This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: socket sendmsg(), recvmsg() methods
Type: enhancement Stage: resolved
Components: Library (Lib) Versions: Python 3.3
process
Status: closed Resolution: fixed
Dependencies: Superseder: test_socket failures on Mac OS X
View: 12958
Assigned To: ncoghlan Nosy List: baikie, brett.cannon, brian, exarkun, giampaolo.rodola, jackdied, janssen, jcea, ncoghlan, neologix, pitrou, python-dev, rosslagerwall, schmichael, synapse, therve, wiml
Priority: normal Keywords: patch

Created on 2009-07-24 08:30 by synapse, last changed 2022-04-11 14:56 by admin. This issue is now closed.

Files
File name Uploaded Description Edit
srmsg.patch synapse, 2009-07-24 08:30 sendmsg()/recvmsg() patch for rev 74186
sendrecvmsgtest.py synapse, 2009-07-24 08:31 my tester script
baikie-hwundram.diff baikie, 2009-12-14 20:54 Different patch, with msg_name and scatter/gather
baikie-hwundram-v2.diff baikie, 2010-03-02 23:31 New version w/ docs and tests (work in progress)
baikie-hwundram-v2.1.diff baikie, 2010-03-03 20:24 Added test fix for non-IPv6 builds
baikie-hwundram-v3.diff baikie, 2010-05-28 19:09 New version; added RFC 3542 tests
baikie-hwundram-v4.diff baikie, 2010-06-13 19:45 New version; minor changes
v4-replace-existing-classes.diff baikie, 2010-06-13 20:02 Optional: replace SocketTCPTest, etc. with the classes from the sendmsg patch
baikie-hwundram-v5.diff baikie, 2010-12-06 19:49 review
v5-replace-existing-classes.diff baikie, 2010-12-06 19:49
baikie-hwundram-v5-hg.diff baikie, 2011-05-29 19:40 review
baikie-hwundram-v6.diff baikie, 2011-06-05 19:55 review
baikie-hwundram-v6-for-2.x.diff baikie, 2011-06-05 19:55
issue6560_ssl_fixes_v1.diff ncoghlan, 2011-08-23 04:21 Attempt 1 at resolving SSL related buildbot failures review
pass_fds_osx.diff neologix, 2011-08-24 16:43 review
Messages (55)
msg90875 - (view) Author: Gergely Kálmán (synapse) Date: 2009-07-24 08:30
This is the rewritten-from-scratch implementation of the
sendmsg()/recvmsg() methods.
Any comments / suggestions / flames are very welcome. Currently it
supports what I need
and I'm only releasing it because I don't have much time to develop it
further in the
forseeable future (1-2 months). It is rewritten from scratch, using the
python c-api
documents. I've tried my best, but I wouldn't bet that it works
error-free. I'd be glad
if someone could give me a review on what I've might done wrong.

The features that are missing:
- using scatter/gather
- using it with non-stream oriented sockets (doesn't support addresses
/msg_name/)

These should be very easy to implement. If no one takes up the task of
implementing the
missing features than I'll do it of course, you just have to wait a
little while. Of
course any errors present in the code right now will be fixed.

Thanks

Kalman Gergely
msg90876 - (view) Author: Gergely Kálmán (synapse) Date: 2009-07-24 08:31
the tester application
msg90877 - (view) Author: Thomas Herve (therve) * Date: 2009-07-24 09:37
This is a duplicate (although updated patch) from bug #1194378. It would
still need unit tests...
msg96400 - (view) Author: David Watson (baikie) Date: 2009-12-14 20:54
Hi, I'm afraid there may have been some duplication of effort
here - I set about reworking Heiko Wundram's original patch
(issue #1194378) without knowing about this one.  I don't have
unit tests yet either, but I saw this and thought I'd better post
what I had.  It includes the items on Kalman's to-do list.

This patch is based on Heiko's original code, but changes the
interface, dropping the special processing of SCM_RIGHTS, etc. (I
think the encoding/decoding would be better handled with separate
functions/classes), and adds source address (msg_name) support
and scatter/gather I/O via sendmsg() and a new recvmsg_into()
method, as well as fixing various bugs and limitations.

Comments/flames welcome too.  You'll see a few XXX comments in
the code.  One in particular refers to the msg_name value from
recvmsg() on a connected socket; I've said in the docstring that
it is "unspecified" in this case, but it might or might not
contain a valid address, depending on the OS.  These methods may
also need to be conditionally compiled if, say, CMSG_SPACE (or
sendmsg/recvmsg?) isn't available somewhere.

