2009-06-01 23:14:57 -06:00
|
|
|
// Copyright 2009 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
// Linux system calls.
|
|
|
|
// This file is compiled as ordinary Go code,
|
|
|
|
// but it is also input to mksyscall,
|
|
|
|
// which parses the //sys lines and generates system call stubs.
|
|
|
|
// Note that sometimes we use a lowercase //sys name and
|
|
|
|
// wrap it in our own nicer implementation.
|
|
|
|
|
|
|
|
package syscall
|
|
|
|
|
2009-08-12 14:19:17 -06:00
|
|
|
import "unsafe"
|
2009-06-01 23:14:57 -06:00
|
|
|
|
|
|
|
const OS = "linux"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Wrapped
|
|
|
|
*/
|
|
|
|
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys open(path string, mode int, perm uint32) (fd int, errno int)
|
|
|
|
func Open(path string, mode int, perm uint32) (fd int, errno int) {
|
2010-04-30 00:34:06 -06:00
|
|
|
return open(path, mode|O_LARGEFILE, perm)
|
|
|
|
}
|
|
|
|
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys openat(dirfd int, path string, flags int, mode uint32) (fd int, errno int)
|
|
|
|
func Openat(dirfd int, path string, flags int, mode uint32) (fd int, errno int) {
|
2010-05-03 12:11:01 -06:00
|
|
|
return openat(dirfd, path, flags|O_LARGEFILE, mode)
|
|
|
|
}
|
|
|
|
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys pipe(p *[2]_C_int) (errno int)
|
|
|
|
func Pipe(p []int) (errno int) {
|
|
|
|
if len(p) != 2 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
var pp [2]_C_int
|
|
|
|
errno = pipe(&pp)
|
|
|
|
p[0] = int(pp[0])
|
|
|
|
p[1] = int(pp[1])
|
|
|
|
return
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
//sys utimes(path string, times *[2]Timeval) (errno int)
|
|
|
|
func Utimes(path string, tv []Timeval) (errno int) {
|
|
|
|
if len(tv) != 2 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2010-05-19 18:47:57 -06:00
|
|
|
//sys futimesat(dirfd int, path *byte, times *[2]Timeval) (errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
func Futimesat(dirfd int, path string, tv []Timeval) (errno int) {
|
|
|
|
if len(tv) != 2 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2010-05-19 18:47:57 -06:00
|
|
|
return futimesat(dirfd, StringBytePtr(path), (*[2]Timeval)(unsafe.Pointer(&tv[0])))
|
|
|
|
}
|
|
|
|
|
|
|
|
func Futimes(fd int, tv []Timeval) (errno int) {
|
|
|
|
// Believe it or not, this is the best we can do on Linux
|
|
|
|
// (and is what glibc does).
|
|
|
|
return Utimes("/proc/self/fd/"+str(fd), tv)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2009-11-05 11:55:57 -07:00
|
|
|
const ImplementsGetwd = true
|
2009-06-01 23:14:57 -06:00
|
|
|
|
|
|
|
//sys Getcwd(buf []byte) (n int, errno int)
|
|
|
|
func Getwd() (wd string, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var buf [PathMax]byte
|
2010-05-27 15:51:47 -06:00
|
|
|
n, err := Getcwd(buf[0:])
|
2009-06-01 23:14:57 -06:00
|
|
|
if err != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return "", err
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
// Getcwd returns the number of bytes written to buf, including the NUL.
|
2009-11-05 11:55:57 -07:00
|
|
|
if n < 1 || n > len(buf) || buf[n-1] != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return "", EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return string(buf[0 : n-1]), 0
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Getgroups() (gids []int, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
n, err := getgroups(0, nil)
|
2009-06-01 23:14:57 -06:00
|
|
|
if err != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return nil, errno
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
if n == 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return nil, 0
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Sanity check group count. Max is 1<<16 on Linux.
|
|
|
|
if n < 0 || n > 1<<20 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return nil, EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
a := make([]_Gid_t, n)
|
|
|
|
n, err = getgroups(n, &a[0])
|
2009-06-01 23:14:57 -06:00
|
|
|
if err != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return nil, errno
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
gids = make([]int, n)
|
2009-06-01 23:14:57 -06:00
|
|
|
for i, v := range a[0:n] {
|
2009-11-09 13:07:39 -07:00
|
|
|
gids[i] = int(v)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Setgroups(gids []int) (errno int) {
|
|
|
|
if len(gids) == 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return setgroups(0, nil)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
a := make([]_Gid_t, len(gids))
|
2009-06-01 23:14:57 -06:00
|
|
|
for i, v := range gids {
|
2009-11-09 13:07:39 -07:00
|
|
|
a[i] = _Gid_t(v)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return setgroups(len(a), &a[0])
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
type WaitStatus uint32
|
|
|
|
|
|
|
|
// Wait status is 7 bits at bottom, either 0 (exited),
|
|
|
|
// 0x7F (stopped), or a signal number that caused an exit.
|
|
|
|
// The 0x80 bit is whether there was a core dump.
|
|
|
|
// An extra number (exit code, signal causing a stop)
|
|
|
|
// is in the high bits. At least that's the idea.
|
|
|
|
// There are various irregularities. For example, the
|
|
|
|
// "continued" status is 0xFFFF, distinguishing itself
|
|
|
|
// from stopped via the core dump bit.
