version 1.32.2.4, 2002/10/30 21:20:05
|
version 1.106, 2006/06/26 22:23:29
|
|
|
//%///////////////////////////////////////////////////////////////////////////// |
//%2006//////////////////////////////////////////////////////////////////////// |
// | // |
// Copyright (c) 2000, 2001, 2002 BMC Software, Hewlett-Packard Company, IBM, |
// Copyright (c) 2000, 2001, 2002 BMC Software; Hewlett-Packard Development |
// The Open Group, Tivoli Systems |
// Company, L.P.; IBM Corp.; The Open Group; Tivoli Systems. |
|
// Copyright (c) 2003 BMC Software; Hewlett-Packard Development Company, L.P.; |
|
// IBM Corp.; EMC Corporation, The Open Group. |
|
// Copyright (c) 2004 BMC Software; Hewlett-Packard Development Company, L.P.; |
|
// IBM Corp.; EMC Corporation; VERITAS Software Corporation; The Open Group. |
|
// Copyright (c) 2005 Hewlett-Packard Development Company, L.P.; IBM Corp.; |
|
// EMC Corporation; VERITAS Software Corporation; The Open Group. |
|
// Copyright (c) 2006 Hewlett-Packard Development Company, L.P.; IBM Corp.; |
|
// EMC Corporation; Symantec Corporation; The Open Group. |
// | // |
// Permission is hereby granted, free of charge, to any person obtaining a copy | // Permission is hereby granted, free of charge, to any person obtaining a copy |
// of this software and associated documentation files (the "Software"), to | // of this software and associated documentation files (the "Software"), to |
|
|
// | // |
// Author: Mike Brasher (mbrasher@bmc.com) | // Author: Mike Brasher (mbrasher@bmc.com) |
// | // |
// Modified By: |
// Modified By: Mike Day (monitor_2) mdday@us.ibm.com |
|
// Amit K Arora (Bug#1153) amita@in.ibm.com |
|
// Alagaraja Ramasubramanian (alags_raj@in.ibm.com) for Bug#1090 |
|
// Sushma Fernandes (sushma@hp.com) for Bug#2057 |
|
// Josephine Eskaline Joyce (jojustin@in.ibm.com) for PEP#101 |
|
// Roger Kumpf, Hewlett-Packard Company (roger_kumpf@hp.com) |
// | // |
//%///////////////////////////////////////////////////////////////////////////// | //%///////////////////////////////////////////////////////////////////////////// |
| |
|
#include <Pegasus/Common/Config.h> |
|
#include <cstring> |
#include "Monitor.h" | #include "Monitor.h" |
|
#include "MessageQueue.h" |
|
#include "Socket.h" |
|
#include <Pegasus/Common/Tracer.h> |
|
#include <Pegasus/Common/HTTPConnection.h> |
|
#include <Pegasus/Common/MessageQueueService.h> |
|
#include <Pegasus/Common/Exception.h> |
|
#include "ArrayIterator.h" |
| |
#ifdef PEGASUS_OS_TYPE_WINDOWS | #ifdef PEGASUS_OS_TYPE_WINDOWS |
# if defined(FD_SETSIZE) && FD_SETSIZE != 1024 | # if defined(FD_SETSIZE) && FD_SETSIZE != 1024 |
# error "FD_SETSIZE was not set to 1024 prior to the last inclusion \ | # error "FD_SETSIZE was not set to 1024 prior to the last inclusion \ |
of <winsock.h>. It may have been indirectly included (e.g., by including \ | of <winsock.h>. It may have been indirectly included (e.g., by including \ |
<windows.h>). Finthe inclusion of that header which is visible to this \ |
<windows.h>). Find inclusion of that header which is visible to this \ |
compilation unit and #define FD_SETZIE to 1024 prior to that inclusion; \ | compilation unit and #define FD_SETZIE to 1024 prior to that inclusion; \ |
otherwise, less than 64 clients (the default) will be able to connect to the \ | otherwise, less than 64 clients (the default) will be able to connect to the \ |
CIMOM. PLEASE DO NOT SUPPRESS THIS WARNING; PLEASE FIX THE PROBLEM." | CIMOM. PLEASE DO NOT SUPPRESS THIS WARNING; PLEASE FIX THE PROBLEM." |
|
|
# include <netinet/in.h> | # include <netinet/in.h> |
# include <netdb.h> | # include <netdb.h> |
# include <arpa/inet.h> | # include <arpa/inet.h> |
# include <unistd.h> |
# include <netinet/tcp.h> |
#endif | #endif |
| |
PEGASUS_USING_STD; | PEGASUS_USING_STD; |