I didn't add a facility to receive into only part of a buffer in
recvmsg_into(), like the one in recv_into(), since memoryview
objects make it redundant AFAICT.
msg99842 - (view) Author: Jack Diederich (jackdied) * (Python committer) Date: 2010-02-22 21:43
I'm +1 on adding it but it requires unit tests.  Also, recvmsg/sendmsg appear to be *Nix only functions so someone with a windows box would need to test this to see if it blows up.
msg99951 - (view) Author: Wim (wiml) Date: 2010-02-23 20:59
I just ran across yet another implementation of sendmsg support for python sockets, whose feature set seems to complement Kalman Gergely's implementation:
  http://www.pps.jussieu.fr/~ylg/PyXAPI by Yves Legrandgerard


(Out of curiosity, people have been submitting requests for, and patches with implementations of, this feature for five or more years now and they're never accepted. Is there some opposition to sendmsg support in Python? It's a missing feature that bites me pretty regularly.)
msg99970 - (view) Author: Jack Diederich (jackdied) * (Python committer) Date: 2010-02-23 23:13
I've been digging into the patch.  Is there a reason sendmsg() wants an iterable of buffers instead of just accepting a str? The list-of-buffers more closely matches the underlying syscall but I'm not sure what the python benefit is, especially when recvmsg() only returns a single value (it only creates 1 iovec under the covers).  Python doesn't have "readv" like methods so making sendmsg/recvmsg work like recv/send (straight strings) seems like the way to go.

Also, the "y*" format character for packing/unpacking tuples is no longer supported - I'm assuming it used to mean buffers.

Does anyone have a good reference for using recvmsg/sendmsg?  I read the man pages and googled around but couldn't find anything.  I have no experience with using the calls in-the-wild.
msg99972 - (view) Author: Jack Diederich (jackdied) * (Python committer) Date: 2010-02-23 23:18
Additional data point: the perl version takes a single scalar (instead of a list of scalars) for use with sendmsg()

http://search.cpan.org/~MJP/Socket-MsgHdr-0.01/MsgHdr.pm
msg99976 - (view) Author: Jack Diederich (jackdied) * (Python committer) Date: 2010-02-23 23:34
one of the other sprinters just pointed out that Modules/_multiprocessing.c (py3k branch) uses sendmsg/recvmsg internally to pass file descriptors back and forth.  The code is very short and readable.
msg100232 - (view) Author: David Watson (baikie) Date: 2010-03-01 01:03
Thanks for your interest!  I'm actually still working on the
patch I posted, docs and a test suite, and I'll post something
soon.

Yes, you could just use b"".join() with sendmsg() (and get
slightly annoyed because it doesn't accept buffers ;) ).  I made
sendmsg() take multiple buffers because that's the way the system
call works, but also to match recvmsg_into(), which gives you the
convenience of being able to receive part of the message into a
bytearray and part into an array.array("i"), say, if that's how
the data is formatted.

As you might know, gather-write with sendmsg() can give a
performance benefit by letting the kernel assemble the message
while copying the data from userspace rather than having
userspace copy the data once to form the message and then having
the kernel copy it again when the system call is made.  I suppose
with Python you just need a larger message to see the benefit :)
Since it can read from buffers, though, socket.sendmsg() can pull
a large chunk of data straight out of an mmap object, say, and
attach headers from a bytes object without the mmapped data being
touched by Python at all (or even entering userspace, in this
case).

The patch is for 3.x, BTW - "y*" is valid there (and does take a
buffer).

As for a good reference, I haven't personally seen one.  There's
POSIX and RFC 3542, but they don't provide a huge amount of
detail.  Perhaps the (updated) W. Richard Stevens networking
books?  I've got the Stevens/Rago second edition of Advanced
Programming in the Unix Environment, which discusses FD and
credential passing with sendmsg/recvmsg, but not very well (it
misuses CMSG_LEN, for one thing).  The networking books were
updated by different people though, so perhaps they do better.

The question of whether to use CMSG_NXTHDR() to step to the next
header when constructing the buffer for sendmsg() is a bit murky,
in particular.  I've assumed that this is the way to do it since
the examples in RFC 3542 (and most of the code I've seen
generally) use CMSG_FIRSTHDR() to get the initial pointer, but
I've found that glibc's CMSG_NXTHDR() can (wrongly, I think)
return NULL if the buffer hasn't been zero-filled beforehand
(this causes segfaults with the patch I initially posted).

@Wim:

Yes, the rfc3542 module from that package looks as if it would be
usable with these patches - although it's Python 2-only, GPL-only
and looks unmaintained.  Those kind of ancillary data
constructors will actually be needed to make full portable use of
sendmsg() and recvmsg() for things like IPv6, SCTP, Linux's
socket error queues, etc.  The same goes for data for the
existing get/setsockopt() methods, in fact - the present
suggestion to use the struct module is pretty inadequate when
there are typedefs involved and implementations might add and
reorder fields, etc.

The objects in that package seem a bit overcomplicated, though,
messing about with setter methods instead of just subclassing
"bytes" and having different constructors to create the object
from individual arguments or received bytes (say, ucred(1, 2, 3)
or ucred.from_bytes(...)).

