blob: ff20a31e47bd8e261ec2e72945275b5dd3f299ea [file] [log] [blame]
njneb8896b2005-06-04 20:03:55 +00001
2/*--------------------------------------------------------------------*/
3/*--- File- and socket-related libc stuff. m_libcfile.c ---*/
4/*--------------------------------------------------------------------*/
5
6/*
7 This file is part of Valgrind, a dynamic binary instrumentation
8 framework.
9
10 Copyright (C) 2000-2005 Julian Seward
11 jseward@acm.org
12
13 This program is free software; you can redistribute it and/or
14 modify it under the terms of the GNU General Public License as
15 published by the Free Software Foundation; either version 2 of the
16 License, or (at your option) any later version.
17
18 This program is distributed in the hope that it will be useful, but
19 WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
21 General Public License for more details.
22
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
26 02111-1307, USA.
27
28 The GNU General Public License is contained in the file COPYING.
29*/
30
njnc7561b92005-06-19 01:24:32 +000031#include "pub_core_basics.h"
njneb8896b2005-06-04 20:03:55 +000032#include "pub_core_libcbase.h"
33#include "pub_core_libcassert.h"
34#include "pub_core_libcfile.h"
njn351d0062005-06-21 22:23:59 +000035#include "pub_core_libcprint.h" // For VG_(sprintf)()
njn9abd6082005-06-17 21:31:45 +000036#include "pub_core_syscall.h"
njneb8896b2005-06-04 20:03:55 +000037#include "vki_unistd.h"
38
39/* ---------------------------------------------------------------------
40 File stuff
41 ------------------------------------------------------------------ */
42
njn63004dc2005-06-10 22:39:04 +000043/* Application-visible file descriptor limits */
44Int VG_(fd_soft_limit) = -1;
45Int VG_(fd_hard_limit) = -1;
46
njneb8896b2005-06-04 20:03:55 +000047static inline Bool fd_exists(Int fd)
48{
49 struct vki_stat st;
50
51 return VG_(fstat)(fd, &st) == 0;
52}
53
54/* Move an fd into the Valgrind-safe range */
55Int VG_(safe_fd)(Int oldfd)
56{
57 Int newfd;
58
59 vg_assert(VG_(fd_hard_limit) != -1);
60
61 newfd = VG_(fcntl)(oldfd, VKI_F_DUPFD, VG_(fd_hard_limit));
62 if (newfd != -1)
63 VG_(close)(oldfd);
64
65 VG_(fcntl)(newfd, VKI_F_SETFD, VKI_FD_CLOEXEC);
66
67 vg_assert(newfd >= VG_(fd_hard_limit));
68 return newfd;
69}
70
njnae7359b2005-06-19 21:10:42 +000071/* Given a file descriptor, attempt to deduce its filename. To do
72 this, we use /proc/self/fd/<FD>. If this doesn't point to a file,
njnf845f8f2005-06-23 02:26:47 +000073 or if it doesn't exist, we return False. */
74Bool VG_(resolve_filename) ( Int fd, HChar* buf, Int n_buf )
njnae7359b2005-06-19 21:10:42 +000075{
76 HChar tmp[64];
77
78 VG_(sprintf)(tmp, "/proc/self/fd/%d", fd);
njnf845f8f2005-06-23 02:26:47 +000079 VG_(memset)(buf, 0, n_buf);
njnae7359b2005-06-19 21:10:42 +000080
