mirror of
https://github.com/zeromq/libzmq.git
synced 2024-12-13 10:52:56 +01:00
8cdc4ed71a
Solution: fix them
958 lines
27 KiB
C++
958 lines
27 KiB
C++
/* SPDX-License-Identifier: MPL-2.0 */
|
|
|
|
#include "precompiled.hpp"
|
|
#include "ip.hpp"
|
|
#include "err.hpp"
|
|
#include "macros.hpp"
|
|
#include "config.hpp"
|
|
#include "address.hpp"
|
|
|
|
#if !defined ZMQ_HAVE_WINDOWS
|
|
#include <fcntl.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/stat.h>
|
|
#include <netdb.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/tcp.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
|
|
#include <vector>
|
|
#else
|
|
#include "tcp.hpp"
|
|
#ifdef ZMQ_HAVE_IPC
|
|
#include "ipc_address.hpp"
|
|
#endif
|
|
|
|
#include <direct.h>
|
|
|
|
#define rmdir _rmdir
|
|
#define unlink _unlink
|
|
#endif
|
|
|
|
#if defined ZMQ_HAVE_OPENVMS || defined ZMQ_HAVE_VXWORKS
|
|
#include <ioctl.h>
|
|
#endif
|
|
|
|
#if defined ZMQ_HAVE_VXWORKS
|
|
#include <unistd.h>
|
|
#include <sockLib.h>
|
|
#include <ioLib.h>
|
|
#endif
|
|
|
|
#if defined ZMQ_HAVE_EVENTFD
|
|
#include <sys/eventfd.h>
|
|
#endif
|
|
|
|
#if defined ZMQ_HAVE_OPENPGM
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
#define __PGM_WININT_H__
|
|
#endif
|
|
|
|
#include <pgm/pgm.h>
|
|
#endif
|
|
|
|
#ifdef __APPLE__
|
|
#include <TargetConditionals.h>
|
|
#endif
|
|
|
|
#ifndef ZMQ_HAVE_WINDOWS
|
|
// Acceptable temporary directory environment variables
|
|
static const char *tmp_env_vars[] = {
|
|
"TMPDIR", "TEMPDIR", "TMP",
|
|
0 // Sentinel
|
|
};
|
|
#endif
|
|
|
|
zmq::fd_t zmq::open_socket (int domain_, int type_, int protocol_)
|
|
{
|
|
int rc;
|
|
|
|
// Setting this option result in sane behaviour when exec() functions
|
|
// are used. Old sockets are closed and don't block TCP ports etc.
|
|
#if defined ZMQ_HAVE_SOCK_CLOEXEC
|
|
type_ |= SOCK_CLOEXEC;
|
|
#endif
|
|
|
|
#if defined ZMQ_HAVE_WINDOWS && defined WSA_FLAG_NO_HANDLE_INHERIT
|
|
// if supported, create socket with WSA_FLAG_NO_HANDLE_INHERIT, such that
|
|
// the race condition in making it non-inheritable later is avoided
|
|
const fd_t s = WSASocket (domain_, type_, protocol_, NULL, 0,
|
|
WSA_FLAG_OVERLAPPED | WSA_FLAG_NO_HANDLE_INHERIT);
|
|
#else
|
|
const fd_t s = socket (domain_, type_, protocol_);
|
|
#endif
|
|
if (s == retired_fd) {
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
errno = wsa_error_to_errno (WSAGetLastError ());
|
|
#endif
|
|
return retired_fd;
|
|
}
|
|
|
|
make_socket_noninheritable (s);
|
|
|
|
// Socket is not yet connected so EINVAL is not a valid networking error
|
|
rc = zmq::set_nosigpipe (s);
|
|
errno_assert (rc == 0);
|
|
|
|
return s;
|
|
}
|
|
|
|
void zmq::unblock_socket (fd_t s_)
|
|
{
|
|
#if defined ZMQ_HAVE_WINDOWS
|
|
u_long nonblock = 1;
|
|
const int rc = ioctlsocket (s_, FIONBIO, &nonblock);
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
#elif defined ZMQ_HAVE_OPENVMS || defined ZMQ_HAVE_VXWORKS
|
|
int nonblock = 1;
|
|
int rc = ioctl (s_, FIONBIO, &nonblock);
|
|
errno_assert (rc != -1);
|
|
#else
|
|
int flags = fcntl (s_, F_GETFL, 0);
|
|
if (flags == -1)
|
|
flags = 0;
|
|
int rc = fcntl (s_, F_SETFL, flags | O_NONBLOCK);
|
|
errno_assert (rc != -1);
|
|
#endif
|
|
}
|
|
|
|
void zmq::enable_ipv4_mapping (fd_t s_)
|
|
{
|
|
LIBZMQ_UNUSED (s_);
|
|
|
|
#if defined IPV6_V6ONLY && !defined ZMQ_HAVE_OPENBSD \
|
|
&& !defined ZMQ_HAVE_DRAGONFLY
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
DWORD flag = 0;
|
|
#else
|
|
int flag = 0;
|
|
#endif
|
|
const int rc = setsockopt (s_, IPPROTO_IPV6, IPV6_V6ONLY,
|
|
reinterpret_cast<char *> (&flag), sizeof (flag));
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
#else
|
