xref: /DragonOS/kernel/src/syscall/mod.rs (revision ab5c8ca46db8e7d4793a9791292122b0b9684274)
1*ab5c8ca4Slogin use core::{
2*ab5c8ca4Slogin     ffi::{c_char, c_int, c_void, CStr},
3*ab5c8ca4Slogin     sync::atomic::{AtomicBool, Ordering},
4*ab5c8ca4Slogin };
5*ab5c8ca4Slogin 
6676b8ef6SMork use num_traits::{FromPrimitive, ToPrimitive};
7676b8ef6SMork 
8*ab5c8ca4Slogin use crate::{
9*ab5c8ca4Slogin     arch::cpu::cpu_reset,
10*ab5c8ca4Slogin     filesystem::vfs::{
11*ab5c8ca4Slogin         file::FileMode,
12*ab5c8ca4Slogin         syscall::{SEEK_CUR, SEEK_END, SEEK_MAX, SEEK_SET},
13*ab5c8ca4Slogin         MAX_PATHLEN,
14*ab5c8ca4Slogin     },
15*ab5c8ca4Slogin     include::bindings::bindings::{mm_stat_t, pid_t, verify_area, PAGE_2M_SIZE, PAGE_4K_SIZE},
16*ab5c8ca4Slogin     io::SeekFrom, kinfo,
17*ab5c8ca4Slogin     net::syscall::SockAddr,
18*ab5c8ca4Slogin     time::TimeSpec,
19*ab5c8ca4Slogin };
20*ab5c8ca4Slogin 
214454d1a2Slogin #[repr(i32)]
22676b8ef6SMork #[derive(Debug, FromPrimitive, ToPrimitive, PartialEq, Eq, Clone)]
2379a452ceShoumkh #[allow(dead_code, non_camel_case_types)]
244454d1a2Slogin pub enum SystemError {
254454d1a2Slogin     /// 操作不被允许 Operation not permitted.
2679a452ceShoumkh     EPERM = 1,
2779a452ceShoumkh     /// 没有指定的文件或目录 No such file or directory.
2879a452ceShoumkh     ENOENT = 2,
294454d1a2Slogin     /// 没有这样的进程 No such process.
3079a452ceShoumkh     ESRCH = 3,
3179a452ceShoumkh     /// 被中断的函数 Interrupted function.
3279a452ceShoumkh     EINTR = 4,
3379a452ceShoumkh     /// I/O错误 I/O error.
3479a452ceShoumkh     EIO = 5,
3579a452ceShoumkh     /// 没有这样的设备或地址 No such device or address.
3679a452ceShoumkh     ENXIO = 6,
3779a452ceShoumkh     /// 参数列表过长,或者在输出buffer中缺少空间 或者参数比系统内建的最大值要大 Argument list too long.
3879a452ceShoumkh     E2BIG = 7,
3979a452ceShoumkh     /// 可执行文件格式错误 Executable file format error
4079a452ceShoumkh     ENOEXEC = 8,
4179a452ceShoumkh     /// 错误的文件描述符 Bad file descriptor.
4279a452ceShoumkh     EBADF = 9,
4379a452ceShoumkh     /// 没有子进程 No child processes.
4479a452ceShoumkh     ECHILD = 10,
4579a452ceShoumkh     /// 资源不可用,请重试。 Resource unavailable, try again.(may be the same value as [EWOULDBLOCK])
4679a452ceShoumkh     ///
4779a452ceShoumkh     /// 操作将被禁止 Operation would block.(may be the same value as [EAGAIN]).
4879a452ceShoumkh     EAGAIN_OR_EWOULDBLOCK = 11,
4979a452ceShoumkh     /// 没有足够的空间 Not enough space.
5079a452ceShoumkh     ENOMEM = 12,
5179a452ceShoumkh     /// 访问被拒绝 Permission denied
5279a452ceShoumkh     EACCES = 13,
5379a452ceShoumkh     /// 错误的地址 Bad address
5479a452ceShoumkh     EFAULT = 14,
5579a452ceShoumkh     /// 需要块设备 Block device required
5679a452ceShoumkh     ENOTBLK = 15,
5779a452ceShoumkh     /// 设备或资源忙 Device or resource busy.
5879a452ceShoumkh     EBUSY = 16,
5979a452ceShoumkh     /// 文件已存在 File exists.
6079a452ceShoumkh     EEXIST = 17,
614454d1a2Slogin     /// 跨设备连接 Cross-device link.
6279a452ceShoumkh     EXDEV = 18,
6379a452ceShoumkh     /// 没有指定的设备 No such device.
6479a452ceShoumkh     ENODEV = 19,
6579a452ceShoumkh     /// 不是目录 Not a directory.
6679a452ceShoumkh     ENOTDIR = 20,
6779a452ceShoumkh     /// 是一个目录 Is a directory
6879a452ceShoumkh     EISDIR = 21,
6979a452ceShoumkh     /// 不可用的参数 Invalid argument.
7079a452ceShoumkh     EINVAL = 22,
7179a452ceShoumkh     /// 系统中打开的文件过多 Too many files open in system.
7279a452ceShoumkh     ENFILE = 23,
7379a452ceShoumkh     /// 文件描述符的值过大 File descriptor value too large.
7479a452ceShoumkh     EMFILE = 24,
7579a452ceShoumkh     /// 不正确的I/O控制操作 Inappropriate I/O control operation.
7679a452ceShoumkh     ENOTTY = 25,
7779a452ceShoumkh     /// 文本文件忙 Text file busy.
7879a452ceShoumkh     ETXTBSY = 26,
7979a452ceShoumkh     /// 文件太大 File too large.
8079a452ceShoumkh     EFBIG = 27,
8179a452ceShoumkh     /// 设备上没有空间 No space left on device.
8279a452ceShoumkh     ENOSPC = 28,
8379a452ceShoumkh     /// 错误的寻道.当前文件是pipe,不允许seek请求  Invalid seek.
8479a452ceShoumkh     ESPIPE = 29,
8579a452ceShoumkh     /// 只读的文件系统 Read-only file system.
8679a452ceShoumkh     EROFS = 30,
8779a452ceShoumkh     /// 链接数过多 Too many links.
8879a452ceShoumkh     EMLINK = 31,
8979a452ceShoumkh     /// 断开的管道 Broken pipe.
9079a452ceShoumkh     EPIPE = 32,
9179a452ceShoumkh     /// 数学参数超出作用域 Mathematics argument out of domain of function.
9279a452ceShoumkh     EDOM = 33,
9379a452ceShoumkh     /// 结果过大 Result too large.
9479a452ceShoumkh     ERANGE = 34,
9579a452ceShoumkh     /// 资源死锁将要发生 Resource deadlock would occur.
9679a452ceShoumkh     EDEADLK = 35,
9779a452ceShoumkh     /// 文件名过长 Filename too long.
9879a452ceShoumkh     ENAMETOOLONG = 36,
9979a452ceShoumkh     /// 没有可用的锁 No locks available.
10079a452ceShoumkh     ENOLCK = 37,
10179a452ceShoumkh     /// 功能不支持 Function not supported.
10279a452ceShoumkh     ENOSYS = 38,
10379a452ceShoumkh     /// 目录非空 Directory not empty.
10479a452ceShoumkh     ENOTEMPTY = 39,
10579a452ceShoumkh     /// 符号链接级别过多 Too many levels of symbolic links.
