version 1.112, 2006/08/09 21:12:42
|
version 1.130, 2008/02/27 20:21:17
|
|
|
// | // |
//============================================================================== | //============================================================================== |
// | // |
// Author: Mike Brasher (mbrasher@bmc.com) |
|
// |
|
// Modified By: Mike Day (monitor_2) mdday@us.ibm.com |
|
// Amit K Arora (Bug#1153) amita@in.ibm.com |
|
// Alagaraja Ramasubramanian (alags_raj@in.ibm.com) for Bug#1090 |
|
// Sushma Fernandes (sushma@hp.com) for Bug#2057 |
|
// Josephine Eskaline Joyce (jojustin@in.ibm.com) for PEP#101 |
|
// Roger Kumpf, Hewlett-Packard Company (roger_kumpf@hp.com) |
|
// |
|
//%///////////////////////////////////////////////////////////////////////////// | //%///////////////////////////////////////////////////////////////////////////// |
| |
#include "Network.h" | #include "Network.h" |
|
|
#include <Pegasus/Common/MessageQueueService.h> | #include <Pegasus/Common/MessageQueueService.h> |
#include <Pegasus/Common/Exception.h> | #include <Pegasus/Common/Exception.h> |
#include "ArrayIterator.h" | #include "ArrayIterator.h" |
|
#include "HostAddress.h" |
| |
PEGASUS_USING_STD; | PEGASUS_USING_STD; |
| |
PEGASUS_NAMESPACE_BEGIN | PEGASUS_NAMESPACE_BEGIN |
| |
static AtomicInt _connections(0); |
|
|
|
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
// | // |
// Monitor |
// Tickler |
// | // |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
| |
#define MAX_NUMBER_OF_MONITOR_ENTRIES 32 |
Tickler::Tickler() |
Monitor::Monitor() |
: _listenSocket(PEGASUS_INVALID_SOCKET), |
: _stopConnections(0), |
_clientSocket(PEGASUS_INVALID_SOCKET), |
_stopConnectionsSem(0), |
_serverSocket(PEGASUS_INVALID_SOCKET) |
_solicitSocketCount(0), |
|
_tickle_client_socket(-1), |
|
_tickle_server_socket(-1), |
|
_tickle_peer_socket(-1) |
|
{ | { |
int numberOfMonitorEntriesToAllocate = MAX_NUMBER_OF_MONITOR_ENTRIES; |
try |
Socket::initializeInterface(); |
|
_entries.reserveCapacity(numberOfMonitorEntriesToAllocate); |
|
|
|
// setup the tickler |
|
initializeTickler(); |
|
|
|
// Start the count at 1 because initilizeTickler() |
|
// has added an entry in the first position of the |
|
// _entries array |
|
for( int i = 1; i < numberOfMonitorEntriesToAllocate; i++ ) |
|
{ | { |
_MonitorEntry entry(0, 0, 0); |
_initialize(); |
_entries.append(entry); |
|
} | } |
} |
catch (...) |
|
|
Monitor::~Monitor() |
|
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "uninitializing interface"); |
_uninitialize(); |
|
throw; |
|
} |
|
} |
| |
try{ |
Tickler::~Tickler() |
if(_tickle_peer_socket >= 0) |
|
{ | { |
Socket::close(_tickle_peer_socket); |
_uninitialize(); |
} | } |
if(_tickle_client_socket >= 0) |
|
|
#if defined(PEGASUS_OS_TYPE_UNIX) |
|
|
|
// Use an anonymous pipe for the tickle connection. |
|
|
|
void Tickler::_initialize() |
{ | { |
Socket::close(_tickle_client_socket); |
int fds[2]; |
} |
|
if(_tickle_server_socket >= 0) |
if (pipe(fds) == -1) |
{ | { |
Socket::close(_tickle_server_socket); |
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CREATE", |
|
"Received error number $0 while creating the internal socket.", |
|
getSocketError()); |
|
throw Exception(parms); |
} | } |
|
|
|
_serverSocket = fds[0]; |
|
_clientSocket = fds[1]; |
} | } |
catch(...) |
|
|
#else |
|
|
|
// Use an external loopback socket connection to allow the tickle socket to |
|
// be included in the select() array on non-Unix platforms. |
|
|
|
void Tickler::_initialize() |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
// |
"Failed to close tickle sockets"); |
// Set up the addresses for the listen, client, and server sockets |
|
// based on whether IPv6 is enabled. |
|
// |
|
|
|
Socket::initializeInterface(); |
|
|
|
# ifdef PEGASUS_ENABLE_IPV6 |
|
struct sockaddr_storage listenAddress; |
|
struct sockaddr_storage clientAddress; |
|
struct sockaddr_storage serverAddress; |
|
# else |
|
struct sockaddr_in listenAddress; |
|
struct sockaddr_in clientAddress; |
|
struct sockaddr_in serverAddress; |
|
# endif |
|
|
|
int addressFamily; |
|
SocketLength addressLength; |
|
|
|
memset(&listenAddress, 0, sizeof (listenAddress)); |
|
|
|
# ifdef PEGASUS_ENABLE_IPV6 |
|
if (System::isIPv6StackActive()) |
|
{ |
|
// Use the IPv6 loopback address for the listen sockets |
|
HostAddress::convertTextToBinary( |
|
HostAddress::AT_IPV6, |
|
"::1", |
|
&reinterpret_cast<struct sockaddr_in6*>(&listenAddress)->sin6_addr); |
|
