1// Copyright 2009,2010 The Go Authors. All rights reserved.
  2// Use of this source code is governed by a BSD-style
  3// license that can be found in the LICENSE file.
  4
  5// Darwin system calls.
  6// This file is compiled as ordinary Go code,
  7// but it is also input to mksyscall,
  8// which parses the //sys lines and generates system call stubs.
  9// Note that sometimes we use a lowercase //sys name and wrap
 10// it in our own nicer implementation, either here or in
 11// syscall_bsd.go or syscall_unix.go.
 12
 13package unix
 14
 15import (
 16	"fmt"
 17	"syscall"
 18	"unsafe"
 19)
 20
 21//sys	closedir(dir uintptr) (err error)
 22//sys	readdir_r(dir uintptr, entry *Dirent, result **Dirent) (res Errno)
 23
 24func fdopendir(fd int) (dir uintptr, err error) {
 25	r0, _, e1 := syscall_syscallPtr(libc_fdopendir_trampoline_addr, uintptr(fd), 0, 0)
 26	dir = uintptr(r0)
 27	if e1 != 0 {
 28		err = errnoErr(e1)
 29	}
 30	return
 31}
 32
 33var libc_fdopendir_trampoline_addr uintptr
 34
 35//go:cgo_import_dynamic libc_fdopendir fdopendir "/usr/lib/libSystem.B.dylib"
 36
 37func Getdirentries(fd int, buf []byte, basep *uintptr) (n int, err error) {
 38	// Simulate Getdirentries using fdopendir/readdir_r/closedir.
 39	// We store the number of entries to skip in the seek
 40	// offset of fd. See issue #31368.
 41	// It's not the full required semantics, but should handle the case
 42	// of calling Getdirentries or ReadDirent repeatedly.
 43	// It won't handle assigning the results of lseek to *basep, or handle
 44	// the directory being edited underfoot.
 45	skip, err := Seek(fd, 0, 1 /* SEEK_CUR */)
 46	if err != nil {
 47		return 0, err
 48	}
 49
 50	// We need to duplicate the incoming file descriptor
 51	// because the caller expects to retain control of it, but
 52	// fdopendir expects to take control of its argument.
 53	// Just Dup'ing the file descriptor is not enough, as the
 54	// result shares underlying state. Use Openat to make a really
 55	// new file descriptor referring to the same directory.
 56	fd2, err := Openat(fd, ".", O_RDONLY, 0)
 57	if err != nil {
 58		return 0, err
 59	}
 60	d, err := fdopendir(fd2)
 61	if err != nil {
 62		Close(fd2)
 63		return 0, err
 64	}
 65	defer closedir(d)
 66
 67	var cnt int64
 68	for {
 69		var entry Dirent
 70		var entryp *Dirent
 71		e := readdir_r(d, &entry, &entryp)
 72		if e != 0 {
 73			return n, errnoErr(e)
 74		}
 75		if entryp == nil {
 76			break
 77		}
 78		if skip > 0 {
 79			skip--
 80			cnt++
 81			continue
 82		}
 83
 84		reclen := int(entry.Reclen)
 85		if reclen > len(buf) {
 86			// Not enough room. Return for now.
 87			// The counter will let us know where we should start up again.
 88			// Note: this strategy for suspending in the middle and
 89			// restarting is O(n^2) in the length of the directory. Oh well.
 90			break
 91		}
 92
 93		// Copy entry into return buffer.
 94		s := unsafe.Slice((*byte)(unsafe.Pointer(&entry)), reclen)
 95		copy(buf, s)
 96
 97		buf = buf[reclen:]
 98		n += reclen
 99		cnt++
100	}
101	// Set the seek offset of the input fd to record
102	// how many files we've already returned.
103	_, err = Seek(fd, cnt, 0 /* SEEK_SET */)
104	if err != nil {
105		return n, err
106	}
107
108	return n, nil
109}
110
111// SockaddrDatalink implements the Sockaddr interface for AF_LINK type sockets.