| |
PEGASUS_NAMESPACE_BEGIN | PEGASUS_NAMESPACE_BEGIN |
| |
|
static AtomicInt _connections(0); |
static AtomicInt _connections = 0; |
|
|
|
|
|
static struct timeval create_time = {0, 1}; |
|
static struct timeval destroy_time = {15, 0}; |
|
static struct timeval deadlock_time = {0, 0}; |
|
| |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
// | // |
// MonitorRep |
// _getError() |
// | // |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
| |
struct MonitorRep |
static inline int _getError() |
{ | { |
fd_set rd_fd_set; |
#ifdef PEGASUS_OS_TYPE_WINDOWS |
fd_set wr_fd_set; |
return WSAGetLastError() |
fd_set ex_fd_set; |
#else |
fd_set active_rd_fd_set; |
return errno; |
fd_set active_wr_fd_set; |
#endif |
fd_set active_ex_fd_set; |
} |
}; |
|
| |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
// | // |
|
|
// | // |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
| |
|
#define MAX_NUMBER_OF_MONITOR_ENTRIES 32 |
Monitor::Monitor() | Monitor::Monitor() |
: _async(false) |
: _stopConnections(0), |
|
_stopConnectionsSem(0), |
|
_solicitSocketCount(0), |
|
_tickle_client_socket(-1), |
|
_tickle_server_socket(-1), |
|
_tickle_peer_socket(-1) |
{ | { |
|
int numberOfMonitorEntriesToAllocate = MAX_NUMBER_OF_MONITOR_ENTRIES; |
Socket::initializeInterface(); | Socket::initializeInterface(); |
_rep = 0; |
_entries.reserveCapacity(numberOfMonitorEntriesToAllocate); |
_entries.reserveCapacity(32); |
|
int i = 0; |
// setup the tickler |
for( ; i < 32; i++ ) |
initializeTickler(); |
|
|
|
// Start the count at 1 because initilizeTickler() |
|
// has added an entry in the first position of the |
|
// _entries array |
|
for( int i = 1; i < numberOfMonitorEntriesToAllocate; i++ ) |
{ | { |
_MonitorEntry entry(0, 0, 0); | _MonitorEntry entry(0, 0, 0); |
_entries.append(entry); | _entries.append(entry); |
} | } |
} | } |
| |
Monitor::Monitor(Boolean async) |
Monitor::~Monitor() |
: _async(async) |
|
{ | { |
Socket::initializeInterface(); |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "uninitializing interface"); |
_rep = 0; |
|
_entries.reserveCapacity(32); |
try{ |
int i = 0; |
if(_tickle_peer_socket >= 0) |
for( ; i < 32; i++ ) |
|
{ | { |
_MonitorEntry entry(0, 0, 0); |
Socket::close(_tickle_peer_socket); |
_entries.append(entry); |
|
} | } |
|
if(_tickle_client_socket >= 0) |
if( _async == true ) |
|
|
|
{ | { |
_thread_pool = new ThreadPool(0, |
Socket::close(_tickle_client_socket); |
"Monitor", |
|
1, |
|
0, |
|
create_time, |
|
destroy_time, |
|
deadlock_time); |
|
} | } |
else |
if(_tickle_server_socket >= 0) |
_thread_pool = 0; |
{ |
|
Socket::close(_tickle_server_socket); |
} | } |
|
} |
Monitor::~Monitor() |
catch(...) |
{ | { |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, | Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
"deregistering with module controller"); |
"Failed to close tickle sockets"); |
|
} |
|
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "deleting rep"); |
|
| |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "uninitializing interface"); |
|
Socket::uninitializeInterface(); | Socket::uninitializeInterface(); |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, | Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
"returning from monitor destructor"); | "returning from monitor destructor"); |
if(_async == true) |
|
delete _thread_pool; |
|
} | } |
| |
|
void Monitor::initializeTickler(){ |
|
/* |
|
NOTE: On any errors trying to |
|
setup out tickle connection, |
|
throw an exception/end the server |
|
*/ |
|
|
|
/* setup the tickle server/listener */ |
|
|
|
// get a socket for the server side |
|
if((_tickle_server_socket = ::socket(PF_INET, SOCK_STREAM, 0)) == PEGASUS_INVALID_SOCKET){ |
|
//handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_CREATE", |
