0
|
1
|
|
2 /*
|
|
3 * Copyright (C) Igor Sysoev
|
|
4 */
|
|
5
|
|
6
|
|
7 #include <ngx_config.h>
|
|
8 #include <ngx_core.h>
|
|
9 #include <ngx_event.h>
|
|
10
|
|
11
|
|
12 ngx_os_io_t ngx_io;
|
|
13
|
|
14
|
70
|
15 ngx_listening_t *
|
526
|
16 ngx_create_listening(ngx_conf_t *cf, void *sockaddr, socklen_t socklen)
|
0
|
17 {
|
526
|
18 ngx_listening_t *ls;
|
|
19 struct sockaddr *sa;
|
|
20 u_char text[NGX_SOCKADDR_STRLEN];
|
0
|
21
|
50
|
22 ls = ngx_array_push(&cf->cycle->listening);
|
|
23 if (ls == NULL) {
|
0
|
24 return NULL;
|
|
25 }
|
|
26
|
|
27 ngx_memzero(ls, sizeof(ngx_listening_t));
|
|
28
|
526
|
29 sa = ngx_palloc(cf->pool, socklen);
|
|
30 if (sa == NULL) {
|
0
|
31 return NULL;
|
|
32 }
|
|
33
|
526
|
34 ngx_memcpy(sa, sockaddr, socklen);
|
0
|
35
|
526
|
36 ls->sockaddr = sa;
|
|
37 ls->socklen = socklen;
|
10
|
38
|
526
|
39 ls->addr_text.len = ngx_sock_ntop(sa, text, NGX_SOCKADDR_STRLEN, 1);
|
|
40
|
|
41 ls->addr_text.data = ngx_pnalloc(cf->pool, ls->addr_text.len);
|
10
|
42 if (ls->addr_text.data == NULL) {
|
0
|
43 return NULL;
|
|
44 }
|
|
45
|
526
|
46 ngx_memcpy(ls->addr_text.data, text, ls->addr_text.len);
|
10
|
47
|
0
|
48 ls->fd = (ngx_socket_t) -1;
|
|
49 ls->type = SOCK_STREAM;
|
526
|
50
|
|
51 switch (ls->sockaddr->sa_family) {
|
|
52 #if (NGX_HAVE_INET6)
|
|
53 case AF_INET6:
|
|
54 ls->addr_text_max_len = NGX_INET6_ADDRSTRLEN;
|
|
55 break;
|
|
56 #endif
|
|
57 case AF_INET:
|
|
58 ls->addr_text_max_len = NGX_INET_ADDRSTRLEN;
|
|
59 break;
|
|
60 default:
|
|
61 ls->addr_text_max_len = NGX_SOCKADDR_STRLEN;
|
|
62 break;
|
|
63 }
|
|
64
|
|
65 ls->backlog = NGX_LISTEN_BACKLOG;
|
|
66 ls->rcvbuf = -1;
|
|
67 ls->sndbuf = -1;
|
0
|
68
|
|
69 return ls;
|
|
70 }
|
|
71
|
|
72
|
70
|
73 ngx_int_t
|
|
74 ngx_set_inherited_sockets(ngx_cycle_t *cycle)
|
0
|
75 {
|
72
|
76 size_t len;
|
|
77 ngx_uint_t i;
|
|
78 ngx_listening_t *ls;
|
112
|
79 socklen_t olen;
|
72
|
80 #if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
|
90
|
81 ngx_err_t err;
|
72
|
82 struct accept_filter_arg af;
|
|
83 #endif
|
|
84 #if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
|
|
85 int timeout;
|
|
86 #endif
|
0
|
87
|
|
88 ls = cycle->listening.elts;
|
|
89 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
90
|
|
91 /* AF_INET only */
|
|
92
|
|
93 ls[i].sockaddr = ngx_palloc(cycle->pool, sizeof(struct sockaddr_in));
|
|
94 if (ls[i].sockaddr == NULL) {
|
|
95 return NGX_ERROR;
|
|
96 }
|
|
97
|
|
98 ls[i].socklen = sizeof(struct sockaddr_in);
|
|
99 if (getsockname(ls[i].fd, ls[i].sockaddr, &ls[i].socklen) == -1) {
|
|
100 ngx_log_error(NGX_LOG_CRIT, cycle->log, ngx_socket_errno,
|
|
101 "getsockname() of the inherited "
|
|
102 "socket #%d failed", ls[i].fd);
|
|
103 ls[i].ignore = 1;
|
|
104 continue;
|
|
105 }
|
|
106
|
487
|
107 switch (ls[i].sockaddr->sa_family) {
|
0
|
108
|
487
|
109 #if (NGX_HAVE_INET6)
|
|
110 case AF_INET6:
|
|
