1*ab5c8ca4Slogin use core::{ 2*ab5c8ca4Slogin ffi::{c_char, c_int, c_void, CStr}, 3*ab5c8ca4Slogin sync::atomic::{AtomicBool, Ordering}, 4*ab5c8ca4Slogin }; 5*ab5c8ca4Slogin 6676b8ef6SMork use num_traits::{FromPrimitive, ToPrimitive}; 7676b8ef6SMork 8*ab5c8ca4Slogin use crate::{ 9*ab5c8ca4Slogin arch::cpu::cpu_reset, 10*ab5c8ca4Slogin filesystem::vfs::{ 11*ab5c8ca4Slogin file::FileMode, 12*ab5c8ca4Slogin syscall::{SEEK_CUR, SEEK_END, SEEK_MAX, SEEK_SET}, 13*ab5c8ca4Slogin MAX_PATHLEN, 14*ab5c8ca4Slogin }, 15*ab5c8ca4Slogin include::bindings::bindings::{mm_stat_t, pid_t, verify_area, PAGE_2M_SIZE, PAGE_4K_SIZE}, 16*ab5c8ca4Slogin io::SeekFrom, kinfo, 17*ab5c8ca4Slogin net::syscall::SockAddr, 18*ab5c8ca4Slogin time::TimeSpec, 19*ab5c8ca4Slogin }; 20*ab5c8ca4Slogin 214454d1a2Slogin #[repr(i32)] 22676b8ef6SMork #[derive(Debug, FromPrimitive, ToPrimitive, PartialEq, Eq, Clone)] 2379a452ceShoumkh #[allow(dead_code, non_camel_case_types)] 244454d1a2Slogin pub enum SystemError { 254454d1a2Slogin /// 操作不被允许 Operation not permitted. 2679a452ceShoumkh EPERM = 1, 2779a452ceShoumkh /// 没有指定的文件或目录 No such file or directory. 2879a452ceShoumkh ENOENT = 2, 294454d1a2Slogin /// 没有这样的进程 No such process. 3079a452ceShoumkh ESRCH = 3, 3179a452ceShoumkh /// 被中断的函数 Interrupted function. 3279a452ceShoumkh EINTR = 4, 3379a452ceShoumkh /// I/O错误 I/O error. 3479a452ceShoumkh EIO = 5, 3579a452ceShoumkh /// 没有这样的设备或地址 No such device or address. 3679a452ceShoumkh ENXIO = 6, 3779a452ceShoumkh /// 参数列表过长,或者在输出buffer中缺少空间 或者参数比系统内建的最大值要大 Argument list too long. 3879a452ceShoumkh E2BIG = 7, 3979a452ceShoumkh /// 可执行文件格式错误 Executable file format error 4079a452ceShoumkh ENOEXEC = 8, 4179a452ceShoumkh /// 错误的文件描述符 Bad file descriptor. 4279a452ceShoumkh EBADF = 9, 4379a452ceShoumkh /// 没有子进程 No child processes. 4479a452ceShoumkh ECHILD = 10, 4579a452ceShoumkh /// 资源不可用,请重试。 Resource unavailable, try again.(may be the same value as [EWOULDBLOCK]) 4679a452ceShoumkh /// 4779a452ceShoumkh /// 操作将被禁止 Operation would block.(may be the same value as [EAGAIN]). 4879a452ceShoumkh EAGAIN_OR_EWOULDBLOCK = 11, 4979a452ceShoumkh /// 没有足够的空间 Not enough space. 5079a452ceShoumkh ENOMEM = 12, 5179a452ceShoumkh /// 访问被拒绝 Permission denied 5279a452ceShoumkh EACCES = 13, 5379a452ceShoumkh /// 错误的地址 Bad address 5479a452ceShoumkh EFAULT = 14, 5579a452ceShoumkh /// 需要块设备 Block device required 5679a452ceShoumkh ENOTBLK = 15, 5779a452ceShoumkh /// 设备或资源忙 Device or resource busy. 5879a452ceShoumkh EBUSY = 16, 5979a452ceShoumkh /// 文件已存在 File exists. 6079a452ceShoumkh EEXIST = 17, 614454d1a2Slogin /// 跨设备连接 Cross-device link. 6279a452ceShoumkh EXDEV = 18, 6379a452ceShoumkh /// 没有指定的设备 No such device. 6479a452ceShoumkh ENODEV = 19, 6579a452ceShoumkh /// 不是目录 Not a directory. 6679a452ceShoumkh ENOTDIR = 20, 6779a452ceShoumkh /// 是一个目录 Is a directory 6879a452ceShoumkh EISDIR = 21, 6979a452ceShoumkh /// 不可用的参数 Invalid argument. 7079a452ceShoumkh EINVAL = 22, 7179a452ceShoumkh /// 系统中打开的文件过多 Too many files open in system. 7279a452ceShoumkh ENFILE = 23, 7379a452ceShoumkh /// 文件描述符的值过大 File descriptor value too large. 7479a452ceShoumkh EMFILE = 24, 7579a452ceShoumkh /// 不正确的I/O控制操作 Inappropriate I/O control operation. 7679a452ceShoumkh ENOTTY = 25, 7779a452ceShoumkh /// 文本文件忙 Text file busy. 7879a452ceShoumkh ETXTBSY = 26, 7979a452ceShoumkh /// 文件太大 File too large. 8079a452ceShoumkh EFBIG = 27, 8179a452ceShoumkh /// 设备上没有空间 No space left on device. 8279a452ceShoumkh ENOSPC = 28, 8379a452ceShoumkh /// 错误的寻道.当前文件是pipe,不允许seek请求 Invalid seek. 8479a452ceShoumkh ESPIPE = 29, 8579a452ceShoumkh /// 只读的文件系统 Read-only file system. 8679a452ceShoumkh EROFS = 30, 8779a452ceShoumkh /// 链接数过多 Too many links. 8879a452ceShoumkh EMLINK = 31, 8979a452ceShoumkh /// 断开的管道 Broken pipe. 9079a452ceShoumkh EPIPE = 32, 9179a452ceShoumkh /// 数学参数超出作用域 Mathematics argument out of domain of function. 9279a452ceShoumkh EDOM = 33, 9379a452ceShoumkh /// 结果过大 Result too large. 9479a452ceShoumkh ERANGE = 34, 9579a452ceShoumkh /// 资源死锁将要发生 Resource deadlock would occur. 9679a452ceShoumkh EDEADLK = 35, 9779a452ceShoumkh /// 文件名过长 Filename too long. 9879a452ceShoumkh ENAMETOOLONG = 36, 9979a452ceShoumkh /// 没有可用的锁 No locks available. 10079a452ceShoumkh ENOLCK = 37, 10179a452ceShoumkh /// 功能不支持 Function not supported. 10279a452ceShoumkh ENOSYS = 38, 10379a452ceShoumkh /// 目录非空 Directory not empty. 10479a452ceShoumkh ENOTEMPTY = 39, 10579a452ceShoumkh /// 符号链接级别过多 Too many levels of symbolic links. 10679a452ceShoumkh ELOOP = 40, 10779a452ceShoumkh /// 没有期待类型的消息 No message of the desired type. 10879a452ceShoumkh ENOMSG = 41, 10979a452ceShoumkh /// 标志符被移除 Identifier removed. 