xref: /DragonOS/kernel/src/syscall/mod.rs (revision ad1d649eddee4aa8ac81b2f44bc99da462a6a813)
1ab5c8ca4Slogin use core::{
2ab5c8ca4Slogin     ffi::{c_char, c_int, c_void, CStr},
3ab5c8ca4Slogin     sync::atomic::{AtomicBool, Ordering},
4ab5c8ca4Slogin };
5ab5c8ca4Slogin 
640314b30SXiaoye Zheng use crate::kdebug;
740314b30SXiaoye Zheng 
8676b8ef6SMork use num_traits::{FromPrimitive, ToPrimitive};
9676b8ef6SMork 
10ab5c8ca4Slogin use crate::{
111496ba7bSLoGin     arch::{cpu::cpu_reset, interrupt::TrapFrame, MMArch},
122dbef785SGnoCiYeH     driver::base::{block::SeekFrom, device::DeviceNumber},
13ab5c8ca4Slogin     filesystem::vfs::{
146d81180bSLoGin         fcntl::FcntlCommand,
15ab5c8ca4Slogin         file::FileMode,
162dbef785SGnoCiYeH         syscall::{ModeType, PosixKstat, SEEK_CUR, SEEK_END, SEEK_MAX, SEEK_SET},
17ab5c8ca4Slogin         MAX_PATHLEN,
18ab5c8ca4Slogin     },
191496ba7bSLoGin     include::bindings::bindings::{PAGE_2M_SIZE, PAGE_4K_SIZE},
20aa0367d6SLoGin     kinfo,
2140fe15e0SLoGin     libs::align::page_align_up,
22be63f3b2Shoumkh     mm::{verify_area, MemoryManagementArch, VirtAddr},
23ab5c8ca4Slogin     net::syscall::SockAddr,
241496ba7bSLoGin     process::Pid,
2536fd0130Shoumkh     time::{
2640fe15e0SLoGin         syscall::{PosixTimeZone, PosixTimeval},
2736fd0130Shoumkh         TimeSpec,
2836fd0130Shoumkh     },
29ab5c8ca4Slogin };
30ab5c8ca4Slogin 
319e9ffedfSPlucky923 use self::user_access::{UserBufferReader, UserBufferWriter};
324537ffb7SChiichen 
3340fe15e0SLoGin pub mod user_access;
3440fe15e0SLoGin 
354454d1a2Slogin #[repr(i32)]
36676b8ef6SMork #[derive(Debug, FromPrimitive, ToPrimitive, PartialEq, Eq, Clone)]
3779a452ceShoumkh #[allow(dead_code, non_camel_case_types)]
384454d1a2Slogin pub enum SystemError {
3979a452ceShoumkh     EPERM = 1,
4079a452ceShoumkh     /// 没有指定的文件或目录 No such file or directory.
4179a452ceShoumkh     ENOENT = 2,
424454d1a2Slogin     /// 没有这样的进程 No such process.
4379a452ceShoumkh     ESRCH = 3,
4479a452ceShoumkh     /// 被中断的函数 Interrupted function.
4579a452ceShoumkh     EINTR = 4,
4679a452ceShoumkh     /// I/O错误 I/O error.
4779a452ceShoumkh     EIO = 5,
4879a452ceShoumkh     /// 没有这样的设备或地址 No such device or address.
4979a452ceShoumkh     ENXIO = 6,
5079a452ceShoumkh     /// 参数列表过长,或者在输出buffer中缺少空间 或者参数比系统内建的最大值要大 Argument list too long.
5179a452ceShoumkh     E2BIG = 7,
5279a452ceShoumkh     /// 可执行文件格式错误 Executable file format error
5379a452ceShoumkh     ENOEXEC = 8,
5479a452ceShoumkh     /// 错误的文件描述符 Bad file descriptor.
5579a452ceShoumkh     EBADF = 9,
5679a452ceShoumkh     /// 没有子进程 No child processes.
5779a452ceShoumkh     ECHILD = 10,
5879a452ceShoumkh     /// 资源不可用,请重试。 Resource unavailable, try again.(may be the same value as [EWOULDBLOCK])
5979a452ceShoumkh     ///
6079a452ceShoumkh     /// 操作将被禁止 Operation would block.(may be the same value as [EAGAIN]).
6179a452ceShoumkh     EAGAIN_OR_EWOULDBLOCK = 11,
6279a452ceShoumkh     /// 没有足够的空间 Not enough space.
6379a452ceShoumkh     ENOMEM = 12,
6479a452ceShoumkh     /// 访问被拒绝 Permission denied
6579a452ceShoumkh     EACCES = 13,
6679a452ceShoumkh     /// 错误的地址 Bad address
6779a452ceShoumkh     EFAULT = 14,
6879a452ceShoumkh     /// 需要块设备 Block device required
6979a452ceShoumkh     ENOTBLK = 15,
7079a452ceShoumkh     /// 设备或资源忙 Device or resource busy.
7179a452ceShoumkh     EBUSY = 16,
7279a452ceShoumkh     /// 文件已存在 File exists.
7379a452ceShoumkh     EEXIST = 17,
744454d1a2Slogin     /// 跨设备连接 Cross-device link.
7579a452ceShoumkh     EXDEV = 18,
7679a452ceShoumkh     /// 没有指定的设备 No such device.
7779a452ceShoumkh     ENODEV = 19,
7879a452ceShoumkh     /// 不是目录 Not a directory.
7979a452ceShoumkh     ENOTDIR = 20,
8079a452ceShoumkh     /// 是一个目录 Is a directory
8179a452ceShoumkh     EISDIR = 21,
8279a452ceShoumkh     /// 不可用的参数 Invalid argument.
8379a452ceShoumkh     EINVAL = 22,
8479a452ceShoumkh     /// 系统中打开的文件过多 Too many files open in system.
8579a452ceShoumkh     ENFILE = 23,
8679a452ceShoumkh     /// 文件描述符的值过大 File descriptor value too large.
8779a452ceShoumkh     EMFILE = 24,
8879a452ceShoumkh     /// 不正确的I/O控制操作 Inappropriate I/O control operation.
8979a452ceShoumkh     ENOTTY = 25,
9079a452ceShoumkh     /// 文本文件忙 Text file busy.
9179a452ceShoumkh     ETXTBSY = 26,
9279a452ceShoumkh     /// 文件太大 File too large.
9379a452ceShoumkh     EFBIG = 27,
9479a452ceShoumkh     /// 设备上没有空间 No space left on device.
9579a452ceShoumkh     ENOSPC = 28,
9679a452ceShoumkh     /// 错误的寻道.当前文件是pipe,不允许seek请求  Invalid seek.
9779a452ceShoumkh     ESPIPE = 29,
9879a452ceShoumkh     /// 只读的文件系统 Read-only file system.
9979a452ceShoumkh     EROFS = 30,
10079a452ceShoumkh     /// 链接数过多 Too many links.
10179a452ceShoumkh     EMLINK = 31,
10279a452ceShoumkh     /// 断开的管道 Broken pipe.
10379a452ceShoumkh     EPIPE = 32,
10479a452ceShoumkh     /// 数学参数超出作用域 Mathematics argument out of domain of function.
10579a452ceShoumkh     EDOM = 33,
10679a452ceShoumkh     /// 结果过大 Result too large.
10779a452ceShoumkh     ERANGE = 34,
10879a452ceShoumkh     /// 资源死锁将要发生 Resource deadlock would occur.
10979a452ceShoumkh     EDEADLK = 35,
11079a452ceShoumkh     /// 文件名过长 Filename too long.
11179a452ceShoumkh     ENAMETOOLONG = 36,
11279a452ceShoumkh     /// 没有可用的锁 No locks available.
11379a452ceShoumkh     ENOLCK = 37,
11479a452ceShoumkh     /// 功能不支持 Function not supported.
11579a452ceShoumkh     ENOSYS = 38,
11679a452ceShoumkh     /// 目录非空 Directory not empty.
11779a452ceShoumkh     ENOTEMPTY = 39,
11879a452ceShoumkh     /// 符号链接级别过多 Too many levels of symbolic links.
11979a452ceShoumkh     ELOOP = 40,
12079a452ceShoumkh     /// 没有期待类型的消息 No message of the desired type.
12179a452ceShoumkh     ENOMSG = 41,
12279a452ceShoumkh     /// 标志符被移除 Identifier removed.
