System.cpp 31 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013
  1. /*
  2. * Copyright (c) 2021-2022, Andreas Kling <andreas@ladybird.org>
  3. * Copyright (c) 2021-2022, Kenneth Myhra <kennethmyhra@serenityos.org>
  4. * Copyright (c) 2021-2024, Sam Atkins <atkinssj@serenityos.org>
  5. * Copyright (c) 2022, Matthias Zimmerman <matthias291999@gmail.com>
  6. *
  7. * SPDX-License-Identifier: BSD-2-Clause
  8. */
  9. #include <AK/ByteString.h>
  10. #include <AK/FixedArray.h>
  11. #include <AK/ScopeGuard.h>
  12. #include <AK/ScopedValueRollback.h>
  13. #include <AK/StdLibExtras.h>
  14. #include <AK/String.h>
  15. #include <AK/Vector.h>
  16. #include <LibCore/Environment.h>
  17. #include <LibCore/System.h>
  18. #include <limits.h>
  19. #include <stdarg.h>
  20. #include <stdlib.h>
  21. #include <sys/ioctl.h>
  22. #include <sys/mman.h>
  23. #include <sys/time.h>
  24. #include <sys/types.h>
  25. #include <termios.h>
  26. #include <unistd.h>
  27. #ifdef AK_OS_SERENITY
  28. # include <serenity.h>
  29. # include <sys/ptrace.h>
  30. # include <sys/sysmacros.h>
  31. #endif
  32. #if defined(AK_OS_LINUX) && !defined(MFD_CLOEXEC)
  33. # include <linux/memfd.h>
  34. # include <sys/syscall.h>
  35. static int memfd_create(char const* name, unsigned int flags)
  36. {
  37. return syscall(SYS_memfd_create, name, flags);
  38. }
  39. #endif
  40. #if defined(AK_OS_MACOS) || defined(AK_OS_IOS)
  41. # include <mach-o/dyld.h>
  42. # include <sys/mman.h>
  43. #else
  44. extern char** environ;
  45. #endif
  46. #if defined(AK_OS_BSD_GENERIC) && !defined(AK_OS_SOLARIS)
  47. # include <sys/sysctl.h>
  48. #endif
  49. #if defined(AK_OS_GNU_HURD)
  50. extern "C" {
  51. # include <hurd.h>
  52. }
  53. # include <LibCore/File.h>
  54. #endif
  55. #if defined(AK_OS_HAIKU)
  56. # include <image.h>
  57. #endif
  58. #define HANDLE_SYSCALL_RETURN_VALUE(syscall_name, rc, success_value) \
  59. if ((rc) < 0) { \
  60. return Error::from_syscall(syscall_name##sv, rc); \
  61. } \
  62. return success_value;
  63. namespace Core::System {
  64. #if !defined(AK_OS_MACOS) && !defined(AK_OS_IOS) && !defined(AK_OS_HAIKU)
  65. ErrorOr<int> accept4(int sockfd, sockaddr* address, socklen_t* address_length, int flags)
  66. {
  67. auto fd = ::accept4(sockfd, address, address_length, flags);
  68. if (fd < 0)
  69. return Error::from_syscall("accept4"sv, -errno);
  70. return fd;
  71. }
  72. #endif
  73. ErrorOr<void> sigaction(int signal, struct sigaction const* action, struct sigaction* old_action)
  74. {
  75. if (::sigaction(signal, action, old_action) < 0)
  76. return Error::from_syscall("sigaction"sv, -errno);
  77. return {};
  78. }
  79. #if defined(AK_OS_SOLARIS)
  80. ErrorOr<SIG_TYP> signal(int signal, SIG_TYP handler)
  81. #elif defined(AK_OS_BSD_GENERIC)
  82. ErrorOr<sig_t> signal(int signal, sig_t handler)
  83. #else
  84. ErrorOr<sighandler_t> signal(int signal, sighandler_t handler)
  85. #endif
  86. {
  87. auto old_handler = ::signal(signal, handler);
  88. if (old_handler == SIG_ERR)
  89. return Error::from_syscall("signal"sv, -errno);
  90. return old_handler;
  91. }
  92. ErrorOr<struct stat> fstat(int fd)
  93. {
  94. struct stat st = {};
  95. if (::fstat(fd, &st) < 0)
  96. return Error::from_syscall("fstat"sv, -errno);
  97. return st;
  98. }
  99. ErrorOr<struct stat> fstatat(int fd, StringView path, int flags)
  100. {
  101. if (!path.characters_without_null_termination())
  102. return Error::from_syscall("fstatat"sv, -EFAULT);
  103. struct stat st = {};
  104. #ifdef AK_OS_SERENITY
  105. Syscall::SC_stat_params params { { path.characters_without_null_termination(), path.length() }, &st, fd, !(flags & AT_SYMLINK_NOFOLLOW) };
  106. int rc = syscall(SC_stat, &params);
  107. #else
  108. ByteString path_string = path;
  109. int rc = ::fstatat(fd, path_string.characters(), &st, flags);
