njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 1 | |
| 2 | /*--------------------------------------------------------------------*/ |
| 3 | /*--- File- and socket-related libc stuff. m_libcfile.c ---*/ |
| 4 | /*--------------------------------------------------------------------*/ |
| 5 | |
| 6 | /* |
| 7 | This file is part of Valgrind, a dynamic binary instrumentation |
| 8 | framework. |
| 9 | |
sewardj | 9eecbbb | 2010-05-03 21:37:12 +0000 | [diff] [blame] | 10 | Copyright (C) 2000-2010 Julian Seward |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 11 | jseward@acm.org |
| 12 | |
| 13 | This program is free software; you can redistribute it and/or |
| 14 | modify it under the terms of the GNU General Public License as |
| 15 | published by the Free Software Foundation; either version 2 of the |
| 16 | License, or (at your option) any later version. |
| 17 | |
| 18 | This program is distributed in the hope that it will be useful, but |
| 19 | WITHOUT ANY WARRANTY; without even the implied warranty of |
| 20 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 21 | General Public License for more details. |
| 22 | |
| 23 | You should have received a copy of the GNU General Public License |
| 24 | along with this program; if not, write to the Free Software |
| 25 | Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA |
| 26 | 02111-1307, USA. |
| 27 | |
| 28 | The GNU General Public License is contained in the file COPYING. |
| 29 | */ |
| 30 | |
njn | c7561b9 | 2005-06-19 01:24:32 +0000 | [diff] [blame] | 31 | #include "pub_core_basics.h" |
sewardj | 4cfea4f | 2006-10-14 19:26:10 +0000 | [diff] [blame] | 32 | #include "pub_core_vki.h" |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 33 | #include "pub_core_vkiscnums.h" |
sewardj | 26b8728 | 2006-10-17 12:49:31 +0000 | [diff] [blame] | 34 | #include "pub_core_debuglog.h" |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 35 | #include "pub_core_libcbase.h" |
| 36 | #include "pub_core_libcassert.h" |
| 37 | #include "pub_core_libcfile.h" |
sewardj | fdf91b4 | 2005-09-28 00:53:09 +0000 | [diff] [blame] | 38 | #include "pub_core_libcprint.h" // VG_(sprintf) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 39 | #include "pub_core_libcproc.h" // VG_(getpid), VG_(getppid) |
sewardj | 14c7cc5 | 2007-02-25 15:08:24 +0000 | [diff] [blame] | 40 | #include "pub_core_xarray.h" |
sewardj | fdf91b4 | 2005-09-28 00:53:09 +0000 | [diff] [blame] | 41 | #include "pub_core_clientstate.h" // VG_(fd_hard_limit) |
njn | 9abd608 | 2005-06-17 21:31:45 +0000 | [diff] [blame] | 42 | #include "pub_core_syscall.h" |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 43 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 44 | /* IMPORTANT: on Darwin it is essential to use the _nocancel versions |
| 45 | of syscalls rather than the vanilla version, if a _nocancel version |
| 46 | is available. See docs/internals/Darwin-notes.txt for the reason |
| 47 | why. */ |
| 48 | |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 49 | /* --------------------------------------------------------------------- |
| 50 | File stuff |
| 51 | ------------------------------------------------------------------ */ |
| 52 | |
| 53 | static inline Bool fd_exists(Int fd) |
| 54 | { |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 55 | struct vg_stat st; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 56 | return VG_(fstat)(fd, &st) == 0; |
| 57 | } |
| 58 | |
| 59 | /* Move an fd into the Valgrind-safe range */ |
| 60 | Int VG_(safe_fd)(Int oldfd) |
| 61 | { |
| 62 | Int newfd; |
| 63 | |
| 64 | vg_assert(VG_(fd_hard_limit) != -1); |
| 65 | |
| 66 | newfd = VG_(fcntl)(oldfd, VKI_F_DUPFD, VG_(fd_hard_limit)); |
| 67 | if (newfd != -1) |
| 68 | VG_(close)(oldfd); |
| 69 | |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 70 | /* Set the close-on-exec flag for this fd. */ |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 71 | VG_(fcntl)(newfd, VKI_F_SETFD, VKI_FD_CLOEXEC); |
| 72 | |
| 73 | vg_assert(newfd >= VG_(fd_hard_limit)); |
| 74 | return newfd; |
| 75 | } |
| 76 | |
njn | ae7359b | 2005-06-19 21:10:42 +0000 | [diff] [blame] | 77 | /* Given a file descriptor, attempt to deduce its filename. To do |
| 78 | this, we use /proc/self/fd/<FD>. If this doesn't point to a file, |
njn | f845f8f | 2005-06-23 02:26:47 +0000 | [diff] [blame] | 79 | or if it doesn't exist, we return False. */ |
| 80 | Bool VG_(resolve_filename) ( Int fd, HChar* buf, Int n_buf ) |
njn | ae7359b | 2005-06-19 21:10:42 +0000 | [diff] [blame] | 81 | { |
njn | 81b975c | 2009-04-28 05:35:53 +0000 | [diff] [blame] | 82 | # if defined(VGO_linux) |
njn | ae7359b | 2005-06-19 21:10:42 +0000 | [diff] [blame] | 83 | HChar tmp[64]; |
njn | ae7359b | 2005-06-19 21:10:42 +0000 | [diff] [blame] | 84 | VG_(sprintf)(tmp, "/proc/self/fd/%d", fd); |
njn | f845f8f | 2005-06-23 02:26:47 +0000 | [diff] [blame] | 85 | VG_(memset)(buf, 0, n_buf); |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 86 | if (VG_(readlink)(tmp, buf, n_buf) > 0 && buf[0] == '/') |
njn | f845f8f | 2005-06-23 02:26:47 +0000 | [diff] [blame] | 87 | return True; |
| 88 | else |
| 89 | return False; |
njn | dad944a | 2009-05-04 05:55:46 +0000 | [diff] [blame] | 90 | |
njn | 81b975c | 2009-04-28 05:35:53 +0000 | [diff] [blame] | 91 | # elif defined(VGO_aix5) |
| 92 | I_die_here; /* maybe just return False? */ |
| 93 | return False; |
njn | dad944a | 2009-05-04 05:55:46 +0000 | [diff] [blame] | 94 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 95 | # elif defined(VGO_darwin) |
| 96 | HChar tmp[VKI_MAXPATHLEN+1]; |
| 97 | if (0 == VG_(fcntl)(fd, VKI_F_GETPATH, (UWord)tmp)) { |
| 98 | if (n_buf > 0) { |
| 99 | VG_(strncpy)( buf, tmp, n_buf < sizeof(tmp) ? n_buf : sizeof(tmp) ); |
| 100 | buf[n_buf-1] = 0; |
| 101 | } |
| 102 | if (tmp[0] == '/') return True; |
| 103 | } |
| 104 | return False; |
| 105 | |
njn | 81b975c | 2009-04-28 05:35:53 +0000 | [diff] [blame] | 106 | # else |
njn | dad944a | 2009-05-04 05:55:46 +0000 | [diff] [blame] | 107 | # error Unknown OS |
njn | 81b975c | 2009-04-28 05:35:53 +0000 | [diff] [blame] | 108 | # endif |
njn | ae7359b | 2005-06-19 21:10:42 +0000 | [diff] [blame] | 109 | } |
| 110 | |
sewardj | 9264559 | 2005-07-23 09:18:34 +0000 | [diff] [blame] | 111 | SysRes VG_(open) ( const Char* pathname, Int flags, Int mode ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 112 | { |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 113 | # if defined(VGO_linux) || defined(VGO_aix5) |
| 114 | SysRes res = VG_(do_syscall3)(__NR_open, |
| 115 | (UWord)pathname, flags, mode); |
| 116 | # elif defined(VGO_darwin) |
| 117 | SysRes res = VG_(do_syscall3)(__NR_open_nocancel, |
| 118 | (UWord)pathname, flags, mode); |
| 119 | # else |
| 120 | # error Unknown OS |
| 121 | # endif |
sewardj | 9264559 | 2005-07-23 09:18:34 +0000 | [diff] [blame] | 122 | return res; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 123 | } |
| 124 | |
| 125 | void VG_(close) ( Int fd ) |
| 126 | { |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 127 | /* Hmm. Return value is not checked. That's uncool. */ |
| 128 | # if defined(VGO_linux) || defined(VGO_aix5) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 129 | (void)VG_(do_syscall1)(__NR_close, fd); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 130 | # elif defined(VGO_darwin) |