12379a452ceShoumkh     EIDRM = 42,
12479a452ceShoumkh     /// 通道号超出范围 Channel number out of range
12579a452ceShoumkh     ECHRNG = 43,
12679a452ceShoumkh     /// 二级不同步 Level 2 not synchronized
12779a452ceShoumkh     EL2NSYNC = 44,
12879a452ceShoumkh     /// 三级暂停 Level 3 halted
12979a452ceShoumkh     EL3HLT = 45,
13079a452ceShoumkh     /// 三级重置 Level 3 reset
13179a452ceShoumkh     EL3RST = 46,
13279a452ceShoumkh     /// 链接号超出范围 Link number out of range
13379a452ceShoumkh     ELNRNG = 47,
13479a452ceShoumkh     /// 未连接协议驱动程序 Protocol driver not attached
13579a452ceShoumkh     EUNATCH = 48,
13679a452ceShoumkh     /// 没有可用的CSI结构 No CSI structure available
13779a452ceShoumkh     ENOCSI = 49,
13879a452ceShoumkh     /// 二级暂停 Level 2 halted
13979a452ceShoumkh     EL2HLT = 50,
14079a452ceShoumkh     /// 无效交换 Invalid exchange
14179a452ceShoumkh     EBADE = 51,
14279a452ceShoumkh     /// 无效的请求描述符 Invalid request descriptor
14379a452ceShoumkh     EBADR = 52,
14479a452ceShoumkh     /// 交换满 Exchange full
14579a452ceShoumkh     EXFULL = 53,
14679a452ceShoumkh     /// 无阳极 No anode
14779a452ceShoumkh     ENOANO = 54,
14879a452ceShoumkh     /// 请求码无效 Invalid request code
14979a452ceShoumkh     EBADRQC = 55,
15079a452ceShoumkh     /// 无效插槽 Invalid slot
15179a452ceShoumkh     EBADSLT = 56,
15279a452ceShoumkh     /// 资源死锁 Resource deadlock would occur
15379a452ceShoumkh     EDEADLOCK = 57,
15479a452ceShoumkh     /// 错误的字体文件格式 Bad font file format
15579a452ceShoumkh     EBFONT = 58,
15679a452ceShoumkh     /// 不是STREAM Not a STREAM
15779a452ceShoumkh     ENOSTR = 59,
15879a452ceShoumkh     /// 队列头没有可读取的消息 No message is available on the STREAM head read queue.
15979a452ceShoumkh     ENODATA = 60,
16079a452ceShoumkh     /// 流式ioctl()超时 Stream ioctl() timeout
16179a452ceShoumkh     ETIME = 61,
16279a452ceShoumkh     /// 没有STREAM资源  No STREAM resources.
16379a452ceShoumkh     ENOSR = 62,
16479a452ceShoumkh     /// 机器不在网络上 Machine is not on the network
16579a452ceShoumkh     ENONET = 63,
16679a452ceShoumkh     /// 未安装软件包 Package not installed
16779a452ceShoumkh     ENOPKG = 64,
16879a452ceShoumkh     /// 远程对象 Object is remote
16979a452ceShoumkh     EREMOTE = 65,
17079a452ceShoumkh     /// 保留 Reserved.
17179a452ceShoumkh     ENOLINK = 66,
17279a452ceShoumkh     /// 外设错误 Advertise error.
17379a452ceShoumkh     EADV = 67,
17479a452ceShoumkh     /// 安装错误 Srmount error
17579a452ceShoumkh     ESRMNT = 68,
17679a452ceShoumkh     /// 发送时发生通信错误 Communication error on send
17779a452ceShoumkh     ECOMM = 69,
17879a452ceShoumkh     /// 协议错误 Protocol error.
17979a452ceShoumkh     EPROTO = 70,
18079a452ceShoumkh     /// 保留使用 Reserved.
18179a452ceShoumkh     EMULTIHOP = 71,
18279a452ceShoumkh     /// RFS特定错误 RFS specific error
18379a452ceShoumkh     EDOTDOT = 72,
18479a452ceShoumkh     /// 错误的消息 Bad message.
18579a452ceShoumkh     EBADMSG = 73,
18679a452ceShoumkh     /// 数值过大,产生溢出 Value too large to be stored in data type.
18779a452ceShoumkh     EOVERFLOW = 74,
18879a452ceShoumkh     /// 名称在网络上不是唯一的 Name not unique on network
18979a452ceShoumkh     ENOTUNIQ = 75,
19079a452ceShoumkh     /// 处于不良状态的文件描述符 File descriptor in bad state
19179a452ceShoumkh     EBADFD = 76,
19279a452ceShoumkh     /// 远程地址已更改 Remote address changed
19379a452ceShoumkh     EREMCHG = 77,
19479a452ceShoumkh     /// 无法访问所需的共享库 Can not access a needed shared library
19579a452ceShoumkh     ELIBACC = 78,
19679a452ceShoumkh     /// 访问损坏的共享库 Accessing a corrupted shared library
19779a452ceShoumkh     ELIBBAD = 79,
19879a452ceShoumkh     /// a. out中的.lib部分已损坏 .lib section in a.out corrupted
19979a452ceShoumkh     ELIBSCN = 80,
20079a452ceShoumkh     /// 尝试链接太多共享库 Attempting to link in too many shared libraries
20179a452ceShoumkh     ELIBMAX = 81,
20279a452ceShoumkh     /// 无法直接执行共享库 Cannot exec a shared library directly
20379a452ceShoumkh     ELIBEXEC = 82,
20479a452ceShoumkh     /// 不合法的字符序列 Illegal byte sequence.
20579a452ceShoumkh     EILSEQ = 83,
20679a452ceShoumkh     /// 中断的系统调用应该重新启动 Interrupted system call should be restarted
20779a452ceShoumkh     ERESTART = 84,
20879a452ceShoumkh     /// 流管道错误 Streams pipe error
20979a452ceShoumkh     ESTRPIPE = 85,
21079a452ceShoumkh     /// 用户太多 Too many users
21179a452ceShoumkh     EUSERS = 86,
21279a452ceShoumkh     /// 不是一个套接字 Not a socket.
21379a452ceShoumkh     ENOTSOCK = 87,
21479a452ceShoumkh     /// 需要目标地址 Destination address required.
21579a452ceShoumkh     EDESTADDRREQ = 88,
21679a452ceShoumkh     /// 消息过大 Message too large.
21779a452ceShoumkh     EMSGSIZE = 89,
21879a452ceShoumkh     /// 对于套接字而言,错误的协议 Protocol wrong type for socket.
21979a452ceShoumkh     EPROTOTYPE = 90,
22079a452ceShoumkh     /// 协议不可用 Protocol not available.
22179a452ceShoumkh     ENOPROTOOPT = 91,
22279a452ceShoumkh     /// 协议不被支持 Protocol not supported.
22379a452ceShoumkh     EPROTONOSUPPORT = 92,
22479a452ceShoumkh     /// 不支持套接字类型 Socket type not supported
22579a452ceShoumkh     ESOCKTNOSUPPORT = 93,
22679a452ceShoumkh     /// 套接字不支持该操作 Operation not supported on socket (may be the same value as [ENOTSUP]).
22779a452ceShoumkh     ///
22879a452ceShoumkh     /// 不被支持 Not supported (may be the same value as [EOPNOTSUPP]).
22979a452ceShoumkh     EOPNOTSUPP_OR_ENOTSUP = 94,
23079a452ceShoumkh     /// 不支持协议系列 Protocol family not supported
23179a452ceShoumkh     EPFNOSUPPORT = 95,
23279a452ceShoumkh     /// 地址family不支持 Address family not supported.
23379a452ceShoumkh     EAFNOSUPPORT = 96,
23479a452ceShoumkh     /// 地址正在被使用 Address in use.
23579a452ceShoumkh     EADDRINUSE = 97,
23679a452ceShoumkh     /// 地址不可用 Address  not available.
23779a452ceShoumkh     EADDRNOTAVAIL = 98,
23879a452ceShoumkh     /// 网络已关闭 Network is down.
23979a452ceShoumkh     ENETDOWN = 99,
24079a452ceShoumkh     /// 网络不可达 Network unreachable.
24179a452ceShoumkh     ENETUNREACH = 100,
24279a452ceShoumkh     /// 网络连接已断开 Connection aborted by network.
24379a452ceShoumkh     ENETRESET = 101,
24479a452ceShoumkh     /// 连接已断开 Connection aborted.
24579a452ceShoumkh     ECONNABORTED = 102,
24679a452ceShoumkh     /// 连接被重置 Connection reset.
24779a452ceShoumkh     ECONNRESET = 103,
24879a452ceShoumkh     /// 缓冲区空间不足 No buffer space available.
24979a452ceShoumkh     ENOBUFS = 104,
25079a452ceShoumkh     /// 套接字已连接 Socket is connected.
25179a452ceShoumkh     EISCONN = 105,
25279a452ceShoumkh     /// 套接字未连接 The socket is not connected.
25379a452ceShoumkh     ENOTCONN = 106,
25479a452ceShoumkh     /// 传输端点关闭后无法发送 Cannot send after transport endpoint shutdown
25579a452ceShoumkh     ESHUTDOWN = 107,
25679a452ceShoumkh     /// 引用太多:无法拼接 Too many references: cannot splice
25779a452ceShoumkh     ETOOMANYREFS = 108,
25879a452ceShoumkh     /// 连接超时 Connection timed out.