  110. #endif
  111. HANDLE_SYSCALL_RETURN_VALUE("fstatat", rc, st);
  112. }
  113. ErrorOr<int> fcntl(int fd, int command, ...)
  114. {
  115. va_list ap;
  116. va_start(ap, command);
  117. uintptr_t extra_arg = va_arg(ap, uintptr_t);
  118. int rc = ::fcntl(fd, command, extra_arg);
  119. va_end(ap);
  120. if (rc < 0)
  121. return Error::from_syscall("fcntl"sv, -errno);
  122. return rc;
  123. }
  124. ErrorOr<void*> mmap(void* address, size_t size, int protection, int flags, int fd, off_t offset, [[maybe_unused]] size_t alignment, [[maybe_unused]] StringView name)
  125. {
  126. #ifdef AK_OS_SERENITY
  127. Syscall::SC_mmap_params params { address, size, alignment, protection, flags, fd, offset, { name.characters_without_null_termination(), name.length() } };
  128. ptrdiff_t rc = syscall(SC_mmap, &params);
  129. if (rc < 0 && rc > -EMAXERRNO)
  130. return Error::from_syscall("mmap"sv, rc);
  131. return reinterpret_cast<void*>(rc);
  132. #else
  133. // NOTE: Regular POSIX mmap() doesn't support custom alignment requests.
  134. VERIFY(!alignment);
  135. auto* ptr = ::mmap(address, size, protection, flags, fd, offset);
  136. if (ptr == MAP_FAILED)
  137. return Error::from_syscall("mmap"sv, -errno);
  138. return ptr;
  139. #endif
  140. }
  141. ErrorOr<void> munmap(void* address, size_t size)
  142. {
  143. if (::munmap(address, size) < 0)
  144. return Error::from_syscall("munmap"sv, -errno);
  145. return {};
  146. }
  147. ErrorOr<int> anon_create([[maybe_unused]] size_t size, [[maybe_unused]] int options)
  148. {
  149. int fd = -1;
  150. #if defined(AK_OS_SERENITY)
  151. fd = ::anon_create(round_up_to_power_of_two(size, PAGE_SIZE), options);
  152. #elif defined(AK_OS_LINUX) || defined(AK_OS_FREEBSD)
  153. // FIXME: Support more options on Linux.
  154. auto linux_options = ((options & O_CLOEXEC) > 0) ? MFD_CLOEXEC : 0;
  155. fd = memfd_create("", linux_options);
  156. if (fd < 0)
  157. return Error::from_errno(errno);
  158. if (::ftruncate(fd, size) < 0) {
  159. auto saved_errno = errno;
  160. TRY(close(fd));
  161. return Error::from_errno(saved_errno);
  162. }
  163. #elif defined(SHM_ANON)
  164. fd = shm_open(SHM_ANON, O_RDWR | O_CREAT | options, 0600);
  165. if (fd < 0)
  166. return Error::from_errno(errno);
  167. if (::ftruncate(fd, size) < 0) {
  168. auto saved_errno = errno;
  169. TRY(close(fd));
  170. return Error::from_errno(saved_errno);
  171. }
  172. #elif defined(AK_OS_BSD_GENERIC) || defined(AK_OS_EMSCRIPTEN) || defined(AK_OS_HAIKU)
  173. static size_t shared_memory_id = 0;
  174. auto name = ByteString::formatted("/shm-{}-{}", getpid(), shared_memory_id++);
  175. fd = shm_open(name.characters(), O_RDWR | O_CREAT | options, 0600);
  176. if (shm_unlink(name.characters()) == -1) {
  177. auto saved_errno = errno;
  178. TRY(close(fd));
  179. return Error::from_errno(saved_errno);
  180. }
  181. if (fd < 0)
  182. return Error::from_errno(errno);
  183. if (::ftruncate(fd, size) < 0) {
  184. auto saved_errno = errno;
  185. TRY(close(fd));
  186. return Error::from_errno(saved_errno);
  187. }
  188. void* addr = ::mmap(NULL, size, PROT_WRITE, MAP_SHARED, fd, 0);
  189. if (addr == MAP_FAILED) {
  190. auto saved_errno = errno;
  191. TRY(close(fd));
  192. return Error::from_errno(saved_errno);
  193. }
  194. #endif
  195. if (fd < 0)
  196. return Error::from_errno(errno);
  197. return fd;
  198. }
  199. ErrorOr<int> open(StringView path, int options, mode_t mode)
  200. {
  201. return openat(AT_FDCWD, path, options, mode);
  202. }
  203. ErrorOr<int> openat(int fd, StringView path, int options, mode_t mode)
  204. {
  205. if (!path.characters_without_null_termination())
  206. return Error::from_syscall("open"sv, -EFAULT);
  207. #ifdef AK_OS_SERENITY
  208. Syscall::SC_open_params params { fd, { path.characters_without_null_termination(), path.length() }, options, mode };
  209. int rc = syscall(SC_open, &params);
  210. HANDLE_SYSCALL_RETURN_VALUE("open", rc, rc);
  211. #else
  212. // NOTE: We have to ensure that the path is null-terminated.