111 ls[i].addr_text_max_len = NGX_INET6_ADDRSTRLEN;
|
|
112 break;
|
|
113 #endif
|
|
114
|
|
115 case AF_INET:
|
|
116 ls[i].addr_text_max_len = NGX_INET_ADDRSTRLEN;
|
|
117 break;
|
|
118
|
|
119 default:
|
0
|
120 ngx_log_error(NGX_LOG_CRIT, cycle->log, ngx_socket_errno,
|
|
121 "the inherited socket #%d has "
|
487
|
122 "an unsupported protocol family", ls[i].fd);
|
0
|
123 ls[i].ignore = 1;
|
|
124 continue;
|
|
125 }
|
10
|
126
|
487
|
127 len = ls[i].addr_text_max_len + sizeof(":65535") - 1;
|
0
|
128
|
487
|
129 ls[i].addr_text.data = ngx_pnalloc(cycle->pool, len);
|
0
|
130 if (ls[i].addr_text.data == NULL) {
|
|
131 return NGX_ERROR;
|
|
132 }
|
|
133
|
487
|
134 len = ngx_sock_ntop(ls[i].sockaddr, ls[i].addr_text.data, len, 1);
|
10
|
135 if (len == 0) {
|
0
|
136 return NGX_ERROR;
|
|
137 }
|
10
|
138
|
487
|
139 ls[i].addr_text.len = len;
|
72
|
140
|
326
|
141 ls[i].backlog = NGX_LISTEN_BACKLOG;
|
86
|
142
|
112
|
143 olen = sizeof(int);
|
|
144
|
|
145 if (getsockopt(ls[i].fd, SOL_SOCKET, SO_RCVBUF, (void *) &ls[i].rcvbuf,
|
|
146 &olen)
|
|
147 == -1)
|
|
148 {
|
|
149 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
|
150 "getsockopt(SO_RCVBUF) %V failed, ignored",
|
|
151 &ls[i].addr_text);
|
|
152
|
|
153 ls[i].rcvbuf = -1;
|
|
154 }
|
|
155
|
|
156 olen = sizeof(int);
|
|
157
|
|
158 if (getsockopt(ls[i].fd, SOL_SOCKET, SO_SNDBUF, (void *) &ls[i].sndbuf,
|
|
159 &olen)
|
|
160 == -1)
|
|
161 {
|
|
162 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
|
163 "getsockopt(SO_SNDBUF) %V failed, ignored",
|
|
164 &ls[i].addr_text);
|
|
165
|
|
166 ls[i].sndbuf = -1;
|
|
167 }
|
|
168
|
72
|
169 #if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
|
|
170
|
|
171 ngx_memzero(&af, sizeof(struct accept_filter_arg));
|
112
|
172 olen = sizeof(struct accept_filter_arg);
|
72
|
173
|
112
|
174 if (getsockopt(ls[i].fd, SOL_SOCKET, SO_ACCEPTFILTER, &af, &olen)
|
72
|
175 == -1)
|
|
176 {
|
90
|
177 err = ngx_errno;
|
|
178
|
|
179 if (err == NGX_EINVAL) {
|
|
180 continue;
|
|
181 }
|
|
182
|
|
183 ngx_log_error(NGX_LOG_NOTICE, cycle->log, err,
|
72
|
184 "getsockopt(SO_ACCEPTFILTER) for %V failed, ignored",
|
|
185 &ls[i].addr_text);
|
|
186 continue;
|
|
187 }
|
|
188
|
112
|
189 if (olen < sizeof(struct accept_filter_arg) || af.af_name[0] == '\0') {
|
72
|
190 continue;
|
|
191 }
|
|
192
|
|
193 ls[i].accept_filter = ngx_palloc(cycle->pool, 16);
|
|
194 if (ls[i].accept_filter == NULL) {
|
|
195 return NGX_ERROR;
|
|
196 }
|
|
197
|
|
198 (void) ngx_cpystrn((u_char *) ls[i].accept_filter,
|
|
199 (u_char *) af.af_name, 16);
|
|
200 #endif
|
|
201
|
|
202 #if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
|
|
203
|
|
204 timeout = 0;
|
112
|
205 olen = sizeof(int);
|
72
|
206
|
112
|
207 if (getsockopt(ls[i].fd, IPPROTO_TCP, TCP_DEFER_ACCEPT, &timeout, &olen)
|
72
|
208 == -1)
|
|
209 {
|
|
210 ngx_log_error(NGX_LOG_NOTICE, cycle->log, ngx_errno,
|
|