Maybe the problem of testing patches well has been putting people
off so far?  Really exercising the system's CMSG_*HDR() macros in
particular isn't entirely straightforward.  I suppose there's
also a reluctance to write tests while still uncertain about how
to present the interface - that's another reason why I went for
the most general multiple-buffer form of sendmsg()!
msg100317 - (view) Author: David Watson (baikie) Date: 2010-03-02 23:31
OK, here's a new version as a work in progress.  A lot of the new
stuff is uncommented (particularly the support code for the
tests), but there are proper docs this time and a fairly complete
test suite (but see below).

There are a couple of changes to the interface (hopefully the
last).  The recvmsg() methods no longer receive ancillary data by
default, since calling them on an AF_UNIX socket with the old
default buffer could allow a malicious sender to send unwanted
file descriptors up to receiver's resource limit, and in a
multi-threaded program, another thread could then be prevented
from opening new file descriptors before the receiving thread had
a chance to close the unwanted ones.

Since the ancillary buffer size argument is now more likely to
need a value, I've moved it to second place; the basic argument
order is now the same as in Kalman Gergely's patch.  CMSG_LEN()
and CMSG_SPACE() are now provided.

I've also used socket.error instead of ValueError when rejecting
some buffer object/array for being too big to handle, since the
system call itself might cause socket.error to be raised for a
smaller (oversized) object, failing with EMSGSIZE or whatever.

The code is now much more paranoid about checking the results of
the CMSG_*() macros, and will raise RuntimeError if it finds its
assumptions are not met.

I'd still like to add tests for receiving some of the RFC 3542
ancillary data items, especially since the SCM_RIGHTS tests can't
always (ever?) test recvmsg() with multiple items (if you send
two FD arrays, the OS can coalesce them into a single array
before delivering them).
msg100351 - (view) Author: David Watson (baikie) Date: 2010-03-03 20:24
I just found that the IPv6 tests don't get skipped when IPv6 is
available but disabled in the build - you can create IPv6
sockets, but not use them :/  This version fixes the problem.
msg106684 - (view) Author: David Watson (baikie) Date: 2010-05-28 19:09
Here is a new version of the patch; I've added some tests which
use the RFC 3542 interface (IPv6 advanced API) and am now quite
happy with it generally.

As well as Linux, I've tested it on an old (unsupported) FreeBSD
5.3 installation, which required a few changes in the tests and
the code, but is probably representative of many socket
implementations.  Testing on other systems would be appreciated!

The main issue was that when truncating ancillary data, FreeBSD
seemed to just copy as much into the buffer as would fit and did
not adjust the last item's cmsg_len member to reflect the amount
of data that was actually present, so the item would appear to
extend past the end of the buffer.  The last version of the patch
detected this and raised RuntimeError, which prevented any
truncated receives from succeeding.  The new version instead
issues a warning and returns as much of the last item as is in
the buffer.

The warning could perhaps be disabled for systems like this,
given that it happens every time ancillary data is truncated, but
truncation generally shouldn't happen in a program's normal
operation, and on other platforms a bad cmsg_len value might
indicate that the returned data is actually incorrect in some
way.


After some investigation, I've stuck with using CMSG_FIRSTHDR()
and CMSG_NXTHDR() to step through the headers when assembling the
ancillary data in sendmsg().

The KAME IPv6 userspace utilities at [1] include several programs
which send multiple control messages at once, and these always
use CMSG_NXTHDR() to advance to the next uninitialized header,
while some (but not all) of them zero-fill the buffer beforehand,
suggesting they ran into the issue with glibc's macros returning
NULL (KAME developed the BSD IPv6 stack, and the zero-filling
isn't necessary with the BSD macros).

The alternative would be to add CMSG_SPACE(size) to the pointer
to get to the next header.  Going by the diagram in RFC 3542,
that should be equivalent, but if some system defined
CMSG_SPACE(len) as, say, CMSG_LEN(len) + 3, instead of
(CMSG_LEN(len) + 3) & ~3, it would probably go unnoticed until
someone tried to use CMSG_SPACE() that way.  So given the KAME
example, I think using CMSG_NXTHDR() with a zero-filled buffer is
the way to go.


[1] http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/
msg106797 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-05-31 17:27
Would you like to upload your patch to http://codereview.appspot.com/? It would make reviewing easier.
msg106925 - (view) Author: David Watson (baikie) Date: 2010-06-02 22:49
OK.  I don't like creating/using a Google account, but here it is:

http://codereview.appspot.com/1487041/show
msg107745 - (view) Author: David Watson (baikie) Date: 2010-06-13 19:45
New version with minor changes.  Will also upload at http://codereview.appspot.com/1487041/show
msg107746 - (view) Author: David Watson (baikie) Date: 2010-06-13 20:02
Optional patch to replace SocketTCPTest, etc. with the classes from the sendmsg patch.
msg123501 - (view) Author: David Watson (baikie) Date: 2010-12-06 19:49
Updated the patch to use the new BEGIN/END_SELECT_LOOP macros.

Also fixed a bug I spotted while doing this whereby when a
timeout was set, errors in select() or poll() would be
misreported as timeouts.