|
|
|
|
|
|
|
|
const (
|
2009-12-15 16:40:16 -07:00
|
|
|
mask = 0x7F
|
|
|
|
core = 0x80
|
|
|
|
exited = 0x00
|
|
|
|
stopped = 0x7F
|
|
|
|
shift = 8
|
2009-06-01 23:14:57 -06:00
|
|
|
)
|
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func (w WaitStatus) Exited() bool { return w&mask == exited }
|
2009-06-01 23:14:57 -06:00
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func (w WaitStatus) Signaled() bool { return w&mask != stopped && w&mask != exited }
|
2009-06-01 23:14:57 -06:00
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func (w WaitStatus) Stopped() bool { return w&0xFF == stopped }
|
2009-06-01 23:14:57 -06:00
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func (w WaitStatus) Continued() bool { return w == 0xFFFF }
|
2009-06-01 23:14:57 -06:00
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func (w WaitStatus) CoreDump() bool { return w.Signaled() && w&core != 0 }
|
2009-06-01 23:14:57 -06:00
|
|
|
|
|
|
|
func (w WaitStatus) ExitStatus() int {
|
|
|
|
if !w.Exited() {
|
2009-11-09 13:07:39 -07:00
|
|
|
return -1
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return int(w>>shift) & 0xFF
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func (w WaitStatus) Signal() int {
|
|
|
|
if !w.Signaled() {
|
2009-11-09 13:07:39 -07:00
|
|
|
return -1
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return int(w & mask)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func (w WaitStatus) StopSignal() int {
|
|
|
|
if !w.Stopped() {
|
2009-11-09 13:07:39 -07:00
|
|
|
return -1
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return int(w>>shift) & 0xFF
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2009-07-13 20:20:38 -06:00
|
|
|
func (w WaitStatus) TrapCause() int {
|
|
|
|
if w.StopSignal() != SIGTRAP {
|
2009-11-09 13:07:39 -07:00
|
|
|
return -1
|
2009-07-13 20:20:38 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return int(w>>shift) >> 8
|
2009-07-13 20:20:38 -06:00
|
|
|
}
|
|
|
|
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys wait4(pid int, wstatus *_C_int, options int, rusage *Rusage) (wpid int, errno int)
|
|
|
|
func Wait4(pid int, wstatus *WaitStatus, options int, rusage *Rusage) (wpid int, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var status _C_int
|
|
|
|
wpid, errno = wait4(pid, &status, options, rusage)
|
2009-06-01 23:14:57 -06:00
|
|
|
if wstatus != nil {
|
2009-11-09 13:07:39 -07:00
|
|
|
*wstatus = WaitStatus(status)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Sleep(nsec int64) (errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
tv := NsecToTimeval(nsec)
|
|
|
|
_, err := Select(0, nil, nil, nil, &tv)
|
|
|
|
return err
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// For testing: clients can set this flag to force
|
|
|
|
// creation of IPv6 sockets to return EAFNOSUPPORT.
|
|
|
|
var SocketDisableIPv6 bool
|
|
|
|
|
|
|
|
type Sockaddr interface {
|
2009-12-15 16:40:16 -07:00
|
|
|
sockaddr() (ptr uintptr, len _Socklen, errno int) // lowercase; only we can define Sockaddrs
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
type SockaddrInet4 struct {
|
2009-12-15 16:40:16 -07:00
|
|
|
Port int
|
|
|
|
Addr [4]byte
|
|
|
|
raw RawSockaddrInet4
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sa *SockaddrInet4) sockaddr() (uintptr, _Socklen, int) {
|
|
|
|
if sa.Port < 0 || sa.Port > 0xFFFF {
|
2009-11-09 13:07:39 -07:00
|
|
|
return 0, 0, EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
sa.raw.Family = AF_INET
|
|
|
|
p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
|
|
|
|
p[0] = byte(sa.Port >> 8)
|
|
|
|
p[1] = byte(sa.Port)
|
2009-06-01 23:14:57 -06:00
|
|
|
for i := 0; i < len(sa.Addr); i++ {
|
2009-11-09 13:07:39 -07:00
|
|
|
sa.raw.Addr[i] = sa.Addr[i]
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return uintptr(unsafe.Pointer(&sa.raw)), SizeofSockaddrInet4, 0
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
type SockaddrInet6 struct {
|
2009-12-15 16:40:16 -07:00
|
|
|
Port int
|
|
|
|
Addr [16]byte
|
|
|
|
raw RawSockaddrInet6
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sa *SockaddrInet6) sockaddr() (uintptr, _Socklen, int) {
|
|
|
|
if sa.Port < 0 || sa.Port > 0xFFFF {
|
2009-11-09 13:07:39 -07:00
|
|
|
return 0, 0, EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
sa.raw.Family = AF_INET6
|
|
|
|
p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
|
|
|
|
p[0] = byte(sa.Port >> 8)
|
|
|
|
p[1] = byte(sa.Port)
|
2009-06-01 23:14:57 -06:00
|
|
|
for i := 0; i < len(sa.Addr); i++ {
|
2009-11-09 13:07:39 -07:00
|
|
|
sa.raw.Addr[i] = sa.Addr[i]
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return uintptr(unsafe.Pointer(&sa.raw)), SizeofSockaddrInet6, 0
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
type SockaddrUnix struct {
|
2009-12-15 16:40:16 -07:00
|
|
|
Name string
|
|
|
|
raw RawSockaddrUnix
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sa *SockaddrUnix) sockaddr() (uintptr, _Socklen, int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
name := sa.Name
|
|
|
|
n := len(name)
|
2009-06-01 23:14:57 -06:00
|
|
|
if n >= len(sa.raw.Path) || n == 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return 0, 0, EINVAL
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
sa.raw.Family = AF_UNIX
|
2009-06-01 23:14:57 -06:00
|
|
|
for i := 0; i < n; i++ {
|
2009-11-09 13:07:39 -07:00
|
|
|
sa.raw.Path[i] = int8(name[i])
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2011-01-18 09:10:22 -07:00
|
|
|
// length is family (uint16), name, NUL.