211 "getsockopt(TCP_DEFER_ACCEPT) for %V failed, ignored",
|
|
212 &ls[i].addr_text);
|
|
213 continue;
|
|
214 }
|
|
215
|
114
|
216 if (olen < sizeof(int) || timeout == 0) {
|
72
|
217 continue;
|
|
218 }
|
|
219
|
|
220 ls[i].deferred_accept = 1;
|
|
221 #endif
|
0
|
222 }
|
|
223
|
|
224 return NGX_OK;
|
|
225 }
|
|
226
|
|
227
|
70
|
228 ngx_int_t
|
|
229 ngx_open_listening_sockets(ngx_cycle_t *cycle)
|
0
|
230 {
|
112
|
231 int reuseaddr;
|
|
232 ngx_uint_t i, tries, failed;
|
0
|
233 ngx_err_t err;
|
|
234 ngx_log_t *log;
|
|
235 ngx_socket_t s;
|
|
236 ngx_listening_t *ls;
|
|
237
|
|
238 reuseaddr = 1;
|
|
239 #if (NGX_SUPPRESS_WARN)
|
|
240 failed = 0;
|
|
241 #endif
|
|
242
|
|
243 log = cycle->log;
|
|
244
|
112
|
245 /* TODO: configurable try number */
|
0
|
246
|
378
|
247 for (tries = 5; tries; tries--) {
|
0
|
248 failed = 0;
|
|
249
|
|
250 /* for each listening socket */
|
|
251
|
|
252 ls = cycle->listening.elts;
|
|
253 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
254
|
|
255 if (ls[i].ignore) {
|
|
256 continue;
|
|
257 }
|
|
258
|
|
259 if (ls[i].fd != -1) {
|
|
260 continue;
|
|
261 }
|
|
262
|
|
263 if (ls[i].inherited) {
|
|
264
|
|
265 /* TODO: close on exit */
|
|
266 /* TODO: nonblocking */
|
|
267 /* TODO: deferred accept */
|
|
268
|
|
269 continue;
|
|
270 }
|
|
271
|
421
|
272 s = ngx_socket(ls[i].sockaddr->sa_family, ls[i].type, 0);
|
0
|
273
|
|
274 if (s == -1) {
|
|
275 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
276 ngx_socket_n " %V failed", &ls[i].addr_text);
|
0
|
277 return NGX_ERROR;
|
|
278 }
|
|
279
|
|
280 if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
|
112
|
281 (const void *) &reuseaddr, sizeof(int))
|
|
282 == -1)
|
|
283 {
|
0
|
284 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
285 "setsockopt(SO_REUSEADDR) %V failed",
|
|
286 &ls[i].addr_text);
|
112
|
287
|
306
|
288 if (ngx_close_socket(s) == -1) {
|
112
|
289 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
290 ngx_close_socket_n " %V failed",
|
|
291 &ls[i].addr_text);
|
306
|
292 }
|
112
|
293
|
0
|
294 return NGX_ERROR;
|
|
295 }
|
|
296
|
499
|
297 #if (NGX_HAVE_INET6 && defined IPV6_V6ONLY)
|
|
298
|
|
299 if (ls[i].sockaddr->sa_family == AF_INET6 && ls[i].ipv6only) {
|
|
300 int ipv6only;
|
|
301
|
|
302 ipv6only = (ls[i].ipv6only == 1);
|
|
303
|
|
304 if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY,
|
|
305 (const void *) &ipv6only, sizeof(int))
|
|
306 == -1)
|
|
307 {
|
526
|
308 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
499
|
309 "setsockopt(IPV6_V6ONLY) %V failed, ignored",
|
|
310 &ls[i].addr_text);
|
|
311 }
|
|
312 }
|
|
313 #endif
|
0
|
314 /* TODO: close on exit */
|
|
315
|
|
316 if (!(ngx_event_flags & NGX_USE_AIO_EVENT)) {
|
|
317 if (ngx_nonblocking(s) == -1) {
|
|
318 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
319 ngx_nonblocking_n " %V failed",
|
|
320 &ls[i].addr_text);
|
112
|
321
|
306
