3e300d1b9a38c342fdc8bff32a15b33f9fd915b6
[bpt/emacs.git] / src / w32.c
1 /* Utility and Unix shadow routines for GNU Emacs on the Microsoft Windows API.
2 Copyright (C) 1994-1995, 2000-2013 Free Software Foundation, Inc.
3
4 This file is part of GNU Emacs.
5
6 GNU Emacs is free software: you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation, either version 3 of the License, or
9 (at your option) any later version.
10
11 GNU Emacs is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with GNU Emacs. If not, see <http://www.gnu.org/licenses/>. */
18
19 /*
20 Geoff Voelker (voelker@cs.washington.edu) 7-29-94
21 */
22 #include <stddef.h> /* for offsetof */
23 #include <stdlib.h>
24 #include <stdio.h>
25 #include <float.h> /* for DBL_EPSILON */
26 #include <io.h>
27 #include <errno.h>
28 #include <fcntl.h>
29 #include <ctype.h>
30 #include <signal.h>
31 #include <sys/file.h>
32 #include <sys/time.h>
33 #include <sys/utime.h>
34 #include <math.h>
35 #include <time.h>
36
37 /* must include CRT headers *before* config.h */
38
39 #include <config.h>
40 #include <mbstring.h> /* for _mbspbrk, _mbslwr, _mbsrchr, ... */
41
42 #undef access
43 #undef chdir
44 #undef chmod
45 #undef creat
46 #undef ctime
47 #undef fopen
48 #undef link
49 #undef mkdir
50 #undef mktemp
51 #undef open
52 #undef rename
53 #undef rmdir
54 #undef unlink
55
56 #undef close
57 #undef dup
58 #undef dup2
59 #undef pipe
60 #undef read
61 #undef write
62
63 #undef strerror
64
65 #undef localtime
66
67 #include "lisp.h"
68
69 #include <pwd.h>
70 #include <grp.h>
71
72 #ifdef __GNUC__
73 #define _ANONYMOUS_UNION
74 #define _ANONYMOUS_STRUCT
75 #endif
76 #include <windows.h>
77 /* Some versions of compiler define MEMORYSTATUSEX, some don't, so we
78 use a different name to avoid compilation problems. */
79 typedef struct _MEMORY_STATUS_EX {
80 DWORD dwLength;
81 DWORD dwMemoryLoad;
82 DWORDLONG ullTotalPhys;
83 DWORDLONG ullAvailPhys;
84 DWORDLONG ullTotalPageFile;
85 DWORDLONG ullAvailPageFile;
86 DWORDLONG ullTotalVirtual;
87 DWORDLONG ullAvailVirtual;
88 DWORDLONG ullAvailExtendedVirtual;
89 } MEMORY_STATUS_EX,*LPMEMORY_STATUS_EX;
90
91 #include <lmcons.h>
92 #include <shlobj.h>
93
94 #include <tlhelp32.h>
95 #include <psapi.h>
96 #ifndef _MSC_VER
97 #include <w32api.h>
98 #endif
99 #if !defined (__MINGW32__) || __W32API_MAJOR_VERSION < 3 || (__W32API_MAJOR_VERSION == 3 && __W32API_MINOR_VERSION < 15)
100 /* This either is not in psapi.h or guarded by higher value of
101 _WIN32_WINNT than what we use. w32api supplied with MinGW 3.15
102 defines it in psapi.h */
103 typedef struct _PROCESS_MEMORY_COUNTERS_EX {
104 DWORD cb;
105 DWORD PageFaultCount;
106 SIZE_T PeakWorkingSetSize;
107 SIZE_T WorkingSetSize;
108 SIZE_T QuotaPeakPagedPoolUsage;
109 SIZE_T QuotaPagedPoolUsage;
110 SIZE_T QuotaPeakNonPagedPoolUsage;
111 SIZE_T QuotaNonPagedPoolUsage;
112 SIZE_T PagefileUsage;
113 SIZE_T PeakPagefileUsage;
114 SIZE_T PrivateUsage;
115 } PROCESS_MEMORY_COUNTERS_EX,*PPROCESS_MEMORY_COUNTERS_EX;
116 #endif
117
118 #include <winioctl.h>
119 #include <aclapi.h>
120
121 #ifdef _MSC_VER
122 /* MSVC doesn't provide the definition of REPARSE_DATA_BUFFER and the
123 associated macros, except on ntifs.h, which cannot be included
124 because it triggers conflicts with other Windows API headers. So
125 we define it here by hand. */
126
127 typedef struct _REPARSE_DATA_BUFFER {
128 ULONG ReparseTag;
129 USHORT ReparseDataLength;
130 USHORT Reserved;
131 union {
132 struct {
133 USHORT SubstituteNameOffset;
134 USHORT SubstituteNameLength;
135 USHORT PrintNameOffset;
136 USHORT PrintNameLength;
137 ULONG Flags;
138 WCHAR PathBuffer[1];
139 } SymbolicLinkReparseBuffer;
140 struct {
141 USHORT SubstituteNameOffset;
142 USHORT SubstituteNameLength;
143 USHORT PrintNameOffset;
144 USHORT PrintNameLength;
145 WCHAR PathBuffer[1];
146 } MountPointReparseBuffer;
147 struct {
148 UCHAR DataBuffer[1];
149 } GenericReparseBuffer;
150 } DUMMYUNIONNAME;
151 } REPARSE_DATA_BUFFER, *PREPARSE_DATA_BUFFER;
152
153 #ifndef FILE_DEVICE_FILE_SYSTEM
154 #define FILE_DEVICE_FILE_SYSTEM 9
155 #endif
156 #ifndef METHOD_BUFFERED
157 #define METHOD_BUFFERED 0
158 #endif
159 #ifndef FILE_ANY_ACCESS
160 #define FILE_ANY_ACCESS 0x00000000
161 #endif
162 #ifndef CTL_CODE
163 #define CTL_CODE(t,f,m,a) (((t)<<16)|((a)<<14)|((f)<<2)|(m))
164 #endif
165 #define FSCTL_GET_REPARSE_POINT \
166 CTL_CODE(FILE_DEVICE_FILE_SYSTEM, 42, METHOD_BUFFERED, FILE_ANY_ACCESS)
167 #endif
168
169 /* TCP connection support. */
170 #include <sys/socket.h>
171 #undef socket
172 #undef bind
173 #undef connect
174 #undef htons
175 #undef ntohs
176 #undef inet_addr
177 #undef gethostname
178 #undef gethostbyname
179 #undef getservbyname
180 #undef getpeername
181 #undef shutdown
182 #undef setsockopt
183 #undef listen
184 #undef getsockname
185 #undef accept
186 #undef recvfrom
187 #undef sendto
188
189 #include "w32.h"
190 #include "ndir.h"
191 #include "w32common.h"
192 #include "w32heap.h"
193 #include "w32select.h"
194 #include "systime.h"
195 #include "dispextern.h" /* for xstrcasecmp */
196 #include "coding.h" /* for Vlocale_coding_system */
197
198 #include "careadlinkat.h"
199 #include "allocator.h"
200
201 /* For serial_configure and serial_open. */
202 #include "process.h"
203
204 typedef HRESULT (WINAPI * ShGetFolderPath_fn)
205 (IN HWND, IN int, IN HANDLE, IN DWORD, OUT char *);
206
207 Lisp_Object QCloaded_from;
208
209 void globals_of_w32 (void);
210 static DWORD get_rid (PSID);
211 static int is_symlink (const char *);
212 static char * chase_symlinks (const char *);
213 static int enable_privilege (LPCTSTR, BOOL, TOKEN_PRIVILEGES *);
214 static int restore_privilege (TOKEN_PRIVILEGES *);
215 static BOOL WINAPI revert_to_self (void);
216
217 extern int sys_access (const char *, int);
218 extern void *e_malloc (size_t);
219 extern int sys_select (int, SELECT_TYPE *, SELECT_TYPE *, SELECT_TYPE *,
220 EMACS_TIME *, void *);
221
222
223 \f
224 /* Initialization states.
225
226 WARNING: If you add any more such variables for additional APIs,
227 you MUST add initialization for them to globals_of_w32
228 below. This is because these variables might get set
229 to non-NULL values during dumping, but the dumped Emacs
230 cannot reuse those values, because it could be run on a
231 different version of the OS, where API addresses are
232 different. */
233 static BOOL g_b_init_is_windows_9x;
234 static BOOL g_b_init_open_process_token;
235 static BOOL g_b_init_get_token_information;
236 static BOOL g_b_init_lookup_account_sid;
237 static BOOL g_b_init_get_sid_sub_authority;
238 static BOOL g_b_init_get_sid_sub_authority_count;
239 static BOOL g_b_init_get_security_info;
240 static BOOL g_b_init_get_file_security;
241 static BOOL g_b_init_get_security_descriptor_owner;
242 static BOOL g_b_init_get_security_descriptor_group;
243 static BOOL g_b_init_is_valid_sid;
244 static BOOL g_b_init_create_toolhelp32_snapshot;
245 static BOOL g_b_init_process32_first;
246 static BOOL g_b_init_process32_next;
247 static BOOL g_b_init_open_thread_token;
248 static BOOL g_b_init_impersonate_self;
249 static BOOL g_b_init_revert_to_self;
250 static BOOL g_b_init_get_process_memory_info;
251 static BOOL g_b_init_get_process_working_set_size;
252 static BOOL g_b_init_global_memory_status;
253 static BOOL g_b_init_global_memory_status_ex;
254 static BOOL g_b_init_get_length_sid;
255 static BOOL g_b_init_equal_sid;
256 static BOOL g_b_init_copy_sid;
257 static BOOL g_b_init_get_native_system_info;
258 static BOOL g_b_init_get_system_times;
259 static BOOL g_b_init_create_symbolic_link;
260
261 /*
262 BEGIN: Wrapper functions around OpenProcessToken
263 and other functions in advapi32.dll that are only
264 supported in Windows NT / 2k / XP
265 */
266 /* ** Function pointer typedefs ** */
267 typedef BOOL (WINAPI * OpenProcessToken_Proc) (
268 HANDLE ProcessHandle,
269 DWORD DesiredAccess,
270 PHANDLE TokenHandle);
271 typedef BOOL (WINAPI * GetTokenInformation_Proc) (
272 HANDLE TokenHandle,
273 TOKEN_INFORMATION_CLASS TokenInformationClass,
274 LPVOID TokenInformation,
275 DWORD TokenInformationLength,
276 PDWORD ReturnLength);
277 typedef BOOL (WINAPI * GetProcessTimes_Proc) (
278 HANDLE process_handle,
279 LPFILETIME creation_time,
280 LPFILETIME exit_time,
281 LPFILETIME kernel_time,
282 LPFILETIME user_time);
283
284 GetProcessTimes_Proc get_process_times_fn = NULL;
285
286 #ifdef _UNICODE
287 const char * const LookupAccountSid_Name = "LookupAccountSidW";
288 const char * const GetFileSecurity_Name = "GetFileSecurityW";
289 #else
290 const char * const LookupAccountSid_Name = "LookupAccountSidA";
291 const char * const GetFileSecurity_Name = "GetFileSecurityA";
292 #endif
293 typedef BOOL (WINAPI * LookupAccountSid_Proc) (
294 LPCTSTR lpSystemName,
295 PSID Sid,
296 LPTSTR Name,
297 LPDWORD cbName,
298 LPTSTR DomainName,
299 LPDWORD cbDomainName,
300 PSID_NAME_USE peUse);
301 typedef PDWORD (WINAPI * GetSidSubAuthority_Proc) (
302 PSID pSid,
303 DWORD n);
304 typedef PUCHAR (WINAPI * GetSidSubAuthorityCount_Proc) (
305 PSID pSid);
306 typedef DWORD (WINAPI * GetSecurityInfo_Proc) (
307 HANDLE handle,
308 SE_OBJECT_TYPE ObjectType,
309 SECURITY_INFORMATION SecurityInfo,
310 PSID *ppsidOwner,
311 PSID *ppsidGroup,
312 PACL *ppDacl,
313 PACL *ppSacl,
314 PSECURITY_DESCRIPTOR *ppSecurityDescriptor);
315 typedef BOOL (WINAPI * GetFileSecurity_Proc) (
316 LPCTSTR lpFileName,
317 SECURITY_INFORMATION RequestedInformation,
318 PSECURITY_DESCRIPTOR pSecurityDescriptor,
319 DWORD nLength,
320 LPDWORD lpnLengthNeeded);
321 typedef BOOL (WINAPI * GetSecurityDescriptorOwner_Proc) (
322 PSECURITY_DESCRIPTOR pSecurityDescriptor,
323 PSID *pOwner,
324 LPBOOL lpbOwnerDefaulted);
325 typedef BOOL (WINAPI * GetSecurityDescriptorGroup_Proc) (
326 PSECURITY_DESCRIPTOR pSecurityDescriptor,
327 PSID *pGroup,
328 LPBOOL lpbGroupDefaulted);
329 typedef BOOL (WINAPI * IsValidSid_Proc) (
330 PSID sid);
331 typedef HANDLE (WINAPI * CreateToolhelp32Snapshot_Proc) (
332 DWORD dwFlags,
333 DWORD th32ProcessID);
334 typedef BOOL (WINAPI * Process32First_Proc) (
335 HANDLE hSnapshot,
336 LPPROCESSENTRY32 lppe);
337 typedef BOOL (WINAPI * Process32Next_Proc) (
338 HANDLE hSnapshot,
339 LPPROCESSENTRY32 lppe);
340 typedef BOOL (WINAPI * OpenThreadToken_Proc) (
341 HANDLE ThreadHandle,
342 DWORD DesiredAccess,
343 BOOL OpenAsSelf,
344 PHANDLE TokenHandle);
345 typedef BOOL (WINAPI * ImpersonateSelf_Proc) (
346 SECURITY_IMPERSONATION_LEVEL ImpersonationLevel);
347 typedef BOOL (WINAPI * RevertToSelf_Proc) (void);
348 typedef BOOL (WINAPI * GetProcessMemoryInfo_Proc) (
349 HANDLE Process,
350 PPROCESS_MEMORY_COUNTERS ppsmemCounters,
351 DWORD cb);
352 typedef BOOL (WINAPI * GetProcessWorkingSetSize_Proc) (
353 HANDLE hProcess,
354 PSIZE_T lpMinimumWorkingSetSize,
355 PSIZE_T lpMaximumWorkingSetSize);
356 typedef BOOL (WINAPI * GlobalMemoryStatus_Proc) (
357 LPMEMORYSTATUS lpBuffer);
358 typedef BOOL (WINAPI * GlobalMemoryStatusEx_Proc) (
359 LPMEMORY_STATUS_EX lpBuffer);
360 typedef BOOL (WINAPI * CopySid_Proc) (
361 DWORD nDestinationSidLength,
362 PSID pDestinationSid,
363 PSID pSourceSid);
364 typedef BOOL (WINAPI * EqualSid_Proc) (
365 PSID pSid1,
366 PSID pSid2);
367 typedef DWORD (WINAPI * GetLengthSid_Proc) (
368 PSID pSid);
369 typedef void (WINAPI * GetNativeSystemInfo_Proc) (
370 LPSYSTEM_INFO lpSystemInfo);
371 typedef BOOL (WINAPI * GetSystemTimes_Proc) (
372 LPFILETIME lpIdleTime,
373 LPFILETIME lpKernelTime,
374 LPFILETIME lpUserTime);
375 typedef BOOLEAN (WINAPI *CreateSymbolicLink_Proc) (
376 LPTSTR lpSymlinkFileName,
377 LPTSTR lpTargetFileName,
378 DWORD dwFlags);
379
380 /* ** A utility function ** */
381 static BOOL
382 is_windows_9x (void)
383 {
384 static BOOL s_b_ret = 0;
385 OSVERSIONINFO os_ver;
386 if (g_b_init_is_windows_9x == 0)
387 {
388 g_b_init_is_windows_9x = 1;
389 ZeroMemory (&os_ver, sizeof (OSVERSIONINFO));
390 os_ver.dwOSVersionInfoSize = sizeof (OSVERSIONINFO);
391 if (GetVersionEx (&os_ver))
392 {
393 s_b_ret = (os_ver.dwPlatformId == VER_PLATFORM_WIN32_WINDOWS);
394 }
395 }
396 return s_b_ret;
397 }
398
399 static Lisp_Object ltime (ULONGLONG);
400
401 /* Get total user and system times for get-internal-run-time.
402 Returns a list of integers if the times are provided by the OS
403 (NT derivatives), otherwise it returns the result of current-time. */
404 Lisp_Object
405 w32_get_internal_run_time (void)
406 {
407 if (get_process_times_fn)
408 {
409 FILETIME create, exit, kernel, user;
410 HANDLE proc = GetCurrentProcess ();
411 if ((*get_process_times_fn) (proc, &create, &exit, &kernel, &user))
412 {
413 LARGE_INTEGER user_int, kernel_int, total;
414 user_int.LowPart = user.dwLowDateTime;
415 user_int.HighPart = user.dwHighDateTime;
416 kernel_int.LowPart = kernel.dwLowDateTime;
417 kernel_int.HighPart = kernel.dwHighDateTime;
418 total.QuadPart = user_int.QuadPart + kernel_int.QuadPart;
419 return ltime (total.QuadPart);
420 }
421 }
422
423 return Fcurrent_time ();
424 }
425
426 /* ** The wrapper functions ** */
427
428 static BOOL WINAPI
429 open_process_token (HANDLE ProcessHandle,
430 DWORD DesiredAccess,
431 PHANDLE TokenHandle)
432 {
433 static OpenProcessToken_Proc s_pfn_Open_Process_Token = NULL;
434 HMODULE hm_advapi32 = NULL;
435 if (is_windows_9x () == TRUE)
436 {
437 return FALSE;
438 }
439 if (g_b_init_open_process_token == 0)
440 {
441 g_b_init_open_process_token = 1;
442 hm_advapi32 = LoadLibrary ("Advapi32.dll");
443 s_pfn_Open_Process_Token =
444 (OpenProcessToken_Proc) GetProcAddress (hm_advapi32, "OpenProcessToken");
445 }
446 if (s_pfn_Open_Process_Token == NULL)
447 {
448 return FALSE;
449 }
450 return (
451 s_pfn_Open_Process_Token (
452 ProcessHandle,
453 DesiredAccess,
454 TokenHandle)
455 );
456 }
457
458 static BOOL WINAPI
459 get_token_information (HANDLE TokenHandle,
460 TOKEN_INFORMATION_CLASS TokenInformationClass,
461 LPVOID TokenInformation,
462 DWORD TokenInformationLength,
463 PDWORD ReturnLength)
464 {
465 static GetTokenInformation_Proc s_pfn_Get_Token_Information = NULL;
466 HMODULE hm_advapi32 = NULL;
467 if (is_windows_9x () == TRUE)
468 {
469 return FALSE;
470 }
471 if (g_b_init_get_token_information == 0)
472 {
473 g_b_init_get_token_information = 1;
474 hm_advapi32 = LoadLibrary ("Advapi32.dll");
475 s_pfn_Get_Token_Information =
476 (GetTokenInformation_Proc) GetProcAddress (hm_advapi32, "GetTokenInformation");
477 }
478 if (s_pfn_Get_Token_Information == NULL)
479 {
480 return FALSE;
481 }
482 return (
483 s_pfn_Get_Token_Information (
484 TokenHandle,
485 TokenInformationClass,
486 TokenInformation,
487 TokenInformationLength,
488 ReturnLength)
489 );
490 }
491
492 static BOOL WINAPI
493 lookup_account_sid (LPCTSTR lpSystemName,
494 PSID Sid,
495 LPTSTR Name,
496 LPDWORD cbName,
497 LPTSTR DomainName,
498 LPDWORD cbDomainName,
499 PSID_NAME_USE peUse)
500 {
501 static LookupAccountSid_Proc s_pfn_Lookup_Account_Sid = NULL;
502 HMODULE hm_advapi32 = NULL;
503 if (is_windows_9x () == TRUE)
504 {
505 return FALSE;
506 }
507 if (g_b_init_lookup_account_sid == 0)
508 {
509 g_b_init_lookup_account_sid = 1;
510 hm_advapi32 = LoadLibrary ("Advapi32.dll");
511 s_pfn_Lookup_Account_Sid =
512 (LookupAccountSid_Proc) GetProcAddress (hm_advapi32, LookupAccountSid_Name);
513 }
514 if (s_pfn_Lookup_Account_Sid == NULL)
515 {
516 return FALSE;
517 }
518 return (
519 s_pfn_Lookup_Account_Sid (
520 lpSystemName,
521 Sid,
522 Name,
523 cbName,
524 DomainName,
525 cbDomainName,
526 peUse)
527 );
528 }
529
530 static PDWORD WINAPI
531 get_sid_sub_authority (PSID pSid, DWORD n)
532 {
533 static GetSidSubAuthority_Proc s_pfn_Get_Sid_Sub_Authority = NULL;
534 static DWORD zero = 0U;
535 HMODULE hm_advapi32 = NULL;
536 if (is_windows_9x () == TRUE)
537 {
538 return &zero;
539 }
540 if (g_b_init_get_sid_sub_authority == 0)
541 {
542 g_b_init_get_sid_sub_authority = 1;
543 hm_advapi32 = LoadLibrary ("Advapi32.dll");
544 s_pfn_Get_Sid_Sub_Authority =
545 (GetSidSubAuthority_Proc) GetProcAddress (
546 hm_advapi32, "GetSidSubAuthority");
547 }
548 if (s_pfn_Get_Sid_Sub_Authority == NULL)
549 {
550 return &zero;
551 }
552 return (s_pfn_Get_Sid_Sub_Authority (pSid, n));
553 }
554
555 static PUCHAR WINAPI
556 get_sid_sub_authority_count (PSID pSid)
557 {
558 static GetSidSubAuthorityCount_Proc s_pfn_Get_Sid_Sub_Authority_Count = NULL;
559 static UCHAR zero = 0U;
560 HMODULE hm_advapi32 = NULL;
561 if (is_windows_9x () == TRUE)
562 {
563 return &zero;
564 }
565 if (g_b_init_get_sid_sub_authority_count == 0)
566 {
567 g_b_init_get_sid_sub_authority_count = 1;
568 hm_advapi32 = LoadLibrary ("Advapi32.dll");
569 s_pfn_Get_Sid_Sub_Authority_Count =
570 (GetSidSubAuthorityCount_Proc) GetProcAddress (
571 hm_advapi32, "GetSidSubAuthorityCount");
572 }
573 if (s_pfn_Get_Sid_Sub_Authority_Count == NULL)
574 {
575 return &zero;
576 }
577 return (s_pfn_Get_Sid_Sub_Authority_Count (pSid));
578 }
579
580 static DWORD WINAPI
581 get_security_info (HANDLE handle,
582 SE_OBJECT_TYPE ObjectType,
583 SECURITY_INFORMATION SecurityInfo,
584 PSID *ppsidOwner,
585 PSID *ppsidGroup,
586 PACL *ppDacl,
587 PACL *ppSacl,
588 PSECURITY_DESCRIPTOR *ppSecurityDescriptor)
589 {
590 static GetSecurityInfo_Proc s_pfn_Get_Security_Info = NULL;
591 HMODULE hm_advapi32 = NULL;
592 if (is_windows_9x () == TRUE)
593 {
594 return FALSE;
595 }
596 if (g_b_init_get_security_info == 0)
597 {
598 g_b_init_get_security_info = 1;
599 hm_advapi32 = LoadLibrary ("Advapi32.dll");
600 s_pfn_Get_Security_Info =
601 (GetSecurityInfo_Proc) GetProcAddress (
602 hm_advapi32, "GetSecurityInfo");
603 }
604 if (s_pfn_Get_Security_Info == NULL)
605 {
606 return FALSE;
607 }
608 return (s_pfn_Get_Security_Info (handle, ObjectType, SecurityInfo,
609 ppsidOwner, ppsidGroup, ppDacl, ppSacl,
610 ppSecurityDescriptor));
611 }
612
613 static BOOL WINAPI
614 get_file_security (LPCTSTR lpFileName,
615 SECURITY_INFORMATION RequestedInformation,
616 PSECURITY_DESCRIPTOR pSecurityDescriptor,
617 DWORD nLength,
618 LPDWORD lpnLengthNeeded)
619 {
620 static GetFileSecurity_Proc s_pfn_Get_File_Security = NULL;
621 HMODULE hm_advapi32 = NULL;
622 if (is_windows_9x () == TRUE)
623 {
624 return FALSE;
625 }
626 if (g_b_init_get_file_security == 0)
627 {
628 g_b_init_get_file_security = 1;
629 hm_advapi32 = LoadLibrary ("Advapi32.dll");
630 s_pfn_Get_File_Security =
631 (GetFileSecurity_Proc) GetProcAddress (
632 hm_advapi32, GetFileSecurity_Name);
633 }
634 if (s_pfn_Get_File_Security == NULL)
635 {
636 return FALSE;
637 }
638 return (s_pfn_Get_File_Security (lpFileName, RequestedInformation,
639 pSecurityDescriptor, nLength,
640 lpnLengthNeeded));
641 }
642
643 static BOOL WINAPI
644 get_security_descriptor_owner (PSECURITY_DESCRIPTOR pSecurityDescriptor,
645 PSID *pOwner,
646 LPBOOL lpbOwnerDefaulted)
647 {
648 static GetSecurityDescriptorOwner_Proc s_pfn_Get_Security_Descriptor_Owner = NULL;
649 HMODULE hm_advapi32 = NULL;
650 if (is_windows_9x () == TRUE)
651 {
652 return FALSE;
653 }
654 if (g_b_init_get_security_descriptor_owner == 0)
655 {
656 g_b_init_get_security_descriptor_owner = 1;
657 hm_advapi32 = LoadLibrary ("Advapi32.dll");
658 s_pfn_Get_Security_Descriptor_Owner =
659 (GetSecurityDescriptorOwner_Proc) GetProcAddress (
660 hm_advapi32, "GetSecurityDescriptorOwner");
661 }
662 if (s_pfn_Get_Security_Descriptor_Owner == NULL)
663 {
664 return FALSE;
665 }
666 return (s_pfn_Get_Security_Descriptor_Owner (pSecurityDescriptor, pOwner,
667 lpbOwnerDefaulted));
668 }
669
670 static BOOL WINAPI
671 get_security_descriptor_group (PSECURITY_DESCRIPTOR pSecurityDescriptor,
672 PSID *pGroup,
673 LPBOOL lpbGroupDefaulted)
674 {
675 static GetSecurityDescriptorGroup_Proc s_pfn_Get_Security_Descriptor_Group = NULL;
676 HMODULE hm_advapi32 = NULL;
677 if (is_windows_9x () == TRUE)
678 {
679 return FALSE;
680 }
681 if (g_b_init_get_security_descriptor_group == 0)
682 {
683 g_b_init_get_security_descriptor_group = 1;
684 hm_advapi32 = LoadLibrary ("Advapi32.dll");
685 s_pfn_Get_Security_Descriptor_Group =
686 (GetSecurityDescriptorGroup_Proc) GetProcAddress (
687 hm_advapi32, "GetSecurityDescriptorGroup");
688 }
689 if (s_pfn_Get_Security_Descriptor_Group == NULL)
690 {
691 return FALSE;
692 }
693 return (s_pfn_Get_Security_Descriptor_Group (pSecurityDescriptor, pGroup,
694 lpbGroupDefaulted));
695 }
696
697 static BOOL WINAPI
698 is_valid_sid (PSID sid)
699 {
700 static IsValidSid_Proc s_pfn_Is_Valid_Sid = NULL;
701 HMODULE hm_advapi32 = NULL;
702 if (is_windows_9x () == TRUE)
703 {
704 return FALSE;
705 }
706 if (g_b_init_is_valid_sid == 0)
707 {
708 g_b_init_is_valid_sid = 1;
709 hm_advapi32 = LoadLibrary ("Advapi32.dll");
710 s_pfn_Is_Valid_Sid =
711 (IsValidSid_Proc) GetProcAddress (
712 hm_advapi32, "IsValidSid");
713 }
714 if (s_pfn_Is_Valid_Sid == NULL)
715 {
716 return FALSE;
717 }
718 return (s_pfn_Is_Valid_Sid (sid));
719 }
720
721 static BOOL WINAPI
722 equal_sid (PSID sid1, PSID sid2)
723 {
724 static EqualSid_Proc s_pfn_Equal_Sid = NULL;
725 HMODULE hm_advapi32 = NULL;
726 if (is_windows_9x () == TRUE)
727 {
728 return FALSE;
729 }
730 if (g_b_init_equal_sid == 0)
731 {
732 g_b_init_equal_sid = 1;
733 hm_advapi32 = LoadLibrary ("Advapi32.dll");
734 s_pfn_Equal_Sid =
735 (EqualSid_Proc) GetProcAddress (
736 hm_advapi32, "EqualSid");
737 }
738 if (s_pfn_Equal_Sid == NULL)
739 {
740 return FALSE;
741 }
742 return (s_pfn_Equal_Sid (sid1, sid2));
743 }
744
745 static DWORD WINAPI
746 get_length_sid (PSID sid)
747 {
748 static GetLengthSid_Proc s_pfn_Get_Length_Sid = NULL;
749 HMODULE hm_advapi32 = NULL;
750 if (is_windows_9x () == TRUE)
751 {
752 return 0;
753 }
754 if (g_b_init_get_length_sid == 0)
755 {
756 g_b_init_get_length_sid = 1;
757 hm_advapi32 = LoadLibrary ("Advapi32.dll");
758 s_pfn_Get_Length_Sid =
759 (GetLengthSid_Proc) GetProcAddress (
760 hm_advapi32, "GetLengthSid");
761 }
762 if (s_pfn_Get_Length_Sid == NULL)
763 {
764 return 0;
765 }
766 return (s_pfn_Get_Length_Sid (sid));
767 }
768
769 static BOOL WINAPI
770 copy_sid (DWORD destlen, PSID dest, PSID src)
771 {
772 static CopySid_Proc s_pfn_Copy_Sid = NULL;
773 HMODULE hm_advapi32 = NULL;
774 if (is_windows_9x () == TRUE)
775 {
776 return FALSE;
777 }
778 if (g_b_init_copy_sid == 0)
779 {
780 g_b_init_copy_sid = 1;
781 hm_advapi32 = LoadLibrary ("Advapi32.dll");
782 s_pfn_Copy_Sid =
783 (CopySid_Proc) GetProcAddress (
784 hm_advapi32, "CopySid");
785 }
786 if (s_pfn_Copy_Sid == NULL)
787 {
788 return FALSE;
789 }
790 return (s_pfn_Copy_Sid (destlen, dest, src));
791 }
792
793 /*
794 END: Wrapper functions around OpenProcessToken
795 and other functions in advapi32.dll that are only
796 supported in Windows NT / 2k / XP
797 */
798
799 static void WINAPI
800 get_native_system_info (LPSYSTEM_INFO lpSystemInfo)
801 {
802 static GetNativeSystemInfo_Proc s_pfn_Get_Native_System_Info = NULL;
803 if (is_windows_9x () != TRUE)
804 {
805 if (g_b_init_get_native_system_info == 0)
806 {
807 g_b_init_get_native_system_info = 1;
808 s_pfn_Get_Native_System_Info =
809 (GetNativeSystemInfo_Proc)GetProcAddress (GetModuleHandle ("kernel32.dll"),
810 "GetNativeSystemInfo");
811 }
812 if (s_pfn_Get_Native_System_Info != NULL)
813 s_pfn_Get_Native_System_Info (lpSystemInfo);
814 }
815 else
816 lpSystemInfo->dwNumberOfProcessors = -1;
817 }
818
819 static BOOL WINAPI
820 get_system_times (LPFILETIME lpIdleTime,
821 LPFILETIME lpKernelTime,
822 LPFILETIME lpUserTime)
823 {
824 static GetSystemTimes_Proc s_pfn_Get_System_times = NULL;
825 if (is_windows_9x () == TRUE)
826 {
827 return FALSE;
828 }
829 if (g_b_init_get_system_times == 0)
830 {
831 g_b_init_get_system_times = 1;
832 s_pfn_Get_System_times =
833 (GetSystemTimes_Proc)GetProcAddress (GetModuleHandle ("kernel32.dll"),
834 "GetSystemTimes");
835 }
836 if (s_pfn_Get_System_times == NULL)
837 return FALSE;
838 return (s_pfn_Get_System_times (lpIdleTime, lpKernelTime, lpUserTime));
839 }
840
841 static BOOLEAN WINAPI
842 create_symbolic_link (LPTSTR lpSymlinkFilename,
843 LPTSTR lpTargetFileName,
844 DWORD dwFlags)
845 {
846 static CreateSymbolicLink_Proc s_pfn_Create_Symbolic_Link = NULL;
847 BOOLEAN retval;
848
849 if (is_windows_9x () == TRUE)
850 {
851 errno = ENOSYS;
852 return 0;
853 }
854 if (g_b_init_create_symbolic_link == 0)
855 {
856 g_b_init_create_symbolic_link = 1;
857 #ifdef _UNICODE
858 s_pfn_Create_Symbolic_Link =
859 (CreateSymbolicLink_Proc)GetProcAddress (GetModuleHandle ("kernel32.dll"),
860 "CreateSymbolicLinkW");
861 #else
862 s_pfn_Create_Symbolic_Link =
863 (CreateSymbolicLink_Proc)GetProcAddress (GetModuleHandle ("kernel32.dll"),
864 "CreateSymbolicLinkA");
865 #endif
866 }
867 if (s_pfn_Create_Symbolic_Link == NULL)
868 {
869 errno = ENOSYS;
870 return 0;
871 }
872
873 retval = s_pfn_Create_Symbolic_Link (lpSymlinkFilename, lpTargetFileName,
874 dwFlags);
875 /* If we were denied creation of the symlink, try again after
876 enabling the SeCreateSymbolicLinkPrivilege for our process. */
877 if (!retval)
878 {
879 TOKEN_PRIVILEGES priv_current;
880
881 if (enable_privilege (SE_CREATE_SYMBOLIC_LINK_NAME, TRUE, &priv_current))
882 {
883 retval = s_pfn_Create_Symbolic_Link (lpSymlinkFilename, lpTargetFileName,
884 dwFlags);
885 restore_privilege (&priv_current);
886 revert_to_self ();
887 }
888 }
889 return retval;
890 }
891 \f
892
893 /* Return 1 if P is a valid pointer to an object of size SIZE. Return
894 0 if P is NOT a valid pointer. Return -1 if we cannot validate P.