| 131 | (void)VG_(do_syscall1)(__NR_close_nocancel, fd); |
| 132 | # else |
| 133 | # error Unknown OS |
| 134 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 135 | } |
| 136 | |
| 137 | Int VG_(read) ( Int fd, void* buf, Int count) |
| 138 | { |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 139 | Int ret; |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 140 | # if defined(VGO_linux) || defined(VGO_aix5) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 141 | SysRes res = VG_(do_syscall3)(__NR_read, fd, (UWord)buf, count); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 142 | # elif defined(VGO_darwin) |
| 143 | SysRes res = VG_(do_syscall3)(__NR_read_nocancel, fd, (UWord)buf, count); |
| 144 | # else |
| 145 | # error Unknown OS |
| 146 | # endif |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 147 | if (sr_isError(res)) { |
| 148 | ret = - (Int)(Word)sr_Err(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 149 | vg_assert(ret < 0); |
| 150 | } else { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 151 | ret = (Int)(Word)sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 152 | vg_assert(ret >= 0); |
| 153 | } |
| 154 | return ret; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 155 | } |
| 156 | |
| 157 | Int VG_(write) ( Int fd, const void* buf, Int count) |
| 158 | { |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 159 | Int ret; |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 160 | # if defined(VGO_linux) || defined(VGO_aix5) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 161 | SysRes res = VG_(do_syscall3)(__NR_write, fd, (UWord)buf, count); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 162 | # elif defined(VGO_darwin) |
| 163 | SysRes res = VG_(do_syscall3)(__NR_write_nocancel, fd, (UWord)buf, count); |
| 164 | # else |
| 165 | # error "Unknown OS" |
| 166 | # endif |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 167 | if (sr_isError(res)) { |
| 168 | ret = - (Int)(Word)sr_Err(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 169 | vg_assert(ret < 0); |
| 170 | } else { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 171 | ret = (Int)(Word)sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 172 | vg_assert(ret >= 0); |
| 173 | } |
| 174 | return ret; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 175 | } |
| 176 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 177 | |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 178 | Int VG_(pipe) ( Int fd[2] ) |
| 179 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 180 | # if defined(VGO_linux) || defined(VGO_aix5) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 181 | SysRes res = VG_(do_syscall1)(__NR_pipe, (UWord)fd); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 182 | return sr_isError(res) ? -1 : 0; |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 183 | # elif defined(VGO_darwin) |
| 184 | /* __NR_pipe is UX64, so produces a double-word result */ |
| 185 | SysRes res = VG_(do_syscall0)(__NR_pipe); |
| 186 | if (!sr_isError(res)) { |
| 187 | fd[0] = (Int)sr_Res(res); |
| 188 | fd[1] = (Int)sr_ResHI(res); |
| 189 | } |
| 190 | return sr_isError(res) ? -1 : 0; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 191 | # else |
| 192 | # error "Unknown OS" |
| 193 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 194 | } |
| 195 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 196 | OffT VG_(lseek) ( Int fd, OffT offset, Int whence ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 197 | { |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 198 | # if defined(VGO_linux) || defined(VGO_aix5) || defined(VGP_amd64_darwin) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 199 | SysRes res = VG_(do_syscall3)(__NR_lseek, fd, offset, whence); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 200 | vg_assert(sizeof(OffT) == sizeof(Word)); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 201 | # elif defined(VGP_x86_darwin) |
| 202 | SysRes res = VG_(do_syscall4)(__NR_lseek, fd, |
| 203 | offset & 0xffffffff, offset >> 32, whence); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 204 | # else |
| 205 | # error "Unknown plat" |
| 206 | # endif |
| 207 | return sr_isError(res) ? (-1) : sr_Res(res); |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 208 | /* if you change the error-reporting conventions of this, also |
| 209 | change VG_(pread) and all other usage points. */ |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 210 | } |
| 211 | |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 212 | |
| 213 | /* stat/fstat support. It's uggerly. We have impedance-match into a |
| 214 | 'struct vg_stat' in order to have a single structure that callers |
| 215 | can use consistently on all platforms. */ |
| 216 | |
| 217 | #define TRANSLATE_TO_vg_stat(_p_vgstat, _p_vkistat) \ |
| 218 | do { \ |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 219 | (_p_vgstat)->dev = (ULong)( (_p_vkistat)->st_dev ); \ |
| 220 | (_p_vgstat)->ino = (ULong)( (_p_vkistat)->st_ino ); \ |
| 221 | (_p_vgstat)->nlink = (ULong)( (_p_vkistat)->st_nlink ); \ |
| 222 | (_p_vgstat)->mode = (UInt) ( (_p_vkistat)->st_mode ); \ |
| 223 | (_p_vgstat)->uid = (UInt) ( (_p_vkistat)->st_uid ); \ |
| 224 | (_p_vgstat)->gid = (UInt) ( (_p_vkistat)->st_gid ); \ |
| 225 | (_p_vgstat)->rdev = (ULong)( (_p_vkistat)->st_rdev ); \ |
| 226 | (_p_vgstat)->size = (Long) ( (_p_vkistat)->st_size ); \ |
| 227 | (_p_vgstat)->blksize = (ULong)( (_p_vkistat)->st_blksize ); \ |
| 228 | (_p_vgstat)->blocks = (ULong)( (_p_vkistat)->st_blocks ); \ |
| 229 | (_p_vgstat)->atime = (ULong)( (_p_vkistat)->st_atime ); \ |
| 230 | (_p_vgstat)->atime_nsec = (ULong)( (_p_vkistat)->st_atime_nsec ); \ |
| 231 | (_p_vgstat)->mtime = (ULong)( (_p_vkistat)->st_mtime ); \ |
| 232 | (_p_vgstat)->mtime_nsec = (ULong)( (_p_vkistat)->st_mtime_nsec ); \ |
| 233 | (_p_vgstat)->ctime = (ULong)( (_p_vkistat)->st_ctime ); \ |
| 234 | (_p_vgstat)->ctime_nsec = (ULong)( (_p_vkistat)->st_ctime_nsec ); \ |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 235 | } while (0) |
| 236 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 237 | SysRes VG_(stat) ( const Char* file_name, struct vg_stat* vgbuf ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 238 | { |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 239 | SysRes res; |
| 240 | VG_(memset)(vgbuf, 0, sizeof(*vgbuf)); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 241 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 242 | # if defined(VGO_linux) || defined(VGO_darwin) |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 243 | /* First try with stat64. If that doesn't work out, fall back to |
| 244 | the vanilla version. */ |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 245 | # if defined(__NR_stat64) |
| 246 | { struct vki_stat64 buf64; |
| 247 | res = VG_(do_syscall2)(__NR_stat64, (UWord)file_name, (UWord)&buf64); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 248 | if (!(sr_isError(res) && sr_Err(res) == VKI_ENOSYS)) { |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 249 | /* Success, or any failure except ENOSYS */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 250 | if (!sr_isError(res)) |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 251 | TRANSLATE_TO_vg_stat(vgbuf, &buf64); |
