1// Copyright 2016 The Go Authors. All rights reserved.
  2// Use of this source code is governed by a BSD-style
  3// license that can be found in the LICENSE file.
  4
  5//go:build s390x && linux
  6// +build s390x,linux
  7
  8package unix
  9
 10import (
 11	"unsafe"
 12)
 13
 14//sys	EpollWait(epfd int, events []EpollEvent, msec int) (n int, err error)
 15//sys	Fadvise(fd int, offset int64, length int64, advice int) (err error) = SYS_FADVISE64
 16//sys	Fchown(fd int, uid int, gid int) (err error)
 17//sys	Fstat(fd int, stat *Stat_t) (err error)
 18//sys	Fstatat(dirfd int, path string, stat *Stat_t, flags int) (err error) = SYS_NEWFSTATAT
 19//sys	Fstatfs(fd int, buf *Statfs_t) (err error)
 20//sys	Ftruncate(fd int, length int64) (err error)
 21//sysnb	Getegid() (egid int)
 22//sysnb	Geteuid() (euid int)
 23//sysnb	Getgid() (gid int)
 24//sysnb	Getrlimit(resource int, rlim *Rlimit) (err error)
 25//sysnb	Getuid() (uid int)
 26//sys	Lchown(path string, uid int, gid int) (err error)
 27//sys	Lstat(path string, stat *Stat_t) (err error)
 28//sys	Pause() (err error)
 29//sys	pread(fd int, p []byte, offset int64) (n int, err error) = SYS_PREAD64
 30//sys	pwrite(fd int, p []byte, offset int64) (n int, err error) = SYS_PWRITE64
 31//sys	Renameat(olddirfd int, oldpath string, newdirfd int, newpath string) (err error)
 32//sys	Seek(fd int, offset int64, whence int) (off int64, err error) = SYS_LSEEK
 33//sys	Select(nfd int, r *FdSet, w *FdSet, e *FdSet, timeout *Timeval) (n int, err error)
 34//sys	sendfile(outfd int, infd int, offset *int64, count int) (written int, err error)
 35//sys	setfsgid(gid int) (prev int, err error)
 36//sys	setfsuid(uid int) (prev int, err error)
 37//sys	Splice(rfd int, roff *int64, wfd int, woff *int64, len int, flags int) (n int64, err error)
 38//sys	Stat(path string, stat *Stat_t) (err error)
 39//sys	Statfs(path string, buf *Statfs_t) (err error)
 40//sys	SyncFileRange(fd int, off int64, n int64, flags int) (err error)
 41//sys	Truncate(path string, length int64) (err error)
 42//sys	Ustat(dev int, ubuf *Ustat_t) (err error)
 43//sysnb	getgroups(n int, list *_Gid_t) (nn int, err error)
 44//sysnb	setgroups(n int, list *_Gid_t) (err error)
 45
 46//sys	futimesat(dirfd int, path string, times *[2]Timeval) (err error)
 47//sysnb	Gettimeofday(tv *Timeval) (err error)
 48
 49func Time(t *Time_t) (tt Time_t, err error) {
 50	var tv Timeval
 51	err = Gettimeofday(&tv)
 52	if err != nil {
 53		return 0, err
 54	}
 55	if t != nil {
 56		*t = Time_t(tv.Sec)
 57	}
 58	return Time_t(tv.Sec), nil
 59}
 60
 61//sys	Utime(path string, buf *Utimbuf) (err error)
 62//sys	utimes(path string, times *[2]Timeval) (err error)
 63
 64func setTimespec(sec, nsec int64) Timespec {
 65	return Timespec{Sec: sec, Nsec: nsec}
 66}
 67
 68func setTimeval(sec, usec int64) Timeval {
 69	return Timeval{Sec: sec, Usec: usec}
 70}
 71
 72func Ioperm(from int, num int, on int) (err error) {
 73	return ENOSYS
 74}
 75
 76func Iopl(level int) (err error) {
 77	return ENOSYS
 78}
 79
 80func (r *PtraceRegs) PC() uint64 { return r.Psw.Addr }
 81
 82func (r *PtraceRegs) SetPC(pc uint64) { r.Psw.Addr = pc }
 83
 84func (iov *Iovec) SetLen(length int) {
 85	iov.Len = uint64(length)
 86}
 87
 88func (msghdr *Msghdr) SetControllen(length int) {
 89	msghdr.Controllen = uint64(length)
 90}
 91
 92func (msghdr *Msghdr) SetIovlen(length int) {
 93	msghdr.Iovlen = uint64(length)
 94}
 95
 96func (cmsg *Cmsghdr) SetLen(length int) {
 97	cmsg.Len = uint64(length)
 98}
 99
100func (rsa *RawSockaddrNFCLLCP) SetServiceNameLen(length int) {
101	rsa.Service_name_len = uint64(length)
102}
103
104// Linux on s390x uses the old mmap interface, which requires arguments to be passed in a struct.
