3 * Copyright (C) Igor Sysoev
4 * Copyright (C) Nginx, Inc.
8 #include <ngx_config.h>
10 #include <ngx_event.h>
13 static ngx_int_t ngx_enable_accept_events(ngx_cycle_t *cycle);
14 static ngx_int_t ngx_disable_accept_events(ngx_cycle_t *cycle, ngx_uint_t all);
15 static void ngx_close_accepted_connection(ngx_connection_t *c);
17 static void ngx_debug_accepted_connection(ngx_event_conf_t *ecf,
23 ngx_event_accept(ngx_event_t *ev)
30 ngx_event_t *rev, *wev;
33 ngx_connection_t *c, *lc;
34 ngx_event_conf_t *ecf;
35 #if (NGX_HAVE_ACCEPT4)
36 static ngx_uint_t use_accept4 = 1;
40 if (ngx_enable_accept_events((ngx_cycle_t *) ngx_cycle) != NGX_OK) {
47 ecf = ngx_event_get_conf(ngx_cycle->conf_ctx, ngx_event_core_module);
49 if (!(ngx_event_flags & NGX_USE_KQUEUE_EVENT)) {
50 ev->available = ecf->multi_accept;
57 ngx_log_debug2(NGX_LOG_DEBUG_EVENT, ev->log, 0,
58 "accept on %V, ready: %d", &ls->addr_text, ev->available);
61 socklen = sizeof(ngx_sockaddr_t);
63 #if (NGX_HAVE_ACCEPT4)
65 s = accept4(lc->fd, &sa.sockaddr, &socklen, SOCK_NONBLOCK);
67 s = accept(lc->fd, &sa.sockaddr, &socklen);
70 s = accept(lc->fd, &sa.sockaddr, &socklen);
73 if (s == (ngx_socket_t) -1) {
74 err = ngx_socket_errno;
76 if (err == NGX_EAGAIN) {
77 ngx_log_debug0(NGX_LOG_DEBUG_EVENT, ev->log, err,
78 "accept() not ready");
82 level = NGX_LOG_ALERT;
84 if (err == NGX_ECONNABORTED) {
87 } else if (err == NGX_EMFILE || err == NGX_ENFILE) {
91 #if (NGX_HAVE_ACCEPT4)
92 ngx_log_error(level, ev->log, err,
93 use_accept4 ? "accept4() failed" : "accept() failed");
95 if (use_accept4 && err == NGX_ENOSYS) {
97 ngx_inherited_nonblocking = 0;
101 ngx_log_error(level, ev->log, err, "accept() failed");
104 if (err == NGX_ECONNABORTED) {
105 if (ngx_event_flags & NGX_USE_KQUEUE_EVENT) {
114 if (err == NGX_EMFILE || err == NGX_ENFILE) {
115 if (ngx_disable_accept_events((ngx_cycle_t *) ngx_cycle, 1)
121 if (ngx_use_accept_mutex) {
122 if (ngx_accept_mutex_held) {
123 ngx_shmtx_unlock(&ngx_accept_mutex);
124 ngx_accept_mutex_held = 0;
127 ngx_accept_disabled = 1;
130 ngx_add_timer(ev, ecf->accept_mutex_delay);
138 (void) ngx_atomic_fetch_add(ngx_stat_accepted, 1);
141 ngx_accept_disabled = ngx_cycle->connection_n / 8
142 - ngx_cycle->free_connection_n;
144 c = ngx_get_connection(s, ev->log);
147 if (ngx_close_socket(s) == -1) {
148 ngx_log_error(NGX_LOG_ALERT, ev->log, ngx_socket_errno,
149 ngx_close_socket_n " failed");
155 c->type = SOCK_STREAM;
158 (void) ngx_atomic_fetch_add(ngx_stat_active, 1);
161 c->pool = ngx_create_pool(ls->pool_size, ev->log);
162 if (c->pool == NULL) {
163 ngx_close_accepted_connection(c);
