ladybird/Userland/Libraries/LibC/unistd.cpp

1113 lines
29 KiB
C++
Raw Normal View History

/*
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
*
* SPDX-License-Identifier: BSD-2-Clause
*/
#include <AK/DeprecatedString.h>
#include <AK/ScopeGuard.h>
#include <AK/ScopedValueRollback.h>
2019-06-07 09:49:03 +00:00
#include <AK/Vector.h>
#include <Kernel/API/Unveil.h>
#include <LibCore/File.h>
#include <alloca.h>
#include <assert.h>
#include <bits/pthread_cancel.h>
#include <bits/pthread_integration.h>
#include <dirent.h>
2019-06-07 09:49:03 +00:00
#include <errno.h>
#include <fcntl.h>
#include <getopt.h>
#include <grp.h>
#include <pwd.h>
2019-06-07 09:49:03 +00:00
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
2019-06-07 09:49:03 +00:00
#include <string.h>
#include <sys/ioctl.h>
#include <sys/mman.h>
2022-03-29 20:47:06 +00:00
#include <sys/resource.h>
2021-08-11 16:49:13 +00:00
#include <sys/select.h>
#include <sys/stat.h>
#include <sys/sysmacros.h>
#include <sys/types.h>
#include <syscall.h>
#include <termios.h>
#include <time.h>
2019-06-07 09:49:03 +00:00
#include <unistd.h>
extern "C" {
#ifdef NO_TLS
static int s_cached_tid = 0;
#else
static __thread int s_cached_tid = 0;
#endif
static int s_cached_pid = 0;
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/lchown.html
2022-04-01 17:58:27 +00:00
int lchown(char const* pathname, uid_t uid, gid_t gid)
{
if (!pathname) {
errno = EFAULT;
return -1;
}
Syscall::SC_chown_params params { { pathname, strlen(pathname) }, uid, gid, AT_FDCWD, false };
int rc = syscall(SC_chown, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/chown.html
2022-04-01 17:58:27 +00:00
int chown(char const* pathname, uid_t uid, gid_t gid)
{
if (!pathname) {
errno = EFAULT;
return -1;
}
Syscall::SC_chown_params params { { pathname, strlen(pathname) }, uid, gid, AT_FDCWD, true };
int rc = syscall(SC_chown, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/fchown.html
2019-06-01 18:31:36 +00:00
int fchown(int fd, uid_t uid, gid_t gid)
{
int rc = syscall(SC_fchown, fd, uid, gid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2022-04-01 17:58:27 +00:00
int fchownat(int fd, char const* pathname, uid_t uid, gid_t gid, int flags)
{
if (!pathname) {
errno = EFAULT;
return -1;
}
Syscall::SC_chown_params params { { pathname, strlen(pathname) }, uid, gid, fd, !(flags & AT_SYMLINK_NOFOLLOW) };
int rc = syscall(SC_chown, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/fork.html
pid_t fork()
{
__pthread_fork_prepare();
int rc = syscall(SC_fork);
if (rc == 0) {
s_cached_tid = 0;
s_cached_pid = 0;
__pthread_fork_child();
} else if (rc != -1) {
__pthread_fork_parent();
}
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/vfork.html
pid_t vfork()
{
return fork();
}
// Non-POSIX, but present in BSDs and Linux
// https://man.openbsd.org/daemon.3
int daemon(int nochdir, int noclose)
{
pid_t pid = fork();
if (pid < 0)
return -1;
// exit parent, continue execution in child
if (pid > 0)
_exit(0);
pid = setsid();
if (pid < 0)
return -1;
if (nochdir == 0)
(void)chdir("/");
if (noclose == 0) {
// redirect stdout and stderr to /dev/null
int fd = open("/dev/null", O_WRONLY);
if (fd < 0)
return -1;
(void)close(STDOUT_FILENO);
(void)close(STDERR_FILENO);
(void)dup2(fd, STDOUT_FILENO);
(void)dup2(fd, STDERR_FILENO);
(void)close(fd);
}
return 0;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/execv.html
