aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLaytan <laytanlaats@hotmail.com>2024-08-15 17:08:41 +0200
committerGitHub <noreply@github.com>2024-08-15 17:08:41 +0200
commitd91fa162d82d82f715bcd0f6e6b2f55eb17a3889 (patch)
tree68801fa50de9958a827fba86aa596ee5cbea055c
parent6e91f6ab31f7a8a3f9474c06c18cdffacd4815ff (diff)
parent43e8da2e067c6a2ecbc663bfbae0eafe67dc41e1 (diff)
Merge pull request #3280 from beaumccartney/shm_syscalls
add shm_open and shm_unlink syscalls for darwin
-rw-r--r--core/sys/darwin/xnu_system_call_helpers.odin66
-rw-r--r--core/sys/darwin/xnu_system_call_wrappers.odin8
2 files changed, 58 insertions, 16 deletions
diff --git a/core/sys/darwin/xnu_system_call_helpers.odin b/core/sys/darwin/xnu_system_call_helpers.odin
index 7fa59bfe0..a641a4be9 100644
--- a/core/sys/darwin/xnu_system_call_helpers.odin
+++ b/core/sys/darwin/xnu_system_call_helpers.odin
@@ -91,6 +91,29 @@ _sys_permission_mode :: #force_inline proc (mode: Permission) -> u32 {
return cflags
}
+_sys_open_mode :: #force_inline proc(mode: Open_Flags) -> u32 {
+ cflags : u32 = 0
+
+ cflags |= OPEN_FLAG_RDONLY * u32(Open_Flags.RDONLY in mode)
+ cflags |= OPEN_FLAG_WRONLY * u32(Open_Flags.WRONLY in mode)
+ cflags |= OPEN_FLAG_RDWR * u32(Open_Flags.RDWR in mode)
+ cflags |= OPEN_FLAG_NONBLOCK * u32(Open_Flags.NONBLOCK in mode)
+ cflags |= OPEN_FLAG_CREAT * u32(Open_Flags.CREAT in mode)
+ cflags |= OPEN_FLAG_APPEND * u32(Open_Flags.APPEND in mode)
+ cflags |= OPEN_FLAG_TRUNC * u32(Open_Flags.TRUNC in mode)
+ cflags |= OPEN_FLAG_EXCL * u32(Open_Flags.EXCL in mode)
+ cflags |= OPEN_FLAG_SHLOCK * u32(Open_Flags.SHLOCK in mode)
+ cflags |= OPEN_FLAG_EXLOCK * u32(Open_Flags.EXLOCK in mode)
+ cflags |= OPEN_FLAG_DIRECTORY * u32(Open_Flags.DIRECTORY in mode)
+ cflags |= OPEN_FLAG_NOFOLLOW * u32(Open_Flags.NOFOLLOW in mode)
+ cflags |= OPEN_FLAG_SYMLINK * u32(Open_Flags.SYMLINK in mode)
+ cflags |= OPEN_FLAG_EVTONLY * u32(Open_Flags.EVTONLY in mode)
+ cflags |= OPEN_FLAG_CLOEXEC * u32(Open_Flags.CLOEXEC in mode)
+ cflags |= OPEN_FLAG_NOFOLLOW_ANY * u32(Open_Flags.NOFOLLOW_ANY in mode)
+
+ return cflags
+}
+
@(private)
clone_to_cstring :: proc(s: string, allocator: runtime.Allocator, loc := #caller_location) -> cstring {
c := make([]byte, len(s)+1, allocator, loc)
@@ -109,22 +132,7 @@ sys_open :: proc(path: string, oflag: Open_Flags, mode: Permission) -> (c.int, b
cflags = _sys_permission_mode(mode)
- cmode |= OPEN_FLAG_RDONLY * u32(Open_Flags.RDONLY in oflag)
- cmode |= OPEN_FLAG_WRONLY * u32(Open_Flags.WRONLY in oflag)
- cmode |= OPEN_FLAG_RDWR * u32(Open_Flags.RDWR in oflag)
- cmode |= OPEN_FLAG_NONBLOCK * u32(Open_Flags.NONBLOCK in oflag)
- cmode |= OPEN_FLAG_CREAT * u32(Open_Flags.CREAT in oflag)
- cmode |= OPEN_FLAG_APPEND * u32(Open_Flags.APPEND in oflag)