| 252 | return res; |
| 253 | } |
| 254 | } |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 255 | # endif /* defined(__NR_stat64) */ |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 256 | { struct vki_stat buf; |
| 257 | res = VG_(do_syscall2)(__NR_stat, (UWord)file_name, (UWord)&buf); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 258 | if (!sr_isError(res)) |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 259 | TRANSLATE_TO_vg_stat(vgbuf, &buf); |
| 260 | return res; |
| 261 | } |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 262 | |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 263 | # elif defined(VGO_aix5) |
sewardj | 9c606bd | 2008-09-18 18:12:50 +0000 | [diff] [blame] | 264 | { struct vki_stat buf; |
| 265 | res = VG_(do_syscall4)(__NR_AIX5_statx, |
| 266 | (UWord)file_name, |
| 267 | (UWord)&buf, |
| 268 | sizeof(struct vki_stat), |
| 269 | VKI_STX_NORMAL); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 270 | if (!sr_isError(res)) { |
sewardj | 9c606bd | 2008-09-18 18:12:50 +0000 | [diff] [blame] | 271 | VG_(memset)(vgbuf, 0, sizeof(*vgbuf)); |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 272 | vgbuf->dev = (ULong)buf.st_dev; |
| 273 | vgbuf->ino = (ULong)buf.st_ino; |
| 274 | vgbuf->mode = (UInt)buf.st_mode; |
| 275 | vgbuf->uid = (UInt)buf.st_uid; |
| 276 | vgbuf->gid = (UInt)buf.st_gid; |
| 277 | vgbuf->size = (Long)buf.st_size; |
sewardj | 9c606bd | 2008-09-18 18:12:50 +0000 | [diff] [blame] | 278 | } |
| 279 | return res; |
| 280 | } |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 281 | |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 282 | # else |
| 283 | # error Unknown OS |
| 284 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 285 | } |
| 286 | |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 287 | Int VG_(fstat) ( Int fd, struct vg_stat* vgbuf ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 288 | { |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 289 | SysRes res; |
| 290 | VG_(memset)(vgbuf, 0, sizeof(*vgbuf)); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 291 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 292 | # if defined(VGO_linux) || defined(VGO_darwin) |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 293 | /* First try with fstat64. If that doesn't work out, fall back to |
| 294 | the vanilla version. */ |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 295 | # if defined(__NR_fstat64) |
| 296 | { struct vki_stat64 buf64; |
| 297 | res = VG_(do_syscall2)(__NR_fstat64, (UWord)fd, (UWord)&buf64); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 298 | if (!(sr_isError(res) && sr_Err(res) == VKI_ENOSYS)) { |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 299 | /* Success, or any failure except ENOSYS */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 300 | if (!sr_isError(res)) |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 301 | TRANSLATE_TO_vg_stat(vgbuf, &buf64); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 302 | return sr_isError(res) ? (-1) : 0; |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 303 | } |
| 304 | } |
| 305 | # endif /* if defined(__NR_fstat64) */ |
| 306 | { struct vki_stat buf; |
| 307 | res = VG_(do_syscall2)(__NR_fstat, (UWord)fd, (UWord)&buf); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 308 | if (!sr_isError(res)) |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 309 | TRANSLATE_TO_vg_stat(vgbuf, &buf); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 310 | return sr_isError(res) ? (-1) : 0; |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 311 | } |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 312 | |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 313 | # elif defined(VGO_aix5) |
| 314 | I_die_here; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 315 | |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 316 | # else |
| 317 | # error Unknown OS |
| 318 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 319 | } |
| 320 | |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 321 | #undef TRANSLATE_TO_vg_stat |
| 322 | |
| 323 | |
| 324 | Long VG_(fsize) ( Int fd ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 325 | { |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 326 | struct vg_stat buf; |
| 327 | Int res = VG_(fstat)( fd, &buf ); |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 328 | return (res == -1) ? (-1LL) : buf.size; |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 329 | } |
| 330 | |
njn | 63e5e6e | 2009-05-20 04:22:42 +0000 | [diff] [blame] | 331 | Bool VG_(is_dir) ( const HChar* f ) |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 332 | { |
sewardj | ec61b65 | 2008-08-19 07:03:04 +0000 | [diff] [blame] | 333 | struct vg_stat buf; |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 334 | SysRes res = VG_(stat)(f, &buf); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 335 | return sr_isError(res) ? False |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 336 | : VKI_S_ISDIR(buf.mode) ? True : False; |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 337 | } |
| 338 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 339 | SysRes VG_(dup) ( Int oldfd ) |
| 340 | { |
| 341 | return VG_(do_syscall1)(__NR_dup, oldfd); |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 342 | } |
| 343 | |
njn | fad9837 | 2008-10-12 19:53:28 +0000 | [diff] [blame] | 344 | SysRes VG_(dup2) ( Int oldfd, Int newfd ) |
| 345 | { |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 346 | # if defined(VGO_linux) || defined(VGO_darwin) |
njn | fad9837 | 2008-10-12 19:53:28 +0000 | [diff] [blame] | 347 | return VG_(do_syscall2)(__NR_dup2, oldfd, newfd); |
sewardj | 485ce16 | 2008-10-22 00:57:29 +0000 | [diff] [blame] | 348 | # elif defined(VGO_aix5) |
| 349 | I_die_here; |
| 350 | # else |
| 351 | # error Unknown OS |
| 352 | # endif |
njn | fad9837 | 2008-10-12 19:53:28 +0000 | [diff] [blame] | 353 | } |
| 354 | |
njn | 327fe8a | 2005-06-12 02:49:35 +0000 | [diff] [blame] | 355 | /* Returns -1 on error. */ |
njn | bb7af3f | 2009-05-22 07:08:12 +0000 | [diff] [blame] | 356 | Int VG_(fcntl) ( Int fd, Int cmd, Addr arg ) |
njn | 327fe8a | 2005-06-12 02:49:35 +0000 | [diff] [blame] | 357 | { |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 358 | # if defined(VGO_linux) || defined(VGO_aix5) |
njn | 327fe8a | 2005-06-12 02:49:35 +0000 | [diff] [blame] | 359 | SysRes res = VG_(do_syscall3)(__NR_fcntl, fd, cmd, arg); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 360 | # elif defined(VGO_darwin) |
| 361 | SysRes res = VG_(do_syscall3)(__NR_fcntl_nocancel, fd, cmd, arg); |
| 362 | # else |
| 363 | # error "Unknown OS" |
| 364 | # endif |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 365 | return sr_isError(res) ? -1 : sr_Res(res); |
njn | 327fe8a | 2005-06-12 02:49:35 +0000 | [diff] [blame] | 366 | } |
| 367 | |