  213. ByteString path_string = path;
  214. int rc = ::openat(fd, path_string.characters(), options, mode);
  215. if (rc < 0)
  216. return Error::from_syscall("open"sv, -errno);
  217. return rc;
  218. #endif
  219. }
  220. ErrorOr<void> close(int fd)
  221. {
  222. if (::close(fd) < 0)
  223. return Error::from_syscall("close"sv, -errno);
  224. return {};
  225. }
  226. ErrorOr<void> ftruncate(int fd, off_t length)
  227. {
  228. if (::ftruncate(fd, length) < 0)
  229. return Error::from_syscall("ftruncate"sv, -errno);
  230. return {};
  231. }
  232. ErrorOr<struct stat> stat(StringView path)
  233. {
  234. if (!path.characters_without_null_termination())
  235. return Error::from_syscall("stat"sv, -EFAULT);
  236. struct stat st = {};
  237. #ifdef AK_OS_SERENITY
  238. Syscall::SC_stat_params params { { path.characters_without_null_termination(), path.length() }, &st, AT_FDCWD, true };
  239. int rc = syscall(SC_stat, &params);
  240. HANDLE_SYSCALL_RETURN_VALUE("stat", rc, st);
  241. #else
  242. ByteString path_string = path;
  243. if (::stat(path_string.characters(), &st) < 0)
  244. return Error::from_syscall("stat"sv, -errno);
  245. return st;
  246. #endif
  247. }
  248. ErrorOr<struct stat> lstat(StringView path)
  249. {
  250. if (!path.characters_without_null_termination())
  251. return Error::from_syscall("lstat"sv, -EFAULT);
  252. struct stat st = {};
  253. #ifdef AK_OS_SERENITY
  254. Syscall::SC_stat_params params { { path.characters_without_null_termination(), path.length() }, &st, AT_FDCWD, false };
  255. int rc = syscall(SC_stat, &params);
  256. HANDLE_SYSCALL_RETURN_VALUE("lstat", rc, st);
  257. #else
  258. ByteString path_string = path;
  259. if (::lstat(path_string.characters(), &st) < 0)
  260. return Error::from_syscall("lstat"sv, -errno);
  261. return st;
  262. #endif
  263. }
  264. ErrorOr<ssize_t> read(int fd, Bytes buffer)
  265. {
  266. ssize_t rc = ::read(fd, buffer.data(), buffer.size());
  267. if (rc < 0)
  268. return Error::from_syscall("read"sv, -errno);
  269. return rc;
  270. }
  271. ErrorOr<ssize_t> write(int fd, ReadonlyBytes buffer)
  272. {
  273. ssize_t rc = ::write(fd, buffer.data(), buffer.size());
  274. if (rc < 0)
  275. return Error::from_syscall("write"sv, -errno);
  276. return rc;
  277. }
  278. ErrorOr<void> kill(pid_t pid, int signal)
  279. {
  280. if (::kill(pid, signal) < 0)
  281. return Error::from_syscall("kill"sv, -errno);
  282. return {};
  283. }
  284. ErrorOr<int> dup(int source_fd)
  285. {
  286. int fd = ::dup(source_fd);
  287. if (fd < 0)
  288. return Error::from_syscall("dup"sv, -errno);
  289. return fd;
  290. }
  291. ErrorOr<int> dup2(int source_fd, int destination_fd)
  292. {
  293. int fd = ::dup2(source_fd, destination_fd);
  294. if (fd < 0)
  295. return Error::from_syscall("dup2"sv, -errno);
  296. return fd;
  297. }
  298. ErrorOr<ByteString> getcwd()
  299. {
  300. auto* cwd = ::getcwd(nullptr, 0);
  301. if (!cwd)
  302. return Error::from_syscall("getcwd"sv, -errno);
  303. ByteString string_cwd(cwd);
  304. free(cwd);
  305. return string_cwd;
  306. }
  307. ErrorOr<void> ioctl(int fd, unsigned request, ...)
  308. {
  309. va_list ap;
  310. va_start(ap, request);
  311. #ifdef AK_OS_HAIKU
  312. void* arg = va_arg(ap, void*);
  313. #else
  314. FlatPtr arg = va_arg(ap, FlatPtr);
  315. #endif
  316. va_end(ap);
  317. if (::ioctl(fd, request, arg) < 0)
  318. return Error::from_syscall("ioctl"sv, -errno);
  319. return {};
  320. }
  321. ErrorOr<struct termios> tcgetattr(int fd)
  322. {
  323. struct termios ios = {};
  324. if (::tcgetattr(fd, &ios) < 0)
  325. return Error::from_syscall("tcgetattr"sv, -errno);
  326. return ios;
  327. }
  328. ErrorOr<void> tcsetattr(int fd, int optional_actions, struct termios const& ios)
  329. {
  330. if (::tcsetattr(fd, optional_actions, &ios) < 0)
  331. return Error::from_syscall("tcsetattr"sv, -errno);
  332. return {};
  333. }
  334. ErrorOr<void> chmod(StringView pathname, mode_t mode)
  335. {
  336. if (!pathname.characters_without_null_termination())
  337. return Error::from_syscall("chmod"sv, -EFAULT);
  338. #ifdef AK_OS_SERENITY
  339. Syscall::SC_chmod_params params {
  340. AT_FDCWD,
  341. { pathname.characters_without_null_termination(), pathname.length() },
  342. mode,
  343. true
  344. };