112type SockaddrDatalink struct {
113	Len    uint8
114	Family uint8
115	Index  uint16
116	Type   uint8
117	Nlen   uint8
118	Alen   uint8
119	Slen   uint8
120	Data   [12]int8
121	raw    RawSockaddrDatalink
122}
123
124// SockaddrCtl implements the Sockaddr interface for AF_SYSTEM type sockets.
125type SockaddrCtl struct {
126	ID   uint32
127	Unit uint32
128	raw  RawSockaddrCtl
129}
130
131func (sa *SockaddrCtl) sockaddr() (unsafe.Pointer, _Socklen, error) {
132	sa.raw.Sc_len = SizeofSockaddrCtl
133	sa.raw.Sc_family = AF_SYSTEM
134	sa.raw.Ss_sysaddr = AF_SYS_CONTROL
135	sa.raw.Sc_id = sa.ID
136	sa.raw.Sc_unit = sa.Unit
137	return unsafe.Pointer(&sa.raw), SizeofSockaddrCtl, nil
138}
139
140// SockaddrVM implements the Sockaddr interface for AF_VSOCK type sockets.
141// SockaddrVM provides access to Darwin VM sockets: a mechanism that enables
142// bidirectional communication between a hypervisor and its guest virtual
143// machines.
144type SockaddrVM struct {
145	// CID and Port specify a context ID and port address for a VM socket.
146	// Guests have a unique CID, and hosts may have a well-known CID of:
147	//  - VMADDR_CID_HYPERVISOR: refers to the hypervisor process.
148	//  - VMADDR_CID_LOCAL: refers to local communication (loopback).
149	//  - VMADDR_CID_HOST: refers to other processes on the host.
150	CID  uint32
151	Port uint32
152	raw  RawSockaddrVM
153}
154
155func (sa *SockaddrVM) sockaddr() (unsafe.Pointer, _Socklen, error) {
156	sa.raw.Len = SizeofSockaddrVM
157	sa.raw.Family = AF_VSOCK
158	sa.raw.Port = sa.Port
159	sa.raw.Cid = sa.CID
160
161	return unsafe.Pointer(&sa.raw), SizeofSockaddrVM, nil
162}
163
164func anyToSockaddrGOOS(fd int, rsa *RawSockaddrAny) (Sockaddr, error) {
165	switch rsa.Addr.Family {
166	case AF_SYSTEM:
167		pp := (*RawSockaddrCtl)(unsafe.Pointer(rsa))
168		if pp.Ss_sysaddr == AF_SYS_CONTROL {
169			sa := new(SockaddrCtl)
170			sa.ID = pp.Sc_id
171			sa.Unit = pp.Sc_unit
172			return sa, nil
173		}
174	case AF_VSOCK:
175		pp := (*RawSockaddrVM)(unsafe.Pointer(rsa))
176		sa := &SockaddrVM{
177			CID:  pp.Cid,
178			Port: pp.Port,
179		}
180		return sa, nil
181	}
182	return nil, EAFNOSUPPORT
183}
184
185// Some external packages rely on SYS___SYSCTL being defined to implement their
186// own sysctl wrappers. Provide it here, even though direct syscalls are no
187// longer supported on darwin.
188const SYS___SYSCTL = SYS_SYSCTL
189
190// Translate "kern.hostname" to []_C_int{0,1,2,3}.
191func nametomib(name string) (mib []_C_int, err error) {
192	const siz = unsafe.Sizeof(mib[0])
193
194	// NOTE(rsc): It seems strange to set the buffer to have
195	// size CTL_MAXNAME+2 but use only CTL_MAXNAME
196	// as the size. I don't know why the +2 is here, but the
197	// kernel uses +2 for its own implementation of this function.
198	// I am scared that if we don't include the +2 here, the kernel
199	// will silently write 2 words farther than we specify
200	// and we'll get memory corruption.
201	var buf [CTL_MAXNAME + 2]_C_int
202	n := uintptr(CTL_MAXNAME) * siz
203
204	p := (*byte)(unsafe.Pointer(&buf[0]))
205	bytes, err := ByteSliceFromString(name)
206	if err != nil {
207		return nil, err
208	}
209
210	// Magic sysctl: "setting" 0.3 to a string name
211	// lets you read back the array of integers form.
