2009-09-11 17:58:37 +02:00
|
|
|
/*
|
2016-01-28 15:07:31 +01:00
|
|
|
Copyright (c) 2007-2016 Contributors as noted in the AUTHORS file
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
This file is part of libzmq, the ZeroMQ core engine in C++.
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
libzmq is free software; you can redistribute it and/or modify it under
|
|
|
|
the terms of the GNU Lesser General Public License (LGPL) as published
|
|
|
|
by the Free Software Foundation; either version 3 of the License, or
|
2009-09-11 17:58:37 +02:00
|
|
|
(at your option) any later version.
|
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
As a special exception, the Contributors give you permission to link
|
|
|
|
this library with independent modules to produce an executable,
|
|
|
|
regardless of the license terms of these independent modules, and to
|
|
|
|
copy and distribute the resulting executable under terms of your choice,
|
|
|
|
provided that you also meet, for each linked independent module, the
|
|
|
|
terms and conditions of the license of that module. An independent
|
|
|
|
module is a module which is not derived from or based on this library.
|
|
|
|
If you modify this library, you must extend this exception to your
|
|
|
|
version of the library.
|
|
|
|
|
|
|
|
libzmq is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
|
|
License for more details.
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2010-10-30 15:08:28 +02:00
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
2009-09-11 17:58:37 +02:00
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2016-02-18 10:56:52 -06:00
|
|
|
#include "precompiled.hpp"
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2009-09-24 16:23:49 +02:00
|
|
|
#ifdef ZMQ_HAVE_OPENPGM
|
2009-09-11 17:58:37 +02:00
|
|
|
|
|
|
|
#ifdef ZMQ_HAVE_LINUX
|
2009-10-06 12:57:24 +02:00
|
|
|
#include <poll.h>
|
2009-09-11 17:58:37 +02:00
|
|
|
#endif
|
|
|
|
|
2009-12-28 11:51:06 +01:00
|
|
|
#include <stdlib.h>
|
2010-02-04 09:39:57 +01:00
|
|
|
#include <string.h>
|
2009-09-11 17:58:37 +02:00
|
|
|
#include <string>
|
|
|
|
|
|
|
|
#include "options.hpp"
|
|
|
|
#include "pgm_socket.hpp"
|
|
|
|
#include "config.hpp"
|
|
|
|
#include "err.hpp"
|
2011-07-15 11:24:33 +02:00
|
|
|
#include "random.hpp"
|
2009-12-28 11:51:06 +01:00
|
|
|
#include "stdint.hpp"
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2010-09-30 11:33:35 +02:00
|
|
|
#ifndef MSG_ERRQUEUE
|
2010-09-30 11:35:14 +02:00
|
|
|
#define MSG_ERRQUEUE 0x2000
|
2010-09-30 11:33:35 +02:00
|
|
|
#endif
|
|
|
|
|
2009-09-11 17:58:37 +02:00
|
|
|
zmq::pgm_socket_t::pgm_socket_t (bool receiver_, const options_t &options_) :
|
2010-09-28 16:35:29 +02:00
|
|
|
sock (NULL),
|
2009-09-11 17:58:37 +02:00
|
|
|
options (options_),
|
|
|
|
receiver (receiver_),
|
|
|
|
pgm_msgv (NULL),
|
2009-12-31 16:18:45 +01:00
|
|
|
pgm_msgv_len (0),
|
2009-09-11 17:58:37 +02:00
|
|
|
nbytes_rec (0),
|
|
|
|
nbytes_processed (0),
|
2009-12-31 16:18:45 +01:00
|
|
|
pgm_msgv_processed (0)
|
2009-09-11 17:58:37 +02:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2012-05-30 20:52:19 -04:00
|
|
|
// Resolve PGM socket address.
|
2010-09-28 16:58:51 +02:00
|
|
|
// network_ of the form <interface & multicast group decls>:<IP port>
|
|
|
|
// e.g. eth0;239.192.0.1:7500
|
|
|
|
// link-local;224.250.0.1,224.250.0.2;224.250.0.3:8000
|
|
|
|
// ;[fe80::1%en0]:7500
|
2012-05-30 20:52:19 -04:00
|
|
|
int zmq::pgm_socket_t::init_address (const char *network_,
|
2012-09-04 23:24:48 +01:00
|
|
|
struct pgm_addrinfo_t **res,
|
|
|
|
uint16_t *port_number)
|
2009-09-11 17:58:37 +02:00
|
|
|
{
|
2010-09-28 16:35:29 +02:00
|
|
|
// Parse port number, start from end for IPv6
|
|
|
|
const char *port_delim = strrchr (network_, ':');
|
2009-09-11 17:58:37 +02:00
|
|
|
if (!port_delim) {
|
|
|
|
errno = EINVAL;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2012-05-30 20:52:19 -04:00
|
|
|
*port_number = atoi (port_delim + 1);
|
2015-08-20 07:46:34 -07:00
|
|
|
|
2009-12-28 11:51:06 +01:00
|
|
|
char network[256];
|
2009-09-16 15:36:38 +02:00
|
|
|
if (port_delim - network_ >= (int) sizeof (network) - 1) {
|
2009-09-11 17:58:37 +02:00
|
|
|
errno = EINVAL;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
memset (network, '\0', sizeof (network));
|
2009-09-16 15:36:38 +02:00
|
|
|
memcpy (network, network_, port_delim - network_);
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
pgm_error_t *pgm_error = NULL;
|
2012-09-04 23:24:48 +01:00
|
|
|
struct pgm_addrinfo_t hints;
|
2010-09-28 16:35:29 +02:00
|
|
|
|
|
|
|
memset (&hints, 0, sizeof (hints));
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
2012-09-04 23:24:48 +01:00
|
|
|
if (!pgm_getaddrinfo (network, NULL, res, &pgm_error)) {
|
2010-10-30 16:17:08 +02:00
|
|
|
// Invalid parameters don't set pgm_error_t.
