0
|
1
|
|
2 /*
|
|
3 * Copyright (C) Igor Sysoev
|
|
4 */
|
|
5
|
|
6
|
|
7 #include <ngx_config.h>
|
|
8 #include <ngx_core.h>
|
|
9 #include <ngx_event.h>
|
|
10
|
|
11
|
|
12 ngx_os_io_t ngx_io;
|
|
13
|
|
14
|
70
|
15 ngx_listening_t *
|
|
16 ngx_listening_inet_stream_socket(ngx_conf_t *cf, in_addr_t addr, in_port_t port)
|
0
|
17 {
|
|
18 size_t len;
|
|
19 ngx_listening_t *ls;
|
28
|
20 struct sockaddr_in *sin;
|
0
|
21
|
50
|
22 ls = ngx_array_push(&cf->cycle->listening);
|
|
23 if (ls == NULL) {
|
0
|
24 return NULL;
|
|
25 }
|
|
26
|
|
27 ngx_memzero(ls, sizeof(ngx_listening_t));
|
|
28
|
50
|
29 sin = ngx_pcalloc(cf->pool, sizeof(struct sockaddr_in));
|
|
30 if (sin == NULL) {
|
0
|
31 return NULL;
|
|
32 }
|
|
33
|
28
|
34 sin->sin_family = AF_INET;
|
|
35 sin->sin_addr.s_addr = addr;
|
|
36 sin->sin_port = htons(port);
|
0
|
37
|
10
|
38
|
382
|
39 ls->addr_text.data = ngx_pnalloc(cf->pool,
|
421
|
40 NGX_INET_ADDRSTRLEN + sizeof(":65535") - 1);
|
10
|
41 if (ls->addr_text.data == NULL) {
|
0
|
42 return NULL;
|
|
43 }
|
|
44
|
421
|
45 len = ngx_inet_ntop(AF_INET, &addr, ls->addr_text.data,
|
|
46 NGX_INET_ADDRSTRLEN);
|
10
|
47
|
|
48 ls->addr_text.len = ngx_sprintf(ls->addr_text.data + len, ":%d", port)
|
|
49 - ls->addr_text.data;
|
|
50
|
0
|
51 ls->fd = (ngx_socket_t) -1;
|
|
52 ls->type = SOCK_STREAM;
|
28
|
53 ls->sockaddr = (struct sockaddr *) sin;
|
0
|
54 ls->socklen = sizeof(struct sockaddr_in);
|
421
|
55 ls->addr_text_max_len = NGX_INET_ADDRSTRLEN;
|
0
|
56
|
|
57 return ls;
|
|
58 }
|
|
59
|
|
60
|
70
|
61 ngx_int_t
|
|
62 ngx_set_inherited_sockets(ngx_cycle_t *cycle)
|
0
|
63 {
|
72
|
64 size_t len;
|
|
65 ngx_uint_t i;
|
|
66 ngx_listening_t *ls;
|
112
|
67 socklen_t olen;
|
72
|
68 #if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
|
90
|
69 ngx_err_t err;
|
72
|
70 struct accept_filter_arg af;
|
|
71 #endif
|
|
72 #if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
|
|
73 int timeout;
|
|
74 #endif
|
0
|
75
|
|
76 ls = cycle->listening.elts;
|
|
77 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
78
|
|
79 /* AF_INET only */
|
|
80
|
|
81 ls[i].sockaddr = ngx_palloc(cycle->pool, sizeof(struct sockaddr_in));
|
|
82 if (ls[i].sockaddr == NULL) {
|
|
83 return NGX_ERROR;
|
|
84 }
|
|
85
|
|
86 ls[i].socklen = sizeof(struct sockaddr_in);
|
|
87 if (getsockname(ls[i].fd, ls[i].sockaddr, &ls[i].socklen) == -1) {
|
|
88 ngx_log_error(NGX_LOG_CRIT, cycle->log, ngx_socket_errno,
|
|
89 "getsockname() of the inherited "
|
|
90 "socket #%d failed", ls[i].fd);
|
|
91 ls[i].ignore = 1;
|
|
92 continue;
|
|
93 }
|
|
94
|
487
|
95 switch (ls[i].sockaddr->sa_family) {
|
0
|
96
|
487
|
97 #if (NGX_HAVE_INET6)
|
|
98 case AF_INET6:
|
|
99 ls[i].addr_text_max_len = NGX_INET6_ADDRSTRLEN;
|
|
100 break;
|
|
101 #endif
|
|
102
|
|
103 case AF_INET:
|
|
104 ls[i].addr_text_max_len = NGX_INET_ADDRSTRLEN;
|
|
105 break;
|
|
106
|