  345. int rc = syscall(SC_chmod, &params);
  346. HANDLE_SYSCALL_RETURN_VALUE("chmod", rc, {});
  347. #else
  348. ByteString path = pathname;
  349. if (::chmod(path.characters(), mode) < 0)
  350. return Error::from_syscall("chmod"sv, -errno);
  351. return {};
  352. #endif
  353. }
  354. ErrorOr<void> fchmod(int fd, mode_t mode)
  355. {
  356. if (::fchmod(fd, mode) < 0)
  357. return Error::from_syscall("fchmod"sv, -errno);
  358. return {};
  359. }
  360. ErrorOr<void> fchown(int fd, uid_t uid, gid_t gid)
  361. {
  362. if (::fchown(fd, uid, gid) < 0)
  363. return Error::from_syscall("fchown"sv, -errno);
  364. return {};
  365. }
  366. ErrorOr<void> chown(StringView pathname, uid_t uid, gid_t gid)
  367. {
  368. if (!pathname.characters_without_null_termination())
  369. return Error::from_syscall("chown"sv, -EFAULT);
  370. #ifdef AK_OS_SERENITY
  371. Syscall::SC_chown_params params = { { pathname.characters_without_null_termination(), pathname.length() }, uid, gid, AT_FDCWD, true };
  372. int rc = syscall(SC_chown, &params);
  373. HANDLE_SYSCALL_RETURN_VALUE("chown", rc, {});
  374. #else
  375. ByteString path = pathname;
  376. if (::lchown(path.characters(), uid, gid) < 0)
  377. return Error::from_syscall("lchown"sv, -errno);
  378. return {};
  379. #endif
  380. }
  381. static ALWAYS_INLINE ErrorOr<pid_t> posix_spawn_wrapper(StringView path, posix_spawn_file_actions_t const* file_actions, posix_spawnattr_t const* attr, char* const arguments[], char* const envp[], StringView function_name, decltype(::posix_spawn) spawn_function)
  382. {
  383. pid_t child_pid;
  384. if ((errno = spawn_function(&child_pid, path.to_byte_string().characters(), file_actions, attr, arguments, envp)))
  385. return Error::from_syscall(function_name, -errno);
  386. return child_pid;
  387. }
  388. ErrorOr<pid_t> posix_spawn(StringView path, posix_spawn_file_actions_t const* file_actions, posix_spawnattr_t const* attr, char* const arguments[], char* const envp[])
  389. {
  390. return posix_spawn_wrapper(path, file_actions, attr, arguments, envp, "posix_spawn"sv, ::posix_spawn);
  391. }
  392. ErrorOr<pid_t> posix_spawnp(StringView path, posix_spawn_file_actions_t* const file_actions, posix_spawnattr_t* const attr, char* const arguments[], char* const envp[])
  393. {
  394. return posix_spawn_wrapper(path, file_actions, attr, arguments, envp, "posix_spawnp"sv, ::posix_spawnp);
  395. }
  396. ErrorOr<off_t> lseek(int fd, off_t offset, int whence)
  397. {
  398. off_t rc = ::lseek(fd, offset, whence);
  399. if (rc < 0)
  400. return Error::from_syscall("lseek"sv, -errno);
  401. return rc;
  402. }
  403. ErrorOr<WaitPidResult> waitpid(pid_t waitee, int options)
  404. {
  405. int wstatus;
  406. pid_t pid = ::waitpid(waitee, &wstatus, options);
  407. if (pid < 0)
  408. return Error::from_syscall("waitpid"sv, -errno);
  409. return WaitPidResult { pid, wstatus };
  410. }
  411. ErrorOr<bool> isatty(int fd)
  412. {
  413. int rc = ::isatty(fd);
  414. if (rc < 0)
  415. return Error::from_syscall("isatty"sv, -errno);
  416. return rc == 1;
  417. }
  418. ErrorOr<void> link(StringView old_path, StringView new_path)
  419. {
  420. #ifdef AK_OS_SERENITY
  421. Syscall::SC_link_params params {
  422. .old_path = { old_path.characters_without_null_termination(), old_path.length() },
  423. .new_path = { new_path.characters_without_null_termination(), new_path.length() },
  424. };
  425. int rc = syscall(SC_link, &params);
  426. HANDLE_SYSCALL_RETURN_VALUE("link", rc, {});
  427. #else
  428. ByteString old_path_string = old_path;
  429. ByteString new_path_string = new_path;
  430. if (::link(old_path_string.characters(), new_path_string.characters()) < 0)
  431. return Error::from_syscall("link"sv, -errno);
  432. return {};
  433. #endif
  434. }
  435. ErrorOr<void> symlink(StringView target, StringView link_path)
  436. {
  437. #ifdef AK_OS_SERENITY
  438. Syscall::SC_symlink_params params {
  439. .target = { target.characters_without_null_termination(), target.length() },
  440. .linkpath = { link_path.characters_without_null_termination(), link_path.length() },
  441. .dirfd = AT_FDCWD,
  442. };
  443. int rc = syscall(SC_symlink, &params);
  444. HANDLE_SYSCALL_RETURN_VALUE("symlink", rc, {});
  445. #else
  446. ByteString target_string = target;
  447. ByteString link_path_string = link_path;