njn | 63e5e6e | 2009-05-20 04:22:42 +0000 | [diff] [blame] | 368 | Int VG_(rename) ( const Char* old_name, const Char* new_name ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 369 | { |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 370 | SysRes res = VG_(do_syscall2)(__NR_rename, (UWord)old_name, (UWord)new_name); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 371 | return sr_isError(res) ? (-1) : 0; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 372 | } |
| 373 | |
njn | 63e5e6e | 2009-05-20 04:22:42 +0000 | [diff] [blame] | 374 | Int VG_(unlink) ( const Char* file_name ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 375 | { |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 376 | SysRes res = VG_(do_syscall1)(__NR_unlink, (UWord)file_name); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 377 | return sr_isError(res) ? (-1) : 0; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 378 | } |
| 379 | |
sewardj | 198f34f | 2007-07-09 23:13:07 +0000 | [diff] [blame] | 380 | /* The working directory at startup. AIX doesn't provide an easy |
| 381 | system call to do getcwd, but fortunately we don't need arbitrary |
| 382 | getcwd support. All that is really needed is to note the cwd at |
| 383 | process startup. Hence VG_(record_startup_wd) notes it (in a |
| 384 | platform dependent way) and VG_(get_startup_wd) produces the noted |
| 385 | value. Hence: */ |
| 386 | static HChar startup_wd[VKI_PATH_MAX]; |
| 387 | static Bool startup_wd_acquired = False; |
| 388 | |
| 389 | /* Record the process' working directory at startup. Is intended to |
| 390 | be called exactly once, at startup, before the working directory |
| 391 | changes. Return True for success, False for failure, so that the |
| 392 | caller can bomb out suitably without creating module cycles if |
| 393 | there is a problem. */ |
| 394 | Bool VG_(record_startup_wd) ( void ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 395 | { |
sewardj | 198f34f | 2007-07-09 23:13:07 +0000 | [diff] [blame] | 396 | const Int szB = sizeof(startup_wd); |
| 397 | vg_assert(!startup_wd_acquired); |
| 398 | vg_assert(szB >= 512 && szB <= 16384/*let's say*/); /* stay sane */ |
| 399 | VG_(memset)(startup_wd, 0, szB); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 400 | # if defined(VGO_linux) |
sewardj | 198f34f | 2007-07-09 23:13:07 +0000 | [diff] [blame] | 401 | /* Simple: just ask the kernel */ |
| 402 | { SysRes res |
| 403 | = VG_(do_syscall2)(__NR_getcwd, (UWord)startup_wd, szB-1); |
| 404 | vg_assert(startup_wd[szB-1] == 0); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 405 | if (sr_isError(res)) { |
sewardj | 198f34f | 2007-07-09 23:13:07 +0000 | [diff] [blame] | 406 | return False; |
| 407 | } else { |
| 408 | startup_wd_acquired = True; |
| 409 | return True; |
| 410 | } |
| 411 | } |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 412 | # elif defined(VGO_aix5) || defined(VGO_darwin) |
| 413 | /* We can't ask the kernel, so instead rely on launcher-*.c to |
sewardj | 198f34f | 2007-07-09 23:13:07 +0000 | [diff] [blame] | 414 | tell us the startup path. Note the env var is keyed to the |
| 415 | parent's PID, not ours, since our parent is the launcher |
| 416 | process. */ |
| 417 | { Char envvar[100]; |
| 418 | Char* wd = NULL; |
| 419 | VG_(memset)(envvar, 0, sizeof(envvar)); |
| 420 | VG_(sprintf)(envvar, "VALGRIND_STARTUP_PWD_%d_XYZZY", |
| 421 | (Int)VG_(getppid)()); |
| 422 | wd = VG_(getenv)( envvar ); |
| 423 | if (wd == NULL || (1+VG_(strlen)(wd) >= szB)) |
| 424 | return False; |
| 425 | VG_(strncpy_safely)(startup_wd, wd, szB); |
| 426 | vg_assert(startup_wd[szB-1] == 0); |
| 427 | startup_wd_acquired = True; |
| 428 | return True; |
| 429 | } |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 430 | # else |
| 431 | # error Unknown OS |
| 432 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 433 | } |
| 434 | |
sewardj | 198f34f | 2007-07-09 23:13:07 +0000 | [diff] [blame] | 435 | /* Copy the previously acquired startup_wd into buf[0 .. size-1], |
| 436 | or return False if buf isn't big enough. */ |
| 437 | Bool VG_(get_startup_wd) ( Char* buf, SizeT size ) |
| 438 | { |
| 439 | vg_assert(startup_wd_acquired); |
| 440 | vg_assert(startup_wd[ sizeof(startup_wd)-1 ] == 0); |
| 441 | if (1+VG_(strlen)(startup_wd) >= size) |
| 442 | return False; |
| 443 | VG_(strncpy_safely)(buf, startup_wd, size); |
| 444 | return True; |
| 445 | } |
| 446 | |
njn | 63e5e6e | 2009-05-20 04:22:42 +0000 | [diff] [blame] | 447 | Int VG_(readlink) (const Char* path, Char* buf, UInt bufsiz) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 448 | { |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 449 | SysRes res; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 450 | /* res = readlink( path, buf, bufsiz ); */ |
| 451 | res = VG_(do_syscall3)(__NR_readlink, (UWord)path, (UWord)buf, bufsiz); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 452 | return sr_isError(res) ? -1 : sr_Res(res); |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 453 | } |
| 454 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 455 | Int VG_(getdents) (Int fd, struct vki_dirent *dirp, UInt count) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 456 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 457 | # if defined(VGO_linux) || defined(VGO_aix5) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 458 | SysRes res; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 459 | /* res = getdents( fd, dirp, count ); */ |
| 460 | res = VG_(do_syscall3)(__NR_getdents, fd, (UWord)dirp, count); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 461 | return sr_isError(res) ? -1 : sr_Res(res); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 462 | # elif defined(VGO_darwin) |
| 463 | I_die_here; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 464 | # else |
| 465 | # error "Unknown OS" |
| 466 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 467 | } |
| 468 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 469 | /* Check accessibility of a file. Returns zero for access granted, |
| 470 | nonzero otherwise. */ |
njn | 63e5e6e | 2009-05-20 04:22:42 +0000 | [diff] [blame] | 471 | Int VG_(access) ( const HChar* path, Bool irusr, Bool iwusr, Bool ixusr ) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 472 | { |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 473 | # if defined(VGO_linux) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 474 | /* Very annoyingly, I cannot find any definition for R_OK et al in |
| 475 | the kernel interfaces. Therefore I reluctantly resort to |
| 476 | hardwiring in these magic numbers that I determined by |
| 477 | experimentation. */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 478 | # define VKI_R_OK 4 |
| 479 | # define VKI_W_OK 2 |
| 480 | # define VKI_X_OK 1 |
| 481 | # endif |
| 482 | |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 483 | UWord w = (irusr ? VKI_R_OK : 0) |
| 484 | | (iwusr ? VKI_W_OK : 0) |
| 485 | | (ixusr ? VKI_X_OK : 0); |
| 486 | SysRes res = VG_(do_syscall2)(__NR_access, (UWord)path, w); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 487 | return sr_isError(res) ? 1 : 0; |
| 488 | |
| 489 | # if defined(VGO_linux) |
| 490 | # undef VKI_R_OK |
| 491 | # undef VKI_W_OK |
| 492 | # undef VKI_X_OK |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 493 | # endif |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 494 | } |