11079a452ceShoumkh EIDRM = 42, 11179a452ceShoumkh /// 通道号超出范围 Channel number out of range 11279a452ceShoumkh ECHRNG = 43, 11379a452ceShoumkh /// 二级不同步 Level 2 not synchronized 11479a452ceShoumkh EL2NSYNC = 44, 11579a452ceShoumkh /// 三级暂停 Level 3 halted 11679a452ceShoumkh EL3HLT = 45, 11779a452ceShoumkh /// 三级重置 Level 3 reset 11879a452ceShoumkh EL3RST = 46, 11979a452ceShoumkh /// 链接号超出范围 Link number out of range 12079a452ceShoumkh ELNRNG = 47, 12179a452ceShoumkh /// 未连接协议驱动程序 Protocol driver not attached 12279a452ceShoumkh EUNATCH = 48, 12379a452ceShoumkh /// 没有可用的CSI结构 No CSI structure available 12479a452ceShoumkh ENOCSI = 49, 12579a452ceShoumkh /// 二级暂停 Level 2 halted 12679a452ceShoumkh EL2HLT = 50, 12779a452ceShoumkh /// 无效交换 Invalid exchange 12879a452ceShoumkh EBADE = 51, 12979a452ceShoumkh /// 无效的请求描述符 Invalid request descriptor 13079a452ceShoumkh EBADR = 52, 13179a452ceShoumkh /// 交换满 Exchange full 13279a452ceShoumkh EXFULL = 53, 13379a452ceShoumkh /// 无阳极 No anode 13479a452ceShoumkh ENOANO = 54, 13579a452ceShoumkh /// 请求码无效 Invalid request code 13679a452ceShoumkh EBADRQC = 55, 13779a452ceShoumkh /// 无效插槽 Invalid slot 13879a452ceShoumkh EBADSLT = 56, 13979a452ceShoumkh /// 资源死锁 Resource deadlock would occur 14079a452ceShoumkh EDEADLOCK = 57, 14179a452ceShoumkh /// 错误的字体文件格式 Bad font file format 14279a452ceShoumkh EBFONT = 58, 14379a452ceShoumkh /// 不是STREAM Not a STREAM 14479a452ceShoumkh ENOSTR = 59, 14579a452ceShoumkh /// 队列头没有可读取的消息 No message is available on the STREAM head read queue. 14679a452ceShoumkh ENODATA = 60, 14779a452ceShoumkh /// 流式ioctl()超时 Stream ioctl() timeout 14879a452ceShoumkh ETIME = 61, 14979a452ceShoumkh /// 没有STREAM资源 No STREAM resources. 15079a452ceShoumkh ENOSR = 62, 15179a452ceShoumkh /// 机器不在网络上 Machine is not on the network 15279a452ceShoumkh ENONET = 63, 15379a452ceShoumkh /// 未安装软件包 Package not installed 15479a452ceShoumkh ENOPKG = 64, 15579a452ceShoumkh /// 远程对象 Object is remote 15679a452ceShoumkh EREMOTE = 65, 15779a452ceShoumkh /// 保留 Reserved. 15879a452ceShoumkh ENOLINK = 66, 15979a452ceShoumkh /// 外设错误 Advertise error. 16079a452ceShoumkh EADV = 67, 16179a452ceShoumkh /// 安装错误 Srmount error 16279a452ceShoumkh ESRMNT = 68, 16379a452ceShoumkh /// 发送时发生通信错误 Communication error on send 16479a452ceShoumkh ECOMM = 69, 16579a452ceShoumkh /// 协议错误 Protocol error. 16679a452ceShoumkh EPROTO = 70, 16779a452ceShoumkh /// 保留使用 Reserved. 16879a452ceShoumkh EMULTIHOP = 71, 16979a452ceShoumkh /// RFS特定错误 RFS specific error 17079a452ceShoumkh EDOTDOT = 72, 17179a452ceShoumkh /// 错误的消息 Bad message. 17279a452ceShoumkh EBADMSG = 73, 17379a452ceShoumkh /// 数值过大,产生溢出 Value too large to be stored in data type. 17479a452ceShoumkh EOVERFLOW = 74, 17579a452ceShoumkh /// 名称在网络上不是唯一的 Name not unique on network 17679a452ceShoumkh ENOTUNIQ = 75, 17779a452ceShoumkh /// 处于不良状态的文件描述符 File descriptor in bad state 17879a452ceShoumkh EBADFD = 76, 17979a452ceShoumkh /// 远程地址已更改 Remote address changed 18079a452ceShoumkh EREMCHG = 77, 18179a452ceShoumkh /// 无法访问所需的共享库 Can not access a needed shared library 18279a452ceShoumkh ELIBACC = 78, 18379a452ceShoumkh /// 访问损坏的共享库 Accessing a corrupted shared library 18479a452ceShoumkh ELIBBAD = 79, 18579a452ceShoumkh /// a. out中的.lib部分已损坏 .lib section in a.out corrupted 18679a452ceShoumkh ELIBSCN = 80, 18779a452ceShoumkh /// 尝试链接太多共享库 Attempting to link in too many shared libraries 18879a452ceShoumkh ELIBMAX = 81, 18979a452ceShoumkh /// 无法直接执行共享库 Cannot exec a shared library directly 19079a452ceShoumkh ELIBEXEC = 82, 19179a452ceShoumkh /// 不合法的字符序列 Illegal byte sequence. 19279a452ceShoumkh EILSEQ = 83, 19379a452ceShoumkh /// 中断的系统调用应该重新启动 Interrupted system call should be restarted 19479a452ceShoumkh ERESTART = 84, 19579a452ceShoumkh /// 流管道错误 Streams pipe error 19679a452ceShoumkh ESTRPIPE = 85, 19779a452ceShoumkh /// 用户太多 Too many users 19879a452ceShoumkh EUSERS = 86, 19979a452ceShoumkh /// 不是一个套接字 Not a socket. 20079a452ceShoumkh ENOTSOCK = 87, 20179a452ceShoumkh /// 需要目标地址 Destination address required. 20279a452ceShoumkh EDESTADDRREQ = 88, 20379a452ceShoumkh /// 消息过大 Message too large. 20479a452ceShoumkh EMSGSIZE = 89, 20579a452ceShoumkh /// 对于套接字而言,错误的协议 Protocol wrong type for socket. 20679a452ceShoumkh EPROTOTYPE = 90, 20779a452ceShoumkh /// 协议不可用 Protocol not available. 20879a452ceShoumkh ENOPROTOOPT = 91, 20979a452ceShoumkh /// 协议不被支持 Protocol not supported. 21079a452ceShoumkh EPROTONOSUPPORT = 92, 21179a452ceShoumkh /// 不支持套接字类型 Socket type not supported 21279a452ceShoumkh ESOCKTNOSUPPORT = 93, 21379a452ceShoumkh /// 套接字不支持该操作 Operation not supported on socket (may be the same value as [ENOTSUP]). 21479a452ceShoumkh /// 21579a452ceShoumkh /// 不被支持 Not supported (may be the same value as [EOPNOTSUPP]). 