|
"Received error number $0 while creating the internal socket.", |
|
_getError()); |
|
throw Exception(parms); |
|
} |
|
|
|
// set TCP_NODELAY |
|
int opt = 1; |
|
setsockopt(_tickle_server_socket, IPPROTO_TCP, TCP_NODELAY, (char*)&opt, sizeof(opt)); |
|
|
|
// initialize the address |
|
memset(&_tickle_server_addr, 0, sizeof(_tickle_server_addr)); |
|
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
|
#pragma convert(37) |
|
#endif |
|
_tickle_server_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); |
|
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
|
#pragma convert(0) |
|
#endif |
|
_tickle_server_addr.sin_family = PF_INET; |
|
_tickle_server_addr.sin_port = 0; |
| |
int Monitor::kill_idle_threads() |
socklen_t _addr_size = sizeof(_tickle_server_addr); |
{ |
|
static struct timeval now, last; |
|
gettimeofday(&now, NULL); |
|
int dead_threads = 0; |
|
| |
if( now.tv_sec - last.tv_sec > 300 ) |
// bind server side to socket |
{ |
if((::bind(_tickle_server_socket, |
PEGASUS_STD(cout) << "Monitor Thread Pool currently has " << |
reinterpret_cast<struct sockaddr*>(&_tickle_server_addr), |
_thread_pool->running_count() + |
sizeof(_tickle_server_addr))) < 0){ |
_thread_pool->pool_count() << " Threads." << PEGASUS_STD(endl); |
// handle error |
gettimeofday(&last, NULL); |
#ifdef PEGASUS_OS_ZOS |
try |
MessageLoaderParms parms("Common.Monitor.TICKLE_BIND_LONG", |
{ |
"Received error:$0 while binding the internal socket.",strerror(errno)); |
dead_threads = _thread_pool->kill_dead_threads(); |
#else |
} |
MessageLoaderParms parms("Common.Monitor.TICKLE_BIND", |
catch(IPCException& ) |
"Received error number $0 while binding the internal socket.", |
{ |
_getError()); |
|
#endif |
|
throw Exception(parms); |
} | } |
| |
|
// tell the kernel we are a server |
|
if((::listen(_tickle_server_socket,3)) < 0){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_LISTEN", |
|
"Received error number $0 while listening to the internal socket.", |
|
_getError()); |
|
throw Exception(parms); |
|
} |
|
|
|
// make sure we have the correct socket for our server |
|
int sock = ::getsockname(_tickle_server_socket, |
|
reinterpret_cast<struct sockaddr*>(&_tickle_server_addr), |
|
&_addr_size); |
|
if(sock < 0){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_SOCKNAME", |
|
"Received error number $0 while getting the internal socket name.", |
|
_getError()); |
|
throw Exception(parms); |
|
} |
|
|
|
/* set up the tickle client/connector */ |
|
|
|
// get a socket for our tickle client |
|
if((_tickle_client_socket = ::socket(PF_INET, SOCK_STREAM, 0)) == PEGASUS_INVALID_SOCKET){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_CLIENT_CREATE", |
|
"Received error number $0 while creating the internal client socket.", |
|
_getError()); |
|
throw Exception(parms); |
|
} |
|
|
|
// set TCP_NODELAY |
|
setsockopt(_tickle_client_socket, IPPROTO_TCP, TCP_NODELAY, (char*)&opt, sizeof(opt)); |
|
|
|
// setup the address of the client |
|
memset(&_tickle_client_addr, 0, sizeof(_tickle_client_addr)); |
|
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
|
#pragma convert(37) |
|
#endif |
|
_tickle_client_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); |
|
#ifdef PEGASUS_PLATFORM_OS400_ISERIES_IBM |
|
#pragma convert(0) |
|
#endif |
|
_tickle_client_addr.sin_family = PF_INET; |
|
_tickle_client_addr.sin_port = 0; |
|
|
|
// bind socket to client side |
|
if((::bind(_tickle_client_socket, |
|
reinterpret_cast<struct sockaddr*>(&_tickle_client_addr), |
|
sizeof(_tickle_client_addr))) < 0){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_CLIENT_BIND", |
|
"Received error number $0 while binding the internal client socket.", |
|
_getError()); |
|
throw Exception(parms); |
|
} |
|
|
|
// connect to server side |
|
