github.com/jgarto/itcv@v0.0.0-20180826224514-4eea09c1aa0d/_vendor/src/golang.org/x/sys/unix/syscall_linux.go (about)

     1  // Copyright 2009 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  // Linux system calls.
     6  // This file is compiled as ordinary Go code,
     7  // but it is also input to mksyscall,
     8  // which parses the //sys lines and generates system call stubs.
     9  // Note that sometimes we use a lowercase //sys name and
    10  // wrap it in our own nicer implementation.
    11  
    12  package unix
    13  
    14  import (
    15  	"syscall"
    16  	"unsafe"
    17  )
    18  
    19  /*
    20   * Wrapped
    21   */
    22  
    23  func Access(path string, mode uint32) (err error) {
    24  	return Faccessat(AT_FDCWD, path, mode, 0)
    25  }
    26  
    27  func Chmod(path string, mode uint32) (err error) {
    28  	return Fchmodat(AT_FDCWD, path, mode, 0)
    29  }
    30  
    31  func Chown(path string, uid int, gid int) (err error) {
    32  	return Fchownat(AT_FDCWD, path, uid, gid, 0)
    33  }
    34  
    35  func Creat(path string, mode uint32) (fd int, err error) {
    36  	return Open(path, O_CREAT|O_WRONLY|O_TRUNC, mode)
    37  }
    38  
    39  //sys	Linkat(olddirfd int, oldpath string, newdirfd int, newpath string, flags int) (err error)
    40  
    41  func Link(oldpath string, newpath string) (err error) {
    42  	return Linkat(AT_FDCWD, oldpath, AT_FDCWD, newpath, 0)
    43  }
    44  
    45  func Mkdir(path string, mode uint32) (err error) {
    46  	return Mkdirat(AT_FDCWD, path, mode)
    47  }
    48  
    49  func Mknod(path string, mode uint32, dev int) (err error) {
    50  	return Mknodat(AT_FDCWD, path, mode, dev)
    51  }
    52  
    53  func Open(path string, mode int, perm uint32) (fd int, err error) {
    54  	return openat(AT_FDCWD, path, mode|O_LARGEFILE, perm)
    55  }
    56  
    57  //sys	openat(dirfd int, path string, flags int, mode uint32) (fd int, err error)
    58  
    59  func Openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) {
    60  	return openat(dirfd, path, flags|O_LARGEFILE, mode)
    61  }
    62  
    63  //sys	ppoll(fds *PollFd, nfds int, timeout *Timespec, sigmask *Sigset_t) (n int, err error)
    64  
    65  func Ppoll(fds []PollFd, timeout *Timespec, sigmask *Sigset_t) (n int, err error) {
    66  	if len(fds) == 0 {
    67  		return ppoll(nil, 0, timeout, sigmask)
    68  	}
    69  	return ppoll(&fds[0], len(fds), timeout, sigmask)
    70  }
    71  
    72  //sys	Readlinkat(dirfd int, path string, buf []byte) (n int, err error)
    73  
    74  func Readlink(path string, buf []byte) (n int, err error) {
    75  	return Readlinkat(AT_FDCWD, path, buf)
    76  }
    77  
    78  func Rename(oldpath string, newpath string) (err error) {
    79  	return Renameat(AT_FDCWD, oldpath, AT_FDCWD, newpath)
    80  }
    81  
    82  func Rmdir(path string) error {
    83  	return Unlinkat(AT_FDCWD, path, AT_REMOVEDIR)
    84  }
    85  
    86  //sys	Symlinkat(oldpath string, newdirfd int, newpath string) (err error)
    87  
    88  func Symlink(oldpath string, newpath string) (err error) {
    89  	return Symlinkat(oldpath, AT_FDCWD, newpath)
    90  }
    91  
    92  func Unlink(path string) error {
    93  	return Unlinkat(AT_FDCWD, path, 0)
    94  }
    95  
    96  //sys	Unlinkat(dirfd int, path string, flags int) (err error)
    97  
    98  //sys	utimes(path string, times *[2]Timeval) (err error)
    99  
   100  func Utimes(path string, tv []Timeval) error {
   101  	if tv == nil {
   102  		err := utimensat(AT_FDCWD, path, nil, 0)
   103  		if err != ENOSYS {
   104  			return err
   105  		}
   106  		return utimes(path, nil)
   107  	}
   108  	if len(tv) != 2 {
   109  		return EINVAL
   110  	}
   111  	var ts [2]Timespec
   112  	ts[0] = NsecToTimespec(TimevalToNsec(tv[0]))
   113  	ts[1] = NsecToTimespec(TimevalToNsec(tv[1]))
   114  	err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0)
   115  	if err != ENOSYS {
   116  		return err
   117  	}
   118  	return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
   119  }
   120  
   121  //sys	utimensat(dirfd int, path string, times *[2]Timespec, flags int) (err error)
   122  
   123  func UtimesNano(path string, ts []Timespec) error {
   124  	if ts == nil {
   125  		err := utimensat(AT_FDCWD, path, nil, 0)
   126  		if err != ENOSYS {
   127  			return err
   128  		}
   129  		return utimes(path, nil)
   130  	}
   131  	if len(ts) != 2 {
   132  		return EINVAL
   133  	}
   134  	err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0)
   135  	if err != ENOSYS {
   136  		return err
   137  	}
   138  	// If the utimensat syscall isn't available (utimensat was added to Linux
   139  	// in 2.6.22, Released, 8 July 2007) then fall back to utimes
   140  	var tv [2]Timeval
   141  	for i := 0; i < 2; i++ {
   142  		tv[i] = NsecToTimeval(TimespecToNsec(ts[i]))
   143  	}
   144  	return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
   145  }
   146  
   147  func UtimesNanoAt(dirfd int, path string, ts []Timespec, flags int) error {
   148  	if ts == nil {
   149  		return utimensat(dirfd, path, nil, flags)
   150  	}
   151  	if len(ts) != 2 {
   152  		return EINVAL
   153  	}
   154  	return utimensat(dirfd, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), flags)
   155  }
   156  
   157  //sys	futimesat(dirfd int, path *byte, times *[2]Timeval) (err error)
   158  
   159  func Futimesat(dirfd int, path string, tv []Timeval) error {
   160  	pathp, err := BytePtrFromString(path)
   161  	if err != nil {
   162  		return err
   163  	}
   164  	if tv == nil {
   165  		return futimesat(dirfd, pathp, nil)
   166  	}
   167  	if len(tv) != 2 {
   168  		return EINVAL
   169  	}
   170  	return futimesat(dirfd, pathp, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
   171  }
   172  
   173  func Futimes(fd int, tv []Timeval) (err error) {
   174  	// Believe it or not, this is the best we can do on Linux
   175  	// (and is what glibc does).
