| Index: fusl/src/network/sendmmsg.c
|
| diff --git a/fusl/src/network/sendmmsg.c b/fusl/src/network/sendmmsg.c
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..eeae1d0a5822503f5c572a46e3d3696f6c95b1b9
|
| --- /dev/null
|
| +++ b/fusl/src/network/sendmmsg.c
|
| @@ -0,0 +1,30 @@
|
| +#define _GNU_SOURCE
|
| +#include <sys/socket.h>
|
| +#include <limits.h>
|
| +#include <errno.h>
|
| +#include "syscall.h"
|
| +
|
| +int sendmmsg(int fd, struct mmsghdr *msgvec, unsigned int vlen, unsigned int flags)
|
| +{
|
| +#if LONG_MAX > INT_MAX
|
| + /* Can't use the syscall directly because the kernel has the wrong
|
| + * idea for the types of msg_iovlen, msg_controllen, and cmsg_len,
|
| + * and the cmsg blocks cannot be modified in-place. */
|
| + int i;
|
| + if (vlen > IOV_MAX) vlen = IOV_MAX; /* This matches the kernel. */
|
| + if (!vlen) return 0;
|
| + for (i=0; i<vlen; i++) {
|
| + /* As an unfortunate inconsistency, the sendmmsg API uses
|
| + * unsigned int for the resulting msg_len, despite sendmsg
|
| + * returning ssize_t. However Linux limits the total bytes
|
| + * sent by sendmsg to INT_MAX, so the assignment is safe. */
|
| + ssize_t r = sendmsg(fd, &msgvec[i].msg_hdr, flags);
|
| + if (r < 0) goto error;
|
| + msgvec[i].msg_len = r;
|
| + }
|
| +error:
|
| + return i ? i : -1;
|
| +#else
|
| + return syscall_cp(SYS_sendmmsg, fd, msgvec, vlen, flags);
|
| +#endif
|
| +}
|
|
|