|
errno_assert (rc == 0);
|
|
#endif
|
|
#endif
|
|
}
|
|
|
|
int zmq::get_peer_ip_address (fd_t sockfd_, std::string &ip_addr_)
|
|
{
|
|
struct sockaddr_storage ss;
|
|
|
|
const zmq_socklen_t addrlen =
|
|
get_socket_address (sockfd_, socket_end_remote, &ss);
|
|
|
|
if (addrlen == 0) {
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
const int last_error = WSAGetLastError ();
|
|
wsa_assert (last_error != WSANOTINITIALISED && last_error != WSAEFAULT
|
|
&& last_error != WSAEINPROGRESS
|
|
&& last_error != WSAENOTSOCK);
|
|
#elif !defined(TARGET_OS_IPHONE) || !TARGET_OS_IPHONE
|
|
errno_assert (errno != EBADF && errno != EFAULT && errno != ENOTSOCK);
|
|
#else
|
|
errno_assert (errno != EFAULT && errno != ENOTSOCK);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
char host[NI_MAXHOST];
|
|
const int rc =
|
|
getnameinfo (reinterpret_cast<struct sockaddr *> (&ss), addrlen, host,
|
|
sizeof host, NULL, 0, NI_NUMERICHOST);
|
|
if (rc != 0)
|
|
return 0;
|
|
|
|
ip_addr_ = host;
|
|
|
|
union
|
|
{
|
|
struct sockaddr sa;
|
|
struct sockaddr_storage sa_stor;
|
|
} u;
|
|
|
|
u.sa_stor = ss;
|
|
return static_cast<int> (u.sa.sa_family);
|
|
}
|
|
|
|
void zmq::set_ip_type_of_service (fd_t s_, int iptos_)
|
|
{
|
|
int rc = setsockopt (s_, IPPROTO_IP, IP_TOS,
|
|
reinterpret_cast<char *> (&iptos_), sizeof (iptos_));
|
|
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
#else
|
|
errno_assert (rc == 0);
|
|
#endif
|
|
|
|
// Windows and Hurd do not support IPV6_TCLASS
|
|
#if !defined(ZMQ_HAVE_WINDOWS) && defined(IPV6_TCLASS)
|
|
rc = setsockopt (s_, IPPROTO_IPV6, IPV6_TCLASS,
|
|
reinterpret_cast<char *> (&iptos_), sizeof (iptos_));
|
|
|
|
// If IPv6 is not enabled ENOPROTOOPT will be returned on Linux and
|
|
// EINVAL on OSX
|
|
if (rc == -1) {
|
|
errno_assert (errno == ENOPROTOOPT || errno == EINVAL);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void zmq::set_socket_priority (fd_t s_, int priority_)
|
|
{
|
|
#ifdef ZMQ_HAVE_SO_PRIORITY
|
|
int rc =
|
|
setsockopt (s_, SOL_SOCKET, SO_PRIORITY,
|
|
reinterpret_cast<char *> (&priority_), sizeof (priority_));
|
|
errno_assert (rc == 0);
|
|
#else
|
|
LIBZMQ_UNUSED (s_);
|
|
LIBZMQ_UNUSED (priority_);
|
|
#endif
|
|
}
|
|
|
|
int zmq::set_nosigpipe (fd_t s_)
|
|
{
|
|
#ifdef SO_NOSIGPIPE
|
|
// Make sure that SIGPIPE signal is not generated when writing to a
|
|
// connection that was already closed by the peer.
|
|
// As per POSIX spec, EINVAL will be returned if the socket was valid but
|
|
// the connection has been reset by the peer. Return an error so that the
|
|
// socket can be closed and the connection retried if necessary.
|
|
int set = 1;
|
|
int rc = setsockopt (s_, SOL_SOCKET, SO_NOSIGPIPE, &set, sizeof (int));
|
|
if (rc != 0 && errno == EINVAL)
|
|
return -1;
|
|
errno_assert (rc == 0);
|
|
#else
|
|
LIBZMQ_UNUSED (s_);
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
int zmq::bind_to_device (fd_t s_, const std::string &bound_device_)
|
|
{
|
|
#ifdef ZMQ_HAVE_SO_BINDTODEVICE
|
|
int rc = setsockopt (s_, SOL_SOCKET, SO_BINDTODEVICE,
|
|
bound_device_.c_str (), bound_device_.length ());
|
|
if (rc != 0) {
|
|
assert_success_or_recoverable (s_, rc);
|
|
return -1;
|
|
}
|
|
return 0;
|
|
|
|
#else
|
|
LIBZMQ_UNUSED (s_);
|
|
LIBZMQ_UNUSED (bound_device_);
|
|
|
|
errno = ENOTSUP;
|
|
return -1;
|
|
#endif
|
|
}
|
|
|
|
bool zmq::initialize_network ()
|
|
{
|
|
#if defined ZMQ_HAVE_OPENPGM
|
|
|
|
// Init PGM transport. Ensure threading and timer are enabled. Find PGM
|
|
// protocol ID. Note that if you want to use gettimeofday and sleep for
|
|
// openPGM timing, set environment variables PGM_TIMER to "GTOD" and
|
|
// PGM_SLEEP to "USLEEP".