|
107 default:
|
0
|
108 ngx_log_error(NGX_LOG_CRIT, cycle->log, ngx_socket_errno,
|
|
109 "the inherited socket #%d has "
|
487
|
110 "an unsupported protocol family", ls[i].fd);
|
0
|
111 ls[i].ignore = 1;
|
|
112 continue;
|
|
113 }
|
10
|
114
|
487
|
115 len = ls[i].addr_text_max_len + sizeof(":65535") - 1;
|
0
|
116
|
487
|
117 ls[i].addr_text.data = ngx_pnalloc(cycle->pool, len);
|
0
|
118 if (ls[i].addr_text.data == NULL) {
|
|
119 return NGX_ERROR;
|
|
120 }
|
|
121
|
487
|
122 len = ngx_sock_ntop(ls[i].sockaddr, ls[i].addr_text.data, len, 1);
|
10
|
123 if (len == 0) {
|
0
|
124 return NGX_ERROR;
|
|
125 }
|
10
|
126
|
487
|
127 ls[i].addr_text.len = len;
|
72
|
128
|
326
|
129 ls[i].backlog = NGX_LISTEN_BACKLOG;
|
86
|
130
|
112
|
131 olen = sizeof(int);
|
|
132
|
|
133 if (getsockopt(ls[i].fd, SOL_SOCKET, SO_RCVBUF, (void *) &ls[i].rcvbuf,
|
|
134 &olen)
|
|
135 == -1)
|
|
136 {
|
|
137 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
|
138 "getsockopt(SO_RCVBUF) %V failed, ignored",
|
|
139 &ls[i].addr_text);
|
|
140
|
|
141 ls[i].rcvbuf = -1;
|
|
142 }
|
|
143
|
|
144 olen = sizeof(int);
|
|
145
|
|
146 if (getsockopt(ls[i].fd, SOL_SOCKET, SO_SNDBUF, (void *) &ls[i].sndbuf,
|
|
147 &olen)
|
|
148 == -1)
|
|
149 {
|
|
150 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
|
151 "getsockopt(SO_SNDBUF) %V failed, ignored",
|
|
152 &ls[i].addr_text);
|
|
153
|
|
154 ls[i].sndbuf = -1;
|
|
155 }
|
|
156
|
72
|
157 #if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
|
|
158
|
|
159 ngx_memzero(&af, sizeof(struct accept_filter_arg));
|
112
|
160 olen = sizeof(struct accept_filter_arg);
|
72
|
161
|
112
|
162 if (getsockopt(ls[i].fd, SOL_SOCKET, SO_ACCEPTFILTER, &af, &olen)
|
72
|
163 == -1)
|
|
164 {
|
90
|
165 err = ngx_errno;
|
|
166
|
|
167 if (err == NGX_EINVAL) {
|
|
168 continue;
|
|
169 }
|
|
170
|
|
171 ngx_log_error(NGX_LOG_NOTICE, cycle->log, err,
|
72
|
172 "getsockopt(SO_ACCEPTFILTER) for %V failed, ignored",
|
|
173 &ls[i].addr_text);
|
|
174 continue;
|
|
175 }
|
|
176
|
112
|
177 if (olen < sizeof(struct accept_filter_arg) || af.af_name[0] == '\0') {
|
72
|
178 continue;
|
|
179 }
|
|
180
|
|
181 ls[i].accept_filter = ngx_palloc(cycle->pool, 16);
|
|
182 if (ls[i].accept_filter == NULL) {
|
|
183 return NGX_ERROR;
|
|
184 }
|
|
185
|
|
186 (void) ngx_cpystrn((u_char *) ls[i].accept_filter,
|
|
187 (u_char *) af.af_name, 16);
|
|
188 #endif
|
|
189
|
|
190 #if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
|
|
191
|
|
192 timeout = 0;
|
112
|
193 olen = sizeof(int);
|
72
|
194
|
112
|
195 if (getsockopt(ls[i].fd, IPPROTO_TCP, TCP_DEFER_ACCEPT, &timeout, &olen)
|
72
|
196 == -1)
|
|
197 {
|
|
198 ngx_log_error(NGX_LOG_NOTICE, cycle->log, ngx_errno,
|
|
199 "getsockopt(TCP_DEFER_ACCEPT) for %V failed, ignored",
|
|
200 &ls[i].addr_text);
|
|
201 continue;
|
|
202 }
|
|
203
|
114
|
204 if (olen < sizeof(int) || timeout == 0) {
