1 // Copyright 2009 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file.
6 // This file is compiled as ordinary Go code,
7 // but it is also input to mksyscall,
8 // which parses the //sys lines and generates system call stubs.
9 // Note that sometimes we use a lowercase //sys name and
10 // wrap it in our own nicer implementation.
23 func Access(path string, mode uint32) (err error) {
24 return Faccessat(AT_FDCWD, path, mode, 0)
27 func Chmod(path string, mode uint32) (err error) {
28 return Fchmodat(AT_FDCWD, path, mode, 0)
31 func Chown(path string, uid int, gid int) (err error) {
32 return Fchownat(AT_FDCWD, path, uid, gid, 0)
35 func Creat(path string, mode uint32) (fd int, err error) {
36 return Open(path, O_CREAT|O_WRONLY|O_TRUNC, mode)
39 //sys Linkat(olddirfd int, oldpath string, newdirfd int, newpath string, flags int) (err error)
41 func Link(oldpath string, newpath string) (err error) {
42 return Linkat(AT_FDCWD, oldpath, AT_FDCWD, newpath, 0)
45 func Mkdir(path string, mode uint32) (err error) {
46 return Mkdirat(AT_FDCWD, path, mode)
49 func Mknod(path string, mode uint32, dev int) (err error) {
50 return Mknodat(AT_FDCWD, path, mode, dev)
53 func Open(path string, mode int, perm uint32) (fd int, err error) {
54 return openat(AT_FDCWD, path, mode|O_LARGEFILE, perm)
57 //sys openat(dirfd int, path string, flags int, mode uint32) (fd int, err error)
59 func Openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) {
60 return openat(dirfd, path, flags|O_LARGEFILE, mode)
63 //sys ppoll(fds *PollFd, nfds int, timeout *Timespec, sigmask *Sigset_t) (n int, err error)
65 func Ppoll(fds []PollFd, timeout *Timespec, sigmask *Sigset_t) (n int, err error) {
67 return ppoll(nil, 0, timeout, sigmask)
69 return ppoll(&fds[0], len(fds), timeout, sigmask)
72 //sys Readlinkat(dirfd int, path string, buf []byte) (n int, err error)
74 func Readlink(path string, buf []byte) (n int, err error) {
75 return Readlinkat(AT_FDCWD, path, buf)
78 func Rename(oldpath string, newpath string) (err error) {
79 return Renameat(AT_FDCWD, oldpath, AT_FDCWD, newpath)
82 func Rmdir(path string) error {
83 return Unlinkat(AT_FDCWD, path, AT_REMOVEDIR)
86 //sys Symlinkat(oldpath string, newdirfd int, newpath string) (err error)
88 func Symlink(oldpath string, newpath string) (err error) {
89 return Symlinkat(oldpath, AT_FDCWD, newpath)
92 func Unlink(path string) error {
93 return Unlinkat(AT_FDCWD, path, 0)
96 //sys Unlinkat(dirfd int, path string, flags int) (err error)
98 //sys utimes(path string, times *[2]Timeval) (err error)
100 func Utimes(path string, tv []Timeval) error {
102 err := utimensat(AT_FDCWD, path, nil, 0)
106 return utimes(path, nil)
112 ts[0] = NsecToTimespec(TimevalToNsec(tv[0]))
113 ts[1] = NsecToTimespec(TimevalToNsec(tv[1]))
114 err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0)
118 return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
121 //sys utimensat(dirfd int, path string, times *[2]Timespec, flags int) (err error)
123 func UtimesNano(path string, ts []Timespec) error {
125 err := utimensat(AT_FDCWD, path, nil, 0)
129 return utimes(path, nil)
134 err := utimensat(AT_FDCWD, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), 0)
138 // If the utimensat syscall isn't available (utimensat was added to Linux
139 // in 2.6.22, Released, 8 July 2007) then fall back to utimes
141 for i := 0; i < 2; i++ {
142 tv[i] = NsecToTimeval(TimespecToNsec(ts[i]))
144 return utimes(path, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
147 func UtimesNanoAt(dirfd int, path string, ts []Timespec, flags int) error {
149 return utimensat(dirfd, path, nil, flags)
154 return utimensat(dirfd, path, (*[2]Timespec)(unsafe.Pointer(&ts[0])), flags)
157 //sys futimesat(dirfd int, path *byte, times *[2]Timeval) (err error)
159 func Futimesat(dirfd int, path string, tv []Timeval) error {
160 pathp, err := BytePtrFromString(path)
165 return futimesat(dirfd, pathp, nil)
170 return futimesat(dirfd, pathp, (*[2]Timeval)(unsafe.Pointer(&tv[0])))
173 func Futimes(fd int, tv []Timeval) (err error) {
174 // Believe it or not, this is the best we can do on Linux
175 // (and is what glibc does).