10679a452ceShoumkh     ELOOP = 40,
10779a452ceShoumkh     /// 没有期待类型的消息 No message of the desired type.
10879a452ceShoumkh     ENOMSG = 41,
10979a452ceShoumkh     /// 标志符被移除 Identifier removed.
11079a452ceShoumkh     EIDRM = 42,
11179a452ceShoumkh     /// 通道号超出范围 Channel number out of range
11279a452ceShoumkh     ECHRNG = 43,
11379a452ceShoumkh     /// 二级不同步 Level 2 not synchronized
11479a452ceShoumkh     EL2NSYNC = 44,
11579a452ceShoumkh     /// 三级暂停 Level 3 halted
11679a452ceShoumkh     EL3HLT = 45,
11779a452ceShoumkh     /// 三级重置 Level 3 reset
11879a452ceShoumkh     EL3RST = 46,
11979a452ceShoumkh     /// 链接号超出范围 Link number out of range
12079a452ceShoumkh     ELNRNG = 47,
12179a452ceShoumkh     /// 未连接协议驱动程序 Protocol driver not attached
12279a452ceShoumkh     EUNATCH = 48,
12379a452ceShoumkh     /// 没有可用的CSI结构 No CSI structure available
12479a452ceShoumkh     ENOCSI = 49,
12579a452ceShoumkh     /// 二级暂停 Level 2 halted
12679a452ceShoumkh     EL2HLT = 50,
12779a452ceShoumkh     /// 无效交换 Invalid exchange
12879a452ceShoumkh     EBADE = 51,
12979a452ceShoumkh     /// 无效的请求描述符 Invalid request descriptor
13079a452ceShoumkh     EBADR = 52,
13179a452ceShoumkh     /// 交换满 Exchange full
13279a452ceShoumkh     EXFULL = 53,
13379a452ceShoumkh     /// 无阳极 No anode
13479a452ceShoumkh     ENOANO = 54,
13579a452ceShoumkh     /// 请求码无效 Invalid request code
13679a452ceShoumkh     EBADRQC = 55,
13779a452ceShoumkh     /// 无效插槽 Invalid slot
13879a452ceShoumkh     EBADSLT = 56,
13979a452ceShoumkh     /// 资源死锁 Resource deadlock would occur
14079a452ceShoumkh     EDEADLOCK = 57,
14179a452ceShoumkh     /// 错误的字体文件格式 Bad font file format
14279a452ceShoumkh     EBFONT = 58,
14379a452ceShoumkh     /// 不是STREAM Not a STREAM
14479a452ceShoumkh     ENOSTR = 59,
14579a452ceShoumkh     /// 队列头没有可读取的消息 No message is available on the STREAM head read queue.
14679a452ceShoumkh     ENODATA = 60,
14779a452ceShoumkh     /// 流式ioctl()超时 Stream ioctl() timeout
14879a452ceShoumkh     ETIME = 61,
14979a452ceShoumkh     /// 没有STREAM资源  No STREAM resources.
15079a452ceShoumkh     ENOSR = 62,
15179a452ceShoumkh     /// 机器不在网络上 Machine is not on the network
15279a452ceShoumkh     ENONET = 63,
15379a452ceShoumkh     /// 未安装软件包 Package not installed
15479a452ceShoumkh     ENOPKG = 64,
15579a452ceShoumkh     /// 远程对象 Object is remote
15679a452ceShoumkh     EREMOTE = 65,
15779a452ceShoumkh     /// 保留 Reserved.
15879a452ceShoumkh     ENOLINK = 66,
15979a452ceShoumkh     /// 外设错误 Advertise error.
16079a452ceShoumkh     EADV = 67,
16179a452ceShoumkh     /// 安装错误 Srmount error
16279a452ceShoumkh     ESRMNT = 68,
16379a452ceShoumkh     /// 发送时发生通信错误 Communication error on send
16479a452ceShoumkh     ECOMM = 69,
16579a452ceShoumkh     /// 协议错误 Protocol error.
16679a452ceShoumkh     EPROTO = 70,
16779a452ceShoumkh     /// 保留使用 Reserved.
16879a452ceShoumkh     EMULTIHOP = 71,
16979a452ceShoumkh     /// RFS特定错误 RFS specific error
17079a452ceShoumkh     EDOTDOT = 72,
17179a452ceShoumkh     /// 错误的消息 Bad message.
17279a452ceShoumkh     EBADMSG = 73,
17379a452ceShoumkh     /// 数值过大,产生溢出 Value too large to be stored in data type.
17479a452ceShoumkh     EOVERFLOW = 74,
17579a452ceShoumkh     /// 名称在网络上不是唯一的 Name not unique on network
17679a452ceShoumkh     ENOTUNIQ = 75,
17779a452ceShoumkh     /// 处于不良状态的文件描述符 File descriptor in bad state
17879a452ceShoumkh     EBADFD = 76,
17979a452ceShoumkh     /// 远程地址已更改 Remote address changed
18079a452ceShoumkh     EREMCHG = 77,
18179a452ceShoumkh     /// 无法访问所需的共享库 Can not access a needed shared library
18279a452ceShoumkh     ELIBACC = 78,
18379a452ceShoumkh     /// 访问损坏的共享库 Accessing a corrupted shared library
18479a452ceShoumkh     ELIBBAD = 79,
18579a452ceShoumkh     /// a. out中的.lib部分已损坏 .lib section in a.out corrupted
18679a452ceShoumkh     ELIBSCN = 80,
18779a452ceShoumkh     /// 尝试链接太多共享库 Attempting to link in too many shared libraries
18879a452ceShoumkh     ELIBMAX = 81,
18979a452ceShoumkh     /// 无法直接执行共享库 Cannot exec a shared library directly
19079a452ceShoumkh     ELIBEXEC = 82,
19179a452ceShoumkh     /// 不合法的字符序列 Illegal byte sequence.
19279a452ceShoumkh     EILSEQ = 83,
19379a452ceShoumkh     /// 中断的系统调用应该重新启动 Interrupted system call should be restarted
19479a452ceShoumkh     ERESTART = 84,
19579a452ceShoumkh     /// 流管道错误 Streams pipe error
19679a452ceShoumkh     ESTRPIPE = 85,
19779a452ceShoumkh     /// 用户太多 Too many users
19879a452ceShoumkh     EUSERS = 86,
19979a452ceShoumkh     /// 不是一个套接字 Not a socket.
20079a452ceShoumkh     ENOTSOCK = 87,
20179a452ceShoumkh     /// 需要目标地址 Destination address required.
20279a452ceShoumkh     EDESTADDRREQ = 88,
20379a452ceShoumkh     /// 消息过大 Message too large.
20479a452ceShoumkh     EMSGSIZE = 89,
20579a452ceShoumkh     /// 对于套接字而言,错误的协议 Protocol wrong type for socket.
20679a452ceShoumkh     EPROTOTYPE = 90,
20779a452ceShoumkh     /// 协议不可用 Protocol not available.
20879a452ceShoumkh     ENOPROTOOPT = 91,
20979a452ceShoumkh     /// 协议不被支持 Protocol not supported.
21079a452ceShoumkh     EPROTONOSUPPORT = 92,
21179a452ceShoumkh     /// 不支持套接字类型 Socket type not supported
21279a452ceShoumkh     ESOCKTNOSUPPORT = 93,
21379a452ceShoumkh     /// 套接字不支持该操作 Operation not supported on socket (may be the same value as [ENOTSUP]).