|
322 if (ngx_close_socket(s) == -1) {
|
112
|
323 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
324 ngx_close_socket_n " %V failed",
|
|
325 &ls[i].addr_text);
|
306
|
326 }
|
112
|
327
|
0
|
328 return NGX_ERROR;
|
|
329 }
|
|
330 }
|
|
331
|
526
|
332 ngx_log_debug2(NGX_LOG_DEBUG_CORE, log, 0,
|
142
|
333 "bind() %V #%d ", &ls[i].addr_text, s);
|
|
334
|
0
|
335 if (bind(s, ls[i].sockaddr, ls[i].socklen) == -1) {
|
|
336 err = ngx_socket_errno;
|
112
|
337
|
|
338 if (err == NGX_EADDRINUSE && ngx_test_config) {
|
|
339 continue;
|
|
340 }
|
|
341
|
0
|
342 ngx_log_error(NGX_LOG_EMERG, log, err,
|
10
|
343 "bind() to %V failed", &ls[i].addr_text);
|
0
|
344
|
306
|
345 if (ngx_close_socket(s) == -1) {
|
0
|
346 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
347 ngx_close_socket_n " %V failed",
|
|
348 &ls[i].addr_text);
|
306
|
349 }
|
0
|
350
|
112
|
351 if (err != NGX_EADDRINUSE) {
|
|
352 return NGX_ERROR;
|
|
353 }
|
|
354
|
0
|
355 failed = 1;
|
112
|
356
|
0
|
357 continue;
|
|
358 }
|
|
359
|
306
|
360 if (listen(s, ls[i].backlog) == -1) {
|
|
361 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
362 "listen() to %V, backlog %d failed",
|
|
363 &ls[i].addr_text, ls[i].backlog);
|
|
364
|
|
365 if (ngx_close_socket(s) == -1) {
|
|
366 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
367 ngx_close_socket_n " %V failed",
|
|
368 &ls[i].addr_text);
|
|
369 }
|
|
370
|
|
371 return NGX_ERROR;
|
|
372 }
|
|
373
|
112
|
374 ls[i].listen = 1;
|
0
|
375
|
|
376 ls[i].fd = s;
|
|
377 }
|
|
378
|
112
|
379 if (!failed) {
|
0
|
380 break;
|
112
|
381 }
|
0
|
382
|
|
383 /* TODO: delay configurable */
|
|
384
|
|
385 ngx_log_error(NGX_LOG_NOTICE, log, 0,
|
|
386 "try again to bind() after 500ms");
|
112
|
387
|
0
|
388 ngx_msleep(500);
|
|
389 }
|
|
390
|
|
391 if (failed) {
|
26
|
392 ngx_log_error(NGX_LOG_EMERG, log, 0, "still could not bind()");
|
0
|
393 return NGX_ERROR;
|
|
394 }
|
|
395
|
|
396 return NGX_OK;
|
|
397 }
|
|
398
|
|
399
|
70
|
400 void
|
526
|
401 ngx_configure_listening_sockets(ngx_cycle_t *cycle)
|
112
|
402 {
|
|
403 ngx_uint_t i;
|
|
404 ngx_listening_t *ls;
|
|
405
|
|
406 #if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
|
|
407 struct accept_filter_arg af;
|
|
408 #endif
|
|
409 #if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
|
|
410 int timeout;
|
|
411 #endif
|
|
412
|
|
413 ls = cycle->listening.elts;
|
|
414 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
415
|
526
|
416 ls[i].log = *ls[i].logp;
|
|
417
|
112
|
418 if (ls[i].rcvbuf != -1) {
|
|
419 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_RCVBUF,
|
|
420 (const void *) &ls[i].rcvbuf, sizeof(int))
|
|
421 == -1)
|
|
422 {
|
|
423 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
118
|
424 "setsockopt(SO_RCVBUF, %d) %V failed, ignored",
|
|
425 ls[i].rcvbuf, &ls[i].addr_text);
|
112
|
426 }
|
|
427 }
|
|
428
|
|
429 if (ls[i].sndbuf != -1) {