25979a452ceShoumkh     ETIMEDOUT = 109,
26079a452ceShoumkh     /// 连接被拒绝 Connection refused.
26179a452ceShoumkh     ECONNREFUSED = 110,
26279a452ceShoumkh     /// 主机已关闭 Host is down
26379a452ceShoumkh     EHOSTDOWN = 111,
26479a452ceShoumkh     /// 主机不可达 Host is unreachable.
26579a452ceShoumkh     EHOSTUNREACH = 112,
26679a452ceShoumkh     /// 连接已经在处理 Connection already in progress.
26779a452ceShoumkh     EALREADY = 113,
26879a452ceShoumkh     /// 操作正在处理 Operation in progress.
26979a452ceShoumkh     EINPROGRESS = 114,
27079a452ceShoumkh     /// 保留 Reserved.
27179a452ceShoumkh     ESTALE = 115,
27279a452ceShoumkh     /// 结构需要清理 Structure needs cleaning
27379a452ceShoumkh     EUCLEAN = 116,
27479a452ceShoumkh     /// 不是XENIX命名类型文件 Not a XENIX named type file
27579a452ceShoumkh     ENOTNAM = 117,
27679a452ceShoumkh     /// 没有可用的XENIX信号量 No XENIX semaphores available
27779a452ceShoumkh     ENAVAIL = 118,
27879a452ceShoumkh     /// 是命名类型文件 Is a named type file
27979a452ceShoumkh     EISNAM = 119,
28079a452ceShoumkh     /// 远程I/O错误 Remote I/O error
28179a452ceShoumkh     EREMOTEIO = 120,
28279a452ceShoumkh     /// 保留使用 Reserved
28379a452ceShoumkh     EDQUOT = 121,
28479a452ceShoumkh     /// 没有找到媒介 No medium found
28579a452ceShoumkh     ENOMEDIUM = 122,
28679a452ceShoumkh     /// 介质类型错误 Wrong medium type
28779a452ceShoumkh     EMEDIUMTYPE = 123,
28879a452ceShoumkh     /// 操作被取消 Operation canceled.
28979a452ceShoumkh     ECANCELED = 124,
29079a452ceShoumkh     /// 所需的密钥不可用 Required key not available
29179a452ceShoumkh     ENOKEY = 125,
29279a452ceShoumkh     /// 密钥已过期 Key has expired
29379a452ceShoumkh     EKEYEXPIRED = 126,
29479a452ceShoumkh     /// 密钥已被撤销 Key has been revoked
29579a452ceShoumkh     EKEYREVOKED = 127,
29679a452ceShoumkh     /// 密钥被服务拒绝 Key has been revoked
29779a452ceShoumkh     EKEYREJECTED = 128,
29879a452ceShoumkh     /// 之前的拥有者挂了 Previous owner died.
29979a452ceShoumkh     EOWNERDEAD = 129,
30079a452ceShoumkh     /// 状态不可恢复 State not recoverable.
30179a452ceShoumkh     ENOTRECOVERABLE = 130,
30240314b30SXiaoye Zheng     // VMX on 虚拟化开启指令出错
30340314b30SXiaoye Zheng     EVMXONFailed = 131,
30440314b30SXiaoye Zheng     // VMX off 虚拟化关闭指令出错
30540314b30SXiaoye Zheng     EVMXOFFFailed = 132,
30640314b30SXiaoye Zheng     // VMX VMWRITE 写入虚拟化VMCS内存出错
30740314b30SXiaoye Zheng     EVMWRITEFailed = 133,
30840314b30SXiaoye Zheng     EVMREADFailed = 134,
30940314b30SXiaoye Zheng     EVMPRTLDFailed = 135,
31040314b30SXiaoye Zheng     EVMLAUNCHFailed = 136,
31140314b30SXiaoye Zheng     KVM_HVA_ERR_BAD = 137,
3124454d1a2Slogin }
313676b8ef6SMork 
314676b8ef6SMork impl SystemError {
315676b8ef6SMork     /// @brief 把posix错误码转换为系统错误枚举类型。
316676b8ef6SMork     pub fn from_posix_errno(errno: i32) -> Option<SystemError> {
317676b8ef6SMork         // posix 错误码是小于0的
318676b8ef6SMork         if errno >= 0 {
319676b8ef6SMork             return None;
320676b8ef6SMork         }
321676b8ef6SMork         return <Self as FromPrimitive>::from_i32(-errno);
322676b8ef6SMork     }
323676b8ef6SMork 
324676b8ef6SMork     /// @brief 把系统错误枚举类型转换为负数posix错误码。
325676b8ef6SMork     pub fn to_posix_errno(&self) -> i32 {
326676b8ef6SMork         return -<Self as ToPrimitive>::to_i32(self).unwrap();
327676b8ef6SMork     }
328676b8ef6SMork }
329ab5c8ca4Slogin 
330ab5c8ca4Slogin // 定义系统调用号
331*ad1d649eSGnoCiYeH pub const SYS_READ: usize = 0;
332*ad1d649eSGnoCiYeH pub const SYS_WRITE: usize = 1;
333ab5c8ca4Slogin pub const SYS_OPEN: usize = 2;
334ab5c8ca4Slogin pub const SYS_CLOSE: usize = 3;
335*ad1d649eSGnoCiYeH #[allow(dead_code)]
336*ad1d649eSGnoCiYeH pub const SYS_STAT: usize = 4;
337*ad1d649eSGnoCiYeH pub const SYS_FSTAT: usize = 5;
338ab5c8ca4Slogin 
339*ad1d649eSGnoCiYeH #[allow(dead_code)]
340*ad1d649eSGnoCiYeH pub const SYS_POLL: usize = 7;
341*ad1d649eSGnoCiYeH pub const SYS_LSEEK: usize = 8;
342*ad1d649eSGnoCiYeH pub const SYS_MMAP: usize = 9;
343*ad1d649eSGnoCiYeH pub const SYS_MPROTECT: usize = 10;
344*ad1d649eSGnoCiYeH pub const SYS_MUNMAP: usize = 11;
345*ad1d649eSGnoCiYeH pub const SYS_BRK: usize = 12;
346*ad1d649eSGnoCiYeH pub const SYS_SIGACTION: usize = 13;
347*ad1d649eSGnoCiYeH #[allow(dead_code)]
348*ad1d649eSGnoCiYeH pub const SYS_RT_SIGPROCMASK: usize = 14;
349*ad1d649eSGnoCiYeH 
350*ad1d649eSGnoCiYeH pub const SYS_RT_SIGRETURN: usize = 15;
351*ad1d649eSGnoCiYeH pub const SYS_IOCTL: usize = 16;
352*ad1d649eSGnoCiYeH 
353*ad1d649eSGnoCiYeH #[allow(dead_code)]
354*ad1d649eSGnoCiYeH pub const SYS_WRITEV: usize = 20;
355*ad1d649eSGnoCiYeH 
356*ad1d649eSGnoCiYeH pub const SYS_DUP: usize = 32;
357*ad1d649eSGnoCiYeH pub const SYS_DUP2: usize = 33;
358*ad1d649eSGnoCiYeH 
359*ad1d649eSGnoCiYeH pub const SYS_NANOSLEEP: usize = 35;
360*ad1d649eSGnoCiYeH 
361*ad1d649eSGnoCiYeH pub const SYS_GETPID: usize = 39;
362*ad1d649eSGnoCiYeH 
363*ad1d649eSGnoCiYeH pub const SYS_SOCKET: usize = 41;
364*ad1d649eSGnoCiYeH pub const SYS_CONNECT: usize = 42;
365*ad1d649eSGnoCiYeH pub const SYS_ACCEPT: usize = 43;
366*ad1d649eSGnoCiYeH pub const SYS_SENDTO: usize = 44;
367*ad1d649eSGnoCiYeH pub const SYS_RECVFROM: usize = 45;
368*ad1d649eSGnoCiYeH 
369*ad1d649eSGnoCiYeH pub const SYS_RECVMSG: usize = 47;
370*ad1d649eSGnoCiYeH pub const SYS_SHUTDOWN: usize = 48;
371*ad1d649eSGnoCiYeH pub const SYS_BIND: usize = 49;
372*ad1d649eSGnoCiYeH pub const SYS_LISTEN: usize = 50;
373*ad1d649eSGnoCiYeH pub const SYS_GETSOCKNAME: usize = 51;
374*ad1d649eSGnoCiYeH pub const SYS_GETPEERNAME: usize = 52;
375*ad1d649eSGnoCiYeH 
376*ad1d649eSGnoCiYeH pub const SYS_SETSOCKOPT: usize = 54;
377*ad1d649eSGnoCiYeH pub const SYS_GETSOCKOPT: usize = 55;
378*ad1d649eSGnoCiYeH 
379*ad1d649eSGnoCiYeH #[allow(dead_code)]
380*ad1d649eSGnoCiYeH pub const SYS_CLONE: usize = 56;
381*ad1d649eSGnoCiYeH pub const SYS_FORK: usize = 57;
382*ad1d649eSGnoCiYeH pub const SYS_VFORK: usize = 58;
383*ad1d649eSGnoCiYeH pub const SYS_EXECVE: usize = 59;
384*ad1d649eSGnoCiYeH pub const SYS_EXIT: usize = 60;
385*ad1d649eSGnoCiYeH pub const SYS_WAIT4: usize = 61;
386*ad1d649eSGnoCiYeH pub const SYS_KILL: usize = 62;
387*ad1d649eSGnoCiYeH 
388*ad1d649eSGnoCiYeH pub const SYS_FCNTL: usize = 72;
389*ad1d649eSGnoCiYeH 
390*ad1d649eSGnoCiYeH pub const SYS_FTRUNCATE: usize = 77;
391*ad1d649eSGnoCiYeH pub const SYS_GET_DENTS: usize = 78;
392*ad1d649eSGnoCiYeH 
393*ad1d649eSGnoCiYeH pub const SYS_GETCWD: usize = 79;
394*ad1d649eSGnoCiYeH 
395*ad1d649eSGnoCiYeH pub const SYS_CHDIR: usize = 80;
396*ad1d649eSGnoCiYeH 
397*ad1d649eSGnoCiYeH pub const SYS_MKDIR: usize = 83;
398*ad1d649eSGnoCiYeH 
399*ad1d649eSGnoCiYeH pub const SYS_GETTIMEOFDAY: usize = 96;
400*ad1d649eSGnoCiYeH 
401*ad1d649eSGnoCiYeH #[allow(dead_code)]
402*ad1d649eSGnoCiYeH pub const SYS_SIGALTSTACK: usize = 131;
403*ad1d649eSGnoCiYeH 
404*ad1d649eSGnoCiYeH #[allow(dead_code)]
405*ad1d649eSGnoCiYeH pub const SYS_ARCH_PRCTL: usize = 158;
406*ad1d649eSGnoCiYeH 
407*ad1d649eSGnoCiYeH pub const SYS_REBOOT: usize = 169;
408*ad1d649eSGnoCiYeH 
409*ad1d649eSGnoCiYeH pub const SYS_GETPPID: usize = 110;
410*ad1d649eSGnoCiYeH pub const SYS_GETPGID: usize = 121;
411*ad1d649eSGnoCiYeH 
412*ad1d649eSGnoCiYeH pub const SYS_MKNOD: usize = 133;
