9 // helper: convert WSAGetLastError() to an errno constant
10 static int wsa_errno(void)
12 switch(WSAGetLastError()) {
13 case WSAEACCES: return EACCES;
14 case WSAECONNRESET: return ECONNRESET;
15 case WSAEFAULT: return EFAULT;
16 case WSAEINPROGRESS: return EINPROGRESS;
17 case WSAEINTR: return EINTR;
18 case WSAEINVAL: return EINVAL;
19 case WSAEMSGSIZE: return EMSGSIZE;
20 case WSAENETDOWN: return ENETDOWN;
21 case WSAENETRESET: return ENETRESET;
22 case WSAENOBUFS: return ENOBUFS;
23 case WSAENOTCONN: return ENOTCONN;
24 case WSAENOTSOCK: return ENOTSOCK;
25 case WSAEOPNOTSUPP: return EOPNOTSUPP;
26 case WSAESHUTDOWN: return ESHUTDOWN;
27 case WSAETIMEDOUT: return ETIMEDOUT;
28 case WSAEWOULDBLOCK: return EWOULDBLOCK;
34 void winsock_init(void)
39 if((error = WSAStartup(MAKEWORD(2,2), &wsa)) != 0)
40 catta_log_error("WSAStartup() failed: %d", error);
43 void winsock_exit(void)
45 if(WSACleanup() == SOCKET_ERROR)
46 catta_log_warn("WSACleanup() failed: %d", WSAGetLastError());
49 char *errnostrsocket(void)
53 FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
54 NULL, WSAGetLastError(), 0, buf, sizeof(buf), NULL);
59 ssize_t recvmsg(int sockfd, struct msghdr *msg, int flags)
61 LPFN_WSARECVMSG WSARecvMsg = NULL;
62 GUID wsaid = WSAID_WSARECVMSG;
70 // size_t is larger than DWORD on 64bit
71 if(msg->msg_iovlen > UINT32_MAX) {
76 // obtain the function pointer to WSARecvMsg
77 r = WSAIoctl(sockfd, SIO_GET_EXTENSION_FUNCTION_POINTER,
78 &wsaid, sizeof(wsaid), &WSARecvMsg, sizeof(WSARecvMsg),
80 if(r == SOCKET_ERROR) {
84 assert(b == sizeof(WSARecvMsg));
85 assert(WSARecvMsg != NULL);
87 // convert msghdr to WSAMSG structure
88 wsamsg.name = msg->msg_name;
89 wsamsg.namelen = msg->msg_namelen;
90 wsamsg.lpBuffers = malloc(msg->msg_iovlen * sizeof(WSABUF));
91 wsamsg.dwBufferCount = msg->msg_iovlen;
92 wsamsg.Control.len = msg->msg_controllen;
93 wsamsg.Control.buf = msg->msg_control;
94 wsamsg.dwFlags = (DWORD)flags;
96 // all flags that fit into dwFlags also fit through the flags argument
97 assert(sizeof(DWORD) <= sizeof(flags));
99 if(wsamsg.lpBuffers == NULL) {
100 // malloc will have set errno
104 // re-wrap iovecs as WSABUFs
105 for(i=0; i<msg->msg_iovlen; i++) {
107 if(msg->msg_iov[i].iov_len > ULONG_MAX) {
108 free(wsamsg.lpBuffers);
113 wsamsg.lpBuffers[i].len = msg->msg_iov[i].iov_len;
114 wsamsg.lpBuffers[i].buf = msg->msg_iov[i].iov_base;
117 r = WSARecvMsg(sockfd, &wsamsg, &bytesrcvd, NULL, NULL);
119 // the allocated WSABUF wrappers are no longer needed
120 free(wsamsg.lpBuffers);
122 if(r == SOCKET_ERROR) {
123 // XXX do we need special handling for ENETRESET, EMSGSIZE, ETIMEDOUT?