  448. if (::symlink(target_string.characters(), link_path_string.characters()) < 0)
  449. return Error::from_syscall("symlink"sv, -errno);
  450. return {};
  451. #endif
  452. }
  453. ErrorOr<void> mkdir(StringView path, mode_t mode)
  454. {
  455. if (path.is_null())
  456. return Error::from_errno(EFAULT);
  457. #ifdef AK_OS_SERENITY
  458. int rc = syscall(SC_mkdir, AT_FDCWD, path.characters_without_null_termination(), path.length(), mode);
  459. HANDLE_SYSCALL_RETURN_VALUE("mkdir", rc, {});
  460. #else
  461. ByteString path_string = path;
  462. if (::mkdir(path_string.characters(), mode) < 0)
  463. return Error::from_syscall("mkdir"sv, -errno);
  464. return {};
  465. #endif
  466. }
  467. ErrorOr<void> chdir(StringView path)
  468. {
  469. if (path.is_null())
  470. return Error::from_errno(EFAULT);
  471. #ifdef AK_OS_SERENITY
  472. int rc = syscall(SC_chdir, path.characters_without_null_termination(), path.length());
  473. HANDLE_SYSCALL_RETURN_VALUE("chdir", rc, {});
  474. #else
  475. ByteString path_string = path;
  476. if (::chdir(path_string.characters()) < 0)
  477. return Error::from_syscall("chdir"sv, -errno);
  478. return {};
  479. #endif
  480. }
  481. ErrorOr<void> rmdir(StringView path)
  482. {
  483. if (path.is_null())
  484. return Error::from_errno(EFAULT);
  485. #ifdef AK_OS_SERENITY
  486. int rc = syscall(SC_rmdir, path.characters_without_null_termination(), path.length());
  487. HANDLE_SYSCALL_RETURN_VALUE("rmdir", rc, {});
  488. #else
  489. ByteString path_string = path;
  490. if (::rmdir(path_string.characters()) < 0)
  491. return Error::from_syscall("rmdir"sv, -errno);
  492. return {};
  493. #endif
  494. }
  495. ErrorOr<int> mkstemp(Span<char> pattern)
  496. {
  497. int fd = ::mkstemp(pattern.data());
  498. if (fd < 0)
  499. return Error::from_syscall("mkstemp"sv, -errno);
  500. return fd;
  501. }
  502. ErrorOr<String> mkdtemp(Span<char> pattern)
  503. {
  504. auto* path = ::mkdtemp(pattern.data());
  505. if (path == nullptr) {
  506. return Error::from_errno(errno);
  507. }
  508. return String::from_utf8(StringView { path, strlen(path) });
  509. }
  510. ErrorOr<void> rename(StringView old_path, StringView new_path)
  511. {
  512. if (old_path.is_null() || new_path.is_null())
  513. return Error::from_errno(EFAULT);
  514. #ifdef AK_OS_SERENITY
  515. Syscall::SC_rename_params params {
  516. .olddirfd = AT_FDCWD,
  517. .old_path = { old_path.characters_without_null_termination(), old_path.length() },
  518. .newdirfd = AT_FDCWD,
  519. .new_path = { new_path.characters_without_null_termination(), new_path.length() },
  520. };
  521. int rc = syscall(SC_rename, &params);
  522. HANDLE_SYSCALL_RETURN_VALUE("rename", rc, {});
  523. #else
  524. ByteString old_path_string = old_path;
  525. ByteString new_path_string = new_path;
  526. if (::rename(old_path_string.characters(), new_path_string.characters()) < 0)
  527. return Error::from_syscall("rename"sv, -errno);
  528. return {};
  529. #endif
  530. }
  531. ErrorOr<void> unlink(StringView path)
  532. {
  533. if (path.is_null())
  534. return Error::from_errno(EFAULT);
  535. #ifdef AK_OS_SERENITY
  536. int rc = syscall(SC_unlink, AT_FDCWD, path.characters_without_null_termination(), path.length(), 0);
  537. HANDLE_SYSCALL_RETURN_VALUE("unlink", rc, {});
  538. #else
  539. ByteString path_string = path;
  540. if (::unlink(path_string.characters()) < 0)
  541. return Error::from_syscall("unlink"sv, -errno);
  542. return {};
  543. #endif
  544. }
  545. ErrorOr<void> utimensat(int fd, StringView path, struct timespec const times[2], int flag)
  546. {
  547. if (path.is_null())
  548. return Error::from_errno(EFAULT);
  549. #ifdef AK_OS_SERENITY
  550. // POSIX allows AT_SYMLINK_NOFOLLOW flag or no flags.
  551. if (flag & ~AT_SYMLINK_NOFOLLOW)
  552. return Error::from_errno(EINVAL);
  553. // Return early without error since both changes are to be omitted.
  554. if (times && times[0].tv_nsec == UTIME_OMIT && times[1].tv_nsec == UTIME_OMIT)
  555. return {};
  556. // According to POSIX, when times is a nullptr, it's equivalent to setting
  557. // both last access time and last modification time to the current time.
  558. // Setting the times argument to nullptr if it matches this case prevents
  559. // the need to copy it in the kernel.