212	if err = sysctl([]_C_int{0, 3}, p, &n, &bytes[0], uintptr(len(name))); err != nil {
213		return nil, err
214	}
215	return buf[0 : n/siz], nil
216}
217
218func direntIno(buf []byte) (uint64, bool) {
219	return readInt(buf, unsafe.Offsetof(Dirent{}.Ino), unsafe.Sizeof(Dirent{}.Ino))
220}
221
222func direntReclen(buf []byte) (uint64, bool) {
223	return readInt(buf, unsafe.Offsetof(Dirent{}.Reclen), unsafe.Sizeof(Dirent{}.Reclen))
224}
225
226func direntNamlen(buf []byte) (uint64, bool) {
227	return readInt(buf, unsafe.Offsetof(Dirent{}.Namlen), unsafe.Sizeof(Dirent{}.Namlen))
228}
229
230func PtraceAttach(pid int) (err error) { return ptrace(PT_ATTACH, pid, 0, 0) }
231func PtraceDetach(pid int) (err error) { return ptrace(PT_DETACH, pid, 0, 0) }
232func PtraceDenyAttach() (err error)    { return ptrace(PT_DENY_ATTACH, 0, 0, 0) }
233
234//sysnb	pipe(p *[2]int32) (err error)
235
236func Pipe(p []int) (err error) {
237	if len(p) != 2 {
238		return EINVAL
239	}
240	var x [2]int32
241	err = pipe(&x)
242	if err == nil {
243		p[0] = int(x[0])
244		p[1] = int(x[1])
245	}
246	return
247}
248
249func Getfsstat(buf []Statfs_t, flags int) (n int, err error) {
250	var _p0 unsafe.Pointer
251	var bufsize uintptr
252	if len(buf) > 0 {
253		_p0 = unsafe.Pointer(&buf[0])
254		bufsize = unsafe.Sizeof(Statfs_t{}) * uintptr(len(buf))
255	}
256	return getfsstat(_p0, bufsize, flags)
257}
258
259func xattrPointer(dest []byte) *byte {
260	// It's only when dest is set to NULL that the OS X implementations of
261	// getxattr() and listxattr() return the current sizes of the named attributes.
262	// An empty byte array is not sufficient. To maintain the same behaviour as the
263	// linux implementation, we wrap around the system calls and pass in NULL when
264	// dest is empty.
265	var destp *byte
266	if len(dest) > 0 {
267		destp = &dest[0]
268	}
269	return destp
270}
271
272//sys	getxattr(path string, attr string, dest *byte, size int, position uint32, options int) (sz int, err error)
273
274func Getxattr(path string, attr string, dest []byte) (sz int, err error) {
275	return getxattr(path, attr, xattrPointer(dest), len(dest), 0, 0)
276}
277
278func Lgetxattr(link string, attr string, dest []byte) (sz int, err error) {
279	return getxattr(link, attr, xattrPointer(dest), len(dest), 0, XATTR_NOFOLLOW)
280}
281
282//sys	fgetxattr(fd int, attr string, dest *byte, size int, position uint32, options int) (sz int, err error)
283
284func Fgetxattr(fd int, attr string, dest []byte) (sz int, err error) {
285	return fgetxattr(fd, attr, xattrPointer(dest), len(dest), 0, 0)
286}
287
288//sys	setxattr(path string, attr string, data *byte, size int, position uint32, options int) (err error)
289
290func Setxattr(path string, attr string, data []byte, flags int) (err error) {
291	// The parameters for the OS X implementation vary slightly compared to the
292	// linux system call, specifically the position parameter:
293	//
294	//  linux:
295	//      int setxattr(
296	//          const char *path,
297	//          const char *name,
298	//          const void *value,
299	//          size_t size,
300	//          int flags
301	//      );
302	//
303	//  darwin:
304	//      int setxattr(
305	//          const char *path,
306	//          const char *name,
307	//          void *value,
308	//          size_t size,
309	//          u_int32_t position,
310	//          int options
311	//      );
312	//
313	// position specifies the offset within the extended attribute. In the
314	// current implementation, only the resource fork extended attribute makes
315	// use of this argument. For all others, position is reserved. We simply
316	// default to setting it to zero.