21679a452ceShoumkh EOPNOTSUPP_OR_ENOTSUP = 94, 21779a452ceShoumkh /// 不支持协议系列 Protocol family not supported 21879a452ceShoumkh EPFNOSUPPORT = 95, 21979a452ceShoumkh /// 地址family不支持 Address family not supported. 22079a452ceShoumkh EAFNOSUPPORT = 96, 22179a452ceShoumkh /// 地址正在被使用 Address in use. 22279a452ceShoumkh EADDRINUSE = 97, 22379a452ceShoumkh /// 地址不可用 Address not available. 22479a452ceShoumkh EADDRNOTAVAIL = 98, 22579a452ceShoumkh /// 网络已关闭 Network is down. 22679a452ceShoumkh ENETDOWN = 99, 22779a452ceShoumkh /// 网络不可达 Network unreachable. 22879a452ceShoumkh ENETUNREACH = 100, 22979a452ceShoumkh /// 网络连接已断开 Connection aborted by network. 23079a452ceShoumkh ENETRESET = 101, 23179a452ceShoumkh /// 连接已断开 Connection aborted. 23279a452ceShoumkh ECONNABORTED = 102, 23379a452ceShoumkh /// 连接被重置 Connection reset. 23479a452ceShoumkh ECONNRESET = 103, 23579a452ceShoumkh /// 缓冲区空间不足 No buffer space available. 23679a452ceShoumkh ENOBUFS = 104, 23779a452ceShoumkh /// 套接字已连接 Socket is connected. 23879a452ceShoumkh EISCONN = 105, 23979a452ceShoumkh /// 套接字未连接 The socket is not connected. 24079a452ceShoumkh ENOTCONN = 106, 24179a452ceShoumkh /// 传输端点关闭后无法发送 Cannot send after transport endpoint shutdown 24279a452ceShoumkh ESHUTDOWN = 107, 24379a452ceShoumkh /// 引用太多:无法拼接 Too many references: cannot splice 24479a452ceShoumkh ETOOMANYREFS = 108, 24579a452ceShoumkh /// 连接超时 Connection timed out. 24679a452ceShoumkh ETIMEDOUT = 109, 24779a452ceShoumkh /// 连接被拒绝 Connection refused. 24879a452ceShoumkh ECONNREFUSED = 110, 24979a452ceShoumkh /// 主机已关闭 Host is down 25079a452ceShoumkh EHOSTDOWN = 111, 25179a452ceShoumkh /// 主机不可达 Host is unreachable. 25279a452ceShoumkh EHOSTUNREACH = 112, 25379a452ceShoumkh /// 连接已经在处理 Connection already in progress. 25479a452ceShoumkh EALREADY = 113, 25579a452ceShoumkh /// 操作正在处理 Operation in progress. 25679a452ceShoumkh EINPROGRESS = 114, 25779a452ceShoumkh /// 保留 Reserved. 25879a452ceShoumkh ESTALE = 115, 25979a452ceShoumkh /// 结构需要清理 Structure needs cleaning 26079a452ceShoumkh EUCLEAN = 116, 26179a452ceShoumkh /// 不是XENIX命名类型文件 Not a XENIX named type file 26279a452ceShoumkh ENOTNAM = 117, 26379a452ceShoumkh /// 没有可用的XENIX信号量 No XENIX semaphores available 26479a452ceShoumkh ENAVAIL = 118, 26579a452ceShoumkh /// 是命名类型文件 Is a named type file 26679a452ceShoumkh EISNAM = 119, 26779a452ceShoumkh /// 远程I/O错误 Remote I/O error 26879a452ceShoumkh EREMOTEIO = 120, 26979a452ceShoumkh /// 保留使用 Reserved 27079a452ceShoumkh EDQUOT = 121, 27179a452ceShoumkh /// 没有找到媒介 No medium found 27279a452ceShoumkh ENOMEDIUM = 122, 27379a452ceShoumkh /// 介质类型错误 Wrong medium type 27479a452ceShoumkh EMEDIUMTYPE = 123, 27579a452ceShoumkh /// 操作被取消 Operation canceled. 27679a452ceShoumkh ECANCELED = 124, 27779a452ceShoumkh /// 所需的密钥不可用 Required key not available 27879a452ceShoumkh ENOKEY = 125, 27979a452ceShoumkh /// 密钥已过期 Key has expired 28079a452ceShoumkh EKEYEXPIRED = 126, 28179a452ceShoumkh /// 密钥已被撤销 Key has been revoked 28279a452ceShoumkh EKEYREVOKED = 127, 28379a452ceShoumkh /// 密钥被服务拒绝 Key has been revoked 28479a452ceShoumkh EKEYREJECTED = 128, 28579a452ceShoumkh /// 之前的拥有者挂了 Previous owner died. 28679a452ceShoumkh EOWNERDEAD = 129, 28779a452ceShoumkh /// 状态不可恢复 State not recoverable. 28879a452ceShoumkh ENOTRECOVERABLE = 130, 2894454d1a2Slogin } 290676b8ef6SMork 291676b8ef6SMork impl SystemError { 292676b8ef6SMork /// @brief 把posix错误码转换为系统错误枚举类型。 293676b8ef6SMork pub fn from_posix_errno(errno: i32) -> Option<SystemError> { 294676b8ef6SMork // posix 错误码是小于0的 295676b8ef6SMork if errno >= 0 { 296676b8ef6SMork return None; 297676b8ef6SMork } 298676b8ef6SMork return <Self as FromPrimitive>::from_i32(-errno); 299676b8ef6SMork } 300676b8ef6SMork 301676b8ef6SMork /// @brief 把系统错误枚举类型转换为负数posix错误码。 302676b8ef6SMork pub fn to_posix_errno(&self) -> i32 { 303676b8ef6SMork return -<Self as ToPrimitive>::to_i32(self).unwrap(); 304676b8ef6SMork } 305676b8ef6SMork } 306*ab5c8ca4Slogin 307*ab5c8ca4Slogin // 定义系统调用号 308*ab5c8ca4Slogin pub const SYS_PUT_STRING: usize = 1; 309*ab5c8ca4Slogin pub const SYS_OPEN: usize = 2; 310*ab5c8ca4Slogin pub const SYS_CLOSE: usize = 3; 311*ab5c8ca4Slogin pub const SYS_READ: usize = 4; 312*ab5c8ca4Slogin pub const SYS_WRITE: usize = 5; 313*ab5c8ca4Slogin pub const SYS_LSEEK: usize = 6; 314*ab5c8ca4Slogin pub const SYS_FORK: usize = 7; 315*ab5c8ca4Slogin pub const SYS_VFORK: usize = 8; 316*ab5c8ca4Slogin pub const SYS_BRK: usize = 9; 317*ab5c8ca4Slogin pub const SYS_SBRK: usize = 10; 318*ab5c8ca4Slogin 319*ab5c8ca4Slogin pub const SYS_REBOOT: usize = 11; 320*ab5c8ca4Slogin pub const SYS_CHDIR: usize = 12; 321*ab5c8ca4Slogin pub const SYS_GET_DENTS: usize = 13; 322*ab5c8ca4Slogin pub const SYS_EXECVE: usize = 14; 323*ab5c8ca4Slogin pub const SYS_WAIT4: usize = 15; 324*ab5c8ca4Slogin pub const SYS_EXIT: usize = 16; 325*ab5c8ca4Slogin pub const SYS_MKDIR: usize = 17; 326*ab5c8ca4Slogin pub const SYS_NANOSLEEP: usize = 18; 327*ab5c8ca4Slogin /// todo: 该系统调用与Linux不一致,将来需要删除该系统调用!!! 