listenAddress.ss_family = AF_INET6; |
|
reinterpret_cast<struct sockaddr_in6*>(&listenAddress)->sin6_port = 0; |
|
|
|
addressFamily = AF_INET6; |
|
addressLength = sizeof(struct sockaddr_in6); |
} | } |
|
else |
|
# endif |
|
{ |
|
// Use the IPv4 loopback address for the listen sockets |
|
HostAddress::convertTextToBinary( |
|
HostAddress::AT_IPV4, |
|
"127.0.0.1", |
|
&reinterpret_cast<struct sockaddr_in*>( |
|
&listenAddress)->sin_addr.s_addr); |
|
reinterpret_cast<struct sockaddr_in*>(&listenAddress)->sin_family = |
|
AF_INET; |
|
reinterpret_cast<struct sockaddr_in*>(&listenAddress)->sin_port = 0; |
| |
Socket::uninitializeInterface(); |
addressFamily = AF_INET; |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
addressLength = sizeof(struct sockaddr_in); |
"returning from monitor destructor"); |
|
} | } |
| |
void Monitor::initializeTickler(){ |
// Use the same address for the client socket as the listen socket |
/* |
clientAddress = listenAddress; |
NOTE: On any errors trying to |
|
setup out tickle connection, |
|
throw an exception/end the server |
|
*/ |
|
| |
/* setup the tickle server/listener */ |
// |
|
// Set up a listen socket to allow the tickle client and server to connect |
|
// |
| |
// get a socket for the server side |
// Create the listen socket |
if((_tickle_server_socket = ::socket(PF_INET, SOCK_STREAM, 0)) == PEGASUS_INVALID_SOCKET){ |
if ((_listenSocket = Socket::createSocket(addressFamily, SOCK_STREAM, 0)) == |
//handle error |
PEGASUS_INVALID_SOCKET) |
MessageLoaderParms parms("Common.Monitor.TICKLE_CREATE", |
{ |
|
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CREATE", |
"Received error number $0 while creating the internal socket.", | "Received error number $0 while creating the internal socket.", |
getSocketError()); | getSocketError()); |
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
// set TCP_NODELAY |
// Bind the listen socket to the loopback address |
int opt = 1; |
if (::bind( |
setsockopt(_tickle_server_socket, IPPROTO_TCP, TCP_NODELAY, (char*)&opt, sizeof(opt)); |
_listenSocket, |
|
reinterpret_cast<struct sockaddr*>(&listenAddress), |
// initialize the address |
addressLength) < 0) |
memset(&_tickle_server_addr, 0, sizeof(_tickle_server_addr)); |
{ |
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
MessageLoaderParms parms( |
#pragma convert(37) |
"Common.Monitor.TICKLE_BIND", |
#endif |
|
_tickle_server_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); |
|
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
|
#pragma convert(0) |
|
#endif |
|
_tickle_server_addr.sin_family = PF_INET; |
|
_tickle_server_addr.sin_port = 0; |
|
|
|
SocketLength _addr_size = sizeof(_tickle_server_addr); |
|
|
|
// bind server side to socket |
|
if((::bind(_tickle_server_socket, |
|
reinterpret_cast<struct sockaddr*>(&_tickle_server_addr), |
|
sizeof(_tickle_server_addr))) < 0){ |
|
// handle error |
|
#ifdef PEGASUS_OS_ZOS |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_BIND_LONG", |
|
"Received error:$0 while binding the internal socket.",strerror(errno)); |
|
#else |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_BIND", |
|
"Received error number $0 while binding the internal socket.", | "Received error number $0 while binding the internal socket.", |
getSocketError()); | getSocketError()); |
#endif |
|
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
// tell the kernel we are a server |
// Listen for a connection from the tickle client |
if((::listen(_tickle_server_socket,3)) < 0){ |
if ((::listen(_listenSocket, 3)) < 0) |
// handle error |
{ |
MessageLoaderParms parms("Common.Monitor.TICKLE_LISTEN", |
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_LISTEN", |
"Received error number $0 while listening to the internal socket.", | "Received error number $0 while listening to the internal socket.", |
getSocketError()); | getSocketError()); |
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
// make sure we have the correct socket for our server |
// Verify we have the correct listen socket |
int sock = ::getsockname(_tickle_server_socket, |
SocketLength tmpAddressLength = addressLength; |
reinterpret_cast<struct sockaddr*>(&_tickle_server_addr), |
int sock = ::getsockname( |
&_addr_size); |
_listenSocket, |
if(sock < 0){ |
reinterpret_cast<struct sockaddr*>(&listenAddress), |
// handle error |
&tmpAddressLength); |
MessageLoaderParms parms("Common.Monitor.TICKLE_SOCKNAME", |
if (sock < 0) |
|
{ |
|
