1 // Copyright 2009 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file.
6 // This file is compiled as ordinary Go code,
7 // but it is also input to mksyscall,
8 // which parses the //sys lines and generates system call stubs.
9 // Note that sometimes we use a lowercase //sys name and
10 // wrap it in our own nicer implementation.
23 func Access(path string, mode uint32) (err error) {
24 return Faccessat(AT_FDCWD, path, mode, 0)
27 func Chmod(path string, mode uint32) (err error) {
28 return Fchmodat(AT_FDCWD, path, mode, 0)
31 func Chown(path string, uid int, gid int) (err error) {
32 return Fchownat(AT_FDCWD, path, uid, gid, 0)
35 func Creat(path string, mode uint32) (fd int, err error) {
36 return Open(path, O_CREAT|O_WRONLY|O_TRUNC, mode)
39 //sys Linkat(olddirfd int, oldpath string, newdirfd int, newpath string, flags int) (err error)
41 func Link(oldpath string, newpath string) (err error) {
42 return Linkat(AT_FDCWD, oldpath, AT_FDCWD, newpath, 0)
45 func Mkdir(path string, mode uint32) (err error) {
46 return Mkdirat(AT_FDCWD, path, mode)
49 func Mknod(path string, mode uint32, dev int) (err error) {
50 return Mknodat(AT_FDCWD, path, mode, dev)
53 func Open(path string, mode int, perm uint32) (fd int, err error) {
54 return openat(AT_FDCWD, path, mode|O_LARGEFILE, perm)
57 //sys openat(dirfd int, path string, flags int, mode uint32) (fd int, err error)
59 func Openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) {
60 return openat(dirfd, path, flags|O_LARGEFILE, mode)
63 //sys ppoll(fds *PollFd, nfds int, timeout *Timespec, sigmask *Sigset_t) (n int, err error)
65 func Ppoll(fds []PollFd, timeout *Timespec, sigmask *Sigset_t) (n int, err error) {
67 return ppoll(nil, 0, timeout, sigmask)
69 return ppoll(&fds[0], len(fds), timeout, sigmask)
72 //sys Readlinkat(dirfd int, path string, buf []byte) (n int, err error)
74 func Readlink(path string, buf []byte) (n int, err error) {
75 return Readlinkat(AT_FDCWD, path, buf)
78 func Rename(oldpath string, newpath string) (err error) {
79 return Renameat(AT_FDCWD, oldpath, AT_FDCWD, newpath)
82 func Rmdir(path string) error {
83 return Unlinkat(AT_FDCWD, path, AT_REMOVEDIR)
86 //sys Symlinkat(oldpath string, newdirfd int, newpath string) (err error)
88 func Symlink(oldpath string, newpath string) (err error) {
89 return Symlinkat(oldpath, AT_FDCWD, newpath)
92 func Unlink(path string) error {
93 return Unlinkat(AT_FDCWD, path, 0)
96 //sys Unlinkat(dirfd int, path string, flags int) (err error)
98 //sys utimes(path string, times *[2]Timeval) (err error)
100 func Utimes(path string, tv []Timeval) error {
102 err := utimensat(AT_FDCWD, path, nil, 0)
106 return utimes(path, nil)
112 ts[0] = NsecToTimespec(TimevalToNsec(tv[0]))
113 ts[1] = NsecToTimespec(TimevalToNsec(tv[1]))
114 err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0)
118 return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
121 //sys utimensat(dirfd int, path string, times *[2]Timespec, flags int) (err error)
123 func UtimesNano(path string, ts []Timespec) error {
125 err := utimensat(AT_FDCWD, path, nil, 0)
129 return utimes(path, nil)
134 err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0)
138 // If the utimensat syscall isn't available (utimensat was added to Linux
139 // in 2.6.22, Released, 8 July 2007) then fall back to utimes
141 for i := 0; i < 2; i++ {
142 tv[i] = NsecToTimeval(TimespecToNsec(ts[i]))
144 return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
147 func UtimesNanoAt(dirfd int, path string, ts []Timespec, flags int) error {
149 return utimensat(dirfd, path, nil, flags)
154 return utimensat(dirfd, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), flags)
157 //sys futimesat(dirfd int, path *byte, times *[2]Timeval) (err error)
159 func Futimesat(dirfd int, path string, tv []Timeval) error {
160 pathp, err := BytePtrFromString(path)
165 return futimesat(dirfd, pathp, nil)
170 return futimesat(dirfd, pathp, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
173 func Futimes(fd int, tv []Timeval) (err error) {
174 // Believe it or not, this is the best we can do on Linux
175 // (and is what glibc does).