Will also upload at http://codereview.appspot.com/1487041/show
msg136496 - (view) Author: Brian May (brian) * Date: 2011-05-22 01:14
What needs to happen to get recvmsg() supported in Python?

recvmsg() is required to get get transparent UDP proxies working under Linux using tproxy, the code needs to run recvmsg() to be able to find out what the original destination address was for the the packet.

Thanks

Brian May
msg136595 - (view) Author: Gergely Kálmán (synapse) Date: 2011-05-23 09:04
On 05/22/11 03:14, Brian May wrote:
> Brian May<brian@microcomaustralia.com.au>  added the comment:
>
> What needs to happen to get recvmsg() supported in Python?
>
> recvmsg() is required to get get transparent UDP proxies working under Linux using tproxy, the code needs to run recvmsg() to be able to find out what the original destination address was for the the packet.
>
> Thanks
>
> Brian May
>
> ----------
> nosy: +brian
>
> _______________________________________
> Python tracker<report@bugs.python.org>
> <http://bugs.python.org/issue6560>
> _______________________________________

Hello Brian!

It's been a while I had a look at that code. As far as I remember though 
the code is fairly decent not
taking the missing unit tests into account. There are a few todos, and 
also a pretty bad bug that I've fixed
but not committed. The TODOs include better parsing of auxiliary data, 
support for scatter-gather, addressed
messages. If you wish I can send you the latest patch that has the bug 
fixed and applies to 3.2. Do you want
this to be pushed to 3.3?

Gergely Kalman
msg136688 - (view) Author: David Watson (baikie) Date: 2011-05-23 18:56
On Mon 23 May 2011, Gergely Kálmán wrote:
> It's been a while I had a look at that code. As far as I remember though 
> the code is fairly decent not
> taking the missing unit tests into account. There are a few todos, and 
> also a pretty bad bug that I've fixed
> but not committed. The TODOs include better parsing of auxiliary data, 
> support for scatter-gather, addressed
> messages. If you wish I can send you the latest patch that has the bug 
> fixed and applies to 3.2.

Erm, have you seen the separately-implemented patch I posted at
http://bugs.python.org/file19962/baikie-hwundram-v5.diff ?  It's
basically complete IIRC.
msg136721 - (view) Author: Brian May (brian) * Date: 2011-05-24 05:43
Hello,

Are there any problems applying the v5 version of the patch to 3.3?

Also is there any remote chance for a backport to 2.7?

Thanks
msg136725 - (view) Author: Gergely Kálmán (synapse) Date: 2011-05-24 07:35
No, indeed this is a lot better.
msg137216 - (view) Author: David Watson (baikie) Date: 2011-05-29 19:40
On Tue 24 May 2011, Brian May wrote:
> Are there any problems applying the v5 version of the patch to 3.3?

Well, it still works for me, apart from a trivial patch conflict:
I'm attaching a fresh diff (with no changes) against a recent hg
revision.

Antoine did previously question the necessity of all the various
"abstract" mixin classes I used to form unit test fixtures for
different socket types, but the most recent version does, for
instance, use UDPTestBase and TCPTestBase both with and without
the threading and connection-establishing mixins, respectively
(and the replace-existing-classes patch can still be applied to
remove the redundancy with SocketTCPTest, etc.).

Apart from that, I don't know.  Perhaps a review by someone
familiar with the interface would help?

> Also is there any remote chance for a backport to 2.7?

I'd be happy to do one, but I'm pretty sure python.org's 2.x line
is closed to new features.  Perhaps some fork of CPython might be
willing to accept it, though - I don't know.
msg137344 - (view) Author: Brian May (brian) * Date: 2011-05-31 03:08
Have tested my code with this patch, the recvmsg(...) call seems to work fine.

Also had a half-hearted attempt at porting to Python 2.7, but didn't get past compiling, the code requires BEGIN_SELECT_LOOP and END_SELECT_LOOP macros that aren't defined in Python 2.7 - I tried copying the definitions from Python 3.3, but that didn't work either. Not sure if it is worth the effort if Python 2.7 is closed to new features.

Brian May
msg137376 - (view) Author: Charles-François Natali (neologix) * (Python committer) Date: 2011-05-31 17:57
> What needs to happen to get recvmsg() supported in Python?

Well, I guess that the only reason is that no committer is motivated
enough to bring this into Python: it's a rather large patch, and
honestly, I'm not sure that many people are going to use it.
The feature I personally like the most about sendmsg/recvmsg is the
ability to do scatter-gather I/O, but if the performance is critical,
then I won't be using Python.
I know that sendmsg also has some other advantages (passing FDs,
ancillary data...).

> recvmsg() is required to get get transparent UDP proxies working under Linux
> using tproxy, the code needs to run recvmsg() to be able to find out what the
> original destination address was for the the packet.