   176  	return Utimes("/proc/self/fd/"+itoa(fd), tv)
   177  }
   178  
   179  const ImplementsGetwd = true
   180  
   181  //sys	Getcwd(buf []byte) (n int, err error)
   182  
   183  func Getwd() (wd string, err error) {
   184  	var buf [PathMax]byte
   185  	n, err := Getcwd(buf[0:])
   186  	if err != nil {
   187  		return "", err
   188  	}
   189  	// Getcwd returns the number of bytes written to buf, including the NUL.
   190  	if n < 1 || n > len(buf) || buf[n-1] != 0 {
   191  		return "", EINVAL
   192  	}
   193  	return string(buf[0 : n-1]), nil
   194  }
   195  
   196  func Getgroups() (gids []int, err error) {
   197  	n, err := getgroups(0, nil)
   198  	if err != nil {
   199  		return nil, err
   200  	}
   201  	if n == 0 {
   202  		return nil, nil
   203  	}
   204  
   205  	// Sanity check group count.  Max is 1<<16 on Linux.
   206  	if n < 0 || n > 1<<20 {
   207  		return nil, EINVAL
   208  	}
   209  
   210  	a := make([]_Gid_t, n)
   211  	n, err = getgroups(n, &a[0])
   212  	if err != nil {
   213  		return nil, err
   214  	}
   215  	gids = make([]int, n)
   216  	for i, v := range a[0:n] {
   217  		gids[i] = int(v)
   218  	}
   219  	return
   220  }
   221  
   222  func Setgroups(gids []int) (err error) {
   223  	if len(gids) == 0 {
   224  		return setgroups(0, nil)
   225  	}
   226  
   227  	a := make([]_Gid_t, len(gids))
   228  	for i, v := range gids {
   229  		a[i] = _Gid_t(v)
   230  	}
   231  	return setgroups(len(a), &a[0])
   232  }
   233  
   234  type WaitStatus uint32
   235  
   236  // Wait status is 7 bits at bottom, either 0 (exited),
   237  // 0x7F (stopped), or a signal number that caused an exit.
   238  // The 0x80 bit is whether there was a core dump.
   239  // An extra number (exit code, signal causing a stop)
   240  // is in the high bits.  At least that's the idea.
   241  // There are various irregularities.  For example, the
   242  // "continued" status is 0xFFFF, distinguishing itself
   243  // from stopped via the core dump bit.
   244  
   245  const (
   246  	mask    = 0x7F
   247  	core    = 0x80
   248  	exited  = 0x00
   249  	stopped = 0x7F
   250  	shift   = 8
   251  )
   252  
   253  func (w WaitStatus) Exited() bool { return w&mask == exited }
   254  
   255  func (w WaitStatus) Signaled() bool { return w&mask != stopped && w&mask != exited }
   256  
   257  func (w WaitStatus) Stopped() bool { return w&0xFF == stopped }
   258  
   259  func (w WaitStatus) Continued() bool { return w == 0xFFFF }
   260  
   261  func (w WaitStatus) CoreDump() bool { return w.Signaled() && w&core != 0 }
   262  
   263  func (w WaitStatus) ExitStatus() int {
   264  	if !w.Exited() {
   265  		return -1
   266  	}
   267  	return int(w>>shift) & 0xFF
   268  }
   269  
   270  func (w WaitStatus) Signal() syscall.Signal {
   271  	if !w.Signaled() {
   272  		return -1
   273  	}
   274  	return syscall.Signal(w & mask)
   275  }
   276  
   277  func (w WaitStatus) StopSignal() syscall.Signal {
   278  	if !w.Stopped() {
   279  		return -1
   280  	}
   281  	return syscall.Signal(w>>shift) & 0xFF
   282  }
   283  
   284  func (w WaitStatus) TrapCause() int {
   285  	if w.StopSignal() != SIGTRAP {
   286  		return -1
   287  	}
   288  	return int(w>>shift) >> 8
   289  }
   290  
   291  //sys	wait4(pid int, wstatus *_C_int, options int, rusage *Rusage) (wpid int, err error)
   292  
   293  func Wait4(pid int, wstatus *WaitStatus, options int, rusage *Rusage) (wpid int, err error) {
   294  	var status _C_int
   295  	wpid, err = wait4(pid, &status, options, rusage)
   296  	if wstatus != nil {
   297  		*wstatus = WaitStatus(status)
   298  	}
   299  	return
   300  }
   301  
   302  func Mkfifo(path string, mode uint32) (err error) {
   303  	return Mknod(path, mode|S_IFIFO, 0)
   304  }
   305  
   306  func (sa *SockaddrInet4) sockaddr() (unsafe.Pointer, _Socklen, error) {
   307  	if sa.Port < 0 || sa.Port > 0xFFFF {
   308  		return nil, 0, EINVAL
   309  	}
   310  	sa.raw.Family = AF_INET
   311  	p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
   312  	p[0] = byte(sa.Port >> 8)
   313  	p[1] = byte(sa.Port)
   314  	for i := 0; i < len(sa.Addr); i++ {
   315  		sa.raw.Addr[i] = sa.Addr[i]
   316  	}
   317  	return unsafe.Pointer(&sa.raw), SizeofSockaddrInet4, nil
   318  }
   319  
   320  func (sa *SockaddrInet6) sockaddr() (unsafe.Pointer, _Socklen, error) {
   321  	if sa.Port < 0 || sa.Port > 0xFFFF {
   322  		return nil, 0, EINVAL
   323  	}
   324  	sa.raw.Family = AF_INET6
   325  	p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
   326  	p[0] = byte(sa.Port >> 8)
   327  	p[1] = byte(sa.Port)
   328  	sa.raw.Scope_id = sa.ZoneId
   329  	for i := 0; i < len(sa.Addr); i++ {
   330  		sa.raw.Addr[i] = sa.Addr[i]
   331  	}
   332  	return unsafe.Pointer(&sa.raw), SizeofSockaddrInet6, nil
   333  }
   334  
   335  func (sa *SockaddrUnix) sockaddr() (unsafe.Pointer, _Socklen, error) {
   336  	name := sa.Name
   337  	n := len(name)
   338  	if n >= len(sa.raw.Path) {
   339  		return nil, 0, EINVAL
   340  	}
   341  	sa.raw.Family = AF_UNIX
   342  	for i := 0; i < n; i++ {
   343  		sa.raw.Path[i] = int8(name[i])
   344  	}
   345  	// length is family (uint16), name, NUL.
   346  	sl := _Socklen(2)
   347  	if n > 0 {
   348  		sl += _Socklen(n) + 1
   349  	}
   350  	if sa.raw.Path[0] == '@' {
   351  		sa.raw.Path[0] = 0
   352  		// Don't count trailing NUL for abstract address.