176 return Utimes("/proc/self/fd/"+itoa(fd), tv)
179 const ImplementsGetwd = true
181 //sys Getcwd(buf []byte) (n int, err error)
183 func Getwd() (wd string, err error) {
184 var buf [PathMax]byte
185 n, err := Getcwd(buf[0:])
189 // Getcwd returns the number of bytes written to buf, including the NUL.
190 if n < 1 || n > len(buf) || buf[n-1] != 0 {
193 return string(buf[0 : n-1]), nil
196 func Getgroups() (gids []int, err error) {
197 n, err := getgroups(0, nil)
205 // Sanity check group count. Max is 1<<16 on Linux.
206 if n < 0 || n > 1<<20 {
210 a := make([]_Gid_t, n)
211 n, err = getgroups(n, &a[0])
215 gids = make([]int, n)
216 for i, v := range a[0:n] {
222 func Setgroups(gids []int) (err error) {
224 return setgroups(0, nil)
227 a := make([]_Gid_t, len(gids))
228 for i, v := range gids {
231 return setgroups(len(a), &a[0])
234 type WaitStatus uint32
236 // Wait status is 7 bits at bottom, either 0 (exited),
237 // 0x7F (stopped), or a signal number that caused an exit.
238 // The 0x80 bit is whether there was a core dump.
239 // An extra number (exit code, signal causing a stop)
240 // is in the high bits. At least that's the idea.
241 // There are various irregularities. For example, the
242 // "continued" status is 0xFFFF, distinguishing itself
243 // from stopped via the core dump bit.
253 func (w WaitStatus) Exited() bool { return w&mask == exited }
255 func (w WaitStatus) Signaled() bool { return w&mask != stopped && w&mask != exited }
257 func (w WaitStatus) Stopped() bool { return w&0xFF == stopped }
259 func (w WaitStatus) Continued() bool { return w == 0xFFFF }
261 func (w WaitStatus) CoreDump() bool { return w.Signaled() && w&core != 0 }
263 func (w WaitStatus) ExitStatus() int {
267 return int(w>>shift) & 0xFF
270 func (w WaitStatus) Signal() syscall.Signal {
274 return syscall.Signal(w & mask)
277 func (w WaitStatus) StopSignal() syscall.Signal {
281 return syscall.Signal(w>>shift) & 0xFF
284 func (w WaitStatus) TrapCause() int {
285 if w.StopSignal() != SIGTRAP {
288 return int(w>>shift) >> 8
291 //sys wait4(pid int, wstatus *_C_int, options int, rusage *Rusage) (wpid int, err error)
293 func Wait4(pid int, wstatus *WaitStatus, options int, rusage *Rusage) (wpid int, err error) {
295 wpid, err = wait4(pid, &status, options, rusage)
297 *wstatus = WaitStatus(status)
302 func Mkfifo(path string, mode uint32) (err error) {
303 return Mknod(path, mode|S_IFIFO, 0)
306 func (sa *SockaddrInet4) sockaddr() (unsafe.Pointer, _Socklen, error) {
307 if sa.Port < 0 || sa.Port > 0xFFFF {
308 return nil, 0, EINVAL
310 sa.raw.Family = AF_INET
311 p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
312 p[0] = byte(sa.Port >> 8)
314 for i := 0; i < len(sa.Addr); i++ {
315 sa.raw.Addr[i] = sa.Addr[i]
317 return unsafe.Pointer(&sa.raw), SizeofSockaddrInet4, nil
320 func (sa *SockaddrInet6) sockaddr() (unsafe.Pointer, _Socklen, error) {
321 if sa.Port < 0 || sa.Port > 0xFFFF {
322 return nil, 0, EINVAL
324 sa.raw.Family = AF_INET6
325 p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
326 p[0] = byte(sa.Port >> 8)
328 sa.raw.Scope_id = sa.ZoneId
329 for i := 0; i < len(sa.Addr); i++ {
330 sa.raw.Addr[i] = sa.Addr[i]
332 return unsafe.Pointer(&sa.raw), SizeofSockaddrInet6, nil
335 func (sa *SockaddrUnix) sockaddr() (unsafe.Pointer, _Socklen, error) {
338 if n >= len(sa.raw.Path) {
339 return nil, 0, EINVAL
341 sa.raw.Family = AF_UNIX
342 for i := 0; i < n; i++ {
343 sa.raw.Path[i] = int8(name[i])
345 // length is family (uint16), name, NUL.