2022-04-01 17:58:27 +00:00
int execv(char const* path, char* const argv[])
{
return execve(path, argv, environ);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/execve.html
2022-04-01 17:58:27 +00:00
int execve(char const* filename, char* const argv[], char* const envp[])
{
size_t arg_count = 0;
for (size_t i = 0; argv[i]; ++i)
++arg_count;
size_t env_count = 0;
for (size_t i = 0; envp[i]; ++i)
++env_count;
auto copy_strings = [&](auto& vec, size_t count, auto& output) {
output.length = count;
for (size_t i = 0; vec[i]; ++i) {
output.strings[i].characters = vec[i];
output.strings[i].length = strlen(vec[i]);
}
};
Syscall::SC_execve_params params;
params.arguments.strings = (Syscall::StringArgument*)alloca(arg_count * sizeof(Syscall::StringArgument));
params.environment.strings = (Syscall::StringArgument*)alloca(env_count * sizeof(Syscall::StringArgument));
params.path = { filename, strlen(filename) };
copy_strings(argv, arg_count, params.arguments);
copy_strings(envp, env_count, params.environment);
int rc = syscall(SC_execve, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://linux.die.net/man/3/execvpe (GNU extension)
2022-04-01 17:58:27 +00:00
int execvpe(char const* filename, char* const argv[], char* const envp[])
{
if (strchr(filename, '/'))
return execve(filename, argv, envp);
ScopedValueRollback errno_rollback(errno);
// TODO: Make this use the PATH search implementation from Core::File.
DeprecatedString path = getenv("PATH");
if (path.is_empty())
path = DEFAULT_PATH;
auto parts = path.split(':');
for (auto& part : parts) {
auto candidate = DeprecatedString::formatted("{}/{}", part, filename);
int rc = execve(candidate.characters(), argv, envp);
if (rc < 0 && errno != ENOENT) {
errno_rollback.set_override_rollback_value(errno);
dbgln("execvpe() failed on attempt ({}) with {}", candidate, strerror(errno));
return rc;
}
}
errno_rollback.set_override_rollback_value(ENOENT);
dbgln("execvpe() leaving :(");
return -1;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/execvp.html
2022-04-01 17:58:27 +00:00
int execvp(char const* filename, char* const argv[])
{
int rc = execvpe(filename, argv, environ);
int saved_errno = errno;
dbgln("execvp({}, ...) about to return {} with errno={}", filename, rc, saved_errno);
errno = saved_errno;
return rc;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/execl.html
2022-04-01 17:58:27 +00:00
int execl(char const* filename, char const* arg0, ...)
{
2022-04-01 17:58:27 +00:00
Vector<char const*, 16> args;
args.append(arg0);
va_list ap;
va_start(ap, arg0);
for (;;) {
2022-04-01 17:58:27 +00:00
char const* arg = va_arg(ap, char const*);
if (!arg)
break;
args.append(arg);
}
va_end(ap);
args.append(nullptr);
return execve(filename, const_cast<char* const*>(args.data()), environ);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/execle.html
2021-06-03 23:47:17 +00:00
int execle(char const* filename, char const* arg0, ...)
{
Vector<char const*> args;
args.append(arg0);
va_list ap;
va_start(ap, arg0);
char const* arg;
do {
arg = va_arg(ap, char const*);
args.append(arg);
} while (arg);
auto argv = const_cast<char* const*>(args.data());
auto envp = const_cast<char* const*>(va_arg(ap, char* const*));
va_end(ap);
return execve(filename, argv, envp);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/execlp.html
2022-04-01 17:58:27 +00:00
int execlp(char const* filename, char const* arg0, ...)