   353  		sl--
   354  	}
   355  
   356  	return unsafe.Pointer(&sa.raw), sl, nil
   357  }
   358  
   359  type SockaddrLinklayer struct {
   360  	Protocol uint16
   361  	Ifindex  int
   362  	Hatype   uint16
   363  	Pkttype  uint8
   364  	Halen    uint8
   365  	Addr     [8]byte
   366  	raw      RawSockaddrLinklayer
   367  }
   368  
   369  func (sa *SockaddrLinklayer) sockaddr() (unsafe.Pointer, _Socklen, error) {
   370  	if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff {
   371  		return nil, 0, EINVAL
   372  	}
   373  	sa.raw.Family = AF_PACKET
   374  	sa.raw.Protocol = sa.Protocol
   375  	sa.raw.Ifindex = int32(sa.Ifindex)
   376  	sa.raw.Hatype = sa.Hatype
   377  	sa.raw.Pkttype = sa.Pkttype
   378  	sa.raw.Halen = sa.Halen
   379  	for i := 0; i < len(sa.Addr); i++ {
   380  		sa.raw.Addr[i] = sa.Addr[i]
   381  	}
   382  	return unsafe.Pointer(&sa.raw), SizeofSockaddrLinklayer, nil
   383  }
   384  
   385  type SockaddrNetlink struct {
   386  	Family uint16
   387  	Pad    uint16
   388  	Pid    uint32
   389  	Groups uint32
   390  	raw    RawSockaddrNetlink
   391  }
   392  
   393  func (sa *SockaddrNetlink) sockaddr() (unsafe.Pointer, _Socklen, error) {
   394  	sa.raw.Family = AF_NETLINK
   395  	sa.raw.Pad = sa.Pad
   396  	sa.raw.Pid = sa.Pid
   397  	sa.raw.Groups = sa.Groups
   398  	return unsafe.Pointer(&sa.raw), SizeofSockaddrNetlink, nil
   399  }
   400  
   401  type SockaddrHCI struct {
   402  	Dev     uint16
   403  	Channel uint16
   404  	raw     RawSockaddrHCI
   405  }
   406  
   407  func (sa *SockaddrHCI) sockaddr() (unsafe.Pointer, _Socklen, error) {
   408  	sa.raw.Family = AF_BLUETOOTH
   409  	sa.raw.Dev = sa.Dev
   410  	sa.raw.Channel = sa.Channel
   411  	return unsafe.Pointer(&sa.raw), SizeofSockaddrHCI, nil
   412  }
   413  
   414  // SockaddrCAN implements the Sockaddr interface for AF_CAN type sockets.
   415  // The RxID and TxID fields are used for transport protocol addressing in
   416  // (CAN_TP16, CAN_TP20, CAN_MCNET, and CAN_ISOTP), they can be left with
   417  // zero values for CAN_RAW and CAN_BCM sockets as they have no meaning.
   418  //
   419  // The SockaddrCAN struct must be bound to the socket file descriptor
   420  // using Bind before the CAN socket can be used.
   421  //
   422  //      // Read one raw CAN frame
   423  //      fd, _ := Socket(AF_CAN, SOCK_RAW, CAN_RAW)
   424  //      addr := &SockaddrCAN{Ifindex: index}
   425  //      Bind(fd, addr)
   426  //      frame := make([]byte, 16)
   427  //      Read(fd, frame)
   428  //
   429  // The full SocketCAN documentation can be found in the linux kernel
   430  // archives at: https://www.kernel.org/doc/Documentation/networking/can.txt
   431  type SockaddrCAN struct {
   432  	Ifindex int
   433  	RxID    uint32
   434  	TxID    uint32
   435  	raw     RawSockaddrCAN
   436  }
   437  
   438  func (sa *SockaddrCAN) sockaddr() (unsafe.Pointer, _Socklen, error) {
   439  	if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff {
   440  		return nil, 0, EINVAL
   441  	}
   442  	sa.raw.Family = AF_CAN
   443  	sa.raw.Ifindex = int32(sa.Ifindex)
   444  	rx := (*[4]byte)(unsafe.Pointer(&sa.RxID))
   445  	for i := 0; i < 4; i++ {
   446  		sa.raw.Addr[i] = rx[i]
   447  	}
   448  	tx := (*[4]byte)(unsafe.Pointer(&sa.TxID))
   449  	for i := 0; i < 4; i++ {
   450  		sa.raw.Addr[i+4] = tx[i]
   451  	}
   452  	return unsafe.Pointer(&sa.raw), SizeofSockaddrCAN, nil
   453  }
   454  
   455  // SockaddrALG implements the Sockaddr interface for AF_ALG type sockets.
   456  // SockaddrALG enables userspace access to the Linux kernel's cryptography
   457  // subsystem. The Type and Name fields specify which type of hash or cipher
   458  // should be used with a given socket.
   459  //
   460  // To create a file descriptor that provides access to a hash or cipher, both
   461  // Bind and Accept must be used. Once the setup process is complete, input
   462  // data can be written to the socket, processed by the kernel, and then read
   463  // back as hash output or ciphertext.
   464  //
   465  // Here is an example of using an AF_ALG socket with SHA1 hashing.
   466  // The initial socket setup process is as follows:
   467  //
   468  //      // Open a socket to perform SHA1 hashing.
   469  //      fd, _ := unix.Socket(unix.AF_ALG, unix.SOCK_SEQPACKET, 0)
   470  //      addr := &unix.SockaddrALG{Type: "hash", Name: "sha1"}
   471  //      unix.Bind(fd, addr)
   472  //      // Note: unix.Accept does not work at this time; must invoke accept()
   473  //      // manually using unix.Syscall.
   474  //      hashfd, _, _ := unix.Syscall(unix.SYS_ACCEPT, uintptr(fd), 0, 0)
   475  //
   476  // Once a file descriptor has been returned from Accept, it may be used to
   477  // perform SHA1 hashing. The descriptor is not safe for concurrent use, but
   478  // may be re-used repeatedly with subsequent Write and Read operations.
   479  //
   480  // When hashing a small byte slice or string, a single Write and Read may
   481  // be used:
   482  //
   483  //      // Assume hashfd is already configured using the setup process.
   484  //      hash := os.NewFile(hashfd, "sha1")
   485  //      // Hash an input string and read the results. Each Write discards
   486  //      // previous hash state. Read always reads the current state.
   487  //      b := make([]byte, 20)
   488  //      for i := 0; i < 2; i++ {
   489  //          io.WriteString(hash, "Hello, world.")