Sounds like a job for raw sockets, no? (well, you need CAP_NET_RAW)

In short, I think that you just need to find a core developer
interested, I personally am not (but I'm not opposed to it either :-).
msg137688 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-06-05 11:21
> > What needs to happen to get recvmsg() supported in Python?
> 
> Well, I guess that the only reason is that no committer is motivated
> enough to bring this into Python: it's a rather large patch, and
> honestly, I'm not sure that many people are going to use it.
> The feature I personally like the most about sendmsg/recvmsg is the
> ability to do scatter-gather I/O, but if the performance is critical,
> then I won't be using Python.
> I know that sendmsg also has some other advantages (passing FDs,
> ancillary data...).

Modules/_multiprocessing already has code using sendmsg/recvmsg,
precisely to pass FDs IIRC.
Generic support for sendmsg() and recvmsg() in the socket module would
allow to rewrite that code in pure Python.
msg137711 - (view) Author: David Watson (baikie) Date: 2011-06-05 19:55
On Tue 31 May 2011, Brian May wrote:
> Also had a half-hearted attempt at porting to Python 2.7, but
> didn't get past compiling, the code requires BEGIN_SELECT_LOOP
> and END_SELECT_LOOP macros that aren't defined in Python 2.7 -
> I tried copying the definitions from Python 3.3, but that
> didn't work either. Not sure if it is worth the effort if
> Python 2.7 is closed to new features.

Well, if it's any use to anyone, here is a backport to 2.x (the
*_SELECT_LOOP macros aren't important, and it's otherwise
straightforward).

Also attaching a new 3.x patch which fixes some deprecated markup
in the docs and adds the send/recvmsg() methods to
test_wrapped_unconnected() in test_ssl.py.
msg137719 - (view) Author: Brian May (brian) * Date: 2011-06-05 23:35
To address some of the comments above:

* Yes, the patch is large. However, most of this is in the tests. Only A relatively small part is in the code that implements the required functionality. I don't care much myself about the test cases, however would have assumed these would help get it into upstream.

(baikie-hwundram-v5-hg.diff)

 Doc/library/socket.rst  |  176 +++
 Lib/ssl.py              |   24 
 Lib/test/test_socket.py | 2120 ++++++++++++++++++++++++++++++++++++++++++++++++
 Lib/test/test_ssl.py    |   13 
 Modules/socketmodule.c  |  809 ++++++++++++++++++
 5 files changed, 3142 insertions(+)

* raw sockets are inappropriate for using UDP TPROXY support. I don't want to bypass the kernel code and have to pass headers etc myself, I just want to get the destination address so I know where the packet was original destined for. recvmsg() is the correct solution.

* Thanks for the 2.x patch. Will try that out now.
msg142656 - (view) Author: Roundup Robot (python-dev) (Python triager) Date: 2011-08-22 01:56
New changeset c64216addd7f by Nick Coghlan in branch 'default':
Add support for the send/recvmsg API to the socket module. Patch by David Watson and Heiko Wundram. (Closes #6560)
http://hg.python.org/cpython/rev/c64216addd7f
msg142685 - (view) Author: Roundup Robot (python-dev) (Python triager) Date: 2011-08-22 06:28
New changeset 37721ee145a2 by Nick Coghlan in branch 'default':
Credit patch authors in NEWS for #6560
http://hg.python.org/cpython/rev/37721ee145a2
msg142690 - (view) Author: Charles-François Natali (neologix) * (Python committer) Date: 2011-08-22 07:13
> New changeset c64216addd7f by Nick Coghlan in branch 'default':
> Add support for the send/recvmsg API to the socket module. Patch by David Watson and Heiko Wundram. (Closes #6560)
> http://hg.python.org/cpython/rev/c64216addd7f
>

I had actually started doing a review, I should have said so...
There was nothing spectacular though, so I'll just make some updates later.
msg142695 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-22 08:13
Someone here at the sprints pointed out a redundant unsigned comparison to 0 that I missed, so a second set of eyes to double-check things like that would be good.
msg142778 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-23 03:01
Reopening to track buildbot failures (at least on Windows) - at a glance, it looks like the SSL socket wrapper is still adding (and trying to test) the send/receivemsg methods even when they're missing from the socket object on the current platform.
msg142780 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-23 04:21
Attached patch (ssl_fixes_v1) makes the presence of the sendmsg/recvmsg methods in the ssl module conditional on their being present in the underlying socket module.

However, in doing this, I noticed that these methods will, at best, work during the time between connection and the socket going secure and were not added to the list of methods that the SSL is documented as exposing. Perhaps we should just ditch them entirely?
msg142787 - (view) Author: Charles-François Natali (neologix) * (Python committer) Date: 2011-08-23 07:12
> However, in doing this, I noticed that these methods will, at best, work during the time between connection and the socket going secure and were not added to the list of methods that the SSL is documented as exposing. Perhaps we should just ditch them entirely?

+1
msg142804 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-08-23 11:31
> However, in doing this, I noticed that these methods will, at best,
> work during the time between connection and the socket going secure
> and were not added to the list of methods that the SSL is documented
> as exposing. Perhaps we should just ditch them entirely?