176 return Utimes("/proc/self/fd/"+itoa(fd), tv)
179 const ImplementsGetwd = true
181 //sys Getcwd(buf []byte) (n int, err error)
183 func Getwd() (wd string, err error) {
184 var buf [PathMax]byte
185 n, err := Getcwd(buf[0:])
189 // Getcwd returns the number of bytes written to buf, including the NUL.
190 if n < 1 || n > len(buf) || buf[n-1] != 0 {
193 return string(buf[0 : n-1]), nil
196 func Getgroups() (gids []int, err error) {
197 n, err := getgroups(0, nil)
205 // Sanity check group count. Max is 1<<16 on Linux.
206 if n < 0 || n > 1<<20 {
210 a := make([]_Gid_t, n)
211 n, err = getgroups(n, &a[0])
215 gids = make([]int, n)
216 for i, v := range a[0:n] {
222 func Setgroups(gids []int) (err error) {
224 return setgroups(0, nil)
227 a := make([]_Gid_t, len(gids))
228 for i, v := range gids {
231 return setgroups(len(a), &a[0])
234 type WaitStatus uint32
236 // Wait status is 7 bits at bottom, either 0 (exited),
237 // 0x7F (stopped), or a signal number that caused an exit.
238 // The 0x80 bit is whether there was a core dump.
239 // An extra number (exit code, signal causing a stop)
240 // is in the high bits. At least that's the idea.
241 // There are various irregularities. For example, the
242 // "continued" status is 0xFFFF, distinguishing itself
243 // from stopped via the core dump bit.
253 func (w WaitStatus) Exited() bool { return w&mask == exited }
255 func (w WaitStatus) Signaled() bool { return w&mask != stopped && w&mask != exited }
257 func (w WaitStatus) Stopped() bool { return w&0xFF == stopped }
259 func (w WaitStatus) Continued() bool { return w == 0xFFFF }
261 func (w WaitStatus) CoreDump() bool { return w.Signaled() && w&core != 0 }
263 func (w WaitStatus) ExitStatus() int {
267 return int(w>>shift) & 0xFF
270 func (w WaitStatus) Signal() syscall.Signal {
274 return syscall.Signal(w & mask)
277 func (w WaitStatus) StopSignal() syscall.Signal {
281 return syscall.Signal(w>>shift) & 0xFF
284 func (w WaitStatus) TrapCause() int {
285 if w.StopSignal() != SIGTRAP {
288 return int(w>>shift) >> 8
291 //sys wait4(pid int, wstatus *_C_int, options int, rusage *Rusage) (wpid int, err error)
293 func Wait4(pid int, wstatus *WaitStatus, options int, rusage *Rusage) (wpid int, err error) {
295 wpid, err = wait4(pid, &status, options, rusage)
297 *wstatus = WaitStatus(status)
302 func Mkfifo(path string, mode uint32) (err error) {
303 return Mknod(path, mode|S_IFIFO, 0)
306 func (sa *SockaddrInet4) sockaddr() (unsafe.Pointer, _Socklen, error) {
307 if sa.Port < 0 || sa.Port > 0xFFFF {
308 return nil, 0, EINVAL
310 sa.raw.Family = AF_INET
311 p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
312 p[0] = byte(sa.Port >> 8)
314 for i := 0; i < len(sa.Addr); i++ {
315 sa.raw.Addr[i] = sa.Addr[i]
317 return unsafe.Pointer(&sa.raw), SizeofSockaddrInet4, nil
320 func (sa *SockaddrInet6) sockaddr() (unsafe.Pointer, _Socklen, error) {
321 if sa.Port < 0 || sa.Port > 0xFFFF {
322 return nil, 0, EINVAL
324 sa.raw.Family = AF_INET6
325 p := (*[2]byte)(unsafe.Pointer(&sa.raw.Port))
326 p[0] = byte(sa.Port >> 8)
328 sa.raw.Scope_id = sa.ZoneId
329 for i := 0; i < len(sa.Addr); i++ {
330 sa.raw.Addr[i] = sa.Addr[i]
332 return unsafe.Pointer(&sa.raw), SizeofSockaddrInet6, nil
335 func (sa *SockaddrUnix) sockaddr() (unsafe.Pointer, _Socklen, error) {
338 if n >= len(sa.raw.Path) {
339 return nil, 0, EINVAL
341 sa.raw.Family = AF_UNIX
342 for i := 0; i < n; i++ {
343 sa.raw.Path[i] = int8(name[i])
345 // length is family (uint16), name, NUL.
