2002-09-03 07:52:59 -04:00
|
|
|
/***************************************************************************
|
2004-05-17 02:53:41 -04:00
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
2001-11-28 06:09:18 -05:00
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2017-03-21 05:09:11 -04:00
|
|
|
* Copyright (C) 1998 - 2017, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2001-11-28 06:09:18 -05:00
|
|
|
*
|
2002-09-03 07:52:59 -04:00
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2016-02-02 18:19:02 -05:00
|
|
|
* are also available at https://curl.haxx.se/docs/copyright.html.
|
2004-05-17 02:53:41 -04:00
|
|
|
*
|
2001-11-28 06:09:18 -05:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 07:52:59 -04:00
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
2001-11-28 06:09:18 -05:00
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
2002-09-03 07:52:59 -04:00
|
|
|
***************************************************************************/
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2013-01-06 13:06:49 -05:00
|
|
|
#include "curl_setup.h"
|
2007-02-25 23:24:26 -05:00
|
|
|
|
2001-11-28 11:00:18 -05:00
|
|
|
#include <curl/curl.h>
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2013-01-03 20:50:28 -05:00
|
|
|
#include "urldata.h"
|
|
|
|
#include "transfer.h"
|
|
|
|
#include "url.h"
|
|
|
|
#include "connect.h"
|
|
|
|
#include "progress.h"
|
|
|
|
#include "easyif.h"
|
2014-08-20 17:31:53 -04:00
|
|
|
#include "share.h"
|
2013-01-03 20:50:28 -05:00
|
|
|
#include "multiif.h"
|
|
|
|
#include "sendf.h"
|
|
|
|
#include "timeval.h"
|
|
|
|
#include "http.h"
|
|
|
|
#include "select.h"
|
|
|
|
#include "warnless.h"
|
|
|
|
#include "speedcheck.h"
|
|
|
|
#include "conncache.h"
|
2013-01-17 06:59:23 -05:00
|
|
|
#include "multihandle.h"
|
2013-02-15 05:50:45 -05:00
|
|
|
#include "pipeline.h"
|
2013-11-25 09:43:21 -05:00
|
|
|
#include "sigpipe.h"
|
2016-11-16 12:49:15 -05:00
|
|
|
#include "vtls/vtls.h"
|
2016-10-21 05:03:10 -04:00
|
|
|
#include "connect.h"
|
2017-06-07 17:02:26 -04:00
|
|
|
#include "http_proxy.h"
|
2016-04-29 09:46:40 -04:00
|
|
|
/* The last 3 #include files should be in this order */
|
2015-03-03 06:36:18 -05:00
|
|
|
#include "curl_printf.h"
|
2009-04-21 07:46:16 -04:00
|
|
|
#include "curl_memory.h"
|
2013-01-03 20:50:28 -05:00
|
|
|
#include "memdebug.h"
|
2002-04-27 18:21:51 -04:00
|
|
|
|
2007-06-26 17:09:28 -04:00
|
|
|
/*
|
|
|
|
CURL_SOCKET_HASH_TABLE_SIZE should be a prime number. Increasing it from 97
|
|
|
|
to 911 takes on a 32-bit machine 4 x 804 = 3211 more bytes. Still, every
|
|
|
|
CURL handle takes 45-50 K memory, therefore this 3K are not significant.
|
|
|
|
*/
|
|
|
|
#ifndef CURL_SOCKET_HASH_TABLE_SIZE
|
|
|
|
#define CURL_SOCKET_HASH_TABLE_SIZE 911
|
|
|
|
#endif
|
|
|
|
|
2017-10-11 08:18:46 -04:00
|
|
|
#ifndef CURL_CONNECTION_HASH_SIZE
|
2013-04-26 16:23:08 -04:00
|
|
|
#define CURL_CONNECTION_HASH_SIZE 97
|
2017-10-11 08:18:46 -04:00
|
|
|
#endif
|
2001-11-28 06:09:18 -05:00
|
|
|
|
|
|
|
#define CURL_MULTI_HANDLE 0x000bab1e
|
|
|
|
|
2006-02-23 07:20:48 -05:00
|
|
|
#define GOOD_MULTI_HANDLE(x) \
|
2016-06-21 13:31:24 -04:00
|
|
|
((x) && (x)->type == CURL_MULTI_HANDLE)
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
static void singlesocket(struct Curl_multi *multi,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data);
|
2006-10-12 04:36:47 -04:00
|
|
|
static int update_timer(struct Curl_multi *multi);
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2017-07-28 09:49:36 -04:00
|
|
|
static CURLMcode add_next_timeout(struct curltime now,
|
2010-08-30 18:08:45 -04:00
|
|
|
struct Curl_multi *multi,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *d);
|
2013-06-03 14:19:51 -04:00
|
|
|
static CURLMcode multi_timeout(struct Curl_multi *multi,
|
|
|
|
long *timeout_ms);
|
2008-01-16 07:24:00 -05:00
|
|
|
|
2009-06-09 22:49:42 -04:00
|
|
|
#ifdef DEBUGBUILD
|
2007-05-02 15:13:56 -04:00
|
|
|
static const char * const statename[]={
|
2006-10-13 03:11:26 -04:00
|
|
|
"INIT",
|
2013-02-15 05:50:45 -05:00
|
|
|
"CONNECT_PEND",
|
2006-10-13 03:11:26 -04:00
|
|
|
"CONNECT",
|
|
|
|
"WAITRESOLVE",
|
|
|
|
"WAITCONNECT",
|
2007-03-23 18:25:04 -04:00
|
|
|
"WAITPROXYCONNECT",
|
2015-02-11 17:18:32 -05:00
|
|
|
"SENDPROTOCONNECT",
|
2006-10-13 03:11:26 -04:00
|
|
|
"PROTOCONNECT",
|
|
|
|
"WAITDO",
|
|
|
|
"DO",
|
|
|
|
"DOING",
|
|
|
|
"DO_MORE",
|
|
|
|
"DO_DONE",
|
|
|
|
"WAITPERFORM",
|
|
|
|
"PERFORM",
|
|
|
|
"TOOFAST",
|
|
|
|
"DONE",
|
|
|
|
"COMPLETED",
|
2010-08-18 13:59:46 -04:00
|
|
|
"MSGSENT",
|
2006-10-13 03:11:26 -04:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2015-10-05 14:39:10 -04:00
|
|
|
/* function pointer called once when switching TO a state */
|
2016-06-21 09:47:12 -04:00
|
|
|
typedef void (*init_multistate_func)(struct Curl_easy *data);
|
2015-10-05 14:39:10 -04:00
|
|
|
|
2005-02-09 08:06:40 -05:00
|
|
|
/* always use this function to change state, to make debugging easier */
|
2016-06-21 09:47:12 -04:00
|
|
|
static void mstate(struct Curl_easy *data, CURLMstate state
|
2013-01-17 06:59:23 -05:00
|
|
|
#ifdef DEBUGBUILD
|
|
|
|
, int lineno
|
|
|
|
#endif
|
|
|
|
)
|
2005-02-09 08:06:40 -05:00
|
|
|
{
|
2013-08-12 07:52:58 -04:00
|
|
|
CURLMstate oldstate = data->mstate;
|
2015-10-16 16:42:30 -04:00
|
|
|
static const init_multistate_func finit[CURLM_STATE_LAST] = {
|
2015-10-05 14:39:10 -04:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
Curl_init_CONNECT, /* CONNECT */
|
2017-06-07 17:02:26 -04:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
Curl_connect_free /* DO */
|
2015-10-05 14:39:10 -04:00
|
|
|
/* the rest is NULL too */
|
|
|
|
};
|
2006-10-07 17:04:57 -04:00
|
|
|
|
2014-11-23 14:51:01 -05:00
|
|
|
#if defined(DEBUGBUILD) && defined(CURL_DISABLE_VERBOSE_STRINGS)
|
|
|
|
(void) lineno;
|
|
|
|
#endif
|
|
|
|
|
2006-10-07 17:04:57 -04:00
|
|
|
if(oldstate == state)
|
|
|
|
/* don't bother when the new state is the same as the old state */
|
|
|
|
return;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
data->mstate = state;
|
2005-02-09 08:06:40 -05:00
|
|
|
|
2014-11-23 14:51:01 -05:00
|
|
|
#if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->mstate >= CURLM_STATE_CONNECT_PEND &&
|
|
|
|
data->mstate < CURLM_STATE_COMPLETED) {
|
2014-11-23 14:51:01 -05:00
|
|
|
long connection_id = -5000;
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn)
|
|
|
|
connection_id = data->easy_conn->connection_id;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
infof(data,
|
2016-04-05 10:36:45 -04:00
|
|
|
"STATE: %s => %s handle %p; line %d (connection #%ld)\n",
|
2013-08-12 07:52:58 -04:00
|
|
|
statename[oldstate], statename[data->mstate],
|
|
|
|
(void *)data, lineno, connection_id);
|
2009-08-21 03:11:20 -04:00
|
|
|
}
|
2005-02-09 08:06:40 -05:00
|
|
|
#endif
|
2014-11-23 14:51:01 -05:00
|
|
|
|
2006-08-02 18:29:29 -04:00
|
|
|
if(state == CURLM_STATE_COMPLETED)
|
|
|
|
/* changing to COMPLETED means there's one less easy handle 'alive' */
|
2013-08-12 07:52:58 -04:00
|
|
|
data->multi->num_alive--;
|
2015-10-05 14:39:10 -04:00
|
|
|
|
|
|
|
/* if this state has an init-function, run it */
|
|
|
|
if(finit[state])
|
|
|
|
finit[state](data);
|
2005-02-09 08:06:40 -05:00
|
|
|
}
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2013-01-17 06:59:23 -05:00
|
|
|
#ifndef DEBUGBUILD
|
|
|
|
#define multistate(x,y) mstate(x,y)
|
|
|
|
#else
|
|
|
|
#define multistate(x,y) mstate(x,y, __LINE__)
|
|
|
|
#endif
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
/*
|
2006-04-21 09:40:07 -04:00
|
|
|
* We add one of these structs to the sockhash for a particular socket
|
2006-04-10 11:00:53 -04:00
|
|
|
*/
|
|
|
|
|
|
|
|
struct Curl_sh_entry {
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *easy;
|
2006-04-21 09:40:07 -04:00
|
|
|
int action; /* what action READ/WRITE this socket waits for */
|
2006-09-10 18:15:32 -04:00
|
|
|
curl_socket_t socket; /* mainly to ease debugging */
|
2006-07-26 18:19:42 -04:00
|
|
|
void *socketp; /* settable by users with curl_multi_assign() */
|
2006-04-10 11:00:53 -04:00
|
|
|
};
|
2006-04-21 09:40:07 -04:00
|
|
|
/* bits for 'action' having no bits means this socket is not expecting any
|
|
|
|
action */
|
|
|
|
#define SH_READ 1
|
2006-05-26 07:26:42 -04:00
|
|
|
#define SH_WRITE 2
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2016-03-14 04:18:01 -04:00
|
|
|
/* look up a given socket in the socket hash, skip invalid sockets */
|
|
|
|
static struct Curl_sh_entry *sh_getentry(struct curl_hash *sh,
|
|
|
|
curl_socket_t s)
|
|
|
|
{
|
|
|
|
if(s != CURL_SOCKET_BAD)
|
|
|
|
/* only look for proper sockets */
|
|
|
|
return Curl_hash_pick(sh, (char *)&s, sizeof(curl_socket_t));
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
/* make sure this socket is present in the hash for this handle */
|
2006-09-10 18:15:32 -04:00
|
|
|
static struct Curl_sh_entry *sh_addentry(struct curl_hash *sh,
|
|
|
|
curl_socket_t s,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data)
|
2001-11-28 06:09:18 -05:00
|
|
|
{
|
2016-03-14 04:18:01 -04:00
|
|
|
struct Curl_sh_entry *there = sh_getentry(sh, s);
|
2006-04-10 11:00:53 -04:00
|
|
|
struct Curl_sh_entry *check;
|
|
|
|
|
2006-04-21 09:40:07 -04:00
|
|
|
if(there)
|
|
|
|
/* it is present, return fine */
|
2006-09-10 18:15:32 -04:00
|
|
|
return there;
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
/* not present, add it */
|
2009-11-18 05:33:54 -05:00
|
|
|
check = calloc(1, sizeof(struct Curl_sh_entry));
|
2006-04-10 11:00:53 -04:00
|
|
|
if(!check)
|
2006-09-10 18:15:32 -04:00
|
|
|
return NULL; /* major failure */
|
2014-11-18 15:25:05 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
check->easy = data;
|
2006-09-10 18:15:32 -04:00
|
|
|
check->socket = s;
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2006-04-21 09:40:07 -04:00
|
|
|
/* make/add new hash entry */
|
2014-11-18 15:25:05 -05:00
|
|
|
if(!Curl_hash_add(sh, (char *)&s, sizeof(curl_socket_t), check)) {
|
2006-09-10 18:15:32 -04:00
|
|
|
free(check);
|
|
|
|
return NULL; /* major failure */
|
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
return check; /* things are good in sockhash land */
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* delete the given socket + handle from the hash */
|
2006-04-21 09:40:07 -04:00
|
|
|
static void sh_delentry(struct curl_hash *sh, curl_socket_t s)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
2016-03-14 04:18:01 -04:00
|
|
|
/* We remove the hash entry. This will end up in a call to
|
|
|
|
sh_freeentry(). */
|
|
|
|
Curl_hash_delete(sh, (char *)&s, sizeof(curl_socket_t));
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* free a sockhash entry
|
|
|
|
*/
|
|
|
|
static void sh_freeentry(void *freethis)
|
|
|
|
{
|
|
|
|
struct Curl_sh_entry *p = (struct Curl_sh_entry *) freethis;
|
|
|
|
|
2015-03-11 12:41:01 -04:00
|
|
|
free(p);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2013-03-21 15:14:03 -04:00
|
|
|
static size_t fd_key_compare(void *k1, size_t k1_len, void *k2, size_t k2_len)
|
2007-06-26 17:09:28 -04:00
|
|
|
{
|
|
|
|
(void) k1_len; (void) k2_len;
|
|
|
|
|
2016-03-13 01:19:20 -05:00
|
|
|
return (*((curl_socket_t *) k1)) == (*((curl_socket_t *) k2));
|
2007-06-26 17:09:28 -04:00
|
|
|
}
|
|
|
|
|
2013-03-21 15:14:03 -04:00
|
|
|
static size_t hash_fd(void *key, size_t key_length, size_t slots_num)
|
2007-06-26 17:09:28 -04:00
|
|
|
{
|
2016-03-13 01:19:20 -05:00
|
|
|
curl_socket_t fd = *((curl_socket_t *) key);
|
2007-06-26 17:09:28 -04:00
|
|
|
(void) key_length;
|
|
|
|
|
2016-03-13 01:19:20 -05:00
|
|
|
return (fd % slots_num);
|
2007-06-26 17:09:28 -04:00
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
/*
|
|
|
|
* sh_init() creates a new socket hash and returns the handle for it.
|
|
|
|
*
|
|
|
|
* Quote from README.multi_socket:
|
|
|
|
*
|
|
|
|
* "Some tests at 7000 and 9000 connections showed that the socket hash lookup
|
|
|
|
* is somewhat of a bottle neck. Its current implementation may be a bit too
|
|
|
|
* limiting. It simply has a fixed-size array, and on each entry in the array
|
|
|
|
* it has a linked list with entries. So the hash only checks which list to
|
|
|
|
* scan through. The code I had used so for used a list with merely 7 slots
|
|
|
|
* (as that is what the DNS hash uses) but with 7000 connections that would
|
|
|
|
* make an average of 1000 nodes in each list to run through. I upped that to
|
|
|
|
* 97 slots (I believe a prime is suitable) and noticed a significant speed
|
|
|
|
* increase. I need to reconsider the hash implementation or use a rather
|
|
|
|
* large default value like this. At 9000 connections I was still below 10us
|
|
|
|
* per call."
|
|
|
|
*
|
|
|
|
*/
|
2015-05-12 03:28:37 -04:00
|
|
|
static int sh_init(struct curl_hash *hash, int hashsize)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
2015-05-12 03:28:37 -04:00
|
|
|
return Curl_hash_init(hash, hashsize, hash_fd, fd_key_compare,
|
|
|
|
sh_freeentry);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2010-08-08 18:01:36 -04:00
|
|
|
/*
|
|
|
|
* multi_addmsg()
|
|
|
|
*
|
|
|
|
* Called when a transfer is completed. Adds the given msg pointer to
|
|
|
|
* the list kept in the multi handle.
|
|
|
|
*/
|
|
|
|
static CURLMcode multi_addmsg(struct Curl_multi *multi,
|
|
|
|
struct Curl_message *msg)
|
|
|
|
{
|
2017-04-20 09:10:04 -04:00
|
|
|
Curl_llist_insert_next(&multi->msglist, multi->msglist.tail, msg,
|
|
|
|
&msg->list);
|
2010-08-08 18:01:36 -04:00
|
|
|
return CURLM_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* multi_freeamsg()
|
|
|
|
*
|
|
|
|
* Callback used by the llist system when a single list entry is destroyed.
|
|
|
|
*/
|
|
|
|
static void multi_freeamsg(void *a, void *b)
|
|
|
|
{
|
|
|
|
(void)a;
|
|
|
|
(void)b;
|
|
|
|
}
|
|
|
|
|
2013-04-26 16:23:08 -04:00
|
|
|
struct Curl_multi *Curl_multi_handle(int hashsize, /* socket hash */
|
|
|
|
int chashsize) /* connection hash */
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
2009-11-18 05:33:54 -05:00
|
|
|
struct Curl_multi *multi = calloc(1, sizeof(struct Curl_multi));
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
if(!multi)
|
2004-05-13 11:17:49 -04:00
|
|
|
return NULL;
|
2003-09-11 18:14:29 -04:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
multi->type = CURL_MULTI_HANDLE;
|
|
|
|
|
2015-05-12 03:46:53 -04:00
|
|
|
if(Curl_mk_dnscache(&multi->hostcache))
|
2010-08-08 18:01:36 -04:00
|
|
|
goto error;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2015-05-12 03:28:37 -04:00
|
|
|
if(sh_init(&multi->sockhash, hashsize))
|
2010-08-08 18:01:36 -04:00
|
|
|
goto error;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2015-05-12 03:15:02 -04:00
|
|
|
if(Curl_conncache_init(&multi->conn_cache, chashsize))
|
2010-08-08 18:01:36 -04:00
|
|
|
goto error;
|
|
|
|
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_llist_init(&multi->msglist, multi_freeamsg);
|
|
|
|
Curl_llist_init(&multi->pending, multi_freeamsg);
|
2014-09-02 03:29:50 -04:00
|
|
|
|
2013-08-20 08:48:08 -04:00
|
|
|
/* allocate a new easy handle to use when closing cached connections */
|
|
|
|
multi->closure_handle = curl_easy_init();
|
|
|
|
if(!multi->closure_handle)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
multi->closure_handle->multi = multi;
|
2015-05-12 03:15:02 -04:00
|
|
|
multi->closure_handle->state.conn_cache = &multi->conn_cache;
|
2013-08-20 08:48:08 -04:00
|
|
|
|
2013-02-15 05:50:45 -05:00
|
|
|
multi->max_pipeline_length = 5;
|
2014-02-17 00:44:00 -05:00
|
|
|
|
|
|
|
/* -1 means it not set by user, use the default value */
|
|
|
|
multi->maxconnects = -1;
|
2016-06-21 13:31:24 -04:00
|
|
|
return multi;
|
2010-08-08 18:01:36 -04:00
|
|
|
|
|
|
|
error:
|
2011-10-11 13:41:30 -04:00
|
|
|
|
2015-05-02 14:49:55 -04:00
|
|
|
Curl_hash_destroy(&multi->sockhash);
|
|
|
|
Curl_hash_destroy(&multi->hostcache);
|
2015-05-12 03:15:02 -04:00
|
|
|
Curl_conncache_destroy(&multi->conn_cache);
|
2013-08-20 08:48:08 -04:00
|
|
|
Curl_close(multi->closure_handle);
|
|
|
|
multi->closure_handle = NULL;
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_llist_destroy(&multi->msglist, NULL);
|
|
|
|
Curl_llist_destroy(&multi->pending, NULL);
|
2010-08-08 18:01:36 -04:00
|
|
|
|
|
|
|
free(multi);
|
|
|
|
return NULL;
|
2001-11-28 06:09:18 -05:00
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
struct Curl_multi *curl_multi_init(void)
|
2013-04-26 16:23:08 -04:00
|
|
|
{
|
|
|
|
return Curl_multi_handle(CURL_SOCKET_HASH_TABLE_SIZE,
|
|
|
|
CURL_CONNECTION_HASH_SIZE);
|
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_add_handle(struct Curl_multi *multi,
|
|
|
|
struct Curl_easy *data)
|
2001-11-28 06:09:18 -05:00
|
|
|
{
|
|
|
|
/* First, make some basic checks that the CURLM handle is a good handle */
|
|
|
|
if(!GOOD_MULTI_HANDLE(multi))
|
|
|
|
return CURLM_BAD_HANDLE;
|
2004-05-17 02:53:41 -04:00
|
|
|
|
2001-11-28 06:09:18 -05:00
|
|
|
/* Verify that we got a somewhat good easy handle too */
|
2016-06-21 09:47:12 -04:00
|
|
|
if(!GOOD_EASY_HANDLE(data))
|
2001-11-28 06:09:18 -05:00
|
|
|
return CURLM_BAD_EASY_HANDLE;
|
|
|
|
|
2013-08-08 07:01:16 -04:00
|
|
|
/* Prevent users from adding same easy handle more than once and prevent
|
|
|
|
adding to more than one multi stack */
|
2011-10-13 12:04:56 -04:00
|
|
|
if(data->multi)
|
2013-08-20 06:27:50 -04:00
|
|
|
return CURLM_ADDED_ALREADY;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2017-04-03 04:32:43 -04:00
|
|
|
/* Initialize timeout list for this handle */
|
2017-05-09 06:47:49 -04:00
|
|
|
Curl_llist_init(&data->state.timeoutlist, NULL);
|
2010-08-10 05:02:07 -04:00
|
|
|
|
2011-10-13 12:04:56 -04:00
|
|
|
/*
|
2013-08-20 08:48:08 -04:00
|
|
|
* No failure allowed in this function beyond this point. And no
|
|
|
|
* modification of easy nor multi handle allowed before this except for
|
|
|
|
* potential multi's connection cache growing which won't be undone in this
|
|
|
|
* function no matter what.