  560. if (times && times[0].tv_nsec == UTIME_NOW && times[1].tv_nsec == UTIME_NOW)
  561. times = nullptr;
  562. if (times) {
  563. for (int i = 0; i < 2; ++i) {
  564. if ((times[i].tv_nsec != UTIME_NOW && times[i].tv_nsec != UTIME_OMIT)
  565. && (times[i].tv_nsec < 0 || times[i].tv_nsec >= 1'000'000'000L)) {
  566. return Error::from_errno(EINVAL);
  567. }
  568. }
  569. }
  570. Syscall::SC_utimensat_params params {
  571. .dirfd = fd,
  572. .path = { path.characters_without_null_termination(), path.length() },
  573. .times = times,
  574. .flag = flag,
  575. };
  576. int rc = syscall(SC_utimensat, &params);
  577. HANDLE_SYSCALL_RETURN_VALUE("utimensat", rc, {});
  578. #else
  579. auto builder = TRY(StringBuilder::create());
  580. TRY(builder.try_append(path));
  581. TRY(builder.try_append('\0'));
  582. // Note the explicit null terminators above.
  583. if (::utimensat(fd, builder.string_view().characters_without_null_termination(), times, flag) < 0)
  584. return Error::from_syscall("utimensat"sv, -errno);
  585. return {};
  586. #endif
  587. }
  588. ErrorOr<struct utsname> uname()
  589. {
  590. struct utsname uts;
  591. #ifdef AK_OS_SERENITY
  592. int rc = syscall(SC_uname, &uts);
  593. HANDLE_SYSCALL_RETURN_VALUE("uname", rc, uts);
  594. #else
  595. if (::uname(&uts) < 0)
  596. return Error::from_syscall("uname"sv, -errno);
  597. #endif
  598. return uts;
  599. }
  600. ErrorOr<int> socket(int domain, int type, int protocol)
  601. {
  602. auto fd = ::socket(domain, type, protocol);
  603. if (fd < 0)
  604. return Error::from_syscall("socket"sv, -errno);
  605. return fd;
  606. }
  607. ErrorOr<void> bind(int sockfd, struct sockaddr const* address, socklen_t address_length)
  608. {
  609. if (::bind(sockfd, address, address_length) < 0)
  610. return Error::from_syscall("bind"sv, -errno);
  611. return {};
  612. }
  613. ErrorOr<void> listen(int sockfd, int backlog)
  614. {
  615. if (::listen(sockfd, backlog) < 0)
  616. return Error::from_syscall("listen"sv, -errno);
  617. return {};
  618. }
  619. ErrorOr<int> accept(int sockfd, struct sockaddr* address, socklen_t* address_length)
  620. {
  621. auto fd = ::accept(sockfd, address, address_length);
  622. if (fd < 0)
  623. return Error::from_syscall("accept"sv, -errno);
  624. return fd;
  625. }
  626. ErrorOr<void> connect(int sockfd, struct sockaddr const* address, socklen_t address_length)
  627. {
  628. if (::connect(sockfd, address, address_length) < 0)
  629. return Error::from_syscall("connect"sv, -errno);
  630. return {};
  631. }
  632. ErrorOr<ssize_t> send(int sockfd, void const* buffer, size_t buffer_length, int flags)
  633. {
  634. auto sent = ::send(sockfd, buffer, buffer_length, flags);
  635. if (sent < 0)
  636. return Error::from_syscall("send"sv, -errno);
  637. return sent;
  638. }
  639. ErrorOr<ssize_t> sendmsg(int sockfd, const struct msghdr* message, int flags)
  640. {
  641. auto sent = ::sendmsg(sockfd, message, flags);
  642. if (sent < 0)
  643. return Error::from_syscall("sendmsg"sv, -errno);
  644. return sent;
  645. }
  646. ErrorOr<ssize_t> sendto(int sockfd, void const* source, size_t source_length, int flags, struct sockaddr const* destination, socklen_t destination_length)
  647. {
  648. auto sent = ::sendto(sockfd, source, source_length, flags, destination, destination_length);
  649. if (sent < 0)
  650. return Error::from_syscall("sendto"sv, -errno);
  651. return sent;
  652. }
  653. ErrorOr<ssize_t> recv(int sockfd, void* buffer, size_t length, int flags)
  654. {
  655. auto received = ::recv(sockfd, buffer, length, flags);
  656. if (received < 0)
  657. return Error::from_syscall("recv"sv, -errno);
  658. return received;
  659. }
  660. ErrorOr<ssize_t> recvmsg(int sockfd, struct msghdr* message, int flags)
  661. {
  662. auto received = ::recvmsg(sockfd, message, flags);
  663. if (received < 0)
  664. return Error::from_syscall("recvmsg"sv, -errno);
  665. return received;
  666. }
  667. ErrorOr<ssize_t> recvfrom(int sockfd, void* buffer, size_t buffer_length, int flags, struct sockaddr* address, socklen_t* address_length)
  668. {
  669. auto received = ::recvfrom(sockfd, buffer, buffer_length, flags, address, address_length);
  670. if (received < 0)
  671. return Error::from_syscall("recvfrom"sv, -errno);
  672. return received;
  673. }
  674. ErrorOr<AddressInfoVector> getaddrinfo(char const* nodename, char const* servname, struct addrinfo const& hints)