|
2010-09-28 16:58:51 +02:00
|
|
|
zmq_assert (pgm_error != NULL);
|
2012-05-30 20:52:19 -04:00
|
|
|
if (pgm_error->domain == PGM_ERROR_DOMAIN_IF &&
|
2010-10-30 16:17:08 +02:00
|
|
|
|
|
|
|
// NB: cannot catch EAI_BADFLAGS.
|
2012-05-30 20:52:19 -04:00
|
|
|
(pgm_error->code != PGM_ERROR_SERVICE
|
|
|
|
&& pgm_error->code != PGM_ERROR_SOCKTNOSUPPORT)) {
|
2010-10-30 16:17:08 +02:00
|
|
|
// User, host, or network configuration or transient error.
|
2012-05-30 20:52:19 -04:00
|
|
|
pgm_error_free (pgm_error);
|
|
|
|
errno = EINVAL;
|
|
|
|
return -1;
|
|
|
|
}
|
2010-09-28 16:35:29 +02:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Fatal OpenPGM internal error.
|
2009-12-21 18:50:24 +01:00
|
|
|
zmq_assert (false);
|
2009-09-24 16:23:49 +02:00
|
|
|
}
|
2012-05-30 20:52:19 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create, bind and connect PGM socket.
|
|
|
|
int zmq::pgm_socket_t::init (bool udp_encapsulation_, const char *network_)
|
|
|
|
{
|
|
|
|
// Can not open transport before destroying old one.
|
|
|
|
zmq_assert (sock == NULL);
|
|
|
|
zmq_assert (options.rate > 0);
|
|
|
|
|
|
|
|
// Zero counter used in msgrecv.
|
|
|
|
nbytes_rec = 0;
|
|
|
|
nbytes_processed = 0;
|
|
|
|
pgm_msgv_processed = 0;
|
|
|
|
|
|
|
|
uint16_t port_number;
|
|
|
|
struct pgm_addrinfo_t *res = NULL;
|
|
|
|
sa_family_t sa_family;
|
|
|
|
|
|
|
|
pgm_error_t *pgm_error = NULL;
|
|
|
|
|
|
|
|
if (init_address (network_, &res, &port_number) < 0) {
|
|
|
|
goto err_abort;
|
|
|
|
}
|
2009-09-24 16:23:49 +02:00
|
|
|
|
2010-09-28 16:58:51 +02:00
|
|
|
zmq_assert (res != NULL);
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Pick up detected IP family.
|
2010-09-28 16:35:29 +02:00
|
|
|
sa_family = res->ai_send_addrs[0].gsr_group.ss_family;
|
2009-09-24 16:23:49 +02:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Create IP/PGM or UDP/PGM socket.
|
2009-12-28 11:51:06 +01:00
|
|
|
if (udp_encapsulation_) {
|
2010-10-30 16:17:08 +02:00
|
|
|
if (!pgm_socket (&sock, sa_family, SOCK_SEQPACKET, IPPROTO_UDP,
|
|
|
|
&pgm_error)) {
|
|
|
|
// Invalid parameters don't set pgm_error_t.
|
2010-09-28 16:58:51 +02:00
|
|
|
zmq_assert (pgm_error != NULL);
|
2010-09-28 16:35:29 +02:00
|
|
|
if (pgm_error->domain == PGM_ERROR_DOMAIN_SOCKET
|
2010-09-28 16:58:51 +02:00
|
|
|
&& (pgm_error->code != PGM_ERROR_BADF
|
|
|
|
&& pgm_error->code != PGM_ERROR_FAULT
|
|
|
|
&& pgm_error->code != PGM_ERROR_NOPROTOOPT
|
|
|
|
&& pgm_error->code != PGM_ERROR_FAILED))
|
2010-10-30 16:17:08 +02:00
|
|
|
|
|
|
|
// User, host, or network configuration or transient error.
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Fatal OpenPGM internal error.
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (false);
|
2009-12-21 18:50:24 +01:00
|
|
|
}
|
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
// All options are of data type int
|
|
|
|
const int encapsulation_port = port_number;
|
2010-10-30 16:17:08 +02:00
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_UDP_ENCAP_UCAST_PORT,
|
2011-02-21 11:22:54 +01:00
|
|
|
&encapsulation_port, sizeof (encapsulation_port)))
|
|
|
|
goto err_abort;
|
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_UDP_ENCAP_MCAST_PORT,
|
2010-10-30 16:17:08 +02:00
|
|
|
&encapsulation_port, sizeof (encapsulation_port)))
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
2010-10-30 16:17:08 +02:00
|
|
|
} else {
|
|
|
|
if (!pgm_socket (&sock, sa_family, SOCK_SEQPACKET, IPPROTO_PGM,
|
|
|
|
&pgm_error)) {
|
|
|
|
// Invalid parameters don't set pgm_error_t.
|
2010-09-28 16:58:51 +02:00
|
|
|
zmq_assert (pgm_error != NULL);
|
2010-09-28 16:35:29 +02:00
|
|
|
if (pgm_error->domain == PGM_ERROR_DOMAIN_SOCKET
|
2010-09-28 16:58:51 +02:00
|
|
|
&& (pgm_error->code != PGM_ERROR_BADF
|
|
|
|
&& pgm_error->code != PGM_ERROR_FAULT
|
|
|
|
&& pgm_error->code != PGM_ERROR_NOPROTOOPT
|
|
|
|
&& pgm_error->code != PGM_ERROR_FAILED))
|
2010-10-30 16:17:08 +02:00
|
|
|
|
|
|
|
// User, host, or network configuration or transient error.