|
|
|
|
*/
|
2012-12-19 13:52:11 -05:00
|
|
|
|
2001-11-28 06:09:18 -05:00
|
|
|
/* set the easy handle */
|
2013-08-08 07:01:16 -04:00
|
|
|
multistate(data, CURLM_STATE_INIT);
|
|
|
|
|
|
|
|
if((data->set.global_dns_cache) &&
|
|
|
|
(data->dns.hostcachetype != HCACHE_GLOBAL)) {
|
|
|
|
/* global dns cache was requested but still isn't */
|
|
|
|
struct curl_hash *global = Curl_global_host_cache_init();
|
|
|
|
if(global) {
|
|
|
|
/* only do this if the global cache init works */
|
|
|
|
data->dns.hostcache = global;
|
|
|
|
data->dns.hostcachetype = HCACHE_GLOBAL;
|
|
|
|
}
|
|
|
|
}
|
2006-09-07 17:49:20 -04:00
|
|
|
/* for multi interface connections, we share DNS cache automatically if the
|
2013-01-17 06:59:23 -05:00
|
|
|
easy handle's one is currently not set. */
|
2013-08-08 07:01:16 -04:00
|
|
|
else if(!data->dns.hostcache ||
|
|
|
|
(data->dns.hostcachetype == HCACHE_NONE)) {
|
2015-05-12 03:46:53 -04:00
|
|
|
data->dns.hostcache = &multi->hostcache;
|
2013-08-08 07:01:16 -04:00
|
|
|
data->dns.hostcachetype = HCACHE_MULTI;
|
2006-07-07 18:58:06 -04:00
|
|
|
}
|
2004-05-17 02:53:41 -04:00
|
|
|
|
2013-01-17 06:59:23 -05:00
|
|
|
/* Point to the multi's connection cache */
|
2015-05-12 03:15:02 -04:00
|
|
|
data->state.conn_cache = &multi->conn_cache;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2011-10-13 12:04:56 -04:00
|
|
|
/* This adds the new entry at the 'end' of the doubly-linked circular
|
2016-06-21 09:47:12 -04:00
|
|
|
list of Curl_easy structs to try and maintain a FIFO queue so
|
2011-10-13 12:04:56 -04:00
|
|
|
the pipelined requests are in order. */
|
2007-02-21 16:59:40 -05:00
|
|
|
|
2013-08-01 18:09:59 -04:00
|
|
|
/* We add this new entry last in the list. */
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2013-08-08 07:01:16 -04:00
|
|
|
data->next = NULL; /* end of the line */
|
2013-08-01 18:09:59 -04:00
|
|
|
if(multi->easyp) {
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *last = multi->easylp;
|
2013-08-08 07:01:16 -04:00
|
|
|
last->next = data;
|
|
|
|
data->prev = last;
|
|
|
|
multi->easylp = data; /* the new last node */
|
2013-08-01 18:09:59 -04:00
|
|
|
}
|
|
|
|
else {
|
2015-04-29 18:39:54 -04:00
|
|
|
/* first node, make prev NULL! */
|
2013-08-08 07:01:16 -04:00
|
|
|
data->prev = NULL;
|
|
|
|
multi->easylp = multi->easyp = data; /* both first and last */
|
2013-08-01 18:09:59 -04:00
|
|
|
}
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2016-06-21 09:47:12 -04:00
|
|
|
/* make the Curl_easy refer back to this multi handle */
|
|
|
|
data->multi = multi;
|
2005-01-10 05:07:07 -05:00
|
|
|
|
2007-05-02 09:47:56 -04:00
|
|
|
/* Set the timeout for this handle to expire really soon so that it will
|
|
|
|
be taken care of even when this handle is added in the midst of operation
|
|
|
|
when only the curl_multi_socket() API is used. During that flow, only
|
|
|
|
sockets that time-out or have actions will be dealt with. Since this
|
|
|
|
handle has no action yet, we make sure it times out to get things to
|
|
|
|
happen. */
|
2017-05-09 06:47:49 -04:00
|
|
|
Curl_expire(data, 0, EXPIRE_RUN_NOW);
|
2007-05-02 09:47:56 -04:00
|
|
|
|
2001-11-28 06:09:18 -05:00
|
|
|
/* increase the node-counter */
|
|
|
|
multi->num_easy++;
|
2006-09-16 17:50:29 -04:00
|
|
|
|
2006-08-02 18:29:29 -04:00
|
|
|
/* increase the alive-counter */
|
|
|
|
multi->num_alive++;
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2008-10-08 17:42:29 -04:00
|
|
|
/* A somewhat crude work-around for a little glitch in update_timer() that
|
|
|
|
happens if the lastcall time is set to the same time when the handle is
|
|
|
|
removed as when the next handle is added, as then the check in
|
|
|
|
update_timer() that prevents calling the application multiple times with
|
|
|
|
the same timer infor will not trigger and then the new handle's timeout
|
|
|
|
will not be notified to the app.
|
|
|
|
|
|
|
|
The work-around is thus simply to clear the 'lastcall' variable to force
|
|
|
|
update_timer() to always trigger a callback to the app when a new easy
|
|
|
|
handle is added */
|
|
|
|
memset(&multi->timer_lastcall, 0, sizeof(multi->timer_lastcall));
|
|
|
|
|
2016-10-18 11:32:01 -04:00
|
|
|
/* The closure handle only ever has default timeouts set. To improve the
|
|
|
|
state somewhat we clone the timeouts from each added handle so that the
|
|
|
|
closure handle always has the same timeouts as the most recently added
|
|
|
|
easy handle. */
|
|
|
|
multi->closure_handle->set.timeout = data->set.timeout;
|
|
|
|
multi->closure_handle->set.server_response_timeout =
|
|
|
|
data->set.server_response_timeout;
|
|
|
|
|
2006-10-12 04:36:47 -04:00
|
|
|
update_timer(multi);
|
2004-08-31 02:04:43 -04:00
|
|
|
return CURLM_OK;
|
2001-11-28 06:09:18 -05:00
|
|
|
}
|
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
#if 0
|
|
|
|
/* Debug-function, used like this:
|
|
|
|
*
|
|
|
|
* Curl_hash_print(multi->sockhash, debug_print_sock_hash);
|
|
|
|
*
|
2013-01-03 20:50:28 -05:00
|
|
|
* Enable the hash print function first by editing hash.c
|
2006-09-10 18:15:32 -04:00
|
|
|
*/
|
|
|
|
static void debug_print_sock_hash(void *p)
|
|
|
|
{
|
|
|
|
struct Curl_sh_entry *sh = (struct Curl_sh_entry *)p;
|
|
|
|
|
|
|
|
fprintf(stderr, " [easy %p/magic %x/socket %d]",
|
2013-08-12 07:52:58 -04:00
|
|
|
(void *)sh->data, sh->data->magic, (int)sh->socket);
|
2006-09-10 18:15:32 -04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-03-29 18:17:02 -04:00
|
|
|
/* Mark the connection as 'idle', or close it if the cache is full.
|
|
|
|
Returns TRUE if the connection is kept, or FALSE if it was closed. */
|
|
|
|
static bool
|
2016-06-21 09:47:12 -04:00
|
|
|
ConnectionDone(struct Curl_easy *data, struct connectdata *conn)
|
2016-03-29 18:17:02 -04:00
|
|
|
{
|
|
|
|
/* data->multi->maxconnects can be negative, deal with it. */
|
|
|
|
size_t maxconnects =
|
|
|
|
(data->multi->maxconnects < 0) ? data->multi->num_easy * 4:
|
|
|
|
data->multi->maxconnects;
|
|
|
|
struct connectdata *conn_candidate = NULL;
|
|
|
|
|
|
|
|
/* Mark the current connection as 'unused' */
|
|
|
|
conn->inuse = FALSE;
|
|
|
|
|
|
|
|
if(maxconnects > 0 &&
|
|
|
|
data->state.conn_cache->num_connections > maxconnects) {
|
|
|
|
infof(data, "Connection cache is full, closing the oldest one.\n");
|
|
|
|
|
|
|
|
conn_candidate = Curl_oldest_idle_connection(data);
|
|
|
|
|
|
|
|
if(conn_candidate) {
|
|
|
|
/* Set the connection's owner correctly */
|
|
|
|
conn_candidate->data = data;
|
|
|
|
|
|
|
|
/* the winner gets the honour of being disconnected */
|
|
|
|
(void)Curl_disconnect(conn_candidate, /* dead_connection */ FALSE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (conn_candidate == conn) ? FALSE : TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static CURLcode multi_done(struct connectdata **connp,
|
|
|
|
CURLcode status, /* an error if this is called
|
|
|
|
after an error was detected */
|
|
|
|
bool premature)
|
|
|
|
{
|
|
|
|
CURLcode result;
|
|
|
|
struct connectdata *conn;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data;
|
2017-03-27 06:14:57 -04:00
|
|
|
unsigned int i;
|
2016-03-29 18:17:02 -04:00
|
|
|
|
|
|
|
DEBUGASSERT(*connp);
|
|
|
|
|
|
|
|
conn = *connp;
|
|
|
|
data = conn->data;
|
|
|
|
|
|
|
|
DEBUGF(infof(data, "multi_done\n"));
|
|
|
|
|
|
|
|
if(data->state.done)
|
|
|
|
/* Stop if multi_done() has already been called */
|
|
|
|
return CURLE_OK;
|
|
|
|
|
|
|
|
Curl_getoff_all_pipelines(data, conn);
|
|
|
|
|
|
|
|
/* Cleanup possible redirect junk */
|
|
|
|
free(data->req.newurl);
|
|
|
|
data->req.newurl = NULL;
|
|
|
|
free(data->req.location);
|
|
|
|
data->req.location = NULL;
|
|
|
|
|
|
|
|
switch(status) {
|
|
|
|
case CURLE_ABORTED_BY_CALLBACK:
|
|
|
|
case CURLE_READ_ERROR:
|
|
|
|
case CURLE_WRITE_ERROR:
|
|
|
|
/* When we're aborted due to a callback return code it basically have to
|
|
|
|
be counted as premature as there is trouble ahead if we don't. We have
|
|
|
|
many callbacks and protocols work differently, we could potentially do
|
|
|
|
this more fine-grained in the future. */
|
|
|
|
premature = TRUE;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this calls the protocol-specific function pointer previously set */
|
|
|
|
if(conn->handler->done)
|
|
|
|
result = conn->handler->done(conn, status, premature);
|
|
|
|
else
|
|
|
|
result = status;
|
|
|
|
|
|
|
|
if(CURLE_ABORTED_BY_CALLBACK != result) {
|
|
|
|
/* avoid this if we already aborted by callback to avoid this calling
|
|
|
|
another callback */
|
|
|
|
CURLcode rc = Curl_pgrsDone(conn);
|
|
|
|
if(!result && rc)
|
|
|
|
result = CURLE_ABORTED_BY_CALLBACK;
|
|
|
|
}
|
|
|
|
|
2017-04-03 04:32:43 -04:00
|
|
|
if(conn->send_pipe.size + conn->recv_pipe.size != 0 &&
|
2016-08-11 08:00:23 -04:00
|
|
|
!data->set.reuse_forbid &&
|
|
|
|
!conn->bits.close) {
|
2016-03-29 18:17:02 -04:00
|
|
|
/* Stop if pipeline is not empty and we do not have to close
|
|
|
|
connection. */
|
curl_multi_remove_handle: fix a double-free
In short the easy handle needs to be disconnected from its connection at
this point since the connection still is serving other easy handles.
In our app we can reliably reproduce a crash in our http2 stress test
that is fixed by this change. I can't easily reproduce the same test in
a small example.
This is the gdb/asan output:
==11785==ERROR: AddressSanitizer: heap-use-after-free on address 0xe9f4fb80 at pc 0x09f41f19 bp 0xf27be688 sp 0xf27be67c
READ of size 4 at 0xe9f4fb80 thread T13 (RESOURCE_HTTP)
#0 0x9f41f18 in curl_multi_remove_handle /path/to/source/3rdparty/curl/lib/multi.c:666
0xe9f4fb80 is located 0 bytes inside of 1128-byte region [0xe9f4fb80,0xe9f4ffe8)
freed by thread T13 (RESOURCE_HTTP) here:
#0 0xf7b1b5c2 in __interceptor_free /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_malloc_linux.cc:45
#1 0x9f7862d in conn_free /path/to/source/3rdparty/curl/lib/url.c:2808
#2 0x9f78c6a in Curl_disconnect /path/to/source/3rdparty/curl/lib/url.c:2876
#3 0x9f41b09 in multi_done /path/to/source/3rdparty/curl/lib/multi.c:615
#4 0x9f48017 in multi_runsingle /path/to/source/3rdparty/curl/lib/multi.c:1896
#5 0x9f490f1 in curl_multi_perform /path/to/source/3rdparty/curl/lib/multi.c:2123
#6 0x9c4443c in perform /path/to/source/src/net/resourcemanager/ResourceManagerCurlThread.cpp:854
#7 0x9c445e0 in ...
#8 0x9c4cf1d in ...
#9 0xa2be6b5 in ...
#10 0xf7aa5780 in asan_thread_start /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_interceptors.cc:226
#11 0xf4d3a16d in __clone (/lib/i386-linux-gnu/libc.so.6+0xe716d)
previously allocated by thread T13 (RESOURCE_HTTP) here:
#0 0xf7b1ba27 in __interceptor_calloc /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_malloc_linux.cc:70
#1 0x9f7dfa6 in allocate_conn /path/to/source/3rdparty/curl/lib/url.c:3904
#2 0x9f88ca0 in create_conn /path/to/source/3rdparty/curl/lib/url.c:5797
#3 0x9f8c928 in Curl_connect /path/to/source/3rdparty/curl/lib/url.c:6438
#4 0x9f45a8c in multi_runsingle /path/to/source/3rdparty/curl/lib/multi.c:1411
#5 0x9f490f1 in curl_multi_perform /path/to/source/3rdparty/curl/lib/multi.c:2123
#6 0x9c4443c in perform /path/to/source/src/net/resourcemanager/ResourceManagerCurlThread.cpp:854
#7 0x9c445e0 in ...
#8 0x9c4cf1d in ...
#9 0xa2be6b5 in ...
#10 0xf7aa5780 in asan_thread_start /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_interceptors.cc:226
#11 0xf4d3a16d in __clone (/lib/i386-linux-gnu/libc.so.6+0xe716d)
SUMMARY: AddressSanitizer: heap-use-after-free /path/to/source/3rdparty/curl/lib/multi.c:666 in curl_multi_remove_handle
Shadow bytes around the buggy address:
0x3d3e9f20: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9f30: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9f40: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9f50: fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa
0x3d3e9f60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x3d3e9f70:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9f80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9f90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9fa0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9fb0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x3d3e9fc0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==11785==ABORTING
Thread 14 "RESOURCE_HTTP" received signal SIGABRT, Aborted.
[Switching to Thread 0xf27bfb40 (LWP 12324)]
0xf7fd8be9 in __kernel_vsyscall ()
(gdb) bt
#0 0xf7fd8be9 in __kernel_vsyscall ()
#1 0xf4c7ee89 in __GI_raise (sig=6) at ../sysdeps/unix/sysv/linux/raise.c:54
#2 0xf4c803e7 in __GI_abort () at abort.c:89
#3 0xf7b2ef2e in __sanitizer::Abort () at /opt/toolchain/src/gcc-6.2.0/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc:122
#4 0xf7b262fa in __sanitizer::Die () at /opt/toolchain/src/gcc-6.2.0/libsanitizer/sanitizer_common/sanitizer_common.cc:145
#5 0xf7b21ab3 in __asan::ScopedInErrorReport::~ScopedInErrorReport (this=0xf27be171, __in_chrg=<optimized out>) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_report.cc:689
#6 0xf7b214a5 in __asan::ReportGenericError (pc=166993689, bp=4068206216, sp=4068206204, addr=3925146496, is_write=false, access_size=4, exp=0, fatal=true) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_report.cc:1074
#7 0xf7b21fce in __asan::__asan_report_load4 (addr=3925146496) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_rtl.cc:129
#8 0x09f41f19 in curl_multi_remove_handle (multi=0xf3406080, data=0xde582400) at /path/to/source3rdparty/curl/lib/multi.c:666
#9 0x09f6b277 in Curl_close (data=0xde582400) at /path/to/source3rdparty/curl/lib/url.c:415
#10 0x09f3354e in curl_easy_cleanup (data=0xde582400) at /path/to/source3rdparty/curl/lib/easy.c:860
#11 0x09c6de3f in ...
#12 0x09c378c5 in ...
#13 0x09c48133 in ...
#14 0x09c4d092 in ...
#15 0x0a2be6b6 in ...
#16 0xf7aa5781 in asan_thread_start (arg=0xf2d22938) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_interceptors.cc:226
#17 0xf5de52b5 in start_thread (arg=0xf27bfb40) at pthread_create.c:333
#18 0xf4d3a16e in clone () at ../sysdeps/unix/sysv/linux/i386/clone.S:114
Fixes #1083
2016-10-20 12:37:05 -04:00
|
|
|
data->easy_conn = NULL;
|
2016-03-29 18:17:02 -04:00
|
|
|
DEBUGF(infof(data, "Connection still in use, no more multi_done now!\n"));
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
data->state.done = TRUE; /* called just now! */
|
|
|
|
Curl_resolver_cancel(conn);
|
|
|
|
|
|
|
|
if(conn->dns_entry) {
|
|
|
|
Curl_resolv_unlock(data, conn->dns_entry); /* done with this */
|
|
|
|
conn->dns_entry = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* if the transfer was completed in a paused state there can be buffered
|
2017-03-27 06:14:57 -04:00
|
|
|
data left to free */
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i < data->state.tempcount; i++) {
|
2017-03-27 06:14:57 -04:00
|
|
|
free(data->state.tempwrite[i].buf);
|
|
|
|
}
|
|
|
|
data->state.tempcount = 0;
|
2016-03-29 18:17:02 -04:00
|
|
|
|
|
|
|
/* if data->set.reuse_forbid is TRUE, it means the libcurl client has
|
|
|
|
forced us to close this connection. This is ignored for requests taking
|
|
|
|
place in a NTLM authentication handshake
|
|
|
|
|
|
|
|
if conn->bits.close is TRUE, it means that the connection should be
|
|
|
|
closed in spite of all our efforts to be nice, due to protocol
|
|
|
|
restrictions in our or the server's end
|
|
|
|
|
|
|
|
if premature is TRUE, it means this connection was said to be DONE before
|
|
|
|
the entire request operation is complete and thus we can't know in what
|
|
|
|
state it is for re-using, so we're forced to close it. In a perfect world
|
|
|
|
we can add code that keep track of if we really must close it here or not,
|
|
|
|
but currently we have no such detail knowledge.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if((data->set.reuse_forbid
|
|
|
|
#if defined(USE_NTLM)
|
|
|
|
&& !(conn->ntlm.state == NTLMSTATE_TYPE2 ||
|
|
|
|
conn->proxyntlm.state == NTLMSTATE_TYPE2)
|
|
|
|
#endif
|
|
|
|
) || conn->bits.close || premature) {
|
|
|
|
CURLcode res2 = Curl_disconnect(conn, premature); /* close connection */
|
|
|
|
|
|
|
|
/* If we had an error already, make sure we return that one. But
|
|
|
|
if we got a new error, return that. */
|
|
|
|
if(!result && res2)
|
|
|
|
result = res2;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* the connection is no longer in use */
|
|
|
|
if(ConnectionDone(data, conn)) {
|
|
|
|
/* remember the most recently used connection */
|
|
|
|
data->state.lastconnect = conn;
|
|
|
|
|
|
|
|
infof(data, "Connection #%ld to host %s left intact\n",
|
|
|
|
conn->connection_id,
|
2017-02-18 07:56:56 -05:00
|
|
|
conn->bits.socksproxy ? conn->socks_proxy.host.dispname :
|
|
|
|
conn->bits.httpproxy ? conn->http_proxy.host.dispname :
|
|
|
|
conn->bits.conn_to_host ? conn->conn_to_host.dispname :
|
|
|
|
conn->host.dispname);
|
2016-03-29 18:17:02 -04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
data->state.lastconnect = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
*connp = NULL; /* to make the caller of this function better detect that
|
|
|
|
this was either closed or handed over to the connection
|
|
|
|
cache here, and therefore cannot be used from this point on
|
|
|
|
*/
|
|
|
|
Curl_free_request_state(data);
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_remove_handle(struct Curl_multi *multi,
|
|
|
|
struct Curl_easy *data)
|
2001-11-28 06:09:18 -05:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *easy = data;
|
2014-10-03 17:46:10 -04:00
|
|
|
bool premature;
|
|
|
|
bool easy_owns_conn;
|
|
|
|
struct curl_llist_element *e;
|
2001-11-28 06:09:18 -05:00
|
|
|
|
|
|
|
/* First, make some basic checks that the CURLM handle is a good handle */
|
|
|
|
if(!GOOD_MULTI_HANDLE(multi))
|
|
|
|
return CURLM_BAD_HANDLE;
|
2004-05-17 02:53:41 -04:00
|
|
|
|
2001-11-28 06:09:18 -05:00
|
|
|
/* Verify that we got a somewhat good easy handle too */
|
2016-06-21 09:47:12 -04:00
|
|
|
if(!GOOD_EASY_HANDLE(data))
|
2001-11-28 06:09:18 -05:00
|
|
|
return CURLM_BAD_EASY_HANDLE;
|
|
|
|
|
2013-08-29 16:08:01 -04:00
|
|
|
/* Prevent users from trying to remove same easy handle more than once */
|
|
|
|
if(!data->multi)
|
|
|
|
return CURLM_OK; /* it is already removed so let's say it is fine! */
|
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
premature = (data->mstate < CURLM_STATE_COMPLETED) ? TRUE : FALSE;
|
|
|
|
easy_owns_conn = (data->easy_conn && (data->easy_conn->data == easy)) ?