| 495 | |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 496 | /* |
| 497 | Emulate the normal Unix permissions checking algorithm. |
| 498 | |
| 499 | If owner matches, then use the owner permissions, else |
| 500 | if group matches, then use the group permissions, else |
| 501 | use other permissions. |
| 502 | |
sewardj | c74b3ba | 2007-11-17 21:11:57 +0000 | [diff] [blame] | 503 | Note that we can't deal properly with SUID/SGID. By default |
| 504 | (allow_setuid == False), we refuse to run them (otherwise the |
| 505 | executable may misbehave if it doesn't have the permissions it |
| 506 | thinks it does). However, the caller may indicate that setuid |
| 507 | executables are allowed, for example if we are going to exec them |
| 508 | but not trace into them (iow, client sys_execve when |
| 509 | clo_trace_children == False). |
| 510 | |
| 511 | If VKI_EACCES is returned (iow, permission was refused), then |
| 512 | *is_setuid is set to True iff permission was refused because the |
| 513 | executable is setuid. |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 514 | */ |
| 515 | /* returns: 0 = success, non-0 is failure */ |
sewardj | c74b3ba | 2007-11-17 21:11:57 +0000 | [diff] [blame] | 516 | Int VG_(check_executable)(/*OUT*/Bool* is_setuid, |
njn | 63e5e6e | 2009-05-20 04:22:42 +0000 | [diff] [blame] | 517 | const HChar* f, Bool allow_setuid) |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 518 | { |
sewardj | 4231a85 | 2008-08-19 08:32:03 +0000 | [diff] [blame] | 519 | struct vg_stat st; |
sewardj | 26b8728 | 2006-10-17 12:49:31 +0000 | [diff] [blame] | 520 | SysRes res = VG_(stat)(f, &st); |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 521 | |
sewardj | c74b3ba | 2007-11-17 21:11:57 +0000 | [diff] [blame] | 522 | if (is_setuid) |
| 523 | *is_setuid = False; |
| 524 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 525 | if (sr_isError(res)) { |
| 526 | return sr_Err(res); |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 527 | } |
| 528 | |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 529 | if ( (st.mode & (VKI_S_ISUID | VKI_S_ISGID)) && !allow_setuid ) { |
sewardj | c74b3ba | 2007-11-17 21:11:57 +0000 | [diff] [blame] | 530 | if (is_setuid) |
| 531 | *is_setuid = True; |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 532 | return VKI_EACCES; |
| 533 | } |
| 534 | |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 535 | if (VG_(geteuid)() == st.uid) { |
| 536 | if (!(st.mode & VKI_S_IXUSR)) |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 537 | return VKI_EACCES; |
| 538 | } else { |
sewardj | 45406ef | 2006-10-18 00:33:46 +0000 | [diff] [blame] | 539 | Int grpmatch = 0; |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 540 | |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 541 | if (VG_(getegid)() == st.gid) |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 542 | grpmatch = 1; |
| 543 | else { |
| 544 | UInt groups[32]; |
| 545 | Int ngrp = VG_(getgroups)(32, groups); |
| 546 | Int i; |
| 547 | /* ngrp will be -1 if VG_(getgroups) failed. */ |
| 548 | for (i = 0; i < ngrp; i++) { |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 549 | if (groups[i] == st.gid) { |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 550 | grpmatch = 1; |
| 551 | break; |
| 552 | } |
| 553 | } |
| 554 | } |
| 555 | |
| 556 | if (grpmatch) { |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 557 | if (!(st.mode & VKI_S_IXGRP)) { |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 558 | return VKI_EACCES; |
| 559 | } |
njn | 9c20ece | 2009-05-20 02:02:30 +0000 | [diff] [blame] | 560 | } else if (!(st.mode & VKI_S_IXOTH)) { |
njn | 7375061 | 2005-10-14 03:11:30 +0000 | [diff] [blame] | 561 | return VKI_EACCES; |
| 562 | } |
| 563 | } |
| 564 | |
| 565 | return 0; |
| 566 | } |
| 567 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 568 | /* DDD: Note this moves (or at least, is believed to move) the file pointer |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 569 | on Linux and AIX5 but doesn't on Darwin. This inconsistency should |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 570 | be fixed. (In other words, why isn't the Linux/AIX5 version implemented in |
| 571 | terms of pread()?) */ |
njn | c4431bf | 2009-01-15 21:29:24 +0000 | [diff] [blame] | 572 | SysRes VG_(pread) ( Int fd, void* buf, Int count, OffT offset ) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 573 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 574 | SysRes res; |
| 575 | # if defined(VGO_linux) || defined(VGO_aix5) |
| 576 | /* Linux, AIX5 */ |
| 577 | OffT off = VG_(lseek)( fd, offset, VKI_SEEK_SET); |
tom | f4c2310 | 2005-10-31 17:05:21 +0000 | [diff] [blame] | 578 | if (off < 0) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 579 | return VG_(mk_SysRes_Error)( VKI_EINVAL ); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 580 | res = VG_(do_syscall3)(__NR_read, fd, (UWord)buf, count ); |
| 581 | return res; |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 582 | # elif defined(VGP_amd64_darwin) |
| 583 | res = VG_(do_syscall4)(__NR_pread_nocancel, fd, (UWord)buf, count, offset); |
| 584 | return res; |
| 585 | # elif defined(VGP_x86_darwin) |
| 586 | /* ppc32-darwin is the same, but with the args inverted */ |
| 587 | res = VG_(do_syscall5)(__NR_pread_nocancel, fd, (UWord)buf, count, |
| 588 | offset & 0xffffffff, offset >> 32); |
| 589 | return res; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 590 | # else |
| 591 | # error "Unknown platform" |
| 592 | # endif |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 593 | } |
| 594 | |
| 595 | /* Create and open (-rw------) a tmp file name incorporating said arg. |
| 596 | Returns -1 on failure, else the fd of the file. If fullname is |
| 597 | non-NULL, the file's name is written into it. The number of bytes |
| 598 | written is guaranteed not to exceed 64+strlen(part_of_name). */ |
| 599 | |
| 600 | Int VG_(mkstemp) ( HChar* part_of_name, /*OUT*/HChar* fullname ) |
| 601 | { |
| 602 | HChar buf[200]; |
| 603 | Int n, tries, fd; |
| 604 | UInt seed; |
| 605 | SysRes sres; |
| 606 | |
| 607 | vg_assert(part_of_name); |
| 608 | n = VG_(strlen)(part_of_name); |
| 609 | vg_assert(n > 0 && n < 100); |
| 610 | |
| 611 | seed = (VG_(getpid)() << 9) ^ VG_(getppid)(); |
| 612 | |
| 613 | tries = 0; |
| 614 | while (True) { |
| 615 | if (tries > 10) |
| 616 | return -1; |
| 617 | VG_(sprintf)( buf, "/tmp/valgrind_%s_%08x", |
| 618 | part_of_name, VG_(random)( &seed )); |
| 619 | if (0) |
| 620 | VG_(printf)("VG_(mkstemp): trying: %s\n", buf); |
| 621 | |
| 622 | sres = VG_(open)(buf, |
| 623 | VKI_O_CREAT|VKI_O_RDWR|VKI_O_EXCL|VKI_O_TRUNC, |
| 624 | VKI_S_IRUSR|VKI_S_IWUSR); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 625 | if (sr_isError(sres)) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 626 | continue; |
| 627 | /* VG_(safe_fd) doesn't return if it fails. */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 628 | fd = VG_(safe_fd)( sr_Res(sres) ); |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 629 | if (fullname) |
| 630 | VG_(strcpy)( fullname, buf ); |
| 631 | return fd; |
| 632 | } |