167 c->sockaddr = ngx_palloc(c->pool, socklen);
168 if (c->sockaddr == NULL) {
169 ngx_close_accepted_connection(c);
173 ngx_memcpy(c->sockaddr, &sa, socklen);
175 log = ngx_palloc(c->pool, sizeof(ngx_log_t));
177 ngx_close_accepted_connection(c);
181 /* set a blocking mode for iocp and non-blocking mode for others */
183 if (ngx_inherited_nonblocking) {
184 if (ngx_event_flags & NGX_USE_IOCP_EVENT) {
185 if (ngx_blocking(s) == -1) {
186 ngx_log_error(NGX_LOG_ALERT, ev->log, ngx_socket_errno,
187 ngx_blocking_n " failed");
188 ngx_close_accepted_connection(c);
194 if (!(ngx_event_flags & NGX_USE_IOCP_EVENT)) {
195 if (ngx_nonblocking(s) == -1) {
196 ngx_log_error(NGX_LOG_ALERT, ev->log, ngx_socket_errno,
197 ngx_nonblocking_n " failed");
198 ngx_close_accepted_connection(c);
208 c->recv_chain = ngx_recv_chain;
209 c->send_chain = ngx_send_chain;
214 c->socklen = socklen;
216 c->local_sockaddr = ls->sockaddr;
217 c->local_socklen = ls->socklen;
219 #if (NGX_HAVE_UNIX_DOMAIN)
220 if (c->sockaddr->sa_family == AF_UNIX) {
221 c->tcp_nopush = NGX_TCP_NOPUSH_DISABLED;
222 c->tcp_nodelay = NGX_TCP_NODELAY_DISABLED;
224 /* Solaris's sendfilev() supports AF_NCA, AF_INET, and AF_INET6 */
235 if (ngx_event_flags & NGX_USE_IOCP_EVENT) {
239 if (ev->deferred_accept) {
241 #if (NGX_HAVE_KQUEUE)
250 * TODO: MT: - ngx_atomic_fetch_add()
251 * or protection by critical section or light mutex
253 * TODO: MP: - allocated in a shared memory
254 * - ngx_atomic_fetch_add()
255 * or protection by critical section or light mutex
258 c->number = ngx_atomic_fetch_add(ngx_connection_counter, 1);
261 (void) ngx_atomic_fetch_add(ngx_stat_handled, 1);
265 c->addr_text.data = ngx_pnalloc(c->pool, ls->addr_text_max_len);
266 if (c->addr_text.data == NULL) {
267 ngx_close_accepted_connection(c);
271 c->addr_text.len = ngx_sock_ntop(c->sockaddr, c->socklen,
273 ls->addr_text_max_len, 0);
274 if (c->addr_text.len == 0) {
275 ngx_close_accepted_connection(c);
283 u_char text[NGX_SOCKADDR_STRLEN];
285 ngx_debug_accepted_connection(ecf, c);
287 if (log->log_level & NGX_LOG_DEBUG_EVENT) {
289 addr.len = ngx_sock_ntop(c->sockaddr, c->socklen, text,
290 NGX_SOCKADDR_STRLEN, 1);
292 ngx_log_debug3(NGX_LOG_DEBUG_EVENT, log, 0,
293 "*%uA accept: %V fd:%d", c->number, &addr, s);
299 if (ngx_add_conn && (ngx_event_flags & NGX_USE_EPOLL_EVENT) == 0) {
300 if (ngx_add_conn(c) == NGX_ERROR) {
301 ngx_close_accepted_connection(c);
311 if (ngx_event_flags & NGX_USE_KQUEUE_EVENT) {
315 } while (ev->available);
322 ngx_event_recvmsg(ngx_event_t *ev)
327 ngx_event_t *rev, *wev;
332 ngx_event_conf_t *ecf;