317	return setxattr(path, attr, xattrPointer(data), len(data), 0, flags)
318}
319
320func Lsetxattr(link string, attr string, data []byte, flags int) (err error) {
321	return setxattr(link, attr, xattrPointer(data), len(data), 0, flags|XATTR_NOFOLLOW)
322}
323
324//sys	fsetxattr(fd int, attr string, data *byte, size int, position uint32, options int) (err error)
325
326func Fsetxattr(fd int, attr string, data []byte, flags int) (err error) {
327	return fsetxattr(fd, attr, xattrPointer(data), len(data), 0, 0)
328}
329
330//sys	removexattr(path string, attr string, options int) (err error)
331
332func Removexattr(path string, attr string) (err error) {
333	// We wrap around and explicitly zero out the options provided to the OS X
334	// implementation of removexattr, we do so for interoperability with the
335	// linux variant.
336	return removexattr(path, attr, 0)
337}
338
339func Lremovexattr(link string, attr string) (err error) {
340	return removexattr(link, attr, XATTR_NOFOLLOW)
341}
342
343//sys	fremovexattr(fd int, attr string, options int) (err error)
344
345func Fremovexattr(fd int, attr string) (err error) {
346	return fremovexattr(fd, attr, 0)
347}
348
349//sys	listxattr(path string, dest *byte, size int, options int) (sz int, err error)
350
351func Listxattr(path string, dest []byte) (sz int, err error) {
352	return listxattr(path, xattrPointer(dest), len(dest), 0)
353}
354
355func Llistxattr(link string, dest []byte) (sz int, err error) {
356	return listxattr(link, xattrPointer(dest), len(dest), XATTR_NOFOLLOW)
357}
358
359//sys	flistxattr(fd int, dest *byte, size int, options int) (sz int, err error)
360
361func Flistxattr(fd int, dest []byte) (sz int, err error) {
362	return flistxattr(fd, xattrPointer(dest), len(dest), 0)
363}
364
365//sys	utimensat(dirfd int, path string, times *[2]Timespec, flags int) (err error)
366
367/*
368 * Wrapped
369 */
370
371//sys	fcntl(fd int, cmd int, arg int) (val int, err error)
372
373//sys	kill(pid int, signum int, posix int) (err error)
374
375func Kill(pid int, signum syscall.Signal) (err error) { return kill(pid, int(signum), 1) }
376
377//sys	ioctl(fd int, req uint, arg uintptr) (err error)
378//sys	ioctlPtr(fd int, req uint, arg unsafe.Pointer) (err error) = SYS_IOCTL
379
380func IoctlCtlInfo(fd int, ctlInfo *CtlInfo) error {
381	return ioctlPtr(fd, CTLIOCGINFO, unsafe.Pointer(ctlInfo))
382}
383
384// IfreqMTU is struct ifreq used to get or set a network device's MTU.
385type IfreqMTU struct {
386	Name [IFNAMSIZ]byte
387	MTU  int32
388}
389
390// IoctlGetIfreqMTU performs the SIOCGIFMTU ioctl operation on fd to get the MTU
391// of the network device specified by ifname.
392func IoctlGetIfreqMTU(fd int, ifname string) (*IfreqMTU, error) {
393	var ifreq IfreqMTU
394	copy(ifreq.Name[:], ifname)
395	err := ioctlPtr(fd, SIOCGIFMTU, unsafe.Pointer(&ifreq))
396	return &ifreq, err
397}
398
399// IoctlSetIfreqMTU performs the SIOCSIFMTU ioctl operation on fd to set the MTU
400// of the network device specified by ifreq.Name.
