signaler.cpp 14.3 KB
Newer Older
1
/*
2
    Copyright (c) 2007-2014 Contributors as noted in the AUTHORS file
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

    This file is part of 0MQ.

    0MQ is free software; you can redistribute it and/or modify it under
    the terms of the GNU Lesser General Public License as published by
    the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.

    0MQ is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU Lesser General Public License for more details.

    You should have received a copy of the GNU Lesser General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
*/

20
#include "poller.hpp"
21 22 23 24 25

//  On AIX, poll.h has to be included before zmq.h to get consistent
//  definition of pollfd structure (AIX uses 'reqevents' and 'retnevents'
//  instead of 'events' and 'revents' and defines macros to map from POSIX-y
//  names to AIX-specific names).
26
#if defined ZMQ_POLL_BASED_ON_POLL
27
#include <poll.h>
28
#elif defined ZMQ_POLL_BASED_ON_SELECT
29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
#if defined ZMQ_HAVE_WINDOWS
#include "windows.hpp"
#elif defined ZMQ_HAVE_HPUX
#include <sys/param.h>
#include <sys/types.h>
#include <sys/time.h>
#elif defined ZMQ_HAVE_OPENVMS
#include <sys/types.h>
#include <sys/time.h>
#else
#include <sys/select.h>
#endif
#endif

#include "signaler.hpp"
#include "likely.hpp"
45
#include "stdint.hpp"
46
#include "config.hpp"
47 48 49 50
#include "err.hpp"
#include "fd.hpp"
#include "ip.hpp"

51 52 53 54
#if defined ZMQ_HAVE_EVENTFD
#include <sys/eventfd.h>
#endif

55 56 57 58 59 60 61 62 63 64 65 66 67
#if defined ZMQ_HAVE_WINDOWS
#include "windows.hpp"
#else
#include <unistd.h>
#include <netinet/tcp.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#endif

zmq::signaler_t::signaler_t ()
{
    //  Create the socketpair for signaling.
Pieter Hintjens's avatar
Pieter Hintjens committed
68 69 70 71
    if (make_fdpair (&r, &w) == 0) {
        unblock_socket (w);
        unblock_socket (r);
    }
72 73 74
#ifdef HAVE_FORK
    pid = getpid();
#endif
75 76 77 78
}

zmq::signaler_t::~signaler_t ()
{
79 80 81 82
#if defined ZMQ_HAVE_EVENTFD
    int rc = close (r);
    errno_assert (rc == 0);
#elif defined ZMQ_HAVE_WINDOWS
83 84 85 86 87
    struct linger so_linger = { 1, 0 };
    int rc = setsockopt (w, SOL_SOCKET, SO_LINGER,
        (char *)&so_linger, sizeof (so_linger));
    wsa_assert (rc != SOCKET_ERROR);
    rc = closesocket (w);
88 89 90 91
    wsa_assert (rc != SOCKET_ERROR);
    rc = closesocket (r);
    wsa_assert (rc != SOCKET_ERROR);
#else
92 93 94 95
    int rc = close (w);
    errno_assert (rc == 0);
    rc = close (r);
    errno_assert (rc == 0);
96 97 98 99 100 101 102 103 104 105
#endif
}

zmq::fd_t zmq::signaler_t::get_fd ()
{
    return r;
}

void zmq::signaler_t::send ()
{
106
#if defined(HAVE_FORK)
107 108 109 110 111
    if (unlikely(pid != getpid())) {
        //printf("Child process %d signaler_t::send returning without sending #1\n", getpid());
        return; // do not send anything in forked child context
    }
#endif
112 113 114 115 116
#if defined ZMQ_HAVE_EVENTFD
    const uint64_t inc = 1;
    ssize_t sz = write (w, &inc, sizeof (inc));
    errno_assert (sz == sizeof (inc));
#elif defined ZMQ_HAVE_WINDOWS
117
    unsigned char dummy = 0;
Martin Sustrik's avatar
Martin Sustrik committed
118
    int nbytes = ::send (w, (char*) &dummy, sizeof (dummy), 0);
119 120 121 122 123 124 125 126
    wsa_assert (nbytes != SOCKET_ERROR);
    zmq_assert (nbytes == sizeof (dummy));
#else
    unsigned char dummy = 0;
    while (true) {
        ssize_t nbytes = ::send (w, &dummy, sizeof (dummy), 0);
        if (unlikely (nbytes == -1 && errno == EINTR))
            continue;
127
#if defined(HAVE_FORK)
128 129 130 131 132 133
        if (unlikely(pid != getpid())) {
            //printf("Child process %d signaler_t::send returning without sending #2\n", getpid());
            errno = EINTR;
            break;
        }
#endif
134 135 136 137 138 139 140 141
        zmq_assert (nbytes == sizeof (dummy));
        break;
    }
#endif
}