|
|
|
|
TRUE : FALSE;
|
2010-08-10 05:02:07 -04:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
/* If the 'state' is not INIT or COMPLETED, we might need to do something
|
|
|
|
nice to put the easy_handle in a good known state when this returns. */
|
2015-03-29 17:48:32 -04:00
|
|
|
if(premature) {
|
2014-10-03 17:46:10 -04:00
|
|
|
/* this handle is "alive" so we need to count down the total number of
|
|
|
|
alive connections when this is removed */
|
|
|
|
multi->num_alive--;
|
2006-07-07 18:58:06 -04:00
|
|
|
|
2015-03-29 17:48:32 -04:00
|
|
|
/* When this handle gets removed, other handles may be able to get the
|
|
|
|
connection */
|
|
|
|
Curl_multi_process_pending_handles(multi);
|
|
|
|
}
|
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
if(data->easy_conn &&
|
2014-11-16 15:53:56 -05:00
|
|
|
data->mstate > CURLM_STATE_DO &&
|
2014-10-03 17:46:10 -04:00
|
|
|
data->mstate < CURLM_STATE_COMPLETED) {
|
2017-03-21 05:09:11 -04:00
|
|
|
/* Set connection owner so that the DONE function closes it. We can
|
|
|
|
safely do this here since connection is killed. */
|
|
|
|
data->easy_conn->data = easy;
|
2014-10-03 17:46:10 -04:00
|
|
|
/* If the handle is in a pipeline and has started sending off its
|
|
|
|
request but not received its response yet, we need to close
|
|
|
|
connection. */
|
2016-08-11 08:00:23 -04:00
|
|
|
streamclose(data->easy_conn, "Removed with partial response");
|
2014-11-16 15:53:56 -05:00
|
|
|
easy_owns_conn = TRUE;
|
2014-10-03 17:46:10 -04:00
|
|
|
}
|
2008-12-03 10:20:27 -05:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
/* The timer must be shut down before data->multi is set to NULL,
|
|
|
|
else the timenode will remain in the splay tree after
|
|
|
|
curl_easy_cleanup is called. */
|
2016-08-02 04:57:30 -04:00
|
|
|
Curl_expire_clear(data);
|
2006-09-21 16:52:58 -04:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
if(data->easy_conn) {
|
2014-01-29 16:40:57 -05:00
|
|
|
|
2016-03-29 18:17:02 -04:00
|
|
|
/* we must call multi_done() here (if we still own the connection) so that
|
|
|
|
we don't leave a half-baked one around */
|
2014-10-03 17:46:10 -04:00
|
|
|
if(easy_owns_conn) {
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2016-03-29 18:17:02 -04:00
|
|
|
/* multi_done() clears the conn->data field to lose the association
|
2014-10-03 17:46:10 -04:00
|
|
|
between the easy handle and the connection
|
2006-09-10 18:15:32 -04:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
Note that this ignores the return code simply because there's
|
|
|
|
nothing really useful to do with it anyway! */
|
2016-03-29 18:17:02 -04:00
|
|
|
(void)multi_done(&data->easy_conn, data->result, premature);
|
2012-12-06 06:12:04 -05:00
|
|
|
}
|
2014-10-03 17:46:10 -04:00
|
|
|
else
|
2016-03-29 18:17:02 -04:00
|
|
|
/* Clear connection pipelines, if multi_done above was not called */
|
2014-10-03 17:46:10 -04:00
|
|
|
Curl_getoff_all_pipelines(data, data->easy_conn);
|
|
|
|
}
|
2012-12-06 06:12:04 -05:00
|
|
|
|
2017-10-07 16:00:48 -04:00
|
|
|
if(data->dns.hostcachetype == HCACHE_MULTI) {
|
|
|
|
/* stop using the multi handle's DNS cache, *after* the possible
|
|
|
|
multi_done() call above */
|
|
|
|
data->dns.hostcache = NULL;
|
|
|
|
data->dns.hostcachetype = HCACHE_NONE;
|
|
|
|
}
|
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
Curl_wildcard_dtor(&data->wildcard);
|
2010-08-08 18:01:36 -04:00
|
|
|
|
2016-02-23 07:05:41 -05:00
|
|
|
/* destroy the timeout list that is held in the easy handle, do this *after*
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done() as that may actually call Curl_expire that uses this */
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_llist_destroy(&data->state.timeoutlist, NULL);
|
2016-02-23 07:05:41 -05:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
/* as this was using a shared connection cache we clear the pointer to that
|
|
|
|
since we're not part of that multi handle anymore */
|
|
|
|
data->state.conn_cache = NULL;
|
2010-08-08 18:01:36 -04:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
/* change state without using multistate(), only to make singlesocket() do
|
|
|
|
what we want */
|
|
|
|
data->mstate = CURLM_STATE_COMPLETED;
|
|
|
|
singlesocket(multi, easy); /* to let the application know what sockets that
|
|
|
|
vanish with this handle */
|
2010-08-08 18:01:36 -04:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
/* Remove the association between the connection and the handle */
|
|
|
|
if(data->easy_conn) {
|
|
|
|
data->easy_conn->data = NULL;
|
|
|
|
data->easy_conn = NULL;
|
|
|
|
}
|
2013-08-01 18:09:59 -04:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
data->multi = NULL; /* clear the association to this multi handle */
|
2004-05-17 02:53:41 -04:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
/* make sure there's no pending message in the queue sent from this easy
|
|
|
|
handle */
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2017-04-03 04:32:43 -04:00
|
|
|
for(e = multi->msglist.head; e; e = e->next) {
|
2014-10-03 17:46:10 -04:00
|
|
|
struct Curl_message *msg = e->ptr;
|
2001-11-28 11:00:18 -05:00
|
|
|
|
2014-10-03 17:46:10 -04:00
|
|
|
if(msg->extmsg.easy_handle == easy) {
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_llist_remove(&multi->msglist, e, NULL);
|
2014-10-03 17:46:10 -04:00
|
|
|
/* there can only be one from this specific handle */
|
|
|
|
break;
|
|
|
|
}
|
2001-11-28 06:09:18 -05:00
|
|
|
}
|
2014-10-03 17:46:10 -04:00
|
|
|
|
|
|
|
/* make the previous node point to our next */
|
|
|
|
if(data->prev)
|
|
|
|
data->prev->next = data->next;
|
2001-11-28 06:09:18 -05:00
|
|
|
else
|
2014-10-03 17:46:10 -04:00
|
|
|
multi->easyp = data->next; /* point to first node */
|
|
|
|
|
|
|
|
/* make our next point to our previous node */
|
|
|
|
if(data->next)
|
|
|
|
data->next->prev = data->prev;
|
|
|
|
else
|
|
|
|
multi->easylp = data->prev; /* point to last node */
|
|
|
|
|
|
|
|
/* NOTE NOTE NOTE
|
|
|
|
We do not touch the easy handle here! */
|
|
|
|
multi->num_easy--; /* one less to care about now */
|
|
|
|
|
|
|
|
update_timer(multi);
|
|
|
|
return CURLM_OK;
|
2001-11-28 06:09:18 -05:00
|
|
|
}
|
|
|
|
|
2015-05-08 04:43:36 -04:00
|
|
|
/* Return TRUE if the application asked for a certain set of pipelining */
|
|
|
|
bool Curl_pipeline_wanted(const struct Curl_multi *multi, int bits)
|
2006-09-07 17:49:20 -04:00
|
|
|
{
|
2015-05-08 04:43:36 -04:00
|
|
|
return (multi && (multi->pipelining & bits)) ? TRUE : FALSE;
|
2006-09-07 17:49:20 -04:00
|
|
|
}
|
|
|
|
|
2016-06-21 09:47:12 -04:00
|
|
|
void Curl_multi_handlePipeBreak(struct Curl_easy *data)
|
2007-04-10 16:46:40 -04:00
|
|
|
{
|
2013-08-02 06:25:18 -04:00
|
|
|
data->easy_conn = NULL;
|
2007-04-10 16:46:40 -04:00
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
static int waitconnect_getsock(struct connectdata *conn,
|
|
|
|
curl_socket_t *sock,
|
|
|
|
int numsocks)
|
|
|
|
{
|
2013-10-26 08:17:33 -04:00
|
|
|
int i;
|
2017-09-09 17:09:06 -04:00
|
|
|
int s = 0;
|
|
|
|
int rc = 0;
|
2013-10-26 08:17:33 -04:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
if(!numsocks)
|
|
|
|
return GETSOCK_BLANK;
|
|
|
|
|
2016-11-21 05:01:25 -05:00
|
|
|
#ifdef USE_SSL
|
2016-11-16 12:49:15 -05:00
|
|
|
if(CONNECT_FIRSTSOCKET_PROXY_SSL())
|
|
|
|
return Curl_ssl_getsock(conn, sock, numsocks);
|
2016-11-21 05:01:25 -05:00
|
|
|
#endif
|
2016-11-16 12:49:15 -05:00
|
|
|
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i<2; i++) {
|
2013-10-26 08:17:33 -04:00
|
|
|
if(conn->tempsock[i] != CURL_SOCKET_BAD) {
|
|
|
|
sock[s] = conn->tempsock[i];
|
|
|
|
rc |= GETSOCK_WRITESOCK(s++);
|
|
|
|
}
|
|
|
|
}
|
2008-05-09 08:59:24 -04:00
|
|
|
|
2015-02-11 17:18:32 -05:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int waitproxyconnect_getsock(struct connectdata *conn,
|
|
|
|
curl_socket_t *sock,
|
|
|
|
int numsocks)
|
|
|
|
{
|
|
|
|
if(!numsocks)
|
|
|
|
return GETSOCK_BLANK;
|
|
|
|
|
|
|
|
sock[0] = conn->sock[FIRSTSOCKET];
|
|
|
|
|
2008-05-09 08:59:24 -04:00
|
|
|
/* when we've sent a CONNECT to a proxy, we should rather wait for the
|
|
|
|
socket to become readable to be able to get the response headers */
|
2017-06-07 17:02:26 -04:00
|
|
|
if(conn->connect_state)
|
2015-02-11 17:18:32 -05:00
|
|
|
return GETSOCK_READSOCK(0);
|
2008-05-09 08:59:24 -04:00
|
|
|
|
2015-02-11 17:18:32 -05:00
|
|
|
return GETSOCK_WRITESOCK(0);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int domore_getsock(struct connectdata *conn,
|
2011-10-21 17:36:54 -04:00
|
|
|
curl_socket_t *socks,
|
2006-04-10 11:00:53 -04:00
|
|
|
int numsocks)
|
|
|
|
{
|
2011-10-21 17:36:54 -04:00
|
|
|
if(conn && conn->handler->domore_getsock)
|
|
|
|
return conn->handler->domore_getsock(conn, socks, numsocks);
|
|
|
|
return GETSOCK_BLANK;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* returns bitmapped flags for this handle and its sockets */
|
2016-06-21 09:47:12 -04:00
|
|
|
static int multi_getsock(struct Curl_easy *data,
|
2006-04-10 11:00:53 -04:00
|
|
|
curl_socket_t *socks, /* points to numsocks number
|
2009-08-03 07:32:55 -04:00
|
|
|
of sockets */
|
2006-04-10 11:00:53 -04:00
|
|
|
int numsocks)
|
|
|
|
{
|
2007-03-31 06:56:07 -04:00
|
|
|
/* If the pipe broke, or if there's no connection left for this easy handle,
|
|
|
|
then we MUST bail out now with no bitmask set. The no connection case can
|
|
|
|
happen when this is called from curl_multi_remove_handle() =>
|
|
|
|
singlesocket() => multi_getsock().
|
|
|
|
*/
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->state.pipe_broke || !data->easy_conn)
|
2006-09-07 17:49:20 -04:00
|
|
|
return 0;
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->mstate > CURLM_STATE_CONNECT &&
|
|
|
|
data->mstate < CURLM_STATE_COMPLETED) {
|
2006-09-07 17:49:20 -04:00
|
|
|
/* Set up ownership correctly */
|
2013-08-12 07:52:58 -04:00
|
|
|
data->easy_conn->data = data;
|
2006-09-07 17:49:20 -04:00
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
switch(data->mstate) {
|
2006-04-10 11:00:53 -04:00
|
|
|
default:
|
2008-05-19 16:58:01 -04:00
|
|
|
#if 0 /* switch back on these cases to get the compiler to check for all enums
|
|
|
|
to be present */
|
|
|
|
case CURLM_STATE_TOOFAST: /* returns 0, so will not select. */
|
|
|
|
case CURLM_STATE_COMPLETED:
|
2010-08-18 13:59:46 -04:00
|
|
|
case CURLM_STATE_MSGSENT:
|
2008-05-19 16:58:01 -04:00
|
|
|
case CURLM_STATE_INIT:
|
|
|
|
case CURLM_STATE_CONNECT:
|
|
|
|
case CURLM_STATE_WAITDO:
|
|
|
|
case CURLM_STATE_DONE:
|
|
|
|
case CURLM_STATE_LAST:
|
2006-09-10 18:15:32 -04:00
|
|
|
/* this will get called with CURLM_STATE_COMPLETED when a handle is
|
|
|
|
removed */
|
2008-05-19 16:58:01 -04:00
|
|
|
#endif
|
2006-04-10 11:00:53 -04:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
case CURLM_STATE_WAITRESOLVE:
|
2013-08-12 07:52:58 -04:00
|
|
|
return Curl_resolver_getsock(data->easy_conn, socks, numsocks);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
case CURLM_STATE_PROTOCONNECT:
|
2015-02-11 17:18:32 -05:00
|
|
|
case CURLM_STATE_SENDPROTOCONNECT:
|
2013-08-12 07:52:58 -04:00
|
|
|
return Curl_protocol_getsock(data->easy_conn, socks, numsocks);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2008-05-19 16:58:01 -04:00
|
|
|
case CURLM_STATE_DO:
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_DOING:
|
2013-08-12 07:52:58 -04:00
|
|
|
return Curl_doing_getsock(data->easy_conn, socks, numsocks);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2008-01-18 16:51:10 -05:00
|
|
|
case CURLM_STATE_WAITPROXYCONNECT:
|
2015-02-11 17:18:32 -05:00
|
|
|
return waitproxyconnect_getsock(data->easy_conn, socks, numsocks);
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_WAITCONNECT:
|
2013-08-12 07:52:58 -04:00
|
|
|
return waitconnect_getsock(data->easy_conn, socks, numsocks);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
case CURLM_STATE_DO_MORE:
|
2013-08-12 07:52:58 -04:00
|
|
|
return domore_getsock(data->easy_conn, socks, numsocks);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2008-05-19 16:58:01 -04:00
|
|
|
case CURLM_STATE_DO_DONE: /* since is set after DO is completed, we switch
|
2011-04-02 18:07:32 -04:00
|
|
|
to waiting for the same as the *PERFORM
|
|
|
|
states */
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_PERFORM:
|
2006-09-07 17:49:20 -04:00
|
|
|
case CURLM_STATE_WAITPERFORM:
|
2013-08-12 07:52:58 -04:00
|
|
|
return Curl_single_getsock(data->easy_conn, socks, numsocks);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_fdset(struct Curl_multi *multi,
|
2001-11-28 06:09:18 -05:00
|
|
|
fd_set *read_fd_set, fd_set *write_fd_set,
|
|
|
|
fd_set *exc_fd_set, int *max_fd)
|
|
|
|
{
|
|
|
|
/* Scan through all the easy handles to get the file descriptors set.
|
|
|
|
Some easy handles may not have connected to the remote host yet,
|
|
|
|
and then we must make sure that is done. */
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data;
|
2017-09-09 17:09:06 -04:00
|
|
|
int this_max_fd = -1;
|
2006-04-10 11:00:53 -04:00
|
|
|
curl_socket_t sockbunch[MAX_SOCKSPEREASYHANDLE];
|
|
|
|
int bitmap;
|
|
|
|
int i;
|
|
|
|
(void)exc_fd_set; /* not used */
|
2001-11-28 06:09:18 -05:00
|
|
|
|
|
|
|
if(!GOOD_MULTI_HANDLE(multi))
|
|
|
|
return CURLM_BAD_HANDLE;
|
|
|
|
|
2017-09-09 17:09:06 -04:00
|
|
|
data = multi->easyp;
|
2013-08-12 07:52:58 -04:00
|
|
|
while(data) {
|
|
|
|
bitmap = multi_getsock(data, sockbunch, MAX_SOCKSPEREASYHANDLE);
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i< MAX_SOCKSPEREASYHANDLE; i++) {
|
2006-04-10 11:00:53 -04:00
|
|
|
curl_socket_t s = CURL_SOCKET_BAD;
|
2002-08-12 05:43:20 -04:00
|
|
|
|
2011-09-25 11:34:12 -04:00
|
|
|
if((bitmap & GETSOCK_READSOCK(i)) && VALID_SOCK((sockbunch[i]))) {
|
2006-04-10 11:00:53 -04:00
|
|
|
FD_SET(sockbunch[i], read_fd_set);
|
|
|
|
s = sockbunch[i];
|
|
|
|
}
|
2011-09-25 11:34:12 -04:00
|
|
|
if((bitmap & GETSOCK_WRITESOCK(i)) && VALID_SOCK((sockbunch[i]))) {
|
2006-04-10 11:00:53 -04:00
|
|
|
FD_SET(sockbunch[i], write_fd_set);
|
|
|
|
s = sockbunch[i];
|
|
|
|
}
|
|
|
|
if(s == CURL_SOCKET_BAD)
|
|
|
|
/* this socket is unused, break out of loop */
|
|
|
|
break;
|
2017-03-10 08:28:37 -05:00
|
|
|
if((int)s > this_max_fd)
|
|
|
|
this_max_fd = (int)s;
|
2001-11-28 06:09:18 -05:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
data = data->next; /* check next handle */
|
2001-11-28 06:09:18 -05:00
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
*max_fd = this_max_fd;
|
|
|
|
|
2001-11-28 06:09:18 -05:00
|
|
|
return CURLM_OK;
|
|
|
|
}
|
|
|
|
|
2017-03-31 19:27:24 -04:00
|
|
|
#define NUM_POLLS_ON_STACK 10
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_wait(struct Curl_multi *multi,
|
2012-08-27 15:48:55 -04:00
|
|
|
struct curl_waitfd extra_fds[],
|
|
|
|
unsigned int extra_nfds,
|
2012-09-15 13:38:52 -04:00
|
|
|
int timeout_ms,
|
|
|
|
int *ret)
|
2012-08-27 15:48:55 -04:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data;
|
2012-08-27 15:48:55 -04:00
|
|
|
curl_socket_t sockbunch[MAX_SOCKSPEREASYHANDLE];
|
|
|
|
int bitmap;
|
2013-07-18 17:36:59 -04:00
|
|
|
unsigned int i;
|
2013-03-09 16:26:07 -05:00
|
|
|
unsigned int nfds = 0;
|
|
|
|
unsigned int curlfds;
|
2012-12-23 15:06:40 -05:00
|
|
|
struct pollfd *ufds = NULL;
|
2017-03-31 19:27:24 -04:00
|
|
|
bool ufds_malloc = FALSE;
|
2013-06-03 14:19:51 -04:00
|
|
|
long timeout_internal;
|
2016-03-09 04:57:42 -05:00
|
|
|
int retcode = 0;
|
2017-03-31 19:27:24 -04:00
|
|
|
struct pollfd a_few_on_stack[NUM_POLLS_ON_STACK];
|
2012-08-27 15:48:55 -04:00
|
|
|
|
|
|
|
if(!GOOD_MULTI_HANDLE(multi))
|
|
|
|
return CURLM_BAD_HANDLE;
|
|
|
|
|
2013-06-03 14:19:51 -04:00
|
|
|
/* If the internally desired timeout is actually shorter than requested from
|
2013-06-04 07:22:40 -04:00
|
|
|
the outside, then use the shorter time! But only if the internal timer
|
2013-10-30 18:48:08 -04:00
|
|
|
is actually larger than -1! */
|
2013-06-03 14:19:51 -04:00
|
|
|
(void)multi_timeout(multi, &timeout_internal);
|
2013-10-30 18:48:08 -04:00
|
|
|
if((timeout_internal >= 0) && (timeout_internal < (long)timeout_ms))
|
2013-06-03 14:19:51 -04:00
|
|
|
timeout_ms = (int)timeout_internal;
|
|
|
|
|
2012-08-27 15:48:55 -04:00
|
|
|
/* Count up how many fds we have from the multi handle */
|
2017-09-09 17:09:06 -04:00
|
|
|
data = multi->easyp;
|
2013-08-12 07:52:58 -04:00
|
|
|
while(data) {
|
|
|
|
bitmap = multi_getsock(data, sockbunch, MAX_SOCKSPEREASYHANDLE);
|
2012-08-27 15:48:55 -04:00
|
|
|
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i< MAX_SOCKSPEREASYHANDLE; i++) {
|
2012-08-27 15:48:55 -04:00
|
|
|
curl_socket_t s = CURL_SOCKET_BAD;
|
|
|
|
|
|
|
|
if(bitmap & GETSOCK_READSOCK(i)) {
|
|
|
|
++nfds;
|
|
|
|
s = sockbunch[i];
|
|
|
|
}
|
|
|
|
if(bitmap & GETSOCK_WRITESOCK(i)) {
|
|
|
|
++nfds;
|
|
|
|
s = sockbunch[i];
|
|
|
|
}
|
|
|
|
if(s == CURL_SOCKET_BAD) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
data = data->next; /* check next handle */
|
2012-08-27 15:48:55 -04:00
|
|
|
}
|
|
|
|
|
2013-03-09 16:26:07 -05:00
|
|
|
curlfds = nfds; /* number of internal file descriptors */
|
|
|
|
nfds += extra_nfds; /* add the externally provided ones */
|
|
|
|
|
2017-04-22 16:16:44 -04:00
|
|
|
if(nfds) {
|
2017-03-31 19:27:24 -04:00
|
|
|
if(nfds > NUM_POLLS_ON_STACK) {
|
2017-07-26 19:13:47 -04:00
|
|
|
/* 'nfds' is a 32 bit value and 'struct pollfd' is typically 8 bytes
|
|
|
|
big, so at 2^29 sockets this value might wrap. When a process gets
|
|
|
|
the capability to actually handle over 500 million sockets this
|
|
|
|
calculation needs a integer overflow check. */
|
2017-03-31 19:27:24 -04:00
|
|
|
ufds = malloc(nfds * sizeof(struct pollfd));
|
|
|
|
if(!ufds)
|
|
|
|
return CURLM_OUT_OF_MEMORY;
|
|
|
|
ufds_malloc = TRUE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ufds = &a_few_on_stack[0];
|
2012-12-23 15:10:45 -05:00
|
|
|
}
|
2012-08-27 15:48:55 -04:00
|
|
|
nfds = 0;
|
|
|
|
|
2013-03-09 16:26:07 -05:00
|
|
|
/* only do the second loop if we found descriptors in the first stage run
|
|
|
|
above */
|
2012-08-27 15:48:55 -04:00
|
|
|
|
2013-03-09 16:26:07 -05:00
|
|
|
if(curlfds) {
|
|
|
|
/* Add the curl handles to our pollfds first */
|
2017-09-09 17:09:06 -04:00
|
|
|
data = multi->easyp;
|
2013-08-12 07:52:58 -04:00
|
|
|
while(data) {
|
|
|
|
bitmap = multi_getsock(data, sockbunch, MAX_SOCKSPEREASYHANDLE);
|
2012-08-27 15:48:55 -04:00
|
|
|
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i< MAX_SOCKSPEREASYHANDLE; i++) {
|
2013-03-09 16:26:07 -05:00
|
|
|
curl_socket_t s = CURL_SOCKET_BAD;
|
|
|
|
|
|
|
|
if(bitmap & GETSOCK_READSOCK(i)) {
|
|
|
|
ufds[nfds].fd = sockbunch[i];
|
|
|
|
ufds[nfds].events = POLLIN;
|
|
|
|
++nfds;
|
|
|
|
s = sockbunch[i];
|
|
|
|
}
|
|
|
|
if(bitmap & GETSOCK_WRITESOCK(i)) {
|
|
|
|
ufds[nfds].fd = sockbunch[i];
|
|
|
|
ufds[nfds].events = POLLOUT;
|
|
|
|
++nfds;
|
|
|
|
s = sockbunch[i];
|
|
|
|
}
|
|
|
|
if(s == CURL_SOCKET_BAD) {
|
|
|
|
break;
|
|
|
|
}
|
2012-08-27 15:48:55 -04:00
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
data = data->next; /* check next handle */
|
2013-03-09 16:26:07 -05:00
|
|
|
}
|
2012-08-27 15:48:55 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Add external file descriptions from poll-like struct curl_waitfd */
|
|
|
|
for(i = 0; i < extra_nfds; i++) {
|
|
|
|
ufds[nfds].fd = extra_fds[i].fd;
|
2012-11-26 10:20:53 -05:00
|
|
|
ufds[nfds].events = 0;
|
|
|
|
if(extra_fds[i].events & CURL_WAIT_POLLIN)
|
|
|
|
ufds[nfds].events |= POLLIN;
|
|
|
|
if(extra_fds[i].events & CURL_WAIT_POLLPRI)
|
|
|
|
ufds[nfds].events |= POLLPRI;
|
|
|
|
if(extra_fds[i].events & CURL_WAIT_POLLOUT)
|
|
|
|
ufds[nfds].events |= POLLOUT;
|
2012-08-27 15:48:55 -04:00
|
|
|
++nfds;
|
|
|
|
}
|
|
|
|
|
2013-07-18 17:36:59 -04:00
|
|
|
if(nfds) {
|
2016-03-09 04:57:42 -05:00
|
|
|
int pollrc;
|
2012-10-09 16:19:49 -04:00
|
|
|
/* wait... */
|
2016-03-09 04:57:42 -05:00
|
|
|
pollrc = Curl_poll(ufds, nfds, timeout_ms);
|
|
|
|
DEBUGF(infof(data, "Curl_poll(%d ds, %d ms) == %d\n",
|
|
|
|
nfds, timeout_ms, pollrc));
|
2013-07-18 17:36:59 -04:00
|
|
|
|
2016-03-09 04:57:42 -05:00
|
|
|
if(pollrc > 0) {
|
|
|
|
retcode = pollrc;
|
2013-07-18 17:36:59 -04:00
|
|
|
/* copy revents results from the poll to the curl_multi_wait poll
|
|
|
|
struct, the bit values of the actual underlying poll() implementation
|
|
|
|
may not be the same as the ones in the public libcurl API! */
|
2016-03-09 04:57:42 -05:00
|
|
|
for(i = 0; i < extra_nfds; i++) {
|
2013-07-18 17:36:59 -04:00
|
|
|
unsigned short mask = 0;
|
2016-03-09 04:57:42 -05:00
|
|
|
unsigned r = ufds[curlfds + i].revents;
|
2013-07-18 17:36:59 -04:00
|
|
|
|
|
|
|
if(r & POLLIN)
|
|
|
|
mask |= CURL_WAIT_POLLIN;
|
|
|
|
if(r & POLLOUT)
|
|
|
|
mask |= CURL_WAIT_POLLOUT;
|
|
|
|
if(r & POLLPRI)
|
|
|
|
mask |= CURL_WAIT_POLLPRI;
|
|
|
|
|
2016-03-09 04:57:42 -05:00
|
|
|
extra_fds[i].revents = mask;
|
2013-07-18 17:36:59 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-10-09 16:19:49 -04:00
|
|
|
|
2017-03-31 19:27:24 -04:00
|
|
|
if(ufds_malloc)
|
|
|
|
free(ufds);
|
2012-09-15 13:38:52 -04:00
|
|
|
if(ret)
|
2016-03-09 04:57:42 -05:00
|
|
|
*ret = retcode;
|
2012-08-27 15:48:55 -04:00
|
|
|
return CURLM_OK;
|
|
|
|
}
|
|
|
|
|
2015-05-11 05:41:10 -04:00
|
|
|
/*
|
|
|
|
* Curl_multi_connchanged() is called to tell that there is a connection in
|
|
|
|
* this multi handle that has changed state (pipelining become possible, the
|
|
|
|
* number of allowed streams changed or similar), and a subsequent use of this
|
|
|
|
* multi handle should move CONNECT_PEND handles back to CONNECT to have them
|
|
|
|
* retry.
|
|
|
|
*/
|
|
|
|
void Curl_multi_connchanged(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
multi->recheckstate = TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* multi_ischanged() is called
|
|
|
|
*
|
|
|
|
* Returns TRUE/FALSE whether the state is changed to trigger a CONNECT_PEND
|
|
|
|
* => CONNECT action.
|
|
|
|
*
|
|
|
|
* Set 'clear' to TRUE to have it also clear the state variable.
