2004-07-16 19:56:36 +00:00
|
|
|
/* $Id$ */
|
|
|
|
|
|
|
|
|
|
/***
|
|
|
|
|
This file is part of polypaudio.
|
|
|
|
|
|
|
|
|
|
polypaudio is free software; you can redistribute it and/or modify
|
2004-11-14 14:58:54 +00:00
|
|
|
it under the terms of the GNU Lesser General Public License as published
|
2004-07-16 19:56:36 +00:00
|
|
|
by the Free Software Foundation; either version 2 of the License,
|
|
|
|
|
or (at your option) any later version.
|
|
|
|
|
|
|
|
|
|
polypaudio is distributed in the hope that it will be useful, but
|
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
General Public License for more details.
|
|
|
|
|
|
2004-11-14 14:58:54 +00:00
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
2004-07-16 19:56:36 +00:00
|
|
|
along with polypaudio; if not, write to the Free Software
|
|
|
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
|
|
|
USA.
|
|
|
|
|
***/
|
|
|
|
|
|
2004-07-16 19:16:42 +00:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
2006-05-22 15:20:46 +00:00
|
|
|
#include <errno.h>
|
2004-07-10 19:04:21 +00:00
|
|
|
#include <stdio.h>
|
2004-07-06 00:08:44 +00:00
|
|
|
#include <stdlib.h>
|
2006-05-22 15:20:46 +00:00
|
|
|
#include <string.h>
|
2004-07-06 00:08:44 +00:00
|
|
|
|
2006-05-22 15:20:46 +00:00
|
|
|
#ifdef HAVE_PTHREAD
|
|
|
|
|
#include <pthread.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_WINDOWS_H
|
|
|
|
|
#include <windows.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#include <polyp/utf8.h>
|
|
|
|
|
#include <polyp/xmalloc.h>
|
|
|
|
|
|
|
|
|
|
#include <polypcore/core-util.h>
|
2006-02-16 19:19:58 +00:00
|
|
|
#include <polypcore/native-common.h>
|
2004-07-06 00:08:44 +00:00
|
|
|
|
2006-02-17 12:10:58 +00:00
|
|
|
#include "error.h"
|
|
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
static const char* const errortab[PA_ERR_MAX] = {
|
|
|
|
|
[PA_OK] = "OK",
|
|
|
|
|
[PA_ERR_ACCESS] = "Access denied",
|
|
|
|
|
[PA_ERR_COMMAND] = "Unknown command",
|
|
|
|
|
[PA_ERR_INVALID] = "Invalid argument",
|
|
|
|
|
[PA_ERR_EXIST] = "Entity exists",
|
|
|
|
|
[PA_ERR_NOENTITY] = "No such entity",
|
|
|
|
|
[PA_ERR_CONNECTIONREFUSED] = "Connection refused",
|
|
|
|
|
[PA_ERR_PROTOCOL] = "Protocol error",
|
|
|
|
|
[PA_ERR_TIMEOUT] = "Timeout",
|
|
|
|
|
[PA_ERR_AUTHKEY] = "No authorization key",
|
|
|
|
|
[PA_ERR_INTERNAL] = "Internal error",
|
|
|
|
|
[PA_ERR_CONNECTIONTERMINATED] = "Connection terminated",
|
|
|
|
|
[PA_ERR_KILLED] = "Entity killed",
|
|
|
|
|
[PA_ERR_INVALIDSERVER] = "Invalid server",
|
|
|
|
|
[PA_ERR_MODINITFAILED] = "Module initalization failed",
|
|
|
|
|
[PA_ERR_BADSTATE] = "Bad state",
|
|
|
|
|
[PA_ERR_NODATA] = "No data",
|
2006-03-02 21:56:15 +00:00
|
|
|
[PA_ERR_VERSION] = "Incompatible protocol version",
|
2006-04-23 20:56:41 +00:00
|
|
|
[PA_ERR_TOOLARGE] = "Too large"
|
2004-07-06 00:08:44 +00:00
|
|
|
};
|
|
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
const char*pa_strerror(int error) {
|
|
|
|
|
if (error < 0 || error >= PA_ERR_MAX)
|
2004-07-06 00:08:44 +00:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
return errortab[error];
|
|
|
|
|
}
|
2006-05-22 15:20:46 +00:00
|
|
|
|
|
|
|
|
#ifdef HAVE_PTHREAD
|
|
|
|
|
|
|
|
|
|
static pthread_once_t cstrerror_once = PTHREAD_ONCE_INIT;
|
|
|
|
|
static pthread_key_t tlsstr_key;
|
|
|
|
|
|
|
|
|
|
static void inittls(void) {
|
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
|
|
ret = pthread_key_create(&tlsstr_key, pa_xfree);
|
|
|
|
|
if (ret) {
|
|
|
|
|
fprintf(stderr, __FILE__ ": CRITICAL: Unable to allocate TLS key (%d)\n", errno);
|
|
|
|
|
exit(-1);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#elif HAVE_WINDOWS_H
|
|
|
|
|
|
2006-05-22 16:47:26 +00:00
|
|
|
static DWORD tlsstr_key = TLS_OUT_OF_INDEXES;
|
|
|
|
|
static DWORD monitor_key = TLS_OUT_OF_INDEXES;
|
|
|
|
|
|
|
|
|
|
static void inittls(void) {
|
|
|
|
|
HANDLE mutex;
|
|
|
|
|
char name[64];
|
|
|
|
|
|
|
|
|
|
sprintf(name, "polypaudio%d", (int)GetCurrentProcessId());
|
|
|
|
|
|
|
|
|
|
mutex = CreateMutex(NULL, FALSE, name);
|
|
|
|
|
if (!mutex) {
|
|
|
|
|
fprintf(stderr, __FILE__ ": CRITICAL: Unable to create named mutex (%d)\n", (int)GetLastError());
|
|
|
|
|
exit(-1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
WaitForSingleObject(mutex, INFINITE);
|
|
|
|
|
|
|
|
|
|
if (tlsstr_key == TLS_OUT_OF_INDEXES) {
|
|
|
|
|
tlsstr_key = TlsAlloc();
|
|
|
|
|
monitor_key = TlsAlloc();
|
|
|
|
|
if ((tlsstr_key == TLS_OUT_OF_INDEXES) || (monitor_key == TLS_OUT_OF_INDEXES)) {
|
|
|
|
|
fprintf(stderr, __FILE__ ": CRITICAL: Unable to allocate TLS key (%d)\n", (int)GetLastError());
|
|
|
|
|
exit(-1);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ReleaseMutex(mutex);
|
|
|
|
|
|
|
|
|
|
CloseHandle(mutex);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* This is incredibly brain dead, but this is necessary when dealing with
|
|
|
|
|
* the hell that is Win32.
