github.com/jgarto/itcv@v0.0.0-20180826224514-4eea09c1aa0d/_vendor/src/golang.org/x/sys/unix/syscall_linux.go (about) 1 // Copyright 2009 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 // Linux system calls. 6 // This file is compiled as ordinary Go code, 7 // but it is also input to mksyscall, 8 // which parses the //sys lines and generates system call stubs. 9 // Note that sometimes we use a lowercase //sys name and 10 // wrap it in our own nicer implementation. 11 12 package unix 13 14 import ( 15 "syscall" 16 "unsafe" 17 ) 18 19 /* 20 * Wrapped 21 */ 22 23 func Access(path string, mode uint32) (err error) { 24 return Faccessat(AT_FDCWD, path, mode, 0) 25 } 26 27 func Chmod(path string, mode uint32) (err error) { 28 return Fchmodat(AT_FDCWD, path, mode, 0) 29 } 30 31 func Chown(path string, uid int, gid int) (err error) { 32 return Fchownat(AT_FDCWD, path, uid, gid, 0) 33 } 34 35 func Creat(path string, mode uint32) (fd int, err error) { 36 return Open(path, O_CREAT|O_WRONLY|O_TRUNC, mode) 37 } 38 39 //sys Linkat(olddirfd int, oldpath string, newdirfd int, newpath string, flags int) (err error) 40 41 func Link(oldpath string, newpath string) (err error) { 42 return Linkat(AT_FDCWD, oldpath, AT_FDCWD, newpath, 0) 43 } 44 45 func Mkdir(path string, mode uint32) (err error) { 46 return Mkdirat(AT_FDCWD, path, mode) 47 } 48 49 func Mknod(path string, mode uint32, dev int) (err error) { 50 return Mknodat(AT_FDCWD, path, mode, dev) 51 } 52 53 func Open(path string, mode int, perm uint32) (fd int, err error) { 54 return openat(AT_FDCWD, path, mode|O_LARGEFILE, perm) 55 } 56 57 //sys openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) 58 59 func Openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) { 60 return openat(dirfd, path, flags|O_LARGEFILE, mode) 61 } 62 63 //sys ppoll(fds *PollFd, nfds int, timeout *Timespec, sigmask *Sigset_t) (n int, err error) 64 65 func Ppoll(fds []PollFd, timeout *Timespec, sigmask *Sigset_t) (n int, err error) { 66 if len(fds) == 0 { 67 return ppoll(nil, 0, timeout, sigmask) 68 } 69 return ppoll(&fds[0], len(fds), timeout, sigmask) 70 } 71 72 //sys Readlinkat(dirfd int, path string, buf []byte) (n int, err error) 73 74 func Readlink(path string, buf []byte) (n int, err error) { 75 return Readlinkat(AT_FDCWD, path, buf) 76 } 77 78 func Rename(oldpath string, newpath string) (err error) { 79 return Renameat(AT_FDCWD, oldpath, AT_FDCWD, newpath) 80 } 81 82 func Rmdir(path string) error { 83 return Unlinkat(AT_FDCWD, path, AT_REMOVEDIR) 84 } 85 86 //sys Symlinkat(oldpath string, newdirfd int, newpath string) (err error) 87 88 func Symlink(oldpath string, newpath string) (err error) { 89 return Symlinkat(oldpath, AT_FDCWD, newpath) 90 } 91 92 func Unlink(path string) error { 93 return Unlinkat(AT_FDCWD, path, 0) 94 } 95 96 //sys Unlinkat(dirfd int, path string, flags int) (err error) 97 98 //sys utimes(path string, times *[2]Timeval) (err error) 99 100 func Utimes(path string, tv []Timeval) error { 101 if tv == nil { 102 err := utimensat(AT_FDCWD, path, nil, 0) 103 if err != ENOSYS { 104 return err 105 } 106 return utimes(path, nil) 107 } 108 if len(tv) != 2 { 109 return EINVAL 110 } 111 var ts [2]Timespec 112 ts[0] = NsecToTimespec(TimevalToNsec(tv[0])) 113 ts[1] = NsecToTimespec(TimevalToNsec(tv[1])) 114 err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0) 115 if err != ENOSYS { 116 return err 117 } 118 return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0]))) 119 } 120 121 //sys utimensat(dirfd int, path string, times *[2]Timespec, flags int) (err error) 122 123 func UtimesNano(path string, ts []Timespec) error { 124 if ts == nil { 125 err := utimensat(AT_FDCWD, path, nil, 0) 126 if err != ENOSYS { 127 return err 128 } 129 return utimes(path, nil) 130 } 131 if len(ts) != 2 { 132 return EINVAL 133 } 134 err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0) 135 if err != ENOSYS { 136 return err 137 } 138 // If the utimensat syscall isn't available (utimensat was added to Linux 139 // in 2.6.22, Released, 8 July 2007) then fall back to utimes 140 var tv [2]Timeval 141 for i := 0; i < 2; i++ { 142 tv[i] = NsecToTimeval(TimespecToNsec(ts[i])) 143 } 144 return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0]))) 145 } 146 147 func UtimesNanoAt(dirfd int, path string, ts []Timespec, flags int) error { 148 if ts == nil { 149 return utimensat(dirfd, path, nil, flags) 150 } 151 if len(ts) != 2 { 152 return EINVAL 153 } 154 return utimensat(dirfd, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), flags) 155 } 156 157 //sys futimesat(dirfd int, path *byte, times *[2]Timeval) (err error) 158 159 func Futimesat(dirfd int, path string, tv []Timeval) error { 160 pathp, err := BytePtrFromString(path) 161 if err != nil { 162 return err 163 } 164 if tv == nil { 165 return futimesat(dirfd, pathp, nil) 166 } 167 if len(tv) != 2 { 168 return EINVAL 169 } 170 return futimesat(dirfd, pathp, (*[2]Timeval)(unsafe.Pointer(&tv[0]))) 171 } 172 173 func Futimes(fd int, tv []Timeval) (err error) { 174 // Believe it or not, this is the best we can do on Linux 175 // (and is what glibc does). 