|
|
|
|
*/
|
|
|
|
static bool multi_ischanged(struct Curl_multi *multi, bool clear)
|
|
|
|
{
|
|
|
|
bool retval = multi->recheckstate;
|
|
|
|
if(clear)
|
|
|
|
multi->recheckstate = FALSE;
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2015-06-01 08:20:57 -04:00
|
|
|
CURLMcode Curl_multi_add_perform(struct Curl_multi *multi,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data,
|
2015-06-01 08:20:57 -04:00
|
|
|
struct connectdata *conn)
|
|
|
|
{
|
|
|
|
CURLMcode rc;
|
|
|
|
|
|
|
|
rc = curl_multi_add_handle(multi, data);
|
|
|
|
if(!rc) {
|
2015-06-02 04:34:27 -04:00
|
|
|
struct SingleRequest *k = &data->req;
|
|
|
|
|
|
|
|
/* pass in NULL for 'conn' here since we don't want to init the
|
|
|
|
connection, only this transfer */
|
|
|
|
Curl_init_do(data, NULL);
|
|
|
|
|
2015-06-01 08:20:57 -04:00
|
|
|
/* take this handle to the perform state right away */
|
|
|
|
multistate(data, CURLM_STATE_PERFORM);
|
|
|
|
data->easy_conn = conn;
|
2015-06-02 04:34:27 -04:00
|
|
|
k->keepon |= KEEP_RECV; /* setup to receive! */
|
2015-06-01 08:20:57 -04:00
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2016-03-29 17:56:22 -04:00
|
|
|
static CURLcode multi_reconnect_request(struct connectdata **connp)
|
|
|
|
{
|
|
|
|
CURLcode result = CURLE_OK;
|
|
|
|
struct connectdata *conn = *connp;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data = conn->data;
|
2016-03-29 17:56:22 -04:00
|
|
|
|
|
|
|
/* This was a re-use of a connection and we got a write error in the
|
|
|
|
* DO-phase. Then we DISCONNECT this connection and have another attempt to
|
|
|
|
* CONNECT and then DO again! The retry cannot possibly find another
|
|
|
|
* connection to re-use, since we only keep one possible connection for
|
|
|
|
* each. */
|
|
|
|
|
|
|
|
infof(data, "Re-used connection seems dead, get a new one\n");
|
|
|
|
|
|
|
|
connclose(conn, "Reconnect dead connection"); /* enforce close */
|
2016-03-29 18:17:02 -04:00
|
|
|
result = multi_done(&conn, result, FALSE); /* we are so done with this */
|
2016-03-29 17:56:22 -04:00
|
|
|
|
|
|
|
/* conn may no longer be a good pointer, clear it to avoid mistakes by
|
|
|
|
parent functions */
|
|
|
|
*connp = NULL;
|
|
|
|
|
|
|
|
/*
|
2016-03-29 18:17:02 -04:00
|
|
|
* We need to check for CURLE_SEND_ERROR here as well. This could happen
|
|
|
|
* when the request failed on a FTP connection and thus multi_done() itself
|
|
|
|
* tried to use the connection (again).
|
2016-03-29 17:56:22 -04:00
|
|
|
*/
|
|
|
|
if(!result || (CURLE_SEND_ERROR == result)) {
|
|
|
|
bool async;
|
|
|
|
bool protocol_done = TRUE;
|
|
|
|
|
|
|
|
/* Now, redo the connect and get a new connection */
|
|
|
|
result = Curl_connect(data, connp, &async, &protocol_done);
|
|
|
|
if(!result) {
|
|
|
|
/* We have connected or sent away a name resolve query fine */
|
|
|
|
|
|
|
|
conn = *connp; /* setup conn to again point to something nice */
|
|
|
|
if(async) {
|
|
|
|
/* Now, if async is TRUE here, we need to wait for the name
|
|
|
|
to resolve */
|
|
|
|
result = Curl_resolver_wait_resolv(conn, NULL);
|
|
|
|
if(result)
|
|
|
|
return result;
|
|
|
|
|
|
|
|
/* Resolved, continue with the connection */
|
|
|
|
result = Curl_async_resolved(conn, &protocol_done);
|
|
|
|
if(result)
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-03-29 17:53:48 -04:00
|
|
|
/*
|
|
|
|
* do_complete is called when the DO actions are complete.
|
|
|
|
*
|
|
|
|
* We init chunking and trailer bits to their default values here immediately
|
|
|
|
* before receiving any header data for the current request in the pipeline.
|
|
|
|
*/
|
|
|
|
static void do_complete(struct connectdata *conn)
|
|
|
|
{
|
2017-09-09 17:09:06 -04:00
|
|
|
conn->data->req.chunk = FALSE;
|
2016-03-29 17:53:48 -04:00
|
|
|
conn->data->req.maxfd = (conn->sockfd>conn->writesockfd?
|
2017-09-09 17:55:08 -04:00
|
|
|
conn->sockfd:conn->writesockfd) + 1;
|
2016-03-29 17:53:48 -04:00
|
|
|
Curl_pgrsTime(conn->data, TIMER_PRETRANSFER);
|
|
|
|
}
|
|
|
|
|
|
|
|
static CURLcode multi_do(struct connectdata **connp, bool *done)
|
|
|
|
{
|
2017-09-09 17:09:06 -04:00
|
|
|
CURLcode result = CURLE_OK;
|
2016-03-29 17:53:48 -04:00
|
|
|
struct connectdata *conn = *connp;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data = conn->data;
|
2016-03-29 17:53:48 -04:00
|
|
|
|
|
|
|
if(conn->handler->do_it) {
|
|
|
|
/* generic protocol-specific function pointer set in curl_connect() */
|
|
|
|
result = conn->handler->do_it(conn, done);
|
|
|
|
|
|
|
|
/* This was formerly done in transfer.c, but we better do it here */
|
|
|
|
if((CURLE_SEND_ERROR == result) && conn->bits.reuse) {
|
|
|
|
/*
|
|
|
|
* If the connection is using an easy handle, call reconnect
|
|
|
|
* to re-establish the connection. Otherwise, let the multi logic
|
|
|
|
* figure out how to re-establish the connection.
|
|
|
|
*/
|
|
|
|
if(!data->multi) {
|
2016-03-29 17:56:22 -04:00
|
|
|
result = multi_reconnect_request(connp);
|
2016-03-29 17:53:48 -04:00
|
|
|
|
|
|
|
if(!result) {
|
|
|
|
/* ... finally back to actually retry the DO phase */
|
2016-03-29 17:56:22 -04:00
|
|
|
conn = *connp; /* re-assign conn since multi_reconnect_request
|
2016-03-29 17:53:48 -04:00
|
|
|
creates a new connection */
|
|
|
|
result = conn->handler->do_it(conn, done);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!result && *done)
|
|
|
|
/* do_complete must be called after the protocol-specific DO function */
|
|
|
|
do_complete(conn);
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* multi_do_more() is called during the DO_MORE multi state. It is basically a
|
|
|
|
* second stage DO state which (wrongly) was introduced to support FTP's
|
|
|
|
* second connection.
|
|
|
|
*
|
|
|
|
* TODO: A future libcurl should be able to work away this state.
|
|
|
|
*
|
|
|
|
* 'complete' can return 0 for incomplete, 1 for done and -1 for go back to
|
|
|
|
* DOING state there's more work to do!
|
|
|
|
*/
|
|
|
|
|
|
|
|
static CURLcode multi_do_more(struct connectdata *conn, int *complete)
|
|
|
|
{
|
2017-09-09 17:09:06 -04:00
|
|
|
CURLcode result = CURLE_OK;
|
2016-03-29 17:53:48 -04:00
|
|
|
|
|
|
|
*complete = 0;
|
|
|
|
|
|
|
|
if(conn->handler->do_more)
|
|
|
|
result = conn->handler->do_more(conn, complete);
|
|
|
|
|
|
|
|
if(!result && (*complete == 1))
|
|
|
|
/* do_complete must be called after the protocol-specific DO function */
|
|
|
|
do_complete(conn);
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
static CURLMcode multi_runsingle(struct Curl_multi *multi,
|
2017-07-28 09:49:36 -04:00
|
|
|
struct curltime now,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data)
|
2001-11-28 06:09:18 -05:00
|
|
|
{
|
2002-05-28 10:45:50 -04:00
|
|
|
struct Curl_message *msg = NULL;
|
2002-08-12 05:43:20 -04:00
|
|
|
bool connected;
|
2003-08-05 10:40:59 -04:00
|
|
|
bool async;
|
2007-04-13 03:57:31 -04:00
|
|
|
bool protocol_connect = FALSE;
|
2013-01-17 06:59:23 -05:00
|
|
|
bool dophase_done = FALSE;
|
2008-08-07 21:52:08 -04:00
|
|
|
bool done = FALSE;
|
2014-11-18 08:37:57 -05:00
|
|
|
CURLMcode rc;
|
2014-11-18 09:18:21 -05:00
|
|
|
CURLcode result = CURLE_OK;
|
2007-11-24 18:16:55 -05:00
|
|
|
struct SingleRequest *k;
|
2016-11-18 04:07:08 -05:00
|
|
|
time_t timeout_ms;
|
2017-01-29 11:14:05 -05:00
|
|
|
time_t recv_timeout_ms;
|
2017-10-26 09:24:50 -04:00
|
|
|
timediff_t send_timeout_ms;
|
2013-08-05 17:49:53 -04:00
|
|
|
int control;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(!GOOD_EASY_HANDLE(data))
|
2008-02-20 03:28:02 -05:00
|
|
|
return CURLM_BAD_EASY_HANDLE;
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
do {
|
2016-08-11 08:00:23 -04:00
|
|
|
/* A "stream" here is a logical stream if the protocol can handle that
|
|
|
|
(HTTP/2), or the full connection for older protocols */
|
|
|
|
bool stream_error = FALSE;
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_OK;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2007-04-10 16:46:40 -04:00
|
|
|
/* Handle the case when the pipe breaks, i.e., the connection
|
|
|
|
we're using gets cleaned up and we're left with nothing. */
|
2010-08-10 08:12:05 -04:00
|
|
|
if(data->state.pipe_broke) {
|
2014-11-18 17:02:40 -05:00
|
|
|
infof(data, "Pipe broke: handle %p, url = %s\n",
|
2013-08-12 07:52:58 -04:00
|
|
|
(void *)data, data->state.path);
|
2007-04-10 16:46:40 -04:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->mstate < CURLM_STATE_COMPLETED) {
|
2006-09-07 17:49:20 -04:00
|
|
|
/* Head back to the CONNECT state */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_CONNECT);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_OK;
|
2007-02-25 06:38:13 -05:00
|
|
|
}
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2010-08-10 08:12:05 -04:00
|
|
|
data->state.pipe_broke = FALSE;
|
2013-08-12 07:52:58 -04:00
|
|
|
data->easy_conn = NULL;
|
2014-11-18 14:51:54 -05:00
|
|
|
continue;
|
2006-09-07 17:49:20 -04:00
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(!data->easy_conn &&
|
|
|
|
data->mstate > CURLM_STATE_CONNECT &&
|
|
|
|
data->mstate < CURLM_STATE_DONE) {
|
|
|
|
/* In all these states, the code will blindly access 'data->easy_conn'
|
2012-07-15 14:31:37 -04:00
|
|
|
so this is precaution that it isn't NULL. And it silences static
|
|
|
|
analyzers. */
|
2013-08-12 07:52:58 -04:00
|
|
|
failf(data, "In state %d with no easy_conn, bail out!\n", data->mstate);
|
2012-07-15 14:31:37 -04:00
|
|
|
return CURLM_INTERNAL_ERROR;
|
|
|
|
}
|
|
|
|
|
2015-05-11 05:41:10 -04:00
|
|
|
if(multi_ischanged(multi, TRUE)) {
|
|
|
|
DEBUGF(infof(data, "multi changed, check CONNECT_PEND queue!\n"));
|
|
|
|
Curl_multi_process_pending_handles(multi);
|
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn && data->mstate > CURLM_STATE_CONNECT &&
|
|
|
|
data->mstate < CURLM_STATE_COMPLETED)
|
2006-09-07 17:49:20 -04:00
|
|
|
/* Make sure we set the connection's current owner */
|
2013-08-12 07:52:58 -04:00
|
|
|
data->easy_conn->data = data;
|
2004-01-12 10:26:32 -05:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn &&
|
|
|
|
(data->mstate >= CURLM_STATE_CONNECT) &&
|
|
|
|
(data->mstate < CURLM_STATE_COMPLETED)) {
|
2010-12-13 06:51:48 -05:00
|
|
|
/* we need to wait for the connect state as only then is the start time
|
|
|
|
stored, but we must not check already completed handles */
|
2010-09-01 10:52:23 -04:00
|
|
|
|
2011-01-04 17:07:58 -05:00
|
|
|
timeout_ms = Curl_timeleft(data, &now,
|
2013-08-12 07:52:58 -04:00
|
|
|
(data->mstate <= CURLM_STATE_WAITDO)?
|
2010-11-26 13:34:10 -05:00
|
|
|
TRUE:FALSE);
|
2010-09-01 10:52:23 -04:00
|
|
|
|
|
|
|
if(timeout_ms < 0) {
|
|
|
|
/* Handle timed out */
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->mstate == CURLM_STATE_WAITRESOLVE)
|
2010-09-20 07:58:51 -04:00
|
|
|
failf(data, "Resolving timed out after %ld milliseconds",
|
2017-10-23 06:05:49 -04:00
|
|
|
Curl_timediff(now, data->progress.t_startsingle));
|
2013-08-12 07:52:58 -04:00
|
|
|
else if(data->mstate == CURLM_STATE_WAITCONNECT)
|
2010-09-20 07:58:51 -04:00
|
|
|
failf(data, "Connection timed out after %ld milliseconds",
|
2017-10-23 06:05:49 -04:00
|
|
|
Curl_timediff(now, data->progress.t_startsingle));
|
2010-09-20 07:58:51 -04:00
|
|
|
else {
|
|
|
|
k = &data->req;
|
2014-01-13 10:00:38 -05:00
|
|
|
if(k->size != -1) {
|
|
|
|
failf(data, "Operation timed out after %ld milliseconds with %"
|
|
|
|
CURL_FORMAT_CURL_OFF_T " out of %"
|
|
|
|
CURL_FORMAT_CURL_OFF_T " bytes received",
|
2017-10-23 06:05:49 -04:00
|
|
|
Curl_timediff(now, data->progress.t_startsingle),
|
2014-01-13 10:00:38 -05:00
|
|
|
k->bytecount, k->size);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
failf(data, "Operation timed out after %ld milliseconds with %"
|
|
|
|
CURL_FORMAT_CURL_OFF_T " bytes received",
|
2017-10-23 06:05:49 -04:00
|
|
|
Curl_timediff(now, data->progress.t_startsingle),
|
2014-01-13 10:00:38 -05:00
|
|
|
k->bytecount);
|
|
|
|
}
|
2010-09-20 07:58:51 -04:00
|
|
|
}
|
2011-02-18 17:19:14 -05:00
|
|
|
|
2014-11-16 15:53:56 -05:00
|
|
|
/* Force connection closed if the connection has indeed been used */
|
|
|
|
if(data->mstate > CURLM_STATE_DO) {
|
2016-08-11 08:00:23 -04:00
|
|
|
streamclose(data->easy_conn, "Disconnected with pending data");
|
|
|
|
stream_error = TRUE;
|
2014-11-16 15:53:56 -05:00
|
|
|
}
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_OPERATION_TIMEDOUT;
|
2016-03-29 18:17:02 -04:00
|
|
|
(void)multi_done(&data->easy_conn, result, TRUE);
|
2014-11-16 15:53:56 -05:00
|
|
|
/* Skip the statemachine and go directly to error handling section. */
|
|
|
|
goto statemachine_end;
|
2010-09-01 10:52:23 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
switch(data->mstate) {
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_INIT:
|
|
|
|
/* init this transfer. */
|
2017-09-09 17:09:06 -04:00
|
|
|
result = Curl_pretransfer(data);
|
2005-02-09 08:06:40 -05:00
|
|
|
|
2014-11-18 09:18:21 -05:00
|
|
|
if(!result) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/* after init, go CONNECT */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_CONNECT);
|
2014-05-15 14:43:32 -04:00
|
|
|
Curl_pgrsTime(data, TIMER_STARTOP);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
break;
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2013-02-15 05:50:45 -05:00
|
|
|
case CURLM_STATE_CONNECT_PEND:
|
|
|
|
/* We will stay here until there is a connection available. Then
|
|
|
|
we try again in the CURLM_STATE_CONNECT state. */
|
|
|
|
break;
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_CONNECT:
|
2013-02-15 05:50:45 -05:00
|
|
|
/* Connect. We want to get a connection identifier filled in. */
|
2014-05-15 14:43:32 -04:00
|
|
|
Curl_pgrsTime(data, TIMER_STARTSINGLE);
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_connect(data, &data->easy_conn,
|
|
|
|
&async, &protocol_connect);
|
|
|
|
if(CURLE_NO_CONNECTION_AVAILABLE == result) {
|
2013-02-15 05:50:45 -05:00
|
|
|
/* There was no connection available. We will go to the pending
|
|
|
|
state and wait for an available connection. */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_CONNECT_PEND);
|
2014-09-02 03:29:50 -04:00
|
|
|
|
|
|
|
/* add this handle to the list of connect-pending handles */
|
2017-04-20 09:10:04 -04:00
|
|
|
Curl_llist_insert_next(&multi->pending, multi->pending.tail, data,
|
|
|
|
&data->connect_queue);
|
|
|
|
result = CURLE_OK;
|
2013-02-15 05:50:45 -05:00
|
|
|
break;
|
|
|
|
}
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2014-11-18 09:18:21 -05:00
|
|
|
if(!result) {
|
2008-01-16 07:24:00 -05:00
|
|
|
/* Add this handle to the send or pend pipeline */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_add_handle_to_pipeline(data, data->easy_conn);
|
2014-11-18 15:25:05 -05:00
|
|
|
if(result)
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2011-10-06 14:30:34 -04:00
|
|
|
else {
|
2008-02-03 07:31:35 -05:00
|
|
|
if(async)
|
|
|
|
/* We're now waiting for an asynchronous name lookup */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_WAITRESOLVE);
|
2007-11-03 10:44:38 -04:00
|
|
|
else {
|
2008-02-03 07:31:35 -05:00
|
|
|
/* after the connect has been sent off, go WAITCONNECT unless the
|
|
|
|
protocol connect is already done and we can go directly to
|
2008-05-19 16:58:01 -04:00
|
|
|
WAITDO or DO! */
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2008-02-03 07:31:35 -05:00
|
|
|
|
|
|
|
if(protocol_connect)
|
2015-05-08 04:43:36 -04:00
|
|
|
multistate(data, Curl_pipeline_wanted(multi, CURLPIPE_HTTP1)?
|
2008-05-19 16:58:01 -04:00
|
|
|
CURLM_STATE_WAITDO:CURLM_STATE_DO);
|
2007-11-03 10:44:38 -04:00
|
|
|
else {
|
2007-02-26 21:24:13 -05:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
2017-06-07 17:02:26 -04:00
|
|
|
if(Curl_connect_ongoing(data->easy_conn))
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_WAITPROXYCONNECT);
|
2008-02-03 07:31:35 -05:00
|
|
|
else
|
2007-02-26 21:24:13 -05:00
|
|
|
#endif
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_WAITCONNECT);
|
2007-11-03 10:44:38 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
break;
|
2004-05-17 02:53:41 -04:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_WAITRESOLVE:
|
|
|
|
/* awaiting an asynch name resolve to complete */
|
|
|
|
{
|
|
|
|
struct Curl_dns_entry *dns = NULL;
|
2014-08-20 17:31:53 -04:00
|
|
|
struct connectdata *conn = data->easy_conn;
|
2016-01-25 08:37:24 -05:00
|
|
|
const char *hostname;
|
|
|
|
|
2017-02-18 07:56:56 -05:00
|
|
|
if(conn->bits.httpproxy)
|
|
|
|
hostname = conn->http_proxy.host.name;
|
2016-04-23 16:46:15 -04:00
|
|
|
else if(conn->bits.conn_to_host)
|
2016-01-25 08:37:24 -05:00
|
|
|
hostname = conn->conn_to_host.name;
|
|
|
|
else
|
|
|
|
hostname = conn->host.name;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
/* check if we have the name resolved by now */
|
2016-01-25 08:37:24 -05:00
|
|
|
dns = Curl_fetch_addr(conn, hostname, (int)conn->port);
|
2014-08-20 17:31:53 -04:00
|
|
|
|
|
|
|
if(dns) {
|
|
|
|
#ifdef CURLRES_ASYNCH
|
|
|
|
conn->async.dns = dns;
|
|
|
|
conn->async.done = TRUE;
|
|
|
|
#endif
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_OK;
|
2016-04-23 16:46:15 -04:00
|
|
|
infof(data, "Hostname '%s' was found in DNS cache\n", hostname);
|
2014-08-20 17:31:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if(!dns)
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_resolver_is_resolved(data->easy_conn, &dns);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2011-11-30 15:23:44 -05:00
|
|
|
/* Update sockets here, because the socket(s) may have been
|
|
|
|
closed and the application thus needs to be told, even if it
|
|
|
|
is likely that the same socket(s) will again be used further
|
|
|
|
down. If the name has not yet been resolved, it is likely
|
|
|
|
that new sockets have been opened in an attempt to contact
|
|
|
|
another resolver. */
|
2013-08-12 07:52:58 -04:00
|
|
|
singlesocket(multi, data);
|
2008-06-19 17:32:51 -04:00
|
|
|
|
2011-11-30 15:23:44 -05:00
|
|
|
if(dns) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/* Perform the next step in the connection phase, and then move on
|
|
|
|
to the WAITCONNECT state */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_async_resolved(data->easy_conn, &protocol_connect);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2014-11-18 09:18:21 -05:00
|
|
|
if(result)
|
2006-04-10 11:00:53 -04:00
|
|
|
/* if Curl_async_resolved() returns failure, the connection struct
|
|
|
|
is already freed and gone */
|
2013-08-12 07:52:58 -04:00
|
|
|
data->easy_conn = NULL; /* no more connection */
|
2006-04-10 11:00:53 -04:00
|
|
|
else {
|
2006-08-31 08:53:39 -04:00
|
|
|
/* call again please so that we get the next socket setup */
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-08-31 08:53:39 -04:00
|
|
|
if(protocol_connect)
|
2015-05-08 04:43:36 -04:00
|
|
|
multistate(data, Curl_pipeline_wanted(multi, CURLPIPE_HTTP1)?
|
2008-05-19 16:58:01 -04:00
|
|
|
CURLM_STATE_WAITDO:CURLM_STATE_DO);
|
2007-02-25 06:38:13 -05:00
|
|
|
else {
|
2007-02-26 21:24:13 -05:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
2017-06-07 17:02:26 -04:00
|
|
|
if(Curl_connect_ongoing(data->easy_conn))
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_WAITPROXYCONNECT);
|
2007-02-25 06:38:13 -05:00
|
|
|
else
|
2007-02-26 21:24:13 -05:00
|
|
|
#endif
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_WAITCONNECT);
|
2007-02-25 06:38:13 -05:00
|
|
|
}
|
2003-08-05 10:40:59 -04:00
|
|
|
}
|
2001-12-13 02:16:27 -05:00
|
|
|
}
|
2002-08-12 05:43:20 -04:00
|
|
|
|
2014-11-18 15:25:05 -05:00
|
|
|
if(result) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/* failure detected */
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2006-04-10 11:00:53 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2002-08-12 05:43:20 -04:00
|
|
|
|
2007-02-26 21:24:13 -05:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
2007-02-25 06:38:13 -05:00
|
|
|
case CURLM_STATE_WAITPROXYCONNECT:
|
|
|
|
/* this is HTTP-specific, but sending CONNECT to a proxy is HTTP... */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_http_connect(data->easy_conn, &protocol_connect);
|
2007-02-25 06:38:13 -05:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn->bits.proxy_connect_closed) {
|
2016-03-07 11:37:49 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2014-07-19 17:58:58 -04:00
|
|
|
/* connect back to proxy again */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_OK;
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done(&data->easy_conn, CURLE_OK, FALSE);
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_CONNECT);
|
2008-08-23 08:11:38 -04:00
|
|
|
}
|
2014-11-18 09:18:21 -05:00
|
|
|
else if(!result) {
|
2016-11-16 12:49:15 -05:00
|
|
|
if((data->easy_conn->http_proxy.proxytype != CURLPROXY_HTTPS ||
|
|
|
|
data->easy_conn->bits.proxy_ssl_connected[FIRSTSOCKET]) &&
|
2017-06-07 17:02:26 -04:00
|
|
|
Curl_connect_complete(data->easy_conn)) {
|
2016-03-07 11:37:49 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2015-02-11 17:18:32 -05:00
|
|
|
/* initiate protocol connect phase */
|
|
|
|
multistate(data, CURLM_STATE_SENDPROTOCONNECT);
|
2016-03-07 11:37:49 -05:00
|
|
|
}
|
2007-02-25 06:38:13 -05:00
|
|
|
}
|
|
|
|
break;
|
2007-02-26 21:24:13 -05:00
|
|
|
#endif
|
2007-02-25 06:38:13 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_WAITCONNECT:
|
2015-02-11 17:18:32 -05:00
|
|
|
/* awaiting a completion of an asynch TCP connect */
|
|
|
|
result = Curl_is_connected(data->easy_conn, FIRSTSOCKET, &connected);
|
|
|
|
if(connected && !result) {
|
2016-11-16 12:49:15 -05:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
|
|
|
if((data->easy_conn->http_proxy.proxytype == CURLPROXY_HTTPS &&
|
|
|
|
!data->easy_conn->bits.proxy_ssl_connected[FIRSTSOCKET]) ||
|
2017-06-07 17:02:26 -04:00
|
|
|
Curl_connect_ongoing(data->easy_conn)) {
|
2016-11-16 12:49:15 -05:00
|
|
|
multistate(data, CURLM_STATE_WAITPROXYCONNECT);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2015-02-11 17:18:32 -05:00
|
|
|
multistate(data, data->easy_conn->bits.tunnel_proxy?