| 633 | /* NOTREACHED */ |
| 634 | } |
| 635 | |
| 636 | |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 637 | /* --------------------------------------------------------------------- |
njn | 4bd96bd | 2009-05-22 00:52:14 +0000 | [diff] [blame] | 638 | Socket-related stuff. |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 639 | ------------------------------------------------------------------ */ |
| 640 | |
njn | 4bd96bd | 2009-05-22 00:52:14 +0000 | [diff] [blame] | 641 | #if defined(VGO_aix5) |
| 642 | struct vki_sockaddr_in; |
| 643 | #endif |
| 644 | |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 645 | static |
| 646 | Int parse_inet_addr_and_port ( UChar* str, UInt* ip_addr, UShort* port ); |
| 647 | |
| 648 | static |
njn | 4bd96bd | 2009-05-22 00:52:14 +0000 | [diff] [blame] | 649 | Int my_connect ( Int sockfd, struct vki_sockaddr_in* serv_addr, Int addrlen ); |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 650 | |
tom | a4a4f41 | 2005-11-17 12:01:56 +0000 | [diff] [blame] | 651 | UInt VG_(htonl) ( UInt x ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 652 | { |
sewardj | a1c4bfb | 2005-10-18 02:15:39 +0000 | [diff] [blame] | 653 | # if defined(VG_BIGENDIAN) |
| 654 | return x; |
| 655 | # else |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 656 | return |
| 657 | (((x >> 24) & 0xFF) << 0) | (((x >> 16) & 0xFF) << 8) |
| 658 | | (((x >> 8) & 0xFF) << 16) | (((x >> 0) & 0xFF) << 24); |
sewardj | a1c4bfb | 2005-10-18 02:15:39 +0000 | [diff] [blame] | 659 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 660 | } |
| 661 | |
tom | a4a4f41 | 2005-11-17 12:01:56 +0000 | [diff] [blame] | 662 | UInt VG_(ntohl) ( UInt x ) |
| 663 | { |
| 664 | # if defined(VG_BIGENDIAN) |
| 665 | return x; |
| 666 | # else |
| 667 | return |
| 668 | (((x >> 24) & 0xFF) << 0) | (((x >> 16) & 0xFF) << 8) |
| 669 | | (((x >> 8) & 0xFF) << 16) | (((x >> 0) & 0xFF) << 24); |
| 670 | # endif |
| 671 | } |
| 672 | |
| 673 | UShort VG_(htons) ( UShort x ) |
| 674 | { |
| 675 | # if defined(VG_BIGENDIAN) |
| 676 | return x; |
| 677 | # else |
| 678 | return |
| 679 | (((x >> 8) & 0xFF) << 0) | (((x >> 0) & 0xFF) << 8); |
| 680 | # endif |
| 681 | } |
| 682 | |
| 683 | UShort VG_(ntohs) ( UShort x ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 684 | { |
sewardj | a1c4bfb | 2005-10-18 02:15:39 +0000 | [diff] [blame] | 685 | # if defined(VG_BIGENDIAN) |
| 686 | return x; |
| 687 | # else |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 688 | return |
| 689 | (((x >> 8) & 0xFF) << 0) | (((x >> 0) & 0xFF) << 8); |
sewardj | a1c4bfb | 2005-10-18 02:15:39 +0000 | [diff] [blame] | 690 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 691 | } |
| 692 | |
| 693 | |
| 694 | /* The main function. |
| 695 | |
| 696 | Supplied string contains either an ip address "192.168.0.1" or |
| 697 | an ip address and port pair, "192.168.0.1:1500". Parse these, |
| 698 | and return: |
| 699 | -1 if there is a parse error |
| 700 | -2 if no parse error, but specified host:port cannot be opened |
| 701 | the relevant file (socket) descriptor, otherwise. |
| 702 | is used. |
| 703 | */ |
| 704 | Int VG_(connect_via_socket)( UChar* str ) |
| 705 | { |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 706 | # if defined(VGO_linux) || defined(VGO_darwin) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 707 | Int sd, res; |
| 708 | struct vki_sockaddr_in servAddr; |
| 709 | UInt ip = 0; |
| 710 | UShort port = VG_CLO_DEFAULT_LOGPORT; |
| 711 | Bool ok = parse_inet_addr_and_port(str, &ip, &port); |
| 712 | if (!ok) |
| 713 | return -1; |
| 714 | |
| 715 | //if (0) |
| 716 | // VG_(printf)("ip = %d.%d.%d.%d, port %d\n", |
| 717 | // (ip >> 24) & 0xFF, (ip >> 16) & 0xFF, |
| 718 | // (ip >> 8) & 0xFF, ip & 0xFF, |
| 719 | // (UInt)port ); |
| 720 | |
| 721 | servAddr.sin_family = VKI_AF_INET; |
tom | a4a4f41 | 2005-11-17 12:01:56 +0000 | [diff] [blame] | 722 | servAddr.sin_addr.s_addr = VG_(htonl)(ip); |
| 723 | servAddr.sin_port = VG_(htons)(port); |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 724 | |
| 725 | /* create socket */ |
njn | 0cd5d97 | 2009-05-22 02:00:27 +0000 | [diff] [blame] | 726 | sd = VG_(socket)(VKI_AF_INET, VKI_SOCK_STREAM, 0 /* IPPROTO_IP ? */); |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 727 | if (sd < 0) { |
sewardj | a1c4bfb | 2005-10-18 02:15:39 +0000 | [diff] [blame] | 728 | /* this shouldn't happen ... nevertheless */ |
| 729 | return -2; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 730 | } |
sewardj | a1c4bfb | 2005-10-18 02:15:39 +0000 | [diff] [blame] | 731 | |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 732 | /* connect to server */ |
njn | b143b27 | 2009-05-22 00:47:08 +0000 | [diff] [blame] | 733 | res = my_connect(sd, &servAddr, sizeof(servAddr)); |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 734 | if (res < 0) { |
sewardj | a1c4bfb | 2005-10-18 02:15:39 +0000 | [diff] [blame] | 735 | /* connection failed */ |
| 736 | return -2; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 737 | } |
| 738 | |
| 739 | return sd; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 740 | |
| 741 | # elif defined(VGO_aix5) |
| 742 | I_die_here; |
| 743 | |
| 744 | # else |
| 745 | # error "Unknown OS" |
| 746 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 747 | } |
| 748 | |
| 749 | |
| 750 | /* Let d = one or more digits. Accept either: |
| 751 | d.d.d.d or d.d.d.d:d |
| 752 | */ |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 753 | static Int parse_inet_addr_and_port ( UChar* str, UInt* ip_addr, UShort* port ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 754 | { |
| 755 | # define GET_CH ((*str) ? (*str++) : 0) |
| 756 | UInt ipa, i, j, c, any; |
| 757 | ipa = 0; |
| 758 | for (i = 0; i < 4; i++) { |
| 759 | j = 0; |
| 760 | any = 0; |
| 761 | while (1) { |
| 762 | c = GET_CH; |
| 763 | if (c < '0' || c > '9') break; |
| 764 | j = 10 * j + (int)(c - '0'); |
| 765 | any = 1; |
| 766 | } |
| 767 | if (any == 0 || j > 255) goto syntaxerr; |
| 768 | ipa = (ipa << 8) + j; |
| 769 | if (i <= 2 && c != '.') goto syntaxerr; |
| 770 | } |
| 771 | if (c == 0 || c == ':') |
| 772 | *ip_addr = ipa; |
| 773 | if (c == 0) goto ok; |
| 774 | if (c != ':') goto syntaxerr; |
| 775 | j = 0; |
| 776 | any = 0; |
| 777 | while (1) { |
| 778 | c = GET_CH; |
| 779 | if (c < '0' || c > '9') break; |
| 780 | j = j * 10 + (int)(c - '0'); |
| 781 | any = 1; |
| 782 | if (j > 65535) goto syntaxerr; |
| 783 | } |
| 784 | if (any == 0 || c != 0) goto syntaxerr; |
| 785 | if (j < 1024) goto syntaxerr; |
| 786 | *port = (UShort)j; |
| 787 | ok: |
| 788 | return 1; |
| 789 | syntaxerr: |
| 790 | return 0; |
| 791 | # undef GET_CH |
| 792 | } |
| 793 | |
njn | 0cd5d97 | 2009-05-22 02:00:27 +0000 | [diff] [blame] | 794 | // GrP fixme safe_fd? |
| 795 | Int VG_(socket) ( Int domain, Int type, Int protocol ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 796 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 797 | # if defined(VGP_x86_linux) || defined(VGP_ppc32_linux) \ |
| 798 | || defined(VGP_ppc64_linux) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 799 | SysRes res; |
| 800 | UWord args[3]; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 801 | args[0] = domain; |
