9 // helper: convert WSAGetLastError() to an errno constant
10 static int wsa_errno(void)
12 switch(WSAGetLastError()) {
13 case WSAEACCES: return EACCES;
14 case WSAECONNRESET: return ECONNRESET;
15 case WSAEFAULT: return EFAULT;
16 case WSAEINPROGRESS: return EINPROGRESS;
17 case WSAEINTR: return EINTR;
18 case WSAEINVAL: return EINVAL;
19 case WSAEMSGSIZE: return EMSGSIZE;
20 case WSAENETDOWN: return ENETDOWN;
21 case WSAENETRESET: return ENETRESET;
22 case WSAENOBUFS: return ENOBUFS;
23 case WSAENOTCONN: return ENOTCONN;
24 case WSAENOTSOCK: return ENOTSOCK;
25 case WSAEOPNOTSUPP: return EOPNOTSUPP;
26 case WSAESHUTDOWN: return ESHUTDOWN;
27 case WSAETIMEDOUT: return ETIMEDOUT;
28 case WSAEWOULDBLOCK: return EWOULDBLOCK;
34 void winsock_init(void)
39 if((error = WSAStartup(MAKEWORD(2,2), &wsa)) != 0)
40 catta_log_error("WSAStartup() failed: %d", error);
43 void winsock_exit(void)
45 if(WSACleanup() == SOCKET_ERROR)
46 catta_log_warn("WSACleanup() failed: %d", WSAGetLastError());
49 ssize_t recvmsg(int sockfd, struct msghdr *msg, int flags)
51 LPFN_WSARECVMSG WSARecvMsg = NULL;
52 GUID wsaid = WSAID_WSARECVMSG;
60 // size_t is larger than DWORD on 64bit
61 if(msg->msg_iovlen > UINT32_MAX) {
66 // obtain the function pointer to WSARecvMsg
67 r = WSAIoctl(sockfd, SIO_GET_EXTENSION_FUNCTION_POINTER,
68 &wsaid, sizeof(wsaid), &WSARecvMsg, sizeof(WSARecvMsg),
70 if(r == SOCKET_ERROR) {
74 assert(b == sizeof(WSARecvMsg));
75 assert(WSARecvMsg != NULL);
77 // convert msghdr to WSAMSG structure
78 wsamsg.name = msg->msg_name;
79 wsamsg.namelen = msg->msg_namelen;
80 wsamsg.lpBuffers = malloc(msg->msg_iovlen * sizeof(WSABUF));
81 wsamsg.dwBufferCount = msg->msg_iovlen;
82 wsamsg.Control.len = msg->msg_controllen;
83 wsamsg.Control.buf = msg->msg_control;
84 wsamsg.dwFlags = (DWORD)flags;
86 // all flags that fit into dwFlags also fit through the flags argument
87 assert(sizeof(DWORD) <= sizeof(flags));
89 if(wsamsg.lpBuffers == NULL) {
90 // malloc will have set errno
94 // re-wrap iovecs as WSABUFs
95 for(i=0; i<msg->msg_iovlen; i++) {
97 if(msg->msg_iov[i].iov_len > ULONG_MAX) {
98 free(wsamsg.lpBuffers);
103 wsamsg.lpBuffers[i].len = msg->msg_iov[i].iov_len;
104 wsamsg.lpBuffers[i].buf = msg->msg_iov[i].iov_base;
107 r = WSARecvMsg(sockfd, &wsamsg, &bytesrcvd, NULL, NULL);
109 // the allocated WSABUF wrappers are no longer needed
110 free(wsamsg.lpBuffers);
112 if(r == SOCKET_ERROR) {
113 // XXX do we need special handling for ENETRESET, EMSGSIZE, ETIMEDOUT?