|
|
|
|
sl := 2 + _Socklen(n) + 1
|
2009-06-01 23:14:57 -06:00
|
|
|
if sa.raw.Path[0] == '@' {
|
2009-11-09 13:07:39 -07:00
|
|
|
sa.raw.Path[0] = 0
|
2011-01-18 09:10:22 -07:00
|
|
|
// Don't count trailing NUL for abstract address.
|
|
|
|
sl--
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2011-01-18 09:10:22 -07:00
|
|
|
return uintptr(unsafe.Pointer(&sa.raw)), sl, 0
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2010-10-12 07:48:56 -06:00
|
|
|
type SockaddrLinklayer struct {
|
|
|
|
Protocol uint16
|
|
|
|
Ifindex int
|
|
|
|
Hatype uint16
|
|
|
|
Pkttype uint8
|
|
|
|
Halen uint8
|
|
|
|
Addr [8]byte
|
|
|
|
raw RawSockaddrLinklayer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sa *SockaddrLinklayer) sockaddr() (uintptr, _Socklen, int) {
|
|
|
|
if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff {
|
|
|
|
return 0, 0, EINVAL
|
|
|
|
}
|
|
|
|
sa.raw.Family = AF_PACKET
|
|
|
|
sa.raw.Protocol = sa.Protocol
|
|
|
|
sa.raw.Ifindex = int32(sa.Ifindex)
|
|
|
|
sa.raw.Hatype = sa.Hatype
|
|
|
|
sa.raw.Pkttype = sa.Pkttype
|
|
|
|
sa.raw.Halen = sa.Halen
|
|
|
|
for i := 0; i < len(sa.Addr); i++ {
|
|
|
|
sa.raw.Addr[i] = sa.Addr[i]
|
|
|
|
}
|
|
|
|
return uintptr(unsafe.Pointer(&sa.raw)), SizeofSockaddrLinklayer, 0
|
|
|
|
}
|
|
|
|
|
2009-06-01 23:14:57 -06:00
|
|
|
func anyToSockaddr(rsa *RawSockaddrAny) (Sockaddr, int) {
|
|
|
|
switch rsa.Addr.Family {
|
2010-10-12 07:48:56 -06:00
|
|
|
case AF_PACKET:
|
|
|
|
pp := (*RawSockaddrLinklayer)(unsafe.Pointer(rsa))
|
|
|
|
sa := new(SockaddrLinklayer)
|
|
|
|
sa.Protocol = pp.Protocol
|
|
|
|
sa.Ifindex = int(pp.Ifindex)
|
|
|
|
sa.Hatype = pp.Hatype
|
|
|
|
sa.Pkttype = pp.Pkttype
|
|
|
|
sa.Halen = pp.Halen
|
|
|
|
for i := 0; i < len(sa.Addr); i++ {
|
|
|
|
sa.Addr[i] = pp.Addr[i]
|
|
|
|
}
|
|
|
|
return sa, 0
|
|
|
|
|
2009-06-01 23:14:57 -06:00
|
|
|
case AF_UNIX:
|
2009-12-15 16:40:16 -07:00
|
|
|
pp := (*RawSockaddrUnix)(unsafe.Pointer(rsa))
|
|
|
|
sa := new(SockaddrUnix)
|
2009-06-01 23:14:57 -06:00
|
|
|
if pp.Path[0] == 0 {
|
|
|
|
// "Abstract" Unix domain socket.
|
|
|
|
// Rewrite leading NUL as @ for textual display.
|
|
|
|
// (This is the standard convention.)
|
|
|
|
// Not friendly to overwrite in place,
|
|
|
|
// but the callers below don't care.
|
2009-11-09 13:07:39 -07:00
|
|
|
pp.Path[0] = '@'
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Assume path ends at NUL.
|
|
|
|
// This is not technically the Linux semantics for
|
|
|
|
// abstract Unix domain sockets--they are supposed
|
|
|
|
// to be uninterpreted fixed-size binary blobs--but
|
|
|
|
// everyone uses this convention.