401func IoctlSetIfreqMTU(fd int, ifreq *IfreqMTU) error {
402	return ioctlPtr(fd, SIOCSIFMTU, unsafe.Pointer(ifreq))
403}
404
405//sys	sysctl(mib []_C_int, old *byte, oldlen *uintptr, new *byte, newlen uintptr) (err error) = SYS_SYSCTL
406
407func Uname(uname *Utsname) error {
408	mib := []_C_int{CTL_KERN, KERN_OSTYPE}
409	n := unsafe.Sizeof(uname.Sysname)
410	if err := sysctl(mib, &uname.Sysname[0], &n, nil, 0); err != nil {
411		return err
412	}
413
414	mib = []_C_int{CTL_KERN, KERN_HOSTNAME}
415	n = unsafe.Sizeof(uname.Nodename)
416	if err := sysctl(mib, &uname.Nodename[0], &n, nil, 0); err != nil {
417		return err
418	}
419
420	mib = []_C_int{CTL_KERN, KERN_OSRELEASE}
421	n = unsafe.Sizeof(uname.Release)
422	if err := sysctl(mib, &uname.Release[0], &n, nil, 0); err != nil {
423		return err
424	}
425
426	mib = []_C_int{CTL_KERN, KERN_VERSION}
427	n = unsafe.Sizeof(uname.Version)
428	if err := sysctl(mib, &uname.Version[0], &n, nil, 0); err != nil {
429		return err
430	}
431
432	// The version might have newlines or tabs in it, convert them to
433	// spaces.
434	for i, b := range uname.Version {
435		if b == '\n' || b == '\t' {
436			if i == len(uname.Version)-1 {
437				uname.Version[i] = 0
438			} else {
439				uname.Version[i] = ' '
440			}
441		}
442	}
443
444	mib = []_C_int{CTL_HW, HW_MACHINE}
445	n = unsafe.Sizeof(uname.Machine)
446	if err := sysctl(mib, &uname.Machine[0], &n, nil, 0); err != nil {
447		return err
448	}
449
450	return nil
451}
452
453func Sendfile(outfd int, infd int, offset *int64, count int) (written int, err error) {
454	if raceenabled {
455		raceReleaseMerge(unsafe.Pointer(&ioSync))
456	}
457	var length = int64(count)
458	err = sendfile(infd, outfd, *offset, &length, nil, 0)
459	written = int(length)
460	return
461}
462
463func GetsockoptIPMreqn(fd, level, opt int) (*IPMreqn, error) {
464	var value IPMreqn
465	vallen := _Socklen(SizeofIPMreqn)
466	errno := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
467	return &value, errno
468}
469
470func SetsockoptIPMreqn(fd, level, opt int, mreq *IPMreqn) (err error) {
471	return setsockopt(fd, level, opt, unsafe.Pointer(mreq), unsafe.Sizeof(*mreq))
472}
473
474// GetsockoptXucred is a getsockopt wrapper that returns an Xucred struct.
475// The usual level and opt are SOL_LOCAL and LOCAL_PEERCRED, respectively.
476func GetsockoptXucred(fd, level, opt int) (*Xucred, error) {
477	x := new(Xucred)
478	vallen := _Socklen(SizeofXucred)
479	err := getsockopt(fd, level, opt, unsafe.Pointer(x), &vallen)
480	return x, err
481}
482
483func GetsockoptTCPConnectionInfo(fd, level, opt int) (*TCPConnectionInfo, error) {
484	var value TCPConnectionInfo
485	vallen := _Socklen(SizeofTCPConnectionInfo)
486	err := getsockopt(fd, level, opt, unsafe.Pointer(&value), &vallen)
487	return &value, err
488}
489
490func SysctlKinfoProc(name string, args ...int) (*KinfoProc, error) {
491	mib, err := sysctlmib(name, args...)
492	if err != nil {
493		return nil, err
494	}
495
496	var kinfo KinfoProc
497	n := uintptr(SizeofKinfoProc)
498	if err := sysctl(mib, (*byte)(unsafe.Pointer(&kinfo)), &n, nil, 0); err != nil {
499		return nil, err
500	}
501	if n != SizeofKinfoProc {
502		return nil, EIO
503	}
504	return &kinfo, nil
505}
506
507func SysctlKinfoProcSlice(name string, args ...int) ([]KinfoProc, error) {
508	mib, err := sysctlmib(name, args...)
509	if err != nil {
510		return nil, err
511	}
512
513	// Find size.