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Fatal OpenPGM internal error.
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (false);
|
|
|
|
}
|
2009-09-24 16:23:49 +02:00
|
|
|
}
|
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
{
|
2015-08-20 07:46:34 -07:00
|
|
|
const int rcvbuf = (int) options.rcvbuf;
|
|
|
|
if (rcvbuf >= 0) {
|
|
|
|
if (!pgm_setsockopt (sock, SOL_SOCKET, SO_RCVBUF, &rcvbuf,
|
|
|
|
sizeof (rcvbuf)))
|
|
|
|
goto err_abort;
|
|
|
|
}
|
|
|
|
|
|
|
|
const int sndbuf = (int) options.sndbuf;
|
|
|
|
if (sndbuf >= 0) {
|
|
|
|
if (!pgm_setsockopt (sock, SOL_SOCKET, SO_SNDBUF, &sndbuf,
|
|
|
|
sizeof (sndbuf)))
|
|
|
|
goto err_abort;
|
|
|
|
}
|
|
|
|
|
2015-11-23 19:35:02 +00:00
|
|
|
const int max_tpdu = (int) options.multicast_maxtpdu;
|
2015-08-20 07:46:34 -07:00
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_MTU, &max_tpdu,
|
|
|
|
sizeof (max_tpdu)))
|
|
|
|
goto err_abort;
|
2009-09-25 17:50:12 +02:00
|
|
|
}
|
|
|
|
|
2009-09-11 17:58:37 +02:00
|
|
|
if (receiver) {
|
2015-11-23 19:35:02 +00:00
|
|
|
const int recv_only = 1, rxw_max_tpdu = (int) options.multicast_maxtpdu,
|
2011-02-21 11:22:54 +01:00
|
|
|
rxw_sqns = compute_sqns (rxw_max_tpdu),
|
2010-09-28 16:35:29 +02:00
|
|
|
peer_expiry = pgm_secs (300), spmr_expiry = pgm_msecs (25),
|
|
|
|
nak_bo_ivl = pgm_msecs (50), nak_rpt_ivl = pgm_msecs (200),
|
|
|
|
nak_rdata_ivl = pgm_msecs (200), nak_data_retries = 50,
|
2010-10-12 12:26:21 +02:00
|
|
|
nak_ncf_retries = 50;
|
2010-09-28 16:35:29 +02:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_RECV_ONLY, &recv_only,
|
|
|
|
sizeof (recv_only))
|
2010-12-09 21:42:58 +01:00
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_RXW_SQNS, &rxw_sqns,
|
|
|
|
sizeof (rxw_sqns))
|
2010-10-30 16:17:08 +02:00
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_PEER_EXPIRY,
|
|
|
|
&peer_expiry, sizeof (peer_expiry))
|
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_SPMR_EXPIRY,
|
|
|
|
&spmr_expiry, sizeof (spmr_expiry))
|
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_NAK_BO_IVL, &nak_bo_ivl,
|
|
|
|
sizeof (nak_bo_ivl))
|
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_NAK_RPT_IVL,
|
|
|
|
&nak_rpt_ivl, sizeof (nak_rpt_ivl))
|
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_NAK_RDATA_IVL,
|
|
|
|
&nak_rdata_ivl, sizeof (nak_rdata_ivl))
|
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_NAK_DATA_RETRIES,
|
|
|
|
&nak_data_retries, sizeof (nak_data_retries))
|
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_NAK_NCF_RETRIES,
|
|
|
|
&nak_ncf_retries, sizeof (nak_ncf_retries)))
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
2012-10-24 09:18:52 +09:00
|
|
|
} else {
|
2011-10-04 09:32:02 +02:00
|
|
|
const int send_only = 1, max_rte = (int) ((options.rate * 1000) / 8),
|
2015-11-23 19:35:02 +00:00
|
|
|
txw_max_tpdu = (int) options.multicast_maxtpdu,
|
2011-02-21 11:22:54 +01:00
|
|
|
txw_sqns = compute_sqns (txw_max_tpdu),
|
2010-10-12 12:26:21 +02:00
|
|
|
ambient_spm = pgm_secs (30),
|
|
|
|
heartbeat_spm[] = {
|
|
|
|
pgm_msecs (100), pgm_msecs (100), pgm_msecs (100),
|
|
|
|
pgm_msecs (100), pgm_msecs (1300), pgm_secs (7),
|
|
|
|
pgm_secs (16), pgm_secs (25), pgm_secs (30)};
|
2018-02-01 11:46:09 +01:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_SEND_ONLY, &send_only,
|
|
|
|
sizeof (send_only))
|
2011-10-04 09:32:02 +02:00
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_ODATA_MAX_RTE, &max_rte,
|
|
|
|
sizeof (max_rte))
|
2010-12-09 21:42:58 +01:00
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_TXW_SQNS, &txw_sqns,
|
|
|
|
sizeof (txw_sqns))
|
2010-10-30 16:17:08 +02:00
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_AMBIENT_SPM,
|
|
|
|
&ambient_spm, sizeof (ambient_spm))
|
|
|
|
|| !pgm_setsockopt (sock, IPPROTO_PGM, PGM_HEARTBEAT_SPM,
|
|
|
|
&heartbeat_spm, sizeof (heartbeat_spm)))
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
|
|
|
}
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
// PGM transport GSI.
|
|
|
|
struct pgm_sockaddr_t addr;
|
2009-12-13 09:11:08 +01:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
memset (&addr, 0, sizeof (addr));
|
|
|
|
addr.sa_port = port_number;
|
|
|
|
addr.sa_addr.sport = DEFAULT_DATA_SOURCE_PORT;
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2011-07-15 11:24:33 +02:00
|
|
|
// Create random GSI.