   490  //          hash.Read(b)
   491  //          fmt.Println(hex.EncodeToString(b))
   492  //      }
   493  //      // Output:
   494  //      // 2ae01472317d1935a84797ec1983ae243fc6aa28
   495  //      // 2ae01472317d1935a84797ec1983ae243fc6aa28
   496  //
   497  // For hashing larger byte slices, or byte streams such as those read from
   498  // a file or socket, use Sendto with MSG_MORE to instruct the kernel to update
   499  // the hash digest instead of creating a new one for a given chunk and finalizing it.
   500  //
   501  //      // Assume hashfd and addr are already configured using the setup process.
   502  //      hash := os.NewFile(hashfd, "sha1")
   503  //      // Hash the contents of a file.
   504  //      f, _ := os.Open("/tmp/linux-4.10-rc7.tar.xz")
   505  //      b := make([]byte, 4096)
   506  //      for {
   507  //          n, err := f.Read(b)
   508  //          if err == io.EOF {
   509  //              break
   510  //          }
   511  //          unix.Sendto(hashfd, b[:n], unix.MSG_MORE, addr)
   512  //      }
   513  //      hash.Read(b)
   514  //      fmt.Println(hex.EncodeToString(b))
   515  //      // Output: 85cdcad0c06eef66f805ecce353bec9accbeecc5
   516  //
   517  // For more information, see: http://www.chronox.de/crypto-API/crypto/userspace-if.html.
   518  type SockaddrALG struct {
   519  	Type    string
   520  	Name    string
   521  	Feature uint32
   522  	Mask    uint32
   523  	raw     RawSockaddrALG
   524  }
   525  
   526  func (sa *SockaddrALG) sockaddr() (unsafe.Pointer, _Socklen, error) {
   527  	// Leave room for NUL byte terminator.
   528  	if len(sa.Type) > 13 {
   529  		return nil, 0, EINVAL
   530  	}
   531  	if len(sa.Name) > 63 {
   532  		return nil, 0, EINVAL
   533  	}
   534  
   535  	sa.raw.Family = AF_ALG
   536  	sa.raw.Feat = sa.Feature
   537  	sa.raw.Mask = sa.Mask
   538  
   539  	typ, err := ByteSliceFromString(sa.Type)
   540  	if err != nil {
   541  		return nil, 0, err
   542  	}
   543  	name, err := ByteSliceFromString(sa.Name)
   544  	if err != nil {
   545  		return nil, 0, err
   546  	}
   547  
   548  	copy(sa.raw.Type[:], typ)
   549  	copy(sa.raw.Name[:], name)
   550  
   551  	return unsafe.Pointer(&sa.raw), SizeofSockaddrALG, nil
   552  }
   553  
   554  // SockaddrVM implements the Sockaddr interface for AF_VSOCK type sockets.
   555  // SockaddrVM provides access to Linux VM sockets: a mechanism that enables
   556  // bidirectional communication between a hypervisor and its guest virtual
   557  // machines.
   558  type SockaddrVM struct {
   559  	// CID and Port specify a context ID and port address for a VM socket.
   560  	// Guests have a unique CID, and hosts may have a well-known CID of:
   561  	//  - VMADDR_CID_HYPERVISOR: refers to the hypervisor process.
   562  	//  - VMADDR_CID_HOST: refers to other processes on the host.
   563  	CID  uint32
   564  	Port uint32
   565  	raw  RawSockaddrVM
   566  }
   567  
   568  func (sa *SockaddrVM) sockaddr() (unsafe.Pointer, _Socklen, error) {
   569  	sa.raw.Family = AF_VSOCK
   570  	sa.raw.Port = sa.Port
   571  	sa.raw.Cid = sa.CID
   572  
   573  	return unsafe.Pointer(&sa.raw), SizeofSockaddrVM, nil
   574  }
   575  
   576  func anyToSockaddr(rsa *RawSockaddrAny) (Sockaddr, error) {
   577  	switch rsa.Addr.Family {
   578  	case AF_NETLINK:
   579  		pp := (*RawSockaddrNetlink)(unsafe.Pointer(rsa))
   580  		sa := new(SockaddrNetlink)
   581  		sa.Family = pp.Family
   582  		sa.Pad = pp.Pad
   583  		sa.Pid = pp.Pid
   584  		sa.Groups = pp.Groups
   585  		return sa, nil
   586  
   587  	case AF_PACKET:
   588  		pp := (*RawSockaddrLinklayer)(unsafe.Pointer(rsa))
   589  		sa := new(SockaddrLinklayer)
   590  		sa.Protocol = pp.Protocol
   591  		sa.Ifindex = int(pp.Ifindex)
   592  		sa.Hatype = pp.Hatype
   593  		sa.Pkttype = pp.Pkttype
   594  		sa.Halen = pp.Halen
   595  		for i := 0; i < len(sa.Addr); i++ {
   596  			sa.Addr[i] = pp.Addr[i]
   597  		}
   598  		return sa, nil
   599  
   600  	case AF_UNIX:
   601  		pp := (*RawSockaddrUnix)(unsafe.Pointer(rsa))
   602  		sa := new(SockaddrUnix)
   603  		if pp.Path[0] == 0 {
   604  			// "Abstract" Unix domain socket.
   605  			// Rewrite leading NUL as @ for textual display.
   606  			// (This is the standard convention.)
   607  			// Not friendly to overwrite in place,
   608  			// but the callers below don't care.
   609  			pp.Path[0] = '@'
   610  		}
   611  
   612  		// Assume path ends at NUL.
   613  		// This is not technically the Linux semantics for
   614  		// abstract Unix domain sockets--they are supposed
   615  		// to be uninterpreted fixed-size binary blobs--but
   616  		// everyone uses this convention.
