1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "nacl_io/kernel_intercept.h"
11 #include "nacl_io/kernel_proxy.h"
12 #include "nacl_io/kernel_wrap.h"
13 #include "nacl_io/kernel_wrap_real.h"
14 #include "nacl_io/log.h"
15 #include "nacl_io/osmman.h"
16 #include "nacl_io/ossocket.h"
17 #include "nacl_io/ostime.h"
18 #include "nacl_io/pepper_interface.h"
19 #include "nacl_io/real_pepper_interface.h"
21 using namespace nacl_io;
23 #define ON_NOSYS_RETURN(x) \
24 if (!ki_is_initialized()) { \
29 struct KernelInterceptState {
31 PepperInterface* ppapi;
35 static KernelInterceptState s_state;
37 // The the test code we want to be able to save the previous kernel
38 // proxy when intialising and restore it on uninit.
39 static KernelInterceptState s_saved_state;
41 int ki_push_state_for_testing() {
42 assert(s_saved_state.kp == NULL);
43 if (s_saved_state.kp != NULL)
45 s_saved_state = s_state;
48 s_state.kp_owned = false;
52 static void ki_pop_state() {
53 // Swap out the KernelProxy. This will normally reset the
54 // proxy to NULL, aside from in test code that has called
55 // ki_push_state_for_testing().
56 s_state = s_saved_state;
57 s_saved_state.kp = NULL;
58 s_saved_state.ppapi = NULL;
59 s_saved_state.kp_owned = false;
62 int ki_pop_state_for_testing() {
67 int ki_init(void* kp) {
68 LOG_TRACE("ki_init: %p", kp);
69 return ki_init_ppapi(kp, 0, NULL);
72 int ki_init_ppapi(void* kp,
74 PPB_GetInterface get_browser_interface) {
76 if (s_state.kp != NULL)
78 PepperInterface* ppapi = NULL;
79 if (instance && get_browser_interface) {
80 ppapi = new RealPepperInterface(instance, get_browser_interface);
81 s_state.ppapi = ppapi;
83 int rtn = ki_init_interface(kp, ppapi);
87 int ki_init_interface(void* kp, void* pepper_interface) {
88 LOG_TRACE("ki_init_interface: %p %p", kp, pepper_interface);
90 if (s_state.kp != NULL)
92 PepperInterface* ppapi = static_cast<PepperInterface*>(pepper_interface);
96 s_state.kp = new KernelProxy();
97 s_state.kp_owned = true;
99 s_state.kp = static_cast<KernelProxy*>(kp);
100 s_state.kp_owned = false;
103 if (s_state.kp->Init(ppapi) != 0)
109 int ki_is_initialized() {
110 return s_state.kp != NULL;
114 LOG_TRACE("ki_uninit");
116 if (s_state.kp == NULL)
119 if (s_saved_state.kp == NULL)
120 kernel_wrap_uninit();
122 // If we are going to delete the KernelProxy don't do it
123 // until we've swapped it out.
124 KernelInterceptState state_to_delete = s_state;
128 if (state_to_delete.kp_owned)
129 delete state_to_delete.kp;
131 delete state_to_delete.ppapi;
135 nacl_io::KernelProxy* ki_get_proxy() {
139 int ki_chdir(const char* path) {
141 return s_state.kp->chdir(path);
144 void ki_exit(int status) {
145 if (ki_is_initialized())
146 s_state.kp->exit(status);
151 char* ki_getcwd(char* buf, size_t size) {
152 // gtest uses getcwd in a static initializer and expects it to always
153 // succeed. If we haven't initialized kernel-intercept yet, then try
154 // the IRT's getcwd, and fall back to just returning ".".