895
896 This is called from alloc.c:valid_pointer_p. */
897 int
898 w32_valid_pointer_p (void *p, int size)
899 {
900 SIZE_T done;
901 HANDLE h = OpenProcess (PROCESS_VM_READ, FALSE, GetCurrentProcessId ());
902
903 if (h)
904 {
905 unsigned char *buf = alloca (size);
906 int retval = ReadProcessMemory (h, p, buf, size, &done);
907
908 CloseHandle (h);
909 return retval;
910 }
911 else
912 return -1;
913 }
914
915 static char startup_dir[MAXPATHLEN];
916
917 /* Get the current working directory. */
918 char *
919 getwd (char *dir)
920 {
921 #if 0
922 if (GetCurrentDirectory (MAXPATHLEN, dir) > 0)
923 return dir;
924 return NULL;
925 #else
926 /* Emacs doesn't actually change directory itself, it stays in the
927 same directory where it was started. */
928 strcpy (dir, startup_dir);
929 return dir;
930 #endif
931 }
932
933 /* Emulate getloadavg. */
934
935 struct load_sample {
936 time_t sample_time;
937 ULONGLONG idle;
938 ULONGLONG kernel;
939 ULONGLONG user;
940 };
941
942 /* Number of processors on this machine. */
943 static unsigned num_of_processors;
944
945 /* We maintain 1-sec samples for the last 16 minutes in a circular buffer. */
946 static struct load_sample samples[16*60];
947 static int first_idx = -1, last_idx = -1;
948 static int max_idx = sizeof (samples) / sizeof (samples[0]);
949
950 static int
951 buf_next (int from)
952 {
953 int next_idx = from + 1;
954
955 if (next_idx >= max_idx)
956 next_idx = 0;
957
958 return next_idx;
959 }
960
961 static int
962 buf_prev (int from)
963 {
964 int prev_idx = from - 1;
965
966 if (prev_idx < 0)
967 prev_idx = max_idx - 1;
968
969 return prev_idx;
970 }
971
972 static void
973 sample_system_load (ULONGLONG *idle, ULONGLONG *kernel, ULONGLONG *user)
974 {
975 SYSTEM_INFO sysinfo;
976 FILETIME ft_idle, ft_user, ft_kernel;
977
978 /* Initialize the number of processors on this machine. */
979 if (num_of_processors <= 0)
980 {
981 get_native_system_info (&sysinfo);
982 num_of_processors = sysinfo.dwNumberOfProcessors;
983 if (num_of_processors <= 0)
984 {
985 GetSystemInfo (&sysinfo);
986 num_of_processors = sysinfo.dwNumberOfProcessors;
987 }
988 if (num_of_processors <= 0)
989 num_of_processors = 1;
990 }
991
992 /* TODO: Take into account threads that are ready to run, by
993 sampling the "\System\Processor Queue Length" performance
994 counter. The code below accounts only for threads that are
995 actually running. */
996
997 if (get_system_times (&ft_idle, &ft_kernel, &ft_user))
998 {
999 ULARGE_INTEGER uidle, ukernel, uuser;
1000
1001 memcpy (&uidle, &ft_idle, sizeof (ft_idle));
1002 memcpy (&ukernel, &ft_kernel, sizeof (ft_kernel));
1003 memcpy (&uuser, &ft_user, sizeof (ft_user));
1004 *idle = uidle.QuadPart;
1005 *kernel = ukernel.QuadPart;
1006 *user = uuser.QuadPart;
1007 }
1008 else
1009 {
1010 *idle = 0;
1011 *kernel = 0;
1012 *user = 0;
1013 }
1014 }
1015
1016 /* Produce the load average for a given time interval, using the
1017 samples in the samples[] array. WHICH can be 0, 1, or 2, meaning
1018 1-minute, 5-minute, or 15-minute average, respectively. */
1019 static double
1020 getavg (int which)
1021 {
1022 double retval = -1.0;
1023 double tdiff;
1024 int idx;
1025 double span = (which == 0 ? 1.0 : (which == 1 ? 5.0 : 15.0)) * 60;
1026 time_t now = samples[last_idx].sample_time;
1027
1028 if (first_idx != last_idx)
1029 {
1030 for (idx = buf_prev (last_idx); ; idx = buf_prev (idx))
1031 {
1032 tdiff = difftime (now, samples[idx].sample_time);
1033 if (tdiff >= span - 2*DBL_EPSILON*now)
1034 {
1035 long double sys =
1036 samples[last_idx].kernel + samples[last_idx].user
1037 - (samples[idx].kernel + samples[idx].user);
1038 long double idl = samples[last_idx].idle - samples[idx].idle;
1039
1040 retval = (1.0 - idl / sys) * num_of_processors;
1041 break;
1042 }
1043 if (idx == first_idx)
1044 break;
1045 }
1046 }
1047
1048 return retval;
1049 }
1050
1051 int
1052 getloadavg (double loadavg[], int nelem)
1053 {
1054 int elem;
1055 ULONGLONG idle, kernel, user;
1056 time_t now = time (NULL);
1057
1058 /* Store another sample. We ignore samples that are less than 1 sec
1059 apart. */
1060 if (difftime (now, samples[last_idx].sample_time) >= 1.0 - 2*DBL_EPSILON*now)
1061 {
1062 sample_system_load (&idle, &kernel, &user);
1063 last_idx = buf_next (last_idx);
1064 samples[last_idx].sample_time = now;
1065 samples[last_idx].idle = idle;
1066 samples[last_idx].kernel = kernel;
1067 samples[last_idx].user = user;
1068 /* If the buffer has more that 15 min worth of samples, discard
1069 the old ones. */
1070 if (first_idx == -1)
1071 first_idx = last_idx;
1072 while (first_idx != last_idx
1073 && (difftime (now, samples[first_idx].sample_time)
1074 >= 15.0*60 + 2*DBL_EPSILON*now))
1075 first_idx = buf_next (first_idx);
1076 }
1077
1078 for (elem = 0; elem < nelem; elem++)
1079 {
1080 double avg = getavg (elem);
1081
1082 if (avg < 0)
1083 break;
1084 loadavg[elem] = avg;
1085 }
1086
1087 return elem;
1088 }
1089
1090 /* Emulate getpwuid, getpwnam and others. */
1091
1092 #define PASSWD_FIELD_SIZE 256
1093
1094 static char dflt_passwd_name[PASSWD_FIELD_SIZE];
1095 static char dflt_passwd_passwd[PASSWD_FIELD_SIZE];
1096 static char dflt_passwd_gecos[PASSWD_FIELD_SIZE];
1097 static char dflt_passwd_dir[PASSWD_FIELD_SIZE];
1098 static char dflt_passwd_shell[PASSWD_FIELD_SIZE];
1099
1100 static struct passwd dflt_passwd =
1101 {
1102 dflt_passwd_name,
1103 dflt_passwd_passwd,
1104 0,
1105 0,
1106 0,
1107 dflt_passwd_gecos,
1108 dflt_passwd_dir,
1109 dflt_passwd_shell,
1110 };
1111
1112 static char dflt_group_name[GNLEN+1];
1113
1114 static struct group dflt_group =
1115 {
1116 /* When group information is not available, we return this as the
1117 group for all files. */
1118 dflt_group_name,
1119 0,
1120 };
1121
1122 unsigned
1123 getuid (void)
1124 {
1125 return dflt_passwd.pw_uid;
1126 }
1127
1128 unsigned
1129 geteuid (void)
1130 {
1131 /* I could imagine arguing for checking to see whether the user is
1132 in the Administrators group and returning a UID of 0 for that
1133 case, but I don't know how wise that would be in the long run. */
1134 return getuid ();
1135 }
1136
1137 unsigned
1138 getgid (void)
1139 {
1140 return dflt_passwd.pw_gid;
1141 }
1142
1143 unsigned
1144 getegid (void)
1145 {
1146 return getgid ();
1147 }
1148
1149 struct passwd *
1150 getpwuid (unsigned uid)
1151 {
1152 if (uid == dflt_passwd.pw_uid)
1153 return &dflt_passwd;
1154 return NULL;
1155 }
1156
1157 struct group *
1158 getgrgid (gid_t gid)
1159 {
1160 return &dflt_group;
1161 }
1162
1163 struct passwd *
1164 getpwnam (char *name)
1165 {
1166 struct passwd *pw;
1167
1168 pw = getpwuid (getuid ());
1169 if (!pw)
1170 return pw;
1171
1172 if (xstrcasecmp (name, pw->pw_name))
1173 return NULL;
1174
1175 return pw;
1176 }
1177
1178 static void
1179 init_user_info (void)
1180 {
1181 /* Find the user's real name by opening the process token and
1182 looking up the name associated with the user-sid in that token.
1183
1184 Use the relative portion of the identifier authority value from
1185 the user-sid as the user id value (same for group id using the
1186 primary group sid from the process token). */
1187
1188 char uname[UNLEN+1], gname[GNLEN+1], domain[1025];
1189 DWORD ulength = sizeof (uname), dlength = sizeof (domain), needed;
1190 DWORD glength = sizeof (gname);
1191 HANDLE token = NULL;
1192 SID_NAME_USE user_type;
1193 unsigned char *buf = NULL;
1194 DWORD blen = 0;
1195 TOKEN_USER user_token;
1196 TOKEN_PRIMARY_GROUP group_token;
1197 BOOL result;
1198
1199 result = open_process_token (GetCurrentProcess (), TOKEN_QUERY, &token);
1200 if (result)
1201 {
1202 result = get_token_information (token, TokenUser, NULL, 0, &blen);
1203 if (!result && GetLastError () == ERROR_INSUFFICIENT_BUFFER)
1204 {
1205 buf = xmalloc (blen);
1206 result = get_token_information (token, TokenUser,
1207 (LPVOID)buf, blen, &needed);
1208 if (result)
1209 {
1210 memcpy (&user_token, buf, sizeof (user_token));
1211 result = lookup_account_sid (NULL, user_token.User.Sid,
1212 uname, &ulength,
1213 domain, &dlength, &user_type);
1214 }
1215 }
1216 else
1217 result = FALSE;
1218 }
1219 if (result)
1220 {
1221 strcpy (dflt_passwd.pw_name, uname);
1222 /* Determine a reasonable uid value. */
1223 if (xstrcasecmp ("administrator", uname) == 0)
1224 {
1225 dflt_passwd.pw_uid = 500; /* well-known Administrator uid */
1226 dflt_passwd.pw_gid = 513; /* well-known None gid */
1227 }
1228 else
1229 {
1230 /* Use the last sub-authority value of the RID, the relative
1231 portion of the SID, as user/group ID. */
1232 dflt_passwd.pw_uid = get_rid (user_token.User.Sid);
1233
1234 /* Get group id and name. */
1235 result = get_token_information (token, TokenPrimaryGroup,
1236 (LPVOID)buf, blen, &needed);
1237 if (!result && GetLastError () == ERROR_INSUFFICIENT_BUFFER)
1238 {
1239 buf = xrealloc (buf, blen = needed);
1240 result = get_token_information (token, TokenPrimaryGroup,
1241 (LPVOID)buf, blen, &needed);
1242 }
1243 if (result)
1244 {
1245 memcpy (&group_token, buf, sizeof (group_token));
1246 dflt_passwd.pw_gid = get_rid (group_token.PrimaryGroup);
1247 dlength = sizeof (domain);
1248 /* If we can get at the real Primary Group name, use that.
1249 Otherwise, the default group name was already set to
1250 "None" in globals_of_w32. */
1251 if (lookup_account_sid (NULL, group_token.PrimaryGroup,
1252 gname, &glength, NULL, &dlength,
1253 &user_type))
1254 strcpy (dflt_group_name, gname);
1255 }
1256 else
1257 dflt_passwd.pw_gid = dflt_passwd.pw_uid;
1258 }
1259 }
1260 /* If security calls are not supported (presumably because we
1261 are running under Windows 9X), fallback to this: */
1262 else if (GetUserName (uname, &ulength))
1263 {
1264 strcpy (dflt_passwd.pw_name, uname);
1265 if (xstrcasecmp ("administrator", uname) == 0)
1266 dflt_passwd.pw_uid = 0;
1267 else
1268 dflt_passwd.pw_uid = 123;
1269 dflt_passwd.pw_gid = dflt_passwd.pw_uid;
1270 }
1271 else
1272 {
1273 strcpy (dflt_passwd.pw_name, "unknown");
1274 dflt_passwd.pw_uid = 123;
1275 dflt_passwd.pw_gid = 123;
1276 }
1277 dflt_group.gr_gid = dflt_passwd.pw_gid;
1278
1279 /* Ensure HOME and SHELL are defined. */
1280 if (getenv ("HOME") == NULL)
1281 emacs_abort ();
1282 if (getenv ("SHELL") == NULL)
1283 emacs_abort ();
1284
1285 /* Set dir and shell from environment variables. */
1286 strcpy (dflt_passwd.pw_dir, getenv ("HOME"));
1287 strcpy (dflt_passwd.pw_shell, getenv ("SHELL"));
1288
1289 xfree (buf);
1290 if (token)
1291 CloseHandle (token);
1292 }
1293
1294 int
1295 random (void)
1296 {
1297 /* rand () on NT gives us 15 random bits...hack together 30 bits. */
1298 return ((rand () << 15) | rand ());
1299 }
1300
1301 void
1302 srandom (int seed)
1303 {
1304 srand (seed);
1305 }
1306
1307 /* Current codepage for encoding file names. */
1308 static int file_name_codepage;
1309
1310 /* Return the maximum length in bytes of a multibyte character
1311 sequence encoded in the current ANSI codepage. This is required to
1312 correctly walk the encoded file names one character at a time. */
1313 static int
1314 max_filename_mbslen (void)
1315 {
1316 /* A simple cache to avoid calling GetCPInfo every time we need to
1317 normalize a file name. The file-name encoding is not supposed to
1318 be changed too frequently, if ever. */
1319 static Lisp_Object last_file_name_encoding;
1320 static int last_max_mbslen;
1321 Lisp_Object current_encoding;
1322
1323 current_encoding = Vfile_name_coding_system;
1324 if (NILP (current_encoding))
1325 current_encoding = Vdefault_file_name_coding_system;
1326
1327 if (!EQ (last_file_name_encoding, current_encoding))
1328 {
1329 CPINFO cp_info;
1330
1331 last_file_name_encoding = current_encoding;
1332 /* Default to the current ANSI codepage. */
1333 file_name_codepage = w32_ansi_code_page;
1334 if (!NILP (current_encoding))
1335 {
1336 char *cpname = SDATA (SYMBOL_NAME (current_encoding));
1337 char *cp = NULL, *end;
1338 int cpnum;
1339
1340 if (strncmp (cpname, "cp", 2) == 0)
1341 cp = cpname + 2;
1342 else if (strncmp (cpname, "windows-", 8) == 0)
1343 cp = cpname + 8;
1344
1345 if (cp)
1346 {
1347 end = cp;
1348 cpnum = strtol (cp, &end, 10);
1349 if (cpnum && *end == '\0' && end - cp >= 2)
1350 file_name_codepage = cpnum;
1351 }
1352 }
1353
1354 if (!file_name_codepage)
1355 file_name_codepage = CP_ACP; /* CP_ACP = 0, but let's not assume that */
1356
1357 if (!GetCPInfo (file_name_codepage, &cp_info))
1358 {
1359 file_name_codepage = CP_ACP;
1360 if (!GetCPInfo (file_name_codepage, &cp_info))
1361 emacs_abort ();
1362 }
1363 last_max_mbslen = cp_info.MaxCharSize;
1364 }
1365
1366 return last_max_mbslen;
1367 }
1368
1369 /* Normalize filename by converting all path separators to
1370 the specified separator. Also conditionally convert upper
1371 case path name components to lower case. */
1372
1373 static void
1374 normalize_filename (register char *fp, char path_sep)
1375 {
1376 char sep;
1377 char *elem, *p2;
1378 int dbcs_p = max_filename_mbslen () > 1;
1379
1380 /* Always lower-case drive letters a-z, even if the filesystem
1381 preserves case in filenames.
1382 This is so filenames can be compared by string comparison
1383 functions that are case-sensitive. Even case-preserving filesystems
1384 do not distinguish case in drive letters. */
1385 if (dbcs_p)
1386 p2 = CharNextExA (file_name_codepage, fp, 0);
1387 else
1388 p2 = fp + 1;
1389
1390 if (*p2 == ':' && *fp >= 'A' && *fp <= 'Z')
1391 {
1392 *fp += 'a' - 'A';
1393 fp += 2;
1394 }
1395
1396 if (NILP (Vw32_downcase_file_names))
1397 {
1398 while (*fp)
1399 {
1400 if (*fp == '/' || *fp == '\\')
1401 *fp = path_sep;
1402 if (!dbcs_p)
1403 fp++;
1404 else
1405 fp = CharNextExA (file_name_codepage, fp, 0);
1406 }
1407 return;
1408 }
1409
1410 sep = path_sep; /* convert to this path separator */
1411 elem = fp; /* start of current path element */
1412
1413 do {
1414 if (*fp >= 'a' && *fp <= 'z')
1415 elem = 0; /* don't convert this element */
1416
1417 if (*fp == 0 || *fp == ':')
1418 {
1419 sep = *fp; /* restore current separator (or 0) */
1420 *fp = '/'; /* after conversion of this element */
1421 }
1422
1423 if (*fp == '/' || *fp == '\\')
1424 {
1425 if (elem && elem != fp)
1426 {
1427 *fp = 0; /* temporary end of string */
1428 _mbslwr (elem); /* while we convert to lower case */
1429 }
1430 *fp = sep; /* convert (or restore) path separator */
1431 elem = fp + 1; /* next element starts after separator */
1432 sep = path_sep;
1433 }
1434 if (*fp)
1435 {
1436 if (!dbcs_p)
1437 fp++;
1438 else
1439 fp = CharNextExA (file_name_codepage, fp, 0);
1440 }
1441 } while (*fp);
1442 }
1443
1444 /* Destructively turn backslashes into slashes. */
1445 void
1446 dostounix_filename (register char *p)
1447 {
1448 normalize_filename (p, '/');
1449 }
1450
1451 /* Destructively turn slashes into backslashes. */
1452 void
1453 unixtodos_filename (register char *p)
1454 {
1455 normalize_filename (p, '\\');
1456 }
1457
1458 /* Remove all CR's that are followed by a LF.
1459 (From msdos.c...probably should figure out a way to share it,
1460 although this code isn't going to ever change.) */
1461 static int
1462 crlf_to_lf (register int n, register unsigned char *buf)
1463 {
1464 unsigned char *np = buf;
1465 unsigned char *startp = buf;
1466 unsigned char *endp = buf + n;
1467
1468 if (n == 0)
1469 return n;
1470 while (buf < endp - 1)
1471 {
1472 if (*buf == 0x0d)
1473 {
1474 if (*(++buf) != 0x0a)
1475 *np++ = 0x0d;
1476 }
1477 else
1478 *np++ = *buf++;
1479 }
1480 if (buf < endp)
1481 *np++ = *buf++;
1482 return np - startp;
1483 }
1484
1485 /* Parse the root part of file name, if present. Return length and
1486 optionally store pointer to char after root. */
1487 static int
1488 parse_root (char * name, char ** pPath)
1489 {
1490 char * start = name;
1491
1492 if (name == NULL)
1493 return 0;
1494
1495 /* find the root name of the volume if given */
1496 if (isalpha (name[0]) && name[1] == ':')
1497 {
1498 /* skip past drive specifier */
1499 name += 2;
1500 if (IS_DIRECTORY_SEP (name[0]))
1501 name++;
1502 }
1503 else if (IS_DIRECTORY_SEP (name[0]) && IS_DIRECTORY_SEP (name[1]))
1504 {
1505 int slashes = 2;
1506 int dbcs_p = max_filename_mbslen () > 1;
1507
1508 name += 2;
1509 do
1510 {
1511 if (IS_DIRECTORY_SEP (*name) && --slashes == 0)
1512 break;
1513 if (dbcs_p)
1514 name = CharNextExA (file_name_codepage, name, 0);
1515 else
1516 name++;
1517 }
1518 while ( *name );
1519 if (IS_DIRECTORY_SEP (name[0]))
1520 name++;
1521 }
1522
1523 if (pPath)
1524 *pPath = name;
1525
1526 return name - start;
1527 }
1528
1529 /* Get long base name for name; name is assumed to be absolute. */
1530 static int
1531 get_long_basename (char * name, char * buf, int size)
1532 {
1533 WIN32_FIND_DATA find_data;
1534 HANDLE dir_handle;
1535 int len = 0;
1536
1537 /* must be valid filename, no wild cards or other invalid characters */
1538 if (_mbspbrk (name, "*?|<>\""))
1539 return 0;
1540
1541 dir_handle = FindFirstFile (name, &find_data);
1542 if (dir_handle != INVALID_HANDLE_VALUE)
1543 {
1544 if ((len = strlen (find_data.cFileName)) < size)
1545 memcpy (buf, find_data.cFileName, len + 1);
1546 else
1547 len = 0;
1548 FindClose (dir_handle);
1549 }
1550 return len;
1551 }
1552
1553 /* Get long name for file, if possible (assumed to be absolute). */
1554 BOOL
1555 w32_get_long_filename (char * name, char * buf, int size)
1556 {
1557 char * o = buf;
1558 char * p;
1559 char * q;
1560 char full[ MAX_PATH ];
1561 int len;
1562
1563 len = strlen (name);
1564 if (len >= MAX_PATH)
1565 return FALSE;
1566
1567 /* Use local copy for destructive modification. */
1568 memcpy (full, name, len+1);
1569 unixtodos_filename (full);
1570
1571 /* Copy root part verbatim. */
1572 len = parse_root (full, &p);
1573 memcpy (o, full, len);
1574 o += len;
1575 *o = '\0';
1576 size -= len;
1577
1578 while (p != NULL && *p)
1579 {
1580 q = p;
1581 p = _mbschr (q, '\\');
1582 if (p) *p = '\0';
1583 len = get_long_basename (full, o, size);
1584 if (len > 0)
1585 {
1586 o += len;
1587 size -= len;
1588 if (p != NULL)
1589 {
1590 *p++ = '\\';
1591 if (size < 2)
1592 return FALSE;
1593 *o++ = '\\';
1594 size--;
1595 *o = '\0';
1596 }
1597 }
1598 else
1599 return FALSE;
1600 }
1601
1602 return TRUE;
1603 }
1604
1605 static int
1606 is_unc_volume (const char *filename)
1607 {
1608 const char *ptr = filename;
1609
1610 if (!IS_DIRECTORY_SEP (ptr[0]) || !IS_DIRECTORY_SEP (ptr[1]) || !ptr[2])
1611 return 0;
1612
1613 if (_mbspbrk (ptr + 2, "*?|<>\"\\/"))
1614 return 0;
1615
1616 return 1;
1617 }
1618
1619 #define REG_ROOT "SOFTWARE\\GNU\\Emacs"
1620
1621 LPBYTE
1622 w32_get_resource (char *key, LPDWORD lpdwtype)
1623 {
1624 LPBYTE lpvalue;
1625 HKEY hrootkey = NULL;
1626 DWORD cbData;
1627
1628 /* Check both the current user and the local machine to see if
1629 we have any resources. */
1630
1631 if (RegOpenKeyEx (HKEY_CURRENT_USER, REG_ROOT, 0, KEY_READ, &hrootkey) == ERROR_SUCCESS)
1632 {
1633 lpvalue = NULL;
1634
1635 if (RegQueryValueEx (hrootkey, key, NULL, NULL, NULL, &cbData) == ERROR_SUCCESS
1636 && (lpvalue = xmalloc (cbData)) != NULL
1637 && RegQueryValueEx (hrootkey, key, NULL, lpdwtype, lpvalue, &cbData) == ERROR_SUCCESS)
1638 {
1639 RegCloseKey (hrootkey);
1640 return (lpvalue);
1641 }
1642
1643 xfree (lpvalue);
1644
1645 RegCloseKey (hrootkey);
1646 }
1647
1648 if (RegOpenKeyEx (HKEY_LOCAL_MACHINE, REG_ROOT, 0, KEY_READ, &hrootkey) == ERROR_SUCCESS)
1649 {
1650 lpvalue = NULL;
1651
1652 if (RegQueryValueEx (hrootkey, key, NULL, NULL, NULL, &cbData) == ERROR_SUCCESS
1653 && (lpvalue = xmalloc (cbData)) != NULL
1654 && RegQueryValueEx (hrootkey, key, NULL, lpdwtype, lpvalue, &cbData) == ERROR_SUCCESS)
1655 {
1656 RegCloseKey (hrootkey);
1657 return (lpvalue);
1658 }
1659
1660 xfree (lpvalue);
1661
1662 RegCloseKey (hrootkey);
1663 }
1664
1665 return (NULL);
1666 }
1667
1668 char *get_emacs_configuration (void);
1669
1670 void
1671 init_environment (char ** argv)
1672 {
1673 static const char * const tempdirs[] = {
1674 "$TMPDIR", "$TEMP", "$TMP", "c:/"
1675 };
1676
1677 int i;
1678
1679 const int imax = sizeof (tempdirs) / sizeof (tempdirs[0]);
1680
1681 /* Make sure they have a usable $TMPDIR. Many Emacs functions use
1682 temporary files and assume "/tmp" if $TMPDIR is unset, which
1683 will break on DOS/Windows. Refuse to work if we cannot find
1684 a directory, not even "c:/", usable for that purpose. */
1685 for (i = 0; i < imax ; i++)
1686 {
1687 const char *tmp = tempdirs[i];
1688
1689 if (*tmp == '$')
1690 tmp = getenv (tmp + 1);
1691 /* Note that `access' can lie to us if the directory resides on a
1692 read-only filesystem, like CD-ROM or a write-protected floppy.
1693 The only way to be really sure is to actually create a file and
1694 see if it succeeds. But I think that's too much to ask. */
1695
1696 /* MSVCRT's _access crashes with D_OK. */
1697 if (tmp && sys_access (tmp, D_OK) == 0)
1698 {
1699 char * var = alloca (strlen (tmp) + 8);
1700 sprintf (var, "TMPDIR=%s", tmp);
1701 _putenv (strdup (var));
1702 break;
1703 }
1704 }
1705 if (i >= imax)
1706 cmd_error_internal
1707 (Fcons (Qerror,
1708 Fcons (build_string ("no usable temporary directories found!!"),
1709 Qnil)),
1710 "While setting TMPDIR: ");
1711
1712 /* Check for environment variables and use registry settings if they
1713 don't exist. Fallback on default values where applicable. */
1714 {
1715 int i;
1716 LPBYTE lpval;
1717 DWORD dwType;
1718 char locale_name[32];
1719 char default_home[MAX_PATH];
1720 int appdata = 0;
1721
1722 static const struct env_entry
1723 {
1724 char * name;
1725 char * def_value;
1726 } dflt_envvars[] =
1727 {
1728 /* If the default value is NULL, we will use the value from the
1729 outside environment or the Registry, but will not push the
1730 variable into the Emacs environment if it is defined neither
1731 in the Registry nor in the outside environment. */
1732 {"HOME", "C:/"},
1733 {"PRELOAD_WINSOCK", NULL},
1734 {"emacs_dir", "C:/emacs"},
1735 {"EMACSLOADPATH", NULL},
1736 {"SHELL", "%emacs_dir%/bin/cmdproxy.exe"},
1737 {"EMACSDATA", NULL},
1738 {"EMACSPATH", NULL},
1739 {"INFOPATH", NULL},
1740 {"EMACSDOC", NULL},
1741 {"TERM", "cmd"},
1742 {"LANG", NULL},
1743 };
1744
1745 #define N_ENV_VARS sizeof (dflt_envvars)/sizeof (dflt_envvars[0])
1746
1747 /* We need to copy dflt_envvars[] and work on the copy because we
1748 don't want the dumped Emacs to inherit the values of
1749 environment variables we saw during dumping (which could be on
1750 a different system). The defaults above must be left intact. */
1751 struct env_entry env_vars[N_ENV_VARS];
1752
1753 for (i = 0; i < N_ENV_VARS; i++)
1754 env_vars[i] = dflt_envvars[i];
1755
1756 /* For backwards compatibility, check if a .emacs file exists in C:/
1757 If not, then we can try to default to the appdata directory under the
1758 user's profile, which is more likely to be writable. */
1759 if (!check_existing ("C:/.emacs"))
1760 {
1761 HRESULT profile_result;
1762 /* Dynamically load ShGetFolderPath, as it won't exist on versions
1763 of Windows 95 and NT4 that have not been updated to include
1764 MSIE 5. */
1765 ShGetFolderPath_fn get_folder_path;
1766 get_folder_path = (ShGetFolderPath_fn)
1767 GetProcAddress (GetModuleHandle ("shell32.dll"), "SHGetFolderPathA");
1768
1769 if (get_folder_path != NULL)
1770 {
1771 profile_result = get_folder_path (NULL, CSIDL_APPDATA, NULL,
1772 0, default_home);
1773
1774 /* If we can't get the appdata dir, revert to old behavior. */
1775 if (profile_result == S_OK)
1776 {
1777 env_vars[0].def_value = default_home;
1778 appdata = 1;
1779 }
1780 }
1781 }
1782
1783 /* Get default locale info and use it for LANG. */
1784 if (GetLocaleInfo (LOCALE_USER_DEFAULT,
1785 LOCALE_SABBREVLANGNAME | LOCALE_USE_CP_ACP,
1786 locale_name, sizeof (locale_name)))
1787 {
1788 for (i = 0; i < N_ENV_VARS; i++)
1789 {
1790 if (strcmp (env_vars[i].name, "LANG") == 0)
1791 {
1792 env_vars[i].def_value = locale_name;
1793 break;
1794 }
1795 }
1796 }
1797
1798 #define SET_ENV_BUF_SIZE (4 * MAX_PATH) /* to cover EMACSLOADPATH */
1799
1800 /* Treat emacs_dir specially: set it unconditionally based on our
1801 location. */
1802 {
1803 char *p;
1804 char modname[MAX_PATH];
1805
1806 if (!GetModuleFileName (NULL, modname, MAX_PATH))
1807 emacs_abort ();
1808 if ((p = _mbsrchr (modname, '\\')) == NULL)
1809 emacs_abort ();
1810 *p = 0;
1811
1812 if ((p = _mbsrchr (modname, '\\')) && xstrcasecmp (p, "\\bin") == 0)
1813 {
1814 char buf[SET_ENV_BUF_SIZE];
1815
1816 *p = 0;
1817 for (p = modname; *p; p = CharNext (p))
1818 if (*p == '\\') *p = '/';
1819
1820 _snprintf (buf, sizeof (buf)-1, "emacs_dir=%s", modname);
1821 _putenv (strdup (buf));
1822 }
1823 /* Handle running emacs from the build directory: src/oo-spd/i386/ */
1824
1825 /* FIXME: should use substring of get_emacs_configuration ().