348 sl += _Socklen(n) + 1
350 if sa.raw.Path[0] == '@' {
352 // Don't count trailing NUL for abstract address.
356 return unsafe.Pointer(&sa.raw), sl, nil
359 type SockaddrLinklayer struct {
366 raw RawSockaddrLinklayer
369 func (sa *SockaddrLinklayer) sockaddr() (unsafe.Pointer, _Socklen, error) {
370 if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff {
371 return nil, 0, EINVAL
373 sa.raw.Family = AF_PACKET
374 sa.raw.Protocol = sa.Protocol
375 sa.raw.Ifindex = int32(sa.Ifindex)
376 sa.raw.Hatype = sa.Hatype
377 sa.raw.Pkttype = sa.Pkttype
378 sa.raw.Halen = sa.Halen
379 for i := 0; i < len(sa.Addr); i++ {
380 sa.raw.Addr[i] = sa.Addr[i]
382 return unsafe.Pointer(&sa.raw), SizeofSockaddrLinklayer, nil
385 type SockaddrNetlink struct {
390 raw RawSockaddrNetlink
393 func (sa *SockaddrNetlink) sockaddr() (unsafe.Pointer, _Socklen, error) {
394 sa.raw.Family = AF_NETLINK
397 sa.raw.Groups = sa.Groups
398 return unsafe.Pointer(&sa.raw), SizeofSockaddrNetlink, nil
401 type SockaddrHCI struct {
407 func (sa *SockaddrHCI) sockaddr() (unsafe.Pointer, _Socklen, error) {
408 sa.raw.Family = AF_BLUETOOTH
410 sa.raw.Channel = sa.Channel
411 return unsafe.Pointer(&sa.raw), SizeofSockaddrHCI, nil
414 // SockaddrCAN implements the Sockaddr interface for AF_CAN type sockets.
415 // The RxID and TxID fields are used for transport protocol addressing in
416 // (CAN_TP16, CAN_TP20, CAN_MCNET, and CAN_ISOTP), they can be left with
417 // zero values for CAN_RAW and CAN_BCM sockets as they have no meaning.
419 // The SockaddrCAN struct must be bound to the socket file descriptor
420 // using Bind before the CAN socket can be used.
422 // // Read one raw CAN frame
423 // fd, _ := Socket(AF_CAN, SOCK_RAW, CAN_RAW)
424 // addr := &SockaddrCAN{Ifindex: index}
426 // frame := make([]byte, 16)
429 // The full SocketCAN documentation can be found in the linux kernel
430 // archives at: https://www.kernel.org/doc/Documentation/networking/can.txt
431 type SockaddrCAN struct {
438 func (sa *SockaddrCAN) sockaddr() (unsafe.Pointer, _Socklen, error) {
439 if sa.Ifindex < 0 || sa.Ifindex > 0x7fffffff {
440 return nil, 0, EINVAL
442 sa.raw.Family = AF_CAN
443 sa.raw.Ifindex = int32(sa.Ifindex)
444 rx := (*[4]byte)(unsafe.Pointer(&sa.RxID))
445 for i := 0; i < 4; i++ {
446 sa.raw.Addr[i] = rx[i]
448 tx := (*[4]byte)(unsafe.Pointer(&sa.TxID))
449 for i := 0; i < 4; i++ {
450 sa.raw.Addr[i+4] = tx[i]
452 return unsafe.Pointer(&sa.raw), SizeofSockaddrCAN, nil
455 // SockaddrALG implements the Sockaddr interface for AF_ALG type sockets.
456 // SockaddrALG enables userspace access to the Linux kernel's cryptography
457 // subsystem. The Type and Name fields specify which type of hash or cipher
458 // should be used with a given socket.
460 // To create a file descriptor that provides access to a hash or cipher, both
461 // Bind and Accept must be used. Once the setup process is complete, input
462 // data can be written to the socket, processed by the kernel, and then read
463 // back as hash output or ciphertext.
465 // Here is an example of using an AF_ALG socket with SHA1 hashing.
466 // The initial socket setup process is as follows:
468 // // Open a socket to perform SHA1 hashing.
469 // fd, _ := unix.Socket(unix.AF_ALG, unix.SOCK_SEQPACKET, 0)
470 // addr := &unix.SockaddrALG{Type: "hash", Name: "sha1"}
471 // unix.Bind(fd, addr)
472 // // Note: unix.Accept does not work at this time; must invoke accept()
473 // // manually using unix.Syscall.