|
|
|
|
CURLM_STATE_WAITPROXYCONNECT:
|
|
|
|
CURLM_STATE_SENDPROTOCONNECT);
|
2014-07-19 17:58:58 -04:00
|
|
|
}
|
2014-11-18 15:25:05 -05:00
|
|
|
else if(result) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/* failure detected */
|
2007-04-10 16:46:40 -04:00
|
|
|
/* Just break, the cleaning up is handled all in one place */
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2005-02-09 08:06:40 -05:00
|
|
|
break;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2015-02-11 17:18:32 -05:00
|
|
|
break;
|
2005-02-09 08:06:40 -05:00
|
|
|
|
2015-02-11 17:18:32 -05:00
|
|
|
case CURLM_STATE_SENDPROTOCONNECT:
|
|
|
|
result = Curl_protocol_connect(data->easy_conn, &protocol_connect);
|
|
|
|
if(!protocol_connect)
|
|
|
|
/* switch to waiting state */
|
|
|
|
multistate(data, CURLM_STATE_PROTOCONNECT);
|
|
|
|
else if(!result) {
|
|
|
|
/* protocol connect has completed, go WAITDO or DO */
|
2015-05-08 04:43:36 -04:00
|
|
|
multistate(data, Curl_pipeline_wanted(multi, CURLPIPE_HTTP1)?
|
2015-02-11 17:18:32 -05:00
|
|
|
CURLM_STATE_WAITDO:CURLM_STATE_DO);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2015-02-11 17:18:32 -05:00
|
|
|
else if(result) {
|
|
|
|
/* failure detected */
|
|
|
|
Curl_posttransfer(data);
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done(&data->easy_conn, result, TRUE);
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2015-02-11 17:18:32 -05:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
break;
|
2004-01-12 10:26:32 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_PROTOCONNECT:
|
|
|
|
/* protocol-specific connect phase */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_protocol_connecting(data->easy_conn, &protocol_connect);
|
|
|
|
if(!result && protocol_connect) {
|
2008-05-19 16:58:01 -04:00
|
|
|
/* after the connect has completed, go WAITDO or DO */
|
2015-05-08 04:43:36 -04:00
|
|
|
multistate(data, Curl_pipeline_wanted(multi, CURLPIPE_HTTP1)?
|
2008-05-19 16:58:01 -04:00
|
|
|
CURLM_STATE_WAITDO:CURLM_STATE_DO);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2014-11-18 09:18:21 -05:00
|
|
|
else if(result) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/* failure detected */
|
2010-08-10 08:12:05 -04:00
|
|
|
Curl_posttransfer(data);
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done(&data->easy_conn, result, TRUE);
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
break;
|
2005-02-09 08:06:40 -05:00
|
|
|
|
2006-09-07 17:49:20 -04:00
|
|
|
case CURLM_STATE_WAITDO:
|
|
|
|
/* Wait for our turn to DO when we're pipelining requests */
|
2015-05-13 08:24:30 -04:00
|
|
|
if(Curl_pipeline_checkget_write(data, data->easy_conn)) {
|
|
|
|
/* Grabbed the channel */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_DO);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-09-07 17:49:20 -04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_DO:
|
2010-08-10 08:12:05 -04:00
|
|
|
if(data->set.connect_only) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/* keep connection open for application to use the socket */
|
2014-05-20 04:32:23 -04:00
|
|
|
connkeep(data->easy_conn, "CONNECT_ONLY");
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_DONE);
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_OK;
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* Perform the protocol's DO action */
|
2016-03-29 17:53:48 -04:00
|
|
|
result = multi_do(&data->easy_conn, &dophase_done);
|
2013-03-09 12:05:28 -05:00
|
|
|
|
2016-03-29 17:53:48 -04:00
|
|
|
/* When multi_do() returns failure, data->easy_conn might be NULL! */
|
2004-01-12 10:26:32 -05:00
|
|
|
|
2014-11-18 09:18:21 -05:00
|
|
|
if(!result) {
|
2006-04-10 11:00:53 -04:00
|
|
|
if(!dophase_done) {
|
2010-05-12 09:33:22 -04:00
|
|
|
/* some steps needed for wildcard matching */
|
2017-10-25 17:51:50 -04:00
|
|
|
if(data->state.wildcardmatch) {
|
2010-08-10 08:12:05 -04:00
|
|
|
struct WildcardData *wc = &data->wildcard;
|
2010-05-12 09:33:22 -04:00
|
|
|
if(wc->state == CURLWC_DONE || wc->state == CURLWC_SKIP) {
|
|
|
|
/* skip some states if it is important */
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done(&data->easy_conn, CURLE_OK, FALSE);
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_DONE);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2010-05-12 09:33:22 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
/* DO was not completed in one function call, we must continue
|
|
|
|
DOING... */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_DOING);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_OK;
|
2002-08-12 05:43:20 -04:00
|
|
|
}
|
|
|
|
|
2006-09-07 17:49:20 -04:00
|
|
|
/* after DO, go DO_DONE... or DO_MORE */
|
2013-08-12 07:52:58 -04:00
|
|
|
else if(data->easy_conn->bits.do_more) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/* we're supposed to do more, but we need to sit down, relax
|
|
|
|
and wait a little while first */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_DO_MORE);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_OK;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
else {
|
2006-09-07 17:49:20 -04:00
|
|
|
/* we're done with the DO, now DO_DONE */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_DO_DONE);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2005-02-09 08:06:40 -05:00
|
|
|
}
|
2014-11-18 09:18:21 -05:00
|
|
|
else if((CURLE_SEND_ERROR == result) &&
|
2013-08-12 07:52:58 -04:00
|
|
|
data->easy_conn->bits.reuse) {
|
2009-08-21 03:11:20 -04:00
|
|
|
/*
|
|
|
|
* In this situation, a connection that we were trying to use
|
|
|
|
* may have unexpectedly died. If possible, send the connection
|
|
|
|
* back to the CONNECT phase so we can try again.
|
|
|
|
*/
|
2009-08-24 04:41:17 -04:00
|
|
|
char *newurl = NULL;
|
2017-09-09 17:09:06 -04:00
|
|
|
followtype follow = FOLLOW_NONE;
|
2009-08-21 03:11:20 -04:00
|
|
|
CURLcode drc;
|
2009-08-21 08:01:36 -04:00
|
|
|
bool retry = FALSE;
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
drc = Curl_retry_request(data->easy_conn, &newurl);
|
2009-08-21 08:01:36 -04:00
|
|
|
if(drc) {
|
|
|
|
/* a failure here pretty much implies an out of memory */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = drc;
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2009-08-21 08:01:36 -04:00
|
|
|
}
|
|
|
|
else
|
2011-09-05 14:46:09 -04:00
|
|
|
retry = (newurl)?TRUE:FALSE;
|
2009-08-21 03:11:20 -04:00
|
|
|
|
2010-08-10 08:12:05 -04:00
|
|
|
Curl_posttransfer(data);
|
2016-03-29 18:17:02 -04:00
|
|
|
drc = multi_done(&data->easy_conn, result, FALSE);
|
2009-08-21 03:11:20 -04:00
|
|
|
|
|
|
|
/* When set to retry the connection, we must to go back to
|
|
|
|
* the CONNECT state */
|
|
|
|
if(retry) {
|
2014-10-23 16:56:35 -04:00
|
|
|
if(!drc || (drc == CURLE_SEND_ERROR)) {
|
2009-08-21 03:11:20 -04:00
|
|
|
follow = FOLLOW_RETRY;
|
2010-08-10 08:12:05 -04:00
|
|
|
drc = Curl_follow(data, newurl, follow);
|
2014-10-23 16:56:35 -04:00
|
|
|
if(!drc) {
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_CONNECT);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_OK;
|
2009-08-21 03:11:20 -04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* Follow failed */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = drc;
|
2009-08-21 03:11:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* done didn't return OK or SEND_ERROR */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = drc;
|
2009-08-21 03:11:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* Have error handler disconnect conn if we can't retry */
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2009-08-21 03:11:20 -04:00
|
|
|
}
|
2017-05-23 04:32:18 -04:00
|
|
|
free(newurl);
|
2009-08-21 03:11:20 -04:00
|
|
|
}
|
2005-02-09 08:06:40 -05:00
|
|
|
else {
|
|
|
|
/* failure detected */
|
2010-08-10 08:12:05 -04:00
|
|
|
Curl_posttransfer(data);
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn)
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done(&data->easy_conn, result, FALSE);
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2005-02-09 08:06:40 -05:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
break;
|
2004-01-12 10:26:32 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_DOING:
|
|
|
|
/* we continue DOING until the DO phase is complete */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_protocol_doing(data->easy_conn,
|
|
|
|
&dophase_done);
|
|
|
|
if(!result) {
|
2006-04-10 11:00:53 -04:00
|
|
|
if(dophase_done) {
|
2011-10-27 06:46:29 -04:00
|
|
|
/* after DO, go DO_DONE or DO_MORE */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, data->easy_conn->bits.do_more?
|
2011-10-27 06:46:29 -04:00
|
|
|
CURLM_STATE_DO_MORE:
|
|
|
|
CURLM_STATE_DO_DONE);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-04-10 11:00:53 -04:00
|
|
|
} /* dophase_done */
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* failure detected */
|
2010-08-10 08:12:05 -04:00
|
|
|
Curl_posttransfer(data);
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done(&data->easy_conn, result, FALSE);
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case CURLM_STATE_DO_MORE:
|
2011-12-20 06:52:24 -05:00
|
|
|
/*
|
|
|
|
* When we are connected, DO MORE and then go DO_DONE
|
|
|
|
*/
|
2016-03-29 17:53:48 -04:00
|
|
|
result = multi_do_more(data->easy_conn, &control);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2011-12-20 06:52:24 -05:00
|
|
|
/* No need to remove this handle from the send pipeline here since that
|
2016-03-29 18:17:02 -04:00
|
|
|
is done in multi_done() */
|
2014-11-18 09:18:21 -05:00
|
|
|
if(!result) {
|
2013-08-05 17:49:53 -04:00
|
|
|
if(control) {
|
|
|
|
/* if positive, advance to DO_DONE
|
|
|
|
if negative, go back to DOING */
|
2017-09-09 17:09:06 -04:00
|
|
|
multistate(data, control == 1?
|
2013-08-05 17:49:53 -04:00
|
|
|
CURLM_STATE_DO_DONE:
|
|
|
|
CURLM_STATE_DOING);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2002-01-03 10:01:22 -05:00
|
|
|
}
|
2011-12-20 06:52:24 -05:00
|
|
|
else
|
|
|
|
/* stay in DO_MORE */
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_OK;
|
2011-12-20 06:52:24 -05:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* failure detected */
|
|
|
|
Curl_posttransfer(data);
|
2016-03-29 18:17:02 -04:00
|
|
|
multi_done(&data->easy_conn, result, FALSE);
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
break;
|
2002-08-12 05:43:20 -04:00
|
|
|
|
2006-09-07 17:49:20 -04:00
|
|
|
case CURLM_STATE_DO_DONE:
|
2008-01-16 07:24:00 -05:00
|
|
|
/* Move ourselves from the send to recv pipeline */
|
2013-08-12 07:52:58 -04:00
|
|
|
Curl_move_handle_from_send_to_recv_pipe(data, data->easy_conn);
|
2008-01-16 07:24:00 -05:00
|
|
|
/* Check if we can move pending requests to send pipe */
|
2013-02-15 05:50:45 -05:00
|
|
|
Curl_multi_process_pending_handles(multi);
|
2013-12-22 17:36:11 -05:00
|
|
|
|
|
|
|
/* Only perform the transfer if there's a good socket to work with.
|
|
|
|
Having both BAD is a signal to skip immediately to DONE */
|
|
|
|
if((data->easy_conn->sockfd != CURL_SOCKET_BAD) ||
|
|
|
|
(data->easy_conn->writesockfd != CURL_SOCKET_BAD))
|
|
|
|
multistate(data, CURLM_STATE_WAITPERFORM);
|
|
|
|
else
|
2017-10-25 17:51:50 -04:00
|
|
|
{
|
|
|
|
if(data->state.wildcardmatch &&
|
|
|
|
((data->easy_conn->handler->flags & PROTOPT_WILDCARD) == 0)) {
|
|
|
|
data->wildcard.state = CURLWC_DONE;
|
|
|
|
}
|
2013-12-22 17:36:11 -05:00
|
|
|
multistate(data, CURLM_STATE_DONE);
|
2017-10-25 17:51:50 -04:00
|
|
|
}
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-09-07 17:49:20 -04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CURLM_STATE_WAITPERFORM:
|
|
|
|
/* Wait for our turn to PERFORM */
|
2015-05-13 08:24:30 -04:00
|
|
|
if(Curl_pipeline_checkget_read(data, data->easy_conn)) {
|
|
|
|
/* Grabbed the channel */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_PERFORM);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-09-07 17:49:20 -04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2006-06-22 17:36:53 -04:00
|
|
|
case CURLM_STATE_TOOFAST: /* limit-rate exceeded in either direction */
|
|
|
|
/* if both rates are within spec, resume transfer */
|
2013-08-12 07:52:58 -04:00
|
|
|
if(Curl_pgrsUpdate(data->easy_conn))
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_ABORTED_BY_CALLBACK;
|
2012-10-01 18:16:20 -04:00
|
|
|
else
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_speedcheck(data, now);
|
2012-10-01 18:16:20 -04:00
|
|
|
|
2017-01-29 11:14:05 -05:00
|
|
|
if(!result) {
|
|
|
|
send_timeout_ms = 0;
|
|
|
|
if(data->set.max_send_speed > 0)
|
|
|
|
send_timeout_ms = Curl_pgrsLimitWaitTime(data->progress.uploaded,
|
|
|
|
data->progress.ul_limit_size,
|
|
|
|
data->set.max_send_speed,
|
|
|
|
data->progress.ul_limit_start,
|
|
|
|
now);
|
|
|
|
|
|
|
|
recv_timeout_ms = 0;
|
|
|
|
if(data->set.max_recv_speed > 0)
|
|
|
|
recv_timeout_ms = Curl_pgrsLimitWaitTime(data->progress.downloaded,
|
|
|
|
data->progress.dl_limit_size,
|
|
|
|
data->set.max_recv_speed,
|
|
|
|
data->progress.dl_limit_start,
|
|
|
|
now);
|
|
|
|
|
|
|
|
if(send_timeout_ms <= 0 && recv_timeout_ms <= 0)
|
|
|
|
multistate(data, CURLM_STATE_PERFORM);
|
|
|
|
else if(send_timeout_ms >= recv_timeout_ms)
|
2017-06-08 02:34:32 -04:00
|
|
|
Curl_expire(data, send_timeout_ms, EXPIRE_TOOFAST);
|
2017-01-29 11:14:05 -05:00
|
|
|
else
|
2017-06-08 02:34:32 -04:00
|
|
|
Curl_expire(data, recv_timeout_ms, EXPIRE_TOOFAST);
|
2017-01-29 11:14:05 -05:00
|
|
|
}
|
2006-06-22 17:36:53 -04:00
|
|
|
break;
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_PERFORM:
|
2014-11-18 09:18:21 -05:00
|
|
|
{
|
2012-11-30 08:52:38 -05:00
|
|
|
char *newurl = NULL;
|
|
|
|
bool retry = FALSE;
|
2016-08-01 18:48:23 -04:00
|
|
|
bool comeback = FALSE;
|
2012-11-30 08:52:38 -05:00
|
|
|
|
2010-08-10 08:12:05 -04:00
|
|
|
/* check if over send speed */
|
2017-01-29 11:14:05 -05:00
|
|
|
send_timeout_ms = 0;
|
|
|
|
if(data->set.max_send_speed > 0)
|
|
|
|
send_timeout_ms = Curl_pgrsLimitWaitTime(data->progress.uploaded,
|
|
|
|
data->progress.ul_limit_size,
|
|
|
|
data->set.max_send_speed,
|
|
|
|
data->progress.ul_limit_start,
|
|
|
|
now);
|
2010-08-10 08:12:05 -04:00
|
|
|
|
|
|
|
/* check if over recv speed */
|
2017-01-29 11:14:05 -05:00
|
|
|
recv_timeout_ms = 0;
|
|
|
|
if(data->set.max_recv_speed > 0)
|
|
|
|
recv_timeout_ms = Curl_pgrsLimitWaitTime(data->progress.downloaded,
|
|
|
|
data->progress.dl_limit_size,
|
|
|
|
data->set.max_recv_speed,
|
|
|
|
data->progress.dl_limit_start,
|
|
|
|
now);
|
|
|
|
|
|
|
|
if(send_timeout_ms > 0 || recv_timeout_ms > 0) {
|
|
|
|
multistate(data, CURLM_STATE_TOOFAST);
|
|
|
|
if(send_timeout_ms >= recv_timeout_ms)
|
2017-06-08 02:34:32 -04:00
|
|
|
Curl_expire(data, send_timeout_ms, EXPIRE_TOOFAST);
|
2017-01-29 11:14:05 -05:00
|
|
|
else
|
2017-06-08 02:34:32 -04:00
|
|
|
Curl_expire(data, recv_timeout_ms, EXPIRE_TOOFAST);
|
2017-01-29 11:14:05 -05:00
|
|
|
break;
|
2006-06-22 17:36:53 -04:00
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
/* read/write data if it is ready to do so */
|
2016-08-01 18:48:23 -04:00
|
|
|
result = Curl_readwrite(data->easy_conn, data, &done, &comeback);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2010-08-10 08:12:05 -04:00
|
|
|
k = &data->req;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2015-05-13 08:24:30 -04:00
|
|
|
if(!(k->keepon & KEEP_RECV))
|
2009-05-11 03:53:38 -04:00
|
|
|
/* We're done receiving */
|
2015-05-13 08:24:30 -04:00
|
|
|
Curl_pipeline_leave_read(data->easy_conn);
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2015-05-13 08:24:30 -04:00
|
|
|
if(!(k->keepon & KEEP_SEND))
|
2009-05-11 03:53:38 -04:00
|
|
|
/* We're done sending */
|
2015-05-13 08:24:30 -04:00
|
|
|
Curl_pipeline_leave_write(data->easy_conn);
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2014-11-18 09:18:21 -05:00
|
|
|
if(done || (result == CURLE_RECV_ERROR)) {
|
2012-11-30 08:52:38 -05:00
|
|
|
/* If CURLE_RECV_ERROR happens early enough, we assume it was a race
|
|
|
|
* condition and the server closed the re-used connection exactly when
|
|
|
|
* we wanted to use it, so figure out if that is indeed the case.
|
|
|
|
*/
|
2013-08-12 07:52:58 -04:00
|
|
|
CURLcode ret = Curl_retry_request(data->easy_conn, &newurl);
|
2012-11-30 08:52:38 -05:00
|
|
|
if(!ret)
|
|
|
|
retry = (newurl)?TRUE:FALSE;
|
|
|
|
|
2013-01-17 06:59:23 -05:00
|
|
|
if(retry) {
|
|
|
|
/* if we are to retry, set the result to OK and consider the
|
|
|
|
request as done */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_OK;
|
2013-01-17 06:59:23 -05:00
|
|
|
done = TRUE;
|
|
|
|
}
|
2012-11-30 08:52:38 -05:00
|
|
|
}
|
|
|
|
|
2014-11-18 09:18:21 -05:00
|
|
|
if(result) {
|
2012-11-30 08:52:38 -05:00
|
|
|
/*
|
|
|
|
* The transfer phase returned error, we mark the connection to get
|
2009-02-20 03:16:03 -05:00
|
|
|
* closed to prevent being re-used. This is because we can't possibly
|
|
|
|
* know if the connection is in a good shape or not now. Unless it is
|
|
|
|
* a protocol which uses two "channels" like FTP, as then the error
|
|
|
|
* happened in the data connection.