{
2022-04-01 17:58:27 +00:00
Vector<char const*, 16> args;
args.append(arg0);
va_list ap;
va_start(ap, arg0);
for (;;) {
2022-04-01 17:58:27 +00:00
char const* arg = va_arg(ap, char const*);
if (!arg)
break;
args.append(arg);
}
va_end(ap);
args.append(nullptr);
return execvpe(filename, const_cast<char* const*>(args.data()), environ);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getuid.html
uid_t geteuid()
{
return syscall(SC_geteuid);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getegid.html
gid_t getegid()
{
return syscall(SC_getegid);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getuid.html
uid_t getuid()
{
return syscall(SC_getuid);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getgid.html
gid_t getgid()
{
return syscall(SC_getgid);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getpid.html
pid_t getpid()
{
int cached_pid = s_cached_pid;
if (!cached_pid) {
cached_pid = syscall(SC_getpid);
s_cached_pid = cached_pid;
}
return cached_pid;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getppid.html
2018-11-06 12:33:06 +00:00
pid_t getppid()
{
return syscall(SC_getppid);
2018-11-06 12:33:06 +00:00
}
int getresuid(uid_t* ruid, uid_t* euid, uid_t* suid)
{
return syscall(SC_getresuid, ruid, euid, suid);
}
int getresgid(gid_t* rgid, gid_t* egid, gid_t* sgid)
{
return syscall(SC_getresgid, rgid, egid, sgid);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getsid.html
pid_t getsid(pid_t pid)
{
int rc = syscall(SC_getsid, pid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/setsid.html
pid_t setsid()
{
int rc = syscall(SC_setsid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
pid_t tcgetpgrp(int fd)
{
pid_t pgrp;
int rc = ioctl(fd, TIOCGPGRP, &pgrp);
if (rc < 0)
return rc;
return pgrp;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/tcgetpgrp.html
int tcsetpgrp(int fd, pid_t pgid)
{
return ioctl(fd, TIOCSPGRP, pgid);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/setpgid.html
int setpgid(pid_t pid, pid_t pgid)
{
int rc = syscall(SC_setpgid, pid, pgid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getpgid.html
pid_t getpgid(pid_t pid)
{
int rc = syscall(SC_getpgid, pid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getpgrp.html
pid_t getpgrp()
{
int rc = syscall(SC_getpgrp);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/read.html
ssize_t read(int fd, void* buf, size_t count)
{
__pthread_maybe_cancel();
int rc = syscall(SC_read, fd, buf, count);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/pread.html
ssize_t pread(int fd, void* buf, size_t count, off_t offset)
{
__pthread_maybe_cancel();
int rc = syscall(SC_pread, fd, buf, count, &offset);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/write.html
2022-04-01 17:58:27 +00:00
ssize_t write(int fd, void const* buf, size_t count)
{
__pthread_maybe_cancel();
int rc = syscall(SC_write, fd, buf, count);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/pwrite.html
2022-04-01 17:58:27 +00:00
ssize_t pwrite(int fd, void const* buf, size_t count, off_t offset)
{
__pthread_maybe_cancel();
// FIXME: This is not thread safe and should be implemented in the kernel instead.
off_t old_offset = lseek(fd, 0, SEEK_CUR);
lseek(fd, offset, SEEK_SET);
ssize_t nwritten = write(fd, buf, count);
lseek(fd, old_offset, SEEK_SET);
return nwritten;
}
// Note: Be sure to send to directory_name parameter a directory name ended with trailing slash.
2022-04-01 17:58:27 +00:00
static int ttyname_r_for_directory(char const* directory_name, dev_t device_mode, ino_t inode_number, char* buffer, size_t size)
{
DIR* dirstream = opendir(directory_name);
if (!dirstream) {
return -1;
}
auto close_dir_stream_on_exit = ScopeGuard([dirstream] {
closedir(dirstream);
});
struct dirent* entry = nullptr;
char* name_path = nullptr;
// FIXME: Use LibCore DirIterator here instead
while ((entry = readdir(dirstream)) != nullptr) {
if (((ino_t)entry->d_ino == inode_number)
&& strcmp(entry->d_name, "stdin")
&& strcmp(entry->d_name, "stdout")
&& strcmp(entry->d_name, "stderr")) {
size_t name_length = strlen(directory_name) + strlen(entry->d_name) + 1;
if (name_length > size) {
errno = ERANGE;
return -1;
}
name_path = (char*)malloc(name_length);
memset(name_path, 0, name_length);
memcpy(name_path, directory_name, strlen(directory_name));
memcpy(&name_path[strlen(directory_name)], entry->d_name, strlen(entry->d_name));
struct stat st;
if (lstat(name_path, &st) < 0) {
free(name_path);
name_path = nullptr;
continue;
}
if (device_mode == st.st_rdev) {
memset(buffer, 0, name_length);
memcpy(buffer, name_path, name_length);
free(name_path);
return 0;
}
}
}
free(name_path);