|
|
430 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_SNDBUF,
|
|
431 (const void *) &ls[i].sndbuf, sizeof(int))
|
|
432 == -1)
|
|
433 {
|
|
434 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
118
|
435 "setsockopt(SO_SNDBUF, %d) %V failed, ignored",
|
|
436 ls[i].sndbuf, &ls[i].addr_text);
|
112
|
437 }
|
|
438 }
|
|
439
|
184
|
440 #if 0
|
|
441 if (1) {
|
|
442 int tcp_nodelay = 1;
|
|
443
|
|
444 if (setsockopt(ls[i].fd, IPPROTO_TCP, TCP_NODELAY,
|
|
445 (const void *) &tcp_nodelay, sizeof(int))
|
|
446 == -1)
|
|
447 {
|
|
448 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
|
449 "setsockopt(TCP_NODELAY) %V failed, ignored",
|
|
450 &ls[i].addr_text);
|
|
451 }
|
|
452 }
|
|
453 #endif
|
|
454
|
112
|
455 if (ls[i].listen) {
|
306
|
456
|
|
457 /* change backlog via listen() */
|
|
458
|
112
|
459 if (listen(ls[i].fd, ls[i].backlog) == -1) {
|
|
460 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
306
|
461 "listen() to %V, backlog %d failed, ignored",
|
112
|
462 &ls[i].addr_text, ls[i].backlog);
|
|
463 }
|
|
464 }
|
|
465
|
|
466 /*
|
|
467 * setting deferred mode should be last operation on socket,
|
|
468 * because code may prematurely continue cycle on failure
|
|
469 */
|
|
470
|
|
471 #if (NGX_HAVE_DEFERRED_ACCEPT)
|
|
472
|
|
473 #ifdef SO_ACCEPTFILTER
|
|
474
|
176
|
475 if (ls[i].delete_deferred) {
|
|
476 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_ACCEPTFILTER, NULL, 0)
|
|
477 == -1)
|
112
|
478 {
|
|
479 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_errno,
|
|
480 "setsockopt(SO_ACCEPTFILTER, NULL) "
|
|
481 "for %V failed, ignored",
|
176
|
482 &ls[i].addr_text);
|
112
|
483
|
176
|
484 if (ls[i].accept_filter) {
|
112
|
485 ngx_log_error(NGX_LOG_ALERT, cycle->log, 0,
|
|
486 "could not change the accept filter "
|
|
487 "to \"%s\" for %V, ignored",
|
176
|
488 ls[i].accept_filter, &ls[i].addr_text);
|
112
|
489 }
|
|
490
|
|
491 continue;
|
|
492 }
|
|
493
|
176
|
494 ls[i].deferred_accept = 0;
|
112
|
495 }
|
|
496
|
176
|
497 if (ls[i].add_deferred) {
|
112
|
498 ngx_memzero(&af, sizeof(struct accept_filter_arg));
|
|
499 (void) ngx_cpystrn((u_char *) af.af_name,
|
176
|
500 (u_char *) ls[i].accept_filter, 16);
|
112
|
501
|
176
|
502 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_ACCEPTFILTER,
|
112
|
503 &af, sizeof(struct accept_filter_arg))
|
|
504 == -1)
|
|
505 {
|
|
506 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_errno,
|
|
507 "setsockopt(SO_ACCEPTFILTER, \"%s\") "
|
|
508 " for %V failed, ignored",
|
176
|
509 ls[i].accept_filter, &ls[i].addr_text);
|
112
|
510 continue;
|
|
511 }
|
|
512
|
176
|
513 ls[i].deferred_accept = 1;
|
112
|
514 }
|
|
515
|
|
516 #endif
|
|
517
|
|
518 #ifdef TCP_DEFER_ACCEPT
|
|
519
|
176
|
520 if (ls[i].add_deferred || ls[i].delete_deferred) {
|
112
|
521
|
176
|
522 if (ls[i].add_deferred) {
|
|
523 timeout = (int) (ls[i].post_accept_timeout / 1000);