1826 But I don't think the Windows build supports alpha, mips etc
1827 anymore, so have taken the easy option for now. */
1828 else if (p && (xstrcasecmp (p, "\\i386") == 0
1829 || xstrcasecmp (p, "\\AMD64") == 0))
1830 {
1831 *p = 0;
1832 p = _mbsrchr (modname, '\\');
1833 if (p != NULL)
1834 {
1835 *p = 0;
1836 p = _mbsrchr (modname, '\\');
1837 if (p && xstrcasecmp (p, "\\src") == 0)
1838 {
1839 char buf[SET_ENV_BUF_SIZE];
1840
1841 *p = 0;
1842 for (p = modname; *p; p = CharNext (p))
1843 if (*p == '\\') *p = '/';
1844
1845 _snprintf (buf, sizeof (buf)-1, "emacs_dir=%s", modname);
1846 _putenv (strdup (buf));
1847 }
1848 }
1849 }
1850 }
1851
1852 for (i = 0; i < N_ENV_VARS; i++)
1853 {
1854 if (!getenv (env_vars[i].name))
1855 {
1856 int dont_free = 0;
1857
1858 if ((lpval = w32_get_resource (env_vars[i].name, &dwType)) == NULL
1859 /* Also ignore empty environment variables. */
1860 || *lpval == 0)
1861 {
1862 xfree (lpval);
1863 lpval = env_vars[i].def_value;
1864 dwType = REG_EXPAND_SZ;
1865 dont_free = 1;
1866 if (!strcmp (env_vars[i].name, "HOME") && !appdata)
1867 Vdelayed_warnings_list
1868 = Fcons (listn (CONSTYPE_HEAP, 2,
1869 intern ("initialization"),
1870 build_string ("Setting HOME to C:\\ by default is deprecated")),
1871 Vdelayed_warnings_list);
1872 }
1873
1874 if (lpval)
1875 {
1876 char buf1[SET_ENV_BUF_SIZE], buf2[SET_ENV_BUF_SIZE];
1877
1878 if (dwType == REG_EXPAND_SZ)
1879 ExpandEnvironmentStrings ((LPSTR) lpval, buf1, sizeof (buf1));
1880 else if (dwType == REG_SZ)
1881 strcpy (buf1, lpval);
1882 if (dwType == REG_EXPAND_SZ || dwType == REG_SZ)
1883 {
1884 _snprintf (buf2, sizeof (buf2)-1, "%s=%s", env_vars[i].name,
1885 buf1);
1886 _putenv (strdup (buf2));
1887 }
1888
1889 if (!dont_free)
1890 xfree (lpval);
1891 }
1892 }
1893 }
1894 }
1895
1896 /* Rebuild system configuration to reflect invoking system. */
1897 Vsystem_configuration = build_string (EMACS_CONFIGURATION);
1898
1899 /* Another special case: on NT, the PATH variable is actually named
1900 "Path" although cmd.exe (perhaps NT itself) arranges for
1901 environment variable lookup and setting to be case insensitive.
1902 However, Emacs assumes a fully case sensitive environment, so we
1903 need to change "Path" to "PATH" to match the expectations of
1904 various elisp packages. We do this by the sneaky method of
1905 modifying the string in the C runtime environ entry.
1906
1907 The same applies to COMSPEC. */
1908 {
1909 char ** envp;
1910
1911 for (envp = environ; *envp; envp++)
1912 if (_strnicmp (*envp, "PATH=", 5) == 0)
1913 memcpy (*envp, "PATH=", 5);
1914 else if (_strnicmp (*envp, "COMSPEC=", 8) == 0)
1915 memcpy (*envp, "COMSPEC=", 8);
1916 }
1917
1918 /* Remember the initial working directory for getwd. */
1919 /* FIXME: Do we need to resolve possible symlinks in startup_dir?
1920 Does it matter anywhere in Emacs? */
1921 if (!GetCurrentDirectory (MAXPATHLEN, startup_dir))
1922 emacs_abort ();
1923
1924 {
1925 static char modname[MAX_PATH];
1926
1927 if (!GetModuleFileName (NULL, modname, MAX_PATH))
1928 emacs_abort ();
1929 argv[0] = modname;
1930 }
1931
1932 /* Determine if there is a middle mouse button, to allow parse_button
1933 to decide whether right mouse events should be mouse-2 or
1934 mouse-3. */
1935 w32_num_mouse_buttons = GetSystemMetrics (SM_CMOUSEBUTTONS);
1936
1937 init_user_info ();
1938 }
1939
1940 /* Called from expand-file-name when default-directory is not a string. */
1941
1942 char *
1943 emacs_root_dir (void)
1944 {
1945 static char root_dir[FILENAME_MAX];
1946 const char *p;
1947
1948 p = getenv ("emacs_dir");
1949 if (p == NULL)
1950 emacs_abort ();
1951 strcpy (root_dir, p);
1952 root_dir[parse_root (root_dir, NULL)] = '\0';
1953 dostounix_filename (root_dir);
1954 return root_dir;
1955 }
1956
1957 /* We don't have scripts to automatically determine the system configuration
1958 for Emacs before it's compiled, and we don't want to have to make the
1959 user enter it, so we define EMACS_CONFIGURATION to invoke this runtime
1960 routine. */
1961
1962 char *
1963 get_emacs_configuration (void)
1964 {
1965 char *arch, *oem, *os;
1966 int build_num;
1967 static char configuration_buffer[32];
1968
1969 /* Determine the processor type. */
1970 switch (get_processor_type ())
1971 {
1972
1973 #ifdef PROCESSOR_INTEL_386
1974 case PROCESSOR_INTEL_386:
1975 case PROCESSOR_INTEL_486:
1976 case PROCESSOR_INTEL_PENTIUM:
1977 #ifdef _WIN64
1978 arch = "amd64";
1979 #else
1980 arch = "i386";
1981 #endif
1982 break;
1983 #endif
1984 #ifdef PROCESSOR_AMD_X8664
1985 case PROCESSOR_AMD_X8664:
1986 arch = "amd64";
1987 break;
1988 #endif
1989
1990 #ifdef PROCESSOR_MIPS_R2000
1991 case PROCESSOR_MIPS_R2000:
1992 case PROCESSOR_MIPS_R3000:
1993 case PROCESSOR_MIPS_R4000:
1994 arch = "mips";
1995 break;
1996 #endif
1997
1998 #ifdef PROCESSOR_ALPHA_21064
1999 case PROCESSOR_ALPHA_21064:
2000 arch = "alpha";
2001 break;
2002 #endif
2003
2004 default:
2005 arch = "unknown";
2006 break;
2007 }
2008
2009 /* Use the OEM field to reflect the compiler/library combination. */
2010 #ifdef _MSC_VER
2011 #define COMPILER_NAME "msvc"
2012 #else
2013 #ifdef __GNUC__
2014 #define COMPILER_NAME "mingw"
2015 #else
2016 #define COMPILER_NAME "unknown"
2017 #endif
2018 #endif
2019 oem = COMPILER_NAME;
2020
2021 switch (osinfo_cache.dwPlatformId) {
2022 case VER_PLATFORM_WIN32_NT:
2023 os = "nt";
2024 build_num = osinfo_cache.dwBuildNumber;
2025 break;
2026 case VER_PLATFORM_WIN32_WINDOWS:
2027 if (osinfo_cache.dwMinorVersion == 0) {
2028 os = "windows95";
2029 } else {
2030 os = "windows98";
2031 }
2032 build_num = LOWORD (osinfo_cache.dwBuildNumber);
2033 break;
2034 case VER_PLATFORM_WIN32s:
2035 /* Not supported, should not happen. */
2036 os = "windows32s";
2037 build_num = LOWORD (osinfo_cache.dwBuildNumber);
2038 break;
2039 default:
2040 os = "unknown";
2041 build_num = 0;
2042 break;
2043 }
2044
2045 if (osinfo_cache.dwPlatformId == VER_PLATFORM_WIN32_NT) {
2046 sprintf (configuration_buffer, "%s-%s-%s%d.%d.%d", arch, oem, os,
2047 get_w32_major_version (), get_w32_minor_version (), build_num);
2048 } else {
2049 sprintf (configuration_buffer, "%s-%s-%s.%d", arch, oem, os, build_num);
2050 }
2051
2052 return configuration_buffer;
2053 }
2054
2055 char *
2056 get_emacs_configuration_options (void)
2057 {
2058 static char *options_buffer;
2059 char cv[32]; /* Enough for COMPILER_VERSION. */
2060 char *options[] = {
2061 cv, /* To be filled later. */
2062 #ifdef EMACSDEBUG
2063 " --no-opt",
2064 #endif
2065 #ifdef ENABLE_CHECKING
2066 " --enable-checking",
2067 #endif
2068 /* configure.bat already sets USER_CFLAGS and USER_LDFLAGS
2069 with a starting space to save work here. */
2070 #ifdef USER_CFLAGS
2071 " --cflags", USER_CFLAGS,
2072 #endif
2073 #ifdef USER_LDFLAGS
2074 " --ldflags", USER_LDFLAGS,
2075 #endif
2076 NULL
2077 };
2078 size_t size = 0;
2079 int i;
2080
2081 /* Work out the effective configure options for this build. */
2082 #ifdef _MSC_VER
2083 #define COMPILER_VERSION "--with-msvc (%d.%02d)", _MSC_VER / 100, _MSC_VER % 100
2084 #else
2085 #ifdef __GNUC__
2086 #define COMPILER_VERSION "--with-gcc (%d.%d)", __GNUC__, __GNUC_MINOR__
2087 #else
2088 #define COMPILER_VERSION ""
2089 #endif
2090 #endif
2091
2092 if (_snprintf (cv, sizeof (cv) - 1, COMPILER_VERSION) < 0)
2093 return "Error: not enough space for compiler version";
2094 cv[sizeof (cv) - 1] = '\0';
2095
2096 for (i = 0; options[i]; i++)
2097 size += strlen (options[i]);
2098
2099 options_buffer = xmalloc (size + 1);
2100 options_buffer[0] = '\0';
2101
2102 for (i = 0; options[i]; i++)
2103 strcat (options_buffer, options[i]);
2104
2105 return options_buffer;
2106 }
2107
2108
2109 #include <sys/timeb.h>
2110
2111 /* Emulate gettimeofday (Ulrich Leodolter, 1/11/95). */
2112 void
2113 gettimeofday (struct timeval *tv, struct timezone *tz)
2114 {
2115 struct _timeb tb;
2116 _ftime (&tb);
2117
2118 tv->tv_sec = tb.time;
2119 tv->tv_usec = tb.millitm * 1000L;
2120 /* Implementation note: _ftime sometimes doesn't update the dstflag
2121 according to the new timezone when the system timezone is
2122 changed. We could fix that by using GetSystemTime and
2123 GetTimeZoneInformation, but that doesn't seem necessary, since
2124 Emacs always calls gettimeofday with the 2nd argument NULL (see
2125 current_emacs_time). */
2126 if (tz)
2127 {
2128 tz->tz_minuteswest = tb.timezone; /* minutes west of Greenwich */
2129 tz->tz_dsttime = tb.dstflag; /* type of dst correction */
2130 }
2131 }
2132
2133 /* Emulate fdutimens. */
2134
2135 /* Set the access and modification time stamps of FD (a.k.a. FILE) to be
2136 TIMESPEC[0] and TIMESPEC[1], respectively.
2137 FD must be either negative -- in which case it is ignored --
2138 or a file descriptor that is open on FILE.
2139 If FD is nonnegative, then FILE can be NULL, which means
2140 use just futimes instead of utimes.
2141 If TIMESPEC is null, FAIL.
2142 Return 0 on success, -1 (setting errno) on failure. */
2143
2144 int
2145 fdutimens (int fd, char const *file, struct timespec const timespec[2])
2146 {
2147 struct _utimbuf ut;
2148
2149 if (!timespec)
2150 {
2151 errno = ENOSYS;
2152 return -1;
2153 }
2154 if (fd < 0 && !file)
2155 {
2156 errno = EBADF;
2157 return -1;
2158 }
2159 ut.actime = timespec[0].tv_sec;
2160 ut.modtime = timespec[1].tv_sec;
2161 if (fd >= 0)
2162 return _futime (fd, &ut);
2163 else
2164 return _utime (file, &ut);
2165 }
2166
2167
2168 /* ------------------------------------------------------------------------- */
2169 /* IO support and wrapper functions for the Windows API. */
2170 /* ------------------------------------------------------------------------- */
2171
2172 /* Place a wrapper around the MSVC version of ctime. It returns NULL
2173 on network directories, so we handle that case here.
2174 (Ulrich Leodolter, 1/11/95). */
2175 char *
2176 sys_ctime (const time_t *t)
2177 {
2178 char *str = (char *) ctime (t);
2179 return (str ? str : "Sun Jan 01 00:00:00 1970");
2180 }
2181
2182 /* Emulate sleep...we could have done this with a define, but that
2183 would necessitate including windows.h in the files that used it.
2184 This is much easier. */
2185 void
2186 sys_sleep (int seconds)
2187 {
2188 Sleep (seconds * 1000);
2189 }
2190
2191 /* Internal MSVC functions for low-level descriptor munging */
2192 extern int __cdecl _set_osfhnd (int fd, long h);
2193 extern int __cdecl _free_osfhnd (int fd);
2194
2195 /* parallel array of private info on file handles */
2196 filedesc fd_info [ MAXDESC ];
2197
2198 typedef struct volume_info_data {
2199 struct volume_info_data * next;
2200
2201 /* time when info was obtained */
2202 DWORD timestamp;
2203
2204 /* actual volume info */
2205 char * root_dir;
2206 DWORD serialnum;
2207 DWORD maxcomp;
2208 DWORD flags;
2209 char * name;
2210 char * type;
2211 } volume_info_data;
2212
2213 /* Global referenced by various functions. */
2214 static volume_info_data volume_info;
2215
2216 /* Vector to indicate which drives are local and fixed (for which cached
2217 data never expires). */
2218 static BOOL fixed_drives[26];
2219
2220 /* Consider cached volume information to be stale if older than 10s,
2221 at least for non-local drives. Info for fixed drives is never stale. */
2222 #define DRIVE_INDEX( c ) ( (c) <= 'Z' ? (c) - 'A' : (c) - 'a' )
2223 #define VOLINFO_STILL_VALID( root_dir, info ) \
2224 ( ( isalpha (root_dir[0]) && \
2225 fixed_drives[ DRIVE_INDEX (root_dir[0]) ] ) \
2226 || GetTickCount () - info->timestamp < 10000 )
2227
2228 /* Cache support functions. */
2229
2230 /* Simple linked list with linear search is sufficient. */
2231 static volume_info_data *volume_cache = NULL;
2232
2233 static volume_info_data *
2234 lookup_volume_info (char * root_dir)
2235 {
2236 volume_info_data * info;
2237
2238 for (info = volume_cache; info; info = info->next)
2239 if (xstrcasecmp (info->root_dir, root_dir) == 0)
2240 break;
2241 return info;
2242 }
2243
2244 static void
2245 add_volume_info (char * root_dir, volume_info_data * info)
2246 {
2247 info->root_dir = xstrdup (root_dir);
2248 info->next = volume_cache;
2249 volume_cache = info;
2250 }
2251
2252
2253 /* Wrapper for GetVolumeInformation, which uses caching to avoid
2254 performance penalty (~2ms on 486 for local drives, 7.5ms for local
2255 cdrom drive, ~5-10ms or more for remote drives on LAN). */
2256 static volume_info_data *
2257 GetCachedVolumeInformation (char * root_dir)
2258 {
2259 volume_info_data * info;
2260 char default_root[ MAX_PATH ];
2261
2262 /* NULL for root_dir means use root from current directory. */
2263 if (root_dir == NULL)
2264 {
2265 if (GetCurrentDirectory (MAX_PATH, default_root) == 0)
2266 return NULL;
2267 parse_root (default_root, &root_dir);
2268 *root_dir = 0;
2269 root_dir = default_root;
2270 }
2271
2272 /* Local fixed drives can be cached permanently. Removable drives
2273 cannot be cached permanently, since the volume name and serial
2274 number (if nothing else) can change. Remote drives should be
2275 treated as if they are removable, since there is no sure way to
2276 tell whether they are or not. Also, the UNC association of drive
2277 letters mapped to remote volumes can be changed at any time (even
2278 by other processes) without notice.
2279
2280 As a compromise, so we can benefit from caching info for remote
2281 volumes, we use a simple expiry mechanism to invalidate cache
2282 entries that are more than ten seconds old. */
2283
2284 #if 0
2285 /* No point doing this, because WNetGetConnection is even slower than
2286 GetVolumeInformation, consistently taking ~50ms on a 486 (FWIW,
2287 GetDriveType is about the only call of this type which does not
2288 involve network access, and so is extremely quick). */
2289
2290 /* Map drive letter to UNC if remote. */
2291 if (isalpha (root_dir[0]) && !fixed[DRIVE_INDEX (root_dir[0])])
2292 {
2293 char remote_name[ 256 ];
2294 char drive[3] = { root_dir[0], ':' };
2295
2296 if (WNetGetConnection (drive, remote_name, sizeof (remote_name))
2297 == NO_ERROR)
2298 /* do something */ ;
2299 }
2300 #endif
2301
2302 info = lookup_volume_info (root_dir);
2303
2304 if (info == NULL || ! VOLINFO_STILL_VALID (root_dir, info))
2305 {
2306 char name[ 256 ];
2307 DWORD serialnum;
2308 DWORD maxcomp;
2309 DWORD flags;
2310 char type[ 256 ];
2311
2312 /* Info is not cached, or is stale. */
2313 if (!GetVolumeInformation (root_dir,
2314 name, sizeof (name),
2315 &serialnum,
2316 &maxcomp,
2317 &flags,
2318 type, sizeof (type)))
2319 return NULL;
2320
2321 /* Cache the volume information for future use, overwriting existing
2322 entry if present. */
2323 if (info == NULL)
2324 {
2325 info = xmalloc (sizeof (volume_info_data));
2326 add_volume_info (root_dir, info);
2327 }
2328 else
2329 {
2330 xfree (info->name);
2331 xfree (info->type);
2332 }
2333
2334 info->name = xstrdup (name);
2335 info->serialnum = serialnum;
2336 info->maxcomp = maxcomp;
2337 info->flags = flags;
2338 info->type = xstrdup (type);
2339 info->timestamp = GetTickCount ();
2340 }
2341
2342 return info;
2343 }
2344
2345 /* Get information on the volume where NAME is held; set path pointer to
2346 start of pathname in NAME (past UNC header\volume header if present),
2347 if pPath is non-NULL.
2348
2349 Note: if NAME includes symlinks, the information is for the volume
2350 of the symlink, not of its target. That's because, even though
2351 GetVolumeInformation returns information about the symlink target
2352 of its argument, we only pass the root directory to
2353 GetVolumeInformation, not the full NAME. */
2354 static int
2355 get_volume_info (const char * name, const char ** pPath)
2356 {
2357 char temp[MAX_PATH];
2358 char *rootname = NULL; /* default to current volume */
2359 volume_info_data * info;
2360
2361 if (name == NULL)
2362 return FALSE;
2363
2364 /* Find the root name of the volume if given. */
2365 if (isalpha (name[0]) && name[1] == ':')
2366 {
2367 rootname = temp;
2368 temp[0] = *name++;
2369 temp[1] = *name++;
2370 temp[2] = '\\';
2371 temp[3] = 0;
2372 }
2373 else if (IS_DIRECTORY_SEP (name[0]) && IS_DIRECTORY_SEP (name[1]))
2374 {
2375 char *str = temp;
2376 int slashes = 4;
2377 int dbcs_p = max_filename_mbslen () > 1;
2378
2379 rootname = temp;
2380 do
2381 {
2382 if (IS_DIRECTORY_SEP (*name) && --slashes == 0)
2383 break;
2384 if (!dbcs_p)
2385 *str++ = *name++;
2386 else
2387 {
2388 const char *p = name;
2389
2390 name = CharNextExA (file_name_codepage, name, 0);
2391 memcpy (str, p, name - p);
2392 str += name - p;
2393 }
2394 }
2395 while ( *name );
2396
2397 *str++ = '\\';
2398 *str = 0;
2399 }
2400
2401 if (pPath)
2402 *pPath = name;
2403
2404 info = GetCachedVolumeInformation (rootname);
2405 if (info != NULL)
2406 {
2407 /* Set global referenced by other functions. */
2408 volume_info = *info;
2409 return TRUE;
2410 }
2411 return FALSE;
2412 }
2413
2414 /* Determine if volume is FAT format (ie. only supports short 8.3
2415 names); also set path pointer to start of pathname in name, if
2416 pPath is non-NULL. */
2417 static int
2418 is_fat_volume (const char * name, const char ** pPath)
2419 {
2420 if (get_volume_info (name, pPath))
2421 return (volume_info.maxcomp == 12);
2422 return FALSE;
2423 }
2424
2425 /* Map filename to a valid 8.3 name if necessary.
2426 The result is a pointer to a static buffer, so CAVEAT EMPTOR! */
2427 const char *
2428 map_w32_filename (const char * name, const char ** pPath)
2429 {
2430 static char shortname[MAX_PATH];
2431 char * str = shortname;
2432 char c;
2433 char * path;
2434 const char * save_name = name;
2435
2436 if (strlen (name) >= MAX_PATH)
2437 {
2438 /* Return a filename which will cause callers to fail. */
2439 strcpy (shortname, "?");
2440 return shortname;
2441 }
2442
2443 if (is_fat_volume (name, (const char **)&path)) /* truncate to 8.3 */
2444 {
2445 register int left = 8; /* maximum number of chars in part */
2446 register int extn = 0; /* extension added? */
2447 register int dots = 2; /* maximum number of dots allowed */
2448
2449 while (name < path)
2450 *str++ = *name++; /* skip past UNC header */
2451
2452 while ((c = *name++))
2453 {
2454 switch ( c )
2455 {
2456 case ':':
2457 case '\\':
2458 case '/':
2459 *str++ = (c == ':' ? ':' : '\\');
2460 extn = 0; /* reset extension flags */
2461 dots = 2; /* max 2 dots */
2462 left = 8; /* max length 8 for main part */
2463 break;
2464 case '.':
2465 if ( dots )
2466 {
2467 /* Convert path components of the form .xxx to _xxx,
2468 but leave . and .. as they are. This allows .emacs
2469 to be read as _emacs, for example. */
2470
2471 if (! *name ||
2472 *name == '.' ||
2473 IS_DIRECTORY_SEP (*name))
2474 {
2475 *str++ = '.';
2476 dots--;
2477 }
2478 else
2479 {
2480 *str++ = '_';
2481 left--;
2482 dots = 0;
2483 }
2484 }
2485 else if ( !extn )
2486 {
2487 *str++ = '.';
2488 extn = 1; /* we've got an extension */
2489 left = 3; /* 3 chars in extension */
2490 }
2491 else
2492 {
2493 /* any embedded dots after the first are converted to _ */
2494 *str++ = '_';
2495 }
2496 break;
2497 case '~':
2498 case '#': /* don't lose these, they're important */
2499 if ( ! left )
2500 str[-1] = c; /* replace last character of part */
2501 /* FALLTHRU */
2502 default:
2503 if ( left )
2504 {
2505 *str++ = tolower (c); /* map to lower case (looks nicer) */
2506 left--;
2507 dots = 0; /* started a path component */
2508 }
2509 break;
2510 }
2511 }
2512 *str = '\0';
2513 }
2514 else
2515 {
2516 strcpy (shortname, name);
2517 unixtodos_filename (shortname);
2518 }
2519
2520 if (pPath)
2521 *pPath = shortname + (path - save_name);
2522
2523 return shortname;
2524 }
2525
2526 static int
2527 is_exec (const char * name)
2528 {
2529 char * p = strrchr (name, '.');
2530 return
2531 (p != NULL
2532 && (xstrcasecmp (p, ".exe") == 0 ||
2533 xstrcasecmp (p, ".com") == 0 ||
2534 xstrcasecmp (p, ".bat") == 0 ||
2535 xstrcasecmp (p, ".cmd") == 0));
2536 }
2537
2538 /* Emulate the Unix directory procedures opendir, closedir,
2539 and readdir. We can't use the procedures supplied in sysdep.c,
2540 so we provide them here. */
2541
2542 struct direct dir_static; /* simulated directory contents */
2543 static HANDLE dir_find_handle = INVALID_HANDLE_VALUE;
2544 static int dir_is_fat;
2545 static char dir_pathname[MAXPATHLEN+1];
2546 static WIN32_FIND_DATA dir_find_data;
2547
2548 /* Support shares on a network resource as subdirectories of a read-only
2549 root directory. */
2550 static HANDLE wnet_enum_handle = INVALID_HANDLE_VALUE;
2551 static HANDLE open_unc_volume (const char *);
2552 static char *read_unc_volume (HANDLE, char *, int);
2553 static void close_unc_volume (HANDLE);
2554
2555 DIR *
2556 opendir (char *filename)
2557 {
2558 DIR *dirp;
2559
2560 /* Opening is done by FindFirstFile. However, a read is inherent to
2561 this operation, so we defer the open until read time. */
2562
2563 if (dir_find_handle != INVALID_HANDLE_VALUE)
2564 return NULL;
2565 if (wnet_enum_handle != INVALID_HANDLE_VALUE)
2566 return NULL;
2567
2568 /* Note: We don't support traversal of UNC volumes via symlinks.
2569 Doing so would mean punishing 99.99% of use cases by resolving
2570 all the possible symlinks in FILENAME, recursively. */
2571 if (is_unc_volume (filename))
2572 {
2573 wnet_enum_handle = open_unc_volume (filename);
2574 if (wnet_enum_handle == INVALID_HANDLE_VALUE)
2575 return NULL;
2576 }
2577
2578 if (!(dirp = (DIR *) malloc (sizeof (DIR))))
2579 return NULL;
2580
2581 dirp->dd_fd = 0;
2582 dirp->dd_loc = 0;
2583 dirp->dd_size = 0;
2584
2585 strncpy (dir_pathname, map_w32_filename (filename, NULL), MAXPATHLEN);
2586 dir_pathname[MAXPATHLEN] = '\0';
2587 /* Note: We don't support symlinks to file names on FAT volumes.
2588 Doing so would mean punishing 99.99% of use cases by resolving
2589 all the possible symlinks in FILENAME, recursively. */
2590 dir_is_fat = is_fat_volume (filename, NULL);
2591
2592 return dirp;
2593 }
2594
2595 void
2596 closedir (DIR *dirp)
2597 {
2598 /* If we have a find-handle open, close it. */
2599 if (dir_find_handle != INVALID_HANDLE_VALUE)
2600 {
2601 FindClose (dir_find_handle);
2602 dir_find_handle = INVALID_HANDLE_VALUE;
2603 }
2604 else if (wnet_enum_handle != INVALID_HANDLE_VALUE)
2605 {
2606 close_unc_volume (wnet_enum_handle);
2607 wnet_enum_handle = INVALID_HANDLE_VALUE;
2608 }
2609 xfree ((char *) dirp);
2610 }
2611
2612 struct direct *
2613 readdir (DIR *dirp)
2614 {
2615 int downcase = !NILP (Vw32_downcase_file_names);
2616
2617 if (wnet_enum_handle != INVALID_HANDLE_VALUE)
2618 {
2619 if (!read_unc_volume (wnet_enum_handle,
2620 dir_find_data.cFileName,
2621 MAX_PATH))
2622 return NULL;
2623 }
2624 /* If we aren't dir_finding, do a find-first, otherwise do a find-next. */
2625 else if (dir_find_handle == INVALID_HANDLE_VALUE)
2626 {
2627 char filename[MAXNAMLEN + 3];
2628 int ln;
2629 int dbcs_p = max_filename_mbslen () > 1;
2630
2631 strcpy (filename, dir_pathname);
2632 ln = strlen (filename) - 1;
2633 if (!dbcs_p)
2634 {
2635 if (!IS_DIRECTORY_SEP (filename[ln]))
2636 strcat (filename, "\\");
2637 }
2638 else
2639 {
2640 char *end = filename + ln + 1;
2641 char *last_char = CharPrevExA (file_name_codepage, filename, end, 0);
2642
2643 if (!IS_DIRECTORY_SEP (*last_char))
2644 strcat (filename, "\\");
2645 }
2646 strcat (filename, "*");
2647
2648 /* Note: No need to resolve symlinks in FILENAME, because
2649 FindFirst opens the directory that is the target of a
2650 symlink. */
2651 dir_find_handle = FindFirstFile (filename, &dir_find_data);
2652
2653 if (dir_find_handle == INVALID_HANDLE_VALUE)
2654 return NULL;
2655 }
2656 else
2657 {
2658 if (!FindNextFile (dir_find_handle, &dir_find_data))
2659 return NULL;
2660 }
2661
2662 /* Emacs never uses this value, so don't bother making it match
2663 value returned by stat(). */
2664 dir_static.d_ino = 1;
2665
2666 strcpy (dir_static.d_name, dir_find_data.cFileName);
2667
2668 /* If the file name in cFileName[] includes `?' characters, it means
2669 the original file name used characters that cannot be represented
2670 by the current ANSI codepage. To avoid total lossage, retrieve
2671 the short 8+3 alias of the long file name. */
2672 if (_mbspbrk (dir_static.d_name, "?"))
2673 {
2674 strcpy (dir_static.d_name, dir_find_data.cAlternateFileName);
2675 downcase = 1; /* 8+3 aliases are returned in all caps */
2676 }
2677 dir_static.d_namlen = strlen (dir_static.d_name);
2678 dir_static.d_reclen = sizeof (struct direct) - MAXNAMLEN + 3 +
2679 dir_static.d_namlen - dir_static.d_namlen % 4;
2680
2681 /* If the file name in cFileName[] includes `?' characters, it means
2682 the original file name used characters that cannot be represented
2683 by the current ANSI codepage. To avoid total lossage, retrieve
2684 the short 8+3 alias of the long file name. */
2685 if (_mbspbrk (dir_find_data.cFileName, "?"))