176 return Utimes("/proc/self/fd/"+itoa(fd), tv) 177 } 178 179 const ImplementsGetwd = true 180 181 //sys Getcwd(buf []byte) (n int, err error) 182 183 func Getwd() (wd string, err error) { 184 var buf [PathMax]byte 185 n, err := Getcwd(buf[0:]) 186 if err != nil { 187 return "", err 188 } 189 // Getcwd returns the number of bytes written to buf, including the NUL. 190 if n < 1 || n > len(buf) || buf[n-1] != 0 { 191 return "", EINVAL 192 } 193 return string(buf[0 : n-1]), nil 194 } 195 196 func Getgroups() (gids []int, err error) { 197 n, err := getgroups(0, nil) 198 if err != nil { 199 return nil, err 200 } 201 if n == 0 { 202 return nil, nil 203 } 204 205 // Sanity check group count. Max is 1<<16 on Linux. 206 if n < 0 || n > 1<<20 { 207 return nil, EINVAL 208 } 209 210 a := make([]_Gid_t, n) 211 n, err = getgroups(n, &a[0]) 212 if err != nil { 213 return nil, err 214 } 215 gids = make([]int, n) 216 for i, v := range a[0:n] { 217 gids[i] = int(v) 218 } 219 return 220 } 221 222 func Setgroups(gids []int) (err error) { 223 if len(gids) == 0 { 224 return setgroups(0, nil) 225 } 226 227 a := make([]_Gid_t, len(gids)) 228 for i, v := range gids { 229 a[i] = _Gid_t(v) 230 } 231 return setgroups(len(a), &a[0]) 232 } 233 234 type WaitStatus uint32 235 236 // Wait status is 7 bits at bottom, either 0 (exited), 237 // 0x7F (stopped), or a signal number that caused an exit. 238 // The 0x80 bit is whether there was a core dump. 239 // An extra number (exit code, signal causing a stop) 240 // is in the high bits. At least that's the idea. 241 // There are various irregularities. For example, the 242 // "continued" status is 0xFFFF, distinguishing itself 243 // from stopped via the core dump bit. 244 245 const ( 246 mask = 0x7F 247 core = 0x80 248 exited = 0x00 249 stopped = 0x7F 250 shift = 8 251 ) 252 253 func (w WaitStatus) Exited() bool { return w&mask == exited } 254 255 func (w WaitStatus) Signaled() bool { return w&mask != stopped && w&mask != exited } 256 257 func (w WaitStatus) Stopped() bool { return w&0xFF == stopped } 258 259 func (w WaitStatus) Continued() bool { return w == 0xFFFF } 260 261 func (w WaitStatus) CoreDump() bool { return w.Signaled() && w&core != 0 } 262 263 func (w WaitStatus) ExitStatus() int { 264 if !w.Exited() { 265 return -1 266 } 267 return int(w>>shift) & 0xFF 268 } 269 270 func (w WaitStatus) Signal() syscall.Signal { 271 if !w.Signaled() { 272 return -1 273 } 274 return syscall.Signal(w & mask) 275 } 276 277 func (w WaitStatus) StopSignal() syscall.Signal { 278 if !w.Stopped() { 279 return -1 280 } 281 return syscall.Signal(w>>shift) & 0xFF 282 } 283 284 func (w WaitStatus) TrapCause() int { 285 if w.StopSignal() != SIGTRAP { 286 return -1 287 } 288 return int(w>>shift) >> 8 289 } 290 291 //sys wait4(pid int, wstatus *_C_int, options int, rusage *Rusage) (wpid int, err error) 292 293 func Wait4(pid int, wstatus *WaitStatus, options int, rusage *Rusage) (wpid int, err error) { 294 var status _C_int 295 wpid, err = wait4(pid, &status, options, rusage) 296 if wstatus != nil { 297 *wstatus = WaitStatus(status) 298 } 299 return 300 } 301 302 func Mkfifo(path string, mode uint32) (err error) { 303 return Mknod(path, mode|S_IFIFO, 0) 304 } 305 306 func (sa *SockaddrInet4) sockaddr() (unsafe.Pointer, _Socklen, error) { 307 if sa.Port < 0 || sa.Port > 0xFFFF { 308 return nil, 0, EINVAL 309 } 310 sa.raw.Family = AF_INET 311 p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port)) 312 p[0] = byte(sa.Port >> 8) 313 p[1] = byte(sa.Port) 314 for i := 0; i < len(sa.Addr); i++ { 315 sa.raw.Addr[i] = sa.Addr[i] 316 } 317 return unsafe.Pointer(&sa.raw), SizeofSockaddrInet4, nil 318 } 319 320 func (sa *SockaddrInet6) sockaddr() (unsafe.Pointer, _Socklen, error) { 321 if sa.Port < 0 || sa.Port > 0xFFFF { 322 return nil, 0, EINVAL 323 } 324 sa.raw.Family = AF_INET6 325 p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port)) 326 p[0] = byte(sa.Port >> 8) 327 p[1] = byte(sa.Port) 328 sa.raw.Scope_id = sa.ZoneId 329 for i := 0; i < len(sa.Addr); i++ { 330 sa.raw.Addr[i] = sa.Addr[i] 331 } 332 return unsafe.Pointer(&sa.raw), SizeofSockaddrInet6, nil 333 } 334 335 func (sa *SockaddrUnix) sockaddr() (unsafe.Pointer, _Socklen, error) { 336 name := sa.Name 337 n := len(name) 338 if n >= len(sa.raw.Path) { 339 return nil, 0, EINVAL 340 } 341 sa.raw.Family = AF_UNIX 342 for i := 0; i < n; i++ { 343 sa.raw.Path[i] = int8(name[i]) 344 } 345 // length is family (uint16), name, NUL. 346 sl := _Socklen(2) 347 if n > 0 { 348 sl += _Socklen(n) + 1 349 } 350 if sa.raw.Path[0] == '@' { 351 sa.raw.Path[0] = 0 352 // Don't count trailing NUL for abstract address. 