413*ad1d649eSGnoCiYeH 
414*ad1d649eSGnoCiYeH #[allow(dead_code)]
415*ad1d649eSGnoCiYeH pub const SYS_TKILL: usize = 200;
416*ad1d649eSGnoCiYeH 
417*ad1d649eSGnoCiYeH #[allow(dead_code)]
418*ad1d649eSGnoCiYeH pub const SYS_FUTEX: usize = 202;
419*ad1d649eSGnoCiYeH 
420*ad1d649eSGnoCiYeH pub const SYS_GET_DENTS_64: usize = 217;
421*ad1d649eSGnoCiYeH #[allow(dead_code)]
422*ad1d649eSGnoCiYeH pub const SYS_SET_TID_ADDR: usize = 218;
423*ad1d649eSGnoCiYeH 
424*ad1d649eSGnoCiYeH pub const SYS_UNLINK_AT: usize = 263;
425*ad1d649eSGnoCiYeH 
426*ad1d649eSGnoCiYeH pub const SYS_PIPE: usize = 293;
427*ad1d649eSGnoCiYeH 
428*ad1d649eSGnoCiYeH #[allow(dead_code)]
429*ad1d649eSGnoCiYeH pub const SYS_GET_RANDOM: usize = 318;
430*ad1d649eSGnoCiYeH 
431*ad1d649eSGnoCiYeH // 与linux不一致的调用,在linux基础上累加
432*ad1d649eSGnoCiYeH pub const SYS_PUT_STRING: usize = 100000;
433*ad1d649eSGnoCiYeH pub const SYS_SBRK: usize = 100001;
434ab5c8ca4Slogin /// todo: 该系统调用与Linux不一致,将来需要删除该系统调用!!! 删的时候记得改C版本的libc
435*ad1d649eSGnoCiYeH pub const SYS_CLOCK: usize = 100002;
436*ad1d649eSGnoCiYeH pub const SYS_SCHED: usize = 100003;
43740314b30SXiaoye Zheng 
438ab5c8ca4Slogin #[derive(Debug)]
439ab5c8ca4Slogin pub struct Syscall;
440ab5c8ca4Slogin 
441ab5c8ca4Slogin extern "C" {
442ab5c8ca4Slogin     fn do_put_string(s: *const u8, front_color: u32, back_color: u32) -> usize;
443ab5c8ca4Slogin }
444ab5c8ca4Slogin 
445ab5c8ca4Slogin #[no_mangle]
446ab5c8ca4Slogin pub extern "C" fn syscall_init() -> i32 {
447ab5c8ca4Slogin     kinfo!("Initializing syscall...");
448ab5c8ca4Slogin     Syscall::init().expect("syscall init failed");
449ab5c8ca4Slogin     kinfo!("Syscall init successfully!");
450ab5c8ca4Slogin     return 0;
451ab5c8ca4Slogin }
452ab5c8ca4Slogin 
453ab5c8ca4Slogin impl Syscall {
454ab5c8ca4Slogin     /// 初始化系统调用
455ab5c8ca4Slogin     pub fn init() -> Result<(), SystemError> {
456ab5c8ca4Slogin         static INIT_FLAG: AtomicBool = AtomicBool::new(false);
457ab5c8ca4Slogin         let prev = INIT_FLAG.swap(true, Ordering::SeqCst);
458ab5c8ca4Slogin         if prev {
459ab5c8ca4Slogin             panic!("Cannot initialize syscall more than once!");
460ab5c8ca4Slogin         }
461ab5c8ca4Slogin         return crate::arch::syscall::arch_syscall_init();
462ab5c8ca4Slogin     }
463ab5c8ca4Slogin     /// @brief 系统调用分发器,用于分发系统调用。
464ab5c8ca4Slogin     ///
465ab5c8ca4Slogin     /// 这个函数内,需要根据系统调用号,调用对应的系统调用处理函数。
466ab5c8ca4Slogin     /// 并且,对于用户态传入的指针参数,需要在本函数内进行越界检查,防止访问到内核空间。
4679e9ffedfSPlucky923     pub fn handle(
4689e9ffedfSPlucky923         syscall_num: usize,
4699e9ffedfSPlucky923         args: &[usize],
4709e9ffedfSPlucky923         frame: &mut TrapFrame,
4719e9ffedfSPlucky923     ) -> Result<usize, SystemError> {
472ab5c8ca4Slogin         let r = match syscall_num {
473ab5c8ca4Slogin             SYS_PUT_STRING => {
474ab5c8ca4Slogin                 Self::put_string(args[0] as *const u8, args[1] as u32, args[2] as u32)
475ab5c8ca4Slogin             }
476ab5c8ca4Slogin             SYS_OPEN => {
477ab5c8ca4Slogin                 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) };
478ab5c8ca4Slogin                 let path: Result<&str, core::str::Utf8Error> = path.to_str();
479ab5c8ca4Slogin                 let res = if path.is_err() {
480ab5c8ca4Slogin                     Err(SystemError::EINVAL)
481ab5c8ca4Slogin                 } else {
482ab5c8ca4Slogin                     let path: &str = path.unwrap();
48334e6d6c8Syuyi2439 
484ab5c8ca4Slogin                     let flags = args[1];
485ab5c8ca4Slogin                     let open_flags: FileMode = FileMode::from_bits_truncate(flags as u32);
486ab5c8ca4Slogin                     Self::open(path, open_flags)
487ab5c8ca4Slogin                 };
4886d81180bSLoGin 
489ab5c8ca4Slogin                 res
490ab5c8ca4Slogin             }
491ab5c8ca4Slogin             SYS_CLOSE => {
492ab5c8ca4Slogin                 let fd = args[0];
49334e6d6c8Syuyi2439 
49434e6d6c8Syuyi2439                 let res = Self::close(fd);
49534e6d6c8Syuyi2439 
49634e6d6c8Syuyi2439                 res
497ab5c8ca4Slogin             }
498ab5c8ca4Slogin             SYS_READ => {
499ab5c8ca4Slogin                 let fd = args[0] as i32;
500ab5c8ca4Slogin                 let buf_vaddr = args[1];
501ab5c8ca4Slogin                 let len = args[2];
5029e9ffedfSPlucky923                 let from_user = frame.from_user();
5039e9ffedfSPlucky923                 let mut user_buffer_writer =
5049e9ffedfSPlucky923                     UserBufferWriter::new(buf_vaddr as *mut u8, len, from_user)?;
5056d81180bSLoGin 
5069e9ffedfSPlucky923                 let user_buf = user_buffer_writer.buffer(0)?;
5079e9ffedfSPlucky923                 let res = Self::read(fd, user_buf);
508ab5c8ca4Slogin                 res
509ab5c8ca4Slogin             }
510ab5c8ca4Slogin             SYS_WRITE => {
511ab5c8ca4Slogin                 let fd = args[0] as i32;
512ab5c8ca4Slogin                 let buf_vaddr = args[1];
513ab5c8ca4Slogin                 let len = args[2];
5149e9ffedfSPlucky923                 let from_user = frame.from_user();
5159e9ffedfSPlucky923                 let user_buffer_reader =
5169e9ffedfSPlucky923                     UserBufferReader::new(buf_vaddr as *const u8, len, from_user)?;
5176d81180bSLoGin 
5189e9ffedfSPlucky923                 let user_buf = user_buffer_reader.read_from_user(0)?;
5199e9ffedfSPlucky923                 let res = Self::write(fd, user_buf);
520ab5c8ca4Slogin                 res
521ab5c8ca4Slogin             }
522ab5c8ca4Slogin 
523ab5c8ca4Slogin             SYS_LSEEK => {
524ab5c8ca4Slogin                 let fd = args[0] as i32;
525ab5c8ca4Slogin                 let offset = args[1] as i64;
526ab5c8ca4Slogin                 let whence = args[2] as u32;
527ab5c8ca4Slogin 
528ab5c8ca4Slogin                 let w = match whence {
529ab5c8ca4Slogin                     SEEK_SET => Ok(SeekFrom::SeekSet(offset)),
530ab5c8ca4Slogin                     SEEK_CUR => Ok(SeekFrom::SeekCurrent(offset)),
531ab5c8ca4Slogin                     SEEK_END => Ok(SeekFrom::SeekEnd(offset)),
532ab5c8ca4Slogin                     SEEK_MAX => Ok(SeekFrom::SeekEnd(0)),
533ab5c8ca4Slogin                     _ => Err(SystemError::EINVAL),
5349e9ffedfSPlucky923                 }?;
535ab5c8ca4Slogin 
536ab5c8ca4Slogin                 Self::lseek(fd, w)
537ab5c8ca4Slogin             }
53840314b30SXiaoye Zheng             SYS_IOCTL => {
53940314b30SXiaoye Zheng                 kdebug!("SYS_IOCTL");
54040314b30SXiaoye Zheng                 let fd = args[0];
54140314b30SXiaoye Zheng                 let cmd = args[1];
54240314b30SXiaoye Zheng                 let data = args[2];
54340314b30SXiaoye Zheng                 Self::ioctl(fd, cmd as u32, data)
54440314b30SXiaoye Zheng             }
545ab5c8ca4Slogin 
5461496ba7bSLoGin             SYS_FORK => Self::fork(frame),
5471496ba7bSLoGin             SYS_VFORK => Self::vfork(frame),
5481496ba7bSLoGin 
549ab5c8ca4Slogin             SYS_BRK => {
55040fe15e0SLoGin                 let new_brk = VirtAddr::new(args[0]);
55140fe15e0SLoGin                 Self::brk(new_brk).map(|vaddr| vaddr.data())