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_SOCKNAME", |
"Received error number $0 while getting the internal socket name.", | "Received error number $0 while getting the internal socket name.", |
getSocketError()); | getSocketError()); |
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
/* set up the tickle client/connector */ |
// |
|
// Set up the client side of the tickle connection. |
|
// |
| |
// get a socket for our tickle client |
// Create the client socket |
if((_tickle_client_socket = ::socket(PF_INET, SOCK_STREAM, 0)) == PEGASUS_INVALID_SOCKET){ |
if ((_clientSocket = Socket::createSocket(addressFamily, SOCK_STREAM, 0)) == |
// handle error |
PEGASUS_INVALID_SOCKET) |
MessageLoaderParms parms("Common.Monitor.TICKLE_CLIENT_CREATE", |
{ |
"Received error number $0 while creating the internal client socket.", |
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CLIENT_CREATE", |
|
"Received error number $0 while creating the internal client " |
|
"socket.", |
getSocketError()); | getSocketError()); |
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
// set TCP_NODELAY |
// Bind the client socket to the loopback address |
setsockopt(_tickle_client_socket, IPPROTO_TCP, TCP_NODELAY, (char*)&opt, sizeof(opt)); |
if (::bind( |
|
_clientSocket, |
// setup the address of the client |
reinterpret_cast<struct sockaddr*>(&clientAddress), |
memset(&_tickle_client_addr, 0, sizeof(_tickle_client_addr)); |
addressLength) < 0) |
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
{ |
#pragma convert(37) |
MessageLoaderParms parms( |
#endif |
"Common.Monitor.TICKLE_CLIENT_BIND", |
_tickle_client_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); |
"Received error number $0 while binding the internal client " |
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
"socket.", |
#pragma convert(0) |
|
#endif |
|
_tickle_client_addr.sin_family = PF_INET; |
|
_tickle_client_addr.sin_port = 0; |
|
|
|
// bind socket to client side |
|
if((::bind(_tickle_client_socket, |
|
reinterpret_cast<struct sockaddr*>(&_tickle_client_addr), |
|
sizeof(_tickle_client_addr))) < 0){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_CLIENT_BIND", |
|
"Received error number $0 while binding the internal client socket.", |
|
getSocketError()); | getSocketError()); |
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
// connect to server side |
// Connect the client socket to the listen socket address |
if((::connect(_tickle_client_socket, |
if (::connect( |
reinterpret_cast<struct sockaddr*>(&_tickle_server_addr), |
_clientSocket, |
sizeof(_tickle_server_addr))) < 0){ |
reinterpret_cast<struct sockaddr*>(&listenAddress), |
// handle error |
addressLength) < 0) |
MessageLoaderParms parms("Common.Monitor.TICKLE_CLIENT_CONNECT", |
{ |
"Received error number $0 while connecting the internal client socket.", |
MessageLoaderParms parms( |
|
"Common.Monitor.TICKLE_CLIENT_CONNECT", |
|
"Received error number $0 while connecting the internal client " |
|
"socket.", |
getSocketError()); | getSocketError()); |
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
/* set up the slave connection */ |
// |
memset(&_tickle_peer_addr, 0, sizeof(_tickle_peer_addr)); |
// Set up the server side of the tickle connection. |
SocketLength peer_size = sizeof(_tickle_peer_addr); |
// |
Threads::sleep(1); |
|
|
tmpAddressLength = addressLength; |
// this call may fail, we will try a max of 20 times to establish this peer connection |
|
if((_tickle_peer_socket = ::accept(_tickle_server_socket, |
// Accept the client socket connection. |
reinterpret_cast<struct sockaddr*>(&_tickle_peer_addr), |
_serverSocket = ::accept( |
&peer_size)) < 0){ |
_listenSocket, |
#if !defined(PEGASUS_OS_TYPE_WINDOWS) |
reinterpret_cast<struct sockaddr*>(&serverAddress), |
// Only retry on non-windows platforms. |
&tmpAddressLength); |
if(_tickle_peer_socket == -1 && errno == EAGAIN) |
|
{ |
if (_serverSocket == PEGASUS_SOCKET_ERROR) |
int retries = 0; |
{ |
do |
MessageLoaderParms parms( |
{ |
"Common.Monitor.TICKLE_ACCEPT", |
Threads::sleep(1); |
"Received error number $0 while accepting the internal socket " |
_tickle_peer_socket = ::accept(_tickle_server_socket, |
"connection.", |
reinterpret_cast<struct sockaddr*>(&_tickle_peer_addr), |
|
&peer_size); |
|
retries++; |
|
} while(_tickle_peer_socket == -1 && errno == EAGAIN && retries < 20); |
|
} |
|
#endif |
|
} |
|
if(_tickle_peer_socket == -1){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_ACCEPT", |
|