|
|
|
|
uint32_t buf[2];
|
|
|
|
buf[0] = generate_random ();
|
|
|
|
buf[1] = generate_random ();
|
|
|
|
if (!pgm_gsi_create_from_data (&addr.sa_addr.gsi, (uint8_t *) buf, 8))
|
|
|
|
goto err_abort;
|
2009-12-14 11:46:30 +01:00
|
|
|
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
// Bind a transport to the specified network devices.
|
|
|
|
struct pgm_interface_req_t if_req;
|
|
|
|
memset (&if_req, 0, sizeof (if_req));
|
|
|
|
if_req.ir_interface = res->ai_recv_addrs[0].gsr_interface;
|
|
|
|
if_req.ir_scope_id = 0;
|
|
|
|
if (AF_INET6 == sa_family) {
|
|
|
|
struct sockaddr_in6 sa6;
|
|
|
|
memcpy (&sa6, &res->ai_recv_addrs[0].gsr_group, sizeof (sa6));
|
|
|
|
if_req.ir_scope_id = sa6.sin6_scope_id;
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
2010-10-30 16:17:08 +02:00
|
|
|
if (!pgm_bind3 (sock, &addr, sizeof (addr), &if_req, sizeof (if_req),
|
|
|
|
&if_req, sizeof (if_req), &pgm_error)) {
|
|
|
|
// Invalid parameters don't set pgm_error_t.
|
2010-09-28 16:58:51 +02:00
|
|
|
zmq_assert (pgm_error != NULL);
|
|
|
|
if ((pgm_error->domain == PGM_ERROR_DOMAIN_SOCKET
|
|
|
|
|| pgm_error->domain == PGM_ERROR_DOMAIN_IF)
|
|
|
|
&& (pgm_error->code != PGM_ERROR_INVAL
|
|
|
|
&& pgm_error->code != PGM_ERROR_BADF
|
|
|
|
&& pgm_error->code != PGM_ERROR_FAULT))
|
2010-10-30 16:17:08 +02:00
|
|
|
|
|
|
|
// User, host, or network configuration or transient error.
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Fatal OpenPGM internal error.
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (false);
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Join IP multicast groups.
|
|
|
|
for (unsigned i = 0; i < res->ai_recv_addrs_len; i++) {
|
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_JOIN_GROUP,
|
|
|
|
&res->ai_recv_addrs[i], sizeof (struct group_req)))
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
|
|
|
}
|
2010-10-30 16:17:08 +02:00
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_SEND_GROUP,
|
|
|
|
&res->ai_send_addrs[0], sizeof (struct group_req)))
|
2010-09-28 16:35:29 +02:00
|
|
|
goto err_abort;
|
2010-09-28 16:58:51 +02:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
pgm_freeaddrinfo (res);
|
2010-09-28 16:58:51 +02:00
|
|
|
res = NULL;
|
2009-12-21 18:50:24 +01:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Set IP level parameters.
|
2010-09-28 16:35:29 +02:00
|
|
|
{
|
2015-08-20 07:46:34 -07:00
|
|
|
// Multicast loopback disabled by default
|
|
|
|
const int multicast_loop = 0;
|
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_MULTICAST_LOOP,
|
|
|
|
&multicast_loop, sizeof (multicast_loop)))
|
|
|
|
goto err_abort;
|
|
|
|
|
|
|
|
const int multicast_hops = options.multicast_hops;
|
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_MULTICAST_HOPS,
|
|
|
|
&multicast_hops, sizeof (multicast_hops)))
|
|
|
|
goto err_abort;
|
|
|
|
|
|
|
|
// Expedited Forwarding PHB for network elements, no ECN.
|
|
|
|
// Ignore return value due to varied runtime support.
|
|
|
|
const int dscp = 0x2e << 2;
|
|
|
|
if (AF_INET6 != sa_family)
|
|
|
|
pgm_setsockopt (sock, IPPROTO_PGM, PGM_TOS, &dscp, sizeof (dscp));
|
|
|
|
|
|
|
|
const int nonblocking = 1;
|
|
|
|
if (!pgm_setsockopt (sock, IPPROTO_PGM, PGM_NOBLOCK, &nonblocking,
|
|
|
|
sizeof (nonblocking)))
|
|
|
|
goto err_abort;
|
2009-12-13 09:56:02 +01:00
|
|
|
}
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2010-09-28 16:58:51 +02:00
|
|
|
// Connect PGM transport to start state machine.
|
|
|
|
if (!pgm_connect (sock, &pgm_error)) {
|
2010-10-30 16:17:08 +02:00
|
|
|
// Invalid parameters don't set pgm_error_t.
|
2010-09-28 16:58:51 +02:00
|
|
|
zmq_assert (pgm_error != NULL);
|
|
|
|
goto err_abort;
|
|
|
|
}
|
|
|
|
|
2009-12-28 11:51:06 +01:00
|
|
|
// For receiver transport preallocate pgm_msgv array.