  675. {
  676. struct addrinfo* results = nullptr;
  677. int const rc = ::getaddrinfo(nodename, servname, &hints, &results);
  678. if (rc != 0) {
  679. if (rc == EAI_SYSTEM) {
  680. return Error::from_syscall("getaddrinfo"sv, -errno);
  681. }
  682. auto const* error_string = gai_strerror(rc);
  683. return Error::from_string_view({ error_string, strlen(error_string) });
  684. }
  685. Vector<struct addrinfo> addresses;
  686. for (auto* result = results; result != nullptr; result = result->ai_next)
  687. TRY(addresses.try_append(*result));
  688. return AddressInfoVector { move(addresses), results };
  689. }
  690. ErrorOr<void> getsockopt(int sockfd, int level, int option, void* value, socklen_t* value_size)
  691. {
  692. if (::getsockopt(sockfd, level, option, value, value_size) < 0)
  693. return Error::from_syscall("getsockopt"sv, -errno);
  694. return {};
  695. }
  696. ErrorOr<void> setsockopt(int sockfd, int level, int option, void const* value, socklen_t value_size)
  697. {
  698. if (::setsockopt(sockfd, level, option, value, value_size) < 0)
  699. return Error::from_syscall("setsockopt"sv, -errno);
  700. return {};
  701. }
  702. ErrorOr<void> getsockname(int sockfd, struct sockaddr* address, socklen_t* address_length)
  703. {
  704. if (::getsockname(sockfd, address, address_length) < 0)
  705. return Error::from_syscall("getsockname"sv, -errno);
  706. return {};
  707. }
  708. ErrorOr<void> getpeername(int sockfd, struct sockaddr* address, socklen_t* address_length)
  709. {
  710. if (::getpeername(sockfd, address, address_length) < 0)
  711. return Error::from_syscall("getpeername"sv, -errno);
  712. return {};
  713. }
  714. ErrorOr<void> socketpair(int domain, int type, int protocol, int sv[2])
  715. {
  716. if (::socketpair(domain, type, protocol, sv) < 0)
  717. return Error::from_syscall("socketpair"sv, -errno);
  718. return {};
  719. }
  720. ErrorOr<Array<int, 2>> pipe2(int flags)
  721. {
  722. Array<int, 2> fds;
  723. #if defined(__unix__)
  724. if (::pipe2(fds.data(), flags) < 0)
  725. return Error::from_syscall("pipe2"sv, -errno);
  726. #else
  727. if (::pipe(fds.data()) < 0)
  728. return Error::from_syscall("pipe2"sv, -errno);
  729. // Ensure we don't leak the fds if any of the system calls below fail.
  730. AK::ArmedScopeGuard close_fds { [&]() {
  731. MUST(close(fds[0]));
  732. MUST(close(fds[1]));
  733. } };
  734. if ((flags & O_CLOEXEC) != 0) {
  735. TRY(fcntl(fds[0], F_SETFD, FD_CLOEXEC));
  736. TRY(fcntl(fds[1], F_SETFD, FD_CLOEXEC));
  737. }
  738. if ((flags & O_NONBLOCK) != 0) {
  739. TRY(fcntl(fds[0], F_SETFL, TRY(fcntl(fds[0], F_GETFL)) | O_NONBLOCK));
  740. TRY(fcntl(fds[1], F_SETFL, TRY(fcntl(fds[1], F_GETFL)) | O_NONBLOCK));
  741. }
  742. close_fds.disarm();
  743. #endif
  744. return fds;
  745. }
  746. ErrorOr<void> access(StringView pathname, int mode, int flags)
  747. {
  748. if (pathname.is_null())
  749. return Error::from_syscall("access"sv, -EFAULT);
  750. #ifdef AK_OS_SERENITY
  751. Syscall::SC_faccessat_params params {
  752. .dirfd = AT_FDCWD,
  753. .pathname = { pathname.characters_without_null_termination(), pathname.length() },
  754. .mode = mode,
  755. .flags = flags,
  756. };
  757. int rc = ::syscall(Syscall::SC_faccessat, &params);
  758. HANDLE_SYSCALL_RETURN_VALUE("access", rc, {});
  759. #else
  760. ByteString path_string = pathname;
  761. (void)flags;
  762. if (::access(path_string.characters(), mode) < 0)
  763. return Error::from_syscall("access"sv, -errno);
  764. return {};
  765. #endif
  766. }
  767. ErrorOr<ByteString> readlink(StringView pathname)
  768. {
  769. // FIXME: Try again with a larger buffer.
  770. #ifdef AK_OS_SERENITY
  771. char data[PATH_MAX];
  772. Syscall::SC_readlink_params small_params {
  773. .path = { pathname.characters_without_null_termination(), pathname.length() },
  774. .buffer = { data, sizeof(data) },
  775. .dirfd = AT_FDCWD,
  776. };
  777. int rc = syscall(SC_readlink, &small_params);
  778. HANDLE_SYSCALL_RETURN_VALUE("readlink", rc, ByteString(data, rc));
  779. #elif defined(AK_OS_GNU_HURD)
  780. // PATH_MAX is not defined, nor is there an upper limit on path lengths.
  781. // Let's do this the right way.
  782. int fd = TRY(open(pathname, O_READ | O_NOLINK));
  783. auto file = TRY(File::adopt_fd(fd, File::OpenMode::Read));
  784. auto buffer = TRY(file->read_until_eof());
  785. // TODO: Get rid of this copy here.