"Received error number $0 while accepting the internal socket connection.", |
|
getSocketError()); | getSocketError()); |
throw Exception(parms); | throw Exception(parms); |
} | } |
| |
Socket::disableBlocking(_tickle_peer_socket); |
// |
Socket::disableBlocking(_tickle_client_socket); |
// Close the listen socket and make the other sockets non-blocking |
|
// |
| |
// add the tickler to the list of entries to be monitored and set to IDLE because Monitor only |
Socket::close(_listenSocket); |
// checks entries with IDLE state for events |
Socket::disableBlocking(_serverSocket); |
_MonitorEntry entry(_tickle_peer_socket, 1, INTERNAL); |
Socket::disableBlocking(_clientSocket); |
entry._status = _MonitorEntry::IDLE; |
|
_entries.append(entry); |
|
} | } |
| |
void Monitor::tickle(void) |
#endif |
|
|
|
void Tickler::_uninitialize() |
|
{ |
|
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, "uninitializing interface"); |
|
|
|
try |
|
{ |
|
Socket::close(_serverSocket); |
|
Socket::close(_clientSocket); |
|
Socket::close(_listenSocket); |
|
} |
|
catch (...) |
{ | { |
static char _buffer[] = |
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, |
|
"Failed to close tickle sockets"); |
|
} |
|
Socket::uninitializeInterface(); |
|
} |
|
|
|
|
|
//////////////////////////////////////////////////////////////////////////////// |
|
// |
|
// Monitor |
|
// |
|
//////////////////////////////////////////////////////////////////////////////// |
|
|
|
#define MAX_NUMBER_OF_MONITOR_ENTRIES 32 |
|
Monitor::Monitor() |
|
: _stopConnections(0), |
|
_stopConnectionsSem(0), |
|
_solicitSocketCount(0) |
{ | { |
'0','0' |
int numberOfMonitorEntriesToAllocate = MAX_NUMBER_OF_MONITOR_ENTRIES; |
}; |
_entries.reserveCapacity(numberOfMonitorEntriesToAllocate); |
|
|
|
// Create a MonitorEntry for the Tickler and set its state to IDLE so the |
|
// Monitor will watch for its events. |
|
_entries.append(MonitorEntry( |
|
_tickler.getServerSocket(), |
|
1, |
|
MonitorEntry::STATUS_IDLE, |
|
MonitorEntry::TYPE_INTERNAL)); |
| |
AutoMutex autoMutex(_tickle_mutex); |
// Start the count at 1 because _entries[0] is the Tickler |
Socket::write(_tickle_client_socket,&_buffer, 2); |
for (int i = 1; i < numberOfMonitorEntriesToAllocate; i++) |
|
{ |
|
_entries.append(MonitorEntry()); |
|
} |
} | } |
| |
void Monitor::setState( Uint32 index, _MonitorEntry::entry_status status ) |
Monitor::~Monitor() |
{ | { |
// Set the state to requested state |
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, |
_entries[index]._status = status; |
"returning from monitor destructor"); |
} | } |
| |
Boolean Monitor::run(Uint32 milliseconds) |
void Monitor::tickle() |
{ | { |
|
Socket::write(_tickler.getClientSocket(), "\0", 1); |
|
} |
| |
Boolean handled_events = false; |
void Monitor::setState( |
int i = 0; |
Uint32 index, |
|
MonitorEntry::Status status) |
|
{ |
|
AutoMutex autoEntryMutex(_entriesMutex); |
|
// Set the state to requested state |
|
_entries[index].status = status; |
|
} |
| |
|
void Monitor::run(Uint32 milliseconds) |
|
{ |
struct timeval tv = {milliseconds/1000, milliseconds%1000*1000}; | struct timeval tv = {milliseconds/1000, milliseconds%1000*1000}; |
| |
fd_set fdread; | fd_set fdread; |
FD_ZERO(&fdread); | FD_ZERO(&fdread); |
| |
AutoMutex autoEntryMutex(_entry_mut); |
AutoMutex autoEntryMutex(_entriesMutex); |
| |
ArrayIterator<_MonitorEntry> entries(_entries); |
ArrayIterator<MonitorEntry> entries(_entries); |
| |
// Check the stopConnections flag. If set, clear the Acceptor monitor entries |
// Check the stopConnections flag. If set, clear the Acceptor monitor |
|
// entries |
if (_stopConnections.get() == 1) | if (_stopConnections.get() == 1) |
{ | { |
for ( int indx = 0; indx < (int)entries.size(); indx++) |
for (Uint32 indx = 0; indx < entries.size(); indx++) |
{ | { |
if (entries[indx]._type == Monitor::ACCEPTOR) |
if (entries[indx].type == MonitorEntry::TYPE_ACCEPTOR) |
{ | { |
if ( entries[indx]._status.get() != _MonitorEntry::EMPTY) |
if (entries[indx].status != MonitorEntry::STATUS_EMPTY) |
{ | { |
if ( entries[indx]._status.get() == _MonitorEntry::IDLE || |
if (entries[indx].status == MonitorEntry::STATUS_IDLE || |
entries[indx]._status.get() == _MonitorEntry::DYING ) |
entries[indx].status == MonitorEntry::STATUS_DYING) |
{ | { |
// remove the entry | // remove the entry |
entries[indx]._status = _MonitorEntry::EMPTY; |
entries[indx].status = MonitorEntry::STATUS_EMPTY; |
} | } |
else | else |
{ | { |