353 sl-- 354 } 355 356 return unsafe.Pointer(&sa.raw), sl, nil 357 } 358 359 type SockaddrLinklayer struct { 360 Protocol uint16 361 Ifindex int 362 Hatype uint16 363 Pkttype uint8 364 Halen uint8 365 Addr [8]byte 366 raw RawSockaddrLinklayer 367 } 368 369 func (sa *SockaddrLinklayer) sockaddr() (unsafe.Pointer, _Socklen, error) { 370 if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff { 371 return nil, 0, EINVAL 372 } 373 sa.raw.Family = AF_PACKET 374 sa.raw.Protocol = sa.Protocol 375 sa.raw.Ifindex = int32(sa.Ifindex) 376 sa.raw.Hatype = sa.Hatype 377 sa.raw.Pkttype = sa.Pkttype 378 sa.raw.Halen = sa.Halen 379 for i := 0; i < len(sa.Addr); i++ { 380 sa.raw.Addr[i] = sa.Addr[i] 381 } 382 return unsafe.Pointer(&sa.raw), SizeofSockaddrLinklayer, nil 383 } 384 385 type SockaddrNetlink struct { 386 Family uint16 387 Pad uint16 388 Pid uint32 389 Groups uint32 390 raw RawSockaddrNetlink 391 } 392 393 func (sa *SockaddrNetlink) sockaddr() (unsafe.Pointer, _Socklen, error) { 394 sa.raw.Family = AF_NETLINK 395 sa.raw.Pad = sa.Pad 396 sa.raw.Pid = sa.Pid 397 sa.raw.Groups = sa.Groups 398 return unsafe.Pointer(&sa.raw), SizeofSockaddrNetlink, nil 399 } 400 401 type SockaddrHCI struct { 402 Dev uint16 403 Channel uint16 404 raw RawSockaddrHCI 405 } 406 407 func (sa *SockaddrHCI) sockaddr() (unsafe.Pointer, _Socklen, error) { 408 sa.raw.Family = AF_BLUETOOTH 409 sa.raw.Dev = sa.Dev 410 sa.raw.Channel = sa.Channel 411 return unsafe.Pointer(&sa.raw), SizeofSockaddrHCI, nil 412 } 413 414 // SockaddrCAN implements the Sockaddr interface for AF_CAN type sockets. 415 // The RxID and TxID fields are used for transport protocol addressing in 416 // (CAN_TP16, CAN_TP20, CAN_MCNET, and CAN_ISOTP), they can be left with 417 // zero values for CAN_RAW and CAN_BCM sockets as they have no meaning. 418 // 419 // The SockaddrCAN struct must be bound to the socket file descriptor 420 // using Bind before the CAN socket can be used. 421 // 422 // // Read one raw CAN frame 423 // fd, _ := Socket(AF_CAN, SOCK_RAW, CAN_RAW) 424 // addr := &SockaddrCAN{Ifindex: index} 425 // Bind(fd, addr) 426 // frame := make([]byte, 16) 427 // Read(fd, frame) 428 // 429 // The full SocketCAN documentation can be found in the linux kernel 430 // archives at: https://www.kernel.org/doc/Documentation/networking/can.txt 431 type SockaddrCAN struct { 432 Ifindex int 433 RxID uint32 434 TxID uint32 435 raw RawSockaddrCAN 436 } 437 438 func (sa *SockaddrCAN) sockaddr() (unsafe.Pointer, _Socklen, error) { 439 if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff { 440 return nil, 0, EINVAL 441 } 442 sa.raw.Family = AF_CAN 443 sa.raw.Ifindex = int32(sa.Ifindex) 444 rx := (*[4]byte)(unsafe.Pointer(&sa.RxID)) 445 for i := 0; i < 4; i++ { 446 sa.raw.Addr[i] = rx[i] 447 } 448 tx := (*[4]byte)(unsafe.Pointer(&sa.TxID)) 449 for i := 0; i < 4; i++ { 450 sa.raw.Addr[i+4] = tx[i] 451 } 452 return unsafe.Pointer(&sa.raw), SizeofSockaddrCAN, nil 453 } 454 455 // SockaddrALG implements the Sockaddr interface for AF_ALG type sockets. 456 // SockaddrALG enables userspace access to the Linux kernel's cryptography 457 // subsystem. The Type and Name fields specify which type of hash or cipher 458 // should be used with a given socket. 459 // 460 // To create a file descriptor that provides access to a hash or cipher, both 461 // Bind and Accept must be used. Once the setup process is complete, input 462 // data can be written to the socket, processed by the kernel, and then read 463 // back as hash output or ciphertext. 464 // 465 // Here is an example of using an AF_ALG socket with SHA1 hashing. 466 // The initial socket setup process is as follows: 467 // 468 // // Open a socket to perform SHA1 hashing. 469 // fd, _ := unix.Socket(unix.AF_ALG, unix.SOCK_SEQPACKET, 0) 470 // addr := &unix.SockaddrALG{Type: "hash", Name: "sha1"} 471 // unix.Bind(fd, addr) 472 // // Note: unix.Accept does not work at this time; must invoke accept() 473 // // manually using unix.Syscall. 474 // hashfd, _, _ := unix.Syscall(unix.SYS_ACCEPT, uintptr(fd), 0, 0) 475 // 476 // Once a file descriptor has been returned from Accept, it may be used to 477 // perform SHA1 hashing. The descriptor is not safe for concurrent use, but 478 // may be re-used repeatedly with subsequent Write and Read operations. 479 // 480 // When hashing a small byte slice or string, a single Write and Read may 481 // be used: 482 // 483 // // Assume hashfd is already configured using the setup process. 484 // hash := os.NewFile(hashfd, "sha1") 485 // // Hash an input string and read the results. Each Write discards 486 // // previous hash state. Read always reads the current state. 487 // b := make([]byte, 20) 488 // for i := 0; i < 2; i++ { 489 // io.WriteString(hash, "Hello, world.") 