21479a452ceShoumkh     ///
21579a452ceShoumkh     /// 不被支持 Not supported (may be the same value as [EOPNOTSUPP]).
21679a452ceShoumkh     EOPNOTSUPP_OR_ENOTSUP = 94,
21779a452ceShoumkh     /// 不支持协议系列 Protocol family not supported
21879a452ceShoumkh     EPFNOSUPPORT = 95,
21979a452ceShoumkh     /// 地址family不支持 Address family not supported.
22079a452ceShoumkh     EAFNOSUPPORT = 96,
22179a452ceShoumkh     /// 地址正在被使用 Address in use.
22279a452ceShoumkh     EADDRINUSE = 97,
22379a452ceShoumkh     /// 地址不可用 Address  not available.
22479a452ceShoumkh     EADDRNOTAVAIL = 98,
22579a452ceShoumkh     /// 网络已关闭 Network is down.
22679a452ceShoumkh     ENETDOWN = 99,
22779a452ceShoumkh     /// 网络不可达 Network unreachable.
22879a452ceShoumkh     ENETUNREACH = 100,
22979a452ceShoumkh     /// 网络连接已断开 Connection aborted by network.
23079a452ceShoumkh     ENETRESET = 101,
23179a452ceShoumkh     /// 连接已断开 Connection aborted.
23279a452ceShoumkh     ECONNABORTED = 102,
23379a452ceShoumkh     /// 连接被重置 Connection reset.
23479a452ceShoumkh     ECONNRESET = 103,
23579a452ceShoumkh     /// 缓冲区空间不足 No buffer space available.
23679a452ceShoumkh     ENOBUFS = 104,
23779a452ceShoumkh     /// 套接字已连接 Socket is connected.
23879a452ceShoumkh     EISCONN = 105,
23979a452ceShoumkh     /// 套接字未连接 The socket is not connected.
24079a452ceShoumkh     ENOTCONN = 106,
24179a452ceShoumkh     /// 传输端点关闭后无法发送 Cannot send after transport endpoint shutdown
24279a452ceShoumkh     ESHUTDOWN = 107,
24379a452ceShoumkh     /// 引用太多:无法拼接 Too many references: cannot splice
24479a452ceShoumkh     ETOOMANYREFS = 108,
24579a452ceShoumkh     /// 连接超时 Connection timed out.
24679a452ceShoumkh     ETIMEDOUT = 109,
24779a452ceShoumkh     /// 连接被拒绝 Connection refused.
24879a452ceShoumkh     ECONNREFUSED = 110,
24979a452ceShoumkh     /// 主机已关闭 Host is down
25079a452ceShoumkh     EHOSTDOWN = 111,
25179a452ceShoumkh     /// 主机不可达 Host is unreachable.
25279a452ceShoumkh     EHOSTUNREACH = 112,
25379a452ceShoumkh     /// 连接已经在处理 Connection already in progress.
25479a452ceShoumkh     EALREADY = 113,
25579a452ceShoumkh     /// 操作正在处理 Operation in progress.
25679a452ceShoumkh     EINPROGRESS = 114,
25779a452ceShoumkh     /// 保留 Reserved.
25879a452ceShoumkh     ESTALE = 115,
25979a452ceShoumkh     /// 结构需要清理 Structure needs cleaning
26079a452ceShoumkh     EUCLEAN = 116,
26179a452ceShoumkh     /// 不是XENIX命名类型文件 Not a XENIX named type file
26279a452ceShoumkh     ENOTNAM = 117,
26379a452ceShoumkh     /// 没有可用的XENIX信号量 No XENIX semaphores available
26479a452ceShoumkh     ENAVAIL = 118,
26579a452ceShoumkh     /// 是命名类型文件 Is a named type file
26679a452ceShoumkh     EISNAM = 119,
26779a452ceShoumkh     /// 远程I/O错误 Remote I/O error
26879a452ceShoumkh     EREMOTEIO = 120,
26979a452ceShoumkh     /// 保留使用 Reserved
27079a452ceShoumkh     EDQUOT = 121,
27179a452ceShoumkh     /// 没有找到媒介 No medium found
27279a452ceShoumkh     ENOMEDIUM = 122,
27379a452ceShoumkh     /// 介质类型错误 Wrong medium type
27479a452ceShoumkh     EMEDIUMTYPE = 123,
27579a452ceShoumkh     /// 操作被取消 Operation canceled.
27679a452ceShoumkh     ECANCELED = 124,
27779a452ceShoumkh     /// 所需的密钥不可用 Required key not available
27879a452ceShoumkh     ENOKEY = 125,
27979a452ceShoumkh     /// 密钥已过期 Key has expired
28079a452ceShoumkh     EKEYEXPIRED = 126,
28179a452ceShoumkh     /// 密钥已被撤销 Key has been revoked
28279a452ceShoumkh     EKEYREVOKED = 127,
28379a452ceShoumkh     /// 密钥被服务拒绝 Key has been revoked
28479a452ceShoumkh     EKEYREJECTED = 128,
28579a452ceShoumkh     /// 之前的拥有者挂了 Previous owner died.
28679a452ceShoumkh     EOWNERDEAD = 129,
28779a452ceShoumkh     /// 状态不可恢复 State not recoverable.
28879a452ceShoumkh     ENOTRECOVERABLE = 130,
2894454d1a2Slogin }
290676b8ef6SMork 
291676b8ef6SMork impl SystemError {
292676b8ef6SMork     /// @brief 把posix错误码转换为系统错误枚举类型。
293676b8ef6SMork     pub fn from_posix_errno(errno: i32) -> Option<SystemError> {
294676b8ef6SMork         // posix 错误码是小于0的
295676b8ef6SMork         if errno >= 0 {
296676b8ef6SMork             return None;
297676b8ef6SMork         }
298676b8ef6SMork         return <Self as FromPrimitive>::from_i32(-errno);
299676b8ef6SMork     }
300676b8ef6SMork 
301676b8ef6SMork     /// @brief 把系统错误枚举类型转换为负数posix错误码。
302676b8ef6SMork     pub fn to_posix_errno(&self) -> i32 {
303676b8ef6SMork         return -<Self as ToPrimitive>::to_i32(self).unwrap();
304676b8ef6SMork     }
305676b8ef6SMork }
306*ab5c8ca4Slogin 
307*ab5c8ca4Slogin // 定义系统调用号
308*ab5c8ca4Slogin pub const SYS_PUT_STRING: usize = 1;
309*ab5c8ca4Slogin pub const SYS_OPEN: usize = 2;
310*ab5c8ca4Slogin pub const SYS_CLOSE: usize = 3;
311*ab5c8ca4Slogin pub const SYS_READ: usize = 4;
312*ab5c8ca4Slogin pub const SYS_WRITE: usize = 5;
313*ab5c8ca4Slogin pub const SYS_LSEEK: usize = 6;
314*ab5c8ca4Slogin pub const SYS_FORK: usize = 7;
315*ab5c8ca4Slogin pub const SYS_VFORK: usize = 8;
316*ab5c8ca4Slogin pub const SYS_BRK: usize = 9;
317*ab5c8ca4Slogin pub const SYS_SBRK: usize = 10;
318*ab5c8ca4Slogin 
319*ab5c8ca4Slogin pub const SYS_REBOOT: usize = 11;
320*ab5c8ca4Slogin pub const SYS_CHDIR: usize = 12;
321*ab5c8ca4Slogin pub const SYS_GET_DENTS: usize = 13;
322*ab5c8ca4Slogin pub const SYS_EXECVE: usize = 14;
323*ab5c8ca4Slogin pub const SYS_WAIT4: usize = 15;
324*ab5c8ca4Slogin pub const SYS_EXIT: usize = 16;
325*ab5c8ca4Slogin pub const SYS_MKDIR: usize = 17;
326*ab5c8ca4Slogin pub const SYS_NANOSLEEP: usize = 18;
327*ab5c8ca4Slogin /// todo: 该系统调用与Linux不一致,将来需要删除该系统调用!!! 删的时候记得改C版本的libc
328*ab5c8ca4Slogin pub const SYS_CLOCK: usize = 19;
329*ab5c8ca4Slogin pub const SYS_PIPE: usize = 20;
330*ab5c8ca4Slogin 
331*ab5c8ca4Slogin /// todo: 该系统调用不是符合POSIX标准的,在将来需要删除!!!