// set status to DYING | // set status to DYING |
entries[indx]._status = _MonitorEntry::DYING; |
entries[indx].status = MonitorEntry::STATUS_DYING; |
} | } |
} | } |
} | } |
|
|
_stopConnectionsSem.signal(); | _stopConnectionsSem.signal(); |
} | } |
| |
for( int indx = 0; indx < (int)entries.size(); indx++) |
for (Uint32 indx = 0; indx < entries.size(); indx++) |
{ | { |
const _MonitorEntry &entry = entries[indx]; |
const MonitorEntry& entry = entries[indx]; |
if ((entry._status.get() == _MonitorEntry::DYING) && |
|
(entry._type == Monitor::CONNECTION)) |
if ((entry.status == MonitorEntry::STATUS_DYING) && |
|
(entry.type == MonitorEntry::TYPE_CONNECTION)) |
{ | { |
MessageQueue *q = MessageQueue::lookup(entry.queueId); | MessageQueue *q = MessageQueue::lookup(entry.queueId); |
PEGASUS_ASSERT(q != 0); | PEGASUS_ASSERT(q != 0); |
|
|
| |
if (h._responsePending == true) | if (h._responsePending == true) |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "Monitor::run - " |
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
"Ignoring connection delete request because " |
"Monitor::run - Ignoring connection delete request " |
"responses are still pending. " |
"because responses are still pending. " |
"connection=0x%p, socket=%d\n", | "connection=0x%p, socket=%d\n", |
(void *)&h, h.getSocket()); |
(void *)&h, h.getSocket())); |
continue; | continue; |
} | } |
h._connectionClosePending = false; | h._connectionClosePending = false; |
|
|
// unlocked will not result in an ArrayIndexOutOfBounds | // unlocked will not result in an ArrayIndexOutOfBounds |
// exception. | // exception. |
| |
_entry_mut.unlock(); |
_entriesMutex.unlock(); |
o.enqueue(message); | o.enqueue(message); |
_entry_mut.lock(); |
_entriesMutex.lock(); |
// After enqueue a message and the autoEntryMutex has been released and locked again, |
|
// the array of _entries can be changed. The ArrayIterator has be reset with the original _entries. |
// After enqueue a message and the autoEntryMutex has been |
|
// released and locked again, the array of _entries can be |
|
// changed. The ArrayIterator has be reset with the original |
|
// _entries. |
entries.reset(_entries); | entries.reset(_entries); |
} | } |
} | } |
|
|
because we have to traverse the entire array. | because we have to traverse the entire array. |
*/ | */ |
SocketHandle maxSocketCurrentPass = 0; | SocketHandle maxSocketCurrentPass = 0; |
for( int indx = 0; indx < (int)entries.size(); indx++) |
for (Uint32 indx = 0; indx < entries.size(); indx++) |
{ | { |
if(maxSocketCurrentPass < entries[indx].socket) | if(maxSocketCurrentPass < entries[indx].socket) |
maxSocketCurrentPass = entries[indx].socket; | maxSocketCurrentPass = entries[indx].socket; |
| |
if(entries[indx]._status.get() == _MonitorEntry::IDLE) |
if (entries[indx].status == MonitorEntry::STATUS_IDLE) |
{ | { |
_idleEntries++; | _idleEntries++; |
FD_SET(entries[indx].socket, &fdread); | FD_SET(entries[indx].socket, &fdread); |
|
|
*/ | */ |
maxSocketCurrentPass++; | maxSocketCurrentPass++; |
| |
_entry_mut.unlock(); |
_entriesMutex.unlock(); |
| |
// | // |
// The first argument to select() is ignored on Windows and it is not | // The first argument to select() is ignored on Windows and it is not |
|
|
#else | #else |
int events = select(maxSocketCurrentPass, &fdread, NULL, NULL, &tv); | int events = select(maxSocketCurrentPass, &fdread, NULL, NULL, &tv); |
#endif | #endif |
_entry_mut.lock(); |
int selectErrno = getSocketError(); |
// After enqueue a message and the autoEntryMutex has been released and locked again, |
|
// the array of _entries can be changed. The ArrayIterator has be reset with the original _entries |
_entriesMutex.lock(); |
|
|
|
struct timeval timeNow; |
|
Time::gettimeofday(&timeNow); |
|
|
|
// After enqueue a message and the autoEntryMutex has been released and |
|
// locked again, the array of _entries can be changed. The ArrayIterator |
|
// has be reset with the original _entries |
entries.reset(_entries); | entries.reset(_entries); |
| |
if (events == PEGASUS_SOCKET_ERROR) | if (events == PEGASUS_SOCKET_ERROR) |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
"Monitor::run - errorno = %d has occurred on select.", errno); |
"Monitor::run - select() returned error %d.", selectErrno)); |
// The EBADF error indicates that one or more or the file | // The EBADF error indicates that one or more or the file |
// descriptions was not valid. This could indicate that | // descriptions was not valid. This could indicate that |