552ab5c8ca4Slogin             }
553ab5c8ca4Slogin 
554ab5c8ca4Slogin             SYS_SBRK => {
555ab5c8ca4Slogin                 let increment = args[0] as isize;
5561496ba7bSLoGin                 Self::sbrk(increment).map(|vaddr: VirtAddr| vaddr.data())
557ab5c8ca4Slogin             }
558ab5c8ca4Slogin 
559ab5c8ca4Slogin             SYS_REBOOT => Self::reboot(),
560ab5c8ca4Slogin 
561ab5c8ca4Slogin             SYS_CHDIR => {
562ab5c8ca4Slogin                 // Closure for checking arguments
563ab5c8ca4Slogin                 let chdir_check = |arg0: usize| {
564ab5c8ca4Slogin                     if arg0 == 0 {
565ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
566ab5c8ca4Slogin                     }
567ab5c8ca4Slogin                     let path_ptr = arg0 as *const c_char;
568be63f3b2Shoumkh                     let virt_addr = VirtAddr::new(path_ptr as usize);
569ab5c8ca4Slogin                     // 权限校验
570ab5c8ca4Slogin                     if path_ptr.is_null()
5711496ba7bSLoGin                         || (frame.from_user()
5721496ba7bSLoGin                             && verify_area(virt_addr, PAGE_2M_SIZE as usize).is_err())
573ab5c8ca4Slogin                     {
574ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
575ab5c8ca4Slogin                     }
576ab5c8ca4Slogin                     let dest_path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
577ab5c8ca4Slogin                     let dest_path: &str = dest_path.to_str().map_err(|_| SystemError::EINVAL)?;
578ab5c8ca4Slogin                     if dest_path.len() == 0 {
579ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
5801496ba7bSLoGin                     } else if dest_path.len() > MAX_PATHLEN as usize {
581ab5c8ca4Slogin                         return Err(SystemError::ENAMETOOLONG);
582ab5c8ca4Slogin                     }
583ab5c8ca4Slogin 
584ab5c8ca4Slogin                     return Ok(dest_path);
585ab5c8ca4Slogin                 };
586ab5c8ca4Slogin 
5879e9ffedfSPlucky923                 let r = chdir_check(args[0])?;
5889e9ffedfSPlucky923                 Self::chdir(r)
589ab5c8ca4Slogin             }
590ab5c8ca4Slogin 
591*ad1d649eSGnoCiYeH             SYS_GET_DENTS | SYS_GET_DENTS_64 => {
592ab5c8ca4Slogin                 let fd = args[0] as i32;
59334e6d6c8Syuyi2439 
594ab5c8ca4Slogin                 let buf_vaddr = args[1];
595ab5c8ca4Slogin                 let len = args[2];
596f5df0e79SLoGin                 let virt_addr: VirtAddr = VirtAddr::new(buf_vaddr);
597ab5c8ca4Slogin                 // 判断缓冲区是否来自用户态,进行权限校验
5981496ba7bSLoGin                 let res = if frame.from_user() && verify_area(virt_addr, len as usize).is_err() {
599ab5c8ca4Slogin                     // 来自用户态,而buffer在内核态,这样的操作不被允许
600ab5c8ca4Slogin                     Err(SystemError::EPERM)
601ab5c8ca4Slogin                 } else if buf_vaddr == 0 {
602ab5c8ca4Slogin                     Err(SystemError::EFAULT)
603ab5c8ca4Slogin                 } else {
604ab5c8ca4Slogin                     let buf: &mut [u8] = unsafe {
605ab5c8ca4Slogin                         core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len)
606ab5c8ca4Slogin                     };
607ab5c8ca4Slogin                     Self::getdents(fd, buf)
608ab5c8ca4Slogin                 };
609ab5c8ca4Slogin 
610ab5c8ca4Slogin                 res
611ab5c8ca4Slogin             }
612ab5c8ca4Slogin 
613ab5c8ca4Slogin             SYS_EXECVE => {
614ab5c8ca4Slogin                 let path_ptr = args[0];
615ab5c8ca4Slogin                 let argv_ptr = args[1];
616ab5c8ca4Slogin                 let env_ptr = args[2];
617be63f3b2Shoumkh                 let virt_path_ptr = VirtAddr::new(path_ptr);
618be63f3b2Shoumkh                 let virt_argv_ptr = VirtAddr::new(argv_ptr);
619be63f3b2Shoumkh                 let virt_env_ptr = VirtAddr::new(env_ptr);
620ab5c8ca4Slogin                 // 权限校验
6211496ba7bSLoGin                 if frame.from_user()
6221496ba7bSLoGin                     && (verify_area(virt_path_ptr, MAX_PATHLEN as usize).is_err()
623be63f3b2Shoumkh                         || verify_area(virt_argv_ptr, PAGE_4K_SIZE as usize).is_err())
624be63f3b2Shoumkh                     || verify_area(virt_env_ptr, PAGE_4K_SIZE as usize).is_err()
625ab5c8ca4Slogin                 {
626ab5c8ca4Slogin                     Err(SystemError::EFAULT)
627ab5c8ca4Slogin                 } else {
628ab5c8ca4Slogin                     Self::execve(
6291496ba7bSLoGin                         path_ptr as *const u8,
6301496ba7bSLoGin                         argv_ptr as *const *const u8,
6311496ba7bSLoGin                         env_ptr as *const *const u8,
6321496ba7bSLoGin                         frame,
633ab5c8ca4Slogin                     )
6341496ba7bSLoGin                     .map(|_| 0)
635ab5c8ca4Slogin                 }
636ab5c8ca4Slogin             }
637ab5c8ca4Slogin             SYS_WAIT4 => {
6381496ba7bSLoGin                 let pid = args[0] as i64;
6391496ba7bSLoGin                 let wstatus = args[1] as *mut i32;
640ab5c8ca4Slogin                 let options = args[2] as c_int;
641ab5c8ca4Slogin                 let rusage = args[3] as *mut c_void;
642ab5c8ca4Slogin                 // 权限校验
643ab5c8ca4Slogin                 // todo: 引入rusage之后,更正以下权限校验代码中,rusage的大小
644ab5c8ca4Slogin                 Self::wait4(pid, wstatus, options, rusage)
645ab5c8ca4Slogin             }
646ab5c8ca4Slogin 
647ab5c8ca4Slogin             SYS_EXIT => {
648ab5c8ca4Slogin                 let exit_code = args[0];
649ab5c8ca4Slogin                 Self::exit(exit_code)
650ab5c8ca4Slogin             }
651ab5c8ca4Slogin             SYS_MKDIR => {
652ab5c8ca4Slogin                 let path_ptr = args[0] as *const c_char;
653ab5c8ca4Slogin                 let mode = args[1];
654be63f3b2Shoumkh                 let virt_path_ptr = VirtAddr::new(path_ptr as usize);
655ab5c8ca4Slogin                 let security_check = || {
656ab5c8ca4Slogin                     if path_ptr.is_null()
6571496ba7bSLoGin                         || (frame.from_user()
6581496ba7bSLoGin                             && verify_area(virt_path_ptr, PAGE_2M_SIZE as usize).is_err())
659ab5c8ca4Slogin                     {
660ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
661ab5c8ca4Slogin                     }
662ab5c8ca4Slogin                     let path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
663ab5c8ca4Slogin                     let path: &str = path.to_str().map_err(|_| SystemError::EINVAL)?.trim();
664ab5c8ca4Slogin 
665ab5c8ca4Slogin                     if path == "" {
666ab5c8ca4Slogin                         return Err(SystemError::EINVAL);
667ab5c8ca4Slogin                     }
668ab5c8ca4Slogin                     return Ok(path);
669ab5c8ca4Slogin                 };
670ab5c8ca4Slogin 
671ab5c8ca4Slogin                 let path = security_check();
672ab5c8ca4Slogin                 if path.is_err() {
673ab5c8ca4Slogin                     Err(path.unwrap_err())
674ab5c8ca4Slogin                 } else {
675ab5c8ca4Slogin                     Self::mkdir(path.unwrap(), mode)
676ab5c8ca4Slogin                 }