332*ab5c8ca4Slogin pub const SYS_MSTAT: usize = 21;
333*ab5c8ca4Slogin pub const SYS_UNLINK_AT: usize = 22;
334*ab5c8ca4Slogin pub const SYS_KILL: usize = 23;
335*ab5c8ca4Slogin pub const SYS_SIGACTION: usize = 24;
336*ab5c8ca4Slogin pub const SYS_RT_SIGRETURN: usize = 25;
337*ab5c8ca4Slogin pub const SYS_GETPID: usize = 26;
338*ab5c8ca4Slogin pub const SYS_SCHED: usize = 27;
339*ab5c8ca4Slogin pub const SYS_DUP: usize = 28;
340*ab5c8ca4Slogin pub const SYS_DUP2: usize = 29;
341*ab5c8ca4Slogin pub const SYS_SOCKET: usize = 30;
342*ab5c8ca4Slogin 
343*ab5c8ca4Slogin pub const SYS_SETSOCKOPT: usize = 31;
344*ab5c8ca4Slogin pub const SYS_GETSOCKOPT: usize = 32;
345*ab5c8ca4Slogin pub const SYS_CONNECT: usize = 33;
346*ab5c8ca4Slogin pub const SYS_BIND: usize = 34;
347*ab5c8ca4Slogin pub const SYS_SENDTO: usize = 35;
348*ab5c8ca4Slogin pub const SYS_RECVFROM: usize = 36;
349*ab5c8ca4Slogin pub const SYS_RECVMSG: usize = 37;
350*ab5c8ca4Slogin pub const SYS_LISTEN: usize = 38;
351*ab5c8ca4Slogin pub const SYS_SHUTDOWN: usize = 39;
352*ab5c8ca4Slogin pub const SYS_ACCEPT: usize = 40;
353*ab5c8ca4Slogin 
354*ab5c8ca4Slogin pub const SYS_GETSOCKNAME: usize = 41;
355*ab5c8ca4Slogin pub const SYS_GETPEERNAME: usize = 42;
356*ab5c8ca4Slogin 
357*ab5c8ca4Slogin #[derive(Debug)]
358*ab5c8ca4Slogin pub struct Syscall;
359*ab5c8ca4Slogin 
360*ab5c8ca4Slogin extern "C" {
361*ab5c8ca4Slogin     fn do_put_string(s: *const u8, front_color: u32, back_color: u32) -> usize;
362*ab5c8ca4Slogin }
363*ab5c8ca4Slogin 
364*ab5c8ca4Slogin #[no_mangle]
365*ab5c8ca4Slogin pub extern "C" fn syscall_init() -> i32 {
366*ab5c8ca4Slogin     kinfo!("Initializing syscall...");
367*ab5c8ca4Slogin     Syscall::init().expect("syscall init failed");
368*ab5c8ca4Slogin     kinfo!("Syscall init successfully!");
369*ab5c8ca4Slogin     return 0;
370*ab5c8ca4Slogin }
371*ab5c8ca4Slogin 
372*ab5c8ca4Slogin impl Syscall {
373*ab5c8ca4Slogin     /// 初始化系统调用
374*ab5c8ca4Slogin     pub fn init() -> Result<(), SystemError> {
375*ab5c8ca4Slogin         static INIT_FLAG: AtomicBool = AtomicBool::new(false);
376*ab5c8ca4Slogin         let prev = INIT_FLAG.swap(true, Ordering::SeqCst);
377*ab5c8ca4Slogin         if prev {
378*ab5c8ca4Slogin             panic!("Cannot initialize syscall more than once!");
379*ab5c8ca4Slogin         }
380*ab5c8ca4Slogin         return crate::arch::syscall::arch_syscall_init();
381*ab5c8ca4Slogin     }
382*ab5c8ca4Slogin     /// @brief 系统调用分发器,用于分发系统调用。
383*ab5c8ca4Slogin     ///
384*ab5c8ca4Slogin     /// 这个函数内,需要根据系统调用号,调用对应的系统调用处理函数。
385*ab5c8ca4Slogin     /// 并且,对于用户态传入的指针参数,需要在本函数内进行越界检查,防止访问到内核空间。
386*ab5c8ca4Slogin     pub fn handle(syscall_num: usize, args: &[usize], from_user: bool) -> usize {
387*ab5c8ca4Slogin         let r = match syscall_num {
388*ab5c8ca4Slogin             SYS_PUT_STRING => {
389*ab5c8ca4Slogin                 Self::put_string(args[0] as *const u8, args[1] as u32, args[2] as u32)
390*ab5c8ca4Slogin             }
391*ab5c8ca4Slogin             SYS_OPEN => {
392*ab5c8ca4Slogin                 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) };
393*ab5c8ca4Slogin                 let path: Result<&str, core::str::Utf8Error> = path.to_str();
394*ab5c8ca4Slogin                 let res = if path.is_err() {
395*ab5c8ca4Slogin                     Err(SystemError::EINVAL)
396*ab5c8ca4Slogin                 } else {
397*ab5c8ca4Slogin                     let path: &str = path.unwrap();
398*ab5c8ca4Slogin                     let flags = args[1];
399*ab5c8ca4Slogin                     let open_flags: FileMode = FileMode::from_bits_truncate(flags as u32);
400*ab5c8ca4Slogin 
401*ab5c8ca4Slogin                     Self::open(path, open_flags)
402*ab5c8ca4Slogin                 };
403*ab5c8ca4Slogin                 // kdebug!("open: {:?}, res: {:?}", path, res);
404*ab5c8ca4Slogin                 res
405*ab5c8ca4Slogin             }
406*ab5c8ca4Slogin             SYS_CLOSE => {
407*ab5c8ca4Slogin                 let fd = args[0];
408*ab5c8ca4Slogin                 Self::close(fd)
409*ab5c8ca4Slogin             }
410*ab5c8ca4Slogin             SYS_READ => {
411*ab5c8ca4Slogin                 let fd = args[0] as i32;
412*ab5c8ca4Slogin                 let buf_vaddr = args[1];
413*ab5c8ca4Slogin                 let len = args[2];
414*ab5c8ca4Slogin 
415*ab5c8ca4Slogin                 // 判断缓冲区是否来自用户态,进行权限校验
416*ab5c8ca4Slogin                 let res = if from_user && unsafe { !verify_area(buf_vaddr as u64, len as u64) } {
417*ab5c8ca4Slogin                     // 来自用户态,而buffer在内核态,这样的操作不被允许
418*ab5c8ca4Slogin                     Err(SystemError::EPERM)
419*ab5c8ca4Slogin                 } else {
420*ab5c8ca4Slogin                     let buf: &mut [u8] = unsafe {
421*ab5c8ca4Slogin                         core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len)
422*ab5c8ca4Slogin                     };
423*ab5c8ca4Slogin                     Self::read(fd, buf)
424*ab5c8ca4Slogin                 };
425*ab5c8ca4Slogin 
426*ab5c8ca4Slogin                 res
427*ab5c8ca4Slogin             }
428*ab5c8ca4Slogin             SYS_WRITE => {
429*ab5c8ca4Slogin                 let fd = args[0] as i32;
430*ab5c8ca4Slogin                 let buf_vaddr = args[1];
431*ab5c8ca4Slogin                 let len = args[2];
432*ab5c8ca4Slogin 
433*ab5c8ca4Slogin                 // 判断缓冲区是否来自用户态,进行权限校验
434*ab5c8ca4Slogin                 let res = if from_user && unsafe { !verify_area(buf_vaddr as u64, len as u64) } {
435*ab5c8ca4Slogin                     // 来自用户态,而buffer在内核态,这样的操作不被允许
436*ab5c8ca4Slogin                     Err(SystemError::EPERM)
437*ab5c8ca4Slogin                 } else {
438*ab5c8ca4Slogin                     let buf: &[u8] = unsafe {
439*ab5c8ca4Slogin                         core::slice::from_raw_parts::<'static, u8>(buf_vaddr as *const u8, len)
440*ab5c8ca4Slogin                     };
441*ab5c8ca4Slogin                     Self::write(fd, buf)
442*ab5c8ca4Slogin                 };
443*ab5c8ca4Slogin 
444*ab5c8ca4Slogin                 res
445*ab5c8ca4Slogin             }
446*ab5c8ca4Slogin 
447*ab5c8ca4Slogin             SYS_LSEEK => {