// the entries structure has been corrupted or that | // the entries structure has been corrupted or that |
// we have a synchronization error. | // we have a synchronization error. |
| |
PEGASUS_ASSERT(errno != EBADF); |
PEGASUS_ASSERT(selectErrno != EBADF); |
} | } |
else if (events) | else if (events) |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
"Monitor::run select event received events = %d, monitoring %d idle entries", |
"Monitor::run select event received events = %d, monitoring %d " |
events, _idleEntries); |
"idle entries", |
for( int indx = 0; indx < (int)entries.size(); indx++) |
events, _idleEntries)); |
{ |
for (Uint32 indx = 0; indx < entries.size(); indx++) |
// The Monitor should only look at entries in the table that are IDLE (i.e., |
{ |
// owned by the Monitor). |
// The Monitor should only look at entries in the table that are |
if((entries[indx]._status.get() == _MonitorEntry::IDLE) && |
// IDLE (i.e., owned by the Monitor). |
|
if ((entries[indx].status == MonitorEntry::STATUS_IDLE) && |
(FD_ISSET(entries[indx].socket, &fdread))) | (FD_ISSET(entries[indx].socket, &fdread))) |
{ | { |
MessageQueue *q = MessageQueue::lookup(entries[indx].queueId); | MessageQueue *q = MessageQueue::lookup(entries[indx].queueId); |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::run indx = %d, queueId = %d, q = %p", |
|
indx, entries[indx].queueId, q); |
|
PEGASUS_ASSERT(q !=0); | PEGASUS_ASSERT(q !=0); |
|
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::run indx = %d, queueId = %d, q = %p", |
|
indx, entries[indx].queueId, q)); |
| |
try | try |
{ | { |
if(entries[indx]._type == Monitor::CONNECTION) |
if (entries[indx].type == MonitorEntry::TYPE_CONNECTION) |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
"entries[indx].type for indx = %d is Monitor::CONNECTION", indx); |
"entries[%d].type is TYPE_CONNECTION", |
static_cast<HTTPConnection *>(q)->_entry_index = indx; |
indx)); |
|
|
// Do not update the entry just yet. The entry gets updated once |
HTTPConnection *dst = |
// the request has been read. |
reinterpret_cast<HTTPConnection *>(q); |
//entries[indx]._status = _MonitorEntry::BUSY; |
dst->_entry_index = indx; |
|
|
// If allocate_and_awaken failure, retry on next iteration |
// Update idle start time because we have received some |
/* Removed for PEP 183. |
// data. Any data is good data at this point, and we'll |
if (!MessageQueueService::get_thread_pool()->allocate_and_awaken( |
// keep the connection alive, even if we've exceeded |
(void *)q, _dispatch)) |
// the idleConnectionTimeout, which will be checked |
{ |
// when we call closeConnectionOnTimeout() next. |
Tracer::trace(TRC_DISCARDED_DATA, Tracer::LEVEL2, |
Time::gettimeofday(&dst->_idleStartTime); |
"Monitor::run: Insufficient resources to process request."); |
|
entries[indx]._status = _MonitorEntry::IDLE; |
// Check for accept pending (ie. SSL handshake pending) |
return true; |
// or idle connection timeouts for sockets from which |
} |
// we received data (avoiding extra queue lookup below). |
*/ |
if (!dst->closeConnectionOnTimeout(&timeNow)) |
// Added for PEP 183 |
{ |
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q); |
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
"Entering HTTPConnection::run() for " |
"Monitor::_dispatch: entering run() for indx = %d, queueId = %d, q = %p", |
"indx = %d, queueId = %d, q = %p", |
dst->_entry_index, dst->_monitor->_entries[dst->_entry_index].queueId, dst); |
indx, entries[indx].queueId, q)); |
|
|
try | try |
{ | { |
dst->run(1); | dst->run(1); |
} | } |
catch (...) | catch (...) |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL2, |
"Monitor::_dispatch: exception received"); |
"Caught exception from " |
|
"HTTPConnection::run()"); |
|
} |
|
PEG_TRACE_CSTRING(TRC_HTTP, Tracer::LEVEL4, |
|
"Exited HTTPConnection::run()"); |
} | } |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::_dispatch: exited run() for index %d", dst->_entry_index); |
|
| |
// It is possible the entry status may not be set to busy. |
|
// The following will fail in that case. |
} |
// PEGASUS_ASSERT(dst->_monitor->_entries[dst->_entry_index]._status.get() == _MonitorEntry::BUSY); |
else if (entries[indx].type == MonitorEntry::TYPE_INTERNAL) |
// Once the HTTPConnection thread has set the status value to either |
{ |
// Monitor::DYING or Monitor::IDLE, it has returned control of the connection |
char buffer; |