333 ngx_connection_t *c, *lc;
334 static u_char buffer[65535];
336 #if (NGX_HAVE_MSGHDR_MSG_CONTROL)
338 #if (NGX_HAVE_IP_RECVDSTADDR)
339 u_char msg_control[CMSG_SPACE(sizeof(struct in_addr))];
340 #elif (NGX_HAVE_IP_PKTINFO)
341 u_char msg_control[CMSG_SPACE(sizeof(struct in_pktinfo))];
344 #if (NGX_HAVE_INET6 && NGX_HAVE_IPV6_RECVPKTINFO)
345 u_char msg_control6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
351 if (ngx_enable_accept_events((ngx_cycle_t *) ngx_cycle) != NGX_OK) {
358 ecf = ngx_event_get_conf(ngx_cycle->conf_ctx, ngx_event_core_module);
360 if (!(ngx_event_flags & NGX_USE_KQUEUE_EVENT)) {
361 ev->available = ecf->multi_accept;
368 ngx_log_debug2(NGX_LOG_DEBUG_EVENT, ev->log, 0,
369 "recvmsg on %V, ready: %d", &ls->addr_text, ev->available);
372 ngx_memzero(&msg, sizeof(struct msghdr));
374 iov[0].iov_base = (void *) buffer;
375 iov[0].iov_len = sizeof(buffer);
378 msg.msg_namelen = sizeof(ngx_sockaddr_t);
382 #if (NGX_HAVE_MSGHDR_MSG_CONTROL)
386 #if (NGX_HAVE_IP_RECVDSTADDR || NGX_HAVE_IP_PKTINFO)
387 if (ls->sockaddr->sa_family == AF_INET) {
388 msg.msg_control = &msg_control;
389 msg.msg_controllen = sizeof(msg_control);
393 #if (NGX_HAVE_INET6 && NGX_HAVE_IPV6_RECVPKTINFO)
394 if (ls->sockaddr->sa_family == AF_INET6) {
395 msg.msg_control = &msg_control6;
396 msg.msg_controllen = sizeof(msg_control6);
403 n = recvmsg(lc->fd, &msg, 0);
406 err = ngx_socket_errno;
408 if (err == NGX_EAGAIN) {
409 ngx_log_debug0(NGX_LOG_DEBUG_EVENT, ev->log, err,
410 "recvmsg() not ready");
414 ngx_log_error(NGX_LOG_ALERT, ev->log, err, "recvmsg() failed");
420 (void) ngx_atomic_fetch_add(ngx_stat_accepted, 1);
423 #if (NGX_HAVE_MSGHDR_MSG_CONTROL)
424 if (msg.msg_flags & (MSG_TRUNC|MSG_CTRUNC)) {
425 ngx_log_error(NGX_LOG_ALERT, ev->log, 0,
426 "recvmsg() truncated data");
431 ngx_accept_disabled = ngx_cycle->connection_n / 8
432 - ngx_cycle->free_connection_n;
434 c = ngx_get_connection(lc->fd, ev->log);
440 c->type = SOCK_DGRAM;
441 c->socklen = msg.msg_namelen;
444 (void) ngx_atomic_fetch_add(ngx_stat_active, 1);
447 c->pool = ngx_create_pool(ls->pool_size, ev->log);
448 if (c->pool == NULL) {
449 ngx_close_accepted_connection(c);
453 c->sockaddr = ngx_palloc(c->pool, c->socklen);
454 if (c->sockaddr == NULL) {
455 ngx_close_accepted_connection(c);
459 ngx_memcpy(c->sockaddr, msg.msg_name, c->socklen);
461 log = ngx_palloc(c->pool, sizeof(ngx_log_t));
463 ngx_close_accepted_connection(c);
469 c->send = ngx_udp_send;
470 c->send_chain = ngx_udp_send_chain;
476 c->local_sockaddr = ls->sockaddr;
477 c->local_socklen = ls->socklen;
479 #if (NGX_HAVE_MSGHDR_MSG_CONTROL)