|
2009-12-15 16:40:16 -07:00
|
|
|
n := 0
|
2009-06-01 23:14:57 -06:00
|
|
|
for n < len(pp.Path) && pp.Path[n] != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
n++
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2010-07-01 18:49:28 -06:00
|
|
|
bytes := (*[10000]byte)(unsafe.Pointer(&pp.Path[0]))[0:n]
|
|
|
|
sa.Name = string(bytes)
|
2009-12-15 16:40:16 -07:00
|
|
|
return sa, 0
|
2009-06-01 23:14:57 -06:00
|
|
|
|
|
|
|
case AF_INET:
|
2009-12-15 16:40:16 -07:00
|
|
|
pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa))
|
|
|
|
sa := new(SockaddrInet4)
|
|
|
|
p := (*[2]byte)(unsafe.Pointer(&pp.Port))
|
|
|
|
sa.Port = int(p[0])<<8 + int(p[1])
|
2009-06-01 23:14:57 -06:00
|
|
|
for i := 0; i < len(sa.Addr); i++ {
|
2009-11-09 13:07:39 -07:00
|
|
|
sa.Addr[i] = pp.Addr[i]
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return sa, 0
|
2009-06-01 23:14:57 -06:00
|
|
|
|
|
|
|
case AF_INET6:
|
2009-12-15 16:40:16 -07:00
|
|
|
pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa))
|
|
|
|
sa := new(SockaddrInet6)
|
|
|
|
p := (*[2]byte)(unsafe.Pointer(&pp.Port))
|
|
|
|
sa.Port = int(p[0])<<8 + int(p[1])
|
2009-06-01 23:14:57 -06:00
|
|
|
for i := 0; i < len(sa.Addr); i++ {
|
2009-11-09 13:07:39 -07:00
|
|
|
sa.Addr[i] = pp.Addr[i]
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return sa, 0
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return nil, EAFNOSUPPORT
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Accept(fd int) (nfd int, sa Sockaddr, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var rsa RawSockaddrAny
|
|
|
|
var len _Socklen = SizeofSockaddrAny
|
|
|
|
nfd, errno = accept(fd, &rsa, &len)
|
2009-06-01 23:14:57 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
sa, errno = anyToSockaddr(&rsa)
|
2009-06-01 23:14:57 -06:00
|
|
|
if errno != 0 {
|
2009-12-15 16:40:16 -07:00
|
|
|
Close(nfd)
|
|
|
|
nfd = 0
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2009-06-17 22:44:26 -06:00
|
|
|
func Getsockname(fd int) (sa Sockaddr, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var rsa RawSockaddrAny
|
|
|
|
var len _Socklen = SizeofSockaddrAny
|
2009-06-17 22:44:26 -06:00
|
|
|
if errno = getsockname(fd, &rsa, &len); errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return
|
2009-06-17 22:44:26 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return anyToSockaddr(&rsa)
|
2009-06-17 22:44:26 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Getpeername(fd int) (sa Sockaddr, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var rsa RawSockaddrAny
|
|
|
|
var len _Socklen = SizeofSockaddrAny
|
2009-06-17 22:44:26 -06:00
|
|
|
if errno = getpeername(fd, &rsa, &len); errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return
|
2009-06-17 22:44:26 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return anyToSockaddr(&rsa)
|
2009-06-17 22:44:26 -06:00
|
|
|
}
|
|
|
|
|
2009-06-01 23:14:57 -06:00
|
|
|
func Bind(fd int, sa Sockaddr) (errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
ptr, n, err := sa.sockaddr()
|
2009-06-01 23:14:57 -06:00
|
|
|
if err != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return err
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return bind(fd, ptr, n)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Connect(fd int, sa Sockaddr) (errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
ptr, n, err := sa.sockaddr()
|
2009-06-01 23:14:57 -06:00
|
|
|
if err != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return err
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return connect(fd, ptr, n)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Socket(domain, typ, proto int) (fd, errno int) {
|
|
|
|
if domain == AF_INET6 && SocketDisableIPv6 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return -1, EAFNOSUPPORT
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
fd, errno = socket(domain, typ, proto)
|
|
|
|
return
|
2010-06-30 15:58:21 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func Socketpair(domain, typ, proto int) (fd [2]int, errno int) {
|
2010-08-20 07:12:21 -06:00
|
|
|
errno = socketpair(domain, typ, proto, &fd)
|
2010-06-30 15:58:21 -06:00
|
|
|
return
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func SetsockoptInt(fd, level, opt int, value int) (errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var n = int32(value)
|
|
|
|
return setsockopt(fd, level, opt, uintptr(unsafe.Pointer(&n)), 4)
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func SetsockoptTimeval(fd, level, opt int, tv *Timeval) (errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return setsockopt(fd, level, opt, uintptr(unsafe.Pointer(tv)), unsafe.Sizeof(*tv))
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func SetsockoptLinger(fd, level, opt int, l *Linger) (errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return setsockopt(fd, level, opt, uintptr(unsafe.Pointer(l)), unsafe.Sizeof(*l))
|
2009-06-01 23:14:57 -06:00
|
|
|
}
|
|
|
|
|
2011-02-03 12:15:35 -07:00
|
|
|
func SetsockoptIpMreq(fd, level, opt int, mreq *IpMreq) (errno int) {
|
|
|
|
return setsockopt(fd, level, opt, uintptr(unsafe.Pointer(mreq)), unsafe.Sizeof(*mreq))