Well, apparently the SSLSocket object is meant to be usable in clear
text mode. I'm not sure why it's like that, but your patch looks ok to
me (except that it has a debug print() call).
msg142809 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-23 12:02
That's the part I'm questioning though. I'm not clear why you'd ever do that instead of doing everything on the original socket before invoking ssl.wrap_socket.

What I missed on the original patch before committing it (mea culpa) is that the SSL part is neither documented nor tested properly (the tests only check that it is disallowed on a secured SSLSocket, not that it works on a connected-but-not-secured-yet SSLSocket object).

The absence of proper tests and documentation is the main reason I'm tempted to just revert those parts of the patch that touch the ssl module and its tests.
msg142812 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-08-23 12:20
> That's the part I'm questioning though. I'm not clear why you'd ever do 
> that instead of doing everything on the original socket before invoking 
> ssl.wrap_socket.
> 
> What I missed on the original patch before committing it (mea culpa) is 
> that the SSL part is neither documented nor tested properly (the tests 
> only check that it is disallowed on a secured SSLSocket, not that it
> works on a connected-but-not-secured-yet SSLSocket object).

Bill, do you know?

> The absence of proper tests and documentation is the main reason I'm tempted 
> to just revert those parts of the patch that touch the ssl module and its
> tests.

Then perhaps raise NotImplementedError, so that people know it's deliberate and not an oversight.
msg142814 - (view) Author: Roundup Robot (python-dev) (Python triager) Date: 2011-08-23 12:26
New changeset fd10d042b41d by Nick Coghlan in branch 'default':
Remove the SSLSocket versions of sendmsg/recvmsg due to lack of proper tests and documentation in conjunction with lack of any known use cases (see issue #6560 for details)
http://hg.python.org/cpython/rev/fd10d042b41d
msg142815 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-23 12:30
As you can see, I just pushed a change that removed the new methods from SSLSocket objects. If anyone wants to step up with a valid use case (not already covered by wrap_socket), preferably with a patch to add them back that includes proper tests and documentation changes, please open a new feature request and attach the new patch to that issue.
msg142816 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-23 12:32
Regarding the 'missing methods' aspect, the SSL docs are already pretty clear that SSLSocket objects don't expose the full socket API:

http://docs.python.org/dev/library/ssl#ssl-sockets

Those docs are actually what really got me started down the path of wondering whether or not these new methods even belong on SSLSocket in the first place.
msg142822 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-23 13:27
And the Windows buildbots are now happy (at least with respect to this change, anyway - they're still griping about a few other issues).

I don't know if it's feasible to support these new APIs at the socket module level on Windows, but any patches along those lines should also be placed in a new issue rather than being added to this one.
msg142874 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-08-24 00:26
The OS X buildbots show some failures:
http://www.python.org/dev/buildbot/all/builders/AMD64%20Snow%20Leopard%202%203.x
msg142885 - (view) Author: Charles-François Natali (neologix) * (Python committer) Date: 2011-08-24 16:43
Here's a patch skipping testFDPassSeparate and
testFDPassSeparateMinSpace on OS X < 10.5, due to known kernel bugs
(see http://developer.apple.com/library/mac/#qa/qa1541/_index.html).
For InterruptedSendTimeoutTest and testInterruptedSendmsgTimeout, it
also looks like a kernel bug.
There could be another explanation, though: if, for some reason, other
threads are running at that time, the signal might be delivered to
another thread, and our main thread remains stuck on sendto/sendmsg
once the socket buffer is full. I'm however not sure why this would
only affect OS X (since FreeBSD behaves in the same way when it comes
to signals, contrarily to Linux). Also, I'm not sure why this would
not affect recv/recvmsg.
msg142897 - (view) Author: Charles-François Natali (neologix) * (Python committer) Date: 2011-08-24 19:04
As noted by Antoine, the OS X 10.5 buildbots are also failing.
msg142901 - (view) Author: David Watson (baikie) Date: 2011-08-24 19:13
On Tue 23 Aug 2011, Nick Coghlan wrote:
> As you can see, I just pushed a change that removed the new
> methods from SSLSocket objects. If anyone wants to step up with
> a valid use case (not already covered by wrap_socket),
> preferably with a patch to add them back that includes proper
> tests and documentation changes, please open a new feature
> request and attach the new patch to that issue.

Hi, sorry about the trouble caused by the broken tests, but
SSLSocket should at least override sendmsg() to stop misguided
programs sending data in the clear:

http://bugs.python.org/issue12835
msg142982 - (view) Author: Charles-François Natali (neologix) * (Python committer) Date: 2011-08-25 17:28
> The OS X buildbots show some failures:

It seems to fail consistently on every OS X version.
I've had another look both at the code and the test, and couldn't find anything wrong with it.
Since there are a number of known bugs pertaining to FD passing on OS X - even on recent versions - I'd suggest to skip those tests on this platform.
As for sendto/sendmsg not being interrupted by the signal, I'd be curious to see if running test_socket alone solves the problem (just to make sure no other thread is running, which might receive the signal).
msg143082 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-08-27 15:57
Putting this back to open until we decide what to do about the OS X test failures. It sounds like it could really do with some more poking and prodding to figure out whether or not it poses a potential security risk or is just a relatively cosmetic problem with the API, so I'm reluctant to just skip the failing tests at this point.
msg143412 - (view) Author: Bill Janssen (janssen) * (Python committer) Date: 2011-09-02 16:20
I'll take a look at this next week, when I'm more on-line again.