2686 {
2687 strcpy (dir_static.d_name, dir_find_data.cAlternateFileName);
2688 /* 8+3 aliases are returned in all caps, which could break
2689 various alists that look at filenames' extensions. */
2690 downcase = 1;
2691 }
2692 else
2693 strcpy (dir_static.d_name, dir_find_data.cFileName);
2694 dir_static.d_namlen = strlen (dir_static.d_name);
2695 if (dir_is_fat)
2696 _mbslwr (dir_static.d_name);
2697 else if (downcase)
2698 {
2699 register char *p;
2700 int dbcs_p = max_filename_mbslen () > 1;
2701 for (p = dir_static.d_name; *p; )
2702 {
2703 if (*p >= 'a' && *p <= 'z')
2704 break;
2705 if (dbcs_p)
2706 p = CharNextExA (file_name_codepage, p, 0);
2707 else
2708 p++;
2709 }
2710 if (!*p)
2711 _mbslwr (dir_static.d_name);
2712 }
2713
2714 return &dir_static;
2715 }
2716
2717 static HANDLE
2718 open_unc_volume (const char *path)
2719 {
2720 NETRESOURCE nr;
2721 HANDLE henum;
2722 int result;
2723
2724 nr.dwScope = RESOURCE_GLOBALNET;
2725 nr.dwType = RESOURCETYPE_DISK;
2726 nr.dwDisplayType = RESOURCEDISPLAYTYPE_SERVER;
2727 nr.dwUsage = RESOURCEUSAGE_CONTAINER;
2728 nr.lpLocalName = NULL;
2729 nr.lpRemoteName = (LPSTR)map_w32_filename (path, NULL);
2730 nr.lpComment = NULL;
2731 nr.lpProvider = NULL;
2732
2733 result = WNetOpenEnum (RESOURCE_GLOBALNET, RESOURCETYPE_DISK,
2734 RESOURCEUSAGE_CONNECTABLE, &nr, &henum);
2735
2736 if (result == NO_ERROR)
2737 return henum;
2738 else
2739 return INVALID_HANDLE_VALUE;
2740 }
2741
2742 static char *
2743 read_unc_volume (HANDLE henum, char *readbuf, int size)
2744 {
2745 DWORD count;
2746 int result;
2747 DWORD bufsize = 512;
2748 char *buffer;
2749 char *ptr;
2750 int dbcs_p = max_filename_mbslen () > 1;
2751
2752 count = 1;
2753 buffer = alloca (bufsize);
2754 result = WNetEnumResource (henum, &count, buffer, &bufsize);
2755 if (result != NO_ERROR)
2756 return NULL;
2757
2758 /* WNetEnumResource returns \\resource\share...skip forward to "share". */
2759 ptr = ((LPNETRESOURCE) buffer)->lpRemoteName;
2760 ptr += 2;
2761 if (!dbcs_p)
2762 while (*ptr && !IS_DIRECTORY_SEP (*ptr)) ptr++;
2763 else
2764 {
2765 while (*ptr && !IS_DIRECTORY_SEP (*ptr))
2766 ptr = CharNextExA (file_name_codepage, ptr, 0);
2767 }
2768 ptr++;
2769
2770 strncpy (readbuf, ptr, size);
2771 return readbuf;
2772 }
2773
2774 static void
2775 close_unc_volume (HANDLE henum)
2776 {
2777 if (henum != INVALID_HANDLE_VALUE)
2778 WNetCloseEnum (henum);
2779 }
2780
2781 static DWORD
2782 unc_volume_file_attributes (const char *path)
2783 {
2784 HANDLE henum;
2785 DWORD attrs;
2786
2787 henum = open_unc_volume (path);
2788 if (henum == INVALID_HANDLE_VALUE)
2789 return -1;
2790
2791 attrs = FILE_ATTRIBUTE_READONLY | FILE_ATTRIBUTE_DIRECTORY;
2792
2793 close_unc_volume (henum);
2794
2795 return attrs;
2796 }
2797
2798 /* Ensure a network connection is authenticated. */
2799 static void
2800 logon_network_drive (const char *path)
2801 {
2802 NETRESOURCE resource;
2803 char share[MAX_PATH];
2804 int n_slashes;
2805 char drive[4];
2806 UINT drvtype;
2807 char *p;
2808 int dbcs_p;
2809
2810 if (IS_DIRECTORY_SEP (path[0]) && IS_DIRECTORY_SEP (path[1]))
2811 drvtype = DRIVE_REMOTE;
2812 else if (path[0] == '\0' || path[1] != ':')
2813 drvtype = GetDriveType (NULL);
2814 else
2815 {
2816 drive[0] = path[0];
2817 drive[1] = ':';
2818 drive[2] = '\\';
2819 drive[3] = '\0';
2820 drvtype = GetDriveType (drive);
2821 }
2822
2823 /* Only logon to networked drives. */
2824 if (drvtype != DRIVE_REMOTE)
2825 return;
2826
2827 n_slashes = 2;
2828 strncpy (share, path, MAX_PATH);
2829 /* Truncate to just server and share name. */
2830 dbcs_p = max_filename_mbslen () > 1;
2831 for (p = share + 2; *p && p < share + MAX_PATH; )
2832 {
2833 if (IS_DIRECTORY_SEP (*p) && ++n_slashes > 3)
2834 {
2835 *p = '\0';
2836 break;
2837 }
2838 if (dbcs_p)
2839 p = CharNextExA (file_name_codepage, p, 0);
2840 else
2841 p++;
2842 }
2843
2844 resource.dwType = RESOURCETYPE_DISK;
2845 resource.lpLocalName = NULL;
2846 resource.lpRemoteName = share;
2847 resource.lpProvider = NULL;
2848
2849 WNetAddConnection2 (&resource, NULL, NULL, CONNECT_INTERACTIVE);
2850 }
2851
2852 /* Shadow some MSVC runtime functions to map requests for long filenames
2853 to reasonable short names if necessary. This was originally added to
2854 permit running Emacs on NT 3.1 on a FAT partition, which doesn't support
2855 long file names. */
2856
2857 int
2858 sys_access (const char * path, int mode)
2859 {
2860 DWORD attributes;
2861
2862 /* MSVCRT implementation of 'access' doesn't recognize D_OK, and its
2863 newer versions blow up when passed D_OK. */
2864 path = map_w32_filename (path, NULL);
2865 /* If the last element of PATH is a symlink, we need to resolve it
2866 to get the attributes of its target file. Note: any symlinks in
2867 PATH elements other than the last one are transparently resolved
2868 by GetFileAttributes below. */
2869 if ((volume_info.flags & FILE_SUPPORTS_REPARSE_POINTS) != 0)
2870 path = chase_symlinks (path);
2871
2872 if ((attributes = GetFileAttributes (path)) == -1)
2873 {
2874 DWORD w32err = GetLastError ();
2875
2876 switch (w32err)
2877 {
2878 case ERROR_INVALID_NAME:
2879 case ERROR_BAD_PATHNAME:
2880 if (is_unc_volume (path))
2881 {
2882 attributes = unc_volume_file_attributes (path);
2883 if (attributes == -1)
2884 {
2885 errno = EACCES;
2886 return -1;
2887 }
2888 break;
2889 }
2890 /* FALLTHROUGH */
2891 case ERROR_FILE_NOT_FOUND:
2892 case ERROR_BAD_NETPATH:
2893 errno = ENOENT;
2894 break;
2895 default:
2896 errno = EACCES;
2897 break;
2898 }
2899 return -1;
2900 }
2901 if ((mode & X_OK) != 0 && !is_exec (path))
2902 {
2903 errno = EACCES;
2904 return -1;
2905 }
2906 if ((mode & W_OK) != 0 && (attributes & FILE_ATTRIBUTE_READONLY) != 0)
2907 {
2908 errno = EACCES;
2909 return -1;
2910 }
2911 if ((mode & D_OK) != 0 && (attributes & FILE_ATTRIBUTE_DIRECTORY) == 0)
2912 {
2913 errno = EACCES;
2914 return -1;
2915 }
2916 return 0;
2917 }
2918
2919 int
2920 sys_chdir (const char * path)
2921 {
2922 return _chdir (map_w32_filename (path, NULL));
2923 }
2924
2925 int
2926 sys_chmod (const char * path, int mode)
2927 {
2928 path = chase_symlinks (map_w32_filename (path, NULL));
2929 return _chmod (path, mode);
2930 }
2931
2932 int
2933 sys_chown (const char *path, uid_t owner, gid_t group)
2934 {
2935 if (sys_chmod (path, S_IREAD) == -1) /* check if file exists */
2936 return -1;
2937 return 0;
2938 }
2939
2940 int
2941 sys_creat (const char * path, int mode)
2942 {
2943 return _creat (map_w32_filename (path, NULL), mode);
2944 }
2945
2946 FILE *
2947 sys_fopen (const char * path, const char * mode)
2948 {
2949 int fd;
2950 int oflag;
2951 const char * mode_save = mode;
2952
2953 /* Force all file handles to be non-inheritable. This is necessary to
2954 ensure child processes don't unwittingly inherit handles that might
2955 prevent future file access. */
2956
2957 if (mode[0] == 'r')
2958 oflag = O_RDONLY;
2959 else if (mode[0] == 'w' || mode[0] == 'a')
2960 oflag = O_WRONLY | O_CREAT | O_TRUNC;
2961 else
2962 return NULL;
2963
2964 /* Only do simplistic option parsing. */
2965 while (*++mode)
2966 if (mode[0] == '+')
2967 {
2968 oflag &= ~(O_RDONLY | O_WRONLY);
2969 oflag |= O_RDWR;
2970 }
2971 else if (mode[0] == 'b')
2972 {
2973 oflag &= ~O_TEXT;
2974 oflag |= O_BINARY;
2975 }
2976 else if (mode[0] == 't')
2977 {
2978 oflag &= ~O_BINARY;
2979 oflag |= O_TEXT;
2980 }
2981 else break;
2982
2983 fd = _open (map_w32_filename (path, NULL), oflag | _O_NOINHERIT, 0644);
2984 if (fd < 0)
2985 return NULL;
2986
2987 return _fdopen (fd, mode_save);
2988 }
2989
2990 /* This only works on NTFS volumes, but is useful to have. */
2991 int
2992 sys_link (const char * old, const char * new)
2993 {
2994 HANDLE fileh;
2995 int result = -1;
2996 char oldname[MAX_PATH], newname[MAX_PATH];
2997
2998 if (old == NULL || new == NULL)
2999 {
3000 errno = ENOENT;
3001 return -1;
3002 }
3003
3004 strcpy (oldname, map_w32_filename (old, NULL));
3005 strcpy (newname, map_w32_filename (new, NULL));
3006
3007 fileh = CreateFile (oldname, 0, 0, NULL, OPEN_EXISTING,
3008 FILE_FLAG_BACKUP_SEMANTICS, NULL);
3009 if (fileh != INVALID_HANDLE_VALUE)
3010 {
3011 int wlen;
3012
3013 /* Confusingly, the "alternate" stream name field does not apply
3014 when restoring a hard link, and instead contains the actual
3015 stream data for the link (ie. the name of the link to create).
3016 The WIN32_STREAM_ID structure before the cStreamName field is
3017 the stream header, which is then immediately followed by the
3018 stream data. */
3019
3020 struct {
3021 WIN32_STREAM_ID wid;
3022 WCHAR wbuffer[MAX_PATH]; /* extra space for link name */
3023 } data;
3024
3025 wlen = MultiByteToWideChar (CP_ACP, MB_PRECOMPOSED, newname, -1,
3026 data.wid.cStreamName, MAX_PATH);
3027 if (wlen > 0)
3028 {
3029 LPVOID context = NULL;
3030 DWORD wbytes = 0;
3031
3032 data.wid.dwStreamId = BACKUP_LINK;
3033 data.wid.dwStreamAttributes = 0;
3034 data.wid.Size.LowPart = wlen * sizeof (WCHAR);
3035 data.wid.Size.HighPart = 0;
3036 data.wid.dwStreamNameSize = 0;
3037
3038 if (BackupWrite (fileh, (LPBYTE)&data,
3039 offsetof (WIN32_STREAM_ID, cStreamName)
3040 + data.wid.Size.LowPart,
3041 &wbytes, FALSE, FALSE, &context)
3042 && BackupWrite (fileh, NULL, 0, &wbytes, TRUE, FALSE, &context))
3043 {
3044 /* succeeded */
3045 result = 0;
3046 }
3047 else
3048 {
3049 /* Should try mapping GetLastError to errno; for now just
3050 indicate a general error (eg. links not supported). */
3051 errno = EINVAL; // perhaps EMLINK?
3052 }
3053 }
3054
3055 CloseHandle (fileh);
3056 }
3057 else
3058 errno = ENOENT;
3059
3060 return result;
3061 }
3062
3063 int
3064 sys_mkdir (const char * path)
3065 {
3066 return _mkdir (map_w32_filename (path, NULL));
3067 }
3068
3069 /* Because of long name mapping issues, we need to implement this
3070 ourselves. Also, MSVC's _mktemp returns NULL when it can't generate
3071 a unique name, instead of setting the input template to an empty
3072 string.
3073
3074 Standard algorithm seems to be use pid or tid with a letter on the
3075 front (in place of the 6 X's) and cycle through the letters to find a
3076 unique name. We extend that to allow any reasonable character as the
3077 first of the 6 X's. */
3078 char *
3079 sys_mktemp (char * template)
3080 {
3081 char * p;
3082 int i;
3083 unsigned uid = GetCurrentThreadId ();
3084 static char first_char[] = "abcdefghijklmnopqrstuvwyz0123456789!%-_@#";
3085
3086 if (template == NULL)
3087 return NULL;
3088 p = template + strlen (template);
3089 i = 5;
3090 /* replace up to the last 5 X's with uid in decimal */
3091 while (--p >= template && p[0] == 'X' && --i >= 0)
3092 {
3093 p[0] = '0' + uid % 10;
3094 uid /= 10;
3095 }
3096
3097 if (i < 0 && p[0] == 'X')
3098 {
3099 i = 0;
3100 do
3101 {
3102 int save_errno = errno;
3103 p[0] = first_char[i];
3104 if (sys_access (template, 0) < 0)
3105 {
3106 errno = save_errno;
3107 return template;
3108 }
3109 }
3110 while (++i < sizeof (first_char));
3111 }
3112
3113 /* Template is badly formed or else we can't generate a unique name,
3114 so return empty string */
3115 template[0] = 0;
3116 return template;
3117 }
3118
3119 int
3120 sys_open (const char * path, int oflag, int mode)
3121 {
3122 const char* mpath = map_w32_filename (path, NULL);
3123 /* Try to open file without _O_CREAT, to be able to write to hidden
3124 and system files. Force all file handles to be
3125 non-inheritable. */
3126 int res = _open (mpath, (oflag & ~_O_CREAT) | _O_NOINHERIT, mode);
3127 if (res >= 0)
3128 return res;
3129 return _open (mpath, oflag | _O_NOINHERIT, mode);
3130 }
3131
3132 int
3133 sys_rename (const char * oldname, const char * newname)
3134 {
3135 BOOL result;
3136 char temp[MAX_PATH];
3137 int newname_dev;
3138 int oldname_dev;
3139
3140 /* MoveFile on Windows 95 doesn't correctly change the short file name
3141 alias in a number of circumstances (it is not easy to predict when
3142 just by looking at oldname and newname, unfortunately). In these
3143 cases, renaming through a temporary name avoids the problem.
3144
3145 A second problem on Windows 95 is that renaming through a temp name when
3146 newname is uppercase fails (the final long name ends up in
3147 lowercase, although the short alias might be uppercase) UNLESS the
3148 long temp name is not 8.3.
3149
3150 So, on Windows 95 we always rename through a temp name, and we make sure
3151 the temp name has a long extension to ensure correct renaming. */
3152
3153 strcpy (temp, map_w32_filename (oldname, NULL));
3154
3155 /* volume_info is set indirectly by map_w32_filename. */
3156 oldname_dev = volume_info.serialnum;
3157
3158 if (os_subtype == OS_9X)
3159 {
3160 char * o;
3161 char * p;
3162 int i = 0;
3163
3164 oldname = map_w32_filename (oldname, NULL);
3165 if ((o = strrchr (oldname, '\\')))
3166 o++;
3167 else
3168 o = (char *) oldname;
3169
3170 if ((p = strrchr (temp, '\\')))
3171 p++;
3172 else
3173 p = temp;
3174
3175 do
3176 {
3177 /* Force temp name to require a manufactured 8.3 alias - this
3178 seems to make the second rename work properly. */
3179 sprintf (p, "_.%s.%u", o, i);
3180 i++;
3181 result = rename (oldname, temp);
3182 }
3183 /* This loop must surely terminate! */
3184 while (result < 0 && errno == EEXIST);
3185 if (result < 0)
3186 return -1;
3187 }
3188
3189 /* Emulate Unix behavior - newname is deleted if it already exists
3190 (at least if it is a file; don't do this for directories).
3191
3192 Since we mustn't do this if we are just changing the case of the
3193 file name (we would end up deleting the file we are trying to
3194 rename!), we let rename detect if the destination file already
3195 exists - that way we avoid the possible pitfalls of trying to
3196 determine ourselves whether two names really refer to the same
3197 file, which is not always possible in the general case. (Consider
3198 all the permutations of shared or subst'd drives, etc.) */
3199
3200 newname = map_w32_filename (newname, NULL);
3201
3202 /* volume_info is set indirectly by map_w32_filename. */
3203 newname_dev = volume_info.serialnum;
3204
3205 result = rename (temp, newname);
3206
3207 if (result < 0)
3208 {
3209 DWORD w32err = GetLastError ();
3210
3211 if (errno == EACCES
3212 && newname_dev != oldname_dev)
3213 {
3214 /* The implementation of `rename' on Windows does not return
3215 errno = EXDEV when you are moving a directory to a
3216 different storage device (ex. logical disk). It returns
3217 EACCES instead. So here we handle such situations and
3218 return EXDEV. */
3219 DWORD attributes;
3220
3221 if ((attributes = GetFileAttributes (temp)) != -1
3222 && (attributes & FILE_ATTRIBUTE_DIRECTORY))
3223 errno = EXDEV;
3224 }
3225 else if (errno == EEXIST)
3226 {
3227 if (_chmod (newname, 0666) != 0)
3228 return result;
3229 if (_unlink (newname) != 0)
3230 return result;
3231 result = rename (temp, newname);
3232 }
3233 else if (w32err == ERROR_PRIVILEGE_NOT_HELD
3234 && is_symlink (temp))
3235 {
3236 /* This is Windows prohibiting the user from creating a
3237 symlink in another place, since that requires
3238 privileges. */
3239 errno = EPERM;
3240 }
3241 }
3242
3243 return result;
3244 }
3245
3246 int
3247 sys_rmdir (const char * path)
3248 {
3249 return _rmdir (map_w32_filename (path, NULL));
3250 }
3251
3252 int
3253 sys_unlink (const char * path)
3254 {
3255 path = map_w32_filename (path, NULL);
3256
3257 /* On Unix, unlink works without write permission. */
3258 _chmod (path, 0666);
3259 return _unlink (path);
3260 }
3261
3262 static FILETIME utc_base_ft;
3263 static ULONGLONG utc_base; /* In 100ns units */
3264 static int init = 0;
3265
3266 #define FILETIME_TO_U64(result, ft) \
3267 do { \
3268 ULARGE_INTEGER uiTemp; \
3269 uiTemp.LowPart = (ft).dwLowDateTime; \
3270 uiTemp.HighPart = (ft).dwHighDateTime; \
3271 result = uiTemp.QuadPart; \
3272 } while (0)
3273
3274 static void
3275 initialize_utc_base (void)
3276 {
3277 /* Determine the delta between 1-Jan-1601 and 1-Jan-1970. */
3278 SYSTEMTIME st;
3279
3280 st.wYear = 1970;
3281 st.wMonth = 1;
3282 st.wDay = 1;
3283 st.wHour = 0;
3284 st.wMinute = 0;
3285 st.wSecond = 0;
3286 st.wMilliseconds = 0;
3287
3288 SystemTimeToFileTime (&st, &utc_base_ft);
3289 FILETIME_TO_U64 (utc_base, utc_base_ft);
3290 }
3291
3292 static time_t
3293 convert_time (FILETIME ft)
3294 {
3295 ULONGLONG tmp;
3296
3297 if (!init)
3298 {
3299 initialize_utc_base ();
3300 init = 1;
3301 }
3302
3303 if (CompareFileTime (&ft, &utc_base_ft) < 0)
3304 return 0;
3305
3306 FILETIME_TO_U64 (tmp, ft);
3307 return (time_t) ((tmp - utc_base) / 10000000L);
3308 }
3309
3310 static void
3311 convert_from_time_t (time_t time, FILETIME * pft)
3312 {
3313 ULARGE_INTEGER tmp;
3314
3315 if (!init)
3316 {
3317 initialize_utc_base ();
3318 init = 1;
3319 }
3320
3321 /* time in 100ns units since 1-Jan-1601 */
3322 tmp.QuadPart = (ULONGLONG) time * 10000000L + utc_base;
3323 pft->dwHighDateTime = tmp.HighPart;
3324 pft->dwLowDateTime = tmp.LowPart;
3325 }
3326
3327 #if 0
3328 /* No reason to keep this; faking inode values either by hashing or even
3329 using the file index from GetInformationByHandle, is not perfect and
3330 so by default Emacs doesn't use the inode values on Windows.
3331 Instead, we now determine file-truename correctly (except for
3332 possible drive aliasing etc). */
3333
3334 /* Modified version of "PJW" algorithm (see the "Dragon" compiler book). */
3335 static unsigned
3336 hashval (const unsigned char * str)
3337 {
3338 unsigned h = 0;
3339 while (*str)
3340 {
3341 h = (h << 4) + *str++;
3342 h ^= (h >> 28);
3343 }
3344 return h;
3345 }
3346
3347 /* Return the hash value of the canonical pathname, excluding the
3348 drive/UNC header, to get a hopefully unique inode number. */
3349 static DWORD
3350 generate_inode_val (const char * name)
3351 {
3352 char fullname[ MAX_PATH ];
3353 char * p;
3354 unsigned hash;
3355
3356 /* Get the truly canonical filename, if it exists. (Note: this
3357 doesn't resolve aliasing due to subst commands, or recognize hard
3358 links. */
3359 if (!w32_get_long_filename ((char *)name, fullname, MAX_PATH))
3360 emacs_abort ();
3361
3362 parse_root (fullname, &p);
3363 /* Normal W32 filesystems are still case insensitive. */
3364 _strlwr (p);
3365 return hashval (p);
3366 }
3367
3368 #endif
3369
3370 static PSECURITY_DESCRIPTOR
3371 get_file_security_desc_by_handle (HANDLE h)
3372 {
3373 PSECURITY_DESCRIPTOR psd = NULL;
3374 DWORD err;
3375 SECURITY_INFORMATION si = OWNER_SECURITY_INFORMATION
3376 | GROUP_SECURITY_INFORMATION /* | DACL_SECURITY_INFORMATION */ ;
3377
3378 err = get_security_info (h, SE_FILE_OBJECT, si,
3379 NULL, NULL, NULL, NULL, &psd);
3380 if (err != ERROR_SUCCESS)
3381 return NULL;
3382
3383 return psd;
3384 }
3385
3386 static PSECURITY_DESCRIPTOR
3387 get_file_security_desc_by_name (const char *fname)
3388 {
3389 PSECURITY_DESCRIPTOR psd = NULL;
3390 DWORD sd_len, err;
3391 SECURITY_INFORMATION si = OWNER_SECURITY_INFORMATION
3392 | GROUP_SECURITY_INFORMATION /* | DACL_SECURITY_INFORMATION */ ;
3393
3394 if (!get_file_security (fname, si, psd, 0, &sd_len))
3395 {
3396 err = GetLastError ();
3397 if (err != ERROR_INSUFFICIENT_BUFFER)
3398 return NULL;
3399 }
3400
3401 psd = xmalloc (sd_len);
3402 if (!get_file_security (fname, si, psd, sd_len, &sd_len))
3403 {
3404 xfree (psd);
3405 return NULL;
3406 }
3407
3408 return psd;
3409 }
3410
3411 static DWORD
3412 get_rid (PSID sid)
3413 {
3414 unsigned n_subauthorities;
3415
3416 /* Use the last sub-authority value of the RID, the relative
3417 portion of the SID, as user/group ID. */
3418 n_subauthorities = *get_sid_sub_authority_count (sid);
3419 if (n_subauthorities < 1)
3420 return 0; /* the "World" RID */
3421 return *get_sid_sub_authority (sid, n_subauthorities - 1);
3422 }
3423
3424 /* Caching SID and account values for faster lokup. */
3425
3426 #ifdef __GNUC__
3427 # define FLEXIBLE_ARRAY_MEMBER
3428 #else
3429 # define FLEXIBLE_ARRAY_MEMBER 1
3430 #endif
3431
3432 struct w32_id {
3433 unsigned rid;
3434 struct w32_id *next;
3435 char name[GNLEN+1];
3436 unsigned char sid[FLEXIBLE_ARRAY_MEMBER];
3437 };
3438
3439 static struct w32_id *w32_idlist;
3440
3441 static int
3442 w32_cached_id (PSID sid, unsigned *id, char *name)
3443 {
3444 struct w32_id *tail, *found;
3445
3446 for (found = NULL, tail = w32_idlist; tail; tail = tail->next)
3447 {
3448 if (equal_sid ((PSID)tail->sid, sid))
3449 {
3450 found = tail;
3451 break;
3452 }
3453 }
3454 if (found)
3455 {
3456 *id = found->rid;
3457 strcpy (name, found->name);
3458 return 1;
3459 }
3460 else
3461 return 0;
3462 }
3463
3464 static void
3465 w32_add_to_cache (PSID sid, unsigned id, char *name)
3466 {
3467 DWORD sid_len;
3468 struct w32_id *new_entry;
3469
3470 /* We don't want to leave behind stale cache from when Emacs was
3471 dumped. */
3472 if (initialized)
3473 {
3474 sid_len = get_length_sid (sid);
3475 new_entry = xmalloc (offsetof (struct w32_id, sid) + sid_len);
3476 if (new_entry)
3477 {
3478 new_entry->rid = id;
3479 strcpy (new_entry->name, name);
3480 copy_sid (sid_len, (PSID)new_entry->sid, sid);
3481 new_entry->next = w32_idlist;
3482 w32_idlist = new_entry;
3483 }
3484 }
3485 }
3486
3487 #define UID 1
3488 #define GID 2
3489
3490 static int
3491 get_name_and_id (PSECURITY_DESCRIPTOR psd, unsigned *id, char *nm, int what)
3492 {
3493 PSID sid = NULL;
3494 char machine[MAX_COMPUTERNAME_LENGTH+1];
3495 BOOL dflt;
3496 SID_NAME_USE ignore;
3497 char name[UNLEN+1];
3498 DWORD name_len = sizeof (name);
3499 char domain[1024];
3500 DWORD domain_len = sizeof (domain);
3501 int use_dflt = 0;
3502 int result;
3503
3504 if (what == UID)
3505 result = get_security_descriptor_owner (psd, &sid, &dflt);
3506 else if (what == GID)
3507 result = get_security_descriptor_group (psd, &sid, &dflt);
3508 else
3509 result = 0;
3510
3511 if (!result || !is_valid_sid (sid))
3512 use_dflt = 1;
3513 else if (!w32_cached_id (sid, id, nm))
3514 {
3515 if (!lookup_account_sid (NULL, sid, name, &name_len,
3516 domain, &domain_len, &ignore)
3517 || name_len > UNLEN+1)
3518 use_dflt = 1;
3519 else
3520 {
3521 *id = get_rid (sid);
3522 strcpy (nm, name);
3523 w32_add_to_cache (sid, *id, name);
3524 }
3525 }
3526 return use_dflt;
3527 }
3528
3529 static void
3530 get_file_owner_and_group (PSECURITY_DESCRIPTOR psd, struct stat *st)
3531 {
3532 int dflt_usr = 0, dflt_grp = 0;
3533
3534 if (!psd)
3535 {
3536 dflt_usr = 1;
3537 dflt_grp = 1;
3538 }
3539 else
3540 {
3541 if (get_name_and_id (psd, &st->st_uid, st->st_uname, UID))
3542 dflt_usr = 1;
3543 if (get_name_and_id (psd, &st->st_gid, st->st_gname, GID))
3544 dflt_grp = 1;
3545 }
3546 /* Consider files to belong to current user/group, if we cannot get
3547 more accurate information. */
3548 if (dflt_usr)
3549 {
3550 st->st_uid = dflt_passwd.pw_uid;
3551 strcpy (st->st_uname, dflt_passwd.pw_name);
3552 }
3553 if (dflt_grp)
3554 {
3555 st->st_gid = dflt_passwd.pw_gid;
3556 strcpy (st->st_gname, dflt_group.gr_name);
3557 }
3558 }
3559
3560 /* Return non-zero if NAME is a potentially slow filesystem. */
3561 int
3562 is_slow_fs (const char *name)
3563 {
3564 char drive_root[4];
3565 UINT devtype;
3566
3567 if (IS_DIRECTORY_SEP (name[0]) && IS_DIRECTORY_SEP (name[1]))
3568 devtype = DRIVE_REMOTE; /* assume UNC name is remote */
3569 else if (!(strlen (name) >= 2 && IS_DEVICE_SEP (name[1])))
3570 devtype = GetDriveType (NULL); /* use root of current drive */
3571 else
3572 {
3573 /* GetDriveType needs the root directory of the drive. */
3574 strncpy (drive_root, name, 2);
3575 drive_root[2] = '\\';
3576 drive_root[3] = '\0';
3577 devtype = GetDriveType (drive_root);
3578 }
3579 return !(devtype == DRIVE_FIXED || devtype == DRIVE_RAMDISK);
3580 }
3581
3582 /* MSVC stat function can't cope with UNC names and has other bugs, so
3583 replace it with our own. This also allows us to calculate consistent
3584 inode values and owner/group without hacks in the main Emacs code. */
3585
3586 static int
3587 stat_worker (const char * path, struct stat * buf, int follow_symlinks)
3588 {
3589 char *name, *save_name, *r;
3590 WIN32_FIND_DATA wfd;
3591 HANDLE fh;
3592 unsigned __int64 fake_inode = 0;
3593 int permission;
3594 int len;
3595 int rootdir = FALSE;
3596 PSECURITY_DESCRIPTOR psd = NULL;
3597 int is_a_symlink = 0;
3598 DWORD file_flags = FILE_FLAG_BACKUP_SEMANTICS;
3599 DWORD access_rights = 0;
3600 DWORD fattrs = 0, serialnum = 0, fs_high = 0, fs_low = 0, nlinks = 1;
3601 FILETIME ctime, atime, wtime;
3602 int dbcs_p;
3603
3604 if (path == NULL || buf == NULL)
3605 {
3606 errno = EFAULT;
3607 return -1;
3608 }
3609
3610 save_name = name = (char *) map_w32_filename (path, &path);
3611 /* Must be valid filename, no wild cards or other invalid
3612 characters. We use _mbspbrk to support multibyte strings that
3613 might look to strpbrk as if they included literal *, ?, and other
3614 characters mentioned below that are disallowed by Windows
3615 filesystems. */
3616 if (_mbspbrk (name, "*?|<>\""))
3617 {
3618 errno = ENOENT;
3619 return -1;
3620 }
3621
3622 /* Remove trailing directory separator, unless name is the root
3623 directory of a drive or UNC volume in which case ensure there
3624 is a trailing separator. */
3625 len = strlen (name);
3626 name = strcpy (alloca (len + 2), name);
3627
3628 /* Avoid a somewhat costly call to is_symlink if the filesystem
3629 doesn't support symlinks. */
3630 if ((volume_info.flags & FILE_SUPPORTS_REPARSE_POINTS) != 0)
3631 is_a_symlink = is_symlink (name);
3632
3633 /* Plan A: Open the file and get all the necessary information via
3634 the resulting handle. This solves several issues in one blow:
3635
3636 . retrieves attributes for the target of a symlink, if needed
3637 . gets attributes of root directories and symlinks pointing to
3638 root directories, thus avoiding the need for special-casing
3639 these and detecting them by examining the file-name format
3640 . retrieves more accurate attributes (e.g., non-zero size for
3641 some directories, esp. directories that are junction points)
3642 . correctly resolves "c:/..", "/.." and similar file names
3643 . avoids run-time penalties for 99% of use cases
3644
3645 Plan A is always tried first, unless the user asked not to (but
3646 if the file is a symlink and we need to follow links, we try Plan
3647 A even if the user asked not to).
3648
3649 If Plan A fails, we go to Plan B (below), where various
3650 potentially expensive techniques must be used to handle "special"
3651 files such as UNC volumes etc. */
3652 if (!(NILP (Vw32_get_true_file_attributes)
3653 || (EQ (Vw32_get_true_file_attributes, Qlocal) && is_slow_fs (name)))
3654 /* Following symlinks requires getting the info by handle. */
3655 || (is_a_symlink && follow_symlinks))
3656 {
3657 BY_HANDLE_FILE_INFORMATION info;
3658
3659 if (is_a_symlink && !follow_symlinks)
3660 file_flags |= FILE_FLAG_OPEN_REPARSE_POINT;
3661 /* READ_CONTROL access rights are required to get security info
3662 by handle. But if the OS doesn't support security in the
3663 first place, we don't need to try. */
3664 if (is_windows_9x () != TRUE)
3665 access_rights |= READ_CONTROL;
3666
3667 fh = CreateFile (name, access_rights, 0, NULL, OPEN_EXISTING,
3668 file_flags, NULL);
3669 /* If CreateFile fails with READ_CONTROL, try again with zero as
3670 access rights. */
3671 if (fh == INVALID_HANDLE_VALUE && access_rights)
3672 fh = CreateFile (name, 0, 0, NULL, OPEN_EXISTING,
3673 file_flags, NULL);
3674 if (fh == INVALID_HANDLE_VALUE)
3675 goto no_true_file_attributes;
3676
3677 /* This is more accurate in terms of getting the correct number
3678 of links, but is quite slow (it is noticeable when Emacs is
3679 making a list of file name completions). */
3680 if (GetFileInformationByHandle (fh, &info))
3681 {
3682 nlinks = info.nNumberOfLinks;
3683 /* Might as well use file index to fake inode values, but this
3684 is not guaranteed to be unique unless we keep a handle open
3685 all the time (even then there are situations where it is
3686 not unique). Reputedly, there are at most 48 bits of info
3687 (on NTFS, presumably less on FAT). */
3688 fake_inode = info.nFileIndexHigh;
3689 fake_inode <<= 32;
3690 fake_inode += info.nFileIndexLow;
3691 serialnum = info.dwVolumeSerialNumber;
3692 fs_high = info.nFileSizeHigh;
3693 fs_low = info.nFileSizeLow;
3694 ctime = info.ftCreationTime;
3695 atime = info.ftLastAccessTime;
3696 wtime = info.ftLastWriteTime;
3697 fattrs = info.dwFileAttributes;
3698 }
3699 else
3700 {
3701 /* We don't go to Plan B here, because it's not clear that
3702 it's a good idea. The only known use case where
3703 CreateFile succeeds, but GetFileInformationByHandle fails
3704 (with ERROR_INVALID_FUNCTION) is for character devices
3705 such as NUL, PRN, etc. For these, switching to Plan B is
3706 a net loss, because we lose the character device
3707 attribute returned by GetFileType below (FindFirstFile
3708 doesn't set that bit in the attributes), and the other
3709 fields don't make sense for character devices anyway.