// to the Monitor. It is no longer permissible to access the connection |
Sint32 ignored = |
// or the entry in the _entries table. |
Socket::read(entries[indx].socket, &buffer, 1); |
|
|
// The following is not relevant as the worker thread or the |
|
// reader thread will update the status of the entry. |
|
//if (dst->_connectionClosePending) |
|
//{ |
|
// dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::DYING; |
|
//} |
|
//else |
|
//{ |
|
// dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::IDLE; |
|
//} |
|
// end Added for PEP 183 |
|
} |
|
else if( entries[indx]._type == Monitor::INTERNAL){ |
|
// set ourself to BUSY, |
|
// read the data |
|
// and set ourself back to IDLE |
|
|
|
entries[indx]._status = _MonitorEntry::BUSY; |
|
static char buffer[2]; |
|
Sint32 amt = Socket::read(entries[indx].socket,&buffer, 2); |
|
entries[indx]._status = _MonitorEntry::IDLE; |
|
} | } |
else | else |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
PEG_TRACE((TRC_HTTP, Tracer::LEVEL4, |
"Non-connection entry, indx = %d, has been received.", indx); |
"Non-connection entry, indx = %d, has been " |
|
"received.", |
|
indx)); |
int events = 0; | int events = 0; |
events |= SocketMessage::READ; | events |= SocketMessage::READ; |
Message *msg = new SocketMessage(entries[indx].socket, events); |
Message* msg = new SocketMessage( |
entries[indx]._status = _MonitorEntry::BUSY; |
entries[indx].socket, events); |
_entry_mut.unlock(); |
entries[indx].status = MonitorEntry::STATUS_BUSY; |
|
_entriesMutex.unlock(); |
q->enqueue(msg); | q->enqueue(msg); |
_entry_mut.lock(); |
_entriesMutex.lock(); |
// After enqueue a message and the autoEntryMutex has been released and locked again, |
|
// the array of entries can be changed. The ArrayIterator has be reset with the original _entries |
|
entries.reset(_entries); |
|
entries[indx]._status = _MonitorEntry::IDLE; |
|
| |
return true; |
// After enqueue a message and the autoEntryMutex has |
|
// been released and locked again, the array of |
|
// entries can be changed. The ArrayIterator has to be |
|
// reset with the latest _entries. |
|
entries.reset(_entries); |
|
entries[indx].status = MonitorEntry::STATUS_IDLE; |
} | } |
} | } |
catch(...) | catch(...) |
{ | { |
} | } |
handled_events = true; |
} |
|
// else check for accept pending (ie. SSL handshake pending) or |
|
// idle connection timeouts for sockets from which we did not |
|
// receive data. |
|
else if ((entries[indx].status == MonitorEntry::STATUS_IDLE) && |
|
entries[indx].type == MonitorEntry::TYPE_CONNECTION) |
|
|
|
{ |
|
MessageQueue* q = MessageQueue::lookup(entries[indx].queueId); |
|
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q); |
|
dst->_entry_index = indx; |
|
dst->closeConnectionOnTimeout(&timeNow); |
|
} |
|
} |
|
} |
|
// else if "events" is zero (ie. select timed out) then we still need |
|
// to check if there are any pending SSL handshakes that have timed out. |
|
else |
|
{ |
|
for (Uint32 indx = 0; indx < entries.size(); indx++) |
|
{ |
|
if ((entries[indx].status == MonitorEntry::STATUS_IDLE) && |
|
entries[indx].type == MonitorEntry::TYPE_CONNECTION) |
|
{ |
|
MessageQueue* q = MessageQueue::lookup(entries[indx].queueId); |
|
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q); |
|
dst->_entry_index = indx; |
|
dst->closeConnectionOnTimeout(&timeNow); |
} | } |
} | } |
} | } |
|
|
return(handled_events); |
|
} | } |
| |
void Monitor::stopListeningForConnections(Boolean wait) | void Monitor::stopListeningForConnections(Boolean wait) |
|
|
SocketHandle socket, | SocketHandle socket, |
Uint32 events, | Uint32 events, |
Uint32 queueId, | Uint32 queueId, |
int type) |
Uint32 type) |
{ | { |
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solicitSocketMessages"); | PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solicitSocketMessages"); |
AutoMutex autoMut(_entry_mut); |
AutoMutex autoMut(_entriesMutex); |
|
|
// Check to see if we need to dynamically grow the _entries array | // Check to see if we need to dynamically grow the _entries array |
// We always want the _entries array to 2 bigger than the |
// We always want the _entries array to be 2 bigger than the |
// current connections requested | // current connections requested |
_solicitSocketCount++; // bump the count | _solicitSocketCount++; // bump the count |
int size = (int)_entries.size(); |
|
if((int)_solicitSocketCount >= (size-1)){ |
for (Uint32 i = _entries.size(); i < _solicitSocketCount + 1; i++) |