348 sl += _Socklen(n) + 1
350 if sa.raw.Path[0] == '@' {
352 // Don't count trailing NUL for abstract address.
356 return unsafe.Pointer(&sa.raw), sl, nil
359 type SockaddrLinklayer struct {
366 raw RawSockaddrLinklayer
369 func (sa *SockaddrLinklayer) sockaddr() (unsafe.Pointer, _Socklen, error) {
370 if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff {
371 return nil, 0, EINVAL
373 sa.raw.Family = AF_PACKET
374 sa.raw.Protocol = sa.Protocol
375 sa.raw.Ifindex = int32(sa.Ifindex)
376 sa.raw.Hatype = sa.Hatype
377 sa.raw.Pkttype = sa.Pkttype
378 sa.raw.Halen = sa.Halen
379 for i := 0; i < len(sa.Addr); i++ {
380 sa.raw.Addr[i] = sa.Addr[i]
382 return unsafe.Pointer(&sa.raw), SizeofSockaddrLinklayer, nil
385 type SockaddrNetlink struct {
390 raw RawSockaddrNetlink
393 func (sa *SockaddrNetlink) sockaddr() (unsafe.Pointer, _Socklen, error) {
394 sa.raw.Family = AF_NETLINK
397 sa.raw.Groups = sa.Groups
398 return unsafe.Pointer(&sa.raw), SizeofSockaddrNetlink, nil
401 type SockaddrHCI struct {
407 func (sa *SockaddrHCI) sockaddr() (unsafe.Pointer, _Socklen, error) {
408 sa.raw.Family = AF_BLUETOOTH
410 sa.raw.Channel = sa.Channel
411 return unsafe.Pointer(&sa.raw), SizeofSockaddrHCI, nil
414 // SockaddrCAN implements the Sockaddr interface for AF_CAN type sockets.
415 // The RxID and TxID fields are used for transport protocol addressing in
416 // (CAN_TP16, CAN_TP20, CAN_MCNET, and CAN_ISOTP), they can be left with
417 // zero values for CAN_RAW and CAN_BCM sockets as they have no meaning.
419 // The SockaddrCAN struct must be bound to the socket file descriptor
420 // using Bind before the CAN socket can be used.
422 // // Read one raw CAN frame
423 // fd, _ := Socket(AF_CAN, SOCK_RAW, CAN_RAW)
424 // addr := &SockaddrCAN{Ifindex: index}
426 // frame := make([]byte, 16)
429 // The full SocketCAN documentation can be found in the linux kernel
430 // archives at: https://www.kernel.org/doc/Documentation/networking/can.txt
431 type SockaddrCAN struct {
438 func (sa *SockaddrCAN) sockaddr() (unsafe.Pointer, _Socklen, error) {
439 if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff {
440 return nil, 0, EINVAL
442 sa.raw.Family = AF_CAN
443 sa.raw.Ifindex = int32(sa.Ifindex)
444 rx := (*[4]byte)(unsafe.Pointer(&sa.RxID))
445 for i := 0; i < 4; i++ {
446 sa.raw.Addr[i] = rx[i]
448 tx := (*[4]byte)(unsafe.Pointer(&sa.TxID))
449 for i := 0; i < 4; i++ {
450 sa.raw.Addr[i+4] = tx[i]
452 return unsafe.Pointer(&sa.raw), SizeofSockaddrCAN, nil
455 // SockaddrALG implements the Sockaddr interface for AF_ALG type sockets.
456 // SockaddrALG enables userspace access to the Linux kernel's cryptography
457 // subsystem. The Type and Name fields specify which type of hash or cipher
458 // should be used with a given socket.
460 // To create a file descriptor that provides access to a hash or cipher, both
461 // Bind and Accept must be used. Once the setup process is complete, input
462 // data can be written to the socket, processed by the kernel, and then read
463 // back as hash output or ciphertext.
465 // Here is an example of using an AF_ALG socket with SHA1 hashing.
466 // The initial socket setup process is as follows:
468 // // Open a socket to perform SHA1 hashing.