- cmode |= OPEN_FLAG_TRUNC * u32(Open_Flags.TRUNC in oflag)
- cmode |= OPEN_FLAG_EXCL * u32(Open_Flags.EXCL in oflag)
- cmode |= OPEN_FLAG_SHLOCK * u32(Open_Flags.SHLOCK in oflag)
- cmode |= OPEN_FLAG_EXLOCK * u32(Open_Flags.EXLOCK in oflag)
- cmode |= OPEN_FLAG_DIRECTORY * u32(Open_Flags.DIRECTORY in oflag)
- cmode |= OPEN_FLAG_NOFOLLOW * u32(Open_Flags.NOFOLLOW in oflag)
- cmode |= OPEN_FLAG_SYMLINK * u32(Open_Flags.SYMLINK in oflag)
- cmode |= OPEN_FLAG_EVTONLY * u32(Open_Flags.EVTONLY in oflag)
- cmode |= OPEN_FLAG_CLOEXEC * u32(Open_Flags.CLOEXEC in oflag)
- cmode |= OPEN_FLAG_NOFOLLOW_ANY * u32(Open_Flags.NOFOLLOW_ANY in oflag)
+ cmode = _sys_open_mode(oflag)
result := syscall_open(cpath, cmode, cflags)
state := result != -1
@@ -187,3 +195,29 @@ sys_lstat :: proc(path: string, status: ^stat) -> bool {
cpath: cstring = clone_to_cstring(path, context.temp_allocator)
return syscall_lstat(cpath, status) != -1
}
+
+sys_shm_open :: proc(name: string, oflag: Open_Flags, mode: Permission) -> (c.int, bool) {
+ runtime.DEFAULT_TEMP_ALLOCATOR_TEMP_GUARD()
+
+ cmode: u32 = 0
+ cflags: u32 = 0
+ cname: cstring = clone_to_cstring(name, context.temp_allocator)
+
+ cflags = _sys_permission_mode(mode)
+
+ cmode = _sys_open_mode(oflag)
+
+ result := syscall_shm_open(cname, cmode, cflags)
+ state := result != -1
+
+ // NOTE(beau): Presently fstat doesn't report any changed permissions
+ // on the file descriptor even with this fchmod (which fails with a
+ // non-zero return). I can also reproduce this with the syscalls in c
+ // so I suspect it's not odin's bug. I've left the fchmod in case the
+ // underlying issue is fixed.
+ if state && cflags != 0 {
+ state = (syscall_fchmod(result, cflags) != -1)
+ }
+
+ return result * cast(c.int)state, state
+}
diff --git a/core/sys/darwin/xnu_system_call_wrappers.odin b/core/sys/darwin/xnu_system_call_wrappers.odin
index d289ee7c1..30faf86be 100644
--- a/core/sys/darwin/xnu_system_call_wrappers.odin
+++ b/core/sys/darwin/xnu_system_call_wrappers.odin
@@ -425,3 +425,11 @@ syscall_fchdir :: #force_inline proc "contextless" (fd: c.int, path: cstring) ->
syscall_getrusage :: #force_inline proc "contextless" (who: c.int, rusage: ^RUsage) -> c.int {
return cast(c.int) intrinsics.syscall(unix_offset_syscall(.getrusage), uintptr(who), uintptr(rusage))
}
+
+syscall_shm_open :: #force_inline proc "contextless" (name: cstring, oflag: u32, mode: u32) -> c.int {
+ return cast(c.int)intrinsics.syscall(unix_offset_syscall(.shm_open), transmute(uintptr)name, uintptr(oflag), uintptr(mode))
+}
+
+syscall_shm_unlink :: #force_inline proc "contextless" (name: cstring) -> c.int {
+ return cast(c.int)intrinsics.syscall(unix_offset_syscall(.shm_unlink), transmute(uintptr)name)
+}