if((::connect(_tickle_client_socket, |
|
reinterpret_cast<struct sockaddr*>(&_tickle_server_addr), |
|
sizeof(_tickle_server_addr))) < 0){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_CLIENT_CONNECT", |
|
"Received error number $0 while connecting the internal client socket.", |
|
_getError()); |
|
throw Exception(parms); |
|
} |
|
|
|
/* set up the slave connection */ |
|
memset(&_tickle_peer_addr, 0, sizeof(_tickle_peer_addr)); |
|
socklen_t peer_size = sizeof(_tickle_peer_addr); |
|
pegasus_sleep(1); |
|
|
|
// this call may fail, we will try a max of 20 times to establish this peer connection |
|
if((_tickle_peer_socket = ::accept(_tickle_server_socket, |
|
reinterpret_cast<struct sockaddr*>(&_tickle_peer_addr), |
|
&peer_size)) < 0){ |
|
#if !defined(PEGASUS_OS_TYPE_WINDOWS) |
|
// Only retry on non-windows platforms. |
|
if(_tickle_peer_socket == -1 && errno == EAGAIN) |
|
{ |
|
int retries = 0; |
|
do |
|
{ |
|
pegasus_sleep(1); |
|
_tickle_peer_socket = ::accept(_tickle_server_socket, |
|
reinterpret_cast<struct sockaddr*>(&_tickle_peer_addr), |
|
&peer_size); |
|
retries++; |
|
} while(_tickle_peer_socket == -1 && errno == EAGAIN && retries < 20); |
|
} |
|
#endif |
|
} |
|
if(_tickle_peer_socket == -1){ |
|
// handle error |
|
MessageLoaderParms parms("Common.Monitor.TICKLE_ACCEPT", |
|
"Received error number $0 while accepting the internal socket connection.", |
|
_getError()); |
|
throw Exception(parms); |
|
} |
|
// add the tickler to the list of entries to be monitored and set to IDLE because Monitor only |
|
// checks entries with IDLE state for events |
|
_MonitorEntry entry(_tickle_peer_socket, 1, INTERNAL); |
|
entry._status = _MonitorEntry::IDLE; |
|
_entries.append(entry); |
} | } |
return dead_threads; |
|
|
void Monitor::tickle(void) |
|
{ |
|
static char _buffer[] = |
|
{ |
|
'0','0' |
|
}; |
|
|
|
AutoMutex autoMutex(_tickle_mutex); |
|
Socket::disableBlocking(_tickle_client_socket); |
|
Socket::write(_tickle_client_socket,&_buffer, 2); |
|
Socket::enableBlocking(_tickle_client_socket); |
} | } |
| |
|
void Monitor::setState( Uint32 index, _MonitorEntry::entry_status status ) |
|
{ |
|
// Set the state to requested state |
|
_entries[index]._status = status; |
|
} |
| |
Boolean Monitor::run(Uint32 milliseconds) | Boolean Monitor::run(Uint32 milliseconds) |
{ | { |
|
|
Boolean handled_events = false; | Boolean handled_events = false; |
int i = 0; | int i = 0; |
| |
struct timeval tv = {0,1}; |
struct timeval tv = {milliseconds/1000, milliseconds%1000*1000}; |
|
|
fd_set fdread; | fd_set fdread; |
FD_ZERO(&fdread); | FD_ZERO(&fdread); |
_entry_mut.lock(pegasus_thread_self()); |
|
| |
for( int indx = 0; indx < (int)_entries.size(); indx++) |
AutoMutex autoEntryMutex(_entry_mut); |
|
|
|
ArrayIterator<_MonitorEntry> entries(_entries); |
|
|
|
// Check the stopConnections flag. If set, clear the Acceptor monitor entries |
|
if (_stopConnections.get() == 1) |
|
{ |
|
for ( int indx = 0; indx < (int)entries.size(); indx++) |
|
{ |
|
if (entries[indx]._type == Monitor::ACCEPTOR) |
|
{ |
|
if ( entries[indx]._status.get() != _MonitorEntry::EMPTY) |
|
{ |
|
if ( entries[indx]._status.get() == _MonitorEntry::IDLE || |
|
entries[indx]._status.get() == _MonitorEntry::DYING ) |
|
{ |
|
// remove the entry |
|
entries[indx]._status = _MonitorEntry::EMPTY; |
|
} |
|
else |
|
{ |
|
// set status to DYING |
|
entries[indx]._status = _MonitorEntry::DYING; |
|
} |
|
} |
|
} |
|
} |
|
_stopConnections = 0; |
|
_stopConnectionsSem.signal(); |
|
} |
|
|
|
for( int indx = 0; indx < (int)entries.size(); indx++) |
|
{ |
|
const _MonitorEntry &entry = entries[indx]; |
|
if ((entry._status.get() == _MonitorEntry::DYING) && |
|
(entry._type == Monitor::CONNECTION)) |
|
{ |
|
MessageQueue *q = MessageQueue::lookup(entry.queueId); |