474 // hashfd, _, _ := unix.Syscall(unix.SYS_ACCEPT, uintptr(fd), 0, 0)
476 // Once a file descriptor has been returned from Accept, it may be used to
477 // perform SHA1 hashing. The descriptor is not safe for concurrent use, but
478 // may be re-used repeatedly with subsequent Write and Read operations.
480 // When hashing a small byte slice or string, a single Write and Read may
483 // // Assume hashfd is already configured using the setup process.
484 // hash := os.NewFile(hashfd, "sha1")
485 // // Hash an input string and read the results. Each Write discards
486 // // previous hash state. Read always reads the current state.
487 // b := make([]byte, 20)
488 // for i := 0; i < 2; i++ {
489 // io.WriteString(hash, "Hello, world.")
491 // fmt.Println(hex.EncodeToString(b))
494 // // 2ae01472317d1935a84797ec1983ae243fc6aa28
495 // // 2ae01472317d1935a84797ec1983ae243fc6aa28
497 // For hashing larger byte slices, or byte streams such as those read from
498 // a file or socket, use Sendto with MSG_MORE to instruct the kernel to update
499 // the hash digest instead of creating a new one for a given chunk and finalizing it.
501 // // Assume hashfd and addr are already configured using the setup process.
502 // hash := os.NewFile(hashfd, "sha1")
503 // // Hash the contents of a file.
504 // f, _ := os.Open("/tmp/linux-4.10-rc7.tar.xz")
505 // b := make([]byte, 4096)
507 // n, err := f.Read(b)
508 // if err == io.EOF {
511 // unix.Sendto(hashfd, b[:n], unix.MSG_MORE, addr)
514 // fmt.Println(hex.EncodeToString(b))
515 // // Output: 85cdcad0c06eef66f805ecce353bec9accbeecc5
517 // For more information, see: http://www.chronox.de/crypto-API/crypto/userspace-if.html.
518 type SockaddrALG struct {
526 func (sa *SockaddrALG) sockaddr() (unsafe.Pointer, _Socklen, error) {
527 // Leave room for NUL byte terminator.
528 if len(sa.Type) > 13 {
529 return nil, 0, EINVAL
531 if len(sa.Name) > 63 {
532 return nil, 0, EINVAL
535 sa.raw.Family = AF_ALG
536 sa.raw.Feat = sa.Feature
537 sa.raw.Mask = sa.Mask
539 typ, err := ByteSliceFromString(sa.Type)
543 name, err := ByteSliceFromString(sa.Name)
548 copy(sa.raw.Type[:], typ)
549 copy(sa.raw.Name[:], name)
551 return unsafe.Pointer(&sa.raw), SizeofSockaddrALG, nil
554 // SockaddrVM implements the Sockaddr interface for AF_VSOCK type sockets.
555 // SockaddrVM provides access to Linux VM sockets: a mechanism that enables
556 // bidirectional communication between a hypervisor and its guest virtual
558 type SockaddrVM struct {
559 // CID and Port specify a context ID and port address for a VM socket.
560 // Guests have a unique CID, and hosts may have a well-known CID of:
561 // - VMADDR_CID_HYPERVISOR: refers to the hypervisor process.
562 // - VMADDR_CID_HOST: refers to other processes on the host.
568 func (sa *SockaddrVM) sockaddr() (unsafe.Pointer, _Socklen, error) {
569 sa.raw.Family = AF_VSOCK
570 sa.raw.Port = sa.Port
573 return unsafe.Pointer(&sa.raw), SizeofSockaddrVM, nil
576 func anyToSockaddr(rsa *RawSockaddrAny) (Sockaddr, error) {
577 switch rsa.Addr.Family {
579 pp := (*RawSockaddrNetlink)(unsafe.Pointer(rsa))
580 sa := new(SockaddrNetlink)
581 sa.Family = pp.Family
584 sa.Groups = pp.Groups
588 pp := (*RawSockaddrLinklayer)(unsafe.Pointer(rsa))
589 sa := new(SockaddrLinklayer)
590 sa.Protocol = pp.Protocol
591 sa.Ifindex = int(pp.Ifindex)
592 sa.Hatype = pp.Hatype
593 sa.Pkttype = pp.Pkttype
595 for i := 0; i < len(sa.Addr); i++ {
596 sa.Addr[i] = pp.Addr[i]
601 pp := (*RawSockaddrUnix)(unsafe.Pointer(rsa))
602 sa := new(SockaddrUnix)
604 // "Abstract" Unix domain socket.
605 // Rewrite leading NUL as @ for textual display.
606 // (This is the standard convention.)
607 // Not friendly to overwrite in place,
608 // but the callers below don't care.