|
112
|
524
|
|
525 } else {
|
|
526 timeout = 0;
|
|
527 }
|
|
528
|
176
|
529 if (setsockopt(ls[i].fd, IPPROTO_TCP, TCP_DEFER_ACCEPT,
|
112
|
530 &timeout, sizeof(int))
|
|
531 == -1)
|
|
532 {
|
|
533 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_errno,
|
|
534 "setsockopt(TCP_DEFER_ACCEPT, %d) for %V failed, "
|
|
535 "ignored",
|
176
|
536 timeout, &ls[i].addr_text);
|
112
|
537
|
|
538 continue;
|
|
539 }
|
|
540 }
|
|
541
|
176
|
542 if (ls[i].add_deferred) {
|
|
543 ls[i].deferred_accept = 1;
|
112
|
544 }
|
|
545
|
|
546 #endif
|
|
547
|
|
548 #endif /* NGX_HAVE_DEFERRED_ACCEPT */
|
|
549 }
|
|
550
|
|
551 return;
|
|
552 }
|
|
553
|
|
554
|
|
555 void
|
70
|
556 ngx_close_listening_sockets(ngx_cycle_t *cycle)
|
0
|
557 {
|
92
|
558 ngx_uint_t i;
|
|
559 ngx_listening_t *ls;
|
|
560 ngx_connection_t *c;
|
0
|
561
|
|
562 if (ngx_event_flags & NGX_USE_IOCP_EVENT) {
|
|
563 return;
|
|
564 }
|
|
565
|
|
566 ngx_accept_mutex_held = 0;
|
160
|
567 ngx_use_accept_mutex = 0;
|
0
|
568
|
|
569 ls = cycle->listening.elts;
|
|
570 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
571
|
92
|
572 c = ls[i].connection;
|
0
|
573
|
520
|
574 if (c) {
|
|
575 if (c->read->active) {
|
|
576 if (ngx_event_flags & NGX_USE_RTSIG_EVENT) {
|
|
577 ngx_del_conn(c, NGX_CLOSE_EVENT);
|
362
|
578
|
520
|
579 } else if (ngx_event_flags & NGX_USE_EPOLL_EVENT) {
|
0
|
580
|
520
|
581 /*
|
|
582 * it seems that Linux-2.6.x OpenVZ sends events
|
|
583 * for closed shared listening sockets unless
|
|
584 * the events was explicity deleted
|
|
585 */
|
362
|
586
|
520
|
587 ngx_del_event(c->read, NGX_READ_EVENT, 0);
|
362
|
588
|
520
|
589 } else {
|
|
590 ngx_del_event(c->read, NGX_READ_EVENT, NGX_CLOSE_EVENT);
|
|
591 }
|
0
|
592 }
|
520
|
593
|
|
594 ngx_free_connection(c);
|
|
595
|
|
596 c->fd = (ngx_socket_t) -1;
|
0
|
597 }
|
|
598
|
112
|
599 ngx_log_debug2(NGX_LOG_DEBUG_CORE, cycle->log, 0,
|
|
600 "close listening %V #%d ", &ls[i].addr_text, ls[i].fd);
|
|
601
|
92
|
602 if (ngx_close_socket(ls[i].fd) == -1) {
|
0
|
603 ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_socket_errno,
|
10
|
604 ngx_close_socket_n " %V failed", &ls[i].addr_text);
|
0
|
605 }
|
92
|
606 }
|
|
607 }
|
0
|
608
|
92
|
609
|
|
610 ngx_connection_t *
|
|
611 ngx_get_connection(ngx_socket_t s, ngx_log_t *log)
|
|
612 {
|
110
|
613 ngx_uint_t instance;
|
|
614 ngx_event_t *rev, *wev;
|
|
615 ngx_connection_t *c;
|
92
|
616
|
|
617 /* disable warning: Win32 SOCKET is u_int while UNIX socket is int */
|
|
618
|
|
619 if (ngx_cycle->files && (ngx_uint_t) s >= ngx_cycle->files_n) {
|
|
620 ngx_log_error(NGX_LOG_ALERT, log, 0,
|
|
621 "the new socket has number %d, "
|
|
622 "but only %ui files are available",
|
|
623 s, ngx_cycle->files_n);
|
|
624 return NULL;
|
|
625 }
|
|
626
|
|
627 /* ngx_mutex_lock */
|
|
628
|
|
629 c = ngx_cycle->free_connections;
|
|
630
|
|
631 if (c == NULL) {
|
|