return -1;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/ttyname_r.html
int ttyname_r(int fd, char* buffer, size_t size)
{
struct stat stat;
if (fstat(fd, &stat) < 0)
return -1;
dev_t major_minor_numbers = stat.st_rdev;
ino_t inode_number = stat.st_ino;
if (ttyname_r_for_directory("/dev/", major_minor_numbers, inode_number, buffer, size) < 0) {
if (ttyname_r_for_directory("/dev/pts/", major_minor_numbers, inode_number, buffer, size) < 0) {
errno = ENOTTY;
return -1;
}
}
return 0;
}
static char ttyname_buf[32];
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/ttyname.html
char* ttyname(int fd)
{
if (ttyname_r(fd, ttyname_buf, sizeof(ttyname_buf)) < 0)
return nullptr;
return ttyname_buf;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/close.html
int close(int fd)
{
__pthread_maybe_cancel();
int rc = syscall(SC_close, fd);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/chdir.html
2022-04-01 17:58:27 +00:00
int chdir(char const* path)
{
if (!path) {
errno = EFAULT;
return -1;
}
2020-01-05 21:06:25 +00:00
int rc = syscall(SC_chdir, path, strlen(path));
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/fchdir.html
int fchdir(int fd)
{
int rc = syscall(SC_fchdir, fd);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getcwd.html
char* getcwd(char* buffer, size_t size)
{
if (buffer && size == 0) {
// POSIX requires that we set errno to EINVAL here, but in our syscall it makes sense to
// allow "probing" the Kernel with a zero-sized buffer, and it does not return -EINVAL.
// So we have to inject EINVAL here.
errno = EINVAL;
return nullptr;
}
2021-01-16 12:32:11 +00:00
bool self_allocated = false;
if (!buffer) {
size = size ? size : 64;
buffer = (char*)malloc(size);
2021-01-16 12:32:11 +00:00
self_allocated = true;
}
int rc = syscall(SC_getcwd, buffer, size);
if (rc < 0) {
if (self_allocated)
free(buffer);
errno = -rc;
return nullptr;
}
size_t actual_size = static_cast<size_t>(rc);
if (actual_size <= size) {
return buffer;
}
// If we get here, the current directory path was silently truncated.
if (!self_allocated) {
// In this case, POSIX causes information loss: the caller cannot learn about the ideal
// buffer size. This is the reason we went with silently truncation instead.
errno = ERANGE;
return nullptr;
}
// Try again.
free(buffer);
size = actual_size;
buffer = (char*)malloc(size);
rc = syscall(SC_getcwd, buffer, size);
if (rc < 0) {
// Can only happen if we lose a race. Let's pretend we lost the race in the first place.
2021-01-16 12:32:11 +00:00
free(buffer);
errno = -rc;
return nullptr;
2021-01-16 12:32:11 +00:00
}
actual_size = static_cast<size_t>(rc);
if (actual_size < size) {
// If we're here, then cwd has become longer while we were looking at it. (Race with another thread?)
// There's not much we can do, unless we want to loop endlessly
// in this case. Let's leave it up to the caller whether to loop.
free(buffer);
errno = EAGAIN;
return nullptr;
}
return buffer;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getwd.html
2018-11-06 14:59:57 +00:00
char* getwd(char* buf)
{
if (buf == nullptr) {
errno = EINVAL;
return nullptr;
}
auto* p = getcwd(buf, PATH_MAX);
if (errno == ERANGE) {
// POSIX quirk
errno = ENAMETOOLONG;
}
return p;
2018-11-06 14:59:57 +00:00
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/sleep.html
unsigned int sleep(unsigned int seconds)
{
struct timespec ts = { seconds, 0 };
if (clock_nanosleep(CLOCK_MONOTONIC_COARSE, 0, &ts, nullptr) < 0)
return ts.tv_sec;
return 0;
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/usleep.html
int usleep(useconds_t usec)
{
struct timespec ts = { (long)(usec / 1000000), (long)(usec % 1000000) * 1000 };
return clock_nanosleep(CLOCK_MONOTONIC_COARSE, 0, &ts, nullptr);
}
2018-10-26 07:54:29 +00:00
int gethostname(char* buffer, size_t size)
{
int rc = syscall(SC_gethostname, buffer, size);
2018-10-26 07:54:29 +00:00
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2022-04-01 17:58:27 +00:00
int sethostname(char const* hostname, ssize_t size)
{
int rc = syscall(SC_sethostname, hostname, size);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/readlinkat.html
2022-04-01 17:58:27 +00:00
ssize_t readlink(char const* path, char* buffer, size_t size)
{
return readlinkat(AT_FDCWD, path, buffer, size);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/readlinkat.html
ssize_t readlinkat(int dirfd, char const* path, char* buffer, size_t size)
{
Syscall::SC_readlink_params params { { path, strlen(path) }, { buffer, size }, dirfd };
int rc = syscall(SC_readlink, &params);
// Return the number of bytes placed in the buffer, not the full path size.