514	n := uintptr(0)
515	if err := sysctl(mib, nil, &n, nil, 0); err != nil {
516		return nil, err
517	}
518	if n == 0 {
519		return nil, nil
520	}
521	if n%SizeofKinfoProc != 0 {
522		return nil, fmt.Errorf("sysctl() returned a size of %d, which is not a multiple of %d", n, SizeofKinfoProc)
523	}
524
525	// Read into buffer of that size.
526	buf := make([]KinfoProc, n/SizeofKinfoProc)
527	if err := sysctl(mib, (*byte)(unsafe.Pointer(&buf[0])), &n, nil, 0); err != nil {
528		return nil, err
529	}
530	if n%SizeofKinfoProc != 0 {
531		return nil, fmt.Errorf("sysctl() returned a size of %d, which is not a multiple of %d", n, SizeofKinfoProc)
532	}
533
534	// The actual call may return less than the original reported required
535	// size so ensure we deal with that.
536	return buf[:n/SizeofKinfoProc], nil
537}
538
539//sys	sendfile(infd int, outfd int, offset int64, len *int64, hdtr unsafe.Pointer, flags int) (err error)
540
541//sys	shmat(id int, addr uintptr, flag int) (ret uintptr, err error)
542//sys	shmctl(id int, cmd int, buf *SysvShmDesc) (result int, err error)
543//sys	shmdt(addr uintptr) (err error)
544//sys	shmget(key int, size int, flag int) (id int, err error)
545
546/*
547 * Exposed directly
548 */
549//sys	Access(path string, mode uint32) (err error)
550//sys	Adjtime(delta *Timeval, olddelta *Timeval) (err error)
551//sys	Chdir(path string) (err error)
552//sys	Chflags(path string, flags int) (err error)
553//sys	Chmod(path string, mode uint32) (err error)
554//sys	Chown(path string, uid int, gid int) (err error)
555//sys	Chroot(path string) (err error)
556//sys	ClockGettime(clockid int32, time *Timespec) (err error)
557//sys	Close(fd int) (err error)
558//sys	Clonefile(src string, dst string, flags int) (err error)
559//sys	Clonefileat(srcDirfd int, src string, dstDirfd int, dst string, flags int) (err error)
560//sys	Dup(fd int) (nfd int, err error)
561//sys	Dup2(from int, to int) (err error)
562//sys	Exchangedata(path1 string, path2 string, options int) (err error)
563//sys	Exit(code int)
564//sys	Faccessat(dirfd int, path string, mode uint32, flags int) (err error)
565//sys	Fchdir(fd int) (err error)
566//sys	Fchflags(fd int, flags int) (err error)
567//sys	Fchmod(fd int, mode uint32) (err error)
568//sys	Fchmodat(dirfd int, path string, mode uint32, flags int) (err error)
569//sys	Fchown(fd int, uid int, gid int) (err error)
570//sys	Fchownat(dirfd int, path string, uid int, gid int, flags int) (err error)
571//sys	Fclonefileat(srcDirfd int, dstDirfd int, dst string, flags int) (err error)
572//sys	Flock(fd int, how int) (err error)
573//sys	Fpathconf(fd int, name int) (val int, err error)
574//sys	Fsync(fd int) (err error)
575//sys	Ftruncate(fd int, length int64) (err error)
576//sys	Getcwd(buf []byte) (n int, err error)
577//sys	Getdtablesize() (size int)
578//sysnb	Getegid() (egid int)
579//sysnb	Geteuid() (uid int)
580//sysnb	Getgid() (gid int)
581//sysnb	Getpgid(pid int) (pgid int, err error)
582//sysnb	Getpgrp() (pgrp int)
583//sysnb	Getpid() (pid int)
584//sysnb	Getppid() (ppid int)
585//sys	Getpriority(which int, who int) (prio int, err error)
586//sysnb	Getrlimit(which int, lim *Rlimit) (err error)
587//sysnb	Getrusage(who int, rusage *Rusage) (err error)
588//sysnb	Getsid(pid int) (sid int, err error)