469 // fd, _ := unix.Socket(unix.AF_ALG, unix.SOCK_SEQPACKET, 0)
470 // addr := &unix.SockaddrALG{Type: "hash", Name: "sha1"}
471 // unix.Bind(fd, addr)
472 // // Note: unix.Accept does not work at this time; must invoke accept()
473 // // manually using unix.Syscall.
474 // hashfd, _, _ := unix.Syscall(unix.SYS_ACCEPT, uintptr(fd), 0, 0)
476 // Once a file descriptor has been returned from Accept, it may be used to
477 // perform SHA1 hashing. The descriptor is not safe for concurrent use, but
478 // may be re-used repeatedly with subsequent Write and Read operations.
480 // When hashing a small byte slice or string, a single Write and Read may
483 // // Assume hashfd is already configured using the setup process.
484 // hash := os.NewFile(hashfd, "sha1")
485 // // Hash an input string and read the results. Each Write discards
486 // // previous hash state. Read always reads the current state.
487 // b := make([]byte, 20)
488 // for i := 0; i < 2; i++ {
489 // io.WriteString(hash, "Hello, world.")
491 // fmt.Println(hex.EncodeToString(b))
494 // // 2ae01472317d1935a84797ec1983ae243fc6aa28
495 // // 2ae01472317d1935a84797ec1983ae243fc6aa28
497 // For hashing larger byte slices, or byte streams such as those read from
498 // a file or socket, use Sendto with MSG_MORE to instruct the kernel to update
499 // the hash digest instead of creating a new one for a given chunk and finalizing it.
501 // // Assume hashfd and addr are already configured using the setup process.
502 // hash := os.NewFile(hashfd, "sha1")
503 // // Hash the contents of a file.
504 // f, _ := os.Open("/tmp/linux-4.10-rc7.tar.xz")
505 // b := make([]byte, 4096)
507 // n, err := f.Read(b)
508 // if err == io.EOF {
511 // unix.Sendto(hashfd, b[:n], unix.MSG_MORE, addr)
514 // fmt.Println(hex.EncodeToString(b))
515 // // Output: 85cdcad0c06eef66f805ecce353bec9accbeecc5
517 // For more information, see: http://www.chronox.de/crypto-API/crypto/userspace-if.html.
518 type SockaddrALG struct {
526 func (sa *SockaddrALG) sockaddr() (unsafe.Pointer, _Socklen, error) {
527 // Leave room for NUL byte terminator.
528 if len(sa.Type) > 13 {
529 return nil, 0, EINVAL
531 if len(sa.Name) > 63 {
532 return nil, 0, EINVAL
535 sa.raw.Family = AF_ALG
536 sa.raw.Feat = sa.Feature
537 sa.raw.Mask = sa.Mask
539 typ, err := ByteSliceFromString(sa.Type)
543 name, err := ByteSliceFromString(sa.Name)
548 copy(sa.raw.Type[:], typ)
549 copy(sa.raw.Name[:], name)
551 return unsafe.Pointer(&sa.raw), SizeofSockaddrALG, nil
554 func anyToSockaddr(rsa *RawSockaddrAny) (Sockaddr, error) {
555 switch rsa.Addr.Family {
557 pp := (*RawSockaddrNetlink)(unsafe.Pointer(rsa))
558 sa := new(SockaddrNetlink)
559 sa.Family = pp.Family
562 sa.Groups = pp.Groups
566 pp := (*RawSockaddrLinklayer)(unsafe.Pointer(rsa))
567 sa := new(SockaddrLinklayer)
568 sa.Protocol = pp.Protocol
569 sa.Ifindex = int(pp.Ifindex)
570 sa.Hatype = pp.Hatype
571 sa.Pkttype = pp.Pkttype
573 for i := 0; i < len(sa.Addr); i++ {
574 sa.Addr[i] = pp.Addr[i]
579 pp := (*RawSockaddrUnix)(unsafe.Pointer(rsa))
580 sa := new(SockaddrUnix)
582 // "Abstract" Unix domain socket.
583 // Rewrite leading NUL as @ for textual display.
584 // (This is the standard convention.)
585 // Not friendly to overwrite in place,
586 // but the callers below don't care.
590 // Assume path ends at NUL.
591 // This is not technically the Linux semantics for
592 // abstract Unix domain sockets--they are supposed
593 // to be uninterpreted fixed-size binary blobs--but
594 // everyone uses this convention.