155 if (!ki_is_initialized()) {
156 int rtn = _real_getcwd(buf, size);
168 return s_state.kp->getcwd(buf, size);
171 char* ki_getwd(char* buf) {
172 ON_NOSYS_RETURN(NULL);
173 return s_state.kp->getwd(buf);
176 int ki_dup(int oldfd) {
178 return s_state.kp->dup(oldfd);
181 int ki_dup2(int oldfd, int newfd) {
183 return s_state.kp->dup2(oldfd, newfd);
186 int ki_chmod(const char* path, mode_t mode) {
188 return s_state.kp->chmod(path, mode);
191 int ki_fchdir(int fd) {
193 return s_state.kp->fchdir(fd);
196 int ki_fchmod(int fd, mode_t mode) {
198 return s_state.kp->fchmod(fd, mode);
201 int ki_stat(const char* path, struct stat* buf) {
203 return s_state.kp->stat(path, buf);
206 int ki_mkdir(const char* path, mode_t mode) {
208 return s_state.kp->mkdir(path, mode);
211 int ki_rmdir(const char* path) {
213 return s_state.kp->rmdir(path);
216 int ki_mount(const char* source,
218 const char* filesystemtype,
219 unsigned long mountflags,
222 return s_state.kp->mount(source, target, filesystemtype, mountflags, data);
225 int ki_umount(const char* path) {
227 return s_state.kp->umount(path);
230 int ki_open(const char* path, int oflag, mode_t mode) {
232 return s_state.kp->open(path, oflag, mode);
235 int ki_pipe(int pipefds[2]) {
237 return s_state.kp->pipe(pipefds);
240 ssize_t ki_read(int fd, void* buf, size_t nbyte) {
242 return s_state.kp->read(fd, buf, nbyte);
245 ssize_t ki_write(int fd, const void* buf, size_t nbyte) {
247 return s_state.kp->write(fd, buf, nbyte);
250 int ki_fstat(int fd, struct stat* buf) {
252 return s_state.kp->fstat(fd, buf);
255 int ki_getdents(int fd, void* buf, unsigned int count) {
257 return s_state.kp->getdents(fd, buf, count);
260 int ki_ftruncate(int fd, off_t length) {
262 return s_state.kp->ftruncate(fd, length);
265 int ki_fsync(int fd) {
267 return s_state.kp->fsync(fd);
270 int ki_fdatasync(int fd) {
272 return s_state.kp->fdatasync(fd);
275 int ki_isatty(int fd) {
277 return s_state.kp->isatty(fd);
280 int ki_close(int fd) {
282 return s_state.kp->close(fd);
285 off_t ki_lseek(int fd, off_t offset, int whence) {
287 return s_state.kp->lseek(fd, offset, whence);
290 int ki_remove(const char* path) {
292 return s_state.kp->remove(path);
295 int ki_unlink(const char* path) {
297 return s_state.kp->unlink(path);
300 int ki_truncate(const char* path, off_t length) {
302 return s_state.kp->truncate(path, length);
305 int ki_lstat(const char* path, struct stat* buf) {
307 return s_state.kp->lstat(path, buf);
310 int ki_link(const char* oldpath, const char* newpath) {
312 return s_state.kp->link(oldpath, newpath);
315 int ki_rename(const char* path, const char* newpath) {
317 return s_state.kp->rename(path, newpath);
320 int ki_symlink(const char* oldpath, const char* newpath) {
322 return s_state.kp->symlink(oldpath, newpath);
325 int ki_access(const char* path, int amode) {
327 return s_state.kp->access(path, amode);
330 int ki_readlink(const char* path, char* buf, size_t count) {
332 return s_state.kp->readlink(path, buf, count);
335 int ki_utimes(const char* path, const struct timeval times[2]) {
337 // Implement in terms of utimens.
338 struct timespec ts[2];
339 ts[0].tv_sec = times[0].tv_sec;
340 ts[0].tv_nsec = times[0].tv_usec * 1000;
341 ts[1].tv_sec = times[1].tv_sec;
342 ts[1].tv_nsec = times[1].tv_usec * 1000;
343 return s_state.kp->utimens(path, ts);
346 int ki_futimes(int fd, const struct timeval times[2]) {
348 // Implement in terms of futimens.
349 struct timespec ts[2];
350 ts[0].tv_sec = times[0].tv_sec;
351 ts[0].tv_nsec = times[0].tv_usec * 1000;
352 ts[1].tv_sec = times[1].tv_sec;
353 ts[1].tv_nsec = times[1].tv_usec * 1000;
354 return s_state.kp->futimens(fd, ts);
357 void* ki_mmap(void* addr,
363 ON_NOSYS_RETURN(MAP_FAILED);
364 return s_state.kp->mmap(addr, length, prot, flags, fd, offset);
367 int ki_munmap(void* addr, size_t length) {
369 return s_state.kp->munmap(addr, length);
372 int ki_open_resource(const char* file) {
374 return s_state.kp->open_resource(file);
377 int ki_fcntl(int d, int request, va_list args) {
379 return s_state.kp->fcntl(d, request, args);
382 int ki_ioctl(int d, int request, va_list args) {
384 return s_state.kp->ioctl(d, request, args);
387 int ki_chown(const char* path, uid_t owner, gid_t group) {
389 return s_state.kp->chown(path, owner, group);
392 int ki_fchown(int fd, uid_t owner, gid_t group) {
394 return s_state.kp->fchown(fd, owner, group);
397 int ki_lchown(const char* path, uid_t owner, gid_t group) {
399 return s_state.kp->lchown(path, owner, group);
402 int ki_utime(const char* filename, const struct utimbuf* times) {
404 // Implement in terms of utimens.