3710 Emacs doesn't really care for non-file entities in the
3711 context of l?stat, so neither do we. */
3712
3713 /* w32err is assigned so one could put a breakpoint here and
3714 examine its value, when GetFileInformationByHandle
3715 fails. */
3716 DWORD w32err = GetLastError ();
3717
3718 switch (w32err)
3719 {
3720 case ERROR_FILE_NOT_FOUND: /* can this ever happen? */
3721 errno = ENOENT;
3722 return -1;
3723 }
3724 }
3725
3726 /* Test for a symlink before testing for a directory, since
3727 symlinks to directories have the directory bit set, but we
3728 don't want them to appear as directories. */
3729 if (is_a_symlink && !follow_symlinks)
3730 buf->st_mode = S_IFLNK;
3731 else if (fattrs & FILE_ATTRIBUTE_DIRECTORY)
3732 buf->st_mode = S_IFDIR;
3733 else
3734 {
3735 DWORD ftype = GetFileType (fh);
3736
3737 switch (ftype)
3738 {
3739 case FILE_TYPE_DISK:
3740 buf->st_mode = S_IFREG;
3741 break;
3742 case FILE_TYPE_PIPE:
3743 buf->st_mode = S_IFIFO;
3744 break;
3745 case FILE_TYPE_CHAR:
3746 case FILE_TYPE_UNKNOWN:
3747 default:
3748 buf->st_mode = S_IFCHR;
3749 }
3750 }
3751 /* We produce the fallback owner and group data, based on the
3752 current user that runs Emacs, in the following cases:
3753
3754 . this is Windows 9X
3755 . getting security by handle failed, and we need to produce
3756 information for the target of a symlink (this is better
3757 than producing a potentially misleading info about the
3758 symlink itself)
3759
3760 If getting security by handle fails, and we don't need to
3761 resolve symlinks, we try getting security by name. */
3762 if (is_windows_9x () != TRUE)
3763 psd = get_file_security_desc_by_handle (fh);
3764 if (psd)
3765 {
3766 get_file_owner_and_group (psd, buf);
3767 LocalFree (psd);
3768 }
3769 else if (is_windows_9x () == TRUE)
3770 get_file_owner_and_group (NULL, buf);
3771 else if (!(is_a_symlink && follow_symlinks))
3772 {
3773 psd = get_file_security_desc_by_name (name);
3774 get_file_owner_and_group (psd, buf);
3775 xfree (psd);
3776 }
3777 else
3778 get_file_owner_and_group (NULL, buf);
3779 CloseHandle (fh);
3780 }
3781 else
3782 {
3783 no_true_file_attributes:
3784 /* Plan B: Either getting a handle on the file failed, or the
3785 caller explicitly asked us to not bother making this
3786 information more accurate.
3787
3788 Implementation note: In Plan B, we never bother to resolve
3789 symlinks, even if we got here because we tried Plan A and
3790 failed. That's because, even if the caller asked for extra
3791 precision by setting Vw32_get_true_file_attributes to t,
3792 resolving symlinks requires acquiring a file handle to the
3793 symlink, which we already know will fail. And if the user
3794 did not ask for extra precision, resolving symlinks will fly
3795 in the face of that request, since the user then wants the
3796 lightweight version of the code. */
3797 dbcs_p = max_filename_mbslen () > 1;
3798 rootdir = (path >= save_name + len - 1
3799 && (IS_DIRECTORY_SEP (*path) || *path == 0));
3800
3801 /* If name is "c:/.." or "/.." then stat "c:/" or "/". */
3802 r = IS_DEVICE_SEP (name[1]) ? &name[2] : name;
3803 if (IS_DIRECTORY_SEP (r[0])
3804 && r[1] == '.' && r[2] == '.' && r[3] == '\0')
3805 r[1] = r[2] = '\0';
3806
3807 /* Note: If NAME is a symlink to the root of a UNC volume
3808 (i.e. "\\SERVER"), we will not detect that here, and we will
3809 return data about the symlink as result of FindFirst below.
3810 This is unfortunate, but that marginal use case does not
3811 justify a call to chase_symlinks which would impose a penalty
3812 on all the other use cases. (We get here for symlinks to
3813 roots of UNC volumes because CreateFile above fails for them,
3814 unlike with symlinks to root directories X:\ of drives.) */
3815 if (is_unc_volume (name))
3816 {
3817 fattrs = unc_volume_file_attributes (name);
3818 if (fattrs == -1)
3819 return -1;
3820
3821 ctime = atime = wtime = utc_base_ft;
3822 }
3823 else if (rootdir)
3824 {
3825 if (!dbcs_p)
3826 {
3827 if (!IS_DIRECTORY_SEP (name[len-1]))
3828 strcat (name, "\\");
3829 }
3830 else
3831 {
3832 char *end = name + len;
3833 char *n = CharPrevExA (file_name_codepage, name, end, 0);
3834
3835 if (!IS_DIRECTORY_SEP (*n))
3836 strcat (name, "\\");
3837 }
3838 if (GetDriveType (name) < 2)
3839 {
3840 errno = ENOENT;
3841 return -1;
3842 }
3843
3844 fattrs = FILE_ATTRIBUTE_DIRECTORY;
3845 ctime = atime = wtime = utc_base_ft;
3846 }
3847 else
3848 {
3849 if (!dbcs_p)
3850 {
3851 if (IS_DIRECTORY_SEP (name[len-1]))
3852 name[len - 1] = 0;
3853 }
3854 else
3855 {
3856 char *end = name + len;
3857 char *n = CharPrevExA (file_name_codepage, name, end, 0);
3858
3859 if (IS_DIRECTORY_SEP (*n))
3860 *n = 0;
3861 }
3862
3863 /* (This is hacky, but helps when doing file completions on
3864 network drives.) Optimize by using information available from
3865 active readdir if possible. */
3866 len = strlen (dir_pathname);
3867 if (!dbcs_p)
3868 {
3869 if (IS_DIRECTORY_SEP (dir_pathname[len-1]))
3870 len--;
3871 }
3872 else
3873 {
3874 char *end = dir_pathname + len;
3875 char *n = CharPrevExA (file_name_codepage, dir_pathname, end, 0);
3876
3877 if (IS_DIRECTORY_SEP (*n))
3878 len--;
3879 }
3880 if (dir_find_handle != INVALID_HANDLE_VALUE
3881 && !(is_a_symlink && follow_symlinks)
3882 && strnicmp (save_name, dir_pathname, len) == 0
3883 && IS_DIRECTORY_SEP (name[len])
3884 && xstrcasecmp (name + len + 1, dir_static.d_name) == 0)
3885 {
3886 /* This was the last entry returned by readdir. */
3887 wfd = dir_find_data;
3888 }
3889 else
3890 {
3891 logon_network_drive (name);
3892
3893 fh = FindFirstFile (name, &wfd);
3894 if (fh == INVALID_HANDLE_VALUE)
3895 {
3896 errno = ENOENT;
3897 return -1;
3898 }
3899 FindClose (fh);
3900 }
3901 /* Note: if NAME is a symlink, the information we get from
3902 FindFirstFile is for the symlink, not its target. */
3903 fattrs = wfd.dwFileAttributes;
3904 ctime = wfd.ftCreationTime;
3905 atime = wfd.ftLastAccessTime;
3906 wtime = wfd.ftLastWriteTime;
3907 fs_high = wfd.nFileSizeHigh;
3908 fs_low = wfd.nFileSizeLow;
3909 fake_inode = 0;
3910 nlinks = 1;
3911 serialnum = volume_info.serialnum;
3912 }
3913 if (is_a_symlink && !follow_symlinks)
3914 buf->st_mode = S_IFLNK;
3915 else if (fattrs & FILE_ATTRIBUTE_DIRECTORY)
3916 buf->st_mode = S_IFDIR;
3917 else
3918 buf->st_mode = S_IFREG;
3919
3920 get_file_owner_and_group (NULL, buf);
3921 }
3922
3923 #if 0
3924 /* Not sure if there is any point in this. */
3925 if (!NILP (Vw32_generate_fake_inodes))
3926 fake_inode = generate_inode_val (name);
3927 else if (fake_inode == 0)
3928 {
3929 /* For want of something better, try to make everything unique. */
3930 static DWORD gen_num = 0;
3931 fake_inode = ++gen_num;
3932 }
3933 #endif
3934
3935 buf->st_ino = fake_inode;
3936
3937 buf->st_dev = serialnum;
3938 buf->st_rdev = serialnum;
3939
3940 buf->st_size = fs_high;
3941 buf->st_size <<= 32;
3942 buf->st_size += fs_low;
3943 buf->st_nlink = nlinks;
3944
3945 /* Convert timestamps to Unix format. */
3946 buf->st_mtime = convert_time (wtime);
3947 buf->st_atime = convert_time (atime);
3948 if (buf->st_atime == 0) buf->st_atime = buf->st_mtime;
3949 buf->st_ctime = convert_time (ctime);
3950 if (buf->st_ctime == 0) buf->st_ctime = buf->st_mtime;
3951
3952 /* determine rwx permissions */
3953 if (is_a_symlink && !follow_symlinks)
3954 permission = S_IREAD | S_IWRITE | S_IEXEC; /* Posix expectations */
3955 else
3956 {
3957 if (fattrs & FILE_ATTRIBUTE_READONLY)
3958 permission = S_IREAD;
3959 else
3960 permission = S_IREAD | S_IWRITE;
3961
3962 if (fattrs & FILE_ATTRIBUTE_DIRECTORY)
3963 permission |= S_IEXEC;
3964 else if (is_exec (name))
3965 permission |= S_IEXEC;
3966 }
3967
3968 buf->st_mode |= permission | (permission >> 3) | (permission >> 6);
3969
3970 return 0;
3971 }
3972
3973 int
3974 stat (const char * path, struct stat * buf)
3975 {
3976 return stat_worker (path, buf, 1);
3977 }
3978
3979 int
3980 lstat (const char * path, struct stat * buf)
3981 {
3982 return stat_worker (path, buf, 0);
3983 }
3984
3985 /* Provide fstat and utime as well as stat for consistent handling of
3986 file timestamps. */
3987 int
3988 fstat (int desc, struct stat * buf)
3989 {
3990 HANDLE fh = (HANDLE) _get_osfhandle (desc);
3991 BY_HANDLE_FILE_INFORMATION info;
3992 unsigned __int64 fake_inode;
3993 int permission;
3994
3995 switch (GetFileType (fh) & ~FILE_TYPE_REMOTE)
3996 {
3997 case FILE_TYPE_DISK:
3998 buf->st_mode = S_IFREG;
3999 if (!GetFileInformationByHandle (fh, &info))
4000 {
4001 errno = EACCES;
4002 return -1;
4003 }
4004 break;
4005 case FILE_TYPE_PIPE:
4006 buf->st_mode = S_IFIFO;
4007 goto non_disk;
4008 case FILE_TYPE_CHAR:
4009 case FILE_TYPE_UNKNOWN:
4010 default:
4011 buf->st_mode = S_IFCHR;
4012 non_disk:
4013 memset (&info, 0, sizeof (info));
4014 info.dwFileAttributes = 0;
4015 info.ftCreationTime = utc_base_ft;
4016 info.ftLastAccessTime = utc_base_ft;
4017 info.ftLastWriteTime = utc_base_ft;
4018 }
4019
4020 if (info.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)
4021 buf->st_mode = S_IFDIR;
4022
4023 buf->st_nlink = info.nNumberOfLinks;
4024 /* Might as well use file index to fake inode values, but this
4025 is not guaranteed to be unique unless we keep a handle open
4026 all the time (even then there are situations where it is
4027 not unique). Reputedly, there are at most 48 bits of info
4028 (on NTFS, presumably less on FAT). */
4029 fake_inode = info.nFileIndexHigh;
4030 fake_inode <<= 32;
4031 fake_inode += info.nFileIndexLow;
4032
4033 /* MSVC defines _ino_t to be short; other libc's might not. */
4034 if (sizeof (buf->st_ino) == 2)
4035 buf->st_ino = fake_inode ^ (fake_inode >> 16);
4036 else
4037 buf->st_ino = fake_inode;
4038
4039 /* Consider files to belong to current user.
4040 FIXME: this should use GetSecurityInfo API, but it is only
4041 available for _WIN32_WINNT >= 0x501. */
4042 buf->st_uid = dflt_passwd.pw_uid;
4043 buf->st_gid = dflt_passwd.pw_gid;
4044 strcpy (buf->st_uname, dflt_passwd.pw_name);
4045 strcpy (buf->st_gname, dflt_group.gr_name);
4046
4047 buf->st_dev = info.dwVolumeSerialNumber;
4048 buf->st_rdev = info.dwVolumeSerialNumber;
4049
4050 buf->st_size = info.nFileSizeHigh;
4051 buf->st_size <<= 32;
4052 buf->st_size += info.nFileSizeLow;
4053
4054 /* Convert timestamps to Unix format. */
4055 buf->st_mtime = convert_time (info.ftLastWriteTime);
4056 buf->st_atime = convert_time (info.ftLastAccessTime);
4057 if (buf->st_atime == 0) buf->st_atime = buf->st_mtime;
4058 buf->st_ctime = convert_time (info.ftCreationTime);
4059 if (buf->st_ctime == 0) buf->st_ctime = buf->st_mtime;
4060
4061 /* determine rwx permissions */
4062 if (info.dwFileAttributes & FILE_ATTRIBUTE_READONLY)
4063 permission = S_IREAD;
4064 else
4065 permission = S_IREAD | S_IWRITE;
4066
4067 if (info.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)
4068 permission |= S_IEXEC;
4069 else
4070 {
4071 #if 0 /* no way of knowing the filename */
4072 char * p = strrchr (name, '.');
4073 if (p != NULL &&
4074 (xstrcasecmp (p, ".exe") == 0 ||
4075 xstrcasecmp (p, ".com") == 0 ||
4076 xstrcasecmp (p, ".bat") == 0 ||
4077 xstrcasecmp (p, ".cmd") == 0))
4078 permission |= S_IEXEC;
4079 #endif
4080 }
4081
4082 buf->st_mode |= permission | (permission >> 3) | (permission >> 6);
4083
4084 return 0;
4085 }
4086
4087 int
4088 utime (const char *name, struct utimbuf *times)
4089 {
4090 struct utimbuf deftime;
4091 HANDLE fh;
4092 FILETIME mtime;
4093 FILETIME atime;
4094
4095 if (times == NULL)
4096 {
4097 deftime.modtime = deftime.actime = time (NULL);
4098 times = &deftime;
4099 }
4100
4101 /* Need write access to set times. */
4102 fh = CreateFile (name, FILE_WRITE_ATTRIBUTES,
4103 /* If NAME specifies a directory, FILE_SHARE_DELETE
4104 allows other processes to delete files inside it,
4105 while we have the directory open. */
4106 FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
4107 0, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL);
4108 if (fh != INVALID_HANDLE_VALUE)
4109 {
4110 convert_from_time_t (times->actime, &atime);
4111 convert_from_time_t (times->modtime, &mtime);
4112 if (!SetFileTime (fh, NULL, &atime, &mtime))
4113 {
4114 CloseHandle (fh);
4115 errno = EACCES;
4116 return -1;
4117 }
4118 CloseHandle (fh);
4119 }
4120 else
4121 {
4122 errno = EINVAL;
4123 return -1;
4124 }
4125 return 0;
4126 }
4127
4128 \f
4129 /* Symlink-related functions. */
4130 #ifndef SYMBOLIC_LINK_FLAG_DIRECTORY
4131 #define SYMBOLIC_LINK_FLAG_DIRECTORY 0x1
4132 #endif
4133
4134 int
4135 symlink (char const *filename, char const *linkname)
4136 {
4137 char linkfn[MAX_PATH], *tgtfn;
4138 DWORD flags = 0;
4139 int dir_access, filename_ends_in_slash;
4140 int dbcs_p;
4141
4142 /* Diagnostics follows Posix as much as possible. */
4143 if (filename == NULL || linkname == NULL)
4144 {
4145 errno = EFAULT;
4146 return -1;
4147 }
4148 if (!*filename)
4149 {
4150 errno = ENOENT;
4151 return -1;
4152 }
4153 if (strlen (filename) > MAX_PATH || strlen (linkname) > MAX_PATH)
4154 {
4155 errno = ENAMETOOLONG;
4156 return -1;
4157 }
4158
4159 strcpy (linkfn, map_w32_filename (linkname, NULL));
4160 if ((volume_info.flags & FILE_SUPPORTS_REPARSE_POINTS) == 0)
4161 {
4162 errno = EPERM;
4163 return -1;
4164 }
4165
4166 dbcs_p = max_filename_mbslen () > 1;
4167
4168 /* Note: since empty FILENAME was already rejected, we can safely
4169 refer to FILENAME[1]. */
4170 if (!(IS_DIRECTORY_SEP (filename[0]) || IS_DEVICE_SEP (filename[1])))
4171 {
4172 /* Non-absolute FILENAME is understood as being relative to
4173 LINKNAME's directory. We need to prepend that directory to
4174 FILENAME to get correct results from sys_access below, since
4175 otherwise it will interpret FILENAME relative to the
4176 directory where the Emacs process runs. Note that
4177 make-symbolic-link always makes sure LINKNAME is a fully
4178 expanded file name. */
4179 char tem[MAX_PATH];
4180 char *p = linkfn + strlen (linkfn);
4181
4182 if (!dbcs_p)
4183 {
4184 while (p > linkfn && !IS_ANY_SEP (p[-1]))
4185 p--;
4186 }
4187 else
4188 {
4189 char *p1 = CharPrevExA (file_name_codepage, linkfn, p, 0);
4190
4191 while (p > linkfn && !IS_ANY_SEP (*p1))
4192 {
4193 p = p1;
4194 p1 = CharPrevExA (file_name_codepage, linkfn, p1, 0);
4195 }
4196 }
4197 if (p > linkfn)
4198 strncpy (tem, linkfn, p - linkfn);
4199 tem[p - linkfn] = '\0';
4200 strcat (tem, filename);
4201 dir_access = sys_access (tem, D_OK);
4202 }
4203 else
4204 dir_access = sys_access (filename, D_OK);
4205
4206 /* Since Windows distinguishes between symlinks to directories and
4207 to files, we provide a kludgy feature: if FILENAME doesn't
4208 exist, but ends in a slash, we create a symlink to directory. If
4209 FILENAME exists and is a directory, we always create a symlink to
4210 directory. */
4211 if (!dbcs_p)
4212 filename_ends_in_slash = IS_DIRECTORY_SEP (filename[strlen (filename) - 1]);
4213 else
4214 {
4215 const char *end = filename + strlen (filename);
4216 const char *n = CharPrevExA (file_name_codepage, filename, end, 0);
4217
4218 filename_ends_in_slash = IS_DIRECTORY_SEP (*n);
4219 }
4220 if (dir_access == 0 || filename_ends_in_slash)
4221 flags = SYMBOLIC_LINK_FLAG_DIRECTORY;
4222
4223 tgtfn = (char *)map_w32_filename (filename, NULL);
4224 if (filename_ends_in_slash)
4225 tgtfn[strlen (tgtfn) - 1] = '\0';
4226
4227 errno = 0;
4228 if (!create_symbolic_link (linkfn, tgtfn, flags))
4229 {
4230 /* ENOSYS is set by create_symbolic_link, when it detects that
4231 the OS doesn't support the CreateSymbolicLink API. */
4232 if (errno != ENOSYS)
4233 {
4234 DWORD w32err = GetLastError ();
4235
4236 switch (w32err)
4237 {
4238 /* ERROR_SUCCESS is sometimes returned when LINKFN and
4239 TGTFN point to the same file name, go figure. */
4240 case ERROR_SUCCESS:
4241 case ERROR_FILE_EXISTS:
4242 errno = EEXIST;
4243 break;
4244 case ERROR_ACCESS_DENIED:
4245 errno = EACCES;
4246 break;
4247 case ERROR_FILE_NOT_FOUND:
4248 case ERROR_PATH_NOT_FOUND:
4249 case ERROR_BAD_NETPATH:
4250 case ERROR_INVALID_REPARSE_DATA:
4251 errno = ENOENT;
4252 break;
4253 case ERROR_DIRECTORY:
4254 errno = EISDIR;
4255 break;
4256 case ERROR_PRIVILEGE_NOT_HELD:
4257 case ERROR_NOT_ALL_ASSIGNED:
4258 errno = EPERM;
4259 break;
4260 case ERROR_DISK_FULL:
4261 errno = ENOSPC;
4262 break;
4263 default:
4264 errno = EINVAL;
4265 break;
4266 }
4267 }
4268 return -1;
4269 }
4270 return 0;
4271 }
4272
4273 /* A quick inexpensive test of whether FILENAME identifies a file that
4274 is a symlink. Returns non-zero if it is, zero otherwise. FILENAME
4275 must already be in the normalized form returned by
4276 map_w32_filename.
4277
4278 Note: for repeated operations on many files, it is best to test
4279 whether the underlying volume actually supports symlinks, by
4280 testing the FILE_SUPPORTS_REPARSE_POINTS bit in volume's flags, and
4281 avoid the call to this function if it doesn't. That's because the
4282 call to GetFileAttributes takes a non-negligible time, especially
4283 on non-local or removable filesystems. See stat_worker for an
4284 example of how to do that. */
4285 static int
4286 is_symlink (const char *filename)
4287 {
4288 DWORD attrs;
4289 WIN32_FIND_DATA wfd;
4290 HANDLE fh;
4291
4292 attrs = GetFileAttributes (filename);
4293 if (attrs == -1)
4294 {
4295 DWORD w32err = GetLastError ();
4296
4297 switch (w32err)
4298 {
4299 case ERROR_BAD_NETPATH: /* network share, can't be a symlink */
4300 break;
4301 case ERROR_ACCESS_DENIED:
4302 errno = EACCES;
4303 break;
4304 case ERROR_FILE_NOT_FOUND:
4305 case ERROR_PATH_NOT_FOUND:
4306 default:
4307 errno = ENOENT;
4308 break;
4309 }
4310 return 0;
4311 }
4312 if ((attrs & FILE_ATTRIBUTE_REPARSE_POINT) == 0)
4313 return 0;
4314 logon_network_drive (filename);
4315 fh = FindFirstFile (filename, &wfd);
4316 if (fh == INVALID_HANDLE_VALUE)
4317 return 0;
4318 FindClose (fh);
4319 return (wfd.dwFileAttributes & FILE_ATTRIBUTE_REPARSE_POINT) != 0
4320 && (wfd.dwReserved0 & IO_REPARSE_TAG_SYMLINK) == IO_REPARSE_TAG_SYMLINK;
4321 }
4322
4323 /* If NAME identifies a symbolic link, copy into BUF the file name of
4324 the symlink's target. Copy at most BUF_SIZE bytes, and do NOT
4325 null-terminate the target name, even if it fits. Return the number
4326 of bytes copied, or -1 if NAME is not a symlink or any error was
4327 encountered while resolving it. The file name copied into BUF is
4328 encoded in the current ANSI codepage. */
4329 ssize_t
4330 readlink (const char *name, char *buf, size_t buf_size)
4331 {
4332 const char *path;
4333 TOKEN_PRIVILEGES privs;
4334 int restore_privs = 0;
4335 HANDLE sh;
4336 ssize_t retval;
4337
4338 if (name == NULL)
4339 {
4340 errno = EFAULT;
4341 return -1;
4342 }
4343 if (!*name)
4344 {
4345 errno = ENOENT;
4346 return -1;
4347 }
4348
4349 path = map_w32_filename (name, NULL);
4350
4351 if (strlen (path) > MAX_PATH)
4352 {
4353 errno = ENAMETOOLONG;
4354 return -1;
4355 }
4356
4357 errno = 0;
4358 if (is_windows_9x () == TRUE
4359 || (volume_info.flags & FILE_SUPPORTS_REPARSE_POINTS) == 0
4360 || !is_symlink (path))
4361 {
4362 if (!errno)
4363 errno = EINVAL; /* not a symlink */
4364 return -1;
4365 }
4366
4367 /* Done with simple tests, now we're in for some _real_ work. */
4368 if (enable_privilege (SE_BACKUP_NAME, TRUE, &privs))
4369 restore_privs = 1;
4370 /* Implementation note: From here and onward, don't return early,
4371 since that will fail to restore the original set of privileges of
4372 the calling thread. */
4373
4374 retval = -1; /* not too optimistic, are we? */
4375
4376 /* Note: In the next call to CreateFile, we use zero as the 2nd
4377 argument because, when the symlink is a hidden/system file,
4378 e.g. 'C:\Users\All Users', GENERIC_READ fails with
4379 ERROR_ACCESS_DENIED. Zero seems to work just fine, both for file
4380 and directory symlinks. */
4381 sh = CreateFile (path, 0, 0, NULL, OPEN_EXISTING,
4382 FILE_FLAG_OPEN_REPARSE_POINT | FILE_FLAG_BACKUP_SEMANTICS,
4383 NULL);
4384 if (sh != INVALID_HANDLE_VALUE)
4385 {
4386 BYTE reparse_buf[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
4387 REPARSE_DATA_BUFFER *reparse_data = (REPARSE_DATA_BUFFER *)&reparse_buf[0];
4388 DWORD retbytes;
4389
4390 if (!DeviceIoControl (sh, FSCTL_GET_REPARSE_POINT, NULL, 0,
4391 reparse_buf, MAXIMUM_REPARSE_DATA_BUFFER_SIZE,
4392 &retbytes, NULL))
4393 errno = EIO;
4394 else if (reparse_data->ReparseTag != IO_REPARSE_TAG_SYMLINK)
4395 errno = EINVAL;
4396 else
4397 {
4398 /* Copy the link target name, in wide characters, fro
4399 reparse_data, then convert it to multibyte encoding in
4400 the current locale's codepage. */
4401 WCHAR *lwname;
4402 BYTE lname[MAX_PATH];
4403 USHORT lname_len;
4404 USHORT lwname_len =
4405 reparse_data->SymbolicLinkReparseBuffer.PrintNameLength;
4406 WCHAR *lwname_src =
4407 reparse_data->SymbolicLinkReparseBuffer.PathBuffer
4408 + reparse_data->SymbolicLinkReparseBuffer.PrintNameOffset/sizeof(WCHAR);
4409 /* This updates file_name_codepage which we need below. */
4410 int dbcs_p = max_filename_mbslen () > 1;
4411
4412 /* According to MSDN, PrintNameLength does not include the
4413 terminating null character. */
4414 lwname = alloca ((lwname_len + 1) * sizeof(WCHAR));
4415 memcpy (lwname, lwname_src, lwname_len);
4416 lwname[lwname_len/sizeof(WCHAR)] = 0; /* null-terminate */
4417
4418 lname_len = WideCharToMultiByte (file_name_codepage, 0, lwname, -1,
4419 lname, MAX_PATH, NULL, NULL);
4420 if (!lname_len)
4421 {
4422 /* WideCharToMultiByte failed. */
4423 DWORD w32err1 = GetLastError ();
4424
4425 switch (w32err1)
4426 {
4427 case ERROR_INSUFFICIENT_BUFFER:
4428 errno = ENAMETOOLONG;
4429 break;
4430 case ERROR_INVALID_PARAMETER:
4431 errno = EFAULT;
4432 break;
4433 case ERROR_NO_UNICODE_TRANSLATION:
4434 errno = ENOENT;
4435 break;
4436 default:
4437 errno = EINVAL;
4438 break;
4439 }
4440 }
4441 else
4442 {
4443 size_t size_to_copy = buf_size;
4444 BYTE *p = lname, *p2;
4445 BYTE *pend = p + lname_len;
4446
4447 /* Normalize like dostounix_filename does, but we don't
4448 want to assume that lname is null-terminated. */
4449 if (dbcs_p)
4450 p2 = CharNextExA (file_name_codepage, p, 0);
4451 else
4452 p2 = p + 1;
4453 if (*p && *p2 == ':' && *p >= 'A' && *p <= 'Z')
4454 {
4455 *p += 'a' - 'A';
4456 p += 2;
4457 }
4458 while (p <= pend)
4459 {
4460 if (*p == '\\')
4461 *p = '/';
4462 if (dbcs_p)
4463 {
4464 p = CharNextExA (file_name_codepage, p, 0);
4465 /* CharNextExA doesn't advance at null character. */
4466 if (!*p)
4467 break;
4468 }
4469 else
4470 ++p;
4471 }
4472 /* Testing for null-terminated LNAME is paranoia:
4473 WideCharToMultiByte should always return a
4474 null-terminated string when its 4th argument is -1
4475 and its 3rd argument is null-terminated (which they
4476 are, see above). */
4477 if (lname[lname_len - 1] == '\0')
4478 lname_len--;
4479 if (lname_len <= buf_size)
4480 size_to_copy = lname_len;
4481 strncpy (buf, lname, size_to_copy);
4482 /* Success! */
4483 retval = size_to_copy;
4484 }
4485 }
4486 CloseHandle (sh);
4487 }
4488 else
4489 {
4490 /* CreateFile failed. */
4491 DWORD w32err2 = GetLastError ();
4492
4493 switch (w32err2)
4494 {
4495 case ERROR_FILE_NOT_FOUND:
4496 case ERROR_PATH_NOT_FOUND:
4497 errno = ENOENT;
4498 break;
4499 case ERROR_ACCESS_DENIED:
4500 case ERROR_TOO_MANY_OPEN_FILES:
4501 errno = EACCES;
4502 break;
4503 default:
4504 errno = EPERM;
4505 break;
4506 }
4507 }
4508 if (restore_privs)
4509 {
4510 restore_privilege (&privs);
4511 revert_to_self ();
4512 }
4513
4514 return retval;
4515 }
4516
4517 /* If FILE is a symlink, return its target (stored in a static
4518 buffer); otherwise return FILE.
4519
4520 This function repeatedly resolves symlinks in the last component of
4521 a chain of symlink file names, as in foo -> bar -> baz -> ...,
4522 until it arrives at a file whose last component is not a symlink,
4523 or some error occurs. It returns the target of the last
4524 successfully resolved symlink in the chain. If it succeeds to
4525 resolve even a single symlink, the value returned is an absolute
4526 file name with backslashes (result of GetFullPathName). By
4527 contrast, if the original FILE is returned, it is unaltered.
4528
4529 Note: This function can set errno even if it succeeds.
4530
4531 Implementation note: we only resolve the last portion ("basename")
4532 of the argument FILE and of each following file in the chain,
4533 disregarding any possible symlinks in its leading directories.