|
|
|
|
*/
|
2012-11-30 08:52:38 -05:00
|
|
|
|
2016-02-17 07:36:59 -05:00
|
|
|
if(!(data->easy_conn->handler->flags & PROTOPT_DUAL) &&
|
|
|
|
result != CURLE_HTTP2_STREAM)
|
2016-08-11 08:00:23 -04:00
|
|
|
streamclose(data->easy_conn, "Transfer returned error");
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2010-08-10 08:12:05 -04:00
|
|
|
Curl_posttransfer(data);
|
2016-08-11 08:00:23 -04:00
|
|
|
multi_done(&data->easy_conn, result, TRUE);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2011-09-05 14:46:09 -04:00
|
|
|
else if(done) {
|
2017-09-09 17:09:06 -04:00
|
|
|
followtype follow = FOLLOW_NONE;
|
2004-01-12 10:26:32 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
/* call this even if the readwrite function returned error */
|
2010-08-10 08:12:05 -04:00
|
|
|
Curl_posttransfer(data);
|
2004-01-12 10:26:32 -05:00
|
|
|
|
2011-04-19 09:54:13 -04:00
|
|
|
/* we're no longer receiving */
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_removeHandleFromPipeline(data, &data->easy_conn->recv_pipe);
|
2008-05-28 16:56:19 -04:00
|
|
|
|
|
|
|
/* expire the new receiving pipeline head */
|
2017-04-03 04:32:43 -04:00
|
|
|
if(data->easy_conn->recv_pipe.head)
|
2017-06-08 02:34:32 -04:00
|
|
|
Curl_expire(data->easy_conn->recv_pipe.head->ptr, 0, EXPIRE_RUN_NOW);
|
2008-05-28 16:56:19 -04:00
|
|
|
|
|
|
|
/* Check if we can move pending requests to send pipe */
|
2013-02-15 05:50:45 -05:00
|
|
|
Curl_multi_process_pending_handles(multi);
|
2008-05-28 16:56:19 -04:00
|
|
|
|
2008-09-29 08:22:10 -04:00
|
|
|
/* When we follow redirects or is set to retry the connection, we must
|
|
|
|
to go back to the CONNECT state */
|
2010-08-10 08:12:05 -04:00
|
|
|
if(data->req.newurl || retry) {
|
2006-04-10 11:00:53 -04:00
|
|
|
if(!retry) {
|
|
|
|
/* if the URL is a follow-location and not just a retried request
|
|
|
|
then figure out the URL here */
|
2015-03-11 12:41:01 -04:00
|
|
|
free(newurl);
|
2010-08-10 08:12:05 -04:00
|
|
|
newurl = data->req.newurl;
|
|
|
|
data->req.newurl = NULL;
|
2008-04-30 17:20:08 -04:00
|
|
|
follow = FOLLOW_REDIR;
|
2004-01-12 10:26:32 -05:00
|
|
|
}
|
2008-04-30 17:20:08 -04:00
|
|
|
else
|
|
|
|
follow = FOLLOW_RETRY;
|
2016-03-29 18:17:02 -04:00
|
|
|
result = multi_done(&data->easy_conn, CURLE_OK, FALSE);
|
2014-11-18 09:18:21 -05:00
|
|
|
if(!result) {
|
|
|
|
result = Curl_follow(data, newurl, follow);
|
|
|
|
if(!result) {
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_CONNECT);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2013-05-30 17:34:33 -04:00
|
|
|
}
|
2002-10-18 11:27:49 -04:00
|
|
|
}
|
2002-10-07 09:38:59 -04:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
else {
|
|
|
|
/* after the transfer is done, go DONE */
|
2008-09-29 08:22:10 -04:00
|
|
|
|
|
|
|
/* but first check to see if we got a location info even though we're
|
|
|
|
not following redirects */
|
2011-04-20 09:17:42 -04:00
|
|
|
if(data->req.location) {
|
2015-03-11 12:41:01 -04:00
|
|
|
free(newurl);
|
2010-08-10 08:12:05 -04:00
|
|
|
newurl = data->req.location;
|
|
|
|
data->req.location = NULL;
|
2014-11-18 09:18:21 -05:00
|
|
|
result = Curl_follow(data, newurl, FOLLOW_FAKE);
|
2017-05-23 04:32:18 -04:00
|
|
|
if(result)
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_error = TRUE;
|
2008-09-29 08:22:10 -04:00
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_DONE);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
}
|
2016-08-01 18:48:23 -04:00
|
|
|
else if(comeback)
|
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2015-03-11 12:41:01 -04:00
|
|
|
free(newurl);
|
2006-04-10 11:00:53 -04:00
|
|
|
break;
|
2014-11-18 09:18:21 -05:00
|
|
|
}
|
2006-06-22 17:36:53 -04:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_DONE:
|
2013-08-21 17:08:38 -04:00
|
|
|
/* this state is highly transient, so run another loop after this */
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn) {
|
2014-01-02 17:24:26 -05:00
|
|
|
CURLcode res;
|
|
|
|
|
2013-02-15 05:50:45 -05:00
|
|
|
/* Remove ourselves from the receive pipeline, if we are there. */
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_removeHandleFromPipeline(data, &data->easy_conn->recv_pipe);
|
2009-08-21 03:11:20 -04:00
|
|
|
/* Check if we can move pending requests to send pipe */
|
2013-02-15 05:50:45 -05:00
|
|
|
Curl_multi_process_pending_handles(multi);
|
2009-08-21 03:11:20 -04:00
|
|
|
|
|
|
|
/* post-transfer command */
|
2016-03-29 18:17:02 -04:00
|
|
|
res = multi_done(&data->easy_conn, result, FALSE);
|
2014-01-02 17:24:26 -05:00
|
|
|
|
|
|
|
/* allow a previously set error code take precedence */
|
2014-11-18 09:18:21 -05:00
|
|
|
if(!result)
|
|
|
|
result = res;
|
2014-01-02 17:24:26 -05:00
|
|
|
|
2009-08-21 03:11:20 -04:00
|
|
|
/*
|
2016-03-29 18:17:02 -04:00
|
|
|
* If there are other handles on the pipeline, multi_done won't set
|
2009-08-21 03:11:20 -04:00
|
|
|
* easy_conn to NULL. In such a case, curl_multi_remove_handle() can
|
|
|
|
* access free'd data, if the connection is free'd and the handle
|
|
|
|
* removed before we perform the processing in CURLM_STATE_COMPLETED
|
|
|
|
*/
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn)
|
|
|
|
data->easy_conn = NULL;
|
2009-08-21 03:11:20 -04:00
|
|
|
}
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2017-10-25 17:51:50 -04:00
|
|
|
if(data->state.wildcardmatch) {
|
2010-08-10 08:12:05 -04:00
|
|
|
if(data->wildcard.state != CURLWC_DONE) {
|
2010-05-16 16:01:17 -04:00
|
|
|
/* if a wildcard is set and we are not ending -> lets start again
|
2010-05-12 09:33:22 -04:00
|
|
|
with CURLM_STATE_INIT */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_INIT);
|
2010-05-12 09:33:22 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-01-21 18:48:58 -05:00
|
|
|
/* after we have DONE what we're supposed to do, go COMPLETED, and
|
2016-03-29 18:17:02 -04:00
|
|
|
it doesn't matter what the multi_done() returned! */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_COMPLETED);
|
2006-04-10 11:00:53 -04:00
|
|
|
break;
|
2002-05-02 18:12:14 -04:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
case CURLM_STATE_COMPLETED:
|
|
|
|
/* this is a completed transfer, it is likely to still be connected */
|
2001-11-28 10:46:25 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
/* This node should be delinked from the list now and we should post
|
|
|
|
an information message that we are complete. */
|
2007-04-10 16:46:40 -04:00
|
|
|
|
|
|
|
/* Important: reset the conn pointer so that we don't point to memory
|
|
|
|
that could be freed anytime */
|
2013-08-12 07:52:58 -04:00
|
|
|
data->easy_conn = NULL;
|
2010-09-28 17:17:34 -04:00
|
|
|
|
2016-08-02 04:57:30 -04:00
|
|
|
Curl_expire_clear(data); /* stop all timers */
|
2006-04-10 11:00:53 -04:00
|
|
|
break;
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2010-08-18 13:59:46 -04:00
|
|
|
case CURLM_STATE_MSGSENT:
|
2014-11-18 09:18:21 -05:00
|
|
|
data->result = result;
|
2010-08-18 13:59:46 -04:00
|
|
|
return CURLM_OK; /* do nothing */
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
default:
|
|
|
|
return CURLM_INTERNAL_ERROR;
|
|
|
|
}
|
2014-11-18 09:18:21 -05:00
|
|
|
statemachine_end:
|
2002-01-03 10:01:22 -05:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->mstate < CURLM_STATE_COMPLETED) {
|
2014-11-18 15:25:05 -05:00
|
|
|
if(result) {
|
2006-04-10 11:00:53 -04:00
|
|
|
/*
|
|
|
|
* If an error was returned, and we aren't in completed state now,
|
2006-09-07 17:49:20 -04:00
|
|
|
* then we go to completed and consider this transfer aborted.
|
|
|
|
*/
|
2007-04-10 16:46:40 -04:00
|
|
|
|
|
|
|
/* NOTE: no attempt to disconnect connections must be made
|
|
|
|
in the case blocks above - cleanup happens only here */
|
|
|
|
|
2010-08-10 08:12:05 -04:00
|
|
|
data->state.pipe_broke = FALSE;
|
2006-10-10 10:23:34 -04:00
|
|
|
|
2015-03-21 17:42:43 -04:00
|
|
|
/* Check if we can move pending requests to send pipe */
|
|
|
|
Curl_multi_process_pending_handles(multi);
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->easy_conn) {
|
2006-10-06 17:19:57 -04:00
|
|
|
/* if this has a connection, unsubscribe from the pipelines */
|
2015-05-13 08:24:30 -04:00
|
|
|
Curl_pipeline_leave_write(data->easy_conn);
|
|
|
|
Curl_pipeline_leave_read(data->easy_conn);
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_removeHandleFromPipeline(data, &data->easy_conn->send_pipe);
|
|
|
|
Curl_removeHandleFromPipeline(data, &data->easy_conn->recv_pipe);
|
2007-04-10 16:46:40 -04:00
|
|
|
|
2016-08-11 08:00:23 -04:00
|
|
|
if(stream_error) {
|
2014-11-16 15:53:56 -05:00
|
|
|
/* Don't attempt to send data over a connection that timed out */
|
2014-11-18 09:18:21 -05:00
|
|
|
bool dead_connection = result == CURLE_OPERATION_TIMEDOUT;
|
2011-10-13 12:04:56 -04:00
|
|
|
/* disconnect properly */
|
2014-11-16 15:53:56 -05:00
|
|
|
Curl_disconnect(data->easy_conn, dead_connection);
|
2007-04-10 16:46:40 -04:00
|
|
|
|
2011-10-13 12:04:56 -04:00
|
|
|
/* This is where we make sure that the easy_conn pointer is reset.
|
|
|
|
We don't have to do this in every case block above where a
|
|
|
|
failure is detected */
|
2013-08-12 07:52:58 -04:00
|
|
|
data->easy_conn = NULL;
|
2011-10-13 12:04:56 -04:00
|
|
|
}
|
|
|
|
}
|
2013-08-12 07:52:58 -04:00
|
|
|
else if(data->mstate == CURLM_STATE_CONNECT) {
|
2011-10-13 12:04:56 -04:00
|
|
|
/* Curl_connect() failed */
|
|
|
|
(void)Curl_posttransfer(data);
|
2007-04-10 16:46:40 -04:00
|
|
|
}
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, CURLM_STATE_COMPLETED);
|
2003-04-29 14:03:30 -04:00
|
|
|
}
|
2010-06-18 17:46:09 -04:00
|
|
|
/* if there's still a connection to use, call the progress function */
|
2013-08-12 07:52:58 -04:00
|
|
|
else if(data->easy_conn && Curl_pgrsUpdate(data->easy_conn)) {
|
2011-10-02 13:28:39 -04:00
|
|
|
/* aborted due to progress callback return code must close the
|
|
|
|
connection */
|
2014-11-18 09:18:21 -05:00
|
|
|
result = CURLE_ABORTED_BY_CALLBACK;
|
2016-08-11 08:00:23 -04:00
|
|
|
streamclose(data->easy_conn, "Aborted by callback");
|
2011-10-02 13:28:39 -04:00
|
|
|
|
|
|
|
/* if not yet in DONE state, go there, otherwise COMPLETED */
|
2013-08-12 07:52:58 -04:00
|
|
|
multistate(data, (data->mstate < CURLM_STATE_DONE)?
|
2011-10-02 13:28:39 -04:00
|
|
|
CURLM_STATE_DONE: CURLM_STATE_COMPLETED);
|
2014-11-18 08:37:57 -05:00
|
|
|
rc = CURLM_CALL_MULTI_PERFORM;
|
2011-09-30 16:59:50 -04:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2010-08-08 18:01:36 -04:00
|
|
|
|
2014-11-18 14:51:54 -05:00
|
|
|
if(CURLM_STATE_COMPLETED == data->mstate) {
|
|
|
|
/* now fill in the Curl_message with this info */
|
|
|
|
msg = &data->msg;
|
|
|
|
|
|
|
|
msg->extmsg.msg = CURLMSG_DONE;
|
|
|
|
msg->extmsg.easy_handle = data;
|
|
|
|
msg->extmsg.data.result = result;
|
2014-11-18 09:18:21 -05:00
|
|
|
|
2014-11-18 14:51:54 -05:00
|
|
|
rc = multi_addmsg(multi, msg);
|
2002-05-28 10:45:50 -04:00
|
|
|
|
2014-11-18 14:51:54 -05:00
|
|
|
multistate(data, CURLM_STATE_MSGSENT);
|
|
|
|
}
|
2015-05-11 05:41:10 -04:00
|
|
|
} while((rc == CURLM_CALL_MULTI_PERFORM) || multi_ischanged(multi, FALSE));
|
2002-05-28 10:45:50 -04:00
|
|
|
|
2014-11-18 14:51:54 -05:00
|
|
|
data->result = result;
|
2010-08-18 13:59:46 -04:00
|
|
|
|
2002-05-02 18:12:14 -04:00
|
|
|
|
2014-11-18 08:37:57 -05:00
|
|
|
return rc;
|
2001-11-28 06:09:18 -05:00
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_perform(struct Curl_multi *multi, int *running_handles)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data;
|
2017-09-09 17:09:06 -04:00
|
|
|
CURLMcode returncode = CURLM_OK;
|
2006-04-10 11:00:53 -04:00
|
|
|
struct Curl_tree *t;
|
2017-10-25 05:59:43 -04:00
|
|
|
struct curltime now = Curl_now();
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
if(!GOOD_MULTI_HANDLE(multi))
|
|
|
|
return CURLM_BAD_HANDLE;
|
|
|
|
|
2017-09-09 17:09:06 -04:00
|
|
|
data = multi->easyp;
|
2013-08-12 07:52:58 -04:00
|
|
|
while(data) {
|
2006-09-07 17:49:20 -04:00
|
|
|
CURLMcode result;
|
2014-02-17 04:35:21 -05:00
|
|
|
SIGPIPE_VARIABLE(pipe_st);
|
2010-05-12 09:33:22 -04:00
|
|
|
|
2014-02-17 04:35:21 -05:00
|
|
|
sigpipe_ignore(data, &pipe_st);
|
2014-11-18 08:34:55 -05:00
|
|
|
result = multi_runsingle(multi, now, data);
|
2014-02-17 04:35:21 -05:00
|
|
|
sigpipe_restore(&pipe_st);
|
2010-02-01 16:42:44 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
if(result)
|
|
|
|
returncode = result;
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
data = data->next; /* operate on next handle */
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Simply remove all expired timers from the splay since handles are dealt
|
|
|
|
* with unconditionally by this function and curl_multi_timeout() requires
|
|
|
|
* that already passed/handled expire times are removed from the splay.
|
2010-07-12 13:19:31 -04:00
|
|
|
*
|
|
|
|
* It is important that the 'now' value is set at the entry of this function
|
|
|
|
* and not for the current time as it may have ticked a little while since
|
|
|
|
* then and then we risk this loop to remove timers that actually have not
|
|
|
|
* been handled!
|
2006-04-10 11:00:53 -04:00
|
|
|
*/
|
|
|
|
do {
|
2008-05-07 11:41:41 -04:00
|
|
|
multi->timetree = Curl_splaygetbest(now, multi->timetree, &t);
|
2010-08-30 18:08:45 -04:00
|
|
|
if(t)
|
|
|
|
/* the removed may have another timeout in queue */
|
|
|
|
(void)add_next_timeout(now, multi, t->payload);
|
2006-07-17 14:35:58 -04:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
} while(t);
|
|
|
|
|
2006-08-02 18:29:29 -04:00
|
|
|
*running_handles = multi->num_alive;
|
|
|
|
|
2011-04-22 17:01:30 -04:00
|
|
|
if(CURLM_OK >= returncode)
|
2006-10-12 04:36:47 -04:00
|
|
|
update_timer(multi);
|
2008-12-19 17:58:22 -05:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
return returncode;
|
|
|
|
}
|
|
|
|
|
2012-12-06 06:12:04 -05:00
|
|
|
static void close_all_connections(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
struct connectdata *conn;
|
|
|
|
|
2015-05-12 03:15:02 -04:00
|
|
|
conn = Curl_conncache_find_first_connection(&multi->conn_cache);
|
2012-12-06 06:12:04 -05:00
|
|
|
while(conn) {
|
2014-05-05 06:47:46 -04:00
|
|
|
SIGPIPE_VARIABLE(pipe_st);
|
2012-12-06 06:12:04 -05:00
|
|
|
conn->data = multi->closure_handle;
|
|
|
|
|
2014-05-05 06:47:46 -04:00
|
|
|
sigpipe_ignore(conn->data, &pipe_st);
|
2016-07-30 19:09:04 -04:00
|
|
|
conn->data->easy_conn = NULL; /* clear the easy handle's connection
|
|
|
|
pointer */
|
2012-12-06 06:12:04 -05:00
|
|
|
/* This will remove the connection from the cache */
|
2016-10-21 05:03:10 -04:00
|
|
|
connclose(conn, "kill all");
|
2012-12-06 06:12:04 -05:00
|
|
|
(void)Curl_disconnect(conn, FALSE);
|
2014-05-05 06:47:46 -04:00
|
|
|
sigpipe_restore(&pipe_st);
|
2012-12-06 06:12:04 -05:00
|
|
|
|
2015-05-12 03:15:02 -04:00
|
|
|
conn = Curl_conncache_find_first_connection(&multi->conn_cache);
|
2012-12-06 06:12:04 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_cleanup(struct Curl_multi *multi)
|
2001-11-28 11:00:18 -05:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data;
|
|
|
|
struct Curl_easy *nextdata;
|
2002-04-27 18:21:51 -04:00
|
|
|
|
2001-11-28 11:00:18 -05:00
|
|
|
if(GOOD_MULTI_HANDLE(multi)) {
|
2013-11-25 09:43:21 -05:00
|
|
|
bool restore_pipe = FALSE;
|
2013-12-01 15:22:44 -05:00
|
|
|
SIGPIPE_VARIABLE(pipe_st);
|
2013-11-25 09:43:21 -05:00
|
|
|
|
2001-11-28 11:00:18 -05:00
|
|
|
multi->type = 0; /* not good anymore */
|
2002-04-27 18:21:51 -04:00
|
|
|
|
2017-10-05 19:11:17 -04:00
|
|
|
/* Firsrt remove all remaining easy handles */
|
|
|
|
data = multi->easyp;
|
|
|
|
while(data) {
|
|
|
|
nextdata = data->next;
|
|
|
|
if(!data->state.done && data->easy_conn)
|
|
|
|
/* if DONE was never called for this handle */
|
|
|
|
(void)multi_done(&data->easy_conn, CURLE_OK, TRUE);
|
|
|
|
if(data->dns.hostcachetype == HCACHE_MULTI) {
|
|
|
|
/* clear out the usage of the shared DNS cache */
|
|
|
|
Curl_hostcache_clean(data, data->dns.hostcache);
|
|
|
|
data->dns.hostcache = NULL;
|
|
|
|
data->dns.hostcachetype = HCACHE_NONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Clear the pointer to the connection cache */
|
|
|
|
data->state.conn_cache = NULL;
|
|
|
|
data->multi = NULL; /* clear the association */
|
|
|
|
|
|
|
|
data = nextdata;
|
|
|
|
}
|
|
|
|
|
2012-12-06 06:12:04 -05:00
|
|
|
/* Close all the connections in the connection cache */
|
|
|
|
close_all_connections(multi);
|
|
|
|
|
2013-02-10 16:57:58 -05:00
|
|
|
if(multi->closure_handle) {
|
2013-12-01 15:22:44 -05:00
|
|
|
sigpipe_ignore(multi->closure_handle, &pipe_st);
|
2013-11-25 09:43:21 -05:00
|
|
|
restore_pipe = TRUE;
|
|
|
|
|
2015-05-12 03:46:53 -04:00
|
|
|
multi->closure_handle->dns.hostcache = &multi->hostcache;
|
2013-08-08 07:01:16 -04:00
|
|
|
Curl_hostcache_clean(multi->closure_handle,
|
|
|
|
multi->closure_handle->dns.hostcache);
|
2013-01-17 06:59:23 -05:00
|
|
|
|
2013-02-10 16:57:58 -05:00
|
|
|
Curl_close(multi->closure_handle);
|
|
|
|
}
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2015-05-02 14:49:55 -04:00
|
|
|
Curl_hash_destroy(&multi->sockhash);
|
2015-05-12 03:15:02 -04:00
|
|
|
Curl_conncache_destroy(&multi->conn_cache);
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_llist_destroy(&multi->msglist, NULL);
|
|
|
|
Curl_llist_destroy(&multi->pending, NULL);
|
2014-09-02 03:29:50 -04:00
|
|
|
|
2015-05-02 14:49:55 -04:00
|
|
|
Curl_hash_destroy(&multi->hostcache);
|
2012-11-18 10:17:37 -05:00
|
|
|
|
2013-02-15 05:50:45 -05:00
|
|
|
/* Free the blacklists by setting them to NULL */
|
|
|
|
Curl_pipeline_set_site_blacklist(NULL, &multi->pipelining_site_bl);
|
|
|
|
Curl_pipeline_set_server_blacklist(NULL, &multi->pipelining_server_bl);
|
|
|
|
|
2001-11-28 11:00:18 -05:00
|
|
|
free(multi);
|
2013-11-25 09:43:21 -05:00
|
|
|
if(restore_pipe)
|
2013-12-01 15:22:44 -05:00
|
|
|
sigpipe_restore(&pipe_st);
|
2001-11-28 11:00:18 -05:00
|
|
|
|
|
|
|
return CURLM_OK;
|
|
|
|
}
|
2017-03-10 08:28:37 -05:00
|
|
|
return CURLM_BAD_HANDLE;
|
2001-11-28 11:00:18 -05:00
|
|
|
}
|
2001-11-28 06:09:18 -05:00
|
|
|
|
2010-08-08 18:01:36 -04:00
|
|
|
/*
|
|
|
|
* curl_multi_info_read()
|
|
|
|
*
|
|
|
|
* This function is the primary way for a multi/multi_socket application to
|
|
|
|
* figure out if a transfer has ended. We MUST make this function as fast as
|
|
|
|
* possible as it will be polled frequently and we MUST NOT scan any lists in
|
|
|
|
* here to figure out things. We must scale fine to thousands of handles and
|
|
|
|
* beyond. The current design is fully O(1).
|
|
|
|
*/
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMsg *curl_multi_info_read(struct Curl_multi *multi, int *msgs_in_queue)
|
2002-04-27 18:21:51 -04:00
|
|
|
{
|
2010-08-08 18:01:36 -04:00
|
|
|
struct Curl_message *msg;
|
2002-04-27 18:21:51 -04:00
|
|
|
|
2003-08-20 09:49:46 -04:00
|
|
|
*msgs_in_queue = 0; /* default to none */
|
|
|
|
|
2017-04-03 04:32:43 -04:00
|
|
|
if(GOOD_MULTI_HANDLE(multi) && Curl_llist_count(&multi->msglist)) {
|
2010-08-08 18:01:36 -04:00
|
|
|
/* there is one or more messages in the list */
|
|
|
|
struct curl_llist_element *e;
|
2004-05-17 02:53:41 -04:00
|
|
|
|
2010-08-08 18:01:36 -04:00
|
|
|
/* extract the head of the list to return */
|
2017-04-03 04:32:43 -04:00
|
|
|
e = multi->msglist.head;
|
2002-04-27 18:21:51 -04:00
|
|
|
|
2010-08-08 18:01:36 -04:00
|
|
|
msg = e->ptr;
|
|
|
|
|
|
|
|
/* remove the extracted entry */
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_llist_remove(&multi->msglist, e, NULL);
|
2002-04-27 18:21:51 -04:00
|
|
|
|
2017-04-03 04:32:43 -04:00
|
|
|
*msgs_in_queue = curlx_uztosi(Curl_llist_count(&multi->msglist));
|
2002-04-27 18:21:51 -04:00
|
|
|
|
2010-08-08 18:01:36 -04:00
|
|
|
return &msg->extmsg;
|
2002-04-27 18:21:51 -04:00
|
|
|
}
|
2017-03-10 08:28:37 -05:00
|
|
|
return NULL;
|
2002-04-27 18:21:51 -04:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
/*
|
2006-04-21 09:40:07 -04:00
|
|
|
* singlesocket() checks what sockets we deal with and their "action state"
|
|
|
|
* and if we have a different state in any of those sockets from last time we
|
|
|
|
* call the callback accordingly.