   617  		n := 0
   618  		for n < len(pp.Path) && pp.Path[n] != 0 {
   619  			n++
   620  		}
   621  		bytes := (*[10000]byte)(unsafe.Pointer(&pp.Path[0]))[0:n]
   622  		sa.Name = string(bytes)
   623  		return sa, nil
   624  
   625  	case AF_INET:
   626  		pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa))
   627  		sa := new(SockaddrInet4)
   628  		p := (*[2]byte)(unsafe.Pointer(&pp.Port))
   629  		sa.Port = int(p[0])<<8 + int(p[1])
   630  		for i := 0; i < len(sa.Addr); i++ {
   631  			sa.Addr[i] = pp.Addr[i]
   632  		}
   633  		return sa, nil
   634  
   635  	case AF_INET6:
   636  		pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa))
   637  		sa := new(SockaddrInet6)
   638  		p := (*[2]byte)(unsafe.Pointer(&pp.Port))
   639  		sa.Port = int(p[0])<<8 + int(p[1])
   640  		sa.ZoneId = pp.Scope_id
   641  		for i := 0; i < len(sa.Addr); i++ {
   642  			sa.Addr[i] = pp.Addr[i]
   643  		}
   644  		return sa, nil
   645  
   646  	case AF_VSOCK:
   647  		pp := (*RawSockaddrVM)(unsafe.Pointer(rsa))
   648  		sa := &SockaddrVM{
   649  			CID:  pp.Cid,
   650  			Port: pp.Port,
   651  		}
   652  		return sa, nil
   653  	}
   654  	return nil, EAFNOSUPPORT
   655  }
   656  
   657  func Accept(fd int) (nfd int, sa Sockaddr, err error) {
   658  	var rsa RawSockaddrAny
   659  	var len _Socklen = SizeofSockaddrAny
   660  	nfd, err = accept(fd, &rsa, &len)
   661  	if err != nil {
   662  		return
   663  	}
   664  	sa, err = anyToSockaddr(&rsa)
   665  	if err != nil {
   666  		Close(nfd)
   667  		nfd = 0
   668  	}
   669  	return
   670  }
   671  
   672  func Accept4(fd int, flags int) (nfd int, sa Sockaddr, err error) {
   673  	var rsa RawSockaddrAny
   674  	var len _Socklen = SizeofSockaddrAny
   675  	nfd, err = accept4(fd, &rsa, &len, flags)
   676  	if err != nil {
   677  		return
   678  	}
   679  	if len > SizeofSockaddrAny {
   680  		panic("RawSockaddrAny too small")
   681  	}
   682  	sa, err = anyToSockaddr(&rsa)
   683  	if err != nil {
   684  		Close(nfd)
   685  		nfd = 0
   686  	}
   687  	return
   688  }
   689  
   690  func Getsockname(fd int) (sa Sockaddr, err error) {
   691  	var rsa RawSockaddrAny
   692  	var len _Socklen = SizeofSockaddrAny
   693  	if err = getsockname(fd, &rsa, &len); err != nil {
   694  		return
   695  	}
   696  	return anyToSockaddr(&rsa)
   697  }
   698  
   699  func GetsockoptInet4Addr(fd, level, opt int) (value [4]byte, err error) {
   700  	vallen := _Socklen(4)
   701  	err = getsockopt(fd, level, opt, unsafe.Pointer(&value[0]), &vallen)
   702  	return value, err
   703  }
   704  
   705  func GetsockoptIPMreq(fd, level, opt int) (*IPMreq, error) {
   706  	var value IPMreq
   707  	vallen := _Socklen(SizeofIPMreq)
   708  	err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
   709  	return &value, err
   710  }
   711  
   712  func GetsockoptIPMreqn(fd, level, opt int) (*IPMreqn, error) {
   713  	var value IPMreqn
   714  	vallen := _Socklen(SizeofIPMreqn)
   715  	err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
   716  	return &value, err
   717  }
   718  
   719  func GetsockoptIPv6Mreq(fd, level, opt int) (*IPv6Mreq, error) {
   720  	var value IPv6Mreq
   721  	vallen := _Socklen(SizeofIPv6Mreq)
   722  	err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
   723  	return &value, err
   724  }
   725  
   726  func GetsockoptIPv6MTUInfo(fd, level, opt int) (*IPv6MTUInfo, error) {
   727  	var value IPv6MTUInfo
   728  	vallen := _Socklen(SizeofIPv6MTUInfo)
   729  	err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
   730  	return &value, err
   731  }
   732  
   733  func GetsockoptICMPv6Filter(fd, level, opt int) (*ICMPv6Filter, error) {
   734  	var value ICMPv6Filter
   735  	vallen := _Socklen(SizeofICMPv6Filter)
   736  	err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
   737  	return &value, err
   738  }
   739  
   740  func GetsockoptUcred(fd, level, opt int) (*Ucred, error) {
   741  	var value Ucred
   742  	vallen := _Socklen(SizeofUcred)
   743  	err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
   744  	return &value, err
   745  }
   746  
   747  func SetsockoptIPMreqn(fd, level, opt int, mreq *IPMreqn) (err error) {
   748  	return setsockopt(fd, level, opt, unsafe.Pointer(mreq), unsafe.Sizeof(*mreq))
   749  }
   750  
   751  func Recvmsg(fd int, p, oob []byte, flags int) (n, oobn int, recvflags int, from Sockaddr, err error) {
   752  	var msg Msghdr
   753  	var rsa RawSockaddrAny
   754  	msg.Name = (*byte)(unsafe.Pointer(&rsa))
   755  	msg.Namelen = uint32(SizeofSockaddrAny)
   756  	var iov Iovec
   757  	if len(p) > 0 {
   758  		iov.Base = (*byte)(unsafe.Pointer(&p[0]))
   759  		iov.SetLen(len(p))
   760  	}
   761  	var dummy byte
   762  	if len(oob) > 0 {
   763  		// receive at least one normal byte
   764  		if len(p) == 0 {
   765  			iov.Base = &dummy
   766  			iov.SetLen(1)
   767  		}
   768  		msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
   769  		msg.SetControllen(len(oob))
   770  	}
   771  	msg.Iov = &iov
   772  	msg.Iovlen = 1
   773  	if n, err = recvmsg(fd, &msg, flags); err != nil {
   774  		return
   775  	}
   776  	oobn = int(msg.Controllen)
   777  	recvflags = int(msg.Flags)
   778  	// source address is only specified if the socket is unconnected
   779  	if rsa.Addr.Family != AF_UNSPEC {
   780  		from, err = anyToSockaddr(&rsa)
   781  	}
   782  	return
   783  }
   784  
   785  func Sendmsg(fd int, p, oob []byte, to Sockaddr, flags int) (err error) {
   786  	_, err = SendmsgN(fd, p, oob, to, flags)
   787  	return
   788  }
   789  
   790  func SendmsgN(fd int, p, oob []byte, to Sockaddr, flags int) (n int, err error) {
   791  	var ptr unsafe.Pointer
   792  	var salen _Socklen
   793  	if to != nil {
   794  		var err error
   795  		ptr, salen, err = to.sockaddr()
   796  		if err != nil {
   797  			return 0, err
   798  		}
   799  	}
   800  	var msg Msghdr
   801  	msg.Name = (*byte)(unsafe.Pointer(ptr))
   802  	msg.Namelen = uint32(salen)
   803  	var iov Iovec
   804  	if len(p) > 0 {
   805  		iov.Base = (*byte)(unsafe.Pointer(&p[0]))
   806  		iov.SetLen(len(p))
   807  	}
   808  	var dummy byte
   809  	if len(oob) > 0 {
   810  		// send at least one normal byte
   811  		if len(p) == 0 {
   812  			iov.Base = &dummy
   813  			iov.SetLen(1)
   814  		}
   815  		msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
   816  		msg.SetControllen(len(oob))
   817  	}
   818  	msg.Iov = &iov
   819  	msg.Iovlen = 1
   820  	if n, err = sendmsg(fd, &msg, flags); err != nil {
   821  		return 0, err
   822  	}
   823  	if len(oob) > 0 && len(p) == 0 {
   824  		n = 0
   825  	}
   826  	return n, nil
   827  }
   828  
   829  // BindToDevice binds the socket associated with fd to device.