|
|
|
|
if (receiver) {
|
2019-06-27 00:34:56 -04:00
|
|
|
zmq_assert (options.in_batch_size > 0);
|
2009-12-28 11:51:06 +01:00
|
|
|
size_t max_tsdu_size = get_max_tsdu_size ();
|
2019-06-27 00:34:56 -04:00
|
|
|
pgm_msgv_len = (int) options.in_batch_size / max_tsdu_size;
|
|
|
|
if ((int) options.in_batch_size % max_tsdu_size)
|
2009-12-28 11:51:06 +01:00
|
|
|
pgm_msgv_len++;
|
|
|
|
zmq_assert (pgm_msgv_len);
|
|
|
|
|
|
|
|
pgm_msgv = (pgm_msgv_t *) malloc (sizeof (pgm_msgv_t) * pgm_msgv_len);
|
2011-02-22 16:23:36 +01:00
|
|
|
alloc_assert (pgm_msgv);
|
2009-12-28 11:51:06 +01:00
|
|
|
}
|
|
|
|
|
2009-09-11 17:58:37 +02:00
|
|
|
return 0;
|
2010-09-28 16:35:29 +02:00
|
|
|
|
|
|
|
err_abort:
|
|
|
|
if (sock != NULL) {
|
|
|
|
pgm_close (sock, FALSE);
|
|
|
|
sock = NULL;
|
|
|
|
}
|
|
|
|
if (res != NULL) {
|
|
|
|
pgm_freeaddrinfo (res);
|
|
|
|
res = NULL;
|
|
|
|
}
|
|
|
|
if (pgm_error != NULL) {
|
|
|
|
pgm_error_free (pgm_error);
|
|
|
|
pgm_error = NULL;
|
|
|
|
}
|
|
|
|
errno = EINVAL;
|
|
|
|
return -1;
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
zmq::pgm_socket_t::~pgm_socket_t ()
|
|
|
|
{
|
2009-12-28 11:51:06 +01:00
|
|
|
if (pgm_msgv)
|
|
|
|
free (pgm_msgv);
|
2015-08-20 07:46:34 -07:00
|
|
|
if (sock)
|
2010-09-28 16:35:29 +02:00
|
|
|
pgm_close (sock, TRUE);
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Get receiver fds. receive_fd_ is signaled for incoming packets,
|
|
|
|
// waiting_pipe_fd_ is signaled for state driven events and data.
|
2015-08-20 07:46:34 -07:00
|
|
|
void zmq::pgm_socket_t::get_receiver_fds (fd_t *receive_fd_,
|
2011-08-17 18:41:02 +02:00
|
|
|
fd_t *waiting_pipe_fd_)
|
2009-09-11 17:58:37 +02:00
|
|
|
{
|
2010-09-28 16:35:29 +02:00
|
|
|
socklen_t socklen;
|
|
|
|
bool rc;
|
|
|
|
|
2009-11-03 14:11:53 +01:00
|
|
|
zmq_assert (receive_fd_);
|
|
|
|
zmq_assert (waiting_pipe_fd_);
|
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
socklen = sizeof (*receive_fd_);
|
2010-10-30 16:17:08 +02:00
|
|
|
rc =
|
|
|
|
pgm_getsockopt (sock, IPPROTO_PGM, PGM_RECV_SOCK, receive_fd_, &socklen);
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (rc);
|
|
|
|
zmq_assert (socklen == sizeof (*receive_fd_));
|
2009-11-03 14:11:53 +01:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
socklen = sizeof (*waiting_pipe_fd_);
|
2010-10-30 16:17:08 +02:00
|
|
|
rc = pgm_getsockopt (sock, IPPROTO_PGM, PGM_PENDING_SOCK, waiting_pipe_fd_,
|
|
|
|
&socklen);
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (rc);
|
|
|
|
zmq_assert (socklen == sizeof (*waiting_pipe_fd_));
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
|
|
|
|
2015-08-20 07:46:34 -07:00
|
|
|
// Get fds and store them into user allocated memory.
|
2010-09-28 16:35:29 +02:00
|
|
|
// send_fd is for non-blocking send wire notifications.
|
|
|
|
// receive_fd_ is for incoming back-channel protocol packets.
|
|
|
|
// rdata_notify_fd_ is raised for waiting repair transmissions.
|
|
|
|
// pending_notify_fd_ is for state driven events.
|
2015-08-20 07:46:34 -07:00
|
|
|
void zmq::pgm_socket_t::get_sender_fds (fd_t *send_fd_,
|
|
|
|
fd_t *receive_fd_,
|
2011-08-17 18:41:02 +02:00
|
|
|
fd_t *rdata_notify_fd_,
|
|
|
|
fd_t *pending_notify_fd_)
|
2009-09-11 17:58:37 +02:00
|
|
|
{
|
2010-09-28 16:35:29 +02:00
|
|
|
socklen_t socklen;
|
|
|
|
bool rc;
|
|
|
|
|
2009-09-28 18:06:06 +02:00
|
|
|
zmq_assert (send_fd_);
|
|
|
|
zmq_assert (receive_fd_);
|
2009-11-03 14:11:53 +01:00
|
|
|
zmq_assert (rdata_notify_fd_);
|
2010-01-05 11:22:14 +01:00
|
|
|
zmq_assert (pending_notify_fd_);
|
2009-11-03 14:11:53 +01:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
socklen = sizeof (*send_fd_);
|
|
|
|
rc = pgm_getsockopt (sock, IPPROTO_PGM, PGM_SEND_SOCK, send_fd_, &socklen);
|
|
|
|
zmq_assert (rc);
|
|
|
|
zmq_assert (socklen == sizeof (*receive_fd_));
|
|
|
|
|
|
|
|
socklen = sizeof (*receive_fd_);
|
2010-10-30 16:17:08 +02:00
|
|
|
rc =
|
|
|
|
pgm_getsockopt (sock, IPPROTO_PGM, PGM_RECV_SOCK, receive_fd_, &socklen);
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (rc);
|
|
|
|
zmq_assert (socklen == sizeof (*receive_fd_));
|
|
|
|
|
|
|
|
socklen = sizeof (*rdata_notify_fd_);
|
2010-10-30 16:17:08 +02:00
|
|
|
rc = pgm_getsockopt (sock, IPPROTO_PGM, PGM_REPAIR_SOCK, rdata_notify_fd_,
|
|
|
|
&socklen);
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (rc);
|
|
|
|
zmq_assert (socklen == sizeof (*rdata_notify_fd_));
|
|
|
|
|
|
|
|
socklen = sizeof (*pending_notify_fd_);
|
2010-10-30 16:17:08 +02:00
|
|
|
rc = pgm_getsockopt (sock, IPPROTO_PGM, PGM_PENDING_SOCK,
|
|
|
|
pending_notify_fd_, &socklen);
|
2010-09-28 16:35:29 +02:00
|
|
|
zmq_assert (rc);
|
|
|
|
zmq_assert (socklen == sizeof (*pending_notify_fd_));
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Send one APDU, transmit window owned memory.