|
2006-04-10 11:00:53 -04:00
|
|
|
*/
|
|
|
|
static void singlesocket(struct Curl_multi *multi,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
2006-10-13 03:11:26 -04:00
|
|
|
curl_socket_t socks[MAX_SOCKSPEREASYHANDLE];
|
2006-04-10 11:00:53 -04:00
|
|
|
int i;
|
2006-09-10 18:15:32 -04:00
|
|
|
struct Curl_sh_entry *entry;
|
|
|
|
curl_socket_t s;
|
|
|
|
int num;
|
2006-10-13 03:11:26 -04:00
|
|
|
unsigned int curraction;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i< MAX_SOCKSPEREASYHANDLE; i++)
|
2006-10-13 03:11:26 -04:00
|
|
|
socks[i] = CURL_SOCKET_BAD;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
/* Fill in the 'current' struct with the state as it is now: what sockets to
|
|
|
|
supervise and for what actions */
|
2013-08-12 07:52:58 -04:00
|
|
|
curraction = multi_getsock(data, socks, MAX_SOCKSPEREASYHANDLE);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
/* We have 0 .. N sockets already and we get to know about the 0 .. M
|
|
|
|
sockets we should have from now on. Detect the differences, remove no
|
|
|
|
longer supervised ones and add new ones */
|
2006-04-21 09:40:07 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
/* walk over the sockets we got right now */
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; (i< MAX_SOCKSPEREASYHANDLE) &&
|
2006-10-13 03:11:26 -04:00
|
|
|
(curraction & (GETSOCK_READSOCK(i) | GETSOCK_WRITESOCK(i)));
|
2006-09-10 18:15:32 -04:00
|
|
|
i++) {
|
|
|
|
int action = CURL_POLL_NONE;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-10-13 03:11:26 -04:00
|
|
|
s = socks[i];
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
/* get it from the hash */
|
2016-03-14 04:18:01 -04:00
|
|
|
entry = sh_getentry(&multi->sockhash, s);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-10-13 03:11:26 -04:00
|
|
|
if(curraction & GETSOCK_READSOCK(i))
|
2006-09-10 18:15:32 -04:00
|
|
|
action |= CURL_POLL_IN;
|
2006-10-13 03:11:26 -04:00
|
|
|
if(curraction & GETSOCK_WRITESOCK(i))
|
2006-09-10 18:15:32 -04:00
|
|
|
action |= CURL_POLL_OUT;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
if(entry) {
|
|
|
|
/* yeps, already present so check if it has the same action set */
|
|
|
|
if(entry->action == action)
|
|
|
|
/* same, continue */
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* this is a socket we didn't have before, add it! */
|
2015-05-12 03:28:37 -04:00
|
|
|
entry = sh_addentry(&multi->sockhash, s, data);
|
2006-09-10 18:15:32 -04:00
|
|
|
if(!entry)
|
|
|
|
/* fatal */
|
|
|
|
return;
|
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2010-06-02 17:11:59 -04:00
|
|
|
/* we know (entry != NULL) at this point, see the logic above */
|
2011-12-02 15:10:28 -05:00
|
|
|
if(multi->socket_cb)
|
2013-08-12 07:52:58 -04:00
|
|
|
multi->socket_cb(data,
|
2011-12-02 15:10:28 -05:00
|
|
|
s,
|
|
|
|
action,
|
|
|
|
multi->socket_userp,
|
|
|
|
entry->socketp);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
entry->action = action; /* store the current action state */
|
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2006-09-10 18:15:32 -04:00
|
|
|
num = i; /* number of sockets */
|
|
|
|
|
|
|
|
/* when we've walked over all the sockets we should have right now, we must
|
|
|
|
make sure to detect sockets that are removed */
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i< data->numsocks; i++) {
|
2006-09-10 18:15:32 -04:00
|
|
|
int j;
|
2013-08-12 07:52:58 -04:00
|
|
|
s = data->sockets[i];
|
2017-09-09 17:09:06 -04:00
|
|
|
for(j = 0; j<num; j++) {
|
2006-10-13 03:11:26 -04:00
|
|
|
if(s == socks[j]) {
|
2006-09-10 18:15:32 -04:00
|
|
|
/* this is still supervised */
|
|
|
|
s = CURL_SOCKET_BAD;
|
|
|
|
break;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2006-09-10 18:15:32 -04:00
|
|
|
}
|
2008-12-20 17:03:22 -05:00
|
|
|
|
2016-03-14 04:44:14 -04:00
|
|
|
entry = sh_getentry(&multi->sockhash, s);
|
|
|
|
if(entry) {
|
2008-12-20 17:03:22 -05:00
|
|
|
/* this socket has been removed. Tell the app to remove it */
|
2016-03-14 04:44:14 -04:00
|
|
|
bool remove_sock_from_hash = TRUE;
|
|
|
|
|
|
|
|
/* check if the socket to be removed serves a connection which has
|
|
|
|
other easy-s in a pipeline. In this case the socket should not be
|
|
|
|
removed. */
|
|
|
|
struct connectdata *easy_conn = data->easy_conn;
|
|
|
|
if(easy_conn) {
|
2017-04-03 04:32:43 -04:00
|
|
|
if(easy_conn->recv_pipe.size > 1) {
|
2016-03-14 04:44:14 -04:00
|
|
|
/* the handle should not be removed from the pipe yet */
|
|
|
|
remove_sock_from_hash = FALSE;
|
|
|
|
|
|
|
|
/* Update the sockhash entry to instead point to the next in line
|
|
|
|
for the recv_pipe, or the first (in case this particular easy
|
|
|
|
isn't already) */
|
|
|
|
if(entry->easy == data) {
|
|
|
|
if(Curl_recvpipe_head(data, easy_conn))
|
2017-04-03 04:32:43 -04:00
|
|
|
entry->easy = easy_conn->recv_pipe.head->next->ptr;
|
2016-03-14 04:44:14 -04:00
|
|
|
else
|
2017-04-03 04:32:43 -04:00
|
|
|
entry->easy = easy_conn->recv_pipe.head->ptr;
|
2008-12-20 17:03:22 -05:00
|
|
|
}
|
2016-03-14 04:44:14 -04:00
|
|
|
}
|
2017-04-03 04:32:43 -04:00
|
|
|
if(easy_conn->send_pipe.size > 1) {
|
2016-03-14 04:44:14 -04:00
|
|
|
/* the handle should not be removed from the pipe yet */
|
|
|
|
remove_sock_from_hash = FALSE;
|
|
|
|
|
|
|
|
/* Update the sockhash entry to instead point to the next in line
|
|
|
|
for the send_pipe, or the first (in case this particular easy
|
|
|
|
isn't already) */
|
|
|
|
if(entry->easy == data) {
|
|
|
|
if(Curl_sendpipe_head(data, easy_conn))
|
2017-04-03 04:32:43 -04:00
|
|
|
entry->easy = easy_conn->send_pipe.head->next->ptr;
|
2016-03-14 04:44:14 -04:00
|
|
|
else
|
2017-04-03 04:32:43 -04:00
|
|
|
entry->easy = easy_conn->send_pipe.head->ptr;
|
2008-12-20 17:03:22 -05:00
|
|
|
}
|
|
|
|
}
|
2016-03-14 04:44:14 -04:00
|
|
|
/* Don't worry about overwriting recv_pipe head with send_pipe_head,
|
|
|
|
when action will be asked on the socket (see multi_socket()), the
|
|
|
|
head of the correct pipe will be taken according to the
|
|
|
|
action. */
|
2008-12-20 17:03:22 -05:00
|
|
|
}
|
|
|
|
|
2011-04-20 09:17:42 -04:00
|
|
|
if(remove_sock_from_hash) {
|
2012-06-12 17:04:04 -04:00
|
|
|
/* in this case 'entry' is always non-NULL */
|
2011-12-02 15:10:28 -05:00
|
|
|
if(multi->socket_cb)
|
2013-08-12 07:52:58 -04:00
|
|
|
multi->socket_cb(data,
|
2011-12-02 15:10:28 -05:00
|
|
|
s,
|
|
|
|
CURL_POLL_REMOVE,
|
|
|
|
multi->socket_userp,
|
2012-06-12 17:04:04 -04:00
|
|
|
entry->socketp);
|
2015-05-12 03:28:37 -04:00
|
|
|
sh_delentry(&multi->sockhash, s);
|
2006-09-10 18:15:32 -04:00
|
|
|
}
|
2016-03-14 04:44:14 -04:00
|
|
|
} /* if sockhash entry existed */
|
|
|
|
} /* for loop over numsocks */
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
memcpy(data->sockets, socks, num*sizeof(curl_socket_t));
|
|
|
|
data->numsocks = num;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2013-06-19 17:54:28 -04:00
|
|
|
/*
|
|
|
|
* Curl_multi_closed()
|
|
|
|
*
|
|
|
|
* Used by the connect code to tell the multi_socket code that one of the
|
2014-11-14 13:32:47 -05:00
|
|
|
* sockets we were using is about to be closed. This function will then
|
2013-06-19 17:54:28 -04:00
|
|
|
* remove it from the sockethash for this handle to make the multi_socket API
|
|
|
|
* behave properly, especially for the case when libcurl will create another
|
|
|
|
* socket again and it gets the same file descriptor number.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void Curl_multi_closed(struct connectdata *conn, curl_socket_t s)
|
|
|
|
{
|
|
|
|
struct Curl_multi *multi = conn->data->multi;
|
|
|
|
if(multi) {
|
|
|
|
/* this is set if this connection is part of a handle that is added to
|
|
|
|
a multi handle, and only then this is necessary */
|
2016-03-14 04:18:01 -04:00
|
|
|
struct Curl_sh_entry *entry = sh_getentry(&multi->sockhash, s);
|
2013-06-19 17:54:28 -04:00
|
|
|
|
|
|
|
if(entry) {
|
|
|
|
if(multi->socket_cb)
|
|
|
|
multi->socket_cb(conn->data, s, CURL_POLL_REMOVE,
|
|
|
|
multi->socket_userp,
|
|
|
|
entry->socketp);
|
|
|
|
|
|
|
|
/* now remove it from the socket hash */
|
2015-05-12 03:28:37 -04:00
|
|
|
sh_delentry(&multi->sockhash, s);
|
2013-06-19 17:54:28 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-30 18:08:45 -04:00
|
|
|
/*
|
|
|
|
* add_next_timeout()
|
|
|
|
*
|
2016-06-21 09:47:12 -04:00
|
|
|
* Each Curl_easy has a list of timeouts. The add_next_timeout() is called
|
2010-08-30 18:08:45 -04:00
|
|
|
* when it has just been removed from the splay tree because the timeout has
|
|
|
|
* expired. This function is then to advance in the list to pick the next
|
|
|
|
* timeout to use (skip the already expired ones) and add this node back to
|
|
|
|
* the splay tree again.
|
|
|
|
*
|
|
|
|
* The splay tree only has each sessionhandle as a single node and the nearest
|
|
|
|
* timeout is used to sort it on.
|
|
|
|
*/
|
2017-07-28 09:49:36 -04:00
|
|
|
static CURLMcode add_next_timeout(struct curltime now,
|
2010-08-30 18:08:45 -04:00
|
|
|
struct Curl_multi *multi,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *d)
|
2010-08-30 18:08:45 -04:00
|
|
|
{
|
2017-07-28 09:49:36 -04:00
|
|
|
struct curltime *tv = &d->state.expiretime;
|
2017-04-03 04:32:43 -04:00
|
|
|
struct curl_llist *list = &d->state.timeoutlist;
|
2010-08-30 18:08:45 -04:00
|
|
|
struct curl_llist_element *e;
|
2017-04-20 09:10:04 -04:00
|
|
|
struct time_node *node = NULL;
|
2010-08-30 18:08:45 -04:00
|
|
|
|
|
|
|
/* move over the timeout list for this specific handle and remove all
|
|
|
|
timeouts that are now passed tense and store the next pending
|
|
|
|
timeout in *tv */
|
2016-04-03 14:28:34 -04:00
|
|
|
for(e = list->head; e;) {
|
2010-08-30 18:08:45 -04:00
|
|
|
struct curl_llist_element *n = e->next;
|
2017-10-23 06:05:49 -04:00
|
|
|
timediff_t diff;
|
2017-04-20 09:10:04 -04:00
|
|
|
node = (struct time_node *)e->ptr;
|
2017-10-23 06:05:49 -04:00
|
|
|
diff = Curl_timediff(node->time, now);
|
2010-08-30 18:08:45 -04:00
|
|
|
if(diff <= 0)
|
|
|
|
/* remove outdated entry */
|
|
|
|
Curl_llist_remove(list, e, NULL);
|
|
|
|
else
|
|
|
|
/* the list is sorted so get out on the first mismatch */
|
|
|
|
break;
|
|
|
|
e = n;
|
|
|
|
}
|
2012-08-08 08:50:32 -04:00
|
|
|
e = list->head;
|
|
|
|
if(!e) {
|
2010-08-30 18:08:45 -04:00
|
|
|
/* clear the expire times within the handles that we remove from the
|
|
|
|
splay tree */
|
|
|
|
tv->tv_sec = 0;
|
|
|
|
tv->tv_usec = 0;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* copy the first entry to 'tv' */
|
2017-04-20 09:10:04 -04:00
|
|
|
memcpy(tv, &node->time, sizeof(*tv));
|
2010-08-30 18:08:45 -04:00
|
|
|
|
2017-07-29 10:44:39 -04:00
|
|
|
/* Insert this node again into the splay. Keep the timer in the list in
|
|
|
|
case we need to recompute future timers. */
|
2010-08-30 18:08:45 -04:00
|
|
|
multi->timetree = Curl_splayinsert(*tv, multi->timetree,
|
|
|
|
&d->state.timenode);
|
|
|
|
}
|
|
|
|
return CURLM_OK;
|
|
|
|
}
|
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
static CURLMcode multi_socket(struct Curl_multi *multi,
|
|
|
|
bool checkall,
|
2006-07-30 18:44:07 -04:00
|
|
|
curl_socket_t s,
|
2007-04-16 12:34:08 -04:00
|
|
|
int ev_bitmask,
|
2006-07-30 18:44:07 -04:00
|
|
|
int *running_handles)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
|
|
|
CURLMcode result = CURLM_OK;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data = NULL;
|
2006-04-10 11:00:53 -04:00
|
|
|
struct Curl_tree *t;
|
2017-10-25 05:59:43 -04:00
|
|
|
struct curltime now = Curl_now();
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
if(checkall) {
|
2006-08-02 18:29:29 -04:00
|
|
|
/* *perform() deals with running_handles on its own */
|
2006-07-30 18:44:07 -04:00
|
|
|
result = curl_multi_perform(multi, running_handles);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
/* walk through each easy handle and do the socket state change magic
|
|
|
|
and callbacks */
|
2014-01-05 14:01:33 -05:00
|
|
|
if(result != CURLM_BAD_HANDLE) {
|
2017-09-09 17:09:06 -04:00
|
|
|
data = multi->easyp;
|
2014-01-05 14:01:33 -05:00
|
|
|
while(data) {
|
|
|
|
singlesocket(multi, data);
|
|
|
|
data = data->next;
|
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2006-04-21 09:40:07 -04:00
|
|
|
/* or should we fall-through and do the timer-based stuff? */
|
2006-04-10 11:00:53 -04:00
|
|
|
return result;
|
|
|
|
}
|
2017-03-10 08:28:37 -05:00
|
|
|
if(s != CURL_SOCKET_TIMEOUT) {
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2016-03-14 04:18:01 -04:00
|
|
|
struct Curl_sh_entry *entry = sh_getentry(&multi->sockhash, s);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
if(!entry)
|
2008-05-19 16:58:01 -04:00
|
|
|
/* Unmatched socket, we can't act on it but we ignore this fact. In
|
|
|
|
real-world tests it has been proved that libevent can in fact give
|
|
|
|
the application actions even though the socket was just previously
|
|
|
|
asked to get removed, so thus we better survive stray socket actions
|
|
|
|
and just move on. */
|
|
|
|
;
|
|
|
|
else {
|
2014-02-17 04:35:21 -05:00
|
|
|
SIGPIPE_VARIABLE(pipe_st);
|
|
|
|
|
2008-05-19 16:58:01 -04:00
|
|
|
data = entry->easy;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2008-05-19 16:58:01 -04:00
|
|
|
if(data->magic != CURLEASY_MAGIC_NUMBER)
|
|
|
|
/* bad bad bad bad bad bad bad */
|
|
|
|
return CURLM_INTERNAL_ERROR;
|
2006-09-10 18:15:32 -04:00
|
|
|
|
2008-12-20 17:03:22 -05:00
|
|
|
/* If the pipeline is enabled, take the handle which is in the head of
|
|
|
|
the pipeline. If we should write into the socket, take the send_pipe
|
|
|
|
head. If we should read from the socket, take the recv_pipe head. */
|
2013-08-02 06:25:18 -04:00
|
|
|
if(data->easy_conn) {
|
2011-04-20 09:17:42 -04:00
|
|
|
if((ev_bitmask & CURL_POLL_OUT) &&
|
2017-04-03 04:32:43 -04:00
|
|
|
data->easy_conn->send_pipe.head)
|
|
|
|
data = data->easy_conn->send_pipe.head->ptr;
|
2011-04-20 09:17:42 -04:00
|
|
|
else if((ev_bitmask & CURL_POLL_IN) &&
|
2017-04-03 04:32:43 -04:00
|
|
|
data->easy_conn->recv_pipe.head)
|
|
|
|
data = data->easy_conn->recv_pipe.head->ptr;
|
2008-12-20 17:03:22 -05:00
|
|
|
}
|
|
|
|
|
2013-08-02 06:25:18 -04:00
|
|
|
if(data->easy_conn &&
|
|
|
|
!(data->easy_conn->handler->flags & PROTOPT_DIRLOCK))
|
2011-03-13 18:21:03 -04:00
|
|
|
/* set socket event bitmask if they're not locked */
|
2013-08-02 06:25:18 -04:00
|
|
|
data->easy_conn->cselect_bits = ev_bitmask;
|
2007-04-16 12:34:08 -04:00
|
|
|
|
2014-02-17 04:35:21 -05:00
|
|
|
sigpipe_ignore(data, &pipe_st);
|
2014-11-18 08:34:55 -05:00
|
|
|
result = multi_runsingle(multi, now, data);
|
2014-02-17 04:35:21 -05:00
|
|
|
sigpipe_restore(&pipe_st);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2013-08-02 06:25:18 -04:00
|
|
|
if(data->easy_conn &&
|
|
|
|
!(data->easy_conn->handler->flags & PROTOPT_DIRLOCK))
|
2011-03-13 18:21:03 -04:00
|
|
|
/* clear the bitmask only if not locked */
|
2013-08-02 06:25:18 -04:00
|
|
|
data->easy_conn->cselect_bits = 0;
|
2007-04-16 12:34:08 -04:00
|
|
|
|
2008-05-19 16:58:01 -04:00
|
|
|
if(CURLM_OK >= result)
|
|
|
|
/* get the socket(s) and check if the state has been changed since
|
|
|
|
last */
|
2013-08-02 06:25:18 -04:00
|
|
|
singlesocket(multi, data);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2008-05-19 16:58:01 -04:00
|
|
|
/* Now we fall-through and do the timer-based stuff, since we don't want
|
|
|
|
to force the user to have to deal with timeouts as long as at least
|
|
|
|
one connection in fact has traffic. */
|
2006-08-04 10:39:19 -04:00
|
|
|
|
2008-05-19 16:58:01 -04:00
|
|
|
data = NULL; /* set data to NULL again to avoid calling
|
|
|
|
multi_runsingle() in case there's no need to */
|
2017-10-25 05:59:43 -04:00
|
|
|
now = Curl_now(); /* get a newer time since the multi_runsingle() loop
|
|
|
|
may have taken some time */
|
2008-05-19 16:58:01 -04:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
multi_socket: remind app if timeout didn't run
BACKGROUND:
We have learned that on some systems timeout timers are inaccurate and
might occasionally fire off too early. To make the multi_socket API work
with this, we made libcurl execute timeout actions a bit early too if
they are within our MULTI_TIMEOUT_INACCURACY. (added in commit
2c72732ebf, present since 7.21.0)
Switching everything to the multi API made this inaccuracy problem
slightly more notable as now everyone can be affected.
Recently (commit 21091549c02) we tweaked that inaccuracy value to make
timeouts more accurate and made it platform specific. We also figured
out that we have code at places that check for fixed timeout values so
they MUST NOT run too early as then they will not trigger at all (see
commit be28223f35 and a691e044705) - so there are definitately problems
with running timeouts before they're supposed to run. (We've handled
that so far by adding the inaccuracy margin to those specific timeouts.)
The libcurl multi_socket API tells the application with a callback that
a timeout expires in N milliseconds (and it explicitly will not tell it
again for the same timeout), and the application is then supposed to
call libcurl when that timeout expires. When libcurl subsequently gets
called with curl_multi_socket_action(...CURL_SOCKET_TIMEOUT...), it
knows that the application thinks the timeout expired - and alas, if it
is within the inaccuracy level libcurl will run code handling that
handle.
If the application says CURL_SOCKET_TIMEOUT to libcurl and _isn't_
within the inaccuracy level, libcurl will not consider the timeout
expired and it will not tell the application again since the timeout
value is still the same.
NOW:
This change introduces a modified behavior here. If the application says
CURL_SOCKET_TIMEOUT and libcurl finds no timeout code to run, it will
inform the application about the timeout value - *again* even if it is
the same timeout that it already told about before (although libcurl
will of course tell it the updated time so that it'll still get the
correct remaining time). This way, we will not risk that the application
believes it has done its job and libcurl thinks the time hasn't come yet
to run any code and both just sit waiting. This also allows us to
decrease the MULTI_TIMEOUT_INACCURACY margin, but that will be handled
in a separate commit.
A repeated timeout update to the application risk that the timeout will
then fire again immediately and we have what basically is a busy-loop
until the time is fine even for libcurl. If that becomes a problem, we
need to address it.
2014-01-08 02:23:13 -05:00
|
|
|
else {
|
|
|
|
/* Asked to run due to time-out. Clear the 'lastcall' variable to force
|
|
|
|
update_timer() to trigger a callback to the app again even if the same
|
|
|
|
timeout is still the one to run after this call. That handles the case
|
|
|
|
when the application asks libcurl to run the timeout prematurely. */
|
|
|
|
memset(&multi->timer_lastcall, 0, sizeof(multi->timer_lastcall));
|
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The loop following here will go on as long as there are expire-times left
|
|
|
|
* to process in the splay and 'data' will be re-assigned for every expired
|
|
|
|
* handle we deal with.
|
|
|
|
*/
|
|
|
|
do {
|
|
|
|
/* the first loop lap 'data' can be NULL */
|
|
|
|
if(data) {
|
2014-02-17 04:35:21 -05:00
|
|
|
SIGPIPE_VARIABLE(pipe_st);
|
|
|
|
|
|
|
|
sigpipe_ignore(data, &pipe_st);
|
2014-11-18 08:34:55 -05:00
|
|
|
result = multi_runsingle(multi, now, data);
|
2014-02-17 04:35:21 -05:00
|
|
|
sigpipe_restore(&pipe_st);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2007-06-01 17:24:34 -04:00
|
|
|
if(CURLM_OK >= result)
|
2006-04-10 11:00:53 -04:00
|
|
|
/* get the socket(s) and check if the state has been changed since
|
|
|
|
last */
|
2013-08-02 06:25:18 -04:00
|
|
|
singlesocket(multi, data);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if there's one (more) expired timer to deal with! This function
|
|
|
|
extracts a matching node if there is one */
|
|
|
|
|
2008-05-07 11:41:41 -04:00
|
|
|
multi->timetree = Curl_splaygetbest(now, multi->timetree, &t);
|
2010-09-01 10:52:23 -04:00
|
|
|
if(t) {
|
|
|
|
data = t->payload; /* assign this for next loop */
|
2010-08-30 18:08:45 -04:00
|
|
|
(void)add_next_timeout(now, multi, t->payload);
|
2010-09-01 10:52:23 -04:00
|
|
|
}
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
} while(t);
|
|
|
|
|
2006-08-02 18:29:29 -04:00
|
|
|
*running_handles = multi->num_alive;
|
2006-04-10 11:00:53 -04:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2008-03-18 04:14:37 -04:00
|
|
|
#undef curl_multi_setopt
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_setopt(struct Curl_multi *multi,
|
2006-04-10 11:00:53 -04:00
|
|
|
CURLMoption option, ...)