删的时候记得改C版本的libc 328*ab5c8ca4Slogin pub const SYS_CLOCK: usize = 19; 329*ab5c8ca4Slogin pub const SYS_PIPE: usize = 20; 330*ab5c8ca4Slogin 331*ab5c8ca4Slogin /// todo: 该系统调用不是符合POSIX标准的,在将来需要删除!!! 332*ab5c8ca4Slogin pub const SYS_MSTAT: usize = 21; 333*ab5c8ca4Slogin pub const SYS_UNLINK_AT: usize = 22; 334*ab5c8ca4Slogin pub const SYS_KILL: usize = 23; 335*ab5c8ca4Slogin pub const SYS_SIGACTION: usize = 24; 336*ab5c8ca4Slogin pub const SYS_RT_SIGRETURN: usize = 25; 337*ab5c8ca4Slogin pub const SYS_GETPID: usize = 26; 338*ab5c8ca4Slogin pub const SYS_SCHED: usize = 27; 339*ab5c8ca4Slogin pub const SYS_DUP: usize = 28; 340*ab5c8ca4Slogin pub const SYS_DUP2: usize = 29; 341*ab5c8ca4Slogin pub const SYS_SOCKET: usize = 30; 342*ab5c8ca4Slogin 343*ab5c8ca4Slogin pub const SYS_SETSOCKOPT: usize = 31; 344*ab5c8ca4Slogin pub const SYS_GETSOCKOPT: usize = 32; 345*ab5c8ca4Slogin pub const SYS_CONNECT: usize = 33; 346*ab5c8ca4Slogin pub const SYS_BIND: usize = 34; 347*ab5c8ca4Slogin pub const SYS_SENDTO: usize = 35; 348*ab5c8ca4Slogin pub const SYS_RECVFROM: usize = 36; 349*ab5c8ca4Slogin pub const SYS_RECVMSG: usize = 37; 350*ab5c8ca4Slogin pub const SYS_LISTEN: usize = 38; 351*ab5c8ca4Slogin pub const SYS_SHUTDOWN: usize = 39; 352*ab5c8ca4Slogin pub const SYS_ACCEPT: usize = 40; 353*ab5c8ca4Slogin 354*ab5c8ca4Slogin pub const SYS_GETSOCKNAME: usize = 41; 355*ab5c8ca4Slogin pub const SYS_GETPEERNAME: usize = 42; 356*ab5c8ca4Slogin 357*ab5c8ca4Slogin #[derive(Debug)] 358*ab5c8ca4Slogin pub struct Syscall; 359*ab5c8ca4Slogin 360*ab5c8ca4Slogin extern "C" { 361*ab5c8ca4Slogin fn do_put_string(s: *const u8, front_color: u32, back_color: u32) -> usize; 362*ab5c8ca4Slogin } 363*ab5c8ca4Slogin 364*ab5c8ca4Slogin #[no_mangle] 365*ab5c8ca4Slogin pub extern "C" fn syscall_init() -> i32 { 366*ab5c8ca4Slogin kinfo!("Initializing syscall..."); 367*ab5c8ca4Slogin Syscall::init().expect("syscall init failed"); 368*ab5c8ca4Slogin kinfo!("Syscall init successfully!"); 369*ab5c8ca4Slogin return 0; 370*ab5c8ca4Slogin } 371*ab5c8ca4Slogin 372*ab5c8ca4Slogin impl Syscall { 373*ab5c8ca4Slogin /// 初始化系统调用 374*ab5c8ca4Slogin pub fn init() -> Result<(), SystemError> { 375*ab5c8ca4Slogin static INIT_FLAG: AtomicBool = AtomicBool::new(false); 376*ab5c8ca4Slogin let prev = INIT_FLAG.swap(true, Ordering::SeqCst); 377*ab5c8ca4Slogin if prev { 378*ab5c8ca4Slogin panic!("Cannot initialize syscall more than once!"); 379*ab5c8ca4Slogin } 380*ab5c8ca4Slogin return crate::arch::syscall::arch_syscall_init(); 381*ab5c8ca4Slogin } 382*ab5c8ca4Slogin /// @brief 系统调用分发器,用于分发系统调用。 383*ab5c8ca4Slogin /// 384*ab5c8ca4Slogin /// 这个函数内,需要根据系统调用号,调用对应的系统调用处理函数。 385*ab5c8ca4Slogin /// 并且,对于用户态传入的指针参数,需要在本函数内进行越界检查,防止访问到内核空间。 386*ab5c8ca4Slogin pub fn handle(syscall_num: usize, args: &[usize], from_user: bool) -> usize { 387*ab5c8ca4Slogin let r = match syscall_num { 388*ab5c8ca4Slogin SYS_PUT_STRING => { 389*ab5c8ca4Slogin Self::put_string(args[0] as *const u8, args[1] as u32, args[2] as u32) 390*ab5c8ca4Slogin } 391*ab5c8ca4Slogin SYS_OPEN => { 392*ab5c8ca4Slogin let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) }; 393*ab5c8ca4Slogin let path: Result<&str, core::str::Utf8Error> = path.to_str(); 394*ab5c8ca4Slogin let res = if path.is_err() { 395*ab5c8ca4Slogin Err(SystemError::EINVAL) 396*ab5c8ca4Slogin } else { 397*ab5c8ca4Slogin let path: &str = path.unwrap(); 398*ab5c8ca4Slogin let flags = args[1]; 399*ab5c8ca4Slogin let open_flags: FileMode = FileMode::from_bits_truncate(flags as u32); 400*ab5c8ca4Slogin 401*ab5c8ca4Slogin Self::open(path, open_flags) 402*ab5c8ca4Slogin }; 403*ab5c8ca4Slogin // kdebug!("open: {:?}, res: {:?}", path, res); 404*ab5c8ca4Slogin res 405*ab5c8ca4Slogin } 406*ab5c8ca4Slogin SYS_CLOSE => { 407*ab5c8ca4Slogin let fd = args[0]; 408*ab5c8ca4Slogin Self::close(fd) 409*ab5c8ca4Slogin } 410*ab5c8ca4Slogin SYS_READ => { 411*ab5c8ca4Slogin let fd = args[0] as i32; 412*ab5c8ca4Slogin let buf_vaddr = args[1]; 413*ab5c8ca4Slogin let len = args[2]; 414*ab5c8ca4Slogin 415*ab5c8ca4Slogin // 判断缓冲区是否来自用户态,进行权限校验 416*ab5c8ca4Slogin let res = if from_user && unsafe { !verify_area(buf_vaddr as u64, len as u64) } { 417*ab5c8ca4Slogin // 来自用户态,而buffer在内核态,这样的操作不被允许 418*ab5c8ca4Slogin Err(SystemError::EPERM) 419*ab5c8ca4Slogin } else { 420*ab5c8ca4Slogin let buf: &mut [u8] = unsafe { 421*ab5c8ca4Slogin core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len) 422*ab5c8ca4Slogin }; 423*ab5c8ca4Slogin Self::read(fd, buf) 424*ab5c8ca4Slogin }; 425*ab5c8ca4Slogin 426*ab5c8ca4Slogin res 427*ab5c8ca4Slogin } 428*ab5c8ca4Slogin SYS_WRITE => { 429*ab5c8ca4Slogin let fd = args[0] as