612 // Assume path ends at NUL.
613 // This is not technically the Linux semantics for
614 // abstract Unix domain sockets--they are supposed
615 // to be uninterpreted fixed-size binary blobs--but
616 // everyone uses this convention.
618 for n < len(pp.Path) && pp.Path[n] != 0 {
621 bytes := (*[10000]byte)(unsafe.Pointer(&pp.Path[0]))[0:n]
622 sa.Name = string(bytes)
626 pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa))
627 sa := new(SockaddrInet4)
628 p := (*[2]byte)(unsafe.Pointer(&pp.Port))
629 sa.Port = int(p[0])<<8 + int(p[1])
630 for i := 0; i < len(sa.Addr); i++ {
631 sa.Addr[i] = pp.Addr[i]
636 pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa))
637 sa := new(SockaddrInet6)
638 p := (*[2]byte)(unsafe.Pointer(&pp.Port))
639 sa.Port = int(p[0])<<8 + int(p[1])
640 sa.ZoneId = pp.Scope_id
641 for i := 0; i < len(sa.Addr); i++ {
642 sa.Addr[i] = pp.Addr[i]
647 pp := (*RawSockaddrVM)(unsafe.Pointer(rsa))
654 return nil, EAFNOSUPPORT
657 func Accept(fd int) (nfd int, sa Sockaddr, err error) {
658 var rsa RawSockaddrAny
659 var len _Socklen = SizeofSockaddrAny
660 nfd, err = accept(fd, &rsa, &len)
664 sa, err = anyToSockaddr(&rsa)
672 func Accept4(fd int, flags int) (nfd int, sa Sockaddr, err error) {
673 var rsa RawSockaddrAny
674 var len _Socklen = SizeofSockaddrAny
675 nfd, err = accept4(fd, &rsa, &len, flags)
679 if len > SizeofSockaddrAny {
680 panic("RawSockaddrAny too small")
682 sa, err = anyToSockaddr(&rsa)
690 func Getsockname(fd int) (sa Sockaddr, err error) {
691 var rsa RawSockaddrAny
692 var len _Socklen = SizeofSockaddrAny
693 if err = getsockname(fd, &rsa, &len); err != nil {
696 return anyToSockaddr(&rsa)
699 func GetsockoptInet4Addr(fd, level, opt int) (value [4]byte, err error) {
700 vallen := _Socklen(4)
701 err = getsockopt(fd, level, opt, unsafe.Pointer(&value[0]), &vallen)
705 func GetsockoptIPMreq(fd, level, opt int) (*IPMreq, error) {
707 vallen := _Socklen(SizeofIPMreq)
708 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
712 func GetsockoptIPMreqn(fd, level, opt int) (*IPMreqn, error) {
714 vallen := _Socklen(SizeofIPMreqn)
715 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
719 func GetsockoptIPv6Mreq(fd, level, opt int) (*IPv6Mreq, error) {
721 vallen := _Socklen(SizeofIPv6Mreq)
722 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
726 func GetsockoptIPv6MTUInfo(fd, level, opt int) (*IPv6MTUInfo, error) {
727 var value IPv6MTUInfo
728 vallen := _Socklen(SizeofIPv6MTUInfo)
729 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
733 func GetsockoptICMPv6Filter(fd, level, opt int) (*ICMPv6Filter, error) {
734 var value ICMPv6Filter
735 vallen := _Socklen(SizeofICMPv6Filter)
736 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
740 func GetsockoptUcred(fd, level, opt int) (*Ucred, error) {
742 vallen := _Socklen(SizeofUcred)
743 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
747 func GetsockoptTCPInfo(fd, level, opt int) (*TCPInfo, error) {
749 vallen := _Socklen(SizeofTCPInfo)
750 err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
754 func SetsockoptIPMreqn(fd, level, opt int, mreq *IPMreqn) (err error) {
755 return setsockopt(fd, level, opt, unsafe.Pointer(mreq), unsafe.Sizeof(*mreq))
758 func Recvmsg(fd int, p, oob []byte, flags int) (n, oobn int, recvflags int, from Sockaddr, err error) {
760 var rsa RawSockaddrAny
761 msg.Name = (*byte)(unsafe.Pointer(&rsa))
762 msg.Namelen = uint32(SizeofSockaddrAny)
765 iov.Base = (*byte)(unsafe.Pointer(&p[0]))
770 // receive at least one normal byte
775 msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
776 msg.SetControllen(len(oob))
780 if n, err = recvmsg(fd, &msg, flags); err != nil {
783 oobn = int(msg.Controllen)
784 recvflags = int(msg.Flags)
785 // source address is only specified if the socket is unconnected
786 if rsa.Addr.Family != AF_UNSPEC {
787 from, err = anyToSockaddr(&rsa)
792 func Sendmsg(fd int, p, oob []byte, to Sockaddr, flags int) (err error) {
793 _, err = SendmsgN(fd, p, oob, to, flags)
797 func SendmsgN(fd int, p, oob []byte, to Sockaddr, flags int) (n int, err error) {
798 var ptr unsafe.Pointer
802 ptr, salen, err = to.sockaddr()
808 msg.Name = (*byte)(unsafe.Pointer(ptr))
809 msg.Namelen = uint32(salen)
812 iov.Base = (*byte)(unsafe.Pointer(&p[0]))
817 // send at least one normal byte
822 msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
823 msg.SetControllen(len(oob))
827 if n, err = sendmsg(fd, &msg, flags); err != nil {
830 if len(oob) > 0 && len(p) == 0 {
836 // BindToDevice binds the socket associated with fd to device.