490 // hash.Read(b) 491 // fmt.Println(hex.EncodeToString(b)) 492 // } 493 // // Output: 494 // // 2ae01472317d1935a84797ec1983ae243fc6aa28 495 // // 2ae01472317d1935a84797ec1983ae243fc6aa28 496 // 497 // For hashing larger byte slices, or byte streams such as those read from 498 // a file or socket, use Sendto with MSG_MORE to instruct the kernel to update 499 // the hash digest instead of creating a new one for a given chunk and finalizing it. 500 // 501 // // Assume hashfd and addr are already configured using the setup process. 502 // hash := os.NewFile(hashfd, "sha1") 503 // // Hash the contents of a file. 504 // f, _ := os.Open("/tmp/linux-4.10-rc7.tar.xz") 505 // b := make([]byte, 4096) 506 // for { 507 // n, err := f.Read(b) 508 // if err == io.EOF { 509 // break 510 // } 511 // unix.Sendto(hashfd, b[:n], unix.MSG_MORE, addr) 512 // } 513 // hash.Read(b) 514 // fmt.Println(hex.EncodeToString(b)) 515 // // Output: 85cdcad0c06eef66f805ecce353bec9accbeecc5 516 // 517 // For more information, see: http://www.chronox.de/crypto-API/crypto/userspace-if.html. 518 type SockaddrALG struct { 519 Type string 520 Name string 521 Feature uint32 522 Mask uint32 523 raw RawSockaddrALG 524 } 525 526 func (sa *SockaddrALG) sockaddr() (unsafe.Pointer, _Socklen, error) { 527 // Leave room for NUL byte terminator. 528 if len(sa.Type) > 13 { 529 return nil, 0, EINVAL 530 } 531 if len(sa.Name) > 63 { 532 return nil, 0, EINVAL 533 } 534 535 sa.raw.Family = AF_ALG 536 sa.raw.Feat = sa.Feature 537 sa.raw.Mask = sa.Mask 538 539 typ, err := ByteSliceFromString(sa.Type) 540 if err != nil { 541 return nil, 0, err 542 } 543 name, err := ByteSliceFromString(sa.Name) 544 if err != nil { 545 return nil, 0, err 546 } 547 548 copy(sa.raw.Type[:], typ) 549 copy(sa.raw.Name[:], name) 550 551 return unsafe.Pointer(&sa.raw), SizeofSockaddrALG, nil 552 } 553 554 // SockaddrVM implements the Sockaddr interface for AF_VSOCK type sockets. 555 // SockaddrVM provides access to Linux VM sockets: a mechanism that enables 556 // bidirectional communication between a hypervisor and its guest virtual 557 // machines. 558 type SockaddrVM struct { 559 // CID and Port specify a context ID and port address for a VM socket. 560 // Guests have a unique CID, and hosts may have a well-known CID of: 561 // - VMADDR_CID_HYPERVISOR: refers to the hypervisor process. 562 // - VMADDR_CID_HOST: refers to other processes on the host. 563 CID uint32 564 Port uint32 565 raw RawSockaddrVM 566 } 567 568 func (sa *SockaddrVM) sockaddr() (unsafe.Pointer, _Socklen, error) { 569 sa.raw.Family = AF_VSOCK 570 sa.raw.Port = sa.Port 571 sa.raw.Cid = sa.CID 572 573 return unsafe.Pointer(&sa.raw), SizeofSockaddrVM, nil 574 } 575 576 func anyToSockaddr(rsa *RawSockaddrAny) (Sockaddr, error) { 577 switch rsa.Addr.Family { 578 case AF_NETLINK: 579 pp := (*RawSockaddrNetlink)(unsafe.Pointer(rsa)) 580 sa := new(SockaddrNetlink) 581 sa.Family = pp.Family 582 sa.Pad = pp.Pad 583 sa.Pid = pp.Pid 584 sa.Groups = pp.Groups 585 return sa, nil 586 587 case AF_PACKET: 588 pp := (*RawSockaddrLinklayer)(unsafe.Pointer(rsa)) 589 sa := new(SockaddrLinklayer) 590 sa.Protocol = pp.Protocol 591 sa.Ifindex = int(pp.Ifindex) 592 sa.Hatype = pp.Hatype 593 sa.Pkttype = pp.Pkttype 594 sa.Halen = pp.Halen 595 for i := 0; i < len(sa.Addr); i++ { 596 sa.Addr[i] = pp.Addr[i] 597 } 598 return sa, nil 599 600 case AF_UNIX: 601 pp := (*RawSockaddrUnix)(unsafe.Pointer(rsa)) 602 sa := new(SockaddrUnix) 603 if pp.Path[0] == 0 { 604 // "Abstract" Unix domain socket. 605 // Rewrite leading NUL as @ for textual display. 606 // (This is the standard convention.) 607 // Not friendly to overwrite in place, 608 // but the callers below don't care. 609 pp.Path[0] = '@' 610 } 611 612 // Assume path ends at NUL. 613 // This is not technically the Linux semantics for 614 // abstract Unix domain sockets--they are supposed 615 // to be uninterpreted fixed-size binary blobs--but 616 // everyone uses this convention. 617 n := 0 618 for n < len(pp.Path) && pp.Path[n] != 0 { 619 n++ 620 } 621 bytes := (*[10000]byte)(unsafe.Pointer(&pp.Path[0]))[0:n] 622 sa.Name = string(bytes) 623 return sa, nil 624 625 case AF_INET: 626 pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa)) 627 sa := new(SockaddrInet4) 628 p := (*[2]byte)(unsafe.Pointer(&pp.Port)) 629 sa.Port = int(p[0])<<8 + int(p[1]) 630 for i := 0; i < len(sa.Addr); i++ { 631 sa.Addr[i] = pp.Addr[i] 632 } 633 return sa, nil 634 635 case AF_INET6: 636 pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa)) 637 sa := new(SockaddrInet6) 638 p := (*[2]byte)(unsafe.Pointer(&pp.Port)) 639 sa.Port = int(p[0])<<8 + int(p[1]) 640 sa.ZoneId = pp.Scope_id 641 for i := 0; i < len(sa.Addr); i++ { 642 sa.Addr[i] = pp.Addr[i] 643 } 644 return sa, nil 645 646 case AF_VSOCK: 647 pp := (*RawSockaddrVM)(unsafe.Pointer(rsa)) 