njnf845f8f2005-06-23 02:26:47 +000081 if (VG_(readlink)(tmp, buf, VKI_PATH_MAX) > 0 && buf[0] == '/')
82 return True;
83 else
84 return False;
njnae7359b2005-06-19 21:10:42 +000085}
86
sewardj92645592005-07-23 09:18:34 +000087SysRes VG_(open) ( const Char* pathname, Int flags, Int mode )
njneb8896b2005-06-04 20:03:55 +000088{
sewardja8d8e232005-06-07 20:04:56 +000089 SysRes res = VG_(do_syscall3)(__NR_open, (UWord)pathname, flags, mode);
sewardj92645592005-07-23 09:18:34 +000090 return res;
njneb8896b2005-06-04 20:03:55 +000091}
92
93void VG_(close) ( Int fd )
94{
sewardja8d8e232005-06-07 20:04:56 +000095 (void)VG_(do_syscall1)(__NR_close, fd);
njneb8896b2005-06-04 20:03:55 +000096}
97
98Int VG_(read) ( Int fd, void* buf, Int count)
99{
sewardja8d8e232005-06-07 20:04:56 +0000100 SysRes res = VG_(do_syscall3)(__NR_read, fd, (UWord)buf, count);
101 return res.isError ? -1 : res.val;
njneb8896b2005-06-04 20:03:55 +0000102}
103
104Int VG_(write) ( Int fd, const void* buf, Int count)
105{
sewardja8d8e232005-06-07 20:04:56 +0000106 SysRes res = VG_(do_syscall3)(__NR_write, fd, (UWord)buf, count);
107 return res.isError ? -1 : res.val;
njneb8896b2005-06-04 20:03:55 +0000108}
109
110Int VG_(pipe) ( Int fd[2] )
111{
sewardja8d8e232005-06-07 20:04:56 +0000112 SysRes res = VG_(do_syscall1)(__NR_pipe, (UWord)fd);
113 return res.isError ? -1 : 0;
njneb8896b2005-06-04 20:03:55 +0000114}
115
116OffT VG_(lseek) ( Int fd, OffT offset, Int whence)
117{
sewardja8d8e232005-06-07 20:04:56 +0000118 SysRes res = VG_(do_syscall3)(__NR_lseek, fd, offset, whence);
119 return res.isError ? (-1) : 0;
njneb8896b2005-06-04 20:03:55 +0000120}
121
tom6c93c4f2005-08-05 07:46:32 +0000122SysRes VG_(stat) ( Char* file_name, struct vki_stat* buf )
njneb8896b2005-06-04 20:03:55 +0000123{
sewardja8d8e232005-06-07 20:04:56 +0000124 SysRes res = VG_(do_syscall2)(__NR_stat, (UWord)file_name, (UWord)buf);
tom6c93c4f2005-08-05 07:46:32 +0000125 return res;
njneb8896b2005-06-04 20:03:55 +0000126}
127
128Int VG_(fstat) ( Int fd, struct vki_stat* buf )
129{
sewardja8d8e232005-06-07 20:04:56 +0000130 SysRes res = VG_(do_syscall2)(__NR_fstat, fd, (UWord)buf);
131 return res.isError ? (-1) : 0;
njneb8896b2005-06-04 20:03:55 +0000132}
133
134Int VG_(dup2) ( Int oldfd, Int newfd )
135{
sewardja8d8e232005-06-07 20:04:56 +0000136 SysRes res = VG_(do_syscall2)(__NR_dup2, oldfd, newfd);
137 return res.isError ? (-1) : res.val;
njneb8896b2005-06-04 20:03:55 +0000138}
139
njn327fe8a2005-06-12 02:49:35 +0000140/* Returns -1 on error. */
141Int VG_(fcntl) ( Int fd, Int cmd, Int arg )
142{
143 SysRes res = VG_(do_syscall3)(__NR_fcntl, fd, cmd, arg);
144 return res.isError ? -1 : res.val;
145}
146
njneb8896b2005-06-04 20:03:55 +0000147Int VG_(rename) ( Char* old_name, Char* new_name )
148{
sewardja8d8e232005-06-07 20:04:56 +0000149 SysRes res = VG_(do_syscall2)(__NR_rename, (UWord)old_name, (UWord)new_name);