|
72
|
205 continue;
|
|
206 }
|
|
207
|
|
208 ls[i].deferred_accept = 1;
|
|
209 #endif
|
0
|
210 }
|
|
211
|
|
212 return NGX_OK;
|
|
213 }
|
|
214
|
|
215
|
70
|
216 ngx_int_t
|
|
217 ngx_open_listening_sockets(ngx_cycle_t *cycle)
|
0
|
218 {
|
112
|
219 int reuseaddr;
|
|
220 ngx_uint_t i, tries, failed;
|
0
|
221 ngx_err_t err;
|
|
222 ngx_log_t *log;
|
|
223 ngx_socket_t s;
|
|
224 ngx_listening_t *ls;
|
|
225
|
|
226 reuseaddr = 1;
|
|
227 #if (NGX_SUPPRESS_WARN)
|
|
228 failed = 0;
|
|
229 #endif
|
|
230
|
|
231 log = cycle->log;
|
|
232
|
112
|
233 /* TODO: configurable try number */
|
0
|
234
|
378
|
235 for (tries = 5; tries; tries--) {
|
0
|
236 failed = 0;
|
|
237
|
|
238 /* for each listening socket */
|
|
239
|
|
240 ls = cycle->listening.elts;
|
|
241 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
242
|
|
243 if (ls[i].ignore) {
|
|
244 continue;
|
|
245 }
|
|
246
|
|
247 if (ls[i].fd != -1) {
|
|
248 continue;
|
|
249 }
|
|
250
|
524
|
251 ls[i].log = *ls[i].logp;
|
|
252
|
0
|
253 if (ls[i].inherited) {
|
|
254
|
|
255 /* TODO: close on exit */
|
|
256 /* TODO: nonblocking */
|
|
257 /* TODO: deferred accept */
|
|
258
|
|
259 continue;
|
|
260 }
|
|
261
|
421
|
262 s = ngx_socket(ls[i].sockaddr->sa_family, ls[i].type, 0);
|
0
|
263
|
|
264 if (s == -1) {
|
|
265 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
266 ngx_socket_n " %V failed", &ls[i].addr_text);
|
0
|
267 return NGX_ERROR;
|
|
268 }
|
|
269
|
|
270 if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
|
112
|
271 (const void *) &reuseaddr, sizeof(int))
|
|
272 == -1)
|
|
273 {
|
0
|
274 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
275 "setsockopt(SO_REUSEADDR) %V failed",
|
|
276 &ls[i].addr_text);
|
112
|
277
|
306
|
278 if (ngx_close_socket(s) == -1) {
|
112
|
279 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
280 ngx_close_socket_n " %V failed",
|
|
281 &ls[i].addr_text);
|
306
|
282 }
|
112
|
283
|
0
|
284 return NGX_ERROR;
|
|
285 }
|
|
286
|
499
|
287 #if (NGX_HAVE_INET6 && defined IPV6_V6ONLY)
|
|
288
|
|
289 if (ls[i].sockaddr->sa_family == AF_INET6 && ls[i].ipv6only) {
|
|
290 int ipv6only;
|
|
291
|
|
292 ipv6only = (ls[i].ipv6only == 1);
|
|
293
|
|
294 if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY,
|
|
295 (const void *) &ipv6only, sizeof(int))
|
|
296 == -1)
|
|
297 {
|
|
298 ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_socket_errno,
|
|
299 "setsockopt(IPV6_V6ONLY) %V failed, ignored",
|
|
300 &ls[i].addr_text);
|
|
301 }
|
|
302 }
|
|
303 #endif
|
0
|
304 /* TODO: close on exit */
|
|
305
|
|
306 if (!(ngx_event_flags & NGX_USE_AIO_EVENT)) {
|
|
307 if (ngx_nonblocking(s) == -1) {
|
|
308 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
309 ngx_nonblocking_n " %V failed",
|
|
310 &ls[i].addr_text);
|
112
|
311
|
306
|
312 if (ngx_close_socket(s) == -1) {
|
112
|