105// mmap2 also requires arguments to be passed in a struct; it is currently not exposed in <asm/unistd.h>.
106func mmap(addr uintptr, length uintptr, prot int, flags int, fd int, offset int64) (xaddr uintptr, err error) {
107	mmap_args := [6]uintptr{addr, length, uintptr(prot), uintptr(flags), uintptr(fd), uintptr(offset)}
108	r0, _, e1 := Syscall(SYS_MMAP, uintptr(unsafe.Pointer(&mmap_args[0])), 0, 0)
109	xaddr = uintptr(r0)
110	if e1 != 0 {
111		err = errnoErr(e1)
112	}
113	return
114}
115
116// On s390x Linux, all the socket calls go through an extra indirection.
117// The arguments to the underlying system call (SYS_SOCKETCALL) are the
118// number below and a pointer to an array of uintptr.
119const (
120	// see linux/net.h
121	netSocket      = 1
122	netBind        = 2
123	netConnect     = 3
124	netListen      = 4
125	netAccept      = 5
126	netGetSockName = 6
127	netGetPeerName = 7
128	netSocketPair  = 8
129	netSend        = 9
130	netRecv        = 10
131	netSendTo      = 11
132	netRecvFrom    = 12
133	netShutdown    = 13
134	netSetSockOpt  = 14
135	netGetSockOpt  = 15
136	netSendMsg     = 16
137	netRecvMsg     = 17
138	netAccept4     = 18
139	netRecvMMsg    = 19
140	netSendMMsg    = 20
141)
142
143func accept4(s int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (int, error) {
144	args := [4]uintptr{uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen)), uintptr(flags)}
145	fd, _, err := Syscall(SYS_SOCKETCALL, netAccept4, uintptr(unsafe.Pointer(&args)), 0)
146	if err != 0 {
147		return 0, err
148	}
149	return int(fd), nil
150}
151
152func getsockname(s int, rsa *RawSockaddrAny, addrlen *_Socklen) error {
153	args := [3]uintptr{uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))}
154	_, _, err := RawSyscall(SYS_SOCKETCALL, netGetSockName, uintptr(unsafe.Pointer(&args)), 0)
155	if err != 0 {
156		return err
157	}
158	return nil
159}
160
161func getpeername(s int, rsa *RawSockaddrAny, addrlen *_Socklen) error {
162	args := [3]uintptr{uintptr(s), uintptr(unsafe.Pointer(rsa)), uintptr(unsafe.Pointer(addrlen))}
163	_, _, err := RawSyscall(SYS_SOCKETCALL, netGetPeerName, uintptr(unsafe.Pointer(&args)), 0)
164	if err != 0 {
165		return err
166	}
167	return nil
168}
169
170func socketpair(domain int, typ int, flags int, fd *[2]int32) error {
171	args := [4]uintptr{uintptr(domain), uintptr(typ), uintptr(flags), uintptr(unsafe.Pointer(fd))}
172	_, _, err := RawSyscall(SYS_SOCKETCALL, netSocketPair, uintptr(unsafe.Pointer(&args)), 0)
173	if err != 0 {
174		return err
175	}
176	return nil
177}
178
179func bind(s int, addr unsafe.Pointer, addrlen _Socklen) error {
180	args := [3]uintptr{uintptr(s), uintptr(addr), uintptr(addrlen)}
181	_, _, err := Syscall(SYS_SOCKETCALL, netBind, uintptr(unsafe.Pointer(&args)), 0)
182	if err != 0 {
183		return err
184	}
185	return nil
186}
187
188func connect(s int, addr unsafe.Pointer, addrlen _Socklen) error {
189	args := [3]uintptr{uintptr(s), uintptr(addr), uintptr(addrlen)}
190	_, _, err := Syscall(SYS_SOCKETCALL, netConnect, uintptr(unsafe.Pointer(&args)), 0)
191	if err != 0 {
192		return err
193	}
194	return nil
195}
196
197func socket(domain int, typ int, proto int) (int, error) {
198	args := [3]uintptr{uintptr(domain), uintptr(typ), uintptr(proto)}
199	fd, _, err := RawSyscall(SYS_SOCKETCALL, netSocket, uintptr(unsafe.Pointer(&args)), 0)
