreau | 15252cd | 2022-05-25 16:36:21 +0200 | [diff] [blame] | 1926 | * flags. Process_stream will consider those flags to wake up the |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1927 | * appctx but in the case the task is not in runqueue we may have to |
| 1928 | * wakeup the appctx immediately. |
| 1929 | */ |
Willy Tarreau | 0adb281 | 2022-05-27 10:02:48 +0200 | [diff] [blame] | 1930 | if (sc_is_recv_allowed(sc) || sc_is_send_allowed(sc)) |
| 1931 | appctx_wakeup(__sc_appctx(sc)); |
Christopher Faulet | 5e29b76 | 2022-04-04 08:58:34 +0200 | [diff] [blame] | 1932 | return 0; |
Christopher Faulet | 13045f0 | 2022-04-01 14:23:38 +0200 | [diff] [blame] | 1933 | } |
Christopher Faulet | b68f77d | 2022-06-16 16:24:16 +0200 | [diff] [blame] | 1934 | |
| 1935 | |
| 1936 | /* Prepares an endpoint upgrade. We don't now at this stage if the upgrade will |
| 1937 | * succeed or not and if the stconn will be reused by the new endpoint. Thus, |
| 1938 | * for now, only pretend the stconn is detached. |
| 1939 | */ |
| 1940 | void sc_conn_prepare_endp_upgrade(struct stconn *sc) |
| 1941 | { |
| 1942 | BUG_ON(!sc_conn(sc) || !sc->app); |
| 1943 | sc_ep_clr(sc, SE_FL_T_MUX); |
| 1944 | sc_ep_set(sc, SE_FL_DETACHED); |
| 1945 | } |
| 1946 | |
Ilya Shipitsin | 3b64a28 | 2022-07-29 22:26:53 +0500 | [diff] [blame] | 1947 | /* Endpoint upgrade failed. Restore the stconn state. */ |
Christopher Faulet | b68f77d | 2022-06-16 16:24:16 +0200 | [diff] [blame] | 1948 | void sc_conn_abort_endp_upgrade(struct stconn *sc) |
| 1949 | { |
| 1950 | sc_ep_set(sc, SE_FL_T_MUX); |
| 1951 | sc_ep_clr(sc, SE_FL_DETACHED); |
| 1952 | } |
| 1953 | |
| 1954 | /* Commit the endpoint upgrade. If stconn is attached, it means the new endpoint |
| 1955 | * use it. So we do nothing. Otherwise, the stconn will be destroy with the |
| 1956 | * overlying stream. So, it means we must commit the detach. |
| 1957 | */ |
| 1958 | void sc_conn_commit_endp_upgrade(struct stconn *sc) |
| 1959 | { |
| 1960 | if (!sc_ep_test(sc, SE_FL_DETACHED)) |
| 1961 | return; |
| 1962 | sc_detach_endp(&sc); |
| 1963 | /* Because it was already set as detached, the sedesc must be preserved */ |
Willy Tarreau | 6a378d1 | 2022-08-11 13:56:42 +0200 | [diff] [blame] | 1964 | BUG_ON(!sc); |
Christopher Faulet | b68f77d | 2022-06-16 16:24:16 +0200 | [diff] [blame] | 1965 | BUG_ON(!sc->sedesc); |
| 1966 | } |