int zmq::signaler_t::wait (int timeout_)
{
142 143 144 145 146 147 148 149 150 151 152
#ifdef HAVE_FORK
    if (unlikely(pid != getpid()))
    {
        // we have forked and the file descriptor is closed. Emulate an interupt
        // response.
        //printf("Child process %d signaler_t::wait returning simulating interrupt #1\n", getpid());
        errno = EINTR;
        return -1;
    }
#endif

153
#ifdef ZMQ_POLL_BASED_ON_POLL
154 155 156 157 158 159

    struct pollfd pfd;
    pfd.fd = r;
    pfd.events = POLLIN;
    int rc = poll (&pfd, 1, timeout_);
    if (unlikely (rc < 0)) {
160
        errno_assert (errno == EINTR);
161 162
        return -1;
    }
163 164
    else
    if (unlikely (rc == 0)) {
165 166 167
        errno = EAGAIN;
        return -1;
    }
168
#ifdef HAVE_FORK
169
    if (unlikely(pid != getpid())) {
170 171 172 173 174 175 176
        // we have forked and the file descriptor is closed. Emulate an interupt
        // response.
        //printf("Child process %d signaler_t::wait returning simulating interrupt #2\n", getpid());
        errno = EINTR;
        return -1;
    }
#endif
177 178 179 180
    zmq_assert (rc == 1);
    zmq_assert (pfd.revents & POLLIN);
    return 0;

181
#elif defined ZMQ_POLL_BASED_ON_SELECT
182 183 184 185 186

    fd_set fds;
    FD_ZERO (&fds);
    FD_SET (r, &fds);
    struct timeval timeout;
187 188 189 190
    if (timeout_ >= 0) {
        timeout.tv_sec = timeout_ / 1000;
        timeout.tv_usec = timeout_ % 1000 * 1000;
    }
191
#ifdef ZMQ_HAVE_WINDOWS
192 193
    int rc = select (0, &fds, NULL, NULL,
        timeout_ >= 0 ? &timeout : NULL);
194 195
    wsa_assert (rc != SOCKET_ERROR);
#else
196 197
    int rc = select (r + 1, &fds, NULL, NULL,
        timeout_ >= 0 ? &timeout : NULL);
198
    if (unlikely (rc < 0)) {
199
        errno_assert (errno == EINTR);
200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217
        return -1;
    }
#endif
    if (unlikely (rc == 0)) {
        errno = EAGAIN;
        return -1;
    }
    zmq_assert (rc == 1);
    return 0;

#else
#error
#endif
}

void zmq::signaler_t::recv ()
{
    //  Attempt to read a signal.
218 219 220 221
#if defined ZMQ_HAVE_EVENTFD
    uint64_t dummy;
    ssize_t sz = read (r, &dummy, sizeof (dummy));
    errno_assert (sz == sizeof (dummy));
222 223 224 225 226

    //  If we accidentally grabbed the next signal along with the current
    //  one, return it back to the eventfd object.
    if (unlikely (dummy == 2)) {
        const uint64_t inc = 1;
227 228
        ssize_t sz2 = write (w, &inc, sizeof (inc));
        errno_assert (sz2 == sizeof (inc));
229 230 231
        return;
    }