596 for n < len(pp.Path) && pp.Path[n] != 0 {
599 bytes := (*[10000]byte)(unsafe.Pointer(&pp.Path[0]))[0:n]
600 sa.Name = string(bytes)
604 pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa))
605 sa := new(SockaddrInet4)
606 p := (*[2]byte)(unsafe.Pointer(&pp.Port))
607 sa.Port = int(p[0])<<8 + int(p[1])
608 for i := 0; i < len(sa.Addr); i++ {
609 sa.Addr[i] = pp.Addr[i]
614 pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa))
615 sa := new(SockaddrInet6)
616 p := (*[2]byte)(unsafe.Pointer(&pp.Port))
617 sa.Port = int(p[0])<<8 + int(p[1])
618 sa.ZoneId = pp.Scope_id
619 for i := 0; i < len(sa.Addr); i++ {
620 sa.Addr[i] = pp.Addr[i]
624 return nil, EAFNOSUPPORT
627 func Accept(fd int) (nfd int, sa Sockaddr, err error) {
628 var rsa RawSockaddrAny
629 var len _Socklen = SizeofSockaddrAny
630 nfd, err = accept(fd, &rsa, &len)
634 sa, err = anyToSockaddr(&rsa)
642 func Accept4(fd int, flags int) (nfd int, sa Sockaddr, err error) {
643 var rsa RawSockaddrAny
644 var len _Socklen = SizeofSockaddrAny
645 nfd, err = accept4(fd, &rsa, &len, flags)
649 if len > SizeofSockaddrAny {
650 panic("RawSockaddrAny too small")
652 sa, err = anyToSockaddr(&rsa)
660 func Getsockname(fd int) (sa Sockaddr, err error) {
661 var rsa RawSockaddrAny
662 var len _Socklen = SizeofSockaddrAny
663 if err = getsockname(fd, &rsa, &len); err != nil {
666 return anyToSockaddr(&rsa)
669 func GetsockoptInet4Addr(fd, level, opt int) (value [4]byte, err error) {
670 vallen := _Socklen(4)
671 err = getsockopt(fd, level, opt, unsafe.Pointer(&value[0]), &vallen)
675 func GetsockoptIPMreq(fd, level, opt int) (*IPMreq, error) {
677 vallen := _Socklen(SizeofIPMreq)
678 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
682 func GetsockoptIPMreqn(fd, level, opt int) (*IPMreqn, error) {
684 vallen := _Socklen(SizeofIPMreqn)
685 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
689 func GetsockoptIPv6Mreq(fd, level, opt int) (*IPv6Mreq, error) {
691 vallen := _Socklen(SizeofIPv6Mreq)
692 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
696 func GetsockoptIPv6MTUInfo(fd, level, opt int) (*IPv6MTUInfo, error) {
697 var value IPv6MTUInfo
698 vallen := _Socklen(SizeofIPv6MTUInfo)
699 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
703 func GetsockoptICMPv6Filter(fd, level, opt int) (*ICMPv6Filter, error) {
704 var value ICMPv6Filter
705 vallen := _Socklen(SizeofICMPv6Filter)
706 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
710 func GetsockoptUcred(fd, level, opt int) (*Ucred, error) {
712 vallen := _Socklen(SizeofUcred)
713 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
717 func SetsockoptIPMreqn(fd, level, opt int, mreq *IPMreqn) (err error) {
718 return setsockopt(fd, level, opt, unsafe.Pointer(mreq), unsafe.Sizeof(*mreq))
721 func Recvmsg(fd int, p, oob []byte, flags int) (n, oobn int, recvflags int, from Sockaddr, err error) {
723 var rsa RawSockaddrAny
724 msg.Name = (*byte)(unsafe.Pointer(&rsa))
725 msg.Namelen = uint32(SizeofSockaddrAny)
728 iov.Base = (*byte)(unsafe.Pointer(&p[0]))
733 // receive at least one normal byte
738 msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
739 msg.SetControllen(len(oob))
743 if n, err = recvmsg(fd, &msg, flags); err != nil {
746 oobn = int(msg.Controllen)
747 recvflags = int(msg.Flags)
748 // source address is only specified if the socket is unconnected
749 if rsa.Addr.Family != AF_UNSPEC {
750 from, err = anyToSockaddr(&rsa)
755 func Sendmsg(fd int, p, oob []byte, to Sockaddr, flags int) (err error) {
756 _, err = SendmsgN(fd, p, oob, to, flags)
760 func SendmsgN(fd int, p, oob []byte, to Sockaddr, flags int) (n int, err error) {
761 var ptr unsafe.Pointer
765 ptr, salen, err = to.sockaddr()
771 msg.Name = (*byte)(unsafe.Pointer(ptr))
772 msg.Namelen = uint32(salen)
775 iov.Base = (*byte)(unsafe.Pointer(&p[0]))
780 // send at least one normal byte
785 msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
786 msg.SetControllen(len(oob))
790 if n, err = sendmsg(fd, &msg, flags); err != nil {
793 if len(oob) > 0 && len(p) == 0 {
799 // BindToDevice binds the socket associated with fd to device.