__RETURN_WITH_ERRNO(rc, min((size_t)rc, size), -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/lseek.html
off_t lseek(int fd, off_t offset, int whence)
{
2021-03-13 21:02:54 +00:00
int rc = syscall(SC_lseek, fd, &offset, whence);
__RETURN_WITH_ERRNO(rc, offset, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/link.html
2022-04-01 17:58:27 +00:00
int link(char const* old_path, char const* new_path)
{
if (!old_path || !new_path) {
errno = EFAULT;
return -1;
}
Syscall::SC_link_params params { { old_path, strlen(old_path) }, { new_path, strlen(new_path) } };
int rc = syscall(SC_link, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/unlink.html
2022-04-01 17:58:27 +00:00
int unlink(char const* pathname)
{
return unlinkat(AT_FDCWD, pathname, 0);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/unlinkat.html
int unlinkat(int dirfd, char const* pathname, int flags)
{
int rc = syscall(SC_unlink, dirfd, pathname, strlen(pathname), flags);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/symlink.html
2022-04-01 17:58:27 +00:00
int symlink(char const* target, char const* linkpath)
{
return symlinkat(target, AT_FDCWD, linkpath);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/symlinkat.html
int symlinkat(char const* target, int newdirfd, char const* linkpath)
{
if (!target || !linkpath) {
errno = EFAULT;
return -1;
}
Syscall::SC_symlink_params params { { target, strlen(target) }, { linkpath, strlen(linkpath) }, newdirfd };
int rc = syscall(SC_symlink, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/rmdir.html
2022-04-01 17:58:27 +00:00
int rmdir(char const* pathname)
{
if (!pathname) {
errno = EFAULT;
return -1;
}
int rc = syscall(SC_rmdir, pathname, strlen(pathname));
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/isatty.html
int isatty(int fd)
{
return fcntl(fd, F_ISTTY);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/dup.html
int dup(int old_fd)
{
return fcntl(old_fd, F_DUPFD, 0);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/dup2.html
int dup2(int old_fd, int new_fd)
{
int rc = syscall(SC_dup2, old_fd, new_fd);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2022-04-01 17:58:27 +00:00
int setgroups(size_t size, gid_t const* list)
{
int rc = syscall(SC_setgroups, size, list);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int getgroups(int size, gid_t list[])
{
int rc = syscall(SC_getgroups, size, list);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/pipe.html
int pipe(int pipefd[2])
{
return pipe2(pipefd, 0);
}
//
int pipe2(int pipefd[2], int flags)
{
int rc = syscall(SC_pipe, pipefd, flags);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
unsigned int alarm(unsigned int seconds)
{
return syscall(SC_alarm, seconds);
}
int seteuid(uid_t euid)
{
int rc = syscall(SC_seteuid, euid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int setegid(gid_t egid)
{
int rc = syscall(SC_setegid, egid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int setuid(uid_t uid)
{
int rc = syscall(SC_setuid, uid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int setgid(gid_t gid)
{
int rc = syscall(SC_setgid, gid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2021-04-09 11:13:15 +00:00
int setreuid(uid_t ruid, uid_t euid)
{
int rc = syscall(SC_setreuid, ruid, euid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int setresuid(uid_t ruid, uid_t euid, uid_t suid)
{
int rc = syscall(SC_setresuid, ruid, euid, suid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int setregid(gid_t rgid, gid_t egid)
{
int rc = syscall(SC_setresgid, rgid, egid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int setresgid(gid_t rgid, gid_t egid, gid_t sgid)