118 // DWORD has one bit more than ssize_t on 32bit
119 // XXX check for this condition before the WSARecvMsg call
120 if(bytesrcvd > SSIZE_MAX) {
125 // transfer results from wsamsg to msg
126 // NB: the data and control buffers are shared
127 msg->msg_controllen = wsamsg.Control.len;
128 msg->msg_flags = (int)wsamsg.dwFlags;
129 // all flags that fit into dwFlags also fit into msg_flags (see above)
134 ssize_t sendmsg(int sockfd, const struct msghdr *msg, int flags)
136 LPFN_WSASENDMSG WSASendMsg = NULL;
137 GUID wsaid = WSAID_WSASENDMSG;
145 // size_t is larger than DWORD on 64bit
146 if(msg->msg_iovlen > UINT32_MAX) {
151 // obtain the function pointer to WSASendMsg
152 r = WSAIoctl(sockfd, SIO_GET_EXTENSION_FUNCTION_POINTER,
153 &wsaid, sizeof(wsaid), &WSASendMsg, sizeof(WSASendMsg),
155 if(r == SOCKET_ERROR) {
159 assert(b == sizeof(WSASendMsg));
160 assert(WSASendMsg != NULL);
162 // convert msghdr to WSAMSG structure
163 wsamsg.name = msg->msg_name;
164 wsamsg.namelen = msg->msg_namelen;
165 wsamsg.lpBuffers = malloc(msg->msg_iovlen * sizeof(WSABUF));
166 wsamsg.dwBufferCount = msg->msg_iovlen;
167 wsamsg.Control.len = msg->msg_controllen;
168 wsamsg.Control.buf = msg->msg_control;
169 wsamsg.dwFlags = 0; // ignored
171 if(wsamsg.lpBuffers == NULL) {
172 // malloc will have set errno
176 // re-wrap iovecs as WSABUFs
177 for(i=0; i<msg->msg_iovlen; i++) {
179 if(msg->msg_iov[i].iov_len > ULONG_MAX) {
180 free(wsamsg.lpBuffers);
185 wsamsg.lpBuffers[i].len = msg->msg_iov[i].iov_len;
186 wsamsg.lpBuffers[i].buf = msg->msg_iov[i].iov_base;
189 r = WSASendMsg(sockfd, &wsamsg, flags, &bytessent, NULL, NULL);
191 // the allocated WSABUF wrappers are no longer needed
192 free(wsamsg.lpBuffers);
194 if(r == SOCKET_ERROR) {
195 // XXX do we need special handling for ENETRESET, ETIMEDOUT?
200 // DWORD has one bit more than ssize_t on 32bit
201 // XXX check for this condition before sending anything
202 if(bytessent > SSIZE_MAX) {
210 int ioctl(int d, unsigned long request, int *p)
214 if(ioctlsocket(d, request, &arg) == SOCKET_ERROR) {
228 int pipe(int pipefd[2])
230 int lsock = INVALID_SOCKET;
231 struct sockaddr_in laddr;
232 socklen_t laddrlen = sizeof(laddr);
234 pipefd[0] = pipefd[1] = INVALID_SOCKET;
236 // bind a listening socket to a TCP port on localhost
237 laddr.sin_family = AF_INET;
239 laddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
240 if((lsock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == SOCKET_ERROR)
242 if(bind(lsock, (struct sockaddr *)&laddr, sizeof(laddr)) == SOCKET_ERROR)
244 if(listen(lsock, 1) == SOCKET_ERROR)
247 // determine which address (i.e. port) we got bound to
248 if(getsockname(lsock, (struct sockaddr *)&laddr, &laddrlen) == SOCKET_ERROR)
250 assert(laddrlen == sizeof(laddr));
251 laddr.sin_family = AF_INET;
252 laddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
254 // connect and accept
255 if((pipefd[0] = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == SOCKET_ERROR)
257 if(connect(pipefd[0], (const struct sockaddr *)&laddr, sizeof(laddr)) == SOCKET_ERROR)
259 if((pipefd[1] = accept(lsock, NULL, NULL)) == SOCKET_ERROR)
262 // close the listener
269 closesocket(pipefd[0]);
274 int uname(struct utsname *buf)
277 const char *arch = "unknown";
279 memset(buf, 0, sizeof(struct utsname));
282 strncpy(buf->sysname, "Windows", sizeof(buf->sysname)-1);
283 strncpy(buf->release, "unknown", sizeof(buf->sysname)-1); // we don't need it
284 strncpy(buf->version, "unknown", sizeof(buf->sysname)-1); // we don't need it
286 // computer (node) name
287 if(GetComputerName(buf->nodename, sizeof(buf->nodename)-1) == 0) {
294 switch(si.wProcessorArchitecture) {
295 case PROCESSOR_ARCHITECTURE_AMD64: arch = "amd64"; break;
296 case PROCESSOR_ARCHITECTURE_ARM: arch = "arm"; break;
297 case PROCESSOR_ARCHITECTURE_IA64: arch = "ia64"; break;
298 case PROCESSOR_ARCHITECTURE_INTEL: arch = "x86"; break;
299 default: arch = "unknown";
301 strncpy(buf->machine, arch, sizeof(buf->machine)-1);