|
2010-09-28 16:35:29 +02:00
|
|
|
// data_len_ must be less than one TPDU.
|
2009-09-11 17:58:37 +02:00
|
|
|
size_t zmq::pgm_socket_t::send (unsigned char *data_, size_t data_len_)
|
|
|
|
{
|
2009-09-28 18:06:06 +02:00
|
|
|
size_t nbytes = 0;
|
2015-08-20 07:46:34 -07:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
const int status = pgm_send (sock, data_, data_len_, &nbytes);
|
2009-09-28 18:06:06 +02:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// We have to write all data as one packet.
|
2010-09-28 22:46:56 +02:00
|
|
|
if (nbytes > 0) {
|
|
|
|
zmq_assert (status == PGM_IO_STATUS_NORMAL);
|
2012-05-27 22:51:56 +02:00
|
|
|
zmq_assert (nbytes == data_len_);
|
2012-10-24 09:18:52 +09:00
|
|
|
} else {
|
2010-10-30 16:17:08 +02:00
|
|
|
zmq_assert (status == PGM_IO_STATUS_RATE_LIMITED
|
|
|
|
|| status == PGM_IO_STATUS_WOULD_BLOCK);
|
2010-09-28 22:46:56 +02:00
|
|
|
|
|
|
|
if (status == PGM_IO_STATUS_RATE_LIMITED)
|
|
|
|
errno = ENOMEM;
|
|
|
|
else
|
|
|
|
errno = EBUSY;
|
|
|
|
}
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Save return value.
|
2010-09-28 22:46:56 +02:00
|
|
|
last_tx_status = status;
|
2009-09-11 17:58:37 +02:00
|
|
|
|
|
|
|
return nbytes;
|
|
|
|
}
|
|
|
|
|
2010-09-28 22:46:56 +02:00
|
|
|
long zmq::pgm_socket_t::get_rx_timeout ()
|
|
|
|
{
|
2010-10-30 16:17:08 +02:00
|
|
|
if (last_rx_status != PGM_IO_STATUS_RATE_LIMITED
|
|
|
|
&& last_rx_status != PGM_IO_STATUS_TIMER_PENDING)
|
2010-09-28 22:46:56 +02:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
struct timeval tv;
|
|
|
|
socklen_t optlen = sizeof (tv);
|
2010-10-30 16:17:08 +02:00
|
|
|
const bool rc = pgm_getsockopt (sock, IPPROTO_PGM,
|
|
|
|
last_rx_status == PGM_IO_STATUS_RATE_LIMITED
|
|
|
|
? PGM_RATE_REMAIN
|
|
|
|
: PGM_TIME_REMAIN,
|
|
|
|
&tv, &optlen);
|
2010-09-28 22:46:56 +02:00
|
|
|
zmq_assert (rc);
|
|
|
|
|
|
|
|
const long timeout = (tv.tv_sec * 1000) + (tv.tv_usec / 1000);
|
|
|
|
|
|
|
|
return timeout;
|
|
|
|
}
|
|
|
|
|
|
|
|
long zmq::pgm_socket_t::get_tx_timeout ()
|
|
|
|
{
|
|
|
|
if (last_tx_status != PGM_IO_STATUS_RATE_LIMITED)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
struct timeval tv;
|
|
|
|
socklen_t optlen = sizeof (tv);
|
2010-10-30 16:17:08 +02:00
|
|
|
const bool rc =
|
|
|
|
pgm_getsockopt (sock, IPPROTO_PGM, PGM_RATE_REMAIN, &tv, &optlen);
|
2010-09-28 22:46:56 +02:00
|
|
|
zmq_assert (rc);
|
|
|
|
|
|
|
|
const long timeout = (tv.tv_sec * 1000) + (tv.tv_usec / 1000);
|
|
|
|
|
|
|
|
return timeout;
|
|
|
|
}
|
|
|
|
|
2009-09-11 17:58:37 +02:00
|
|
|
// Return max TSDU size without fragmentation from current PGM transport.
|
2009-12-13 11:27:43 +01:00
|
|
|
size_t zmq::pgm_socket_t::get_max_tsdu_size ()
|
2009-09-11 17:58:37 +02:00
|
|
|
{
|
2010-09-28 16:35:29 +02:00
|
|
|
int max_tsdu = 0;
|
|
|
|
socklen_t optlen = sizeof (max_tsdu);
|
|
|
|
|
|
|
|
bool rc = pgm_getsockopt (sock, IPPROTO_PGM, PGM_MSS, &max_tsdu, &optlen);
|
|
|
|
zmq_assert (rc);
|
|
|
|
zmq_assert (optlen == sizeof (max_tsdu));
|
|
|
|
return (size_t) max_tsdu;
|
2009-09-25 17:50:12 +02:00
|
|
|
}
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// pgm_recvmsgv is called to fill the pgm_msgv array up to pgm_msgv_len.
|
|
|
|
// In subsequent calls data from pgm_msgv structure are returned.
