nginx/src/event/ngx_event_busy_lock.c

286 lines
5.8 KiB
C
Raw Normal View History

2004-03-03 05:14:37 +08:00
/*
* Copyright (C) Igor Sysoev
*/
2004-03-03 05:14:37 +08:00
#include <ngx_config.h>
#include <ngx_core.h>
#include <ngx_event.h>
static int ngx_event_busy_lock_look_cachable(ngx_event_busy_lock_t *bl,
ngx_event_busy_lock_ctx_t *ctx);
2004-03-03 05:14:37 +08:00
static void ngx_event_busy_lock_handler(ngx_event_t *ev);
static void ngx_event_busy_lock_posted_handler(ngx_event_t *ev);
/*
* NGX_OK: the busy lock is held
* NGX_AGAIN: the all busy locks are held but we will wait the specified time
2004-03-30 01:43:58 +08:00
* NGX_BUSY: ctx->timer == 0: there are many the busy locks
* ctx->timer != 0: there are many the waiting locks
* NGX_ERROR: an error occured while the mutex locking
2004-03-03 05:14:37 +08:00
*/
ngx_int_t
ngx_event_busy_lock(ngx_event_busy_lock_t *bl, ngx_event_busy_lock_ctx_t *ctx)
2004-03-03 05:14:37 +08:00
{
ngx_int_t rc;
ngx_mutex_lock(bl->mutex);
2004-03-03 05:14:37 +08:00
ngx_log_debug2(NGX_LOG_DEBUG_EVENT, ctx->event->log, 0,
"event busy lock: b:%d mb:%d",
bl->busy, bl->max_busy);
if (bl->busy < bl->max_busy) {
bl->busy++;
rc = NGX_OK;
} else if (ctx->timer && bl->waiting < bl->max_waiting) {
bl->waiting++;
ngx_add_timer(ctx->event, ctx->timer);
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
ctx->event->handler = ngx_event_busy_lock_handler;
2004-03-03 05:14:37 +08:00
2004-06-11 02:36:57 +08:00
if (bl->events) {
2004-03-03 05:14:37 +08:00
bl->last->next = ctx;
2004-06-11 02:36:57 +08:00
} else {
bl->events = ctx;
2004-03-03 05:14:37 +08:00
}
2004-06-11 02:36:57 +08:00
2004-03-03 05:14:37 +08:00
bl->last = ctx;
rc = NGX_AGAIN;
} else {
rc = NGX_BUSY;
}
ngx_mutex_unlock(bl->mutex);
return rc;
}
ngx_int_t
ngx_event_busy_lock_cachable(ngx_event_busy_lock_t *bl,
ngx_event_busy_lock_ctx_t *ctx)
2004-03-03 05:14:37 +08:00
{
ngx_int_t rc;
ngx_mutex_lock(bl->mutex);
2004-03-03 05:14:37 +08:00
rc = ngx_event_busy_lock_look_cachable(bl, ctx);
ngx_log_debug3(NGX_LOG_DEBUG_EVENT, ctx->event->log, 0,
"event busy lock: %d w:%d mw:%d",
rc, bl->waiting, bl->max_waiting);
/*
* NGX_OK: no the same request, there is free slot and we locked it
* NGX_BUSY: no the same request and there is no free slot
* NGX_AGAIN: the same request is processing
*/
if (rc == NGX_AGAIN) {
if (ctx->timer && bl->waiting < bl->max_waiting) {
bl->waiting++;
ngx_add_timer(ctx->event, ctx->timer);
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
ctx->event->handler = ngx_event_busy_lock_handler;
2004-03-03 05:14:37 +08:00
if (bl->events == NULL) {
bl->events = ctx;
} else {
bl->last->next = ctx;
}
bl->last = ctx;
} else {
rc = NGX_BUSY;
}
}
ngx_mutex_unlock(bl->mutex);
return rc;
}
void
ngx_event_busy_unlock(ngx_event_busy_lock_t *bl,
ngx_event_busy_lock_ctx_t *ctx)
2004-03-03 05:14:37 +08:00
{
ngx_event_t *ev;
ngx_event_busy_lock_ctx_t *wakeup;