232 233
    zmq_assert (dummy == 1);
#else
234
    unsigned char dummy;
Martin Sustrik's avatar
Martin Sustrik committed
235 236
#if defined ZMQ_HAVE_WINDOWS
    int nbytes = ::recv (r, (char*) &dummy, sizeof (dummy), 0);
237 238 239 240 241 242 243
    wsa_assert (nbytes != SOCKET_ERROR);
#else
    ssize_t nbytes = ::recv (r, &dummy, sizeof (dummy), 0);
    errno_assert (nbytes >= 0);
#endif
    zmq_assert (nbytes == sizeof (dummy));
    zmq_assert (dummy == 0);
244
#endif
245 246
}

247 248 249
#ifdef HAVE_FORK
void zmq::signaler_t::forked()
{
250 251 252
    //  Close file descriptors created in the parent and create new pair
    close (r);
    close (w);
Pieter Hintjens's avatar
Pieter Hintjens committed
253
    make_fdpair (&r, &w);
254 255 256
}
#endif

Pieter Hintjens's avatar
Pieter Hintjens committed
257
//  Returns -1 if we could not make the socket pair successfully
258 259
int zmq::signaler_t::make_fdpair (fd_t *r_, fd_t *w_)
{
260 261
#if defined ZMQ_HAVE_EVENTFD
    fd_t fd = eventfd (0, 0);
Pieter Hintjens's avatar
Pieter Hintjens committed
262 263 264 265 266 267 268 269 270
    if (fd == -1) {
        errno_assert (errno == ENFILE || errno == EMFILE);
        *w_ = *r_ = -1;
        return -1;
    }
    else {
        *w_ = *r_ = fd;
        return 0;
    }
271 272

#elif defined ZMQ_HAVE_WINDOWS
Pieter Hintjens's avatar
Pieter Hintjens committed
273
#   if !defined _WIN32_WCE
274
    // Windows CE does not manage security attributes
Matt Arsenault's avatar
Matt Arsenault committed
275 276 277 278
    SECURITY_DESCRIPTOR sd;
    SECURITY_ATTRIBUTES sa;
    memset (&sd, 0, sizeof (sd));
    memset (&sa, 0, sizeof (sa));
Matthew Metnetsky's avatar
Matthew Metnetsky committed
279 280 281 282 283 284

    InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION);
    SetSecurityDescriptorDacl(&sd, TRUE, 0, FALSE);

    sa.nLength = sizeof(SECURITY_ATTRIBUTES);
    sa.lpSecurityDescriptor = &sd;
Pieter Hintjens's avatar
Pieter Hintjens committed
285
#   endif
286

287 288 289 290
    //  This function has to be in a system-wide critical section so that
    //  two instances of the library don't accidentally create signaler
    //  crossing the process boundary.
    //  We'll use named event object to implement the critical section.
Martin Hurton's avatar
Martin Hurton committed
291 292 293
    //  Note that if the event object already exists, the CreateEvent requests
    //  EVENT_ALL_ACCESS access right. If this fails, we try to open
    //  the event object asking for SYNCHRONIZE access only.
294 295 296
    HANDLE sync = NULL;

    //  Create critical section only if using fixed signaler port
297 298 299 300 301
    //  Use problematic Event implementation for compatibility if using old port 5905.
    //  Otherwise use Mutex implementation.
    int event_signaler_port = 5905;

    if (signaler_port == event_signaler_port) {
302
#       if !defined _WIN32_WCE
303
        sync = CreateEventW (&sa, FALSE, TRUE, L"Global\\zmq-signaler-port-sync");
304
#       else
305
        sync = CreateEventW (NULL, FALSE, TRUE, L"Global\\zmq-signaler-port-sync");
306 307 308
#       endif
        if (sync == NULL && GetLastError () == ERROR_ACCESS_DENIED)
            sync = OpenEvent (SYNCHRONIZE | EVENT_MODIFY_STATE,
309
                              FALSE, L"Global\\zmq-signaler-port-sync");
310 311 312

        win_assert (sync != NULL);
    }
313
    else if (signaler_port != 0) {
314 315
        wchar_t mutex_name[MAX_PATH];
        swprintf(mutex_name, MAX_PATH, L"Global\\zmq-signaler-port-%d", signaler_port);
316 317