{
int rc = syscall(SC_setresgid, rgid, egid, sgid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/access.html
2022-04-01 17:58:27 +00:00
int access(char const* pathname, int mode)
{
return faccessat(AT_FDCWD, pathname, mode, 0);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/faccessat.html
int faccessat(int dirfd, char const* pathname, int mode, int flags)
{
if (!pathname) {
errno = EFAULT;
return -1;
}
Syscall::SC_faccessat_params params { dirfd, { pathname, strlen(pathname) }, mode, flags };
int rc = syscall(SC_faccessat, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/mknod.html
2022-04-01 17:58:27 +00:00
int mknod(char const* pathname, mode_t mode, dev_t dev)
{
if (!pathname) {
errno = EFAULT;
return -1;
}
Syscall::SC_mknod_params params { { pathname, strlen(pathname) }, mode, dev };
int rc = syscall(SC_mknod, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/fpathconf.html
long fpathconf([[maybe_unused]] int fd, int name)
{
switch (name) {
2021-04-23 20:31:21 +00:00
case _PC_NAME_MAX:
return NAME_MAX;
case _PC_PATH_MAX:
return PATH_MAX;
case _PC_VDISABLE:
return _POSIX_VDISABLE;
case _PC_LINK_MAX:
return LINK_MAX;
}
VERIFY_NOT_REACHED();
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/pathconf.html
2022-04-01 17:58:27 +00:00
long pathconf([[maybe_unused]] char const* path, int name)
{
switch (name) {
2021-04-23 20:31:21 +00:00
case _PC_NAME_MAX:
return NAME_MAX;
case _PC_PATH_MAX:
return PATH_MAX;
case _PC_PIPE_BUF:
return PIPE_BUF;
case _PC_LINK_MAX:
return LINK_MAX;
}
VERIFY_NOT_REACHED();
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/_exit.html
void _exit(int status)
{
syscall(SC_exit, status);
VERIFY_NOT_REACHED();
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/sync.html
void sync()
{
syscall(SC_sync);
}
static DeprecatedString getlogin_buffer;
char* getlogin()
{
if (getlogin_buffer.is_null()) {
if (auto* passwd = getpwuid(getuid())) {
getlogin_buffer = DeprecatedString(passwd->pw_name);
}
endpwent();
2019-03-10 02:15:36 +00:00
}
return const_cast<char*>(getlogin_buffer.characters());
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/ftruncate.html
2019-03-23 23:53:39 +00:00
int ftruncate(int fd, off_t length)
{
2021-03-13 21:02:54 +00:00
int rc = syscall(SC_ftruncate, fd, &length);
__RETURN_WITH_ERRNO(rc, rc, -1);
2019-03-23 23:53:39 +00:00
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/truncate.html
2022-04-01 17:58:27 +00:00
int truncate(char const* path, off_t length)
{
int fd = open(path, O_RDWR | O_CREAT, 0666);
if (fd < 0)
return fd;
int rc = ftruncate(fd, length);
int saved_errno = errno;
if (int close_rc = close(fd); close_rc < 0)
return close_rc;
errno = saved_errno;
return rc;
}
int gettid()
{
int cached_tid = s_cached_tid;
if (!cached_tid) {
cached_tid = syscall(SC_gettid);
s_cached_tid = cached_tid;
}
return cached_tid;
}
int sysbeep()
{
int rc = syscall(SC_beep);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/fsync.html
2021-09-12 03:28:59 +00:00
int fsync(int fd)
2019-05-19 17:54:20 +00:00
{
__pthread_maybe_cancel();
2021-09-12 03:28:59 +00:00
int rc = syscall(SC_fsync, fd);
__RETURN_WITH_ERRNO(rc, rc, -1);
2019-05-19 17:54:20 +00:00
}
2022-04-01 17:58:27 +00:00
int mount(int source_fd, char const* target, char const* fs_type, int flags)
{
if (!target || !fs_type) {
errno = EFAULT;
return -1;
}
Syscall::SC_mount_params params {
{ target, strlen(target) },
{ fs_type, strlen(fs_type) },
source_fd,
flags
};
int rc = syscall(SC_mount, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2022-04-01 17:58:27 +00:00