482 struct cmsghdr *cmsg;
483 struct sockaddr *sockaddr;
485 sockaddr = ngx_palloc(c->pool, c->local_socklen);
486 if (sockaddr == NULL) {
487 ngx_close_accepted_connection(c);
491 ngx_memcpy(sockaddr, c->local_sockaddr, c->local_socklen);
492 c->local_sockaddr = sockaddr;
494 for (cmsg = CMSG_FIRSTHDR(&msg);
496 cmsg = CMSG_NXTHDR(&msg, cmsg))
499 #if (NGX_HAVE_IP_RECVDSTADDR)
501 if (cmsg->cmsg_level == IPPROTO_IP
502 && cmsg->cmsg_type == IP_RECVDSTADDR
503 && sockaddr->sa_family == AF_INET)
505 struct in_addr *addr;
506 struct sockaddr_in *sin;
508 addr = (struct in_addr *) CMSG_DATA(cmsg);
509 sin = (struct sockaddr_in *) sockaddr;
510 sin->sin_addr = *addr;
515 #elif (NGX_HAVE_IP_PKTINFO)
517 if (cmsg->cmsg_level == IPPROTO_IP
518 && cmsg->cmsg_type == IP_PKTINFO
519 && sockaddr->sa_family == AF_INET)
521 struct in_pktinfo *pkt;
522 struct sockaddr_in *sin;
524 pkt = (struct in_pktinfo *) CMSG_DATA(cmsg);
525 sin = (struct sockaddr_in *) sockaddr;
526 sin->sin_addr = pkt->ipi_addr;
533 #if (NGX_HAVE_INET6 && NGX_HAVE_IPV6_RECVPKTINFO)
535 if (cmsg->cmsg_level == IPPROTO_IPV6
536 && cmsg->cmsg_type == IPV6_PKTINFO
537 && sockaddr->sa_family == AF_INET6)
539 struct in6_pktinfo *pkt6;
540 struct sockaddr_in6 *sin6;
542 pkt6 = (struct in6_pktinfo *) CMSG_DATA(cmsg);
543 sin6 = (struct sockaddr_in6 *) sockaddr;
544 sin6->sin6_addr = pkt6->ipi6_addr;
556 c->buffer = ngx_create_temp_buf(c->pool, n);
557 if (c->buffer == NULL) {
558 ngx_close_accepted_connection(c);
562 c->buffer->last = ngx_cpymem(c->buffer->last, buffer, n);
573 * TODO: MT: - ngx_atomic_fetch_add()
574 * or protection by critical section or light mutex
576 * TODO: MP: - allocated in a shared memory
577 * - ngx_atomic_fetch_add()
578 * or protection by critical section or light mutex
581 c->number = ngx_atomic_fetch_add(ngx_connection_counter, 1);
584 (void) ngx_atomic_fetch_add(ngx_stat_handled, 1);
588 c->addr_text.data = ngx_pnalloc(c->pool, ls->addr_text_max_len);
589 if (c->addr_text.data == NULL) {
590 ngx_close_accepted_connection(c);
594 c->addr_text.len = ngx_sock_ntop(c->sockaddr, c->socklen,
596 ls->addr_text_max_len, 0);
597 if (c->addr_text.len == 0) {
598 ngx_close_accepted_connection(c);
606 u_char text[NGX_SOCKADDR_STRLEN];
608 ngx_debug_accepted_connection(ecf, c);
610 if (log->log_level & NGX_LOG_DEBUG_EVENT) {
612 addr.len = ngx_sock_ntop(c->sockaddr, c->socklen, text,
613 NGX_SOCKADDR_STRLEN, 1);
615 ngx_log_debug4(NGX_LOG_DEBUG_EVENT, log, 0,
616 "*%uA recvmsg: %V fd:%d n:%z",
617 c->number, &addr, c->fd, n);
628 if (ngx_event_flags & NGX_USE_KQUEUE_EVENT) {
632 } while (ev->available);