   830  func BindToDevice(fd int, device string) (err error) {
   831  	return SetsockoptString(fd, SOL_SOCKET, SO_BINDTODEVICE, device)
   832  }
   833  
   834  //sys	ptrace(request int, pid int, addr uintptr, data uintptr) (err error)
   835  
   836  func ptracePeek(req int, pid int, addr uintptr, out []byte) (count int, err error) {
   837  	// The peek requests are machine-size oriented, so we wrap it
   838  	// to retrieve arbitrary-length data.
   839  
   840  	// The ptrace syscall differs from glibc's ptrace.
   841  	// Peeks returns the word in *data, not as the return value.
   842  
   843  	var buf [sizeofPtr]byte
   844  
   845  	// Leading edge.  PEEKTEXT/PEEKDATA don't require aligned
   846  	// access (PEEKUSER warns that it might), but if we don't
   847  	// align our reads, we might straddle an unmapped page
   848  	// boundary and not get the bytes leading up to the page
   849  	// boundary.
   850  	n := 0
   851  	if addr%sizeofPtr != 0 {
   852  		err = ptrace(req, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
   853  		if err != nil {
   854  			return 0, err
   855  		}
   856  		n += copy(out, buf[addr%sizeofPtr:])
   857  		out = out[n:]
   858  	}
   859  
   860  	// Remainder.
   861  	for len(out) > 0 {
   862  		// We use an internal buffer to guarantee alignment.
   863  		// It's not documented if this is necessary, but we're paranoid.
   864  		err = ptrace(req, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
   865  		if err != nil {
   866  			return n, err
   867  		}
   868  		copied := copy(out, buf[0:])
   869  		n += copied
   870  		out = out[copied:]
   871  	}
   872  
   873  	return n, nil
   874  }
   875  
   876  func PtracePeekText(pid int, addr uintptr, out []byte) (count int, err error) {
   877  	return ptracePeek(PTRACE_PEEKTEXT, pid, addr, out)
   878  }
   879  
   880  func PtracePeekData(pid int, addr uintptr, out []byte) (count int, err error) {
   881  	return ptracePeek(PTRACE_PEEKDATA, pid, addr, out)
   882  }
   883  
   884  func PtracePeekUser(pid int, addr uintptr, out []byte) (count int, err error) {
   885  	return ptracePeek(PTRACE_PEEKUSR, pid, addr, out)
   886  }
   887  
   888  func ptracePoke(pokeReq int, peekReq int, pid int, addr uintptr, data []byte) (count int, err error) {
   889  	// As for ptracePeek, we need to align our accesses to deal
   890  	// with the possibility of straddling an invalid page.
   891  
   892  	// Leading edge.
   893  	n := 0
   894  	if addr%sizeofPtr != 0 {
   895  		var buf [sizeofPtr]byte
   896  		err = ptrace(peekReq, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
   897  		if err != nil {
   898  			return 0, err
   899  		}
   900  		n += copy(buf[addr%sizeofPtr:], data)
   901  		word := *((*uintptr)(unsafe.Pointer(&buf[0])))
   902  		err = ptrace(pokeReq, pid, addr-addr%sizeofPtr, word)
   903  		if err != nil {
   904  			return 0, err
   905  		}
   906  		data = data[n:]
   907  	}
   908  
   909  	// Interior.
   910  	for len(data) > sizeofPtr {
   911  		word := *((*uintptr)(unsafe.Pointer(&data[0])))
   912  		err = ptrace(pokeReq, pid, addr+uintptr(n), word)
   913  		if err != nil {
   914  			return n, err
   915  		}
   916  		n += sizeofPtr
   917  		data = data[sizeofPtr:]
   918  	}
   919  
   920  	// Trailing edge.
   921  	if len(data) > 0 {
   922  		var buf [sizeofPtr]byte
   923  		err = ptrace(peekReq, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
   924  		if err != nil {
   925  			return n, err
   926  		}
   927  		copy(buf[0:], data)
   928  		word := *((*uintptr)(unsafe.Pointer(&buf[0])))
   929  		err = ptrace(pokeReq, pid, addr+uintptr(n), word)
   930  		if err != nil {
   931  			return n, err
   932  		}
   933  		n += len(data)
   934  	}
   935  
   936  	return n, nil
   937  }
   938  
   939  func PtracePokeText(pid int, addr uintptr, data []byte) (count int, err error) {
   940  	return ptracePoke(PTRACE_POKETEXT, PTRACE_PEEKTEXT, pid, addr, data)
   941  }
   942  
   943  func PtracePokeData(pid int, addr uintptr, data []byte) (count int, err error) {
   944  	return ptracePoke(PTRACE_POKEDATA, PTRACE_PEEKDATA, pid, addr, data)
   945  }
   946  
   947  func PtraceGetRegs(pid int, regsout *PtraceRegs) (err error) {
   948  	return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
   949  }
   950  
   951  func PtraceSetRegs(pid int, regs *PtraceRegs) (err error) {
   952  	return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
   953  }
   954  
   955  func PtraceSetOptions(pid int, options int) (err error) {
   956  	return ptrace(PTRACE_SETOPTIONS, pid, 0, uintptr(options))
   957  }
   958  
   959  func PtraceGetEventMsg(pid int) (msg uint, err error) {
   960  	var data _C_long
   961  	err = ptrace(PTRACE_GETEVENTMSG, pid, 0, uintptr(unsafe.Pointer(&data)))
   962  	msg = uint(data)
   963  	return
   964  }
   965  
   966  func PtraceCont(pid int, signal int) (err error) {
   967  	return ptrace(PTRACE_CONT, pid, 0, uintptr(signal))
   968  }
   969  
   970  func PtraceSyscall(pid int, signal int) (err error) {
   971  	return ptrace(PTRACE_SYSCALL, pid, 0, uintptr(signal))
   972  }
   973  
   974  func PtraceSingleStep(pid int) (err error) { return ptrace(PTRACE_SINGLESTEP, pid, 0, 0) }
   975  
   976  func PtraceAttach(pid int) (err error) { return ptrace(PTRACE_ATTACH, pid, 0, 0) }
   977  
   978  func PtraceDetach(pid int) (err error) { return ptrace(PTRACE_DETACH, pid, 0, 0) }
   979  
   980  //sys	reboot(magic1 uint, magic2 uint, cmd int, arg string) (err error)
   981  
   982  func Reboot(cmd int) (err error) {
   983  	return reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2, cmd, "")
   984  }
   985  
   986  func ReadDirent(fd int, buf []byte) (n int, err error) {
   987  	return Getdents(fd, buf)
   988  }
   989  
   990  func direntIno(buf []byte) (uint64, bool) {
   991  	return readInt(buf, unsafe.Offsetof(Dirent{}.Ino), unsafe.Sizeof(Dirent{}.Ino))
   992  }
   993  
   994  func direntReclen(buf []byte) (uint64, bool) {
   995  	return readInt(buf, unsafe.Offsetof(Dirent{}.Reclen), unsafe.Sizeof(Dirent{}.Reclen))
   996  }
   997  
   998  func direntNamlen(buf []byte) (uint64, bool) {
   999  	reclen, ok := direntReclen(buf)
  1000  	if !ok {
  1001  		return 0, false
  1002  	}
  1003  	return reclen - uint64(unsafe.Offsetof(Dirent{}.Name)), true
  1004  }
  1005  
  1006  //sys	mount(source string, target string, fstype string, flags uintptr, data *byte) (err error)
  1007  
  1008  func Mount(source string, target string, fstype string, flags uintptr, data string) (err error) {
  1009  	// Certain file systems get rather angry and EINVAL if you give
  1010  	// them an empty string of data, rather than NULL.