|
|
pgm_error_t *pgm_error = NULL;
|
|
const bool ok = pgm_init (&pgm_error);
|
|
if (ok != TRUE) {
|
|
// Invalid parameters don't set pgm_error_t
|
|
zmq_assert (pgm_error != NULL);
|
|
if (pgm_error->domain == PGM_ERROR_DOMAIN_TIME
|
|
&& (pgm_error->code == PGM_ERROR_FAILED)) {
|
|
// Failed to access RTC or HPET device.
|
|
pgm_error_free (pgm_error);
|
|
errno = EINVAL;
|
|
return false;
|
|
}
|
|
|
|
// PGM_ERROR_DOMAIN_ENGINE: WSAStartup errors or missing WSARecvMsg.
|
|
zmq_assert (false);
|
|
}
|
|
#endif
|
|
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
// Initialise Windows sockets. Note that WSAStartup can be called multiple
|
|
// times given that WSACleanup will be called for each WSAStartup.
|
|
|
|
const WORD version_requested = MAKEWORD (2, 2);
|
|
WSADATA wsa_data;
|
|
const int rc = WSAStartup (version_requested, &wsa_data);
|
|
zmq_assert (rc == 0);
|
|
zmq_assert (LOBYTE (wsa_data.wVersion) == 2
|
|
&& HIBYTE (wsa_data.wVersion) == 2);
|
|
#endif
|
|
|
|
return true;
|
|
}
|
|
|
|
void zmq::shutdown_network ()
|
|
{
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
// On Windows, uninitialise socket layer.
|
|
const int rc = WSACleanup ();
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
#endif
|
|
|
|
#if defined ZMQ_HAVE_OPENPGM
|
|
// Shut down the OpenPGM library.
|
|
if (pgm_shutdown () != TRUE)
|
|
zmq_assert (false);
|
|
#endif
|
|
}
|
|
|
|
#if defined ZMQ_HAVE_WINDOWS
|
|
static void tune_socket (const SOCKET socket_)
|
|
{
|
|
BOOL tcp_nodelay = 1;
|
|
const int rc =
|
|
setsockopt (socket_, IPPROTO_TCP, TCP_NODELAY,
|
|
reinterpret_cast<char *> (&tcp_nodelay), sizeof tcp_nodelay);
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
|
|
zmq::tcp_tune_loopback_fast_path (socket_);
|
|
}
|
|
|
|
static int make_fdpair_tcpip (zmq::fd_t *r_, zmq::fd_t *w_)
|
|
{
|
|
#if !defined _WIN32_WCE && !defined ZMQ_HAVE_WINDOWS_UWP
|
|
// Windows CE does not manage security attributes
|
|
SECURITY_DESCRIPTOR sd;
|
|
SECURITY_ATTRIBUTES sa;
|
|
memset (&sd, 0, sizeof sd);
|
|
memset (&sa, 0, sizeof sa);
|
|
|
|
InitializeSecurityDescriptor (&sd, SECURITY_DESCRIPTOR_REVISION);
|
|
SetSecurityDescriptorDacl (&sd, TRUE, 0, FALSE);
|
|
|
|
sa.nLength = sizeof (SECURITY_ATTRIBUTES);
|
|
sa.lpSecurityDescriptor = &sd;
|
|
#endif
|
|
|
|
// This function has to be in a system-wide critical section so that
|
|
// two instances of the library don't accidentally create signaler
|
|
// crossing the process boundary.
|
|
// We'll use named event object to implement the critical section.
|
|
// Note that if the event object already exists, the CreateEvent requests
|
|
// EVENT_ALL_ACCESS access right. If this fails, we try to open
|
|
// the event object asking for SYNCHRONIZE access only.
|
|
HANDLE sync = NULL;
|
|
|
|
// Create critical section only if using fixed signaler port
|
|
// Use problematic Event implementation for compatibility if using old port 5905.
|
|
// Otherwise use Mutex implementation.