i32; 430*ab5c8ca4Slogin let buf_vaddr = args[1]; 431*ab5c8ca4Slogin let len = args[2]; 432*ab5c8ca4Slogin 433*ab5c8ca4Slogin // 判断缓冲区是否来自用户态,进行权限校验 434*ab5c8ca4Slogin let res = if from_user && unsafe { !verify_area(buf_vaddr as u64, len as u64) } { 435*ab5c8ca4Slogin // 来自用户态,而buffer在内核态,这样的操作不被允许 436*ab5c8ca4Slogin Err(SystemError::EPERM) 437*ab5c8ca4Slogin } else { 438*ab5c8ca4Slogin let buf: &[u8] = unsafe { 439*ab5c8ca4Slogin core::slice::from_raw_parts::<'static, u8>(buf_vaddr as *const u8, len) 440*ab5c8ca4Slogin }; 441*ab5c8ca4Slogin Self::write(fd, buf) 442*ab5c8ca4Slogin }; 443*ab5c8ca4Slogin 444*ab5c8ca4Slogin res 445*ab5c8ca4Slogin } 446*ab5c8ca4Slogin 447*ab5c8ca4Slogin SYS_LSEEK => { 448*ab5c8ca4Slogin let fd = args[0] as i32; 449*ab5c8ca4Slogin let offset = args[1] as i64; 450*ab5c8ca4Slogin let whence = args[2] as u32; 451*ab5c8ca4Slogin 452*ab5c8ca4Slogin let w = match whence { 453*ab5c8ca4Slogin SEEK_SET => Ok(SeekFrom::SeekSet(offset)), 454*ab5c8ca4Slogin SEEK_CUR => Ok(SeekFrom::SeekCurrent(offset)), 455*ab5c8ca4Slogin SEEK_END => Ok(SeekFrom::SeekEnd(offset)), 456*ab5c8ca4Slogin SEEK_MAX => Ok(SeekFrom::SeekEnd(0)), 457*ab5c8ca4Slogin _ => Err(SystemError::EINVAL), 458*ab5c8ca4Slogin }; 459*ab5c8ca4Slogin 460*ab5c8ca4Slogin let res = if w.is_err() { 461*ab5c8ca4Slogin Err(w.unwrap_err()) 462*ab5c8ca4Slogin } else { 463*ab5c8ca4Slogin let w = w.unwrap(); 464*ab5c8ca4Slogin Self::lseek(fd, w) 465*ab5c8ca4Slogin }; 466*ab5c8ca4Slogin 467*ab5c8ca4Slogin res 468*ab5c8ca4Slogin } 469*ab5c8ca4Slogin 470*ab5c8ca4Slogin SYS_BRK => { 471*ab5c8ca4Slogin let new_brk = args[0]; 472*ab5c8ca4Slogin Self::brk(new_brk) 473*ab5c8ca4Slogin } 474*ab5c8ca4Slogin 475*ab5c8ca4Slogin SYS_SBRK => { 476*ab5c8ca4Slogin let increment = args[0] as isize; 477*ab5c8ca4Slogin Self::sbrk(increment) 478*ab5c8ca4Slogin } 479*ab5c8ca4Slogin 480*ab5c8ca4Slogin SYS_REBOOT => Self::reboot(), 481*ab5c8ca4Slogin 482*ab5c8ca4Slogin SYS_CHDIR => { 483*ab5c8ca4Slogin // Closure for checking arguments 484*ab5c8ca4Slogin let chdir_check = |arg0: usize| { 485*ab5c8ca4Slogin if arg0 == 0 { 486*ab5c8ca4Slogin return Err(SystemError::EFAULT); 487*ab5c8ca4Slogin } 488*ab5c8ca4Slogin let path_ptr = arg0 as *const c_char; 489*ab5c8ca4Slogin // 权限校验 490*ab5c8ca4Slogin if path_ptr.is_null() 491*ab5c8ca4Slogin || (from_user 492*ab5c8ca4Slogin && unsafe { !verify_area(path_ptr as u64, PAGE_2M_SIZE as u64) }) 493*ab5c8ca4Slogin { 494*ab5c8ca4Slogin return Err(SystemError::EINVAL); 495*ab5c8ca4Slogin } 496*ab5c8ca4Slogin let dest_path: &CStr = unsafe { CStr::from_ptr(path_ptr) }; 497*ab5c8ca4Slogin let dest_path: &str = dest_path.to_str().map_err(|_| SystemError::EINVAL)?; 498*ab5c8ca4Slogin if dest_path.len() == 0 { 499*ab5c8ca4Slogin return Err(SystemError::EINVAL); 500*ab5c8ca4Slogin } else if dest_path.len() > PAGE_4K_SIZE as usize { 501*ab5c8ca4Slogin return Err(SystemError::ENAMETOOLONG); 502*ab5c8ca4Slogin } 503*ab5c8ca4Slogin 504*ab5c8ca4Slogin return Ok(dest_path); 505*ab5c8ca4Slogin }; 506*ab5c8ca4Slogin 507*ab5c8ca4Slogin let r: Result<&str, SystemError> = chdir_check(args[0]); 508*ab5c8ca4Slogin if r.is_err() { 509*ab5c8ca4Slogin Err(r.unwrap_err()) 510*ab5c8ca4Slogin } else { 511*ab5c8ca4Slogin Self::chdir(r.unwrap()) 512*ab5c8ca4Slogin } 513*ab5c8ca4Slogin } 514*ab5c8ca4Slogin 515*ab5c8ca4Slogin SYS_GET_DENTS => { 516*ab5c8ca4Slogin let fd = args[0] as i32; 517*ab5c8ca4Slogin let buf_vaddr = args[1]; 518*ab5c8ca4Slogin let len = args[2]; 519*ab5c8ca4Slogin 520*ab5c8ca4Slogin // 判断缓冲区是否来自用户态,进行权限校验 521*ab5c8ca4Slogin let res = if from_user && unsafe { !verify_area(buf_vaddr as u64, len as u64) } { 522*ab5c8ca4Slogin // 来自用户态,而buffer在内核态,这样的操作不被允许 523*ab5c8ca4Slogin Err(SystemError::EPERM) 524*ab5c8ca4Slogin } else if buf_vaddr == 0 { 525*ab5c8ca4Slogin Err(SystemError::EFAULT) 526*ab5c8ca4Slogin } else { 527*ab5c8ca4Slogin let buf: &mut [u8] = unsafe { 528*ab5c8ca4Slogin core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len) 529*ab5c8ca4Slogin }; 530*ab5c8ca4Slogin Self::getdents(fd, buf) 531*ab5c8ca4Slogin }; 532*ab5c8ca4Slogin 533*ab5c8ca4Slogin res 534*ab5c8ca4Slogin } 535*ab5c8ca4Slogin 536*ab5c8ca4Slogin SYS_EXECVE => { 537*ab5c8ca4Slogin let path_ptr = args[0]; 538*ab5c8ca4Slogin let argv_ptr = args[1]; 539*ab5c8ca4Slogin let env_ptr = args[2]; 540*ab5c8ca4Slogin 541*ab5c8ca4Slogin // 权限校验 542*ab5c8ca4Slogin if from_user 543*ab5c8ca4Slogin && (unsafe { !verify_area(path_ptr as u64, PAGE_4K_SIZE as u64) } 544*ab5c8ca4Slogin || unsafe { !verify_area(argv_ptr as u64, PAGE_4K_SIZE as u64) }) 545*ab5c8ca4Slogin || unsafe { !verify_area(env_ptr as u64, PAGE_4K_SIZE as u64) } 546*ab5c8ca4Slogin { 547*ab5c8ca4Slogin Err(SystemError::EFAULT) 548*ab5c8ca4Slogin } else { 