  786. return ByteString::copy(buffer);
  787. #else
  788. char data[PATH_MAX];
  789. ByteString path_string = pathname;
  790. int rc = ::readlink(path_string.characters(), data, sizeof(data));
  791. if (rc == -1)
  792. return Error::from_syscall("readlink"sv, -errno);
  793. return ByteString(data, rc);
  794. #endif
  795. }
  796. ErrorOr<int> poll(Span<struct pollfd> poll_fds, int timeout)
  797. {
  798. auto const rc = ::poll(poll_fds.data(), poll_fds.size(), timeout);
  799. if (rc < 0)
  800. return Error::from_syscall("poll"sv, -errno);
  801. return { rc };
  802. }
  803. unsigned hardware_concurrency()
  804. {
  805. return sysconf(_SC_NPROCESSORS_ONLN);
  806. }
  807. u64 physical_memory_bytes()
  808. {
  809. return sysconf(_SC_PHYS_PAGES) * PAGE_SIZE;
  810. }
  811. ErrorOr<ByteString> current_executable_path()
  812. {
  813. char path[4096] = {};
  814. #if defined(AK_OS_LINUX) || defined(AK_OS_ANDROID) || defined(AK_OS_SERENITY)
  815. auto ret = ::readlink("/proc/self/exe", path, sizeof(path) - 1);
  816. // Ignore error if it wasn't a symlink
  817. if (ret == -1 && errno != EINVAL)
  818. return Error::from_syscall("readlink"sv, -errno);
  819. #elif defined(AK_OS_GNU_HURD)
  820. // We could read /proc/self/exe, but why rely on procfs being mounted
  821. // if we can do the same thing procfs does and ask the proc server directly?
  822. process_t proc = getproc();
  823. if (!MACH_PORT_VALID(proc))
  824. return Error::from_syscall("getproc"sv, -errno);
  825. kern_return_t err = proc_get_exe(proc, getpid(), path);
  826. mach_port_deallocate(mach_task_self(), proc);
  827. if (err) {
  828. __hurd_fail(static_cast<error_t>(err));
  829. return Error::from_syscall("proc_get_exe"sv, -errno);
  830. }
  831. #elif defined(AK_OS_DRAGONFLY)
  832. return TRY(readlink("/proc/curproc/file"sv));
  833. #elif defined(AK_OS_SOLARIS)
  834. return TRY(readlink("/proc/self/path/a.out"sv));
  835. #elif defined(AK_OS_FREEBSD)
  836. int mib[4] = { CTL_KERN, KERN_PROC, KERN_PROC_PATHNAME, -1 };
  837. size_t len = sizeof(path);
  838. if (sysctl(mib, 4, path, &len, nullptr, 0) < 0)
  839. return Error::from_syscall("sysctl"sv, -errno);
  840. #elif defined(AK_OS_NETBSD)
  841. int mib[4] = { CTL_KERN, KERN_PROC_ARGS, -1, KERN_PROC_PATHNAME };
  842. size_t len = sizeof(path);
  843. if (sysctl(mib, 4, path, &len, nullptr, 0) < 0)
  844. return Error::from_syscall("sysctl"sv, -errno);
  845. #elif defined(AK_OS_MACOS) || defined(AK_OS_IOS)
  846. u32 size = sizeof(path);
  847. auto ret = _NSGetExecutablePath(path, &size);
  848. if (ret != 0)
  849. return Error::from_errno(ENAMETOOLONG);
  850. #elif defined(AK_OS_HAIKU)
  851. image_info info = {};
  852. for (int32 cookie { 0 }; get_next_image_info(B_CURRENT_TEAM, &cookie, &info) == B_OK && info.type != B_APP_IMAGE;)
  853. ;
  854. if (info.type != B_APP_IMAGE)
  855. return Error::from_string_literal("current_executable_path() failed");
  856. if (sizeof(info.name) > sizeof(path))
  857. return Error::from_errno(ENAMETOOLONG);
  858. strlcpy(path, info.name, sizeof(path) - 1);
  859. #elif defined(AK_OS_EMSCRIPTEN)
  860. return Error::from_string_literal("current_executable_path() unknown on this platform");
  861. #else
  862. # warning "Not sure how to get current_executable_path on this platform!"
  863. // GetModuleFileName on Windows, unsure about OpenBSD.
  864. return Error::from_string_literal("current_executable_path unknown");
  865. #endif
  866. path[sizeof(path) - 1] = '\0';
  867. return ByteString { path, strlen(path) };
  868. }
  869. ErrorOr<rlimit> get_resource_limits(int resource)
  870. {
  871. rlimit limits;
  872. if (::getrlimit(resource, &limits) != 0)
  873. return Error::from_syscall("getrlimit"sv, -errno);
  874. return limits;
  875. }
  876. ErrorOr<void> set_resource_limits(int resource, rlim_t limit)
  877. {
  878. auto limits = TRY(get_resource_limits(resource));
  879. limits.rlim_cur = min(limit, limits.rlim_max);
  880. if (::setrlimit(resource, &limits) != 0)
  881. return Error::from_syscall("setrlimit"sv, -errno);
  882. return {};
  883. }
  884. int getpid()
  885. {
  886. return ::getpid();
  887. }
  888. bool is_socket(int fd)
  889. {
  890. auto result = fstat(fd);
  891. return !result.is_error() && S_ISSOCK(result.value().st_mode);
  892. }
  893. }