800 func BindToDevice(fd int, device string) (err error) {
801 return SetsockoptString(fd, SOL_SOCKET, SO_BINDTODEVICE, device)
804 //sys ptrace(request int, pid int, addr uintptr, data uintptr) (err error)
806 func ptracePeek(req int, pid int, addr uintptr, out []byte) (count int, err error) {
807 // The peek requests are machine-size oriented, so we wrap it
808 // to retrieve arbitrary-length data.
810 // The ptrace syscall differs from glibc's ptrace.
811 // Peeks returns the word in *data, not as the return value.
813 var buf [sizeofPtr]byte
815 // Leading edge. PEEKTEXT/PEEKDATA don't require aligned
816 // access (PEEKUSER warns that it might), but if we don't
817 // align our reads, we might straddle an unmapped page
818 // boundary and not get the bytes leading up to the page
821 if addr%sizeofPtr != 0 {
822 err = ptrace(req, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
826 n += copy(out, buf[addr%sizeofPtr:])
832 // We use an internal buffer to guarantee alignment.
833 // It's not documented if this is necessary, but we're paranoid.
834 err = ptrace(req, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
838 copied := copy(out, buf[0:])
846 func PtracePeekText(pid int, addr uintptr, out []byte) (count int, err error) {
847 return ptracePeek(PTRACE_PEEKTEXT, pid, addr, out)
850 func PtracePeekData(pid int, addr uintptr, out []byte) (count int, err error) {
851 return ptracePeek(PTRACE_PEEKDATA, pid, addr, out)
854 func ptracePoke(pokeReq int, peekReq int, pid int, addr uintptr, data []byte) (count int, err error) {
855 // As for ptracePeek, we need to align our accesses to deal
856 // with the possibility of straddling an invalid page.
860 if addr%sizeofPtr != 0 {
861 var buf [sizeofPtr]byte
862 err = ptrace(peekReq, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
866 n += copy(buf[addr%sizeofPtr:], data)
867 word := *((*uintptr)(unsafe.Pointer(&buf[0])))
868 err = ptrace(pokeReq, pid, addr-addr%sizeofPtr, word)
876 for len(data) > sizeofPtr {
877 word := *((*uintptr)(unsafe.Pointer(&data[0])))
878 err = ptrace(pokeReq, pid, addr+uintptr(n), word)
883 data = data[sizeofPtr:]
888 var buf [sizeofPtr]byte
889 err = ptrace(peekReq, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
894 word := *((*uintptr)(unsafe.Pointer(&buf[0])))
895 err = ptrace(pokeReq, pid, addr+uintptr(n), word)
905 func PtracePokeText(pid int, addr uintptr, data []byte) (count int, err error) {
906 return ptracePoke(PTRACE_POKETEXT, PTRACE_PEEKTEXT, pid, addr, data)
909 func PtracePokeData(pid int, addr uintptr, data []byte) (count int, err error) {
910 return ptracePoke(PTRACE_POKEDATA, PTRACE_PEEKDATA, pid, addr, data)
913 func PtraceGetRegs(pid int, regsout *PtraceRegs) (err error) {
914 return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
917 func PtraceSetRegs(pid int, regs *PtraceRegs) (err error) {
918 return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
921 func PtraceSetOptions(pid int, options int) (err error) {
922 return ptrace(PTRACE_SETOPTIONS, pid, 0, uintptr(options))
925 func PtraceGetEventMsg(pid int) (msg uint, err error) {
927 err = ptrace(PTRACE_GETEVENTMSG, pid, 0, uintptr(unsafe.Pointer(&data)))
932 func PtraceCont(pid int, signal int) (err error) {
933 return ptrace(PTRACE_CONT, pid, 0, uintptr(signal))
936 func PtraceSyscall(pid int, signal int) (err error) {
937 return ptrace(PTRACE_SYSCALL, pid, 0, uintptr(signal))
940 func PtraceSingleStep(pid int) (err error) { return ptrace(PTRACE_SINGLESTEP, pid, 0, 0) }
942 func PtraceAttach(pid int) (err error) { return ptrace(PTRACE_ATTACH, pid, 0, 0) }
944 func PtraceDetach(pid int) (err error) { return ptrace(PTRACE_DETACH, pid, 0, 0) }
946 //sys reboot(magic1 uint, magic2 uint, cmd int, arg string) (err error)
948 func Reboot(cmd int) (err error) {
949 return reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2, cmd, "")
952 func clen(n []byte) int {
953 for i := 0; i < len(n); i++ {
961 func ReadDirent(fd int, buf []byte) (n int, err error) {
962 return Getdents(fd, buf)
965 func ParseDirent(buf []byte, max int, names []string) (consumed int, count int, newnames []string) {
968 for max != 0 && len(buf) > 0 {
969 dirent := (*Dirent)(unsafe.Pointer(&buf[0]))
970 buf = buf[dirent.Reclen:]
971 if dirent.Ino == 0 { // File absent in directory.