#       if !defined _WIN32_WCE
318
        sync = CreateMutexW (&sa, FALSE, mutex_name);
319
#       else
320
        sync = CreateMutexW (NULL, FALSE, mutex_name);
321 322
#       endif
        if (sync == NULL && GetLastError () == ERROR_ACCESS_DENIED)
323
            sync = OpenMutexW (SYNCHRONIZE, FALSE, mutex_name);
324 325 326

        win_assert (sync != NULL);
    }
327

328 329 330 331 332 333 334
    //  Windows has no 'socketpair' function. CreatePipe is no good as pipe
    //  handles cannot be polled on. Here we create the socketpair by hand.
    *w_ = INVALID_SOCKET;
    *r_ = INVALID_SOCKET;

    //  Create listening socket.
    SOCKET listener;
335
    listener = open_socket (AF_INET, SOCK_STREAM, 0);
336 337 338 339 340 341 342 343 344 345 346 347
    wsa_assert (listener != INVALID_SOCKET);

    //  Set SO_REUSEADDR and TCP_NODELAY on listening socket.
    BOOL so_reuseaddr = 1;
    int rc = setsockopt (listener, SOL_SOCKET, SO_REUSEADDR,
        (char *)&so_reuseaddr, sizeof (so_reuseaddr));
    wsa_assert (rc != SOCKET_ERROR);
    BOOL tcp_nodelay = 1;
    rc = setsockopt (listener, IPPROTO_TCP, TCP_NODELAY,
        (char *)&tcp_nodelay, sizeof (tcp_nodelay));
    wsa_assert (rc != SOCKET_ERROR);

348
    //  Init sockaddr to signaler port.
349 350 351 352
    struct sockaddr_in addr;
    memset (&addr, 0, sizeof (addr));
    addr.sin_family = AF_INET;
    addr.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
353
    addr.sin_port = htons (signaler_port);
354 355

    //  Create the writer socket.
356
    *w_ = open_socket (AF_INET, SOCK_STREAM, 0);
357 358 359 360 361 362 363
    wsa_assert (*w_ != INVALID_SOCKET);

    //  Set TCP_NODELAY on writer socket.
    rc = setsockopt (*w_, IPPROTO_TCP, TCP_NODELAY,
        (char *)&tcp_nodelay, sizeof (tcp_nodelay));
    wsa_assert (rc != SOCKET_ERROR);

364 365 366
    if (sync != NULL) {
        //  Enter the critical section.
        DWORD dwrc = WaitForSingleObject (sync, INFINITE);
367
        zmq_assert (dwrc == WAIT_OBJECT_0 || dwrc == WAIT_ABANDONED);
368
    }
369 370 371 372

    //  Bind listening socket to signaler port.
    rc = bind (listener, (const struct sockaddr*) &addr, sizeof (addr));

373 374 375 376 377 378
    if (rc != SOCKET_ERROR && signaler_port == 0) {
        //  Retrieve ephemeral port number
        int addrlen = sizeof (addr);
        rc = getsockname (listener, (struct sockaddr*) &addr, &addrlen);
    }

379 380 381 382
    //  Listen for incoming connections.
    if (rc != SOCKET_ERROR)
        rc = listen (listener, 1);

383
    //  Connect writer to the listener.
384 385
    if (rc != SOCKET_ERROR)
        rc = connect (*w_, (struct sockaddr*) &addr, sizeof (addr));
386

387 388
    //  Accept connection from writer.
    if (rc != SOCKET_ERROR)
389
        *r_ = accept (listener, NULL, NULL);
390 391 392 393 394 395

    //  Save errno if error occurred in bind/listen/connect/accept.
    int saved_errno = 0;
    if (*r_ == INVALID_SOCKET)
        saved_errno = WSAGetLastError ();

396
    //  We don't need the listening socket anymore. Close it.
397
    closesocket (listener);
398

399 400
    if (sync != NULL) {
        //  Exit the critical section.
401 402 403 404 405
        BOOL brc;
        if (signaler_port == event_signaler_port)
            brc = SetEvent (sync);
        else
            brc = ReleaseMutex (sync);
406
        win_assert (brc != 0);
407

408 409 410 411
        //  Release the kernel object
        brc = CloseHandle (sync);
        win_assert (brc != 0);
    }
412