150 return res.isError ? (-1) : 0;
njneb8896b2005-06-04 20:03:55 +0000151}
152
153Int VG_(unlink) ( Char* file_name )
154{
sewardja8d8e232005-06-07 20:04:56 +0000155 SysRes res = VG_(do_syscall1)(__NR_unlink, (UWord)file_name);
156 return res.isError ? (-1) : 0;
njneb8896b2005-06-04 20:03:55 +0000157}
158
159/* Nb: we do not allow the Linux extension which malloc()s memory for the
160 buffer if buf==NULL, because we don't want Linux calling malloc() */
njn57ca7ab2005-06-21 23:44:58 +0000161Bool VG_(getcwd) ( Char* buf, SizeT size )
njneb8896b2005-06-04 20:03:55 +0000162{
sewardja8d8e232005-06-07 20:04:56 +0000163 SysRes res;
njneb8896b2005-06-04 20:03:55 +0000164 vg_assert(buf != NULL);
165 res = VG_(do_syscall2)(__NR_getcwd, (UWord)buf, size);
njn57ca7ab2005-06-21 23:44:58 +0000166 return res.isError ? False : True;
njneb8896b2005-06-04 20:03:55 +0000167}
168
169Int VG_(readlink) (Char* path, Char* buf, UInt bufsiz)
170{
sewardja8d8e232005-06-07 20:04:56 +0000171 SysRes res;
njneb8896b2005-06-04 20:03:55 +0000172 /* res = readlink( path, buf, bufsiz ); */
173 res = VG_(do_syscall3)(__NR_readlink, (UWord)path, (UWord)buf, bufsiz);
sewardja8d8e232005-06-07 20:04:56 +0000174 return res.isError ? -1 : res.val;
njneb8896b2005-06-04 20:03:55 +0000175}
176
177Int VG_(getdents) (UInt fd, struct vki_dirent *dirp, UInt count)
178{
sewardja8d8e232005-06-07 20:04:56 +0000179 SysRes res;
njneb8896b2005-06-04 20:03:55 +0000180 /* res = getdents( fd, dirp, count ); */
181 res = VG_(do_syscall3)(__NR_getdents, fd, (UWord)dirp, count);
sewardja8d8e232005-06-07 20:04:56 +0000182 return res.isError ? -1 : res.val;
njneb8896b2005-06-04 20:03:55 +0000183}
184
185/* ---------------------------------------------------------------------
186 Socket-related stuff. This is very Linux-kernel specific.
187 ------------------------------------------------------------------ */
188
189static
190Int parse_inet_addr_and_port ( UChar* str, UInt* ip_addr, UShort* port );
191
192static
193Int my_socket ( Int domain, Int type, Int protocol );
194
195static
196Int my_connect ( Int sockfd, struct vki_sockaddr_in* serv_addr,
197 Int addrlen );
198
199static
200UInt my_htonl ( UInt x )
201{
202 return
203 (((x >> 24) & 0xFF) << 0) | (((x >> 16) & 0xFF) << 8)
204 | (((x >> 8) & 0xFF) << 16) | (((x >> 0) & 0xFF) << 24);
205}
206
207static
208UShort my_htons ( UShort x )
209{
210 return
211 (((x >> 8) & 0xFF) << 0) | (((x >> 0) & 0xFF) << 8);
212}
213
214
215/* The main function.
216
217 Supplied string contains either an ip address "192.168.0.1" or
218 an ip address and port pair, "192.168.0.1:1500". Parse these,
219 and return:
220 -1 if there is a parse error
221 -2 if no parse error, but specified host:port cannot be opened
222 the relevant file (socket) descriptor, otherwise.
223 is used.