589//sysnb	Gettimeofday(tp *Timeval) (err error)
590//sysnb	Getuid() (uid int)
591//sysnb	Issetugid() (tainted bool)
592//sys	Kqueue() (fd int, err error)
593//sys	Lchown(path string, uid int, gid int) (err error)
594//sys	Link(path string, link string) (err error)
595//sys	Linkat(pathfd int, path string, linkfd int, link string, flags int) (err error)
596//sys	Listen(s int, backlog int) (err error)
597//sys	Mkdir(path string, mode uint32) (err error)
598//sys	Mkdirat(dirfd int, path string, mode uint32) (err error)
599//sys	Mkfifo(path string, mode uint32) (err error)
600//sys	Mknod(path string, mode uint32, dev int) (err error)
601//sys	Mount(fsType string, dir string, flags int, data unsafe.Pointer) (err error)
602//sys	Open(path string, mode int, perm uint32) (fd int, err error)
603//sys	Openat(dirfd int, path string, mode int, perm uint32) (fd int, err error)
604//sys	Pathconf(path string, name int) (val int, err error)
605//sys	pread(fd int, p []byte, offset int64) (n int, err error)
606//sys	pwrite(fd int, p []byte, offset int64) (n int, err error)
607//sys	read(fd int, p []byte) (n int, err error)
608//sys	Readlink(path string, buf []byte) (n int, err error)
609//sys	Readlinkat(dirfd int, path string, buf []byte) (n int, err error)
610//sys	Rename(from string, to string) (err error)
611//sys	Renameat(fromfd int, from string, tofd int, to string) (err error)
612//sys	Revoke(path string) (err error)
613//sys	Rmdir(path string) (err error)
614//sys	Seek(fd int, offset int64, whence int) (newoffset int64, err error) = SYS_LSEEK
615//sys	Select(nfd int, r *FdSet, w *FdSet, e *FdSet, timeout *Timeval) (n int, err error)
616//sys	Setattrlist(path string, attrlist *Attrlist, attrBuf []byte, options int) (err error)
617//sys	Setegid(egid int) (err error)
618//sysnb	Seteuid(euid int) (err error)
619//sysnb	Setgid(gid int) (err error)
620//sys	Setlogin(name string) (err error)
621//sysnb	Setpgid(pid int, pgid int) (err error)
622//sys	Setpriority(which int, who int, prio int) (err error)
623//sys	Setprivexec(flag int) (err error)
624//sysnb	Setregid(rgid int, egid int) (err error)
625//sysnb	Setreuid(ruid int, euid int) (err error)
626//sysnb	Setsid() (pid int, err error)
627//sysnb	Settimeofday(tp *Timeval) (err error)
628//sysnb	Setuid(uid int) (err error)
629//sys	Symlink(path string, link string) (err error)
630//sys	Symlinkat(oldpath string, newdirfd int, newpath string) (err error)
631//sys	Sync() (err error)
632//sys	Truncate(path string, length int64) (err error)
633//sys	Umask(newmask int) (oldmask int)
634//sys	Undelete(path string) (err error)
635//sys	Unlink(path string) (err error)
636//sys	Unlinkat(dirfd int, path string, flags int) (err error)
637//sys	Unmount(path string, flags int) (err error)
638//sys	write(fd int, p []byte) (n int, err error)
639//sys	mmap(addr uintptr, length uintptr, prot int, flag int, fd int, pos int64) (ret uintptr, err error)
640//sys	munmap(addr uintptr, length uintptr) (err error)
641//sys	readlen(fd int, buf *byte, nbuf int) (n int, err error) = SYS_READ
642//sys	writelen(fd int, buf *byte, nbuf int) (n int, err error) = SYS_WRITE
643
644/*
645 * Unimplemented
646 */
647// Profil
648// Sigaction
649// Sigprocmask
650// Getlogin
651// Sigpending
652// Sigaltstack
653// Ioctl
654// Reboot