648 sa := &SockaddrVM{ 649 CID: pp.Cid, 650 Port: pp.Port, 651 } 652 return sa, nil 653 } 654 return nil, EAFNOSUPPORT 655 } 656 657 func Accept(fd int) (nfd int, sa Sockaddr, err error) { 658 var rsa RawSockaddrAny 659 var len _Socklen = SizeofSockaddrAny 660 nfd, err = accept(fd, &rsa, &len) 661 if err != nil { 662 return 663 } 664 sa, err = anyToSockaddr(&rsa) 665 if err != nil { 666 Close(nfd) 667 nfd = 0 668 } 669 return 670 } 671 672 func Accept4(fd int, flags int) (nfd int, sa Sockaddr, err error) { 673 var rsa RawSockaddrAny 674 var len _Socklen = SizeofSockaddrAny 675 nfd, err = accept4(fd, &rsa, &len, flags) 676 if err != nil { 677 return 678 } 679 if len > SizeofSockaddrAny { 680 panic("RawSockaddrAny too small") 681 } 682 sa, err = anyToSockaddr(&rsa) 683 if err != nil { 684 Close(nfd) 685 nfd = 0 686 } 687 return 688 } 689 690 func Getsockname(fd int) (sa Sockaddr, err error) { 691 var rsa RawSockaddrAny 692 var len _Socklen = SizeofSockaddrAny 693 if err = getsockname(fd, &rsa, &len); err != nil { 694 return 695 } 696 return anyToSockaddr(&rsa) 697 } 698 699 func GetsockoptInet4Addr(fd, level, opt int) (value [4]byte, err error) { 700 vallen := _Socklen(4) 701 err = getsockopt(fd, level, opt, unsafe.Pointer(&value[0]), &vallen) 702 return value, err 703 } 704 705 func GetsockoptIPMreq(fd, level, opt int) (*IPMreq, error) { 706 var value IPMreq 707 vallen := _Socklen(SizeofIPMreq) 708 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen) 709 return &value, err 710 } 711 712 func GetsockoptIPMreqn(fd, level, opt int) (*IPMreqn, error) { 713 var value IPMreqn 714 vallen := _Socklen(SizeofIPMreqn) 715 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen) 716 return &value, err 717 } 718 719 func GetsockoptIPv6Mreq(fd, level, opt int) (*IPv6Mreq, error) { 720 var value IPv6Mreq 721 vallen := _Socklen(SizeofIPv6Mreq) 722 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen) 723 return &value, err 724 } 725 726 func GetsockoptIPv6MTUInfo(fd, level, opt int) (*IPv6MTUInfo, error) { 727 var value IPv6MTUInfo 728 vallen := _Socklen(SizeofIPv6MTUInfo) 729 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen) 730 return &value, err 731 } 732 733 func GetsockoptICMPv6Filter(fd, level, opt int) (*ICMPv6Filter, error) { 734 var value ICMPv6Filter 735 vallen := _Socklen(SizeofICMPv6Filter) 736 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen) 737 return &value, err 738 } 739 740 func GetsockoptUcred(fd, level, opt int) (*Ucred, error) { 741 var value Ucred 742 vallen := _Socklen(SizeofUcred) 743 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen) 744 return &value, err 745 } 746 747 func SetsockoptIPMreqn(fd, level, opt int, mreq *IPMreqn) (err error) { 748 return setsockopt(fd, level, opt, unsafe.Pointer(mreq), unsafe.Sizeof(*mreq)) 749 } 750 751 func Recvmsg(fd int, p, oob []byte, flags int) (n, oobn int, recvflags int, from Sockaddr, err error) { 752 var msg Msghdr 753 var rsa RawSockaddrAny 754 msg.Name = (*byte)(unsafe.Pointer(&rsa)) 755 msg.Namelen = uint32(SizeofSockaddrAny) 756 var iov Iovec 757 if len(p) > 0 { 758 iov.Base = (*byte)(unsafe.Pointer(&p[0])) 759 iov.SetLen(len(p)) 760 } 761 var dummy byte 762 if len(oob) > 0 { 763 // receive at least one normal byte 764 if len(p) == 0 { 765 iov.Base = &dummy 766 iov.SetLen(1) 767 } 768 msg.Control = (*byte)(unsafe.Pointer(&oob[0])) 769 msg.SetControllen(len(oob)) 770 } 771 msg.Iov = &iov 772 msg.Iovlen = 1 773 if n, err = recvmsg(fd, &msg, flags); err != nil { 774 return 775 } 776 oobn = int(msg.Controllen) 777 recvflags = int(msg.Flags) 778 // source address is only specified if the socket is unconnected 779 if rsa.Addr.Family != AF_UNSPEC { 780 from, err = anyToSockaddr(&rsa) 781 } 782 return 783 } 784 785 func Sendmsg(fd int, p, oob []byte, to Sockaddr, flags int) (err error) { 786 _, err = SendmsgN(fd, p, oob, to, flags) 787 return 788 } 789 790 func SendmsgN(fd int, p, oob []byte, to Sockaddr, flags int) (n int, err error) { 791 var ptr unsafe.Pointer 792 var salen _Socklen 793 if to != nil { 794 var err error 795 ptr, salen, err = to.sockaddr() 796 if err != nil { 797 return 0, err 798 } 799 } 800 var msg Msghdr 801 msg.Name = (*byte)(unsafe.Pointer(ptr)) 802 msg.Namelen = uint32(salen) 803 var iov Iovec 804 if len(p) > 0 { 805 iov.Base = (*byte)(unsafe.Pointer(&p[0])) 806 iov.SetLen(len(p)) 807 } 808 var dummy byte 809 if len(oob) > 0 { 810 // send at least one normal byte 811 if len(p) == 0 { 812 iov.Base = &dummy 813 iov.SetLen(1) 814 } 815 msg.Control = (*byte)(unsafe.Pointer(&oob[0])) 816 msg.SetControllen(len(oob)) 817 } 818 msg.Iov = &iov 819 msg.Iovlen = 1 820 if n, err = sendmsg(fd, &msg, flags); err != nil { 821 return 0, err 822 } 823 if len(oob) > 0 && len(p) == 0 { 824 n = 0 825 } 826 return n, nil 827 } 828 829 // BindToDevice binds the socket associated with fd to device. 