|
PEGASUS_ASSERT(q != 0); |
|
HTTPConnection &h = *static_cast<HTTPConnection *>(q); |
|
|
|
if (h._connectionClosePending == false) |
|
continue; |
|
|
|
// NOTE: do not attempt to delete while there are pending responses |
|
// coming thru. The last response to come thru after a |
|
// _connectionClosePending will reset _responsePending to false |
|
// and then cause the monitor to rerun this code and clean up. |
|
// (see HTTPConnection.cpp) |
|
|
|
if (h._responsePending == true) |
|
{ |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, "Monitor::run - " |
|
"Ignoring connection delete request because " |
|
"responses are still pending. " |
|
"connection=0x%p, socket=%d\n", |
|
(void *)&h, h.getSocket()); |
|
continue; |
|
} |
|
h._connectionClosePending = false; |
|
MessageQueue &o = h.get_owner(); |
|
Message* message= new CloseConnectionMessage(entry.socket); |
|
message->dest = o.getQueueId(); |
|
|
|
// HTTPAcceptor is responsible for closing the connection. |
|
// The lock is released to allow HTTPAcceptor to call |
|
// unsolicitSocketMessages to free the entry. |
|
// Once HTTPAcceptor completes processing of the close |
|
// connection, the lock is re-requested and processing of |
|
// the for loop continues. This is safe with the current |
|
// implementation of the entries object. Note that the |
|
// loop condition accesses the entries.size() on each |
|
// iteration, so that a change in size while the mutex is |
|
// unlocked will not result in an ArrayIndexOutOfBounds |
|
// exception. |
|
|
|
autoEntryMutex.unlock(); |
|
o.enqueue(message); |
|
autoEntryMutex.lock(); |
|
// After enqueue a message and the autoEntryMutex has been released and locked again, |
|
// the array of _entries can be changed. The ArrayIterator has be reset with the original _entries. |
|
entries.reset(_entries); |
|
} |
|
} |
|
|
|
Uint32 _idleEntries = 0; |
|
|
|
/* |
|
We will keep track of the maximum socket number and pass this value |
|
to the kernel as a parameter to SELECT. This loop seems like a good |
|
place to calculate the max file descriptor (maximum socket number) |
|
because we have to traverse the entire array. |
|
*/ |
|
SocketHandle maxSocketCurrentPass = 0; |
|
for( int indx = 0; indx < (int)entries.size(); indx++) |
{ | { |
if(_entries[indx]._status.value() == _MonitorEntry::IDLE) |
if(maxSocketCurrentPass < entries[indx].socket) |
|
maxSocketCurrentPass = entries[indx].socket; |
|
|
|
if(entries[indx]._status.get() == _MonitorEntry::IDLE) |
{ | { |
FD_SET(_entries[indx].socket, &fdread); |
_idleEntries++; |
|
FD_SET(entries[indx].socket, &fdread); |
} | } |
} | } |
| |
|
/* |
|
Add 1 then assign maxSocket accordingly. We add 1 to account for |
|
descriptors starting at 0. |
|
*/ |
|
maxSocketCurrentPass++; |
| |
int events = select(FD_SETSIZE, &fdread, NULL, NULL, &tv); |
autoEntryMutex.unlock(); |
| |
|
// |
|
// The first argument to select() is ignored on Windows and it is not |
|
// a socket value. The original code assumed that the number of sockets |
|
// and a socket value have the same type. On Windows they do not. |
|
// |
#ifdef PEGASUS_OS_TYPE_WINDOWS | #ifdef PEGASUS_OS_TYPE_WINDOWS |
if(events && events != SOCKET_ERROR ) |
int events = select(0, &fdread, NULL, NULL, &tv); |
#else | #else |
if(events && events != -1 ) |
int events = select(maxSocketCurrentPass, &fdread, NULL, NULL, &tv); |
#endif | #endif |
|
autoEntryMutex.lock(); |
|
// After enqueue a message and the autoEntryMutex has been released and locked again, |
|
// the array of _entries can be changed. The ArrayIterator has be reset with the original _entries |
|
entries.reset(_entries); |
|
|
|
if (events == PEGASUS_SOCKET_ERROR) |
{ | { |
for( int indx = 0; indx < (int)_entries.size(); indx++) |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