549*ab5c8ca4Slogin Self::execve( 550*ab5c8ca4Slogin path_ptr as *const c_void, 551*ab5c8ca4Slogin argv_ptr as *const *const c_void, 552*ab5c8ca4Slogin env_ptr as *const *const c_void, 553*ab5c8ca4Slogin ) 554*ab5c8ca4Slogin } 555*ab5c8ca4Slogin } 556*ab5c8ca4Slogin SYS_WAIT4 => { 557*ab5c8ca4Slogin let pid = args[0] as pid_t; 558*ab5c8ca4Slogin let wstatus = args[1] as *mut c_int; 559*ab5c8ca4Slogin let options = args[2] as c_int; 560*ab5c8ca4Slogin let rusage = args[3] as *mut c_void; 561*ab5c8ca4Slogin 562*ab5c8ca4Slogin // 权限校验 563*ab5c8ca4Slogin // todo: 引入rusage之后,更正以下权限校验代码中,rusage的大小 564*ab5c8ca4Slogin if from_user 565*ab5c8ca4Slogin && (unsafe { 566*ab5c8ca4Slogin !verify_area(wstatus as u64, core::mem::size_of::<c_int>() as u64) 567*ab5c8ca4Slogin } || unsafe { !verify_area(rusage as u64, PAGE_4K_SIZE as u64) }) 568*ab5c8ca4Slogin { 569*ab5c8ca4Slogin Err(SystemError::EFAULT) 570*ab5c8ca4Slogin } else { 571*ab5c8ca4Slogin Self::wait4(pid, wstatus, options, rusage) 572*ab5c8ca4Slogin } 573*ab5c8ca4Slogin } 574*ab5c8ca4Slogin 575*ab5c8ca4Slogin SYS_EXIT => { 576*ab5c8ca4Slogin let exit_code = args[0]; 577*ab5c8ca4Slogin Self::exit(exit_code) 578*ab5c8ca4Slogin } 579*ab5c8ca4Slogin SYS_MKDIR => { 580*ab5c8ca4Slogin let path_ptr = args[0] as *const c_char; 581*ab5c8ca4Slogin let mode = args[1]; 582*ab5c8ca4Slogin 583*ab5c8ca4Slogin let security_check = || { 584*ab5c8ca4Slogin if path_ptr.is_null() 585*ab5c8ca4Slogin || (from_user 586*ab5c8ca4Slogin && unsafe { !verify_area(path_ptr as u64, PAGE_2M_SIZE as u64) }) 587*ab5c8ca4Slogin { 588*ab5c8ca4Slogin return Err(SystemError::EINVAL); 589*ab5c8ca4Slogin } 590*ab5c8ca4Slogin let path: &CStr = unsafe { CStr::from_ptr(path_ptr) }; 591*ab5c8ca4Slogin let path: &str = path.to_str().map_err(|_| SystemError::EINVAL)?.trim(); 592*ab5c8ca4Slogin 593*ab5c8ca4Slogin if path == "" { 594*ab5c8ca4Slogin return Err(SystemError::EINVAL); 595*ab5c8ca4Slogin } 596*ab5c8ca4Slogin return Ok(path); 597*ab5c8ca4Slogin }; 598*ab5c8ca4Slogin 599*ab5c8ca4Slogin let path = security_check(); 600*ab5c8ca4Slogin if path.is_err() { 601*ab5c8ca4Slogin Err(path.unwrap_err()) 602*ab5c8ca4Slogin } else { 603*ab5c8ca4Slogin Self::mkdir(path.unwrap(), mode) 604*ab5c8ca4Slogin } 605*ab5c8ca4Slogin } 606*ab5c8ca4Slogin 607*ab5c8ca4Slogin SYS_NANOSLEEP => { 608*ab5c8ca4Slogin let req = args[0] as *const TimeSpec; 609*ab5c8ca4Slogin let rem = args[1] as *mut TimeSpec; 610*ab5c8ca4Slogin if from_user 611*ab5c8ca4Slogin && (unsafe { 612*ab5c8ca4Slogin !verify_area(req as u64, core::mem::size_of::<TimeSpec>() as u64) 613*ab5c8ca4Slogin } || unsafe { 614*ab5c8ca4Slogin !verify_area(rem as u64, core::mem::size_of::<TimeSpec>() as u64) 615*ab5c8ca4Slogin }) 616*ab5c8ca4Slogin { 617*ab5c8ca4Slogin Err(SystemError::EFAULT) 618*ab5c8ca4Slogin } else { 619*ab5c8ca4Slogin Self::nanosleep(req, rem) 620*ab5c8ca4Slogin } 621*ab5c8ca4Slogin } 622*ab5c8ca4Slogin 623*ab5c8ca4Slogin SYS_CLOCK => Self::clock(), 624*ab5c8ca4Slogin SYS_PIPE => { 625*ab5c8ca4Slogin let pipefd = args[0] as *mut c_int; 626*ab5c8ca4Slogin if from_user 627*ab5c8ca4Slogin && unsafe { 628*ab5c8ca4Slogin !verify_area(pipefd as u64, core::mem::size_of::<[c_int; 2]>() as u64) 629*ab5c8ca4Slogin } 630*ab5c8ca4Slogin { 631*ab5c8ca4Slogin Err(SystemError::EFAULT) 632*ab5c8ca4Slogin } else if pipefd.is_null() { 633*ab5c8ca4Slogin Err(SystemError::EFAULT) 634*ab5c8ca4Slogin } else { 635*ab5c8ca4Slogin let pipefd = unsafe { core::slice::from_raw_parts_mut(pipefd, 2) }; 636*ab5c8ca4Slogin Self::pipe(pipefd) 637*ab5c8ca4Slogin } 638*ab5c8ca4Slogin } 639*ab5c8ca4Slogin 640*ab5c8ca4Slogin SYS_MSTAT => { 641*ab5c8ca4Slogin let dst = args[0] as *mut mm_stat_t; 642*ab5c8ca4Slogin if from_user 643*ab5c8ca4Slogin && unsafe { !verify_area(dst as u64, core::mem::size_of::<mm_stat_t>() as u64) } 644*ab5c8ca4Slogin { 645*ab5c8ca4Slogin Err(SystemError::EFAULT) 646*ab5c8ca4Slogin } else if dst.is_null() { 647*ab5c8ca4Slogin Err(SystemError::EFAULT) 648*ab5c8ca4Slogin } else { 649*ab5c8ca4Slogin Self::mstat(dst, from_user) 650*ab5c8ca4Slogin } 651*ab5c8ca4Slogin } 652*ab5c8ca4Slogin SYS_UNLINK_AT => { 653*ab5c8ca4Slogin let dirfd = args[0] as i32; 654*ab5c8ca4Slogin let pathname = args[1] as *const c_char; 655*ab5c8ca4Slogin let flags = args[2] as u32; 656*ab5c8ca4Slogin if from_user && unsafe { !verify_area(pathname as u64, PAGE_4K_SIZE as u64) } { 657*ab5c8ca4Slogin Err(SystemError::EFAULT) 658*ab5c8ca4Slogin } else if pathname.is_null() { 659*ab5c8ca4Slogin Err(SystemError::EFAULT) 660*ab5c8ca4Slogin } else { 661*ab5c8ca4Slogin let get_path = || { 662*ab5c8ca4Slogin let pathname: &CStr = unsafe { CStr::from_ptr(pathname) }; 663*ab5c8ca4Slogin 664*ab5c8ca4Slogin let pathname: &str = pathname.to_str().map_err(|_| SystemError::EINVAL)?; 