|
|
const int event_signaler_port = 5905;
|
|
|
|
if (zmq::signaler_port == event_signaler_port) {
|
|
#if !defined _WIN32_WCE && !defined ZMQ_HAVE_WINDOWS_UWP
|
|
sync =
|
|
CreateEventW (&sa, FALSE, TRUE, L"Global\\zmq-signaler-port-sync");
|
|
#else
|
|
sync =
|
|
CreateEventW (NULL, FALSE, TRUE, L"Global\\zmq-signaler-port-sync");
|
|
#endif
|
|
if (sync == NULL && GetLastError () == ERROR_ACCESS_DENIED)
|
|
sync = OpenEventW (SYNCHRONIZE | EVENT_MODIFY_STATE, FALSE,
|
|
L"Global\\zmq-signaler-port-sync");
|
|
|
|
win_assert (sync != NULL);
|
|
} else if (zmq::signaler_port != 0) {
|
|
wchar_t mutex_name[MAX_PATH];
|
|
#ifdef __MINGW32__
|
|
_snwprintf (mutex_name, MAX_PATH, L"Global\\zmq-signaler-port-%d",
|
|
zmq::signaler_port);
|
|
#else
|
|
swprintf (mutex_name, MAX_PATH, L"Global\\zmq-signaler-port-%d",
|
|
zmq::signaler_port);
|
|
#endif
|
|
|
|
#if !defined _WIN32_WCE && !defined ZMQ_HAVE_WINDOWS_UWP
|
|
sync = CreateMutexW (&sa, FALSE, mutex_name);
|
|
#else
|
|
sync = CreateMutexW (NULL, FALSE, mutex_name);
|
|
#endif
|
|
if (sync == NULL && GetLastError () == ERROR_ACCESS_DENIED)
|
|
sync = OpenMutexW (SYNCHRONIZE, FALSE, mutex_name);
|
|
|
|
win_assert (sync != NULL);
|
|
}
|
|
|
|
// Windows has no 'socketpair' function. CreatePipe is no good as pipe
|
|
// handles cannot be polled on. Here we create the socketpair by hand.
|
|
*w_ = INVALID_SOCKET;
|
|
*r_ = INVALID_SOCKET;
|
|
|
|
// Create listening socket.
|
|
SOCKET listener;
|
|
listener = zmq::open_socket (AF_INET, SOCK_STREAM, 0);
|
|
wsa_assert (listener != INVALID_SOCKET);
|
|
|
|
// Set SO_REUSEADDR and TCP_NODELAY on listening socket.
|
|
BOOL so_reuseaddr = 1;
|
|
int rc = setsockopt (listener, SOL_SOCKET, SO_REUSEADDR,
|
|
reinterpret_cast<char *> (&so_reuseaddr),
|
|
sizeof so_reuseaddr);
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
|
|
tune_socket (listener);
|
|
|
|
// Init sockaddr to signaler port.
|
|
struct sockaddr_in addr;
|
|
memset (&addr, 0, sizeof addr);
|
|
addr.sin_family = AF_INET;
|
|
addr.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
|
|
addr.sin_port = htons (zmq::signaler_port);
|
|
|
|
// Create the writer socket.
|
|
*w_ = zmq::open_socket (AF_INET, SOCK_STREAM, 0);
|
|
wsa_assert (*w_ != INVALID_SOCKET);
|
|
|
|
if (sync != NULL) {
|
|
// Enter the critical section.
|
|
const DWORD dwrc = WaitForSingleObject (sync, INFINITE);
|
|
zmq_assert (dwrc == WAIT_OBJECT_0 || dwrc == WAIT_ABANDONED);
|
|
}
|
|
|
|
// Bind listening socket to signaler port.
|
|
rc = bind (listener, reinterpret_cast<const struct sockaddr *> (&addr),
|
|
sizeof addr);
|
|
|
|
if (rc != SOCKET_ERROR && zmq::signaler_port == 0) {
|
|
// Retrieve ephemeral port number
|
|
int addrlen = sizeof addr;
|
|
rc = getsockname (listener, reinterpret_cast<struct sockaddr *> (&addr),
|
|
&addrlen);
|
|
}
|
|
|
|
// Listen for incoming connections.
|
|
if (rc != SOCKET_ERROR) {
|
|
rc = listen (listener, 1);
|
|
}
|
|
|
|
// Connect writer to the listener.
|
|
if (rc != SOCKET_ERROR) {
|
|
rc = connect (*w_, reinterpret_cast<struct sockaddr *> (&addr),
|
|
sizeof addr);
|
|
}
|
|
|
|
// Accept connection from writer.
|
|
if (rc != SOCKET_ERROR) {
|
|
// Set TCP_NODELAY on writer socket.