int umount(char const* mountpoint)
{
int rc = syscall(SC_umount, mountpoint, strlen(mountpoint));
__RETURN_WITH_ERRNO(rc, rc, -1);
}
void dump_backtrace()
{
syscall(SC_dump_backtrace);
}
int get_process_name(char* buffer, int buffer_size)
{
int rc = syscall(SC_get_process_name, buffer, buffer_size);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2022-04-01 17:58:27 +00:00
int set_process_name(char const* name, size_t name_length)
{
int rc = syscall(SC_set_process_name, name, name_length);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2022-04-01 17:58:27 +00:00
int pledge(char const* promises, char const* execpromises)
{
Syscall::SC_pledge_params params {
{ promises, promises ? strlen(promises) : 0 },
{ execpromises, execpromises ? strlen(execpromises) : 0 }
};
int rc = syscall(SC_pledge, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2022-04-01 17:58:27 +00:00
int unveil(char const* path, char const* permissions)
{
Syscall::SC_unveil_params params {
static_cast<int>(UnveilFlags::CurrentProgram),
{ path, path ? strlen(path) : 0 },
{ permissions, permissions ? strlen(permissions) : 0 }
};
int rc = syscall(SC_unveil, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
2020-02-20 05:58:48 +00:00
// https://pubs.opengroup.org/onlinepubs/7908799/xsh/getpass.html
2022-04-01 17:58:27 +00:00
char* getpass(char const* prompt)
2020-02-20 05:58:48 +00:00
{
int tty = open("/dev/tty", O_RDWR | O_NOCTTY | O_CLOEXEC);
if (tty < 0)
return nullptr;
static char password[PASS_MAX];
ssize_t chars_read;
{
auto close_tty = ScopeGuard([tty] {
close(tty);
});
struct termios backup { };
if (tcgetattr(tty, &backup) < 0)
return nullptr;
{
auto restore_termios = ScopeGuard([tty, backup] {
tcsetattr(tty, TCSAFLUSH, &backup);
});
struct termios noecho = backup;
noecho.c_lflag &= ~(ECHO);
noecho.c_lflag |= ICANON;
if (tcsetattr(tty, TCSAFLUSH, &noecho) < 0)
return nullptr;
if (tcdrain(tty) < 0)
return nullptr;
if (prompt) {
if (write(tty, prompt, strlen(prompt)) < 0)
return nullptr;
}
chars_read = read(tty, password, sizeof(password));
}
write(tty, "\n", 1);
}
if (chars_read < 0)
return nullptr;
if (chars_read > 0 && (password[chars_read - 1] == '\n' || chars_read == sizeof(password)))
password[chars_read - 1] = '\0';
else
password[chars_read] = '\0';
return password;
2020-02-20 05:58:48 +00:00
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/sysconf.html
long sysconf(int name)
{
int rc = syscall(SC_sysconf, name);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/getpagesize.html
int getpagesize()
{
return PAGE_SIZE;
}
2021-08-11 16:49:13 +00:00
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/pause.html
2021-08-11 16:49:13 +00:00
int pause()
{
return select(0, nullptr, nullptr, nullptr, nullptr);
}
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/chroot.html
2022-04-01 17:58:27 +00:00
int chroot(char const* path)
{
dbgln("FIXME: chroot(\"{}\")", path);
return -1;
}
2022-03-29 20:47:06 +00:00
// https://pubs.opengroup.org/onlinepubs/7908799/xsh/getdtablesize.html
int getdtablesize()
{
rlimit dtablesize;
int rc = getrlimit(RLIMIT_NOFILE, &dtablesize);
__RETURN_WITH_ERRNO(rc, dtablesize.rlim_cur, rc);
}
2022-04-03 17:36:27 +00:00
// https://pubs.opengroup.org/onlinepubs/007904975/functions/nice.html
int nice(int incr)
{
dbgln("FIXME: nice was called with: {}, not implemented", incr);
return incr;
}
2022-06-29 03:00:28 +00:00
int brk(void* addr)
{
dbgln("TODO: brk({:#x})", addr);
errno = ENOMEM;
return -1;
}
void* sbrk(intptr_t incr)
{
dbgln("TODO: sbrk({:#x})", incr);
errno = ENOMEM;
return reinterpret_cast<void*>(-1);
}
}