| 802 | args[1] = type; |
| 803 | args[2] = protocol; |
| 804 | res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_SOCKET, (UWord)&args); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 805 | return sr_isError(res) ? -1 : sr_Res(res); |
cerion | 85665ca | 2005-06-20 15:51:07 +0000 | [diff] [blame] | 806 | |
sewardj | 59570ff | 2010-01-01 11:59:33 +0000 | [diff] [blame] | 807 | # elif defined(VGP_amd64_linux) || defined(VGP_arm_linux) |
sewardj | 1e86656 | 2005-09-28 19:58:58 +0000 | [diff] [blame] | 808 | SysRes res; |
| 809 | res = VG_(do_syscall3)(__NR_socket, domain, type, protocol ); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 810 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 811 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 812 | # elif defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 813 | I_die_here; |
cerion | 85665ca | 2005-06-20 15:51:07 +0000 | [diff] [blame] | 814 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 815 | # elif defined(VGO_darwin) |
| 816 | SysRes res; |
| 817 | res = VG_(do_syscall3)(__NR_socket, domain, type, protocol); |
| 818 | if (!sr_isError(res)) { |
| 819 | // Set SO_NOSIGPIPE so write() returns EPIPE instead of raising SIGPIPE |
| 820 | Int optval = 1; |
| 821 | SysRes res2; |
| 822 | res2 = VG_(do_syscall5)(__NR_setsockopt, sr_Res(res), VKI_SOL_SOCKET, |
| 823 | VKI_SO_NOSIGPIPE, (UWord)&optval, |
| 824 | sizeof(optval)); |
| 825 | // ignore setsockopt() error |
| 826 | } |
| 827 | return sr_isError(res) ? -1 : sr_Res(res); |
| 828 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 829 | # else |
| 830 | # error "Unknown arch" |
| 831 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 832 | } |
| 833 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 834 | |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 835 | static |
njn | 4bd96bd | 2009-05-22 00:52:14 +0000 | [diff] [blame] | 836 | Int my_connect ( Int sockfd, struct vki_sockaddr_in* serv_addr, Int addrlen ) |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 837 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 838 | # if defined(VGP_x86_linux) || defined(VGP_ppc32_linux) \ |
| 839 | || defined(VGP_ppc64_linux) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 840 | SysRes res; |
| 841 | UWord args[3]; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 842 | args[0] = sockfd; |
| 843 | args[1] = (UWord)serv_addr; |
| 844 | args[2] = addrlen; |
| 845 | res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_CONNECT, (UWord)&args); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 846 | return sr_isError(res) ? -1 : sr_Res(res); |
cerion | 85665ca | 2005-06-20 15:51:07 +0000 | [diff] [blame] | 847 | |
sewardj | 59570ff | 2010-01-01 11:59:33 +0000 | [diff] [blame] | 848 | # elif defined(VGP_amd64_linux) || defined(VGP_arm_linux) |
sewardj | 1e86656 | 2005-09-28 19:58:58 +0000 | [diff] [blame] | 849 | SysRes res; |
| 850 | res = VG_(do_syscall3)(__NR_connect, sockfd, (UWord)serv_addr, addrlen); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 851 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 852 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 853 | # elif defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 854 | I_die_here; |
cerion | 85665ca | 2005-06-20 15:51:07 +0000 | [diff] [blame] | 855 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 856 | # elif defined(VGO_darwin) |
| 857 | SysRes res; |
| 858 | res = VG_(do_syscall3)(__NR_connect_nocancel, |
| 859 | sockfd, (UWord)serv_addr, addrlen); |
| 860 | return sr_isError(res) ? -1 : sr_Res(res); |
| 861 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 862 | # else |
| 863 | # error "Unknown arch" |
| 864 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 865 | } |
| 866 | |
| 867 | Int VG_(write_socket)( Int sd, void *msg, Int count ) |
| 868 | { |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 869 | /* This is actually send(). */ |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 870 | |
| 871 | /* For Linux, VKI_MSG_NOSIGNAL is a request not to send SIGPIPE on |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 872 | errors on stream oriented sockets when the other end breaks the |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 873 | connection. The EPIPE error is still returned. |
| 874 | |
| 875 | For Darwin, VG_(socket)() sets SO_NOSIGPIPE to get EPIPE instead of |
| 876 | SIGPIPE */ |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 877 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 878 | # if defined(VGP_x86_linux) || defined(VGP_ppc32_linux) \ |
| 879 | || defined(VGP_ppc64_linux) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 880 | SysRes res; |
| 881 | UWord args[4]; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 882 | args[0] = sd; |
| 883 | args[1] = (UWord)msg; |
| 884 | args[2] = count; |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 885 | args[3] = VKI_MSG_NOSIGNAL; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 886 | res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_SEND, (UWord)&args); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 887 | return sr_isError(res) ? -1 : sr_Res(res); |
cerion | 85665ca | 2005-06-20 15:51:07 +0000 | [diff] [blame] | 888 | |
sewardj | 59570ff | 2010-01-01 11:59:33 +0000 | [diff] [blame] | 889 | # elif defined(VGP_amd64_linux) || defined(VGP_arm_linux) |
sewardj | 1e86656 | 2005-09-28 19:58:58 +0000 | [diff] [blame] | 890 | SysRes res; |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 891 | res = VG_(do_syscall6)(__NR_sendto, sd, (UWord)msg, |
| 892 | count, VKI_MSG_NOSIGNAL, 0,0); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 893 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 894 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 895 | # elif defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 896 | I_die_here; |
cerion | 85665ca | 2005-06-20 15:51:07 +0000 | [diff] [blame] | 897 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 898 | # elif defined(VGP_x86_darwin) || defined(VGP_amd64_darwin) |
| 899 | SysRes res; |
| 900 | res = VG_(do_syscall3)(__NR_write_nocancel, sd, (UWord)msg, count); |
| 901 | return sr_isError(res) ? -1 : sr_Res(res); |
| 902 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 903 | # else |
| 904 | # error "Unknown platform" |
| 905 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 906 | } |
| 907 | |
| 908 | Int VG_(getsockname) ( Int sd, struct vki_sockaddr *name, Int *namelen) |
| 909 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 910 | # if defined(VGP_x86_linux) || defined(VGP_ppc32_linux) \ |
| 911 | || defined(VGP_ppc64_linux) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 912 | SysRes res; |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 913 | UWord args[3]; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 914 | args[0] = sd; |
| 915 | args[1] = (UWord)name; |
| 916 | args[2] = (UWord)namelen; |
| 917 | res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_GETSOCKNAME, (UWord)&args); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 918 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 919 | |