830 func BindToDevice(fd int, device string) (err error) { 831 return SetsockoptString(fd, SOL_SOCKET, SO_BINDTODEVICE, device) 832 } 833 834 //sys ptrace(request int, pid int, addr uintptr, data uintptr) (err error) 835 836 func ptracePeek(req int, pid int, addr uintptr, out []byte) (count int, err error) { 837 // The peek requests are machine-size oriented, so we wrap it 838 // to retrieve arbitrary-length data. 839 840 // The ptrace syscall differs from glibc's ptrace. 841 // Peeks returns the word in *data, not as the return value. 842 843 var buf [sizeofPtr]byte 844 845 // Leading edge. PEEKTEXT/PEEKDATA don't require aligned 846 // access (PEEKUSER warns that it might), but if we don't 847 // align our reads, we might straddle an unmapped page 848 // boundary and not get the bytes leading up to the page 849 // boundary. 850 n := 0 851 if addr%sizeofPtr != 0 { 852 err = ptrace(req, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0]))) 853 if err != nil { 854 return 0, err 855 } 856 n += copy(out, buf[addr%sizeofPtr:]) 857 out = out[n:] 858 } 859 860 // Remainder. 861 for len(out) > 0 { 862 // We use an internal buffer to guarantee alignment. 863 // It's not documented if this is necessary, but we're paranoid. 864 err = ptrace(req, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0]))) 865 if err != nil { 866 return n, err 867 } 868 copied := copy(out, buf[0:]) 869 n += copied 870 out = out[copied:] 871 } 872 873 return n, nil 874 } 875 876 func PtracePeekText(pid int, addr uintptr, out []byte) (count int, err error) { 877 return ptracePeek(PTRACE_PEEKTEXT, pid, addr, out) 878 } 879 880 func PtracePeekData(pid int, addr uintptr, out []byte) (count int, err error) { 881 return ptracePeek(PTRACE_PEEKDATA, pid, addr, out) 882 } 883 884 func PtracePeekUser(pid int, addr uintptr, out []byte) (count int, err error) { 885 return ptracePeek(PTRACE_PEEKUSR, pid, addr, out) 886 } 887 888 func ptracePoke(pokeReq int, peekReq int, pid int, addr uintptr, data []byte) (count int, err error) { 889 // As for ptracePeek, we need to align our accesses to deal 890 // with the possibility of straddling an invalid page. 891 892 // Leading edge. 893 n := 0 894 if addr%sizeofPtr != 0 { 895 var buf [sizeofPtr]byte 896 err = ptrace(peekReq, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0]))) 897 if err != nil { 898 return 0, err 899 } 900 n += copy(buf[addr%sizeofPtr:], data) 901 word := *((*uintptr)(unsafe.Pointer(&buf[0]))) 902 err = ptrace(pokeReq, pid, addr-addr%sizeofPtr, word) 903 if err != nil { 904 return 0, err 905 } 906 data = data[n:] 907 } 908 909 // Interior. 910 for len(data) > sizeofPtr { 911 word := *((*uintptr)(unsafe.Pointer(&data[0]))) 912 err = ptrace(pokeReq, pid, addr+uintptr(n), word) 913 if err != nil { 914 return n, err 915 } 916 n += sizeofPtr 917 data = data[sizeofPtr:] 918 } 919 920 // Trailing edge. 921 if len(data) > 0 { 922 var buf [sizeofPtr]byte 923 err = ptrace(peekReq, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0]))) 924 if err != nil { 925 return n, err 926 } 927 copy(buf[0:], data) 928 word := *((*uintptr)(unsafe.Pointer(&buf[0]))) 929 err = ptrace(pokeReq, pid, addr+uintptr(n), word) 930 if err != nil { 931 return n, err 932 } 933 n += len(data) 934 } 935 936 return n, nil 937 } 938 939 func PtracePokeText(pid int, addr uintptr, data []byte) (count int, err error) { 940 return ptracePoke(PTRACE_POKETEXT, PTRACE_PEEKTEXT, pid, addr, data) 941 } 942 943 func PtracePokeData(pid int, addr uintptr, data []byte) (count int, err error) { 944 return ptracePoke(PTRACE_POKEDATA, PTRACE_PEEKDATA, pid, addr, data) 945 } 946 947 func PtraceGetRegs(pid int, regsout *PtraceRegs) (err error) { 948 return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout))) 949 } 950 951 func PtraceSetRegs(pid int, regs *PtraceRegs) (err error) { 952 return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs))) 953 } 954 955 func PtraceSetOptions(pid int, options int) (err error) { 956 return ptrace(PTRACE_SETOPTIONS, pid, 0, uintptr(options)) 957 } 958 959 func PtraceGetEventMsg(pid int) (msg uint, err error) { 960 var data _C_long 961 err = ptrace(PTRACE_GETEVENTMSG, pid, 0, uintptr(unsafe.Pointer(&data))) 962 msg = uint(data) 963 return 964 } 965 966 func PtraceCont(pid int, signal int) (err error) { 967 return ptrace(PTRACE_CONT, pid, 0, uintptr(signal)) 968 } 969 970 func PtraceSyscall(pid int, signal int) (err error) { 971 return ptrace(PTRACE_SYSCALL, pid, 0, uintptr(signal)) 972 } 973 974 func PtraceSingleStep(pid int) (err error) { return ptrace(PTRACE_SINGLESTEP, pid, 0, 0) } 975 976 func PtraceAttach(pid int) (err error) { return ptrace(PTRACE_ATTACH, pid, 0, 0) } 977 978 func PtraceDetach(pid int) (err error) { return ptrace(PTRACE_DETACH, pid, 0, 0) } 979 980 //sys reboot(magic1 