From a83ea57a508362f8f66ecd89131302fba1223637 Mon Sep 17 00:00:00 2001 From: Markos Chandras Date: Thu, 11 Oct 2012 11:20:42 +0100 Subject: sendfile: Use sendfile64 if arch does not have the sendfile syscall Signed-off-by: Markos Chandras Signed-off-by: Bernhard Reutner-Fischer --- libc/sysdeps/linux/common/sendfile.c | 45 +++++++++++++++++++++++++++++++++++- 1 file changed, 44 insertions(+), 1 deletion(-) (limited to 'libc/sysdeps/linux/common/sendfile.c') diff --git a/libc/sysdeps/linux/common/sendfile.c b/libc/sysdeps/linux/common/sendfile.c index 64c200eb2..2bd717929 100644 --- a/libc/sysdeps/linux/common/sendfile.c +++ b/libc/sysdeps/linux/common/sendfile.c @@ -9,12 +9,55 @@ #include -#ifdef __NR_sendfile # include # include + +#if defined __NR_sendfile _syscall4(ssize_t, sendfile, int, out_fd, int, in_fd, __off_t *, offset, size_t, count) # if defined __UCLIBC_HAS_LFS__ && (!defined __NR_sendfile64 || __WORDSIZE == 64) strong_alias_untyped(sendfile,sendfile64) # endif + +#elif defined __NR_sendfile64 && !defined __NR_sendfile +# include +# include + +ssize_t sendfile(int out_fd, int in_fd, __off_t *offset, size_t count) +{ + __off64_t off64, *off; + ssize_t res; + + /* + * Check if valid fds and valid pointers were passed + * This does not prevent the user from passing + * an arbitrary pointer causing a segfault or + * other security issues + */ + + if (in_fd < 0 || out_fd < 0) { + __set_errno(EBADF); + return -1; + } + + if (offset == NULL || (int)offset < 0) { + __set_errno(EFAULT); + return -1; + } + + if (offset) { + off = &off64; + off64 = *offset; + } else { + off = NULL; + } + + res = INLINE_SYSCALL(sendfile64, 4, out_fd, in_fd, off, count); + + if (res >= 0) + *offset = off64; + + return res; +} + #endif -- cgit v1.2.3