  1011  	if data == "" {
  1012  		return mount(source, target, fstype, flags, nil)
  1013  	}
  1014  	datap, err := BytePtrFromString(data)
  1015  	if err != nil {
  1016  		return err
  1017  	}
  1018  	return mount(source, target, fstype, flags, datap)
  1019  }
  1020  
  1021  // Sendto
  1022  // Recvfrom
  1023  // Socketpair
  1024  
  1025  /*
  1026   * Direct access
  1027   */
  1028  //sys	Acct(path string) (err error)
  1029  //sys	Adjtimex(buf *Timex) (state int, err error)
  1030  //sys	Chdir(path string) (err error)
  1031  //sys	Chroot(path string) (err error)
  1032  //sys	ClockGettime(clockid int32, time *Timespec) (err error)
  1033  //sys	Close(fd int) (err error)
  1034  //sys	Dup(oldfd int) (fd int, err error)
  1035  //sys	Dup3(oldfd int, newfd int, flags int) (err error)
  1036  //sysnb	EpollCreate(size int) (fd int, err error)
  1037  //sysnb	EpollCreate1(flag int) (fd int, err error)
  1038  //sysnb	EpollCtl(epfd int, op int, fd int, event *EpollEvent) (err error)
  1039  //sys	Exit(code int) = SYS_EXIT_GROUP
  1040  //sys	Faccessat(dirfd int, path string, mode uint32, flags int) (err error)
  1041  //sys	Fallocate(fd int, mode uint32, off int64, len int64) (err error)
  1042  //sys	Fchdir(fd int) (err error)
  1043  //sys	Fchmod(fd int, mode uint32) (err error)
  1044  //sys	Fchmodat(dirfd int, path string, mode uint32, flags int) (err error)
  1045  //sys	Fchownat(dirfd int, path string, uid int, gid int, flags int) (err error)
  1046  //sys	fcntl(fd int, cmd int, arg int) (val int, err error)
  1047  //sys	Fdatasync(fd int) (err error)
  1048  //sys	Flock(fd int, how int) (err error)
  1049  //sys	Fsync(fd int) (err error)
  1050  //sys	Getdents(fd int, buf []byte) (n int, err error) = SYS_GETDENTS64
  1051  //sysnb	Getpgid(pid int) (pgid int, err error)
  1052  
  1053  func Getpgrp() (pid int) {
  1054  	pid, _ = Getpgid(0)
  1055  	return
  1056  }
  1057  
  1058  //sysnb	Getpid() (pid int)
  1059  //sysnb	Getppid() (ppid int)
  1060  //sys	Getpriority(which int, who int) (prio int, err error)
  1061  //sys	Getrandom(buf []byte, flags int) (n int, err error)
  1062  //sysnb	Getrusage(who int, rusage *Rusage) (err error)
  1063  //sysnb	Getsid(pid int) (sid int, err error)
  1064  //sysnb	Gettid() (tid int)
  1065  //sys	Getxattr(path string, attr string, dest []byte) (sz int, err error)
  1066  //sys	InotifyAddWatch(fd int, pathname string, mask uint32) (watchdesc int, err error)
  1067  //sysnb	InotifyInit1(flags int) (fd int, err error)
  1068  //sysnb	InotifyRmWatch(fd int, watchdesc uint32) (success int, err error)
  1069  //sysnb	Kill(pid int, sig syscall.Signal) (err error)
  1070  //sys	Klogctl(typ int, buf []byte) (n int, err error) = SYS_SYSLOG
  1071  //sys	Listxattr(path string, dest []byte) (sz int, err error)
  1072  //sys	Mkdirat(dirfd int, path string, mode uint32) (err error)
  1073  //sys	Mknodat(dirfd int, path string, mode uint32, dev int) (err error)
  1074  //sys	Nanosleep(time *Timespec, leftover *Timespec) (err error)
  1075  //sys	PivotRoot(newroot string, putold string) (err error) = SYS_PIVOT_ROOT
  1076  //sysnb prlimit(pid int, resource int, newlimit *Rlimit, old *Rlimit) (err error) = SYS_PRLIMIT64
  1077  //sys   Prctl(option int, arg2 uintptr, arg3 uintptr, arg4 uintptr, arg5 uintptr) (err error)
  1078  //sys	read(fd int, p []byte) (n int, err error)
  1079  //sys	Removexattr(path string, attr string) (err error)
  1080  //sys	Renameat(olddirfd int, oldpath string, newdirfd int, newpath string) (err error)
  1081  //sys	Setdomainname(p []byte) (err error)
  1082  //sys	Sethostname(p []byte) (err error)
  1083  //sysnb	Setpgid(pid int, pgid int) (err error)
  1084  //sysnb	Setsid() (pid int, err error)
  1085  //sysnb	Settimeofday(tv *Timeval) (err error)
  1086  //sys	Setns(fd int, nstype int) (err error)
  1087  
  1088  // issue 1435.
  1089  // On linux Setuid and Setgid only affects the current thread, not the process.
  1090  // This does not match what most callers expect so we must return an error
  1091  // here rather than letting the caller think that the call succeeded.