uint, magic2 uint, cmd int, arg string) (err error) 981 982 func Reboot(cmd int) (err error) { 983 return reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2, cmd, "") 984 } 985 986 func ReadDirent(fd int, buf []byte) (n int, err error) { 987 return Getdents(fd, buf) 988 } 989 990 func direntIno(buf []byte) (uint64, bool) { 991 return readInt(buf, unsafe.Offsetof(Dirent{}.Ino), unsafe.Sizeof(Dirent{}.Ino)) 992 } 993 994 func direntReclen(buf []byte) (uint64, bool) { 995 return readInt(buf, unsafe.Offsetof(Dirent{}.Reclen), unsafe.Sizeof(Dirent{}.Reclen)) 996 } 997 998 func direntNamlen(buf []byte) (uint64, bool) { 999 reclen, ok := direntReclen(buf) 1000 if !ok { 1001 return 0, false 1002 } 1003 return reclen - uint64(unsafe.Offsetof(Dirent{}.Name)), true 1004 } 1005 1006 //sys mount(source string, target string, fstype string, flags uintptr, data *byte) (err error) 1007 1008 func Mount(source string, target string, fstype string, flags uintptr, data string) (err error) { 1009 // Certain file systems get rather angry and EINVAL if you give 1010 // them an empty string of data, rather than NULL. 1011 if data == "" { 1012 return mount(source, target, fstype, flags, nil) 1013 } 1014 datap, err := BytePtrFromString(data) 1015 if err != nil { 1016 return err 1017 } 1018 return mount(source, target, fstype, flags, datap) 1019 } 1020 1021 // Sendto 1022 // Recvfrom 1023 // Socketpair 1024 1025 /* 1026 * Direct access 1027 */ 1028 //sys Acct(path string) (err error) 1029 //sys Adjtimex(buf *Timex) (state int, err error) 1030 //sys Chdir(path string) (err error) 1031 //sys Chroot(path string) (err error) 1032 //sys ClockGettime(clockid int32, time *Timespec) (err error) 1033 //sys Close(fd int) (err error) 1034 //sys Dup(oldfd int) (fd int, err error) 1035 //sys Dup3(oldfd int, newfd int, flags int) (err error) 1036 //sysnb EpollCreate(size int) (fd int, err error) 1037 //sysnb EpollCreate1(flag int) (fd int, err error) 1038 //sysnb EpollCtl(epfd int, op int, fd int, event *EpollEvent) (err error) 1039 //sys Exit(code int) = SYS_EXIT_GROUP 1040 //sys Faccessat(dirfd int, path string, mode uint32, flags int) (err error) 1041 //sys Fallocate(fd int, mode uint32, off int64, len int64) (err error) 1042 //sys Fchdir(fd int) (err error) 1043 //sys Fchmod(fd int, mode uint32) (err error) 1044 //sys Fchmodat(dirfd int, path string, mode uint32, flags int) (err error) 1045 //sys Fchownat(dirfd int, path string, uid int, gid int, flags int) (err error) 1046 //sys fcntl(fd int, cmd int, arg int) (val int, err error) 1047 //sys Fdatasync(fd int) (err error) 1048 //sys Flock(fd int, how int) (err error) 1049 //sys Fsync(fd int) (err error) 1050 //sys Getdents(fd int, buf []byte) (n int, err error) = SYS_GETDENTS64 1051 //sysnb Getpgid(pid int) (pgid int, err error) 1052 1053 func Getpgrp() (pid int) { 1054 pid, _ = Getpgid(0) 1055 return 1056 } 1057 1058 //sysnb Getpid() (pid int) 1059 //sysnb Getppid() (ppid int) 1060 //sys Getpriority(which int, who int) (prio int, err error) 1061 //sys Getrandom(buf []byte, flags int) (n int, err error) 1062 //sysnb Getrusage(who int, rusage *Rusage) (err error) 1063 //sysnb Getsid(pid int) (sid int, err error) 1064 //sysnb Gettid() (tid int) 1065 //sys Getxattr(path string, attr string, dest []byte) (sz int, err error) 1066 //sys InotifyAddWatch(fd int, pathname string, mask uint32) (watchdesc int, err error) 1067 //sysnb InotifyInit1(flags int) (fd int, err error) 1068 //sysnb InotifyRmWatch(fd int, watchdesc uint32) (success int, err error) 1069 //sysnb Kill(pid int, sig syscall.Signal) (err error) 1070 //sys Klogctl(typ int, buf []byte) (n int, err error) = SYS_SYSLOG 1071 //sys Listxattr(path string, dest []byte) (sz int, err error) 1072 //sys Mkdirat(dirfd int, path string, mode uint32) (err error) 1073 //sys Mknodat(dirfd int, path string, mode uint32, dev int) (err error) 1074 //sys Nanosleep(time *Timespec, leftover *Timespec) (err error) 1075 //sys PivotRoot(newroot string, putold string) (err error) = SYS_PIVOT_ROOT 1076 //sysnb prlimit(pid int, resource int, newlimit *Rlimit, old *Rlimit) (err error) = SYS_PRLIMIT64 1077 //sys Prctl(option int, arg2 uintptr, arg3 uintptr, arg4 uintptr, arg5 uintptr) (err error) 1078 //sys read(fd int, p []byte) (n int, err error) 1079 //sys Removexattr(path string, attr string) (err error) 1080 //sys Renameat(olddirfd int, oldpath string, newdirfd int, newpath string) (err error) 1081 //sys Setdomainname(p []byte) (err error) 1082 //sys Sethostname(p []byte) (err error) 1083 //sysnb Setpgid(pid int, pgid int) (err error) 1084 //sysnb Setsid() (pid int, err error) 1085 //sysnb Settimeofday(tv *Timeval) (err error) 1086 //sys Setns(fd int, nstype int) (err error) 1087 1088 // issue 1435. 1089 // On linux Setuid and Setgid only affects the current thread, not the process. 