{ |
"Monitor::run - errorno = %d has occurred on select.", errno); |
if(FD_ISSET(_entries[indx].socket, &fdread)) |
// The EBADF error indicates that one or more or the file |
|
// descriptions was not valid. This could indicate that |
|
// the entries structure has been corrupted or that |
|
// we have a synchronization error. |
|
|
|
PEGASUS_ASSERT(errno != EBADF); |
|
} |
|
else if (events) |
{ | { |
MessageQueue *q = MessageQueue::lookup(_entries[indx].queueId); |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
if(q == 0) |
"Monitor::run select event received events = %d, monitoring %d idle entries", |
|
events, _idleEntries); |
|
for( int indx = 0; indx < (int)entries.size(); indx++) |
|
{ |
|
// The Monitor should only look at entries in the table that are IDLE (i.e., |
|
// owned by the Monitor). |
|
if((entries[indx]._status.get() == _MonitorEntry::IDLE) && |
|
(FD_ISSET(entries[indx].socket, &fdread))) |
{ | { |
PEGASUS_STD(cout) << "Monitor:: found an empty connection slot" << PEGASUS_STD(endl); |
MessageQueue *q = MessageQueue::lookup(entries[indx].queueId); |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::run indx = %d, queueId = %d, q = %p", |
|
indx, entries[indx].queueId, q); |
|
PEGASUS_ASSERT(q !=0); |
|
|
try | try |
{ | { |
_entries[indx]._status = _MonitorEntry::EMPTY; |
if(entries[indx]._type == Monitor::CONNECTION) |
} |
|
catch(...) |
|
{ | { |
} |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
_entry_mut.unlock(); |
"entries[indx].type for indx = %d is Monitor::CONNECTION", indx); |
|
static_cast<HTTPConnection *>(q)->_entry_index = indx; |
|
|
|
// Do not update the entry just yet. The entry gets updated once |
|
// the request has been read. |
|
//entries[indx]._status = _MonitorEntry::BUSY; |
|
|
|
// If allocate_and_awaken failure, retry on next iteration |
|
/* Removed for PEP 183. |
|
if (!MessageQueueService::get_thread_pool()->allocate_and_awaken( |
|
(void *)q, _dispatch)) |
|
{ |
|
Tracer::trace(TRC_DISCARDED_DATA, Tracer::LEVEL2, |
|
"Monitor::run: Insufficient resources to process request."); |
|
entries[indx]._status = _MonitorEntry::IDLE; |
return true; | return true; |
} | } |
|
*/ |
|
// Added for PEP 183 |
|
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(q); |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::_dispatch: entering run() for indx = %d, queueId = %d, q = %p", |
|
dst->_entry_index, dst->_monitor->_entries[dst->_entry_index].queueId, dst); |
try | try |
{ | { |
if(_entries[indx]._type == Monitor::CONNECTION) |
dst->run(1); |
{ |
} |
static_cast<HTTPConnection *>(q)->_entry_index = indx; |
catch (...) |
if(static_cast<HTTPConnection *>(q)->_dying.value() > 0 ) |
|
{ | { |
_entries[indx]._status = _MonitorEntry::DYING; |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
MessageQueue & o = static_cast<HTTPConnection *>(q)->get_owner(); |
"Monitor::_dispatch: exception received"); |
Message* message= new CloseConnectionMessage(_entries[indx].socket); |
|
message->dest = o.getQueueId(); |
|
_entry_mut.unlock(); |
|
o.enqueue(message); |
|
return true; |
|
} | } |
_entries[indx]._status = _MonitorEntry::BUSY; |
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
_thread_pool->allocate_and_awaken((void *)q, _dispatch); |
"Monitor::_dispatch: exited run() for index %d", dst->_entry_index); |
|
|
|
// It is possible the entry status may not be set to busy. |
|
// The following will fail in that case. |
|
// PEGASUS_ASSERT(dst->_monitor->_entries[dst->_entry_index]._status.get() == _MonitorEntry::BUSY); |
|
// Once the HTTPConnection thread has set the status value to either |
|
// Monitor::DYING or Monitor::IDLE, it has returned control of the connection |
|
// to the Monitor. It is no longer permissible to access the connection |
|