632 ngx_log_error(NGX_LOG_ALERT, log, 0,
|
440
|
633 "%ui worker_connections are not enough",
|
92
|
634 ngx_cycle->connection_n);
|
|
635
|
|
636 /* ngx_mutex_unlock */
|
|
637
|
|
638 return NULL;
|
|
639 }
|
|
640
|
|
641 ngx_cycle->free_connections = c->data;
|
|
642 ngx_cycle->free_connection_n--;
|
|
643
|
|
644 /* ngx_mutex_unlock */
|
|
645
|
|
646 if (ngx_cycle->files) {
|
|
647 ngx_cycle->files[s] = c;
|
|
648 }
|
|
649
|
110
|
650 rev = c->read;
|
|
651 wev = c->write;
|
|
652
|
|
653 ngx_memzero(c, sizeof(ngx_connection_t));
|
|
654
|
|
655 c->read = rev;
|
|
656 c->write = wev;
|
|
657 c->fd = s;
|
|
658 c->log = log;
|
|
659
|
|
660 instance = rev->instance;
|
|
661
|
|
662 ngx_memzero(rev, sizeof(ngx_event_t));
|
|
663 ngx_memzero(wev, sizeof(ngx_event_t));
|
|
664
|
|
665 rev->instance = !instance;
|
|
666 wev->instance = !instance;
|
|
667
|
|
668 rev->index = NGX_INVALID_INDEX;
|
|
669 wev->index = NGX_INVALID_INDEX;
|
|
670
|
|
671 rev->data = c;
|
|
672 wev->data = c;
|
|
673
|
|
674 wev->write = 1;
|
|
675
|
92
|
676 return c;
|
|
677 }
|
|
678
|
|
679
|
|
680 void
|
|
681 ngx_free_connection(ngx_connection_t *c)
|
|
682 {
|
|
683 /* ngx_mutex_lock */
|
|
684
|
|
685 c->data = ngx_cycle->free_connections;
|
|
686 ngx_cycle->free_connections = c;
|
|
687 ngx_cycle->free_connection_n++;
|
|
688
|
|
689 /* ngx_mutex_unlock */
|
|
690
|
|
691 if (ngx_cycle->files) {
|
|
692 ngx_cycle->files[c->fd] = NULL;
|
0
|
693 }
|
|
694 }
|
|
695
|
|
696
|
70
|
697 void
|
|
698 ngx_close_connection(ngx_connection_t *c)
|
0
|
699 {
|
366
|
700 ngx_err_t err;
|
|
701 ngx_uint_t log_error, level;
|
0
|
702 ngx_socket_t fd;
|
|
703
|
28
|
704 if (c->fd == -1) {
|
0
|
705 ngx_log_error(NGX_LOG_ALERT, c->log, 0, "connection already closed");
|
|
706 return;
|
|
707 }
|
|
708
|
|
709 if (c->read->timer_set) {
|
|
710 ngx_del_timer(c->read);
|
|
711 }
|
126
|
712
|
0
|
713 if (c->write->timer_set) {
|
|
714 ngx_del_timer(c->write);
|
|
715 }
|
126
|
716
|
0
|
717 if (ngx_del_conn) {
|
|
718 ngx_del_conn(c, NGX_CLOSE_EVENT);
|
|
719
|
|
720 } else {
|
|
721 if (c->read->active || c->read->disabled) {
|
|
722 ngx_del_event(c->read, NGX_READ_EVENT, NGX_CLOSE_EVENT);
|
|
723 }
|
|
724
|
|
725 if (c->write->active || c->write->disabled) {
|
|
726 ngx_del_event(c->write, NGX_WRITE_EVENT, NGX_CLOSE_EVENT);
|
|
727 }
|
|
728 }
|
|
729
|
|
730 #if (NGX_THREADS)
|
|
731
|
|
732 /*
|
|
733 * we have to clean the connection information before the closing
|
|
734 * because another thread may reopen the same file descriptor
|
|
735 * before we clean the connection
|
|
736 */
|
|
737
|
112
|
738 ngx_mutex_lock(ngx_posted_events_mutex);
|
0
|
739
|
112
|
740 if (c->read->prev) {
|
|
741 ngx_delete_posted_event(c->read);
|
|
742 }
|
0
|
743
|
112
|
744 if (c->write->prev) {
|
|
745 ngx_delete_posted_event(c->write);
|
|
746 }
|
0
|
747
|
112
|
748 c->read->closed = 1;
|
|
749 c->write->closed = 1;
|
0
|
750
|