655// Execve
656// Vfork
657// Sbrk
658// Sstk
659// Ovadvise
660// Mincore
661// Setitimer
662// Swapon
663// Select
664// Sigsuspend
665// Readv
666// Writev
667// Nfssvc
668// Getfh
669// Quotactl
670// Csops
671// Waitid
672// Add_profil
673// Kdebug_trace
674// Sigreturn
675// Atsocket
676// Kqueue_from_portset_np
677// Kqueue_portset
678// Getattrlist
679// Getdirentriesattr
680// Searchfs
681// Delete
682// Copyfile
683// Watchevent
684// Waitevent
685// Modwatch
686// Fsctl
687// Initgroups
688// Posix_spawn
689// Nfsclnt
690// Fhopen
691// Minherit
692// Semsys
693// Msgsys
694// Shmsys
695// Semctl
696// Semget
697// Semop
698// Msgctl
699// Msgget
700// Msgsnd
701// Msgrcv
702// Shm_open
703// Shm_unlink
704// Sem_open
705// Sem_close
706// Sem_unlink
707// Sem_wait
708// Sem_trywait
709// Sem_post
710// Sem_getvalue
711// Sem_init
712// Sem_destroy
713// Open_extended
714// Umask_extended
715// Stat_extended
716// Lstat_extended
717// Fstat_extended
718// Chmod_extended
719// Fchmod_extended
720// Access_extended
721// Settid
722// Gettid
723// Setsgroups
724// Getsgroups
725// Setwgroups
726// Getwgroups
727// Mkfifo_extended
728// Mkdir_extended
729// Identitysvc
730// Shared_region_check_np
731// Shared_region_map_np
732// __pthread_mutex_destroy
733// __pthread_mutex_init
734// __pthread_mutex_lock
735// __pthread_mutex_trylock
736// __pthread_mutex_unlock
737// __pthread_cond_init
738// __pthread_cond_destroy
739// __pthread_cond_broadcast
740// __pthread_cond_signal
741// Setsid_with_pid
742// __pthread_cond_timedwait
743// Aio_fsync
744// Aio_return
745// Aio_suspend
746// Aio_cancel
747// Aio_error
748// Aio_read
749// Aio_write
750// Lio_listio
751// __pthread_cond_wait
752// Iopolicysys
753// __pthread_kill
754// __pthread_sigmask
755// __sigwait
756// __disable_threadsignal
757// __pthread_markcancel
758// __pthread_canceled
759// __semwait_signal
760// Proc_info
761// sendfile
762// Stat64_extended
763// Lstat64_extended
764// Fstat64_extended
765// __pthread_chdir
766// __pthread_fchdir
767// Audit
768// Auditon
769// Getauid
770// Setauid
771// Getaudit
772// Setaudit
773// Getaudit_addr
774// Setaudit_addr
775// Auditctl
776// Bsdthread_create
777// Bsdthread_terminate
778// Stack_snapshot
779// Bsdthread_register
780// Workq_open
781// Workq_ops
782// __mac_execve
783// __mac_syscall
784// __mac_get_file
785// __mac_set_file
786// __mac_get_link
787// __mac_set_link
788// __mac_get_proc
789// __mac_set_proc
790// __mac_get_fd
791// __mac_set_fd
792// __mac_get_pid
793// __mac_get_lcid
794// __mac_get_lctx
795// __mac_set_lctx
796// Setlcid
797// Read_nocancel
798// Write_nocancel
799// Open_nocancel
800// Close_nocancel
801// Wait4_nocancel
802// Recvmsg_nocancel
803// Sendmsg_nocancel
804// Recvfrom_nocancel
805// Accept_nocancel
806// Fcntl_nocancel
807// Select_nocancel
808// Fsync_nocancel
809// Connect_nocancel
810// Sigsuspend_nocancel
811// Readv_nocancel
812// Writev_nocancel
813// Sendto_nocancel
814// Pread_nocancel
815// Pwrite_nocancel
816// Waitid_nocancel
817// Poll_nocancel
818// Msgsnd_nocancel
819// Msgrcv_nocancel
820// Sem_wait_nocancel
821// Aio_suspend_nocancel
822// __sigwait_nocancel
823// __semwait_signal_nocancel
824// __mac_mount
825// __mac_get_mount
826// __mac_getfsstat