  1092  
  1093  func Setuid(uid int) (err error) {
  1094  	return EOPNOTSUPP
  1095  }
  1096  
  1097  func Setgid(uid int) (err error) {
  1098  	return EOPNOTSUPP
  1099  }
  1100  
  1101  //sys	Setpriority(which int, who int, prio int) (err error)
  1102  //sys	Setxattr(path string, attr string, data []byte, flags int) (err error)
  1103  //sys	Sync()
  1104  //sysnb	Sysinfo(info *Sysinfo_t) (err error)
  1105  //sys	Tee(rfd int, wfd int, len int, flags int) (n int64, err error)
  1106  //sysnb	Tgkill(tgid int, tid int, sig syscall.Signal) (err error)
  1107  //sysnb	Times(tms *Tms) (ticks uintptr, err error)
  1108  //sysnb	Umask(mask int) (oldmask int)
  1109  //sysnb	Uname(buf *Utsname) (err error)
  1110  //sys	Unmount(target string, flags int) (err error) = SYS_UMOUNT2
  1111  //sys	Unshare(flags int) (err error)
  1112  //sys	Ustat(dev int, ubuf *Ustat_t) (err error)
  1113  //sys	write(fd int, p []byte) (n int, err error)
  1114  //sys	exitThread(code int) (err error) = SYS_EXIT
  1115  //sys	readlen(fd int, p *byte, np int) (n int, err error) = SYS_READ
  1116  //sys	writelen(fd int, p *byte, np int) (n int, err error) = SYS_WRITE
  1117  
  1118  // mmap varies by architecture; see syscall_linux_*.go.
  1119  //sys	munmap(addr uintptr, length uintptr) (err error)
  1120  
  1121  var mapper = &mmapper{
  1122  	active: make(map[*byte][]byte),
  1123  	mmap:   mmap,
  1124  	munmap: munmap,
  1125  }
  1126  
  1127  func Mmap(fd int, offset int64, length int, prot int, flags int) (data []byte, err error) {
  1128  	return mapper.Mmap(fd, offset, length, prot, flags)
  1129  }
  1130  
  1131  func Munmap(b []byte) (err error) {
  1132  	return mapper.Munmap(b)
  1133  }
  1134  
  1135  //sys	Madvise(b []byte, advice int) (err error)
  1136  //sys	Mprotect(b []byte, prot int) (err error)
  1137  //sys	Mlock(b []byte) (err error)
  1138  //sys	Munlock(b []byte) (err error)
  1139  //sys	Mlockall(flags int) (err error)
  1140  //sys	Munlockall() (err error)
  1141  
  1142  // Vmsplice splices user pages from a slice of Iovecs into a pipe specified by fd,
  1143  // using the specified flags.
  1144  func Vmsplice(fd int, iovs []Iovec, flags int) (int, error) {
  1145  	n, _, errno := Syscall6(
  1146  		SYS_VMSPLICE,
  1147  		uintptr(fd),
  1148  		uintptr(unsafe.Pointer(&iovs[0])),
  1149  		uintptr(len(iovs)),
  1150  		uintptr(flags),
  1151  		0,
  1152  		0,
  1153  	)
  1154  	if errno != 0 {
  1155  		return 0, syscall.Errno(errno)
  1156  	}
  1157  
  1158  	return int(n), nil
  1159  }
  1160  
  1161  /*
  1162   * Unimplemented
  1163   */
  1164  // AddKey
  1165  // AfsSyscall
  1166  // Alarm
  1167  // ArchPrctl
  1168  // Brk
  1169  // Capget
  1170  // Capset
  1171  // ClockGetres
  1172  // ClockNanosleep
  1173  // ClockSettime
  1174  // Clone
  1175  // CreateModule
  1176  // DeleteModule
  1177  // EpollCtlOld
  1178  // EpollPwait
  1179  // EpollWaitOld
  1180  // Eventfd
  1181  // Execve
  1182  // Fgetxattr
  1183  // Flistxattr
  1184  // Fork
  1185  // Fremovexattr
  1186  // Fsetxattr
  1187  // Futex
  1188  // GetKernelSyms
  1189  // GetMempolicy
  1190  // GetRobustList
  1191  // GetThreadArea
  1192  // Getitimer
  1193  // Getpmsg
  1194  // IoCancel
  1195  // IoDestroy
  1196  // IoGetevents
  1197  // IoSetup
  1198  // IoSubmit
  1199  // Ioctl
  1200  // IoprioGet
  1201  // IoprioSet
  1202  // KexecLoad
  1203  // Keyctl
  1204  // Lgetxattr
  1205  // Llistxattr
  1206  // LookupDcookie
  1207  // Lremovexattr
  1208  // Lsetxattr
  1209  // Mbind
  1210  // MigratePages
  1211  // Mincore
  1212  // ModifyLdt
  1213  // Mount
  1214  // MovePages
  1215  // Mprotect
  1216  // MqGetsetattr
  1217  // MqNotify
  1218  // MqOpen
  1219  // MqTimedreceive
  1220  // MqTimedsend
  1221  // MqUnlink
  1222  // Mremap
  1223  // Msgctl
  1224  // Msgget
  1225  // Msgrcv
  1226  // Msgsnd
  1227  // Msync
  1228  // Newfstatat
  1229  // Nfsservctl
  1230  // Personality
  1231  // Pselect6
  1232  // Ptrace
  1233  // Putpmsg
  1234  // QueryModule
  1235  // Quotactl
  1236  // Readahead
  1237  // Readv
  1238  // RemapFilePages
  1239  // RequestKey
  1240  // RestartSyscall
  1241  // RtSigaction
  1242  // RtSigpending
  1243  // RtSigprocmask
  1244  // RtSigqueueinfo
  1245  // RtSigreturn
  1246  // RtSigsuspend
  1247  // RtSigtimedwait
  1248  // SchedGetPriorityMax
  1249  // SchedGetPriorityMin
  1250  // SchedGetaffinity
  1251  // SchedGetparam
  1252  // SchedGetscheduler
  1253  // SchedRrGetInterval
  1254  // SchedSetaffinity
  1255  // SchedSetparam
  1256  // SchedYield
  1257  // Security
  1258  // Semctl
  1259  // Semget
  1260  // Semop
  1261  // Semtimedop
  1262  // SetMempolicy
  1263  // SetRobustList
  1264  // SetThreadArea
  1265  // SetTidAddress
  1266  // Shmat
  1267  // Shmctl
  1268  // Shmdt
  1269  // Shmget
  1270  // Sigaltstack
  1271  // Signalfd
  1272  // Swapoff
  1273  // Swapon
  1274  // Sysfs
  1275  // TimerCreate
  1276  // TimerDelete
  1277  // TimerGetoverrun
  1278  // TimerGettime
  1279  // TimerSettime
  1280  // Timerfd
  1281  // Tkill (obsolete)
  1282  // Tuxcall
  1283  // Umount2
  1284  // Uselib
  1285  // Utimensat
  1286  // Vfork
  1287  // Vhangup
  1288  // Vserver
  1289  // Waitid
  1290  // _Sysctl