Bill

2011/8/25 Charles-François Natali <report@bugs.python.org>:
>
> Charles-François Natali <neologix@free.fr> added the comment:
>
>> The OS X buildbots show some failures:
>
> It seems to fail consistently on every OS X version.
> I've had another look both at the code and the test, and couldn't find anything wrong with it.
> Since there are a number of known bugs pertaining to FD passing on OS X - even on recent versions - I'd suggest to skip those tests on this platform.
> As for sendto/sendmsg not being interrupted by the signal, I'd be curious to see if running test_socket alone solves the problem (just to make sure no other thread is running, which might receive the signal).
>
> ----------
>
> _______________________________________
> Python tracker <report@bugs.python.org>
> <http://bugs.python.org/issue6560>
> _______________________________________
>
msg143714 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-09-07 23:01
If Bill gets a chance to investigate this before the weekend, great, otherwise my plan to stop making noise in the buildbot results will be to:

1. Create a separate issue specifically for the errors reported by the Mac OS X buildbots (allowing the problem to be spelled out more clearly for readers, and also allowing the feature request itself to be closed)

2. Flag the offending tests as expected failures on Mac OS X, with a pointer back to the new tracker issue.

That way, if these failures are due to underlying OS bugs or limitations (as they appear to be), we'll get a clear indication in the buildbots when Apple have fixed the relevant problems.
msg143855 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-09-11 05:46
Closing the feature request as complete. The remaining Mac OS X buildbot issues now have their own tracker item: #12958
msg143933 - (view) Author: Bill Janssen (janssen) * (Python committer) Date: 2011-09-12 19:49
I'm guessing these things are due to interaction with some Apple
security update, as the buildbots were working well 8 months ago.

Bill

On Wed, Sep 7, 2011 at 4:01 PM, Nick Coghlan <report@bugs.python.org> wrote:
>
> Nick Coghlan <ncoghlan@gmail.com> added the comment:
>
> If Bill gets a chance to investigate this before the weekend, great, otherwise my plan to stop making noise in the buildbot results will be to:
>
> 1. Create a separate issue specifically for the errors reported by the Mac OS X buildbots (allowing the problem to be spelled out more clearly for readers, and also allowing the feature request itself to be closed)
>
> 2. Flag the offending tests as expected failures on Mac OS X, with a pointer back to the new tracker issue.
>
> That way, if these failures are due to underlying OS bugs or limitations (as they appear to be), we'll get a clear indication in the buildbots when Apple have fixed the relevant problems.
>
> ----------
>
> _______________________________________
> Python tracker <report@bugs.python.org>
> <http://bugs.python.org/issue6560>
> _______________________________________
>
msg143947 - (view) Author: Nick Coghlan (ncoghlan) * (Python committer) Date: 2011-09-13 00:30
The feature patch for sendmsg/recvmsg support came with a swathe of new tests, and the failures are in those new tests rather than anything breaking in the old ones.

As Charles-François noted though, it doesn't look like the feature implementation itself is doing anything wrong, just that there are limits to what Mac OS X allows us to do with it (hence why I closed this feature request and opened issue #12958 to cover the task of updating the test suite to accurately reflect that situation).
msg159693 - (view) Author: Roundup Robot (python-dev) (Python triager) Date: 2012-04-30 13:53
New changeset e64bec91ac91 by Richard Oudkerk in branch 'default':
Issue #14669: Skip multiprocessing connection pickling test on MacOSX
http://hg.python.org/cpython/rev/e64bec91ac91
History
Date User Action Args
2022-04-11 14:56:51adminsetgithub: 50809
2012-04-30 13:53:07python-devsetmessages: + msg159693
2011-09-14 19:27:15Andrew.Groversetnosy: - Andrew.Grover
2011-09-13 00:30:59ncoghlansetmessages: + msg143947
2011-09-12 19:49:44janssensetmessages: + msg143933
2011-09-11 05:46:03ncoghlansetstatus: open -> closed
resolution: fixed
messages: + msg143855

superseder: test_socket failures on Mac OS X
stage: needs patch -> resolved
2011-09-10 20:15:25schmichaelsetnosy: + schmichael
2011-09-10 03:35:54jceasetnosy: + jcea
2011-09-07 23:01:07ncoghlansetmessages: + msg143714
2011-09-02 16:20:14janssensetmessages: + msg143412
2011-09-01 21:58:35vstinnersetnosy: - vstinner
2011-09-01 04:59:14brett.cannonsetnosy: + brett.cannon