837 func BindToDevice(fd int, device string) (err error) {
838 return SetsockoptString(fd, SOL_SOCKET, SO_BINDTODEVICE, device)
841 //sys ptrace(request int, pid int, addr uintptr, data uintptr) (err error)
843 func ptracePeek(req int, pid int, addr uintptr, out []byte) (count int, err error) {
844 // The peek requests are machine-size oriented, so we wrap it
845 // to retrieve arbitrary-length data.
847 // The ptrace syscall differs from glibc's ptrace.
848 // Peeks returns the word in *data, not as the return value.
850 var buf [sizeofPtr]byte
852 // Leading edge. PEEKTEXT/PEEKDATA don't require aligned
853 // access (PEEKUSER warns that it might), but if we don't
854 // align our reads, we might straddle an unmapped page
855 // boundary and not get the bytes leading up to the page
858 if addr%sizeofPtr != 0 {
859 err = ptrace(req, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
863 n += copy(out, buf[addr%sizeofPtr:])
869 // We use an internal buffer to guarantee alignment.
870 // It's not documented if this is necessary, but we're paranoid.
871 err = ptrace(req, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
875 copied := copy(out, buf[0:])
883 func PtracePeekText(pid int, addr uintptr, out []byte) (count int, err error) {
884 return ptracePeek(PTRACE_PEEKTEXT, pid, addr, out)
887 func PtracePeekData(pid int, addr uintptr, out []byte) (count int, err error) {
888 return ptracePeek(PTRACE_PEEKDATA, pid, addr, out)
891 func PtracePeekUser(pid int, addr uintptr, out []byte) (count int, err error) {
892 return ptracePeek(PTRACE_PEEKUSR, pid, addr, out)
895 func ptracePoke(pokeReq int, peekReq int, pid int, addr uintptr, data []byte) (count int, err error) {
896 // As for ptracePeek, we need to align our accesses to deal
897 // with the possibility of straddling an invalid page.
901 if addr%sizeofPtr != 0 {
902 var buf [sizeofPtr]byte
903 err = ptrace(peekReq, pid, addr-addr%sizeofPtr, uintptr(unsafe.Pointer(&buf[0])))
907 n += copy(buf[addr%sizeofPtr:], data)
908 word := *((*uintptr)(unsafe.Pointer(&buf[0])))
909 err = ptrace(pokeReq, pid, addr-addr%sizeofPtr, word)
917 for len(data) > sizeofPtr {
918 word := *((*uintptr)(unsafe.Pointer(&data[0])))
919 err = ptrace(pokeReq, pid, addr+uintptr(n), word)
924 data = data[sizeofPtr:]
929 var buf [sizeofPtr]byte
930 err = ptrace(peekReq, pid, addr+uintptr(n), uintptr(unsafe.Pointer(&buf[0])))
935 word := *((*uintptr)(unsafe.Pointer(&buf[0])))
936 err = ptrace(pokeReq, pid, addr+uintptr(n), word)
946 func PtracePokeText(pid int, addr uintptr, data []byte) (count int, err error) {
947 return ptracePoke(PTRACE_POKETEXT, PTRACE_PEEKTEXT, pid, addr, data)
950 func PtracePokeData(pid int, addr uintptr, data []byte) (count int, err error) {
951 return ptracePoke(PTRACE_POKEDATA, PTRACE_PEEKDATA, pid, addr, data)
954 func PtraceGetRegs(pid int, regsout *PtraceRegs) (err error) {
955 return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
958 func PtraceSetRegs(pid int, regs *PtraceRegs) (err error) {
959 return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
962 func PtraceSetOptions(pid int, options int) (err error) {
963 return ptrace(PTRACE_SETOPTIONS, pid, 0, uintptr(options))
966 func PtraceGetEventMsg(pid int) (msg uint, err error) {
968 err = ptrace(PTRACE_GETEVENTMSG, pid, 0, uintptr(unsafe.Pointer(&data)))
973 func PtraceCont(pid int, signal int) (err error) {
974 return ptrace(PTRACE_CONT, pid, 0, uintptr(signal))
977 func PtraceSyscall(pid int, signal int) (err error) {