665*ab5c8ca4Slogin if pathname.len() >= MAX_PATHLEN { 666*ab5c8ca4Slogin return Err(SystemError::ENAMETOOLONG); 667*ab5c8ca4Slogin } 668*ab5c8ca4Slogin return Ok(pathname.trim()); 669*ab5c8ca4Slogin }; 670*ab5c8ca4Slogin let pathname = get_path(); 671*ab5c8ca4Slogin if pathname.is_err() { 672*ab5c8ca4Slogin Err(pathname.unwrap_err()) 673*ab5c8ca4Slogin } else { 674*ab5c8ca4Slogin Self::unlinkat(dirfd, pathname.unwrap(), flags) 675*ab5c8ca4Slogin } 676*ab5c8ca4Slogin } 677*ab5c8ca4Slogin } 678*ab5c8ca4Slogin SYS_KILL => { 679*ab5c8ca4Slogin let pid = args[0] as pid_t; 680*ab5c8ca4Slogin let sig = args[1] as c_int; 681*ab5c8ca4Slogin 682*ab5c8ca4Slogin Self::kill(pid, sig) 683*ab5c8ca4Slogin } 684*ab5c8ca4Slogin 685*ab5c8ca4Slogin SYS_SIGACTION => { 686*ab5c8ca4Slogin let sig = args[0] as c_int; 687*ab5c8ca4Slogin let act = args[1]; 688*ab5c8ca4Slogin let old_act = args[2]; 689*ab5c8ca4Slogin Self::sigaction(sig, act, old_act, from_user) 690*ab5c8ca4Slogin } 691*ab5c8ca4Slogin 692*ab5c8ca4Slogin SYS_RT_SIGRETURN => { 693*ab5c8ca4Slogin // 由于目前signal机制的实现,与x86_64强关联,因此暂时在arch/x86_64/syscall.rs中调用 694*ab5c8ca4Slogin // todo: 未来需要将signal机制与平台解耦 695*ab5c8ca4Slogin todo!() 696*ab5c8ca4Slogin } 697*ab5c8ca4Slogin 698*ab5c8ca4Slogin SYS_GETPID => Self::getpid(), 699*ab5c8ca4Slogin 700*ab5c8ca4Slogin SYS_SCHED => Self::sched(from_user), 701*ab5c8ca4Slogin SYS_DUP => { 702*ab5c8ca4Slogin let oldfd: i32 = args[0] as c_int; 703*ab5c8ca4Slogin Self::dup(oldfd) 704*ab5c8ca4Slogin } 705*ab5c8ca4Slogin SYS_DUP2 => { 706*ab5c8ca4Slogin let oldfd: i32 = args[0] as c_int; 707*ab5c8ca4Slogin let newfd: i32 = args[1] as c_int; 708*ab5c8ca4Slogin Self::dup2(oldfd, newfd) 709*ab5c8ca4Slogin } 710*ab5c8ca4Slogin 711*ab5c8ca4Slogin SYS_SOCKET => Self::socket(args[0], args[1], args[2]), 712*ab5c8ca4Slogin SYS_SETSOCKOPT => { 713*ab5c8ca4Slogin let optval = args[3] as *const u8; 714*ab5c8ca4Slogin let optlen = args[4] as usize; 715*ab5c8ca4Slogin // 验证optval的地址是否合法 716*ab5c8ca4Slogin if unsafe { verify_area(optval as u64, optlen as u64) } == false { 717*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 718*ab5c8ca4Slogin Err(SystemError::EFAULT) 719*ab5c8ca4Slogin } else { 720*ab5c8ca4Slogin let data: &[u8] = unsafe { core::slice::from_raw_parts(optval, optlen) }; 721*ab5c8ca4Slogin Self::setsockopt(args[0], args[1], args[2], data) 722*ab5c8ca4Slogin } 723*ab5c8ca4Slogin } 724*ab5c8ca4Slogin SYS_GETSOCKOPT => { 725*ab5c8ca4Slogin let optval = args[3] as *mut u8; 726*ab5c8ca4Slogin let optlen = args[4] as *mut usize; 727*ab5c8ca4Slogin 728*ab5c8ca4Slogin let security_check = || { 729*ab5c8ca4Slogin // 验证optval的地址是否合法 730*ab5c8ca4Slogin if unsafe { verify_area(optval as u64, PAGE_4K_SIZE as u64) } == false { 731*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 732*ab5c8ca4Slogin return Err(SystemError::EFAULT); 733*ab5c8ca4Slogin } 734*ab5c8ca4Slogin 735*ab5c8ca4Slogin // 验证optlen的地址是否合法 736*ab5c8ca4Slogin if unsafe { verify_area(optlen as u64, core::mem::size_of::<u32>() as u64) } 737*ab5c8ca4Slogin == false 738*ab5c8ca4Slogin { 739*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 740*ab5c8ca4Slogin return Err(SystemError::EFAULT); 741*ab5c8ca4Slogin } 742*ab5c8ca4Slogin return Ok(()); 743*ab5c8ca4Slogin }; 744*ab5c8ca4Slogin let r = security_check(); 745*ab5c8ca4Slogin if r.is_err() { 746*ab5c8ca4Slogin Err(r.unwrap_err()) 747*ab5c8ca4Slogin } else { 748*ab5c8ca4Slogin Self::getsockopt(args[0], args[1], args[2], optval, optlen as *mut u32) 749*ab5c8ca4Slogin } 750*ab5c8ca4Slogin } 751*ab5c8ca4Slogin 752*ab5c8ca4Slogin SYS_CONNECT => { 753*ab5c8ca4Slogin let addr = args[1] as *const SockAddr; 754*ab5c8ca4Slogin let addrlen = args[2] as usize; 755*ab5c8ca4Slogin // 验证addr的地址是否合法 756*ab5c8ca4Slogin if unsafe { verify_area(addr as u64, addrlen as u64) } == false { 757*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 758*ab5c8ca4Slogin Err(SystemError::EFAULT) 759*ab5c8ca4Slogin } else { 760*ab5c8ca4Slogin Self::connect(args[0], addr, addrlen) 761*ab5c8ca4Slogin } 762*ab5c8ca4Slogin } 763*ab5c8ca4Slogin SYS_BIND => { 764*ab5c8ca4Slogin let addr = args[1] as *const SockAddr; 765*ab5c8ca4Slogin let addrlen = args[2] as usize; 766*ab5c8ca4Slogin // 验证addr的地址是否合法 767*ab5c8ca4Slogin if unsafe { verify_area(addr as u64, addrlen as u64) } == false { 768*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 769*ab5c8ca4Slogin Err(SystemError::EFAULT) 770*ab5c8ca4Slogin } else { 771*ab5c8ca4Slogin Self::bind(args[0], addr, addrlen) 772*ab5c8ca4Slogin } 773*ab5c8ca4Slogin } 774*ab5c8ca4Slogin 775*ab5c8ca4Slogin SYS_SENDTO => { 776*ab5c8ca4Slogin let buf = args[1] as *const u8; 777*ab5c8ca4Slogin let len = args[2] as usize; 778*ab5c8ca4Slogin let flags = args[3] as