313 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
314 ngx_close_socket_n " %V failed",
|
|
315 &ls[i].addr_text);
|
306
|
316 }
|
112
|
317
|
0
|
318 return NGX_ERROR;
|
|
319 }
|
|
320 }
|
|
321
|
142
|
322 ngx_log_debug2(NGX_LOG_DEBUG_CORE, cycle->log, 0,
|
|
323 "bind() %V #%d ", &ls[i].addr_text, s);
|
|
324
|
0
|
325 if (bind(s, ls[i].sockaddr, ls[i].socklen) == -1) {
|
|
326 err = ngx_socket_errno;
|
112
|
327
|
|
328 if (err == NGX_EADDRINUSE && ngx_test_config) {
|
|
329 continue;
|
|
330 }
|
|
331
|
0
|
332 ngx_log_error(NGX_LOG_EMERG, log, err,
|
10
|
333 "bind() to %V failed", &ls[i].addr_text);
|
0
|
334
|
306
|
335 if (ngx_close_socket(s) == -1) {
|
0
|
336 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
10
|
337 ngx_close_socket_n " %V failed",
|
|
338 &ls[i].addr_text);
|
306
|
339 }
|
0
|
340
|
112
|
341 if (err != NGX_EADDRINUSE) {
|
|
342 return NGX_ERROR;
|
|
343 }
|
|
344
|
0
|
345 failed = 1;
|
112
|
346
|
0
|
347 continue;
|
|
348 }
|
|
349
|
306
|
350 if (listen(s, ls[i].backlog) == -1) {
|
|
351 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
352 "listen() to %V, backlog %d failed",
|
|
353 &ls[i].addr_text, ls[i].backlog);
|
|
354
|
|
355 if (ngx_close_socket(s) == -1) {
|
|
356 ngx_log_error(NGX_LOG_EMERG, log, ngx_socket_errno,
|
|
357 ngx_close_socket_n " %V failed",
|
|
358 &ls[i].addr_text);
|
|
359 }
|
|
360
|
|
361 return NGX_ERROR;
|
|
362 }
|
|
363
|
112
|
364 ls[i].listen = 1;
|
0
|
365
|
|
366 ls[i].fd = s;
|
|
367 }
|
|
368
|
112
|
369 if (!failed) {
|
0
|
370 break;
|
112
|
371 }
|
0
|
372
|
|
373 /* TODO: delay configurable */
|
|
374
|
|
375 ngx_log_error(NGX_LOG_NOTICE, log, 0,
|
|
376 "try again to bind() after 500ms");
|
112
|
377
|
0
|
378 ngx_msleep(500);
|
|
379 }
|
|
380
|
|
381 if (failed) {
|
26
|
382 ngx_log_error(NGX_LOG_EMERG, log, 0, "still could not bind()");
|
0
|
383 return NGX_ERROR;
|
|
384 }
|
|
385
|
|
386 return NGX_OK;
|
|
387 }
|
|
388
|
|
389
|
70
|
390 void
|
112
|
391 ngx_configure_listening_socket(ngx_cycle_t *cycle)
|
|
392 {
|
|
393 ngx_uint_t i;
|
|
394 ngx_listening_t *ls;
|
|
395
|
|
396 #if (NGX_HAVE_DEFERRED_ACCEPT && defined SO_ACCEPTFILTER)
|
|
397 struct accept_filter_arg af;
|
|
398 #endif
|
|
399 #if (NGX_HAVE_DEFERRED_ACCEPT && defined TCP_DEFER_ACCEPT)
|
|
400 int timeout;
|
|
401 #endif
|
|
402
|
|
403 ls = cycle->listening.elts;
|
|
404 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
405
|
|
406 if (ls[i].rcvbuf != -1) {
|
|
407 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_RCVBUF,
|
|
408 (const void *) &ls[i].rcvbuf, sizeof(int))
|
|
409 == -1)
|
|
410 {
|
|
411 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
118
|
412 "setsockopt(SO_RCVBUF, %d) %V failed, ignored",
|
|
413 ls[i].rcvbuf, &ls[i].addr_text);
|
112
|
414 }
|
|
415 }
|
|
416
|
|
417 if (ls[i].sndbuf != -1) {
|
|
418 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_SNDBUF,
|
|