974 bytes := (*[10000]byte)(unsafe.Pointer(&dirent.Name[0]))
975 var name = string(bytes[0:clen(bytes[:])])
976 if name == "." || name == ".." { // Useless names
981 names = append(names, name)
983 return origlen - len(buf), count, names
986 //sys mount(source string, target string, fstype string, flags uintptr, data *byte) (err error)
988 func Mount(source string, target string, fstype string, flags uintptr, data string) (err error) {
989 // Certain file systems get rather angry and EINVAL if you give
990 // them an empty string of data, rather than NULL.
992 return mount(source, target, fstype, flags, nil)
994 datap, err := BytePtrFromString(data)
998 return mount(source, target, fstype, flags, datap)
1008 //sys Acct(path string) (err error)
1009 //sys Adjtimex(buf *Timex) (state int, err error)
1010 //sys Chdir(path string) (err error)
1011 //sys Chroot(path string) (err error)
1012 //sys ClockGettime(clockid int32, time *Timespec) (err error)
1013 //sys Close(fd int) (err error)
1014 //sys Dup(oldfd int) (fd int, err error)
1015 //sys Dup3(oldfd int, newfd int, flags int) (err error)
1016 //sysnb EpollCreate(size int) (fd int, err error)
1017 //sysnb EpollCreate1(flag int) (fd int, err error)
1018 //sysnb EpollCtl(epfd int, op int, fd int, event *EpollEvent) (err error)
1019 //sys Exit(code int) = SYS_EXIT_GROUP
1020 //sys Faccessat(dirfd int, path string, mode uint32, flags int) (err error)
1021 //sys Fallocate(fd int, mode uint32, off int64, len int64) (err error)
1022 //sys Fchdir(fd int) (err error)
1023 //sys Fchmod(fd int, mode uint32) (err error)
1024 //sys Fchmodat(dirfd int, path string, mode uint32, flags int) (err error)
1025 //sys Fchownat(dirfd int, path string, uid int, gid int, flags int) (err error)
1026 //sys fcntl(fd int, cmd int, arg int) (val int, err error)
1027 //sys Fdatasync(fd int) (err error)
1028 //sys Flock(fd int, how int) (err error)
1029 //sys Fsync(fd int) (err error)
1030 //sys Getdents(fd int, buf []byte) (n int, err error) = SYS_GETDENTS64
1031 //sysnb Getpgid(pid int) (pgid int, err error)
1033 func Getpgrp() (pid int) {
1038 //sysnb Getpid() (pid int)
1039 //sysnb Getppid() (ppid int)
1040 //sys Getpriority(which int, who int) (prio int, err error)
1041 //sys Getrandom(buf []byte, flags int) (n int, err error)
1042 //sysnb Getrusage(who int, rusage *Rusage) (err error)
1043 //sysnb Getsid(pid int) (sid int, err error)
1044 //sysnb Gettid() (tid int)
1045 //sys Getxattr(path string, attr string, dest []byte) (sz int, err error)
1046 //sys InotifyAddWatch(fd int, pathname string, mask uint32) (watchdesc int, err error)
1047 //sysnb InotifyInit1(flags int) (fd int, err error)
1048 //sysnb InotifyRmWatch(fd int, watchdesc uint32) (success int, err error)
1049 //sysnb Kill(pid int, sig syscall.Signal) (err error)
1050 //sys Klogctl(typ int, buf []byte) (n int, err error) = SYS_SYSLOG
1051 //sys Listxattr(path string, dest []byte) (sz int, err error)
1052 //sys Mkdirat(dirfd int, path string, mode uint32) (err error)
1053 //sys Mknodat(dirfd int, path string, mode uint32, dev int) (err error)