u32; 779*ab5c8ca4Slogin let addr = args[4] as *const SockAddr; 780*ab5c8ca4Slogin let addrlen = args[5] as usize; 781*ab5c8ca4Slogin // 验证buf的地址是否合法 782*ab5c8ca4Slogin if unsafe { verify_area(buf as u64, len as u64) } == false { 783*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 784*ab5c8ca4Slogin Err(SystemError::EFAULT) 785*ab5c8ca4Slogin } else if unsafe { verify_area(addr as u64, addrlen as u64) } == false { 786*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 787*ab5c8ca4Slogin Err(SystemError::EFAULT) 788*ab5c8ca4Slogin } else { 789*ab5c8ca4Slogin let data: &[u8] = unsafe { core::slice::from_raw_parts(buf, len) }; 790*ab5c8ca4Slogin Self::sendto(args[0], data, flags, addr, addrlen) 791*ab5c8ca4Slogin } 792*ab5c8ca4Slogin } 793*ab5c8ca4Slogin 794*ab5c8ca4Slogin SYS_RECVFROM => { 795*ab5c8ca4Slogin let buf = args[1] as *mut u8; 796*ab5c8ca4Slogin let len = args[2] as usize; 797*ab5c8ca4Slogin let flags = args[3] as u32; 798*ab5c8ca4Slogin let addr = args[4] as *mut SockAddr; 799*ab5c8ca4Slogin let addrlen = args[5] as *mut usize; 800*ab5c8ca4Slogin 801*ab5c8ca4Slogin let security_check = || { 802*ab5c8ca4Slogin // 验证buf的地址是否合法 803*ab5c8ca4Slogin if unsafe { verify_area(buf as u64, len as u64) } == false { 804*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 805*ab5c8ca4Slogin return Err(SystemError::EFAULT); 806*ab5c8ca4Slogin } 807*ab5c8ca4Slogin 808*ab5c8ca4Slogin // 验证addrlen的地址是否合法 809*ab5c8ca4Slogin if unsafe { verify_area(addrlen as u64, core::mem::size_of::<u32>() as u64) } 810*ab5c8ca4Slogin == false 811*ab5c8ca4Slogin { 812*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 813*ab5c8ca4Slogin return Err(SystemError::EFAULT); 814*ab5c8ca4Slogin } 815*ab5c8ca4Slogin 816*ab5c8ca4Slogin if unsafe { verify_area(addr as u64, core::mem::size_of::<SockAddr>() as u64) } 817*ab5c8ca4Slogin == false 818*ab5c8ca4Slogin { 819*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 820*ab5c8ca4Slogin return Err(SystemError::EFAULT); 821*ab5c8ca4Slogin } 822*ab5c8ca4Slogin return Ok(()); 823*ab5c8ca4Slogin }; 824*ab5c8ca4Slogin let r = security_check(); 825*ab5c8ca4Slogin if r.is_err() { 826*ab5c8ca4Slogin Err(r.unwrap_err()) 827*ab5c8ca4Slogin } else { 828*ab5c8ca4Slogin let buf = unsafe { core::slice::from_raw_parts_mut(buf, len) }; 829*ab5c8ca4Slogin Self::recvfrom(args[0], buf, flags, addr, addrlen as *mut u32) 830*ab5c8ca4Slogin } 831*ab5c8ca4Slogin } 832*ab5c8ca4Slogin 833*ab5c8ca4Slogin SYS_RECVMSG => { 834*ab5c8ca4Slogin let msg = args[1] as *mut crate::net::syscall::MsgHdr; 835*ab5c8ca4Slogin let flags = args[2] as u32; 836*ab5c8ca4Slogin let security_check = || { 837*ab5c8ca4Slogin // 验证msg的地址是否合法 838*ab5c8ca4Slogin if unsafe { 839*ab5c8ca4Slogin verify_area( 840*ab5c8ca4Slogin msg as u64, 841*ab5c8ca4Slogin core::mem::size_of::<crate::net::syscall::MsgHdr>() as u64, 842*ab5c8ca4Slogin ) 843*ab5c8ca4Slogin } == false 844*ab5c8ca4Slogin { 845*ab5c8ca4Slogin // 地址空间超出了用户空间的范围,不合法 846*ab5c8ca4Slogin return Err(SystemError::EFAULT); 847*ab5c8ca4Slogin } 848*ab5c8ca4Slogin let msg = unsafe { msg.as_mut() }.ok_or(SystemError::EFAULT)?; 849*ab5c8ca4Slogin return Ok(msg); 850*ab5c8ca4Slogin }; 851*ab5c8ca4Slogin let r = security_check(); 852*ab5c8ca4Slogin if r.is_err() { 853*ab5c8ca4Slogin Err(r.unwrap_err()) 854*ab5c8ca4Slogin } else { 855*ab5c8ca4Slogin let msg = r.unwrap(); 856*ab5c8ca4Slogin Self::recvmsg(args[0], msg, flags) 857*ab5c8ca4Slogin } 858*ab5c8ca4Slogin } 859*ab5c8ca4Slogin 860*ab5c8ca4Slogin SYS_LISTEN => Self::listen(args[0], args[1]), 861*ab5c8ca4Slogin SYS_SHUTDOWN => Self::shutdown(args[0], args[1]), 862*ab5c8ca4Slogin SYS_ACCEPT => Self::accept(args[0], args[1] as *mut SockAddr, args[2] as *mut u32), 863*ab5c8ca4Slogin SYS_GETSOCKNAME => { 864*ab5c8ca4Slogin Self::getsockname(args[0], args[1] as *mut SockAddr, args[2] as *mut u32) 865*ab5c8ca4Slogin } 866*ab5c8ca4Slogin SYS_GETPEERNAME => { 867*ab5c8ca4Slogin Self::getpeername(args[0], args[1] as *mut SockAddr, args[2] as *mut u32) 868*ab5c8ca4Slogin } 869*ab5c8ca4Slogin _ => panic!("Unsupported syscall ID: {}", syscall_num), 870*ab5c8ca4Slogin }; 871*ab5c8ca4Slogin 872*ab5c8ca4Slogin let r = r.unwrap_or_else(|e| e.to_posix_errno() as usize); 873*ab5c8ca4Slogin return r; 874*ab5c8ca4Slogin } 875*ab5c8ca4Slogin 876*ab5c8ca4Slogin pub fn put_string( 877*ab5c8ca4Slogin s: *const u8, 878*ab5c8ca4Slogin front_color: u32, 879*ab5c8ca4Slogin back_color: u32, 880*ab5c8ca4Slogin ) -> Result<usize, SystemError> { 881*ab5c8ca4Slogin return Ok(unsafe { do_put_string(s, front_color, back_color) }); 882*ab5c8ca4Slogin } 883*ab5c8ca4Slogin 884*ab5c8ca4Slogin pub fn reboot() -> Result<usize, SystemError> { 885*ab5c8ca4Slogin cpu_reset(); 886*ab5c8ca4Slogin } 887*ab5c8ca4Slogin } 888