|
2009-09-22 15:12:51 +02:00
|
|
|
ssize_t zmq::pgm_socket_t::receive (void **raw_data_, const pgm_tsi_t **tsi_)
|
2009-09-11 17:58:37 +02:00
|
|
|
{
|
2009-09-24 16:23:49 +02:00
|
|
|
size_t raw_data_len = 0;
|
|
|
|
|
2015-08-20 07:46:34 -07:00
|
|
|
// We just sent all data from pgm_transport_recvmsgv up
|
2009-09-11 17:58:37 +02:00
|
|
|
// and have to return 0 that another engine in this thread is scheduled.
|
|
|
|
if (nbytes_rec == nbytes_processed && nbytes_rec > 0) {
|
|
|
|
// Reset all the counters.
|
|
|
|
nbytes_rec = 0;
|
|
|
|
nbytes_processed = 0;
|
|
|
|
pgm_msgv_processed = 0;
|
2010-09-28 16:58:51 +02:00
|
|
|
errno = EAGAIN;
|
2010-09-28 22:46:56 +02:00
|
|
|
return 0;
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// If we have are going first time or if we have processed all pgm_msgv_t
|
2009-09-16 10:11:01 +02:00
|
|
|
// structure previously read from the pgm socket.
|
2009-09-11 17:58:37 +02:00
|
|
|
if (nbytes_rec == nbytes_processed) {
|
|
|
|
// Check program flow.
|
|
|
|
zmq_assert (pgm_msgv_processed == 0);
|
|
|
|
zmq_assert (nbytes_processed == 0);
|
|
|
|
zmq_assert (nbytes_rec == 0);
|
|
|
|
|
2015-08-20 07:46:34 -07:00
|
|
|
// Receive a vector of Application Protocol Domain Unit's (APDUs)
|
2009-09-11 17:58:37 +02:00
|
|
|
// from the transport.
|
2010-09-28 16:35:29 +02:00
|
|
|
pgm_error_t *pgm_error = NULL;
|
2009-09-25 17:50:12 +02:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
const int status = pgm_recvmsgv (sock, pgm_msgv, pgm_msgv_len,
|
|
|
|
MSG_ERRQUEUE, &nbytes_rec, &pgm_error);
|
2009-12-21 18:50:24 +01:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Invalid parameters.
|
2009-12-28 11:51:06 +01:00
|
|
|
zmq_assert (status != PGM_IO_STATUS_ERROR);
|
2009-12-21 18:50:24 +01:00
|
|
|
|
2010-09-28 22:46:56 +02:00
|
|
|
last_rx_status = status;
|
|
|
|
|
2009-09-25 17:50:12 +02:00
|
|
|
// In a case when no ODATA/RDATA fired POLLIN event (SPM...)
|
2010-09-28 16:35:29 +02:00
|
|
|
// pgm_recvmsg returns PGM_IO_STATUS_TIMER_PENDING.
|
2009-11-03 19:54:43 +01:00
|
|
|
if (status == PGM_IO_STATUS_TIMER_PENDING) {
|
2009-09-29 13:56:19 +02:00
|
|
|
zmq_assert (nbytes_rec == 0);
|
|
|
|
|
2015-08-20 07:46:34 -07:00
|
|
|
// In case if no RDATA/ODATA caused POLLIN 0 is
|
2009-09-25 17:50:12 +02:00
|
|
|
// returned.
|
|
|
|
nbytes_rec = 0;
|
2010-09-28 16:58:51 +02:00
|
|
|
errno = EBUSY;
|
2010-09-28 22:46:56 +02:00
|
|
|
return 0;
|
2009-09-25 17:50:12 +02:00
|
|
|
}
|
2009-11-03 19:54:43 +01:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
// Send SPMR, NAK, ACK is rate limited.
|
|
|
|
if (status == PGM_IO_STATUS_RATE_LIMITED) {
|
|
|
|
zmq_assert (nbytes_rec == 0);
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// In case if no RDATA/ODATA caused POLLIN 0 is returned.
|
2010-09-28 16:35:29 +02:00
|
|
|
nbytes_rec = 0;
|
2010-09-28 22:46:56 +02:00
|
|
|
errno = ENOMEM;
|
|
|
|
return 0;
|
2010-09-28 16:35:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// No peers and hence no incoming packets.
|
|
|
|
if (status == PGM_IO_STATUS_WOULD_BLOCK) {
|
|
|
|
zmq_assert (nbytes_rec == 0);
|
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// In case if no RDATA/ODATA caused POLLIN 0 is returned.
|
2010-09-28 16:35:29 +02:00
|
|
|
nbytes_rec = 0;
|
2010-09-28 16:58:51 +02:00
|
|
|
errno = EAGAIN;
|
2010-09-28 22:46:56 +02:00
|
|
|
return 0;
|
2010-09-28 16:35:29 +02:00
|
|
|
}
|
|
|
|
|
2009-09-29 13:56:19 +02:00
|
|
|
// Data loss.
|
|
|
|
if (status == PGM_IO_STATUS_RESET) {
|
2011-02-22 16:23:36 +01:00
|
|
|
struct pgm_sk_buff_t *skb = pgm_msgv[0].msgv_skb[0];
|
2009-09-29 13:56:19 +02:00
|
|
|
|
|
|
|
// Save lost data TSI.
|
2010-09-28 16:35:29 +02:00
|
|
|
*tsi_ = &skb->tsi;
|
2009-09-29 13:56:19 +02:00
|
|
|
nbytes_rec = 0;
|
|
|
|
|
|
|
|
// In case of dala loss -1 is returned.