224*/
225Int VG_(connect_via_socket)( UChar* str )
226{
227 Int sd, res;
228 struct vki_sockaddr_in servAddr;
229 UInt ip = 0;
230 UShort port = VG_CLO_DEFAULT_LOGPORT;
231 Bool ok = parse_inet_addr_and_port(str, &ip, &port);
232 if (!ok)
233 return -1;
234
235 //if (0)
236 // VG_(printf)("ip = %d.%d.%d.%d, port %d\n",
237 // (ip >> 24) & 0xFF, (ip >> 16) & 0xFF,
238 // (ip >> 8) & 0xFF, ip & 0xFF,
239 // (UInt)port );
240
241 servAddr.sin_family = VKI_AF_INET;
242 servAddr.sin_addr.s_addr = my_htonl(ip);
243 servAddr.sin_port = my_htons(port);
244
245 /* create socket */
246 sd = my_socket(VKI_AF_INET, VKI_SOCK_STREAM, 0 /* IPPROTO_IP ? */);
247 if (sd < 0) {
248 /* this shouldn't happen ... nevertheless */
249 return -2;
250 }
251
252 /* connect to server */
253 res = my_connect(sd, (struct vki_sockaddr_in *) &servAddr,
254 sizeof(servAddr));
255 if (res < 0) {
256 /* connection failed */
257 return -2;
258 }
259
260 return sd;
261}
262
263
264/* Let d = one or more digits. Accept either:
265 d.d.d.d or d.d.d.d:d
266*/
267Int parse_inet_addr_and_port ( UChar* str, UInt* ip_addr, UShort* port )
268{
269# define GET_CH ((*str) ? (*str++) : 0)
270 UInt ipa, i, j, c, any;
271 ipa = 0;
272 for (i = 0; i < 4; i++) {
273 j = 0;
274 any = 0;
275 while (1) {
276 c = GET_CH;
277 if (c < '0' || c > '9') break;
278 j = 10 * j + (int)(c - '0');
279 any = 1;
280 }
281 if (any == 0 || j > 255) goto syntaxerr;
282 ipa = (ipa << 8) + j;
283 if (i <= 2 && c != '.') goto syntaxerr;
284 }
285 if (c == 0 || c == ':')
286 *ip_addr = ipa;
287 if (c == 0) goto ok;
288 if (c != ':') goto syntaxerr;
289 j = 0;
290 any = 0;
291 while (1) {
292 c = GET_CH;
293 if (c < '0' || c > '9') break;
294 j = j * 10 + (int)(c - '0');
295 any = 1;
296 if (j > 65535) goto syntaxerr;
297 }
298 if (any == 0 || c != 0) goto syntaxerr;
299 if (j < 1024) goto syntaxerr;
300 *port = (UShort)j;
301 ok:
302 return 1;
303 syntaxerr:
304 return 0;
305# undef GET_CH
306}
307
njneb8896b2005-06-04 20:03:55 +0000308static
309Int my_socket ( Int domain, Int type, Int protocol )
310{
cerion85665ca2005-06-20 15:51:07 +0000311#if defined(VGP_x86_linux)
sewardja8d8e232005-06-07 20:04:56 +0000312 SysRes res;
313 UWord args[3];
njneb8896b2005-06-04 20:03:55 +0000314 args[0] = domain;
315 args[1] = type;
316 args[2] = protocol;
317 res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_SOCKET, (UWord)&args);
sewardja8d8e232005-06-07 20:04:56 +0000318 return res.isError ? -1 : res.val;
cerion85665ca2005-06-20 15:51:07 +0000319
320#elif defined(VGP_amd64_linux)
sewardja8d8e232005-06-07 20:04:56 +0000321 // AMD64/Linux doesn't define __NR_socketcall... see comment above
322 // VG_(sigpending)() for more details.