|
|
|
|
}
|
|
|
|
|
2010-03-24 23:36:38 -06:00
|
|
|
func SetsockoptString(fd, level, opt int, s string) (errno int) {
|
|
|
|
return setsockopt(fd, level, opt, uintptr(unsafe.Pointer(&[]byte(s)[0])), len(s))
|
|
|
|
}
|
|
|
|
|
2009-11-01 12:13:27 -07:00
|
|
|
func Recvfrom(fd int, p []byte, flags int) (n int, from Sockaddr, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var rsa RawSockaddrAny
|
|
|
|
var len _Socklen = SizeofSockaddrAny
|
2009-11-01 12:13:27 -07:00
|
|
|
if n, errno = recvfrom(fd, p, flags, &rsa, &len); errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return
|
2009-11-01 12:13:27 -07:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
from, errno = anyToSockaddr(&rsa)
|
|
|
|
return
|
2009-11-01 12:13:27 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
func Sendto(fd int, p []byte, flags int, to Sockaddr) (errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
ptr, n, err := to.sockaddr()
|
2009-11-01 12:13:27 -07:00
|
|
|
if err != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return err
|
2009-11-01 12:13:27 -07:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
return sendto(fd, p, flags, ptr, n)
|
2009-11-01 12:13:27 -07:00
|
|
|
}
|
|
|
|
|
2011-01-19 12:34:53 -07:00
|
|
|
func Recvmsg(fd int, p, oob []byte, flags int) (n, oobn int, recvflags int, from Sockaddr, errno int) {
|
2010-12-07 11:40:14 -07:00
|
|
|
var msg Msghdr
|
|
|
|
var rsa RawSockaddrAny
|
|
|
|
msg.Name = (*byte)(unsafe.Pointer(&rsa))
|
|
|
|
msg.Namelen = uint32(SizeofSockaddrAny)
|
|
|
|
var iov Iovec
|
|
|
|
if len(p) > 0 {
|
|
|
|
iov.Base = (*byte)(unsafe.Pointer(&p[0]))
|
|
|
|
iov.SetLen(len(p))
|
|
|
|
}
|
|
|
|
var dummy byte
|
|
|
|
if len(oob) > 0 {
|
|
|
|
// receive at least one normal byte
|
|
|
|
if len(p) == 0 {
|
|
|
|
iov.Base = &dummy
|
|
|
|
iov.SetLen(1)
|
|
|
|
}
|
|
|
|
msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
|
|
|
|
msg.SetControllen(len(oob))
|
|
|
|
}
|
|
|
|
msg.Iov = &iov
|
|
|
|
msg.Iovlen = 1
|
|
|
|
if n, errno = recvmsg(fd, &msg, flags); errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
oobn = int(msg.Controllen)
|
|
|
|
recvflags = int(msg.Flags)
|
2011-01-19 12:34:53 -07:00
|
|
|
// source address is only specified if the socket is unconnected
|
|
|
|
if rsa.Addr.Family != 0 {
|
|
|
|
from, errno = anyToSockaddr(&rsa)
|
|
|
|
}
|
2010-12-07 11:40:14 -07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func Sendmsg(fd int, p, oob []byte, to Sockaddr, flags int) (errno int) {
|
|
|
|
var ptr uintptr
|
|
|
|
var nsock _Socklen
|
|
|
|
if to != nil {
|
|
|
|
var err int
|
|
|
|
ptr, nsock, err = to.sockaddr()
|
|
|
|
if err != 0 {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var msg Msghdr
|
|
|
|
msg.Name = (*byte)(unsafe.Pointer(ptr))
|
|
|
|
msg.Namelen = uint32(nsock)
|
|
|
|
var iov Iovec
|
|
|
|
if len(p) > 0 {
|
|
|
|
iov.Base = (*byte)(unsafe.Pointer(&p[0]))
|
|
|
|
iov.SetLen(len(p))
|
|
|
|
}
|
|
|
|
var dummy byte
|
|
|
|
if len(oob) > 0 {
|
|
|
|
// send at least one normal byte
|
|
|
|
if len(p) == 0 {
|
|
|
|
iov.Base = &dummy
|
|
|
|
iov.SetLen(1)
|
|
|
|
}
|
|
|
|
msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
|
|
|
|
msg.SetControllen(len(oob))
|
|
|
|
}
|
|
|
|
msg.Iov = &iov
|
|
|
|
msg.Iovlen = 1
|
|
|
|
if errno = sendmsg(fd, &msg, flags); errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2010-05-20 10:43:13 -06:00
|
|
|
// BindToDevice binds the socket associated with fd to device.
|
|
|
|
func BindToDevice(fd int, device string) (errno int) {
|
|
|
|
return SetsockoptString(fd, SOL_SOCKET, SO_BINDTODEVICE, device)
|
|
|
|
}
|
|
|
|
|
2009-07-14 11:53:04 -06:00
|
|
|
//sys ptrace(request int, pid int, addr uintptr, data uintptr) (errno int)
|
|
|
|
|
|
|
|
func ptracePeek(req int, pid int, addr uintptr, out []byte) (count int, errno int) {
|
|
|
|
// The peek requests are machine-size oriented, so we wrap it
|
|
|
|
// to retrieve arbitrary-length data.
|
|
|
|
|
|
|
|
// The ptrace syscall differs from glibc's ptrace.
|
|
|
|
// Peeks returns the word in *data, not as the return value.
|
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
var buf [sizeofPtr]byte
|
2009-07-14 11:53:04 -06:00
|
|
|
|
|
|
|
// Leading edge. PEEKTEXT/PEEKDATA don't require aligned
|
|
|
|
// access (PEEKUSER warns that it might), but if we don't
|
|
|
|
// align our reads, we might straddle an unmapped page
|
|
|
|
// boundary and not get the bytes leading up to the page
|
|
|
|
// boundary.
|
2009-12-15 16:40:16 -07:00
|
|
|
n := 0
|
2009-11-09 22:23:52 -07:00
|
|
|
if addr%sizeofPtr != 0 {
|
2009-12-15 16:40:16 -07:00
|
|
|
errno = ptrace(req, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
|
2009-07-14 11:53:04 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return 0, errno
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
n += copy(out, buf[addr%sizeofPtr:])
|
|
|
|
out = out[n:]
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Remainder.
|
|
|
|
for len(out) > 0 {
|
|
|
|
// We use an internal buffer to gaurantee alignment.
|
|
|
|
// It's not documented if this is necessary, but we're paranoid.