448*ab5c8ca4Slogin                 let fd = args[0] as i32;
449*ab5c8ca4Slogin                 let offset = args[1] as i64;
450*ab5c8ca4Slogin                 let whence = args[2] as u32;
451*ab5c8ca4Slogin 
452*ab5c8ca4Slogin                 let w = match whence {
453*ab5c8ca4Slogin                     SEEK_SET => Ok(SeekFrom::SeekSet(offset)),
454*ab5c8ca4Slogin                     SEEK_CUR => Ok(SeekFrom::SeekCurrent(offset)),
455*ab5c8ca4Slogin                     SEEK_END => Ok(SeekFrom::SeekEnd(offset)),
456*ab5c8ca4Slogin                     SEEK_MAX => Ok(SeekFrom::SeekEnd(0)),
457*ab5c8ca4Slogin                     _ => Err(SystemError::EINVAL),
458*ab5c8ca4Slogin                 };
459*ab5c8ca4Slogin 
460*ab5c8ca4Slogin                 let res = if w.is_err() {
461*ab5c8ca4Slogin                     Err(w.unwrap_err())
462*ab5c8ca4Slogin                 } else {
463*ab5c8ca4Slogin                     let w = w.unwrap();
464*ab5c8ca4Slogin                     Self::lseek(fd, w)
465*ab5c8ca4Slogin                 };
466*ab5c8ca4Slogin 
467*ab5c8ca4Slogin                 res
468*ab5c8ca4Slogin             }
469*ab5c8ca4Slogin 
470*ab5c8ca4Slogin             SYS_BRK => {
471*ab5c8ca4Slogin                 let new_brk = args[0];
472*ab5c8ca4Slogin                 Self::brk(new_brk)
473*ab5c8ca4Slogin             }
474*ab5c8ca4Slogin 
475*ab5c8ca4Slogin             SYS_SBRK => {
476*ab5c8ca4Slogin                 let increment = args[0] as isize;
477*ab5c8ca4Slogin                 Self::sbrk(increment)
478*ab5c8ca4Slogin             }
479*ab5c8ca4Slogin 
480*ab5c8ca4Slogin             SYS_REBOOT => Self::reboot(),
481*ab5c8ca4Slogin 
482*ab5c8ca4Slogin             SYS_CHDIR => {
483*ab5c8ca4Slogin                 // Closure for checking arguments
484*ab5c8ca4Slogin                 let chdir_check = |arg0: usize| {
485*ab5c8ca4Slogin                     if arg0 == 0 {
486*ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
487*ab5c8ca4Slogin                     }
488*ab5c8ca4Slogin                     let path_ptr = arg0 as *const c_char;
489*ab5c8ca4Slogin                     // 权限校验
490*ab5c8ca4Slogin                     if path_ptr.is_null()
491*ab5c8ca4Slogin                         || (from_user
492*ab5c8ca4Slogin                             && unsafe { !verify_area(path_ptr as u64, PAGE_2M_SIZE as u64) })
493*ab5c8ca4Slogin                     {
494*ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
495*ab5c8ca4Slogin                     }
496*ab5c8ca4Slogin                     let dest_path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
497*ab5c8ca4Slogin                     let dest_path: &str = dest_path.to_str().map_err(|_| SystemError::EINVAL)?;
498*ab5c8ca4Slogin                     if dest_path.len() == 0 {
499*ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
500*ab5c8ca4Slogin                     } else if dest_path.len() > PAGE_4K_SIZE as usize {
501*ab5c8ca4Slogin                         return Err(SystemError::ENAMETOOLONG);
502*ab5c8ca4Slogin                     }
503*ab5c8ca4Slogin 
504*ab5c8ca4Slogin                     return Ok(dest_path);
505*ab5c8ca4Slogin                 };
506*ab5c8ca4Slogin 
507*ab5c8ca4Slogin                 let r: Result<&str, SystemError> = chdir_check(args[0]);
508*ab5c8ca4Slogin                 if r.is_err() {
509*ab5c8ca4Slogin                     Err(r.unwrap_err())
510*ab5c8ca4Slogin                 } else {
511*ab5c8ca4Slogin                     Self::chdir(r.unwrap())
512*ab5c8ca4Slogin                 }
513*ab5c8ca4Slogin             }
514*ab5c8ca4Slogin 
515*ab5c8ca4Slogin             SYS_GET_DENTS => {
516*ab5c8ca4Slogin                 let fd = args[0] as i32;
517*ab5c8ca4Slogin                 let buf_vaddr = args[1];
518*ab5c8ca4Slogin                 let len = args[2];
519*ab5c8ca4Slogin 
520*ab5c8ca4Slogin                 // 判断缓冲区是否来自用户态,进行权限校验
521*ab5c8ca4Slogin                 let res = if from_user && unsafe { !verify_area(buf_vaddr as u64, len as u64) } {
522*ab5c8ca4Slogin                     // 来自用户态,而buffer在内核态,这样的操作不被允许
523*ab5c8ca4Slogin                     Err(SystemError::EPERM)
524*ab5c8ca4Slogin                 } else if buf_vaddr == 0 {
525*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
526*ab5c8ca4Slogin                 } else {
527*ab5c8ca4Slogin                     let buf: &mut [u8] = unsafe {
528*ab5c8ca4Slogin                         core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len)
529*ab5c8ca4Slogin                     };
530*ab5c8ca4Slogin                     Self::getdents(fd, buf)
531*ab5c8ca4Slogin                 };
532*ab5c8ca4Slogin 
533*ab5c8ca4Slogin                 res
534*ab5c8ca4Slogin             }
535*ab5c8ca4Slogin 
536*ab5c8ca4Slogin             SYS_EXECVE => {
537*ab5c8ca4Slogin                 let path_ptr = args[0];
538*ab5c8ca4Slogin                 let argv_ptr = args[1];
539*ab5c8ca4Slogin                 let env_ptr = args[2];
540*ab5c8ca4Slogin 
541*ab5c8ca4Slogin                 // 权限校验
542*ab5c8ca4Slogin                 if from_user
543*ab5c8ca4Slogin                     && (unsafe { !verify_area(path_ptr as u64, PAGE_4K_SIZE as u64) }
544*ab5c8ca4Slogin                         || unsafe { !verify_area(argv_ptr as u64, PAGE_4K_SIZE as u64) })
545*ab5c8ca4Slogin                     || unsafe { !verify_area(env_ptr as u64, PAGE_4K_SIZE as u64) }
546*ab5c8ca4Slogin                 {
547*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
548*ab5c8ca4Slogin                 } else {
549*ab5c8ca4Slogin                     Self::execve(
550*ab5c8ca4Slogin                         path_ptr as *const c_void,
551*ab5c8ca4Slogin                         argv_ptr as *const *const c_void,
552*ab5c8ca4Slogin                         env_ptr as *const *const c_void,
553*ab5c8ca4Slogin                     )
554*ab5c8ca4Slogin                 }
555*ab5c8ca4Slogin             }
556*ab5c8ca4Slogin             SYS_WAIT4 => {
557*ab5c8ca4Slogin                 let pid = args[0] as pid_t;
558*ab5c8ca4Slogin                 let wstatus = args[1] as *mut c_int;
559*ab5c8ca4Slogin                 let options = args[2] as c_int;