4534 This is because Windows system calls and library functions
4535 transparently resolve symlinks in leading directories and return
4536 correct information, as long as the basename is not a symlink. */
4537 static char *
4538 chase_symlinks (const char *file)
4539 {
4540 static char target[MAX_PATH];
4541 char link[MAX_PATH];
4542 ssize_t res, link_len;
4543 int loop_count = 0;
4544 int dbcs_p;
4545
4546 if (is_windows_9x () == TRUE || !is_symlink (file))
4547 return (char *)file;
4548
4549 if ((link_len = GetFullPathName (file, MAX_PATH, link, NULL)) == 0)
4550 return (char *)file;
4551
4552 dbcs_p = max_filename_mbslen () > 1;
4553 target[0] = '\0';
4554 do {
4555
4556 /* Remove trailing slashes, as we want to resolve the last
4557 non-trivial part of the link name. */
4558 if (!dbcs_p)
4559 {
4560 while (link_len > 3 && IS_DIRECTORY_SEP (link[link_len-1]))
4561 link[link_len--] = '\0';
4562 }
4563 else if (link_len > 3)
4564 {
4565 char *n = CharPrevExA (file_name_codepage, link, link + link_len, 0);
4566
4567 while (n >= link + 2 && IS_DIRECTORY_SEP (*n))
4568 {
4569 n[1] = '\0';
4570 n = CharPrevExA (file_name_codepage, link, n, 0);
4571 }
4572 }
4573
4574 res = readlink (link, target, MAX_PATH);
4575 if (res > 0)
4576 {
4577 target[res] = '\0';
4578 if (!(IS_DEVICE_SEP (target[1])
4579 || (IS_DIRECTORY_SEP (target[0]) && IS_DIRECTORY_SEP (target[1]))))
4580 {
4581 /* Target is relative. Append it to the directory part of
4582 the symlink, then copy the result back to target. */
4583 char *p = link + link_len;
4584
4585 if (!dbcs_p)
4586 {
4587 while (p > link && !IS_ANY_SEP (p[-1]))
4588 p--;
4589 }
4590 else
4591 {
4592 char *p1 = CharPrevExA (file_name_codepage, link, p, 0);
4593
4594 while (p > link && !IS_ANY_SEP (*p1))
4595 {
4596 p = p1;
4597 p1 = CharPrevExA (file_name_codepage, link, p1, 0);
4598 }
4599 }
4600 strcpy (p, target);
4601 strcpy (target, link);
4602 }
4603 /* Resolve any "." and ".." to get a fully-qualified file name
4604 in link[] again. */
4605 link_len = GetFullPathName (target, MAX_PATH, link, NULL);
4606 }
4607 } while (res > 0 && link_len > 0 && ++loop_count <= 100);
4608
4609 if (loop_count > 100)
4610 errno = ELOOP;
4611
4612 if (target[0] == '\0') /* not a single call to readlink succeeded */
4613 return (char *)file;
4614 return target;
4615 }
4616
4617 /* MS-Windows version of careadlinkat (cf. ../lib/careadlinkat.c). We
4618 have a fixed max size for file names, so we don't need the kind of
4619 alloc/malloc/realloc dance the gnulib version does. We also don't
4620 support FD-relative symlinks. */
4621 char *
4622 careadlinkat (int fd, char const *filename,
4623 char *buffer, size_t buffer_size,
4624 struct allocator const *alloc,
4625 ssize_t (*preadlinkat) (int, char const *, char *, size_t))
4626 {
4627 char linkname[MAX_PATH];
4628 ssize_t link_size;
4629
4630 if (fd != AT_FDCWD)
4631 {
4632 errno = EINVAL;
4633 return NULL;
4634 }
4635
4636 link_size = preadlinkat (fd, filename, linkname, sizeof(linkname));
4637
4638 if (link_size > 0)
4639 {
4640 char *retval = buffer;
4641
4642 linkname[link_size++] = '\0';
4643 if (link_size > buffer_size)
4644 retval = (char *)(alloc ? alloc->allocate : xmalloc) (link_size);
4645 if (retval)
4646 memcpy (retval, linkname, link_size);
4647
4648 return retval;
4649 }
4650 return NULL;
4651 }
4652
4653 ssize_t
4654 careadlinkatcwd (int fd, char const *filename, char *buffer,
4655 size_t buffer_size)
4656 {
4657 (void) fd;
4658 return readlink (filename, buffer, buffer_size);
4659 }
4660
4661 \f
4662 /* Support for browsing other processes and their attributes. See
4663 process.c for the Lisp bindings. */
4664
4665 /* Helper wrapper functions. */
4666
4667 static HANDLE WINAPI
4668 create_toolhelp32_snapshot (DWORD Flags, DWORD Ignored)
4669 {
4670 static CreateToolhelp32Snapshot_Proc s_pfn_Create_Toolhelp32_Snapshot = NULL;
4671
4672 if (g_b_init_create_toolhelp32_snapshot == 0)
4673 {
4674 g_b_init_create_toolhelp32_snapshot = 1;
4675 s_pfn_Create_Toolhelp32_Snapshot = (CreateToolhelp32Snapshot_Proc)
4676 GetProcAddress (GetModuleHandle ("kernel32.dll"),
4677 "CreateToolhelp32Snapshot");
4678 }
4679 if (s_pfn_Create_Toolhelp32_Snapshot == NULL)
4680 {
4681 return INVALID_HANDLE_VALUE;
4682 }
4683 return (s_pfn_Create_Toolhelp32_Snapshot (Flags, Ignored));
4684 }
4685
4686 static BOOL WINAPI
4687 process32_first (HANDLE hSnapshot, LPPROCESSENTRY32 lppe)
4688 {
4689 static Process32First_Proc s_pfn_Process32_First = NULL;
4690
4691 if (g_b_init_process32_first == 0)
4692 {
4693 g_b_init_process32_first = 1;
4694 s_pfn_Process32_First = (Process32First_Proc)
4695 GetProcAddress (GetModuleHandle ("kernel32.dll"),
4696 "Process32First");
4697 }
4698 if (s_pfn_Process32_First == NULL)
4699 {
4700 return FALSE;
4701 }
4702 return (s_pfn_Process32_First (hSnapshot, lppe));
4703 }
4704
4705 static BOOL WINAPI
4706 process32_next (HANDLE hSnapshot, LPPROCESSENTRY32 lppe)
4707 {
4708 static Process32Next_Proc s_pfn_Process32_Next = NULL;
4709
4710 if (g_b_init_process32_next == 0)
4711 {
4712 g_b_init_process32_next = 1;
4713 s_pfn_Process32_Next = (Process32Next_Proc)
4714 GetProcAddress (GetModuleHandle ("kernel32.dll"),
4715 "Process32Next");
4716 }
4717 if (s_pfn_Process32_Next == NULL)
4718 {
4719 return FALSE;
4720 }
4721 return (s_pfn_Process32_Next (hSnapshot, lppe));
4722 }
4723
4724 static BOOL WINAPI
4725 open_thread_token (HANDLE ThreadHandle,
4726 DWORD DesiredAccess,
4727 BOOL OpenAsSelf,
4728 PHANDLE TokenHandle)
4729 {
4730 static OpenThreadToken_Proc s_pfn_Open_Thread_Token = NULL;
4731 HMODULE hm_advapi32 = NULL;
4732 if (is_windows_9x () == TRUE)
4733 {
4734 SetLastError (ERROR_NOT_SUPPORTED);
4735 return FALSE;
4736 }
4737 if (g_b_init_open_thread_token == 0)
4738 {
4739 g_b_init_open_thread_token = 1;
4740 hm_advapi32 = LoadLibrary ("Advapi32.dll");
4741 s_pfn_Open_Thread_Token =
4742 (OpenThreadToken_Proc) GetProcAddress (hm_advapi32, "OpenThreadToken");
4743 }
4744 if (s_pfn_Open_Thread_Token == NULL)
4745 {
4746 SetLastError (ERROR_NOT_SUPPORTED);
4747 return FALSE;
4748 }
4749 return (
4750 s_pfn_Open_Thread_Token (
4751 ThreadHandle,
4752 DesiredAccess,
4753 OpenAsSelf,
4754 TokenHandle)
4755 );
4756 }
4757
4758 static BOOL WINAPI
4759 impersonate_self (SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
4760 {
4761 static ImpersonateSelf_Proc s_pfn_Impersonate_Self = NULL;
4762 HMODULE hm_advapi32 = NULL;
4763 if (is_windows_9x () == TRUE)
4764 {
4765 return FALSE;
4766 }
4767 if (g_b_init_impersonate_self == 0)
4768 {
4769 g_b_init_impersonate_self = 1;
4770 hm_advapi32 = LoadLibrary ("Advapi32.dll");
4771 s_pfn_Impersonate_Self =
4772 (ImpersonateSelf_Proc) GetProcAddress (hm_advapi32, "ImpersonateSelf");
4773 }
4774 if (s_pfn_Impersonate_Self == NULL)
4775 {
4776 return FALSE;
4777 }
4778 return s_pfn_Impersonate_Self (ImpersonationLevel);
4779 }
4780
4781 static BOOL WINAPI
4782 revert_to_self (void)
4783 {
4784 static RevertToSelf_Proc s_pfn_Revert_To_Self = NULL;
4785 HMODULE hm_advapi32 = NULL;
4786 if (is_windows_9x () == TRUE)
4787 {
4788 return FALSE;
4789 }
4790 if (g_b_init_revert_to_self == 0)
4791 {
4792 g_b_init_revert_to_self = 1;
4793 hm_advapi32 = LoadLibrary ("Advapi32.dll");
4794 s_pfn_Revert_To_Self =
4795 (RevertToSelf_Proc) GetProcAddress (hm_advapi32, "RevertToSelf");
4796 }
4797 if (s_pfn_Revert_To_Self == NULL)
4798 {
4799 return FALSE;
4800 }
4801 return s_pfn_Revert_To_Self ();
4802 }
4803
4804 static BOOL WINAPI
4805 get_process_memory_info (HANDLE h_proc,
4806 PPROCESS_MEMORY_COUNTERS mem_counters,
4807 DWORD bufsize)
4808 {
4809 static GetProcessMemoryInfo_Proc s_pfn_Get_Process_Memory_Info = NULL;
4810 HMODULE hm_psapi = NULL;
4811 if (is_windows_9x () == TRUE)
4812 {
4813 return FALSE;
4814 }
4815 if (g_b_init_get_process_memory_info == 0)
4816 {
4817 g_b_init_get_process_memory_info = 1;
4818 hm_psapi = LoadLibrary ("Psapi.dll");
4819 if (hm_psapi)
4820 s_pfn_Get_Process_Memory_Info = (GetProcessMemoryInfo_Proc)
4821 GetProcAddress (hm_psapi, "GetProcessMemoryInfo");
4822 }
4823 if (s_pfn_Get_Process_Memory_Info == NULL)
4824 {
4825 return FALSE;
4826 }
4827 return s_pfn_Get_Process_Memory_Info (h_proc, mem_counters, bufsize);
4828 }
4829
4830 static BOOL WINAPI
4831 get_process_working_set_size (HANDLE h_proc,
4832 PSIZE_T minrss,
4833 PSIZE_T maxrss)
4834 {
4835 static GetProcessWorkingSetSize_Proc
4836 s_pfn_Get_Process_Working_Set_Size = NULL;
4837
4838 if (is_windows_9x () == TRUE)
4839 {
4840 return FALSE;
4841 }
4842 if (g_b_init_get_process_working_set_size == 0)
4843 {
4844 g_b_init_get_process_working_set_size = 1;
4845 s_pfn_Get_Process_Working_Set_Size = (GetProcessWorkingSetSize_Proc)
4846 GetProcAddress (GetModuleHandle ("kernel32.dll"),
4847 "GetProcessWorkingSetSize");
4848 }
4849 if (s_pfn_Get_Process_Working_Set_Size == NULL)
4850 {
4851 return FALSE;
4852 }
4853 return s_pfn_Get_Process_Working_Set_Size (h_proc, minrss, maxrss);
4854 }
4855
4856 static BOOL WINAPI
4857 global_memory_status (MEMORYSTATUS *buf)
4858 {
4859 static GlobalMemoryStatus_Proc s_pfn_Global_Memory_Status = NULL;
4860
4861 if (is_windows_9x () == TRUE)
4862 {
4863 return FALSE;
4864 }
4865 if (g_b_init_global_memory_status == 0)
4866 {
4867 g_b_init_global_memory_status = 1;
4868 s_pfn_Global_Memory_Status = (GlobalMemoryStatus_Proc)
4869 GetProcAddress (GetModuleHandle ("kernel32.dll"),
4870 "GlobalMemoryStatus");
4871 }
4872 if (s_pfn_Global_Memory_Status == NULL)
4873 {
4874 return FALSE;
4875 }
4876 return s_pfn_Global_Memory_Status (buf);
4877 }
4878
4879 static BOOL WINAPI
4880 global_memory_status_ex (MEMORY_STATUS_EX *buf)
4881 {
4882 static GlobalMemoryStatusEx_Proc s_pfn_Global_Memory_Status_Ex = NULL;
4883
4884 if (is_windows_9x () == TRUE)
4885 {
4886 return FALSE;
4887 }
4888 if (g_b_init_global_memory_status_ex == 0)
4889 {
4890 g_b_init_global_memory_status_ex = 1;
4891 s_pfn_Global_Memory_Status_Ex = (GlobalMemoryStatusEx_Proc)
4892 GetProcAddress (GetModuleHandle ("kernel32.dll"),
4893 "GlobalMemoryStatusEx");
4894 }
4895 if (s_pfn_Global_Memory_Status_Ex == NULL)
4896 {
4897 return FALSE;
4898 }
4899 return s_pfn_Global_Memory_Status_Ex (buf);
4900 }
4901
4902 Lisp_Object
4903 list_system_processes (void)
4904 {
4905 struct gcpro gcpro1;
4906 Lisp_Object proclist = Qnil;
4907 HANDLE h_snapshot;
4908
4909 h_snapshot = create_toolhelp32_snapshot (TH32CS_SNAPPROCESS, 0);
4910
4911 if (h_snapshot != INVALID_HANDLE_VALUE)
4912 {
4913 PROCESSENTRY32 proc_entry;
4914 DWORD proc_id;
4915 BOOL res;
4916
4917 GCPRO1 (proclist);
4918
4919 proc_entry.dwSize = sizeof (PROCESSENTRY32);
4920 for (res = process32_first (h_snapshot, &proc_entry); res;
4921 res = process32_next (h_snapshot, &proc_entry))
4922 {
4923 proc_id = proc_entry.th32ProcessID;
4924 proclist = Fcons (make_fixnum_or_float (proc_id), proclist);
4925 }
4926
4927 CloseHandle (h_snapshot);
4928 UNGCPRO;
4929 proclist = Fnreverse (proclist);
4930 }
4931
4932 return proclist;
4933 }
4934
4935 static int
4936 enable_privilege (LPCTSTR priv_name, BOOL enable_p, TOKEN_PRIVILEGES *old_priv)
4937 {
4938 TOKEN_PRIVILEGES priv;
4939 DWORD priv_size = sizeof (priv);
4940 DWORD opriv_size = sizeof (*old_priv);
4941 HANDLE h_token = NULL;
4942 HANDLE h_thread = GetCurrentThread ();
4943 int ret_val = 0;
4944 BOOL res;
4945
4946 res = open_thread_token (h_thread,
4947 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
4948 FALSE, &h_token);
4949 if (!res && GetLastError () == ERROR_NO_TOKEN)
4950 {
4951 if (impersonate_self (SecurityImpersonation))
4952 res = open_thread_token (h_thread,
4953 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
4954 FALSE, &h_token);
4955 }
4956 if (res)
4957 {
4958 priv.PrivilegeCount = 1;
4959 priv.Privileges[0].Attributes = enable_p ? SE_PRIVILEGE_ENABLED : 0;
4960 LookupPrivilegeValue (NULL, priv_name, &priv.Privileges[0].Luid);
4961 if (AdjustTokenPrivileges (h_token, FALSE, &priv, priv_size,
4962 old_priv, &opriv_size)
4963 && GetLastError () != ERROR_NOT_ALL_ASSIGNED)
4964 ret_val = 1;
4965 }
4966 if (h_token)
4967 CloseHandle (h_token);
4968
4969 return ret_val;
4970 }
4971
4972 static int
4973 restore_privilege (TOKEN_PRIVILEGES *priv)
4974 {
4975 DWORD priv_size = sizeof (*priv);
4976 HANDLE h_token = NULL;
4977 int ret_val = 0;
4978
4979 if (open_thread_token (GetCurrentThread (),
4980 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
4981 FALSE, &h_token))
4982 {
4983 if (AdjustTokenPrivileges (h_token, FALSE, priv, priv_size, NULL, NULL)
4984 && GetLastError () != ERROR_NOT_ALL_ASSIGNED)
4985 ret_val = 1;
4986 }
4987 if (h_token)
4988 CloseHandle (h_token);
4989
4990 return ret_val;
4991 }
4992
4993 static Lisp_Object
4994 ltime (ULONGLONG time_100ns)
4995 {
4996 ULONGLONG time_sec = time_100ns / 10000000;
4997 int subsec = time_100ns % 10000000;
4998 return list4 (make_number (time_sec >> 16),
4999 make_number (time_sec & 0xffff),
5000 make_number (subsec / 10),
5001 make_number (subsec % 10 * 100000));
5002 }
5003
5004 #define U64_TO_LISP_TIME(time) ltime (time)
5005
5006 static int
5007 process_times (HANDLE h_proc, Lisp_Object *ctime, Lisp_Object *etime,
5008 Lisp_Object *stime, Lisp_Object *utime, Lisp_Object *ttime,
5009 double *pcpu)
5010 {
5011 FILETIME ft_creation, ft_exit, ft_kernel, ft_user, ft_current;
5012 ULONGLONG tem1, tem2, tem3, tem;
5013
5014 if (!h_proc
5015 || !get_process_times_fn
5016 || !(*get_process_times_fn) (h_proc, &ft_creation, &ft_exit,
5017 &ft_kernel, &ft_user))
5018 return 0;
5019
5020 GetSystemTimeAsFileTime (&ft_current);
5021
5022 FILETIME_TO_U64 (tem1, ft_kernel);
5023 *stime = U64_TO_LISP_TIME (tem1);
5024
5025 FILETIME_TO_U64 (tem2, ft_user);
5026 *utime = U64_TO_LISP_TIME (tem2);
5027
5028 tem3 = tem1 + tem2;
5029 *ttime = U64_TO_LISP_TIME (tem3);
5030
5031 FILETIME_TO_U64 (tem, ft_creation);
5032 /* Process no 4 (System) returns zero creation time. */
5033 if (tem)
5034 tem -= utc_base;
5035 *ctime = U64_TO_LISP_TIME (tem);
5036
5037 if (tem)
5038 {
5039 FILETIME_TO_U64 (tem3, ft_current);
5040 tem = (tem3 - utc_base) - tem;
5041 }
5042 *etime = U64_TO_LISP_TIME (tem);
5043
5044 if (tem)
5045 {
5046 *pcpu = 100.0 * (tem1 + tem2) / tem;
5047 if (*pcpu > 100)
5048 *pcpu = 100.0;
5049 }
5050 else
5051 *pcpu = 0;
5052
5053 return 1;
5054 }
5055
5056 Lisp_Object
5057 system_process_attributes (Lisp_Object pid)
5058 {
5059 struct gcpro gcpro1, gcpro2, gcpro3;
5060 Lisp_Object attrs = Qnil;
5061 Lisp_Object cmd_str, decoded_cmd, tem;
5062 HANDLE h_snapshot, h_proc;
5063 DWORD proc_id;
5064 int found_proc = 0;
5065 char uname[UNLEN+1], gname[GNLEN+1], domain[1025];
5066 DWORD ulength = sizeof (uname), dlength = sizeof (domain), needed;
5067 DWORD glength = sizeof (gname);
5068 HANDLE token = NULL;
5069 SID_NAME_USE user_type;
5070 unsigned char *buf = NULL;
5071 DWORD blen = 0;
5072 TOKEN_USER user_token;
5073 TOKEN_PRIMARY_GROUP group_token;
5074 unsigned euid;
5075 unsigned egid;
5076 PROCESS_MEMORY_COUNTERS mem;
5077 PROCESS_MEMORY_COUNTERS_EX mem_ex;
5078 SIZE_T minrss, maxrss;
5079 MEMORYSTATUS memst;
5080 MEMORY_STATUS_EX memstex;
5081 double totphys = 0.0;
5082 Lisp_Object ctime, stime, utime, etime, ttime;
5083 double pcpu;
5084 BOOL result = FALSE;
5085
5086 CHECK_NUMBER_OR_FLOAT (pid);
5087 proc_id = FLOATP (pid) ? XFLOAT_DATA (pid) : XINT (pid);
5088
5089 h_snapshot = create_toolhelp32_snapshot (TH32CS_SNAPPROCESS, 0);
5090
5091 GCPRO3 (attrs, decoded_cmd, tem);
5092
5093 if (h_snapshot != INVALID_HANDLE_VALUE)
5094 {
5095 PROCESSENTRY32 pe;
5096 BOOL res;
5097
5098 pe.dwSize = sizeof (PROCESSENTRY32);
5099 for (res = process32_first (h_snapshot, &pe); res;
5100 res = process32_next (h_snapshot, &pe))
5101 {
5102 if (proc_id == pe.th32ProcessID)
5103 {
5104 if (proc_id == 0)
5105 decoded_cmd = build_string ("Idle");
5106 else
5107 {
5108 /* Decode the command name from locale-specific
5109 encoding. */
5110 cmd_str = make_unibyte_string (pe.szExeFile,
5111 strlen (pe.szExeFile));
5112 decoded_cmd =
5113 code_convert_string_norecord (cmd_str,
5114 Vlocale_coding_system, 0);
5115 }
5116 attrs = Fcons (Fcons (Qcomm, decoded_cmd), attrs);
5117 attrs = Fcons (Fcons (Qppid,
5118 make_fixnum_or_float (pe.th32ParentProcessID)),
5119 attrs);
5120 attrs = Fcons (Fcons (Qpri, make_number (pe.pcPriClassBase)),
5121 attrs);
5122 attrs = Fcons (Fcons (Qthcount,
5123 make_fixnum_or_float (pe.cntThreads)),
5124 attrs);
5125 found_proc = 1;
5126 break;
5127 }
5128 }
5129
5130 CloseHandle (h_snapshot);
5131 }
5132
5133 if (!found_proc)
5134 {
5135 UNGCPRO;
5136 return Qnil;
5137 }
5138
5139 h_proc = OpenProcess (PROCESS_QUERY_INFORMATION | PROCESS_VM_READ,
5140 FALSE, proc_id);
5141 /* If we were denied a handle to the process, try again after
5142 enabling the SeDebugPrivilege in our process. */
5143 if (!h_proc)
5144 {
5145 TOKEN_PRIVILEGES priv_current;
5146
5147 if (enable_privilege (SE_DEBUG_NAME, TRUE, &priv_current))
5148 {
5149 h_proc = OpenProcess (PROCESS_QUERY_INFORMATION | PROCESS_VM_READ,
5150 FALSE, proc_id);
5151 restore_privilege (&priv_current);
5152 revert_to_self ();
5153 }
5154 }
5155 if (h_proc)
5156 {
5157 result = open_process_token (h_proc, TOKEN_QUERY, &token);
5158 if (result)
5159 {
5160 result = get_token_information (token, TokenUser, NULL, 0, &blen);
5161 if (!result && GetLastError () == ERROR_INSUFFICIENT_BUFFER)
5162 {
5163 buf = xmalloc (blen);
5164 result = get_token_information (token, TokenUser,
5165 (LPVOID)buf, blen, &needed);
5166 if (result)
5167 {
5168 memcpy (&user_token, buf, sizeof (user_token));
5169 if (!w32_cached_id (user_token.User.Sid, &euid, uname))
5170 {
5171 euid = get_rid (user_token.User.Sid);
5172 result = lookup_account_sid (NULL, user_token.User.Sid,
5173 uname, &ulength,
5174 domain, &dlength,
5175 &user_type);
5176 if (result)
5177 w32_add_to_cache (user_token.User.Sid, euid, uname);
5178 else
5179 {
5180 strcpy (uname, "unknown");
5181 result = TRUE;
5182 }
5183 }
5184 ulength = strlen (uname);
5185 }
5186 }
5187 }
5188 if (result)
5189 {
5190 /* Determine a reasonable euid and gid values. */
5191 if (xstrcasecmp ("administrator", uname) == 0)
5192 {
5193 euid = 500; /* well-known Administrator uid */
5194 egid = 513; /* well-known None gid */
5195 }
5196 else
5197 {
5198 /* Get group id and name. */
5199 result = get_token_information (token, TokenPrimaryGroup,
5200 (LPVOID)buf, blen, &needed);
5201 if (!result && GetLastError () == ERROR_INSUFFICIENT_BUFFER)
5202 {
5203 buf = xrealloc (buf, blen = needed);
5204 result = get_token_information (token, TokenPrimaryGroup,
5205 (LPVOID)buf, blen, &needed);
5206 }
5207 if (result)
5208 {
5209 memcpy (&group_token, buf, sizeof (group_token));
5210 if (!w32_cached_id (group_token.PrimaryGroup, &egid, gname))
5211 {
5212 egid = get_rid (group_token.PrimaryGroup);
5213 dlength = sizeof (domain);
5214 result =
5215 lookup_account_sid (NULL, group_token.PrimaryGroup,
5216 gname, &glength, NULL, &dlength,
5217 &user_type);
5218 if (result)
5219 w32_add_to_cache (group_token.PrimaryGroup,
5220 egid, gname);
5221 else
5222 {
5223 strcpy (gname, "None");
5224 result = TRUE;
5225 }
5226 }
5227 glength = strlen (gname);
5228 }
5229 }
5230 }
5231 xfree (buf);
5232 }
5233 if (!result)
5234 {
5235 if (!is_windows_9x ())
5236 {
5237 /* We couldn't open the process token, presumably because of
5238 insufficient access rights. Assume this process is run
5239 by the system. */
5240 strcpy (uname, "SYSTEM");
5241 strcpy (gname, "None");
5242 euid = 18; /* SYSTEM */
5243 egid = 513; /* None */
5244 glength = strlen (gname);
5245 ulength = strlen (uname);
5246 }
5247 /* If we are running under Windows 9X, where security calls are
5248 not supported, we assume all processes are run by the current
5249 user. */
5250 else if (GetUserName (uname, &ulength))
5251 {
5252 if (xstrcasecmp ("administrator", uname) == 0)
5253 euid = 0;
5254 else
5255 euid = 123;
5256 egid = euid;
5257 strcpy (gname, "None");
5258 glength = strlen (gname);
5259 ulength = strlen (uname);
5260 }
5261 else
5262 {
5263 euid = 123;
5264 egid = 123;
5265 strcpy (uname, "administrator");
5266 ulength = strlen (uname);
5267 strcpy (gname, "None");
5268 glength = strlen (gname);
5269 }
5270 if (token)
5271 CloseHandle (token);
5272 }
5273
5274 attrs = Fcons (Fcons (Qeuid, make_fixnum_or_float (euid)), attrs);
5275 tem = make_unibyte_string (uname, ulength);
5276 attrs = Fcons (Fcons (Quser,
5277 code_convert_string_norecord (tem, Vlocale_coding_system, 0)),
5278 attrs);
5279 attrs = Fcons (Fcons (Qegid, make_fixnum_or_float (egid)), attrs);
5280 tem = make_unibyte_string (gname, glength);
5281 attrs = Fcons (Fcons (Qgroup,
5282 code_convert_string_norecord (tem, Vlocale_coding_system, 0)),
5283 attrs);
5284
5285 if (global_memory_status_ex (&memstex))
5286 #if __GNUC__ || (defined (_MSC_VER) && _MSC_VER >= 1300)
5287 totphys = memstex.ullTotalPhys / 1024.0;
5288 #else
5289 /* Visual Studio 6 cannot convert an unsigned __int64 type to
5290 double, so we need to do this for it... */
5291 {
5292 DWORD tot_hi = memstex.ullTotalPhys >> 32;
5293 DWORD tot_md = (memstex.ullTotalPhys & 0x00000000ffffffff) >> 10;
5294 DWORD tot_lo = memstex.ullTotalPhys % 1024;
5295
5296 totphys = tot_hi * 4194304.0 + tot_md + tot_lo / 1024.0;
5297 }
5298 #endif /* __GNUC__ || _MSC_VER >= 1300 */
5299 else if (global_memory_status (&memst))
5300 totphys = memst.dwTotalPhys / 1024.0;
5301
5302 if (h_proc
5303 && get_process_memory_info (h_proc, (PROCESS_MEMORY_COUNTERS *)&mem_ex,
5304 sizeof (mem_ex)))
5305 {
5306 SIZE_T rss = mem_ex.WorkingSetSize / 1024;
5307
5308 attrs = Fcons (Fcons (Qmajflt,
5309 make_fixnum_or_float (mem_ex.PageFaultCount)),
5310 attrs);
5311 attrs = Fcons (Fcons (Qvsize,
5312 make_fixnum_or_float (mem_ex.PrivateUsage / 1024)),
5313 attrs);
5314 attrs = Fcons (Fcons (Qrss, make_fixnum_or_float (rss)), attrs);
5315 if (totphys)
5316 attrs = Fcons (Fcons (Qpmem, make_float (100. * rss / totphys)), attrs);
5317 }
5318 else if (h_proc
5319 && get_process_memory_info (h_proc, &mem, sizeof (mem)))
5320 {
5321 SIZE_T rss = mem_ex.WorkingSetSize / 1024;
5322
5323 attrs = Fcons (Fcons (Qmajflt,
5324 make_fixnum_or_float (mem.PageFaultCount)),
5325 attrs);
5326 attrs = Fcons (Fcons (Qrss, make_fixnum_or_float (rss)), attrs);
5327 if (totphys)
5328 attrs = Fcons (Fcons (Qpmem, make_float (100. * rss / totphys)), attrs);
5329 }
5330 else if (h_proc
5331 && get_process_working_set_size (h_proc, &minrss, &maxrss))
5332 {
5333 DWORD rss = maxrss / 1024;
5334
5335 attrs = Fcons (Fcons (Qrss, make_fixnum_or_float (maxrss / 1024)), attrs);
5336 if (totphys)
5337 attrs = Fcons (Fcons (Qpmem, make_float (100. * rss / totphys)), attrs);
5338 }
5339
5340 if (process_times (h_proc, &ctime, &etime, &stime, &utime, &ttime, &pcpu))
5341 {
5342 attrs = Fcons (Fcons (Qutime, utime), attrs);
5343 attrs = Fcons (Fcons (Qstime, stime), attrs);
5344 attrs = Fcons (Fcons (Qtime, ttime), attrs);
5345 attrs = Fcons (Fcons (Qstart, ctime), attrs);
5346 attrs = Fcons (Fcons (Qetime, etime), attrs);
5347 attrs = Fcons (Fcons (Qpcpu, make_float (pcpu)), attrs);
5348 }
5349
5350 /* FIXME: Retrieve command line by walking the PEB of the process. */
5351
5352 if (h_proc)
5353 CloseHandle (h_proc);
5354 UNGCPRO;
5355 return attrs;
5356 }
5357
5358 \f
5359 /* Wrappers for winsock functions to map between our file descriptors
5360 and winsock's handles; also set h_errno for convenience.