323 I_die_here;
cerion85665ca2005-06-20 15:51:07 +0000324
325#elif defined(VGP_ppc32_linux)
sewardj8a851282005-07-02 10:13:05 +0000326 //CAB: TODO
cerion85665ca2005-06-20 15:51:07 +0000327 I_die_here;
328
329#else
330# error Unknown arch
331#endif
njneb8896b2005-06-04 20:03:55 +0000332}
333
334static
335Int my_connect ( Int sockfd, struct vki_sockaddr_in* serv_addr,
336 Int addrlen )
337{
cerion85665ca2005-06-20 15:51:07 +0000338#if defined(VGP_x86_linux)
sewardja8d8e232005-06-07 20:04:56 +0000339 SysRes res;
340 UWord args[3];
njneb8896b2005-06-04 20:03:55 +0000341 args[0] = sockfd;
342 args[1] = (UWord)serv_addr;
343 args[2] = addrlen;
344 res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_CONNECT, (UWord)&args);
sewardja8d8e232005-06-07 20:04:56 +0000345 return res.isError ? -1 : res.val;
cerion85665ca2005-06-20 15:51:07 +0000346
347#elif defined(VGP_amd64_linux)
sewardja8d8e232005-06-07 20:04:56 +0000348 // AMD64/Linux doesn't define __NR_socketcall... see comment above
349 // VG_(sigpending)() for more details.
350 I_die_here;
cerion85665ca2005-06-20 15:51:07 +0000351
352#elif defined(VGP_ppc32_linux)
sewardj8a851282005-07-02 10:13:05 +0000353 //CAB: TODO
cerion85665ca2005-06-20 15:51:07 +0000354 I_die_here;
355
356#else
357# error Unknown arch
358#endif
njneb8896b2005-06-04 20:03:55 +0000359}
360
361Int VG_(write_socket)( Int sd, void *msg, Int count )
362{
njneb8896b2005-06-04 20:03:55 +0000363 /* This is actually send(). */
njneb8896b2005-06-04 20:03:55 +0000364 /* Requests not to send SIGPIPE on errors on stream oriented
365 sockets when the other end breaks the connection. The EPIPE
366 error is still returned. */
367 Int flags = VKI_MSG_NOSIGNAL;
368
cerion85665ca2005-06-20 15:51:07 +0000369#if defined(VGP_x86_linux)
sewardja8d8e232005-06-07 20:04:56 +0000370 SysRes res;
371 UWord args[4];
njneb8896b2005-06-04 20:03:55 +0000372 args[0] = sd;
373 args[1] = (UWord)msg;
374 args[2] = count;
375 args[3] = flags;
376 res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_SEND, (UWord)&args);
sewardja8d8e232005-06-07 20:04:56 +0000377 return res.isError ? -1 : res.val;
cerion85665ca2005-06-20 15:51:07 +0000378
379#elif defined(VGP_amd64_linux)
sewardja8d8e232005-06-07 20:04:56 +0000380 // AMD64/Linux doesn't define __NR_socketcall... see comment above
381 // VG_(sigpending)() for more details.
382 I_die_here;
cerion85665ca2005-06-20 15:51:07 +0000383
384#elif defined(VGP_ppc32_linux)
sewardj8a851282005-07-02 10:13:05 +0000385 //CAB: TODO
cerion85665ca2005-06-20 15:51:07 +0000386 I_die_here;
387 flags = 0; // stop compiler complaints
388
389#else
390# error Unknown arch
391#endif
njneb8896b2005-06-04 20:03:55 +0000392}
393
394Int VG_(getsockname) ( Int sd, struct vki_sockaddr *name, Int *namelen)
395{
sewardja8d8e232005-06-07 20:04:56 +0000396 SysRes res;
sewardja5c9e4a2005-06-09 13:21:58 +0000397
sewardj8a851282005-07-02 10:13:05 +0000398#if defined(VGP_x86_linux) || defined(VGP_ppc32_linux)
sewardja8d8e232005-06-07 20:04:56 +0000399 UWord args[3];
njneb8896b2005-06-04 20:03:55 +0000400 args[0] = sd;