// or the entry in the _entries table. |
|
|
|
// The following is not relevant as the worker thread or the |
|
// reader thread will update the status of the entry. |
|
//if (dst->_connectionClosePending) |
|
//{ |
|
// dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::DYING; |
|
//} |
|
//else |
|
//{ |
|
// dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::IDLE; |
|
//} |
|
// end Added for PEP 183 |
|
} |
|
else if( entries[indx]._type == Monitor::INTERNAL){ |
|
// set ourself to BUSY, |
|
// read the data |
|
// and set ourself back to IDLE |
|
|
|
entries[indx]._status = _MonitorEntry::BUSY; |
|
static char buffer[2]; |
|
Socket::disableBlocking(entries[indx].socket); |
|
Sint32 amt = Socket::read(entries[indx].socket,&buffer, 2); |
|
Socket::enableBlocking(entries[indx].socket); |
|
entries[indx]._status = _MonitorEntry::IDLE; |
} | } |
else | else |
{ | { |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Non-connection entry, indx = %d, has been received.", indx); |
int events = 0; | int events = 0; |
events |= SocketMessage::READ; | events |= SocketMessage::READ; |
Message *msg = new SocketMessage(_entries[indx].socket, events); |
Message *msg = new SocketMessage(entries[indx].socket, events); |
_entries[indx]._status = _MonitorEntry::BUSY; |
entries[indx]._status = _MonitorEntry::BUSY; |
_entry_mut.unlock(); |
autoEntryMutex.unlock(); |
q->enqueue(msg); | q->enqueue(msg); |
_entries[indx]._status = _MonitorEntry::IDLE; |
autoEntryMutex.lock(); |
|
// After enqueue a message and the autoEntryMutex has been released and locked again, |
|
// the array of entries can be changed. The ArrayIterator has be reset with the original _entries |
|
entries.reset(_entries); |
|
entries[indx]._status = _MonitorEntry::IDLE; |
|
|
return true; | return true; |
} | } |
} | } |
|
|
} | } |
} | } |
} | } |
_entry_mut.unlock(); |
|
return(handled_events); | return(handled_events); |
} | } |
| |
|
void Monitor::stopListeningForConnections(Boolean wait) |
|
{ |
|
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::stopListeningForConnections()"); |
|
// set boolean then tickle the server to recognize _stopConnections |
|
_stopConnections = 1; |
|
tickle(); |
|
|
|
if (wait) |
|
{ |
|
// Wait for the monitor to notice _stopConnections. Otherwise the |
|
// caller of this function may unbind the ports while the monitor |
|
// is still accepting connections on them. |
|
_stopConnectionsSem.wait(); |
|
} |
|
|
|
PEG_METHOD_EXIT(); |
|
} |
|
|
| |
int Monitor::solicitSocketMessages( | int Monitor::solicitSocketMessages( |
Sint32 socket, |
SocketHandle socket, |
Uint32 events, | Uint32 events, |
Uint32 queueId, | Uint32 queueId, |
int type) | int type) |
{ | { |
|
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solicitSocketMessages"); |
|
AutoMutex autoMut(_entry_mut); |
|
// Check to see if we need to dynamically grow the _entries array |
|
// We always want the _entries array to 2 bigger than the |
|
// current connections requested |
|
_solicitSocketCount++; // bump the count |
|
int size = (int)_entries.size(); |
|
if((int)_solicitSocketCount >= (size-1)){ |
|
for(int i = 0; i < ((int)_solicitSocketCount - (size-1)); i++){ |
|
_MonitorEntry entry(0, 0, 0); |
|
_entries.append(entry); |
|
} |
|
} |
| |
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::solictSocketMessage"); |
int index; |
|
for(index = 1; index < (int)_entries.size(); index++) |
int index = -1; |
|
_entry_mut.lock(pegasus_thread_self()); |
|
|
|
for(index = 0; index < (int)_entries.size(); index++) |
|
{ | { |
try | try |
{ | { |
if(_entries[index]._status.value() == _MonitorEntry::EMPTY) |
if(_entries[index]._status.get() == _MonitorEntry::EMPTY) |
{ | { |
_entries[index].socket = socket; | _entries[index].socket = socket; |