5361
5362 To allow Emacs to run on systems which don't have winsock support
5363 installed, we dynamically link to winsock on startup if present, and
5364 otherwise provide the minimum necessary functionality
5365 (eg. gethostname). */
5366
5367 /* function pointers for relevant socket functions */
5368 int (PASCAL *pfn_WSAStartup) (WORD wVersionRequired, LPWSADATA lpWSAData);
5369 void (PASCAL *pfn_WSASetLastError) (int iError);
5370 int (PASCAL *pfn_WSAGetLastError) (void);
5371 int (PASCAL *pfn_WSAEventSelect) (SOCKET s, HANDLE hEventObject, long lNetworkEvents);
5372 HANDLE (PASCAL *pfn_WSACreateEvent) (void);
5373 int (PASCAL *pfn_WSACloseEvent) (HANDLE hEvent);
5374 int (PASCAL *pfn_socket) (int af, int type, int protocol);
5375 int (PASCAL *pfn_bind) (SOCKET s, const struct sockaddr *addr, int namelen);
5376 int (PASCAL *pfn_connect) (SOCKET s, const struct sockaddr *addr, int namelen);
5377 int (PASCAL *pfn_ioctlsocket) (SOCKET s, long cmd, u_long *argp);
5378 int (PASCAL *pfn_recv) (SOCKET s, char * buf, int len, int flags);
5379 int (PASCAL *pfn_send) (SOCKET s, const char * buf, int len, int flags);
5380 int (PASCAL *pfn_closesocket) (SOCKET s);
5381 int (PASCAL *pfn_shutdown) (SOCKET s, int how);
5382 int (PASCAL *pfn_WSACleanup) (void);
5383
5384 u_short (PASCAL *pfn_htons) (u_short hostshort);
5385 u_short (PASCAL *pfn_ntohs) (u_short netshort);
5386 unsigned long (PASCAL *pfn_inet_addr) (const char * cp);
5387 int (PASCAL *pfn_gethostname) (char * name, int namelen);
5388 struct hostent * (PASCAL *pfn_gethostbyname) (const char * name);
5389 struct servent * (PASCAL *pfn_getservbyname) (const char * name, const char * proto);
5390 int (PASCAL *pfn_getpeername) (SOCKET s, struct sockaddr *addr, int * namelen);
5391 int (PASCAL *pfn_setsockopt) (SOCKET s, int level, int optname,
5392 const char * optval, int optlen);
5393 int (PASCAL *pfn_listen) (SOCKET s, int backlog);
5394 int (PASCAL *pfn_getsockname) (SOCKET s, struct sockaddr * name,
5395 int * namelen);
5396 SOCKET (PASCAL *pfn_accept) (SOCKET s, struct sockaddr * addr, int * addrlen);
5397 int (PASCAL *pfn_recvfrom) (SOCKET s, char * buf, int len, int flags,
5398 struct sockaddr * from, int * fromlen);
5399 int (PASCAL *pfn_sendto) (SOCKET s, const char * buf, int len, int flags,
5400 const struct sockaddr * to, int tolen);
5401
5402 /* SetHandleInformation is only needed to make sockets non-inheritable. */
5403 BOOL (WINAPI *pfn_SetHandleInformation) (HANDLE object, DWORD mask, DWORD flags);
5404 #ifndef HANDLE_FLAG_INHERIT
5405 #define HANDLE_FLAG_INHERIT 1
5406 #endif
5407
5408 HANDLE winsock_lib;
5409 static int winsock_inuse;
5410
5411 BOOL
5412 term_winsock (void)
5413 {
5414 if (winsock_lib != NULL && winsock_inuse == 0)
5415 {
5416 /* Not sure what would cause WSAENETDOWN, or even if it can happen
5417 after WSAStartup returns successfully, but it seems reasonable
5418 to allow unloading winsock anyway in that case. */
5419 if (pfn_WSACleanup () == 0 ||
5420 pfn_WSAGetLastError () == WSAENETDOWN)
5421 {
5422 if (FreeLibrary (winsock_lib))
5423 winsock_lib = NULL;
5424 return TRUE;
5425 }
5426 }
5427 return FALSE;
5428 }
5429
5430 BOOL
5431 init_winsock (int load_now)
5432 {
5433 WSADATA winsockData;
5434
5435 if (winsock_lib != NULL)
5436 return TRUE;
5437
5438 pfn_SetHandleInformation
5439 = (void *) GetProcAddress (GetModuleHandle ("kernel32.dll"),
5440 "SetHandleInformation");
5441
5442 winsock_lib = LoadLibrary ("Ws2_32.dll");
5443
5444 if (winsock_lib != NULL)
5445 {
5446 /* dynamically link to socket functions */
5447
5448 #define LOAD_PROC(fn) \
5449 if ((pfn_##fn = (void *) GetProcAddress (winsock_lib, #fn)) == NULL) \
5450 goto fail;
5451
5452 LOAD_PROC (WSAStartup);
5453 LOAD_PROC (WSASetLastError);
5454 LOAD_PROC (WSAGetLastError);
5455 LOAD_PROC (WSAEventSelect);
5456 LOAD_PROC (WSACreateEvent);
5457 LOAD_PROC (WSACloseEvent);
5458 LOAD_PROC (socket);
5459 LOAD_PROC (bind);
5460 LOAD_PROC (connect);
5461 LOAD_PROC (ioctlsocket);
5462 LOAD_PROC (recv);
5463 LOAD_PROC (send);
5464 LOAD_PROC (closesocket);
5465 LOAD_PROC (shutdown);
5466 LOAD_PROC (htons);
5467 LOAD_PROC (ntohs);
5468 LOAD_PROC (inet_addr);
5469 LOAD_PROC (gethostname);
5470 LOAD_PROC (gethostbyname);
5471 LOAD_PROC (getservbyname);
5472 LOAD_PROC (getpeername);
5473 LOAD_PROC (WSACleanup);
5474 LOAD_PROC (setsockopt);
5475 LOAD_PROC (listen);
5476 LOAD_PROC (getsockname);
5477 LOAD_PROC (accept);
5478 LOAD_PROC (recvfrom);
5479 LOAD_PROC (sendto);
5480 #undef LOAD_PROC
5481
5482 /* specify version 1.1 of winsock */
5483 if (pfn_WSAStartup (0x101, &winsockData) == 0)
5484 {
5485 if (winsockData.wVersion != 0x101)
5486 goto fail;
5487
5488 if (!load_now)
5489 {
5490 /* Report that winsock exists and is usable, but leave
5491 socket functions disabled. I am assuming that calling
5492 WSAStartup does not require any network interaction,
5493 and in particular does not cause or require a dial-up
5494 connection to be established. */
5495
5496 pfn_WSACleanup ();
5497 FreeLibrary (winsock_lib);
5498 winsock_lib = NULL;
5499 }
5500 winsock_inuse = 0;
5501 return TRUE;
5502 }
5503
5504 fail:
5505 FreeLibrary (winsock_lib);
5506 winsock_lib = NULL;
5507 }
5508
5509 return FALSE;
5510 }
5511
5512
5513 int h_errno = 0;
5514
5515 /* function to set h_errno for compatibility; map winsock error codes to
5516 normal system codes where they overlap (non-overlapping definitions
5517 are already in <sys/socket.h> */
5518 static void
5519 set_errno (void)
5520 {
5521 if (winsock_lib == NULL)
5522 h_errno = EINVAL;
5523 else
5524 h_errno = pfn_WSAGetLastError ();
5525
5526 switch (h_errno)
5527 {
5528 case WSAEACCES: h_errno = EACCES; break;
5529 case WSAEBADF: h_errno = EBADF; break;
5530 case WSAEFAULT: h_errno = EFAULT; break;
5531 case WSAEINTR: h_errno = EINTR; break;
5532 case WSAEINVAL: h_errno = EINVAL; break;
5533 case WSAEMFILE: h_errno = EMFILE; break;
5534 case WSAENAMETOOLONG: h_errno = ENAMETOOLONG; break;
5535 case WSAENOTEMPTY: h_errno = ENOTEMPTY; break;
5536 }
5537 errno = h_errno;
5538 }
5539
5540 static void
5541 check_errno (void)
5542 {
5543 if (h_errno == 0 && winsock_lib != NULL)
5544 pfn_WSASetLastError (0);
5545 }
5546
5547 /* Extend strerror to handle the winsock-specific error codes. */
5548 struct {
5549 int errnum;
5550 char * msg;
5551 } _wsa_errlist[] = {
5552 {WSAEINTR , "Interrupted function call"},
5553 {WSAEBADF , "Bad file descriptor"},
5554 {WSAEACCES , "Permission denied"},
5555 {WSAEFAULT , "Bad address"},
5556 {WSAEINVAL , "Invalid argument"},
5557 {WSAEMFILE , "Too many open files"},
5558
5559 {WSAEWOULDBLOCK , "Resource temporarily unavailable"},
5560 {WSAEINPROGRESS , "Operation now in progress"},
5561 {WSAEALREADY , "Operation already in progress"},
5562 {WSAENOTSOCK , "Socket operation on non-socket"},
5563 {WSAEDESTADDRREQ , "Destination address required"},
5564 {WSAEMSGSIZE , "Message too long"},
5565 {WSAEPROTOTYPE , "Protocol wrong type for socket"},
5566 {WSAENOPROTOOPT , "Bad protocol option"},
5567 {WSAEPROTONOSUPPORT , "Protocol not supported"},
5568 {WSAESOCKTNOSUPPORT , "Socket type not supported"},
5569 {WSAEOPNOTSUPP , "Operation not supported"},
5570 {WSAEPFNOSUPPORT , "Protocol family not supported"},
5571 {WSAEAFNOSUPPORT , "Address family not supported by protocol family"},
5572 {WSAEADDRINUSE , "Address already in use"},
5573 {WSAEADDRNOTAVAIL , "Cannot assign requested address"},
5574 {WSAENETDOWN , "Network is down"},
5575 {WSAENETUNREACH , "Network is unreachable"},
5576 {WSAENETRESET , "Network dropped connection on reset"},
5577 {WSAECONNABORTED , "Software caused connection abort"},
5578 {WSAECONNRESET , "Connection reset by peer"},
5579 {WSAENOBUFS , "No buffer space available"},
5580 {WSAEISCONN , "Socket is already connected"},
5581 {WSAENOTCONN , "Socket is not connected"},
5582 {WSAESHUTDOWN , "Cannot send after socket shutdown"},
5583 {WSAETOOMANYREFS , "Too many references"}, /* not sure */
5584 {WSAETIMEDOUT , "Connection timed out"},
5585 {WSAECONNREFUSED , "Connection refused"},
5586 {WSAELOOP , "Network loop"}, /* not sure */
5587 {WSAENAMETOOLONG , "Name is too long"},
5588 {WSAEHOSTDOWN , "Host is down"},
5589 {WSAEHOSTUNREACH , "No route to host"},
5590 {WSAENOTEMPTY , "Buffer not empty"}, /* not sure */
5591 {WSAEPROCLIM , "Too many processes"},
5592 {WSAEUSERS , "Too many users"}, /* not sure */
5593 {WSAEDQUOT , "Double quote in host name"}, /* really not sure */
5594 {WSAESTALE , "Data is stale"}, /* not sure */
5595 {WSAEREMOTE , "Remote error"}, /* not sure */
5596
5597 {WSASYSNOTREADY , "Network subsystem is unavailable"},
5598 {WSAVERNOTSUPPORTED , "WINSOCK.DLL version out of range"},
5599 {WSANOTINITIALISED , "Winsock not initialized successfully"},
5600 {WSAEDISCON , "Graceful shutdown in progress"},
5601 #ifdef WSAENOMORE
5602 {WSAENOMORE , "No more operations allowed"}, /* not sure */
5603 {WSAECANCELLED , "Operation cancelled"}, /* not sure */
5604 {WSAEINVALIDPROCTABLE , "Invalid procedure table from service provider"},
5605 {WSAEINVALIDPROVIDER , "Invalid service provider version number"},
5606 {WSAEPROVIDERFAILEDINIT , "Unable to initialize a service provider"},
5607 {WSASYSCALLFAILURE , "System call failure"},
5608 {WSASERVICE_NOT_FOUND , "Service not found"}, /* not sure */
5609 {WSATYPE_NOT_FOUND , "Class type not found"},
5610 {WSA_E_NO_MORE , "No more resources available"}, /* really not sure */
5611 {WSA_E_CANCELLED , "Operation already cancelled"}, /* really not sure */
5612 {WSAEREFUSED , "Operation refused"}, /* not sure */
5613 #endif
5614
5615 {WSAHOST_NOT_FOUND , "Host not found"},
5616 {WSATRY_AGAIN , "Authoritative host not found during name lookup"},
5617 {WSANO_RECOVERY , "Non-recoverable error during name lookup"},
5618 {WSANO_DATA , "Valid name, no data record of requested type"},
5619
5620 {-1, NULL}
5621 };
5622
5623 char *
5624 sys_strerror (int error_no)
5625 {
5626 int i;
5627 static char unknown_msg[40];
5628
5629 if (error_no >= 0 && error_no < sys_nerr)
5630 return sys_errlist[error_no];
5631
5632 for (i = 0; _wsa_errlist[i].errnum >= 0; i++)
5633 if (_wsa_errlist[i].errnum == error_no)
5634 return _wsa_errlist[i].msg;
5635
5636 sprintf (unknown_msg, "Unidentified error: %d", error_no);
5637 return unknown_msg;
5638 }
5639
5640 /* [andrewi 3-May-96] I've had conflicting results using both methods,
5641 but I believe the method of keeping the socket handle separate (and
5642 insuring it is not inheritable) is the correct one. */
5643
5644 #define SOCK_HANDLE(fd) ((SOCKET) fd_info[fd].hnd)
5645
5646 static int socket_to_fd (SOCKET s);
5647
5648 int
5649 sys_socket (int af, int type, int protocol)
5650 {
5651 SOCKET s;
5652
5653 if (winsock_lib == NULL)
5654 {
5655 h_errno = ENETDOWN;
5656 return INVALID_SOCKET;
5657 }
5658
5659 check_errno ();
5660
5661 /* call the real socket function */
5662 s = pfn_socket (af, type, protocol);
5663
5664 if (s != INVALID_SOCKET)
5665 return socket_to_fd (s);
5666
5667 set_errno ();
5668 return -1;
5669 }
5670
5671 /* Convert a SOCKET to a file descriptor. */
5672 static int
5673 socket_to_fd (SOCKET s)
5674 {
5675 int fd;
5676 child_process * cp;
5677
5678 /* Although under NT 3.5 _open_osfhandle will accept a socket
5679 handle, if opened with SO_OPENTYPE == SO_SYNCHRONOUS_NONALERT,
5680 that does not work under NT 3.1. However, we can get the same
5681 effect by using a backdoor function to replace an existing
5682 descriptor handle with the one we want. */
5683
5684 /* allocate a file descriptor (with appropriate flags) */
5685 fd = _open ("NUL:", _O_RDWR);
5686 if (fd >= 0)
5687 {
5688 /* Make a non-inheritable copy of the socket handle. Note
5689 that it is possible that sockets aren't actually kernel
5690 handles, which appears to be the case on Windows 9x when
5691 the MS Proxy winsock client is installed. */
5692 {
5693 /* Apparently there is a bug in NT 3.51 with some service
5694 packs, which prevents using DuplicateHandle to make a
5695 socket handle non-inheritable (causes WSACleanup to
5696 hang). The work-around is to use SetHandleInformation
5697 instead if it is available and implemented. */
5698 if (pfn_SetHandleInformation)
5699 {
5700 pfn_SetHandleInformation ((HANDLE) s, HANDLE_FLAG_INHERIT, 0);
5701 }
5702 else
5703 {
5704 HANDLE parent = GetCurrentProcess ();
5705 HANDLE new_s = INVALID_HANDLE_VALUE;
5706
5707 if (DuplicateHandle (parent,
5708 (HANDLE) s,
5709 parent,
5710 &new_s,
5711 0,
5712 FALSE,
5713 DUPLICATE_SAME_ACCESS))
5714 {
5715 /* It is possible that DuplicateHandle succeeds even
5716 though the socket wasn't really a kernel handle,
5717 because a real handle has the same value. So
5718 test whether the new handle really is a socket. */
5719 long nonblocking = 0;
5720 if (pfn_ioctlsocket ((SOCKET) new_s, FIONBIO, &nonblocking) == 0)
5721 {
5722 pfn_closesocket (s);
5723 s = (SOCKET) new_s;
5724 }
5725 else
5726 {
5727 CloseHandle (new_s);
5728 }
5729 }
5730 }
5731 }
5732 fd_info[fd].hnd = (HANDLE) s;
5733
5734 /* set our own internal flags */
5735 fd_info[fd].flags = FILE_SOCKET | FILE_BINARY | FILE_READ | FILE_WRITE;
5736
5737 cp = new_child ();
5738 if (cp)
5739 {
5740 cp->fd = fd;
5741 cp->status = STATUS_READ_ACKNOWLEDGED;
5742
5743 /* attach child_process to fd_info */
5744 if (fd_info[ fd ].cp != NULL)
5745 {
5746 DebPrint (("sys_socket: fd_info[%d] apparently in use!\n", fd));
5747 emacs_abort ();
5748 }
5749
5750 fd_info[ fd ].cp = cp;
5751
5752 /* success! */
5753 winsock_inuse++; /* count open sockets */
5754 return fd;
5755 }
5756
5757 /* clean up */
5758 _close (fd);
5759 }
5760 pfn_closesocket (s);
5761 h_errno = EMFILE;
5762 return -1;
5763 }
5764
5765 int
5766 sys_bind (int s, const struct sockaddr * addr, int namelen)
5767 {
5768 if (winsock_lib == NULL)
5769 {
5770 h_errno = ENOTSOCK;
5771 return SOCKET_ERROR;
5772 }
5773
5774 check_errno ();
5775 if (fd_info[s].flags & FILE_SOCKET)
5776 {
5777 int rc = pfn_bind (SOCK_HANDLE (s), addr, namelen);
5778 if (rc == SOCKET_ERROR)
5779 set_errno ();
5780 return rc;
5781 }
5782 h_errno = ENOTSOCK;
5783 return SOCKET_ERROR;
5784 }
5785
5786 int
5787 sys_connect (int s, const struct sockaddr * name, int namelen)
5788 {
5789 if (winsock_lib == NULL)
5790 {
5791 h_errno = ENOTSOCK;
5792 return SOCKET_ERROR;
5793 }
5794
5795 check_errno ();
5796 if (fd_info[s].flags & FILE_SOCKET)
5797 {
5798 int rc = pfn_connect (SOCK_HANDLE (s), name, namelen);
5799 if (rc == SOCKET_ERROR)
5800 set_errno ();
5801 return rc;
5802 }
5803 h_errno = ENOTSOCK;
5804 return SOCKET_ERROR;
5805 }
5806
5807 u_short
5808 sys_htons (u_short hostshort)
5809 {
5810 return (winsock_lib != NULL) ?
5811 pfn_htons (hostshort) : hostshort;
5812 }
5813
5814 u_short
5815 sys_ntohs (u_short netshort)
5816 {
5817 return (winsock_lib != NULL) ?
5818 pfn_ntohs (netshort) : netshort;
5819 }
5820
5821 unsigned long
5822 sys_inet_addr (const char * cp)
5823 {
5824 return (winsock_lib != NULL) ?
5825 pfn_inet_addr (cp) : INADDR_NONE;
5826 }
5827
5828 int
5829 sys_gethostname (char * name, int namelen)
5830 {
5831 if (winsock_lib != NULL)
5832 return pfn_gethostname (name, namelen);
5833
5834 if (namelen > MAX_COMPUTERNAME_LENGTH)
5835 return !GetComputerName (name, (DWORD *)&namelen);
5836
5837 h_errno = EFAULT;
5838 return SOCKET_ERROR;
5839 }
5840
5841 struct hostent *
5842 sys_gethostbyname (const char * name)
5843 {
5844 struct hostent * host;
5845
5846 if (winsock_lib == NULL)
5847 {
5848 h_errno = ENETDOWN;
5849 return NULL;
5850 }
5851
5852 check_errno ();
5853 host = pfn_gethostbyname (name);
5854 if (!host)
5855 set_errno ();
5856 return host;
5857 }
5858
5859 struct servent *
5860 sys_getservbyname (const char * name, const char * proto)
5861 {
5862 struct servent * serv;
5863
5864 if (winsock_lib == NULL)
5865 {
5866 h_errno = ENETDOWN;
5867 return NULL;
5868 }
5869
5870 check_errno ();
5871 serv = pfn_getservbyname (name, proto);
5872 if (!serv)
5873 set_errno ();
5874 return serv;
5875 }
5876
5877 int
5878 sys_getpeername (int s, struct sockaddr *addr, int * namelen)
5879 {
5880 if (winsock_lib == NULL)
5881 {
5882 h_errno = ENETDOWN;
5883 return SOCKET_ERROR;
5884 }
5885
5886 check_errno ();
5887 if (fd_info[s].flags & FILE_SOCKET)
5888 {
5889 int rc = pfn_getpeername (SOCK_HANDLE (s), addr, namelen);
5890 if (rc == SOCKET_ERROR)
5891 set_errno ();
5892 return rc;
5893 }
5894 h_errno = ENOTSOCK;
5895 return SOCKET_ERROR;
5896 }
5897
5898 int
5899 sys_shutdown (int s, int how)
5900 {
5901 if (winsock_lib == NULL)
5902 {
5903 h_errno = ENETDOWN;
5904 return SOCKET_ERROR;
5905 }
5906
5907 check_errno ();
5908 if (fd_info[s].flags & FILE_SOCKET)
5909 {
5910 int rc = pfn_shutdown (SOCK_HANDLE (s), how);
5911 if (rc == SOCKET_ERROR)
5912 set_errno ();
5913 return rc;
5914 }
5915 h_errno = ENOTSOCK;
5916 return SOCKET_ERROR;
5917 }
5918
5919 int
5920 sys_setsockopt (int s, int level, int optname, const void * optval, int optlen)
5921 {
5922 if (winsock_lib == NULL)
5923 {
5924 h_errno = ENETDOWN;
5925 return SOCKET_ERROR;
5926 }
5927
5928 check_errno ();
5929 if (fd_info[s].flags & FILE_SOCKET)
5930 {
5931 int rc = pfn_setsockopt (SOCK_HANDLE (s), level, optname,
5932 (const char *)optval, optlen);
5933 if (rc == SOCKET_ERROR)
5934 set_errno ();
5935 return rc;
5936 }
5937 h_errno = ENOTSOCK;
5938 return SOCKET_ERROR;
5939 }
5940
5941 int
5942 sys_listen (int s, int backlog)
5943 {
5944 if (winsock_lib == NULL)
5945 {
5946 h_errno = ENETDOWN;
5947 return SOCKET_ERROR;
5948 }
5949
5950 check_errno ();
5951 if (fd_info[s].flags & FILE_SOCKET)
5952 {
5953 int rc = pfn_listen (SOCK_HANDLE (s), backlog);
5954 if (rc == SOCKET_ERROR)
5955 set_errno ();
5956 else
5957 fd_info[s].flags |= FILE_LISTEN;
5958 return rc;
5959 }
5960 h_errno = ENOTSOCK;
5961 return SOCKET_ERROR;
5962 }
5963
5964 int
5965 sys_getsockname (int s, struct sockaddr * name, int * namelen)
5966 {
5967 if (winsock_lib == NULL)
5968 {
5969 h_errno = ENETDOWN;
5970 return SOCKET_ERROR;
5971 }
5972
5973 check_errno ();
5974 if (fd_info[s].flags & FILE_SOCKET)
5975 {
5976 int rc = pfn_getsockname (SOCK_HANDLE (s), name, namelen);
5977 if (rc == SOCKET_ERROR)
5978 set_errno ();
5979 return rc;
5980 }
5981 h_errno = ENOTSOCK;
5982 return SOCKET_ERROR;
5983 }
5984
5985 int
5986 sys_accept (int s, struct sockaddr * addr, int * addrlen)
5987 {
5988 if (winsock_lib == NULL)
5989 {
5990 h_errno = ENETDOWN;
5991 return -1;
5992 }
5993
5994 check_errno ();
5995 if (fd_info[s].flags & FILE_LISTEN)
5996 {
5997 SOCKET t = pfn_accept (SOCK_HANDLE (s), addr, addrlen);
5998 int fd = -1;
5999 if (t == INVALID_SOCKET)
6000 set_errno ();
6001 else
6002 fd = socket_to_fd (t);
6003
6004 fd_info[s].cp->status = STATUS_READ_ACKNOWLEDGED;
6005 ResetEvent (fd_info[s].cp->char_avail);
6006 return fd;
6007 }
6008 h_errno = ENOTSOCK;
6009 return -1;
6010 }
6011
6012 int
6013 sys_recvfrom (int s, char * buf, int len, int flags,
6014 struct sockaddr * from, int * fromlen)
6015 {
6016 if (winsock_lib == NULL)
6017 {
6018 h_errno = ENETDOWN;
6019 return SOCKET_ERROR;
6020 }
6021
6022 check_errno ();
6023 if (fd_info[s].flags & FILE_SOCKET)
6024 {
6025 int rc = pfn_recvfrom (SOCK_HANDLE (s), buf, len, flags, from, fromlen);
6026 if (rc == SOCKET_ERROR)
6027 set_errno ();
6028 return rc;
6029 }
6030 h_errno = ENOTSOCK;
6031 return SOCKET_ERROR;
6032 }
6033
6034 int
6035 sys_sendto (int s, const char * buf, int len, int flags,
6036 const struct sockaddr * to, int tolen)
6037 {
6038 if (winsock_lib == NULL)
6039 {
6040 h_errno = ENETDOWN;
6041 return SOCKET_ERROR;
6042 }
6043
6044 check_errno ();
6045 if (fd_info[s].flags & FILE_SOCKET)
6046 {
6047 int rc = pfn_sendto (SOCK_HANDLE (s), buf, len, flags, to, tolen);
6048 if (rc == SOCKET_ERROR)
6049 set_errno ();
6050 return rc;
6051 }
6052 h_errno = ENOTSOCK;
6053 return SOCKET_ERROR;
6054 }
6055
6056 /* Windows does not have an fcntl function. Provide an implementation
6057 solely for making sockets non-blocking. */
6058 int
6059 fcntl (int s, int cmd, int options)
6060 {
6061 if (winsock_lib == NULL)
6062 {
6063 h_errno = ENETDOWN;
6064 return -1;
6065 }
6066
6067 check_errno ();
6068 if (fd_info[s].flags & FILE_SOCKET)
6069 {
6070 if (cmd == F_SETFL && options == O_NDELAY)
6071 {
6072 unsigned long nblock = 1;
6073 int rc = pfn_ioctlsocket (SOCK_HANDLE (s), FIONBIO, &nblock);
6074 if (rc == SOCKET_ERROR)
6075 set_errno ();
6076 /* Keep track of the fact that we set this to non-blocking. */
6077 fd_info[s].flags |= FILE_NDELAY;
6078 return rc;
6079 }
6080 else
6081 {
6082 h_errno = EINVAL;
6083 return SOCKET_ERROR;
6084 }
6085 }
6086 h_errno = ENOTSOCK;
6087 return SOCKET_ERROR;
6088 }
6089
6090
6091 /* Shadow main io functions: we need to handle pipes and sockets more
6092 intelligently, and implement non-blocking mode as well. */
6093
6094 int
6095 sys_close (int fd)
6096 {
6097 int rc;
6098
6099 if (fd < 0)
6100 {
6101 errno = EBADF;
6102 return -1;
6103 }
6104
6105 if (fd < MAXDESC && fd_info[fd].cp)
6106 {
6107 child_process * cp = fd_info[fd].cp;
6108
6109 fd_info[fd].cp = NULL;
6110
6111 if (CHILD_ACTIVE (cp))
6112 {
6113 /* if last descriptor to active child_process then cleanup */
6114 int i;
6115 for (i = 0; i < MAXDESC; i++)
6116 {
6117 if (i == fd)
6118 continue;
6119 if (fd_info[i].cp == cp)
6120 break;
6121 }
6122 if (i == MAXDESC)
6123 {
6124 if (fd_info[fd].flags & FILE_SOCKET)
6125 {
6126 if (winsock_lib == NULL) emacs_abort ();
6127
6128 pfn_shutdown (SOCK_HANDLE (fd), 2);
6129 rc = pfn_closesocket (SOCK_HANDLE (fd));
6130
6131 winsock_inuse--; /* count open sockets */
6132 }
6133 delete_child (cp);
6134 }
6135 }
6136 }
6137
6138 /* Note that sockets do not need special treatment here (at least on
6139 NT and Windows 95 using the standard tcp/ip stacks) - it appears that
6140 closesocket is equivalent to CloseHandle, which is to be expected
6141 because socket handles are fully fledged kernel handles. */
6142 rc = _close (fd);
6143
6144 if (rc == 0 && fd < MAXDESC)
6145 fd_info[fd].flags = 0;
6146
6147 return rc;
6148 }
6149
6150 int
6151 sys_dup (int fd)
6152 {
6153 int new_fd;
6154
6155 new_fd = _dup (fd);
6156 if (new_fd >= 0 && new_fd < MAXDESC)
6157 {
6158 /* duplicate our internal info as well */
6159 fd_info[new_fd] = fd_info[fd];
6160 }
6161 return new_fd;
6162 }
6163
6164 int
6165 sys_dup2 (int src, int dst)
6166 {
6167 int rc;
6168
6169 if (dst < 0 || dst >= MAXDESC)
6170 {
6171 errno = EBADF;
6172 return -1;
6173 }
6174
6175 /* make sure we close the destination first if it's a pipe or socket */
6176 if (src != dst && fd_info[dst].flags != 0)
6177 sys_close (dst);
6178
6179 rc = _dup2 (src, dst);
6180 if (rc == 0)
6181 {
6182 /* duplicate our internal info as well */
6183 fd_info[dst] = fd_info[src];
6184 }
6185 return rc;
6186 }
6187
6188 /* Unix pipe() has only one arg */
6189 int
6190 sys_pipe (int * phandles)
6191 {
6192 int rc;
6193 unsigned flags;
6194
6195 /* make pipe handles non-inheritable; when we spawn a child, we
6196 replace the relevant handle with an inheritable one. Also put
6197 pipes into binary mode; we will do text mode translation ourselves
6198 if required. */
6199 rc = _pipe (phandles, 0, _O_NOINHERIT | _O_BINARY);
6200
6201 if (rc == 0)
6202 {
6203 /* Protect against overflow, since Windows can open more handles than
6204 our fd_info array has room for. */
6205 if (phandles[0] >= MAXDESC || phandles[1] >= MAXDESC)
6206 {
6207 _close (phandles[0]);
6208 _close (phandles[1]);
6209 rc = -1;
6210 }
6211 else
6212 {
6213 flags = FILE_PIPE | FILE_READ | FILE_BINARY;
6214 fd_info[phandles[0]].flags = flags;
6215
6216 flags = FILE_PIPE | FILE_WRITE | FILE_BINARY;
6217 fd_info[phandles[1]].flags = flags;
6218 }
6219 }
6220
6221 return rc;
6222 }
6223
6224 /* Function to do blocking read of one byte, needed to implement
6225 select. It is only allowed on sockets and pipes. */
6226 int
6227 _sys_read_ahead (int fd)
6228 {
6229 child_process * cp;
6230 int rc;
6231
6232 if (fd < 0 || fd >= MAXDESC)
6233 return STATUS_READ_ERROR;
6234
6235 cp = fd_info[fd].cp;
6236
6237 if (cp == NULL || cp->fd != fd || cp->status != STATUS_READ_READY)
6238 return STATUS_READ_ERROR;
6239
6240 if ((fd_info[fd].flags & (FILE_PIPE | FILE_SERIAL | FILE_SOCKET)) == 0
6241 || (fd_info[fd].flags & FILE_READ) == 0)
6242 {
6243 DebPrint (("_sys_read_ahead: internal error: fd %d is not a pipe, serial port, or socket!\n", fd));
6244 emacs_abort ();
6245 }
6246
6247 cp->status = STATUS_READ_IN_PROGRESS;
6248
6249 if (fd_info[fd].flags & FILE_PIPE)
6250 {
6251 rc = _read (fd, &cp->chr, sizeof (char));
6252
6253 /* Give subprocess time to buffer some more output for us before
6254 reporting that input is available; we need this because Windows 95
6255 connects DOS programs to pipes by making the pipe appear to be
6256 the normal console stdout - as a result most DOS programs will
6257 write to stdout without buffering, ie. one character at a
6258 time. Even some W32 programs do this - "dir" in a command
6259 shell on NT is very slow if we don't do this. */
6260 if (rc > 0)
6261 {
6262 int wait = w32_pipe_read_delay;
6263
6264 if (wait > 0)
6265 Sleep (wait);
6266 else if (wait < 0)
6267 while (++wait <= 0)
6268 /* Yield remainder of our time slice, effectively giving a
6269 temporary priority boost to the child process. */
6270 Sleep (0);
6271 }
6272 }
6273 else if (fd_info[fd].flags & FILE_SERIAL)
6274 {
6275 HANDLE hnd = fd_info[fd].hnd;
6276 OVERLAPPED *ovl = &fd_info[fd].cp->ovl_read;
6277 COMMTIMEOUTS ct;
6278
6279 /* Configure timeouts for blocking read. */
6280 if (!GetCommTimeouts (hnd, &ct))
6281 return STATUS_READ_ERROR;
6282 ct.ReadIntervalTimeout = 0;
6283 ct.ReadTotalTimeoutMultiplier = 0;
6284 ct.ReadTotalTimeoutConstant = 0;
6285 if (!SetCommTimeouts (hnd, &ct))
6286 return STATUS_READ_ERROR;
6287
6288 if (!ReadFile (hnd, &cp->chr, sizeof (char), (DWORD*) &rc, ovl))
6289 {
6290 if (GetLastError () != ERROR_IO_PENDING)
6291 return STATUS_READ_ERROR;
6292 if (!GetOverlappedResult (hnd, ovl, (DWORD*) &rc, TRUE))
6293 return STATUS_READ_ERROR;
6294 }
6295 }
6296 else if (fd_info[fd].flags & FILE_SOCKET)
6297 {
6298 unsigned long nblock = 0;
6299 /* We always want this to block, so temporarily disable NDELAY. */
6300 if (fd_info[fd].flags & FILE_NDELAY)
6301 pfn_ioctlsocket (SOCK_HANDLE (fd), FIONBIO, &nblock);
6302
6303 rc = pfn_recv (SOCK_HANDLE (fd), &cp->chr, sizeof (char), 0);
6304
6305 if (fd_info[fd].flags & FILE_NDELAY)
6306 {
6307 nblock = 1;
6308 pfn_ioctlsocket (SOCK_HANDLE (fd), FIONBIO, &nblock);
6309 }
6310 }
6311
6312 if (rc == sizeof (char))
6313 cp->status = STATUS_READ_SUCCEEDED;
6314 else
6315 cp->status = STATUS_READ_FAILED;
6316
6317 return cp->status;
6318 }
6319
6320 int
6321 _sys_wait_accept (int fd)
6322 {
6323 HANDLE hEv;
6324 child_process * cp;
6325 int rc;
6326
6327 if (fd < 0 || fd >= MAXDESC)
6328 return STATUS_READ_ERROR;
6329
6330 cp = fd_info[fd].cp;
6331
6332 if (cp == NULL || cp->fd != fd || cp->status != STATUS_READ_READY)
6333 return STATUS_READ_ERROR;
6334
6335 cp->status = STATUS_READ_FAILED;
6336
6337 hEv = pfn_WSACreateEvent ();
6338 rc = pfn_WSAEventSelect (SOCK_HANDLE (fd), hEv, FD_ACCEPT);
6339 if (rc != SOCKET_ERROR)
6340 {
6341 rc = WaitForSingleObject (hEv, INFINITE);
6342 pfn_WSAEventSelect (SOCK_HANDLE (fd), NULL, 0);
6343 if (rc == WAIT_OBJECT_0)
6344 cp->status = STATUS_READ_SUCCEEDED;
6345 }
6346 pfn_WSACloseEvent (hEv);
6347
6348 return cp->status;
6349 }
6350
6351 int
6352 sys_read (int fd, char * buffer, unsigned int count)
6353 {
6354 int nchars;
6355 int to_read;
6356 DWORD waiting;
6357 char * orig_buffer = buffer;
6358
6359 if (fd < 0)
6360 {
6361 errno = EBADF;
6362 return -1;
6363 }
6364
6365 if (fd < MAXDESC && fd_info[fd].flags & (FILE_PIPE | FILE_SOCKET | FILE_SERIAL))
6366 {
6367 child_process *cp = fd_info[fd].cp;
6368
6369 if ((fd_info[fd].flags & FILE_READ) == 0)
6370 {
6371 errno = EBADF;
6372 return -1;
6373 }
6374
6375 nchars = 0;
6376
6377 /* re-read CR carried over from last read */
6378 if (fd_info[fd].flags & FILE_LAST_CR)
6379 {
6380 if (fd_info[fd].flags & FILE_BINARY) emacs_abort ();
6381 *buffer++ = 0x0d;
6382 count--;
6383 nchars++;
6384 fd_info[fd].flags &= ~FILE_LAST_CR;
6385 }
6386
6387 /* presence of a child_process structure means we are operating in
6388 non-blocking mode - otherwise we just call _read directly.