for(int i = 0; i < ((int)_solicitSocketCount - (size-1)); i++){ |
{ |
_MonitorEntry entry(0, 0, 0); |
_entries.append(MonitorEntry()); |
_entries.append(entry); |
|
} |
|
} | } |
| |
int index; |
for (Uint32 index = 1; index < _entries.size(); index++) |
for(index = 1; index < (int)_entries.size(); index++) |
|
{ | { |
try | try |
{ | { |
if(_entries[index]._status.get() == _MonitorEntry::EMPTY) |
if (_entries[index].status == MonitorEntry::STATUS_EMPTY) |
{ | { |
_entries[index].socket = socket; | _entries[index].socket = socket; |
_entries[index].queueId = queueId; | _entries[index].queueId = queueId; |
_entries[index]._type = type; |
_entries[index].type = type; |
_entries[index]._status = _MonitorEntry::IDLE; |
_entries[index].status = MonitorEntry::STATUS_IDLE; |
| |
return index; |
return (int)index; |
} | } |
} | } |
catch(...) | catch(...) |
{ | { |
} | } |
} | } |
_solicitSocketCount--; // decrease the count, if we are here we didnt do anything meaningful |
// decrease the count, if we are here we didn't do anything meaningful |
|
_solicitSocketCount--; |
PEG_METHOD_EXIT(); | PEG_METHOD_EXIT(); |
return -1; | return -1; |
|
|
} | } |
| |
void Monitor::unsolicitSocketMessages(SocketHandle socket) | void Monitor::unsolicitSocketMessages(SocketHandle socket) |
{ | { |
|
|
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessages"); | PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessages"); |
AutoMutex autoMut(_entry_mut); |
AutoMutex autoMut(_entriesMutex); |
| |
/* | /* |
Start at index = 1 because _entries[0] is the tickle entry which never needs |
Start at index = 1 because _entries[0] is the tickle entry which |
to be EMPTY; |
never needs to be reset to EMPTY; |
*/ | */ |
unsigned int index; |
for (Uint32 index = 1; index < _entries.size(); index++) |
for(index = 1; index < _entries.size(); index++) |
|
{ | { |
if(_entries[index].socket == socket) | if(_entries[index].socket == socket) |
{ | { |
_entries[index]._status = _MonitorEntry::EMPTY; |
_entries[index].reset(); |
_entries[index].socket = PEGASUS_INVALID_SOCKET; |
|
_solicitSocketCount--; | _solicitSocketCount--; |
break; | break; |
} | } |
|
|
| |
/* | /* |
Dynamic Contraction: | Dynamic Contraction: |
To remove excess entries we will start from the end of the _entries array |
To remove excess entries we will start from the end of the _entries |
and remove all entries with EMPTY status until we find the first NON EMPTY. |
array and remove all entries with EMPTY status until we find the |
This prevents the positions, of the NON EMPTY entries, from being changed. |
first NON EMPTY. This prevents the positions, of the NON EMPTY |
|
entries, from being changed. |
*/ | */ |
index = _entries.size() - 1; |
for (Uint32 index = _entries.size() - 1; |
while(_entries[index]._status.get() == _MonitorEntry::EMPTY){ |
(_entries[index].status == MonitorEntry::STATUS_EMPTY) && |
if(_entries.size() > MAX_NUMBER_OF_MONITOR_ENTRIES) |
(index >= MAX_NUMBER_OF_MONITOR_ENTRIES); |
_entries.remove(index); |
index--) |
index--; |
|
} |
|
PEG_METHOD_EXIT(); |
|
} |
|
|
|
// Note: this is no longer called with PEP 183. |
|
ThreadReturnType PEGASUS_THREAD_CDECL Monitor::_dispatch(void *parm) |
|
{ |
|
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(parm); |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::_dispatch: entering run() for indx = %d, queueId = %d, q = %p", |
|
dst->_entry_index, dst->_monitor->_entries[dst->_entry_index].queueId, dst); |
|
try |
|
{ |
|
dst->run(1); |
|
} |
|
catch (...) |
|
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
_entries.remove(index); |
"Monitor::_dispatch: exception received"); |
|
} | } |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::_dispatch: exited run() for index %d", dst->_entry_index); |
|
|
|
PEGASUS_ASSERT(dst->_monitor->_entries[dst->_entry_index]._status.get() == _MonitorEntry::BUSY); |
|
| |
// Once the HTTPConnection thread has set the status value to either |
PEG_METHOD_EXIT(); |
// Monitor::DYING or Monitor::IDLE, it has returned control of the connection |
|
// to the Monitor. It is no longer permissible to access the connection |
|
// or the entry in the _entries table. |
|
if (dst->_connectionClosePending) |
|
{ |
|
dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::DYING; |
|
} |
|
else |
|
{ |
|
dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::IDLE; |
|
} |
|
return 0; |
|
} | } |
| |
PEGASUS_NAMESPACE_END | PEGASUS_NAMESPACE_END |