677ab5c8ca4Slogin             }
678ab5c8ca4Slogin 
679ab5c8ca4Slogin             SYS_NANOSLEEP => {
680ab5c8ca4Slogin                 let req = args[0] as *const TimeSpec;
681ab5c8ca4Slogin                 let rem = args[1] as *mut TimeSpec;
682be63f3b2Shoumkh                 let virt_req = VirtAddr::new(req as usize);
683be63f3b2Shoumkh                 let virt_rem = VirtAddr::new(rem as usize);
6841496ba7bSLoGin                 if frame.from_user()
685be63f3b2Shoumkh                     && (verify_area(virt_req, core::mem::size_of::<TimeSpec>() as usize).is_err()
686be63f3b2Shoumkh                         || verify_area(virt_rem, core::mem::size_of::<TimeSpec>() as usize)
687be63f3b2Shoumkh                             .is_err())
688ab5c8ca4Slogin                 {
689ab5c8ca4Slogin                     Err(SystemError::EFAULT)
690ab5c8ca4Slogin                 } else {
691ab5c8ca4Slogin                     Self::nanosleep(req, rem)
692ab5c8ca4Slogin                 }
693ab5c8ca4Slogin             }
694ab5c8ca4Slogin 
695ab5c8ca4Slogin             SYS_CLOCK => Self::clock(),
696ab5c8ca4Slogin             SYS_PIPE => {
69722c9db31Shanjiezhou                 let pipefd: *mut i32 = args[0] as *mut c_int;
69822c9db31Shanjiezhou                 let arg1 = args[1];
69922c9db31Shanjiezhou                 if pipefd.is_null() {
70022c9db31Shanjiezhou                     Err(SystemError::EFAULT)
70122c9db31Shanjiezhou                 } else {
70222c9db31Shanjiezhou                     let flags = FileMode::from_bits_truncate(arg1 as u32);
70322c9db31Shanjiezhou                     Self::pipe2(pipefd, flags)
704ab5c8ca4Slogin                 }
705ab5c8ca4Slogin             }
706ab5c8ca4Slogin 
707ab5c8ca4Slogin             SYS_UNLINK_AT => {
708ab5c8ca4Slogin                 let dirfd = args[0] as i32;
709ab5c8ca4Slogin                 let pathname = args[1] as *const c_char;
710ab5c8ca4Slogin                 let flags = args[2] as u32;
711be63f3b2Shoumkh                 let virt_pathname = VirtAddr::new(pathname as usize);
7121496ba7bSLoGin                 if frame.from_user() && verify_area(virt_pathname, PAGE_4K_SIZE as usize).is_err() {
713ab5c8ca4Slogin                     Err(SystemError::EFAULT)
714ab5c8ca4Slogin                 } else if pathname.is_null() {
715ab5c8ca4Slogin                     Err(SystemError::EFAULT)
716ab5c8ca4Slogin                 } else {
717ab5c8ca4Slogin                     let get_path = || {
718ab5c8ca4Slogin                         let pathname: &CStr = unsafe { CStr::from_ptr(pathname) };
719ab5c8ca4Slogin 
720ab5c8ca4Slogin                         let pathname: &str = pathname.to_str().map_err(|_| SystemError::EINVAL)?;
721ab5c8ca4Slogin                         if pathname.len() >= MAX_PATHLEN {
722ab5c8ca4Slogin                             return Err(SystemError::ENAMETOOLONG);
723ab5c8ca4Slogin                         }
724ab5c8ca4Slogin                         return Ok(pathname.trim());
725ab5c8ca4Slogin                     };
726ab5c8ca4Slogin                     let pathname = get_path();
727ab5c8ca4Slogin                     if pathname.is_err() {
728ab5c8ca4Slogin                         Err(pathname.unwrap_err())
729ab5c8ca4Slogin                     } else {
7306d81180bSLoGin                         // kdebug!("sys unlinkat: dirfd: {}, pathname: {}", dirfd, pathname.as_ref().unwrap());
731ab5c8ca4Slogin                         Self::unlinkat(dirfd, pathname.unwrap(), flags)
732ab5c8ca4Slogin                     }
733ab5c8ca4Slogin                 }
734ab5c8ca4Slogin             }
735ab5c8ca4Slogin             SYS_KILL => {
7361496ba7bSLoGin                 let pid = Pid::new(args[0]);
737ab5c8ca4Slogin                 let sig = args[1] as c_int;
7383c82aa56SChiichen                 // kdebug!("KILL SYSCALL RECEIVED");
739ab5c8ca4Slogin                 Self::kill(pid, sig)
740ab5c8ca4Slogin             }
741ab5c8ca4Slogin 
742ab5c8ca4Slogin             SYS_SIGACTION => {
743ab5c8ca4Slogin                 let sig = args[0] as c_int;
744ab5c8ca4Slogin                 let act = args[1];
745ab5c8ca4Slogin                 let old_act = args[2];
7461496ba7bSLoGin                 Self::sigaction(sig, act, old_act, frame.from_user())
747ab5c8ca4Slogin             }
748ab5c8ca4Slogin 
749ab5c8ca4Slogin             SYS_RT_SIGRETURN => {
750ab5c8ca4Slogin                 // 由于目前signal机制的实现,与x86_64强关联,因此暂时在arch/x86_64/syscall.rs中调用
751ab5c8ca4Slogin                 // todo: 未来需要将signal机制与平台解耦
752ab5c8ca4Slogin                 todo!()
753ab5c8ca4Slogin             }
754ab5c8ca4Slogin 
7551496ba7bSLoGin             SYS_GETPID => Self::getpid().map(|pid| pid.into()),
756ab5c8ca4Slogin 
7571496ba7bSLoGin             SYS_SCHED => Self::sched(frame.from_user()),
758ab5c8ca4Slogin             SYS_DUP => {
759ab5c8ca4Slogin                 let oldfd: i32 = args[0] as c_int;
760ab5c8ca4Slogin                 Self::dup(oldfd)
761ab5c8ca4Slogin             }
762ab5c8ca4Slogin             SYS_DUP2 => {
763ab5c8ca4Slogin                 let oldfd: i32 = args[0] as c_int;
764ab5c8ca4Slogin                 let newfd: i32 = args[1] as c_int;
765ab5c8ca4Slogin                 Self::dup2(oldfd, newfd)
766ab5c8ca4Slogin             }
767ab5c8ca4Slogin 
768ab5c8ca4Slogin             SYS_SOCKET => Self::socket(args[0], args[1], args[2]),
769ab5c8ca4Slogin             SYS_SETSOCKOPT => {
770ab5c8ca4Slogin                 let optval = args[3] as *const u8;
771ab5c8ca4Slogin                 let optlen = args[4] as usize;
772be63f3b2Shoumkh                 let virt_optval = VirtAddr::new(optval as usize);
773ab5c8ca4Slogin                 // 验证optval的地址是否合法
774be63f3b2Shoumkh                 if verify_area(virt_optval, optlen as usize).is_err() {
775ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
776ab5c8ca4Slogin                     Err(SystemError::EFAULT)
777ab5c8ca4Slogin                 } else {
778ab5c8ca4Slogin                     let data: &[u8] = unsafe { core::slice::from_raw_parts(optval, optlen) };
779ab5c8ca4Slogin                     Self::setsockopt(args[0], args[1], args[2], data)
780ab5c8ca4Slogin                 }
781ab5c8ca4Slogin             }
782ab5c8ca4Slogin             SYS_GETSOCKOPT => {
783ab5c8ca4Slogin                 let optval = args[3] as *mut u8;
784ab5c8ca4Slogin                 let optlen = args[4] as *mut usize;
785be63f3b2Shoumkh                 let virt_optval = VirtAddr::new(optval as usize);
786be63f3b2Shoumkh                 let virt_optlen = VirtAddr::new(optlen as usize);
787ab5c8ca4Slogin                 let security_check = || {
788ab5c8ca4Slogin                     // 验证optval的地址是否合法
789be63f3b2Shoumkh                     if verify_area(virt_optval, PAGE_4K_SIZE as usize).is_err() {
790ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
791ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
792ab5c8ca4Slogin                     }
793ab5c8ca4Slogin 
794ab5c8ca4Slogin                     // 验证optlen的地址是否合法
795be63f3b2Shoumkh                     if verify_area(virt_optlen, core::mem::size_of::<u32>() as usize).is_err() {
796ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
797ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
798ab5c8ca4Slogin                     }
799ab5c8ca4Slogin                     return Ok(());
800ab5c8ca4Slogin                 };
801ab5c8ca4Slogin                 let r = security_check();
802ab5c8ca4Slogin                 if r.is_err() {
803ab5c8ca4Slogin                     Err(r.unwrap_err())
804ab5c8ca4Slogin                 } else {
805ab5c8ca4Slogin                     Self::getsockopt(args[0], args[1], args[2], optval, optlen as *mut u32)
806ab5c8ca4Slogin                 }
807ab5c8ca4Slogin             }
808ab5c8ca4Slogin 
809ab5c8ca4Slogin             SYS_CONNECT => {
810ab5c8ca4Slogin                 let addr = args[1] as *const SockAddr;
811ab5c8ca4Slogin                 let addrlen = args[2] as usize;
812be63f3b2Shoumkh                 let virt_addr = VirtAddr::new(addr as usize);
813ab5c8ca4Slogin                 // 验证addr的地址是否合法
814be63f3b2Shoumkh                 if verify_area(virt_addr, addrlen as usize).is_err() {
815ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
816ab5c8ca4Slogin                     Err(SystemError::EFAULT)
817ab5c8ca4Slogin                 } else {
818ab5c8ca4Slogin                     Self::connect(args[0], addr, addrlen)
819ab5c8ca4Slogin                 }
820ab5c8ca4Slogin             }
821ab5c8ca4Slogin             SYS_BIND => {
822ab5c8ca4Slogin                 let addr = args[1] as *const SockAddr;
823ab5c8ca4Slogin                 let addrlen = args[2] as usize;
824be63f3b2Shoumkh                 let virt_addr = VirtAddr::new(addr as usize);
825ab5c8ca4Slogin                 // 验证addr的地址是否合法
826be63f3b2Shoumkh                 if verify_area(virt_addr, addrlen as usize).is_err() {
827ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
828ab5c8ca4Slogin                     Err(SystemError::EFAULT)
829ab5c8ca4Slogin                 } else {
830ab5c8ca4Slogin                     Self::bind(args[0], addr, addrlen)
831ab5c8ca4Slogin                 }
832ab5c8ca4Slogin             }
833ab5c8ca4Slogin 
834ab5c8ca4Slogin             SYS_SENDTO => {
835ab5c8ca4Slogin                 let buf = args[1] as *const u8;
836ab5c8ca4Slogin                 let len = args[2] as usize;
837ab5c8ca4Slogin                 let flags = args[3] as u32;
838ab5c8ca4Slogin                 let addr = args[4] as *const SockAddr;
839ab5c8ca4Slogin                 let addrlen = args[5] as usize;
840be63f3b2Shoumkh                 let virt_buf = VirtAddr::new(buf as usize);
841be63f3b2Shoumkh                 let virt_addr = VirtAddr::new(addr as usize);
842ab5c8ca4Slogin                 // 验证buf的地址是否合法
843be63f3b2Shoumkh                 if verify_area(virt_buf, len as usize).is_err() {
844ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
845ab5c8ca4Slogin                     Err(SystemError::EFAULT)
846be63f3b2Shoumkh                 } else if verify_area(virt_addr, addrlen as usize).is_err() {
847ab5c8ca4Slogin                     // 地址空间超出了用户空间的范围,不合法
848ab5c8ca4Slogin                     Err(SystemError::EFAULT)
849ab5c8ca4Slogin                 } else {
850ab5c8ca4Slogin                     let data: &[u8] = unsafe { core::slice::from_raw_parts(buf, len) };
851ab5c8ca4Slogin                     Self::sendto(args[0], data, flags, addr, addrlen)
852ab5c8ca4Slogin                 }
853ab5c8ca4Slogin             }
854ab5c8ca4Slogin 
855ab5c8ca4Slogin             SYS_RECVFROM => {
856ab5c8ca4Slogin                 let buf = args[1] as *mut u8;
857ab5c8ca4Slogin                 let len = args[2] as usize;
858ab5c8ca4Slogin                 let flags = args[3] as u32;
859ab5c8ca4Slogin                 let addr = args[4] as *mut SockAddr;
860ab5c8ca4Slogin                 let addrlen = args[5] as *mut usize;
861be63f3b2Shoumkh                 let virt_buf = VirtAddr::new(buf as usize);
862be63f3b2Shoumkh                 let virt_addrlen = VirtAddr::new(addrlen as usize);
863be63f3b2Shoumkh                 let virt_addr = VirtAddr::new(addr as usize);
864ab5c8ca4Slogin                 let security_check = || {
865ab5c8ca4Slogin                     // 验证buf的地址是否合法
866be63f3b2Shoumkh                     if verify_area(virt_buf, len as usize).is_err() {
867ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
868ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
869ab5c8ca4Slogin                     }
870ab5c8ca4Slogin 
871ab5c8ca4Slogin                     // 验证addrlen的地址是否合法
872be63f3b2Shoumkh                     if verify_area(virt_addrlen, core::mem::size_of::<u32>() as usize).is_err() {
873ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
874ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
875ab5c8ca4Slogin                     }
876ab5c8ca4Slogin 
877be63f3b2Shoumkh                     if verify_area(virt_addr, core::mem::size_of::<SockAddr>() as usize).is_err() {
878ab5c8ca4Slogin                         // 地址空间超出了用户空间的范围,不合法
879ab5c8ca4Slogin                         return Err(SystemError::EFAULT);
880ab5c8ca4Slogin                     }
881ab5c8ca4Slogin                     return Ok(());
882ab5c8ca4Slogin                 };
883ab5c8ca4Slogin                 let r = security_check();
884ab5c8ca4Slogin                 if r.is_err() {
885ab5c8ca4Slogin                     Err(r.unwrap_err())
886ab5c8ca4Slogin                 } else {
887ab5c8ca4Slogin                     let buf = unsafe { core::slice::from_raw_parts_mut(buf, len) };
888ab5c8ca4Slogin                     Self::recvfrom(args[0], buf, flags, addr, addrlen as *mut u32)
889ab5c8ca4Slogin                 }
890ab5c8ca4Slogin             }
891ab5c8ca4Slogin 
892ab5c8ca4Slogin             SYS_RECVMSG => {
893ab5c8ca4Slogin                 let msg = args[1] as *mut crate::net::syscall::MsgHdr;
894ab5c8ca4Slogin                 let flags = args[2] as u32;
8954537ffb7SChiichen                 match UserBufferWriter::new(
8964537ffb7SChiichen                     msg,
8974537ffb7SChiichen                     core::mem::size_of::<crate::net::syscall::MsgHdr>(),
8984537ffb7SChiichen                     true,
8994537ffb7SChiichen                 ) {
9004537ffb7SChiichen                     Err(e) => Err(e),
9014537ffb7SChiichen                     Ok(mut user_buffer_writer) => {
9024537ffb7SChiichen                         match user_buffer_writer.buffer::<crate::net::syscall::MsgHdr>(0) {
9034537ffb7SChiichen                             Err(e) => Err(e),
9044537ffb7SChiichen                             Ok(buffer) => {
9054537ffb7SChiichen                                 let msg = &mut buffer[0];
906ab5c8ca4Slogin                                 Self::recvmsg(args[0], msg, flags)
907ab5c8ca4Slogin                             }
908ab5c8ca4Slogin                         }
9094537ffb7SChiichen                     }
9104537ffb7SChiichen                 }
9114537ffb7SChiichen             }
912ab5c8ca4Slogin 
913ab5c8ca4Slogin             SYS_LISTEN => Self::listen(args[0], args[1]),
914ab5c8ca4Slogin             SYS_SHUTDOWN => Self::shutdown(args[0], args[1]),
915ab5c8ca4Slogin             SYS_ACCEPT => Self::accept(args[0], args[1] as *mut SockAddr, args[2] as *mut u32),