560*ab5c8ca4Slogin                 let rusage = args[3] as *mut c_void;
561*ab5c8ca4Slogin 
562*ab5c8ca4Slogin                 // 权限校验
563*ab5c8ca4Slogin                 // todo: 引入rusage之后,更正以下权限校验代码中,rusage的大小
564*ab5c8ca4Slogin                 if from_user
565*ab5c8ca4Slogin                     && (unsafe {
566*ab5c8ca4Slogin                         !verify_area(wstatus as u64, core::mem::size_of::<c_int>() as u64)
567*ab5c8ca4Slogin                     } || unsafe { !verify_area(rusage as u64, PAGE_4K_SIZE as u64) })
568*ab5c8ca4Slogin                 {
569*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
570*ab5c8ca4Slogin                 } else {
571*ab5c8ca4Slogin                     Self::wait4(pid, wstatus, options, rusage)
572*ab5c8ca4Slogin                 }
573*ab5c8ca4Slogin             }
574*ab5c8ca4Slogin 
575*ab5c8ca4Slogin             SYS_EXIT => {
576*ab5c8ca4Slogin                 let exit_code = args[0];
577*ab5c8ca4Slogin                 Self::exit(exit_code)
578*ab5c8ca4Slogin             }
579*ab5c8ca4Slogin             SYS_MKDIR => {
580*ab5c8ca4Slogin                 let path_ptr = args[0] as *const c_char;
581*ab5c8ca4Slogin                 let mode = args[1];
582*ab5c8ca4Slogin 
583*ab5c8ca4Slogin                 let security_check = || {
584*ab5c8ca4Slogin                     if path_ptr.is_null()
585*ab5c8ca4Slogin                         || (from_user
586*ab5c8ca4Slogin                             && unsafe { !verify_area(path_ptr as u64, PAGE_2M_SIZE as u64) })
587*ab5c8ca4Slogin                     {
588*ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
589*ab5c8ca4Slogin                     }
590*ab5c8ca4Slogin                     let path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
591*ab5c8ca4Slogin                     let path: &str = path.to_str().map_err(|_| SystemError::EINVAL)?.trim();
592*ab5c8ca4Slogin 
593*ab5c8ca4Slogin                     if path == "" {
594*ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
595*ab5c8ca4Slogin                     }
596*ab5c8ca4Slogin                     return Ok(path);
597*ab5c8ca4Slogin                 };
598*ab5c8ca4Slogin 
599*ab5c8ca4Slogin                 let path = security_check();
600*ab5c8ca4Slogin                 if path.is_err() {
601*ab5c8ca4Slogin                     Err(path.unwrap_err())
602*ab5c8ca4Slogin                 } else {
603*ab5c8ca4Slogin                     Self::mkdir(path.unwrap(), mode)
604*ab5c8ca4Slogin                 }
605*ab5c8ca4Slogin             }
606*ab5c8ca4Slogin 
607*ab5c8ca4Slogin             SYS_NANOSLEEP => {
608*ab5c8ca4Slogin                 let req = args[0] as *const TimeSpec;
609*ab5c8ca4Slogin                 let rem = args[1] as *mut TimeSpec;
610*ab5c8ca4Slogin                 if from_user
611*ab5c8ca4Slogin                     && (unsafe {
612*ab5c8ca4Slogin                         !verify_area(req as u64, core::mem::size_of::<TimeSpec>() as u64)
613*ab5c8ca4Slogin                     } || unsafe {
614*ab5c8ca4Slogin                         !verify_area(rem as u64, core::mem::size_of::<TimeSpec>() as u64)
615*ab5c8ca4Slogin                     })
616*ab5c8ca4Slogin                 {
617*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
618*ab5c8ca4Slogin                 } else {
619*ab5c8ca4Slogin                     Self::nanosleep(req, rem)
620*ab5c8ca4Slogin                 }
621*ab5c8ca4Slogin             }
622*ab5c8ca4Slogin 
623*ab5c8ca4Slogin             SYS_CLOCK => Self::clock(),
624*ab5c8ca4Slogin             SYS_PIPE => {
625*ab5c8ca4Slogin                 let pipefd = args[0] as *mut c_int;
626*ab5c8ca4Slogin                 if from_user
627*ab5c8ca4Slogin                     && unsafe {
628*ab5c8ca4Slogin                         !verify_area(pipefd as u64, core::mem::size_of::<[c_int; 2]>() as u64)
629*ab5c8ca4Slogin                     }
630*ab5c8ca4Slogin                 {
631*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
632*ab5c8ca4Slogin                 } else if pipefd.is_null() {
633*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
634*ab5c8ca4Slogin                 } else {
635*ab5c8ca4Slogin                     let pipefd = unsafe { core::slice::from_raw_parts_mut(pipefd, 2) };
636*ab5c8ca4Slogin                     Self::pipe(pipefd)
637*ab5c8ca4Slogin                 }
638*ab5c8ca4Slogin             }
639*ab5c8ca4Slogin 
640*ab5c8ca4Slogin             SYS_MSTAT => {
641*ab5c8ca4Slogin                 let dst = args[0] as *mut mm_stat_t;
642*ab5c8ca4Slogin                 if from_user
643*ab5c8ca4Slogin                     && unsafe { !verify_area(dst as u64, core::mem::size_of::<mm_stat_t>() as u64) }
644*ab5c8ca4Slogin                 {
645*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
646*ab5c8ca4Slogin                 } else if dst.is_null() {
647*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
648*ab5c8ca4Slogin                 } else {
649*ab5c8ca4Slogin                     Self::mstat(dst, from_user)
650*ab5c8ca4Slogin                 }
651*ab5c8ca4Slogin             }
652*ab5c8ca4Slogin             SYS_UNLINK_AT => {
653*ab5c8ca4Slogin                 let dirfd = args[0] as i32;
654*ab5c8ca4Slogin                 let pathname = args[1] as *const c_char;
655*ab5c8ca4Slogin                 let flags = args[2] as u32;
656*ab5c8ca4Slogin                 if from_user && unsafe { !verify_area(pathname as u64, PAGE_4K_SIZE as u64) } {
657*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
658*ab5c8ca4Slogin                 } else if pathname.is_null() {
659*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
660*ab5c8ca4Slogin                 } else {
661*ab5c8ca4Slogin                     let get_path = || {
662*ab5c8ca4Slogin                         let pathname: &CStr = unsafe { CStr::from_ptr(pathname) };
663*ab5c8ca4Slogin 
664*ab5c8ca4Slogin                         let pathname: &str = pathname.to_str().map_err(|_| SystemError::EINVAL)?;
665*ab5c8ca4Slogin                         if pathname.len() >= MAX_PATHLEN {
666*ab5c8ca4Slogin                             return Err(SystemError::ENAMETOOLONG);
667*ab5c8ca4Slogin                         }