413
    if (*r_ != INVALID_SOCKET) {
Pieter Hintjens's avatar
Pieter Hintjens committed
414
#   if !defined _WIN32_WCE
415
        //  On Windows, preventing sockets to be inherited by child processes.
416
        BOOL brc = SetHandleInformation ((HANDLE) *r_, HANDLE_FLAG_INHERIT, 0);
417
        win_assert (brc);
Pieter Hintjens's avatar
Pieter Hintjens committed
418
#   endif
419
        return 0;
Pieter Hintjens's avatar
Pieter Hintjens committed
420 421
    }
    else {
422
        //  Cleanup writer if connection failed
423 424 425 426 427
        if (*w_ != INVALID_SOCKET) {
            rc = closesocket (*w_);
            wsa_assert (rc != SOCKET_ERROR);
            *w_ = INVALID_SOCKET;
        }
428
        //  Set errno from saved value
429
        errno = wsa_error_to_errno (saved_errno);
430 431
        return -1;
    }
432 433 434 435 436 437 438 439 440

#elif defined ZMQ_HAVE_OPENVMS

    //  Whilst OpenVMS supports socketpair - it maps to AF_INET only.  Further,
    //  it does not set the socket options TCP_NODELAY and TCP_NODELACK which
    //  can lead to performance problems.
    //
    //  The bug will be fixed in V5.6 ECO4 and beyond.  In the meantime, we'll
    //  create the socket pair manually.
441
    struct sockaddr_in lcladdr;
442 443 444 445 446
    memset (&lcladdr, 0, sizeof (lcladdr));
    lcladdr.sin_family = AF_INET;
    lcladdr.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
    lcladdr.sin_port = 0;

447
    int listener = open_socket (AF_INET, SOCK_STREAM, 0);
448 449 450 451 452 453 454 455 456
    errno_assert (listener != -1);

    int on = 1;
    int rc = setsockopt (listener, IPPROTO_TCP, TCP_NODELAY, &on, sizeof (on));
    errno_assert (rc != -1);

    rc = setsockopt (listener, IPPROTO_TCP, TCP_NODELACK, &on, sizeof (on));
    errno_assert (rc != -1);

Pieter Hintjens's avatar
Pieter Hintjens committed
457
    rc = bind (listener, (struct sockaddr*) &lcladdr, sizeof (lcladdr));
458 459 460 461 462 463 464 465 466 467
    errno_assert (rc != -1);

    socklen_t lcladdr_len = sizeof (lcladdr);

    rc = getsockname (listener, (struct sockaddr*) &lcladdr, &lcladdr_len);
    errno_assert (rc != -1);

    rc = listen (listener, 1);
    errno_assert (rc != -1);

468
    *w_ = open_socket (AF_INET, SOCK_STREAM, 0);
469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486
    errno_assert (*w_ != -1);

    rc = setsockopt (*w_, IPPROTO_TCP, TCP_NODELAY, &on, sizeof (on));
    errno_assert (rc != -1);

    rc = setsockopt (*w_, IPPROTO_TCP, TCP_NODELACK, &on, sizeof (on));
    errno_assert (rc != -1);

    rc = connect (*w_, (struct sockaddr*) &lcladdr, sizeof (lcladdr));
    errno_assert (rc != -1);

    *r_ = accept (listener, NULL, NULL);
    errno_assert (*r_ != -1);

    close (listener);

    return 0;

Pieter Hintjens's avatar
Pieter Hintjens committed
487 488
#else
    // All other implementations support socketpair()
489 490
    int sv [2];
    int rc = socketpair (AF_UNIX, SOCK_STREAM, 0, sv);
Pieter Hintjens's avatar
Pieter Hintjens committed
491 492
    if (rc == -1) {
        errno_assert (errno == ENFILE || errno == EMFILE);
493
        *w_ = *r_ = -1;
Pieter Hintjens's avatar
Pieter Hintjens committed
494 495 496 497 498 499 500
        return -1;
    }
    else {
        *w_ = sv [0];
        *r_ = sv [1];
        return 0;
    }
501 502
#endif
}