|
2009-12-15 16:40:16 -07:00
|
|
|
errno = ptrace(req, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
|
2009-07-14 11:53:04 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return n, errno
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
2010-05-27 15:51:47 -06:00
|
|
|
copied := copy(out, buf[0:])
|
2009-12-15 16:40:16 -07:00
|
|
|
n += copied
|
|
|
|
out = out[copied:]
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
return n, 0
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtracePeekText(pid int, addr uintptr, out []byte) (count int, errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptracePeek(PTRACE_PEEKTEXT, pid, addr, out)
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtracePeekData(pid int, addr uintptr, out []byte) (count int, errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptracePeek(PTRACE_PEEKDATA, pid, addr, out)
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func ptracePoke(pokeReq int, peekReq int, pid int, addr uintptr, data []byte) (count int, errno int) {
|
|
|
|
// As for ptracePeek, we need to align our accesses to deal
|
|
|
|
// with the possibility of straddling an invalid page.
|
|
|
|
|
|
|
|
// Leading edge.
|
2009-12-15 16:40:16 -07:00
|
|
|
n := 0
|
2009-11-09 22:23:52 -07:00
|
|
|
if addr%sizeofPtr != 0 {
|
2009-12-15 16:40:16 -07:00
|
|
|
var buf [sizeofPtr]byte
|
|
|
|
errno = ptrace(peekReq, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
|
2009-07-14 11:53:04 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return 0, errno
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
n += copy(buf[addr%sizeofPtr:], data)
|
|
|
|
word := *((*uintptr)(unsafe.Pointer(&buf[0])))
|
|
|
|
errno = ptrace(pokeReq, pid, addr-addr%sizeofPtr, word)
|
2009-07-14 11:53:04 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return 0, errno
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
data = data[n:]
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Interior.
|
|
|
|
for len(data) > sizeofPtr {
|
2009-12-15 16:40:16 -07:00
|
|
|
word := *((*uintptr)(unsafe.Pointer(&data[0])))
|
|
|
|
errno = ptrace(pokeReq, pid, addr+uintptr(n), word)
|
2009-07-14 11:53:04 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return n, errno
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
n += sizeofPtr
|
|
|
|
data = data[sizeofPtr:]
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Trailing edge.
|
|
|
|
if len(data) > 0 {
|
2009-12-15 16:40:16 -07:00
|
|
|
var buf [sizeofPtr]byte
|
|
|
|
errno = ptrace(peekReq, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
|
2009-07-14 11:53:04 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return n, errno
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
2010-05-27 15:51:47 -06:00
|
|
|
copy(buf[0:], data)
|
2009-12-15 16:40:16 -07:00
|
|
|
word := *((*uintptr)(unsafe.Pointer(&buf[0])))
|
|
|
|
errno = ptrace(pokeReq, pid, addr+uintptr(n), word)
|
2009-07-14 11:53:04 -06:00
|
|
|
if errno != 0 {
|
2009-11-09 13:07:39 -07:00
|
|
|
return n, errno
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
2009-12-15 16:40:16 -07:00
|
|
|
n += len(data)
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
return n, 0
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtracePokeText(pid int, addr uintptr, data []byte) (count int, errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptracePoke(PTRACE_POKETEXT, PTRACE_PEEKTEXT, pid, addr, data)
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtracePokeData(pid int, addr uintptr, data []byte) (count int, errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptracePoke(PTRACE_POKEDATA, PTRACE_PEEKDATA, pid, addr, data)
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtraceGetRegs(pid int, regsout *PtraceRegs) (errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtraceSetRegs(pid int, regs *PtraceRegs) (errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtraceSetOptions(pid int, options int) (errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptrace(PTRACE_SETOPTIONS, pid, 0, uintptr(options))
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtraceGetEventMsg(pid int) (msg uint, errno int) {
|
2009-12-15 16:40:16 -07:00
|
|
|
var data _C_long
|
|
|
|
errno = ptrace(PTRACE_GETEVENTMSG, pid, 0, uintptr(unsafe.Pointer(&data)))
|
|
|
|
msg = uint(data)
|
|
|
|
return
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func PtraceCont(pid int, signal int) (errno int) {