|
|
tune_socket (*w_);
|
|
|
|
*r_ = accept (listener, NULL, NULL);
|
|
}
|
|
|
|
// Send/receive large chunk to work around TCP slow start
|
|
// This code is a workaround for #1608
|
|
if (*r_ != INVALID_SOCKET) {
|
|
const size_t dummy_size =
|
|
1024 * 1024; // 1M to overload default receive buffer
|
|
unsigned char *dummy =
|
|
static_cast<unsigned char *> (malloc (dummy_size));
|
|
wsa_assert (dummy);
|
|
|
|
int still_to_send = static_cast<int> (dummy_size);
|
|
int still_to_recv = static_cast<int> (dummy_size);
|
|
while (still_to_send || still_to_recv) {
|
|
int nbytes;
|
|
if (still_to_send > 0) {
|
|
nbytes = ::send (
|
|
*w_,
|
|
reinterpret_cast<char *> (dummy + dummy_size - still_to_send),
|
|
still_to_send, 0);
|
|
wsa_assert (nbytes != SOCKET_ERROR);
|
|
still_to_send -= nbytes;
|
|
}
|
|
nbytes = ::recv (
|
|
*r_,
|
|
reinterpret_cast<char *> (dummy + dummy_size - still_to_recv),
|
|
still_to_recv, 0);
|
|
wsa_assert (nbytes != SOCKET_ERROR);
|
|
still_to_recv -= nbytes;
|
|
}
|
|
free (dummy);
|
|
}
|
|
|
|
// Save errno if error occurred in bind/listen/connect/accept.
|
|
int saved_errno = 0;
|
|
if (*r_ == INVALID_SOCKET)
|
|
saved_errno = WSAGetLastError ();
|
|
|
|
// We don't need the listening socket anymore. Close it.
|
|
rc = closesocket (listener);
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
|
|
if (sync != NULL) {
|
|
// Exit the critical section.
|
|
BOOL brc;
|
|
if (zmq::signaler_port == event_signaler_port)
|
|
brc = SetEvent (sync);
|
|
else
|
|
brc = ReleaseMutex (sync);
|
|
win_assert (brc != 0);
|
|
|
|
// Release the kernel object
|
|
brc = CloseHandle (sync);
|
|
win_assert (brc != 0);
|
|
}
|
|
|
|
if (*r_ != INVALID_SOCKET) {
|
|
zmq::make_socket_noninheritable (*r_);
|
|
return 0;
|
|
}
|
|
// Cleanup writer if connection failed
|
|
if (*w_ != INVALID_SOCKET) {
|
|
rc = closesocket (*w_);
|
|
wsa_assert (rc != SOCKET_ERROR);
|
|
*w_ = INVALID_SOCKET;
|
|
}
|
|
// Set errno from saved value
|
|
errno = zmq::wsa_error_to_errno (saved_errno);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
int zmq::make_fdpair (fd_t *r_, fd_t *w_)
|
|
{
|
|
#if defined ZMQ_HAVE_EVENTFD
|
|
int flags = 0;
|
|
#if defined ZMQ_HAVE_EVENTFD_CLOEXEC
|
|
// Setting this option result in sane behaviour when exec() functions
|
|
// are used. Old sockets are closed and don't block TCP ports, avoid
|
|
// leaks, etc.
|
|
flags |= EFD_CLOEXEC;
|
|
#endif
|
|
fd_t fd = eventfd (0, flags);
|
|
if (fd == -1) {
|
|
errno_assert (errno == ENFILE || errno == EMFILE);
|
|
*w_ = *r_ = -1;
|
|
return -1;
|
|
}
|
|
*w_ = *r_ = fd;
|
|
return 0;
|
|
|
|
|
|
#elif defined ZMQ_HAVE_WINDOWS
|
|
#ifdef ZMQ_HAVE_IPC
|
|
ipc_address_t address;
|
|
std::string dirname, filename;
|
|
sockaddr_un lcladdr;
|
|
socklen_t lcladdr_len = sizeof lcladdr;
|
|
int rc = 0;
|
|
int saved_errno = 0;
|
|
|
|
// It appears that a lack of runtime AF_UNIX support
|
|
// can fail in more than one way.
|
|
// At least: open_socket can fail or later in bind
|
|
bool ipc_fallback_on_tcpip = true;
|
|
|
|
// Create a listening socket.
|
|
const SOCKET listener = open_socket (AF_UNIX, SOCK_STREAM, 0);
|
|
if (listener == retired_fd) {
|
|
// This may happen if the library was built on a system supporting AF_UNIX, but the system running doesn't support it.
|
|
goto try_tcpip;
|
|
}
|
|
|
|
create_ipc_wildcard_address (dirname, filename);
|
|
|
|
// Initialise the address structure.
|
|
rc = address.resolve (filename.c_str ());
|
|
if (rc != 0) {
|
|
goto error_closelistener;
|
|
}
|
|
|
|
// Bind the socket to the file path.
|
|
rc = bind (listener, const_cast<sockaddr *> (address.addr ()),
|
|
address.addrlen ());
|
|
if (rc != 0) {
|
|
errno = wsa_error_to_errno (WSAGetLastError ());
|
|
goto error_closelistener;
|
|
}
|
|
// if we got here, ipc should be working,
|
|
// so raise any remaining errors
|
|
ipc_fallback_on_tcpip = false;
|
|
|
|
// Listen for incoming connections.