|
|
|
|
{
|
|
|
|
CURLMcode res = CURLM_OK;
|
|
|
|
va_list param;
|
|
|
|
|
|
|
|
if(!GOOD_MULTI_HANDLE(multi))
|
|
|
|
return CURLM_BAD_HANDLE;
|
|
|
|
|
|
|
|
va_start(param, option);
|
|
|
|
|
|
|
|
switch(option) {
|
|
|
|
case CURLMOPT_SOCKETFUNCTION:
|
|
|
|
multi->socket_cb = va_arg(param, curl_socket_callback);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_SOCKETDATA:
|
|
|
|
multi->socket_userp = va_arg(param, void *);
|
|
|
|
break;
|
2015-06-01 05:45:52 -04:00
|
|
|
case CURLMOPT_PUSHFUNCTION:
|
|
|
|
multi->push_cb = va_arg(param, curl_push_callback);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_PUSHDATA:
|
|
|
|
multi->push_userp = va_arg(param, void *);
|
|
|
|
break;
|
2006-09-07 17:49:20 -04:00
|
|
|
case CURLMOPT_PIPELINING:
|
2015-05-08 04:43:36 -04:00
|
|
|
multi->pipelining = va_arg(param, long);
|
2006-09-07 17:49:20 -04:00
|
|
|
break;
|
2006-10-12 04:36:47 -04:00
|
|
|
case CURLMOPT_TIMERFUNCTION:
|
|
|
|
multi->timer_cb = va_arg(param, curl_multi_timer_callback);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_TIMERDATA:
|
|
|
|
multi->timer_userp = va_arg(param, void *);
|
|
|
|
break;
|
2007-05-30 16:04:44 -04:00
|
|
|
case CURLMOPT_MAXCONNECTS:
|
|
|
|
multi->maxconnects = va_arg(param, long);
|
|
|
|
break;
|
2013-02-15 05:50:45 -05:00
|
|
|
case CURLMOPT_MAX_HOST_CONNECTIONS:
|
|
|
|
multi->max_host_connections = va_arg(param, long);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_MAX_PIPELINE_LENGTH:
|
|
|
|
multi->max_pipeline_length = va_arg(param, long);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE:
|
|
|
|
multi->content_length_penalty_size = va_arg(param, long);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE:
|
|
|
|
multi->chunk_length_penalty_size = va_arg(param, long);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_PIPELINING_SITE_BL:
|
|
|
|
res = Curl_pipeline_set_site_blacklist(va_arg(param, char **),
|
|
|
|
&multi->pipelining_site_bl);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_PIPELINING_SERVER_BL:
|
|
|
|
res = Curl_pipeline_set_server_blacklist(va_arg(param, char **),
|
|
|
|
&multi->pipelining_server_bl);
|
|
|
|
break;
|
|
|
|
case CURLMOPT_MAX_TOTAL_CONNECTIONS:
|
|
|
|
multi->max_total_connections = va_arg(param, long);
|
|
|
|
break;
|
2006-04-10 11:00:53 -04:00
|
|
|
default:
|
|
|
|
res = CURLM_UNKNOWN_OPTION;
|
2006-10-12 04:36:47 -04:00
|
|
|
break;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
va_end(param);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2007-04-16 12:34:08 -04:00
|
|
|
/* we define curl_multi_socket() in the public multi.h header */
|
|
|
|
#undef curl_multi_socket
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_socket(struct Curl_multi *multi, curl_socket_t s,
|
2006-07-30 18:44:07 -04:00
|
|
|
int *running_handles)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
CURLMcode result = multi_socket(multi, FALSE, s, 0, running_handles);
|
2007-11-05 04:45:09 -05:00
|
|
|
if(CURLM_OK >= result)
|
2016-06-21 09:47:12 -04:00
|
|
|
update_timer(multi);
|
2007-04-16 12:34:08 -04:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_socket_action(struct Curl_multi *multi, curl_socket_t s,
|
2009-08-03 07:32:55 -04:00
|
|
|
int ev_bitmask, int *running_handles)
|
2007-04-16 12:34:08 -04:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
CURLMcode result = multi_socket(multi, FALSE, s,
|
2007-04-16 12:34:08 -04:00
|
|
|
ev_bitmask, running_handles);
|
2007-11-05 04:45:09 -05:00
|
|
|
if(CURLM_OK >= result)
|
2016-06-21 09:47:12 -04:00
|
|
|
update_timer(multi);
|
2006-10-12 04:36:47 -04:00
|
|
|
return result;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_socket_all(struct Curl_multi *multi, int *running_handles)
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
CURLMcode result = multi_socket(multi, TRUE, CURL_SOCKET_BAD, 0,
|
|
|
|
running_handles);
|
2007-11-05 04:45:09 -05:00
|
|
|
if(CURLM_OK >= result)
|
2016-06-21 09:47:12 -04:00
|
|
|
update_timer(multi);
|
2006-10-12 04:36:47 -04:00
|
|
|
return result;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2006-10-12 04:36:47 -04:00
|
|
|
static CURLMcode multi_timeout(struct Curl_multi *multi,
|
|
|
|
long *timeout_ms)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
2017-07-28 09:49:36 -04:00
|
|
|
static struct curltime tv_zero = {0, 0};
|
2008-05-07 11:41:41 -04:00
|
|
|
|
2006-04-10 11:00:53 -04:00
|
|
|
if(multi->timetree) {
|
|
|
|
/* we have a tree of expire times */
|
2017-10-25 05:59:43 -04:00
|
|
|
struct curltime now = Curl_now();
|
2006-04-10 11:00:53 -04:00
|
|
|
|
|
|
|
/* splay the lowest to the bottom */
|
2008-05-07 11:41:41 -04:00
|
|
|
multi->timetree = Curl_splay(tv_zero, multi->timetree);
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2008-12-19 17:58:22 -05:00
|
|
|
if(Curl_splaycomparekeys(multi->timetree->key, now) > 0) {
|
2008-05-07 11:41:41 -04:00
|
|
|
/* some time left before expiration */
|
2017-10-23 06:05:49 -04:00
|
|
|
timediff_t diff = Curl_timediff(multi->timetree->key, now);
|
|
|
|
if(diff <= 0)
|
2008-12-19 17:58:22 -05:00
|
|
|
/*
|
|
|
|
* Since we only provide millisecond resolution on the returned value
|
|
|
|
* and the diff might be less than one millisecond here, we don't
|
|
|
|
* return zero as that may cause short bursts of busyloops on fast
|
|
|
|
* processors while the diff is still present but less than one
|
|
|
|
* millisecond! instead we return 1 until the time is ripe.
|
|
|
|
*/
|
2017-09-09 17:09:06 -04:00
|
|
|
*timeout_ms = 1;
|
2017-10-23 06:05:49 -04:00
|
|
|
else
|
|
|
|
/* this should be safe even on 64 bit archs, as we don't use that
|
|
|
|
overly long timeouts */
|
|
|
|
*timeout_ms = (long)diff;
|
2008-12-19 17:58:22 -05:00
|
|
|
}
|
2008-05-07 11:41:41 -04:00
|
|
|
else
|
2006-04-10 11:00:53 -04:00
|
|
|
/* 0 means immediately */
|
|
|
|
*timeout_ms = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
*timeout_ms = -1;
|
|
|
|
|
|
|
|
return CURLM_OK;
|
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_timeout(struct Curl_multi *multi,
|
2006-10-12 04:36:47 -04:00
|
|
|
long *timeout_ms)
|
|
|
|
{
|
|
|
|
/* First, make some basic checks that the CURLM handle is a good handle */
|
|
|
|
if(!GOOD_MULTI_HANDLE(multi))
|
|
|
|
return CURLM_BAD_HANDLE;
|
|
|
|
|
|
|
|
return multi_timeout(multi, timeout_ms);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Tell the application it should update its timers, if it subscribes to the
|
|
|
|
* update timer callback.
|
|
|
|
*/
|
|
|
|
static int update_timer(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
long timeout_ms;
|
2010-09-01 10:52:23 -04:00
|
|
|
|
2007-11-05 04:45:09 -05:00
|
|
|
if(!multi->timer_cb)
|
2006-10-12 04:36:47 -04:00
|
|
|
return 0;
|
2010-09-01 10:52:23 -04:00
|
|
|
if(multi_timeout(multi, &timeout_ms)) {
|
2006-10-12 04:36:47 -04:00
|
|
|
return -1;
|
2010-09-01 10:52:23 -04:00
|
|
|
}
|
2011-04-22 17:01:30 -04:00
|
|
|
if(timeout_ms < 0) {
|
2017-09-09 17:09:06 -04:00
|
|
|
static const struct curltime none = {0, 0};
|
2010-09-01 10:52:23 -04:00
|
|
|
if(Curl_splaycomparekeys(none, multi->timer_lastcall)) {
|
|
|
|
multi->timer_lastcall = none;
|
|
|
|
/* there's no timeout now but there was one previously, tell the app to
|
|
|
|
disable it */
|
2016-06-21 09:47:12 -04:00
|
|
|
return multi->timer_cb(multi, -1, multi->timer_userp);
|
2010-09-01 10:52:23 -04:00
|
|
|
}
|
2006-10-12 04:36:47 -04:00
|
|
|
return 0;
|
2010-09-01 10:52:23 -04:00
|
|
|
}
|
2006-10-12 04:36:47 -04:00
|
|
|
|
|
|
|
/* When multi_timeout() is done, multi->timetree points to the node with the
|
|
|
|
* timeout we got the (relative) time-out time for. We can thus easily check
|
|
|
|
* if this is the same (fixed) time as we got in a previous call and then
|
|
|
|
* avoid calling the callback again. */
|
2008-05-07 11:41:41 -04:00
|
|
|
if(Curl_splaycomparekeys(multi->timetree->key, multi->timer_lastcall) == 0)
|
2006-10-12 04:36:47 -04:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
multi->timer_lastcall = multi->timetree->key;
|
|
|
|
|
2016-06-21 09:47:12 -04:00
|
|
|
return multi->timer_cb(multi, timeout_ms, multi->timer_userp);
|
2006-10-12 04:36:47 -04:00
|
|
|
}
|
|
|
|
|
2017-05-09 06:47:49 -04:00
|
|
|
/*
|
|
|
|
* multi_deltimeout()
|
|
|
|
*
|
|
|
|
* Remove a given timestamp from the list of timeouts.
|
|
|
|
*/
|
|
|
|
static void
|
2017-05-09 06:47:49 -04:00
|
|
|
multi_deltimeout(struct Curl_easy *data, expire_id eid)
|
2017-05-09 06:47:49 -04:00
|
|
|
{
|
|
|
|
struct curl_llist_element *e;
|
|
|
|
struct curl_llist *timeoutlist = &data->state.timeoutlist;
|
2017-05-09 06:47:49 -04:00
|
|
|
/* find and remove the specific node from the list */
|
2017-05-09 06:47:49 -04:00
|
|
|
for(e = timeoutlist->head; e; e = e->next) {
|
2017-05-09 06:47:49 -04:00
|
|
|
struct time_node *n = (struct time_node *)e->ptr;
|
|
|
|
if(n->eid == eid) {
|
2017-05-09 06:47:49 -04:00
|
|
|
Curl_llist_remove(timeoutlist, e, NULL);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-10 05:02:07 -04:00
|
|
|
/*
|
|
|
|
* multi_addtimeout()
|
|
|
|
*
|
|
|
|
* Add a timestamp to the list of timeouts. Keep the list sorted so that head
|
|
|
|
* of list is always the timeout nearest in time.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static CURLMcode
|
2017-05-09 06:47:49 -04:00
|
|
|
multi_addtimeout(struct Curl_easy *data,
|
2017-07-28 09:49:36 -04:00
|
|
|
struct curltime *stamp,
|
2017-05-09 06:47:49 -04:00
|
|
|
expire_id eid)
|
2010-08-10 05:02:07 -04:00
|
|
|
{
|
|
|
|
struct curl_llist_element *e;
|
2017-04-20 09:10:04 -04:00
|
|
|
struct time_node *node;
|
2010-08-10 05:02:07 -04:00
|
|
|
struct curl_llist_element *prev = NULL;
|
2017-05-09 06:47:49 -04:00
|
|
|
size_t n;
|
|
|
|
struct curl_llist *timeoutlist = &data->state.timeoutlist;
|
2010-08-10 05:02:07 -04:00
|
|
|
|
2017-05-09 06:47:49 -04:00
|
|
|
node = &data->state.expires[eid];
|
2010-08-10 05:02:07 -04:00
|
|
|
|
2017-05-09 06:47:49 -04:00
|
|
|
/* copy the timestamp and id */
|
2017-04-20 09:10:04 -04:00
|
|
|
memcpy(&node->time, stamp, sizeof(*stamp));
|
2017-05-09 06:47:49 -04:00
|
|
|
node->eid = eid; /* also marks it as in use */
|
2010-08-10 05:02:07 -04:00
|
|
|
|
2017-05-09 06:47:49 -04:00
|
|
|
n = Curl_llist_count(timeoutlist);
|
|
|
|
if(n) {
|
2010-08-10 05:02:07 -04:00
|
|
|
/* find the correct spot in the list */
|
|
|
|
for(e = timeoutlist->head; e; e = e->next) {
|
2017-04-20 09:10:04 -04:00
|
|
|
struct time_node *check = (struct time_node *)e->ptr;
|
2017-10-23 06:05:49 -04:00
|
|
|
timediff_t diff = Curl_timediff(check->time, node->time);
|
2010-08-10 05:02:07 -04:00
|
|
|
if(diff > 0)
|
|
|
|
break;
|
|
|
|
prev = e;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
/* else
|
|
|
|
this is the first timeout on the list */
|
|
|
|
|
2017-04-20 09:10:04 -04:00
|
|
|
Curl_llist_insert_next(timeoutlist, prev, node, &node->list);
|
2010-08-10 05:02:07 -04:00
|
|
|
return CURLM_OK;
|
|
|
|
}
|
2008-12-19 16:14:52 -05:00
|
|
|
|
2010-08-10 05:02:07 -04:00
|
|
|
/*
|
|
|
|
* Curl_expire()
|
|
|
|
*
|
|
|
|
* given a number of milliseconds from now to use to set the 'act before
|
|
|
|
* this'-time for the transfer, to be extracted by curl_multi_timeout()
|
|
|
|
*
|
2016-08-02 04:57:30 -04:00
|
|
|
* The timeout will be added to a queue of timeouts if it defines a moment in
|
|
|
|
* time that is later than the current head of queue.
|
2017-05-09 06:47:49 -04:00
|
|
|
*
|
2017-05-09 06:47:49 -04:00
|
|
|
* Expire replaces a former timeout using the same id if already set.
|
2016-08-02 04:57:30 -04:00
|
|
|
*/
|
2017-05-09 06:47:49 -04:00
|
|
|
void Curl_expire(struct Curl_easy *data, time_t milli, expire_id id)
|
2006-04-10 11:00:53 -04:00
|
|
|
{
|
|
|
|
struct Curl_multi *multi = data->multi;
|
2017-07-28 09:49:36 -04:00
|
|
|
struct curltime *nowp = &data->state.expiretime;
|
2006-05-27 18:26:16 -04:00
|
|
|
int rc;
|
2017-07-28 09:49:36 -04:00
|
|
|
struct curltime set;
|
2006-04-10 11:00:53 -04:00
|
|
|
|
2013-08-09 17:39:09 -04:00
|
|
|
/* this is only interesting while there is still an associated multi struct
|
|
|
|
remaining! */
|
2006-04-10 11:00:53 -04:00
|
|
|
if(!multi)
|
|
|
|
return;
|
|
|
|
|
2017-05-09 06:47:49 -04:00
|
|
|
DEBUGASSERT(id < EXPIRE_LAST);
|
|
|
|
|
2017-10-25 05:59:43 -04:00
|
|
|
set = Curl_now();
|
2017-07-28 09:49:36 -04:00
|
|
|
set.tv_sec += milli/1000;
|
|
|
|
set.tv_usec += (unsigned int)(milli%1000)*1000;
|
2010-08-10 05:02:07 -04:00
|
|
|
|
2016-08-02 04:57:30 -04:00
|
|
|
if(set.tv_usec >= 1000000) {
|
|
|
|
set.tv_sec++;
|
|
|
|
set.tv_usec -= 1000000;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2017-07-29 10:44:39 -04:00
|
|
|
/* Remove any timer with the same id just in case. */
|
|
|
|
multi_deltimeout(data, id);
|
|
|
|
|
|
|
|
/* Add it to the timer list. It must stay in the list until it has expired
|
|
|
|
in case we need to recompute the minimum timer later. */
|
|
|
|
multi_addtimeout(data, &set, id);
|
|
|
|
|
2016-08-02 04:57:30 -04:00
|
|
|
if(nowp->tv_sec || nowp->tv_usec) {
|
|
|
|
/* This means that the struct is added as a node in the splay tree.
|
|
|
|
Compare if the new time is earlier, and only remove-old/add-new if it
|
|
|
|
is. */
|
2017-10-23 06:05:49 -04:00
|
|
|
timediff_t diff = Curl_timediff(set, *nowp);
|
2017-05-09 06:47:49 -04:00
|
|
|
|
2016-08-02 04:57:30 -04:00
|
|
|
if(diff > 0) {
|
2017-07-29 10:44:39 -04:00
|
|
|
/* The current splay tree entry is sooner than this new expiry time.
|
|
|
|
We don't need to update our splay tree entry. */
|
2016-08-02 04:57:30 -04:00
|
|
|
return;
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2016-08-02 04:57:30 -04:00
|
|
|
/* Since this is an updated time, we must remove the previous entry from
|
|
|
|
the splay tree first and then re-add the new value */
|
|
|
|
rc = Curl_splayremovebyaddr(multi->timetree,
|
|
|
|
&data->state.timenode,
|
|
|
|
&multi->timetree);
|
|
|
|
if(rc)
|
|
|
|
infof(data, "Internal error removing splay node = %d\n", rc);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
2016-08-02 04:57:30 -04:00
|
|
|
|
2017-07-29 10:44:39 -04:00
|
|
|
/* Indicate that we are in the splay tree and insert the new timer expiry
|
|
|
|
value since it is our local minimum. */
|
2016-08-02 04:57:30 -04:00
|
|
|
*nowp = set;
|
|
|
|
data->state.timenode.payload = data;
|
|
|
|
multi->timetree = Curl_splayinsert(*nowp, multi->timetree,
|
|
|
|
&data->state.timenode);
|
2006-04-10 11:00:53 -04:00
|
|
|
}
|
|
|
|
|
2017-05-09 06:47:49 -04:00
|
|
|
/*
|
|
|
|
* Curl_expire_done()
|
|
|
|
*
|
|
|
|
* Removes the expire timer. Marks it as done.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void Curl_expire_done(struct Curl_easy *data, expire_id id)
|
|
|
|
{
|
|
|
|
/* remove the timer, if there */
|
|
|
|
multi_deltimeout(data, id);
|
|
|
|
}
|
2016-08-02 04:57:30 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Curl_expire_clear()
|
|
|
|
*
|
|
|
|
* Clear ALL timeout values for this handle.
|
|
|
|
*/
|
|
|
|
void Curl_expire_clear(struct Curl_easy *data)
|
|
|
|
{
|
|
|
|
struct Curl_multi *multi = data->multi;
|
2017-07-28 09:49:36 -04:00
|
|
|
struct curltime *nowp = &data->state.expiretime;
|
2016-08-02 04:57:30 -04:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
/* this is only interesting while there is still an associated multi struct
|
|
|
|
remaining! */
|
|
|
|
if(!multi)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if(nowp->tv_sec || nowp->tv_usec) {
|
|
|
|
/* Since this is an cleared time, we must remove the previous entry from
|
|
|
|
the splay tree */
|
2017-04-03 04:32:43 -04:00
|
|
|
struct curl_llist *list = &data->state.timeoutlist;
|
2016-08-02 04:57:30 -04:00
|
|
|
|
|
|
|
rc = Curl_splayremovebyaddr(multi->timetree,
|
|
|
|
&data->state.timenode,
|
|
|
|
&multi->timetree);
|
|
|
|
if(rc)
|
|
|
|
infof(data, "Internal error clearing splay node = %d\n", rc);
|
|
|
|
|
|
|
|
/* flush the timeout list too */
|
2017-04-20 09:10:04 -04:00
|
|
|
while(list->size > 0) {
|
2016-08-02 04:57:30 -04:00
|
|
|
Curl_llist_remove(list, list->tail, NULL);
|
2017-04-20 09:10:04 -04:00
|
|
|
}
|
2016-08-02 04:57:30 -04:00
|
|
|
|
|
|
|
#ifdef DEBUGBUILD
|
|
|
|
infof(data, "Expire cleared\n");
|
|
|
|
#endif
|
|
|
|
nowp->tv_sec = 0;
|
|
|
|
nowp->tv_usec = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
CURLMcode curl_multi_assign(struct Curl_multi *multi, curl_socket_t s,
|
|
|
|
void *hashp)
|
2006-07-26 18:19:42 -04:00
|
|
|
{
|
|
|
|
struct Curl_sh_entry *there = NULL;
|
|
|
|
|
2016-03-14 04:18:01 -04:00
|
|
|
there = sh_getentry(&multi->sockhash, s);
|
2006-07-26 18:19:42 -04:00
|
|
|
|
|
|
|
if(!there)
|
|
|
|
return CURLM_BAD_SOCKET;
|
|
|
|
|
|
|
|
there->socketp = hashp;
|
|
|
|
|
|
|
|
return CURLM_OK;
|
|
|
|
}
|
2006-09-07 17:49:20 -04:00
|
|
|
|
2013-02-15 05:50:45 -05:00
|
|
|
size_t Curl_multi_max_host_connections(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
return multi ? multi->max_host_connections : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t Curl_multi_max_total_connections(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
return multi ? multi->max_total_connections : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
curl_off_t Curl_multi_content_length_penalty_size(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
return multi ? multi->content_length_penalty_size : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
curl_off_t Curl_multi_chunk_length_penalty_size(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
return multi ? multi->chunk_length_penalty_size : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct curl_llist *Curl_multi_pipelining_site_bl(struct Curl_multi *multi)
|
|
|
|
{
|
2017-04-03 04:32:43 -04:00
|
|
|
return &multi->pipelining_site_bl;
|
2013-02-15 05:50:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
struct curl_llist *Curl_multi_pipelining_server_bl(struct Curl_multi *multi)
|
|
|
|
{
|
2017-04-03 04:32:43 -04:00
|
|
|
return &multi->pipelining_server_bl;
|
2013-02-15 05:50:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
void Curl_multi_process_pending_handles(struct Curl_multi *multi)
|
|
|
|
{
|
2017-04-03 04:32:43 -04:00
|
|
|
struct curl_llist_element *e = multi->pending.head;
|
2013-02-15 05:50:45 -05:00
|
|
|
|
2014-09-07 02:09:14 -04:00
|
|
|
while(e) {
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data = e->ptr;
|
2014-09-07 02:09:14 -04:00
|
|
|
struct curl_llist_element *next = e->next;
|
|
|
|
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->mstate == CURLM_STATE_CONNECT_PEND) {
|
|
|
|
multistate(data, CURLM_STATE_CONNECT);
|
2014-09-07 02:09:14 -04:00
|
|
|
|
2014-09-02 03:29:50 -04:00
|
|
|
/* Remove this node from the list */
|
2017-04-03 04:32:43 -04:00
|
|
|
Curl_llist_remove(&multi->pending, e, NULL);
|
2014-09-07 02:09:14 -04:00
|
|
|
|
2013-02-15 05:50:45 -05:00
|
|
|
/* Make sure that the handle will be processed soonish. */
|
2017-06-08 02:34:32 -04:00
|
|
|
Curl_expire(data, 0, EXPIRE_RUN_NOW);
|
2013-02-15 05:50:45 -05:00
|
|
|
}
|
2014-09-07 02:09:14 -04:00
|
|
|
|
|
|
|
e = next; /* operate on next handle */
|
2013-02-15 05:50:45 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-06-09 22:49:42 -04:00
|
|
|
#ifdef DEBUGBUILD
|
2016-06-21 09:47:12 -04:00
|
|
|
void Curl_multi_dump(struct Curl_multi *multi)
|
2006-10-13 03:11:26 -04:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data;
|
2006-10-13 03:11:26 -04:00
|
|
|
int i;
|
|
|
|
fprintf(stderr, "* Multi status: %d handles, %d alive\n",
|
|
|
|
multi->num_easy, multi->num_alive);
|
2017-09-09 17:09:06 -04:00
|
|
|
for(data = multi->easyp; data; data = data->next) {
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->mstate < CURLM_STATE_COMPLETED) {
|
2006-10-13 03:11:26 -04:00
|
|
|
/* only display handles that are not completed */
|
|
|
|
fprintf(stderr, "handle %p, state %s, %d sockets\n",
|
2013-08-12 07:52:58 -04:00
|
|
|
(void *)data,
|
|
|
|
statename[data->mstate], data->numsocks);
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i < data->numsocks; i++) {
|
2013-08-12 07:52:58 -04:00
|
|
|
curl_socket_t s = data->sockets[i];
|
2016-03-14 04:18:01 -04:00
|
|
|
struct Curl_sh_entry *entry = sh_getentry(&multi->sockhash, s);
|
2006-10-13 03:11:26 -04:00
|
|
|
|
|
|
|
fprintf(stderr, "%d ", (int)s);
|
|
|
|
if(!entry) {
|
|
|
|
fprintf(stderr, "INTERNAL CONFUSION\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
fprintf(stderr, "[%s %s] ",
|
|
|
|
entry->action&CURL_POLL_IN?"RECVING":"",
|
|
|
|
entry->action&CURL_POLL_OUT?"SENDING":"");
|
|
|
|
}
|
2013-08-12 07:52:58 -04:00
|
|
|
if(data->numsocks)
|
2006-10-13 03:11:26 -04:00
|
|
|
fprintf(stderr, "\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|