668*ab5c8ca4Slogin                         return Ok(pathname.trim());
669*ab5c8ca4Slogin                     };
670*ab5c8ca4Slogin                     let pathname = get_path();
671*ab5c8ca4Slogin                     if pathname.is_err() {
672*ab5c8ca4Slogin                         Err(pathname.unwrap_err())
673*ab5c8ca4Slogin                     } else {
674*ab5c8ca4Slogin                         Self::unlinkat(dirfd, pathname.unwrap(), flags)
675*ab5c8ca4Slogin                     }
676*ab5c8ca4Slogin                 }
677*ab5c8ca4Slogin             }
678*ab5c8ca4Slogin             SYS_KILL => {
679*ab5c8ca4Slogin                 let pid = args[0] as pid_t;
680*ab5c8ca4Slogin                 let sig = args[1] as c_int;
681*ab5c8ca4Slogin 
682*ab5c8ca4Slogin                 Self::kill(pid, sig)
683*ab5c8ca4Slogin             }
684*ab5c8ca4Slogin 
685*ab5c8ca4Slogin             SYS_SIGACTION => {
686*ab5c8ca4Slogin                 let sig = args[0] as c_int;
687*ab5c8ca4Slogin                 let act = args[1];
688*ab5c8ca4Slogin                 let old_act = args[2];
689*ab5c8ca4Slogin                 Self::sigaction(sig, act, old_act, from_user)
690*ab5c8ca4Slogin             }
691*ab5c8ca4Slogin 
692*ab5c8ca4Slogin             SYS_RT_SIGRETURN => {
693*ab5c8ca4Slogin                 // 由于目前signal机制的实现,与x86_64强关联,因此暂时在arch/x86_64/syscall.rs中调用
694*ab5c8ca4Slogin                 // todo: 未来需要将signal机制与平台解耦
695*ab5c8ca4Slogin                 todo!()
696*ab5c8ca4Slogin             }
697*ab5c8ca4Slogin 
698*ab5c8ca4Slogin             SYS_GETPID => Self::getpid(),
699*ab5c8ca4Slogin 
700*ab5c8ca4Slogin             SYS_SCHED => Self::sched(from_user),
701*ab5c8ca4Slogin             SYS_DUP => {
702*ab5c8ca4Slogin                 let oldfd: i32 = args[0] as c_int;
703*ab5c8ca4Slogin                 Self::dup(oldfd)
704*ab5c8ca4Slogin             }
705*ab5c8ca4Slogin             SYS_DUP2 => {
706*ab5c8ca4Slogin                 let oldfd: i32 = args[0] as c_int;
707*ab5c8ca4Slogin                 let newfd: i32 = args[1] as c_int;
708*ab5c8ca4Slogin                 Self::dup2(oldfd, newfd)
709*ab5c8ca4Slogin             }
710*ab5c8ca4Slogin 
711*ab5c8ca4Slogin             SYS_SOCKET => Self::socket(args[0], args[1], args[2]),
712*ab5c8ca4Slogin             SYS_SETSOCKOPT => {
713*ab5c8ca4Slogin                 let optval = args[3] as *const u8;
714*ab5c8ca4Slogin                 let optlen = args[4] as usize;
715*ab5c8ca4Slogin                 // 验证optval的地址是否合法
716*ab5c8ca4Slogin                 if unsafe { verify_area(optval as u64, optlen as u64) } == false {
717*ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
718*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
719*ab5c8ca4Slogin                 } else {
720*ab5c8ca4Slogin                     let data: &[u8] = unsafe { core::slice::from_raw_parts(optval, optlen) };
721*ab5c8ca4Slogin                     Self::setsockopt(args[0], args[1], args[2], data)
722*ab5c8ca4Slogin                 }
723*ab5c8ca4Slogin             }
724*ab5c8ca4Slogin             SYS_GETSOCKOPT => {
725*ab5c8ca4Slogin                 let optval = args[3] as *mut u8;
726*ab5c8ca4Slogin                 let optlen = args[4] as *mut usize;
727*ab5c8ca4Slogin 
728*ab5c8ca4Slogin                 let security_check = || {
729*ab5c8ca4Slogin                     // 验证optval的地址是否合法
730*ab5c8ca4Slogin                     if unsafe { verify_area(optval as u64, PAGE_4K_SIZE as u64) } == false {
731*ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
732*ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
733*ab5c8ca4Slogin                     }
734*ab5c8ca4Slogin 
735*ab5c8ca4Slogin                     // 验证optlen的地址是否合法
736*ab5c8ca4Slogin                     if unsafe { verify_area(optlen as u64, core::mem::size_of::<u32>() as u64) }
737*ab5c8ca4Slogin                         == false
738*ab5c8ca4Slogin                     {
739*ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
740*ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
741*ab5c8ca4Slogin                     }
742*ab5c8ca4Slogin                     return Ok(());
743*ab5c8ca4Slogin                 };
744*ab5c8ca4Slogin                 let r = security_check();
745*ab5c8ca4Slogin                 if r.is_err() {
746*ab5c8ca4Slogin                     Err(r.unwrap_err())
747*ab5c8ca4Slogin                 } else {
748*ab5c8ca4Slogin                     Self::getsockopt(args[0], args[1], args[2], optval, optlen as *mut u32)
749*ab5c8ca4Slogin                 }
750*ab5c8ca4Slogin             }
751*ab5c8ca4Slogin 
752*ab5c8ca4Slogin             SYS_CONNECT => {
753*ab5c8ca4Slogin                 let addr = args[1] as *const SockAddr;
754*ab5c8ca4Slogin                 let addrlen = args[2] as usize;
755*ab5c8ca4Slogin                 // 验证addr的地址是否合法
756*ab5c8ca4Slogin                 if unsafe { verify_area(addr as u64, addrlen as u64) } == false {
757*ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
758*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
759*ab5c8ca4Slogin                 } else {
760*ab5c8ca4Slogin                     Self::connect(args[0], addr, addrlen)
761*ab5c8ca4Slogin                 }
762*ab5c8ca4Slogin             }
763*ab5c8ca4Slogin             SYS_BIND => {
764*ab5c8ca4Slogin                 let addr = args[1] as *const SockAddr;
765*ab5c8ca4Slogin                 let addrlen = args[2] as usize;
766*ab5c8ca4Slogin                 // 验证addr的地址是否合法
767*ab5c8ca4Slogin                 if unsafe { verify_area(addr as u64, addrlen as u64) } == false {
768*ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
769*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
770*ab5c8ca4Slogin                 } else {
771*ab5c8ca4Slogin                     Self::bind(args[0], addr, addrlen)
772*ab5c8ca4Slogin                 }
773*ab5c8ca4Slogin             }
774*ab5c8ca4Slogin 
775*ab5c8ca4Slogin             SYS_SENDTO => {
776*ab5c8ca4Slogin                 let buf = args[1] as *const u8;
777*ab5c8ca4Slogin                 let len = args[2] as usize;
778*ab5c8ca4Slogin                 let flags = args[3] as u32;