_entries[index].queueId = queueId; | _entries[index].queueId = queueId; |
_entries[index]._type = type; | _entries[index]._type = type; |
_entries[index]._status = _MonitorEntry::IDLE; | _entries[index]._status = _MonitorEntry::IDLE; |
_entry_mut.unlock(); |
|
| |
return index; | return index; |
} | } |
|
|
catch(...) | catch(...) |
{ | { |
} | } |
|
|
} | } |
_entry_mut.unlock(); |
_solicitSocketCount--; // decrease the count, if we are here we didnt do anything meaningful |
PEG_METHOD_EXIT(); | PEG_METHOD_EXIT(); |
return index; |
return -1; |
|
|
} | } |
| |
void Monitor::unsolicitSocketMessages(Sint32 socket) |
void Monitor::unsolicitSocketMessages(SocketHandle socket) |
{ | { |
|
|
PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessages"); | PEG_METHOD_ENTER(TRC_HTTP, "Monitor::unsolicitSocketMessages"); |
_entry_mut.lock(pegasus_thread_self()); |
AutoMutex autoMut(_entry_mut); |
| |
for(int index = 0; index < (int)_entries.size(); index++) |
/* |
|
Start at index = 1 because _entries[0] is the tickle entry which never needs |
|
to be EMPTY; |
|
*/ |
|
unsigned int index; |
|
for(index = 1; index < _entries.size(); index++) |
{ | { |
if(_entries[index].socket == socket) | if(_entries[index].socket == socket) |
{ | { |
_entries[index]._status = _MonitorEntry::EMPTY; | _entries[index]._status = _MonitorEntry::EMPTY; |
|
_entries[index].socket = PEGASUS_INVALID_SOCKET; |
|
_solicitSocketCount--; |
break; | break; |
} | } |
} | } |
| |
_entry_mut.unlock(); |
/* |
|
Dynamic Contraction: |
|
To remove excess entries we will start from the end of the _entries array |
|
and remove all entries with EMPTY status until we find the first NON EMPTY. |
|
This prevents the positions, of the NON EMPTY entries, from being changed. |
|
*/ |
|
index = _entries.size() - 1; |
|
while(_entries[index]._status.get() == _MonitorEntry::EMPTY){ |
|
if(_entries.size() > MAX_NUMBER_OF_MONITOR_ENTRIES) |
|
_entries.remove(index); |
|
index--; |
|
} |
PEG_METHOD_EXIT(); | PEG_METHOD_EXIT(); |
if( _async == true ) |
|
PEGASUS_STD(cout) << "Monitor:: running " << _thread_pool->running_count() << |
|
" idle " << _thread_pool->pool_count() << PEGASUS_STD(endl); |
|
|
|
} | } |
| |
|
// Note: this is no longer called with PEP 183. |
PEGASUS_THREAD_RETURN PEGASUS_THREAD_CDECL Monitor::_dispatch(void *parm) | PEGASUS_THREAD_RETURN PEGASUS_THREAD_CDECL Monitor::_dispatch(void *parm) |
{ | { |
HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(parm); | HTTPConnection *dst = reinterpret_cast<HTTPConnection *>(parm); |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::_dispatch: entering run() for indx = %d, queueId = %d, q = %p", |
|
dst->_entry_index, dst->_monitor->_entries[dst->_entry_index].queueId, dst); |
|
try |
|
{ |
dst->run(1); | dst->run(1); |
if( dst->_monitor->_entries.size() > (Uint32)dst->_entry_index ) |
} |
dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::IDLE; |
catch (...) |
|
{ |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::_dispatch: exception received"); |
|
} |
|
Tracer::trace(TRC_HTTP, Tracer::LEVEL4, |
|
"Monitor::_dispatch: exited run() for index %d", dst->_entry_index); |
|
|
|
PEGASUS_ASSERT(dst->_monitor->_entries[dst->_entry_index]._status.get() == _MonitorEntry::BUSY); |
| |
|
// Once the HTTPConnection thread has set the status value to either |
|
// Monitor::DYING or Monitor::IDLE, it has returned control of the connection |
|
// to the Monitor. It is no longer permissible to access the connection |
|
// or the entry in the _entries table. |
|
if (dst->_connectionClosePending) |
|
{ |
|
dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::DYING; |
|
} |
|
else |
|
{ |
|
dst->_monitor->_entries[dst->_entry_index]._status = _MonitorEntry::IDLE; |
|
} |
return 0; | return 0; |
} | } |
| |
|
|
PEGASUS_NAMESPACE_END | PEGASUS_NAMESPACE_END |