128 // DWORD has one bit more than ssize_t on 32bit
129 // XXX check for this condition before the WSARecvMsg call
130 if(bytesrcvd > SSIZE_MAX) {
135 // transfer results from wsamsg to msg
136 // NB: the data and control buffers are shared
137 msg->msg_controllen = wsamsg.Control.len;
138 msg->msg_flags = (int)wsamsg.dwFlags;
139 // all flags that fit into dwFlags also fit into msg_flags (see above)
144 ssize_t sendmsg(int sockfd, const struct msghdr *msg, int flags)
146 LPFN_WSASENDMSG WSASendMsg = NULL;
147 GUID wsaid = WSAID_WSASENDMSG;
155 // size_t is larger than DWORD on 64bit
156 if(msg->msg_iovlen > UINT32_MAX) {
161 // obtain the function pointer to WSASendMsg
162 r = WSAIoctl(sockfd, SIO_GET_EXTENSION_FUNCTION_POINTER,
163 &wsaid, sizeof(wsaid), &WSASendMsg, sizeof(WSASendMsg),
165 if(r == SOCKET_ERROR) {
169 assert(b == sizeof(WSASendMsg));
170 assert(WSASendMsg != NULL);
172 // convert msghdr to WSAMSG structure
173 wsamsg.name = msg->msg_name;
174 wsamsg.namelen = msg->msg_namelen;
175 wsamsg.lpBuffers = malloc(msg->msg_iovlen * sizeof(WSABUF));
176 wsamsg.dwBufferCount = msg->msg_iovlen;
177 wsamsg.Control.len = msg->msg_controllen;
178 wsamsg.Control.buf = msg->msg_control;
179 wsamsg.dwFlags = 0; // ignored
181 if(wsamsg.lpBuffers == NULL) {
182 // malloc will have set errno
186 // re-wrap iovecs as WSABUFs
187 for(i=0; i<msg->msg_iovlen; i++) {
189 if(msg->msg_iov[i].iov_len > ULONG_MAX) {
190 free(wsamsg.lpBuffers);
195 wsamsg.lpBuffers[i].len = msg->msg_iov[i].iov_len;
196 wsamsg.lpBuffers[i].buf = msg->msg_iov[i].iov_base;
199 r = WSASendMsg(sockfd, &wsamsg, flags, &bytessent, NULL, NULL);
201 // the allocated WSABUF wrappers are no longer needed
202 free(wsamsg.lpBuffers);
204 if(r == SOCKET_ERROR) {
205 // XXX do we need special handling for ENETRESET, ETIMEDOUT?
210 // DWORD has one bit more than ssize_t on 32bit
211 // XXX check for this condition before sending anything
212 if(bytessent > SSIZE_MAX) {
220 int ioctl(int d, unsigned long request, int *p)
224 if(ioctlsocket(d, request, &arg) == SOCKET_ERROR) {
238 int pipe(int pipefd[2])
240 int lsock = INVALID_SOCKET;
241 struct sockaddr_in laddr;
242 socklen_t laddrlen = sizeof(laddr);
244 pipefd[0] = pipefd[1] = INVALID_SOCKET;
246 // bind a listening socket to a TCP port on localhost
247 laddr.sin_family = AF_INET;
249 laddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
250 if((lsock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == SOCKET_ERROR)
252 if(bind(lsock, (struct sockaddr *)&laddr, sizeof(laddr)) == SOCKET_ERROR)
254 if(listen(lsock, 1) == SOCKET_ERROR)
257 // determine which address (i.e. port) we got bound to
258 if(getsockname(lsock, (struct sockaddr *)&laddr, &laddrlen) == SOCKET_ERROR)
260 assert(laddrlen == sizeof(laddr));
261 laddr.sin_family = AF_INET;
262 laddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
264 // connect and accept
265 if((pipefd[0] = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == SOCKET_ERROR)
267 if(connect(pipefd[0], (const struct sockaddr *)&laddr, sizeof(laddr)) == SOCKET_ERROR)
269 if((pipefd[1] = accept(lsock, NULL, NULL)) == SOCKET_ERROR)
272 // close the listener
279 closesocket(pipefd[0]);
284 int uname(struct utsname *buf)
287 const char *arch = "unknown";
289 memset(buf, 0, sizeof(struct utsname));
292 strncpy(buf->sysname, "Windows", sizeof(buf->sysname)-1);
293 strncpy(buf->release, "unknown", sizeof(buf->sysname)-1); // we don't need it
294 strncpy(buf->version, "unknown", sizeof(buf->sysname)-1); // we don't need it
296 // computer (node) name
297 if(GetComputerName(buf->nodename, sizeof(buf->nodename)-1) == 0) {
304 switch(si.wProcessorArchitecture) {
305 case PROCESSOR_ARCHITECTURE_AMD64: arch = "amd64"; break;
306 case PROCESSOR_ARCHITECTURE_ARM: arch = "arm"; break;
307 case PROCESSOR_ARCHITECTURE_IA64: arch = "ia64"; break;
308 case PROCESSOR_ARCHITECTURE_INTEL: arch = "x86"; break;
309 default: arch = "unknown";
311 strncpy(buf->machine, arch, sizeof(buf->machine)-1);