sewardj | 59570ff | 2010-01-01 11:59:33 +0000 | [diff] [blame] | 920 | # elif defined(VGP_amd64_linux) || defined(VGP_arm_linux) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 921 | SysRes res; |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 922 | res = VG_(do_syscall3)( __NR_getsockname, |
| 923 | (UWord)sd, (UWord)name, (UWord)namelen ); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 924 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 925 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 926 | # elif defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 927 | I_die_here; |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 928 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 929 | # elif defined(VGO_darwin) |
| 930 | SysRes res; |
| 931 | res = VG_(do_syscall3)( __NR_getsockname, |
| 932 | (UWord)sd, (UWord)name, (UWord)namelen ); |
| 933 | return sr_isError(res) ? -1 : sr_Res(res); |
| 934 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 935 | # else |
| 936 | # error "Unknown platform" |
| 937 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 938 | } |
| 939 | |
| 940 | Int VG_(getpeername) ( Int sd, struct vki_sockaddr *name, Int *namelen) |
| 941 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 942 | # if defined(VGP_x86_linux) || defined(VGP_ppc32_linux) \ |
| 943 | || defined(VGP_ppc64_linux) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 944 | SysRes res; |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 945 | UWord args[3]; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 946 | args[0] = sd; |
| 947 | args[1] = (UWord)name; |
| 948 | args[2] = (UWord)namelen; |
| 949 | res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_GETPEERNAME, (UWord)&args); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 950 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 951 | |
sewardj | 59570ff | 2010-01-01 11:59:33 +0000 | [diff] [blame] | 952 | # elif defined(VGP_amd64_linux) || defined(VGP_arm_linux) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 953 | SysRes res; |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 954 | res = VG_(do_syscall3)( __NR_getpeername, |
| 955 | (UWord)sd, (UWord)name, (UWord)namelen ); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 956 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 957 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 958 | # elif defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 959 | I_die_here; |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 960 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 961 | # elif defined(VGO_darwin) |
| 962 | SysRes res; |
| 963 | res = VG_(do_syscall3)( __NR_getpeername, |
| 964 | (UWord)sd, (UWord)name, (UWord)namelen ); |
| 965 | return sr_isError(res) ? -1 : sr_Res(res); |
| 966 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 967 | # else |
| 968 | # error "Unknown platform" |
| 969 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 970 | } |
| 971 | |
| 972 | Int VG_(getsockopt) ( Int sd, Int level, Int optname, void *optval, |
| 973 | Int *optlen) |
| 974 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 975 | # if defined(VGP_x86_linux) || defined(VGP_ppc32_linux) \ |
| 976 | || defined(VGP_ppc64_linux) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 977 | SysRes res; |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 978 | UWord args[5]; |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 979 | args[0] = sd; |
| 980 | args[1] = level; |
| 981 | args[2] = optname; |
| 982 | args[3] = (UWord)optval; |
| 983 | args[4] = (UWord)optlen; |
| 984 | res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_GETSOCKOPT, (UWord)&args); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 985 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 986 | |
sewardj | 59570ff | 2010-01-01 11:59:33 +0000 | [diff] [blame] | 987 | # elif defined(VGP_amd64_linux) || defined(VGP_arm_linux) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 988 | SysRes res; |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 989 | res = VG_(do_syscall5)( __NR_getsockopt, |
| 990 | (UWord)sd, (UWord)level, (UWord)optname, |
| 991 | (UWord)optval, (UWord)optlen ); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 992 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 993 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 994 | # elif defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5) |
sewardj | 9a66bb9 | 2006-10-17 01:38:13 +0000 | [diff] [blame] | 995 | I_die_here; |
sewardj | a5c9e4a | 2005-06-09 13:21:58 +0000 | [diff] [blame] | 996 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 997 | # elif defined(VGO_darwin) |
| 998 | SysRes res; |
| 999 | res = VG_(do_syscall5)( __NR_getsockopt, |
| 1000 | (UWord)sd, (UWord)level, (UWord)optname, |
| 1001 | (UWord)optval, (UWord)optlen ); |
| 1002 | return sr_isError(res) ? -1 : sr_Res(res); |
| 1003 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 1004 | # else |
| 1005 | # error "Unknown platform" |
| 1006 | # endif |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 1007 | } |
| 1008 | |
| 1009 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 1010 | Char *VG_(basename)(const Char *path) |
| 1011 | { |
| 1012 | static Char buf[VKI_PATH_MAX]; |
| 1013 | |
| 1014 | const Char *p, *end; |
| 1015 | |
| 1016 | if (path == NULL || |
| 1017 | 0 == VG_(strcmp)(path, "")) |
| 1018 | { |
| 1019 | return "."; |
| 1020 | } |
| 1021 | |
| 1022 | p = path + VG_(strlen)(path); |
| 1023 | while (p > path && *p == '/') { |
| 1024 | // skip all trailing '/' |
| 1025 | p--; |
| 1026 | } |
| 1027 | |
| 1028 | if (p == path && *p == '/') return "/"; // all slashes |
| 1029 | |
| 1030 | end = p; |
| 1031 | |
| 1032 | while (p > path && *p != '/') { |
| 1033 | // now skip non '/' |
| 1034 | p--; |
| 1035 | } |
| 1036 | |
| 1037 | if (*p == '/') p++; |
| 1038 | |
| 1039 | VG_(strncpy)(buf, p, end-p+1); |
| 1040 | buf[end-p+1] = '\0'; |
| 1041 | |
| 1042 | return buf; |
| 1043 | } |
| 1044 | |
| 1045 | |
| 1046 | Char *VG_(dirname)(const Char *path) |
| 1047 | { |
| 1048 | static Char buf[VKI_PATH_MAX]; |
| 1049 | |
| 1050 | const Char *p; |
| 1051 | |
| 1052 | if (path == NULL || |
| 1053 | 0 == VG_(strcmp)(path, "") || |
| 1054 | 0 == VG_(strcmp)(path, "/")) |
| 1055 | { |
| 1056 | return "."; |
| 1057 | } |
| 1058 | |
| 1059 | p = path + VG_(strlen)(path); |
| 1060 | while (p > path && *p == '/') { |
| 1061 | // skip all trailing '/' |
| 1062 | p--; |
| 1063 | } |
| 1064 | |
| 1065 | while (p > path && *p != '/') { |
| 1066 | // now skip non '/' |
| 1067 | p--; |
| 1068 | } |
| 1069 | |
| 1070 | if (p == path) { |
| 1071 | if (*p == '/') return "/"; // all slashes |
| 1072 | else return "."; // no slashes |
| 1073 | } |
| 1074 | |
| 1075 | while (p > path && *p == '/') { |
| 1076 | // skip '/' again |
| 1077 | p--; |
| 1078 | } |
| 1079 | |
| 1080 | VG_(strncpy)(buf, path, p-path+1); |
| 1081 | buf[p-path+1] = '\0'; |
| 1082 | |
| 1083 | return buf; |
| 1084 | } |
| 1085 | |
| 1086 | |
njn | eb8896b | 2005-06-04 20:03:55 +0000 | [diff] [blame] | 1087 | /*--------------------------------------------------------------------*/ |
| 1088 | /*--- end ---*/ |
| 1089 | /*--------------------------------------------------------------------*/ |