ngx_mutex_lock(bl->mutex);
2004-03-03 05:14:37 +08:00
if (bl->events) {
wakeup = bl->events;
bl->events = bl->events->next;
} else {
wakeup = NULL;
bl->busy--;
}
/*
2004-03-04 00:14:15 +08:00
* MP: all ctx's and their queue must be in shared memory,
* each ctx has pid to wake up
2004-03-03 05:14:37 +08:00
*/
if (wakeup == NULL) {
ngx_mutex_unlock(bl->mutex);
return;
2004-03-03 05:14:37 +08:00
}
if (ctx->md5) {
for (wakeup = bl->events; wakeup; wakeup = wakeup->next) {
2004-03-04 00:14:15 +08:00
if (wakeup->md5 == NULL || wakeup->slot != ctx->slot) {
2004-03-03 05:14:37 +08:00
continue;
}
wakeup->handler = ngx_event_busy_lock_posted_handler;
wakeup->cache_updated = 1;
ev = wakeup->event;
ngx_post_event(ev, &ngx_posted_events);
2004-03-03 05:14:37 +08:00
}
ngx_mutex_unlock(bl->mutex);
} else {
bl->waiting--;
ngx_mutex_unlock(bl->mutex);
wakeup->handler = ngx_event_busy_lock_posted_handler;
wakeup->locked = 1;
ev = wakeup->event;
if (ev->timer_set) {
ngx_del_timer(ev);
}
ngx_post_event(ev, &ngx_posted_events);
2004-03-03 05:14:37 +08:00
}
}
void
ngx_event_busy_lock_cancel(ngx_event_busy_lock_t *bl,
ngx_event_busy_lock_ctx_t *ctx)
2004-03-03 05:14:37 +08:00
{
ngx_event_busy_lock_ctx_t *c, *p;
ngx_mutex_lock(bl->mutex);
2004-03-03 05:14:37 +08:00
bl->waiting--;
if (ctx == bl->events) {
bl->events = ctx->next;
} else {
p = bl->events;
for (c = bl->events->next; c; c = c->next) {
if (c == ctx) {
p->next = ctx->next;
break;
}
p = c;
}
}
ngx_mutex_unlock(bl->mutex);
}
static ngx_int_t
ngx_event_busy_lock_look_cachable(ngx_event_busy_lock_t *bl,
ngx_event_busy_lock_ctx_t *ctx)
2004-03-03 05:14:37 +08:00
{
ngx_int_t free;
ngx_uint_t i, bit, cachable, mask;
bit = 0;
cachable = 0;
free = -1;
#if (NGX_SUPPRESS_WARN)
mask = 0;
#endif
for (i = 0; i < bl->max_busy; i++) {
if ((bit & 7) == 0) {
mask = bl->md5_mask[i / 8];
}
if (mask & 1) {
if (ngx_memcmp(&bl->md5[i * 16], ctx->md5, 16) == 0) {
2004-03-04 00:14:15 +08:00
ctx->waiting = 1;
ctx->slot = i;
2004-03-03 05:14:37 +08:00
return NGX_AGAIN;
}
cachable++;
} else if (free == -1) {
free = i;
}
if (cachable == bl->cachable) {
if (free == -1 && cachable < bl->max_busy) {
free = i + 1;
}
break;
}
mask >>= 1;
bit++;
}
if (free == -1) {
return NGX_BUSY;
}
#if 0
if (bl->busy == bl->max_busy) {
return NGX_BUSY;
}
#endif
ngx_memcpy(&bl->md5[free * 16], ctx->md5, 16);
bl->md5_mask[free / 8] |= 1 << (free & 7);
ctx->slot = free;
bl->cachable++;
bl->busy++;
return NGX_OK;
}
static void
ngx_event_busy_lock_handler(ngx_event_t *ev)
2004-03-03 05:14:37 +08:00
{
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
ev->handler = ngx_event_busy_lock_posted_handler;
ngx_post_event(ev, &ngx_posted_events);
2004-03-03 05:14:37 +08:00
}
static void
ngx_event_busy_lock_posted_handler(ngx_event_t *ev)
2004-03-03 05:14:37 +08:00
{
ngx_event_busy_lock_ctx_t *ctx;
ctx = ev->data;
ctx->handler(ev);
}