639 ngx_trylock_accept_mutex(ngx_cycle_t *cycle)
641 if (ngx_shmtx_trylock(&ngx_accept_mutex)) {
643 ngx_log_debug0(NGX_LOG_DEBUG_EVENT, cycle->log, 0,
644 "accept mutex locked");
646 if (ngx_accept_mutex_held && ngx_accept_events == 0) {
650 if (ngx_enable_accept_events(cycle) == NGX_ERROR) {
651 ngx_shmtx_unlock(&ngx_accept_mutex);
655 ngx_accept_events = 0;
656 ngx_accept_mutex_held = 1;
661 ngx_log_debug1(NGX_LOG_DEBUG_EVENT, cycle->log, 0,
662 "accept mutex lock failed: %ui", ngx_accept_mutex_held);
664 if (ngx_accept_mutex_held) {
665 if (ngx_disable_accept_events(cycle, 0) == NGX_ERROR) {
669 ngx_accept_mutex_held = 0;
677 ngx_enable_accept_events(ngx_cycle_t *cycle)
683 ls = cycle->listening.elts;
684 for (i = 0; i < cycle->listening.nelts; i++) {
686 c = ls[i].connection;
688 if (c == NULL || c->read->active) {
692 if (ngx_add_event(c->read, NGX_READ_EVENT, 0) == NGX_ERROR) {
702 ngx_disable_accept_events(ngx_cycle_t *cycle, ngx_uint_t all)
708 ls = cycle->listening.elts;
709 for (i = 0; i < cycle->listening.nelts; i++) {
711 c = ls[i].connection;
713 if (c == NULL || !c->read->active) {
717 #if (NGX_HAVE_REUSEPORT)
720 * do not disable accept on worker's own sockets
721 * when disabling accept events due to accept mutex
724 if (ls[i].reuseport && !all) {
730 if (ngx_del_event(c->read, NGX_READ_EVENT, NGX_DISABLE_EVENT)
742 ngx_close_accepted_connection(ngx_connection_t *c)
746 ngx_free_connection(c);
749 c->fd = (ngx_socket_t) -1;
751 if (!c->shared && ngx_close_socket(fd) == -1) {
752 ngx_log_error(NGX_LOG_ALERT, c->log, ngx_socket_errno,
753 ngx_close_socket_n " failed");
757 ngx_destroy_pool(c->pool);
761 (void) ngx_atomic_fetch_add(ngx_stat_active, -1);
767 ngx_accept_log_error(ngx_log_t *log, u_char *buf, size_t len)
769 return ngx_snprintf(buf, len, " while accepting new connection on %V",
777 ngx_debug_accepted_connection(ngx_event_conf_t *ecf, ngx_connection_t *c)
779 struct sockaddr_in *sin;
783 struct sockaddr_in6 *sin6;
787 cidr = ecf->debug_connection.elts;
788 for (i = 0; i < ecf->debug_connection.nelts; i++) {
789 if (cidr[i].family != (ngx_uint_t) c->sockaddr->sa_family) {
793 switch (cidr[i].family) {
797 sin6 = (struct sockaddr_in6 *) c->sockaddr;
798 for (n = 0; n < 16; n++) {
799 if ((sin6->sin6_addr.s6_addr[n]
800 & cidr[i].u.in6.mask.s6_addr[n])
801 != cidr[i].u.in6.addr.s6_addr[n])
809 #if (NGX_HAVE_UNIX_DOMAIN)
814 default: /* AF_INET */
815 sin = (struct sockaddr_in *) c->sockaddr;
816 if ((sin->sin_addr.s_addr & cidr[i].u.in.mask)
817 != cidr[i].u.in.addr)
824 c->log->log_level = NGX_LOG_DEBUG_CONNECTION|NGX_LOG_DEBUG_ALL;