|
2009-12-18 14:19:28 +01:00
|
|
|
errno = EINVAL;
|
2010-09-28 16:35:29 +02:00
|
|
|
pgm_free_skb (skb);
|
2009-09-29 13:56:19 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-12-13 11:27:43 +01:00
|
|
|
zmq_assert (status == PGM_IO_STATUS_NORMAL);
|
2010-05-13 12:41:20 +02:00
|
|
|
} else {
|
|
|
|
zmq_assert (pgm_msgv_processed <= pgm_msgv_len);
|
|
|
|
}
|
2009-09-11 17:58:37 +02:00
|
|
|
|
2010-09-28 22:46:56 +02:00
|
|
|
// Zero byte payloads are valid in PGM, but not 0MQ protocol.
|
2009-09-11 17:58:37 +02:00
|
|
|
zmq_assert (nbytes_rec > 0);
|
|
|
|
|
2009-09-25 17:50:12 +02:00
|
|
|
// Only one APDU per pgm_msgv_t structure is allowed.
|
|
|
|
zmq_assert (pgm_msgv[pgm_msgv_processed].msgv_len == 1);
|
2015-08-20 07:46:34 -07:00
|
|
|
|
2009-09-25 17:50:12 +02:00
|
|
|
struct pgm_sk_buff_t *skb = pgm_msgv[pgm_msgv_processed].msgv_skb[0];
|
|
|
|
|
|
|
|
// Take pointers from pgm_msgv_t structure.
|
|
|
|
*raw_data_ = skb->data;
|
|
|
|
raw_data_len = skb->len;
|
|
|
|
|
|
|
|
// Save current TSI.
|
|
|
|
*tsi_ = &skb->tsi;
|
2009-09-11 17:58:37 +02:00
|
|
|
|
|
|
|
// Move the the next pgm_msgv_t structure.
|
|
|
|
pgm_msgv_processed++;
|
2010-05-13 12:43:58 +02:00
|
|
|
zmq_assert (pgm_msgv_processed <= pgm_msgv_len);
|
2009-09-11 17:58:37 +02:00
|
|
|
nbytes_processed += raw_data_len;
|
|
|
|
|
|
|
|
return raw_data_len;
|
|
|
|
}
|
|
|
|
|
2009-12-13 11:27:43 +01:00
|
|
|
void zmq::pgm_socket_t::process_upstream ()
|
2009-09-11 17:58:37 +02:00
|
|
|
{
|
2009-09-28 18:06:06 +02:00
|
|
|
pgm_msgv_t dummy_msg;
|
2009-09-24 16:23:49 +02:00
|
|
|
|
2009-09-28 18:06:06 +02:00
|
|
|
size_t dummy_bytes = 0;
|
2010-09-28 16:35:29 +02:00
|
|
|
pgm_error_t *pgm_error = NULL;
|
2009-09-28 18:06:06 +02:00
|
|
|
|
2010-09-28 16:35:29 +02:00
|
|
|
const int status = pgm_recvmsgv (sock, &dummy_msg, 1, MSG_ERRQUEUE,
|
|
|
|
&dummy_bytes, &pgm_error);
|
2009-09-28 18:06:06 +02:00
|
|
|
|
2010-10-30 16:17:08 +02:00
|
|
|
// Invalid parameters.
|
2009-12-28 11:51:06 +01:00
|
|
|
zmq_assert (status != PGM_IO_STATUS_ERROR);
|
2009-12-21 18:50:24 +01:00
|
|
|
|
2009-09-28 18:06:06 +02:00
|
|
|
// No data should be returned.
|
2015-08-20 07:46:34 -07:00
|
|
|
zmq_assert (dummy_bytes == 0
|
|
|
|
&& (status == PGM_IO_STATUS_TIMER_PENDING
|
2010-10-30 16:17:08 +02:00
|
|
|
|| status == PGM_IO_STATUS_RATE_LIMITED
|
|
|
|
|| status == PGM_IO_STATUS_WOULD_BLOCK));
|
2010-09-28 22:46:56 +02:00
|
|
|
|
|
|
|
last_rx_status = status;
|
|
|
|
|
|
|
|
if (status == PGM_IO_STATUS_TIMER_PENDING)
|
|
|
|
errno = EBUSY;
|
2012-10-24 09:18:52 +09:00
|
|
|
else if (status == PGM_IO_STATUS_RATE_LIMITED)
|
2010-09-28 22:46:56 +02:00
|
|
|
errno = ENOMEM;
|
|
|
|
else
|
|
|
|
errno = EAGAIN;
|
2009-09-11 17:58:37 +02:00
|
|
|
}
|
|
|
|
|
2011-02-21 11:22:54 +01:00
|
|
|
int zmq::pgm_socket_t::compute_sqns (int tpdu_)
|
|
|
|
{
|
|
|
|
// Convert rate into B/ms.
|
2011-03-24 15:18:20 +01:00
|
|
|
uint64_t rate = uint64_t (options.rate) / 8;
|
2015-08-20 07:46:34 -07:00
|
|
|
|
2011-02-21 11:22:54 +01:00
|
|
|
// Compute the size of the buffer in bytes.
|
2011-03-24 15:18:20 +01:00
|
|
|
uint64_t size = uint64_t (options.recovery_ivl) * rate;
|
2011-02-21 11:22:54 +01:00
|
|
|
|
|
|
|
// Translate the size into number of packets.
|
|
|
|
uint64_t sqns = size / tpdu_;
|
|
|
|
|
2011-03-24 14:36:40 +01:00
|
|
|
// Buffer should be able to hold at least one packet.
|
2011-02-21 11:22:54 +01:00
|
|
|
if (sqns == 0)
|
|
|
|
sqns = 1;
|
|
|
|
|
2011-05-17 14:27:03 +02:00
|
|
|
return (int) sqns;
|
2011-02-21 11:22:54 +01:00
|
|
|
}
|
|
|
|
|
2009-09-11 17:58:37 +02:00
|
|
|
#endif
|