|
2009-11-09 13:07:39 -07:00
|
|
|
return ptrace(PTRACE_CONT, pid, 0, uintptr(signal))
|
2009-07-14 11:53:04 -06:00
|
|
|
}
|
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func PtraceSingleStep(pid int) (errno int) { return ptrace(PTRACE_SINGLESTEP, pid, 0, 0) }
|
2009-07-14 11:53:04 -06:00
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func PtraceAttach(pid int) (errno int) { return ptrace(PTRACE_ATTACH, pid, 0, 0) }
|
2009-07-14 11:53:04 -06:00
|
|
|
|
2009-12-15 16:40:16 -07:00
|
|
|
func PtraceDetach(pid int) (errno int) { return ptrace(PTRACE_DETACH, pid, 0, 0) }
|
2009-07-14 11:53:04 -06:00
|
|
|
|
2009-06-01 23:14:57 -06:00
|
|
|
// Sendto
|
|
|
|
// Recvfrom
|
|
|
|
// Socketpair
|
|
|
|
// Getsockopt
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Direct access
|
|
|
|
*/
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys Access(path string, mode uint32) (errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Acct(path string) (errno int)
|
|
|
|
//sys Adjtimex(buf *Timex) (state int, errno int)
|
|
|
|
//sys Chdir(path string) (errno int)
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys Chmod(path string, mode uint32) (errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Chroot(path string) (errno int)
|
|
|
|
//sys Close(fd int) (errno int)
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys Creat(path string, mode uint32) (fd int, errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Dup(oldfd int) (fd int, errno int)
|
|
|
|
//sys Dup2(oldfd int, newfd int) (fd int, errno int)
|
|
|
|
//sys EpollCreate(size int) (fd int, errno int)
|
|
|
|
//sys EpollCtl(epfd int, op int, fd int, event *EpollEvent) (errno int)
|
|
|
|
//sys EpollWait(epfd int, events []EpollEvent, msec int) (n int, errno int)
|
|
|
|
//sys Exit(code int) = SYS_EXIT_GROUP
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys Faccessat(dirfd int, path string, mode uint32, flags int) (errno int)
|
|
|
|
//sys Fallocate(fd int, mode uint32, off int64, len int64) (errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Fchdir(fd int) (errno int)
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys Fchmod(fd int, mode uint32) (errno int)
|
|
|
|
//sys Fchmodat(dirfd int, path string, mode uint32, flags int) (errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Fchownat(dirfd int, path string, uid int, gid int, flags int) (errno int)
|
|
|
|
//sys fcntl(fd int, cmd int, arg int) (val int, errno int)
|
|
|
|
//sys Fdatasync(fd int) (errno int)
|
|
|
|
//sys Fsync(fd int) (errno int)
|
|
|
|
//sys Getdents(fd int, buf []byte) (n int, errno int) = SYS_GETDENTS64
|
|
|
|
//sys Getpgid(pid int) (pgid int, errno int)
|
|
|
|
//sys Getpgrp() (pid int)
|
|
|
|
//sys Getpid() (pid int)
|
|
|
|
//sys Getppid() (ppid int)
|
|
|
|
//sys Getrlimit(resource int, rlim *Rlimit) (errno int)
|
|
|
|
//sys Getrusage(who int, rusage *Rusage) (errno int)
|
|
|
|
//sys Gettid() (tid int)
|
2010-09-27 09:44:26 -06:00
|
|
|
//sys InotifyAddWatch(fd int, pathname string, mask uint32) (watchdesc int, errno int)
|
|
|
|
//sys InotifyInit() (fd int, errno int)
|
|
|
|
//sys InotifyInit1(flags int) (fd int, errno int)
|
|
|
|
//sys InotifyRmWatch(fd int, watchdesc uint32) (success int, errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Kill(pid int, sig int) (errno int)
|
|
|
|
//sys Klogctl(typ int, buf []byte) (n int, errno int) = SYS_SYSLOG
|
|
|
|
//sys Link(oldpath string, newpath string) (errno int)
|
2010-08-03 16:34:52 -06:00
|
|
|
//sys Mkdir(path string, mode uint32) (errno int)
|
|
|
|
//sys Mkdirat(dirfd int, path string, mode uint32) (errno int)
|
|
|
|
//sys Mknod(path string, mode uint32, dev int) (errno int)
|
|
|
|
//sys Mknodat(dirfd int, path string, mode uint32, dev int) (errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Nanosleep(time *Timespec, leftover *Timespec) (errno int)
|
|
|
|
//sys Pause() (errno int)
|
|
|
|
//sys PivotRoot(newroot string, putold string) (errno int) = SYS_PIVOT_ROOT
|
|
|
|
//sys Read(fd int, p []byte) (n int, errno int)
|
|
|
|
//sys Readlink(path string, buf []byte) (n int, errno int)
|
|
|
|
//sys Rename(oldpath string, newpath string) (errno int)
|
|
|
|
//sys Renameat(olddirfd int, oldpath string, newdirfd int, newpath string) (errno int)
|
|
|
|
//sys Rmdir(path string) (errno int)
|
|
|
|
//sys Setdomainname(p []byte) (errno int)
|
|
|
|
//sys Sethostname(p []byte) (errno int)
|
|
|
|