1090 // This does not match what most callers expect so we must return an error 1091 // here rather than letting the caller think that the call succeeded. 1092 1093 func Setuid(uid int) (err error) { 1094 return EOPNOTSUPP 1095 } 1096 1097 func Setgid(uid int) (err error) { 1098 return EOPNOTSUPP 1099 } 1100 1101 //sys Setpriority(which int, who int, prio int) (err error) 1102 //sys Setxattr(path string, attr string, data []byte, flags int) (err error) 1103 //sys Sync() 1104 //sysnb Sysinfo(info *Sysinfo_t) (err error) 1105 //sys Tee(rfd int, wfd int, len int, flags int) (n int64, err error) 1106 //sysnb Tgkill(tgid int, tid int, sig syscall.Signal) (err error) 1107 //sysnb Times(tms *Tms) (ticks uintptr, err error) 1108 //sysnb Umask(mask int) (oldmask int) 1109 //sysnb Uname(buf *Utsname) (err error) 1110 //sys Unmount(target string, flags int) (err error) = SYS_UMOUNT2 1111 //sys Unshare(flags int) (err error) 1112 //sys Ustat(dev int, ubuf *Ustat_t) (err error) 1113 //sys write(fd int, p []byte) (n int, err error) 1114 //sys exitThread(code int) (err error) = SYS_EXIT 1115 //sys readlen(fd int, p *byte, np int) (n int, err error) = SYS_READ 1116 //sys writelen(fd int, p *byte, np int) (n int, err error) = SYS_WRITE 1117 1118 // mmap varies by architecture; see syscall_linux_*.go. 1119 //sys munmap(addr uintptr, length uintptr) (err error) 1120 1121 var mapper = &mmapper{ 1122 active: make(map[*byte][]byte), 1123 mmap: mmap, 1124 munmap: munmap, 1125 } 1126 1127 func Mmap(fd int, offset int64, length int, prot int, flags int) (data []byte, err error) { 1128 return mapper.Mmap(fd, offset, length, prot, flags) 1129 } 1130 1131 func Munmap(b []byte) (err error) { 1132 return mapper.Munmap(b) 1133 } 1134 1135 //sys Madvise(b []byte, advice int) (err error) 1136 //sys Mprotect(b []byte, prot int) (err error) 1137 //sys Mlock(b []byte) (err error) 1138 //sys Munlock(b []byte) (err error) 1139 //sys Mlockall(flags int) (err error) 1140 //sys Munlockall() (err error) 1141 1142 // Vmsplice splices user pages from a slice of Iovecs into a pipe specified by fd, 1143 // using the specified flags. 1144 func Vmsplice(fd int, iovs []Iovec, flags int) (int, error) { 1145 n, _, errno := Syscall6( 1146 SYS_VMSPLICE, 1147 uintptr(fd), 1148 uintptr(unsafe.Pointer(&iovs[0])), 1149 uintptr(len(iovs)), 1150 uintptr(flags), 1151 0, 1152 0, 1153 ) 1154 if errno != 0 { 1155 return 0, syscall.Errno(errno) 1156 } 1157 1158 return int(n), nil 1159 } 1160 1161 /* 1162 * Unimplemented 1163 */ 1164 // AddKey 1165 // AfsSyscall 1166 // Alarm 1167 // ArchPrctl 1168 // Brk 1169 // Capget 1170 // Capset 1171 // ClockGetres 1172 // ClockNanosleep 1173 // ClockSettime 1174 // Clone 1175 // CreateModule 1176 // DeleteModule 1177 // EpollCtlOld 1178 // EpollPwait 1179 // EpollWaitOld 1180 // Eventfd 1181 // Execve 1182 // Fgetxattr 1183 // Flistxattr 1184 // Fork 1185 // Fremovexattr 1186 // Fsetxattr 1187 // Futex 1188 // GetKernelSyms 1189 // GetMempolicy 1190 // GetRobustList 1191 // GetThreadArea 1192 // Getitimer 1193 // Getpmsg 1194 // IoCancel 1195 // IoDestroy 1196 // IoGetevents 1197 // IoSetup 1198 // IoSubmit 1199 // Ioctl 1200 // IoprioGet 1201 // IoprioSet 1202 // KexecLoad 1203 // Keyctl 1204 // Lgetxattr 1205 // Llistxattr 1206 // LookupDcookie 1207 // Lremovexattr 1208 // Lsetxattr 1209 // Mbind 1210 // MigratePages 1211 // Mincore 1212 // ModifyLdt 1213 // Mount 1214 // MovePages 1215 // Mprotect 1216 // MqGetsetattr 1217 // MqNotify 1218 // MqOpen 1219 // MqTimedreceive 1220 // MqTimedsend 1221 // MqUnlink 1222 // Mremap 1223 // Msgctl 1224 // Msgget 1225 // Msgrcv 1226 // Msgsnd 1227 // Msync 1228 // Newfstatat 1229 // Nfsservctl 1230 // Personality 1231 // Pselect6 1232 // Ptrace 1233 // Putpmsg 1234 // QueryModule 1235 // Quotactl 1236 // Readahead 1237 // Readv 1238 // RemapFilePages 1239 // RequestKey 1240 // RestartSyscall 1241 // RtSigaction 1242 // RtSigpending 1243 // RtSigprocmask 1244 // RtSigqueueinfo 1245 // RtSigreturn 1246 // RtSigsuspend 1247 // RtSigtimedwait 1248 // SchedGetPriorityMax 1249 // SchedGetPriorityMin 1250 // SchedGetaffinity 1251 // SchedGetparam 1252 // SchedGetscheduler 1253 // SchedRrGetInterval 1254 // SchedSetaffinity 1255 // SchedSetparam 1256 // SchedYield 1257 // Security 1258 // Semctl 1259 // Semget 1260 // Semop 1261 // Semtimedop 1262 // SetMempolicy 1263 // SetRobustList 1264 // SetThreadArea 1265 // SetTidAddress 1266 // Shmat 1267 // Shmctl 1268 // Shmdt 1269 // Shmget 1270 // Sigaltstack 1271 // Signalfd 1272 // Swapoff 1273 // Swapon 1274 // Sysfs 1275 // TimerCreate 1276 // TimerDelete 1277 // TimerGetoverrun 1278 // TimerGettime 1279 // TimerSettime 1280 // Timerfd 1281 // Tkill (obsolete) 1282 // Tuxcall 1283 // Umount2 1284 // Uselib 1285 // Utimensat 1286 // Vfork 1287 // Vhangup 1288 // Vserver 1289 // Waitid 1290 // _Sysctl