978 return ptrace(PTRACE_SYSCALL, pid, 0, uintptr(signal))
981 func PtraceSingleStep(pid int) (err error) { return ptrace(PTRACE_SINGLESTEP, pid, 0, 0) }
983 func PtraceAttach(pid int) (err error) { return ptrace(PTRACE_ATTACH, pid, 0, 0) }
985 func PtraceDetach(pid int) (err error) { return ptrace(PTRACE_DETACH, pid, 0, 0) }
987 //sys reboot(magic1 uint, magic2 uint, cmd int, arg string) (err error)
989 func Reboot(cmd int) (err error) {
990 return reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2, cmd, "")
993 func ReadDirent(fd int, buf []byte) (n int, err error) {
994 return Getdents(fd, buf)
997 func direntIno(buf []byte) (uint64, bool) {
998 return readInt(buf, unsafe.Offsetof(Dirent{}.Ino), unsafe.Sizeof(Dirent{}.Ino))
1001 func direntReclen(buf []byte) (uint64, bool) {
1002 return readInt(buf, unsafe.Offsetof(Dirent{}.Reclen), unsafe.Sizeof(Dirent{}.Reclen))
1005 func direntNamlen(buf []byte) (uint64, bool) {
1006 reclen, ok := direntReclen(buf)
1010 return reclen - uint64(unsafe.Offsetof(Dirent{}.Name)), true
1013 //sys mount(source string, target string, fstype string, flags uintptr, data *byte) (err error)
1015 func Mount(source string, target string, fstype string, flags uintptr, data string) (err error) {
1016 // Certain file systems get rather angry and EINVAL if you give
1017 // them an empty string of data, rather than NULL.
1019 return mount(source, target, fstype, flags, nil)
1021 datap, err := BytePtrFromString(data)
1025 return mount(source, target, fstype, flags, datap)
1035 //sys Acct(path string) (err error)
1036 //sys Adjtimex(buf *Timex) (state int, err error)
1037 //sys Chdir(path string) (err error)
1038 //sys Chroot(path string) (err error)
1039 //sys ClockGettime(clockid int32, time *Timespec) (err error)
1040 //sys Close(fd int) (err error)
1041 //sys Dup(oldfd int) (fd int, err error)
1042 //sys Dup3(oldfd int, newfd int, flags int) (err error)
1043 //sysnb EpollCreate(size int) (fd int, err error)
1044 //sysnb EpollCreate1(flag int) (fd int, err error)
1045 //sysnb EpollCtl(epfd int, op int, fd int, event *EpollEvent) (err error)
1046 //sys Exit(code int) = SYS_EXIT_GROUP
1047 //sys Faccessat(dirfd int, path string, mode uint32, flags int) (err error)
1048 //sys Fallocate(fd int, mode uint32, off int64, len int64) (err error)
1049 //sys Fchdir(fd int) (err error)
1050 //sys Fchmod(fd int, mode uint32) (err error)
1051 //sys Fchmodat(dirfd int, path string, mode uint32, flags int) (err error)
1052 //sys Fchownat(dirfd int, path string, uid int, gid int, flags int) (err error)
1053 //sys fcntl(fd int, cmd int, arg int) (val int, err error)
1054 //sys Fdatasync(fd int) (err error)
1055 //sys Flock(fd int, how int) (err error)
1056 //sys Fsync(fd int) (err error)
1057 //sys Getdents(fd int, buf []byte) (n int, err error) = SYS_GETDENTS64
1058 //sysnb Getpgid(pid int) (pgid int, err error)
1060 func Getpgrp() (pid int) {
1065 //sysnb Getpid() (pid int)
1066 //sysnb Getppid() (ppid int)
1067 //sys Getpriority(which int, who int) (prio int, err error)
1068 //sys Getrandom(buf []byte, flags int) (n int, err error)
1069 //sysnb Getrusage(who int, rusage *Rusage) (err error)
1070 //sysnb Getsid(pid int) (sid int, err error)
1071 //sysnb Gettid() (tid int)
1072 //sys Getxattr(path string, attr string, dest []byte) (sz int, err error)
1073 //sys InotifyAddWatch(fd int, pathname string, mask uint32) (watchdesc int, err error)
1074 //sysnb InotifyInit1(flags int) (fd int, err error)
1075 //sysnb InotifyRmWatch(fd int, watchdesc uint32) (success int, err error)