|
|
rc = listen (listener, 1);
|
|
if (rc != 0) {
|
|
errno = wsa_error_to_errno (WSAGetLastError ());
|
|
goto error_closelistener;
|
|
}
|
|
|
|
rc = getsockname (listener, reinterpret_cast<struct sockaddr *> (&lcladdr),
|
|
&lcladdr_len);
|
|
wsa_assert (rc != -1);
|
|
|
|
// Create the client socket.
|
|
*w_ = open_socket (AF_UNIX, SOCK_STREAM, 0);
|
|
if (*w_ == -1) {
|
|
errno = wsa_error_to_errno (WSAGetLastError ());
|
|
goto error_closelistener;
|
|
}
|
|
|
|
// Connect to the remote peer.
|
|
rc = ::connect (*w_, reinterpret_cast<const struct sockaddr *> (&lcladdr),
|
|
lcladdr_len);
|
|
if (rc == -1) {
|
|
goto error_closeclient;
|
|
}
|
|
|
|
*r_ = accept (listener, NULL, NULL);
|
|
errno_assert (*r_ != -1);
|
|
|
|
// Close the listener socket, we don't need it anymore.
|
|
rc = closesocket (listener);
|
|
wsa_assert (rc == 0);
|
|
|
|
// Cleanup temporary socket file descriptor
|
|
if (!filename.empty ()) {
|
|
rc = ::unlink (filename.c_str ());
|
|
if ((rc == 0) && !dirname.empty ()) {
|
|
rc = ::rmdir (dirname.c_str ());
|
|
dirname.clear ();
|
|
}
|
|
filename.clear ();
|
|
}
|
|
|
|
return 0;
|
|
|
|
error_closeclient:
|
|
saved_errno = errno;
|
|
rc = closesocket (*w_);
|
|
wsa_assert (rc == 0);
|
|
errno = saved_errno;
|
|
|
|
error_closelistener:
|
|
saved_errno = errno;
|
|
rc = closesocket (listener);
|
|
wsa_assert (rc == 0);
|
|
|
|
// Cleanup temporary socket file descriptor
|
|
if (!filename.empty ()) {
|
|
rc = ::unlink (filename.c_str ());
|
|
if ((rc == 0) && !dirname.empty ()) {
|
|
rc = ::rmdir (dirname.c_str ());
|
|
dirname.clear ();
|
|
}
|
|
filename.clear ();
|
|
}
|
|
|
|
// ipc failed due to lack of AF_UNIX support, fallback on tcpip
|
|
if (ipc_fallback_on_tcpip) {
|
|
goto try_tcpip;
|
|
}
|
|
|
|
errno = saved_errno;
|
|
return -1;
|
|
|
|
try_tcpip:
|
|
// try to fallback to TCP/IP
|
|
// TODO: maybe remember this decision permanently?
|
|
#endif
|
|
|
|
return make_fdpair_tcpip (r_, w_);
|
|
#elif defined ZMQ_HAVE_OPENVMS
|
|
|
|
// Whilst OpenVMS supports socketpair - it maps to AF_INET only. Further,
|
|
// it does not set the socket options TCP_NODELAY and TCP_NODELACK which
|
|
// can lead to performance problems.
|
|
//
|
|
// The bug will be fixed in V5.6 ECO4 and beyond. In the meantime, we'll
|
|
// create the socket pair manually.
|
|
struct sockaddr_in lcladdr;
|
|
memset (&lcladdr, 0, sizeof lcladdr);
|
|
lcladdr.sin_family = AF_INET;
|
|
lcladdr.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
|
|
lcladdr.sin_port = 0;
|
|
|
|
int listener = open_socket (AF_INET, SOCK_STREAM, 0);
|
|
errno_assert (listener != -1);
|
|
|
|
int on = 1;
|
|
int rc = setsockopt (listener, IPPROTO_TCP, TCP_NODELAY, &on, sizeof on);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = setsockopt (listener, IPPROTO_TCP, TCP_NODELACK, &on, sizeof on);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = bind (listener, (struct sockaddr *) &lcladdr, sizeof lcladdr);
|
|
errno_assert (rc != -1);
|
|
|
|
socklen_t lcladdr_len = sizeof lcladdr;
|
|
|
|
rc = getsockname (listener, (struct sockaddr *) &lcladdr, &lcladdr_len);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = listen (listener, 1);
|
|
errno_assert (rc != -1);
|
|
|
|
*w_ = open_socket (AF_INET, SOCK_STREAM, 0);
|
|
errno_assert (*w_ != -1);
|
|
|
|
rc = setsockopt (*w_, IPPROTO_TCP, TCP_NODELAY, &on, sizeof on);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = setsockopt (*w_, IPPROTO_TCP, TCP_NODELACK, &on, sizeof on);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = connect (*w_, (struct sockaddr *) &lcladdr, sizeof lcladdr);