|
|
|
|
|
*/
|
|
|
|
|
struct monitor_data {
|
|
|
|
|
HANDLE thread;
|
|
|
|
|
void *data;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static DWORD WINAPI monitor_thread(LPVOID param) {
|
|
|
|
|
struct monitor_data *data;
|
|
|
|
|
|
|
|
|
|
data = (struct monitor_data*)param;
|
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
|
|
WaitForSingleObject(data->thread, INFINITE);
|
|
|
|
|
|
|
|
|
|
CloseHandle(data->thread);
|
|
|
|
|
pa_xfree(data->data);
|
|
|
|
|
pa_xfree(data);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void start_monitor(void) {
|
|
|
|
|
HANDLE thread;
|
|
|
|
|
struct monitor_data *data;
|
|
|
|
|
|
|
|
|
|
data = pa_xnew(struct monitor_data, 1);
|
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
|
|
DuplicateHandle(GetCurrentProcess(), GetCurrentThread(),
|
|
|
|
|
GetCurrentProcess(), &data->thread, 0, FALSE, DUPLICATE_SAME_ACCESS);
|
|
|
|
|
|
|
|
|
|
thread = CreateThread(NULL, 0, monitor_thread, data, 0, NULL);
|
|
|
|
|
assert(thread);
|
|
|
|
|
|
|
|
|
|
TlsSetValue(monitor_key, data);
|
|
|
|
|
|
|
|
|
|
CloseHandle(thread);
|
|
|
|
|
}
|
2006-05-22 15:20:46 +00:00
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
|
|
/* Unsafe, but we have no choice */
|
|
|
|
|
static char *tlsstr;
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
2006-05-23 14:39:15 +00:00
|
|
|
const char* pa_cstrerror(int errnum) {
|
2006-05-22 15:20:46 +00:00
|
|
|
const char *origbuf;
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_STRERROR_R
|
|
|
|
|
char errbuf[128];
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_PTHREAD
|
|
|
|
|
char *tlsstr;
|
|
|
|
|
|
|
|
|
|
pthread_once(&cstrerror_once, inittls);
|
|
|
|
|
|
|
|
|
|
tlsstr = pthread_getspecific(tlsstr_key);
|
2006-05-22 16:47:26 +00:00
|
|
|
#elif defined(HAVE_WINDOWS_H)
|
|
|
|
|
char *tlsstr;
|
|
|
|
|
struct monitor_data *data;
|
|
|
|
|
|
|
|
|
|
inittls();
|
|
|
|
|
|
|
|
|
|
tlsstr = TlsGetValue(tlsstr_key);
|
|
|
|
|
if (!tlsstr)
|
|
|
|
|
start_monitor();
|
|
|
|
|
data = TlsGetValue(monitor_key);
|
2006-05-22 15:20:46 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
if (tlsstr)
|
|
|
|
|
pa_xfree(tlsstr);
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_STRERROR_R
|
|
|
|
|
|
|
|
|
|
#ifdef __GLIBC__
|
|
|
|
|
origbuf = strerror_r(errnum, errbuf, sizeof(errbuf));
|
|
|
|
|
if (origbuf == NULL)
|
|
|
|
|
origbuf = "";
|
|
|
|
|
#else
|
|
|
|
|
if (strerror_r(errnum, errbuf, sizeof(errbuf)) == 0) {
|
|
|
|
|
origbuf = errbuf;
|
|
|
|
|
errbuf[sizeof(errbuf) - 1] = '\0';
|
|
|
|
|
} else
|
|
|
|
|
origbuf = "";
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
/* This might not be thread safe, but we hope for the best */
|
|
|
|
|
origbuf = strerror(errnum);
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
tlsstr = pa_locale_to_utf8(origbuf);
|
|
|
|
|
if (!tlsstr) {
|
|
|
|
|
fprintf(stderr, "Unable to convert, filtering\n");
|
|
|
|
|
tlsstr = pa_utf8_filter(origbuf);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_PTHREAD
|
|
|
|
|
pthread_setspecific(tlsstr_key, tlsstr);
|
2006-05-22 16:47:26 +00:00
|
|
|
#elif defined(HAVE_WINDOWS_H)
|
|
|
|
|
TlsSetValue(tlsstr_key, tlsstr);
|
|
|
|
|
data->data = tlsstr;
|
2006-05-22 15:20:46 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
return tlsstr;
|
|
|
|
|
}
|