916ab5c8ca4Slogin             SYS_GETSOCKNAME => {
917ab5c8ca4Slogin                 Self::getsockname(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
918ab5c8ca4Slogin             }
919ab5c8ca4Slogin             SYS_GETPEERNAME => {
920ab5c8ca4Slogin                 Self::getpeername(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
921ab5c8ca4Slogin             }
92236fd0130Shoumkh             SYS_GETTIMEOFDAY => {
92336fd0130Shoumkh                 let timeval = args[0] as *mut PosixTimeval;
92440fe15e0SLoGin                 let timezone_ptr = args[1] as *mut PosixTimeZone;
92540fe15e0SLoGin                 Self::gettimeofday(timeval, timezone_ptr)
9264537ffb7SChiichen             }
92740fe15e0SLoGin             SYS_MMAP => {
92840fe15e0SLoGin                 let len = page_align_up(args[1]);
929be63f3b2Shoumkh                 let virt_addr = VirtAddr::new(args[0] as usize);
930be63f3b2Shoumkh                 if verify_area(virt_addr, len as usize).is_err() {
93140fe15e0SLoGin                     Err(SystemError::EFAULT)
93240fe15e0SLoGin                 } else {
93340fe15e0SLoGin                     Self::mmap(
93440fe15e0SLoGin                         VirtAddr::new(args[0]),
93540fe15e0SLoGin                         len,
93640fe15e0SLoGin                         args[2],
93740fe15e0SLoGin                         args[3],
93840fe15e0SLoGin                         args[4] as i32,
93940fe15e0SLoGin                         args[5],
94040fe15e0SLoGin                     )
94140fe15e0SLoGin                 }
94240fe15e0SLoGin             }
94340fe15e0SLoGin             SYS_MUNMAP => {
94440fe15e0SLoGin                 let addr = args[0];
94540fe15e0SLoGin                 let len = page_align_up(args[1]);
94640fe15e0SLoGin                 if addr & MMArch::PAGE_SIZE != 0 {
94740fe15e0SLoGin                     // The addr argument is not a multiple of the page size
94840fe15e0SLoGin                     Err(SystemError::EINVAL)
94940fe15e0SLoGin                 } else {
95040fe15e0SLoGin                     Self::munmap(VirtAddr::new(addr), len)
95140fe15e0SLoGin                 }
95240fe15e0SLoGin             }
95340fe15e0SLoGin             SYS_MPROTECT => {
95440fe15e0SLoGin                 let addr = args[0];
95540fe15e0SLoGin                 let len = page_align_up(args[1]);
95640fe15e0SLoGin                 if addr & MMArch::PAGE_SIZE != 0 {
95740fe15e0SLoGin                     // The addr argument is not a multiple of the page size
95840fe15e0SLoGin                     Err(SystemError::EINVAL)
95940fe15e0SLoGin                 } else {
96040fe15e0SLoGin                     Self::mprotect(VirtAddr::new(addr), len, args[2])
96140fe15e0SLoGin                 }
96240fe15e0SLoGin             }
96340fe15e0SLoGin 
9641496ba7bSLoGin             SYS_GETCWD => {
9651496ba7bSLoGin                 let buf = args[0] as *mut u8;
9661496ba7bSLoGin                 let size = args[1] as usize;
9671496ba7bSLoGin                 let security_check = || {
9681496ba7bSLoGin                     verify_area(VirtAddr::new(buf as usize), size)?;
9691496ba7bSLoGin                     return Ok(());
9701496ba7bSLoGin                 };
9711496ba7bSLoGin                 let r = security_check();
9721496ba7bSLoGin                 if r.is_err() {
9731496ba7bSLoGin                     Err(r.unwrap_err())
9741496ba7bSLoGin                 } else {
9751496ba7bSLoGin                     let buf = unsafe { core::slice::from_raw_parts_mut(buf, size) };
9761496ba7bSLoGin                     Self::getcwd(buf).map(|ptr| ptr.data())
9771496ba7bSLoGin                 }
9781496ba7bSLoGin             }
9791496ba7bSLoGin 
9801496ba7bSLoGin             SYS_GETPGID => Self::getpgid(Pid::new(args[0])).map(|pid| pid.into()),
9811496ba7bSLoGin 
9821496ba7bSLoGin             SYS_GETPPID => Self::getppid().map(|pid| pid.into()),
983be63f3b2Shoumkh             SYS_FSTAT => {
984be63f3b2Shoumkh                 let fd = args[0] as i32;
985be63f3b2Shoumkh                 let kstat = args[1] as *mut PosixKstat;
986be63f3b2Shoumkh                 let vaddr = VirtAddr::new(kstat as usize);
987be63f3b2Shoumkh                 // FIXME 由于c中的verify_area与rust中的verify_area重名,所以在引入时加了前缀区分
988be63f3b2Shoumkh                 // TODO 应该将用了c版本的verify_area都改为rust的verify_area
989be63f3b2Shoumkh                 match verify_area(vaddr, core::mem::size_of::<PosixKstat>()) {
990be63f3b2Shoumkh                     Ok(_) => Self::fstat(fd, kstat),
991be63f3b2Shoumkh                     Err(e) => Err(e),
992be63f3b2Shoumkh                 }
993be63f3b2Shoumkh             }
994be63f3b2Shoumkh 
9956d81180bSLoGin             SYS_FCNTL => {
9966d81180bSLoGin                 let fd = args[0] as i32;
9976d81180bSLoGin                 let cmd: Option<FcntlCommand> =
9986d81180bSLoGin                     <FcntlCommand as FromPrimitive>::from_u32(args[1] as u32);
9996d81180bSLoGin                 let arg = args[2] as i32;
10006d81180bSLoGin                 let res = if let Some(cmd) = cmd {
10016d81180bSLoGin                     Self::fcntl(fd, cmd, arg)
10026d81180bSLoGin                 } else {
10036d81180bSLoGin                     Err(SystemError::EINVAL)
10046d81180bSLoGin                 };
10056d81180bSLoGin 
10066d81180bSLoGin                 // kdebug!("FCNTL: fd: {}, cmd: {:?}, arg: {}, res: {:?}", fd, cmd, arg, res);
10076d81180bSLoGin                 res
10086d81180bSLoGin             }
10096d81180bSLoGin 
10106d81180bSLoGin             SYS_FTRUNCATE => {
10116d81180bSLoGin                 let fd = args[0] as i32;
10126d81180bSLoGin                 let len = args[1] as usize;
10136d81180bSLoGin                 let res = Self::ftruncate(fd, len);
10146d81180bSLoGin                 // kdebug!("FTRUNCATE: fd: {}, len: {}, res: {:?}", fd, len, res);
10156d81180bSLoGin                 res
10166d81180bSLoGin             }
10176d81180bSLoGin 
10182dbef785SGnoCiYeH             SYS_MKNOD => {
10192dbef785SGnoCiYeH                 let path = args[0];
10202dbef785SGnoCiYeH                 let flags = args[1];
10212dbef785SGnoCiYeH                 let dev_t = args[2];
10222dbef785SGnoCiYeH                 let flags: ModeType = ModeType::from_bits_truncate(flags as u32);
10232dbef785SGnoCiYeH                 Self::mknod(path as *const i8, flags, DeviceNumber::from(dev_t))
10242dbef785SGnoCiYeH             }
10252dbef785SGnoCiYeH 
1026ab5c8ca4Slogin             _ => panic!("Unsupported syscall ID: {}", syscall_num),
1027ab5c8ca4Slogin         };
1028ab5c8ca4Slogin         return r;
1029ab5c8ca4Slogin     }
1030ab5c8ca4Slogin 
1031ab5c8ca4Slogin     pub fn put_string(
1032ab5c8ca4Slogin         s: *const u8,
1033ab5c8ca4Slogin         front_color: u32,
1034ab5c8ca4Slogin         back_color: u32,
1035ab5c8ca4Slogin     ) -> Result<usize, SystemError> {
1036ab5c8ca4Slogin         return Ok(unsafe { do_put_string(s, front_color, back_color) });
1037ab5c8ca4Slogin     }
1038ab5c8ca4Slogin 
1039ab5c8ca4Slogin     pub fn reboot() -> Result<usize, SystemError> {
1040ab5c8ca4Slogin         cpu_reset();
1041ab5c8ca4Slogin     }
1042ab5c8ca4Slogin }
1043