resolution: fixed -> (no value)
stage: resolved -> needs patch
2011-08-27 15:57:15ncoghlansetstatus: closed -> open

messages: + msg143082
2011-08-25 17:28:00neologixsetmessages: + msg142982
2011-08-24 19:13:27baikiesetmessages: + msg142901
2011-08-24 19:04:33neologixsetmessages: + msg142897
2011-08-24 16:43:48neologixsetfiles: + pass_fds_osx.diff

messages: + msg142885
2011-08-24 00:26:07pitrousetmessages: + msg142874
2011-08-23 13:27:22ncoghlansetmessages: + msg142822
2011-08-23 12:32:44ncoghlansetmessages: + msg142816
2011-08-23 12:30:17ncoghlansetstatus: open -> closed

messages: + msg142815
2011-08-23 12:26:56python-devsetmessages: + msg142814
2011-08-23 12:20:45pitrousetnosy: + janssen
messages: + msg142812
2011-08-23 12:02:24ncoghlansetmessages: + msg142809
2011-08-23 11:31:38pitrousetmessages: + msg142804
2011-08-23 07:12:54neologixsetmessages: + msg142787
2011-08-23 04:21:34ncoghlansetfiles: + issue6560_ssl_fixes_v1.diff

messages: + msg142780
2011-08-23 03:01:32ncoghlansetstatus: closed -> open
assignee: ncoghlan
messages: + msg142778
2011-08-22 08:13:04ncoghlansetmessages: + msg142695
2011-08-22 07:13:14neologixsetmessages: + msg142690
2011-08-22 06:28:01python-devsetmessages: + msg142685
2011-08-22 01:56:14python-devsetstatus: open -> closed

nosy: + python-dev
messages: + msg142656

resolution: fixed
stage: patch review -> resolved
2011-08-21 23:27:03briansetnosy: + ncoghlan
2011-06-05 23:35:25briansetmessages: + msg137719
2011-06-05 19:55:45baikiesetfiles: + baikie-hwundram-v6.diff, baikie-hwundram-v6-for-2.x.diff

messages: + msg137711
2011-06-05 11:21:20pitrousetmessages: + msg137688
2011-05-31 17:58:00neologixsetmessages: + msg137376
2011-05-31 03:08:52briansetmessages: + msg137344
2011-05-29 19:40:25baikiesetfiles: + baikie-hwundram-v5-hg.diff

messages: + msg137216
2011-05-24 07:35:22synapsesetmessages: + msg136725
2011-05-24 05:43:56briansetmessages: + msg136721
2011-05-23 18:56:29baikiesetmessages: + msg136688
2011-05-23 09:04:09synapsesetmessages: + msg136595
2011-05-22 12:26:56pitrousetnosy: + neologix, rosslagerwall

versions: + Python 3.3, - Python 3.2
2011-05-22 01:14:26briansetnosy: + brian
messages: + msg136496
2010-12-06 19:49:54baikiesetfiles: + baikie-hwundram-v5.diff, v5-replace-existing-classes.diff

messages: + msg123501
2010-06-13 20:02:11baikiesetfiles: + v4-replace-existing-classes.diff

messages: + msg107746
2010-06-13 19:45:23baikiesetfiles: + baikie-hwundram-v4.diff

messages: + msg107745
2010-06-02 22:49:34baikiesetmessages: + msg106925
2010-05-31 17:27:50pitrousetnosy: + pitrou
messages: + msg106797
2010-05-30 21:16:32Andrew.Groversetnosy: + Andrew.Grover
2010-05-28 19:17:28pitrousetnosy: + vstinner

stage: patch review
2010-05-28 19:10:05baikiesetfiles: + baikie-hwundram-v3.diff

messages: + msg106684
2010-04-28 10:08:20giampaolo.rodolasetnosy: + giampaolo.rodola
2010-04-27 21:40:25pitrousetnosy: + exarkun
2010-03-03 20:24:57baikiesetfiles: + baikie-hwundram-v2.1.diff

messages: + msg100351
2010-03-02 23:31:57baikiesetfiles: + baikie-hwundram-v2.diff

messages: + msg100317
2010-03-01 01:03:45baikiesetmessages: + msg100232
2010-02-23 23:34:00jackdiedsetmessages: + msg99976
2010-02-23 23:18:11jackdiedsetmessages: + msg99972
2010-02-23 23:13:46jackdiedsetmessages: + msg99970
2010-02-23 20:59:26wimlsetnosy: + wiml
messages: + msg99951
2010-02-22 21:43:04jackdiedsetnosy: + jackdied
messages: + msg99842
2009-12-14 20:54:43baikiesetfiles: + baikie-hwundram.diff
nosy: + baikie
messages: + msg96400

2009-07-24 09:37:50thervesetnosy: + therve
messages: + msg90877
2009-07-24 08:31:41synapsesetfiles: + sendrecvmsgtest.py

messages: + msg90876
2009-07-24 08:30:17synapsecreate