200	if err != 0 {
201		return 0, err
202	}
203	return int(fd), nil
204}
205
206func getsockopt(s int, level int, name int, val unsafe.Pointer, vallen *_Socklen) error {
207	args := [5]uintptr{uintptr(s), uintptr(level), uintptr(name), uintptr(val), uintptr(unsafe.Pointer(vallen))}
208	_, _, err := Syscall(SYS_SOCKETCALL, netGetSockOpt, uintptr(unsafe.Pointer(&args)), 0)
209	if err != 0 {
210		return err
211	}
212	return nil
213}
214
215func setsockopt(s int, level int, name int, val unsafe.Pointer, vallen uintptr) error {
216	args := [5]uintptr{uintptr(s), uintptr(level), uintptr(name), uintptr(val), vallen}
217	_, _, err := Syscall(SYS_SOCKETCALL, netSetSockOpt, uintptr(unsafe.Pointer(&args)), 0)
218	if err != 0 {
219		return err
220	}
221	return nil
222}
223
224func recvfrom(s int, p []byte, flags int, from *RawSockaddrAny, fromlen *_Socklen) (int, error) {
225	var base uintptr
226	if len(p) > 0 {
227		base = uintptr(unsafe.Pointer(&p[0]))
228	}
229	args := [6]uintptr{uintptr(s), base, uintptr(len(p)), uintptr(flags), uintptr(unsafe.Pointer(from)), uintptr(unsafe.Pointer(fromlen))}
230	n, _, err := Syscall(SYS_SOCKETCALL, netRecvFrom, uintptr(unsafe.Pointer(&args)), 0)
231	if err != 0 {
232		return 0, err
233	}
234	return int(n), nil
235}
236
237func sendto(s int, p []byte, flags int, to unsafe.Pointer, addrlen _Socklen) error {
238	var base uintptr
239	if len(p) > 0 {
240		base = uintptr(unsafe.Pointer(&p[0]))
241	}
242	args := [6]uintptr{uintptr(s), base, uintptr(len(p)), uintptr(flags), uintptr(to), uintptr(addrlen)}
243	_, _, err := Syscall(SYS_SOCKETCALL, netSendTo, uintptr(unsafe.Pointer(&args)), 0)
244	if err != 0 {
245		return err
246	}
247	return nil
248}
249
250func recvmsg(s int, msg *Msghdr, flags int) (int, error) {
251	args := [3]uintptr{uintptr(s), uintptr(unsafe.Pointer(msg)), uintptr(flags)}
252	n, _, err := Syscall(SYS_SOCKETCALL, netRecvMsg, uintptr(unsafe.Pointer(&args)), 0)
253	if err != 0 {
254		return 0, err
255	}
256	return int(n), nil
257}
258
259func sendmsg(s int, msg *Msghdr, flags int) (int, error) {
260	args := [3]uintptr{uintptr(s), uintptr(unsafe.Pointer(msg)), uintptr(flags)}
261	n, _, err := Syscall(SYS_SOCKETCALL, netSendMsg, uintptr(unsafe.Pointer(&args)), 0)
262	if err != 0 {
263		return 0, err
264	}
265	return int(n), nil
266}
267
268func Listen(s int, n int) error {
269	args := [2]uintptr{uintptr(s), uintptr(n)}
270	_, _, err := Syscall(SYS_SOCKETCALL, netListen, uintptr(unsafe.Pointer(&args)), 0)
271	if err != 0 {
272		return err
273	}
274	return nil
275}
276
277func Shutdown(s, how int) error {
278	args := [2]uintptr{uintptr(s), uintptr(how)}
279	_, _, err := Syscall(SYS_SOCKETCALL, netShutdown, uintptr(unsafe.Pointer(&args)), 0)
280	if err != 0 {
281		return err
282	}
283	return nil
284}
285
286//sys	kexecFileLoad(kernelFd int, initrdFd int, cmdlineLen int, cmdline string, flags int) (err error)
287
288func KexecFileLoad(kernelFd int, initrdFd int, cmdline string, flags int) error {
289	cmdlineLen := len(cmdline)
290	if cmdlineLen > 0 {
291		// Account for the additional NULL byte added by
292		// BytePtrFromString in kexecFileLoad. The kexec_file_load
293		// syscall expects a NULL-terminated string.
294		cmdlineLen++
295	}
296	return kexecFileLoad(kernelFd, initrdFd, cmdlineLen, cmdline, flags)
297}