|
|
errno_assert (rc != -1);
|
|
|
|
*r_ = accept (listener, NULL, NULL);
|
|
errno_assert (*r_ != -1);
|
|
|
|
close (listener);
|
|
|
|
return 0;
|
|
#elif defined ZMQ_HAVE_VXWORKS
|
|
struct sockaddr_in lcladdr;
|
|
memset (&lcladdr, 0, sizeof lcladdr);
|
|
lcladdr.sin_family = AF_INET;
|
|
lcladdr.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
|
|
lcladdr.sin_port = 0;
|
|
|
|
int listener = open_socket (AF_INET, SOCK_STREAM, 0);
|
|
errno_assert (listener != -1);
|
|
|
|
int on = 1;
|
|
int rc =
|
|
setsockopt (listener, IPPROTO_TCP, TCP_NODELAY, (char *) &on, sizeof on);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = bind (listener, (struct sockaddr *) &lcladdr, sizeof lcladdr);
|
|
errno_assert (rc != -1);
|
|
|
|
socklen_t lcladdr_len = sizeof lcladdr;
|
|
|
|
rc = getsockname (listener, (struct sockaddr *) &lcladdr,
|
|
(int *) &lcladdr_len);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = listen (listener, 1);
|
|
errno_assert (rc != -1);
|
|
|
|
*w_ = open_socket (AF_INET, SOCK_STREAM, 0);
|
|
errno_assert (*w_ != -1);
|
|
|
|
rc = setsockopt (*w_, IPPROTO_TCP, TCP_NODELAY, (char *) &on, sizeof on);
|
|
errno_assert (rc != -1);
|
|
|
|
rc = connect (*w_, (struct sockaddr *) &lcladdr, sizeof lcladdr);
|
|
errno_assert (rc != -1);
|
|
|
|
*r_ = accept (listener, NULL, NULL);
|
|
errno_assert (*r_ != -1);
|
|
|
|
close (listener);
|
|
|
|
return 0;
|
|
#else
|
|
// All other implementations support socketpair()
|
|
int sv[2];
|
|
int type = SOCK_STREAM;
|
|
// Setting this option result in sane behaviour when exec() functions
|
|
// are used. Old sockets are closed and don't block TCP ports, avoid
|
|
// leaks, etc.
|
|
#if defined ZMQ_HAVE_SOCK_CLOEXEC
|
|
type |= SOCK_CLOEXEC;
|
|
#endif
|
|
int rc = socketpair (AF_UNIX, type, 0, sv);
|
|
if (rc == -1) {
|
|
errno_assert (errno == ENFILE || errno == EMFILE);
|
|
*w_ = *r_ = -1;
|
|
return -1;
|
|
} else {
|
|
make_socket_noninheritable (sv[0]);
|
|
make_socket_noninheritable (sv[1]);
|
|
|
|
*w_ = sv[0];
|
|
*r_ = sv[1];
|
|
return 0;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void zmq::make_socket_noninheritable (fd_t sock_)
|
|
{
|
|
#if defined ZMQ_HAVE_WINDOWS && !defined _WIN32_WCE \
|
|
&& !defined ZMQ_HAVE_WINDOWS_UWP
|
|
// On Windows, preventing sockets to be inherited by child processes.
|
|
const BOOL brc = SetHandleInformation (reinterpret_cast<HANDLE> (sock_),
|
|
HANDLE_FLAG_INHERIT, 0);
|
|
win_assert (brc);
|
|
#elif (!defined ZMQ_HAVE_SOCK_CLOEXEC || !defined HAVE_ACCEPT4) \
|
|
&& defined FD_CLOEXEC
|
|
// If there 's no SOCK_CLOEXEC, let's try the second best option.
|
|
// Race condition can cause socket not to be closed (if fork happens
|
|
// between accept and this point).
|
|
const int rc = fcntl (sock_, F_SETFD, FD_CLOEXEC);
|
|
errno_assert (rc != -1);
|
|
#else
|
|
LIBZMQ_UNUSED (sock_);
|
|
#endif
|
|
}
|
|
|
|
void zmq::assert_success_or_recoverable (zmq::fd_t s_, int rc_)
|
|
{
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
if (rc_ != SOCKET_ERROR) {
|
|
return;
|
|
}
|
|
#else
|
|
if (rc_ != -1) {
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
// Check whether an error occurred
|
|
int err = 0;
|
|
#if defined ZMQ_HAVE_HPUX || defined ZMQ_HAVE_VXWORKS
|
|
int len = sizeof err;
|
|
#else
|
|
socklen_t len = sizeof err;
|
|
#endif
|
|
|
|
const int rc = getsockopt (s_, SOL_SOCKET, SO_ERROR,
|
|
reinterpret_cast<char *> (&err), &len);
|
|
|
|
// Assert if the error was caused by 0MQ bug.
|
|
// Networking problems are OK. No need to assert.