6389 Note that the child_process structure might be missing because
6390 reap_subprocess has been called; in this case the pipe is
6391 already broken, so calling _read on it is okay. */
6392 if (cp)
6393 {
6394 int current_status = cp->status;
6395
6396 switch (current_status)
6397 {
6398 case STATUS_READ_FAILED:
6399 case STATUS_READ_ERROR:
6400 /* report normal EOF if nothing in buffer */
6401 if (nchars <= 0)
6402 fd_info[fd].flags |= FILE_AT_EOF;
6403 return nchars;
6404
6405 case STATUS_READ_READY:
6406 case STATUS_READ_IN_PROGRESS:
6407 DebPrint (("sys_read called when read is in progress\n"));
6408 errno = EWOULDBLOCK;
6409 return -1;
6410
6411 case STATUS_READ_SUCCEEDED:
6412 /* consume read-ahead char */
6413 *buffer++ = cp->chr;
6414 count--;
6415 nchars++;
6416 cp->status = STATUS_READ_ACKNOWLEDGED;
6417 ResetEvent (cp->char_avail);
6418
6419 case STATUS_READ_ACKNOWLEDGED:
6420 break;
6421
6422 default:
6423 DebPrint (("sys_read: bad status %d\n", current_status));
6424 errno = EBADF;
6425 return -1;
6426 }
6427
6428 if (fd_info[fd].flags & FILE_PIPE)
6429 {
6430 PeekNamedPipe ((HANDLE) _get_osfhandle (fd), NULL, 0, NULL, &waiting, NULL);
6431 to_read = min (waiting, (DWORD) count);
6432
6433 if (to_read > 0)
6434 nchars += _read (fd, buffer, to_read);
6435 }
6436 else if (fd_info[fd].flags & FILE_SERIAL)
6437 {
6438 HANDLE hnd = fd_info[fd].hnd;
6439 OVERLAPPED *ovl = &fd_info[fd].cp->ovl_read;
6440 int rc = 0;
6441 COMMTIMEOUTS ct;
6442
6443 if (count > 0)
6444 {
6445 /* Configure timeouts for non-blocking read. */
6446 if (!GetCommTimeouts (hnd, &ct))
6447 {
6448 errno = EIO;
6449 return -1;
6450 }
6451 ct.ReadIntervalTimeout = MAXDWORD;
6452 ct.ReadTotalTimeoutMultiplier = 0;
6453 ct.ReadTotalTimeoutConstant = 0;
6454 if (!SetCommTimeouts (hnd, &ct))
6455 {
6456 errno = EIO;
6457 return -1;
6458 }
6459
6460 if (!ResetEvent (ovl->hEvent))
6461 {
6462 errno = EIO;
6463 return -1;
6464 }
6465 if (!ReadFile (hnd, buffer, count, (DWORD*) &rc, ovl))
6466 {
6467 if (GetLastError () != ERROR_IO_PENDING)
6468 {
6469 errno = EIO;
6470 return -1;
6471 }
6472 if (!GetOverlappedResult (hnd, ovl, (DWORD*) &rc, TRUE))
6473 {
6474 errno = EIO;
6475 return -1;
6476 }
6477 }
6478 nchars += rc;
6479 }
6480 }
6481 else /* FILE_SOCKET */
6482 {
6483 if (winsock_lib == NULL) emacs_abort ();
6484
6485 /* do the equivalent of a non-blocking read */
6486 pfn_ioctlsocket (SOCK_HANDLE (fd), FIONREAD, &waiting);
6487 if (waiting == 0 && nchars == 0)
6488 {
6489 h_errno = errno = EWOULDBLOCK;
6490 return -1;
6491 }
6492
6493 if (waiting)
6494 {
6495 /* always use binary mode for sockets */
6496 int res = pfn_recv (SOCK_HANDLE (fd), buffer, count, 0);
6497 if (res == SOCKET_ERROR)
6498 {
6499 DebPrint (("sys_read.recv failed with error %d on socket %ld\n",
6500 pfn_WSAGetLastError (), SOCK_HANDLE (fd)));
6501 set_errno ();
6502 return -1;
6503 }
6504 nchars += res;
6505 }
6506 }
6507 }
6508 else
6509 {
6510 int nread = _read (fd, buffer, count);
6511 if (nread >= 0)
6512 nchars += nread;
6513 else if (nchars == 0)
6514 nchars = nread;
6515 }
6516
6517 if (nchars <= 0)
6518 fd_info[fd].flags |= FILE_AT_EOF;
6519 /* Perform text mode translation if required. */
6520 else if ((fd_info[fd].flags & FILE_BINARY) == 0)
6521 {
6522 nchars = crlf_to_lf (nchars, orig_buffer);
6523 /* If buffer contains only CR, return that. To be absolutely
6524 sure we should attempt to read the next char, but in
6525 practice a CR to be followed by LF would not appear by
6526 itself in the buffer. */
6527 if (nchars > 1 && orig_buffer[nchars - 1] == 0x0d)
6528 {
6529 fd_info[fd].flags |= FILE_LAST_CR;
6530 nchars--;
6531 }
6532 }
6533 }
6534 else
6535 nchars = _read (fd, buffer, count);
6536
6537 return nchars;
6538 }
6539
6540 /* From w32xfns.c */
6541 extern HANDLE interrupt_handle;
6542
6543 /* For now, don't bother with a non-blocking mode */
6544 int
6545 sys_write (int fd, const void * buffer, unsigned int count)
6546 {
6547 int nchars;
6548
6549 if (fd < 0)
6550 {
6551 errno = EBADF;
6552 return -1;
6553 }
6554
6555 if (fd < MAXDESC && fd_info[fd].flags & (FILE_PIPE | FILE_SOCKET | FILE_SERIAL))
6556 {
6557 if ((fd_info[fd].flags & FILE_WRITE) == 0)
6558 {
6559 errno = EBADF;
6560 return -1;
6561 }
6562
6563 /* Perform text mode translation if required. */
6564 if ((fd_info[fd].flags & FILE_BINARY) == 0)
6565 {
6566 char * tmpbuf = alloca (count * 2);
6567 unsigned char * src = (void *)buffer;
6568 unsigned char * dst = tmpbuf;
6569 int nbytes = count;
6570
6571 while (1)
6572 {
6573 unsigned char *next;
6574 /* copy next line or remaining bytes */
6575 next = _memccpy (dst, src, '\n', nbytes);
6576 if (next)
6577 {
6578 /* copied one line ending with '\n' */
6579 int copied = next - dst;
6580 nbytes -= copied;
6581 src += copied;
6582 /* insert '\r' before '\n' */
6583 next[-1] = '\r';
6584 next[0] = '\n';
6585 dst = next + 1;
6586 count++;
6587 }
6588 else
6589 /* copied remaining partial line -> now finished */
6590 break;
6591 }
6592 buffer = tmpbuf;
6593 }
6594 }
6595
6596 if (fd < MAXDESC && fd_info[fd].flags & FILE_SERIAL)
6597 {
6598 HANDLE hnd = (HANDLE) _get_osfhandle (fd);
6599 OVERLAPPED *ovl = &fd_info[fd].cp->ovl_write;
6600 HANDLE wait_hnd[2] = { interrupt_handle, ovl->hEvent };
6601 DWORD active = 0;
6602
6603 if (!WriteFile (hnd, buffer, count, (DWORD*) &nchars, ovl))
6604 {
6605 if (GetLastError () != ERROR_IO_PENDING)
6606 {
6607 errno = EIO;
6608 return -1;
6609 }
6610 if (detect_input_pending ())
6611 active = MsgWaitForMultipleObjects (2, wait_hnd, FALSE, INFINITE,
6612 QS_ALLINPUT);
6613 else
6614 active = WaitForMultipleObjects (2, wait_hnd, FALSE, INFINITE);
6615 if (active == WAIT_OBJECT_0)
6616 { /* User pressed C-g, cancel write, then leave. Don't bother
6617 cleaning up as we may only get stuck in buggy drivers. */
6618 PurgeComm (hnd, PURGE_TXABORT | PURGE_TXCLEAR);
6619 CancelIo (hnd);
6620 errno = EIO;
6621 return -1;
6622 }
6623 if (active == WAIT_OBJECT_0 + 1
6624 && !GetOverlappedResult (hnd, ovl, (DWORD*) &nchars, TRUE))
6625 {
6626 errno = EIO;
6627 return -1;
6628 }
6629 }
6630 }
6631 else if (fd < MAXDESC && fd_info[fd].flags & FILE_SOCKET)
6632 {
6633 unsigned long nblock = 0;
6634 if (winsock_lib == NULL) emacs_abort ();
6635
6636 /* TODO: implement select() properly so non-blocking I/O works. */
6637 /* For now, make sure the write blocks. */
6638 if (fd_info[fd].flags & FILE_NDELAY)
6639 pfn_ioctlsocket (SOCK_HANDLE (fd), FIONBIO, &nblock);
6640
6641 nchars = pfn_send (SOCK_HANDLE (fd), buffer, count, 0);
6642
6643 /* Set the socket back to non-blocking if it was before,
6644 for other operations that support it. */
6645 if (fd_info[fd].flags & FILE_NDELAY)
6646 {
6647 nblock = 1;
6648 pfn_ioctlsocket (SOCK_HANDLE (fd), FIONBIO, &nblock);
6649 }
6650
6651 if (nchars == SOCKET_ERROR)
6652 {
6653 DebPrint (("sys_write.send failed with error %d on socket %ld\n",
6654 pfn_WSAGetLastError (), SOCK_HANDLE (fd)));
6655 set_errno ();
6656 }
6657 }
6658 else
6659 {
6660 /* Some networked filesystems don't like too large writes, so
6661 break them into smaller chunks. See the Comments section of
6662 the MSDN documentation of WriteFile for details behind the
6663 choice of the value of CHUNK below. See also the thread
6664 http://thread.gmane.org/gmane.comp.version-control.git/145294
6665 in the git mailing list. */
6666 const unsigned char *p = buffer;
6667 const unsigned chunk = 30 * 1024 * 1024;
6668
6669 nchars = 0;
6670 while (count > 0)
6671 {
6672 unsigned this_chunk = count < chunk ? count : chunk;
6673 int n = _write (fd, p, this_chunk);
6674
6675 nchars += n;
6676 if (n < 0)
6677 {
6678 nchars = n;
6679 break;
6680 }
6681 else if (n < this_chunk)
6682 break;
6683 count -= n;
6684 p += n;
6685 }
6686 }
6687
6688 return nchars;
6689 }
6690
6691 /* The Windows CRT functions are "optimized for speed", so they don't
6692 check for timezone and DST changes if they were last called less
6693 than 1 minute ago (see http://support.microsoft.com/kb/821231). So
6694 all Emacs features that repeatedly call time functions (e.g.,
6695 display-time) are in real danger of missing timezone and DST
6696 changes. Calling tzset before each localtime call fixes that. */
6697 struct tm *
6698 sys_localtime (const time_t *t)
6699 {
6700 tzset ();
6701 return localtime (t);
6702 }
6703
6704
6705 \f
6706 /* Try loading LIBRARY_ID from the file(s) specified in
6707 Vdynamic_library_alist. If the library is loaded successfully,
6708 return the handle of the DLL, and record the filename in the
6709 property :loaded-from of LIBRARY_ID. If the library could not be
6710 found, or when it was already loaded (because the handle is not
6711 recorded anywhere, and so is lost after use), return NULL.
6712
6713 We could also save the handle in :loaded-from, but currently
6714 there's no use case for it. */
6715 HMODULE
6716 w32_delayed_load (Lisp_Object library_id)
6717 {
6718 HMODULE library_dll = NULL;
6719
6720 CHECK_SYMBOL (library_id);
6721
6722 if (CONSP (Vdynamic_library_alist)
6723 && NILP (Fassq (library_id, Vlibrary_cache)))
6724 {
6725 Lisp_Object found = Qnil;
6726 Lisp_Object dlls = Fassq (library_id, Vdynamic_library_alist);
6727
6728 if (CONSP (dlls))
6729 for (dlls = XCDR (dlls); CONSP (dlls); dlls = XCDR (dlls))
6730 {
6731 CHECK_STRING_CAR (dlls);
6732 if ((library_dll = LoadLibrary (SDATA (XCAR (dlls)))))
6733 {
6734 char name[MAX_PATH];
6735 DWORD len;
6736
6737 len = GetModuleFileNameA (library_dll, name, sizeof (name));
6738 found = Fcons (XCAR (dlls),
6739 (len > 0)
6740 /* Possibly truncated */
6741 ? make_specified_string (name, -1, len, 1)
6742 : Qnil);
6743 break;
6744 }
6745 }
6746
6747 Fput (library_id, QCloaded_from, found);
6748 }
6749
6750 return library_dll;
6751 }
6752
6753 \f
6754 void
6755 check_windows_init_file (void)
6756 {
6757 /* A common indication that Emacs is not installed properly is when
6758 it cannot find the Windows installation file. If this file does
6759 not exist in the expected place, tell the user. */
6760
6761 if (!noninteractive && !inhibit_window_system
6762 /* Vload_path is not yet initialized when we are loading
6763 loadup.el. */
6764 && NILP (Vpurify_flag))
6765 {
6766 Lisp_Object init_file;
6767 int fd;
6768
6769 init_file = build_string ("term/w32-win");
6770 fd = openp (Vload_path, init_file, Fget_load_suffixes (), NULL, Qnil);
6771 if (fd < 0)
6772 {
6773 Lisp_Object load_path_print = Fprin1_to_string (Vload_path, Qnil);
6774 char *init_file_name = SDATA (init_file);
6775 char *load_path = SDATA (load_path_print);
6776 char *buffer = alloca (1024
6777 + strlen (init_file_name)
6778 + strlen (load_path));
6779
6780 sprintf (buffer,
6781 "The Emacs Windows initialization file \"%s.el\" "
6782 "could not be found in your Emacs installation. "
6783 "Emacs checked the following directories for this file:\n"
6784 "\n%s\n\n"
6785 "When Emacs cannot find this file, it usually means that it "
6786 "was not installed properly, or its distribution file was "
6787 "not unpacked properly.\nSee the README.W32 file in the "
6788 "top-level Emacs directory for more information.",
6789 init_file_name, load_path);
6790 MessageBox (NULL,
6791 buffer,
6792 "Emacs Abort Dialog",
6793 MB_OK | MB_ICONEXCLAMATION | MB_TASKMODAL);
6794 /* Use the low-level system abort. */
6795 abort ();
6796 }
6797 else
6798 {
6799 _close (fd);
6800 }
6801 }
6802 }
6803
6804 void
6805 term_ntproc (int ignored)
6806 {
6807 (void)ignored;
6808
6809 term_timers ();
6810
6811 /* shutdown the socket interface if necessary */
6812 term_winsock ();
6813
6814 term_w32select ();
6815 }
6816
6817 void
6818 init_ntproc (int dumping)
6819 {
6820 sigset_t initial_mask = 0;
6821
6822 /* Initialize the socket interface now if available and requested by
6823 the user by defining PRELOAD_WINSOCK; otherwise loading will be
6824 delayed until open-network-stream is called (w32-has-winsock can
6825 also be used to dynamically load or reload winsock).
6826
6827 Conveniently, init_environment is called before us, so
6828 PRELOAD_WINSOCK can be set in the registry. */
6829
6830 /* Always initialize this correctly. */
6831 winsock_lib = NULL;
6832
6833 if (getenv ("PRELOAD_WINSOCK") != NULL)
6834 init_winsock (TRUE);
6835
6836 /* Initial preparation for subprocess support: replace our standard
6837 handles with non-inheritable versions. */
6838 {
6839 HANDLE parent;
6840 HANDLE stdin_save = INVALID_HANDLE_VALUE;
6841 HANDLE stdout_save = INVALID_HANDLE_VALUE;
6842 HANDLE stderr_save = INVALID_HANDLE_VALUE;
6843
6844 parent = GetCurrentProcess ();
6845
6846 /* ignore errors when duplicating and closing; typically the
6847 handles will be invalid when running as a gui program. */
6848 DuplicateHandle (parent,
6849 GetStdHandle (STD_INPUT_HANDLE),
6850 parent,
6851 &stdin_save,
6852 0,
6853 FALSE,
6854 DUPLICATE_SAME_ACCESS);
6855
6856 DuplicateHandle (parent,
6857 GetStdHandle (STD_OUTPUT_HANDLE),
6858 parent,
6859 &stdout_save,
6860 0,
6861 FALSE,
6862 DUPLICATE_SAME_ACCESS);
6863
6864 DuplicateHandle (parent,
6865 GetStdHandle (STD_ERROR_HANDLE),
6866 parent,
6867 &stderr_save,
6868 0,
6869 FALSE,
6870 DUPLICATE_SAME_ACCESS);
6871
6872 fclose (stdin);
6873 fclose (stdout);
6874 fclose (stderr);
6875
6876 if (stdin_save != INVALID_HANDLE_VALUE)
6877 _open_osfhandle ((intptr_t) stdin_save, O_TEXT);
6878 else
6879 _open ("nul", O_TEXT | O_NOINHERIT | O_RDONLY);
6880 _fdopen (0, "r");
6881
6882 if (stdout_save != INVALID_HANDLE_VALUE)
6883 _open_osfhandle ((intptr_t) stdout_save, O_TEXT);
6884 else
6885 _open ("nul", O_TEXT | O_NOINHERIT | O_WRONLY);
6886 _fdopen (1, "w");
6887
6888 if (stderr_save != INVALID_HANDLE_VALUE)
6889 _open_osfhandle ((intptr_t) stderr_save, O_TEXT);
6890 else
6891 _open ("nul", O_TEXT | O_NOINHERIT | O_WRONLY);
6892 _fdopen (2, "w");
6893 }
6894
6895 /* unfortunately, atexit depends on implementation of malloc */
6896 /* atexit (term_ntproc); */
6897 if (!dumping)
6898 {
6899 /* Make sure we start with all signals unblocked. */
6900 sigprocmask (SIG_SETMASK, &initial_mask, NULL);
6901 signal (SIGABRT, term_ntproc);
6902 }
6903 init_timers ();
6904
6905 /* determine which drives are fixed, for GetCachedVolumeInformation */
6906 {
6907 /* GetDriveType must have trailing backslash. */
6908 char drive[] = "A:\\";
6909
6910 /* Loop over all possible drive letters */
6911 while (*drive <= 'Z')
6912 {
6913 /* Record if this drive letter refers to a fixed drive. */
6914 fixed_drives[DRIVE_INDEX (*drive)] =
6915 (GetDriveType (drive) == DRIVE_FIXED);
6916
6917 (*drive)++;
6918 }
6919
6920 /* Reset the volume info cache. */
6921 volume_cache = NULL;
6922 }
6923 }
6924
6925 /*
6926 shutdown_handler ensures that buffers' autosave files are
6927 up to date when the user logs off, or the system shuts down.
6928 */
6929 static BOOL WINAPI
6930 shutdown_handler (DWORD type)
6931 {
6932 /* Ctrl-C and Ctrl-Break are already suppressed, so don't handle them. */
6933 if (type == CTRL_CLOSE_EVENT /* User closes console window. */
6934 || type == CTRL_LOGOFF_EVENT /* User logs off. */
6935 || type == CTRL_SHUTDOWN_EVENT) /* User shutsdown. */
6936 {
6937 /* Shut down cleanly, making sure autosave files are up to date. */
6938 shut_down_emacs (0, Qnil);
6939 }
6940
6941 /* Allow other handlers to handle this signal. */
6942 return FALSE;
6943 }
6944
6945 /*
6946 globals_of_w32 is used to initialize those global variables that
6947 must always be initialized on startup even when the global variable
6948 initialized is non zero (see the function main in emacs.c).
6949 */
6950 void
6951 globals_of_w32 (void)
6952 {
6953 HMODULE kernel32 = GetModuleHandle ("kernel32.dll");
6954
6955 get_process_times_fn = (GetProcessTimes_Proc)
6956 GetProcAddress (kernel32, "GetProcessTimes");
6957
6958 DEFSYM (QCloaded_from, ":loaded-from");
6959
6960 g_b_init_is_windows_9x = 0;
6961 g_b_init_open_process_token = 0;
6962 g_b_init_get_token_information = 0;
6963 g_b_init_lookup_account_sid = 0;
6964 g_b_init_get_sid_sub_authority = 0;
6965 g_b_init_get_sid_sub_authority_count = 0;
6966 g_b_init_get_security_info = 0;
6967 g_b_init_get_file_security = 0;
6968 g_b_init_get_security_descriptor_owner = 0;
6969 g_b_init_get_security_descriptor_group = 0;
6970 g_b_init_is_valid_sid = 0;
6971 g_b_init_create_toolhelp32_snapshot = 0;
6972 g_b_init_process32_first = 0;
6973 g_b_init_process32_next = 0;
6974 g_b_init_open_thread_token = 0;
6975 g_b_init_impersonate_self = 0;
6976 g_b_init_revert_to_self = 0;
6977 g_b_init_get_process_memory_info = 0;
6978 g_b_init_get_process_working_set_size = 0;
6979 g_b_init_global_memory_status = 0;
6980 g_b_init_global_memory_status_ex = 0;
6981 g_b_init_equal_sid = 0;
6982 g_b_init_copy_sid = 0;
6983 g_b_init_get_length_sid = 0;
6984 g_b_init_get_native_system_info = 0;
6985 g_b_init_get_system_times = 0;
6986 g_b_init_create_symbolic_link = 0;
6987 num_of_processors = 0;
6988 /* The following sets a handler for shutdown notifications for
6989 console apps. This actually applies to Emacs in both console and
6990 GUI modes, since we had to fool windows into thinking emacs is a
6991 console application to get console mode to work. */
6992 SetConsoleCtrlHandler (shutdown_handler, TRUE);
6993
6994 /* "None" is the default group name on standalone workstations. */
6995 strcpy (dflt_group_name, "None");
6996 }
6997
6998 /* For make-serial-process */
6999 int
7000 serial_open (char *port)
7001 {
7002 HANDLE hnd;
7003 child_process *cp;
7004 int fd = -1;
7005
7006 hnd = CreateFile (port, GENERIC_READ | GENERIC_WRITE, 0, 0,
7007 OPEN_EXISTING, FILE_FLAG_OVERLAPPED, 0);
7008 if (hnd == INVALID_HANDLE_VALUE)
7009 error ("Could not open %s", port);
7010 fd = (int) _open_osfhandle ((intptr_t) hnd, 0);
7011 if (fd == -1)
7012 error ("Could not open %s", port);
7013
7014 cp = new_child ();
7015 if (!cp)
7016 error ("Could not create child process");
7017 cp->fd = fd;
7018 cp->status = STATUS_READ_ACKNOWLEDGED;
7019 fd_info[ fd ].hnd = hnd;
7020 fd_info[ fd ].flags |=
7021 FILE_READ | FILE_WRITE | FILE_BINARY | FILE_SERIAL;
7022 if (fd_info[ fd ].cp != NULL)
7023 {
7024 error ("fd_info[fd = %d] is already in use", fd);
7025 }
7026 fd_info[ fd ].cp = cp;
7027 cp->ovl_read.hEvent = CreateEvent (NULL, TRUE, FALSE, NULL);
7028 if (cp->ovl_read.hEvent == NULL)
7029 error ("Could not create read event");
7030 cp->ovl_write.hEvent = CreateEvent (NULL, TRUE, FALSE, NULL);
7031 if (cp->ovl_write.hEvent == NULL)
7032 error ("Could not create write event");
7033
7034 return fd;
7035 }
7036
7037 /* For serial-process-configure */
7038 void
7039 serial_configure (struct Lisp_Process *p, Lisp_Object contact)
7040 {
7041 Lisp_Object childp2 = Qnil;
7042 Lisp_Object tem = Qnil;
7043 HANDLE hnd;
7044 DCB dcb;
7045 COMMTIMEOUTS ct;
7046 char summary[4] = "???"; /* This usually becomes "8N1". */
7047
7048 if ((fd_info[ p->outfd ].flags & FILE_SERIAL) == 0)
7049 error ("Not a serial process");
7050 hnd = fd_info[ p->outfd ].hnd;
7051
7052 childp2 = Fcopy_sequence (p->childp);
7053
7054 /* Initialize timeouts for blocking read and blocking write. */
7055 if (!GetCommTimeouts (hnd, &ct))
7056 error ("GetCommTimeouts() failed");
7057 ct.ReadIntervalTimeout = 0;
7058 ct.ReadTotalTimeoutMultiplier = 0;
7059 ct.ReadTotalTimeoutConstant = 0;
7060 ct.WriteTotalTimeoutMultiplier = 0;
7061 ct.WriteTotalTimeoutConstant = 0;
7062 if (!SetCommTimeouts (hnd, &ct))
7063 error ("SetCommTimeouts() failed");
7064 /* Read port attributes and prepare default configuration. */
7065 memset (&dcb, 0, sizeof (dcb));
7066 dcb.DCBlength = sizeof (DCB);
7067 if (!GetCommState (hnd, &dcb))
7068 error ("GetCommState() failed");
7069 dcb.fBinary = TRUE;
7070 dcb.fNull = FALSE;
7071 dcb.fAbortOnError = FALSE;
7072 /* dcb.XonLim and dcb.XoffLim are set by GetCommState() */
7073 dcb.ErrorChar = 0;
7074 dcb.EofChar = 0;
7075 dcb.EvtChar = 0;
7076
7077 /* Configure speed. */
7078 if (!NILP (Fplist_member (contact, QCspeed)))
7079 tem = Fplist_get (contact, QCspeed);
7080 else
7081 tem = Fplist_get (p->childp, QCspeed);
7082 CHECK_NUMBER (tem);
7083 dcb.BaudRate = XINT (tem);
7084 childp2 = Fplist_put (childp2, QCspeed, tem);
7085
7086 /* Configure bytesize. */
7087 if (!NILP (Fplist_member (contact, QCbytesize)))
7088 tem = Fplist_get (contact, QCbytesize);
7089 else
7090 tem = Fplist_get (p->childp, QCbytesize);
7091 if (NILP (tem))
7092 tem = make_number (8);
7093 CHECK_NUMBER (tem);
7094 if (XINT (tem) != 7 && XINT (tem) != 8)
7095 error (":bytesize must be nil (8), 7, or 8");
7096 dcb.ByteSize = XINT (tem);
7097 summary[0] = XINT (tem) + '0';
7098 childp2 = Fplist_put (childp2, QCbytesize, tem);
7099
7100 /* Configure parity. */
7101 if (!NILP (Fplist_member (contact, QCparity)))
7102 tem = Fplist_get (contact, QCparity);
7103 else
7104 tem = Fplist_get (p->childp, QCparity);
7105 if (!NILP (tem) && !EQ (tem, Qeven) && !EQ (tem, Qodd))
7106 error (":parity must be nil (no parity), `even', or `odd'");
7107 dcb.fParity = FALSE;
7108 dcb.Parity = NOPARITY;
7109 dcb.fErrorChar = FALSE;
7110 if (NILP (tem))
7111 {
7112 summary[1] = 'N';
7113 }
7114 else if (EQ (tem, Qeven))
7115 {
7116 summary[1] = 'E';
7117 dcb.fParity = TRUE;
7118 dcb.Parity = EVENPARITY;
7119 dcb.fErrorChar = TRUE;
7120 }
7121 else if (EQ (tem, Qodd))
7122 {
7123 summary[1] = 'O';
7124 dcb.fParity = TRUE;
7125 dcb.Parity = ODDPARITY;
7126 dcb.fErrorChar = TRUE;
7127 }
7128 childp2 = Fplist_put (childp2, QCparity, tem);
7129
7130 /* Configure stopbits. */
7131 if (!NILP (Fplist_member (contact, QCstopbits)))
7132 tem = Fplist_get (contact, QCstopbits);
7133 else
7134 tem = Fplist_get (p->childp, QCstopbits);
7135 if (NILP (tem))
7136 tem = make_number (1);
7137 CHECK_NUMBER (tem);
7138 if (XINT (tem) != 1 && XINT (tem) != 2)
7139 error (":stopbits must be nil (1 stopbit), 1, or 2");
7140 summary[2] = XINT (tem) + '0';
7141 if (XINT (tem) == 1)
7142 dcb.StopBits = ONESTOPBIT;
7143 else if (XINT (tem) == 2)
7144 dcb.StopBits = TWOSTOPBITS;
7145 childp2 = Fplist_put (childp2, QCstopbits, tem);
7146
7147 /* Configure flowcontrol. */
7148 if (!NILP (Fplist_member (contact, QCflowcontrol)))
7149 tem = Fplist_get (contact, QCflowcontrol);
7150 else
7151 tem = Fplist_get (p->childp, QCflowcontrol);
7152 if (!NILP (tem) && !EQ (tem, Qhw) && !EQ (tem, Qsw))
7153 error (":flowcontrol must be nil (no flowcontrol), `hw', or `sw'");
7154 dcb.fOutxCtsFlow = FALSE;
7155 dcb.fOutxDsrFlow = FALSE;
7156 dcb.fDtrControl = DTR_CONTROL_DISABLE;
7157 dcb.fDsrSensitivity = FALSE;
7158 dcb.fTXContinueOnXoff = FALSE;
7159 dcb.fOutX = FALSE;
7160 dcb.fInX = FALSE;
7161 dcb.fRtsControl = RTS_CONTROL_DISABLE;
7162 dcb.XonChar = 17; /* Control-Q */
7163 dcb.XoffChar = 19; /* Control-S */
7164 if (NILP (tem))
7165 {
7166 /* Already configured. */
7167 }
7168 else if (EQ (tem, Qhw))
7169 {
7170 dcb.fRtsControl = RTS_CONTROL_HANDSHAKE;
7171 dcb.fOutxCtsFlow = TRUE;
7172 }
7173 else if (EQ (tem, Qsw))
7174 {
7175 dcb.fOutX = TRUE;
7176 dcb.fInX = TRUE;
7177 }
7178 childp2 = Fplist_put (childp2, QCflowcontrol, tem);
7179
7180 /* Activate configuration. */
7181 if (!SetCommState (hnd, &dcb))
7182 error ("SetCommState() failed");
7183
7184 childp2 = Fplist_put (childp2, QCsummary, build_string (summary));
7185 pset_childp (p, childp2);
7186 }
7187
7188 #ifdef HAVE_GNUTLS
7189
7190 ssize_t
7191 emacs_gnutls_pull (gnutls_transport_ptr_t p, void* buf, size_t sz)
7192 {
7193 int n, sc, err;
7194 SELECT_TYPE fdset;
7195 EMACS_TIME timeout;
7196 struct Lisp_Process *process = (struct Lisp_Process *)p;
7197 int fd = process->infd;
7198
7199 for (;;)
7200 {
7201 n = sys_read (fd, (char*)buf, sz);
7202
7203 if (n >= 0)
7204 return n;
7205
7206 err = errno;
7207
7208 if (err == EWOULDBLOCK)
7209 {
7210 /* Set a small timeout. */
7211 timeout = make_emacs_time (1, 0);
7212 FD_ZERO (&fdset);
7213 FD_SET ((int)fd, &fdset);
7214
7215 /* Use select with the timeout to poll the selector. */
7216 sc = select (fd + 1, &fdset, (SELECT_TYPE *)0, (SELECT_TYPE *)0,
7217 &timeout, NULL);
7218
7219 if (sc > 0)
7220 continue; /* Try again. */
7221
7222 /* Translate the WSAEWOULDBLOCK alias EWOULDBLOCK to EAGAIN.
7223 Also accept select return 0 as an indicator to EAGAIN. */
7224 if (sc == 0 || errno == EWOULDBLOCK)
7225 err = EAGAIN;
7226 else
7227 err = errno; /* Other errors are just passed on. */
7228 }
7229
7230 emacs_gnutls_transport_set_errno (process->gnutls_state, err);
7231
7232 return -1;
7233 }
7234 }
7235
7236 ssize_t
7237 emacs_gnutls_push (gnutls_transport_ptr_t p, const void* buf, size_t sz)
7238 {
7239 struct Lisp_Process *process = (struct Lisp_Process *)p;
7240 int fd = process->outfd;
7241 ssize_t n = sys_write (fd, buf, sz);
7242
7243 /* 0 or more bytes written means everything went fine. */
7244 if (n >= 0)
7245 return n;
7246
7247 /* Negative bytes written means we got an error in errno.
7248 Translate the WSAEWOULDBLOCK alias EWOULDBLOCK to EAGAIN. */
7249 emacs_gnutls_transport_set_errno (process->gnutls_state,
7250 errno == EWOULDBLOCK ? EAGAIN : errno);
7251
7252 return -1;
7253 }
7254 #endif /* HAVE_GNUTLS */
7255
7256 /* end of w32.c */