419 (const void *) &ls[i].sndbuf, sizeof(int))
|
|
420 == -1)
|
|
421 {
|
|
422 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
118
|
423 "setsockopt(SO_SNDBUF, %d) %V failed, ignored",
|
|
424 ls[i].sndbuf, &ls[i].addr_text);
|
112
|
425 }
|
|
426 }
|
|
427
|
184
|
428 #if 0
|
|
429 if (1) {
|
|
430 int tcp_nodelay = 1;
|
|
431
|
|
432 if (setsockopt(ls[i].fd, IPPROTO_TCP, TCP_NODELAY,
|
|
433 (const void *) &tcp_nodelay, sizeof(int))
|
|
434 == -1)
|
|
435 {
|
|
436 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
|
437 "setsockopt(TCP_NODELAY) %V failed, ignored",
|
|
438 &ls[i].addr_text);
|
|
439 }
|
|
440 }
|
|
441 #endif
|
|
442
|
112
|
443 if (ls[i].listen) {
|
306
|
444
|
|
445 /* change backlog via listen() */
|
|
446
|
112
|
447 if (listen(ls[i].fd, ls[i].backlog) == -1) {
|
|
448 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_socket_errno,
|
306
|
449 "listen() to %V, backlog %d failed, ignored",
|
112
|
450 &ls[i].addr_text, ls[i].backlog);
|
|
451 }
|
|
452 }
|
|
453
|
|
454 /*
|
|
455 * setting deferred mode should be last operation on socket,
|
|
456 * because code may prematurely continue cycle on failure
|
|
457 */
|
|
458
|
|
459 #if (NGX_HAVE_DEFERRED_ACCEPT)
|
|
460
|
|
461 #ifdef SO_ACCEPTFILTER
|
|
462
|
176
|
463 if (ls[i].delete_deferred) {
|
|
464 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_ACCEPTFILTER, NULL, 0)
|
|
465 == -1)
|
112
|
466 {
|
|
467 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_errno,
|
|
468 "setsockopt(SO_ACCEPTFILTER, NULL) "
|
|
469 "for %V failed, ignored",
|
176
|
470 &ls[i].addr_text);
|
112
|
471
|
176
|
472 if (ls[i].accept_filter) {
|
112
|
473 ngx_log_error(NGX_LOG_ALERT, cycle->log, 0,
|
|
474 "could not change the accept filter "
|
|
475 "to \"%s\" for %V, ignored",
|
176
|
476 ls[i].accept_filter, &ls[i].addr_text);
|
112
|
477 }
|
|
478
|
|
479 continue;
|
|
480 }
|
|
481
|
176
|
482 ls[i].deferred_accept = 0;
|
112
|
483 }
|
|
484
|
176
|
485 if (ls[i].add_deferred) {
|
112
|
486 ngx_memzero(&af, sizeof(struct accept_filter_arg));
|
|
487 (void) ngx_cpystrn((u_char *) af.af_name,
|
176
|
488 (u_char *) ls[i].accept_filter, 16);
|
112
|
489
|
176
|
490 if (setsockopt(ls[i].fd, SOL_SOCKET, SO_ACCEPTFILTER,
|
112
|
491 &af, sizeof(struct accept_filter_arg))
|
|
492 == -1)
|
|
493 {
|
|
494 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_errno,
|
|
495 "setsockopt(SO_ACCEPTFILTER, \"%s\") "
|
|
496 " for %V failed, ignored",
|
176
|
497 ls[i].accept_filter, &ls[i].addr_text);
|
112
|
498 continue;
|
|
499 }
|
|
500
|
176
|
501 ls[i].deferred_accept = 1;
|
112
|
502 }
|
|
503
|
|
504 #endif
|
|
505
|
|
506 #ifdef TCP_DEFER_ACCEPT
|
|
507
|
176
|
508 if (ls[i].add_deferred || ls[i].delete_deferred) {
|
112
|
509
|
176
|
510 if (ls[i].add_deferred) {
|
|
511 timeout = (int) (ls[i].post_accept_timeout / 1000);
|
112
|
512
|
|
513 } else {
|
|
514 timeout = 0;
|
|
515 }
|
|