1054 //sys Nanosleep(time *Timespec, leftover *Timespec) (err error)
1055 //sys PivotRoot(newroot string, putold string) (err error) = SYS_PIVOT_ROOT
1056 //sysnb prlimit(pid int, resource int, newlimit *Rlimit, old *Rlimit) (err error) = SYS_PRLIMIT64
1057 //sys Prctl(option int, arg2 uintptr, arg3 uintptr, arg4 uintptr, arg5 uintptr) (err error)
1058 //sys read(fd int, p []byte) (n int, err error)
1059 //sys Removexattr(path string, attr string) (err error)
1060 //sys Renameat(olddirfd int, oldpath string, newdirfd int, newpath string) (err error)
1061 //sys Setdomainname(p []byte) (err error)
1062 //sys Sethostname(p []byte) (err error)
1063 //sysnb Setpgid(pid int, pgid int) (err error)
1064 //sysnb Setsid() (pid int, err error)
1065 //sysnb Settimeofday(tv *Timeval) (err error)
1066 //sys Setns(fd int, nstype int) (err error)
1069 // On linux Setuid and Setgid only affects the current thread, not the process.
1070 // This does not match what most callers expect so we must return an error
1071 // here rather than letting the caller think that the call succeeded.
1073 func Setuid(uid int) (err error) {
1077 func Setgid(uid int) (err error) {
1081 //sys Setpriority(which int, who int, prio int) (err error)
1082 //sys Setxattr(path string, attr string, data []byte, flags int) (err error)
1084 //sysnb Sysinfo(info *Sysinfo_t) (err error)
1085 //sys Tee(rfd int, wfd int, len int, flags int) (n int64, err error)
1086 //sysnb Tgkill(tgid int, tid int, sig syscall.Signal) (err error)
1087 //sysnb Times(tms *Tms) (ticks uintptr, err error)
1088 //sysnb Umask(mask int) (oldmask int)
1089 //sysnb Uname(buf *Utsname) (err error)
1090 //sys Unmount(target string, flags int) (err error) = SYS_UMOUNT2
1091 //sys Unshare(flags int) (err error)
1092 //sys Ustat(dev int, ubuf *Ustat_t) (err error)
1093 //sys write(fd int, p []byte) (n int, err error)
1094 //sys exitThread(code int) (err error) = SYS_EXIT
1095 //sys readlen(fd int, p *byte, np int) (n int, err error) = SYS_READ
1096 //sys writelen(fd int, p *byte, np int) (n int, err error) = SYS_WRITE
1098 // mmap varies by architecture; see syscall_linux_*.go.
1099 //sys munmap(addr uintptr, length uintptr) (err error)
1101 var mapper = &mmapper{
1102 active: make(map[*byte][]byte),
1107 func Mmap(fd int, offset int64, length int, prot int, flags int) (data []byte, err error) {
1108 return mapper.Mmap(fd, offset, length, prot, flags)
1111 func Munmap(b []byte) (err error) {
1112 return mapper.Munmap(b)
1115 //sys Madvise(b []byte, advice int) (err error)
1116 //sys Mprotect(b []byte, prot int) (err error)
1117 //sys Mlock(b []byte) (err error)
1118 //sys Munlock(b []byte) (err error)
1119 //sys Mlockall(flags int) (err error)
1120 //sys Munlockall() (err error)
1122 // Vmsplice splices user pages from a slice of Iovecs into a pipe specified by fd,
1123 // using the specified flags.
1124 func Vmsplice(fd int, iovs []Iovec, flags int) (int, error) {
1125 n, _, errno := Syscall6(
1128 uintptr(unsafe.Pointer(&iovs[0])),
1135 return 0, syscall.Errno(errno)
1228 // SchedGetPriorityMax
1229 // SchedGetPriorityMin
1232 // SchedGetscheduler
1233 // SchedRrGetInterval