779*ab5c8ca4Slogin                 let addr = args[4] as *const SockAddr;
780*ab5c8ca4Slogin                 let addrlen = args[5] as usize;
781*ab5c8ca4Slogin                 // 验证buf的地址是否合法
782*ab5c8ca4Slogin                 if unsafe { verify_area(buf as u64, len as u64) } == false {
783*ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
784*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
785*ab5c8ca4Slogin                 } else if unsafe { verify_area(addr as u64, addrlen as u64) } == false {
786*ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
787*ab5c8ca4Slogin                     Err(SystemError::EFAULT)
788*ab5c8ca4Slogin                 } else {
789*ab5c8ca4Slogin                     let data: &[u8] = unsafe { core::slice::from_raw_parts(buf, len) };
790*ab5c8ca4Slogin                     Self::sendto(args[0], data, flags, addr, addrlen)
791*ab5c8ca4Slogin                 }
792*ab5c8ca4Slogin             }
793*ab5c8ca4Slogin 
794*ab5c8ca4Slogin             SYS_RECVFROM => {
795*ab5c8ca4Slogin                 let buf = args[1] as *mut u8;
796*ab5c8ca4Slogin                 let len = args[2] as usize;
797*ab5c8ca4Slogin                 let flags = args[3] as u32;
798*ab5c8ca4Slogin                 let addr = args[4] as *mut SockAddr;
799*ab5c8ca4Slogin                 let addrlen = args[5] as *mut usize;
800*ab5c8ca4Slogin 
801*ab5c8ca4Slogin                 let security_check = || {
802*ab5c8ca4Slogin                     // 验证buf的地址是否合法
803*ab5c8ca4Slogin                     if unsafe { verify_area(buf as u64, len as u64) } == false {
804*ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
805*ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
806*ab5c8ca4Slogin                     }
807*ab5c8ca4Slogin 
808*ab5c8ca4Slogin                     // 验证addrlen的地址是否合法
809*ab5c8ca4Slogin                     if unsafe { verify_area(addrlen as u64, core::mem::size_of::<u32>() as u64) }
810*ab5c8ca4Slogin                         == false
811*ab5c8ca4Slogin                     {
812*ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
813*ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
814*ab5c8ca4Slogin                     }
815*ab5c8ca4Slogin 
816*ab5c8ca4Slogin                     if unsafe { verify_area(addr as u64, core::mem::size_of::<SockAddr>() as u64) }
817*ab5c8ca4Slogin                         == false
818*ab5c8ca4Slogin                     {
819*ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
820*ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
821*ab5c8ca4Slogin                     }
822*ab5c8ca4Slogin                     return Ok(());
823*ab5c8ca4Slogin                 };
824*ab5c8ca4Slogin                 let r = security_check();
825*ab5c8ca4Slogin                 if r.is_err() {
826*ab5c8ca4Slogin                     Err(r.unwrap_err())
827*ab5c8ca4Slogin                 } else {
828*ab5c8ca4Slogin                     let buf = unsafe { core::slice::from_raw_parts_mut(buf, len) };
829*ab5c8ca4Slogin                     Self::recvfrom(args[0], buf, flags, addr, addrlen as *mut u32)
830*ab5c8ca4Slogin                 }
831*ab5c8ca4Slogin             }
832*ab5c8ca4Slogin 
833*ab5c8ca4Slogin             SYS_RECVMSG => {
834*ab5c8ca4Slogin                 let msg = args[1] as *mut crate::net::syscall::MsgHdr;
835*ab5c8ca4Slogin                 let flags = args[2] as u32;
836*ab5c8ca4Slogin                 let security_check = || {
837*ab5c8ca4Slogin                     // 验证msg的地址是否合法
838*ab5c8ca4Slogin                     if unsafe {
839*ab5c8ca4Slogin                         verify_area(
840*ab5c8ca4Slogin                             msg as u64,
841*ab5c8ca4Slogin                             core::mem::size_of::<crate::net::syscall::MsgHdr>() as u64,
842*ab5c8ca4Slogin                         )
843*ab5c8ca4Slogin                     } == false
844*ab5c8ca4Slogin                     {
845*ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
846*ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
847*ab5c8ca4Slogin                     }
848*ab5c8ca4Slogin                     let msg = unsafe { msg.as_mut() }.ok_or(SystemError::EFAULT)?;
849*ab5c8ca4Slogin                     return Ok(msg);
850*ab5c8ca4Slogin                 };
851*ab5c8ca4Slogin                 let r = security_check();
852*ab5c8ca4Slogin                 if r.is_err() {
853*ab5c8ca4Slogin                     Err(r.unwrap_err())
854*ab5c8ca4Slogin                 } else {
855*ab5c8ca4Slogin                     let msg = r.unwrap();
856*ab5c8ca4Slogin                     Self::recvmsg(args[0], msg, flags)
857*ab5c8ca4Slogin                 }
858*ab5c8ca4Slogin             }
859*ab5c8ca4Slogin 
860*ab5c8ca4Slogin             SYS_LISTEN => Self::listen(args[0], args[1]),
861*ab5c8ca4Slogin             SYS_SHUTDOWN => Self::shutdown(args[0], args[1]),
862*ab5c8ca4Slogin             SYS_ACCEPT => Self::accept(args[0], args[1] as *mut SockAddr, args[2] as *mut u32),
863*ab5c8ca4Slogin             SYS_GETSOCKNAME => {
864*ab5c8ca4Slogin                 Self::getsockname(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
865*ab5c8ca4Slogin             }
866*ab5c8ca4Slogin             SYS_GETPEERNAME => {
867*ab5c8ca4Slogin                 Self::getpeername(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
868*ab5c8ca4Slogin             }
869*ab5c8ca4Slogin             _ => panic!("Unsupported syscall ID: {}", syscall_num),
870*ab5c8ca4Slogin         };
871*ab5c8ca4Slogin 
872*ab5c8ca4Slogin         let r = r.unwrap_or_else(|e| e.to_posix_errno() as usize);
873*ab5c8ca4Slogin         return r;
874*ab5c8ca4Slogin     }
875*ab5c8ca4Slogin 
876*ab5c8ca4Slogin     pub fn put_string(
877*ab5c8ca4Slogin         s: *const u8,
878*ab5c8ca4Slogin         front_color: u32,
879*ab5c8ca4Slogin         back_color: u32,
880*ab5c8ca4Slogin     ) -> Result<usize, SystemError> {
881*ab5c8ca4Slogin         return Ok(unsafe { do_put_string(s, front_color, back_color) });
882*ab5c8ca4Slogin     }
883*ab5c8ca4Slogin 
884*ab5c8ca4Slogin     pub fn reboot() -> Result<usize, SystemError> {
885*ab5c8ca4Slogin         cpu_reset();
886*ab5c8ca4Slogin     }
887*ab5c8ca4Slogin }
888