//sys Setpgid(pid int, pgid int) (errno int)
|
|
|
|
//sys Setrlimit(resource int, rlim *Rlimit) (errno int)
|
2010-04-18 21:12:11 -06:00
|
|
|
//sys Setsid() (pid int, errno int)
|
2009-06-01 23:14:57 -06:00
|
|
|
//sys Settimeofday(tv *Timeval) (errno int)
|
|
|
|
//sys Setuid(uid int) (errno int)
|
|
|
|
//sys Symlink(oldpath string, newpath string) (errno int)
|
|
|
|
//sys Sync()
|
|
|
|
//sys Sysinfo(info *Sysinfo_t) (errno int)
|
|
|
|
//sys Tee(rfd int, wfd int, len int, flags int) (n int64, errno int)
|
|
|
|
//sys Tgkill(tgid int, tid int, sig int) (errno int)
|
|
|
|
//sys Times(tms *Tms) (ticks uintptr, errno int)
|
|
|
|
//sys Umask(mask int) (oldmask int)
|
|
|
|
//sys Uname(buf *Utsname) (errno int)
|
|
|
|
//sys Unlink(path string) (errno int)
|
|
|
|
//sys Unlinkat(dirfd int, path string) (errno int)
|
|
|
|
//sys Unshare(flags int) (errno int)
|
|
|
|
//sys Ustat(dev int, ubuf *Ustat_t) (errno int)
|
|
|
|
//sys Utime(path string, buf *Utimbuf) (errno int)
|
|
|
|
//sys Write(fd int, p []byte) (n int, errno int)
|
|
|
|
//sys exitThread(code int) (errno int) = SYS_EXIT
|
|
|
|
//sys read(fd int, p *byte, np int) (n int, errno int)
|
|
|
|
//sys write(fd int, p *byte, np int) (n int, errno int)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unimplemented
|
|
|
|
*/
|
|
|
|
// AddKey
|
|
|
|
// AfsSyscall
|
|
|
|
// Alarm
|
|
|
|
// ArchPrctl
|
|
|
|
// Brk
|
|
|
|
// Capget
|
|
|
|
// Capset
|
|
|
|
// ClockGetres
|
|
|
|
// ClockGettime
|
|
|
|
// ClockNanosleep
|
|
|
|
// ClockSettime
|
|
|
|
// Clone
|
|
|
|
// CreateModule
|
|
|
|
// DeleteModule
|
|
|
|
// EpollCtlOld
|
|
|
|
// EpollPwait
|
|
|
|
// EpollWaitOld
|
|
|
|
// Eventfd
|
|
|
|
// Execve
|
|
|
|
// Fadvise64
|
|
|
|
// Fgetxattr
|
|
|
|
// Flistxattr
|
|
|
|
// Flock
|
|
|
|
// Fork
|
|
|
|
// Fremovexattr
|
|
|
|
// Fsetxattr
|
|
|
|
// Futex
|
|
|
|
// GetKernelSyms
|
|
|
|
// GetMempolicy
|
|
|
|
// GetRobustList
|
|
|
|
// GetThreadArea
|
|
|
|
// Getitimer
|
|
|
|
// Getpmsg
|
|
|
|
// Getpriority
|
|
|
|
// Getxattr
|
|
|
|
// IoCancel
|
|
|
|
// IoDestroy
|
|
|
|
// IoGetevents
|
|
|
|
// IoSetup
|
|
|
|
// IoSubmit
|
|
|
|
// Ioctl
|
|
|
|
// IoprioGet
|
|
|
|
// IoprioSet
|
|
|
|
// KexecLoad
|
|
|
|
// Keyctl
|
|
|
|
// Lgetxattr
|
|
|
|
// Listxattr
|
|
|
|
// Llistxattr
|
|
|
|
// LookupDcookie
|
|
|
|
// Lremovexattr
|
|
|
|
// Lsetxattr
|
|
|
|
// Madvise
|
|
|
|
// Mbind
|
|
|
|
// MigratePages
|
|
|
|
// Mincore
|
|
|
|
// Mlock
|
|
|
|
// Mmap
|
|
|
|
// ModifyLdt
|
|
|
|
// Mount
|
|
|
|
// MovePages
|
|
|
|
// Mprotect
|
|
|
|
// MqGetsetattr
|
|
|
|
// MqNotify
|
|
|
|
// MqOpen
|
|
|
|
// MqTimedreceive
|
|
|
|
// MqTimedsend
|
|
|
|
// MqUnlink
|
|
|
|
// Mremap
|
|
|
|
// Msgctl
|
|
|
|
// Msgget
|
|
|
|
// Msgrcv
|
|
|
|
// Msgsnd
|
|
|
|
// Msync
|
|
|
|
// Munlock
|
|
|
|
// Munlockall
|
|
|
|
// Munmap
|
|
|
|
// Newfstatat
|
|
|
|
// Nfsservctl
|
|
|
|
// Personality
|
|
|
|
// Poll
|
|
|
|
// Ppoll
|
|
|
|
// Prctl
|
|
|
|
// Pselect6
|
|
|
|
// Ptrace
|
|
|
|
// Putpmsg
|
|
|
|
// QueryModule
|
|
|
|
// Quotactl
|
|
|
|
// Readahead
|
|
|
|
// Readv
|
|
|
|
// Reboot
|
|
|
|
// RemapFilePages
|
|
|
|
// Removexattr
|
|
|
|
// RequestKey
|
|
|
|
// RestartSyscall
|
|
|
|
// RtSigaction
|
|
|
|
// RtSigpending
|
|
|
|
// RtSigprocmask
|
|
|
|
// RtSigqueueinfo
|
|
|
|
// RtSigreturn
|
|
|
|
// RtSigsuspend
|
|
|
|
// RtSigtimedwait
|
|
|
|
// SchedGetPriorityMax
|
|
|
|
// SchedGetPriorityMin
|
|
|
|
// SchedGetaffinity
|
|
|
|
// SchedGetparam
|
|
|
|
// SchedGetscheduler
|
|
|
|
// SchedRrGetInterval
|
|
|
|
// SchedSetaffinity
|
|
|
|
// SchedSetparam
|
|
|
|
// SchedYield
|
|
|
|
// Security
|
|
|
|
// Semctl
|
|
|
|
// Semget
|
|
|
|
// Semop
|
|
|
|
// Semtimedop
|
|
|
|
// Sendfile
|
|
|
|
// SetMempolicy
|
|
|
|
// SetRobustList
|
|
|
|
// SetThreadArea
|
|
|
|
// SetTidAddress
|
|
|
|
// Setpriority
|
|
|
|
// Setxattr
|
|
|
|
// Shmat
|
|
|
|
// Shmctl
|
|
|
|
// Shmdt
|
|
|
|
// Shmget
|
|
|
|
// Sigaltstack
|
|
|
|
// Signalfd
|
|
|
|
// Swapoff
|
|
|
|
// Swapon
|
|
|
|
// Sysfs
|
|
|
|
// TimerCreate
|
|
|
|
// TimerDelete
|
|
|
|
// TimerGetoverrun
|
|
|
|
// TimerGettime
|
|
|
|
// TimerSettime
|
|
|
|
// Timerfd
|
|
|
|
// Tkill (obsolete)
|
|
|
|
// Tuxcall
|
|
|
|
// Umount2
|
|
|
|
// Uselib
|
|
|
|
// Utimensat
|
|
|
|
// Vfork
|
|
|
|
// Vhangup
|
|
|
|
// Vmsplice
|
|
|
|
// Vserver
|
|
|
|
// Waitid
|
|
|
|
// Writev
|
|
|
|
// _Sysctl
|