|
|
#ifdef ZMQ_HAVE_WINDOWS
|
|
zmq_assert (rc == 0);
|
|
if (err != 0) {
|
|
wsa_assert (err == WSAECONNREFUSED || err == WSAECONNRESET
|
|
|| err == WSAECONNABORTED || err == WSAEINTR
|
|
|| err == WSAETIMEDOUT || err == WSAEHOSTUNREACH
|
|
|| err == WSAENETUNREACH || err == WSAENETDOWN
|
|
|| err == WSAENETRESET || err == WSAEACCES
|
|
|| err == WSAEINVAL || err == WSAEADDRINUSE);
|
|
}
|
|
#else
|
|
// Following code should handle both Berkeley-derived socket
|
|
// implementations and Solaris.
|
|
if (rc == -1)
|
|
err = errno;
|
|
if (err != 0) {
|
|
errno = err;
|
|
errno_assert (errno == ECONNREFUSED || errno == ECONNRESET
|
|
|| errno == ECONNABORTED || errno == EINTR
|
|
|| errno == ETIMEDOUT || errno == EHOSTUNREACH
|
|
|| errno == ENETUNREACH || errno == ENETDOWN
|
|
|| errno == ENETRESET || errno == EINVAL);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
#ifdef ZMQ_HAVE_IPC
|
|
|
|
#if defined ZMQ_HAVE_WINDOWS
|
|
char *widechar_to_utf8 (const wchar_t *widestring)
|
|
{
|
|
int nch, n;
|
|
char *utf8 = 0;
|
|
nch = WideCharToMultiByte (CP_UTF8, 0, widestring, -1, 0, 0, NULL, NULL);
|
|
if (nch > 0) {
|
|
utf8 = (char *) malloc ((nch + 1) * sizeof (char));
|
|
n = WideCharToMultiByte (CP_UTF8, 0, widestring, -1, utf8, nch, NULL,
|
|
NULL);
|
|
utf8[nch] = 0;
|
|
}
|
|
return utf8;
|
|
}
|
|
#endif
|
|
|
|
int zmq::create_ipc_wildcard_address (std::string &path_, std::string &file_)
|
|
{
|
|
#if defined ZMQ_HAVE_WINDOWS
|
|
wchar_t buffer[MAX_PATH];
|
|
|
|
{
|
|
const errno_t rc = _wtmpnam_s (buffer);
|
|
errno_assert (rc == 0);
|
|
}
|
|
|
|
// TODO or use CreateDirectoryA and specify permissions?
|
|
const int rc = _wmkdir (buffer);
|
|
if (rc != 0) {
|
|
return -1;
|
|
}
|
|
|
|
char *tmp = widechar_to_utf8 (buffer);
|
|
if (tmp == 0) {
|
|
return -1;
|
|
}
|
|
|
|
path_.assign (tmp);
|
|
file_ = path_ + "/socket";
|
|
|
|
free (tmp);
|
|
#else
|
|
std::string tmp_path;
|
|
|
|
// If TMPDIR, TEMPDIR, or TMP are available and are directories, create
|
|
// the socket directory there.
|
|
const char **tmp_env = tmp_env_vars;
|
|
while (tmp_path.empty () && *tmp_env != 0) {
|
|
const char *const tmpdir = getenv (*tmp_env);
|
|
struct stat statbuf;
|
|
|
|
// Confirm it is actually a directory before trying to use
|
|
if (tmpdir != 0 && ::stat (tmpdir, &statbuf) == 0
|
|
&& S_ISDIR (statbuf.st_mode)) {
|
|
tmp_path.assign (tmpdir);
|
|
if (*(tmp_path.rbegin ()) != '/') {
|
|
tmp_path.push_back ('/');
|
|
}
|
|
}
|
|
|
|
// Try the next environment variable
|
|
++tmp_env;
|
|
}
|
|
|
|
// Append a directory name
|
|
tmp_path.append ("tmpXXXXXX");
|
|
|
|
// We need room for tmp_path + trailing NUL
|
|
std::vector<char> buffer (tmp_path.length () + 1);
|
|
memcpy (&buffer[0], tmp_path.c_str (), tmp_path.length () + 1);
|
|
|
|
#if defined HAVE_MKDTEMP
|
|
// Create the directory. POSIX requires that mkdtemp() creates the
|
|
// directory with 0700 permissions, meaning the only possible race
|
|
// with socket creation could be the same user. However, since
|
|
// each socket is created in a directory created by mkdtemp(), and
|
|
// mkdtemp() guarantees a unique directory name, there will be no
|
|
// collision.
|
|
if (mkdtemp (&buffer[0]) == 0) {
|
|
return -1;
|
|
}
|
|
|
|
path_.assign (&buffer[0]);
|
|
file_ = path_ + "/socket";
|
|
#else
|
|
LIBZMQ_UNUSED (path_);
|
|
int fd = mkstemp (&buffer[0]);
|
|
if (fd == -1)
|
|
return -1;
|
|
::close (fd);
|
|
|
|
file_.assign (&buffer[0]);
|
|
#endif
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
#endif
|