516
|
176
|
517 if (setsockopt(ls[i].fd, IPPROTO_TCP, TCP_DEFER_ACCEPT,
|
112
|
518 &timeout, sizeof(int))
|
|
519 == -1)
|
|
520 {
|
|
521 ngx_log_error(NGX_LOG_ALERT, cycle->log, ngx_errno,
|
|
522 "setsockopt(TCP_DEFER_ACCEPT, %d) for %V failed, "
|
|
523 "ignored",
|
176
|
524 timeout, &ls[i].addr_text);
|
112
|
525
|
|
526 continue;
|
|
527 }
|
|
528 }
|
|
529
|
176
|
530 if (ls[i].add_deferred) {
|
|
531 ls[i].deferred_accept = 1;
|
112
|
532 }
|
|
533
|
|
534 #endif
|
|
535
|
|
536 #endif /* NGX_HAVE_DEFERRED_ACCEPT */
|
|
537 }
|
|
538
|
|
539 return;
|
|
540 }
|
|
541
|
|
542
|
|
543 void
|
70
|
544 ngx_close_listening_sockets(ngx_cycle_t *cycle)
|
0
|
545 {
|
92
|
546 ngx_uint_t i;
|
|
547 ngx_listening_t *ls;
|
|
548 ngx_connection_t *c;
|
0
|
549
|
|
550 if (ngx_event_flags & NGX_USE_IOCP_EVENT) {
|
|
551 return;
|
|
552 }
|
|
553
|
|
554 ngx_accept_mutex_held = 0;
|
160
|
555 ngx_use_accept_mutex = 0;
|
0
|
556
|
|
557 ls = cycle->listening.elts;
|
|
558 for (i = 0; i < cycle->listening.nelts; i++) {
|
|
559
|
92
|
560 c = ls[i].connection;
|
0
|
561
|
520
|
562 if (c) {
|
|
563 if (c->read->active) {
|
|
564 if (ngx_event_flags & NGX_USE_RTSIG_EVENT) {
|
|
565 ngx_del_conn(c, NGX_CLOSE_EVENT);
|
362
|
566
|
520
|
567 } else if (ngx_event_flags & NGX_USE_EPOLL_EVENT) {
|
0
|
568
|
520
|
569 /*
|
|
570 * it seems that Linux-2.6.x OpenVZ sends events
|
|
571 * for closed shared listening sockets unless
|
|
572 * the events was explicity deleted
|
|
573 */
|
362
|
574
|
520
|
575 ngx_del_event(c->read, NGX_READ_EVENT, 0);
|
362
|
576
|
520
|
577 } else {
|
|
578 ngx_del_event(c->read, NGX_READ_EVENT, NGX_CLOSE_EVENT);
|
|
579 }
|
0
|
580 }
|
520
|
581
|
|
582 ngx_free_connection(c);
|
|
583
|
|
584 c->fd = (ngx_socket_t) -1;
|
0
|
585 }
|
|
586
|
112
|
587 ngx_log_debug2(NGX_LOG_DEBUG_CORE, cycle->log, 0,
|
|
588 "close listening %V #%d ", &ls[i].addr_text, ls[i].fd);
|
|
589
|
92
|
590 if (ngx_close_socket(ls[i].fd) == -1) {
|
0
|
591 ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_socket_errno,
|
10
|
592 ngx_close_socket_n " %V failed", &ls[i].addr_text);
|
0
|
593 }
|
92
|
594 }
|
|
595 }
|
0
|
596
|
92
|
597
|
|
598 ngx_connection_t *
|
|
599 ngx_get_connection(ngx_socket_t s, ngx_log_t *log)
|
|
600 {
|
110
|
601 ngx_uint_t instance;
|
|
602 ngx_event_t *rev, *wev;
|
|
603 ngx_connection_t *c;
|
92
|
604
|
|
605 /* disable warning: Win32 SOCKET is u_int while UNIX socket is int */
|
|
606
|
|
607 if (ngx_cycle->files && (ngx_uint_t) s >= ngx_cycle->files_n) {
|
|
608 ngx_log_error(NGX_LOG_ALERT, log, 0,
|
|
609 "the new socket has number %d, "
|
|
610 "but only %ui files are available",
|
|
611 s, ngx_cycle->files_n);
|
|
612 return NULL;
|
|
613 }
|
|
614
|
|
615 /* ngx_mutex_lock */
|
|
616
|
|
617 c = ngx_cycle->free_connections;
|
|
618
|
|
619 if (c == NULL) {
|
|
620 ngx_log_error(NGX_LOG_ALERT, log, 0,
|
440
|