1076 //sysnb Kill(pid int, sig syscall.Signal) (err error)
1077 //sys Klogctl(typ int, buf []byte) (n int, err error) = SYS_SYSLOG
1078 //sys Listxattr(path string, dest []byte) (sz int, err error)
1079 //sys Mkdirat(dirfd int, path string, mode uint32) (err error)
1080 //sys Mknodat(dirfd int, path string, mode uint32, dev int) (err error)
1081 //sys Nanosleep(time *Timespec, leftover *Timespec) (err error)
1082 //sys PivotRoot(newroot string, putold string) (err error) = SYS_PIVOT_ROOT
1083 //sysnb prlimit(pid int, resource int, newlimit *Rlimit, old *Rlimit) (err error) = SYS_PRLIMIT64
1084 //sys Prctl(option int, arg2 uintptr, arg3 uintptr, arg4 uintptr, arg5 uintptr) (err error)
1085 //sys read(fd int, p []byte) (n int, err error)
1086 //sys Removexattr(path string, attr string) (err error)
1087 //sys Renameat(olddirfd int, oldpath string, newdirfd int, newpath string) (err error)
1088 //sys Setdomainname(p []byte) (err error)
1089 //sys Sethostname(p []byte) (err error)
1090 //sysnb Setpgid(pid int, pgid int) (err error)
1091 //sysnb Setsid() (pid int, err error)
1092 //sysnb Settimeofday(tv *Timeval) (err error)
1093 //sys Setns(fd int, nstype int) (err error)
1096 // On linux Setuid and Setgid only affects the current thread, not the process.
1097 // This does not match what most callers expect so we must return an error
1098 // here rather than letting the caller think that the call succeeded.
1100 func Setuid(uid int) (err error) {
1104 func Setgid(uid int) (err error) {
1108 //sys Setpriority(which int, who int, prio int) (err error)
1109 //sys Setxattr(path string, attr string, data []byte, flags int) (err error)
1111 //sysnb Sysinfo(info *Sysinfo_t) (err error)
1112 //sys Tee(rfd int, wfd int, len int, flags int) (n int64, err error)
1113 //sysnb Tgkill(tgid int, tid int, sig syscall.Signal) (err error)
1114 //sysnb Times(tms *Tms) (ticks uintptr, err error)
1115 //sysnb Umask(mask int) (oldmask int)
1116 //sysnb Uname(buf *Utsname) (err error)
1117 //sys Unmount(target string, flags int) (err error) = SYS_UMOUNT2
1118 //sys Unshare(flags int) (err error)
1119 //sys Ustat(dev int, ubuf *Ustat_t) (err error)
1120 //sys write(fd int, p []byte) (n int, err error)
1121 //sys exitThread(code int) (err error) = SYS_EXIT
1122 //sys readlen(fd int, p *byte, np int) (n int, err error) = SYS_READ
1123 //sys writelen(fd int, p *byte, np int) (n int, err error) = SYS_WRITE
1125 // mmap varies by architecture; see syscall_linux_*.go.
1126 //sys munmap(addr uintptr, length uintptr) (err error)
1128 var mapper = &mmapper{
1129 active: make(map[*byte][]byte),
1134 func Mmap(fd int, offset int64, length int, prot int, flags int) (data []byte, err error) {
1135 return mapper.Mmap(fd, offset, length, prot, flags)
1138 func Munmap(b []byte) (err error) {
1139 return mapper.Munmap(b)
1142 //sys Madvise(b []byte, advice int) (err error)
1143 //sys Mprotect(b []byte, prot int) (err error)
1144 //sys Mlock(b []byte) (err error)
1145 //sys Munlock(b []byte) (err error)
1146 //sys Mlockall(flags int) (err error)
1147 //sys Munlockall() (err error)
1149 // Vmsplice splices user pages from a slice of Iovecs into a pipe specified by fd,
1150 // using the specified flags.
1151 func Vmsplice(fd int, iovs []Iovec, flags int) (int, error) {
1152 n, _, errno := Syscall6(
1155 uintptr(unsafe.Pointer(&iovs[0])),
1162 return 0, syscall.Errno(errno)
1255 // SchedGetPriorityMax
1256 // SchedGetPriorityMin
1259 // SchedGetscheduler
1260 // SchedRrGetInterval