112
|
751 if (c->single_connection) {
|
|
752 ngx_unlock(&c->lock);
|
|
753 c->read->locked = 0;
|
|
754 c->write->locked = 0;
|
|
755 }
|
0
|
756
|
112
|
757 ngx_mutex_unlock(ngx_posted_events_mutex);
|
0
|
758
|
|
759 #else
|
|
760
|
|
761 if (c->read->prev) {
|
|
762 ngx_delete_posted_event(c->read);
|
|
763 }
|
|
764
|
|
765 if (c->write->prev) {
|
|
766 ngx_delete_posted_event(c->write);
|
|
767 }
|
|
768
|
|
769 c->read->closed = 1;
|
|
770 c->write->closed = 1;
|
|
771
|
|
772 #endif
|
|
773
|
366
|
774 log_error = c->log_error;
|
|
775
|
92
|
776 ngx_free_connection(c);
|
|
777
|
0
|
778 fd = c->fd;
|
|
779 c->fd = (ngx_socket_t) -1;
|
|
780
|
|
781 if (ngx_close_socket(fd) == -1) {
|
|
782
|
366
|
783 err = ngx_socket_errno;
|
|
784
|
|
785 if (err == NGX_ECONNRESET || err == NGX_ENOTCONN) {
|
|
786
|
|
787 switch (log_error) {
|
|
788
|
|
789 case NGX_ERROR_INFO:
|
|
790 level = NGX_LOG_INFO;
|
|
791 break;
|
|
792
|
|
793 case NGX_ERROR_ERR:
|
|
794 level = NGX_LOG_ERR;
|
|
795 break;
|
|
796
|
|
797 default:
|
|
798 level = NGX_LOG_CRIT;
|
|
799 }
|
|
800
|
|
801 } else {
|
|
802 level = NGX_LOG_CRIT;
|
|
803 }
|
|
804
|
0
|
805 /* we use ngx_cycle->log because c->log was in c->pool */
|
|
806
|
366
|
807 ngx_log_error(level, ngx_cycle->log, err,
|
332
|
808 ngx_close_socket_n " %d failed", fd);
|
0
|
809 }
|
|
810 }
|
|
811
|
|
812
|
70
|
813 ngx_int_t
|
|
814 ngx_connection_error(ngx_connection_t *c, ngx_err_t err, char *text)
|
0
|
815 {
|
|
816 ngx_uint_t level;
|
|
817
|
524
|
818 /* Winsock may return NGX_ECONNABORTED instead of NGX_ECONNRESET */
|
|
819
|
|
820 if ((err == NGX_ECONNRESET
|
|
821 #if (NGX_WIN32)
|
|
822 || err == NGX_ECONNABORTED
|
|
823 #endif
|
|
824 ) && c->log_error == NGX_ERROR_IGNORE_ECONNRESET)
|
|
825 {
|
0
|
826 return 0;
|
|
827 }
|
|
828
|
499
|
829 #if (NGX_SOLARIS)
|
|
830 if (err == NGX_EINVAL && c->log_error == NGX_ERROR_IGNORE_EINVAL) {
|
|
831 return 0;
|
|
832 }
|
|
833 #endif
|
|
834
|
86
|
835 if (err == 0
|
|
836 || err == NGX_ECONNRESET
|
524
|
837 #if (NGX_WIN32)
|
|
838 || err == NGX_ECONNABORTED
|
|
839 #else
|
0
|
840 || err == NGX_EPIPE
|
|
841 #endif
|
|
842 || err == NGX_ENOTCONN
|
136
|
843 || err == NGX_ETIMEDOUT
|
0
|
844 || err == NGX_ECONNREFUSED
|
364
|
845 || err == NGX_ENETDOWN
|
|
846 || err == NGX_ENETUNREACH
|
|
847 || err == NGX_EHOSTDOWN
|
0
|
848 || err == NGX_EHOSTUNREACH)
|
|
849 {
|
|
850 switch (c->log_error) {
|
|
851
|
499
|
852 case NGX_ERROR_IGNORE_EINVAL:
|
0
|
853 case NGX_ERROR_IGNORE_ECONNRESET:
|
|
854 case NGX_ERROR_INFO:
|
|
855 level = NGX_LOG_INFO;
|
|
856 break;
|
|
857
|
|
858 case NGX_ERROR_ERR:
|
|
859 level = NGX_LOG_ERR;
|
|
860 break;
|
|
861
|
|
862 default:
|
366
|
863 level = NGX_LOG_ALERT;
|
0
|
864 }
|
|
865
|
|
866 } else {
|
366
|
867 level = NGX_LOG_ALERT;
|
0
|
868 }
|
|
869
|
|
870 ngx_log_error(level, c->log, err, text);
|
|
871
|
|
872 return NGX_ERROR;
|
|
873 }
|