621 "%ui worker_connections are not enough",
|
92
|
622 ngx_cycle->connection_n);
|
|
623
|
|
624 /* ngx_mutex_unlock */
|
|
625
|
|
626 return NULL;
|
|
627 }
|
|
628
|
|
629 ngx_cycle->free_connections = c->data;
|
|
630 ngx_cycle->free_connection_n--;
|
|
631
|
|
632 /* ngx_mutex_unlock */
|
|
633
|
|
634 if (ngx_cycle->files) {
|
|
635 ngx_cycle->files[s] = c;
|
|
636 }
|
|
637
|
110
|
638 rev = c->read;
|
|
639 wev = c->write;
|
|
640
|
|
641 ngx_memzero(c, sizeof(ngx_connection_t));
|
|
642
|
|
643 c->read = rev;
|
|
644 c->write = wev;
|
|
645 c->fd = s;
|
|
646 c->log = log;
|
|
647
|
|
648 instance = rev->instance;
|
|
649
|
|
650 ngx_memzero(rev, sizeof(ngx_event_t));
|
|
651 ngx_memzero(wev, sizeof(ngx_event_t));
|
|
652
|
|
653 rev->instance = !instance;
|
|
654 wev->instance = !instance;
|
|
655
|
|
656 rev->index = NGX_INVALID_INDEX;
|
|
657 wev->index = NGX_INVALID_INDEX;
|
|
658
|
|
659 rev->data = c;
|
|
660 wev->data = c;
|
|
661
|
|
662 wev->write = 1;
|
|
663
|
92
|
664 return c;
|
|
665 }
|
|
666
|
|
667
|
|
668 void
|
|
669 ngx_free_connection(ngx_connection_t *c)
|
|
670 {
|
|
671 /* ngx_mutex_lock */
|
|
672
|
|
673 c->data = ngx_cycle->free_connections;
|
|
674 ngx_cycle->free_connections = c;
|
|
675 ngx_cycle->free_connection_n++;
|
|
676
|
|
677 /* ngx_mutex_unlock */
|
|
678
|
|
679 if (ngx_cycle->files) {
|
|
680 ngx_cycle->files[c->fd] = NULL;
|
0
|
681 }
|
|
682 }
|
|
683
|
|
684
|
70
|
685 void
|
|
686 ngx_close_connection(ngx_connection_t *c)
|
0
|
687 {
|
366
|
688 ngx_err_t err;
|
|
689 ngx_uint_t log_error, level;
|
0
|
690 ngx_socket_t fd;
|
|
691
|
28
|
692 if (c->fd == -1) {
|
0
|
693 ngx_log_error(NGX_LOG_ALERT, c->log, 0, "connection already closed");
|
|
694 return;
|
|
695 }
|
|
696
|
|
697 if (c->read->timer_set) {
|
|
698 ngx_del_timer(c->read);
|
|
699 }
|
126
|
700
|
0
|
701 if (c->write->timer_set) {
|
|
702 ngx_del_timer(c->write);
|
|
703 }
|
126
|
704
|
0
|
705 if (ngx_del_conn) {
|
|
706 ngx_del_conn(c, NGX_CLOSE_EVENT);
|
|
707
|
|
708 } else {
|
|
709 if (c->read->active || c->read->disabled) {
|
|
710 ngx_del_event(c->read, NGX_READ_EVENT, NGX_CLOSE_EVENT);
|
|
711 }
|
|
712
|
|
713 if (c->write->active || c->write->disabled) {
|
|
714 ngx_del_event(c->write, NGX_WRITE_EVENT, NGX_CLOSE_EVENT);
|
|
715 }
|
|
716 }
|
|
717
|
|
718 #if (NGX_THREADS)
|
|
719
|
|
720 /*
|
|
721 * we have to clean the connection information before the closing
|
|
722 * because another thread may reopen the same file descriptor
|
|
723 * before we clean the connection
|
|
724 */
|
|
725
|
112
|
726 ngx_mutex_lock(ngx_posted_events_mutex);
|
0
|
727
|
112
|
728 if (c->read->prev) {
|
|
729 ngx_delete_posted_event(c->read);
|
|
730 }
|
0
|
731
|
112
|
732 if (c->write->prev) {
|
|
733 ngx_delete_posted_event(c->write);
|
|
734 }
|
0
|
735
|
112
|
736 c->read->closed = 1;
|
|
737 c->write->closed = 1;
|
0
|
738
|
112
|
739 if (c->single_connection) {