405 struct timespec ts[2];
406 ts[0].tv_sec = times->actime;
408 ts[1].tv_sec = times->modtime;
410 return s_state.kp->utimens(filename, ts);
413 int ki_futimens(int fd, const struct timespec times[2]) {
415 return s_state.kp->futimens(fd, times);
418 int ki_poll(struct pollfd* fds, nfds_t nfds, int timeout) {
419 return s_state.kp->poll(fds, nfds, timeout);
422 int ki_select(int nfds,
426 struct timeval* timeout) {
427 return s_state.kp->select(nfds, readfds, writefds, exceptfds, timeout);
430 int ki_tcflush(int fd, int queue_selector) {
432 return s_state.kp->tcflush(fd, queue_selector);
435 int ki_tcgetattr(int fd, struct termios* termios_p) {
437 return s_state.kp->tcgetattr(fd, termios_p);
440 int ki_tcsetattr(int fd,
441 int optional_actions,
442 const struct termios* termios_p) {
444 return s_state.kp->tcsetattr(fd, optional_actions, termios_p);
447 int ki_kill(pid_t pid, int sig) {
449 return s_state.kp->kill(pid, sig);
452 int ki_killpg(pid_t pid, int sig) {
457 int ki_sigaction(int signum,
458 const struct sigaction* action,
459 struct sigaction* oaction) {
461 return s_state.kp->sigaction(signum, action, oaction);
464 int ki_sigpause(int sigmask) {
469 int ki_sigpending(sigset_t* set) {
474 int ki_sigsuspend(const sigset_t* set) {
479 sighandler_t ki_signal(int signum, sighandler_t handler) {
480 return ki_sigset(signum, handler);
483 sighandler_t ki_sigset(int signum, sighandler_t handler) {
484 ON_NOSYS_RETURN(SIG_ERR);
485 // Implement sigset(2) in terms of sigaction(2).
486 struct sigaction action;
487 struct sigaction oaction;
488 memset(&action, 0, sizeof(action));
489 memset(&oaction, 0, sizeof(oaction));
490 action.sa_handler = handler;
491 int rtn = s_state.kp->sigaction(signum, &action, &oaction);
494 return oaction.sa_handler;
497 #ifdef PROVIDES_SOCKET_API
499 int ki_accept(int fd, struct sockaddr* addr, socklen_t* len) {
501 return s_state.kp->accept(fd, addr, len);
504 int ki_bind(int fd, const struct sockaddr* addr, socklen_t len) {
506 return s_state.kp->bind(fd, addr, len);
509 int ki_connect(int fd, const struct sockaddr* addr, socklen_t len) {
511 return s_state.kp->connect(fd, addr, len);
514 struct hostent* ki_gethostbyname(const char* name) {
515 ON_NOSYS_RETURN(NULL);
516 return s_state.kp->gethostbyname(name);
519 int ki_getnameinfo(const struct sockaddr *sa,
525 unsigned int flags) {
526 ON_NOSYS_RETURN(EAI_SYSTEM);
527 return s_state.kp->getnameinfo(sa, salen, host, hostlen, serv, servlen,
531 int ki_getaddrinfo(const char* node,
533 const struct addrinfo* hints,
534 struct addrinfo** res) {
535 ON_NOSYS_RETURN(EAI_SYSTEM);
536 return s_state.kp->getaddrinfo(node, service, hints, res);
539 void ki_freeaddrinfo(struct addrinfo* res) {
540 s_state.kp->freeaddrinfo(res);
543 int ki_getpeername(int fd, struct sockaddr* addr, socklen_t* len) {
545 return s_state.kp->getpeername(fd, addr, len);
548 int ki_getsockname(int fd, struct sockaddr* addr, socklen_t* len) {
550 return s_state.kp->getsockname(fd, addr, len);
553 int ki_getsockopt(int fd, int lvl, int optname, void* optval, socklen_t* len) {
555 return s_state.kp->getsockopt(fd, lvl, optname, optval, len);
558 int ki_listen(int fd, int backlog) {
560 return s_state.kp->listen(fd, backlog);
563 ssize_t ki_recv(int fd, void* buf, size_t len, int flags) {
565 return s_state.kp->recv(fd, buf, len, flags);
568 ssize_t ki_recvfrom(int fd,
572 struct sockaddr* addr,
573 socklen_t* addrlen) {
575 return s_state.kp->recvfrom(fd, buf, len, flags, addr, addrlen);
578 ssize_t ki_recvmsg(int fd, struct msghdr* msg, int flags) {
580 return s_state.kp->recvmsg(fd, msg, flags);
583 ssize_t ki_send(int fd, const void* buf, size_t len, int flags) {
585 return s_state.kp->send(fd, buf, len, flags);
588 ssize_t ki_sendto(int fd,
592 const struct sockaddr* addr,
595 return s_state.kp->sendto(fd, buf, len, flags, addr, addrlen);
598 ssize_t ki_sendmsg(int fd, const struct msghdr* msg, int flags) {
600 return s_state.kp->sendmsg(fd, msg, flags);
603 int ki_setsockopt(int fd,
609 return s_state.kp->setsockopt(fd, lvl, optname, optval, len);
612 int ki_shutdown(int fd, int how) {
614 return s_state.kp->shutdown(fd, how);
617 int ki_socket(int domain, int type, int protocol) {
619 return s_state.kp->socket(domain, type, protocol);
622 int ki_socketpair(int domain, int type, int protocol, int* sv) {
624 return s_state.kp->socketpair(domain, type, protocol, sv);
626 #endif // PROVIDES_SOCKET_API