401 args[1] = (UWord)name;
402 args[2] = (UWord)namelen;
403 res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_GETSOCKNAME, (UWord)&args);
sewardja8d8e232005-06-07 20:04:56 +0000404 return res.isError ? -1 : res.val;
sewardja5c9e4a2005-06-09 13:21:58 +0000405
cerion85665ca2005-06-20 15:51:07 +0000406#elif defined(VGP_amd64_linux)
sewardja5c9e4a2005-06-09 13:21:58 +0000407 res = VG_(do_syscall3)( __NR_getsockname,
408 (UWord)sd, (UWord)name, (UWord)namelen );
409 return res.isError ? -1 : res.val;
410
cerion85665ca2005-06-20 15:51:07 +0000411#else
412# error Unknown arch
413#endif
njneb8896b2005-06-04 20:03:55 +0000414}
415
416Int VG_(getpeername) ( Int sd, struct vki_sockaddr *name, Int *namelen)
417{
sewardja8d8e232005-06-07 20:04:56 +0000418 SysRes res;
sewardja5c9e4a2005-06-09 13:21:58 +0000419
sewardj8a851282005-07-02 10:13:05 +0000420#if defined(VGP_x86_linux) || defined(VGP_ppc32_linux)
sewardja8d8e232005-06-07 20:04:56 +0000421 UWord args[3];
njneb8896b2005-06-04 20:03:55 +0000422 args[0] = sd;
423 args[1] = (UWord)name;
424 args[2] = (UWord)namelen;
425 res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_GETPEERNAME, (UWord)&args);
sewardja8d8e232005-06-07 20:04:56 +0000426 return res.isError ? -1 : res.val;
sewardja5c9e4a2005-06-09 13:21:58 +0000427
cerion85665ca2005-06-20 15:51:07 +0000428#elif defined(VGP_amd64_linux)
sewardja5c9e4a2005-06-09 13:21:58 +0000429 res = VG_(do_syscall3)( __NR_getpeername,
430 (UWord)sd, (UWord)name, (UWord)namelen );
431 return res.isError ? -1 : res.val;
432
cerion85665ca2005-06-20 15:51:07 +0000433#else
sewardj8a851282005-07-02 10:13:05 +0000434# error Unknown archx
cerion85665ca2005-06-20 15:51:07 +0000435#endif
njneb8896b2005-06-04 20:03:55 +0000436}
437
438Int VG_(getsockopt) ( Int sd, Int level, Int optname, void *optval,
439 Int *optlen)
440{
sewardja8d8e232005-06-07 20:04:56 +0000441 SysRes res;
sewardja5c9e4a2005-06-09 13:21:58 +0000442
sewardj8a851282005-07-02 10:13:05 +0000443#if defined(VGP_x86_linux) || defined(VGP_ppc32_linux)
sewardja8d8e232005-06-07 20:04:56 +0000444 UWord args[5];
njneb8896b2005-06-04 20:03:55 +0000445 args[0] = sd;
446 args[1] = level;
447 args[2] = optname;
448 args[3] = (UWord)optval;
449 args[4] = (UWord)optlen;
450 res = VG_(do_syscall2)(__NR_socketcall, VKI_SYS_GETSOCKOPT, (UWord)&args);
sewardja8d8e232005-06-07 20:04:56 +0000451 return res.isError ? -1 : res.val;
sewardja5c9e4a2005-06-09 13:21:58 +0000452
cerion85665ca2005-06-20 15:51:07 +0000453#elif defined(VGP_amd64_linux)
sewardja5c9e4a2005-06-09 13:21:58 +0000454 res = VG_(do_syscall5)( __NR_getsockopt,
455 (UWord)sd, (UWord)level, (UWord)optname,
456 (UWord)optval, (UWord)optlen );
457 return res.isError ? -1 : res.val;
458
cerion85665ca2005-06-20 15:51:07 +0000459#else
460# error Unknown arch
461#endif
njneb8896b2005-06-04 20:03:55 +0000462}
463
464
465
466/*--------------------------------------------------------------------*/
467/*--- end ---*/
468/*--------------------------------------------------------------------*/
469