|
|
740 ngx_unlock(&c->lock);
|
|
741 c->read->locked = 0;
|
|
742 c->write->locked = 0;
|
|
743 }
|
0
|
744
|
112
|
745 ngx_mutex_unlock(ngx_posted_events_mutex);
|
0
|
746
|
|
747 #else
|
|
748
|
|
749 if (c->read->prev) {
|
|
750 ngx_delete_posted_event(c->read);
|
|
751 }
|
|
752
|
|
753 if (c->write->prev) {
|
|
754 ngx_delete_posted_event(c->write);
|
|
755 }
|
|
756
|
|
757 c->read->closed = 1;
|
|
758 c->write->closed = 1;
|
|
759
|
|
760 #endif
|
|
761
|
366
|
762 log_error = c->log_error;
|
|
763
|
92
|
764 ngx_free_connection(c);
|
|
765
|
0
|
766 fd = c->fd;
|
|
767 c->fd = (ngx_socket_t) -1;
|
|
768
|
|
769 if (ngx_close_socket(fd) == -1) {
|
|
770
|
366
|
771 err = ngx_socket_errno;
|
|
772
|
|
773 if (err == NGX_ECONNRESET || err == NGX_ENOTCONN) {
|
|
774
|
|
775 switch (log_error) {
|
|
776
|
|
777 case NGX_ERROR_INFO:
|
|
778 level = NGX_LOG_INFO;
|
|
779 break;
|
|
780
|
|
781 case NGX_ERROR_ERR:
|
|
782 level = NGX_LOG_ERR;
|
|
783 break;
|
|
784
|
|
785 default:
|
|
786 level = NGX_LOG_CRIT;
|
|
787 }
|
|
788
|
|
789 } else {
|
|
790 level = NGX_LOG_CRIT;
|
|
791 }
|
|
792
|
0
|
793 /* we use ngx_cycle->log because c->log was in c->pool */
|
|
794
|
366
|
795 ngx_log_error(level, ngx_cycle->log, err,
|
332
|
796 ngx_close_socket_n " %d failed", fd);
|
0
|
797 }
|
|
798 }
|
|
799
|
|
800
|
70
|
801 ngx_int_t
|
|
802 ngx_connection_error(ngx_connection_t *c, ngx_err_t err, char *text)
|
0
|
803 {
|
|
804 ngx_uint_t level;
|
|
805
|
524
|
806 /* Winsock may return NGX_ECONNABORTED instead of NGX_ECONNRESET */
|
|
807
|
|
808 if ((err == NGX_ECONNRESET
|
|
809 #if (NGX_WIN32)
|
|
810 || err == NGX_ECONNABORTED
|
|
811 #endif
|
|
812 ) && c->log_error == NGX_ERROR_IGNORE_ECONNRESET)
|
|
813 {
|
0
|
814 return 0;
|
|
815 }
|
|
816
|
499
|
817 #if (NGX_SOLARIS)
|
|
818 if (err == NGX_EINVAL && c->log_error == NGX_ERROR_IGNORE_EINVAL) {
|
|
819 return 0;
|
|
820 }
|
|
821 #endif
|
|
822
|
86
|
823 if (err == 0
|
|
824 || err == NGX_ECONNRESET
|
524
|
825 #if (NGX_WIN32)
|
|
826 || err == NGX_ECONNABORTED
|
|
827 #else
|
0
|
828 || err == NGX_EPIPE
|
|
829 #endif
|
|
830 || err == NGX_ENOTCONN
|
136
|
831 || err == NGX_ETIMEDOUT
|
0
|
832 || err == NGX_ECONNREFUSED
|
364
|
833 || err == NGX_ENETDOWN
|
|
834 || err == NGX_ENETUNREACH
|
|
835 || err == NGX_EHOSTDOWN
|
0
|
836 || err == NGX_EHOSTUNREACH)
|
|
837 {
|
|
838 switch (c->log_error) {
|
|
839
|
499
|
840 case NGX_ERROR_IGNORE_EINVAL:
|
0
|
841 case NGX_ERROR_IGNORE_ECONNRESET:
|
|
842 case NGX_ERROR_INFO:
|
|
843 level = NGX_LOG_INFO;
|
|
844 break;
|
|
845
|
|
846 case NGX_ERROR_ERR:
|
|
847 level = NGX_LOG_ERR;
|
|
848 break;
|
|
849
|
|
850 default:
|
366
|
851 level = NGX_LOG_ALERT;
|
0
|
852 }
|
|
853
|
|
854 } else {
|
366
|
855 level = NGX_LOG_ALERT;
|
0
|
856 }
|
|
857
|
|
858 ngx_log_error(level, c->log, err, text);
|
|
859
|
|
860 return NGX_ERROR;
|
|
861 }
|